1 /* PowerPC64-specific support for 64-bit ELF.
2 Copyright (C) 1999-2016 Free Software Foundation, Inc.
3 Written by Linus Nordberg, Swox AB <info@swox.com>,
4 based on elf32-ppc.c by Ian Lance Taylor.
5 Largely rewritten by Alan Modra.
7 This file is part of BFD, the Binary File Descriptor library.
9 This program is free software; you can redistribute it and/or modify
10 it under the terms of the GNU General Public License as published by
11 the Free Software Foundation; either version 3 of the License, or
12 (at your option) any later version.
14 This program is distributed in the hope that it will be useful,
15 but WITHOUT ANY WARRANTY; without even the implied warranty of
16 MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
17 GNU General Public License for more details.
19 You should have received a copy of the GNU General Public License along
20 with this program; if not, write to the Free Software Foundation, Inc.,
21 51 Franklin Street - Fifth Floor, Boston, MA 02110-1301, USA. */
24 /* The 64-bit PowerPC ELF ABI may be found at
25 http://www.linuxbase.org/spec/ELF/ppc64/PPC-elf64abi.txt, and
26 http://www.linuxbase.org/spec/ELF/ppc64/spec/book1.html */
34 #include "elf/ppc64.h"
35 #include "elf64-ppc.h"
38 static bfd_reloc_status_type ppc64_elf_ha_reloc
39 (bfd
*, arelent
*, asymbol
*, void *, asection
*, bfd
*, char **);
40 static bfd_reloc_status_type ppc64_elf_branch_reloc
41 (bfd
*, arelent
*, asymbol
*, void *, asection
*, bfd
*, char **);
42 static bfd_reloc_status_type ppc64_elf_brtaken_reloc
43 (bfd
*, arelent
*, asymbol
*, void *, asection
*, bfd
*, char **);
44 static bfd_reloc_status_type ppc64_elf_sectoff_reloc
45 (bfd
*, arelent
*, asymbol
*, void *, asection
*, bfd
*, char **);
46 static bfd_reloc_status_type ppc64_elf_sectoff_ha_reloc
47 (bfd
*, arelent
*, asymbol
*, void *, asection
*, bfd
*, char **);
48 static bfd_reloc_status_type ppc64_elf_toc_reloc
49 (bfd
*, arelent
*, asymbol
*, void *, asection
*, bfd
*, char **);
50 static bfd_reloc_status_type ppc64_elf_toc_ha_reloc
51 (bfd
*, arelent
*, asymbol
*, void *, asection
*, bfd
*, char **);
52 static bfd_reloc_status_type ppc64_elf_toc64_reloc
53 (bfd
*, arelent
*, asymbol
*, void *, asection
*, bfd
*, char **);
54 static bfd_reloc_status_type ppc64_elf_unhandled_reloc
55 (bfd
*, arelent
*, asymbol
*, void *, asection
*, bfd
*, char **);
56 static bfd_vma opd_entry_value
57 (asection
*, bfd_vma
, asection
**, bfd_vma
*, bfd_boolean
);
59 #define TARGET_LITTLE_SYM powerpc_elf64_le_vec
60 #define TARGET_LITTLE_NAME "elf64-powerpcle"
61 #define TARGET_BIG_SYM powerpc_elf64_vec
62 #define TARGET_BIG_NAME "elf64-powerpc"
63 #define ELF_ARCH bfd_arch_powerpc
64 #define ELF_TARGET_ID PPC64_ELF_DATA
65 #define ELF_MACHINE_CODE EM_PPC64
66 #define ELF_MAXPAGESIZE 0x10000
67 #define ELF_COMMONPAGESIZE 0x10000
68 #define elf_info_to_howto ppc64_elf_info_to_howto
70 #define elf_backend_want_got_sym 0
71 #define elf_backend_want_plt_sym 0
72 #define elf_backend_plt_alignment 3
73 #define elf_backend_plt_not_loaded 1
74 #define elf_backend_got_header_size 8
75 #define elf_backend_can_gc_sections 1
76 #define elf_backend_can_refcount 1
77 #define elf_backend_rela_normal 1
78 #define elf_backend_default_execstack 0
80 #define bfd_elf64_mkobject ppc64_elf_mkobject
81 #define bfd_elf64_bfd_reloc_type_lookup ppc64_elf_reloc_type_lookup
82 #define bfd_elf64_bfd_reloc_name_lookup ppc64_elf_reloc_name_lookup
83 #define bfd_elf64_bfd_merge_private_bfd_data ppc64_elf_merge_private_bfd_data
84 #define bfd_elf64_bfd_print_private_bfd_data ppc64_elf_print_private_bfd_data
85 #define bfd_elf64_new_section_hook ppc64_elf_new_section_hook
86 #define bfd_elf64_bfd_link_hash_table_create ppc64_elf_link_hash_table_create
87 #define bfd_elf64_get_synthetic_symtab ppc64_elf_get_synthetic_symtab
88 #define bfd_elf64_bfd_link_just_syms ppc64_elf_link_just_syms
90 #define elf_backend_object_p ppc64_elf_object_p
91 #define elf_backend_grok_prstatus ppc64_elf_grok_prstatus
92 #define elf_backend_grok_psinfo ppc64_elf_grok_psinfo
93 #define elf_backend_write_core_note ppc64_elf_write_core_note
94 #define elf_backend_create_dynamic_sections ppc64_elf_create_dynamic_sections
95 #define elf_backend_copy_indirect_symbol ppc64_elf_copy_indirect_symbol
96 #define elf_backend_add_symbol_hook ppc64_elf_add_symbol_hook
97 #define elf_backend_check_directives ppc64_elf_before_check_relocs
98 #define elf_backend_notice_as_needed ppc64_elf_notice_as_needed
99 #define elf_backend_archive_symbol_lookup ppc64_elf_archive_symbol_lookup
100 #define elf_backend_check_relocs ppc64_elf_check_relocs
101 #define elf_backend_gc_keep ppc64_elf_gc_keep
102 #define elf_backend_gc_mark_dynamic_ref ppc64_elf_gc_mark_dynamic_ref
103 #define elf_backend_gc_mark_hook ppc64_elf_gc_mark_hook
104 #define elf_backend_gc_sweep_hook ppc64_elf_gc_sweep_hook
105 #define elf_backend_adjust_dynamic_symbol ppc64_elf_adjust_dynamic_symbol
106 #define elf_backend_hide_symbol ppc64_elf_hide_symbol
107 #define elf_backend_maybe_function_sym ppc64_elf_maybe_function_sym
108 #define elf_backend_always_size_sections ppc64_elf_func_desc_adjust
109 #define elf_backend_size_dynamic_sections ppc64_elf_size_dynamic_sections
110 #define elf_backend_hash_symbol ppc64_elf_hash_symbol
111 #define elf_backend_init_index_section _bfd_elf_init_2_index_sections
112 #define elf_backend_action_discarded ppc64_elf_action_discarded
113 #define elf_backend_relocate_section ppc64_elf_relocate_section
114 #define elf_backend_finish_dynamic_symbol ppc64_elf_finish_dynamic_symbol
115 #define elf_backend_reloc_type_class ppc64_elf_reloc_type_class
116 #define elf_backend_finish_dynamic_sections ppc64_elf_finish_dynamic_sections
117 #define elf_backend_link_output_symbol_hook ppc64_elf_output_symbol_hook
118 #define elf_backend_special_sections ppc64_elf_special_sections
119 #define elf_backend_merge_symbol_attribute ppc64_elf_merge_symbol_attribute
121 /* The name of the dynamic interpreter. This is put in the .interp
123 #define ELF_DYNAMIC_INTERPRETER "/usr/lib/ld.so.1"
125 /* The size in bytes of an entry in the procedure linkage table. */
126 #define PLT_ENTRY_SIZE(htab) (htab->opd_abi ? 24 : 8)
128 /* The initial size of the plt reserved for the dynamic linker. */
129 #define PLT_INITIAL_ENTRY_SIZE(htab) (htab->opd_abi ? 24 : 16)
131 /* Offsets to some stack save slots. */
133 #define STK_TOC(htab) (htab->opd_abi ? 40 : 24)
134 /* This one is dodgy. ELFv2 does not have a linker word, so use the
135 CR save slot. Used only by optimised __tls_get_addr call stub,
136 relying on __tls_get_addr_opt not saving CR.. */
137 #define STK_LINKER(htab) (htab->opd_abi ? 32 : 8)
139 /* TOC base pointers offset from start of TOC. */
140 #define TOC_BASE_OFF 0x8000
141 /* TOC base alignment. */
142 #define TOC_BASE_ALIGN 256
144 /* Offset of tp and dtp pointers from start of TLS block. */
145 #define TP_OFFSET 0x7000
146 #define DTP_OFFSET 0x8000
148 /* .plt call stub instructions. The normal stub is like this, but
149 sometimes the .plt entry crosses a 64k boundary and we need to
150 insert an addi to adjust r11. */
151 #define STD_R2_0R1 0xf8410000 /* std %r2,0+40(%r1) */
152 #define ADDIS_R11_R2 0x3d620000 /* addis %r11,%r2,xxx@ha */
153 #define LD_R12_0R11 0xe98b0000 /* ld %r12,xxx+0@l(%r11) */
154 #define MTCTR_R12 0x7d8903a6 /* mtctr %r12 */
155 #define LD_R2_0R11 0xe84b0000 /* ld %r2,xxx+8@l(%r11) */
156 #define LD_R11_0R11 0xe96b0000 /* ld %r11,xxx+16@l(%r11) */
157 #define BCTR 0x4e800420 /* bctr */
159 #define ADDI_R11_R11 0x396b0000 /* addi %r11,%r11,off@l */
160 #define ADDIS_R2_R2 0x3c420000 /* addis %r2,%r2,off@ha */
161 #define ADDI_R2_R2 0x38420000 /* addi %r2,%r2,off@l */
163 #define XOR_R2_R12_R12 0x7d826278 /* xor %r2,%r12,%r12 */
164 #define ADD_R11_R11_R2 0x7d6b1214 /* add %r11,%r11,%r2 */
165 #define XOR_R11_R12_R12 0x7d8b6278 /* xor %r11,%r12,%r12 */
166 #define ADD_R2_R2_R11 0x7c425a14 /* add %r2,%r2,%r11 */
167 #define CMPLDI_R2_0 0x28220000 /* cmpldi %r2,0 */
168 #define BNECTR 0x4ca20420 /* bnectr+ */
169 #define BNECTR_P4 0x4ce20420 /* bnectr+ */
171 #define LD_R12_0R2 0xe9820000 /* ld %r12,xxx+0(%r2) */
172 #define LD_R11_0R2 0xe9620000 /* ld %r11,xxx+0(%r2) */
173 #define LD_R2_0R2 0xe8420000 /* ld %r2,xxx+0(%r2) */
175 #define LD_R2_0R1 0xe8410000 /* ld %r2,0(%r1) */
176 #define LD_R2_0R12 0xe84c0000 /* ld %r2,0(%r12) */
177 #define ADD_R2_R2_R12 0x7c426214 /* add %r2,%r2,%r12 */
179 #define LIS_R2 0x3c400000 /* lis %r2,xxx@ha */
180 #define ADDIS_R2_R12 0x3c4c0000 /* addis %r2,%r12,xxx@ha */
181 #define ADDIS_R12_R2 0x3d820000 /* addis %r12,%r2,xxx@ha */
182 #define ADDIS_R12_R12 0x3d8c0000 /* addis %r12,%r12,xxx@ha */
183 #define LD_R12_0R12 0xe98c0000 /* ld %r12,xxx@l(%r12) */
185 /* glink call stub instructions. We enter with the index in R0. */
186 #define GLINK_CALL_STUB_SIZE (16*4)
190 #define MFLR_R12 0x7d8802a6 /* mflr %12 */
191 #define BCL_20_31 0x429f0005 /* bcl 20,31,1f */
193 #define MFLR_R11 0x7d6802a6 /* mflr %11 */
194 /* ld %2,(0b-1b)(%11) */
195 #define MTLR_R12 0x7d8803a6 /* mtlr %12 */
196 #define ADD_R11_R2_R11 0x7d625a14 /* add %11,%2,%11 */
202 #define MFLR_R0 0x7c0802a6 /* mflr %r0 */
203 #define MTLR_R0 0x7c0803a6 /* mtlr %r0 */
204 #define SUB_R12_R12_R11 0x7d8b6050 /* subf %r12,%r11,%r12 */
205 #define ADDI_R0_R12 0x380c0000 /* addi %r0,%r12,0 */
206 #define SRDI_R0_R0_2 0x7800f082 /* rldicl %r0,%r0,62,2 */
209 #define NOP 0x60000000
211 /* Some other nops. */
212 #define CROR_151515 0x4def7b82
213 #define CROR_313131 0x4ffffb82
215 /* .glink entries for the first 32k functions are two instructions. */
216 #define LI_R0_0 0x38000000 /* li %r0,0 */
217 #define B_DOT 0x48000000 /* b . */
219 /* After that, we need two instructions to load the index, followed by
221 #define LIS_R0_0 0x3c000000 /* lis %r0,0 */
222 #define ORI_R0_R0_0 0x60000000 /* ori %r0,%r0,0 */
224 /* Instructions used by the save and restore reg functions. */
225 #define STD_R0_0R1 0xf8010000 /* std %r0,0(%r1) */
226 #define STD_R0_0R12 0xf80c0000 /* std %r0,0(%r12) */
227 #define LD_R0_0R1 0xe8010000 /* ld %r0,0(%r1) */
228 #define LD_R0_0R12 0xe80c0000 /* ld %r0,0(%r12) */
229 #define STFD_FR0_0R1 0xd8010000 /* stfd %fr0,0(%r1) */
230 #define LFD_FR0_0R1 0xc8010000 /* lfd %fr0,0(%r1) */
231 #define LI_R12_0 0x39800000 /* li %r12,0 */
232 #define STVX_VR0_R12_R0 0x7c0c01ce /* stvx %v0,%r12,%r0 */
233 #define LVX_VR0_R12_R0 0x7c0c00ce /* lvx %v0,%r12,%r0 */
234 #define MTLR_R0 0x7c0803a6 /* mtlr %r0 */
235 #define BLR 0x4e800020 /* blr */
237 /* Since .opd is an array of descriptors and each entry will end up
238 with identical R_PPC64_RELATIVE relocs, there is really no need to
239 propagate .opd relocs; The dynamic linker should be taught to
240 relocate .opd without reloc entries. */
241 #ifndef NO_OPD_RELOCS
242 #define NO_OPD_RELOCS 0
246 #define ARRAY_SIZE(a) (sizeof (a) / sizeof ((a)[0]))
250 abiversion (bfd
*abfd
)
252 return elf_elfheader (abfd
)->e_flags
& EF_PPC64_ABI
;
256 set_abiversion (bfd
*abfd
, int ver
)
258 elf_elfheader (abfd
)->e_flags
&= ~EF_PPC64_ABI
;
259 elf_elfheader (abfd
)->e_flags
|= ver
& EF_PPC64_ABI
;
262 #define ONES(n) (((bfd_vma) 1 << ((n) - 1) << 1) - 1)
264 /* Relocation HOWTO's. */
265 static reloc_howto_type
*ppc64_elf_howto_table
[(int) R_PPC64_max
];
267 static reloc_howto_type ppc64_elf_howto_raw
[] = {
268 /* This reloc does nothing. */
269 HOWTO (R_PPC64_NONE
, /* type */
271 3, /* size (0 = byte, 1 = short, 2 = long) */
273 FALSE
, /* pc_relative */
275 complain_overflow_dont
, /* complain_on_overflow */
276 bfd_elf_generic_reloc
, /* special_function */
277 "R_PPC64_NONE", /* name */
278 FALSE
, /* partial_inplace */
281 FALSE
), /* pcrel_offset */
283 /* A standard 32 bit relocation. */
284 HOWTO (R_PPC64_ADDR32
, /* type */
286 2, /* size (0 = byte, 1 = short, 2 = long) */
288 FALSE
, /* pc_relative */
290 complain_overflow_bitfield
, /* complain_on_overflow */
291 bfd_elf_generic_reloc
, /* special_function */
292 "R_PPC64_ADDR32", /* name */
293 FALSE
, /* partial_inplace */
295 0xffffffff, /* dst_mask */
296 FALSE
), /* pcrel_offset */
298 /* An absolute 26 bit branch; the lower two bits must be zero.
299 FIXME: we don't check that, we just clear them. */
300 HOWTO (R_PPC64_ADDR24
, /* type */
302 2, /* size (0 = byte, 1 = short, 2 = long) */
304 FALSE
, /* pc_relative */
306 complain_overflow_bitfield
, /* complain_on_overflow */
307 bfd_elf_generic_reloc
, /* special_function */
308 "R_PPC64_ADDR24", /* name */
309 FALSE
, /* partial_inplace */
311 0x03fffffc, /* dst_mask */
312 FALSE
), /* pcrel_offset */
314 /* A standard 16 bit relocation. */
315 HOWTO (R_PPC64_ADDR16
, /* type */
317 1, /* size (0 = byte, 1 = short, 2 = long) */
319 FALSE
, /* pc_relative */
321 complain_overflow_bitfield
, /* complain_on_overflow */
322 bfd_elf_generic_reloc
, /* special_function */
323 "R_PPC64_ADDR16", /* name */
324 FALSE
, /* partial_inplace */
326 0xffff, /* dst_mask */
327 FALSE
), /* pcrel_offset */
329 /* A 16 bit relocation without overflow. */
330 HOWTO (R_PPC64_ADDR16_LO
, /* type */
332 1, /* size (0 = byte, 1 = short, 2 = long) */
334 FALSE
, /* pc_relative */
336 complain_overflow_dont
,/* complain_on_overflow */
337 bfd_elf_generic_reloc
, /* special_function */
338 "R_PPC64_ADDR16_LO", /* name */
339 FALSE
, /* partial_inplace */
341 0xffff, /* dst_mask */
342 FALSE
), /* pcrel_offset */
344 /* Bits 16-31 of an address. */
345 HOWTO (R_PPC64_ADDR16_HI
, /* type */
347 1, /* size (0 = byte, 1 = short, 2 = long) */
349 FALSE
, /* pc_relative */
351 complain_overflow_signed
, /* complain_on_overflow */
352 bfd_elf_generic_reloc
, /* special_function */
353 "R_PPC64_ADDR16_HI", /* name */
354 FALSE
, /* partial_inplace */
356 0xffff, /* dst_mask */
357 FALSE
), /* pcrel_offset */
359 /* Bits 16-31 of an address, plus 1 if the contents of the low 16
360 bits, treated as a signed number, is negative. */
361 HOWTO (R_PPC64_ADDR16_HA
, /* type */
363 1, /* size (0 = byte, 1 = short, 2 = long) */
365 FALSE
, /* pc_relative */
367 complain_overflow_signed
, /* complain_on_overflow */
368 ppc64_elf_ha_reloc
, /* special_function */
369 "R_PPC64_ADDR16_HA", /* name */
370 FALSE
, /* partial_inplace */
372 0xffff, /* dst_mask */
373 FALSE
), /* pcrel_offset */
375 /* An absolute 16 bit branch; the lower two bits must be zero.
376 FIXME: we don't check that, we just clear them. */
377 HOWTO (R_PPC64_ADDR14
, /* type */
379 2, /* size (0 = byte, 1 = short, 2 = long) */
381 FALSE
, /* pc_relative */
383 complain_overflow_signed
, /* complain_on_overflow */
384 ppc64_elf_branch_reloc
, /* special_function */
385 "R_PPC64_ADDR14", /* name */
386 FALSE
, /* partial_inplace */
388 0x0000fffc, /* dst_mask */
389 FALSE
), /* pcrel_offset */
391 /* An absolute 16 bit branch, for which bit 10 should be set to
392 indicate that the branch is expected to be taken. The lower two
393 bits must be zero. */
394 HOWTO (R_PPC64_ADDR14_BRTAKEN
, /* type */
396 2, /* size (0 = byte, 1 = short, 2 = long) */
398 FALSE
, /* pc_relative */
400 complain_overflow_signed
, /* complain_on_overflow */
401 ppc64_elf_brtaken_reloc
, /* special_function */
402 "R_PPC64_ADDR14_BRTAKEN",/* name */
403 FALSE
, /* partial_inplace */
405 0x0000fffc, /* dst_mask */
406 FALSE
), /* pcrel_offset */
408 /* An absolute 16 bit branch, for which bit 10 should be set to
409 indicate that the branch is not expected to be taken. The lower
410 two bits must be zero. */
411 HOWTO (R_PPC64_ADDR14_BRNTAKEN
, /* type */
413 2, /* size (0 = byte, 1 = short, 2 = long) */
415 FALSE
, /* pc_relative */
417 complain_overflow_signed
, /* complain_on_overflow */
418 ppc64_elf_brtaken_reloc
, /* special_function */
419 "R_PPC64_ADDR14_BRNTAKEN",/* name */
420 FALSE
, /* partial_inplace */
422 0x0000fffc, /* dst_mask */
423 FALSE
), /* pcrel_offset */
425 /* A relative 26 bit branch; the lower two bits must be zero. */
426 HOWTO (R_PPC64_REL24
, /* type */
428 2, /* size (0 = byte, 1 = short, 2 = long) */
430 TRUE
, /* pc_relative */
432 complain_overflow_signed
, /* complain_on_overflow */
433 ppc64_elf_branch_reloc
, /* special_function */
434 "R_PPC64_REL24", /* name */
435 FALSE
, /* partial_inplace */
437 0x03fffffc, /* dst_mask */
438 TRUE
), /* pcrel_offset */
440 /* A relative 16 bit branch; the lower two bits must be zero. */
441 HOWTO (R_PPC64_REL14
, /* type */
443 2, /* size (0 = byte, 1 = short, 2 = long) */
445 TRUE
, /* pc_relative */
447 complain_overflow_signed
, /* complain_on_overflow */
448 ppc64_elf_branch_reloc
, /* special_function */
449 "R_PPC64_REL14", /* name */
450 FALSE
, /* partial_inplace */
452 0x0000fffc, /* dst_mask */
453 TRUE
), /* pcrel_offset */
455 /* A relative 16 bit branch. Bit 10 should be set to indicate that
456 the branch is expected to be taken. The lower two bits must be
458 HOWTO (R_PPC64_REL14_BRTAKEN
, /* type */
460 2, /* size (0 = byte, 1 = short, 2 = long) */
462 TRUE
, /* pc_relative */
464 complain_overflow_signed
, /* complain_on_overflow */
465 ppc64_elf_brtaken_reloc
, /* special_function */
466 "R_PPC64_REL14_BRTAKEN", /* name */
467 FALSE
, /* partial_inplace */
469 0x0000fffc, /* dst_mask */
470 TRUE
), /* pcrel_offset */
472 /* A relative 16 bit branch. Bit 10 should be set to indicate that
473 the branch is not expected to be taken. The lower two bits must
475 HOWTO (R_PPC64_REL14_BRNTAKEN
, /* type */
477 2, /* size (0 = byte, 1 = short, 2 = long) */
479 TRUE
, /* pc_relative */
481 complain_overflow_signed
, /* complain_on_overflow */
482 ppc64_elf_brtaken_reloc
, /* special_function */
483 "R_PPC64_REL14_BRNTAKEN",/* name */
484 FALSE
, /* partial_inplace */
486 0x0000fffc, /* dst_mask */
487 TRUE
), /* pcrel_offset */
489 /* Like R_PPC64_ADDR16, but referring to the GOT table entry for the
491 HOWTO (R_PPC64_GOT16
, /* type */
493 1, /* size (0 = byte, 1 = short, 2 = long) */
495 FALSE
, /* pc_relative */
497 complain_overflow_signed
, /* complain_on_overflow */
498 ppc64_elf_unhandled_reloc
, /* special_function */
499 "R_PPC64_GOT16", /* name */
500 FALSE
, /* partial_inplace */
502 0xffff, /* dst_mask */
503 FALSE
), /* pcrel_offset */
505 /* Like R_PPC64_ADDR16_LO, but referring to the GOT table entry for
507 HOWTO (R_PPC64_GOT16_LO
, /* type */
509 1, /* size (0 = byte, 1 = short, 2 = long) */
511 FALSE
, /* pc_relative */
513 complain_overflow_dont
, /* complain_on_overflow */
514 ppc64_elf_unhandled_reloc
, /* special_function */
515 "R_PPC64_GOT16_LO", /* name */
516 FALSE
, /* partial_inplace */
518 0xffff, /* dst_mask */
519 FALSE
), /* pcrel_offset */
521 /* Like R_PPC64_ADDR16_HI, but referring to the GOT table entry for
523 HOWTO (R_PPC64_GOT16_HI
, /* type */
525 1, /* size (0 = byte, 1 = short, 2 = long) */
527 FALSE
, /* pc_relative */
529 complain_overflow_signed
,/* complain_on_overflow */
530 ppc64_elf_unhandled_reloc
, /* special_function */
531 "R_PPC64_GOT16_HI", /* name */
532 FALSE
, /* partial_inplace */
534 0xffff, /* dst_mask */
535 FALSE
), /* pcrel_offset */
537 /* Like R_PPC64_ADDR16_HA, but referring to the GOT table entry for
539 HOWTO (R_PPC64_GOT16_HA
, /* type */
541 1, /* size (0 = byte, 1 = short, 2 = long) */
543 FALSE
, /* pc_relative */
545 complain_overflow_signed
,/* complain_on_overflow */
546 ppc64_elf_unhandled_reloc
, /* special_function */
547 "R_PPC64_GOT16_HA", /* name */
548 FALSE
, /* partial_inplace */
550 0xffff, /* dst_mask */
551 FALSE
), /* pcrel_offset */
553 /* This is used only by the dynamic linker. The symbol should exist
554 both in the object being run and in some shared library. The
555 dynamic linker copies the data addressed by the symbol from the
556 shared library into the object, because the object being
557 run has to have the data at some particular address. */
558 HOWTO (R_PPC64_COPY
, /* type */
560 0, /* this one is variable size */
562 FALSE
, /* pc_relative */
564 complain_overflow_dont
, /* complain_on_overflow */
565 ppc64_elf_unhandled_reloc
, /* special_function */
566 "R_PPC64_COPY", /* name */
567 FALSE
, /* partial_inplace */
570 FALSE
), /* pcrel_offset */
572 /* Like R_PPC64_ADDR64, but used when setting global offset table
574 HOWTO (R_PPC64_GLOB_DAT
, /* type */
576 4, /* size (0=byte, 1=short, 2=long, 4=64 bits) */
578 FALSE
, /* pc_relative */
580 complain_overflow_dont
, /* complain_on_overflow */
581 ppc64_elf_unhandled_reloc
, /* special_function */
582 "R_PPC64_GLOB_DAT", /* name */
583 FALSE
, /* partial_inplace */
585 ONES (64), /* dst_mask */
586 FALSE
), /* pcrel_offset */
588 /* Created by the link editor. Marks a procedure linkage table
589 entry for a symbol. */
590 HOWTO (R_PPC64_JMP_SLOT
, /* type */
592 0, /* size (0 = byte, 1 = short, 2 = long) */
594 FALSE
, /* pc_relative */
596 complain_overflow_dont
, /* complain_on_overflow */
597 ppc64_elf_unhandled_reloc
, /* special_function */
598 "R_PPC64_JMP_SLOT", /* name */
599 FALSE
, /* partial_inplace */
602 FALSE
), /* pcrel_offset */
604 /* Used only by the dynamic linker. When the object is run, this
605 doubleword64 is set to the load address of the object, plus the
607 HOWTO (R_PPC64_RELATIVE
, /* type */
609 4, /* size (0=byte, 1=short, 2=long, 4=64 bits) */
611 FALSE
, /* pc_relative */
613 complain_overflow_dont
, /* complain_on_overflow */
614 bfd_elf_generic_reloc
, /* special_function */
615 "R_PPC64_RELATIVE", /* name */
616 FALSE
, /* partial_inplace */
618 ONES (64), /* dst_mask */
619 FALSE
), /* pcrel_offset */
621 /* Like R_PPC64_ADDR32, but may be unaligned. */
622 HOWTO (R_PPC64_UADDR32
, /* type */
624 2, /* size (0 = byte, 1 = short, 2 = long) */
626 FALSE
, /* pc_relative */
628 complain_overflow_bitfield
, /* complain_on_overflow */
629 bfd_elf_generic_reloc
, /* special_function */
630 "R_PPC64_UADDR32", /* name */
631 FALSE
, /* partial_inplace */
633 0xffffffff, /* dst_mask */
634 FALSE
), /* pcrel_offset */
636 /* Like R_PPC64_ADDR16, but may be unaligned. */
637 HOWTO (R_PPC64_UADDR16
, /* type */
639 1, /* size (0 = byte, 1 = short, 2 = long) */
641 FALSE
, /* pc_relative */
643 complain_overflow_bitfield
, /* complain_on_overflow */
644 bfd_elf_generic_reloc
, /* special_function */
645 "R_PPC64_UADDR16", /* name */
646 FALSE
, /* partial_inplace */
648 0xffff, /* dst_mask */
649 FALSE
), /* pcrel_offset */
651 /* 32-bit PC relative. */
652 HOWTO (R_PPC64_REL32
, /* type */
654 2, /* size (0 = byte, 1 = short, 2 = long) */
656 TRUE
, /* pc_relative */
658 complain_overflow_signed
, /* complain_on_overflow */
659 bfd_elf_generic_reloc
, /* special_function */
660 "R_PPC64_REL32", /* name */
661 FALSE
, /* partial_inplace */
663 0xffffffff, /* dst_mask */
664 TRUE
), /* pcrel_offset */
666 /* 32-bit relocation to the symbol's procedure linkage table. */
667 HOWTO (R_PPC64_PLT32
, /* type */
669 2, /* size (0 = byte, 1 = short, 2 = long) */
671 FALSE
, /* pc_relative */
673 complain_overflow_bitfield
, /* complain_on_overflow */
674 ppc64_elf_unhandled_reloc
, /* special_function */
675 "R_PPC64_PLT32", /* name */
676 FALSE
, /* partial_inplace */
678 0xffffffff, /* dst_mask */
679 FALSE
), /* pcrel_offset */
681 /* 32-bit PC relative relocation to the symbol's procedure linkage table.
682 FIXME: R_PPC64_PLTREL32 not supported. */
683 HOWTO (R_PPC64_PLTREL32
, /* type */
685 2, /* size (0 = byte, 1 = short, 2 = long) */
687 TRUE
, /* pc_relative */
689 complain_overflow_signed
, /* complain_on_overflow */
690 ppc64_elf_unhandled_reloc
, /* special_function */
691 "R_PPC64_PLTREL32", /* name */
692 FALSE
, /* partial_inplace */
694 0xffffffff, /* dst_mask */
695 TRUE
), /* pcrel_offset */
697 /* Like R_PPC64_ADDR16_LO, but referring to the PLT table entry for
699 HOWTO (R_PPC64_PLT16_LO
, /* type */
701 1, /* size (0 = byte, 1 = short, 2 = long) */
703 FALSE
, /* pc_relative */
705 complain_overflow_dont
, /* complain_on_overflow */
706 ppc64_elf_unhandled_reloc
, /* special_function */
707 "R_PPC64_PLT16_LO", /* name */
708 FALSE
, /* partial_inplace */
710 0xffff, /* dst_mask */
711 FALSE
), /* pcrel_offset */
713 /* Like R_PPC64_ADDR16_HI, but referring to the PLT table entry for
715 HOWTO (R_PPC64_PLT16_HI
, /* type */
717 1, /* size (0 = byte, 1 = short, 2 = long) */
719 FALSE
, /* pc_relative */
721 complain_overflow_signed
, /* complain_on_overflow */
722 ppc64_elf_unhandled_reloc
, /* special_function */
723 "R_PPC64_PLT16_HI", /* name */
724 FALSE
, /* partial_inplace */
726 0xffff, /* dst_mask */
727 FALSE
), /* pcrel_offset */
729 /* Like R_PPC64_ADDR16_HA, but referring to the PLT table entry for
731 HOWTO (R_PPC64_PLT16_HA
, /* type */
733 1, /* size (0 = byte, 1 = short, 2 = long) */
735 FALSE
, /* pc_relative */
737 complain_overflow_signed
, /* complain_on_overflow */
738 ppc64_elf_unhandled_reloc
, /* special_function */
739 "R_PPC64_PLT16_HA", /* name */
740 FALSE
, /* partial_inplace */
742 0xffff, /* dst_mask */
743 FALSE
), /* pcrel_offset */
745 /* 16-bit section relative relocation. */
746 HOWTO (R_PPC64_SECTOFF
, /* type */
748 1, /* size (0 = byte, 1 = short, 2 = long) */
750 FALSE
, /* pc_relative */
752 complain_overflow_signed
, /* complain_on_overflow */
753 ppc64_elf_sectoff_reloc
, /* special_function */
754 "R_PPC64_SECTOFF", /* name */
755 FALSE
, /* partial_inplace */
757 0xffff, /* dst_mask */
758 FALSE
), /* pcrel_offset */
760 /* Like R_PPC64_SECTOFF, but no overflow warning. */
761 HOWTO (R_PPC64_SECTOFF_LO
, /* type */
763 1, /* size (0 = byte, 1 = short, 2 = long) */
765 FALSE
, /* pc_relative */
767 complain_overflow_dont
, /* complain_on_overflow */
768 ppc64_elf_sectoff_reloc
, /* special_function */
769 "R_PPC64_SECTOFF_LO", /* name */
770 FALSE
, /* partial_inplace */
772 0xffff, /* dst_mask */
773 FALSE
), /* pcrel_offset */
775 /* 16-bit upper half section relative relocation. */
776 HOWTO (R_PPC64_SECTOFF_HI
, /* type */
778 1, /* size (0 = byte, 1 = short, 2 = long) */
780 FALSE
, /* pc_relative */
782 complain_overflow_signed
, /* complain_on_overflow */
783 ppc64_elf_sectoff_reloc
, /* special_function */
784 "R_PPC64_SECTOFF_HI", /* name */
785 FALSE
, /* partial_inplace */
787 0xffff, /* dst_mask */
788 FALSE
), /* pcrel_offset */
790 /* 16-bit upper half adjusted section relative relocation. */
791 HOWTO (R_PPC64_SECTOFF_HA
, /* type */
793 1, /* size (0 = byte, 1 = short, 2 = long) */
795 FALSE
, /* pc_relative */
797 complain_overflow_signed
, /* complain_on_overflow */
798 ppc64_elf_sectoff_ha_reloc
, /* special_function */
799 "R_PPC64_SECTOFF_HA", /* name */
800 FALSE
, /* partial_inplace */
802 0xffff, /* dst_mask */
803 FALSE
), /* pcrel_offset */
805 /* Like R_PPC64_REL24 without touching the two least significant bits. */
806 HOWTO (R_PPC64_REL30
, /* type */
808 2, /* size (0 = byte, 1 = short, 2 = long) */
810 TRUE
, /* pc_relative */
812 complain_overflow_dont
, /* complain_on_overflow */
813 bfd_elf_generic_reloc
, /* special_function */
814 "R_PPC64_REL30", /* name */
815 FALSE
, /* partial_inplace */
817 0xfffffffc, /* dst_mask */
818 TRUE
), /* pcrel_offset */
820 /* Relocs in the 64-bit PowerPC ELF ABI, not in the 32-bit ABI. */
822 /* A standard 64-bit relocation. */
823 HOWTO (R_PPC64_ADDR64
, /* type */
825 4, /* size (0=byte, 1=short, 2=long, 4=64 bits) */
827 FALSE
, /* pc_relative */
829 complain_overflow_dont
, /* complain_on_overflow */
830 bfd_elf_generic_reloc
, /* special_function */
831 "R_PPC64_ADDR64", /* name */
832 FALSE
, /* partial_inplace */
834 ONES (64), /* dst_mask */
835 FALSE
), /* pcrel_offset */
837 /* The bits 32-47 of an address. */
838 HOWTO (R_PPC64_ADDR16_HIGHER
, /* type */
840 1, /* size (0 = byte, 1 = short, 2 = long) */
842 FALSE
, /* pc_relative */
844 complain_overflow_dont
, /* complain_on_overflow */
845 bfd_elf_generic_reloc
, /* special_function */
846 "R_PPC64_ADDR16_HIGHER", /* name */
847 FALSE
, /* partial_inplace */
849 0xffff, /* dst_mask */
850 FALSE
), /* pcrel_offset */
852 /* The bits 32-47 of an address, plus 1 if the contents of the low
853 16 bits, treated as a signed number, is negative. */
854 HOWTO (R_PPC64_ADDR16_HIGHERA
, /* type */
856 1, /* size (0 = byte, 1 = short, 2 = long) */
858 FALSE
, /* pc_relative */
860 complain_overflow_dont
, /* complain_on_overflow */
861 ppc64_elf_ha_reloc
, /* special_function */
862 "R_PPC64_ADDR16_HIGHERA", /* name */
863 FALSE
, /* partial_inplace */
865 0xffff, /* dst_mask */
866 FALSE
), /* pcrel_offset */
868 /* The bits 48-63 of an address. */
869 HOWTO (R_PPC64_ADDR16_HIGHEST
,/* type */
871 1, /* size (0 = byte, 1 = short, 2 = long) */
873 FALSE
, /* pc_relative */
875 complain_overflow_dont
, /* complain_on_overflow */
876 bfd_elf_generic_reloc
, /* special_function */
877 "R_PPC64_ADDR16_HIGHEST", /* name */
878 FALSE
, /* partial_inplace */
880 0xffff, /* dst_mask */
881 FALSE
), /* pcrel_offset */
883 /* The bits 48-63 of an address, plus 1 if the contents of the low
884 16 bits, treated as a signed number, is negative. */
885 HOWTO (R_PPC64_ADDR16_HIGHESTA
,/* type */
887 1, /* size (0 = byte, 1 = short, 2 = long) */
889 FALSE
, /* pc_relative */
891 complain_overflow_dont
, /* complain_on_overflow */
892 ppc64_elf_ha_reloc
, /* special_function */
893 "R_PPC64_ADDR16_HIGHESTA", /* name */
894 FALSE
, /* partial_inplace */
896 0xffff, /* dst_mask */
897 FALSE
), /* pcrel_offset */
899 /* Like ADDR64, but may be unaligned. */
900 HOWTO (R_PPC64_UADDR64
, /* type */
902 4, /* size (0=byte, 1=short, 2=long, 4=64 bits) */
904 FALSE
, /* pc_relative */
906 complain_overflow_dont
, /* complain_on_overflow */
907 bfd_elf_generic_reloc
, /* special_function */
908 "R_PPC64_UADDR64", /* name */
909 FALSE
, /* partial_inplace */
911 ONES (64), /* dst_mask */
912 FALSE
), /* pcrel_offset */
914 /* 64-bit relative relocation. */
915 HOWTO (R_PPC64_REL64
, /* type */
917 4, /* size (0=byte, 1=short, 2=long, 4=64 bits) */
919 TRUE
, /* pc_relative */
921 complain_overflow_dont
, /* complain_on_overflow */
922 bfd_elf_generic_reloc
, /* special_function */
923 "R_PPC64_REL64", /* name */
924 FALSE
, /* partial_inplace */
926 ONES (64), /* dst_mask */
927 TRUE
), /* pcrel_offset */
929 /* 64-bit relocation to the symbol's procedure linkage table. */
930 HOWTO (R_PPC64_PLT64
, /* type */
932 4, /* size (0=byte, 1=short, 2=long, 4=64 bits) */
934 FALSE
, /* pc_relative */
936 complain_overflow_dont
, /* complain_on_overflow */
937 ppc64_elf_unhandled_reloc
, /* special_function */
938 "R_PPC64_PLT64", /* name */
939 FALSE
, /* partial_inplace */
941 ONES (64), /* dst_mask */
942 FALSE
), /* pcrel_offset */
944 /* 64-bit PC relative relocation to the symbol's procedure linkage
946 /* FIXME: R_PPC64_PLTREL64 not supported. */
947 HOWTO (R_PPC64_PLTREL64
, /* type */
949 4, /* size (0=byte, 1=short, 2=long, 4=64 bits) */
951 TRUE
, /* pc_relative */
953 complain_overflow_dont
, /* complain_on_overflow */
954 ppc64_elf_unhandled_reloc
, /* special_function */
955 "R_PPC64_PLTREL64", /* name */
956 FALSE
, /* partial_inplace */
958 ONES (64), /* dst_mask */
959 TRUE
), /* pcrel_offset */
961 /* 16 bit TOC-relative relocation. */
963 /* R_PPC64_TOC16 47 half16* S + A - .TOC. */
964 HOWTO (R_PPC64_TOC16
, /* type */
966 1, /* size (0 = byte, 1 = short, 2 = long) */
968 FALSE
, /* pc_relative */
970 complain_overflow_signed
, /* complain_on_overflow */
971 ppc64_elf_toc_reloc
, /* special_function */
972 "R_PPC64_TOC16", /* name */
973 FALSE
, /* partial_inplace */
975 0xffff, /* dst_mask */
976 FALSE
), /* pcrel_offset */
978 /* 16 bit TOC-relative relocation without overflow. */
980 /* R_PPC64_TOC16_LO 48 half16 #lo (S + A - .TOC.) */
981 HOWTO (R_PPC64_TOC16_LO
, /* type */
983 1, /* size (0 = byte, 1 = short, 2 = long) */
985 FALSE
, /* pc_relative */
987 complain_overflow_dont
, /* complain_on_overflow */
988 ppc64_elf_toc_reloc
, /* special_function */
989 "R_PPC64_TOC16_LO", /* name */
990 FALSE
, /* partial_inplace */
992 0xffff, /* dst_mask */
993 FALSE
), /* pcrel_offset */
995 /* 16 bit TOC-relative relocation, high 16 bits. */
997 /* R_PPC64_TOC16_HI 49 half16 #hi (S + A - .TOC.) */
998 HOWTO (R_PPC64_TOC16_HI
, /* type */
1000 1, /* size (0 = byte, 1 = short, 2 = long) */
1002 FALSE
, /* pc_relative */
1004 complain_overflow_signed
, /* complain_on_overflow */
1005 ppc64_elf_toc_reloc
, /* special_function */
1006 "R_PPC64_TOC16_HI", /* name */
1007 FALSE
, /* partial_inplace */
1009 0xffff, /* dst_mask */
1010 FALSE
), /* pcrel_offset */
1012 /* 16 bit TOC-relative relocation, high 16 bits, plus 1 if the
1013 contents of the low 16 bits, treated as a signed number, is
1016 /* R_PPC64_TOC16_HA 50 half16 #ha (S + A - .TOC.) */
1017 HOWTO (R_PPC64_TOC16_HA
, /* type */
1018 16, /* rightshift */
1019 1, /* size (0 = byte, 1 = short, 2 = long) */
1021 FALSE
, /* pc_relative */
1023 complain_overflow_signed
, /* complain_on_overflow */
1024 ppc64_elf_toc_ha_reloc
, /* special_function */
1025 "R_PPC64_TOC16_HA", /* name */
1026 FALSE
, /* partial_inplace */
1028 0xffff, /* dst_mask */
1029 FALSE
), /* pcrel_offset */
1031 /* 64-bit relocation; insert value of TOC base (.TOC.). */
1033 /* R_PPC64_TOC 51 doubleword64 .TOC. */
1034 HOWTO (R_PPC64_TOC
, /* type */
1036 4, /* size (0=byte, 1=short, 2=long, 4=64 bits) */
1038 FALSE
, /* pc_relative */
1040 complain_overflow_dont
, /* complain_on_overflow */
1041 ppc64_elf_toc64_reloc
, /* special_function */
1042 "R_PPC64_TOC", /* name */
1043 FALSE
, /* partial_inplace */
1045 ONES (64), /* dst_mask */
1046 FALSE
), /* pcrel_offset */
1048 /* Like R_PPC64_GOT16, but also informs the link editor that the
1049 value to relocate may (!) refer to a PLT entry which the link
1050 editor (a) may replace with the symbol value. If the link editor
1051 is unable to fully resolve the symbol, it may (b) create a PLT
1052 entry and store the address to the new PLT entry in the GOT.
1053 This permits lazy resolution of function symbols at run time.
1054 The link editor may also skip all of this and just (c) emit a
1055 R_PPC64_GLOB_DAT to tie the symbol to the GOT entry. */
1056 /* FIXME: R_PPC64_PLTGOT16 not implemented. */
1057 HOWTO (R_PPC64_PLTGOT16
, /* type */
1059 1, /* size (0 = byte, 1 = short, 2 = long) */
1061 FALSE
, /* pc_relative */
1063 complain_overflow_signed
, /* complain_on_overflow */
1064 ppc64_elf_unhandled_reloc
, /* special_function */
1065 "R_PPC64_PLTGOT16", /* name */
1066 FALSE
, /* partial_inplace */
1068 0xffff, /* dst_mask */
1069 FALSE
), /* pcrel_offset */
1071 /* Like R_PPC64_PLTGOT16, but without overflow. */
1072 /* FIXME: R_PPC64_PLTGOT16_LO not implemented. */
1073 HOWTO (R_PPC64_PLTGOT16_LO
, /* type */
1075 1, /* size (0 = byte, 1 = short, 2 = long) */
1077 FALSE
, /* pc_relative */
1079 complain_overflow_dont
, /* complain_on_overflow */
1080 ppc64_elf_unhandled_reloc
, /* special_function */
1081 "R_PPC64_PLTGOT16_LO", /* name */
1082 FALSE
, /* partial_inplace */
1084 0xffff, /* dst_mask */
1085 FALSE
), /* pcrel_offset */
1087 /* Like R_PPC64_PLT_GOT16, but using bits 16-31 of the address. */
1088 /* FIXME: R_PPC64_PLTGOT16_HI not implemented. */
1089 HOWTO (R_PPC64_PLTGOT16_HI
, /* type */
1090 16, /* rightshift */
1091 1, /* size (0 = byte, 1 = short, 2 = long) */
1093 FALSE
, /* pc_relative */
1095 complain_overflow_signed
, /* complain_on_overflow */
1096 ppc64_elf_unhandled_reloc
, /* special_function */
1097 "R_PPC64_PLTGOT16_HI", /* name */
1098 FALSE
, /* partial_inplace */
1100 0xffff, /* dst_mask */
1101 FALSE
), /* pcrel_offset */
1103 /* Like R_PPC64_PLT_GOT16, but using bits 16-31 of the address, plus
1104 1 if the contents of the low 16 bits, treated as a signed number,
1106 /* FIXME: R_PPC64_PLTGOT16_HA not implemented. */
1107 HOWTO (R_PPC64_PLTGOT16_HA
, /* type */
1108 16, /* rightshift */
1109 1, /* size (0 = byte, 1 = short, 2 = long) */
1111 FALSE
, /* pc_relative */
1113 complain_overflow_signed
, /* complain_on_overflow */
1114 ppc64_elf_unhandled_reloc
, /* special_function */
1115 "R_PPC64_PLTGOT16_HA", /* name */
1116 FALSE
, /* partial_inplace */
1118 0xffff, /* dst_mask */
1119 FALSE
), /* pcrel_offset */
1121 /* Like R_PPC64_ADDR16, but for instructions with a DS field. */
1122 HOWTO (R_PPC64_ADDR16_DS
, /* type */
1124 1, /* size (0 = byte, 1 = short, 2 = long) */
1126 FALSE
, /* pc_relative */
1128 complain_overflow_signed
, /* complain_on_overflow */
1129 bfd_elf_generic_reloc
, /* special_function */
1130 "R_PPC64_ADDR16_DS", /* name */
1131 FALSE
, /* partial_inplace */
1133 0xfffc, /* dst_mask */
1134 FALSE
), /* pcrel_offset */
1136 /* Like R_PPC64_ADDR16_LO, but for instructions with a DS field. */
1137 HOWTO (R_PPC64_ADDR16_LO_DS
, /* type */
1139 1, /* size (0 = byte, 1 = short, 2 = long) */
1141 FALSE
, /* pc_relative */
1143 complain_overflow_dont
,/* complain_on_overflow */
1144 bfd_elf_generic_reloc
, /* special_function */
1145 "R_PPC64_ADDR16_LO_DS",/* name */
1146 FALSE
, /* partial_inplace */
1148 0xfffc, /* dst_mask */
1149 FALSE
), /* pcrel_offset */
1151 /* Like R_PPC64_GOT16, but for instructions with a DS field. */
1152 HOWTO (R_PPC64_GOT16_DS
, /* type */
1154 1, /* size (0 = byte, 1 = short, 2 = long) */
1156 FALSE
, /* pc_relative */
1158 complain_overflow_signed
, /* complain_on_overflow */
1159 ppc64_elf_unhandled_reloc
, /* special_function */
1160 "R_PPC64_GOT16_DS", /* name */
1161 FALSE
, /* partial_inplace */
1163 0xfffc, /* dst_mask */
1164 FALSE
), /* pcrel_offset */
1166 /* Like R_PPC64_GOT16_LO, but for instructions with a DS field. */
1167 HOWTO (R_PPC64_GOT16_LO_DS
, /* type */
1169 1, /* size (0 = byte, 1 = short, 2 = long) */
1171 FALSE
, /* pc_relative */
1173 complain_overflow_dont
, /* complain_on_overflow */
1174 ppc64_elf_unhandled_reloc
, /* special_function */
1175 "R_PPC64_GOT16_LO_DS", /* name */
1176 FALSE
, /* partial_inplace */
1178 0xfffc, /* dst_mask */
1179 FALSE
), /* pcrel_offset */
1181 /* Like R_PPC64_PLT16_LO, but for instructions with a DS field. */
1182 HOWTO (R_PPC64_PLT16_LO_DS
, /* type */
1184 1, /* size (0 = byte, 1 = short, 2 = long) */
1186 FALSE
, /* pc_relative */
1188 complain_overflow_dont
, /* complain_on_overflow */
1189 ppc64_elf_unhandled_reloc
, /* special_function */
1190 "R_PPC64_PLT16_LO_DS", /* name */
1191 FALSE
, /* partial_inplace */
1193 0xfffc, /* dst_mask */
1194 FALSE
), /* pcrel_offset */
1196 /* Like R_PPC64_SECTOFF, but for instructions with a DS field. */
1197 HOWTO (R_PPC64_SECTOFF_DS
, /* type */
1199 1, /* size (0 = byte, 1 = short, 2 = long) */
1201 FALSE
, /* pc_relative */
1203 complain_overflow_signed
, /* complain_on_overflow */
1204 ppc64_elf_sectoff_reloc
, /* special_function */
1205 "R_PPC64_SECTOFF_DS", /* name */
1206 FALSE
, /* partial_inplace */
1208 0xfffc, /* dst_mask */
1209 FALSE
), /* pcrel_offset */
1211 /* Like R_PPC64_SECTOFF_LO, but for instructions with a DS field. */
1212 HOWTO (R_PPC64_SECTOFF_LO_DS
, /* type */
1214 1, /* size (0 = byte, 1 = short, 2 = long) */
1216 FALSE
, /* pc_relative */
1218 complain_overflow_dont
, /* complain_on_overflow */
1219 ppc64_elf_sectoff_reloc
, /* special_function */
1220 "R_PPC64_SECTOFF_LO_DS",/* name */
1221 FALSE
, /* partial_inplace */
1223 0xfffc, /* dst_mask */
1224 FALSE
), /* pcrel_offset */
1226 /* Like R_PPC64_TOC16, but for instructions with a DS field. */
1227 HOWTO (R_PPC64_TOC16_DS
, /* type */
1229 1, /* size (0 = byte, 1 = short, 2 = long) */
1231 FALSE
, /* pc_relative */
1233 complain_overflow_signed
, /* complain_on_overflow */
1234 ppc64_elf_toc_reloc
, /* special_function */
1235 "R_PPC64_TOC16_DS", /* name */
1236 FALSE
, /* partial_inplace */
1238 0xfffc, /* dst_mask */
1239 FALSE
), /* pcrel_offset */
1241 /* Like R_PPC64_TOC16_LO, but for instructions with a DS field. */
1242 HOWTO (R_PPC64_TOC16_LO_DS
, /* type */
1244 1, /* size (0 = byte, 1 = short, 2 = long) */
1246 FALSE
, /* pc_relative */
1248 complain_overflow_dont
, /* complain_on_overflow */
1249 ppc64_elf_toc_reloc
, /* special_function */
1250 "R_PPC64_TOC16_LO_DS", /* name */
1251 FALSE
, /* partial_inplace */
1253 0xfffc, /* dst_mask */
1254 FALSE
), /* pcrel_offset */
1256 /* Like R_PPC64_PLTGOT16, but for instructions with a DS field. */
1257 /* FIXME: R_PPC64_PLTGOT16_DS not implemented. */
1258 HOWTO (R_PPC64_PLTGOT16_DS
, /* type */
1260 1, /* size (0 = byte, 1 = short, 2 = long) */
1262 FALSE
, /* pc_relative */
1264 complain_overflow_signed
, /* complain_on_overflow */
1265 ppc64_elf_unhandled_reloc
, /* special_function */
1266 "R_PPC64_PLTGOT16_DS", /* name */
1267 FALSE
, /* partial_inplace */
1269 0xfffc, /* dst_mask */
1270 FALSE
), /* pcrel_offset */
1272 /* Like R_PPC64_PLTGOT16_LO, but for instructions with a DS field. */
1273 /* FIXME: R_PPC64_PLTGOT16_LO not implemented. */
1274 HOWTO (R_PPC64_PLTGOT16_LO_DS
,/* type */
1276 1, /* size (0 = byte, 1 = short, 2 = long) */
1278 FALSE
, /* pc_relative */
1280 complain_overflow_dont
, /* complain_on_overflow */
1281 ppc64_elf_unhandled_reloc
, /* special_function */
1282 "R_PPC64_PLTGOT16_LO_DS",/* name */
1283 FALSE
, /* partial_inplace */
1285 0xfffc, /* dst_mask */
1286 FALSE
), /* pcrel_offset */
1288 /* Marker relocs for TLS. */
1291 2, /* size (0 = byte, 1 = short, 2 = long) */
1293 FALSE
, /* pc_relative */
1295 complain_overflow_dont
, /* complain_on_overflow */
1296 bfd_elf_generic_reloc
, /* special_function */
1297 "R_PPC64_TLS", /* name */
1298 FALSE
, /* partial_inplace */
1301 FALSE
), /* pcrel_offset */
1303 HOWTO (R_PPC64_TLSGD
,
1305 2, /* size (0 = byte, 1 = short, 2 = long) */
1307 FALSE
, /* pc_relative */
1309 complain_overflow_dont
, /* complain_on_overflow */
1310 bfd_elf_generic_reloc
, /* special_function */
1311 "R_PPC64_TLSGD", /* name */
1312 FALSE
, /* partial_inplace */
1315 FALSE
), /* pcrel_offset */
1317 HOWTO (R_PPC64_TLSLD
,
1319 2, /* size (0 = byte, 1 = short, 2 = long) */
1321 FALSE
, /* pc_relative */
1323 complain_overflow_dont
, /* complain_on_overflow */
1324 bfd_elf_generic_reloc
, /* special_function */
1325 "R_PPC64_TLSLD", /* name */
1326 FALSE
, /* partial_inplace */
1329 FALSE
), /* pcrel_offset */
1331 HOWTO (R_PPC64_TOCSAVE
,
1333 2, /* size (0 = byte, 1 = short, 2 = long) */
1335 FALSE
, /* pc_relative */
1337 complain_overflow_dont
, /* complain_on_overflow */
1338 bfd_elf_generic_reloc
, /* special_function */
1339 "R_PPC64_TOCSAVE", /* name */
1340 FALSE
, /* partial_inplace */
1343 FALSE
), /* pcrel_offset */
1345 /* Computes the load module index of the load module that contains the
1346 definition of its TLS sym. */
1347 HOWTO (R_PPC64_DTPMOD64
,
1349 4, /* size (0 = byte, 1 = short, 2 = long) */
1351 FALSE
, /* pc_relative */
1353 complain_overflow_dont
, /* complain_on_overflow */
1354 ppc64_elf_unhandled_reloc
, /* special_function */
1355 "R_PPC64_DTPMOD64", /* name */
1356 FALSE
, /* partial_inplace */
1358 ONES (64), /* dst_mask */
1359 FALSE
), /* pcrel_offset */
1361 /* Computes a dtv-relative displacement, the difference between the value
1362 of sym+add and the base address of the thread-local storage block that
1363 contains the definition of sym, minus 0x8000. */
1364 HOWTO (R_PPC64_DTPREL64
,
1366 4, /* size (0 = byte, 1 = short, 2 = long) */
1368 FALSE
, /* pc_relative */
1370 complain_overflow_dont
, /* complain_on_overflow */
1371 ppc64_elf_unhandled_reloc
, /* special_function */
1372 "R_PPC64_DTPREL64", /* name */
1373 FALSE
, /* partial_inplace */
1375 ONES (64), /* dst_mask */
1376 FALSE
), /* pcrel_offset */
1378 /* A 16 bit dtprel reloc. */
1379 HOWTO (R_PPC64_DTPREL16
,
1381 1, /* size (0 = byte, 1 = short, 2 = long) */
1383 FALSE
, /* pc_relative */
1385 complain_overflow_signed
, /* complain_on_overflow */
1386 ppc64_elf_unhandled_reloc
, /* special_function */
1387 "R_PPC64_DTPREL16", /* name */
1388 FALSE
, /* partial_inplace */
1390 0xffff, /* dst_mask */
1391 FALSE
), /* pcrel_offset */
1393 /* Like DTPREL16, but no overflow. */
1394 HOWTO (R_PPC64_DTPREL16_LO
,
1396 1, /* size (0 = byte, 1 = short, 2 = long) */
1398 FALSE
, /* pc_relative */
1400 complain_overflow_dont
, /* complain_on_overflow */
1401 ppc64_elf_unhandled_reloc
, /* special_function */
1402 "R_PPC64_DTPREL16_LO", /* name */
1403 FALSE
, /* partial_inplace */
1405 0xffff, /* dst_mask */
1406 FALSE
), /* pcrel_offset */
1408 /* Like DTPREL16_LO, but next higher group of 16 bits. */
1409 HOWTO (R_PPC64_DTPREL16_HI
,
1410 16, /* rightshift */
1411 1, /* size (0 = byte, 1 = short, 2 = long) */
1413 FALSE
, /* pc_relative */
1415 complain_overflow_signed
, /* complain_on_overflow */
1416 ppc64_elf_unhandled_reloc
, /* special_function */
1417 "R_PPC64_DTPREL16_HI", /* name */
1418 FALSE
, /* partial_inplace */
1420 0xffff, /* dst_mask */
1421 FALSE
), /* pcrel_offset */
1423 /* Like DTPREL16_HI, but adjust for low 16 bits. */
1424 HOWTO (R_PPC64_DTPREL16_HA
,
1425 16, /* rightshift */
1426 1, /* size (0 = byte, 1 = short, 2 = long) */
1428 FALSE
, /* pc_relative */
1430 complain_overflow_signed
, /* complain_on_overflow */
1431 ppc64_elf_unhandled_reloc
, /* special_function */
1432 "R_PPC64_DTPREL16_HA", /* name */
1433 FALSE
, /* partial_inplace */
1435 0xffff, /* dst_mask */
1436 FALSE
), /* pcrel_offset */
1438 /* Like DTPREL16_HI, but next higher group of 16 bits. */
1439 HOWTO (R_PPC64_DTPREL16_HIGHER
,
1440 32, /* rightshift */
1441 1, /* size (0 = byte, 1 = short, 2 = long) */
1443 FALSE
, /* pc_relative */
1445 complain_overflow_dont
, /* complain_on_overflow */
1446 ppc64_elf_unhandled_reloc
, /* special_function */
1447 "R_PPC64_DTPREL16_HIGHER", /* name */
1448 FALSE
, /* partial_inplace */
1450 0xffff, /* dst_mask */
1451 FALSE
), /* pcrel_offset */
1453 /* Like DTPREL16_HIGHER, but adjust for low 16 bits. */
1454 HOWTO (R_PPC64_DTPREL16_HIGHERA
,
1455 32, /* rightshift */
1456 1, /* size (0 = byte, 1 = short, 2 = long) */
1458 FALSE
, /* pc_relative */
1460 complain_overflow_dont
, /* complain_on_overflow */
1461 ppc64_elf_unhandled_reloc
, /* special_function */
1462 "R_PPC64_DTPREL16_HIGHERA", /* name */
1463 FALSE
, /* partial_inplace */
1465 0xffff, /* dst_mask */
1466 FALSE
), /* pcrel_offset */
1468 /* Like DTPREL16_HIGHER, but next higher group of 16 bits. */
1469 HOWTO (R_PPC64_DTPREL16_HIGHEST
,
1470 48, /* rightshift */
1471 1, /* size (0 = byte, 1 = short, 2 = long) */
1473 FALSE
, /* pc_relative */
1475 complain_overflow_dont
, /* complain_on_overflow */
1476 ppc64_elf_unhandled_reloc
, /* special_function */
1477 "R_PPC64_DTPREL16_HIGHEST", /* name */
1478 FALSE
, /* partial_inplace */
1480 0xffff, /* dst_mask */
1481 FALSE
), /* pcrel_offset */
1483 /* Like DTPREL16_HIGHEST, but adjust for low 16 bits. */
1484 HOWTO (R_PPC64_DTPREL16_HIGHESTA
,
1485 48, /* rightshift */
1486 1, /* size (0 = byte, 1 = short, 2 = long) */
1488 FALSE
, /* pc_relative */
1490 complain_overflow_dont
, /* complain_on_overflow */
1491 ppc64_elf_unhandled_reloc
, /* special_function */
1492 "R_PPC64_DTPREL16_HIGHESTA", /* name */
1493 FALSE
, /* partial_inplace */
1495 0xffff, /* dst_mask */
1496 FALSE
), /* pcrel_offset */
1498 /* Like DTPREL16, but for insns with a DS field. */
1499 HOWTO (R_PPC64_DTPREL16_DS
,
1501 1, /* size (0 = byte, 1 = short, 2 = long) */
1503 FALSE
, /* pc_relative */
1505 complain_overflow_signed
, /* complain_on_overflow */
1506 ppc64_elf_unhandled_reloc
, /* special_function */
1507 "R_PPC64_DTPREL16_DS", /* name */
1508 FALSE
, /* partial_inplace */
1510 0xfffc, /* dst_mask */
1511 FALSE
), /* pcrel_offset */
1513 /* Like DTPREL16_DS, but no overflow. */
1514 HOWTO (R_PPC64_DTPREL16_LO_DS
,
1516 1, /* size (0 = byte, 1 = short, 2 = long) */
1518 FALSE
, /* pc_relative */
1520 complain_overflow_dont
, /* complain_on_overflow */
1521 ppc64_elf_unhandled_reloc
, /* special_function */
1522 "R_PPC64_DTPREL16_LO_DS", /* name */
1523 FALSE
, /* partial_inplace */
1525 0xfffc, /* dst_mask */
1526 FALSE
), /* pcrel_offset */
1528 /* Computes a tp-relative displacement, the difference between the value of
1529 sym+add and the value of the thread pointer (r13). */
1530 HOWTO (R_PPC64_TPREL64
,
1532 4, /* size (0 = byte, 1 = short, 2 = long) */
1534 FALSE
, /* pc_relative */
1536 complain_overflow_dont
, /* complain_on_overflow */
1537 ppc64_elf_unhandled_reloc
, /* special_function */
1538 "R_PPC64_TPREL64", /* name */
1539 FALSE
, /* partial_inplace */
1541 ONES (64), /* dst_mask */
1542 FALSE
), /* pcrel_offset */
1544 /* A 16 bit tprel reloc. */
1545 HOWTO (R_PPC64_TPREL16
,
1547 1, /* size (0 = byte, 1 = short, 2 = long) */
1549 FALSE
, /* pc_relative */
1551 complain_overflow_signed
, /* complain_on_overflow */
1552 ppc64_elf_unhandled_reloc
, /* special_function */
1553 "R_PPC64_TPREL16", /* name */
1554 FALSE
, /* partial_inplace */
1556 0xffff, /* dst_mask */
1557 FALSE
), /* pcrel_offset */
1559 /* Like TPREL16, but no overflow. */
1560 HOWTO (R_PPC64_TPREL16_LO
,
1562 1, /* size (0 = byte, 1 = short, 2 = long) */
1564 FALSE
, /* pc_relative */
1566 complain_overflow_dont
, /* complain_on_overflow */
1567 ppc64_elf_unhandled_reloc
, /* special_function */
1568 "R_PPC64_TPREL16_LO", /* name */
1569 FALSE
, /* partial_inplace */
1571 0xffff, /* dst_mask */
1572 FALSE
), /* pcrel_offset */
1574 /* Like TPREL16_LO, but next higher group of 16 bits. */
1575 HOWTO (R_PPC64_TPREL16_HI
,
1576 16, /* rightshift */
1577 1, /* size (0 = byte, 1 = short, 2 = long) */
1579 FALSE
, /* pc_relative */
1581 complain_overflow_signed
, /* complain_on_overflow */
1582 ppc64_elf_unhandled_reloc
, /* special_function */
1583 "R_PPC64_TPREL16_HI", /* name */
1584 FALSE
, /* partial_inplace */
1586 0xffff, /* dst_mask */
1587 FALSE
), /* pcrel_offset */
1589 /* Like TPREL16_HI, but adjust for low 16 bits. */
1590 HOWTO (R_PPC64_TPREL16_HA
,
1591 16, /* rightshift */
1592 1, /* size (0 = byte, 1 = short, 2 = long) */
1594 FALSE
, /* pc_relative */
1596 complain_overflow_signed
, /* complain_on_overflow */
1597 ppc64_elf_unhandled_reloc
, /* special_function */
1598 "R_PPC64_TPREL16_HA", /* name */
1599 FALSE
, /* partial_inplace */
1601 0xffff, /* dst_mask */
1602 FALSE
), /* pcrel_offset */
1604 /* Like TPREL16_HI, but next higher group of 16 bits. */
1605 HOWTO (R_PPC64_TPREL16_HIGHER
,
1606 32, /* rightshift */
1607 1, /* size (0 = byte, 1 = short, 2 = long) */
1609 FALSE
, /* pc_relative */
1611 complain_overflow_dont
, /* complain_on_overflow */
1612 ppc64_elf_unhandled_reloc
, /* special_function */
1613 "R_PPC64_TPREL16_HIGHER", /* name */
1614 FALSE
, /* partial_inplace */
1616 0xffff, /* dst_mask */
1617 FALSE
), /* pcrel_offset */
1619 /* Like TPREL16_HIGHER, but adjust for low 16 bits. */
1620 HOWTO (R_PPC64_TPREL16_HIGHERA
,
1621 32, /* rightshift */
1622 1, /* size (0 = byte, 1 = short, 2 = long) */
1624 FALSE
, /* pc_relative */
1626 complain_overflow_dont
, /* complain_on_overflow */
1627 ppc64_elf_unhandled_reloc
, /* special_function */
1628 "R_PPC64_TPREL16_HIGHERA", /* name */
1629 FALSE
, /* partial_inplace */
1631 0xffff, /* dst_mask */
1632 FALSE
), /* pcrel_offset */
1634 /* Like TPREL16_HIGHER, but next higher group of 16 bits. */
1635 HOWTO (R_PPC64_TPREL16_HIGHEST
,
1636 48, /* rightshift */
1637 1, /* size (0 = byte, 1 = short, 2 = long) */
1639 FALSE
, /* pc_relative */
1641 complain_overflow_dont
, /* complain_on_overflow */
1642 ppc64_elf_unhandled_reloc
, /* special_function */
1643 "R_PPC64_TPREL16_HIGHEST", /* name */
1644 FALSE
, /* partial_inplace */
1646 0xffff, /* dst_mask */
1647 FALSE
), /* pcrel_offset */
1649 /* Like TPREL16_HIGHEST, but adjust for low 16 bits. */
1650 HOWTO (R_PPC64_TPREL16_HIGHESTA
,
1651 48, /* rightshift */
1652 1, /* size (0 = byte, 1 = short, 2 = long) */
1654 FALSE
, /* pc_relative */
1656 complain_overflow_dont
, /* complain_on_overflow */
1657 ppc64_elf_unhandled_reloc
, /* special_function */
1658 "R_PPC64_TPREL16_HIGHESTA", /* name */
1659 FALSE
, /* partial_inplace */
1661 0xffff, /* dst_mask */
1662 FALSE
), /* pcrel_offset */
1664 /* Like TPREL16, but for insns with a DS field. */
1665 HOWTO (R_PPC64_TPREL16_DS
,
1667 1, /* size (0 = byte, 1 = short, 2 = long) */
1669 FALSE
, /* pc_relative */
1671 complain_overflow_signed
, /* complain_on_overflow */
1672 ppc64_elf_unhandled_reloc
, /* special_function */
