]> git.ipfire.org Git - thirdparty/binutils-gdb.git/blob - bfd/elf32-ppc.c
Add startswith function and use it instead of CONST_STRNEQ.
[thirdparty/binutils-gdb.git] / bfd / elf32-ppc.c
1 /* PowerPC-specific support for 32-bit ELF
2 Copyright (C) 1994-2021 Free Software Foundation, Inc.
3 Written by Ian Lance Taylor, Cygnus Support.
4
5 This file is part of BFD, the Binary File Descriptor library.
6
7 This program is free software; you can redistribute it and/or modify
8 it under the terms of the GNU General Public License as published by
9 the Free Software Foundation; either version 3 of the License, or
10 (at your option) any later version.
11
12 This program is distributed in the hope that it will be useful,
13 but WITHOUT ANY WARRANTY; without even the implied warranty of
14 MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
15 GNU General Public License for more details.
16
17 You should have received a copy of the GNU General Public License
18 along with this program; if not, write to the
19 Free Software Foundation, Inc., 51 Franklin Street - Fifth Floor,
20 Boston, MA 02110-1301, USA. */
21
22 /* Don't generate unused section symbols. */
23 #define TARGET_KEEP_UNUSED_SECTION_SYMBOLS FALSE
24
25 #include "sysdep.h"
26 #include <stdarg.h>
27 #include "bfd.h"
28 #include "bfdlink.h"
29 #include "libbfd.h"
30 #include "elf-bfd.h"
31 #include "elf/ppc.h"
32 #include "elf32-ppc.h"
33 #include "elf-vxworks.h"
34 #include "dwarf2.h"
35 #include "opcode/ppc.h"
36
37 /* All users of this file have bfd_octets_per_byte (abfd, sec) == 1. */
38 #define OCTETS_PER_BYTE(ABFD, SEC) 1
39
40 typedef enum split16_format_type
41 {
42 split16a_type = 0,
43 split16d_type
44 }
45 split16_format_type;
46
47 /* RELA relocations are used here. */
48
49 static bfd_reloc_status_type ppc_elf_addr16_ha_reloc
50 (bfd *, arelent *, asymbol *, void *, asection *, bfd *, char **);
51 static bfd_reloc_status_type ppc_elf_unhandled_reloc
52 (bfd *, arelent *, asymbol *, void *, asection *, bfd *, char **);
53
54 /* Branch prediction bit for branch taken relocs. */
55 #define BRANCH_PREDICT_BIT 0x200000
56 /* Mask to set RA in memory instructions. */
57 #define RA_REGISTER_MASK 0x001f0000
58 /* Value to shift register by to insert RA. */
59 #define RA_REGISTER_SHIFT 16
60
61 /* The name of the dynamic interpreter. This is put in the .interp
62 section. */
63 #define ELF_DYNAMIC_INTERPRETER "/usr/lib/ld.so.1"
64
65 /* For old-style PLT. */
66 /* The number of single-slot PLT entries (the rest use two slots). */
67 #define PLT_NUM_SINGLE_ENTRIES 8192
68
69 /* For new-style .glink and .plt. */
70 #define GLINK_PLTRESOLVE 16*4
71 #define GLINK_ENTRY_SIZE(htab, h) \
72 ((4*4 \
73 + (h != NULL \
74 && h == htab->tls_get_addr \
75 && !htab->params->no_tls_get_addr_opt ? 8*4 : 0) \
76 + (1u << htab->params->plt_stub_align) - 1) \
77 & -(1u << htab->params->plt_stub_align))
78
79 /* VxWorks uses its own plt layout, filled in by the static linker. */
80
81 /* The standard VxWorks PLT entry. */
82 #define VXWORKS_PLT_ENTRY_SIZE 32
83 static const bfd_vma ppc_elf_vxworks_plt_entry
84 [VXWORKS_PLT_ENTRY_SIZE / 4] =
85 {
86 0x3d800000, /* lis r12,0 */
87 0x818c0000, /* lwz r12,0(r12) */
88 0x7d8903a6, /* mtctr r12 */
89 0x4e800420, /* bctr */
90 0x39600000, /* li r11,0 */
91 0x48000000, /* b 14 <.PLT0resolve+0x4> */
92 0x60000000, /* nop */
93 0x60000000, /* nop */
94 };
95 static const bfd_vma ppc_elf_vxworks_pic_plt_entry
96 [VXWORKS_PLT_ENTRY_SIZE / 4] =
97 {
98 0x3d9e0000, /* addis r12,r30,0 */
99 0x818c0000, /* lwz r12,0(r12) */
100 0x7d8903a6, /* mtctr r12 */
101 0x4e800420, /* bctr */
102 0x39600000, /* li r11,0 */
103 0x48000000, /* b 14 <.PLT0resolve+0x4> 14: R_PPC_REL24 .PLTresolve */
104 0x60000000, /* nop */
105 0x60000000, /* nop */
106 };
107
108 /* The initial VxWorks PLT entry. */
109 #define VXWORKS_PLT_INITIAL_ENTRY_SIZE 32
110 static const bfd_vma ppc_elf_vxworks_plt0_entry
111 [VXWORKS_PLT_INITIAL_ENTRY_SIZE / 4] =
112 {
113 0x3d800000, /* lis r12,0 */
114 0x398c0000, /* addi r12,r12,0 */
115 0x800c0008, /* lwz r0,8(r12) */
116 0x7c0903a6, /* mtctr r0 */
117 0x818c0004, /* lwz r12,4(r12) */
118 0x4e800420, /* bctr */
119 0x60000000, /* nop */
120 0x60000000, /* nop */
121 };
122 static const bfd_vma ppc_elf_vxworks_pic_plt0_entry
123 [VXWORKS_PLT_INITIAL_ENTRY_SIZE / 4] =
124 {
125 0x819e0008, /* lwz r12,8(r30) */
126 0x7d8903a6, /* mtctr r12 */
127 0x819e0004, /* lwz r12,4(r30) */
128 0x4e800420, /* bctr */
129 0x60000000, /* nop */
130 0x60000000, /* nop */
131 0x60000000, /* nop */
132 0x60000000, /* nop */
133 };
134
135 /* For executables, we have some additional relocations in
136 .rela.plt.unloaded, for the kernel loader. */
137
138 /* The number of non-JMP_SLOT relocations per PLT0 slot. */
139 #define VXWORKS_PLT_NON_JMP_SLOT_RELOCS 3
140 /* The number of relocations in the PLTResolve slot. */
141 #define VXWORKS_PLTRESOLVE_RELOCS 2
142 /* The number of relocations in the PLTResolve slot when creating
143 a shared library. */
144 #define VXWORKS_PLTRESOLVE_RELOCS_SHLIB 0
145
146 /* Some instructions. */
147 #define ADDIS_11_11 0x3d6b0000
148 #define ADDIS_11_30 0x3d7e0000
149 #define ADDIS_12_12 0x3d8c0000
150 #define ADDI_11_11 0x396b0000
151 #define ADD_0_11_11 0x7c0b5a14
152 #define ADD_3_12_2 0x7c6c1214
153 #define ADD_11_0_11 0x7d605a14
154 #define B 0x48000000
155 #define BA 0x48000002
156 #define BCL_20_31 0x429f0005
157 #define BCTR 0x4e800420
158 #define BEQLR 0x4d820020
159 #define CMPWI_11_0 0x2c0b0000
160 #define LIS_11 0x3d600000
161 #define LIS_12 0x3d800000
162 #define LWZU_0_12 0x840c0000
163 #define LWZ_0_12 0x800c0000
164 #define LWZ_11_3 0x81630000
165 #define LWZ_11_11 0x816b0000
166 #define LWZ_11_30 0x817e0000
167 #define LWZ_12_3 0x81830000
168 #define LWZ_12_12 0x818c0000
169 #define MR_0_3 0x7c601b78
170 #define MR_3_0 0x7c030378
171 #define MFLR_0 0x7c0802a6
172 #define MFLR_12 0x7d8802a6
173 #define MTCTR_0 0x7c0903a6
174 #define MTCTR_11 0x7d6903a6
175 #define MTLR_0 0x7c0803a6
176 #define NOP 0x60000000
177 #define SUB_11_11_12 0x7d6c5850
178
179 /* Offset of tp and dtp pointers from start of TLS block. */
180 #define TP_OFFSET 0x7000
181 #define DTP_OFFSET 0x8000
182
183 /* The value of a defined global symbol. */
184 #define SYM_VAL(SYM) \
185 ((SYM)->root.u.def.section->output_section->vma \
186 + (SYM)->root.u.def.section->output_offset \
187 + (SYM)->root.u.def.value)
188 \f
189 /* Relocation HOWTO's. */
190 /* Like other ELF RELA targets that don't apply multiple
191 field-altering relocations to the same localation, src_mask is
192 always zero and pcrel_offset is the same as pc_relative.
193 PowerPC can always use a zero bitpos, even when the field is not at
194 the LSB. For example, a REL24 could use rightshift=2, bisize=24
195 and bitpos=2 which matches the ABI description, or as we do here,
196 rightshift=0, bitsize=26 and bitpos=0. */
197 #define HOW(type, size, bitsize, mask, rightshift, pc_relative, \
198 complain, special_func) \
199 HOWTO (type, rightshift, size, bitsize, pc_relative, 0, \
200 complain_overflow_ ## complain, special_func, \
201 #type, FALSE, 0, mask, pc_relative)
202
203 static reloc_howto_type *ppc_elf_howto_table[R_PPC_max];
204
205 static reloc_howto_type ppc_elf_howto_raw[] = {
206 /* This reloc does nothing. */
207 HOW (R_PPC_NONE, 3, 0, 0, 0, FALSE, dont,
208 bfd_elf_generic_reloc),
209
210 /* A standard 32 bit relocation. */
211 HOW (R_PPC_ADDR32, 2, 32, 0xffffffff, 0, FALSE, dont,
212 bfd_elf_generic_reloc),
213
214 /* An absolute 26 bit branch; the lower two bits must be zero.
215 FIXME: we don't check that, we just clear them. */
216 HOW (R_PPC_ADDR24, 2, 26, 0x3fffffc, 0, FALSE, signed,
217 bfd_elf_generic_reloc),
218
219 /* A standard 16 bit relocation. */
220 HOW (R_PPC_ADDR16, 1, 16, 0xffff, 0, FALSE, bitfield,
221 bfd_elf_generic_reloc),
222
223 /* A 16 bit relocation without overflow. */
224 HOW (R_PPC_ADDR16_LO, 1, 16, 0xffff, 0, FALSE, dont,
225 bfd_elf_generic_reloc),
226
227 /* The high order 16 bits of an address. */
228 HOW (R_PPC_ADDR16_HI, 1, 16, 0xffff, 16, FALSE, dont,
229 bfd_elf_generic_reloc),
230
231 /* The high order 16 bits of an address, plus 1 if the contents of
232 the low 16 bits, treated as a signed number, is negative. */
233 HOW (R_PPC_ADDR16_HA, 1, 16, 0xffff, 16, FALSE, dont,
234 ppc_elf_addr16_ha_reloc),
235
236 /* An absolute 16 bit branch; the lower two bits must be zero.
237 FIXME: we don't check that, we just clear them. */
238 HOW (R_PPC_ADDR14, 2, 16, 0xfffc, 0, FALSE, signed,
239 bfd_elf_generic_reloc),
240
241 /* An absolute 16 bit branch, for which bit 10 should be set to
242 indicate that the branch is expected to be taken. The lower two
243 bits must be zero. */
244 HOW (R_PPC_ADDR14_BRTAKEN, 2, 16, 0xfffc, 0, FALSE, signed,
245 bfd_elf_generic_reloc),
246
247 /* An absolute 16 bit branch, for which bit 10 should be set to
248 indicate that the branch is not expected to be taken. The lower
249 two bits must be zero. */
250 HOW (R_PPC_ADDR14_BRNTAKEN, 2, 16, 0xfffc, 0, FALSE, signed,
251 bfd_elf_generic_reloc),
252
253 /* A relative 26 bit branch; the lower two bits must be zero. */
254 HOW (R_PPC_REL24, 2, 26, 0x3fffffc, 0, TRUE, signed,
255 bfd_elf_generic_reloc),
256
257 /* A relative 16 bit branch; the lower two bits must be zero. */
258 HOW (R_PPC_REL14, 2, 16, 0xfffc, 0, TRUE, signed,
259 bfd_elf_generic_reloc),
260
261 /* A relative 16 bit branch. Bit 10 should be set to indicate that
262 the branch is expected to be taken. The lower two bits must be
263 zero. */
264 HOW (R_PPC_REL14_BRTAKEN, 2, 16, 0xfffc, 0, TRUE, signed,
265 bfd_elf_generic_reloc),
266
267 /* A relative 16 bit branch. Bit 10 should be set to indicate that
268 the branch is not expected to be taken. The lower two bits must
269 be zero. */
270 HOW (R_PPC_REL14_BRNTAKEN, 2, 16, 0xfffc, 0, TRUE, signed,
271 bfd_elf_generic_reloc),
272
273 /* Like R_PPC_ADDR16, but referring to the GOT table entry for the
274 symbol. */
275 HOW (R_PPC_GOT16, 1, 16, 0xffff, 0, FALSE, signed,
276 ppc_elf_unhandled_reloc),
277
278 /* Like R_PPC_ADDR16_LO, but referring to the GOT table entry for
279 the symbol. */
280 HOW (R_PPC_GOT16_LO, 1, 16, 0xffff, 0, FALSE, dont,
281 ppc_elf_unhandled_reloc),
282
283 /* Like R_PPC_ADDR16_HI, but referring to the GOT table entry for
284 the symbol. */
285 HOW (R_PPC_GOT16_HI, 1, 16, 0xffff, 16, FALSE, dont,
286 ppc_elf_unhandled_reloc),
287
288 /* Like R_PPC_ADDR16_HA, but referring to the GOT table entry for
289 the symbol. */
290 HOW (R_PPC_GOT16_HA, 1, 16, 0xffff, 16, FALSE, dont,
291 ppc_elf_unhandled_reloc),
292
293 /* Like R_PPC_REL24, but referring to the procedure linkage table
294 entry for the symbol. */
295 HOW (R_PPC_PLTREL24, 2, 26, 0x3fffffc, 0, TRUE, signed,
296 ppc_elf_unhandled_reloc),
297
298 /* This is used only by the dynamic linker. The symbol should exist
299 both in the object being run and in some shared library. The
300 dynamic linker copies the data addressed by the symbol from the
301 shared library into the object, because the object being
302 run has to have the data at some particular address. */
303 HOW (R_PPC_COPY, 2, 32, 0, 0, FALSE, dont,
304 ppc_elf_unhandled_reloc),
305
306 /* Like R_PPC_ADDR32, but used when setting global offset table
307 entries. */
308 HOW (R_PPC_GLOB_DAT, 2, 32, 0xffffffff, 0, FALSE, dont,
309 ppc_elf_unhandled_reloc),
310
311 /* Marks a procedure linkage table entry for a symbol. */
312 HOW (R_PPC_JMP_SLOT, 2, 32, 0, 0, FALSE, dont,
313 ppc_elf_unhandled_reloc),
314
315 /* Used only by the dynamic linker. When the object is run, this
316 longword is set to the load address of the object, plus the
317 addend. */
318 HOW (R_PPC_RELATIVE, 2, 32, 0xffffffff, 0, FALSE, dont,
319 bfd_elf_generic_reloc),
320
321 /* Like R_PPC_REL24, but uses the value of the symbol within the
322 object rather than the final value. Normally used for
323 _GLOBAL_OFFSET_TABLE_. */
324 HOW (R_PPC_LOCAL24PC, 2, 26, 0x3fffffc, 0, TRUE, signed,
325 bfd_elf_generic_reloc),
326
327 /* Like R_PPC_ADDR32, but may be unaligned. */
328 HOW (R_PPC_UADDR32, 2, 32, 0xffffffff, 0, FALSE, dont,
329 bfd_elf_generic_reloc),
330
331 /* Like R_PPC_ADDR16, but may be unaligned. */
332 HOW (R_PPC_UADDR16, 1, 16, 0xffff, 0, FALSE, bitfield,
333 bfd_elf_generic_reloc),
334
335 /* 32-bit PC relative */
336 HOW (R_PPC_REL32, 2, 32, 0xffffffff, 0, TRUE, dont,
337 bfd_elf_generic_reloc),
338
339 /* 32-bit relocation to the symbol's procedure linkage table.
340 FIXME: not supported. */
341 HOW (R_PPC_PLT32, 2, 32, 0, 0, FALSE, dont,
342 ppc_elf_unhandled_reloc),
343
344 /* 32-bit PC relative relocation to the symbol's procedure linkage table.
345 FIXME: not supported. */
346 HOW (R_PPC_PLTREL32, 2, 32, 0, 0, TRUE, dont,
347 ppc_elf_unhandled_reloc),
348
349 /* Like R_PPC_ADDR16_LO, but referring to the PLT table entry for
350 the symbol. */
351 HOW (R_PPC_PLT16_LO, 1, 16, 0xffff, 0, FALSE, dont,
352 ppc_elf_unhandled_reloc),
353
354 /* Like R_PPC_ADDR16_HI, but referring to the PLT table entry for
355 the symbol. */
356 HOW (R_PPC_PLT16_HI, 1, 16, 0xffff, 16, FALSE, dont,
357 ppc_elf_unhandled_reloc),
358
359 /* Like R_PPC_ADDR16_HA, but referring to the PLT table entry for
360 the symbol. */
361 HOW (R_PPC_PLT16_HA, 1, 16, 0xffff, 16, FALSE, dont,
362 ppc_elf_unhandled_reloc),
363
364 /* A sign-extended 16 bit value relative to _SDA_BASE_, for use with
365 small data items. */
366 HOW (R_PPC_SDAREL16, 1, 16, 0xffff, 0, FALSE, signed,
367 ppc_elf_unhandled_reloc),
368
369 /* 16-bit section relative relocation. */
370 HOW (R_PPC_SECTOFF, 1, 16, 0xffff, 0, FALSE, signed,
371 ppc_elf_unhandled_reloc),
372
373 /* 16-bit lower half section relative relocation. */
374 HOW (R_PPC_SECTOFF_LO, 1, 16, 0xffff, 0, FALSE, dont,
375 ppc_elf_unhandled_reloc),
376
377 /* 16-bit upper half section relative relocation. */
378 HOW (R_PPC_SECTOFF_HI, 1, 16, 0xffff, 16, FALSE, dont,
379 ppc_elf_unhandled_reloc),
380
381 /* 16-bit upper half adjusted section relative relocation. */
382 HOW (R_PPC_SECTOFF_HA, 1, 16, 0xffff, 16, FALSE, dont,
383 ppc_elf_unhandled_reloc),
384
385 /* Marker relocs for TLS. */
386 HOW (R_PPC_TLS, 2, 32, 0, 0, FALSE, dont,
387 bfd_elf_generic_reloc),
388
389 HOW (R_PPC_TLSGD, 2, 32, 0, 0, FALSE, dont,
390 bfd_elf_generic_reloc),
391
392 HOW (R_PPC_TLSLD, 2, 32, 0, 0, FALSE, dont,
393 bfd_elf_generic_reloc),
394
395 /* Marker relocs on inline plt call instructions. */
396 HOW (R_PPC_PLTSEQ, 2, 32, 0, 0, FALSE, dont,
397 bfd_elf_generic_reloc),
398
399 HOW (R_PPC_PLTCALL, 2, 32, 0, 0, FALSE, dont,
400 bfd_elf_generic_reloc),
401
402 /* Computes the load module index of the load module that contains the
403 definition of its TLS sym. */
404 HOW (R_PPC_DTPMOD32, 2, 32, 0xffffffff, 0, FALSE, dont,
405 ppc_elf_unhandled_reloc),
406
407 /* Computes a dtv-relative displacement, the difference between the value
408 of sym+add and the base address of the thread-local storage block that
409 contains the definition of sym, minus 0x8000. */
410 HOW (R_PPC_DTPREL32, 2, 32, 0xffffffff, 0, FALSE, dont,
411 ppc_elf_unhandled_reloc),
412
413 /* A 16 bit dtprel reloc. */
414 HOW (R_PPC_DTPREL16, 1, 16, 0xffff, 0, FALSE, signed,
415 ppc_elf_unhandled_reloc),
416
417 /* Like DTPREL16, but no overflow. */
418 HOW (R_PPC_DTPREL16_LO, 1, 16, 0xffff, 0, FALSE, dont,
419 ppc_elf_unhandled_reloc),
420
421 /* Like DTPREL16_LO, but next higher group of 16 bits. */
422 HOW (R_PPC_DTPREL16_HI, 1, 16, 0xffff, 16, FALSE, dont,
423 ppc_elf_unhandled_reloc),
424
425 /* Like DTPREL16_HI, but adjust for low 16 bits. */
426 HOW (R_PPC_DTPREL16_HA, 1, 16, 0xffff, 16, FALSE, dont,
427 ppc_elf_unhandled_reloc),
428
429 /* Computes a tp-relative displacement, the difference between the value of
430 sym+add and the value of the thread pointer (r13). */
431 HOW (R_PPC_TPREL32, 2, 32, 0xffffffff, 0, FALSE, dont,
432 ppc_elf_unhandled_reloc),
433
434 /* A 16 bit tprel reloc. */
435 HOW (R_PPC_TPREL16, 1, 16, 0xffff, 0, FALSE, signed,
436 ppc_elf_unhandled_reloc),
437
438 /* Like TPREL16, but no overflow. */
439 HOW (R_PPC_TPREL16_LO, 1, 16, 0xffff, 0, FALSE, dont,
440 ppc_elf_unhandled_reloc),
441
442 /* Like TPREL16_LO, but next higher group of 16 bits. */
443 HOW (R_PPC_TPREL16_HI, 1, 16, 0xffff, 16, FALSE, dont,
444 ppc_elf_unhandled_reloc),
445
446 /* Like TPREL16_HI, but adjust for low 16 bits. */
447 HOW (R_PPC_TPREL16_HA, 1, 16, 0xffff, 16, FALSE, dont,
448 ppc_elf_unhandled_reloc),
449
450 /* Allocates two contiguous entries in the GOT to hold a tls_index structure,
451 with values (sym+add)@dtpmod and (sym+add)@dtprel, and computes the offset
452 to the first entry. */
453 HOW (R_PPC_GOT_TLSGD16, 1, 16, 0xffff, 0, FALSE, signed,
454 ppc_elf_unhandled_reloc),
455
456 /* Like GOT_TLSGD16, but no overflow. */
457 HOW (R_PPC_GOT_TLSGD16_LO, 1, 16, 0xffff, 0, FALSE, dont,
458 ppc_elf_unhandled_reloc),
459
460 /* Like GOT_TLSGD16_LO, but next higher group of 16 bits. */
461 HOW (R_PPC_GOT_TLSGD16_HI, 1, 16, 0xffff, 16, FALSE, dont,
462 ppc_elf_unhandled_reloc),
463
464 /* Like GOT_TLSGD16_HI, but adjust for low 16 bits. */
465 HOW (R_PPC_GOT_TLSGD16_HA, 1, 16, 0xffff, 16, FALSE, dont,
466 ppc_elf_unhandled_reloc),
467
468 /* Allocates two contiguous entries in the GOT to hold a tls_index structure,
469 with values (sym+add)@dtpmod and zero, and computes the offset to the
470 first entry. */
471 HOW (R_PPC_GOT_TLSLD16, 1, 16, 0xffff, 0, FALSE, signed,
472 ppc_elf_unhandled_reloc),
473
474 /* Like GOT_TLSLD16, but no overflow. */
475 HOW (R_PPC_GOT_TLSLD16_LO, 1, 16, 0xffff, 0, FALSE, dont,
476 ppc_elf_unhandled_reloc),
477
478 /* Like GOT_TLSLD16_LO, but next higher group of 16 bits. */
479 HOW (R_PPC_GOT_TLSLD16_HI, 1, 16, 0xffff, 16, FALSE, dont,
480 ppc_elf_unhandled_reloc),
481
482 /* Like GOT_TLSLD16_HI, but adjust for low 16 bits. */
483 HOW (R_PPC_GOT_TLSLD16_HA, 1, 16, 0xffff, 16, FALSE, dont,
484 ppc_elf_unhandled_reloc),
485
486 /* Allocates an entry in the GOT with value (sym+add)@dtprel, and computes
487 the offset to the entry. */
488 HOW (R_PPC_GOT_DTPREL16, 1, 16, 0xffff, 0, FALSE, signed,
489 ppc_elf_unhandled_reloc),
490
491 /* Like GOT_DTPREL16, but no overflow. */
492 HOW (R_PPC_GOT_DTPREL16_LO, 1, 16, 0xffff, 0, FALSE, dont,
493 ppc_elf_unhandled_reloc),
494
495 /* Like GOT_DTPREL16_LO, but next higher group of 16 bits. */
496 HOW (R_PPC_GOT_DTPREL16_HI, 1, 16, 0xffff, 16, FALSE, dont,
497 ppc_elf_unhandled_reloc),
498
499 /* Like GOT_DTPREL16_HI, but adjust for low 16 bits. */
500 HOW (R_PPC_GOT_DTPREL16_HA, 1, 16, 0xffff, 16, FALSE, dont,
501 ppc_elf_unhandled_reloc),
502
503 /* Allocates an entry in the GOT with value (sym+add)@tprel, and computes the
504 offset to the entry. */
505 HOW (R_PPC_GOT_TPREL16, 1, 16, 0xffff, 0, FALSE, signed,
506 ppc_elf_unhandled_reloc),
507
508 /* Like GOT_TPREL16, but no overflow. */
509 HOW (R_PPC_GOT_TPREL16_LO, 1, 16, 0xffff, 0, FALSE, dont,
510 ppc_elf_unhandled_reloc),
511
512 /* Like GOT_TPREL16_LO, but next higher group of 16 bits. */
513 HOW (R_PPC_GOT_TPREL16_HI, 1, 16, 0xffff, 16, FALSE, dont,
514 ppc_elf_unhandled_reloc),
515
516 /* Like GOT_TPREL16_HI, but adjust for low 16 bits. */
517 HOW (R_PPC_GOT_TPREL16_HA, 1, 16, 0xffff, 16, FALSE, dont,
518 ppc_elf_unhandled_reloc),
519
520 /* The remaining relocs are from the Embedded ELF ABI, and are not
521 in the SVR4 ELF ABI. */
522
523 /* 32 bit value resulting from the addend minus the symbol. */
524 HOW (R_PPC_EMB_NADDR32, 2, 32, 0xffffffff, 0, FALSE, dont,
525 ppc_elf_unhandled_reloc),
526
527 /* 16 bit value resulting from the addend minus the symbol. */
528 HOW (R_PPC_EMB_NADDR16, 1, 16, 0xffff, 0, FALSE, signed,
529 ppc_elf_unhandled_reloc),
530
531 /* 16 bit value resulting from the addend minus the symbol. */
532 HOW (R_PPC_EMB_NADDR16_LO, 1, 16, 0xffff, 0, FALSE, dont,
533 ppc_elf_unhandled_reloc),
534
535 /* The high order 16 bits of the addend minus the symbol. */
536 HOW (R_PPC_EMB_NADDR16_HI, 1, 16, 0xffff, 16, FALSE, dont,
537 ppc_elf_unhandled_reloc),
538
539 /* The high order 16 bits of the result of the addend minus the address,
540 plus 1 if the contents of the low 16 bits, treated as a signed number,
541 is negative. */
542 HOW (R_PPC_EMB_NADDR16_HA, 1, 16, 0xffff, 16, FALSE, dont,
543 ppc_elf_unhandled_reloc),
544
545 /* 16 bit value resulting from allocating a 4 byte word to hold an
546 address in the .sdata section, and returning the offset from
547 _SDA_BASE_ for that relocation. */
548 HOW (R_PPC_EMB_SDAI16, 1, 16, 0xffff, 0, FALSE, signed,
549 ppc_elf_unhandled_reloc),
550
551 /* 16 bit value resulting from allocating a 4 byte word to hold an
552 address in the .sdata2 section, and returning the offset from
553 _SDA2_BASE_ for that relocation. */
554 HOW (R_PPC_EMB_SDA2I16, 1, 16, 0xffff, 0, FALSE, signed,
555 ppc_elf_unhandled_reloc),
556
557 /* A sign-extended 16 bit value relative to _SDA2_BASE_, for use with
558 small data items. */
559 HOW (R_PPC_EMB_SDA2REL, 1, 16, 0xffff, 0, FALSE, signed,
560 ppc_elf_unhandled_reloc),
561
562 /* Relocate against either _SDA_BASE_ or _SDA2_BASE_, filling in the 16 bit
563 signed offset from the appropriate base, and filling in the register
564 field with the appropriate register (0, 2, or 13). */
565 HOW (R_PPC_EMB_SDA21, 2, 16, 0xffff, 0, FALSE, signed,
566 ppc_elf_unhandled_reloc),
567
568 /* Relocation not handled: R_PPC_EMB_MRKREF */
569 /* Relocation not handled: R_PPC_EMB_RELSEC16 */
570 /* Relocation not handled: R_PPC_EMB_RELST_LO */
571 /* Relocation not handled: R_PPC_EMB_RELST_HI */
572 /* Relocation not handled: R_PPC_EMB_RELST_HA */
573 /* Relocation not handled: R_PPC_EMB_BIT_FLD */
574
575 /* PC relative relocation against either _SDA_BASE_ or _SDA2_BASE_, filling
576 in the 16 bit signed offset from the appropriate base, and filling in the
577 register field with the appropriate register (0, 2, or 13). */
578 HOW (R_PPC_EMB_RELSDA, 1, 16, 0xffff, 0, FALSE, signed,
579 ppc_elf_unhandled_reloc),
580
581 /* A relative 8 bit branch. */
582 HOW (R_PPC_VLE_REL8, 1, 8, 0xff, 1, TRUE, signed,
583 bfd_elf_generic_reloc),
584
585 /* A relative 15 bit branch. */
586 HOW (R_PPC_VLE_REL15, 2, 16, 0xfffe, 0, TRUE, signed,
587 bfd_elf_generic_reloc),
588
589 /* A relative 24 bit branch. */
590 HOW (R_PPC_VLE_REL24, 2, 25, 0x1fffffe, 0, TRUE, signed,
591 bfd_elf_generic_reloc),
592
593 /* The 16 LSBS in split16a format. */
594 HOW (R_PPC_VLE_LO16A, 2, 16, 0x1f07ff, 0, FALSE, dont,
595 ppc_elf_unhandled_reloc),
596
597 /* The 16 LSBS in split16d format. */
598 HOW (R_PPC_VLE_LO16D, 2, 16, 0x3e007ff, 0, FALSE, dont,
599 ppc_elf_unhandled_reloc),
600
601 /* Bits 16-31 split16a format. */
602 HOW (R_PPC_VLE_HI16A, 2, 16, 0x1f07ff, 16, FALSE, dont,
603 ppc_elf_unhandled_reloc),
604
605 /* Bits 16-31 split16d format. */
606 HOW (R_PPC_VLE_HI16D, 2, 16, 0x3e007ff, 16, FALSE, dont,
607 ppc_elf_unhandled_reloc),
608
609 /* Bits 16-31 (High Adjusted) in split16a format. */
610 HOW (R_PPC_VLE_HA16A, 2, 16, 0x1f07ff, 16, FALSE, dont,
611 ppc_elf_unhandled_reloc),
612
613 /* Bits 16-31 (High Adjusted) in split16d format. */
614 HOW (R_PPC_VLE_HA16D, 2, 16, 0x3e007ff, 16, FALSE, dont,
615 ppc_elf_unhandled_reloc),
616
617 /* This reloc is like R_PPC_EMB_SDA21 but only applies to e_add16i
618 instructions. If the register base is 0 then the linker changes
619 the e_add16i to an e_li instruction. */
620 HOW (R_PPC_VLE_SDA21, 2, 16, 0xffff, 0, FALSE, signed,
621 ppc_elf_unhandled_reloc),
622
623 /* Like R_PPC_VLE_SDA21 but ignore overflow. */
624 HOW (R_PPC_VLE_SDA21_LO, 2, 16, 0xffff, 0, FALSE, dont,
625 ppc_elf_unhandled_reloc),
626
627 /* The 16 LSBS relative to _SDA_BASE_ in split16a format. */
628 HOW (R_PPC_VLE_SDAREL_LO16A, 2, 16, 0x1f07ff, 0, FALSE, dont,
629 ppc_elf_unhandled_reloc),
630
631 /* The 16 LSBS relative to _SDA_BASE_ in split16d format. */
632 HOW (R_PPC_VLE_SDAREL_LO16D, 2, 16, 0x3e007ff, 0, FALSE, dont,
633 ppc_elf_unhandled_reloc),
634
635 /* Bits 16-31 relative to _SDA_BASE_ in split16a format. */
636 HOW (R_PPC_VLE_SDAREL_HI16A, 2, 16, 0x1f07ff, 16, FALSE, dont,
637 ppc_elf_unhandled_reloc),
638
639 /* Bits 16-31 relative to _SDA_BASE_ in split16d format. */
640 HOW (R_PPC_VLE_SDAREL_HI16D, 2, 16, 0x3e007ff, 16, FALSE, dont,
641 ppc_elf_unhandled_reloc),
642
643 /* Bits 16-31 (HA) relative to _SDA_BASE split16a format. */
644 HOW (R_PPC_VLE_SDAREL_HA16A, 2, 16, 0x1f07ff, 16, FALSE, dont,
645 ppc_elf_unhandled_reloc),
646
647 /* Bits 16-31 (HA) relative to _SDA_BASE split16d format. */
648 HOW (R_PPC_VLE_SDAREL_HA16D, 2, 16, 0x3e007ff, 16, FALSE, dont,
649 ppc_elf_unhandled_reloc),
650
651 /* e_li split20 format. */
652 HOW (R_PPC_VLE_ADDR20, 2, 20, 0x1f7fff, 0, FALSE, dont,
653 ppc_elf_unhandled_reloc),
654
655 HOW (R_PPC_IRELATIVE, 2, 32, 0xffffffff, 0, FALSE, dont,
656 ppc_elf_unhandled_reloc),
657
658 /* A 16 bit relative relocation. */
659 HOW (R_PPC_REL16, 1, 16, 0xffff, 0, TRUE, signed,
660 bfd_elf_generic_reloc),
661
662 /* A 16 bit relative relocation without overflow. */
663 HOW (R_PPC_REL16_LO, 1, 16, 0xffff, 0, TRUE, dont,
664 bfd_elf_generic_reloc),
665
666 /* The high order 16 bits of a relative address. */
667 HOW (R_PPC_REL16_HI, 1, 16, 0xffff, 16, TRUE, dont,
668 bfd_elf_generic_reloc),
669
670 /* The high order 16 bits of a relative address, plus 1 if the contents of
671 the low 16 bits, treated as a signed number, is negative. */
672 HOW (R_PPC_REL16_HA, 1, 16, 0xffff, 16, TRUE, dont,
673 ppc_elf_addr16_ha_reloc),
674
675 /* Like R_PPC_REL16_HA but for split field in addpcis. */
676 HOW (R_PPC_REL16DX_HA, 2, 16, 0x1fffc1, 16, TRUE, signed,
677 ppc_elf_addr16_ha_reloc),
678
679 /* A split-field reloc for addpcis, non-relative (gas internal use only). */
680 HOW (R_PPC_16DX_HA, 2, 16, 0x1fffc1, 16, FALSE, signed,
681 ppc_elf_addr16_ha_reloc),
682
683 /* GNU extension to record C++ vtable hierarchy. */
684 HOW (R_PPC_GNU_VTINHERIT, 0, 0, 0, 0, FALSE, dont,
685 NULL),
686
687 /* GNU extension to record C++ vtable member usage. */
688 HOW (R_PPC_GNU_VTENTRY, 0, 0, 0, 0, FALSE, dont,
689 NULL),
690
691 /* Phony reloc to handle AIX style TOC entries. */
692 HOW (R_PPC_TOC16, 1, 16, 0xffff, 0, FALSE, signed,
693 ppc_elf_unhandled_reloc),
694 };
695 \f
696 /* Initialize the ppc_elf_howto_table, so that linear accesses can be done. */
697
698 static void
699 ppc_elf_howto_init (void)
700 {
701 unsigned int i, type;
702
703 for (i = 0;
704 i < sizeof (ppc_elf_howto_raw) / sizeof (ppc_elf_howto_raw[0]);
705 i++)
706 {
707 type = ppc_elf_howto_raw[i].type;
708 if (type >= (sizeof (ppc_elf_howto_table)
709 / sizeof (ppc_elf_howto_table[0])))
710 abort ();
711 ppc_elf_howto_table[type] = &ppc_elf_howto_raw[i];
712 }
713 }
714
715 static reloc_howto_type *
716 ppc_elf_reloc_type_lookup (bfd *abfd ATTRIBUTE_UNUSED,
717 bfd_reloc_code_real_type code)
718 {
719 enum elf_ppc_reloc_type r;
720
721 /* Initialize howto table if not already done. */
722 if (!ppc_elf_howto_table[R_PPC_ADDR32])
723 ppc_elf_howto_init ();
724
725 switch (code)
726 {
727 default:
728 return NULL;
729
730 case BFD_RELOC_NONE: r = R_PPC_NONE; break;
731 case BFD_RELOC_32: r = R_PPC_ADDR32; break;
732 case BFD_RELOC_PPC_BA26: r = R_PPC_ADDR24; break;
733 case BFD_RELOC_PPC64_ADDR16_DS:
734 case BFD_RELOC_16: r = R_PPC_ADDR16; break;
735 case BFD_RELOC_PPC64_ADDR16_LO_DS:
736 case BFD_RELOC_LO16: r = R_PPC_ADDR16_LO; break;
737 case BFD_RELOC_HI16: r = R_PPC_ADDR16_HI; break;
738 case BFD_RELOC_HI16_S: r = R_PPC_ADDR16_HA; break;
739 case BFD_RELOC_PPC_BA16: r = R_PPC_ADDR14; break;
740 case BFD_RELOC_PPC_BA16_BRTAKEN: r = R_PPC_ADDR14_BRTAKEN; break;
741 case BFD_RELOC_PPC_BA16_BRNTAKEN: r = R_PPC_ADDR14_BRNTAKEN; break;
742 case BFD_RELOC_PPC_B26: r = R_PPC_REL24; break;
743 case BFD_RELOC_PPC_B16: r = R_PPC_REL14; break;
744 case BFD_RELOC_PPC_B16_BRTAKEN: r = R_PPC_REL14_BRTAKEN; break;
745 case BFD_RELOC_PPC_B16_BRNTAKEN: r = R_PPC_REL14_BRNTAKEN; break;
746 case BFD_RELOC_PPC64_GOT16_DS:
747 case BFD_RELOC_16_GOTOFF: r = R_PPC_GOT16; break;
748 case BFD_RELOC_PPC64_GOT16_LO_DS:
749 case BFD_RELOC_LO16_GOTOFF: r = R_PPC_GOT16_LO; break;
750 case BFD_RELOC_HI16_GOTOFF: r = R_PPC_GOT16_HI; break;
751 case BFD_RELOC_HI16_S_GOTOFF: r = R_PPC_GOT16_HA; break;
752 case BFD_RELOC_24_PLT_PCREL: r = R_PPC_PLTREL24; break;
753 case BFD_RELOC_PPC_COPY: r = R_PPC_COPY; break;
754 case BFD_RELOC_PPC_GLOB_DAT: r = R_PPC_GLOB_DAT; break;
755 case BFD_RELOC_PPC_LOCAL24PC: r = R_PPC_LOCAL24PC; break;
756 case BFD_RELOC_32_PCREL: r = R_PPC_REL32; break;
757 case BFD_RELOC_32_PLTOFF: r = R_PPC_PLT32; break;
758 case BFD_RELOC_32_PLT_PCREL: r = R_PPC_PLTREL32; break;
759 case BFD_RELOC_PPC64_PLT16_LO_DS:
760 case BFD_RELOC_LO16_PLTOFF: r = R_PPC_PLT16_LO; break;
761 case BFD_RELOC_HI16_PLTOFF: r = R_PPC_PLT16_HI; break;
762 case BFD_RELOC_HI16_S_PLTOFF: r = R_PPC_PLT16_HA; break;
763 case BFD_RELOC_GPREL16: r = R_PPC_SDAREL16; break;
764 case BFD_RELOC_PPC64_SECTOFF_DS:
765 case BFD_RELOC_16_BASEREL: r = R_PPC_SECTOFF; break;
766 case BFD_RELOC_PPC64_SECTOFF_LO_DS:
767 case BFD_RELOC_LO16_BASEREL: r = R_PPC_SECTOFF_LO; break;
768 case BFD_RELOC_HI16_BASEREL: r = R_PPC_SECTOFF_HI; break;
769 case BFD_RELOC_HI16_S_BASEREL: r = R_PPC_SECTOFF_HA; break;
770 case BFD_RELOC_CTOR: r = R_PPC_ADDR32; break;
771 case BFD_RELOC_PPC64_TOC16_DS:
772 case BFD_RELOC_PPC_TOC16: r = R_PPC_TOC16; break;
773 case BFD_RELOC_PPC_TLS: r = R_PPC_TLS; break;
774 case BFD_RELOC_PPC_TLSGD: r = R_PPC_TLSGD; break;
775 case BFD_RELOC_PPC_TLSLD: r = R_PPC_TLSLD; break;
776 case BFD_RELOC_PPC_DTPMOD: r = R_PPC_DTPMOD32; break;
777 case BFD_RELOC_PPC64_TPREL16_DS:
778 case BFD_RELOC_PPC_TPREL16: r = R_PPC_TPREL16; break;
779 case BFD_RELOC_PPC64_TPREL16_LO_DS:
780 case BFD_RELOC_PPC_TPREL16_LO: r = R_PPC_TPREL16_LO; break;
781 case BFD_RELOC_PPC_TPREL16_HI: r = R_PPC_TPREL16_HI; break;
782 case BFD_RELOC_PPC_TPREL16_HA: r = R_PPC_TPREL16_HA; break;
783 case BFD_RELOC_PPC_TPREL: r = R_PPC_TPREL32; break;
784 case BFD_RELOC_PPC64_DTPREL16_DS:
785 case BFD_RELOC_PPC_DTPREL16: r = R_PPC_DTPREL16; break;
786 case BFD_RELOC_PPC64_DTPREL16_LO_DS:
787 case BFD_RELOC_PPC_DTPREL16_LO: r = R_PPC_DTPREL16_LO; break;
788 case BFD_RELOC_PPC_DTPREL16_HI: r = R_PPC_DTPREL16_HI; break;
789 case BFD_RELOC_PPC_DTPREL16_HA: r = R_PPC_DTPREL16_HA; break;
790 case BFD_RELOC_PPC_DTPREL: r = R_PPC_DTPREL32; break;
791 case BFD_RELOC_PPC_GOT_TLSGD16: r = R_PPC_GOT_TLSGD16; break;
792 case BFD_RELOC_PPC_GOT_TLSGD16_LO: r = R_PPC_GOT_TLSGD16_LO; break;
793 case BFD_RELOC_PPC_GOT_TLSGD16_HI: r = R_PPC_GOT_TLSGD16_HI; break;
794 case BFD_RELOC_PPC_GOT_TLSGD16_HA: r = R_PPC_GOT_TLSGD16_HA; break;
795 case BFD_RELOC_PPC_GOT_TLSLD16: r = R_PPC_GOT_TLSLD16; break;
796 case BFD_RELOC_PPC_GOT_TLSLD16_LO: r = R_PPC_GOT_TLSLD16_LO; break;
797 case BFD_RELOC_PPC_GOT_TLSLD16_HI: r = R_PPC_GOT_TLSLD16_HI; break;
798 case BFD_RELOC_PPC_GOT_TLSLD16_HA: r = R_PPC_GOT_TLSLD16_HA; break;
799 case BFD_RELOC_PPC_GOT_TPREL16: r = R_PPC_GOT_TPREL16; break;
800 case BFD_RELOC_PPC_GOT_TPREL16_LO: r = R_PPC_GOT_TPREL16_LO; break;
801 case BFD_RELOC_PPC_GOT_TPREL16_HI: r = R_PPC_GOT_TPREL16_HI; break;
802 case BFD_RELOC_PPC_GOT_TPREL16_HA: r = R_PPC_GOT_TPREL16_HA; break;
803 case BFD_RELOC_PPC_GOT_DTPREL16: r = R_PPC_GOT_DTPREL16; break;
804 case BFD_RELOC_PPC_GOT_DTPREL16_LO: r = R_PPC_GOT_DTPREL16_LO; break;
805 case BFD_RELOC_PPC_GOT_DTPREL16_HI: r = R_PPC_GOT_DTPREL16_HI; break;
806 case BFD_RELOC_PPC_GOT_DTPREL16_HA: r = R_PPC_GOT_DTPREL16_HA; break;
807 case BFD_RELOC_PPC_EMB_NADDR32: r = R_PPC_EMB_NADDR32; break;
808 case BFD_RELOC_PPC_EMB_NADDR16: r = R_PPC_EMB_NADDR16; break;
809 case BFD_RELOC_PPC_EMB_NADDR16_LO: r = R_PPC_EMB_NADDR16_LO; break;
810 case BFD_RELOC_PPC_EMB_NADDR16_HI: r = R_PPC_EMB_NADDR16_HI; break;
811 case BFD_RELOC_PPC_EMB_NADDR16_HA: r = R_PPC_EMB_NADDR16_HA; break;
812 case BFD_RELOC_PPC_EMB_SDAI16: r = R_PPC_EMB_SDAI16; break;
813 case BFD_RELOC_PPC_EMB_SDA2I16: r = R_PPC_EMB_SDA2I16; break;
814 case BFD_RELOC_PPC_EMB_SDA2REL: r = R_PPC_EMB_SDA2REL; break;
815 case BFD_RELOC_PPC_EMB_SDA21: r = R_PPC_EMB_SDA21; break;
816 case BFD_RELOC_PPC_EMB_MRKREF: r = R_PPC_EMB_MRKREF; break;
817 case BFD_RELOC_PPC_EMB_RELSEC16: r = R_PPC_EMB_RELSEC16; break;
818 case BFD_RELOC_PPC_EMB_RELST_LO: r = R_PPC_EMB_RELST_LO; break;
819 case BFD_RELOC_PPC_EMB_RELST_HI: r = R_PPC_EMB_RELST_HI; break;
820 case BFD_RELOC_PPC_EMB_RELST_HA: r = R_PPC_EMB_RELST_HA; break;
821 case BFD_RELOC_PPC_EMB_BIT_FLD: r = R_PPC_EMB_BIT_FLD; break;
822 case BFD_RELOC_PPC_EMB_RELSDA: r = R_PPC_EMB_RELSDA; break;
823 case BFD_RELOC_PPC_VLE_REL8: r = R_PPC_VLE_REL8; break;
824 case BFD_RELOC_PPC_VLE_REL15: r = R_PPC_VLE_REL15; break;
825 case BFD_RELOC_PPC_VLE_REL24: r = R_PPC_VLE_REL24; break;
826 case BFD_RELOC_PPC_VLE_LO16A: r = R_PPC_VLE_LO16A; break;
827 case BFD_RELOC_PPC_VLE_LO16D: r = R_PPC_VLE_LO16D; break;
828 case BFD_RELOC_PPC_VLE_HI16A: r = R_PPC_VLE_HI16A; break;
829 case BFD_RELOC_PPC_VLE_HI16D: r = R_PPC_VLE_HI16D; break;
830 case BFD_RELOC_PPC_VLE_HA16A: r = R_PPC_VLE_HA16A; break;
831 case BFD_RELOC_PPC_VLE_HA16D: r = R_PPC_VLE_HA16D; break;
832 case BFD_RELOC_PPC_VLE_SDA21: r = R_PPC_VLE_SDA21; break;
833 case BFD_RELOC_PPC_VLE_SDA21_LO: r = R_PPC_VLE_SDA21_LO; break;
834 case BFD_RELOC_PPC_VLE_SDAREL_LO16A:
835 r = R_PPC_VLE_SDAREL_LO16A;
836 break;
837 case BFD_RELOC_PPC_VLE_SDAREL_LO16D:
838 r = R_PPC_VLE_SDAREL_LO16D;
839 break;
840 case BFD_RELOC_PPC_VLE_SDAREL_HI16A:
841 r = R_PPC_VLE_SDAREL_HI16A;
842 break;
843 case BFD_RELOC_PPC_VLE_SDAREL_HI16D:
844 r = R_PPC_VLE_SDAREL_HI16D;
845 break;
846 case BFD_RELOC_PPC_VLE_SDAREL_HA16A:
847 r = R_PPC_VLE_SDAREL_HA16A;
848 break;
849 case BFD_RELOC_PPC_VLE_SDAREL_HA16D:
850 r = R_PPC_VLE_SDAREL_HA16D;
851 break;
852 case BFD_RELOC_16_PCREL: r = R_PPC_REL16; break;
853 case BFD_RELOC_LO16_PCREL: r = R_PPC_REL16_LO; break;
854 case BFD_RELOC_HI16_PCREL: r = R_PPC_REL16_HI; break;
855 case BFD_RELOC_HI16_S_PCREL: r = R_PPC_REL16_HA; break;
856 case BFD_RELOC_PPC_16DX_HA: r = R_PPC_16DX_HA; break;
857 case BFD_RELOC_PPC_REL16DX_HA: r = R_PPC_REL16DX_HA; break;
858 case BFD_RELOC_VTABLE_INHERIT: r = R_PPC_GNU_VTINHERIT; break;
859 case BFD_RELOC_VTABLE_ENTRY: r = R_PPC_GNU_VTENTRY; break;
860 }
861
862 return ppc_elf_howto_table[r];
863 };
864
865 static reloc_howto_type *
866 ppc_elf_reloc_name_lookup (bfd *abfd ATTRIBUTE_UNUSED,
867 const char *r_name)
868 {
869 unsigned int i;
870
871 for (i = 0;
872 i < sizeof (ppc_elf_howto_raw) / sizeof (ppc_elf_howto_raw[0]);
873 i++)
874 if (ppc_elf_howto_raw[i].name != NULL
875 && strcasecmp (ppc_elf_howto_raw[i].name, r_name) == 0)
876 return &ppc_elf_howto_raw[i];
877
878 return NULL;
879 }
880
881 /* Set the howto pointer for a PowerPC ELF reloc. */
882
883 static bfd_boolean
884 ppc_elf_info_to_howto (bfd *abfd,
885 arelent *cache_ptr,
886 Elf_Internal_Rela *dst)
887 {
888 unsigned int r_type;
889
890 /* Initialize howto table if not already done. */
891 if (!ppc_elf_howto_table[R_PPC_ADDR32])
892 ppc_elf_howto_init ();
893
894 r_type = ELF32_R_TYPE (dst->r_info);
895 if (r_type >= R_PPC_max)
896 {
897 /* xgettext:c-format */
898 _bfd_error_handler (_("%pB: unsupported relocation type %#x"),
899 abfd, r_type);
900 bfd_set_error (bfd_error_bad_value);
901 return FALSE;
902 }
903
904 cache_ptr->howto = ppc_elf_howto_table[r_type];
905
906 /* Just because the above assert didn't trigger doesn't mean that
907 ELF32_R_TYPE (dst->r_info) is necessarily a valid relocation. */
908 if (cache_ptr->howto == NULL)
909 {
910 /* xgettext:c-format */
911 _bfd_error_handler (_("%pB: unsupported relocation type %#x"),
912 abfd, r_type);
913 bfd_set_error (bfd_error_bad_value);
914
915 return FALSE;
916 }
917
918 return TRUE;
919 }
920
921 /* Handle the R_PPC_ADDR16_HA and R_PPC_REL16_HA relocs. */
922
923 static bfd_reloc_status_type
924 ppc_elf_addr16_ha_reloc (bfd *abfd,
925 arelent *reloc_entry,
926 asymbol *symbol,
927 void *data,
928 asection *input_section,
929 bfd *output_bfd,
930 char **error_message ATTRIBUTE_UNUSED)
931 {
932 enum elf_ppc_reloc_type r_type;
933 long insn;
934 bfd_size_type octets;
935 bfd_vma value;
936
937 if (output_bfd != NULL)
938 {
939 reloc_entry->address += input_section->output_offset;
940 return bfd_reloc_ok;
941 }
942
943 reloc_entry->addend += 0x8000;
944 r_type = reloc_entry->howto->type;
945 if (r_type != R_PPC_REL16DX_HA)
946 return bfd_reloc_continue;
947
948 value = 0;
949 if (!bfd_is_com_section (symbol->section))
950 value = symbol->value;
951 value += (reloc_entry->addend
952 + symbol->section->output_offset
953 + symbol->section->output_section->vma);
954 value -= (reloc_entry->address
955 + input_section->output_offset
956 + input_section->output_section->vma);
957 value >>= 16;
958
959 octets = reloc_entry->address * OCTETS_PER_BYTE (abfd, input_section);
960 insn = bfd_get_32 (abfd, (bfd_byte *) data + octets);
961 insn &= ~0x1fffc1;
962 insn |= (value & 0xffc1) | ((value & 0x3e) << 15);
963 bfd_put_32 (abfd, insn, (bfd_byte *) data + octets);
964 return bfd_reloc_ok;
965 }
966
967 static bfd_reloc_status_type
968 ppc_elf_unhandled_reloc (bfd *abfd,
969 arelent *reloc_entry,
970 asymbol *symbol,
971 void *data,
972 asection *input_section,
973 bfd *output_bfd,
974 char **error_message)
975 {
976 /* If this is a relocatable link (output_bfd test tells us), just
977 call the generic function. Any adjustment will be done at final
978 link time. */
979 if (output_bfd != NULL)
980 return bfd_elf_generic_reloc (abfd, reloc_entry, symbol, data,
981 input_section, output_bfd, error_message);
982
983 if (error_message != NULL)
984 {
985 static char *message;
986 free (message);
987 if (asprintf (&message, _("generic linker can't handle %s"),
988 reloc_entry->howto->name) < 0)
989 message = NULL;
990 *error_message = message;
991 }
992 return bfd_reloc_dangerous;
993 }
994 \f
995 /* Sections created by the linker. */
996
997 typedef struct elf_linker_section
998 {
999 /* Pointer to the bfd section. */
1000 asection *section;
1001 /* Section name. */
1002 const char *name;
1003 /* Associated bss section name. */
1004 const char *bss_name;
1005 /* Associated symbol name. */
1006 const char *sym_name;
1007 /* Associated symbol. */
1008 struct elf_link_hash_entry *sym;
1009 } elf_linker_section_t;
1010
1011 /* Linked list of allocated pointer entries. This hangs off of the
1012 symbol lists, and provides allows us to return different pointers,
1013 based on different addend's. */
1014
1015 typedef struct elf_linker_section_pointers
1016 {
1017 /* next allocated pointer for this symbol */
1018 struct elf_linker_section_pointers *next;
1019 /* offset of pointer from beginning of section */
1020 bfd_vma offset;
1021 /* addend used */
1022 bfd_vma addend;
1023 /* which linker section this is */
1024 elf_linker_section_t *lsect;
1025 } elf_linker_section_pointers_t;
1026
1027 struct ppc_elf_obj_tdata
1028 {
1029 struct elf_obj_tdata elf;
1030
1031 /* A mapping from local symbols to offsets into the various linker
1032 sections added. This is index by the symbol index. */
1033 elf_linker_section_pointers_t **linker_section_pointers;
1034
1035 /* Flags used to auto-detect plt type. */
1036 unsigned int makes_plt_call : 1;
1037 unsigned int has_rel16 : 1;
1038 };
1039
1040 #define ppc_elf_tdata(bfd) \
1041 ((struct ppc_elf_obj_tdata *) (bfd)->tdata.any)
1042
1043 #define elf_local_ptr_offsets(bfd) \
1044 (ppc_elf_tdata (bfd)->linker_section_pointers)
1045
1046 #define is_ppc_elf(bfd) \
1047 (bfd_get_flavour (bfd) == bfd_target_elf_flavour \
1048 && elf_object_id (bfd) == PPC32_ELF_DATA)
1049
1050 /* Override the generic function because we store some extras. */
1051
1052 static bfd_boolean
1053 ppc_elf_mkobject (bfd *abfd)
1054 {
1055 return bfd_elf_allocate_object (abfd, sizeof (struct ppc_elf_obj_tdata),
1056 PPC32_ELF_DATA);
1057 }
1058
1059 /* When defaulting arch/mach, decode apuinfo to find a better match. */
1060
1061 bfd_boolean
1062 _bfd_elf_ppc_set_arch (bfd *abfd)
1063 {
1064 unsigned long mach = 0;
1065 asection *s;
1066 unsigned char *contents;
1067
1068 if (abfd->arch_info->bits_per_word == 32
1069 && bfd_big_endian (abfd))
1070 {
1071
1072 for (s = abfd->sections; s != NULL; s = s->next)
1073 if ((elf_section_data (s)->this_hdr.sh_flags & SHF_PPC_VLE) != 0)
1074 break;
1075 if (s != NULL)
1076 mach = bfd_mach_ppc_vle;
1077 }
1078
1079 if (mach == 0)
1080 {
1081 s = bfd_get_section_by_name (abfd, APUINFO_SECTION_NAME);
1082 if (s != NULL
1083 && s->size >= 24
1084 && bfd_malloc_and_get_section (abfd, s, &contents))
1085 {
1086 unsigned int apuinfo_size = bfd_get_32 (abfd, contents + 4);
1087 unsigned int i;
1088
1089 for (i = 20; i < apuinfo_size + 20 && i + 4 <= s->size; i += 4)
1090 {
1091 unsigned int val = bfd_get_32 (abfd, contents + i);
1092 switch (val >> 16)
1093 {
1094 case PPC_APUINFO_PMR:
1095 case PPC_APUINFO_RFMCI:
1096 if (mach == 0)
1097 mach = bfd_mach_ppc_titan;
1098 break;
1099
1100 case PPC_APUINFO_ISEL:
1101 case PPC_APUINFO_CACHELCK:
1102 if (mach == bfd_mach_ppc_titan)
1103 mach = bfd_mach_ppc_e500mc;
1104 break;
1105
1106 case PPC_APUINFO_SPE:
1107 case PPC_APUINFO_EFS:
1108 case PPC_APUINFO_BRLOCK:
1109 if (mach != bfd_mach_ppc_vle)
1110 mach = bfd_mach_ppc_e500;
1111 break;
1112
1113 case PPC_APUINFO_VLE:
1114 mach = bfd_mach_ppc_vle;
1115 break;
1116
1117 default:
1118 mach = -1ul;
1119 }
1120 }
1121 free (contents);
1122 }
1123 }
1124
1125 if (mach != 0 && mach != -1ul)
1126 {
1127 const bfd_arch_info_type *arch;
1128
1129 for (arch = abfd->arch_info->next; arch; arch = arch->next)
1130 if (arch->mach == mach)
1131 {
1132 abfd->arch_info = arch;
1133 break;
1134 }
1135 }
1136 return TRUE;
1137 }
1138
1139 /* Fix bad default arch selected for a 32 bit input bfd when the
1140 default is 64 bit. Also select arch based on apuinfo. */
1141
1142 static bfd_boolean
1143 ppc_elf_object_p (bfd *abfd)
1144 {
1145 if (!abfd->arch_info->the_default)
1146 return TRUE;
1147
1148 if (abfd->arch_info->bits_per_word == 64)
1149 {
1150 Elf_Internal_Ehdr *i_ehdr = elf_elfheader (abfd);
1151
1152 if (i_ehdr->e_ident[EI_CLASS] == ELFCLASS32)
1153 {
1154 /* Relies on arch after 64 bit default being 32 bit default. */
1155 abfd->arch_info = abfd->arch_info->next;
1156 BFD_ASSERT (abfd->arch_info->bits_per_word == 32);
1157 }
1158 }
1159 return _bfd_elf_ppc_set_arch (abfd);
1160 }
1161
1162 /* Function to set whether a module needs the -mrelocatable bit set. */
1163
1164 static bfd_boolean
1165 ppc_elf_set_private_flags (bfd *abfd, flagword flags)
1166 {
1167 BFD_ASSERT (!elf_flags_init (abfd)
1168 || elf_elfheader (abfd)->e_flags == flags);
1169
1170 elf_elfheader (abfd)->e_flags = flags;
1171 elf_flags_init (abfd) = TRUE;
1172 return TRUE;
1173 }
1174
1175 /* Support for core dump NOTE sections. */
1176
1177 static bfd_boolean
1178 ppc_elf_grok_prstatus (bfd *abfd, Elf_Internal_Note *note)
1179 {
1180 int offset;
1181 unsigned int size;
1182
1183 switch (note->descsz)
1184 {
1185 default:
1186 return FALSE;
1187
1188 case 268: /* Linux/PPC. */
1189 /* pr_cursig */
1190 elf_tdata (abfd)->core->signal = bfd_get_16 (abfd, note->descdata + 12);
1191
1192 /* pr_pid */
1193 elf_tdata (abfd)->core->lwpid = bfd_get_32 (abfd, note->descdata + 24);
1194
1195 /* pr_reg */
1196 offset = 72;
1197 size = 192;
1198
1199 break;
1200 }
1201
1202 /* Make a ".reg/999" section. */
1203 return _bfd_elfcore_make_pseudosection (abfd, ".reg",
1204 size, note->descpos + offset);
1205 }
1206
1207 static bfd_boolean
1208 ppc_elf_grok_psinfo (bfd *abfd, Elf_Internal_Note *note)
1209 {
1210 switch (note->descsz)
1211 {
1212 default:
1213 return FALSE;
1214
1215 case 128: /* Linux/PPC elf_prpsinfo. */
1216 elf_tdata (abfd)->core->pid
1217 = bfd_get_32 (abfd, note->descdata + 16);
1218 elf_tdata (abfd)->core->program
1219 = _bfd_elfcore_strndup (abfd, note->descdata + 32, 16);
1220 elf_tdata (abfd)->core->command
1221 = _bfd_elfcore_strndup (abfd, note->descdata + 48, 80);
1222 }
1223
1224 /* Note that for some reason, a spurious space is tacked
1225 onto the end of the args in some (at least one anyway)
1226 implementations, so strip it off if it exists. */
1227
1228 {
1229 char *command = elf_tdata (abfd)->core->command;
1230 int n = strlen (command);
1231
1232 if (0 < n && command[n - 1] == ' ')
1233 command[n - 1] = '\0';
1234 }
1235
1236 return TRUE;
1237 }
1238
1239 static char *
1240 ppc_elf_write_core_note (bfd *abfd, char *buf, int *bufsiz, int note_type, ...)
