]> git.ipfire.org Git - thirdparty/binutils-gdb.git/blame - bfd/elf32-ppc.c
Remove bfd ELF_RELROPAGESIZE
[thirdparty/binutils-gdb.git] / bfd / elf32-ppc.c
CommitLineData
252b5132 1/* PowerPC-specific support for 32-bit ELF
a2c58332 2 Copyright (C) 1994-2022 Free Software Foundation, Inc.
252b5132
RH
3 Written by Ian Lance Taylor, Cygnus Support.
4
ae9a127f 5 This file is part of BFD, the Binary File Descriptor library.
252b5132 6
ae9a127f
NC
7 This program is free software; you can redistribute it and/or modify
8 it under the terms of the GNU General Public License as published by
cd123cb7 9 the Free Software Foundation; either version 3 of the License, or
ae9a127f 10 (at your option) any later version.
252b5132 11
ae9a127f
NC
12 This program is distributed in the hope that it will be useful,
13 but WITHOUT ANY WARRANTY; without even the implied warranty of
14 MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
15 GNU General Public License for more details.
252b5132 16
ae9a127f 17 You should have received a copy of the GNU General Public License
fc0bffd6 18 along with this program; if not, write to the
3e110533 19 Free Software Foundation, Inc., 51 Franklin Street - Fifth Floor,
53e09e0a 20 Boston, MA 02110-1301, USA. */
252b5132 21
c09c8b42
AM
22/* The assembler should generate a full set of section symbols even
23 when they appear unused. The linux kernel build tool recordmcount
24 needs them. */
25#define TARGET_KEEP_UNUSED_SECTION_SYMBOLS true
252b5132 26
3db64b00 27#include "sysdep.h"
183e98be 28#include <stdarg.h>
252b5132 29#include "bfd.h"
252b5132
RH
30#include "bfdlink.h"
31#include "libbfd.h"
32#include "elf-bfd.h"
33#include "elf/ppc.h"
7619e7c7 34#include "elf32-ppc.h"
9d8504b1 35#include "elf-vxworks.h"
6177242a 36#include "dwarf2.h"
08dc996f 37#include "opcode/ppc.h"
252b5132 38
bb294208
AM
39/* All users of this file have bfd_octets_per_byte (abfd, sec) == 1. */
40#define OCTETS_PER_BYTE(ABFD, SEC) 1
41
b9c361e0
JL
42typedef enum split16_format_type
43{
44 split16a_type = 0,
45 split16d_type
46}
47split16_format_type;
48
f0fe0e16 49/* RELA relocations are used here. */
252b5132 50
252b5132 51static bfd_reloc_status_type ppc_elf_addr16_ha_reloc
55fd94b0 52 (bfd *, arelent *, asymbol *, void *, asection *, bfd *, char **);
7619e7c7 53static bfd_reloc_status_type ppc_elf_unhandled_reloc
55fd94b0 54 (bfd *, arelent *, asymbol *, void *, asection *, bfd *, char **);
252b5132 55
70bccea4
AM
56/* Branch prediction bit for branch taken relocs. */
57#define BRANCH_PREDICT_BIT 0x200000
58/* Mask to set RA in memory instructions. */
59#define RA_REGISTER_MASK 0x001f0000
60/* Value to shift register by to insert RA. */
61#define RA_REGISTER_SHIFT 16
252b5132
RH
62
63/* The name of the dynamic interpreter. This is put in the .interp
64 section. */
252b5132
RH
65#define ELF_DYNAMIC_INTERPRETER "/usr/lib/ld.so.1"
66
d7128ce4 67/* For old-style PLT. */
252b5132
RH
68/* The number of single-slot PLT entries (the rest use two slots). */
69#define PLT_NUM_SINGLE_ENTRIES 8192
70
d7128ce4 71/* For new-style .glink and .plt. */
a6aa5195 72#define GLINK_PLTRESOLVE 16*4
9e390558 73#define GLINK_ENTRY_SIZE(htab, h) \
407aa07c 74 ((4*4 \
9e390558
AM
75 + (h != NULL \
76 && h == htab->tls_get_addr \
77 && !htab->params->no_tls_get_addr_opt ? 8*4 : 0) \
78 + (1u << htab->params->plt_stub_align) - 1) \
79 & -(1u << htab->params->plt_stub_align))
d7128ce4 80
9d8504b1
PB
81/* VxWorks uses its own plt layout, filled in by the static linker. */
82
83/* The standard VxWorks PLT entry. */
84#define VXWORKS_PLT_ENTRY_SIZE 32
85static const bfd_vma ppc_elf_vxworks_plt_entry
86 [VXWORKS_PLT_ENTRY_SIZE / 4] =
87 {
07d6d2b8
AM
88 0x3d800000, /* lis r12,0 */
89 0x818c0000, /* lwz r12,0(r12) */
90 0x7d8903a6, /* mtctr r12 */
91 0x4e800420, /* bctr */
92 0x39600000, /* li r11,0 */
93 0x48000000, /* b 14 <.PLT0resolve+0x4> */
94 0x60000000, /* nop */
95 0x60000000, /* nop */
9d8504b1
PB
96 };
97static const bfd_vma ppc_elf_vxworks_pic_plt_entry
98 [VXWORKS_PLT_ENTRY_SIZE / 4] =
99 {
100 0x3d9e0000, /* addis r12,r30,0 */
101 0x818c0000, /* lwz r12,0(r12) */
102 0x7d8903a6, /* mtctr r12 */
103 0x4e800420, /* bctr */
104 0x39600000, /* li r11,0 */
105 0x48000000, /* b 14 <.PLT0resolve+0x4> 14: R_PPC_REL24 .PLTresolve */
106 0x60000000, /* nop */
107 0x60000000, /* nop */
108 };
109
110/* The initial VxWorks PLT entry. */
111#define VXWORKS_PLT_INITIAL_ENTRY_SIZE 32
112static const bfd_vma ppc_elf_vxworks_plt0_entry
113 [VXWORKS_PLT_INITIAL_ENTRY_SIZE / 4] =
114 {
07d6d2b8
AM
115 0x3d800000, /* lis r12,0 */
116 0x398c0000, /* addi r12,r12,0 */
117 0x800c0008, /* lwz r0,8(r12) */
118 0x7c0903a6, /* mtctr r0 */
119 0x818c0004, /* lwz r12,4(r12) */
120 0x4e800420, /* bctr */
121 0x60000000, /* nop */
122 0x60000000, /* nop */
9d8504b1
PB
123 };
124static const bfd_vma ppc_elf_vxworks_pic_plt0_entry
125 [VXWORKS_PLT_INITIAL_ENTRY_SIZE / 4] =
126 {
127 0x819e0008, /* lwz r12,8(r30) */
07d6d2b8 128 0x7d8903a6, /* mtctr r12 */
9d8504b1 129 0x819e0004, /* lwz r12,4(r30) */
07d6d2b8
AM
130 0x4e800420, /* bctr */
131 0x60000000, /* nop */
132 0x60000000, /* nop */
133 0x60000000, /* nop */
134 0x60000000, /* nop */
9d8504b1
PB
135 };
136
137/* For executables, we have some additional relocations in
138 .rela.plt.unloaded, for the kernel loader. */
139
140/* The number of non-JMP_SLOT relocations per PLT0 slot. */
141#define VXWORKS_PLT_NON_JMP_SLOT_RELOCS 3
142/* The number of relocations in the PLTResolve slot. */
143#define VXWORKS_PLTRESOLVE_RELOCS 2
de194d85 144/* The number of relocations in the PLTResolve slot when creating
9d8504b1
PB
145 a shared library. */
146#define VXWORKS_PLTRESOLVE_RELOCS_SHLIB 0
147
d7128ce4 148/* Some instructions. */
d7128ce4 149#define ADDIS_11_11 0x3d6b0000
a6aa5195
AM
150#define ADDIS_11_30 0x3d7e0000
151#define ADDIS_12_12 0x3d8c0000
d7128ce4 152#define ADDI_11_11 0x396b0000
d7128ce4 153#define ADD_0_11_11 0x7c0b5a14
a7f2871e 154#define ADD_3_12_2 0x7c6c1214
d7128ce4 155#define ADD_11_0_11 0x7d605a14
a6aa5195 156#define B 0x48000000
da3a2088 157#define BA 0x48000002
a6aa5195 158#define BCL_20_31 0x429f0005
d7128ce4 159#define BCTR 0x4e800420
a7f2871e
AM
160#define BEQLR 0x4d820020
161#define CMPWI_11_0 0x2c0b0000
7e8aeb9a
AM
162#define LIS_11 0x3d600000
163#define LIS_12 0x3d800000
a6aa5195
AM
164#define LWZU_0_12 0x840c0000
165#define LWZ_0_12 0x800c0000
a7f2871e 166#define LWZ_11_3 0x81630000
a6aa5195
AM
167#define LWZ_11_11 0x816b0000
168#define LWZ_11_30 0x817e0000
a7f2871e 169#define LWZ_12_3 0x81830000
a6aa5195 170#define LWZ_12_12 0x818c0000
a7f2871e
AM
171#define MR_0_3 0x7c601b78
172#define MR_3_0 0x7c030378
a6aa5195
AM
173#define MFLR_0 0x7c0802a6
174#define MFLR_12 0x7d8802a6
175#define MTCTR_0 0x7c0903a6
176#define MTCTR_11 0x7d6903a6
177#define MTLR_0 0x7c0803a6
178#define NOP 0x60000000
179#define SUB_11_11_12 0x7d6c5850
7619e7c7
AM
180
181/* Offset of tp and dtp pointers from start of TLS block. */
182#define TP_OFFSET 0x7000
183#define DTP_OFFSET 0x8000
e87d4038
AM
184
185/* The value of a defined global symbol. */
186#define SYM_VAL(SYM) \
187 ((SYM)->root.u.def.section->output_section->vma \
188 + (SYM)->root.u.def.section->output_offset \
189 + (SYM)->root.u.def.value)
7fce784e 190\f
46807bf4
AM
191/* Relocation HOWTO's. */
192/* Like other ELF RELA targets that don't apply multiple
193 field-altering relocations to the same localation, src_mask is
194 always zero and pcrel_offset is the same as pc_relative.
195 PowerPC can always use a zero bitpos, even when the field is not at
196 the LSB. For example, a REL24 could use rightshift=2, bisize=24
197 and bitpos=2 which matches the ABI description, or as we do here,
198 rightshift=0, bitsize=26 and bitpos=0. */
199#define HOW(type, size, bitsize, mask, rightshift, pc_relative, \
200 complain, special_func) \
201 HOWTO (type, rightshift, size, bitsize, pc_relative, 0, \
202 complain_overflow_ ## complain, special_func, \
0a1b45a2 203 #type, false, 0, mask, pc_relative)
46807bf4 204
e47cd125 205static reloc_howto_type *ppc_elf_howto_table[R_PPC_max];
252b5132 206
8da6118f 207static reloc_howto_type ppc_elf_howto_raw[] = {
252b5132 208 /* This reloc does nothing. */
0a1b45a2 209 HOW (R_PPC_NONE, 3, 0, 0, 0, false, dont,
46807bf4 210 bfd_elf_generic_reloc),
252b5132
RH
211
212 /* A standard 32 bit relocation. */
0a1b45a2 213 HOW (R_PPC_ADDR32, 2, 32, 0xffffffff, 0, false, dont,
46807bf4 214 bfd_elf_generic_reloc),
252b5132
RH
215
216 /* An absolute 26 bit branch; the lower two bits must be zero.
217 FIXME: we don't check that, we just clear them. */
0a1b45a2 218 HOW (R_PPC_ADDR24, 2, 26, 0x3fffffc, 0, false, signed,
46807bf4 219 bfd_elf_generic_reloc),
252b5132
RH
220
221 /* A standard 16 bit relocation. */
0a1b45a2 222 HOW (R_PPC_ADDR16, 1, 16, 0xffff, 0, false, bitfield,
46807bf4 223 bfd_elf_generic_reloc),
252b5132
RH
224
225 /* A 16 bit relocation without overflow. */
0a1b45a2 226 HOW (R_PPC_ADDR16_LO, 1, 16, 0xffff, 0, false, dont,
46807bf4 227 bfd_elf_generic_reloc),
252b5132
RH
228
229 /* The high order 16 bits of an address. */
0a1b45a2 230 HOW (R_PPC_ADDR16_HI, 1, 16, 0xffff, 16, false, dont,
46807bf4 231 bfd_elf_generic_reloc),
252b5132
RH
232
233 /* The high order 16 bits of an address, plus 1 if the contents of
8da6118f 234 the low 16 bits, treated as a signed number, is negative. */
0a1b45a2 235 HOW (R_PPC_ADDR16_HA, 1, 16, 0xffff, 16, false, dont,
46807bf4 236 ppc_elf_addr16_ha_reloc),
252b5132
RH
237
238 /* An absolute 16 bit branch; the lower two bits must be zero.
239 FIXME: we don't check that, we just clear them. */
0a1b45a2 240 HOW (R_PPC_ADDR14, 2, 16, 0xfffc, 0, false, signed,
46807bf4 241 bfd_elf_generic_reloc),
252b5132
RH
242
243 /* An absolute 16 bit branch, for which bit 10 should be set to
244 indicate that the branch is expected to be taken. The lower two
8da6118f 245 bits must be zero. */
0a1b45a2 246 HOW (R_PPC_ADDR14_BRTAKEN, 2, 16, 0xfffc, 0, false, signed,
46807bf4 247 bfd_elf_generic_reloc),
252b5132
RH
248
249 /* An absolute 16 bit branch, for which bit 10 should be set to
250 indicate that the branch is not expected to be taken. The lower
251 two bits must be zero. */
0a1b45a2 252 HOW (R_PPC_ADDR14_BRNTAKEN, 2, 16, 0xfffc, 0, false, signed,
46807bf4 253 bfd_elf_generic_reloc),
252b5132 254
8da6118f 255 /* A relative 26 bit branch; the lower two bits must be zero. */
0a1b45a2 256 HOW (R_PPC_REL24, 2, 26, 0x3fffffc, 0, true, signed,
46807bf4 257 bfd_elf_generic_reloc),
252b5132 258
8da6118f 259 /* A relative 16 bit branch; the lower two bits must be zero. */
0a1b45a2 260 HOW (R_PPC_REL14, 2, 16, 0xfffc, 0, true, signed,
46807bf4 261 bfd_elf_generic_reloc),
252b5132 262
8da6118f 263 /* A relative 16 bit branch. Bit 10 should be set to indicate that
252b5132
RH
264 the branch is expected to be taken. The lower two bits must be
265 zero. */
0a1b45a2 266 HOW (R_PPC_REL14_BRTAKEN, 2, 16, 0xfffc, 0, true, signed,
46807bf4 267 bfd_elf_generic_reloc),
252b5132 268
8da6118f 269 /* A relative 16 bit branch. Bit 10 should be set to indicate that
252b5132
RH
270 the branch is not expected to be taken. The lower two bits must
271 be zero. */
0a1b45a2 272 HOW (R_PPC_REL14_BRNTAKEN, 2, 16, 0xfffc, 0, true, signed,
46807bf4 273 bfd_elf_generic_reloc),
252b5132
RH
274
275 /* Like R_PPC_ADDR16, but referring to the GOT table entry for the
276 symbol. */
0a1b45a2 277 HOW (R_PPC_GOT16, 1, 16, 0xffff, 0, false, signed,
46807bf4 278 ppc_elf_unhandled_reloc),
252b5132
RH
279
280 /* Like R_PPC_ADDR16_LO, but referring to the GOT table entry for
281 the symbol. */
0a1b45a2 282 HOW (R_PPC_GOT16_LO, 1, 16, 0xffff, 0, false, dont,
46807bf4 283 ppc_elf_unhandled_reloc),
252b5132
RH
284
285 /* Like R_PPC_ADDR16_HI, but referring to the GOT table entry for
286 the symbol. */
0a1b45a2 287 HOW (R_PPC_GOT16_HI, 1, 16, 0xffff, 16, false, dont,
46807bf4 288 ppc_elf_unhandled_reloc),
252b5132
RH
289
290 /* Like R_PPC_ADDR16_HA, but referring to the GOT table entry for
291 the symbol. */
0a1b45a2 292 HOW (R_PPC_GOT16_HA, 1, 16, 0xffff, 16, false, dont,
46807bf4 293 ppc_elf_unhandled_reloc),
252b5132
RH
294
295 /* Like R_PPC_REL24, but referring to the procedure linkage table
296 entry for the symbol. */
0a1b45a2 297 HOW (R_PPC_PLTREL24, 2, 26, 0x3fffffc, 0, true, signed,
46807bf4 298 ppc_elf_unhandled_reloc),
252b5132
RH
299
300 /* This is used only by the dynamic linker. The symbol should exist
301 both in the object being run and in some shared library. The
302 dynamic linker copies the data addressed by the symbol from the
303 shared library into the object, because the object being
304 run has to have the data at some particular address. */
0a1b45a2 305 HOW (R_PPC_COPY, 2, 32, 0, 0, false, dont,
46807bf4 306 ppc_elf_unhandled_reloc),
252b5132
RH
307
308 /* Like R_PPC_ADDR32, but used when setting global offset table
309 entries. */
0a1b45a2 310 HOW (R_PPC_GLOB_DAT, 2, 32, 0xffffffff, 0, false, dont,
46807bf4 311 ppc_elf_unhandled_reloc),
252b5132
RH
312
313 /* Marks a procedure linkage table entry for a symbol. */
0a1b45a2 314 HOW (R_PPC_JMP_SLOT, 2, 32, 0, 0, false, dont,
46807bf4 315 ppc_elf_unhandled_reloc),
252b5132
RH
316
317 /* Used only by the dynamic linker. When the object is run, this
318 longword is set to the load address of the object, plus the
319 addend. */
0a1b45a2 320 HOW (R_PPC_RELATIVE, 2, 32, 0xffffffff, 0, false, dont,
46807bf4 321 bfd_elf_generic_reloc),
252b5132
RH
322
323 /* Like R_PPC_REL24, but uses the value of the symbol within the
324 object rather than the final value. Normally used for
325 _GLOBAL_OFFSET_TABLE_. */
0a1b45a2 326 HOW (R_PPC_LOCAL24PC, 2, 26, 0x3fffffc, 0, true, signed,
46807bf4 327 bfd_elf_generic_reloc),
252b5132
RH
328
329 /* Like R_PPC_ADDR32, but may be unaligned. */
0a1b45a2 330 HOW (R_PPC_UADDR32, 2, 32, 0xffffffff, 0, false, dont,
46807bf4 331 bfd_elf_generic_reloc),
252b5132
RH
332
333 /* Like R_PPC_ADDR16, but may be unaligned. */
0a1b45a2 334 HOW (R_PPC_UADDR16, 1, 16, 0xffff, 0, false, bitfield,
46807bf4 335 bfd_elf_generic_reloc),
252b5132
RH
336
337 /* 32-bit PC relative */
0a1b45a2 338 HOW (R_PPC_REL32, 2, 32, 0xffffffff, 0, true, dont,
46807bf4 339 bfd_elf_generic_reloc),
252b5132
RH
340
341 /* 32-bit relocation to the symbol's procedure linkage table.
c3668558 342 FIXME: not supported. */
0a1b45a2 343 HOW (R_PPC_PLT32, 2, 32, 0, 0, false, dont,
46807bf4 344 ppc_elf_unhandled_reloc),
252b5132
RH
345
346 /* 32-bit PC relative relocation to the symbol's procedure linkage table.
c3668558 347 FIXME: not supported. */
0a1b45a2 348 HOW (R_PPC_PLTREL32, 2, 32, 0, 0, true, dont,
46807bf4 349 ppc_elf_unhandled_reloc),
252b5132
RH
350
351 /* Like R_PPC_ADDR16_LO, but referring to the PLT table entry for
352 the symbol. */
0a1b45a2 353 HOW (R_PPC_PLT16_LO, 1, 16, 0xffff, 0, false, dont,
46807bf4 354 ppc_elf_unhandled_reloc),
252b5132
RH
355
356 /* Like R_PPC_ADDR16_HI, but referring to the PLT table entry for
357 the symbol. */
0a1b45a2 358 HOW (R_PPC_PLT16_HI, 1, 16, 0xffff, 16, false, dont,
46807bf4 359 ppc_elf_unhandled_reloc),
252b5132
RH
360
361 /* Like R_PPC_ADDR16_HA, but referring to the PLT table entry for
362 the symbol. */
0a1b45a2 363 HOW (R_PPC_PLT16_HA, 1, 16, 0xffff, 16, false, dont,
46807bf4 364 ppc_elf_unhandled_reloc),
252b5132
RH
365
366 /* A sign-extended 16 bit value relative to _SDA_BASE_, for use with
367 small data items. */
0a1b45a2 368 HOW (R_PPC_SDAREL16, 1, 16, 0xffff, 0, false, signed,
46807bf4 369 ppc_elf_unhandled_reloc),
252b5132 370
c061c2d8 371 /* 16-bit section relative relocation. */
0a1b45a2 372 HOW (R_PPC_SECTOFF, 1, 16, 0xffff, 0, false, signed,
46807bf4 373 ppc_elf_unhandled_reloc),
252b5132 374
c3668558 375 /* 16-bit lower half section relative relocation. */
0a1b45a2 376 HOW (R_PPC_SECTOFF_LO, 1, 16, 0xffff, 0, false, dont,
46807bf4 377 ppc_elf_unhandled_reloc),
252b5132 378
c3668558 379 /* 16-bit upper half section relative relocation. */
0a1b45a2 380 HOW (R_PPC_SECTOFF_HI, 1, 16, 0xffff, 16, false, dont,
46807bf4 381 ppc_elf_unhandled_reloc),
252b5132 382
c3668558 383 /* 16-bit upper half adjusted section relative relocation. */
0a1b45a2 384 HOW (R_PPC_SECTOFF_HA, 1, 16, 0xffff, 16, false, dont,
46807bf4 385 ppc_elf_unhandled_reloc),
252b5132 386
727fc41e 387 /* Marker relocs for TLS. */
0a1b45a2 388 HOW (R_PPC_TLS, 2, 32, 0, 0, false, dont,
46807bf4
AM
389 bfd_elf_generic_reloc),
390
0a1b45a2 391 HOW (R_PPC_TLSGD, 2, 32, 0, 0, false, dont,
46807bf4
AM
392 bfd_elf_generic_reloc),
393
0a1b45a2 394 HOW (R_PPC_TLSLD, 2, 32, 0, 0, false, dont,
46807bf4 395 bfd_elf_generic_reloc),
727fc41e 396
23cedd1d 397 /* Marker relocs on inline plt call instructions. */
0a1b45a2 398 HOW (R_PPC_PLTSEQ, 2, 32, 0, 0, false, dont,
46807bf4
AM
399 bfd_elf_generic_reloc),
400
0a1b45a2 401 HOW (R_PPC_PLTCALL, 2, 32, 0, 0, false, dont,
46807bf4 402 bfd_elf_generic_reloc),
23cedd1d 403
7619e7c7
AM
404 /* Computes the load module index of the load module that contains the
405 definition of its TLS sym. */
0a1b45a2 406 HOW (R_PPC_DTPMOD32, 2, 32, 0xffffffff, 0, false, dont,
46807bf4 407 ppc_elf_unhandled_reloc),
252b5132 408
7619e7c7
AM
409 /* Computes a dtv-relative displacement, the difference between the value
410 of sym+add and the base address of the thread-local storage block that
411 contains the definition of sym, minus 0x8000. */
0a1b45a2 412 HOW (R_PPC_DTPREL32, 2, 32, 0xffffffff, 0, false, dont,
46807bf4 413 ppc_elf_unhandled_reloc),
7619e7c7
AM
414
415 /* A 16 bit dtprel reloc. */
0a1b45a2 416 HOW (R_PPC_DTPREL16, 1, 16, 0xffff, 0, false, signed,
46807bf4 417 ppc_elf_unhandled_reloc),
252b5132 418
7619e7c7 419 /* Like DTPREL16, but no overflow. */
0a1b45a2 420 HOW (R_PPC_DTPREL16_LO, 1, 16, 0xffff, 0, false, dont,
46807bf4 421 ppc_elf_unhandled_reloc),
252b5132 422
7619e7c7 423 /* Like DTPREL16_LO, but next higher group of 16 bits. */
0a1b45a2 424 HOW (R_PPC_DTPREL16_HI, 1, 16, 0xffff, 16, false, dont,
46807bf4 425 ppc_elf_unhandled_reloc),
252b5132 426
7619e7c7 427 /* Like DTPREL16_HI, but adjust for low 16 bits. */
0a1b45a2 428 HOW (R_PPC_DTPREL16_HA, 1, 16, 0xffff, 16, false, dont,
46807bf4 429 ppc_elf_unhandled_reloc),
252b5132 430
7619e7c7
AM
431 /* Computes a tp-relative displacement, the difference between the value of
432 sym+add and the value of the thread pointer (r13). */
0a1b45a2 433 HOW (R_PPC_TPREL32, 2, 32, 0xffffffff, 0, false, dont,
46807bf4 434 ppc_elf_unhandled_reloc),
7619e7c7
AM
435
436 /* A 16 bit tprel reloc. */
0a1b45a2 437 HOW (R_PPC_TPREL16, 1, 16, 0xffff, 0, false, signed,
46807bf4 438 ppc_elf_unhandled_reloc),
252b5132 439
7619e7c7 440 /* Like TPREL16, but no overflow. */
0a1b45a2 441 HOW (R_PPC_TPREL16_LO, 1, 16, 0xffff, 0, false, dont,
46807bf4 442 ppc_elf_unhandled_reloc),
252b5132 443
7619e7c7 444 /* Like TPREL16_LO, but next higher group of 16 bits. */
0a1b45a2 445 HOW (R_PPC_TPREL16_HI, 1, 16, 0xffff, 16, false, dont,
46807bf4 446 ppc_elf_unhandled_reloc),
7619e7c7
AM
447
448 /* Like TPREL16_HI, but adjust for low 16 bits. */
0a1b45a2 449 HOW (R_PPC_TPREL16_HA, 1, 16, 0xffff, 16, false, dont,
46807bf4 450 ppc_elf_unhandled_reloc),
7619e7c7
AM
451
452 /* Allocates two contiguous entries in the GOT to hold a tls_index structure,
453 with values (sym+add)@dtpmod and (sym+add)@dtprel, and computes the offset
454 to the first entry. */
0a1b45a2 455 HOW (R_PPC_GOT_TLSGD16, 1, 16, 0xffff, 0, false, signed,
46807bf4 456 ppc_elf_unhandled_reloc),
252b5132 457
7619e7c7 458 /* Like GOT_TLSGD16, but no overflow. */
0a1b45a2 459 HOW (R_PPC_GOT_TLSGD16_LO, 1, 16, 0xffff, 0, false, dont,
46807bf4 460 ppc_elf_unhandled_reloc),
252b5132 461
7619e7c7 462 /* Like GOT_TLSGD16_LO, but next higher group of 16 bits. */
0a1b45a2 463 HOW (R_PPC_GOT_TLSGD16_HI, 1, 16, 0xffff, 16, false, dont,
46807bf4 464 ppc_elf_unhandled_reloc),
252b5132 465
7619e7c7 466 /* Like GOT_TLSGD16_HI, but adjust for low 16 bits. */
0a1b45a2 467 HOW (R_PPC_GOT_TLSGD16_HA, 1, 16, 0xffff, 16, false, dont,
46807bf4 468 ppc_elf_unhandled_reloc),
7619e7c7
AM
469
470 /* Allocates two contiguous entries in the GOT to hold a tls_index structure,
471 with values (sym+add)@dtpmod and zero, and computes the offset to the
472 first entry. */
0a1b45a2 473 HOW (R_PPC_GOT_TLSLD16, 1, 16, 0xffff, 0, false, signed,
46807bf4 474 ppc_elf_unhandled_reloc),
252b5132 475
7619e7c7 476 /* Like GOT_TLSLD16, but no overflow. */
0a1b45a2 477 HOW (R_PPC_GOT_TLSLD16_LO, 1, 16, 0xffff, 0, false, dont,
46807bf4 478 ppc_elf_unhandled_reloc),
252b5132 479
7619e7c7 480 /* Like GOT_TLSLD16_LO, but next higher group of 16 bits. */
0a1b45a2 481 HOW (R_PPC_GOT_TLSLD16_HI, 1, 16, 0xffff, 16, false, dont,
46807bf4 482 ppc_elf_unhandled_reloc),
252b5132 483
7619e7c7 484 /* Like GOT_TLSLD16_HI, but adjust for low 16 bits. */
0a1b45a2 485 HOW (R_PPC_GOT_TLSLD16_HA, 1, 16, 0xffff, 16, false, dont,
46807bf4 486 ppc_elf_unhandled_reloc),
7619e7c7
AM
487
488 /* Allocates an entry in the GOT with value (sym+add)@dtprel, and computes
489 the offset to the entry. */
0a1b45a2 490 HOW (R_PPC_GOT_DTPREL16, 1, 16, 0xffff, 0, false, signed,
46807bf4 491 ppc_elf_unhandled_reloc),
252b5132 492
7619e7c7 493 /* Like GOT_DTPREL16, but no overflow. */
0a1b45a2 494 HOW (R_PPC_GOT_DTPREL16_LO, 1, 16, 0xffff, 0, false, dont,
46807bf4 495 ppc_elf_unhandled_reloc),
252b5132 496
7619e7c7 497 /* Like GOT_DTPREL16_LO, but next higher group of 16 bits. */
0a1b45a2 498 HOW (R_PPC_GOT_DTPREL16_HI, 1, 16, 0xffff, 16, false, dont,
46807bf4 499 ppc_elf_unhandled_reloc),
252b5132 500
7619e7c7 501 /* Like GOT_DTPREL16_HI, but adjust for low 16 bits. */
0a1b45a2 502 HOW (R_PPC_GOT_DTPREL16_HA, 1, 16, 0xffff, 16, false, dont,
46807bf4 503 ppc_elf_unhandled_reloc),
c3668558 504
7619e7c7
AM
505 /* Allocates an entry in the GOT with value (sym+add)@tprel, and computes the
506 offset to the entry. */
0a1b45a2 507 HOW (R_PPC_GOT_TPREL16, 1, 16, 0xffff, 0, false, signed,
46807bf4 508 ppc_elf_unhandled_reloc),
7619e7c7
AM
509
510 /* Like GOT_TPREL16, but no overflow. */
0a1b45a2 511 HOW (R_PPC_GOT_TPREL16_LO, 1, 16, 0xffff, 0, false, dont,
46807bf4 512 ppc_elf_unhandled_reloc),
7619e7c7
AM
513
514 /* Like GOT_TPREL16_LO, but next higher group of 16 bits. */
0a1b45a2 515 HOW (R_PPC_GOT_TPREL16_HI, 1, 16, 0xffff, 16, false, dont,
46807bf4 516 ppc_elf_unhandled_reloc),
7619e7c7
AM
517
518 /* Like GOT_TPREL16_HI, but adjust for low 16 bits. */
0a1b45a2 519 HOW (R_PPC_GOT_TPREL16_HA, 1, 16, 0xffff, 16, false, dont,
46807bf4 520 ppc_elf_unhandled_reloc),
7619e7c7
AM
521
522 /* The remaining relocs are from the Embedded ELF ABI, and are not
523 in the SVR4 ELF ABI. */
524
525 /* 32 bit value resulting from the addend minus the symbol. */
0a1b45a2 526 HOW (R_PPC_EMB_NADDR32, 2, 32, 0xffffffff, 0, false, dont,
46807bf4 527 ppc_elf_unhandled_reloc),
7619e7c7
AM
528
529 /* 16 bit value resulting from the addend minus the symbol. */
0a1b45a2 530 HOW (R_PPC_EMB_NADDR16, 1, 16, 0xffff, 0, false, signed,
46807bf4 531 ppc_elf_unhandled_reloc),
7619e7c7
AM
532
533 /* 16 bit value resulting from the addend minus the symbol. */
0a1b45a2 534 HOW (R_PPC_EMB_NADDR16_LO, 1, 16, 0xffff, 0, false, dont,
46807bf4 535 ppc_elf_unhandled_reloc),
7619e7c7
AM
536
537 /* The high order 16 bits of the addend minus the symbol. */
0a1b45a2 538 HOW (R_PPC_EMB_NADDR16_HI, 1, 16, 0xffff, 16, false, dont,
46807bf4 539 ppc_elf_unhandled_reloc),
7619e7c7
AM
540
541 /* The high order 16 bits of the result of the addend minus the address,
542 plus 1 if the contents of the low 16 bits, treated as a signed number,
543 is negative. */
0a1b45a2 544 HOW (R_PPC_EMB_NADDR16_HA, 1, 16, 0xffff, 16, false, dont,
46807bf4 545 ppc_elf_unhandled_reloc),
25dbc73a
AM
546
547 /* 16 bit value resulting from allocating a 4 byte word to hold an
548 address in the .sdata section, and returning the offset from
549 _SDA_BASE_ for that relocation. */
0a1b45a2 550 HOW (R_PPC_EMB_SDAI16, 1, 16, 0xffff, 0, false, signed,
46807bf4 551 ppc_elf_unhandled_reloc),
25dbc73a
AM
552
553 /* 16 bit value resulting from allocating a 4 byte word to hold an
554 address in the .sdata2 section, and returning the offset from
555 _SDA2_BASE_ for that relocation. */
0a1b45a2 556 HOW (R_PPC_EMB_SDA2I16, 1, 16, 0xffff, 0, false, signed,
46807bf4 557 ppc_elf_unhandled_reloc),
25dbc73a
AM
558
559 /* A sign-extended 16 bit value relative to _SDA2_BASE_, for use with
560 small data items. */
0a1b45a2 561 HOW (R_PPC_EMB_SDA2REL, 1, 16, 0xffff, 0, false, signed,
46807bf4 562 ppc_elf_unhandled_reloc),
25dbc73a
AM
563
564 /* Relocate against either _SDA_BASE_ or _SDA2_BASE_, filling in the 16 bit
565 signed offset from the appropriate base, and filling in the register
566 field with the appropriate register (0, 2, or 13). */
0a1b45a2 567 HOW (R_PPC_EMB_SDA21, 2, 16, 0xffff, 0, false, signed,
46807bf4 568 ppc_elf_unhandled_reloc),
25dbc73a
AM
569
570 /* Relocation not handled: R_PPC_EMB_MRKREF */
571 /* Relocation not handled: R_PPC_EMB_RELSEC16 */
572 /* Relocation not handled: R_PPC_EMB_RELST_LO */
573 /* Relocation not handled: R_PPC_EMB_RELST_HI */
574 /* Relocation not handled: R_PPC_EMB_RELST_HA */
575 /* Relocation not handled: R_PPC_EMB_BIT_FLD */
576
577 /* PC relative relocation against either _SDA_BASE_ or _SDA2_BASE_, filling
578 in the 16 bit signed offset from the appropriate base, and filling in the
579 register field with the appropriate register (0, 2, or 13). */