1673 "R_PPC64_TPREL16_DS", /* name */
1674 FALSE
, /* partial_inplace */
1676 0xfffc, /* dst_mask */
1677 FALSE
), /* pcrel_offset */
1679 /* Like TPREL16_DS, but no overflow. */
1680 HOWTO (R_PPC64_TPREL16_LO_DS
,
1682 1, /* size (0 = byte, 1 = short, 2 = long) */
1684 FALSE
, /* pc_relative */
1686 complain_overflow_dont
, /* complain_on_overflow */
1687 ppc64_elf_unhandled_reloc
, /* special_function */
1688 "R_PPC64_TPREL16_LO_DS", /* name */
1689 FALSE
, /* partial_inplace */
1691 0xfffc, /* dst_mask */
1692 FALSE
), /* pcrel_offset */
1694 /* Allocates two contiguous entries in the GOT to hold a tls_index structure,
1695 with values (sym+add)@dtpmod and (sym+add)@dtprel, and computes the offset
1696 to the first entry relative to the TOC base (r2). */
1697 HOWTO (R_PPC64_GOT_TLSGD16
,
1699 1, /* size (0 = byte, 1 = short, 2 = long) */
1701 FALSE
, /* pc_relative */
1703 complain_overflow_signed
, /* complain_on_overflow */
1704 ppc64_elf_unhandled_reloc
, /* special_function */
1705 "R_PPC64_GOT_TLSGD16", /* name */
1706 FALSE
, /* partial_inplace */
1708 0xffff, /* dst_mask */
1709 FALSE
), /* pcrel_offset */
1711 /* Like GOT_TLSGD16, but no overflow. */
1712 HOWTO (R_PPC64_GOT_TLSGD16_LO
,
1714 1, /* size (0 = byte, 1 = short, 2 = long) */
1716 FALSE
, /* pc_relative */
1718 complain_overflow_dont
, /* complain_on_overflow */
1719 ppc64_elf_unhandled_reloc
, /* special_function */
1720 "R_PPC64_GOT_TLSGD16_LO", /* name */
1721 FALSE
, /* partial_inplace */
1723 0xffff, /* dst_mask */
1724 FALSE
), /* pcrel_offset */
1726 /* Like GOT_TLSGD16_LO, but next higher group of 16 bits. */
1727 HOWTO (R_PPC64_GOT_TLSGD16_HI
,
1728 16, /* rightshift */
1729 1, /* size (0 = byte, 1 = short, 2 = long) */
1731 FALSE
, /* pc_relative */
1733 complain_overflow_signed
, /* complain_on_overflow */
1734 ppc64_elf_unhandled_reloc
, /* special_function */
1735 "R_PPC64_GOT_TLSGD16_HI", /* name */
1736 FALSE
, /* partial_inplace */
1738 0xffff, /* dst_mask */
1739 FALSE
), /* pcrel_offset */
1741 /* Like GOT_TLSGD16_HI, but adjust for low 16 bits. */
1742 HOWTO (R_PPC64_GOT_TLSGD16_HA
,
1743 16, /* rightshift */
1744 1, /* size (0 = byte, 1 = short, 2 = long) */
1746 FALSE
, /* pc_relative */
1748 complain_overflow_signed
, /* complain_on_overflow */
1749 ppc64_elf_unhandled_reloc
, /* special_function */
1750 "R_PPC64_GOT_TLSGD16_HA", /* name */
1751 FALSE
, /* partial_inplace */
1753 0xffff, /* dst_mask */
1754 FALSE
), /* pcrel_offset */
1756 /* Allocates two contiguous entries in the GOT to hold a tls_index structure,
1757 with values (sym+add)@dtpmod and zero, and computes the offset to the
1758 first entry relative to the TOC base (r2). */
1759 HOWTO (R_PPC64_GOT_TLSLD16
,
1761 1, /* size (0 = byte, 1 = short, 2 = long) */
1763 FALSE
, /* pc_relative */
1765 complain_overflow_signed
, /* complain_on_overflow */
1766 ppc64_elf_unhandled_reloc
, /* special_function */
1767 "R_PPC64_GOT_TLSLD16", /* name */
1768 FALSE
, /* partial_inplace */
1770 0xffff, /* dst_mask */
1771 FALSE
), /* pcrel_offset */
1773 /* Like GOT_TLSLD16, but no overflow. */
1774 HOWTO (R_PPC64_GOT_TLSLD16_LO
,
1776 1, /* size (0 = byte, 1 = short, 2 = long) */
1778 FALSE
, /* pc_relative */
1780 complain_overflow_dont
, /* complain_on_overflow */
1781 ppc64_elf_unhandled_reloc
, /* special_function */
1782 "R_PPC64_GOT_TLSLD16_LO", /* name */
1783 FALSE
, /* partial_inplace */
1785 0xffff, /* dst_mask */
1786 FALSE
), /* pcrel_offset */
1788 /* Like GOT_TLSLD16_LO, but next higher group of 16 bits. */
1789 HOWTO (R_PPC64_GOT_TLSLD16_HI
,
1790 16, /* rightshift */
1791 1, /* size (0 = byte, 1 = short, 2 = long) */
1793 FALSE
, /* pc_relative */
1795 complain_overflow_signed
, /* complain_on_overflow */
1796 ppc64_elf_unhandled_reloc
, /* special_function */
1797 "R_PPC64_GOT_TLSLD16_HI", /* name */
1798 FALSE
, /* partial_inplace */
1800 0xffff, /* dst_mask */
1801 FALSE
), /* pcrel_offset */
1803 /* Like GOT_TLSLD16_HI, but adjust for low 16 bits. */
1804 HOWTO (R_PPC64_GOT_TLSLD16_HA
,
1805 16, /* rightshift */
1806 1, /* size (0 = byte, 1 = short, 2 = long) */
1808 FALSE
, /* pc_relative */
1810 complain_overflow_signed
, /* complain_on_overflow */
1811 ppc64_elf_unhandled_reloc
, /* special_function */
1812 "R_PPC64_GOT_TLSLD16_HA", /* name */
1813 FALSE
, /* partial_inplace */
1815 0xffff, /* dst_mask */
1816 FALSE
), /* pcrel_offset */
1818 /* Allocates an entry in the GOT with value (sym+add)@dtprel, and computes
1819 the offset to the entry relative to the TOC base (r2). */
1820 HOWTO (R_PPC64_GOT_DTPREL16_DS
,
1822 1, /* size (0 = byte, 1 = short, 2 = long) */
1824 FALSE
, /* pc_relative */
1826 complain_overflow_signed
, /* complain_on_overflow */
1827 ppc64_elf_unhandled_reloc
, /* special_function */
1828 "R_PPC64_GOT_DTPREL16_DS", /* name */
1829 FALSE
, /* partial_inplace */
1831 0xfffc, /* dst_mask */
1832 FALSE
), /* pcrel_offset */
1834 /* Like GOT_DTPREL16_DS, but no overflow. */
1835 HOWTO (R_PPC64_GOT_DTPREL16_LO_DS
,
1837 1, /* size (0 = byte, 1 = short, 2 = long) */
1839 FALSE
, /* pc_relative */
1841 complain_overflow_dont
, /* complain_on_overflow */
1842 ppc64_elf_unhandled_reloc
, /* special_function */
1843 "R_PPC64_GOT_DTPREL16_LO_DS", /* name */
1844 FALSE
, /* partial_inplace */
1846 0xfffc, /* dst_mask */
1847 FALSE
), /* pcrel_offset */
1849 /* Like GOT_DTPREL16_LO_DS, but next higher group of 16 bits. */
1850 HOWTO (R_PPC64_GOT_DTPREL16_HI
,
1851 16, /* rightshift */
1852 1, /* size (0 = byte, 1 = short, 2 = long) */
1854 FALSE
, /* pc_relative */
1856 complain_overflow_signed
, /* complain_on_overflow */
1857 ppc64_elf_unhandled_reloc
, /* special_function */
1858 "R_PPC64_GOT_DTPREL16_HI", /* name */
1859 FALSE
, /* partial_inplace */
1861 0xffff, /* dst_mask */
1862 FALSE
), /* pcrel_offset */
1864 /* Like GOT_DTPREL16_HI, but adjust for low 16 bits. */
1865 HOWTO (R_PPC64_GOT_DTPREL16_HA
,
1866 16, /* rightshift */
1867 1, /* size (0 = byte, 1 = short, 2 = long) */
1869 FALSE
, /* pc_relative */
1871 complain_overflow_signed
, /* complain_on_overflow */
1872 ppc64_elf_unhandled_reloc
, /* special_function */
1873 "R_PPC64_GOT_DTPREL16_HA", /* name */
1874 FALSE
, /* partial_inplace */
1876 0xffff, /* dst_mask */
1877 FALSE
), /* pcrel_offset */
1879 /* Allocates an entry in the GOT with value (sym+add)@tprel, and computes the
1880 offset to the entry relative to the TOC base (r2). */
1881 HOWTO (R_PPC64_GOT_TPREL16_DS
,
1883 1, /* size (0 = byte, 1 = short, 2 = long) */
1885 FALSE
, /* pc_relative */
1887 complain_overflow_signed
, /* complain_on_overflow */
1888 ppc64_elf_unhandled_reloc
, /* special_function */
1889 "R_PPC64_GOT_TPREL16_DS", /* name */
1890 FALSE
, /* partial_inplace */
1892 0xfffc, /* dst_mask */
1893 FALSE
), /* pcrel_offset */
1895 /* Like GOT_TPREL16_DS, but no overflow. */
1896 HOWTO (R_PPC64_GOT_TPREL16_LO_DS
,
1898 1, /* size (0 = byte, 1 = short, 2 = long) */
1900 FALSE
, /* pc_relative */
1902 complain_overflow_dont
, /* complain_on_overflow */
1903 ppc64_elf_unhandled_reloc
, /* special_function */
1904 "R_PPC64_GOT_TPREL16_LO_DS", /* name */
1905 FALSE
, /* partial_inplace */
1907 0xfffc, /* dst_mask */
1908 FALSE
), /* pcrel_offset */
1910 /* Like GOT_TPREL16_LO_DS, but next higher group of 16 bits. */
1911 HOWTO (R_PPC64_GOT_TPREL16_HI
,
1912 16, /* rightshift */
1913 1, /* size (0 = byte, 1 = short, 2 = long) */
1915 FALSE
, /* pc_relative */
1917 complain_overflow_signed
, /* complain_on_overflow */
1918 ppc64_elf_unhandled_reloc
, /* special_function */
1919 "R_PPC64_GOT_TPREL16_HI", /* name */
1920 FALSE
, /* partial_inplace */
1922 0xffff, /* dst_mask */
1923 FALSE
), /* pcrel_offset */
1925 /* Like GOT_TPREL16_HI, but adjust for low 16 bits. */
1926 HOWTO (R_PPC64_GOT_TPREL16_HA
,
1927 16, /* rightshift */
1928 1, /* size (0 = byte, 1 = short, 2 = long) */
1930 FALSE
, /* pc_relative */
1932 complain_overflow_signed
, /* complain_on_overflow */
1933 ppc64_elf_unhandled_reloc
, /* special_function */
1934 "R_PPC64_GOT_TPREL16_HA", /* name */
1935 FALSE
, /* partial_inplace */
1937 0xffff, /* dst_mask */
1938 FALSE
), /* pcrel_offset */
1940 HOWTO (R_PPC64_JMP_IREL
, /* type */
1942 0, /* size (0=byte, 1=short, 2=long, 4=64 bits) */
1944 FALSE
, /* pc_relative */
1946 complain_overflow_dont
, /* complain_on_overflow */
1947 ppc64_elf_unhandled_reloc
, /* special_function */
1948 "R_PPC64_JMP_IREL", /* name */
1949 FALSE
, /* partial_inplace */
1952 FALSE
), /* pcrel_offset */
1954 HOWTO (R_PPC64_IRELATIVE
, /* type */
1956 4, /* size (0=byte, 1=short, 2=long, 4=64 bits) */
1958 FALSE
, /* pc_relative */
1960 complain_overflow_dont
, /* complain_on_overflow */
1961 bfd_elf_generic_reloc
, /* special_function */
1962 "R_PPC64_IRELATIVE", /* name */
1963 FALSE
, /* partial_inplace */
1965 ONES (64), /* dst_mask */
1966 FALSE
), /* pcrel_offset */
1968 /* A 16 bit relative relocation. */
1969 HOWTO (R_PPC64_REL16
, /* type */
1971 1, /* size (0 = byte, 1 = short, 2 = long) */
1973 TRUE
, /* pc_relative */
1975 complain_overflow_signed
, /* complain_on_overflow */
1976 bfd_elf_generic_reloc
, /* special_function */
1977 "R_PPC64_REL16", /* name */
1978 FALSE
, /* partial_inplace */
1980 0xffff, /* dst_mask */
1981 TRUE
), /* pcrel_offset */
1983 /* A 16 bit relative relocation without overflow. */
1984 HOWTO (R_PPC64_REL16_LO
, /* type */
1986 1, /* size (0 = byte, 1 = short, 2 = long) */
1988 TRUE
, /* pc_relative */
1990 complain_overflow_dont
,/* complain_on_overflow */
1991 bfd_elf_generic_reloc
, /* special_function */
1992 "R_PPC64_REL16_LO", /* name */
1993 FALSE
, /* partial_inplace */
1995 0xffff, /* dst_mask */
1996 TRUE
), /* pcrel_offset */
1998 /* The high order 16 bits of a relative address. */
1999 HOWTO (R_PPC64_REL16_HI
, /* type */
2000 16, /* rightshift */
2001 1, /* size (0 = byte, 1 = short, 2 = long) */
2003 TRUE
, /* pc_relative */
2005 complain_overflow_signed
, /* complain_on_overflow */
2006 bfd_elf_generic_reloc
, /* special_function */
2007 "R_PPC64_REL16_HI", /* name */
2008 FALSE
, /* partial_inplace */
2010 0xffff, /* dst_mask */
2011 TRUE
), /* pcrel_offset */
2013 /* The high order 16 bits of a relative address, plus 1 if the contents of
2014 the low 16 bits, treated as a signed number, is negative. */
2015 HOWTO (R_PPC64_REL16_HA
, /* type */
2016 16, /* rightshift */
2017 1, /* size (0 = byte, 1 = short, 2 = long) */
2019 TRUE
, /* pc_relative */
2021 complain_overflow_signed
, /* complain_on_overflow */
2022 ppc64_elf_ha_reloc
, /* special_function */
2023 "R_PPC64_REL16_HA", /* name */
2024 FALSE
, /* partial_inplace */
2026 0xffff, /* dst_mask */
2027 TRUE
), /* pcrel_offset */
2029 /* Like R_PPC64_REL16_HA but for split field in addpcis. */
2030 HOWTO (R_PPC64_REL16DX_HA
, /* type */
2031 16, /* rightshift */
2032 2, /* size (0 = byte, 1 = short, 2 = long) */
2034 TRUE
, /* pc_relative */
2036 complain_overflow_signed
, /* complain_on_overflow */
2037 ppc64_elf_ha_reloc
, /* special_function */
2038 "R_PPC64_REL16DX_HA", /* name */
2039 FALSE
, /* partial_inplace */
2041 0x1fffc1, /* dst_mask */
2042 TRUE
), /* pcrel_offset */
2044 /* Like R_PPC64_ADDR16_HI, but no overflow. */
2045 HOWTO (R_PPC64_ADDR16_HIGH
, /* type */
2046 16, /* rightshift */
2047 1, /* size (0 = byte, 1 = short, 2 = long) */
2049 FALSE
, /* pc_relative */
2051 complain_overflow_dont
, /* complain_on_overflow */
2052 bfd_elf_generic_reloc
, /* special_function */
2053 "R_PPC64_ADDR16_HIGH", /* name */
2054 FALSE
, /* partial_inplace */
2056 0xffff, /* dst_mask */
2057 FALSE
), /* pcrel_offset */
2059 /* Like R_PPC64_ADDR16_HA, but no overflow. */
2060 HOWTO (R_PPC64_ADDR16_HIGHA
, /* type */
2061 16, /* rightshift */
2062 1, /* size (0 = byte, 1 = short, 2 = long) */
2064 FALSE
, /* pc_relative */
2066 complain_overflow_dont
, /* complain_on_overflow */
2067 ppc64_elf_ha_reloc
, /* special_function */
2068 "R_PPC64_ADDR16_HIGHA", /* name */
2069 FALSE
, /* partial_inplace */
2071 0xffff, /* dst_mask */
2072 FALSE
), /* pcrel_offset */
2074 /* Like R_PPC64_DTPREL16_HI, but no overflow. */
2075 HOWTO (R_PPC64_DTPREL16_HIGH
,
2076 16, /* rightshift */
2077 1, /* size (0 = byte, 1 = short, 2 = long) */
2079 FALSE
, /* pc_relative */
2081 complain_overflow_dont
, /* complain_on_overflow */
2082 ppc64_elf_unhandled_reloc
, /* special_function */
2083 "R_PPC64_DTPREL16_HIGH", /* name */
2084 FALSE
, /* partial_inplace */
2086 0xffff, /* dst_mask */
2087 FALSE
), /* pcrel_offset */
2089 /* Like R_PPC64_DTPREL16_HA, but no overflow. */
2090 HOWTO (R_PPC64_DTPREL16_HIGHA
,
2091 16, /* rightshift */
2092 1, /* size (0 = byte, 1 = short, 2 = long) */
2094 FALSE
, /* pc_relative */
2096 complain_overflow_dont
, /* complain_on_overflow */
2097 ppc64_elf_unhandled_reloc
, /* special_function */
2098 "R_PPC64_DTPREL16_HIGHA", /* name */
2099 FALSE
, /* partial_inplace */
2101 0xffff, /* dst_mask */
2102 FALSE
), /* pcrel_offset */
2104 /* Like R_PPC64_TPREL16_HI, but no overflow. */
2105 HOWTO (R_PPC64_TPREL16_HIGH
,
2106 16, /* rightshift */
2107 1, /* size (0 = byte, 1 = short, 2 = long) */
2109 FALSE
, /* pc_relative */
2111 complain_overflow_dont
, /* complain_on_overflow */
2112 ppc64_elf_unhandled_reloc
, /* special_function */
2113 "R_PPC64_TPREL16_HIGH", /* name */
2114 FALSE
, /* partial_inplace */
2116 0xffff, /* dst_mask */
2117 FALSE
), /* pcrel_offset */
2119 /* Like R_PPC64_TPREL16_HA, but no overflow. */
2120 HOWTO (R_PPC64_TPREL16_HIGHA
,
2121 16, /* rightshift */
2122 1, /* size (0 = byte, 1 = short, 2 = long) */
2124 FALSE
, /* pc_relative */
2126 complain_overflow_dont
, /* complain_on_overflow */
2127 ppc64_elf_unhandled_reloc
, /* special_function */
2128 "R_PPC64_TPREL16_HIGHA", /* name */
2129 FALSE
, /* partial_inplace */
2131 0xffff, /* dst_mask */
2132 FALSE
), /* pcrel_offset */
2134 /* Marker reloc on ELFv2 large-model function entry. */
2135 HOWTO (R_PPC64_ENTRY
,
2137 2, /* size (0 = byte, 1 = short, 2 = long) */
2139 FALSE
, /* pc_relative */
2141 complain_overflow_dont
, /* complain_on_overflow */
2142 bfd_elf_generic_reloc
, /* special_function */
2143 "R_PPC64_ENTRY", /* name */
2144 FALSE
, /* partial_inplace */
2147 FALSE
), /* pcrel_offset */
2149 /* Like ADDR64, but use local entry point of function. */
2150 HOWTO (R_PPC64_ADDR64_LOCAL
, /* type */
2152 4, /* size (0=byte, 1=short, 2=long, 4=64 bits) */
2154 FALSE
, /* pc_relative */
2156 complain_overflow_dont
, /* complain_on_overflow */
2157 bfd_elf_generic_reloc
, /* special_function */
2158 "R_PPC64_ADDR64_LOCAL", /* name */
2159 FALSE
, /* partial_inplace */
2161 ONES (64), /* dst_mask */
2162 FALSE
), /* pcrel_offset */
2164 /* GNU extension to record C++ vtable hierarchy. */
2165 HOWTO (R_PPC64_GNU_VTINHERIT
, /* type */
2167 0, /* size (0 = byte, 1 = short, 2 = long) */
2169 FALSE
, /* pc_relative */
2171 complain_overflow_dont
, /* complain_on_overflow */
2172 NULL
, /* special_function */
2173 "R_PPC64_GNU_VTINHERIT", /* name */
2174 FALSE
, /* partial_inplace */
2177 FALSE
), /* pcrel_offset */
2179 /* GNU extension to record C++ vtable member usage. */
2180 HOWTO (R_PPC64_GNU_VTENTRY
, /* type */
2182 0, /* size (0 = byte, 1 = short, 2 = long) */
2184 FALSE
, /* pc_relative */
2186 complain_overflow_dont
, /* complain_on_overflow */
2187 NULL
, /* special_function */
2188 "R_PPC64_GNU_VTENTRY", /* name */
2189 FALSE
, /* partial_inplace */
2192 FALSE
), /* pcrel_offset */
2196 /* Initialize the ppc64_elf_howto_table, so that linear accesses can
2200 ppc_howto_init (void)
2202 unsigned int i
, type
;
2204 for (i
= 0; i
< ARRAY_SIZE (ppc64_elf_howto_raw
); i
++)
2206 type
= ppc64_elf_howto_raw
[i
].type
;
2207 BFD_ASSERT (type
< ARRAY_SIZE (ppc64_elf_howto_table
));
2208 ppc64_elf_howto_table
[type
] = &ppc64_elf_howto_raw
[i
];
2212 static reloc_howto_type
*
2213 ppc64_elf_reloc_type_lookup (bfd
*abfd ATTRIBUTE_UNUSED
,
2214 bfd_reloc_code_real_type code
)
2216 enum elf_ppc64_reloc_type r
= R_PPC64_NONE
;
2218 if (!ppc64_elf_howto_table
[R_PPC64_ADDR32
])
2219 /* Initialize howto table if needed. */
2227 case BFD_RELOC_NONE
: r
= R_PPC64_NONE
;
2229 case BFD_RELOC_32
: r
= R_PPC64_ADDR32
;
2231 case BFD_RELOC_PPC_BA26
: r
= R_PPC64_ADDR24
;
2233 case BFD_RELOC_16
: r
= R_PPC64_ADDR16
;
2235 case BFD_RELOC_LO16
: r
= R_PPC64_ADDR16_LO
;
2237 case BFD_RELOC_HI16
: r
= R_PPC64_ADDR16_HI
;
2239 case BFD_RELOC_PPC64_ADDR16_HIGH
: r
= R_PPC64_ADDR16_HIGH
;
2241 case BFD_RELOC_HI16_S
: r
= R_PPC64_ADDR16_HA
;
2243 case BFD_RELOC_PPC64_ADDR16_HIGHA
: r
= R_PPC64_ADDR16_HIGHA
;
2245 case BFD_RELOC_PPC_BA16
: r
= R_PPC64_ADDR14
;
2247 case BFD_RELOC_PPC_BA16_BRTAKEN
: r
= R_PPC64_ADDR14_BRTAKEN
;
2249 case BFD_RELOC_PPC_BA16_BRNTAKEN
: r
= R_PPC64_ADDR14_BRNTAKEN
;
2251 case BFD_RELOC_PPC_B26
: r
= R_PPC64_REL24
;
2253 case BFD_RELOC_PPC_B16
: r
= R_PPC64_REL14
;
2255 case BFD_RELOC_PPC_B16_BRTAKEN
: r
= R_PPC64_REL14_BRTAKEN
;
2257 case BFD_RELOC_PPC_B16_BRNTAKEN
: r
= R_PPC64_REL14_BRNTAKEN
;
2259 case BFD_RELOC_16_GOTOFF
: r
= R_PPC64_GOT16
;
2261 case BFD_RELOC_LO16_GOTOFF
: r
= R_PPC64_GOT16_LO
;
2263 case BFD_RELOC_HI16_GOTOFF
: r
= R_PPC64_GOT16_HI
;
2265 case BFD_RELOC_HI16_S_GOTOFF
: r
= R_PPC64_GOT16_HA
;
2267 case BFD_RELOC_PPC_COPY
: r
= R_PPC64_COPY
;
2269 case BFD_RELOC_PPC_GLOB_DAT
: r
= R_PPC64_GLOB_DAT
;
2271 case BFD_RELOC_32_PCREL
: r
= R_PPC64_REL32
;
2273 case BFD_RELOC_32_PLTOFF
: r
= R_PPC64_PLT32
;
2275 case BFD_RELOC_32_PLT_PCREL
: r
= R_PPC64_PLTREL32
;
2277 case BFD_RELOC_LO16_PLTOFF
: r
= R_PPC64_PLT16_LO
;
2279 case BFD_RELOC_HI16_PLTOFF
: r
= R_PPC64_PLT16_HI
;
2281 case BFD_RELOC_HI16_S_PLTOFF
: r
= R_PPC64_PLT16_HA
;
2283 case BFD_RELOC_16_BASEREL
: r
= R_PPC64_SECTOFF
;
2285 case BFD_RELOC_LO16_BASEREL
: r
= R_PPC64_SECTOFF_LO
;
2287 case BFD_RELOC_HI16_BASEREL
: r
= R_PPC64_SECTOFF_HI
;
2289 case BFD_RELOC_HI16_S_BASEREL
: r
= R_PPC64_SECTOFF_HA
;
2291 case BFD_RELOC_CTOR
: r
= R_PPC64_ADDR64
;
2293 case BFD_RELOC_64
: r
= R_PPC64_ADDR64
;
2295 case BFD_RELOC_PPC64_HIGHER
: r
= R_PPC64_ADDR16_HIGHER
;
2297 case BFD_RELOC_PPC64_HIGHER_S
: r
= R_PPC64_ADDR16_HIGHERA
;
2299 case BFD_RELOC_PPC64_HIGHEST
: r
= R_PPC64_ADDR16_HIGHEST
;
2301 case BFD_RELOC_PPC64_HIGHEST_S
: r
= R_PPC64_ADDR16_HIGHESTA
;
2303 case BFD_RELOC_64_PCREL
: r
= R_PPC64_REL64
;
2305 case BFD_RELOC_64_PLTOFF
: r
= R_PPC64_PLT64
;
2307 case BFD_RELOC_64_PLT_PCREL
: r
= R_PPC64_PLTREL64
;
2309 case BFD_RELOC_PPC_TOC16
: r
= R_PPC64_TOC16
;
2311 case BFD_RELOC_PPC64_TOC16_LO
: r
= R_PPC64_TOC16_LO
;
2313 case BFD_RELOC_PPC64_TOC16_HI
: r
= R_PPC64_TOC16_HI
;
2315 case BFD_RELOC_PPC64_TOC16_HA
: r
= R_PPC64_TOC16_HA
;
2317 case BFD_RELOC_PPC64_TOC
: r
= R_PPC64_TOC
;
2319 case BFD_RELOC_PPC64_PLTGOT16
: r
= R_PPC64_PLTGOT16
;
2321 case BFD_RELOC_PPC64_PLTGOT16_LO
: r
= R_PPC64_PLTGOT16_LO
;
2323 case BFD_RELOC_PPC64_PLTGOT16_HI
: r
= R_PPC64_PLTGOT16_HI
;
2325 case BFD_RELOC_PPC64_PLTGOT16_HA
: r
= R_PPC64_PLTGOT16_HA
;
2327 case BFD_RELOC_PPC64_ADDR16_DS
: r
= R_PPC64_ADDR16_DS
;
2329 case BFD_RELOC_PPC64_ADDR16_LO_DS
: r
= R_PPC64_ADDR16_LO_DS
;
2331 case BFD_RELOC_PPC64_GOT16_DS
: r
= R_PPC64_GOT16_DS
;
2333 case BFD_RELOC_PPC64_GOT16_LO_DS
: r
= R_PPC64_GOT16_LO_DS
;
2335 case BFD_RELOC_PPC64_PLT16_LO_DS
: r
= R_PPC64_PLT16_LO_DS
;
2337 case BFD_RELOC_PPC64_SECTOFF_DS
: r
= R_PPC64_SECTOFF_DS
;
2339 case BFD_RELOC_PPC64_SECTOFF_LO_DS
: r
= R_PPC64_SECTOFF_LO_DS
;
2341 case BFD_RELOC_PPC64_TOC16_DS
: r
= R_PPC64_TOC16_DS
;
2343 case BFD_RELOC_PPC64_TOC16_LO_DS
: r
= R_PPC64_TOC16_LO_DS
;
2345 case BFD_RELOC_PPC64_PLTGOT16_DS
: r
= R_PPC64_PLTGOT16_DS
;
2347 case BFD_RELOC_PPC64_PLTGOT16_LO_DS
: r
= R_PPC64_PLTGOT16_LO_DS
;
2349 case BFD_RELOC_PPC_TLS
: r
= R_PPC64_TLS
;
2351 case BFD_RELOC_PPC_TLSGD
: r
= R_PPC64_TLSGD
;
2353 case BFD_RELOC_PPC_TLSLD
: r
= R_PPC64_TLSLD
;
2355 case BFD_RELOC_PPC_DTPMOD
: r
= R_PPC64_DTPMOD64
;
2357 case BFD_RELOC_PPC_TPREL16
: r
= R_PPC64_TPREL16
;
2359 case BFD_RELOC_PPC_TPREL16_LO
: r
= R_PPC64_TPREL16_LO
;
2361 case BFD_RELOC_PPC_TPREL16_HI
: r
= R_PPC64_TPREL16_HI
;
2363 case BFD_RELOC_PPC64_TPREL16_HIGH
: r
= R_PPC64_TPREL16_HIGH
;
2365 case BFD_RELOC_PPC_TPREL16_HA
: r
= R_PPC64_TPREL16_HA
;
2367 case BFD_RELOC_PPC64_TPREL16_HIGHA
: r
= R_PPC64_TPREL16_HIGHA
;
2369 case BFD_RELOC_PPC_TPREL
: r
= R_PPC64_TPREL64
;
2371 case BFD_RELOC_PPC_DTPREL16
: r
= R_PPC64_DTPREL16
;
2373 case BFD_RELOC_PPC_DTPREL16_LO
: r
= R_PPC64_DTPREL16_LO
;
2375 case BFD_RELOC_PPC_DTPREL16_HI
: r
= R_PPC64_DTPREL16_HI
;
2377 case BFD_RELOC_PPC64_DTPREL16_HIGH
: r
= R_PPC64_DTPREL16_HIGH
;
2379 case BFD_RELOC_PPC_DTPREL16_HA
: r
= R_PPC64_DTPREL16_HA
;
2381 case BFD_RELOC_PPC64_DTPREL16_HIGHA
: r
= R_PPC64_DTPREL16_HIGHA
;
2383 case BFD_RELOC_PPC_DTPREL
: r
= R_PPC64_DTPREL64
;
2385 case BFD_RELOC_PPC_GOT_TLSGD16
: r
= R_PPC64_GOT_TLSGD16
;
2387 case BFD_RELOC_PPC_GOT_TLSGD16_LO
: r
= R_PPC64_GOT_TLSGD16_LO
;
2389 case BFD_RELOC_PPC_GOT_TLSGD16_HI
: r
= R_PPC64_GOT_TLSGD16_HI
;
2391 case BFD_RELOC_PPC_GOT_TLSGD16_HA
: r
= R_PPC64_GOT_TLSGD16_HA
;
2393 case BFD_RELOC_PPC_GOT_TLSLD16
: r
= R_PPC64_GOT_TLSLD16
;
2395 case BFD_RELOC_PPC_GOT_TLSLD16_LO
: r
= R_PPC64_GOT_TLSLD16_LO
;
2397 case BFD_RELOC_PPC_GOT_TLSLD16_HI
: r
= R_PPC64_GOT_TLSLD16_HI
;
2399 case BFD_RELOC_PPC_GOT_TLSLD16_HA
: r
= R_PPC64_GOT_TLSLD16_HA
;
2401 case BFD_RELOC_PPC_GOT_TPREL16
: r
= R_PPC64_GOT_TPREL16_DS
;
2403 case BFD_RELOC_PPC_GOT_TPREL16_LO
: r
= R_PPC64_GOT_TPREL16_LO_DS
;
2405 case BFD_RELOC_PPC_GOT_TPREL16_HI
: r
= R_PPC64_GOT_TPREL16_HI
;
2407 case BFD_RELOC_PPC_GOT_TPREL16_HA
: r
= R_PPC64_GOT_TPREL16_HA
;
2409 case BFD_RELOC_PPC_GOT_DTPREL16
: r
= R_PPC64_GOT_DTPREL16_DS
;
2411 case BFD_RELOC_PPC_GOT_DTPREL16_LO
: r
= R_PPC64_GOT_DTPREL16_LO_DS
;
2413 case BFD_RELOC_PPC_GOT_DTPREL16_HI
: r
= R_PPC64_GOT_DTPREL16_HI
;
2415 case BFD_RELOC_PPC_GOT_DTPREL16_HA
: r
= R_PPC64_GOT_DTPREL16_HA
;
2417 case BFD_RELOC_PPC64_TPREL16_DS
: r
= R_PPC64_TPREL16_DS
;
2419 case BFD_RELOC_PPC64_TPREL16_LO_DS
: r
= R_PPC64_TPREL16_LO_DS
;
2421 case BFD_RELOC_PPC64_TPREL16_HIGHER
: r
= R_PPC64_TPREL16_HIGHER
;
2423 case BFD_RELOC_PPC64_TPREL16_HIGHERA
: r
= R_PPC64_TPREL16_HIGHERA
;
2425 case BFD_RELOC_PPC64_TPREL16_HIGHEST
: r
= R_PPC64_TPREL16_HIGHEST
;
2427 case BFD_RELOC_PPC64_TPREL16_HIGHESTA
: r
= R_PPC64_TPREL16_HIGHESTA
;
2429 case BFD_RELOC_PPC64_DTPREL16_DS
: r
= R_PPC64_DTPREL16_DS
;
2431 case BFD_RELOC_PPC64_DTPREL16_LO_DS
: r
= R_PPC64_DTPREL16_LO_DS
;
2433 case BFD_RELOC_PPC64_DTPREL16_HIGHER
: r
= R_PPC64_DTPREL16_HIGHER
;
2435 case BFD_RELOC_PPC64_DTPREL16_HIGHERA
: r
= R_PPC64_DTPREL16_HIGHERA
;
2437 case BFD_RELOC_PPC64_DTPREL16_HIGHEST
: r
= R_PPC64_DTPREL16_HIGHEST
;
2439 case BFD_RELOC_PPC64_DTPREL16_HIGHESTA
: r
= R_PPC64_DTPREL16_HIGHESTA
;
2441 case BFD_RELOC_16_PCREL
: r
= R_PPC64_REL16
;
2443 case BFD_RELOC_LO16_PCREL
: r
= R_PPC64_REL16_LO
;
2445 case BFD_RELOC_HI16_PCREL
: r
= R_PPC64_REL16_HI
;
2447 case BFD_RELOC_HI16_S_PCREL
: r
= R_PPC64_REL16_HA
;
2449 case BFD_RELOC_PPC_REL16DX_HA
: r
= R_PPC64_REL16DX_HA
;
2451 case BFD_RELOC_PPC64_ENTRY
: r
= R_PPC64_ENTRY
;
2453 case BFD_RELOC_PPC64_ADDR64_LOCAL
: r
= R_PPC64_ADDR64_LOCAL
;
2455 case BFD_RELOC_VTABLE_INHERIT
: r
= R_PPC64_GNU_VTINHERIT
;
2457 case BFD_RELOC_VTABLE_ENTRY
: r
= R_PPC64_GNU_VTENTRY
;
2461 return ppc64_elf_howto_table
[r
];
2464 static reloc_howto_type
*
2465 ppc64_elf_reloc_name_lookup (bfd
*abfd ATTRIBUTE_UNUSED
,
2470 for (i
= 0; i
< ARRAY_SIZE (ppc64_elf_howto_raw
); i
++)
2471 if (ppc64_elf_howto_raw
[i
].name
!= NULL
2472 && strcasecmp (ppc64_elf_howto_raw
[i
].name
, r_name
) == 0)
2473 return &ppc64_elf_howto_raw
[i
];
2478 /* Set the howto pointer for a PowerPC ELF reloc. */
2481 ppc64_elf_info_to_howto (bfd
*abfd ATTRIBUTE_UNUSED
, arelent
*cache_ptr
,
2482 Elf_Internal_Rela
*dst
)
2486 /* Initialize howto table if needed. */
2487 if (!ppc64_elf_howto_table
[R_PPC64_ADDR32
])
2490 type
= ELF64_R_TYPE (dst
->r_info
);
2491 if (type
>= ARRAY_SIZE (ppc64_elf_howto_table
))
2493 (*_bfd_error_handler
) (_("%B: invalid relocation type %d"),
2495 type
= R_PPC64_NONE
;
2497 cache_ptr
->howto
= ppc64_elf_howto_table
[type
];
2500 /* Handle the R_PPC64_ADDR16_HA and similar relocs. */
2502 static bfd_reloc_status_type
2503 ppc64_elf_ha_reloc (bfd
*abfd
, arelent
*reloc_entry
, asymbol
*symbol
,
2504 void *data
, asection
*input_section
,
2505 bfd
*output_bfd
, char **error_message
)
2507 enum elf_ppc64_reloc_type r_type
;
2509 bfd_size_type octets
;
2512 /* If this is a relocatable link (output_bfd test tells us), just
2513 call the generic function. Any adjustment will be done at final
2515 if (output_bfd
!= NULL
)
2516 return bfd_elf_generic_reloc (abfd
, reloc_entry
, symbol
, data
,
2517 input_section
, output_bfd
, error_message
);
2519 /* Adjust the addend for sign extension of the low 16 bits.
2520 We won't actually be using the low 16 bits, so trashing them
2522 reloc_entry
->addend
+= 0x8000;
2523 r_type
= reloc_entry
->howto
->type
;
2524 if (r_type
!= R_PPC64_REL16DX_HA
)
2525 return bfd_reloc_continue
;
2528 if (!bfd_is_com_section (symbol
->section
))
2529 value
= symbol
->value
;
2530 value
+= (reloc_entry
->addend
2531 + symbol
->section
->output_offset
2532 + symbol
->section
->output_section
->vma
);
2533 value
-= (reloc_entry
->address
2534 + input_section
->output_offset
2535 + input_section
->output_section
->vma
);
2536 value
= (bfd_signed_vma
) value
>> 16;
2538 octets
= reloc_entry
->address
* bfd_octets_per_byte (abfd
);
2539 insn
= bfd_get_32 (abfd
, (bfd_byte
*) data
+ octets
);
2541 insn
|= (value
& 0xffc1) | ((value
& 0x3e) << 15);
2542 bfd_put_32 (abfd
, insn
, (bfd_byte
*) data
+ octets
);
2543 if (value
+ 0x8000 > 0xffff)
2544 return bfd_reloc_overflow
;
2545 return bfd_reloc_ok
;
2548 static bfd_reloc_status_type
2549 ppc64_elf_branch_reloc (bfd
*abfd
, arelent
*reloc_entry
, asymbol
*symbol
,
2550 void *data
, asection
*input_section
,
2551 bfd
*output_bfd
, char **error_message
)
2553 if (output_bfd
!= NULL
)
2554 return bfd_elf_generic_reloc (abfd
, reloc_entry
, symbol
, data
,
2555 input_section
, output_bfd
, error_message
);
2557 if (strcmp (symbol
->section
->name
, ".opd") == 0
2558 && (symbol
->section
->owner
->flags
& DYNAMIC
) == 0)
2560 bfd_vma dest
= opd_entry_value (symbol
->section
,
2561 symbol
->value
+ reloc_entry
->addend
,
2563 if (dest
!= (bfd_vma
) -1)
2564 reloc_entry
->addend
= dest
- (symbol
->value
2565 + symbol
->section
->output_section
->vma
2566 + symbol
->section
->output_offset
);
2570 elf_symbol_type
*elfsym
= (elf_symbol_type
*) symbol
;
2572 if (symbol
->section
->owner
!= abfd
2573 && symbol
->section
->owner
!= NULL
2574 && abiversion (symbol
->section
->owner
) >= 2)
2578 for (i
= 0; i
< symbol
->section
->owner
->symcount
; ++i
)
2580 asymbol
*symdef
= symbol
->section
->owner
->outsymbols
[i
];
2582 if (strcmp (symdef
->name
, symbol
->name
) == 0)
2584 elfsym
= (elf_symbol_type
*) symdef
;
2590 += PPC64_LOCAL_ENTRY_OFFSET (elfsym
->internal_elf_sym
.st_other
);
2592 return bfd_reloc_continue
;
2595 static bfd_reloc_status_type
2596 ppc64_elf_brtaken_reloc (bfd
*abfd
, arelent
*reloc_entry
, asymbol
*symbol
,
2597 void *data
, asection
*input_section
,
2598 bfd
*output_bfd
, char **error_message
)
2601 enum elf_ppc64_reloc_type r_type
;
2602 bfd_size_type octets
;
2603 /* Assume 'at' branch hints. */
2604 bfd_boolean is_isa_v2
= TRUE
;
2606 /* If this is a relocatable link (output_bfd test tells us), just
2607 call the generic function. Any adjustment will be done at final
2609 if (output_bfd
!= NULL
)
2610 return bfd_elf_generic_reloc (abfd
, reloc_entry
, symbol
, data
,
2611 input_section
, output_bfd
, error_message
);
2613 octets
= reloc_entry
->address
* bfd_octets_per_byte (abfd
);
2614 insn
= bfd_get_32 (abfd
, (bfd_byte
*) data
+ octets
);
2615 insn
&= ~(0x01 << 21);
2616 r_type
= reloc_entry
->howto
->type
;
2617 if (r_type
== R_PPC64_ADDR14_BRTAKEN
2618 || r_type
== R_PPC64_REL14_BRTAKEN
)
2619 insn
|= 0x01 << 21; /* 'y' or 't' bit, lowest bit of BO field. */
2623 /* Set 'a' bit. This is 0b00010 in BO field for branch
2624 on CR(BI) insns (BO == 001at or 011at), and 0b01000
2625 for branch on CTR insns (BO == 1a00t or 1a01t). */
2626 if ((insn
& (0x14 << 21)) == (0x04 << 21))
2628 else if ((insn
& (0x14 << 21)) == (0x10 << 21))
2638 if (!bfd_is_com_section (symbol
->section
))
2639 target
= symbol
->value
;
2640 target
+= symbol
->section
->output_section
->vma
;
2641 target
+= symbol
->section
->output_offset
;
2642 target
+= reloc_entry
->addend
;
2644 from
= (reloc_entry
->address
2645 + input_section
->output_offset
2646 + input_section
->output_section
->vma
);
2648 /* Invert 'y' bit if not the default. */
2649 if ((bfd_signed_vma
) (target
- from
) < 0)
2652 bfd_put_32 (abfd
, insn
, (bfd_byte
*) data
+ octets
);
2654 return ppc64_elf_branch_reloc (abfd
, reloc_entry
, symbol
, data
,
2655 input_section
, output_bfd
, error_message
);
2658 static bfd_reloc_status_type
2659 ppc64_elf_sectoff_reloc (bfd
*abfd
, arelent
*reloc_entry
, asymbol
*symbol
,
2660 void *data
, asection
*input_section
,
2661 bfd
*output_bfd
, char **error_message
)
2663 /* If this is a relocatable link (output_bfd test tells us), just
2664 call the generic function. Any adjustment will be done at final
2666 if (output_bfd
!= NULL
)
2667 return bfd_elf_generic_reloc (abfd
, reloc_entry
, symbol
, data
,
2668 input_section
, output_bfd
, error_message
);
2670 /* Subtract the symbol section base address. */
2671 reloc_entry
->addend
-= symbol
->section
->output_section
->vma
;
2672 return bfd_reloc_continue
;
2675 static bfd_reloc_status_type
2676 ppc64_elf_sectoff_ha_reloc (bfd
*abfd
, arelent
*reloc_entry
, asymbol
*symbol
,
2677 void *data
, asection
*input_section
,
2678 bfd
*output_bfd
, char **error_message
)
2680 /* If this is a relocatable link (output_bfd test tells us), just
2681 call the generic function. Any adjustment will be done at final
2683 if (output_bfd
!= NULL
)
2684 return bfd_elf_generic_reloc (abfd
, reloc_entry
, symbol
, data
,
2685 input_section
, output_bfd
, error_message
);
2687 /* Subtract the symbol section base address. */
2688 reloc_entry
->addend
-= symbol
->section
->output_section
->vma
;
2690 /* Adjust the addend for sign extension of the low 16 bits. */
2691 reloc_entry
->addend
+= 0x8000;
2692 return bfd_reloc_continue
;
2695 static bfd_reloc_status_type
2696 ppc64_elf_toc_reloc (bfd
*abfd
, arelent
*reloc_entry
, asymbol
*symbol
,
2697 void *data
, asection
*input_section
,
2698 bfd
*output_bfd
, char **error_message
)
2702 /* If this is a relocatable link (output_bfd test tells us), just
2703 call the generic function. Any adjustment will be done at final
2705 if (output_bfd
!= NULL
)
2706 return bfd_elf_generic_reloc (abfd
, reloc_entry
, symbol
, data
,
2707 input_section
, output_bfd
, error_message
);
2709 TOCstart
= _bfd_get_gp_value (input_section
->output_section
->owner
);
2711 TOCstart
= ppc64_elf_set_toc (NULL
, input_section
->output_section
->owner
);
2713 /* Subtract the TOC base address. */
2714 reloc_entry
->addend
-= TOCstart
+ TOC_BASE_OFF
;
2715 return bfd_reloc_continue
;
2718 static bfd_reloc_status_type
2719 ppc64_elf_toc_ha_reloc (bfd
*abfd
, arelent
*reloc_entry
, asymbol
*symbol
,
2720 void *data
, asection
*input_section
,
2721 bfd
*output_bfd
, char **error_message
)
2725 /* If this is a relocatable link (output_bfd test tells us), just
2726 call the generic function. Any adjustment will be done at final
2728 if (output_bfd
!= NULL
)
2729 return bfd_elf_generic_reloc (abfd
, reloc_entry
, symbol
, data
,
2730 input_section
, output_bfd
, error_message
);
2732 TOCstart
= _bfd_get_gp_value (input_section
->output_section
->owner
);
2734 TOCstart
= ppc64_elf_set_toc (NULL
, input_section
->output_section
->owner
);
2736 /* Subtract the TOC base address. */
2737 reloc_entry
->addend
-= TOCstart
+ TOC_BASE_OFF
;
2739 /* Adjust the addend for sign extension of the low 16 bits. */
2740 reloc_entry
->addend
+= 0x8000;
2741 return bfd_reloc_continue
;
2744 static bfd_reloc_status_type
2745 ppc64_elf_toc64_reloc (bfd
*abfd
, arelent
*reloc_entry
, asymbol
*symbol
,
2746 void *data
, asection
*input_section
,
2747 bfd
*output_bfd
, char **error_message
)
2750 bfd_size_type octets
;
2752 /* If this is a relocatable link (output_bfd test tells us), just
2753 call the generic function. Any adjustment will be done at final
2755 if (output_bfd
!= NULL
)
2756 return bfd_elf_generic_reloc (abfd
, reloc_entry
, symbol
, data
,
2757 input_section
, output_bfd
, error_message
);
2759 TOCstart
= _bfd_get_gp_value (input_section
->output_section
->owner
);
2761 TOCstart
= ppc64_elf_set_toc (NULL
, input_section
->output_section
->owner
);
2763 octets
= reloc_entry
->address
* bfd_octets_per_byte (abfd
);
2764 bfd_put_64 (abfd
, TOCstart
+ TOC_BASE_OFF
, (bfd_byte
*) data
+ octets
);
2765 return bfd_reloc_ok
;
2768 static bfd_reloc_status_type
2769 ppc64_elf_unhandled_reloc (bfd
*abfd
, arelent
*reloc_entry
, asymbol
*symbol
,
2770 void *data
, asection
*input_section
,
2771 bfd
*output_bfd
, char **error_message
)
2773 /* If this is a relocatable link (output_bfd test tells us), just
2774 call the generic function. Any adjustment will be done at final
2776 if (output_bfd
!= NULL
)
2777 return bfd_elf_generic_reloc (abfd
, reloc_entry
, symbol
, data
,
2778 input_section
, output_bfd
, error_message
);
2780 if (error_message
!= NULL
)
2782 static char buf
[60];
2783 sprintf (buf
, "generic linker can't handle %s",
2784 reloc_entry
->howto
->name
);
2785 *error_message
= buf
;
2787 return bfd_reloc_dangerous
;
2790 /* Track GOT entries needed for a given symbol. We might need more
2791 than one got entry per symbol. */
2794 struct got_entry
*next
;
2796 /* The symbol addend that we'll be placing in the GOT. */
2799 /* Unlike other ELF targets, we use separate GOT entries for the same
2800 symbol referenced from different input files. This is to support
2801 automatic multiple TOC/GOT sections, where the TOC base can vary
2802 from one input file to another. After partitioning into TOC groups
2803 we merge entries within the group.
2805 Point to the BFD owning this GOT entry. */
2808 /* Zero for non-tls entries, or TLS_TLS and one of TLS_GD, TLS_LD,
2809 TLS_TPREL or TLS_DTPREL for tls entries. */
2810 unsigned char tls_type
;
2812 /* Non-zero if got.ent points to real entry. */
2813 unsigned char is_indirect
;
2815 /* Reference count until size_dynamic_sections, GOT offset thereafter. */
2818 bfd_signed_vma refcount
;
2820 struct got_entry
*ent
;
2824 /* The same for PLT. */
2827 struct plt_entry
*next
;
2833 bfd_signed_vma refcount
;
2838 struct ppc64_elf_obj_tdata
2840 struct elf_obj_tdata elf
;
2842 /* Shortcuts to dynamic linker sections. */
2846 /* Used during garbage collection. We attach global symbols defined
2847 on removed .opd entries to this section so that the sym is removed. */
2848 asection
*deleted_section
;
2850 /* TLS local dynamic got entry handling. Support for multiple GOT
2851 sections means we potentially need one of these for each input bfd. */
2852 struct got_entry tlsld_got
;
2855 /* A copy of relocs before they are modified for --emit-relocs. */
2856 Elf_Internal_Rela
*relocs
;
2858 /* Section contents. */
2862 /* Nonzero if this bfd has small toc/got relocs, ie. that expect
2863 the reloc to be in the range -32768 to 32767. */
2864 unsigned int has_small_toc_reloc
: 1;
2866 /* Set if toc/got ha relocs detected not using r2, or lo reloc
2867 instruction not one we handle. */
2868 unsigned int unexpected_toc_insn
: 1;
2871 #define ppc64_elf_tdata(bfd) \
2872 ((struct ppc64_elf_obj_tdata *) (bfd)->tdata.any)
2874 #define ppc64_tlsld_got(bfd) \
2875 (&ppc64_elf_tdata (bfd)->tlsld_got)
2877 #define is_ppc64_elf(bfd) \
2878 (bfd_get_flavour (bfd) == bfd_target_elf_flavour \
2879 && elf_object_id (bfd) == PPC64_ELF_DATA)
2881 /* Override the generic function because we store some extras. */
2884 ppc64_elf_mkobject (bfd
*abfd
)
2886 return bfd_elf_allocate_object (abfd
, sizeof (struct ppc64_elf_obj_tdata
),
2890 /* Fix bad default arch selected for a 64 bit input bfd when the
2891 default is 32 bit. Also select arch based on apuinfo. */
2894 ppc64_elf_object_p (bfd
*abfd
)
2896 if (!abfd
->arch_info
->the_default
)
2899 if (abfd
->arch_info
->bits_per_word
== 32)
2901 Elf_Internal_Ehdr
*i_ehdr
= elf_elfheader (abfd
);
2903 if (i_ehdr
->e_ident
[EI_CLASS
] == ELFCLASS64
)
2905 /* Relies on arch after 32 bit default being 64 bit default. */
2906 abfd
->arch_info
= abfd
->arch_info
->next
;
2907 BFD_ASSERT (abfd
->arch_info
->bits_per_word
== 64);
2910 return _bfd_elf_ppc_set_arch (abfd
);
2913 /* Support for core dump NOTE sections. */
2916 ppc64_elf_grok_prstatus (bfd
*abfd
, Elf_Internal_Note
*note
)
2918 size_t offset
, size
;
2920 if (note
->descsz
!= 504)
2924 elf_tdata (abfd
)->core
->signal
= bfd_get_16 (abfd
, note
->descdata
+ 12);
2927 elf_tdata (abfd
)->core
->lwpid
= bfd_get_32 (abfd
, note
->descdata
+ 32);
2933 /* Make a ".reg/999" section. */
2934 return _bfd_elfcore_make_pseudosection (abfd
, ".reg",
2935 size
, note
->descpos
+ offset
);
2939 ppc64_elf_grok_psinfo (bfd
*abfd
, Elf_Internal_Note
*note
)
2941 if (note
->descsz
!= 136)
2944 elf_tdata (abfd
)->core
->pid
2945 = bfd_get_32 (abfd
, note
->descdata
+ 24);
2946 elf_tdata (abfd
)->core
->program
2947 = _bfd_elfcore_strndup (abfd
, note
->descdata
+ 40, 16);
2948 elf_tdata (abfd
)->core
->command
2949 = _bfd_elfcore_strndup (abfd
, note
->descdata
+ 56, 80);
2955 ppc64_elf_write_core_note (bfd
*abfd
, char *buf
, int *bufsiz
, int note_type
,
2968 va_start (ap
, note_type
);
2969 memset (data
, 0, sizeof (data
));
2970 strncpy (data
+ 40, va_arg (ap
, const char *), 16);
2971 strncpy (data
+ 56, va_arg (ap
, const char *), 80);
2973 return elfcore_write_note (abfd
, buf
, bufsiz
,
2974 "CORE", note_type
, data
, sizeof (data
));
2985 va_start (ap
, note_type
);
2986 memset (data
, 0, 112);
2987 pid
= va_arg (ap
, long);
2988 bfd_put_32 (abfd
, pid
, data
+ 32);
2989 cursig
= va_arg (ap
, int);
2990 bfd_put_16 (abfd
, cursig
, data
+ 12);
2991 greg
= va_arg (ap
, const void *);
2992 memcpy (data
+ 112, greg
, 384);
2993 memset (data
+ 496, 0, 8);
2995 return elfcore_write_note (abfd
, buf
, bufsiz
,
2996 "CORE", note_type
, data
, sizeof (data
));
3001 /* Add extra PPC sections. */
3003 static const struct bfd_elf_special_section ppc64_elf_special_sections
[]=
3005 { STRING_COMMA_LEN (".plt"), 0, SHT_NOBITS
, 0 },
3006 { STRING_COMMA_LEN (".sbss"), -2, SHT_NOBITS
, SHF_ALLOC
+ SHF_WRITE
},
3007 { STRING_COMMA_LEN (".sdata"), -2, SHT_PROGBITS
, SHF_ALLOC
+ SHF_WRITE
},
3008 { STRING_COMMA_LEN (".toc"), 0, SHT_PROGBITS
, SHF_ALLOC
+ SHF_WRITE
},
3009 { STRING_COMMA_LEN (".toc1"), 0, SHT_PROGBITS
, SHF_ALLOC
+ SHF_WRITE
},
3010 { STRING_COMMA_LEN (".tocbss"), 0, SHT_NOBITS
, SHF_ALLOC
+ SHF_WRITE
},
3011 { NULL
, 0, 0, 0, 0 }
3014 enum _ppc64_sec_type
{
3020 struct _ppc64_elf_section_data
3022 struct bfd_elf_section_data elf
;
3026 /* An array with one entry for each opd function descriptor,
3027 and some spares since opd entries may be either 16 or 24 bytes. */
3028 #define OPD_NDX(OFF) ((OFF) >> 4)
3029 struct _opd_sec_data
3031 /* Points to the function code section for local opd entries. */
3032 asection
**func_sec
;
3034 /* After editing .opd, adjust references to opd local syms. */
3038 /* An array for toc sections, indexed by offset/8. */
3039 struct _toc_sec_data
3041 /* Specifies the relocation symbol index used at a given toc offset. */
3044 /* And the relocation addend. */
3049 enum _ppc64_sec_type sec_type
:2;
3051 /* Flag set when small branches are detected. Used to
3052 select suitable defaults for the stub group size. */
3053 unsigned int has_14bit_branch
:1;
3056 #define ppc64_elf_section_data(sec) \
3057 ((struct _ppc64_elf_section_data *) elf_section_data (sec))
3060 ppc64_elf_new_section_hook (bfd
*abfd
, asection
*sec
)
3062 if (!sec
->used_by_bfd
)
3064 struct _ppc64_elf_section_data
*sdata
;
3065 bfd_size_type amt
= sizeof (*sdata
);
3067 sdata
= bfd_zalloc (abfd
, amt
);
3070 sec
->used_by_bfd
= sdata
;
3073 return _bfd_elf_new_section_hook (abfd
, sec
);
3076 static struct _opd_sec_data
*
3077 get_opd_info (asection
* sec
)
3080 && ppc64_elf_section_data (sec
) != NULL
3081 && ppc64_elf_section_data (sec
)->sec_type
== sec_opd
)
3082 return &ppc64_elf_section_data (sec
)->u
.opd
;
3086 /* Parameters for the qsort hook. */
3087 static bfd_boolean synthetic_relocatable
;
3089 /* qsort comparison function for ppc64_elf_get_synthetic_symtab. */
3092 compare_symbols (const void *ap
, const void *bp
)
3094 const asymbol
*a
= * (const asymbol
**) ap
;
3095 const asymbol
*b
= * (const asymbol
**) bp
;
3097 /* Section symbols first. */
3098 if ((a
->flags
& BSF_SECTION_SYM
) && !(b
->flags
& BSF_SECTION_SYM
))
3100 if (!(a
->flags
& BSF_SECTION_SYM
) && (b
->flags
& BSF_SECTION_SYM
))
3103 /* then .opd symbols. */
3104 if (strcmp (a
->section
->name
, ".opd") == 0
3105 && strcmp (b
->section
->name
, ".opd") != 0)
3107 if (strcmp (a
->section
->name
, ".opd") != 0
3108 && strcmp (b
->section
->name
, ".opd") == 0)
3111 /* then other code symbols. */
3112 if ((a
->section
->flags
& (SEC_CODE
| SEC_ALLOC
| SEC_THREAD_LOCAL
))
3113 == (SEC_CODE
| SEC_ALLOC
)
3114 && (b
->section
->flags
& (SEC_CODE
| SEC_ALLOC
| SEC_THREAD_LOCAL
))
3115 != (SEC_CODE
| SEC_ALLOC
))
3118 if ((a
->section
->flags
& (SEC_CODE
| SEC_ALLOC
| SEC_THREAD_LOCAL
))
3119 != (SEC_CODE
| SEC_ALLOC
)
3120 && (b
->section
->flags
& (SEC_CODE
| SEC_ALLOC
| SEC_THREAD_LOCAL
))
3121 == (SEC_CODE
| SEC_ALLOC
))
3124 if (synthetic_relocatable
)
3126 if (a
->section
->id
< b
->section
->id
)
3129 if (a
->section
->id
> b
->section
->id
)
3133 if (a
->value
+ a
->section
->vma
< b
->value
+ b
->section
->vma
)
3136 if (a
->value
+ a
->section
->vma
> b
->value
+ b
->section
->vma
)
3139 /* For syms with the same value, prefer strong dynamic global function
3140 syms over other syms. */
3141 if ((a
->flags
& BSF_GLOBAL
) != 0 && (b
->flags
& BSF_GLOBAL
) == 0)
3144 if ((a
->flags
& BSF_GLOBAL
) == 0 && (b
->flags
& BSF_GLOBAL
) != 0)
3147 if ((a
->flags
& BSF_FUNCTION
) != 0 && (b
->flags
& BSF_FUNCTION
) == 0)
3150 if ((a
->flags
& BSF_FUNCTION
) == 0 && (b
->flags
& BSF_FUNCTION
) != 0)
3153 if ((a
->flags
& BSF_WEAK
) == 0 && (b
->flags
& BSF_WEAK
) != 0)
3156 if ((a
->flags
& BSF_WEAK
) != 0 && (b
->flags
& BSF_WEAK
) == 0)
3159 if ((a
->flags
& BSF_DYNAMIC
) != 0 && (b
->flags
& BSF_DYNAMIC
) == 0)
3162 if ((a
->flags
& BSF_DYNAMIC
) == 0 && (b
->flags
& BSF_DYNAMIC
) != 0)
3168 /* Search SYMS for a symbol of the given VALUE. */
3171 sym_exists_at (asymbol
**syms
, long lo
, long hi
, unsigned int id
, bfd_vma value
)
3175 if (id
== (unsigned) -1)
3179 mid
= (lo
+ hi
) >> 1;
3180 if (syms
[mid
]->value
+ syms
[mid
]->section
->vma
< value
)
3182 else if (syms
[mid
]->value
+ syms
[mid
]->section
->vma
> value
)
3192 mid
= (lo
+ hi
) >> 1;
3193 if (syms
[mid
]->section
->id
< id
)
3195 else if (syms
[mid
]->section
->id
> id
)
3197 else if (syms
[mid
]->value
< value
)
3199 else if (syms
[mid
]->value
> value
)
3209 section_covers_vma (bfd
*abfd ATTRIBUTE_UNUSED
, asection
*section
, void *ptr
)
3211 bfd_vma vma
= *(bfd_vma
*) ptr
;
3212 return ((section
->flags
& SEC_ALLOC
) != 0
3213 && section
->vma
<= vma
3214 && vma
< section
->vma
+ section
->size
);
3217 /* Create synthetic symbols, effectively restoring "dot-symbol" function
3218 entry syms. Also generate @plt symbols for the glink branch table.
3219 Returns count of synthetic symbols in RET or -1 on error. */
3222 ppc64_elf_get_synthetic_symtab (bfd
*abfd
,
3223 long static_count
, asymbol
**static_syms
,
3224 long dyn_count
, asymbol
**dyn_syms
,
3231 long symcount
, codesecsym
, codesecsymend
, secsymend
, opdsymend
;
3232 asection
*opd
= NULL
;
3233 bfd_boolean relocatable
= (abfd
->flags
& (EXEC_P
| DYNAMIC
)) == 0;
3235 int abi
= abiversion (abfd
);
3241 opd
= bfd_get_section_by_name (abfd
, ".opd");
3242 if (opd
== NULL
&& abi
== 1)
3246 symcount
= static_count
;
3248 symcount
+= dyn_count
;
3252 syms
= bfd_malloc ((symcount
+ 1) * sizeof (*syms
));
3256 if (!relocatable
&& static_count
!= 0 && dyn_count
!= 0)
3258 /* Use both symbol tables. */
3259 memcpy (syms
, static_syms
, static_count
* sizeof (*syms
));
3260 memcpy (syms
+ static_count
, dyn_syms
, (dyn_count
+ 1) * sizeof (*syms
));
3262 else if (!relocatable
&& static_count
== 0)
3263 memcpy (syms
, dyn_syms
, (symcount
+ 1) * sizeof (*syms
));
3265 memcpy (syms
, static_syms
, (symcount
+ 1) * sizeof (*syms
));
3267 synthetic_relocatable
= relocatable
;
3268 qsort (syms
, symcount
, sizeof (*syms
), compare_symbols
);
3270 if (!relocatable
&& symcount
> 1)
3273 /* Trim duplicate syms, since we may have merged the normal and
3274 dynamic symbols. Actually, we only care about syms that have
3275 different values, so trim any with the same value. */
3276 for (i
= 1, j
= 1; i
< symcount
; ++i
)
3277 if (syms
[i
- 1]->value
+ syms
[i
- 1]->section
->vma
3278 != syms
[i
]->value
+ syms
[i
]->section
->vma
)
3279 syms
[j
++] = syms
[i
];
3284 if (strcmp (syms
[i
]->section
->name
, ".opd") == 0)
3288 for (; i
< symcount
; ++i
)
3289 if (((syms
[i
]->section
->flags
& (SEC_CODE
| SEC_ALLOC
| SEC_THREAD_LOCAL
))
3290 != (SEC_CODE
| SEC_ALLOC
))
3291 || (syms
[i
]->flags
& BSF_SECTION_SYM
) == 0)
3295 for (; i
< symcount
; ++i
)
3296 if ((syms
[i
]->flags
& BSF_SECTION_SYM
) == 0)
3300 for (; i
< symcount
; ++i
)
3301 if (strcmp (syms
[i
]->section
->name
, ".opd") != 0)
3305 for (; i
< symcount
; ++i
)
3306 if ((syms
[i
]->section
->flags
& (SEC_CODE
| SEC_ALLOC
| SEC_THREAD_LOCAL
))
3307 != (SEC_CODE
| SEC_ALLOC
))
3315 bfd_boolean (*slurp_relocs
) (bfd
*, asection
*, asymbol
**, bfd_boolean
);
3320 if (opdsymend
== secsymend
)
3323 slurp_relocs
= get_elf_backend_data (abfd
)->s
->slurp_reloc_table
;
3324 relcount
= (opd
->flags
& SEC_RELOC
) ? opd
->reloc_count
: 0;
3328 if (!(*slurp_relocs
) (abfd
, opd
, static_syms
, FALSE
))
3335 for (i
= secsymend
, r
= opd
->relocation
; i
< opdsymend
; ++i
)
3339 while (r
< opd
->relocation
+ relcount
3340 && r
->address
< syms
[i
]->value
+ opd
->vma
)
3343 if (r
== opd
->relocation
+ relcount
)
3346 if (r
->address
!= syms
[i
]->value
+ opd
->vma
)
3349 if (r
->howto
->type
!= R_PPC64_ADDR64
)
3352 sym
= *r
->sym_ptr_ptr
;
3353 if (!sym_exists_at (syms
, opdsymend
, symcount
,
3354 sym
->section
->id
, sym
->value
+ r
->addend
))
3357 size
+= sizeof (asymbol
);
3358 size
+= strlen (syms
[i
]->name
) + 2;
3364 s
= *ret
= bfd_malloc (size
);
3371 names
= (char *) (s
+ count
);
3373 for (i
= secsymend
, r
= opd
->relocation
; i
< opdsymend
; ++i
)
3377 while (r
< opd
->relocation
+ relcount
3378 && r
->address
< syms
[i
]->value
+ opd
->vma
)
3381 if (r
== opd
->relocation
+ relcount
)
3384 if (r
->address
!= syms
[i
]->value
+ opd
->vma
)
3387 if (r
->howto
->type
!= R_PPC64_ADDR64
)
3390 sym
= *r
->sym_ptr_ptr
;
3391 if (!sym_exists_at (syms
, opdsymend
, symcount
,
3392 sym
->section
->id
, sym
->value
+ r
->addend
))
3397 s
->flags
|= BSF_SYNTHETIC
;
3398 s
->section
= sym
->section
;
3399 s
->value
= sym
->value
+ r
->addend
;
3402 len
= strlen (syms
[i
]->name
);
3403 memcpy (names
, syms
[i
]->name
, len
+ 1);
3405 /* Have udata.p point back to the original symbol this
3406 synthetic symbol was derived from. */
3407 s
->udata
.p
= syms
[i
];
3414 bfd_boolean (*slurp_relocs
) (bfd
*, asection
*, asymbol
**, bfd_boolean
);
3415 bfd_byte
*contents
= NULL
;
3418 bfd_vma glink_vma
= 0, resolv_vma
= 0;
3419 asection
*dynamic
, *glink
= NULL
, *relplt
= NULL
;
3422 if (opd
!= NULL
&& !bfd_malloc_and_get_section (abfd
, opd
, &contents
))
3424 free_contents_and_exit_err
:
3426 free_contents_and_exit
:
3433 for (i
= secsymend
; i
< opdsymend
; ++i
)
3437 /* Ignore bogus symbols. */
3438 if (syms
[i
]->value
> opd
->size
- 8)
3441 ent
= bfd_get_64 (abfd
, contents
+ syms
[i
]->value
);
3442 if (!sym_exists_at (syms
, opdsymend
, symcount
, -1, ent
))
3445 size
+= sizeof (asymbol
);
3446 size
+= strlen (syms
[i
]->name
) + 2;
3450 /* Get start of .glink stubs from DT_PPC64_GLINK. */
3452 && (dynamic
= bfd_get_section_by_name (abfd
, ".dynamic")) != NULL
)
3454 bfd_byte
*dynbuf
, *extdyn
, *extdynend
;
3456 void (*swap_dyn_in
) (bfd
*, const void *, Elf_Internal_Dyn
*);
3458 if (!bfd_malloc_and_get_section (abfd
, dynamic
, &dynbuf
))
3459 goto free_contents_and_exit_err
;
3461 extdynsize
= get_elf_backend_data (abfd
)->s
->sizeof_dyn
;
3462 swap_dyn_in
= get_elf_backend_data (abfd
)->s
->swap_dyn_in
;
3465 extdynend
= extdyn
+ dynamic
->size
;
3466 for (; extdyn
< extdynend
; extdyn
+= extdynsize
)
3468 Elf_Internal_Dyn dyn
;
3469 (*swap_dyn_in
) (abfd
, extdyn
, &dyn
);
3471 if (dyn
.d_tag
== DT_NULL
)
3474 if (dyn
.d_tag
== DT_PPC64_GLINK
)
3476 /* The first glink stub starts at offset 32; see
3477 comment in ppc64_elf_finish_dynamic_sections. */
3478 glink_vma
= dyn
.d_un
.d_val
+ GLINK_CALL_STUB_SIZE
- 8 * 4;
3479 /* The .glink section usually does not survive the final
3480 link; search for the section (usually .text) where the
3481 glink stubs now reside. */
3482 glink
= bfd_sections_find_if (abfd
, section_covers_vma
,
3493 /* Determine __glink trampoline by reading the relative branch
3494 from the first glink stub. */
3496 unsigned int off
= 0;
3498 while (bfd_get_section_contents (abfd
, glink
, buf
,
3499 glink_vma
+ off
- glink
->vma
, 4))
3501 unsigned int insn
= bfd_get_32 (abfd
, buf
);
3503 if ((insn
& ~0x3fffffc) == 0)
3505 resolv_vma
= glink_vma
+ off
+ (insn
^ 0x2000000) - 0x2000000;
3514 size
+= sizeof (asymbol
) + sizeof ("__glink_PLTresolve");
3516 relplt
= bfd_get_section_by_name (abfd
, ".rela.plt");
3519 slurp_relocs
= get_elf_backend_data (abfd
)->s
->slurp_reloc_table
;
3520 if (! (*slurp_relocs
) (abfd
, relplt
, dyn_syms
, TRUE
))
3521 goto free_contents_and_exit_err
;
3523 plt_count
= relplt
->size
/ sizeof (Elf64_External_Rela
);
3524 size
+= plt_count
* sizeof (asymbol
);
3526 p
= relplt
->relocation
;
3527 for (i
= 0; i
< plt_count
; i
++, p
++)
3529 size
+= strlen ((*p
->sym_ptr_ptr
)->name
) + sizeof ("@plt");
3531 size
+= sizeof ("+0x") - 1 + 16;
3537 goto free_contents_and_exit
;
3538 s
= *ret
= bfd_malloc (size
);
3540 goto free_contents_and_exit_err
;
3542 names
= (char *) (s
+ count
+ plt_count
+ (resolv_vma
!= 0));
3544 for (i
= secsymend
; i
< opdsymend
; ++i
)
3548 if (syms
[i
]->value
> opd
->size
- 8)
3551 ent
= bfd_get_64 (abfd
, contents
+ syms
[i
]->value
);
3552 if (!sym_exists_at (syms
, opdsymend
, symcount
, -1, ent
))
3556 asection
*sec
= abfd
->sections
;
3563 long mid
= (lo
+ hi
) >> 1;
3564 if (syms
[mid
]->section
->vma
< ent
)
3566 else if (syms
[mid
]->section
->vma
> ent
)
3570 sec
= syms
[mid
]->section
;
3575 if (lo
>= hi
&& lo
> codesecsym
)
3576 sec
= syms
[lo
- 1]->section
;
3578 for (; sec
!= NULL
; sec
= sec
->next
)
3582 /* SEC_LOAD may not be set if SEC is from a separate debug
3584 if ((sec
->flags
& SEC_ALLOC
) == 0)
3586 if ((sec
->flags
& SEC_CODE
) != 0)
3589 s
->flags
|= BSF_SYNTHETIC
;
3590 s
->value
= ent
- s
->section
->vma
;
3593 len
= strlen (syms
[i
]->name
);
3594 memcpy (names
, syms
[i
]->name
, len
+ 1);
3596 /* Have udata.p point back to the original symbol this
3597 synthetic symbol was derived from. */
3598 s
->udata
.p
= syms
[i
];
3604 if (glink
!= NULL
&& relplt
!= NULL
)
3608 /* Add a symbol for the main glink trampoline. */
3609 memset (s
, 0, sizeof *s
);
3611 s
->flags
= BSF_GLOBAL
| BSF_SYNTHETIC
;
3613 s
->value
= resolv_vma
- glink
->vma
;
3615 memcpy (names
, "__glink_PLTresolve", sizeof ("__glink_PLTresolve"));
3616 names
+= sizeof ("__glink_PLTresolve");
3621 /* FIXME: It would be very much nicer to put sym@plt on the
3622 stub rather than on the glink branch table entry. The
3623 objdump disassembler would then use a sensible symbol
3624 name on plt calls. The difficulty in doing so is
3625 a) finding the stubs, and,
3626 b) matching stubs against plt entries, and,
3627 c) there can be multiple stubs for a given plt entry.