1241 {
1242 switch (note_type)
1243 {
1244 default:
1245 return NULL;
1246
1247 case NT_PRPSINFO:
1248 {
1249 char data[128] ATTRIBUTE_NONSTRING;
1250 va_list ap;
1251
1252 va_start (ap, note_type);
1253 memset (data, 0, sizeof (data));
1254 strncpy (data + 32, va_arg (ap, const char *), 16);
1255 #if GCC_VERSION == 8000 || GCC_VERSION == 8001
1256 DIAGNOSTIC_PUSH;
1257 /* GCC 8.0 and 8.1 warn about 80 equals destination size with
1258 -Wstringop-truncation:
1259 https://gcc.gnu.org/bugzilla/show_bug.cgi?id=85643
1260 */
1261 DIAGNOSTIC_IGNORE_STRINGOP_TRUNCATION;
1262 #endif
1263 strncpy (data + 48, va_arg (ap, const char *), 80);
1264 #if GCC_VERSION == 8000 || GCC_VERSION == 8001
1265 DIAGNOSTIC_POP;
1266 #endif
1267 va_end (ap);
1268 return elfcore_write_note (abfd, buf, bufsiz,
1269 "CORE", note_type, data, sizeof (data));
1270 }
1271
1272 case NT_PRSTATUS:
1273 {
1274 char data[268];
1275 va_list ap;
1276 long pid;
1277 int cursig;
1278 const void *greg;
1279
1280 va_start (ap, note_type);
1281 memset (data, 0, 72);
1282 pid = va_arg (ap, long);
1283 bfd_put_32 (abfd, pid, data + 24);
1284 cursig = va_arg (ap, int);
1285 bfd_put_16 (abfd, cursig, data + 12);
1286 greg = va_arg (ap, const void *);
1287 memcpy (data + 72, greg, 192);
1288 memset (data + 264, 0, 4);
1289 va_end (ap);
1290 return elfcore_write_note (abfd, buf, bufsiz,
1291 "CORE", note_type, data, sizeof (data));
1292 }
1293 }
1294 }
1295
1296 static flagword
1297 ppc_elf_lookup_section_flags (char *flag_name)
1298 {
1299
1300 if (!strcmp (flag_name, "SHF_PPC_VLE"))
1301 return SHF_PPC_VLE;
1302
1303 return 0;
1304 }
1305
1306 /* Return address for Ith PLT stub in section PLT, for relocation REL
1307 or (bfd_vma) -1 if it should not be included. */
1308
1309 static bfd_vma
1310 ppc_elf_plt_sym_val (bfd_vma i ATTRIBUTE_UNUSED,
1311 const asection *plt ATTRIBUTE_UNUSED,
1312 const arelent *rel)
1313 {
1314 return rel->address;
1315 }
1316
1317 /* Handle a PowerPC specific section when reading an object file. This
1318 is called when bfd_section_from_shdr finds a section with an unknown
1319 type. */
1320
1321 static bfd_boolean
1322 ppc_elf_section_from_shdr (bfd *abfd,
1323 Elf_Internal_Shdr *hdr,
1324 const char *name,
1325 int shindex)
1326 {
1327 asection *newsect;
1328 flagword flags;
1329
1330 if (! _bfd_elf_make_section_from_shdr (abfd, hdr, name, shindex))
1331 return FALSE;
1332
1333 newsect = hdr->bfd_section;
1334 flags = 0;
1335 if (hdr->sh_flags & SHF_EXCLUDE)
1336 flags |= SEC_EXCLUDE;
1337
1338 if (hdr->sh_type == SHT_ORDERED)
1339 flags |= SEC_SORT_ENTRIES;
1340
1341 if (strncmp (name, ".PPC.EMB", 8) == 0)
1342 name += 8;
1343 if (strncmp (name, ".sbss", 5) == 0
1344 || strncmp (name, ".sdata", 6) == 0)
1345 flags |= SEC_SMALL_DATA;
1346
1347 return (flags == 0
1348 || bfd_set_section_flags (newsect, newsect->flags | flags));
1349 }
1350
1351 /* Set up any other section flags and such that may be necessary. */
1352
1353 static bfd_boolean
1354 ppc_elf_fake_sections (bfd *abfd ATTRIBUTE_UNUSED,
1355 Elf_Internal_Shdr *shdr,
1356 asection *asect)
1357 {
1358 if ((asect->flags & SEC_SORT_ENTRIES) != 0)
1359 shdr->sh_type = SHT_ORDERED;
1360
1361 return TRUE;
1362 }
1363
1364 /* If we have .sbss2 or .PPC.EMB.sbss0 output sections, we
1365 need to bump up the number of section headers. */
1366
1367 static int
1368 ppc_elf_additional_program_headers (bfd *abfd,
1369 struct bfd_link_info *info ATTRIBUTE_UNUSED)
1370 {
1371 asection *s;
1372 int ret = 0;
1373
1374 s = bfd_get_section_by_name (abfd, ".sbss2");
1375 if (s != NULL && (s->flags & SEC_ALLOC) != 0)
1376 ++ret;
1377
1378 s = bfd_get_section_by_name (abfd, ".PPC.EMB.sbss0");
1379 if (s != NULL && (s->flags & SEC_ALLOC) != 0)
1380 ++ret;
1381
1382 return ret;
1383 }
1384
1385 /* Modify the segment map for VLE executables. */
1386
1387 bfd_boolean
1388 ppc_elf_modify_segment_map (bfd *abfd,
1389 struct bfd_link_info *info ATTRIBUTE_UNUSED)
1390 {
1391 struct elf_segment_map *m;
1392
1393 /* At this point in the link, output sections have already been sorted by
1394 LMA and assigned to segments. All that is left to do is to ensure
1395 there is no mixing of VLE & non-VLE sections in a text segment.
1396 If we find that case, we split the segment.
1397 We maintain the original output section order. */
1398
1399 for (m = elf_seg_map (abfd); m != NULL; m = m->next)
1400 {
1401 struct elf_segment_map *n;
1402 size_t amt;
1403 unsigned int j, k;
1404 unsigned int p_flags;
1405
1406 if (m->p_type != PT_LOAD || m->count == 0)
1407 continue;
1408
1409 for (p_flags = PF_R, j = 0; j != m->count; ++j)
1410 {
1411 if ((m->sections[j]->flags & SEC_READONLY) == 0)
1412 p_flags |= PF_W;
1413 if ((m->sections[j]->flags & SEC_CODE) != 0)
1414 {
1415 p_flags |= PF_X;
1416 if ((elf_section_flags (m->sections[j]) & SHF_PPC_VLE) != 0)
1417 p_flags |= PF_PPC_VLE;
1418 break;
1419 }
1420 }
1421 if (j != m->count)
1422 while (++j != m->count)
1423 {
1424 unsigned int p_flags1 = PF_R;
1425
1426 if ((m->sections[j]->flags & SEC_READONLY) == 0)
1427 p_flags1 |= PF_W;
1428 if ((m->sections[j]->flags & SEC_CODE) != 0)
1429 {
1430 p_flags1 |= PF_X;
1431 if ((elf_section_flags (m->sections[j]) & SHF_PPC_VLE) != 0)
1432 p_flags1 |= PF_PPC_VLE;
1433 if (((p_flags1 ^ p_flags) & PF_PPC_VLE) != 0)
1434 break;
1435 }
1436 p_flags |= p_flags1;
1437 }
1438 /* If we're splitting a segment which originally contained rw
1439 sections then those sections might now only be in one of the
1440 two parts. So always set p_flags if splitting, even if we
1441 are being called for objcopy with p_flags_valid set. */
1442 if (j != m->count || !m->p_flags_valid)
1443 {
1444 m->p_flags_valid = 1;
1445 m->p_flags = p_flags;
1446 }
1447 if (j == m->count)
1448 continue;
1449
1450 /* Sections 0..j-1 stay in this (current) segment,
1451 the remainder are put in a new segment.
1452 The scan resumes with the new segment. */
1453
1454 amt = sizeof (struct elf_segment_map);
1455 amt += (m->count - j - 1) * sizeof (asection *);
1456 n = (struct elf_segment_map *) bfd_zalloc (abfd, amt);
1457 if (n == NULL)
1458 return FALSE;
1459
1460 n->p_type = PT_LOAD;
1461 n->count = m->count - j;
1462 for (k = 0; k < n->count; ++k)
1463 n->sections[k] = m->sections[j + k];
1464 m->count = j;
1465 m->p_size_valid = 0;
1466 n->next = m->next;
1467 m->next = n;
1468 }
1469
1470 return TRUE;
1471 }
1472
1473 /* Add extra PPC sections -- Note, for now, make .sbss2 and
1474 .PPC.EMB.sbss0 a normal section, and not a bss section so
1475 that the linker doesn't crater when trying to make more than
1476 2 sections. */
1477
1478 static const struct bfd_elf_special_section ppc_elf_special_sections[] =
1479 {
1480 { STRING_COMMA_LEN (".plt"), 0, SHT_NOBITS, SHF_ALLOC + SHF_EXECINSTR },
1481 { STRING_COMMA_LEN (".sbss"), -2, SHT_NOBITS, SHF_ALLOC + SHF_WRITE },
1482 { STRING_COMMA_LEN (".sbss2"), -2, SHT_PROGBITS, SHF_ALLOC },
1483 { STRING_COMMA_LEN (".sdata"), -2, SHT_PROGBITS, SHF_ALLOC + SHF_WRITE },
1484 { STRING_COMMA_LEN (".sdata2"), -2, SHT_PROGBITS, SHF_ALLOC },
1485 { STRING_COMMA_LEN (".tags"), 0, SHT_ORDERED, SHF_ALLOC },
1486 { STRING_COMMA_LEN (APUINFO_SECTION_NAME), 0, SHT_NOTE, 0 },
1487 { STRING_COMMA_LEN (".PPC.EMB.sbss0"), 0, SHT_PROGBITS, SHF_ALLOC },
1488 { STRING_COMMA_LEN (".PPC.EMB.sdata0"), 0, SHT_PROGBITS, SHF_ALLOC },
1489 { NULL, 0, 0, 0, 0 }
1490 };
1491
1492 /* This is what we want for new plt/got. */
1493 static const struct bfd_elf_special_section ppc_alt_plt =
1494 { STRING_COMMA_LEN (".plt"), 0, SHT_PROGBITS, SHF_ALLOC };
1495
1496 static const struct bfd_elf_special_section *
1497 ppc_elf_get_sec_type_attr (bfd *abfd, asection *sec)
1498 {
1499 const struct bfd_elf_special_section *ssect;
1500
1501 /* See if this is one of the special sections. */
1502 if (sec->name == NULL)
1503 return NULL;
1504
1505 ssect = _bfd_elf_get_special_section (sec->name, ppc_elf_special_sections,
1506 sec->use_rela_p);
1507 if (ssect != NULL)
1508 {
1509 if (ssect == ppc_elf_special_sections && (sec->flags & SEC_LOAD) != 0)
1510 ssect = &ppc_alt_plt;
1511 return ssect;
1512 }
1513
1514 return _bfd_elf_get_sec_type_attr (abfd, sec);
1515 }
1516 \f
1517 /* Very simple linked list structure for recording apuinfo values. */
1518 typedef struct apuinfo_list
1519 {
1520 struct apuinfo_list *next;
1521 unsigned long value;
1522 }
1523 apuinfo_list;
1524
1525 static apuinfo_list *head;
1526 static bfd_boolean apuinfo_set;
1527
1528 static void
1529 apuinfo_list_init (void)
1530 {
1531 head = NULL;
1532 apuinfo_set = FALSE;
1533 }
1534
1535 static void
1536 apuinfo_list_add (unsigned long value)
1537 {
1538 apuinfo_list *entry = head;
1539
1540 while (entry != NULL)
1541 {
1542 if (entry->value == value)
1543 return;
1544 entry = entry->next;
1545 }
1546
1547 entry = bfd_malloc (sizeof (* entry));
1548 if (entry == NULL)
1549 return;
1550
1551 entry->value = value;
1552 entry->next = head;
1553 head = entry;
1554 }
1555
1556 static unsigned
1557 apuinfo_list_length (void)
1558 {
1559 apuinfo_list *entry;
1560 unsigned long count;
1561
1562 for (entry = head, count = 0;
1563 entry;
1564 entry = entry->next)
1565 ++ count;
1566
1567 return count;
1568 }
1569
1570 static inline unsigned long
1571 apuinfo_list_element (unsigned long number)
1572 {
1573 apuinfo_list * entry;
1574
1575 for (entry = head;
1576 entry && number --;
1577 entry = entry->next)
1578 ;
1579
1580 return entry ? entry->value : 0;
1581 }
1582
1583 static void
1584 apuinfo_list_finish (void)
1585 {
1586 apuinfo_list *entry;
1587
1588 for (entry = head; entry;)
1589 {
1590 apuinfo_list *next = entry->next;
1591 free (entry);
1592 entry = next;
1593 }
1594
1595 head = NULL;
1596 }
1597
1598 /* Scan the input BFDs and create a linked list of
1599 the APUinfo values that will need to be emitted. */
1600
1601 static void
1602 ppc_elf_begin_write_processing (bfd *abfd, struct bfd_link_info *link_info)
1603 {
1604 bfd *ibfd;
1605 asection *asec;
1606 char *buffer = NULL;
1607 bfd_size_type largest_input_size = 0;
1608 unsigned i;
1609 unsigned long length;
1610 const char *error_message = NULL;
1611
1612 if (link_info == NULL)
1613 return;
1614
1615 apuinfo_list_init ();
1616
1617 /* Read in the input sections contents. */
1618 for (ibfd = link_info->input_bfds; ibfd; ibfd = ibfd->link.next)
1619 {
1620 unsigned long datum;
1621
1622 asec = bfd_get_section_by_name (ibfd, APUINFO_SECTION_NAME);
1623 if (asec == NULL)
1624 continue;
1625
1626 /* xgettext:c-format */
1627 error_message = _("corrupt %s section in %pB");
1628 length = asec->size;
1629 if (length < 20)
1630 goto fail;
1631
1632 apuinfo_set = TRUE;
1633 if (largest_input_size < asec->size)
1634 {
1635 free (buffer);
1636 largest_input_size = asec->size;
1637 buffer = bfd_malloc (largest_input_size);
1638 if (!buffer)
1639 return;
1640 }
1641
1642 if (bfd_seek (ibfd, asec->filepos, SEEK_SET) != 0
1643 || (bfd_bread (buffer, length, ibfd) != length))
1644 {
1645 /* xgettext:c-format */
1646 error_message = _("unable to read in %s section from %pB");
1647 goto fail;
1648 }
1649
1650 /* Verify the contents of the header. Note - we have to
1651 extract the values this way in order to allow for a
1652 host whose endian-ness is different from the target. */
1653 datum = bfd_get_32 (ibfd, buffer);
1654 if (datum != sizeof APUINFO_LABEL)
1655 goto fail;
1656
1657 datum = bfd_get_32 (ibfd, buffer + 8);
1658 if (datum != 0x2)
1659 goto fail;
1660
1661 if (strcmp (buffer + 12, APUINFO_LABEL) != 0)
1662 goto fail;
1663
1664 /* Get the number of bytes used for apuinfo entries. */
1665 datum = bfd_get_32 (ibfd, buffer + 4);
1666 if (datum + 20 != length)
1667 goto fail;
1668
1669 /* Scan the apuinfo section, building a list of apuinfo numbers. */
1670 for (i = 0; i < datum; i += 4)
1671 apuinfo_list_add (bfd_get_32 (ibfd, buffer + 20 + i));
1672 }
1673
1674 error_message = NULL;
1675
1676 if (apuinfo_set)
1677 {
1678 /* Compute the size of the output section. */
1679 unsigned num_entries = apuinfo_list_length ();
1680
1681 /* Set the output section size, if it exists. */
1682 asec = bfd_get_section_by_name (abfd, APUINFO_SECTION_NAME);
1683
1684 if (asec && !bfd_set_section_size (asec, 20 + num_entries * 4))
1685 {
1686 ibfd = abfd;
1687 /* xgettext:c-format */
1688 error_message = _("warning: unable to set size of %s section in %pB");
1689 }
1690 }
1691
1692 fail:
1693 free (buffer);
1694
1695 if (error_message)
1696 _bfd_error_handler (error_message, APUINFO_SECTION_NAME, ibfd);
1697 }
1698
1699 /* Prevent the output section from accumulating the input sections'
1700 contents. We have already stored this in our linked list structure. */
1701
1702 static bfd_boolean
1703 ppc_elf_write_section (bfd *abfd ATTRIBUTE_UNUSED,
1704 struct bfd_link_info *link_info ATTRIBUTE_UNUSED,
1705 asection *asec,
1706 bfd_byte *contents ATTRIBUTE_UNUSED)
1707 {
1708 return apuinfo_set && strcmp (asec->name, APUINFO_SECTION_NAME) == 0;
1709 }
1710
1711 /* Finally we can generate the output section. */
1712
1713 static void
1714 ppc_final_write_processing (bfd *abfd)
1715 {
1716 bfd_byte *buffer;
1717 asection *asec;
1718 unsigned i;
1719 unsigned num_entries;
1720 bfd_size_type length;
1721
1722 asec = bfd_get_section_by_name (abfd, APUINFO_SECTION_NAME);
1723 if (asec == NULL)
1724 return;
1725
1726 if (!apuinfo_set)
1727 return;
1728
1729 length = asec->size;
1730 if (length < 20)
1731 return;
1732
1733 buffer = bfd_malloc (length);
1734 if (buffer == NULL)
1735 {
1736 _bfd_error_handler
1737 (_("failed to allocate space for new APUinfo section"));
1738 return;
1739 }
1740
1741 /* Create the apuinfo header. */
1742 num_entries = apuinfo_list_length ();
1743 bfd_put_32 (abfd, sizeof APUINFO_LABEL, buffer);
1744 bfd_put_32 (abfd, num_entries * 4, buffer + 4);
1745 bfd_put_32 (abfd, 0x2, buffer + 8);
1746 strcpy ((char *) buffer + 12, APUINFO_LABEL);
1747
1748 length = 20;
1749 for (i = 0; i < num_entries; i++)
1750 {
1751 bfd_put_32 (abfd, apuinfo_list_element (i), buffer + length);
1752 length += 4;
1753 }
1754
1755 if (length != asec->size)
1756 _bfd_error_handler (_("failed to compute new APUinfo section"));
1757
1758 if (! bfd_set_section_contents (abfd, asec, buffer, (file_ptr) 0, length))
1759 _bfd_error_handler (_("failed to install new APUinfo section"));
1760
1761 free (buffer);
1762
1763 apuinfo_list_finish ();
1764 }
1765
1766 static bfd_boolean
1767 ppc_elf_final_write_processing (bfd *abfd)
1768 {
1769 ppc_final_write_processing (abfd);
1770 return _bfd_elf_final_write_processing (abfd);
1771 }
1772 \f
1773 static bfd_boolean
1774 is_nonpic_glink_stub (bfd *abfd, asection *glink, bfd_vma off)
1775 {
1776 bfd_byte buf[4 * 4];
1777
1778 if (!bfd_get_section_contents (abfd, glink, buf, off, sizeof buf))
1779 return FALSE;
1780
1781 return ((bfd_get_32 (abfd, buf + 0) & 0xffff0000) == LIS_11
1782 && (bfd_get_32 (abfd, buf + 4) & 0xffff0000) == LWZ_11_11
1783 && bfd_get_32 (abfd, buf + 8) == MTCTR_11
1784 && bfd_get_32 (abfd, buf + 12) == BCTR);
1785 }
1786
1787 static bfd_boolean
1788 section_covers_vma (bfd *abfd ATTRIBUTE_UNUSED, asection *section, void *ptr)
1789 {
1790 bfd_vma vma = *(bfd_vma *) ptr;
1791 return ((section->flags & SEC_ALLOC) != 0
1792 && section->vma <= vma
1793 && vma < section->vma + section->size);
1794 }
1795
1796 static long
1797 ppc_elf_get_synthetic_symtab (bfd *abfd, long symcount, asymbol **syms,
1798 long dynsymcount, asymbol **dynsyms,
1799 asymbol **ret)
1800 {
1801 bfd_boolean (*slurp_relocs) (bfd *, asection *, asymbol **, bfd_boolean);
1802 asection *plt, *relplt, *dynamic, *glink;
1803 bfd_vma glink_vma = 0;
1804 bfd_vma resolv_vma = 0;
1805 bfd_vma stub_off;
1806 asymbol *s;
1807 arelent *p;
1808 size_t count, i, stub_delta;
1809 size_t size;
1810 char *names;
1811 bfd_byte buf[4];
1812
1813 *ret = NULL;
1814
1815 if ((abfd->flags & (DYNAMIC | EXEC_P)) == 0)
1816 return 0;
1817
1818 if (dynsymcount <= 0)
1819 return 0;
1820
1821 relplt = bfd_get_section_by_name (abfd, ".rela.plt");
1822 if (relplt == NULL)
1823 return 0;
1824
1825 plt = bfd_get_section_by_name (abfd, ".plt");
1826 if (plt == NULL)
1827 return 0;
1828
1829 /* Call common code to handle old-style executable PLTs. */
1830 if (elf_section_flags (plt) & SHF_EXECINSTR)
1831 return _bfd_elf_get_synthetic_symtab (abfd, symcount, syms,
1832 dynsymcount, dynsyms, ret);
1833
1834 /* If this object was prelinked, the prelinker stored the address
1835 of .glink at got[1]. If it wasn't prelinked, got[1] will be zero. */
1836 dynamic = bfd_get_section_by_name (abfd, ".dynamic");
1837 if (dynamic != NULL)
1838 {
1839 bfd_byte *dynbuf, *extdyn, *extdynend;
1840 size_t extdynsize;
1841 void (*swap_dyn_in) (bfd *, const void *, Elf_Internal_Dyn *);
1842
1843 if (!bfd_malloc_and_get_section (abfd, dynamic, &dynbuf))
1844 return -1;
1845
1846 extdynsize = get_elf_backend_data (abfd)->s->sizeof_dyn;
1847 swap_dyn_in = get_elf_backend_data (abfd)->s->swap_dyn_in;
1848
1849 extdyn = dynbuf;
1850 extdynend = extdyn + dynamic->size;
1851 for (; extdyn < extdynend; extdyn += extdynsize)
1852 {
1853 Elf_Internal_Dyn dyn;
1854 (*swap_dyn_in) (abfd, extdyn, &dyn);
1855
1856 if (dyn.d_tag == DT_NULL)
1857 break;
1858
1859 if (dyn.d_tag == DT_PPC_GOT)
1860 {
1861 unsigned int g_o_t = dyn.d_un.d_val;
1862 asection *got = bfd_get_section_by_name (abfd, ".got");
1863 if (got != NULL
1864 && bfd_get_section_contents (abfd, got, buf,
1865 g_o_t - got->vma + 4, 4))
1866 glink_vma = bfd_get_32 (abfd, buf);
1867 break;
1868 }
1869 }
1870 free (dynbuf);
1871 }
1872
1873 /* Otherwise we read the first plt entry. */
1874 if (glink_vma == 0)
1875 {
1876 if (bfd_get_section_contents (abfd, plt, buf, 0, 4))
1877 glink_vma = bfd_get_32 (abfd, buf);
1878 }
1879
1880 if (glink_vma == 0)
1881 return 0;
1882
1883 /* The .glink section usually does not survive the final
1884 link; search for the section (usually .text) where the
1885 glink stubs now reside. */
1886 glink = bfd_sections_find_if (abfd, section_covers_vma, &glink_vma);
1887 if (glink == NULL)
1888 return 0;
1889
1890 /* Determine glink PLT resolver by reading the relative branch
1891 from the first glink stub. */
1892 if (bfd_get_section_contents (abfd, glink, buf,
1893 glink_vma - glink->vma, 4))
1894 {
1895 unsigned int insn = bfd_get_32 (abfd, buf);
1896
1897 /* The first glink stub may either branch to the resolver ... */
1898 insn ^= B;
1899 if ((insn & ~0x3fffffc) == 0)
1900 resolv_vma = glink_vma + (insn ^ 0x2000000) - 0x2000000;
1901
1902 /* ... or fall through a bunch of NOPs. */
1903 else if ((insn ^ B ^ NOP) == 0)
1904 for (i = 4;
1905 bfd_get_section_contents (abfd, glink, buf,
1906 glink_vma - glink->vma + i, 4);
1907 i += 4)
1908 if (bfd_get_32 (abfd, buf) != NOP)
1909 {
1910 resolv_vma = glink_vma + i;
1911 break;
1912 }
1913 }
1914
1915 count = relplt->size / sizeof (Elf32_External_Rela);
1916 /* If the stubs are those for -shared/-pie then we might have
1917 multiple stubs for each plt entry. If that is the case then
1918 there is no way to associate stubs with their plt entries short
1919 of figuring out the GOT pointer value used in the stub.
1920 The offsets tested here need to cover all possible values of
1921 GLINK_ENTRY_SIZE for other than __tls_get_addr_opt. */
1922 stub_off = glink_vma - glink->vma;
1923 for (stub_delta = 16; stub_delta <= 32; stub_delta += 8)
1924 if (is_nonpic_glink_stub (abfd, glink, stub_off - stub_delta))
1925 break;
1926 if (stub_delta > 32)
1927 return 0;
1928
1929 slurp_relocs = get_elf_backend_data (abfd)->s->slurp_reloc_table;
1930 if (! (*slurp_relocs) (abfd, relplt, dynsyms, TRUE))
1931 return -1;
1932
1933 size = count * sizeof (asymbol);
1934 p = relplt->relocation;
1935 for (i = 0; i < count; i++, p++)
1936 {
1937 size += strlen ((*p->sym_ptr_ptr)->name) + sizeof ("@plt");
1938 if (p->addend != 0)
1939 size += sizeof ("+0x") - 1 + 8;
1940 }
1941
1942 size += sizeof (asymbol) + sizeof ("__glink");
1943
1944 if (resolv_vma)
1945 size += sizeof (asymbol) + sizeof ("__glink_PLTresolve");
1946
1947 s = *ret = bfd_malloc (size);
1948 if (s == NULL)
1949 return -1;
1950
1951 stub_off = glink_vma - glink->vma;
1952 names = (char *) (s + count + 1 + (resolv_vma != 0));
1953 p = relplt->relocation + count - 1;
1954 for (i = 0; i < count; i++)
1955 {
1956 size_t len;
1957
1958 stub_off -= stub_delta;
1959 if (strcmp ((*p->sym_ptr_ptr)->name, "__tls_get_addr_opt") == 0)
1960 stub_off -= 32;
1961 *s = **p->sym_ptr_ptr;
1962 /* Undefined syms won't have BSF_LOCAL or BSF_GLOBAL set. Since
1963 we are defining a symbol, ensure one of them is set. */
1964 if ((s->flags & BSF_LOCAL) == 0)
1965 s->flags |= BSF_GLOBAL;
1966 s->flags |= BSF_SYNTHETIC;
1967 s->section = glink;
1968 s->value = stub_off;
1969 s->name = names;
1970 s->udata.p = NULL;
1971 len = strlen ((*p->sym_ptr_ptr)->name);
1972 memcpy (names, (*p->sym_ptr_ptr)->name, len);
1973 names += len;
1974 if (p->addend != 0)
1975 {
1976 memcpy (names, "+0x", sizeof ("+0x") - 1);
1977 names += sizeof ("+0x") - 1;
1978 bfd_sprintf_vma (abfd, names, p->addend);
1979 names += strlen (names);
1980 }
1981 memcpy (names, "@plt", sizeof ("@plt"));
1982 names += sizeof ("@plt");
1983 ++s;
1984 --p;
1985 }
1986
1987 /* Add a symbol at the start of the glink branch table. */
1988 memset (s, 0, sizeof *s);
1989 s->the_bfd = abfd;
1990 s->flags = BSF_GLOBAL | BSF_SYNTHETIC;
1991 s->section = glink;
1992 s->value = glink_vma - glink->vma;
1993 s->name = names;
1994 memcpy (names, "__glink", sizeof ("__glink"));
1995 names += sizeof ("__glink");
1996 s++;
1997 count++;
1998
1999 if (resolv_vma)
2000 {
2001 /* Add a symbol for the glink PLT resolver. */
2002 memset (s, 0, sizeof *s);
2003 s->the_bfd = abfd;
2004 s->flags = BSF_GLOBAL | BSF_SYNTHETIC;
2005 s->section = glink;
2006 s->value = resolv_vma - glink->vma;
2007 s->name = names;
2008 memcpy (names, "__glink_PLTresolve", sizeof ("__glink_PLTresolve"));
2009 names += sizeof ("__glink_PLTresolve");
2010 s++;
2011 count++;
2012 }
2013
2014 return count;
2015 }
2016 \f
2017 /* The following functions are specific to the ELF linker, while
2018 functions above are used generally. They appear in this file more
2019 or less in the order in which they are called. eg.
2020 ppc_elf_check_relocs is called early in the link process,
2021 ppc_elf_finish_dynamic_sections is one of the last functions
2022 called. */
2023
2024 /* Track PLT entries needed for a given symbol. We might need more
2025 than one glink entry per symbol when generating a pic binary. */
2026 struct plt_entry
2027 {
2028 struct plt_entry *next;
2029
2030 /* -fPIC uses multiple GOT sections, one per file, called ".got2".
2031 This field stores the offset into .got2 used to initialise the
2032 GOT pointer reg. It will always be at least 32768. (Current
2033 gcc always uses an offset of 32768, but ld -r will pack .got2
2034 sections together resulting in larger offsets). */
2035 bfd_vma addend;
2036
2037 /* The .got2 section. */
2038 asection *sec;
2039
2040 /* PLT refcount or offset. */
2041 union
2042 {
2043 bfd_signed_vma refcount;
2044 bfd_vma offset;
2045 } plt;
2046
2047 /* .glink stub offset. */
2048 bfd_vma glink_offset;
2049 };
2050
2051 /* Of those relocs that might be copied as dynamic relocs, this
2052 function selects those that must be copied when linking a shared
2053 library or PIE, even when the symbol is local. */
2054
2055 static int
2056 must_be_dyn_reloc (struct bfd_link_info *info,
2057 enum elf_ppc_reloc_type r_type)
2058 {
2059 switch (r_type)
2060 {
2061 default:
2062 /* Only relative relocs can be resolved when the object load
2063 address isn't fixed. DTPREL32 is excluded because the
2064 dynamic linker needs to differentiate global dynamic from
2065 local dynamic __tls_index pairs when PPC_OPT_TLS is set. */
2066 return 1;
2067
2068 case R_PPC_REL24:
2069 case R_PPC_REL14:
2070 case R_PPC_REL14_BRTAKEN:
2071 case R_PPC_REL14_BRNTAKEN:
2072 case R_PPC_REL32:
2073 return 0;
2074
2075 case R_PPC_TPREL32:
2076 case R_PPC_TPREL16:
2077 case R_PPC_TPREL16_LO:
2078 case R_PPC_TPREL16_HI:
2079 case R_PPC_TPREL16_HA:
2080 /* These relocations are relative but in a shared library the
2081 linker doesn't know the thread pointer base. */
2082 return bfd_link_dll (info);
2083 }
2084 }
2085
2086 /* If ELIMINATE_COPY_RELOCS is non-zero, the linker will try to avoid
2087 copying dynamic variables from a shared lib into an app's dynbss
2088 section, and instead use a dynamic relocation to point into the
2089 shared lib. */
2090 #define ELIMINATE_COPY_RELOCS 1
2091
2092 /* Used to track dynamic relocations for local symbols. */
2093 struct ppc_dyn_relocs
2094 {
2095 struct ppc_dyn_relocs *next;
2096
2097 /* The input section of the reloc. */
2098 asection *sec;
2099
2100 /* Total number of relocs copied for the input section. */
2101 unsigned int count : 31;
2102
2103 /* Whether this entry is for STT_GNU_IFUNC symbols. */
2104 unsigned int ifunc : 1;
2105 };
2106
2107 /* PPC ELF linker hash entry. */
2108
2109 struct ppc_elf_link_hash_entry
2110 {
2111 struct elf_link_hash_entry elf;
2112
2113 /* If this symbol is used in the linker created sections, the processor
2114 specific backend uses this field to map the field into the offset
2115 from the beginning of the section. */
2116 elf_linker_section_pointers_t *linker_section_pointer;
2117
2118 /* Contexts in which symbol is used in the GOT.
2119 Bits are or'd into the mask as the corresponding relocs are
2120 encountered during check_relocs, with TLS_TLS being set when any
2121 of the other TLS bits are set. tls_optimize clears bits when
2122 optimizing to indicate the corresponding GOT entry type is not
2123 needed. If set, TLS_TLS is never cleared. tls_optimize may also
2124 set TLS_GDIE when a GD reloc turns into an IE one.
