bfd/
[deliverable/binutils-gdb.git] / bfd / elf64-ppc.c
1 /* PowerPC64-specific support for 64-bit ELF.
2 Copyright 1999, 2000, 2001, 2002, 2003, 2004, 2005, 2006, 2007
3 Free Software Foundation, Inc.
4 Written by Linus Nordberg, Swox AB <info@swox.com>,
5 based on elf32-ppc.c by Ian Lance Taylor.
6 Largely rewritten by Alan Modra <amodra@bigpond.net.au>
7
8 This file is part of BFD, the Binary File Descriptor library.
9
10 This program is free software; you can redistribute it and/or modify
11 it under the terms of the GNU General Public License as published by
12 the Free Software Foundation; either version 3 of the License, or
13 (at your option) any later version.
14
15 This program is distributed in the hope that it will be useful,
16 but WITHOUT ANY WARRANTY; without even the implied warranty of
17 MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
18 GNU General Public License for more details.
19
20 You should have received a copy of the GNU General Public License along
21 with this program; if not, write to the Free Software Foundation, Inc.,
22 51 Franklin Street - Fifth Floor, Boston, MA 02110-1301, USA. */
23
24
25 /* The 64-bit PowerPC ELF ABI may be found at
26 http://www.linuxbase.org/spec/ELF/ppc64/PPC-elf64abi.txt, and
27 http://www.linuxbase.org/spec/ELF/ppc64/spec/book1.html */
28
29 #include "sysdep.h"
30 #include <stdarg.h>
31 #include "bfd.h"
32 #include "bfdlink.h"
33 #include "libbfd.h"
34 #include "elf-bfd.h"
35 #include "elf/ppc64.h"
36 #include "elf64-ppc.h"
37
38 static bfd_reloc_status_type ppc64_elf_ha_reloc
39 (bfd *, arelent *, asymbol *, void *, asection *, bfd *, char **);
40 static bfd_reloc_status_type ppc64_elf_branch_reloc
41 (bfd *, arelent *, asymbol *, void *, asection *, bfd *, char **);
42 static bfd_reloc_status_type ppc64_elf_brtaken_reloc
43 (bfd *, arelent *, asymbol *, void *, asection *, bfd *, char **);
44 static bfd_reloc_status_type ppc64_elf_sectoff_reloc
45 (bfd *, arelent *, asymbol *, void *, asection *, bfd *, char **);
46 static bfd_reloc_status_type ppc64_elf_sectoff_ha_reloc
47 (bfd *, arelent *, asymbol *, void *, asection *, bfd *, char **);
48 static bfd_reloc_status_type ppc64_elf_toc_reloc
49 (bfd *, arelent *, asymbol *, void *, asection *, bfd *, char **);
50 static bfd_reloc_status_type ppc64_elf_toc_ha_reloc
51 (bfd *, arelent *, asymbol *, void *, asection *, bfd *, char **);
52 static bfd_reloc_status_type ppc64_elf_toc64_reloc
53 (bfd *, arelent *, asymbol *, void *, asection *, bfd *, char **);
54 static bfd_reloc_status_type ppc64_elf_unhandled_reloc
55 (bfd *, arelent *, asymbol *, void *, asection *, bfd *, char **);
56 static bfd_vma opd_entry_value
57 (asection *, bfd_vma, asection **, bfd_vma *);
58
59 #define TARGET_LITTLE_SYM bfd_elf64_powerpcle_vec
60 #define TARGET_LITTLE_NAME "elf64-powerpcle"
61 #define TARGET_BIG_SYM bfd_elf64_powerpc_vec
62 #define TARGET_BIG_NAME "elf64-powerpc"
63 #define ELF_ARCH bfd_arch_powerpc
64 #define ELF_MACHINE_CODE EM_PPC64
65 #define ELF_MAXPAGESIZE 0x10000
66 #define ELF_COMMONPAGESIZE 0x1000
67 #define elf_info_to_howto ppc64_elf_info_to_howto
68
69 #define elf_backend_want_got_sym 0
70 #define elf_backend_want_plt_sym 0
71 #define elf_backend_plt_alignment 3
72 #define elf_backend_plt_not_loaded 1
73 #define elf_backend_got_header_size 8
74 #define elf_backend_can_gc_sections 1
75 #define elf_backend_can_refcount 1
76 #define elf_backend_rela_normal 1
77 #define elf_backend_default_execstack 0
78
79 #define bfd_elf64_mkobject ppc64_elf_mkobject
80 #define bfd_elf64_bfd_reloc_type_lookup ppc64_elf_reloc_type_lookup
81 #define bfd_elf64_bfd_reloc_name_lookup ppc64_elf_reloc_name_lookup
82 #define bfd_elf64_bfd_merge_private_bfd_data ppc64_elf_merge_private_bfd_data
83 #define bfd_elf64_new_section_hook ppc64_elf_new_section_hook
84 #define bfd_elf64_bfd_link_hash_table_create ppc64_elf_link_hash_table_create
85 #define bfd_elf64_bfd_link_hash_table_free ppc64_elf_link_hash_table_free
86 #define bfd_elf64_get_synthetic_symtab ppc64_elf_get_synthetic_symtab
87
88 #define elf_backend_object_p ppc64_elf_object_p
89 #define elf_backend_grok_prstatus ppc64_elf_grok_prstatus
90 #define elf_backend_grok_psinfo ppc64_elf_grok_psinfo
91 #define elf_backend_write_core_note ppc64_elf_write_core_note
92 #define elf_backend_create_dynamic_sections ppc64_elf_create_dynamic_sections
93 #define elf_backend_copy_indirect_symbol ppc64_elf_copy_indirect_symbol
94 #define elf_backend_add_symbol_hook ppc64_elf_add_symbol_hook
95 #define elf_backend_check_directives ppc64_elf_check_directives
96 #define elf_backend_as_needed_cleanup ppc64_elf_as_needed_cleanup
97 #define elf_backend_archive_symbol_lookup ppc64_elf_archive_symbol_lookup
98 #define elf_backend_check_relocs ppc64_elf_check_relocs
99 #define elf_backend_gc_mark_dynamic_ref ppc64_elf_gc_mark_dynamic_ref
100 #define elf_backend_gc_mark_hook ppc64_elf_gc_mark_hook
101 #define elf_backend_gc_sweep_hook ppc64_elf_gc_sweep_hook
102 #define elf_backend_adjust_dynamic_symbol ppc64_elf_adjust_dynamic_symbol
103 #define elf_backend_hide_symbol ppc64_elf_hide_symbol
104 #define elf_backend_always_size_sections ppc64_elf_func_desc_adjust
105 #define elf_backend_size_dynamic_sections ppc64_elf_size_dynamic_sections
106 #define elf_backend_init_index_section _bfd_elf_init_2_index_sections
107 #define elf_backend_action_discarded ppc64_elf_action_discarded
108 #define elf_backend_relocate_section ppc64_elf_relocate_section
109 #define elf_backend_finish_dynamic_symbol ppc64_elf_finish_dynamic_symbol
110 #define elf_backend_reloc_type_class ppc64_elf_reloc_type_class
111 #define elf_backend_finish_dynamic_sections ppc64_elf_finish_dynamic_sections
112 #define elf_backend_link_output_symbol_hook ppc64_elf_output_symbol_hook
113 #define elf_backend_special_sections ppc64_elf_special_sections
114
115 /* The name of the dynamic interpreter. This is put in the .interp
116 section. */
117 #define ELF_DYNAMIC_INTERPRETER "/usr/lib/ld.so.1"
118
119 /* The size in bytes of an entry in the procedure linkage table. */
120 #define PLT_ENTRY_SIZE 24
121
122 /* The initial size of the plt reserved for the dynamic linker. */
123 #define PLT_INITIAL_ENTRY_SIZE PLT_ENTRY_SIZE
124
125 /* TOC base pointers offset from start of TOC. */
126 #define TOC_BASE_OFF 0x8000
127
128 /* Offset of tp and dtp pointers from start of TLS block. */
129 #define TP_OFFSET 0x7000
130 #define DTP_OFFSET 0x8000
131
132 /* .plt call stub instructions. The normal stub is like this, but
133 sometimes the .plt entry crosses a 64k boundary and we need to
134 insert an addi to adjust r12. */
135 #define PLT_CALL_STUB_SIZE (7*4)
136 #define ADDIS_R12_R2 0x3d820000 /* addis %r12,%r2,xxx@ha */
137 #define STD_R2_40R1 0xf8410028 /* std %r2,40(%r1) */
138 #define LD_R11_0R12 0xe96c0000 /* ld %r11,xxx+0@l(%r12) */
139 #define MTCTR_R11 0x7d6903a6 /* mtctr %r11 */
140 #define LD_R2_0R12 0xe84c0000 /* ld %r2,xxx+8@l(%r12) */
141 /* ld %r11,xxx+16@l(%r12) */
142 #define BCTR 0x4e800420 /* bctr */
143
144
145 #define ADDIS_R12_R12 0x3d8c0000 /* addis %r12,%r12,off@ha */
146 #define ADDI_R12_R12 0x398c0000 /* addi %r12,%r12,off@l */
147 #define ADDIS_R2_R2 0x3c420000 /* addis %r2,%r2,off@ha */
148 #define ADDI_R2_R2 0x38420000 /* addi %r2,%r2,off@l */
149
150 #define LD_R11_0R2 0xe9620000 /* ld %r11,xxx+0(%r2) */
151 #define LD_R2_0R2 0xe8420000 /* ld %r2,xxx+0(%r2) */
152
153 #define LD_R2_40R1 0xe8410028 /* ld %r2,40(%r1) */
154
155 /* glink call stub instructions. We enter with the index in R0. */
156 #define GLINK_CALL_STUB_SIZE (16*4)
157 /* 0: */
158 /* .quad plt0-1f */
159 /* __glink: */
160 #define MFLR_R12 0x7d8802a6 /* mflr %12 */
161 #define BCL_20_31 0x429f0005 /* bcl 20,31,1f */
162 /* 1: */
163 #define MFLR_R11 0x7d6802a6 /* mflr %11 */
164 #define LD_R2_M16R11 0xe84bfff0 /* ld %2,(0b-1b)(%11) */
165 #define MTLR_R12 0x7d8803a6 /* mtlr %12 */
166 #define ADD_R12_R2_R11 0x7d825a14 /* add %12,%2,%11 */
167 /* ld %11,0(%12) */
168 /* ld %2,8(%12) */
169 /* mtctr %11 */
170 /* ld %11,16(%12) */
171 /* bctr */
172
173 /* Pad with this. */
174 #define NOP 0x60000000
175
176 /* Some other nops. */
177 #define CROR_151515 0x4def7b82
178 #define CROR_313131 0x4ffffb82
179
180 /* .glink entries for the first 32k functions are two instructions. */
181 #define LI_R0_0 0x38000000 /* li %r0,0 */
182 #define B_DOT 0x48000000 /* b . */
183
184 /* After that, we need two instructions to load the index, followed by
185 a branch. */
186 #define LIS_R0_0 0x3c000000 /* lis %r0,0 */
187 #define ORI_R0_R0_0 0x60000000 /* ori %r0,%r0,0 */
188
189 /* Instructions used by the save and restore reg functions. */
190 #define STD_R0_0R1 0xf8010000 /* std %r0,0(%r1) */
191 #define STD_R0_0R12 0xf80c0000 /* std %r0,0(%r12) */
192 #define LD_R0_0R1 0xe8010000 /* ld %r0,0(%r1) */
193 #define LD_R0_0R12 0xe80c0000 /* ld %r0,0(%r12) */
194 #define STFD_FR0_0R1 0xd8010000 /* stfd %fr0,0(%r1) */
195 #define LFD_FR0_0R1 0xc8010000 /* lfd %fr0,0(%r1) */
196 #define LI_R12_0 0x39800000 /* li %r12,0 */
197 #define STVX_VR0_R12_R0 0x7c0c01ce /* stvx %v0,%r12,%r0 */
198 #define LVX_VR0_R12_R0 0x7c0c00ce /* lvx %v0,%r12,%r0 */
199 #define MTLR_R0 0x7c0803a6 /* mtlr %r0 */
200 #define BLR 0x4e800020 /* blr */
201
202 /* Since .opd is an array of descriptors and each entry will end up
203 with identical R_PPC64_RELATIVE relocs, there is really no need to
204 propagate .opd relocs; The dynamic linker should be taught to
205 relocate .opd without reloc entries. */
206 #ifndef NO_OPD_RELOCS
207 #define NO_OPD_RELOCS 0
208 #endif
209 \f
210 #define ONES(n) (((bfd_vma) 1 << ((n) - 1) << 1) - 1)
211
212 /* Relocation HOWTO's. */
213 static reloc_howto_type *ppc64_elf_howto_table[(int) R_PPC64_max];
214
215 static reloc_howto_type ppc64_elf_howto_raw[] = {
216 /* This reloc does nothing. */
217 HOWTO (R_PPC64_NONE, /* type */
218 0, /* rightshift */
219 2, /* size (0 = byte, 1 = short, 2 = long) */
220 32, /* bitsize */
221 FALSE, /* pc_relative */
222 0, /* bitpos */
223 complain_overflow_dont, /* complain_on_overflow */
224 bfd_elf_generic_reloc, /* special_function */
225 "R_PPC64_NONE", /* name */
226 FALSE, /* partial_inplace */
227 0, /* src_mask */
228 0, /* dst_mask */
229 FALSE), /* pcrel_offset */
230
231 /* A standard 32 bit relocation. */
232 HOWTO (R_PPC64_ADDR32, /* type */
233 0, /* rightshift */
234 2, /* size (0 = byte, 1 = short, 2 = long) */
235 32, /* bitsize */
236 FALSE, /* pc_relative */
237 0, /* bitpos */
238 complain_overflow_bitfield, /* complain_on_overflow */
239 bfd_elf_generic_reloc, /* special_function */
240 "R_PPC64_ADDR32", /* name */
241 FALSE, /* partial_inplace */
242 0, /* src_mask */
243 0xffffffff, /* dst_mask */
244 FALSE), /* pcrel_offset */
245
246 /* An absolute 26 bit branch; the lower two bits must be zero.
247 FIXME: we don't check that, we just clear them. */
248 HOWTO (R_PPC64_ADDR24, /* type */
249 0, /* rightshift */
250 2, /* size (0 = byte, 1 = short, 2 = long) */
251 26, /* bitsize */
252 FALSE, /* pc_relative */
253 0, /* bitpos */
254 complain_overflow_bitfield, /* complain_on_overflow */
255 bfd_elf_generic_reloc, /* special_function */
256 "R_PPC64_ADDR24", /* name */
257 FALSE, /* partial_inplace */
258 0, /* src_mask */
259 0x03fffffc, /* dst_mask */
260 FALSE), /* pcrel_offset */
261
262 /* A standard 16 bit relocation. */
263 HOWTO (R_PPC64_ADDR16, /* type */
264 0, /* rightshift */
265 1, /* size (0 = byte, 1 = short, 2 = long) */
266 16, /* bitsize */
267 FALSE, /* pc_relative */
268 0, /* bitpos */
269 complain_overflow_bitfield, /* complain_on_overflow */
270 bfd_elf_generic_reloc, /* special_function */
271 "R_PPC64_ADDR16", /* name */
272 FALSE, /* partial_inplace */
273 0, /* src_mask */
274 0xffff, /* dst_mask */
275 FALSE), /* pcrel_offset */
276
277 /* A 16 bit relocation without overflow. */
278 HOWTO (R_PPC64_ADDR16_LO, /* type */
279 0, /* rightshift */
280 1, /* size (0 = byte, 1 = short, 2 = long) */
281 16, /* bitsize */
282 FALSE, /* pc_relative */
283 0, /* bitpos */
284 complain_overflow_dont,/* complain_on_overflow */
285 bfd_elf_generic_reloc, /* special_function */
286 "R_PPC64_ADDR16_LO", /* name */
287 FALSE, /* partial_inplace */
288 0, /* src_mask */
289 0xffff, /* dst_mask */
290 FALSE), /* pcrel_offset */
291
292 /* Bits 16-31 of an address. */
293 HOWTO (R_PPC64_ADDR16_HI, /* type */
294 16, /* rightshift */
295 1, /* size (0 = byte, 1 = short, 2 = long) */
296 16, /* bitsize */
297 FALSE, /* pc_relative */
298 0, /* bitpos */
299 complain_overflow_dont, /* complain_on_overflow */
300 bfd_elf_generic_reloc, /* special_function */
301 "R_PPC64_ADDR16_HI", /* name */
302 FALSE, /* partial_inplace */
303 0, /* src_mask */
304 0xffff, /* dst_mask */
305 FALSE), /* pcrel_offset */
306
307 /* Bits 16-31 of an address, plus 1 if the contents of the low 16
308 bits, treated as a signed number, is negative. */
309 HOWTO (R_PPC64_ADDR16_HA, /* type */
310 16, /* rightshift */
311 1, /* size (0 = byte, 1 = short, 2 = long) */
312 16, /* bitsize */
313 FALSE, /* pc_relative */
314 0, /* bitpos */
315 complain_overflow_dont, /* complain_on_overflow */
316 ppc64_elf_ha_reloc, /* special_function */
317 "R_PPC64_ADDR16_HA", /* name */
318 FALSE, /* partial_inplace */
319 0, /* src_mask */
320 0xffff, /* dst_mask */
321 FALSE), /* pcrel_offset */
322
323 /* An absolute 16 bit branch; the lower two bits must be zero.
324 FIXME: we don't check that, we just clear them. */
325 HOWTO (R_PPC64_ADDR14, /* type */
326 0, /* rightshift */
327 2, /* size (0 = byte, 1 = short, 2 = long) */
328 16, /* bitsize */
329 FALSE, /* pc_relative */
330 0, /* bitpos */
331 complain_overflow_bitfield, /* complain_on_overflow */
332 ppc64_elf_branch_reloc, /* special_function */
333 "R_PPC64_ADDR14", /* name */
334 FALSE, /* partial_inplace */
335 0, /* src_mask */
336 0x0000fffc, /* dst_mask */
337 FALSE), /* pcrel_offset */
338
339 /* An absolute 16 bit branch, for which bit 10 should be set to
340 indicate that the branch is expected to be taken. The lower two
341 bits must be zero. */
342 HOWTO (R_PPC64_ADDR14_BRTAKEN, /* type */
343 0, /* rightshift */
344 2, /* size (0 = byte, 1 = short, 2 = long) */
345 16, /* bitsize */
346 FALSE, /* pc_relative */
347 0, /* bitpos */
348 complain_overflow_bitfield, /* complain_on_overflow */
349 ppc64_elf_brtaken_reloc, /* special_function */
350 "R_PPC64_ADDR14_BRTAKEN",/* name */
351 FALSE, /* partial_inplace */
352 0, /* src_mask */
353 0x0000fffc, /* dst_mask */
354 FALSE), /* pcrel_offset */
355
356 /* An absolute 16 bit branch, for which bit 10 should be set to
357 indicate that the branch is not expected to be taken. The lower
358 two bits must be zero. */
359 HOWTO (R_PPC64_ADDR14_BRNTAKEN, /* type */
360 0, /* rightshift */
361 2, /* size (0 = byte, 1 = short, 2 = long) */
362 16, /* bitsize */
363 FALSE, /* pc_relative */
364 0, /* bitpos */
365 complain_overflow_bitfield, /* complain_on_overflow */
366 ppc64_elf_brtaken_reloc, /* special_function */
367 "R_PPC64_ADDR14_BRNTAKEN",/* name */
368 FALSE, /* partial_inplace */
369 0, /* src_mask */
370 0x0000fffc, /* dst_mask */
371 FALSE), /* pcrel_offset */
372
373 /* A relative 26 bit branch; the lower two bits must be zero. */
374 HOWTO (R_PPC64_REL24, /* type */
375 0, /* rightshift */
376 2, /* size (0 = byte, 1 = short, 2 = long) */
377 26, /* bitsize */
378 TRUE, /* pc_relative */
379 0, /* bitpos */
380 complain_overflow_signed, /* complain_on_overflow */
381 ppc64_elf_branch_reloc, /* special_function */
382 "R_PPC64_REL24", /* name */
383 FALSE, /* partial_inplace */
384 0, /* src_mask */
385 0x03fffffc, /* dst_mask */
386 TRUE), /* pcrel_offset */
387
388 /* A relative 16 bit branch; the lower two bits must be zero. */
389 HOWTO (R_PPC64_REL14, /* type */
390 0, /* rightshift */
391 2, /* size (0 = byte, 1 = short, 2 = long) */
392 16, /* bitsize */
393 TRUE, /* pc_relative */
394 0, /* bitpos */
395 complain_overflow_signed, /* complain_on_overflow */
396 ppc64_elf_branch_reloc, /* special_function */
397 "R_PPC64_REL14", /* name */
398 FALSE, /* partial_inplace */
399 0, /* src_mask */
400 0x0000fffc, /* dst_mask */
401 TRUE), /* pcrel_offset */
402
403 /* A relative 16 bit branch. Bit 10 should be set to indicate that
404 the branch is expected to be taken. The lower two bits must be
405 zero. */
406 HOWTO (R_PPC64_REL14_BRTAKEN, /* type */
407 0, /* rightshift */
408 2, /* size (0 = byte, 1 = short, 2 = long) */
409 16, /* bitsize */
410 TRUE, /* pc_relative */
411 0, /* bitpos */
412 complain_overflow_signed, /* complain_on_overflow */
413 ppc64_elf_brtaken_reloc, /* special_function */
414 "R_PPC64_REL14_BRTAKEN", /* name */
415 FALSE, /* partial_inplace */
416 0, /* src_mask */
417 0x0000fffc, /* dst_mask */
418 TRUE), /* pcrel_offset */
419
420 /* A relative 16 bit branch. Bit 10 should be set to indicate that
421 the branch is not expected to be taken. The lower two bits must
422 be zero. */
423 HOWTO (R_PPC64_REL14_BRNTAKEN, /* type */
424 0, /* rightshift */
425 2, /* size (0 = byte, 1 = short, 2 = long) */
426 16, /* bitsize */
427 TRUE, /* pc_relative */
428 0, /* bitpos */
429 complain_overflow_signed, /* complain_on_overflow */
430 ppc64_elf_brtaken_reloc, /* special_function */
431 "R_PPC64_REL14_BRNTAKEN",/* name */
432 FALSE, /* partial_inplace */
433 0, /* src_mask */
434 0x0000fffc, /* dst_mask */
435 TRUE), /* pcrel_offset */
436
437 /* Like R_PPC64_ADDR16, but referring to the GOT table entry for the
438 symbol. */
439 HOWTO (R_PPC64_GOT16, /* type */
440 0, /* rightshift */
441 1, /* size (0 = byte, 1 = short, 2 = long) */
442 16, /* bitsize */
443 FALSE, /* pc_relative */
444 0, /* bitpos */
445 complain_overflow_signed, /* complain_on_overflow */
446 ppc64_elf_unhandled_reloc, /* special_function */
447 "R_PPC64_GOT16", /* name */
448 FALSE, /* partial_inplace */
449 0, /* src_mask */
450 0xffff, /* dst_mask */
451 FALSE), /* pcrel_offset */
452
453 /* Like R_PPC64_ADDR16_LO, but referring to the GOT table entry for
454 the symbol. */
455 HOWTO (R_PPC64_GOT16_LO, /* type */
456 0, /* rightshift */
457 1, /* size (0 = byte, 1 = short, 2 = long) */
458 16, /* bitsize */
459 FALSE, /* pc_relative */
460 0, /* bitpos */
461 complain_overflow_dont, /* complain_on_overflow */
462 ppc64_elf_unhandled_reloc, /* special_function */
463 "R_PPC64_GOT16_LO", /* name */
464 FALSE, /* partial_inplace */
465 0, /* src_mask */
466 0xffff, /* dst_mask */
467 FALSE), /* pcrel_offset */
468
469 /* Like R_PPC64_ADDR16_HI, but referring to the GOT table entry for
470 the symbol. */
471 HOWTO (R_PPC64_GOT16_HI, /* type */
472 16, /* rightshift */
473 1, /* size (0 = byte, 1 = short, 2 = long) */
474 16, /* bitsize */
475 FALSE, /* pc_relative */
476 0, /* bitpos */
477 complain_overflow_dont,/* complain_on_overflow */
478 ppc64_elf_unhandled_reloc, /* special_function */
479 "R_PPC64_GOT16_HI", /* name */
480 FALSE, /* partial_inplace */
481 0, /* src_mask */
482 0xffff, /* dst_mask */
483 FALSE), /* pcrel_offset */
484
485 /* Like R_PPC64_ADDR16_HA, but referring to the GOT table entry for
486 the symbol. */
487 HOWTO (R_PPC64_GOT16_HA, /* type */
488 16, /* rightshift */
489 1, /* size (0 = byte, 1 = short, 2 = long) */
490 16, /* bitsize */
491 FALSE, /* pc_relative */
492 0, /* bitpos */
493 complain_overflow_dont,/* complain_on_overflow */
494 ppc64_elf_unhandled_reloc, /* special_function */
495 "R_PPC64_GOT16_HA", /* name */
496 FALSE, /* partial_inplace */
497 0, /* src_mask */
498 0xffff, /* dst_mask */
499 FALSE), /* pcrel_offset */
500
501 /* This is used only by the dynamic linker. The symbol should exist
502 both in the object being run and in some shared library. The
503 dynamic linker copies the data addressed by the symbol from the
504 shared library into the object, because the object being
505 run has to have the data at some particular address. */
506 HOWTO (R_PPC64_COPY, /* type */
507 0, /* rightshift */
508 0, /* this one is variable size */
509 0, /* bitsize */
510 FALSE, /* pc_relative */
511 0, /* bitpos */
512 complain_overflow_dont, /* complain_on_overflow */
513 ppc64_elf_unhandled_reloc, /* special_function */
514 "R_PPC64_COPY", /* name */
515 FALSE, /* partial_inplace */
516 0, /* src_mask */
517 0, /* dst_mask */
518 FALSE), /* pcrel_offset */
519
520 /* Like R_PPC64_ADDR64, but used when setting global offset table
521 entries. */
522 HOWTO (R_PPC64_GLOB_DAT, /* type */
523 0, /* rightshift */
524 4, /* size (0=byte, 1=short, 2=long, 4=64 bits) */
525 64, /* bitsize */
526 FALSE, /* pc_relative */
527 0, /* bitpos */
528 complain_overflow_dont, /* complain_on_overflow */
529 ppc64_elf_unhandled_reloc, /* special_function */
530 "R_PPC64_GLOB_DAT", /* name */
531 FALSE, /* partial_inplace */
532 0, /* src_mask */
533 ONES (64), /* dst_mask */
534 FALSE), /* pcrel_offset */
535
536 /* Created by the link editor. Marks a procedure linkage table
537 entry for a symbol. */
538 HOWTO (R_PPC64_JMP_SLOT, /* type */
539 0, /* rightshift */
540 0, /* size (0 = byte, 1 = short, 2 = long) */
541 0, /* bitsize */
542 FALSE, /* pc_relative */
543 0, /* bitpos */
544 complain_overflow_dont, /* complain_on_overflow */
545 ppc64_elf_unhandled_reloc, /* special_function */
546 "R_PPC64_JMP_SLOT", /* name */
547 FALSE, /* partial_inplace */
548 0, /* src_mask */
549 0, /* dst_mask */
550 FALSE), /* pcrel_offset */
551
552 /* Used only by the dynamic linker. When the object is run, this
553 doubleword64 is set to the load address of the object, plus the
554 addend. */
555 HOWTO (R_PPC64_RELATIVE, /* type */
556 0, /* rightshift */
557 4, /* size (0=byte, 1=short, 2=long, 4=64 bits) */
558 64, /* bitsize */
559 FALSE, /* pc_relative */
560 0, /* bitpos */
561 complain_overflow_dont, /* complain_on_overflow */
562 bfd_elf_generic_reloc, /* special_function */
563 "R_PPC64_RELATIVE", /* name */
564 FALSE, /* partial_inplace */
565 0, /* src_mask */
566 ONES (64), /* dst_mask */
567 FALSE), /* pcrel_offset */
568
569 /* Like R_PPC64_ADDR32, but may be unaligned. */
570 HOWTO (R_PPC64_UADDR32, /* type */
571 0, /* rightshift */
572 2, /* size (0 = byte, 1 = short, 2 = long) */
573 32, /* bitsize */
574 FALSE, /* pc_relative */
575 0, /* bitpos */
576 complain_overflow_bitfield, /* complain_on_overflow */
577 bfd_elf_generic_reloc, /* special_function */
578 "R_PPC64_UADDR32", /* name */
579 FALSE, /* partial_inplace */
580 0, /* src_mask */
581 0xffffffff, /* dst_mask */
582 FALSE), /* pcrel_offset */
583
584 /* Like R_PPC64_ADDR16, but may be unaligned. */
585 HOWTO (R_PPC64_UADDR16, /* type */
586 0, /* rightshift */
587 1, /* size (0 = byte, 1 = short, 2 = long) */
588 16, /* bitsize */
589 FALSE, /* pc_relative */
590 0, /* bitpos */
591 complain_overflow_bitfield, /* complain_on_overflow */
592 bfd_elf_generic_reloc, /* special_function */
593 "R_PPC64_UADDR16", /* name */
594 FALSE, /* partial_inplace */
595 0, /* src_mask */
596 0xffff, /* dst_mask */
597 FALSE), /* pcrel_offset */
598
599 /* 32-bit PC relative. */
600 HOWTO (R_PPC64_REL32, /* type */
601 0, /* rightshift */
602 2, /* size (0 = byte, 1 = short, 2 = long) */
603 32, /* bitsize */
604 TRUE, /* pc_relative */
605 0, /* bitpos */
606 /* FIXME: Verify. Was complain_overflow_bitfield. */
607 complain_overflow_signed, /* complain_on_overflow */
608 bfd_elf_generic_reloc, /* special_function */
609 "R_PPC64_REL32", /* name */
610 FALSE, /* partial_inplace */
611 0, /* src_mask */
612 0xffffffff, /* dst_mask */
613 TRUE), /* pcrel_offset */
614
615 /* 32-bit relocation to the symbol's procedure linkage table. */
616 HOWTO (R_PPC64_PLT32, /* type */
617 0, /* rightshift */
618 2, /* size (0 = byte, 1 = short, 2 = long) */
619 32, /* bitsize */
620 FALSE, /* pc_relative */
621 0, /* bitpos */
622 complain_overflow_bitfield, /* complain_on_overflow */
623 ppc64_elf_unhandled_reloc, /* special_function */
624 "R_PPC64_PLT32", /* name */
625 FALSE, /* partial_inplace */
626 0, /* src_mask */
627 0xffffffff, /* dst_mask */
628 FALSE), /* pcrel_offset */
629
630 /* 32-bit PC relative relocation to the symbol's procedure linkage table.
631 FIXME: R_PPC64_PLTREL32 not supported. */
632 HOWTO (R_PPC64_PLTREL32, /* type */
633 0, /* rightshift */
634 2, /* size (0 = byte, 1 = short, 2 = long) */
635 32, /* bitsize */
636 TRUE, /* pc_relative */
637 0, /* bitpos */
638 complain_overflow_signed, /* complain_on_overflow */
639 bfd_elf_generic_reloc, /* special_function */
640 "R_PPC64_PLTREL32", /* name */
641 FALSE, /* partial_inplace */
642 0, /* src_mask */
643 0xffffffff, /* dst_mask */
644 TRUE), /* pcrel_offset */
645
646 /* Like R_PPC64_ADDR16_LO, but referring to the PLT table entry for
647 the symbol. */
648 HOWTO (R_PPC64_PLT16_LO, /* type */
649 0, /* rightshift */
650 1, /* size (0 = byte, 1 = short, 2 = long) */
651 16, /* bitsize */
652 FALSE, /* pc_relative */
653 0, /* bitpos */
654 complain_overflow_dont, /* complain_on_overflow */
655 ppc64_elf_unhandled_reloc, /* special_function */
656 "R_PPC64_PLT16_LO", /* name */
657 FALSE, /* partial_inplace */
658 0, /* src_mask */
659 0xffff, /* dst_mask */
660 FALSE), /* pcrel_offset */
661
662 /* Like R_PPC64_ADDR16_HI, but referring to the PLT table entry for
663 the symbol. */
664 HOWTO (R_PPC64_PLT16_HI, /* type */
665 16, /* rightshift */
666 1, /* size (0 = byte, 1 = short, 2 = long) */
667 16, /* bitsize */
668 FALSE, /* pc_relative */
669 0, /* bitpos */
670 complain_overflow_dont, /* complain_on_overflow */
671 ppc64_elf_unhandled_reloc, /* special_function */
672 "R_PPC64_PLT16_HI", /* name */
673 FALSE, /* partial_inplace */
674 0, /* src_mask */
675 0xffff, /* dst_mask */
676 FALSE), /* pcrel_offset */
677
678 /* Like R_PPC64_ADDR16_HA, but referring to the PLT table entry for
679 the symbol. */
680 HOWTO (R_PPC64_PLT16_HA, /* type */
681 16, /* rightshift */
682 1, /* size (0 = byte, 1 = short, 2 = long) */
683 16, /* bitsize */
684 FALSE, /* pc_relative */
685 0, /* bitpos */
686 complain_overflow_dont, /* complain_on_overflow */
687 ppc64_elf_unhandled_reloc, /* special_function */
688 "R_PPC64_PLT16_HA", /* name */
689 FALSE, /* partial_inplace */
690 0, /* src_mask */
691 0xffff, /* dst_mask */
692 FALSE), /* pcrel_offset */
693
694 /* 16-bit section relative relocation. */
695 HOWTO (R_PPC64_SECTOFF, /* type */
696 0, /* rightshift */
697 1, /* size (0 = byte, 1 = short, 2 = long) */
698 16, /* bitsize */
699 FALSE, /* pc_relative */
700 0, /* bitpos */
701 complain_overflow_bitfield, /* complain_on_overflow */
702 ppc64_elf_sectoff_reloc, /* special_function */
703 "R_PPC64_SECTOFF", /* name */
704 FALSE, /* partial_inplace */
705 0, /* src_mask */
706 0xffff, /* dst_mask */
707 FALSE), /* pcrel_offset */
708
709 /* Like R_PPC64_SECTOFF, but no overflow warning. */
710 HOWTO (R_PPC64_SECTOFF_LO, /* type */
711 0, /* rightshift */
712 1, /* size (0 = byte, 1 = short, 2 = long) */
713 16, /* bitsize */
714 FALSE, /* pc_relative */
715 0, /* bitpos */
716 complain_overflow_dont, /* complain_on_overflow */
717 ppc64_elf_sectoff_reloc, /* special_function */
718 "R_PPC64_SECTOFF_LO", /* name */
719 FALSE, /* partial_inplace */
720 0, /* src_mask */
721 0xffff, /* dst_mask */
722 FALSE), /* pcrel_offset */
723
724 /* 16-bit upper half section relative relocation. */
725 HOWTO (R_PPC64_SECTOFF_HI, /* type */
726 16, /* rightshift */
727 1, /* size (0 = byte, 1 = short, 2 = long) */
728 16, /* bitsize */
729 FALSE, /* pc_relative */
730 0, /* bitpos */
731 complain_overflow_dont, /* complain_on_overflow */
732 ppc64_elf_sectoff_reloc, /* special_function */
733 "R_PPC64_SECTOFF_HI", /* name */
734 FALSE, /* partial_inplace */
735 0, /* src_mask */
736 0xffff, /* dst_mask */
737 FALSE), /* pcrel_offset */
738
739 /* 16-bit upper half adjusted section relative relocation. */
740 HOWTO (R_PPC64_SECTOFF_HA, /* type */
741 16, /* rightshift */
742 1, /* size (0 = byte, 1 = short, 2 = long) */
743 16, /* bitsize */
744 FALSE, /* pc_relative */
745 0, /* bitpos */
746 complain_overflow_dont, /* complain_on_overflow */
747 ppc64_elf_sectoff_ha_reloc, /* special_function */
748 "R_PPC64_SECTOFF_HA", /* name */
749 FALSE, /* partial_inplace */
750 0, /* src_mask */
751 0xffff, /* dst_mask */
752 FALSE), /* pcrel_offset */
753
754 /* Like R_PPC64_REL24 without touching the two least significant bits. */
755 HOWTO (R_PPC64_REL30, /* type */
756 2, /* rightshift */
757 2, /* size (0 = byte, 1 = short, 2 = long) */
758 30, /* bitsize */
759 TRUE, /* pc_relative */
760 0, /* bitpos */
761 complain_overflow_dont, /* complain_on_overflow */
762 bfd_elf_generic_reloc, /* special_function */
763 "R_PPC64_REL30", /* name */
764 FALSE, /* partial_inplace */
765 0, /* src_mask */
766 0xfffffffc, /* dst_mask */
767 TRUE), /* pcrel_offset */
768
769 /* Relocs in the 64-bit PowerPC ELF ABI, not in the 32-bit ABI. */
770
771 /* A standard 64-bit relocation. */
772 HOWTO (R_PPC64_ADDR64, /* type */
773 0, /* rightshift */
774 4, /* size (0=byte, 1=short, 2=long, 4=64 bits) */
775 64, /* bitsize */
776 FALSE, /* pc_relative */
777 0, /* bitpos */
778 complain_overflow_dont, /* complain_on_overflow */
779 bfd_elf_generic_reloc, /* special_function */
780 "R_PPC64_ADDR64", /* name */
781 FALSE, /* partial_inplace */
782 0, /* src_mask */
783 ONES (64), /* dst_mask */
784 FALSE), /* pcrel_offset */
785
786 /* The bits 32-47 of an address. */
787 HOWTO (R_PPC64_ADDR16_HIGHER, /* type */
788 32, /* rightshift */
789 1, /* size (0 = byte, 1 = short, 2 = long) */
790 16, /* bitsize */
791 FALSE, /* pc_relative */
792 0, /* bitpos */
793 complain_overflow_dont, /* complain_on_overflow */
794 bfd_elf_generic_reloc, /* special_function */
795 "R_PPC64_ADDR16_HIGHER", /* name */
796 FALSE, /* partial_inplace */
797 0, /* src_mask */
798 0xffff, /* dst_mask */
799 FALSE), /* pcrel_offset */
800
801 /* The bits 32-47 of an address, plus 1 if the contents of the low
802 16 bits, treated as a signed number, is negative. */
803 HOWTO (R_PPC64_ADDR16_HIGHERA, /* type */
804 32, /* rightshift */
805 1, /* size (0 = byte, 1 = short, 2 = long) */
806 16, /* bitsize */
807 FALSE, /* pc_relative */
808 0, /* bitpos */
809 complain_overflow_dont, /* complain_on_overflow */
810 ppc64_elf_ha_reloc, /* special_function */
811 "R_PPC64_ADDR16_HIGHERA", /* name */
812 FALSE, /* partial_inplace */
813 0, /* src_mask */
814 0xffff, /* dst_mask */
815 FALSE), /* pcrel_offset */
816
817 /* The bits 48-63 of an address. */
818 HOWTO (R_PPC64_ADDR16_HIGHEST,/* type */
819 48, /* rightshift */
820 1, /* size (0 = byte, 1 = short, 2 = long) */
821 16, /* bitsize */
822 FALSE, /* pc_relative */
823 0, /* bitpos */
824 complain_overflow_dont, /* complain_on_overflow */
825 bfd_elf_generic_reloc, /* special_function */
826 "R_PPC64_ADDR16_HIGHEST", /* name */
827 FALSE, /* partial_inplace */
828 0, /* src_mask */
829 0xffff, /* dst_mask */
830 FALSE), /* pcrel_offset */
831
832 /* The bits 48-63 of an address, plus 1 if the contents of the low
833 16 bits, treated as a signed number, is negative. */
834 HOWTO (R_PPC64_ADDR16_HIGHESTA,/* type */
835 48, /* rightshift */
836 1, /* size (0 = byte, 1 = short, 2 = long) */
837 16, /* bitsize */
838 FALSE, /* pc_relative */
839 0, /* bitpos */
840 complain_overflow_dont, /* complain_on_overflow */
841 ppc64_elf_ha_reloc, /* special_function */
842 "R_PPC64_ADDR16_HIGHESTA", /* name */
843 FALSE, /* partial_inplace */
844 0, /* src_mask */
845 0xffff, /* dst_mask */
846 FALSE), /* pcrel_offset */
847
848 /* Like ADDR64, but may be unaligned. */
849 HOWTO (R_PPC64_UADDR64, /* type */
850 0, /* rightshift */
851 4, /* size (0=byte, 1=short, 2=long, 4=64 bits) */
852 64, /* bitsize */
853 FALSE, /* pc_relative */
854 0, /* bitpos */
855 complain_overflow_dont, /* complain_on_overflow */
856 bfd_elf_generic_reloc, /* special_function */
857 "R_PPC64_UADDR64", /* name */
858 FALSE, /* partial_inplace */
859 0, /* src_mask */
860 ONES (64), /* dst_mask */
861 FALSE), /* pcrel_offset */
862
863 /* 64-bit relative relocation. */
864 HOWTO (R_PPC64_REL64, /* type */
865 0, /* rightshift */
866 4, /* size (0=byte, 1=short, 2=long, 4=64 bits) */
867 64, /* bitsize */
868 TRUE, /* pc_relative */
869 0, /* bitpos */
870 complain_overflow_dont, /* complain_on_overflow */
871 bfd_elf_generic_reloc, /* special_function */
872 "R_PPC64_REL64", /* name */
873 FALSE, /* partial_inplace */
874 0, /* src_mask */
875 ONES (64), /* dst_mask */
876 TRUE), /* pcrel_offset */
877
878 /* 64-bit relocation to the symbol's procedure linkage table. */
879 HOWTO (R_PPC64_PLT64, /* type */
880 0, /* rightshift */
881 4, /* size (0=byte, 1=short, 2=long, 4=64 bits) */
882 64, /* bitsize */
883 FALSE, /* pc_relative */
884 0, /* bitpos */
885 complain_overflow_dont, /* complain_on_overflow */
886 ppc64_elf_unhandled_reloc, /* special_function */
887 "R_PPC64_PLT64", /* name */
888 FALSE, /* partial_inplace */
889 0, /* src_mask */
890 ONES (64), /* dst_mask */
891 FALSE), /* pcrel_offset */
892
893 /* 64-bit PC relative relocation to the symbol's procedure linkage
894 table. */
895 /* FIXME: R_PPC64_PLTREL64 not supported. */
896 HOWTO (R_PPC64_PLTREL64, /* type */
897 0, /* rightshift */
898 4, /* size (0=byte, 1=short, 2=long, 4=64 bits) */
899 64, /* bitsize */
900 TRUE, /* pc_relative */
901 0, /* bitpos */
902 complain_overflow_dont, /* complain_on_overflow */
903 ppc64_elf_unhandled_reloc, /* special_function */
904 "R_PPC64_PLTREL64", /* name */
905 FALSE, /* partial_inplace */
906 0, /* src_mask */
907 ONES (64), /* dst_mask */
908 TRUE), /* pcrel_offset */
909
910 /* 16 bit TOC-relative relocation. */
911
912 /* R_PPC64_TOC16 47 half16* S + A - .TOC. */
913 HOWTO (R_PPC64_TOC16, /* type */
914 0, /* rightshift */
915 1, /* size (0 = byte, 1 = short, 2 = long) */
916 16, /* bitsize */
917 FALSE, /* pc_relative */
918 0, /* bitpos */
919 complain_overflow_signed, /* complain_on_overflow */
920 ppc64_elf_toc_reloc, /* special_function */
921 "R_PPC64_TOC16", /* name */
922 FALSE, /* partial_inplace */
923 0, /* src_mask */
924 0xffff, /* dst_mask */
925 FALSE), /* pcrel_offset */
926
927 /* 16 bit TOC-relative relocation without overflow. */
928
929 /* R_PPC64_TOC16_LO 48 half16 #lo (S + A - .TOC.) */
930 HOWTO (R_PPC64_TOC16_LO, /* type */
931 0, /* rightshift */
932 1, /* size (0 = byte, 1 = short, 2 = long) */
933 16, /* bitsize */
934 FALSE, /* pc_relative */
935 0, /* bitpos */
936 complain_overflow_dont, /* complain_on_overflow */
937 ppc64_elf_toc_reloc, /* special_function */
938 "R_PPC64_TOC16_LO", /* name */
939 FALSE, /* partial_inplace */
940 0, /* src_mask */
941 0xffff, /* dst_mask */
942 FALSE), /* pcrel_offset */
943
944 /* 16 bit TOC-relative relocation, high 16 bits. */
945
946 /* R_PPC64_TOC16_HI 49 half16 #hi (S + A - .TOC.) */
947 HOWTO (R_PPC64_TOC16_HI, /* type */
948 16, /* rightshift */
949 1, /* size (0 = byte, 1 = short, 2 = long) */
950 16, /* bitsize */
951 FALSE, /* pc_relative */
952 0, /* bitpos */
953 complain_overflow_dont, /* complain_on_overflow */
954 ppc64_elf_toc_reloc, /* special_function */
955 "R_PPC64_TOC16_HI", /* name */
956 FALSE, /* partial_inplace */
957 0, /* src_mask */
958 0xffff, /* dst_mask */
959 FALSE), /* pcrel_offset */
960
961 /* 16 bit TOC-relative relocation, high 16 bits, plus 1 if the
962 contents of the low 16 bits, treated as a signed number, is
963 negative. */
964
965 /* R_PPC64_TOC16_HA 50 half16 #ha (S + A - .TOC.) */
966 HOWTO (R_PPC64_TOC16_HA, /* type */
967 16, /* rightshift */
968 1, /* size (0 = byte, 1 = short, 2 = long) */
969 16, /* bitsize */
970 FALSE, /* pc_relative */
971 0, /* bitpos */
972 complain_overflow_dont, /* complain_on_overflow */
973 ppc64_elf_toc_ha_reloc, /* special_function */
974 "R_PPC64_TOC16_HA", /* name */
975 FALSE, /* partial_inplace */
976 0, /* src_mask */
977 0xffff, /* dst_mask */
978 FALSE), /* pcrel_offset */
979
980 /* 64-bit relocation; insert value of TOC base (.TOC.). */
981
982 /* R_PPC64_TOC 51 doubleword64 .TOC. */
983 HOWTO (R_PPC64_TOC, /* type */
984 0, /* rightshift */
985 4, /* size (0=byte, 1=short, 2=long, 4=64 bits) */
986 64, /* bitsize */
987 FALSE, /* pc_relative */
988 0, /* bitpos */
989 complain_overflow_bitfield, /* complain_on_overflow */
990 ppc64_elf_toc64_reloc, /* special_function */
991 "R_PPC64_TOC", /* name */
992 FALSE, /* partial_inplace */
993 0, /* src_mask */
994 ONES (64), /* dst_mask */
995 FALSE), /* pcrel_offset */
996
997 /* Like R_PPC64_GOT16, but also informs the link editor that the
998 value to relocate may (!) refer to a PLT entry which the link
999 editor (a) may replace with the symbol value. If the link editor
1000 is unable to fully resolve the symbol, it may (b) create a PLT
1001 entry and store the address to the new PLT entry in the GOT.