3629 Solving (a) could be done by code scanning, but older
3630 ppc64 binaries used different stubs to current code.
3631 (b) is the tricky one since you need to known the toc
3632 pointer for at least one function that uses a pic stub to
3633 be able to calculate the plt address referenced.
3634 (c) means gdb would need to set multiple breakpoints (or
3635 find the glink branch itself) when setting breakpoints
3636 for pending shared library loads. */
3637 p
= relplt
->relocation
;
3638 for (i
= 0; i
< plt_count
; i
++, p
++)
3642 *s
= **p
->sym_ptr_ptr
;
3643 /* Undefined syms won't have BSF_LOCAL or BSF_GLOBAL set. Since
3644 we are defining a symbol, ensure one of them is set. */
3645 if ((s
->flags
& BSF_LOCAL
) == 0)
3646 s
->flags
|= BSF_GLOBAL
;
3647 s
->flags
|= BSF_SYNTHETIC
;
3649 s
->value
= glink_vma
- glink
->vma
;
3652 len
= strlen ((*p
->sym_ptr_ptr
)->name
);
3653 memcpy (names
, (*p
->sym_ptr_ptr
)->name
, len
);
3657 memcpy (names
, "+0x", sizeof ("+0x") - 1);
3658 names
+= sizeof ("+0x") - 1;
3659 bfd_sprintf_vma (abfd
, names
, p
->addend
);
3660 names
+= strlen (names
);
3662 memcpy (names
, "@plt", sizeof ("@plt"));
3663 names
+= sizeof ("@plt");
3683 /* The following functions are specific to the ELF linker, while
3684 functions above are used generally. Those named ppc64_elf_* are
3685 called by the main ELF linker code. They appear in this file more
3686 or less in the order in which they are called. eg.
3687 ppc64_elf_check_relocs is called early in the link process,
3688 ppc64_elf_finish_dynamic_sections is one of the last functions
3691 PowerPC64-ELF uses a similar scheme to PowerPC64-XCOFF in that
3692 functions have both a function code symbol and a function descriptor
3693 symbol. A call to foo in a relocatable object file looks like:
3700 The function definition in another object file might be:
3704 . .quad .TOC.@tocbase
3710 When the linker resolves the call during a static link, the branch
3711 unsurprisingly just goes to .foo and the .opd information is unused.
3712 If the function definition is in a shared library, things are a little
3713 different: The call goes via a plt call stub, the opd information gets
3714 copied to the plt, and the linker patches the nop.
3722 . std 2,40(1) # in practice, the call stub
3723 . addis 11,2,Lfoo@toc@ha # is slightly optimized, but
3724 . addi 11,11,Lfoo@toc@l # this is the general idea
3732 . Lfoo: reloc (R_PPC64_JMP_SLOT, foo)
3734 The "reloc ()" notation is supposed to indicate that the linker emits
3735 an R_PPC64_JMP_SLOT reloc against foo. The dynamic linker does the opd
3738 What are the difficulties here? Well, firstly, the relocations
3739 examined by the linker in check_relocs are against the function code
3740 sym .foo, while the dynamic relocation in the plt is emitted against
3741 the function descriptor symbol, foo. Somewhere along the line, we need
3742 to carefully copy dynamic link information from one symbol to the other.
3743 Secondly, the generic part of the elf linker will make .foo a dynamic
3744 symbol as is normal for most other backends. We need foo dynamic
3745 instead, at least for an application final link. However, when
3746 creating a shared library containing foo, we need to have both symbols
3747 dynamic so that references to .foo are satisfied during the early
3748 stages of linking. Otherwise the linker might decide to pull in a
3749 definition from some other object, eg. a static library.
3751 Update: As of August 2004, we support a new convention. Function
3752 calls may use the function descriptor symbol, ie. "bl foo". This
3753 behaves exactly as "bl .foo". */
3755 /* Of those relocs that might be copied as dynamic relocs, this function
3756 selects those that must be copied when linking a shared library,
3757 even when the symbol is local. */
3760 must_be_dyn_reloc (struct bfd_link_info
*info
,
3761 enum elf_ppc64_reloc_type r_type
)
3773 case R_PPC64_TPREL16
:
3774 case R_PPC64_TPREL16_LO
:
3775 case R_PPC64_TPREL16_HI
:
3776 case R_PPC64_TPREL16_HA
:
3777 case R_PPC64_TPREL16_DS
:
3778 case R_PPC64_TPREL16_LO_DS
:
3779 case R_PPC64_TPREL16_HIGH
:
3780 case R_PPC64_TPREL16_HIGHA
:
3781 case R_PPC64_TPREL16_HIGHER
:
3782 case R_PPC64_TPREL16_HIGHERA
:
3783 case R_PPC64_TPREL16_HIGHEST
:
3784 case R_PPC64_TPREL16_HIGHESTA
:
3785 case R_PPC64_TPREL64
:
3786 return !bfd_link_executable (info
);
3790 /* If ELIMINATE_COPY_RELOCS is non-zero, the linker will try to avoid
3791 copying dynamic variables from a shared lib into an app's dynbss
3792 section, and instead use a dynamic relocation to point into the
3793 shared lib. With code that gcc generates, it's vital that this be
3794 enabled; In the PowerPC64 ABI, the address of a function is actually
3795 the address of a function descriptor, which resides in the .opd
3796 section. gcc uses the descriptor directly rather than going via the
3797 GOT as some other ABI's do, which means that initialized function
3798 pointers must reference the descriptor. Thus, a function pointer
3799 initialized to the address of a function in a shared library will
3800 either require a copy reloc, or a dynamic reloc. Using a copy reloc
3801 redefines the function descriptor symbol to point to the copy. This
3802 presents a problem as a plt entry for that function is also
3803 initialized from the function descriptor symbol and the copy reloc
3804 may not be initialized first. */
3805 #define ELIMINATE_COPY_RELOCS 1
3807 /* Section name for stubs is the associated section name plus this
3809 #define STUB_SUFFIX ".stub"
3812 ppc_stub_long_branch:
3813 Used when a 14 bit branch (or even a 24 bit branch) can't reach its
3814 destination, but a 24 bit branch in a stub section will reach.
3817 ppc_stub_plt_branch:
3818 Similar to the above, but a 24 bit branch in the stub section won't
3819 reach its destination.
3820 . addis %r11,%r2,xxx@toc@ha
3821 . ld %r12,xxx@toc@l(%r11)
3826 Used to call a function in a shared library. If it so happens that
3827 the plt entry referenced crosses a 64k boundary, then an extra
3828 "addi %r11,%r11,xxx@toc@l" will be inserted before the "mtctr".
3830 . addis %r11,%r2,xxx@toc@ha
3831 . ld %r12,xxx+0@toc@l(%r11)
3833 . ld %r2,xxx+8@toc@l(%r11)
3834 . ld %r11,xxx+16@toc@l(%r11)
3837 ppc_stub_long_branch and ppc_stub_plt_branch may also have additional
3838 code to adjust the value and save r2 to support multiple toc sections.
3839 A ppc_stub_long_branch with an r2 offset looks like:
3841 . addis %r2,%r2,off@ha
3842 . addi %r2,%r2,off@l
3845 A ppc_stub_plt_branch with an r2 offset looks like:
3847 . addis %r11,%r2,xxx@toc@ha
3848 . ld %r12,xxx@toc@l(%r11)
3849 . addis %r2,%r2,off@ha
3850 . addi %r2,%r2,off@l
3854 In cases where the "addis" instruction would add zero, the "addis" is
3855 omitted and following instructions modified slightly in some cases.
3858 enum ppc_stub_type
{
3860 ppc_stub_long_branch
,
3861 ppc_stub_long_branch_r2off
,
3862 ppc_stub_plt_branch
,
3863 ppc_stub_plt_branch_r2off
,
3865 ppc_stub_plt_call_r2save
,
3866 ppc_stub_global_entry
,
3870 /* Information on stub grouping. */
3873 /* The stub section. */
3875 /* This is the section to which stubs in the group will be attached. */
3878 struct map_stub
*next
;
3879 /* Whether to emit a copy of register save/restore functions in this
3884 struct ppc_stub_hash_entry
{
3886 /* Base hash table entry structure. */
3887 struct bfd_hash_entry root
;
3889 enum ppc_stub_type stub_type
;
3891 /* Group information. */
3892 struct map_stub
*group
;
3894 /* Offset within stub_sec of the beginning of this stub. */
3895 bfd_vma stub_offset
;
3897 /* Given the symbol's value and its section we can determine its final
3898 value when building the stubs (so the stub knows where to jump. */
3899 bfd_vma target_value
;
3900 asection
*target_section
;
3902 /* The symbol table entry, if any, that this was derived from. */
3903 struct ppc_link_hash_entry
*h
;
3904 struct plt_entry
*plt_ent
;
3906 /* Symbol st_other. */
3907 unsigned char other
;
3910 struct ppc_branch_hash_entry
{
3912 /* Base hash table entry structure. */
3913 struct bfd_hash_entry root
;
3915 /* Offset within branch lookup table. */
3916 unsigned int offset
;
3918 /* Generation marker. */
3922 /* Used to track dynamic relocations for local symbols. */
3923 struct ppc_dyn_relocs
3925 struct ppc_dyn_relocs
*next
;
3927 /* The input section of the reloc. */
3930 /* Total number of relocs copied for the input section. */
3931 unsigned int count
: 31;
3933 /* Whether this entry is for STT_GNU_IFUNC symbols. */
3934 unsigned int ifunc
: 1;
3937 struct ppc_link_hash_entry
3939 struct elf_link_hash_entry elf
;
3942 /* A pointer to the most recently used stub hash entry against this
3944 struct ppc_stub_hash_entry
*stub_cache
;
3946 /* A pointer to the next symbol starting with a '.' */
3947 struct ppc_link_hash_entry
*next_dot_sym
;
3950 /* Track dynamic relocs copied for this symbol. */
3951 struct elf_dyn_relocs
*dyn_relocs
;
3953 /* Chain of aliases referring to a weakdef. */
3954 struct ppc_link_hash_entry
*weakref
;
3956 /* Link between function code and descriptor symbols. */
3957 struct ppc_link_hash_entry
*oh
;
3959 /* Flag function code and descriptor symbols. */
3960 unsigned int is_func
:1;
3961 unsigned int is_func_descriptor
:1;
3962 unsigned int fake
:1;
3964 /* Whether global opd/toc sym has been adjusted or not.
3965 After ppc64_elf_edit_opd/ppc64_elf_edit_toc has run, this flag
3966 should be set for all globals defined in any opd/toc section. */
3967 unsigned int adjust_done
:1;
3969 /* Set if we twiddled this symbol to weak at some stage. */
3970 unsigned int was_undefined
:1;
3972 /* Set if this is an out-of-line register save/restore function,
3973 with non-standard calling convention. */
3974 unsigned int save_res
:1;
3976 /* Contexts in which symbol is used in the GOT (or TOC).
3977 TLS_GD .. TLS_EXPLICIT bits are or'd into the mask as the
3978 corresponding relocs are encountered during check_relocs.
3979 tls_optimize clears TLS_GD .. TLS_TPREL when optimizing to
3980 indicate the corresponding GOT entry type is not needed.
3981 tls_optimize may also set TLS_TPRELGD when a GD reloc turns into
3982 a TPREL one. We use a separate flag rather than setting TPREL
3983 just for convenience in distinguishing the two cases. */
3984 #define TLS_GD 1 /* GD reloc. */
3985 #define TLS_LD 2 /* LD reloc. */
3986 #define TLS_TPREL 4 /* TPREL reloc, => IE. */
3987 #define TLS_DTPREL 8 /* DTPREL reloc, => LD. */
3988 #define TLS_TLS 16 /* Any TLS reloc. */
3989 #define TLS_EXPLICIT 32 /* Marks TOC section TLS relocs. */
3990 #define TLS_TPRELGD 64 /* TPREL reloc resulting from GD->IE. */
3991 #define PLT_IFUNC 128 /* STT_GNU_IFUNC. */
3992 unsigned char tls_mask
;
3995 /* ppc64 ELF linker hash table. */
3997 struct ppc_link_hash_table
3999 struct elf_link_hash_table elf
;
4001 /* The stub hash table. */
4002 struct bfd_hash_table stub_hash_table
;
4004 /* Another hash table for plt_branch stubs. */
4005 struct bfd_hash_table branch_hash_table
;
4007 /* Hash table for function prologue tocsave. */
4008 htab_t tocsave_htab
;
4010 /* Various options and other info passed from the linker. */
4011 struct ppc64_elf_params
*params
;
4013 /* The size of sec_info below. */
4014 unsigned int sec_info_arr_size
;
4016 /* Per-section array of extra section info. Done this way rather
4017 than as part of ppc64_elf_section_data so we have the info for
4018 non-ppc64 sections. */
4021 /* Along with elf_gp, specifies the TOC pointer used by this section. */
4026 /* The section group that this section belongs to. */
4027 struct map_stub
*group
;
4028 /* A temp section list pointer. */
4033 /* Linked list of groups. */
4034 struct map_stub
*group
;
4036 /* Temp used when calculating TOC pointers. */
4039 asection
*toc_first_sec
;
4041 /* Used when adding symbols. */
4042 struct ppc_link_hash_entry
*dot_syms
;
4044 /* Shortcuts to get to dynamic linker sections. */
4051 asection
*glink_eh_frame
;
4053 /* Shortcut to .__tls_get_addr and __tls_get_addr. */
4054 struct ppc_link_hash_entry
*tls_get_addr
;
4055 struct ppc_link_hash_entry
*tls_get_addr_fd
;
4057 /* The size of reliplt used by got entry relocs. */
4058 bfd_size_type got_reli_size
;
4061 unsigned long stub_count
[ppc_stub_global_entry
];
4063 /* Number of stubs against global syms. */
4064 unsigned long stub_globals
;
4066 /* Set if we're linking code with function descriptors. */
4067 unsigned int opd_abi
:1;
4069 /* Support for multiple toc sections. */
4070 unsigned int do_multi_toc
:1;
4071 unsigned int multi_toc_needed
:1;
4072 unsigned int second_toc_pass
:1;
4073 unsigned int do_toc_opt
:1;
4076 unsigned int stub_error
:1;
4078 /* Temp used by ppc64_elf_before_check_relocs. */
4079 unsigned int twiddled_syms
:1;
4081 /* Incremented every time we size stubs. */
4082 unsigned int stub_iteration
;
4084 /* Small local sym cache. */
4085 struct sym_cache sym_cache
;
4088 /* Rename some of the generic section flags to better document how they
4091 /* Nonzero if this section has TLS related relocations. */
4092 #define has_tls_reloc sec_flg0
4094 /* Nonzero if this section has a call to __tls_get_addr. */
4095 #define has_tls_get_addr_call sec_flg1
4097 /* Nonzero if this section has any toc or got relocs. */
4098 #define has_toc_reloc sec_flg2
4100 /* Nonzero if this section has a call to another section that uses
4102 #define makes_toc_func_call sec_flg3
4104 /* Recursion protection when determining above flag. */
4105 #define call_check_in_progress sec_flg4
4106 #define call_check_done sec_flg5
4108 /* Get the ppc64 ELF linker hash table from a link_info structure. */
4110 #define ppc_hash_table(p) \
4111 (elf_hash_table_id ((struct elf_link_hash_table *) ((p)->hash)) \
4112 == PPC64_ELF_DATA ? ((struct ppc_link_hash_table *) ((p)->hash)) : NULL)
4114 #define ppc_stub_hash_lookup(table, string, create, copy) \
4115 ((struct ppc_stub_hash_entry *) \
4116 bfd_hash_lookup ((table), (string), (create), (copy)))
4118 #define ppc_branch_hash_lookup(table, string, create, copy) \
4119 ((struct ppc_branch_hash_entry *) \
4120 bfd_hash_lookup ((table), (string), (create), (copy)))
4122 /* Create an entry in the stub hash table. */
4124 static struct bfd_hash_entry
*
4125 stub_hash_newfunc (struct bfd_hash_entry
*entry
,
4126 struct bfd_hash_table
*table
,
4129 /* Allocate the structure if it has not already been allocated by a
4133 entry
= bfd_hash_allocate (table
, sizeof (struct ppc_stub_hash_entry
));
4138 /* Call the allocation method of the superclass. */
4139 entry
= bfd_hash_newfunc (entry
, table
, string
);
4142 struct ppc_stub_hash_entry
*eh
;
4144 /* Initialize the local fields. */
4145 eh
= (struct ppc_stub_hash_entry
*) entry
;
4146 eh
->stub_type
= ppc_stub_none
;
4148 eh
->stub_offset
= 0;
4149 eh
->target_value
= 0;
4150 eh
->target_section
= NULL
;
4159 /* Create an entry in the branch hash table. */
4161 static struct bfd_hash_entry
*
4162 branch_hash_newfunc (struct bfd_hash_entry
*entry
,
4163 struct bfd_hash_table
*table
,
4166 /* Allocate the structure if it has not already been allocated by a
4170 entry
= bfd_hash_allocate (table
, sizeof (struct ppc_branch_hash_entry
));
4175 /* Call the allocation method of the superclass. */
4176 entry
= bfd_hash_newfunc (entry
, table
, string
);
4179 struct ppc_branch_hash_entry
*eh
;
4181 /* Initialize the local fields. */
4182 eh
= (struct ppc_branch_hash_entry
*) entry
;
4190 /* Create an entry in a ppc64 ELF linker hash table. */
4192 static struct bfd_hash_entry
*
4193 link_hash_newfunc (struct bfd_hash_entry
*entry
,
4194 struct bfd_hash_table
*table
,
4197 /* Allocate the structure if it has not already been allocated by a
4201 entry
= bfd_hash_allocate (table
, sizeof (struct ppc_link_hash_entry
));
4206 /* Call the allocation method of the superclass. */
4207 entry
= _bfd_elf_link_hash_newfunc (entry
, table
, string
);
4210 struct ppc_link_hash_entry
*eh
= (struct ppc_link_hash_entry
*) entry
;
4212 memset (&eh
->u
.stub_cache
, 0,
4213 (sizeof (struct ppc_link_hash_entry
)
4214 - offsetof (struct ppc_link_hash_entry
, u
.stub_cache
)));
4216 /* When making function calls, old ABI code references function entry
4217 points (dot symbols), while new ABI code references the function
4218 descriptor symbol. We need to make any combination of reference and
4219 definition work together, without breaking archive linking.
4221 For a defined function "foo" and an undefined call to "bar":
4222 An old object defines "foo" and ".foo", references ".bar" (possibly
4224 A new object defines "foo" and references "bar".
4226 A new object thus has no problem with its undefined symbols being
4227 satisfied by definitions in an old object. On the other hand, the
4228 old object won't have ".bar" satisfied by a new object.
4230 Keep a list of newly added dot-symbols. */
4232 if (string
[0] == '.')
4234 struct ppc_link_hash_table
*htab
;
4236 htab
= (struct ppc_link_hash_table
*) table
;
4237 eh
->u
.next_dot_sym
= htab
->dot_syms
;
4238 htab
->dot_syms
= eh
;
4245 struct tocsave_entry
{
4251 tocsave_htab_hash (const void *p
)
4253 const struct tocsave_entry
*e
= (const struct tocsave_entry
*) p
;
4254 return ((bfd_vma
)(intptr_t) e
->sec
^ e
->offset
) >> 3;
4258 tocsave_htab_eq (const void *p1
, const void *p2
)
4260 const struct tocsave_entry
*e1
= (const struct tocsave_entry
*) p1
;
4261 const struct tocsave_entry
*e2
= (const struct tocsave_entry
*) p2
;
4262 return e1
->sec
== e2
->sec
&& e1
->offset
== e2
->offset
;
4265 /* Destroy a ppc64 ELF linker hash table. */
4268 ppc64_elf_link_hash_table_free (bfd
*obfd
)
4270 struct ppc_link_hash_table
*htab
;
4272 htab
= (struct ppc_link_hash_table
*) obfd
->link
.hash
;
4273 if (htab
->tocsave_htab
)
4274 htab_delete (htab
->tocsave_htab
);
4275 bfd_hash_table_free (&htab
->branch_hash_table
);
4276 bfd_hash_table_free (&htab
->stub_hash_table
);
4277 _bfd_elf_link_hash_table_free (obfd
);
4280 /* Create a ppc64 ELF linker hash table. */
4282 static struct bfd_link_hash_table
*
4283 ppc64_elf_link_hash_table_create (bfd
*abfd
)
4285 struct ppc_link_hash_table
*htab
;
4286 bfd_size_type amt
= sizeof (struct ppc_link_hash_table
);
4288 htab
= bfd_zmalloc (amt
);
4292 if (!_bfd_elf_link_hash_table_init (&htab
->elf
, abfd
, link_hash_newfunc
,
4293 sizeof (struct ppc_link_hash_entry
),
4300 /* Init the stub hash table too. */
4301 if (!bfd_hash_table_init (&htab
->stub_hash_table
, stub_hash_newfunc
,
4302 sizeof (struct ppc_stub_hash_entry
)))
4304 _bfd_elf_link_hash_table_free (abfd
);
4308 /* And the branch hash table. */
4309 if (!bfd_hash_table_init (&htab
->branch_hash_table
, branch_hash_newfunc
,
4310 sizeof (struct ppc_branch_hash_entry
)))
4312 bfd_hash_table_free (&htab
->stub_hash_table
);
4313 _bfd_elf_link_hash_table_free (abfd
);
4317 htab
->tocsave_htab
= htab_try_create (1024,
4321 if (htab
->tocsave_htab
== NULL
)
4323 ppc64_elf_link_hash_table_free (abfd
);
4326 htab
->elf
.root
.hash_table_free
= ppc64_elf_link_hash_table_free
;
4328 /* Initializing two fields of the union is just cosmetic. We really
4329 only care about glist, but when compiled on a 32-bit host the
4330 bfd_vma fields are larger. Setting the bfd_vma to zero makes
4331 debugger inspection of these fields look nicer. */
4332 htab
->elf
.init_got_refcount
.refcount
= 0;
4333 htab
->elf
.init_got_refcount
.glist
= NULL
;
4334 htab
->elf
.init_plt_refcount
.refcount
= 0;
4335 htab
->elf
.init_plt_refcount
.glist
= NULL
;
4336 htab
->elf
.init_got_offset
.offset
= 0;
4337 htab
->elf
.init_got_offset
.glist
= NULL
;
4338 htab
->elf
.init_plt_offset
.offset
= 0;
4339 htab
->elf
.init_plt_offset
.glist
= NULL
;
4341 return &htab
->elf
.root
;
4344 /* Create sections for linker generated code. */
4347 create_linkage_sections (bfd
*dynobj
, struct bfd_link_info
*info
)
4349 struct ppc_link_hash_table
*htab
;
4352 htab
= ppc_hash_table (info
);
4354 flags
= (SEC_ALLOC
| SEC_LOAD
| SEC_CODE
| SEC_READONLY
4355 | SEC_HAS_CONTENTS
| SEC_IN_MEMORY
| SEC_LINKER_CREATED
);
4356 if (htab
->params
->save_restore_funcs
)
4358 /* Create .sfpr for code to save and restore fp regs. */
4359 htab
->sfpr
= bfd_make_section_anyway_with_flags (dynobj
, ".sfpr",
4361 if (htab
->sfpr
== NULL
4362 || ! bfd_set_section_alignment (dynobj
, htab
->sfpr
, 2))
4366 if (bfd_link_relocatable (info
))
4369 /* Create .glink for lazy dynamic linking support. */
4370 htab
->glink
= bfd_make_section_anyway_with_flags (dynobj
, ".glink",
4372 if (htab
->glink
== NULL
4373 || ! bfd_set_section_alignment (dynobj
, htab
->glink
, 3))
4376 if (!info
->no_ld_generated_unwind_info
)
4378 flags
= (SEC_ALLOC
| SEC_LOAD
| SEC_READONLY
| SEC_HAS_CONTENTS
4379 | SEC_IN_MEMORY
| SEC_LINKER_CREATED
);
4380 htab
->glink_eh_frame
= bfd_make_section_anyway_with_flags (dynobj
,
4383 if (htab
->glink_eh_frame
== NULL
4384 || !bfd_set_section_alignment (dynobj
, htab
->glink_eh_frame
, 2))
4388 flags
= SEC_ALLOC
| SEC_LINKER_CREATED
;
4389 htab
->elf
.iplt
= bfd_make_section_anyway_with_flags (dynobj
, ".iplt", flags
);
4390 if (htab
->elf
.iplt
== NULL
4391 || ! bfd_set_section_alignment (dynobj
, htab
->elf
.iplt
, 3))
4394 flags
= (SEC_ALLOC
| SEC_LOAD
| SEC_READONLY
4395 | SEC_HAS_CONTENTS
| SEC_IN_MEMORY
| SEC_LINKER_CREATED
);
4397 = bfd_make_section_anyway_with_flags (dynobj
, ".rela.iplt", flags
);
4398 if (htab
->elf
.irelplt
== NULL
4399 || ! bfd_set_section_alignment (dynobj
, htab
->elf
.irelplt
, 3))
4402 /* Create branch lookup table for plt_branch stubs. */
4403 flags
= (SEC_ALLOC
| SEC_LOAD
4404 | SEC_HAS_CONTENTS
| SEC_IN_MEMORY
| SEC_LINKER_CREATED
);
4405 htab
->brlt
= bfd_make_section_anyway_with_flags (dynobj
, ".branch_lt",
4407 if (htab
->brlt
== NULL
4408 || ! bfd_set_section_alignment (dynobj
, htab
->brlt
, 3))
4411 if (!bfd_link_pic (info
))
4414 flags
= (SEC_ALLOC
| SEC_LOAD
| SEC_READONLY
4415 | SEC_HAS_CONTENTS
| SEC_IN_MEMORY
| SEC_LINKER_CREATED
);
4416 htab
->relbrlt
= bfd_make_section_anyway_with_flags (dynobj
,
4419 if (htab
->relbrlt
== NULL
4420 || ! bfd_set_section_alignment (dynobj
, htab
->relbrlt
, 3))
4426 /* Satisfy the ELF linker by filling in some fields in our fake bfd. */
4429 ppc64_elf_init_stub_bfd (struct bfd_link_info
*info
,
4430 struct ppc64_elf_params
*params
)
4432 struct ppc_link_hash_table
*htab
;
4434 elf_elfheader (params
->stub_bfd
)->e_ident
[EI_CLASS
] = ELFCLASS64
;
4436 /* Always hook our dynamic sections into the first bfd, which is the
4437 linker created stub bfd. This ensures that the GOT header is at
4438 the start of the output TOC section. */
4439 htab
= ppc_hash_table (info
);
4440 htab
->elf
.dynobj
= params
->stub_bfd
;
4441 htab
->params
= params
;
4443 return create_linkage_sections (htab
->elf
.dynobj
, info
);
4446 /* Build a name for an entry in the stub hash table. */
4449 ppc_stub_name (const asection
*input_section
,
4450 const asection
*sym_sec
,
4451 const struct ppc_link_hash_entry
*h
,
4452 const Elf_Internal_Rela
*rel
)
4457 /* rel->r_addend is actually 64 bit, but who uses more than +/- 2^31
4458 offsets from a sym as a branch target? In fact, we could
4459 probably assume the addend is always zero. */
4460 BFD_ASSERT (((int) rel
->r_addend
& 0xffffffff) == rel
->r_addend
);
4464 len
= 8 + 1 + strlen (h
->elf
.root
.root
.string
) + 1 + 8 + 1;
4465 stub_name
= bfd_malloc (len
);
4466 if (stub_name
== NULL
)
4469 len
= sprintf (stub_name
, "%08x.%s+%x",
4470 input_section
->id
& 0xffffffff,
4471 h
->elf
.root
.root
.string
,
4472 (int) rel
->r_addend
& 0xffffffff);
4476 len
= 8 + 1 + 8 + 1 + 8 + 1 + 8 + 1;
4477 stub_name
= bfd_malloc (len
);
4478 if (stub_name
== NULL
)
4481 len
= sprintf (stub_name
, "%08x.%x:%x+%x",
4482 input_section
->id
& 0xffffffff,
4483 sym_sec
->id
& 0xffffffff,
4484 (int) ELF64_R_SYM (rel
->r_info
) & 0xffffffff,
4485 (int) rel
->r_addend
& 0xffffffff);
4487 if (len
> 2 && stub_name
[len
- 2] == '+' && stub_name
[len
- 1] == '0')
4488 stub_name
[len
- 2] = 0;
4492 /* Look up an entry in the stub hash. Stub entries are cached because
4493 creating the stub name takes a bit of time. */
4495 static struct ppc_stub_hash_entry
*
4496 ppc_get_stub_entry (const asection
*input_section
,
4497 const asection
*sym_sec
,
4498 struct ppc_link_hash_entry
*h
,
4499 const Elf_Internal_Rela
*rel
,
4500 struct ppc_link_hash_table
*htab
)
4502 struct ppc_stub_hash_entry
*stub_entry
;
4503 struct map_stub
*group
;
4505 /* If this input section is part of a group of sections sharing one
4506 stub section, then use the id of the first section in the group.
4507 Stub names need to include a section id, as there may well be
4508 more than one stub used to reach say, printf, and we need to
4509 distinguish between them. */
4510 group
= htab
->sec_info
[input_section
->id
].u
.group
;
4514 if (h
!= NULL
&& h
->u
.stub_cache
!= NULL
4515 && h
->u
.stub_cache
->h
== h
4516 && h
->u
.stub_cache
->group
== group
)
4518 stub_entry
= h
->u
.stub_cache
;
4524 stub_name
= ppc_stub_name (group
->link_sec
, sym_sec
, h
, rel
);
4525 if (stub_name
== NULL
)
4528 stub_entry
= ppc_stub_hash_lookup (&htab
->stub_hash_table
,
4529 stub_name
, FALSE
, FALSE
);
4531 h
->u
.stub_cache
= stub_entry
;
4539 /* Add a new stub entry to the stub hash. Not all fields of the new
4540 stub entry are initialised. */
4542 static struct ppc_stub_hash_entry
*
4543 ppc_add_stub (const char *stub_name
,
4545 struct bfd_link_info
*info
)
4547 struct ppc_link_hash_table
*htab
= ppc_hash_table (info
);
4548 struct map_stub
*group
;
4551 struct ppc_stub_hash_entry
*stub_entry
;
4553 group
= htab
->sec_info
[section
->id
].u
.group
;
4554 link_sec
= group
->link_sec
;
4555 stub_sec
= group
->stub_sec
;
4556 if (stub_sec
== NULL
)
4562 namelen
= strlen (link_sec
->name
);
4563 len
= namelen
+ sizeof (STUB_SUFFIX
);
4564 s_name
= bfd_alloc (htab
->params
->stub_bfd
, len
);
4568 memcpy (s_name
, link_sec
->name
, namelen
);
4569 memcpy (s_name
+ namelen
, STUB_SUFFIX
, sizeof (STUB_SUFFIX
));
4570 stub_sec
= (*htab
->params
->add_stub_section
) (s_name
, link_sec
);
4571 if (stub_sec
== NULL
)
4573 group
->stub_sec
= stub_sec
;
4576 /* Enter this entry into the linker stub hash table. */
4577 stub_entry
= ppc_stub_hash_lookup (&htab
->stub_hash_table
, stub_name
,
4579 if (stub_entry
== NULL
)
4581 info
->callbacks
->einfo (_("%P: %B: cannot create stub entry %s\n"),
4582 section
->owner
, stub_name
);
4586 stub_entry
->group
= group
;
4587 stub_entry
->stub_offset
= 0;
4591 /* Create .got and .rela.got sections in ABFD, and .got in dynobj if
4592 not already done. */
4595 create_got_section (bfd
*abfd
, struct bfd_link_info
*info
)
4597 asection
*got
, *relgot
;
4599 struct ppc_link_hash_table
*htab
= ppc_hash_table (info
);
4601 if (!is_ppc64_elf (abfd
))
4607 && !_bfd_elf_create_got_section (htab
->elf
.dynobj
, info
))
4610 flags
= (SEC_ALLOC
| SEC_LOAD
| SEC_HAS_CONTENTS
| SEC_IN_MEMORY
4611 | SEC_LINKER_CREATED
);
4613 got
= bfd_make_section_anyway_with_flags (abfd
, ".got", flags
);
4615 || !bfd_set_section_alignment (abfd
, got
, 3))
4618 relgot
= bfd_make_section_anyway_with_flags (abfd
, ".rela.got",
4619 flags
| SEC_READONLY
);
4621 || ! bfd_set_section_alignment (abfd
, relgot
, 3))
4624 ppc64_elf_tdata (abfd
)->got
= got
;
4625 ppc64_elf_tdata (abfd
)->relgot
= relgot
;
4629 /* Create the dynamic sections, and set up shortcuts. */
4632 ppc64_elf_create_dynamic_sections (bfd
*dynobj
, struct bfd_link_info
*info
)
4634 struct ppc_link_hash_table
*htab
;
4636 if (!_bfd_elf_create_dynamic_sections (dynobj
, info
))
4639 htab
= ppc_hash_table (info
);
4643 htab
->dynbss
= bfd_get_linker_section (dynobj
, ".dynbss");
4644 if (!bfd_link_pic (info
))
4645 htab
->relbss
= bfd_get_linker_section (dynobj
, ".rela.bss");
4647 if (!htab
->elf
.sgot
|| !htab
->elf
.splt
|| !htab
->elf
.srelplt
|| !htab
->dynbss
4648 || (!bfd_link_pic (info
) && !htab
->relbss
))
4654 /* Follow indirect and warning symbol links. */
4656 static inline struct bfd_link_hash_entry
*
4657 follow_link (struct bfd_link_hash_entry
*h
)
4659 while (h
->type
== bfd_link_hash_indirect
4660 || h
->type
== bfd_link_hash_warning
)
4665 static inline struct elf_link_hash_entry
*
4666 elf_follow_link (struct elf_link_hash_entry
*h
)
4668 return (struct elf_link_hash_entry
*) follow_link (&h
->root
);
4671 static inline struct ppc_link_hash_entry
*
4672 ppc_follow_link (struct ppc_link_hash_entry
*h
)
4674 return (struct ppc_link_hash_entry
*) follow_link (&h
->elf
.root
);
4677 /* Merge PLT info on FROM with that on TO. */
4680 move_plt_plist (struct ppc_link_hash_entry
*from
,
4681 struct ppc_link_hash_entry
*to
)
4683 if (from
->elf
.plt
.plist
!= NULL
)
4685 if (to
->elf
.plt
.plist
!= NULL
)
4687 struct plt_entry
**entp
;
4688 struct plt_entry
*ent
;
4690 for (entp
= &from
->elf
.plt
.plist
; (ent
= *entp
) != NULL
; )
4692 struct plt_entry
*dent
;
4694 for (dent
= to
->elf
.plt
.plist
; dent
!= NULL
; dent
= dent
->next
)
4695 if (dent
->addend
== ent
->addend
)
4697 dent
->plt
.refcount
+= ent
->plt
.refcount
;
4704 *entp
= to
->elf
.plt
.plist
;
4707 to
->elf
.plt
.plist
= from
->elf
.plt
.plist
;
4708 from
->elf
.plt
.plist
= NULL
;
4712 /* Copy the extra info we tack onto an elf_link_hash_entry. */
4715 ppc64_elf_copy_indirect_symbol (struct bfd_link_info
*info
,
4716 struct elf_link_hash_entry
*dir
,
4717 struct elf_link_hash_entry
*ind
)
4719 struct ppc_link_hash_entry
*edir
, *eind
;
4721 edir
= (struct ppc_link_hash_entry
*) dir
;
4722 eind
= (struct ppc_link_hash_entry
*) ind
;
4724 edir
->is_func
|= eind
->is_func
;
4725 edir
->is_func_descriptor
|= eind
->is_func_descriptor
;
4726 edir
->tls_mask
|= eind
->tls_mask
;
4727 if (eind
->oh
!= NULL
)
4728 edir
->oh
= ppc_follow_link (eind
->oh
);
4730 /* If called to transfer flags for a weakdef during processing
4731 of elf_adjust_dynamic_symbol, don't copy NON_GOT_REF.
4732 We clear it ourselves for ELIMINATE_COPY_RELOCS. */
4733 if (!(ELIMINATE_COPY_RELOCS
4734 && eind
->elf
.root
.type
!= bfd_link_hash_indirect
4735 && edir
->elf
.dynamic_adjusted
))
4736 edir
->elf
.non_got_ref
|= eind
->elf
.non_got_ref
;
4738 edir
->elf
.ref_dynamic
|= eind
->elf
.ref_dynamic
;
4739 edir
->elf
.ref_regular
|= eind
->elf
.ref_regular
;
4740 edir
->elf
.ref_regular_nonweak
|= eind
->elf
.ref_regular_nonweak
;
4741 edir
->elf
.needs_plt
|= eind
->elf
.needs_plt
;
4742 edir
->elf
.pointer_equality_needed
|= eind
->elf
.pointer_equality_needed
;
4744 /* If we were called to copy over info for a weak sym, don't copy
4745 dyn_relocs, plt/got info, or dynindx. We used to copy dyn_relocs
4746 in order to simplify readonly_dynrelocs and save a field in the
4747 symbol hash entry, but that means dyn_relocs can't be used in any
4748 tests about a specific symbol, or affect other symbol flags which
4750 Chain weakdefs so we can get from the weakdef back to an alias.
4751 The list is circular so that we don't need to use u.weakdef as
4752 well as this list to look at all aliases. */
4753 if (eind
->elf
.root
.type
!= bfd_link_hash_indirect
)
4755 struct ppc_link_hash_entry
*cur
, *add
, *next
;
4760 cur
= edir
->weakref
;
4765 /* We can be called twice for the same symbols.
4766 Don't make multiple loops. */
4770 } while (cur
!= edir
);
4772 next
= add
->weakref
;
4775 add
->weakref
= edir
->weakref
!= NULL
? edir
->weakref
: edir
;
4776 edir
->weakref
= add
;
4779 } while (add
!= NULL
&& add
!= eind
);
4783 /* Copy over any dynamic relocs we may have on the indirect sym. */
4784 if (eind
->dyn_relocs
!= NULL
)
4786 if (edir
->dyn_relocs
!= NULL
)
4788 struct elf_dyn_relocs
**pp
;
4789 struct elf_dyn_relocs
*p
;
4791 /* Add reloc counts against the indirect sym to the direct sym
4792 list. Merge any entries against the same section. */
4793 for (pp
= &eind
->dyn_relocs
; (p
= *pp
) != NULL
; )
4795 struct elf_dyn_relocs
*q
;
4797 for (q
= edir
->dyn_relocs
; q
!= NULL
; q
= q
->next
)
4798 if (q
->sec
== p
->sec
)
4800 q
->pc_count
+= p
->pc_count
;
4801 q
->count
+= p
->count
;
4808 *pp
= edir
->dyn_relocs
;
4811 edir
->dyn_relocs
= eind
->dyn_relocs
;
4812 eind
->dyn_relocs
= NULL
;
4815 /* Copy over got entries that we may have already seen to the
4816 symbol which just became indirect. */
4817 if (eind
->elf
.got
.glist
!= NULL
)
4819 if (edir
->elf
.got
.glist
!= NULL
)
4821 struct got_entry
**entp
;
4822 struct got_entry
*ent
;
4824 for (entp
= &eind
->elf
.got
.glist
; (ent
= *entp
) != NULL
; )
4826 struct got_entry
*dent
;
4828 for (dent
= edir
->elf
.got
.glist
; dent
!= NULL
; dent
= dent
->next
)
4829 if (dent
->addend
== ent
->addend
4830 && dent
->owner
== ent
->owner
4831 && dent
->tls_type
== ent
->tls_type
)
4833 dent
->got
.refcount
+= ent
->got
.refcount
;
4840 *entp
= edir
->elf
.got
.glist
;
4843 edir
->elf
.got
.glist
= eind
->elf
.got
.glist
;
4844 eind
->elf
.got
.glist
= NULL
;
4847 /* And plt entries. */
4848 move_plt_plist (eind
, edir
);
4850 if (eind
->elf
.dynindx
!= -1)
4852 if (edir
->elf
.dynindx
!= -1)
4853 _bfd_elf_strtab_delref (elf_hash_table (info
)->dynstr
,
4854 edir
->elf
.dynstr_index
);
4855 edir
->elf
.dynindx
= eind
->elf
.dynindx
;
4856 edir
->elf
.dynstr_index
= eind
->elf
.dynstr_index
;
4857 eind
->elf
.dynindx
= -1;
4858 eind
->elf
.dynstr_index
= 0;
4862 /* Find the function descriptor hash entry from the given function code
4863 hash entry FH. Link the entries via their OH fields. */
4865 static struct ppc_link_hash_entry
*
4866 lookup_fdh (struct ppc_link_hash_entry
*fh
, struct ppc_link_hash_table
*htab
)
4868 struct ppc_link_hash_entry
*fdh
= fh
->oh
;
4872 const char *fd_name
= fh
->elf
.root
.root
.string
+ 1;
4874 fdh
= (struct ppc_link_hash_entry
*)
4875 elf_link_hash_lookup (&htab
->elf
, fd_name
, FALSE
, FALSE
, FALSE
);
4879 fdh
->is_func_descriptor
= 1;
4885 return ppc_follow_link (fdh
);
4888 /* Make a fake function descriptor sym for the code sym FH. */
4890 static struct ppc_link_hash_entry
*
4891 make_fdh (struct bfd_link_info
*info
,
4892 struct ppc_link_hash_entry
*fh
)
4896 struct bfd_link_hash_entry
*bh
;
4897 struct ppc_link_hash_entry
*fdh
;
4899 abfd
= fh
->elf
.root
.u
.undef
.abfd
;
4900 newsym
= bfd_make_empty_symbol (abfd
);
4901 newsym
->name
= fh
->elf
.root
.root
.string
+ 1;
4902 newsym
->section
= bfd_und_section_ptr
;
4904 newsym
->flags
= BSF_WEAK
;
4907 if (!_bfd_generic_link_add_one_symbol (info
, abfd
, newsym
->name
,
4908 newsym
->flags
, newsym
->section
,
4909 newsym
->value
, NULL
, FALSE
, FALSE
,
4913 fdh
= (struct ppc_link_hash_entry
*) bh
;
4914 fdh
->elf
.non_elf
= 0;
4916 fdh
->is_func_descriptor
= 1;
4923 /* Fix function descriptor symbols defined in .opd sections to be
4927 ppc64_elf_add_symbol_hook (bfd
*ibfd
,
4928 struct bfd_link_info
*info
,
4929 Elf_Internal_Sym
*isym
,
4931 flagword
*flags ATTRIBUTE_UNUSED
,
4935 if (ELF_ST_TYPE (isym
->st_info
) == STT_GNU_IFUNC
4936 && (ibfd
->flags
& DYNAMIC
) == 0
4937 && bfd_get_flavour (info
->output_bfd
) == bfd_target_elf_flavour
)
4938 elf_tdata (info
->output_bfd
)->has_gnu_symbols
|= elf_gnu_symbol_ifunc
;
4941 && strcmp ((*sec
)->name
, ".opd") == 0)
4945 if (!(ELF_ST_TYPE (isym
->st_info
) == STT_GNU_IFUNC
4946 || ELF_ST_TYPE (isym
->st_info
) == STT_FUNC
))
4947 isym
->st_info
= ELF_ST_INFO (ELF_ST_BIND (isym
->st_info
), STT_FUNC
);
4949 /* If the symbol is a function defined in .opd, and the function
4950 code is in a discarded group, let it appear to be undefined. */
4951 if (!bfd_link_relocatable (info
)
4952 && (*sec
)->reloc_count
!= 0
4953 && opd_entry_value (*sec
, *value
, &code_sec
, NULL
,
4954 FALSE
) != (bfd_vma
) -1
4955 && discarded_section (code_sec
))
4957 *sec
= bfd_und_section_ptr
;
4958 isym
->st_shndx
= SHN_UNDEF
;
4961 else if (*sec
!= NULL
4962 && strcmp ((*sec
)->name
, ".toc") == 0
4963 && ELF_ST_TYPE (isym
->st_info
) == STT_OBJECT
)
4965 struct ppc_link_hash_table
*htab
= ppc_hash_table (info
);
4967 htab
->params
->object_in_toc
= 1;
4970 if ((STO_PPC64_LOCAL_MASK
& isym
->st_other
) != 0)
4972 if (abiversion (ibfd
) == 0)
4973 set_abiversion (ibfd
, 2);
4974 else if (abiversion (ibfd
) == 1)
4976 info
->callbacks
->einfo (_("%P: symbol '%s' has invalid st_other"
4977 " for ABI version 1\n"), name
);
4978 bfd_set_error (bfd_error_bad_value
);
4986 /* Merge non-visibility st_other attributes: local entry point. */
4989 ppc64_elf_merge_symbol_attribute (struct elf_link_hash_entry
*h
,
4990 const Elf_Internal_Sym
*isym
,
4991 bfd_boolean definition
,
4992 bfd_boolean dynamic
)
4994 if (definition
&& !dynamic
)
4995 h
->other
= ((isym
->st_other
& ~ELF_ST_VISIBILITY (-1))
4996 | ELF_ST_VISIBILITY (h
->other
));
4999 /* This function makes an old ABI object reference to ".bar" cause the
5000 inclusion of a new ABI object archive that defines "bar".
5001 NAME is a symbol defined in an archive. Return a symbol in the hash
5002 table that might be satisfied by the archive symbols. */
5004 static struct elf_link_hash_entry
*
5005 ppc64_elf_archive_symbol_lookup (bfd
*abfd
,
5006 struct bfd_link_info
*info
,
5009 struct elf_link_hash_entry
*h
;
5013 h
= _bfd_elf_archive_symbol_lookup (abfd
, info
, name
);
5015 /* Don't return this sym if it is a fake function descriptor
5016 created by add_symbol_adjust. */
5017 && !(h
->root
.type
== bfd_link_hash_undefweak
5018 && ((struct ppc_link_hash_entry
*) h
)->fake
))
5024 len
= strlen (name
);
5025 dot_name
= bfd_alloc (abfd
, len
+ 2);
5026 if (dot_name
== NULL
)
5027 return (struct elf_link_hash_entry
*) 0 - 1;
5029 memcpy (dot_name
+ 1, name
, len
+ 1);
5030 h
= _bfd_elf_archive_symbol_lookup (abfd
, info
, dot_name
);
5031 bfd_release (abfd
, dot_name
);
5035 /* This function satisfies all old ABI object references to ".bar" if a
5036 new ABI object defines "bar". Well, at least, undefined dot symbols
5037 are made weak. This stops later archive searches from including an
5038 object if we already have a function descriptor definition. It also
5039 prevents the linker complaining about undefined symbols.
5040 We also check and correct mismatched symbol visibility here. The
5041 most restrictive visibility of the function descriptor and the
5042 function entry symbol is used. */
5045 add_symbol_adjust (struct ppc_link_hash_entry
*eh
, struct bfd_link_info
*info
)
5047 struct ppc_link_hash_table
*htab
;
5048 struct ppc_link_hash_entry
*fdh
;
5050 if (eh
->elf
.root
.type
== bfd_link_hash_indirect
)
5053 if (eh
->elf
.root
.type
== bfd_link_hash_warning
)
5054 eh
= (struct ppc_link_hash_entry
*) eh
->elf
.root
.u
.i
.link
;
5056 if (eh
->elf
.root
.root
.string
[0] != '.')
5059 htab
= ppc_hash_table (info
);
5063 fdh
= lookup_fdh (eh
, htab
);
5066 if (!bfd_link_relocatable (info
)
5067 && (eh
->elf
.root
.type
== bfd_link_hash_undefined
5068 || eh
->elf
.root
.type
== bfd_link_hash_undefweak
)
5069 && eh
->elf
.ref_regular
)
5071 /* Make an undefweak function descriptor sym, which is enough to
5072 pull in an --as-needed shared lib, but won't cause link
5073 errors. Archives are handled elsewhere. */
5074 fdh
= make_fdh (info
, eh
);
5077 fdh
->elf
.ref_regular
= 1;
5082 unsigned entry_vis
= ELF_ST_VISIBILITY (eh
->elf
.other
) - 1;
5083 unsigned descr_vis
= ELF_ST_VISIBILITY (fdh
->elf
.other
) - 1;
5084 if (entry_vis
< descr_vis
)
5085 fdh
->elf
.other
+= entry_vis
- descr_vis
;
5086 else if (entry_vis
> descr_vis
)
5087 eh
->elf
.other
+= descr_vis
- entry_vis
;
5089 if ((fdh
->elf
.root
.type
== bfd_link_hash_defined
5090 || fdh
->elf
.root
.type
== bfd_link_hash_defweak
)
5091 && eh
->elf
.root
.type
== bfd_link_hash_undefined
)
5093 eh
->elf
.root
.type
= bfd_link_hash_undefweak
;
5094 eh
->was_undefined
= 1;
5095 htab
->twiddled_syms
= 1;
5102 /* Set up opd section info and abiversion for IBFD, and process list
5103 of dot-symbols we made in link_hash_newfunc. */
5106 ppc64_elf_before_check_relocs (bfd
*ibfd
, struct bfd_link_info
*info
)
5108 struct ppc_link_hash_table
*htab
;
5109 struct ppc_link_hash_entry
**p
, *eh
;
5110 asection
*opd
= bfd_get_section_by_name (ibfd
, ".opd");
5112 if (opd
!= NULL
&& opd
->size
!= 0)
5114 if (abiversion (ibfd
) == 0)
5115 set_abiversion (ibfd
, 1);
5116 else if (abiversion (ibfd
) >= 2)
5118 info
->callbacks
->einfo (_("%P: %B .opd not allowed in ABI"
5120 ibfd
, abiversion (ibfd
));
5121 bfd_set_error (bfd_error_bad_value
);
5125 if ((ibfd
->flags
& DYNAMIC
) == 0
5126 && (opd
->flags
& SEC_RELOC
) != 0
5127 && opd
->reloc_count
!= 0
5128 && !bfd_is_abs_section (opd
->output_section
))
5130 /* Garbage collection needs some extra help with .opd sections.
5131 We don't want to necessarily keep everything referenced by
5132 relocs in .opd, as that would keep all functions. Instead,
5133 if we reference an .opd symbol (a function descriptor), we
5134 want to keep the function code symbol's section. This is
5135 easy for global symbols, but for local syms we need to keep
5136 information about the associated function section. */
5138 asection
**opd_sym_map
;
5140 amt
= OPD_NDX (opd
->size
) * sizeof (*opd_sym_map
);
5141 opd_sym_map
= bfd_zalloc (ibfd
, amt
);
5142 if (opd_sym_map
== NULL
)
5144 ppc64_elf_section_data (opd
)->u
.opd
.func_sec
= opd_sym_map
;
5145 BFD_ASSERT (ppc64_elf_section_data (opd
)->sec_type
== sec_normal
);
5146 ppc64_elf_section_data (opd
)->sec_type
= sec_opd
;
5150 if (!is_ppc64_elf (info
->output_bfd
))
5152 htab
= ppc_hash_table (info
);
5156 /* For input files without an explicit abiversion in e_flags
5157 we should have flagged any with symbol st_other bits set
5158 as ELFv1 and above flagged those with .opd as ELFv2.
5159 Set the output abiversion if not yet set, and for any input
5160 still ambiguous, take its abiversion from the output.
5161 Differences in ABI are reported later. */
5162 if (abiversion (info
->output_bfd
) == 0)
5163 set_abiversion (info
->output_bfd
, abiversion (ibfd
));
5164 else if (abiversion (ibfd
) == 0)
5165 set_abiversion (ibfd
, abiversion (info
->output_bfd
));
5167 p
= &htab
->dot_syms
;
5168 while ((eh
= *p
) != NULL
)
5171 if (&eh
->elf
== htab
->elf
.hgot
)
5173 else if (htab
->elf
.hgot
== NULL
5174 && strcmp (eh
->elf
.root
.root
.string
, ".TOC.") == 0)
5175 htab
->elf
.hgot
= &eh
->elf
;
5176 else if (!add_symbol_adjust (eh
, info
))
5178 p
= &eh
->u
.next_dot_sym
;
5181 /* Clear the list for non-ppc64 input files. */
5182 p
= &htab
->dot_syms
;
5183 while ((eh
= *p
) != NULL
)
5186 p
= &eh
->u
.next_dot_sym
;
5189 /* We need to fix the undefs list for any syms we have twiddled to
5191 if (htab
->twiddled_syms
)
5193 bfd_link_repair_undef_list (&htab
->elf
.root
);
5194 htab
->twiddled_syms
= 0;
5199 /* Undo hash table changes when an --as-needed input file is determined
5200 not to be needed. */
5203 ppc64_elf_notice_as_needed (bfd
*ibfd
,
5204 struct bfd_link_info
*info
,
5205 enum notice_asneeded_action act
)
5207 if (act
== notice_not_needed
)
5209 struct ppc_link_hash_table
*htab
= ppc_hash_table (info
);
5214 htab
->dot_syms
= NULL
;
5216 return _bfd_elf_notice_as_needed (ibfd
, info
, act
);
5219 /* If --just-symbols against a final linked binary, then assume we need
5220 toc adjusting stubs when calling functions defined there. */
5223 ppc64_elf_link_just_syms (asection
*sec
, struct bfd_link_info
*info
)
5225 if ((sec
->flags
& SEC_CODE
) != 0
5226 && (sec
->owner
->flags
& (EXEC_P
| DYNAMIC
)) != 0
5227 && is_ppc64_elf (sec
->owner
))
5229 if (abiversion (sec
->owner
) >= 2
5230 || bfd_get_section_by_name (sec
->owner
, ".opd") != NULL
)
5231 sec
->has_toc_reloc
= 1;
5233 _bfd_elf_link_just_syms (sec
, info
);
5236 static struct plt_entry
**
5237 update_local_sym_info (bfd
*abfd
, Elf_Internal_Shdr
*symtab_hdr
,
5238 unsigned long r_symndx
, bfd_vma r_addend
, int tls_type
)
5240 struct got_entry
**local_got_ents
= elf_local_got_ents (abfd
);
5241 struct plt_entry
**local_plt
;
5242 unsigned char *local_got_tls_masks
;
5244 if (local_got_ents
== NULL
)
5246 bfd_size_type size
= symtab_hdr
->sh_info
;
5248 size
*= (sizeof (*local_got_ents
)
5249 + sizeof (*local_plt
)
5250 + sizeof (*local_got_tls_masks
));
5251 local_got_ents
= bfd_zalloc (abfd
, size
);
5252 if (local_got_ents
== NULL
)
5254 elf_local_got_ents (abfd
) = local_got_ents
;
5257 if ((tls_type
& (PLT_IFUNC
| TLS_EXPLICIT
)) == 0)
5259 struct got_entry
*ent
;
5261 for (ent
= local_got_ents
[r_symndx
]; ent
!= NULL
; ent
= ent
->next
)
5262 if (ent
->addend
== r_addend
5263 && ent
->owner
== abfd
5264 && ent
->tls_type
== tls_type
)
5268 bfd_size_type amt
= sizeof (*ent
);
5269 ent
= bfd_alloc (abfd
, amt
);
5272 ent
->next
= local_got_ents
[r_symndx
];
5273 ent
->addend
= r_addend
;
5275 ent
->tls_type
= tls_type
;
5276 ent
->is_indirect
= FALSE
;
5277 ent
->got
.refcount
= 0;
5278 local_got_ents
[r_symndx
] = ent
;
5280 ent
->got
.refcount
+= 1;
5283 local_plt
= (struct plt_entry
**) (local_got_ents
+ symtab_hdr
->sh_info
);
5284 local_got_tls_masks
= (unsigned char *) (local_plt
+ symtab_hdr
->sh_info
);
5285 local_got_tls_masks
[r_symndx
] |= tls_type
;
5287 return local_plt
+ r_symndx
;
5291 update_plt_info (bfd
*abfd
, struct plt_entry
**plist
, bfd_vma addend
)
5293 struct plt_entry
*ent
;
5295 for (ent
= *plist
; ent
!= NULL
; ent
= ent
->next
)
5296 if (ent
->addend
== addend
)
5300 bfd_size_type amt
= sizeof (*ent
);
5301 ent
= bfd_alloc (abfd
, amt
);
5305 ent
->addend
= addend
;
5306 ent
->plt
.refcount
= 0;
5309 ent
->plt
.refcount
+= 1;
5314 is_branch_reloc (enum elf_ppc64_reloc_type r_type
)
5316 return (r_type
== R_PPC64_REL24
5317 || r_type
== R_PPC64_REL14
5318 || r_type
== R_PPC64_REL14_BRTAKEN
5319 || r_type
== R_PPC64_REL14_BRNTAKEN
5320 || r_type
== R_PPC64_ADDR24
5321 || r_type
== R_PPC64_ADDR14
5322 || r_type
== R_PPC64_ADDR14_BRTAKEN
5323 || r_type
== R_PPC64_ADDR14_BRNTAKEN
);
5326 /* Look through the relocs for a section during the first phase, and
5327 calculate needed space in the global offset table, procedure
5328 linkage table, and dynamic reloc sections. */
5331 ppc64_elf_check_relocs (bfd
*abfd
, struct bfd_link_info
*info
,
5332 asection
*sec
, const Elf_Internal_Rela
*relocs
)
5334 struct ppc_link_hash_table
*htab
;
5335 Elf_Internal_Shdr
*symtab_hdr
;
5336 struct elf_link_hash_entry
**sym_hashes
;
5337 const Elf_Internal_Rela
*rel
;
5338 const Elf_Internal_Rela
*rel_end
;
5340 asection
**opd_sym_map
;
5341 struct elf_link_hash_entry
*tga
, *dottga
;
5343 if (bfd_link_relocatable (info
))
5346 /* Don't do anything special with non-loaded, non-alloced sections.
5347 In particular, any relocs in such sections should not affect GOT
5348 and PLT reference counting (ie. we don't allow them to create GOT
5349 or PLT entries), there's no possibility or desire to optimize TLS
5350 relocs, and there's not much point in propagating relocs to shared
5351 libs that the dynamic linker won't relocate. */
5352 if ((sec
->flags
& SEC_ALLOC
) == 0)
5355 BFD_ASSERT (is_ppc64_elf (abfd
));
5357 htab
= ppc_hash_table (info
);
5361 tga
= elf_link_hash_lookup (&htab
->elf
, "__tls_get_addr",
5362 FALSE
, FALSE
, TRUE
);
5363 dottga
= elf_link_hash_lookup (&htab
->elf
, ".__tls_get_addr",
5364 FALSE
, FALSE
, TRUE
);
5365 symtab_hdr
= &elf_symtab_hdr (abfd
);
5366 sym_hashes
= elf_sym_hashes (abfd
);
5369 if (ppc64_elf_section_data (sec
) != NULL
5370 && ppc64_elf_section_data (sec
)->sec_type
== sec_opd
)
5371 opd_sym_map
= ppc64_elf_section_data (sec
)->u
.opd
.func_sec
;
5373 rel_end
= relocs
+ sec
->reloc_count
;
5374 for (rel
= relocs
; rel
< rel_end
; rel
++)
5376 unsigned long r_symndx
;
5377 struct elf_link_hash_entry
*h
;
5378 enum elf_ppc64_reloc_type r_type
;
5380 struct _ppc64_elf_section_data
*ppc64_sec
;
5381 struct plt_entry
**ifunc
, **plt_list
;
5383 r_symndx
= ELF64_R_SYM (rel
->r_info
);
5384 if (r_symndx
< symtab_hdr
->sh_info
)
5388 h
= sym_hashes
[r_symndx
- symtab_hdr
->sh_info
];
5389 h
= elf_follow_link (h
);
5391 /* PR15323, ref flags aren't set for references in the same
5393 h
->root
.non_ir_ref
= 1;
5395 if (h
== htab
->elf
.hgot
)
5396 sec
->has_toc_reloc
= 1;
5403 if (h
->type
== STT_GNU_IFUNC
)
5406 ifunc
= &h
->plt
.plist
;
5411 Elf_Internal_Sym
*isym
= bfd_sym_from_r_symndx (&htab
->sym_cache
,
5416 if (ELF_ST_TYPE (isym
->st_info
) == STT_GNU_IFUNC
)
5418 ifunc
= update_local_sym_info (abfd
, symtab_hdr
, r_symndx
,
5419 rel
->r_addend
, PLT_IFUNC
);
5425 r_type
= ELF64_R_TYPE (rel
->r_info
);
5430 /* These special tls relocs tie a call to __tls_get_addr with
5431 its parameter symbol. */
5434 case R_PPC64_GOT_TLSLD16
:
5435 case R_PPC64_GOT_TLSLD16_LO
:
5436 case R_PPC64_GOT_TLSLD16_HI
:
5437 case R_PPC64_GOT_TLSLD16_HA
:
5438 tls_type
= TLS_TLS
| TLS_LD
;
5441 case R_PPC64_GOT_TLSGD16
:
5442 case R_PPC64_GOT_TLSGD16_LO
:
5443 case R_PPC64_GOT_TLSGD16_HI
:
5444 case R_PPC64_GOT_TLSGD16_HA
:
5445 tls_type
= TLS_TLS
| TLS_GD
;
5448 case R_PPC64_GOT_TPREL16_DS
:
5449 case R_PPC64_GOT_TPREL16_LO_DS
:
5450 case R_PPC64_GOT_TPREL16_HI
:
5451 case R_PPC64_GOT_TPREL16_HA
:
5452 if (bfd_link_pic (info
))
5453 info
->flags
|= DF_STATIC_TLS
;
5454 tls_type
= TLS_TLS
| TLS_TPREL
;
5457 case R_PPC64_GOT_DTPREL16_DS
:
5458 case R_PPC64_GOT_DTPREL16_LO_DS
:
5459 case R_PPC64_GOT_DTPREL16_HI
:
5460 case R_PPC64_GOT_DTPREL16_HA
:
5461 tls_type
= TLS_TLS
| TLS_DTPREL
;
5463 sec
->has_tls_reloc
= 1;
5467 case R_PPC64_GOT16_DS
:
5468 case R_PPC64_GOT16_HA
:
5469 case R_PPC64_GOT16_HI
:
5470 case R_PPC64_GOT16_LO
:
5471 case R_PPC64_GOT16_LO_DS
:
5472 /* This symbol requires a global offset table entry. */
5473 sec
->has_toc_reloc
= 1;
5474 if (r_type
== R_PPC64_GOT_TLSLD16
5475 || r_type
== R_PPC64_GOT_TLSGD16
5476 || r_type
== R_PPC64_GOT_TPREL16_DS
5477 || r_type
== R_PPC64_GOT_DTPREL16_DS
5478 || r_type
== R_PPC64_GOT16
5479 || r_type
== R_PPC64_GOT16_DS
)
5481 htab
->do_multi_toc
= 1;
5482 ppc64_elf_tdata (abfd
)->has_small_toc_reloc
= 1;
5485 if (ppc64_elf_tdata (abfd
)->got
== NULL
5486 && !create_got_section (abfd
, info
))
5491 struct ppc_link_hash_entry
*eh
;
5492 struct got_entry
*ent
;
5494 eh
= (struct ppc_link_hash_entry
*) h
;
5495 for (ent
= eh
->elf
.got
.glist
; ent
!= NULL
; ent
= ent
->next
)
5496 if (ent
->addend
== rel
->r_addend
5497 && ent
->owner
== abfd
5498 && ent
->tls_type
== tls_type
)
5502 bfd_size_type amt
= sizeof (*ent
);
5503 ent
= bfd_alloc (abfd
, amt
);
5506 ent
->next
= eh
->elf
.got
.glist
;
5507 ent
->addend
= rel
->r_addend
;
5509 ent
->tls_type
= tls_type
;
5510 ent
->is_indirect
= FALSE
;
5511 ent
->got
.refcount
= 0;
5512 eh
->elf
.got
.glist
= ent
;
5514 ent
->got
.refcount
+= 1;
5515 eh
->tls_mask
|= tls_type
;
5518 /* This is a global offset table entry for a local symbol. */
5519 if (!update_local_sym_info (abfd
, symtab_hdr
, r_symndx
,
5520 rel
->r_addend
, tls_type
))
5523 /* We may also need a plt entry if the symbol turns out to be
5525 if (h
!= NULL
&& !bfd_link_pic (info
) && abiversion (abfd
) != 1)
5527 if (!update_plt_info (abfd
, &h
->plt
.plist
, rel
->r_addend
))
5532 case R_PPC64_PLT16_HA
:
5533 case R_PPC64_PLT16_HI
:
5534 case R_PPC64_PLT16_LO
:
5537 /* This symbol requires a procedure linkage table entry. */
5542 if (h
->root
.root
.string
[0] == '.'
5543 && h
->root
.root
.string
[1] != '\0')
5544 ((struct ppc_link_hash_entry
*) h
)->is_func
= 1;
5545 plt_list
= &h
->plt
.plist
;
5547 if (plt_list
== NULL
)
5549 /* It does not make sense to have a procedure linkage
5550 table entry for a non-ifunc local symbol. */
5551 info
->callbacks
->einfo
5552 (_("%P: %H: %s reloc against local symbol\n"),
5553 abfd
, sec
, rel
->r_offset
,
5554 ppc64_elf_howto_table
[r_type
]->name
);
5555 bfd_set_error (bfd_error_bad_value
);
5558 if (!update_plt_info (abfd
, plt_list
, rel
->r_addend
))
5562 /* The following relocations don't need to propagate the
5563 relocation if linking a shared object since they are
5564 section relative. */
5565 case R_PPC64_SECTOFF
:
5566 case R_PPC64_SECTOFF_LO
:
5567 case R_PPC64_SECTOFF_HI
:
5568 case R_PPC64_SECTOFF_HA
:
5569 case R_PPC64_SECTOFF_DS
:
5570 case R_PPC64_SECTOFF_LO_DS
:
5571 case R_PPC64_DTPREL16
:
5572 case R_PPC64_DTPREL16_LO
:
5573 case R_PPC64_DTPREL16_HI
:
5574 case R_PPC64_DTPREL16_HA
:
5575 case R_PPC64_DTPREL16_DS
:
5576 case R_PPC64_DTPREL16_LO_DS
:
5577 case R_PPC64_DTPREL16_HIGH
:
5578 case R_PPC64_DTPREL16_HIGHA
:
5579 case R_PPC64_DTPREL16_HIGHER
:
5580 case R_PPC64_DTPREL16_HIGHERA
:
5581 case R_PPC64_DTPREL16_HIGHEST
:
5582 case R_PPC64_DTPREL16_HIGHESTA
:
5587 case R_PPC64_REL16_LO
:
5588 case R_PPC64_REL16_HI
:
5589 case R_PPC64_REL16_HA
:
5590 case R_PPC64_REL16DX_HA
:
5593 /* Not supported as a dynamic relocation. */
5594 case R_PPC64_ADDR64_LOCAL
:
5595 if (bfd_link_pic (info
))
5597 if (!ppc64_elf_howto_table
[R_PPC64_ADDR32
])
5599 info
->callbacks
->einfo (_("%P: %H: %s reloc unsupported "
5600 "in shared libraries and PIEs.\n"),
5601 abfd
, sec
, rel
->r_offset
,
5602 ppc64_elf_howto_table
[r_type
]->name
);
5603 bfd_set_error (bfd_error_bad_value
);
5609 case R_PPC64_TOC16_DS
:
5610 htab
->do_multi_toc
= 1;
5611 ppc64_elf_tdata (abfd
)->has_small_toc_reloc
= 1;
5612 case R_PPC64_TOC16_LO
:
5613 case R_PPC64_TOC16_HI
:
5614 case R_PPC64_TOC16_HA
:
5615 case R_PPC64_TOC16_LO_DS
:
5616 sec
->has_toc_reloc
= 1;
5623 /* This relocation describes the C++ object vtable hierarchy.