2125 These flags are also kept for local symbols. */
2126 #define TLS_TLS 1 /* Any TLS reloc. */
2127 #define TLS_GD 2 /* GD reloc. */
2128 #define TLS_LD 4 /* LD reloc. */
2129 #define TLS_TPREL 8 /* TPREL reloc, => IE. */
2130 #define TLS_DTPREL 16 /* DTPREL reloc, => LD. */
2131 #define TLS_MARK 32 /* __tls_get_addr call marked. */
2132 #define TLS_GDIE 64 /* GOT TPREL reloc resulting from GD->IE. */
2133 unsigned char tls_mask;
2134
2135 /* The above field is also used to mark function symbols. In which
2136 case TLS_TLS will be 0. */
2137 #define PLT_IFUNC 2 /* STT_GNU_IFUNC. */
2138 #define PLT_KEEP 4 /* inline plt call requires plt entry. */
2139 #define NON_GOT 256 /* local symbol plt, not stored. */
2140
2141 /* Nonzero if we have seen a small data relocation referring to this
2142 symbol. */
2143 unsigned char has_sda_refs : 1;
2144
2145 /* Flag use of given relocations. */
2146 unsigned char has_addr16_ha : 1;
2147 unsigned char has_addr16_lo : 1;
2148 };
2149
2150 #define ppc_elf_hash_entry(ent) ((struct ppc_elf_link_hash_entry *) (ent))
2151
2152 /* PPC ELF linker hash table. */
2153
2154 struct ppc_elf_link_hash_table
2155 {
2156 struct elf_link_hash_table elf;
2157
2158 /* Various options passed from the linker. */
2159 struct ppc_elf_params *params;
2160
2161 /* Short-cuts to get to dynamic linker sections. */
2162 asection *glink;
2163 asection *dynsbss;
2164 asection *relsbss;
2165 elf_linker_section_t sdata[2];
2166 asection *sbss;
2167 asection *glink_eh_frame;
2168 asection *pltlocal;
2169 asection *relpltlocal;
2170
2171 /* The (unloaded but important) .rela.plt.unloaded on VxWorks. */
2172 asection *srelplt2;
2173
2174 /* Shortcut to __tls_get_addr. */
2175 struct elf_link_hash_entry *tls_get_addr;
2176
2177 /* The bfd that forced an old-style PLT. */
2178 bfd *old_bfd;
2179
2180 /* TLS local dynamic got entry handling. */
2181 union {
2182 bfd_signed_vma refcount;
2183 bfd_vma offset;
2184 } tlsld_got;
2185
2186 /* Offset of branch table to PltResolve function in glink. */
2187 bfd_vma glink_pltresolve;
2188
2189 /* Size of reserved GOT entries. */
2190 unsigned int got_header_size;
2191 /* Non-zero if allocating the header left a gap. */
2192 unsigned int got_gap;
2193
2194 /* The type of PLT we have chosen to use. */
2195 enum ppc_elf_plt_type plt_type;
2196
2197 /* Whether there exist local gnu indirect function resolvers,
2198 referenced by dynamic relocations. */
2199 unsigned int local_ifunc_resolver:1;
2200 unsigned int maybe_local_ifunc_resolver:1;
2201
2202 /* Set if tls optimization is enabled. */
2203 unsigned int do_tls_opt:1;
2204
2205 /* Set if inline plt calls should be converted to direct calls. */
2206 unsigned int can_convert_all_inline_plt:1;
2207
2208 /* The size of PLT entries. */
2209 int plt_entry_size;
2210 /* The distance between adjacent PLT slots. */
2211 int plt_slot_size;
2212 /* The size of the first PLT entry. */
2213 int plt_initial_entry_size;
2214 };
2215
2216 /* Rename some of the generic section flags to better document how they
2217 are used for ppc32. The flags are only valid for ppc32 elf objects. */
2218
2219 /* Nonzero if this section has TLS related relocations. */
2220 #define has_tls_reloc sec_flg0
2221
2222 /* Nonzero if this section has a call to __tls_get_addr lacking marker
2223 relocs. */
2224 #define nomark_tls_get_addr sec_flg1
2225
2226 /* Flag set when PLTCALL relocs are detected. */
2227 #define has_pltcall sec_flg2
2228
2229 /* Get the PPC ELF linker hash table from a link_info structure. */
2230
2231 #define ppc_elf_hash_table(p) \
2232 ((is_elf_hash_table ((p)->hash) \
2233 && elf_hash_table_id (elf_hash_table (p)) == PPC32_ELF_DATA) \
2234 ? (struct ppc_elf_link_hash_table *) (p)->hash : NULL)
2235
2236 /* Create an entry in a PPC ELF linker hash table. */
2237
2238 static struct bfd_hash_entry *
2239 ppc_elf_link_hash_newfunc (struct bfd_hash_entry *entry,
2240 struct bfd_hash_table *table,
2241 const char *string)
2242 {
2243 /* Allocate the structure if it has not already been allocated by a
2244 subclass. */
2245 if (entry == NULL)
2246 {
2247 entry = bfd_hash_allocate (table,
2248 sizeof (struct ppc_elf_link_hash_entry));
2249 if (entry == NULL)
2250 return entry;
2251 }
2252
2253 /* Call the allocation method of the superclass. */
2254 entry = _bfd_elf_link_hash_newfunc (entry, table, string);
2255 if (entry != NULL)
2256 {
2257 ppc_elf_hash_entry (entry)->linker_section_pointer = NULL;
2258 ppc_elf_hash_entry (entry)->tls_mask = 0;
2259 ppc_elf_hash_entry (entry)->has_sda_refs = 0;
2260 }
2261
2262 return entry;
2263 }
2264
2265 /* Create a PPC ELF linker hash table. */
2266
2267 static struct bfd_link_hash_table *
2268 ppc_elf_link_hash_table_create (bfd *abfd)
2269 {
2270 struct ppc_elf_link_hash_table *ret;
2271 static struct ppc_elf_params default_params
2272 = { PLT_OLD, 0, 0, 1, 0, 0, 12, 0, 0, 0 };
2273
2274 ret = bfd_zmalloc (sizeof (struct ppc_elf_link_hash_table));
2275 if (ret == NULL)
2276 return NULL;
2277
2278 if (!_bfd_elf_link_hash_table_init (&ret->elf, abfd,
2279 ppc_elf_link_hash_newfunc,
2280 sizeof (struct ppc_elf_link_hash_entry),
2281 PPC32_ELF_DATA))
2282 {
2283 free (ret);
2284 return NULL;
2285 }
2286
2287 ret->elf.init_plt_refcount.refcount = 0;
2288 ret->elf.init_plt_refcount.glist = NULL;
2289 ret->elf.init_plt_offset.offset = 0;
2290 ret->elf.init_plt_offset.glist = NULL;
2291
2292 ret->params = &default_params;
2293
2294 ret->sdata[0].name = ".sdata";
2295 ret->sdata[0].sym_name = "_SDA_BASE_";
2296 ret->sdata[0].bss_name = ".sbss";
2297
2298 ret->sdata[1].name = ".sdata2";
2299 ret->sdata[1].sym_name = "_SDA2_BASE_";
2300 ret->sdata[1].bss_name = ".sbss2";
2301
2302 ret->plt_entry_size = 12;
2303 ret->plt_slot_size = 8;
2304 ret->plt_initial_entry_size = 72;
2305
2306 return &ret->elf.root;
2307 }
2308
2309 /* Hook linker params into hash table. */
2310
2311 void
2312 ppc_elf_link_params (struct bfd_link_info *info, struct ppc_elf_params *params)
2313 {
2314 struct ppc_elf_link_hash_table *htab = ppc_elf_hash_table (info);
2315
2316 if (htab)
2317 htab->params = params;
2318 params->pagesize_p2 = bfd_log2 (params->pagesize);
2319 }
2320
2321 /* Create .got and the related sections. */
2322
2323 static bfd_boolean
2324 ppc_elf_create_got (bfd *abfd, struct bfd_link_info *info)
2325 {
2326 struct ppc_elf_link_hash_table *htab;
2327
2328 if (!_bfd_elf_create_got_section (abfd, info))
2329 return FALSE;
2330
2331 htab = ppc_elf_hash_table (info);
2332 if (htab->elf.target_os != is_vxworks)
2333 {
2334 /* The powerpc .got has a blrl instruction in it. Mark it
2335 executable. */
2336 flagword flags = (SEC_ALLOC | SEC_LOAD | SEC_CODE | SEC_HAS_CONTENTS
2337 | SEC_IN_MEMORY | SEC_LINKER_CREATED);
2338 if (!bfd_set_section_flags (htab->elf.sgot, flags))
2339 return FALSE;
2340 }
2341
2342 return TRUE;
2343 }
2344
2345 /* Create a special linker section, used for R_PPC_EMB_SDAI16 and
2346 R_PPC_EMB_SDA2I16 pointers. These sections become part of .sdata
2347 and .sdata2. Create _SDA_BASE_ and _SDA2_BASE too. */
2348
2349 static bfd_boolean
2350 ppc_elf_create_linker_section (bfd *abfd,
2351 struct bfd_link_info *info,
2352 flagword flags,
2353 elf_linker_section_t *lsect)
2354 {
2355 asection *s;
2356
2357 flags |= (SEC_ALLOC | SEC_LOAD | SEC_HAS_CONTENTS | SEC_IN_MEMORY
2358 | SEC_LINKER_CREATED);
2359
2360 s = bfd_make_section_anyway_with_flags (abfd, lsect->name, flags);
2361 if (s == NULL)
2362 return FALSE;
2363 lsect->section = s;
2364
2365 /* Define the sym on the first section of this name. */
2366 s = bfd_get_section_by_name (abfd, lsect->name);
2367
2368 lsect->sym = _bfd_elf_define_linkage_sym (abfd, info, s, lsect->sym_name);
2369 if (lsect->sym == NULL)
2370 return FALSE;
2371 lsect->sym->root.u.def.value = 0x8000;
2372 return TRUE;
2373 }
2374
2375 static bfd_boolean
2376 ppc_elf_create_glink (bfd *abfd, struct bfd_link_info *info)
2377 {
2378 struct ppc_elf_link_hash_table *htab = ppc_elf_hash_table (info);
2379 asection *s;
2380 flagword flags;
2381 int p2align;
2382
2383 flags = (SEC_ALLOC | SEC_LOAD | SEC_CODE | SEC_READONLY | SEC_HAS_CONTENTS
2384 | SEC_IN_MEMORY | SEC_LINKER_CREATED);
2385 s = bfd_make_section_anyway_with_flags (abfd, ".glink", flags);
2386 htab->glink = s;
2387 p2align = htab->params->ppc476_workaround ? 6 : 4;
2388 if (p2align < htab->params->plt_stub_align)
2389 p2align = htab->params->plt_stub_align;
2390 if (s == NULL
2391 || !bfd_set_section_alignment (s, p2align))
2392 return FALSE;
2393
2394 if (!info->no_ld_generated_unwind_info)
2395 {
2396 flags = (SEC_ALLOC | SEC_LOAD | SEC_READONLY | SEC_HAS_CONTENTS
2397 | SEC_IN_MEMORY | SEC_LINKER_CREATED);
2398 s = bfd_make_section_anyway_with_flags (abfd, ".eh_frame", flags);
2399 htab->glink_eh_frame = s;
2400 if (s == NULL
2401 || !bfd_set_section_alignment (s, 2))
2402 return FALSE;
2403 }
2404
2405 flags = SEC_ALLOC | SEC_LINKER_CREATED;
2406 s = bfd_make_section_anyway_with_flags (abfd, ".iplt", flags);
2407 htab->elf.iplt = s;
2408 if (s == NULL
2409 || !bfd_set_section_alignment (s, 4))
2410 return FALSE;
2411
2412 flags = (SEC_ALLOC | SEC_LOAD | SEC_READONLY | SEC_HAS_CONTENTS
2413 | SEC_IN_MEMORY | SEC_LINKER_CREATED);
2414 s = bfd_make_section_anyway_with_flags (abfd, ".rela.iplt", flags);
2415 htab->elf.irelplt = s;
2416 if (s == NULL
2417 || ! bfd_set_section_alignment (s, 2))
2418 return FALSE;
2419
2420 /* Local plt entries. */
2421 flags = (SEC_ALLOC | SEC_LOAD
2422 | SEC_HAS_CONTENTS | SEC_IN_MEMORY | SEC_LINKER_CREATED);
2423 htab->pltlocal = bfd_make_section_anyway_with_flags (abfd, ".branch_lt",
2424 flags);
2425 if (htab->pltlocal == NULL
2426 || !bfd_set_section_alignment (htab->pltlocal, 2))
2427 return FALSE;
2428
2429 if (bfd_link_pic (info))
2430 {
2431 flags = (SEC_ALLOC | SEC_LOAD | SEC_READONLY
2432 | SEC_HAS_CONTENTS | SEC_IN_MEMORY | SEC_LINKER_CREATED);
2433 htab->relpltlocal
2434 = bfd_make_section_anyway_with_flags (abfd, ".rela.branch_lt", flags);
2435 if (htab->relpltlocal == NULL
2436 || !bfd_set_section_alignment (htab->relpltlocal, 2))
2437 return FALSE;
2438 }
2439
2440 if (!ppc_elf_create_linker_section (abfd, info, 0,
2441 &htab->sdata[0]))
2442 return FALSE;
2443
2444 if (!ppc_elf_create_linker_section (abfd, info, SEC_READONLY,
2445 &htab->sdata[1]))
2446 return FALSE;
2447
2448 return TRUE;
2449 }
2450
2451 /* We have to create .dynsbss and .rela.sbss here so that they get mapped
2452 to output sections (just like _bfd_elf_create_dynamic_sections has
2453 to create .dynbss and .rela.bss). */
2454
2455 static bfd_boolean
2456 ppc_elf_create_dynamic_sections (bfd *abfd, struct bfd_link_info *info)
2457 {
2458 struct ppc_elf_link_hash_table *htab;
2459 asection *s;
2460 flagword flags;
2461
2462 htab = ppc_elf_hash_table (info);
2463
2464 if (htab->elf.sgot == NULL
2465 && !ppc_elf_create_got (abfd, info))
2466 return FALSE;
2467
2468 if (!_bfd_elf_create_dynamic_sections (abfd, info))
2469 return FALSE;
2470
2471 if (htab->glink == NULL
2472 && !ppc_elf_create_glink (abfd, info))
2473 return FALSE;
2474
2475 s = bfd_make_section_anyway_with_flags (abfd, ".dynsbss",
2476 SEC_ALLOC | SEC_LINKER_CREATED);
2477 htab->dynsbss = s;
2478 if (s == NULL)
2479 return FALSE;
2480
2481 if (! bfd_link_pic (info))
2482 {
2483 flags = (SEC_ALLOC | SEC_LOAD | SEC_READONLY | SEC_HAS_CONTENTS
2484 | SEC_IN_MEMORY | SEC_LINKER_CREATED);
2485 s = bfd_make_section_anyway_with_flags (abfd, ".rela.sbss", flags);
2486 htab->relsbss = s;
2487 if (s == NULL
2488 || !bfd_set_section_alignment (s, 2))
2489 return FALSE;
2490 }
2491
2492 if (htab->elf.target_os == is_vxworks
2493 && !elf_vxworks_create_dynamic_sections (abfd, info, &htab->srelplt2))
2494 return FALSE;
2495
2496 s = htab->elf.splt;
2497 flags = SEC_ALLOC | SEC_CODE | SEC_LINKER_CREATED;
2498 if (htab->plt_type == PLT_VXWORKS)
2499 /* The VxWorks PLT is a loaded section with contents. */
2500 flags |= SEC_HAS_CONTENTS | SEC_LOAD | SEC_READONLY;
2501 return bfd_set_section_flags (s, flags);
2502 }
2503
2504 /* Copy the extra info we tack onto an elf_link_hash_entry. */
2505
2506 static void
2507 ppc_elf_copy_indirect_symbol (struct bfd_link_info *info,
2508 struct elf_link_hash_entry *dir,
2509 struct elf_link_hash_entry *ind)
2510 {
2511 struct ppc_elf_link_hash_entry *edir, *eind;
2512
2513 edir = (struct ppc_elf_link_hash_entry *) dir;
2514 eind = (struct ppc_elf_link_hash_entry *) ind;
2515
2516 edir->tls_mask |= eind->tls_mask;
2517 edir->has_sda_refs |= eind->has_sda_refs;
2518
2519 if (edir->elf.versioned != versioned_hidden)
2520 edir->elf.ref_dynamic |= eind->elf.ref_dynamic;
2521 edir->elf.ref_regular |= eind->elf.ref_regular;
2522 edir->elf.ref_regular_nonweak |= eind->elf.ref_regular_nonweak;
2523 edir->elf.non_got_ref |= eind->elf.non_got_ref;
2524 edir->elf.needs_plt |= eind->elf.needs_plt;
2525 edir->elf.pointer_equality_needed |= eind->elf.pointer_equality_needed;
2526
2527 /* If we were called to copy over info for a weak sym, that's all. */
2528 if (eind->elf.root.type != bfd_link_hash_indirect)
2529 return;
2530
2531 if (ind->dyn_relocs != NULL)
2532 {
2533 if (dir->dyn_relocs != NULL)
2534 {
2535 struct elf_dyn_relocs **pp;
2536 struct elf_dyn_relocs *p;
2537
2538 /* Add reloc counts against the indirect sym to the direct sym
2539 list. Merge any entries against the same section. */
2540 for (pp = &ind->dyn_relocs; (p = *pp) != NULL; )
2541 {
2542 struct elf_dyn_relocs *q;
2543
2544 for (q = dir->dyn_relocs; q != NULL; q = q->next)
2545 if (q->sec == p->sec)
2546 {
2547 q->pc_count += p->pc_count;
2548 q->count += p->count;
2549 *pp = p->next;
2550 break;
2551 }
2552 if (q == NULL)
2553 pp = &p->next;
2554 }
2555 *pp = dir->dyn_relocs;
2556 }
2557
2558 dir->dyn_relocs = ind->dyn_relocs;
2559 ind->dyn_relocs = NULL;
2560 }
2561
2562 /* Copy over the GOT refcount entries that we may have already seen to
2563 the symbol which just became indirect. */
2564 edir->elf.got.refcount += eind->elf.got.refcount;
2565 eind->elf.got.refcount = 0;
2566
2567 /* And plt entries. */
2568 if (eind->elf.plt.plist != NULL)
2569 {
2570 if (edir->elf.plt.plist != NULL)
2571 {
2572 struct plt_entry **entp;
2573 struct plt_entry *ent;
2574
2575 for (entp = &eind->elf.plt.plist; (ent = *entp) != NULL; )
2576 {
2577 struct plt_entry *dent;
2578
2579 for (dent = edir->elf.plt.plist; dent != NULL; dent = dent->next)
2580 if (dent->sec == ent->sec && dent->addend == ent->addend)
2581 {
2582 dent->plt.refcount += ent->plt.refcount;
2583 *entp = ent->next;
2584 break;
2585 }
2586 if (dent == NULL)
2587 entp = &ent->next;
2588 }
2589 *entp = edir->elf.plt.plist;
2590 }
2591
2592 edir->elf.plt.plist = eind->elf.plt.plist;
2593 eind->elf.plt.plist = NULL;
2594 }
2595
2596 if (eind->elf.dynindx != -1)
2597 {
2598 if (edir->elf.dynindx != -1)
2599 _bfd_elf_strtab_delref (elf_hash_table (info)->dynstr,
2600 edir->elf.dynstr_index);
2601 edir->elf.dynindx = eind->elf.dynindx;
2602 edir->elf.dynstr_index = eind->elf.dynstr_index;
2603 eind->elf.dynindx = -1;
2604 eind->elf.dynstr_index = 0;
2605 }
2606 }
2607
2608 /* Hook called by the linker routine which adds symbols from an object
2609 file. We use it to put .comm items in .sbss, and not .bss. */
2610
2611 static bfd_boolean
2612 ppc_elf_add_symbol_hook (bfd *abfd,
2613 struct bfd_link_info *info,
2614 Elf_Internal_Sym *sym,
2615 const char **namep ATTRIBUTE_UNUSED,
2616 flagword *flagsp ATTRIBUTE_UNUSED,
2617 asection **secp,
2618 bfd_vma *valp)
2619 {
2620 if (sym->st_shndx == SHN_COMMON
2621 && !bfd_link_relocatable (info)
2622 && is_ppc_elf (info->output_bfd)
2623 && sym->st_size <= elf_gp_size (abfd))
2624 {
2625 /* Common symbols less than or equal to -G nn bytes are automatically
2626 put into .sbss. */
2627 struct ppc_elf_link_hash_table *htab;
2628
2629 htab = ppc_elf_hash_table (info);
2630 if (htab->sbss == NULL)
2631 {
2632 flagword flags = SEC_IS_COMMON | SEC_SMALL_DATA | SEC_LINKER_CREATED;
2633
2634 if (!htab->elf.dynobj)
2635 htab->elf.dynobj = abfd;
2636
2637 htab->sbss = bfd_make_section_anyway_with_flags (htab->elf.dynobj,
2638 ".sbss",
2639 flags);
2640 if (htab->sbss == NULL)
2641 return FALSE;
2642 }
2643
2644 *secp = htab->sbss;
2645 *valp = sym->st_size;
2646 }
2647
2648 return TRUE;
2649 }
2650 \f
2651 /* Find a linker generated pointer with a given addend and type. */
2652
2653 static elf_linker_section_pointers_t *
2654 elf_find_pointer_linker_section
2655 (elf_linker_section_pointers_t *linker_pointers,
2656 bfd_vma addend,
2657 elf_linker_section_t *lsect)
2658 {
2659 for ( ; linker_pointers != NULL; linker_pointers = linker_pointers->next)
2660 if (lsect == linker_pointers->lsect && addend == linker_pointers->addend)
2661 return linker_pointers;
2662
2663 return NULL;
2664 }
2665
2666 /* Allocate a pointer to live in a linker created section. */
2667
2668 static bfd_boolean
2669 elf_allocate_pointer_linker_section (bfd *abfd,
2670 elf_linker_section_t *lsect,
2671 struct elf_link_hash_entry *h,
2672 const Elf_Internal_Rela *rel)
2673 {
2674 elf_linker_section_pointers_t **ptr_linker_section_ptr = NULL;
2675 elf_linker_section_pointers_t *linker_section_ptr;
2676 unsigned long r_symndx = ELF32_R_SYM (rel->r_info);
2677 bfd_size_type amt;
2678
2679 BFD_ASSERT (lsect != NULL);
2680
2681 /* Is this a global symbol? */
2682 if (h != NULL)
2683 {
2684 struct ppc_elf_link_hash_entry *eh;
2685
2686 /* Has this symbol already been allocated? If so, our work is done. */
2687 eh = (struct ppc_elf_link_hash_entry *) h;
2688 if (elf_find_pointer_linker_section (eh->linker_section_pointer,
2689 rel->r_addend,
2690 lsect))
2691 return TRUE;
2692
2693 ptr_linker_section_ptr = &eh->linker_section_pointer;
2694 }
2695 else
2696 {
2697 BFD_ASSERT (is_ppc_elf (abfd));
2698
2699 /* Allocation of a pointer to a local symbol. */
2700 elf_linker_section_pointers_t **ptr = elf_local_ptr_offsets (abfd);
2701
2702 /* Allocate a table to hold the local symbols if first time. */
2703 if (!ptr)
2704 {
2705 unsigned int num_symbols = elf_symtab_hdr (abfd).sh_info;
2706
2707 amt = num_symbols;
2708 amt *= sizeof (elf_linker_section_pointers_t *);
2709 ptr = bfd_zalloc (abfd, amt);
2710
2711 if (!ptr)
2712 return FALSE;
2713
2714 elf_local_ptr_offsets (abfd) = ptr;
2715 }
2716
2717 /* Has this symbol already been allocated? If so, our work is done. */
2718 if (elf_find_pointer_linker_section (ptr[r_symndx],
2719 rel->r_addend,
2720 lsect))
2721 return TRUE;
2722
2723 ptr_linker_section_ptr = &ptr[r_symndx];
2724 }
2725
2726 /* Allocate space for a pointer in the linker section, and allocate
2727 a new pointer record from internal memory. */
2728 BFD_ASSERT (ptr_linker_section_ptr != NULL);
2729 amt = sizeof (elf_linker_section_pointers_t);
2730 linker_section_ptr = bfd_alloc (abfd, amt);
2731
2732 if (!linker_section_ptr)
2733 return FALSE;
2734
2735 linker_section_ptr->next = *ptr_linker_section_ptr;
2736 linker_section_ptr->addend = rel->r_addend;
2737 linker_section_ptr->lsect = lsect;
2738 *ptr_linker_section_ptr = linker_section_ptr;
2739
2740 if (!bfd_set_section_alignment (lsect->section, 2))
2741 return FALSE;
2742 linker_section_ptr->offset = lsect->section->size;
2743 lsect->section->size += 4;
2744
2745 #ifdef DEBUG
2746 fprintf (stderr,
2747 "Create pointer in linker section %s, offset = %ld, section size = %ld\n",
2748 lsect->name, (long) linker_section_ptr->offset,
2749 (long) lsect->section->size);
2750 #endif
2751
2752 return TRUE;
2753 }
2754
2755 static struct plt_entry **
2756 update_local_sym_info (bfd *abfd,
2757 Elf_Internal_Shdr *symtab_hdr,
2758 unsigned long r_symndx,
2759 int tls_type)
2760 {
2761 bfd_signed_vma *local_got_refcounts = elf_local_got_refcounts (abfd);
2762 struct plt_entry **local_plt;
2763 unsigned char *local_got_tls_masks;
2764
2765 if (local_got_refcounts == NULL)
2766 {
2767 bfd_size_type size = symtab_hdr->sh_info;
2768
2769 size *= (sizeof (*local_got_refcounts)
2770 + sizeof (*local_plt)
2771 + sizeof (*local_got_tls_masks));
2772 local_got_refcounts = bfd_zalloc (abfd, size);
2773 if (local_got_refcounts == NULL)
2774 return NULL;
2775 elf_local_got_refcounts (abfd) = local_got_refcounts;
2776 }
2777
2778 local_plt = (struct plt_entry **) (local_got_refcounts + symtab_hdr->sh_info);
2779 local_got_tls_masks = (unsigned char *) (local_plt + symtab_hdr->sh_info);
2780 local_got_tls_masks[r_symndx] |= tls_type & 0xff;
2781 if ((tls_type & NON_GOT) == 0)
2782 local_got_refcounts[r_symndx] += 1;
2783 return local_plt + r_symndx;
2784 }
2785
2786 static bfd_boolean
2787 update_plt_info (bfd *abfd, struct plt_entry **plist,
2788 asection *sec, bfd_vma addend)
2789 {
2790 struct plt_entry *ent;
2791
2792 if (addend < 32768)
2793 sec = NULL;
2794 for (ent = *plist; ent != NULL; ent = ent->next)
2795 if (ent->sec == sec && ent->addend == addend)
2796 break;
2797 if (ent == NULL)
2798 {
2799 size_t amt = sizeof (*ent);
2800 ent = bfd_alloc (abfd, amt);
2801 if (ent == NULL)
2802 return FALSE;
2803 ent->next = *plist;
2804 ent->sec = sec;
2805 ent->addend = addend;
2806 ent->plt.refcount = 0;
2807 *plist = ent;
2808 }
2809 ent->plt.refcount += 1;
2810 return TRUE;
2811 }
2812
2813 static struct plt_entry *
2814 find_plt_ent (struct plt_entry **plist, asection *sec, bfd_vma addend)
2815 {
2816 struct plt_entry *ent;
2817
2818 if (addend < 32768)
2819 sec = NULL;
2820 for (ent = *plist; ent != NULL; ent = ent->next)
2821 if (ent->sec == sec && ent->addend == addend)
2822 break;
2823 return ent;
2824 }
2825
2826 static bfd_boolean
2827 is_branch_reloc (enum elf_ppc_reloc_type r_type)
2828 {
2829 return (r_type == R_PPC_PLTREL24
2830 || r_type == R_PPC_LOCAL24PC
2831 || r_type == R_PPC_REL24
2832 || r_type == R_PPC_REL14
2833 || r_type == R_PPC_REL14_BRTAKEN
2834 || r_type == R_PPC_REL14_BRNTAKEN
2835 || r_type == R_PPC_ADDR24
2836 || r_type == R_PPC_ADDR14
2837 || r_type == R_PPC_ADDR14_BRTAKEN
2838 || r_type == R_PPC_ADDR14_BRNTAKEN
2839 || r_type == R_PPC_VLE_REL24);
2840 }
2841
2842 /* Relocs on inline plt call sequence insns prior to the call. */
2843
2844 static bfd_boolean
2845 is_plt_seq_reloc (enum elf_ppc_reloc_type r_type)
2846 {
2847 return (r_type == R_PPC_PLT16_HA
2848 || r_type == R_PPC_PLT16_HI
2849 || r_type == R_PPC_PLT16_LO
2850 || r_type == R_PPC_PLTSEQ);
2851 }
2852
2853 static void
2854 bad_shared_reloc (bfd *abfd, enum elf_ppc_reloc_type r_type)
2855 {
2856 _bfd_error_handler
2857 /* xgettext:c-format */
2858 (_("%pB: relocation %s cannot be used when making a shared object"),
2859 abfd,
2860 ppc_elf_howto_table[r_type]->name);
2861 bfd_set_error (bfd_error_bad_value);
2862 }
2863
2864 /* Look through the relocs for a section during the first phase, and
2865 allocate space in the global offset table or procedure linkage
2866 table. */
2867
2868 static bfd_boolean
2869 ppc_elf_check_relocs (bfd *abfd,
2870 struct bfd_link_info *info,
2871 asection *sec,
2872 const Elf_Internal_Rela *relocs)
2873 {
2874 struct ppc_elf_link_hash_table *htab;
2875 Elf_Internal_Shdr *symtab_hdr;
2876 struct elf_link_hash_entry **sym_hashes;
2877 const Elf_Internal_Rela *rel;
2878 const Elf_Internal_Rela *rel_end;
2879 asection *got2, *sreloc;
2880 struct elf_link_hash_entry *tga;
2881
2882 if (bfd_link_relocatable (info))
2883 return TRUE;
2884
2885 #ifdef DEBUG
2886 _bfd_error_handler ("ppc_elf_check_relocs called for section %pA in %pB",
2887 sec, abfd);
2888 #endif
2889
2890 BFD_ASSERT (is_ppc_elf (abfd));
2891
2892 /* Initialize howto table if not already done. */
2893 if (!ppc_elf_howto_table[R_PPC_ADDR32])
2894 ppc_elf_howto_init ();
2895
2896 htab = ppc_elf_hash_table (info);
2897 if (htab->glink == NULL)
2898 {
2899 if (htab->elf.dynobj == NULL)
2900 htab->elf.dynobj = abfd;
2901 if (!ppc_elf_create_glink (htab->elf.dynobj, info))
2902 return FALSE;
2903 }
2904 tga = elf_link_hash_lookup (&htab->elf, "__tls_get_addr",
2905 FALSE, FALSE, TRUE);
2906 symtab_hdr = &elf_symtab_hdr (abfd);
2907 sym_hashes = elf_sym_hashes (abfd);
2908 got2 = bfd_get_section_by_name (abfd, ".got2");
2909 sreloc = NULL;
2910
2911 rel_end = relocs + sec->reloc_count;
2912 for (rel = relocs; rel < rel_end; rel++)
2913 {
2914 unsigned long r_symndx;
2915 enum elf_ppc_reloc_type r_type;
2916 struct elf_link_hash_entry *h;
2917 int tls_type;
2918 struct plt_entry **ifunc;
2919 struct plt_entry **pltent;
2920 bfd_vma addend;
2921
2922 r_symndx = ELF32_R_SYM (rel->r_info);
2923 if (r_symndx < symtab_hdr->sh_info)
2924 h = NULL;
2925 else
2926 {
2927 h = sym_hashes[r_symndx - symtab_hdr->sh_info];
2928 while (h->root.type == bfd_link_hash_indirect
2929 || h->root.type == bfd_link_hash_warning)
2930 h = (struct elf_link_hash_entry *) h->root.u.i.link;
2931 }
2932
2933 /* If a relocation refers to _GLOBAL_OFFSET_TABLE_, create the .got.
2934 This shows up in particular in an R_PPC_ADDR32 in the eabi
2935 startup code. */
2936 if (h != NULL
2937 && htab->elf.sgot == NULL
2938 && strcmp (h->root.root.string, "_GLOBAL_OFFSET_TABLE_") == 0)
2939 {
2940 if (htab->elf.dynobj == NULL)
2941 htab->elf.dynobj = abfd;
2942 if (!ppc_elf_create_got (htab->elf.dynobj, info))
2943 return FALSE;
2944 BFD_ASSERT (h == htab->elf.hgot);
2945 }
2946
2947 tls_type = 0;
2948 r_type = ELF32_R_TYPE (rel->r_info);
2949 ifunc = NULL;
2950 if (h == NULL && htab->elf.target_os != is_vxworks)
2951 {
2952 Elf_Internal_Sym *isym = bfd_sym_from_r_symndx (&htab->elf.sym_cache,
2953 abfd, r_symndx);
2954 if (isym == NULL)
2955 return FALSE;
2956
2957 if (ELF_ST_TYPE (isym->st_info) == STT_GNU_IFUNC)
2958 {
2959 /* Set PLT_IFUNC flag for this sym, no GOT entry yet. */
2960 ifunc = update_local_sym_info (abfd, symtab_hdr, r_symndx,
2961 NON_GOT | PLT_IFUNC);
2962 if (ifunc == NULL)
2963 return FALSE;
2964
2965 /* STT_GNU_IFUNC symbols must have a PLT entry;
2966 In a non-pie executable even when there are
2967 no plt calls. */
2968 if (!bfd_link_pic (info)
2969 || is_branch_reloc (r_type)
2970 || r_type == R_PPC_PLT16_LO
2971 || r_type == R_PPC_PLT16_HI
2972 || r_type == R_PPC_PLT16_HA)
2973 {
2974 addend = 0;
2975 if (r_type == R_PPC_PLTREL24)
2976 ppc_elf_tdata (abfd)->makes_plt_call = 1;
2977 if (bfd_link_pic (info)
2978 && (r_type == R_PPC_PLTREL24
2979 || r_type == R_PPC_PLT16_LO
2980 || r_type == R_PPC_PLT16_HI
2981 || r_type == R_PPC_PLT16_HA))
2982 addend = rel->r_addend;
2983 if (!update_plt_info (abfd, ifunc, got2, addend))
2984 return FALSE;
2985 }
2986 }
2987 }
2988
2989 if (htab->elf.target_os != is_vxworks
2990 && is_branch_reloc (r_type)
2991 && h != NULL
2992 && h == tga)
2993 {
2994 if (rel != relocs
2995 && (ELF32_R_TYPE (rel[-1].r_info) == R_PPC_TLSGD
2996 || ELF32_R_TYPE (rel[-1].r_info) == R_PPC_TLSLD))
2997 /* We have a new-style __tls_get_addr call with a marker
2998 reloc. */
2999 ;
3000 else
3001 /* Mark this section as having an old-style call. */
3002 sec->nomark_tls_get_addr = 1;
3003 }
3004
3005 switch (r_type)
3006 {
3007 case R_PPC_TLSGD:
3008 case R_PPC_TLSLD:
3009 /* These special tls relocs tie a call to __tls_get_addr with
3010 its parameter symbol. */
3011 if (h != NULL)
3012 ppc_elf_hash_entry (h)->tls_mask |= TLS_TLS | TLS_MARK;
3013 else
3014 if (!update_local_sym_info (abfd, symtab_hdr, r_symndx,
3015 NON_GOT | TLS_TLS | TLS_MARK))
3016 return FALSE;
3017 break;
3018
3019 case R_PPC_PLTSEQ:
3020 break;
3021
3022 case R_PPC_GOT_TLSLD16:
3023 case R_PPC_GOT_TLSLD16_LO:
3024 case R_PPC_GOT_TLSLD16_HI:
3025 case R_PPC_GOT_TLSLD16_HA:
3026 tls_type = TLS_TLS | TLS_LD;
3027 goto dogottls;
3028
3029 case R_PPC_GOT_TLSGD16:
3030 case R_PPC_GOT_TLSGD16_LO:
3031 case R_PPC_GOT_TLSGD16_HI:
3032 case R_PPC_GOT_TLSGD16_HA:
3033 tls_type = TLS_TLS | TLS_GD;
3034 goto dogottls;
3035
3036 case R_PPC_GOT_TPREL16:
3037 case R_PPC_GOT_TPREL16_LO:
3038 case R_PPC_GOT_TPREL16_HI:
3039 case R_PPC_GOT_TPREL16_HA:
3040 if (bfd_link_dll (info))
3041 info->flags |= DF_STATIC_TLS;
3042 tls_type = TLS_TLS | TLS_TPREL;
3043 goto dogottls;
3044
3045 case R_PPC_GOT_DTPREL16:
3046 case R_PPC_GOT_DTPREL16_LO:
3047 case R_PPC_GOT_DTPREL16_HI:
3048 case R_PPC_GOT_DTPREL16_HA:
3049 tls_type = TLS_TLS | TLS_DTPREL;
3050 dogottls:
3051 sec->has_tls_reloc = 1;
3052 /* Fall through. */
3053
3054 /* GOT16 relocations */
3055 case R_PPC_GOT16:
3056 case R_PPC_GOT16_LO:
3057 case R_PPC_GOT16_HI:
3058 case R_PPC_GOT16_HA:
3059 /* This symbol requires a global offset table entry. */
3060 if (htab->elf.sgot == NULL)
3061 {
3062 if (htab->elf.dynobj == NULL)
3063 htab->elf.dynobj = abfd;
3064 if (!ppc_elf_create_got (htab->elf.dynobj, info))
3065 return FALSE;
3066 }
3067 if (h != NULL)
3068 {
3069 h->got.refcount += 1;
3070 ppc_elf_hash_entry (h)->tls_mask |= tls_type;
3071 }
3072 else
3073 /* This is a global offset table entry for a local symbol. */
3074 if (!update_local_sym_info (abfd, symtab_hdr, r_symndx, tls_type))
3075 return FALSE;
3076
3077 /* We may also need a plt entry if the symbol turns out to be
3078 an ifunc. */
3079 if (h != NULL && !bfd_link_pic (info))
3080 {
3081 if (!update_plt_info (abfd, &h->plt.plist, NULL, 0))
3082 return FALSE;
3083 }
3084 break;
3085
3086 /* Indirect .sdata relocation. */
3087 case R_PPC_EMB_SDAI16:
3088 htab->sdata[0].sym->ref_regular = 1;
3089 if (!elf_allocate_pointer_linker_section (abfd, &htab->sdata[0],
3090 h, rel))
3091 return FALSE;
3092 if (h != NULL)
3093 {
3094 ppc_elf_hash_entry (h)->has_sda_refs = TRUE;
3095 h->non_got_ref = TRUE;
3096 }
3097 break;
3098
3099 /* Indirect .sdata2 relocation. */
3100 case R_PPC_EMB_SDA2I16:
3101 if (!bfd_link_executable (info))
3102 {
3103 bad_shared_reloc (abfd, r_type);
3104 return FALSE;
3105 }
3106 htab->sdata[1].sym->ref_regular = 1;
3107 if (!elf_allocate_pointer_linker_section (abfd, &htab->sdata[1],
3108 h, rel))
3109 return FALSE;
3110 if (h != NULL)
3111 {
3112 ppc_elf_hash_entry (h)->has_sda_refs = TRUE;
3113 h->non_got_ref = TRUE;
3114 }
3115 break;
3116
3117 case R_PPC_SDAREL16:
3118 htab->sdata[0].sym->ref_regular = 1;
3119 /* Fall through. */
3120
3121 case R_PPC_VLE_SDAREL_LO16A:
3122 case R_PPC_VLE_SDAREL_LO16D:
3123 case R_PPC_VLE_SDAREL_HI16A:
3124 case R_PPC_VLE_SDAREL_HI16D:
3125 case R_PPC_VLE_SDAREL_HA16A:
3126 case R_PPC_VLE_SDAREL_HA16D:
3127 if (h != NULL)
3128 {
3129 ppc_elf_hash_entry (h)->has_sda_refs = TRUE;
3130 h->non_got_ref = TRUE;
3131 }
3132 break;
3133
3134 case R_PPC_VLE_REL8:
3135 case R_PPC_VLE_REL15:
3136 case R_PPC_VLE_REL24:
3137 case R_PPC_VLE_LO16A:
3138 case R_PPC_VLE_LO16D:
3139 case R_PPC_VLE_HI16A:
3140 case R_PPC_VLE_HI16D:
3141 case R_PPC_VLE_HA16A:
3142 case R_PPC_VLE_HA16D:
3143 case R_PPC_VLE_ADDR20:
3144 break;
3145
3146 case R_PPC_EMB_SDA2REL:
3147 if (!bfd_link_executable (info))
3148 {
3149 bad_shared_reloc (abfd, r_type);
3150 return FALSE;
3151 }
3152 htab->sdata[1].sym->ref_regular = 1;
3153 if (h != NULL)
3154 {
3155 ppc_elf_hash_entry (h)->has_sda_refs = TRUE;
3156 h->non_got_ref = TRUE;
3157 }
3158 break;
3159
3160 case R_PPC_VLE_SDA21_LO:
3161 case R_PPC_VLE_SDA21:
3162 case R_PPC_EMB_SDA21:
3163 case R_PPC_EMB_RELSDA:
3164 if (h != NULL)
3165 {
3166 ppc_elf_hash_entry (h)->has_sda_refs = TRUE;
3167 h->non_got_ref = TRUE;
3168 }
3169 break;
3170
3171 case R_PPC_EMB_NADDR32:
3172 case R_PPC_EMB_NADDR16:
3173 case R_PPC_EMB_NADDR16_LO:
3174 case R_PPC_EMB_NADDR16_HI:
3175 case R_PPC_EMB_NADDR16_HA:
3176 if (h != NULL)
3177 h->non_got_ref = TRUE;
3178 break;
3179
3180 case R_PPC_PLTREL24:
3181 if (h == NULL)
3182 break;
3183 ppc_elf_tdata (abfd)->makes_plt_call = 1;
3184 goto pltentry;
3185
3186 case R_PPC_PLTCALL:
3187 sec->has_pltcall = 1;
3188 /* Fall through. */
3189
3190 case R_PPC_PLT32:
3191 case R_PPC_PLTREL32:
3192 case R_PPC_PLT16_LO:
3193 case R_PPC_PLT16_HI:
3194 case R_PPC_PLT16_HA:
3195 pltentry:
3196 #ifdef DEBUG
3197 fprintf (stderr, "Reloc requires a PLT entry\n");
3198 #endif
3199 /* This symbol requires a procedure linkage table entry. */
3200 if (h == NULL)
3201 {
3202 pltent = update_local_sym_info (abfd, symtab_hdr, r_symndx,
3203 NON_GOT | PLT_KEEP);
3204 if (pltent == NULL)
3205 return FALSE;
3206 }
3207 else
3208 {
3209 if (r_type != R_PPC_PLTREL24)
3210 ppc_elf_hash_entry (h)->tls_mask |= PLT_KEEP;
3211 h->needs_plt = 1;
3212 pltent = &h->plt.plist;
3213 }
3214 addend = 0;
3215 if (bfd_link_pic (info)
3216 && (r_type == R_PPC_PLTREL24
3217 || r_type == R_PPC_PLT16_LO
3218 || r_type == R_PPC_PLT16_HI
3219 || r_type == R_PPC_PLT16_HA))
3220 addend = rel->r_addend;
3221 if (!update_plt_info (abfd, pltent, got2, addend))
3222 return FALSE;
3223 break;
3224
3225 /* The following relocations don't need to propagate the
3226 relocation if linking a shared object since they are
3227 section relative. */
3228 case R_PPC_SECTOFF:
3229 case R_PPC_SECTOFF_LO:
3230 case R_PPC_SECTOFF_HI:
3231 case R_PPC_SECTOFF_HA:
3232 case R_PPC_DTPREL16:
3233 case R_PPC_DTPREL16_LO:
3234 case R_PPC_DTPREL16_HI:
3235 case R_PPC_DTPREL16_HA:
3236 case R_PPC_TOC16:
3237 break;
3238
3239 case R_PPC_REL16:
3240 case R_PPC_REL16_LO:
3241 case R_PPC_REL16_HI:
3242 case R_PPC_REL16_HA:
3243 case R_PPC_REL16DX_HA:
3244 ppc_elf_tdata (abfd)->has_rel16 = 1;
3245 break;
3246
3247 /* These are just markers. */
3248 case R_PPC_TLS:
3249 case R_PPC_EMB_MRKREF:
3250 case R_PPC_NONE:
3251 case R_PPC_max:
3252 case R_PPC_RELAX:
3253 case R_PPC_RELAX_PLT:
3254 case R_PPC_RELAX_PLTREL24:
3255 case R_PPC_16DX_HA:
3256 break;
3257
3258 /* These should only appear in dynamic objects. */
3259 case R_PPC_COPY:
3260 case R_PPC_GLOB_DAT:
3261 case R_PPC_JMP_SLOT:
3262 case R_PPC_RELATIVE:
3263 case R_PPC_IRELATIVE:
3264 break;
3265
3266 /* These aren't handled yet. We'll report an error later. */
3267 case R_PPC_ADDR30:
3268 case R_PPC_EMB_RELSEC16:
3269 case R_PPC_EMB_RELST_LO:
3270 case R_PPC_EMB_RELST_HI:
3271 case R_PPC_EMB_RELST_HA:
3272 case R_PPC_EMB_BIT_FLD:
3273 break;
3274
3275 /* This refers only to functions defined in the shared library. */
3276 case R_PPC_LOCAL24PC:
3277 if (h != NULL && h == htab->elf.hgot && htab->plt_type == PLT_UNSET)
3278 {
3279 htab->plt_type = PLT_OLD;
3280 htab->old_bfd = abfd;
3281 }
3282 if (h != NULL && h->type == STT_GNU_IFUNC)
3283 {
3284 h->needs_plt = 1;
3285 if (!update_plt_info (abfd, &h->plt.plist, NULL, 0))
3286 return FALSE;
3287 }
3288 break;
3289
3290 /* This relocation describes the C++ object vtable hierarchy.
3291 Reconstruct it for later use during GC. */
3292 case R_PPC_GNU_VTINHERIT:
3293 if (!bfd_elf_gc_record_vtinherit (abfd, sec, h, rel->r_offset))
3294 return FALSE;
3295 break;
3296
3297 /* This relocation describes which C++ vtable entries are actually
3298 used. Record for later use during GC. */
3299 case R_PPC_GNU_VTENTRY:
3300 if (!bfd_elf_gc_record_vtentry (abfd, sec, h, rel->r_addend))
3301 return FALSE;
3302 break;
3303
3304 case R_PPC_TPREL16_HI:
3305 case R_PPC_TPREL16_HA:
3306 sec->has_tls_reloc = 1;
3307 /* Fall through. */
3308 /* We shouldn't really be seeing TPREL32. */
3309 case R_PPC_TPREL32:
3310 case R_PPC_TPREL16:
3311 case R_PPC_TPREL16_LO:
3312 if (bfd_link_dll (info))
3313 info->flags |= DF_STATIC_TLS;
3314 goto dodyn;
3315
3316 /* Nor these. */
3317 case R_PPC_DTPMOD32:
3318 case R_PPC_DTPREL32:
3319 goto dodyn;
3320
3321 case R_PPC_REL32:
3322 if (h == NULL
3323 && got2 != NULL
3324 && (sec->flags & SEC_CODE) != 0
3325 && bfd_link_pic (info)
3326 && htab->plt_type == PLT_UNSET)
3327 {
3328 /* Old -fPIC gcc code has .long LCTOC1-LCFx just before
3329 the start of a function, which assembles to a REL32
3330 reference to .got2. If we detect one of these, then
3331 force the old PLT layout because the linker cannot
3332 reliably deduce the GOT pointer value needed for
3333 PLT call stubs. */
3334 asection *s;
3335 Elf_Internal_Sym *isym;
3336
3337 isym = bfd_sym_from_r_symndx (&htab->elf.sym_cache,
3338 abfd, r_symndx);
3339 if (isym == NULL)
3340 return FALSE;
3341
3342 s = bfd_section_from_elf_index (abfd, isym->st_shndx);
3343 if (s == got2)
3344 {
3345 htab->plt_type = PLT_OLD;
3346 htab->old_bfd = abfd;
3347 }
3348 }
3349 if (h == NULL || h == htab->elf.hgot)
3350 break;
3351 /* fall through */
3352
3353 case R_PPC_ADDR32:
3354 case R_PPC_ADDR16:
3355 case R_PPC_ADDR16_LO:
3356 case R_PPC_ADDR16_HI:
3357 case R_PPC_ADDR16_HA:
3358 case R_PPC_UADDR32:
3359 case R_PPC_UADDR16:
3360 if (h != NULL && !bfd_link_pic (info))
3361 {
3362 /* We may need a plt entry if the symbol turns out to be
3363 a function defined in a dynamic object. */
3364 if (!update_plt_info (abfd, &h->plt.plist, NULL, 0))
3365 return FALSE;
3366
3367 /* We may need a copy reloc too. */
3368 h->non_got_ref = 1;
3369 h->pointer_equality_needed = 1;
3370 if (r_type == R_PPC_ADDR16_HA)
3371 ppc_elf_hash_entry (h)->has_addr16_ha = 1;
3372 if (r_type == R_PPC_ADDR16_LO)
3373 ppc_elf_hash_entry (h)->has_addr16_lo = 1;
3374 }
3375 goto dodyn;
3376
3377 case R_PPC_REL24:
3378 case R_PPC_REL14:
3379 case R_PPC_REL14_BRTAKEN:
3380 case R_PPC_REL14_BRNTAKEN:
3381 if (h == NULL)
3382 break;
3383 if (h == htab->elf.hgot)
3384 {
3385 if (htab->plt_type == PLT_UNSET)
3386 {
3387 htab->plt_type = PLT_OLD;
3388 htab->old_bfd = abfd;
3389 }
3390 break;
3391 }
3392 /* fall through */
3393
3394 case R_PPC_ADDR24:
3395 case R_PPC_ADDR14:
3396 case R_PPC_ADDR14_BRTAKEN:
3397 case R_PPC_ADDR14_BRNTAKEN:
3398 if (h != NULL && !bfd_link_pic (info))
3399 {
3400 /* We may need a plt entry if the symbol turns out to be
3401 a function defined in a dynamic object. */
3402 h->needs_plt = 1;
3403 if (!update_plt_info (abfd, &h->plt.plist, NULL, 0))
3404 return FALSE;
3405 break;
3406 }
3407
3408 dodyn:
3409 /* If we are creating a shared library, and this is a reloc
3410 against a global symbol, or a non PC relative reloc
3411 against a local symbol, then we need to copy the reloc
3412 into the shared library. However, if we are linking with
3413 -Bsymbolic, we do not need to copy a reloc against a
3414 global symbol which is defined in an object we are
3415 including in the link (i.e., DEF_REGULAR is set). At
3416 this point we have not seen all the input files, so it is
3417 possible that DEF_REGULAR is not set now but will be set
3418 later (it is never cleared). In case of a weak definition,
3419 DEF_REGULAR may be cleared later by a strong definition in
3420 a shared library. We account for that possibility below by
3421 storing information in the dyn_relocs field of the hash
3422 table entry. A similar situation occurs when creating
3423 shared libraries and symbol visibility changes render the
3424 symbol local.
3425
3426 If on the other hand, we are creating an executable, we
3427 may need to keep relocations for symbols satisfied by a
3428 dynamic library if we manage to avoid copy relocs for the
3429 symbol. */
3430 if ((bfd_link_pic (info)
3431 && (must_be_dyn_reloc (info, r_type)
3432 || (h != NULL
3433 && (!SYMBOLIC_BIND (info, h)
3434 || h->root.type == bfd_link_hash_defweak
3435 || !h->def_regular))))
3436 || (ELIMINATE_COPY_RELOCS
3437 && !bfd_link_pic (info)
3438 && h != NULL
3439 && (h->root.type == bfd_link_hash_defweak
3440 || !h->def_regular)))
3441 {
3442 #ifdef DEBUG
3443 fprintf (stderr,
3444 "ppc_elf_check_relocs needs to "
3445 "create relocation for %s\n",
3446 (h && h->root.root.string
3447 ? h->root.root.string : "<unknown>"));
3448 #endif
3449 if (sreloc == NULL)
3450 {
3451 if (htab->elf.dynobj == NULL)
3452 htab->elf.dynobj = abfd;
3453
3454 sreloc = _bfd_elf_make_dynamic_reloc_section
3455 (sec, htab->elf.dynobj, 2, abfd, /*rela?*/ TRUE);
3456
3457 if (sreloc == NULL)
3458 return FALSE;
3459 }
3460
3461 /* If this is a global symbol, we count the number of
3462 relocations we need for this symbol. */
3463 if (h != NULL)
3464 {
3465 struct elf_dyn_relocs *p;
3466 struct elf_dyn_relocs **rel_head;
3467
3468 rel_head = &h->dyn_relocs;
3469 p = *rel_head;
3470 if (p == NULL || p->sec != sec)
3471 {
3472 p = bfd_alloc (htab->elf.dynobj, sizeof *p);
3473 if (p == NULL)
3474 return FALSE;
3475 p->next = *rel_head;
3476 *rel_head = p;
3477 p->sec = sec;
3478 p->count = 0;
3479 p->pc_count = 0;
3480 }
3481 p->count += 1;
3482 if (!must_be_dyn_reloc (info, r_type))
3483 p->pc_count += 1;
3484 }
3485 else
3486 {
3487 /* Track dynamic relocs needed for local syms too.
3488 We really need local syms available to do this
3489 easily. Oh well. */
3490 struct ppc_dyn_relocs *p;
3491 struct ppc_dyn_relocs **rel_head;
3492 bfd_boolean is_ifunc;
3493 asection *s;
3494 void *vpp;
3495 Elf_Internal_Sym *isym;
3496
3497 isym = bfd_sym_from_r_symndx (&htab->elf.sym_cache,
3498 abfd, r_symndx);
3499 if (isym == NULL)
3500 return FALSE;
3501
3502 s = bfd_section_from_elf_index (abfd, isym->st_shndx);
3503 if (s == NULL)
3504 s = sec;
3505
3506 vpp = &elf_section_data (s)->local_dynrel;
3507 rel_head = (struct ppc_dyn_relocs **) vpp;
3508 is_ifunc = ELF_ST_TYPE (isym->st_info) == STT_GNU_IFUNC;
3509 p = *rel_head;
3510 if (p != NULL && p->sec == sec && p->ifunc != is_ifunc)
3511 p = p->next;
3512 if (p == NULL || p->sec != sec || p->ifunc != is_ifunc)
3513 {
3514 p = bfd_alloc (htab->elf.dynobj, sizeof *p);
3515 if (p == NULL)
3516 return FALSE;
3517 p->next = *rel_head;
3518 *rel_head = p;
3519 p->sec = sec;
3520 p->ifunc = is_ifunc;
3521 p->count = 0;
3522 }
3523 p->count += 1;
3524 }
3525 }
3526
3527 break;
3528 }
3529 }
3530
3531 return TRUE;
3532 }
3533 \f
3534 /* Warn for conflicting Tag_GNU_Power_ABI_FP attributes between IBFD
3535 and OBFD, and merge non-conflicting ones. */
3536 bfd_boolean
3537 _bfd_elf_ppc_merge_fp_attributes (bfd *ibfd, struct bfd_link_info *info)
3538 {
3539 bfd *obfd = info->output_bfd;
3540 obj_attribute *in_attr, *in_attrs;
3541 obj_attribute *out_attr, *out_attrs;
3542 bfd_boolean ret = TRUE;
3543 bfd_boolean warn_only;
3544
3545 /* We only warn about shared library mismatches, because common
3546 libraries advertise support for a particular long double variant
3547 but actually support more than one variant. For example, glibc
3548 typically supports 128-bit IBM long double in the shared library
3549 but has a compatibility static archive for 64-bit long double.