0a1b45a2 580 HOW (R_PPC_EMB_RELSDA, 1, 16, 0xffff, 0, false, signed,
46807bf4 581 ppc_elf_unhandled_reloc),
25dbc73a 582
b9c361e0 583 /* A relative 8 bit branch. */
0a1b45a2 584 HOW (R_PPC_VLE_REL8, 1, 8, 0xff, 1, true, signed,
46807bf4 585 bfd_elf_generic_reloc),
68ffbac6 586
b9c361e0 587 /* A relative 15 bit branch. */
0a1b45a2 588 HOW (R_PPC_VLE_REL15, 2, 16, 0xfffe, 0, true, signed,
46807bf4 589 bfd_elf_generic_reloc),
b9c361e0 590
68ffbac6 591 /* A relative 24 bit branch. */
0a1b45a2 592 HOW (R_PPC_VLE_REL24, 2, 25, 0x1fffffe, 0, true, signed,
46807bf4 593 bfd_elf_generic_reloc),
b9c361e0
JL
594
595 /* The 16 LSBS in split16a format. */
0a1b45a2 596 HOW (R_PPC_VLE_LO16A, 2, 16, 0x1f07ff, 0, false, dont,
46807bf4 597 ppc_elf_unhandled_reloc),
b9c361e0
JL
598
599 /* The 16 LSBS in split16d format. */
0a1b45a2 600 HOW (R_PPC_VLE_LO16D, 2, 16, 0x3e007ff, 0, false, dont,
46807bf4 601 ppc_elf_unhandled_reloc),
b9c361e0
JL
602
603 /* Bits 16-31 split16a format. */
0a1b45a2 604 HOW (R_PPC_VLE_HI16A, 2, 16, 0x1f07ff, 16, false, dont,
46807bf4 605 ppc_elf_unhandled_reloc),
b9c361e0
JL
606
607 /* Bits 16-31 split16d format. */
0a1b45a2 608 HOW (R_PPC_VLE_HI16D, 2, 16, 0x3e007ff, 16, false, dont,
46807bf4 609 ppc_elf_unhandled_reloc),
b9c361e0
JL
610
611 /* Bits 16-31 (High Adjusted) in split16a format. */
0a1b45a2 612 HOW (R_PPC_VLE_HA16A, 2, 16, 0x1f07ff, 16, false, dont,
46807bf4 613 ppc_elf_unhandled_reloc),
b9c361e0
JL
614
615 /* Bits 16-31 (High Adjusted) in split16d format. */
0a1b45a2 616 HOW (R_PPC_VLE_HA16D, 2, 16, 0x3e007ff, 16, false, dont,
46807bf4 617 ppc_elf_unhandled_reloc),
b9c361e0 618
86c95733
AM
619 /* This reloc is like R_PPC_EMB_SDA21 but only applies to e_add16i
620 instructions. If the register base is 0 then the linker changes
621 the e_add16i to an e_li instruction. */
0a1b45a2 622 HOW (R_PPC_VLE_SDA21, 2, 16, 0xffff, 0, false, signed,
46807bf4 623 ppc_elf_unhandled_reloc),
b9c361e0 624
86c95733 625 /* Like R_PPC_VLE_SDA21 but ignore overflow. */
0a1b45a2 626 HOW (R_PPC_VLE_SDA21_LO, 2, 16, 0xffff, 0, false, dont,
46807bf4 627 ppc_elf_unhandled_reloc),
b9c361e0
JL
628
629 /* The 16 LSBS relative to _SDA_BASE_ in split16a format. */
0a1b45a2 630 HOW (R_PPC_VLE_SDAREL_LO16A, 2, 16, 0x1f07ff, 0, false, dont,
46807bf4 631 ppc_elf_unhandled_reloc),
b9c361e0
JL
632
633 /* The 16 LSBS relative to _SDA_BASE_ in split16d format. */
0a1b45a2 634 HOW (R_PPC_VLE_SDAREL_LO16D, 2, 16, 0x3e007ff, 0, false, dont,
46807bf4 635 ppc_elf_unhandled_reloc),
b9c361e0
JL
636
637 /* Bits 16-31 relative to _SDA_BASE_ in split16a format. */
0a1b45a2 638 HOW (R_PPC_VLE_SDAREL_HI16A, 2, 16, 0x1f07ff, 16, false, dont,
46807bf4 639 ppc_elf_unhandled_reloc),
b9c361e0
JL
640
641 /* Bits 16-31 relative to _SDA_BASE_ in split16d format. */
0a1b45a2 642 HOW (R_PPC_VLE_SDAREL_HI16D, 2, 16, 0x3e007ff, 16, false, dont,
46807bf4 643 ppc_elf_unhandled_reloc),
b9c361e0
JL
644
645 /* Bits 16-31 (HA) relative to _SDA_BASE split16a format. */
0a1b45a2 646 HOW (R_PPC_VLE_SDAREL_HA16A, 2, 16, 0x1f07ff, 16, false, dont,
46807bf4 647 ppc_elf_unhandled_reloc),
b9c361e0
JL
648
649 /* Bits 16-31 (HA) relative to _SDA_BASE split16d format. */
0a1b45a2 650 HOW (R_PPC_VLE_SDAREL_HA16D, 2, 16, 0x3e007ff, 16, false, dont,
46807bf4 651 ppc_elf_unhandled_reloc),
b9c361e0 652
83eef883 653 /* e_li split20 format. */
0a1b45a2 654 HOW (R_PPC_VLE_ADDR20, 2, 20, 0x1f7fff, 0, false, dont,
bb6bf75e 655 ppc_elf_unhandled_reloc),
46807bf4 656
0a1b45a2 657 HOW (R_PPC_IRELATIVE, 2, 32, 0xffffffff, 0, false, dont,
46807bf4 658 ppc_elf_unhandled_reloc),
e054468f 659
d7128ce4 660 /* A 16 bit relative relocation. */
0a1b45a2 661 HOW (R_PPC_REL16, 1, 16, 0xffff, 0, true, signed,
46807bf4 662 bfd_elf_generic_reloc),
d7128ce4
AM
663
664 /* A 16 bit relative relocation without overflow. */
0a1b45a2 665 HOW (R_PPC_REL16_LO, 1, 16, 0xffff, 0, true, dont,
46807bf4 666 bfd_elf_generic_reloc),
d7128ce4
AM
667
668 /* The high order 16 bits of a relative address. */
0a1b45a2 669 HOW (R_PPC_REL16_HI, 1, 16, 0xffff, 16, true, dont,
46807bf4 670 bfd_elf_generic_reloc),
d7128ce4
AM
671
672 /* The high order 16 bits of a relative address, plus 1 if the contents of
673 the low 16 bits, treated as a signed number, is negative. */
0a1b45a2 674 HOW (R_PPC_REL16_HA, 1, 16, 0xffff, 16, true, dont,
46807bf4 675 ppc_elf_addr16_ha_reloc),
d7128ce4 676
a680de9a 677 /* Like R_PPC_REL16_HA but for split field in addpcis. */
0a1b45a2 678 HOW (R_PPC_REL16DX_HA, 2, 16, 0x1fffc1, 16, true, signed,
46807bf4 679 ppc_elf_addr16_ha_reloc),
a680de9a 680
7ba71655 681 /* A split-field reloc for addpcis, non-relative (gas internal use only). */
0a1b45a2 682 HOW (R_PPC_16DX_HA, 2, 16, 0x1fffc1, 16, false, signed,
46807bf4 683 ppc_elf_addr16_ha_reloc),
7ba71655 684
25dbc73a 685 /* GNU extension to record C++ vtable hierarchy. */
0a1b45a2 686 HOW (R_PPC_GNU_VTINHERIT, 0, 0, 0, 0, false, dont,
46807bf4 687 NULL),
25dbc73a
AM
688
689 /* GNU extension to record C++ vtable member usage. */
0a1b45a2 690 HOW (R_PPC_GNU_VTENTRY, 0, 0, 0, 0, false, dont,
46807bf4 691 NULL),
7619e7c7 692
25dbc73a 693 /* Phony reloc to handle AIX style TOC entries. */
0a1b45a2 694 HOW (R_PPC_TOC16, 1, 16, 0xffff, 0, false, signed,
46807bf4 695 ppc_elf_unhandled_reloc),
25dbc73a
AM
696};
697\f
698/* Initialize the ppc_elf_howto_table, so that linear accesses can be done. */
699
700static void
701ppc_elf_howto_init (void)
702{
703 unsigned int i, type;
704
705 for (i = 0;
706 i < sizeof (ppc_elf_howto_raw) / sizeof (ppc_elf_howto_raw[0]);
707 i++)
708 {
709 type = ppc_elf_howto_raw[i].type;
710 if (type >= (sizeof (ppc_elf_howto_table)
711 / sizeof (ppc_elf_howto_table[0])))
712 abort ();
713 ppc_elf_howto_table[type] = &ppc_elf_howto_raw[i];
714 }
715}
716
717static reloc_howto_type *
718ppc_elf_reloc_type_lookup (bfd *abfd ATTRIBUTE_UNUSED,
719 bfd_reloc_code_real_type code)
720{
721 enum elf_ppc_reloc_type r;
722
723 /* Initialize howto table if not already done. */
724 if (!ppc_elf_howto_table[R_PPC_ADDR32])
725 ppc_elf_howto_init ();
726
727 switch (code)
728 {
729 default:
730 return NULL;
731
732 case BFD_RELOC_NONE: r = R_PPC_NONE; break;
733 case BFD_RELOC_32: r = R_PPC_ADDR32; break;
734 case BFD_RELOC_PPC_BA26: r = R_PPC_ADDR24; break;
1fe532cf 735 case BFD_RELOC_PPC64_ADDR16_DS:
25dbc73a 736 case BFD_RELOC_16: r = R_PPC_ADDR16; break;
1fe532cf 737 case BFD_RELOC_PPC64_ADDR16_LO_DS:
25dbc73a
AM
738 case BFD_RELOC_LO16: r = R_PPC_ADDR16_LO; break;
739 case BFD_RELOC_HI16: r = R_PPC_ADDR16_HI; break;
740 case BFD_RELOC_HI16_S: r = R_PPC_ADDR16_HA; break;
741 case BFD_RELOC_PPC_BA16: r = R_PPC_ADDR14; break;
742 case BFD_RELOC_PPC_BA16_BRTAKEN: r = R_PPC_ADDR14_BRTAKEN; break;
743 case BFD_RELOC_PPC_BA16_BRNTAKEN: r = R_PPC_ADDR14_BRNTAKEN; break;
744 case BFD_RELOC_PPC_B26: r = R_PPC_REL24; break;
745 case BFD_RELOC_PPC_B16: r = R_PPC_REL14; break;
746 case BFD_RELOC_PPC_B16_BRTAKEN: r = R_PPC_REL14_BRTAKEN; break;
747 case BFD_RELOC_PPC_B16_BRNTAKEN: r = R_PPC_REL14_BRNTAKEN; break;
1fe532cf 748 case BFD_RELOC_PPC64_GOT16_DS:
25dbc73a 749 case BFD_RELOC_16_GOTOFF: r = R_PPC_GOT16; break;
1fe532cf 750 case BFD_RELOC_PPC64_GOT16_LO_DS:
25dbc73a
AM
751 case BFD_RELOC_LO16_GOTOFF: r = R_PPC_GOT16_LO; break;
752 case BFD_RELOC_HI16_GOTOFF: r = R_PPC_GOT16_HI; break;
753 case BFD_RELOC_HI16_S_GOTOFF: r = R_PPC_GOT16_HA; break;
754 case BFD_RELOC_24_PLT_PCREL: r = R_PPC_PLTREL24; break;
755 case BFD_RELOC_PPC_COPY: r = R_PPC_COPY; break;
756 case BFD_RELOC_PPC_GLOB_DAT: r = R_PPC_GLOB_DAT; break;
757 case BFD_RELOC_PPC_LOCAL24PC: r = R_PPC_LOCAL24PC; break;
758 case BFD_RELOC_32_PCREL: r = R_PPC_REL32; break;
759 case BFD_RELOC_32_PLTOFF: r = R_PPC_PLT32; break;
760 case BFD_RELOC_32_PLT_PCREL: r = R_PPC_PLTREL32; break;
1fe532cf 761 case BFD_RELOC_PPC64_PLT16_LO_DS:
25dbc73a
AM
762 case BFD_RELOC_LO16_PLTOFF: r = R_PPC_PLT16_LO; break;
763 case BFD_RELOC_HI16_PLTOFF: r = R_PPC_PLT16_HI; break;
764 case BFD_RELOC_HI16_S_PLTOFF: r = R_PPC_PLT16_HA; break;
765 case BFD_RELOC_GPREL16: r = R_PPC_SDAREL16; break;
1fe532cf 766 case BFD_RELOC_PPC64_SECTOFF_DS:
25dbc73a 767 case BFD_RELOC_16_BASEREL: r = R_PPC_SECTOFF; break;
1fe532cf 768 case BFD_RELOC_PPC64_SECTOFF_LO_DS:
25dbc73a
AM
769 case BFD_RELOC_LO16_BASEREL: r = R_PPC_SECTOFF_LO; break;
770 case BFD_RELOC_HI16_BASEREL: r = R_PPC_SECTOFF_HI; break;
771 case BFD_RELOC_HI16_S_BASEREL: r = R_PPC_SECTOFF_HA; break;
772 case BFD_RELOC_CTOR: r = R_PPC_ADDR32; break;
1fe532cf 773 case BFD_RELOC_PPC64_TOC16_DS:
25dbc73a
AM
774 case BFD_RELOC_PPC_TOC16: r = R_PPC_TOC16; break;
775 case BFD_RELOC_PPC_TLS: r = R_PPC_TLS; break;
727fc41e
AM
776 case BFD_RELOC_PPC_TLSGD: r = R_PPC_TLSGD; break;
777 case BFD_RELOC_PPC_TLSLD: r = R_PPC_TLSLD; break;
25dbc73a 778 case BFD_RELOC_PPC_DTPMOD: r = R_PPC_DTPMOD32; break;
1fe532cf 779 case BFD_RELOC_PPC64_TPREL16_DS:
25dbc73a 780 case BFD_RELOC_PPC_TPREL16: r = R_PPC_TPREL16; break;
1fe532cf 781 case BFD_RELOC_PPC64_TPREL16_LO_DS:
25dbc73a
AM
782 case BFD_RELOC_PPC_TPREL16_LO: r = R_PPC_TPREL16_LO; break;
783 case BFD_RELOC_PPC_TPREL16_HI: r = R_PPC_TPREL16_HI; break;
784 case BFD_RELOC_PPC_TPREL16_HA: r = R_PPC_TPREL16_HA; break;
785 case BFD_RELOC_PPC_TPREL: r = R_PPC_TPREL32; break;
1fe532cf 786 case BFD_RELOC_PPC64_DTPREL16_DS:
25dbc73a 787 case BFD_RELOC_PPC_DTPREL16: r = R_PPC_DTPREL16; break;
1fe532cf 788 case BFD_RELOC_PPC64_DTPREL16_LO_DS:
25dbc73a
AM
789 case BFD_RELOC_PPC_DTPREL16_LO: r = R_PPC_DTPREL16_LO; break;
790 case BFD_RELOC_PPC_DTPREL16_HI: r = R_PPC_DTPREL16_HI; break;
791 case BFD_RELOC_PPC_DTPREL16_HA: r = R_PPC_DTPREL16_HA; break;
792 case BFD_RELOC_PPC_DTPREL: r = R_PPC_DTPREL32; break;
793 case BFD_RELOC_PPC_GOT_TLSGD16: r = R_PPC_GOT_TLSGD16; break;
794 case BFD_RELOC_PPC_GOT_TLSGD16_LO: r = R_PPC_GOT_TLSGD16_LO; break;
795 case BFD_RELOC_PPC_GOT_TLSGD16_HI: r = R_PPC_GOT_TLSGD16_HI; break;
796 case BFD_RELOC_PPC_GOT_TLSGD16_HA: r = R_PPC_GOT_TLSGD16_HA; break;
797 case BFD_RELOC_PPC_GOT_TLSLD16: r = R_PPC_GOT_TLSLD16; break;
798 case BFD_RELOC_PPC_GOT_TLSLD16_LO: r = R_PPC_GOT_TLSLD16_LO; break;
799 case BFD_RELOC_PPC_GOT_TLSLD16_HI: r = R_PPC_GOT_TLSLD16_HI; break;
800 case BFD_RELOC_PPC_GOT_TLSLD16_HA: r = R_PPC_GOT_TLSLD16_HA; break;
801 case BFD_RELOC_PPC_GOT_TPREL16: r = R_PPC_GOT_TPREL16; break;
802 case BFD_RELOC_PPC_GOT_TPREL16_LO: r = R_PPC_GOT_TPREL16_LO; break;
803 case BFD_RELOC_PPC_GOT_TPREL16_HI: r = R_PPC_GOT_TPREL16_HI; break;
804 case BFD_RELOC_PPC_GOT_TPREL16_HA: r = R_PPC_GOT_TPREL16_HA; break;
805 case BFD_RELOC_PPC_GOT_DTPREL16: r = R_PPC_GOT_DTPREL16; break;
806 case BFD_RELOC_PPC_GOT_DTPREL16_LO: r = R_PPC_GOT_DTPREL16_LO; break;
807 case BFD_RELOC_PPC_GOT_DTPREL16_HI: r = R_PPC_GOT_DTPREL16_HI; break;
808 case BFD_RELOC_PPC_GOT_DTPREL16_HA: r = R_PPC_GOT_DTPREL16_HA; break;
809 case BFD_RELOC_PPC_EMB_NADDR32: r = R_PPC_EMB_NADDR32; break;
810 case BFD_RELOC_PPC_EMB_NADDR16: r = R_PPC_EMB_NADDR16; break;
811 case BFD_RELOC_PPC_EMB_NADDR16_LO: r = R_PPC_EMB_NADDR16_LO; break;
812 case BFD_RELOC_PPC_EMB_NADDR16_HI: r = R_PPC_EMB_NADDR16_HI; break;
813 case BFD_RELOC_PPC_EMB_NADDR16_HA: r = R_PPC_EMB_NADDR16_HA; break;
814 case BFD_RELOC_PPC_EMB_SDAI16: r = R_PPC_EMB_SDAI16; break;
815 case BFD_RELOC_PPC_EMB_SDA2I16: r = R_PPC_EMB_SDA2I16; break;
816 case BFD_RELOC_PPC_EMB_SDA2REL: r = R_PPC_EMB_SDA2REL; break;
817 case BFD_RELOC_PPC_EMB_SDA21: r = R_PPC_EMB_SDA21; break;
818 case BFD_RELOC_PPC_EMB_MRKREF: r = R_PPC_EMB_MRKREF; break;
819 case BFD_RELOC_PPC_EMB_RELSEC16: r = R_PPC_EMB_RELSEC16; break;
820 case BFD_RELOC_PPC_EMB_RELST_LO: r = R_PPC_EMB_RELST_LO; break;
821 case BFD_RELOC_PPC_EMB_RELST_HI: r = R_PPC_EMB_RELST_HI; break;
822 case BFD_RELOC_PPC_EMB_RELST_HA: r = R_PPC_EMB_RELST_HA; break;
823 case BFD_RELOC_PPC_EMB_BIT_FLD: r = R_PPC_EMB_BIT_FLD; break;
824 case BFD_RELOC_PPC_EMB_RELSDA: r = R_PPC_EMB_RELSDA; break;
b9c361e0
JL
825 case BFD_RELOC_PPC_VLE_REL8: r = R_PPC_VLE_REL8; break;
826 case BFD_RELOC_PPC_VLE_REL15: r = R_PPC_VLE_REL15; break;
827 case BFD_RELOC_PPC_VLE_REL24: r = R_PPC_VLE_REL24; break;
828 case BFD_RELOC_PPC_VLE_LO16A: r = R_PPC_VLE_LO16A; break;
829 case BFD_RELOC_PPC_VLE_LO16D: r = R_PPC_VLE_LO16D; break;
830 case BFD_RELOC_PPC_VLE_HI16A: r = R_PPC_VLE_HI16A; break;
831 case BFD_RELOC_PPC_VLE_HI16D: r = R_PPC_VLE_HI16D; break;
832 case BFD_RELOC_PPC_VLE_HA16A: r = R_PPC_VLE_HA16A; break;
833 case BFD_RELOC_PPC_VLE_HA16D: r = R_PPC_VLE_HA16D; break;
834 case BFD_RELOC_PPC_VLE_SDA21: r = R_PPC_VLE_SDA21; break;
835 case BFD_RELOC_PPC_VLE_SDA21_LO: r = R_PPC_VLE_SDA21_LO; break;
836 case BFD_RELOC_PPC_VLE_SDAREL_LO16A:
837 r = R_PPC_VLE_SDAREL_LO16A;
838 break;
839 case BFD_RELOC_PPC_VLE_SDAREL_LO16D:
840 r = R_PPC_VLE_SDAREL_LO16D;
841 break;
842 case BFD_RELOC_PPC_VLE_SDAREL_HI16A:
843 r = R_PPC_VLE_SDAREL_HI16A;
844 break;
845 case BFD_RELOC_PPC_VLE_SDAREL_HI16D:
846 r = R_PPC_VLE_SDAREL_HI16D;
847 break;
848 case BFD_RELOC_PPC_VLE_SDAREL_HA16A:
849 r = R_PPC_VLE_SDAREL_HA16A;
850 break;
851 case BFD_RELOC_PPC_VLE_SDAREL_HA16D:
852 r = R_PPC_VLE_SDAREL_HA16D;
853 break;
d7128ce4
AM
854 case BFD_RELOC_16_PCREL: r = R_PPC_REL16; break;
855 case BFD_RELOC_LO16_PCREL: r = R_PPC_REL16_LO; break;
856 case BFD_RELOC_HI16_PCREL: r = R_PPC_REL16_HI; break;
857 case BFD_RELOC_HI16_S_PCREL: r = R_PPC_REL16_HA; break;
7ba71655 858 case BFD_RELOC_PPC_16DX_HA: r = R_PPC_16DX_HA; break;
a680de9a 859 case BFD_RELOC_PPC_REL16DX_HA: r = R_PPC_REL16DX_HA; break;
25dbc73a
AM
860 case BFD_RELOC_VTABLE_INHERIT: r = R_PPC_GNU_VTINHERIT; break;
861 case BFD_RELOC_VTABLE_ENTRY: r = R_PPC_GNU_VTENTRY; break;
862 }
863
864 return ppc_elf_howto_table[r];
865};
866
157090f7
AM
867static reloc_howto_type *
868ppc_elf_reloc_name_lookup (bfd *abfd ATTRIBUTE_UNUSED,
869 const char *r_name)
870{
871 unsigned int i;
872
873 for (i = 0;
874 i < sizeof (ppc_elf_howto_raw) / sizeof (ppc_elf_howto_raw[0]);
875 i++)
876 if (ppc_elf_howto_raw[i].name != NULL
877 && strcasecmp (ppc_elf_howto_raw[i].name, r_name) == 0)
878 return &ppc_elf_howto_raw[i];
879
880 return NULL;
881}
882
25dbc73a
AM
883/* Set the howto pointer for a PowerPC ELF reloc. */
884
0a1b45a2 885static bool
4aef7643 886ppc_elf_info_to_howto (bfd *abfd,
25dbc73a
AM
887 arelent *cache_ptr,
888 Elf_Internal_Rela *dst)
889{
cd21f5da
NC
890 unsigned int r_type;
891
25dbc73a
AM
892 /* Initialize howto table if not already done. */
893 if (!ppc_elf_howto_table[R_PPC_ADDR32])
894 ppc_elf_howto_init ();
895
cd21f5da
NC
896 r_type = ELF32_R_TYPE (dst->r_info);
897 if (r_type >= R_PPC_max)
898 {
695344c0 899 /* xgettext:c-format */
0aa13fee 900 _bfd_error_handler (_("%pB: unsupported relocation type %#x"),
4eca0228 901 abfd, r_type);
cd21f5da 902 bfd_set_error (bfd_error_bad_value);
0a1b45a2 903 return false;
cd21f5da 904 }
f3185997 905
cd21f5da 906 cache_ptr->howto = ppc_elf_howto_table[r_type];
375de94a
AM
907
908 /* Just because the above assert didn't trigger doesn't mean that
909 ELF32_R_TYPE (dst->r_info) is necessarily a valid relocation. */
f3185997 910 if (cache_ptr->howto == NULL)
375de94a 911 {
695344c0 912 /* xgettext:c-format */
0aa13fee 913 _bfd_error_handler (_("%pB: unsupported relocation type %#x"),
4eca0228 914 abfd, r_type);
375de94a
AM
915 bfd_set_error (bfd_error_bad_value);
916
0a1b45a2 917 return false;
375de94a 918 }
f3185997 919
0a1b45a2 920 return true;
25dbc73a
AM
921}
922
d7128ce4 923/* Handle the R_PPC_ADDR16_HA and R_PPC_REL16_HA relocs. */
25dbc73a
AM
924
925static bfd_reloc_status_type
4aef7643 926ppc_elf_addr16_ha_reloc (bfd *abfd,
25dbc73a
AM
927 arelent *reloc_entry,
928 asymbol *symbol,
4aef7643 929 void *data,
25dbc73a
AM
930 asection *input_section,
931 bfd *output_bfd,
932 char **error_message ATTRIBUTE_UNUSED)
933{
a680de9a
PB
934 enum elf_ppc_reloc_type r_type;
935 long insn;
936 bfd_size_type octets;
937 bfd_vma value;
25dbc73a
AM
938
939 if (output_bfd != NULL)
940 {
941 reloc_entry->address += input_section->output_offset;
942 return bfd_reloc_ok;
943 }
944
a680de9a
PB
945 reloc_entry->addend += 0x8000;
946 r_type = reloc_entry->howto->type;
947 if (r_type != R_PPC_REL16DX_HA)
948 return bfd_reloc_continue;
949
950 value = 0;
951 if (!bfd_is_com_section (symbol->section))
952 value = symbol->value;
953 value += (reloc_entry->addend
954 + symbol->section->output_offset
955 + symbol->section->output_section->vma);
956 value -= (reloc_entry->address
957 + input_section->output_offset
958 + input_section->output_section->vma);
959 value >>= 16;
960
bb294208 961 octets = reloc_entry->address * OCTETS_PER_BYTE (abfd, input_section);
b54509b8
AM
962 if (!bfd_reloc_offset_in_range (reloc_entry->howto, abfd,
963 input_section, octets))
964 return bfd_reloc_outofrange;
965
a680de9a
PB
966 insn = bfd_get_32 (abfd, (bfd_byte *) data + octets);
967 insn &= ~0x1fffc1;
968 insn |= (value & 0xffc1) | ((value & 0x3e) << 15);
969 bfd_put_32 (abfd, insn, (bfd_byte *) data + octets);
970 return bfd_reloc_ok;
25dbc73a
AM
971}
972
973static bfd_reloc_status_type
974ppc_elf_unhandled_reloc (bfd *abfd,
975 arelent *reloc_entry,
976 asymbol *symbol,
977 void *data,
978 asection *input_section,
979 bfd *output_bfd,
980 char **error_message)
981{
982 /* If this is a relocatable link (output_bfd test tells us), just
983 call the generic function. Any adjustment will be done at final
984 link time. */
985 if (output_bfd != NULL)
986 return bfd_elf_generic_reloc (abfd, reloc_entry, symbol, data,
987 input_section, output_bfd, error_message);
988
989 if (error_message != NULL)
990 {
7fbd5f4e
AM
991 static char *message;
992 free (message);
993 if (asprintf (&message, _("generic linker can't handle %s"),
994 reloc_entry->howto->name) < 0)
995 message = NULL;
996 *error_message = message;
25dbc73a
AM
997 }
998 return bfd_reloc_dangerous;
999}
1000\f
1001/* Sections created by the linker. */
1002
1003typedef struct elf_linker_section
1004{
c9a2f333 1005 /* Pointer to the bfd section. */
25dbc73a 1006 asection *section;
c9a2f333
AM
1007 /* Section name. */
1008 const char *name;
1009 /* Associated bss section name. */
1010 const char *bss_name;
1011 /* Associated symbol name. */
1012 const char *sym_name;
046183de
AM
1013 /* Associated symbol. */
1014 struct elf_link_hash_entry *sym;
25dbc73a
AM
1015} elf_linker_section_t;
1016
1017/* Linked list of allocated pointer entries. This hangs off of the
1018 symbol lists, and provides allows us to return different pointers,
1019 based on different addend's. */
1020
1021typedef struct elf_linker_section_pointers
1022{
1023 /* next allocated pointer for this symbol */
1024 struct elf_linker_section_pointers *next;
1025 /* offset of pointer from beginning of section */
1026 bfd_vma offset;
1027 /* addend used */
1028 bfd_vma addend;
1029 /* which linker section this is */
1030 elf_linker_section_t *lsect;
25dbc73a
AM
1031} elf_linker_section_pointers_t;
1032
1033struct ppc_elf_obj_tdata
1034{
1035 struct elf_obj_tdata elf;
1036
1037 /* A mapping from local symbols to offsets into the various linker
1038 sections added. This is index by the symbol index. */
1039 elf_linker_section_pointers_t **linker_section_pointers;
016687f8
AM
1040
1041 /* Flags used to auto-detect plt type. */
1042 unsigned int makes_plt_call : 1;
1043 unsigned int has_rel16 : 1;
25dbc73a
AM
1044};
1045
1046#define ppc_elf_tdata(bfd) \
1047 ((struct ppc_elf_obj_tdata *) (bfd)->tdata.any)
7619e7c7 1048
25dbc73a
AM
1049#define elf_local_ptr_offsets(bfd) \
1050 (ppc_elf_tdata (bfd)->linker_section_pointers)
7619e7c7 1051
0c8d6e5c
AM
1052#define is_ppc_elf(bfd) \
1053 (bfd_get_flavour (bfd) == bfd_target_elf_flavour \
4dfe6ac6 1054 && elf_object_id (bfd) == PPC32_ELF_DATA)
0c8d6e5c 1055
25dbc73a 1056/* Override the generic function because we store some extras. */
7619e7c7 1057
0a1b45a2 1058static bool
25dbc73a
AM
1059ppc_elf_mkobject (bfd *abfd)
1060{
0ffa91dd 1061 return bfd_elf_allocate_object (abfd, sizeof (struct ppc_elf_obj_tdata),
4dfe6ac6 1062 PPC32_ELF_DATA);
25dbc73a 1063}
7619e7c7 1064
14b57c7c
AM
1065/* When defaulting arch/mach, decode apuinfo to find a better match. */
1066
0a1b45a2 1067bool
14b57c7c
AM
1068_bfd_elf_ppc_set_arch (bfd *abfd)
1069{
1070 unsigned long mach = 0;
1071 asection *s;
1072 unsigned char *contents;
1073
1074 if (abfd->arch_info->bits_per_word == 32
1075 && bfd_big_endian (abfd))
1076 {
1077
1078 for (s = abfd->sections; s != NULL; s = s->next)
1079 if ((elf_section_data (s)->this_hdr.sh_flags & SHF_PPC_VLE) != 0)
1080 break;
1081 if (s != NULL)
1082 mach = bfd_mach_ppc_vle;
1083 }
1084
1085 if (mach == 0)
1086 {
1087 s = bfd_get_section_by_name (abfd, APUINFO_SECTION_NAME);
62a47958
AM
1088 if (s != NULL
1089 && s->size >= 24
1090 && bfd_malloc_and_get_section (abfd, s, &contents))
14b57c7c
AM
1091 {
1092 unsigned int apuinfo_size = bfd_get_32 (abfd, contents + 4);
1093 unsigned int i;
1094
1095 for (i = 20; i < apuinfo_size + 20 && i + 4 <= s->size; i += 4)
1096 {
1097 unsigned int val = bfd_get_32 (abfd, contents + i);
1098 switch (val >> 16)
1099 {
1100 case PPC_APUINFO_PMR:
1101 case PPC_APUINFO_RFMCI:
1102 if (mach == 0)
1103 mach = bfd_mach_ppc_titan;
1104 break;
1105
1106 case PPC_APUINFO_ISEL:
1107 case PPC_APUINFO_CACHELCK:
1108 if (mach == bfd_mach_ppc_titan)
1109 mach = bfd_mach_ppc_e500mc;
1110 break;
1111
1112 case PPC_APUINFO_SPE:
1113 case PPC_APUINFO_EFS:
1114 case PPC_APUINFO_BRLOCK:
1115 if (mach != bfd_mach_ppc_vle)
1116 mach = bfd_mach_ppc_e500;
8941017b 1117 break;
14b57c7c
AM
1118
1119 case PPC_APUINFO_VLE:
1120 mach = bfd_mach_ppc_vle;
1121 break;
1122
1123 default:
1124 mach = -1ul;
1125 }
1126 }
1127 free (contents);
1128 }
1129 }
1130
1131 if (mach != 0 && mach != -1ul)
1132 {
1133 const bfd_arch_info_type *arch;
1134
1135 for (arch = abfd->arch_info->next; arch; arch = arch->next)
1136 if (arch->mach == mach)
1137 {
1138 abfd->arch_info = arch;
1139 break;
1140 }
1141 }
0a1b45a2 1142 return true;
14b57c7c
AM
1143}
1144
25dbc73a 1145/* Fix bad default arch selected for a 32 bit input bfd when the
14b57c7c 1146 default is 64 bit. Also select arch based on apuinfo. */
7619e7c7 1147
0a1b45a2 1148static bool
25dbc73a
AM
1149ppc_elf_object_p (bfd *abfd)
1150{
14b57c7c 1151 if (!abfd->arch_info->the_default)
0a1b45a2 1152 return true;
14b57c7c
AM
1153
1154 if (abfd->arch_info->bits_per_word == 64)
25dbc73a
AM
1155 {
1156 Elf_Internal_Ehdr *i_ehdr = elf_elfheader (abfd);
7619e7c7 1157
25dbc73a
AM
1158 if (i_ehdr->e_ident[EI_CLASS] == ELFCLASS32)
1159 {
1160 /* Relies on arch after 64 bit default being 32 bit default. */
1161 abfd->arch_info = abfd->arch_info->next;
1162 BFD_ASSERT (abfd->arch_info->bits_per_word == 32);
1163 }
1164 }
14b57c7c 1165 return _bfd_elf_ppc_set_arch (abfd);
25dbc73a 1166}
7619e7c7 1167
25dbc73a 1168/* Function to set whether a module needs the -mrelocatable bit set. */
7619e7c7 1169
0a1b45a2 1170static bool
25dbc73a
AM
1171ppc_elf_set_private_flags (bfd *abfd, flagword flags)
1172{
1173 BFD_ASSERT (!elf_flags_init (abfd)
1174 || elf_elfheader (abfd)->e_flags == flags);
7619e7c7 1175
25dbc73a 1176 elf_elfheader (abfd)->e_flags = flags;
0a1b45a2
AM
1177 elf_flags_init (abfd) = true;
1178 return true;
25dbc73a
AM
1179}
1180
25dbc73a 1181/* Support for core dump NOTE sections. */
deaaf2f3 1182
0a1b45a2 1183static bool
25dbc73a 1184ppc_elf_grok_prstatus (bfd *abfd, Elf_Internal_Note *note)
252b5132 1185{
25dbc73a
AM
1186 int offset;
1187 unsigned int size;
252b5132 1188
25dbc73a
AM
1189 switch (note->descsz)
1190 {
1191 default:
0a1b45a2 1192 return false;
252b5132 1193
25dbc73a
AM
1194 case 268: /* Linux/PPC. */
1195 /* pr_cursig */
228e534f 1196 elf_tdata (abfd)->core->signal = bfd_get_16 (abfd, note->descdata + 12);
deaaf2f3 1197
25dbc73a 1198 /* pr_pid */
228e534f 1199 elf_tdata (abfd)->core->lwpid = bfd_get_32 (abfd, note->descdata + 24);
9abc968f 1200
25dbc73a
AM
1201 /* pr_reg */
1202 offset = 72;
1203 size = 192;
deaaf2f3 1204
25dbc73a
AM
1205 break;
1206 }
deaaf2f3 1207
25dbc73a
AM
1208 /* Make a ".reg/999" section. */
1209 return _bfd_elfcore_make_pseudosection (abfd, ".reg",
1210 size, note->descpos + offset);
1211}
252b5132 1212
0a1b45a2 1213static bool
25dbc73a
AM
1214ppc_elf_grok_psinfo (bfd *abfd, Elf_Internal_Note *note)
1215{
1216 switch (note->descsz)
deaaf2f3 1217 {
25dbc73a 1218 default:
0a1b45a2 1219 return false;
deaaf2f3 1220
25dbc73a 1221 case 128: /* Linux/PPC elf_prpsinfo. */
228e534f 1222 elf_tdata (abfd)->core->pid
bc989cdc 1223 = bfd_get_32 (abfd, note->descdata + 16);
228e534f 1224 elf_tdata (abfd)->core->program
25dbc73a 1225 = _bfd_elfcore_strndup (abfd, note->descdata + 32, 16);
228e534f 1226 elf_tdata (abfd)->core->command
25dbc73a
AM
1227 = _bfd_elfcore_strndup (abfd, note->descdata + 48, 80);
1228 }
9abc968f 1229
25dbc73a
AM
1230 /* Note that for some reason, a spurious space is tacked
1231 onto the end of the args in some (at least one anyway)
1232 implementations, so strip it off if it exists. */
70bccea4 1233
25dbc73a 1234 {
228e534f 1235 char *command = elf_tdata (abfd)->core->command;
25dbc73a 1236 int n = strlen (command);
70bccea4 1237
25dbc73a
AM
1238 if (0 < n && command[n - 1] == ' ')
1239 command[n - 1] = '\0';
1240 }
deaaf2f3 1241
0a1b45a2 1242 return true;
25dbc73a 1243}
deaaf2f3 1244
183e98be
AM
1245static char *
1246ppc_elf_write_core_note (bfd *abfd, char *buf, int *bufsiz, int note_type, ...)