5624 Reconstruct it for later use during GC. */
5625 case R_PPC64_GNU_VTINHERIT
:
5626 if (!bfd_elf_gc_record_vtinherit (abfd
, sec
, h
, rel
->r_offset
))
5630 /* This relocation describes which C++ vtable entries are actually
5631 used. Record for later use during GC. */
5632 case R_PPC64_GNU_VTENTRY
:
5633 BFD_ASSERT (h
!= NULL
);
5635 && !bfd_elf_gc_record_vtentry (abfd
, sec
, h
, rel
->r_addend
))
5640 case R_PPC64_REL14_BRTAKEN
:
5641 case R_PPC64_REL14_BRNTAKEN
:
5643 asection
*dest
= NULL
;
5645 /* Heuristic: If jumping outside our section, chances are
5646 we are going to need a stub. */
5649 /* If the sym is weak it may be overridden later, so
5650 don't assume we know where a weak sym lives. */
5651 if (h
->root
.type
== bfd_link_hash_defined
)
5652 dest
= h
->root
.u
.def
.section
;
5656 Elf_Internal_Sym
*isym
;
5658 isym
= bfd_sym_from_r_symndx (&htab
->sym_cache
,
5663 dest
= bfd_section_from_elf_index (abfd
, isym
->st_shndx
);
5667 ppc64_elf_section_data (sec
)->has_14bit_branch
= 1;
5676 if (h
->root
.root
.string
[0] == '.'
5677 && h
->root
.root
.string
[1] != '\0')
5678 ((struct ppc_link_hash_entry
*) h
)->is_func
= 1;
5680 if (h
== tga
|| h
== dottga
)
5682 sec
->has_tls_reloc
= 1;
5684 && (ELF64_R_TYPE (rel
[-1].r_info
) == R_PPC64_TLSGD
5685 || ELF64_R_TYPE (rel
[-1].r_info
) == R_PPC64_TLSLD
))
5686 /* We have a new-style __tls_get_addr call with
5690 /* Mark this section as having an old-style call. */
5691 sec
->has_tls_get_addr_call
= 1;
5693 plt_list
= &h
->plt
.plist
;
5696 /* We may need a .plt entry if the function this reloc
5697 refers to is in a shared lib. */
5699 && !update_plt_info (abfd
, plt_list
, rel
->r_addend
))
5703 case R_PPC64_ADDR14
:
5704 case R_PPC64_ADDR14_BRNTAKEN
:
5705 case R_PPC64_ADDR14_BRTAKEN
:
5706 case R_PPC64_ADDR24
:
5709 case R_PPC64_TPREL64
:
5710 tls_type
= TLS_EXPLICIT
| TLS_TLS
| TLS_TPREL
;
5711 if (bfd_link_pic (info
))
5712 info
->flags
|= DF_STATIC_TLS
;
5715 case R_PPC64_DTPMOD64
:
5716 if (rel
+ 1 < rel_end
5717 && rel
[1].r_info
== ELF64_R_INFO (r_symndx
, R_PPC64_DTPREL64
)
5718 && rel
[1].r_offset
== rel
->r_offset
+ 8)
5719 tls_type
= TLS_EXPLICIT
| TLS_TLS
| TLS_GD
;
5721 tls_type
= TLS_EXPLICIT
| TLS_TLS
| TLS_LD
;
5724 case R_PPC64_DTPREL64
:
5725 tls_type
= TLS_EXPLICIT
| TLS_TLS
| TLS_DTPREL
;
5727 && rel
[-1].r_info
== ELF64_R_INFO (r_symndx
, R_PPC64_DTPMOD64
)
5728 && rel
[-1].r_offset
== rel
->r_offset
- 8)
5729 /* This is the second reloc of a dtpmod, dtprel pair.
5730 Don't mark with TLS_DTPREL. */
5734 sec
->has_tls_reloc
= 1;
5737 struct ppc_link_hash_entry
*eh
;
5738 eh
= (struct ppc_link_hash_entry
*) h
;
5739 eh
->tls_mask
|= tls_type
;
5742 if (!update_local_sym_info (abfd
, symtab_hdr
, r_symndx
,
5743 rel
->r_addend
, tls_type
))
5746 ppc64_sec
= ppc64_elf_section_data (sec
);
5747 if (ppc64_sec
->sec_type
!= sec_toc
)
5751 /* One extra to simplify get_tls_mask. */
5752 amt
= sec
->size
* sizeof (unsigned) / 8 + sizeof (unsigned);
5753 ppc64_sec
->u
.toc
.symndx
= bfd_zalloc (abfd
, amt
);
5754 if (ppc64_sec
->u
.toc
.symndx
== NULL
)
5756 amt
= sec
->size
* sizeof (bfd_vma
) / 8;
5757 ppc64_sec
->u
.toc
.add
= bfd_zalloc (abfd
, amt
);
5758 if (ppc64_sec
->u
.toc
.add
== NULL
)
5760 BFD_ASSERT (ppc64_sec
->sec_type
== sec_normal
);
5761 ppc64_sec
->sec_type
= sec_toc
;
5763 BFD_ASSERT (rel
->r_offset
% 8 == 0);
5764 ppc64_sec
->u
.toc
.symndx
[rel
->r_offset
/ 8] = r_symndx
;
5765 ppc64_sec
->u
.toc
.add
[rel
->r_offset
/ 8] = rel
->r_addend
;
5767 /* Mark the second slot of a GD or LD entry.
5768 -1 to indicate GD and -2 to indicate LD. */
5769 if (tls_type
== (TLS_EXPLICIT
| TLS_TLS
| TLS_GD
))
5770 ppc64_sec
->u
.toc
.symndx
[rel
->r_offset
/ 8 + 1] = -1;
5771 else if (tls_type
== (TLS_EXPLICIT
| TLS_TLS
| TLS_LD
))
5772 ppc64_sec
->u
.toc
.symndx
[rel
->r_offset
/ 8 + 1] = -2;
5775 case R_PPC64_TPREL16
:
5776 case R_PPC64_TPREL16_LO
:
5777 case R_PPC64_TPREL16_HI
:
5778 case R_PPC64_TPREL16_HA
:
5779 case R_PPC64_TPREL16_DS
:
5780 case R_PPC64_TPREL16_LO_DS
:
5781 case R_PPC64_TPREL16_HIGH
:
5782 case R_PPC64_TPREL16_HIGHA
:
5783 case R_PPC64_TPREL16_HIGHER
:
5784 case R_PPC64_TPREL16_HIGHERA
:
5785 case R_PPC64_TPREL16_HIGHEST
:
5786 case R_PPC64_TPREL16_HIGHESTA
:
5787 if (bfd_link_pic (info
))
5789 info
->flags
|= DF_STATIC_TLS
;
5794 case R_PPC64_ADDR64
:
5795 if (opd_sym_map
!= NULL
5796 && rel
+ 1 < rel_end
5797 && ELF64_R_TYPE ((rel
+ 1)->r_info
) == R_PPC64_TOC
)
5801 if (h
->root
.root
.string
[0] == '.'
5802 && h
->root
.root
.string
[1] != 0
5803 && lookup_fdh ((struct ppc_link_hash_entry
*) h
, htab
))
5806 ((struct ppc_link_hash_entry
*) h
)->is_func
= 1;
5811 Elf_Internal_Sym
*isym
;
5813 isym
= bfd_sym_from_r_symndx (&htab
->sym_cache
,
5818 s
= bfd_section_from_elf_index (abfd
, isym
->st_shndx
);
5819 if (s
!= NULL
&& s
!= sec
)
5820 opd_sym_map
[OPD_NDX (rel
->r_offset
)] = s
;
5825 case R_PPC64_ADDR16
:
5826 case R_PPC64_ADDR16_DS
:
5827 case R_PPC64_ADDR16_HA
:
5828 case R_PPC64_ADDR16_HI
:
5829 case R_PPC64_ADDR16_HIGH
:
5830 case R_PPC64_ADDR16_HIGHA
:
5831 case R_PPC64_ADDR16_HIGHER
:
5832 case R_PPC64_ADDR16_HIGHERA
:
5833 case R_PPC64_ADDR16_HIGHEST
:
5834 case R_PPC64_ADDR16_HIGHESTA
:
5835 case R_PPC64_ADDR16_LO
:
5836 case R_PPC64_ADDR16_LO_DS
:
5837 if (h
!= NULL
&& !bfd_link_pic (info
) && abiversion (abfd
) != 1
5838 && rel
->r_addend
== 0)
5840 /* We may need a .plt entry if this reloc refers to a
5841 function in a shared lib. */
5842 if (!update_plt_info (abfd
, &h
->plt
.plist
, rel
->r_addend
))
5844 h
->pointer_equality_needed
= 1;
5851 case R_PPC64_ADDR32
:
5852 case R_PPC64_UADDR16
:
5853 case R_PPC64_UADDR32
:
5854 case R_PPC64_UADDR64
:
5856 if (h
!= NULL
&& !bfd_link_pic (info
))
5857 /* We may need a copy reloc. */
5860 /* Don't propagate .opd relocs. */
5861 if (NO_OPD_RELOCS
&& opd_sym_map
!= NULL
)
5864 /* If we are creating a shared library, and this is a reloc
5865 against a global symbol, or a non PC relative reloc
5866 against a local symbol, then we need to copy the reloc
5867 into the shared library. However, if we are linking with
5868 -Bsymbolic, we do not need to copy a reloc against a
5869 global symbol which is defined in an object we are
5870 including in the link (i.e., DEF_REGULAR is set). At
5871 this point we have not seen all the input files, so it is
5872 possible that DEF_REGULAR is not set now but will be set
5873 later (it is never cleared). In case of a weak definition,
5874 DEF_REGULAR may be cleared later by a strong definition in
5875 a shared library. We account for that possibility below by
5876 storing information in the dyn_relocs field of the hash
5877 table entry. A similar situation occurs when creating
5878 shared libraries and symbol visibility changes render the
5881 If on the other hand, we are creating an executable, we
5882 may need to keep relocations for symbols satisfied by a
5883 dynamic library if we manage to avoid copy relocs for the
5886 if ((bfd_link_pic (info
)
5887 && (must_be_dyn_reloc (info
, r_type
)
5889 && (!SYMBOLIC_BIND (info
, h
)
5890 || h
->root
.type
== bfd_link_hash_defweak
5891 || !h
->def_regular
))))
5892 || (ELIMINATE_COPY_RELOCS
5893 && !bfd_link_pic (info
)
5895 && (h
->root
.type
== bfd_link_hash_defweak
5896 || !h
->def_regular
))
5897 || (!bfd_link_pic (info
)
5900 /* We must copy these reloc types into the output file.
5901 Create a reloc section in dynobj and make room for
5905 sreloc
= _bfd_elf_make_dynamic_reloc_section
5906 (sec
, htab
->elf
.dynobj
, 3, abfd
, /*rela?*/ TRUE
);
5912 /* If this is a global symbol, we count the number of
5913 relocations we need for this symbol. */
5916 struct elf_dyn_relocs
*p
;
5917 struct elf_dyn_relocs
**head
;
5919 head
= &((struct ppc_link_hash_entry
*) h
)->dyn_relocs
;
5921 if (p
== NULL
|| p
->sec
!= sec
)
5923 p
= bfd_alloc (htab
->elf
.dynobj
, sizeof *p
);
5933 if (!must_be_dyn_reloc (info
, r_type
))
5938 /* Track dynamic relocs needed for local syms too.
5939 We really need local syms available to do this
5941 struct ppc_dyn_relocs
*p
;
5942 struct ppc_dyn_relocs
**head
;
5943 bfd_boolean is_ifunc
;
5946 Elf_Internal_Sym
*isym
;
5948 isym
= bfd_sym_from_r_symndx (&htab
->sym_cache
,
5953 s
= bfd_section_from_elf_index (abfd
, isym
->st_shndx
);
5957 vpp
= &elf_section_data (s
)->local_dynrel
;
5958 head
= (struct ppc_dyn_relocs
**) vpp
;
5959 is_ifunc
= ELF_ST_TYPE (isym
->st_info
) == STT_GNU_IFUNC
;
5961 if (p
!= NULL
&& p
->sec
== sec
&& p
->ifunc
!= is_ifunc
)
5963 if (p
== NULL
|| p
->sec
!= sec
|| p
->ifunc
!= is_ifunc
)
5965 p
= bfd_alloc (htab
->elf
.dynobj
, sizeof *p
);
5971 p
->ifunc
= is_ifunc
;
5987 /* Merge backend specific data from an object file to the output
5988 object file when linking. */
5991 ppc64_elf_merge_private_bfd_data (bfd
*ibfd
, bfd
*obfd
)
5993 unsigned long iflags
, oflags
;
5995 if ((ibfd
->flags
& BFD_LINKER_CREATED
) != 0)
5998 if (!is_ppc64_elf (ibfd
) || !is_ppc64_elf (obfd
))
6001 if (!_bfd_generic_verify_endian_match (ibfd
, obfd
))
6004 iflags
= elf_elfheader (ibfd
)->e_flags
;
6005 oflags
= elf_elfheader (obfd
)->e_flags
;
6007 if (iflags
& ~EF_PPC64_ABI
)
6009 (*_bfd_error_handler
)
6010 (_("%B uses unknown e_flags 0x%lx"), ibfd
, iflags
);
6011 bfd_set_error (bfd_error_bad_value
);
6014 else if (iflags
!= oflags
&& iflags
!= 0)
6016 (*_bfd_error_handler
)
6017 (_("%B: ABI version %ld is not compatible with ABI version %ld output"),
6018 ibfd
, iflags
, oflags
);
6019 bfd_set_error (bfd_error_bad_value
);
6023 /* Merge Tag_compatibility attributes and any common GNU ones. */
6024 _bfd_elf_merge_object_attributes (ibfd
, obfd
);
6030 ppc64_elf_print_private_bfd_data (bfd
*abfd
, void *ptr
)
6032 /* Print normal ELF private data. */
6033 _bfd_elf_print_private_bfd_data (abfd
, ptr
);
6035 if (elf_elfheader (abfd
)->e_flags
!= 0)
6039 /* xgettext:c-format */
6040 fprintf (file
, _("private flags = 0x%lx:"),
6041 elf_elfheader (abfd
)->e_flags
);
6043 if ((elf_elfheader (abfd
)->e_flags
& EF_PPC64_ABI
) != 0)
6044 fprintf (file
, _(" [abiv%ld]"),
6045 elf_elfheader (abfd
)->e_flags
& EF_PPC64_ABI
);
6052 /* OFFSET in OPD_SEC specifies a function descriptor. Return the address
6053 of the code entry point, and its section, which must be in the same
6054 object as OPD_SEC. Returns (bfd_vma) -1 on error. */
6057 opd_entry_value (asection
*opd_sec
,
6059 asection
**code_sec
,
6061 bfd_boolean in_code_sec
)
6063 bfd
*opd_bfd
= opd_sec
->owner
;
6064 Elf_Internal_Rela
*relocs
;
6065 Elf_Internal_Rela
*lo
, *hi
, *look
;
6068 /* No relocs implies we are linking a --just-symbols object, or looking
6069 at a final linked executable with addr2line or somesuch. */
6070 if (opd_sec
->reloc_count
== 0)
6072 bfd_byte
*contents
= ppc64_elf_tdata (opd_bfd
)->opd
.contents
;
6074 if (contents
== NULL
)
6076 if (!bfd_malloc_and_get_section (opd_bfd
, opd_sec
, &contents
))
6077 return (bfd_vma
) -1;
6078 ppc64_elf_tdata (opd_bfd
)->opd
.contents
= contents
;
6081 /* PR 17512: file: 64b9dfbb. */
6082 if (offset
+ 7 >= opd_sec
->size
|| offset
+ 7 < offset
)
6083 return (bfd_vma
) -1;
6085 val
= bfd_get_64 (opd_bfd
, contents
+ offset
);
6086 if (code_sec
!= NULL
)
6088 asection
*sec
, *likely
= NULL
;
6094 && val
< sec
->vma
+ sec
->size
)
6100 for (sec
= opd_bfd
->sections
; sec
!= NULL
; sec
= sec
->next
)
6102 && (sec
->flags
& SEC_LOAD
) != 0
6103 && (sec
->flags
& SEC_ALLOC
) != 0)
6108 if (code_off
!= NULL
)
6109 *code_off
= val
- likely
->vma
;
6115 BFD_ASSERT (is_ppc64_elf (opd_bfd
));
6117 relocs
= ppc64_elf_tdata (opd_bfd
)->opd
.relocs
;
6119 relocs
= _bfd_elf_link_read_relocs (opd_bfd
, opd_sec
, NULL
, NULL
, TRUE
);
6120 /* PR 17512: file: df8e1fd6. */
6122 return (bfd_vma
) -1;
6124 /* Go find the opd reloc at the sym address. */
6126 hi
= lo
+ opd_sec
->reloc_count
- 1; /* ignore last reloc */
6130 look
= lo
+ (hi
- lo
) / 2;
6131 if (look
->r_offset
< offset
)
6133 else if (look
->r_offset
> offset
)
6137 Elf_Internal_Shdr
*symtab_hdr
= &elf_symtab_hdr (opd_bfd
);
6139 if (ELF64_R_TYPE (look
->r_info
) == R_PPC64_ADDR64
6140 && ELF64_R_TYPE ((look
+ 1)->r_info
) == R_PPC64_TOC
)
6142 unsigned long symndx
= ELF64_R_SYM (look
->r_info
);
6143 asection
*sec
= NULL
;
6145 if (symndx
>= symtab_hdr
->sh_info
6146 && elf_sym_hashes (opd_bfd
) != NULL
)
6148 struct elf_link_hash_entry
**sym_hashes
;
6149 struct elf_link_hash_entry
*rh
;
6151 sym_hashes
= elf_sym_hashes (opd_bfd
);
6152 rh
= sym_hashes
[symndx
- symtab_hdr
->sh_info
];
6155 rh
= elf_follow_link (rh
);
6156 if (rh
->root
.type
!= bfd_link_hash_defined
6157 && rh
->root
.type
!= bfd_link_hash_defweak
)
6159 if (rh
->root
.u
.def
.section
->owner
== opd_bfd
)
6161 val
= rh
->root
.u
.def
.value
;
6162 sec
= rh
->root
.u
.def
.section
;
6169 Elf_Internal_Sym
*sym
;
6171 if (symndx
< symtab_hdr
->sh_info
)
6173 sym
= (Elf_Internal_Sym
*) symtab_hdr
->contents
;
6176 size_t symcnt
= symtab_hdr
->sh_info
;
6177 sym
= bfd_elf_get_elf_syms (opd_bfd
, symtab_hdr
,
6182 symtab_hdr
->contents
= (bfd_byte
*) sym
;
6188 sym
= bfd_elf_get_elf_syms (opd_bfd
, symtab_hdr
,
6194 sec
= bfd_section_from_elf_index (opd_bfd
, sym
->st_shndx
);
6197 BFD_ASSERT ((sec
->flags
& SEC_MERGE
) == 0);
6198 val
= sym
->st_value
;
6201 val
+= look
->r_addend
;
6202 if (code_off
!= NULL
)
6204 if (code_sec
!= NULL
)
6206 if (in_code_sec
&& *code_sec
!= sec
)
6211 if (sec
->output_section
!= NULL
)
6212 val
+= sec
->output_section
->vma
+ sec
->output_offset
;
6221 /* If the ELF symbol SYM might be a function in SEC, return the
6222 function size and set *CODE_OFF to the function's entry point,
6223 otherwise return zero. */
6225 static bfd_size_type
6226 ppc64_elf_maybe_function_sym (const asymbol
*sym
, asection
*sec
,
6231 if ((sym
->flags
& (BSF_SECTION_SYM
| BSF_FILE
| BSF_OBJECT
6232 | BSF_THREAD_LOCAL
| BSF_RELC
| BSF_SRELC
)) != 0)
6236 if (!(sym
->flags
& BSF_SYNTHETIC
))
6237 size
= ((elf_symbol_type
*) sym
)->internal_elf_sym
.st_size
;
6239 if (strcmp (sym
->section
->name
, ".opd") == 0)
6241 struct _opd_sec_data
*opd
= get_opd_info (sym
->section
);
6242 bfd_vma symval
= sym
->value
;
6245 && opd
->adjust
!= NULL
6246 && elf_section_data (sym
->section
)->relocs
!= NULL
)
6248 /* opd_entry_value will use cached relocs that have been
6249 adjusted, but with raw symbols. That means both local
6250 and global symbols need adjusting. */
6251 long adjust
= opd
->adjust
[OPD_NDX (symval
)];
6257 if (opd_entry_value (sym
->section
, symval
,
6258 &sec
, code_off
, TRUE
) == (bfd_vma
) -1)
6260 /* An old ABI binary with dot-syms has a size of 24 on the .opd
6261 symbol. This size has nothing to do with the code size of the
6262 function, which is what we're supposed to return, but the
6263 code size isn't available without looking up the dot-sym.
6264 However, doing that would be a waste of time particularly
6265 since elf_find_function will look at the dot-sym anyway.
6266 Now, elf_find_function will keep the largest size of any
6267 function sym found at the code address of interest, so return
6268 1 here to avoid it incorrectly caching a larger function size
6269 for a small function. This does mean we return the wrong
6270 size for a new-ABI function of size 24, but all that does is
6271 disable caching for such functions. */
6277 if (sym
->section
!= sec
)
6279 *code_off
= sym
->value
;
6286 /* Return true if symbol is defined in a regular object file. */
6289 is_static_defined (struct elf_link_hash_entry
*h
)
6291 return ((h
->root
.type
== bfd_link_hash_defined
6292 || h
->root
.type
== bfd_link_hash_defweak
)
6293 && h
->root
.u
.def
.section
!= NULL
6294 && h
->root
.u
.def
.section
->output_section
!= NULL
);
6297 /* If FDH is a function descriptor symbol, return the associated code
6298 entry symbol if it is defined. Return NULL otherwise. */
6300 static struct ppc_link_hash_entry
*
6301 defined_code_entry (struct ppc_link_hash_entry
*fdh
)
6303 if (fdh
->is_func_descriptor
)
6305 struct ppc_link_hash_entry
*fh
= ppc_follow_link (fdh
->oh
);
6306 if (fh
->elf
.root
.type
== bfd_link_hash_defined
6307 || fh
->elf
.root
.type
== bfd_link_hash_defweak
)
6313 /* If FH is a function code entry symbol, return the associated
6314 function descriptor symbol if it is defined. Return NULL otherwise. */
6316 static struct ppc_link_hash_entry
*
6317 defined_func_desc (struct ppc_link_hash_entry
*fh
)
6320 && fh
->oh
->is_func_descriptor
)
6322 struct ppc_link_hash_entry
*fdh
= ppc_follow_link (fh
->oh
);
6323 if (fdh
->elf
.root
.type
== bfd_link_hash_defined
6324 || fdh
->elf
.root
.type
== bfd_link_hash_defweak
)
6330 /* Mark all our entry sym sections, both opd and code section. */
6333 ppc64_elf_gc_keep (struct bfd_link_info
*info
)
6335 struct ppc_link_hash_table
*htab
= ppc_hash_table (info
);
6336 struct bfd_sym_chain
*sym
;
6341 for (sym
= info
->gc_sym_list
; sym
!= NULL
; sym
= sym
->next
)
6343 struct ppc_link_hash_entry
*eh
, *fh
;
6346 eh
= (struct ppc_link_hash_entry
*)
6347 elf_link_hash_lookup (&htab
->elf
, sym
->name
, FALSE
, FALSE
, TRUE
);
6350 if (eh
->elf
.root
.type
!= bfd_link_hash_defined
6351 && eh
->elf
.root
.type
!= bfd_link_hash_defweak
)
6354 fh
= defined_code_entry (eh
);
6357 sec
= fh
->elf
.root
.u
.def
.section
;
6358 sec
->flags
|= SEC_KEEP
;
6360 else if (get_opd_info (eh
->elf
.root
.u
.def
.section
) != NULL
6361 && opd_entry_value (eh
->elf
.root
.u
.def
.section
,
6362 eh
->elf
.root
.u
.def
.value
,
6363 &sec
, NULL
, FALSE
) != (bfd_vma
) -1)
6364 sec
->flags
|= SEC_KEEP
;
6366 sec
= eh
->elf
.root
.u
.def
.section
;
6367 sec
->flags
|= SEC_KEEP
;
6371 /* Mark sections containing dynamically referenced symbols. When
6372 building shared libraries, we must assume that any visible symbol is
6376 ppc64_elf_gc_mark_dynamic_ref (struct elf_link_hash_entry
*h
, void *inf
)
6378 struct bfd_link_info
*info
= (struct bfd_link_info
*) inf
;
6379 struct ppc_link_hash_entry
*eh
= (struct ppc_link_hash_entry
*) h
;
6380 struct ppc_link_hash_entry
*fdh
;
6381 struct bfd_elf_dynamic_list
*d
= info
->dynamic_list
;
6383 /* Dynamic linking info is on the func descriptor sym. */
6384 fdh
= defined_func_desc (eh
);
6388 if ((eh
->elf
.root
.type
== bfd_link_hash_defined
6389 || eh
->elf
.root
.type
== bfd_link_hash_defweak
)
6390 && (eh
->elf
.ref_dynamic
6391 || ((eh
->elf
.def_regular
|| ELF_COMMON_DEF_P (&eh
->elf
))
6392 && ELF_ST_VISIBILITY (eh
->elf
.other
) != STV_INTERNAL
6393 && ELF_ST_VISIBILITY (eh
->elf
.other
) != STV_HIDDEN
6394 && (!bfd_link_executable (info
)
6395 || info
->export_dynamic
6398 && (*d
->match
) (&d
->head
, NULL
, eh
->elf
.root
.root
.string
)))
6399 && (strchr (eh
->elf
.root
.root
.string
, ELF_VER_CHR
) != NULL
6400 || !bfd_hide_sym_by_version (info
->version_info
,
6401 eh
->elf
.root
.root
.string
)))))
6404 struct ppc_link_hash_entry
*fh
;
6406 eh
->elf
.root
.u
.def
.section
->flags
|= SEC_KEEP
;
6408 /* Function descriptor syms cause the associated
6409 function code sym section to be marked. */
6410 fh
= defined_code_entry (eh
);
6413 code_sec
= fh
->elf
.root
.u
.def
.section
;
6414 code_sec
->flags
|= SEC_KEEP
;
6416 else if (get_opd_info (eh
->elf
.root
.u
.def
.section
) != NULL
6417 && opd_entry_value (eh
->elf
.root
.u
.def
.section
,
6418 eh
->elf
.root
.u
.def
.value
,
6419 &code_sec
, NULL
, FALSE
) != (bfd_vma
) -1)
6420 code_sec
->flags
|= SEC_KEEP
;
6426 /* Return the section that should be marked against GC for a given
6430 ppc64_elf_gc_mark_hook (asection
*sec
,
6431 struct bfd_link_info
*info
,
6432 Elf_Internal_Rela
*rel
,
6433 struct elf_link_hash_entry
*h
,
6434 Elf_Internal_Sym
*sym
)
6438 /* Syms return NULL if we're marking .opd, so we avoid marking all
6439 function sections, as all functions are referenced in .opd. */
6441 if (get_opd_info (sec
) != NULL
)
6446 enum elf_ppc64_reloc_type r_type
;
6447 struct ppc_link_hash_entry
*eh
, *fh
, *fdh
;
6449 r_type
= ELF64_R_TYPE (rel
->r_info
);
6452 case R_PPC64_GNU_VTINHERIT
:
6453 case R_PPC64_GNU_VTENTRY
:
6457 switch (h
->root
.type
)
6459 case bfd_link_hash_defined
:
6460 case bfd_link_hash_defweak
:
6461 eh
= (struct ppc_link_hash_entry
*) h
;
6462 fdh
= defined_func_desc (eh
);
6466 /* Function descriptor syms cause the associated
6467 function code sym section to be marked. */
6468 fh
= defined_code_entry (eh
);
6471 /* They also mark their opd section. */
6472 eh
->elf
.root
.u
.def
.section
->gc_mark
= 1;
6474 rsec
= fh
->elf
.root
.u
.def
.section
;
6476 else if (get_opd_info (eh
->elf
.root
.u
.def
.section
) != NULL
6477 && opd_entry_value (eh
->elf
.root
.u
.def
.section
,
6478 eh
->elf
.root
.u
.def
.value
,
6479 &rsec
, NULL
, FALSE
) != (bfd_vma
) -1)
6480 eh
->elf
.root
.u
.def
.section
->gc_mark
= 1;
6482 rsec
= h
->root
.u
.def
.section
;
6485 case bfd_link_hash_common
:
6486 rsec
= h
->root
.u
.c
.p
->section
;
6490 return _bfd_elf_gc_mark_hook (sec
, info
, rel
, h
, sym
);
6496 struct _opd_sec_data
*opd
;
6498 rsec
= bfd_section_from_elf_index (sec
->owner
, sym
->st_shndx
);
6499 opd
= get_opd_info (rsec
);
6500 if (opd
!= NULL
&& opd
->func_sec
!= NULL
)
6504 rsec
= opd
->func_sec
[OPD_NDX (sym
->st_value
+ rel
->r_addend
)];
6511 /* Update the .got, .plt. and dynamic reloc reference counts for the
6512 section being removed. */
6515 ppc64_elf_gc_sweep_hook (bfd
*abfd
, struct bfd_link_info
*info
,
6516 asection
*sec
, const Elf_Internal_Rela
*relocs
)
6518 struct ppc_link_hash_table
*htab
;
6519 Elf_Internal_Shdr
*symtab_hdr
;
6520 struct elf_link_hash_entry
**sym_hashes
;
6521 struct got_entry
**local_got_ents
;
6522 const Elf_Internal_Rela
*rel
, *relend
;
6524 if (bfd_link_relocatable (info
))
6527 if ((sec
->flags
& SEC_ALLOC
) == 0)
6530 elf_section_data (sec
)->local_dynrel
= NULL
;
6532 htab
= ppc_hash_table (info
);
6536 symtab_hdr
= &elf_symtab_hdr (abfd
);
6537 sym_hashes
= elf_sym_hashes (abfd
);
6538 local_got_ents
= elf_local_got_ents (abfd
);
6540 relend
= relocs
+ sec
->reloc_count
;
6541 for (rel
= relocs
; rel
< relend
; rel
++)
6543 unsigned long r_symndx
;
6544 enum elf_ppc64_reloc_type r_type
;
6545 struct elf_link_hash_entry
*h
= NULL
;
6546 struct plt_entry
**plt_list
;
6547 unsigned char tls_type
= 0;
6549 r_symndx
= ELF64_R_SYM (rel
->r_info
);
6550 r_type
= ELF64_R_TYPE (rel
->r_info
);
6551 if (r_symndx
>= symtab_hdr
->sh_info
)
6553 struct ppc_link_hash_entry
*eh
;
6554 struct elf_dyn_relocs
**pp
;
6555 struct elf_dyn_relocs
*p
;
6557 h
= sym_hashes
[r_symndx
- symtab_hdr
->sh_info
];
6558 h
= elf_follow_link (h
);
6559 eh
= (struct ppc_link_hash_entry
*) h
;
6561 for (pp
= &eh
->dyn_relocs
; (p
= *pp
) != NULL
; pp
= &p
->next
)
6564 /* Everything must go for SEC. */
6572 case R_PPC64_GOT_TLSLD16
:
6573 case R_PPC64_GOT_TLSLD16_LO
:
6574 case R_PPC64_GOT_TLSLD16_HI
:
6575 case R_PPC64_GOT_TLSLD16_HA
:
6576 tls_type
= TLS_TLS
| TLS_LD
;
6579 case R_PPC64_GOT_TLSGD16
:
6580 case R_PPC64_GOT_TLSGD16_LO
:
6581 case R_PPC64_GOT_TLSGD16_HI
:
6582 case R_PPC64_GOT_TLSGD16_HA
:
6583 tls_type
= TLS_TLS
| TLS_GD
;
6586 case R_PPC64_GOT_TPREL16_DS
:
6587 case R_PPC64_GOT_TPREL16_LO_DS
:
6588 case R_PPC64_GOT_TPREL16_HI
:
6589 case R_PPC64_GOT_TPREL16_HA
:
6590 tls_type
= TLS_TLS
| TLS_TPREL
;
6593 case R_PPC64_GOT_DTPREL16_DS
:
6594 case R_PPC64_GOT_DTPREL16_LO_DS
:
6595 case R_PPC64_GOT_DTPREL16_HI
:
6596 case R_PPC64_GOT_DTPREL16_HA
:
6597 tls_type
= TLS_TLS
| TLS_DTPREL
;
6601 case R_PPC64_GOT16_DS
:
6602 case R_PPC64_GOT16_HA
:
6603 case R_PPC64_GOT16_HI
:
6604 case R_PPC64_GOT16_LO
:
6605 case R_PPC64_GOT16_LO_DS
:
6608 struct got_entry
*ent
;
6613 ent
= local_got_ents
[r_symndx
];
6615 for (; ent
!= NULL
; ent
= ent
->next
)
6616 if (ent
->addend
== rel
->r_addend
6617 && ent
->owner
== abfd
6618 && ent
->tls_type
== tls_type
)
6622 if (ent
->got
.refcount
> 0)
6623 ent
->got
.refcount
-= 1;
6627 case R_PPC64_PLT16_HA
:
6628 case R_PPC64_PLT16_HI
:
6629 case R_PPC64_PLT16_LO
:
6633 case R_PPC64_REL14_BRNTAKEN
:
6634 case R_PPC64_REL14_BRTAKEN
:
6638 plt_list
= &h
->plt
.plist
;
6639 else if (local_got_ents
!= NULL
)
6641 struct plt_entry
**local_plt
= (struct plt_entry
**)
6642 (local_got_ents
+ symtab_hdr
->sh_info
);
6643 unsigned char *local_got_tls_masks
= (unsigned char *)
6644 (local_plt
+ symtab_hdr
->sh_info
);
6645 if ((local_got_tls_masks
[r_symndx
] & PLT_IFUNC
) != 0)
6646 plt_list
= local_plt
+ r_symndx
;
6650 struct plt_entry
*ent
;
6652 for (ent
= *plt_list
; ent
!= NULL
; ent
= ent
->next
)
6653 if (ent
->addend
== rel
->r_addend
)
6655 if (ent
!= NULL
&& ent
->plt
.refcount
> 0)
6656 ent
->plt
.refcount
-= 1;
6667 /* The maximum size of .sfpr. */
6668 #define SFPR_MAX (218*4)
6670 struct sfpr_def_parms
6672 const char name
[12];
6673 unsigned char lo
, hi
;
6674 bfd_byte
* (*write_ent
) (bfd
*, bfd_byte
*, int);
6675 bfd_byte
* (*write_tail
) (bfd
*, bfd_byte
*, int);
6678 /* Auto-generate _save*, _rest* functions in .sfpr.
6679 If STUB_SEC is non-null, define alias symbols in STUB_SEC
6683 sfpr_define (struct bfd_link_info
*info
,
6684 const struct sfpr_def_parms
*parm
,
6687 struct ppc_link_hash_table
*htab
= ppc_hash_table (info
);
6689 size_t len
= strlen (parm
->name
);
6690 bfd_boolean writing
= FALSE
;
6696 memcpy (sym
, parm
->name
, len
);
6699 for (i
= parm
->lo
; i
<= parm
->hi
; i
++)
6701 struct ppc_link_hash_entry
*h
;
6703 sym
[len
+ 0] = i
/ 10 + '0';
6704 sym
[len
+ 1] = i
% 10 + '0';
6705 h
= (struct ppc_link_hash_entry
*)
6706 elf_link_hash_lookup (&htab
->elf
, sym
, writing
, TRUE
, TRUE
);
6707 if (stub_sec
!= NULL
)
6710 && h
->elf
.root
.type
== bfd_link_hash_defined
6711 && h
->elf
.root
.u
.def
.section
== htab
->sfpr
)
6713 struct elf_link_hash_entry
*s
;
6715 sprintf (buf
, "%08x.%s", stub_sec
->id
& 0xffffffff, sym
);
6716 s
= elf_link_hash_lookup (&htab
->elf
, buf
, TRUE
, TRUE
, FALSE
);
6719 if (s
->root
.type
== bfd_link_hash_new
6720 || (s
->root
.type
= bfd_link_hash_defined
6721 && s
->root
.u
.def
.section
== stub_sec
))
6723 s
->root
.type
= bfd_link_hash_defined
;
6724 s
->root
.u
.def
.section
= stub_sec
;
6725 s
->root
.u
.def
.value
= (stub_sec
->size
6726 + h
->elf
.root
.u
.def
.value
);
6729 s
->ref_regular_nonweak
= 1;
6730 s
->forced_local
= 1;
6732 s
->root
.linker_def
= 1;
6740 if (!h
->elf
.def_regular
)
6742 h
->elf
.root
.type
= bfd_link_hash_defined
;
6743 h
->elf
.root
.u
.def
.section
= htab
->sfpr
;
6744 h
->elf
.root
.u
.def
.value
= htab
->sfpr
->size
;
6745 h
->elf
.type
= STT_FUNC
;
6746 h
->elf
.def_regular
= 1;
6748 _bfd_elf_link_hash_hide_symbol (info
, &h
->elf
, TRUE
);
6750 if (htab
->sfpr
->contents
== NULL
)
6752 htab
->sfpr
->contents
= bfd_alloc (htab
->elf
.dynobj
, SFPR_MAX
);
6753 if (htab
->sfpr
->contents
== NULL
)
6760 bfd_byte
*p
= htab
->sfpr
->contents
+ htab
->sfpr
->size
;
6762 p
= (*parm
->write_ent
) (htab
->elf
.dynobj
, p
, i
);
6764 p
= (*parm
->write_tail
) (htab
->elf
.dynobj
, p
, i
);
6765 htab
->sfpr
->size
= p
- htab
->sfpr
->contents
;
6773 savegpr0 (bfd
*abfd
, bfd_byte
*p
, int r
)
6775 bfd_put_32 (abfd
, STD_R0_0R1
+ (r
<< 21) + (1 << 16) - (32 - r
) * 8, p
);
6780 savegpr0_tail (bfd
*abfd
, bfd_byte
*p
, int r
)
6782 p
= savegpr0 (abfd
, p
, r
);
6783 bfd_put_32 (abfd
, STD_R0_0R1
+ STK_LR
, p
);
6785 bfd_put_32 (abfd
, BLR
, p
);
6790 restgpr0 (bfd
*abfd
, bfd_byte
*p
, int r
)
6792 bfd_put_32 (abfd
, LD_R0_0R1
+ (r
<< 21) + (1 << 16) - (32 - r
) * 8, p
);
6797 restgpr0_tail (bfd
*abfd
, bfd_byte
*p
, int r
)
6799 bfd_put_32 (abfd
, LD_R0_0R1
+ STK_LR
, p
);
6801 p
= restgpr0 (abfd
, p
, r
);
6802 bfd_put_32 (abfd
, MTLR_R0
, p
);
6806 p
= restgpr0 (abfd
, p
, 30);
6807 p
= restgpr0 (abfd
, p
, 31);
6809 bfd_put_32 (abfd
, BLR
, p
);
6814 savegpr1 (bfd
*abfd
, bfd_byte
*p
, int r
)
6816 bfd_put_32 (abfd
, STD_R0_0R12
+ (r
<< 21) + (1 << 16) - (32 - r
) * 8, p
);
6821 savegpr1_tail (bfd
*abfd
, bfd_byte
*p
, int r
)
6823 p
= savegpr1 (abfd
, p
, r
);
6824 bfd_put_32 (abfd
, BLR
, p
);
6829 restgpr1 (bfd
*abfd
, bfd_byte
*p
, int r
)
6831 bfd_put_32 (abfd
, LD_R0_0R12
+ (r
<< 21) + (1 << 16) - (32 - r
) * 8, p
);
6836 restgpr1_tail (bfd
*abfd
, bfd_byte
*p
, int r
)
6838 p
= restgpr1 (abfd
, p
, r
);
6839 bfd_put_32 (abfd
, BLR
, p
);
6844 savefpr (bfd
*abfd
, bfd_byte
*p
, int r
)
6846 bfd_put_32 (abfd
, STFD_FR0_0R1
+ (r
<< 21) + (1 << 16) - (32 - r
) * 8, p
);
6851 savefpr0_tail (bfd
*abfd
, bfd_byte
*p
, int r
)
6853 p
= savefpr (abfd
, p
, r
);
6854 bfd_put_32 (abfd
, STD_R0_0R1
+ STK_LR
, p
);
6856 bfd_put_32 (abfd
, BLR
, p
);
6861 restfpr (bfd
*abfd
, bfd_byte
*p
, int r
)
6863 bfd_put_32 (abfd
, LFD_FR0_0R1
+ (r
<< 21) + (1 << 16) - (32 - r
) * 8, p
);
6868 restfpr0_tail (bfd
*abfd
, bfd_byte
*p
, int r
)
6870 bfd_put_32 (abfd
, LD_R0_0R1
+ STK_LR
, p
);
6872 p
= restfpr (abfd
, p
, r
);
6873 bfd_put_32 (abfd
, MTLR_R0
, p
);
6877 p
= restfpr (abfd
, p
, 30);
6878 p
= restfpr (abfd
, p
, 31);
6880 bfd_put_32 (abfd
, BLR
, p
);
6885 savefpr1_tail (bfd
*abfd
, bfd_byte
*p
, int r
)
6887 p
= savefpr (abfd
, p
, r
);
6888 bfd_put_32 (abfd
, BLR
, p
);
6893 restfpr1_tail (bfd
*abfd
, bfd_byte
*p
, int r
)
6895 p
= restfpr (abfd
, p
, r
);
6896 bfd_put_32 (abfd
, BLR
, p
);
6901 savevr (bfd
*abfd
, bfd_byte
*p
, int r
)
6903 bfd_put_32 (abfd
, LI_R12_0
+ (1 << 16) - (32 - r
) * 16, p
);
6905 bfd_put_32 (abfd
, STVX_VR0_R12_R0
+ (r
<< 21), p
);
6910 savevr_tail (bfd
*abfd
, bfd_byte
*p
, int r
)
6912 p
= savevr (abfd
, p
, r
);
6913 bfd_put_32 (abfd
, BLR
, p
);
6918 restvr (bfd
*abfd
, bfd_byte
*p
, int r
)
6920 bfd_put_32 (abfd
, LI_R12_0
+ (1 << 16) - (32 - r
) * 16, p
);
6922 bfd_put_32 (abfd
, LVX_VR0_R12_R0
+ (r
<< 21), p
);
6927 restvr_tail (bfd
*abfd
, bfd_byte
*p
, int r
)
6929 p
= restvr (abfd
, p
, r
);
6930 bfd_put_32 (abfd
, BLR
, p
);
6934 /* Called via elf_link_hash_traverse to transfer dynamic linking
6935 information on function code symbol entries to their corresponding
6936 function descriptor symbol entries. */
6939 func_desc_adjust (struct elf_link_hash_entry
*h
, void *inf
)
6941 struct bfd_link_info
*info
;
6942 struct ppc_link_hash_table
*htab
;
6943 struct plt_entry
*ent
;
6944 struct ppc_link_hash_entry
*fh
;
6945 struct ppc_link_hash_entry
*fdh
;
6946 bfd_boolean force_local
;
6948 fh
= (struct ppc_link_hash_entry
*) h
;
6949 if (fh
->elf
.root
.type
== bfd_link_hash_indirect
)
6953 htab
= ppc_hash_table (info
);
6957 /* Resolve undefined references to dot-symbols as the value
6958 in the function descriptor, if we have one in a regular object.
6959 This is to satisfy cases like ".quad .foo". Calls to functions
6960 in dynamic objects are handled elsewhere. */
6961 if (fh
->elf
.root
.type
== bfd_link_hash_undefweak
6962 && fh
->was_undefined
6963 && (fdh
= defined_func_desc (fh
)) != NULL
6964 && get_opd_info (fdh
->elf
.root
.u
.def
.section
) != NULL
6965 && opd_entry_value (fdh
->elf
.root
.u
.def
.section
,
6966 fdh
->elf
.root
.u
.def
.value
,
6967 &fh
->elf
.root
.u
.def
.section
,
6968 &fh
->elf
.root
.u
.def
.value
, FALSE
) != (bfd_vma
) -1)
6970 fh
->elf
.root
.type
= fdh
->elf
.root
.type
;
6971 fh
->elf
.forced_local
= 1;
6972 fh
->elf
.def_regular
= fdh
->elf
.def_regular
;
6973 fh
->elf
.def_dynamic
= fdh
->elf
.def_dynamic
;
6976 /* If this is a function code symbol, transfer dynamic linking
6977 information to the function descriptor symbol. */
6981 for (ent
= fh
->elf
.plt
.plist
; ent
!= NULL
; ent
= ent
->next
)
6982 if (ent
->plt
.refcount
> 0)
6985 || fh
->elf
.root
.root
.string
[0] != '.'
6986 || fh
->elf
.root
.root
.string
[1] == '\0')
6989 /* Find the corresponding function descriptor symbol. Create it
6990 as undefined if necessary. */
6992 fdh
= lookup_fdh (fh
, htab
);
6994 && !bfd_link_executable (info
)
6995 && (fh
->elf
.root
.type
== bfd_link_hash_undefined
6996 || fh
->elf
.root
.type
== bfd_link_hash_undefweak
))
6998 fdh
= make_fdh (info
, fh
);
7003 /* Fake function descriptors are made undefweak. If the function
7004 code symbol is strong undefined, make the fake sym the same.
7005 If the function code symbol is defined, then force the fake
7006 descriptor local; We can't support overriding of symbols in a
7007 shared library on a fake descriptor. */
7011 && fdh
->elf
.root
.type
== bfd_link_hash_undefweak
)
7013 if (fh
->elf
.root
.type
== bfd_link_hash_undefined
)
7015 fdh
->elf
.root
.type
= bfd_link_hash_undefined
;
7016 bfd_link_add_undef (&htab
->elf
.root
, &fdh
->elf
.root
);
7018 else if (fh
->elf
.root
.type
== bfd_link_hash_defined
7019 || fh
->elf
.root
.type
== bfd_link_hash_defweak
)
7021 _bfd_elf_link_hash_hide_symbol (info
, &fdh
->elf
, TRUE
);
7026 && !fdh
->elf
.forced_local
7027 && (!bfd_link_executable (info
)
7028 || fdh
->elf
.def_dynamic
7029 || fdh
->elf
.ref_dynamic
7030 || (fdh
->elf
.root
.type
== bfd_link_hash_undefweak
7031 && ELF_ST_VISIBILITY (fdh
->elf
.other
) == STV_DEFAULT
)))
7033 if (fdh
->elf
.dynindx
== -1)
7034 if (! bfd_elf_link_record_dynamic_symbol (info
, &fdh
->elf
))
7036 fdh
->elf
.ref_regular
|= fh
->elf
.ref_regular
;
7037 fdh
->elf
.ref_dynamic
|= fh
->elf
.ref_dynamic
;
7038 fdh
->elf
.ref_regular_nonweak
|= fh
->elf
.ref_regular_nonweak
;
7039 fdh
->elf
.non_got_ref
|= fh
->elf
.non_got_ref
;
7040 if (ELF_ST_VISIBILITY (fh
->elf
.other
) == STV_DEFAULT
)
7042 move_plt_plist (fh
, fdh
);
7043 fdh
->elf
.needs_plt
= 1;
7045 fdh
->is_func_descriptor
= 1;
7050 /* Now that the info is on the function descriptor, clear the
7051 function code sym info. Any function code syms for which we
7052 don't have a definition in a regular file, we force local.
7053 This prevents a shared library from exporting syms that have
7054 been imported from another library. Function code syms that
7055 are really in the library we must leave global to prevent the
7056 linker dragging in a definition from a static library. */
7057 force_local
= (!fh
->elf
.def_regular
7059 || !fdh
->elf
.def_regular
7060 || fdh
->elf
.forced_local
);
7061 _bfd_elf_link_hash_hide_symbol (info
, &fh
->elf
, force_local
);
7066 static const struct sfpr_def_parms save_res_funcs
[] =
7068 { "_savegpr0_", 14, 31, savegpr0
, savegpr0_tail
},
7069 { "_restgpr0_", 14, 29, restgpr0
, restgpr0_tail
},
7070 { "_restgpr0_", 30, 31, restgpr0
, restgpr0_tail
},
7071 { "_savegpr1_", 14, 31, savegpr1
, savegpr1_tail
},
7072 { "_restgpr1_", 14, 31, restgpr1
, restgpr1_tail
},
7073 { "_savefpr_", 14, 31, savefpr
, savefpr0_tail
},
7074 { "_restfpr_", 14, 29, restfpr
, restfpr0_tail
},
7075 { "_restfpr_", 30, 31, restfpr
, restfpr0_tail
},
7076 { "._savef", 14, 31, savefpr
, savefpr1_tail
},
7077 { "._restf", 14, 31, restfpr
, restfpr1_tail
},
7078 { "_savevr_", 20, 31, savevr
, savevr_tail
},
7079 { "_restvr_", 20, 31, restvr
, restvr_tail
}
7082 /* Called near the start of bfd_elf_size_dynamic_sections. We use
7083 this hook to a) provide some gcc support functions, and b) transfer
7084 dynamic linking information gathered so far on function code symbol
7085 entries, to their corresponding function descriptor symbol entries. */
7088 ppc64_elf_func_desc_adjust (bfd
*obfd ATTRIBUTE_UNUSED
,
7089 struct bfd_link_info
*info
)
7091 struct ppc_link_hash_table
*htab
;
7093 htab
= ppc_hash_table (info
);
7097 /* Provide any missing _save* and _rest* functions. */
7098 if (htab
->sfpr
!= NULL
)
7102 htab
->sfpr
->size
= 0;
7103 for (i
= 0; i
< ARRAY_SIZE (save_res_funcs
); i
++)
7104 if (!sfpr_define (info
, &save_res_funcs
[i
], NULL
))
7106 if (htab
->sfpr
->size
== 0)
7107 htab
->sfpr
->flags
|= SEC_EXCLUDE
;
7110 if (bfd_link_relocatable (info
))
7113 if (htab
->elf
.hgot
!= NULL
)
7115 _bfd_elf_link_hash_hide_symbol (info
, htab
->elf
.hgot
, TRUE
);
7116 /* Make .TOC. defined so as to prevent it being made dynamic.
7117 The wrong value here is fixed later in ppc64_elf_set_toc. */
7118 if (!htab
->elf
.hgot
->def_regular
7119 || htab
->elf
.hgot
->root
.type
!= bfd_link_hash_defined
)
7121 htab
->elf
.hgot
->root
.type
= bfd_link_hash_defined
;
7122 htab
->elf
.hgot
->root
.u
.def
.value
= 0;
7123 htab
->elf
.hgot
->root
.u
.def
.section
= bfd_abs_section_ptr
;
7124 htab
->elf
.hgot
->def_regular
= 1;
7125 htab
->elf
.hgot
->root
.linker_def
= 1;
7127 htab
->elf
.hgot
->type
= STT_OBJECT
;
7128 htab
->elf
.hgot
->other
= ((htab
->elf
.hgot
->other
& ~ELF_ST_VISIBILITY (-1))
7132 elf_link_hash_traverse (&htab
->elf
, func_desc_adjust
, info
);
7137 /* Return true if we have dynamic relocs against H that apply to
7138 read-only sections. */
7141 readonly_dynrelocs (struct elf_link_hash_entry
*h
)
7143 struct ppc_link_hash_entry
*eh
;
7144 struct elf_dyn_relocs
*p
;
7146 eh
= (struct ppc_link_hash_entry
*) h
;
7147 for (p
= eh
->dyn_relocs
; p
!= NULL
; p
= p
->next
)
7149 asection
*s
= p
->sec
->output_section
;
7151 if (s
!= NULL
&& (s
->flags
& SEC_READONLY
) != 0)
7157 /* Return true if we have dynamic relocs against H or any of its weak
7158 aliases, that apply to read-only sections. */
7161 alias_readonly_dynrelocs (struct elf_link_hash_entry
*h
)
7163 struct ppc_link_hash_entry
*eh
;
7165 eh
= (struct ppc_link_hash_entry
*) h
;
7168 if (readonly_dynrelocs (&eh
->elf
))
7171 } while (eh
!= NULL
&& &eh
->elf
!= h
);
7176 /* Return whether EH has pc-relative dynamic relocs. */
7179 pc_dynrelocs (struct ppc_link_hash_entry
*eh
)
7181 struct elf_dyn_relocs
*p
;
7183 for (p
= eh
->dyn_relocs
; p
!= NULL
; p
= p
->next
)
7184 if (p
->pc_count
!= 0)
7189 /* Return true if a global entry stub will be created for H. Valid
7190 for ELFv2 before plt entries have been allocated. */
7193 global_entry_stub (struct elf_link_hash_entry
*h
)
7195 struct plt_entry
*pent
;
7197 if (!h
->pointer_equality_needed
7201 for (pent
= h
->plt
.plist
; pent
!= NULL
; pent
= pent
->next
)
7202 if (pent
->plt
.refcount
> 0
7203 && pent
->addend
== 0)
7209 /* Adjust a symbol defined by a dynamic object and referenced by a
7210 regular object. The current definition is in some section of the
7211 dynamic object, but we're not including those sections. We have to
7212 change the definition to something the rest of the link can
7216 ppc64_elf_adjust_dynamic_symbol (struct bfd_link_info
*info
,
7217 struct elf_link_hash_entry
*h
)
7219 struct ppc_link_hash_table
*htab
;
7222 htab
= ppc_hash_table (info
);
7226 /* Deal with function syms. */
7227 if (h
->type
== STT_FUNC
7228 || h
->type
== STT_GNU_IFUNC
7231 /* Clear procedure linkage table information for any symbol that
7232 won't need a .plt entry. */
7233 struct plt_entry
*ent
;
7234 for (ent
= h
->plt
.plist
; ent
!= NULL
; ent
= ent
->next
)
7235 if (ent
->plt
.refcount
> 0)
7238 || (h
->type
!= STT_GNU_IFUNC
7239 && (SYMBOL_CALLS_LOCAL (info
, h
)
7240 || (ELF_ST_VISIBILITY (h
->other
) != STV_DEFAULT
7241 && h
->root
.type
== bfd_link_hash_undefweak
)))
7242 || ((struct ppc_link_hash_entry
*) h
)->save_res
)
7244 h
->plt
.plist
= NULL
;
7246 h
->pointer_equality_needed
= 0;
7248 else if (abiversion (info
->output_bfd
) >= 2)
7250 /* Taking a function's address in a read/write section
7251 doesn't require us to define the function symbol in the
7252 executable on a global entry stub. A dynamic reloc can
7253 be used instead. The reason we prefer a few more dynamic
7254 relocs is that calling via a global entry stub costs a
7255 few more instructions, and pointer_equality_needed causes
7256 extra work in ld.so when resolving these symbols. */
7257 if (global_entry_stub (h
)
7258 && !alias_readonly_dynrelocs (h
))
7260 h
->pointer_equality_needed
= 0;
7261 /* After adjust_dynamic_symbol, non_got_ref set in
7262 the non-pic case means that dyn_relocs for this
7263 symbol should be discarded. */
7267 /* If making a plt entry, then we don't need copy relocs. */
7272 h
->plt
.plist
= NULL
;
7274 /* If this is a weak symbol, and there is a real definition, the
7275 processor independent code will have arranged for us to see the
7276 real definition first, and we can just use the same value. */
7277 if (h
->u
.weakdef
!= NULL
)
7279 BFD_ASSERT (h
->u
.weakdef
->root
.type
== bfd_link_hash_defined
7280 || h
->u
.weakdef
->root
.type
== bfd_link_hash_defweak
);
7281 h
->root
.u
.def
.section
= h
->u
.weakdef
->root
.u
.def
.section
;
7282 h
->root
.u
.def
.value
= h
->u
.weakdef
->root
.u
.def
.value
;
7283 if (ELIMINATE_COPY_RELOCS
)
7284 h
->non_got_ref
= h
->u
.weakdef
->non_got_ref
;
7288 /* If we are creating a shared library, we must presume that the
7289 only references to the symbol are via the global offset table.
7290 For such cases we need not do anything here; the relocations will
7291 be handled correctly by relocate_section. */
7292 if (bfd_link_pic (info
))
7295 /* If there are no references to this symbol that do not use the
7296 GOT, we don't need to generate a copy reloc. */
7297 if (!h
->non_got_ref
)
7300 /* Don't generate a copy reloc for symbols defined in the executable. */
7301 if (!h
->def_dynamic
|| !h
->ref_regular
|| h
->def_regular
7303 /* If -z nocopyreloc was given, don't generate them either. */
7304 || info
->nocopyreloc
7306 /* If we didn't find any dynamic relocs in read-only sections, then
7307 we'll be keeping the dynamic relocs and avoiding the copy reloc. */
7308 || (ELIMINATE_COPY_RELOCS
&& !alias_readonly_dynrelocs (h
))
7310 /* Protected variables do not work with .dynbss. The copy in
7311 .dynbss won't be used by the shared library with the protected
7312 definition for the variable. Text relocations are preferable
7313 to an incorrect program. */
7314 || h
->protected_def
)
7320 if (h
->plt
.plist
!= NULL
)
7322 /* We should never get here, but unfortunately there are versions
7323 of gcc out there that improperly (for this ABI) put initialized
7324 function pointers, vtable refs and suchlike in read-only
7325 sections. Allow them to proceed, but warn that this might
7326 break at runtime. */
7327 info
->callbacks
->einfo
7328 (_("%P: copy reloc against `%T' requires lazy plt linking; "
7329 "avoid setting LD_BIND_NOW=1 or upgrade gcc\n"),
7330 h
->root
.root
.string
);
7333 /* This is a reference to a symbol defined by a dynamic object which
7334 is not a function. */
7336 /* We must allocate the symbol in our .dynbss section, which will
7337 become part of the .bss section of the executable. There will be
7338 an entry for this symbol in the .dynsym section. The dynamic
7339 object will contain position independent code, so all references
7340 from the dynamic object to this symbol will go through the global
7341 offset table. The dynamic linker will use the .dynsym entry to
7342 determine the address it must put in the global offset table, so
7343 both the dynamic object and the regular object will refer to the
7344 same memory location for the variable. */
7346 /* We must generate a R_PPC64_COPY reloc to tell the dynamic linker
7347 to copy the initial value out of the dynamic object and into the
7348 runtime process image. We need to remember the offset into the
7349 .rela.bss section we are going to use. */
7350 if ((h
->root
.u
.def
.section
->flags
& SEC_ALLOC
) != 0 && h
->size
!= 0)
7352 htab
->relbss
->size
+= sizeof (Elf64_External_Rela
);
7358 return _bfd_elf_adjust_dynamic_copy (info
, h
, s
);
7361 /* If given a function descriptor symbol, hide both the function code
7362 sym and the descriptor. */
7364 ppc64_elf_hide_symbol (struct bfd_link_info
*info
,
7365 struct elf_link_hash_entry
*h
,
7366 bfd_boolean force_local
)
7368 struct ppc_link_hash_entry
*eh
;
7369 _bfd_elf_link_hash_hide_symbol (info
, h
, force_local
);
7371 eh
= (struct ppc_link_hash_entry
*) h
;
7372 if (eh
->is_func_descriptor
)
7374 struct ppc_link_hash_entry
*fh
= eh
->oh
;
7379 struct ppc_link_hash_table
*htab
;
7382 /* We aren't supposed to use alloca in BFD because on
7383 systems which do not have alloca the version in libiberty
7384 calls xmalloc, which might cause the program to crash
7385 when it runs out of memory. This function doesn't have a
7386 return status, so there's no way to gracefully return an
7387 error. So cheat. We know that string[-1] can be safely
7388 accessed; It's either a string in an ELF string table,
7389 or allocated in an objalloc structure. */
7391 p
= eh
->elf
.root
.root
.string
- 1;
7394 htab
= ppc_hash_table (info
);
7398 fh
= (struct ppc_link_hash_entry
*)
7399 elf_link_hash_lookup (&htab
->elf
, p
, FALSE
, FALSE
, FALSE
);
7402 /* Unfortunately, if it so happens that the string we were
7403 looking for was allocated immediately before this string,
7404 then we overwrote the string terminator. That's the only
7405 reason the lookup should fail. */
7408 q
= eh
->elf
.root
.root
.string
+ strlen (eh
->elf
.root
.root
.string
);
7409 while (q
>= eh
->elf
.root
.root
.string
&& *q
== *p
)
7411 if (q
< eh
->elf
.root
.root
.string
&& *p
== '.')