3550 The linker doesn't have the smarts to see that an app using
3551 object files marked as 64-bit long double call the compatibility
3552 layer objects and only from there call into the shared library. */
3553 warn_only = (ibfd->flags & DYNAMIC) != 0;
3554
3555 in_attrs = elf_known_obj_attributes (ibfd)[OBJ_ATTR_GNU];
3556 out_attrs = elf_known_obj_attributes (obfd)[OBJ_ATTR_GNU];
3557
3558 in_attr = &in_attrs[Tag_GNU_Power_ABI_FP];
3559 out_attr = &out_attrs[Tag_GNU_Power_ABI_FP];
3560
3561 if (in_attr->i != out_attr->i)
3562 {
3563 int in_fp = in_attr->i & 3;
3564 int out_fp = out_attr->i & 3;
3565 static bfd *last_fp, *last_ld;
3566
3567 if (in_fp == 0)
3568 ;
3569 else if (out_fp == 0)
3570 {
3571 if (!warn_only)
3572 {
3573 out_attr->type = ATTR_TYPE_FLAG_INT_VAL;
3574 out_attr->i ^= in_fp;
3575 last_fp = ibfd;
3576 }
3577 }
3578 else if (out_fp != 2 && in_fp == 2)
3579 {
3580 _bfd_error_handler
3581 /* xgettext:c-format */
3582 (_("%pB uses hard float, %pB uses soft float"),
3583 last_fp, ibfd);
3584 ret = warn_only;
3585 }
3586 else if (out_fp == 2 && in_fp != 2)
3587 {
3588 _bfd_error_handler
3589 /* xgettext:c-format */
3590 (_("%pB uses hard float, %pB uses soft float"),
3591 ibfd, last_fp);
3592 ret = warn_only;
3593 }
3594 else if (out_fp == 1 && in_fp == 3)
3595 {
3596 _bfd_error_handler
3597 /* xgettext:c-format */
3598 (_("%pB uses double-precision hard float, "
3599 "%pB uses single-precision hard float"), last_fp, ibfd);
3600 ret = warn_only;
3601 }
3602 else if (out_fp == 3 && in_fp == 1)
3603 {
3604 _bfd_error_handler
3605 /* xgettext:c-format */
3606 (_("%pB uses double-precision hard float, "
3607 "%pB uses single-precision hard float"), ibfd, last_fp);
3608 ret = warn_only;
3609 }
3610
3611 in_fp = in_attr->i & 0xc;
3612 out_fp = out_attr->i & 0xc;
3613 if (in_fp == 0)
3614 ;
3615 else if (out_fp == 0)
3616 {
3617 if (!warn_only)
3618 {
3619 out_attr->type = ATTR_TYPE_FLAG_INT_VAL;
3620 out_attr->i ^= in_fp;
3621 last_ld = ibfd;
3622 }
3623 }
3624 else if (out_fp != 2 * 4 && in_fp == 2 * 4)
3625 {
3626 _bfd_error_handler
3627 /* xgettext:c-format */
3628 (_("%pB uses 64-bit long double, "
3629 "%pB uses 128-bit long double"), ibfd, last_ld);
3630 ret = warn_only;
3631 }
3632 else if (in_fp != 2 * 4 && out_fp == 2 * 4)
3633 {
3634 _bfd_error_handler
3635 /* xgettext:c-format */
3636 (_("%pB uses 64-bit long double, "
3637 "%pB uses 128-bit long double"), last_ld, ibfd);
3638 ret = warn_only;
3639 }
3640 else if (out_fp == 1 * 4 && in_fp == 3 * 4)
3641 {
3642 _bfd_error_handler
3643 /* xgettext:c-format */
3644 (_("%pB uses IBM long double, "
3645 "%pB uses IEEE long double"), last_ld, ibfd);
3646 ret = warn_only;
3647 }
3648 else if (out_fp == 3 * 4 && in_fp == 1 * 4)
3649 {
3650 _bfd_error_handler
3651 /* xgettext:c-format */
3652 (_("%pB uses IBM long double, "
3653 "%pB uses IEEE long double"), ibfd, last_ld);
3654 ret = warn_only;
3655 }
3656 }
3657
3658 if (!ret)
3659 {
3660 out_attr->type = ATTR_TYPE_FLAG_INT_VAL | ATTR_TYPE_FLAG_ERROR;
3661 bfd_set_error (bfd_error_bad_value);
3662 }
3663 return ret;
3664 }
3665
3666 /* Merge object attributes from IBFD into OBFD. Warn if
3667 there are conflicting attributes. */
3668 static bfd_boolean
3669 ppc_elf_merge_obj_attributes (bfd *ibfd, struct bfd_link_info *info)
3670 {
3671 bfd *obfd;
3672 obj_attribute *in_attr, *in_attrs;
3673 obj_attribute *out_attr, *out_attrs;
3674 bfd_boolean ret;
3675
3676 if (!_bfd_elf_ppc_merge_fp_attributes (ibfd, info))
3677 return FALSE;
3678
3679 obfd = info->output_bfd;
3680 in_attrs = elf_known_obj_attributes (ibfd)[OBJ_ATTR_GNU];
3681 out_attrs = elf_known_obj_attributes (obfd)[OBJ_ATTR_GNU];
3682
3683 /* Check for conflicting Tag_GNU_Power_ABI_Vector attributes and
3684 merge non-conflicting ones. */
3685 in_attr = &in_attrs[Tag_GNU_Power_ABI_Vector];
3686 out_attr = &out_attrs[Tag_GNU_Power_ABI_Vector];
3687 ret = TRUE;
3688 if (in_attr->i != out_attr->i)
3689 {
3690 int in_vec = in_attr->i & 3;
3691 int out_vec = out_attr->i & 3;
3692 static bfd *last_vec;
3693
3694 if (in_vec == 0)
3695 ;
3696 else if (out_vec == 0)
3697 {
3698 out_attr->type = ATTR_TYPE_FLAG_INT_VAL;
3699 out_attr->i = in_vec;
3700 last_vec = ibfd;
3701 }
3702 /* For now, allow generic to transition to AltiVec or SPE
3703 without a warning. If GCC marked files with their stack
3704 alignment and used don't-care markings for files which are
3705 not affected by the vector ABI, we could warn about this
3706 case too. */
3707 else if (in_vec == 1)
3708 ;
3709 else if (out_vec == 1)
3710 {
3711 out_attr->type = ATTR_TYPE_FLAG_INT_VAL;
3712 out_attr->i = in_vec;
3713 last_vec = ibfd;
3714 }
3715 else if (out_vec < in_vec)
3716 {
3717 _bfd_error_handler
3718 /* xgettext:c-format */
3719 (_("%pB uses AltiVec vector ABI, %pB uses SPE vector ABI"),
3720 last_vec, ibfd);
3721 out_attr->type = ATTR_TYPE_FLAG_INT_VAL | ATTR_TYPE_FLAG_ERROR;
3722 ret = FALSE;
3723 }
3724 else if (out_vec > in_vec)
3725 {
3726 _bfd_error_handler
3727 /* xgettext:c-format */
3728 (_("%pB uses AltiVec vector ABI, %pB uses SPE vector ABI"),
3729 ibfd, last_vec);
3730 out_attr->type = ATTR_TYPE_FLAG_INT_VAL | ATTR_TYPE_FLAG_ERROR;
3731 ret = FALSE;
3732 }
3733 }
3734
3735 /* Check for conflicting Tag_GNU_Power_ABI_Struct_Return attributes
3736 and merge non-conflicting ones. */
3737 in_attr = &in_attrs[Tag_GNU_Power_ABI_Struct_Return];
3738 out_attr = &out_attrs[Tag_GNU_Power_ABI_Struct_Return];
3739 if (in_attr->i != out_attr->i)
3740 {
3741 int in_struct = in_attr->i & 3;
3742 int out_struct = out_attr->i & 3;
3743 static bfd *last_struct;
3744
3745 if (in_struct == 0 || in_struct == 3)
3746 ;
3747 else if (out_struct == 0)
3748 {
3749 out_attr->type = ATTR_TYPE_FLAG_INT_VAL;
3750 out_attr->i = in_struct;
3751 last_struct = ibfd;
3752 }
3753 else if (out_struct < in_struct)
3754 {
3755 _bfd_error_handler
3756 /* xgettext:c-format */
3757 (_("%pB uses r3/r4 for small structure returns, "
3758 "%pB uses memory"), last_struct, ibfd);
3759 out_attr->type = ATTR_TYPE_FLAG_INT_VAL | ATTR_TYPE_FLAG_ERROR;
3760 ret = FALSE;
3761 }
3762 else if (out_struct > in_struct)
3763 {
3764 _bfd_error_handler
3765 /* xgettext:c-format */
3766 (_("%pB uses r3/r4 for small structure returns, "
3767 "%pB uses memory"), ibfd, last_struct);
3768 out_attr->type = ATTR_TYPE_FLAG_INT_VAL | ATTR_TYPE_FLAG_ERROR;
3769 ret = FALSE;
3770 }
3771 }
3772 if (!ret)
3773 {
3774 bfd_set_error (bfd_error_bad_value);
3775 return FALSE;
3776 }
3777
3778 /* Merge Tag_compatibility attributes and any common GNU ones. */
3779 return _bfd_elf_merge_object_attributes (ibfd, info);
3780 }
3781
3782 /* Merge backend specific data from an object file to the output
3783 object file when linking. */
3784
3785 static bfd_boolean
3786 ppc_elf_merge_private_bfd_data (bfd *ibfd, struct bfd_link_info *info)
3787 {
3788 bfd *obfd = info->output_bfd;
3789 flagword old_flags;
3790 flagword new_flags;
3791 bfd_boolean error;
3792
3793 if (!is_ppc_elf (ibfd) || !is_ppc_elf (obfd))
3794 return TRUE;
3795
3796 /* Check if we have the same endianness. */
3797 if (! _bfd_generic_verify_endian_match (ibfd, info))
3798 return FALSE;
3799
3800 if (!ppc_elf_merge_obj_attributes (ibfd, info))
3801 return FALSE;
3802
3803 if ((ibfd->flags & DYNAMIC) != 0)
3804 return TRUE;
3805
3806 new_flags = elf_elfheader (ibfd)->e_flags;
3807 old_flags = elf_elfheader (obfd)->e_flags;
3808 if (!elf_flags_init (obfd))
3809 {
3810 /* First call, no flags set. */
3811 elf_flags_init (obfd) = TRUE;
3812 elf_elfheader (obfd)->e_flags = new_flags;
3813 }
3814
3815 /* Compatible flags are ok. */
3816 else if (new_flags == old_flags)
3817 ;
3818
3819 /* Incompatible flags. */
3820 else
3821 {
3822 /* Warn about -mrelocatable mismatch. Allow -mrelocatable-lib
3823 to be linked with either. */
3824 error = FALSE;
3825 if ((new_flags & EF_PPC_RELOCATABLE) != 0
3826 && (old_flags & (EF_PPC_RELOCATABLE | EF_PPC_RELOCATABLE_LIB)) == 0)
3827 {
3828 error = TRUE;
3829 _bfd_error_handler
3830 (_("%pB: compiled with -mrelocatable and linked with "
3831 "modules compiled normally"), ibfd);
3832 }
3833 else if ((new_flags & (EF_PPC_RELOCATABLE | EF_PPC_RELOCATABLE_LIB)) == 0
3834 && (old_flags & EF_PPC_RELOCATABLE) != 0)
3835 {
3836 error = TRUE;
3837 _bfd_error_handler
3838 (_("%pB: compiled normally and linked with "
3839 "modules compiled with -mrelocatable"), ibfd);
3840 }
3841
3842 /* The output is -mrelocatable-lib iff both the input files are. */
3843 if (! (new_flags & EF_PPC_RELOCATABLE_LIB))
3844 elf_elfheader (obfd)->e_flags &= ~EF_PPC_RELOCATABLE_LIB;
3845
3846 /* The output is -mrelocatable iff it can't be -mrelocatable-lib,
3847 but each input file is either -mrelocatable or -mrelocatable-lib. */
3848 if (! (elf_elfheader (obfd)->e_flags & EF_PPC_RELOCATABLE_LIB)
3849 && (new_flags & (EF_PPC_RELOCATABLE_LIB | EF_PPC_RELOCATABLE))
3850 && (old_flags & (EF_PPC_RELOCATABLE_LIB | EF_PPC_RELOCATABLE)))
3851 elf_elfheader (obfd)->e_flags |= EF_PPC_RELOCATABLE;
3852
3853 /* Do not warn about eabi vs. V.4 mismatch, just or in the bit if
3854 any module uses it. */
3855 elf_elfheader (obfd)->e_flags |= (new_flags & EF_PPC_EMB);
3856
3857 new_flags &= ~(EF_PPC_RELOCATABLE | EF_PPC_RELOCATABLE_LIB | EF_PPC_EMB);
3858 old_flags &= ~(EF_PPC_RELOCATABLE | EF_PPC_RELOCATABLE_LIB | EF_PPC_EMB);
3859
3860 /* Warn about any other mismatches. */
3861 if (new_flags != old_flags)
3862 {
3863 error = TRUE;
3864 _bfd_error_handler
3865 /* xgettext:c-format */
3866 (_("%pB: uses different e_flags (%#x) fields "
3867 "than previous modules (%#x)"),
3868 ibfd, new_flags, old_flags);
3869 }
3870
3871 if (error)
3872 {
3873 bfd_set_error (bfd_error_bad_value);
3874 return FALSE;
3875 }
3876 }
3877
3878 return TRUE;
3879 }
3880
3881 static void
3882 ppc_elf_vle_split16 (bfd *input_bfd,
3883 asection *input_section,
3884 unsigned long offset,
3885 bfd_byte *loc,
3886 bfd_vma value,
3887 split16_format_type split16_format,
3888 bfd_boolean fixup)
3889 {
3890 unsigned int insn, opcode;
3891
3892 insn = bfd_get_32 (input_bfd, loc);
3893 opcode = insn & E_OPCODE_MASK;
3894 if (opcode == E_OR2I_INSN
3895 || opcode == E_AND2I_DOT_INSN
3896 || opcode == E_OR2IS_INSN
3897 || opcode == E_LIS_INSN
3898 || opcode == E_AND2IS_DOT_INSN)
3899 {
3900 if (split16_format != split16a_type)
3901 {
3902 if (fixup)
3903 split16_format = split16a_type;
3904 else
3905 _bfd_error_handler
3906 /* xgettext:c-format */
3907 (_("%pB(%pA+0x%lx): expected 16A style relocation on 0x%08x insn"),
3908 input_bfd, input_section, offset, opcode);
3909 }
3910 }
3911 else if (opcode == E_ADD2I_DOT_INSN
3912 || opcode == E_ADD2IS_INSN
3913 || opcode == E_CMP16I_INSN
3914 || opcode == E_MULL2I_INSN
3915 || opcode == E_CMPL16I_INSN
3916 || opcode == E_CMPH16I_INSN
3917 || opcode == E_CMPHL16I_INSN)
3918 {
3919 if (split16_format != split16d_type)
3920 {
3921 if (fixup)
3922 split16_format = split16d_type;
3923 else
3924 _bfd_error_handler
3925 /* xgettext:c-format */
3926 (_("%pB(%pA+0x%lx): expected 16D style relocation on 0x%08x insn"),
3927 input_bfd, input_section, offset, opcode);
3928 }
3929 }
3930 if (split16_format == split16a_type)
3931 {
3932 insn &= ~((0xf800 << 5) | 0x7ff);
3933 insn |= (value & 0xf800) << 5;
3934 if ((insn & E_LI_MASK) == E_LI_INSN)
3935 {
3936 /* Hack for e_li. Extend sign. */
3937 insn &= ~(0xf0000 >> 5);
3938 insn |= (-(value & 0x8000) & 0xf0000) >> 5;
3939 }
3940 }
3941 else
3942 {
3943 insn &= ~((0xf800 << 10) | 0x7ff);
3944 insn |= (value & 0xf800) << 10;
3945 }
3946 insn |= value & 0x7ff;
3947 bfd_put_32 (input_bfd, insn, loc);
3948 }
3949
3950 static void
3951 ppc_elf_vle_split20 (bfd *output_bfd, bfd_byte *loc, bfd_vma value)
3952 {
3953 unsigned int insn;
3954
3955 insn = bfd_get_32 (output_bfd, loc);
3956 /* We have an li20 field, bits 17..20, 11..15, 21..31. */
3957 /* Top 4 bits of value to 17..20. */
3958 insn |= (value & 0xf0000) >> 5;
3959 /* Next 5 bits of the value to 11..15. */
3960 insn |= (value & 0xf800) << 5;
3961 /* And the final 11 bits of the value to bits 21 to 31. */
3962 insn |= value & 0x7ff;
3963 bfd_put_32 (output_bfd, insn, loc);
3964 }
3965
3966 \f
3967 /* Choose which PLT scheme to use, and set .plt flags appropriately.
3968 Returns -1 on error, 0 for old PLT, 1 for new PLT. */
3969 int
3970 ppc_elf_select_plt_layout (bfd *output_bfd ATTRIBUTE_UNUSED,
3971 struct bfd_link_info *info)
3972 {
3973 struct ppc_elf_link_hash_table *htab;
3974 flagword flags;
3975
3976 htab = ppc_elf_hash_table (info);
3977
3978 if (htab->plt_type == PLT_UNSET)
3979 {
3980 struct elf_link_hash_entry *h;
3981
3982 if (htab->params->plt_style == PLT_OLD)
3983 htab->plt_type = PLT_OLD;
3984 else if (bfd_link_pic (info)
3985 && htab->elf.dynamic_sections_created
3986 && (h = elf_link_hash_lookup (&htab->elf, "_mcount",
3987 FALSE, FALSE, TRUE)) != NULL
3988 && (h->type == STT_FUNC
3989 || h->needs_plt)
3990 && h->ref_regular
3991 && !(SYMBOL_CALLS_LOCAL (info, h)
3992 || UNDEFWEAK_NO_DYNAMIC_RELOC (info, h)))
3993 {
3994 /* Profiling of shared libs (and pies) is not supported with
3995 secure plt, because ppc32 does profiling before a
3996 function prologue and a secure plt pic call stubs needs
3997 r30 to be set up. */
3998 htab->plt_type = PLT_OLD;
3999 }
4000 else
4001 {
4002 bfd *ibfd;
4003 enum ppc_elf_plt_type plt_type = htab->params->plt_style;
4004
4005 /* Look through the reloc flags left by ppc_elf_check_relocs.
4006 Use the old style bss plt if a file makes plt calls
4007 without using the new relocs, and if ld isn't given
4008 --secure-plt and we never see REL16 relocs. */
4009 if (plt_type == PLT_UNSET)
4010 plt_type = PLT_OLD;
4011 for (ibfd = info->input_bfds; ibfd; ibfd = ibfd->link.next)
4012 if (is_ppc_elf (ibfd))
4013 {
4014 if (ppc_elf_tdata (ibfd)->has_rel16)
4015 plt_type = PLT_NEW;
4016 else if (ppc_elf_tdata (ibfd)->makes_plt_call)
4017 {
4018 plt_type = PLT_OLD;
4019 htab->old_bfd = ibfd;
4020 break;
4021 }
4022 }
4023 htab->plt_type = plt_type;
4024 }
4025 }
4026 if (htab->plt_type == PLT_OLD && htab->params->plt_style == PLT_NEW)
4027 {
4028 if (htab->old_bfd != NULL)
4029 _bfd_error_handler (_("bss-plt forced due to %pB"), htab->old_bfd);
4030 else
4031 _bfd_error_handler (_("bss-plt forced by profiling"));
4032 }
4033
4034 BFD_ASSERT (htab->plt_type != PLT_VXWORKS);
4035
4036 if (htab->plt_type == PLT_NEW)
4037 {
4038 flags = (SEC_ALLOC | SEC_LOAD | SEC_HAS_CONTENTS
4039 | SEC_IN_MEMORY | SEC_LINKER_CREATED);
4040
4041 /* The new PLT is a loaded section. */
4042 if (htab->elf.splt != NULL
4043 && !bfd_set_section_flags (htab->elf.splt, flags))
4044 return -1;
4045
4046 /* The new GOT is not executable. */
4047 if (htab->elf.sgot != NULL
4048 && !bfd_set_section_flags (htab->elf.sgot, flags))
4049 return -1;
4050 }
4051 else
4052 {
4053 /* Stop an unused .glink section from affecting .text alignment. */
4054 if (htab->glink != NULL
4055 && !bfd_set_section_alignment (htab->glink, 0))
4056 return -1;
4057 }
4058 return htab->plt_type == PLT_NEW;
4059 }
4060 \f
4061 /* Return the section that should be marked against GC for a given
4062 relocation. */
4063
4064 static asection *
4065 ppc_elf_gc_mark_hook (asection *sec,
4066 struct bfd_link_info *info,
4067 Elf_Internal_Rela *rel,
4068 struct elf_link_hash_entry *h,
4069 Elf_Internal_Sym *sym)
4070 {
4071 if (h != NULL)
4072 switch (ELF32_R_TYPE (rel->r_info))
4073 {
4074 case R_PPC_GNU_VTINHERIT:
4075 case R_PPC_GNU_VTENTRY:
4076 return NULL;
4077 }
4078
4079 return _bfd_elf_gc_mark_hook (sec, info, rel, h, sym);
4080 }
4081
4082 static bfd_boolean
4083 get_sym_h (struct elf_link_hash_entry **hp,
4084 Elf_Internal_Sym **symp,
4085 asection **symsecp,
4086 unsigned char **tls_maskp,
4087 Elf_Internal_Sym **locsymsp,
4088 unsigned long r_symndx,
4089 bfd *ibfd)
4090 {
4091 Elf_Internal_Shdr *symtab_hdr = &elf_symtab_hdr (ibfd);
4092
4093 if (r_symndx >= symtab_hdr->sh_info)
4094 {
4095 struct elf_link_hash_entry **sym_hashes = elf_sym_hashes (ibfd);
4096 struct elf_link_hash_entry *h;
4097
4098 h = sym_hashes[r_symndx - symtab_hdr->sh_info];
4099 while (h->root.type == bfd_link_hash_indirect
4100 || h->root.type == bfd_link_hash_warning)
4101 h = (struct elf_link_hash_entry *) h->root.u.i.link;
4102
4103 if (hp != NULL)
4104 *hp = h;
4105
4106 if (symp != NULL)
4107 *symp = NULL;
4108
4109 if (symsecp != NULL)
4110 {
4111 asection *symsec = NULL;
4112 if (h->root.type == bfd_link_hash_defined
4113 || h->root.type == bfd_link_hash_defweak)
4114 symsec = h->root.u.def.section;
4115 *symsecp = symsec;
4116 }
4117
4118 if (tls_maskp != NULL)
4119 *tls_maskp = &ppc_elf_hash_entry (h)->tls_mask;
4120 }
4121 else
4122 {
4123 Elf_Internal_Sym *sym;
4124 Elf_Internal_Sym *locsyms = *locsymsp;
4125
4126 if (locsyms == NULL)
4127 {
4128 locsyms = (Elf_Internal_Sym *) symtab_hdr->contents;
4129 if (locsyms == NULL)
4130 locsyms = bfd_elf_get_elf_syms (ibfd, symtab_hdr,
4131 symtab_hdr->sh_info,
4132 0, NULL, NULL, NULL);
4133 if (locsyms == NULL)
4134 return FALSE;
4135 *locsymsp = locsyms;
4136 }
4137 sym = locsyms + r_symndx;
4138
4139 if (hp != NULL)
4140 *hp = NULL;
4141
4142 if (symp != NULL)
4143 *symp = sym;
4144
4145 if (symsecp != NULL)
4146 *symsecp = bfd_section_from_elf_index (ibfd, sym->st_shndx);
4147
4148 if (tls_maskp != NULL)
4149 {
4150 bfd_signed_vma *local_got;
4151 unsigned char *tls_mask;
4152
4153 tls_mask = NULL;
4154 local_got = elf_local_got_refcounts (ibfd);
4155 if (local_got != NULL)
4156 {
4157 struct plt_entry **local_plt = (struct plt_entry **)
4158 (local_got + symtab_hdr->sh_info);
4159 unsigned char *lgot_masks = (unsigned char *)
4160 (local_plt + symtab_hdr->sh_info);
4161 tls_mask = &lgot_masks[r_symndx];
4162 }
4163 *tls_maskp = tls_mask;
4164 }
4165 }
4166 return TRUE;
4167 }
4168 \f
4169 /* Analyze inline PLT call relocations to see whether calls to locally
4170 defined functions can be converted to direct calls. */
4171
4172 bfd_boolean
4173 ppc_elf_inline_plt (struct bfd_link_info *info)
4174 {
4175 struct ppc_elf_link_hash_table *htab;
4176 bfd *ibfd;
4177 asection *sec;
4178 bfd_vma low_vma, high_vma, limit;
4179
4180 htab = ppc_elf_hash_table (info);
4181 if (htab == NULL)
4182 return FALSE;
4183
4184 /* A bl insn can reach -0x2000000 to 0x1fffffc. The limit is
4185 reduced somewhat to cater for possible stubs that might be added
4186 between the call and its destination. */
4187 limit = 0x1e00000;
4188 low_vma = -1;
4189 high_vma = 0;
4190 for (sec = info->output_bfd->sections; sec != NULL; sec = sec->next)
4191 if ((sec->flags & (SEC_ALLOC | SEC_CODE)) == (SEC_ALLOC | SEC_CODE))
4192 {
4193 if (low_vma > sec->vma)
4194 low_vma = sec->vma;
4195 if (high_vma < sec->vma + sec->size)
4196 high_vma = sec->vma + sec->size;
4197 }
4198
4199 /* If a "bl" can reach anywhere in local code sections, then we can
4200 convert all inline PLT sequences to direct calls when the symbol
4201 is local. */
4202 if (high_vma - low_vma < limit)
4203 {
4204 htab->can_convert_all_inline_plt = 1;
4205 return TRUE;
4206 }
4207
4208 /* Otherwise, go looking through relocs for cases where a direct
4209 call won't reach. Mark the symbol on any such reloc to disable
4210 the optimization and keep the PLT entry as it seems likely that
4211 this will be better than creating trampolines. Note that this
4212 will disable the optimization for all inline PLT calls to a
4213 particular symbol, not just those that won't reach. The
4214 difficulty in doing a more precise optimization is that the
4215 linker needs to make a decision depending on whether a
4216 particular R_PPC_PLTCALL insn can be turned into a direct
4217 call, for each of the R_PPC_PLTSEQ and R_PPC_PLT16* insns in
4218 the sequence, and there is nothing that ties those relocs
4219 together except their symbol. */
4220
4221 for (ibfd = info->input_bfds; ibfd != NULL; ibfd = ibfd->link.next)
4222 {
4223 Elf_Internal_Shdr *symtab_hdr;
4224 Elf_Internal_Sym *local_syms;
4225
4226 if (!is_ppc_elf (ibfd))
4227 continue;
4228
4229 local_syms = NULL;
4230 symtab_hdr = &elf_symtab_hdr (ibfd);
4231
4232 for (sec = ibfd->sections; sec != NULL; sec = sec->next)
4233 if (sec->has_pltcall
4234 && !bfd_is_abs_section (sec->output_section))
4235 {
4236 Elf_Internal_Rela *relstart, *rel, *relend;
4237
4238 /* Read the relocations. */
4239 relstart = _bfd_elf_link_read_relocs (ibfd, sec, NULL, NULL,
4240 info->keep_memory);
4241 if (relstart == NULL)
4242 return FALSE;
4243
4244 relend = relstart + sec->reloc_count;
4245 for (rel = relstart; rel < relend; )
4246 {
4247 enum elf_ppc_reloc_type r_type;
4248 unsigned long r_symndx;
4249 asection *sym_sec;
4250 struct elf_link_hash_entry *h;
4251 Elf_Internal_Sym *sym;
4252 unsigned char *tls_maskp;
4253
4254 r_type = ELF32_R_TYPE (rel->r_info);
4255 if (r_type != R_PPC_PLTCALL)
4256 continue;
4257
4258 r_symndx = ELF32_R_SYM (rel->r_info);
4259 if (!get_sym_h (&h, &sym, &sym_sec, &tls_maskp, &local_syms,
4260 r_symndx, ibfd))
4261 {
4262 if (elf_section_data (sec)->relocs != relstart)
4263 free (relstart);
4264 if (symtab_hdr->contents != (unsigned char *) local_syms)
4265 free (local_syms);
4266 return FALSE;
4267 }
4268
4269 if (sym_sec != NULL && sym_sec->output_section != NULL)
4270 {
4271 bfd_vma from, to;
4272 if (h != NULL)
4273 to = h->root.u.def.value;
4274 else
4275 to = sym->st_value;
4276 to += (rel->r_addend
4277 + sym_sec->output_offset
4278 + sym_sec->output_section->vma);
4279 from = (rel->r_offset
4280 + sec->output_offset
4281 + sec->output_section->vma);
4282 if (to - from + limit < 2 * limit)
4283 *tls_maskp &= ~PLT_KEEP;
4284 }
4285 }
4286 if (elf_section_data (sec)->relocs != relstart)
4287 free (relstart);
4288 }
4289
4290 if (local_syms != NULL
4291 && symtab_hdr->contents != (unsigned char *) local_syms)
4292 {
4293 if (!info->keep_memory)
4294 free (local_syms);
4295 else
4296 symtab_hdr->contents = (unsigned char *) local_syms;
4297 }
4298 }
4299
4300 return TRUE;
4301 }
4302
4303 /* Set plt output section type, htab->tls_get_addr, and call the
4304 generic ELF tls_setup function. */
4305
4306 asection *
4307 ppc_elf_tls_setup (bfd *obfd, struct bfd_link_info *info)
4308 {
4309 struct ppc_elf_link_hash_table *htab;
4310
4311 htab = ppc_elf_hash_table (info);
4312 htab->tls_get_addr = elf_link_hash_lookup (&htab->elf, "__tls_get_addr",
4313 FALSE, FALSE, TRUE);
4314 if (htab->plt_type != PLT_NEW)
4315 htab->params->no_tls_get_addr_opt = TRUE;
4316
4317 if (!htab->params->no_tls_get_addr_opt)
4318 {
4319 struct elf_link_hash_entry *opt, *tga;
4320 opt = elf_link_hash_lookup (&htab->elf, "__tls_get_addr_opt",
4321 FALSE, FALSE, TRUE);
4322 if (opt != NULL
4323 && (opt->root.type == bfd_link_hash_defined
4324 || opt->root.type == bfd_link_hash_defweak))
4325 {
4326 /* If glibc supports an optimized __tls_get_addr call stub,
4327 signalled by the presence of __tls_get_addr_opt, and we'll
4328 be calling __tls_get_addr via a plt call stub, then
4329 make __tls_get_addr point to __tls_get_addr_opt. */
4330 tga = htab->tls_get_addr;
4331 if (htab->elf.dynamic_sections_created
4332 && tga != NULL
4333 && (tga->type == STT_FUNC
4334 || tga->needs_plt)
4335 && !(SYMBOL_CALLS_LOCAL (info, tga)
4336 || UNDEFWEAK_NO_DYNAMIC_RELOC (info, tga)))
4337 {
4338 struct plt_entry *ent;
4339 for (ent = tga->plt.plist; ent != NULL; ent = ent->next)
4340 if (ent->plt.refcount > 0)
4341 break;
4342 if (ent != NULL)
4343 {
4344 tga->root.type = bfd_link_hash_indirect;
4345 tga->root.u.i.link = &opt->root;
4346 ppc_elf_copy_indirect_symbol (info, opt, tga);
4347 opt->mark = 1;
4348 if (opt->dynindx != -1)
4349 {
4350 /* Use __tls_get_addr_opt in dynamic relocations. */
4351 opt->dynindx = -1;
4352 _bfd_elf_strtab_delref (elf_hash_table (info)->dynstr,
4353 opt->dynstr_index);
4354 if (!bfd_elf_link_record_dynamic_symbol (info, opt))
4355 return FALSE;
4356 }
4357 htab->tls_get_addr = opt;
4358 }
4359 }
4360 }
4361 else
4362 htab->params->no_tls_get_addr_opt = TRUE;
4363 }
4364 if (htab->plt_type == PLT_NEW
4365 && htab->elf.splt != NULL
4366 && htab->elf.splt->output_section != NULL)
4367 {
4368 elf_section_type (htab->elf.splt->output_section) = SHT_PROGBITS;
4369 elf_section_flags (htab->elf.splt->output_section) = SHF_ALLOC + SHF_WRITE;
4370 }
4371
4372 return _bfd_elf_tls_setup (obfd, info);
4373 }
4374
4375 /* Return TRUE iff REL is a branch reloc with a global symbol matching
4376 HASH. */
4377
4378 static bfd_boolean
4379 branch_reloc_hash_match (const bfd *ibfd,
4380 const Elf_Internal_Rela *rel,
4381 const struct elf_link_hash_entry *hash)
4382 {
4383 Elf_Internal_Shdr *symtab_hdr = &elf_symtab_hdr (ibfd);
4384 enum elf_ppc_reloc_type r_type = ELF32_R_TYPE (rel->r_info);
4385 unsigned int r_symndx = ELF32_R_SYM (rel->r_info);
4386
4387 if (r_symndx >= symtab_hdr->sh_info && is_branch_reloc (r_type))
4388 {
4389 struct elf_link_hash_entry **sym_hashes = elf_sym_hashes (ibfd);
4390 struct elf_link_hash_entry *h;
4391
4392 h = sym_hashes[r_symndx - symtab_hdr->sh_info];
4393 while (h->root.type == bfd_link_hash_indirect
4394 || h->root.type == bfd_link_hash_warning)
4395 h = (struct elf_link_hash_entry *) h->root.u.i.link;
4396 if (h == hash)
4397 return TRUE;
4398 }
4399 return FALSE;
4400 }
4401
4402 /* Run through all the TLS relocs looking for optimization
4403 opportunities. */
4404
4405 bfd_boolean
4406 ppc_elf_tls_optimize (bfd *obfd ATTRIBUTE_UNUSED,
4407 struct bfd_link_info *info)
4408 {
4409 bfd *ibfd;
4410 asection *sec;
4411 struct ppc_elf_link_hash_table *htab;
4412 int pass;
4413
4414 if (!bfd_link_executable (info))
4415 return TRUE;
4416
4417 htab = ppc_elf_hash_table (info);
4418 if (htab == NULL)
4419 return FALSE;
4420
4421 htab->do_tls_opt = 1;
4422
4423 /* Make two passes through the relocs. First time check that tls
4424 relocs involved in setting up a tls_get_addr call are indeed
4425 followed by such a call. If they are not, don't do any tls
4426 optimization. On the second pass twiddle tls_mask flags to
4427 notify relocate_section that optimization can be done, and
4428 adjust got and plt refcounts. */
4429 for (pass = 0; pass < 2; ++pass)
4430 for (ibfd = info->input_bfds; ibfd != NULL; ibfd = ibfd->link.next)
4431 {
4432 Elf_Internal_Shdr *symtab_hdr = &elf_symtab_hdr (ibfd);
4433 asection *got2 = bfd_get_section_by_name (ibfd, ".got2");
4434
4435 for (sec = ibfd->sections; sec != NULL; sec = sec->next)
4436 if (sec->has_tls_reloc && !bfd_is_abs_section (sec->output_section))
4437 {
4438 Elf_Internal_Rela *relstart, *rel, *relend;
4439 int expecting_tls_get_addr = 0;
4440
4441 /* Read the relocations. */
4442 relstart = _bfd_elf_link_read_relocs (ibfd, sec, NULL, NULL,
4443 info->keep_memory);
4444 if (relstart == NULL)
4445 return FALSE;
4446
4447 relend = relstart + sec->reloc_count;
4448 for (rel = relstart; rel < relend; rel++)
4449 {
4450 enum elf_ppc_reloc_type r_type;
4451 unsigned long r_symndx;
4452 struct elf_link_hash_entry *h = NULL;
4453 unsigned char *tls_mask;
4454 unsigned char tls_set, tls_clear;
4455 bfd_boolean is_local;
4456 bfd_signed_vma *got_count;
4457
4458 r_symndx = ELF32_R_SYM (rel->r_info);
4459 if (r_symndx >= symtab_hdr->sh_info)
4460 {
4461 struct elf_link_hash_entry **sym_hashes;
4462
4463 sym_hashes = elf_sym_hashes (ibfd);
4464 h = sym_hashes[r_symndx - symtab_hdr->sh_info];
4465 while (h->root.type == bfd_link_hash_indirect
4466 || h->root.type == bfd_link_hash_warning)
4467 h = (struct elf_link_hash_entry *) h->root.u.i.link;
4468 }
4469
4470 is_local = SYMBOL_REFERENCES_LOCAL (info, h);
4471 r_type = ELF32_R_TYPE (rel->r_info);
4472 /* If this section has old-style __tls_get_addr calls
4473 without marker relocs, then check that each
4474 __tls_get_addr call reloc is preceded by a reloc
4475 that conceivably belongs to the __tls_get_addr arg
4476 setup insn. If we don't find matching arg setup
4477 relocs, don't do any tls optimization. */
4478 if (pass == 0
4479 && sec->nomark_tls_get_addr
4480 && h != NULL
4481 && h == htab->tls_get_addr
4482 && !expecting_tls_get_addr
4483 && is_branch_reloc (r_type))
4484 {
4485 info->callbacks->minfo ("%H __tls_get_addr lost arg, "
4486 "TLS optimization disabled\n",
4487 ibfd, sec, rel->r_offset);
4488 if (elf_section_data (sec)->relocs != relstart)
4489 free (relstart);
4490 return TRUE;
4491 }
4492
4493 expecting_tls_get_addr = 0;
4494 switch (r_type)
4495 {
4496 case R_PPC_GOT_TLSLD16:
4497 case R_PPC_GOT_TLSLD16_LO:
4498 expecting_tls_get_addr = 1;
4499 /* Fall through. */
4500
4501 case R_PPC_GOT_TLSLD16_HI:
4502 case R_PPC_GOT_TLSLD16_HA:
4503 /* These relocs should never be against a symbol
4504 defined in a shared lib. Leave them alone if
4505 that turns out to be the case. */
4506 if (!is_local)
4507 continue;
4508
4509 /* LD -> LE */
4510 tls_set = 0;
4511 tls_clear = TLS_LD;
4512 break;
4513
4514 case R_PPC_GOT_TLSGD16:
4515 case R_PPC_GOT_TLSGD16_LO:
4516 expecting_tls_get_addr = 1;
4517 /* Fall through. */
4518
4519 case R_PPC_GOT_TLSGD16_HI:
4520 case R_PPC_GOT_TLSGD16_HA:
4521 if (is_local)
4522 /* GD -> LE */
4523 tls_set = 0;
4524 else
4525 /* GD -> IE */
4526 tls_set = TLS_TLS | TLS_GDIE;
4527 tls_clear = TLS_GD;
4528 break;
4529
4530 case R_PPC_GOT_TPREL16:
4531 case R_PPC_GOT_TPREL16_LO:
4532 case R_PPC_GOT_TPREL16_HI:
4533 case R_PPC_GOT_TPREL16_HA:
4534 if (is_local)
4535 {
4536 /* IE -> LE */
4537 tls_set = 0;
4538 tls_clear = TLS_TPREL;
4539 break;
4540 }
4541 else
4542 continue;
4543
4544 case R_PPC_TLSLD:
4545 if (!is_local)
4546 continue;
4547 /* Fall through. */
4548 case R_PPC_TLSGD:
4549 if (rel + 1 < relend
4550 && is_plt_seq_reloc (ELF32_R_TYPE (rel[1].r_info)))
4551 {
4552 if (pass != 0
4553 && ELF32_R_TYPE (rel[1].r_info) != R_PPC_PLTSEQ)
4554 {
4555 r_type = ELF32_R_TYPE (rel[1].r_info);
4556 r_symndx = ELF32_R_SYM (rel[1].r_info);
4557 if (r_symndx >= symtab_hdr->sh_info)
4558 {
4559 struct elf_link_hash_entry **sym_hashes;
4560
4561 sym_hashes = elf_sym_hashes (ibfd);
4562 h = sym_hashes[r_symndx - symtab_hdr->sh_info];
4563 while (h->root.type == bfd_link_hash_indirect
4564 || h->root.type == bfd_link_hash_warning)
4565 h = (struct elf_link_hash_entry *) h->root.u.i.link;
4566 if (h != NULL)
4567 {
4568 struct plt_entry *ent = NULL;
4569 bfd_vma addend = 0;
4570
4571 if (bfd_link_pic (info))
4572 addend = rel->r_addend;
4573 ent = find_plt_ent (&h->plt.plist,
4574 got2, addend);
4575 if (ent != NULL
4576 && ent->plt.refcount > 0)
4577 ent->plt.refcount -= 1;
4578 }
4579 }
4580 }
4581 continue;
4582 }
4583 expecting_tls_get_addr = 2;
4584 tls_set = 0;
4585 tls_clear = 0;
4586 break;
4587
4588 case R_PPC_TPREL16_HA:
4589 if (pass == 0)
4590 {
4591 unsigned char buf[4];
4592 unsigned int insn;
4593 bfd_vma off = rel->r_offset & ~3;
4594 if (!bfd_get_section_contents (ibfd, sec, buf,
4595 off, 4))
4596 {
4597 if (elf_section_data (sec)->relocs != relstart)
4598 free (relstart);
4599 return FALSE;
4600 }
4601 insn = bfd_get_32 (ibfd, buf);
4602 /* addis rt,2,imm */
4603 if ((insn & ((0x3fu << 26) | 0x1f << 16))
4604 != ((15u << 26) | (2 << 16)))
4605 {
4606 /* xgettext:c-format */
4607 info->callbacks->minfo
4608 (_("%H: warning: %s unexpected insn %#x.\n"),
4609 ibfd, sec, off, "R_PPC_TPREL16_HA", insn);
4610 htab->do_tls_opt = 0;
4611 }
4612 }
4613 continue;
4614
4615 case R_PPC_TPREL16_HI:
4616 htab->do_tls_opt = 0;
4617 continue;
4618
4619 default:
4620 continue;
4621 }
4622
4623 if (pass == 0)
4624 {
4625 if (!expecting_tls_get_addr
4626 || !sec->nomark_tls_get_addr)
4627 continue;
4628
4629 if (rel + 1 < relend
4630 && branch_reloc_hash_match (ibfd, rel + 1,
4631 htab->tls_get_addr))
4632 continue;
4633
4634 /* Uh oh, we didn't find the expected call. We
4635 could just mark this symbol to exclude it
4636 from tls optimization but it's safer to skip
4637 the entire optimization. */
4638 info->callbacks->minfo (_("%H arg lost __tls_get_addr, "
4639 "TLS optimization disabled\n"),
4640 ibfd, sec, rel->r_offset);
4641 if (elf_section_data (sec)->relocs != relstart)
4642 free (relstart);
4643 return TRUE;
4644 }
4645
4646 if (h != NULL)
4647 {
4648 tls_mask = &ppc_elf_hash_entry (h)->tls_mask;
4649 got_count = &h->got.refcount;
4650 }
4651 else
4652 {
4653 bfd_signed_vma *lgot_refs;
4654 struct plt_entry **local_plt;
4655 unsigned char *lgot_masks;
4656
4657 lgot_refs = elf_local_got_refcounts (ibfd);
4658 if (lgot_refs == NULL)
4659 abort ();
4660 local_plt = (struct plt_entry **)
4661 (lgot_refs + symtab_hdr->sh_info);
4662 lgot_masks = (unsigned char *)
4663 (local_plt + symtab_hdr->sh_info);
4664 tls_mask = &lgot_masks[r_symndx];
4665 got_count = &lgot_refs[r_symndx];
4666 }
4667
4668 /* If we don't have old-style __tls_get_addr calls
4669 without TLSGD/TLSLD marker relocs, and we haven't
4670 found a new-style __tls_get_addr call with a
4671 marker for this symbol, then we either have a
4672 broken object file or an -mlongcall style
4673 indirect call to __tls_get_addr without a marker.
4674 Disable optimization in this case. */
4675 if ((tls_clear & (TLS_GD | TLS_LD)) != 0
4676 && !sec->nomark_tls_get_addr
4677 && ((*tls_mask & (TLS_TLS | TLS_MARK))
4678 != (TLS_TLS | TLS_MARK)))
4679 continue;
4680
4681 if (expecting_tls_get_addr == 1 + !sec->nomark_tls_get_addr)
4682 {
4683 struct plt_entry *ent;
4684 bfd_vma addend = 0;
4685
4686 if (bfd_link_pic (info)
4687 && (ELF32_R_TYPE (rel[1].r_info) == R_PPC_PLTREL24
4688 || ELF32_R_TYPE (rel[1].r_info) == R_PPC_PLTCALL))
4689 addend = rel[1].r_addend;
4690 ent = find_plt_ent (&htab->tls_get_addr->plt.plist,
4691 got2, addend);
4692 if (ent != NULL && ent->plt.refcount > 0)
4693 ent->plt.refcount -= 1;
4694 }
4695 if (tls_clear == 0)
4696 continue;
4697
4698 if (tls_set == 0)
4699 {
4700 /* We managed to get rid of a got entry. */
4701 if (*got_count > 0)
4702 *got_count -= 1;
4703 }
4704
4705 *tls_mask |= tls_set;
4706 *tls_mask &= ~tls_clear;
4707 }
4708
4709 if (elf_section_data (sec)->relocs != relstart)
4710 free (relstart);
4711 }
4712 }
4713 return TRUE;
4714 }
4715 \f
4716 /* Return true if we have dynamic relocs against H or any of its weak
4717 aliases, that apply to read-only sections. Cannot be used after
4718 size_dynamic_sections. */
4719
4720 static bfd_boolean
4721 alias_readonly_dynrelocs (struct elf_link_hash_entry *h)
4722 {
4723 struct ppc_elf_link_hash_entry *eh = ppc_elf_hash_entry (h);
4724 do
4725 {
4726 if (_bfd_elf_readonly_dynrelocs (&eh->elf))
4727 return TRUE;
4728 eh = ppc_elf_hash_entry (eh->elf.u.alias);
4729 } while (eh != NULL && &eh->elf != h);
4730
4731 return FALSE;
4732 }
4733
4734 /* Return whether H has pc-relative dynamic relocs. */
4735
4736 static bfd_boolean
4737 pc_dynrelocs (struct elf_link_hash_entry *h)
4738 {
4739 struct elf_dyn_relocs *p;
4740
4741 for (p = h->dyn_relocs; p != NULL; p = p->next)
4742 if (p->pc_count != 0)
4743 return TRUE;
4744 return FALSE;
4745 }
4746
4747 /* Adjust a symbol defined by a dynamic object and referenced by a
4748 regular object. The current definition is in some section of the
4749 dynamic object, but we're not including those sections. We have to
4750 change the definition to something the rest of the link can
4751 understand. */
4752
4753 static bfd_boolean
4754 ppc_elf_adjust_dynamic_symbol (struct bfd_link_info *info,
4755 struct elf_link_hash_entry *h)
4756 {
4757 struct ppc_elf_link_hash_table *htab;
4758 asection *s;
4759
4760 #ifdef DEBUG
4761 fprintf (stderr, "ppc_elf_adjust_dynamic_symbol called for %s\n",
4762 h->root.root.string);
4763 #endif
4764
4765 /* Make sure we know what is going on here. */
4766 htab = ppc_elf_hash_table (info);
4767 BFD_ASSERT (htab->elf.dynobj != NULL
4768 && (h->needs_plt
4769 || h->type == STT_GNU_IFUNC
4770 || h->is_weakalias
4771 || (h->def_dynamic
4772 && h->ref_regular
4773 && !h->def_regular)));
4774
4775 /* Deal with function syms. */
4776 if (h->type == STT_FUNC
4777 || h->type == STT_GNU_IFUNC
4778 || h->needs_plt)
4779 {
4780 bfd_boolean local = (SYMBOL_CALLS_LOCAL (info, h)
4781 || UNDEFWEAK_NO_DYNAMIC_RELOC (info, h));
4782 /* Discard dyn_relocs when non-pic if we've decided that a
4783 function symbol is local. */
4784 if (!bfd_link_pic (info) && local)
4785 h->dyn_relocs = NULL;
4786
4787 /* Clear procedure linkage table information for any symbol that
4788 won't need a .plt entry. */
4789 struct plt_entry *ent;
4790 for (ent = h->plt.plist; ent != NULL; ent = ent->next)
4791 if (ent->plt.refcount > 0)
4792 break;
4793 if (ent == NULL
4794 || (h->type != STT_GNU_IFUNC
4795 && local
4796 && (htab->can_convert_all_inline_plt
4797 || (ppc_elf_hash_entry (h)->tls_mask
4798 & (TLS_TLS | PLT_KEEP)) != PLT_KEEP)))
4799 {
4800 /* A PLT entry is not required/allowed when:
4801
4802 1. We are not using ld.so; because then the PLT entry
4803 can't be set up, so we can't use one. In this case,
4804 ppc_elf_adjust_dynamic_symbol won't even be called.
4805
4806 2. GC has rendered the entry unused.
4807
4808 3. We know for certain that a call to this symbol
4809 will go to this object, or will remain undefined. */
4810 h->plt.plist = NULL;
4811 h->needs_plt = 0;
4812 h->pointer_equality_needed = 0;
4813 }
4814 else
4815 {
4816 /* Taking a function's address in a read/write section
4817 doesn't require us to define the function symbol in the
4818 executable on a plt call stub. A dynamic reloc can
4819 be used instead, giving better runtime performance.
4820 (Calls via that function pointer don't need to bounce
4821 through the plt call stub.) Similarly, use a dynamic
4822 reloc for a weak reference when possible, allowing the
4823 resolution of the symbol to be set at load time rather
4824 than link time. */
4825 if ((h->pointer_equality_needed
4826 || (h->non_got_ref
4827 && !h->ref_regular_nonweak
4828 && !UNDEFWEAK_NO_DYNAMIC_RELOC (info, h)))
4829 && htab->elf.target_os != is_vxworks
4830 && !ppc_elf_hash_entry (h)->has_sda_refs
4831 && !_bfd_elf_readonly_dynrelocs (h))
4832 {
4833 h->pointer_equality_needed = 0;
4834 /* If we haven't seen a branch reloc and the symbol
4835 isn't an ifunc then we don't need a plt entry. */
4836 if (!h->needs_plt && h->type != STT_GNU_IFUNC)
4837 h->plt.plist = NULL;
4838 }
4839 else if (!bfd_link_pic (info))
4840 /* We are going to be defining the function symbol on the
4841 plt stub, so no dyn_relocs needed when non-pic. */
4842 h->dyn_relocs = NULL;
4843 }
4844 h->protected_def = 0;
4845 /* Function symbols can't have copy relocs. */
4846 return TRUE;
4847 }
4848 else
4849 h->plt.plist = NULL;
4850
4851 /* If this is a weak symbol, and there is a real definition, the
4852 processor independent code will have arranged for us to see the
4853 real definition first, and we can just use the same value. */
4854 if (h->is_weakalias)
4855 {
4856 struct elf_link_hash_entry *def = weakdef (h);
4857 BFD_ASSERT (def->root.type == bfd_link_hash_defined);
4858 h->root.u.def.section = def->root.u.def.section;
4859 h->root.u.def.value = def->root.u.def.value;
4860 if (def->root.u.def.section == htab->elf.sdynbss
4861 || def->root.u.def.section == htab->elf.sdynrelro
4862 || def->root.u.def.section == htab->dynsbss)
4863 h->dyn_relocs = NULL;
4864 return TRUE;
4865 }
4866
4867 /* This is a reference to a symbol defined by a dynamic object which
4868 is not a function. */
4869
4870 /* If we are creating a shared library, we must presume that the
4871 only references to the symbol are via the global offset table.
4872 For such cases we need not do anything here; the relocations will
4873 be handled correctly by relocate_section. */
4874 if (bfd_link_pic (info))
4875 {
4876 h->protected_def = 0;
4877 return TRUE;
4878 }
4879
4880 /* If there are no references to this symbol that do not use the
4881 GOT, we don't need to generate a copy reloc. */
4882 if (!h->non_got_ref)
4883 {
4884 h->protected_def = 0;
4885 return TRUE;
4886 }
4887
4888 /* Protected variables do not work with .dynbss. The copy in
4889 .dynbss won't be used by the shared library with the protected
4890 definition for the variable. Editing to PIC, or text relocations
4891 are preferable to an incorrect program. */
4892 if (h->protected_def)
4893 {
4894 if (ELIMINATE_COPY_RELOCS
4895 && ppc_elf_hash_entry (h)->has_addr16_ha
4896 && ppc_elf_hash_entry (h)->has_addr16_lo
4897 && htab->params->pic_fixup == 0
4898 && info->disable_target_specific_optimizations <= 1)
4899 htab->params->pic_fixup = 1;
4900 return TRUE;
4901 }
4902
4903 /* If -z nocopyreloc was given, we won't generate them either. */
4904 if (info->nocopyreloc)
4905 return TRUE;
4906
4907 /* If we don't find any dynamic relocs in read-only sections, then
4908 we'll be keeping the dynamic relocs and avoiding the copy reloc.
4909 We can't do this if there are any small data relocations. This
4910 doesn't work on VxWorks, where we can not have dynamic
4911 relocations (other than copy and jump slot relocations) in an
4912 executable. */
4913 if (ELIMINATE_COPY_RELOCS
4914 && !ppc_elf_hash_entry (h)->has_sda_refs
4915 && htab->elf.target_os != is_vxworks
4916 && !h->def_regular
4917 && !alias_readonly_dynrelocs (h))
4918 return TRUE;
4919
4920 /* We must allocate the symbol in our .dynbss section, which will
4921 become part of the .bss section of the executable. There will be
4922 an entry for this symbol in the .dynsym section. The dynamic
4923 object will contain position independent code, so all references
4924 from the dynamic object to this symbol will go through the global
4925 offset table. The dynamic linker will use the .dynsym entry to
4926 determine the address it must put in the global offset table, so
4927 both the dynamic object and the regular object will refer to the
4928 same memory location for the variable.
4929
4930 Of course, if the symbol is referenced using SDAREL relocs, we
4931 must instead allocate it in .sbss. */
4932 if (ppc_elf_hash_entry (h)->has_sda_refs)
4933 s = htab->dynsbss;
4934 else if ((h->root.u.def.section->flags & SEC_READONLY) != 0)
4935 s = htab->elf.sdynrelro;
4936 else
4937 s = htab->elf.sdynbss;
4938 BFD_ASSERT (s != NULL);
4939
4940 if ((h->root.u.def.section->flags & SEC_ALLOC) != 0 && h->size != 0)
4941 {
4942 asection *srel;
4943
4944 /* We must generate a R_PPC_COPY reloc to tell the dynamic
4945 linker to copy the initial value out of the dynamic object
4946 and into the runtime process image. */
4947 if (ppc_elf_hash_entry (h)->has_sda_refs)
4948 srel = htab->relsbss;
4949 else if ((h->root.u.def.section->flags & SEC_READONLY) != 0)
4950 srel = htab->elf.sreldynrelro;
4951 else
4952 srel = htab->elf.srelbss;
4953 BFD_ASSERT (srel != NULL);
4954 srel->size += sizeof (Elf32_External_Rela);
4955 h->needs_copy = 1;
4956 }
4957
4958 /* We no longer want dyn_relocs. */
4959 h->dyn_relocs = NULL;
4960 return _bfd_elf_adjust_dynamic_copy (info, h, s);
4961 }
4962 \f
4963 /* Generate a symbol to mark plt call stubs. For non-PIC code the sym is
4964 xxxxxxxx.plt_call32.<callee> where xxxxxxxx is a hex number, usually 0,
4965 specifying the addend on the plt relocation. For -fpic code, the sym
4966 is xxxxxxxx.plt_pic32.<callee>, and for -fPIC
4967 xxxxxxxx.got2.plt_pic32.<callee>. */
4968
4969 static bfd_boolean
4970 add_stub_sym (struct plt_entry *ent,
4971 struct elf_link_hash_entry *h,
4972 struct bfd_link_info *info)
4973 {
4974 struct elf_link_hash_entry *sh;
4975 size_t len1, len2, len3;
4976 char *name;
4977 const char *stub;
4978 struct ppc_elf_link_hash_table *htab = ppc_elf_hash_table (info);
4979
4980 if (bfd_link_pic (info))
4981 stub = ".plt_pic32.";
4982 else
4983 stub = ".plt_call32.";
4984
4985 len1 = strlen (h->root.root.string);
4986 len2 = strlen (stub);
4987 len3 = 0;
4988 if (ent->sec)
4989 len3 = strlen (ent->sec->name);
4990 name = bfd_malloc (len1 + len2 + len3 + 9);
4991 if (name == NULL)
4992 return FALSE;
4993 sprintf (name, "%08x", (unsigned) ent->addend & 0xffffffff);
4994 if (ent->sec)
4995 memcpy (name + 8, ent->sec->name, len3);
4996 memcpy (name + 8 + len3, stub, len2);
4997 memcpy (name + 8 + len3 + len2, h->root.root.string, len1 + 1);
4998 sh = elf_link_hash_lookup (&htab->elf, name, TRUE, FALSE, FALSE);
4999 if (sh == NULL)
5000 return FALSE;
5001 if (sh->root.type == bfd_link_hash_new)
5002 {
5003 sh->root.type = bfd_link_hash_defined;
5004 sh->root.u.def.section = htab->glink;
5005 sh->root.u.def.value = ent->glink_offset;
5006 sh->ref_regular = 1;
5007 sh->def_regular = 1;
5008 sh->ref_regular_nonweak = 1;
5009 sh->forced_local = 1;
5010 sh->non_elf = 0;
5011 sh->root.linker_def = 1;
5012 }
5013 return TRUE;
5014 }
5015
5016 /* Allocate NEED contiguous space in .got, and return the offset.
5017 Handles allocation of the got header when crossing 32k. */
5018
5019 static bfd_vma
5020 allocate_got (struct ppc_elf_link_hash_table *htab, unsigned int need)
5021 {
5022 bfd_vma where;
5023 unsigned int max_before_header;
5024
5025 if (htab->plt_type == PLT_VXWORKS)
5026 {
5027 where = htab->elf.sgot->size;
5028 htab->elf.sgot->size += need;
5029 }
5030 else
5031 {
5032 max_before_header = htab->plt_type == PLT_NEW ? 32768 : 32764;
5033 if (need <= htab->got_gap)
5034 {
5035 where = max_before_header - htab->got_gap;
5036 htab->got_gap -= need;
5037 }
5038 else
5039 {
5040 if (htab->elf.sgot->size + need > max_before_header
5041 && htab->elf.sgot->size <= max_before_header)
5042 {
5043 htab->got_gap = max_before_header - htab->elf.sgot->size;
5044 htab->elf.sgot->size = max_before_header + htab->got_header_size;
5045 }
5046 where = htab->elf.sgot->size;
5047 htab->elf.sgot->size += need;
5048 }
5049 }
5050 return where;
5051 }
5052
5053 /* Calculate size of GOT entries for symbol given its TLS_MASK.