1247{
1248 switch (note_type)
1249 {
1250 default:
1251 return NULL;
1252
1253 case NT_PRPSINFO:
1254 {
602f1657 1255 char data[128] ATTRIBUTE_NONSTRING;
183e98be
AM
1256 va_list ap;
1257
1258 va_start (ap, note_type);
75cd47ed 1259 memset (data, 0, sizeof (data));
183e98be 1260 strncpy (data + 32, va_arg (ap, const char *), 16);
be3e27bb 1261#if GCC_VERSION == 8000 || GCC_VERSION == 8001
95da9854 1262 DIAGNOSTIC_PUSH;
be3e27bb 1263 /* GCC 8.0 and 8.1 warn about 80 equals destination size with
95da9854
L
1264 -Wstringop-truncation:
1265 https://gcc.gnu.org/bugzilla/show_bug.cgi?id=85643
1266 */
95da9854
L
1267 DIAGNOSTIC_IGNORE_STRINGOP_TRUNCATION;
1268#endif
183e98be 1269 strncpy (data + 48, va_arg (ap, const char *), 80);
be3e27bb 1270#if GCC_VERSION == 8000 || GCC_VERSION == 8001
95da9854 1271 DIAGNOSTIC_POP;
fe75810f 1272#endif
183e98be
AM
1273 va_end (ap);
1274 return elfcore_write_note (abfd, buf, bufsiz,
1275 "CORE", note_type, data, sizeof (data));
1276 }
1277
1278 case NT_PRSTATUS:
1279 {
1280 char data[268];
1281 va_list ap;
1282 long pid;
1283 int cursig;
1284 const void *greg;
1285
1286 va_start (ap, note_type);
1287 memset (data, 0, 72);
1288 pid = va_arg (ap, long);
1289 bfd_put_32 (abfd, pid, data + 24);
1290 cursig = va_arg (ap, int);
1291 bfd_put_16 (abfd, cursig, data + 12);
1292 greg = va_arg (ap, const void *);
1293 memcpy (data + 72, greg, 192);
1294 memset (data + 264, 0, 4);
1295 va_end (ap);
1296 return elfcore_write_note (abfd, buf, bufsiz,
1297 "CORE", note_type, data, sizeof (data));
1298 }
1299 }
1300}
1301
b9c361e0 1302static flagword
68ffbac6 1303ppc_elf_lookup_section_flags (char *flag_name)
b9c361e0
JL
1304{
1305
1306 if (!strcmp (flag_name, "SHF_PPC_VLE"))
1307 return SHF_PPC_VLE;
1308
1309 return 0;
1310}
1311
25dbc73a
AM
1312/* Return address for Ith PLT stub in section PLT, for relocation REL
1313 or (bfd_vma) -1 if it should not be included. */
deaaf2f3 1314
25dbc73a
AM
1315static bfd_vma
1316ppc_elf_plt_sym_val (bfd_vma i ATTRIBUTE_UNUSED,
1317 const asection *plt ATTRIBUTE_UNUSED,
1318 const arelent *rel)
1319{
1320 return rel->address;
1321}
deaaf2f3 1322
25dbc73a 1323/* Handle a PowerPC specific section when reading an object file. This
6dc132d9
L
1324 is called when bfd_section_from_shdr finds a section with an unknown
1325 type. */
deaaf2f3 1326
0a1b45a2 1327static bool
6dc132d9
L
1328ppc_elf_section_from_shdr (bfd *abfd,
1329 Elf_Internal_Shdr *hdr,
1330 const char *name,
1331 int shindex)
25dbc73a
AM
1332{
1333 asection *newsect;
1334 flagword flags;
d1c6de6f 1335
6dc132d9 1336 if (! _bfd_elf_make_section_from_shdr (abfd, hdr, name, shindex))
0a1b45a2 1337 return false;
deaaf2f3 1338
25dbc73a 1339 newsect = hdr->bfd_section;
bf577467 1340 flags = 0;
25dbc73a
AM
1341 if (hdr->sh_flags & SHF_EXCLUDE)
1342 flags |= SEC_EXCLUDE;
9abc968f 1343
25dbc73a
AM
1344 if (hdr->sh_type == SHT_ORDERED)
1345 flags |= SEC_SORT_ENTRIES;
d1c6de6f 1346
3f3328b8 1347 if (startswith (name, ".PPC.EMB"))
bf577467 1348 name += 8;
3f3328b8
ML
1349 if (startswith (name, ".sbss")
1350 || startswith (name, ".sdata"))
bf577467
AM
1351 flags |= SEC_SMALL_DATA;
1352
1353 return (flags == 0
1354 || bfd_set_section_flags (newsect, newsect->flags | flags));
25dbc73a
AM
1355}
1356
1357/* Set up any other section flags and such that may be necessary. */
1358
0a1b45a2 1359static bool
25dbc73a
AM
1360ppc_elf_fake_sections (bfd *abfd ATTRIBUTE_UNUSED,
1361 Elf_Internal_Shdr *shdr,
1362 asection *asect)
1363{
25dbc73a
AM
1364 if ((asect->flags & SEC_SORT_ENTRIES) != 0)
1365 shdr->sh_type = SHT_ORDERED;
1366
0a1b45a2 1367 return true;
25dbc73a
AM
1368}
1369
1370/* If we have .sbss2 or .PPC.EMB.sbss0 output sections, we
1371 need to bump up the number of section headers. */
1372
1373static int
a6b96beb
AM
1374ppc_elf_additional_program_headers (bfd *abfd,
1375 struct bfd_link_info *info ATTRIBUTE_UNUSED)
25dbc73a
AM
1376{
1377 asection *s;
1378 int ret = 0;
d1c6de6f 1379
25dbc73a
AM
1380 s = bfd_get_section_by_name (abfd, ".sbss2");
1381 if (s != NULL && (s->flags & SEC_ALLOC) != 0)
1382 ++ret;
d1c6de6f 1383
25dbc73a
AM
1384 s = bfd_get_section_by_name (abfd, ".PPC.EMB.sbss0");
1385 if (s != NULL && (s->flags & SEC_ALLOC) != 0)
1386 ++ret;
deaaf2f3 1387
25dbc73a
AM
1388 return ret;
1389}
deaaf2f3 1390
68ffbac6 1391/* Modify the segment map for VLE executables. */
b9c361e0 1392
0a1b45a2 1393bool
b9c361e0
JL
1394ppc_elf_modify_segment_map (bfd *abfd,
1395 struct bfd_link_info *info ATTRIBUTE_UNUSED)
1396{
f7d69005 1397 struct elf_segment_map *m;
b9c361e0
JL
1398
1399 /* At this point in the link, output sections have already been sorted by
1400 LMA and assigned to segments. All that is left to do is to ensure
1401 there is no mixing of VLE & non-VLE sections in a text segment.
1402 If we find that case, we split the segment.
1403 We maintain the original output section order. */
1404
12bd6957 1405 for (m = elf_seg_map (abfd); m != NULL; m = m->next)
b9c361e0 1406 {
f7d69005 1407 struct elf_segment_map *n;
986f0783 1408 size_t amt;
f7d69005
AM
1409 unsigned int j, k;
1410 unsigned int p_flags;
1411
1412 if (m->p_type != PT_LOAD || m->count == 0)
b9c361e0
JL
1413 continue;
1414
f7d69005 1415 for (p_flags = PF_R, j = 0; j != m->count; ++j)
b9c361e0 1416 {
f7d69005
AM
1417 if ((m->sections[j]->flags & SEC_READONLY) == 0)
1418 p_flags |= PF_W;
1419 if ((m->sections[j]->flags & SEC_CODE) != 0)
1420 {
1421 p_flags |= PF_X;
1422 if ((elf_section_flags (m->sections[j]) & SHF_PPC_VLE) != 0)
1423 p_flags |= PF_PPC_VLE;
1424 break;
1425 }
1426 }
1427 if (j != m->count)
1428 while (++j != m->count)
1429 {
1430 unsigned int p_flags1 = PF_R;
94caa966 1431
f7d69005
AM
1432 if ((m->sections[j]->flags & SEC_READONLY) == 0)
1433 p_flags1 |= PF_W;
1434 if ((m->sections[j]->flags & SEC_CODE) != 0)
1435 {
1436 p_flags1 |= PF_X;
1437 if ((elf_section_flags (m->sections[j]) & SHF_PPC_VLE) != 0)
1438 p_flags1 |= PF_PPC_VLE;
1439 if (((p_flags1 ^ p_flags) & PF_PPC_VLE) != 0)
1440 break;
1441 }
1442 p_flags |= p_flags1;
1443 }
1444 /* If we're splitting a segment which originally contained rw
1445 sections then those sections might now only be in one of the
1446 two parts. So always set p_flags if splitting, even if we
1447 are being called for objcopy with p_flags_valid set. */
1448 if (j != m->count || !m->p_flags_valid)
1449 {
1450 m->p_flags_valid = 1;
1451 m->p_flags = p_flags;
1452 }
1453 if (j == m->count)
b9c361e0
JL
1454 continue;
1455
f7d69005 1456 /* Sections 0..j-1 stay in this (current) segment,
b9c361e0
JL
1457 the remainder are put in a new segment.
1458 The scan resumes with the new segment. */
1459
b9c361e0
JL
1460 amt = sizeof (struct elf_segment_map);
1461 amt += (m->count - j - 1) * sizeof (asection *);
1462 n = (struct elf_segment_map *) bfd_zalloc (abfd, amt);
1463 if (n == NULL)
0a1b45a2 1464 return false;
b9c361e0
JL
1465
1466 n->p_type = PT_LOAD;
b9c361e0
JL
1467 n->count = m->count - j;
1468 for (k = 0; k < n->count; ++k)
f7d69005
AM
1469 n->sections[k] = m->sections[j + k];
1470 m->count = j;
1471 m->p_size_valid = 0;
b9c361e0
JL
1472 n->next = m->next;
1473 m->next = n;
b9c361e0
JL
1474 }
1475
0a1b45a2 1476 return true;
b9c361e0
JL
1477}
1478
25dbc73a
AM
1479/* Add extra PPC sections -- Note, for now, make .sbss2 and
1480 .PPC.EMB.sbss0 a normal section, and not a bss section so
1481 that the linker doesn't crater when trying to make more than
1482 2 sections. */
e656e369 1483
b35d266b 1484static const struct bfd_elf_special_section ppc_elf_special_sections[] =
7f4d3958 1485{
14b57c7c
AM
1486 { STRING_COMMA_LEN (".plt"), 0, SHT_NOBITS, SHF_ALLOC + SHF_EXECINSTR },
1487 { STRING_COMMA_LEN (".sbss"), -2, SHT_NOBITS, SHF_ALLOC + SHF_WRITE },
1488 { STRING_COMMA_LEN (".sbss2"), -2, SHT_PROGBITS, SHF_ALLOC },
1489 { STRING_COMMA_LEN (".sdata"), -2, SHT_PROGBITS, SHF_ALLOC + SHF_WRITE },
1490 { STRING_COMMA_LEN (".sdata2"), -2, SHT_PROGBITS, SHF_ALLOC },
1491 { STRING_COMMA_LEN (".tags"), 0, SHT_ORDERED, SHF_ALLOC },
1492 { STRING_COMMA_LEN (APUINFO_SECTION_NAME), 0, SHT_NOTE, 0 },
1493 { STRING_COMMA_LEN (".PPC.EMB.sbss0"), 0, SHT_PROGBITS, SHF_ALLOC },
1494 { STRING_COMMA_LEN (".PPC.EMB.sdata0"), 0, SHT_PROGBITS, SHF_ALLOC },
1495 { NULL, 0, 0, 0, 0 }
7f4d3958
L
1496};
1497
551b43fd 1498/* This is what we want for new plt/got. */
bd38246a 1499static const struct bfd_elf_special_section ppc_alt_plt =
07d6d2b8 1500 { STRING_COMMA_LEN (".plt"), 0, SHT_PROGBITS, SHF_ALLOC };
551b43fd
AM
1501
1502static const struct bfd_elf_special_section *
4aef7643 1503ppc_elf_get_sec_type_attr (bfd *abfd, asection *sec)
7f4d3958 1504{
b35d266b 1505 const struct bfd_elf_special_section *ssect;
551b43fd
AM
1506
1507 /* See if this is one of the special sections. */
1508 if (sec->name == NULL)
1509 return NULL;
1510
1511 ssect = _bfd_elf_get_special_section (sec->name, ppc_elf_special_sections,
1512 sec->use_rela_p);
1513 if (ssect != NULL)
1514 {
1515 if (ssect == ppc_elf_special_sections && (sec->flags & SEC_LOAD) != 0)
1516 ssect = &ppc_alt_plt;
1517 return ssect;
1518 }
1519
1520 return _bfd_elf_get_sec_type_attr (abfd, sec);
1521}
25dbc73a
AM
1522\f
1523/* Very simple linked list structure for recording apuinfo values. */
1524typedef struct apuinfo_list
1525{
1526 struct apuinfo_list *next;
1527 unsigned long value;
1528}
1529apuinfo_list;
e656e369 1530
25dbc73a 1531static apuinfo_list *head;
0a1b45a2 1532static bool apuinfo_set;
deaaf2f3 1533
25dbc73a
AM
1534static void
1535apuinfo_list_init (void)
1536{
1537 head = NULL;
0a1b45a2 1538 apuinfo_set = false;
25dbc73a 1539}
9abc968f 1540
25dbc73a
AM
1541static void
1542apuinfo_list_add (unsigned long value)
1543{
1544 apuinfo_list *entry = head;
deaaf2f3 1545
25dbc73a
AM
1546 while (entry != NULL)
1547 {
1548 if (entry->value == value)
1549 return;
1550 entry = entry->next;
1551 }
b4a38de6 1552
25dbc73a
AM
1553 entry = bfd_malloc (sizeof (* entry));
1554 if (entry == NULL)
1555 return;
e656e369 1556
25dbc73a
AM
1557 entry->value = value;
1558 entry->next = head;
1559 head = entry;
1560}
9abc968f 1561
25dbc73a
AM
1562static unsigned
1563apuinfo_list_length (void)
1564{
1565 apuinfo_list *entry;
1566 unsigned long count;
9abc968f 1567
25dbc73a
AM
1568 for (entry = head, count = 0;
1569 entry;
1570 entry = entry->next)
1571 ++ count;
e656e369 1572
25dbc73a
AM
1573 return count;
1574}
eea6121a 1575
25dbc73a
AM
1576static inline unsigned long
1577apuinfo_list_element (unsigned long number)
1578{
1579 apuinfo_list * entry;
e656e369 1580
25dbc73a
AM
1581 for (entry = head;
1582 entry && number --;
1583 entry = entry->next)
1584 ;
252b5132 1585
25dbc73a
AM
1586 return entry ? entry->value : 0;
1587}
1588
1589static void
1590apuinfo_list_finish (void)
1591{
1592 apuinfo_list *entry;
1593
1594 for (entry = head; entry;)
252b5132 1595 {
25dbc73a
AM
1596 apuinfo_list *next = entry->next;
1597 free (entry);
1598 entry = next;
1599 }
9abc968f 1600
25dbc73a
AM
1601 head = NULL;
1602}
9abc968f 1603
25dbc73a
AM
1604/* Scan the input BFDs and create a linked list of
1605 the APUinfo values that will need to be emitted. */
9abc968f 1606
25dbc73a
AM
1607static void
1608ppc_elf_begin_write_processing (bfd *abfd, struct bfd_link_info *link_info)
1609{
1610 bfd *ibfd;
1611 asection *asec;
deddc40b
NS
1612 char *buffer = NULL;
1613 bfd_size_type largest_input_size = 0;
25dbc73a 1614 unsigned i;
25dbc73a
AM
1615 unsigned long length;
1616 const char *error_message = NULL;
9abc968f 1617
25dbc73a
AM
1618 if (link_info == NULL)
1619 return;
9abc968f 1620
25dbc73a 1621 apuinfo_list_init ();
252b5132 1622
25dbc73a 1623 /* Read in the input sections contents. */
c72f2fb2 1624 for (ibfd = link_info->input_bfds; ibfd; ibfd = ibfd->link.next)
252b5132 1625 {
25dbc73a 1626 unsigned long datum;
252b5132 1627
25dbc73a
AM
1628 asec = bfd_get_section_by_name (ibfd, APUINFO_SECTION_NAME);
1629 if (asec == NULL)
1630 continue;
252b5132 1631
695344c0 1632 /* xgettext:c-format */
871b3ab2 1633 error_message = _("corrupt %s section in %pB");
25dbc73a 1634 length = asec->size;
deddc40b
NS
1635 if (length < 20)
1636 goto fail;
1637
0a1b45a2 1638 apuinfo_set = true;
deddc40b 1639 if (largest_input_size < asec->size)
25dbc73a 1640 {
c9594989 1641 free (buffer);
deddc40b
NS
1642 largest_input_size = asec->size;
1643 buffer = bfd_malloc (largest_input_size);
1644 if (!buffer)
1645 return;
25dbc73a 1646 }
5b914448 1647
25dbc73a 1648 if (bfd_seek (ibfd, asec->filepos, SEEK_SET) != 0
deddc40b 1649 || (bfd_bread (buffer, length, ibfd) != length))
25dbc73a 1650 {
695344c0 1651 /* xgettext:c-format */
871b3ab2 1652 error_message = _("unable to read in %s section from %pB");
25dbc73a
AM
1653 goto fail;
1654 }
252b5132 1655
25dbc73a
AM
1656 /* Verify the contents of the header. Note - we have to
1657 extract the values this way in order to allow for a
1658 host whose endian-ness is different from the target. */
deddc40b 1659 datum = bfd_get_32 (ibfd, buffer);
25dbc73a
AM
1660 if (datum != sizeof APUINFO_LABEL)
1661 goto fail;
252b5132 1662
deddc40b 1663 datum = bfd_get_32 (ibfd, buffer + 8);
25dbc73a
AM
1664 if (datum != 0x2)
1665 goto fail;
252b5132 1666
deddc40b 1667 if (strcmp (buffer + 12, APUINFO_LABEL) != 0)
25dbc73a 1668 goto fail;
252b5132 1669
25dbc73a 1670 /* Get the number of bytes used for apuinfo entries. */
deddc40b 1671 datum = bfd_get_32 (ibfd, buffer + 4);
25dbc73a
AM
1672 if (datum + 20 != length)
1673 goto fail;
1674
25dbc73a
AM
1675 /* Scan the apuinfo section, building a list of apuinfo numbers. */
1676 for (i = 0; i < datum; i += 4)
deddc40b 1677 apuinfo_list_add (bfd_get_32 (ibfd, buffer + 20 + i));
252b5132
RH
1678 }
1679
25dbc73a 1680 error_message = NULL;
252b5132 1681
f2faa800 1682 if (apuinfo_set)
deddc40b 1683 {
f2faa800
NS
1684 /* Compute the size of the output section. */
1685 unsigned num_entries = apuinfo_list_length ();
5b914448 1686
deddc40b
NS
1687 /* Set the output section size, if it exists. */
1688 asec = bfd_get_section_by_name (abfd, APUINFO_SECTION_NAME);
f2faa800 1689
fd361982 1690 if (asec && !bfd_set_section_size (asec, 20 + num_entries * 4))
deddc40b
NS
1691 {
1692 ibfd = abfd;
695344c0 1693 /* xgettext:c-format */
871b3ab2 1694 error_message = _("warning: unable to set size of %s section in %pB");
deddc40b
NS
1695 }
1696 }
25dbc73a
AM
1697
1698 fail:
c9594989 1699 free (buffer);
25dbc73a
AM
1700
1701 if (error_message)
cd9af601 1702 _bfd_error_handler (error_message, APUINFO_SECTION_NAME, ibfd);
25dbc73a 1703}
252b5132 1704
25dbc73a
AM
1705/* Prevent the output section from accumulating the input sections'
1706 contents. We have already stored this in our linked list structure. */
252b5132 1707
0a1b45a2 1708static bool
25dbc73a 1709ppc_elf_write_section (bfd *abfd ATTRIBUTE_UNUSED,
c7b8f16e 1710 struct bfd_link_info *link_info ATTRIBUTE_UNUSED,
25dbc73a
AM
1711 asection *asec,
1712 bfd_byte *contents ATTRIBUTE_UNUSED)
1713{
f2faa800 1714 return apuinfo_set && strcmp (asec->name, APUINFO_SECTION_NAME) == 0;
252b5132
RH
1715}
1716
25dbc73a
AM
1717/* Finally we can generate the output section. */
1718
1719static void
cc364be6 1720ppc_final_write_processing (bfd *abfd)
7619e7c7 1721{
25dbc73a
AM
1722 bfd_byte *buffer;
1723 asection *asec;
1724 unsigned i;
1725 unsigned num_entries;
1726 bfd_size_type length;
7619e7c7 1727
25dbc73a
AM
1728 asec = bfd_get_section_by_name (abfd, APUINFO_SECTION_NAME);
1729 if (asec == NULL)
1730 return;
1731
f2faa800 1732 if (!apuinfo_set)
25dbc73a
AM
1733 return;
1734
1735 length = asec->size;
1736 if (length < 20)
1737 return;
1738
1739 buffer = bfd_malloc (length);
1740 if (buffer == NULL)
7619e7c7 1741 {
4eca0228 1742 _bfd_error_handler
cf97bcb0 1743 (_("failed to allocate space for new APUinfo section"));
25dbc73a 1744 return;
7619e7c7 1745 }
7619e7c7 1746
25dbc73a
AM
1747 /* Create the apuinfo header. */
1748 num_entries = apuinfo_list_length ();
1749 bfd_put_32 (abfd, sizeof APUINFO_LABEL, buffer);
1750 bfd_put_32 (abfd, num_entries * 4, buffer + 4);
1751 bfd_put_32 (abfd, 0x2, buffer + 8);
1752 strcpy ((char *) buffer + 12, APUINFO_LABEL);
feee612b 1753
25dbc73a
AM
1754 length = 20;
1755 for (i = 0; i < num_entries; i++)
feee612b 1756 {
25dbc73a
AM
1757 bfd_put_32 (abfd, apuinfo_list_element (i), buffer + length);
1758 length += 4;
feee612b 1759 }
feee612b 1760
25dbc73a 1761 if (length != asec->size)
cf97bcb0 1762 _bfd_error_handler (_("failed to compute new APUinfo section"));
252b5132 1763
25dbc73a 1764 if (! bfd_set_section_contents (abfd, asec, buffer, (file_ptr) 0, length))
cf97bcb0 1765 _bfd_error_handler (_("failed to install new APUinfo section"));
252b5132 1766
25dbc73a
AM
1767 free (buffer);
1768
1769 apuinfo_list_finish ();
252b5132 1770}
06f44071 1771
0a1b45a2 1772static bool
cc364be6 1773ppc_elf_final_write_processing (bfd *abfd)
06f44071 1774{
cc364be6
AM
1775 ppc_final_write_processing (abfd);
1776 return _bfd_elf_final_write_processing (abfd);
06f44071 1777}
25dbc73a 1778\f
0a1b45a2 1779static bool
c6dd29ce 1780is_nonpic_glink_stub (bfd *abfd, asection *glink, bfd_vma off)
7382d32a 1781{
407aa07c 1782 bfd_byte buf[4 * 4];
7382d32a 1783
9e390558 1784 if (!bfd_get_section_contents (abfd, glink, buf, off, sizeof buf))
0a1b45a2 1785 return false;
7382d32a 1786
c6dd29ce
AM
1787 return ((bfd_get_32 (abfd, buf + 0) & 0xffff0000) == LIS_11
1788 && (bfd_get_32 (abfd, buf + 4) & 0xffff0000) == LWZ_11_11
407aa07c
AM
1789 && bfd_get_32 (abfd, buf + 8) == MTCTR_11
1790 && bfd_get_32 (abfd, buf + 12) == BCTR);
7382d32a
AM
1791}
1792
0a1b45a2 1793static bool
468392fb
AM
1794section_covers_vma (bfd *abfd ATTRIBUTE_UNUSED, asection *section, void *ptr)
1795{
1796 bfd_vma vma = *(bfd_vma *) ptr;
1797 return ((section->flags & SEC_ALLOC) != 0
1798 && section->vma <= vma
1799 && vma < section->vma + section->size);
1800}
1801
1802static long
1803ppc_elf_get_synthetic_symtab (bfd *abfd, long symcount, asymbol **syms,
1804 long dynsymcount, asymbol **dynsyms,
1805 asymbol **ret)
1806{
0a1b45a2 1807 bool (*slurp_relocs) (bfd *, asection *, asymbol **, bool);
468392fb
AM
1808 asection *plt, *relplt, *dynamic, *glink;
1809 bfd_vma glink_vma = 0;
1810 bfd_vma resolv_vma = 0;
9e390558 1811 bfd_vma stub_off;
468392fb
AM
1812 asymbol *s;
1813 arelent *p;
9ad9b810 1814 size_t count, i, stub_delta;
468392fb
AM
1815 size_t size;
1816 char *names;
1817 bfd_byte buf[4];
1818
1819 *ret = NULL;
1820
1821 if ((abfd->flags & (DYNAMIC | EXEC_P)) == 0)
1822 return 0;
1823
1824 if (dynsymcount <= 0)
1825 return 0;
1826
1827 relplt = bfd_get_section_by_name (abfd, ".rela.plt");
1828 if (relplt == NULL)
1829 return 0;
1830
1831 plt = bfd_get_section_by_name (abfd, ".plt");
1832 if (plt == NULL)
1833 return 0;
1834
1835 /* Call common code to handle old-style executable PLTs. */
1836 if (elf_section_flags (plt) & SHF_EXECINSTR)
1837 return _bfd_elf_get_synthetic_symtab (abfd, symcount, syms,
1838 dynsymcount, dynsyms, ret);
1839
1840 /* If this object was prelinked, the prelinker stored the address
1841 of .glink at got[1]. If it wasn't prelinked, got[1] will be zero. */
1842 dynamic = bfd_get_section_by_name (abfd, ".dynamic");
1843 if (dynamic != NULL)
1844 {
1845 bfd_byte *dynbuf, *extdyn, *extdynend;
1846 size_t extdynsize;
1847 void (*swap_dyn_in) (bfd *, const void *, Elf_Internal_Dyn *);
1848
1849 if (!bfd_malloc_and_get_section (abfd, dynamic, &dynbuf))
1850 return -1;
1851
1852 extdynsize = get_elf_backend_data (abfd)->s->sizeof_dyn;
1853 swap_dyn_in = get_elf_backend_data (abfd)->s->swap_dyn_in;
1854
1855 extdyn = dynbuf;
1856 extdynend = extdyn + dynamic->size;
1857 for (; extdyn < extdynend; extdyn += extdynsize)
1858 {
1859 Elf_Internal_Dyn dyn;
1860 (*swap_dyn_in) (abfd, extdyn, &dyn);
1861
1862 if (dyn.d_tag == DT_NULL)
1863 break;
1864
1865 if (dyn.d_tag == DT_PPC_GOT)
1866 {
1867 unsigned int g_o_t = dyn.d_un.d_val;
1868 asection *got = bfd_get_section_by_name (abfd, ".got");
1869 if (got != NULL
1870 && bfd_get_section_contents (abfd, got, buf,
1871 g_o_t - got->vma + 4, 4))
1872 glink_vma = bfd_get_32 (abfd, buf);
1873 break;
1874 }
1875 }
1876 free (dynbuf);
1877 }
1878
1879 /* Otherwise we read the first plt entry. */
1880 if (glink_vma == 0)
1881 {
1882 if (bfd_get_section_contents (abfd, plt, buf, 0, 4))
1883 glink_vma = bfd_get_32 (abfd, buf);
1884 }
1885
1886 if (glink_vma == 0)
1887 return 0;
1888
1889 /* The .glink section usually does not survive the final
1890 link; search for the section (usually .text) where the
1891 glink stubs now reside. */
1892 glink = bfd_sections_find_if (abfd, section_covers_vma, &glink_vma);
1893 if (glink == NULL)
1894 return 0;
1895
1896 /* Determine glink PLT resolver by reading the relative branch
1897 from the first glink stub. */
1898 if (bfd_get_section_contents (abfd, glink, buf,
1899 glink_vma - glink->vma, 4))
1900 {
1901 unsigned int insn = bfd_get_32 (abfd, buf);
1902
1903 /* The first glink stub may either branch to the resolver ... */
1904 insn ^= B;
1905 if ((insn & ~0x3fffffc) == 0)
1906 resolv_vma = glink_vma + (insn ^ 0x2000000) - 0x2000000;
1907
1908 /* ... or fall through a bunch of NOPs. */
1909 else if ((insn ^ B ^ NOP) == 0)
1910 for (i = 4;
1911 bfd_get_section_contents (abfd, glink, buf,
1912 glink_vma - glink->vma + i, 4);
1913 i += 4)
1914 if (bfd_get_32 (abfd, buf) != NOP)
1915 {
1916 resolv_vma = glink_vma + i;
1917 break;
1918 }
1919 }
1920
7382d32a 1921 count = relplt->size / sizeof (Elf32_External_Rela);
7382d32a
AM
1922 /* If the stubs are those for -shared/-pie then we might have
1923 multiple stubs for each plt entry. If that is the case then
1924 there is no way to associate stubs with their plt entries short
9e390558
AM
1925 of figuring out the GOT pointer value used in the stub.
1926 The offsets tested here need to cover all possible values of
1927 GLINK_ENTRY_SIZE for other than __tls_get_addr_opt. */
1928 stub_off = glink_vma - glink->vma;
1929 for (stub_delta = 16; stub_delta <= 32; stub_delta += 8)
1930 if (is_nonpic_glink_stub (abfd, glink, stub_off - stub_delta))
1931 break;
1932 if (stub_delta > 32)
7382d32a
AM
1933 return 0;
1934
468392fb 1935 slurp_relocs = get_elf_backend_data (abfd)->s->slurp_reloc_table;
0a1b45a2 1936 if (! (*slurp_relocs) (abfd, relplt, dynsyms, true))
468392fb
AM
1937 return -1;
1938
468392fb
AM
1939 size = count * sizeof (asymbol);
1940 p = relplt->relocation;
1941 for (i = 0; i < count; i++, p++)
e054468f
AM
1942 {
1943 size += strlen ((*p->sym_ptr_ptr)->name) + sizeof ("@plt");
1944 if (p->addend != 0)
1945 size += sizeof ("+0x") - 1 + 8;
1946 }
468392fb
AM
1947
1948 size += sizeof (asymbol) + sizeof ("__glink");
1949
1950 if (resolv_vma)
1951 size += sizeof (asymbol) + sizeof ("__glink_PLTresolve");
1952
1953 s = *ret = bfd_malloc (size);
1954 if (s == NULL)
1955 return -1;
1956
9e390558 1957 stub_off = glink_vma - glink->vma;
468392fb 1958 names = (char *) (s + count + 1 + (resolv_vma != 0));
1079403c
AM
1959 p = relplt->relocation + count - 1;
1960 for (i = 0; i < count; i++)
468392fb
AM
1961 {
1962 size_t len;
1963
9e390558
AM
1964 stub_off -= stub_delta;
1965 if (strcmp ((*p->sym_ptr_ptr)->name, "__tls_get_addr_opt") == 0)
1966 stub_off -= 32;
468392fb
AM
1967 *s = **p->sym_ptr_ptr;
1968 /* Undefined syms won't have BSF_LOCAL or BSF_GLOBAL set. Since
1969 we are defining a symbol, ensure one of them is set. */
1970 if ((s->flags & BSF_LOCAL) == 0)
1971 s->flags |= BSF_GLOBAL;
6ba2a415 1972 s->flags |= BSF_SYNTHETIC;
468392fb 1973 s->section = glink;
9e390558 1974 s->value = stub_off;
468392fb
AM
1975 s->name = names;
1976 s->udata.p = NULL;
1977 len = strlen ((*p->sym_ptr_ptr)->name);
1978 memcpy (names, (*p->sym_ptr_ptr)->name, len);
1979 names += len;
e054468f
AM
1980 if (p->addend != 0)
1981 {
1982 memcpy (names, "+0x", sizeof ("+0x") - 1);
1983 names += sizeof ("+0x") - 1;
1984 bfd_sprintf_vma (abfd, names, p->addend);
1985 names += strlen (names);
1986 }
468392fb
AM
1987 memcpy (names, "@plt", sizeof ("@plt"));
1988 names += sizeof ("@plt");
1989 ++s;
1079403c 1990 --p;
468392fb
AM
1991 }
1992
1993 /* Add a symbol at the start of the glink branch table. */
86a4952b 1994 memset (s, 0, sizeof *s);
468392fb 1995 s->the_bfd = abfd;
6ba2a415 1996 s->flags = BSF_GLOBAL | BSF_SYNTHETIC;
468392fb
AM
1997 s->section = glink;
1998 s->value = glink_vma - glink->vma;
1999 s->name = names;
2000 memcpy (names, "__glink", sizeof ("__glink"));
2001 names += sizeof ("__glink");
2002 s++;
2003 count++;
2004
2005 if (resolv_vma)
2006 {
2007 /* Add a symbol for the glink PLT resolver. */
86a4952b 2008 memset (s, 0, sizeof *s);
468392fb 2009 s->the_bfd = abfd;
6ba2a415 2010 s->flags = BSF_GLOBAL | BSF_SYNTHETIC;
468392fb
AM
2011 s->section = glink;
2012 s->value = resolv_vma - glink->vma;
2013 s->name = names;
2014 memcpy (names, "__glink_PLTresolve", sizeof ("__glink_PLTresolve"));
2015 names += sizeof ("__glink_PLTresolve");
2016 s++;
2017 count++;
2018 }
2019
2020 return count;
2021}
2022\f
25dbc73a
AM
2023/* The following functions are specific to the ELF linker, while
2024 functions above are used generally. They appear in this file more
2025 or less in the order in which they are called. eg.
2026 ppc_elf_check_relocs is called early in the link process,
2027 ppc_elf_finish_dynamic_sections is one of the last functions
2028 called. */
252b5132 2029
a6aa5195 2030/* Track PLT entries needed for a given symbol. We might need more
a877a2b6 2031 than one glink entry per symbol when generating a pic binary. */
a6aa5195
AM
2032struct plt_entry
2033{
2034 struct plt_entry *next;
2035
2036 /* -fPIC uses multiple GOT sections, one per file, called ".got2".