7412 fh
= (struct ppc_link_hash_entry
*)
7413 elf_link_hash_lookup (&htab
->elf
, p
, FALSE
, FALSE
, FALSE
);
7422 _bfd_elf_link_hash_hide_symbol (info
, &fh
->elf
, force_local
);
7427 get_sym_h (struct elf_link_hash_entry
**hp
,
7428 Elf_Internal_Sym
**symp
,
7430 unsigned char **tls_maskp
,
7431 Elf_Internal_Sym
**locsymsp
,
7432 unsigned long r_symndx
,
7435 Elf_Internal_Shdr
*symtab_hdr
= &elf_symtab_hdr (ibfd
);
7437 if (r_symndx
>= symtab_hdr
->sh_info
)
7439 struct elf_link_hash_entry
**sym_hashes
= elf_sym_hashes (ibfd
);
7440 struct elf_link_hash_entry
*h
;
7442 h
= sym_hashes
[r_symndx
- symtab_hdr
->sh_info
];
7443 h
= elf_follow_link (h
);
7451 if (symsecp
!= NULL
)
7453 asection
*symsec
= NULL
;
7454 if (h
->root
.type
== bfd_link_hash_defined
7455 || h
->root
.type
== bfd_link_hash_defweak
)
7456 symsec
= h
->root
.u
.def
.section
;
7460 if (tls_maskp
!= NULL
)
7462 struct ppc_link_hash_entry
*eh
;
7464 eh
= (struct ppc_link_hash_entry
*) h
;
7465 *tls_maskp
= &eh
->tls_mask
;
7470 Elf_Internal_Sym
*sym
;
7471 Elf_Internal_Sym
*locsyms
= *locsymsp
;
7473 if (locsyms
== NULL
)
7475 locsyms
= (Elf_Internal_Sym
*) symtab_hdr
->contents
;
7476 if (locsyms
== NULL
)
7477 locsyms
= bfd_elf_get_elf_syms (ibfd
, symtab_hdr
,
7478 symtab_hdr
->sh_info
,
7479 0, NULL
, NULL
, NULL
);
7480 if (locsyms
== NULL
)
7482 *locsymsp
= locsyms
;
7484 sym
= locsyms
+ r_symndx
;
7492 if (symsecp
!= NULL
)
7493 *symsecp
= bfd_section_from_elf_index (ibfd
, sym
->st_shndx
);
7495 if (tls_maskp
!= NULL
)
7497 struct got_entry
**lgot_ents
;
7498 unsigned char *tls_mask
;
7501 lgot_ents
= elf_local_got_ents (ibfd
);
7502 if (lgot_ents
!= NULL
)
7504 struct plt_entry
**local_plt
= (struct plt_entry
**)
7505 (lgot_ents
+ symtab_hdr
->sh_info
);
7506 unsigned char *lgot_masks
= (unsigned char *)
7507 (local_plt
+ symtab_hdr
->sh_info
);
7508 tls_mask
= &lgot_masks
[r_symndx
];
7510 *tls_maskp
= tls_mask
;
7516 /* Returns TLS_MASKP for the given REL symbol. Function return is 0 on
7517 error, 2 on a toc GD type suitable for optimization, 3 on a toc LD
7518 type suitable for optimization, and 1 otherwise. */
7521 get_tls_mask (unsigned char **tls_maskp
,
7522 unsigned long *toc_symndx
,
7523 bfd_vma
*toc_addend
,
7524 Elf_Internal_Sym
**locsymsp
,
7525 const Elf_Internal_Rela
*rel
,
7528 unsigned long r_symndx
;
7530 struct elf_link_hash_entry
*h
;
7531 Elf_Internal_Sym
*sym
;
7535 r_symndx
= ELF64_R_SYM (rel
->r_info
);
7536 if (!get_sym_h (&h
, &sym
, &sec
, tls_maskp
, locsymsp
, r_symndx
, ibfd
))
7539 if ((*tls_maskp
!= NULL
&& **tls_maskp
!= 0)
7541 || ppc64_elf_section_data (sec
) == NULL
7542 || ppc64_elf_section_data (sec
)->sec_type
!= sec_toc
)
7545 /* Look inside a TOC section too. */
7548 BFD_ASSERT (h
->root
.type
== bfd_link_hash_defined
);
7549 off
= h
->root
.u
.def
.value
;
7552 off
= sym
->st_value
;
7553 off
+= rel
->r_addend
;
7554 BFD_ASSERT (off
% 8 == 0);
7555 r_symndx
= ppc64_elf_section_data (sec
)->u
.toc
.symndx
[off
/ 8];
7556 next_r
= ppc64_elf_section_data (sec
)->u
.toc
.symndx
[off
/ 8 + 1];
7557 if (toc_symndx
!= NULL
)
7558 *toc_symndx
= r_symndx
;
7559 if (toc_addend
!= NULL
)
7560 *toc_addend
= ppc64_elf_section_data (sec
)->u
.toc
.add
[off
/ 8];
7561 if (!get_sym_h (&h
, &sym
, &sec
, tls_maskp
, locsymsp
, r_symndx
, ibfd
))
7563 if ((h
== NULL
|| is_static_defined (h
))
7564 && (next_r
== -1 || next_r
== -2))
7569 /* Find (or create) an entry in the tocsave hash table. */
7571 static struct tocsave_entry
*
7572 tocsave_find (struct ppc_link_hash_table
*htab
,
7573 enum insert_option insert
,
7574 Elf_Internal_Sym
**local_syms
,
7575 const Elf_Internal_Rela
*irela
,
7578 unsigned long r_indx
;
7579 struct elf_link_hash_entry
*h
;
7580 Elf_Internal_Sym
*sym
;
7581 struct tocsave_entry ent
, *p
;
7583 struct tocsave_entry
**slot
;
7585 r_indx
= ELF64_R_SYM (irela
->r_info
);
7586 if (!get_sym_h (&h
, &sym
, &ent
.sec
, NULL
, local_syms
, r_indx
, ibfd
))
7588 if (ent
.sec
== NULL
|| ent
.sec
->output_section
== NULL
)
7590 (*_bfd_error_handler
)
7591 (_("%B: undefined symbol on R_PPC64_TOCSAVE relocation"));
7596 ent
.offset
= h
->root
.u
.def
.value
;
7598 ent
.offset
= sym
->st_value
;
7599 ent
.offset
+= irela
->r_addend
;
7601 hash
= tocsave_htab_hash (&ent
);
7602 slot
= ((struct tocsave_entry
**)
7603 htab_find_slot_with_hash (htab
->tocsave_htab
, &ent
, hash
, insert
));
7609 p
= (struct tocsave_entry
*) bfd_alloc (ibfd
, sizeof (*p
));
7618 /* Adjust all global syms defined in opd sections. In gcc generated
7619 code for the old ABI, these will already have been done. */
7622 adjust_opd_syms (struct elf_link_hash_entry
*h
, void *inf ATTRIBUTE_UNUSED
)
7624 struct ppc_link_hash_entry
*eh
;
7626 struct _opd_sec_data
*opd
;
7628 if (h
->root
.type
== bfd_link_hash_indirect
)
7631 if (h
->root
.type
!= bfd_link_hash_defined
7632 && h
->root
.type
!= bfd_link_hash_defweak
)
7635 eh
= (struct ppc_link_hash_entry
*) h
;
7636 if (eh
->adjust_done
)
7639 sym_sec
= eh
->elf
.root
.u
.def
.section
;
7640 opd
= get_opd_info (sym_sec
);
7641 if (opd
!= NULL
&& opd
->adjust
!= NULL
)
7643 long adjust
= opd
->adjust
[OPD_NDX (eh
->elf
.root
.u
.def
.value
)];
7646 /* This entry has been deleted. */
7647 asection
*dsec
= ppc64_elf_tdata (sym_sec
->owner
)->deleted_section
;
7650 for (dsec
= sym_sec
->owner
->sections
; dsec
; dsec
= dsec
->next
)
7651 if (discarded_section (dsec
))
7653 ppc64_elf_tdata (sym_sec
->owner
)->deleted_section
= dsec
;
7657 eh
->elf
.root
.u
.def
.value
= 0;
7658 eh
->elf
.root
.u
.def
.section
= dsec
;
7661 eh
->elf
.root
.u
.def
.value
+= adjust
;
7662 eh
->adjust_done
= 1;
7667 /* Handles decrementing dynamic reloc counts for the reloc specified by
7668 R_INFO in section SEC. If LOCAL_SYMS is NULL, then H and SYM
7669 have already been determined. */
7672 dec_dynrel_count (bfd_vma r_info
,
7674 struct bfd_link_info
*info
,
7675 Elf_Internal_Sym
**local_syms
,
7676 struct elf_link_hash_entry
*h
,
7677 Elf_Internal_Sym
*sym
)
7679 enum elf_ppc64_reloc_type r_type
;
7680 asection
*sym_sec
= NULL
;
7682 /* Can this reloc be dynamic? This switch, and later tests here
7683 should be kept in sync with the code in check_relocs. */
7684 r_type
= ELF64_R_TYPE (r_info
);
7690 case R_PPC64_TPREL16
:
7691 case R_PPC64_TPREL16_LO
:
7692 case R_PPC64_TPREL16_HI
:
7693 case R_PPC64_TPREL16_HA
:
7694 case R_PPC64_TPREL16_DS
:
7695 case R_PPC64_TPREL16_LO_DS
:
7696 case R_PPC64_TPREL16_HIGH
:
7697 case R_PPC64_TPREL16_HIGHA
:
7698 case R_PPC64_TPREL16_HIGHER
:
7699 case R_PPC64_TPREL16_HIGHERA
:
7700 case R_PPC64_TPREL16_HIGHEST
:
7701 case R_PPC64_TPREL16_HIGHESTA
:
7702 if (!bfd_link_pic (info
))
7705 case R_PPC64_TPREL64
:
7706 case R_PPC64_DTPMOD64
:
7707 case R_PPC64_DTPREL64
:
7708 case R_PPC64_ADDR64
:
7712 case R_PPC64_ADDR14
:
7713 case R_PPC64_ADDR14_BRNTAKEN
:
7714 case R_PPC64_ADDR14_BRTAKEN
:
7715 case R_PPC64_ADDR16
:
7716 case R_PPC64_ADDR16_DS
:
7717 case R_PPC64_ADDR16_HA
:
7718 case R_PPC64_ADDR16_HI
:
7719 case R_PPC64_ADDR16_HIGH
:
7720 case R_PPC64_ADDR16_HIGHA
:
7721 case R_PPC64_ADDR16_HIGHER
:
7722 case R_PPC64_ADDR16_HIGHERA
:
7723 case R_PPC64_ADDR16_HIGHEST
:
7724 case R_PPC64_ADDR16_HIGHESTA
:
7725 case R_PPC64_ADDR16_LO
:
7726 case R_PPC64_ADDR16_LO_DS
:
7727 case R_PPC64_ADDR24
:
7728 case R_PPC64_ADDR32
:
7729 case R_PPC64_UADDR16
:
7730 case R_PPC64_UADDR32
:
7731 case R_PPC64_UADDR64
:
7736 if (local_syms
!= NULL
)
7738 unsigned long r_symndx
;
7739 bfd
*ibfd
= sec
->owner
;
7741 r_symndx
= ELF64_R_SYM (r_info
);
7742 if (!get_sym_h (&h
, &sym
, &sym_sec
, NULL
, local_syms
, r_symndx
, ibfd
))
7746 if ((bfd_link_pic (info
)
7747 && (must_be_dyn_reloc (info
, r_type
)
7749 && (!SYMBOLIC_BIND (info
, h
)
7750 || h
->root
.type
== bfd_link_hash_defweak
7751 || !h
->def_regular
))))
7752 || (ELIMINATE_COPY_RELOCS
7753 && !bfd_link_pic (info
)
7755 && (h
->root
.type
== bfd_link_hash_defweak
7756 || !h
->def_regular
)))
7763 struct elf_dyn_relocs
*p
;
7764 struct elf_dyn_relocs
**pp
;
7765 pp
= &((struct ppc_link_hash_entry
*) h
)->dyn_relocs
;
7767 /* elf_gc_sweep may have already removed all dyn relocs associated
7768 with local syms for a given section. Also, symbol flags are
7769 changed by elf_gc_sweep_symbol, confusing the test above. Don't
7770 report a dynreloc miscount. */
7771 if (*pp
== NULL
&& info
->gc_sections
)
7774 while ((p
= *pp
) != NULL
)
7778 if (!must_be_dyn_reloc (info
, r_type
))
7790 struct ppc_dyn_relocs
*p
;
7791 struct ppc_dyn_relocs
**pp
;
7793 bfd_boolean is_ifunc
;
7795 if (local_syms
== NULL
)
7796 sym_sec
= bfd_section_from_elf_index (sec
->owner
, sym
->st_shndx
);
7797 if (sym_sec
== NULL
)
7800 vpp
= &elf_section_data (sym_sec
)->local_dynrel
;
7801 pp
= (struct ppc_dyn_relocs
**) vpp
;
7803 if (*pp
== NULL
&& info
->gc_sections
)
7806 is_ifunc
= ELF_ST_TYPE (sym
->st_info
) == STT_GNU_IFUNC
;
7807 while ((p
= *pp
) != NULL
)
7809 if (p
->sec
== sec
&& p
->ifunc
== is_ifunc
)
7820 info
->callbacks
->einfo (_("%P: dynreloc miscount for %B, section %A\n"),
7822 bfd_set_error (bfd_error_bad_value
);
7826 /* Remove unused Official Procedure Descriptor entries. Currently we
7827 only remove those associated with functions in discarded link-once
7828 sections, or weakly defined functions that have been overridden. It
7829 would be possible to remove many more entries for statically linked
7833 ppc64_elf_edit_opd (struct bfd_link_info
*info
)
7836 bfd_boolean some_edited
= FALSE
;
7837 asection
*need_pad
= NULL
;
7838 struct ppc_link_hash_table
*htab
;
7840 htab
= ppc_hash_table (info
);
7844 for (ibfd
= info
->input_bfds
; ibfd
!= NULL
; ibfd
= ibfd
->link
.next
)
7847 Elf_Internal_Rela
*relstart
, *rel
, *relend
;
7848 Elf_Internal_Shdr
*symtab_hdr
;
7849 Elf_Internal_Sym
*local_syms
;
7850 struct _opd_sec_data
*opd
;
7851 bfd_boolean need_edit
, add_aux_fields
, broken
;
7852 bfd_size_type cnt_16b
= 0;
7854 if (!is_ppc64_elf (ibfd
))
7857 sec
= bfd_get_section_by_name (ibfd
, ".opd");
7858 if (sec
== NULL
|| sec
->size
== 0)
7861 if (sec
->sec_info_type
== SEC_INFO_TYPE_JUST_SYMS
)
7864 if (sec
->output_section
== bfd_abs_section_ptr
)
7867 /* Look through the section relocs. */
7868 if ((sec
->flags
& SEC_RELOC
) == 0 || sec
->reloc_count
== 0)
7872 symtab_hdr
= &elf_symtab_hdr (ibfd
);
7874 /* Read the relocations. */
7875 relstart
= _bfd_elf_link_read_relocs (ibfd
, sec
, NULL
, NULL
,
7877 if (relstart
== NULL
)
7880 /* First run through the relocs to check they are sane, and to
7881 determine whether we need to edit this opd section. */
7885 relend
= relstart
+ sec
->reloc_count
;
7886 for (rel
= relstart
; rel
< relend
; )
7888 enum elf_ppc64_reloc_type r_type
;
7889 unsigned long r_symndx
;
7891 struct elf_link_hash_entry
*h
;
7892 Elf_Internal_Sym
*sym
;
7895 /* .opd contains an array of 16 or 24 byte entries. We're
7896 only interested in the reloc pointing to a function entry
7898 offset
= rel
->r_offset
;
7899 if (rel
+ 1 == relend
7900 || rel
[1].r_offset
!= offset
+ 8)
7902 /* If someone messes with .opd alignment then after a
7903 "ld -r" we might have padding in the middle of .opd.
7904 Also, there's nothing to prevent someone putting
7905 something silly in .opd with the assembler. No .opd
7906 optimization for them! */
7908 (*_bfd_error_handler
)
7909 (_("%B: .opd is not a regular array of opd entries"), ibfd
);
7914 if ((r_type
= ELF64_R_TYPE (rel
->r_info
)) != R_PPC64_ADDR64
7915 || (r_type
= ELF64_R_TYPE ((rel
+ 1)->r_info
)) != R_PPC64_TOC
)
7917 (*_bfd_error_handler
)
7918 (_("%B: unexpected reloc type %u in .opd section"),
7924 r_symndx
= ELF64_R_SYM (rel
->r_info
);
7925 if (!get_sym_h (&h
, &sym
, &sym_sec
, NULL
, &local_syms
,
7929 if (sym_sec
== NULL
|| sym_sec
->owner
== NULL
)
7931 const char *sym_name
;
7933 sym_name
= h
->root
.root
.string
;
7935 sym_name
= bfd_elf_sym_name (ibfd
, symtab_hdr
, sym
,
7938 (*_bfd_error_handler
)
7939 (_("%B: undefined sym `%s' in .opd section"),
7945 /* opd entries are always for functions defined in the
7946 current input bfd. If the symbol isn't defined in the
7947 input bfd, then we won't be using the function in this
7948 bfd; It must be defined in a linkonce section in another
7949 bfd, or is weak. It's also possible that we are
7950 discarding the function due to a linker script /DISCARD/,
7951 which we test for via the output_section. */
7952 if (sym_sec
->owner
!= ibfd
7953 || sym_sec
->output_section
== bfd_abs_section_ptr
)
7957 if (rel
+ 1 == relend
7958 || (rel
+ 2 < relend
7959 && ELF64_R_TYPE (rel
[2].r_info
) == R_PPC64_TOC
))
7964 if (sec
->size
== offset
+ 24)
7969 if (sec
->size
== offset
+ 16)
7976 else if (rel
+ 1 < relend
7977 && ELF64_R_TYPE (rel
[0].r_info
) == R_PPC64_ADDR64
7978 && ELF64_R_TYPE (rel
[1].r_info
) == R_PPC64_TOC
)
7980 if (rel
[0].r_offset
== offset
+ 16)
7982 else if (rel
[0].r_offset
!= offset
+ 24)
7989 add_aux_fields
= htab
->params
->non_overlapping_opd
&& cnt_16b
> 0;
7991 if (!broken
&& (need_edit
|| add_aux_fields
))
7993 Elf_Internal_Rela
*write_rel
;
7994 Elf_Internal_Shdr
*rel_hdr
;
7995 bfd_byte
*rptr
, *wptr
;
7996 bfd_byte
*new_contents
;
7999 new_contents
= NULL
;
8000 amt
= OPD_NDX (sec
->size
) * sizeof (long);
8001 opd
= &ppc64_elf_section_data (sec
)->u
.opd
;
8002 opd
->adjust
= bfd_zalloc (sec
->owner
, amt
);
8003 if (opd
->adjust
== NULL
)
8005 ppc64_elf_section_data (sec
)->sec_type
= sec_opd
;
8007 /* This seems a waste of time as input .opd sections are all
8008 zeros as generated by gcc, but I suppose there's no reason
8009 this will always be so. We might start putting something in
8010 the third word of .opd entries. */
8011 if ((sec
->flags
& SEC_IN_MEMORY
) == 0)
8014 if (!bfd_malloc_and_get_section (ibfd
, sec
, &loc
))
8019 if (local_syms
!= NULL
8020 && symtab_hdr
->contents
!= (unsigned char *) local_syms
)
8022 if (elf_section_data (sec
)->relocs
!= relstart
)
8026 sec
->contents
= loc
;
8027 sec
->flags
|= (SEC_IN_MEMORY
| SEC_HAS_CONTENTS
);
8030 elf_section_data (sec
)->relocs
= relstart
;
8032 new_contents
= sec
->contents
;
8035 new_contents
= bfd_malloc (sec
->size
+ cnt_16b
* 8);
8036 if (new_contents
== NULL
)
8040 wptr
= new_contents
;
8041 rptr
= sec
->contents
;
8042 write_rel
= relstart
;
8043 for (rel
= relstart
; rel
< relend
; )
8045 unsigned long r_symndx
;
8047 struct elf_link_hash_entry
*h
;
8048 struct ppc_link_hash_entry
*fdh
= NULL
;
8049 Elf_Internal_Sym
*sym
;
8051 Elf_Internal_Rela
*next_rel
;
8054 r_symndx
= ELF64_R_SYM (rel
->r_info
);
8055 if (!get_sym_h (&h
, &sym
, &sym_sec
, NULL
, &local_syms
,
8060 if (next_rel
+ 1 == relend
8061 || (next_rel
+ 2 < relend
8062 && ELF64_R_TYPE (next_rel
[2].r_info
) == R_PPC64_TOC
))
8065 /* See if the .opd entry is full 24 byte or
8066 16 byte (with fd_aux entry overlapped with next
8069 if (next_rel
== relend
)
8071 if (sec
->size
== rel
->r_offset
+ 16)
8074 else if (next_rel
->r_offset
== rel
->r_offset
+ 16)
8078 && h
->root
.root
.string
[0] == '.')
8080 fdh
= lookup_fdh ((struct ppc_link_hash_entry
*) h
, htab
);
8082 && fdh
->elf
.root
.type
!= bfd_link_hash_defined
8083 && fdh
->elf
.root
.type
!= bfd_link_hash_defweak
)
8087 skip
= (sym_sec
->owner
!= ibfd
8088 || sym_sec
->output_section
== bfd_abs_section_ptr
);
8091 if (fdh
!= NULL
&& sym_sec
->owner
== ibfd
)
8093 /* Arrange for the function descriptor sym
8095 fdh
->elf
.root
.u
.def
.value
= 0;
8096 fdh
->elf
.root
.u
.def
.section
= sym_sec
;
8098 opd
->adjust
[OPD_NDX (rel
->r_offset
)] = -1;
8100 if (NO_OPD_RELOCS
|| bfd_link_relocatable (info
))
8105 if (!dec_dynrel_count (rel
->r_info
, sec
, info
,
8109 if (++rel
== next_rel
)
8112 r_symndx
= ELF64_R_SYM (rel
->r_info
);
8113 if (!get_sym_h (&h
, &sym
, &sym_sec
, NULL
, &local_syms
,
8120 /* We'll be keeping this opd entry. */
8125 /* Redefine the function descriptor symbol to
8126 this location in the opd section. It is
8127 necessary to update the value here rather
8128 than using an array of adjustments as we do
8129 for local symbols, because various places
8130 in the generic ELF code use the value
8131 stored in u.def.value. */
8132 fdh
->elf
.root
.u
.def
.value
= wptr
- new_contents
;
8133 fdh
->adjust_done
= 1;
8136 /* Local syms are a bit tricky. We could
8137 tweak them as they can be cached, but
8138 we'd need to look through the local syms
8139 for the function descriptor sym which we
8140 don't have at the moment. So keep an
8141 array of adjustments. */
8142 adjust
= (wptr
- new_contents
) - (rptr
- sec
->contents
);
8143 opd
->adjust
[OPD_NDX (rel
->r_offset
)] = adjust
;
8146 memcpy (wptr
, rptr
, opd_ent_size
);
8147 wptr
+= opd_ent_size
;
8148 if (add_aux_fields
&& opd_ent_size
== 16)
8150 memset (wptr
, '\0', 8);
8154 /* We need to adjust any reloc offsets to point to the
8156 for ( ; rel
!= next_rel
; ++rel
)
8158 rel
->r_offset
+= adjust
;
8159 if (write_rel
!= rel
)
8160 memcpy (write_rel
, rel
, sizeof (*rel
));
8165 rptr
+= opd_ent_size
;
8168 sec
->size
= wptr
- new_contents
;
8169 sec
->reloc_count
= write_rel
- relstart
;
8172 free (sec
->contents
);
8173 sec
->contents
= new_contents
;
8176 /* Fudge the header size too, as this is used later in
8177 elf_bfd_final_link if we are emitting relocs. */
8178 rel_hdr
= _bfd_elf_single_rel_hdr (sec
);
8179 rel_hdr
->sh_size
= sec
->reloc_count
* rel_hdr
->sh_entsize
;
8182 else if (elf_section_data (sec
)->relocs
!= relstart
)
8185 if (local_syms
!= NULL
8186 && symtab_hdr
->contents
!= (unsigned char *) local_syms
)
8188 if (!info
->keep_memory
)
8191 symtab_hdr
->contents
= (unsigned char *) local_syms
;
8196 elf_link_hash_traverse (elf_hash_table (info
), adjust_opd_syms
, NULL
);
8198 /* If we are doing a final link and the last .opd entry is just 16 byte
8199 long, add a 8 byte padding after it. */
8200 if (need_pad
!= NULL
&& !bfd_link_relocatable (info
))
8204 if ((need_pad
->flags
& SEC_IN_MEMORY
) == 0)
8206 BFD_ASSERT (need_pad
->size
> 0);
8208 p
= bfd_malloc (need_pad
->size
+ 8);
8212 if (! bfd_get_section_contents (need_pad
->owner
, need_pad
,
8213 p
, 0, need_pad
->size
))
8216 need_pad
->contents
= p
;
8217 need_pad
->flags
|= (SEC_IN_MEMORY
| SEC_HAS_CONTENTS
);
8221 p
= bfd_realloc (need_pad
->contents
, need_pad
->size
+ 8);
8225 need_pad
->contents
= p
;
8228 memset (need_pad
->contents
+ need_pad
->size
, 0, 8);
8229 need_pad
->size
+= 8;
8235 /* Set htab->tls_get_addr and call the generic ELF tls_setup function. */
8238 ppc64_elf_tls_setup (struct bfd_link_info
*info
)
8240 struct ppc_link_hash_table
*htab
;
8242 htab
= ppc_hash_table (info
);
8246 if (abiversion (info
->output_bfd
) == 1)
8249 if (htab
->params
->no_multi_toc
)
8250 htab
->do_multi_toc
= 0;
8251 else if (!htab
->do_multi_toc
)
8252 htab
->params
->no_multi_toc
= 1;
8254 htab
->tls_get_addr
= ((struct ppc_link_hash_entry
*)
8255 elf_link_hash_lookup (&htab
->elf
, ".__tls_get_addr",
8256 FALSE
, FALSE
, TRUE
));
8257 /* Move dynamic linking info to the function descriptor sym. */
8258 if (htab
->tls_get_addr
!= NULL
)
8259 func_desc_adjust (&htab
->tls_get_addr
->elf
, info
);
8260 htab
->tls_get_addr_fd
= ((struct ppc_link_hash_entry
*)
8261 elf_link_hash_lookup (&htab
->elf
, "__tls_get_addr",
8262 FALSE
, FALSE
, TRUE
));
8263 if (htab
->params
->tls_get_addr_opt
)
8265 struct elf_link_hash_entry
*opt
, *opt_fd
, *tga
, *tga_fd
;
8267 opt
= elf_link_hash_lookup (&htab
->elf
, ".__tls_get_addr_opt",
8268 FALSE
, FALSE
, TRUE
);
8270 func_desc_adjust (opt
, info
);
8271 opt_fd
= elf_link_hash_lookup (&htab
->elf
, "__tls_get_addr_opt",
8272 FALSE
, FALSE
, TRUE
);
8274 && (opt_fd
->root
.type
== bfd_link_hash_defined
8275 || opt_fd
->root
.type
== bfd_link_hash_defweak
))
8277 /* If glibc supports an optimized __tls_get_addr call stub,
8278 signalled by the presence of __tls_get_addr_opt, and we'll
8279 be calling __tls_get_addr via a plt call stub, then
8280 make __tls_get_addr point to __tls_get_addr_opt. */
8281 tga_fd
= &htab
->tls_get_addr_fd
->elf
;
8282 if (htab
->elf
.dynamic_sections_created
8284 && (tga_fd
->type
== STT_FUNC
8285 || tga_fd
->needs_plt
)
8286 && !(SYMBOL_CALLS_LOCAL (info
, tga_fd
)
8287 || (ELF_ST_VISIBILITY (tga_fd
->other
) != STV_DEFAULT
8288 && tga_fd
->root
.type
== bfd_link_hash_undefweak
)))
8290 struct plt_entry
*ent
;
8292 for (ent
= tga_fd
->plt
.plist
; ent
!= NULL
; ent
= ent
->next
)
8293 if (ent
->plt
.refcount
> 0)
8297 tga_fd
->root
.type
= bfd_link_hash_indirect
;
8298 tga_fd
->root
.u
.i
.link
= &opt_fd
->root
;
8299 ppc64_elf_copy_indirect_symbol (info
, opt_fd
, tga_fd
);
8300 opt_fd
->forced_local
= 0;
8301 if (opt_fd
->dynindx
!= -1)
8303 /* Use __tls_get_addr_opt in dynamic relocations. */
8304 opt_fd
->dynindx
= -1;
8305 _bfd_elf_strtab_delref (elf_hash_table (info
)->dynstr
,
8306 opt_fd
->dynstr_index
);
8307 if (!bfd_elf_link_record_dynamic_symbol (info
, opt_fd
))
8310 htab
->tls_get_addr_fd
= (struct ppc_link_hash_entry
*) opt_fd
;
8311 tga
= &htab
->tls_get_addr
->elf
;
8312 if (opt
!= NULL
&& tga
!= NULL
)
8314 tga
->root
.type
= bfd_link_hash_indirect
;
8315 tga
->root
.u
.i
.link
= &opt
->root
;
8316 ppc64_elf_copy_indirect_symbol (info
, opt
, tga
);
8317 opt
->forced_local
= 0;
8318 _bfd_elf_link_hash_hide_symbol (info
, opt
,
8320 htab
->tls_get_addr
= (struct ppc_link_hash_entry
*) opt
;
8322 htab
->tls_get_addr_fd
->oh
= htab
->tls_get_addr
;
8323 htab
->tls_get_addr_fd
->is_func_descriptor
= 1;
8324 if (htab
->tls_get_addr
!= NULL
)
8326 htab
->tls_get_addr
->oh
= htab
->tls_get_addr_fd
;
8327 htab
->tls_get_addr
->is_func
= 1;
8332 else if (htab
->params
->tls_get_addr_opt
< 0)
8333 htab
->params
->tls_get_addr_opt
= 0;
8335 return _bfd_elf_tls_setup (info
->output_bfd
, info
);
8338 /* Return TRUE iff REL is a branch reloc with a global symbol matching
8342 branch_reloc_hash_match (const bfd
*ibfd
,
8343 const Elf_Internal_Rela
*rel
,
8344 const struct ppc_link_hash_entry
*hash1
,
8345 const struct ppc_link_hash_entry
*hash2
)
8347 Elf_Internal_Shdr
*symtab_hdr
= &elf_symtab_hdr (ibfd
);
8348 enum elf_ppc64_reloc_type r_type
= ELF64_R_TYPE (rel
->r_info
);
8349 unsigned int r_symndx
= ELF64_R_SYM (rel
->r_info
);
8351 if (r_symndx
>= symtab_hdr
->sh_info
&& is_branch_reloc (r_type
))
8353 struct elf_link_hash_entry
**sym_hashes
= elf_sym_hashes (ibfd
);
8354 struct elf_link_hash_entry
*h
;
8356 h
= sym_hashes
[r_symndx
- symtab_hdr
->sh_info
];
8357 h
= elf_follow_link (h
);
8358 if (h
== &hash1
->elf
|| h
== &hash2
->elf
)
8364 /* Run through all the TLS relocs looking for optimization
8365 opportunities. The linker has been hacked (see ppc64elf.em) to do
8366 a preliminary section layout so that we know the TLS segment
8367 offsets. We can't optimize earlier because some optimizations need
8368 to know the tp offset, and we need to optimize before allocating
8369 dynamic relocations. */
8372 ppc64_elf_tls_optimize (struct bfd_link_info
*info
)
8376 struct ppc_link_hash_table
*htab
;
8377 unsigned char *toc_ref
;
8380 if (!bfd_link_executable (info
))
8383 htab
= ppc_hash_table (info
);
8387 /* Make two passes over the relocs. On the first pass, mark toc
8388 entries involved with tls relocs, and check that tls relocs
8389 involved in setting up a tls_get_addr call are indeed followed by
8390 such a call. If they are not, we can't do any tls optimization.
8391 On the second pass twiddle tls_mask flags to notify
8392 relocate_section that optimization can be done, and adjust got
8393 and plt refcounts. */
8395 for (pass
= 0; pass
< 2; ++pass
)
8396 for (ibfd
= info
->input_bfds
; ibfd
!= NULL
; ibfd
= ibfd
->link
.next
)
8398 Elf_Internal_Sym
*locsyms
= NULL
;
8399 asection
*toc
= bfd_get_section_by_name (ibfd
, ".toc");
8401 for (sec
= ibfd
->sections
; sec
!= NULL
; sec
= sec
->next
)
8402 if (sec
->has_tls_reloc
&& !bfd_is_abs_section (sec
->output_section
))
8404 Elf_Internal_Rela
*relstart
, *rel
, *relend
;
8405 bfd_boolean found_tls_get_addr_arg
= 0;
8407 /* Read the relocations. */
8408 relstart
= _bfd_elf_link_read_relocs (ibfd
, sec
, NULL
, NULL
,
8410 if (relstart
== NULL
)
8416 relend
= relstart
+ sec
->reloc_count
;
8417 for (rel
= relstart
; rel
< relend
; rel
++)
8419 enum elf_ppc64_reloc_type r_type
;
8420 unsigned long r_symndx
;
8421 struct elf_link_hash_entry
*h
;
8422 Elf_Internal_Sym
*sym
;
8424 unsigned char *tls_mask
;
8425 unsigned char tls_set
, tls_clear
, tls_type
= 0;
8427 bfd_boolean ok_tprel
, is_local
;
8428 long toc_ref_index
= 0;
8429 int expecting_tls_get_addr
= 0;
8430 bfd_boolean ret
= FALSE
;
8432 r_symndx
= ELF64_R_SYM (rel
->r_info
);
8433 if (!get_sym_h (&h
, &sym
, &sym_sec
, &tls_mask
, &locsyms
,
8437 if (elf_section_data (sec
)->relocs
!= relstart
)
8439 if (toc_ref
!= NULL
)
8442 && (elf_symtab_hdr (ibfd
).contents
8443 != (unsigned char *) locsyms
))
8450 if (h
->root
.type
== bfd_link_hash_defined
8451 || h
->root
.type
== bfd_link_hash_defweak
)
8452 value
= h
->root
.u
.def
.value
;
8453 else if (h
->root
.type
== bfd_link_hash_undefweak
)
8457 found_tls_get_addr_arg
= 0;
8462 /* Symbols referenced by TLS relocs must be of type
8463 STT_TLS. So no need for .opd local sym adjust. */
8464 value
= sym
->st_value
;
8473 && h
->root
.type
== bfd_link_hash_undefweak
)
8475 else if (sym_sec
!= NULL
8476 && sym_sec
->output_section
!= NULL
)
8478 value
+= sym_sec
->output_offset
;
8479 value
+= sym_sec
->output_section
->vma
;
8480 value
-= htab
->elf
.tls_sec
->vma
;
8481 ok_tprel
= (value
+ TP_OFFSET
+ ((bfd_vma
) 1 << 31)
8482 < (bfd_vma
) 1 << 32);
8486 r_type
= ELF64_R_TYPE (rel
->r_info
);
8487 /* If this section has old-style __tls_get_addr calls
8488 without marker relocs, then check that each
8489 __tls_get_addr call reloc is preceded by a reloc
8490 that conceivably belongs to the __tls_get_addr arg
8491 setup insn. If we don't find matching arg setup
8492 relocs, don't do any tls optimization. */
8494 && sec
->has_tls_get_addr_call
8496 && (h
== &htab
->tls_get_addr
->elf
8497 || h
== &htab
->tls_get_addr_fd
->elf
)
8498 && !found_tls_get_addr_arg
8499 && is_branch_reloc (r_type
))
8501 info
->callbacks
->minfo (_("%H __tls_get_addr lost arg, "
8502 "TLS optimization disabled\n"),
8503 ibfd
, sec
, rel
->r_offset
);
8508 found_tls_get_addr_arg
= 0;
8511 case R_PPC64_GOT_TLSLD16
:
8512 case R_PPC64_GOT_TLSLD16_LO
:
8513 expecting_tls_get_addr
= 1;
8514 found_tls_get_addr_arg
= 1;
8517 case R_PPC64_GOT_TLSLD16_HI
:
8518 case R_PPC64_GOT_TLSLD16_HA
:
8519 /* These relocs should never be against a symbol
8520 defined in a shared lib. Leave them alone if
8521 that turns out to be the case. */
8528 tls_type
= TLS_TLS
| TLS_LD
;
8531 case R_PPC64_GOT_TLSGD16
:
8532 case R_PPC64_GOT_TLSGD16_LO
:
8533 expecting_tls_get_addr
= 1;
8534 found_tls_get_addr_arg
= 1;
8537 case R_PPC64_GOT_TLSGD16_HI
:
8538 case R_PPC64_GOT_TLSGD16_HA
:
8544 tls_set
= TLS_TLS
| TLS_TPRELGD
;
8546 tls_type
= TLS_TLS
| TLS_GD
;
8549 case R_PPC64_GOT_TPREL16_DS
:
8550 case R_PPC64_GOT_TPREL16_LO_DS
:
8551 case R_PPC64_GOT_TPREL16_HI
:
8552 case R_PPC64_GOT_TPREL16_HA
:
8557 tls_clear
= TLS_TPREL
;
8558 tls_type
= TLS_TLS
| TLS_TPREL
;
8565 found_tls_get_addr_arg
= 1;
8570 case R_PPC64_TOC16_LO
:
8571 if (sym_sec
== NULL
|| sym_sec
!= toc
)
8574 /* Mark this toc entry as referenced by a TLS
8575 code sequence. We can do that now in the
8576 case of R_PPC64_TLS, and after checking for
8577 tls_get_addr for the TOC16 relocs. */
8578 if (toc_ref
== NULL
)
8579 toc_ref
= bfd_zmalloc (toc
->output_section
->rawsize
/ 8);
8580 if (toc_ref
== NULL
)
8584 value
= h
->root
.u
.def
.value
;
8586 value
= sym
->st_value
;
8587 value
+= rel
->r_addend
;
8590 BFD_ASSERT (value
< toc
->size
8591 && toc
->output_offset
% 8 == 0);
8592 toc_ref_index
= (value
+ toc
->output_offset
) / 8;
8593 if (r_type
== R_PPC64_TLS
8594 || r_type
== R_PPC64_TLSGD
8595 || r_type
== R_PPC64_TLSLD
)
8597 toc_ref
[toc_ref_index
] = 1;
8601 if (pass
!= 0 && toc_ref
[toc_ref_index
] == 0)
8606 expecting_tls_get_addr
= 2;
8609 case R_PPC64_TPREL64
:
8613 || !toc_ref
[(rel
->r_offset
+ toc
->output_offset
) / 8])
8618 tls_set
= TLS_EXPLICIT
;
8619 tls_clear
= TLS_TPREL
;
8624 case R_PPC64_DTPMOD64
:
8628 || !toc_ref
[(rel
->r_offset
+ toc
->output_offset
) / 8])
8630 if (rel
+ 1 < relend
8632 == ELF64_R_INFO (r_symndx
, R_PPC64_DTPREL64
))
8633 && rel
[1].r_offset
== rel
->r_offset
+ 8)
8637 tls_set
= TLS_EXPLICIT
| TLS_GD
;
8640 tls_set
= TLS_EXPLICIT
| TLS_GD
| TLS_TPRELGD
;
8649 tls_set
= TLS_EXPLICIT
;
8660 if (!expecting_tls_get_addr
8661 || !sec
->has_tls_get_addr_call
)
8664 if (rel
+ 1 < relend
8665 && branch_reloc_hash_match (ibfd
, rel
+ 1,
8667 htab
->tls_get_addr_fd
))
8669 if (expecting_tls_get_addr
== 2)
8671 /* Check for toc tls entries. */
8672 unsigned char *toc_tls
;
8675 retval
= get_tls_mask (&toc_tls
, NULL
, NULL
,
8680 if (toc_tls
!= NULL
)
8682 if ((*toc_tls
& (TLS_GD
| TLS_LD
)) != 0)
8683 found_tls_get_addr_arg
= 1;
8685 toc_ref
[toc_ref_index
] = 1;
8691 if (expecting_tls_get_addr
!= 1)
8694 /* Uh oh, we didn't find the expected call. We
8695 could just mark this symbol to exclude it
8696 from tls optimization but it's safer to skip
8697 the entire optimization. */
8698 info
->callbacks
->minfo (_("%H arg lost __tls_get_addr, "
8699 "TLS optimization disabled\n"),
8700 ibfd
, sec
, rel
->r_offset
);
8705 if (expecting_tls_get_addr
&& htab
->tls_get_addr
!= NULL
)
8707 struct plt_entry
*ent
;
8708 for (ent
= htab
->tls_get_addr
->elf
.plt
.plist
;
8711 if (ent
->addend
== 0)
8713 if (ent
->plt
.refcount
> 0)
8715 ent
->plt
.refcount
-= 1;
8716 expecting_tls_get_addr
= 0;
8722 if (expecting_tls_get_addr
&& htab
->tls_get_addr_fd
!= NULL
)
8724 struct plt_entry
*ent
;
8725 for (ent
= htab
->tls_get_addr_fd
->elf
.plt
.plist
;
8728 if (ent
->addend
== 0)
8730 if (ent
->plt
.refcount
> 0)
8731 ent
->plt
.refcount
-= 1;
8739 if ((tls_set
& TLS_EXPLICIT
) == 0)
8741 struct got_entry
*ent
;
8743 /* Adjust got entry for this reloc. */
8747 ent
= elf_local_got_ents (ibfd
)[r_symndx
];
8749 for (; ent
!= NULL
; ent
= ent
->next
)
8750 if (ent
->addend
== rel
->r_addend
8751 && ent
->owner
== ibfd
8752 && ent
->tls_type
== tls_type
)
8759 /* We managed to get rid of a got entry. */
8760 if (ent
->got
.refcount
> 0)
8761 ent
->got
.refcount
-= 1;
8766 /* If we got rid of a DTPMOD/DTPREL reloc pair then
8767 we'll lose one or two dyn relocs. */
8768 if (!dec_dynrel_count (rel
->r_info
, sec
, info
,
8772 if (tls_set
== (TLS_EXPLICIT
| TLS_GD
))
8774 if (!dec_dynrel_count ((rel
+ 1)->r_info
, sec
, info
,
8780 *tls_mask
|= tls_set
;
8781 *tls_mask
&= ~tls_clear
;
8784 if (elf_section_data (sec
)->relocs
!= relstart
)
8789 && (elf_symtab_hdr (ibfd
).contents
!= (unsigned char *) locsyms
))
8791 if (!info
->keep_memory
)
8794 elf_symtab_hdr (ibfd
).contents
= (unsigned char *) locsyms
;
8798 if (toc_ref
!= NULL
)
8803 /* Called via elf_link_hash_traverse from ppc64_elf_edit_toc to adjust
8804 the values of any global symbols in a toc section that has been
8805 edited. Globals in toc sections should be a rarity, so this function
8806 sets a flag if any are found in toc sections other than the one just
8807 edited, so that futher hash table traversals can be avoided. */
8809 struct adjust_toc_info
8812 unsigned long *skip
;
8813 bfd_boolean global_toc_syms
;
8816 enum toc_skip_enum
{ ref_from_discarded
= 1, can_optimize
= 2 };
8819 adjust_toc_syms (struct elf_link_hash_entry
*h
, void *inf
)
8821 struct ppc_link_hash_entry
*eh
;
8822 struct adjust_toc_info
*toc_inf
= (struct adjust_toc_info
*) inf
;
8825 if (h
->root
.type
!= bfd_link_hash_defined
8826 && h
->root
.type
!= bfd_link_hash_defweak
)
8829 eh
= (struct ppc_link_hash_entry
*) h
;
8830 if (eh
->adjust_done
)
8833 if (eh
->elf
.root
.u
.def
.section
== toc_inf
->toc
)
8835 if (eh
->elf
.root
.u
.def
.value
> toc_inf
->toc
->rawsize
)
8836 i
= toc_inf
->toc
->rawsize
>> 3;
8838 i
= eh
->elf
.root
.u
.def
.value
>> 3;
8840 if ((toc_inf
->skip
[i
] & (ref_from_discarded
| can_optimize
)) != 0)
8842 (*_bfd_error_handler
)
8843 (_("%s defined on removed toc entry"), eh
->elf
.root
.root
.string
);
8846 while ((toc_inf
->skip
[i
] & (ref_from_discarded
| can_optimize
)) != 0);
8847 eh
->elf
.root
.u
.def
.value
= (bfd_vma
) i
<< 3;
8850 eh
->elf
.root
.u
.def
.value
-= toc_inf
->skip
[i
];
8851 eh
->adjust_done
= 1;
8853 else if (strcmp (eh
->elf
.root
.u
.def
.section
->name
, ".toc") == 0)
8854 toc_inf
->global_toc_syms
= TRUE
;
8859 /* Return TRUE iff INSN is one we expect on a _LO variety toc/got reloc. */
8862 ok_lo_toc_insn (unsigned int insn
)
8864 return ((insn
& (0x3f << 26)) == 14u << 26 /* addi */
8865 || (insn
& (0x3f << 26)) == 32u << 26 /* lwz */
8866 || (insn
& (0x3f << 26)) == 34u << 26 /* lbz */
8867 || (insn
& (0x3f << 26)) == 36u << 26 /* stw */
8868 || (insn
& (0x3f << 26)) == 38u << 26 /* stb */
8869 || (insn
& (0x3f << 26)) == 40u << 26 /* lhz */
8870 || (insn
& (0x3f << 26)) == 42u << 26 /* lha */
8871 || (insn
& (0x3f << 26)) == 44u << 26 /* sth */
8872 || (insn
& (0x3f << 26)) == 46u << 26 /* lmw */
8873 || (insn
& (0x3f << 26)) == 47u << 26 /* stmw */
8874 || (insn
& (0x3f << 26)) == 48u << 26 /* lfs */
8875 || (insn
& (0x3f << 26)) == 50u << 26 /* lfd */
8876 || (insn
& (0x3f << 26)) == 52u << 26 /* stfs */
8877 || (insn
& (0x3f << 26)) == 54u << 26 /* stfd */
8878 || ((insn
& (0x3f << 26)) == 58u << 26 /* lwa,ld,lmd */
8880 || ((insn
& (0x3f << 26)) == 62u << 26 /* std, stmd */
8881 && ((insn
& 3) == 0 || (insn
& 3) == 3))
8882 || (insn
& (0x3f << 26)) == 12u << 26 /* addic */);
8885 /* Examine all relocs referencing .toc sections in order to remove
8886 unused .toc entries. */
8889 ppc64_elf_edit_toc (struct bfd_link_info
*info
)
8892 struct adjust_toc_info toc_inf
;
8893 struct ppc_link_hash_table
*htab
= ppc_hash_table (info
);
8895 htab
->do_toc_opt
= 1;
8896 toc_inf
.global_toc_syms
= TRUE
;
8897 for (ibfd
= info
->input_bfds
; ibfd
!= NULL
; ibfd
= ibfd
->link
.next
)
8899 asection
*toc
, *sec
;
8900 Elf_Internal_Shdr
*symtab_hdr
;
8901 Elf_Internal_Sym
*local_syms
;
8902 Elf_Internal_Rela
*relstart
, *rel
, *toc_relocs
;
8903 unsigned long *skip
, *drop
;
8904 unsigned char *used
;
8905 unsigned char *keep
, last
, some_unused
;
8907 if (!is_ppc64_elf (ibfd
))
8910 toc
= bfd_get_section_by_name (ibfd
, ".toc");
8913 || toc
->sec_info_type
== SEC_INFO_TYPE_JUST_SYMS
8914 || discarded_section (toc
))
8919 symtab_hdr
= &elf_symtab_hdr (ibfd
);
8921 /* Look at sections dropped from the final link. */
8924 for (sec
= ibfd
->sections
; sec
!= NULL
; sec
= sec
->next
)
8926 if (sec
->reloc_count
== 0
8927 || !discarded_section (sec
)
8928 || get_opd_info (sec
)
8929 || (sec
->flags
& SEC_ALLOC
) == 0
8930 || (sec
->flags
& SEC_DEBUGGING
) != 0)
8933 relstart
= _bfd_elf_link_read_relocs (ibfd
, sec
, NULL
, NULL
, FALSE
);
8934 if (relstart
== NULL
)
8937 /* Run through the relocs to see which toc entries might be
8939 for (rel
= relstart
; rel
< relstart
+ sec
->reloc_count
; ++rel
)
8941 enum elf_ppc64_reloc_type r_type
;
8942 unsigned long r_symndx
;
8944 struct elf_link_hash_entry
*h
;
8945 Elf_Internal_Sym
*sym
;
8948 r_type
= ELF64_R_TYPE (rel
->r_info
);
8955 case R_PPC64_TOC16_LO
:
8956 case R_PPC64_TOC16_HI
:
8957 case R_PPC64_TOC16_HA
:
8958 case R_PPC64_TOC16_DS
:
8959 case R_PPC64_TOC16_LO_DS
:
8963 r_symndx
= ELF64_R_SYM (rel
->r_info
);
8964 if (!get_sym_h (&h
, &sym
, &sym_sec
, NULL
, &local_syms
,
8972 val
= h
->root
.u
.def
.value
;
8974 val
= sym
->st_value
;
8975 val
+= rel
->r_addend
;
8977 if (val
>= toc
->size
)
8980 /* Anything in the toc ought to be aligned to 8 bytes.
8981 If not, don't mark as unused. */
8987 skip
= bfd_zmalloc (sizeof (*skip
) * (toc
->size
+ 15) / 8);
8992 skip
[val
>> 3] = ref_from_discarded
;
8995 if (elf_section_data (sec
)->relocs
!= relstart
)
8999 /* For largetoc loads of address constants, we can convert
9000 . addis rx,2,addr@got@ha
9001 . ld ry,addr@got@l(rx)
9003 . addis rx,2,addr@toc@ha
9004 . addi ry,rx,addr@toc@l
9005 when addr is within 2G of the toc pointer. This then means
9006 that the word storing "addr" in the toc is no longer needed. */
9008 if (!ppc64_elf_tdata (ibfd
)->has_small_toc_reloc
9009 && toc
->output_section
->rawsize
< (bfd_vma
) 1 << 31
9010 && toc
->reloc_count
!= 0)
9012 /* Read toc relocs. */
9013 toc_relocs
= _bfd_elf_link_read_relocs (ibfd
, toc
, NULL
, NULL
,
9015 if (toc_relocs
== NULL
)
9018 for (rel
= toc_relocs
; rel
< toc_relocs
+ toc
->reloc_count
; ++rel
)
9020 enum elf_ppc64_reloc_type r_type
;
9021 unsigned long r_symndx
;
9023 struct elf_link_hash_entry
*h
;
9024 Elf_Internal_Sym
*sym
;
9027 r_type
= ELF64_R_TYPE (rel
->r_info
);
9028 if (r_type
!= R_PPC64_ADDR64
)
9031 r_symndx
= ELF64_R_SYM (rel
->r_info
);
9032 if (!get_sym_h (&h
, &sym
, &sym_sec
, NULL
, &local_syms
,
9037 || sym_sec
->output_section
== NULL
9038 || discarded_section (sym_sec
))
9041 if (!SYMBOL_REFERENCES_LOCAL (info
, h
))
9046 if (h
->type
== STT_GNU_IFUNC
)
9048 val
= h
->root
.u
.def
.value
;
9052 if (ELF_ST_TYPE (sym
->st_info
) == STT_GNU_IFUNC
)
9054 val
= sym
->st_value
;
9056 val
+= rel
->r_addend
;
9057 val
+= sym_sec
->output_section
->vma
+ sym_sec
->output_offset
;
9059 /* We don't yet know the exact toc pointer value, but we
9060 know it will be somewhere in the toc section. Don't
9061 optimize if the difference from any possible toc
9062 pointer is outside [ff..f80008000, 7fff7fff]. */
9063 addr
= toc
->output_section
->vma
+ TOC_BASE_OFF
;
9064 if (val
- addr
+ (bfd_vma
) 0x80008000 >= (bfd_vma
) 1 << 32)
9067 addr
= toc
->output_section
->vma
+ toc
->output_section
->rawsize
;
9068 if (val
- addr
+ (bfd_vma
) 0x80008000 >= (bfd_vma
) 1 << 32)
9073 skip
= bfd_zmalloc (sizeof (*skip
) * (toc
->size
+ 15) / 8);
9078 skip
[rel
->r_offset
>> 3]
9079 |= can_optimize
| ((rel
- toc_relocs
) << 2);
9086 used
= bfd_zmalloc (sizeof (*used
) * (toc
->size
+ 7) / 8);
9090 if (local_syms
!= NULL
9091 && symtab_hdr
->contents
!= (unsigned char *) local_syms
)
9095 && elf_section_data (sec
)->relocs
!= relstart
)
9097 if (toc_relocs
!= NULL
9098 && elf_section_data (toc
)->relocs
!= toc_relocs
)
9105 /* Now check all kept sections that might reference the toc.
9106 Check the toc itself last. */
9107 for (sec
= (ibfd
->sections
== toc
&& toc
->next
? toc
->next
9110 sec
= (sec
== toc
? NULL
9111 : sec
->next
== NULL
? toc
9112 : sec
->next
== toc
&& toc
->next
? toc
->next
9117 if (sec
->reloc_count
== 0
9118 || discarded_section (sec
)
9119 || get_opd_info (sec
)
9120 || (sec
->flags
& SEC_ALLOC
) == 0
9121 || (sec
->flags
& SEC_DEBUGGING
) != 0)
9124 relstart
= _bfd_elf_link_read_relocs (ibfd
, sec
, NULL
, NULL
,
9126 if (relstart
== NULL
)
9132 /* Mark toc entries referenced as used. */
9136 for (rel
= relstart
; rel
< relstart
+ sec
->reloc_count
; ++rel
)
9138 enum elf_ppc64_reloc_type r_type
;
9139 unsigned long r_symndx
;
9141 struct elf_link_hash_entry
*h
;
9142 Elf_Internal_Sym
*sym
;
9144 enum {no_check
, check_lo
, check_ha
} insn_check
;
9146 r_type
= ELF64_R_TYPE (rel
->r_info
);
9150 insn_check
= no_check
;
9153 case R_PPC64_GOT_TLSLD16_HA
:
9154 case R_PPC64_GOT_TLSGD16_HA
:
9155 case R_PPC64_GOT_TPREL16_HA
:
9156 case R_PPC64_GOT_DTPREL16_HA
:
9157 case R_PPC64_GOT16_HA
:
9158 case R_PPC64_TOC16_HA
:
9159 insn_check
= check_ha
;
9162 case R_PPC64_GOT_TLSLD16_LO
:
9163 case R_PPC64_GOT_TLSGD16_LO
:
9164 case R_PPC64_GOT_TPREL16_LO_DS
:
9165 case R_PPC64_GOT_DTPREL16_LO_DS
:
9166 case R_PPC64_GOT16_LO
:
9167 case R_PPC64_GOT16_LO_DS
:
9168 case R_PPC64_TOC16_LO
:
9169 case R_PPC64_TOC16_LO_DS
:
9170 insn_check
= check_lo
;
9174 if (insn_check
!= no_check
)
9176 bfd_vma off
= rel
->r_offset
& ~3;
9177 unsigned char buf
[4];
9180 if (!bfd_get_section_contents (ibfd
, sec
, buf
, off
, 4))
9185 insn
= bfd_get_32 (ibfd
, buf
);
9186 if (insn_check
== check_lo
9187 ? !ok_lo_toc_insn (insn
)
9188 : ((insn
& ((0x3f << 26) | 0x1f << 16))
9189 != ((15u << 26) | (2 << 16)) /* addis rt,2,imm */))
9193 ppc64_elf_tdata (ibfd
)->unexpected_toc_insn
= 1;
9194 sprintf (str
, "%#08x", insn
);
9195 info
->callbacks
->einfo
9196 (_("%P: %H: toc optimization is not supported for"
9197 " %s instruction.\n"),
9198 ibfd
, sec
, rel
->r_offset
& ~3, str
);
9205 case R_PPC64_TOC16_LO
:
9206 case R_PPC64_TOC16_HI
:
9207 case R_PPC64_TOC16_HA
:
9208 case R_PPC64_TOC16_DS
:
9209 case R_PPC64_TOC16_LO_DS
:
9210 /* In case we're taking addresses of toc entries. */
9211 case R_PPC64_ADDR64
:
9218 r_symndx
= ELF64_R_SYM (rel
->r_info
);
9219 if (!get_sym_h (&h
, &sym
, &sym_sec
, NULL
, &local_syms
,
9230 val
= h
->root
.u
.def
.value
;
9232 val
= sym
->st_value
;
9233 val
+= rel
->r_addend
;
9235 if (val
>= toc
->size
)
9238 if ((skip
[val
>> 3] & can_optimize
) != 0)
9245 case R_PPC64_TOC16_HA
:
9248 case R_PPC64_TOC16_LO_DS
:
9249 off
= rel
->r_offset
;
9250 off
+= (bfd_big_endian (ibfd
) ? -2 : 3);
9251 if (!bfd_get_section_contents (ibfd
, sec
, &opc
,
9257 if ((opc
& (0x3f << 2)) == (58u << 2))
9262 /* Wrong sort of reloc, or not a ld. We may
9263 as well clear ref_from_discarded too. */
9270 /* For the toc section, we only mark as used if this
9271 entry itself isn't unused. */
9272 else if ((used
[rel
->r_offset
>> 3]
9273 || !(skip
[rel
->r_offset
>> 3] & ref_from_discarded
))
9276 /* Do all the relocs again, to catch reference
9285 if (elf_section_data (sec
)->relocs
!= relstart
)
9289 /* Merge the used and skip arrays. Assume that TOC
9290 doublewords not appearing as either used or unused belong
9291 to to an entry more than one doubleword in size. */
9292 for (drop
= skip
, keep
= used
, last
= 0, some_unused
= 0;
9293 drop
< skip
+ (toc
->size
+ 7) / 8;
9298 *drop
&= ~ref_from_discarded
;
9299 if ((*drop
& can_optimize
) != 0)
9303 else if ((*drop
& ref_from_discarded
) != 0)
9306 last
= ref_from_discarded
;
9316 bfd_byte
*contents
, *src
;
9318 Elf_Internal_Sym
*sym
;
9319 bfd_boolean local_toc_syms
= FALSE
;
9321 /* Shuffle the toc contents, and at the same time convert the
9322 skip array from booleans into offsets. */
9323 if (!bfd_malloc_and_get_section (ibfd
, toc
, &contents
))
9326 elf_section_data (toc
)->this_hdr
.contents
= contents
;
9328 for (src
= contents
, off
= 0, drop
= skip
;
9329 src
< contents
+ toc
->size
;
9332 if ((*drop
& (can_optimize
| ref_from_discarded
)) != 0)
9337 memcpy (src
- off
, src
, 8);
9341 toc
->rawsize
= toc
->size
;
9342 toc
->size
= src
- contents
- off
;
9344 /* Adjust addends for relocs against the toc section sym,
9345 and optimize any accesses we can. */
9346 for (sec
= ibfd
->sections
; sec
!= NULL
; sec
= sec
->next
)
9348 if (sec
->reloc_count
== 0
9349 || discarded_section (sec
))
9352 relstart
= _bfd_elf_link_read_relocs (ibfd
, sec
, NULL
, NULL
,
9354 if (relstart
== NULL
)
9357 for (rel
= relstart
; rel
< relstart
+ sec
->reloc_count
; ++rel
)
9359 enum elf_ppc64_reloc_type r_type
;
9360 unsigned long r_symndx
;
9362 struct elf_link_hash_entry
*h
;
9365 r_type
= ELF64_R_TYPE (rel
->r_info
);
9372 case R_PPC64_TOC16_LO
:
9373 case R_PPC64_TOC16_HI
:
9374 case R_PPC64_TOC16_HA
:
9375 case R_PPC64_TOC16_DS
:
9376 case R_PPC64_TOC16_LO_DS
:
9377 case R_PPC64_ADDR64
:
9381 r_symndx
= ELF64_R_SYM (rel
->r_info
);
9382 if (!get_sym_h (&h
, &sym
, &sym_sec
, NULL
, &local_syms
,
9390 val
= h
->root
.u
.def
.value
;
9393 val
= sym
->st_value
;
9395 local_toc_syms
= TRUE
;
9398 val
+= rel
->r_addend
;
9400 if (val
> toc
->rawsize
)
9402 else if ((skip
[val
>> 3] & ref_from_discarded
) != 0)
9404 else if ((skip
[val
>> 3] & can_optimize
) != 0)
9406 Elf_Internal_Rela
*tocrel
9407 = toc_relocs
+ (skip
[val
>> 3] >> 2);
9408 unsigned long tsym
= ELF64_R_SYM (tocrel
->r_info
);
9412 case R_PPC64_TOC16_HA
:
9413 rel
->r_info
= ELF64_R_INFO (tsym
, R_PPC64_TOC16_HA
);
9416 case R_PPC64_TOC16_LO_DS
:
9417 rel
->r_info
= ELF64_R_INFO (tsym
, R_PPC64_LO_DS_OPT
);
9421 if (!ppc64_elf_howto_table
[R_PPC64_ADDR32
])
9423 info
->callbacks
->einfo
9424 (_("%P: %H: %s references "
9425 "optimized away TOC entry\n"),
9426 ibfd
, sec
, rel
->r_offset
,
9427 ppc64_elf_howto_table
[r_type
]->name
);
9428 bfd_set_error (bfd_error_bad_value
);
9431 rel
->r_addend
= tocrel
->r_addend
;
9432 elf_section_data (sec
)->relocs
= relstart
;
9436 if (h
!= NULL
|| sym
->st_value
!= 0)
9439 rel
->r_addend
-= skip
[val
>> 3];
9440 elf_section_data (sec
)->relocs
= relstart
;
9443 if (elf_section_data (sec
)->relocs
!= relstart
)
9447 /* We shouldn't have local or global symbols defined in the TOC,
9448 but handle them anyway. */
9449 if (local_syms
!= NULL
)
9450 for (sym
= local_syms
;
9451 sym
< local_syms
+ symtab_hdr
->sh_info
;
9453 if (sym
->st_value
!= 0
9454 && bfd_section_from_elf_index (ibfd
, sym
->st_shndx
) == toc
)
9458 if (sym
->st_value
> toc
->rawsize
)
9459 i
= toc
->rawsize
>> 3;
9461 i
= sym
->st_value
>> 3;
9463 if ((skip
[i
] & (ref_from_discarded
| can_optimize
)) != 0)
9466 (*_bfd_error_handler
)
9467 (_("%s defined on removed toc entry"),
9468 bfd_elf_sym_name (ibfd
, symtab_hdr
, sym
, NULL
));
9471 while ((skip
[i
] & (ref_from_discarded
| can_optimize
)));
9472 sym
->st_value
= (bfd_vma
) i
<< 3;
9475 sym
->st_value
-= skip
[i
];
9476 symtab_hdr
->contents
= (unsigned char *) local_syms
;
9479 /* Adjust any global syms defined in this toc input section. */
9480 if (toc_inf
.global_toc_syms
)
9483 toc_inf
.skip
= skip
;
9484 toc_inf
.global_toc_syms
= FALSE
;
9485 elf_link_hash_traverse (elf_hash_table (info
), adjust_toc_syms
,
9489 if (toc
->reloc_count
!= 0)
9491 Elf_Internal_Shdr
*rel_hdr
;
9492 Elf_Internal_Rela
*wrel
;
9495 /* Remove unused toc relocs, and adjust those we keep. */
9496 if (toc_relocs
== NULL
)
9497 toc_relocs
= _bfd_elf_link_read_relocs (ibfd
, toc
, NULL
, NULL
,
9499 if (toc_relocs
== NULL
)
9503 for (rel
= toc_relocs
; rel
< toc_relocs
+ toc
->reloc_count
; ++rel
)
9504 if ((skip
[rel
->r_offset
>> 3]
9505 & (ref_from_discarded
| can_optimize
)) == 0)
9507 wrel
->r_offset
= rel
->r_offset
- skip
[rel
->r_offset
>> 3];
9508 wrel
->r_info
= rel
->r_info
;
9509 wrel
->r_addend
= rel
->r_addend
;
9512 else if (!dec_dynrel_count (rel
->r_info
, toc
, info
,
9513 &local_syms
, NULL
, NULL
))
9516 elf_section_data (toc
)->relocs
= toc_relocs
;
9517 toc
->reloc_count
= wrel
- toc_relocs
;
9518 rel_hdr
= _bfd_elf_single_rel_hdr (toc
);
9519 sz
= rel_hdr
->sh_entsize
;
9520 rel_hdr
->sh_size
= toc
->reloc_count
* sz
;
9523 else if (toc_relocs
!= NULL
9524 && elf_section_data (toc
)->relocs
!= toc_relocs
)
9527 if (local_syms
!= NULL
9528 && symtab_hdr
->contents
!= (unsigned char *) local_syms
)
9530 if (!info
->keep_memory
)
9533 symtab_hdr
->contents
= (unsigned char *) local_syms
;
9541 /* Return true iff input section I references the TOC using
9542 instructions limited to +/-32k offsets. */
9545 ppc64_elf_has_small_toc_reloc (asection
*i
)
9547 return (is_ppc64_elf (i
->owner
)
9548 && ppc64_elf_tdata (i
->owner
)->has_small_toc_reloc
);
9551 /* Allocate space for one GOT entry. */
9554 allocate_got (struct elf_link_hash_entry
*h
,
9555 struct bfd_link_info
*info
,
9556 struct got_entry
*gent
)
9558 struct ppc_link_hash_table
*htab
= ppc_hash_table (info
);
9560 struct ppc_link_hash_entry
*eh
= (struct ppc_link_hash_entry
*) h
;
9561 int entsize
= (gent
->tls_type
& eh
->tls_mask
& (TLS_GD
| TLS_LD
)
9563 int rentsize
= (gent
->tls_type
& eh
->tls_mask
& TLS_GD
9564 ? 2 : 1) * sizeof (Elf64_External_Rela
);
9565 asection
*got
= ppc64_elf_tdata (gent
->owner
)->got
;
9567 gent
->got
.offset
= got
->size
;
9568 got
->size
+= entsize
;
9570 dyn
= htab
->elf
.dynamic_sections_created
;
9571 if (h
->type
== STT_GNU_IFUNC
)
9573 htab
->elf
.irelplt
->size
+= rentsize
;
9574 htab
->got_reli_size
+= rentsize
;
9576 else if ((bfd_link_pic (info
)
9577 || WILL_CALL_FINISH_DYNAMIC_SYMBOL (dyn
, 0, h
))
9578 && (ELF_ST_VISIBILITY (h
->other
) == STV_DEFAULT
9579 || h
->root
.type
!= bfd_link_hash_undefweak
))
9581 asection
*relgot
= ppc64_elf_tdata (gent
->owner
)->relgot
;
9582 relgot
->size
+= rentsize
;
9586 /* This function merges got entries in the same toc group. */
9589 merge_got_entries (struct got_entry
**pent
)
9591 struct got_entry
*ent
, *ent2
;
9593 for (ent
= *pent
; ent
!= NULL
; ent
= ent
->next
)
9594 if (!ent
->is_indirect
)
9595 for (ent2
= ent
->next
; ent2
!= NULL
; ent2
= ent2
->next
)
9596 if (!ent2
->is_indirect
9597 && ent2
->addend
== ent
->addend
9598 && ent2
->tls_type
== ent
->tls_type
9599 && elf_gp (ent2
->owner
) == elf_gp (ent
->owner
))
9601 ent2
->is_indirect
= TRUE
;
9602 ent2
->got
.ent
= ent
;
9606 /* Allocate space in .plt, .got and associated reloc sections for
9610 allocate_dynrelocs (struct elf_link_hash_entry
*h
, void *inf
)
9612 struct bfd_link_info
*info
;
9613 struct ppc_link_hash_table
*htab
;
9615 struct ppc_link_hash_entry
*eh
;
9616 struct got_entry
**pgent
, *gent
;
9618 if (h
->root
.type
== bfd_link_hash_indirect
)
9621 info
= (struct bfd_link_info
*) inf
;
9622 htab
= ppc_hash_table (info
);
9626 eh
= (struct ppc_link_hash_entry
*) h
;
9627 /* Run through the TLS GD got entries first if we're changing them
9629 if ((eh
->tls_mask
& TLS_TPRELGD
) != 0)
9630 for (gent
= h
->got
.glist
; gent
!= NULL
; gent
= gent
->next
)
9631 if (gent
->got
.refcount
> 0
9632 && (gent
->tls_type
& TLS_GD
) != 0)
9634 /* This was a GD entry that has been converted to TPREL. If
9635 there happens to be a TPREL entry we can use that one. */
9636 struct got_entry
*ent
;
9637 for (ent
= h
->got
.glist
; ent
!= NULL
; ent
= ent
->next
)
9638 if (ent
->got
.refcount
> 0
9639 && (ent
->tls_type
& TLS_TPREL
) != 0
9640 && ent
->addend
== gent
->addend
9641 && ent
->owner
== gent
->owner
)
9643 gent
->got
.refcount
= 0;
9647 /* If not, then we'll be using our own TPREL entry. */
9648 if (gent
->got
.refcount
!= 0)
9649 gent
->tls_type
= TLS_TLS
| TLS_TPREL
;
9652 /* Remove any list entry that won't generate a word in the GOT before
9653 we call merge_got_entries. Otherwise we risk merging to empty
9655 pgent
= &h
->got
.glist
;
9656 while ((gent
= *pgent
) != NULL
)
9657 if (gent
->got
.refcount
> 0)
9659 if ((gent
->tls_type
& TLS_LD
) != 0
9662 ppc64_tlsld_got (gent
->owner
)->got
.refcount
+= 1;
9663 *pgent
= gent
->next
;
9666 pgent
= &gent
->next
;
9669 *pgent
= gent
->next
;
9671 if (!htab
->do_multi_toc
)
9672 merge_got_entries (&h
->got
.glist
);
9674 for (gent
= h
->got
.glist
; gent
!= NULL
; gent
= gent
->next
)
9675 if (!gent
->is_indirect
)
9677 /* Make sure this symbol is output as a dynamic symbol.
9678 Undefined weak syms won't yet be marked as dynamic,
9679 nor will all TLS symbols. */
9680 if (h
->dynindx
== -1
9682 && h
->type
!= STT_GNU_IFUNC
9683 && htab
->elf
.dynamic_sections_created
)
9685 if (! bfd_elf_link_record_dynamic_symbol (info
, h
))
9689 if (!is_ppc64_elf (gent
->owner
))
9692 allocate_got (h
, info
, gent
);
9695 if (!htab
->elf
.dynamic_sections_created
9696 && h
->type
!= STT_GNU_IFUNC
)
9697 eh
->dyn_relocs
= NULL
;
9699 if (eh
->dyn_relocs
!= NULL
)
9701 struct elf_dyn_relocs
*p
, **pp
;
9703 /* In the shared -Bsymbolic case, discard space allocated for
9704 dynamic pc-relative relocs against symbols which turn out to
9705 be defined in regular objects. For the normal shared case,
9706 discard space for relocs that have become local due to symbol
9707 visibility changes. */
9709 if (bfd_link_pic (info
))
9711 /* Relocs that use pc_count are those that appear on a call
9712 insn, or certain REL relocs (see must_be_dyn_reloc) that
9713 can be generated via assembly. We want calls to
9714 protected symbols to resolve directly to the function
9715 rather than going via the plt. If people want function
9716 pointer comparisons to work as expected then they should
9717 avoid writing weird assembly. */
9718 if (SYMBOL_CALLS_LOCAL (info
, h
))
9720 for (pp
= &eh
->dyn_relocs
; (p
= *pp
) != NULL
; )
9722 p
->count
-= p
->pc_count
;
9731 /* Also discard relocs on undefined weak syms with
9732 non-default visibility. */
9733 if (eh
->dyn_relocs
!= NULL
9734 && h
->root
.type
== bfd_link_hash_undefweak
)
9736 if (ELF_ST_VISIBILITY (h
->other
) != STV_DEFAULT
)
9737 eh
->dyn_relocs
= NULL
;
9739 /* Make sure this symbol is output as a dynamic symbol.
9740 Undefined weak syms won't yet be marked as dynamic. */
9741 else if (h
->dynindx
== -1
9742 && !h
->forced_local
)
9744 if (! bfd_elf_link_record_dynamic_symbol (info
, h
))
9749 else if (h
->type
== STT_GNU_IFUNC
)
9751 /* A plt entry is always created when making direct calls to
9752 an ifunc, even when building a static executable, but
9753 that doesn't cover all cases. We may have only an ifunc
9754 initialised function pointer for a given ifunc symbol.
9756 For ELFv2, dynamic relocations are not required when
9757 generating a global entry PLT stub. */
9758 if (abiversion (info
->output_bfd
) >= 2)
9760 if (global_entry_stub (h
))
9761 eh
->dyn_relocs
= NULL
;
9764 /* For ELFv1 we have function descriptors. Descriptors need
9765 to be treated like PLT entries and thus have dynamic
9766 relocations. One exception is when the function
9767 descriptor is copied into .dynbss (which should only
9768 happen with ancient versions of gcc). */
9769 else if (h
->needs_copy
)
9770 eh
->dyn_relocs
= NULL
;
9772 else if (ELIMINATE_COPY_RELOCS
)
9774 /* For the non-pic case, discard space for relocs against
9775 symbols which turn out to need copy relocs or are not
9778 /* First make sure this symbol is output as a dynamic symbol.
9779 Undefined weak syms won't yet be marked as dynamic. */
9780 if (h
->root
.type
== bfd_link_hash_undefweak
9785 && !bfd_elf_link_record_dynamic_symbol (info
, h
))
9790 || h
->dynindx
== -1)
9791 eh
->dyn_relocs
= NULL
;
9794 /* Finally, allocate space. */
9795 for (p
= eh
->dyn_relocs
; p
!= NULL
; p
= p
->next
)
9797 asection
*sreloc
= elf_section_data (p
->sec
)->sreloc
;
9798 if (eh
->elf
.type
== STT_GNU_IFUNC
)
9799 sreloc
= htab
->elf
.irelplt
;
9800 sreloc
->size
+= p
->count
* sizeof (Elf64_External_Rela
);
9804 if ((htab
->elf
.dynamic_sections_created
9806 && WILL_CALL_FINISH_DYNAMIC_SYMBOL (1, bfd_link_pic (info
), h
))
9807 || h
->type
== STT_GNU_IFUNC
)
9809 struct plt_entry
*pent
;
9810 bfd_boolean doneone
= FALSE
;
9811 for (pent
= h
->plt
.plist
; pent
!= NULL
; pent
= pent
->next
)
9812 if (pent
->plt
.refcount
> 0)
9814 if (!htab
->elf
.dynamic_sections_created
9815 || h
->dynindx
== -1)
9818 pent
->plt
.offset
= s
->size
;
9819 s
->size
+= PLT_ENTRY_SIZE (htab
);
9820 s
= htab
->elf
.irelplt
;
9824 /* If this is the first .plt entry, make room for the special
9828 s
->size
+= PLT_INITIAL_ENTRY_SIZE (htab
);
9830 pent
->plt
.offset
= s
->size
;
9832 /* Make room for this entry. */
9833 s
->size
+= PLT_ENTRY_SIZE (htab
);
9835 /* Make room for the .glink code. */
9838 s
->size
+= GLINK_CALL_STUB_SIZE
;
9841 /* We need bigger stubs past index 32767. */
9842 if (s
->size
>= GLINK_CALL_STUB_SIZE
+ 32768*2*4)
9849 /* We also need to make an entry in the .rela.plt section. */
9850 s
= htab
->elf
.srelplt
;
9852 s
->size
+= sizeof (Elf64_External_Rela
);
9856 pent
->plt
.offset
= (bfd_vma
) -1;
9859 h
->plt
.plist
= NULL
;
9865 h
->plt
.plist
= NULL
;
9872 /* Called via elf_link_hash_traverse from ppc64_elf_size_dynamic_sections
9873 to set up space for global entry stubs. These are put in glink,
9874 after the branch table. */
9877 size_global_entry_stubs (struct elf_link_hash_entry
*h
, void *inf
)
9879 struct bfd_link_info
*info
;
9880 struct ppc_link_hash_table
*htab
;
9881 struct plt_entry
*pent
;
9884 if (h
->root
.type
== bfd_link_hash_indirect
)
9887 if (!h
->pointer_equality_needed
)
9894 htab
= ppc_hash_table (info
);
9899 for (pent
= h
->plt
.plist
; pent
!= NULL
; pent
= pent
->next
)
9900 if (pent
->plt
.offset
!= (bfd_vma
) -1
9901 && pent
->addend
== 0)
9903 /* For ELFv2, if this symbol is not defined in a regular file
9904 and we are not generating a shared library or pie, then we
9905 need to define the symbol in the executable on a call stub.