1002 This permits lazy resolution of function symbols at run time.
1003 The link editor may also skip all of this and just (c) emit a
1004 R_PPC64_GLOB_DAT to tie the symbol to the GOT entry. */
1005 /* FIXME: R_PPC64_PLTGOT16 not implemented. */
1006 HOWTO (R_PPC64_PLTGOT16, /* type */
1007 0, /* rightshift */
1008 1, /* size (0 = byte, 1 = short, 2 = long) */
1009 16, /* bitsize */
1010 FALSE, /* pc_relative */
1011 0, /* bitpos */
1012 complain_overflow_signed, /* complain_on_overflow */
1013 ppc64_elf_unhandled_reloc, /* special_function */
1014 "R_PPC64_PLTGOT16", /* name */
1015 FALSE, /* partial_inplace */
1016 0, /* src_mask */
1017 0xffff, /* dst_mask */
1018 FALSE), /* pcrel_offset */
1019
1020 /* Like R_PPC64_PLTGOT16, but without overflow. */
1021 /* FIXME: R_PPC64_PLTGOT16_LO not implemented. */
1022 HOWTO (R_PPC64_PLTGOT16_LO, /* type */
1023 0, /* rightshift */
1024 1, /* size (0 = byte, 1 = short, 2 = long) */
1025 16, /* bitsize */
1026 FALSE, /* pc_relative */
1027 0, /* bitpos */
1028 complain_overflow_dont, /* complain_on_overflow */
1029 ppc64_elf_unhandled_reloc, /* special_function */
1030 "R_PPC64_PLTGOT16_LO", /* name */
1031 FALSE, /* partial_inplace */
1032 0, /* src_mask */
1033 0xffff, /* dst_mask */
1034 FALSE), /* pcrel_offset */
1035
1036 /* Like R_PPC64_PLT_GOT16, but using bits 16-31 of the address. */
1037 /* FIXME: R_PPC64_PLTGOT16_HI not implemented. */
1038 HOWTO (R_PPC64_PLTGOT16_HI, /* type */
1039 16, /* rightshift */
1040 1, /* size (0 = byte, 1 = short, 2 = long) */
1041 16, /* bitsize */
1042 FALSE, /* pc_relative */
1043 0, /* bitpos */
1044 complain_overflow_dont, /* complain_on_overflow */
1045 ppc64_elf_unhandled_reloc, /* special_function */
1046 "R_PPC64_PLTGOT16_HI", /* name */
1047 FALSE, /* partial_inplace */
1048 0, /* src_mask */
1049 0xffff, /* dst_mask */
1050 FALSE), /* pcrel_offset */
1051
1052 /* Like R_PPC64_PLT_GOT16, but using bits 16-31 of the address, plus
1053 1 if the contents of the low 16 bits, treated as a signed number,
1054 is negative. */
1055 /* FIXME: R_PPC64_PLTGOT16_HA not implemented. */
1056 HOWTO (R_PPC64_PLTGOT16_HA, /* type */
1057 16, /* rightshift */
1058 1, /* size (0 = byte, 1 = short, 2 = long) */
1059 16, /* bitsize */
1060 FALSE, /* pc_relative */
1061 0, /* bitpos */
1062 complain_overflow_dont,/* complain_on_overflow */
1063 ppc64_elf_unhandled_reloc, /* special_function */
1064 "R_PPC64_PLTGOT16_HA", /* name */
1065 FALSE, /* partial_inplace */
1066 0, /* src_mask */
1067 0xffff, /* dst_mask */
1068 FALSE), /* pcrel_offset */
1069
1070 /* Like R_PPC64_ADDR16, but for instructions with a DS field. */
1071 HOWTO (R_PPC64_ADDR16_DS, /* type */
1072 0, /* rightshift */
1073 1, /* size (0 = byte, 1 = short, 2 = long) */
1074 16, /* bitsize */
1075 FALSE, /* pc_relative */
1076 0, /* bitpos */
1077 complain_overflow_bitfield, /* complain_on_overflow */
1078 bfd_elf_generic_reloc, /* special_function */
1079 "R_PPC64_ADDR16_DS", /* name */
1080 FALSE, /* partial_inplace */
1081 0, /* src_mask */
1082 0xfffc, /* dst_mask */
1083 FALSE), /* pcrel_offset */
1084
1085 /* Like R_PPC64_ADDR16_LO, but for instructions with a DS field. */
1086 HOWTO (R_PPC64_ADDR16_LO_DS, /* type */
1087 0, /* rightshift */
1088 1, /* size (0 = byte, 1 = short, 2 = long) */
1089 16, /* bitsize */
1090 FALSE, /* pc_relative */
1091 0, /* bitpos */
1092 complain_overflow_dont,/* complain_on_overflow */
1093 bfd_elf_generic_reloc, /* special_function */
1094 "R_PPC64_ADDR16_LO_DS",/* name */
1095 FALSE, /* partial_inplace */
1096 0, /* src_mask */
1097 0xfffc, /* dst_mask */
1098 FALSE), /* pcrel_offset */
1099
1100 /* Like R_PPC64_GOT16, but for instructions with a DS field. */
1101 HOWTO (R_PPC64_GOT16_DS, /* type */
1102 0, /* rightshift */
1103 1, /* size (0 = byte, 1 = short, 2 = long) */
1104 16, /* bitsize */
1105 FALSE, /* pc_relative */
1106 0, /* bitpos */
1107 complain_overflow_signed, /* complain_on_overflow */
1108 ppc64_elf_unhandled_reloc, /* special_function */
1109 "R_PPC64_GOT16_DS", /* name */
1110 FALSE, /* partial_inplace */
1111 0, /* src_mask */
1112 0xfffc, /* dst_mask */
1113 FALSE), /* pcrel_offset */
1114
1115 /* Like R_PPC64_GOT16_LO, but for instructions with a DS field. */
1116 HOWTO (R_PPC64_GOT16_LO_DS, /* type */
1117 0, /* rightshift */
1118 1, /* size (0 = byte, 1 = short, 2 = long) */
1119 16, /* bitsize */
1120 FALSE, /* pc_relative */
1121 0, /* bitpos */
1122 complain_overflow_dont, /* complain_on_overflow */
1123 ppc64_elf_unhandled_reloc, /* special_function */
1124 "R_PPC64_GOT16_LO_DS", /* name */
1125 FALSE, /* partial_inplace */
1126 0, /* src_mask */
1127 0xfffc, /* dst_mask */
1128 FALSE), /* pcrel_offset */
1129
1130 /* Like R_PPC64_PLT16_LO, but for instructions with a DS field. */
1131 HOWTO (R_PPC64_PLT16_LO_DS, /* type */
1132 0, /* rightshift */
1133 1, /* size (0 = byte, 1 = short, 2 = long) */
1134 16, /* bitsize */
1135 FALSE, /* pc_relative */
1136 0, /* bitpos */
1137 complain_overflow_dont, /* complain_on_overflow */
1138 ppc64_elf_unhandled_reloc, /* special_function */
1139 "R_PPC64_PLT16_LO_DS", /* name */
1140 FALSE, /* partial_inplace */
1141 0, /* src_mask */
1142 0xfffc, /* dst_mask */
1143 FALSE), /* pcrel_offset */
1144
1145 /* Like R_PPC64_SECTOFF, but for instructions with a DS field. */
1146 HOWTO (R_PPC64_SECTOFF_DS, /* type */
1147 0, /* rightshift */
1148 1, /* size (0 = byte, 1 = short, 2 = long) */
1149 16, /* bitsize */
1150 FALSE, /* pc_relative */
1151 0, /* bitpos */
1152 complain_overflow_bitfield, /* complain_on_overflow */
1153 ppc64_elf_sectoff_reloc, /* special_function */
1154 "R_PPC64_SECTOFF_DS", /* name */
1155 FALSE, /* partial_inplace */
1156 0, /* src_mask */
1157 0xfffc, /* dst_mask */
1158 FALSE), /* pcrel_offset */
1159
1160 /* Like R_PPC64_SECTOFF_LO, but for instructions with a DS field. */
1161 HOWTO (R_PPC64_SECTOFF_LO_DS, /* type */
1162 0, /* rightshift */
1163 1, /* size (0 = byte, 1 = short, 2 = long) */
1164 16, /* bitsize */
1165 FALSE, /* pc_relative */
1166 0, /* bitpos */
1167 complain_overflow_dont, /* complain_on_overflow */
1168 ppc64_elf_sectoff_reloc, /* special_function */
1169 "R_PPC64_SECTOFF_LO_DS",/* name */
1170 FALSE, /* partial_inplace */
1171 0, /* src_mask */
1172 0xfffc, /* dst_mask */
1173 FALSE), /* pcrel_offset */
1174
1175 /* Like R_PPC64_TOC16, but for instructions with a DS field. */
1176 HOWTO (R_PPC64_TOC16_DS, /* type */
1177 0, /* rightshift */
1178 1, /* size (0 = byte, 1 = short, 2 = long) */
1179 16, /* bitsize */
1180 FALSE, /* pc_relative */
1181 0, /* bitpos */
1182 complain_overflow_signed, /* complain_on_overflow */
1183 ppc64_elf_toc_reloc, /* special_function */
1184 "R_PPC64_TOC16_DS", /* name */
1185 FALSE, /* partial_inplace */
1186 0, /* src_mask */
1187 0xfffc, /* dst_mask */
1188 FALSE), /* pcrel_offset */
1189
1190 /* Like R_PPC64_TOC16_LO, but for instructions with a DS field. */
1191 HOWTO (R_PPC64_TOC16_LO_DS, /* type */
1192 0, /* rightshift */
1193 1, /* size (0 = byte, 1 = short, 2 = long) */
1194 16, /* bitsize */
1195 FALSE, /* pc_relative */
1196 0, /* bitpos */
1197 complain_overflow_dont, /* complain_on_overflow */
1198 ppc64_elf_toc_reloc, /* special_function */
1199 "R_PPC64_TOC16_LO_DS", /* name */
1200 FALSE, /* partial_inplace */
1201 0, /* src_mask */
1202 0xfffc, /* dst_mask */
1203 FALSE), /* pcrel_offset */
1204
1205 /* Like R_PPC64_PLTGOT16, but for instructions with a DS field. */
1206 /* FIXME: R_PPC64_PLTGOT16_DS not implemented. */
1207 HOWTO (R_PPC64_PLTGOT16_DS, /* type */
1208 0, /* rightshift */
1209 1, /* size (0 = byte, 1 = short, 2 = long) */
1210 16, /* bitsize */
1211 FALSE, /* pc_relative */
1212 0, /* bitpos */
1213 complain_overflow_signed, /* complain_on_overflow */
1214 ppc64_elf_unhandled_reloc, /* special_function */
1215 "R_PPC64_PLTGOT16_DS", /* name */
1216 FALSE, /* partial_inplace */
1217 0, /* src_mask */
1218 0xfffc, /* dst_mask */
1219 FALSE), /* pcrel_offset */
1220
1221 /* Like R_PPC64_PLTGOT16_LO, but for instructions with a DS field. */
1222 /* FIXME: R_PPC64_PLTGOT16_LO not implemented. */
1223 HOWTO (R_PPC64_PLTGOT16_LO_DS,/* type */
1224 0, /* rightshift */
1225 1, /* size (0 = byte, 1 = short, 2 = long) */
1226 16, /* bitsize */
1227 FALSE, /* pc_relative */
1228 0, /* bitpos */
1229 complain_overflow_dont, /* complain_on_overflow */
1230 ppc64_elf_unhandled_reloc, /* special_function */
1231 "R_PPC64_PLTGOT16_LO_DS",/* name */
1232 FALSE, /* partial_inplace */
1233 0, /* src_mask */
1234 0xfffc, /* dst_mask */
1235 FALSE), /* pcrel_offset */
1236
1237 /* Marker reloc for TLS. */
1238 HOWTO (R_PPC64_TLS,
1239 0, /* rightshift */
1240 2, /* size (0 = byte, 1 = short, 2 = long) */
1241 32, /* bitsize */
1242 FALSE, /* pc_relative */
1243 0, /* bitpos */
1244 complain_overflow_dont, /* complain_on_overflow */
1245 bfd_elf_generic_reloc, /* special_function */
1246 "R_PPC64_TLS", /* name */
1247 FALSE, /* partial_inplace */
1248 0, /* src_mask */
1249 0, /* dst_mask */
1250 FALSE), /* pcrel_offset */
1251
1252 /* Computes the load module index of the load module that contains the
1253 definition of its TLS sym. */
1254 HOWTO (R_PPC64_DTPMOD64,
1255 0, /* rightshift */
1256 4, /* size (0 = byte, 1 = short, 2 = long) */
1257 64, /* bitsize */
1258 FALSE, /* pc_relative */
1259 0, /* bitpos */
1260 complain_overflow_dont, /* complain_on_overflow */
1261 ppc64_elf_unhandled_reloc, /* special_function */
1262 "R_PPC64_DTPMOD64", /* name */
1263 FALSE, /* partial_inplace */
1264 0, /* src_mask */
1265 ONES (64), /* dst_mask */
1266 FALSE), /* pcrel_offset */
1267
1268 /* Computes a dtv-relative displacement, the difference between the value
1269 of sym+add and the base address of the thread-local storage block that
1270 contains the definition of sym, minus 0x8000. */
1271 HOWTO (R_PPC64_DTPREL64,
1272 0, /* rightshift */
1273 4, /* size (0 = byte, 1 = short, 2 = long) */
1274 64, /* bitsize */
1275 FALSE, /* pc_relative */
1276 0, /* bitpos */
1277 complain_overflow_dont, /* complain_on_overflow */
1278 ppc64_elf_unhandled_reloc, /* special_function */
1279 "R_PPC64_DTPREL64", /* name */
1280 FALSE, /* partial_inplace */
1281 0, /* src_mask */
1282 ONES (64), /* dst_mask */
1283 FALSE), /* pcrel_offset */
1284
1285 /* A 16 bit dtprel reloc. */
1286 HOWTO (R_PPC64_DTPREL16,
1287 0, /* rightshift */
1288 1, /* size (0 = byte, 1 = short, 2 = long) */
1289 16, /* bitsize */
1290 FALSE, /* pc_relative */
1291 0, /* bitpos */
1292 complain_overflow_signed, /* complain_on_overflow */
1293 ppc64_elf_unhandled_reloc, /* special_function */
1294 "R_PPC64_DTPREL16", /* name */
1295 FALSE, /* partial_inplace */
1296 0, /* src_mask */
1297 0xffff, /* dst_mask */
1298 FALSE), /* pcrel_offset */
1299
1300 /* Like DTPREL16, but no overflow. */
1301 HOWTO (R_PPC64_DTPREL16_LO,
1302 0, /* rightshift */
1303 1, /* size (0 = byte, 1 = short, 2 = long) */
1304 16, /* bitsize */
1305 FALSE, /* pc_relative */
1306 0, /* bitpos */
1307 complain_overflow_dont, /* complain_on_overflow */
1308 ppc64_elf_unhandled_reloc, /* special_function */
1309 "R_PPC64_DTPREL16_LO", /* name */
1310 FALSE, /* partial_inplace */
1311 0, /* src_mask */
1312 0xffff, /* dst_mask */
1313 FALSE), /* pcrel_offset */
1314
1315 /* Like DTPREL16_LO, but next higher group of 16 bits. */
1316 HOWTO (R_PPC64_DTPREL16_HI,
1317 16, /* rightshift */
1318 1, /* size (0 = byte, 1 = short, 2 = long) */
1319 16, /* bitsize */
1320 FALSE, /* pc_relative */
1321 0, /* bitpos */
1322 complain_overflow_dont, /* complain_on_overflow */
1323 ppc64_elf_unhandled_reloc, /* special_function */
1324 "R_PPC64_DTPREL16_HI", /* name */
1325 FALSE, /* partial_inplace */
1326 0, /* src_mask */
1327 0xffff, /* dst_mask */
1328 FALSE), /* pcrel_offset */
1329
1330 /* Like DTPREL16_HI, but adjust for low 16 bits. */
1331 HOWTO (R_PPC64_DTPREL16_HA,
1332 16, /* rightshift */
1333 1, /* size (0 = byte, 1 = short, 2 = long) */
1334 16, /* bitsize */
1335 FALSE, /* pc_relative */
1336 0, /* bitpos */
1337 complain_overflow_dont, /* complain_on_overflow */
1338 ppc64_elf_unhandled_reloc, /* special_function */
1339 "R_PPC64_DTPREL16_HA", /* name */
1340 FALSE, /* partial_inplace */
1341 0, /* src_mask */
1342 0xffff, /* dst_mask */
1343 FALSE), /* pcrel_offset */
1344
1345 /* Like DTPREL16_HI, but next higher group of 16 bits. */
1346 HOWTO (R_PPC64_DTPREL16_HIGHER,
1347 32, /* rightshift */
1348 1, /* size (0 = byte, 1 = short, 2 = long) */
1349 16, /* bitsize */
1350 FALSE, /* pc_relative */
1351 0, /* bitpos */
1352 complain_overflow_dont, /* complain_on_overflow */
1353 ppc64_elf_unhandled_reloc, /* special_function */
1354 "R_PPC64_DTPREL16_HIGHER", /* name */
1355 FALSE, /* partial_inplace */
1356 0, /* src_mask */
1357 0xffff, /* dst_mask */
1358 FALSE), /* pcrel_offset */
1359
1360 /* Like DTPREL16_HIGHER, but adjust for low 16 bits. */
1361 HOWTO (R_PPC64_DTPREL16_HIGHERA,
1362 32, /* rightshift */
1363 1, /* size (0 = byte, 1 = short, 2 = long) */
1364 16, /* bitsize */
1365 FALSE, /* pc_relative */
1366 0, /* bitpos */
1367 complain_overflow_dont, /* complain_on_overflow */
1368 ppc64_elf_unhandled_reloc, /* special_function */
1369 "R_PPC64_DTPREL16_HIGHERA", /* name */
1370 FALSE, /* partial_inplace */
1371 0, /* src_mask */
1372 0xffff, /* dst_mask */
1373 FALSE), /* pcrel_offset */
1374
1375 /* Like DTPREL16_HIGHER, but next higher group of 16 bits. */
1376 HOWTO (R_PPC64_DTPREL16_HIGHEST,
1377 48, /* rightshift */
1378 1, /* size (0 = byte, 1 = short, 2 = long) */
1379 16, /* bitsize */
1380 FALSE, /* pc_relative */
1381 0, /* bitpos */
1382 complain_overflow_dont, /* complain_on_overflow */
1383 ppc64_elf_unhandled_reloc, /* special_function */
1384 "R_PPC64_DTPREL16_HIGHEST", /* name */
1385 FALSE, /* partial_inplace */
1386 0, /* src_mask */
1387 0xffff, /* dst_mask */
1388 FALSE), /* pcrel_offset */
1389
1390 /* Like DTPREL16_HIGHEST, but adjust for low 16 bits. */
1391 HOWTO (R_PPC64_DTPREL16_HIGHESTA,
1392 48, /* rightshift */
1393 1, /* size (0 = byte, 1 = short, 2 = long) */
1394 16, /* bitsize */
1395 FALSE, /* pc_relative */
1396 0, /* bitpos */
1397 complain_overflow_dont, /* complain_on_overflow */
1398 ppc64_elf_unhandled_reloc, /* special_function */
1399 "R_PPC64_DTPREL16_HIGHESTA", /* name */
1400 FALSE, /* partial_inplace */
1401 0, /* src_mask */
1402 0xffff, /* dst_mask */
1403 FALSE), /* pcrel_offset */
1404
1405 /* Like DTPREL16, but for insns with a DS field. */
1406 HOWTO (R_PPC64_DTPREL16_DS,
1407 0, /* rightshift */
1408 1, /* size (0 = byte, 1 = short, 2 = long) */
1409 16, /* bitsize */
1410 FALSE, /* pc_relative */
1411 0, /* bitpos */
1412 complain_overflow_signed, /* complain_on_overflow */
1413 ppc64_elf_unhandled_reloc, /* special_function */
1414 "R_PPC64_DTPREL16_DS", /* name */
1415 FALSE, /* partial_inplace */
1416 0, /* src_mask */
1417 0xfffc, /* dst_mask */
1418 FALSE), /* pcrel_offset */
1419
1420 /* Like DTPREL16_DS, but no overflow. */
1421 HOWTO (R_PPC64_DTPREL16_LO_DS,
1422 0, /* rightshift */
1423 1, /* size (0 = byte, 1 = short, 2 = long) */
1424 16, /* bitsize */
1425 FALSE, /* pc_relative */
1426 0, /* bitpos */
1427 complain_overflow_dont, /* complain_on_overflow */
1428 ppc64_elf_unhandled_reloc, /* special_function */
1429 "R_PPC64_DTPREL16_LO_DS", /* name */
1430 FALSE, /* partial_inplace */
1431 0, /* src_mask */
1432 0xfffc, /* dst_mask */
1433 FALSE), /* pcrel_offset */
1434
1435 /* Computes a tp-relative displacement, the difference between the value of
1436 sym+add and the value of the thread pointer (r13). */
1437 HOWTO (R_PPC64_TPREL64,
1438 0, /* rightshift */
1439 4, /* size (0 = byte, 1 = short, 2 = long) */
1440 64, /* bitsize */
1441 FALSE, /* pc_relative */
1442 0, /* bitpos */
1443 complain_overflow_dont, /* complain_on_overflow */
1444 ppc64_elf_unhandled_reloc, /* special_function */
1445 "R_PPC64_TPREL64", /* name */
1446 FALSE, /* partial_inplace */
1447 0, /* src_mask */
1448 ONES (64), /* dst_mask */
1449 FALSE), /* pcrel_offset */
1450
1451 /* A 16 bit tprel reloc. */
1452 HOWTO (R_PPC64_TPREL16,
1453 0, /* rightshift */
1454 1, /* size (0 = byte, 1 = short, 2 = long) */
1455 16, /* bitsize */
1456 FALSE, /* pc_relative */
1457 0, /* bitpos */
1458 complain_overflow_signed, /* complain_on_overflow */
1459 ppc64_elf_unhandled_reloc, /* special_function */
1460 "R_PPC64_TPREL16", /* name */
1461 FALSE, /* partial_inplace */
1462 0, /* src_mask */
1463 0xffff, /* dst_mask */
1464 FALSE), /* pcrel_offset */
1465
1466 /* Like TPREL16, but no overflow. */
1467 HOWTO (R_PPC64_TPREL16_LO,
1468 0, /* rightshift */
1469 1, /* size (0 = byte, 1 = short, 2 = long) */
1470 16, /* bitsize */
1471 FALSE, /* pc_relative */
1472 0, /* bitpos */
1473 complain_overflow_dont, /* complain_on_overflow */
1474 ppc64_elf_unhandled_reloc, /* special_function */
1475 "R_PPC64_TPREL16_LO", /* name */
1476 FALSE, /* partial_inplace */
1477 0, /* src_mask */
1478 0xffff, /* dst_mask */
1479 FALSE), /* pcrel_offset */
1480
1481 /* Like TPREL16_LO, but next higher group of 16 bits. */
1482 HOWTO (R_PPC64_TPREL16_HI,
1483 16, /* rightshift */
1484 1, /* size (0 = byte, 1 = short, 2 = long) */
1485 16, /* bitsize */
1486 FALSE, /* pc_relative */
1487 0, /* bitpos */
1488 complain_overflow_dont, /* complain_on_overflow */
1489 ppc64_elf_unhandled_reloc, /* special_function */
1490 "R_PPC64_TPREL16_HI", /* name */
1491 FALSE, /* partial_inplace */
1492 0, /* src_mask */
1493 0xffff, /* dst_mask */
1494 FALSE), /* pcrel_offset */
1495
1496 /* Like TPREL16_HI, but adjust for low 16 bits. */
1497 HOWTO (R_PPC64_TPREL16_HA,
1498 16, /* rightshift */
1499 1, /* size (0 = byte, 1 = short, 2 = long) */
1500 16, /* bitsize */
1501 FALSE, /* pc_relative */
1502 0, /* bitpos */
1503 complain_overflow_dont, /* complain_on_overflow */
1504 ppc64_elf_unhandled_reloc, /* special_function */
1505 "R_PPC64_TPREL16_HA", /* name */
1506 FALSE, /* partial_inplace */
1507 0, /* src_mask */
1508 0xffff, /* dst_mask */
1509 FALSE), /* pcrel_offset */
1510
1511 /* Like TPREL16_HI, but next higher group of 16 bits. */
1512 HOWTO (R_PPC64_TPREL16_HIGHER,
1513 32, /* rightshift */
1514 1, /* size (0 = byte, 1 = short, 2 = long) */
1515 16, /* bitsize */
1516 FALSE, /* pc_relative */
1517 0, /* bitpos */
1518 complain_overflow_dont, /* complain_on_overflow */
1519 ppc64_elf_unhandled_reloc, /* special_function */
1520 "R_PPC64_TPREL16_HIGHER", /* name */
1521 FALSE, /* partial_inplace */
1522 0, /* src_mask */
1523 0xffff, /* dst_mask */
1524 FALSE), /* pcrel_offset */
1525
1526 /* Like TPREL16_HIGHER, but adjust for low 16 bits. */
1527 HOWTO (R_PPC64_TPREL16_HIGHERA,
1528 32, /* rightshift */
1529 1, /* size (0 = byte, 1 = short, 2 = long) */
1530 16, /* bitsize */
1531 FALSE, /* pc_relative */
1532 0, /* bitpos */
1533 complain_overflow_dont, /* complain_on_overflow */
1534 ppc64_elf_unhandled_reloc, /* special_function */
1535 "R_PPC64_TPREL16_HIGHERA", /* name */
1536 FALSE, /* partial_inplace */
1537 0, /* src_mask */
1538 0xffff, /* dst_mask */
1539 FALSE), /* pcrel_offset */
1540
1541 /* Like TPREL16_HIGHER, but next higher group of 16 bits. */
1542 HOWTO (R_PPC64_TPREL16_HIGHEST,
1543 48, /* rightshift */
1544 1, /* size (0 = byte, 1 = short, 2 = long) */
1545 16, /* bitsize */
1546 FALSE, /* pc_relative */
1547 0, /* bitpos */
1548 complain_overflow_dont, /* complain_on_overflow */
1549 ppc64_elf_unhandled_reloc, /* special_function */
1550 "R_PPC64_TPREL16_HIGHEST", /* name */
1551 FALSE, /* partial_inplace */
1552 0, /* src_mask */
1553 0xffff, /* dst_mask */
1554 FALSE), /* pcrel_offset */
1555
1556 /* Like TPREL16_HIGHEST, but adjust for low 16 bits. */
1557 HOWTO (R_PPC64_TPREL16_HIGHESTA,
1558 48, /* rightshift */
1559 1, /* size (0 = byte, 1 = short, 2 = long) */
1560 16, /* bitsize */
1561 FALSE, /* pc_relative */
1562 0, /* bitpos */
1563 complain_overflow_dont, /* complain_on_overflow */
1564 ppc64_elf_unhandled_reloc, /* special_function */
1565 "R_PPC64_TPREL16_HIGHESTA", /* name */
1566 FALSE, /* partial_inplace */
1567 0, /* src_mask */
1568 0xffff, /* dst_mask */
1569 FALSE), /* pcrel_offset */
1570
1571 /* Like TPREL16, but for insns with a DS field. */
1572 HOWTO (R_PPC64_TPREL16_DS,
1573 0, /* rightshift */
1574 1, /* size (0 = byte, 1 = short, 2 = long) */
1575 16, /* bitsize */
1576 FALSE, /* pc_relative */
1577 0, /* bitpos */
1578 complain_overflow_signed, /* complain_on_overflow */
1579 ppc64_elf_unhandled_reloc, /* special_function */
1580 "R_PPC64_TPREL16_DS", /* name */
1581 FALSE, /* partial_inplace */
1582 0, /* src_mask */
1583 0xfffc, /* dst_mask */
1584 FALSE), /* pcrel_offset */
1585
1586 /* Like TPREL16_DS, but no overflow. */
1587 HOWTO (R_PPC64_TPREL16_LO_DS,
1588 0, /* rightshift */
1589 1, /* size (0 = byte, 1 = short, 2 = long) */
1590 16, /* bitsize */
1591 FALSE, /* pc_relative */
1592 0, /* bitpos */
1593 complain_overflow_dont, /* complain_on_overflow */
1594 ppc64_elf_unhandled_reloc, /* special_function */
1595 "R_PPC64_TPREL16_LO_DS", /* name */
1596 FALSE, /* partial_inplace */
1597 0, /* src_mask */
1598 0xfffc, /* dst_mask */
1599 FALSE), /* pcrel_offset */
1600
1601 /* Allocates two contiguous entries in the GOT to hold a tls_index structure,
1602 with values (sym+add)@dtpmod and (sym+add)@dtprel, and computes the offset
1603 to the first entry relative to the TOC base (r2). */
1604 HOWTO (R_PPC64_GOT_TLSGD16,
1605 0, /* rightshift */
1606 1, /* size (0 = byte, 1 = short, 2 = long) */
1607 16, /* bitsize */
1608 FALSE, /* pc_relative */
1609 0, /* bitpos */
1610 complain_overflow_signed, /* complain_on_overflow */
1611 ppc64_elf_unhandled_reloc, /* special_function */
1612 "R_PPC64_GOT_TLSGD16", /* name */
1613 FALSE, /* partial_inplace */
1614 0, /* src_mask */
1615 0xffff, /* dst_mask */
1616 FALSE), /* pcrel_offset */
1617
1618 /* Like GOT_TLSGD16, but no overflow. */
1619 HOWTO (R_PPC64_GOT_TLSGD16_LO,
1620 0, /* rightshift */
1621 1, /* size (0 = byte, 1 = short, 2 = long) */
1622 16, /* bitsize */
1623 FALSE, /* pc_relative */
1624 0, /* bitpos */
1625 complain_overflow_dont, /* complain_on_overflow */
1626 ppc64_elf_unhandled_reloc, /* special_function */
1627 "R_PPC64_GOT_TLSGD16_LO", /* name */
1628 FALSE, /* partial_inplace */
1629 0, /* src_mask */
1630 0xffff, /* dst_mask */
1631 FALSE), /* pcrel_offset */
1632
1633 /* Like GOT_TLSGD16_LO, but next higher group of 16 bits. */
1634 HOWTO (R_PPC64_GOT_TLSGD16_HI,
1635 16, /* rightshift */
1636 1, /* size (0 = byte, 1 = short, 2 = long) */
1637 16, /* bitsize */
1638 FALSE, /* pc_relative */
1639 0, /* bitpos */
1640 complain_overflow_dont, /* complain_on_overflow */
1641 ppc64_elf_unhandled_reloc, /* special_function */
1642 "R_PPC64_GOT_TLSGD16_HI", /* name */
1643 FALSE, /* partial_inplace */
1644 0, /* src_mask */
1645 0xffff, /* dst_mask */
1646 FALSE), /* pcrel_offset */
1647
1648 /* Like GOT_TLSGD16_HI, but adjust for low 16 bits. */
1649 HOWTO (R_PPC64_GOT_TLSGD16_HA,
1650 16, /* rightshift */
1651 1, /* size (0 = byte, 1 = short, 2 = long) */
1652 16, /* bitsize */
1653 FALSE, /* pc_relative */
1654 0, /* bitpos */
1655 complain_overflow_dont, /* complain_on_overflow */
1656 ppc64_elf_unhandled_reloc, /* special_function */
1657 "R_PPC64_GOT_TLSGD16_HA", /* name */
1658 FALSE, /* partial_inplace */
1659 0, /* src_mask */
1660 0xffff, /* dst_mask */
1661 FALSE), /* pcrel_offset */
1662
1663 /* Allocates two contiguous entries in the GOT to hold a tls_index structure,
1664 with values (sym+add)@dtpmod and zero, and computes the offset to the
1665 first entry relative to the TOC base (r2). */
1666 HOWTO (R_PPC64_GOT_TLSLD16,
1667 0, /* rightshift */
1668 1, /* size (0 = byte, 1 = short, 2 = long) */
1669 16, /* bitsize */
1670 FALSE, /* pc_relative */
1671 0, /* bitpos */
1672 complain_overflow_signed, /* complain_on_overflow */
1673 ppc64_elf_unhandled_reloc, /* special_function */
1674 "R_PPC64_GOT_TLSLD16", /* name */
1675 FALSE, /* partial_inplace */
1676 0, /* src_mask */
1677 0xffff, /* dst_mask */
1678 FALSE), /* pcrel_offset */
1679
1680 /* Like GOT_TLSLD16, but no overflow. */
1681 HOWTO (R_PPC64_GOT_TLSLD16_LO,
1682 0, /* rightshift */
1683 1, /* size (0 = byte, 1 = short, 2 = long) */
1684 16, /* bitsize */
1685 FALSE, /* pc_relative */
1686 0, /* bitpos */
1687 complain_overflow_dont, /* complain_on_overflow */
1688 ppc64_elf_unhandled_reloc, /* special_function */
1689 "R_PPC64_GOT_TLSLD16_LO", /* name */
1690 FALSE, /* partial_inplace */
1691 0, /* src_mask */
1692 0xffff, /* dst_mask */
1693 FALSE), /* pcrel_offset */
1694
1695 /* Like GOT_TLSLD16_LO, but next higher group of 16 bits. */
1696 HOWTO (R_PPC64_GOT_TLSLD16_HI,
1697 16, /* rightshift */
1698 1, /* size (0 = byte, 1 = short, 2 = long) */
1699 16, /* bitsize */
1700 FALSE, /* pc_relative */
1701 0, /* bitpos */
1702 complain_overflow_dont, /* complain_on_overflow */
1703 ppc64_elf_unhandled_reloc, /* special_function */
1704 "R_PPC64_GOT_TLSLD16_HI", /* name */
1705 FALSE, /* partial_inplace */
1706 0, /* src_mask */
1707 0xffff, /* dst_mask */
1708 FALSE), /* pcrel_offset */
1709
1710 /* Like GOT_TLSLD16_HI, but adjust for low 16 bits. */
1711 HOWTO (R_PPC64_GOT_TLSLD16_HA,
1712 16, /* rightshift */
1713 1, /* size (0 = byte, 1 = short, 2 = long) */
1714 16, /* bitsize */
1715 FALSE, /* pc_relative */
1716 0, /* bitpos */
1717 complain_overflow_dont, /* complain_on_overflow */
1718 ppc64_elf_unhandled_reloc, /* special_function */
1719 "R_PPC64_GOT_TLSLD16_HA", /* name */
1720 FALSE, /* partial_inplace */
1721 0, /* src_mask */
1722 0xffff, /* dst_mask */
1723 FALSE), /* pcrel_offset */
1724
1725 /* Allocates an entry in the GOT with value (sym+add)@dtprel, and computes
1726 the offset to the entry relative to the TOC base (r2). */
1727 HOWTO (R_PPC64_GOT_DTPREL16_DS,
1728 0, /* rightshift */
1729 1, /* size (0 = byte, 1 = short, 2 = long) */
1730 16, /* bitsize */
1731 FALSE, /* pc_relative */
1732 0, /* bitpos */
1733 complain_overflow_signed, /* complain_on_overflow */
1734 ppc64_elf_unhandled_reloc, /* special_function */
1735 "R_PPC64_GOT_DTPREL16_DS", /* name */
1736 FALSE, /* partial_inplace */
1737 0, /* src_mask */
1738 0xfffc, /* dst_mask */
1739 FALSE), /* pcrel_offset */
1740
1741 /* Like GOT_DTPREL16_DS, but no overflow. */
1742 HOWTO (R_PPC64_GOT_DTPREL16_LO_DS,
1743 0, /* rightshift */
1744 1, /* size (0 = byte, 1 = short, 2 = long) */
1745 16, /* bitsize */
1746 FALSE, /* pc_relative */
1747 0, /* bitpos */
1748 complain_overflow_dont, /* complain_on_overflow */
1749 ppc64_elf_unhandled_reloc, /* special_function */
1750 "R_PPC64_GOT_DTPREL16_LO_DS", /* name */
1751 FALSE, /* partial_inplace */
1752 0, /* src_mask */
1753 0xfffc, /* dst_mask */
1754 FALSE), /* pcrel_offset */
1755
1756 /* Like GOT_DTPREL16_LO_DS, but next higher group of 16 bits. */
1757 HOWTO (R_PPC64_GOT_DTPREL16_HI,
1758 16, /* rightshift */
1759 1, /* size (0 = byte, 1 = short, 2 = long) */
1760 16, /* bitsize */
1761 FALSE, /* pc_relative */
1762 0, /* bitpos */
1763 complain_overflow_dont, /* complain_on_overflow */
1764 ppc64_elf_unhandled_reloc, /* special_function */
1765 "R_PPC64_GOT_DTPREL16_HI", /* name */
1766 FALSE, /* partial_inplace */
1767 0, /* src_mask */
1768 0xffff, /* dst_mask */
1769 FALSE), /* pcrel_offset */
1770
1771 /* Like GOT_DTPREL16_HI, but adjust for low 16 bits. */
1772 HOWTO (R_PPC64_GOT_DTPREL16_HA,
1773 16, /* rightshift */
1774 1, /* size (0 = byte, 1 = short, 2 = long) */
1775 16, /* bitsize */
1776 FALSE, /* pc_relative */
1777 0, /* bitpos */
1778 complain_overflow_dont, /* complain_on_overflow */
1779 ppc64_elf_unhandled_reloc, /* special_function */
1780 "R_PPC64_GOT_DTPREL16_HA", /* name */
1781 FALSE, /* partial_inplace */
1782 0, /* src_mask */
1783 0xffff, /* dst_mask */
1784 FALSE), /* pcrel_offset */
1785
1786 /* Allocates an entry in the GOT with value (sym+add)@tprel, and computes the
1787 offset to the entry relative to the TOC base (r2). */
1788 HOWTO (R_PPC64_GOT_TPREL16_DS,
1789 0, /* rightshift */
1790 1, /* size (0 = byte, 1 = short, 2 = long) */
1791 16, /* bitsize */
1792 FALSE, /* pc_relative */
1793 0, /* bitpos */
1794 complain_overflow_signed, /* complain_on_overflow */
1795 ppc64_elf_unhandled_reloc, /* special_function */
1796 "R_PPC64_GOT_TPREL16_DS", /* name */
1797 FALSE, /* partial_inplace */
1798 0, /* src_mask */
1799 0xfffc, /* dst_mask */
1800 FALSE), /* pcrel_offset */
1801
1802 /* Like GOT_TPREL16_DS, but no overflow. */
1803 HOWTO (R_PPC64_GOT_TPREL16_LO_DS,
1804 0, /* rightshift */
1805 1, /* size (0 = byte, 1 = short, 2 = long) */
1806 16, /* bitsize */
1807 FALSE, /* pc_relative */
1808 0, /* bitpos */
1809 complain_overflow_dont, /* complain_on_overflow */
1810 ppc64_elf_unhandled_reloc, /* special_function */
1811 "R_PPC64_GOT_TPREL16_LO_DS", /* name */
1812 FALSE, /* partial_inplace */
1813 0, /* src_mask */
1814 0xfffc, /* dst_mask */
1815 FALSE), /* pcrel_offset */
1816
1817 /* Like GOT_TPREL16_LO_DS, but next higher group of 16 bits. */
1818 HOWTO (R_PPC64_GOT_TPREL16_HI,
1819 16, /* rightshift */
1820 1, /* size (0 = byte, 1 = short, 2 = long) */
1821 16, /* bitsize */
1822 FALSE, /* pc_relative */
1823 0, /* bitpos */
1824 complain_overflow_dont, /* complain_on_overflow */
1825 ppc64_elf_unhandled_reloc, /* special_function */
1826 "R_PPC64_GOT_TPREL16_HI", /* name */
1827 FALSE, /* partial_inplace */
1828 0, /* src_mask */
1829 0xffff, /* dst_mask */
1830 FALSE), /* pcrel_offset */
1831
1832 /* Like GOT_TPREL16_HI, but adjust for low 16 bits. */
1833 HOWTO (R_PPC64_GOT_TPREL16_HA,
1834 16, /* rightshift */
1835 1, /* size (0 = byte, 1 = short, 2 = long) */
1836 16, /* bitsize */
1837 FALSE, /* pc_relative */
1838 0, /* bitpos */
1839 complain_overflow_dont, /* complain_on_overflow */
1840 ppc64_elf_unhandled_reloc, /* special_function */
1841 "R_PPC64_GOT_TPREL16_HA", /* name */
1842 FALSE, /* partial_inplace */
1843 0, /* src_mask */
1844 0xffff, /* dst_mask */
1845 FALSE), /* pcrel_offset */
1846
1847 /* GNU extension to record C++ vtable hierarchy. */
1848 HOWTO (R_PPC64_GNU_VTINHERIT, /* type */
1849 0, /* rightshift */
1850 0, /* size (0 = byte, 1 = short, 2 = long) */
1851 0, /* bitsize */
1852 FALSE, /* pc_relative */
1853 0, /* bitpos */
1854 complain_overflow_dont, /* complain_on_overflow */
1855 NULL, /* special_function */
1856 "R_PPC64_GNU_VTINHERIT", /* name */
1857 FALSE, /* partial_inplace */
1858 0, /* src_mask */
1859 0, /* dst_mask */
1860 FALSE), /* pcrel_offset */
1861
1862 /* GNU extension to record C++ vtable member usage. */
1863 HOWTO (R_PPC64_GNU_VTENTRY, /* type */
1864 0, /* rightshift */
1865 0, /* size (0 = byte, 1 = short, 2 = long) */
1866 0, /* bitsize */
1867 FALSE, /* pc_relative */
1868 0, /* bitpos */
1869 complain_overflow_dont, /* complain_on_overflow */
1870 NULL, /* special_function */
1871 "R_PPC64_GNU_VTENTRY", /* name */
1872 FALSE, /* partial_inplace */
1873 0, /* src_mask */
1874 0, /* dst_mask */
1875 FALSE), /* pcrel_offset */
1876 };
1877
1878 \f
1879 /* Initialize the ppc64_elf_howto_table, so that linear accesses can
1880 be done. */
1881
1882 static void
1883 ppc_howto_init (void)
1884 {
1885 unsigned int i, type;
1886
1887 for (i = 0;
1888 i < sizeof (ppc64_elf_howto_raw) / sizeof (ppc64_elf_howto_raw[0]);
1889 i++)
1890 {
1891 type = ppc64_elf_howto_raw[i].type;
1892 BFD_ASSERT (type < (sizeof (ppc64_elf_howto_table)
1893 / sizeof (ppc64_elf_howto_table[0])));
1894 ppc64_elf_howto_table[type] = &ppc64_elf_howto_raw[i];
1895 }
1896 }
1897
1898 static reloc_howto_type *
1899 ppc64_elf_reloc_type_lookup (bfd *abfd ATTRIBUTE_UNUSED,
1900 bfd_reloc_code_real_type code)
1901 {
1902 enum elf_ppc64_reloc_type r = R_PPC64_NONE;
1903
1904 if (!ppc64_elf_howto_table[R_PPC64_ADDR32])
1905 /* Initialize howto table if needed. */
1906 ppc_howto_init ();
1907
1908 switch (code)
1909 {
1910 default:
1911 return NULL;
1912
1913 case BFD_RELOC_NONE: r = R_PPC64_NONE;
1914 break;
1915 case BFD_RELOC_32: r = R_PPC64_ADDR32;
1916 break;
1917 case BFD_RELOC_PPC_BA26: r = R_PPC64_ADDR24;
1918 break;
1919 case BFD_RELOC_16: r = R_PPC64_ADDR16;
1920 break;
1921 case BFD_RELOC_LO16: r = R_PPC64_ADDR16_LO;
1922 break;
1923 case BFD_RELOC_HI16: r = R_PPC64_ADDR16_HI;
1924 break;
1925 case BFD_RELOC_HI16_S: r = R_PPC64_ADDR16_HA;
1926 break;
1927 case BFD_RELOC_PPC_BA16: r = R_PPC64_ADDR14;
1928 break;
1929 case BFD_RELOC_PPC_BA16_BRTAKEN: r = R_PPC64_ADDR14_BRTAKEN;
1930 break;
1931 case BFD_RELOC_PPC_BA16_BRNTAKEN: r = R_PPC64_ADDR14_BRNTAKEN;
1932 break;
1933 case BFD_RELOC_PPC_B26: r = R_PPC64_REL24;
1934 break;
1935 case BFD_RELOC_PPC_B16: r = R_PPC64_REL14;
1936 break;
1937 case BFD_RELOC_PPC_B16_BRTAKEN: r = R_PPC64_REL14_BRTAKEN;
1938 break;
1939 case BFD_RELOC_PPC_B16_BRNTAKEN: r = R_PPC64_REL14_BRNTAKEN;
1940 break;
1941 case BFD_RELOC_16_GOTOFF: r = R_PPC64_GOT16;
1942 break;
1943 case BFD_RELOC_LO16_GOTOFF: r = R_PPC64_GOT16_LO;
1944 break;
1945 case BFD_RELOC_HI16_GOTOFF: r = R_PPC64_GOT16_HI;
1946 break;
1947 case BFD_RELOC_HI16_S_GOTOFF: r = R_PPC64_GOT16_HA;
1948 break;
1949 case BFD_RELOC_PPC_COPY: r = R_PPC64_COPY;
1950 break;
1951 case BFD_RELOC_PPC_GLOB_DAT: r = R_PPC64_GLOB_DAT;
1952 break;
1953 case BFD_RELOC_32_PCREL: r = R_PPC64_REL32;
1954 break;
1955 case BFD_RELOC_32_PLTOFF: r = R_PPC64_PLT32;
1956 break;
1957 case BFD_RELOC_32_PLT_PCREL: r = R_PPC64_PLTREL32;
1958 break;
1959 case BFD_RELOC_LO16_PLTOFF: r = R_PPC64_PLT16_LO;
1960 break;
1961 case BFD_RELOC_HI16_PLTOFF: r = R_PPC64_PLT16_HI;
1962 break;
1963 case BFD_RELOC_HI16_S_PLTOFF: r = R_PPC64_PLT16_HA;
1964 break;
1965 case BFD_RELOC_16_BASEREL: r = R_PPC64_SECTOFF;
1966 break;
1967 case BFD_RELOC_LO16_BASEREL: r = R_PPC64_SECTOFF_LO;
1968 break;
1969 case BFD_RELOC_HI16_BASEREL: r = R_PPC64_SECTOFF_HI;
1970 break;
1971 case BFD_RELOC_HI16_S_BASEREL: r = R_PPC64_SECTOFF_HA;
1972 break;
1973 case BFD_RELOC_CTOR: r = R_PPC64_ADDR64;
1974 break;
1975 case BFD_RELOC_64: r = R_PPC64_ADDR64;
1976 break;
1977 case BFD_RELOC_PPC64_HIGHER: r = R_PPC64_ADDR16_HIGHER;
1978 break;
1979 case BFD_RELOC_PPC64_HIGHER_S: r = R_PPC64_ADDR16_HIGHERA;
1980 break;
1981 case BFD_RELOC_PPC64_HIGHEST: r = R_PPC64_ADDR16_HIGHEST;
1982 break;
1983 case BFD_RELOC_PPC64_HIGHEST_S: r = R_PPC64_ADDR16_HIGHESTA;
1984 break;
1985 case BFD_RELOC_64_PCREL: r = R_PPC64_REL64;
1986 break;
1987 case BFD_RELOC_64_PLTOFF: r = R_PPC64_PLT64;
1988 break;
1989 case BFD_RELOC_64_PLT_PCREL: r = R_PPC64_PLTREL64;
1990 break;
1991 case BFD_RELOC_PPC_TOC16: r = R_PPC64_TOC16;
1992 break;
1993 case BFD_RELOC_PPC64_TOC16_LO: r = R_PPC64_TOC16_LO;
1994 break;
1995 case BFD_RELOC_PPC64_TOC16_HI: r = R_PPC64_TOC16_HI;
1996 break;
1997 case BFD_RELOC_PPC64_TOC16_HA: r = R_PPC64_TOC16_HA;
1998 break;
1999 case BFD_RELOC_PPC64_TOC: r = R_PPC64_TOC;
2000 break;
2001 case BFD_RELOC_PPC64_PLTGOT16: r = R_PPC64_PLTGOT16;
2002 break;
2003 case BFD_RELOC_PPC64_PLTGOT16_LO: r = R_PPC64_PLTGOT16_LO;
2004 break;
2005 case BFD_RELOC_PPC64_PLTGOT16_HI: r = R_PPC64_PLTGOT16_HI;
2006 break;
2007 case BFD_RELOC_PPC64_PLTGOT16_HA: r = R_PPC64_PLTGOT16_HA;
2008 break;
2009 case BFD_RELOC_PPC64_ADDR16_DS: r = R_PPC64_ADDR16_DS;
2010 break;
2011 case BFD_RELOC_PPC64_ADDR16_LO_DS: r = R_PPC64_ADDR16_LO_DS;
2012 break;
2013 case BFD_RELOC_PPC64_GOT16_DS: r = R_PPC64_GOT16_DS;
2014 break;
2015 case BFD_RELOC_PPC64_GOT16_LO_DS: r = R_PPC64_GOT16_LO_DS;
2016 break;
2017 case BFD_RELOC_PPC64_PLT16_LO_DS: r = R_PPC64_PLT16_LO_DS;
2018 break;
2019 case BFD_RELOC_PPC64_SECTOFF_DS: r = R_PPC64_SECTOFF_DS;
2020 break;
2021 case BFD_RELOC_PPC64_SECTOFF_LO_DS: r = R_PPC64_SECTOFF_LO_DS;
2022 break;
2023 case BFD_RELOC_PPC64_TOC16_DS: r = R_PPC64_TOC16_DS;
2024 break;
2025 case BFD_RELOC_PPC64_TOC16_LO_DS: r = R_PPC64_TOC16_LO_DS;
2026 break;
2027 case BFD_RELOC_PPC64_PLTGOT16_DS: r = R_PPC64_PLTGOT16_DS;
2028 break;
2029 case BFD_RELOC_PPC64_PLTGOT16_LO_DS: r = R_PPC64_PLTGOT16_LO_DS;
2030 break;
2031 case BFD_RELOC_PPC_TLS: r = R_PPC64_TLS;
2032 break;
2033 case BFD_RELOC_PPC_DTPMOD: r = R_PPC64_DTPMOD64;
2034 break;
2035 case BFD_RELOC_PPC_TPREL16: r = R_PPC64_TPREL16;
2036 break;
2037 case BFD_RELOC_PPC_TPREL16_LO: r = R_PPC64_TPREL16_LO;
2038 break;
2039 case BFD_RELOC_PPC_TPREL16_HI: r = R_PPC64_TPREL16_HI;
2040 break;
2041 case BFD_RELOC_PPC_TPREL16_HA: r = R_PPC64_TPREL16_HA;
2042 break;
2043 case BFD_RELOC_PPC_TPREL: r = R_PPC64_TPREL64;
2044 break;
2045 case BFD_RELOC_PPC_DTPREL16: r = R_PPC64_DTPREL16;
2046 break;
2047 case BFD_RELOC_PPC_DTPREL16_LO: r = R_PPC64_DTPREL16_LO;
2048 break;
2049 case BFD_RELOC_PPC_DTPREL16_HI: r = R_PPC64_DTPREL16_HI;
2050 break;
2051 case BFD_RELOC_PPC_DTPREL16_HA: r = R_PPC64_DTPREL16_HA;
2052 break;
2053 case BFD_RELOC_PPC_DTPREL: r = R_PPC64_DTPREL64;
2054 break;
2055 case BFD_RELOC_PPC_GOT_TLSGD16: r = R_PPC64_GOT_TLSGD16;
2056 break;
2057 case BFD_RELOC_PPC_GOT_TLSGD16_LO: r = R_PPC64_GOT_TLSGD16_LO;
2058 break;
2059 case BFD_RELOC_PPC_GOT_TLSGD16_HI: r = R_PPC64_GOT_TLSGD16_HI;
2060 break;
2061 case BFD_RELOC_PPC_GOT_TLSGD16_HA: r = R_PPC64_GOT_TLSGD16_HA;
2062 break;
2063 case BFD_RELOC_PPC_GOT_TLSLD16: r = R_PPC64_GOT_TLSLD16;
2064 break;
2065 case BFD_RELOC_PPC_GOT_TLSLD16_LO: r = R_PPC64_GOT_TLSLD16_LO;
2066 break;
2067 case BFD_RELOC_PPC_GOT_TLSLD16_HI: r = R_PPC64_GOT_TLSLD16_HI;
2068 break;
2069 case BFD_RELOC_PPC_GOT_TLSLD16_HA: r = R_PPC64_GOT_TLSLD16_HA;
2070 break;
2071 case BFD_RELOC_PPC_GOT_TPREL16: r = R_PPC64_GOT_TPREL16_DS;
2072 break;
2073 case BFD_RELOC_PPC_GOT_TPREL16_LO: r = R_PPC64_GOT_TPREL16_LO_DS;
2074 break;
2075 case BFD_RELOC_PPC_GOT_TPREL16_HI: r = R_PPC64_GOT_TPREL16_HI;
2076 break;
2077 case BFD_RELOC_PPC_GOT_TPREL16_HA: r = R_PPC64_GOT_TPREL16_HA;
2078 break;
2079 case BFD_RELOC_PPC_GOT_DTPREL16: r = R_PPC64_GOT_DTPREL16_DS;
2080 break;
2081 case BFD_RELOC_PPC_GOT_DTPREL16_LO: r = R_PPC64_GOT_DTPREL16_LO_DS;
2082 break;
2083 case BFD_RELOC_PPC_GOT_DTPREL16_HI: r = R_PPC64_GOT_DTPREL16_HI;
2084 break;
2085 case BFD_RELOC_PPC_GOT_DTPREL16_HA: r = R_PPC64_GOT_DTPREL16_HA;
2086 break;
2087 case BFD_RELOC_PPC64_TPREL16_DS: r = R_PPC64_TPREL16_DS;
2088 break;
2089 case BFD_RELOC_PPC64_TPREL16_LO_DS: r = R_PPC64_TPREL16_LO_DS;
2090 break;
2091 case BFD_RELOC_PPC64_TPREL16_HIGHER: r = R_PPC64_TPREL16_HIGHER;
2092 break;
2093 case BFD_RELOC_PPC64_TPREL16_HIGHERA: r = R_PPC64_TPREL16_HIGHERA;
2094 break;
2095 case BFD_RELOC_PPC64_TPREL16_HIGHEST: r = R_PPC64_TPREL16_HIGHEST;
2096 break;
2097 case BFD_RELOC_PPC64_TPREL16_HIGHESTA: r = R_PPC64_TPREL16_HIGHESTA;
2098 break;
2099 case BFD_RELOC_PPC64_DTPREL16_DS: r = R_PPC64_DTPREL16_DS;
2100 break;
2101 case BFD_RELOC_PPC64_DTPREL16_LO_DS: r = R_PPC64_DTPREL16_LO_DS;
2102 break;
2103 case BFD_RELOC_PPC64_DTPREL16_HIGHER: r = R_PPC64_DTPREL16_HIGHER;
2104 break;
2105 case BFD_RELOC_PPC64_DTPREL16_HIGHERA: r = R_PPC64_DTPREL16_HIGHERA;
2106 break;
2107 case BFD_RELOC_PPC64_DTPREL16_HIGHEST: r = R_PPC64_DTPREL16_HIGHEST;
2108 break;
2109 case BFD_RELOC_PPC64_DTPREL16_HIGHESTA: r = R_PPC64_DTPREL16_HIGHESTA;
2110 break;
2111 case BFD_RELOC_VTABLE_INHERIT: r = R_PPC64_GNU_VTINHERIT;
2112 break;
2113 case BFD_RELOC_VTABLE_ENTRY: r = R_PPC64_GNU_VTENTRY;
2114 break;
2115 }
2116
2117 return ppc64_elf_howto_table[r];
2118 };
2119
2120 static reloc_howto_type *
2121 ppc64_elf_reloc_name_lookup (bfd *abfd ATTRIBUTE_UNUSED,
2122 const char *r_name)
2123 {
2124 unsigned int i;
2125
2126 for (i = 0;
2127 i < sizeof (ppc64_elf_howto_raw) / sizeof (ppc64_elf_howto_raw[0]);
2128 i++)
2129 if (ppc64_elf_howto_raw[i].name != NULL
2130 && strcasecmp (ppc64_elf_howto_raw[i].name, r_name) == 0)
2131 return &ppc64_elf_howto_raw[i];
2132
2133 return NULL;
2134 }
2135
2136 /* Set the howto pointer for a PowerPC ELF reloc. */
2137
2138 static void
2139 ppc64_elf_info_to_howto (bfd *abfd ATTRIBUTE_UNUSED, arelent *cache_ptr,
2140 Elf_Internal_Rela *dst)
2141 {
2142 unsigned int type;
2143
2144 /* Initialize howto table if needed. */
2145 if (!ppc64_elf_howto_table[R_PPC64_ADDR32])
2146 ppc_howto_init ();
2147
2148 type = ELF64_R_TYPE (dst->r_info);
2149 if (type >= (sizeof (ppc64_elf_howto_table)
2150 / sizeof (ppc64_elf_howto_table[0])))
2151 {
2152 (*_bfd_error_handler) (_("%B: invalid relocation type %d"),
2153 abfd, (int) type);
2154 type = R_PPC64_NONE;
2155 }
2156 cache_ptr->howto = ppc64_elf_howto_table[type];
2157 }
2158
2159 /* Handle the R_PPC64_ADDR16_HA and similar relocs. */
2160
2161 static bfd_reloc_status_type
2162 ppc64_elf_ha_reloc (bfd *abfd, arelent *reloc_entry, asymbol *symbol,
2163 void *data, asection *input_section,
2164 bfd *output_bfd, char **error_message)
2165 {
2166 /* If this is a relocatable link (output_bfd test tells us), just
2167 call the generic function. Any adjustment will be done at final
2168 link time. */
2169 if (output_bfd != NULL)
2170 return bfd_elf_generic_reloc (abfd, reloc_entry, symbol, data,
2171 input_section, output_bfd, error_message);
2172
2173 /* Adjust the addend for sign extension of the low 16 bits.
2174 We won't actually be using the low 16 bits, so trashing them
2175 doesn't matter. */
2176 reloc_entry->addend += 0x8000;
2177 return bfd_reloc_continue;
2178 }
2179
2180 static bfd_reloc_status_type
2181 ppc64_elf_branch_reloc (bfd *abfd, arelent *reloc_entry, asymbol *symbol,
2182 void *data, asection *input_section,
2183 bfd *output_bfd, char **error_message)
2184 {
2185 if (output_bfd != NULL)
2186 return bfd_elf_generic_reloc (abfd, reloc_entry, symbol, data,
2187 input_section, output_bfd, error_message);
2188
2189 if (strcmp (symbol->section->name, ".opd") == 0
2190 && (symbol->section->owner->flags & DYNAMIC) == 0)
2191 {
2192 bfd_vma dest = opd_entry_value (symbol->section,
2193 symbol->value + reloc_entry->addend,
2194 NULL, NULL);
2195 if (dest != (bfd_vma) -1)
2196 reloc_entry->addend = dest - (symbol->value
2197 + symbol->section->output_section->vma
2198 + symbol->section->output_offset);
2199 }
2200 return bfd_reloc_continue;
2201 }
2202
2203 static bfd_reloc_status_type
2204 ppc64_elf_brtaken_reloc (bfd *abfd, arelent *reloc_entry, asymbol *symbol,
2205 void *data, asection *input_section,
2206 bfd *output_bfd, char **error_message)
2207 {
2208 long insn;
2209 enum elf_ppc64_reloc_type r_type;
2210 bfd_size_type octets;
2211 /* Disabled until we sort out how ld should choose 'y' vs 'at'. */
2212 bfd_boolean is_power4 = FALSE;
2213
2214 /* If this is a relocatable link (output_bfd test tells us), just
2215 call the generic function. Any adjustment will be done at final
2216 link time. */
2217 if (output_bfd != NULL)
2218 return bfd_elf_generic_reloc (abfd, reloc_entry, symbol, data,
2219 input_section, output_bfd, error_message);
2220
2221 octets = reloc_entry->address * bfd_octets_per_byte (abfd);
2222 insn = bfd_get_32 (abfd, (bfd_byte *) data + octets);
2223 insn &= ~(0x01 << 21);
2224 r_type = reloc_entry->howto->type;
2225 if (r_type == R_PPC64_ADDR14_BRTAKEN
2226 || r_type == R_PPC64_REL14_BRTAKEN)
2227 insn |= 0x01 << 21; /* 'y' or 't' bit, lowest bit of BO field. */
2228
2229 if (is_power4)
2230 {
2231 /* Set 'a' bit. This is 0b00010 in BO field for branch
2232 on CR(BI) insns (BO == 001at or 011at), and 0b01000
2233 for branch on CTR insns (BO == 1a00t or 1a01t). */
2234 if ((insn & (0x14 << 21)) == (0x04 << 21))
2235 insn |= 0x02 << 21;
2236 else if ((insn & (0x14 << 21)) == (0x10 << 21))
2237 insn |= 0x08 << 21;
2238 else
2239 goto out;
2240 }
2241 else
2242 {
2243 bfd_vma target = 0;
2244 bfd_vma from;
2245
2246 if (!bfd_is_com_section (symbol->section))
2247 target = symbol->value;
2248 target += symbol->section->output_section->vma;
2249 target += symbol->section->output_offset;
2250 target += reloc_entry->addend;
2251
2252 from = (reloc_entry->address
2253 + input_section->output_offset
2254 + input_section->output_section->vma);
2255
2256 /* Invert 'y' bit if not the default. */
2257 if ((bfd_signed_vma) (target - from) < 0)
2258 insn ^= 0x01 << 21;
2259 }
2260 bfd_put_32 (abfd, insn, (bfd_byte *) data + octets);
2261 out:
2262 return ppc64_elf_branch_reloc (abfd, reloc_entry, symbol, data,
2263 input_section, output_bfd, error_message);
2264 }
2265
2266 static bfd_reloc_status_type
2267 ppc64_elf_sectoff_reloc (bfd *abfd, arelent *reloc_entry, asymbol *symbol,
2268 void *data, asection *input_section,
2269 bfd *output_bfd, char **error_message)
2270 {
2271 /* If this is a relocatable link (output_bfd test tells us), just
2272 call the generic function. Any adjustment will be done at final
2273 link time. */
2274 if (output_bfd != NULL)
2275 return bfd_elf_generic_reloc (abfd, reloc_entry, symbol, data,
2276 input_section, output_bfd, error_message);
2277
2278 /* Subtract the symbol section base address. */
2279 reloc_entry->addend -= symbol->section->output_section->vma;
2280 return bfd_reloc_continue;
2281 }
2282
2283 static bfd_reloc_status_type
2284 ppc64_elf_sectoff_ha_reloc (bfd *abfd, arelent *reloc_entry, asymbol *symbol,
2285 void *data, asection *input_section,
2286 bfd *output_bfd, char **error_message)
2287 {
2288 /* If this is a relocatable link (output_bfd test tells us), just
2289 call the generic function. Any adjustment will be done at final
2290 link time. */
2291 if (output_bfd != NULL)
2292 return bfd_elf_generic_reloc (abfd, reloc_entry, symbol, data,
2293 input_section, output_bfd, error_message);
2294
2295 /* Subtract the symbol section base address. */
2296 reloc_entry->addend -= symbol->section->output_section->vma;
2297
2298 /* Adjust the addend for sign extension of the low 16 bits. */
2299 reloc_entry->addend += 0x8000;
2300 return bfd_reloc_continue;
2301 }
2302
2303 static bfd_reloc_status_type
2304 ppc64_elf_toc_reloc (bfd *abfd, arelent *reloc_entry, asymbol *symbol,
2305 void *data, asection *input_section,
2306 bfd *output_bfd, char **error_message)
2307 {
2308 bfd_vma TOCstart;
2309
2310 /* If this is a relocatable link (output_bfd test tells us), just
2311 call the generic function. Any adjustment will be done at final
2312 link time. */
2313 if (output_bfd != NULL)
2314 return bfd_elf_generic_reloc (abfd, reloc_entry, symbol, data,
2315 input_section, output_bfd, error_message);
2316
2317 TOCstart = _bfd_get_gp_value (input_section->output_section->owner);
2318 if (TOCstart == 0)
2319 TOCstart = ppc64_elf_toc (input_section->output_section->owner);
2320
2321 /* Subtract the TOC base address. */
2322 reloc_entry->addend -= TOCstart + TOC_BASE_OFF;
2323 return bfd_reloc_continue;
2324 }
2325
2326 static bfd_reloc_status_type
2327 ppc64_elf_toc_ha_reloc (bfd *abfd, arelent *reloc_entry, asymbol *symbol,
2328 void *data, asection *input_section,
2329 bfd *output_bfd, char **error_message)
2330 {
2331 bfd_vma TOCstart;
2332
2333 /* If this is a relocatable link (output_bfd test tells us), just
2334 call the generic function. Any adjustment will be done at final
2335 link time. */
2336 if (output_bfd != NULL)
2337 return bfd_elf_generic_reloc (abfd, reloc_entry, symbol, data,
2338 input_section, output_bfd, error_message);
2339
2340 TOCstart = _bfd_get_gp_value (input_section->output_section->owner);
2341 if (TOCstart == 0)
2342 TOCstart = ppc64_elf_toc (input_section->output_section->owner);
2343
2344 /* Subtract the TOC base address. */
2345 reloc_entry->addend -= TOCstart + TOC_BASE_OFF;
2346
2347 /* Adjust the addend for sign extension of the low 16 bits. */
2348 reloc_entry->addend += 0x8000;
2349 return bfd_reloc_continue;
2350 }
2351
2352 static bfd_reloc_status_type
2353 ppc64_elf_toc64_reloc (bfd *abfd, arelent *reloc_entry, asymbol *symbol,
2354 void *data, asection *input_section,
2355 bfd *output_bfd, char **error_message)
2356 {
2357 bfd_vma TOCstart;
2358 bfd_size_type octets;
2359
2360 /* If this is a relocatable link (output_bfd test tells us), just
2361 call the generic function. Any adjustment will be done at final
2362 link time. */
2363 if (output_bfd != NULL)
2364 return bfd_elf_generic_reloc (abfd, reloc_entry, symbol, data,
2365 input_section, output_bfd, error_message);
2366
2367 TOCstart = _bfd_get_gp_value (input_section->output_section->owner);
2368 if (TOCstart == 0)
2369 TOCstart = ppc64_elf_toc (input_section->output_section->owner);
2370
2371 octets = reloc_entry->address * bfd_octets_per_byte (abfd);
2372 bfd_put_64 (abfd, TOCstart + TOC_BASE_OFF, (bfd_byte *) data + octets);
2373 return bfd_reloc_ok;
2374 }
2375
2376 static bfd_reloc_status_type
2377 ppc64_elf_unhandled_reloc (bfd *abfd, arelent *reloc_entry, asymbol *symbol,
2378 void *data, asection *input_section,
2379 bfd *output_bfd, char **error_message)
2380 {
2381 /* If this is a relocatable link (output_bfd test tells us), just
2382 call the generic function. Any adjustment will be done at final
2383 link time. */
2384 if (output_bfd != NULL)
2385 return bfd_elf_generic_reloc (abfd, reloc_entry, symbol, data,
2386 input_section, output_bfd, error_message);
2387
2388 if (error_message != NULL)
2389 {
2390 static char buf[60];
2391 sprintf (buf, "generic linker can't handle %s",
2392 reloc_entry->howto->name);
2393 *error_message = buf;
2394 }
2395 return bfd_reloc_dangerous;
2396 }
2397
2398 struct ppc64_elf_obj_tdata
2399 {
2400 struct elf_obj_tdata elf;
2401
2402 /* Shortcuts to dynamic linker sections. */
2403 asection *got;
2404 asection *relgot;
2405
2406 /* Used during garbage collection. We attach global symbols defined
2407 on removed .opd entries to this section so that the sym is removed. */
2408 asection *deleted_section;
2409
2410 /* TLS local dynamic got entry handling. Suppose for multiple GOT
2411 sections means we potentially need one of these for each input bfd. */
2412 union {
2413 bfd_signed_vma refcount;
2414 bfd_vma offset;
2415 } tlsld_got;
2416
2417 /* A copy of relocs before they are modified for --emit-relocs. */
2418 Elf_Internal_Rela *opd_relocs;
2419 };
2420
2421 #define ppc64_elf_tdata(bfd) \
2422 ((struct ppc64_elf_obj_tdata *) (bfd)->tdata.any)
2423
2424 #define ppc64_tlsld_got(bfd) \
2425 (&ppc64_elf_tdata (bfd)->tlsld_got)
2426
2427 /* Override the generic function because we store some extras. */
2428
2429 static bfd_boolean
2430 ppc64_elf_mkobject (bfd *abfd)
2431 {
2432 if (abfd->tdata.any == NULL)
2433 {
2434 bfd_size_type amt = sizeof (struct ppc64_elf_obj_tdata);
2435 abfd->tdata.any = bfd_zalloc (abfd, amt);
2436 if (abfd->tdata.any == NULL)
2437 return FALSE;
2438 }
2439 return bfd_elf_mkobject (abfd);
2440 }
2441
2442 /* Return 1 if target is one of ours. */
2443
2444 static bfd_boolean
2445 is_ppc64_elf_target (const struct bfd_target *targ)
2446 {
2447 extern const bfd_target bfd_elf64_powerpc_vec;
2448 extern const bfd_target bfd_elf64_powerpcle_vec;
2449
2450 return targ == &bfd_elf64_powerpc_vec || targ == &bfd_elf64_powerpcle_vec;
2451 }
2452
2453 /* Fix bad default arch selected for a 64 bit input bfd when the
2454 default is 32 bit. */
2455
2456 static bfd_boolean
2457 ppc64_elf_object_p (bfd *abfd)
2458 {
2459 if (abfd->arch_info->the_default && abfd->arch_info->bits_per_word == 32)
2460 {
2461 Elf_Internal_Ehdr *i_ehdr = elf_elfheader (abfd);
2462
2463 if (i_ehdr->e_ident[EI_CLASS] == ELFCLASS64)
2464 {
2465 /* Relies on arch after 32 bit default being 64 bit default. */
2466 abfd->arch_info = abfd->arch_info->next;
2467 BFD_ASSERT (abfd->arch_info->bits_per_word == 64);
2468 }
2469 }
2470 return TRUE;
2471 }
2472
2473 /* Support for core dump NOTE sections. */
2474
2475 static bfd_boolean
2476 ppc64_elf_grok_prstatus (bfd *abfd, Elf_Internal_Note *note)
2477 {
2478 size_t offset, size;
2479
2480 if (note->descsz != 504)
2481 return FALSE;
2482
2483 /* pr_cursig */
2484 elf_tdata (abfd)->core_signal = bfd_get_16 (abfd, note->descdata + 12);
2485
2486 /* pr_pid */
2487 elf_tdata (abfd)->core_pid = bfd_get_32 (abfd, note->descdata + 32);
2488
2489 /* pr_reg */
2490 offset = 112;
2491 size = 384;
2492
2493 /* Make a ".reg/999" section. */
2494 return _bfd_elfcore_make_pseudosection (abfd, ".reg",
2495 size, note->descpos + offset);
2496 }
2497
2498 static bfd_boolean
2499 ppc64_elf_grok_psinfo (bfd *abfd, Elf_Internal_Note *note)
2500 {
2501 if (note->descsz != 136)
2502 return FALSE;
2503
2504 elf_tdata (abfd)->core_program
2505 = _bfd_elfcore_strndup (abfd, note->descdata + 40, 16);
2506 elf_tdata (abfd)->core_command
2507 = _bfd_elfcore_strndup (abfd, note->descdata + 56, 80);
2508
2509 return TRUE;
2510 }
2511
2512 static char *
2513 ppc64_elf_write_core_note (bfd *abfd, char *buf, int *bufsiz, int note_type,
2514 ...)