2037 This field stores the offset into .got2 used to initialise the
a877a2b6
AM
2038 GOT pointer reg. It will always be at least 32768. (Current
2039 gcc always uses an offset of 32768, but ld -r will pack .got2
2040 sections together resulting in larger offsets). */
a6aa5195
AM
2041 bfd_vma addend;
2042
2043 /* The .got2 section. */
2044 asection *sec;
2045
2046 /* PLT refcount or offset. */
2047 union
2048 {
2049 bfd_signed_vma refcount;
2050 bfd_vma offset;
2051 } plt;
2052
2053 /* .glink stub offset. */
2054 bfd_vma glink_offset;
2055};
2056
7c8bbca5
AM
2057/* Of those relocs that might be copied as dynamic relocs, this
2058 function selects those that must be copied when linking a shared
2059 library or PIE, even when the symbol is local. */
252b5132 2060
1d483afe
AM
2061static int
2062must_be_dyn_reloc (struct bfd_link_info *info,
2063 enum elf_ppc_reloc_type r_type)
2064{
2065 switch (r_type)
2066 {
2067 default:
7c8bbca5
AM
2068 /* Only relative relocs can be resolved when the object load
2069 address isn't fixed. DTPREL32 is excluded because the
2070 dynamic linker needs to differentiate global dynamic from
2071 local dynamic __tls_index pairs when PPC_OPT_TLS is set. */
1d483afe
AM
2072 return 1;
2073
2074 case R_PPC_REL24:
2075 case R_PPC_REL14:
2076 case R_PPC_REL14_BRTAKEN:
2077 case R_PPC_REL14_BRNTAKEN:
2078 case R_PPC_REL32:
2079 return 0;
2080
2081 case R_PPC_TPREL32:
2082 case R_PPC_TPREL16:
2083 case R_PPC_TPREL16_LO:
2084 case R_PPC_TPREL16_HI:
2085 case R_PPC_TPREL16_HA:
7c8bbca5
AM
2086 /* These relocations are relative but in a shared library the
2087 linker doesn't know the thread pointer base. */
2088 return bfd_link_dll (info);
1d483afe
AM
2089 }
2090}
252b5132 2091
25dbc73a
AM
2092/* If ELIMINATE_COPY_RELOCS is non-zero, the linker will try to avoid
2093 copying dynamic variables from a shared lib into an app's dynbss
2094 section, and instead use a dynamic relocation to point into the
2095 shared lib. */
2096#define ELIMINATE_COPY_RELOCS 1
252b5132 2097
f95f8542
AM
2098/* Used to track dynamic relocations for local symbols. */
2099struct ppc_dyn_relocs
2100{
2101 struct ppc_dyn_relocs *next;
2102
2103 /* The input section of the reloc. */
2104 asection *sec;
2105
2106 /* Total number of relocs copied for the input section. */
2107 unsigned int count : 31;
2108
2109 /* Whether this entry is for STT_GNU_IFUNC symbols. */
2110 unsigned int ifunc : 1;
2111};
2112
25dbc73a 2113/* PPC ELF linker hash entry. */
252b5132 2114
25dbc73a
AM
2115struct ppc_elf_link_hash_entry
2116{
2117 struct elf_link_hash_entry elf;
252b5132 2118
25dbc73a
AM
2119 /* If this symbol is used in the linker created sections, the processor
2120 specific backend uses this field to map the field into the offset
2121 from the beginning of the section. */
2122 elf_linker_section_pointers_t *linker_section_pointer;
252b5132 2123
37da22e5
AM
2124 /* Contexts in which symbol is used in the GOT.
2125 Bits are or'd into the mask as the corresponding relocs are
2126 encountered during check_relocs, with TLS_TLS being set when any
2127 of the other TLS bits are set. tls_optimize clears bits when
2128 optimizing to indicate the corresponding GOT entry type is not
2129 needed. If set, TLS_TLS is never cleared. tls_optimize may also
b00a0a86 2130 set TLS_GDIE when a GD reloc turns into an IE one.
37da22e5
AM
2131 These flags are also kept for local symbols. */
2132#define TLS_TLS 1 /* Any TLS reloc. */
2133#define TLS_GD 2 /* GD reloc. */
2134#define TLS_LD 4 /* LD reloc. */
2135#define TLS_TPREL 8 /* TPREL reloc, => IE. */
2136#define TLS_DTPREL 16 /* DTPREL reloc, => LD. */
2137#define TLS_MARK 32 /* __tls_get_addr call marked. */
b00a0a86 2138#define TLS_GDIE 64 /* GOT TPREL reloc resulting from GD->IE. */
bac3c8c5 2139 unsigned char tls_mask;
4dc4a9a5 2140
37da22e5
AM
2141 /* The above field is also used to mark function symbols. In which
2142 case TLS_TLS will be 0. */
2143#define PLT_IFUNC 2 /* STT_GNU_IFUNC. */
2d7ad24e 2144#define PLT_KEEP 4 /* inline plt call requires plt entry. */
37da22e5
AM
2145#define NON_GOT 256 /* local symbol plt, not stored. */
2146
4dc4a9a5
DJ
2147 /* Nonzero if we have seen a small data relocation referring to this
2148 symbol. */
d3e454b9
AM
2149 unsigned char has_sda_refs : 1;
2150
2151 /* Flag use of given relocations. */
2152 unsigned char has_addr16_ha : 1;
2153 unsigned char has_addr16_lo : 1;
25dbc73a 2154};
252b5132 2155
25dbc73a
AM
2156#define ppc_elf_hash_entry(ent) ((struct ppc_elf_link_hash_entry *) (ent))
2157
2158/* PPC ELF linker hash table. */
2159
2160struct ppc_elf_link_hash_table
2161{
2162 struct elf_link_hash_table elf;
2163
5446cbdf
AM
2164 /* Various options passed from the linker. */
2165 struct ppc_elf_params *params;
2166
25dbc73a 2167 /* Short-cuts to get to dynamic linker sections. */
d7128ce4 2168 asection *glink;
25dbc73a
AM
2169 asection *dynsbss;
2170 asection *relsbss;
c9a2f333 2171 elf_linker_section_t sdata[2];
25dbc73a 2172 asection *sbss;
6177242a 2173 asection *glink_eh_frame;
2d7ad24e
AM
2174 asection *pltlocal;
2175 asection *relpltlocal;
25dbc73a 2176
016687f8
AM
2177 /* The (unloaded but important) .rela.plt.unloaded on VxWorks. */
2178 asection *srelplt2;
2179
1d483afe 2180 /* Shortcut to __tls_get_addr. */
25dbc73a 2181 struct elf_link_hash_entry *tls_get_addr;
252b5132 2182
016687f8
AM
2183 /* The bfd that forced an old-style PLT. */
2184 bfd *old_bfd;
5b914448 2185
25dbc73a
AM
2186 /* TLS local dynamic got entry handling. */
2187 union {
2188 bfd_signed_vma refcount;
2189 bfd_vma offset;
2190 } tlsld_got;
252b5132 2191
c6dd29ce 2192 /* Offset of branch table to PltResolve function in glink. */
d7128ce4
AM
2193 bfd_vma glink_pltresolve;
2194
3b36f7e6
AM
2195 /* Size of reserved GOT entries. */
2196 unsigned int got_header_size;
2197 /* Non-zero if allocating the header left a gap. */
2198 unsigned int got_gap;
2199
4a3dc543
RS
2200 /* The type of PLT we have chosen to use. */
2201 enum ppc_elf_plt_type plt_type;
2202
82e66161
AM
2203 /* Whether there exist local gnu indirect function resolvers,
2204 referenced by dynamic relocations. */
2205 unsigned int local_ifunc_resolver:1;
2206 unsigned int maybe_local_ifunc_resolver:1;
2207
9a23f96e
AM
2208 /* Set if tls optimization is enabled. */
2209 unsigned int do_tls_opt:1;
2210
3e04d765
AM
2211 /* Set if inline plt calls should be converted to direct calls. */
2212 unsigned int can_convert_all_inline_plt:1;
2213
9d8504b1
PB
2214 /* The size of PLT entries. */
2215 int plt_entry_size;
2216 /* The distance between adjacent PLT slots. */
2217 int plt_slot_size;
2218 /* The size of the first PLT entry. */
2219 int plt_initial_entry_size;
25dbc73a 2220};
252b5132 2221
94caa966
AM
2222/* Rename some of the generic section flags to better document how they
2223 are used for ppc32. The flags are only valid for ppc32 elf objects. */
2224
2225/* Nonzero if this section has TLS related relocations. */
2226#define has_tls_reloc sec_flg0
2227
9737e8af
AM
2228/* Nonzero if this section has a call to __tls_get_addr lacking marker
2229 relocs. */
2230#define nomark_tls_get_addr sec_flg1
94caa966 2231
3e04d765
AM
2232 /* Flag set when PLTCALL relocs are detected. */
2233#define has_pltcall sec_flg2
2234
25dbc73a 2235/* Get the PPC ELF linker hash table from a link_info structure. */
252b5132 2236
25dbc73a 2237#define ppc_elf_hash_table(p) \
a8d549c0
AM
2238 ((is_elf_hash_table ((p)->hash) \
2239 && elf_hash_table_id (elf_hash_table (p)) == PPC32_ELF_DATA) \
2240 ? (struct ppc_elf_link_hash_table *) (p)->hash : NULL)
252b5132 2241
25dbc73a 2242/* Create an entry in a PPC ELF linker hash table. */
252b5132 2243
25dbc73a
AM
2244static struct bfd_hash_entry *
2245ppc_elf_link_hash_newfunc (struct bfd_hash_entry *entry,
2246 struct bfd_hash_table *table,
2247 const char *string)
252b5132 2248{
25dbc73a
AM
2249 /* Allocate the structure if it has not already been allocated by a
2250 subclass. */
2251 if (entry == NULL)
2252 {
2253 entry = bfd_hash_allocate (table,
2254 sizeof (struct ppc_elf_link_hash_entry));
2255 if (entry == NULL)
2256 return entry;
2257 }
252b5132 2258
25dbc73a
AM
2259 /* Call the allocation method of the superclass. */
2260 entry = _bfd_elf_link_hash_newfunc (entry, table, string);
2261 if (entry != NULL)
2262 {
2263 ppc_elf_hash_entry (entry)->linker_section_pointer = NULL;
25dbc73a 2264 ppc_elf_hash_entry (entry)->tls_mask = 0;
5240d94d 2265 ppc_elf_hash_entry (entry)->has_sda_refs = 0;
25dbc73a 2266 }
252b5132 2267
25dbc73a 2268 return entry;
252b5132 2269}
3dab13f6 2270
25dbc73a 2271/* Create a PPC ELF linker hash table. */
3dab13f6 2272
25dbc73a
AM
2273static struct bfd_link_hash_table *
2274ppc_elf_link_hash_table_create (bfd *abfd)
3dab13f6 2275{
25dbc73a 2276 struct ppc_elf_link_hash_table *ret;
76e7a751 2277 static struct ppc_elf_params default_params
407aa07c 2278 = { PLT_OLD, 0, 0, 1, 0, 0, 12, 0, 0, 0 };
3dab13f6 2279
25dbc73a
AM
2280 ret = bfd_zmalloc (sizeof (struct ppc_elf_link_hash_table));
2281 if (ret == NULL)
2282 return NULL;
3dab13f6 2283
66eb6687
AM
2284 if (!_bfd_elf_link_hash_table_init (&ret->elf, abfd,
2285 ppc_elf_link_hash_newfunc,
4dfe6ac6
NC
2286 sizeof (struct ppc_elf_link_hash_entry),
2287 PPC32_ELF_DATA))
3dab13f6 2288 {
25dbc73a
AM
2289 free (ret);
2290 return NULL;
2291 }
58111eb7 2292
a6aa5195
AM
2293 ret->elf.init_plt_refcount.refcount = 0;
2294 ret->elf.init_plt_refcount.glist = NULL;
2295 ret->elf.init_plt_offset.offset = 0;
2296 ret->elf.init_plt_offset.glist = NULL;
2297
db434ba0
AM
2298 ret->params = &default_params;
2299
c9a2f333
AM
2300 ret->sdata[0].name = ".sdata";
2301 ret->sdata[0].sym_name = "_SDA_BASE_";
2302 ret->sdata[0].bss_name = ".sbss";
2303
2304 ret->sdata[1].name = ".sdata2";
2305 ret->sdata[1].sym_name = "_SDA2_BASE_";
2306 ret->sdata[1].bss_name = ".sbss2";
2307
9d8504b1
PB
2308 ret->plt_entry_size = 12;
2309 ret->plt_slot_size = 8;
2310 ret->plt_initial_entry_size = 72;
9d8504b1 2311
25dbc73a
AM
2312 return &ret->elf.root;
2313}
3dab13f6 2314
5446cbdf
AM
2315/* Hook linker params into hash table. */
2316
2317void
2318ppc_elf_link_params (struct bfd_link_info *info, struct ppc_elf_params *params)
2319{
2320 struct ppc_elf_link_hash_table *htab = ppc_elf_hash_table (info);
2321
2322 if (htab)
2323 htab->params = params;
76e7a751 2324 params->pagesize_p2 = bfd_log2 (params->pagesize);
5446cbdf
AM
2325}
2326
9d8504b1 2327/* Create .got and the related sections. */
3dab13f6 2328
0a1b45a2 2329static bool
25dbc73a
AM
2330ppc_elf_create_got (bfd *abfd, struct bfd_link_info *info)
2331{
2332 struct ppc_elf_link_hash_table *htab;
3dab13f6 2333
25dbc73a 2334 if (!_bfd_elf_create_got_section (abfd, info))
0a1b45a2 2335 return false;
3dab13f6 2336
25dbc73a 2337 htab = ppc_elf_hash_table (info);
90c14f0c 2338 if (htab->elf.target_os != is_vxworks)
9d8504b1
PB
2339 {
2340 /* The powerpc .got has a blrl instruction in it. Mark it
2341 executable. */
ce558b89
AM
2342 flagword flags = (SEC_ALLOC | SEC_LOAD | SEC_CODE | SEC_HAS_CONTENTS
2343 | SEC_IN_MEMORY | SEC_LINKER_CREATED);
fd361982 2344 if (!bfd_set_section_flags (htab->elf.sgot, flags))
0a1b45a2 2345 return false;
9d8504b1 2346 }
3dab13f6 2347
0a1b45a2 2348 return true;
25dbc73a 2349}
3dab13f6 2350
93d1b056
AM
2351/* Create a special linker section, used for R_PPC_EMB_SDAI16 and
2352 R_PPC_EMB_SDA2I16 pointers. These sections become part of .sdata
2353 and .sdata2. Create _SDA_BASE_ and _SDA2_BASE too. */
2354
0a1b45a2 2355static bool
93d1b056
AM
2356ppc_elf_create_linker_section (bfd *abfd,
2357 struct bfd_link_info *info,
2358 flagword flags,
2359 elf_linker_section_t *lsect)
2360{
2361 asection *s;
2362
2363 flags |= (SEC_ALLOC | SEC_LOAD | SEC_HAS_CONTENTS | SEC_IN_MEMORY
2364 | SEC_LINKER_CREATED);
2365
2366 s = bfd_make_section_anyway_with_flags (abfd, lsect->name, flags);
2367 if (s == NULL)
0a1b45a2 2368 return false;
93d1b056
AM
2369 lsect->section = s;
2370
2371 /* Define the sym on the first section of this name. */
2372 s = bfd_get_section_by_name (abfd, lsect->name);
2373
2374 lsect->sym = _bfd_elf_define_linkage_sym (abfd, info, s, lsect->sym_name);
2375 if (lsect->sym == NULL)
0a1b45a2 2376 return false;
93d1b056 2377 lsect->sym->root.u.def.value = 0x8000;
0a1b45a2 2378 return true;
93d1b056
AM
2379}
2380
0a1b45a2 2381static bool
e054468f
AM
2382ppc_elf_create_glink (bfd *abfd, struct bfd_link_info *info)
2383{
2384 struct ppc_elf_link_hash_table *htab = ppc_elf_hash_table (info);
2385 asection *s;
2386 flagword flags;
691d2e9a 2387 int p2align;
e054468f
AM
2388
2389 flags = (SEC_ALLOC | SEC_LOAD | SEC_CODE | SEC_READONLY | SEC_HAS_CONTENTS
2390 | SEC_IN_MEMORY | SEC_LINKER_CREATED);
2391 s = bfd_make_section_anyway_with_flags (abfd, ".glink", flags);
2392 htab->glink = s;
691d2e9a
AM
2393 p2align = htab->params->ppc476_workaround ? 6 : 4;
2394 if (p2align < htab->params->plt_stub_align)
2395 p2align = htab->params->plt_stub_align;
e054468f 2396 if (s == NULL
fd361982 2397 || !bfd_set_section_alignment (s, p2align))
0a1b45a2 2398 return false;
e054468f 2399
6177242a
AM
2400 if (!info->no_ld_generated_unwind_info)
2401 {
2402 flags = (SEC_ALLOC | SEC_LOAD | SEC_READONLY | SEC_HAS_CONTENTS
2403 | SEC_IN_MEMORY | SEC_LINKER_CREATED);
2404 s = bfd_make_section_anyway_with_flags (abfd, ".eh_frame", flags);
2405 htab->glink_eh_frame = s;
2406 if (s == NULL
fd361982 2407 || !bfd_set_section_alignment (s, 2))
0a1b45a2 2408 return false;
6177242a
AM
2409 }
2410
e054468f
AM
2411 flags = SEC_ALLOC | SEC_LINKER_CREATED;
2412 s = bfd_make_section_anyway_with_flags (abfd, ".iplt", flags);
ce558b89 2413 htab->elf.iplt = s;
e054468f 2414 if (s == NULL
fd361982 2415 || !bfd_set_section_alignment (s, 4))
0a1b45a2 2416 return false;
e054468f
AM
2417
2418 flags = (SEC_ALLOC | SEC_LOAD | SEC_READONLY | SEC_HAS_CONTENTS
2419 | SEC_IN_MEMORY | SEC_LINKER_CREATED);
14b2f831 2420 s = bfd_make_section_anyway_with_flags (abfd, ".rela.iplt", flags);
ce558b89 2421 htab->elf.irelplt = s;
e054468f 2422 if (s == NULL
fd361982 2423 || ! bfd_set_section_alignment (s, 2))
0a1b45a2 2424 return false;
93d1b056 2425
2d7ad24e
AM
2426 /* Local plt entries. */
2427 flags = (SEC_ALLOC | SEC_LOAD
2428 | SEC_HAS_CONTENTS | SEC_IN_MEMORY | SEC_LINKER_CREATED);
2429 htab->pltlocal = bfd_make_section_anyway_with_flags (abfd, ".branch_lt",
2430 flags);
2431 if (htab->pltlocal == NULL
fd361982 2432 || !bfd_set_section_alignment (htab->pltlocal, 2))
0a1b45a2 2433 return false;
2d7ad24e
AM
2434
2435 if (bfd_link_pic (info))
2436 {
2437 flags = (SEC_ALLOC | SEC_LOAD | SEC_READONLY
2438 | SEC_HAS_CONTENTS | SEC_IN_MEMORY | SEC_LINKER_CREATED);
2439 htab->relpltlocal
2440 = bfd_make_section_anyway_with_flags (abfd, ".rela.branch_lt", flags);
2441 if (htab->relpltlocal == NULL
fd361982 2442 || !bfd_set_section_alignment (htab->relpltlocal, 2))
0a1b45a2 2443 return false;
2d7ad24e
AM
2444 }
2445
93d1b056
AM
2446 if (!ppc_elf_create_linker_section (abfd, info, 0,
2447 &htab->sdata[0]))
0a1b45a2 2448 return false;
93d1b056
AM
2449
2450 if (!ppc_elf_create_linker_section (abfd, info, SEC_READONLY,
2451 &htab->sdata[1]))
0a1b45a2 2452 return false;
93d1b056 2453
0a1b45a2 2454 return true;
e054468f
AM
2455}
2456
25dbc73a
AM
2457/* We have to create .dynsbss and .rela.sbss here so that they get mapped
2458 to output sections (just like _bfd_elf_create_dynamic_sections has
2459 to create .dynbss and .rela.bss). */
3dab13f6 2460
0a1b45a2 2461static bool
25dbc73a
AM
2462ppc_elf_create_dynamic_sections (bfd *abfd, struct bfd_link_info *info)
2463{
2464 struct ppc_elf_link_hash_table *htab;
2465 asection *s;
2466 flagword flags;
3dab13f6 2467
25dbc73a 2468 htab = ppc_elf_hash_table (info);
3dab13f6 2469
ce558b89 2470 if (htab->elf.sgot == NULL
25dbc73a 2471 && !ppc_elf_create_got (abfd, info))
0a1b45a2 2472 return false;
3dab13f6 2473
25dbc73a 2474 if (!_bfd_elf_create_dynamic_sections (abfd, info))
0a1b45a2 2475 return false;
3dab13f6 2476
e054468f
AM
2477 if (htab->glink == NULL
2478 && !ppc_elf_create_glink (abfd, info))
0a1b45a2 2479 return false;
3dab13f6 2480
14b2f831
AM
2481 s = bfd_make_section_anyway_with_flags (abfd, ".dynsbss",
2482 SEC_ALLOC | SEC_LINKER_CREATED);
3b36f7e6 2483 htab->dynsbss = s;
3496cb2a 2484 if (s == NULL)
0a1b45a2 2485 return false;
3dab13f6 2486
0e1862bb 2487 if (! bfd_link_pic (info))
25dbc73a 2488 {
e054468f
AM
2489 flags = (SEC_ALLOC | SEC_LOAD | SEC_READONLY | SEC_HAS_CONTENTS
2490 | SEC_IN_MEMORY | SEC_LINKER_CREATED);
14b2f831 2491 s = bfd_make_section_anyway_with_flags (abfd, ".rela.sbss", flags);
3b36f7e6 2492 htab->relsbss = s;
25dbc73a 2493 if (s == NULL
fd361982 2494 || !bfd_set_section_alignment (s, 2))
0a1b45a2 2495 return false;
25dbc73a 2496 }
3dab13f6 2497
90c14f0c 2498 if (htab->elf.target_os == is_vxworks
711de32c 2499 && !elf_vxworks_create_dynamic_sections (abfd, info, &htab->srelplt2))
0a1b45a2 2500 return false;
9d8504b1 2501
ce558b89 2502 s = htab->elf.splt;
3b36f7e6 2503 flags = SEC_ALLOC | SEC_CODE | SEC_LINKER_CREATED;
4a3dc543
RS
2504 if (htab->plt_type == PLT_VXWORKS)
2505 /* The VxWorks PLT is a loaded section with contents. */
2506 flags |= SEC_HAS_CONTENTS | SEC_LOAD | SEC_READONLY;
fd361982 2507 return bfd_set_section_flags (s, flags);
25dbc73a 2508}
3dab13f6 2509
25dbc73a 2510/* Copy the extra info we tack onto an elf_link_hash_entry. */
58111eb7 2511
25dbc73a 2512static void
fcfa13d2 2513ppc_elf_copy_indirect_symbol (struct bfd_link_info *info,
25dbc73a
AM
2514 struct elf_link_hash_entry *dir,
2515 struct elf_link_hash_entry *ind)
2516{
2517 struct ppc_elf_link_hash_entry *edir, *eind;
3dab13f6 2518
25dbc73a
AM
2519 edir = (struct ppc_elf_link_hash_entry *) dir;
2520 eind = (struct ppc_elf_link_hash_entry *) ind;
3dab13f6 2521
c79d6685
AM
2522 edir->tls_mask |= eind->tls_mask;
2523 edir->has_sda_refs |= eind->has_sda_refs;
2524
e81830c5
AM
2525 if (edir->elf.versioned != versioned_hidden)
2526 edir->elf.ref_dynamic |= eind->elf.ref_dynamic;
c79d6685
AM
2527 edir->elf.ref_regular |= eind->elf.ref_regular;
2528 edir->elf.ref_regular_nonweak |= eind->elf.ref_regular_nonweak;
4a7e5234 2529 edir->elf.non_got_ref |= eind->elf.non_got_ref;
c79d6685
AM
2530 edir->elf.needs_plt |= eind->elf.needs_plt;
2531 edir->elf.pointer_equality_needed |= eind->elf.pointer_equality_needed;
2532
287c7eaf
AM
2533 /* If we were called to copy over info for a weak sym, that's all. */
2534 if (eind->elf.root.type != bfd_link_hash_indirect)
2535 return;
2536
190eb1dd 2537 if (ind->dyn_relocs != NULL)
25dbc73a 2538 {
190eb1dd 2539 if (dir->dyn_relocs != NULL)
3dab13f6 2540 {
6061a67d
AM
2541 struct elf_dyn_relocs **pp;
2542 struct elf_dyn_relocs *p;
3dab13f6 2543
fcfa13d2 2544 /* Add reloc counts against the indirect sym to the direct sym
25dbc73a 2545 list. Merge any entries against the same section. */
190eb1dd 2546 for (pp = &ind->dyn_relocs; (p = *pp) != NULL; )
3dab13f6 2547 {
6061a67d 2548 struct elf_dyn_relocs *q;
25dbc73a 2549
190eb1dd 2550 for (q = dir->dyn_relocs; q != NULL; q = q->next)
25dbc73a
AM
2551 if (q->sec == p->sec)
2552 {
2553 q->pc_count += p->pc_count;
2554 q->count += p->count;
2555 *pp = p->next;
2556 break;
2557 }
2558 if (q == NULL)
2559 pp = &p->next;
3dab13f6 2560 }
190eb1dd 2561 *pp = dir->dyn_relocs;
3dab13f6 2562 }
25dbc73a 2563
190eb1dd
L
2564 dir->dyn_relocs = ind->dyn_relocs;
2565 ind->dyn_relocs = NULL;
3dab13f6 2566 }
3dab13f6 2567
a6aa5195
AM
2568 /* Copy over the GOT refcount entries that we may have already seen to
2569 the symbol which just became indirect. */
fcfa13d2
AM
2570 edir->elf.got.refcount += eind->elf.got.refcount;
2571 eind->elf.got.refcount = 0;
a6aa5195
AM
2572
2573 /* And plt entries. */
2574 if (eind->elf.plt.plist != NULL)
2575 {
2576 if (edir->elf.plt.plist != NULL)
2577 {
2578 struct plt_entry **entp;
2579 struct plt_entry *ent;
2580
2581 for (entp = &eind->elf.plt.plist; (ent = *entp) != NULL; )
2582 {
2583 struct plt_entry *dent;
2584
2585 for (dent = edir->elf.plt.plist; dent != NULL; dent = dent->next)
2586 if (dent->sec == ent->sec && dent->addend == ent->addend)
2587 {
2588 dent->plt.refcount += ent->plt.refcount;
2589 *entp = ent->next;
2590 break;
2591 }
2592 if (dent == NULL)
2593 entp = &ent->next;
2594 }
2595 *entp = edir->elf.plt.plist;
2596 }
2597
2598 edir->elf.plt.plist = eind->elf.plt.plist;
2599 eind->elf.plt.plist = NULL;
2600 }
2601
fcfa13d2 2602 if (eind->elf.dynindx != -1)
25dbc73a 2603 {
fcfa13d2
AM
2604 if (edir->elf.dynindx != -1)
2605 _bfd_elf_strtab_delref (elf_hash_table (info)->dynstr,
2606 edir->elf.dynstr_index);
a6aa5195
AM
2607 edir->elf.dynindx = eind->elf.dynindx;
2608 edir->elf.dynstr_index = eind->elf.dynstr_index;
2609 eind->elf.dynindx = -1;
2610 eind->elf.dynstr_index = 0;
25dbc73a 2611 }
25dbc73a 2612}
3dab13f6 2613
25dbc73a
AM
2614/* Hook called by the linker routine which adds symbols from an object
2615 file. We use it to put .comm items in .sbss, and not .bss. */
58111eb7 2616
0a1b45a2 2617static bool
25dbc73a
AM
2618ppc_elf_add_symbol_hook (bfd *abfd,
2619 struct bfd_link_info *info,
2620 Elf_Internal_Sym *sym,
2621 const char **namep ATTRIBUTE_UNUSED,
2622 flagword *flagsp ATTRIBUTE_UNUSED,
2623 asection **secp,
2624 bfd_vma *valp)
2625{
2626 if (sym->st_shndx == SHN_COMMON
0e1862bb 2627 && !bfd_link_relocatable (info)
0c8d6e5c
AM
2628 && is_ppc_elf (info->output_bfd)
2629 && sym->st_size <= elf_gp_size (abfd))
25dbc73a
AM
2630 {
2631 /* Common symbols less than or equal to -G nn bytes are automatically
2632 put into .sbss. */
2633 struct ppc_elf_link_hash_table *htab;
3dab13f6 2634
25dbc73a
AM
2635 htab = ppc_elf_hash_table (info);
2636 if (htab->sbss == NULL)
2637 {
10885e24 2638 flagword flags = SEC_IS_COMMON | SEC_SMALL_DATA | SEC_LINKER_CREATED;
3dab13f6 2639
644285ef
AM
2640 if (!htab->elf.dynobj)
2641 htab->elf.dynobj = abfd;
2642
3496cb2a
L
2643 htab->sbss = bfd_make_section_anyway_with_flags (htab->elf.dynobj,
2644 ".sbss",
2645 flags);
2646 if (htab->sbss == NULL)
0a1b45a2 2647 return false;
3dab13f6 2648 }
3dab13f6 2649
25dbc73a
AM
2650 *secp = htab->sbss;
2651 *valp = sym->st_size;
2652 }
3dab13f6 2653
0a1b45a2 2654 return true;
3dab13f6
AM
2655}
2656\f
25dbc73a
AM
2657/* Find a linker generated pointer with a given addend and type. */
2658
2659static elf_linker_section_pointers_t *
2660elf_find_pointer_linker_section
2661 (elf_linker_section_pointers_t *linker_pointers,
2662 bfd_vma addend,
2663 elf_linker_section_t *lsect)
252b5132 2664{
25dbc73a
AM
2665 for ( ; linker_pointers != NULL; linker_pointers = linker_pointers->next)
2666 if (lsect == linker_pointers->lsect && addend == linker_pointers->addend)
2667 return linker_pointers;
252b5132 2668
25dbc73a
AM
2669 return NULL;
2670}
2671
2672/* Allocate a pointer to live in a linker created section. */
2673
0a1b45a2 2674static bool
93d1b056
AM
2675elf_allocate_pointer_linker_section (bfd *abfd,
2676 elf_linker_section_t *lsect,
2677 struct elf_link_hash_entry *h,
2678 const Elf_Internal_Rela *rel)
25dbc73a
AM
2679{
2680 elf_linker_section_pointers_t **ptr_linker_section_ptr = NULL;
2681 elf_linker_section_pointers_t *linker_section_ptr;
2682 unsigned long r_symndx = ELF32_R_SYM (rel->r_info);
2683 bfd_size_type amt;
2684
2685 BFD_ASSERT (lsect != NULL);
2686
2687 /* Is this a global symbol? */
2688 if (h != NULL)
2689 {
2690 struct ppc_elf_link_hash_entry *eh;
2691
2692 /* Has this symbol already been allocated? If so, our work is done. */
2693 eh = (struct ppc_elf_link_hash_entry *) h;
2694 if (elf_find_pointer_linker_section (eh->linker_section_pointer,
2695 rel->r_addend,
2696 lsect))
0a1b45a2 2697 return true;
25dbc73a
AM
2698
2699 ptr_linker_section_ptr = &eh->linker_section_pointer;
25dbc73a
AM
2700 }
2701 else
2702 {
0c8d6e5c 2703 BFD_ASSERT (is_ppc_elf (abfd));
0ffa91dd 2704
25dbc73a
AM
2705 /* Allocation of a pointer to a local symbol. */
2706 elf_linker_section_pointers_t **ptr = elf_local_ptr_offsets (abfd);
2707
2708 /* Allocate a table to hold the local symbols if first time. */
2709 if (!ptr)
2710 {
0ffa91dd 2711 unsigned int num_symbols = elf_symtab_hdr (abfd).sh_info;
25dbc73a
AM
2712
2713 amt = num_symbols;
2714 amt *= sizeof (elf_linker_section_pointers_t *);
2715 ptr = bfd_zalloc (abfd, amt);
2716
2717 if (!ptr)
0a1b45a2 2718 return false;
25dbc73a
AM
2719
2720 elf_local_ptr_offsets (abfd) = ptr;
2721 }
2722
2723 /* Has this symbol already been allocated? If so, our work is done. */
2724 if (elf_find_pointer_linker_section (ptr[r_symndx],
2725 rel->r_addend,
2726 lsect))
0a1b45a2 2727 return true;
252b5132 2728
25dbc73a 2729 ptr_linker_section_ptr = &ptr[r_symndx];
25dbc73a 2730 }
41fcb14e 2731
25dbc73a
AM
2732 /* Allocate space for a pointer in the linker section, and allocate
2733 a new pointer record from internal memory. */
2734 BFD_ASSERT (ptr_linker_section_ptr != NULL);
2735 amt = sizeof (elf_linker_section_pointers_t);
2736 linker_section_ptr = bfd_alloc (abfd, amt);
41fcb14e 2737
25dbc73a 2738 if (!linker_section_ptr)
0a1b45a2 2739 return false;
41fcb14e 2740
25dbc73a
AM
2741 linker_section_ptr->next = *ptr_linker_section_ptr;
2742 linker_section_ptr->addend = rel->r_addend;
2743 linker_section_ptr->lsect = lsect;
25dbc73a 2744 *ptr_linker_section_ptr = linker_section_ptr;
41fcb14e 2745
fd361982 2746 if (!bfd_set_section_alignment (lsect->section, 2))
0a1b45a2 2747 return false;
25dbc73a
AM
2748 linker_section_ptr->offset = lsect->section->size;
2749 lsect->section->size += 4;
7619e7c7 2750
25dbc73a
AM
2751#ifdef DEBUG
2752 fprintf (stderr,
2753 "Create pointer in linker section %s, offset = %ld, section size = %ld\n",
2754 lsect->name, (long) linker_section_ptr->offset,
2755 (long) lsect->section->size);
2756#endif
7619e7c7 2757
0a1b45a2 2758 return true;
41fcb14e
AM
2759}
2760
e054468f 2761static struct plt_entry **
25dbc73a
AM
2762update_local_sym_info (bfd *abfd,
2763 Elf_Internal_Shdr *symtab_hdr,
2764 unsigned long r_symndx,
2765 int tls_type)
252b5132 2766{
25dbc73a 2767 bfd_signed_vma *local_got_refcounts = elf_local_got_refcounts (abfd);
e054468f 2768 struct plt_entry **local_plt;
bac3c8c5 2769 unsigned char *local_got_tls_masks;
252b5132 2770
25dbc73a 2771 if (local_got_refcounts == NULL)
252b5132 2772 {
25dbc73a
AM
2773 bfd_size_type size = symtab_hdr->sh_info;
2774
e054468f
AM
2775 size *= (sizeof (*local_got_refcounts)
2776 + sizeof (*local_plt)
2777 + sizeof (*local_got_tls_masks));
25dbc73a
AM
2778 local_got_refcounts = bfd_zalloc (abfd, size);
2779 if (local_got_refcounts == NULL)
e054468f 2780 return NULL;
25dbc73a 2781 elf_local_got_refcounts (abfd) = local_got_refcounts;
252b5132 2782 }
41fcb14e 2783
e054468f 2784 local_plt = (struct plt_entry **) (local_got_refcounts + symtab_hdr->sh_info);
bac3c8c5 2785 local_got_tls_masks = (unsigned char *) (local_plt + symtab_hdr->sh_info);
37da22e5
AM
2786 local_got_tls_masks[r_symndx] |= tls_type & 0xff;
2787 if ((tls_type & NON_GOT) == 0)
e054468f
AM
2788 local_got_refcounts[r_symndx] += 1;
2789 return local_plt + r_symndx;
25dbc73a 2790}
41fcb14e 2791
0a1b45a2 2792static bool
3ec01793 2793update_plt_info (bfd *abfd, struct plt_entry **plist,
a6aa5195
AM
2794 asection *sec, bfd_vma addend)
2795{
2796 struct plt_entry *ent;
2797
32af9f6e
AM
2798 if (addend < 32768)
2799 sec = NULL;
3ec01793 2800 for (ent = *plist; ent != NULL; ent = ent->next)
a6aa5195
AM
2801 if (ent->sec == sec && ent->addend == addend)
2802 break;
2803 if (ent == NULL)
2804 {
986f0783 2805 size_t amt = sizeof (*ent);
a6aa5195
AM
2806 ent = bfd_alloc (abfd, amt);
2807 if (ent == NULL)
0a1b45a2 2808 return false;
3ec01793 2809 ent->next = *plist;
a6aa5195
AM
2810 ent->sec = sec;
2811 ent->addend = addend;
2812 ent->plt.refcount = 0;
3ec01793 2813 *plist = ent;
a6aa5195
AM
2814 }
2815 ent->plt.refcount += 1;
0a1b45a2 2816 return true;
a6aa5195
AM
2817}
2818
2819static struct plt_entry *
3ec01793 2820find_plt_ent (struct plt_entry **plist, asection *sec, bfd_vma addend)
a6aa5195
AM
2821{
2822 struct plt_entry *ent;
2823
2824 if (addend < 32768)
2825 sec = NULL;
3ec01793 2826 for (ent = *plist; ent != NULL; ent = ent->next)
a6aa5195
AM
2827 if (ent->sec == sec && ent->addend == addend)
2828 break;
2829 return ent;
2830}
2831
0a1b45a2 2832static bool
e054468f
AM
2833is_branch_reloc (enum elf_ppc_reloc_type r_type)
2834{
2835 return (r_type == R_PPC_PLTREL24
2836 || r_type == R_PPC_LOCAL24PC
2837 || r_type == R_PPC_REL24
2838 || r_type == R_PPC_REL14
2839 || r_type == R_PPC_REL14_BRTAKEN
2840 || r_type == R_PPC_REL14_BRNTAKEN
2841 || r_type == R_PPC_ADDR24
2842 || r_type == R_PPC_ADDR14
2843 || r_type == R_PPC_ADDR14_BRTAKEN
dfdaec14
AJ
2844 || r_type == R_PPC_ADDR14_BRNTAKEN
2845 || r_type == R_PPC_VLE_REL24);
e054468f
AM
2846}
2847
23cedd1d
AM
2848/* Relocs on inline plt call sequence insns prior to the call. */
2849
0a1b45a2 2850static bool
23cedd1d
AM
2851is_plt_seq_reloc (enum elf_ppc_reloc_type r_type)
2852{
2853 return (r_type == R_PPC_PLT16_HA
2854 || r_type == R_PPC_PLT16_HI
2855 || r_type == R_PPC_PLT16_LO
2856 || r_type == R_PPC_PLTSEQ);
2857}
2858
e7776f52
AM
2859/* Like bfd_reloc_offset_in_range but without a howto. Return true
2860 iff a field of SIZE bytes at OFFSET is within SEC limits. */
2861
2862static bool
2863offset_in_range (asection *sec, bfd_vma offset, size_t size)
2864{
2865 return offset <= sec->size && size <= sec->size - offset;
2866}
2867
25dbc73a
AM
2868static void
2869bad_shared_reloc (bfd *abfd, enum elf_ppc_reloc_type r_type)
2870{
4eca0228 2871 _bfd_error_handler
695344c0 2872 /* xgettext:c-format */
871b3ab2 2873 (_("%pB: relocation %s cannot be used when making a shared object"),
25dbc73a
AM
2874 abfd,
2875 ppc_elf_howto_table[r_type]->name);
2876 bfd_set_error (bfd_error_bad_value);
252b5132
RH
2877}
2878
25dbc73a
AM
2879/* Look through the relocs for a section during the first phase, and
2880 allocate space in the global offset table or procedure linkage
2881 table. */
252b5132 2882
0a1b45a2 2883static bool
25dbc73a
AM
2884ppc_elf_check_relocs (bfd *abfd,
2885 struct bfd_link_info *info,
2886 asection *sec,
2887 const Elf_Internal_Rela *relocs)
252b5132 2888{
7619e7c7 2889 struct ppc_elf_link_hash_table *htab;
25dbc73a
AM
2890 Elf_Internal_Shdr *symtab_hdr;
2891 struct elf_link_hash_entry **sym_hashes;
2892 const Elf_Internal_Rela *rel;
2893 const Elf_Internal_Rela *rel_end;
a6aa5195 2894 asection *got2, *sreloc;
727fc41e 2895 struct elf_link_hash_entry *tga;
25dbc73a 2896
0e1862bb 2897 if (bfd_link_relocatable (info))
0a1b45a2 2898 return true;
252b5132
RH
2899
2900#ifdef DEBUG
871b3ab2 2901 _bfd_error_handler ("ppc_elf_check_relocs called for section %pA in %pB",
25dbc73a 2902 sec, abfd);
252b5132
RH
2903#endif
2904
0c8d6e5c 2905 BFD_ASSERT (is_ppc_elf (abfd));
0ffa91dd 2906
25dbc73a
AM
2907 /* Initialize howto table if not already done. */
2908 if (!ppc_elf_howto_table[R_PPC_ADDR32])
2909 ppc_elf_howto_init ();
2910
7619e7c7 2911 htab = ppc_elf_hash_table (info);
25f23106
AM
2912 if (htab->glink == NULL)
2913 {
2914 if (htab->elf.dynobj == NULL)
2915 htab->elf.dynobj = abfd;
2916 if (!ppc_elf_create_glink (htab->elf.dynobj, info))
0a1b45a2 2917 return false;
25f23106 2918 }
727fc41e 2919 tga = elf_link_hash_lookup (&htab->elf, "__tls_get_addr",
0a1b45a2 2920 false, false, true);
0ffa91dd 2921 symtab_hdr = &elf_symtab_hdr (abfd);
25dbc73a 2922 sym_hashes = elf_sym_hashes (abfd);
a6aa5195 2923 got2 = bfd_get_section_by_name (abfd, ".got2");
25dbc73a
AM
2924 sreloc = NULL;
2925
2926 rel_end = relocs + sec->reloc_count;
2927 for (rel = relocs; rel < rel_end; rel++)
2928 {
2929 unsigned long r_symndx;
2930 enum elf_ppc_reloc_type r_type;
2931 struct elf_link_hash_entry *h;
727fc41e 2932 int tls_type;
cbf95972 2933 struct plt_entry **ifunc;
2d7ad24e
AM
2934 struct plt_entry **pltent;
2935 bfd_vma addend;
25dbc73a
AM
2936
2937 r_symndx = ELF32_R_SYM (rel->r_info);
2938 if (r_symndx < symtab_hdr->sh_info)
2939 h = NULL;
2940 else
973a3492
L
2941 {
2942 h = sym_hashes[r_symndx - symtab_hdr->sh_info];
2943 while (h->root.type == bfd_link_hash_indirect
2944 || h->root.type == bfd_link_hash_warning)
2945 h = (struct elf_link_hash_entry *) h->root.u.i.link;
2946 }
25dbc73a
AM
2947
2948 /* If a relocation refers to _GLOBAL_OFFSET_TABLE_, create the .got.