9906 This is to avoid text relocations. */
9907 s
->size
= (s
->size
+ 15) & -16;
9908 h
->root
.type
= bfd_link_hash_defined
;
9909 h
->root
.u
.def
.section
= s
;
9910 h
->root
.u
.def
.value
= s
->size
;
9917 /* Set DF_TEXTREL if we find any dynamic relocs that apply to
9918 read-only sections. */
9921 maybe_set_textrel (struct elf_link_hash_entry
*h
, void *info
)
9923 if (h
->root
.type
== bfd_link_hash_indirect
)
9926 if (readonly_dynrelocs (h
))
9928 ((struct bfd_link_info
*) info
)->flags
|= DF_TEXTREL
;
9930 /* Not an error, just cut short the traversal. */
9936 /* Set the sizes of the dynamic sections. */
9939 ppc64_elf_size_dynamic_sections (bfd
*output_bfd
,
9940 struct bfd_link_info
*info
)
9942 struct ppc_link_hash_table
*htab
;
9947 struct got_entry
*first_tlsld
;
9949 htab
= ppc_hash_table (info
);
9953 dynobj
= htab
->elf
.dynobj
;
9957 if (htab
->elf
.dynamic_sections_created
)
9959 /* Set the contents of the .interp section to the interpreter. */
9960 if (bfd_link_executable (info
) && !info
->nointerp
)
9962 s
= bfd_get_linker_section (dynobj
, ".interp");
9965 s
->size
= sizeof ELF_DYNAMIC_INTERPRETER
;
9966 s
->contents
= (unsigned char *) ELF_DYNAMIC_INTERPRETER
;
9970 /* Set up .got offsets for local syms, and space for local dynamic
9972 for (ibfd
= info
->input_bfds
; ibfd
!= NULL
; ibfd
= ibfd
->link
.next
)
9974 struct got_entry
**lgot_ents
;
9975 struct got_entry
**end_lgot_ents
;
9976 struct plt_entry
**local_plt
;
9977 struct plt_entry
**end_local_plt
;
9978 unsigned char *lgot_masks
;
9979 bfd_size_type locsymcount
;
9980 Elf_Internal_Shdr
*symtab_hdr
;
9982 if (!is_ppc64_elf (ibfd
))
9985 for (s
= ibfd
->sections
; s
!= NULL
; s
= s
->next
)
9987 struct ppc_dyn_relocs
*p
;
9989 for (p
= elf_section_data (s
)->local_dynrel
; p
!= NULL
; p
= p
->next
)
9991 if (!bfd_is_abs_section (p
->sec
)
9992 && bfd_is_abs_section (p
->sec
->output_section
))
9994 /* Input section has been discarded, either because
9995 it is a copy of a linkonce section or due to
9996 linker script /DISCARD/, so we'll be discarding
9999 else if (p
->count
!= 0)
10001 asection
*srel
= elf_section_data (p
->sec
)->sreloc
;
10003 srel
= htab
->elf
.irelplt
;
10004 srel
->size
+= p
->count
* sizeof (Elf64_External_Rela
);
10005 if ((p
->sec
->output_section
->flags
& SEC_READONLY
) != 0)
10006 info
->flags
|= DF_TEXTREL
;
10011 lgot_ents
= elf_local_got_ents (ibfd
);
10015 symtab_hdr
= &elf_symtab_hdr (ibfd
);
10016 locsymcount
= symtab_hdr
->sh_info
;
10017 end_lgot_ents
= lgot_ents
+ locsymcount
;
10018 local_plt
= (struct plt_entry
**) end_lgot_ents
;
10019 end_local_plt
= local_plt
+ locsymcount
;
10020 lgot_masks
= (unsigned char *) end_local_plt
;
10021 s
= ppc64_elf_tdata (ibfd
)->got
;
10022 for (; lgot_ents
< end_lgot_ents
; ++lgot_ents
, ++lgot_masks
)
10024 struct got_entry
**pent
, *ent
;
10027 while ((ent
= *pent
) != NULL
)
10028 if (ent
->got
.refcount
> 0)
10030 if ((ent
->tls_type
& *lgot_masks
& TLS_LD
) != 0)
10032 ppc64_tlsld_got (ibfd
)->got
.refcount
+= 1;
10037 unsigned int ent_size
= 8;
10038 unsigned int rel_size
= sizeof (Elf64_External_Rela
);
10040 ent
->got
.offset
= s
->size
;
10041 if ((ent
->tls_type
& *lgot_masks
& TLS_GD
) != 0)
10046 s
->size
+= ent_size
;
10047 if ((*lgot_masks
& PLT_IFUNC
) != 0)
10049 htab
->elf
.irelplt
->size
+= rel_size
;
10050 htab
->got_reli_size
+= rel_size
;
10052 else if (bfd_link_pic (info
))
10054 asection
*srel
= ppc64_elf_tdata (ibfd
)->relgot
;
10055 srel
->size
+= rel_size
;
10064 /* Allocate space for calls to local STT_GNU_IFUNC syms in .iplt. */
10065 for (; local_plt
< end_local_plt
; ++local_plt
)
10067 struct plt_entry
*ent
;
10069 for (ent
= *local_plt
; ent
!= NULL
; ent
= ent
->next
)
10070 if (ent
->plt
.refcount
> 0)
10072 s
= htab
->elf
.iplt
;
10073 ent
->plt
.offset
= s
->size
;
10074 s
->size
+= PLT_ENTRY_SIZE (htab
);
10076 htab
->elf
.irelplt
->size
+= sizeof (Elf64_External_Rela
);
10079 ent
->plt
.offset
= (bfd_vma
) -1;
10083 /* Allocate global sym .plt and .got entries, and space for global
10084 sym dynamic relocs. */
10085 elf_link_hash_traverse (&htab
->elf
, allocate_dynrelocs
, info
);
10086 /* Stash the end of glink branch table. */
10087 if (htab
->glink
!= NULL
)
10088 htab
->glink
->rawsize
= htab
->glink
->size
;
10090 if (!htab
->opd_abi
&& !bfd_link_pic (info
))
10091 elf_link_hash_traverse (&htab
->elf
, size_global_entry_stubs
, info
);
10093 first_tlsld
= NULL
;
10094 for (ibfd
= info
->input_bfds
; ibfd
!= NULL
; ibfd
= ibfd
->link
.next
)
10096 struct got_entry
*ent
;
10098 if (!is_ppc64_elf (ibfd
))
10101 ent
= ppc64_tlsld_got (ibfd
);
10102 if (ent
->got
.refcount
> 0)
10104 if (!htab
->do_multi_toc
&& first_tlsld
!= NULL
)
10106 ent
->is_indirect
= TRUE
;
10107 ent
->got
.ent
= first_tlsld
;
10111 if (first_tlsld
== NULL
)
10113 s
= ppc64_elf_tdata (ibfd
)->got
;
10114 ent
->got
.offset
= s
->size
;
10117 if (bfd_link_pic (info
))
10119 asection
*srel
= ppc64_elf_tdata (ibfd
)->relgot
;
10120 srel
->size
+= sizeof (Elf64_External_Rela
);
10125 ent
->got
.offset
= (bfd_vma
) -1;
10128 /* We now have determined the sizes of the various dynamic sections.
10129 Allocate memory for them. */
10131 for (s
= dynobj
->sections
; s
!= NULL
; s
= s
->next
)
10133 if ((s
->flags
& SEC_LINKER_CREATED
) == 0)
10136 if (s
== htab
->brlt
|| s
== htab
->relbrlt
)
10137 /* These haven't been allocated yet; don't strip. */
10139 else if (s
== htab
->elf
.sgot
10140 || s
== htab
->elf
.splt
10141 || s
== htab
->elf
.iplt
10142 || s
== htab
->glink
10143 || s
== htab
->dynbss
)
10145 /* Strip this section if we don't need it; see the
10148 else if (s
== htab
->glink_eh_frame
)
10150 if (!bfd_is_abs_section (s
->output_section
))
10151 /* Not sized yet. */
10154 else if (CONST_STRNEQ (s
->name
, ".rela"))
10158 if (s
!= htab
->elf
.srelplt
)
10161 /* We use the reloc_count field as a counter if we need
10162 to copy relocs into the output file. */
10163 s
->reloc_count
= 0;
10168 /* It's not one of our sections, so don't allocate space. */
10174 /* If we don't need this section, strip it from the
10175 output file. This is mostly to handle .rela.bss and
10176 .rela.plt. We must create both sections in
10177 create_dynamic_sections, because they must be created
10178 before the linker maps input sections to output
10179 sections. The linker does that before
10180 adjust_dynamic_symbol is called, and it is that
10181 function which decides whether anything needs to go
10182 into these sections. */
10183 s
->flags
|= SEC_EXCLUDE
;
10187 if ((s
->flags
& SEC_HAS_CONTENTS
) == 0)
10190 /* Allocate memory for the section contents. We use bfd_zalloc
10191 here in case unused entries are not reclaimed before the
10192 section's contents are written out. This should not happen,
10193 but this way if it does we get a R_PPC64_NONE reloc in .rela
10194 sections instead of garbage.
10195 We also rely on the section contents being zero when writing
10197 s
->contents
= bfd_zalloc (dynobj
, s
->size
);
10198 if (s
->contents
== NULL
)
10202 for (ibfd
= info
->input_bfds
; ibfd
!= NULL
; ibfd
= ibfd
->link
.next
)
10204 if (!is_ppc64_elf (ibfd
))
10207 s
= ppc64_elf_tdata (ibfd
)->got
;
10208 if (s
!= NULL
&& s
!= htab
->elf
.sgot
)
10211 s
->flags
|= SEC_EXCLUDE
;
10214 s
->contents
= bfd_zalloc (ibfd
, s
->size
);
10215 if (s
->contents
== NULL
)
10219 s
= ppc64_elf_tdata (ibfd
)->relgot
;
10223 s
->flags
|= SEC_EXCLUDE
;
10226 s
->contents
= bfd_zalloc (ibfd
, s
->size
);
10227 if (s
->contents
== NULL
)
10230 s
->reloc_count
= 0;
10235 if (htab
->elf
.dynamic_sections_created
)
10237 bfd_boolean tls_opt
;
10239 /* Add some entries to the .dynamic section. We fill in the
10240 values later, in ppc64_elf_finish_dynamic_sections, but we
10241 must add the entries now so that we get the correct size for
10242 the .dynamic section. The DT_DEBUG entry is filled in by the
10243 dynamic linker and used by the debugger. */
10244 #define add_dynamic_entry(TAG, VAL) \
10245 _bfd_elf_add_dynamic_entry (info, TAG, VAL)
10247 if (bfd_link_executable (info
))
10249 if (!add_dynamic_entry (DT_DEBUG
, 0))
10253 if (htab
->elf
.splt
!= NULL
&& htab
->elf
.splt
->size
!= 0)
10255 if (!add_dynamic_entry (DT_PLTGOT
, 0)
10256 || !add_dynamic_entry (DT_PLTRELSZ
, 0)
10257 || !add_dynamic_entry (DT_PLTREL
, DT_RELA
)
10258 || !add_dynamic_entry (DT_JMPREL
, 0)
10259 || !add_dynamic_entry (DT_PPC64_GLINK
, 0))
10263 if (NO_OPD_RELOCS
&& abiversion (output_bfd
) <= 1)
10265 if (!add_dynamic_entry (DT_PPC64_OPD
, 0)
10266 || !add_dynamic_entry (DT_PPC64_OPDSZ
, 0))
10270 tls_opt
= (htab
->params
->tls_get_addr_opt
10271 && htab
->tls_get_addr_fd
!= NULL
10272 && htab
->tls_get_addr_fd
->elf
.plt
.plist
!= NULL
);
10273 if (tls_opt
|| !htab
->opd_abi
)
10275 if (!add_dynamic_entry (DT_PPC64_OPT
, tls_opt
? PPC64_OPT_TLS
: 0))
10281 if (!add_dynamic_entry (DT_RELA
, 0)
10282 || !add_dynamic_entry (DT_RELASZ
, 0)
10283 || !add_dynamic_entry (DT_RELAENT
, sizeof (Elf64_External_Rela
)))
10286 /* If any dynamic relocs apply to a read-only section,
10287 then we need a DT_TEXTREL entry. */
10288 if ((info
->flags
& DF_TEXTREL
) == 0)
10289 elf_link_hash_traverse (&htab
->elf
, maybe_set_textrel
, info
);
10291 if ((info
->flags
& DF_TEXTREL
) != 0)
10293 if (!add_dynamic_entry (DT_TEXTREL
, 0))
10298 #undef add_dynamic_entry
10303 /* Return TRUE if symbol should be hashed in the `.gnu.hash' section. */
10306 ppc64_elf_hash_symbol (struct elf_link_hash_entry
*h
)
10308 if (h
->plt
.plist
!= NULL
10310 && !h
->pointer_equality_needed
)
10313 return _bfd_elf_hash_symbol (h
);
10316 /* Determine the type of stub needed, if any, for a call. */
10318 static inline enum ppc_stub_type
10319 ppc_type_of_stub (asection
*input_sec
,
10320 const Elf_Internal_Rela
*rel
,
10321 struct ppc_link_hash_entry
**hash
,
10322 struct plt_entry
**plt_ent
,
10323 bfd_vma destination
,
10324 unsigned long local_off
)
10326 struct ppc_link_hash_entry
*h
= *hash
;
10328 bfd_vma branch_offset
;
10329 bfd_vma max_branch_offset
;
10330 enum elf_ppc64_reloc_type r_type
;
10334 struct plt_entry
*ent
;
10335 struct ppc_link_hash_entry
*fdh
= h
;
10337 && h
->oh
->is_func_descriptor
)
10339 fdh
= ppc_follow_link (h
->oh
);
10343 for (ent
= fdh
->elf
.plt
.plist
; ent
!= NULL
; ent
= ent
->next
)
10344 if (ent
->addend
== rel
->r_addend
10345 && ent
->plt
.offset
!= (bfd_vma
) -1)
10348 return ppc_stub_plt_call
;
10351 /* Here, we know we don't have a plt entry. If we don't have a
10352 either a defined function descriptor or a defined entry symbol
10353 in a regular object file, then it is pointless trying to make
10354 any other type of stub. */
10355 if (!is_static_defined (&fdh
->elf
)
10356 && !is_static_defined (&h
->elf
))
10357 return ppc_stub_none
;
10359 else if (elf_local_got_ents (input_sec
->owner
) != NULL
)
10361 Elf_Internal_Shdr
*symtab_hdr
= &elf_symtab_hdr (input_sec
->owner
);
10362 struct plt_entry
**local_plt
= (struct plt_entry
**)
10363 elf_local_got_ents (input_sec
->owner
) + symtab_hdr
->sh_info
;
10364 unsigned long r_symndx
= ELF64_R_SYM (rel
->r_info
);
10366 if (local_plt
[r_symndx
] != NULL
)
10368 struct plt_entry
*ent
;
10370 for (ent
= local_plt
[r_symndx
]; ent
!= NULL
; ent
= ent
->next
)
10371 if (ent
->addend
== rel
->r_addend
10372 && ent
->plt
.offset
!= (bfd_vma
) -1)
10375 return ppc_stub_plt_call
;
10380 /* Determine where the call point is. */
10381 location
= (input_sec
->output_offset
10382 + input_sec
->output_section
->vma
10385 branch_offset
= destination
- location
;
10386 r_type
= ELF64_R_TYPE (rel
->r_info
);
10388 /* Determine if a long branch stub is needed. */
10389 max_branch_offset
= 1 << 25;
10390 if (r_type
!= R_PPC64_REL24
)
10391 max_branch_offset
= 1 << 15;
10393 if (branch_offset
+ max_branch_offset
>= 2 * max_branch_offset
- local_off
)
10394 /* We need a stub. Figure out whether a long_branch or plt_branch
10395 is needed later. */
10396 return ppc_stub_long_branch
;
10398 return ppc_stub_none
;
10401 /* With power7 weakly ordered memory model, it is possible for ld.so
10402 to update a plt entry in one thread and have another thread see a
10403 stale zero toc entry. To avoid this we need some sort of acquire
10404 barrier in the call stub. One solution is to make the load of the
10405 toc word seem to appear to depend on the load of the function entry
10406 word. Another solution is to test for r2 being zero, and branch to
10407 the appropriate glink entry if so.
10409 . fake dep barrier compare
10410 . ld 12,xxx(2) ld 12,xxx(2)
10411 . mtctr 12 mtctr 12
10412 . xor 11,12,12 ld 2,xxx+8(2)
10413 . add 2,2,11 cmpldi 2,0
10414 . ld 2,xxx+8(2) bnectr+
10415 . bctr b <glink_entry>
10417 The solution involving the compare turns out to be faster, so
10418 that's what we use unless the branch won't reach. */
10420 #define ALWAYS_USE_FAKE_DEP 0
10421 #define ALWAYS_EMIT_R2SAVE 0
10423 #define PPC_LO(v) ((v) & 0xffff)
10424 #define PPC_HI(v) (((v) >> 16) & 0xffff)
10425 #define PPC_HA(v) PPC_HI ((v) + 0x8000)
10427 static inline unsigned int
10428 plt_stub_size (struct ppc_link_hash_table
*htab
,
10429 struct ppc_stub_hash_entry
*stub_entry
,
10432 unsigned size
= 12;
10434 if (ALWAYS_EMIT_R2SAVE
10435 || stub_entry
->stub_type
== ppc_stub_plt_call_r2save
)
10437 if (PPC_HA (off
) != 0)
10442 if (htab
->params
->plt_static_chain
)
10444 if (htab
->params
->plt_thread_safe
10445 && htab
->elf
.dynamic_sections_created
10446 && stub_entry
->h
!= NULL
10447 && stub_entry
->h
->elf
.dynindx
!= -1)
10449 if (PPC_HA (off
+ 8 + 8 * htab
->params
->plt_static_chain
) != PPC_HA (off
))
10452 if (stub_entry
->h
!= NULL
10453 && (stub_entry
->h
== htab
->tls_get_addr_fd
10454 || stub_entry
->h
== htab
->tls_get_addr
)
10455 && htab
->params
->tls_get_addr_opt
)
10460 /* If this stub would cross fewer 2**plt_stub_align boundaries if we align,
10461 then return the padding needed to do so. */
10462 static inline unsigned int
10463 plt_stub_pad (struct ppc_link_hash_table
*htab
,
10464 struct ppc_stub_hash_entry
*stub_entry
,
10467 int stub_align
= 1 << htab
->params
->plt_stub_align
;
10468 unsigned stub_size
= plt_stub_size (htab
, stub_entry
, plt_off
);
10469 bfd_vma stub_off
= stub_entry
->group
->stub_sec
->size
;
10471 if (((stub_off
+ stub_size
- 1) & -stub_align
) - (stub_off
& -stub_align
)
10472 > ((stub_size
- 1) & -stub_align
))
10473 return stub_align
- (stub_off
& (stub_align
- 1));
10477 /* Build a .plt call stub. */
10479 static inline bfd_byte
*
10480 build_plt_stub (struct ppc_link_hash_table
*htab
,
10481 struct ppc_stub_hash_entry
*stub_entry
,
10482 bfd_byte
*p
, bfd_vma offset
, Elf_Internal_Rela
*r
)
10484 bfd
*obfd
= htab
->params
->stub_bfd
;
10485 bfd_boolean plt_load_toc
= htab
->opd_abi
;
10486 bfd_boolean plt_static_chain
= htab
->params
->plt_static_chain
;
10487 bfd_boolean plt_thread_safe
= (htab
->params
->plt_thread_safe
10488 && htab
->elf
.dynamic_sections_created
10489 && stub_entry
->h
!= NULL
10490 && stub_entry
->h
->elf
.dynindx
!= -1);
10491 bfd_boolean use_fake_dep
= plt_thread_safe
;
10492 bfd_vma cmp_branch_off
= 0;
10494 if (!ALWAYS_USE_FAKE_DEP
10497 && !((stub_entry
->h
== htab
->tls_get_addr_fd
10498 || stub_entry
->h
== htab
->tls_get_addr
)
10499 && htab
->params
->tls_get_addr_opt
))
10501 bfd_vma pltoff
= stub_entry
->plt_ent
->plt
.offset
& ~1;
10502 bfd_vma pltindex
= ((pltoff
- PLT_INITIAL_ENTRY_SIZE (htab
))
10503 / PLT_ENTRY_SIZE (htab
));
10504 bfd_vma glinkoff
= GLINK_CALL_STUB_SIZE
+ pltindex
* 8;
10507 if (pltindex
> 32768)
10508 glinkoff
+= (pltindex
- 32768) * 4;
10510 + htab
->glink
->output_offset
10511 + htab
->glink
->output_section
->vma
);
10512 from
= (p
- stub_entry
->group
->stub_sec
->contents
10513 + 4 * (ALWAYS_EMIT_R2SAVE
10514 || stub_entry
->stub_type
== ppc_stub_plt_call_r2save
)
10515 + 4 * (PPC_HA (offset
) != 0)
10516 + 4 * (PPC_HA (offset
+ 8 + 8 * plt_static_chain
)
10517 != PPC_HA (offset
))
10518 + 4 * (plt_static_chain
!= 0)
10520 + stub_entry
->group
->stub_sec
->output_offset
10521 + stub_entry
->group
->stub_sec
->output_section
->vma
);
10522 cmp_branch_off
= to
- from
;
10523 use_fake_dep
= cmp_branch_off
+ (1 << 25) >= (1 << 26);
10526 if (PPC_HA (offset
) != 0)
10530 if (ALWAYS_EMIT_R2SAVE
10531 || stub_entry
->stub_type
== ppc_stub_plt_call_r2save
)
10532 r
[0].r_offset
+= 4;
10533 r
[0].r_info
= ELF64_R_INFO (0, R_PPC64_TOC16_HA
);
10534 r
[1].r_offset
= r
[0].r_offset
+ 4;
10535 r
[1].r_info
= ELF64_R_INFO (0, R_PPC64_TOC16_LO_DS
);
10536 r
[1].r_addend
= r
[0].r_addend
;
10539 if (PPC_HA (offset
+ 8 + 8 * plt_static_chain
) != PPC_HA (offset
))
10541 r
[2].r_offset
= r
[1].r_offset
+ 4;
10542 r
[2].r_info
= ELF64_R_INFO (0, R_PPC64_TOC16_LO
);
10543 r
[2].r_addend
= r
[0].r_addend
;
10547 r
[2].r_offset
= r
[1].r_offset
+ 8 + 8 * use_fake_dep
;
10548 r
[2].r_info
= ELF64_R_INFO (0, R_PPC64_TOC16_LO_DS
);
10549 r
[2].r_addend
= r
[0].r_addend
+ 8;
10550 if (plt_static_chain
)
10552 r
[3].r_offset
= r
[2].r_offset
+ 4;
10553 r
[3].r_info
= ELF64_R_INFO (0, R_PPC64_TOC16_LO_DS
);
10554 r
[3].r_addend
= r
[0].r_addend
+ 16;
10559 if (ALWAYS_EMIT_R2SAVE
10560 || stub_entry
->stub_type
== ppc_stub_plt_call_r2save
)
10561 bfd_put_32 (obfd
, STD_R2_0R1
+ STK_TOC (htab
), p
), p
+= 4;
10564 bfd_put_32 (obfd
, ADDIS_R11_R2
| PPC_HA (offset
), p
), p
+= 4;
10565 bfd_put_32 (obfd
, LD_R12_0R11
| PPC_LO (offset
), p
), p
+= 4;
10569 bfd_put_32 (obfd
, ADDIS_R12_R2
| PPC_HA (offset
), p
), p
+= 4;
10570 bfd_put_32 (obfd
, LD_R12_0R12
| PPC_LO (offset
), p
), p
+= 4;
10573 && PPC_HA (offset
+ 8 + 8 * plt_static_chain
) != PPC_HA (offset
))
10575 bfd_put_32 (obfd
, ADDI_R11_R11
| PPC_LO (offset
), p
), p
+= 4;
10578 bfd_put_32 (obfd
, MTCTR_R12
, p
), p
+= 4;
10583 bfd_put_32 (obfd
, XOR_R2_R12_R12
, p
), p
+= 4;
10584 bfd_put_32 (obfd
, ADD_R11_R11_R2
, p
), p
+= 4;
10586 bfd_put_32 (obfd
, LD_R2_0R11
| PPC_LO (offset
+ 8), p
), p
+= 4;
10587 if (plt_static_chain
)
10588 bfd_put_32 (obfd
, LD_R11_0R11
| PPC_LO (offset
+ 16), p
), p
+= 4;
10595 if (ALWAYS_EMIT_R2SAVE
10596 || stub_entry
->stub_type
== ppc_stub_plt_call_r2save
)
10597 r
[0].r_offset
+= 4;
10598 r
[0].r_info
= ELF64_R_INFO (0, R_PPC64_TOC16_DS
);
10601 if (PPC_HA (offset
+ 8 + 8 * plt_static_chain
) != PPC_HA (offset
))
10603 r
[1].r_offset
= r
[0].r_offset
+ 4;
10604 r
[1].r_info
= ELF64_R_INFO (0, R_PPC64_TOC16
);
10605 r
[1].r_addend
= r
[0].r_addend
;
10609 r
[1].r_offset
= r
[0].r_offset
+ 8 + 8 * use_fake_dep
;
10610 r
[1].r_info
= ELF64_R_INFO (0, R_PPC64_TOC16_DS
);
10611 r
[1].r_addend
= r
[0].r_addend
+ 8 + 8 * plt_static_chain
;
10612 if (plt_static_chain
)
10614 r
[2].r_offset
= r
[1].r_offset
+ 4;
10615 r
[2].r_info
= ELF64_R_INFO (0, R_PPC64_TOC16_DS
);
10616 r
[2].r_addend
= r
[0].r_addend
+ 8;
10621 if (ALWAYS_EMIT_R2SAVE
10622 || stub_entry
->stub_type
== ppc_stub_plt_call_r2save
)
10623 bfd_put_32 (obfd
, STD_R2_0R1
+ STK_TOC (htab
), p
), p
+= 4;
10624 bfd_put_32 (obfd
, LD_R12_0R2
| PPC_LO (offset
), p
), p
+= 4;
10626 && PPC_HA (offset
+ 8 + 8 * plt_static_chain
) != PPC_HA (offset
))
10628 bfd_put_32 (obfd
, ADDI_R2_R2
| PPC_LO (offset
), p
), p
+= 4;
10631 bfd_put_32 (obfd
, MTCTR_R12
, p
), p
+= 4;
10636 bfd_put_32 (obfd
, XOR_R11_R12_R12
, p
), p
+= 4;
10637 bfd_put_32 (obfd
, ADD_R2_R2_R11
, p
), p
+= 4;
10639 if (plt_static_chain
)
10640 bfd_put_32 (obfd
, LD_R11_0R2
| PPC_LO (offset
+ 16), p
), p
+= 4;
10641 bfd_put_32 (obfd
, LD_R2_0R2
| PPC_LO (offset
+ 8), p
), p
+= 4;
10644 if (plt_load_toc
&& plt_thread_safe
&& !use_fake_dep
)
10646 bfd_put_32 (obfd
, CMPLDI_R2_0
, p
), p
+= 4;
10647 bfd_put_32 (obfd
, BNECTR_P4
, p
), p
+= 4;
10648 bfd_put_32 (obfd
, B_DOT
| (cmp_branch_off
& 0x3fffffc), p
), p
+= 4;
10651 bfd_put_32 (obfd
, BCTR
, p
), p
+= 4;
10655 /* Build a special .plt call stub for __tls_get_addr. */
10657 #define LD_R11_0R3 0xe9630000
10658 #define LD_R12_0R3 0xe9830000
10659 #define MR_R0_R3 0x7c601b78
10660 #define CMPDI_R11_0 0x2c2b0000
10661 #define ADD_R3_R12_R13 0x7c6c6a14
10662 #define BEQLR 0x4d820020
10663 #define MR_R3_R0 0x7c030378
10664 #define STD_R11_0R1 0xf9610000
10665 #define BCTRL 0x4e800421
10666 #define LD_R11_0R1 0xe9610000
10667 #define MTLR_R11 0x7d6803a6
10669 static inline bfd_byte
*
10670 build_tls_get_addr_stub (struct ppc_link_hash_table
*htab
,
10671 struct ppc_stub_hash_entry
*stub_entry
,
10672 bfd_byte
*p
, bfd_vma offset
, Elf_Internal_Rela
*r
)
10674 bfd
*obfd
= htab
->params
->stub_bfd
;
10676 bfd_put_32 (obfd
, LD_R11_0R3
+ 0, p
), p
+= 4;
10677 bfd_put_32 (obfd
, LD_R12_0R3
+ 8, p
), p
+= 4;
10678 bfd_put_32 (obfd
, MR_R0_R3
, p
), p
+= 4;
10679 bfd_put_32 (obfd
, CMPDI_R11_0
, p
), p
+= 4;
10680 bfd_put_32 (obfd
, ADD_R3_R12_R13
, p
), p
+= 4;
10681 bfd_put_32 (obfd
, BEQLR
, p
), p
+= 4;
10682 bfd_put_32 (obfd
, MR_R3_R0
, p
), p
+= 4;
10683 bfd_put_32 (obfd
, MFLR_R11
, p
), p
+= 4;
10684 bfd_put_32 (obfd
, STD_R11_0R1
+ STK_LINKER (htab
), p
), p
+= 4;
10687 r
[0].r_offset
+= 9 * 4;
10688 p
= build_plt_stub (htab
, stub_entry
, p
, offset
, r
);
10689 bfd_put_32 (obfd
, BCTRL
, p
- 4);
10691 bfd_put_32 (obfd
, LD_R2_0R1
+ STK_TOC (htab
), p
), p
+= 4;
10692 bfd_put_32 (obfd
, LD_R11_0R1
+ STK_LINKER (htab
), p
), p
+= 4;
10693 bfd_put_32 (obfd
, MTLR_R11
, p
), p
+= 4;
10694 bfd_put_32 (obfd
, BLR
, p
), p
+= 4;
10699 static Elf_Internal_Rela
*
10700 get_relocs (asection
*sec
, int count
)
10702 Elf_Internal_Rela
*relocs
;
10703 struct bfd_elf_section_data
*elfsec_data
;
10705 elfsec_data
= elf_section_data (sec
);
10706 relocs
= elfsec_data
->relocs
;
10707 if (relocs
== NULL
)
10709 bfd_size_type relsize
;
10710 relsize
= sec
->reloc_count
* sizeof (*relocs
);
10711 relocs
= bfd_alloc (sec
->owner
, relsize
);
10712 if (relocs
== NULL
)
10714 elfsec_data
->relocs
= relocs
;
10715 elfsec_data
->rela
.hdr
= bfd_zalloc (sec
->owner
,
10716 sizeof (Elf_Internal_Shdr
));
10717 if (elfsec_data
->rela
.hdr
== NULL
)
10719 elfsec_data
->rela
.hdr
->sh_size
= (sec
->reloc_count
10720 * sizeof (Elf64_External_Rela
));
10721 elfsec_data
->rela
.hdr
->sh_entsize
= sizeof (Elf64_External_Rela
);
10722 sec
->reloc_count
= 0;
10724 relocs
+= sec
->reloc_count
;
10725 sec
->reloc_count
+= count
;
10730 get_r2off (struct bfd_link_info
*info
,
10731 struct ppc_stub_hash_entry
*stub_entry
)
10733 struct ppc_link_hash_table
*htab
= ppc_hash_table (info
);
10734 bfd_vma r2off
= htab
->sec_info
[stub_entry
->target_section
->id
].toc_off
;
10738 /* Support linking -R objects. Get the toc pointer from the
10741 if (!htab
->opd_abi
)
10743 asection
*opd
= stub_entry
->h
->elf
.root
.u
.def
.section
;
10744 bfd_vma opd_off
= stub_entry
->h
->elf
.root
.u
.def
.value
;
10746 if (strcmp (opd
->name
, ".opd") != 0
10747 || opd
->reloc_count
!= 0)
10749 info
->callbacks
->einfo (_("%P: cannot find opd entry toc for `%T'\n"),
10750 stub_entry
->h
->elf
.root
.root
.string
);
10751 bfd_set_error (bfd_error_bad_value
);
10752 return (bfd_vma
) -1;
10754 if (!bfd_get_section_contents (opd
->owner
, opd
, buf
, opd_off
+ 8, 8))
10755 return (bfd_vma
) -1;
10756 r2off
= bfd_get_64 (opd
->owner
, buf
);
10757 r2off
-= elf_gp (info
->output_bfd
);
10759 r2off
-= htab
->sec_info
[stub_entry
->group
->link_sec
->id
].toc_off
;
10764 ppc_build_one_stub (struct bfd_hash_entry
*gen_entry
, void *in_arg
)
10766 struct ppc_stub_hash_entry
*stub_entry
;
10767 struct ppc_branch_hash_entry
*br_entry
;
10768 struct bfd_link_info
*info
;
10769 struct ppc_link_hash_table
*htab
;
10774 Elf_Internal_Rela
*r
;
10777 /* Massage our args to the form they really have. */
10778 stub_entry
= (struct ppc_stub_hash_entry
*) gen_entry
;
10781 htab
= ppc_hash_table (info
);
10785 /* Make a note of the offset within the stubs for this entry. */
10786 stub_entry
->stub_offset
= stub_entry
->group
->stub_sec
->size
;
10787 loc
= stub_entry
->group
->stub_sec
->contents
+ stub_entry
->stub_offset
;
10789 htab
->stub_count
[stub_entry
->stub_type
- 1] += 1;
10790 switch (stub_entry
->stub_type
)
10792 case ppc_stub_long_branch
:
10793 case ppc_stub_long_branch_r2off
:
10794 /* Branches are relative. This is where we are going to. */
10795 dest
= (stub_entry
->target_value
10796 + stub_entry
->target_section
->output_offset
10797 + stub_entry
->target_section
->output_section
->vma
);
10798 dest
+= PPC64_LOCAL_ENTRY_OFFSET (stub_entry
->other
);
10801 /* And this is where we are coming from. */
10802 off
-= (stub_entry
->stub_offset
10803 + stub_entry
->group
->stub_sec
->output_offset
10804 + stub_entry
->group
->stub_sec
->output_section
->vma
);
10807 if (stub_entry
->stub_type
== ppc_stub_long_branch_r2off
)
10809 bfd_vma r2off
= get_r2off (info
, stub_entry
);
10811 if (r2off
== (bfd_vma
) -1)
10813 htab
->stub_error
= TRUE
;
10816 bfd_put_32 (htab
->params
->stub_bfd
, STD_R2_0R1
+ STK_TOC (htab
), loc
);
10819 if (PPC_HA (r2off
) != 0)
10821 bfd_put_32 (htab
->params
->stub_bfd
,
10822 ADDIS_R2_R2
| PPC_HA (r2off
), loc
);
10826 if (PPC_LO (r2off
) != 0)
10828 bfd_put_32 (htab
->params
->stub_bfd
,
10829 ADDI_R2_R2
| PPC_LO (r2off
), loc
);
10835 bfd_put_32 (htab
->params
->stub_bfd
, B_DOT
| (off
& 0x3fffffc), loc
);
10837 if (off
+ (1 << 25) >= (bfd_vma
) (1 << 26))
10839 info
->callbacks
->einfo
10840 (_("%P: long branch stub `%s' offset overflow\n"),
10841 stub_entry
->root
.string
);
10842 htab
->stub_error
= TRUE
;
10846 if (info
->emitrelocations
)
10848 r
= get_relocs (stub_entry
->group
->stub_sec
, 1);
10851 r
->r_offset
= loc
- stub_entry
->group
->stub_sec
->contents
;
10852 r
->r_info
= ELF64_R_INFO (0, R_PPC64_REL24
);
10853 r
->r_addend
= dest
;
10854 if (stub_entry
->h
!= NULL
)
10856 struct elf_link_hash_entry
**hashes
;
10857 unsigned long symndx
;
10858 struct ppc_link_hash_entry
*h
;
10860 hashes
= elf_sym_hashes (htab
->params
->stub_bfd
);
10861 if (hashes
== NULL
)
10863 bfd_size_type hsize
;
10865 hsize
= (htab
->stub_globals
+ 1) * sizeof (*hashes
);
10866 hashes
= bfd_zalloc (htab
->params
->stub_bfd
, hsize
);
10867 if (hashes
== NULL
)
10869 elf_sym_hashes (htab
->params
->stub_bfd
) = hashes
;
10870 htab
->stub_globals
= 1;
10872 symndx
= htab
->stub_globals
++;
10874 hashes
[symndx
] = &h
->elf
;
10875 r
->r_info
= ELF64_R_INFO (symndx
, R_PPC64_REL24
);
10876 if (h
->oh
!= NULL
&& h
->oh
->is_func
)
10877 h
= ppc_follow_link (h
->oh
);
10878 if (h
->elf
.root
.u
.def
.section
!= stub_entry
->target_section
)
10879 /* H is an opd symbol. The addend must be zero. */
10883 off
= (h
->elf
.root
.u
.def
.value
10884 + h
->elf
.root
.u
.def
.section
->output_offset
10885 + h
->elf
.root
.u
.def
.section
->output_section
->vma
);
10886 r
->r_addend
-= off
;
10892 case ppc_stub_plt_branch
:
10893 case ppc_stub_plt_branch_r2off
:
10894 br_entry
= ppc_branch_hash_lookup (&htab
->branch_hash_table
,
10895 stub_entry
->root
.string
+ 9,
10897 if (br_entry
== NULL
)
10899 info
->callbacks
->einfo (_("%P: can't find branch stub `%s'\n"),
10900 stub_entry
->root
.string
);
10901 htab
->stub_error
= TRUE
;
10905 dest
= (stub_entry
->target_value
10906 + stub_entry
->target_section
->output_offset
10907 + stub_entry
->target_section
->output_section
->vma
);
10908 if (stub_entry
->stub_type
!= ppc_stub_plt_branch_r2off
)
10909 dest
+= PPC64_LOCAL_ENTRY_OFFSET (stub_entry
->other
);
10911 bfd_put_64 (htab
->brlt
->owner
, dest
,
10912 htab
->brlt
->contents
+ br_entry
->offset
);
10914 if (br_entry
->iter
== htab
->stub_iteration
)
10916 br_entry
->iter
= 0;
10918 if (htab
->relbrlt
!= NULL
)
10920 /* Create a reloc for the branch lookup table entry. */
10921 Elf_Internal_Rela rela
;
10924 rela
.r_offset
= (br_entry
->offset
10925 + htab
->brlt
->output_offset
10926 + htab
->brlt
->output_section
->vma
);
10927 rela
.r_info
= ELF64_R_INFO (0, R_PPC64_RELATIVE
);
10928 rela
.r_addend
= dest
;
10930 rl
= htab
->relbrlt
->contents
;
10931 rl
+= (htab
->relbrlt
->reloc_count
++
10932 * sizeof (Elf64_External_Rela
));
10933 bfd_elf64_swap_reloca_out (htab
->relbrlt
->owner
, &rela
, rl
);
10935 else if (info
->emitrelocations
)
10937 r
= get_relocs (htab
->brlt
, 1);
10940 /* brlt, being SEC_LINKER_CREATED does not go through the
10941 normal reloc processing. Symbols and offsets are not
10942 translated from input file to output file form, so
10943 set up the offset per the output file. */
10944 r
->r_offset
= (br_entry
->offset
10945 + htab
->brlt
->output_offset
10946 + htab
->brlt
->output_section
->vma
);
10947 r
->r_info
= ELF64_R_INFO (0, R_PPC64_RELATIVE
);
10948 r
->r_addend
= dest
;
10952 dest
= (br_entry
->offset
10953 + htab
->brlt
->output_offset
10954 + htab
->brlt
->output_section
->vma
);
10957 - elf_gp (htab
->brlt
->output_section
->owner
)
10958 - htab
->sec_info
[stub_entry
->group
->link_sec
->id
].toc_off
);
10960 if (off
+ 0x80008000 > 0xffffffff || (off
& 7) != 0)
10962 info
->callbacks
->einfo
10963 (_("%P: linkage table error against `%T'\n"),
10964 stub_entry
->root
.string
);
10965 bfd_set_error (bfd_error_bad_value
);
10966 htab
->stub_error
= TRUE
;
10970 if (info
->emitrelocations
)
10972 r
= get_relocs (stub_entry
->group
->stub_sec
, 1 + (PPC_HA (off
) != 0));
10975 r
[0].r_offset
= loc
- stub_entry
->group
->stub_sec
->contents
;
10976 if (bfd_big_endian (info
->output_bfd
))
10977 r
[0].r_offset
+= 2;
10978 if (stub_entry
->stub_type
== ppc_stub_plt_branch_r2off
)
10979 r
[0].r_offset
+= 4;
10980 r
[0].r_info
= ELF64_R_INFO (0, R_PPC64_TOC16_DS
);
10981 r
[0].r_addend
= dest
;
10982 if (PPC_HA (off
) != 0)
10984 r
[0].r_info
= ELF64_R_INFO (0, R_PPC64_TOC16_HA
);
10985 r
[1].r_offset
= r
[0].r_offset
+ 4;
10986 r
[1].r_info
= ELF64_R_INFO (0, R_PPC64_TOC16_LO_DS
);
10987 r
[1].r_addend
= r
[0].r_addend
;
10991 if (stub_entry
->stub_type
!= ppc_stub_plt_branch_r2off
)
10993 if (PPC_HA (off
) != 0)
10996 bfd_put_32 (htab
->params
->stub_bfd
,
10997 ADDIS_R12_R2
| PPC_HA (off
), loc
);
10999 bfd_put_32 (htab
->params
->stub_bfd
,
11000 LD_R12_0R12
| PPC_LO (off
), loc
);
11005 bfd_put_32 (htab
->params
->stub_bfd
,
11006 LD_R12_0R2
| PPC_LO (off
), loc
);
11011 bfd_vma r2off
= get_r2off (info
, stub_entry
);
11013 if (r2off
== (bfd_vma
) -1)
11015 htab
->stub_error
= TRUE
;
11019 bfd_put_32 (htab
->params
->stub_bfd
, STD_R2_0R1
+ STK_TOC (htab
), loc
);
11022 if (PPC_HA (off
) != 0)
11025 bfd_put_32 (htab
->params
->stub_bfd
,
11026 ADDIS_R12_R2
| PPC_HA (off
), loc
);
11028 bfd_put_32 (htab
->params
->stub_bfd
,
11029 LD_R12_0R12
| PPC_LO (off
), loc
);
11032 bfd_put_32 (htab
->params
->stub_bfd
, LD_R12_0R2
| PPC_LO (off
), loc
);
11034 if (PPC_HA (r2off
) != 0)
11038 bfd_put_32 (htab
->params
->stub_bfd
,
11039 ADDIS_R2_R2
| PPC_HA (r2off
), loc
);
11041 if (PPC_LO (r2off
) != 0)
11045 bfd_put_32 (htab
->params
->stub_bfd
,
11046 ADDI_R2_R2
| PPC_LO (r2off
), loc
);
11050 bfd_put_32 (htab
->params
->stub_bfd
, MTCTR_R12
, loc
);
11052 bfd_put_32 (htab
->params
->stub_bfd
, BCTR
, loc
);
11055 case ppc_stub_plt_call
:
11056 case ppc_stub_plt_call_r2save
:
11057 if (stub_entry
->h
!= NULL
11058 && stub_entry
->h
->is_func_descriptor
11059 && stub_entry
->h
->oh
!= NULL
)
11061 struct ppc_link_hash_entry
*fh
= ppc_follow_link (stub_entry
->h
->oh
);
11063 /* If the old-ABI "dot-symbol" is undefined make it weak so
11064 we don't get a link error from RELOC_FOR_GLOBAL_SYMBOL. */
11065 if (fh
->elf
.root
.type
== bfd_link_hash_undefined
)
11066 fh
->elf
.root
.type
= bfd_link_hash_undefweak
;
11067 /* Stop undo_symbol_twiddle changing it back to undefined. */
11068 fh
->was_undefined
= 0;
11071 /* Now build the stub. */
11072 dest
= stub_entry
->plt_ent
->plt
.offset
& ~1;
11073 if (dest
>= (bfd_vma
) -2)
11076 plt
= htab
->elf
.splt
;
11077 if (!htab
->elf
.dynamic_sections_created
11078 || stub_entry
->h
== NULL
11079 || stub_entry
->h
->elf
.dynindx
== -1)
11080 plt
= htab
->elf
.iplt
;
11082 dest
+= plt
->output_offset
+ plt
->output_section
->vma
;
11084 if (stub_entry
->h
== NULL
11085 && (stub_entry
->plt_ent
->plt
.offset
& 1) == 0)
11087 Elf_Internal_Rela rela
;
11090 rela
.r_offset
= dest
;
11092 rela
.r_info
= ELF64_R_INFO (0, R_PPC64_JMP_IREL
);
11094 rela
.r_info
= ELF64_R_INFO (0, R_PPC64_IRELATIVE
);
11095 rela
.r_addend
= (stub_entry
->target_value
11096 + stub_entry
->target_section
->output_offset
11097 + stub_entry
->target_section
->output_section
->vma
);
11099 rl
= (htab
->elf
.irelplt
->contents
11100 + (htab
->elf
.irelplt
->reloc_count
++
11101 * sizeof (Elf64_External_Rela
)));
11102 bfd_elf64_swap_reloca_out (info
->output_bfd
, &rela
, rl
);
11103 stub_entry
->plt_ent
->plt
.offset
|= 1;
11107 - elf_gp (plt
->output_section
->owner
)
11108 - htab
->sec_info
[stub_entry
->group
->link_sec
->id
].toc_off
);
11110 if (off
+ 0x80008000 > 0xffffffff || (off
& 7) != 0)
11112 info
->callbacks
->einfo
11113 (_("%P: linkage table error against `%T'\n"),
11114 stub_entry
->h
!= NULL
11115 ? stub_entry
->h
->elf
.root
.root
.string
11117 bfd_set_error (bfd_error_bad_value
);
11118 htab
->stub_error
= TRUE
;
11122 if (htab
->params
->plt_stub_align
!= 0)
11124 unsigned pad
= plt_stub_pad (htab
, stub_entry
, off
);
11126 stub_entry
->group
->stub_sec
->size
+= pad
;
11127 stub_entry
->stub_offset
= stub_entry
->group
->stub_sec
->size
;
11132 if (info
->emitrelocations
)
11134 r
= get_relocs (stub_entry
->group
->stub_sec
,
11135 ((PPC_HA (off
) != 0)
11137 ? 2 + (htab
->params
->plt_static_chain
11138 && PPC_HA (off
+ 16) == PPC_HA (off
))
11142 r
[0].r_offset
= loc
- stub_entry
->group
->stub_sec
->contents
;
11143 if (bfd_big_endian (info
->output_bfd
))
11144 r
[0].r_offset
+= 2;
11145 r
[0].r_addend
= dest
;
11147 if (stub_entry
->h
!= NULL
11148 && (stub_entry
->h
== htab
->tls_get_addr_fd
11149 || stub_entry
->h
== htab
->tls_get_addr
)
11150 && htab
->params
->tls_get_addr_opt
)
11151 p
= build_tls_get_addr_stub (htab
, stub_entry
, loc
, off
, r
);
11153 p
= build_plt_stub (htab
, stub_entry
, loc
, off
, r
);
11157 case ppc_stub_save_res
:
11165 stub_entry
->group
->stub_sec
->size
+= size
;
11167 if (htab
->params
->emit_stub_syms
)
11169 struct elf_link_hash_entry
*h
;
11172 const char *const stub_str
[] = { "long_branch",
11173 "long_branch_r2off",
11175 "plt_branch_r2off",
11179 len1
= strlen (stub_str
[stub_entry
->stub_type
- 1]);
11180 len2
= strlen (stub_entry
->root
.string
);
11181 name
= bfd_malloc (len1
+ len2
+ 2);
11184 memcpy (name
, stub_entry
->root
.string
, 9);
11185 memcpy (name
+ 9, stub_str
[stub_entry
->stub_type
- 1], len1
);
11186 memcpy (name
+ len1
+ 9, stub_entry
->root
.string
+ 8, len2
- 8 + 1);
11187 h
= elf_link_hash_lookup (&htab
->elf
, name
, TRUE
, FALSE
, FALSE
);
11190 if (h
->root
.type
== bfd_link_hash_new
)
11192 h
->root
.type
= bfd_link_hash_defined
;
11193 h
->root
.u
.def
.section
= stub_entry
->group
->stub_sec
;
11194 h
->root
.u
.def
.value
= stub_entry
->stub_offset
;
11195 h
->ref_regular
= 1;
11196 h
->def_regular
= 1;
11197 h
->ref_regular_nonweak
= 1;
11198 h
->forced_local
= 1;
11200 h
->root
.linker_def
= 1;
11207 /* As above, but don't actually build the stub. Just bump offset so
11208 we know stub section sizes, and select plt_branch stubs where
11209 long_branch stubs won't do. */
11212 ppc_size_one_stub (struct bfd_hash_entry
*gen_entry
, void *in_arg
)
11214 struct ppc_stub_hash_entry
*stub_entry
;
11215 struct bfd_link_info
*info
;
11216 struct ppc_link_hash_table
*htab
;
11220 /* Massage our args to the form they really have. */
11221 stub_entry
= (struct ppc_stub_hash_entry
*) gen_entry
;
11224 htab
= ppc_hash_table (info
);
11228 if (stub_entry
->h
!= NULL
11229 && stub_entry
->h
->save_res
11230 && stub_entry
->h
->elf
.root
.type
== bfd_link_hash_defined
11231 && stub_entry
->h
->elf
.root
.u
.def
.section
== htab
->sfpr
)
11233 /* Don't make stubs to out-of-line register save/restore
11234 functions. Instead, emit copies of the functions. */
11235 stub_entry
->group
->needs_save_res
= 1;
11236 stub_entry
->stub_type
= ppc_stub_save_res
;
11240 if (stub_entry
->stub_type
== ppc_stub_plt_call
11241 || stub_entry
->stub_type
== ppc_stub_plt_call_r2save
)
11244 off
= stub_entry
->plt_ent
->plt
.offset
& ~(bfd_vma
) 1;
11245 if (off
>= (bfd_vma
) -2)
11247 plt
= htab
->elf
.splt
;
11248 if (!htab
->elf
.dynamic_sections_created
11249 || stub_entry
->h
== NULL
11250 || stub_entry
->h
->elf
.dynindx
== -1)
11251 plt
= htab
->elf
.iplt
;
11252 off
+= (plt
->output_offset
11253 + plt
->output_section
->vma
11254 - elf_gp (plt
->output_section
->owner
)
11255 - htab
->sec_info
[stub_entry
->group
->link_sec
->id
].toc_off
);
11257 size
= plt_stub_size (htab
, stub_entry
, off
);
11258 if (htab
->params
->plt_stub_align
)
11259 size
+= plt_stub_pad (htab
, stub_entry
, off
);
11260 if (info
->emitrelocations
)
11262 stub_entry
->group
->stub_sec
->reloc_count
11263 += ((PPC_HA (off
) != 0)
11265 ? 2 + (htab
->params
->plt_static_chain
11266 && PPC_HA (off
+ 16) == PPC_HA (off
))
11268 stub_entry
->group
->stub_sec
->flags
|= SEC_RELOC
;
11273 /* ppc_stub_long_branch or ppc_stub_plt_branch, or their r2off
11276 bfd_vma local_off
= 0;
11278 off
= (stub_entry
->target_value
11279 + stub_entry
->target_section
->output_offset
11280 + stub_entry
->target_section
->output_section
->vma
);
11281 off
-= (stub_entry
->group
->stub_sec
->size
11282 + stub_entry
->group
->stub_sec
->output_offset
11283 + stub_entry
->group
->stub_sec
->output_section
->vma
);
11285 /* Reset the stub type from the plt variant in case we now
11286 can reach with a shorter stub. */
11287 if (stub_entry
->stub_type
>= ppc_stub_plt_branch
)
11288 stub_entry
->stub_type
+= ppc_stub_long_branch
- ppc_stub_plt_branch
;
11291 if (stub_entry
->stub_type
== ppc_stub_long_branch_r2off
)
11293 r2off
= get_r2off (info
, stub_entry
);
11294 if (r2off
== (bfd_vma
) -1)
11296 htab
->stub_error
= TRUE
;
11300 if (PPC_HA (r2off
) != 0)
11302 if (PPC_LO (r2off
) != 0)
11307 local_off
= PPC64_LOCAL_ENTRY_OFFSET (stub_entry
->other
);
11309 /* If the branch offset if too big, use a ppc_stub_plt_branch.
11310 Do the same for -R objects without function descriptors. */
11311 if (off
+ (1 << 25) >= (bfd_vma
) (1 << 26) - local_off
11312 || (stub_entry
->stub_type
== ppc_stub_long_branch_r2off
11314 && htab
->sec_info
[stub_entry
->target_section
->id
].toc_off
== 0))
11316 struct ppc_branch_hash_entry
*br_entry
;
11318 br_entry
= ppc_branch_hash_lookup (&htab
->branch_hash_table
,
11319 stub_entry
->root
.string
+ 9,
11321 if (br_entry
== NULL
)
11323 info
->callbacks
->einfo (_("%P: can't build branch stub `%s'\n"),
11324 stub_entry
->root
.string
);
11325 htab
->stub_error
= TRUE
;
11329 if (br_entry
->iter
!= htab
->stub_iteration
)
11331 br_entry
->iter
= htab
->stub_iteration
;
11332 br_entry
->offset
= htab
->brlt
->size
;
11333 htab
->brlt
->size
+= 8;
11335 if (htab
->relbrlt
!= NULL
)
11336 htab
->relbrlt
->size
+= sizeof (Elf64_External_Rela
);
11337 else if (info
->emitrelocations
)
11339 htab
->brlt
->reloc_count
+= 1;
11340 htab
->brlt
->flags
|= SEC_RELOC
;
11344 stub_entry
->stub_type
+= ppc_stub_plt_branch
- ppc_stub_long_branch
;
11345 off
= (br_entry
->offset
11346 + htab
->brlt
->output_offset
11347 + htab
->brlt
->output_section
->vma
11348 - elf_gp (htab
->brlt
->output_section
->owner
)
11349 - htab
->sec_info
[stub_entry
->group
->link_sec
->id
].toc_off
);
11351 if (info
->emitrelocations
)
11353 stub_entry
->group
->stub_sec
->reloc_count
11354 += 1 + (PPC_HA (off
) != 0);
11355 stub_entry
->group
->stub_sec
->flags
|= SEC_RELOC
;
11358 if (stub_entry
->stub_type
!= ppc_stub_plt_branch_r2off
)
11361 if (PPC_HA (off
) != 0)
11367 if (PPC_HA (off
) != 0)
11370 if (PPC_HA (r2off
) != 0)
11372 if (PPC_LO (r2off
) != 0)
11376 else if (info
->emitrelocations
)
11378 stub_entry
->group
->stub_sec
->reloc_count
+= 1;
11379 stub_entry
->group
->stub_sec
->flags
|= SEC_RELOC
;
11383 stub_entry
->group
->stub_sec
->size
+= size
;
11387 /* Set up various things so that we can make a list of input sections
11388 for each output section included in the link. Returns -1 on error,
11389 0 when no stubs will be needed, and 1 on success. */
11392 ppc64_elf_setup_section_lists (struct bfd_link_info
*info
)
11396 struct ppc_link_hash_table
*htab
= ppc_hash_table (info
);
11401 htab
->sec_info_arr_size
= bfd_get_next_section_id ();
11402 amt
= sizeof (*htab
->sec_info
) * (htab
->sec_info_arr_size
);
11403 htab
->sec_info
= bfd_zmalloc (amt
);
11404 if (htab
->sec_info
== NULL
)
11407 /* Set toc_off for com, und, abs and ind sections. */
11408 for (id
= 0; id
< 3; id
++)
11409 htab
->sec_info
[id
].toc_off
= TOC_BASE_OFF
;
11414 /* Set up for first pass at multitoc partitioning. */
11417 ppc64_elf_start_multitoc_partition (struct bfd_link_info
*info
)
11419 struct ppc_link_hash_table
*htab
= ppc_hash_table (info
);
11421 htab
->toc_curr
= ppc64_elf_set_toc (info
, info
->output_bfd
);
11422 htab
->toc_bfd
= NULL
;
11423 htab
->toc_first_sec
= NULL
;
11426 /* The linker repeatedly calls this function for each TOC input section
11427 and linker generated GOT section. Group input bfds such that the toc
11428 within a group is less than 64k in size. */
11431 ppc64_elf_next_toc_section (struct bfd_link_info
*info
, asection
*isec
)
11433 struct ppc_link_hash_table
*htab
= ppc_hash_table (info
);
11434 bfd_vma addr
, off
, limit
;
11439 if (!htab
->second_toc_pass
)
11441 /* Keep track of the first .toc or .got section for this input bfd. */
11442 bfd_boolean new_bfd
= htab
->toc_bfd
!= isec
->owner
;
11446 htab
->toc_bfd
= isec
->owner
;
11447 htab
->toc_first_sec
= isec
;
11450 addr
= isec
->output_offset
+ isec
->output_section
->vma
;
11451 off
= addr
- htab
->toc_curr
;
11452 limit
= 0x80008000;
11453 if (ppc64_elf_tdata (isec
->owner
)->has_small_toc_reloc
)
11455 if (off
+ isec
->size
> limit
)
11457 addr
= (htab
->toc_first_sec
->output_offset
11458 + htab
->toc_first_sec
->output_section
->vma
);
11459 htab
->toc_curr
= addr
;
11460 htab
->toc_curr
&= -TOC_BASE_ALIGN
;
11463 /* toc_curr is the base address of this toc group. Set elf_gp
11464 for the input section to be the offset relative to the
11465 output toc base plus 0x8000. Making the input elf_gp an
11466 offset allows us to move the toc as a whole without
11467 recalculating input elf_gp. */
11468 off
= htab
->toc_curr
- elf_gp (isec
->output_section
->owner
);
11469 off
+= TOC_BASE_OFF
;
11471 /* Die if someone uses a linker script that doesn't keep input
11472 file .toc and .got together. */
11474 && elf_gp (isec
->owner
) != 0
11475 && elf_gp (isec
->owner
) != off
)
11478 elf_gp (isec
->owner
) = off
;
11482 /* During the second pass toc_first_sec points to the start of
11483 a toc group, and toc_curr is used to track the old elf_gp.
11484 We use toc_bfd to ensure we only look at each bfd once. */
11485 if (htab
->toc_bfd
== isec
->owner
)
11487 htab
->toc_bfd
= isec
->owner
;
11489 if (htab
->toc_first_sec
== NULL
11490 || htab
->toc_curr
!= elf_gp (isec
->owner
))
11492 htab
->toc_curr
= elf_gp (isec
->owner
);
11493 htab
->toc_first_sec
= isec
;
11495 addr
= (htab
->toc_first_sec
->output_offset
11496 + htab
->toc_first_sec
->output_section
->vma
);
11497 off
= addr
- elf_gp (isec
->output_section
->owner
) + TOC_BASE_OFF
;
11498 elf_gp (isec
->owner
) = off
;
11503 /* Called via elf_link_hash_traverse to merge GOT entries for global
11507 merge_global_got (struct elf_link_hash_entry
*h
, void *inf ATTRIBUTE_UNUSED
)
11509 if (h
->root
.type
== bfd_link_hash_indirect
)
11512 merge_got_entries (&h
->got
.glist
);
11517 /* Called via elf_link_hash_traverse to allocate GOT entries for global
11521 reallocate_got (struct elf_link_hash_entry
*h
, void *inf
)
11523 struct got_entry
*gent
;
11525 if (h
->root
.type
== bfd_link_hash_indirect
)
11528 for (gent
= h
->got
.glist
; gent
!= NULL
; gent
= gent
->next
)
11529 if (!gent
->is_indirect
)
11530 allocate_got (h
, (struct bfd_link_info
*) inf
, gent
);
11534 /* Called on the first multitoc pass after the last call to
11535 ppc64_elf_next_toc_section. This function removes duplicate GOT
11539 ppc64_elf_layout_multitoc (struct bfd_link_info
*info
)
11541 struct ppc_link_hash_table
*htab
= ppc_hash_table (info
);
11542 struct bfd
*ibfd
, *ibfd2
;
11543 bfd_boolean done_something
;
11545 htab
->multi_toc_needed
= htab
->toc_curr
!= elf_gp (info
->output_bfd
);
11547 if (!htab
->do_multi_toc
)
11550 /* Merge global sym got entries within a toc group. */
11551 elf_link_hash_traverse (&htab
->elf
, merge_global_got
, info
);
11553 /* And tlsld_got. */
11554 for (ibfd
= info
->input_bfds
; ibfd
!= NULL
; ibfd
= ibfd
->link
.next
)
11556 struct got_entry
*ent
, *ent2
;
11558 if (!is_ppc64_elf (ibfd
))
11561 ent
= ppc64_tlsld_got (ibfd
);
11562 if (!ent
->is_indirect
11563 && ent
->got
.offset
!= (bfd_vma
) -1)
11565 for (ibfd2
= ibfd
->link
.next
; ibfd2
!= NULL
; ibfd2
= ibfd2
->link
.next
)
11567 if (!is_ppc64_elf (ibfd2
))
11570 ent2
= ppc64_tlsld_got (ibfd2
);
11571 if (!ent2
->is_indirect
11572 && ent2
->got
.offset
!= (bfd_vma
) -1
11573 && elf_gp (ibfd2
) == elf_gp (ibfd
))
11575 ent2
->is_indirect
= TRUE
;
11576 ent2
->got
.ent
= ent
;
11582 /* Zap sizes of got sections. */
11583 htab
->elf
.irelplt
->rawsize
= htab
->elf
.irelplt
->size
;
11584 htab
->elf
.irelplt
->size
-= htab
->got_reli_size
;
11585 htab
->got_reli_size
= 0;
11587 for (ibfd
= info
->input_bfds
; ibfd
!= NULL
; ibfd
= ibfd
->link
.next
)
11589 asection
*got
, *relgot
;
11591 if (!is_ppc64_elf (ibfd
))
11594 got
= ppc64_elf_tdata (ibfd
)->got
;
11597 got
->rawsize
= got
->size
;
11599 relgot
= ppc64_elf_tdata (ibfd
)->relgot
;
11600 relgot
->rawsize
= relgot
->size
;
11605 /* Now reallocate the got, local syms first. We don't need to
11606 allocate section contents again since we never increase size. */
11607 for (ibfd
= info
->input_bfds
; ibfd
!= NULL
; ibfd
= ibfd
->link
.next
)
11609 struct got_entry
**lgot_ents
;
11610 struct got_entry
**end_lgot_ents
;
11611 struct plt_entry
**local_plt
;
11612 struct plt_entry
**end_local_plt
;
11613 unsigned char *lgot_masks
;
11614 bfd_size_type locsymcount
;
11615 Elf_Internal_Shdr
*symtab_hdr
;
11618 if (!is_ppc64_elf (ibfd
))
11621 lgot_ents
= elf_local_got_ents (ibfd
);
11625 symtab_hdr
= &elf_symtab_hdr (ibfd
);
11626 locsymcount
= symtab_hdr
->sh_info
;
11627 end_lgot_ents
= lgot_ents
+ locsymcount
;
11628 local_plt
= (struct plt_entry
**) end_lgot_ents
;
11629 end_local_plt
= local_plt
+ locsymcount
;
11630 lgot_masks
= (unsigned char *) end_local_plt
;
11631 s
= ppc64_elf_tdata (ibfd
)->got
;
11632 for (; lgot_ents
< end_lgot_ents
; ++lgot_ents
, ++lgot_masks
)
11634 struct got_entry
*ent
;
11636 for (ent
= *lgot_ents
; ent
!= NULL
; ent
= ent
->next
)
11638 unsigned int ent_size
= 8;
11639 unsigned int rel_size
= sizeof (Elf64_External_Rela
);
11641 ent
->got
.offset
= s
->size
;
11642 if ((ent
->tls_type
& *lgot_masks
& TLS_GD
) != 0)
11647 s
->size
+= ent_size
;
11648 if ((*lgot_masks
& PLT_IFUNC
) != 0)
11650 htab
->elf
.irelplt
->size
+= rel_size
;
11651 htab
->got_reli_size
+= rel_size
;
11653 else if (bfd_link_pic (info
))
11655 asection
*srel
= ppc64_elf_tdata (ibfd
)->relgot
;
11656 srel
->size
+= rel_size
;
11662 elf_link_hash_traverse (&htab
->elf
, reallocate_got
, info
);
11664 for (ibfd
= info
->input_bfds
; ibfd
!= NULL
; ibfd
= ibfd
->link
.next
)
11666 struct got_entry
*ent
;
11668 if (!is_ppc64_elf (ibfd
))
11671 ent
= ppc64_tlsld_got (ibfd
);
11672 if (!ent
->is_indirect
11673 && ent
->got
.offset
!= (bfd_vma
) -1)
11675 asection
*s
= ppc64_elf_tdata (ibfd
)->got
;
11676 ent
->got
.offset
= s
->size
;
11678 if (bfd_link_pic (info
))
11680 asection
*srel
= ppc64_elf_tdata (ibfd
)->relgot
;
11681 srel
->size
+= sizeof (Elf64_External_Rela
);
11686 done_something
= htab
->elf
.irelplt
->rawsize
!= htab
->elf
.irelplt
->size
;
11687 if (!done_something
)
11688 for (ibfd
= info
->input_bfds
; ibfd
!= NULL
; ibfd
= ibfd
->link
.next
)
11692 if (!is_ppc64_elf (ibfd
))
11695 got
= ppc64_elf_tdata (ibfd
)->got
;
11698 done_something
= got
->rawsize
!= got
->size
;
11699 if (done_something
)
11704 if (done_something
)
11705 (*htab
->params
->layout_sections_again
) ();
11707 /* Set up for second pass over toc sections to recalculate elf_gp
11708 on input sections. */
11709 htab
->toc_bfd
= NULL
;
11710 htab
->toc_first_sec
= NULL
;
11711 htab
->second_toc_pass
= TRUE
;
11712 return done_something
;
11715 /* Called after second pass of multitoc partitioning. */
11718 ppc64_elf_finish_multitoc_partition (struct bfd_link_info
*info
)
11720 struct ppc_link_hash_table
*htab
= ppc_hash_table (info
);
11722 /* After the second pass, toc_curr tracks the TOC offset used
11723 for code sections below in ppc64_elf_next_input_section. */
11724 htab
->toc_curr
= TOC_BASE_OFF
;
11727 /* No toc references were found in ISEC. If the code in ISEC makes no
11728 calls, then there's no need to use toc adjusting stubs when branching
11729 into ISEC. Actually, indirect calls from ISEC are OK as they will
11730 load r2. Returns -1 on error, 0 for no stub needed, 1 for stub
11731 needed, and 2 if a cyclical call-graph was found but no other reason
11732 for a stub was detected. If called from the top level, a return of
11733 2 means the same as a return of 0. */
11736 toc_adjusting_stub_needed (struct bfd_link_info
*info
, asection
*isec
)
11740 /* Mark this section as checked. */
11741 isec
->call_check_done
= 1;
11743 /* We know none of our code bearing sections will need toc stubs. */
11744 if ((isec
->flags
& SEC_LINKER_CREATED
) != 0)
11747 if (isec
->size
== 0)
11750 if (isec
->output_section
== NULL
)
11754 if (isec
->reloc_count
!= 0)
11756 Elf_Internal_Rela
*relstart
, *rel
;
11757 Elf_Internal_Sym
*local_syms
;
11758 struct ppc_link_hash_table
*htab
;
11760 relstart
= _bfd_elf_link_read_relocs (isec
->owner
, isec
, NULL
, NULL
,
11761 info
->keep_memory
);
11762 if (relstart
== NULL
)
11765 /* Look for branches to outside of this section. */
11767 htab
= ppc_hash_table (info
);
11771 for (rel
= relstart
; rel
< relstart
+ isec
->reloc_count
; ++rel
)
11773 enum elf_ppc64_reloc_type r_type
;
11774 unsigned long r_symndx
;
11775 struct elf_link_hash_entry
*h
;
11776 struct ppc_link_hash_entry
*eh
;
11777 Elf_Internal_Sym
*sym
;
11779 struct _opd_sec_data
*opd
;
11783 r_type
= ELF64_R_TYPE (rel
->r_info
);
11784 if (r_type
!= R_PPC64_REL24
11785 && r_type
!= R_PPC64_REL14
11786 && r_type
!= R_PPC64_REL14_BRTAKEN
11787 && r_type
!= R_PPC64_REL14_BRNTAKEN
)
11790 r_symndx
= ELF64_R_SYM (rel
->r_info
);
11791 if (!get_sym_h (&h
, &sym
, &sym_sec
, NULL
, &local_syms
, r_symndx
,
11798 /* Calls to dynamic lib functions go through a plt call stub
11800 eh
= (struct ppc_link_hash_entry
*) h
;
11802 && (eh
->elf
.plt
.plist
!= NULL
11804 && ppc_follow_link (eh
->oh
)->elf
.plt
.plist
!= NULL
)))
11810 if (sym_sec
== NULL
)
11811 /* Ignore other undefined symbols. */
11814 /* Assume branches to other sections not included in the
11815 link need stubs too, to cover -R and absolute syms. */
11816 if (sym_sec
->output_section
== NULL
)
11823 sym_value
= sym
->st_value
;
11826 if (h
->root
.type
!= bfd_link_hash_defined
11827 && h
->root
.type
!= bfd_link_hash_defweak
)
11829 sym_value
= h
->root
.u
.def
.value
;
11831 sym_value
+= rel
->r_addend
;
11833 /* If this branch reloc uses an opd sym, find the code section. */
11834 opd
= get_opd_info (sym_sec
);
11837 if (h
== NULL
&& opd
->adjust
!= NULL
)
11841 adjust
= opd
->adjust
[OPD_NDX (sym_value
)];
11843 /* Assume deleted functions won't ever be called. */
11845 sym_value
+= adjust
;
11848 dest
= opd_entry_value (sym_sec
, sym_value
,
11849 &sym_sec
, NULL
, FALSE
);
11850 if (dest
== (bfd_vma
) -1)
11855 + sym_sec
->output_offset
11856 + sym_sec
->output_section
->vma
);
11858 /* Ignore branch to self. */
11859 if (sym_sec
== isec
)
11862 /* If the called function uses the toc, we need a stub. */
11863 if (sym_sec
->has_toc_reloc
11864 || sym_sec
->makes_toc_func_call
)
11870 /* Assume any branch that needs a long branch stub might in fact
11871 need a plt_branch stub. A plt_branch stub uses r2. */
11872 else if (dest
- (isec
->output_offset
11873 + isec
->output_section
->vma
11874 + rel
->r_offset
) + (1 << 25)
11875 >= (2u << 25) - PPC64_LOCAL_ENTRY_OFFSET (h
11883 /* If calling back to a section in the process of being
11884 tested, we can't say for sure that no toc adjusting stubs
11885 are needed, so don't return zero. */
11886 else if (sym_sec
->call_check_in_progress
)
11889 /* Branches to another section that itself doesn't have any TOC
11890 references are OK. Recursively call ourselves to check. */
11891 else if (!sym_sec
->call_check_done
)
11895 /* Mark current section as indeterminate, so that other
11896 sections that call back to current won't be marked as
11898 isec
->call_check_in_progress
= 1;
11899 recur
= toc_adjusting_stub_needed (info
, sym_sec
);
11900 isec
->call_check_in_progress
= 0;
11911 if (local_syms
!= NULL
11912 && (elf_symtab_hdr (isec
->owner
).contents
11913 != (unsigned char *) local_syms
))
11915 if (elf_section_data (isec
)->relocs
!= relstart
)
11920 && isec
->map_head
.s
!= NULL
11921 && (strcmp (isec
->output_section
->name
, ".init") == 0
11922 || strcmp (isec
->output_section
->name
, ".fini") == 0))
11924 if (isec
->map_head
.s
->has_toc_reloc
11925 || isec
->map_head
.s
->makes_toc_func_call
)
11927 else if (!isec
->map_head
.s
->call_check_done
)
11930 isec
->call_check_in_progress
= 1;
11931 recur
= toc_adjusting_stub_needed (info
, isec
->map_head
.s
);
11932 isec
->call_check_in_progress
= 0;
11939 isec
->makes_toc_func_call
= 1;
11944 /* The linker repeatedly calls this function for each input section,
11945 in the order that input sections are linked into output sections.