5054 TLS_LD is excluded because those go in a special GOT slot. */
5055
5056 static inline unsigned int
5057 got_entries_needed (int tls_mask)
5058 {
5059 unsigned int need;
5060 if ((tls_mask & TLS_TLS) == 0)
5061 need = 4;
5062 else
5063 {
5064 need = 0;
5065 if ((tls_mask & TLS_GD) != 0)
5066 need += 8;
5067 if ((tls_mask & (TLS_TPREL | TLS_GDIE)) != 0)
5068 need += 4;
5069 if ((tls_mask & TLS_DTPREL) != 0)
5070 need += 4;
5071 }
5072 return need;
5073 }
5074
5075 /* If H is undefined, make it dynamic if that makes sense. */
5076
5077 static bfd_boolean
5078 ensure_undef_dynamic (struct bfd_link_info *info,
5079 struct elf_link_hash_entry *h)
5080 {
5081 struct elf_link_hash_table *htab = elf_hash_table (info);
5082
5083 if (htab->dynamic_sections_created
5084 && ((info->dynamic_undefined_weak != 0
5085 && h->root.type == bfd_link_hash_undefweak)
5086 || h->root.type == bfd_link_hash_undefined)
5087 && h->dynindx == -1
5088 && !h->forced_local
5089 && ELF_ST_VISIBILITY (h->other) == STV_DEFAULT)
5090 return bfd_elf_link_record_dynamic_symbol (info, h);
5091 return TRUE;
5092 }
5093
5094 /* Choose whether to use htab->iplt or htab->pltlocal rather than the
5095 usual htab->elf.splt section for a PLT entry. */
5096
5097 static inline
5098 bfd_boolean use_local_plt (struct bfd_link_info *info,
5099 struct elf_link_hash_entry *h)
5100 {
5101 return (h == NULL
5102 || h->dynindx == -1
5103 || !elf_hash_table (info)->dynamic_sections_created);
5104 }
5105
5106 /* Allocate space in associated reloc sections for dynamic relocs. */
5107
5108 static bfd_boolean
5109 allocate_dynrelocs (struct elf_link_hash_entry *h, void *inf)
5110 {
5111 struct bfd_link_info *info = inf;
5112 struct ppc_elf_link_hash_entry *eh;
5113 struct ppc_elf_link_hash_table *htab;
5114 struct elf_dyn_relocs *p;
5115
5116 if (h->root.type == bfd_link_hash_indirect)
5117 return TRUE;
5118
5119 htab = ppc_elf_hash_table (info);
5120 eh = (struct ppc_elf_link_hash_entry *) h;
5121 if (eh->elf.got.refcount > 0
5122 || (ELIMINATE_COPY_RELOCS
5123 && !eh->elf.def_regular
5124 && eh->elf.protected_def
5125 && eh->has_addr16_ha
5126 && eh->has_addr16_lo
5127 && htab->params->pic_fixup > 0))
5128 {
5129 unsigned int need;
5130
5131 /* Make sure this symbol is output as a dynamic symbol. */
5132 if (!ensure_undef_dynamic (info, &eh->elf))
5133 return FALSE;
5134
5135 need = 0;
5136 if ((eh->tls_mask & (TLS_TLS | TLS_LD)) == (TLS_TLS | TLS_LD))
5137 {
5138 if (SYMBOL_REFERENCES_LOCAL (info, &eh->elf))
5139 /* We'll just use htab->tlsld_got.offset. This should
5140 always be the case. It's a little odd if we have
5141 a local dynamic reloc against a non-local symbol. */
5142 htab->tlsld_got.refcount += 1;
5143 else
5144 need += 8;
5145 }
5146 need += got_entries_needed (eh->tls_mask);
5147 if (need == 0)
5148 eh->elf.got.offset = (bfd_vma) -1;
5149 else
5150 {
5151 eh->elf.got.offset = allocate_got (htab, need);
5152 if (((bfd_link_pic (info)
5153 && !((eh->tls_mask & TLS_TLS) != 0
5154 && bfd_link_executable (info)
5155 && SYMBOL_REFERENCES_LOCAL (info, &eh->elf)))
5156 || (htab->elf.dynamic_sections_created
5157 && eh->elf.dynindx != -1
5158 && !SYMBOL_REFERENCES_LOCAL (info, &eh->elf)))
5159 && !UNDEFWEAK_NO_DYNAMIC_RELOC (info, &eh->elf))
5160 {
5161 asection *rsec;
5162
5163 need *= sizeof (Elf32_External_Rela) / 4;
5164 if ((eh->tls_mask & (TLS_TLS | TLS_LD)) == (TLS_TLS | TLS_LD))
5165 need -= sizeof (Elf32_External_Rela);
5166 rsec = htab->elf.srelgot;
5167 if (eh->elf.type == STT_GNU_IFUNC)
5168 rsec = htab->elf.irelplt;
5169 rsec->size += need;
5170 }
5171 }
5172 }
5173 else
5174 eh->elf.got.offset = (bfd_vma) -1;
5175
5176 /* If no dynamic sections we can't have dynamic relocs, except for
5177 IFUNCs which are handled even in static executables. */
5178 if (!htab->elf.dynamic_sections_created
5179 && h->type != STT_GNU_IFUNC)
5180 h->dyn_relocs = NULL;
5181
5182 /* Discard relocs on undefined symbols that must be local. */
5183 else if (h->root.type == bfd_link_hash_undefined
5184 && ELF_ST_VISIBILITY (h->other) != STV_DEFAULT)
5185 h->dyn_relocs = NULL;
5186
5187 /* Also discard relocs on undefined weak syms with non-default
5188 visibility, or when dynamic_undefined_weak says so. */
5189 else if (UNDEFWEAK_NO_DYNAMIC_RELOC (info, h))
5190 h->dyn_relocs = NULL;
5191
5192 if (h->dyn_relocs == NULL)
5193 ;
5194
5195 /* In the shared -Bsymbolic case, discard space allocated for
5196 dynamic pc-relative relocs against symbols which turn out to be
5197 defined in regular objects. For the normal shared case, discard
5198 space for relocs that have become local due to symbol visibility
5199 changes. */
5200 else if (bfd_link_pic (info))
5201 {
5202 /* Relocs that use pc_count are those that appear on a call insn,
5203 or certain REL relocs (see must_be_dyn_reloc) that can be
5204 generated via assembly. We want calls to protected symbols to
5205 resolve directly to the function rather than going via the plt.
5206 If people want function pointer comparisons to work as expected
5207 then they should avoid writing weird assembly. */
5208 if (SYMBOL_CALLS_LOCAL (info, h))
5209 {
5210 struct elf_dyn_relocs **pp;
5211
5212 for (pp = &h->dyn_relocs; (p = *pp) != NULL; )
5213 {
5214 p->count -= p->pc_count;
5215 p->pc_count = 0;
5216 if (p->count == 0)
5217 *pp = p->next;
5218 else
5219 pp = &p->next;
5220 }
5221 }
5222
5223 if (htab->elf.target_os == is_vxworks)
5224 {
5225 struct elf_dyn_relocs **pp;
5226
5227 for (pp = &h->dyn_relocs; (p = *pp) != NULL; )
5228 {
5229 if (strcmp (p->sec->output_section->name, ".tls_vars") == 0)
5230 *pp = p->next;
5231 else
5232 pp = &p->next;
5233 }
5234 }
5235
5236 if (h->dyn_relocs != NULL)
5237 {
5238 /* Make sure this symbol is output as a dynamic symbol. */
5239 if (!ensure_undef_dynamic (info, h))
5240 return FALSE;
5241 }
5242 }
5243 else if (ELIMINATE_COPY_RELOCS)
5244 {
5245 /* For the non-pic case, discard space for relocs against
5246 symbols which turn out to need copy relocs or are not
5247 dynamic. */
5248 if (h->dynamic_adjusted
5249 && !h->def_regular
5250 && !ELF_COMMON_DEF_P (h)
5251 && !(h->protected_def
5252 && eh->has_addr16_ha
5253 && eh->has_addr16_lo
5254 && htab->params->pic_fixup > 0))
5255 {
5256 /* Make sure this symbol is output as a dynamic symbol. */
5257 if (!ensure_undef_dynamic (info, h))
5258 return FALSE;
5259
5260 if (h->dynindx == -1)
5261 h->dyn_relocs = NULL;
5262 }
5263 else
5264 h->dyn_relocs = NULL;
5265 }
5266
5267 /* Allocate space. */
5268 for (p = h->dyn_relocs; p != NULL; p = p->next)
5269 {
5270 asection *sreloc = elf_section_data (p->sec)->sreloc;
5271 if (eh->elf.type == STT_GNU_IFUNC)
5272 sreloc = htab->elf.irelplt;
5273 sreloc->size += p->count * sizeof (Elf32_External_Rela);
5274 }
5275
5276 /* Handle PLT relocs. Done last, after dynindx has settled.
5277 We might need a PLT entry when the symbol
5278 a) is dynamic, or
5279 b) is an ifunc, or
5280 c) has plt16 relocs and has been processed by adjust_dynamic_symbol, or
5281 d) has plt16 relocs and we are linking statically. */
5282 if ((htab->elf.dynamic_sections_created && h->dynindx != -1)
5283 || h->type == STT_GNU_IFUNC
5284 || (h->needs_plt && h->dynamic_adjusted)
5285 || (h->needs_plt
5286 && h->def_regular
5287 && !htab->elf.dynamic_sections_created
5288 && !htab->can_convert_all_inline_plt
5289 && (ppc_elf_hash_entry (h)->tls_mask
5290 & (TLS_TLS | PLT_KEEP)) == PLT_KEEP))
5291 {
5292 struct plt_entry *ent;
5293 bfd_boolean doneone = FALSE;
5294 bfd_vma plt_offset = 0, glink_offset = (bfd_vma) -1;
5295
5296 for (ent = h->plt.plist; ent != NULL; ent = ent->next)
5297 if (ent->plt.refcount > 0)
5298 {
5299 asection *s = htab->elf.splt;
5300 bfd_boolean dyn = !use_local_plt (info, h);
5301
5302 if (!dyn)
5303 {
5304 if (h->type == STT_GNU_IFUNC)
5305 s = htab->elf.iplt;
5306 else
5307 s = htab->pltlocal;
5308 }
5309
5310 if (htab->plt_type == PLT_NEW || !dyn)
5311 {
5312 if (!doneone)
5313 {
5314 plt_offset = s->size;
5315 s->size += 4;
5316 }
5317 ent->plt.offset = plt_offset;
5318
5319 if (s == htab->pltlocal)
5320 ent->glink_offset = glink_offset;
5321 else
5322 {
5323 s = htab->glink;
5324 if (!doneone || bfd_link_pic (info))
5325 {
5326 glink_offset = s->size;
5327 s->size += GLINK_ENTRY_SIZE (htab, h);
5328 }
5329 if (!doneone
5330 && !bfd_link_pic (info)
5331 && h->def_dynamic
5332 && !h->def_regular)
5333 {
5334 h->root.u.def.section = s;
5335 h->root.u.def.value = glink_offset;
5336 }
5337 ent->glink_offset = glink_offset;
5338
5339 if (htab->params->emit_stub_syms
5340 && !add_stub_sym (ent, h, info))
5341 return FALSE;
5342 }
5343 }
5344 else
5345 {
5346 if (!doneone)
5347 {
5348 /* If this is the first .plt entry, make room
5349 for the special first entry. */
5350 if (s->size == 0)
5351 s->size += htab->plt_initial_entry_size;
5352
5353 /* The PowerPC PLT is actually composed of two
5354 parts, the first part is 2 words (for a load
5355 and a jump), and then there is a remaining
5356 word available at the end. */
5357 plt_offset = (htab->plt_initial_entry_size
5358 + (htab->plt_slot_size
5359 * ((s->size
5360 - htab->plt_initial_entry_size)
5361 / htab->plt_entry_size)));
5362
5363 /* If this symbol is not defined in a regular
5364 file, and we are not generating a shared
5365 library, then set the symbol to this location
5366 in the .plt. This is to avoid text
5367 relocations, and is required to make
5368 function pointers compare as equal between
5369 the normal executable and the shared library. */
5370 if (! bfd_link_pic (info)
5371 && h->def_dynamic
5372 && !h->def_regular)
5373 {
5374 h->root.u.def.section = s;
5375 h->root.u.def.value = plt_offset;
5376 }
5377
5378 /* Make room for this entry. */
5379 s->size += htab->plt_entry_size;
5380 /* After the 8192nd entry, room for two entries
5381 is allocated. */
5382 if (htab->plt_type == PLT_OLD
5383 && (s->size - htab->plt_initial_entry_size)
5384 / htab->plt_entry_size
5385 > PLT_NUM_SINGLE_ENTRIES)
5386 s->size += htab->plt_entry_size;
5387 }
5388 ent->plt.offset = plt_offset;
5389 }
5390
5391 /* We also need to make an entry in the .rela.plt section. */
5392 if (!doneone)
5393 {
5394 if (!dyn)
5395 {
5396 if (h->type == STT_GNU_IFUNC)
5397 {
5398 s = htab->elf.irelplt;
5399 s->size += sizeof (Elf32_External_Rela);
5400 }
5401 else if (bfd_link_pic (info))
5402 {
5403 s = htab->relpltlocal;
5404 s->size += sizeof (Elf32_External_Rela);
5405 }
5406 }
5407 else
5408 {
5409 htab->elf.srelplt->size += sizeof (Elf32_External_Rela);
5410
5411 if (htab->plt_type == PLT_VXWORKS)
5412 {
5413 /* Allocate space for the unloaded relocations. */
5414 if (!bfd_link_pic (info)
5415 && htab->elf.dynamic_sections_created)
5416 {
5417 if (ent->plt.offset
5418 == (bfd_vma) htab->plt_initial_entry_size)
5419 {
5420 htab->srelplt2->size
5421 += (sizeof (Elf32_External_Rela)
5422 * VXWORKS_PLTRESOLVE_RELOCS);
5423 }
5424
5425 htab->srelplt2->size
5426 += (sizeof (Elf32_External_Rela)
5427 * VXWORKS_PLT_NON_JMP_SLOT_RELOCS);
5428 }
5429
5430 /* Every PLT entry has an associated GOT entry in
5431 .got.plt. */
5432 htab->elf.sgotplt->size += 4;
5433 }
5434 }
5435 doneone = TRUE;
5436 }
5437 }
5438 else
5439 ent->plt.offset = (bfd_vma) -1;
5440
5441 if (!doneone)
5442 {
5443 h->plt.plist = NULL;
5444 h->needs_plt = 0;
5445 }
5446 }
5447 else
5448 {
5449 h->plt.plist = NULL;
5450 h->needs_plt = 0;
5451 }
5452
5453 return TRUE;
5454 }
5455
5456 static const unsigned char glink_eh_frame_cie[] =
5457 {
5458 0, 0, 0, 16, /* length. */
5459 0, 0, 0, 0, /* id. */
5460 1, /* CIE version. */
5461 'z', 'R', 0, /* Augmentation string. */
5462 4, /* Code alignment. */
5463 0x7c, /* Data alignment. */
5464 65, /* RA reg. */
5465 1, /* Augmentation size. */
5466 DW_EH_PE_pcrel | DW_EH_PE_sdata4, /* FDE encoding. */
5467 DW_CFA_def_cfa, 1, 0 /* def_cfa: r1 offset 0. */
5468 };
5469
5470 /* Set the sizes of the dynamic sections. */
5471
5472 static bfd_boolean
5473 ppc_elf_size_dynamic_sections (bfd *output_bfd,
5474 struct bfd_link_info *info)
5475 {
5476 struct ppc_elf_link_hash_table *htab;
5477 asection *s;
5478 bfd_boolean relocs;
5479 bfd *ibfd;
5480
5481 #ifdef DEBUG
5482 fprintf (stderr, "ppc_elf_size_dynamic_sections called\n");
5483 #endif
5484
5485 htab = ppc_elf_hash_table (info);
5486 BFD_ASSERT (htab->elf.dynobj != NULL);
5487
5488 if (elf_hash_table (info)->dynamic_sections_created)
5489 {
5490 /* Set the contents of the .interp section to the interpreter. */
5491 if (bfd_link_executable (info) && !info->nointerp)
5492 {
5493 s = bfd_get_linker_section (htab->elf.dynobj, ".interp");
5494 BFD_ASSERT (s != NULL);
5495 s->size = sizeof ELF_DYNAMIC_INTERPRETER;
5496 s->contents = (unsigned char *) ELF_DYNAMIC_INTERPRETER;
5497 }
5498 }
5499
5500 if (htab->plt_type == PLT_OLD)
5501 htab->got_header_size = 16;
5502 else if (htab->plt_type == PLT_NEW)
5503 htab->got_header_size = 12;
5504
5505 /* Set up .got offsets for local syms, and space for local dynamic
5506 relocs. */
5507 for (ibfd = info->input_bfds; ibfd != NULL; ibfd = ibfd->link.next)
5508 {
5509 bfd_signed_vma *local_got;
5510 bfd_signed_vma *end_local_got;
5511 struct plt_entry **local_plt;
5512 struct plt_entry **end_local_plt;
5513 char *lgot_masks;
5514 bfd_size_type locsymcount;
5515 Elf_Internal_Shdr *symtab_hdr;
5516
5517 if (!is_ppc_elf (ibfd))
5518 continue;
5519
5520 for (s = ibfd->sections; s != NULL; s = s->next)
5521 {
5522 struct ppc_dyn_relocs *p;
5523
5524 for (p = ((struct ppc_dyn_relocs *)
5525 elf_section_data (s)->local_dynrel);
5526 p != NULL;
5527 p = p->next)
5528 {
5529 if (!bfd_is_abs_section (p->sec)
5530 && bfd_is_abs_section (p->sec->output_section))
5531 {
5532 /* Input section has been discarded, either because
5533 it is a copy of a linkonce section or due to
5534 linker script /DISCARD/, so we'll be discarding
5535 the relocs too. */
5536 }
5537 else if (htab->elf.target_os == is_vxworks
5538 && strcmp (p->sec->output_section->name,
5539 ".tls_vars") == 0)
5540 {
5541 /* Relocations in vxworks .tls_vars sections are
5542 handled specially by the loader. */
5543 }
5544 else if (p->count != 0)
5545 {
5546 asection *sreloc = elf_section_data (p->sec)->sreloc;
5547 if (p->ifunc)
5548 sreloc = htab->elf.irelplt;
5549 sreloc->size += p->count * sizeof (Elf32_External_Rela);
5550 if ((p->sec->output_section->flags
5551 & (SEC_READONLY | SEC_ALLOC))
5552 == (SEC_READONLY | SEC_ALLOC))
5553 {
5554 info->flags |= DF_TEXTREL;
5555 info->callbacks->minfo (_("%pB: dynamic relocation in read-only section `%pA'\n"),
5556 p->sec->owner, p->sec);
5557 }
5558 }
5559 }
5560 }
5561
5562 local_got = elf_local_got_refcounts (ibfd);
5563 if (!local_got)
5564 continue;
5565
5566 symtab_hdr = &elf_symtab_hdr (ibfd);
5567 locsymcount = symtab_hdr->sh_info;
5568 end_local_got = local_got + locsymcount;
5569 local_plt = (struct plt_entry **) end_local_got;
5570 end_local_plt = local_plt + locsymcount;
5571 lgot_masks = (char *) end_local_plt;
5572
5573 for (; local_got < end_local_got; ++local_got, ++lgot_masks)
5574 if (*local_got > 0)
5575 {
5576 unsigned int need;
5577 if ((*lgot_masks & (TLS_TLS | TLS_LD)) == (TLS_TLS | TLS_LD))
5578 htab->tlsld_got.refcount += 1;
5579 need = got_entries_needed (*lgot_masks);
5580 if (need == 0)
5581 *local_got = (bfd_vma) -1;
5582 else
5583 {
5584 *local_got = allocate_got (htab, need);
5585 if (bfd_link_pic (info)
5586 && !((*lgot_masks & TLS_TLS) != 0
5587 && bfd_link_executable (info)))
5588 {
5589 asection *srel;
5590
5591 need *= sizeof (Elf32_External_Rela) / 4;
5592 srel = htab->elf.srelgot;
5593 if ((*lgot_masks & (TLS_TLS | PLT_IFUNC)) == PLT_IFUNC)
5594 srel = htab->elf.irelplt;
5595 srel->size += need;
5596 }
5597 }
5598 }
5599 else
5600 *local_got = (bfd_vma) -1;
5601
5602 if (htab->elf.target_os == is_vxworks)
5603 continue;
5604
5605 /* Allocate space for calls to local STT_GNU_IFUNC syms in .iplt. */
5606 lgot_masks = (char *) end_local_plt;
5607 for (; local_plt < end_local_plt; ++local_plt, ++lgot_masks)
5608 {
5609 struct plt_entry *ent;
5610 bfd_boolean doneone = FALSE;
5611 bfd_vma plt_offset = 0, glink_offset = (bfd_vma) -1;
5612
5613 for (ent = *local_plt; ent != NULL; ent = ent->next)
5614 if (ent->plt.refcount > 0)
5615 {
5616 if ((*lgot_masks & (TLS_TLS | PLT_IFUNC)) == PLT_IFUNC)
5617 s = htab->elf.iplt;
5618 else if (htab->can_convert_all_inline_plt
5619 || (*lgot_masks & (TLS_TLS | PLT_KEEP)) != PLT_KEEP)
5620 {
5621 ent->plt.offset = (bfd_vma) -1;
5622 continue;
5623 }
5624 else
5625 s = htab->pltlocal;
5626
5627 if (!doneone)
5628 {
5629 plt_offset = s->size;
5630 s->size += 4;
5631 }
5632 ent->plt.offset = plt_offset;
5633
5634 if (s != htab->pltlocal && (!doneone || bfd_link_pic (info)))
5635 {
5636 s = htab->glink;
5637 glink_offset = s->size;
5638 s->size += GLINK_ENTRY_SIZE (htab, NULL);
5639 }
5640 ent->glink_offset = glink_offset;
5641
5642 if (!doneone)
5643 {
5644 if ((*lgot_masks & (TLS_TLS | PLT_IFUNC)) == PLT_IFUNC)
5645 {
5646 s = htab->elf.irelplt;
5647 s->size += sizeof (Elf32_External_Rela);
5648 }
5649 else if (bfd_link_pic (info))
5650 {
5651 s = htab->relpltlocal;
5652 s->size += sizeof (Elf32_External_Rela);
5653 }
5654 doneone = TRUE;
5655 }
5656 }
5657 else
5658 ent->plt.offset = (bfd_vma) -1;
5659 }
5660 }
5661
5662 /* Allocate space for global sym dynamic relocs. */
5663 elf_link_hash_traverse (elf_hash_table (info), allocate_dynrelocs, info);
5664
5665 if (htab->tlsld_got.refcount > 0)
5666 {
5667 htab->tlsld_got.offset = allocate_got (htab, 8);
5668 if (bfd_link_dll (info))
5669 htab->elf.srelgot->size += sizeof (Elf32_External_Rela);
5670 }
5671 else
5672 htab->tlsld_got.offset = (bfd_vma) -1;
5673
5674 if (htab->elf.sgot != NULL && htab->plt_type != PLT_VXWORKS)
5675 {
5676 unsigned int g_o_t = 32768;
5677
5678 /* If we haven't allocated the header, do so now. When we get here,
5679 for old plt/got the got size will be 0 to 32764 (not allocated),
5680 or 32780 to 65536 (header allocated). For new plt/got, the
5681 corresponding ranges are 0 to 32768 and 32780 to 65536. */
5682 if (htab->elf.sgot->size <= 32768)
5683 {
5684 g_o_t = htab->elf.sgot->size;
5685 if (htab->plt_type == PLT_OLD)
5686 g_o_t += 4;
5687 htab->elf.sgot->size += htab->got_header_size;
5688 }
5689
5690 htab->elf.hgot->root.u.def.value = g_o_t;
5691 }
5692 if (bfd_link_pic (info))
5693 {
5694 struct elf_link_hash_entry *sda = htab->sdata[0].sym;
5695
5696 sda->root.u.def.section = htab->elf.hgot->root.u.def.section;
5697 sda->root.u.def.value = htab->elf.hgot->root.u.def.value;
5698 }
5699 if (info->emitrelocations)
5700 {
5701 struct elf_link_hash_entry *sda = htab->sdata[0].sym;
5702
5703 if (sda != NULL && sda->ref_regular)
5704 sda->root.u.def.section->flags |= SEC_KEEP;
5705 sda = htab->sdata[1].sym;
5706 if (sda != NULL && sda->ref_regular)
5707 sda->root.u.def.section->flags |= SEC_KEEP;
5708 }
5709
5710 if (htab->glink != NULL
5711 && htab->glink->size != 0
5712 && htab->elf.dynamic_sections_created)
5713 {
5714 htab->glink_pltresolve = htab->glink->size;
5715 /* Space for the branch table. */
5716 htab->glink->size
5717 += htab->elf.srelplt->size / (sizeof (Elf32_External_Rela) / 4) - 4;
5718 /* Pad out to align the start of PLTresolve. */
5719 htab->glink->size += -htab->glink->size & (htab->params->ppc476_workaround
5720 ? 63 : 15);
5721 htab->glink->size += GLINK_PLTRESOLVE;
5722
5723 if (htab->params->emit_stub_syms)
5724 {
5725 struct elf_link_hash_entry *sh;
5726 sh = elf_link_hash_lookup (&htab->elf, "__glink",
5727 TRUE, FALSE, FALSE);
5728 if (sh == NULL)
5729 return FALSE;
5730 if (sh->root.type == bfd_link_hash_new)
5731 {
5732 sh->root.type = bfd_link_hash_defined;
5733 sh->root.u.def.section = htab->glink;
5734 sh->root.u.def.value = htab->glink_pltresolve;
5735 sh->ref_regular = 1;
5736 sh->def_regular = 1;
5737 sh->ref_regular_nonweak = 1;
5738 sh->forced_local = 1;
5739 sh->non_elf = 0;
5740 sh->root.linker_def = 1;
5741 }
5742 sh = elf_link_hash_lookup (&htab->elf, "__glink_PLTresolve",
5743 TRUE, FALSE, FALSE);
5744 if (sh == NULL)
5745 return FALSE;
5746 if (sh->root.type == bfd_link_hash_new)
5747 {
5748 sh->root.type = bfd_link_hash_defined;
5749 sh->root.u.def.section = htab->glink;
5750 sh->root.u.def.value = htab->glink->size - GLINK_PLTRESOLVE;
5751 sh->ref_regular = 1;
5752 sh->def_regular = 1;
5753 sh->ref_regular_nonweak = 1;
5754 sh->forced_local = 1;
5755 sh->non_elf = 0;
5756 sh->root.linker_def = 1;
5757 }
5758 }
5759 }
5760
5761 if (htab->glink != NULL
5762 && htab->glink->size != 0
5763 && htab->glink_eh_frame != NULL
5764 && !bfd_is_abs_section (htab->glink_eh_frame->output_section)
5765 && _bfd_elf_eh_frame_present (info))
5766 {
5767 s = htab->glink_eh_frame;
5768 s->size = sizeof (glink_eh_frame_cie) + 20;
5769 if (bfd_link_pic (info))
5770 {
5771 s->size += 4;
5772 if (htab->glink->size - GLINK_PLTRESOLVE + 8 >= 256)
5773 s->size += 4;
5774 }
5775 }
5776
5777 /* We've now determined the sizes of the various dynamic sections.
5778 Allocate memory for them. */
5779 relocs = FALSE;
5780 for (s = htab->elf.dynobj->sections; s != NULL; s = s->next)
5781 {
5782 bfd_boolean strip_section = TRUE;
5783
5784 if ((s->flags & SEC_LINKER_CREATED) == 0)
5785 continue;
5786
5787 if (s == htab->elf.splt
5788 || s == htab->elf.sgot)
5789 {
5790 /* We'd like to strip these sections if they aren't needed, but if
5791 we've exported dynamic symbols from them we must leave them.
5792 It's too late to tell BFD to get rid of the symbols. */
5793 if (htab->elf.hplt != NULL)
5794 strip_section = FALSE;
5795 /* Strip this section if we don't need it; see the
5796 comment below. */
5797 }
5798 else if (s == htab->elf.iplt
5799 || s == htab->pltlocal
5800 || s == htab->glink
5801 || s == htab->glink_eh_frame
5802 || s == htab->elf.sgotplt
5803 || s == htab->sbss
5804 || s == htab->elf.sdynbss
5805 || s == htab->elf.sdynrelro
5806 || s == htab->dynsbss)
5807 {
5808 /* Strip these too. */
5809 }
5810 else if (s == htab->sdata[0].section
5811 || s == htab->sdata[1].section)
5812 {
5813 strip_section = (s->flags & SEC_KEEP) == 0;
5814 }
5815 else if (startswith (bfd_section_name (s), ".rela"))
5816 {
5817 if (s->size != 0)
5818 {
5819 /* Remember whether there are any relocation sections. */
5820 relocs = TRUE;
5821
5822 /* We use the reloc_count field as a counter if we need
5823 to copy relocs into the output file. */
5824 s->reloc_count = 0;
5825 }
5826 }
5827 else
5828 {
5829 /* It's not one of our sections, so don't allocate space. */
5830 continue;
5831 }
5832
5833 if (s->size == 0 && strip_section)
5834 {
5835 /* If we don't need this section, strip it from the
5836 output file. This is mostly to handle .rela.bss and
5837 .rela.plt. We must create both sections in
5838 create_dynamic_sections, because they must be created
5839 before the linker maps input sections to output
5840 sections. The linker does that before
5841 adjust_dynamic_symbol is called, and it is that
5842 function which decides whether anything needs to go
5843 into these sections. */
5844 s->flags |= SEC_EXCLUDE;
5845 continue;
5846 }
5847
5848 if ((s->flags & SEC_HAS_CONTENTS) == 0)
5849 continue;
5850
5851 /* Allocate memory for the section contents. */
5852 s->contents = bfd_zalloc (htab->elf.dynobj, s->size);
5853 if (s->contents == NULL)
5854 return FALSE;
5855 }
5856
5857 if (htab->elf.dynamic_sections_created)
5858 {
5859 /* Add some entries to the .dynamic section. We fill in the
5860 values later, in ppc_elf_finish_dynamic_sections, but we
5861 must add the entries now so that we get the correct size for
5862 the .dynamic section. The DT_DEBUG entry is filled in by the
5863 dynamic linker and used by the debugger. */
5864 #define add_dynamic_entry(TAG, VAL) \
5865 _bfd_elf_add_dynamic_entry (info, TAG, VAL)
5866
5867 if (!_bfd_elf_maybe_vxworks_add_dynamic_tags (output_bfd, info,
5868 relocs))
5869 return FALSE;
5870
5871 if (htab->plt_type == PLT_NEW
5872 && htab->glink != NULL
5873 && htab->glink->size != 0)
5874 {
5875 if (!add_dynamic_entry (DT_PPC_GOT, 0))
5876 return FALSE;
5877 if (!htab->params->no_tls_get_addr_opt
5878 && htab->tls_get_addr != NULL
5879 && htab->tls_get_addr->plt.plist != NULL
5880 && !add_dynamic_entry (DT_PPC_OPT, PPC_OPT_TLS))
5881 return FALSE;
5882 }
5883 }
5884 #undef add_dynamic_entry
5885
5886 if (htab->glink_eh_frame != NULL
5887 && htab->glink_eh_frame->contents != NULL)
5888 {
5889 unsigned char *p = htab->glink_eh_frame->contents;
5890 bfd_vma val;
5891
5892 memcpy (p, glink_eh_frame_cie, sizeof (glink_eh_frame_cie));
5893 /* CIE length (rewrite in case little-endian). */
5894 bfd_put_32 (htab->elf.dynobj, sizeof (glink_eh_frame_cie) - 4, p);
5895 p += sizeof (glink_eh_frame_cie);
5896 /* FDE length. */
5897 val = htab->glink_eh_frame->size - 4 - sizeof (glink_eh_frame_cie);
5898 bfd_put_32 (htab->elf.dynobj, val, p);
5899 p += 4;
5900 /* CIE pointer. */
5901 val = p - htab->glink_eh_frame->contents;
5902 bfd_put_32 (htab->elf.dynobj, val, p);
5903 p += 4;
5904 /* Offset to .glink. Set later. */
5905 p += 4;
5906 /* .glink size. */
5907 bfd_put_32 (htab->elf.dynobj, htab->glink->size, p);
5908 p += 4;
5909 /* Augmentation. */
5910 p += 1;
5911
5912 if (bfd_link_pic (info)
5913 && htab->elf.dynamic_sections_created)
5914 {
5915 bfd_vma adv = (htab->glink->size - GLINK_PLTRESOLVE + 8) >> 2;
5916 if (adv < 64)
5917 *p++ = DW_CFA_advance_loc + adv;
5918 else if (adv < 256)
5919 {
5920 *p++ = DW_CFA_advance_loc1;
5921 *p++ = adv;
5922 }
5923 else if (adv < 65536)
5924 {
5925 *p++ = DW_CFA_advance_loc2;
5926 bfd_put_16 (htab->elf.dynobj, adv, p);
5927 p += 2;
5928 }
5929 else
5930 {
5931 *p++ = DW_CFA_advance_loc4;
5932 bfd_put_32 (htab->elf.dynobj, adv, p);
5933 p += 4;
5934 }
5935 *p++ = DW_CFA_register;
5936 *p++ = 65;
5937 p++;
5938 *p++ = DW_CFA_advance_loc + 4;
5939 *p++ = DW_CFA_restore_extended;
5940 *p++ = 65;
5941 }
5942 BFD_ASSERT ((bfd_vma) ((p + 3 - htab->glink_eh_frame->contents) & -4)
5943 == htab->glink_eh_frame->size);
5944 }
5945
5946 return TRUE;
5947 }
5948
5949 /* Arrange to have _SDA_BASE_ or _SDA2_BASE_ stripped from the output
5950 if it looks like nothing is using them. */
5951
5952 static void
5953 maybe_strip_sdasym (bfd *output_bfd, elf_linker_section_t *lsect)
5954 {
5955 struct elf_link_hash_entry *sda = lsect->sym;
5956
5957 if (sda != NULL && !sda->ref_regular && sda->dynindx == -1)
5958 {
5959 asection *s;
5960
5961 s = bfd_get_section_by_name (output_bfd, lsect->name);
5962 if (s == NULL || bfd_section_removed_from_list (output_bfd, s))
5963 {
5964 s = bfd_get_section_by_name (output_bfd, lsect->bss_name);
5965 if (s == NULL || bfd_section_removed_from_list (output_bfd, s))
5966 {
5967 sda->def_regular = 0;
5968 /* This is somewhat magic. See elf_link_output_extsym. */
5969 sda->ref_dynamic = 1;
5970 sda->forced_local = 0;
5971 }
5972 }
5973 }
5974 }
5975
5976 void
5977 ppc_elf_maybe_strip_sdata_syms (struct bfd_link_info *info)
5978 {
5979 struct ppc_elf_link_hash_table *htab = ppc_elf_hash_table (info);
5980
5981 if (htab != NULL)
5982 {
5983 maybe_strip_sdasym (info->output_bfd, &htab->sdata[0]);
5984 maybe_strip_sdasym (info->output_bfd, &htab->sdata[1]);
5985 }
5986 }
5987
5988
5989 /* Return TRUE if symbol should be hashed in the `.gnu.hash' section. */
5990
5991 static bfd_boolean
5992 ppc_elf_hash_symbol (struct elf_link_hash_entry *h)
5993 {
5994 if (h->plt.plist != NULL
5995 && !h->def_regular
5996 && (!h->pointer_equality_needed
5997 || !h->ref_regular_nonweak))
5998 return FALSE;
5999
6000 return _bfd_elf_hash_symbol (h);
6001 }
6002 \f
6003 #define ARRAY_SIZE(a) (sizeof (a) / sizeof ((a)[0]))
6004
6005 /* Relaxation trampolines. r12 is available for clobbering (r11, is
6006 used for some functions that are allowed to break the ABI). */
6007 static const int shared_stub_entry[] =
6008 {
6009 0x7c0802a6, /* mflr 0 */
6010 0x429f0005, /* bcl 20, 31, .Lxxx */
6011 0x7d8802a6, /* mflr 12 */
6012 0x3d8c0000, /* addis 12, 12, (xxx-.Lxxx)@ha */
6013 0x398c0000, /* addi 12, 12, (xxx-.Lxxx)@l */
6014 0x7c0803a6, /* mtlr 0 */
6015 0x7d8903a6, /* mtctr 12 */
6016 0x4e800420, /* bctr */
6017 };
6018
6019 static const int stub_entry[] =
6020 {
6021 0x3d800000, /* lis 12,xxx@ha */
6022 0x398c0000, /* addi 12,12,xxx@l */
6023 0x7d8903a6, /* mtctr 12 */
6024 0x4e800420, /* bctr */
6025 };
6026
6027 struct ppc_elf_relax_info
6028 {
6029 unsigned int workaround_size;
6030 unsigned int picfixup_size;
6031 };
6032
6033 /* This function implements long branch trampolines, and the ppc476
6034 icache bug workaround. Any section needing trampolines or patch
6035 space for the workaround has its size extended so that we can
6036 add trampolines at the end of the section. */
6037
6038 static bfd_boolean
6039 ppc_elf_relax_section (bfd *abfd,
6040 asection *isec,
6041 struct bfd_link_info *link_info,
6042 bfd_boolean *again)
6043 {
6044 struct one_branch_fixup
6045 {
6046 struct one_branch_fixup *next;
6047 asection *tsec;
6048 /* Final link, can use the symbol offset. For a
6049 relocatable link we use the symbol's index. */
6050 bfd_vma toff;
6051 bfd_vma trampoff;
6052 };
6053
6054 Elf_Internal_Shdr *symtab_hdr;
6055 bfd_byte *contents = NULL;
6056 Elf_Internal_Sym *isymbuf = NULL;
6057 Elf_Internal_Rela *internal_relocs = NULL;
6058 Elf_Internal_Rela *irel, *irelend = NULL;
6059 struct one_branch_fixup *branch_fixups = NULL;
6060 struct ppc_elf_relax_info *relax_info = NULL;
6061 unsigned changes = 0;
6062 bfd_boolean workaround_change;
6063 struct ppc_elf_link_hash_table *htab;
6064 bfd_size_type trampbase, trampoff, newsize, picfixup_size;
6065 asection *got2;
6066 bfd_boolean maybe_pasted;
6067
6068 *again = FALSE;
6069
6070 /* No need to do anything with non-alloc or non-code sections. */
6071 if ((isec->flags & SEC_ALLOC) == 0
6072 || (isec->flags & SEC_CODE) == 0
6073 || (isec->flags & SEC_LINKER_CREATED) != 0
6074 || isec->size < 4)
6075 return TRUE;
6076
6077 /* We cannot represent the required PIC relocs in the output, so don't
6078 do anything. The linker doesn't support mixing -shared and -r
6079 anyway. */
6080 if (bfd_link_relocatable (link_info) && bfd_link_pic (link_info))
6081 return TRUE;
6082
6083 htab = ppc_elf_hash_table (link_info);
6084 if (htab == NULL)
6085 return TRUE;
6086
6087 isec->size = (isec->size + 3) & -4;
6088 if (isec->rawsize == 0)
6089 isec->rawsize = isec->size;
6090 trampbase = isec->size;
6091
6092 BFD_ASSERT (isec->sec_info_type == SEC_INFO_TYPE_NONE
6093 || isec->sec_info_type == SEC_INFO_TYPE_TARGET);
6094 isec->sec_info_type = SEC_INFO_TYPE_TARGET;
6095
6096 if (htab->params->ppc476_workaround
6097 || htab->params->pic_fixup > 0)
6098 {
6099 if (elf_section_data (isec)->sec_info == NULL)
6100 {
6101 elf_section_data (isec)->sec_info
6102 = bfd_zalloc (abfd, sizeof (struct ppc_elf_relax_info));
6103 if (elf_section_data (isec)->sec_info == NULL)
6104 return FALSE;
6105 }
6106 relax_info = elf_section_data (isec)->sec_info;
6107 trampbase -= relax_info->workaround_size;
6108 }
6109
6110 maybe_pasted = (strcmp (isec->output_section->name, ".init") == 0
6111 || strcmp (isec->output_section->name, ".fini") == 0);
6112 /* Space for a branch around any trampolines. */
6113 trampoff = trampbase;
6114 if (maybe_pasted && trampbase == isec->rawsize)
6115 trampoff += 4;
6116
6117 symtab_hdr = &elf_symtab_hdr (abfd);
6118 picfixup_size = 0;
6119 if (htab->params->branch_trampolines
6120 || htab->params->pic_fixup > 0)
6121 {
6122 /* Get a copy of the native relocations. */
6123 if (isec->reloc_count != 0)
6124 {
6125 internal_relocs = _bfd_elf_link_read_relocs (abfd, isec, NULL, NULL,
6126 link_info->keep_memory);
6127 if (internal_relocs == NULL)
6128 goto error_return;
6129 }
6130
6131 got2 = bfd_get_section_by_name (abfd, ".got2");
6132
6133 irelend = internal_relocs + isec->reloc_count;
6134 for (irel = internal_relocs; irel < irelend; irel++)
6135 {
6136 unsigned long r_type = ELF32_R_TYPE (irel->r_info);
6137 bfd_vma toff, roff;
6138 asection *tsec;
6139 struct one_branch_fixup *f;
6140 size_t insn_offset = 0;
6141 bfd_vma max_branch_offset = 0, val;
6142 bfd_byte *hit_addr;
6143 unsigned long t0;
6144 struct elf_link_hash_entry *h;
6145 Elf_Internal_Sym *isym;
6146 struct plt_entry **plist;
6147 unsigned char sym_type;
6148
6149 switch (r_type)
6150 {
6151 case R_PPC_REL24:
6152 case R_PPC_LOCAL24PC:
6153 case R_PPC_PLTREL24:
6154 case R_PPC_PLTCALL:
6155 max_branch_offset = 1 << 25;
6156 break;
6157
6158 case R_PPC_REL14:
6159 case R_PPC_REL14_BRTAKEN:
6160 case R_PPC_REL14_BRNTAKEN:
6161 max_branch_offset = 1 << 15;
6162 break;
6163
6164 case R_PPC_ADDR16_HA:
6165 if (htab->params->pic_fixup > 0)
6166 break;
6167 continue;
6168
6169 default:
6170 continue;
6171 }
6172
6173 /* Get the value of the symbol referred to by the reloc. */
6174 if (!get_sym_h (&h, &isym, &tsec, NULL, &isymbuf,
6175 ELF32_R_SYM (irel->r_info), abfd))
6176 goto error_return;
6177
6178 if (isym != NULL)
6179 {
6180 if (tsec != NULL)
6181 ;
6182 else if (isym->st_shndx == SHN_ABS)
6183 tsec = bfd_abs_section_ptr;
6184 else
6185 continue;
6186
6187 toff = isym->st_value;
6188 sym_type = ELF_ST_TYPE (isym->st_info);
6189 }
6190 else
6191 {
6192 if (tsec != NULL)
6193 toff = h->root.u.def.value;
6194 else if (h->root.type == bfd_link_hash_undefined
6195 || h->root.type == bfd_link_hash_undefweak)
6196 {
6197 unsigned long indx;
6198
6199 indx = ELF32_R_SYM (irel->r_info) - symtab_hdr->sh_info;
6200 tsec = bfd_und_section_ptr;
6201 toff = bfd_link_relocatable (link_info) ? indx : 0;
6202 }
6203 else
6204 continue;
6205
6206 /* If this branch is to __tls_get_addr then we may later
6207 optimise away the call. We won't be needing a long-
6208 branch stub in that case. */
6209 if (bfd_link_executable (link_info)
6210 && h == htab->tls_get_addr
6211 && irel != internal_relocs)
6212 {
6213 unsigned long t_symndx = ELF32_R_SYM (irel[-1].r_info);
6214 unsigned long t_rtype = ELF32_R_TYPE (irel[-1].r_info);
6215 unsigned int tls_mask = 0;
6216
6217 /* The previous reloc should be one of R_PPC_TLSGD or
6218 R_PPC_TLSLD, or for older object files, a reloc
6219 on the __tls_get_addr arg setup insn. Get tls
6220 mask bits from the symbol on that reloc. */
6221 if (t_symndx < symtab_hdr->sh_info)
6222 {
6223 bfd_vma *local_got_offsets = elf_local_got_offsets (abfd);
6224
6225 if (local_got_offsets != NULL)
6226 {
6227 struct plt_entry **local_plt = (struct plt_entry **)
6228 (local_got_offsets + symtab_hdr->sh_info);
6229 char *lgot_masks = (char *)
6230 (local_plt + symtab_hdr->sh_info);
6231 tls_mask = lgot_masks[t_symndx];
6232 }
6233 }
6234 else
6235 {
6236 struct elf_link_hash_entry *th
6237 = elf_sym_hashes (abfd)[t_symndx - symtab_hdr->sh_info];
6238
6239 while (th->root.type == bfd_link_hash_indirect
6240 || th->root.type == bfd_link_hash_warning)
6241 th = (struct elf_link_hash_entry *) th->root.u.i.link;
6242
6243 tls_mask
6244 = ((struct ppc_elf_link_hash_entry *) th)->tls_mask;
6245 }
6246
6247 /* The mask bits tell us if the call will be
6248 optimised away. */
6249 if ((tls_mask & TLS_TLS) != 0 && (tls_mask & TLS_GD) == 0
6250 && (t_rtype == R_PPC_TLSGD
6251 || t_rtype == R_PPC_GOT_TLSGD16
6252 || t_rtype == R_PPC_GOT_TLSGD16_LO))
6253 continue;
6254 if ((tls_mask & TLS_TLS) != 0 && (tls_mask & TLS_LD) == 0
6255 && (t_rtype == R_PPC_TLSLD
6256 || t_rtype == R_PPC_GOT_TLSLD16
6257 || t_rtype == R_PPC_GOT_TLSLD16_LO))
6258 continue;
6259 }
6260
6261 sym_type = h->type;
6262 }
6263
6264 if (r_type == R_PPC_ADDR16_HA)
6265 {
6266 if (h != NULL
6267 && !h->def_regular
6268 && h->protected_def
6269 && ppc_elf_hash_entry (h)->has_addr16_ha
6270 && ppc_elf_hash_entry (h)->has_addr16_lo)
6271 picfixup_size += 12;
6272 continue;
6273 }
6274
6275 /* The condition here under which we call find_plt_ent must
6276 match that in relocate_section. If we call find_plt_ent here
6277 but not in relocate_section, or vice versa, then the branch
6278 destination used here may be incorrect. */
6279 plist = NULL;
6280 if (h != NULL)
6281 {
6282 /* We know is_branch_reloc (r_type) is true. */
6283 if (h->type == STT_GNU_IFUNC
6284 || r_type == R_PPC_PLTREL24)
6285 plist = &h->plt.plist;
6286 }
6287 else if (sym_type == STT_GNU_IFUNC
6288 && elf_local_got_offsets (abfd) != NULL)
6289 {
6290 bfd_vma *local_got_offsets = elf_local_got_offsets (abfd);
6291 struct plt_entry **local_plt = (struct plt_entry **)
6292 (local_got_offsets + symtab_hdr->sh_info);
6293 plist = local_plt + ELF32_R_SYM (irel->r_info);
6294 }
6295 if (plist != NULL)
6296 {
6297 bfd_vma addend = 0;
6298 struct plt_entry *ent;
6299
6300 if (r_type == R_PPC_PLTREL24 && bfd_link_pic (link_info))
6301 addend = irel->r_addend;
6302 ent = find_plt_ent (plist, got2, addend);
6303 if (ent != NULL)
6304 {
6305 if (htab->plt_type == PLT_NEW
6306 || h == NULL
6307 || !htab->elf.dynamic_sections_created
6308 || h->dynindx == -1)
6309 {
6310 tsec = htab->glink;
6311 toff = ent->glink_offset;
6312 }
6313 else
6314 {
6315 tsec = htab->elf.splt;
6316 toff = ent->plt.offset;
6317 }
6318 }
6319 }
6320
6321 /* If the branch and target are in the same section, you have
6322 no hope of adding stubs. We'll error out later should the
6323 branch overflow. */
6324 if (tsec == isec)
6325 continue;
6326
6327 /* toff is used for the symbol index when the symbol is
6328 undefined and we're doing a relocatable link, so we can't
6329 support addends. It would be possible to do so by
6330 putting the addend in one_branch_fixup but addends on
6331 branches are rare so it hardly seems worth supporting. */
6332 if (bfd_link_relocatable (link_info)
6333 && tsec == bfd_und_section_ptr
6334 && r_type != R_PPC_PLTREL24
6335 && irel->r_addend != 0)
6336 continue;
6337
6338 /* There probably isn't any reason to handle symbols in
6339 SEC_MERGE sections; SEC_MERGE doesn't seem a likely
6340 attribute for a code section, and we are only looking at
6341 branches. However, implement it correctly here as a
6342 reference for other target relax_section functions. */
6343 if (0 && tsec->sec_info_type == SEC_INFO_TYPE_MERGE)
6344 {
6345 /* At this stage in linking, no SEC_MERGE symbol has been
6346 adjusted, so all references to such symbols need to be
6347 passed through _bfd_merged_section_offset. (Later, in
6348 relocate_section, all SEC_MERGE symbols *except* for
6349 section symbols have been adjusted.)
6350
6351 gas may reduce relocations against symbols in SEC_MERGE
6352 sections to a relocation against the section symbol when
6353 the original addend was zero. When the reloc is against
6354 a section symbol we should include the addend in the
6355 offset passed to _bfd_merged_section_offset, since the
6356 location of interest is the original symbol. On the
6357 other hand, an access to "sym+addend" where "sym" is not
6358 a section symbol should not include the addend; Such an
6359 access is presumed to be an offset from "sym"; The
6360 location of interest is just "sym". */
6361 if (sym_type == STT_SECTION
6362 && r_type != R_PPC_PLTREL24)
6363 toff += irel->r_addend;
6364
6365 toff
6366 = _bfd_merged_section_offset (abfd, &tsec,
6367 elf_section_data (tsec)->sec_info,
6368 toff);
6369
6370 if (sym_type != STT_SECTION
6371 && r_type != R_PPC_PLTREL24)
6372 toff += irel->r_addend;
6373 }
6374 /* PLTREL24 addends are special. */
6375 else if (r_type != R_PPC_PLTREL24)
6376 toff += irel->r_addend;
6377
6378 /* Attempted -shared link of non-pic code loses. */
6379 if ((!bfd_link_relocatable (link_info)
6380 && tsec == bfd_und_section_ptr)
6381 || tsec->output_section == NULL
6382 || (tsec->owner != NULL
6383 && (tsec->owner->flags & BFD_PLUGIN) != 0))
6384 continue;
6385
6386 roff = irel->r_offset;
6387
6388 /* Avoid creating a lot of unnecessary fixups when
6389 relocatable if the output section size is such that a
6390 fixup can be created at final link.