2949 This shows up in particular in an R_PPC_ADDR32 in the eabi
2950 startup code. */
3b36f7e6 2951 if (h != NULL
ce558b89 2952 && htab->elf.sgot == NULL
3b36f7e6 2953 && strcmp (h->root.root.string, "_GLOBAL_OFFSET_TABLE_") == 0)
252b5132 2954 {
3b36f7e6
AM
2955 if (htab->elf.dynobj == NULL)
2956 htab->elf.dynobj = abfd;
2957 if (!ppc_elf_create_got (htab->elf.dynobj, info))
0a1b45a2 2958 return false;
3b36f7e6 2959 BFD_ASSERT (h == htab->elf.hgot);
25dbc73a 2960 }
252b5132 2961
727fc41e 2962 tls_type = 0;
de972ffa 2963 r_type = ELF32_R_TYPE (rel->r_info);
cbf95972 2964 ifunc = NULL;
90c14f0c 2965 if (h == NULL && htab->elf.target_os != is_vxworks)
e054468f 2966 {
f1dfbfdb 2967 Elf_Internal_Sym *isym = bfd_sym_from_r_symndx (&htab->elf.sym_cache,
06a162cf
AM
2968 abfd, r_symndx);
2969 if (isym == NULL)
0a1b45a2 2970 return false;
06a162cf 2971
0bed072f 2972 if (ELF_ST_TYPE (isym->st_info) == STT_GNU_IFUNC)
e054468f 2973 {
0bed072f 2974 /* Set PLT_IFUNC flag for this sym, no GOT entry yet. */
06a162cf 2975 ifunc = update_local_sym_info (abfd, symtab_hdr, r_symndx,
37da22e5 2976 NON_GOT | PLT_IFUNC);
06a162cf 2977 if (ifunc == NULL)
0a1b45a2 2978 return false;
e054468f 2979
06a162cf
AM
2980 /* STT_GNU_IFUNC symbols must have a PLT entry;
2981 In a non-pie executable even when there are
2982 no plt calls. */
0e1862bb 2983 if (!bfd_link_pic (info)
08be3224
AM
2984 || is_branch_reloc (r_type)
2985 || r_type == R_PPC_PLT16_LO
2986 || r_type == R_PPC_PLT16_HI
2987 || r_type == R_PPC_PLT16_HA)
e054468f 2988 {
2d7ad24e 2989 addend = 0;
0bed072f 2990 if (r_type == R_PPC_PLTREL24)
08be3224
AM
2991 ppc_elf_tdata (abfd)->makes_plt_call = 1;
2992 if (bfd_link_pic (info)
2993 && (r_type == R_PPC_PLTREL24
2994 || r_type == R_PPC_PLT16_LO
2995 || r_type == R_PPC_PLT16_HI
2996 || r_type == R_PPC_PLT16_HA))
2997 addend = rel->r_addend;
0bed072f 2998 if (!update_plt_info (abfd, ifunc, got2, addend))
0a1b45a2 2999 return false;
e054468f
AM
3000 }
3001 }
25f23106
AM
3002 }
3003
90c14f0c 3004 if (htab->elf.target_os != is_vxworks
de972ffa
AM
3005 && is_branch_reloc (r_type)
3006 && h != NULL
3007 && h == tga)
25f23106 3008 {
de972ffa
AM
3009 if (rel != relocs
3010 && (ELF32_R_TYPE (rel[-1].r_info) == R_PPC_TLSGD
3011 || ELF32_R_TYPE (rel[-1].r_info) == R_PPC_TLSLD))
3012 /* We have a new-style __tls_get_addr call with a marker
3013 reloc. */
3014 ;
3015 else
3016 /* Mark this section as having an old-style call. */
9737e8af 3017 sec->nomark_tls_get_addr = 1;
e054468f 3018 }
727fc41e 3019
25dbc73a
AM
3020 switch (r_type)
3021 {
727fc41e
AM
3022 case R_PPC_TLSGD:
3023 case R_PPC_TLSLD:
3024 /* These special tls relocs tie a call to __tls_get_addr with
3025 its parameter symbol. */
37da22e5
AM
3026 if (h != NULL)
3027 ppc_elf_hash_entry (h)->tls_mask |= TLS_TLS | TLS_MARK;
3028 else
3029 if (!update_local_sym_info (abfd, symtab_hdr, r_symndx,
3030 NON_GOT | TLS_TLS | TLS_MARK))
0a1b45a2 3031 return false;
727fc41e
AM
3032 break;
3033
23cedd1d
AM
3034 case R_PPC_PLTSEQ:
3035 break;
3036
25dbc73a
AM
3037 case R_PPC_GOT_TLSLD16:
3038 case R_PPC_GOT_TLSLD16_LO:
3039 case R_PPC_GOT_TLSLD16_HI:
3040 case R_PPC_GOT_TLSLD16_HA:
25dbc73a
AM
3041 tls_type = TLS_TLS | TLS_LD;
3042 goto dogottls;
252b5132 3043
25dbc73a
AM
3044 case R_PPC_GOT_TLSGD16:
3045 case R_PPC_GOT_TLSGD16_LO:
3046 case R_PPC_GOT_TLSGD16_HI:
3047 case R_PPC_GOT_TLSGD16_HA:
3048 tls_type = TLS_TLS | TLS_GD;
3049 goto dogottls;
3050
3051 case R_PPC_GOT_TPREL16:
3052 case R_PPC_GOT_TPREL16_LO:
3053 case R_PPC_GOT_TPREL16_HI:
3054 case R_PPC_GOT_TPREL16_HA:
7c8bbca5 3055 if (bfd_link_dll (info))
25dbc73a
AM
3056 info->flags |= DF_STATIC_TLS;
3057 tls_type = TLS_TLS | TLS_TPREL;
3058 goto dogottls;
3059
3060 case R_PPC_GOT_DTPREL16:
3061 case R_PPC_GOT_DTPREL16_LO:
3062 case R_PPC_GOT_DTPREL16_HI:
3063 case R_PPC_GOT_DTPREL16_HA:
3064 tls_type = TLS_TLS | TLS_DTPREL;
3065 dogottls:
3066 sec->has_tls_reloc = 1;
1a0670f3 3067 /* Fall through. */
252b5132 3068
25dbc73a
AM
3069 /* GOT16 relocations */
3070 case R_PPC_GOT16:
3071 case R_PPC_GOT16_LO:
3072 case R_PPC_GOT16_HI:
3073 case R_PPC_GOT16_HA:
3074 /* This symbol requires a global offset table entry. */
ce558b89 3075 if (htab->elf.sgot == NULL)
25dbc73a
AM
3076 {
3077 if (htab->elf.dynobj == NULL)
3078 htab->elf.dynobj = abfd;
3079 if (!ppc_elf_create_got (htab->elf.dynobj, info))
0a1b45a2 3080 return false;
25dbc73a
AM
3081 }
3082 if (h != NULL)
3083 {
3084 h->got.refcount += 1;
3085 ppc_elf_hash_entry (h)->tls_mask |= tls_type;
3086 }
3087 else
3088 /* This is a global offset table entry for a local symbol. */
3089 if (!update_local_sym_info (abfd, symtab_hdr, r_symndx, tls_type))
0a1b45a2 3090 return false;
91e21fb7
AM
3091
3092 /* We may also need a plt entry if the symbol turns out to be
3093 an ifunc. */
0e1862bb 3094 if (h != NULL && !bfd_link_pic (info))
91e21fb7
AM
3095 {
3096 if (!update_plt_info (abfd, &h->plt.plist, NULL, 0))
0a1b45a2 3097 return false;
91e21fb7 3098 }
25dbc73a 3099 break;
252b5132 3100
25dbc73a
AM
3101 /* Indirect .sdata relocation. */
3102 case R_PPC_EMB_SDAI16:
93d1b056
AM
3103 htab->sdata[0].sym->ref_regular = 1;
3104 if (!elf_allocate_pointer_linker_section (abfd, &htab->sdata[0],
3105 h, rel))
0a1b45a2 3106 return false;
046183de
AM
3107 if (h != NULL)
3108 {
0a1b45a2
AM
3109 ppc_elf_hash_entry (h)->has_sda_refs = true;
3110 h->non_got_ref = true;
046183de 3111 }
25dbc73a 3112 break;
252b5132 3113
25dbc73a
AM
3114 /* Indirect .sdata2 relocation. */
3115 case R_PPC_EMB_SDA2I16:
c0d9f31d 3116 if (!bfd_link_executable (info))
25dbc73a
AM
3117 {
3118 bad_shared_reloc (abfd, r_type);
0a1b45a2 3119 return false;
25dbc73a 3120 }
93d1b056
AM
3121 htab->sdata[1].sym->ref_regular = 1;
3122 if (!elf_allocate_pointer_linker_section (abfd, &htab->sdata[1],
3123 h, rel))
0a1b45a2 3124 return false;
046183de
AM
3125 if (h != NULL)
3126 {
0a1b45a2
AM
3127 ppc_elf_hash_entry (h)->has_sda_refs = true;
3128 h->non_got_ref = true;
046183de 3129 }
25dbc73a 3130 break;
252b5132 3131
93d1b056
AM
3132 case R_PPC_SDAREL16:
3133 htab->sdata[0].sym->ref_regular = 1;
1a0670f3 3134 /* Fall through. */
93d1b056 3135
b9c361e0
JL
3136 case R_PPC_VLE_SDAREL_LO16A:
3137 case R_PPC_VLE_SDAREL_LO16D:
3138 case R_PPC_VLE_SDAREL_HI16A:
3139 case R_PPC_VLE_SDAREL_HI16D:
3140 case R_PPC_VLE_SDAREL_HA16A:
3141 case R_PPC_VLE_SDAREL_HA16D:
046183de
AM
3142 if (h != NULL)
3143 {
0a1b45a2
AM
3144 ppc_elf_hash_entry (h)->has_sda_refs = true;
3145 h->non_got_ref = true;
046183de
AM
3146 }
3147 break;
3148
b9c361e0
JL
3149 case R_PPC_VLE_REL8:
3150 case R_PPC_VLE_REL15:
3151 case R_PPC_VLE_REL24:
3152 case R_PPC_VLE_LO16A:
3153 case R_PPC_VLE_LO16D:
3154 case R_PPC_VLE_HI16A:
3155 case R_PPC_VLE_HI16D:
3156 case R_PPC_VLE_HA16A:
3157 case R_PPC_VLE_HA16D:
83eef883 3158 case R_PPC_VLE_ADDR20:
b9c361e0
JL
3159 break;
3160
25dbc73a 3161 case R_PPC_EMB_SDA2REL:
c0d9f31d 3162 if (!bfd_link_executable (info))
046183de
AM
3163 {
3164 bad_shared_reloc (abfd, r_type);
0a1b45a2 3165 return false;
046183de 3166 }
93d1b056 3167 htab->sdata[1].sym->ref_regular = 1;
046183de
AM
3168 if (h != NULL)
3169 {
0a1b45a2
AM
3170 ppc_elf_hash_entry (h)->has_sda_refs = true;
3171 h->non_got_ref = true;
046183de
AM
3172 }
3173 break;
3174
b9c361e0
JL
3175 case R_PPC_VLE_SDA21_LO:
3176 case R_PPC_VLE_SDA21:
25dbc73a
AM
3177 case R_PPC_EMB_SDA21:
3178 case R_PPC_EMB_RELSDA:
046183de
AM
3179 if (h != NULL)
3180 {
0a1b45a2
AM
3181 ppc_elf_hash_entry (h)->has_sda_refs = true;
3182 h->non_got_ref = true;
046183de
AM
3183 }
3184 break;
3185
25dbc73a
AM
3186 case R_PPC_EMB_NADDR32:
3187 case R_PPC_EMB_NADDR16:
3188 case R_PPC_EMB_NADDR16_LO:
3189 case R_PPC_EMB_NADDR16_HI:
3190 case R_PPC_EMB_NADDR16_HA:
4dc4a9a5 3191 if (h != NULL)
0a1b45a2 3192 h->non_got_ref = true;
25dbc73a 3193 break;
252b5132 3194
25dbc73a 3195 case R_PPC_PLTREL24:
de972ffa 3196 if (h == NULL)
6d78d0b9 3197 break;
08be3224 3198 ppc_elf_tdata (abfd)->makes_plt_call = 1;
3e04d765 3199 goto pltentry;
08be3224 3200
23cedd1d 3201 case R_PPC_PLTCALL:
3e04d765
AM
3202 sec->has_pltcall = 1;
3203 /* Fall through. */
3204
6d78d0b9 3205 case R_PPC_PLT32:
25dbc73a
AM
3206 case R_PPC_PLTREL32:
3207 case R_PPC_PLT16_LO:
3208 case R_PPC_PLT16_HI:
3209 case R_PPC_PLT16_HA:
3e04d765 3210 pltentry:
25dbc73a
AM
3211#ifdef DEBUG
3212 fprintf (stderr, "Reloc requires a PLT entry\n");
3213#endif
cbf95972 3214 /* This symbol requires a procedure linkage table entry. */
25dbc73a
AM
3215 if (h == NULL)
3216 {
2d7ad24e
AM
3217 pltent = update_local_sym_info (abfd, symtab_hdr, r_symndx,
3218 NON_GOT | PLT_KEEP);
3219 if (pltent == NULL)
0a1b45a2 3220 return false;
25dbc73a 3221 }
a6aa5195
AM
3222 else
3223 {
2d7ad24e
AM
3224 if (r_type != R_PPC_PLTREL24)
3225 ppc_elf_hash_entry (h)->tls_mask |= PLT_KEEP;
a6aa5195 3226 h->needs_plt = 1;
2d7ad24e 3227 pltent = &h->plt.plist;
a6aa5195 3228 }
2d7ad24e
AM
3229 addend = 0;
3230 if (bfd_link_pic (info)
3231 && (r_type == R_PPC_PLTREL24
3232 || r_type == R_PPC_PLT16_LO
3233 || r_type == R_PPC_PLT16_HI
3234 || r_type == R_PPC_PLT16_HA))
3235 addend = rel->r_addend;
3236 if (!update_plt_info (abfd, pltent, got2, addend))
0a1b45a2 3237 return false;
25dbc73a 3238 break;
ee05f2fe 3239
25dbc73a
AM
3240 /* The following relocations don't need to propagate the
3241 relocation if linking a shared object since they are
3242 section relative. */
3243 case R_PPC_SECTOFF:
3244 case R_PPC_SECTOFF_LO:
3245 case R_PPC_SECTOFF_HI:
3246 case R_PPC_SECTOFF_HA:
3247 case R_PPC_DTPREL16:
3248 case R_PPC_DTPREL16_LO:
3249 case R_PPC_DTPREL16_HI:
3250 case R_PPC_DTPREL16_HA:
3251 case R_PPC_TOC16:
3252 break;
252b5132 3253
d7128ce4
AM
3254 case R_PPC_REL16:
3255 case R_PPC_REL16_LO:
3256 case R_PPC_REL16_HI:
3257 case R_PPC_REL16_HA:
a680de9a 3258 case R_PPC_REL16DX_HA:
016687f8 3259 ppc_elf_tdata (abfd)->has_rel16 = 1;
d7128ce4
AM
3260 break;
3261
a6aa5195 3262 /* These are just markers. */
25dbc73a
AM
3263 case R_PPC_TLS:
3264 case R_PPC_EMB_MRKREF:
3265 case R_PPC_NONE:
3266 case R_PPC_max:
32af9f6e
AM
3267 case R_PPC_RELAX:
3268 case R_PPC_RELAX_PLT:
3269 case R_PPC_RELAX_PLTREL24:
7ba71655 3270 case R_PPC_16DX_HA:
25dbc73a 3271 break;
252b5132 3272
25dbc73a
AM
3273 /* These should only appear in dynamic objects. */
3274 case R_PPC_COPY:
3275 case R_PPC_GLOB_DAT:
3276 case R_PPC_JMP_SLOT:
3277 case R_PPC_RELATIVE:
e054468f 3278 case R_PPC_IRELATIVE:
25dbc73a 3279 break;
252b5132 3280
25dbc73a
AM
3281 /* These aren't handled yet. We'll report an error later. */
3282 case R_PPC_ADDR30:
3283 case R_PPC_EMB_RELSEC16:
3284 case R_PPC_EMB_RELST_LO:
3285 case R_PPC_EMB_RELST_HI:
3286 case R_PPC_EMB_RELST_HA:
3287 case R_PPC_EMB_BIT_FLD:
3288 break;
252b5132 3289
25dbc73a
AM
3290 /* This refers only to functions defined in the shared library. */
3291 case R_PPC_LOCAL24PC:
727fc41e 3292 if (h != NULL && h == htab->elf.hgot && htab->plt_type == PLT_UNSET)
016687f8
AM
3293 {
3294 htab->plt_type = PLT_OLD;
3295 htab->old_bfd = abfd;
3296 }
c7e17e05
AM
3297 if (h != NULL && h->type == STT_GNU_IFUNC)
3298 {
c7e17e05
AM
3299 h->needs_plt = 1;
3300 if (!update_plt_info (abfd, &h->plt.plist, NULL, 0))
0a1b45a2 3301 return false;
c7e17e05 3302 }
25dbc73a 3303 break;
252b5132 3304
25dbc73a
AM
3305 /* This relocation describes the C++ object vtable hierarchy.
3306 Reconstruct it for later use during GC. */
3307 case R_PPC_GNU_VTINHERIT:
3308 if (!bfd_elf_gc_record_vtinherit (abfd, sec, h, rel->r_offset))
0a1b45a2 3309 return false;
25dbc73a 3310 break;
252b5132 3311
25dbc73a
AM
3312 /* This relocation describes which C++ vtable entries are actually
3313 used. Record for later use during GC. */
3314 case R_PPC_GNU_VTENTRY:
a0ea3a14 3315 if (!bfd_elf_gc_record_vtentry (abfd, sec, h, rel->r_addend))
0a1b45a2 3316 return false;
25dbc73a 3317 break;
252b5132 3318
252dcdf4
AM
3319 case R_PPC_TPREL16_HI:
3320 case R_PPC_TPREL16_HA:
3321 sec->has_tls_reloc = 1;
3322 /* Fall through. */
7c8bbca5 3323 /* We shouldn't really be seeing TPREL32. */
25dbc73a 3324 case R_PPC_TPREL32:
1d483afe
AM
3325 case R_PPC_TPREL16:
3326 case R_PPC_TPREL16_LO:
7c8bbca5 3327 if (bfd_link_dll (info))
25dbc73a
AM
3328 info->flags |= DF_STATIC_TLS;
3329 goto dodyn;
252b5132 3330
25dbc73a
AM
3331 /* Nor these. */
3332 case R_PPC_DTPMOD32:
3333 case R_PPC_DTPREL32:
3334 goto dodyn;
252b5132 3335
9edfd1af
AM
3336 case R_PPC_REL32:
3337 if (h == NULL
3338 && got2 != NULL
3339 && (sec->flags & SEC_CODE) != 0
0e1862bb 3340 && bfd_link_pic (info)
4a3dc543 3341 && htab->plt_type == PLT_UNSET)
9edfd1af
AM
3342 {
3343 /* Old -fPIC gcc code has .long LCTOC1-LCFx just before
3344 the start of a function, which assembles to a REL32
3345 reference to .got2. If we detect one of these, then
3346 force the old PLT layout because the linker cannot
3347 reliably deduce the GOT pointer value needed for
3348 PLT call stubs. */
3349 asection *s;
87d72d41 3350 Elf_Internal_Sym *isym;
9edfd1af 3351
f1dfbfdb 3352 isym = bfd_sym_from_r_symndx (&htab->elf.sym_cache,
87d72d41
AM
3353 abfd, r_symndx);
3354 if (isym == NULL)
0a1b45a2 3355 return false;
87d72d41
AM
3356
3357 s = bfd_section_from_elf_index (abfd, isym->st_shndx);
9edfd1af 3358 if (s == got2)
016687f8
AM
3359 {
3360 htab->plt_type = PLT_OLD;
3361 htab->old_bfd = abfd;
3362 }
9edfd1af 3363 }
7123df0e 3364 if (h == NULL || h == htab->elf.hgot)
fd38b44c 3365 break;
625af618
AM
3366 /* fall through */
3367
3368 case R_PPC_ADDR32:
3369 case R_PPC_ADDR16:
3370 case R_PPC_ADDR16_LO:
3371 case R_PPC_ADDR16_HI:
3372 case R_PPC_ADDR16_HA:
3373 case R_PPC_UADDR32:
3374 case R_PPC_UADDR16:
0e1862bb 3375 if (h != NULL && !bfd_link_pic (info))
625af618
AM
3376 {
3377 /* We may need a plt entry if the symbol turns out to be
3378 a function defined in a dynamic object. */
3ec01793 3379 if (!update_plt_info (abfd, &h->plt.plist, NULL, 0))
0a1b45a2 3380 return false;
625af618
AM
3381
3382 /* We may need a copy reloc too. */
3383 h->non_got_ref = 1;
3384 h->pointer_equality_needed = 1;
d3e454b9
AM
3385 if (r_type == R_PPC_ADDR16_HA)
3386 ppc_elf_hash_entry (h)->has_addr16_ha = 1;
3387 if (r_type == R_PPC_ADDR16_LO)
3388 ppc_elf_hash_entry (h)->has_addr16_lo = 1;
625af618
AM
3389 }
3390 goto dodyn;
9edfd1af 3391
25dbc73a
AM
3392 case R_PPC_REL24:
3393 case R_PPC_REL14:
3394 case R_PPC_REL14_BRTAKEN:
3395 case R_PPC_REL14_BRNTAKEN:
d7128ce4 3396 if (h == NULL)
25dbc73a 3397 break;
7123df0e 3398 if (h == htab->elf.hgot)
d7128ce4 3399 {
7123df0e 3400 if (htab->plt_type == PLT_UNSET)
016687f8
AM
3401 {
3402 htab->plt_type = PLT_OLD;
3403 htab->old_bfd = abfd;
3404 }
d7128ce4
AM
3405 break;
3406 }
25dbc73a 3407 /* fall through */
ee05f2fe 3408
25dbc73a 3409 case R_PPC_ADDR24:
25dbc73a
AM
3410 case R_PPC_ADDR14:
3411 case R_PPC_ADDR14_BRTAKEN:
3412 case R_PPC_ADDR14_BRNTAKEN:
0e1862bb 3413 if (h != NULL && !bfd_link_pic (info))
25dbc73a
AM
3414 {
3415 /* We may need a plt entry if the symbol turns out to be
3416 a function defined in a dynamic object. */
e054468f 3417 h->needs_plt = 1;
de972ffa 3418 if (!update_plt_info (abfd, &h->plt.plist, NULL, 0))
0a1b45a2 3419 return false;
625af618 3420 break;
25dbc73a 3421 }
7619e7c7 3422
25dbc73a
AM
3423 dodyn:
3424 /* If we are creating a shared library, and this is a reloc
3425 against a global symbol, or a non PC relative reloc
3426 against a local symbol, then we need to copy the reloc
3427 into the shared library. However, if we are linking with
3428 -Bsymbolic, we do not need to copy a reloc against a
3429 global symbol which is defined in an object we are
3430 including in the link (i.e., DEF_REGULAR is set). At
3431 this point we have not seen all the input files, so it is
3432 possible that DEF_REGULAR is not set now but will be set
3433 later (it is never cleared). In case of a weak definition,
3434 DEF_REGULAR may be cleared later by a strong definition in
3435 a shared library. We account for that possibility below by
3436 storing information in the dyn_relocs field of the hash
3437 table entry. A similar situation occurs when creating
3438 shared libraries and symbol visibility changes render the
3439 symbol local.
7619e7c7 3440
25dbc73a
AM
3441 If on the other hand, we are creating an executable, we
3442 may need to keep relocations for symbols satisfied by a
3443 dynamic library if we manage to avoid copy relocs for the
3444 symbol. */
0e1862bb 3445 if ((bfd_link_pic (info)
1d483afe 3446 && (must_be_dyn_reloc (info, r_type)
25dbc73a 3447 || (h != NULL
198f1157 3448 && (!SYMBOLIC_BIND (info, h)
25dbc73a
AM
3449 || h->root.type == bfd_link_hash_defweak
3450 || !h->def_regular))))
3451 || (ELIMINATE_COPY_RELOCS
0e1862bb 3452 && !bfd_link_pic (info)
25dbc73a
AM
3453 && h != NULL
3454 && (h->root.type == bfd_link_hash_defweak
de972ffa 3455 || !h->def_regular)))
25dbc73a 3456 {
25dbc73a
AM
3457#ifdef DEBUG
3458 fprintf (stderr,
3459 "ppc_elf_check_relocs needs to "
3460 "create relocation for %s\n",
3461 (h && h->root.root.string
3462 ? h->root.root.string : "<unknown>"));
3463#endif
3464 if (sreloc == NULL)
3465 {
c9a2f333
AM
3466 if (htab->elf.dynobj == NULL)
3467 htab->elf.dynobj = abfd;
83bac4b0
NC
3468
3469 sreloc = _bfd_elf_make_dynamic_reloc_section
0a1b45a2 3470 (sec, htab->elf.dynobj, 2, abfd, /*rela?*/ true);
83bac4b0 3471
25dbc73a 3472 if (sreloc == NULL)
0a1b45a2 3473 return false;
25dbc73a 3474 }
7619e7c7 3475
25dbc73a
AM
3476 /* If this is a global symbol, we count the number of
3477 relocations we need for this symbol. */
3478 if (h != NULL)
3479 {
f95f8542
AM
3480 struct elf_dyn_relocs *p;
3481 struct elf_dyn_relocs **rel_head;
3482
190eb1dd 3483 rel_head = &h->dyn_relocs;
f95f8542
AM
3484 p = *rel_head;
3485 if (p == NULL || p->sec != sec)
3486 {
3487 p = bfd_alloc (htab->elf.dynobj, sizeof *p);
3488 if (p == NULL)
0a1b45a2 3489 return false;
f95f8542
AM
3490 p->next = *rel_head;
3491 *rel_head = p;
3492 p->sec = sec;
3493 p->count = 0;
3494 p->pc_count = 0;
3495 }
3496 p->count += 1;
3497 if (!must_be_dyn_reloc (info, r_type))
3498 p->pc_count += 1;
25dbc73a
AM
3499 }
3500 else
3501 {
3502 /* Track dynamic relocs needed for local syms too.
3503 We really need local syms available to do this
3504 easily. Oh well. */
f95f8542
AM
3505 struct ppc_dyn_relocs *p;
3506 struct ppc_dyn_relocs **rel_head;
0a1b45a2 3507 bool is_ifunc;
25dbc73a 3508 asection *s;
6edfbbad 3509 void *vpp;
87d72d41 3510 Elf_Internal_Sym *isym;
6edfbbad 3511
f1dfbfdb 3512 isym = bfd_sym_from_r_symndx (&htab->elf.sym_cache,
87d72d41
AM
3513 abfd, r_symndx);
3514 if (isym == NULL)
0a1b45a2 3515 return false;
7fce784e 3516
87d72d41
AM
3517 s = bfd_section_from_elf_index (abfd, isym->st_shndx);
3518 if (s == NULL)
3519 s = sec;
3520
6edfbbad 3521 vpp = &elf_section_data (s)->local_dynrel;
f95f8542
AM
3522 rel_head = (struct ppc_dyn_relocs **) vpp;
3523 is_ifunc = ELF_ST_TYPE (isym->st_info) == STT_GNU_IFUNC;
3524 p = *rel_head;
3525 if (p != NULL && p->sec == sec && p->ifunc != is_ifunc)
3526 p = p->next;
3527 if (p == NULL || p->sec != sec || p->ifunc != is_ifunc)
3528 {
3529 p = bfd_alloc (htab->elf.dynobj, sizeof *p);
3530 if (p == NULL)
0a1b45a2 3531 return false;
f95f8542
AM
3532 p->next = *rel_head;
3533 *rel_head = p;
3534 p->sec = sec;
3535 p->ifunc = is_ifunc;
3536 p->count = 0;
3537 }
3538 p->count += 1;
25dbc73a 3539 }
7619e7c7 3540 }
25dbc73a
AM
3541
3542 break;
7619e7c7
AM
3543 }
3544 }
ee05f2fe 3545
0a1b45a2 3546 return true;
25dbc73a
AM
3547}
3548\f
005d79fd
AM
3549/* Warn for conflicting Tag_GNU_Power_ABI_FP attributes between IBFD
3550 and OBFD, and merge non-conflicting ones. */
0a1b45a2 3551bool
50e03d47 3552_bfd_elf_ppc_merge_fp_attributes (bfd *ibfd, struct bfd_link_info *info)
34c8bcba 3553{
50e03d47 3554 bfd *obfd = info->output_bfd;
c6e65352
DJ
3555 obj_attribute *in_attr, *in_attrs;
3556 obj_attribute *out_attr, *out_attrs;
0a1b45a2
AM
3557 bool ret = true;
3558 bool warn_only;
6f3fe02b
AM
3559
3560 /* We only warn about shared library mismatches, because common
3561 libraries advertise support for a particular long double variant
3562 but actually support more than one variant. For example, glibc
3563 typically supports 128-bit IBM long double in the shared library
3564 but has a compatibility static archive for 64-bit long double.