11946 Build lists of input sections to determine groupings between which
11947 we may insert linker stubs. */
11950 ppc64_elf_next_input_section (struct bfd_link_info
*info
, asection
*isec
)
11952 struct ppc_link_hash_table
*htab
= ppc_hash_table (info
);
11957 if ((isec
->output_section
->flags
& SEC_CODE
) != 0
11958 && isec
->output_section
->id
< htab
->sec_info_arr_size
)
11960 /* This happens to make the list in reverse order,
11961 which is what we want. */
11962 htab
->sec_info
[isec
->id
].u
.list
11963 = htab
->sec_info
[isec
->output_section
->id
].u
.list
;
11964 htab
->sec_info
[isec
->output_section
->id
].u
.list
= isec
;
11967 if (htab
->multi_toc_needed
)
11969 /* Analyse sections that aren't already flagged as needing a
11970 valid toc pointer. Exclude .fixup for the linux kernel.
11971 .fixup contains branches, but only back to the function that
11972 hit an exception. */
11973 if (!(isec
->has_toc_reloc
11974 || (isec
->flags
& SEC_CODE
) == 0
11975 || strcmp (isec
->name
, ".fixup") == 0
11976 || isec
->call_check_done
))
11978 if (toc_adjusting_stub_needed (info
, isec
) < 0)
11981 /* Make all sections use the TOC assigned for this object file.
11982 This will be wrong for pasted sections; We fix that in
11983 check_pasted_section(). */
11984 if (elf_gp (isec
->owner
) != 0)
11985 htab
->toc_curr
= elf_gp (isec
->owner
);
11988 htab
->sec_info
[isec
->id
].toc_off
= htab
->toc_curr
;
11992 /* Check that all .init and .fini sections use the same toc, if they
11993 have toc relocs. */
11996 check_pasted_section (struct bfd_link_info
*info
, const char *name
)
11998 asection
*o
= bfd_get_section_by_name (info
->output_bfd
, name
);
12002 struct ppc_link_hash_table
*htab
= ppc_hash_table (info
);
12003 bfd_vma toc_off
= 0;
12006 for (i
= o
->map_head
.s
; i
!= NULL
; i
= i
->map_head
.s
)
12007 if (i
->has_toc_reloc
)
12010 toc_off
= htab
->sec_info
[i
->id
].toc_off
;
12011 else if (toc_off
!= htab
->sec_info
[i
->id
].toc_off
)
12016 for (i
= o
->map_head
.s
; i
!= NULL
; i
= i
->map_head
.s
)
12017 if (i
->makes_toc_func_call
)
12019 toc_off
= htab
->sec_info
[i
->id
].toc_off
;
12023 /* Make sure the whole pasted function uses the same toc offset. */
12025 for (i
= o
->map_head
.s
; i
!= NULL
; i
= i
->map_head
.s
)
12026 htab
->sec_info
[i
->id
].toc_off
= toc_off
;
12032 ppc64_elf_check_init_fini (struct bfd_link_info
*info
)
12034 return (check_pasted_section (info
, ".init")
12035 & check_pasted_section (info
, ".fini"));
12038 /* See whether we can group stub sections together. Grouping stub
12039 sections may result in fewer stubs. More importantly, we need to
12040 put all .init* and .fini* stubs at the beginning of the .init or
12041 .fini output sections respectively, because glibc splits the
12042 _init and _fini functions into multiple parts. Putting a stub in
12043 the middle of a function is not a good idea. */
12046 group_sections (struct bfd_link_info
*info
,
12047 bfd_size_type stub_group_size
,
12048 bfd_boolean stubs_always_before_branch
)
12050 struct ppc_link_hash_table
*htab
;
12052 bfd_size_type stub14_group_size
;
12053 bfd_boolean suppress_size_errors
;
12055 htab
= ppc_hash_table (info
);
12059 suppress_size_errors
= FALSE
;
12060 stub14_group_size
= stub_group_size
>> 10;
12061 if (stub_group_size
== 1)
12063 /* Default values. */
12064 if (stubs_always_before_branch
)
12066 stub_group_size
= 0x1e00000;
12067 stub14_group_size
= 0x7800;
12071 stub_group_size
= 0x1c00000;
12072 stub14_group_size
= 0x7000;
12074 suppress_size_errors
= TRUE
;
12077 for (osec
= info
->output_bfd
->sections
; osec
!= NULL
; osec
= osec
->next
)
12081 if (osec
->id
>= htab
->sec_info_arr_size
)
12084 tail
= htab
->sec_info
[osec
->id
].u
.list
;
12085 while (tail
!= NULL
)
12089 bfd_size_type total
;
12090 bfd_boolean big_sec
;
12092 struct map_stub
*group
;
12095 total
= tail
->size
;
12096 big_sec
= total
> (ppc64_elf_section_data (tail
) != NULL
12097 && ppc64_elf_section_data (tail
)->has_14bit_branch
12098 ? stub14_group_size
: stub_group_size
);
12099 if (big_sec
&& !suppress_size_errors
)
12100 (*_bfd_error_handler
) (_("%B section %A exceeds stub group size"),
12101 tail
->owner
, tail
);
12102 curr_toc
= htab
->sec_info
[tail
->id
].toc_off
;
12104 while ((prev
= htab
->sec_info
[curr
->id
].u
.list
) != NULL
12105 && ((total
+= curr
->output_offset
- prev
->output_offset
)
12106 < (ppc64_elf_section_data (prev
) != NULL
12107 && ppc64_elf_section_data (prev
)->has_14bit_branch
12108 ? stub14_group_size
: stub_group_size
))
12109 && htab
->sec_info
[prev
->id
].toc_off
== curr_toc
)
12112 /* OK, the size from the start of CURR to the end is less
12113 than stub_group_size and thus can be handled by one stub
12114 section. (or the tail section is itself larger than
12115 stub_group_size, in which case we may be toast.) We
12116 should really be keeping track of the total size of stubs
12117 added here, as stubs contribute to the final output
12118 section size. That's a little tricky, and this way will
12119 only break if stubs added make the total size more than
12120 2^25, ie. for the default stub_group_size, if stubs total
12121 more than 2097152 bytes, or nearly 75000 plt call stubs. */
12122 group
= bfd_alloc (curr
->owner
, sizeof (*group
));
12125 group
->link_sec
= curr
;
12126 group
->stub_sec
= NULL
;
12127 group
->needs_save_res
= 0;
12128 group
->next
= htab
->group
;
12129 htab
->group
= group
;
12132 prev
= htab
->sec_info
[tail
->id
].u
.list
;
12133 /* Set up this stub group. */
12134 htab
->sec_info
[tail
->id
].u
.group
= group
;
12136 while (tail
!= curr
&& (tail
= prev
) != NULL
);
12138 /* But wait, there's more! Input sections up to stub_group_size
12139 bytes before the stub section can be handled by it too.
12140 Don't do this if we have a really large section after the
12141 stubs, as adding more stubs increases the chance that
12142 branches may not reach into the stub section. */
12143 if (!stubs_always_before_branch
&& !big_sec
)
12146 while (prev
!= NULL
12147 && ((total
+= tail
->output_offset
- prev
->output_offset
)
12148 < (ppc64_elf_section_data (prev
) != NULL
12149 && ppc64_elf_section_data (prev
)->has_14bit_branch
12150 ? stub14_group_size
: stub_group_size
))
12151 && htab
->sec_info
[prev
->id
].toc_off
== curr_toc
)
12154 prev
= htab
->sec_info
[tail
->id
].u
.list
;
12155 htab
->sec_info
[tail
->id
].u
.group
= group
;
12164 static const unsigned char glink_eh_frame_cie
[] =
12166 0, 0, 0, 16, /* length. */
12167 0, 0, 0, 0, /* id. */
12168 1, /* CIE version. */
12169 'z', 'R', 0, /* Augmentation string. */
12170 4, /* Code alignment. */
12171 0x78, /* Data alignment. */
12173 1, /* Augmentation size. */
12174 DW_EH_PE_pcrel
| DW_EH_PE_sdata4
, /* FDE encoding. */
12175 DW_CFA_def_cfa
, 1, 0, /* def_cfa: r1 offset 0. */
12179 /* Stripping output sections is normally done before dynamic section
12180 symbols have been allocated. This function is called later, and
12181 handles cases like htab->brlt which is mapped to its own output
12185 maybe_strip_output (struct bfd_link_info
*info
, asection
*isec
)
12187 if (isec
->size
== 0
12188 && isec
->output_section
->size
== 0
12189 && !(isec
->output_section
->flags
& SEC_KEEP
)
12190 && !bfd_section_removed_from_list (info
->output_bfd
,
12191 isec
->output_section
)
12192 && elf_section_data (isec
->output_section
)->dynindx
== 0)
12194 isec
->output_section
->flags
|= SEC_EXCLUDE
;
12195 bfd_section_list_remove (info
->output_bfd
, isec
->output_section
);
12196 info
->output_bfd
->section_count
--;
12200 /* Determine and set the size of the stub section for a final link.
12202 The basic idea here is to examine all the relocations looking for
12203 PC-relative calls to a target that is unreachable with a "bl"
12207 ppc64_elf_size_stubs (struct bfd_link_info
*info
)
12209 bfd_size_type stub_group_size
;
12210 bfd_boolean stubs_always_before_branch
;
12211 struct ppc_link_hash_table
*htab
= ppc_hash_table (info
);
12216 if (htab
->params
->plt_thread_safe
== -1 && !bfd_link_executable (info
))
12217 htab
->params
->plt_thread_safe
= 1;
12218 if (!htab
->opd_abi
)
12219 htab
->params
->plt_thread_safe
= 0;
12220 else if (htab
->params
->plt_thread_safe
== -1)
12222 static const char *const thread_starter
[] =
12226 "_ZNSt6thread15_M_start_threadESt10shared_ptrINS_10_Impl_baseEE",
12228 "aio_init", "aio_read", "aio_write", "aio_fsync", "lio_listio",
12229 "mq_notify", "create_timer",
12234 "GOMP_parallel_start",
12235 "GOMP_parallel_loop_static",
12236 "GOMP_parallel_loop_static_start",
12237 "GOMP_parallel_loop_dynamic",
12238 "GOMP_parallel_loop_dynamic_start",
12239 "GOMP_parallel_loop_guided",
12240 "GOMP_parallel_loop_guided_start",
12241 "GOMP_parallel_loop_runtime",
12242 "GOMP_parallel_loop_runtime_start",
12243 "GOMP_parallel_sections",
12244 "GOMP_parallel_sections_start",
12250 for (i
= 0; i
< ARRAY_SIZE (thread_starter
); i
++)
12252 struct elf_link_hash_entry
*h
;
12253 h
= elf_link_hash_lookup (&htab
->elf
, thread_starter
[i
],
12254 FALSE
, FALSE
, TRUE
);
12255 htab
->params
->plt_thread_safe
= h
!= NULL
&& h
->ref_regular
;
12256 if (htab
->params
->plt_thread_safe
)
12260 stubs_always_before_branch
= htab
->params
->group_size
< 0;
12261 if (htab
->params
->group_size
< 0)
12262 stub_group_size
= -htab
->params
->group_size
;
12264 stub_group_size
= htab
->params
->group_size
;
12266 if (!group_sections (info
, stub_group_size
, stubs_always_before_branch
))
12269 #define STUB_SHRINK_ITER 20
12270 /* Loop until no stubs added. After iteration 20 of this loop we may
12271 exit on a stub section shrinking. This is to break out of a
12272 pathological case where adding stubs on one iteration decreases
12273 section gaps (perhaps due to alignment), which then requires
12274 fewer or smaller stubs on the next iteration. */
12279 unsigned int bfd_indx
;
12280 struct map_stub
*group
;
12281 asection
*stub_sec
;
12283 htab
->stub_iteration
+= 1;
12285 for (input_bfd
= info
->input_bfds
, bfd_indx
= 0;
12287 input_bfd
= input_bfd
->link
.next
, bfd_indx
++)
12289 Elf_Internal_Shdr
*symtab_hdr
;
12291 Elf_Internal_Sym
*local_syms
= NULL
;
12293 if (!is_ppc64_elf (input_bfd
))
12296 /* We'll need the symbol table in a second. */
12297 symtab_hdr
= &elf_symtab_hdr (input_bfd
);
12298 if (symtab_hdr
->sh_info
== 0)
12301 /* Walk over each section attached to the input bfd. */
12302 for (section
= input_bfd
->sections
;
12304 section
= section
->next
)
12306 Elf_Internal_Rela
*internal_relocs
, *irelaend
, *irela
;
12308 /* If there aren't any relocs, then there's nothing more
12310 if ((section
->flags
& SEC_RELOC
) == 0
12311 || (section
->flags
& SEC_ALLOC
) == 0
12312 || (section
->flags
& SEC_LOAD
) == 0
12313 || (section
->flags
& SEC_CODE
) == 0
12314 || section
->reloc_count
== 0)
12317 /* If this section is a link-once section that will be
12318 discarded, then don't create any stubs. */
12319 if (section
->output_section
== NULL
12320 || section
->output_section
->owner
!= info
->output_bfd
)
12323 /* Get the relocs. */
12325 = _bfd_elf_link_read_relocs (input_bfd
, section
, NULL
, NULL
,
12326 info
->keep_memory
);
12327 if (internal_relocs
== NULL
)
12328 goto error_ret_free_local
;
12330 /* Now examine each relocation. */
12331 irela
= internal_relocs
;
12332 irelaend
= irela
+ section
->reloc_count
;
12333 for (; irela
< irelaend
; irela
++)
12335 enum elf_ppc64_reloc_type r_type
;
12336 unsigned int r_indx
;
12337 enum ppc_stub_type stub_type
;
12338 struct ppc_stub_hash_entry
*stub_entry
;
12339 asection
*sym_sec
, *code_sec
;
12340 bfd_vma sym_value
, code_value
;
12341 bfd_vma destination
;
12342 unsigned long local_off
;
12343 bfd_boolean ok_dest
;
12344 struct ppc_link_hash_entry
*hash
;
12345 struct ppc_link_hash_entry
*fdh
;
12346 struct elf_link_hash_entry
*h
;
12347 Elf_Internal_Sym
*sym
;
12349 const asection
*id_sec
;
12350 struct _opd_sec_data
*opd
;
12351 struct plt_entry
*plt_ent
;
12353 r_type
= ELF64_R_TYPE (irela
->r_info
);
12354 r_indx
= ELF64_R_SYM (irela
->r_info
);
12356 if (r_type
>= R_PPC64_max
)
12358 bfd_set_error (bfd_error_bad_value
);
12359 goto error_ret_free_internal
;
12362 /* Only look for stubs on branch instructions. */
12363 if (r_type
!= R_PPC64_REL24
12364 && r_type
!= R_PPC64_REL14
12365 && r_type
!= R_PPC64_REL14_BRTAKEN
12366 && r_type
!= R_PPC64_REL14_BRNTAKEN
)
12369 /* Now determine the call target, its name, value,
12371 if (!get_sym_h (&h
, &sym
, &sym_sec
, NULL
, &local_syms
,
12372 r_indx
, input_bfd
))
12373 goto error_ret_free_internal
;
12374 hash
= (struct ppc_link_hash_entry
*) h
;
12381 sym_value
= sym
->st_value
;
12382 if (sym_sec
!= NULL
12383 && sym_sec
->output_section
!= NULL
)
12386 else if (hash
->elf
.root
.type
== bfd_link_hash_defined
12387 || hash
->elf
.root
.type
== bfd_link_hash_defweak
)
12389 sym_value
= hash
->elf
.root
.u
.def
.value
;
12390 if (sym_sec
->output_section
!= NULL
)
12393 else if (hash
->elf
.root
.type
== bfd_link_hash_undefweak
12394 || hash
->elf
.root
.type
== bfd_link_hash_undefined
)
12396 /* Recognise an old ABI func code entry sym, and
12397 use the func descriptor sym instead if it is
12399 if (hash
->elf
.root
.root
.string
[0] == '.'
12400 && (fdh
= lookup_fdh (hash
, htab
)) != NULL
)
12402 if (fdh
->elf
.root
.type
== bfd_link_hash_defined
12403 || fdh
->elf
.root
.type
== bfd_link_hash_defweak
)
12405 sym_sec
= fdh
->elf
.root
.u
.def
.section
;
12406 sym_value
= fdh
->elf
.root
.u
.def
.value
;
12407 if (sym_sec
->output_section
!= NULL
)
12416 bfd_set_error (bfd_error_bad_value
);
12417 goto error_ret_free_internal
;
12424 sym_value
+= irela
->r_addend
;
12425 destination
= (sym_value
12426 + sym_sec
->output_offset
12427 + sym_sec
->output_section
->vma
);
12428 local_off
= PPC64_LOCAL_ENTRY_OFFSET (hash
12433 code_sec
= sym_sec
;
12434 code_value
= sym_value
;
12435 opd
= get_opd_info (sym_sec
);
12440 if (hash
== NULL
&& opd
->adjust
!= NULL
)
12442 long adjust
= opd
->adjust
[OPD_NDX (sym_value
)];
12445 code_value
+= adjust
;
12446 sym_value
+= adjust
;
12448 dest
= opd_entry_value (sym_sec
, sym_value
,
12449 &code_sec
, &code_value
, FALSE
);
12450 if (dest
!= (bfd_vma
) -1)
12452 destination
= dest
;
12455 /* Fixup old ABI sym to point at code
12457 hash
->elf
.root
.type
= bfd_link_hash_defweak
;
12458 hash
->elf
.root
.u
.def
.section
= code_sec
;
12459 hash
->elf
.root
.u
.def
.value
= code_value
;
12464 /* Determine what (if any) linker stub is needed. */
12466 stub_type
= ppc_type_of_stub (section
, irela
, &hash
,
12467 &plt_ent
, destination
,
12470 if (stub_type
!= ppc_stub_plt_call
)
12472 /* Check whether we need a TOC adjusting stub.
12473 Since the linker pastes together pieces from
12474 different object files when creating the
12475 _init and _fini functions, it may be that a
12476 call to what looks like a local sym is in
12477 fact a call needing a TOC adjustment. */
12478 if (code_sec
!= NULL
12479 && code_sec
->output_section
!= NULL
12480 && (htab
->sec_info
[code_sec
->id
].toc_off
12481 != htab
->sec_info
[section
->id
].toc_off
)
12482 && (code_sec
->has_toc_reloc
12483 || code_sec
->makes_toc_func_call
))
12484 stub_type
= ppc_stub_long_branch_r2off
;
12487 if (stub_type
== ppc_stub_none
)
12490 /* __tls_get_addr calls might be eliminated. */
12491 if (stub_type
!= ppc_stub_plt_call
12493 && (hash
== htab
->tls_get_addr
12494 || hash
== htab
->tls_get_addr_fd
)
12495 && section
->has_tls_reloc
12496 && irela
!= internal_relocs
)
12498 /* Get tls info. */
12499 unsigned char *tls_mask
;
12501 if (!get_tls_mask (&tls_mask
, NULL
, NULL
, &local_syms
,
12502 irela
- 1, input_bfd
))
12503 goto error_ret_free_internal
;
12504 if (*tls_mask
!= 0)
12508 if (stub_type
== ppc_stub_plt_call
12509 && irela
+ 1 < irelaend
12510 && irela
[1].r_offset
== irela
->r_offset
+ 4
12511 && ELF64_R_TYPE (irela
[1].r_info
) == R_PPC64_TOCSAVE
)
12513 if (!tocsave_find (htab
, INSERT
,
12514 &local_syms
, irela
+ 1, input_bfd
))
12515 goto error_ret_free_internal
;
12517 else if (stub_type
== ppc_stub_plt_call
)
12518 stub_type
= ppc_stub_plt_call_r2save
;
12520 /* Support for grouping stub sections. */
12521 id_sec
= htab
->sec_info
[section
->id
].u
.group
->link_sec
;
12523 /* Get the name of this stub. */
12524 stub_name
= ppc_stub_name (id_sec
, sym_sec
, hash
, irela
);
12526 goto error_ret_free_internal
;
12528 stub_entry
= ppc_stub_hash_lookup (&htab
->stub_hash_table
,
12529 stub_name
, FALSE
, FALSE
);
12530 if (stub_entry
!= NULL
)
12532 /* The proper stub has already been created. */
12534 if (stub_type
== ppc_stub_plt_call_r2save
)
12535 stub_entry
->stub_type
= stub_type
;
12539 stub_entry
= ppc_add_stub (stub_name
, section
, info
);
12540 if (stub_entry
== NULL
)
12543 error_ret_free_internal
:
12544 if (elf_section_data (section
)->relocs
== NULL
)
12545 free (internal_relocs
);
12546 error_ret_free_local
:
12547 if (local_syms
!= NULL
12548 && (symtab_hdr
->contents
12549 != (unsigned char *) local_syms
))
12554 stub_entry
->stub_type
= stub_type
;
12555 if (stub_type
!= ppc_stub_plt_call
12556 && stub_type
!= ppc_stub_plt_call_r2save
)
12558 stub_entry
->target_value
= code_value
;
12559 stub_entry
->target_section
= code_sec
;
12563 stub_entry
->target_value
= sym_value
;
12564 stub_entry
->target_section
= sym_sec
;
12566 stub_entry
->h
= hash
;
12567 stub_entry
->plt_ent
= plt_ent
;
12568 stub_entry
->other
= hash
? hash
->elf
.other
: sym
->st_other
;
12570 if (stub_entry
->h
!= NULL
)
12571 htab
->stub_globals
+= 1;
12574 /* We're done with the internal relocs, free them. */
12575 if (elf_section_data (section
)->relocs
!= internal_relocs
)
12576 free (internal_relocs
);
12579 if (local_syms
!= NULL
12580 && symtab_hdr
->contents
!= (unsigned char *) local_syms
)
12582 if (!info
->keep_memory
)
12585 symtab_hdr
->contents
= (unsigned char *) local_syms
;
12589 /* We may have added some stubs. Find out the new size of the
12591 for (stub_sec
= htab
->params
->stub_bfd
->sections
;
12593 stub_sec
= stub_sec
->next
)
12594 if ((stub_sec
->flags
& SEC_LINKER_CREATED
) == 0)
12596 stub_sec
->rawsize
= stub_sec
->size
;
12597 stub_sec
->size
= 0;
12598 stub_sec
->reloc_count
= 0;
12599 stub_sec
->flags
&= ~SEC_RELOC
;
12602 htab
->brlt
->size
= 0;
12603 htab
->brlt
->reloc_count
= 0;
12604 htab
->brlt
->flags
&= ~SEC_RELOC
;
12605 if (htab
->relbrlt
!= NULL
)
12606 htab
->relbrlt
->size
= 0;
12608 bfd_hash_traverse (&htab
->stub_hash_table
, ppc_size_one_stub
, info
);
12610 for (group
= htab
->group
; group
!= NULL
; group
= group
->next
)
12611 if (group
->needs_save_res
)
12612 group
->stub_sec
->size
+= htab
->sfpr
->size
;
12614 if (info
->emitrelocations
12615 && htab
->glink
!= NULL
&& htab
->glink
->size
!= 0)
12617 htab
->glink
->reloc_count
= 1;
12618 htab
->glink
->flags
|= SEC_RELOC
;
12621 if (htab
->glink_eh_frame
!= NULL
12622 && !bfd_is_abs_section (htab
->glink_eh_frame
->output_section
)
12623 && htab
->glink_eh_frame
->output_section
->size
!= 0)
12625 size_t size
= 0, align
;
12627 for (stub_sec
= htab
->params
->stub_bfd
->sections
;
12629 stub_sec
= stub_sec
->next
)
12630 if ((stub_sec
->flags
& SEC_LINKER_CREATED
) == 0)
12632 if (htab
->glink
!= NULL
&& htab
->glink
->size
!= 0)
12635 size
+= sizeof (glink_eh_frame_cie
);
12637 align
<<= htab
->glink_eh_frame
->output_section
->alignment_power
;
12639 size
= (size
+ align
) & ~align
;
12640 htab
->glink_eh_frame
->rawsize
= htab
->glink_eh_frame
->size
;
12641 htab
->glink_eh_frame
->size
= size
;
12644 if (htab
->params
->plt_stub_align
!= 0)
12645 for (stub_sec
= htab
->params
->stub_bfd
->sections
;
12647 stub_sec
= stub_sec
->next
)
12648 if ((stub_sec
->flags
& SEC_LINKER_CREATED
) == 0)
12649 stub_sec
->size
= ((stub_sec
->size
12650 + (1 << htab
->params
->plt_stub_align
) - 1)
12651 & -(1 << htab
->params
->plt_stub_align
));
12653 for (stub_sec
= htab
->params
->stub_bfd
->sections
;
12655 stub_sec
= stub_sec
->next
)
12656 if ((stub_sec
->flags
& SEC_LINKER_CREATED
) == 0
12657 && stub_sec
->rawsize
!= stub_sec
->size
12658 && (htab
->stub_iteration
<= STUB_SHRINK_ITER
12659 || stub_sec
->rawsize
< stub_sec
->size
))
12662 if (stub_sec
== NULL
12663 && (htab
->glink_eh_frame
== NULL
12664 || htab
->glink_eh_frame
->rawsize
== htab
->glink_eh_frame
->size
))
12667 /* Ask the linker to do its stuff. */
12668 (*htab
->params
->layout_sections_again
) ();
12671 if (htab
->glink_eh_frame
!= NULL
12672 && htab
->glink_eh_frame
->size
!= 0)
12675 bfd_byte
*p
, *last_fde
;
12676 size_t last_fde_len
, size
, align
, pad
;
12677 asection
*stub_sec
;
12679 p
= bfd_zalloc (htab
->glink_eh_frame
->owner
, htab
->glink_eh_frame
->size
);
12682 htab
->glink_eh_frame
->contents
= p
;
12685 memcpy (p
, glink_eh_frame_cie
, sizeof (glink_eh_frame_cie
));
12686 /* CIE length (rewrite in case little-endian). */
12687 last_fde_len
= sizeof (glink_eh_frame_cie
) - 4;
12688 bfd_put_32 (htab
->elf
.dynobj
, last_fde_len
, p
);
12689 p
+= sizeof (glink_eh_frame_cie
);
12691 for (stub_sec
= htab
->params
->stub_bfd
->sections
;
12693 stub_sec
= stub_sec
->next
)
12694 if ((stub_sec
->flags
& SEC_LINKER_CREATED
) == 0)
12699 bfd_put_32 (htab
->elf
.dynobj
, 20, p
);
12702 val
= p
- htab
->glink_eh_frame
->contents
;
12703 bfd_put_32 (htab
->elf
.dynobj
, val
, p
);
12705 /* Offset to stub section, written later. */
12707 /* stub section size. */
12708 bfd_put_32 (htab
->elf
.dynobj
, stub_sec
->size
, p
);
12710 /* Augmentation. */
12715 if (htab
->glink
!= NULL
&& htab
->glink
->size
!= 0)
12720 bfd_put_32 (htab
->elf
.dynobj
, 20, p
);
12723 val
= p
- htab
->glink_eh_frame
->contents
;
12724 bfd_put_32 (htab
->elf
.dynobj
, val
, p
);
12726 /* Offset to .glink, written later. */
12729 bfd_put_32 (htab
->elf
.dynobj
, htab
->glink
->size
- 8, p
);
12731 /* Augmentation. */
12734 *p
++ = DW_CFA_advance_loc
+ 1;
12735 *p
++ = DW_CFA_register
;
12737 *p
++ = htab
->opd_abi
? 12 : 0;
12738 *p
++ = DW_CFA_advance_loc
+ 4;
12739 *p
++ = DW_CFA_restore_extended
;
12742 /* Subsume any padding into the last FDE if user .eh_frame
12743 sections are aligned more than glink_eh_frame. Otherwise any
12744 zero padding will be seen as a terminator. */
12745 size
= p
- htab
->glink_eh_frame
->contents
;
12747 align
<<= htab
->glink_eh_frame
->output_section
->alignment_power
;
12749 pad
= ((size
+ align
) & ~align
) - size
;
12750 htab
->glink_eh_frame
->size
= size
+ pad
;
12751 bfd_put_32 (htab
->elf
.dynobj
, last_fde_len
+ pad
, last_fde
);
12754 maybe_strip_output (info
, htab
->brlt
);
12755 if (htab
->glink_eh_frame
!= NULL
)
12756 maybe_strip_output (info
, htab
->glink_eh_frame
);
12761 /* Called after we have determined section placement. If sections
12762 move, we'll be called again. Provide a value for TOCstart. */
12765 ppc64_elf_set_toc (struct bfd_link_info
*info
, bfd
*obfd
)
12768 bfd_vma TOCstart
, adjust
;
12772 struct elf_link_hash_entry
*h
;
12773 struct elf_link_hash_table
*htab
= elf_hash_table (info
);
12775 if (is_elf_hash_table (htab
)
12776 && htab
->hgot
!= NULL
)
12780 h
= elf_link_hash_lookup (htab
, ".TOC.", FALSE
, FALSE
, TRUE
);
12781 if (is_elf_hash_table (htab
))
12785 && h
->root
.type
== bfd_link_hash_defined
12786 && !h
->root
.linker_def
12787 && (!is_elf_hash_table (htab
)
12788 || h
->def_regular
))
12790 TOCstart
= (h
->root
.u
.def
.value
- TOC_BASE_OFF
12791 + h
->root
.u
.def
.section
->output_offset
12792 + h
->root
.u
.def
.section
->output_section
->vma
);
12793 _bfd_set_gp_value (obfd
, TOCstart
);
12798 /* The TOC consists of sections .got, .toc, .tocbss, .plt in that
12799 order. The TOC starts where the first of these sections starts. */
12800 s
= bfd_get_section_by_name (obfd
, ".got");
12801 if (s
== NULL
|| (s
->flags
& SEC_EXCLUDE
) != 0)
12802 s
= bfd_get_section_by_name (obfd
, ".toc");
12803 if (s
== NULL
|| (s
->flags
& SEC_EXCLUDE
) != 0)
12804 s
= bfd_get_section_by_name (obfd
, ".tocbss");
12805 if (s
== NULL
|| (s
->flags
& SEC_EXCLUDE
) != 0)
12806 s
= bfd_get_section_by_name (obfd
, ".plt");
12807 if (s
== NULL
|| (s
->flags
& SEC_EXCLUDE
) != 0)
12809 /* This may happen for
12810 o references to TOC base (SYM@toc / TOC[tc0]) without a
12812 o bad linker script
12813 o --gc-sections and empty TOC sections
12815 FIXME: Warn user? */
12817 /* Look for a likely section. We probably won't even be
12819 for (s
= obfd
->sections
; s
!= NULL
; s
= s
->next
)
12820 if ((s
->flags
& (SEC_ALLOC
| SEC_SMALL_DATA
| SEC_READONLY
12822 == (SEC_ALLOC
| SEC_SMALL_DATA
))
12825 for (s
= obfd
->sections
; s
!= NULL
; s
= s
->next
)
12826 if ((s
->flags
& (SEC_ALLOC
| SEC_SMALL_DATA
| SEC_EXCLUDE
))
12827 == (SEC_ALLOC
| SEC_SMALL_DATA
))
12830 for (s
= obfd
->sections
; s
!= NULL
; s
= s
->next
)
12831 if ((s
->flags
& (SEC_ALLOC
| SEC_READONLY
| SEC_EXCLUDE
))
12835 for (s
= obfd
->sections
; s
!= NULL
; s
= s
->next
)
12836 if ((s
->flags
& (SEC_ALLOC
| SEC_EXCLUDE
)) == SEC_ALLOC
)
12842 TOCstart
= s
->output_section
->vma
+ s
->output_offset
;
12844 /* Force alignment. */
12845 adjust
= TOCstart
& (TOC_BASE_ALIGN
- 1);
12846 TOCstart
-= adjust
;
12847 _bfd_set_gp_value (obfd
, TOCstart
);
12849 if (info
!= NULL
&& s
!= NULL
)
12851 struct ppc_link_hash_table
*htab
= ppc_hash_table (info
);
12855 if (htab
->elf
.hgot
!= NULL
)
12857 htab
->elf
.hgot
->root
.u
.def
.value
= TOC_BASE_OFF
- adjust
;
12858 htab
->elf
.hgot
->root
.u
.def
.section
= s
;
12863 struct bfd_link_hash_entry
*bh
= NULL
;
12864 _bfd_generic_link_add_one_symbol (info
, obfd
, ".TOC.", BSF_GLOBAL
,
12865 s
, TOC_BASE_OFF
- adjust
,
12866 NULL
, FALSE
, FALSE
, &bh
);
12872 /* Called via elf_link_hash_traverse from ppc64_elf_build_stubs to
12873 write out any global entry stubs. */
12876 build_global_entry_stubs (struct elf_link_hash_entry
*h
, void *inf
)
12878 struct bfd_link_info
*info
;
12879 struct ppc_link_hash_table
*htab
;
12880 struct plt_entry
*pent
;
12883 if (h
->root
.type
== bfd_link_hash_indirect
)
12886 if (!h
->pointer_equality_needed
)
12889 if (h
->def_regular
)
12893 htab
= ppc_hash_table (info
);
12898 for (pent
= h
->plt
.plist
; pent
!= NULL
; pent
= pent
->next
)
12899 if (pent
->plt
.offset
!= (bfd_vma
) -1
12900 && pent
->addend
== 0)
12906 p
= s
->contents
+ h
->root
.u
.def
.value
;
12907 plt
= htab
->elf
.splt
;
12908 if (!htab
->elf
.dynamic_sections_created
12909 || h
->dynindx
== -1)
12910 plt
= htab
->elf
.iplt
;
12911 off
= pent
->plt
.offset
+ plt
->output_offset
+ plt
->output_section
->vma
;
12912 off
-= h
->root
.u
.def
.value
+ s
->output_offset
+ s
->output_section
->vma
;
12914 if (off
+ 0x80008000 > 0xffffffff || (off
& 3) != 0)
12916 info
->callbacks
->einfo
12917 (_("%P: linkage table error against `%T'\n"),
12918 h
->root
.root
.string
);
12919 bfd_set_error (bfd_error_bad_value
);
12920 htab
->stub_error
= TRUE
;
12923 htab
->stub_count
[ppc_stub_global_entry
- 1] += 1;
12924 if (htab
->params
->emit_stub_syms
)
12926 size_t len
= strlen (h
->root
.root
.string
);
12927 char *name
= bfd_malloc (sizeof "12345678.global_entry." + len
);
12932 sprintf (name
, "%08x.global_entry.%s", s
->id
, h
->root
.root
.string
);
12933 h
= elf_link_hash_lookup (&htab
->elf
, name
, TRUE
, FALSE
, FALSE
);
12936 if (h
->root
.type
== bfd_link_hash_new
)
12938 h
->root
.type
= bfd_link_hash_defined
;
12939 h
->root
.u
.def
.section
= s
;
12940 h
->root
.u
.def
.value
= p
- s
->contents
;
12941 h
->ref_regular
= 1;
12942 h
->def_regular
= 1;
12943 h
->ref_regular_nonweak
= 1;
12944 h
->forced_local
= 1;
12946 h
->root
.linker_def
= 1;
12950 if (PPC_HA (off
) != 0)
12952 bfd_put_32 (s
->owner
, ADDIS_R12_R12
| PPC_HA (off
), p
);
12955 bfd_put_32 (s
->owner
, LD_R12_0R12
| PPC_LO (off
), p
);
12957 bfd_put_32 (s
->owner
, MTCTR_R12
, p
);
12959 bfd_put_32 (s
->owner
, BCTR
, p
);
12965 /* Build all the stubs associated with the current output file.
12966 The stubs are kept in a hash table attached to the main linker
12967 hash table. This function is called via gldelf64ppc_finish. */
12970 ppc64_elf_build_stubs (struct bfd_link_info
*info
,
12973 struct ppc_link_hash_table
*htab
= ppc_hash_table (info
);
12974 struct map_stub
*group
;
12975 asection
*stub_sec
;
12977 int stub_sec_count
= 0;
12982 /* Allocate memory to hold the linker stubs. */
12983 for (stub_sec
= htab
->params
->stub_bfd
->sections
;
12985 stub_sec
= stub_sec
->next
)
12986 if ((stub_sec
->flags
& SEC_LINKER_CREATED
) == 0
12987 && stub_sec
->size
!= 0)
12989 stub_sec
->contents
= bfd_zalloc (htab
->params
->stub_bfd
, stub_sec
->size
);
12990 if (stub_sec
->contents
== NULL
)
12992 stub_sec
->size
= 0;
12995 if (htab
->glink
!= NULL
&& htab
->glink
->size
!= 0)
13000 /* Build the .glink plt call stub. */
13001 if (htab
->params
->emit_stub_syms
)
13003 struct elf_link_hash_entry
*h
;
13004 h
= elf_link_hash_lookup (&htab
->elf
, "__glink_PLTresolve",
13005 TRUE
, FALSE
, FALSE
);
13008 if (h
->root
.type
== bfd_link_hash_new
)
13010 h
->root
.type
= bfd_link_hash_defined
;
13011 h
->root
.u
.def
.section
= htab
->glink
;
13012 h
->root
.u
.def
.value
= 8;
13013 h
->ref_regular
= 1;
13014 h
->def_regular
= 1;
13015 h
->ref_regular_nonweak
= 1;
13016 h
->forced_local
= 1;
13018 h
->root
.linker_def
= 1;
13021 plt0
= (htab
->elf
.splt
->output_section
->vma
13022 + htab
->elf
.splt
->output_offset
13024 if (info
->emitrelocations
)
13026 Elf_Internal_Rela
*r
= get_relocs (htab
->glink
, 1);
13029 r
->r_offset
= (htab
->glink
->output_offset
13030 + htab
->glink
->output_section
->vma
);
13031 r
->r_info
= ELF64_R_INFO (0, R_PPC64_REL64
);
13032 r
->r_addend
= plt0
;
13034 p
= htab
->glink
->contents
;
13035 plt0
-= htab
->glink
->output_section
->vma
+ htab
->glink
->output_offset
;
13036 bfd_put_64 (htab
->glink
->owner
, plt0
, p
);
13040 bfd_put_32 (htab
->glink
->owner
, MFLR_R12
, p
);
13042 bfd_put_32 (htab
->glink
->owner
, BCL_20_31
, p
);
13044 bfd_put_32 (htab
->glink
->owner
, MFLR_R11
, p
);
13046 bfd_put_32 (htab
->glink
->owner
, LD_R2_0R11
| (-16 & 0xfffc), p
);
13048 bfd_put_32 (htab
->glink
->owner
, MTLR_R12
, p
);
13050 bfd_put_32 (htab
->glink
->owner
, ADD_R11_R2_R11
, p
);
13052 bfd_put_32 (htab
->glink
->owner
, LD_R12_0R11
, p
);
13054 bfd_put_32 (htab
->glink
->owner
, LD_R2_0R11
| 8, p
);
13056 bfd_put_32 (htab
->glink
->owner
, MTCTR_R12
, p
);
13058 bfd_put_32 (htab
->glink
->owner
, LD_R11_0R11
| 16, p
);
13063 bfd_put_32 (htab
->glink
->owner
, MFLR_R0
, p
);
13065 bfd_put_32 (htab
->glink
->owner
, BCL_20_31
, p
);
13067 bfd_put_32 (htab
->glink
->owner
, MFLR_R11
, p
);
13069 bfd_put_32 (htab
->glink
->owner
, LD_R2_0R11
| (-16 & 0xfffc), p
);
13071 bfd_put_32 (htab
->glink
->owner
, MTLR_R0
, p
);
13073 bfd_put_32 (htab
->glink
->owner
, SUB_R12_R12_R11
, p
);
13075 bfd_put_32 (htab
->glink
->owner
, ADD_R11_R2_R11
, p
);
13077 bfd_put_32 (htab
->glink
->owner
, ADDI_R0_R12
| (-48 & 0xffff), p
);
13079 bfd_put_32 (htab
->glink
->owner
, LD_R12_0R11
, p
);
13081 bfd_put_32 (htab
->glink
->owner
, SRDI_R0_R0_2
, p
);
13083 bfd_put_32 (htab
->glink
->owner
, MTCTR_R12
, p
);
13085 bfd_put_32 (htab
->glink
->owner
, LD_R11_0R11
| 8, p
);
13088 bfd_put_32 (htab
->glink
->owner
, BCTR
, p
);
13090 while (p
- htab
->glink
->contents
< GLINK_CALL_STUB_SIZE
)
13092 bfd_put_32 (htab
->glink
->owner
, NOP
, p
);
13096 /* Build the .glink lazy link call stubs. */
13098 while (p
< htab
->glink
->contents
+ htab
->glink
->rawsize
)
13104 bfd_put_32 (htab
->glink
->owner
, LI_R0_0
| indx
, p
);
13109 bfd_put_32 (htab
->glink
->owner
, LIS_R0_0
| PPC_HI (indx
), p
);
13111 bfd_put_32 (htab
->glink
->owner
, ORI_R0_R0_0
| PPC_LO (indx
),
13116 bfd_put_32 (htab
->glink
->owner
,
13117 B_DOT
| ((htab
->glink
->contents
- p
+ 8) & 0x3fffffc), p
);
13122 /* Build .glink global entry stubs. */
13123 if (htab
->glink
->size
> htab
->glink
->rawsize
)
13124 elf_link_hash_traverse (&htab
->elf
, build_global_entry_stubs
, info
);
13127 if (htab
->brlt
!= NULL
&& htab
->brlt
->size
!= 0)
13129 htab
->brlt
->contents
= bfd_zalloc (htab
->brlt
->owner
,
13131 if (htab
->brlt
->contents
== NULL
)
13134 if (htab
->relbrlt
!= NULL
&& htab
->relbrlt
->size
!= 0)
13136 htab
->relbrlt
->contents
= bfd_zalloc (htab
->relbrlt
->owner
,
13137 htab
->relbrlt
->size
);
13138 if (htab
->relbrlt
->contents
== NULL
)
13142 /* Build the stubs as directed by the stub hash table. */
13143 bfd_hash_traverse (&htab
->stub_hash_table
, ppc_build_one_stub
, info
);
13145 for (group
= htab
->group
; group
!= NULL
; group
= group
->next
)
13146 if (group
->needs_save_res
)
13148 stub_sec
= group
->stub_sec
;
13149 memcpy (stub_sec
->contents
+ stub_sec
->size
, htab
->sfpr
->contents
,
13151 if (htab
->params
->emit_stub_syms
)
13155 for (i
= 0; i
< ARRAY_SIZE (save_res_funcs
); i
++)
13156 if (!sfpr_define (info
, &save_res_funcs
[i
], stub_sec
))
13159 stub_sec
->size
+= htab
->sfpr
->size
;
13162 if (htab
->relbrlt
!= NULL
)
13163 htab
->relbrlt
->reloc_count
= 0;
13165 if (htab
->params
->plt_stub_align
!= 0)
13166 for (stub_sec
= htab
->params
->stub_bfd
->sections
;
13168 stub_sec
= stub_sec
->next
)
13169 if ((stub_sec
->flags
& SEC_LINKER_CREATED
) == 0)
13170 stub_sec
->size
= ((stub_sec
->size
13171 + (1 << htab
->params
->plt_stub_align
) - 1)
13172 & -(1 << htab
->params
->plt_stub_align
));
13174 for (stub_sec
= htab
->params
->stub_bfd
->sections
;
13176 stub_sec
= stub_sec
->next
)
13177 if ((stub_sec
->flags
& SEC_LINKER_CREATED
) == 0)
13179 stub_sec_count
+= 1;
13180 if (stub_sec
->rawsize
!= stub_sec
->size
13181 && (htab
->stub_iteration
<= STUB_SHRINK_ITER
13182 || stub_sec
->rawsize
< stub_sec
->size
))
13186 /* Note that the glink_eh_frame check here is not only testing that
13187 the generated size matched the calculated size but also that
13188 bfd_elf_discard_info didn't make any changes to the section. */
13189 if (stub_sec
!= NULL
13190 || (htab
->glink_eh_frame
!= NULL
13191 && htab
->glink_eh_frame
->rawsize
!= htab
->glink_eh_frame
->size
))
13193 htab
->stub_error
= TRUE
;
13194 info
->callbacks
->einfo (_("%P: stubs don't match calculated size\n"));
13197 if (htab
->stub_error
)
13202 *stats
= bfd_malloc (500);
13203 if (*stats
== NULL
)
13206 sprintf (*stats
, _("linker stubs in %u group%s\n"
13208 " toc adjust %lu\n"
13209 " long branch %lu\n"
13210 " long toc adj %lu\n"
13212 " plt call toc %lu\n"
13213 " global entry %lu"),
13215 stub_sec_count
== 1 ? "" : "s",
13216 htab
->stub_count
[ppc_stub_long_branch
- 1],
13217 htab
->stub_count
[ppc_stub_long_branch_r2off
- 1],
13218 htab
->stub_count
[ppc_stub_plt_branch
- 1],
13219 htab
->stub_count
[ppc_stub_plt_branch_r2off
- 1],
13220 htab
->stub_count
[ppc_stub_plt_call
- 1],
13221 htab
->stub_count
[ppc_stub_plt_call_r2save
- 1],
13222 htab
->stub_count
[ppc_stub_global_entry
- 1]);
13227 /* This function undoes the changes made by add_symbol_adjust. */
13230 undo_symbol_twiddle (struct elf_link_hash_entry
*h
, void *inf ATTRIBUTE_UNUSED
)
13232 struct ppc_link_hash_entry
*eh
;
13234 if (h
->root
.type
== bfd_link_hash_indirect
)
13237 eh
= (struct ppc_link_hash_entry
*) h
;
13238 if (eh
->elf
.root
.type
!= bfd_link_hash_undefweak
|| !eh
->was_undefined
)
13241 eh
->elf
.root
.type
= bfd_link_hash_undefined
;
13246 ppc64_elf_restore_symbols (struct bfd_link_info
*info
)
13248 struct ppc_link_hash_table
*htab
= ppc_hash_table (info
);
13251 elf_link_hash_traverse (&htab
->elf
, undo_symbol_twiddle
, info
);
13254 /* What to do when ld finds relocations against symbols defined in
13255 discarded sections. */
13257 static unsigned int
13258 ppc64_elf_action_discarded (asection
*sec
)
13260 if (strcmp (".opd", sec
->name
) == 0)
13263 if (strcmp (".toc", sec
->name
) == 0)
13266 if (strcmp (".toc1", sec
->name
) == 0)
13269 return _bfd_elf_default_action_discarded (sec
);
13272 /* The RELOCATE_SECTION function is called by the ELF backend linker
13273 to handle the relocations for a section.
13275 The relocs are always passed as Rela structures; if the section
13276 actually uses Rel structures, the r_addend field will always be
13279 This function is responsible for adjust the section contents as
13280 necessary, and (if using Rela relocs and generating a
13281 relocatable output file) adjusting the reloc addend as
13284 This function does not have to worry about setting the reloc
13285 address or the reloc symbol index.
13287 LOCAL_SYMS is a pointer to the swapped in local symbols.
13289 LOCAL_SECTIONS is an array giving the section in the input file
13290 corresponding to the st_shndx field of each local symbol.
13292 The global hash table entry for the global symbols can be found
13293 via elf_sym_hashes (input_bfd).
13295 When generating relocatable output, this function must handle
13296 STB_LOCAL/STT_SECTION symbols specially. The output symbol is
13297 going to be the section symbol corresponding to the output
13298 section, which means that the addend must be adjusted
13302 ppc64_elf_relocate_section (bfd
*output_bfd
,
13303 struct bfd_link_info
*info
,
13305 asection
*input_section
,
13306 bfd_byte
*contents
,
13307 Elf_Internal_Rela
*relocs
,
13308 Elf_Internal_Sym
*local_syms
,
13309 asection
**local_sections
)
13311 struct ppc_link_hash_table
*htab
;
13312 Elf_Internal_Shdr
*symtab_hdr
;
13313 struct elf_link_hash_entry
**sym_hashes
;
13314 Elf_Internal_Rela
*rel
;
13315 Elf_Internal_Rela
*wrel
;
13316 Elf_Internal_Rela
*relend
;
13317 Elf_Internal_Rela outrel
;
13319 struct got_entry
**local_got_ents
;
13321 bfd_boolean ret
= TRUE
;
13322 bfd_boolean is_opd
;
13323 /* Assume 'at' branch hints. */
13324 bfd_boolean is_isa_v2
= TRUE
;
13325 bfd_vma d_offset
= (bfd_big_endian (output_bfd
) ? 2 : 0);
13327 /* Initialize howto table if needed. */
13328 if (!ppc64_elf_howto_table
[R_PPC64_ADDR32
])
13331 htab
= ppc_hash_table (info
);
13335 /* Don't relocate stub sections. */
13336 if (input_section
->owner
== htab
->params
->stub_bfd
)
13339 BFD_ASSERT (is_ppc64_elf (input_bfd
));
13341 local_got_ents
= elf_local_got_ents (input_bfd
);
13342 TOCstart
= elf_gp (output_bfd
);
13343 symtab_hdr
= &elf_symtab_hdr (input_bfd
);
13344 sym_hashes
= elf_sym_hashes (input_bfd
);
13345 is_opd
= ppc64_elf_section_data (input_section
)->sec_type
== sec_opd
;
13347 rel
= wrel
= relocs
;
13348 relend
= relocs
+ input_section
->reloc_count
;
13349 for (; rel
< relend
; wrel
++, rel
++)
13351 enum elf_ppc64_reloc_type r_type
;
13353 bfd_reloc_status_type r
;
13354 Elf_Internal_Sym
*sym
;
13356 struct elf_link_hash_entry
*h_elf
;
13357 struct ppc_link_hash_entry
*h
;
13358 struct ppc_link_hash_entry
*fdh
;
13359 const char *sym_name
;
13360 unsigned long r_symndx
, toc_symndx
;
13361 bfd_vma toc_addend
;
13362 unsigned char tls_mask
, tls_gd
, tls_type
;
13363 unsigned char sym_type
;
13364 bfd_vma relocation
;
13365 bfd_boolean unresolved_reloc
;
13366 bfd_boolean warned
;
13367 enum { DEST_NORMAL
, DEST_OPD
, DEST_STUB
} reloc_dest
;
13370 struct ppc_stub_hash_entry
*stub_entry
;
13371 bfd_vma max_br_offset
;
13373 Elf_Internal_Rela orig_rel
;
13374 reloc_howto_type
*howto
;
13375 struct reloc_howto_struct alt_howto
;
13380 r_type
= ELF64_R_TYPE (rel
->r_info
);
13381 r_symndx
= ELF64_R_SYM (rel
->r_info
);
13383 /* For old style R_PPC64_TOC relocs with a zero symbol, use the
13384 symbol of the previous ADDR64 reloc. The symbol gives us the
13385 proper TOC base to use. */
13386 if (rel
->r_info
== ELF64_R_INFO (0, R_PPC64_TOC
)
13388 && ELF64_R_TYPE (wrel
[-1].r_info
) == R_PPC64_ADDR64
13390 r_symndx
= ELF64_R_SYM (wrel
[-1].r_info
);
13396 unresolved_reloc
= FALSE
;
13399 if (r_symndx
< symtab_hdr
->sh_info
)
13401 /* It's a local symbol. */
13402 struct _opd_sec_data
*opd
;
13404 sym
= local_syms
+ r_symndx
;
13405 sec
= local_sections
[r_symndx
];
13406 sym_name
= bfd_elf_sym_name (input_bfd
, symtab_hdr
, sym
, sec
);
13407 sym_type
= ELF64_ST_TYPE (sym
->st_info
);
13408 relocation
= _bfd_elf_rela_local_sym (output_bfd
, sym
, &sec
, rel
);
13409 opd
= get_opd_info (sec
);
13410 if (opd
!= NULL
&& opd
->adjust
!= NULL
)
13412 long adjust
= opd
->adjust
[OPD_NDX (sym
->st_value
13418 /* If this is a relocation against the opd section sym
13419 and we have edited .opd, adjust the reloc addend so
13420 that ld -r and ld --emit-relocs output is correct.
13421 If it is a reloc against some other .opd symbol,
13422 then the symbol value will be adjusted later. */
13423 if (ELF_ST_TYPE (sym
->st_info
) == STT_SECTION
)
13424 rel
->r_addend
+= adjust
;
13426 relocation
+= adjust
;
13432 bfd_boolean ignored
;
13434 RELOC_FOR_GLOBAL_SYMBOL (info
, input_bfd
, input_section
, rel
,
13435 r_symndx
, symtab_hdr
, sym_hashes
,
13436 h_elf
, sec
, relocation
,
13437 unresolved_reloc
, warned
, ignored
);
13438 sym_name
= h_elf
->root
.root
.string
;
13439 sym_type
= h_elf
->type
;
13441 && sec
->owner
== output_bfd
13442 && strcmp (sec
->name
, ".opd") == 0)
13444 /* This is a symbol defined in a linker script. All
13445 such are defined in output sections, even those
13446 defined by simple assignment from a symbol defined in
13447 an input section. Transfer the symbol to an
13448 appropriate input .opd section, so that a branch to
13449 this symbol will be mapped to the location specified
13450 by the opd entry. */
13451 struct bfd_link_order
*lo
;
13452 for (lo
= sec
->map_head
.link_order
; lo
!= NULL
; lo
= lo
->next
)
13453 if (lo
->type
== bfd_indirect_link_order
)
13455 asection
*isec
= lo
->u
.indirect
.section
;
13456 if (h_elf
->root
.u
.def
.value
>= isec
->output_offset
13457 && h_elf
->root
.u
.def
.value
< (isec
->output_offset
13460 h_elf
->root
.u
.def
.value
-= isec
->output_offset
;
13461 h_elf
->root
.u
.def
.section
= isec
;
13468 h
= (struct ppc_link_hash_entry
*) h_elf
;
13470 if (sec
!= NULL
&& discarded_section (sec
))
13472 _bfd_clear_contents (ppc64_elf_howto_table
[r_type
],
13473 input_bfd
, input_section
,
13474 contents
+ rel
->r_offset
);
13475 wrel
->r_offset
= rel
->r_offset
;
13477 wrel
->r_addend
= 0;
13479 /* For ld -r, remove relocations in debug sections against
13480 sections defined in discarded sections. Not done for
13481 non-debug to preserve relocs in .eh_frame which the
13482 eh_frame editing code expects to be present. */
13483 if (bfd_link_relocatable (info
)
13484 && (input_section
->flags
& SEC_DEBUGGING
))
13490 if (bfd_link_relocatable (info
))
13493 if (h
!= NULL
&& &h
->elf
== htab
->elf
.hgot
)
13495 relocation
= TOCstart
+ htab
->sec_info
[input_section
->id
].toc_off
;
13496 sec
= bfd_abs_section_ptr
;
13497 unresolved_reloc
= FALSE
;
13500 /* TLS optimizations. Replace instruction sequences and relocs
13501 based on information we collected in tls_optimize. We edit
13502 RELOCS so that --emit-relocs will output something sensible
13503 for the final instruction stream. */
13508 tls_mask
= h
->tls_mask
;
13509 else if (local_got_ents
!= NULL
)
13511 struct plt_entry
**local_plt
= (struct plt_entry
**)
13512 (local_got_ents
+ symtab_hdr
->sh_info
);
13513 unsigned char *lgot_masks
= (unsigned char *)
13514 (local_plt
+ symtab_hdr
->sh_info
);
13515 tls_mask
= lgot_masks
[r_symndx
];
13518 && (r_type
== R_PPC64_TLS
13519 || r_type
== R_PPC64_TLSGD
13520 || r_type
== R_PPC64_TLSLD
))
13522 /* Check for toc tls entries. */
13523 unsigned char *toc_tls
;
13525 if (!get_tls_mask (&toc_tls
, &toc_symndx
, &toc_addend
,
13526 &local_syms
, rel
, input_bfd
))
13530 tls_mask
= *toc_tls
;
13533 /* Check that tls relocs are used with tls syms, and non-tls
13534 relocs are used with non-tls syms. */
13535 if (r_symndx
!= STN_UNDEF
13536 && r_type
!= R_PPC64_NONE
13538 || h
->elf
.root
.type
== bfd_link_hash_defined
13539 || h
->elf
.root
.type
== bfd_link_hash_defweak
)
13540 && (IS_PPC64_TLS_RELOC (r_type
)
13541 != (sym_type
== STT_TLS
13542 || (sym_type
== STT_SECTION
13543 && (sec
->flags
& SEC_THREAD_LOCAL
) != 0))))
13546 && (r_type
== R_PPC64_TLS
13547 || r_type
== R_PPC64_TLSGD
13548 || r_type
== R_PPC64_TLSLD
))
13549 /* R_PPC64_TLS is OK against a symbol in the TOC. */
13552 info
->callbacks
->einfo
13553 (!IS_PPC64_TLS_RELOC (r_type
)
13554 ? _("%P: %H: %s used with TLS symbol `%T'\n")
13555 : _("%P: %H: %s used with non-TLS symbol `%T'\n"),
13556 input_bfd
, input_section
, rel
->r_offset
,
13557 ppc64_elf_howto_table
[r_type
]->name
,
13561 /* Ensure reloc mapping code below stays sane. */
13562 if (R_PPC64_TOC16_LO_DS
!= R_PPC64_TOC16_DS
+ 1
13563 || R_PPC64_TOC16_LO
!= R_PPC64_TOC16
+ 1
13564 || (R_PPC64_GOT_TLSLD16
& 3) != (R_PPC64_GOT_TLSGD16
& 3)
13565 || (R_PPC64_GOT_TLSLD16_LO
& 3) != (R_PPC64_GOT_TLSGD16_LO
& 3)
13566 || (R_PPC64_GOT_TLSLD16_HI
& 3) != (R_PPC64_GOT_TLSGD16_HI
& 3)
13567 || (R_PPC64_GOT_TLSLD16_HA
& 3) != (R_PPC64_GOT_TLSGD16_HA
& 3)
13568 || (R_PPC64_GOT_TLSLD16
& 3) != (R_PPC64_GOT_TPREL16_DS
& 3)
13569 || (R_PPC64_GOT_TLSLD16_LO
& 3) != (R_PPC64_GOT_TPREL16_LO_DS
& 3)
13570 || (R_PPC64_GOT_TLSLD16_HI
& 3) != (R_PPC64_GOT_TPREL16_HI
& 3)
13571 || (R_PPC64_GOT_TLSLD16_HA
& 3) != (R_PPC64_GOT_TPREL16_HA
& 3))
13579 case R_PPC64_LO_DS_OPT
:
13580 insn
= bfd_get_32 (output_bfd
, contents
+ rel
->r_offset
- d_offset
);
13581 if ((insn
& (0x3f << 26)) != 58u << 26)
13583 insn
+= (14u << 26) - (58u << 26);
13584 bfd_put_32 (output_bfd
, insn
, contents
+ rel
->r_offset
- d_offset
);
13585 r_type
= R_PPC64_TOC16_LO
;
13586 rel
->r_info
= ELF64_R_INFO (r_symndx
, r_type
);
13589 case R_PPC64_TOC16
:
13590 case R_PPC64_TOC16_LO
:
13591 case R_PPC64_TOC16_DS
:
13592 case R_PPC64_TOC16_LO_DS
:
13594 /* Check for toc tls entries. */
13595 unsigned char *toc_tls
;
13598 retval
= get_tls_mask (&toc_tls
, &toc_symndx
, &toc_addend
,
13599 &local_syms
, rel
, input_bfd
);
13605 tls_mask
= *toc_tls
;
13606 if (r_type
== R_PPC64_TOC16_DS
13607 || r_type
== R_PPC64_TOC16_LO_DS
)
13610 && (tls_mask
& (TLS_DTPREL
| TLS_TPREL
)) == 0)
13615 /* If we found a GD reloc pair, then we might be
13616 doing a GD->IE transition. */
13619 tls_gd
= TLS_TPRELGD
;
13620 if (tls_mask
!= 0 && (tls_mask
& TLS_GD
) == 0)
13623 else if (retval
== 3)
13625 if (tls_mask
!= 0 && (tls_mask
& TLS_LD
) == 0)
13633 case R_PPC64_GOT_TPREL16_HI
:
13634 case R_PPC64_GOT_TPREL16_HA
:
13636 && (tls_mask
& TLS_TPREL
) == 0)
13638 rel
->r_offset
-= d_offset
;
13639 bfd_put_32 (output_bfd
, NOP
, contents
+ rel
->r_offset
);
13640 r_type
= R_PPC64_NONE
;
13641 rel
->r_info
= ELF64_R_INFO (r_symndx
, r_type
);
13645 case R_PPC64_GOT_TPREL16_DS
:
13646 case R_PPC64_GOT_TPREL16_LO_DS
:
13648 && (tls_mask
& TLS_TPREL
) == 0)
13651 insn
= bfd_get_32 (output_bfd
,
13652 contents
+ rel
->r_offset
- d_offset
);
13654 insn
|= 0x3c0d0000; /* addis 0,13,0 */
13655 bfd_put_32 (output_bfd
, insn
,
13656 contents
+ rel
->r_offset
- d_offset
);
13657 r_type
= R_PPC64_TPREL16_HA
;
13658 if (toc_symndx
!= 0)
13660 rel
->r_info
= ELF64_R_INFO (toc_symndx
, r_type
);
13661 rel
->r_addend
= toc_addend
;
13662 /* We changed the symbol. Start over in order to
13663 get h, sym, sec etc. right. */
13667 rel
->r_info
= ELF64_R_INFO (r_symndx
, r_type
);
13673 && (tls_mask
& TLS_TPREL
) == 0)
13675 insn
= bfd_get_32 (output_bfd
, contents
+ rel
->r_offset
);
13676 insn
= _bfd_elf_ppc_at_tls_transform (insn
, 13);
13679 bfd_put_32 (output_bfd
, insn
, contents
+ rel
->r_offset
);
13680 /* Was PPC64_TLS which sits on insn boundary, now
13681 PPC64_TPREL16_LO which is at low-order half-word. */
13682 rel
->r_offset
+= d_offset
;
13683 r_type
= R_PPC64_TPREL16_LO
;
13684 if (toc_symndx
!= 0)
13686 rel
->r_info
= ELF64_R_INFO (toc_symndx
, r_type
);
13687 rel
->r_addend
= toc_addend
;
13688 /* We changed the symbol. Start over in order to
13689 get h, sym, sec etc. right. */
13693 rel
->r_info
= ELF64_R_INFO (r_symndx
, r_type
);
13697 case R_PPC64_GOT_TLSGD16_HI
:
13698 case R_PPC64_GOT_TLSGD16_HA
:
13699 tls_gd
= TLS_TPRELGD
;
13700 if (tls_mask
!= 0 && (tls_mask
& TLS_GD
) == 0)
13704 case R_PPC64_GOT_TLSLD16_HI
:
13705 case R_PPC64_GOT_TLSLD16_HA
:
13706 if (tls_mask
!= 0 && (tls_mask
& TLS_LD
) == 0)
13709 if ((tls_mask
& tls_gd
) != 0)
13710 r_type
= (((r_type
- (R_PPC64_GOT_TLSGD16
& 3)) & 3)
13711 + R_PPC64_GOT_TPREL16_DS
);
13714 rel
->r_offset
-= d_offset
;
13715 bfd_put_32 (output_bfd
, NOP
, contents
+ rel
->r_offset
);
13716 r_type
= R_PPC64_NONE
;
13718 rel
->r_info
= ELF64_R_INFO (r_symndx
, r_type
);
13722 case R_PPC64_GOT_TLSGD16
:
13723 case R_PPC64_GOT_TLSGD16_LO
:
13724 tls_gd
= TLS_TPRELGD
;
13725 if (tls_mask
!= 0 && (tls_mask
& TLS_GD
) == 0)
13729 case R_PPC64_GOT_TLSLD16
:
13730 case R_PPC64_GOT_TLSLD16_LO
:
13731 if (tls_mask
!= 0 && (tls_mask
& TLS_LD
) == 0)
13733 unsigned int insn1
, insn2
, insn3
;
13737 offset
= (bfd_vma
) -1;
13738 /* If not using the newer R_PPC64_TLSGD/LD to mark
13739 __tls_get_addr calls, we must trust that the call
13740 stays with its arg setup insns, ie. that the next
13741 reloc is the __tls_get_addr call associated with
13742 the current reloc. Edit both insns. */
13743 if (input_section
->has_tls_get_addr_call
13744 && rel
+ 1 < relend
13745 && branch_reloc_hash_match (input_bfd
, rel
+ 1,
13746 htab
->tls_get_addr
,
13747 htab
->tls_get_addr_fd
))
13748 offset
= rel
[1].r_offset
;
13749 /* We read the low GOT_TLS (or TOC16) insn because we
13750 need to keep the destination reg. It may be
13751 something other than the usual r3, and moved to r3
13752 before the call by intervening code. */
13753 insn1
= bfd_get_32 (output_bfd
,
13754 contents
+ rel
->r_offset
- d_offset
);
13755 if ((tls_mask
& tls_gd
) != 0)
13758 insn1
&= (0x1f << 21) | (0x1f << 16);
13759 insn1
|= 58 << 26; /* ld */
13760 insn2
= 0x7c636a14; /* add 3,3,13 */
13761 if (offset
!= (bfd_vma
) -1)
13762 rel
[1].r_info
= ELF64_R_INFO (STN_UNDEF
, R_PPC64_NONE
);
13763 if ((tls_mask
& TLS_EXPLICIT
) == 0)
13764 r_type
= (((r_type
- (R_PPC64_GOT_TLSGD16
& 3)) & 3)
13765 + R_PPC64_GOT_TPREL16_DS
);
13767 r_type
+= R_PPC64_TOC16_DS
- R_PPC64_TOC16
;
13768 rel
->r_info
= ELF64_R_INFO (r_symndx
, r_type
);
13773 insn1
&= 0x1f << 21;
13774 insn1
|= 0x3c0d0000; /* addis r,13,0 */
13775 insn2
= 0x38630000; /* addi 3,3,0 */
13778 /* Was an LD reloc. */
13780 sec
= local_sections
[toc_symndx
];
13782 r_symndx
< symtab_hdr
->sh_info
;
13784 if (local_sections
[r_symndx
] == sec
)
13786 if (r_symndx
>= symtab_hdr
->sh_info
)
13787 r_symndx
= STN_UNDEF
;
13788 rel
->r_addend
= htab
->elf
.tls_sec
->vma
+ DTP_OFFSET
;
13789 if (r_symndx
!= STN_UNDEF
)
13790 rel
->r_addend
-= (local_syms
[r_symndx
].st_value
13791 + sec
->output_offset
13792 + sec
->output_section
->vma
);
13794 else if (toc_symndx
!= 0)
13796 r_symndx
= toc_symndx
;
13797 rel
->r_addend
= toc_addend
;
13799 r_type
= R_PPC64_TPREL16_HA
;
13800 rel
->r_info
= ELF64_R_INFO (r_symndx
, r_type
);
13801 if (offset
!= (bfd_vma
) -1)
13803 rel
[1].r_info
= ELF64_R_INFO (r_symndx
,
13804 R_PPC64_TPREL16_LO
);
13805 rel
[1].r_offset
= offset
+ d_offset
;
13806 rel
[1].r_addend
= rel
->r_addend
;
13809 bfd_put_32 (output_bfd
, insn1
,
13810 contents
+ rel
->r_offset
- d_offset
);
13811 if (offset
!= (bfd_vma
) -1)
13813 insn3
= bfd_get_32 (output_bfd
,
13814 contents
+ offset
+ 4);
13816 || insn3
== CROR_151515
|| insn3
== CROR_313131
)
13818 rel
[1].r_offset
+= 4;
13819 bfd_put_32 (output_bfd
, insn2
, contents
+ offset
+ 4);
13822 bfd_put_32 (output_bfd
, insn2
, contents
+ offset
);
13824 if ((tls_mask
& tls_gd
) == 0
13825 && (tls_gd
== 0 || toc_symndx
!= 0))
13827 /* We changed the symbol. Start over in order
13828 to get h, sym, sec etc. right. */
13834 case R_PPC64_TLSGD
:
13835 if (tls_mask
!= 0 && (tls_mask
& TLS_GD
) == 0)
13837 unsigned int insn2
, insn3
;
13838 bfd_vma offset
= rel
->r_offset
;
13840 if ((tls_mask
& TLS_TPRELGD
) != 0)
13843 r_type
= R_PPC64_NONE
;
13844 insn2
= 0x7c636a14; /* add 3,3,13 */
13849 if (toc_symndx
!= 0)
13851 r_symndx
= toc_symndx
;
13852 rel
->r_addend
= toc_addend
;
13854 r_type
= R_PPC64_TPREL16_LO
;
13855 rel
->r_offset
= offset
+ d_offset
;
13856 insn2
= 0x38630000; /* addi 3,3,0 */
13858 rel
->r_info
= ELF64_R_INFO (r_symndx
, r_type
);
13859 /* Zap the reloc on the _tls_get_addr call too. */
13860 BFD_ASSERT (offset
== rel
[1].r_offset
);
13861 rel
[1].r_info
= ELF64_R_INFO (STN_UNDEF
, R_PPC64_NONE
);
13862 insn3
= bfd_get_32 (output_bfd
,
13863 contents
+ offset
+ 4);
13865 || insn3
== CROR_151515
|| insn3
== CROR_313131
)
13867 rel
->r_offset
+= 4;
13868 bfd_put_32 (output_bfd
, insn2
, contents
+ offset
+ 4);
13871 bfd_put_32 (output_bfd
, insn2
, contents
+ offset
);
13872 if ((tls_mask
& TLS_TPRELGD
) == 0 && toc_symndx
!= 0)
13877 case R_PPC64_TLSLD
:
13878 if (tls_mask
!= 0 && (tls_mask
& TLS_LD
) == 0)
13880 unsigned int insn2
, insn3
;
13881 bfd_vma offset
= rel
->r_offset
;
13884 sec
= local_sections
[toc_symndx
];
13886 r_symndx
< symtab_hdr
->sh_info
;
13888 if (local_sections
[r_symndx
] == sec
)
13890 if (r_symndx
>= symtab_hdr
->sh_info
)
13891 r_symndx
= STN_UNDEF
;
13892 rel
->r_addend
= htab
->elf
.tls_sec
->vma
+ DTP_OFFSET
;
13893 if (r_symndx
!= STN_UNDEF
)
13894 rel
->r_addend
-= (local_syms
[r_symndx
].st_value
13895 + sec
->output_offset
13896 + sec
->output_section
->vma
);
13898 r_type
= R_PPC64_TPREL16_LO
;
13899 rel
->r_info
= ELF64_R_INFO (r_symndx
, r_type
);
13900 rel
->r_offset
= offset
+ d_offset
;
13901 /* Zap the reloc on the _tls_get_addr call too. */
13902 BFD_ASSERT (offset
== rel
[1].r_offset
);
13903 rel
[1].r_info
= ELF64_R_INFO (STN_UNDEF
, R_PPC64_NONE
);
13904 insn2
= 0x38630000; /* addi 3,3,0 */
13905 insn3
= bfd_get_32 (output_bfd
,
13906 contents
+ offset
+ 4);
13908 || insn3
== CROR_151515
|| insn3
== CROR_313131
)
13910 rel
->r_offset
+= 4;
13911 bfd_put_32 (output_bfd
, insn2
, contents
+ offset
+ 4);
13914 bfd_put_32 (output_bfd
, insn2
, contents
+ offset
);
13919 case R_PPC64_DTPMOD64
:
13920 if (rel
+ 1 < relend
13921 && rel
[1].r_info
== ELF64_R_INFO (r_symndx
, R_PPC64_DTPREL64
)
13922 && rel
[1].r_offset
== rel
->r_offset
+ 8)
13924 if ((tls_mask
& TLS_GD
) == 0)
13926 rel
[1].r_info
= ELF64_R_INFO (r_symndx
, R_PPC64_NONE
);
13927 if ((tls_mask
& TLS_TPRELGD
) != 0)
13928 r_type
= R_PPC64_TPREL64
;
13931 bfd_put_64 (output_bfd
, 1, contents
+ rel
->r_offset
);
13932 r_type
= R_PPC64_NONE
;
13934 rel
->r_info
= ELF64_R_INFO (r_symndx
, r_type
);
13939 if ((tls_mask
& TLS_LD
) == 0)
13941 bfd_put_64 (output_bfd
, 1, contents
+ rel
->r_offset
);
13942 r_type
= R_PPC64_NONE
;
13943 rel
->r_info
= ELF64_R_INFO (r_symndx
, r_type
);
13948 case R_PPC64_TPREL64
:
13949 if ((tls_mask
& TLS_TPREL
) == 0)
13951 r_type
= R_PPC64_NONE
;
13952 rel
->r_info
= ELF64_R_INFO (r_symndx
, r_type
);
13956 case R_PPC64_ENTRY
:
13957 relocation
= TOCstart
+ htab
->sec_info
[input_section
->id
].toc_off
;
13958 if (!bfd_link_pic (info
)
13959 && !info
->traditional_format
13960 && relocation
+ 0x80008000 <= 0xffffffff)
13962 unsigned int insn1
, insn2
;
13964 insn1
= bfd_get_32 (input_bfd
, contents
+ rel
->r_offset
);
13965 insn2
= bfd_get_32 (input_bfd
, contents
+ rel
->r_offset
+ 4);
13966 if ((insn1
& ~0xfffc) == LD_R2_0R12
13967 && insn2
== ADD_R2_R2_R12
)
13969 bfd_put_32 (output_bfd
,
13970 LIS_R2
+ PPC_HA (relocation
),
13971 contents
+ rel
->r_offset
);
13972 bfd_put_32 (output_bfd
,
13973 ADDI_R2_R2
+ PPC_LO (relocation
),
13974 contents
+ rel
->r_offset
+ 4);
13979 relocation
-= (rel
->r_offset
13980 + input_section
->output_offset
13981 + input_section
->output_section
->vma
);
13982 if (relocation
+ 0x80008000 <= 0xffffffff)
13984 unsigned int insn1
, insn2
;
13986 insn1
= bfd_get_32 (input_bfd
, contents
+ rel
->r_offset
);
13987 insn2
= bfd_get_32 (input_bfd
, contents
+ rel
->r_offset
+ 4);
13988 if ((insn1
& ~0xfffc) == LD_R2_0R12
13989 && insn2
== ADD_R2_R2_R12
)
13991 bfd_put_32 (output_bfd
,
13992 ADDIS_R2_R12
+ PPC_HA (relocation
),
13993 contents
+ rel
->r_offset
);
13994 bfd_put_32 (output_bfd
,
13995 ADDI_R2_R2
+ PPC_LO (relocation
),
13996 contents
+ rel
->r_offset
+ 4);
14002 case R_PPC64_REL16_HA
:
14003 /* If we are generating a non-PIC executable, edit
14004 . 0: addis 2,12,.TOC.-0b@ha
14005 . addi 2,2,.TOC.-0b@l
14006 used by ELFv2 global entry points to set up r2, to
14009 if .TOC. is in range. */
14010 if (!bfd_link_pic (info
)
14011 && !info
->traditional_format
14013 && rel
->r_addend
== d_offset
14014 && h
!= NULL
&& &h
->elf
== htab
->elf
.hgot
14015 && rel
+ 1 < relend
14016 && rel
[1].r_info
== ELF64_R_INFO (r_symndx
, R_PPC64_REL16_LO
)
14017 && rel
[1].r_offset
== rel
->r_offset
+ 4
14018 && rel
[1].r_addend
== rel
->r_addend
+ 4
14019 && relocation
+ 0x80008000 <= 0xffffffff)
14021 unsigned int insn1
, insn2
;
14022 bfd_vma offset
= rel
->r_offset
- d_offset
;
14023 insn1
= bfd_get_32 (output_bfd
, contents
+ offset
);
14024 insn2
= bfd_get_32 (output_bfd
, contents
+ offset
+ 4);
14025 if ((insn1
& 0xffff0000) == ADDIS_R2_R12
14026 && (insn2
& 0xffff0000) == ADDI_R2_R2
)
14028 r_type
= R_PPC64_ADDR16_HA
;
14029 rel
->r_info
= ELF64_R_INFO (r_symndx
, r_type
);
14030 rel
->r_addend
-= d_offset
;
14031 rel
[1].r_info
= ELF64_R_INFO (r_symndx
, R_PPC64_ADDR16_LO
);
14032 rel
[1].r_addend
-= d_offset
+ 4;
14033 bfd_put_32 (output_bfd
, LIS_R2
, contents
+ offset
);
14039 /* Handle other relocations that tweak non-addend part of insn. */
14041 max_br_offset
= 1 << 25;
14042 addend
= rel
->r_addend
;
14043 reloc_dest
= DEST_NORMAL
;
14049 case R_PPC64_TOCSAVE
:
14050 if (relocation
+ addend
== (rel
->r_offset
14051 + input_section
->output_offset
14052 + input_section
->output_section
->vma
)
14053 && tocsave_find (htab
, NO_INSERT
,
14054 &local_syms
, rel
, input_bfd
))
14056 insn
= bfd_get_32 (input_bfd
, contents
+ rel
->r_offset
);
14058 || insn
== CROR_151515
|| insn
== CROR_313131
)
14059 bfd_put_32 (input_bfd
,
14060 STD_R2_0R1
+ STK_TOC (htab
),
14061 contents
+ rel
->r_offset
);
14065 /* Branch taken prediction relocations. */
14066 case R_PPC64_ADDR14_BRTAKEN
:
14067 case R_PPC64_REL14_BRTAKEN
:
14068 insn
= 0x01 << 21; /* 'y' or 't' bit, lowest bit of BO field. */
14071 /* Branch not taken prediction relocations. */
14072 case R_PPC64_ADDR14_BRNTAKEN
:
14073 case R_PPC64_REL14_BRNTAKEN
:
14074 insn
|= bfd_get_32 (output_bfd
,
14075 contents
+ rel
->r_offset
) & ~(0x01 << 21);
14078 case R_PPC64_REL14
:
14079 max_br_offset
= 1 << 15;
14082 case R_PPC64_REL24
:
14083 /* Calls to functions with a different TOC, such as calls to
14084 shared objects, need to alter the TOC pointer. This is
14085 done using a linkage stub. A REL24 branching to these
14086 linkage stubs needs to be followed by a nop, as the nop
14087 will be replaced with an instruction to restore the TOC
14092 && h
->oh
->is_func_descriptor
)
14093 fdh
= ppc_follow_link (h
->oh
);
14094 stub_entry
= ppc_get_stub_entry (input_section
, sec
, fdh
, &orig_rel
,
14096 if (stub_entry
!= NULL
14097 && (stub_entry
->stub_type
== ppc_stub_plt_call
14098 || stub_entry
->stub_type
== ppc_stub_plt_call_r2save
14099 || stub_entry
->stub_type
== ppc_stub_plt_branch_r2off
14100 || stub_entry
->stub_type
== ppc_stub_long_branch_r2off
))
14102 bfd_boolean can_plt_call
= FALSE
;
14104 /* All of these stubs will modify r2, so there must be a
14105 branch and link followed by a nop. The nop is
14106 replaced by an insn to restore r2. */
14107 if (rel
->r_offset
+ 8 <= input_section
->size
)
14111 br
= bfd_get_32 (input_bfd
,
14112 contents
+ rel
->r_offset
);
14117 nop
= bfd_get_32 (input_bfd
,
14118 contents
+ rel
->r_offset
+ 4);
14120 || nop
== CROR_151515
|| nop
== CROR_313131
)
14123 && (h
== htab
->tls_get_addr_fd
14124 || h
== htab
->tls_get_addr
)
14125 && htab
->params
->tls_get_addr_opt
)
14127 /* Special stub used, leave nop alone. */
14130 bfd_put_32 (input_bfd
,
14131 LD_R2_0R1
+ STK_TOC (htab
),
14132 contents
+ rel
->r_offset
+ 4);
14133 can_plt_call
= TRUE
;
14138 if (!can_plt_call
&& h
!= NULL
)
14140 const char *name
= h
->elf
.root
.root
.string
;
14145 if (strncmp (name
, "__libc_start_main", 17) == 0
14146 && (name
[17] == 0 || name
[17] == '@'))
14148 /* Allow crt1 branch to go via a toc adjusting
14149 stub. Other calls that never return could do
14150 the same, if we could detect such. */
14151 can_plt_call
= TRUE
;
14157 /* g++ as of 20130507 emits self-calls without a
14158 following nop. This is arguably wrong since we
14159 have conflicting information. On the one hand a
14160 global symbol and on the other a local call
14161 sequence, but don't error for this special case.