6391 The max_branch_offset adjustment allows for some number
6392 of other fixups being needed at final link. */
6393 if (bfd_link_relocatable (link_info)
6394 && (isec->output_section->rawsize - (isec->output_offset + roff)
6395 < max_branch_offset - (max_branch_offset >> 4)))
6396 continue;
6397
6398 /* If the branch is in range, no need to do anything. */
6399 if (tsec != bfd_und_section_ptr
6400 && (!bfd_link_relocatable (link_info)
6401 /* A relocatable link may have sections moved during
6402 final link, so do not presume they remain in range. */
6403 || tsec->output_section == isec->output_section))
6404 {
6405 bfd_vma symaddr, reladdr;
6406
6407 symaddr = tsec->output_section->vma + tsec->output_offset + toff;
6408 reladdr = isec->output_section->vma + isec->output_offset + roff;
6409 if (symaddr - reladdr + max_branch_offset
6410 < 2 * max_branch_offset)
6411 continue;
6412 }
6413
6414 /* Look for an existing fixup to this address. */
6415 for (f = branch_fixups; f ; f = f->next)
6416 if (f->tsec == tsec && f->toff == toff)
6417 break;
6418
6419 if (f == NULL)
6420 {
6421 size_t size;
6422 unsigned long stub_rtype;
6423
6424 val = trampoff - roff;
6425 if (val >= max_branch_offset)
6426 /* Oh dear, we can't reach a trampoline. Don't try to add
6427 one. We'll report an error later. */
6428 continue;
6429
6430 if (bfd_link_pic (link_info))
6431 {
6432 size = 4 * ARRAY_SIZE (shared_stub_entry);
6433 insn_offset = 12;
6434 }
6435 else
6436 {
6437 size = 4 * ARRAY_SIZE (stub_entry);
6438 insn_offset = 0;
6439 }
6440 stub_rtype = R_PPC_RELAX;
6441 if (tsec == htab->elf.splt
6442 || tsec == htab->glink)
6443 {
6444 stub_rtype = R_PPC_RELAX_PLT;
6445 if (r_type == R_PPC_PLTREL24)
6446 stub_rtype = R_PPC_RELAX_PLTREL24;
6447 }
6448
6449 /* Hijack the old relocation. Since we need two
6450 relocations for this use a "composite" reloc. */
6451 irel->r_info = ELF32_R_INFO (ELF32_R_SYM (irel->r_info),
6452 stub_rtype);
6453 irel->r_offset = trampoff + insn_offset;
6454 if (r_type == R_PPC_PLTREL24
6455 && stub_rtype != R_PPC_RELAX_PLTREL24)
6456 irel->r_addend = 0;
6457
6458 /* Record the fixup so we don't do it again this section. */
6459 f = bfd_malloc (sizeof (*f));
6460 f->next = branch_fixups;
6461 f->tsec = tsec;
6462 f->toff = toff;
6463 f->trampoff = trampoff;
6464 branch_fixups = f;
6465
6466 trampoff += size;
6467 changes++;
6468 }
6469 else
6470 {
6471 val = f->trampoff - roff;
6472 if (val >= max_branch_offset)
6473 continue;
6474
6475 /* Nop out the reloc, since we're finalizing things here. */
6476 irel->r_info = ELF32_R_INFO (0, R_PPC_NONE);
6477 }
6478
6479 /* Get the section contents. */
6480 if (contents == NULL)
6481 {
6482 /* Get cached copy if it exists. */
6483 if (elf_section_data (isec)->this_hdr.contents != NULL)
6484 contents = elf_section_data (isec)->this_hdr.contents;
6485 /* Go get them off disk. */
6486 else if (!bfd_malloc_and_get_section (abfd, isec, &contents))
6487 goto error_return;
6488 }
6489
6490 /* Fix up the existing branch to hit the trampoline. */
6491 hit_addr = contents + roff;
6492 switch (r_type)
6493 {
6494 case R_PPC_REL24:
6495 case R_PPC_LOCAL24PC:
6496 case R_PPC_PLTREL24:
6497 t0 = bfd_get_32 (abfd, hit_addr);
6498 t0 &= ~0x3fffffc;
6499 t0 |= val & 0x3fffffc;
6500 bfd_put_32 (abfd, t0, hit_addr);
6501 break;
6502
6503 case R_PPC_REL14:
6504 case R_PPC_REL14_BRTAKEN:
6505 case R_PPC_REL14_BRNTAKEN:
6506 t0 = bfd_get_32 (abfd, hit_addr);
6507 t0 &= ~0xfffc;
6508 t0 |= val & 0xfffc;
6509 bfd_put_32 (abfd, t0, hit_addr);
6510 break;
6511 }
6512 }
6513
6514 while (branch_fixups != NULL)
6515 {
6516 struct one_branch_fixup *f = branch_fixups;
6517 branch_fixups = branch_fixups->next;
6518 free (f);
6519 }
6520 }
6521
6522 workaround_change = FALSE;
6523 newsize = trampoff;
6524 if (htab->params->ppc476_workaround
6525 && (!bfd_link_relocatable (link_info)
6526 || isec->output_section->alignment_power >= htab->params->pagesize_p2))
6527 {
6528 bfd_vma addr, end_addr;
6529 unsigned int crossings;
6530 bfd_vma pagesize = (bfd_vma) 1 << htab->params->pagesize_p2;
6531
6532 addr = isec->output_section->vma + isec->output_offset;
6533 end_addr = addr + trampoff;
6534 addr &= -pagesize;
6535 crossings = ((end_addr & -pagesize) - addr) >> htab->params->pagesize_p2;
6536 if (crossings != 0)
6537 {
6538 /* Keep space aligned, to ensure the patch code itself does
6539 not cross a page. Don't decrease size calculated on a
6540 previous pass as otherwise we might never settle on a layout. */
6541 newsize = 15 - ((end_addr - 1) & 15);
6542 newsize += crossings * 16;
6543 if (relax_info->workaround_size < newsize)
6544 {
6545 relax_info->workaround_size = newsize;
6546 workaround_change = TRUE;
6547 }
6548 /* Ensure relocate_section is called. */
6549 isec->flags |= SEC_RELOC;
6550 }
6551 newsize = trampoff + relax_info->workaround_size;
6552 }
6553
6554 if (htab->params->pic_fixup > 0)
6555 {
6556 picfixup_size -= relax_info->picfixup_size;
6557 if (picfixup_size != 0)
6558 relax_info->picfixup_size += picfixup_size;
6559 newsize += relax_info->picfixup_size;
6560 }
6561
6562 if (changes != 0 || picfixup_size != 0 || workaround_change)
6563 isec->size = newsize;
6564
6565 if (isymbuf != NULL
6566 && symtab_hdr->contents != (unsigned char *) isymbuf)
6567 {
6568 if (! link_info->keep_memory)
6569 free (isymbuf);
6570 else
6571 {
6572 /* Cache the symbols for elf_link_input_bfd. */
6573 symtab_hdr->contents = (unsigned char *) isymbuf;
6574 }
6575 }
6576
6577 if (contents != NULL
6578 && elf_section_data (isec)->this_hdr.contents != contents)
6579 {
6580 if (!changes && !link_info->keep_memory)
6581 free (contents);
6582 else
6583 {
6584 /* Cache the section contents for elf_link_input_bfd. */
6585 elf_section_data (isec)->this_hdr.contents = contents;
6586 }
6587 }
6588
6589 changes += picfixup_size;
6590 if (changes != 0)
6591 {
6592 /* Append sufficient NOP relocs so we can write out relocation
6593 information for the trampolines. */
6594 Elf_Internal_Shdr *rel_hdr;
6595 Elf_Internal_Rela *new_relocs = bfd_malloc ((changes + isec->reloc_count)
6596 * sizeof (*new_relocs));
6597 unsigned ix;
6598
6599 if (!new_relocs)
6600 goto error_return;
6601 memcpy (new_relocs, internal_relocs,
6602 isec->reloc_count * sizeof (*new_relocs));
6603 for (ix = changes; ix--;)
6604 {
6605 irel = new_relocs + ix + isec->reloc_count;
6606
6607 irel->r_info = ELF32_R_INFO (0, R_PPC_NONE);
6608 }
6609 if (internal_relocs != elf_section_data (isec)->relocs)
6610 free (internal_relocs);
6611 elf_section_data (isec)->relocs = new_relocs;
6612 isec->reloc_count += changes;
6613 rel_hdr = _bfd_elf_single_rel_hdr (isec);
6614 rel_hdr->sh_size += changes * rel_hdr->sh_entsize;
6615 }
6616 else if (elf_section_data (isec)->relocs != internal_relocs)
6617 free (internal_relocs);
6618
6619 *again = changes != 0 || workaround_change;
6620 return TRUE;
6621
6622 error_return:
6623 while (branch_fixups != NULL)
6624 {
6625 struct one_branch_fixup *f = branch_fixups;
6626 branch_fixups = branch_fixups->next;
6627 free (f);
6628 }
6629 if ((unsigned char *) isymbuf != symtab_hdr->contents)
6630 free (isymbuf);
6631 if (elf_section_data (isec)->this_hdr.contents != contents)
6632 free (contents);
6633 if (elf_section_data (isec)->relocs != internal_relocs)
6634 free (internal_relocs);
6635 return FALSE;
6636 }
6637 \f
6638 /* What to do when ld finds relocations against symbols defined in
6639 discarded sections. */
6640
6641 static unsigned int
6642 ppc_elf_action_discarded (asection *sec)
6643 {
6644 if (strcmp (".fixup", sec->name) == 0)
6645 return 0;
6646
6647 if (strcmp (".got2", sec->name) == 0)
6648 return 0;
6649
6650 return _bfd_elf_default_action_discarded (sec);
6651 }
6652 \f
6653 /* Fill in the address for a pointer generated in a linker section. */
6654
6655 static bfd_vma
6656 elf_finish_pointer_linker_section (bfd *input_bfd,
6657 elf_linker_section_t *lsect,
6658 struct elf_link_hash_entry *h,
6659 bfd_vma relocation,
6660 const Elf_Internal_Rela *rel)
6661 {
6662 elf_linker_section_pointers_t *linker_section_ptr;
6663
6664 BFD_ASSERT (lsect != NULL);
6665
6666 if (h != NULL)
6667 {
6668 /* Handle global symbol. */
6669 struct ppc_elf_link_hash_entry *eh;
6670
6671 eh = (struct ppc_elf_link_hash_entry *) h;
6672 BFD_ASSERT (eh->elf.def_regular);
6673 linker_section_ptr = eh->linker_section_pointer;
6674 }
6675 else
6676 {
6677 /* Handle local symbol. */
6678 unsigned long r_symndx = ELF32_R_SYM (rel->r_info);
6679
6680 BFD_ASSERT (is_ppc_elf (input_bfd));
6681 BFD_ASSERT (elf_local_ptr_offsets (input_bfd) != NULL);
6682 linker_section_ptr = elf_local_ptr_offsets (input_bfd)[r_symndx];
6683 }
6684
6685 linker_section_ptr = elf_find_pointer_linker_section (linker_section_ptr,
6686 rel->r_addend,
6687 lsect);
6688 BFD_ASSERT (linker_section_ptr != NULL);
6689
6690 /* Offset will always be a multiple of four, so use the bottom bit
6691 as a "written" flag. */
6692 if ((linker_section_ptr->offset & 1) == 0)
6693 {
6694 bfd_put_32 (lsect->section->owner,
6695 relocation + linker_section_ptr->addend,
6696 lsect->section->contents + linker_section_ptr->offset);
6697 linker_section_ptr->offset += 1;
6698 }
6699
6700 relocation = (lsect->section->output_section->vma
6701 + lsect->section->output_offset
6702 + linker_section_ptr->offset - 1
6703 - SYM_VAL (lsect->sym));
6704
6705 #ifdef DEBUG
6706 fprintf (stderr,
6707 "Finish pointer in linker section %s, offset = %ld (0x%lx)\n",
6708 lsect->name, (long) relocation, (long) relocation);
6709 #endif
6710
6711 return relocation;
6712 }
6713
6714 #define PPC_LO(v) ((v) & 0xffff)
6715 #define PPC_HI(v) (((v) >> 16) & 0xffff)
6716 #define PPC_HA(v) PPC_HI ((v) + 0x8000)
6717
6718 static void
6719 write_glink_stub (struct elf_link_hash_entry *h, struct plt_entry *ent,
6720 asection *plt_sec, unsigned char *p,
6721 struct bfd_link_info *info)
6722 {
6723 struct ppc_elf_link_hash_table *htab = ppc_elf_hash_table (info);
6724 bfd *output_bfd = info->output_bfd;
6725 bfd_vma plt;
6726 unsigned char *end = p + GLINK_ENTRY_SIZE (htab, h);
6727
6728 if (h != NULL
6729 && h == htab->tls_get_addr
6730 && !htab->params->no_tls_get_addr_opt)
6731 {
6732 bfd_put_32 (output_bfd, LWZ_11_3, p);
6733 p += 4;
6734 bfd_put_32 (output_bfd, LWZ_12_3 + 4, p);
6735 p += 4;
6736 bfd_put_32 (output_bfd, MR_0_3, p);
6737 p += 4;
6738 bfd_put_32 (output_bfd, CMPWI_11_0, p);
6739 p += 4;
6740 bfd_put_32 (output_bfd, ADD_3_12_2, p);
6741 p += 4;
6742 bfd_put_32 (output_bfd, BEQLR, p);
6743 p += 4;
6744 bfd_put_32 (output_bfd, MR_3_0, p);
6745 p += 4;
6746 bfd_put_32 (output_bfd, NOP, p);
6747 p += 4;
6748 }
6749
6750 plt = ((ent->plt.offset & ~1)
6751 + plt_sec->output_section->vma
6752 + plt_sec->output_offset);
6753
6754 if (bfd_link_pic (info))
6755 {
6756 bfd_vma got = 0;
6757
6758 if (ent->addend >= 32768)
6759 got = (ent->addend
6760 + ent->sec->output_section->vma
6761 + ent->sec->output_offset);
6762 else if (htab->elf.hgot != NULL)
6763 got = SYM_VAL (htab->elf.hgot);
6764
6765 plt -= got;
6766
6767 if (plt + 0x8000 < 0x10000)
6768 bfd_put_32 (output_bfd, LWZ_11_30 + PPC_LO (plt), p);
6769 else
6770 {
6771 bfd_put_32 (output_bfd, ADDIS_11_30 + PPC_HA (plt), p);
6772 p += 4;
6773 bfd_put_32 (output_bfd, LWZ_11_11 + PPC_LO (plt), p);
6774 }
6775 }
6776 else
6777 {
6778 bfd_put_32 (output_bfd, LIS_11 + PPC_HA (plt), p);
6779 p += 4;
6780 bfd_put_32 (output_bfd, LWZ_11_11 + PPC_LO (plt), p);
6781 }
6782 p += 4;
6783 bfd_put_32 (output_bfd, MTCTR_11, p);
6784 p += 4;
6785 bfd_put_32 (output_bfd, BCTR, p);
6786 p += 4;
6787 while (p < end)
6788 {
6789 bfd_put_32 (output_bfd, htab->params->ppc476_workaround ? BA : NOP, p);
6790 p += 4;
6791 }
6792 }
6793
6794 /* Return true if symbol is defined statically. */
6795
6796 static bfd_boolean
6797 is_static_defined (struct elf_link_hash_entry *h)
6798 {
6799 return ((h->root.type == bfd_link_hash_defined
6800 || h->root.type == bfd_link_hash_defweak)
6801 && h->root.u.def.section != NULL
6802 && h->root.u.def.section->output_section != NULL);
6803 }
6804
6805 /* If INSN is an opcode that may be used with an @tls operand, return
6806 the transformed insn for TLS optimisation, otherwise return 0. If
6807 REG is non-zero only match an insn with RB or RA equal to REG. */
6808
6809 unsigned int
6810 _bfd_elf_ppc_at_tls_transform (unsigned int insn, unsigned int reg)
6811 {
6812 unsigned int rtra;
6813
6814 if ((insn & (0x3fu << 26)) != 31 << 26)
6815 return 0;
6816
6817 if (reg == 0 || ((insn >> 11) & 0x1f) == reg)
6818 rtra = insn & ((1 << 26) - (1 << 16));
6819 else if (((insn >> 16) & 0x1f) == reg)
6820 rtra = (insn & (0x1f << 21)) | ((insn & (0x1f << 11)) << 5);
6821 else
6822 return 0;
6823
6824 if ((insn & (0x3ff << 1)) == 266 << 1)
6825 /* add -> addi. */
6826 insn = 14 << 26;
6827 else if ((insn & (0x1f << 1)) == 23 << 1
6828 && ((insn & (0x1f << 6)) < 14 << 6
6829 || ((insn & (0x1f << 6)) >= 16 << 6
6830 && (insn & (0x1f << 6)) < 24 << 6)))
6831 /* load and store indexed -> dform. */
6832 insn = (32u | ((insn >> 6) & 0x1f)) << 26;
6833 else if ((insn & (((0x1a << 5) | 0x1f) << 1)) == 21 << 1)
6834 /* ldx, ldux, stdx, stdux -> ld, ldu, std, stdu. */
6835 insn = ((58u | ((insn >> 6) & 4)) << 26) | ((insn >> 6) & 1);
6836 else if ((insn & (((0x1f << 5) | 0x1f) << 1)) == 341 << 1)
6837 /* lwax -> lwa. */
6838 insn = (58u << 26) | 2;
6839 else
6840 return 0;
6841 insn |= rtra;
6842 return insn;
6843 }
6844
6845 /* If INSN is an opcode that may be used with an @tprel operand, return
6846 the transformed insn for an undefined weak symbol, ie. with the
6847 thread pointer REG operand removed. Otherwise return 0. */
6848
6849 unsigned int
6850 _bfd_elf_ppc_at_tprel_transform (unsigned int insn, unsigned int reg)
6851 {
6852 if ((insn & (0x1f << 16)) == reg << 16
6853 && ((insn & (0x3fu << 26)) == 14u << 26 /* addi */
6854 || (insn & (0x3fu << 26)) == 15u << 26 /* addis */
6855 || (insn & (0x3fu << 26)) == 32u << 26 /* lwz */
6856 || (insn & (0x3fu << 26)) == 34u << 26 /* lbz */
6857 || (insn & (0x3fu << 26)) == 36u << 26 /* stw */
6858 || (insn & (0x3fu << 26)) == 38u << 26 /* stb */
6859 || (insn & (0x3fu << 26)) == 40u << 26 /* lhz */
6860 || (insn & (0x3fu << 26)) == 42u << 26 /* lha */
6861 || (insn & (0x3fu << 26)) == 44u << 26 /* sth */
6862 || (insn & (0x3fu << 26)) == 46u << 26 /* lmw */
6863 || (insn & (0x3fu << 26)) == 47u << 26 /* stmw */
6864 || (insn & (0x3fu << 26)) == 48u << 26 /* lfs */
6865 || (insn & (0x3fu << 26)) == 50u << 26 /* lfd */
6866 || (insn & (0x3fu << 26)) == 52u << 26 /* stfs */
6867 || (insn & (0x3fu << 26)) == 54u << 26 /* stfd */
6868 || ((insn & (0x3fu << 26)) == 58u << 26 /* lwa,ld,lmd */
6869 && (insn & 3) != 1)
6870 || ((insn & (0x3fu << 26)) == 62u << 26 /* std, stmd */
6871 && ((insn & 3) == 0 || (insn & 3) == 3))))
6872 {
6873 insn &= ~(0x1f << 16);
6874 }
6875 else if ((insn & (0x1f << 21)) == reg << 21
6876 && ((insn & (0x3eu << 26)) == 24u << 26 /* ori, oris */
6877 || (insn & (0x3eu << 26)) == 26u << 26 /* xori,xoris */
6878 || (insn & (0x3eu << 26)) == 28u << 26 /* andi,andis */))
6879 {
6880 insn &= ~(0x1f << 21);
6881 insn |= (insn & (0x1f << 16)) << 5;
6882 if ((insn & (0x3eu << 26)) == 26u << 26 /* xori,xoris */)
6883 insn -= 2 >> 26; /* convert to ori,oris */
6884 }
6885 else
6886 insn = 0;
6887 return insn;
6888 }
6889
6890 static bfd_boolean
6891 is_insn_ds_form (unsigned int insn)
6892 {
6893 return ((insn & (0x3fu << 26)) == 58u << 26 /* ld,ldu,lwa */
6894 || (insn & (0x3fu << 26)) == 62u << 26 /* std,stdu,stq */
6895 || (insn & (0x3fu << 26)) == 57u << 26 /* lfdp */
6896 || (insn & (0x3fu << 26)) == 61u << 26 /* stfdp */);
6897 }
6898
6899 static bfd_boolean
6900 is_insn_dq_form (unsigned int insn)
6901 {
6902 return ((insn & (0x3fu << 26)) == 56u << 26 /* lq */
6903 || ((insn & (0x3fu << 26)) == (61u << 26) /* lxv, stxv */
6904 && (insn & 3) == 1));
6905 }
6906
6907 /* The RELOCATE_SECTION function is called by the ELF backend linker
6908 to handle the relocations for a section.
6909
6910 The relocs are always passed as Rela structures; if the section
6911 actually uses Rel structures, the r_addend field will always be
6912 zero.
6913
6914 This function is responsible for adjust the section contents as
6915 necessary, and (if using Rela relocs and generating a
6916 relocatable output file) adjusting the reloc addend as
6917 necessary.
6918
6919 This function does not have to worry about setting the reloc
6920 address or the reloc symbol index.
6921
6922 LOCAL_SYMS is a pointer to the swapped in local symbols.
6923
6924 LOCAL_SECTIONS is an array giving the section in the input file
6925 corresponding to the st_shndx field of each local symbol.
6926
6927 The global hash table entry for the global symbols can be found
6928 via elf_sym_hashes (input_bfd).
6929
6930 When generating relocatable output, this function must handle
6931 STB_LOCAL/STT_SECTION symbols specially. The output symbol is
6932 going to be the section symbol corresponding to the output
6933 section, which means that the addend must be adjusted
6934 accordingly. */
6935
6936 static bfd_boolean
6937 ppc_elf_relocate_section (bfd *output_bfd,
6938 struct bfd_link_info *info,
6939 bfd *input_bfd,
6940 asection *input_section,
6941 bfd_byte *contents,
6942 Elf_Internal_Rela *relocs,
6943 Elf_Internal_Sym *local_syms,
6944 asection **local_sections)
6945 {
6946 Elf_Internal_Shdr *symtab_hdr;
6947 struct elf_link_hash_entry **sym_hashes;
6948 struct ppc_elf_link_hash_table *htab;
6949 Elf_Internal_Rela *rel;
6950 Elf_Internal_Rela *wrel;
6951 Elf_Internal_Rela *relend;
6952 Elf_Internal_Rela outrel;
6953 asection *got2;
6954 bfd_vma *local_got_offsets;
6955 bfd_boolean ret = TRUE;
6956 bfd_vma d_offset = (bfd_big_endian (input_bfd) ? 2 : 0);
6957 bfd_boolean is_vxworks_tls;
6958 unsigned int picfixup_size = 0;
6959 struct ppc_elf_relax_info *relax_info = NULL;
6960
6961 #ifdef DEBUG
6962 _bfd_error_handler ("ppc_elf_relocate_section called for %pB section %pA, "
6963 "%ld relocations%s",
6964 input_bfd, input_section,
6965 (long) input_section->reloc_count,
6966 (bfd_link_relocatable (info)) ? " (relocatable)" : "");
6967 #endif
6968
6969 if (!is_ppc_elf (input_bfd))
6970 {
6971 bfd_set_error (bfd_error_wrong_format);
6972 return FALSE;
6973 }
6974
6975 got2 = bfd_get_section_by_name (input_bfd, ".got2");
6976
6977 /* Initialize howto table if not already done. */
6978 if (!ppc_elf_howto_table[R_PPC_ADDR32])
6979 ppc_elf_howto_init ();
6980
6981 htab = ppc_elf_hash_table (info);
6982 local_got_offsets = elf_local_got_offsets (input_bfd);
6983 symtab_hdr = &elf_symtab_hdr (input_bfd);
6984 sym_hashes = elf_sym_hashes (input_bfd);
6985 /* We have to handle relocations in vxworks .tls_vars sections
6986 specially, because the dynamic loader is 'weird'. */
6987 is_vxworks_tls = (htab->elf.target_os == is_vxworks && bfd_link_pic (info)
6988 && !strcmp (input_section->output_section->name,
6989 ".tls_vars"));
6990 if (input_section->sec_info_type == SEC_INFO_TYPE_TARGET)
6991 relax_info = elf_section_data (input_section)->sec_info;
6992 rel = wrel = relocs;
6993 relend = relocs + input_section->reloc_count;
6994 for (; rel < relend; wrel++, rel++)
6995 {
6996 enum elf_ppc_reloc_type r_type;
6997 bfd_vma addend;
6998 bfd_reloc_status_type r;
6999 Elf_Internal_Sym *sym;
7000 asection *sec;
7001 struct elf_link_hash_entry *h;
7002 const char *sym_name;
7003 reloc_howto_type *howto;
7004 unsigned long r_symndx;
7005 bfd_vma relocation;
7006 bfd_vma branch_bit, from;
7007 bfd_boolean unresolved_reloc, save_unresolved_reloc;
7008 bfd_boolean warned;
7009 unsigned int tls_type, tls_mask, tls_gd;
7010 struct plt_entry **ifunc, **plt_list;
7011 struct reloc_howto_struct alt_howto;
7012
7013 again:
7014 r_type = ELF32_R_TYPE (rel->r_info);
7015 sym = NULL;
7016 sec = NULL;
7017 h = NULL;
7018 unresolved_reloc = FALSE;
7019 warned = FALSE;
7020 r_symndx = ELF32_R_SYM (rel->r_info);
7021
7022 if (r_symndx < symtab_hdr->sh_info)
7023 {
7024 sym = local_syms + r_symndx;
7025 sec = local_sections[r_symndx];
7026 sym_name = bfd_elf_sym_name (input_bfd, symtab_hdr, sym, sec);
7027
7028 relocation = _bfd_elf_rela_local_sym (output_bfd, sym, &sec, rel);
7029 }
7030 else
7031 {
7032 bfd_boolean ignored;
7033
7034 RELOC_FOR_GLOBAL_SYMBOL (info, input_bfd, input_section, rel,
7035 r_symndx, symtab_hdr, sym_hashes,
7036 h, sec, relocation,
7037 unresolved_reloc, warned, ignored);
7038
7039 sym_name = h->root.root.string;
7040 }
7041
7042 if (sec != NULL && discarded_section (sec))
7043 {
7044 /* For relocs against symbols from removed linkonce sections,
7045 or sections discarded by a linker script, we just want the
7046 section contents zeroed. Avoid any special processing. */
7047 howto = NULL;
7048 if (r_type < R_PPC_max)
7049 howto = ppc_elf_howto_table[r_type];
7050
7051 _bfd_clear_contents (howto, input_bfd, input_section,
7052 contents, rel->r_offset);
7053 wrel->r_offset = rel->r_offset;
7054 wrel->r_info = 0;
7055 wrel->r_addend = 0;
7056
7057 /* For ld -r, remove relocations in debug sections against
7058 symbols defined in discarded sections. Not done for
7059 non-debug to preserve relocs in .eh_frame which the
7060 eh_frame editing code expects to be present. */
7061 if (bfd_link_relocatable (info)
7062 && (input_section->flags & SEC_DEBUGGING))
7063 wrel--;
7064
7065 continue;
7066 }
7067
7068 if (bfd_link_relocatable (info))
7069 {
7070 if (got2 != NULL
7071 && r_type == R_PPC_PLTREL24
7072 && rel->r_addend != 0)
7073 {
7074 /* R_PPC_PLTREL24 is rather special. If non-zero, the
7075 addend specifies the GOT pointer offset within .got2. */
7076 rel->r_addend += got2->output_offset;
7077 }
7078 if (r_type != R_PPC_RELAX_PLT
7079 && r_type != R_PPC_RELAX_PLTREL24
7080 && r_type != R_PPC_RELAX)
7081 goto copy_reloc;
7082 }
7083
7084 /* TLS optimizations. Replace instruction sequences and relocs
7085 based on information we collected in tls_optimize. We edit
7086 RELOCS so that --emit-relocs will output something sensible
7087 for the final instruction stream. */
7088 tls_mask = 0;
7089 tls_gd = 0;
7090 if (h != NULL)
7091 tls_mask = ((struct ppc_elf_link_hash_entry *) h)->tls_mask;
7092 else if (local_got_offsets != NULL)
7093 {
7094 struct plt_entry **local_plt;
7095 char *lgot_masks;
7096 local_plt
7097 = (struct plt_entry **) (local_got_offsets + symtab_hdr->sh_info);
7098 lgot_masks = (char *) (local_plt + symtab_hdr->sh_info);
7099 tls_mask = lgot_masks[r_symndx];
7100 }
7101
7102 /* Ensure reloc mapping code below stays sane. */
7103 if ((R_PPC_GOT_TLSLD16 & 3) != (R_PPC_GOT_TLSGD16 & 3)
7104 || (R_PPC_GOT_TLSLD16_LO & 3) != (R_PPC_GOT_TLSGD16_LO & 3)
7105 || (R_PPC_GOT_TLSLD16_HI & 3) != (R_PPC_GOT_TLSGD16_HI & 3)
7106 || (R_PPC_GOT_TLSLD16_HA & 3) != (R_PPC_GOT_TLSGD16_HA & 3)
7107 || (R_PPC_GOT_TLSLD16 & 3) != (R_PPC_GOT_TPREL16 & 3)
7108 || (R_PPC_GOT_TLSLD16_LO & 3) != (R_PPC_GOT_TPREL16_LO & 3)
7109 || (R_PPC_GOT_TLSLD16_HI & 3) != (R_PPC_GOT_TPREL16_HI & 3)
7110 || (R_PPC_GOT_TLSLD16_HA & 3) != (R_PPC_GOT_TPREL16_HA & 3))
7111 abort ();
7112 switch (r_type)
7113 {
7114 default:
7115 break;
7116
7117 case R_PPC_GOT_TPREL16:
7118 case R_PPC_GOT_TPREL16_LO:
7119 if ((tls_mask & TLS_TLS) != 0
7120 && (tls_mask & TLS_TPREL) == 0)
7121 {
7122 bfd_vma insn;
7123
7124 insn = bfd_get_32 (input_bfd,
7125 contents + rel->r_offset - d_offset);
7126 insn &= 31 << 21;
7127 insn |= 0x3c020000; /* addis 0,2,0 */
7128 bfd_put_32 (input_bfd, insn,
7129 contents + rel->r_offset - d_offset);
7130 r_type = R_PPC_TPREL16_HA;
7131 rel->r_info = ELF32_R_INFO (r_symndx, r_type);
7132 }
7133 break;
7134
7135 case R_PPC_TLS:
7136 if ((tls_mask & TLS_TLS) != 0
7137 && (tls_mask & TLS_TPREL) == 0)
7138 {
7139 bfd_vma insn;
7140
7141 insn = bfd_get_32 (input_bfd, contents + rel->r_offset);
7142 insn = _bfd_elf_ppc_at_tls_transform (insn, 2);
7143 if (insn == 0)
7144 abort ();
7145 bfd_put_32 (input_bfd, insn, contents + rel->r_offset);
7146 r_type = R_PPC_TPREL16_LO;
7147 rel->r_info = ELF32_R_INFO (r_symndx, r_type);
7148
7149 /* Was PPC_TLS which sits on insn boundary, now
7150 PPC_TPREL16_LO which is at low-order half-word. */
7151 rel->r_offset += d_offset;
7152 }
7153 break;
7154
7155 case R_PPC_GOT_TLSGD16_HI:
7156 case R_PPC_GOT_TLSGD16_HA:
7157 tls_gd = TLS_GDIE;
7158 if ((tls_mask & TLS_TLS) != 0 && (tls_mask & TLS_GD) == 0)
7159 goto tls_gdld_hi;
7160 break;
7161
7162 case R_PPC_GOT_TLSLD16_HI:
7163 case R_PPC_GOT_TLSLD16_HA:
7164 if ((tls_mask & TLS_TLS) != 0 && (tls_mask & TLS_LD) == 0)
7165 {
7166 tls_gdld_hi:
7167 if ((tls_mask & tls_gd) != 0)
7168 r_type = (((r_type - (R_PPC_GOT_TLSGD16 & 3)) & 3)
7169 + R_PPC_GOT_TPREL16);
7170 else
7171 {
7172 rel->r_offset -= d_offset;
7173 bfd_put_32 (input_bfd, NOP, contents + rel->r_offset);
7174 r_type = R_PPC_NONE;
7175 }
7176 rel->r_info = ELF32_R_INFO (r_symndx, r_type);
7177 }
7178 break;
7179
7180 case R_PPC_GOT_TLSGD16:
7181 case R_PPC_GOT_TLSGD16_LO:
7182 tls_gd = TLS_GDIE;
7183 if ((tls_mask & TLS_TLS) != 0 && (tls_mask & TLS_GD) == 0)
7184 goto tls_ldgd_opt;
7185 break;
7186
7187 case R_PPC_GOT_TLSLD16:
7188 case R_PPC_GOT_TLSLD16_LO:
7189 if ((tls_mask & TLS_TLS) != 0 && (tls_mask & TLS_LD) == 0)
7190 {
7191 unsigned int insn1, insn2;
7192 bfd_vma offset;
7193
7194 tls_ldgd_opt:
7195 offset = (bfd_vma) -1;
7196 /* If not using the newer R_PPC_TLSGD/LD to mark
7197 __tls_get_addr calls, we must trust that the call
7198 stays with its arg setup insns, ie. that the next
7199 reloc is the __tls_get_addr call associated with
7200 the current reloc. Edit both insns. */
7201 if (input_section->nomark_tls_get_addr
7202 && rel + 1 < relend
7203 && branch_reloc_hash_match (input_bfd, rel + 1,
7204 htab->tls_get_addr))
7205 offset = rel[1].r_offset;
7206 /* We read the low GOT_TLS insn because we need to keep
7207 the destination reg. It may be something other than
7208 the usual r3, and moved to r3 before the call by
7209 intervening code. */
7210 insn1 = bfd_get_32 (input_bfd,
7211 contents + rel->r_offset - d_offset);
7212 if ((tls_mask & tls_gd) != 0)
7213 {
7214 /* IE */
7215 insn1 &= (0x1f << 21) | (0x1f << 16);
7216 insn1 |= 32u << 26; /* lwz */
7217 if (offset != (bfd_vma) -1)
7218 {
7219 rel[1].r_info = ELF32_R_INFO (STN_UNDEF, R_PPC_NONE);
7220 insn2 = 0x7c631214; /* add 3,3,2 */
7221 bfd_put_32 (input_bfd, insn2, contents + offset);
7222 }
7223 r_type = (((r_type - (R_PPC_GOT_TLSGD16 & 3)) & 3)
7224 + R_PPC_GOT_TPREL16);
7225 rel->r_info = ELF32_R_INFO (r_symndx, r_type);
7226 }
7227 else
7228 {
7229 /* LE */
7230 insn1 &= 0x1f << 21;
7231 insn1 |= 0x3c020000; /* addis r,2,0 */
7232 if (tls_gd == 0)
7233 {
7234 /* Was an LD reloc. */
7235 for (r_symndx = 0;
7236 r_symndx < symtab_hdr->sh_info;
7237 r_symndx++)
7238 if (local_sections[r_symndx] == sec)
7239 break;
7240 if (r_symndx >= symtab_hdr->sh_info)
7241 r_symndx = STN_UNDEF;
7242 rel->r_addend = htab->elf.tls_sec->vma + DTP_OFFSET;
7243 if (r_symndx != STN_UNDEF)
7244 rel->r_addend -= (local_syms[r_symndx].st_value
7245 + sec->output_offset
7246 + sec->output_section->vma);
7247 }
7248 r_type = R_PPC_TPREL16_HA;
7249 rel->r_info = ELF32_R_INFO (r_symndx, r_type);
7250 if (offset != (bfd_vma) -1)
7251 {
7252 rel[1].r_info = ELF32_R_INFO (r_symndx, R_PPC_TPREL16_LO);
7253 rel[1].r_offset = offset + d_offset;
7254 rel[1].r_addend = rel->r_addend;
7255 insn2 = 0x38630000; /* addi 3,3,0 */
7256 bfd_put_32 (input_bfd, insn2, contents + offset);
7257 }
7258 }
7259 bfd_put_32 (input_bfd, insn1,
7260 contents + rel->r_offset - d_offset);
7261 if (tls_gd == 0)
7262 {
7263 /* We changed the symbol on an LD reloc. Start over
7264 in order to get h, sym, sec etc. right. */
7265 goto again;
7266 }
7267 }
7268 break;
7269
7270 case R_PPC_TLSGD:
7271 if ((tls_mask & TLS_TLS) != 0 && (tls_mask & TLS_GD) == 0
7272 && rel + 1 < relend)
7273 {
7274 unsigned int insn2;
7275 bfd_vma offset = rel->r_offset;
7276
7277 if (is_plt_seq_reloc (ELF32_R_TYPE (rel[1].r_info)))
7278 {
7279 bfd_put_32 (input_bfd, NOP, contents + offset);
7280 rel[1].r_info = ELF32_R_INFO (STN_UNDEF, R_PPC_NONE);
7281 break;
7282 }
7283
7284 if ((tls_mask & TLS_GDIE) != 0)
7285 {
7286 /* IE */
7287 r_type = R_PPC_NONE;
7288 insn2 = 0x7c631214; /* add 3,3,2 */
7289 }
7290 else
7291 {
7292 /* LE */
7293 r_type = R_PPC_TPREL16_LO;
7294 rel->r_offset += d_offset;
7295 insn2 = 0x38630000; /* addi 3,3,0 */
7296 }
7297 rel->r_info = ELF32_R_INFO (r_symndx, r_type);
7298 bfd_put_32 (input_bfd, insn2, contents + offset);
7299 /* Zap the reloc on the _tls_get_addr call too. */
7300 BFD_ASSERT (offset == rel[1].r_offset);
7301 rel[1].r_info = ELF32_R_INFO (STN_UNDEF, R_PPC_NONE);
7302 }
7303 break;
7304
7305 case R_PPC_TLSLD:
7306 if ((tls_mask & TLS_TLS) != 0 && (tls_mask & TLS_LD) == 0
7307 && rel + 1 < relend)
7308 {
7309 unsigned int insn2;
7310
7311 if (is_plt_seq_reloc (ELF32_R_TYPE (rel[1].r_info)))
7312 {
7313 bfd_put_32 (input_bfd, NOP, contents + rel->r_offset);
7314 rel[1].r_info = ELF32_R_INFO (STN_UNDEF, R_PPC_NONE);
7315 break;
7316 }
7317
7318 for (r_symndx = 0;
7319 r_symndx < symtab_hdr->sh_info;
7320 r_symndx++)
7321 if (local_sections[r_symndx] == sec)
7322 break;
7323 if (r_symndx >= symtab_hdr->sh_info)
7324 r_symndx = STN_UNDEF;
7325 rel->r_addend = htab->elf.tls_sec->vma + DTP_OFFSET;
7326 if (r_symndx != STN_UNDEF)
7327 rel->r_addend -= (local_syms[r_symndx].st_value
7328 + sec->output_offset
7329 + sec->output_section->vma);
7330
7331 rel->r_info = ELF32_R_INFO (r_symndx, R_PPC_TPREL16_LO);
7332 rel->r_offset += d_offset;
7333 insn2 = 0x38630000; /* addi 3,3,0 */
7334 bfd_put_32 (input_bfd, insn2,
7335 contents + rel->r_offset - d_offset);
7336 /* Zap the reloc on the _tls_get_addr call too. */
7337 BFD_ASSERT (rel->r_offset - d_offset == rel[1].r_offset);
7338 rel[1].r_info = ELF32_R_INFO (STN_UNDEF, R_PPC_NONE);
7339 goto again;
7340 }
7341 break;
7342 }
7343
7344 /* Handle other relocations that tweak non-addend part of insn. */
7345 branch_bit = 0;
7346 switch (r_type)
7347 {
7348 default:
7349 break;
7350
7351 /* Branch taken prediction relocations. */
7352 case R_PPC_ADDR14_BRTAKEN:
7353 case R_PPC_REL14_BRTAKEN:
7354 branch_bit = BRANCH_PREDICT_BIT;
7355 /* Fall through. */
7356
7357 /* Branch not taken prediction relocations. */
7358 case R_PPC_ADDR14_BRNTAKEN:
7359 case R_PPC_REL14_BRNTAKEN:
7360 {
7361 unsigned int insn;
7362
7363 insn = bfd_get_32 (input_bfd, contents + rel->r_offset);
7364 insn &= ~BRANCH_PREDICT_BIT;
7365 insn |= branch_bit;
7366
7367 from = (rel->r_offset
7368 + input_section->output_offset
7369 + input_section->output_section->vma);
7370
7371 /* Invert 'y' bit if not the default. */
7372 if ((bfd_signed_vma) (relocation + rel->r_addend - from) < 0)
7373 insn ^= BRANCH_PREDICT_BIT;
7374
7375 bfd_put_32 (input_bfd, insn, contents + rel->r_offset);
7376 }
7377 break;
7378
7379 case R_PPC_PLT16_HA:
7380 {
7381 unsigned int insn;
7382
7383 insn = bfd_get_32 (input_bfd,
7384 contents + rel->r_offset - d_offset);
7385 if ((insn & (0x3fu << 26)) == 15u << 26
7386 && (insn & (0x1f << 16)) != 0)
7387 {
7388 if (!bfd_link_pic (info))
7389 {
7390 /* Convert addis to lis. */
7391 insn &= ~(0x1f << 16);
7392 bfd_put_32 (input_bfd, insn,
7393 contents + rel->r_offset - d_offset);
7394 }
7395 }
7396 else if (bfd_link_pic (info))
7397 info->callbacks->einfo
7398 (_("%P: %H: error: %s with unexpected instruction %x\n"),
7399 input_bfd, input_section, rel->r_offset,
7400 "R_PPC_PLT16_HA", insn);
7401 }
7402 break;
7403 }
7404
7405 if (ELIMINATE_COPY_RELOCS
7406 && h != NULL
7407 && !h->def_regular
7408 && h->protected_def
7409 && ppc_elf_hash_entry (h)->has_addr16_ha
7410 && ppc_elf_hash_entry (h)->has_addr16_lo
7411 && htab->params->pic_fixup > 0)
7412 {
7413 /* Convert lis;addi or lis;load/store accessing a protected
7414 variable defined in a shared library to PIC. */
7415 unsigned int insn;
7416
7417 if (r_type == R_PPC_ADDR16_HA)
7418 {
7419 insn = bfd_get_32 (input_bfd,
7420 contents + rel->r_offset - d_offset);
7421 if ((insn & (0x3fu << 26)) == (15u << 26)
7422 && (insn & (0x1f << 16)) == 0 /* lis */)
7423 {
7424 bfd_byte *p;
7425 bfd_vma off;
7426 bfd_vma got_addr;
7427
7428 p = (contents + input_section->size
7429 - relax_info->workaround_size
7430 - relax_info->picfixup_size
7431 + picfixup_size);
7432 off = (p - contents) - (rel->r_offset - d_offset);
7433 if (off > 0x1fffffc || (off & 3) != 0)
7434 info->callbacks->einfo
7435 (_("%H: fixup branch overflow\n"),
7436 input_bfd, input_section, rel->r_offset);
7437
7438 bfd_put_32 (input_bfd, B | off,
7439 contents + rel->r_offset - d_offset);
7440 got_addr = (htab->elf.sgot->output_section->vma
7441 + htab->elf.sgot->output_offset
7442 + (h->got.offset & ~1));
7443 wrel->r_offset = (p - contents) + d_offset;
7444 wrel->r_info = ELF32_R_INFO (0, R_PPC_ADDR16_HA);
7445 wrel->r_addend = got_addr;
7446 insn &= ~0xffff;
7447 insn |= ((unsigned int) (got_addr + 0x8000) >> 16) & 0xffff;
7448 bfd_put_32 (input_bfd, insn, p);
7449
7450 /* Convert lis to lwz, loading address from GOT. */
7451 insn &= ~0xffff;
7452 insn ^= (32u ^ 15u) << 26;
7453 insn |= (insn & (0x1f << 21)) >> 5;
7454 insn |= got_addr & 0xffff;
7455 bfd_put_32 (input_bfd, insn, p + 4);
7456
7457 bfd_put_32 (input_bfd, B | ((-4 - off) & 0x3ffffff), p + 8);
7458 picfixup_size += 12;
7459
7460 /* Use one of the spare relocs, so --emit-relocs
7461 output is reasonable. */
7462 memmove (rel + 1, rel, (relend - rel - 1) * sizeof (*rel));
7463 wrel++, rel++;
7464 rel->r_offset = wrel[-1].r_offset + 4;
7465 rel->r_info = ELF32_R_INFO (0, R_PPC_ADDR16_LO);
7466 rel->r_addend = wrel[-1].r_addend;
7467
7468 /* Continue on as if we had a got reloc, to output
7469 dynamic reloc. */
7470 r_type = R_PPC_GOT16_LO;
7471 }
7472 else
7473 _bfd_error_handler
7474 /* xgettext:c-format */
7475 (_("%pB(%pA+%#" PRIx64 "): error: "
7476 "%s with unexpected instruction %#x"),
7477 input_bfd, input_section, (uint64_t) rel->r_offset,
7478 "R_PPC_ADDR16_HA", insn);
7479 }
7480 else if (r_type == R_PPC_ADDR16_LO)
7481 {
7482 insn = bfd_get_32 (input_bfd,
7483 contents + rel->r_offset - d_offset);
7484 if ((insn & (0x3fu << 26)) == 14u << 26 /* addi */
7485 || (insn & (0x3fu << 26)) == 32u << 26 /* lwz */
7486 || (insn & (0x3fu << 26)) == 34u << 26 /* lbz */
7487 || (insn & (0x3fu << 26)) == 36u << 26 /* stw */
7488 || (insn & (0x3fu << 26)) == 38u << 26 /* stb */
7489 || (insn & (0x3fu << 26)) == 40u << 26 /* lhz */
7490 || (insn & (0x3fu << 26)) == 42u << 26 /* lha */
7491 || (insn & (0x3fu << 26)) == 44u << 26 /* sth */
7492 || (insn & (0x3fu << 26)) == 46u << 26 /* lmw */
7493 || (insn & (0x3fu << 26)) == 47u << 26 /* stmw */
7494 || (insn & (0x3fu << 26)) == 48u << 26 /* lfs */
7495 || (insn & (0x3fu << 26)) == 50u << 26 /* lfd */
7496 || (insn & (0x3fu << 26)) == 52u << 26 /* stfs */
7497 || (insn & (0x3fu << 26)) == 54u << 26 /* stfd */
7498 || ((insn & (0x3fu << 26)) == 58u << 26 /* lwa,ld,lmd */
7499 && (insn & 3) != 1)
7500 || ((insn & (0x3fu << 26)) == 62u << 26 /* std, stmd */
7501 && ((insn & 3) == 0 || (insn & 3) == 3)))
7502 {
7503 /* Arrange to apply the reloc addend, if any. */
7504 relocation = 0;
7505 unresolved_reloc = FALSE;
7506 rel->r_info = ELF32_R_INFO (0, r_type);
7507 }
7508 else
7509 _bfd_error_handler
7510 /* xgettext:c-format */
7511 (_("%pB(%pA+%#" PRIx64 "): error: "
7512 "%s with unexpected instruction %#x"),
7513 input_bfd, input_section, (uint64_t) rel->r_offset,
7514 "R_PPC_ADDR16_LO", insn);
7515 }
7516 }
7517
7518 ifunc = NULL;
7519 if (htab->elf.target_os != is_vxworks)
7520 {
7521 struct plt_entry *ent;
7522
7523 if (h != NULL)
7524 {
7525 if (h->type == STT_GNU_IFUNC)
7526 ifunc = &h->plt.plist;
7527 }
7528 else if (local_got_offsets != NULL
7529 && ELF_ST_TYPE (sym->st_info) == STT_GNU_IFUNC)
7530 {
7531 struct plt_entry **local_plt;
7532
7533 local_plt = (struct plt_entry **) (local_got_offsets
7534 + symtab_hdr->sh_info);
7535 ifunc = local_plt + r_symndx;
7536 }
7537
7538 ent = NULL;
7539 if (ifunc != NULL
7540 && (!bfd_link_pic (info)
7541 || is_branch_reloc (r_type)
7542 || r_type == R_PPC_PLT16_LO
7543 || r_type == R_PPC_PLT16_HI
7544 || r_type == R_PPC_PLT16_HA))
7545 {
7546 addend = 0;
7547 if (bfd_link_pic (info)
7548 && (r_type == R_PPC_PLTREL24
7549 || r_type == R_PPC_PLT16_LO
7550 || r_type == R_PPC_PLT16_HI
7551 || r_type == R_PPC_PLT16_HA))
7552 addend = rel->r_addend;
7553 ent = find_plt_ent (ifunc, got2, addend);
7554 }
7555 if (ent != NULL)
7556 {
7557 if (bfd_link_pic (info)
7558 && ent->sec != got2
7559 && htab->plt_type != PLT_NEW
7560 && (!htab->elf.dynamic_sections_created
7561 || h == NULL
7562 || h->dynindx == -1))
7563 {
7564 /* Uh oh, we are going to create a pic glink stub
7565 for an ifunc (here for h == NULL and later in
7566 finish_dynamic_symbol for h != NULL), and
7567 apparently are using code compiled with
7568 -mbss-plt. The difficulty is that -mbss-plt code
7569 gives no indication via a magic PLTREL24 addend
7570 whether r30 is equal to _GLOBAL_OFFSET_TABLE_ or
7571 is pointing into a .got2 section (and how far
7572 into .got2). */
7573 info->callbacks->einfo
7574 /* xgettext:c-format */
7575 (_("%X%H: unsupported bss-plt -fPIC ifunc %s\n"),
7576 input_bfd, input_section, rel->r_offset, sym_name);
7577 }
7578
7579 unresolved_reloc = FALSE;
7580 if (htab->plt_type == PLT_NEW
7581 || !htab->elf.dynamic_sections_created
7582 || h == NULL
7583 || h->dynindx == -1)
7584 relocation = (htab->glink->output_section->vma
7585 + htab->glink->output_offset
7586 + (ent->glink_offset & ~1));
7587 else
7588 relocation = (htab->elf.splt->output_section->vma
7589 + htab->elf.splt->output_offset
7590 + ent->plt.offset);
7591 }
7592 }
7593
7594 addend = rel->r_addend;
7595 save_unresolved_reloc = unresolved_reloc;
7596 howto = NULL;
7597 if (r_type < R_PPC_max)
7598 howto = ppc_elf_howto_table[r_type];
7599
7600 tls_type = 0;
7601 switch (r_type)
7602 {
7603 default:
7604 /* xgettext:c-format */
7605 _bfd_error_handler (_("%pB: %s unsupported"),
7606 input_bfd, howto->name);
7607
7608 bfd_set_error (bfd_error_bad_value);
7609 ret = FALSE;
7610 goto copy_reloc;
7611
7612 case R_PPC_NONE:
7613 case R_PPC_TLS:
7614 case R_PPC_TLSGD:
7615 case R_PPC_TLSLD:
7616 case R_PPC_EMB_MRKREF:
7617 case R_PPC_GNU_VTINHERIT:
7618 case R_PPC_GNU_VTENTRY:
7619 goto copy_reloc;
7620
7621 /* GOT16 relocations. Like an ADDR16 using the symbol's
7622 address in the GOT as relocation value instead of the
7623 symbol's value itself. Also, create a GOT entry for the
7624 symbol and put the symbol value there. */
7625 case R_PPC_GOT_TLSGD16:
7626 case R_PPC_GOT_TLSGD16_LO:
7627 case R_PPC_GOT_TLSGD16_HI:
7628 case R_PPC_GOT_TLSGD16_HA:
7629 tls_type = TLS_TLS | TLS_GD;
7630 goto dogot;
7631
7632 case R_PPC_GOT_TLSLD16:
7633 case R_PPC_GOT_TLSLD16_LO:
7634 case R_PPC_GOT_TLSLD16_HI:
7635 case R_PPC_GOT_TLSLD16_HA:
7636 tls_type = TLS_TLS | TLS_LD;
7637 goto dogot;
7638
7639 case R_PPC_GOT_TPREL16:
7640 case R_PPC_GOT_TPREL16_LO:
7641 case R_PPC_GOT_TPREL16_HI:
7642 case R_PPC_GOT_TPREL16_HA:
7643 tls_type = TLS_TLS | TLS_TPREL;
7644 goto dogot;
7645
7646 case R_PPC_GOT_DTPREL16:
7647 case R_PPC_GOT_DTPREL16_LO:
7648 case R_PPC_GOT_DTPREL16_HI:
7649 case R_PPC_GOT_DTPREL16_HA:
7650 tls_type = TLS_TLS | TLS_DTPREL;
7651 goto dogot;
7652
7653 case R_PPC_GOT16:
7654 case R_PPC_GOT16_LO:
7655 case R_PPC_GOT16_HI:
7656 case R_PPC_GOT16_HA:
7657 tls_mask = 0;
7658 dogot:
7659 {
7660 /* Relocation is to the entry for this symbol in the global
7661 offset table. */
7662 bfd_vma off;
7663 bfd_vma *offp;
7664 unsigned long indx;
7665
7666 if (htab->elf.sgot == NULL)
7667 abort ();
7668
7669 indx = 0;
7670 if (tls_type == (TLS_TLS | TLS_LD)
7671 && SYMBOL_REFERENCES_LOCAL (info, h))
7672 offp = &htab->tlsld_got.offset;
7673 else if (h != NULL)
7674 {
7675 if (!htab->elf.dynamic_sections_created
7676 || h->dynindx == -1
7677 || SYMBOL_REFERENCES_LOCAL (info, h)
7678 || UNDEFWEAK_NO_DYNAMIC_RELOC (info, h))
7679 /* This is actually a static link, or it is a
7680 -Bsymbolic link and the symbol is defined
7681 locally, or the symbol was forced to be local
7682 because of a version file. */
7683 ;
7684 else
7685 {
7686 indx = h->dynindx;
7687 unresolved_reloc = FALSE;
7688 }
7689 offp = &h->got.offset;
7690 }
7691 else
7692 {
7693 if (local_got_offsets == NULL)
7694 abort ();
7695 offp = &local_got_offsets[r_symndx];
7696 }
7697
7698 /* The offset must always be a multiple of 4. We use the
7699 least significant bit to record whether we have already
7700 processed this entry. */
7701 off = *offp;
7702 if ((off & 1) != 0)
7703 off &= ~1;
7704 else
7705 {
7706 unsigned int tls_m = ((tls_mask & TLS_TLS) != 0
7707 ? tls_mask & (TLS_LD | TLS_GD | TLS_DTPREL
7708 | TLS_TPREL | TLS_GDIE)
7709 : 0);
7710
7711 if (offp == &htab->tlsld_got.offset)
7712 tls_m = TLS_LD;
7713 else if ((tls_m & TLS_LD) != 0
7714 && SYMBOL_REFERENCES_LOCAL (info, h))
7715 tls_m &= ~TLS_LD;
7716
7717 /* We might have multiple got entries for this sym.