3565 The linker doesn't have the smarts to see that an app using
3566 object files marked as 64-bit long double call the compatibility
3567 layer objects and only from there call into the shared library. */
3568 warn_only = (ibfd->flags & DYNAMIC) != 0;
34c8bcba 3569
c6e65352
DJ
3570 in_attrs = elf_known_obj_attributes (ibfd)[OBJ_ATTR_GNU];
3571 out_attrs = elf_known_obj_attributes (obfd)[OBJ_ATTR_GNU];
3572
c6e65352
DJ
3573 in_attr = &in_attrs[Tag_GNU_Power_ABI_FP];
3574 out_attr = &out_attrs[Tag_GNU_Power_ABI_FP];
005d79fd 3575
c6e65352 3576 if (in_attr->i != out_attr->i)
34c8bcba 3577 {
005d79fd
AM
3578 int in_fp = in_attr->i & 3;
3579 int out_fp = out_attr->i & 3;
4a91d0ba 3580 static bfd *last_fp, *last_ld;
005d79fd
AM
3581
3582 if (in_fp == 0)
34c8bcba 3583 ;
005d79fd
AM
3584 else if (out_fp == 0)
3585 {
6f3fe02b
AM
3586 if (!warn_only)
3587 {
3588 out_attr->type = ATTR_TYPE_FLAG_INT_VAL;
3589 out_attr->i ^= in_fp;
3590 last_fp = ibfd;
3591 }
005d79fd
AM
3592 }
3593 else if (out_fp != 2 && in_fp == 2)
8d2c8c3d
AM
3594 {
3595 _bfd_error_handler
3596 /* xgettext:c-format */
4a91d0ba
AM
3597 (_("%pB uses hard float, %pB uses soft float"),
3598 last_fp, ibfd);
6f3fe02b 3599 ret = warn_only;
8d2c8c3d 3600 }
005d79fd 3601 else if (out_fp == 2 && in_fp != 2)
8d2c8c3d
AM
3602 {
3603 _bfd_error_handler
3604 /* xgettext:c-format */
4a91d0ba
AM
3605 (_("%pB uses hard float, %pB uses soft float"),
3606 ibfd, last_fp);
6f3fe02b 3607 ret = warn_only;
8d2c8c3d 3608 }
005d79fd 3609 else if (out_fp == 1 && in_fp == 3)
8d2c8c3d
AM
3610 {
3611 _bfd_error_handler
3612 /* xgettext:c-format */
4a91d0ba
AM
3613 (_("%pB uses double-precision hard float, "
3614 "%pB uses single-precision hard float"), last_fp, ibfd);
6f3fe02b 3615 ret = warn_only;
8d2c8c3d 3616 }
005d79fd 3617 else if (out_fp == 3 && in_fp == 1)
8d2c8c3d
AM
3618 {
3619 _bfd_error_handler
3620 /* xgettext:c-format */
4a91d0ba
AM
3621 (_("%pB uses double-precision hard float, "
3622 "%pB uses single-precision hard float"), ibfd, last_fp);
6f3fe02b 3623 ret = warn_only;
8d2c8c3d 3624 }
005d79fd
AM
3625
3626 in_fp = in_attr->i & 0xc;
3627 out_fp = out_attr->i & 0xc;
3628 if (in_fp == 0)
3629 ;
3630 else if (out_fp == 0)
3631 {
6f3fe02b
AM
3632 if (!warn_only)
3633 {
3634 out_attr->type = ATTR_TYPE_FLAG_INT_VAL;
3635 out_attr->i ^= in_fp;
3636 last_ld = ibfd;
3637 }
005d79fd
AM
3638 }
3639 else if (out_fp != 2 * 4 && in_fp == 2 * 4)
8d2c8c3d
AM
3640 {
3641 _bfd_error_handler
3642 /* xgettext:c-format */
4a91d0ba
AM
3643 (_("%pB uses 64-bit long double, "
3644 "%pB uses 128-bit long double"), ibfd, last_ld);
6f3fe02b 3645 ret = warn_only;
8d2c8c3d 3646 }
005d79fd 3647 else if (in_fp != 2 * 4 && out_fp == 2 * 4)
8d2c8c3d
AM
3648 {
3649 _bfd_error_handler
3650 /* xgettext:c-format */
4a91d0ba
AM
3651 (_("%pB uses 64-bit long double, "
3652 "%pB uses 128-bit long double"), last_ld, ibfd);
6f3fe02b 3653 ret = warn_only;
8d2c8c3d 3654 }
005d79fd 3655 else if (out_fp == 1 * 4 && in_fp == 3 * 4)
8d2c8c3d
AM
3656 {
3657 _bfd_error_handler
3658 /* xgettext:c-format */
4a91d0ba
AM
3659 (_("%pB uses IBM long double, "
3660 "%pB uses IEEE long double"), last_ld, ibfd);
6f3fe02b 3661 ret = warn_only;
8d2c8c3d 3662 }
005d79fd 3663 else if (out_fp == 3 * 4 && in_fp == 1 * 4)
8d2c8c3d
AM
3664 {
3665 _bfd_error_handler
3666 /* xgettext:c-format */
4a91d0ba
AM
3667 (_("%pB uses IBM long double, "
3668 "%pB uses IEEE long double"), ibfd, last_ld);
6f3fe02b 3669 ret = warn_only;
8d2c8c3d 3670 }
c6e65352 3671 }
4a91d0ba
AM
3672
3673 if (!ret)
3674 {
3675 out_attr->type = ATTR_TYPE_FLAG_INT_VAL | ATTR_TYPE_FLAG_ERROR;
3676 bfd_set_error (bfd_error_bad_value);
3677 }
3678 return ret;
005d79fd
AM
3679}
3680
3681/* Merge object attributes from IBFD into OBFD. Warn if
3682 there are conflicting attributes. */
0a1b45a2 3683static bool
50e03d47 3684ppc_elf_merge_obj_attributes (bfd *ibfd, struct bfd_link_info *info)
005d79fd 3685{
50e03d47 3686 bfd *obfd;
005d79fd
AM
3687 obj_attribute *in_attr, *in_attrs;
3688 obj_attribute *out_attr, *out_attrs;
0a1b45a2 3689 bool ret;
005d79fd 3690
4a91d0ba 3691 if (!_bfd_elf_ppc_merge_fp_attributes (ibfd, info))
0a1b45a2 3692 return false;
005d79fd 3693
50e03d47 3694 obfd = info->output_bfd;
005d79fd
AM
3695 in_attrs = elf_known_obj_attributes (ibfd)[OBJ_ATTR_GNU];
3696 out_attrs = elf_known_obj_attributes (obfd)[OBJ_ATTR_GNU];
c6e65352
DJ
3697
3698 /* Check for conflicting Tag_GNU_Power_ABI_Vector attributes and
3699 merge non-conflicting ones. */
3700 in_attr = &in_attrs[Tag_GNU_Power_ABI_Vector];
3701 out_attr = &out_attrs[Tag_GNU_Power_ABI_Vector];
0a1b45a2 3702 ret = true;
c6e65352
DJ
3703 if (in_attr->i != out_attr->i)
3704 {
005d79fd
AM
3705 int in_vec = in_attr->i & 3;
3706 int out_vec = out_attr->i & 3;
4a91d0ba 3707 static bfd *last_vec;
c6e65352 3708
005d79fd
AM
3709 if (in_vec == 0)
3710 ;
3711 else if (out_vec == 0)
c6e65352 3712 {
8d2c8c3d 3713 out_attr->type = ATTR_TYPE_FLAG_INT_VAL;
005d79fd 3714 out_attr->i = in_vec;
4a91d0ba 3715 last_vec = ibfd;
c6e65352 3716 }
c6e65352
DJ
3717 /* For now, allow generic to transition to AltiVec or SPE
3718 without a warning. If GCC marked files with their stack
3719 alignment and used don't-care markings for files which are
3720 not affected by the vector ABI, we could warn about this
3721 case too. */
005d79fd 3722 else if (in_vec == 1)
c6e65352 3723 ;
005d79fd
AM
3724 else if (out_vec == 1)
3725 {
8d2c8c3d 3726 out_attr->type = ATTR_TYPE_FLAG_INT_VAL;
005d79fd 3727 out_attr->i = in_vec;
4a91d0ba 3728 last_vec = ibfd;
005d79fd
AM
3729 }
3730 else if (out_vec < in_vec)
8d2c8c3d
AM
3731 {
3732 _bfd_error_handler
3733 /* xgettext:c-format */
4a91d0ba
AM
3734 (_("%pB uses AltiVec vector ABI, %pB uses SPE vector ABI"),
3735 last_vec, ibfd);
8d2c8c3d 3736 out_attr->type = ATTR_TYPE_FLAG_INT_VAL | ATTR_TYPE_FLAG_ERROR;
0a1b45a2 3737 ret = false;
8d2c8c3d 3738 }
005d79fd 3739 else if (out_vec > in_vec)
8d2c8c3d
AM
3740 {
3741 _bfd_error_handler
3742 /* xgettext:c-format */
4a91d0ba
AM
3743 (_("%pB uses AltiVec vector ABI, %pB uses SPE vector ABI"),
3744 ibfd, last_vec);
8d2c8c3d 3745 out_attr->type = ATTR_TYPE_FLAG_INT_VAL | ATTR_TYPE_FLAG_ERROR;
0a1b45a2 3746 ret = false;
8d2c8c3d 3747 }
34c8bcba
JM
3748 }
3749
f82e0623
NF
3750 /* Check for conflicting Tag_GNU_Power_ABI_Struct_Return attributes
3751 and merge non-conflicting ones. */
3752 in_attr = &in_attrs[Tag_GNU_Power_ABI_Struct_Return];
3753 out_attr = &out_attrs[Tag_GNU_Power_ABI_Struct_Return];
3754 if (in_attr->i != out_attr->i)
3755 {
005d79fd
AM
3756 int in_struct = in_attr->i & 3;
3757 int out_struct = out_attr->i & 3;
4a91d0ba 3758 static bfd *last_struct;
005d79fd
AM
3759
3760 if (in_struct == 0 || in_struct == 3)
f82e0623 3761 ;
005d79fd
AM
3762 else if (out_struct == 0)
3763 {
8d2c8c3d 3764 out_attr->type = ATTR_TYPE_FLAG_INT_VAL;
005d79fd 3765 out_attr->i = in_struct;
4a91d0ba 3766 last_struct = ibfd;
005d79fd
AM
3767 }
3768 else if (out_struct < in_struct)
8d2c8c3d
AM
3769 {
3770 _bfd_error_handler
3771 /* xgettext:c-format */
4a91d0ba
AM
3772 (_("%pB uses r3/r4 for small structure returns, "
3773 "%pB uses memory"), last_struct, ibfd);
8d2c8c3d 3774 out_attr->type = ATTR_TYPE_FLAG_INT_VAL | ATTR_TYPE_FLAG_ERROR;
0a1b45a2 3775 ret = false;
8d2c8c3d 3776 }
005d79fd 3777 else if (out_struct > in_struct)
8d2c8c3d
AM
3778 {
3779 _bfd_error_handler
3780 /* xgettext:c-format */
4a91d0ba
AM
3781 (_("%pB uses r3/r4 for small structure returns, "
3782 "%pB uses memory"), ibfd, last_struct);
8d2c8c3d 3783 out_attr->type = ATTR_TYPE_FLAG_INT_VAL | ATTR_TYPE_FLAG_ERROR;
0a1b45a2 3784 ret = false;
8d2c8c3d 3785 }
f82e0623 3786 }
4a91d0ba
AM
3787 if (!ret)
3788 {
3789 bfd_set_error (bfd_error_bad_value);
0a1b45a2 3790 return false;
4a91d0ba 3791 }
f82e0623 3792
34c8bcba 3793 /* Merge Tag_compatibility attributes and any common GNU ones. */
8d2c8c3d 3794 return _bfd_elf_merge_object_attributes (ibfd, info);
34c8bcba
JM
3795}
3796
8853c3d3
AM
3797/* Merge backend specific data from an object file to the output
3798 object file when linking. */
3799
0a1b45a2 3800static bool
50e03d47 3801ppc_elf_merge_private_bfd_data (bfd *ibfd, struct bfd_link_info *info)
8853c3d3 3802{
50e03d47 3803 bfd *obfd = info->output_bfd;
8853c3d3
AM
3804 flagword old_flags;
3805 flagword new_flags;
0a1b45a2 3806 bool error;
8853c3d3 3807
0c8d6e5c 3808 if (!is_ppc_elf (ibfd) || !is_ppc_elf (obfd))
0a1b45a2 3809 return true;
8853c3d3 3810
cc643b88 3811 /* Check if we have the same endianness. */
50e03d47 3812 if (! _bfd_generic_verify_endian_match (ibfd, info))
0a1b45a2 3813 return false;
8853c3d3 3814
50e03d47 3815 if (!ppc_elf_merge_obj_attributes (ibfd, info))
0a1b45a2 3816 return false;
34c8bcba 3817
91ed9b71 3818 if ((ibfd->flags & DYNAMIC) != 0)
0a1b45a2 3819 return true;
91ed9b71 3820
8853c3d3
AM
3821 new_flags = elf_elfheader (ibfd)->e_flags;
3822 old_flags = elf_elfheader (obfd)->e_flags;
3823 if (!elf_flags_init (obfd))
3824 {
3825 /* First call, no flags set. */
0a1b45a2 3826 elf_flags_init (obfd) = true;
8853c3d3
AM
3827 elf_elfheader (obfd)->e_flags = new_flags;
3828 }
3829
3830 /* Compatible flags are ok. */
3831 else if (new_flags == old_flags)
3832 ;
3833
3834 /* Incompatible flags. */
3835 else
3836 {
3837 /* Warn about -mrelocatable mismatch. Allow -mrelocatable-lib
3838 to be linked with either. */
0a1b45a2 3839 error = false;
8853c3d3
AM
3840 if ((new_flags & EF_PPC_RELOCATABLE) != 0
3841 && (old_flags & (EF_PPC_RELOCATABLE | EF_PPC_RELOCATABLE_LIB)) == 0)
3842 {
0a1b45a2 3843 error = true;
4eca0228 3844 _bfd_error_handler
871b3ab2 3845 (_("%pB: compiled with -mrelocatable and linked with "
8853c3d3
AM
3846 "modules compiled normally"), ibfd);
3847 }
3848 else if ((new_flags & (EF_PPC_RELOCATABLE | EF_PPC_RELOCATABLE_LIB)) == 0
3849 && (old_flags & EF_PPC_RELOCATABLE) != 0)
3850 {
0a1b45a2 3851 error = true;
4eca0228 3852 _bfd_error_handler
871b3ab2 3853 (_("%pB: compiled normally and linked with "
8853c3d3
AM
3854 "modules compiled with -mrelocatable"), ibfd);
3855 }
3856
3857 /* The output is -mrelocatable-lib iff both the input files are. */
3858 if (! (new_flags & EF_PPC_RELOCATABLE_LIB))
3859 elf_elfheader (obfd)->e_flags &= ~EF_PPC_RELOCATABLE_LIB;
3860
3861 /* The output is -mrelocatable iff it can't be -mrelocatable-lib,
3862 but each input file is either -mrelocatable or -mrelocatable-lib. */
3863 if (! (elf_elfheader (obfd)->e_flags & EF_PPC_RELOCATABLE_LIB)
3864 && (new_flags & (EF_PPC_RELOCATABLE_LIB | EF_PPC_RELOCATABLE))
3865 && (old_flags & (EF_PPC_RELOCATABLE_LIB | EF_PPC_RELOCATABLE)))
3866 elf_elfheader (obfd)->e_flags |= EF_PPC_RELOCATABLE;
3867
3868 /* Do not warn about eabi vs. V.4 mismatch, just or in the bit if
3869 any module uses it. */
3870 elf_elfheader (obfd)->e_flags |= (new_flags & EF_PPC_EMB);
3871
3872 new_flags &= ~(EF_PPC_RELOCATABLE | EF_PPC_RELOCATABLE_LIB | EF_PPC_EMB);
3873 old_flags &= ~(EF_PPC_RELOCATABLE | EF_PPC_RELOCATABLE_LIB | EF_PPC_EMB);
3874
3875 /* Warn about any other mismatches. */
3876 if (new_flags != old_flags)
3877 {
0a1b45a2 3878 error = true;
4eca0228 3879 _bfd_error_handler
695344c0 3880 /* xgettext:c-format */
871b3ab2 3881 (_("%pB: uses different e_flags (%#x) fields "
cd9af601
AM
3882 "than previous modules (%#x)"),
3883 ibfd, new_flags, old_flags);
8853c3d3
AM
3884 }
3885
3886 if (error)
3887 {
3888 bfd_set_error (bfd_error_bad_value);
0a1b45a2 3889 return false;
8853c3d3
AM
3890 }
3891 }
3892
0a1b45a2 3893 return true;
8853c3d3 3894}
b9c361e0 3895
e7776f52 3896static bfd_reloc_status_type
95f0d0d2 3897ppc_elf_vle_split16 (bfd *input_bfd,
08dc996f
AM
3898 asection *input_section,
3899 unsigned long offset,
95f0d0d2 3900 bfd_byte *loc,
86c95733 3901 bfd_vma value,
08dc996f 3902 split16_format_type split16_format,
0a1b45a2 3903 bool fixup)
b9c361e0 3904{
bb6bf75e 3905 unsigned int insn, opcode;
b9c361e0 3906
e7776f52
AM
3907 if (!offset_in_range (input_section, offset, 4))
3908 return bfd_reloc_outofrange;
95f0d0d2 3909 insn = bfd_get_32 (input_bfd, loc);
bb6bf75e 3910 opcode = insn & E_OPCODE_MASK;
08dc996f
AM
3911 if (opcode == E_OR2I_INSN
3912 || opcode == E_AND2I_DOT_INSN
3913 || opcode == E_OR2IS_INSN
3914 || opcode == E_LIS_INSN
3915 || opcode == E_AND2IS_DOT_INSN)
3916 {
3917 if (split16_format != split16a_type)
3918 {
3919 if (fixup)
3920 split16_format = split16a_type;
3921 else
3922 _bfd_error_handler
3923 /* xgettext:c-format */
871b3ab2 3924 (_("%pB(%pA+0x%lx): expected 16A style relocation on 0x%08x insn"),
08dc996f
AM
3925 input_bfd, input_section, offset, opcode);
3926 }
3927 }
3928 else if (opcode == E_ADD2I_DOT_INSN
3929 || opcode == E_ADD2IS_INSN
3930 || opcode == E_CMP16I_INSN
3931 || opcode == E_MULL2I_INSN
3932 || opcode == E_CMPL16I_INSN
3933 || opcode == E_CMPH16I_INSN
3934 || opcode == E_CMPHL16I_INSN)
3935 {
3936 if (split16_format != split16d_type)
3937 {
3938 if (fixup)
3939 split16_format = split16d_type;
3940 else
3941 _bfd_error_handler
3942 /* xgettext:c-format */
871b3ab2 3943 (_("%pB(%pA+0x%lx): expected 16D style relocation on 0x%08x insn"),
08dc996f
AM
3944 input_bfd, input_section, offset, opcode);
3945 }
3946 }
bb6bf75e
AM
3947 if (split16_format == split16a_type)
3948 {
3949 insn &= ~((0xf800 << 5) | 0x7ff);
3950 insn |= (value & 0xf800) << 5;
3951 if ((insn & E_LI_MASK) == E_LI_INSN)
3952 {
3953 /* Hack for e_li. Extend sign. */
3954 insn &= ~(0xf0000 >> 5);
3955 insn |= (-(value & 0x8000) & 0xf0000) >> 5;
3956 }
3957 }
3958 else
3959 {
3960 insn &= ~((0xf800 << 10) | 0x7ff);
3961 insn |= (value & 0xf800) << 10;
3962 }
86c95733 3963 insn |= value & 0x7ff;
95f0d0d2 3964 bfd_put_32 (input_bfd, insn, loc);
e7776f52 3965 return bfd_reloc_ok;
b9c361e0 3966}
83eef883
AFB
3967
3968static void
3969ppc_elf_vle_split20 (bfd *output_bfd, bfd_byte *loc, bfd_vma value)
3970{
3971 unsigned int insn;
3972
3973 insn = bfd_get_32 (output_bfd, loc);
3974 /* We have an li20 field, bits 17..20, 11..15, 21..31. */
3975 /* Top 4 bits of value to 17..20. */
3976 insn |= (value & 0xf0000) >> 5;
3977 /* Next 5 bits of the value to 11..15. */
3978 insn |= (value & 0xf800) << 5;
3979 /* And the final 11 bits of the value to bits 21 to 31. */
3980 insn |= value & 0x7ff;
3981 bfd_put_32 (output_bfd, insn, loc);
3982}
3983
8853c3d3 3984\f
d7128ce4
AM
3985/* Choose which PLT scheme to use, and set .plt flags appropriately.
3986 Returns -1 on error, 0 for old PLT, 1 for new PLT. */
3987int
3988ppc_elf_select_plt_layout (bfd *output_bfd ATTRIBUTE_UNUSED,
5446cbdf 3989 struct bfd_link_info *info)
d7128ce4
AM
3990{
3991 struct ppc_elf_link_hash_table *htab;
9d8504b1 3992 flagword flags;
d7128ce4
AM
3993
3994 htab = ppc_elf_hash_table (info);
4a3dc543
RS
3995
3996 if (htab->plt_type == PLT_UNSET)
016687f8 3997 {
b3874e1a
AM
3998 struct elf_link_hash_entry *h;
3999
5446cbdf 4000 if (htab->params->plt_style == PLT_OLD)
016687f8 4001 htab->plt_type = PLT_OLD;
0e1862bb 4002 else if (bfd_link_pic (info)
b3874e1a
AM
4003 && htab->elf.dynamic_sections_created
4004 && (h = elf_link_hash_lookup (&htab->elf, "_mcount",
0a1b45a2 4005 false, false, true)) != NULL
b3874e1a
AM
4006 && (h->type == STT_FUNC
4007 || h->needs_plt)
4008 && h->ref_regular
4009 && !(SYMBOL_CALLS_LOCAL (info, h)
21d68fcd 4010 || UNDEFWEAK_NO_DYNAMIC_RELOC (info, h)))
b3874e1a
AM
4011 {
4012 /* Profiling of shared libs (and pies) is not supported with
4013 secure plt, because ppc32 does profiling before a
4014 function prologue and a secure plt pic call stubs needs
4015 r30 to be set up. */
4016 htab->plt_type = PLT_OLD;
4017 }
016687f8
AM
4018 else
4019 {
4020 bfd *ibfd;
5446cbdf 4021 enum ppc_elf_plt_type plt_type = htab->params->plt_style;
016687f8
AM
4022
4023 /* Look through the reloc flags left by ppc_elf_check_relocs.
4024 Use the old style bss plt if a file makes plt calls
4025 without using the new relocs, and if ld isn't given
4026 --secure-plt and we never see REL16 relocs. */
4027 if (plt_type == PLT_UNSET)
4028 plt_type = PLT_OLD;
c72f2fb2 4029 for (ibfd = info->input_bfds; ibfd; ibfd = ibfd->link.next)
0c8d6e5c 4030 if (is_ppc_elf (ibfd))
016687f8
AM
4031 {
4032 if (ppc_elf_tdata (ibfd)->has_rel16)
4033 plt_type = PLT_NEW;
4034 else if (ppc_elf_tdata (ibfd)->makes_plt_call)
4035 {
4036 plt_type = PLT_OLD;
4037 htab->old_bfd = ibfd;
4038 break;
4039 }
4040 }
4041 htab->plt_type = plt_type;
4042 }
4043 }
5446cbdf 4044 if (htab->plt_type == PLT_OLD && htab->params->plt_style == PLT_NEW)
b3874e1a
AM
4045 {
4046 if (htab->old_bfd != NULL)
cf97bcb0 4047 _bfd_error_handler (_("bss-plt forced due to %pB"), htab->old_bfd);
b3874e1a 4048 else
cf97bcb0 4049 _bfd_error_handler (_("bss-plt forced by profiling"));
b3874e1a 4050 }
d7128ce4 4051
4a3dc543 4052 BFD_ASSERT (htab->plt_type != PLT_VXWORKS);
9d8504b1 4053
4a3dc543 4054 if (htab->plt_type == PLT_NEW)
9d8504b1
PB
4055 {
4056 flags = (SEC_ALLOC | SEC_LOAD | SEC_HAS_CONTENTS
4057 | SEC_IN_MEMORY | SEC_LINKER_CREATED);
86b9da88
AM
4058
4059 /* The new PLT is a loaded section. */
ce558b89 4060 if (htab->elf.splt != NULL
fd361982 4061 && !bfd_set_section_flags (htab->elf.splt, flags))
86b9da88
AM
4062 return -1;
4063
4064 /* The new GOT is not executable. */
ce558b89 4065 if (htab->elf.sgot != NULL
fd361982 4066 && !bfd_set_section_flags (htab->elf.sgot, flags))
86b9da88 4067 return -1;
d7128ce4
AM
4068 }
4069 else
4070 {
4071 /* Stop an unused .glink section from affecting .text alignment. */
86b9da88 4072 if (htab->glink != NULL
fd361982 4073 && !bfd_set_section_alignment (htab->glink, 0))
86b9da88 4074 return -1;
d7128ce4 4075 }
4a3dc543 4076 return htab->plt_type == PLT_NEW;
d7128ce4
AM
4077}
4078\f
25dbc73a
AM
4079/* Return the section that should be marked against GC for a given
4080 relocation. */
586119b3 4081
25dbc73a
AM
4082static asection *
4083ppc_elf_gc_mark_hook (asection *sec,
07adf181 4084 struct bfd_link_info *info,
25dbc73a
AM
4085 Elf_Internal_Rela *rel,
4086 struct elf_link_hash_entry *h,
4087 Elf_Internal_Sym *sym)
4088{
4089 if (h != NULL)
07adf181
AM
4090 switch (ELF32_R_TYPE (rel->r_info))
4091 {
4092 case R_PPC_GNU_VTINHERIT:
4093 case R_PPC_GNU_VTENTRY:
4094 return NULL;
4095 }
4096
4097 return _bfd_elf_gc_mark_hook (sec, info, rel, h, sym);
25dbc73a 4098}
49c09209 4099
0a1b45a2 4100static bool
49c09209
AM
4101get_sym_h (struct elf_link_hash_entry **hp,
4102 Elf_Internal_Sym **symp,
4103 asection **symsecp,
4104 unsigned char **tls_maskp,
4105 Elf_Internal_Sym **locsymsp,
4106 unsigned long r_symndx,
4107 bfd *ibfd)
4108{
4109 Elf_Internal_Shdr *symtab_hdr = &elf_symtab_hdr (ibfd);
4110
4111 if (r_symndx >= symtab_hdr->sh_info)
4112 {
4113 struct elf_link_hash_entry **sym_hashes = elf_sym_hashes (ibfd);
4114 struct elf_link_hash_entry *h;
4115
4116 h = sym_hashes[r_symndx - symtab_hdr->sh_info];
4117 while (h->root.type == bfd_link_hash_indirect
4118 || h->root.type == bfd_link_hash_warning)
4119 h = (struct elf_link_hash_entry *) h->root.u.i.link;
4120
4121 if (hp != NULL)
4122 *hp = h;
4123
4124 if (symp != NULL)
4125 *symp = NULL;
4126
4127 if (symsecp != NULL)
4128 {
4129 asection *symsec = NULL;
4130 if (h->root.type == bfd_link_hash_defined
4131 || h->root.type == bfd_link_hash_defweak)
4132 symsec = h->root.u.def.section;
4133 *symsecp = symsec;
4134 }
4135
4136 if (tls_maskp != NULL)
4137 *tls_maskp = &ppc_elf_hash_entry (h)->tls_mask;
4138 }
4139 else
4140 {
4141 Elf_Internal_Sym *sym;
4142 Elf_Internal_Sym *locsyms = *locsymsp;
4143
4144 if (locsyms == NULL)
4145 {
4146 locsyms = (Elf_Internal_Sym *) symtab_hdr->contents;
4147 if (locsyms == NULL)
4148 locsyms = bfd_elf_get_elf_syms (ibfd, symtab_hdr,
4149 symtab_hdr->sh_info,
4150 0, NULL, NULL, NULL);
4151 if (locsyms == NULL)
0a1b45a2 4152 return false;
49c09209
AM
4153 *locsymsp = locsyms;
4154 }
4155 sym = locsyms + r_symndx;
4156
4157 if (hp != NULL)
4158 *hp = NULL;
4159
4160 if (symp != NULL)
4161 *symp = sym;
4162
4163 if (symsecp != NULL)
4164 *symsecp = bfd_section_from_elf_index (ibfd, sym->st_shndx);
4165
4166 if (tls_maskp != NULL)
4167 {
4168 bfd_signed_vma *local_got;
4169 unsigned char *tls_mask;
4170
4171 tls_mask = NULL;
4172 local_got = elf_local_got_refcounts (ibfd);
4173 if (local_got != NULL)
4174 {
4175 struct plt_entry **local_plt = (struct plt_entry **)
4176 (local_got + symtab_hdr->sh_info);
4177 unsigned char *lgot_masks = (unsigned char *)
4178 (local_plt + symtab_hdr->sh_info);
4179 tls_mask = &lgot_masks[r_symndx];
4180 }
4181 *tls_maskp = tls_mask;
4182 }
4183 }
0a1b45a2 4184 return true;
49c09209 4185}
25dbc73a 4186\f
3e04d765
AM
4187/* Analyze inline PLT call relocations to see whether calls to locally
4188 defined functions can be converted to direct calls. */
4189
0a1b45a2 4190bool
3e04d765
AM
4191ppc_elf_inline_plt (struct bfd_link_info *info)
4192{
4193 struct ppc_elf_link_hash_table *htab;
4194 bfd *ibfd;
4195 asection *sec;
4196 bfd_vma low_vma, high_vma, limit;
4197
4198 htab = ppc_elf_hash_table (info);
4199 if (htab == NULL)
0a1b45a2 4200 return false;
3e04d765
AM
4201
4202 /* A bl insn can reach -0x2000000 to 0x1fffffc. The limit is
4203 reduced somewhat to cater for possible stubs that might be added
4204 between the call and its destination. */
4205 limit = 0x1e00000;
4206 low_vma = -1;
4207 high_vma = 0;
4208 for (sec = info->output_bfd->sections; sec != NULL; sec = sec->next)
4209 if ((sec->flags & (SEC_ALLOC | SEC_CODE)) == (SEC_ALLOC | SEC_CODE))
4210 {
4211 if (low_vma > sec->vma)
4212 low_vma = sec->vma;
4213 if (high_vma < sec->vma + sec->size)
4214 high_vma = sec->vma + sec->size;
4215 }
4216
4217 /* If a "bl" can reach anywhere in local code sections, then we can
4218 convert all inline PLT sequences to direct calls when the symbol
4219 is local. */
4220 if (high_vma - low_vma < limit)
4221 {
4222 htab->can_convert_all_inline_plt = 1;
0a1b45a2 4223 return true;
3e04d765
AM
4224 }
4225
4226 /* Otherwise, go looking through relocs for cases where a direct
4227 call won't reach. Mark the symbol on any such reloc to disable
4228 the optimization and keep the PLT entry as it seems likely that
4229 this will be better than creating trampolines. Note that this
4230 will disable the optimization for all inline PLT calls to a
4231 particular symbol, not just those that won't reach. The
4232 difficulty in doing a more precise optimization is that the
4233 linker needs to make a decision depending on whether a
4234 particular R_PPC_PLTCALL insn can be turned into a direct
4235 call, for each of the R_PPC_PLTSEQ and R_PPC_PLT16* insns in
4236 the sequence, and there is nothing that ties those relocs
4237 together except their symbol. */
4238
4239 for (ibfd = info->input_bfds; ibfd != NULL; ibfd = ibfd->link.next)
4240 {
4241 Elf_Internal_Shdr *symtab_hdr;
4242 Elf_Internal_Sym *local_syms;
4243
4244 if (!is_ppc_elf (ibfd))
4245 continue;
4246
4247 local_syms = NULL;
4248 symtab_hdr = &elf_symtab_hdr (ibfd);
4249
4250 for (sec = ibfd->sections; sec != NULL; sec = sec->next)
4251 if (sec->has_pltcall
4252 && !bfd_is_abs_section (sec->output_section))
4253 {
4254 Elf_Internal_Rela *relstart, *rel, *relend;
4255
4256 /* Read the relocations. */
4257 relstart = _bfd_elf_link_read_relocs (ibfd, sec, NULL, NULL,
4258 info->keep_memory);
4259 if (relstart == NULL)
0a1b45a2 4260 return false;
3e04d765
AM
4261
4262 relend = relstart + sec->reloc_count;
337d0bf8 4263 for (rel = relstart; rel < relend; rel++)
3e04d765
AM
4264 {
4265 enum elf_ppc_reloc_type r_type;
4266 unsigned long r_symndx;
4267 asection *sym_sec;
4268 struct elf_link_hash_entry *h;
4269 Elf_Internal_Sym *sym;
4270 unsigned char *tls_maskp;
4271
4272 r_type = ELF32_R_TYPE (rel->r_info);
4273 if (r_type != R_PPC_PLTCALL)
4274 continue;
4275
4276 r_symndx = ELF32_R_SYM (rel->r_info);
4277 if (!get_sym_h (&h, &sym, &sym_sec, &tls_maskp, &local_syms,
4278 r_symndx, ibfd))
4279 {
4280 if (elf_section_data (sec)->relocs != relstart)
4281 free (relstart);
c9594989 4282 if (symtab_hdr->contents != (unsigned char *) local_syms)
3e04d765 4283 free (local_syms);
0a1b45a2 4284 return false;
3e04d765
AM
4285 }
4286
4287 if (sym_sec != NULL && sym_sec->output_section != NULL)
4288 {
4289 bfd_vma from, to;
4290 if (h != NULL)
4291 to = h->root.u.def.value;
4292 else
4293 to = sym->st_value;
4294 to += (rel->r_addend
4295 + sym_sec->output_offset
4296 + sym_sec->output_section->vma);
4297 from = (rel->r_offset
4298 + sec->output_offset
4299 + sec->output_section->vma);
4300 if (to - from + limit < 2 * limit)
4301 *tls_maskp &= ~PLT_KEEP;
4302 }
4303 }
4304 if (elf_section_data (sec)->relocs != relstart)
4305 free (relstart);
4306 }
4307
4308 if (local_syms != NULL
4309 && symtab_hdr->contents != (unsigned char *) local_syms)
4310 {
4311 if (!info->keep_memory)
4312 free (local_syms);
4313 else
4314 symtab_hdr->contents = (unsigned char *) local_syms;
4315 }
4316 }
4317
0a1b45a2 4318 return true;
3e04d765
AM
4319}
4320
3a71aa26
AM
4321/* Set plt output section type, htab->tls_get_addr, and call the
4322 generic ELF tls_setup function. */
7fce784e 4323
25dbc73a 4324asection *
5446cbdf 4325ppc_elf_tls_setup (bfd *obfd, struct bfd_link_info *info)
7fce784e 4326{
25dbc73a 4327 struct ppc_elf_link_hash_table *htab;
7fce784e 4328
25dbc73a 4329 htab = ppc_elf_hash_table (info);
a7f2871e 4330 htab->tls_get_addr = elf_link_hash_lookup (&htab->elf, "__tls_get_addr",
0a1b45a2 4331 false, false, true);
f01f1741 4332 if (htab->plt_type != PLT_NEW)
0a1b45a2 4333 htab->params->no_tls_get_addr_opt = true;
f01f1741 4334
5446cbdf 4335 if (!htab->params->no_tls_get_addr_opt)
a7f2871e
AM
4336 {
4337 struct elf_link_hash_entry *opt, *tga;
4338 opt = elf_link_hash_lookup (&htab->elf, "__tls_get_addr_opt",
0a1b45a2 4339 false, false, true);
a7f2871e
AM
4340 if (opt != NULL
4341 && (opt->root.type == bfd_link_hash_defined
4342 || opt->root.type == bfd_link_hash_defweak))
4343 {
4344 /* If glibc supports an optimized __tls_get_addr call stub,