2515 {
2516 switch (note_type)
2517 {
2518 default:
2519 return NULL;
2520
2521 case NT_PRPSINFO:
2522 {
2523 char data[136];
2524 va_list ap;
2525
2526 va_start (ap, note_type);
2527 memset (data, 0, 40);
2528 strncpy (data + 40, va_arg (ap, const char *), 16);
2529 strncpy (data + 56, va_arg (ap, const char *), 80);
2530 va_end (ap);
2531 return elfcore_write_note (abfd, buf, bufsiz,
2532 "CORE", note_type, data, sizeof (data));
2533 }
2534
2535 case NT_PRSTATUS:
2536 {
2537 char data[504];
2538 va_list ap;
2539 long pid;
2540 int cursig;
2541 const void *greg;
2542
2543 va_start (ap, note_type);
2544 memset (data, 0, 112);
2545 pid = va_arg (ap, long);
2546 bfd_put_32 (abfd, pid, data + 32);
2547 cursig = va_arg (ap, int);
2548 bfd_put_16 (abfd, cursig, data + 12);
2549 greg = va_arg (ap, const void *);
2550 memcpy (data + 112, greg, 384);
2551 memset (data + 496, 0, 8);
2552 va_end (ap);
2553 return elfcore_write_note (abfd, buf, bufsiz,
2554 "CORE", note_type, data, sizeof (data));
2555 }
2556 }
2557 }
2558
2559 /* Merge backend specific data from an object file to the output
2560 object file when linking. */
2561
2562 static bfd_boolean
2563 ppc64_elf_merge_private_bfd_data (bfd *ibfd, bfd *obfd)
2564 {
2565 /* Check if we have the same endianess. */
2566 if (ibfd->xvec->byteorder != obfd->xvec->byteorder
2567 && ibfd->xvec->byteorder != BFD_ENDIAN_UNKNOWN
2568 && obfd->xvec->byteorder != BFD_ENDIAN_UNKNOWN)
2569 {
2570 const char *msg;
2571
2572 if (bfd_big_endian (ibfd))
2573 msg = _("%B: compiled for a big endian system "
2574 "and target is little endian");
2575 else
2576 msg = _("%B: compiled for a little endian system "
2577 "and target is big endian");
2578
2579 (*_bfd_error_handler) (msg, ibfd);
2580
2581 bfd_set_error (bfd_error_wrong_format);
2582 return FALSE;
2583 }
2584
2585 return TRUE;
2586 }
2587
2588 /* Add extra PPC sections. */
2589
2590 static const struct bfd_elf_special_section ppc64_elf_special_sections[]=
2591 {
2592 { STRING_COMMA_LEN (".plt"), 0, SHT_NOBITS, 0 },
2593 { STRING_COMMA_LEN (".sbss"), -2, SHT_NOBITS, SHF_ALLOC + SHF_WRITE },
2594 { STRING_COMMA_LEN (".sdata"), -2, SHT_PROGBITS, SHF_ALLOC + SHF_WRITE },
2595 { STRING_COMMA_LEN (".toc"), 0, SHT_PROGBITS, SHF_ALLOC + SHF_WRITE },
2596 { STRING_COMMA_LEN (".toc1"), 0, SHT_PROGBITS, SHF_ALLOC + SHF_WRITE },
2597 { STRING_COMMA_LEN (".tocbss"), 0, SHT_NOBITS, SHF_ALLOC + SHF_WRITE },
2598 { NULL, 0, 0, 0, 0 }
2599 };
2600
2601 enum _ppc64_sec_type {
2602 sec_normal = 0,
2603 sec_opd = 1,
2604 sec_toc = 2
2605 };
2606
2607 struct _ppc64_elf_section_data
2608 {
2609 struct bfd_elf_section_data elf;
2610
2611 /* An array with one entry for each opd function descriptor. */
2612 union
2613 {
2614 /* Points to the function code section for local opd entries. */
2615 asection **opd_func_sec;
2616 /* After editing .opd, adjust references to opd local syms. */
2617 long *opd_adjust;
2618
2619 /* An array for toc sections, indexed by offset/8.
2620 Specifies the relocation symbol index used at a given toc offset. */
2621 unsigned *t_symndx;
2622 } u;
2623
2624 enum _ppc64_sec_type sec_type:2;
2625
2626 /* Flag set when small branches are detected. Used to
2627 select suitable defaults for the stub group size. */
2628 unsigned int has_14bit_branch:1;
2629 };
2630
2631 #define ppc64_elf_section_data(sec) \
2632 ((struct _ppc64_elf_section_data *) elf_section_data (sec))
2633
2634 static bfd_boolean
2635 ppc64_elf_new_section_hook (bfd *abfd, asection *sec)
2636 {
2637 if (!sec->used_by_bfd)
2638 {
2639 struct _ppc64_elf_section_data *sdata;
2640 bfd_size_type amt = sizeof (*sdata);
2641
2642 sdata = bfd_zalloc (abfd, amt);
2643 if (sdata == NULL)
2644 return FALSE;
2645 sec->used_by_bfd = sdata;
2646 }
2647
2648 return _bfd_elf_new_section_hook (abfd, sec);
2649 }
2650
2651 static void *
2652 get_opd_info (asection * sec)
2653 {
2654 if (sec != NULL
2655 && ppc64_elf_section_data (sec) != NULL
2656 && ppc64_elf_section_data (sec)->sec_type == sec_opd)
2657 return ppc64_elf_section_data (sec)->u.opd_adjust;
2658 return NULL;
2659 }
2660 \f
2661 /* Parameters for the qsort hook. */
2662 static asection *synthetic_opd;
2663 static bfd_boolean synthetic_relocatable;
2664
2665 /* qsort comparison function for ppc64_elf_get_synthetic_symtab. */
2666
2667 static int
2668 compare_symbols (const void *ap, const void *bp)
2669 {
2670 const asymbol *a = * (const asymbol **) ap;
2671 const asymbol *b = * (const asymbol **) bp;
2672
2673 /* Section symbols first. */
2674 if ((a->flags & BSF_SECTION_SYM) && !(b->flags & BSF_SECTION_SYM))
2675 return -1;
2676 if (!(a->flags & BSF_SECTION_SYM) && (b->flags & BSF_SECTION_SYM))
2677 return 1;
2678
2679 /* then .opd symbols. */
2680 if (a->section == synthetic_opd && b->section != synthetic_opd)
2681 return -1;
2682 if (a->section != synthetic_opd && b->section == synthetic_opd)
2683 return 1;
2684
2685 /* then other code symbols. */
2686 if ((a->section->flags & (SEC_CODE | SEC_ALLOC | SEC_THREAD_LOCAL))
2687 == (SEC_CODE | SEC_ALLOC)
2688 && (b->section->flags & (SEC_CODE | SEC_ALLOC | SEC_THREAD_LOCAL))
2689 != (SEC_CODE | SEC_ALLOC))
2690 return -1;
2691
2692 if ((a->section->flags & (SEC_CODE | SEC_ALLOC | SEC_THREAD_LOCAL))
2693 != (SEC_CODE | SEC_ALLOC)
2694 && (b->section->flags & (SEC_CODE | SEC_ALLOC | SEC_THREAD_LOCAL))
2695 == (SEC_CODE | SEC_ALLOC))
2696 return 1;
2697
2698 if (synthetic_relocatable)
2699 {
2700 if (a->section->id < b->section->id)
2701 return -1;
2702
2703 if (a->section->id > b->section->id)
2704 return 1;
2705 }
2706
2707 if (a->value + a->section->vma < b->value + b->section->vma)
2708 return -1;
2709
2710 if (a->value + a->section->vma > b->value + b->section->vma)
2711 return 1;
2712
2713 /* For syms with the same value, prefer strong dynamic global function
2714 syms over other syms. */
2715 if ((a->flags & BSF_GLOBAL) != 0 && (b->flags & BSF_GLOBAL) == 0)
2716 return -1;
2717
2718 if ((a->flags & BSF_GLOBAL) == 0 && (b->flags & BSF_GLOBAL) != 0)
2719 return 1;
2720
2721 if ((a->flags & BSF_FUNCTION) != 0 && (b->flags & BSF_FUNCTION) == 0)
2722 return -1;
2723
2724 if ((a->flags & BSF_FUNCTION) == 0 && (b->flags & BSF_FUNCTION) != 0)
2725 return 1;
2726
2727 if ((a->flags & BSF_WEAK) == 0 && (b->flags & BSF_WEAK) != 0)
2728 return -1;
2729
2730 if ((a->flags & BSF_WEAK) != 0 && (b->flags & BSF_WEAK) == 0)
2731 return 1;
2732
2733 if ((a->flags & BSF_DYNAMIC) != 0 && (b->flags & BSF_DYNAMIC) == 0)
2734 return -1;
2735
2736 if ((a->flags & BSF_DYNAMIC) == 0 && (b->flags & BSF_DYNAMIC) != 0)
2737 return 1;
2738
2739 return 0;
2740 }
2741
2742 /* Search SYMS for a symbol of the given VALUE. */
2743
2744 static asymbol *
2745 sym_exists_at (asymbol **syms, long lo, long hi, int id, bfd_vma value)
2746 {
2747 long mid;
2748
2749 if (id == -1)
2750 {
2751 while (lo < hi)
2752 {
2753 mid = (lo + hi) >> 1;
2754 if (syms[mid]->value + syms[mid]->section->vma < value)
2755 lo = mid + 1;
2756 else if (syms[mid]->value + syms[mid]->section->vma > value)
2757 hi = mid;
2758 else
2759 return syms[mid];
2760 }
2761 }
2762 else
2763 {
2764 while (lo < hi)
2765 {
2766 mid = (lo + hi) >> 1;
2767 if (syms[mid]->section->id < id)
2768 lo = mid + 1;
2769 else if (syms[mid]->section->id > id)
2770 hi = mid;
2771 else if (syms[mid]->value < value)
2772 lo = mid + 1;
2773 else if (syms[mid]->value > value)
2774 hi = mid;
2775 else
2776 return syms[mid];
2777 }
2778 }
2779 return NULL;
2780 }
2781
2782 /* Create synthetic symbols, effectively restoring "dot-symbol" function
2783 entry syms. */
2784
2785 static long
2786 ppc64_elf_get_synthetic_symtab (bfd *abfd,
2787 long static_count, asymbol **static_syms,
2788 long dyn_count, asymbol **dyn_syms,
2789 asymbol **ret)
2790 {
2791 asymbol *s;
2792 long i;
2793 long count;
2794 char *names;
2795 long symcount, codesecsym, codesecsymend, secsymend, opdsymend;
2796 asection *opd;
2797 bfd_boolean relocatable = (abfd->flags & (EXEC_P | DYNAMIC)) == 0;
2798 asymbol **syms;
2799
2800 *ret = NULL;
2801
2802 opd = bfd_get_section_by_name (abfd, ".opd");
2803 if (opd == NULL)
2804 return 0;
2805
2806 symcount = static_count;
2807 if (!relocatable)
2808 symcount += dyn_count;
2809 if (symcount == 0)
2810 return 0;
2811
2812 syms = bfd_malloc ((symcount + 1) * sizeof (*syms));
2813 if (syms == NULL)
2814 return -1;
2815
2816 if (!relocatable && static_count != 0 && dyn_count != 0)
2817 {
2818 /* Use both symbol tables. */
2819 memcpy (syms, static_syms, static_count * sizeof (*syms));
2820 memcpy (syms + static_count, dyn_syms, (dyn_count + 1) * sizeof (*syms));
2821 }
2822 else if (!relocatable && static_count == 0)
2823 memcpy (syms, dyn_syms, (symcount + 1) * sizeof (*syms));
2824 else
2825 memcpy (syms, static_syms, (symcount + 1) * sizeof (*syms));
2826
2827 synthetic_opd = opd;
2828 synthetic_relocatable = relocatable;
2829 qsort (syms, symcount, sizeof (*syms), compare_symbols);
2830
2831 if (!relocatable && symcount > 1)
2832 {
2833 long j;
2834 /* Trim duplicate syms, since we may have merged the normal and
2835 dynamic symbols. Actually, we only care about syms that have
2836 different values, so trim any with the same value. */
2837 for (i = 1, j = 1; i < symcount; ++i)
2838 if (syms[i - 1]->value + syms[i - 1]->section->vma
2839 != syms[i]->value + syms[i]->section->vma)
2840 syms[j++] = syms[i];
2841 symcount = j;
2842 }
2843
2844 i = 0;
2845 if (syms[i]->section == opd)
2846 ++i;
2847 codesecsym = i;
2848
2849 for (; i < symcount; ++i)
2850 if (((syms[i]->section->flags & (SEC_CODE | SEC_ALLOC | SEC_THREAD_LOCAL))
2851 != (SEC_CODE | SEC_ALLOC))
2852 || (syms[i]->flags & BSF_SECTION_SYM) == 0)
2853 break;
2854 codesecsymend = i;
2855
2856 for (; i < symcount; ++i)
2857 if ((syms[i]->flags & BSF_SECTION_SYM) == 0)
2858 break;
2859 secsymend = i;
2860
2861 for (; i < symcount; ++i)
2862 if (syms[i]->section != opd)
2863 break;
2864 opdsymend = i;
2865
2866 for (; i < symcount; ++i)
2867 if ((syms[i]->section->flags & (SEC_CODE | SEC_ALLOC | SEC_THREAD_LOCAL))
2868 != (SEC_CODE | SEC_ALLOC))
2869 break;
2870 symcount = i;
2871
2872 count = 0;
2873 if (opdsymend == secsymend)
2874 goto done;
2875
2876 if (relocatable)
2877 {
2878 bfd_boolean (*slurp_relocs) (bfd *, asection *, asymbol **, bfd_boolean);
2879 arelent *r;
2880 size_t size;
2881 long relcount;
2882
2883 slurp_relocs = get_elf_backend_data (abfd)->s->slurp_reloc_table;
2884 relcount = (opd->flags & SEC_RELOC) ? opd->reloc_count : 0;
2885 if (relcount == 0)
2886 goto done;
2887
2888 if (!(*slurp_relocs) (abfd, opd, static_syms, FALSE))
2889 {
2890 count = -1;
2891 goto done;
2892 }
2893
2894 size = 0;
2895 for (i = secsymend, r = opd->relocation; i < opdsymend; ++i)
2896 {
2897 asymbol *sym;
2898
2899 while (r < opd->relocation + relcount
2900 && r->address < syms[i]->value + opd->vma)
2901 ++r;
2902
2903 if (r == opd->relocation + relcount)
2904 break;
2905
2906 if (r->address != syms[i]->value + opd->vma)
2907 continue;
2908
2909 if (r->howto->type != R_PPC64_ADDR64)
2910 continue;
2911
2912 sym = *r->sym_ptr_ptr;
2913 if (!sym_exists_at (syms, opdsymend, symcount,
2914 sym->section->id, sym->value + r->addend))
2915 {
2916 ++count;
2917 size += sizeof (asymbol);
2918 size += strlen (syms[i]->name) + 2;
2919 }
2920 }
2921
2922 s = *ret = bfd_malloc (size);
2923 if (s == NULL)
2924 {
2925 count = -1;
2926 goto done;
2927 }
2928
2929 names = (char *) (s + count);
2930
2931 for (i = secsymend, r = opd->relocation; i < opdsymend; ++i)
2932 {
2933 asymbol *sym;
2934
2935 while (r < opd->relocation + relcount
2936 && r->address < syms[i]->value + opd->vma)
2937 ++r;
2938
2939 if (r == opd->relocation + relcount)
2940 break;
2941
2942 if (r->address != syms[i]->value + opd->vma)
2943 continue;
2944
2945 if (r->howto->type != R_PPC64_ADDR64)
2946 continue;
2947
2948 sym = *r->sym_ptr_ptr;
2949 if (!sym_exists_at (syms, opdsymend, symcount,
2950 sym->section->id, sym->value + r->addend))
2951 {
2952 size_t len;
2953
2954 *s = *syms[i];
2955 s->section = sym->section;
2956 s->value = sym->value + r->addend;
2957 s->name = names;
2958 *names++ = '.';
2959 len = strlen (syms[i]->name);
2960 memcpy (names, syms[i]->name, len + 1);
2961 names += len + 1;
2962 s++;
2963 }
2964 }
2965 }
2966 else
2967 {
2968 bfd_byte *contents;
2969 size_t size;
2970
2971 if (!bfd_malloc_and_get_section (abfd, opd, &contents))
2972 {
2973 if (contents)
2974 {
2975 free_contents_and_exit:
2976 free (contents);
2977 }
2978 count = -1;
2979 goto done;
2980 }
2981
2982 size = 0;
2983 for (i = secsymend; i < opdsymend; ++i)
2984 {
2985 bfd_vma ent;
2986
2987 ent = bfd_get_64 (abfd, contents + syms[i]->value);
2988 if (!sym_exists_at (syms, opdsymend, symcount, -1, ent))
2989 {
2990 ++count;
2991 size += sizeof (asymbol);
2992 size += strlen (syms[i]->name) + 2;
2993 }
2994 }
2995
2996 s = *ret = bfd_malloc (size);
2997 if (s == NULL)
2998 goto free_contents_and_exit;
2999
3000 names = (char *) (s + count);
3001
3002 for (i = secsymend; i < opdsymend; ++i)
3003 {
3004 bfd_vma ent;
3005
3006 ent = bfd_get_64 (abfd, contents + syms[i]->value);
3007 if (!sym_exists_at (syms, opdsymend, symcount, -1, ent))
3008 {
3009 long lo, hi;
3010 size_t len;
3011 asection *sec = abfd->sections;
3012
3013 *s = *syms[i];
3014 lo = codesecsym;
3015 hi = codesecsymend;
3016 while (lo < hi)
3017 {
3018 long mid = (lo + hi) >> 1;
3019 if (syms[mid]->section->vma < ent)
3020 lo = mid + 1;
3021 else if (syms[mid]->section->vma > ent)
3022 hi = mid;
3023 else
3024 {
3025 sec = syms[mid]->section;
3026 break;
3027 }
3028 }
3029
3030 if (lo >= hi && lo > codesecsym)
3031 sec = syms[lo - 1]->section;
3032
3033 for (; sec != NULL; sec = sec->next)
3034 {
3035 if (sec->vma > ent)
3036 break;
3037 if ((sec->flags & SEC_ALLOC) == 0
3038 || (sec->flags & SEC_LOAD) == 0)
3039 break;
3040 if ((sec->flags & SEC_CODE) != 0)
3041 s->section = sec;
3042 }
3043 s->value = ent - s->section->vma;
3044 s->name = names;
3045 *names++ = '.';
3046 len = strlen (syms[i]->name);
3047 memcpy (names, syms[i]->name, len + 1);
3048 names += len + 1;
3049 s++;
3050 }
3051 }
3052 free (contents);
3053 }
3054
3055 done:
3056 free (syms);
3057 return count;
3058 }
3059 \f
3060 /* The following functions are specific to the ELF linker, while
3061 functions above are used generally. Those named ppc64_elf_* are
3062 called by the main ELF linker code. They appear in this file more
3063 or less in the order in which they are called. eg.
3064 ppc64_elf_check_relocs is called early in the link process,
3065 ppc64_elf_finish_dynamic_sections is one of the last functions
3066 called.
3067
3068 PowerPC64-ELF uses a similar scheme to PowerPC64-XCOFF in that
3069 functions have both a function code symbol and a function descriptor
3070 symbol. A call to foo in a relocatable object file looks like:
3071
3072 . .text
3073 . x:
3074 . bl .foo
3075 . nop
3076
3077 The function definition in another object file might be:
3078
3079 . .section .opd
3080 . foo: .quad .foo
3081 . .quad .TOC.@tocbase
3082 . .quad 0
3083 .
3084 . .text
3085 . .foo: blr
3086
3087 When the linker resolves the call during a static link, the branch
3088 unsurprisingly just goes to .foo and the .opd information is unused.
3089 If the function definition is in a shared library, things are a little
3090 different: The call goes via a plt call stub, the opd information gets
3091 copied to the plt, and the linker patches the nop.
3092
3093 . x:
3094 . bl .foo_stub
3095 . ld 2,40(1)
3096 .
3097 .
3098 . .foo_stub:
3099 . addis 12,2,Lfoo@toc@ha # in practice, the call stub
3100 . addi 12,12,Lfoo@toc@l # is slightly optimized, but
3101 . std 2,40(1) # this is the general idea
3102 . ld 11,0(12)
3103 . ld 2,8(12)
3104 . mtctr 11
3105 . ld 11,16(12)
3106 . bctr
3107 .
3108 . .section .plt
3109 . Lfoo: reloc (R_PPC64_JMP_SLOT, foo)
3110
3111 The "reloc ()" notation is supposed to indicate that the linker emits
3112 an R_PPC64_JMP_SLOT reloc against foo. The dynamic linker does the opd
3113 copying.
3114
3115 What are the difficulties here? Well, firstly, the relocations
3116 examined by the linker in check_relocs are against the function code
3117 sym .foo, while the dynamic relocation in the plt is emitted against
3118 the function descriptor symbol, foo. Somewhere along the line, we need
3119 to carefully copy dynamic link information from one symbol to the other.
3120 Secondly, the generic part of the elf linker will make .foo a dynamic
3121 symbol as is normal for most other backends. We need foo dynamic
3122 instead, at least for an application final link. However, when
3123 creating a shared library containing foo, we need to have both symbols
3124 dynamic so that references to .foo are satisfied during the early
3125 stages of linking. Otherwise the linker might decide to pull in a
3126 definition from some other object, eg. a static library.
3127
3128 Update: As of August 2004, we support a new convention. Function
3129 calls may use the function descriptor symbol, ie. "bl foo". This
3130 behaves exactly as "bl .foo". */
3131
3132 /* The linker needs to keep track of the number of relocs that it
3133 decides to copy as dynamic relocs in check_relocs for each symbol.
3134 This is so that it can later discard them if they are found to be
3135 unnecessary. We store the information in a field extending the
3136 regular ELF linker hash table. */
3137
3138 struct ppc_dyn_relocs
3139 {
3140 struct ppc_dyn_relocs *next;
3141
3142 /* The input section of the reloc. */
3143 asection *sec;
3144
3145 /* Total number of relocs copied for the input section. */
3146 bfd_size_type count;
3147
3148 /* Number of pc-relative relocs copied for the input section. */
3149 bfd_size_type pc_count;
3150 };
3151
3152 /* Track GOT entries needed for a given symbol. We might need more
3153 than one got entry per symbol. */
3154 struct got_entry
3155 {
3156 struct got_entry *next;
3157
3158 /* The symbol addend that we'll be placing in the GOT. */
3159 bfd_vma addend;
3160
3161 /* Unlike other ELF targets, we use separate GOT entries for the same
3162 symbol referenced from different input files. This is to support
3163 automatic multiple TOC/GOT sections, where the TOC base can vary
3164 from one input file to another.
3165
3166 Point to the BFD owning this GOT entry. */
3167 bfd *owner;
3168
3169 /* Zero for non-tls entries, or TLS_TLS and one of TLS_GD, TLS_LD,
3170 TLS_TPREL or TLS_DTPREL for tls entries. */
3171 char tls_type;
3172
3173 /* Reference count until size_dynamic_sections, GOT offset thereafter. */
3174 union
3175 {
3176 bfd_signed_vma refcount;
3177 bfd_vma offset;
3178 } got;
3179 };
3180
3181 /* The same for PLT. */
3182 struct plt_entry
3183 {
3184 struct plt_entry *next;
3185
3186 bfd_vma addend;
3187
3188 union
3189 {
3190 bfd_signed_vma refcount;
3191 bfd_vma offset;
3192 } plt;
3193 };
3194
3195 /* Of those relocs that might be copied as dynamic relocs, this macro
3196 selects those that must be copied when linking a shared library,
3197 even when the symbol is local. */
3198
3199 #define MUST_BE_DYN_RELOC(RTYPE) \
3200 ((RTYPE) != R_PPC64_REL32 \
3201 && (RTYPE) != R_PPC64_REL64 \
3202 && (RTYPE) != R_PPC64_REL30)
3203
3204 /* If ELIMINATE_COPY_RELOCS is non-zero, the linker will try to avoid
3205 copying dynamic variables from a shared lib into an app's dynbss
3206 section, and instead use a dynamic relocation to point into the
3207 shared lib. With code that gcc generates, it's vital that this be
3208 enabled; In the PowerPC64 ABI, the address of a function is actually
3209 the address of a function descriptor, which resides in the .opd
3210 section. gcc uses the descriptor directly rather than going via the
3211 GOT as some other ABI's do, which means that initialized function
3212 pointers must reference the descriptor. Thus, a function pointer
3213 initialized to the address of a function in a shared library will
3214 either require a copy reloc, or a dynamic reloc. Using a copy reloc
3215 redefines the function descriptor symbol to point to the copy. This
3216 presents a problem as a plt entry for that function is also
3217 initialized from the function descriptor symbol and the copy reloc
3218 may not be initialized first. */
3219 #define ELIMINATE_COPY_RELOCS 1
3220
3221 /* Section name for stubs is the associated section name plus this
3222 string. */
3223 #define STUB_SUFFIX ".stub"
3224
3225 /* Linker stubs.
3226 ppc_stub_long_branch:
3227 Used when a 14 bit branch (or even a 24 bit branch) can't reach its
3228 destination, but a 24 bit branch in a stub section will reach.
3229 . b dest
3230
3231 ppc_stub_plt_branch:
3232 Similar to the above, but a 24 bit branch in the stub section won't
3233 reach its destination.
3234 . addis %r12,%r2,xxx@toc@ha
3235 . ld %r11,xxx@toc@l(%r12)
3236 . mtctr %r11
3237 . bctr
3238
3239 ppc_stub_plt_call:
3240 Used to call a function in a shared library. If it so happens that
3241 the plt entry referenced crosses a 64k boundary, then an extra
3242 "addi %r12,%r12,xxx@toc@l" will be inserted before the "mtctr".
3243 . addis %r12,%r2,xxx@toc@ha
3244 . std %r2,40(%r1)
3245 . ld %r11,xxx+0@toc@l(%r12)
3246 . mtctr %r11
3247 . ld %r2,xxx+8@toc@l(%r12)
3248 . ld %r11,xxx+16@toc@l(%r12)
3249 . bctr
3250
3251 ppc_stub_long_branch and ppc_stub_plt_branch may also have additional
3252 code to adjust the value and save r2 to support multiple toc sections.
3253 A ppc_stub_long_branch with an r2 offset looks like:
3254 . std %r2,40(%r1)
3255 . addis %r2,%r2,off@ha
3256 . addi %r2,%r2,off@l
3257 . b dest
3258
3259 A ppc_stub_plt_branch with an r2 offset looks like:
3260 . std %r2,40(%r1)
3261 . addis %r12,%r2,xxx@toc@ha
3262 . ld %r11,xxx@toc@l(%r12)
3263 . addis %r2,%r2,off@ha
3264 . addi %r2,%r2,off@l
3265 . mtctr %r11
3266 . bctr
3267
3268 In cases where the "addis" instruction would add zero, the "addis" is
3269 omitted and following instructions modified slightly in some cases.
3270 */
3271
3272 enum ppc_stub_type {
3273 ppc_stub_none,
3274 ppc_stub_long_branch,
3275 ppc_stub_long_branch_r2off,
3276 ppc_stub_plt_branch,
3277 ppc_stub_plt_branch_r2off,
3278 ppc_stub_plt_call
3279 };
3280
3281 struct ppc_stub_hash_entry {
3282
3283 /* Base hash table entry structure. */
3284 struct bfd_hash_entry root;
3285
3286 enum ppc_stub_type stub_type;
3287
3288 /* The stub section. */
3289 asection *stub_sec;
3290
3291 /* Offset within stub_sec of the beginning of this stub. */
3292 bfd_vma stub_offset;
3293
3294 /* Given the symbol's value and its section we can determine its final
3295 value when building the stubs (so the stub knows where to jump. */
3296 bfd_vma target_value;
3297 asection *target_section;
3298
3299 /* The symbol table entry, if any, that this was derived from. */
3300 struct ppc_link_hash_entry *h;
3301
3302 /* And the reloc addend that this was derived from. */
3303 bfd_vma addend;
3304
3305 /* Where this stub is being called from, or, in the case of combined
3306 stub sections, the first input section in the group. */
3307 asection *id_sec;
3308 };
3309
3310 struct ppc_branch_hash_entry {
3311
3312 /* Base hash table entry structure. */
3313 struct bfd_hash_entry root;
3314
3315 /* Offset within branch lookup table. */
3316 unsigned int offset;
3317
3318 /* Generation marker. */
3319 unsigned int iter;
3320 };
3321
3322 struct ppc_link_hash_entry
3323 {
3324 struct elf_link_hash_entry elf;
3325
3326 union {
3327 /* A pointer to the most recently used stub hash entry against this
3328 symbol. */
3329 struct ppc_stub_hash_entry *stub_cache;
3330
3331 /* A pointer to the next symbol starting with a '.' */
3332 struct ppc_link_hash_entry *next_dot_sym;
3333 } u;
3334
3335 /* Track dynamic relocs copied for this symbol. */
3336 struct ppc_dyn_relocs *dyn_relocs;
3337
3338 /* Link between function code and descriptor symbols. */
3339 struct ppc_link_hash_entry *oh;
3340
3341 /* Flag function code and descriptor symbols. */
3342 unsigned int is_func:1;
3343 unsigned int is_func_descriptor:1;
3344 unsigned int fake:1;
3345
3346 /* Whether global opd/toc sym has been adjusted or not.
3347 After ppc64_elf_edit_opd/ppc64_elf_edit_toc has run, this flag
3348 should be set for all globals defined in any opd/toc section. */
3349 unsigned int adjust_done:1;
3350
3351 /* Set if we twiddled this symbol to weak at some stage. */
3352 unsigned int was_undefined:1;
3353
3354 /* Contexts in which symbol is used in the GOT (or TOC).
3355 TLS_GD .. TLS_EXPLICIT bits are or'd into the mask as the
3356 corresponding relocs are encountered during check_relocs.
3357 tls_optimize clears TLS_GD .. TLS_TPREL when optimizing to
3358 indicate the corresponding GOT entry type is not needed.
3359 tls_optimize may also set TLS_TPRELGD when a GD reloc turns into
3360 a TPREL one. We use a separate flag rather than setting TPREL
3361 just for convenience in distinguishing the two cases. */
3362 #define TLS_GD 1 /* GD reloc. */
3363 #define TLS_LD 2 /* LD reloc. */
3364 #define TLS_TPREL 4 /* TPREL reloc, => IE. */
3365 #define TLS_DTPREL 8 /* DTPREL reloc, => LD. */
3366 #define TLS_TLS 16 /* Any TLS reloc. */
3367 #define TLS_EXPLICIT 32 /* Marks TOC section TLS relocs. */
3368 #define TLS_TPRELGD 64 /* TPREL reloc resulting from GD->IE. */
3369 char tls_mask;
3370 };
3371
3372 /* ppc64 ELF linker hash table. */
3373
3374 struct ppc_link_hash_table
3375 {
3376 struct elf_link_hash_table elf;
3377
3378 /* The stub hash table. */
3379 struct bfd_hash_table stub_hash_table;
3380
3381 /* Another hash table for plt_branch stubs. */
3382 struct bfd_hash_table branch_hash_table;
3383
3384 /* Linker stub bfd. */
3385 bfd *stub_bfd;
3386
3387 /* Linker call-backs. */
3388 asection * (*add_stub_section) (const char *, asection *);
3389 void (*layout_sections_again) (void);
3390
3391 /* Array to keep track of which stub sections have been created, and
3392 information on stub grouping. */
3393 struct map_stub {
3394 /* This is the section to which stubs in the group will be attached. */
3395 asection *link_sec;
3396 /* The stub section. */
3397 asection *stub_sec;
3398 /* Along with elf_gp, specifies the TOC pointer used in this group. */
3399 bfd_vma toc_off;
3400 } *stub_group;
3401
3402 /* Temp used when calculating TOC pointers. */
3403 bfd_vma toc_curr;
3404
3405 /* Highest input section id. */
3406 int top_id;
3407
3408 /* Highest output section index. */
3409 int top_index;
3410
3411 /* Used when adding symbols. */
3412 struct ppc_link_hash_entry *dot_syms;
3413
3414 /* List of input sections for each output section. */
3415 asection **input_list;
3416
3417 /* Short-cuts to get to dynamic linker sections. */
3418 asection *got;
3419 asection *plt;
3420 asection *relplt;
3421 asection *dynbss;
3422 asection *relbss;
3423 asection *glink;
3424 asection *sfpr;
3425 asection *brlt;
3426 asection *relbrlt;
3427
3428 /* Shortcut to .__tls_get_addr and __tls_get_addr. */
3429 struct ppc_link_hash_entry *tls_get_addr;
3430 struct ppc_link_hash_entry *tls_get_addr_fd;
3431
3432 /* Statistics. */
3433 unsigned long stub_count[ppc_stub_plt_call];
3434
3435 /* Number of stubs against global syms. */
3436 unsigned long stub_globals;
3437
3438 /* Set if we should emit symbols for stubs. */
3439 unsigned int emit_stub_syms:1;
3440
3441 /* Support for multiple toc sections. */
3442 unsigned int no_multi_toc:1;
3443 unsigned int multi_toc_needed:1;
3444
3445 /* Set on error. */
3446 unsigned int stub_error:1;
3447
3448 /* Temp used by ppc64_elf_check_directives. */
3449 unsigned int twiddled_syms:1;
3450
3451 /* Incremented every time we size stubs. */
3452 unsigned int stub_iteration;
3453
3454 /* Small local sym to section mapping cache. */
3455 struct sym_sec_cache sym_sec;
3456 };
3457
3458 /* Rename some of the generic section flags to better document how they
3459 are used here. */
3460 #define has_toc_reloc has_gp_reloc
3461 #define makes_toc_func_call need_finalize_relax
3462 #define call_check_in_progress reloc_done
3463
3464 /* Get the ppc64 ELF linker hash table from a link_info structure. */
3465
3466 #define ppc_hash_table(p) \
3467 ((struct ppc_link_hash_table *) ((p)->hash))
3468
3469 #define ppc_stub_hash_lookup(table, string, create, copy) \
3470 ((struct ppc_stub_hash_entry *) \
3471 bfd_hash_lookup ((table), (string), (create), (copy)))
3472
3473 #define ppc_branch_hash_lookup(table, string, create, copy) \
3474 ((struct ppc_branch_hash_entry *) \
3475 bfd_hash_lookup ((table), (string), (create), (copy)))
3476
3477 /* Create an entry in the stub hash table. */
3478
3479 static struct bfd_hash_entry *
3480 stub_hash_newfunc (struct bfd_hash_entry *entry,
3481 struct bfd_hash_table *table,
3482 const char *string)
3483 {
3484 /* Allocate the structure if it has not already been allocated by a
3485 subclass. */
3486 if (entry == NULL)
3487 {
3488 entry = bfd_hash_allocate (table, sizeof (struct ppc_stub_hash_entry));
3489 if (entry == NULL)
3490 return entry;
3491 }
3492
3493 /* Call the allocation method of the superclass. */
3494 entry = bfd_hash_newfunc (entry, table, string);
3495 if (entry != NULL)
3496 {
3497 struct ppc_stub_hash_entry *eh;
3498
3499 /* Initialize the local fields. */
3500 eh = (struct ppc_stub_hash_entry *) entry;
3501 eh->stub_type = ppc_stub_none;
3502 eh->stub_sec = NULL;
3503 eh->stub_offset = 0;
3504 eh->target_value = 0;
3505 eh->target_section = NULL;
3506 eh->h = NULL;
3507 eh->id_sec = NULL;
3508 }
3509
3510 return entry;
3511 }
3512
3513 /* Create an entry in the branch hash table. */
3514
3515 static struct bfd_hash_entry *
3516 branch_hash_newfunc (struct bfd_hash_entry *entry,
3517 struct bfd_hash_table *table,
3518 const char *string)
3519 {
3520 /* Allocate the structure if it has not already been allocated by a
3521 subclass. */
3522 if (entry == NULL)
3523 {
3524 entry = bfd_hash_allocate (table, sizeof (struct ppc_branch_hash_entry));
3525 if (entry == NULL)
3526 return entry;
3527 }
3528
3529 /* Call the allocation method of the superclass. */
3530 entry = bfd_hash_newfunc (entry, table, string);
3531 if (entry != NULL)
3532 {
3533 struct ppc_branch_hash_entry *eh;
3534
3535 /* Initialize the local fields. */
3536 eh = (struct ppc_branch_hash_entry *) entry;
3537 eh->offset = 0;
3538 eh->iter = 0;
3539 }
3540
3541 return entry;
3542 }
3543
3544 /* Create an entry in a ppc64 ELF linker hash table. */
3545
3546 static struct bfd_hash_entry *
3547 link_hash_newfunc (struct bfd_hash_entry *entry,
3548 struct bfd_hash_table *table,
3549 const char *string)
3550 {
3551 /* Allocate the structure if it has not already been allocated by a
3552 subclass. */
3553 if (entry == NULL)
3554 {
3555 entry = bfd_hash_allocate (table, sizeof (struct ppc_link_hash_entry));
3556 if (entry == NULL)
3557 return entry;
3558 }
3559
3560 /* Call the allocation method of the superclass. */
3561 entry = _bfd_elf_link_hash_newfunc (entry, table, string);
3562 if (entry != NULL)
3563 {
3564 struct ppc_link_hash_entry *eh = (struct ppc_link_hash_entry *) entry;
3565
3566 memset (&eh->u.stub_cache, 0,
3567 (sizeof (struct ppc_link_hash_entry)
3568 - offsetof (struct ppc_link_hash_entry, u.stub_cache)));
3569
3570 /* When making function calls, old ABI code references function entry
3571 points (dot symbols), while new ABI code references the function
3572 descriptor symbol. We need to make any combination of reference and
3573 definition work together, without breaking archive linking.
3574
3575 For a defined function "foo" and an undefined call to "bar":
3576 An old object defines "foo" and ".foo", references ".bar" (possibly
3577 "bar" too).
3578 A new object defines "foo" and references "bar".
3579
3580 A new object thus has no problem with its undefined symbols being
3581 satisfied by definitions in an old object. On the other hand, the
3582 old object won't have ".bar" satisfied by a new object.
3583
3584 Keep a list of newly added dot-symbols. */
3585
3586 if (string[0] == '.')
3587 {
3588 struct ppc_link_hash_table *htab;
3589
3590 htab = (struct ppc_link_hash_table *) table;
3591 eh->u.next_dot_sym = htab->dot_syms;
3592 htab->dot_syms = eh;
3593 }
3594 }
3595
3596 return entry;
3597 }
3598
3599 /* Create a ppc64 ELF linker hash table. */
3600
3601 static struct bfd_link_hash_table *
3602 ppc64_elf_link_hash_table_create (bfd *abfd)
3603 {
3604 struct ppc_link_hash_table *htab;
3605 bfd_size_type amt = sizeof (struct ppc_link_hash_table);
3606
3607 htab = bfd_zmalloc (amt);
3608 if (htab == NULL)
3609 return NULL;
3610
3611 if (!_bfd_elf_link_hash_table_init (&htab->elf, abfd, link_hash_newfunc,
3612 sizeof (struct ppc_link_hash_entry)))
3613 {
3614 free (htab);
3615 return NULL;
3616 }
3617
3618 /* Init the stub hash table too. */
3619 if (!bfd_hash_table_init (&htab->stub_hash_table, stub_hash_newfunc,
3620 sizeof (struct ppc_stub_hash_entry)))
3621 return NULL;
3622
3623 /* And the branch hash table. */
3624 if (!bfd_hash_table_init (&htab->branch_hash_table, branch_hash_newfunc,
3625 sizeof (struct ppc_branch_hash_entry)))
3626 return NULL;
3627
3628 /* Initializing two fields of the union is just cosmetic. We really
3629 only care about glist, but when compiled on a 32-bit host the
3630 bfd_vma fields are larger. Setting the bfd_vma to zero makes
3631 debugger inspection of these fields look nicer. */
3632 htab->elf.init_got_refcount.refcount = 0;
3633 htab->elf.init_got_refcount.glist = NULL;
3634 htab->elf.init_plt_refcount.refcount = 0;
3635 htab->elf.init_plt_refcount.glist = NULL;
3636 htab->elf.init_got_offset.offset = 0;
3637 htab->elf.init_got_offset.glist = NULL;
3638 htab->elf.init_plt_offset.offset = 0;
3639 htab->elf.init_plt_offset.glist = NULL;
3640
3641 return &htab->elf.root;
3642 }
3643
3644 /* Free the derived linker hash table. */
3645
3646 static void
3647 ppc64_elf_link_hash_table_free (struct bfd_link_hash_table *hash)
3648 {
3649 struct ppc_link_hash_table *ret = (struct ppc_link_hash_table *) hash;
3650
3651 bfd_hash_table_free (&ret->stub_hash_table);
3652 bfd_hash_table_free (&ret->branch_hash_table);
3653 _bfd_generic_link_hash_table_free (hash);
3654 }
3655
3656 /* Satisfy the ELF linker by filling in some fields in our fake bfd. */
3657
3658 void
3659 ppc64_elf_init_stub_bfd (bfd *abfd, struct bfd_link_info *info)
3660 {
3661 struct ppc_link_hash_table *htab;
3662
3663 elf_elfheader (abfd)->e_ident[EI_CLASS] = ELFCLASS64;
3664
3665 /* Always hook our dynamic sections into the first bfd, which is the
3666 linker created stub bfd. This ensures that the GOT header is at
3667 the start of the output TOC section. */
3668 htab = ppc_hash_table (info);
3669 htab->stub_bfd = abfd;
3670 htab->elf.dynobj = abfd;
3671 }
3672
3673 /* Build a name for an entry in the stub hash table. */
3674
3675 static char *
3676 ppc_stub_name (const asection *input_section,
3677 const asection *sym_sec,
3678 const struct ppc_link_hash_entry *h,
3679 const Elf_Internal_Rela *rel)
3680 {
3681 char *stub_name;
3682 bfd_size_type len;
3683
3684 /* rel->r_addend is actually 64 bit, but who uses more than +/- 2^31
3685 offsets from a sym as a branch target? In fact, we could
3686 probably assume the addend is always zero. */
3687 BFD_ASSERT (((int) rel->r_addend & 0xffffffff) == rel->r_addend);
3688
3689 if (h)
3690 {
3691 len = 8 + 1 + strlen (h->elf.root.root.string) + 1 + 8 + 1;
3692 stub_name = bfd_malloc (len);
3693 if (stub_name == NULL)
3694 return stub_name;
3695
3696 sprintf (stub_name, "%08x.%s+%x",
3697 input_section->id & 0xffffffff,
3698 h->elf.root.root.string,
3699 (int) rel->r_addend & 0xffffffff);
3700 }
3701 else
3702 {
3703 len = 8 + 1 + 8 + 1 + 8 + 1 + 8 + 1;
3704 stub_name = bfd_malloc (len);
3705 if (stub_name == NULL)
3706 return stub_name;
3707
3708 sprintf (stub_name, "%08x.%x:%x+%x",
3709 input_section->id & 0xffffffff,
3710 sym_sec->id & 0xffffffff,
3711 (int) ELF64_R_SYM (rel->r_info) & 0xffffffff,
3712 (int) rel->r_addend & 0xffffffff);
3713 }
3714 if (stub_name[len - 2] == '+' && stub_name[len - 1] == '0')
3715 stub_name[len - 2] = 0;
3716 return stub_name;
3717 }
3718
3719 /* Look up an entry in the stub hash. Stub entries are cached because
3720 creating the stub name takes a bit of time. */
3721
3722 static struct ppc_stub_hash_entry *
3723 ppc_get_stub_entry (const asection *input_section,
3724 const asection *sym_sec,
3725 struct ppc_link_hash_entry *h,
3726 const Elf_Internal_Rela *rel,
3727 struct ppc_link_hash_table *htab)
3728 {
3729 struct ppc_stub_hash_entry *stub_entry;
3730 const asection *id_sec;
3731
3732 /* If this input section is part of a group of sections sharing one
3733 stub section, then use the id of the first section in the group.
3734 Stub names need to include a section id, as there may well be
3735 more than one stub used to reach say, printf, and we need to
3736 distinguish between them. */
3737 id_sec = htab->stub_group[input_section->id].link_sec;
3738
3739 if (h != NULL && h->u.stub_cache != NULL
3740 && h->u.stub_cache->h == h
3741 && h->u.stub_cache->id_sec == id_sec)
3742 {
3743 stub_entry = h->u.stub_cache;
3744 }
3745 else
3746 {
3747 char *stub_name;
3748
3749 stub_name = ppc_stub_name (id_sec, sym_sec, h, rel);
3750 if (stub_name == NULL)
3751 return NULL;
3752
3753 stub_entry = ppc_stub_hash_lookup (&htab->stub_hash_table,
3754 stub_name, FALSE, FALSE);
3755 if (h != NULL)
3756 h->u.stub_cache = stub_entry;
3757
3758 free (stub_name);
3759 }
3760
3761 return stub_entry;
3762 }
3763
3764 /* Add a new stub entry to the stub hash. Not all fields of the new
3765 stub entry are initialised. */
3766
3767 static struct ppc_stub_hash_entry *
3768 ppc_add_stub (const char *stub_name,
3769 asection *section,
3770 struct ppc_link_hash_table *htab)
3771 {
3772 asection *link_sec;
3773 asection *stub_sec;
3774 struct ppc_stub_hash_entry *stub_entry;
3775
3776 link_sec = htab->stub_group[section->id].link_sec;
3777 stub_sec = htab->stub_group[section->id].stub_sec;
3778 if (stub_sec == NULL)
3779 {
3780 stub_sec = htab->stub_group[link_sec->id].stub_sec;
3781 if (stub_sec == NULL)
3782 {
3783 size_t namelen;
3784 bfd_size_type len;
3785 char *s_name;
3786
3787 namelen = strlen (link_sec->name);
3788 len = namelen + sizeof (STUB_SUFFIX);
3789 s_name = bfd_alloc (htab->stub_bfd, len);
3790 if (s_name == NULL)
3791 return NULL;
3792
3793 memcpy (s_name, link_sec->name, namelen);
3794 memcpy (s_name + namelen, STUB_SUFFIX, sizeof (STUB_SUFFIX));
3795 stub_sec = (*htab->add_stub_section) (s_name, link_sec);
3796 if (stub_sec == NULL)
3797 return NULL;
3798 htab->stub_group[link_sec->id].stub_sec = stub_sec;
3799 }
3800 htab->stub_group[section->id].stub_sec = stub_sec;
3801 }
3802
3803 /* Enter this entry into the linker stub hash table. */
3804 stub_entry = ppc_stub_hash_lookup (&htab->stub_hash_table, stub_name,
3805 TRUE, FALSE);
3806 if (stub_entry == NULL)
3807 {
3808 (*_bfd_error_handler) (_("%B: cannot create stub entry %s"),
3809 section->owner, stub_name);
3810 return NULL;
3811 }
3812
3813 stub_entry->stub_sec = stub_sec;
3814 stub_entry->stub_offset = 0;
3815 stub_entry->id_sec = link_sec;
3816 return stub_entry;
3817 }
3818
3819 /* Create sections for linker generated code. */
3820
3821 static bfd_boolean
3822 create_linkage_sections (bfd *dynobj, struct bfd_link_info *info)
3823 {
3824 struct ppc_link_hash_table *htab;
3825 flagword flags;
3826
3827 htab = ppc_hash_table (info);
3828
3829 /* Create .sfpr for code to save and restore fp regs. */
3830 flags = (SEC_ALLOC | SEC_LOAD | SEC_CODE | SEC_READONLY
3831 | SEC_HAS_CONTENTS | SEC_IN_MEMORY | SEC_LINKER_CREATED);
3832 htab->sfpr = bfd_make_section_anyway_with_flags (dynobj, ".sfpr",
3833 flags);
3834 if (htab->sfpr == NULL
3835 || ! bfd_set_section_alignment (dynobj, htab->sfpr, 2))
3836 return FALSE;
3837
3838 /* Create .glink for lazy dynamic linking support. */
3839 htab->glink = bfd_make_section_anyway_with_flags (dynobj, ".glink",
3840 flags);
3841 if (htab->glink == NULL
3842 || ! bfd_set_section_alignment (dynobj, htab->glink, 3))
3843 return FALSE;
3844
3845 /* Create branch lookup table for plt_branch stubs. */
3846 flags = (SEC_ALLOC | SEC_LOAD
3847 | SEC_HAS_CONTENTS | SEC_IN_MEMORY | SEC_LINKER_CREATED);
3848 htab->brlt = bfd_make_section_anyway_with_flags (dynobj, ".branch_lt",
3849 flags);
3850 if (htab->brlt == NULL
3851 || ! bfd_set_section_alignment (dynobj, htab->brlt, 3))
3852 return FALSE;
3853
3854 if (!info->shared)
3855 return TRUE;
3856
3857 flags = (SEC_ALLOC | SEC_LOAD | SEC_READONLY
3858 | SEC_HAS_CONTENTS | SEC_IN_MEMORY | SEC_LINKER_CREATED);
3859 htab->relbrlt = bfd_make_section_anyway_with_flags (dynobj,
3860 ".rela.branch_lt",
3861 flags);
3862 if (!htab->relbrlt
3863 || ! bfd_set_section_alignment (dynobj, htab->relbrlt, 3))
3864 return FALSE;
3865
3866 return TRUE;
3867 }
3868
3869 /* Create .got and .rela.got sections in ABFD, and .got in dynobj if
3870 not already done. */
3871
3872 static bfd_boolean
3873 create_got_section (bfd *abfd, struct bfd_link_info *info)
3874 {
3875 asection *got, *relgot;
3876 flagword flags;
3877 struct ppc_link_hash_table *htab = ppc_hash_table (info);
3878
3879 if (!htab->got)
3880 {
3881 if (! _bfd_elf_create_got_section (htab->elf.dynobj, info))
3882 return FALSE;
3883
3884 htab->got = bfd_get_section_by_name (htab->elf.dynobj, ".got");
3885 if (!htab->got)
3886 abort ();
3887 }
3888
3889 flags = (SEC_ALLOC | SEC_LOAD | SEC_HAS_CONTENTS | SEC_IN_MEMORY
3890 | SEC_LINKER_CREATED);
3891
3892 got = bfd_make_section_anyway_with_flags (abfd, ".got", flags);
3893 if (!got
3894 || !bfd_set_section_alignment (abfd, got, 3))
3895 return FALSE;
3896
3897 relgot = bfd_make_section_anyway_with_flags (abfd, ".rela.got",
3898 flags | SEC_READONLY);
3899 if (!relgot
3900 || ! bfd_set_section_alignment (abfd, relgot, 3))
3901 return FALSE;
3902
3903 ppc64_elf_tdata (abfd)->got = got;
3904 ppc64_elf_tdata (abfd)->relgot = relgot;
3905 return TRUE;
3906 }
3907
3908 /* Create the dynamic sections, and set up shortcuts. */
3909
3910 static bfd_boolean
3911 ppc64_elf_create_dynamic_sections (bfd *dynobj, struct bfd_link_info *info)
3912 {
3913 struct ppc_link_hash_table *htab;
3914
3915 if (!_bfd_elf_create_dynamic_sections (dynobj, info))
3916 return FALSE;
3917
3918 htab = ppc_hash_table (info);
3919 if (!htab->got)
3920 htab->got = bfd_get_section_by_name (dynobj, ".got");
3921 htab->plt = bfd_get_section_by_name (dynobj, ".plt");
3922 htab->relplt = bfd_get_section_by_name (dynobj, ".rela.plt");
3923 htab->dynbss = bfd_get_section_by_name (dynobj, ".dynbss");
3924 if (!info->shared)
3925 htab->relbss = bfd_get_section_by_name (dynobj, ".rela.bss");
3926
3927 if (!htab->got || !htab->plt || !htab->relplt || !htab->dynbss
3928 || (!info->shared && !htab->relbss))
3929 abort ();
3930
3931 return TRUE;
3932 }
3933
3934 /* Merge PLT info on FROM with that on TO. */
3935
3936 static void
3937 move_plt_plist (struct ppc_link_hash_entry *from,
3938 struct ppc_link_hash_entry *to)
3939 {
3940 if (from->elf.plt.plist != NULL)
3941 {
3942 if (to->elf.plt.plist != NULL)
3943 {
3944 struct plt_entry **entp;
3945 struct plt_entry *ent;
3946
3947 for (entp = &from->elf.plt.plist; (ent = *entp) != NULL; )
3948 {
3949 struct plt_entry *dent;
3950
3951 for (dent = to->elf.plt.plist; dent != NULL; dent = dent->next)
3952 if (dent->addend == ent->addend)
3953 {
3954 dent->plt.refcount += ent->plt.refcount;
3955 *entp = ent->next;
3956 break;
3957 }
3958 if (dent == NULL)
3959 entp = &ent->next;
3960 }
3961 *entp = to->elf.plt.plist;
3962 }
3963
3964 to->elf.plt.plist = from->elf.plt.plist;
3965 from->elf.plt.plist = NULL;
3966 }
3967 }
3968
3969 /* Copy the extra info we tack onto an elf_link_hash_entry. */
3970
3971 static void
3972 ppc64_elf_copy_indirect_symbol (struct bfd_link_info *info,
3973 struct elf_link_hash_entry *dir,
3974 struct elf_link_hash_entry *ind)
3975 {
3976 struct ppc_link_hash_entry *edir, *eind;
3977
3978 edir = (struct ppc_link_hash_entry *) dir;
3979 eind = (struct ppc_link_hash_entry *) ind;
3980
3981 /* Copy over any dynamic relocs we may have on the indirect sym. */
3982 if (eind->dyn_relocs != NULL)
3983 {
3984 if (edir->dyn_relocs != NULL)
3985 {
3986 struct ppc_dyn_relocs **pp;
3987 struct ppc_dyn_relocs *p;
3988
3989 /* Add reloc counts against the indirect sym to the direct sym
3990 list. Merge any entries against the same section. */
3991 for (pp = &eind->dyn_relocs; (p = *pp) != NULL; )
3992 {
3993 struct ppc_dyn_relocs *q;
3994
3995 for (q = edir->dyn_relocs; q != NULL; q = q->next)
3996 if (q->sec == p->sec)
3997 {
3998 q->pc_count += p->pc_count;
3999 q->count += p->count;
4000 *pp = p->next;
4001 break;
4002 }
4003 if (q == NULL)
4004 pp = &p->next;
4005 }
4006 *pp = edir->dyn_relocs;
4007 }
4008
4009 edir->dyn_relocs = eind->dyn_relocs;
4010 eind->dyn_relocs = NULL;
4011 }
4012
4013 edir->is_func |= eind->is_func;
4014 edir->is_func_descriptor |= eind->is_func_descriptor;
4015 edir->tls_mask |= eind->tls_mask;
4016
4017 /* If called to transfer flags for a weakdef during processing
4018 of elf_adjust_dynamic_symbol, don't copy NON_GOT_REF.