7718 Initialize them all. */
7719 do
7720 {
7721 int tls_ty = 0;
7722
7723 if ((tls_m & TLS_LD) != 0)
7724 {
7725 tls_ty = TLS_TLS | TLS_LD;
7726 tls_m &= ~TLS_LD;
7727 }
7728 else if ((tls_m & TLS_GD) != 0)
7729 {
7730 tls_ty = TLS_TLS | TLS_GD;
7731 tls_m &= ~TLS_GD;
7732 }
7733 else if ((tls_m & TLS_DTPREL) != 0)
7734 {
7735 tls_ty = TLS_TLS | TLS_DTPREL;
7736 tls_m &= ~TLS_DTPREL;
7737 }
7738 else if ((tls_m & (TLS_TPREL | TLS_GDIE)) != 0)
7739 {
7740 tls_ty = TLS_TLS | TLS_TPREL;
7741 tls_m = 0;
7742 }
7743
7744 /* Generate relocs for the dynamic linker. */
7745 if (indx != 0
7746 || (bfd_link_pic (info)
7747 && (h == NULL
7748 || !UNDEFWEAK_NO_DYNAMIC_RELOC (info, h))
7749 && !(tls_ty != 0
7750 && bfd_link_executable (info)
7751 && SYMBOL_REFERENCES_LOCAL (info, h))))
7752 {
7753 asection *rsec = htab->elf.srelgot;
7754 bfd_byte * loc;
7755
7756 if (ifunc != NULL)
7757 {
7758 rsec = htab->elf.irelplt;
7759 if (indx == 0)
7760 htab->local_ifunc_resolver = 1;
7761 else if (is_static_defined (h))
7762 htab->maybe_local_ifunc_resolver = 1;
7763 }
7764 outrel.r_offset = (htab->elf.sgot->output_section->vma
7765 + htab->elf.sgot->output_offset
7766 + off);
7767 outrel.r_addend = 0;
7768 if (tls_ty & (TLS_LD | TLS_GD))
7769 {
7770 outrel.r_info = ELF32_R_INFO (indx, R_PPC_DTPMOD32);
7771 if (tls_ty == (TLS_TLS | TLS_GD))
7772 {
7773 loc = rsec->contents;
7774 loc += (rsec->reloc_count++
7775 * sizeof (Elf32_External_Rela));
7776 bfd_elf32_swap_reloca_out (output_bfd,
7777 &outrel, loc);
7778 outrel.r_offset += 4;
7779 outrel.r_info
7780 = ELF32_R_INFO (indx, R_PPC_DTPREL32);
7781 }
7782 }
7783 else if (tls_ty == (TLS_TLS | TLS_DTPREL))
7784 outrel.r_info = ELF32_R_INFO (indx, R_PPC_DTPREL32);
7785 else if (tls_ty == (TLS_TLS | TLS_TPREL))
7786 outrel.r_info = ELF32_R_INFO (indx, R_PPC_TPREL32);
7787 else if (indx != 0)
7788 outrel.r_info = ELF32_R_INFO (indx, R_PPC_GLOB_DAT);
7789 else if (ifunc != NULL)
7790 outrel.r_info = ELF32_R_INFO (0, R_PPC_IRELATIVE);
7791 else
7792 outrel.r_info = ELF32_R_INFO (0, R_PPC_RELATIVE);
7793 if (indx == 0 && tls_ty != (TLS_TLS | TLS_LD))
7794 {
7795 outrel.r_addend += relocation;
7796 if (tls_ty & (TLS_GD | TLS_DTPREL | TLS_TPREL))
7797 {
7798 if (htab->elf.tls_sec == NULL)
7799 outrel.r_addend = 0;
7800 else
7801 outrel.r_addend -= htab->elf.tls_sec->vma;
7802 }
7803 }
7804 loc = rsec->contents;
7805 loc += (rsec->reloc_count++
7806 * sizeof (Elf32_External_Rela));
7807 bfd_elf32_swap_reloca_out (output_bfd, &outrel, loc);
7808 }
7809
7810 /* Init the .got section contents if we're not
7811 emitting a reloc. */
7812 else
7813 {
7814 bfd_vma value = relocation;
7815
7816 if (tls_ty != 0)
7817 {
7818 if (htab->elf.tls_sec == NULL)
7819 value = 0;
7820 else
7821 {
7822 if (tls_ty & TLS_LD)
7823 value = 0;
7824 else
7825 value -= htab->elf.tls_sec->vma + DTP_OFFSET;
7826 if (tls_ty & TLS_TPREL)
7827 value += DTP_OFFSET - TP_OFFSET;
7828 }
7829
7830 if (tls_ty & (TLS_LD | TLS_GD))
7831 {
7832 bfd_put_32 (input_bfd, value,
7833 htab->elf.sgot->contents + off + 4);
7834 value = 1;
7835 }
7836 }
7837 bfd_put_32 (input_bfd, value,
7838 htab->elf.sgot->contents + off);
7839 }
7840
7841 off += 4;
7842 if (tls_ty & (TLS_LD | TLS_GD))
7843 off += 4;
7844 }
7845 while (tls_m != 0);
7846
7847 off = *offp;
7848 *offp = off | 1;
7849 }
7850
7851 if (off >= (bfd_vma) -2)
7852 abort ();
7853
7854 if ((tls_type & TLS_TLS) != 0)
7855 {
7856 if (tls_type != (TLS_TLS | TLS_LD))
7857 {
7858 if ((tls_mask & TLS_LD) != 0
7859 && !SYMBOL_REFERENCES_LOCAL (info, h))
7860 off += 8;
7861 if (tls_type != (TLS_TLS | TLS_GD))
7862 {
7863 if ((tls_mask & TLS_GD) != 0)
7864 off += 8;
7865 if (tls_type != (TLS_TLS | TLS_DTPREL))
7866 {
7867 if ((tls_mask & TLS_DTPREL) != 0)
7868 off += 4;
7869 }
7870 }
7871 }
7872 }
7873
7874 /* If here for a picfixup, we're done. */
7875 if (r_type != ELF32_R_TYPE (rel->r_info))
7876 goto copy_reloc;
7877
7878 relocation = (htab->elf.sgot->output_section->vma
7879 + htab->elf.sgot->output_offset
7880 + off
7881 - SYM_VAL (htab->elf.hgot));
7882
7883 /* Addends on got relocations don't make much sense.
7884 x+off@got is actually x@got+off, and since the got is
7885 generated by a hash table traversal, the value in the
7886 got at entry m+n bears little relation to the entry m. */
7887 if (addend != 0)
7888 info->callbacks->einfo
7889 /* xgettext:c-format */
7890 (_("%H: non-zero addend on %s reloc against `%s'\n"),
7891 input_bfd, input_section, rel->r_offset,
7892 howto->name,
7893 sym_name);
7894 }
7895 break;
7896
7897 /* Relocations that need no special processing. */
7898 case R_PPC_LOCAL24PC:
7899 /* It makes no sense to point a local relocation
7900 at a symbol not in this object. */
7901 if (unresolved_reloc)
7902 {
7903 (*info->callbacks->undefined_symbol) (info,
7904 h->root.root.string,
7905 input_bfd,
7906 input_section,
7907 rel->r_offset,
7908 TRUE);
7909 goto copy_reloc;
7910 }
7911 if (h != NULL && h->type == STT_GNU_IFUNC && bfd_link_pic (info))
7912 {
7913 /* @local on an ifunc does not really make sense since
7914 the ifunc resolver can take you anywhere. More
7915 seriously, calls to ifuncs must go through a plt call
7916 stub, and for pic the plt call stubs uses r30 to
7917 access the PLT. The problem is that a call that is
7918 local won't have the +32k reloc addend trick marking
7919 -fPIC code, so the linker won't know whether r30 is
7920 _GLOBAL_OFFSET_TABLE_ or pointing into a .got2 section. */
7921 /* xgettext:c-format */
7922 info->callbacks->einfo (_("%X%H: @local call to ifunc %s\n"),
7923 input_bfd, input_section, rel->r_offset,
7924 h->root.root.string);
7925 }
7926 break;
7927
7928 case R_PPC_DTPREL16:
7929 case R_PPC_DTPREL16_LO:
7930 case R_PPC_DTPREL16_HI:
7931 case R_PPC_DTPREL16_HA:
7932 if (htab->elf.tls_sec != NULL)
7933 addend -= htab->elf.tls_sec->vma + DTP_OFFSET;
7934 break;
7935
7936 /* Relocations that may need to be propagated if this is a shared
7937 object. */
7938 case R_PPC_TPREL16:
7939 case R_PPC_TPREL16_LO:
7940 case R_PPC_TPREL16_HI:
7941 case R_PPC_TPREL16_HA:
7942 if (h != NULL
7943 && h->root.type == bfd_link_hash_undefweak
7944 && h->dynindx == -1)
7945 {
7946 /* Make this relocation against an undefined weak symbol
7947 resolve to zero. This is really just a tweak, since
7948 code using weak externs ought to check that they are
7949 defined before using them. */
7950 bfd_byte *p = contents + rel->r_offset - d_offset;
7951 unsigned int insn = bfd_get_32 (input_bfd, p);
7952 insn = _bfd_elf_ppc_at_tprel_transform (insn, 2);
7953 if (insn != 0)
7954 bfd_put_32 (input_bfd, insn, p);
7955 break;
7956 }
7957 if (htab->elf.tls_sec != NULL)
7958 addend -= htab->elf.tls_sec->vma + TP_OFFSET;
7959 /* The TPREL16 relocs shouldn't really be used in shared
7960 libs or with non-local symbols as that will result in
7961 DT_TEXTREL being set, but support them anyway. */
7962 goto dodyn;
7963
7964 case R_PPC_TPREL32:
7965 if (htab->elf.tls_sec != NULL)
7966 addend -= htab->elf.tls_sec->vma + TP_OFFSET;
7967 goto dodyn;
7968
7969 case R_PPC_DTPREL32:
7970 if (htab->elf.tls_sec != NULL)
7971 addend -= htab->elf.tls_sec->vma + DTP_OFFSET;
7972 goto dodyn;
7973
7974 case R_PPC_DTPMOD32:
7975 relocation = 1;
7976 addend = 0;
7977 goto dodyn;
7978
7979 case R_PPC_REL16:
7980 case R_PPC_REL16_LO:
7981 case R_PPC_REL16_HI:
7982 case R_PPC_REL16_HA:
7983 case R_PPC_REL16DX_HA:
7984 break;
7985
7986 case R_PPC_REL32:
7987 if (h == NULL || h == htab->elf.hgot)
7988 break;
7989 /* fall through */
7990
7991 case R_PPC_ADDR32:
7992 case R_PPC_ADDR16:
7993 case R_PPC_ADDR16_LO:
7994 case R_PPC_ADDR16_HI:
7995 case R_PPC_ADDR16_HA:
7996 case R_PPC_UADDR32:
7997 case R_PPC_UADDR16:
7998 goto dodyn;
7999
8000 case R_PPC_VLE_REL8:
8001 case R_PPC_VLE_REL15:
8002 case R_PPC_VLE_REL24:
8003 case R_PPC_REL24:
8004 case R_PPC_REL14:
8005 case R_PPC_REL14_BRTAKEN:
8006 case R_PPC_REL14_BRNTAKEN:
8007 /* If these relocations are not to a named symbol, they can be
8008 handled right here, no need to bother the dynamic linker. */
8009 if (SYMBOL_CALLS_LOCAL (info, h)
8010 || h == htab->elf.hgot)
8011 break;
8012 /* fall through */
8013
8014 case R_PPC_ADDR24:
8015 case R_PPC_ADDR14:
8016 case R_PPC_ADDR14_BRTAKEN:
8017 case R_PPC_ADDR14_BRNTAKEN:
8018 if (h != NULL && !bfd_link_pic (info))
8019 break;
8020 /* fall through */
8021
8022 dodyn:
8023 if ((input_section->flags & SEC_ALLOC) == 0
8024 || is_vxworks_tls)
8025 break;
8026
8027 if (bfd_link_pic (info)
8028 ? ((h == NULL
8029 || h->dyn_relocs != NULL)
8030 && ((h != NULL && pc_dynrelocs (h))
8031 || must_be_dyn_reloc (info, r_type)))
8032 : (h != NULL
8033 && h->dyn_relocs != NULL))
8034 {
8035 int skip;
8036 bfd_byte *loc;
8037 asection *sreloc;
8038 long indx = 0;
8039
8040 #ifdef DEBUG
8041 fprintf (stderr, "ppc_elf_relocate_section needs to "
8042 "create relocation for %s\n",
8043 (h && h->root.root.string
8044 ? h->root.root.string : "<unknown>"));
8045 #endif
8046
8047 /* When generating a shared object, these relocations
8048 are copied into the output file to be resolved at run
8049 time. */
8050 skip = 0;
8051 outrel.r_offset = _bfd_elf_section_offset (output_bfd, info,
8052 input_section,
8053 rel->r_offset);
8054 if (outrel.r_offset == (bfd_vma) -1
8055 || outrel.r_offset == (bfd_vma) -2)
8056 skip = (int) outrel.r_offset;
8057 outrel.r_offset += (input_section->output_section->vma
8058 + input_section->output_offset);
8059
8060 /* Optimize unaligned reloc use. */
8061 if ((r_type == R_PPC_ADDR32 && (outrel.r_offset & 3) != 0)
8062 || (r_type == R_PPC_UADDR32 && (outrel.r_offset & 3) == 0))
8063 r_type ^= R_PPC_ADDR32 ^ R_PPC_UADDR32;
8064 if ((r_type == R_PPC_ADDR16 && (outrel.r_offset & 1) != 0)
8065 || (r_type == R_PPC_UADDR16 && (outrel.r_offset & 1) == 0))
8066 r_type ^= R_PPC_ADDR16 ^ R_PPC_UADDR16;
8067
8068 if (skip)
8069 memset (&outrel, 0, sizeof outrel);
8070 else if (!SYMBOL_REFERENCES_LOCAL (info, h))
8071 {
8072 indx = h->dynindx;
8073 BFD_ASSERT (indx != -1);
8074 unresolved_reloc = FALSE;
8075 outrel.r_info = ELF32_R_INFO (indx, r_type);
8076 outrel.r_addend = rel->r_addend;
8077 }
8078 else
8079 {
8080 outrel.r_addend = relocation + rel->r_addend;
8081
8082 if (r_type != R_PPC_ADDR32)
8083 {
8084 if (ifunc != NULL)
8085 {
8086 /* If we get here when building a static
8087 executable, then the libc startup function
8088 responsible for applying indirect function
8089 relocations is going to complain about
8090 the reloc type.
8091 If we get here when building a dynamic
8092 executable, it will be because we have
8093 a text relocation. The dynamic loader
8094 will set the text segment writable and
8095 non-executable to apply text relocations.
8096 So we'll segfault when trying to run the
8097 indirection function to resolve the reloc. */
8098 info->callbacks->einfo
8099 /* xgettext:c-format */
8100 (_("%H: relocation %s for indirect "
8101 "function %s unsupported\n"),
8102 input_bfd, input_section, rel->r_offset,
8103 howto->name,
8104 sym_name);
8105 ret = FALSE;
8106 }
8107 else if (r_symndx == STN_UNDEF || bfd_is_abs_section (sec))
8108 ;
8109 else if (sec == NULL || sec->owner == NULL)
8110 {
8111 bfd_set_error (bfd_error_bad_value);
8112 ret = FALSE;
8113 }
8114 else
8115 {
8116 asection *osec;
8117
8118 /* We are turning this relocation into one
8119 against a section symbol. It would be
8120 proper to subtract the symbol's value,
8121 osec->vma, from the emitted reloc addend,
8122 but ld.so expects buggy relocs.
8123 FIXME: Why not always use a zero index? */
8124 osec = sec->output_section;
8125 if ((osec->flags & SEC_THREAD_LOCAL) != 0)
8126 {
8127 osec = htab->elf.tls_sec;
8128 indx = 0;
8129 }
8130 else
8131 {
8132 indx = elf_section_data (osec)->dynindx;
8133 if (indx == 0)
8134 {
8135 osec = htab->elf.text_index_section;
8136 indx = elf_section_data (osec)->dynindx;
8137 }
8138 BFD_ASSERT (indx != 0);
8139 }
8140
8141 /* ld.so doesn't expect buggy TLS relocs.
8142 Don't leave the symbol value in the
8143 addend for them. */
8144 if (IS_PPC_TLS_RELOC (r_type))
8145 outrel.r_addend -= osec->vma;
8146 }
8147
8148 outrel.r_info = ELF32_R_INFO (indx, r_type);
8149 }
8150 else if (ifunc != NULL)
8151 outrel.r_info = ELF32_R_INFO (0, R_PPC_IRELATIVE);
8152 else
8153 outrel.r_info = ELF32_R_INFO (0, R_PPC_RELATIVE);
8154 }
8155
8156 sreloc = elf_section_data (input_section)->sreloc;
8157 if (ifunc)
8158 {
8159 sreloc = htab->elf.irelplt;
8160 if (indx == 0)
8161 htab->local_ifunc_resolver = 1;
8162 else if (is_static_defined (h))
8163 htab->maybe_local_ifunc_resolver = 1;
8164 }
8165 if (sreloc == NULL)
8166 return FALSE;
8167
8168 loc = sreloc->contents;
8169 loc += sreloc->reloc_count++ * sizeof (Elf32_External_Rela);
8170 bfd_elf32_swap_reloca_out (output_bfd, &outrel, loc);
8171
8172 if (skip == -1)
8173 goto copy_reloc;
8174
8175 /* This reloc will be computed at runtime. Clear the memory
8176 so that it contains a predictable value for prelink. */
8177 if (!skip)
8178 {
8179 relocation = howto->pc_relative ? outrel.r_offset : 0;
8180 addend = 0;
8181 break;
8182 }
8183 }
8184 break;
8185
8186 case R_PPC_RELAX_PLT:
8187 case R_PPC_RELAX_PLTREL24:
8188 if (h != NULL)
8189 {
8190 struct plt_entry *ent;
8191 bfd_vma got2_addend = 0;
8192
8193 if (r_type == R_PPC_RELAX_PLTREL24)
8194 {
8195 if (bfd_link_pic (info))
8196 got2_addend = addend;
8197 addend = 0;
8198 }
8199 ent = find_plt_ent (&h->plt.plist, got2, got2_addend);
8200 if (htab->plt_type == PLT_NEW)
8201 relocation = (htab->glink->output_section->vma
8202 + htab->glink->output_offset
8203 + ent->glink_offset);
8204 else
8205 relocation = (htab->elf.splt->output_section->vma
8206 + htab->elf.splt->output_offset
8207 + ent->plt.offset);
8208 }
8209 /* Fall through. */
8210
8211 case R_PPC_RELAX:
8212 {
8213 const int *stub;
8214 size_t size;
8215 size_t insn_offset = rel->r_offset;
8216 unsigned int insn;
8217
8218 if (bfd_link_pic (info))
8219 {
8220 relocation -= (input_section->output_section->vma
8221 + input_section->output_offset
8222 + rel->r_offset - 4);
8223 stub = shared_stub_entry;
8224 bfd_put_32 (input_bfd, stub[0], contents + insn_offset - 12);
8225 bfd_put_32 (input_bfd, stub[1], contents + insn_offset - 8);
8226 bfd_put_32 (input_bfd, stub[2], contents + insn_offset - 4);
8227 stub += 3;
8228 size = ARRAY_SIZE (shared_stub_entry) - 3;
8229 }
8230 else
8231 {
8232 stub = stub_entry;
8233 size = ARRAY_SIZE (stub_entry);
8234 }
8235
8236 relocation += addend;
8237 if (bfd_link_relocatable (info))
8238 relocation = 0;
8239
8240 /* First insn is HA, second is LO. */
8241 insn = *stub++;
8242 insn |= ((relocation + 0x8000) >> 16) & 0xffff;
8243 bfd_put_32 (input_bfd, insn, contents + insn_offset);
8244 insn_offset += 4;
8245
8246 insn = *stub++;
8247 insn |= relocation & 0xffff;
8248 bfd_put_32 (input_bfd, insn, contents + insn_offset);
8249 insn_offset += 4;
8250 size -= 2;
8251
8252 while (size != 0)
8253 {
8254 insn = *stub++;
8255 --size;
8256 bfd_put_32 (input_bfd, insn, contents + insn_offset);
8257 insn_offset += 4;
8258 }
8259
8260 /* Rewrite the reloc and convert one of the trailing nop
8261 relocs to describe this relocation. */
8262 BFD_ASSERT (ELF32_R_TYPE (relend[-1].r_info) == R_PPC_NONE);
8263 /* The relocs are at the bottom 2 bytes */
8264 wrel->r_offset = rel->r_offset + d_offset;
8265 wrel->r_info = ELF32_R_INFO (r_symndx, R_PPC_ADDR16_HA);
8266 wrel->r_addend = rel->r_addend;
8267 memmove (wrel + 1, wrel, (relend - wrel - 1) * sizeof (*wrel));
8268 wrel++, rel++;
8269 wrel->r_offset += 4;
8270 wrel->r_info = ELF32_R_INFO (r_symndx, R_PPC_ADDR16_LO);
8271 }
8272 continue;
8273
8274 /* Indirect .sdata relocation. */
8275 case R_PPC_EMB_SDAI16:
8276 BFD_ASSERT (htab->sdata[0].section != NULL);
8277 if (!is_static_defined (htab->sdata[0].sym))
8278 {
8279 unresolved_reloc = TRUE;
8280 break;
8281 }
8282 relocation
8283 = elf_finish_pointer_linker_section (input_bfd, &htab->sdata[0],
8284 h, relocation, rel);
8285 addend = 0;
8286 break;
8287
8288 /* Indirect .sdata2 relocation. */
8289 case R_PPC_EMB_SDA2I16:
8290 BFD_ASSERT (htab->sdata[1].section != NULL);
8291 if (!is_static_defined (htab->sdata[1].sym))
8292 {
8293 unresolved_reloc = TRUE;
8294 break;
8295 }
8296 relocation
8297 = elf_finish_pointer_linker_section (input_bfd, &htab->sdata[1],
8298 h, relocation, rel);
8299 addend = 0;
8300 break;
8301
8302 /* Handle the TOC16 reloc. We want to use the offset within the .got
8303 section, not the actual VMA. This is appropriate when generating
8304 an embedded ELF object, for which the .got section acts like the
8305 AIX .toc section. */
8306 case R_PPC_TOC16: /* phony GOT16 relocations */
8307 if (sec == NULL || sec->output_section == NULL)
8308 {
8309 unresolved_reloc = TRUE;
8310 break;
8311 }
8312 BFD_ASSERT (strcmp (bfd_section_name (sec), ".got") == 0
8313 || strcmp (bfd_section_name (sec), ".cgot") == 0);
8314
8315 addend -= sec->output_section->vma + sec->output_offset + 0x8000;
8316 break;
8317
8318 case R_PPC_PLTREL24:
8319 if (h != NULL && ifunc == NULL)
8320 {
8321 struct plt_entry *ent;
8322
8323 ent = find_plt_ent (&h->plt.plist, got2,
8324 bfd_link_pic (info) ? addend : 0);
8325 if (ent == NULL
8326 || htab->elf.splt == NULL)
8327 {
8328 /* We didn't make a PLT entry for this symbol. This
8329 happens when statically linking PIC code, or when
8330 using -Bsymbolic. */
8331 }
8332 else
8333 {
8334 /* Relocation is to the entry for this symbol in the
8335 procedure linkage table. */
8336 unresolved_reloc = FALSE;
8337 if (htab->plt_type == PLT_NEW)
8338 relocation = (htab->glink->output_section->vma
8339 + htab->glink->output_offset
8340 + ent->glink_offset);
8341 else
8342 relocation = (htab->elf.splt->output_section->vma
8343 + htab->elf.splt->output_offset
8344 + ent->plt.offset);
8345 }
8346 }
8347
8348 /* R_PPC_PLTREL24 is rather special. If non-zero, the
8349 addend specifies the GOT pointer offset within .got2.
8350 Don't apply it to the relocation field. */
8351 addend = 0;
8352 break;
8353
8354 case R_PPC_PLTSEQ:
8355 case R_PPC_PLTCALL:
8356 case R_PPC_PLT16_LO:
8357 case R_PPC_PLT16_HI:
8358 case R_PPC_PLT16_HA:
8359 plt_list = NULL;
8360 if (h != NULL)
8361 plt_list = &h->plt.plist;
8362 else if (ifunc != NULL)
8363 plt_list = ifunc;
8364 else if (local_got_offsets != NULL)
8365 {
8366 struct plt_entry **local_plt;
8367 local_plt = (struct plt_entry **) (local_got_offsets
8368 + symtab_hdr->sh_info);
8369 plt_list = local_plt + r_symndx;
8370 }
8371 unresolved_reloc = TRUE;
8372 if (plt_list != NULL)
8373 {
8374 struct plt_entry *ent;
8375
8376 ent = find_plt_ent (plt_list, got2,
8377 bfd_link_pic (info) ? addend : 0);
8378 if (ent != NULL && ent->plt.offset != (bfd_vma) -1)
8379 {
8380 asection *plt;
8381
8382 unresolved_reloc = FALSE;
8383 plt = htab->elf.splt;
8384 if (use_local_plt (info, h))
8385 {
8386 if (ifunc != NULL)
8387 plt = htab->elf.iplt;
8388 else
8389 plt = htab->pltlocal;
8390 }
8391 relocation = (plt->output_section->vma
8392 + plt->output_offset
8393 + ent->plt.offset);
8394 if (bfd_link_pic (info))
8395 {
8396 bfd_vma got = 0;
8397
8398 if (ent->addend >= 32768)
8399 got = (ent->addend
8400 + ent->sec->output_section->vma
8401 + ent->sec->output_offset);
8402 else
8403 got = SYM_VAL (htab->elf.hgot);
8404 relocation -= got;
8405 }
8406 }
8407 }
8408 addend = 0;
8409 break;
8410
8411 /* Relocate against _SDA_BASE_. */
8412 case R_PPC_SDAREL16:
8413 {
8414 const char *name;
8415 struct elf_link_hash_entry *sda = htab->sdata[0].sym;
8416
8417 if (sec == NULL
8418 || sec->output_section == NULL
8419 || !is_static_defined (sda))
8420 {
8421 unresolved_reloc = TRUE;
8422 break;
8423 }
8424 addend -= SYM_VAL (sda);
8425
8426 name = bfd_section_name (sec->output_section);
8427 if (!(strcmp (name, ".sdata") == 0
8428 || strcmp (name, ".sbss") == 0))
8429 {
8430 _bfd_error_handler
8431 /* xgettext:c-format */
8432 (_("%pB: the target (%s) of a %s relocation is "
8433 "in the wrong output section (%s)"),
8434 input_bfd,
8435 sym_name,
8436 howto->name,
8437 name);
8438 }
8439 }
8440 break;
8441
8442 /* Relocate against _SDA2_BASE_. */
8443 case R_PPC_EMB_SDA2REL:
8444 {
8445 const char *name;
8446 struct elf_link_hash_entry *sda = htab->sdata[1].sym;
8447
8448 if (sec == NULL
8449 || sec->output_section == NULL
8450 || !is_static_defined (sda))
8451 {
8452 unresolved_reloc = TRUE;
8453 break;
8454 }
8455 addend -= SYM_VAL (sda);
8456
8457 name = bfd_section_name (sec->output_section);
8458 if (!(strcmp (name, ".sdata2") == 0
8459 || strcmp (name, ".sbss2") == 0))
8460 {
8461 _bfd_error_handler
8462 /* xgettext:c-format */
8463 (_("%pB: the target (%s) of a %s relocation is "
8464 "in the wrong output section (%s)"),
8465 input_bfd,
8466 sym_name,
8467 howto->name,
8468 name);
8469 }
8470 }
8471 break;
8472
8473 case R_PPC_VLE_LO16A:
8474 relocation = relocation + addend;
8475 ppc_elf_vle_split16 (input_bfd, input_section, rel->r_offset,
8476 contents + rel->r_offset, relocation,
8477 split16a_type, htab->params->vle_reloc_fixup);
8478 goto copy_reloc;
8479
8480 case R_PPC_VLE_LO16D:
8481 relocation = relocation + addend;
8482 ppc_elf_vle_split16 (input_bfd, input_section, rel->r_offset,
8483 contents + rel->r_offset, relocation,
8484 split16d_type, htab->params->vle_reloc_fixup);
8485 goto copy_reloc;
8486
8487 case R_PPC_VLE_HI16A:
8488 relocation = (relocation + addend) >> 16;
8489 ppc_elf_vle_split16 (input_bfd, input_section, rel->r_offset,
8490 contents + rel->r_offset, relocation,
8491 split16a_type, htab->params->vle_reloc_fixup);
8492 goto copy_reloc;
8493
8494 case R_PPC_VLE_HI16D:
8495 relocation = (relocation + addend) >> 16;
8496 ppc_elf_vle_split16 (input_bfd, input_section, rel->r_offset,
8497 contents + rel->r_offset, relocation,
8498 split16d_type, htab->params->vle_reloc_fixup);
8499 goto copy_reloc;
8500
8501 case R_PPC_VLE_HA16A:
8502 relocation = (relocation + addend + 0x8000) >> 16;
8503 ppc_elf_vle_split16 (input_bfd, input_section, rel->r_offset,
8504 contents + rel->r_offset, relocation,
8505 split16a_type, htab->params->vle_reloc_fixup);
8506 goto copy_reloc;
8507
8508 case R_PPC_VLE_HA16D:
8509 relocation = (relocation + addend + 0x8000) >> 16;
8510 ppc_elf_vle_split16 (input_bfd, input_section, rel->r_offset,
8511 contents + rel->r_offset, relocation,
8512 split16d_type, htab->params->vle_reloc_fixup);
8513 goto copy_reloc;
8514
8515 /* Relocate against either _SDA_BASE_, _SDA2_BASE_, or 0. */
8516 case R_PPC_EMB_SDA21:
8517 case R_PPC_VLE_SDA21:
8518 case R_PPC_EMB_RELSDA:
8519 case R_PPC_VLE_SDA21_LO:
8520 {
8521 const char *name;
8522 int reg;
8523 unsigned int insn;
8524 struct elf_link_hash_entry *sda = NULL;
8525
8526 if (sec == NULL || sec->output_section == NULL)
8527 {
8528 unresolved_reloc = TRUE;
8529 break;
8530 }
8531
8532 name = bfd_section_name (sec->output_section);
8533 if (strcmp (name, ".sdata") == 0
8534 || strcmp (name, ".sbss") == 0)
8535 {
8536 reg = 13;
8537 sda = htab->sdata[0].sym;
8538 }
8539 else if (strcmp (name, ".sdata2") == 0
8540 || strcmp (name, ".sbss2") == 0)
8541 {
8542 reg = 2;
8543 sda = htab->sdata[1].sym;
8544 }
8545 else if (strcmp (name, ".PPC.EMB.sdata0") == 0
8546 || strcmp (name, ".PPC.EMB.sbss0") == 0)
8547 {
8548 reg = 0;
8549 }
8550 else
8551 {
8552 _bfd_error_handler
8553 /* xgettext:c-format */
8554 (_("%pB: the target (%s) of a %s relocation is "
8555 "in the wrong output section (%s)"),
8556 input_bfd,
8557 sym_name,
8558 howto->name,
8559 name);
8560
8561 bfd_set_error (bfd_error_bad_value);
8562 ret = FALSE;
8563 goto copy_reloc;
8564 }
8565
8566 if (sda != NULL)
8567 {
8568 if (!is_static_defined (sda))
8569 {
8570 unresolved_reloc = TRUE;
8571 break;
8572 }
8573 addend -= SYM_VAL (sda);
8574 }
8575
8576 if (r_type == R_PPC_EMB_RELSDA)
8577 break;
8578
8579 /* The PowerPC Embedded Application Binary Interface
8580 version 1.0 insanely chose to specify R_PPC_EMB_SDA21
8581 operating on a 24-bit field at r_offset. GNU as and
8582 GNU ld have always assumed R_PPC_EMB_SDA21 operates on
8583 a 32-bit bit insn at r_offset. Cope with object file
8584 producers that possibly comply with the EABI in
8585 generating an odd r_offset for big-endian objects. */
8586 if (r_type == R_PPC_EMB_SDA21)
8587 rel->r_offset &= ~1;
8588
8589 insn = bfd_get_32 (input_bfd, contents + rel->r_offset);
8590 if (reg == 0
8591 && (r_type == R_PPC_VLE_SDA21
8592 || r_type == R_PPC_VLE_SDA21_LO))
8593 {
8594 relocation = relocation + addend;
8595 addend = 0;
8596
8597 /* Force e_li insn, keeping RT from original insn. */
8598 insn &= 0x1f << 21;
8599 insn |= 28u << 26;
8600
8601 /* We have an li20 field, bits 17..20, 11..15, 21..31. */
8602 /* Top 4 bits of value to 17..20. */
8603 insn |= (relocation & 0xf0000) >> 5;
8604 /* Next 5 bits of the value to 11..15. */
8605 insn |= (relocation & 0xf800) << 5;
8606 /* And the final 11 bits of the value to bits 21 to 31. */
8607 insn |= relocation & 0x7ff;
8608
8609 bfd_put_32 (input_bfd, insn, contents + rel->r_offset);
8610
8611 if (r_type == R_PPC_VLE_SDA21
8612 && ((relocation + 0x80000) & 0xffffffff) > 0x100000)
8613 goto overflow;
8614 goto copy_reloc;
8615 }
8616 /* Fill in register field. */
8617 insn = (insn & ~RA_REGISTER_MASK) | (reg << RA_REGISTER_SHIFT);
8618 bfd_put_32 (input_bfd, insn, contents + rel->r_offset);
8619 }
8620 break;
8621
8622 case R_PPC_VLE_SDAREL_LO16A:
8623 case R_PPC_VLE_SDAREL_LO16D:
8624 case R_PPC_VLE_SDAREL_HI16A:
8625 case R_PPC_VLE_SDAREL_HI16D:
8626 case R_PPC_VLE_SDAREL_HA16A:
8627 case R_PPC_VLE_SDAREL_HA16D:
8628 {
8629 bfd_vma value;
8630 const char *name;
8631 struct elf_link_hash_entry *sda = NULL;
8632
8633 if (sec == NULL || sec->output_section == NULL)
8634 {
8635 unresolved_reloc = TRUE;
8636 break;
8637 }
8638
8639 name = bfd_section_name (sec->output_section);
8640 if (strcmp (name, ".sdata") == 0
8641 || strcmp (name, ".sbss") == 0)
8642 sda = htab->sdata[0].sym;
8643 else if (strcmp (name, ".sdata2") == 0
8644 || strcmp (name, ".sbss2") == 0)
8645 sda = htab->sdata[1].sym;
8646 else
8647 {
8648 _bfd_error_handler
8649 /* xgettext:c-format */
8650 (_("%pB: the target (%s) of a %s relocation is "
8651 "in the wrong output section (%s)"),
8652 input_bfd,
8653 sym_name,
8654 howto->name,
8655 name);
8656
8657 bfd_set_error (bfd_error_bad_value);
8658 ret = FALSE;
8659 goto copy_reloc;
8660 }
8661
8662 if (sda == NULL || !is_static_defined (sda))
8663 {
8664 unresolved_reloc = TRUE;
8665 break;
8666 }
8667 value = relocation + addend - SYM_VAL (sda);
8668
8669 if (r_type == R_PPC_VLE_SDAREL_LO16A)
8670 ppc_elf_vle_split16 (input_bfd, input_section, rel->r_offset,
8671 contents + rel->r_offset, value,
8672 split16a_type,
8673 htab->params->vle_reloc_fixup);
8674 else if (r_type == R_PPC_VLE_SDAREL_LO16D)
8675 ppc_elf_vle_split16 (input_bfd, input_section, rel->r_offset,
8676 contents + rel->r_offset, value,
8677 split16d_type,
8678 htab->params->vle_reloc_fixup);
8679 else if (r_type == R_PPC_VLE_SDAREL_HI16A)
8680 {
8681 value = value >> 16;
8682 ppc_elf_vle_split16 (input_bfd, input_section, rel->r_offset,
8683 contents + rel->r_offset, value,
8684 split16a_type,
8685 htab->params->vle_reloc_fixup);
8686 }
8687 else if (r_type == R_PPC_VLE_SDAREL_HI16D)
8688 {
8689 value = value >> 16;
8690 ppc_elf_vle_split16 (input_bfd, input_section, rel->r_offset,
8691 contents + rel->r_offset, value,
8692 split16d_type,
8693 htab->params->vle_reloc_fixup);
8694 }
8695 else if (r_type == R_PPC_VLE_SDAREL_HA16A)
8696 {
8697 value = (value + 0x8000) >> 16;
8698 ppc_elf_vle_split16 (input_bfd, input_section, rel->r_offset,
8699 contents + rel->r_offset, value,
8700 split16a_type,
8701 htab->params->vle_reloc_fixup);
8702 }
8703 else if (r_type == R_PPC_VLE_SDAREL_HA16D)
8704 {
8705 value = (value + 0x8000) >> 16;
8706 ppc_elf_vle_split16 (input_bfd, input_section, rel->r_offset,
8707 contents + rel->r_offset, value,
8708 split16d_type,
8709 htab->params->vle_reloc_fixup);
8710 }
8711 }
8712 goto copy_reloc;
8713
8714 case R_PPC_VLE_ADDR20:
8715 ppc_elf_vle_split20 (output_bfd, contents + rel->r_offset, relocation);
8716 goto copy_reloc;
8717
8718 /* Relocate against the beginning of the section. */
8719 case R_PPC_SECTOFF:
8720 case R_PPC_SECTOFF_LO:
8721 case R_PPC_SECTOFF_HI:
8722 case R_PPC_SECTOFF_HA:
8723 if (sec == NULL || sec->output_section == NULL)
8724 {
8725 unresolved_reloc = TRUE;
8726 break;
8727 }
8728 addend -= sec->output_section->vma;
8729 break;
8730
8731 /* Negative relocations. */
8732 case R_PPC_EMB_NADDR32:
8733 case R_PPC_EMB_NADDR16:
8734 case R_PPC_EMB_NADDR16_LO:
8735 case R_PPC_EMB_NADDR16_HI:
8736 case R_PPC_EMB_NADDR16_HA:
8737 addend -= 2 * relocation;
8738 break;
8739
8740 case R_PPC_COPY:
8741 case R_PPC_GLOB_DAT:
8742 case R_PPC_JMP_SLOT:
8743 case R_PPC_RELATIVE:
8744 case R_PPC_IRELATIVE:
8745 case R_PPC_PLT32:
8746 case R_PPC_PLTREL32:
8747 case R_PPC_ADDR30:
8748 case R_PPC_EMB_RELSEC16:
8749 case R_PPC_EMB_RELST_LO:
8750 case R_PPC_EMB_RELST_HI:
8751 case R_PPC_EMB_RELST_HA:
8752 case R_PPC_EMB_BIT_FLD:
8753 /* xgettext:c-format */
8754 _bfd_error_handler (_("%pB: %s unsupported"),
8755 input_bfd, howto->name);
8756
8757 bfd_set_error (bfd_error_invalid_operation);
8758 ret = FALSE;
8759 goto copy_reloc;
8760 }
8761
8762 switch (r_type)
8763 {
8764 default:
8765 break;
8766
8767 case R_PPC_TPREL16_HA:
8768 if (htab->do_tls_opt && relocation + addend + 0x8000 < 0x10000)
8769 {
8770 bfd_byte *p = contents + (rel->r_offset & ~3);
8771 bfd_put_32 (input_bfd, NOP, p);
8772 }
8773 break;
8774
8775 case R_PPC_TPREL16_LO:
8776 if (htab->do_tls_opt && relocation + addend + 0x8000 < 0x10000)
8777 {
8778 bfd_byte *p = contents + (rel->r_offset & ~3);
8779 unsigned int insn = bfd_get_32 (input_bfd, p);
8780 insn &= ~(0x1f << 16);
8781 insn |= 2 << 16;
8782 bfd_put_32 (input_bfd, insn, p);
8783 }
8784 break;
8785 }
8786
8787 switch (r_type)
8788 {
8789 default:
8790 break;
8791
8792 case R_PPC_PLTCALL:
8793 if (unresolved_reloc)
8794 {
8795 bfd_byte *p = contents + rel->r_offset;
8796 unsigned int insn = bfd_get_32 (input_bfd, p);
8797 insn &= 1;
8798 bfd_put_32 (input_bfd, B | insn, p);
8799 unresolved_reloc = save_unresolved_reloc;
8800 r_type = R_PPC_REL24;
8801 howto = ppc_elf_howto_table[r_type];
8802 }
8803 else if (htab->plt_type != PLT_NEW)
8804 info->callbacks->einfo
8805 (_("%X%P: %H: %s relocation unsupported for bss-plt\n"),
8806 input_bfd, input_section, rel->r_offset,
8807 howto->name);
8808 break;
8809
8810 case R_PPC_PLTSEQ:
8811 case R_PPC_PLT16_HA:
8812 case R_PPC_PLT16_LO:
8813 if (unresolved_reloc)
8814 {
8815 bfd_byte *p = contents + (rel->r_offset & ~3);
8816 bfd_put_32 (input_bfd, NOP, p);
8817 unresolved_reloc = FALSE;
8818 r_type = R_PPC_NONE;
8819 howto = ppc_elf_howto_table[r_type];
8820 }
8821 else if (htab->plt_type != PLT_NEW)
8822 info->callbacks->einfo
8823 (_("%X%P: %H: %s relocation unsupported for bss-plt\n"),
8824 input_bfd, input_section, rel->r_offset,
8825 howto->name);
8826 break;
8827 }
8828
8829 /* Do any further special processing. */
8830 switch (r_type)
8831 {
8832 default:
8833 break;
8834
8835 case R_PPC_ADDR16_HA:
8836 case R_PPC_REL16_HA:
8837 case R_PPC_REL16DX_HA:
8838 case R_PPC_SECTOFF_HA:
8839 case R_PPC_TPREL16_HA:
8840 case R_PPC_DTPREL16_HA:
8841 case R_PPC_EMB_NADDR16_HA:
8842 case R_PPC_EMB_RELST_HA:
8843 /* It's just possible that this symbol is a weak symbol
8844 that's not actually defined anywhere. In that case,
8845 'sec' would be NULL, and we should leave the symbol
8846 alone (it will be set to zero elsewhere in the link). */
8847 if (sec == NULL)
8848 break;
8849 /* Fall through. */
8850
8851 case R_PPC_PLT16_HA:
8852 case R_PPC_GOT16_HA:
8853 case R_PPC_GOT_TLSGD16_HA:
8854 case R_PPC_GOT_TLSLD16_HA:
8855 case R_PPC_GOT_TPREL16_HA:
8856 case R_PPC_GOT_DTPREL16_HA:
8857 /* Add 0x10000 if sign bit in 0:15 is set.
8858 Bits 0:15 are not used. */
8859 addend += 0x8000;
8860 break;
8861
8862 case R_PPC_ADDR16:
8863 case R_PPC_ADDR16_LO:
8864 case R_PPC_GOT16:
8865 case R_PPC_GOT16_LO:
8866 case R_PPC_SDAREL16:
8867 case R_PPC_SECTOFF:
8868 case R_PPC_SECTOFF_LO:
8869 case R_PPC_DTPREL16:
8870 case R_PPC_DTPREL16_LO:
8871 case R_PPC_TPREL16:
8872 case R_PPC_TPREL16_LO:
8873 case R_PPC_GOT_TLSGD16:
8874 case R_PPC_GOT_TLSGD16_LO:
8875 case R_PPC_GOT_TLSLD16:
8876 case R_PPC_GOT_TLSLD16_LO:
8877 case R_PPC_GOT_DTPREL16:
8878 case R_PPC_GOT_DTPREL16_LO:
8879 case R_PPC_GOT_TPREL16:
8880 case R_PPC_GOT_TPREL16_LO:
8881 {
8882 /* The 32-bit ABI lacks proper relocations to deal with
8883 certain 64-bit instructions. Prevent damage to bits
8884 that make up part of the insn opcode. */
8885 unsigned int insn, mask, lobit;
8886
8887 insn = bfd_get_32 (input_bfd,
8888 contents + rel->r_offset - d_offset);
8889 mask = 0;
8890 if (is_insn_ds_form (insn))
8891 mask = 3;
8892 else if (is_insn_dq_form (insn))
8893 mask = 15;
8894 else
8895 break;
8896 relocation += addend;
8897 addend = insn & mask;
8898 lobit = mask & relocation;
8899 if (lobit != 0)
8900 {
8901 relocation ^= lobit;
8902 info->callbacks->einfo
8903 /* xgettext:c-format */
8904 (_("%H: error: %s against `%s' not a multiple of %u\n"),
8905 input_bfd, input_section, rel->r_offset,
8906 howto->name, sym_name, mask + 1);
8907 bfd_set_error (bfd_error_bad_value);
8908 ret = FALSE;
8909 }
8910 }
8911 break;
8912 }
8913
8914 #ifdef DEBUG
8915 fprintf (stderr, "\ttype = %s (%d), name = %s, symbol index = %ld, "
8916 "offset = %ld, addend = %ld\n",
8917 howto->name,
8918 (int) r_type,
8919 sym_name,
8920 r_symndx,
8921 (long) rel->r_offset,
8922 (long) addend);
8923 #endif
8924
8925 if (unresolved_reloc
8926 && !((input_section->flags & SEC_DEBUGGING) != 0
8927 && h->def_dynamic)
8928 && _bfd_elf_section_offset (output_bfd, info, input_section,
8929 rel->r_offset) != (bfd_vma) -1)
8930 {
8931 info->callbacks->einfo
8932 /* xgettext:c-format */
8933 (_("%H: unresolvable %s relocation against symbol `%s'\n"),
8934 input_bfd, input_section, rel->r_offset,
8935 howto->name,
8936 sym_name);
8937 ret = FALSE;
8938 }
8939
8940 /* 16-bit fields in insns mostly have signed values, but a
8941 few insns have 16-bit unsigned values. Really, we should
8942 have different reloc types. */
8943 if (howto->complain_on_overflow != complain_overflow_dont
8944 && howto->dst_mask == 0xffff
8945 && (input_section->flags & SEC_CODE) != 0)
8946 {
8947 enum complain_overflow complain = complain_overflow_signed;
8948
8949 if ((elf_section_flags (input_section) & SHF_PPC_VLE) == 0)
8950 {
8951 unsigned int insn;
8952
8953 insn = bfd_get_32 (input_bfd, contents + (rel->r_offset & ~3));
8954 if ((insn & (0x3fu << 26)) == 10u << 26 /* cmpli */)
8955 complain = complain_overflow_bitfield;
8956 else if ((insn & (0x3fu << 26)) == 28u << 26 /* andi */
8957 || (insn & (0x3fu << 26)) == 24u << 26 /* ori */
8958 || (insn & (0x3fu << 26)) == 26u << 26 /* xori */)
8959 complain = complain_overflow_unsigned;
8960 }
8961 if (howto->complain_on_overflow != complain)
8962 {
8963 alt_howto = *howto;
8964 alt_howto.complain_on_overflow = complain;
8965 howto = &alt_howto;
8966 }
8967 }
8968
8969 if (r_type == R_PPC_REL16DX_HA)
8970 {
8971 /* Split field reloc isn't handled by _bfd_final_link_relocate. */
8972 if (rel->r_offset + 4 > input_section->size)
8973 r = bfd_reloc_outofrange;
8974 else
8975 {
8976 unsigned int insn;
8977
8978 relocation += addend;
8979 relocation -= (rel->r_offset
8980 + input_section->output_offset
8981 + input_section->output_section->vma);
8982 relocation >>= 16;
8983 insn = bfd_get_32 (input_bfd, contents + rel->r_offset);
8984 insn &= ~0x1fffc1;
8985 insn |= (relocation & 0xffc1) | ((relocation & 0x3e) << 15);
8986 bfd_put_32 (input_bfd, insn, contents + rel->r_offset);
8987 r = bfd_reloc_ok;
8988 }
8989 }
8990 else
8991 r = _bfd_final_link_relocate (howto, input_bfd, input_section, contents,
8992 rel->r_offset, relocation, addend);
8993
8994 if (r != bfd_reloc_ok)
8995 {
8996 if (r == bfd_reloc_overflow)
8997 {
8998 overflow:
8999 /* On code like "if (foo) foo();" don't report overflow
9000 on a branch to zero when foo is undefined. */
9001 if (!warned
9002 && !(h != NULL
9003 && (h->root.type == bfd_link_hash_undefweak
9004 || h->root.type == bfd_link_hash_undefined)
9005 && is_branch_reloc (r_type)))
9006 info->callbacks->reloc_overflow
9007 (info, (h ? &h->root : NULL), sym_name, howto->name,
9008 rel->r_addend, input_bfd, input_section, rel->r_offset);
9009 }
9010 else
9011 {
9012 info->callbacks->einfo
9013 /* xgettext:c-format */
9014 (_("%H: %s reloc against `%s': error %d\n"),
9015 input_bfd, input_section, rel->r_offset,
9016 howto->name, sym_name, (int) r);
9017 ret = FALSE;
9018 }
9019 }
9020 copy_reloc:
9021 if (wrel != rel)
9022 *wrel = *rel;
9023 }
9024
9025 if (wrel != rel)
9026 {
9027 Elf_Internal_Shdr *rel_hdr;
9028 size_t deleted = rel - wrel;
9029
9030 rel_hdr = _bfd_elf_single_rel_hdr (input_section->output_section);
9031 rel_hdr->sh_size -= rel_hdr->sh_entsize * deleted;
9032 if (rel_hdr->sh_size == 0)
9033 {
9034 /* It is too late to remove an empty reloc section. Leave
9035 one NONE reloc.
9036 ??? What is wrong with an empty section??? */
9037 rel_hdr->sh_size = rel_hdr->sh_entsize;
9038 deleted -= 1;
9039 wrel++;
9040 }
9041 relend = wrel;
9042 rel_hdr = _bfd_elf_single_rel_hdr (input_section);
9043 rel_hdr->sh_size -= rel_hdr->sh_entsize * deleted;
9044 input_section->reloc_count -= deleted;
9045 }
9046
9047 #ifdef DEBUG
9048 fprintf (stderr, "\n");
9049 #endif
9050
9051 if (input_section->sec_info_type == SEC_INFO_TYPE_TARGET
9052 && input_section->size != input_section->rawsize
9053 && (strcmp (input_section->output_section->name, ".init") == 0
9054 || strcmp (input_section->output_section->name, ".fini") == 0))
9055 {
9056 /* Branch around the trampolines. */
9057 unsigned int insn = B + input_section->size - input_section->rawsize;
9058 bfd_put_32 (input_bfd, insn, contents + input_section->rawsize);
9059 }
9060
9061 if (htab->params->ppc476_workaround
9062 && input_section->sec_info_type == SEC_INFO_TYPE_TARGET
9063 && (!bfd_link_relocatable (info)
9064 || (input_section->output_section->alignment_power
9065 >= htab->params->pagesize_p2)))
9066 {
9067 bfd_vma start_addr, end_addr, addr;
9068 bfd_vma pagesize = (bfd_vma) 1 << htab->params->pagesize_p2;
9069
9070 if (relax_info->workaround_size != 0)
9071 {
9072 bfd_byte *p;
9073 unsigned int n;
9074 bfd_byte fill[4];
9075
9076 bfd_put_32 (input_bfd, BA, fill);
9077 p = contents + input_section->size - relax_info->workaround_size;
9078 n = relax_info->workaround_size >> 2;
9079 while (n--)
9080 {
9081 memcpy (p, fill, 4);
9082 p += 4;
9083 }
9084 }
9085
9086 /* The idea is: Replace the last instruction on a page with a
9087 branch to a patch area. Put the insn there followed by a
9088 branch back to the next page. Complicated a little by
9089 needing to handle moved conditional branches, and by not
9090 wanting to touch data-in-text. */
9091
9092 start_addr = (input_section->output_section->vma
9093 + input_section->output_offset);
9094 end_addr = (start_addr + input_section->size
9095 - relax_info->workaround_size);
9096 for (addr = ((start_addr & -pagesize) + pagesize - 4);
9097 addr < end_addr;
9098 addr += pagesize)
9099 {
9100 bfd_vma offset = addr - start_addr;
9101 Elf_Internal_Rela *lo, *hi;
9102 bfd_boolean is_data;
9103 bfd_vma patch_off, patch_addr;
9104 unsigned int insn;
9105
9106 /* Do we have a data reloc at this offset? If so, leave
9107 the word alone. */
9108 is_data = FALSE;
9109 lo = relocs;
9110 hi = relend;
9111 rel = NULL;
9112 while (lo < hi)
9113 {
9114 rel = lo + (hi - lo) / 2;
9115 if (rel->r_offset < offset)
9116 lo = rel + 1;
9117 else if (rel->r_offset > offset + 3)
9118 hi = rel;
9119 else
9120 {
9121 switch (ELF32_R_TYPE (rel->r_info))
9122 {
9123 case R_PPC_ADDR32:
9124 case R_PPC_UADDR32:
9125 case R_PPC_REL32:
9126 case R_PPC_ADDR30:
9127 is_data = TRUE;
9128 break;
9129 default:
9130 break;
9131 }
9132 break;
9133 }
9134 }
9135 if (is_data)
9136 continue;
9137
9138 /* Some instructions can be left alone too. Unconditional
9139 branches, except for bcctr with BO=0x14 (bctr, bctrl),
9140 avoid the icache failure.
9141
9142 The problem occurs due to prefetch across a page boundary
9143 where stale instructions can be fetched from the next
9144 page, and the mechanism for flushing these bad
9145 instructions fails under certain circumstances. The
9146 unconditional branches:
9147 1) Branch: b, bl, ba, bla,
9148 2) Branch Conditional: bc, bca, bcl, bcla,
9149 3) Branch Conditional to Link Register: bclr, bclrl,
9150 where (2) and (3) have BO=0x14 making them unconditional,
9151 prevent the bad prefetch because the prefetch itself is
9152 affected by these instructions. This happens even if the
9153 instruction is not executed.
9154
9155 A bctr example:
9156 .
9157 . lis 9,new_page@ha
9158 . addi 9,9,new_page@l
9159 . mtctr 9
9160 . bctr
9161 . nop
9162 . nop
9163 . new_page:
9164 .
9165 The bctr is not predicted taken due to ctr not being
9166 ready, so prefetch continues on past the bctr into the
9167 new page which might have stale instructions. If they
9168 fail to be flushed, then they will be executed after the
9169 bctr executes. Either of the following modifications
9170 prevent the bad prefetch from happening in the first
9171 place:
9172 .
9173 . lis 9,new_page@ha lis 9,new_page@ha
9174 . addi 9,9,new_page@l addi 9,9,new_page@l
9175 . mtctr 9 mtctr 9
9176 . bctr bctr
9177 . nop b somewhere_else
9178 . b somewhere_else nop
9179 . new_page: new_page:
9180 . */
9181 insn = bfd_get_32 (input_bfd, contents + offset);
9182 if ((insn & (0x3fu << 26)) == (18u << 26) /* b,bl,ba,bla */
9183 || ((insn & (0x3fu << 26)) == (16u << 26) /* bc,bcl,bca,bcla*/
9184 && (insn & (0x14 << 21)) == (0x14 << 21)) /* with BO=0x14 */
9185 || ((insn & (0x3fu << 26)) == (19u << 26)
9186 && (insn & (0x3ff << 1)) == (16u << 1) /* bclr,bclrl */
9187 && (insn & (0x14 << 21)) == (0x14 << 21)))/* with BO=0x14 */
9188 continue;
9189
9190 patch_addr = (start_addr + input_section->size
9191 - relax_info->workaround_size);
9192 patch_addr = (patch_addr + 15) & -16;
9193 patch_off = patch_addr - start_addr;
9194 bfd_put_32 (input_bfd, B + patch_off - offset, contents + offset);
9195
9196 if (rel != NULL
9197 && rel->r_offset >= offset
9198 && rel->r_offset < offset + 4)
9199 {
9200 asection *sreloc;
9201
9202 /* If the insn we are patching had a reloc, adjust the
9203 reloc r_offset so that the reloc applies to the moved
9204 location. This matters for -r and --emit-relocs. */
9205 if (rel + 1 != relend)
9206 {
9207 Elf_Internal_Rela tmp = *rel;
9208
9209 /* Keep the relocs sorted by r_offset. */
9210 memmove (rel, rel + 1, (relend - (rel + 1)) * sizeof (*rel));
9211 relend[-1] = tmp;
9212 }
9213 relend[-1].r_offset += patch_off - offset;
9214
9215 /* Adjust REL16 addends too. */
9216 switch (ELF32_R_TYPE (relend[-1].r_info))
9217 {
9218 case R_PPC_REL16:
9219 case R_PPC_REL16_LO:
9220 case R_PPC_REL16_HI:
9221 case R_PPC_REL16_HA:
9222 relend[-1].r_addend += patch_off - offset;
9223 break;
9224 default:
9225 break;
9226 }
9227
9228 /* If we are building a PIE or shared library with
9229 non-PIC objects, perhaps we had a dynamic reloc too?