4345 signalled by the presence of __tls_get_addr_opt, and we'll
4346 be calling __tls_get_addr via a plt call stub, then
4347 make __tls_get_addr point to __tls_get_addr_opt. */
4348 tga = htab->tls_get_addr;
4349 if (htab->elf.dynamic_sections_created
4350 && tga != NULL
4351 && (tga->type == STT_FUNC
4352 || tga->needs_plt)
4353 && !(SYMBOL_CALLS_LOCAL (info, tga)
21d68fcd 4354 || UNDEFWEAK_NO_DYNAMIC_RELOC (info, tga)))
a7f2871e
AM
4355 {
4356 struct plt_entry *ent;
32af9f6e
AM
4357 for (ent = tga->plt.plist; ent != NULL; ent = ent->next)
4358 if (ent->plt.refcount > 0)
4359 break;
4360 if (ent != NULL)
a7f2871e
AM
4361 {
4362 tga->root.type = bfd_link_hash_indirect;
4363 tga->root.u.i.link = &opt->root;
4364 ppc_elf_copy_indirect_symbol (info, opt, tga);
b531344c 4365 opt->mark = 1;
a7f2871e
AM
4366 if (opt->dynindx != -1)
4367 {
4368 /* Use __tls_get_addr_opt in dynamic relocations. */
4369 opt->dynindx = -1;
4370 _bfd_elf_strtab_delref (elf_hash_table (info)->dynstr,
4371 opt->dynstr_index);
4372 if (!bfd_elf_link_record_dynamic_symbol (info, opt))
0a1b45a2 4373 return false;
a7f2871e
AM
4374 }
4375 htab->tls_get_addr = opt;
4376 }
4377 }
4378 }
4379 else
0a1b45a2 4380 htab->params->no_tls_get_addr_opt = true;
a7f2871e 4381 }
4a3dc543 4382 if (htab->plt_type == PLT_NEW
ce558b89
AM
4383 && htab->elf.splt != NULL
4384 && htab->elf.splt->output_section != NULL)
d7128ce4 4385 {
ce558b89
AM
4386 elf_section_type (htab->elf.splt->output_section) = SHT_PROGBITS;
4387 elf_section_flags (htab->elf.splt->output_section) = SHF_ALLOC + SHF_WRITE;
d7128ce4
AM
4388 }
4389
25dbc73a 4390 return _bfd_elf_tls_setup (obfd, info);
7fce784e
AS
4391}
4392
3a71aa26
AM
4393/* Return TRUE iff REL is a branch reloc with a global symbol matching
4394 HASH. */
4395
0a1b45a2 4396static bool
3a71aa26
AM
4397branch_reloc_hash_match (const bfd *ibfd,
4398 const Elf_Internal_Rela *rel,
4399 const struct elf_link_hash_entry *hash)
4400{
4401 Elf_Internal_Shdr *symtab_hdr = &elf_symtab_hdr (ibfd);
4402 enum elf_ppc_reloc_type r_type = ELF32_R_TYPE (rel->r_info);
4403 unsigned int r_symndx = ELF32_R_SYM (rel->r_info);
4404
e054468f 4405 if (r_symndx >= symtab_hdr->sh_info && is_branch_reloc (r_type))
3a71aa26
AM
4406 {
4407 struct elf_link_hash_entry **sym_hashes = elf_sym_hashes (ibfd);
4408 struct elf_link_hash_entry *h;
4409
4410 h = sym_hashes[r_symndx - symtab_hdr->sh_info];
4411 while (h->root.type == bfd_link_hash_indirect
4412 || h->root.type == bfd_link_hash_warning)
4413 h = (struct elf_link_hash_entry *) h->root.u.i.link;
4414 if (h == hash)
0a1b45a2 4415 return true;
3a71aa26 4416 }
0a1b45a2 4417 return false;
3a71aa26
AM
4418}
4419
25dbc73a
AM
4420/* Run through all the TLS relocs looking for optimization
4421 opportunities. */
252b5132 4422
0a1b45a2 4423bool
25dbc73a
AM
4424ppc_elf_tls_optimize (bfd *obfd ATTRIBUTE_UNUSED,
4425 struct bfd_link_info *info)
252b5132 4426{
7fce784e 4427 bfd *ibfd;
25dbc73a
AM
4428 asection *sec;
4429 struct ppc_elf_link_hash_table *htab;
b7fcf6f6 4430 int pass;
252b5132 4431
3cbc1e5e 4432 if (!bfd_link_executable (info))
0a1b45a2 4433 return true;
252b5132 4434
7619e7c7 4435 htab = ppc_elf_hash_table (info);
663a1470 4436 if (htab == NULL)
0a1b45a2 4437 return false;
663a1470 4438
252dcdf4
AM
4439 htab->do_tls_opt = 1;
4440
b7fcf6f6
AM
4441 /* Make two passes through the relocs. First time check that tls
4442 relocs involved in setting up a tls_get_addr call are indeed
663a1470
AM
4443 followed by such a call. If they are not, don't do any tls
4444 optimization. On the second pass twiddle tls_mask flags to
4445 notify relocate_section that optimization can be done, and
4446 adjust got and plt refcounts. */
b7fcf6f6 4447 for (pass = 0; pass < 2; ++pass)
c72f2fb2 4448 for (ibfd = info->input_bfds; ibfd != NULL; ibfd = ibfd->link.next)
b7fcf6f6 4449 {
0ffa91dd 4450 Elf_Internal_Shdr *symtab_hdr = &elf_symtab_hdr (ibfd);
32af9f6e 4451 asection *got2 = bfd_get_section_by_name (ibfd, ".got2");
7619e7c7 4452
b7fcf6f6
AM
4453 for (sec = ibfd->sections; sec != NULL; sec = sec->next)
4454 if (sec->has_tls_reloc && !bfd_is_abs_section (sec->output_section))
4455 {
4456 Elf_Internal_Rela *relstart, *rel, *relend;
663a1470 4457 int expecting_tls_get_addr = 0;
252b5132 4458
b7fcf6f6
AM
4459 /* Read the relocations. */
4460 relstart = _bfd_elf_link_read_relocs (ibfd, sec, NULL, NULL,
4461 info->keep_memory);
4462 if (relstart == NULL)
0a1b45a2 4463 return false;
7619e7c7 4464
b7fcf6f6
AM
4465 relend = relstart + sec->reloc_count;
4466 for (rel = relstart; rel < relend; rel++)
4467 {
4468 enum elf_ppc_reloc_type r_type;
4469 unsigned long r_symndx;
4470 struct elf_link_hash_entry *h = NULL;
bac3c8c5 4471 unsigned char *tls_mask;
37da22e5 4472 unsigned char tls_set, tls_clear;
0a1b45a2 4473 bool is_local;
b7fcf6f6
AM
4474 bfd_signed_vma *got_count;
4475
4476 r_symndx = ELF32_R_SYM (rel->r_info);
4477 if (r_symndx >= symtab_hdr->sh_info)
4478 {
4479 struct elf_link_hash_entry **sym_hashes;
7fce784e 4480
b7fcf6f6
AM
4481 sym_hashes = elf_sym_hashes (ibfd);
4482 h = sym_hashes[r_symndx - symtab_hdr->sh_info];
4483 while (h->root.type == bfd_link_hash_indirect
4484 || h->root.type == bfd_link_hash_warning)
4485 h = (struct elf_link_hash_entry *) h->root.u.i.link;
4486 }
7619e7c7 4487
f749f26e 4488 is_local = SYMBOL_REFERENCES_LOCAL (info, h);
b7fcf6f6 4489 r_type = ELF32_R_TYPE (rel->r_info);
663a1470
AM
4490 /* If this section has old-style __tls_get_addr calls
4491 without marker relocs, then check that each
4492 __tls_get_addr call reloc is preceded by a reloc
4493 that conceivably belongs to the __tls_get_addr arg
4494 setup insn. If we don't find matching arg setup
4495 relocs, don't do any tls optimization. */
4496 if (pass == 0
9737e8af 4497 && sec->nomark_tls_get_addr
663a1470
AM
4498 && h != NULL
4499 && h == htab->tls_get_addr
4500 && !expecting_tls_get_addr
4501 && is_branch_reloc (r_type))
4502 {
25f53a85 4503 info->callbacks->minfo ("%H __tls_get_addr lost arg, "
663a1470
AM
4504 "TLS optimization disabled\n",
4505 ibfd, sec, rel->r_offset);
4506 if (elf_section_data (sec)->relocs != relstart)
4507 free (relstart);
0a1b45a2 4508 return true;
663a1470
AM
4509 }
4510
4511 expecting_tls_get_addr = 0;
b7fcf6f6
AM
4512 switch (r_type)
4513 {
4514 case R_PPC_GOT_TLSLD16:
4515 case R_PPC_GOT_TLSLD16_LO:
4516 expecting_tls_get_addr = 1;
1a0670f3 4517 /* Fall through. */
b7fcf6f6
AM
4518
4519 case R_PPC_GOT_TLSLD16_HI:
4520 case R_PPC_GOT_TLSLD16_HA:
4521 /* These relocs should never be against a symbol
4522 defined in a shared lib. Leave them alone if
4523 that turns out to be the case. */
4524 if (!is_local)
4525 continue;
4526
4527 /* LD -> LE */
4528 tls_set = 0;
4529 tls_clear = TLS_LD;
4530 break;
4531
4532 case R_PPC_GOT_TLSGD16:
4533 case R_PPC_GOT_TLSGD16_LO:
4534 expecting_tls_get_addr = 1;
1a0670f3 4535 /* Fall through. */
b7fcf6f6
AM
4536
4537 case R_PPC_GOT_TLSGD16_HI:
4538 case R_PPC_GOT_TLSGD16_HA:
4539 if (is_local)
4540 /* GD -> LE */
4541 tls_set = 0;
4542 else
4543 /* GD -> IE */
b00a0a86 4544 tls_set = TLS_TLS | TLS_GDIE;
b7fcf6f6
AM
4545 tls_clear = TLS_GD;
4546 break;
4547
4548 case R_PPC_GOT_TPREL16:
4549 case R_PPC_GOT_TPREL16_LO:
4550 case R_PPC_GOT_TPREL16_HI:
4551 case R_PPC_GOT_TPREL16_HA:
4552 if (is_local)
4553 {
4554 /* IE -> LE */
4555 tls_set = 0;
4556 tls_clear = TLS_TPREL;
4557 break;
4558 }
4559 else
4560 continue;
4561
32af9f6e 4562 case R_PPC_TLSLD:
7d04a20a
AM
4563 if (!is_local)
4564 continue;
4565 /* Fall through. */
4566 case R_PPC_TLSGD:
23cedd1d
AM
4567 if (rel + 1 < relend
4568 && is_plt_seq_reloc (ELF32_R_TYPE (rel[1].r_info)))
4569 {
4570 if (pass != 0
4571 && ELF32_R_TYPE (rel[1].r_info) != R_PPC_PLTSEQ)
4572 {
4573 r_type = ELF32_R_TYPE (rel[1].r_info);
4574 r_symndx = ELF32_R_SYM (rel[1].r_info);
4575 if (r_symndx >= symtab_hdr->sh_info)
4576 {
4577 struct elf_link_hash_entry **sym_hashes;
4578
4579 sym_hashes = elf_sym_hashes (ibfd);
4580 h = sym_hashes[r_symndx - symtab_hdr->sh_info];
4581 while (h->root.type == bfd_link_hash_indirect
4582 || h->root.type == bfd_link_hash_warning)
4583 h = (struct elf_link_hash_entry *) h->root.u.i.link;
4584 if (h != NULL)
4585 {
4586 struct plt_entry *ent = NULL;
4587 bfd_vma addend = 0;
4588
4589 if (bfd_link_pic (info))
4590 addend = rel->r_addend;
4591 ent = find_plt_ent (&h->plt.plist,
4592 got2, addend);
4593 if (ent != NULL
4594 && ent->plt.refcount > 0)
4595 ent->plt.refcount -= 1;
4596 }
4597 }
4598 }
4599 continue;
4600 }
32af9f6e
AM
4601 expecting_tls_get_addr = 2;
4602 tls_set = 0;
4603 tls_clear = 0;
4604 break;
4605
252dcdf4
AM
4606 case R_PPC_TPREL16_HA:
4607 if (pass == 0)
4608 {
4609 unsigned char buf[4];
4610 unsigned int insn;
4611 bfd_vma off = rel->r_offset & ~3;
4612 if (!bfd_get_section_contents (ibfd, sec, buf,
4613 off, 4))
4614 {
4615 if (elf_section_data (sec)->relocs != relstart)
4616 free (relstart);
0a1b45a2 4617 return false;
252dcdf4
AM
4618 }
4619 insn = bfd_get_32 (ibfd, buf);
4620 /* addis rt,2,imm */
4621 if ((insn & ((0x3fu << 26) | 0x1f << 16))
4622 != ((15u << 26) | (2 << 16)))
4623 {
4624 /* xgettext:c-format */
4625 info->callbacks->minfo
4626 (_("%H: warning: %s unexpected insn %#x.\n"),
4627 ibfd, sec, off, "R_PPC_TPREL16_HA", insn);
4628 htab->do_tls_opt = 0;
4629 }
4630 }
4631 continue;
4632
4633 case R_PPC_TPREL16_HI:
4634 htab->do_tls_opt = 0;
4635 continue;
4636
b7fcf6f6 4637 default:
25dbc73a 4638 continue;
b7fcf6f6 4639 }
25dbc73a 4640
b7fcf6f6
AM
4641 if (pass == 0)
4642 {
727fc41e 4643 if (!expecting_tls_get_addr
9737e8af 4644 || !sec->nomark_tls_get_addr)
b7fcf6f6 4645 continue;
25dbc73a 4646
3a71aa26
AM
4647 if (rel + 1 < relend
4648 && branch_reloc_hash_match (ibfd, rel + 1,
4649 htab->tls_get_addr))
4650 continue;
25dbc73a 4651
b7fcf6f6
AM
4652 /* Uh oh, we didn't find the expected call. We
4653 could just mark this symbol to exclude it
4654 from tls optimization but it's safer to skip
663a1470 4655 the entire optimization. */
25f53a85 4656 info->callbacks->minfo (_("%H arg lost __tls_get_addr, "
663a1470
AM
4657 "TLS optimization disabled\n"),
4658 ibfd, sec, rel->r_offset);
4659 if (elf_section_data (sec)->relocs != relstart)
4660 free (relstart);
0a1b45a2 4661 return true;
b7fcf6f6 4662 }
25dbc73a 4663
b7fcf6f6
AM
4664 if (h != NULL)
4665 {
4666 tls_mask = &ppc_elf_hash_entry (h)->tls_mask;
4667 got_count = &h->got.refcount;
4668 }
4669 else
4670 {
b7fcf6f6 4671 bfd_signed_vma *lgot_refs;
e054468f 4672 struct plt_entry **local_plt;
bac3c8c5 4673 unsigned char *lgot_masks;
25dbc73a 4674
b7fcf6f6
AM
4675 lgot_refs = elf_local_got_refcounts (ibfd);
4676 if (lgot_refs == NULL)
4677 abort ();
e054468f
AM
4678 local_plt = (struct plt_entry **)
4679 (lgot_refs + symtab_hdr->sh_info);
bac3c8c5
AM
4680 lgot_masks = (unsigned char *)
4681 (local_plt + symtab_hdr->sh_info);
b7fcf6f6
AM
4682 tls_mask = &lgot_masks[r_symndx];
4683 got_count = &lgot_refs[r_symndx];
4684 }
25dbc73a 4685
37da22e5
AM
4686 /* If we don't have old-style __tls_get_addr calls
4687 without TLSGD/TLSLD marker relocs, and we haven't
4688 found a new-style __tls_get_addr call with a
4689 marker for this symbol, then we either have a
4690 broken object file or an -mlongcall style
4691 indirect call to __tls_get_addr without a marker.
4692 Disable optimization in this case. */
4693 if ((tls_clear & (TLS_GD | TLS_LD)) != 0
9737e8af 4694 && !sec->nomark_tls_get_addr
37da22e5
AM
4695 && ((*tls_mask & (TLS_TLS | TLS_MARK))
4696 != (TLS_TLS | TLS_MARK)))
4697 continue;
4698
7d04a20a 4699 if (expecting_tls_get_addr == 1 + !sec->nomark_tls_get_addr)
37da22e5
AM
4700 {
4701 struct plt_entry *ent;
4702 bfd_vma addend = 0;
4703
4704 if (bfd_link_pic (info)
23cedd1d
AM
4705 && (ELF32_R_TYPE (rel[1].r_info) == R_PPC_PLTREL24
4706 || ELF32_R_TYPE (rel[1].r_info) == R_PPC_PLTCALL))
37da22e5
AM
4707 addend = rel[1].r_addend;
4708 ent = find_plt_ent (&htab->tls_get_addr->plt.plist,
4709 got2, addend);
4710 if (ent != NULL && ent->plt.refcount > 0)
4711 ent->plt.refcount -= 1;
37da22e5 4712 }
7d04a20a
AM
4713 if (tls_clear == 0)
4714 continue;
37da22e5 4715
b7fcf6f6
AM
4716 if (tls_set == 0)
4717 {
4718 /* We managed to get rid of a got entry. */
4719 if (*got_count > 0)
4720 *got_count -= 1;
4721 }
25dbc73a 4722
b7fcf6f6
AM
4723 *tls_mask |= tls_set;
4724 *tls_mask &= ~tls_clear;
4725 }
25dbc73a 4726
b7fcf6f6
AM
4727 if (elf_section_data (sec)->relocs != relstart)
4728 free (relstart);
4729 }
b7fcf6f6 4730 }
0a1b45a2 4731 return true;
25dbc73a
AM
4732}
4733\f
287c7eaf
AM
4734/* Return true if we have dynamic relocs against H or any of its weak
4735 aliases, that apply to read-only sections. Cannot be used after
4736 size_dynamic_sections. */
4737
0a1b45a2 4738static bool
287c7eaf
AM
4739alias_readonly_dynrelocs (struct elf_link_hash_entry *h)
4740{
4741 struct ppc_elf_link_hash_entry *eh = ppc_elf_hash_entry (h);
4742 do
4743 {
5dbc8b37 4744 if (_bfd_elf_readonly_dynrelocs (&eh->elf))
0a1b45a2 4745 return true;
287c7eaf
AM
4746 eh = ppc_elf_hash_entry (eh->elf.u.alias);
4747 } while (eh != NULL && &eh->elf != h);
4748
0a1b45a2 4749 return false;
287c7eaf
AM
4750}
4751
4752/* Return whether H has pc-relative dynamic relocs. */
4753
0a1b45a2 4754static bool
287c7eaf
AM
4755pc_dynrelocs (struct elf_link_hash_entry *h)
4756{
4757 struct elf_dyn_relocs *p;
4758
190eb1dd 4759 for (p = h->dyn_relocs; p != NULL; p = p->next)
287c7eaf 4760 if (p->pc_count != 0)
0a1b45a2
AM
4761 return true;
4762 return false;
287c7eaf
AM
4763}
4764
25dbc73a
AM
4765/* Adjust a symbol defined by a dynamic object and referenced by a
4766 regular object. The current definition is in some section of the
4767 dynamic object, but we're not including those sections. We have to
4768 change the definition to something the rest of the link can
4769 understand. */
7fce784e 4770
0a1b45a2 4771static bool
25dbc73a
AM
4772ppc_elf_adjust_dynamic_symbol (struct bfd_link_info *info,
4773 struct elf_link_hash_entry *h)
4774{
4775 struct ppc_elf_link_hash_table *htab;
4776 asection *s;
7fce784e 4777
25dbc73a
AM
4778#ifdef DEBUG
4779 fprintf (stderr, "ppc_elf_adjust_dynamic_symbol called for %s\n",
4780 h->root.root.string);
4781#endif
252b5132 4782
25dbc73a
AM
4783 /* Make sure we know what is going on here. */
4784 htab = ppc_elf_hash_table (info);
4785 BFD_ASSERT (htab->elf.dynobj != NULL
4786 && (h->needs_plt
91e21fb7 4787 || h->type == STT_GNU_IFUNC
60d67dc8 4788 || h->is_weakalias
25dbc73a
AM
4789 || (h->def_dynamic
4790 && h->ref_regular
4791 && !h->def_regular)));
252b5132 4792
25dbc73a
AM
4793 /* Deal with function syms. */
4794 if (h->type == STT_FUNC
e054468f 4795 || h->type == STT_GNU_IFUNC
25dbc73a
AM
4796 || h->needs_plt)
4797 {
0a1b45a2 4798 bool local = (SYMBOL_CALLS_LOCAL (info, h)
529fe20e 4799 || UNDEFWEAK_NO_DYNAMIC_RELOC (info, h));
287c7eaf
AM
4800 /* Discard dyn_relocs when non-pic if we've decided that a
4801 function symbol is local. */
4802 if (!bfd_link_pic (info) && local)
190eb1dd 4803 h->dyn_relocs = NULL;
529fe20e 4804
25dbc73a
AM
4805 /* Clear procedure linkage table information for any symbol that
4806 won't need a .plt entry. */
a6aa5195
AM
4807 struct plt_entry *ent;
4808 for (ent = h->plt.plist; ent != NULL; ent = ent->next)
4809 if (ent->plt.refcount > 0)
4810 break;
4811 if (ent == NULL
2d7ad24e
AM
4812 || (h->type != STT_GNU_IFUNC
4813 && local
3e04d765
AM
4814 && (htab->can_convert_all_inline_plt
4815 || (ppc_elf_hash_entry (h)->tls_mask
4816 & (TLS_TLS | PLT_KEEP)) != PLT_KEEP)))
252b5132 4817 {
25dbc73a 4818 /* A PLT entry is not required/allowed when:
252b5132 4819
25dbc73a
AM
4820 1. We are not using ld.so; because then the PLT entry
4821 can't be set up, so we can't use one. In this case,
4822 ppc_elf_adjust_dynamic_symbol won't even be called.
252b5132 4823
25dbc73a
AM
4824 2. GC has rendered the entry unused.
4825
4826 3. We know for certain that a call to this symbol
4827 will go to this object, or will remain undefined. */
a6aa5195 4828 h->plt.plist = NULL;
25dbc73a 4829 h->needs_plt = 0;
d1eca1e4 4830 h->pointer_equality_needed = 0;
25dbc73a 4831 }
625af618
AM
4832 else
4833 {
d1eca1e4
AM
4834 /* Taking a function's address in a read/write section
4835 doesn't require us to define the function symbol in the
1009ef28 4836 executable on a plt call stub. A dynamic reloc can
f0158f44
AM
4837 be used instead, giving better runtime performance.
4838 (Calls via that function pointer don't need to bounce
4839 through the plt call stub.) Similarly, use a dynamic
4840 reloc for a weak reference when possible, allowing the
4841 resolution of the symbol to be set at load time rather
4842 than link time. */
4843 if ((h->pointer_equality_needed
3988aed5
AM
4844 || (h->non_got_ref
4845 && !h->ref_regular_nonweak
4846 && !UNDEFWEAK_NO_DYNAMIC_RELOC (info, h)))
90c14f0c 4847 && htab->elf.target_os != is_vxworks
1009ef28 4848 && !ppc_elf_hash_entry (h)->has_sda_refs
5dbc8b37 4849 && !_bfd_elf_readonly_dynrelocs (h))
d1eca1e4
AM
4850 {
4851 h->pointer_equality_needed = 0;
04383fd1
AM
4852 /* If we haven't seen a branch reloc and the symbol
4853 isn't an ifunc then we don't need a plt entry. */
4854 if (!h->needs_plt && h->type != STT_GNU_IFUNC)
3988aed5 4855 h->plt.plist = NULL;
d1eca1e4 4856 }
287c7eaf 4857 else if (!bfd_link_pic (info))
529fe20e
AM
4858 /* We are going to be defining the function symbol on the
4859 plt stub, so no dyn_relocs needed when non-pic. */
190eb1dd 4860 h->dyn_relocs = NULL;
625af618 4861 }
d3e454b9 4862 h->protected_def = 0;
3988aed5 4863 /* Function symbols can't have copy relocs. */
0a1b45a2 4864 return true;
252b5132 4865 }
25dbc73a 4866 else
a6aa5195 4867 h->plt.plist = NULL;
252b5132 4868
25dbc73a
AM
4869 /* If this is a weak symbol, and there is a real definition, the
4870 processor independent code will have arranged for us to see the
4871 real definition first, and we can just use the same value. */
60d67dc8 4872 if (h->is_weakalias)
252b5132 4873 {
60d67dc8
AM
4874 struct elf_link_hash_entry *def = weakdef (h);
4875 BFD_ASSERT (def->root.type == bfd_link_hash_defined);
4876 h->root.u.def.section = def->root.u.def.section;
4877 h->root.u.def.value = def->root.u.def.value;
4a7e5234
AM
4878 if (def->root.u.def.section == htab->elf.sdynbss
4879 || def->root.u.def.section == htab->elf.sdynrelro
4880 || def->root.u.def.section == htab->dynsbss)
190eb1dd 4881 h->dyn_relocs = NULL;
0a1b45a2 4882 return true;
25dbc73a 4883 }
dc810e39 4884
25dbc73a
AM
4885 /* This is a reference to a symbol defined by a dynamic object which
4886 is not a function. */
252b5132 4887
25dbc73a
AM
4888 /* If we are creating a shared library, we must presume that the
4889 only references to the symbol are via the global offset table.
4890 For such cases we need not do anything here; the relocations will
4891 be handled correctly by relocate_section. */
0e1862bb 4892 if (bfd_link_pic (info))
d3e454b9
AM
4893 {
4894 h->protected_def = 0;
0a1b45a2 4895 return true;
d3e454b9 4896 }
252b5132 4897
25dbc73a
AM
4898 /* If there are no references to this symbol that do not use the
4899 GOT, we don't need to generate a copy reloc. */
4900 if (!h->non_got_ref)
d3e454b9
AM
4901 {
4902 h->protected_def = 0;
0a1b45a2 4903 return true;
d3e454b9
AM
4904 }
4905
4906 /* Protected variables do not work with .dynbss. The copy in
4907 .dynbss won't be used by the shared library with the protected
4908 definition for the variable. Editing to PIC, or text relocations
4909 are preferable to an incorrect program. */
4910 if (h->protected_def)
4911 {
4912 if (ELIMINATE_COPY_RELOCS
4913 && ppc_elf_hash_entry (h)->has_addr16_ha
4914 && ppc_elf_hash_entry (h)->has_addr16_lo
4915 && htab->params->pic_fixup == 0
4916 && info->disable_target_specific_optimizations <= 1)
4917 htab->params->pic_fixup = 1;
0a1b45a2 4918 return true;
d3e454b9 4919 }
25dbc73a 4920
a127494f
AM
4921 /* If -z nocopyreloc was given, we won't generate them either. */
4922 if (info->nocopyreloc)
0a1b45a2 4923 return true;
a127494f 4924
dce2246a 4925 /* If we don't find any dynamic relocs in read-only sections, then
cfd2c773
NS
4926 we'll be keeping the dynamic relocs and avoiding the copy reloc.
4927 We can't do this if there are any small data relocations. This
4928 doesn't work on VxWorks, where we can not have dynamic
4929 relocations (other than copy and jump slot relocations) in an
4930 executable. */
4dc4a9a5 4931 if (ELIMINATE_COPY_RELOCS
cfd2c773 4932 && !ppc_elf_hash_entry (h)->has_sda_refs
90c14f0c 4933 && htab->elf.target_os != is_vxworks
625af618 4934 && !h->def_regular
287c7eaf 4935 && !alias_readonly_dynrelocs (h))
0a1b45a2 4936 return true;
252b5132 4937
25dbc73a
AM
4938 /* We must allocate the symbol in our .dynbss section, which will
4939 become part of the .bss section of the executable. There will be
4940 an entry for this symbol in the .dynsym section. The dynamic
4941 object will contain position independent code, so all references
4942 from the dynamic object to this symbol will go through the global
4943 offset table. The dynamic linker will use the .dynsym entry to
4944 determine the address it must put in the global offset table, so
4945 both the dynamic object and the regular object will refer to the
4946 same memory location for the variable.
4947
4dc4a9a5
DJ
4948 Of course, if the symbol is referenced using SDAREL relocs, we
4949 must instead allocate it in .sbss. */
4dc4a9a5 4950 if (ppc_elf_hash_entry (h)->has_sda_refs)
25dbc73a 4951 s = htab->dynsbss;
5474d94f
AM
4952 else if ((h->root.u.def.section->flags & SEC_READONLY) != 0)
4953 s = htab->elf.sdynrelro;
25dbc73a 4954 else
9d19e4fd 4955 s = htab->elf.sdynbss;
25dbc73a
AM
4956 BFD_ASSERT (s != NULL);
4957
1d7e9d18 4958 if ((h->root.u.def.section->flags & SEC_ALLOC) != 0 && h->size != 0)
25dbc73a
AM
4959 {
4960 asection *srel;
4961
4a7e5234
AM
4962 /* We must generate a R_PPC_COPY reloc to tell the dynamic
4963 linker to copy the initial value out of the dynamic object
4964 and into the runtime process image. */
4dc4a9a5 4965 if (ppc_elf_hash_entry (h)->has_sda_refs)
25dbc73a 4966 srel = htab->relsbss;
5474d94f
AM
4967 else if ((h->root.u.def.section->flags & SEC_READONLY) != 0)
4968 srel = htab->elf.sreldynrelro;
25dbc73a 4969 else
9d19e4fd 4970 srel = htab->elf.srelbss;
25dbc73a
AM
4971 BFD_ASSERT (srel != NULL);
4972 srel->size += sizeof (Elf32_External_Rela);
4973 h->needs_copy = 1;
4974 }
7619e7c7 4975
529fe20e 4976 /* We no longer want dyn_relocs. */
190eb1dd 4977 h->dyn_relocs = NULL;
6cabe1ea 4978 return _bfd_elf_adjust_dynamic_copy (info, h, s);
25dbc73a
AM
4979}
4980\f
ac39eb42
AM
4981/* Generate a symbol to mark plt call stubs. For non-PIC code the sym is
4982 xxxxxxxx.plt_call32.<callee> where xxxxxxxx is a hex number, usually 0,
4983 specifying the addend on the plt relocation. For -fpic code, the sym
4984 is xxxxxxxx.plt_pic32.<callee>, and for -fPIC
4985 xxxxxxxx.got2.plt_pic32.<callee>. */
0ba07910 4986
0a1b45a2 4987static bool
0ba07910
AM
4988add_stub_sym (struct plt_entry *ent,
4989 struct elf_link_hash_entry *h,
ac39eb42 4990 struct bfd_link_info *info)
0ba07910
AM
4991{
4992 struct elf_link_hash_entry *sh;
4993 size_t len1, len2, len3;
4994 char *name;
ac39eb42
AM
4995 const char *stub;
4996 struct ppc_elf_link_hash_table *htab = ppc_elf_hash_table (info);
4997
0e1862bb 4998 if (bfd_link_pic (info))
ac39eb42
AM
4999 stub = ".plt_pic32.";
5000 else
5001 stub = ".plt_call32.";
0ba07910
AM
5002
5003 len1 = strlen (h->root.root.string);
ac39eb42 5004 len2 = strlen (stub);
0ba07910
AM
5005 len3 = 0;
5006 if (ent->sec)
5007 len3 = strlen (ent->sec->name);
ac39eb42 5008 name = bfd_malloc (len1 + len2 + len3 + 9);
0ba07910 5009 if (name == NULL)
0a1b45a2 5010 return false;
0ba07910
AM
5011 sprintf (name, "%08x", (unsigned) ent->addend & 0xffffffff);
5012 if (ent->sec)
5013 memcpy (name + 8, ent->sec->name, len3);
ac39eb42
AM
5014 memcpy (name + 8 + len3, stub, len2);
5015 memcpy (name + 8 + len3 + len2, h->root.root.string, len1 + 1);
0a1b45a2 5016 sh = elf_link_hash_lookup (&htab->elf, name, true, false, false);
0ba07910 5017 if (sh == NULL)
0a1b45a2 5018 return false;
0ba07910
AM
5019 if (sh->root.type == bfd_link_hash_new)
5020 {
5021 sh->root.type = bfd_link_hash_defined;
5022 sh->root.u.def.section = htab->glink;
5023 sh->root.u.def.value = ent->glink_offset;
5024 sh->ref_regular = 1;
5025 sh->def_regular = 1;
5026 sh->ref_regular_nonweak = 1;
5027 sh->forced_local = 1;
5028 sh->non_elf = 0;
2ec55de3 5029 sh->root.linker_def = 1;
0ba07910 5030 }
0a1b45a2 5031 return true;
0ba07910
AM
5032}
5033
3b36f7e6
AM
5034/* Allocate NEED contiguous space in .got, and return the offset.
5035 Handles allocation of the got header when crossing 32k. */
5036
5037static bfd_vma
5038allocate_got (struct ppc_elf_link_hash_table *htab, unsigned int need)
5039{
5040 bfd_vma where;
4a3dc543 5041 unsigned int max_before_header;
3b36f7e6 5042
4a3dc543 5043 if (htab->plt_type == PLT_VXWORKS)
9d8504b1 5044 {
ce558b89
AM
5045 where = htab->elf.sgot->size;
5046 htab->elf.sgot->size += need;
9d8504b1 5047 }
3b36f7e6
AM
5048 else
5049 {
4a3dc543
RS
5050 max_before_header = htab->plt_type == PLT_NEW ? 32768 : 32764;
5051 if (need <= htab->got_gap)
3b36f7e6 5052 {
4a3dc543
RS
5053 where = max_before_header - htab->got_gap;
5054 htab->got_gap -= need;
5055 }
5056 else
5057 {
ce558b89
AM
5058 if (htab->elf.sgot->size + need > max_before_header
5059 && htab->elf.sgot->size <= max_before_header)
4a3dc543 5060 {
ce558b89
AM
5061 htab->got_gap = max_before_header - htab->elf.sgot->size;
5062 htab->elf.sgot->size = max_before_header + htab->got_header_size;
4a3dc543 5063 }
ce558b89
AM
5064 where = htab->elf.sgot->size;
5065 htab->elf.sgot->size += need;
3b36f7e6 5066 }
3b36f7e6
AM
5067 }
5068 return where;
5069}
5070
f15d0b54
AM
5071/* Calculate size of GOT entries for symbol given its TLS_MASK.