4019 We clear it ourselves for ELIMINATE_COPY_RELOCS. */
4020 if (!(ELIMINATE_COPY_RELOCS
4021 && eind->elf.root.type != bfd_link_hash_indirect
4022 && edir->elf.dynamic_adjusted))
4023 edir->elf.non_got_ref |= eind->elf.non_got_ref;
4024
4025 edir->elf.ref_dynamic |= eind->elf.ref_dynamic;
4026 edir->elf.ref_regular |= eind->elf.ref_regular;
4027 edir->elf.ref_regular_nonweak |= eind->elf.ref_regular_nonweak;
4028 edir->elf.needs_plt |= eind->elf.needs_plt;
4029
4030 /* If we were called to copy over info for a weak sym, that's all. */
4031 if (eind->elf.root.type != bfd_link_hash_indirect)
4032 return;
4033
4034 /* Copy over got entries that we may have already seen to the
4035 symbol which just became indirect. */
4036 if (eind->elf.got.glist != NULL)
4037 {
4038 if (edir->elf.got.glist != NULL)
4039 {
4040 struct got_entry **entp;
4041 struct got_entry *ent;
4042
4043 for (entp = &eind->elf.got.glist; (ent = *entp) != NULL; )
4044 {
4045 struct got_entry *dent;
4046
4047 for (dent = edir->elf.got.glist; dent != NULL; dent = dent->next)
4048 if (dent->addend == ent->addend
4049 && dent->owner == ent->owner
4050 && dent->tls_type == ent->tls_type)
4051 {
4052 dent->got.refcount += ent->got.refcount;
4053 *entp = ent->next;
4054 break;
4055 }
4056 if (dent == NULL)
4057 entp = &ent->next;
4058 }
4059 *entp = edir->elf.got.glist;
4060 }
4061
4062 edir->elf.got.glist = eind->elf.got.glist;
4063 eind->elf.got.glist = NULL;
4064 }
4065
4066 /* And plt entries. */
4067 move_plt_plist (eind, edir);
4068
4069 if (eind->elf.dynindx != -1)
4070 {
4071 if (edir->elf.dynindx != -1)
4072 _bfd_elf_strtab_delref (elf_hash_table (info)->dynstr,
4073 edir->elf.dynstr_index);
4074 edir->elf.dynindx = eind->elf.dynindx;
4075 edir->elf.dynstr_index = eind->elf.dynstr_index;
4076 eind->elf.dynindx = -1;
4077 eind->elf.dynstr_index = 0;
4078 }
4079 }
4080
4081 /* Find the function descriptor hash entry from the given function code
4082 hash entry FH. Link the entries via their OH fields. */
4083
4084 static struct ppc_link_hash_entry *
4085 get_fdh (struct ppc_link_hash_entry *fh, struct ppc_link_hash_table *htab)
4086 {
4087 struct ppc_link_hash_entry *fdh = fh->oh;
4088
4089 if (fdh == NULL)
4090 {
4091 const char *fd_name = fh->elf.root.root.string + 1;
4092
4093 fdh = (struct ppc_link_hash_entry *)
4094 elf_link_hash_lookup (&htab->elf, fd_name, FALSE, FALSE, FALSE);
4095 if (fdh != NULL)
4096 {
4097 fdh->is_func_descriptor = 1;
4098 fdh->oh = fh;
4099 fh->is_func = 1;
4100 fh->oh = fdh;
4101 }
4102 }
4103
4104 return fdh;
4105 }
4106
4107 /* Make a fake function descriptor sym for the code sym FH. */
4108
4109 static struct ppc_link_hash_entry *
4110 make_fdh (struct bfd_link_info *info,
4111 struct ppc_link_hash_entry *fh)
4112 {
4113 bfd *abfd;
4114 asymbol *newsym;
4115 struct bfd_link_hash_entry *bh;
4116 struct ppc_link_hash_entry *fdh;
4117
4118 abfd = fh->elf.root.u.undef.abfd;
4119 newsym = bfd_make_empty_symbol (abfd);
4120 newsym->name = fh->elf.root.root.string + 1;
4121 newsym->section = bfd_und_section_ptr;
4122 newsym->value = 0;
4123 newsym->flags = BSF_WEAK;
4124
4125 bh = NULL;
4126 if (!_bfd_generic_link_add_one_symbol (info, abfd, newsym->name,
4127 newsym->flags, newsym->section,
4128 newsym->value, NULL, FALSE, FALSE,
4129 &bh))
4130 return NULL;
4131
4132 fdh = (struct ppc_link_hash_entry *) bh;
4133 fdh->elf.non_elf = 0;
4134 fdh->fake = 1;
4135 fdh->is_func_descriptor = 1;
4136 fdh->oh = fh;
4137 fh->is_func = 1;
4138 fh->oh = fdh;
4139 return fdh;
4140 }
4141
4142 /* Fix function descriptor symbols defined in .opd sections to be
4143 function type. */
4144
4145 static bfd_boolean
4146 ppc64_elf_add_symbol_hook (bfd *ibfd ATTRIBUTE_UNUSED,
4147 struct bfd_link_info *info ATTRIBUTE_UNUSED,
4148 Elf_Internal_Sym *isym,
4149 const char **name ATTRIBUTE_UNUSED,
4150 flagword *flags ATTRIBUTE_UNUSED,
4151 asection **sec,
4152 bfd_vma *value ATTRIBUTE_UNUSED)
4153 {
4154 if (*sec != NULL
4155 && strcmp (bfd_get_section_name (ibfd, *sec), ".opd") == 0)
4156 isym->st_info = ELF_ST_INFO (ELF_ST_BIND (isym->st_info), STT_FUNC);
4157
4158 return TRUE;
4159 }
4160
4161 /* This function makes an old ABI object reference to ".bar" cause the
4162 inclusion of a new ABI object archive that defines "bar".
4163 NAME is a symbol defined in an archive. Return a symbol in the hash
4164 table that might be satisfied by the archive symbols. */
4165
4166 static struct elf_link_hash_entry *
4167 ppc64_elf_archive_symbol_lookup (bfd *abfd,
4168 struct bfd_link_info *info,
4169 const char *name)
4170 {
4171 struct elf_link_hash_entry *h;
4172 char *dot_name;
4173 size_t len;
4174
4175 h = _bfd_elf_archive_symbol_lookup (abfd, info, name);
4176 if (h != NULL
4177 /* Don't return this sym if it is a fake function descriptor
4178 created by add_symbol_adjust. */
4179 && !(h->root.type == bfd_link_hash_undefweak
4180 && ((struct ppc_link_hash_entry *) h)->fake))
4181 return h;
4182
4183 if (name[0] == '.')
4184 return h;
4185
4186 len = strlen (name);
4187 dot_name = bfd_alloc (abfd, len + 2);
4188 if (dot_name == NULL)
4189 return (struct elf_link_hash_entry *) 0 - 1;
4190 dot_name[0] = '.';
4191 memcpy (dot_name + 1, name, len + 1);
4192 h = _bfd_elf_archive_symbol_lookup (abfd, info, dot_name);
4193 bfd_release (abfd, dot_name);
4194 return h;
4195 }
4196
4197 /* This function satisfies all old ABI object references to ".bar" if a
4198 new ABI object defines "bar". Well, at least, undefined dot symbols
4199 are made weak. This stops later archive searches from including an
4200 object if we already have a function descriptor definition. It also
4201 prevents the linker complaining about undefined symbols.
4202 We also check and correct mismatched symbol visibility here. The
4203 most restrictive visibility of the function descriptor and the
4204 function entry symbol is used. */
4205
4206 static bfd_boolean
4207 add_symbol_adjust (struct ppc_link_hash_entry *eh, struct bfd_link_info *info)
4208 {
4209 struct ppc_link_hash_table *htab;
4210 struct ppc_link_hash_entry *fdh;
4211
4212 if (eh->elf.root.type == bfd_link_hash_indirect)
4213 return TRUE;
4214
4215 if (eh->elf.root.type == bfd_link_hash_warning)
4216 eh = (struct ppc_link_hash_entry *) eh->elf.root.u.i.link;
4217
4218 if (eh->elf.root.root.string[0] != '.')
4219 abort ();
4220
4221 htab = ppc_hash_table (info);
4222 fdh = get_fdh (eh, htab);
4223 if (fdh == NULL
4224 && !info->relocatable
4225 && (eh->elf.root.type == bfd_link_hash_undefined
4226 || eh->elf.root.type == bfd_link_hash_undefweak)
4227 && eh->elf.ref_regular)
4228 {
4229 /* Make an undefweak function descriptor sym, which is enough to
4230 pull in an --as-needed shared lib, but won't cause link
4231 errors. Archives are handled elsewhere. */
4232 fdh = make_fdh (info, eh);
4233 if (fdh == NULL)
4234 return FALSE;
4235 else
4236 fdh->elf.ref_regular = 1;
4237 }
4238 else if (fdh != NULL)
4239 {
4240 unsigned entry_vis = ELF_ST_VISIBILITY (eh->elf.other) - 1;
4241 unsigned descr_vis = ELF_ST_VISIBILITY (fdh->elf.other) - 1;
4242 if (entry_vis < descr_vis)
4243 fdh->elf.other += entry_vis - descr_vis;
4244 else if (entry_vis > descr_vis)
4245 eh->elf.other += descr_vis - entry_vis;
4246
4247 if ((fdh->elf.root.type == bfd_link_hash_defined
4248 || fdh->elf.root.type == bfd_link_hash_defweak)
4249 && eh->elf.root.type == bfd_link_hash_undefined)
4250 {
4251 eh->elf.root.type = bfd_link_hash_undefweak;
4252 eh->was_undefined = 1;
4253 htab->twiddled_syms = 1;
4254 }
4255 }
4256
4257 return TRUE;
4258 }
4259
4260 /* Process list of dot-symbols we made in link_hash_newfunc. */
4261
4262 static bfd_boolean
4263 ppc64_elf_check_directives (bfd *ibfd, struct bfd_link_info *info)
4264 {
4265 struct ppc_link_hash_table *htab;
4266 struct ppc_link_hash_entry **p, *eh;
4267
4268 htab = ppc_hash_table (info);
4269 if (!is_ppc64_elf_target (htab->elf.root.creator))
4270 return TRUE;
4271
4272 if (is_ppc64_elf_target (ibfd->xvec))
4273 {
4274 p = &htab->dot_syms;
4275 while ((eh = *p) != NULL)
4276 {
4277 *p = NULL;
4278 if (!add_symbol_adjust (eh, info))
4279 return FALSE;
4280 p = &eh->u.next_dot_sym;
4281 }
4282 }
4283
4284 /* Clear the list for non-ppc64 input files. */
4285 p = &htab->dot_syms;
4286 while ((eh = *p) != NULL)
4287 {
4288 *p = NULL;
4289 p = &eh->u.next_dot_sym;
4290 }
4291
4292 /* We need to fix the undefs list for any syms we have twiddled to
4293 undef_weak. */
4294 if (htab->twiddled_syms)
4295 {
4296 bfd_link_repair_undef_list (&htab->elf.root);
4297 htab->twiddled_syms = 0;
4298 }
4299 return TRUE;
4300 }
4301
4302 /* Undo hash table changes when an --as-needed input file is determined
4303 not to be needed. */
4304
4305 static bfd_boolean
4306 ppc64_elf_as_needed_cleanup (bfd *ibfd ATTRIBUTE_UNUSED,
4307 struct bfd_link_info *info)
4308 {
4309 ppc_hash_table (info)->dot_syms = NULL;
4310 return TRUE;
4311 }
4312
4313 static bfd_boolean
4314 update_local_sym_info (bfd *abfd, Elf_Internal_Shdr *symtab_hdr,
4315 unsigned long r_symndx, bfd_vma r_addend, int tls_type)
4316 {
4317 struct got_entry **local_got_ents = elf_local_got_ents (abfd);
4318 char *local_got_tls_masks;
4319
4320 if (local_got_ents == NULL)
4321 {
4322 bfd_size_type size = symtab_hdr->sh_info;
4323
4324 size *= sizeof (*local_got_ents) + sizeof (*local_got_tls_masks);
4325 local_got_ents = bfd_zalloc (abfd, size);
4326 if (local_got_ents == NULL)
4327 return FALSE;
4328 elf_local_got_ents (abfd) = local_got_ents;
4329 }
4330
4331 if ((tls_type & TLS_EXPLICIT) == 0)
4332 {
4333 struct got_entry *ent;
4334
4335 for (ent = local_got_ents[r_symndx]; ent != NULL; ent = ent->next)
4336 if (ent->addend == r_addend
4337 && ent->owner == abfd
4338 && ent->tls_type == tls_type)
4339 break;
4340 if (ent == NULL)
4341 {
4342 bfd_size_type amt = sizeof (*ent);
4343 ent = bfd_alloc (abfd, amt);
4344 if (ent == NULL)
4345 return FALSE;
4346 ent->next = local_got_ents[r_symndx];
4347 ent->addend = r_addend;
4348 ent->owner = abfd;
4349 ent->tls_type = tls_type;
4350 ent->got.refcount = 0;
4351 local_got_ents[r_symndx] = ent;
4352 }
4353 ent->got.refcount += 1;
4354 }
4355
4356 local_got_tls_masks = (char *) (local_got_ents + symtab_hdr->sh_info);
4357 local_got_tls_masks[r_symndx] |= tls_type;
4358 return TRUE;
4359 }
4360
4361 static bfd_boolean
4362 update_plt_info (bfd *abfd, struct ppc_link_hash_entry *eh, bfd_vma addend)
4363 {
4364 struct plt_entry *ent;
4365
4366 for (ent = eh->elf.plt.plist; ent != NULL; ent = ent->next)
4367 if (ent->addend == addend)
4368 break;
4369 if (ent == NULL)
4370 {
4371 bfd_size_type amt = sizeof (*ent);
4372 ent = bfd_alloc (abfd, amt);
4373 if (ent == NULL)
4374 return FALSE;
4375 ent->next = eh->elf.plt.plist;
4376 ent->addend = addend;
4377 ent->plt.refcount = 0;
4378 eh->elf.plt.plist = ent;
4379 }
4380 ent->plt.refcount += 1;
4381 eh->elf.needs_plt = 1;
4382 if (eh->elf.root.root.string[0] == '.'
4383 && eh->elf.root.root.string[1] != '\0')
4384 eh->is_func = 1;
4385 return TRUE;
4386 }
4387
4388 /* Look through the relocs for a section during the first phase, and
4389 calculate needed space in the global offset table, procedure
4390 linkage table, and dynamic reloc sections. */
4391
4392 static bfd_boolean
4393 ppc64_elf_check_relocs (bfd *abfd, struct bfd_link_info *info,
4394 asection *sec, const Elf_Internal_Rela *relocs)
4395 {
4396 struct ppc_link_hash_table *htab;
4397 Elf_Internal_Shdr *symtab_hdr;
4398 struct elf_link_hash_entry **sym_hashes, **sym_hashes_end;
4399 const Elf_Internal_Rela *rel;
4400 const Elf_Internal_Rela *rel_end;
4401 asection *sreloc;
4402 asection **opd_sym_map;
4403
4404 if (info->relocatable)
4405 return TRUE;
4406
4407 /* Don't do anything special with non-loaded, non-alloced sections.
4408 In particular, any relocs in such sections should not affect GOT
4409 and PLT reference counting (ie. we don't allow them to create GOT
4410 or PLT entries), there's no possibility or desire to optimize TLS
4411 relocs, and there's not much point in propagating relocs to shared
4412 libs that the dynamic linker won't relocate. */
4413 if ((sec->flags & SEC_ALLOC) == 0)
4414 return TRUE;
4415
4416 htab = ppc_hash_table (info);
4417 symtab_hdr = &elf_tdata (abfd)->symtab_hdr;
4418
4419 sym_hashes = elf_sym_hashes (abfd);
4420 sym_hashes_end = (sym_hashes
4421 + symtab_hdr->sh_size / sizeof (Elf64_External_Sym)
4422 - symtab_hdr->sh_info);
4423
4424 sreloc = NULL;
4425 opd_sym_map = NULL;
4426 if (strcmp (bfd_get_section_name (abfd, sec), ".opd") == 0)
4427 {
4428 /* Garbage collection needs some extra help with .opd sections.
4429 We don't want to necessarily keep everything referenced by
4430 relocs in .opd, as that would keep all functions. Instead,
4431 if we reference an .opd symbol (a function descriptor), we
4432 want to keep the function code symbol's section. This is
4433 easy for global symbols, but for local syms we need to keep
4434 information about the associated function section. Later, if
4435 edit_opd deletes entries, we'll use this array to adjust
4436 local syms in .opd. */
4437 union opd_info {
4438 asection *func_section;
4439 long entry_adjust;
4440 };
4441 bfd_size_type amt;
4442
4443 amt = sec->size * sizeof (union opd_info) / 8;
4444 opd_sym_map = bfd_zalloc (abfd, amt);
4445 if (opd_sym_map == NULL)
4446 return FALSE;
4447 ppc64_elf_section_data (sec)->u.opd_func_sec = opd_sym_map;
4448 BFD_ASSERT (ppc64_elf_section_data (sec)->sec_type == sec_normal);
4449 ppc64_elf_section_data (sec)->sec_type = sec_opd;
4450 }
4451
4452 if (htab->sfpr == NULL
4453 && !create_linkage_sections (htab->elf.dynobj, info))
4454 return FALSE;
4455
4456 rel_end = relocs + sec->reloc_count;
4457 for (rel = relocs; rel < rel_end; rel++)
4458 {
4459 unsigned long r_symndx;
4460 struct elf_link_hash_entry *h;
4461 enum elf_ppc64_reloc_type r_type;
4462 int tls_type = 0;
4463 struct _ppc64_elf_section_data *ppc64_sec;
4464
4465 r_symndx = ELF64_R_SYM (rel->r_info);
4466 if (r_symndx < symtab_hdr->sh_info)
4467 h = NULL;
4468 else
4469 {
4470 h = sym_hashes[r_symndx - symtab_hdr->sh_info];
4471 while (h->root.type == bfd_link_hash_indirect
4472 || h->root.type == bfd_link_hash_warning)
4473 h = (struct elf_link_hash_entry *) h->root.u.i.link;
4474 }
4475
4476 r_type = ELF64_R_TYPE (rel->r_info);
4477 switch (r_type)
4478 {
4479 case R_PPC64_GOT_TLSLD16:
4480 case R_PPC64_GOT_TLSLD16_LO:
4481 case R_PPC64_GOT_TLSLD16_HI:
4482 case R_PPC64_GOT_TLSLD16_HA:
4483 ppc64_tlsld_got (abfd)->refcount += 1;
4484 tls_type = TLS_TLS | TLS_LD;
4485 goto dogottls;
4486
4487 case R_PPC64_GOT_TLSGD16:
4488 case R_PPC64_GOT_TLSGD16_LO:
4489 case R_PPC64_GOT_TLSGD16_HI:
4490 case R_PPC64_GOT_TLSGD16_HA:
4491 tls_type = TLS_TLS | TLS_GD;
4492 goto dogottls;
4493
4494 case R_PPC64_GOT_TPREL16_DS:
4495 case R_PPC64_GOT_TPREL16_LO_DS:
4496 case R_PPC64_GOT_TPREL16_HI:
4497 case R_PPC64_GOT_TPREL16_HA:
4498 if (info->shared)
4499 info->flags |= DF_STATIC_TLS;
4500 tls_type = TLS_TLS | TLS_TPREL;
4501 goto dogottls;
4502
4503 case R_PPC64_GOT_DTPREL16_DS:
4504 case R_PPC64_GOT_DTPREL16_LO_DS:
4505 case R_PPC64_GOT_DTPREL16_HI:
4506 case R_PPC64_GOT_DTPREL16_HA:
4507 tls_type = TLS_TLS | TLS_DTPREL;
4508 dogottls:
4509 sec->has_tls_reloc = 1;
4510 /* Fall thru */
4511
4512 case R_PPC64_GOT16:
4513 case R_PPC64_GOT16_DS:
4514 case R_PPC64_GOT16_HA:
4515 case R_PPC64_GOT16_HI:
4516 case R_PPC64_GOT16_LO:
4517 case R_PPC64_GOT16_LO_DS:
4518 /* This symbol requires a global offset table entry. */
4519 sec->has_toc_reloc = 1;
4520 if (ppc64_elf_tdata (abfd)->got == NULL
4521 && !create_got_section (abfd, info))
4522 return FALSE;
4523
4524 if (h != NULL)
4525 {
4526 struct ppc_link_hash_entry *eh;
4527 struct got_entry *ent;
4528
4529 eh = (struct ppc_link_hash_entry *) h;
4530 for (ent = eh->elf.got.glist; ent != NULL; ent = ent->next)
4531 if (ent->addend == rel->r_addend
4532 && ent->owner == abfd
4533 && ent->tls_type == tls_type)
4534 break;
4535 if (ent == NULL)
4536 {
4537 bfd_size_type amt = sizeof (*ent);
4538 ent = bfd_alloc (abfd, amt);
4539 if (ent == NULL)
4540 return FALSE;
4541 ent->next = eh->elf.got.glist;
4542 ent->addend = rel->r_addend;
4543 ent->owner = abfd;
4544 ent->tls_type = tls_type;
4545 ent->got.refcount = 0;
4546 eh->elf.got.glist = ent;
4547 }
4548 ent->got.refcount += 1;
4549 eh->tls_mask |= tls_type;
4550 }
4551 else
4552 /* This is a global offset table entry for a local symbol. */
4553 if (!update_local_sym_info (abfd, symtab_hdr, r_symndx,
4554 rel->r_addend, tls_type))
4555 return FALSE;
4556 break;
4557
4558 case R_PPC64_PLT16_HA:
4559 case R_PPC64_PLT16_HI:
4560 case R_PPC64_PLT16_LO:
4561 case R_PPC64_PLT32:
4562 case R_PPC64_PLT64:
4563 /* This symbol requires a procedure linkage table entry. We
4564 actually build the entry in adjust_dynamic_symbol,
4565 because this might be a case of linking PIC code without
4566 linking in any dynamic objects, in which case we don't
4567 need to generate a procedure linkage table after all. */
4568 if (h == NULL)
4569 {
4570 /* It does not make sense to have a procedure linkage
4571 table entry for a local symbol. */
4572 bfd_set_error (bfd_error_bad_value);
4573 return FALSE;
4574 }
4575 else
4576 if (!update_plt_info (abfd, (struct ppc_link_hash_entry *) h,
4577 rel->r_addend))
4578 return FALSE;
4579 break;
4580
4581 /* The following relocations don't need to propagate the
4582 relocation if linking a shared object since they are
4583 section relative. */
4584 case R_PPC64_SECTOFF:
4585 case R_PPC64_SECTOFF_LO:
4586 case R_PPC64_SECTOFF_HI:
4587 case R_PPC64_SECTOFF_HA:
4588 case R_PPC64_SECTOFF_DS:
4589 case R_PPC64_SECTOFF_LO_DS:
4590 case R_PPC64_DTPREL16:
4591 case R_PPC64_DTPREL16_LO:
4592 case R_PPC64_DTPREL16_HI:
4593 case R_PPC64_DTPREL16_HA:
4594 case R_PPC64_DTPREL16_DS:
4595 case R_PPC64_DTPREL16_LO_DS:
4596 case R_PPC64_DTPREL16_HIGHER:
4597 case R_PPC64_DTPREL16_HIGHERA:
4598 case R_PPC64_DTPREL16_HIGHEST:
4599 case R_PPC64_DTPREL16_HIGHESTA:
4600 break;
4601
4602 /* Nor do these. */
4603 case R_PPC64_TOC16:
4604 case R_PPC64_TOC16_LO:
4605 case R_PPC64_TOC16_HI:
4606 case R_PPC64_TOC16_HA:
4607 case R_PPC64_TOC16_DS:
4608 case R_PPC64_TOC16_LO_DS:
4609 sec->has_toc_reloc = 1;
4610 break;
4611
4612 /* This relocation describes the C++ object vtable hierarchy.
4613 Reconstruct it for later use during GC. */
4614 case R_PPC64_GNU_VTINHERIT:
4615 if (!bfd_elf_gc_record_vtinherit (abfd, sec, h, rel->r_offset))
4616 return FALSE;
4617 break;
4618
4619 /* This relocation describes which C++ vtable entries are actually
4620 used. Record for later use during GC. */
4621 case R_PPC64_GNU_VTENTRY:
4622 if (!bfd_elf_gc_record_vtentry (abfd, sec, h, rel->r_addend))
4623 return FALSE;
4624 break;
4625
4626 case R_PPC64_REL14:
4627 case R_PPC64_REL14_BRTAKEN:
4628 case R_PPC64_REL14_BRNTAKEN:
4629 {
4630 asection *dest = NULL;
4631
4632 /* Heuristic: If jumping outside our section, chances are
4633 we are going to need a stub. */
4634 if (h != NULL)
4635 {
4636 /* If the sym is weak it may be overridden later, so
4637 don't assume we know where a weak sym lives. */
4638 if (h->root.type == bfd_link_hash_defined)
4639 dest = h->root.u.def.section;
4640 }
4641 else
4642 dest = bfd_section_from_r_symndx (abfd, &htab->sym_sec,
4643 sec, r_symndx);
4644 if (dest != sec)
4645 ppc64_elf_section_data (sec)->has_14bit_branch = 1;
4646 }
4647 /* Fall through. */
4648
4649 case R_PPC64_REL24:
4650 if (h != NULL)
4651 {
4652 /* We may need a .plt entry if the function this reloc
4653 refers to is in a shared lib. */
4654 if (!update_plt_info (abfd, (struct ppc_link_hash_entry *) h,
4655 rel->r_addend))
4656 return FALSE;
4657 if (h == &htab->tls_get_addr->elf
4658 || h == &htab->tls_get_addr_fd->elf)
4659 sec->has_tls_reloc = 1;
4660 else if (htab->tls_get_addr == NULL
4661 && CONST_STRNEQ (h->root.root.string, ".__tls_get_addr")
4662 && (h->root.root.string[15] == 0
4663 || h->root.root.string[15] == '@'))
4664 {
4665 htab->tls_get_addr = (struct ppc_link_hash_entry *) h;
4666 sec->has_tls_reloc = 1;
4667 }
4668 else if (htab->tls_get_addr_fd == NULL
4669 && CONST_STRNEQ (h->root.root.string, "__tls_get_addr")
4670 && (h->root.root.string[14] == 0
4671 || h->root.root.string[14] == '@'))
4672 {
4673 htab->tls_get_addr_fd = (struct ppc_link_hash_entry *) h;
4674 sec->has_tls_reloc = 1;
4675 }
4676 }
4677 break;
4678
4679 case R_PPC64_TPREL64:
4680 tls_type = TLS_EXPLICIT | TLS_TLS | TLS_TPREL;
4681 if (info->shared)
4682 info->flags |= DF_STATIC_TLS;
4683 goto dotlstoc;
4684
4685 case R_PPC64_DTPMOD64:
4686 if (rel + 1 < rel_end
4687 && rel[1].r_info == ELF64_R_INFO (r_symndx, R_PPC64_DTPREL64)
4688 && rel[1].r_offset == rel->r_offset + 8)
4689 tls_type = TLS_EXPLICIT | TLS_TLS | TLS_GD;
4690 else
4691 tls_type = TLS_EXPLICIT | TLS_TLS | TLS_LD;
4692 goto dotlstoc;
4693
4694 case R_PPC64_DTPREL64:
4695 tls_type = TLS_EXPLICIT | TLS_TLS | TLS_DTPREL;
4696 if (rel != relocs
4697 && rel[-1].r_info == ELF64_R_INFO (r_symndx, R_PPC64_DTPMOD64)
4698 && rel[-1].r_offset == rel->r_offset - 8)
4699 /* This is the second reloc of a dtpmod, dtprel pair.
4700 Don't mark with TLS_DTPREL. */
4701 goto dodyn;
4702
4703 dotlstoc:
4704 sec->has_tls_reloc = 1;
4705 if (h != NULL)
4706 {
4707 struct ppc_link_hash_entry *eh;
4708 eh = (struct ppc_link_hash_entry *) h;
4709 eh->tls_mask |= tls_type;
4710 }
4711 else
4712 if (!update_local_sym_info (abfd, symtab_hdr, r_symndx,
4713 rel->r_addend, tls_type))
4714 return FALSE;
4715
4716 ppc64_sec = ppc64_elf_section_data (sec);
4717 if (ppc64_sec->sec_type != sec_toc)
4718 {
4719 /* One extra to simplify get_tls_mask. */
4720 bfd_size_type amt = sec->size * sizeof (unsigned) / 8 + 1;
4721 ppc64_sec->u.t_symndx = bfd_zalloc (abfd, amt);
4722 if (ppc64_sec->u.t_symndx == NULL)
4723 return FALSE;
4724 BFD_ASSERT (ppc64_sec->sec_type == sec_normal);
4725 ppc64_sec->sec_type = sec_toc;
4726 }
4727 BFD_ASSERT (rel->r_offset % 8 == 0);
4728 ppc64_sec->u.t_symndx[rel->r_offset / 8] = r_symndx;
4729
4730 /* Mark the second slot of a GD or LD entry.
4731 -1 to indicate GD and -2 to indicate LD. */
4732 if (tls_type == (TLS_EXPLICIT | TLS_TLS | TLS_GD))
4733 ppc64_sec->u.t_symndx[rel->r_offset / 8 + 1] = -1;
4734 else if (tls_type == (TLS_EXPLICIT | TLS_TLS | TLS_LD))
4735 ppc64_sec->u.t_symndx[rel->r_offset / 8 + 1] = -2;
4736 goto dodyn;
4737
4738 case R_PPC64_TPREL16:
4739 case R_PPC64_TPREL16_LO:
4740 case R_PPC64_TPREL16_HI:
4741 case R_PPC64_TPREL16_HA:
4742 case R_PPC64_TPREL16_DS:
4743 case R_PPC64_TPREL16_LO_DS:
4744 case R_PPC64_TPREL16_HIGHER:
4745 case R_PPC64_TPREL16_HIGHERA:
4746 case R_PPC64_TPREL16_HIGHEST:
4747 case R_PPC64_TPREL16_HIGHESTA:
4748 if (info->shared)
4749 {
4750 info->flags |= DF_STATIC_TLS;
4751 goto dodyn;
4752 }
4753 break;
4754
4755 case R_PPC64_ADDR64:
4756 if (opd_sym_map != NULL
4757 && rel + 1 < rel_end
4758 && ELF64_R_TYPE ((rel + 1)->r_info) == R_PPC64_TOC)
4759 {
4760 if (h != NULL)
4761 {
4762 if (h->root.root.string[0] == '.'
4763 && h->root.root.string[1] != 0
4764 && get_fdh ((struct ppc_link_hash_entry *) h, htab))
4765 ;
4766 else
4767 ((struct ppc_link_hash_entry *) h)->is_func = 1;
4768 }
4769 else
4770 {
4771 asection *s;
4772
4773 s = bfd_section_from_r_symndx (abfd, &htab->sym_sec, sec,
4774 r_symndx);
4775 if (s == NULL)
4776 return FALSE;
4777 else if (s != sec)
4778 opd_sym_map[rel->r_offset / 8] = s;
4779 }
4780 }
4781 /* Fall through. */
4782
4783 case R_PPC64_REL30:
4784 case R_PPC64_REL32:
4785 case R_PPC64_REL64:
4786 case R_PPC64_ADDR14:
4787 case R_PPC64_ADDR14_BRNTAKEN:
4788 case R_PPC64_ADDR14_BRTAKEN:
4789 case R_PPC64_ADDR16:
4790 case R_PPC64_ADDR16_DS:
4791 case R_PPC64_ADDR16_HA:
4792 case R_PPC64_ADDR16_HI:
4793 case R_PPC64_ADDR16_HIGHER:
4794 case R_PPC64_ADDR16_HIGHERA:
4795 case R_PPC64_ADDR16_HIGHEST:
4796 case R_PPC64_ADDR16_HIGHESTA:
4797 case R_PPC64_ADDR16_LO:
4798 case R_PPC64_ADDR16_LO_DS:
4799 case R_PPC64_ADDR24:
4800 case R_PPC64_ADDR32:
4801 case R_PPC64_UADDR16:
4802 case R_PPC64_UADDR32:
4803 case R_PPC64_UADDR64:
4804 case R_PPC64_TOC:
4805 if (h != NULL && !info->shared)
4806 /* We may need a copy reloc. */
4807 h->non_got_ref = 1;
4808
4809 /* Don't propagate .opd relocs. */
4810 if (NO_OPD_RELOCS && opd_sym_map != NULL)
4811 break;
4812
4813 /* If we are creating a shared library, and this is a reloc
4814 against a global symbol, or a non PC relative reloc
4815 against a local symbol, then we need to copy the reloc
4816 into the shared library. However, if we are linking with
4817 -Bsymbolic, we do not need to copy a reloc against a
4818 global symbol which is defined in an object we are
4819 including in the link (i.e., DEF_REGULAR is set). At
4820 this point we have not seen all the input files, so it is
4821 possible that DEF_REGULAR is not set now but will be set
4822 later (it is never cleared). In case of a weak definition,
4823 DEF_REGULAR may be cleared later by a strong definition in
4824 a shared library. We account for that possibility below by
4825 storing information in the dyn_relocs field of the hash
4826 table entry. A similar situation occurs when creating
4827 shared libraries and symbol visibility changes render the
4828 symbol local.
4829
4830 If on the other hand, we are creating an executable, we
4831 may need to keep relocations for symbols satisfied by a
4832 dynamic library if we manage to avoid copy relocs for the
4833 symbol. */
4834 dodyn:
4835 if ((info->shared
4836 && (MUST_BE_DYN_RELOC (r_type)
4837 || (h != NULL
4838 && (! info->symbolic
4839 || h->root.type == bfd_link_hash_defweak
4840 || !h->def_regular))))
4841 || (ELIMINATE_COPY_RELOCS
4842 && !info->shared
4843 && h != NULL
4844 && (h->root.type == bfd_link_hash_defweak
4845 || !h->def_regular)))
4846 {
4847 struct ppc_dyn_relocs *p;
4848 struct ppc_dyn_relocs **head;
4849
4850 /* We must copy these reloc types into the output file.
4851 Create a reloc section in dynobj and make room for
4852 this reloc. */
4853 if (sreloc == NULL)
4854 {
4855 const char *name;
4856 bfd *dynobj;
4857
4858 name = (bfd_elf_string_from_elf_section
4859 (abfd,
4860 elf_elfheader (abfd)->e_shstrndx,
4861 elf_section_data (sec)->rel_hdr.sh_name));
4862 if (name == NULL)
4863 return FALSE;
4864
4865 if (! CONST_STRNEQ (name, ".rela")
4866 || strcmp (bfd_get_section_name (abfd, sec),
4867 name + 5) != 0)
4868 {
4869 (*_bfd_error_handler)
4870 (_("%B: bad relocation section name `%s\'"),
4871 abfd, name);
4872 bfd_set_error (bfd_error_bad_value);
4873 }
4874
4875 dynobj = htab->elf.dynobj;
4876 sreloc = bfd_get_section_by_name (dynobj, name);
4877 if (sreloc == NULL)
4878 {
4879 flagword flags;
4880
4881 flags = (SEC_HAS_CONTENTS | SEC_READONLY
4882 | SEC_IN_MEMORY | SEC_LINKER_CREATED
4883 | SEC_ALLOC | SEC_LOAD);
4884 sreloc = bfd_make_section_with_flags (dynobj,
4885 name,
4886 flags);
4887 if (sreloc == NULL
4888 || ! bfd_set_section_alignment (dynobj, sreloc, 3))
4889 return FALSE;
4890 }
4891 elf_section_data (sec)->sreloc = sreloc;
4892 }
4893
4894 /* If this is a global symbol, we count the number of
4895 relocations we need for this symbol. */
4896 if (h != NULL)
4897 {
4898 head = &((struct ppc_link_hash_entry *) h)->dyn_relocs;
4899 }
4900 else
4901 {
4902 /* Track dynamic relocs needed for local syms too.
4903 We really need local syms available to do this
4904 easily. Oh well. */
4905
4906 asection *s;
4907 void *vpp;
4908
4909 s = bfd_section_from_r_symndx (abfd, &htab->sym_sec,
4910 sec, r_symndx);
4911 if (s == NULL)
4912 return FALSE;
4913
4914 vpp = &elf_section_data (s)->local_dynrel;
4915 head = (struct ppc_dyn_relocs **) vpp;
4916 }
4917
4918 p = *head;
4919 if (p == NULL || p->sec != sec)
4920 {
4921 p = bfd_alloc (htab->elf.dynobj, sizeof *p);
4922 if (p == NULL)
4923 return FALSE;
4924 p->next = *head;
4925 *head = p;
4926 p->sec = sec;
4927 p->count = 0;
4928 p->pc_count = 0;
4929 }
4930
4931 p->count += 1;
4932 if (!MUST_BE_DYN_RELOC (r_type))
4933 p->pc_count += 1;
4934 }
4935 break;
4936
4937 default:
4938 break;
4939 }
4940 }
4941
4942 return TRUE;
4943 }
4944
4945 /* OFFSET in OPD_SEC specifies a function descriptor. Return the address
4946 of the code entry point, and its section. */
4947
4948 static bfd_vma
4949 opd_entry_value (asection *opd_sec,
4950 bfd_vma offset,
4951 asection **code_sec,
4952 bfd_vma *code_off)
4953 {
4954 bfd *opd_bfd = opd_sec->owner;
4955 Elf_Internal_Rela *relocs;
4956 Elf_Internal_Rela *lo, *hi, *look;
4957 bfd_vma val;
4958
4959 /* No relocs implies we are linking a --just-symbols object. */
4960 if (opd_sec->reloc_count == 0)
4961 {
4962 bfd_vma val;
4963
4964 if (!bfd_get_section_contents (opd_bfd, opd_sec, &val, offset, 8))
4965 return (bfd_vma) -1;
4966
4967 if (code_sec != NULL)
4968 {
4969 asection *sec, *likely = NULL;
4970 for (sec = opd_bfd->sections; sec != NULL; sec = sec->next)
4971 if (sec->vma <= val
4972 && (sec->flags & SEC_LOAD) != 0
4973 && (sec->flags & SEC_ALLOC) != 0)
4974 likely = sec;
4975 if (likely != NULL)
4976 {
4977 *code_sec = likely;
4978 if (code_off != NULL)
4979 *code_off = val - likely->vma;
4980 }
4981 }
4982 return val;
4983 }
4984
4985 relocs = ppc64_elf_tdata (opd_bfd)->opd_relocs;
4986 if (relocs == NULL)
4987 relocs = _bfd_elf_link_read_relocs (opd_bfd, opd_sec, NULL, NULL, TRUE);
4988
4989 /* Go find the opd reloc at the sym address. */
4990 lo = relocs;
4991 BFD_ASSERT (lo != NULL);
4992 hi = lo + opd_sec->reloc_count - 1; /* ignore last reloc */
4993 val = (bfd_vma) -1;
4994 while (lo < hi)
4995 {
4996 look = lo + (hi - lo) / 2;
4997 if (look->r_offset < offset)
4998 lo = look + 1;
4999 else if (look->r_offset > offset)
5000 hi = look;
5001 else
5002 {
5003 Elf_Internal_Shdr *symtab_hdr = &elf_tdata (opd_bfd)->symtab_hdr;
5004 if (ELF64_R_TYPE (look->r_info) == R_PPC64_ADDR64
5005 && ELF64_R_TYPE ((look + 1)->r_info) == R_PPC64_TOC)
5006 {
5007 unsigned long symndx = ELF64_R_SYM (look->r_info);
5008 asection *sec;
5009
5010 if (symndx < symtab_hdr->sh_info)
5011 {
5012 Elf_Internal_Sym *sym;
5013
5014 sym = (Elf_Internal_Sym *) symtab_hdr->contents;
5015 if (sym == NULL)
5016 {
5017 sym = bfd_elf_get_elf_syms (opd_bfd, symtab_hdr,
5018 symtab_hdr->sh_info,
5019 0, NULL, NULL, NULL);
5020 if (sym == NULL)
5021 break;
5022 symtab_hdr->contents = (bfd_byte *) sym;
5023 }
5024
5025 sym += symndx;
5026 val = sym->st_value;
5027 sec = NULL;
5028 if ((sym->st_shndx != SHN_UNDEF
5029 && sym->st_shndx < SHN_LORESERVE)
5030 || sym->st_shndx > SHN_HIRESERVE)
5031 sec = bfd_section_from_elf_index (opd_bfd, sym->st_shndx);
5032 BFD_ASSERT ((sec->flags & SEC_MERGE) == 0);
5033 }
5034 else
5035 {
5036 struct elf_link_hash_entry **sym_hashes;
5037 struct elf_link_hash_entry *rh;
5038
5039 sym_hashes = elf_sym_hashes (opd_bfd);
5040 rh = sym_hashes[symndx - symtab_hdr->sh_info];
5041 while (rh->root.type == bfd_link_hash_indirect
5042 || rh->root.type == bfd_link_hash_warning)
5043 rh = ((struct elf_link_hash_entry *) rh->root.u.i.link);
5044 BFD_ASSERT (rh->root.type == bfd_link_hash_defined
5045 || rh->root.type == bfd_link_hash_defweak);
5046 val = rh->root.u.def.value;
5047 sec = rh->root.u.def.section;
5048 }
5049 val += look->r_addend;
5050 if (code_off != NULL)
5051 *code_off = val;
5052 if (code_sec != NULL)
5053 *code_sec = sec;
5054 if (sec != NULL && sec->output_section != NULL)
5055 val += sec->output_section->vma + sec->output_offset;
5056 }
5057 break;
5058 }
5059 }
5060
5061 return val;
5062 }
5063
5064 /* Mark sections containing dynamically referenced symbols. When
5065 building shared libraries, we must assume that any visible symbol is
5066 referenced. */
5067
5068 static bfd_boolean
5069 ppc64_elf_gc_mark_dynamic_ref (struct elf_link_hash_entry *h, void *inf)
5070 {
5071 struct bfd_link_info *info = (struct bfd_link_info *) inf;
5072 struct ppc_link_hash_entry *eh = (struct ppc_link_hash_entry *) h;
5073
5074 if (eh->elf.root.type == bfd_link_hash_warning)
5075 eh = (struct ppc_link_hash_entry *) eh->elf.root.u.i.link;
5076
5077 /* Dynamic linking info is on the func descriptor sym. */
5078 if (eh->oh != NULL
5079 && eh->oh->is_func_descriptor
5080 && (eh->oh->elf.root.type == bfd_link_hash_defined
5081 || eh->oh->elf.root.type == bfd_link_hash_defweak))
5082 eh = eh->oh;
5083
5084 if ((eh->elf.root.type == bfd_link_hash_defined
5085 || eh->elf.root.type == bfd_link_hash_defweak)
5086 && (eh->elf.ref_dynamic
5087 || (!info->executable
5088 && eh->elf.def_regular
5089 && ELF_ST_VISIBILITY (eh->elf.other) != STV_INTERNAL
5090 && ELF_ST_VISIBILITY (eh->elf.other) != STV_HIDDEN)))
5091 {
5092 asection *code_sec;
5093
5094 eh->elf.root.u.def.section->flags |= SEC_KEEP;
5095
5096 /* Function descriptor syms cause the associated
5097 function code sym section to be marked. */
5098 if (eh->is_func_descriptor
5099 && (eh->oh->elf.root.type == bfd_link_hash_defined
5100 || eh->oh->elf.root.type == bfd_link_hash_defweak))
5101 eh->oh->elf.root.u.def.section->flags |= SEC_KEEP;
5102 else if (get_opd_info (eh->elf.root.u.def.section) != NULL
5103 && opd_entry_value (eh->elf.root.u.def.section,
5104 eh->elf.root.u.def.value,
5105 &code_sec, NULL) != (bfd_vma) -1)
5106 code_sec->flags |= SEC_KEEP;
5107 }
5108
5109 return TRUE;
5110 }
5111
5112 /* Return the section that should be marked against GC for a given
5113 relocation. */
5114
5115 static asection *
5116 ppc64_elf_gc_mark_hook (asection *sec,
5117 struct bfd_link_info *info,
5118 Elf_Internal_Rela *rel,
5119 struct elf_link_hash_entry *h,
5120 Elf_Internal_Sym *sym)
5121 {
5122 asection *rsec;
5123
5124 /* First mark all our entry sym sections. */
5125 if (info->gc_sym_list != NULL)
5126 {
5127 struct ppc_link_hash_table *htab = ppc_hash_table (info);
5128 struct bfd_sym_chain *sym = info->gc_sym_list;
5129
5130 info->gc_sym_list = NULL;
5131 for (; sym != NULL; sym = sym->next)
5132 {
5133 struct ppc_link_hash_entry *eh;
5134
5135 eh = (struct ppc_link_hash_entry *)
5136 elf_link_hash_lookup (&htab->elf, sym->name, FALSE, FALSE, FALSE);
5137 if (eh == NULL)
5138 continue;
5139 if (eh->elf.root.type != bfd_link_hash_defined
5140 && eh->elf.root.type != bfd_link_hash_defweak)
5141 continue;
5142
5143 if (eh->is_func_descriptor
5144 && (eh->oh->elf.root.type == bfd_link_hash_defined
5145 || eh->oh->elf.root.type == bfd_link_hash_defweak))
5146 rsec = eh->oh->elf.root.u.def.section;
5147 else if (get_opd_info (eh->elf.root.u.def.section) != NULL
5148 && opd_entry_value (eh->elf.root.u.def.section,
5149 eh->elf.root.u.def.value,
5150 &rsec, NULL) != (bfd_vma) -1)
5151 ;
5152 else
5153 continue;
5154
5155 if (!rsec->gc_mark)
5156 _bfd_elf_gc_mark (info, rsec, ppc64_elf_gc_mark_hook);
5157
5158 rsec = eh->elf.root.u.def.section;
5159 if (!rsec->gc_mark)
5160 _bfd_elf_gc_mark (info, rsec, ppc64_elf_gc_mark_hook);
5161 }
5162 }
5163
5164 /* Syms return NULL if we're marking .opd, so we avoid marking all
5165 function sections, as all functions are referenced in .opd. */
5166 rsec = NULL;
5167 if (get_opd_info (sec) != NULL)
5168 return rsec;
5169
5170 if (h != NULL)
5171 {
5172 enum elf_ppc64_reloc_type r_type;
5173 struct ppc_link_hash_entry *eh;
5174
5175 r_type = ELF64_R_TYPE (rel->r_info);
5176 switch (r_type)
5177 {
5178 case R_PPC64_GNU_VTINHERIT:
5179 case R_PPC64_GNU_VTENTRY:
5180 break;
5181
5182 default:
5183 switch (h->root.type)
5184 {
5185 case bfd_link_hash_defined:
5186 case bfd_link_hash_defweak:
5187 eh = (struct ppc_link_hash_entry *) h;
5188 if (eh->oh != NULL
5189 && eh->oh->is_func_descriptor
5190 && (eh->oh->elf.root.type == bfd_link_hash_defined
5191 || eh->oh->elf.root.type == bfd_link_hash_defweak))
5192 eh = eh->oh;
5193
5194 /* Function descriptor syms cause the associated
5195 function code sym section to be marked. */
5196 if (eh->is_func_descriptor
5197 && (eh->oh->elf.root.type == bfd_link_hash_defined
5198 || eh->oh->elf.root.type == bfd_link_hash_defweak))
5199 {
5200 /* They also mark their opd section. */
5201 if (!eh->elf.root.u.def.section->gc_mark)
5202 _bfd_elf_gc_mark (info, eh->elf.root.u.def.section,
5203 ppc64_elf_gc_mark_hook);
5204
5205 rsec = eh->oh->elf.root.u.def.section;
5206 }
5207 else if (get_opd_info (eh->elf.root.u.def.section) != NULL
5208 && opd_entry_value (eh->elf.root.u.def.section,
5209 eh->elf.root.u.def.value,
5210 &rsec, NULL) != (bfd_vma) -1)
5211 {
5212 if (!eh->elf.root.u.def.section->gc_mark)
5213 _bfd_elf_gc_mark (info, eh->elf.root.u.def.section,
5214 ppc64_elf_gc_mark_hook);
5215 }
5216 else
5217 rsec = h->root.u.def.section;
5218 break;
5219
5220 case bfd_link_hash_common:
5221 rsec = h->root.u.c.p->section;
5222 break;
5223
5224 default:
5225 break;
5226 }
5227 }
5228 }
5229 else
5230 {
5231 asection **opd_sym_section;
5232
5233 rsec = bfd_section_from_elf_index (sec->owner, sym->st_shndx);
5234 opd_sym_section = get_opd_info (rsec);
5235 if (opd_sym_section != NULL)
5236 {
5237 if (!rsec->gc_mark)
5238 _bfd_elf_gc_mark (info, rsec, ppc64_elf_gc_mark_hook);
5239
5240 rsec = opd_sym_section[(sym->st_value + rel->r_addend) / 8];
5241 }
5242 }
5243
5244 return rsec;
5245 }
5246
5247 /* Update the .got, .plt. and dynamic reloc reference counts for the
5248 section being removed. */
5249
5250 static bfd_boolean
5251 ppc64_elf_gc_sweep_hook (bfd *abfd, struct bfd_link_info *info,
5252 asection *sec, const Elf_Internal_Rela *relocs)
5253 {
5254 struct ppc_link_hash_table *htab;
5255 Elf_Internal_Shdr *symtab_hdr;
5256 struct elf_link_hash_entry **sym_hashes;
5257 struct got_entry **local_got_ents;
5258 const Elf_Internal_Rela *rel, *relend;
5259
5260 if ((sec->flags & SEC_ALLOC) == 0)
5261 return TRUE;
5262
5263 elf_section_data (sec)->local_dynrel = NULL;
5264
5265 htab = ppc_hash_table (info);
5266 symtab_hdr = &elf_tdata (abfd)->symtab_hdr;
5267 sym_hashes = elf_sym_hashes (abfd);
5268 local_got_ents = elf_local_got_ents (abfd);
5269
5270 relend = relocs + sec->reloc_count;
5271 for (rel = relocs; rel < relend; rel++)
5272 {
5273 unsigned long r_symndx;
5274 enum elf_ppc64_reloc_type r_type;
5275 struct elf_link_hash_entry *h = NULL;
5276 char tls_type = 0;
5277
5278 r_symndx = ELF64_R_SYM (rel->r_info);
5279 r_type = ELF64_R_TYPE (rel->r_info);
5280 if (r_symndx >= symtab_hdr->sh_info)
5281 {
5282 struct ppc_link_hash_entry *eh;
5283 struct ppc_dyn_relocs **pp;
5284 struct ppc_dyn_relocs *p;
5285
5286 h = sym_hashes[r_symndx - symtab_hdr->sh_info];
5287 while (h->root.type == bfd_link_hash_indirect
5288 || h->root.type == bfd_link_hash_warning)
5289 h = (struct elf_link_hash_entry *) h->root.u.i.link;
5290 eh = (struct ppc_link_hash_entry *) h;
5291
5292 for (pp = &eh->dyn_relocs; (p = *pp) != NULL; pp = &p->next)
5293 if (p->sec == sec)
5294 {
5295 /* Everything must go for SEC. */
5296 *pp = p->next;
5297 break;
5298 }
5299 }
5300
5301 switch (r_type)
5302 {
5303 case R_PPC64_GOT_TLSLD16:
5304 case R_PPC64_GOT_TLSLD16_LO:
5305 case R_PPC64_GOT_TLSLD16_HI:
5306 case R_PPC64_GOT_TLSLD16_HA:
5307 ppc64_tlsld_got (abfd)->refcount -= 1;
5308 tls_type = TLS_TLS | TLS_LD;
5309 goto dogot;
5310
5311 case R_PPC64_GOT_TLSGD16:
5312 case R_PPC64_GOT_TLSGD16_LO:
5313 case R_PPC64_GOT_TLSGD16_HI:
5314 case R_PPC64_GOT_TLSGD16_HA:
5315 tls_type = TLS_TLS | TLS_GD;
5316 goto dogot;
5317
5318 case R_PPC64_GOT_TPREL16_DS:
5319 case R_PPC64_GOT_TPREL16_LO_DS:
5320 case R_PPC64_GOT_TPREL16_HI:
5321 case R_PPC64_GOT_TPREL16_HA:
5322 tls_type = TLS_TLS | TLS_TPREL;
5323 goto dogot;
5324
5325 case R_PPC64_GOT_DTPREL16_DS:
5326 case R_PPC64_GOT_DTPREL16_LO_DS:
5327 case R_PPC64_GOT_DTPREL16_HI:
5328 case R_PPC64_GOT_DTPREL16_HA:
5329 tls_type = TLS_TLS | TLS_DTPREL;
5330 goto dogot;
5331
5332 case R_PPC64_GOT16:
5333 case R_PPC64_GOT16_DS:
5334 case R_PPC64_GOT16_HA:
5335 case R_PPC64_GOT16_HI:
5336 case R_PPC64_GOT16_LO:
5337 case R_PPC64_GOT16_LO_DS:
5338 dogot:
5339 {
5340 struct got_entry *ent;
5341
5342 if (h != NULL)
5343 ent = h->got.glist;
5344 else
5345 ent = local_got_ents[r_symndx];
5346
5347 for (; ent != NULL; ent = ent->next)
5348 if (ent->addend == rel->r_addend
5349 && ent->owner == abfd
5350 && ent->tls_type == tls_type)
5351 break;
5352 if (ent == NULL)
5353 abort ();
5354 if (ent->got.refcount > 0)
5355 ent->got.refcount -= 1;
5356 }
5357 break;
5358
5359 case R_PPC64_PLT16_HA:
5360 case R_PPC64_PLT16_HI:
5361 case R_PPC64_PLT16_LO:
5362 case R_PPC64_PLT32:
5363 case R_PPC64_PLT64:
5364 case R_PPC64_REL14:
5365 case R_PPC64_REL14_BRNTAKEN:
5366 case R_PPC64_REL14_BRTAKEN:
5367 case R_PPC64_REL24:
5368 if (h != NULL)
5369 {
5370 struct plt_entry *ent;
5371
5372 for (ent = h->plt.plist; ent != NULL; ent = ent->next)
5373 if (ent->addend == rel->r_addend)
5374 break;
5375 if (ent == NULL)
5376 abort ();
5377 if (ent->plt.refcount > 0)
5378 ent->plt.refcount -= 1;
5379 }
5380 break;
5381
5382 default:
5383 break;
5384 }
5385 }
5386 return TRUE;
5387 }
5388
5389 /* The maximum size of .sfpr. */
5390 #define SFPR_MAX (218*4)
5391
5392 struct sfpr_def_parms
5393 {
5394 const char name[12];
5395 unsigned char lo, hi;
5396 bfd_byte * (*write_ent) (bfd *, bfd_byte *, int);
5397 bfd_byte * (*write_tail) (bfd *, bfd_byte *, int);
5398 };
5399
5400 /* Auto-generate _save*, _rest* functions in .sfpr. */
5401
5402 static unsigned int
5403 sfpr_define (struct bfd_link_info *info, const struct sfpr_def_parms *parm)
5404 {
5405 struct ppc_link_hash_table *htab = ppc_hash_table (info);
5406 unsigned int i;
5407 size_t len = strlen (parm->name);
5408 bfd_boolean writing = FALSE;
5409 char sym[16];
5410
5411 memcpy (sym, parm->name, len);
5412 sym[len + 2] = 0;
5413
5414 for (i = parm->lo; i <= parm->hi; i++)
5415 {
5416 struct elf_link_hash_entry *h;
5417
5418 sym[len + 0] = i / 10 + '0';
5419 sym[len + 1] = i % 10 + '0';
5420 h = elf_link_hash_lookup (&htab->elf, sym, FALSE, FALSE, TRUE);
5421 if (h != NULL
5422 && !h->def_regular)
5423 {
5424 h->root.type = bfd_link_hash_defined;
5425 h->root.u.def.section = htab->sfpr;
5426 h->root.u.def.value = htab->sfpr->size;
5427 h->type = STT_FUNC;
5428 h->def_regular = 1;
5429 _bfd_elf_link_hash_hide_symbol (info, h, TRUE);
5430 writing = TRUE;
5431 if (htab->sfpr->contents == NULL)
5432 {
5433 htab->sfpr->contents = bfd_alloc (htab->elf.dynobj, SFPR_MAX);
5434 if (htab->sfpr->contents == NULL)
5435 return FALSE;
5436 }
5437 }
5438 if (writing)
5439 {
5440 bfd_byte *p = htab->sfpr->contents + htab->sfpr->size;
5441 if (i != parm->hi)
5442 p = (*parm->write_ent) (htab->elf.dynobj, p, i);
5443 else
5444 p = (*parm->write_tail) (htab->elf.dynobj, p, i);
5445 htab->sfpr->size = p - htab->sfpr->contents;
5446 }
5447 }
5448
5449 return TRUE;
5450 }
5451
5452 static bfd_byte *
5453 savegpr0 (bfd *abfd, bfd_byte *p, int r)
5454 {
5455 bfd_put_32 (abfd, STD_R0_0R1 + (r << 21) + (1 << 16) - (32 - r) * 8, p);
5456 return p + 4;
5457 }
5458
5459 static bfd_byte *
5460 savegpr0_tail (bfd *abfd, bfd_byte *p, int r)
5461 {
5462 p = savegpr0 (abfd, p, r);
5463 bfd_put_32 (abfd, STD_R0_0R1 + 16, p);
5464 p = p + 4;
5465 bfd_put_32 (abfd, BLR, p);
5466 return p + 4;
5467 }
5468
5469 static bfd_byte *
5470 restgpr0 (bfd *abfd, bfd_byte *p, int r)
5471 {
5472 bfd_put_32 (abfd, LD_R0_0R1 + (r << 21) + (1 << 16) - (32 - r) * 8, p);
5473 return p + 4;
5474 }
5475
5476 static bfd_byte *
5477 restgpr0_tail (bfd *abfd, bfd_byte *p, int r)
5478 {
5479 bfd_put_32 (abfd, LD_R0_0R1 + 16, p);
5480 p = p + 4;
5481 p = restgpr0 (abfd, p, r);
5482 bfd_put_32 (abfd, MTLR_R0, p);
5483 p = p + 4;
5484 if (r == 29)
5485 {
5486 p = restgpr0 (abfd, p, 30);
5487 p = restgpr0 (abfd, p, 31);
5488 }
5489 bfd_put_32 (abfd, BLR, p);
5490 return p + 4;
5491 }
5492
5493 static bfd_byte *
5494 savegpr1 (bfd *abfd, bfd_byte *p, int r)
5495 {
5496 bfd_put_32 (abfd, STD_R0_0R12 + (r << 21) + (1 << 16) - (32 - r) * 8, p);
5497 return p + 4;
5498 }
5499
5500 static bfd_byte *
5501 savegpr1_tail (bfd *abfd, bfd_byte *p, int r)
5502 {
5503 p = savegpr1 (abfd, p, r);
5504 bfd_put_32 (abfd, BLR, p);
5505 return p + 4;
5506 }
5507
5508 static bfd_byte *
5509 restgpr1 (bfd *abfd, bfd_byte *p, int r)
5510 {
5511 bfd_put_32 (abfd, LD_R0_0R12 + (r << 21) + (1 << 16) - (32 - r) * 8, p);
5512 return p + 4;
5513 }
5514
5515 static bfd_byte *
5516 restgpr1_tail (bfd *abfd, bfd_byte *p, int r)
5517 {
5518 p = restgpr1 (abfd, p, r);
5519 bfd_put_32 (abfd, BLR, p);
5520 return p + 4;
5521 }
5522
5523 static bfd_byte *
5524 savefpr (bfd *abfd, bfd_byte *p, int r)
5525 {
5526 bfd_put_32 (abfd, STFD_FR0_0R1 + (r << 21) + (1 << 16) - (32 - r) * 8, p);
5527 return p + 4;
5528 }
5529
5530 static bfd_byte *
5531 savefpr0_tail (bfd *abfd, bfd_byte *p, int r)
5532 {
5533 p = savefpr (abfd, p, r);
5534 bfd_put_32 (abfd, STD_R0_0R1 + 16, p);
5535 p = p + 4;
5536 bfd_put_32 (abfd, BLR, p);
5537 return p + 4;
5538 }
5539
5540 static bfd_byte *
5541 restfpr (bfd *abfd, bfd_byte *p, int r)
5542 {
5543 bfd_put_32 (abfd, LFD_FR0_0R1 + (r << 21) + (1 << 16) - (32 - r) * 8, p);
5544 return p + 4;
5545 }
5546
5547 static bfd_byte *
5548 restfpr0_tail (bfd *abfd, bfd_byte *p, int r)
5549 {
5550 bfd_put_32 (abfd, LD_R0_0R1 + 16, p);
5551 p = p + 4;
5552 p = restfpr (abfd, p, r);
5553 bfd_put_32 (abfd, MTLR_R0, p);
5554 p = p + 4;
5555 if (r == 29)
5556 {
5557 p = restfpr (abfd, p, 30);
5558 p = restfpr (abfd, p, 31);
5559 }
5560 bfd_put_32 (abfd, BLR, p);
5561 return p + 4;
5562 }
5563
5564 static bfd_byte *
5565 savefpr1_tail (bfd *abfd, bfd_byte *p, int r)
5566 {
5567 p = savefpr (abfd, p, r);
5568 bfd_put_32 (abfd, BLR, p);
5569 return p + 4;
5570 }
5571
5572 static bfd_byte *
5573 restfpr1_tail (bfd *abfd, bfd_byte *p, int r)
5574 {
5575 p = restfpr (abfd, p, r);
5576 bfd_put_32 (abfd, BLR, p);
5577 return p + 4;
5578 }
5579
5580 static bfd_byte *
5581 savevr (bfd *abfd, bfd_byte *p, int r)
5582 {
5583 bfd_put_32 (abfd, LI_R12_0 + (1 << 16) - (32 - r) * 16, p);
5584 p = p + 4;
5585 bfd_put_32 (abfd, STVX_VR0_R12_R0 + (r << 21), p);
5586 return p + 4;
5587 }
5588
5589 static bfd_byte *
5590 savevr_tail (bfd *abfd, bfd_byte *p, int r)
5591 {
5592 p = savevr (abfd, p, r);
5593 bfd_put_32 (abfd, BLR, p);
5594 return p + 4;
5595 }
5596
5597 static bfd_byte *
5598 restvr (bfd *abfd, bfd_byte *p, int r)
5599 {
5600 bfd_put_32 (abfd, LI_R12_0 + (1 << 16) - (32 - r) * 16, p);
5601 p = p + 4;
5602 bfd_put_32 (abfd, LVX_VR0_R12_R0 + (r << 21), p);
5603 return p + 4;
5604 }
5605
5606 static bfd_byte *
5607 restvr_tail (bfd *abfd, bfd_byte *p, int r)
5608 {
5609 p = restvr (abfd, p, r);
5610 bfd_put_32 (abfd, BLR, p);
5611 return p + 4;
5612 }
5613
5614 /* Called via elf_link_hash_traverse to transfer dynamic linking
5615 information on function code symbol entries to their corresponding
5616 function descriptor symbol entries. */
5617
5618 static bfd_boolean
5619 func_desc_adjust (struct elf_link_hash_entry *h, void *inf)
5620 {
5621 struct bfd_link_info *info;
5622 struct ppc_link_hash_table *htab;
5623 struct plt_entry *ent;
5624 struct ppc_link_hash_entry *fh;
5625 struct ppc_link_hash_entry *fdh;
5626 bfd_boolean force_local;
5627
5628 fh = (struct ppc_link_hash_entry *) h;
5629 if (fh->elf.root.type == bfd_link_hash_indirect)
5630 return TRUE;
5631
5632 if (fh->elf.root.type == bfd_link_hash_warning)
5633 fh = (struct ppc_link_hash_entry *) fh->elf.root.u.i.link;
5634
5635 info = inf;
5636 htab = ppc_hash_table (info);
5637
5638 /* Resolve undefined references to dot-symbols as the value
5639 in the function descriptor, if we have one in a regular object.