9230 If so, the dynamic reloc must move with the insn. */
9231 sreloc = elf_section_data (input_section)->sreloc;
9232 if (sreloc != NULL)
9233 {
9234 Elf32_External_Rela *slo, *shi, *srelend;
9235 bfd_vma soffset;
9236
9237 slo = (Elf32_External_Rela *) sreloc->contents;
9238 shi = srelend = slo + sreloc->reloc_count;
9239 soffset = (offset + input_section->output_section->vma
9240 + input_section->output_offset);
9241 while (slo < shi)
9242 {
9243 Elf32_External_Rela *srel = slo + (shi - slo) / 2;
9244 bfd_elf32_swap_reloca_in (output_bfd, (bfd_byte *) srel,
9245 &outrel);
9246 if (outrel.r_offset < soffset)
9247 slo = srel + 1;
9248 else if (outrel.r_offset > soffset + 3)
9249 shi = srel;
9250 else
9251 {
9252 if (srel + 1 != srelend)
9253 {
9254 memmove (srel, srel + 1,
9255 (srelend - (srel + 1)) * sizeof (*srel));
9256 srel = srelend - 1;
9257 }
9258 outrel.r_offset += patch_off - offset;
9259 bfd_elf32_swap_reloca_out (output_bfd, &outrel,
9260 (bfd_byte *) srel);
9261 break;
9262 }
9263 }
9264 }
9265 }
9266 else
9267 rel = NULL;
9268
9269 if ((insn & (0x3fu << 26)) == (16u << 26) /* bc */
9270 && (insn & 2) == 0 /* relative */)
9271 {
9272 bfd_vma delta = ((insn & 0xfffc) ^ 0x8000) - 0x8000;
9273
9274 delta += offset - patch_off;
9275 if (bfd_link_relocatable (info) && rel != NULL)
9276 delta = 0;
9277 if (!bfd_link_relocatable (info) && rel != NULL)
9278 {
9279 enum elf_ppc_reloc_type r_type;
9280
9281 r_type = ELF32_R_TYPE (relend[-1].r_info);
9282 if (r_type == R_PPC_REL14_BRTAKEN)
9283 insn |= BRANCH_PREDICT_BIT;
9284 else if (r_type == R_PPC_REL14_BRNTAKEN)
9285 insn &= ~BRANCH_PREDICT_BIT;
9286 else
9287 BFD_ASSERT (r_type == R_PPC_REL14);
9288
9289 if ((r_type == R_PPC_REL14_BRTAKEN
9290 || r_type == R_PPC_REL14_BRNTAKEN)
9291 && delta + 0x8000 < 0x10000
9292 && (bfd_signed_vma) delta < 0)
9293 insn ^= BRANCH_PREDICT_BIT;
9294 }
9295 if (delta + 0x8000 < 0x10000)
9296 {
9297 bfd_put_32 (input_bfd,
9298 (insn & ~0xfffc) | (delta & 0xfffc),
9299 contents + patch_off);
9300 patch_off += 4;
9301 bfd_put_32 (input_bfd,
9302 B | ((offset + 4 - patch_off) & 0x3fffffc),
9303 contents + patch_off);
9304 patch_off += 4;
9305 }
9306 else
9307 {
9308 if (rel != NULL)
9309 {
9310 unsigned int r_sym = ELF32_R_SYM (relend[-1].r_info);
9311
9312 relend[-1].r_offset += 8;
9313 relend[-1].r_info = ELF32_R_INFO (r_sym, R_PPC_REL24);
9314 }
9315 bfd_put_32 (input_bfd,
9316 (insn & ~0xfffc) | 8,
9317 contents + patch_off);
9318 patch_off += 4;
9319 bfd_put_32 (input_bfd,
9320 B | ((offset + 4 - patch_off) & 0x3fffffc),
9321 contents + patch_off);
9322 patch_off += 4;
9323 bfd_put_32 (input_bfd,
9324 B | ((delta - 8) & 0x3fffffc),
9325 contents + patch_off);
9326 patch_off += 4;
9327 }
9328 }
9329 else
9330 {
9331 bfd_put_32 (input_bfd, insn, contents + patch_off);
9332 patch_off += 4;
9333 bfd_put_32 (input_bfd,
9334 B | ((offset + 4 - patch_off) & 0x3fffffc),
9335 contents + patch_off);
9336 patch_off += 4;
9337 }
9338 BFD_ASSERT (patch_off <= input_section->size);
9339 relax_info->workaround_size = input_section->size - patch_off;
9340 }
9341 }
9342
9343 return ret;
9344 }
9345 \f
9346 /* Write out the PLT relocs and entries for H. */
9347
9348 static bfd_boolean
9349 write_global_sym_plt (struct elf_link_hash_entry *h, void *inf)
9350 {
9351 struct bfd_link_info *info = (struct bfd_link_info *) inf;
9352 struct ppc_elf_link_hash_table *htab = ppc_elf_hash_table (info);
9353 struct plt_entry *ent;
9354 bfd_boolean doneone;
9355
9356 doneone = FALSE;
9357 for (ent = h->plt.plist; ent != NULL; ent = ent->next)
9358 if (ent->plt.offset != (bfd_vma) -1)
9359 {
9360 bfd_boolean dyn = !use_local_plt (info, h);
9361
9362 if (!doneone)
9363 {
9364 Elf_Internal_Rela rela;
9365 bfd_byte *loc;
9366 bfd_vma reloc_index;
9367 asection *plt = htab->elf.splt;
9368 asection *relplt = htab->elf.srelplt;
9369
9370 if (htab->plt_type == PLT_NEW || !dyn)
9371 reloc_index = ent->plt.offset / 4;
9372 else
9373 {
9374 reloc_index = ((ent->plt.offset - htab->plt_initial_entry_size)
9375 / htab->plt_slot_size);
9376 if (reloc_index > PLT_NUM_SINGLE_ENTRIES
9377 && htab->plt_type == PLT_OLD)
9378 reloc_index -= (reloc_index - PLT_NUM_SINGLE_ENTRIES) / 2;
9379 }
9380
9381 /* This symbol has an entry in the procedure linkage table.
9382 Set it up. */
9383 if (htab->plt_type == PLT_VXWORKS && dyn)
9384 {
9385 bfd_vma got_offset;
9386 const bfd_vma *plt_entry;
9387
9388 /* The first three entries in .got.plt are reserved. */
9389 got_offset = (reloc_index + 3) * 4;
9390
9391 /* Use the right PLT. */
9392 plt_entry = bfd_link_pic (info) ? ppc_elf_vxworks_pic_plt_entry
9393 : ppc_elf_vxworks_plt_entry;
9394
9395 /* Fill in the .plt on VxWorks. */
9396 if (bfd_link_pic (info))
9397 {
9398 bfd_put_32 (info->output_bfd,
9399 plt_entry[0] | PPC_HA (got_offset),
9400 plt->contents + ent->plt.offset + 0);
9401 bfd_put_32 (info->output_bfd,
9402 plt_entry[1] | PPC_LO (got_offset),
9403 plt->contents + ent->plt.offset + 4);
9404 }
9405 else
9406 {
9407 bfd_vma got_loc = got_offset + SYM_VAL (htab->elf.hgot);
9408
9409 bfd_put_32 (info->output_bfd,
9410 plt_entry[0] | PPC_HA (got_loc),
9411 plt->contents + ent->plt.offset + 0);
9412 bfd_put_32 (info->output_bfd,
9413 plt_entry[1] | PPC_LO (got_loc),
9414 plt->contents + ent->plt.offset + 4);
9415 }
9416
9417 bfd_put_32 (info->output_bfd, plt_entry[2],
9418 plt->contents + ent->plt.offset + 8);
9419 bfd_put_32 (info->output_bfd, plt_entry[3],
9420 plt->contents + ent->plt.offset + 12);
9421
9422 /* This instruction is an immediate load. The value loaded is
9423 the byte offset of the R_PPC_JMP_SLOT relocation from the
9424 start of the .rela.plt section. The value is stored in the
9425 low-order 16 bits of the load instruction. */
9426 /* NOTE: It appears that this is now an index rather than a
9427 prescaled offset. */
9428 bfd_put_32 (info->output_bfd,
9429 plt_entry[4] | reloc_index,
9430 plt->contents + ent->plt.offset + 16);
9431 /* This instruction is a PC-relative branch whose target is
9432 the start of the PLT section. The address of this branch
9433 instruction is 20 bytes beyond the start of this PLT entry.
9434 The address is encoded in bits 6-29, inclusive. The value
9435 stored is right-shifted by two bits, permitting a 26-bit
9436 offset. */
9437 bfd_put_32 (info->output_bfd,
9438 (plt_entry[5]
9439 | (-(ent->plt.offset + 20) & 0x03fffffc)),
9440 plt->contents + ent->plt.offset + 20);
9441 bfd_put_32 (info->output_bfd, plt_entry[6],
9442 plt->contents + ent->plt.offset + 24);
9443 bfd_put_32 (info->output_bfd, plt_entry[7],
9444 plt->contents + ent->plt.offset + 28);
9445
9446 /* Fill in the GOT entry corresponding to this PLT slot with
9447 the address immediately after the "bctr" instruction
9448 in this PLT entry. */
9449 bfd_put_32 (info->output_bfd, (plt->output_section->vma
9450 + plt->output_offset
9451 + ent->plt.offset + 16),
9452 htab->elf.sgotplt->contents + got_offset);
9453
9454 if (!bfd_link_pic (info))
9455 {
9456 /* Fill in a couple of entries in .rela.plt.unloaded. */
9457 loc = htab->srelplt2->contents
9458 + ((VXWORKS_PLTRESOLVE_RELOCS + reloc_index
9459 * VXWORKS_PLT_NON_JMP_SLOT_RELOCS)
9460 * sizeof (Elf32_External_Rela));
9461
9462 /* Provide the @ha relocation for the first instruction. */
9463 rela.r_offset = (plt->output_section->vma
9464 + plt->output_offset
9465 + ent->plt.offset + 2);
9466 rela.r_info = ELF32_R_INFO (htab->elf.hgot->indx,
9467 R_PPC_ADDR16_HA);
9468 rela.r_addend = got_offset;
9469 bfd_elf32_swap_reloca_out (info->output_bfd, &rela, loc);
9470 loc += sizeof (Elf32_External_Rela);
9471
9472 /* Provide the @l relocation for the second instruction. */
9473 rela.r_offset = (plt->output_section->vma
9474 + plt->output_offset
9475 + ent->plt.offset + 6);
9476 rela.r_info = ELF32_R_INFO (htab->elf.hgot->indx,
9477 R_PPC_ADDR16_LO);
9478 rela.r_addend = got_offset;
9479 bfd_elf32_swap_reloca_out (info->output_bfd, &rela, loc);
9480 loc += sizeof (Elf32_External_Rela);
9481
9482 /* Provide a relocation for the GOT entry corresponding to this
9483 PLT slot. Point it at the middle of the .plt entry. */
9484 rela.r_offset = (htab->elf.sgotplt->output_section->vma
9485 + htab->elf.sgotplt->output_offset
9486 + got_offset);
9487 rela.r_info = ELF32_R_INFO (htab->elf.hplt->indx,
9488 R_PPC_ADDR32);
9489 rela.r_addend = ent->plt.offset + 16;
9490 bfd_elf32_swap_reloca_out (info->output_bfd, &rela, loc);
9491 }
9492
9493 /* VxWorks uses non-standard semantics for R_PPC_JMP_SLOT.
9494 In particular, the offset for the relocation is not the
9495 address of the PLT entry for this function, as specified
9496 by the ABI. Instead, the offset is set to the address of
9497 the GOT slot for this function. See EABI 4.4.4.1. */
9498 rela.r_offset = (htab->elf.sgotplt->output_section->vma
9499 + htab->elf.sgotplt->output_offset
9500 + got_offset);
9501 rela.r_addend = 0;
9502 }
9503 else
9504 {
9505 rela.r_addend = 0;
9506 if (!dyn)
9507 {
9508 if (h->type == STT_GNU_IFUNC)
9509 {
9510 plt = htab->elf.iplt;
9511 relplt = htab->elf.irelplt;
9512 }
9513 else
9514 {
9515 plt = htab->pltlocal;
9516 relplt = bfd_link_pic (info) ? htab->relpltlocal : NULL;
9517 }
9518 if (h->def_regular
9519 && (h->root.type == bfd_link_hash_defined
9520 || h->root.type == bfd_link_hash_defweak))
9521 rela.r_addend = SYM_VAL (h);
9522 }
9523
9524 if (relplt == NULL)
9525 {
9526 loc = plt->contents + ent->plt.offset;
9527 bfd_put_32 (info->output_bfd, rela.r_addend, loc);
9528 }
9529 else
9530 {
9531 rela.r_offset = (plt->output_section->vma
9532 + plt->output_offset
9533 + ent->plt.offset);
9534
9535 if (htab->plt_type == PLT_OLD || !dyn)
9536 {
9537 /* We don't need to fill in the .plt. The ppc dynamic
9538 linker will fill it in. */
9539 }
9540 else
9541 {
9542 bfd_vma val = (htab->glink_pltresolve + ent->plt.offset
9543 + htab->glink->output_section->vma
9544 + htab->glink->output_offset);
9545 bfd_put_32 (info->output_bfd, val,
9546 plt->contents + ent->plt.offset);
9547 }
9548 }
9549 }
9550
9551 if (relplt != NULL)
9552 {
9553 /* Fill in the entry in the .rela.plt section. */
9554 if (!dyn)
9555 {
9556 if (h->type == STT_GNU_IFUNC)
9557 rela.r_info = ELF32_R_INFO (0, R_PPC_IRELATIVE);
9558 else
9559 rela.r_info = ELF32_R_INFO (0, R_PPC_RELATIVE);
9560 loc = relplt->contents + (relplt->reloc_count++
9561 * sizeof (Elf32_External_Rela));
9562 htab->local_ifunc_resolver = 1;
9563 }
9564 else
9565 {
9566 rela.r_info = ELF32_R_INFO (h->dynindx, R_PPC_JMP_SLOT);
9567 loc = relplt->contents + (reloc_index
9568 * sizeof (Elf32_External_Rela));
9569 if (h->type == STT_GNU_IFUNC && is_static_defined (h))
9570 htab->maybe_local_ifunc_resolver = 1;
9571 }
9572 bfd_elf32_swap_reloca_out (info->output_bfd, &rela, loc);
9573 }
9574 doneone = TRUE;
9575 }
9576
9577 if (htab->plt_type == PLT_NEW || !dyn)
9578 {
9579 unsigned char *p;
9580 asection *plt = htab->elf.splt;
9581
9582 if (!dyn)
9583 {
9584 if (h->type == STT_GNU_IFUNC)
9585 plt = htab->elf.iplt;
9586 else
9587 break;
9588 }
9589
9590 p = (unsigned char *) htab->glink->contents + ent->glink_offset;
9591 write_glink_stub (h, ent, plt, p, info);
9592
9593 if (!bfd_link_pic (info))
9594 /* We only need one non-PIC glink stub. */
9595 break;
9596 }
9597 else
9598 break;
9599 }
9600 return TRUE;
9601 }
9602
9603 /* Finish up PLT handling. */
9604
9605 bfd_boolean
9606 ppc_finish_symbols (struct bfd_link_info *info)
9607 {
9608 struct ppc_elf_link_hash_table *htab = ppc_elf_hash_table (info);
9609 bfd *ibfd;
9610
9611 if (!htab)
9612 return TRUE;
9613
9614 elf_link_hash_traverse (&htab->elf, write_global_sym_plt, info);
9615
9616 for (ibfd = info->input_bfds; ibfd != NULL; ibfd = ibfd->link.next)
9617 {
9618 bfd_vma *local_got, *end_local_got;
9619 struct plt_entry **local_plt, **lplt, **end_local_plt;
9620 Elf_Internal_Shdr *symtab_hdr;
9621 bfd_size_type locsymcount;
9622 Elf_Internal_Sym *local_syms = NULL;
9623 struct plt_entry *ent;
9624
9625 if (!is_ppc_elf (ibfd))
9626 continue;
9627
9628 local_got = elf_local_got_offsets (ibfd);
9629 if (!local_got)
9630 continue;
9631
9632 symtab_hdr = &elf_symtab_hdr (ibfd);
9633 locsymcount = symtab_hdr->sh_info;
9634 end_local_got = local_got + locsymcount;
9635 local_plt = (struct plt_entry **) end_local_got;
9636 end_local_plt = local_plt + locsymcount;
9637 for (lplt = local_plt; lplt < end_local_plt; ++lplt)
9638 for (ent = *lplt; ent != NULL; ent = ent->next)
9639 {
9640 if (ent->plt.offset != (bfd_vma) -1)
9641 {
9642 Elf_Internal_Sym *sym;
9643 asection *sym_sec;
9644 asection *plt, *relplt;
9645 bfd_byte *loc;
9646 bfd_vma val;
9647 Elf_Internal_Rela rela;
9648 unsigned char *p;
9649
9650 if (!get_sym_h (NULL, &sym, &sym_sec, NULL, &local_syms,
9651 lplt - local_plt, ibfd))
9652 {
9653 if (symtab_hdr->contents != (unsigned char *) local_syms)
9654 free (local_syms);
9655 return FALSE;
9656 }
9657
9658 val = sym->st_value;
9659 if (sym_sec != NULL && sym_sec->output_section != NULL)
9660 val += sym_sec->output_offset + sym_sec->output_section->vma;
9661
9662 if (ELF_ST_TYPE (sym->st_info) == STT_GNU_IFUNC)
9663 {
9664 htab->local_ifunc_resolver = 1;
9665 plt = htab->elf.iplt;
9666 relplt = htab->elf.irelplt;
9667 rela.r_info = ELF32_R_INFO (0, R_PPC_IRELATIVE);
9668 }
9669 else
9670 {
9671 plt = htab->pltlocal;
9672 if (bfd_link_pic (info))
9673 {
9674 relplt = htab->relpltlocal;
9675 rela.r_info = ELF32_R_INFO (0, R_PPC_RELATIVE);
9676 }
9677 else
9678 {
9679 loc = plt->contents + ent->plt.offset;
9680 bfd_put_32 (info->output_bfd, val, loc);
9681 continue;
9682 }
9683 }
9684
9685 rela.r_offset = (ent->plt.offset
9686 + plt->output_offset
9687 + plt->output_section->vma);
9688 rela.r_addend = val;
9689 loc = relplt->contents + (relplt->reloc_count++
9690 * sizeof (Elf32_External_Rela));
9691 bfd_elf32_swap_reloca_out (info->output_bfd, &rela, loc);
9692
9693 p = (unsigned char *) htab->glink->contents + ent->glink_offset;
9694 write_glink_stub (NULL, ent, htab->elf.iplt, p, info);
9695 }
9696 }
9697
9698 if (local_syms != NULL
9699 && symtab_hdr->contents != (unsigned char *) local_syms)
9700 {
9701 if (!info->keep_memory)
9702 free (local_syms);
9703 else
9704 symtab_hdr->contents = (unsigned char *) local_syms;
9705 }
9706 }
9707 return TRUE;
9708 }
9709
9710 /* Finish up dynamic symbol handling. We set the contents of various
9711 dynamic sections here. */
9712
9713 static bfd_boolean
9714 ppc_elf_finish_dynamic_symbol (bfd *output_bfd,
9715 struct bfd_link_info *info,
9716 struct elf_link_hash_entry *h,
9717 Elf_Internal_Sym *sym)
9718 {
9719 struct ppc_elf_link_hash_table *htab = ppc_elf_hash_table (info);
9720 struct plt_entry *ent;
9721
9722 #ifdef DEBUG
9723 fprintf (stderr, "ppc_elf_finish_dynamic_symbol called for %s",
9724 h->root.root.string);
9725 #endif
9726
9727 if (!h->def_regular
9728 || (h->type == STT_GNU_IFUNC && !bfd_link_pic (info)))
9729 for (ent = h->plt.plist; ent != NULL; ent = ent->next)
9730 if (ent->plt.offset != (bfd_vma) -1)
9731 {
9732 if (!h->def_regular)
9733 {
9734 /* Mark the symbol as undefined, rather than as
9735 defined in the .plt section. Leave the value if
9736 there were any relocations where pointer equality
9737 matters (this is a clue for the dynamic linker, to
9738 make function pointer comparisons work between an
9739 application and shared library), otherwise set it
9740 to zero. */
9741 sym->st_shndx = SHN_UNDEF;
9742 if (!h->pointer_equality_needed)
9743 sym->st_value = 0;
9744 else if (!h->ref_regular_nonweak)
9745 {
9746 /* This breaks function pointer comparisons, but
9747 that is better than breaking tests for a NULL
9748 function pointer. */
9749 sym->st_value = 0;
9750 }
9751 }
9752 else
9753 {
9754 /* Set the value of ifunc symbols in a non-pie
9755 executable to the glink entry. This is to avoid
9756 text relocations. We can't do this for ifunc in
9757 allocate_dynrelocs, as we do for normal dynamic
9758 function symbols with plt entries, because we need
9759 to keep the original value around for the ifunc
9760 relocation. */
9761 sym->st_shndx
9762 = (_bfd_elf_section_from_bfd_section
9763 (info->output_bfd, htab->glink->output_section));
9764 sym->st_value = (ent->glink_offset
9765 + htab->glink->output_offset
9766 + htab->glink->output_section->vma);
9767 }
9768 break;
9769 }
9770
9771 if (h->needs_copy)
9772 {
9773 asection *s;
9774 Elf_Internal_Rela rela;
9775 bfd_byte *loc;
9776
9777 /* This symbols needs a copy reloc. Set it up. */
9778
9779 #ifdef DEBUG
9780 fprintf (stderr, ", copy");
9781 #endif
9782
9783 BFD_ASSERT (h->dynindx != -1);
9784
9785 if (ppc_elf_hash_entry (h)->has_sda_refs)
9786 s = htab->relsbss;
9787 else if (h->root.u.def.section == htab->elf.sdynrelro)
9788 s = htab->elf.sreldynrelro;
9789 else
9790 s = htab->elf.srelbss;
9791 BFD_ASSERT (s != NULL);
9792
9793 rela.r_offset = SYM_VAL (h);
9794 rela.r_info = ELF32_R_INFO (h->dynindx, R_PPC_COPY);
9795 rela.r_addend = 0;
9796 loc = s->contents + s->reloc_count++ * sizeof (Elf32_External_Rela);
9797 bfd_elf32_swap_reloca_out (output_bfd, &rela, loc);
9798 }
9799
9800 #ifdef DEBUG
9801 fprintf (stderr, "\n");
9802 #endif
9803
9804 return TRUE;
9805 }
9806 \f
9807 static enum elf_reloc_type_class
9808 ppc_elf_reloc_type_class (const struct bfd_link_info *info,
9809 const asection *rel_sec,
9810 const Elf_Internal_Rela *rela)
9811 {
9812 struct ppc_elf_link_hash_table *htab = ppc_elf_hash_table (info);
9813
9814 if (rel_sec == htab->elf.irelplt)
9815 return reloc_class_ifunc;
9816
9817 switch (ELF32_R_TYPE (rela->r_info))
9818 {
9819 case R_PPC_RELATIVE:
9820 return reloc_class_relative;
9821 case R_PPC_JMP_SLOT:
9822 return reloc_class_plt;
9823 case R_PPC_COPY:
9824 return reloc_class_copy;
9825 default:
9826 return reloc_class_normal;
9827 }
9828 }
9829 \f
9830 /* Finish up the dynamic sections. */
9831
9832 static bfd_boolean
9833 ppc_elf_finish_dynamic_sections (bfd *output_bfd,
9834 struct bfd_link_info *info)
9835 {
9836 asection *sdyn;
9837 struct ppc_elf_link_hash_table *htab;
9838 bfd_vma got;
9839 bfd *dynobj;
9840 bfd_boolean ret = TRUE;
9841
9842 #ifdef DEBUG
9843 fprintf (stderr, "ppc_elf_finish_dynamic_sections called\n");
9844 #endif
9845
9846 htab = ppc_elf_hash_table (info);
9847 dynobj = htab->elf.dynobj;
9848 sdyn = bfd_get_linker_section (dynobj, ".dynamic");
9849
9850 got = 0;
9851 if (htab->elf.hgot != NULL)
9852 got = SYM_VAL (htab->elf.hgot);
9853
9854 if (htab->elf.dynamic_sections_created)
9855 {
9856 Elf32_External_Dyn *dyncon, *dynconend;
9857
9858 BFD_ASSERT (htab->elf.splt != NULL && sdyn != NULL);
9859
9860 dyncon = (Elf32_External_Dyn *) sdyn->contents;
9861 dynconend = (Elf32_External_Dyn *) (sdyn->contents + sdyn->size);
9862 for (; dyncon < dynconend; dyncon++)
9863 {
9864 Elf_Internal_Dyn dyn;
9865 asection *s;
9866
9867 bfd_elf32_swap_dyn_in (dynobj, dyncon, &dyn);
9868
9869 switch (dyn.d_tag)
9870 {
9871 case DT_PLTGOT:
9872 if (htab->elf.target_os == is_vxworks)
9873 s = htab->elf.sgotplt;
9874 else
9875 s = htab->elf.splt;
9876 dyn.d_un.d_ptr = s->output_section->vma + s->output_offset;
9877 break;
9878
9879 case DT_PLTRELSZ:
9880 dyn.d_un.d_val = htab->elf.srelplt->size;
9881 break;
9882
9883 case DT_JMPREL:
9884 s = htab->elf.srelplt;
9885 dyn.d_un.d_ptr = s->output_section->vma + s->output_offset;
9886 break;
9887
9888 case DT_PPC_GOT:
9889 dyn.d_un.d_ptr = got;
9890 break;
9891
9892 case DT_TEXTREL:
9893 if (htab->local_ifunc_resolver)
9894 info->callbacks->einfo
9895 (_("%X%P: text relocations and GNU indirect "
9896 "functions will result in a segfault at runtime\n"));
9897 else if (htab->maybe_local_ifunc_resolver)
9898 info->callbacks->einfo
9899 (_("%P: warning: text relocations and GNU indirect "
9900 "functions may result in a segfault at runtime\n"));
9901 continue;
9902
9903 default:
9904 if (htab->elf.target_os == is_vxworks
9905 && elf_vxworks_finish_dynamic_entry (output_bfd, &dyn))
9906 break;
9907 continue;
9908 }
9909
9910 bfd_elf32_swap_dyn_out (output_bfd, &dyn, dyncon);
9911 }
9912 }
9913
9914 if (htab->elf.sgot != NULL
9915 && htab->elf.sgot->output_section != bfd_abs_section_ptr)
9916 {
9917 if (htab->elf.hgot->root.u.def.section == htab->elf.sgot
9918 || htab->elf.hgot->root.u.def.section == htab->elf.sgotplt)
9919 {
9920 unsigned char *p = htab->elf.hgot->root.u.def.section->contents;
9921
9922 p += htab->elf.hgot->root.u.def.value;
9923 if (htab->plt_type == PLT_OLD)
9924 {
9925 /* Add a blrl instruction at _GLOBAL_OFFSET_TABLE_-4
9926 so that a function can easily find the address of
9927 _GLOBAL_OFFSET_TABLE_. */
9928 BFD_ASSERT (htab->elf.hgot->root.u.def.value - 4
9929 < htab->elf.hgot->root.u.def.section->size);
9930 bfd_put_32 (output_bfd, 0x4e800021, p - 4);
9931 }
9932
9933 if (sdyn != NULL)
9934 {
9935 bfd_vma val = sdyn->output_section->vma + sdyn->output_offset;
9936 BFD_ASSERT (htab->elf.hgot->root.u.def.value
9937 < htab->elf.hgot->root.u.def.section->size);
9938 bfd_put_32 (output_bfd, val, p);
9939 }
9940 }
9941 else
9942 {
9943 /* xgettext:c-format */
9944 _bfd_error_handler (_("%s not defined in linker created %pA"),
9945 htab->elf.hgot->root.root.string,
9946 (htab->elf.sgotplt != NULL
9947 ? htab->elf.sgotplt : htab->elf.sgot));
9948 bfd_set_error (bfd_error_bad_value);
9949 ret = FALSE;
9950 }
9951
9952 elf_section_data (htab->elf.sgot->output_section)->this_hdr.sh_entsize = 4;
9953 }
9954
9955 /* Fill in the first entry in the VxWorks procedure linkage table. */
9956 if (htab->elf.target_os == is_vxworks
9957 && htab->elf.splt != NULL
9958 && htab->elf.splt->size != 0
9959 && htab->elf.splt->output_section != bfd_abs_section_ptr)
9960 {
9961 asection *splt = htab->elf.splt;
9962 /* Use the right PLT. */
9963 const bfd_vma *plt_entry = (bfd_link_pic (info)
9964 ? ppc_elf_vxworks_pic_plt0_entry
9965 : ppc_elf_vxworks_plt0_entry);
9966
9967 if (!bfd_link_pic (info))
9968 {
9969 bfd_vma got_value = SYM_VAL (htab->elf.hgot);
9970
9971 bfd_put_32 (output_bfd, plt_entry[0] | PPC_HA (got_value),
9972 splt->contents + 0);
9973 bfd_put_32 (output_bfd, plt_entry[1] | PPC_LO (got_value),
9974 splt->contents + 4);
9975 }
9976 else
9977 {
9978 bfd_put_32 (output_bfd, plt_entry[0], splt->contents + 0);
9979 bfd_put_32 (output_bfd, plt_entry[1], splt->contents + 4);
9980 }
9981 bfd_put_32 (output_bfd, plt_entry[2], splt->contents + 8);
9982 bfd_put_32 (output_bfd, plt_entry[3], splt->contents + 12);
9983 bfd_put_32 (output_bfd, plt_entry[4], splt->contents + 16);
9984 bfd_put_32 (output_bfd, plt_entry[5], splt->contents + 20);
9985 bfd_put_32 (output_bfd, plt_entry[6], splt->contents + 24);
9986 bfd_put_32 (output_bfd, plt_entry[7], splt->contents + 28);
9987
9988 if (! bfd_link_pic (info))
9989 {
9990 Elf_Internal_Rela rela;
9991 bfd_byte *loc;
9992
9993 loc = htab->srelplt2->contents;
9994
9995 /* Output the @ha relocation for the first instruction. */
9996 rela.r_offset = (htab->elf.splt->output_section->vma
9997 + htab->elf.splt->output_offset
9998 + 2);
9999 rela.r_info = ELF32_R_INFO (htab->elf.hgot->indx, R_PPC_ADDR16_HA);
10000 rela.r_addend = 0;
10001 bfd_elf32_swap_reloca_out (output_bfd, &rela, loc);
10002 loc += sizeof (Elf32_External_Rela);
10003
10004 /* Output the @l relocation for the second instruction. */
10005 rela.r_offset = (htab->elf.splt->output_section->vma
10006 + htab->elf.splt->output_offset
10007 + 6);
10008 rela.r_info = ELF32_R_INFO (htab->elf.hgot->indx, R_PPC_ADDR16_LO);
10009 rela.r_addend = 0;
10010 bfd_elf32_swap_reloca_out (output_bfd, &rela, loc);
10011 loc += sizeof (Elf32_External_Rela);
10012
10013 /* Fix up the remaining relocations. They may have the wrong
10014 symbol index for _G_O_T_ or _P_L_T_ depending on the order
10015 in which symbols were output. */
10016 while (loc < htab->srelplt2->contents + htab->srelplt2->size)
10017 {
10018 Elf_Internal_Rela rel;
10019
10020 bfd_elf32_swap_reloc_in (output_bfd, loc, &rel);
10021 rel.r_info = ELF32_R_INFO (htab->elf.hgot->indx, R_PPC_ADDR16_HA);
10022 bfd_elf32_swap_reloc_out (output_bfd, &rel, loc);
10023 loc += sizeof (Elf32_External_Rela);
10024
10025 bfd_elf32_swap_reloc_in (output_bfd, loc, &rel);
10026 rel.r_info = ELF32_R_INFO (htab->elf.hgot->indx, R_PPC_ADDR16_LO);
10027 bfd_elf32_swap_reloc_out (output_bfd, &rel, loc);
10028 loc += sizeof (Elf32_External_Rela);
10029
10030 bfd_elf32_swap_reloc_in (output_bfd, loc, &rel);
10031 rel.r_info = ELF32_R_INFO (htab->elf.hplt->indx, R_PPC_ADDR32);
10032 bfd_elf32_swap_reloc_out (output_bfd, &rel, loc);
10033 loc += sizeof (Elf32_External_Rela);
10034 }
10035 }
10036 }
10037
10038 if (htab->glink != NULL
10039 && htab->glink->contents != NULL
10040 && htab->elf.dynamic_sections_created)
10041 {
10042 unsigned char *p;
10043 unsigned char *endp;
10044 bfd_vma res0;
10045
10046 /*
10047 * PIC glink code is the following:
10048 *
10049 * # ith PLT code stub.
10050 * addis 11,30,(plt+(i-1)*4-got)@ha
10051 * lwz 11,(plt+(i-1)*4-got)@l(11)
10052 * mtctr 11
10053 * bctr
10054 *
10055 * # A table of branches, one for each plt entry.
10056 * # The idea is that the plt call stub loads ctr and r11 with these
10057 * # addresses, so (r11 - res_0) gives the plt index * 4.
10058 * res_0: b PLTresolve
10059 * res_1: b PLTresolve
10060 * .
10061 * # Some number of entries towards the end can be nops
10062 * res_n_m3: nop
10063 * res_n_m2: nop
10064 * res_n_m1:
10065 *
10066 * PLTresolve:
10067 * addis 11,11,(1f-res_0)@ha
10068 * mflr 0
10069 * bcl 20,31,1f
10070 * 1: addi 11,11,(1b-res_0)@l
10071 * mflr 12
10072 * mtlr 0
10073 * sub 11,11,12 # r11 = index * 4
10074 * addis 12,12,(got+4-1b)@ha
10075 * lwz 0,(got+4-1b)@l(12) # got[1] address of dl_runtime_resolve
10076 * lwz 12,(got+8-1b)@l(12) # got[2] contains the map address
10077 * mtctr 0
10078 * add 0,11,11
10079 * add 11,0,11 # r11 = index * 12 = reloc offset.
10080 * bctr
10081 *
10082 * Non-PIC glink code is a little simpler.
10083 *
10084 * # ith PLT code stub.
10085 * lis 11,(plt+(i-1)*4)@ha
10086 * lwz 11,(plt+(i-1)*4)@l(11)
10087 * mtctr 11
10088 * bctr
10089 *
10090 * The branch table is the same, then comes
10091 *
10092 * PLTresolve:
10093 * lis 12,(got+4)@ha
10094 * addis 11,11,(-res_0)@ha
10095 * lwz 0,(got+4)@l(12) # got[1] address of dl_runtime_resolve
10096 * addi 11,11,(-res_0)@l # r11 = index * 4
10097 * mtctr 0
10098 * add 0,11,11
10099 * lwz 12,(got+8)@l(12) # got[2] contains the map address
10100 * add 11,0,11 # r11 = index * 12 = reloc offset.
10101 * bctr
10102 */
10103
10104 /* Build the branch table, one for each plt entry (less one),
10105 and perhaps some padding. */
10106 p = htab->glink->contents;
10107 p += htab->glink_pltresolve;
10108 endp = htab->glink->contents;
10109 endp += htab->glink->size - GLINK_PLTRESOLVE;
10110 while (p < endp - (htab->params->ppc476_workaround ? 0 : 8 * 4))
10111 {
10112 bfd_put_32 (output_bfd, B + endp - p, p);
10113 p += 4;
10114 }
10115 while (p < endp)
10116 {
10117 bfd_put_32 (output_bfd, NOP, p);
10118 p += 4;
10119 }
10120
10121 res0 = (htab->glink_pltresolve
10122 + htab->glink->output_section->vma
10123 + htab->glink->output_offset);
10124
10125 if (htab->params->ppc476_workaround)
10126 {
10127 /* Ensure that a call stub at the end of a page doesn't
10128 result in prefetch over the end of the page into the
10129 glink branch table. */
10130 bfd_vma pagesize = (bfd_vma) 1 << htab->params->pagesize_p2;
10131 bfd_vma page_addr;
10132 bfd_vma glink_start = (htab->glink->output_section->vma
10133 + htab->glink->output_offset);
10134
10135 for (page_addr = res0 & -pagesize;
10136 page_addr > glink_start;
10137 page_addr -= pagesize)
10138 {
10139 /* We have a plt call stub that may need fixing. */
10140 bfd_byte *loc;
10141 unsigned int insn;
10142
10143 loc = htab->glink->contents + page_addr - 4 - glink_start;
10144 insn = bfd_get_32 (output_bfd, loc);
10145 if (insn == BCTR)
10146 {
10147 /* By alignment, we know that there must be at least
10148 one other call stub before this one. */
10149 insn = bfd_get_32 (output_bfd, loc - 16);
10150 if (insn == BCTR)
10151 bfd_put_32 (output_bfd, B | (-16 & 0x3fffffc), loc);
10152 else
10153 bfd_put_32 (output_bfd, B | (-20 & 0x3fffffc), loc);
10154 }
10155 }
10156 }
10157
10158 /* Last comes the PLTresolve stub. */
10159 endp = p + GLINK_PLTRESOLVE;
10160 if (bfd_link_pic (info))
10161 {
10162 bfd_vma bcl;
10163
10164 bcl = (htab->glink->size - GLINK_PLTRESOLVE + 3*4
10165 + htab->glink->output_section->vma
10166 + htab->glink->output_offset);
10167
10168 bfd_put_32 (output_bfd, ADDIS_11_11 + PPC_HA (bcl - res0), p);
10169 p += 4;
10170 bfd_put_32 (output_bfd, MFLR_0, p);
10171 p += 4;
10172 bfd_put_32 (output_bfd, BCL_20_31, p);
10173 p += 4;
10174 bfd_put_32 (output_bfd, ADDI_11_11 + PPC_LO (bcl - res0), p);
10175 p += 4;
10176 bfd_put_32 (output_bfd, MFLR_12, p);
10177 p += 4;
10178 bfd_put_32 (output_bfd, MTLR_0, p);
10179 p += 4;
10180 bfd_put_32 (output_bfd, SUB_11_11_12, p);
10181 p += 4;
10182 bfd_put_32 (output_bfd, ADDIS_12_12 + PPC_HA (got + 4 - bcl), p);
10183 p += 4;
10184 if (PPC_HA (got + 4 - bcl) == PPC_HA (got + 8 - bcl))
10185 {
10186 bfd_put_32 (output_bfd, LWZ_0_12 + PPC_LO (got + 4 - bcl), p);
10187 p += 4;
10188 bfd_put_32 (output_bfd, LWZ_12_12 + PPC_LO (got + 8 - bcl), p);
10189 p += 4;
10190 }
10191 else
10192 {
10193 bfd_put_32 (output_bfd, LWZU_0_12 + PPC_LO (got + 4 - bcl), p);
10194 p += 4;
10195 bfd_put_32 (output_bfd, LWZ_12_12 + 4, p);
10196 p += 4;
10197 }
10198 bfd_put_32 (output_bfd, MTCTR_0, p);
10199 p += 4;
10200 bfd_put_32 (output_bfd, ADD_0_11_11, p);
10201 }
10202 else
10203 {
10204 bfd_put_32 (output_bfd, LIS_12 + PPC_HA (got + 4), p);
10205 p += 4;
10206 bfd_put_32 (output_bfd, ADDIS_11_11 + PPC_HA (-res0), p);
10207 p += 4;
10208 if (PPC_HA (got + 4) == PPC_HA (got + 8))
10209 bfd_put_32 (output_bfd, LWZ_0_12 + PPC_LO (got + 4), p);
10210 else
10211 bfd_put_32 (output_bfd, LWZU_0_12 + PPC_LO (got + 4), p);
10212 p += 4;
10213 bfd_put_32 (output_bfd, ADDI_11_11 + PPC_LO (-res0), p);
10214 p += 4;
10215 bfd_put_32 (output_bfd, MTCTR_0, p);
10216 p += 4;
10217 bfd_put_32 (output_bfd, ADD_0_11_11, p);
10218 p += 4;
10219 if (PPC_HA (got + 4) == PPC_HA (got + 8))
10220 bfd_put_32 (output_bfd, LWZ_12_12 + PPC_LO (got + 8), p);
10221 else
10222 bfd_put_32 (output_bfd, LWZ_12_12 + 4, p);
10223 }
10224 p += 4;
10225 bfd_put_32 (output_bfd, ADD_11_0_11, p);
10226 p += 4;
10227 bfd_put_32 (output_bfd, BCTR, p);
10228 p += 4;
10229 while (p < endp)
10230 {
10231 bfd_put_32 (output_bfd,
10232 htab->params->ppc476_workaround ? BA : NOP, p);
10233 p += 4;
10234 }
10235 BFD_ASSERT (p == endp);
10236 }
10237
10238 if (htab->glink_eh_frame != NULL
10239 && htab->glink_eh_frame->contents != NULL)
10240 {
10241 unsigned char *p = htab->glink_eh_frame->contents;
10242 bfd_vma val;
10243
10244 p += sizeof (glink_eh_frame_cie);
10245 /* FDE length. */
10246 p += 4;
10247 /* CIE pointer. */
10248 p += 4;
10249 /* Offset to .glink. */
10250 val = (htab->glink->output_section->vma
10251 + htab->glink->output_offset);
10252 val -= (htab->glink_eh_frame->output_section->vma
10253 + htab->glink_eh_frame->output_offset);
10254 val -= p - htab->glink_eh_frame->contents;
10255 bfd_put_32 (htab->elf.dynobj, val, p);
10256
10257 if (htab->glink_eh_frame->sec_info_type == SEC_INFO_TYPE_EH_FRAME
10258 && !_bfd_elf_write_section_eh_frame (output_bfd, info,
10259 htab->glink_eh_frame,
10260 htab->glink_eh_frame->contents))
10261 return FALSE;
10262 }
10263
10264 return ret;
10265 }
10266 \f
10267 #define TARGET_LITTLE_SYM powerpc_elf32_le_vec
10268 #define TARGET_LITTLE_NAME "elf32-powerpcle"
10269 #define TARGET_BIG_SYM powerpc_elf32_vec
10270 #define TARGET_BIG_NAME "elf32-powerpc"
10271 #define ELF_ARCH bfd_arch_powerpc
10272 #define ELF_TARGET_ID PPC32_ELF_DATA
10273 #define ELF_MACHINE_CODE EM_PPC
10274 #define ELF_MAXPAGESIZE 0x10000
10275 #define ELF_COMMONPAGESIZE 0x1000
10276 #define ELF_RELROPAGESIZE ELF_MAXPAGESIZE
10277 #define elf_info_to_howto ppc_elf_info_to_howto
10278
10279 #ifdef EM_CYGNUS_POWERPC
10280 #define ELF_MACHINE_ALT1 EM_CYGNUS_POWERPC
10281 #endif
10282
10283 #ifdef EM_PPC_OLD
10284 #define ELF_MACHINE_ALT2 EM_PPC_OLD
10285 #endif
10286
10287 #define elf_backend_plt_not_loaded 1
10288 #define elf_backend_want_dynrelro 1
10289 #define elf_backend_can_gc_sections 1
10290 #define elf_backend_can_refcount 1
10291 #define elf_backend_rela_normal 1
10292 #define elf_backend_caches_rawsize 1
10293
10294 #define bfd_elf32_mkobject ppc_elf_mkobject
10295 #define bfd_elf32_bfd_merge_private_bfd_data ppc_elf_merge_private_bfd_data
10296 #define bfd_elf32_bfd_relax_section ppc_elf_relax_section
10297 #define bfd_elf32_bfd_reloc_type_lookup ppc_elf_reloc_type_lookup
10298 #define bfd_elf32_bfd_reloc_name_lookup ppc_elf_reloc_name_lookup
10299 #define bfd_elf32_bfd_set_private_flags ppc_elf_set_private_flags
10300 #define bfd_elf32_bfd_link_hash_table_create ppc_elf_link_hash_table_create
10301 #define bfd_elf32_get_synthetic_symtab ppc_elf_get_synthetic_symtab
10302
10303 #define elf_backend_object_p ppc_elf_object_p
10304 #define elf_backend_gc_mark_hook ppc_elf_gc_mark_hook
10305 #define elf_backend_section_from_shdr ppc_elf_section_from_shdr
10306 #define elf_backend_relocate_section ppc_elf_relocate_section
10307 #define elf_backend_create_dynamic_sections ppc_elf_create_dynamic_sections
10308 #define elf_backend_check_relocs ppc_elf_check_relocs
10309 #define elf_backend_relocs_compatible _bfd_elf_relocs_compatible
10310 #define elf_backend_copy_indirect_symbol ppc_elf_copy_indirect_symbol
10311 #define elf_backend_adjust_dynamic_symbol ppc_elf_adjust_dynamic_symbol
10312 #define elf_backend_add_symbol_hook ppc_elf_add_symbol_hook
10313 #define elf_backend_size_dynamic_sections ppc_elf_size_dynamic_sections
10314 #define elf_backend_hash_symbol ppc_elf_hash_symbol
10315 #define elf_backend_finish_dynamic_symbol ppc_elf_finish_dynamic_symbol
10316 #define elf_backend_finish_dynamic_sections ppc_elf_finish_dynamic_sections
10317 #define elf_backend_fake_sections ppc_elf_fake_sections
10318 #define elf_backend_additional_program_headers ppc_elf_additional_program_headers
10319 #define elf_backend_modify_segment_map ppc_elf_modify_segment_map
10320 #define elf_backend_grok_prstatus ppc_elf_grok_prstatus
10321 #define elf_backend_grok_psinfo ppc_elf_grok_psinfo
10322 #define elf_backend_write_core_note ppc_elf_write_core_note
10323 #define elf_backend_reloc_type_class ppc_elf_reloc_type_class
10324 #define elf_backend_begin_write_processing ppc_elf_begin_write_processing
10325 #define elf_backend_final_write_processing ppc_elf_final_write_processing
10326 #define elf_backend_write_section ppc_elf_write_section
10327 #define elf_backend_get_sec_type_attr ppc_elf_get_sec_type_attr
10328 #define elf_backend_plt_sym_val ppc_elf_plt_sym_val
10329 #define elf_backend_action_discarded ppc_elf_action_discarded
10330 #define elf_backend_init_index_section _bfd_elf_init_1_index_section
10331 #define elf_backend_lookup_section_flags_hook ppc_elf_lookup_section_flags
10332
10333 #include "elf32-target.h"
10334
10335 /* FreeBSD Target */
10336
10337 #undef TARGET_LITTLE_SYM
10338 #undef TARGET_LITTLE_NAME
10339
10340 #undef TARGET_BIG_SYM
10341 #define TARGET_BIG_SYM powerpc_elf32_fbsd_vec
10342 #undef TARGET_BIG_NAME
10343 #define TARGET_BIG_NAME "elf32-powerpc-freebsd"
10344
10345 #undef ELF_OSABI
10346 #define ELF_OSABI ELFOSABI_FREEBSD
10347
10348 #undef elf32_bed
10349 #define elf32_bed elf32_powerpc_fbsd_bed
10350
10351 #include "elf32-target.h"
10352
10353 /* VxWorks Target */
10354
10355 #undef TARGET_LITTLE_SYM
10356 #undef TARGET_LITTLE_NAME
10357
10358 #undef TARGET_BIG_SYM
10359 #define TARGET_BIG_SYM powerpc_elf32_vxworks_vec
10360 #undef TARGET_BIG_NAME
10361 #define TARGET_BIG_NAME "elf32-powerpc-vxworks"
10362
10363 #undef ELF_OSABI
10364
10365 #undef ELF_TARGET_OS
10366 #define ELF_TARGET_OS is_vxworks
10367
10368 /* VxWorks uses the elf default section flags for .plt. */
10369 static const struct bfd_elf_special_section *
10370 ppc_elf_vxworks_get_sec_type_attr (bfd *abfd, asection *sec)
10371 {
10372 if (sec->name == NULL)
10373 return NULL;
10374
10375 if (strcmp (sec->name, ".plt") == 0)
10376 return _bfd_elf_get_sec_type_attr (abfd, sec);
10377
10378 return ppc_elf_get_sec_type_attr (abfd, sec);
10379 }
10380
10381 /* Like ppc_elf_link_hash_table_create, but overrides
10382 appropriately for VxWorks. */
10383 static struct bfd_link_hash_table *
10384 ppc_elf_vxworks_link_hash_table_create (bfd *abfd)
10385 {
10386 struct bfd_link_hash_table *ret;
10387
10388 ret = ppc_elf_link_hash_table_create (abfd);
10389 if (ret)
10390 {
10391 struct ppc_elf_link_hash_table *htab
10392 = (struct ppc_elf_link_hash_table *)ret;
10393 htab->plt_type = PLT_VXWORKS;
10394 htab->plt_entry_size = VXWORKS_PLT_ENTRY_SIZE;
10395 htab->plt_slot_size = VXWORKS_PLT_ENTRY_SIZE;
10396 htab->plt_initial_entry_size = VXWORKS_PLT_INITIAL_ENTRY_SIZE;
10397 }
10398 return ret;
10399 }
10400
10401 /* Tweak magic VxWorks symbols as they are loaded. */
10402 static bfd_boolean
10403 ppc_elf_vxworks_add_symbol_hook (bfd *abfd,
10404 struct bfd_link_info *info,
10405 Elf_Internal_Sym *sym,
10406 const char **namep,
10407 flagword *flagsp,
10408 asection **secp,
10409 bfd_vma *valp)
10410 {
10411 if (!elf_vxworks_add_symbol_hook (abfd, info, sym, namep, flagsp, secp,
10412 valp))
10413 return FALSE;
10414
10415 return ppc_elf_add_symbol_hook (abfd, info, sym, namep, flagsp, secp, valp);
10416 }
10417
10418 static bfd_boolean
10419 ppc_elf_vxworks_final_write_processing (bfd *abfd)
10420 {
10421 ppc_final_write_processing (abfd);
10422 return elf_vxworks_final_write_processing (abfd);
10423 }
10424
10425 /* On VxWorks, we emit relocations against _PROCEDURE_LINKAGE_TABLE_, so
10426 define it. */
10427 #undef elf_backend_want_plt_sym
10428 #define elf_backend_want_plt_sym 1
10429 #undef elf_backend_want_got_plt
10430 #define elf_backend_want_got_plt 1
10431 #undef elf_backend_got_symbol_offset
10432 #define elf_backend_got_symbol_offset 0
10433 #undef elf_backend_plt_not_loaded
10434 #define elf_backend_plt_not_loaded 0
10435 #undef elf_backend_plt_readonly
10436 #define elf_backend_plt_readonly 1
10437 #undef elf_backend_got_header_size
10438 #define elf_backend_got_header_size 12
10439 #undef elf_backend_dtrel_excludes_plt
10440 #define elf_backend_dtrel_excludes_plt 1
10441
10442 #undef bfd_elf32_get_synthetic_symtab
10443
10444 #undef bfd_elf32_bfd_link_hash_table_create
10445 #define bfd_elf32_bfd_link_hash_table_create \
10446 ppc_elf_vxworks_link_hash_table_create
10447 #undef elf_backend_add_symbol_hook
10448 #define elf_backend_add_symbol_hook \
10449 ppc_elf_vxworks_add_symbol_hook
10450 #undef elf_backend_link_output_symbol_hook
10451 #define elf_backend_link_output_symbol_hook \
10452 elf_vxworks_link_output_symbol_hook
10453 #undef elf_backend_final_write_processing
10454 #define elf_backend_final_write_processing \
10455 ppc_elf_vxworks_final_write_processing
10456 #undef elf_backend_get_sec_type_attr
10457 #define elf_backend_get_sec_type_attr \
10458 ppc_elf_vxworks_get_sec_type_attr
10459 #undef elf_backend_emit_relocs
10460 #define elf_backend_emit_relocs \
10461 elf_vxworks_emit_relocs
10462
10463 #undef elf32_bed
10464 #define elf32_bed ppc_elf_vxworks_bed
10465
10466 #include "elf32-target.h"