14162 It isn't possible to cheaply verify we have
14163 exactly such a call. Allow all calls to the same
14165 asection
*code_sec
= sec
;
14167 if (get_opd_info (sec
) != NULL
)
14169 bfd_vma off
= (relocation
+ addend
14170 - sec
->output_section
->vma
14171 - sec
->output_offset
);
14173 opd_entry_value (sec
, off
, &code_sec
, NULL
, FALSE
);
14175 if (code_sec
== input_section
)
14176 can_plt_call
= TRUE
;
14181 if (stub_entry
->stub_type
== ppc_stub_plt_call
14182 || stub_entry
->stub_type
== ppc_stub_plt_call_r2save
)
14183 info
->callbacks
->einfo
14184 (_("%P: %H: call to `%T' lacks nop, can't restore toc; "
14185 "recompile with -fPIC\n"),
14186 input_bfd
, input_section
, rel
->r_offset
, sym_name
);
14188 info
->callbacks
->einfo
14189 (_("%P: %H: call to `%T' lacks nop, can't restore toc; "
14190 "(-mcmodel=small toc adjust stub)\n"),
14191 input_bfd
, input_section
, rel
->r_offset
, sym_name
);
14193 bfd_set_error (bfd_error_bad_value
);
14198 && (stub_entry
->stub_type
== ppc_stub_plt_call
14199 || stub_entry
->stub_type
== ppc_stub_plt_call_r2save
))
14200 unresolved_reloc
= FALSE
;
14203 if ((stub_entry
== NULL
14204 || stub_entry
->stub_type
== ppc_stub_long_branch
14205 || stub_entry
->stub_type
== ppc_stub_plt_branch
)
14206 && get_opd_info (sec
) != NULL
)
14208 /* The branch destination is the value of the opd entry. */
14209 bfd_vma off
= (relocation
+ addend
14210 - sec
->output_section
->vma
14211 - sec
->output_offset
);
14212 bfd_vma dest
= opd_entry_value (sec
, off
, NULL
, NULL
, FALSE
);
14213 if (dest
!= (bfd_vma
) -1)
14217 reloc_dest
= DEST_OPD
;
14221 /* If the branch is out of reach we ought to have a long
14223 from
= (rel
->r_offset
14224 + input_section
->output_offset
14225 + input_section
->output_section
->vma
);
14227 relocation
+= PPC64_LOCAL_ENTRY_OFFSET (fdh
14231 if (stub_entry
!= NULL
14232 && (stub_entry
->stub_type
== ppc_stub_long_branch
14233 || stub_entry
->stub_type
== ppc_stub_plt_branch
)
14234 && (r_type
== R_PPC64_ADDR14_BRTAKEN
14235 || r_type
== R_PPC64_ADDR14_BRNTAKEN
14236 || (relocation
+ addend
- from
+ max_br_offset
14237 < 2 * max_br_offset
)))
14238 /* Don't use the stub if this branch is in range. */
14241 if (stub_entry
!= NULL
)
14243 /* Munge up the value and addend so that we call the stub
14244 rather than the procedure directly. */
14245 asection
*stub_sec
= stub_entry
->group
->stub_sec
;
14247 if (stub_entry
->stub_type
== ppc_stub_save_res
)
14248 relocation
+= (stub_sec
->output_offset
14249 + stub_sec
->output_section
->vma
14250 + stub_sec
->size
- htab
->sfpr
->size
14251 - htab
->sfpr
->output_offset
14252 - htab
->sfpr
->output_section
->vma
);
14254 relocation
= (stub_entry
->stub_offset
14255 + stub_sec
->output_offset
14256 + stub_sec
->output_section
->vma
);
14258 reloc_dest
= DEST_STUB
;
14260 if ((stub_entry
->stub_type
== ppc_stub_plt_call
14261 || stub_entry
->stub_type
== ppc_stub_plt_call_r2save
)
14262 && (ALWAYS_EMIT_R2SAVE
14263 || stub_entry
->stub_type
== ppc_stub_plt_call_r2save
)
14264 && rel
+ 1 < relend
14265 && rel
[1].r_offset
== rel
->r_offset
+ 4
14266 && ELF64_R_TYPE (rel
[1].r_info
) == R_PPC64_TOCSAVE
)
14274 /* Set 'a' bit. This is 0b00010 in BO field for branch
14275 on CR(BI) insns (BO == 001at or 011at), and 0b01000
14276 for branch on CTR insns (BO == 1a00t or 1a01t). */
14277 if ((insn
& (0x14 << 21)) == (0x04 << 21))
14278 insn
|= 0x02 << 21;
14279 else if ((insn
& (0x14 << 21)) == (0x10 << 21))
14280 insn
|= 0x08 << 21;
14286 /* Invert 'y' bit if not the default. */
14287 if ((bfd_signed_vma
) (relocation
+ addend
- from
) < 0)
14288 insn
^= 0x01 << 21;
14291 bfd_put_32 (output_bfd
, insn
, contents
+ rel
->r_offset
);
14294 /* NOP out calls to undefined weak functions.
14295 We can thus call a weak function without first
14296 checking whether the function is defined. */
14298 && h
->elf
.root
.type
== bfd_link_hash_undefweak
14299 && h
->elf
.dynindx
== -1
14300 && r_type
== R_PPC64_REL24
14304 bfd_put_32 (output_bfd
, NOP
, contents
+ rel
->r_offset
);
14310 /* Set `addend'. */
14315 info
->callbacks
->einfo
14316 (_("%P: %B: unknown relocation type %d for `%T'\n"),
14317 input_bfd
, (int) r_type
, sym_name
);
14319 bfd_set_error (bfd_error_bad_value
);
14325 case R_PPC64_TLSGD
:
14326 case R_PPC64_TLSLD
:
14327 case R_PPC64_TOCSAVE
:
14328 case R_PPC64_GNU_VTINHERIT
:
14329 case R_PPC64_GNU_VTENTRY
:
14330 case R_PPC64_ENTRY
:
14333 /* GOT16 relocations. Like an ADDR16 using the symbol's
14334 address in the GOT as relocation value instead of the
14335 symbol's value itself. Also, create a GOT entry for the
14336 symbol and put the symbol value there. */
14337 case R_PPC64_GOT_TLSGD16
:
14338 case R_PPC64_GOT_TLSGD16_LO
:
14339 case R_PPC64_GOT_TLSGD16_HI
:
14340 case R_PPC64_GOT_TLSGD16_HA
:
14341 tls_type
= TLS_TLS
| TLS_GD
;
14344 case R_PPC64_GOT_TLSLD16
:
14345 case R_PPC64_GOT_TLSLD16_LO
:
14346 case R_PPC64_GOT_TLSLD16_HI
:
14347 case R_PPC64_GOT_TLSLD16_HA
:
14348 tls_type
= TLS_TLS
| TLS_LD
;
14351 case R_PPC64_GOT_TPREL16_DS
:
14352 case R_PPC64_GOT_TPREL16_LO_DS
:
14353 case R_PPC64_GOT_TPREL16_HI
:
14354 case R_PPC64_GOT_TPREL16_HA
:
14355 tls_type
= TLS_TLS
| TLS_TPREL
;
14358 case R_PPC64_GOT_DTPREL16_DS
:
14359 case R_PPC64_GOT_DTPREL16_LO_DS
:
14360 case R_PPC64_GOT_DTPREL16_HI
:
14361 case R_PPC64_GOT_DTPREL16_HA
:
14362 tls_type
= TLS_TLS
| TLS_DTPREL
;
14365 case R_PPC64_GOT16
:
14366 case R_PPC64_GOT16_LO
:
14367 case R_PPC64_GOT16_HI
:
14368 case R_PPC64_GOT16_HA
:
14369 case R_PPC64_GOT16_DS
:
14370 case R_PPC64_GOT16_LO_DS
:
14373 /* Relocation is to the entry for this symbol in the global
14378 unsigned long indx
= 0;
14379 struct got_entry
*ent
;
14381 if (tls_type
== (TLS_TLS
| TLS_LD
)
14383 || !h
->elf
.def_dynamic
))
14384 ent
= ppc64_tlsld_got (input_bfd
);
14390 bfd_boolean dyn
= htab
->elf
.dynamic_sections_created
;
14391 if (!WILL_CALL_FINISH_DYNAMIC_SYMBOL (dyn
, bfd_link_pic (info
),
14393 || (bfd_link_pic (info
)
14394 && SYMBOL_REFERENCES_LOCAL (info
, &h
->elf
)))
14395 /* This is actually a static link, or it is a
14396 -Bsymbolic link and the symbol is defined
14397 locally, or the symbol was forced to be local
14398 because of a version file. */
14402 BFD_ASSERT (h
->elf
.dynindx
!= -1);
14403 indx
= h
->elf
.dynindx
;
14404 unresolved_reloc
= FALSE
;
14406 ent
= h
->elf
.got
.glist
;
14410 if (local_got_ents
== NULL
)
14412 ent
= local_got_ents
[r_symndx
];
14415 for (; ent
!= NULL
; ent
= ent
->next
)
14416 if (ent
->addend
== orig_rel
.r_addend
14417 && ent
->owner
== input_bfd
14418 && ent
->tls_type
== tls_type
)
14424 if (ent
->is_indirect
)
14425 ent
= ent
->got
.ent
;
14426 offp
= &ent
->got
.offset
;
14427 got
= ppc64_elf_tdata (ent
->owner
)->got
;
14431 /* The offset must always be a multiple of 8. We use the
14432 least significant bit to record whether we have already
14433 processed this entry. */
14435 if ((off
& 1) != 0)
14439 /* Generate relocs for the dynamic linker, except in
14440 the case of TLSLD where we'll use one entry per
14448 ? h
->elf
.type
== STT_GNU_IFUNC
14449 : ELF_ST_TYPE (sym
->st_info
) == STT_GNU_IFUNC
);
14451 relgot
= htab
->elf
.irelplt
;
14452 else if ((bfd_link_pic (info
) || indx
!= 0)
14454 || (tls_type
== (TLS_TLS
| TLS_LD
)
14455 && !h
->elf
.def_dynamic
)
14456 || ELF_ST_VISIBILITY (h
->elf
.other
) == STV_DEFAULT
14457 || h
->elf
.root
.type
!= bfd_link_hash_undefweak
))
14458 relgot
= ppc64_elf_tdata (ent
->owner
)->relgot
;
14459 if (relgot
!= NULL
)
14461 outrel
.r_offset
= (got
->output_section
->vma
14462 + got
->output_offset
14464 outrel
.r_addend
= addend
;
14465 if (tls_type
& (TLS_LD
| TLS_GD
))
14467 outrel
.r_addend
= 0;
14468 outrel
.r_info
= ELF64_R_INFO (indx
, R_PPC64_DTPMOD64
);
14469 if (tls_type
== (TLS_TLS
| TLS_GD
))
14471 loc
= relgot
->contents
;
14472 loc
+= (relgot
->reloc_count
++
14473 * sizeof (Elf64_External_Rela
));
14474 bfd_elf64_swap_reloca_out (output_bfd
,
14476 outrel
.r_offset
+= 8;
14477 outrel
.r_addend
= addend
;
14479 = ELF64_R_INFO (indx
, R_PPC64_DTPREL64
);
14482 else if (tls_type
== (TLS_TLS
| TLS_DTPREL
))
14483 outrel
.r_info
= ELF64_R_INFO (indx
, R_PPC64_DTPREL64
);
14484 else if (tls_type
== (TLS_TLS
| TLS_TPREL
))
14485 outrel
.r_info
= ELF64_R_INFO (indx
, R_PPC64_TPREL64
);
14486 else if (indx
!= 0)
14487 outrel
.r_info
= ELF64_R_INFO (indx
, R_PPC64_GLOB_DAT
);
14491 outrel
.r_info
= ELF64_R_INFO (0, R_PPC64_IRELATIVE
);
14493 outrel
.r_info
= ELF64_R_INFO (0, R_PPC64_RELATIVE
);
14495 /* Write the .got section contents for the sake
14497 loc
= got
->contents
+ off
;
14498 bfd_put_64 (output_bfd
, outrel
.r_addend
+ relocation
,
14502 if (indx
== 0 && tls_type
!= (TLS_TLS
| TLS_LD
))
14504 outrel
.r_addend
+= relocation
;
14505 if (tls_type
& (TLS_GD
| TLS_DTPREL
| TLS_TPREL
))
14507 if (htab
->elf
.tls_sec
== NULL
)
14508 outrel
.r_addend
= 0;
14510 outrel
.r_addend
-= htab
->elf
.tls_sec
->vma
;
14513 loc
= relgot
->contents
;
14514 loc
+= (relgot
->reloc_count
++
14515 * sizeof (Elf64_External_Rela
));
14516 bfd_elf64_swap_reloca_out (output_bfd
, &outrel
, loc
);
14519 /* Init the .got section contents here if we're not
14520 emitting a reloc. */
14523 relocation
+= addend
;
14524 if (tls_type
== (TLS_TLS
| TLS_LD
))
14526 else if (tls_type
!= 0)
14528 if (htab
->elf
.tls_sec
== NULL
)
14532 relocation
-= htab
->elf
.tls_sec
->vma
+ DTP_OFFSET
;
14533 if (tls_type
== (TLS_TLS
| TLS_TPREL
))
14534 relocation
+= DTP_OFFSET
- TP_OFFSET
;
14537 if (tls_type
== (TLS_TLS
| TLS_GD
))
14539 bfd_put_64 (output_bfd
, relocation
,
14540 got
->contents
+ off
+ 8);
14545 bfd_put_64 (output_bfd
, relocation
,
14546 got
->contents
+ off
);
14550 if (off
>= (bfd_vma
) -2)
14553 relocation
= got
->output_section
->vma
+ got
->output_offset
+ off
;
14554 addend
= -(TOCstart
+ htab
->sec_info
[input_section
->id
].toc_off
);
14558 case R_PPC64_PLT16_HA
:
14559 case R_PPC64_PLT16_HI
:
14560 case R_PPC64_PLT16_LO
:
14561 case R_PPC64_PLT32
:
14562 case R_PPC64_PLT64
:
14563 /* Relocation is to the entry for this symbol in the
14564 procedure linkage table. */
14566 struct plt_entry
**plt_list
= NULL
;
14568 plt_list
= &h
->elf
.plt
.plist
;
14569 else if (local_got_ents
!= NULL
)
14571 struct plt_entry
**local_plt
= (struct plt_entry
**)
14572 (local_got_ents
+ symtab_hdr
->sh_info
);
14573 unsigned char *local_got_tls_masks
= (unsigned char *)
14574 (local_plt
+ symtab_hdr
->sh_info
);
14575 if ((local_got_tls_masks
[r_symndx
] & PLT_IFUNC
) != 0)
14576 plt_list
= local_plt
+ r_symndx
;
14580 struct plt_entry
*ent
;
14582 for (ent
= *plt_list
; ent
!= NULL
; ent
= ent
->next
)
14583 if (ent
->plt
.offset
!= (bfd_vma
) -1
14584 && ent
->addend
== orig_rel
.r_addend
)
14588 plt
= htab
->elf
.splt
;
14589 if (!htab
->elf
.dynamic_sections_created
14591 || h
->elf
.dynindx
== -1)
14592 plt
= htab
->elf
.iplt
;
14593 relocation
= (plt
->output_section
->vma
14594 + plt
->output_offset
14595 + ent
->plt
.offset
);
14597 unresolved_reloc
= FALSE
;
14605 /* Relocation value is TOC base. */
14606 relocation
= TOCstart
;
14607 if (r_symndx
== STN_UNDEF
)
14608 relocation
+= htab
->sec_info
[input_section
->id
].toc_off
;
14609 else if (unresolved_reloc
)
14611 else if (sec
!= NULL
&& sec
->id
< htab
->sec_info_arr_size
)
14612 relocation
+= htab
->sec_info
[sec
->id
].toc_off
;
14614 unresolved_reloc
= TRUE
;
14617 /* TOC16 relocs. We want the offset relative to the TOC base,
14618 which is the address of the start of the TOC plus 0x8000.
14619 The TOC consists of sections .got, .toc, .tocbss, and .plt,
14621 case R_PPC64_TOC16
:
14622 case R_PPC64_TOC16_LO
:
14623 case R_PPC64_TOC16_HI
:
14624 case R_PPC64_TOC16_DS
:
14625 case R_PPC64_TOC16_LO_DS
:
14626 case R_PPC64_TOC16_HA
:
14627 addend
-= TOCstart
+ htab
->sec_info
[input_section
->id
].toc_off
;
14630 /* Relocate against the beginning of the section. */
14631 case R_PPC64_SECTOFF
:
14632 case R_PPC64_SECTOFF_LO
:
14633 case R_PPC64_SECTOFF_HI
:
14634 case R_PPC64_SECTOFF_DS
:
14635 case R_PPC64_SECTOFF_LO_DS
:
14636 case R_PPC64_SECTOFF_HA
:
14638 addend
-= sec
->output_section
->vma
;
14641 case R_PPC64_REL16
:
14642 case R_PPC64_REL16_LO
:
14643 case R_PPC64_REL16_HI
:
14644 case R_PPC64_REL16_HA
:
14645 case R_PPC64_REL16DX_HA
:
14648 case R_PPC64_REL14
:
14649 case R_PPC64_REL14_BRNTAKEN
:
14650 case R_PPC64_REL14_BRTAKEN
:
14651 case R_PPC64_REL24
:
14654 case R_PPC64_TPREL16
:
14655 case R_PPC64_TPREL16_LO
:
14656 case R_PPC64_TPREL16_HI
:
14657 case R_PPC64_TPREL16_HA
:
14658 case R_PPC64_TPREL16_DS
:
14659 case R_PPC64_TPREL16_LO_DS
:
14660 case R_PPC64_TPREL16_HIGH
:
14661 case R_PPC64_TPREL16_HIGHA
:
14662 case R_PPC64_TPREL16_HIGHER
:
14663 case R_PPC64_TPREL16_HIGHERA
:
14664 case R_PPC64_TPREL16_HIGHEST
:
14665 case R_PPC64_TPREL16_HIGHESTA
:
14667 && h
->elf
.root
.type
== bfd_link_hash_undefweak
14668 && h
->elf
.dynindx
== -1)
14670 /* Make this relocation against an undefined weak symbol
14671 resolve to zero. This is really just a tweak, since
14672 code using weak externs ought to check that they are
14673 defined before using them. */
14674 bfd_byte
*p
= contents
+ rel
->r_offset
- d_offset
;
14676 insn
= bfd_get_32 (output_bfd
, p
);
14677 insn
= _bfd_elf_ppc_at_tprel_transform (insn
, 13);
14679 bfd_put_32 (output_bfd
, insn
, p
);
14682 if (htab
->elf
.tls_sec
!= NULL
)
14683 addend
-= htab
->elf
.tls_sec
->vma
+ TP_OFFSET
;
14684 if (bfd_link_pic (info
))
14685 /* The TPREL16 relocs shouldn't really be used in shared
14686 libs as they will result in DT_TEXTREL being set, but
14687 support them anyway. */
14691 case R_PPC64_DTPREL16
:
14692 case R_PPC64_DTPREL16_LO
:
14693 case R_PPC64_DTPREL16_HI
:
14694 case R_PPC64_DTPREL16_HA
:
14695 case R_PPC64_DTPREL16_DS
:
14696 case R_PPC64_DTPREL16_LO_DS
:
14697 case R_PPC64_DTPREL16_HIGH
:
14698 case R_PPC64_DTPREL16_HIGHA
:
14699 case R_PPC64_DTPREL16_HIGHER
:
14700 case R_PPC64_DTPREL16_HIGHERA
:
14701 case R_PPC64_DTPREL16_HIGHEST
:
14702 case R_PPC64_DTPREL16_HIGHESTA
:
14703 if (htab
->elf
.tls_sec
!= NULL
)
14704 addend
-= htab
->elf
.tls_sec
->vma
+ DTP_OFFSET
;
14707 case R_PPC64_ADDR64_LOCAL
:
14708 addend
+= PPC64_LOCAL_ENTRY_OFFSET (h
!= NULL
14713 case R_PPC64_DTPMOD64
:
14718 case R_PPC64_TPREL64
:
14719 if (htab
->elf
.tls_sec
!= NULL
)
14720 addend
-= htab
->elf
.tls_sec
->vma
+ TP_OFFSET
;
14723 case R_PPC64_DTPREL64
:
14724 if (htab
->elf
.tls_sec
!= NULL
)
14725 addend
-= htab
->elf
.tls_sec
->vma
+ DTP_OFFSET
;
14728 /* Relocations that may need to be propagated if this is a
14730 case R_PPC64_REL30
:
14731 case R_PPC64_REL32
:
14732 case R_PPC64_REL64
:
14733 case R_PPC64_ADDR14
:
14734 case R_PPC64_ADDR14_BRNTAKEN
:
14735 case R_PPC64_ADDR14_BRTAKEN
:
14736 case R_PPC64_ADDR16
:
14737 case R_PPC64_ADDR16_DS
:
14738 case R_PPC64_ADDR16_HA
:
14739 case R_PPC64_ADDR16_HI
:
14740 case R_PPC64_ADDR16_HIGH
:
14741 case R_PPC64_ADDR16_HIGHA
:
14742 case R_PPC64_ADDR16_HIGHER
:
14743 case R_PPC64_ADDR16_HIGHERA
:
14744 case R_PPC64_ADDR16_HIGHEST
:
14745 case R_PPC64_ADDR16_HIGHESTA
:
14746 case R_PPC64_ADDR16_LO
:
14747 case R_PPC64_ADDR16_LO_DS
:
14748 case R_PPC64_ADDR24
:
14749 case R_PPC64_ADDR32
:
14750 case R_PPC64_ADDR64
:
14751 case R_PPC64_UADDR16
:
14752 case R_PPC64_UADDR32
:
14753 case R_PPC64_UADDR64
:
14755 if ((input_section
->flags
& SEC_ALLOC
) == 0)
14758 if (NO_OPD_RELOCS
&& is_opd
)
14761 if (bfd_link_pic (info
)
14762 ? ((h
!= NULL
&& pc_dynrelocs (h
))
14763 || must_be_dyn_reloc (info
, r_type
))
14765 ? h
->dyn_relocs
!= NULL
14766 : ELF_ST_TYPE (sym
->st_info
) == STT_GNU_IFUNC
))
14768 bfd_boolean skip
, relocate
;
14772 /* When generating a dynamic object, these relocations
14773 are copied into the output file to be resolved at run
14779 out_off
= _bfd_elf_section_offset (output_bfd
, info
,
14780 input_section
, rel
->r_offset
);
14781 if (out_off
== (bfd_vma
) -1)
14783 else if (out_off
== (bfd_vma
) -2)
14784 skip
= TRUE
, relocate
= TRUE
;
14785 out_off
+= (input_section
->output_section
->vma
14786 + input_section
->output_offset
);
14787 outrel
.r_offset
= out_off
;
14788 outrel
.r_addend
= rel
->r_addend
;
14790 /* Optimize unaligned reloc use. */
14791 if ((r_type
== R_PPC64_ADDR64
&& (out_off
& 7) != 0)
14792 || (r_type
== R_PPC64_UADDR64
&& (out_off
& 7) == 0))
14793 r_type
^= R_PPC64_ADDR64
^ R_PPC64_UADDR64
;
14794 else if ((r_type
== R_PPC64_ADDR32
&& (out_off
& 3) != 0)
14795 || (r_type
== R_PPC64_UADDR32
&& (out_off
& 3) == 0))
14796 r_type
^= R_PPC64_ADDR32
^ R_PPC64_UADDR32
;
14797 else if ((r_type
== R_PPC64_ADDR16
&& (out_off
& 1) != 0)
14798 || (r_type
== R_PPC64_UADDR16
&& (out_off
& 1) == 0))
14799 r_type
^= R_PPC64_ADDR16
^ R_PPC64_UADDR16
;
14802 memset (&outrel
, 0, sizeof outrel
);
14803 else if (!SYMBOL_REFERENCES_LOCAL (info
, &h
->elf
)
14805 && r_type
!= R_PPC64_TOC
)
14807 BFD_ASSERT (h
->elf
.dynindx
!= -1);
14808 outrel
.r_info
= ELF64_R_INFO (h
->elf
.dynindx
, r_type
);
14812 /* This symbol is local, or marked to become local,
14813 or this is an opd section reloc which must point
14814 at a local function. */
14815 outrel
.r_addend
+= relocation
;
14816 if (r_type
== R_PPC64_ADDR64
|| r_type
== R_PPC64_TOC
)
14818 if (is_opd
&& h
!= NULL
)
14820 /* Lie about opd entries. This case occurs
14821 when building shared libraries and we
14822 reference a function in another shared
14823 lib. The same thing happens for a weak
14824 definition in an application that's
14825 overridden by a strong definition in a
14826 shared lib. (I believe this is a generic
14827 bug in binutils handling of weak syms.)
14828 In these cases we won't use the opd
14829 entry in this lib. */
14830 unresolved_reloc
= FALSE
;
14833 && r_type
== R_PPC64_ADDR64
14835 ? h
->elf
.type
== STT_GNU_IFUNC
14836 : ELF_ST_TYPE (sym
->st_info
) == STT_GNU_IFUNC
))
14837 outrel
.r_info
= ELF64_R_INFO (0, R_PPC64_IRELATIVE
);
14840 outrel
.r_info
= ELF64_R_INFO (0, R_PPC64_RELATIVE
);
14842 /* We need to relocate .opd contents for ld.so.
14843 Prelink also wants simple and consistent rules
14844 for relocs. This make all RELATIVE relocs have
14845 *r_offset equal to r_addend. */
14854 ? h
->elf
.type
== STT_GNU_IFUNC
14855 : ELF_ST_TYPE (sym
->st_info
) == STT_GNU_IFUNC
)
14857 info
->callbacks
->einfo
14858 (_("%P: %H: %s for indirect "
14859 "function `%T' unsupported\n"),
14860 input_bfd
, input_section
, rel
->r_offset
,
14861 ppc64_elf_howto_table
[r_type
]->name
,
14865 else if (r_symndx
== STN_UNDEF
|| bfd_is_abs_section (sec
))
14867 else if (sec
== NULL
|| sec
->owner
== NULL
)
14869 bfd_set_error (bfd_error_bad_value
);
14876 osec
= sec
->output_section
;
14877 indx
= elf_section_data (osec
)->dynindx
;
14881 if ((osec
->flags
& SEC_READONLY
) == 0
14882 && htab
->elf
.data_index_section
!= NULL
)
14883 osec
= htab
->elf
.data_index_section
;
14885 osec
= htab
->elf
.text_index_section
;
14886 indx
= elf_section_data (osec
)->dynindx
;
14888 BFD_ASSERT (indx
!= 0);
14890 /* We are turning this relocation into one
14891 against a section symbol, so subtract out
14892 the output section's address but not the
14893 offset of the input section in the output
14895 outrel
.r_addend
-= osec
->vma
;
14898 outrel
.r_info
= ELF64_R_INFO (indx
, r_type
);
14902 sreloc
= elf_section_data (input_section
)->sreloc
;
14904 ? h
->elf
.type
== STT_GNU_IFUNC
14905 : ELF_ST_TYPE (sym
->st_info
) == STT_GNU_IFUNC
)
14906 sreloc
= htab
->elf
.irelplt
;
14907 if (sreloc
== NULL
)
14910 if (sreloc
->reloc_count
* sizeof (Elf64_External_Rela
)
14913 loc
= sreloc
->contents
;
14914 loc
+= sreloc
->reloc_count
++ * sizeof (Elf64_External_Rela
);
14915 bfd_elf64_swap_reloca_out (output_bfd
, &outrel
, loc
);
14917 /* If this reloc is against an external symbol, it will
14918 be computed at runtime, so there's no need to do
14919 anything now. However, for the sake of prelink ensure
14920 that the section contents are a known value. */
14923 unresolved_reloc
= FALSE
;
14924 /* The value chosen here is quite arbitrary as ld.so
14925 ignores section contents except for the special
14926 case of .opd where the contents might be accessed
14927 before relocation. Choose zero, as that won't
14928 cause reloc overflow. */
14931 /* Use *r_offset == r_addend for R_PPC64_ADDR64 relocs
14932 to improve backward compatibility with older
14934 if (r_type
== R_PPC64_ADDR64
)
14935 addend
= outrel
.r_addend
;
14936 /* Adjust pc_relative relocs to have zero in *r_offset. */
14937 else if (ppc64_elf_howto_table
[r_type
]->pc_relative
)
14938 addend
= (input_section
->output_section
->vma
14939 + input_section
->output_offset
14946 case R_PPC64_GLOB_DAT
:
14947 case R_PPC64_JMP_SLOT
:
14948 case R_PPC64_JMP_IREL
:
14949 case R_PPC64_RELATIVE
:
14950 /* We shouldn't ever see these dynamic relocs in relocatable
14952 /* Fall through. */
14954 case R_PPC64_PLTGOT16
:
14955 case R_PPC64_PLTGOT16_DS
:
14956 case R_PPC64_PLTGOT16_HA
:
14957 case R_PPC64_PLTGOT16_HI
:
14958 case R_PPC64_PLTGOT16_LO
:
14959 case R_PPC64_PLTGOT16_LO_DS
:
14960 case R_PPC64_PLTREL32
:
14961 case R_PPC64_PLTREL64
:
14962 /* These ones haven't been implemented yet. */
14964 info
->callbacks
->einfo
14965 (_("%P: %B: %s is not supported for `%T'\n"),
14967 ppc64_elf_howto_table
[r_type
]->name
, sym_name
);
14969 bfd_set_error (bfd_error_invalid_operation
);
14974 /* Multi-instruction sequences that access the TOC can be
14975 optimized, eg. addis ra,r2,0; addi rb,ra,x;
14976 to nop; addi rb,r2,x; */
14982 case R_PPC64_GOT_TLSLD16_HI
:
14983 case R_PPC64_GOT_TLSGD16_HI
:
14984 case R_PPC64_GOT_TPREL16_HI
:
14985 case R_PPC64_GOT_DTPREL16_HI
:
14986 case R_PPC64_GOT16_HI
:
14987 case R_PPC64_TOC16_HI
:
14988 /* These relocs would only be useful if building up an
14989 offset to later add to r2, perhaps in an indexed
14990 addressing mode instruction. Don't try to optimize.
14991 Unfortunately, the possibility of someone building up an
14992 offset like this or even with the HA relocs, means that
14993 we need to check the high insn when optimizing the low
14997 case R_PPC64_GOT_TLSLD16_HA
:
14998 case R_PPC64_GOT_TLSGD16_HA
:
14999 case R_PPC64_GOT_TPREL16_HA
:
15000 case R_PPC64_GOT_DTPREL16_HA
:
15001 case R_PPC64_GOT16_HA
:
15002 case R_PPC64_TOC16_HA
:
15003 if (htab
->do_toc_opt
&& relocation
+ addend
+ 0x8000 < 0x10000
15004 && !ppc64_elf_tdata (input_bfd
)->unexpected_toc_insn
)
15006 bfd_byte
*p
= contents
+ (rel
->r_offset
& ~3);
15007 bfd_put_32 (input_bfd
, NOP
, p
);
15011 case R_PPC64_GOT_TLSLD16_LO
:
15012 case R_PPC64_GOT_TLSGD16_LO
:
15013 case R_PPC64_GOT_TPREL16_LO_DS
:
15014 case R_PPC64_GOT_DTPREL16_LO_DS
:
15015 case R_PPC64_GOT16_LO
:
15016 case R_PPC64_GOT16_LO_DS
:
15017 case R_PPC64_TOC16_LO
:
15018 case R_PPC64_TOC16_LO_DS
:
15019 if (htab
->do_toc_opt
&& relocation
+ addend
+ 0x8000 < 0x10000
15020 && !ppc64_elf_tdata (input_bfd
)->unexpected_toc_insn
)
15022 bfd_byte
*p
= contents
+ (rel
->r_offset
& ~3);
15023 insn
= bfd_get_32 (input_bfd
, p
);
15024 if ((insn
& (0x3f << 26)) == 12u << 26 /* addic */)
15026 /* Transform addic to addi when we change reg. */
15027 insn
&= ~((0x3f << 26) | (0x1f << 16));
15028 insn
|= (14u << 26) | (2 << 16);
15032 insn
&= ~(0x1f << 16);
15035 bfd_put_32 (input_bfd
, insn
, p
);
15040 /* Do any further special processing. */
15041 howto
= ppc64_elf_howto_table
[(int) r_type
];
15047 case R_PPC64_REL16_HA
:
15048 case R_PPC64_REL16DX_HA
:
15049 case R_PPC64_ADDR16_HA
:
15050 case R_PPC64_ADDR16_HIGHA
:
15051 case R_PPC64_ADDR16_HIGHERA
:
15052 case R_PPC64_ADDR16_HIGHESTA
:
15053 case R_PPC64_TOC16_HA
:
15054 case R_PPC64_SECTOFF_HA
:
15055 case R_PPC64_TPREL16_HA
:
15056 case R_PPC64_TPREL16_HIGHA
:
15057 case R_PPC64_TPREL16_HIGHERA
:
15058 case R_PPC64_TPREL16_HIGHESTA
:
15059 case R_PPC64_DTPREL16_HA
:
15060 case R_PPC64_DTPREL16_HIGHA
:
15061 case R_PPC64_DTPREL16_HIGHERA
:
15062 case R_PPC64_DTPREL16_HIGHESTA
:
15063 /* It's just possible that this symbol is a weak symbol
15064 that's not actually defined anywhere. In that case,
15065 'sec' would be NULL, and we should leave the symbol
15066 alone (it will be set to zero elsewhere in the link). */
15071 case R_PPC64_GOT16_HA
:
15072 case R_PPC64_PLTGOT16_HA
:
15073 case R_PPC64_PLT16_HA
:
15074 case R_PPC64_GOT_TLSGD16_HA
:
15075 case R_PPC64_GOT_TLSLD16_HA
:
15076 case R_PPC64_GOT_TPREL16_HA
:
15077 case R_PPC64_GOT_DTPREL16_HA
:
15078 /* Add 0x10000 if sign bit in 0:15 is set.
15079 Bits 0:15 are not used. */
15083 case R_PPC64_ADDR16_DS
:
15084 case R_PPC64_ADDR16_LO_DS
:
15085 case R_PPC64_GOT16_DS
:
15086 case R_PPC64_GOT16_LO_DS
:
15087 case R_PPC64_PLT16_LO_DS
:
15088 case R_PPC64_SECTOFF_DS
:
15089 case R_PPC64_SECTOFF_LO_DS
:
15090 case R_PPC64_TOC16_DS
:
15091 case R_PPC64_TOC16_LO_DS
:
15092 case R_PPC64_PLTGOT16_DS
:
15093 case R_PPC64_PLTGOT16_LO_DS
:
15094 case R_PPC64_GOT_TPREL16_DS
:
15095 case R_PPC64_GOT_TPREL16_LO_DS
:
15096 case R_PPC64_GOT_DTPREL16_DS
:
15097 case R_PPC64_GOT_DTPREL16_LO_DS
:
15098 case R_PPC64_TPREL16_DS
:
15099 case R_PPC64_TPREL16_LO_DS
:
15100 case R_PPC64_DTPREL16_DS
:
15101 case R_PPC64_DTPREL16_LO_DS
:
15102 insn
= bfd_get_32 (input_bfd
, contents
+ (rel
->r_offset
& ~3));
15104 /* If this reloc is against an lq, lxv, or stxv insn, then
15105 the value must be a multiple of 16. This is somewhat of
15106 a hack, but the "correct" way to do this by defining _DQ
15107 forms of all the _DS relocs bloats all reloc switches in
15108 this file. It doesn't make much sense to use these
15109 relocs in data, so testing the insn should be safe. */
15110 if ((insn
& (0x3f << 26)) == (56u << 26)
15111 || ((insn
& (0x3f << 26)) == (61u << 26) && (insn
& 3) == 1))
15113 relocation
+= addend
;
15114 addend
= insn
& (mask
^ 3);
15115 if ((relocation
& mask
) != 0)
15117 relocation
^= relocation
& mask
;
15118 info
->callbacks
->einfo
15119 (_("%P: %H: error: %s not a multiple of %u\n"),
15120 input_bfd
, input_section
, rel
->r_offset
,
15123 bfd_set_error (bfd_error_bad_value
);
15130 /* Dynamic relocs are not propagated for SEC_DEBUGGING sections
15131 because such sections are not SEC_ALLOC and thus ld.so will
15132 not process them. */
15133 if (unresolved_reloc
15134 && !((input_section
->flags
& SEC_DEBUGGING
) != 0
15135 && h
->elf
.def_dynamic
)
15136 && _bfd_elf_section_offset (output_bfd
, info
, input_section
,
15137 rel
->r_offset
) != (bfd_vma
) -1)
15139 info
->callbacks
->einfo
15140 (_("%P: %H: unresolvable %s against `%T'\n"),
15141 input_bfd
, input_section
, rel
->r_offset
,
15143 h
->elf
.root
.root
.string
);
15147 /* 16-bit fields in insns mostly have signed values, but a
15148 few insns have 16-bit unsigned values. Really, we should
15149 have different reloc types. */
15150 if (howto
->complain_on_overflow
!= complain_overflow_dont
15151 && howto
->dst_mask
== 0xffff
15152 && (input_section
->flags
& SEC_CODE
) != 0)
15154 enum complain_overflow complain
= complain_overflow_signed
;
15156 insn
= bfd_get_32 (input_bfd
, contents
+ (rel
->r_offset
& ~3));
15157 if ((insn
& (0x3f << 26)) == 10u << 26 /* cmpli */)
15158 complain
= complain_overflow_bitfield
;
15159 else if (howto
->rightshift
== 0
15160 ? ((insn
& (0x3f << 26)) == 28u << 26 /* andi */
15161 || (insn
& (0x3f << 26)) == 24u << 26 /* ori */
15162 || (insn
& (0x3f << 26)) == 26u << 26 /* xori */)
15163 : ((insn
& (0x3f << 26)) == 29u << 26 /* andis */
15164 || (insn
& (0x3f << 26)) == 25u << 26 /* oris */
15165 || (insn
& (0x3f << 26)) == 27u << 26 /* xoris */))
15166 complain
= complain_overflow_unsigned
;
15167 if (howto
->complain_on_overflow
!= complain
)
15169 alt_howto
= *howto
;
15170 alt_howto
.complain_on_overflow
= complain
;
15171 howto
= &alt_howto
;
15175 if (r_type
== R_PPC64_REL16DX_HA
)
15177 /* Split field reloc isn't handled by _bfd_final_link_relocate. */
15178 if (rel
->r_offset
+ 4 > input_section
->size
)
15179 r
= bfd_reloc_outofrange
;
15182 relocation
+= addend
;
15183 relocation
-= (rel
->r_offset
15184 + input_section
->output_offset
15185 + input_section
->output_section
->vma
);
15186 relocation
= (bfd_signed_vma
) relocation
>> 16;
15187 insn
= bfd_get_32 (input_bfd
, contents
+ rel
->r_offset
);
15189 insn
|= (relocation
& 0xffc1) | ((relocation
& 0x3e) << 15);
15190 bfd_put_32 (input_bfd
, insn
, contents
+ rel
->r_offset
);
15192 if (relocation
+ 0x8000 > 0xffff)
15193 r
= bfd_reloc_overflow
;
15197 r
= _bfd_final_link_relocate (howto
, input_bfd
, input_section
, contents
,
15198 rel
->r_offset
, relocation
, addend
);
15200 if (r
!= bfd_reloc_ok
)
15202 char *more_info
= NULL
;
15203 const char *reloc_name
= howto
->name
;
15205 if (reloc_dest
!= DEST_NORMAL
)
15207 more_info
= bfd_malloc (strlen (reloc_name
) + 8);
15208 if (more_info
!= NULL
)
15210 strcpy (more_info
, reloc_name
);
15211 strcat (more_info
, (reloc_dest
== DEST_OPD
15212 ? " (OPD)" : " (stub)"));
15213 reloc_name
= more_info
;
15217 if (r
== bfd_reloc_overflow
)
15219 /* On code like "if (foo) foo();" don't report overflow
15220 on a branch to zero when foo is undefined. */
15222 && (reloc_dest
== DEST_STUB
15224 && (h
->elf
.root
.type
== bfd_link_hash_undefweak
15225 || h
->elf
.root
.type
== bfd_link_hash_undefined
)
15226 && is_branch_reloc (r_type
))))
15227 info
->callbacks
->reloc_overflow (info
, &h
->elf
.root
,
15228 sym_name
, reloc_name
,
15230 input_bfd
, input_section
,
15235 info
->callbacks
->einfo
15236 (_("%P: %H: %s against `%T': error %d\n"),
15237 input_bfd
, input_section
, rel
->r_offset
,
15238 reloc_name
, sym_name
, (int) r
);
15241 if (more_info
!= NULL
)
15251 Elf_Internal_Shdr
*rel_hdr
;
15252 size_t deleted
= rel
- wrel
;
15254 rel_hdr
= _bfd_elf_single_rel_hdr (input_section
->output_section
);
15255 rel_hdr
->sh_size
-= rel_hdr
->sh_entsize
* deleted
;
15256 if (rel_hdr
->sh_size
== 0)
15258 /* It is too late to remove an empty reloc section. Leave
15260 ??? What is wrong with an empty section??? */
15261 rel_hdr
->sh_size
= rel_hdr
->sh_entsize
;
15264 rel_hdr
= _bfd_elf_single_rel_hdr (input_section
);
15265 rel_hdr
->sh_size
-= rel_hdr
->sh_entsize
* deleted
;
15266 input_section
->reloc_count
-= deleted
;
15269 /* If we're emitting relocations, then shortly after this function
15270 returns, reloc offsets and addends for this section will be
15271 adjusted. Worse, reloc symbol indices will be for the output
15272 file rather than the input. Save a copy of the relocs for
15273 opd_entry_value. */
15274 if (is_opd
&& (info
->emitrelocations
|| bfd_link_relocatable (info
)))
15277 amt
= input_section
->reloc_count
* sizeof (Elf_Internal_Rela
);
15278 rel
= bfd_alloc (input_bfd
, amt
);
15279 BFD_ASSERT (ppc64_elf_tdata (input_bfd
)->opd
.relocs
== NULL
);
15280 ppc64_elf_tdata (input_bfd
)->opd
.relocs
= rel
;
15283 memcpy (rel
, relocs
, amt
);
15288 /* Adjust the value of any local symbols in opd sections. */
15291 ppc64_elf_output_symbol_hook (struct bfd_link_info
*info
,
15292 const char *name ATTRIBUTE_UNUSED
,
15293 Elf_Internal_Sym
*elfsym
,
15294 asection
*input_sec
,
15295 struct elf_link_hash_entry
*h
)
15297 struct _opd_sec_data
*opd
;
15304 opd
= get_opd_info (input_sec
);
15305 if (opd
== NULL
|| opd
->adjust
== NULL
)
15308 value
= elfsym
->st_value
- input_sec
->output_offset
;
15309 if (!bfd_link_relocatable (info
))
15310 value
-= input_sec
->output_section
->vma
;
15312 adjust
= opd
->adjust
[OPD_NDX (value
)];
15316 elfsym
->st_value
+= adjust
;
15320 /* Finish up dynamic symbol handling. We set the contents of various
15321 dynamic sections here. */
15324 ppc64_elf_finish_dynamic_symbol (bfd
*output_bfd
,
15325 struct bfd_link_info
*info
,
15326 struct elf_link_hash_entry
*h
,
15327 Elf_Internal_Sym
*sym ATTRIBUTE_UNUSED
)
15329 struct ppc_link_hash_table
*htab
;
15330 struct plt_entry
*ent
;
15331 Elf_Internal_Rela rela
;
15334 htab
= ppc_hash_table (info
);
15338 for (ent
= h
->plt
.plist
; ent
!= NULL
; ent
= ent
->next
)
15339 if (ent
->plt
.offset
!= (bfd_vma
) -1)
15341 /* This symbol has an entry in the procedure linkage
15342 table. Set it up. */
15343 if (!htab
->elf
.dynamic_sections_created
15344 || h
->dynindx
== -1)
15346 BFD_ASSERT (h
->type
== STT_GNU_IFUNC
15348 && (h
->root
.type
== bfd_link_hash_defined
15349 || h
->root
.type
== bfd_link_hash_defweak
));
15350 rela
.r_offset
= (htab
->elf
.iplt
->output_section
->vma
15351 + htab
->elf
.iplt
->output_offset
15352 + ent
->plt
.offset
);
15354 rela
.r_info
= ELF64_R_INFO (0, R_PPC64_JMP_IREL
);
15356 rela
.r_info
= ELF64_R_INFO (0, R_PPC64_IRELATIVE
);
15357 rela
.r_addend
= (h
->root
.u
.def
.value
15358 + h
->root
.u
.def
.section
->output_offset
15359 + h
->root
.u
.def
.section
->output_section
->vma
15361 loc
= (htab
->elf
.irelplt
->contents
15362 + (htab
->elf
.irelplt
->reloc_count
++
15363 * sizeof (Elf64_External_Rela
)));
15367 rela
.r_offset
= (htab
->elf
.splt
->output_section
->vma
15368 + htab
->elf
.splt
->output_offset
15369 + ent
->plt
.offset
);
15370 rela
.r_info
= ELF64_R_INFO (h
->dynindx
, R_PPC64_JMP_SLOT
);
15371 rela
.r_addend
= ent
->addend
;
15372 loc
= (htab
->elf
.srelplt
->contents
15373 + ((ent
->plt
.offset
- PLT_INITIAL_ENTRY_SIZE (htab
))
15374 / PLT_ENTRY_SIZE (htab
) * sizeof (Elf64_External_Rela
)));
15376 bfd_elf64_swap_reloca_out (output_bfd
, &rela
, loc
);
15378 if (!htab
->opd_abi
)
15380 if (!h
->def_regular
)
15382 /* Mark the symbol as undefined, rather than as
15383 defined in glink. Leave the value if there were
15384 any relocations where pointer equality matters
15385 (this is a clue for the dynamic linker, to make
15386 function pointer comparisons work between an
15387 application and shared library), otherwise set it
15389 sym
->st_shndx
= SHN_UNDEF
;
15390 if (!h
->pointer_equality_needed
)
15392 else if (!h
->ref_regular_nonweak
)
15394 /* This breaks function pointer comparisons, but
15395 that is better than breaking tests for a NULL
15396 function pointer. */
15405 /* This symbol needs a copy reloc. Set it up. */
15407 if (h
->dynindx
== -1
15408 || (h
->root
.type
!= bfd_link_hash_defined
15409 && h
->root
.type
!= bfd_link_hash_defweak
)
15410 || htab
->relbss
== NULL
)
15413 rela
.r_offset
= (h
->root
.u
.def
.value
15414 + h
->root
.u
.def
.section
->output_section
->vma
15415 + h
->root
.u
.def
.section
->output_offset
);
15416 rela
.r_info
= ELF64_R_INFO (h
->dynindx
, R_PPC64_COPY
);
15418 loc
= htab
->relbss
->contents
;
15419 loc
+= htab
->relbss
->reloc_count
++ * sizeof (Elf64_External_Rela
);
15420 bfd_elf64_swap_reloca_out (output_bfd
, &rela
, loc
);
15426 /* Used to decide how to sort relocs in an optimal manner for the
15427 dynamic linker, before writing them out. */
15429 static enum elf_reloc_type_class
15430 ppc64_elf_reloc_type_class (const struct bfd_link_info
*info
,
15431 const asection
*rel_sec
,
15432 const Elf_Internal_Rela
*rela
)
15434 enum elf_ppc64_reloc_type r_type
;
15435 struct ppc_link_hash_table
*htab
= ppc_hash_table (info
);
15437 if (rel_sec
== htab
->elf
.irelplt
)
15438 return reloc_class_ifunc
;
15440 r_type
= ELF64_R_TYPE (rela
->r_info
);
15443 case R_PPC64_RELATIVE
:
15444 return reloc_class_relative
;
15445 case R_PPC64_JMP_SLOT
:
15446 return reloc_class_plt
;
15448 return reloc_class_copy
;
15450 return reloc_class_normal
;
15454 /* Finish up the dynamic sections. */
15457 ppc64_elf_finish_dynamic_sections (bfd
*output_bfd
,
15458 struct bfd_link_info
*info
)
15460 struct ppc_link_hash_table
*htab
;
15464 htab
= ppc_hash_table (info
);
15468 dynobj
= htab
->elf
.dynobj
;
15469 sdyn
= bfd_get_linker_section (dynobj
, ".dynamic");
15471 if (htab
->elf
.dynamic_sections_created
)
15473 Elf64_External_Dyn
*dyncon
, *dynconend
;
15475 if (sdyn
== NULL
|| htab
->elf
.sgot
== NULL
)
15478 dyncon
= (Elf64_External_Dyn
*) sdyn
->contents
;
15479 dynconend
= (Elf64_External_Dyn
*) (sdyn
->contents
+ sdyn
->size
);
15480 for (; dyncon
< dynconend
; dyncon
++)
15482 Elf_Internal_Dyn dyn
;
15485 bfd_elf64_swap_dyn_in (dynobj
, dyncon
, &dyn
);
15492 case DT_PPC64_GLINK
:
15494 dyn
.d_un
.d_ptr
= s
->output_section
->vma
+ s
->output_offset
;
15495 /* We stupidly defined DT_PPC64_GLINK to be the start
15496 of glink rather than the first entry point, which is
15497 what ld.so needs, and now have a bigger stub to
15498 support automatic multiple TOCs. */
15499 dyn
.d_un
.d_ptr
+= GLINK_CALL_STUB_SIZE
- 8 * 4;
15503 s
= bfd_get_section_by_name (output_bfd
, ".opd");
15506 dyn
.d_un
.d_ptr
= s
->vma
;
15510 if (htab
->do_multi_toc
&& htab
->multi_toc_needed
)
15511 dyn
.d_un
.d_val
|= PPC64_OPT_MULTI_TOC
;
15514 case DT_PPC64_OPDSZ
:
15515 s
= bfd_get_section_by_name (output_bfd
, ".opd");
15518 dyn
.d_un
.d_val
= s
->size
;
15522 s
= htab
->elf
.splt
;
15523 dyn
.d_un
.d_ptr
= s
->output_section
->vma
+ s
->output_offset
;
15527 s
= htab
->elf
.srelplt
;
15528 dyn
.d_un
.d_ptr
= s
->output_section
->vma
+ s
->output_offset
;
15532 dyn
.d_un
.d_val
= htab
->elf
.srelplt
->size
;
15536 /* Don't count procedure linkage table relocs in the
15537 overall reloc count. */
15538 s
= htab
->elf
.srelplt
;
15541 dyn
.d_un
.d_val
-= s
->size
;
15545 /* We may not be using the standard ELF linker script.
15546 If .rela.plt is the first .rela section, we adjust
15547 DT_RELA to not include it. */
15548 s
= htab
->elf
.srelplt
;
15551 if (dyn
.d_un
.d_ptr
!= s
->output_section
->vma
+ s
->output_offset
)
15553 dyn
.d_un
.d_ptr
+= s
->size
;
15557 bfd_elf64_swap_dyn_out (output_bfd
, &dyn
, dyncon
);
15561 if (htab
->elf
.sgot
!= NULL
&& htab
->elf
.sgot
->size
!= 0)
15563 /* Fill in the first entry in the global offset table.
15564 We use it to hold the link-time TOCbase. */
15565 bfd_put_64 (output_bfd
,
15566 elf_gp (output_bfd
) + TOC_BASE_OFF
,
15567 htab
->elf
.sgot
->contents
);
15569 /* Set .got entry size. */
15570 elf_section_data (htab
->elf
.sgot
->output_section
)->this_hdr
.sh_entsize
= 8;
15573 if (htab
->elf
.splt
!= NULL
&& htab
->elf
.splt
->size
!= 0)
15575 /* Set .plt entry size. */
15576 elf_section_data (htab
->elf
.splt
->output_section
)->this_hdr
.sh_entsize
15577 = PLT_ENTRY_SIZE (htab
);
15580 /* brlt is SEC_LINKER_CREATED, so we need to write out relocs for
15581 brlt ourselves if emitrelocations. */
15582 if (htab
->brlt
!= NULL
15583 && htab
->brlt
->reloc_count
!= 0
15584 && !_bfd_elf_link_output_relocs (output_bfd
,
15586 elf_section_data (htab
->brlt
)->rela
.hdr
,
15587 elf_section_data (htab
->brlt
)->relocs
,
15591 if (htab
->glink
!= NULL
15592 && htab
->glink
->reloc_count
!= 0
15593 && !_bfd_elf_link_output_relocs (output_bfd
,
15595 elf_section_data (htab
->glink
)->rela
.hdr
,
15596 elf_section_data (htab
->glink
)->relocs
,
15600 if (htab
->glink_eh_frame
!= NULL
15601 && htab
->glink_eh_frame
->size
!= 0)
15605 asection
*stub_sec
;
15607 p
= htab
->glink_eh_frame
->contents
+ sizeof (glink_eh_frame_cie
);
15608 for (stub_sec
= htab
->params
->stub_bfd
->sections
;
15610 stub_sec
= stub_sec
->next
)
15611 if ((stub_sec
->flags
& SEC_LINKER_CREATED
) == 0)
15617 /* Offset to stub section. */
15618 val
= (stub_sec
->output_section
->vma
15619 + stub_sec
->output_offset
);
15620 val
-= (htab
->glink_eh_frame
->output_section
->vma
15621 + htab
->glink_eh_frame
->output_offset
15622 + (p
- htab
->glink_eh_frame
->contents
));
15623 if (val
+ 0x80000000 > 0xffffffff)
15625 info
->callbacks
->einfo
15626 (_("%P: %s offset too large for .eh_frame sdata4 encoding"),
15630 bfd_put_32 (dynobj
, val
, p
);
15632 /* stub section size. */
15634 /* Augmentation. */
15639 if (htab
->glink
!= NULL
&& htab
->glink
->size
!= 0)
15645 /* Offset to .glink. */
15646 val
= (htab
->glink
->output_section
->vma
15647 + htab
->glink
->output_offset
15649 val
-= (htab
->glink_eh_frame
->output_section
->vma
15650 + htab
->glink_eh_frame
->output_offset
15651 + (p
- htab
->glink_eh_frame
->contents
));
15652 if (val
+ 0x80000000 > 0xffffffff)
15654 info
->callbacks
->einfo
15655 (_("%P: %s offset too large for .eh_frame sdata4 encoding"),
15656 htab
->glink
->name
);
15659 bfd_put_32 (dynobj
, val
, p
);
15663 /* Augmentation. */
15669 if (htab
->glink_eh_frame
->sec_info_type
== SEC_INFO_TYPE_EH_FRAME
15670 && !_bfd_elf_write_section_eh_frame (output_bfd
, info
,
15671 htab
->glink_eh_frame
,
15672 htab
->glink_eh_frame
->contents
))
15676 /* We need to handle writing out multiple GOT sections ourselves,
15677 since we didn't add them to DYNOBJ. We know dynobj is the first
15679 while ((dynobj
= dynobj
->link
.next
) != NULL
)
15683 if (!is_ppc64_elf (dynobj
))
15686 s
= ppc64_elf_tdata (dynobj
)->got
;
15689 && s
->output_section
!= bfd_abs_section_ptr
15690 && !bfd_set_section_contents (output_bfd
, s
->output_section
,
15691 s
->contents
, s
->output_offset
,
15694 s
= ppc64_elf_tdata (dynobj
)->relgot
;
15697 && s
->output_section
!= bfd_abs_section_ptr
15698 && !bfd_set_section_contents (output_bfd
, s
->output_section
,
15699 s
->contents
, s
->output_offset
,
15707 #include "elf64-target.h"
15709 /* FreeBSD support */
15711 #undef TARGET_LITTLE_SYM
15712 #undef TARGET_LITTLE_NAME
15714 #undef TARGET_BIG_SYM
15715 #define TARGET_BIG_SYM powerpc_elf64_fbsd_vec
15716 #undef TARGET_BIG_NAME
15717 #define TARGET_BIG_NAME "elf64-powerpc-freebsd"
15720 #define ELF_OSABI ELFOSABI_FREEBSD
15723 #define elf64_bed elf64_powerpc_fbsd_bed
15725 #include "elf64-target.h"