5640 This is to satisfy cases like ".quad .foo". Calls to functions
5641 in dynamic objects are handled elsewhere. */
5642 if (fh->elf.root.type == bfd_link_hash_undefweak
5643 && fh->was_undefined
5644 && (fh->oh->elf.root.type == bfd_link_hash_defined
5645 || fh->oh->elf.root.type == bfd_link_hash_defweak)
5646 && get_opd_info (fh->oh->elf.root.u.def.section) != NULL
5647 && opd_entry_value (fh->oh->elf.root.u.def.section,
5648 fh->oh->elf.root.u.def.value,
5649 &fh->elf.root.u.def.section,
5650 &fh->elf.root.u.def.value) != (bfd_vma) -1)
5651 {
5652 fh->elf.root.type = fh->oh->elf.root.type;
5653 fh->elf.forced_local = 1;
5654 fh->elf.def_regular = fh->oh->elf.def_regular;
5655 fh->elf.def_dynamic = fh->oh->elf.def_dynamic;
5656 }
5657
5658 /* If this is a function code symbol, transfer dynamic linking
5659 information to the function descriptor symbol. */
5660 if (!fh->is_func)
5661 return TRUE;
5662
5663 for (ent = fh->elf.plt.plist; ent != NULL; ent = ent->next)
5664 if (ent->plt.refcount > 0)
5665 break;
5666 if (ent == NULL
5667 || fh->elf.root.root.string[0] != '.'
5668 || fh->elf.root.root.string[1] == '\0')
5669 return TRUE;
5670
5671 /* Find the corresponding function descriptor symbol. Create it
5672 as undefined if necessary. */
5673
5674 fdh = get_fdh (fh, htab);
5675 if (fdh != NULL)
5676 while (fdh->elf.root.type == bfd_link_hash_indirect
5677 || fdh->elf.root.type == bfd_link_hash_warning)
5678 fdh = (struct ppc_link_hash_entry *) fdh->elf.root.u.i.link;
5679
5680 if (fdh == NULL
5681 && info->shared
5682 && (fh->elf.root.type == bfd_link_hash_undefined
5683 || fh->elf.root.type == bfd_link_hash_undefweak))
5684 {
5685 fdh = make_fdh (info, fh);
5686 if (fdh == NULL)
5687 return FALSE;
5688 }
5689
5690 /* Fake function descriptors are made undefweak. If the function
5691 code symbol is strong undefined, make the fake sym the same.
5692 If the function code symbol is defined, then force the fake
5693 descriptor local; We can't support overriding of symbols in a
5694 shared library on a fake descriptor. */
5695
5696 if (fdh != NULL
5697 && fdh->fake
5698 && fdh->elf.root.type == bfd_link_hash_undefweak)
5699 {
5700 if (fh->elf.root.type == bfd_link_hash_undefined)
5701 {
5702 fdh->elf.root.type = bfd_link_hash_undefined;
5703 bfd_link_add_undef (&htab->elf.root, &fdh->elf.root);
5704 }
5705 else if (fh->elf.root.type == bfd_link_hash_defined
5706 || fh->elf.root.type == bfd_link_hash_defweak)
5707 {
5708 _bfd_elf_link_hash_hide_symbol (info, &fdh->elf, TRUE);
5709 }
5710 }
5711
5712 if (fdh != NULL
5713 && !fdh->elf.forced_local
5714 && (info->shared
5715 || fdh->elf.def_dynamic
5716 || fdh->elf.ref_dynamic
5717 || (fdh->elf.root.type == bfd_link_hash_undefweak
5718 && ELF_ST_VISIBILITY (fdh->elf.other) == STV_DEFAULT)))
5719 {
5720 if (fdh->elf.dynindx == -1)
5721 if (! bfd_elf_link_record_dynamic_symbol (info, &fdh->elf))
5722 return FALSE;
5723 fdh->elf.ref_regular |= fh->elf.ref_regular;
5724 fdh->elf.ref_dynamic |= fh->elf.ref_dynamic;
5725 fdh->elf.ref_regular_nonweak |= fh->elf.ref_regular_nonweak;
5726 fdh->elf.non_got_ref |= fh->elf.non_got_ref;
5727 if (ELF_ST_VISIBILITY (fh->elf.other) == STV_DEFAULT)
5728 {
5729 move_plt_plist (fh, fdh);
5730 fdh->elf.needs_plt = 1;
5731 }
5732 fdh->is_func_descriptor = 1;
5733 fdh->oh = fh;
5734 fh->oh = fdh;
5735 }
5736
5737 /* Now that the info is on the function descriptor, clear the
5738 function code sym info. Any function code syms for which we
5739 don't have a definition in a regular file, we force local.
5740 This prevents a shared library from exporting syms that have
5741 been imported from another library. Function code syms that
5742 are really in the library we must leave global to prevent the
5743 linker dragging in a definition from a static library. */
5744 force_local = (!fh->elf.def_regular
5745 || fdh == NULL
5746 || !fdh->elf.def_regular
5747 || fdh->elf.forced_local);
5748 _bfd_elf_link_hash_hide_symbol (info, &fh->elf, force_local);
5749
5750 return TRUE;
5751 }
5752
5753 /* Called near the start of bfd_elf_size_dynamic_sections. We use
5754 this hook to a) provide some gcc support functions, and b) transfer
5755 dynamic linking information gathered so far on function code symbol
5756 entries, to their corresponding function descriptor symbol entries. */
5757
5758 static bfd_boolean
5759 ppc64_elf_func_desc_adjust (bfd *obfd ATTRIBUTE_UNUSED,
5760 struct bfd_link_info *info)
5761 {
5762 struct ppc_link_hash_table *htab;
5763 unsigned int i;
5764 const struct sfpr_def_parms funcs[] =
5765 {
5766 { "_savegpr0_", 14, 31, savegpr0, savegpr0_tail },
5767 { "_restgpr0_", 14, 29, restgpr0, restgpr0_tail },
5768 { "_restgpr0_", 30, 31, restgpr0, restgpr0_tail },
5769 { "_savegpr1_", 14, 31, savegpr1, savegpr1_tail },
5770 { "_restgpr1_", 14, 31, restgpr1, restgpr1_tail },
5771 { "_savefpr_", 14, 31, savefpr, savefpr0_tail },
5772 { "_restfpr_", 14, 29, restfpr, restfpr0_tail },
5773 { "_restfpr_", 30, 31, restfpr, restfpr0_tail },
5774 { "._savef", 14, 31, savefpr, savefpr1_tail },
5775 { "._restf", 14, 31, restfpr, restfpr1_tail },
5776 { "_savevr_", 20, 31, savevr, savevr_tail },
5777 { "_restvr_", 20, 31, restvr, restvr_tail }
5778 };
5779
5780 htab = ppc_hash_table (info);
5781 if (htab->sfpr == NULL)
5782 /* We don't have any relocs. */
5783 return TRUE;
5784
5785 /* Provide any missing _save* and _rest* functions. */
5786 htab->sfpr->size = 0;
5787 for (i = 0; i < sizeof (funcs) / sizeof (funcs[0]); i++)
5788 if (!sfpr_define (info, &funcs[i]))
5789 return FALSE;
5790
5791 elf_link_hash_traverse (&htab->elf, func_desc_adjust, info);
5792
5793 if (htab->sfpr->size == 0)
5794 htab->sfpr->flags |= SEC_EXCLUDE;
5795
5796 return TRUE;
5797 }
5798
5799 /* Adjust a symbol defined by a dynamic object and referenced by a
5800 regular object. The current definition is in some section of the
5801 dynamic object, but we're not including those sections. We have to
5802 change the definition to something the rest of the link can
5803 understand. */
5804
5805 static bfd_boolean
5806 ppc64_elf_adjust_dynamic_symbol (struct bfd_link_info *info,
5807 struct elf_link_hash_entry *h)
5808 {
5809 struct ppc_link_hash_table *htab;
5810 asection *s;
5811
5812 htab = ppc_hash_table (info);
5813
5814 /* Deal with function syms. */
5815 if (h->type == STT_FUNC
5816 || h->needs_plt)
5817 {
5818 /* Clear procedure linkage table information for any symbol that
5819 won't need a .plt entry. */
5820 struct plt_entry *ent;
5821 for (ent = h->plt.plist; ent != NULL; ent = ent->next)
5822 if (ent->plt.refcount > 0)
5823 break;
5824 if (ent == NULL
5825 || SYMBOL_CALLS_LOCAL (info, h)
5826 || (ELF_ST_VISIBILITY (h->other) != STV_DEFAULT
5827 && h->root.type == bfd_link_hash_undefweak))
5828 {
5829 h->plt.plist = NULL;
5830 h->needs_plt = 0;
5831 }
5832 }
5833 else
5834 h->plt.plist = NULL;
5835
5836 /* If this is a weak symbol, and there is a real definition, the
5837 processor independent code will have arranged for us to see the
5838 real definition first, and we can just use the same value. */
5839 if (h->u.weakdef != NULL)
5840 {
5841 BFD_ASSERT (h->u.weakdef->root.type == bfd_link_hash_defined
5842 || h->u.weakdef->root.type == bfd_link_hash_defweak);
5843 h->root.u.def.section = h->u.weakdef->root.u.def.section;
5844 h->root.u.def.value = h->u.weakdef->root.u.def.value;
5845 if (ELIMINATE_COPY_RELOCS)
5846 h->non_got_ref = h->u.weakdef->non_got_ref;
5847 return TRUE;
5848 }
5849
5850 /* If we are creating a shared library, we must presume that the
5851 only references to the symbol are via the global offset table.
5852 For such cases we need not do anything here; the relocations will
5853 be handled correctly by relocate_section. */
5854 if (info->shared)
5855 return TRUE;
5856
5857 /* If there are no references to this symbol that do not use the
5858 GOT, we don't need to generate a copy reloc. */
5859 if (!h->non_got_ref)
5860 return TRUE;
5861
5862 /* Don't generate a copy reloc for symbols defined in the executable. */
5863 if (!h->def_dynamic || !h->ref_regular || h->def_regular)
5864 return TRUE;
5865
5866 if (ELIMINATE_COPY_RELOCS)
5867 {
5868 struct ppc_link_hash_entry * eh;
5869 struct ppc_dyn_relocs *p;
5870
5871 eh = (struct ppc_link_hash_entry *) h;
5872 for (p = eh->dyn_relocs; p != NULL; p = p->next)
5873 {
5874 s = p->sec->output_section;
5875 if (s != NULL && (s->flags & SEC_READONLY) != 0)
5876 break;
5877 }
5878
5879 /* If we didn't find any dynamic relocs in read-only sections, then
5880 we'll be keeping the dynamic relocs and avoiding the copy reloc. */
5881 if (p == NULL)
5882 {
5883 h->non_got_ref = 0;
5884 return TRUE;
5885 }
5886 }
5887
5888 if (h->plt.plist != NULL)
5889 {
5890 /* We should never get here, but unfortunately there are versions
5891 of gcc out there that improperly (for this ABI) put initialized
5892 function pointers, vtable refs and suchlike in read-only
5893 sections. Allow them to proceed, but warn that this might
5894 break at runtime. */
5895 (*_bfd_error_handler)
5896 (_("copy reloc against `%s' requires lazy plt linking; "
5897 "avoid setting LD_BIND_NOW=1 or upgrade gcc"),
5898 h->root.root.string);
5899 }
5900
5901 /* This is a reference to a symbol defined by a dynamic object which
5902 is not a function. */
5903
5904 if (h->size == 0)
5905 {
5906 (*_bfd_error_handler) (_("dynamic variable `%s' is zero size"),
5907 h->root.root.string);
5908 return TRUE;
5909 }
5910
5911 /* We must allocate the symbol in our .dynbss section, which will
5912 become part of the .bss section of the executable. There will be
5913 an entry for this symbol in the .dynsym section. The dynamic
5914 object will contain position independent code, so all references
5915 from the dynamic object to this symbol will go through the global
5916 offset table. The dynamic linker will use the .dynsym entry to
5917 determine the address it must put in the global offset table, so
5918 both the dynamic object and the regular object will refer to the
5919 same memory location for the variable. */
5920
5921 /* We must generate a R_PPC64_COPY reloc to tell the dynamic linker
5922 to copy the initial value out of the dynamic object and into the
5923 runtime process image. We need to remember the offset into the
5924 .rela.bss section we are going to use. */
5925 if ((h->root.u.def.section->flags & SEC_ALLOC) != 0)
5926 {
5927 htab->relbss->size += sizeof (Elf64_External_Rela);
5928 h->needs_copy = 1;
5929 }
5930
5931 s = htab->dynbss;
5932
5933 return _bfd_elf_adjust_dynamic_copy (h, s);
5934 }
5935
5936 /* If given a function descriptor symbol, hide both the function code
5937 sym and the descriptor. */
5938 static void
5939 ppc64_elf_hide_symbol (struct bfd_link_info *info,
5940 struct elf_link_hash_entry *h,
5941 bfd_boolean force_local)
5942 {
5943 struct ppc_link_hash_entry *eh;
5944 _bfd_elf_link_hash_hide_symbol (info, h, force_local);
5945
5946 eh = (struct ppc_link_hash_entry *) h;
5947 if (eh->is_func_descriptor)
5948 {
5949 struct ppc_link_hash_entry *fh = eh->oh;
5950
5951 if (fh == NULL)
5952 {
5953 const char *p, *q;
5954 struct ppc_link_hash_table *htab;
5955 char save;
5956
5957 /* We aren't supposed to use alloca in BFD because on
5958 systems which do not have alloca the version in libiberty
5959 calls xmalloc, which might cause the program to crash
5960 when it runs out of memory. This function doesn't have a
5961 return status, so there's no way to gracefully return an
5962 error. So cheat. We know that string[-1] can be safely
5963 accessed; It's either a string in an ELF string table,
5964 or allocated in an objalloc structure. */
5965
5966 p = eh->elf.root.root.string - 1;
5967 save = *p;
5968 *(char *) p = '.';
5969 htab = ppc_hash_table (info);
5970 fh = (struct ppc_link_hash_entry *)
5971 elf_link_hash_lookup (&htab->elf, p, FALSE, FALSE, FALSE);
5972 *(char *) p = save;
5973
5974 /* Unfortunately, if it so happens that the string we were
5975 looking for was allocated immediately before this string,
5976 then we overwrote the string terminator. That's the only
5977 reason the lookup should fail. */
5978 if (fh == NULL)
5979 {
5980 q = eh->elf.root.root.string + strlen (eh->elf.root.root.string);
5981 while (q >= eh->elf.root.root.string && *q == *p)
5982 --q, --p;
5983 if (q < eh->elf.root.root.string && *p == '.')
5984 fh = (struct ppc_link_hash_entry *)
5985 elf_link_hash_lookup (&htab->elf, p, FALSE, FALSE, FALSE);
5986 }
5987 if (fh != NULL)
5988 {
5989 eh->oh = fh;
5990 fh->oh = eh;
5991 }
5992 }
5993 if (fh != NULL)
5994 _bfd_elf_link_hash_hide_symbol (info, &fh->elf, force_local);
5995 }
5996 }
5997
5998 static bfd_boolean
5999 get_sym_h (struct elf_link_hash_entry **hp,
6000 Elf_Internal_Sym **symp,
6001 asection **symsecp,
6002 char **tls_maskp,
6003 Elf_Internal_Sym **locsymsp,
6004 unsigned long r_symndx,
6005 bfd *ibfd)
6006 {
6007 Elf_Internal_Shdr *symtab_hdr = &elf_tdata (ibfd)->symtab_hdr;
6008
6009 if (r_symndx >= symtab_hdr->sh_info)
6010 {
6011 struct elf_link_hash_entry **sym_hashes = elf_sym_hashes (ibfd);
6012 struct elf_link_hash_entry *h;
6013
6014 h = sym_hashes[r_symndx - symtab_hdr->sh_info];
6015 while (h->root.type == bfd_link_hash_indirect
6016 || h->root.type == bfd_link_hash_warning)
6017 h = (struct elf_link_hash_entry *) h->root.u.i.link;
6018
6019 if (hp != NULL)
6020 *hp = h;
6021
6022 if (symp != NULL)
6023 *symp = NULL;
6024
6025 if (symsecp != NULL)
6026 {
6027 asection *symsec = NULL;
6028 if (h->root.type == bfd_link_hash_defined
6029 || h->root.type == bfd_link_hash_defweak)
6030 symsec = h->root.u.def.section;
6031 *symsecp = symsec;
6032 }
6033
6034 if (tls_maskp != NULL)
6035 {
6036 struct ppc_link_hash_entry *eh;
6037
6038 eh = (struct ppc_link_hash_entry *) h;
6039 *tls_maskp = &eh->tls_mask;
6040 }
6041 }
6042 else
6043 {
6044 Elf_Internal_Sym *sym;
6045 Elf_Internal_Sym *locsyms = *locsymsp;
6046
6047 if (locsyms == NULL)
6048 {
6049 locsyms = (Elf_Internal_Sym *) symtab_hdr->contents;
6050 if (locsyms == NULL)
6051 locsyms = bfd_elf_get_elf_syms (ibfd, symtab_hdr,
6052 symtab_hdr->sh_info,
6053 0, NULL, NULL, NULL);
6054 if (locsyms == NULL)
6055 return FALSE;
6056 *locsymsp = locsyms;
6057 }
6058 sym = locsyms + r_symndx;
6059
6060 if (hp != NULL)
6061 *hp = NULL;
6062
6063 if (symp != NULL)
6064 *symp = sym;
6065
6066 if (symsecp != NULL)
6067 {
6068 asection *symsec = NULL;
6069 if ((sym->st_shndx != SHN_UNDEF
6070 && sym->st_shndx < SHN_LORESERVE)
6071 || sym->st_shndx > SHN_HIRESERVE)
6072 symsec = bfd_section_from_elf_index (ibfd, sym->st_shndx);
6073 *symsecp = symsec;
6074 }
6075
6076 if (tls_maskp != NULL)
6077 {
6078 struct got_entry **lgot_ents;
6079 char *tls_mask;
6080
6081 tls_mask = NULL;
6082 lgot_ents = elf_local_got_ents (ibfd);
6083 if (lgot_ents != NULL)
6084 {
6085 char *lgot_masks = (char *) (lgot_ents + symtab_hdr->sh_info);
6086 tls_mask = &lgot_masks[r_symndx];
6087 }
6088 *tls_maskp = tls_mask;
6089 }
6090 }
6091 return TRUE;
6092 }
6093
6094 /* Returns TLS_MASKP for the given REL symbol. Function return is 0 on
6095 error, 2 on a toc GD type suitable for optimization, 3 on a toc LD
6096 type suitable for optimization, and 1 otherwise. */
6097
6098 static int
6099 get_tls_mask (char **tls_maskp, unsigned long *toc_symndx,
6100 Elf_Internal_Sym **locsymsp,
6101 const Elf_Internal_Rela *rel, bfd *ibfd)
6102 {
6103 unsigned long r_symndx;
6104 int next_r;
6105 struct elf_link_hash_entry *h;
6106 Elf_Internal_Sym *sym;
6107 asection *sec;
6108 bfd_vma off;
6109
6110 r_symndx = ELF64_R_SYM (rel->r_info);
6111 if (!get_sym_h (&h, &sym, &sec, tls_maskp, locsymsp, r_symndx, ibfd))
6112 return 0;
6113
6114 if ((*tls_maskp != NULL && **tls_maskp != 0)
6115 || sec == NULL
6116 || ppc64_elf_section_data (sec)->sec_type != sec_toc)
6117 return 1;
6118
6119 /* Look inside a TOC section too. */
6120 if (h != NULL)
6121 {
6122 BFD_ASSERT (h->root.type == bfd_link_hash_defined);
6123 off = h->root.u.def.value;
6124 }
6125 else
6126 off = sym->st_value;
6127 off += rel->r_addend;
6128 BFD_ASSERT (off % 8 == 0);
6129 r_symndx = ppc64_elf_section_data (sec)->u.t_symndx[off / 8];
6130 next_r = ppc64_elf_section_data (sec)->u.t_symndx[off / 8 + 1];
6131 if (!get_sym_h (&h, &sym, &sec, tls_maskp, locsymsp, r_symndx, ibfd))
6132 return 0;
6133 if (toc_symndx != NULL)
6134 *toc_symndx = r_symndx;
6135 if ((h == NULL
6136 || ((h->root.type == bfd_link_hash_defined
6137 || h->root.type == bfd_link_hash_defweak)
6138 && !h->def_dynamic))
6139 && (next_r == -1 || next_r == -2))
6140 return 1 - next_r;
6141 return 1;
6142 }
6143
6144 /* Adjust all global syms defined in opd sections. In gcc generated
6145 code for the old ABI, these will already have been done. */
6146
6147 static bfd_boolean
6148 adjust_opd_syms (struct elf_link_hash_entry *h, void *inf ATTRIBUTE_UNUSED)
6149 {
6150 struct ppc_link_hash_entry *eh;
6151 asection *sym_sec;
6152 long *opd_adjust;
6153
6154 if (h->root.type == bfd_link_hash_indirect)
6155 return TRUE;
6156
6157 if (h->root.type == bfd_link_hash_warning)
6158 h = (struct elf_link_hash_entry *) h->root.u.i.link;
6159
6160 if (h->root.type != bfd_link_hash_defined
6161 && h->root.type != bfd_link_hash_defweak)
6162 return TRUE;
6163
6164 eh = (struct ppc_link_hash_entry *) h;
6165 if (eh->adjust_done)
6166 return TRUE;
6167
6168 sym_sec = eh->elf.root.u.def.section;
6169 opd_adjust = get_opd_info (sym_sec);
6170 if (opd_adjust != NULL)
6171 {
6172 long adjust = opd_adjust[eh->elf.root.u.def.value / 8];
6173 if (adjust == -1)
6174 {
6175 /* This entry has been deleted. */
6176 asection *dsec = ppc64_elf_tdata (sym_sec->owner)->deleted_section;
6177 if (dsec == NULL)
6178 {
6179 for (dsec = sym_sec->owner->sections; dsec; dsec = dsec->next)
6180 if (elf_discarded_section (dsec))
6181 {
6182 ppc64_elf_tdata (sym_sec->owner)->deleted_section = dsec;
6183 break;
6184 }
6185 }
6186 eh->elf.root.u.def.value = 0;
6187 eh->elf.root.u.def.section = dsec;
6188 }
6189 else
6190 eh->elf.root.u.def.value += adjust;
6191 eh->adjust_done = 1;
6192 }
6193 return TRUE;
6194 }
6195
6196 /* Handles decrementing dynamic reloc counts for the reloc specified by
6197 R_INFO in section SEC. If LOCAL_SYMS is NULL, then H and SYM_SEC
6198 have already been determined. */
6199
6200 static bfd_boolean
6201 dec_dynrel_count (bfd_vma r_info,
6202 asection *sec,
6203 struct bfd_link_info *info,
6204 Elf_Internal_Sym **local_syms,
6205 struct elf_link_hash_entry *h,
6206 asection *sym_sec)
6207 {
6208 enum elf_ppc64_reloc_type r_type;
6209 struct ppc_dyn_relocs *p;
6210 struct ppc_dyn_relocs **pp;
6211
6212 /* Can this reloc be dynamic? This switch, and later tests here
6213 should be kept in sync with the code in check_relocs. */
6214 r_type = ELF64_R_TYPE (r_info);
6215 switch (r_type)
6216 {
6217 default:
6218 return TRUE;
6219
6220 case R_PPC64_TPREL16:
6221 case R_PPC64_TPREL16_LO:
6222 case R_PPC64_TPREL16_HI:
6223 case R_PPC64_TPREL16_HA:
6224 case R_PPC64_TPREL16_DS:
6225 case R_PPC64_TPREL16_LO_DS:
6226 case R_PPC64_TPREL16_HIGHER:
6227 case R_PPC64_TPREL16_HIGHERA:
6228 case R_PPC64_TPREL16_HIGHEST:
6229 case R_PPC64_TPREL16_HIGHESTA:
6230 if (!info->shared)
6231 return TRUE;
6232
6233 case R_PPC64_TPREL64:
6234 case R_PPC64_DTPMOD64:
6235 case R_PPC64_DTPREL64:
6236 case R_PPC64_ADDR64:
6237 case R_PPC64_REL30:
6238 case R_PPC64_REL32:
6239 case R_PPC64_REL64:
6240 case R_PPC64_ADDR14:
6241 case R_PPC64_ADDR14_BRNTAKEN:
6242 case R_PPC64_ADDR14_BRTAKEN:
6243 case R_PPC64_ADDR16:
6244 case R_PPC64_ADDR16_DS:
6245 case R_PPC64_ADDR16_HA:
6246 case R_PPC64_ADDR16_HI:
6247 case R_PPC64_ADDR16_HIGHER:
6248 case R_PPC64_ADDR16_HIGHERA:
6249 case R_PPC64_ADDR16_HIGHEST:
6250 case R_PPC64_ADDR16_HIGHESTA:
6251 case R_PPC64_ADDR16_LO:
6252 case R_PPC64_ADDR16_LO_DS:
6253 case R_PPC64_ADDR24:
6254 case R_PPC64_ADDR32:
6255 case R_PPC64_UADDR16:
6256 case R_PPC64_UADDR32:
6257 case R_PPC64_UADDR64:
6258 case R_PPC64_TOC:
6259 break;
6260 }
6261
6262 if (local_syms != NULL)
6263 {
6264 unsigned long r_symndx;
6265 Elf_Internal_Sym *sym;
6266 bfd *ibfd = sec->owner;
6267
6268 r_symndx = ELF64_R_SYM (r_info);
6269 if (!get_sym_h (&h, &sym, &sym_sec, NULL, local_syms, r_symndx, ibfd))
6270 return FALSE;
6271 }
6272
6273 if ((info->shared
6274 && (MUST_BE_DYN_RELOC (r_type)
6275 || (h != NULL
6276 && (!info->symbolic
6277 || h->root.type == bfd_link_hash_defweak
6278 || !h->def_regular))))
6279 || (ELIMINATE_COPY_RELOCS
6280 && !info->shared
6281 && h != NULL
6282 && (h->root.type == bfd_link_hash_defweak
6283 || !h->def_regular)))
6284 ;
6285 else
6286 return TRUE;
6287
6288 if (h != NULL)
6289 pp = &((struct ppc_link_hash_entry *) h)->dyn_relocs;
6290 else
6291 {
6292 if (sym_sec != NULL)
6293 {
6294 void *vpp = &elf_section_data (sym_sec)->local_dynrel;
6295 pp = (struct ppc_dyn_relocs **) vpp;
6296 }
6297 else
6298 {
6299 void *vpp = &elf_section_data (sec)->local_dynrel;
6300 pp = (struct ppc_dyn_relocs **) vpp;
6301 }
6302
6303 /* elf_gc_sweep may have already removed all dyn relocs associated
6304 with local syms for a given section. Don't report a dynreloc
6305 miscount. */
6306 if (*pp == NULL)
6307 return TRUE;
6308 }
6309
6310 while ((p = *pp) != NULL)
6311 {
6312 if (p->sec == sec)
6313 {
6314 if (!MUST_BE_DYN_RELOC (r_type))
6315 p->pc_count -= 1;
6316 p->count -= 1;
6317 if (p->count == 0)
6318 *pp = p->next;
6319 return TRUE;
6320 }
6321 pp = &p->next;
6322 }
6323
6324 (*_bfd_error_handler) (_("dynreloc miscount for %B, section %A"),
6325 sec->owner, sec);
6326 bfd_set_error (bfd_error_bad_value);
6327 return FALSE;
6328 }
6329
6330 /* Remove unused Official Procedure Descriptor entries. Currently we
6331 only remove those associated with functions in discarded link-once
6332 sections, or weakly defined functions that have been overridden. It
6333 would be possible to remove many more entries for statically linked
6334 applications. */
6335
6336 bfd_boolean
6337 ppc64_elf_edit_opd (bfd *obfd, struct bfd_link_info *info,
6338 bfd_boolean no_opd_opt,
6339 bfd_boolean non_overlapping)
6340 {
6341 bfd *ibfd;
6342 bfd_boolean some_edited = FALSE;
6343 asection *need_pad = NULL;
6344
6345 for (ibfd = info->input_bfds; ibfd != NULL; ibfd = ibfd->link_next)
6346 {
6347 asection *sec;
6348 Elf_Internal_Rela *relstart, *rel, *relend;
6349 Elf_Internal_Shdr *symtab_hdr;
6350 Elf_Internal_Sym *local_syms;
6351 struct elf_link_hash_entry **sym_hashes;
6352 bfd_vma offset;
6353 bfd_size_type amt;
6354 long *opd_adjust;
6355 bfd_boolean need_edit, add_aux_fields;
6356 bfd_size_type cnt_16b = 0;
6357
6358 sec = bfd_get_section_by_name (ibfd, ".opd");
6359 if (sec == NULL || sec->size == 0)
6360 continue;
6361
6362 amt = sec->size * sizeof (long) / 8;
6363 opd_adjust = get_opd_info (sec);
6364 if (opd_adjust == NULL)
6365 {
6366 /* check_relocs hasn't been called. Must be a ld -r link
6367 or --just-symbols object. */
6368 opd_adjust = bfd_alloc (obfd, amt);
6369 if (opd_adjust == NULL)
6370 return FALSE;
6371 ppc64_elf_section_data (sec)->u.opd_adjust = opd_adjust;
6372 BFD_ASSERT (ppc64_elf_section_data (sec)->sec_type == sec_normal);
6373 ppc64_elf_section_data (sec)->sec_type = sec_opd;
6374 }
6375 memset (opd_adjust, 0, amt);
6376
6377 if (no_opd_opt)
6378 continue;
6379
6380 if (sec->sec_info_type == ELF_INFO_TYPE_JUST_SYMS)
6381 continue;
6382
6383 if (sec->output_section == bfd_abs_section_ptr)
6384 continue;
6385
6386 /* Look through the section relocs. */
6387 if ((sec->flags & SEC_RELOC) == 0 || sec->reloc_count == 0)
6388 continue;
6389
6390 local_syms = NULL;
6391 symtab_hdr = &elf_tdata (ibfd)->symtab_hdr;
6392 sym_hashes = elf_sym_hashes (ibfd);
6393
6394 /* Read the relocations. */
6395 relstart = _bfd_elf_link_read_relocs (ibfd, sec, NULL, NULL,
6396 info->keep_memory);
6397 if (relstart == NULL)
6398 return FALSE;
6399
6400 /* First run through the relocs to check they are sane, and to
6401 determine whether we need to edit this opd section. */
6402 need_edit = FALSE;
6403 need_pad = sec;
6404 offset = 0;
6405 relend = relstart + sec->reloc_count;
6406 for (rel = relstart; rel < relend; )
6407 {
6408 enum elf_ppc64_reloc_type r_type;
6409 unsigned long r_symndx;
6410 asection *sym_sec;
6411 struct elf_link_hash_entry *h;
6412 Elf_Internal_Sym *sym;
6413
6414 /* .opd contains a regular array of 16 or 24 byte entries. We're
6415 only interested in the reloc pointing to a function entry
6416 point. */
6417 if (rel->r_offset != offset
6418 || rel + 1 >= relend
6419 || (rel + 1)->r_offset != offset + 8)
6420 {
6421 /* If someone messes with .opd alignment then after a
6422 "ld -r" we might have padding in the middle of .opd.
6423 Also, there's nothing to prevent someone putting
6424 something silly in .opd with the assembler. No .opd
6425 optimization for them! */
6426 broken_opd:
6427 (*_bfd_error_handler)
6428 (_("%B: .opd is not a regular array of opd entries"), ibfd);
6429 need_edit = FALSE;
6430 break;
6431 }
6432
6433 if ((r_type = ELF64_R_TYPE (rel->r_info)) != R_PPC64_ADDR64
6434 || (r_type = ELF64_R_TYPE ((rel + 1)->r_info)) != R_PPC64_TOC)
6435 {
6436 (*_bfd_error_handler)
6437 (_("%B: unexpected reloc type %u in .opd section"),
6438 ibfd, r_type);
6439 need_edit = FALSE;
6440 break;
6441 }
6442
6443 r_symndx = ELF64_R_SYM (rel->r_info);
6444 if (!get_sym_h (&h, &sym, &sym_sec, NULL, &local_syms,
6445 r_symndx, ibfd))
6446 goto error_ret;
6447
6448 if (sym_sec == NULL || sym_sec->owner == NULL)
6449 {
6450 const char *sym_name;
6451 if (h != NULL)
6452 sym_name = h->root.root.string;
6453 else
6454 sym_name = bfd_elf_sym_name (ibfd, symtab_hdr, sym,
6455 sym_sec);
6456
6457 (*_bfd_error_handler)
6458 (_("%B: undefined sym `%s' in .opd section"),
6459 ibfd, sym_name);
6460 need_edit = FALSE;
6461 break;
6462 }
6463
6464 /* opd entries are always for functions defined in the
6465 current input bfd. If the symbol isn't defined in the
6466 input bfd, then we won't be using the function in this
6467 bfd; It must be defined in a linkonce section in another
6468 bfd, or is weak. It's also possible that we are
6469 discarding the function due to a linker script /DISCARD/,
6470 which we test for via the output_section. */
6471 if (sym_sec->owner != ibfd
6472 || sym_sec->output_section == bfd_abs_section_ptr)
6473 need_edit = TRUE;
6474
6475 rel += 2;
6476 if (rel == relend
6477 || (rel + 1 == relend && rel->r_offset == offset + 16))
6478 {
6479 if (sec->size == offset + 24)
6480 {
6481 need_pad = NULL;
6482 break;
6483 }
6484 if (rel == relend && sec->size == offset + 16)
6485 {
6486 cnt_16b++;
6487 break;
6488 }
6489 goto broken_opd;
6490 }
6491
6492 if (rel->r_offset == offset + 24)
6493 offset += 24;
6494 else if (rel->r_offset != offset + 16)
6495 goto broken_opd;
6496 else if (rel + 1 < relend
6497 && ELF64_R_TYPE (rel[0].r_info) == R_PPC64_ADDR64
6498 && ELF64_R_TYPE (rel[1].r_info) == R_PPC64_TOC)
6499 {
6500 offset += 16;
6501 cnt_16b++;
6502 }
6503 else if (rel + 2 < relend
6504 && ELF64_R_TYPE (rel[1].r_info) == R_PPC64_ADDR64
6505 && ELF64_R_TYPE (rel[2].r_info) == R_PPC64_TOC)
6506 {
6507 offset += 24;
6508 rel += 1;
6509 }
6510 else
6511 goto broken_opd;
6512 }
6513
6514 add_aux_fields = non_overlapping && cnt_16b > 0;
6515
6516 if (need_edit || add_aux_fields)
6517 {
6518 Elf_Internal_Rela *write_rel;
6519 bfd_byte *rptr, *wptr;
6520 bfd_byte *new_contents = NULL;
6521 bfd_boolean skip;
6522 long opd_ent_size;
6523
6524 /* This seems a waste of time as input .opd sections are all
6525 zeros as generated by gcc, but I suppose there's no reason
6526 this will always be so. We might start putting something in
6527 the third word of .opd entries. */
6528 if ((sec->flags & SEC_IN_MEMORY) == 0)
6529 {
6530 bfd_byte *loc;
6531 if (!bfd_malloc_and_get_section (ibfd, sec, &loc))
6532 {
6533 if (loc != NULL)
6534 free (loc);
6535 error_ret:
6536 if (local_syms != NULL
6537 && symtab_hdr->contents != (unsigned char *) local_syms)
6538 free (local_syms);
6539 if (elf_section_data (sec)->relocs != relstart)
6540 free (relstart);
6541 return FALSE;
6542 }
6543 sec->contents = loc;
6544 sec->flags |= (SEC_IN_MEMORY | SEC_HAS_CONTENTS);
6545 }
6546
6547 elf_section_data (sec)->relocs = relstart;
6548
6549 new_contents = sec->contents;
6550 if (add_aux_fields)
6551 {
6552 new_contents = bfd_malloc (sec->size + cnt_16b * 8);
6553 if (new_contents == NULL)
6554 return FALSE;
6555 need_pad = FALSE;
6556 }
6557 wptr = new_contents;
6558 rptr = sec->contents;
6559
6560 write_rel = relstart;
6561 skip = FALSE;
6562 offset = 0;
6563 opd_ent_size = 0;
6564 for (rel = relstart; rel < relend; rel++)
6565 {
6566 unsigned long r_symndx;
6567 asection *sym_sec;
6568 struct elf_link_hash_entry *h;
6569 Elf_Internal_Sym *sym;
6570
6571 r_symndx = ELF64_R_SYM (rel->r_info);
6572 if (!get_sym_h (&h, &sym, &sym_sec, NULL, &local_syms,
6573 r_symndx, ibfd))
6574 goto error_ret;
6575
6576 if (rel->r_offset == offset)
6577 {
6578 struct ppc_link_hash_entry *fdh = NULL;
6579
6580 /* See if the .opd entry is full 24 byte or
6581 16 byte (with fd_aux entry overlapped with next
6582 fd_func). */
6583 opd_ent_size = 24;
6584 if ((rel + 2 == relend && sec->size == offset + 16)
6585 || (rel + 3 < relend
6586 && rel[2].r_offset == offset + 16
6587 && rel[3].r_offset == offset + 24
6588 && ELF64_R_TYPE (rel[2].r_info) == R_PPC64_ADDR64
6589 && ELF64_R_TYPE (rel[3].r_info) == R_PPC64_TOC))
6590 opd_ent_size = 16;
6591
6592 if (h != NULL
6593 && h->root.root.string[0] == '.')
6594 {
6595 fdh = get_fdh ((struct ppc_link_hash_entry *) h,
6596 ppc_hash_table (info));
6597 if (fdh != NULL
6598 && fdh->elf.root.type != bfd_link_hash_defined
6599 && fdh->elf.root.type != bfd_link_hash_defweak)
6600 fdh = NULL;
6601 }
6602
6603 skip = (sym_sec->owner != ibfd
6604 || sym_sec->output_section == bfd_abs_section_ptr);
6605 if (skip)
6606 {
6607 if (fdh != NULL && sym_sec->owner == ibfd)
6608 {
6609 /* Arrange for the function descriptor sym
6610 to be dropped. */
6611 fdh->elf.root.u.def.value = 0;
6612 fdh->elf.root.u.def.section = sym_sec;
6613 }
6614 opd_adjust[rel->r_offset / 8] = -1;
6615 }
6616 else
6617 {
6618 /* We'll be keeping this opd entry. */
6619
6620 if (fdh != NULL)
6621 {
6622 /* Redefine the function descriptor symbol to
6623 this location in the opd section. It is
6624 necessary to update the value here rather
6625 than using an array of adjustments as we do
6626 for local symbols, because various places
6627 in the generic ELF code use the value
6628 stored in u.def.value. */
6629 fdh->elf.root.u.def.value = wptr - new_contents;
6630 fdh->adjust_done = 1;
6631 }
6632
6633 /* Local syms are a bit tricky. We could
6634 tweak them as they can be cached, but
6635 we'd need to look through the local syms
6636 for the function descriptor sym which we
6637 don't have at the moment. So keep an
6638 array of adjustments. */
6639 opd_adjust[rel->r_offset / 8]
6640 = (wptr - new_contents) - (rptr - sec->contents);
6641
6642 if (wptr != rptr)
6643 memcpy (wptr, rptr, opd_ent_size);
6644 wptr += opd_ent_size;
6645 if (add_aux_fields && opd_ent_size == 16)
6646 {
6647 memset (wptr, '\0', 8);
6648 wptr += 8;
6649 }
6650 }
6651 rptr += opd_ent_size;
6652 offset += opd_ent_size;
6653 }
6654
6655 if (skip)
6656 {
6657 if (!NO_OPD_RELOCS
6658 && !info->relocatable
6659 && !dec_dynrel_count (rel->r_info, sec, info,
6660 NULL, h, sym_sec))
6661 goto error_ret;
6662 }
6663 else
6664 {
6665 /* We need to adjust any reloc offsets to point to the
6666 new opd entries. While we're at it, we may as well
6667 remove redundant relocs. */
6668 rel->r_offset += opd_adjust[(offset - opd_ent_size) / 8];
6669 if (write_rel != rel)
6670 memcpy (write_rel, rel, sizeof (*rel));
6671 ++write_rel;
6672 }
6673 }
6674
6675 sec->size = wptr - new_contents;
6676 sec->reloc_count = write_rel - relstart;
6677 if (add_aux_fields)
6678 {
6679 free (sec->contents);
6680 sec->contents = new_contents;
6681 }
6682
6683 /* Fudge the header size too, as this is used later in
6684 elf_bfd_final_link if we are emitting relocs. */
6685 elf_section_data (sec)->rel_hdr.sh_size
6686 = sec->reloc_count * elf_section_data (sec)->rel_hdr.sh_entsize;
6687 BFD_ASSERT (elf_section_data (sec)->rel_hdr2 == NULL);
6688 some_edited = TRUE;
6689 }
6690 else if (elf_section_data (sec)->relocs != relstart)
6691 free (relstart);
6692
6693 if (local_syms != NULL
6694 && symtab_hdr->contents != (unsigned char *) local_syms)
6695 {
6696 if (!info->keep_memory)
6697 free (local_syms);
6698 else
6699 symtab_hdr->contents = (unsigned char *) local_syms;
6700 }
6701 }
6702
6703 if (some_edited)
6704 elf_link_hash_traverse (elf_hash_table (info), adjust_opd_syms, NULL);
6705
6706 /* If we are doing a final link and the last .opd entry is just 16 byte
6707 long, add a 8 byte padding after it. */
6708 if (need_pad != NULL && !info->relocatable)
6709 {
6710 bfd_byte *p;
6711
6712 if ((need_pad->flags & SEC_IN_MEMORY) == 0)
6713 {
6714 BFD_ASSERT (need_pad->size > 0);
6715
6716 p = bfd_malloc (need_pad->size + 8);
6717 if (p == NULL)
6718 return FALSE;
6719
6720 if (! bfd_get_section_contents (need_pad->owner, need_pad,
6721 p, 0, need_pad->size))
6722 return FALSE;
6723
6724 need_pad->contents = p;
6725 need_pad->flags |= (SEC_IN_MEMORY | SEC_HAS_CONTENTS);
6726 }
6727 else
6728 {
6729 p = bfd_realloc (need_pad->contents, need_pad->size + 8);
6730 if (p == NULL)
6731 return FALSE;
6732
6733 need_pad->contents = p;
6734 }
6735
6736 memset (need_pad->contents + need_pad->size, 0, 8);
6737 need_pad->size += 8;
6738 }
6739
6740 return TRUE;
6741 }
6742
6743 /* Set htab->tls_get_addr and call the generic ELF tls_setup function. */
6744
6745 asection *
6746 ppc64_elf_tls_setup (bfd *obfd, struct bfd_link_info *info)
6747 {
6748 struct ppc_link_hash_table *htab;
6749
6750 htab = ppc_hash_table (info);
6751 if (htab->tls_get_addr != NULL)
6752 {
6753 struct ppc_link_hash_entry *h = htab->tls_get_addr;
6754
6755 while (h->elf.root.type == bfd_link_hash_indirect
6756 || h->elf.root.type == bfd_link_hash_warning)
6757 h = (struct ppc_link_hash_entry *) h->elf.root.u.i.link;
6758
6759 htab->tls_get_addr = h;
6760
6761 if (htab->tls_get_addr_fd == NULL
6762 && h->oh != NULL
6763 && h->oh->is_func_descriptor
6764 && (h->oh->elf.root.type == bfd_link_hash_defined
6765 || h->oh->elf.root.type == bfd_link_hash_defweak))
6766 htab->tls_get_addr_fd = h->oh;
6767 }
6768
6769 if (htab->tls_get_addr_fd != NULL)
6770 {
6771 struct ppc_link_hash_entry *h = htab->tls_get_addr_fd;
6772
6773 while (h->elf.root.type == bfd_link_hash_indirect
6774 || h->elf.root.type == bfd_link_hash_warning)
6775 h = (struct ppc_link_hash_entry *) h->elf.root.u.i.link;
6776
6777 htab->tls_get_addr_fd = h;
6778 }
6779
6780 return _bfd_elf_tls_setup (obfd, info);
6781 }
6782
6783 /* Run through all the TLS relocs looking for optimization
6784 opportunities. The linker has been hacked (see ppc64elf.em) to do
6785 a preliminary section layout so that we know the TLS segment
6786 offsets. We can't optimize earlier because some optimizations need
6787 to know the tp offset, and we need to optimize before allocating
6788 dynamic relocations. */
6789
6790 bfd_boolean
6791 ppc64_elf_tls_optimize (bfd *obfd ATTRIBUTE_UNUSED, struct bfd_link_info *info)
6792 {
6793 bfd *ibfd;
6794 asection *sec;
6795 struct ppc_link_hash_table *htab;
6796
6797 if (info->relocatable || info->shared)
6798 return TRUE;
6799
6800 htab = ppc_hash_table (info);
6801 for (ibfd = info->input_bfds; ibfd != NULL; ibfd = ibfd->link_next)
6802 {
6803 Elf_Internal_Sym *locsyms = NULL;
6804 asection *toc = bfd_get_section_by_name (ibfd, ".toc");
6805 unsigned char *toc_ref = NULL;
6806
6807 /* Look at all the sections for this file, with TOC last. */
6808 for (sec = (ibfd->sections == toc && toc && toc->next ? toc->next
6809 : ibfd->sections);
6810 sec != NULL;
6811 sec = (sec == toc ? NULL
6812 : sec->next == NULL ? toc
6813 : sec->next == toc && toc->next ? toc->next
6814 : sec->next))
6815 if (sec->has_tls_reloc && !bfd_is_abs_section (sec->output_section))
6816 {
6817 Elf_Internal_Rela *relstart, *rel, *relend;
6818 int expecting_tls_get_addr;
6819 long toc_ref_index = 0;
6820
6821 /* Read the relocations. */
6822 relstart = _bfd_elf_link_read_relocs (ibfd, sec, NULL, NULL,
6823 info->keep_memory);
6824 if (relstart == NULL)
6825 return FALSE;
6826
6827 expecting_tls_get_addr = 0;
6828 relend = relstart + sec->reloc_count;
6829 for (rel = relstart; rel < relend; rel++)
6830 {
6831 enum elf_ppc64_reloc_type r_type;
6832 unsigned long r_symndx;
6833 struct elf_link_hash_entry *h;
6834 Elf_Internal_Sym *sym;
6835 asection *sym_sec;
6836 char *tls_mask;
6837 char tls_set, tls_clear, tls_type = 0;
6838 bfd_vma value;
6839 bfd_boolean ok_tprel, is_local;
6840
6841 r_symndx = ELF64_R_SYM (rel->r_info);
6842 if (!get_sym_h (&h, &sym, &sym_sec, &tls_mask, &locsyms,
6843 r_symndx, ibfd))
6844 {
6845 err_free_rel:
6846 if (elf_section_data (sec)->relocs != relstart)
6847 free (relstart);
6848 if (toc_ref != NULL)
6849 free (toc_ref);
6850 if (locsyms != NULL
6851 && (elf_tdata (ibfd)->symtab_hdr.contents
6852 != (unsigned char *) locsyms))
6853 free (locsyms);
6854 return FALSE;
6855 }
6856
6857 if (h != NULL)
6858 {
6859 if (h->root.type != bfd_link_hash_defined
6860 && h->root.type != bfd_link_hash_defweak)
6861 continue;
6862 value = h->root.u.def.value;
6863 }
6864 else
6865 /* Symbols referenced by TLS relocs must be of type
6866 STT_TLS. So no need for .opd local sym adjust. */
6867 value = sym->st_value;
6868
6869 ok_tprel = FALSE;
6870 is_local = FALSE;
6871 if (h == NULL
6872 || !h->def_dynamic)
6873 {
6874 is_local = TRUE;
6875 value += sym_sec->output_offset;
6876 value += sym_sec->output_section->vma;
6877 value -= htab->elf.tls_sec->vma;
6878 ok_tprel = (value + TP_OFFSET + ((bfd_vma) 1 << 31)
6879 < (bfd_vma) 1 << 32);
6880 }
6881
6882 r_type = ELF64_R_TYPE (rel->r_info);
6883 switch (r_type)
6884 {
6885 case R_PPC64_GOT_TLSLD16:
6886 case R_PPC64_GOT_TLSLD16_LO:
6887 case R_PPC64_GOT_TLSLD16_HI:
6888 case R_PPC64_GOT_TLSLD16_HA:
6889 /* These relocs should never be against a symbol
6890 defined in a shared lib. Leave them alone if
6891 that turns out to be the case. */
6892 ppc64_tlsld_got (ibfd)->refcount -= 1;
6893 if (!is_local)
6894 continue;
6895
6896 /* LD -> LE */
6897 tls_set = 0;
6898 tls_clear = TLS_LD;
6899 tls_type = TLS_TLS | TLS_LD;
6900 expecting_tls_get_addr = 1;
6901 break;
6902
6903 case R_PPC64_GOT_TLSGD16:
6904 case R_PPC64_GOT_TLSGD16_LO:
6905 case R_PPC64_GOT_TLSGD16_HI:
6906 case R_PPC64_GOT_TLSGD16_HA:
6907 if (ok_tprel)
6908 /* GD -> LE */
6909 tls_set = 0;
6910 else
6911 /* GD -> IE */
6912 tls_set = TLS_TLS | TLS_TPRELGD;
6913 tls_clear = TLS_GD;
6914 tls_type = TLS_TLS | TLS_GD;
6915 expecting_tls_get_addr = 1;
6916 break;
6917
6918 case R_PPC64_GOT_TPREL16_DS:
6919 case R_PPC64_GOT_TPREL16_LO_DS:
6920 case R_PPC64_GOT_TPREL16_HI:
6921 case R_PPC64_GOT_TPREL16_HA:
6922 expecting_tls_get_addr = 0;
6923 if (ok_tprel)
6924 {
6925 /* IE -> LE */
6926 tls_set = 0;
6927 tls_clear = TLS_TPREL;
6928 tls_type = TLS_TLS | TLS_TPREL;
6929 break;
6930 }
6931 else
6932 continue;
6933
6934 case R_PPC64_REL14:
6935 case R_PPC64_REL14_BRTAKEN:
6936 case R_PPC64_REL14_BRNTAKEN:
6937 case R_PPC64_REL24:
6938 if (h != NULL
6939 && (h == &htab->tls_get_addr->elf
6940 || h == &htab->tls_get_addr_fd->elf))
6941 {
6942 if (!expecting_tls_get_addr
6943 && rel != relstart
6944 && ((ELF64_R_TYPE (rel[-1].r_info)
6945 == R_PPC64_TOC16)
6946 || (ELF64_R_TYPE (rel[-1].r_info)
6947 == R_PPC64_TOC16_LO)))
6948 {
6949 /* Check for toc tls entries. */
6950 char *toc_tls;
6951 int retval;
6952
6953 retval = get_tls_mask (&toc_tls, NULL, &locsyms,
6954 rel - 1, ibfd);
6955 if (retval == 0)
6956 goto err_free_rel;
6957 if (retval > 1 && toc_tls != NULL)
6958 {
6959 expecting_tls_get_addr = 1;
6960 if (toc_ref != NULL)
6961 toc_ref[toc_ref_index] = 1;
6962 }
6963 }
6964
6965 if (expecting_tls_get_addr)
6966 {
6967 struct plt_entry *ent;
6968 for (ent = h->plt.plist; ent; ent = ent->next)
6969 if (ent->addend == 0)
6970 {
6971 if (ent->plt.refcount > 0)
6972 ent->plt.refcount -= 1;
6973 break;
6974 }
6975 }
6976 }
6977 expecting_tls_get_addr = 0;
6978 continue;
6979
6980 case R_PPC64_TOC16:
6981 case R_PPC64_TOC16_LO:
6982 case R_PPC64_TLS:
6983 expecting_tls_get_addr = 0;
6984 if (sym_sec == toc && toc != NULL)
6985 {
6986 /* Mark this toc entry as referenced by a TLS
6987 code sequence. We can do that now in the
6988 case of R_PPC64_TLS, and after checking for
6989 tls_get_addr for the TOC16 relocs. */
6990 if (toc_ref == NULL)
6991 {
6992 toc_ref = bfd_zmalloc (toc->size / 8);
6993 if (toc_ref == NULL)
6994 goto err_free_rel;
6995 }
6996 if (h != NULL)
6997 value = h->root.u.def.value;
6998 else
6999 value = sym->st_value;
7000 value += rel->r_addend;
7001 BFD_ASSERT (value < toc->size && value % 8 == 0);
7002 toc_ref_index = value / 8;
7003 if (r_type == R_PPC64_TLS)
7004 toc_ref[toc_ref_index] = 1;
7005 }
7006 continue;
7007
7008 case R_PPC64_TPREL64:
7009 expecting_tls_get_addr = 0;
7010 if (sec != toc
7011 || toc_ref == NULL
7012 || !toc_ref[rel->r_offset / 8])
7013 continue;
7014 if (ok_tprel)
7015 {
7016 /* IE -> LE */
7017 tls_set = TLS_EXPLICIT;
7018 tls_clear = TLS_TPREL;
7019 break;
7020 }
7021 else
7022 continue;
7023
7024 case R_PPC64_DTPMOD64:
7025 expecting_tls_get_addr = 0;
7026 if (sec != toc
7027 || toc_ref == NULL
7028 || !toc_ref[rel->r_offset / 8])
7029 continue;
7030 if (rel + 1 < relend
7031 && (rel[1].r_info
7032 == ELF64_R_INFO (r_symndx, R_PPC64_DTPREL64))
7033 && rel[1].r_offset == rel->r_offset + 8)
7034 {
7035 if (ok_tprel)
7036 /* GD -> LE */
7037 tls_set = TLS_EXPLICIT | TLS_GD;
7038 else
7039 /* GD -> IE */
7040 tls_set = TLS_EXPLICIT | TLS_GD | TLS_TPRELGD;
7041 tls_clear = TLS_GD;
7042 }
7043 else
7044 {
7045 if (!is_local)
7046 continue;
7047
7048 /* LD -> LE */
7049 tls_set = TLS_EXPLICIT;
7050 tls_clear = TLS_LD;
7051 }
7052 break;
7053
7054 default:
7055 expecting_tls_get_addr = 0;
7056 continue;
7057 }
7058
7059 if ((tls_set & TLS_EXPLICIT) == 0)
7060 {
7061 struct got_entry *ent;
7062
7063 /* Adjust got entry for this reloc. */
7064 if (h != NULL)
7065 ent = h->got.glist;
7066 else
7067 ent = elf_local_got_ents (ibfd)[r_symndx];
7068
7069 for (; ent != NULL; ent = ent->next)
7070 if (ent->addend == rel->r_addend
7071 && ent->owner == ibfd
7072 && ent->tls_type == tls_type)
7073 break;
7074 if (ent == NULL)
7075 abort ();
7076
7077 if (tls_set == 0)
7078 {
7079 /* We managed to get rid of a got entry. */
7080 if (ent->got.refcount > 0)
7081 ent->got.refcount -= 1;
7082 }
7083 }
7084 else
7085 {
7086 /* If we got rid of a DTPMOD/DTPREL reloc pair then
7087 we'll lose one or two dyn relocs. */
7088 if (!dec_dynrel_count (rel->r_info, sec, info,
7089 NULL, h, sym_sec))
7090 return FALSE;
7091
7092 if (tls_set == (TLS_EXPLICIT | TLS_GD))
7093 {
7094 if (!dec_dynrel_count ((rel + 1)->r_info, sec, info,
7095 NULL, h, sym_sec))
7096 return FALSE;
7097 }
7098 }
7099
7100 *tls_mask |= tls_set;
7101 *tls_mask &= ~tls_clear;
7102 }
7103
7104 if (elf_section_data (sec)->relocs != relstart)
7105 free (relstart);
7106 }
7107
7108 if (toc_ref != NULL)
7109 free (toc_ref);
7110
7111 if (locsyms != NULL
7112 && (elf_tdata (ibfd)->symtab_hdr.contents
7113 != (unsigned char *) locsyms))
7114 {
7115 if (!info->keep_memory)
7116 free (locsyms);
7117 else
7118 elf_tdata (ibfd)->symtab_hdr.contents = (unsigned char *) locsyms;
7119 }
7120 }
7121 return TRUE;
7122 }
7123
7124 /* Called via elf_link_hash_traverse from ppc64_elf_edit_toc to adjust
7125 the values of any global symbols in a toc section that has been
7126 edited. Globals in toc sections should be a rarity, so this function
7127 sets a flag if any are found in toc sections other than the one just
7128 edited, so that futher hash table traversals can be avoided. */
7129
7130 struct adjust_toc_info
7131 {
7132 asection *toc;
7133 unsigned long *skip;
7134 bfd_boolean global_toc_syms;
7135 };
7136
7137 static bfd_boolean
7138 adjust_toc_syms (struct elf_link_hash_entry *h, void *inf)
7139 {
7140 struct ppc_link_hash_entry *eh;
7141 struct adjust_toc_info *toc_inf = (struct adjust_toc_info *) inf;
7142
7143 if (h->root.type == bfd_link_hash_indirect)
7144 return TRUE;
7145
7146 if (h->root.type == bfd_link_hash_warning)
7147 h = (struct elf_link_hash_entry *) h->root.u.i.link;
7148
7149 if (h->root.type != bfd_link_hash_defined
7150 && h->root.type != bfd_link_hash_defweak)
7151 return TRUE;
7152
7153 eh = (struct ppc_link_hash_entry *) h;
7154 if (eh->adjust_done)
7155 return TRUE;
7156
7157 if (eh->elf.root.u.def.section == toc_inf->toc)
7158 {
7159 unsigned long skip = toc_inf->skip[eh->elf.root.u.def.value >> 3];
7160 if (skip != (unsigned long) -1)
7161 eh->elf.root.u.def.value -= skip;
7162 else
7163 {
7164 (*_bfd_error_handler)
7165 (_("%s defined in removed toc entry"), eh->elf.root.root.string);
7166 eh->elf.root.u.def.section = &bfd_abs_section;
7167 eh->elf.root.u.def.value = 0;
7168 }
7169 eh->adjust_done = 1;
7170 }
7171 else if (strcmp (eh->elf.root.u.def.section->name, ".toc") == 0)
7172 toc_inf->global_toc_syms = TRUE;
7173
7174 return TRUE;
7175 }
7176
7177 /* Examine all relocs referencing .toc sections in order to remove
7178 unused .toc entries. */
7179
7180 bfd_boolean
7181 ppc64_elf_edit_toc (bfd *obfd ATTRIBUTE_UNUSED, struct bfd_link_info *info)
7182 {
7183 bfd *ibfd;
7184 struct adjust_toc_info toc_inf;
7185
7186 toc_inf.global_toc_syms = TRUE;
7187 for (ibfd = info->input_bfds; ibfd != NULL; ibfd = ibfd->link_next)
7188 {
7189 asection *toc, *sec;
7190 Elf_Internal_Shdr *symtab_hdr;
7191 Elf_Internal_Sym *local_syms;
7192 struct elf_link_hash_entry **sym_hashes;
7193 Elf_Internal_Rela *relstart, *rel;
7194 unsigned long *skip, *drop;
7195 unsigned char *used;
7196 unsigned char *keep, last, some_unused;
7197
7198 toc = bfd_get_section_by_name (ibfd, ".toc");
7199 if (toc == NULL
7200 || toc->size == 0
7201 || toc->sec_info_type == ELF_INFO_TYPE_JUST_SYMS
7202 || elf_discarded_section (toc))
7203 continue;
7204
7205 local_syms = NULL;
7206 symtab_hdr = &elf_tdata (ibfd)->symtab_hdr;
7207 sym_hashes = elf_sym_hashes (ibfd);
7208
7209 /* Look at sections dropped from the final link. */
7210 skip = NULL;
7211 relstart = NULL;
7212 for (sec = ibfd->sections; sec != NULL; sec = sec->next)
7213 {
7214 if (sec->reloc_count == 0
7215 || !elf_discarded_section (sec)
7216 || get_opd_info (sec)
7217 || (sec->flags & SEC_ALLOC) == 0
7218 || (sec->flags & SEC_DEBUGGING) != 0)
7219 continue;
7220
7221 relstart = _bfd_elf_link_read_relocs (ibfd, sec, NULL, NULL, FALSE);
7222 if (relstart == NULL)
7223 goto error_ret;
7224
7225 /* Run through the relocs to see which toc entries might be
7226 unused. */
7227 for (rel = relstart; rel < relstart + sec->reloc_count; ++rel)
7228 {
7229 enum elf_ppc64_reloc_type r_type;
7230 unsigned long r_symndx;
7231 asection *sym_sec;
7232 struct elf_link_hash_entry *h;
7233 Elf_Internal_Sym *sym;
7234 bfd_vma val;
7235
7236 r_type = ELF64_R_TYPE (rel->r_info);
7237 switch (r_type)
7238 {
7239 default:
7240 continue;
7241
7242 case R_PPC64_TOC16:
7243 case R_PPC64_TOC16_LO:
7244 case R_PPC64_TOC16_HI:
7245 case R_PPC64_TOC16_HA:
7246 case R_PPC64_TOC16_DS:
7247 case R_PPC64_TOC16_LO_DS:
7248 break;
7249 }
7250
7251 r_symndx = ELF64_R_SYM (rel->r_info);
7252 if (!get_sym_h (&h, &sym, &sym_sec, NULL, &local_syms,
7253 r_symndx, ibfd))
7254 goto error_ret;
7255
7256 if (sym_sec != toc)
7257 continue;
7258
7259 if (h != NULL)
7260 val = h->root.u.def.value;
7261 else
7262 val = sym->st_value;
7263 val += rel->r_addend;
7264
7265 if (val >= toc->size)
7266 continue;
7267
7268 /* Anything in the toc ought to be aligned to 8 bytes.
7269 If not, don't mark as unused. */
7270 if (val & 7)
7271 continue;
7272
7273 if (skip == NULL)
7274 {
7275 skip = bfd_zmalloc (sizeof (*skip) * (toc->size + 7) / 8);
7276 if (skip == NULL)
7277 goto error_ret;
7278 }
7279
7280 skip[val >> 3] = 1;
7281 }
7282
7283 if (elf_section_data (sec)->relocs != relstart)
7284 free (relstart);
7285 }
7286
7287 if (skip == NULL)
7288 continue;
7289
7290 used = bfd_zmalloc (sizeof (*used) * (toc->size + 7) / 8);
7291 if (used == NULL)
7292 {
7293 error_ret:
7294 if (local_syms != NULL
7295 && symtab_hdr->contents != (unsigned char *) local_syms)
7296 free (local_syms);
7297 if (sec != NULL
7298 && relstart != NULL
7299 && elf_section_data (sec)->relocs != relstart)
7300 free (relstart);
7301 if (skip != NULL)
7302 free (skip);
7303 return FALSE;
7304 }
7305
7306 /* Now check all kept sections that might reference the toc.
7307 Check the toc itself last. */
7308 for (sec = (ibfd->sections == toc && toc->next ? toc->next
7309 : ibfd->sections);
7310 sec != NULL;
7311 sec = (sec == toc ? NULL
7312 : sec->next == NULL ? toc
7313 : sec->next == toc && toc->next ? toc->next
7314 : sec->next))
7315 {
7316 int repeat;
7317
7318 if (sec->reloc_count == 0
7319 || elf_discarded_section (sec)
7320 || get_opd_info (sec)
7321 || (sec->flags & SEC_ALLOC) == 0
7322 || (sec->flags & SEC_DEBUGGING) != 0)
7323 continue;
7324
7325 relstart = _bfd_elf_link_read_relocs (ibfd, sec, NULL, NULL, TRUE);
7326 if (relstart == NULL)
7327 goto error_ret;
7328
7329 /* Mark toc entries referenced as used. */
7330 repeat = 0;
7331 do
7332 for (rel = relstart; rel < relstart + sec->reloc_count; ++rel)
7333 {
7334 enum elf_ppc64_reloc_type r_type;
7335 unsigned long r_symndx;
7336 asection *sym_sec;
7337 struct elf_link_hash_entry *h;
7338 Elf_Internal_Sym *sym;
7339 bfd_vma val;
7340
7341 r_type = ELF64_R_TYPE (rel->r_info);
7342 switch (r_type)
7343 {
7344 case R_PPC64_TOC16:
7345 case R_PPC64_TOC16_LO:
7346 case R_PPC64_TOC16_HI:
7347 case R_PPC64_TOC16_HA:
7348 case R_PPC64_TOC16_DS:
7349 case R_PPC64_TOC16_LO_DS:
7350 /* In case we're taking addresses of toc entries. */
7351 case R_PPC64_ADDR64:
7352 break;
7353
7354 default:
7355 continue;
7356 }
7357
7358 r_symndx = ELF64_R_SYM (rel->r_info);
7359 if (!get_sym_h (&h, &sym, &sym_sec, NULL, &local_syms,
7360 r_symndx, ibfd))
7361 {
7362 free (used);
7363 goto error_ret;
7364 }
7365
7366 if (sym_sec != toc)
7367 continue;
7368
7369 if (h != NULL)
7370 val = h->root.u.def.value;
7371 else
7372 val = sym->st_value;
7373 val += rel->r_addend;
7374
7375 if (val >= toc->size)
7376 continue;
7377
7378 /* For the toc section, we only mark as used if
7379 this entry itself isn't unused. */
7380 if (sec == toc
7381 && !used[val >> 3]
7382 && (used[rel->r_offset >> 3]
7383 || !skip[rel->r_offset >> 3]))
7384 /* Do all the relocs again, to catch reference
7385 chains. */
7386 repeat = 1;
7387
7388 used[val >> 3] = 1;
7389 }
7390 while (repeat);
7391 }
7392
7393 /* Merge the used and skip arrays. Assume that TOC
7394 doublewords not appearing as either used or unused belong
7395 to to an entry more than one doubleword in size. */
7396 for (drop = skip, keep = used, last = 0, some_unused = 0;
7397 drop < skip + (toc->size + 7) / 8;
7398 ++drop, ++keep)
7399 {
7400 if (*keep)
7401 {
7402 *drop = 0;
7403 last = 0;
7404 }
7405 else if (*drop)
7406 {
7407 some_unused = 1;
7408 last = 1;
7409 }
7410 else
7411 *drop = last;
7412 }
7413
7414 free (used);
7415
7416 if (some_unused)
7417 {
7418 bfd_byte *contents, *src;
7419 unsigned long off;
7420
7421 /* Shuffle the toc contents, and at the same time convert the
7422 skip array from booleans into offsets. */
7423 if (!bfd_malloc_and_get_section (ibfd, toc, &contents))
7424 goto error_ret;
7425
7426 elf_section_data (toc)->this_hdr.contents = contents;
7427
7428 for (src = contents, off = 0, drop = skip;
7429 src < contents + toc->size;
7430 src += 8, ++drop)
7431 {
7432 if (*drop)
7433 {
7434 *drop = (unsigned long) -1;
7435 off += 8;
7436 }
7437 else if (off != 0)
7438 {
7439 *drop = off;
7440 memcpy (src - off, src, 8);
7441 }
7442 }
7443 toc->rawsize = toc->size;
7444 toc->size = src - contents - off;
7445
7446 if (toc->reloc_count != 0)
7447 {
7448 Elf_Internal_Rela *wrel;
7449 bfd_size_type sz;
7450
7451 /* Read toc relocs. */
7452 relstart = _bfd_elf_link_read_relocs (ibfd, toc, NULL, NULL,
7453 TRUE);
7454 if (relstart == NULL)
7455 goto error_ret;
7456
7457 /* Remove unused toc relocs, and adjust those we keep. */
7458 wrel = relstart;
7459 for (rel = relstart; rel < relstart + toc->reloc_count; ++rel)
7460 if (skip[rel->r_offset >> 3] != (unsigned long) -1)
7461 {
7462 wrel->r_offset = rel->r_offset - skip[rel->r_offset >> 3];
7463 wrel->r_info = rel->r_info;
7464 wrel->r_addend = rel->r_addend;
7465 ++wrel;
7466 }
7467 else if (!dec_dynrel_count (rel->r_info, toc, info,
7468 &local_syms, NULL, NULL))
7469 goto error_ret;
7470
7471 toc->reloc_count = wrel - relstart;
7472 sz = elf_section_data (toc)->rel_hdr.sh_entsize;
7473 elf_section_data (toc)->rel_hdr.sh_size = toc->reloc_count * sz;
7474 BFD_ASSERT (elf_section_data (toc)->rel_hdr2 == NULL);
7475 }
7476
7477 /* Adjust addends for relocs against the toc section sym. */
7478 for (sec = ibfd->sections; sec != NULL; sec = sec->next)
7479 {
7480 if (sec->reloc_count == 0
7481 || elf_discarded_section (sec))
7482 continue;
7483
7484 relstart = _bfd_elf_link_read_relocs (ibfd, sec, NULL, NULL,
7485 TRUE);
7486 if (relstart == NULL)
7487 goto error_ret;
7488
7489 for (rel = relstart; rel < relstart + sec->reloc_count; ++rel)
7490 {
7491 enum elf_ppc64_reloc_type r_type;
7492 unsigned long r_symndx;
7493 asection *sym_sec;
7494 struct elf_link_hash_entry *h;
7495 Elf_Internal_Sym *sym;
7496
7497 r_type = ELF64_R_TYPE (rel->r_info);
7498 switch (r_type)
7499 {
7500 default:
7501 continue;
7502
7503 case R_PPC64_TOC16:
7504 case R_PPC64_TOC16_LO:
7505 case R_PPC64_TOC16_HI:
7506 case R_PPC64_TOC16_HA:
7507 case R_PPC64_TOC16_DS:
7508 case R_PPC64_TOC16_LO_DS:
7509 case R_PPC64_ADDR64:
7510 break;
7511 }
7512
7513 r_symndx = ELF64_R_SYM (rel->r_info);
7514 if (!get_sym_h (&h, &sym, &sym_sec, NULL, &local_syms,
7515 r_symndx, ibfd))
7516 goto error_ret;
7517
7518 if (sym_sec != toc || h != NULL || sym->st_value != 0)
7519 continue;
7520
7521 rel->r_addend -= skip[rel->r_addend >> 3];
7522 }
7523 }
7524
7525 /* We shouldn't have local or global symbols defined in the TOC,
7526 but handle them anyway. */
7527 if (local_syms != NULL)
7528 {
7529 Elf_Internal_Sym *sym;
7530
7531 for (sym = local_syms;
7532 sym < local_syms + symtab_hdr->sh_info;
7533 ++sym)
7534 if (sym->st_shndx != SHN_UNDEF
7535 && (sym->st_shndx < SHN_LORESERVE
7536 || sym->st_shndx > SHN_HIRESERVE)
7537 && sym->st_value != 0
7538 && bfd_section_from_elf_index (ibfd, sym->st_shndx) == toc)
7539 {
7540 if (skip[sym->st_value >> 3] != (unsigned long) -1)
7541 sym->st_value -= skip[sym->st_value >> 3];
7542 else
7543 {
7544 (*_bfd_error_handler)
7545 (_("%s defined in removed toc entry"),
7546 bfd_elf_sym_name (ibfd, symtab_hdr, sym,
7547 NULL));
7548 sym->st_value = 0;
7549 sym->st_shndx = SHN_ABS;
7550 }
7551 symtab_hdr->contents = (unsigned char *) local_syms;
7552 }
7553 }
7554
7555 /* Finally, adjust any global syms defined in the toc. */
7556 if (toc_inf.global_toc_syms)
7557 {
7558 toc_inf.toc = toc;
7559 toc_inf.skip = skip;
7560 toc_inf.global_toc_syms = FALSE;
7561 elf_link_hash_traverse (elf_hash_table (info), adjust_toc_syms,
7562 &toc_inf);
7563 }
7564 }
7565
7566 if (local_syms != NULL
7567 && symtab_hdr->contents != (unsigned char *) local_syms)
7568 {
7569 if (!info->keep_memory)
7570 free (local_syms);
7571 else
7572 symtab_hdr->contents = (unsigned char *) local_syms;
7573 }
7574 free (skip);
7575 }
7576
7577 return TRUE;
7578 }
7579
7580 /* Allocate space in .plt, .got and associated reloc sections for
7581 dynamic relocs. */
7582
7583 static bfd_boolean
7584 allocate_dynrelocs (struct elf_link_hash_entry *h, void *inf)
7585 {
7586 struct bfd_link_info *info;
7587 struct ppc_link_hash_table *htab;
7588 asection *s;
7589 struct ppc_link_hash_entry *eh;
7590 struct ppc_dyn_relocs *p;
7591 struct got_entry *gent;
7592
7593 if (h->root.type == bfd_link_hash_indirect)
7594 return TRUE;
7595
7596 if (h->root.type == bfd_link_hash_warning)
7597 h = (struct elf_link_hash_entry *) h->root.u.i.link;
7598
7599 info = (struct bfd_link_info *) inf;
7600 htab = ppc_hash_table (info);
7601
7602 if (htab->elf.dynamic_sections_created
7603 && h->dynindx != -1
7604 && WILL_CALL_FINISH_DYNAMIC_SYMBOL (1, info->shared, h))
7605 {
7606 struct plt_entry *pent;
7607 bfd_boolean doneone = FALSE;
7608 for (pent = h->plt.plist; pent != NULL; pent = pent->next)
7609 if (pent->plt.refcount > 0)
7610 {
7611 /* If this is the first .plt entry, make room for the special
7612 first entry. */
7613 s = htab->plt;
7614 if (s->size == 0)
7615 s->size += PLT_INITIAL_ENTRY_SIZE;
7616
7617 pent->plt.offset = s->size;
7618
7619 /* Make room for this entry. */
7620 s->size += PLT_ENTRY_SIZE;
7621
7622 /* Make room for the .glink code. */
7623 s = htab->glink;
7624 if (s->size == 0)
7625 s->size += GLINK_CALL_STUB_SIZE;
7626 /* We need bigger stubs past index 32767. */
7627 if (s->size >= GLINK_CALL_STUB_SIZE + 32768*2*4)
7628 s->size += 4;
7629 s->size += 2*4;
7630
7631 /* We also need to make an entry in the .rela.plt section. */
7632 s = htab->relplt;
7633 s->size += sizeof (Elf64_External_Rela);
7634 doneone = TRUE;
7635 }
7636 else
7637 pent->plt.offset = (bfd_vma) -1;
7638 if (!doneone)
7639 {
7640 h->plt.plist = NULL;
7641 h->needs_plt = 0;
7642 }
7643 }
7644 else
7645 {
7646 h->plt.plist = NULL;
7647 h->needs_plt = 0;
7648 }
7649
7650 eh = (struct ppc_link_hash_entry *) h;
7651 /* Run through the TLS GD got entries first if we're changing them
7652 to TPREL. */
7653 if ((eh->tls_mask & TLS_TPRELGD) != 0)
7654 for (gent = h->got.glist; gent != NULL; gent = gent->next)
7655 if (gent->got.refcount > 0
7656 && (gent->tls_type & TLS_GD) != 0)
7657 {
7658 /* This was a GD entry that has been converted to TPREL. If
7659 there happens to be a TPREL entry we can use that one. */
7660 struct got_entry *ent;
7661 for (ent = h->got.glist; ent != NULL; ent = ent->next)
7662 if (ent->got.refcount > 0
7663 && (ent->tls_type & TLS_TPREL) != 0
7664 && ent->addend == gent->addend
7665 && ent->owner == gent->owner)
7666 {
7667 gent->got.refcount = 0;
7668 break;
7669 }
7670
7671 /* If not, then we'll be using our own TPREL entry. */
7672 if (gent->got.refcount != 0)
7673 gent->tls_type = TLS_TLS | TLS_TPREL;
7674 }
7675
7676 for (gent = h->got.glist; gent != NULL; gent = gent->next)
7677 if (gent->got.refcount > 0)
7678 {
7679 bfd_boolean dyn;
7680
7681 /* Make sure this symbol is output as a dynamic symbol.
7682 Undefined weak syms won't yet be marked as dynamic,
7683 nor will all TLS symbols. */
7684 if (h->dynindx == -1
7685 && !h->forced_local)
7686 {
7687 if (! bfd_elf_link_record_dynamic_symbol (info, h))
7688 return FALSE;
7689 }
7690
7691 if ((gent->tls_type & TLS_LD) != 0
7692 && !h->def_dynamic)
7693 {
7694 gent->got.offset = ppc64_tlsld_got (gent->owner)->offset;
7695 continue;
7696 }
7697
7698 s = ppc64_elf_tdata (gent->owner)->got;
7699 gent->got.offset = s->size;
7700 s->size
7701 += (gent->tls_type & eh->tls_mask & (TLS_GD | TLS_LD)) ? 16 : 8;
7702 dyn = htab->elf.dynamic_sections_created;
7703 if ((info->shared
7704 || WILL_CALL_FINISH_DYNAMIC_SYMBOL (dyn, 0, h))
7705 && (ELF_ST_VISIBILITY (h->other) == STV_DEFAULT
7706 || h->root.type != bfd_link_hash_undefweak))
7707 ppc64_elf_tdata (gent->owner)->relgot->size
7708 += (gent->tls_type & eh->tls_mask & TLS_GD
7709 ? 2 * sizeof (Elf64_External_Rela)
7710 : sizeof (Elf64_External_Rela));
7711 }
7712 else
7713 gent->got.offset = (bfd_vma) -1;
7714
7715 if (eh->dyn_relocs == NULL)
7716 return TRUE;
7717
7718 /* In the shared -Bsymbolic case, discard space allocated for
7719 dynamic pc-relative relocs against symbols which turn out to be
7720 defined in regular objects. For the normal shared case, discard
7721 space for relocs that have become local due to symbol visibility
7722 changes. */
7723
7724 if (info->shared)
7725 {
7726 /* Relocs that use pc_count are those that appear on a call insn,
7727 or certain REL relocs (see MUST_BE_DYN_RELOC) that can be
7728 generated via assembly. We want calls to protected symbols to
7729 resolve directly to the function rather than going via the plt.
7730 If people want function pointer comparisons to work as expected
7731 then they should avoid writing weird assembly. */
7732 if (SYMBOL_CALLS_LOCAL (info, h))
7733 {
7734 struct ppc_dyn_relocs **pp;
7735
7736 for (pp = &eh->dyn_relocs; (p = *pp) != NULL; )
7737 {
7738 p->count -= p->pc_count;
7739 p->pc_count = 0;
7740 if (p->count == 0)
7741 *pp = p->next;
7742 else
7743 pp = &p->next;
7744 }
7745 }
7746
7747 /* Also discard relocs on undefined weak syms with non-default
7748 visibility. */
7749 if (eh->dyn_relocs != NULL
7750 && h->root.type == bfd_link_hash_undefweak)
7751 {
7752 if (ELF_ST_VISIBILITY (h->other) != STV_DEFAULT)
7753 eh->dyn_relocs = NULL;
7754
7755 /* Make sure this symbol is output as a dynamic symbol.
7756 Undefined weak syms won't yet be marked as dynamic. */
7757 else if (h->dynindx == -1
7758 && !h->forced_local)
7759 {
7760 if (! bfd_elf_link_record_dynamic_symbol (info, h))
7761 return FALSE;
7762 }
7763 }
7764 }
7765 else if (ELIMINATE_COPY_RELOCS)
7766 {
7767 /* For the non-shared case, discard space for relocs against
7768 symbols which turn out to need copy relocs or are not
7769 dynamic. */
7770
7771 if (!h->non_got_ref
7772 && h->def_dynamic
7773 && !h->def_regular)
7774 {
7775 /* Make sure this symbol is output as a dynamic symbol.
7776 Undefined weak syms won't yet be marked as dynamic. */
7777 if (h->dynindx == -1
7778 && !h->forced_local)
7779 {
7780 if (! bfd_elf_link_record_dynamic_symbol (info, h))
7781 return FALSE;
7782 }
7783
7784 /* If that succeeded, we know we'll be keeping all the
7785 relocs. */
7786 if (h->dynindx != -1)
7787 goto keep;
7788 }
7789
7790 eh->dyn_relocs = NULL;
7791
7792 keep: ;
7793 }
7794
7795 /* Finally, allocate space. */
7796 for (p = eh->dyn_relocs; p != NULL; p = p->next)
7797 {
7798 asection *sreloc = elf_section_data (p->sec)->sreloc;
7799 sreloc->size += p->count * sizeof (Elf64_External_Rela);
7800 }
7801
7802 return TRUE;
7803 }
7804
7805 /* Find any dynamic relocs that apply to read-only sections. */
7806
7807 static bfd_boolean
7808 readonly_dynrelocs (struct elf_link_hash_entry *h, void *inf)
7809 {
7810 struct ppc_link_hash_entry *eh;
7811 struct ppc_dyn_relocs *p;
7812
7813 if (h->root.type == bfd_link_hash_warning)
7814 h = (struct elf_link_hash_entry *) h->root.u.i.link;
7815
7816 eh = (struct ppc_link_hash_entry *) h;
7817 for (p = eh->dyn_relocs; p != NULL; p = p->next)
7818 {
7819 asection *s = p->sec->output_section;
7820
7821 if (s != NULL && (s->flags & SEC_READONLY) != 0)
7822 {
7823 struct bfd_link_info *info = inf;
7824
7825 info->flags |= DF_TEXTREL;
7826
7827 /* Not an error, just cut short the traversal. */
7828 return FALSE;
7829 }
7830 }
7831 return TRUE;
7832 }
7833
7834 /* Set the sizes of the dynamic sections. */
7835
7836 static bfd_boolean
7837 ppc64_elf_size_dynamic_sections (bfd *output_bfd ATTRIBUTE_UNUSED,
7838 struct bfd_link_info *info)
7839 {
7840 struct ppc_link_hash_table *htab;
7841 bfd *dynobj;
7842 asection *s;
7843 bfd_boolean relocs;
7844 bfd *ibfd;
7845
7846 htab = ppc_hash_table (info);
7847 dynobj = htab->elf.dynobj;
7848 if (dynobj == NULL)
7849 abort ();
7850
7851 if (htab->elf.dynamic_sections_created)
7852 {
7853 /* Set the contents of the .interp section to the interpreter. */
7854 if (info->executable)
7855 {
7856 s = bfd_get_section_by_name (dynobj, ".interp");
7857 if (s == NULL)
7858 abort ();
7859 s->size = sizeof ELF_DYNAMIC_INTERPRETER;
7860 s->contents = (unsigned char *) ELF_DYNAMIC_INTERPRETER;
7861 }
7862 }
7863
7864 /* Set up .got offsets for local syms, and space for local dynamic
7865 relocs. */
7866 for (ibfd = info->input_bfds; ibfd != NULL; ibfd = ibfd->link_next)
7867 {
7868 struct got_entry **lgot_ents;
7869 struct got_entry **end_lgot_ents;
7870 char *lgot_masks;
7871 bfd_size_type locsymcount;
7872 Elf_Internal_Shdr *symtab_hdr;
7873 asection *srel;
7874
7875 if (!is_ppc64_elf_target (ibfd->xvec))
7876 continue;
7877
7878 if (ppc64_tlsld_got (ibfd)->refcount > 0)
7879 {
7880 s = ppc64_elf_tdata (ibfd)->got;
7881 ppc64_tlsld_got (ibfd)->offset = s->size;
7882 s->size += 16;
7883 if (info->shared)
7884 {
7885 srel = ppc64_elf_tdata (ibfd)->relgot;
7886 srel->size += sizeof (Elf64_External_Rela);
7887 }
7888 }
7889 else
7890 ppc64_tlsld_got (ibfd)->offset = (bfd_vma) -1;
7891
7892 for (s = ibfd->sections; s != NULL; s = s->next)
7893 {
7894 struct ppc_dyn_relocs *p;
7895
7896 for (p = elf_section_data (s)->local_dynrel; p != NULL; p = p->next)
7897 {
7898 if (!bfd_is_abs_section (p->sec)
7899 && bfd_is_abs_section (p->sec->output_section))
7900 {
7901 /* Input section has been discarded, either because
7902 it is a copy of a linkonce section or due to
7903 linker script /DISCARD/, so we'll be discarding
7904 the relocs too. */
7905 }
7906 else if (p->count != 0)
7907 {
7908 srel = elf_section_data (p->sec)->sreloc;
7909 srel->size += p->count * sizeof (Elf64_External_Rela);
7910 if ((p->sec->output_section->flags & SEC_READONLY) != 0)
7911 info->flags |= DF_TEXTREL;
7912 }
7913 }
7914 }
7915
7916 lgot_ents = elf_local_got_ents (ibfd);
7917 if (!lgot_ents)
7918 continue;
7919
7920 symtab_hdr = &elf_tdata (ibfd)->symtab_hdr;
7921 locsymcount = symtab_hdr->sh_info;
7922 end_lgot_ents = lgot_ents + locsymcount;
7923 lgot_masks = (char *) end_lgot_ents;
7924 s = ppc64_elf_tdata (ibfd)->got;
7925 srel = ppc64_elf_tdata (ibfd)->relgot;
7926 for (; lgot_ents < end_lgot_ents; ++lgot_ents, ++lgot_masks)
7927 {
7928 struct got_entry *ent;
7929
7930 for (ent = *lgot_ents; ent != NULL; ent = ent->next)
7931 if (ent->got.refcount > 0)
7932 {
7933 if ((ent->tls_type & *lgot_masks & TLS_LD) != 0)
7934 {
7935 if (ppc64_tlsld_got (ibfd)->offset == (bfd_vma) -1)
7936 {
7937 ppc64_tlsld_got (ibfd)->offset = s->size;
7938 s->size += 16;
7939 if (info->shared)
7940 srel->size += sizeof (Elf64_External_Rela);
7941 }
7942 ent->got.offset = ppc64_tlsld_got (ibfd)->offset;
7943 }
7944 else
7945 {
7946 ent->got.offset = s->size;
7947 if ((ent->tls_type & *lgot_masks & TLS_GD) != 0)
7948 {
7949 s->size += 16;
7950 if (info->shared)
7951 srel->size += 2 * sizeof (Elf64_External_Rela);
7952 }
7953 else
7954 {
7955 s->size += 8;
7956 if (info->shared)
7957 srel->size += sizeof (Elf64_External_Rela);
7958 }
7959 }
7960 }
7961 else
7962 ent->got.offset = (bfd_vma) -1;
7963 }
7964 }
7965
7966 /* Allocate global sym .plt and .got entries, and space for global
7967 sym dynamic relocs. */
7968 elf_link_hash_traverse (&htab->elf, allocate_dynrelocs, info);
7969
7970 /* We now have determined the sizes of the various dynamic sections.
7971 Allocate memory for them. */
7972 relocs = FALSE;
7973 for (s = dynobj->sections; s != NULL; s = s->next)
7974 {
7975 if ((s->flags & SEC_LINKER_CREATED) == 0)
7976 continue;
7977
7978 if (s == htab->brlt || s == htab->relbrlt)
7979 /* These haven't been allocated yet; don't strip. */
7980 continue;
7981 else if (s == htab->got
7982 || s == htab->plt
7983 || s == htab->glink
7984 || s == htab->dynbss)
7985 {
7986 /* Strip this section if we don't need it; see the
7987 comment below. */
7988 }
7989 else if (CONST_STRNEQ (bfd_get_section_name (dynobj, s), ".rela"))
7990 {
7991 if (s->size != 0)
7992 {
7993 if (s != htab->relplt)
7994 relocs = TRUE;
7995
7996 /* We use the reloc_count field as a counter if we need
7997 to copy relocs into the output file. */
7998 s->reloc_count = 0;
7999 }
8000 }
8001 else
8002 {
8003 /* It's not one of our sections, so don't allocate space. */
8004 continue;
8005 }
8006
8007 if (s->size == 0)
8008 {
8009 /* If we don't need this section, strip it from the
8010 output file. This is mostly to handle .rela.bss and
8011 .rela.plt. We must create both sections in
8012 create_dynamic_sections, because they must be created
8013 before the linker maps input sections to output
8014 sections. The linker does that before
8015 adjust_dynamic_symbol is called, and it is that
8016 function which decides whether anything needs to go
8017 into these sections. */
8018 s->flags |= SEC_EXCLUDE;
8019 continue;
8020 }
8021
8022 if ((s->flags & SEC_HAS_CONTENTS) == 0)
8023 continue;
8024
8025 /* Allocate memory for the section contents. We use bfd_zalloc
8026 here in case unused entries are not reclaimed before the
8027 section's contents are written out. This should not happen,
8028 but this way if it does we get a R_PPC64_NONE reloc in .rela
8029 sections instead of garbage.
8030 We also rely on the section contents being zero when writing
8031 the GOT. */
8032 s->contents = bfd_zalloc (dynobj, s->size);
8033 if (s->contents == NULL)
8034 return FALSE;
8035 }
8036
8037 for (ibfd = info->input_bfds; ibfd != NULL; ibfd = ibfd->link_next)
8038 {
8039 if (!is_ppc64_elf_target (ibfd->xvec))
8040 continue;
8041
8042 s = ppc64_elf_tdata (ibfd)->got;
8043 if (s != NULL && s != htab->got)
8044 {
8045 if (s->size == 0)
8046 s->flags |= SEC_EXCLUDE;
8047 else
8048 {
8049 s->contents = bfd_zalloc (ibfd, s->size);
8050 if (s->contents == NULL)
8051 return FALSE;
8052 }
8053 }
8054 s = ppc64_elf_tdata (ibfd)->relgot;
8055 if (s != NULL)
8056 {
8057 if (s->size == 0)
8058 s->flags |= SEC_EXCLUDE;
8059 else
8060 {
8061 s->contents = bfd_zalloc (ibfd, s->size);
8062 if (s->contents == NULL)
8063 return FALSE;
8064 relocs = TRUE;
8065 s->reloc_count = 0;
8066 }
8067 }
8068 }
8069
8070 if (htab->elf.dynamic_sections_created)
8071 {
8072 /* Add some entries to the .dynamic section. We fill in the
8073 values later, in ppc64_elf_finish_dynamic_sections, but we
8074 must add the entries now so that we get the correct size for
8075 the .dynamic section. The DT_DEBUG entry is filled in by the
8076 dynamic linker and used by the debugger. */
8077 #define add_dynamic_entry(TAG, VAL) \
8078 _bfd_elf_add_dynamic_entry (info, TAG, VAL)
8079
8080 if (info->executable)
8081 {
8082 if (!add_dynamic_entry (DT_DEBUG, 0))
8083 return FALSE;
8084 }
8085
8086 if (htab->plt != NULL && htab->plt->size != 0)
8087 {
8088 if (!add_dynamic_entry (DT_PLTGOT, 0)
8089 || !add_dynamic_entry (DT_PLTRELSZ, 0)
8090 || !add_dynamic_entry (DT_PLTREL, DT_RELA)
8091 || !add_dynamic_entry (DT_JMPREL, 0)
8092 || !add_dynamic_entry (DT_PPC64_GLINK, 0))
8093 return FALSE;
8094 }
8095
8096 if (NO_OPD_RELOCS)
8097 {
8098 if (!add_dynamic_entry (DT_PPC64_OPD, 0)
8099 || !add_dynamic_entry (DT_PPC64_OPDSZ, 0))
8100 return FALSE;
8101 }
8102
8103 if (relocs)
8104 {
8105 if (!add_dynamic_entry (DT_RELA, 0)
8106 || !add_dynamic_entry (DT_RELASZ, 0)
8107 || !add_dynamic_entry (DT_RELAENT, sizeof (Elf64_External_Rela)))
8108 return FALSE;
8109
8110 /* If any dynamic relocs apply to a read-only section,
8111 then we need a DT_TEXTREL entry. */
8112 if ((info->flags & DF_TEXTREL) == 0)
8113 elf_link_hash_traverse (&htab->elf, readonly_dynrelocs, info);
8114
8115 if ((info->flags & DF_TEXTREL) != 0)
8116 {
8117 if (!add_dynamic_entry (DT_TEXTREL, 0))
8118 return FALSE;
8119 }
8120 }
8121 }
8122 #undef add_dynamic_entry
8123
8124 return TRUE;
8125 }
8126
8127 /* Determine the type of stub needed, if any, for a call. */
8128
8129 static inline enum ppc_stub_type
8130 ppc_type_of_stub (asection *input_sec,
8131 const Elf_Internal_Rela *rel,
8132 struct ppc_link_hash_entry **hash,
8133 bfd_vma destination)
8134 {
8135 struct ppc_link_hash_entry *h = *hash;
8136 bfd_vma location;
8137 bfd_vma branch_offset;
8138 bfd_vma max_branch_offset;
8139 enum elf_ppc64_reloc_type r_type;
8140
8141 if (h != NULL)
8142 {
8143 struct ppc_link_hash_entry *fdh = h;
8144 if (fdh->oh != NULL
8145 && fdh->oh->is_func_descriptor)
8146 fdh = fdh->oh;
8147
8148 if (fdh->elf.dynindx != -1)
8149 {
8150 struct plt_entry *ent;
8151
8152 for (ent = fdh->elf.plt.plist; ent != NULL; ent = ent->next)
8153 if (ent->addend == rel->r_addend
8154 && ent->plt.offset != (bfd_vma) -1)
8155 {
8156 *hash = fdh;
8157 return ppc_stub_plt_call;
8158 }
8159 }
8160
8161 /* Here, we know we don't have a plt entry. If we don't have a
8162 either a defined function descriptor or a defined entry symbol
8163 in a regular object file, then it is pointless trying to make
8164 any other type of stub. */
8165 if (!((fdh->elf.root.type == bfd_link_hash_defined
8166 || fdh->elf.root.type == bfd_link_hash_defweak)
8167 && fdh->elf.root.u.def.section->output_section != NULL)
8168 && !((h->elf.root.type == bfd_link_hash_defined
8169 || h->elf.root.type == bfd_link_hash_defweak)
8170 && h->elf.root.u.def.section->output_section != NULL))
8171 return ppc_stub_none;
8172 }
8173
8174 /* Determine where the call point is. */
8175 location = (input_sec->output_offset
8176 + input_sec->output_section->vma
8177 + rel->r_offset);
8178
8179 branch_offset = destination - location;
8180 r_type = ELF64_R_TYPE (rel->r_info);
8181
8182 /* Determine if a long branch stub is needed. */
8183 max_branch_offset = 1 << 25;
8184 if (r_type != R_PPC64_REL24)
8185 max_branch_offset = 1 << 15;
8186
8187 if (branch_offset + max_branch_offset >= 2 * max_branch_offset)
8188 /* We need a stub. Figure out whether a long_branch or plt_branch
8189 is needed later. */
8190 return ppc_stub_long_branch;
8191
8192 return ppc_stub_none;
8193 }
8194
8195 /* Build a .plt call stub. */
8196
8197 static inline bfd_byte *
8198 build_plt_stub (bfd *obfd, bfd_byte *p, int offset)
8199 {
8200 #define PPC_LO(v) ((v) & 0xffff)
8201 #define PPC_HI(v) (((v) >> 16) & 0xffff)
8202 #define PPC_HA(v) PPC_HI ((v) + 0x8000)
8203
8204 if (PPC_HA (offset) != 0)
8205 {
8206 bfd_put_32 (obfd, ADDIS_R12_R2 | PPC_HA (offset), p), p += 4;
8207 bfd_put_32 (obfd, STD_R2_40R1, p), p += 4;
8208 bfd_put_32 (obfd, LD_R11_0R12 | PPC_LO (offset), p), p += 4;
8209 if (PPC_HA (offset + 16) != PPC_HA (offset))
8210 {
8211 bfd_put_32 (obfd, ADDI_R12_R12 | PPC_LO (offset), p), p += 4;
8212 offset = 0;
8213 }
8214 bfd_put_32 (obfd, MTCTR_R11, p), p += 4;
8215 bfd_put_32 (obfd, LD_R2_0R12 | PPC_LO (offset + 8), p), p += 4;
8216 bfd_put_32 (obfd, LD_R11_0R12 | PPC_LO (offset + 16), p), p += 4;
8217 bfd_put_32 (obfd, BCTR, p), p += 4;
8218 }
8219 else
8220 {
8221 bfd_put_32 (obfd, STD_R2_40R1, p), p += 4;
8222 bfd_put_32 (obfd, LD_R11_0R2 | PPC_LO (offset), p), p += 4;
8223 if (PPC_HA (offset + 16) != PPC_HA (offset))
8224 {
8225 bfd_put_32 (obfd, ADDI_R2_R2 | PPC_LO (offset), p), p += 4;
8226 offset = 0;
8227 }
8228 bfd_put_32 (obfd, MTCTR_R11, p), p += 4;
8229 bfd_put_32 (obfd, LD_R11_0R2 | PPC_LO (offset + 16), p), p += 4;
8230 bfd_put_32 (obfd, LD_R2_0R2 | PPC_LO (offset + 8), p), p += 4;
8231 bfd_put_32 (obfd, BCTR, p), p += 4;
8232 }
8233 return p;
8234 }
8235
8236 static bfd_boolean
8237 ppc_build_one_stub (struct bfd_hash_entry *gen_entry, void *in_arg)
8238 {
8239 struct ppc_stub_hash_entry *stub_entry;
8240 struct ppc_branch_hash_entry *br_entry;
8241 struct bfd_link_info *info;
8242 struct ppc_link_hash_table *htab;
8243 bfd_byte *loc;
8244 bfd_byte *p;
8245 unsigned int indx;
8246 struct plt_entry *ent;
8247 bfd_vma dest, off;
8248 int size;
8249
8250 /* Massage our args to the form they really have. */
8251 stub_entry = (struct ppc_stub_hash_entry *) gen_entry;
8252 info = in_arg;
8253
8254 htab = ppc_hash_table (info);
8255
8256 /* Make a note of the offset within the stubs for this entry. */
8257 stub_entry->stub_offset = stub_entry->stub_sec->size;
8258 loc = stub_entry->stub_sec->contents + stub_entry->stub_offset;
8259
8260 htab->stub_count[stub_entry->stub_type - 1] += 1;
8261 switch (stub_entry->stub_type)
8262 {
8263 case ppc_stub_long_branch:
8264 case ppc_stub_long_branch_r2off:
8265 /* Branches are relative. This is where we are going to. */
8266 off = dest = (stub_entry->target_value
8267 + stub_entry->target_section->output_offset
8268 + stub_entry->target_section->output_section->vma);
8269
8270 /* And this is where we are coming from. */
8271 off -= (stub_entry->stub_offset
8272 + stub_entry->stub_sec->output_offset
8273 + stub_entry->stub_sec->output_section->vma);
8274
8275 size = 4;
8276 if (stub_entry->stub_type == ppc_stub_long_branch_r2off)
8277 {
8278 bfd_vma r2off;
8279
8280 r2off = (htab->stub_group[stub_entry->target_section->id].toc_off
8281 - htab->stub_group[stub_entry->id_sec->id].toc_off);
8282 bfd_put_32 (htab->stub_bfd, STD_R2_40R1, loc);
8283 loc += 4;
8284 size = 12;
8285 if (PPC_HA (r2off) != 0)
8286 {
8287 size = 16;
8288 bfd_put_32 (htab->stub_bfd, ADDIS_R2_R2 | PPC_HA (r2off), loc);
8289 loc += 4;
8290 }
8291 bfd_put_32 (htab->stub_bfd, ADDI_R2_R2 | PPC_LO (r2off), loc);
8292 loc += 4;
8293 off -= size - 4;
8294 }
8295 bfd_put_32 (htab->stub_bfd, B_DOT | (off & 0x3fffffc), loc);
8296
8297 if (off + (1 << 25) >= (bfd_vma) (1 << 26))
8298 {
8299 (*_bfd_error_handler) (_("long branch stub `%s' offset overflow"),
8300 stub_entry->root.string);
8301 htab->stub_error = TRUE;
8302 return FALSE;
8303 }
8304
8305 if (info->emitrelocations)
8306 {
8307 Elf_Internal_Rela *relocs, *r;
8308 struct bfd_elf_section_data *elfsec_data;
8309
8310 elfsec_data = elf_section_data (stub_entry->stub_sec);
8311 relocs = elfsec_data->relocs;
8312 if (relocs == NULL)
8313 {
8314 bfd_size_type relsize;
8315 relsize = stub_entry->stub_sec->reloc_count * sizeof (*relocs);
8316 relocs = bfd_alloc (htab->stub_bfd, relsize);
8317 if (relocs == NULL)
8318 return FALSE;
8319 elfsec_data->relocs = relocs;
8320 elfsec_data->rel_hdr.sh_size = relsize;
8321 elfsec_data->rel_hdr.sh_entsize = 24;
8322 stub_entry->stub_sec->reloc_count = 0;
8323 }
8324 r = relocs + stub_entry->stub_sec->reloc_count;
8325 stub_entry->stub_sec->reloc_count += 1;
8326 r->r_offset = loc - stub_entry->stub_sec->contents;
8327 r->r_info = ELF64_R_INFO (0, R_PPC64_REL24);
8328 r->r_addend = dest;
8329 if (stub_entry->h != NULL)
8330 {
8331 struct elf_link_hash_entry **hashes;
8332 unsigned long symndx;
8333 struct ppc_link_hash_entry *h;
8334
8335 hashes = elf_sym_hashes (htab->stub_bfd);
8336 if (hashes == NULL)
8337 {
8338 bfd_size_type hsize;
8339
8340 hsize = (htab->stub_globals + 1) * sizeof (*hashes);
8341 hashes = bfd_zalloc (htab->stub_bfd, hsize);
8342 if (hashes == NULL)
8343 return FALSE;
8344 elf_sym_hashes (htab->stub_bfd) = hashes;
8345 htab->stub_globals = 1;
8346 }
8347 symndx = htab->stub_globals++;
8348 h = stub_entry->h;
8349 hashes[symndx] = &h->elf;
8350 r->r_info = ELF64_R_INFO (symndx, R_PPC64_REL24);
8351 if (h->oh != NULL && h->oh->is_func)
8352 h = h->oh;
8353 if (h->elf.root.u.def.section != stub_entry->target_section)
8354 /* H is an opd symbol. The addend must be zero. */
8355 r->r_addend = 0;
8356 else
8357 {
8358 off = (h->elf.root.u.def.value
8359 + h->elf.root.u.def.section->output_offset
8360 + h->elf.root.u.def.section->output_section->vma);
8361 r->r_addend -= off;
8362 }
8363 }
8364 }
8365 break;
8366
8367 case ppc_stub_plt_branch:
8368 case ppc_stub_plt_branch_r2off:
8369 br_entry = ppc_branch_hash_lookup (&htab->branch_hash_table,
8370 stub_entry->root.string + 9,
8371 FALSE, FALSE);
8372 if (br_entry == NULL)
8373 {
8374 (*_bfd_error_handler) (_("can't find branch stub `%s'"),
8375 stub_entry->root.string);
8376 htab->stub_error = TRUE;
8377 return FALSE;
8378 }
8379
8380 off = (stub_entry->target_value
8381 + stub_entry->target_section->output_offset
8382 + stub_entry->target_section->output_section->vma);
8383
8384 bfd_put_64 (htab->brlt->owner, off,
8385 htab->brlt->contents + br_entry->offset);
8386
8387 if (htab->relbrlt != NULL)
8388 {
8389 /* Create a reloc for the branch lookup table entry. */
8390 Elf_Internal_Rela rela;
8391 bfd_byte *rl;
8392
8393 rela.r_offset = (br_entry->offset
8394 + htab->brlt->output_offset
8395 + htab->brlt->output_section->vma);
8396 rela.r_info = ELF64_R_INFO (0, R_PPC64_RELATIVE);
8397 rela.r_addend = off;
8398
8399 rl = htab->relbrlt->contents;
8400 rl += htab->relbrlt->reloc_count++ * sizeof (Elf64_External_Rela);
8401 bfd_elf64_swap_reloca_out (htab->relbrlt->owner, &rela, rl);
8402 }
8403 else if (info->emitrelocations)
8404 {
8405 Elf_Internal_Rela *relocs, *r;
8406 struct bfd_elf_section_data *elfsec_data;
8407
8408 elfsec_data = elf_section_data (htab->brlt);
8409 relocs = elfsec_data->relocs;
8410 if (relocs == NULL)
8411 {
8412 bfd_size_type relsize;
8413 relsize = htab->brlt->reloc_count * sizeof (*relocs);
8414 relocs = bfd_alloc (htab->brlt->owner, relsize);
8415 if (relocs == NULL)
8416 return FALSE;
8417 elfsec_data->relocs = relocs;
8418 elfsec_data->rel_hdr.sh_size = relsize;
8419 elfsec_data->rel_hdr.sh_entsize = 24;
8420 htab->brlt->reloc_count = 0;
8421 }
8422 r = relocs + htab->brlt->reloc_count;
8423 htab->brlt->reloc_count += 1;
8424 r->r_offset = (br_entry->offset
8425 + htab->brlt->output_offset
8426 + htab->brlt->output_section->vma);
8427 r->r_info = ELF64_R_INFO (0, R_PPC64_RELATIVE);
8428 r->r_addend = off;
8429 }
8430
8431 off = (br_entry->offset
8432 + htab->brlt->output_offset
8433 + htab->brlt->output_section->vma
8434 - elf_gp (htab->brlt->output_section->owner)
8435 - htab->stub_group[stub_entry->id_sec->id].toc_off);
8436
8437 if (off + 0x80008000 > 0xffffffff || (off & 7) != 0)
8438 {
8439 (*_bfd_error_handler)
8440 (_("linkage table error against `%s'"),
8441 stub_entry->root.string);
8442 bfd_set_error (bfd_error_bad_value);
8443 htab->stub_error = TRUE;
8444 return FALSE;
8445 }
8446
8447 indx = off;
8448 if (stub_entry->stub_type != ppc_stub_plt_branch_r2off)
8449 {
8450 if (PPC_HA (indx) != 0)
8451 {
8452 size = 16;
8453 bfd_put_32 (htab->stub_bfd, ADDIS_R12_R2 | PPC_HA (indx), loc);
8454 loc += 4;
8455 bfd_put_32 (htab->stub_bfd, LD_R11_0R12 | PPC_LO (indx), loc);
8456 }
8457 else
8458 {
8459 size = 12;
8460 bfd_put_32 (htab->stub_bfd, LD_R11_0R2 | PPC_LO (indx), loc);
8461 }
8462 }
8463 else
8464 {
8465 bfd_vma r2off;
8466
8467 r2off = (htab->stub_group[stub_entry->target_section->id].toc_off
8468 - htab->stub_group[stub_entry->id_sec->id].toc_off);
8469 bfd_put_32 (htab->stub_bfd, STD_R2_40R1, loc);
8470 loc += 4;
8471 size = 20;
8472 if (PPC_HA (indx) != 0)
8473 {
8474 size += 4;
8475 bfd_put_32 (htab->stub_bfd, ADDIS_R12_R2 | PPC_HA (indx), loc);
8476 loc += 4;
8477 bfd_put_32 (htab->stub_bfd, LD_R11_0R12 | PPC_LO (indx), loc);
8478 loc += 4;
8479 }
8480 else
8481 {
8482 bfd_put_32 (htab->stub_bfd, LD_R11_0R2 | PPC_LO (indx), loc);
8483 loc += 4;
8484 }
8485
8486 if (PPC_HA (r2off) != 0)
8487 {
8488 size += 4;
8489 bfd_put_32 (htab->stub_bfd, ADDIS_R2_R2 | PPC_HA (r2off), loc);
8490 loc += 4;
8491 }
8492 bfd_put_32 (htab->stub_bfd, ADDI_R2_R2 | PPC_LO (r2off), loc);
8493 }
8494 loc += 4;
8495 bfd_put_32 (htab->stub_bfd, MTCTR_R11, loc);
8496 loc += 4;
8497 bfd_put_32 (htab->stub_bfd, BCTR, loc);
8498 break;
8499
8500 case ppc_stub_plt_call:
8501 /* Do the best we can for shared libraries built without
8502 exporting ".foo" for each "foo". This can happen when symbol
8503 versioning scripts strip all bar a subset of symbols. */
8504 if (stub_entry->h->oh != NULL
8505 && stub_entry->h->oh->elf.root.type != bfd_link_hash_defined
8506 && stub_entry->h->oh->elf.root.type != bfd_link_hash_defweak)
8507 {
8508 /* Point the symbol at the stub. There may be multiple stubs,
8509 we don't really care; The main thing is to make this sym
8510 defined somewhere. Maybe defining the symbol in the stub
8511 section is a silly idea. If we didn't do this, htab->top_id
8512 could disappear. */
8513 stub_entry->h->oh->elf.root.type = bfd_link_hash_defined;
8514 stub_entry->h->oh->elf.root.u.def.section = stub_entry->stub_sec;
8515 stub_entry->h->oh->elf.root.u.def.value = stub_entry->stub_offset;
8516 }
8517
8518 /* Now build the stub. */
8519 off = (bfd_vma) -1;
8520 for (ent = stub_entry->h->elf.plt.plist; ent != NULL; ent = ent->next)
8521 if (ent->addend == stub_entry->addend)
8522 {
8523 off = ent->plt.offset;
8524 break;
8525 }
8526 if (off >= (bfd_vma) -2)
8527 abort ();
8528
8529 off &= ~ (bfd_vma) 1;
8530 off += (htab->plt->output_offset
8531 + htab->plt->output_section->vma
8532 - elf_gp (htab->plt->output_section->owner)
8533 - htab->stub_group[stub_entry->id_sec->id].toc_off);
8534
8535 if (off + 0x80008000 > 0xffffffff || (off & 7) != 0)
8536 {
8537 (*_bfd_error_handler)
8538 (_("linkage table error against `%s'"),
8539 stub_entry->h->elf.root.root.string);
8540 bfd_set_error (bfd_error_bad_value);
8541 htab->stub_error = TRUE;
8542 return FALSE;
8543 }
8544
8545 p = build_plt_stub (htab->stub_bfd, loc, off);
8546 size = p - loc;
8547 break;
8548
8549 default:
8550 BFD_FAIL ();
8551 return FALSE;
8552 }
8553
8554 stub_entry->stub_sec->size += size;
8555
8556 if (htab->emit_stub_syms)
8557 {
8558 struct elf_link_hash_entry *h;
8559 size_t len1, len2;
8560 char *name;
8561 const char *const stub_str[] = { "long_branch",
8562 "long_branch_r2off",
8563 "plt_branch",
8564 "plt_branch_r2off",
8565 "plt_call" };
8566
8567 len1 = strlen (stub_str[stub_entry->stub_type - 1]);
8568 len2 = strlen (stub_entry->root.string);
8569 name = bfd_malloc (len1 + len2 + 2);
8570 if (name == NULL)
8571 return FALSE;
8572 memcpy (name, stub_entry->root.string, 9);
8573 memcpy (name + 9, stub_str[stub_entry->stub_type - 1], len1);
8574 memcpy (name + len1 + 9, stub_entry->root.string + 8, len2 - 8 + 1);
8575 h = elf_link_hash_lookup (&htab->elf, name, TRUE, FALSE, FALSE);
8576 if (h == NULL)
8577 return FALSE;
8578 if (h->root.type == bfd_link_hash_new)
8579 {
8580 h->root.type = bfd_link_hash_defined;
8581 h->root.u.def.section = stub_entry->stub_sec;
8582 h->root.u.def.value = stub_entry->stub_offset;
8583 h->ref_regular = 1;
8584 h->def_regular = 1;
8585 h->ref_regular_nonweak = 1;
8586 h->forced_local = 1;
8587 h->non_elf = 0;
8588 }
8589 }
8590
8591 return TRUE;
8592 }
8593
8594 /* As above, but don't actually build the stub. Just bump offset so
8595 we know stub section sizes, and select plt_branch stubs where
8596 long_branch stubs won't do. */
8597
8598 static bfd_boolean
8599 ppc_size_one_stub (struct bfd_hash_entry *gen_entry, void *in_arg)
8600 {
8601 struct ppc_stub_hash_entry *stub_entry;
8602 struct bfd_link_info *info;
8603 struct ppc_link_hash_table *htab;
8604 bfd_vma off;
8605 int size;
8606
8607 /* Massage our args to the form they really have. */
8608 stub_entry = (struct ppc_stub_hash_entry *) gen_entry;
8609 info = in_arg;
8610
8611 htab = ppc_hash_table (info);
8612
8613 if (stub_entry->stub_type == ppc_stub_plt_call)
8614 {
8615 struct plt_entry *ent;
8616 off = (bfd_vma) -1;
8617 for (ent = stub_entry->h->elf.plt.plist; ent != NULL; ent = ent->next)
8618 if (ent->addend == stub_entry->addend)
8619 {
8620 off = ent->plt.offset & ~(bfd_vma) 1;
8621 break;
8622 }
8623 if (off >= (bfd_vma) -2)
8624 abort ();
8625 off += (htab->plt->output_offset
8626 + htab->plt->output_section->vma
8627 - elf_gp (htab->plt->output_section->owner)
8628 - htab->stub_group[stub_entry->id_sec->id].toc_off);
8629
8630 size = PLT_CALL_STUB_SIZE;
8631 if (PPC_HA (off) == 0)
8632 size -= 4;
8633 if (PPC_HA (off + 16) != PPC_HA (off))
8634 size += 4;
8635 }
8636 else
8637 {
8638 /* ppc_stub_long_branch or ppc_stub_plt_branch, or their r2off
8639 variants. */
8640 bfd_vma r2off = 0;
8641
8642 off = (stub_entry->target_value
8643 + stub_entry->target_section->output_offset
8644 + stub_entry->target_section->output_section->vma);
8645 off -= (stub_entry->stub_sec->size
8646 + stub_entry->stub_sec->output_offset
8647 + stub_entry->stub_sec->output_section->vma);
8648
8649 /* Reset the stub type from the plt variant in case we now
8650 can reach with a shorter stub. */
8651 if (stub_entry->stub_type >= ppc_stub_plt_branch)
8652 stub_entry->stub_type += ppc_stub_long_branch - ppc_stub_plt_branch;
8653
8654 size = 4;
8655 if (stub_entry->stub_type == ppc_stub_long_branch_r2off)
8656 {
8657 r2off = (htab->stub_group[stub_entry->target_section->id].toc_off
8658 - htab->stub_group[stub_entry->id_sec->id].toc_off);
8659 size = 12;
8660 if (PPC_HA (r2off) != 0)
8661 size = 16;
8662 off -= size - 4;
8663 }
8664
8665 /* If the branch offset if too big, use a ppc_stub_plt_branch. */
8666 if (off + (1 << 25) >= (bfd_vma) (1 << 26))
8667 {
8668 struct ppc_branch_hash_entry *br_entry;
8669 unsigned int indx;
8670
8671 br_entry = ppc_branch_hash_lookup (&htab->branch_hash_table,
8672 stub_entry->root.string + 9,
8673 TRUE, FALSE);
8674 if (br_entry == NULL)
8675 {
8676 (*_bfd_error_handler) (_("can't build branch stub `%s'"),
8677 stub_entry->root.string);
8678 htab->stub_error = TRUE;
8679 return FALSE;
8680 }
8681
8682 if (br_entry->iter != htab->stub_iteration)
8683 {
8684 br_entry->iter = htab->stub_iteration;
8685 br_entry->offset = htab->brlt->size;
8686 htab->brlt->size += 8;
8687
8688 if (htab->relbrlt != NULL)
8689 htab->relbrlt->size += sizeof (Elf64_External_Rela);
8690 else if (info->emitrelocations)
8691 {
8692 htab->brlt->reloc_count += 1;
8693 htab->brlt->flags |= SEC_RELOC;
8694 }
8695 }
8696
8697 stub_entry->stub_type += ppc_stub_plt_branch - ppc_stub_long_branch;
8698 off = (br_entry->offset
8699 + htab->brlt->output_offset
8700 + htab->brlt->output_section->vma
8701 - elf_gp (htab->brlt->output_section->owner)
8702 - htab->stub_group[stub_entry->id_sec->id].toc_off);
8703
8704 indx = off;
8705 if (stub_entry->stub_type != ppc_stub_plt_branch_r2off)
8706 {
8707 size = 12;
8708 if (PPC_HA (indx) != 0)
8709 size = 16;
8710 }
8711 else
8712 {
8713 size = 20;
8714 if (PPC_HA (indx) != 0)
8715 size += 4;
8716
8717 if (PPC_HA (r2off) != 0)
8718 size += 4;
8719 }
8720 }
8721 else if (info->emitrelocations)
8722 {
8723 stub_entry->stub_sec->reloc_count += 1;
8724 stub_entry->stub_sec->flags |= SEC_RELOC;
8725 }
8726 }
8727
8728 stub_entry->stub_sec->size += size;
8729 return TRUE;
8730 }
8731
8732 /* Set up various things so that we can make a list of input sections
8733 for each output section included in the link. Returns -1 on error,
8734 0 when no stubs will be needed, and 1 on success. */
8735
8736 int
8737 ppc64_elf_setup_section_lists (bfd *output_bfd,
8738 struct bfd_link_info *info,
8739 int no_multi_toc)
8740 {
8741 bfd *input_bfd;
8742 int top_id, top_index, id;
8743 asection *section;
8744 asection **input_list;
8745 bfd_size_type amt;
8746 struct ppc_link_hash_table *htab = ppc_hash_table (info);
8747
8748 htab->no_multi_toc = no_multi_toc;
8749
8750 if (htab->brlt == NULL)
8751 return 0;
8752
8753 /* Find the top input section id. */
8754 for (input_bfd = info->input_bfds, top_id = 3;
8755 input_bfd != NULL;
8756 input_bfd = input_bfd->link_next)
8757 {
8758 for (section = input_bfd->sections;
8759 section != NULL;
8760 section = section->next)
8761 {
8762 if (top_id < section->id)
8763 top_id = section->id;
8764 }
8765 }
8766
8767 htab->top_id = top_id;
8768 amt = sizeof (struct map_stub) * (top_id + 1);
8769 htab->stub_group = bfd_zmalloc (amt);
8770 if (htab->stub_group == NULL)
8771 return -1;
8772
8773 /* Set toc_off for com, und, abs and ind sections. */
8774 for (id = 0; id < 3; id++)
8775 htab->stub_group[id].toc_off = TOC_BASE_OFF;
8776
8777 elf_gp (output_bfd) = htab->toc_curr = ppc64_elf_toc (output_bfd);
8778
8779 /* We can't use output_bfd->section_count here to find the top output
8780 section index as some sections may have been removed, and
8781 strip_excluded_output_sections doesn't renumber the indices. */
8782 for (section = output_bfd->sections, top_index = 0;
8783 section != NULL;
8784 section = section->next)
8785 {
8786 if (top_index < section->index)
8787 top_index = section->index;
8788 }
8789
8790 htab->top_index = top_index;
8791 amt = sizeof (asection *) * (top_index + 1);
8792 input_list = bfd_zmalloc (amt);
8793 htab->input_list = input_list;
8794 if (input_list == NULL)
8795 return -1;
8796
8797 return 1;
8798 }
8799
8800 /* The linker repeatedly calls this function for each TOC input section
8801 and linker generated GOT section. Group input bfds such that the toc
8802 within a group is less than 64k in size. Will break with cute linker
8803 scripts that play games with dot in the output toc section. */
8804
8805 void
8806 ppc64_elf_next_toc_section (struct bfd_link_info *info, asection *isec)
8807 {
8808 struct ppc_link_hash_table *htab = ppc_hash_table (info);
8809
8810 if (!htab->no_multi_toc)
8811 {
8812 bfd_vma addr = isec->output_offset + isec->output_section->vma;
8813 bfd_vma off = addr - htab->toc_curr;
8814
8815 if (off + isec->size > 0x10000)
8816 htab->toc_curr = addr;
8817
8818 elf_gp (isec->owner) = (htab->toc_curr
8819 - elf_gp (isec->output_section->owner)
8820 + TOC_BASE_OFF);
8821 }
8822 }
8823
8824 /* Called after the last call to the above function. */
8825
8826 void
8827 ppc64_elf_reinit_toc (bfd *output_bfd, struct bfd_link_info *info)
8828 {
8829 struct ppc_link_hash_table *htab = ppc_hash_table (info);
8830
8831 htab->multi_toc_needed = htab->toc_curr != elf_gp (output_bfd);
8832
8833 /* toc_curr tracks the TOC offset used for code sections below in
8834 ppc64_elf_next_input_section. Start off at 0x8000. */
8835 htab->toc_curr = TOC_BASE_OFF;
8836 }
8837
8838 /* No toc references were found in ISEC. If the code in ISEC makes no
8839 calls, then there's no need to use toc adjusting stubs when branching
8840 into ISEC. Actually, indirect calls from ISEC are OK as they will
8841 load r2. Returns -1 on error, 0 for no stub needed, 1 for stub
8842 needed, and 2 if a cyclical call-graph was found but no other reason
8843 for a stub was detected. If called from the top level, a return of
8844 2 means the same as a return of 0. */
8845
8846 static int
8847 toc_adjusting_stub_needed (struct bfd_link_info *info, asection *isec)
8848 {
8849 Elf_Internal_Rela *relstart, *rel;
8850 Elf_Internal_Sym *local_syms;
8851 int ret;
8852 struct ppc_link_hash_table *htab;
8853
8854 /* We know none of our code bearing sections will need toc stubs. */
8855 if ((isec->flags & SEC_LINKER_CREATED) != 0)
8856 return 0;
8857
8858 if (isec->size == 0)
8859 return 0;
8860
8861 if (isec->output_section == NULL)
8862 return 0;
8863
8864 /* Hack for linux kernel. .fixup contains branches, but only back to
8865 the function that hit an exception. */
8866 if (strcmp (isec->name, ".fixup") == 0)
8867 return 0;
8868
8869 if (isec->reloc_count == 0)
8870 return 0;
8871
8872 relstart = _bfd_elf_link_read_relocs (isec->owner, isec, NULL, NULL,
8873 info->keep_memory);
8874 if (relstart == NULL)
8875 return -1;
8876
8877 /* Look for branches to outside of this section. */
8878 local_syms = NULL;
8879 ret = 0;
8880 htab = ppc_hash_table (info);
8881 for (rel = relstart; rel < relstart + isec->reloc_count; ++rel)
8882 {
8883 enum elf_ppc64_reloc_type r_type;
8884 unsigned long r_symndx;
8885 struct elf_link_hash_entry *h;
8886 Elf_Internal_Sym *sym;
8887 asection *sym_sec;
8888 long *opd_adjust;
8889 bfd_vma sym_value;
8890 bfd_vma dest;
8891
8892 r_type = ELF64_R_TYPE (rel->r_info);
8893 if (r_type != R_PPC64_REL24
8894 && r_type != R_PPC64_REL14
8895 && r_type != R_PPC64_REL14_BRTAKEN
8896 && r_type != R_PPC64_REL14_BRNTAKEN)
8897 continue;
8898
8899 r_symndx = ELF64_R_SYM (rel->r_info);
8900 if (!get_sym_h (&h, &sym, &sym_sec, NULL, &local_syms, r_symndx,
8901 isec->owner))
8902 {
8903 ret = -1;
8904 break;
8905 }
8906
8907 /* Calls to dynamic lib functions go through a plt call stub
8908 that uses r2. Branches to undefined symbols might be a call
8909 using old-style dot symbols that can be satisfied by a plt
8910 call into a new-style dynamic library. */
8911 if (sym_sec == NULL)
8912 {
8913 struct ppc_link_hash_entry *eh = (struct ppc_link_hash_entry *) h;
8914 if (eh != NULL
8915 && eh->oh != NULL
8916 && eh->oh->elf.plt.plist != NULL)
8917 {
8918 ret = 1;
8919 break;
8920 }
8921
8922 /* Ignore other undefined symbols. */
8923 continue;
8924 }
8925
8926 /* Assume branches to other sections not included in the link need
8927 stubs too, to cover -R and absolute syms. */
8928 if (sym_sec->output_section == NULL)
8929 {
8930 ret = 1;
8931 break;
8932 }
8933
8934 if (h == NULL)
8935 sym_value = sym->st_value;
8936 else
8937 {
8938 if (h->root.type != bfd_link_hash_defined
8939 && h->root.type != bfd_link_hash_defweak)
8940 abort ();
8941 sym_value = h->root.u.def.value;
8942 }
8943 sym_value += rel->r_addend;
8944
8945 /* If this branch reloc uses an opd sym, find the code section. */
8946 opd_adjust = get_opd_info (sym_sec);
8947 if (opd_adjust != NULL)
8948 {
8949 if (h == NULL)
8950 {
8951 long adjust;
8952
8953 adjust = opd_adjust[sym->st_value / 8];
8954 if (adjust == -1)
8955 /* Assume deleted functions won't ever be called. */
8956 continue;
8957 sym_value += adjust;
8958 }
8959
8960 dest = opd_entry_value (sym_sec, sym_value, &sym_sec, NULL);
8961 if (dest == (bfd_vma) -1)
8962 continue;
8963 }
8964 else
8965 dest = (sym_value
8966 + sym_sec->output_offset
8967 + sym_sec->output_section->vma);
8968
8969 /* Ignore branch to self. */
8970 if (sym_sec == isec)
8971 continue;
8972
8973 /* If the called function uses the toc, we need a stub. */
8974 if (sym_sec->has_toc_reloc
8975 || sym_sec->makes_toc_func_call)
8976 {
8977 ret = 1;
8978 break;
8979 }
8980
8981 /* Assume any branch that needs a long branch stub might in fact
8982 need a plt_branch stub. A plt_branch stub uses r2. */
8983 else if (dest - (isec->output_offset
8984 + isec->output_section->vma
8985 + rel->r_offset) + (1 << 25) >= (2 << 25))
8986 {
8987 ret = 1;
8988 break;
8989 }
8990
8991 /* If calling back to a section in the process of being tested, we
8992 can't say for sure that no toc adjusting stubs are needed, so
8993 don't return zero. */
8994 else if (sym_sec->call_check_in_progress)
8995 ret = 2;
8996
8997 /* Branches to another section that itself doesn't have any TOC
8998 references are OK. Recursively call ourselves to check. */
8999 else if (sym_sec->id <= htab->top_id
9000 && htab->stub_group[sym_sec->id].toc_off == 0)
9001 {
9002 int recur;
9003
9004 /* Mark current section as indeterminate, so that other
9005 sections that call back to current won't be marked as
9006 known. */
9007 isec->call_check_in_progress = 1;
9008 recur = toc_adjusting_stub_needed (info, sym_sec);
9009 isec->call_check_in_progress = 0;
9010
9011 if (recur < 0)
9012 {
9013 /* An error. Exit. */
9014 ret = -1;
9015 break;
9016 }
9017 else if (recur <= 1)
9018 {
9019 /* Known result. Mark as checked and set section flag. */
9020 htab->stub_group[sym_sec->id].toc_off = 1;
9021 if (recur != 0)
9022 {
9023 sym_sec->makes_toc_func_call = 1;
9024 ret = 1;
9025 break;
9026 }
9027 }
9028 else
9029 {
9030 /* Unknown result. Continue checking. */
9031 ret = 2;
9032 }
9033 }
9034 }
9035
9036 if (local_syms != NULL
9037 && (elf_tdata (isec->owner)->symtab_hdr.contents
9038 != (unsigned char *) local_syms))
9039 free (local_syms);
9040 if (elf_section_data (isec)->relocs != relstart)
9041 free (relstart);
9042
9043 return ret;
9044 }
9045
9046 /* The linker repeatedly calls this function for each input section,
9047 in the order that input sections are linked into output sections.
9048 Build lists of input sections to determine groupings between which
9049 we may insert linker stubs. */
9050
9051 bfd_boolean
9052 ppc64_elf_next_input_section (struct bfd_link_info *info, asection *isec)
9053 {
9054 struct ppc_link_hash_table *htab = ppc_hash_table (info);
9055
9056 if ((isec->output_section->flags & SEC_CODE) != 0
9057 && isec->output_section->index <= htab->top_index)
9058 {
9059 asection **list = htab->input_list + isec->output_section->index;
9060 /* Steal the link_sec pointer for our list. */
9061 #define PREV_SEC(sec) (htab->stub_group[(sec)->id].link_sec)
9062 /* This happens to make the list in reverse order,
9063 which is what we want. */
9064 PREV_SEC (isec) = *list;
9065 *list = isec;
9066 }
9067
9068 if (htab->multi_toc_needed)
9069 {
9070 /* If a code section has a function that uses the TOC then we need
9071 to use the right TOC (obviously). Also, make sure that .opd gets
9072 the correct TOC value for R_PPC64_TOC relocs that don't have or
9073 can't find their function symbol (shouldn't ever happen now). */
9074 if (isec->has_toc_reloc || (isec->flags & SEC_CODE) == 0)
9075 {
9076 if (elf_gp (isec->owner) != 0)
9077 htab->toc_curr = elf_gp (isec->owner);
9078 }
9079 else if (htab->stub_group[isec->id].toc_off == 0)
9080 {
9081 int ret = toc_adjusting_stub_needed (info, isec);
9082 if (ret < 0)
9083 return FALSE;
9084 else
9085 isec->makes_toc_func_call = ret & 1;
9086 }
9087 }
9088
9089 /* Functions that don't use the TOC can belong in any TOC group.
9090 Use the last TOC base. This happens to make _init and _fini
9091 pasting work. */
9092 htab->stub_group[isec->id].toc_off = htab->toc_curr;
9093 return TRUE;
9094 }
9095
9096 /* See whether we can group stub sections together. Grouping stub
9097 sections may result in fewer stubs. More importantly, we need to
9098 put all .init* and .fini* stubs at the beginning of the .init or
9099 .fini output sections respectively, because glibc splits the
9100 _init and _fini functions into multiple parts. Putting a stub in
9101 the middle of a function is not a good idea. */
9102
9103 static void
9104 group_sections (struct ppc_link_hash_table *htab,
9105 bfd_size_type stub_group_size,
9106 bfd_boolean stubs_always_before_branch)
9107 {
9108 asection **list;
9109 bfd_size_type stub14_group_size;
9110 bfd_boolean suppress_size_errors;
9111
9112 suppress_size_errors = FALSE;
9113 stub14_group_size = stub_group_size;
9114 if (stub_group_size == 1)
9115 {
9116 /* Default values. */
9117 if (stubs_always_before_branch)
9118 {
9119 stub_group_size = 0x1e00000;
9120 stub14_group_size = 0x7800;
9121 }
9122 else
9123 {
9124 stub_group_size = 0x1c00000;
9125 stub14_group_size = 0x7000;
9126 }
9127 suppress_size_errors = TRUE;
9128 }
9129
9130 list = htab->input_list + htab->top_index;
9131 do
9132 {
9133 asection *tail = *list;
9134 while (tail != NULL)
9135 {
9136 asection *curr;
9137 asection *prev;
9138 bfd_size_type total;
9139 bfd_boolean big_sec;
9140 bfd_vma curr_toc;
9141
9142 curr = tail;
9143 total = tail->size;
9144 big_sec = total > (ppc64_elf_section_data (tail)->has_14bit_branch
9145 ? stub14_group_size : stub_group_size);
9146 if (big_sec && !suppress_size_errors)
9147 (*_bfd_error_handler) (_("%B section %A exceeds stub group size"),
9148 tail->owner, tail);
9149 curr_toc = htab->stub_group[tail->id].toc_off;
9150
9151 while ((prev = PREV_SEC (curr)) != NULL
9152 && ((total += curr->output_offset - prev->output_offset)
9153 < (ppc64_elf_section_data (prev)->has_14bit_branch
9154 ? stub14_group_size : stub_group_size))
9155 && htab->stub_group[prev->id].toc_off == curr_toc)
9156 curr = prev;
9157
9158 /* OK, the size from the start of CURR to the end is less
9159 than stub_group_size and thus can be handled by one stub
9160 section. (or the tail section is itself larger than
9161 stub_group_size, in which case we may be toast.) We
9162 should really be keeping track of the total size of stubs
9163 added here, as stubs contribute to the final output
9164 section size. That's a little tricky, and this way will
9165 only break if stubs added make the total size more than
9166 2^25, ie. for the default stub_group_size, if stubs total
9167 more than 2097152 bytes, or nearly 75000 plt call stubs. */
9168 do
9169 {
9170 prev = PREV_SEC (tail);
9171 /* Set up this stub group. */
9172 htab->stub_group[tail->id].link_sec = curr;
9173 }
9174 while (tail != curr && (tail = prev) != NULL);
9175
9176 /* But wait, there's more! Input sections up to stub_group_size
9177 bytes before the stub section can be handled by it too.
9178 Don't do this if we have a really large section after the
9179 stubs, as adding more stubs increases the chance that
9180 branches may not reach into the stub section. */
9181 if (!stubs_always_before_branch && !big_sec)
9182 {
9183 total = 0;
9184 while (prev != NULL
9185 && ((total += tail->output_offset - prev->output_offset)
9186 < (ppc64_elf_section_data (prev)->has_14bit_branch
9187 ? stub14_group_size : stub_group_size))
9188 && htab->stub_group[prev->id].toc_off == curr_toc)
9189 {
9190 tail = prev;
9191 prev = PREV_SEC (tail);
9192 htab->stub_group[tail->id].link_sec = curr;
9193 }
9194 }
9195 tail = prev;
9196 }
9197 }
9198 while (list-- != htab->input_list);
9199 free (htab->input_list);
9200 #undef PREV_SEC
9201 }
9202
9203 /* Determine and set the size of the stub section for a final link.
9204
9205 The basic idea here is to examine all the relocations looking for
9206 PC-relative calls to a target that is unreachable with a "bl"
9207 instruction. */
9208
9209 bfd_boolean
9210 ppc64_elf_size_stubs (bfd *output_bfd,
9211 struct bfd_link_info *info,
9212 bfd_signed_vma group_size,
9213 asection *(*add_stub_section) (const char *, asection *),
9214 void (*layout_sections_again) (void))
9215 {
9216 bfd_size_type stub_group_size;
9217 bfd_boolean stubs_always_before_branch;
9218 struct ppc_link_hash_table *htab = ppc_hash_table (info);
9219
9220 /* Stash our params away. */
9221 htab->add_stub_section = add_stub_section;
9222 htab->layout_sections_again = layout_sections_again;
9223 stubs_always_before_branch = group_size < 0;
9224 if (group_size < 0)
9225 stub_group_size = -group_size;
9226 else
9227 stub_group_size = group_size;
9228
9229 group_sections (htab, stub_group_size, stubs_always_before_branch);
9230
9231 while (1)
9232 {
9233 bfd *input_bfd;
9234 unsigned int bfd_indx;
9235 asection *stub_sec;
9236
9237 htab->stub_iteration += 1;
9238
9239 for (input_bfd = info->input_bfds, bfd_indx = 0;
9240 input_bfd != NULL;
9241 input_bfd = input_bfd->link_next, bfd_indx++)
9242 {
9243 Elf_Internal_Shdr *symtab_hdr;
9244 asection *section;
9245 Elf_Internal_Sym *local_syms = NULL;
9246
9247 if (!is_ppc64_elf_target (input_bfd->xvec))
9248 continue;
9249
9250 /* We'll need the symbol table in a second. */
9251 symtab_hdr = &elf_tdata (input_bfd)->symtab_hdr;
9252 if (symtab_hdr->sh_info == 0)
9253 continue;
9254
9255 /* Walk over each section attached to the input bfd. */
9256 for (section = input_bfd->sections;
9257 section != NULL;
9258 section = section->next)
9259 {
9260 Elf_Internal_Rela *internal_relocs, *irelaend, *irela;
9261
9262 /* If there aren't any relocs, then there's nothing more
9263 to do. */
9264 if ((section->flags & SEC_RELOC) == 0
9265 || (section->flags & SEC_ALLOC) == 0
9266 || (section->flags & SEC_LOAD) == 0
9267 || (section->flags & SEC_CODE) == 0
9268 || section->reloc_count == 0)
9269 continue;
9270
9271 /* If this section is a link-once section that will be
9272 discarded, then don't create any stubs. */
9273 if (section->output_section == NULL
9274 || section->output_section->owner != output_bfd)
9275 continue;
9276
9277 /* Get the relocs. */
9278 internal_relocs
9279 = _bfd_elf_link_read_relocs (input_bfd, section, NULL, NULL,
9280 info->keep_memory);
9281 if (internal_relocs == NULL)
9282 goto error_ret_free_local;
9283
9284 /* Now examine each relocation. */
9285 irela = internal_relocs;
9286 irelaend = irela + section->reloc_count;
9287 for (; irela < irelaend; irela++)
9288 {
9289 enum elf_ppc64_reloc_type r_type;
9290 unsigned int r_indx;
9291 enum ppc_stub_type stub_type;
9292 struct ppc_stub_hash_entry *stub_entry;
9293 asection *sym_sec, *code_sec;
9294 bfd_vma sym_value;
9295 bfd_vma destination;
9296 bfd_boolean ok_dest;
9297 struct ppc_link_hash_entry *hash;
9298 struct ppc_link_hash_entry *fdh;
9299 struct elf_link_hash_entry *h;
9300 Elf_Internal_Sym *sym;
9301 char *stub_name;
9302 const asection *id_sec;
9303 long *opd_adjust;
9304
9305 r_type = ELF64_R_TYPE (irela->r_info);
9306 r_indx = ELF64_R_SYM (irela->r_info);
9307
9308 if (r_type >= R_PPC64_max)
9309 {
9310 bfd_set_error (bfd_error_bad_value);
9311 goto error_ret_free_internal;
9312 }
9313
9314 /* Only look for stubs on branch instructions. */
9315 if (r_type != R_PPC64_REL24
9316 && r_type != R_PPC64_REL14
9317 && r_type != R_PPC64_REL14_BRTAKEN
9318 && r_type != R_PPC64_REL14_BRNTAKEN)
9319 continue;
9320
9321 /* Now determine the call target, its name, value,
9322 section. */
9323 if (!get_sym_h (&h, &sym, &sym_sec, NULL, &local_syms,
9324 r_indx, input_bfd))
9325 goto error_ret_free_internal;
9326 hash = (struct ppc_link_hash_entry *) h;
9327
9328 ok_dest = FALSE;
9329 fdh = NULL;
9330 sym_value = 0;
9331 if (hash == NULL)
9332 {
9333 sym_value = sym->st_value;
9334 ok_dest = TRUE;
9335 }
9336 else if (hash->elf.root.type == bfd_link_hash_defined
9337 || hash->elf.root.type == bfd_link_hash_defweak)
9338 {
9339 sym_value = hash->elf.root.u.def.value;
9340 if (sym_sec->output_section != NULL)
9341 ok_dest = TRUE;
9342 }
9343 else if (hash->elf.root.type == bfd_link_hash_undefweak
9344 || hash->elf.root.type == bfd_link_hash_undefined)
9345 {
9346 /* Recognise an old ABI func code entry sym, and
9347 use the func descriptor sym instead if it is
9348 defined. */
9349 if (hash->elf.root.root.string[0] == '.'
9350 && (fdh = get_fdh (hash, htab)) != NULL)
9351 {
9352 if (fdh->elf.root.type == bfd_link_hash_defined
9353 || fdh->elf.root.type == bfd_link_hash_defweak)
9354 {
9355 sym_sec = fdh->elf.root.u.def.section;
9356 sym_value = fdh->elf.root.u.def.value;
9357 if (sym_sec->output_section != NULL)
9358 ok_dest = TRUE;
9359 }
9360 else
9361 fdh = NULL;
9362 }
9363 }
9364 else
9365 {
9366 bfd_set_error (bfd_error_bad_value);
9367 goto error_ret_free_internal;
9368 }
9369
9370 destination = 0;
9371 if (ok_dest)
9372 {
9373 sym_value += irela->r_addend;
9374 destination = (sym_value
9375 + sym_sec->output_offset
9376 + sym_sec->output_section->vma);
9377 }
9378
9379 code_sec = sym_sec;
9380 opd_adjust = get_opd_info (sym_sec);
9381 if (opd_adjust != NULL)
9382 {
9383 bfd_vma dest;
9384
9385 if (hash == NULL)
9386 {
9387 long adjust = opd_adjust[sym_value / 8];
9388 if (adjust == -1)
9389 continue;
9390 sym_value += adjust;
9391 }
9392 dest = opd_entry_value (sym_sec, sym_value,
9393 &code_sec, &sym_value);
9394 if (dest != (bfd_vma) -1)
9395 {
9396 destination = dest;
9397 if (fdh != NULL)
9398 {
9399 /* Fixup old ABI sym to point at code
9400 entry. */
9401 hash->elf.root.type = bfd_link_hash_defweak;
9402 hash->elf.root.u.def.section = code_sec;
9403 hash->elf.root.u.def.value = sym_value;
9404 }
9405 }
9406 }
9407
9408 /* Determine what (if any) linker stub is needed. */
9409 stub_type = ppc_type_of_stub (section, irela, &hash,
9410 destination);
9411
9412 if (stub_type != ppc_stub_plt_call)
9413 {
9414 /* Check whether we need a TOC adjusting stub.
9415 Since the linker pastes together pieces from
9416 different object files when creating the
9417 _init and _fini functions, it may be that a
9418 call to what looks like a local sym is in
9419 fact a call needing a TOC adjustment. */
9420 if (code_sec != NULL
9421 && code_sec->output_section != NULL
9422 && (htab->stub_group[code_sec->id].toc_off
9423 != htab->stub_group[section->id].toc_off)
9424 && (code_sec->has_toc_reloc
9425 || code_sec->makes_toc_func_call))
9426 stub_type = ppc_stub_long_branch_r2off;
9427 }
9428
9429 if (stub_type == ppc_stub_none)
9430 continue;
9431
9432 /* __tls_get_addr calls might be eliminated. */
9433 if (stub_type != ppc_stub_plt_call
9434 && hash != NULL
9435 && (hash == htab->tls_get_addr
9436 || hash == htab->tls_get_addr_fd)
9437 && section->has_tls_reloc
9438 && irela != internal_relocs)
9439 {
9440 /* Get tls info. */
9441 char *tls_mask;
9442
9443 if (!get_tls_mask (&tls_mask, NULL, &local_syms,
9444 irela - 1, input_bfd))
9445 goto error_ret_free_internal;
9446 if (*tls_mask != 0)
9447 continue;
9448 }
9449
9450 /* Support for grouping stub sections. */
9451 id_sec = htab->stub_group[section->id].link_sec;
9452
9453 /* Get the name of this stub. */
9454 stub_name = ppc_stub_name (id_sec, sym_sec, hash, irela);
9455 if (!stub_name)
9456 goto error_ret_free_internal;
9457
9458 stub_entry = ppc_stub_hash_lookup (&htab->stub_hash_table,
9459 stub_name, FALSE, FALSE);
9460 if (stub_entry != NULL)
9461 {
9462 /* The proper stub has already been created. */
9463 free (stub_name);
9464 continue;
9465 }
9466
9467 stub_entry = ppc_add_stub (stub_name, section, htab);
9468 if (stub_entry == NULL)
9469 {
9470 free (stub_name);
9471 error_ret_free_internal:
9472 if (elf_section_data (section)->relocs == NULL)
9473 free (internal_relocs);
9474 error_ret_free_local:
9475 if (local_syms != NULL
9476 && (symtab_hdr->contents
9477 != (unsigned char *) local_syms))
9478 free (local_syms);
9479 return FALSE;
9480 }
9481
9482 stub_entry->stub_type = stub_type;
9483 stub_entry->target_value = sym_value;
9484 stub_entry->target_section = code_sec;
9485 stub_entry->h = hash;
9486 stub_entry->addend = irela->r_addend;
9487
9488 if (stub_entry->h != NULL)
9489 htab->stub_globals += 1;
9490 }
9491
9492 /* We're done with the internal relocs, free them. */
9493 if (elf_section_data (section)->relocs != internal_relocs)
9494 free (internal_relocs);
9495 }
9496
9497 if (local_syms != NULL
9498 && symtab_hdr->contents != (unsigned char *) local_syms)
9499 {
9500 if (!info->keep_memory)
9501 free (local_syms);
9502 else
9503 symtab_hdr->contents = (unsigned char *) local_syms;
9504 }
9505 }
9506
9507 /* We may have added some stubs. Find out the new size of the
9508 stub sections. */
9509 for (stub_sec = htab->stub_bfd->sections;
9510 stub_sec != NULL;
9511 stub_sec = stub_sec->next)
9512 if ((stub_sec->flags & SEC_LINKER_CREATED) == 0)
9513 {
9514 stub_sec->rawsize = stub_sec->size;
9515 stub_sec->size = 0;
9516 stub_sec->reloc_count = 0;
9517 stub_sec->flags &= ~SEC_RELOC;
9518 }
9519
9520 htab->brlt->size = 0;
9521 htab->brlt->reloc_count = 0;
9522 htab->brlt->flags &= ~SEC_RELOC;
9523 if (htab->relbrlt != NULL)
9524 htab->relbrlt->size = 0;
9525
9526 bfd_hash_traverse (&htab->stub_hash_table, ppc_size_one_stub, info);
9527
9528 for (stub_sec = htab->stub_bfd->sections;
9529 stub_sec != NULL;
9530 stub_sec = stub_sec->next)
9531 if ((stub_sec->flags & SEC_LINKER_CREATED) == 0
9532 && stub_sec->rawsize != stub_sec->size)
9533 break;
9534
9535 /* Exit from this loop when no stubs have been added, and no stubs
9536 have changed size. */
9537 if (stub_sec == NULL)
9538 break;
9539
9540 /* Ask the linker to do its stuff. */
9541 (*htab->layout_sections_again) ();
9542 }
9543
9544 /* It would be nice to strip htab->brlt from the output if the
9545 section is empty, but it's too late. If we strip sections here,
9546 the dynamic symbol table is corrupted since the section symbol
9547 for the stripped section isn't written. */
9548
9549 return TRUE;
9550 }
9551
9552 /* Called after we have determined section placement. If sections
9553 move, we'll be called again. Provide a value for TOCstart. */
9554
9555 bfd_vma
9556 ppc64_elf_toc (bfd *obfd)
9557 {
9558 asection *s;
9559 bfd_vma TOCstart;
9560
9561 /* The TOC consists of sections .got, .toc, .tocbss, .plt in that
9562 order. The TOC starts where the first of these sections starts. */
9563 s = bfd_get_section_by_name (obfd, ".got");
9564 if (s == NULL)
9565 s = bfd_get_section_by_name (obfd, ".toc");
9566 if (s == NULL)
9567 s = bfd_get_section_by_name (obfd, ".tocbss");
9568 if (s == NULL)
9569 s = bfd_get_section_by_name (obfd, ".plt");
9570 if (s == NULL)
9571 {
9572 /* This may happen for
9573 o references to TOC base (SYM@toc / TOC[tc0]) without a
9574 .toc directive
9575 o bad linker script
9576 o --gc-sections and empty TOC sections
9577
9578 FIXME: Warn user? */
9579
9580 /* Look for a likely section. We probably won't even be
9581 using TOCstart. */
9582 for (s = obfd->sections; s != NULL; s = s->next)
9583 if ((s->flags & (SEC_ALLOC | SEC_SMALL_DATA | SEC_READONLY))
9584 == (SEC_ALLOC | SEC_SMALL_DATA))
9585 break;
9586 if (s == NULL)
9587 for (s = obfd->sections; s != NULL; s = s->next)
9588 if ((s->flags & (SEC_ALLOC | SEC_SMALL_DATA))
9589 == (SEC_ALLOC | SEC_SMALL_DATA))
9590 break;
9591 if (s == NULL)
9592 for (s = obfd->sections; s != NULL; s = s->next)
9593 if ((s->flags & (SEC_ALLOC | SEC_READONLY)) == SEC_ALLOC)
9594 break;
9595 if (s == NULL)
9596 for (s = obfd->sections; s != NULL; s = s->next)
9597 if ((s->flags & SEC_ALLOC) == SEC_ALLOC)
9598 break;
9599 }
9600
9601 TOCstart = 0;
9602 if (s != NULL)
9603 TOCstart = s->output_section->vma + s->output_offset;
9604
9605 return TOCstart;
9606 }
9607
9608 /* Build all the stubs associated with the current output file.
9609 The stubs are kept in a hash table attached to the main linker
9610 hash table. This function is called via gldelf64ppc_finish. */
9611
9612 bfd_boolean
9613 ppc64_elf_build_stubs (bfd_boolean emit_stub_syms,
9614 struct bfd_link_info *info,
9615 char **stats)
9616 {
9617 struct ppc_link_hash_table *htab = ppc_hash_table (info);
9618 asection *stub_sec;
9619 bfd_byte *p;
9620 int stub_sec_count = 0;
9621
9622 htab->emit_stub_syms = emit_stub_syms;
9623
9624 /* Allocate memory to hold the linker stubs. */
9625 for (stub_sec = htab->stub_bfd->sections;
9626 stub_sec != NULL;
9627 stub_sec = stub_sec->next)
9628 if ((stub_sec->flags & SEC_LINKER_CREATED) == 0
9629 && stub_sec->size != 0)
9630 {
9631 stub_sec->contents = bfd_zalloc (htab->stub_bfd, stub_sec->size);
9632 if (stub_sec->contents == NULL)
9633 return FALSE;
9634 /* We want to check that built size is the same as calculated
9635 size. rawsize is a convenient location to use. */
9636 stub_sec->rawsize = stub_sec->size;
9637 stub_sec->size = 0;
9638 }
9639
9640 if (htab->glink != NULL && htab->glink->size != 0)
9641 {
9642 unsigned int indx;
9643 bfd_vma plt0;
9644
9645 /* Build the .glink plt call stub. */
9646 if (htab->emit_stub_syms)
9647 {
9648 struct elf_link_hash_entry *h;
9649 h = elf_link_hash_lookup (&htab->elf, "__glink", TRUE, FALSE, FALSE);
9650 if (h == NULL)
9651 return FALSE;
9652 if (h->root.type == bfd_link_hash_new)
9653 {
9654 h->root.type = bfd_link_hash_defined;
9655 h->root.u.def.section = htab->glink;
9656 h->root.u.def.value = 8;
9657 h->ref_regular = 1;
9658 h->def_regular = 1;
9659 h->ref_regular_nonweak = 1;
9660 h->forced_local = 1;
9661 h->non_elf = 0;
9662 }
9663 }
9664 p = htab->glink->contents;
9665 plt0 = (htab->plt->output_section->vma
9666 + htab->plt->output_offset
9667 - (htab->glink->output_section->vma
9668 + htab->glink->output_offset
9669 + 16));
9670 bfd_put_64 (htab->glink->owner, plt0, p);
9671 p += 8;
9672 bfd_put_32 (htab->glink->owner, MFLR_R12, p);
9673 p += 4;
9674 bfd_put_32 (htab->glink->owner, BCL_20_31, p);
9675 p += 4;
9676 bfd_put_32 (htab->glink->owner, MFLR_R11, p);
9677 p += 4;
9678 bfd_put_32 (htab->glink->owner, LD_R2_M16R11, p);
9679 p += 4;
9680 bfd_put_32 (htab->glink->owner, MTLR_R12, p);
9681 p += 4;
9682 bfd_put_32 (htab->glink->owner, ADD_R12_R2_R11, p);
9683 p += 4;
9684 bfd_put_32 (htab->glink->owner, LD_R11_0R12, p);
9685 p += 4;
9686 bfd_put_32 (htab->glink->owner, LD_R2_0R12 | 8, p);
9687 p += 4;
9688 bfd_put_32 (htab->glink->owner, MTCTR_R11, p);
9689 p += 4;
9690 bfd_put_32 (htab->glink->owner, LD_R11_0R12 | 16, p);
9691 p += 4;
9692 bfd_put_32 (htab->glink->owner, BCTR, p);
9693 p += 4;
9694 while (p - htab->glink->contents < GLINK_CALL_STUB_SIZE)
9695 {
9696 bfd_put_32 (htab->glink->owner, NOP, p);
9697 p += 4;
9698 }
9699
9700 /* Build the .glink lazy link call stubs. */
9701 indx = 0;
9702 while (p < htab->glink->contents + htab->glink->size)
9703 {
9704 if (indx < 0x8000)
9705 {
9706 bfd_put_32 (htab->glink->owner, LI_R0_0 | indx, p);
9707 p += 4;
9708 }
9709 else
9710 {
9711 bfd_put_32 (htab->glink->owner, LIS_R0_0 | PPC_HI (indx), p);
9712 p += 4;
9713 bfd_put_32 (htab->glink->owner, ORI_R0_R0_0 | PPC_LO (indx), p);
9714 p += 4;
9715 }
9716 bfd_put_32 (htab->glink->owner,
9717 B_DOT | ((htab->glink->contents - p + 8) & 0x3fffffc), p);
9718 indx++;
9719 p += 4;
9720 }
9721 htab->glink->rawsize = p - htab->glink->contents;
9722 }
9723
9724 if (htab->brlt->size != 0)
9725 {
9726 htab->brlt->contents = bfd_zalloc (htab->brlt->owner,
9727 htab->brlt->size);
9728 if (htab->brlt->contents == NULL)
9729 return FALSE;
9730 }
9731 if (htab->relbrlt != NULL && htab->relbrlt->size != 0)
9732 {
9733 htab->relbrlt->contents = bfd_zalloc (htab->relbrlt->owner,
9734 htab->relbrlt->size);
9735 if (htab->relbrlt->contents == NULL)
9736 return FALSE;
9737 }
9738
9739 /* Build the stubs as directed by the stub hash table. */
9740 bfd_hash_traverse (&htab->stub_hash_table, ppc_build_one_stub, info);
9741
9742 if (htab->relbrlt != NULL)
9743 htab->relbrlt->reloc_count = 0;
9744
9745 for (stub_sec = htab->stub_bfd->sections;
9746 stub_sec != NULL;
9747 stub_sec = stub_sec->next)
9748 if ((stub_sec->flags & SEC_LINKER_CREATED) == 0)
9749 {
9750 stub_sec_count += 1;
9751 if (stub_sec->rawsize != stub_sec->size)
9752 break;
9753 }
9754
9755 if (stub_sec != NULL
9756 || htab->glink->rawsize != htab->glink->size)
9757 {
9758 htab->stub_error = TRUE;
9759 (*_bfd_error_handler) (_("stubs don't match calculated size"));
9760 }
9761
9762 if (htab->stub_error)
9763 return FALSE;
9764
9765 if (stats != NULL)
9766 {
9767 *stats = bfd_malloc (500);
9768 if (*stats == NULL)
9769 return FALSE;
9770
9771 sprintf (*stats, _("linker stubs in %u group%s\n"
9772 " branch %lu\n"
9773 " toc adjust %lu\n"
9774 " long branch %lu\n"
9775 " long toc adj %lu\n"
9776 " plt call %lu"),
9777 stub_sec_count,
9778 stub_sec_count == 1 ? "" : "s",
9779 htab->stub_count[ppc_stub_long_branch - 1],
9780 htab->stub_count[ppc_stub_long_branch_r2off - 1],
9781 htab->stub_count[ppc_stub_plt_branch - 1],
9782 htab->stub_count[ppc_stub_plt_branch_r2off - 1],
9783 htab->stub_count[ppc_stub_plt_call - 1]);
9784 }
9785 return TRUE;
9786 }
9787
9788 /* This function undoes the changes made by add_symbol_adjust. */
9789
9790 static bfd_boolean
9791 undo_symbol_twiddle (struct elf_link_hash_entry *h, void *inf ATTRIBUTE_UNUSED)
9792 {
9793 struct ppc_link_hash_entry *eh;
9794
9795 if (h->root.type == bfd_link_hash_indirect)
9796 return TRUE;
9797
9798 if (h->root.type == bfd_link_hash_warning)
9799 h = (struct elf_link_hash_entry *) h->root.u.i.link;
9800
9801 eh = (struct ppc_link_hash_entry *) h;
9802 if (eh->elf.root.type != bfd_link_hash_undefweak || !eh->was_undefined)
9803 return TRUE;
9804
9805 eh->elf.root.type = bfd_link_hash_undefined;
9806 return TRUE;
9807 }
9808
9809 void
9810 ppc64_elf_restore_symbols (struct bfd_link_info *info)
9811 {
9812 struct ppc_link_hash_table *htab = ppc_hash_table (info);
9813 elf_link_hash_traverse (&htab->elf, undo_symbol_twiddle, info);
9814 }
9815
9816 /* What to do when ld finds relocations against symbols defined in
9817 discarded sections. */
9818
9819 static unsigned int
9820 ppc64_elf_action_discarded (asection *sec)
9821 {
9822 if (strcmp (".opd", sec->name) == 0)
9823 return 0;
9824
9825 if (strcmp (".toc", sec->name) == 0)
9826 return 0;
9827
9828 if (strcmp (".toc1", sec->name) == 0)
9829 return 0;
9830
9831 return _bfd_elf_default_action_discarded (sec);
9832 }
9833
9834 /* The RELOCATE_SECTION function is called by the ELF backend linker
9835 to handle the relocations for a section.
9836
9837 The relocs are always passed as Rela structures; if the section
9838 actually uses Rel structures, the r_addend field will always be
9839 zero.
9840
9841 This function is responsible for adjust the section contents as
9842 necessary, and (if using Rela relocs and generating a
9843 relocatable output file) adjusting the reloc addend as
9844 necessary.
9845
9846 This function does not have to worry about setting the reloc
9847 address or the reloc symbol index.
9848
9849 LOCAL_SYMS is a pointer to the swapped in local symbols.
9850
9851 LOCAL_SECTIONS is an array giving the section in the input file
9852 corresponding to the st_shndx field of each local symbol.
9853
9854 The global hash table entry for the global symbols can be found
9855 via elf_sym_hashes (input_bfd).
9856
9857 When generating relocatable output, this function must handle
9858 STB_LOCAL/STT_SECTION symbols specially. The output symbol is
9859 going to be the section symbol corresponding to the output
9860 section, which means that the addend must be adjusted
9861 accordingly. */
9862
9863 static bfd_boolean
9864 ppc64_elf_relocate_section (bfd *output_bfd,
9865 struct bfd_link_info *info,
9866 bfd *input_bfd,
9867 asection *input_section,
9868 bfd_byte *contents,
9869 Elf_Internal_Rela *relocs,
9870 Elf_Internal_Sym *local_syms,
9871 asection **local_sections)
9872 {
9873 struct ppc_link_hash_table *htab;
9874 Elf_Internal_Shdr *symtab_hdr;
9875 struct elf_link_hash_entry **sym_hashes;
9876 Elf_Internal_Rela *rel;
9877 Elf_Internal_Rela *relend;
9878 Elf_Internal_Rela outrel;
9879 bfd_byte *loc;
9880 struct got_entry **local_got_ents;
9881 bfd_vma TOCstart;
9882 bfd_boolean ret = TRUE;
9883 bfd_boolean is_opd;
9884 /* Disabled until we sort out how ld should choose 'y' vs 'at'. */
9885 bfd_boolean is_power4 = FALSE;
9886 bfd_vma d_offset = (bfd_big_endian (output_bfd) ? 2 : 0);
9887
9888 /* Initialize howto table if needed. */
9889 if (!ppc64_elf_howto_table[R_PPC64_ADDR32])
9890 ppc_howto_init ();
9891
9892 htab = ppc_hash_table (info);
9893
9894 /* Don't relocate stub sections. */
9895 if (input_section->owner == htab->stub_bfd)
9896 return TRUE;
9897
9898 local_got_ents = elf_local_got_ents (input_bfd);
9899 TOCstart = elf_gp (output_bfd);
9900 symtab_hdr = &elf_tdata (input_bfd)->symtab_hdr;
9901 sym_hashes = elf_sym_hashes (input_bfd);
9902 is_opd = ppc64_elf_section_data (input_section)->sec_type == sec_opd;
9903
9904 rel = relocs;
9905 relend = relocs + input_section->reloc_count;
9906 for (; rel < relend; rel++)
9907 {
9908 enum elf_ppc64_reloc_type r_type;
9909 bfd_vma addend, orig_addend;
9910 bfd_reloc_status_type r;
9911 Elf_Internal_Sym *sym;
9912 asection *sec;
9913 struct elf_link_hash_entry *h_elf;
9914 struct ppc_link_hash_entry *h;
9915 struct ppc_link_hash_entry *fdh;
9916 const char *sym_name;
9917 unsigned long r_symndx, toc_symndx;
9918 char tls_mask, tls_gd, tls_type;
9919 char sym_type;
9920 bfd_vma relocation;
9921 bfd_boolean unresolved_reloc;
9922 bfd_boolean warned;
9923 unsigned long insn, mask;
9924 struct ppc_stub_hash_entry *stub_entry;
9925 bfd_vma max_br_offset;
9926 bfd_vma from;
9927
9928 r_type = ELF64_R_TYPE (rel->r_info);
9929 r_symndx = ELF64_R_SYM (rel->r_info);
9930
9931 /* For old style R_PPC64_TOC relocs with a zero symbol, use the
9932 symbol of the previous ADDR64 reloc. The symbol gives us the
9933 proper TOC base to use. */
9934 if (rel->r_info == ELF64_R_INFO (0, R_PPC64_TOC)
9935 && rel != relocs
9936 && ELF64_R_TYPE (rel[-1].r_info) == R_PPC64_ADDR64
9937 && is_opd)
9938 r_symndx = ELF64_R_SYM (rel[-1].r_info);
9939
9940 sym = NULL;
9941 sec = NULL;
9942 h_elf = NULL;
9943 sym_name = NULL;
9944 unresolved_reloc = FALSE;
9945 warned = FALSE;
9946 orig_addend = rel->r_addend;
9947
9948 if (r_symndx < symtab_hdr->sh_info)
9949 {
9950 /* It's a local symbol. */
9951 long *opd_adjust;
9952
9953 sym = local_syms + r_symndx;
9954 sec = local_sections[r_symndx];
9955 sym_name = bfd_elf_sym_name (input_bfd, symtab_hdr, sym, sec);
9956 sym_type = ELF64_ST_TYPE (sym->st_info);
9957 relocation = _bfd_elf_rela_local_sym (output_bfd, sym, &sec, rel);
9958 opd_adjust = get_opd_info (sec);
9959 if (opd_adjust != NULL)
9960 {
9961 long adjust = opd_adjust[(sym->st_value + rel->r_addend) / 8];
9962 if (adjust == -1)
9963 relocation = 0;
9964 else
9965 {
9966 /* If this is a relocation against the opd section sym
9967 and we have edited .opd, adjust the reloc addend so
9968 that ld -r and ld --emit-relocs output is correct.
9969 If it is a reloc against some other .opd symbol,
9970 then the symbol value will be adjusted later. */
9971 if (ELF_ST_TYPE (sym->st_info) == STT_SECTION)
9972 rel->r_addend += adjust;
9973 else
9974 relocation += adjust;
9975 }
9976 }
9977 }
9978 else
9979 {
9980 RELOC_FOR_GLOBAL_SYMBOL (info, input_bfd, input_section, rel,
9981 r_symndx, symtab_hdr, sym_hashes,
9982 h_elf, sec, relocation,
9983 unresolved_reloc, warned);
9984 sym_name = h_elf->root.root.string;
9985 sym_type = h_elf->type;
9986 }
9987 h = (struct ppc_link_hash_entry *) h_elf;
9988
9989 if (sec != NULL && elf_discarded_section (sec))
9990 {
9991 /* For relocs against symbols from removed linkonce sections,
9992 or sections discarded by a linker script, we just want the
9993 section contents zeroed. Avoid any special processing. */
9994 _bfd_clear_contents (ppc64_elf_howto_table[r_type], input_bfd,
9995 contents + rel->r_offset);
9996 rel->r_info = 0;
9997 rel->r_addend = 0;
9998 continue;
9999 }
10000
10001 if (info->relocatable)
10002 continue;
10003
10004 /* TLS optimizations. Replace instruction sequences and relocs
10005 based on information we collected in tls_optimize. We edit
10006 RELOCS so that --emit-relocs will output something sensible
10007 for the final instruction stream. */
10008 tls_mask = 0;
10009 tls_gd = 0;
10010 toc_symndx = 0;
10011 if (IS_PPC64_TLS_RELOC (r_type))
10012 {
10013 if (h != NULL)
10014 tls_mask = h->tls_mask;
10015 else if (local_got_ents != NULL)
10016 {
10017 char *lgot_masks;
10018 lgot_masks = (char *) (local_got_ents + symtab_hdr->sh_info);
10019 tls_mask = lgot_masks[r_symndx];
10020 }
10021 if (tls_mask == 0 && r_type == R_PPC64_TLS)
10022 {
10023 /* Check for toc tls entries. */
10024 char *toc_tls;
10025
10026 if (!get_tls_mask (&toc_tls, &toc_symndx, &local_syms,
10027 rel, input_bfd))
10028 return FALSE;
10029
10030 if (toc_tls)
10031 tls_mask = *toc_tls;
10032 }
10033 }
10034
10035 /* Check that tls relocs are used with tls syms, and non-tls
10036 relocs are used with non-tls syms. */
10037 if (r_symndx != 0
10038 && r_type != R_PPC64_NONE
10039 && (h == NULL
10040 || h->elf.root.type == bfd_link_hash_defined
10041 || h->elf.root.type == bfd_link_hash_defweak)
10042 && IS_PPC64_TLS_RELOC (r_type) != (sym_type == STT_TLS))
10043 {
10044 if (r_type == R_PPC64_TLS && tls_mask != 0)
10045 /* R_PPC64_TLS is OK against a symbol in the TOC. */
10046 ;
10047 else
10048 (*_bfd_error_handler)
10049 (sym_type == STT_TLS
10050 ? _("%B(%A+0x%lx): %s used with TLS symbol %s")
10051 : _("%B(%A+0x%lx): %s used with non-TLS symbol %s"),
10052 input_bfd,
10053 input_section,
10054 (long) rel->r_offset,
10055 ppc64_elf_howto_table[r_type]->name,
10056 sym_name);
10057 }
10058
10059 /* Ensure reloc mapping code below stays sane. */
10060 if (R_PPC64_TOC16_LO_DS != R_PPC64_TOC16_DS + 1
10061 || R_PPC64_TOC16_LO != R_PPC64_TOC16 + 1
10062 || (R_PPC64_GOT_TLSLD16 & 3) != (R_PPC64_GOT_TLSGD16 & 3)
10063 || (R_PPC64_GOT_TLSLD16_LO & 3) != (R_PPC64_GOT_TLSGD16_LO & 3)
10064 || (R_PPC64_GOT_TLSLD16_HI & 3) != (R_PPC64_GOT_TLSGD16_HI & 3)
10065 || (R_PPC64_GOT_TLSLD16_HA & 3) != (R_PPC64_GOT_TLSGD16_HA & 3)
10066 || (R_PPC64_GOT_TLSLD16 & 3) != (R_PPC64_GOT_TPREL16_DS & 3)
10067 || (R_PPC64_GOT_TLSLD16_LO & 3) != (R_PPC64_GOT_TPREL16_LO_DS & 3)
10068 || (R_PPC64_GOT_TLSLD16_HI & 3) != (R_PPC64_GOT_TPREL16_HI & 3)
10069 || (R_PPC64_GOT_TLSLD16_HA & 3) != (R_PPC64_GOT_TPREL16_HA & 3))
10070 abort ();
10071
10072 switch (r_type)
10073 {
10074 default:
10075 break;
10076
10077 case R_PPC64_TOC16:
10078 case R_PPC64_TOC16_LO:
10079 case R_PPC64_TOC16_DS:
10080 case R_PPC64_TOC16_LO_DS:
10081 {
10082 /* Check for toc tls entries. */
10083 char *toc_tls;
10084 int retval;
10085
10086 retval = get_tls_mask (&toc_tls, &toc_symndx, &local_syms,
10087 rel, input_bfd);
10088 if (retval == 0)
10089 return FALSE;
10090
10091 if (toc_tls)
10092 {
10093 tls_mask = *toc_tls;
10094 if (r_type == R_PPC64_TOC16_DS
10095 || r_type == R_PPC64_TOC16_LO_DS)
10096 {
10097 if (tls_mask != 0
10098 && (tls_mask & (TLS_DTPREL | TLS_TPREL)) == 0)
10099 goto toctprel;
10100 }
10101 else
10102 {
10103 /* If we found a GD reloc pair, then we might be
10104 doing a GD->IE transition. */
10105 if (retval == 2)
10106 {
10107 tls_gd = TLS_TPRELGD;
10108 if (tls_mask != 0 && (tls_mask & TLS_GD) == 0)
10109 goto tls_get_addr_check;
10110 }
10111 else if (retval == 3)
10112 {
10113 if (tls_mask != 0 && (tls_mask & TLS_LD) == 0)
10114 goto tls_get_addr_check;
10115 }
10116 }
10117 }
10118 }
10119 break;
10120
10121 case R_PPC64_GOT_TPREL16_DS:
10122 case R_PPC64_GOT_TPREL16_LO_DS:
10123 if (tls_mask != 0
10124 && (tls_mask & TLS_TPREL) == 0)
10125 {
10126 toctprel:
10127 insn = bfd_get_32 (output_bfd, contents + rel->r_offset - d_offset);
10128 insn &= 31 << 21;
10129 insn |= 0x3c0d0000; /* addis 0,13,0 */
10130 bfd_put_32 (output_bfd, insn, contents + rel->r_offset - d_offset);
10131 r_type = R_PPC64_TPREL16_HA;
10132 if (toc_symndx != 0)
10133 {
10134 rel->r_info = ELF64_R_INFO (toc_symndx, r_type);
10135 /* We changed the symbol. Start over in order to
10136 get h, sym, sec etc. right. */
10137 rel--;
10138 continue;
10139 }
10140 else
10141 rel->r_info = ELF64_R_INFO (r_symndx, r_type);
10142 }
10143 break;
10144
10145 case R_PPC64_TLS:
10146 if (tls_mask != 0
10147 && (tls_mask & TLS_TPREL) == 0)
10148 {
10149 bfd_vma rtra;
10150 insn = bfd_get_32 (output_bfd, contents + rel->r_offset);
10151 if ((insn & ((0x3f << 26) | (31 << 11)))
10152 == ((31 << 26) | (13 << 11)))
10153 rtra = insn & ((1 << 26) - (1 << 16));
10154 else if ((insn & ((0x3f << 26) | (31 << 16)))
10155 == ((31 << 26) | (13 << 16)))
10156 rtra = (insn & (31 << 21)) | ((insn & (31 << 11)) << 5);
10157 else
10158 abort ();
10159 if ((insn & ((1 << 11) - (1 << 1))) == 266 << 1)
10160 /* add -> addi. */
10161 insn = 14 << 26;
10162 else if ((insn & (31 << 1)) == 23 << 1
10163 && ((insn & (31 << 6)) < 14 << 6
10164 || ((insn & (31 << 6)) >= 16 << 6
10165 && (insn & (31 << 6)) < 24 << 6)))
10166 /* load and store indexed -> dform. */
10167 insn = (32 | ((insn >> 6) & 31)) << 26;
10168 else if ((insn & (31 << 1)) == 21 << 1
10169 && (insn & (0x1a << 6)) == 0)
10170 /* ldx, ldux, stdx, stdux -> ld, ldu, std, stdu. */
10171 insn = (((58 | ((insn >> 6) & 4)) << 26)
10172 | ((insn >> 6) & 1));
10173 else if ((insn & (31 << 1)) == 21 << 1
10174 && (insn & ((1 << 11) - (1 << 1))) == 341 << 1)
10175 /* lwax -> lwa. */
10176 insn = (58 << 26) | 2;
10177 else
10178 abort ();
10179 insn |= rtra;
10180 bfd_put_32 (output_bfd, insn, contents + rel->r_offset);
10181 /* Was PPC64_TLS which sits on insn boundary, now
10182 PPC64_TPREL16_LO which is at low-order half-word. */
10183 rel->r_offset += d_offset;
10184 r_type = R_PPC64_TPREL16_LO;
10185 if (toc_symndx != 0)
10186 {
10187 rel->r_info = ELF64_R_INFO (toc_symndx, r_type);
10188 /* We changed the symbol. Start over in order to
10189 get h, sym, sec etc. right. */
10190 rel--;
10191 continue;
10192 }
10193 else
10194 rel->r_info = ELF64_R_INFO (r_symndx, r_type);
10195 }
10196 break;
10197
10198 case R_PPC64_GOT_TLSGD16_HI:
10199 case R_PPC64_GOT_TLSGD16_HA:
10200 tls_gd = TLS_TPRELGD;
10201 if (tls_mask != 0 && (tls_mask & TLS_GD) == 0)
10202 goto tls_gdld_hi;
10203 break;
10204
10205 case R_PPC64_GOT_TLSLD16_HI:
10206 case R_PPC64_GOT_TLSLD16_HA:
10207 if (tls_mask != 0 && (tls_mask & TLS_LD) == 0)
10208 {
10209 tls_gdld_hi:
10210 if ((tls_mask & tls_gd) != 0)
10211 r_type = (((r_type - (R_PPC64_GOT_TLSGD16 & 3)) & 3)
10212 + R_PPC64_GOT_TPREL16_DS);
10213 else
10214 {
10215 bfd_put_32 (output_bfd, NOP, contents + rel->r_offset);
10216 rel->r_offset -= d_offset;
10217 r_type = R_PPC64_NONE;
10218 }
10219 rel->r_info = ELF64_R_INFO (r_symndx, r_type);
10220 }
10221 break;
10222
10223 case R_PPC64_GOT_TLSGD16:
10224 case R_PPC64_GOT_TLSGD16_LO:
10225 tls_gd = TLS_TPRELGD;
10226 if (tls_mask != 0 && (tls_mask & TLS_GD) == 0)
10227 goto tls_get_addr_check;
10228 break;
10229
10230 case R_PPC64_GOT_TLSLD16:
10231 case R_PPC64_GOT_TLSLD16_LO:
10232 if (tls_mask != 0 && (tls_mask & TLS_LD) == 0)
10233 {
10234 tls_get_addr_check:
10235 if (rel + 1 < relend)
10236 {
10237 enum elf_ppc64_reloc_type r_type2;
10238 unsigned long r_symndx2;
10239 struct elf_link_hash_entry *h2;
10240 bfd_vma insn1, insn2, insn3;
10241 bfd_vma offset;
10242
10243 /* The next instruction should be a call to
10244 __tls_get_addr. Peek at the reloc to be sure. */
10245 r_type2 = ELF64_R_TYPE (rel[1].r_info);
10246 r_symndx2 = ELF64_R_SYM (rel[1].r_info);
10247 if (r_symndx2 < symtab_hdr->sh_info
10248 || (r_type2 != R_PPC64_REL14
10249 && r_type2 != R_PPC64_REL14_BRTAKEN
10250 && r_type2 != R_PPC64_REL14_BRNTAKEN
10251 && r_type2 != R_PPC64_REL24))
10252 break;
10253
10254 h2 = sym_hashes[r_symndx2 - symtab_hdr->sh_info];
10255 while (h2->root.type == bfd_link_hash_indirect
10256 || h2->root.type == bfd_link_hash_warning)
10257 h2 = (struct elf_link_hash_entry *) h2->root.u.i.link;
10258 if (h2 == NULL || (h2 != &htab->tls_get_addr->elf
10259 && h2 != &htab->tls_get_addr_fd->elf))
10260 break;
10261
10262 /* OK, it checks out. Replace the call. */
10263 offset = rel[1].r_offset;
10264 insn1 = bfd_get_32 (output_bfd,
10265 contents + rel->r_offset - d_offset);
10266 insn3 = bfd_get_32 (output_bfd,
10267 contents + offset + 4);
10268 if ((tls_mask & tls_gd) != 0)
10269 {
10270 /* IE */
10271 insn1 &= (1 << 26) - (1 << 2);
10272 insn1 |= 58 << 26; /* ld */
10273 insn2 = 0x7c636a14; /* add 3,3,13 */
10274 rel[1].r_info = ELF64_R_INFO (r_symndx2, R_PPC64_NONE);
10275 if ((tls_mask & TLS_EXPLICIT) == 0)
10276 r_type = (((r_type - (R_PPC64_GOT_TLSGD16 & 3)) & 3)
10277 + R_PPC64_GOT_TPREL16_DS);
10278 else
10279 r_type += R_PPC64_TOC16_DS - R_PPC64_TOC16;
10280 rel->r_info = ELF64_R_INFO (r_symndx, r_type);
10281 }
10282 else
10283 {
10284 /* LE */
10285 insn1 = 0x3c6d0000; /* addis 3,13,0 */
10286 insn2 = 0x38630000; /* addi 3,3,0 */
10287 if (tls_gd == 0)
10288 {
10289 /* Was an LD reloc. */
10290 r_symndx = 0;
10291 rel->r_addend = htab->elf.tls_sec->vma + DTP_OFFSET;
10292 rel[1].r_addend = htab->elf.tls_sec->vma + DTP_OFFSET;
10293 }
10294 else if (toc_symndx != 0)
10295 r_symndx = toc_symndx;
10296 r_type = R_PPC64_TPREL16_HA;
10297 rel->r_info = ELF64_R_INFO (r_symndx, r_type);
10298 rel[1].r_info = ELF64_R_INFO (r_symndx,
10299 R_PPC64_TPREL16_LO);
10300 rel[1].r_offset += d_offset;
10301 }
10302 if (insn3 == NOP
10303 || insn3 == CROR_151515 || insn3 == CROR_313131)
10304 {
10305 insn3 = insn2;
10306 insn2 = NOP;
10307 rel[1].r_offset += 4;
10308 }
10309 bfd_put_32 (output_bfd, insn1, contents + rel->r_offset - d_offset);
10310 bfd_put_32 (output_bfd, insn2, contents + offset);
10311 bfd_put_32 (output_bfd, insn3, contents + offset + 4);
10312 if (tls_gd == 0 || toc_symndx != 0)
10313 {
10314 /* We changed the symbol. Start over in order
10315 to get h, sym, sec etc. right. */
10316 rel--;
10317 continue;
10318 }
10319 }
10320 }
10321 break;
10322
10323 case R_PPC64_DTPMOD64:
10324 if (rel + 1 < relend
10325 && rel[1].r_info == ELF64_R_INFO (r_symndx, R_PPC64_DTPREL64)
10326 && rel[1].r_offset == rel->r_offset + 8)
10327 {
10328 if ((tls_mask & TLS_GD) == 0)
10329 {
10330 rel[1].r_info = ELF64_R_INFO (r_symndx, R_PPC64_NONE);
10331 if ((tls_mask & TLS_TPRELGD) != 0)
10332 r_type = R_PPC64_TPREL64;
10333 else
10334 {
10335 bfd_put_64 (output_bfd, 1, contents + rel->r_offset);
10336 r_type = R_PPC64_NONE;
10337 }
10338 rel->r_info = ELF64_R_INFO (r_symndx, r_type);
10339 }
10340 }
10341 else
10342 {
10343 if ((tls_mask & TLS_LD) == 0)
10344 {
10345 bfd_put_64 (output_bfd, 1, contents + rel->r_offset);
10346 r_type = R_PPC64_NONE;
10347 rel->r_info = ELF64_R_INFO (r_symndx, r_type);
10348 }
10349 }
10350 break;
10351
10352 case R_PPC64_TPREL64:
10353 if ((tls_mask & TLS_TPREL) == 0)
10354 {
10355 r_type = R_PPC64_NONE;
10356 rel->r_info = ELF64_R_INFO (r_symndx, r_type);
10357 }
10358 break;
10359 }
10360
10361 /* Handle other relocations that tweak non-addend part of insn. */
10362 insn = 0;
10363 max_br_offset = 1 << 25;
10364 addend = rel->r_addend;
10365 switch (r_type)
10366 {
10367 default:
10368 break;
10369
10370 /* Branch taken prediction relocations. */
10371 case R_PPC64_ADDR14_BRTAKEN:
10372 case R_PPC64_REL14_BRTAKEN:
10373 insn = 0x01 << 21; /* 'y' or 't' bit, lowest bit of BO field. */
10374 /* Fall thru. */
10375
10376 /* Branch not taken prediction relocations. */
10377 case R_PPC64_ADDR14_BRNTAKEN:
10378 case R_PPC64_REL14_BRNTAKEN:
10379 insn |= bfd_get_32 (output_bfd,
10380 contents + rel->r_offset) & ~(0x01 << 21);
10381 /* Fall thru. */
10382
10383 case R_PPC64_REL14:
10384 max_br_offset = 1 << 15;
10385 /* Fall thru. */
10386
10387 case R_PPC64_REL24:
10388 /* Calls to functions with a different TOC, such as calls to
10389 shared objects, need to alter the TOC pointer. This is
10390 done using a linkage stub. A REL24 branching to these
10391 linkage stubs needs to be followed by a nop, as the nop
10392 will be replaced with an instruction to restore the TOC
10393 base pointer. */
10394 stub_entry = NULL;
10395 fdh = h;
10396 if (((h != NULL
10397 && (((fdh = h->oh) != NULL
10398 && fdh->elf.plt.plist != NULL)
10399 || (fdh = h)->elf.plt.plist != NULL))
10400 || (sec != NULL
10401 && sec->output_section != NULL
10402 && sec->id <= htab->top_id
10403 && (htab->stub_group[sec->id].toc_off
10404 != htab->stub_group[input_section->id].toc_off)))
10405 && (stub_entry = ppc_get_stub_entry (input_section, sec, fdh,
10406 rel, htab)) != NULL
10407 && (stub_entry->stub_type == ppc_stub_plt_call
10408 || stub_entry->stub_type == ppc_stub_plt_branch_r2off
10409 || stub_entry->stub_type == ppc_stub_long_branch_r2off))
10410 {
10411 bfd_boolean can_plt_call = FALSE;
10412
10413 if (rel->r_offset + 8 <= input_section->size)
10414 {
10415 unsigned long nop;
10416 nop = bfd_get_32 (input_bfd, contents + rel->r_offset + 4);
10417 if (nop == NOP
10418 || nop == CROR_151515 || nop == CROR_313131)
10419 {
10420 bfd_put_32 (input_bfd, LD_R2_40R1,
10421 contents + rel->r_offset + 4);
10422 can_plt_call = TRUE;
10423 }
10424 }
10425
10426 if (!can_plt_call)
10427 {
10428 if (stub_entry->stub_type == ppc_stub_plt_call)
10429 {
10430 /* If this is a plain branch rather than a branch
10431 and link, don't require a nop. However, don't
10432 allow tail calls in a shared library as they
10433 will result in r2 being corrupted. */
10434 unsigned long br;
10435 br = bfd_get_32 (input_bfd, contents + rel->r_offset);
10436 if (info->executable && (br & 1) == 0)
10437 can_plt_call = TRUE;
10438 else
10439 stub_entry = NULL;
10440 }
10441 else if (h != NULL
10442 && strcmp (h->elf.root.root.string,
10443 ".__libc_start_main") == 0)
10444 {
10445 /* Allow crt1 branch to go via a toc adjusting stub. */
10446 can_plt_call = TRUE;
10447 }
10448 else
10449 {
10450 if (strcmp (input_section->output_section->name,
10451 ".init") == 0
10452 || strcmp (input_section->output_section->name,
10453 ".fini") == 0)
10454 (*_bfd_error_handler)
10455 (_("%B(%A+0x%lx): automatic multiple TOCs "
10456 "not supported using your crt files; "
10457 "recompile with -mminimal-toc or upgrade gcc"),
10458 input_bfd,
10459 input_section,
10460 (long) rel->r_offset);
10461 else
10462 (*_bfd_error_handler)
10463 (_("%B(%A+0x%lx): sibling call optimization to `%s' "
10464 "does not allow automatic multiple TOCs; "
10465 "recompile with -mminimal-toc or "
10466 "-fno-optimize-sibling-calls, "
10467 "or make `%s' extern"),
10468 input_bfd,
10469 input_section,
10470 (long) rel->r_offset,
10471 sym_name,
10472 sym_name);
10473 bfd_set_error (bfd_error_bad_value);
10474 ret = FALSE;
10475 }
10476 }
10477
10478 if (can_plt_call
10479 && stub_entry->stub_type == ppc_stub_plt_call)
10480 unresolved_reloc = FALSE;
10481 }
10482
10483 if (stub_entry == NULL
10484 && get_opd_info (sec) != NULL)
10485 {
10486 /* The branch destination is the value of the opd entry. */
10487 bfd_vma off = (relocation + addend
10488 - sec->output_section->vma
10489 - sec->output_offset);
10490 bfd_vma dest = opd_entry_value (sec, off, NULL, NULL);
10491 if (dest != (bfd_vma) -1)
10492 {
10493 relocation = dest;
10494 addend = 0;
10495 }
10496 }
10497
10498 /* If the branch is out of reach we ought to have a long
10499 branch stub. */
10500 from = (rel->r_offset
10501 + input_section->output_offset
10502 + input_section->output_section->vma);
10503
10504 if (stub_entry == NULL
10505 && (relocation + addend - from + max_br_offset
10506 >= 2 * max_br_offset)
10507 && r_type != R_PPC64_ADDR14_BRTAKEN
10508 && r_type != R_PPC64_ADDR14_BRNTAKEN)
10509 stub_entry = ppc_get_stub_entry (input_section, sec, h, rel,
10510 htab);
10511
10512 if (stub_entry != NULL)
10513 {
10514 /* Munge up the value and addend so that we call the stub
10515 rather than the procedure directly. */
10516 relocation = (stub_entry->stub_offset
10517 + stub_entry->stub_sec->output_offset
10518 + stub_entry->stub_sec->output_section->vma);
10519 addend = 0;
10520 }
10521
10522 if (insn != 0)
10523 {
10524 if (is_power4)
10525 {
10526 /* Set 'a' bit. This is 0b00010 in BO field for branch
10527 on CR(BI) insns (BO == 001at or 011at), and 0b01000
10528 for branch on CTR insns (BO == 1a00t or 1a01t). */
10529 if ((insn & (0x14 << 21)) == (0x04 << 21))
10530 insn |= 0x02 << 21;
10531 else if ((insn & (0x14 << 21)) == (0x10 << 21))
10532 insn |= 0x08 << 21;
10533 else
10534 break;
10535 }
10536 else
10537 {
10538 /* Invert 'y' bit if not the default. */
10539 if ((bfd_signed_vma) (relocation + addend - from) < 0)
10540 insn ^= 0x01 << 21;
10541 }
10542
10543 bfd_put_32 (output_bfd, insn, contents + rel->r_offset);
10544 }
10545
10546 /* NOP out calls to undefined weak functions.
10547 We can thus call a weak function without first
10548 checking whether the function is defined. */
10549 else if (h != NULL
10550 && h->elf.root.type == bfd_link_hash_undefweak
10551 && r_type == R_PPC64_REL24
10552 && relocation == 0
10553 && addend == 0)
10554 {
10555 bfd_put_32 (output_bfd, NOP, contents + rel->r_offset);
10556 continue;
10557 }
10558 break;
10559 }
10560
10561 /* Set `addend'. */
10562 tls_type = 0;
10563 switch (r_type)
10564 {
10565 default:
10566 (*_bfd_error_handler)
10567 (_("%B: unknown relocation type %d for symbol %s"),
10568 input_bfd, (int) r_type, sym_name);
10569
10570 bfd_set_error (bfd_error_bad_value);
10571 ret = FALSE;
10572 continue;
10573
10574 case R_PPC64_NONE:
10575 case R_PPC64_TLS:
10576 case R_PPC64_GNU_VTINHERIT:
10577 case R_PPC64_GNU_VTENTRY:
10578 continue;
10579
10580 /* GOT16 relocations. Like an ADDR16 using the symbol's
10581 address in the GOT as relocation value instead of the
10582 symbol's value itself. Also, create a GOT entry for the
10583 symbol and put the symbol value there. */
10584 case R_PPC64_GOT_TLSGD16:
10585 case R_PPC64_GOT_TLSGD16_LO:
10586 case R_PPC64_GOT_TLSGD16_HI:
10587 case R_PPC64_GOT_TLSGD16_HA:
10588 tls_type = TLS_TLS | TLS_GD;
10589 goto dogot;
10590
10591 case R_PPC64_GOT_TLSLD16:
10592 case R_PPC64_GOT_TLSLD16_LO:
10593 case R_PPC64_GOT_TLSLD16_HI:
10594 case R_PPC64_GOT_TLSLD16_HA:
10595 tls_type = TLS_TLS | TLS_LD;
10596 goto dogot;
10597
10598 case R_PPC64_GOT_TPREL16_DS:
10599 case R_PPC64_GOT_TPREL16_LO_DS:
10600 case R_PPC64_GOT_TPREL16_HI:
10601 case R_PPC64_GOT_TPREL16_HA:
10602 tls_type = TLS_TLS | TLS_TPREL;
10603 goto dogot;
10604
10605 case R_PPC64_GOT_DTPREL16_DS:
10606 case R_PPC64_GOT_DTPREL16_LO_DS:
10607 case R_PPC64_GOT_DTPREL16_HI:
10608 case R_PPC64_GOT_DTPREL16_HA:
10609 tls_type = TLS_TLS | TLS_DTPREL;
10610 goto dogot;
10611
10612 case R_PPC64_GOT16:
10613 case R_PPC64_GOT16_LO:
10614 case R_PPC64_GOT16_HI:
10615 case R_PPC64_GOT16_HA:
10616 case R_PPC64_GOT16_DS:
10617 case R_PPC64_GOT16_LO_DS:
10618 dogot:
10619 {
10620 /* Relocation is to the entry for this symbol in the global
10621 offset table. */
10622 asection *got;
10623 bfd_vma *offp;
10624 bfd_vma off;
10625 unsigned long indx = 0;
10626
10627 if (tls_type == (TLS_TLS | TLS_LD)
10628 && (h == NULL
10629 || !h->elf.def_dynamic))
10630 offp = &ppc64_tlsld_got (input_bfd)->offset;
10631 else
10632 {
10633 struct got_entry *ent;
10634
10635 if (h != NULL)
10636 {
10637 bfd_boolean dyn = htab->elf.dynamic_sections_created;
10638 if (!WILL_CALL_FINISH_DYNAMIC_SYMBOL (dyn, info->shared,
10639 &h->elf)
10640 || (info->shared
10641 && SYMBOL_REFERENCES_LOCAL (info, &h->elf)))
10642 /* This is actually a static link, or it is a
10643 -Bsymbolic link and the symbol is defined
10644 locally, or the symbol was forced to be local
10645 because of a version file. */
10646 ;
10647 else
10648 {
10649 indx = h->elf.dynindx;
10650 unresolved_reloc = FALSE;
10651 }
10652 ent = h->elf.got.glist;
10653 }
10654 else
10655 {
10656 if (local_got_ents == NULL)
10657 abort ();
10658 ent = local_got_ents[r_symndx];
10659 }
10660
10661 for (; ent != NULL; ent = ent->next)
10662 if (ent->addend == orig_addend
10663 && ent->owner == input_bfd
10664 && ent->tls_type == tls_type)
10665 break;
10666 if (ent == NULL)
10667 abort ();
10668 offp = &ent->got.offset;
10669 }
10670
10671 got = ppc64_elf_tdata (input_bfd)->got;
10672 if (got == NULL)
10673 abort ();
10674
10675 /* The offset must always be a multiple of 8. We use the
10676 least significant bit to record whether we have already
10677 processed this entry. */
10678 off = *offp;
10679 if ((off & 1) != 0)
10680 off &= ~1;
10681 else
10682 {
10683 /* Generate relocs for the dynamic linker, except in
10684 the case of TLSLD where we'll use one entry per
10685 module. */
10686 asection *relgot = ppc64_elf_tdata (input_bfd)->relgot;
10687
10688 *offp = off | 1;
10689 if ((info->shared || indx != 0)
10690 && (h == NULL
10691 || ELF_ST_VISIBILITY (h->elf.other) == STV_DEFAULT
10692 || h->elf.root.type != bfd_link_hash_undefweak))
10693 {
10694 outrel.r_offset = (got->output_section->vma
10695 + got->output_offset
10696 + off);
10697 outrel.r_addend = addend;
10698 if (tls_type & (TLS_LD | TLS_GD))
10699 {
10700 outrel.r_addend = 0;
10701 outrel.r_info = ELF64_R_INFO (indx, R_PPC64_DTPMOD64);
10702 if (tls_type == (TLS_TLS | TLS_GD))
10703 {
10704 loc = relgot->contents;
10705 loc += (relgot->reloc_count++
10706 * sizeof (Elf64_External_Rela));
10707 bfd_elf64_swap_reloca_out (output_bfd,
10708 &outrel, loc);
10709 outrel.r_offset += 8;
10710 outrel.r_addend = addend;
10711 outrel.r_info
10712 = ELF64_R_INFO (indx, R_PPC64_DTPREL64);
10713 }
10714 }
10715 else if (tls_type == (TLS_TLS | TLS_DTPREL))
10716 outrel.r_info = ELF64_R_INFO (indx, R_PPC64_DTPREL64);
10717 else if (tls_type == (TLS_TLS | TLS_TPREL))
10718 outrel.r_info = ELF64_R_INFO (indx, R_PPC64_TPREL64);
10719 else if (indx == 0)
10720 {
10721 outrel.r_info = ELF64_R_INFO (indx, R_PPC64_RELATIVE);
10722
10723 /* Write the .got section contents for the sake
10724 of prelink. */
10725 loc = got->contents + off;
10726 bfd_put_64 (output_bfd, outrel.r_addend + relocation,
10727 loc);
10728 }
10729 else
10730 outrel.r_info = ELF64_R_INFO (indx, R_PPC64_GLOB_DAT);
10731
10732 if (indx == 0 && tls_type != (TLS_TLS | TLS_LD))
10733 {
10734 outrel.r_addend += relocation;
10735 if (tls_type & (TLS_GD | TLS_DTPREL | TLS_TPREL))
10736 outrel.r_addend -= htab->elf.tls_sec->vma;
10737 }
10738 loc = relgot->contents;
10739 loc += (relgot->reloc_count++
10740 * sizeof (Elf64_External_Rela));
10741 bfd_elf64_swap_reloca_out (output_bfd, &outrel, loc);
10742 }
10743
10744 /* Init the .got section contents here if we're not
10745 emitting a reloc. */
10746 else
10747 {
10748 relocation += addend;
10749 if (tls_type == (TLS_TLS | TLS_LD))
10750 relocation = 1;
10751 else if (tls_type != 0)
10752 {
10753 relocation -= htab->elf.tls_sec->vma + DTP_OFFSET;
10754 if (tls_type == (TLS_TLS | TLS_TPREL))
10755 relocation += DTP_OFFSET - TP_OFFSET;
10756
10757 if (tls_type == (TLS_TLS | TLS_GD))
10758 {
10759 bfd_put_64 (output_bfd, relocation,
10760 got->contents + off + 8);
10761 relocation = 1;
10762 }
10763 }
10764
10765 bfd_put_64 (output_bfd, relocation,
10766 got->contents + off);
10767 }
10768 }
10769
10770 if (off >= (bfd_vma) -2)
10771 abort ();
10772
10773 relocation = got->output_offset + off;
10774
10775 /* TOC base (r2) is TOC start plus 0x8000. */
10776 addend = -TOC_BASE_OFF;
10777 }
10778 break;
10779
10780 case R_PPC64_PLT16_HA:
10781 case R_PPC64_PLT16_HI:
10782 case R_PPC64_PLT16_LO:
10783 case R_PPC64_PLT32:
10784 case R_PPC64_PLT64:
10785 /* Relocation is to the entry for this symbol in the
10786 procedure linkage table. */
10787
10788 /* Resolve a PLT reloc against a local symbol directly,
10789 without using the procedure linkage table. */
10790 if (h == NULL)
10791 break;
10792
10793 /* It's possible that we didn't make a PLT entry for this
10794 symbol. This happens when statically linking PIC code,
10795 or when using -Bsymbolic. Go find a match if there is a
10796 PLT entry. */
10797 if (htab->plt != NULL)
10798 {
10799 struct plt_entry *ent;
10800 for (ent = h->elf.plt.plist; ent != NULL; ent = ent->next)
10801 if (ent->addend == orig_addend
10802 && ent->plt.offset != (bfd_vma) -1)
10803 {
10804 relocation = (htab->plt->output_section->vma
10805 + htab->plt->output_offset
10806 + ent->plt.offset);
10807 unresolved_reloc = FALSE;
10808 }
10809 }
10810 break;
10811
10812 case R_PPC64_TOC:
10813 /* Relocation value is TOC base. */
10814 relocation = TOCstart;
10815 if (r_symndx == 0)
10816 relocation += htab->stub_group[input_section->id].toc_off;
10817 else if (unresolved_reloc)
10818 ;
10819 else if (sec != NULL && sec->id <= htab->top_id)
10820 relocation += htab->stub_group[sec->id].toc_off;
10821 else
10822 unresolved_reloc = TRUE;
10823 goto dodyn;
10824
10825 /* TOC16 relocs. We want the offset relative to the TOC base,
10826 which is the address of the start of the TOC plus 0x8000.
10827 The TOC consists of sections .got, .toc, .tocbss, and .plt,
10828 in this order. */
10829 case R_PPC64_TOC16:
10830 case R_PPC64_TOC16_LO:
10831 case R_PPC64_TOC16_HI:
10832 case R_PPC64_TOC16_DS:
10833 case R_PPC64_TOC16_LO_DS:
10834 case R_PPC64_TOC16_HA:
10835 addend -= TOCstart + htab->stub_group[input_section->id].toc_off;
10836 break;
10837
10838 /* Relocate against the beginning of the section. */
10839 case R_PPC64_SECTOFF:
10840 case R_PPC64_SECTOFF_LO:
10841 case R_PPC64_SECTOFF_HI:
10842 case R_PPC64_SECTOFF_DS:
10843 case R_PPC64_SECTOFF_LO_DS:
10844 case R_PPC64_SECTOFF_HA:
10845 if (sec != NULL)
10846 addend -= sec->output_section->vma;
10847 break;
10848
10849 case R_PPC64_REL14:
10850 case R_PPC64_REL14_BRNTAKEN:
10851 case R_PPC64_REL14_BRTAKEN:
10852 case R_PPC64_REL24:
10853 break;
10854
10855 case R_PPC64_TPREL16:
10856 case R_PPC64_TPREL16_LO:
10857 case R_PPC64_TPREL16_HI:
10858 case R_PPC64_TPREL16_HA:
10859 case R_PPC64_TPREL16_DS:
10860 case R_PPC64_TPREL16_LO_DS:
10861 case R_PPC64_TPREL16_HIGHER:
10862 case R_PPC64_TPREL16_HIGHERA:
10863 case R_PPC64_TPREL16_HIGHEST:
10864 case R_PPC64_TPREL16_HIGHESTA:
10865 addend -= htab->elf.tls_sec->vma + TP_OFFSET;
10866 if (info->shared)
10867 /* The TPREL16 relocs shouldn't really be used in shared
10868 libs as they will result in DT_TEXTREL being set, but
10869 support them anyway. */
10870 goto dodyn;
10871 break;
10872
10873 case R_PPC64_DTPREL16:
10874 case R_PPC64_DTPREL16_LO:
10875 case R_PPC64_DTPREL16_HI:
10876 case R_PPC64_DTPREL16_HA:
10877 case R_PPC64_DTPREL16_DS:
10878 case R_PPC64_DTPREL16_LO_DS:
10879 case R_PPC64_DTPREL16_HIGHER:
10880 case R_PPC64_DTPREL16_HIGHERA:
10881 case R_PPC64_DTPREL16_HIGHEST:
10882 case R_PPC64_DTPREL16_HIGHESTA:
10883 addend -= htab->elf.tls_sec->vma + DTP_OFFSET;
10884 break;
10885
10886 case R_PPC64_DTPMOD64:
10887 relocation = 1;
10888 addend = 0;
10889 goto dodyn;
10890
10891 case R_PPC64_TPREL64:
10892 addend -= htab->elf.tls_sec->vma + TP_OFFSET;
10893 goto dodyn;
10894
10895 case R_PPC64_DTPREL64:
10896 addend -= htab->elf.tls_sec->vma + DTP_OFFSET;
10897 /* Fall thru */
10898
10899 /* Relocations that may need to be propagated if this is a
10900 dynamic object. */
10901 case R_PPC64_REL30:
10902 case R_PPC64_REL32:
10903 case R_PPC64_REL64:
10904 case R_PPC64_ADDR14:
10905 case R_PPC64_ADDR14_BRNTAKEN:
10906 case R_PPC64_ADDR14_BRTAKEN:
10907 case R_PPC64_ADDR16:
10908 case R_PPC64_ADDR16_DS:
10909 case R_PPC64_ADDR16_HA:
10910 case R_PPC64_ADDR16_HI:
10911 case R_PPC64_ADDR16_HIGHER:
10912 case R_PPC64_ADDR16_HIGHERA:
10913 case R_PPC64_ADDR16_HIGHEST:
10914 case R_PPC64_ADDR16_HIGHESTA:
10915 case R_PPC64_ADDR16_LO:
10916 case R_PPC64_ADDR16_LO_DS:
10917 case R_PPC64_ADDR24:
10918 case R_PPC64_ADDR32:
10919 case R_PPC64_ADDR64:
10920 case R_PPC64_UADDR16:
10921 case R_PPC64_UADDR32:
10922 case R_PPC64_UADDR64:
10923 dodyn:
10924 if ((input_section->flags & SEC_ALLOC) == 0)
10925 break;
10926
10927 if (NO_OPD_RELOCS && is_opd)
10928 break;
10929
10930 if ((info->shared
10931 && (h == NULL
10932 || ELF_ST_VISIBILITY (h->elf.other) == STV_DEFAULT
10933 || h->elf.root.type != bfd_link_hash_undefweak)
10934 && (MUST_BE_DYN_RELOC (r_type)
10935 || !SYMBOL_CALLS_LOCAL (info, &h->elf)))
10936 || (ELIMINATE_COPY_RELOCS
10937 && !info->shared
10938 && h != NULL
10939 && h->elf.dynindx != -1
10940 && !h->elf.non_got_ref
10941 && h->elf.def_dynamic
10942 && !h->elf.def_regular))
10943 {
10944 Elf_Internal_Rela outrel;
10945 bfd_boolean skip, relocate;
10946 asection *sreloc;
10947 bfd_byte *loc;
10948 bfd_vma out_off;
10949
10950 /* When generating a dynamic object, these relocations
10951 are copied into the output file to be resolved at run
10952 time. */
10953
10954 skip = FALSE;
10955 relocate = FALSE;
10956
10957 out_off = _bfd_elf_section_offset (output_bfd, info,
10958 input_section, rel->r_offset);
10959 if (out_off == (bfd_vma) -1)
10960 skip = TRUE;
10961 else if (out_off == (bfd_vma) -2)
10962 skip = TRUE, relocate = TRUE;
10963 out_off += (input_section->output_section->vma
10964 + input_section->output_offset);
10965 outrel.r_offset = out_off;
10966 outrel.r_addend = rel->r_addend;
10967
10968 /* Optimize unaligned reloc use. */
10969 if ((r_type == R_PPC64_ADDR64 && (out_off & 7) != 0)
10970 || (r_type == R_PPC64_UADDR64 && (out_off & 7) == 0))
10971 r_type ^= R_PPC64_ADDR64 ^ R_PPC64_UADDR64;
10972 else if ((r_type == R_PPC64_ADDR32 && (out_off & 3) != 0)
10973 || (r_type == R_PPC64_UADDR32 && (out_off & 3) == 0))
10974 r_type ^= R_PPC64_ADDR32 ^ R_PPC64_UADDR32;
10975 else if ((r_type == R_PPC64_ADDR16 && (out_off & 1) != 0)
10976 || (r_type == R_PPC64_UADDR16 && (out_off & 1) == 0))
10977 r_type ^= R_PPC64_ADDR16 ^ R_PPC64_UADDR16;
10978
10979 if (skip)
10980 memset (&outrel, 0, sizeof outrel);
10981 else if (!SYMBOL_REFERENCES_LOCAL (info, &h->elf)
10982 && !is_opd
10983 && r_type != R_PPC64_TOC)
10984 outrel.r_info = ELF64_R_INFO (h->elf.dynindx, r_type);
10985 else
10986 {
10987 /* This symbol is local, or marked to become local,
10988 or this is an opd section reloc which must point
10989 at a local function. */
10990 outrel.r_addend += relocation;
10991 if (r_type == R_PPC64_ADDR64 || r_type == R_PPC64_TOC)
10992 {
10993 if (is_opd && h != NULL)
10994 {
10995 /* Lie about opd entries. This case occurs
10996 when building shared libraries and we
10997 reference a function in another shared
10998 lib. The same thing happens for a weak
10999 definition in an application that's
11000 overridden by a strong definition in a
11001 shared lib. (I believe this is a generic
11002 bug in binutils handling of weak syms.)
11003 In these cases we won't use the opd
11004 entry in this lib. */
11005 unresolved_reloc = FALSE;
11006 }
11007 outrel.r_info = ELF64_R_INFO (0, R_PPC64_RELATIVE);
11008
11009 /* We need to relocate .opd contents for ld.so.
11010 Prelink also wants simple and consistent rules
11011 for relocs. This make all RELATIVE relocs have
11012 *r_offset equal to r_addend. */
11013 relocate = TRUE;
11014 }
11015 else
11016 {
11017 long indx = 0;
11018
11019 if (bfd_is_abs_section (sec))
11020 ;
11021 else if (sec == NULL || sec->owner == NULL)
11022 {
11023 bfd_set_error (bfd_error_bad_value);
11024 return FALSE;
11025 }
11026 else
11027 {
11028 asection *osec;
11029
11030 osec = sec->output_section;
11031 indx = elf_section_data (osec)->dynindx;
11032
11033 if (indx == 0)
11034 {
11035 if ((osec->flags & SEC_READONLY) == 0
11036 && htab->elf.data_index_section != NULL)
11037 osec = htab->elf.data_index_section;
11038 else
11039 osec = htab->elf.text_index_section;
11040 indx = elf_section_data (osec)->dynindx;
11041 }
11042 BFD_ASSERT (indx != 0);
11043
11044 /* We are turning this relocation into one
11045 against a section symbol, so subtract out
11046 the output section's address but not the
11047 offset of the input section in the output
11048 section. */
11049 outrel.r_addend -= osec->vma;
11050 }
11051
11052 outrel.r_info = ELF64_R_INFO (indx, r_type);
11053 }
11054 }
11055
11056 sreloc = elf_section_data (input_section)->sreloc;
11057 if (sreloc == NULL)
11058 abort ();
11059
11060 if (sreloc->reloc_count * sizeof (Elf64_External_Rela)
11061 >= sreloc->size)
11062 abort ();
11063 loc = sreloc->contents;
11064 loc += sreloc->reloc_count++ * sizeof (Elf64_External_Rela);
11065 bfd_elf64_swap_reloca_out (output_bfd, &outrel, loc);
11066
11067 /* If this reloc is against an external symbol, it will
11068 be computed at runtime, so there's no need to do
11069 anything now. However, for the sake of prelink ensure
11070 that the section contents are a known value. */
11071 if (! relocate)
11072 {
11073 unresolved_reloc = FALSE;
11074 /* The value chosen here is quite arbitrary as ld.so
11075 ignores section contents except for the special
11076 case of .opd where the contents might be accessed
11077 before relocation. Choose zero, as that won't
11078 cause reloc overflow. */
11079 relocation = 0;
11080 addend = 0;
11081 /* Use *r_offset == r_addend for R_PPC64_ADDR64 relocs
11082 to improve backward compatibility with older
11083 versions of ld. */
11084 if (r_type == R_PPC64_ADDR64)
11085 addend = outrel.r_addend;
11086 /* Adjust pc_relative relocs to have zero in *r_offset. */
11087 else if (ppc64_elf_howto_table[r_type]->pc_relative)
11088 addend = (input_section->output_section->vma
11089 + input_section->output_offset
11090 + rel->r_offset);
11091 }
11092 }
11093 break;
11094
11095 case R_PPC64_COPY:
11096 case R_PPC64_GLOB_DAT:
11097 case R_PPC64_JMP_SLOT:
11098 case R_PPC64_RELATIVE:
11099 /* We shouldn't ever see these dynamic relocs in relocatable
11100 files. */
11101 /* Fall through. */
11102
11103 case R_PPC64_PLTGOT16:
11104 case R_PPC64_PLTGOT16_DS:
11105 case R_PPC64_PLTGOT16_HA:
11106 case R_PPC64_PLTGOT16_HI:
11107 case R_PPC64_PLTGOT16_LO:
11108 case R_PPC64_PLTGOT16_LO_DS:
11109 case R_PPC64_PLTREL32:
11110 case R_PPC64_PLTREL64:
11111 /* These ones haven't been implemented yet. */
11112
11113 (*_bfd_error_handler)
11114 (_("%B: relocation %s is not supported for symbol %s."),
11115 input_bfd,
11116 ppc64_elf_howto_table[r_type]->name, sym_name);
11117
11118 bfd_set_error (bfd_error_invalid_operation);
11119 ret = FALSE;
11120 continue;
11121 }
11122
11123 /* Do any further special processing. */
11124 switch (r_type)
11125 {
11126 default:
11127 break;
11128
11129 case R_PPC64_ADDR16_HA:
11130 case R_PPC64_ADDR16_HIGHERA:
11131 case R_PPC64_ADDR16_HIGHESTA:
11132 case R_PPC64_TOC16_HA:
11133 case R_PPC64_SECTOFF_HA:
11134 case R_PPC64_TPREL16_HA:
11135 case R_PPC64_DTPREL16_HA:
11136 case R_PPC64_TPREL16_HIGHER:
11137 case R_PPC64_TPREL16_HIGHERA:
11138 case R_PPC64_TPREL16_HIGHEST:
11139 case R_PPC64_TPREL16_HIGHESTA:
11140 case R_PPC64_DTPREL16_HIGHER:
11141 case R_PPC64_DTPREL16_HIGHERA:
11142 case R_PPC64_DTPREL16_HIGHEST:
11143 case R_PPC64_DTPREL16_HIGHESTA:
11144 /* It's just possible that this symbol is a weak symbol
11145 that's not actually defined anywhere. In that case,
11146 'sec' would be NULL, and we should leave the symbol
11147 alone (it will be set to zero elsewhere in the link). */
11148 if (sec == NULL)
11149 break;
11150 /* Fall thru */
11151
11152 case R_PPC64_GOT16_HA:
11153 case R_PPC64_PLTGOT16_HA:
11154 case R_PPC64_PLT16_HA:
11155 case R_PPC64_GOT_TLSGD16_HA:
11156 case R_PPC64_GOT_TLSLD16_HA:
11157 case R_PPC64_GOT_TPREL16_HA:
11158 case R_PPC64_GOT_DTPREL16_HA:
11159 /* Add 0x10000 if sign bit in 0:15 is set.
11160 Bits 0:15 are not used. */
11161 addend += 0x8000;
11162 break;
11163
11164 case R_PPC64_ADDR16_DS:
11165 case R_PPC64_ADDR16_LO_DS:
11166 case R_PPC64_GOT16_DS:
11167 case R_PPC64_GOT16_LO_DS:
11168 case R_PPC64_PLT16_LO_DS:
11169 case R_PPC64_SECTOFF_DS:
11170 case R_PPC64_SECTOFF_LO_DS:
11171 case R_PPC64_TOC16_DS:
11172 case R_PPC64_TOC16_LO_DS:
11173 case R_PPC64_PLTGOT16_DS:
11174 case R_PPC64_PLTGOT16_LO_DS:
11175 case R_PPC64_GOT_TPREL16_DS:
11176 case R_PPC64_GOT_TPREL16_LO_DS:
11177 case R_PPC64_GOT_DTPREL16_DS:
11178 case R_PPC64_GOT_DTPREL16_LO_DS:
11179 case R_PPC64_TPREL16_DS:
11180 case R_PPC64_TPREL16_LO_DS:
11181 case R_PPC64_DTPREL16_DS:
11182 case R_PPC64_DTPREL16_LO_DS:
11183 insn = bfd_get_32 (input_bfd, contents + (rel->r_offset & ~3));
11184 mask = 3;
11185 /* If this reloc is against an lq insn, then the value must be
11186 a multiple of 16. This is somewhat of a hack, but the
11187 "correct" way to do this by defining _DQ forms of all the
11188 _DS relocs bloats all reloc switches in this file. It
11189 doesn't seem to make much sense to use any of these relocs
11190 in data, so testing the insn should be safe. */
11191 if ((insn & (0x3f << 26)) == (56u << 26))
11192 mask = 15;
11193 if (((relocation + addend) & mask) != 0)
11194 {
11195 (*_bfd_error_handler)
11196 (_("%B: error: relocation %s not a multiple of %d"),
11197 input_bfd,
11198 ppc64_elf_howto_table[r_type]->name,
11199 mask + 1);
11200 bfd_set_error (bfd_error_bad_value);
11201 ret = FALSE;
11202 continue;
11203 }
11204 break;
11205 }
11206
11207 /* Dynamic relocs are not propagated for SEC_DEBUGGING sections
11208 because such sections are not SEC_ALLOC and thus ld.so will
11209 not process them. */
11210 if (unresolved_reloc
11211 && !((input_section->flags & SEC_DEBUGGING) != 0
11212 && h->elf.def_dynamic))
11213 {
11214 (*_bfd_error_handler)
11215 (_("%B(%A+0x%lx): unresolvable %s relocation against symbol `%s'"),
11216 input_bfd,
11217 input_section,
11218 (long) rel->r_offset,
11219 ppc64_elf_howto_table[(int) r_type]->name,
11220 h->elf.root.root.string);
11221 ret = FALSE;
11222 }
11223
11224 r = _bfd_final_link_relocate (ppc64_elf_howto_table[(int) r_type],
11225 input_bfd,
11226 input_section,
11227 contents,
11228 rel->r_offset,
11229 relocation,
11230 addend);
11231
11232 if (r != bfd_reloc_ok)
11233 {
11234 if (sym_name == NULL)
11235 sym_name = "(null)";
11236 if (r == bfd_reloc_overflow)
11237 {
11238 if (warned)
11239 continue;
11240 if (h != NULL
11241 && h->elf.root.type == bfd_link_hash_undefweak
11242 && ppc64_elf_howto_table[r_type]->pc_relative)
11243 {
11244 /* Assume this is a call protected by other code that
11245 detects the symbol is undefined. If this is the case,
11246 we can safely ignore the overflow. If not, the
11247 program is hosed anyway, and a little warning isn't
11248 going to help. */
11249
11250 continue;
11251 }
11252
11253 if (!((*info->callbacks->reloc_overflow)
11254 (info, (h ? &h->elf.root : NULL), sym_name,
11255 ppc64_elf_howto_table[r_type]->name,
11256 orig_addend, input_bfd, input_section, rel->r_offset)))
11257 return FALSE;
11258 }
11259 else
11260 {
11261 (*_bfd_error_handler)
11262 (_("%B(%A+0x%lx): %s reloc against `%s': error %d"),
11263 input_bfd,
11264 input_section,
11265 (long) rel->r_offset,
11266 ppc64_elf_howto_table[r_type]->name,
11267 sym_name,
11268 (int) r);
11269 ret = FALSE;
11270 }
11271 }
11272 }
11273
11274 /* If we're emitting relocations, then shortly after this function
11275 returns, reloc offsets and addends for this section will be
11276 adjusted. Worse, reloc symbol indices will be for the output
11277 file rather than the input. Save a copy of the relocs for
11278 opd_entry_value. */
11279 if (is_opd && (info->emitrelocations || info->relocatable))
11280 {
11281 bfd_size_type amt;
11282 amt = input_section->reloc_count * sizeof (Elf_Internal_Rela);
11283 rel = bfd_alloc (input_bfd, amt);
11284 BFD_ASSERT (ppc64_elf_tdata (input_bfd)->opd_relocs == NULL);
11285 ppc64_elf_tdata (input_bfd)->opd_relocs = rel;
11286 if (rel == NULL)
11287 return FALSE;
11288 memcpy (rel, relocs, amt);
11289 }
11290 return ret;
11291 }
11292
11293 /* Adjust the value of any local symbols in opd sections. */
11294
11295 static bfd_boolean
11296 ppc64_elf_output_symbol_hook (struct bfd_link_info *info,
11297 const char *name ATTRIBUTE_UNUSED,
11298 Elf_Internal_Sym *elfsym,
11299 asection *input_sec,
11300 struct elf_link_hash_entry *h)
11301 {
11302 long *opd_adjust, adjust;
11303 bfd_vma value;
11304
11305 if (h != NULL)
11306 return TRUE;
11307
11308 opd_adjust = get_opd_info (input_sec);
11309 if (opd_adjust == NULL)
11310 return TRUE;
11311
11312 value = elfsym->st_value - input_sec->output_offset;
11313 if (!info->relocatable)
11314 value -= input_sec->output_section->vma;
11315
11316 adjust = opd_adjust[value / 8];
11317 if (adjust == -1)
11318 elfsym->st_value = 0;
11319 else
11320 elfsym->st_value += adjust;
11321 return TRUE;
11322 }
11323
11324 /* Finish up dynamic symbol handling. We set the contents of various
11325 dynamic sections here. */
11326
11327 static bfd_boolean
11328 ppc64_elf_finish_dynamic_symbol (bfd *output_bfd,
11329 struct bfd_link_info *info,
11330 struct elf_link_hash_entry *h,
11331 Elf_Internal_Sym *sym)
11332 {
11333 struct ppc_link_hash_table *htab;
11334 struct plt_entry *ent;
11335 Elf_Internal_Rela rela;
11336 bfd_byte *loc;
11337
11338 htab = ppc_hash_table (info);
11339
11340 for (ent = h->plt.plist; ent != NULL; ent = ent->next)
11341 if (ent->plt.offset != (bfd_vma) -1)
11342 {
11343 /* This symbol has an entry in the procedure linkage
11344 table. Set it up. */
11345
11346 if (htab->plt == NULL
11347 || htab->relplt == NULL
11348 || htab->glink == NULL)
11349 abort ();
11350
11351 /* Create a JMP_SLOT reloc to inform the dynamic linker to
11352 fill in the PLT entry. */
11353 rela.r_offset = (htab->plt->output_section->vma
11354 + htab->plt->output_offset
11355 + ent->plt.offset);
11356 rela.r_info = ELF64_R_INFO (h->dynindx, R_PPC64_JMP_SLOT);
11357 rela.r_addend = ent->addend;
11358
11359 loc = htab->relplt->contents;
11360 loc += ((ent->plt.offset - PLT_INITIAL_ENTRY_SIZE) / PLT_ENTRY_SIZE
11361 * sizeof (Elf64_External_Rela));
11362 bfd_elf64_swap_reloca_out (output_bfd, &rela, loc);
11363 }
11364
11365 if (h->needs_copy)
11366 {
11367 Elf_Internal_Rela rela;
11368 bfd_byte *loc;
11369
11370 /* This symbol needs a copy reloc. Set it up. */
11371
11372 if (h->dynindx == -1
11373 || (h->root.type != bfd_link_hash_defined
11374 && h->root.type != bfd_link_hash_defweak)
11375 || htab->relbss == NULL)
11376 abort ();
11377
11378 rela.r_offset = (h->root.u.def.value
11379 + h->root.u.def.section->output_section->vma
11380 + h->root.u.def.section->output_offset);
11381 rela.r_info = ELF64_R_INFO (h->dynindx, R_PPC64_COPY);
11382 rela.r_addend = 0;
11383 loc = htab->relbss->contents;
11384 loc += htab->relbss->reloc_count++ * sizeof (Elf64_External_Rela);
11385 bfd_elf64_swap_reloca_out (output_bfd, &rela, loc);
11386 }
11387
11388 /* Mark some specially defined symbols as absolute. */
11389 if (strcmp (h->root.root.string, "_DYNAMIC") == 0)
11390 sym->st_shndx = SHN_ABS;
11391
11392 return TRUE;
11393 }
11394
11395 /* Used to decide how to sort relocs in an optimal manner for the
11396 dynamic linker, before writing them out. */
11397
11398 static enum elf_reloc_type_class
11399 ppc64_elf_reloc_type_class (const Elf_Internal_Rela *rela)
11400 {
11401 enum elf_ppc64_reloc_type r_type;
11402
11403 r_type = ELF64_R_TYPE (rela->r_info);
11404 switch (r_type)
11405 {
11406 case R_PPC64_RELATIVE:
11407 return reloc_class_relative;
11408 case R_PPC64_JMP_SLOT:
11409 return reloc_class_plt;
11410 case R_PPC64_COPY:
11411 return reloc_class_copy;
11412 default:
11413 return reloc_class_normal;
11414 }
11415 }
11416
11417 /* Finish up the dynamic sections. */
11418
11419 static bfd_boolean
11420 ppc64_elf_finish_dynamic_sections (bfd *output_bfd,
11421 struct bfd_link_info *info)
11422 {
11423 struct ppc_link_hash_table *htab;
11424 bfd *dynobj;
11425 asection *sdyn;
11426
11427 htab = ppc_hash_table (info);
11428 dynobj = htab->elf.dynobj;
11429 sdyn = bfd_get_section_by_name (dynobj, ".dynamic");
11430
11431 if (htab->elf.dynamic_sections_created)
11432 {
11433 Elf64_External_Dyn *dyncon, *dynconend;
11434
11435 if (sdyn == NULL || htab->got == NULL)
11436 abort ();
11437
11438 dyncon = (Elf64_External_Dyn *) sdyn->contents;
11439 dynconend = (Elf64_External_Dyn *) (sdyn->contents + sdyn->size);
11440 for (; dyncon < dynconend; dyncon++)
11441 {
11442 Elf_Internal_Dyn dyn;
11443 asection *s;
11444
11445 bfd_elf64_swap_dyn_in (dynobj, dyncon, &dyn);
11446
11447 switch (dyn.d_tag)
11448 {
11449 default:
11450 continue;
11451
11452 case DT_PPC64_GLINK:
11453 s = htab->glink;
11454 dyn.d_un.d_ptr = s->output_section->vma + s->output_offset;
11455 /* We stupidly defined DT_PPC64_GLINK to be the start
11456 of glink rather than the first entry point, which is
11457 what ld.so needs, and now have a bigger stub to
11458 support automatic multiple TOCs. */
11459 dyn.d_un.d_ptr += GLINK_CALL_STUB_SIZE - 32;
11460 break;
11461
11462 case DT_PPC64_OPD:
11463 s = bfd_get_section_by_name (output_bfd, ".opd");
11464 if (s == NULL)
11465 continue;
11466 dyn.d_un.d_ptr = s->vma;
11467 break;
11468
11469 case DT_PPC64_OPDSZ:
11470 s = bfd_get_section_by_name (output_bfd, ".opd");
11471 if (s == NULL)
11472 continue;
11473 dyn.d_un.d_val = s->size;
11474 break;
11475
11476 case DT_PLTGOT:
11477 s = htab->plt;
11478 dyn.d_un.d_ptr = s->output_section->vma + s->output_offset;
11479 break;
11480
11481 case DT_JMPREL:
11482 s = htab->relplt;
11483 dyn.d_un.d_ptr = s->output_section->vma + s->output_offset;
11484 break;
11485
11486 case DT_PLTRELSZ:
11487 dyn.d_un.d_val = htab->relplt->size;
11488 break;
11489
11490 case DT_RELASZ:
11491 /* Don't count procedure linkage table relocs in the
11492 overall reloc count. */
11493 s = htab->relplt;
11494 if (s == NULL)
11495 continue;
11496 dyn.d_un.d_val -= s->size;
11497 break;
11498
11499 case DT_RELA:
11500 /* We may not be using the standard ELF linker script.
11501 If .rela.plt is the first .rela section, we adjust
11502 DT_RELA to not include it. */
11503 s = htab->relplt;
11504 if (s == NULL)
11505 continue;
11506 if (dyn.d_un.d_ptr != s->output_section->vma + s->output_offset)
11507 continue;
11508 dyn.d_un.d_ptr += s->size;
11509 break;
11510 }
11511
11512 bfd_elf64_swap_dyn_out (output_bfd, &dyn, dyncon);
11513 }
11514 }
11515
11516 if (htab->got != NULL && htab->got->size != 0)
11517 {
11518 /* Fill in the first entry in the global offset table.
11519 We use it to hold the link-time TOCbase. */
11520 bfd_put_64 (output_bfd,
11521 elf_gp (output_bfd) + TOC_BASE_OFF,
11522 htab->got->contents);
11523
11524 /* Set .got entry size. */
11525 elf_section_data (htab->got->output_section)->this_hdr.sh_entsize = 8;
11526 }
11527
11528 if (htab->plt != NULL && htab->plt->size != 0)
11529 {
11530 /* Set .plt entry size. */
11531 elf_section_data (htab->plt->output_section)->this_hdr.sh_entsize
11532 = PLT_ENTRY_SIZE;
11533 }
11534
11535 /* brlt is SEC_LINKER_CREATED, so we need to write out relocs for
11536 brlt ourselves if emitrelocations. */
11537 if (htab->brlt != NULL
11538 && htab->brlt->reloc_count != 0
11539 && !_bfd_elf_link_output_relocs (output_bfd,
11540 htab->brlt,
11541 &elf_section_data (htab->brlt)->rel_hdr,
11542 elf_section_data (htab->brlt)->relocs,
11543 NULL))
11544 return FALSE;
11545
11546 /* We need to handle writing out multiple GOT sections ourselves,
11547 since we didn't add them to DYNOBJ. We know dynobj is the first
11548 bfd. */
11549 while ((dynobj = dynobj->link_next) != NULL)
11550 {
11551 asection *s;
11552
11553 if (!is_ppc64_elf_target (dynobj->xvec))
11554 continue;
11555
11556 s = ppc64_elf_tdata (dynobj)->got;
11557 if (s != NULL
11558 && s->size != 0
11559 && s->output_section != bfd_abs_section_ptr
11560 && !bfd_set_section_contents (output_bfd, s->output_section,
11561 s->contents, s->output_offset,
11562 s->size))
11563 return FALSE;
11564 s = ppc64_elf_tdata (dynobj)->relgot;
11565 if (s != NULL
11566 && s->size != 0
11567 && s->output_section != bfd_abs_section_ptr
11568 && !bfd_set_section_contents (output_bfd, s->output_section,
11569 s->contents, s->output_offset,
11570 s->size))
11571 return FALSE;
11572 }
11573
11574 return TRUE;
11575 }
11576
11577 #include "elf64-target.h"
This page took 0.297648 seconds and 4 git commands to generate.