5072 TLS_LD is excluded because those go in a special GOT slot. */
5073
5074static inline unsigned int
5075got_entries_needed (int tls_mask)
5076{
5077 unsigned int need;
5078 if ((tls_mask & TLS_TLS) == 0)
5079 need = 4;
5080 else
5081 {
5082 need = 0;
5083 if ((tls_mask & TLS_GD) != 0)
5084 need += 8;
b00a0a86 5085 if ((tls_mask & (TLS_TPREL | TLS_GDIE)) != 0)
f15d0b54
AM
5086 need += 4;
5087 if ((tls_mask & TLS_DTPREL) != 0)
5088 need += 4;
5089 }
5090 return need;
5091}
5092
46434633 5093/* If H is undefined, make it dynamic if that makes sense. */
f0158f44 5094
0a1b45a2 5095static bool
46434633
AM
5096ensure_undef_dynamic (struct bfd_link_info *info,
5097 struct elf_link_hash_entry *h)
f0158f44
AM
5098{
5099 struct elf_link_hash_table *htab = elf_hash_table (info);
5100
5101 if (htab->dynamic_sections_created
46434633
AM
5102 && ((info->dynamic_undefined_weak != 0
5103 && h->root.type == bfd_link_hash_undefweak)
5104 || h->root.type == bfd_link_hash_undefined)
f0158f44
AM
5105 && h->dynindx == -1
5106 && !h->forced_local
5107 && ELF_ST_VISIBILITY (h->other) == STV_DEFAULT)
5108 return bfd_elf_link_record_dynamic_symbol (info, h);
0a1b45a2 5109 return true;
f0158f44
AM
5110}
5111
30845f11
AM
5112/* Choose whether to use htab->iplt or htab->pltlocal rather than the
5113 usual htab->elf.splt section for a PLT entry. */
5114
5115static inline
0a1b45a2 5116bool use_local_plt (struct bfd_link_info *info,
30845f11
AM
5117 struct elf_link_hash_entry *h)
5118{
5119 return (h == NULL
5120 || h->dynindx == -1
5121 || !elf_hash_table (info)->dynamic_sections_created);
5122}
5123
25dbc73a 5124/* Allocate space in associated reloc sections for dynamic relocs. */
252b5132 5125
0a1b45a2 5126static bool
25dbc73a 5127allocate_dynrelocs (struct elf_link_hash_entry *h, void *inf)
252b5132 5128{
25dbc73a
AM
5129 struct bfd_link_info *info = inf;
5130 struct ppc_elf_link_hash_entry *eh;
7619e7c7 5131 struct ppc_elf_link_hash_table *htab;
6061a67d 5132 struct elf_dyn_relocs *p;
252b5132 5133
25dbc73a 5134 if (h->root.type == bfd_link_hash_indirect)
0a1b45a2 5135 return true;
252b5132 5136
7619e7c7 5137 htab = ppc_elf_hash_table (info);
25dbc73a 5138 eh = (struct ppc_elf_link_hash_entry *) h;
d3e454b9
AM
5139 if (eh->elf.got.refcount > 0
5140 || (ELIMINATE_COPY_RELOCS
5141 && !eh->elf.def_regular
5142 && eh->elf.protected_def
5143 && eh->has_addr16_ha
5144 && eh->has_addr16_lo
5145 && htab->params->pic_fixup > 0))
25dbc73a 5146 {
d6e14abc
AM
5147 unsigned int need;
5148
46434633
AM
5149 /* Make sure this symbol is output as a dynamic symbol. */
5150 if (!ensure_undef_dynamic (info, &eh->elf))
0a1b45a2 5151 return false;
252b5132 5152
d6e14abc 5153 need = 0;
37da22e5 5154 if ((eh->tls_mask & (TLS_TLS | TLS_LD)) == (TLS_TLS | TLS_LD))
25dbc73a 5155 {
f749f26e 5156 if (SYMBOL_REFERENCES_LOCAL (info, &eh->elf))
f15d0b54
AM
5157 /* We'll just use htab->tlsld_got.offset. This should
5158 always be the case. It's a little odd if we have
5159 a local dynamic reloc against a non-local symbol. */
5160 htab->tlsld_got.refcount += 1;
5161 else
d6e14abc 5162 need += 8;
d6e14abc 5163 }
f15d0b54 5164 need += got_entries_needed (eh->tls_mask);
d6e14abc
AM
5165 if (need == 0)
5166 eh->elf.got.offset = (bfd_vma) -1;
5167 else
5168 {
3b36f7e6 5169 eh->elf.got.offset = allocate_got (htab, need);
f749f26e
AM
5170 if (((bfd_link_pic (info)
5171 && !((eh->tls_mask & TLS_TLS) != 0
5172 && bfd_link_executable (info)
5173 && SYMBOL_REFERENCES_LOCAL (info, &eh->elf)))
f0158f44
AM
5174 || (htab->elf.dynamic_sections_created
5175 && eh->elf.dynindx != -1
5176 && !SYMBOL_REFERENCES_LOCAL (info, &eh->elf)))
21d68fcd 5177 && !UNDEFWEAK_NO_DYNAMIC_RELOC (info, &eh->elf))
252b5132 5178 {
f15d0b54 5179 asection *rsec;
f15d0b54 5180
f749f26e
AM
5181 need *= sizeof (Elf32_External_Rela) / 4;
5182 if ((eh->tls_mask & (TLS_TLS | TLS_LD)) == (TLS_TLS | TLS_LD))
f15d0b54
AM
5183 need -= sizeof (Elf32_External_Rela);
5184 rsec = htab->elf.srelgot;
0bed072f 5185 if (eh->elf.type == STT_GNU_IFUNC)
ce558b89 5186 rsec = htab->elf.irelplt;
f15d0b54 5187 rsec->size += need;
252b5132 5188 }
25dbc73a
AM
5189 }
5190 }
5191 else
5192 eh->elf.got.offset = (bfd_vma) -1;
252b5132 5193
954b63d4
AM
5194 /* If no dynamic sections we can't have dynamic relocs, except for
5195 IFUNCs which are handled even in static executables. */
f0158f44
AM
5196 if (!htab->elf.dynamic_sections_created
5197 && h->type != STT_GNU_IFUNC)
190eb1dd 5198 h->dyn_relocs = NULL;
f0158f44 5199
529fe20e
AM
5200 /* Discard relocs on undefined symbols that must be local. */
5201 else if (h->root.type == bfd_link_hash_undefined
5202 && ELF_ST_VISIBILITY (h->other) != STV_DEFAULT)
190eb1dd 5203 h->dyn_relocs = NULL;
529fe20e
AM
5204
5205 /* Also discard relocs on undefined weak syms with non-default
5206 visibility, or when dynamic_undefined_weak says so. */
5207 else if (UNDEFWEAK_NO_DYNAMIC_RELOC (info, h))
190eb1dd 5208 h->dyn_relocs = NULL;
529fe20e 5209
190eb1dd 5210 if (h->dyn_relocs == NULL)
287c7eaf 5211 ;
252b5132 5212
25dbc73a
AM
5213 /* In the shared -Bsymbolic case, discard space allocated for
5214 dynamic pc-relative relocs against symbols which turn out to be
5215 defined in regular objects. For the normal shared case, discard
5216 space for relocs that have become local due to symbol visibility
5217 changes. */
f0158f44 5218 else if (bfd_link_pic (info))
25dbc73a
AM
5219 {
5220 /* Relocs that use pc_count are those that appear on a call insn,
1d483afe 5221 or certain REL relocs (see must_be_dyn_reloc) that can be
25dbc73a
AM
5222 generated via assembly. We want calls to protected symbols to
5223 resolve directly to the function rather than going via the plt.
5224 If people want function pointer comparisons to work as expected
5225 then they should avoid writing weird assembly. */
529fe20e 5226 if (SYMBOL_CALLS_LOCAL (info, h))
25dbc73a 5227 {
6061a67d 5228 struct elf_dyn_relocs **pp;
25dbc73a 5229
190eb1dd 5230 for (pp = &h->dyn_relocs; (p = *pp) != NULL; )
252b5132 5231 {
25dbc73a
AM
5232 p->count -= p->pc_count;
5233 p->pc_count = 0;
5234 if (p->count == 0)
5235 *pp = p->next;
5236 else
5237 pp = &p->next;
252b5132 5238 }
25dbc73a 5239 }
252b5132 5240
90c14f0c 5241 if (htab->elf.target_os == is_vxworks)
3348747a 5242 {
6061a67d 5243 struct elf_dyn_relocs **pp;
3348747a 5244
190eb1dd 5245 for (pp = &h->dyn_relocs; (p = *pp) != NULL; )
3348747a
NS
5246 {
5247 if (strcmp (p->sec->output_section->name, ".tls_vars") == 0)
5248 *pp = p->next;
5249 else
5250 pp = &p->next;
5251 }
5252 }
5253
190eb1dd 5254 if (h->dyn_relocs != NULL)
25dbc73a 5255 {
46434633
AM
5256 /* Make sure this symbol is output as a dynamic symbol. */
5257 if (!ensure_undef_dynamic (info, h))
0a1b45a2 5258 return false;
25dbc73a
AM
5259 }
5260 }
5261 else if (ELIMINATE_COPY_RELOCS)
5262 {
f0158f44 5263 /* For the non-pic case, discard space for relocs against
25dbc73a
AM
5264 symbols which turn out to need copy relocs or are not
5265 dynamic. */
49160308
AM
5266 if ((h->dynamic_adjusted
5267 || (h->ref_regular
5268 && h->root.type == bfd_link_hash_undefweak
5269 && (info->dynamic_undefined_weak > 0
5270 || !_bfd_elf_readonly_dynrelocs (h))))
d3e454b9 5271 && !h->def_regular
529fe20e 5272 && !ELF_COMMON_DEF_P (h)
d3e454b9
AM
5273 && !(h->protected_def
5274 && eh->has_addr16_ha
5275 && eh->has_addr16_lo
5276 && htab->params->pic_fixup > 0))
25dbc73a 5277 {
46434633
AM
5278 /* Make sure this symbol is output as a dynamic symbol. */
5279 if (!ensure_undef_dynamic (info, h))
0a1b45a2 5280 return false;
7619e7c7 5281
f0158f44 5282 if (h->dynindx == -1)
190eb1dd 5283 h->dyn_relocs = NULL;
25dbc73a 5284 }
f0158f44 5285 else
190eb1dd 5286 h->dyn_relocs = NULL;
25dbc73a 5287 }
252b5132 5288
f0158f44 5289 /* Allocate space. */
190eb1dd 5290 for (p = h->dyn_relocs; p != NULL; p = p->next)
25dbc73a
AM
5291 {
5292 asection *sreloc = elf_section_data (p->sec)->sreloc;
f95f8542 5293 if (eh->elf.type == STT_GNU_IFUNC)
ce558b89 5294 sreloc = htab->elf.irelplt;
25dbc73a
AM
5295 sreloc->size += p->count * sizeof (Elf32_External_Rela);
5296 }
252b5132 5297
2d7ad24e
AM
5298 /* Handle PLT relocs. Done last, after dynindx has settled.
5299 We might need a PLT entry when the symbol
5300 a) is dynamic, or
5301 b) is an ifunc, or
5302 c) has plt16 relocs and has been processed by adjust_dynamic_symbol, or
5303 d) has plt16 relocs and we are linking statically. */
30845f11 5304 if ((htab->elf.dynamic_sections_created && h->dynindx != -1)
2d7ad24e
AM
5305 || h->type == STT_GNU_IFUNC
5306 || (h->needs_plt && h->dynamic_adjusted)
5307 || (h->needs_plt
5308 && h->def_regular
5309 && !htab->elf.dynamic_sections_created
3e04d765 5310 && !htab->can_convert_all_inline_plt
2d7ad24e
AM
5311 && (ppc_elf_hash_entry (h)->tls_mask
5312 & (TLS_TLS | PLT_KEEP)) == PLT_KEEP))
f0158f44
AM
5313 {
5314 struct plt_entry *ent;
0a1b45a2 5315 bool doneone = false;
2d7ad24e 5316 bfd_vma plt_offset = 0, glink_offset = (bfd_vma) -1;
f0158f44
AM
5317
5318 for (ent = h->plt.plist; ent != NULL; ent = ent->next)
5319 if (ent->plt.refcount > 0)
5320 {
b2936612
AM
5321 asection *s;
5322 bool dyn;
f0158f44 5323
b2936612
AM
5324 if (!ensure_undef_dynamic (info, h))
5325 return false;
5326
5327 dyn = !use_local_plt (info, h);
5328 s = htab->elf.splt;
f0158f44 5329 if (!dyn)
2d7ad24e
AM
5330 {
5331 if (h->type == STT_GNU_IFUNC)
5332 s = htab->elf.iplt;
5333 else
5334 s = htab->pltlocal;
5335 }
f0158f44
AM
5336
5337 if (htab->plt_type == PLT_NEW || !dyn)
5338 {
5339 if (!doneone)
5340 {
5341 plt_offset = s->size;
5342 s->size += 4;
5343 }
5344 ent->plt.offset = plt_offset;
5345
2d7ad24e
AM
5346 if (s == htab->pltlocal)
5347 ent->glink_offset = glink_offset;
5348 else
f0158f44 5349 {
2d7ad24e
AM
5350 s = htab->glink;
5351 if (!doneone || bfd_link_pic (info))
5352 {
5353 glink_offset = s->size;
5354 s->size += GLINK_ENTRY_SIZE (htab, h);
5355 }
5356 if (!doneone
5357 && !bfd_link_pic (info)
5358 && h->def_dynamic
5359 && !h->def_regular)
5360 {
5361 h->root.u.def.section = s;
5362 h->root.u.def.value = glink_offset;
5363 }
5364 ent->glink_offset = glink_offset;
f0158f44 5365
2d7ad24e
AM
5366 if (htab->params->emit_stub_syms
5367 && !add_stub_sym (ent, h, info))
0a1b45a2 5368 return false;
2d7ad24e 5369 }
f0158f44
AM
5370 }
5371 else
5372 {
5373 if (!doneone)
5374 {
5375 /* If this is the first .plt entry, make room
5376 for the special first entry. */
5377 if (s->size == 0)
5378 s->size += htab->plt_initial_entry_size;
5379
5380 /* The PowerPC PLT is actually composed of two
5381 parts, the first part is 2 words (for a load
5382 and a jump), and then there is a remaining
5383 word available at the end. */
5384 plt_offset = (htab->plt_initial_entry_size
5385 + (htab->plt_slot_size
5386 * ((s->size
5387 - htab->plt_initial_entry_size)
5388 / htab->plt_entry_size)));
5389
5390 /* If this symbol is not defined in a regular
5391 file, and we are not generating a shared
5392 library, then set the symbol to this location
5393 in the .plt. This is to avoid text
5394 relocations, and is required to make
5395 function pointers compare as equal between
5396 the normal executable and the shared library. */
5397 if (! bfd_link_pic (info)
5398 && h->def_dynamic
5399 && !h->def_regular)
5400 {
5401 h->root.u.def.section = s;
5402 h->root.u.def.value = plt_offset;
5403 }
5404
5405 /* Make room for this entry. */
5406 s->size += htab->plt_entry_size;
5407 /* After the 8192nd entry, room for two entries
5408 is allocated. */
5409 if (htab->plt_type == PLT_OLD
5410 && (s->size - htab->plt_initial_entry_size)
5411 / htab->plt_entry_size
5412 > PLT_NUM_SINGLE_ENTRIES)
5413 s->size += htab->plt_entry_size;
5414 }
5415 ent->plt.offset = plt_offset;
5416 }
5417
5418 /* We also need to make an entry in the .rela.plt section. */
5419 if (!doneone)
5420 {
5421 if (!dyn)
2d7ad24e
AM
5422 {
5423 if (h->type == STT_GNU_IFUNC)
5424 {
5425 s = htab->elf.irelplt;
5426 s->size += sizeof (Elf32_External_Rela);
5427 }
5428 else if (bfd_link_pic (info))
5429 {
5430 s = htab->relpltlocal;
5431 s->size += sizeof (Elf32_External_Rela);
5432 }
5433 }
f0158f44
AM
5434 else
5435 {
5436 htab->elf.srelplt->size += sizeof (Elf32_External_Rela);
5437
5438 if (htab->plt_type == PLT_VXWORKS)
5439 {
5440 /* Allocate space for the unloaded relocations. */
5441 if (!bfd_link_pic (info)
5442 && htab->elf.dynamic_sections_created)
5443 {
5444 if (ent->plt.offset
5445 == (bfd_vma) htab->plt_initial_entry_size)
5446 {
5447 htab->srelplt2->size
5448 += (sizeof (Elf32_External_Rela)
5449 * VXWORKS_PLTRESOLVE_RELOCS);
5450 }
5451
5452 htab->srelplt2->size
5453 += (sizeof (Elf32_External_Rela)
5454 * VXWORKS_PLT_NON_JMP_SLOT_RELOCS);
5455 }
5456
5457 /* Every PLT entry has an associated GOT entry in
5458 .got.plt. */
5459 htab->elf.sgotplt->size += 4;
5460 }
5461 }
0a1b45a2 5462 doneone = true;
f0158f44
AM
5463 }
5464 }
5465 else
5466 ent->plt.offset = (bfd_vma) -1;
5467
5468 if (!doneone)
5469 {
5470 h->plt.plist = NULL;
5471 h->needs_plt = 0;
5472 }
5473 }
5474 else
5475 {
5476 h->plt.plist = NULL;
5477 h->needs_plt = 0;
5478 }
5479
0a1b45a2 5480 return true;
25dbc73a 5481}
7619e7c7 5482
6177242a
AM
5483static const unsigned char glink_eh_frame_cie[] =
5484{
5485 0, 0, 0, 16, /* length. */
5486 0, 0, 0, 0, /* id. */
5487 1, /* CIE version. */
5488 'z', 'R', 0, /* Augmentation string. */
5489 4, /* Code alignment. */
5490 0x7c, /* Data alignment. */
5491 65, /* RA reg. */
5492 1, /* Augmentation size. */
5493 DW_EH_PE_pcrel | DW_EH_PE_sdata4, /* FDE encoding. */
5494 DW_CFA_def_cfa, 1, 0 /* def_cfa: r1 offset 0. */
5495};
5496
25dbc73a
AM
5497/* Set the sizes of the dynamic sections. */
5498
0a1b45a2 5499static bool
93d1b056 5500ppc_elf_size_dynamic_sections (bfd *output_bfd,
25dbc73a
AM
5501 struct bfd_link_info *info)
5502{
5503 struct ppc_elf_link_hash_table *htab;
5504 asection *s;
0a1b45a2 5505 bool relocs;
25dbc73a 5506 bfd *ibfd;
7fce784e 5507
252b5132 5508#ifdef DEBUG
25dbc73a 5509 fprintf (stderr, "ppc_elf_size_dynamic_sections called\n");
252b5132 5510#endif
252b5132 5511
25dbc73a
AM
5512 htab = ppc_elf_hash_table (info);
5513 BFD_ASSERT (htab->elf.dynobj != NULL);
252b5132 5514
25dbc73a
AM
5515 if (elf_hash_table (info)->dynamic_sections_created)
5516 {
5517 /* Set the contents of the .interp section to the interpreter. */
9b8b325a 5518 if (bfd_link_executable (info) && !info->nointerp)
25dbc73a 5519 {
3d4d4302 5520 s = bfd_get_linker_section (htab->elf.dynobj, ".interp");
25dbc73a
AM
5521 BFD_ASSERT (s != NULL);
5522 s->size = sizeof ELF_DYNAMIC_INTERPRETER;
5523 s->contents = (unsigned char *) ELF_DYNAMIC_INTERPRETER;
5524 }
5525 }
252b5132 5526
4a3dc543 5527 if (htab->plt_type == PLT_OLD)
d7128ce4 5528 htab->got_header_size = 16;
4a3dc543 5529 else if (htab->plt_type == PLT_NEW)
d7128ce4 5530 htab->got_header_size = 12;
252b5132 5531
25dbc73a
AM
5532 /* Set up .got offsets for local syms, and space for local dynamic
5533 relocs. */
c72f2fb2 5534 for (ibfd = info->input_bfds; ibfd != NULL; ibfd = ibfd->link.next)
25dbc73a
AM
5535 {
5536 bfd_signed_vma *local_got;
5537 bfd_signed_vma *end_local_got;
e054468f
AM
5538 struct plt_entry **local_plt;
5539 struct plt_entry **end_local_plt;
25dbc73a
AM
5540 char *lgot_masks;
5541 bfd_size_type locsymcount;
5542 Elf_Internal_Shdr *symtab_hdr;
7fce784e 5543
0c8d6e5c 5544 if (!is_ppc_elf (ibfd))
25dbc73a 5545 continue;
7fce784e 5546
25dbc73a
AM
5547 for (s = ibfd->sections; s != NULL; s = s->next)
5548 {
f95f8542 5549 struct ppc_dyn_relocs *p;
252b5132 5550
f95f8542 5551 for (p = ((struct ppc_dyn_relocs *)
25dbc73a
AM
5552 elf_section_data (s)->local_dynrel);
5553 p != NULL;
5554 p = p->next)
5555 {
5556 if (!bfd_is_abs_section (p->sec)
5557 && bfd_is_abs_section (p->sec->output_section))
5558 {
5559 /* Input section has been discarded, either because
5560 it is a copy of a linkonce section or due to
5561 linker script /DISCARD/, so we'll be discarding
5562 the relocs too. */
7fce784e 5563 }
90c14f0c 5564 else if (htab->elf.target_os == is_vxworks
3348747a
NS
5565 && strcmp (p->sec->output_section->name,
5566 ".tls_vars") == 0)
5567 {
5568 /* Relocations in vxworks .tls_vars sections are
5569 handled specially by the loader. */
5570 }
25dbc73a 5571 else if (p->count != 0)
7fce784e 5572 {
25f23106 5573 asection *sreloc = elf_section_data (p->sec)->sreloc;
f95f8542 5574 if (p->ifunc)
ce558b89 5575 sreloc = htab->elf.irelplt;
25f23106 5576 sreloc->size += p->count * sizeof (Elf32_External_Rela);
25dbc73a
AM
5577 if ((p->sec->output_section->flags
5578 & (SEC_READONLY | SEC_ALLOC))
5579 == (SEC_READONLY | SEC_ALLOC))
0caf6c82
L
5580 {
5581 info->flags |= DF_TEXTREL;
871b3ab2 5582 info->callbacks->minfo (_("%pB: dynamic relocation in read-only section `%pA'\n"),
0caf6c82
L
5583 p->sec->owner, p->sec);
5584 }
7fce784e 5585 }
252b5132 5586 }
252b5132 5587 }
252b5132 5588
25dbc73a
AM
5589 local_got = elf_local_got_refcounts (ibfd);
5590 if (!local_got)
5591 continue;
252b5132 5592
0ffa91dd 5593 symtab_hdr = &elf_symtab_hdr (ibfd);
25dbc73a
AM
5594 locsymcount = symtab_hdr->sh_info;
5595 end_local_got = local_got + locsymcount;
e054468f
AM
5596 local_plt = (struct plt_entry **) end_local_got;
5597 end_local_plt = local_plt + locsymcount;
5598 lgot_masks = (char *) end_local_plt;
91d6fa6a 5599
25dbc73a
AM
5600 for (; local_got < end_local_got; ++local_got, ++lgot_masks)
5601 if (*local_got > 0)
5602 {
f15d0b54 5603 unsigned int need;
37da22e5 5604 if ((*lgot_masks & (TLS_TLS | TLS_LD)) == (TLS_TLS | TLS_LD))
f15d0b54
AM
5605 htab->tlsld_got.refcount += 1;
5606 need = got_entries_needed (*lgot_masks);
d6e14abc
AM
5607 if (need == 0)
5608 *local_got = (bfd_vma) -1;
25dbc73a
AM
5609 else
5610 {
3b36f7e6 5611 *local_got = allocate_got (htab, need);
f749f26e
AM
5612 if (bfd_link_pic (info)
5613 && !((*lgot_masks & TLS_TLS) != 0
5614 && bfd_link_executable (info)))
0bed072f 5615 {
f15d0b54 5616 asection *srel;
f15d0b54 5617
f749f26e 5618 need *= sizeof (Elf32_External_Rela) / 4;
f15d0b54 5619 srel = htab->elf.srelgot;
37da22e5 5620 if ((*lgot_masks & (TLS_TLS | PLT_IFUNC)) == PLT_IFUNC)
ce558b89 5621 srel = htab->elf.irelplt;
f15d0b54 5622 srel->size += need;
0bed072f 5623 }
25dbc73a
AM
5624 }
5625 }
5626 else
5627 *local_got = (bfd_vma) -1;
e054468f 5628
90c14f0c 5629 if (htab->elf.target_os == is_vxworks)
e054468f
AM
5630 continue;
5631
5632 /* Allocate space for calls to local STT_GNU_IFUNC syms in .iplt. */
2d7ad24e
AM
5633 lgot_masks = (char *) end_local_plt;
5634 for (; local_plt < end_local_plt; ++local_plt, ++lgot_masks)
e054468f
AM
5635 {
5636 struct plt_entry *ent;
0a1b45a2 5637 bool doneone = false;
2d7ad24e 5638 bfd_vma plt_offset = 0, glink_offset = (bfd_vma) -1;
e054468f
AM
5639
5640 for (ent = *local_plt; ent != NULL; ent = ent->next)
5641 if (ent->plt.refcount > 0)
5642 {
2d7ad24e
AM
5643 if ((*lgot_masks & (TLS_TLS | PLT_IFUNC)) == PLT_IFUNC)
5644 s = htab->elf.iplt;
3e04d765
AM
5645 else if (htab->can_convert_all_inline_plt
5646 || (*lgot_masks & (TLS_TLS | PLT_KEEP)) != PLT_KEEP)
2d7ad24e
AM
5647 {
5648 ent->plt.offset = (bfd_vma) -1;
5649 continue;
5650 }
5651 else
5652 s = htab->pltlocal;
e054468f
AM
5653
5654 if (!doneone)
5655 {
5656 plt_offset = s->size;
5657 s->size += 4;
5658 }
5659 ent->plt.offset = plt_offset;
5660
2d7ad24e 5661 if (s != htab->pltlocal && (!doneone || bfd_link_pic (info)))
e054468f 5662 {
2d7ad24e 5663 s = htab->glink;
e054468f 5664 glink_offset = s->size;
9e390558 5665 s->size += GLINK_ENTRY_SIZE (htab, NULL);
e054468f
AM
5666 }
5667 ent->glink_offset = glink_offset;
5668
5669 if (!doneone)
5670 {
2d7ad24e
AM
5671 if ((*lgot_masks & (TLS_TLS | PLT_IFUNC)) == PLT_IFUNC)
5672 {
5673 s = htab->elf.irelplt;
5674 s->size += sizeof (Elf32_External_Rela);
5675 }
5676 else if (bfd_link_pic (info))
5677 {
5678 s = htab->relpltlocal;
5679 s->size += sizeof (Elf32_External_Rela);
5680 }
0a1b45a2 5681 doneone = true;
e054468f
AM
5682 }
5683 }
5684 else
5685 ent->plt.offset = (bfd_vma) -1;
5686 }
25dbc73a 5687 }
252b5132 5688
b7fcf6f6
AM
5689 /* Allocate space for global sym dynamic relocs. */
5690 elf_link_hash_traverse (elf_hash_table (info), allocate_dynrelocs, info);
5691
3b36f7e6
AM
5692 if (htab->tlsld_got.refcount > 0)
5693 {
5694 htab->tlsld_got.offset = allocate_got (htab, 8);
f749f26e 5695 if (bfd_link_dll (info))
ce558b89 5696 htab->elf.srelgot->size += sizeof (Elf32_External_Rela);
3b36f7e6
AM
5697 }
5698 else
5699 htab->tlsld_got.offset = (bfd_vma) -1;
5700
ce558b89 5701 if (htab->elf.sgot != NULL && htab->plt_type != PLT_VXWORKS)
3b36f7e6
AM
5702 {
5703 unsigned int g_o_t = 32768;
5704
4d962050
AM
5705 /* If we haven't allocated the header, do so now. When we get here,
5706 for old plt/got the got size will be 0 to 32764 (not allocated),
5707 or 32780 to 65536 (header allocated). For new plt/got, the
5708 corresponding ranges are 0 to 32768 and 32780 to 65536. */
ce558b89 5709 if (htab->elf.sgot->size <= 32768)
3b36f7e6 5710 {
ce558b89 5711 g_o_t = htab->elf.sgot->size;
4a3dc543 5712 if (htab->plt_type == PLT_OLD)
4d962050 5713 g_o_t += 4;
ce558b89 5714 htab->elf.sgot->size += htab->got_header_size;
3b36f7e6 5715 }
3b36f7e6
AM
5716
5717 htab->elf.hgot->root.u.def.value = g_o_t;
5718 }
0e1862bb 5719 if (bfd_link_pic (info))
bd6c6e2b
AM
5720 {
5721 struct elf_link_hash_entry *sda = htab->sdata[0].sym;
93d1b056
AM
5722
5723 sda->root.u.def.section = htab->elf.hgot->root.u.def.section;
5724 sda->root.u.def.value = htab->elf.hgot->root.u.def.value;
bd6c6e2b 5725 }
15bfcc77
AM
5726 if (info->emitrelocations)
5727 {
5728 struct elf_link_hash_entry *sda = htab->sdata[0].sym;
5729
5730 if (sda != NULL && sda->ref_regular)
5731 sda->root.u.def.section->flags |= SEC_KEEP;
5732 sda = htab->sdata[1].sym;
5733 if (sda != NULL && sda->ref_regular)
5734 sda->root.u.def.section->flags |= SEC_KEEP;
5735 }
3b36f7e6 5736
e054468f
AM
5737 if (htab->glink != NULL
5738 && htab->glink->size != 0
5739 && htab->elf.dynamic_sections_created)
d7128ce4
AM
5740 {
5741 htab->glink_pltresolve = htab->glink->size;
9e390558
AM
5742 /* Space for the branch table. */
5743 htab->glink->size
5744 += htab->elf.srelplt->size / (sizeof (Elf32_External_Rela) / 4) - 4;
86b9da88 5745 /* Pad out to align the start of PLTresolve. */
5446cbdf
AM
5746 htab->glink->size += -htab->glink->size & (htab->params->ppc476_workaround
5747 ? 63 : 15);
d7128ce4 5748 htab->glink->size += GLINK_PLTRESOLVE;
0ba07910 5749
5446cbdf 5750 if (htab->params->emit_stub_syms)
0ba07910
AM
5751 {
5752 struct elf_link_hash_entry *sh;
5753 sh = elf_link_hash_lookup (&htab->elf, "__glink",
0a1b45a2 5754 true, false, false);
0ba07910 5755 if (sh == NULL)
0a1b45a2 5756 return false;
0ba07910
AM
5757 if (sh->root.type == bfd_link_hash_new)
5758 {
5759 sh->root.type = bfd_link_hash_defined;
5760 sh->root.u.def.section = htab->glink;
5761 sh->root.u.def.value = htab->glink_pltresolve;
5762 sh->ref_regular = 1;
5763 sh->def_regular = 1;
5764 sh->ref_regular_nonweak = 1;
5765 sh->forced_local = 1;
5766 sh->non_elf = 0;
2ec55de3 5767 sh->root.linker_def = 1;
0ba07910
AM
5768 }
5769 sh = elf_link_hash_lookup (&htab->elf, "__glink_PLTresolve",
0a1b45a2 5770 true, false, false);
0ba07910 5771 if (sh == NULL)
0a1b45a2 5772 return false;
0ba07910
AM
5773 if (sh->root.type == bfd_link_hash_new)
5774 {
5775 sh->root.type = bfd_link_hash_defined;
5776 sh->root.u.def.section = htab->glink;
5777 sh->root.u.def.value = htab->glink->size - GLINK_PLTRESOLVE;
5778 sh->ref_regular = 1;
5779 sh->def_regular = 1;
5780 sh->ref_regular_nonweak = 1;
5781 sh->forced_local = 1;
5782 sh->non_elf = 0;
2ec55de3 5783 sh->root.linker_def = 1;
0ba07910
AM
5784 }
5785 }
d7128ce4
AM
5786 }
5787
6177242a
AM
5788 if (htab->glink != NULL
5789 && htab->glink->size != 0
5790 && htab->glink_eh_frame != NULL
9a2a56cc
AM
5791 && !bfd_is_abs_section (htab->glink_eh_frame->output_section)
5792 && _bfd_elf_eh_frame_present (info))
6177242a
AM
5793 {
5794 s = htab->glink_eh_frame;
5795 s->size = sizeof (glink_eh_frame_cie) + 20;
0e1862bb 5796 if (bfd_link_pic (info))
6177242a
AM
5797 {
5798 s->size += 4;
5799 if (htab->glink->size - GLINK_PLTRESOLVE + 8 >= 256)
5800 s->size += 4;
5801 }
5802 }
5803
25dbc73a
AM
5804 /* We've now determined the sizes of the various dynamic sections.
5805 Allocate memory for them. */
0a1b45a2 5806 relocs = false;
25dbc73a 5807 for (s = htab->elf.dynobj->sections; s != NULL; s = s->next)
252b5132 5808 {
0a1b45a2 5809 bool strip_section = true;
9d8504b1 5810
25dbc73a
AM
5811 if ((s->flags & SEC_LINKER_CREATED) == 0)
5812 continue;
252b5132 5813
ce558b89
AM
5814 if (s == htab->elf.splt
5815 || s == htab->elf.sgot)
25dbc73a 5816 {
9d8504b1
PB
5817 /* We'd like to strip these sections if they aren't needed, but if
5818 we've exported dynamic symbols from them we must leave them.
5819 It's too late to tell BFD to get rid of the symbols. */
e054468f 5820 if (htab->elf.hplt != NULL)
0a1b45a2 5821 strip_section = false;
25dbc73a
AM
5822 /* Strip this section if we don't need it; see the
5823 comment below. */
5824 }
ce558b89 5825 else if (s == htab->elf.iplt
2d7ad24e 5826 || s == htab->pltlocal
e054468f 5827 || s == htab->glink
6177242a 5828 || s == htab->glink_eh_frame
ce558b89 5829 || s == htab->elf.sgotplt
e054468f 5830 || s == htab->sbss
9d19e4fd 5831 || s == htab->elf.sdynbss
5474d94f 5832 || s == htab->elf.sdynrelro
15bfcc77 5833 || s == htab->dynsbss)
25dbc73a 5834 {
c9a2f333 5835 /* Strip these too. */
25dbc73a 5836 }
15bfcc77
AM
5837 else if (s == htab->sdata[0].section
5838 || s == htab->sdata[1].section)
5839 {
5840 strip_section = (s->flags & SEC_KEEP) == 0;
5841 }
08dedd66 5842 else if (startswith (bfd_section_name (s), ".rela"))
25dbc73a 5843 {
c456f082 5844 if (s->size != 0)
25dbc73a
AM
5845 {
5846 /* Remember whether there are any relocation sections. */
0a1b45a2 5847 relocs = true;
252b5132 5848
25dbc73a
AM
5849 /* We use the reloc_count field as a counter if we need
5850 to copy relocs into the output file. */
5851 s->reloc_count = 0;
252b5132
RH
5852 }
5853 }
25dbc73a
AM
5854 else
5855 {
5856 /* It's not one of our sections, so don't allocate space. */
5857 continue;
5858 }
252b5132 5859
9d8504b1 5860 if (s->size == 0 && strip_section)
25dbc73a 5861 {
c456f082
AM
5862 /* If we don't need this section, strip it from the
5863 output file. This is mostly to handle .rela.bss and
5864 .rela.plt. We must create both sections in
5865 create_dynamic_sections, because they must be created
5866 before the linker maps input sections to output
5867 sections. The linker does that before
5868 adjust_dynamic_symbol is called, and it is that
5869 function which decides whether anything needs to go
5870 into these sections. */
8423293d 5871 s->flags |= SEC_EXCLUDE;
25dbc73a
AM
5872 continue;
5873 }
7fce784e 5874
d7128ce4 5875 if ((s->flags & SEC_HAS_CONTENTS) == 0)
644285ef
AM
5876 continue;
5877
25dbc73a
AM
5878 /* Allocate memory for the section contents. */
5879 s->contents = bfd_zalloc (htab->elf.dynobj, s->size);
5880 if (s->contents == NULL)
0a1b45a2 5881 return false;
25dbc73a 5882 }
252b5132 5883
25dbc73a 5884 if (htab->elf.dynamic_sections_created)
7619e7c7 5885 {
25dbc73a
AM
5886 /* Add some entries to the .dynamic section. We fill in the
5887 values later, in ppc_elf_finish_dynamic_sections, but we
5888 must add the entries now so that we get the correct size for
5889 the .dynamic section. The DT_DEBUG entry is filled in by the
5890 dynamic linker and used by the debugger. */
5891#define add_dynamic_entry(TAG, VAL) \
5892 _bfd_elf_add_dynamic_entry (info, TAG, VAL)
252b5132 5893
3084d7a2
L
5894 if (!_bfd_elf_maybe_vxworks_add_dynamic_tags (output_bfd, info,
5895 relocs))
0a1b45a2 5896 return false;
7619e7c7 5897
c7e17e05
AM
5898 if (htab->plt_type == PLT_NEW
5899 && htab->glink != NULL
5900 && htab->glink->size != 0)
d7128ce4 5901 {
1fe44d79 5902 if (!add_dynamic_entry (DT_PPC_GOT, 0))
0a1b45a2 5903 return false;
5446cbdf 5904 if (!htab->params->no_tls_get_addr_opt
a7f2871e
AM
5905 && htab->tls_get_addr != NULL
5906 && htab->tls_get_addr->plt.plist != NULL
e8910a83 5907 && !add_dynamic_entry (DT_PPC_OPT, PPC_OPT_TLS))
0a1b45a2 5908 return false;
d7128ce4 5909 }
7a2b07ff 5910 }
25dbc73a
AM
5911#undef add_dynamic_entry
5912
7e01508c
AM
5913 if (htab->glink_eh_frame != NULL
5914 && htab->glink_eh_frame->contents != NULL)
5915 {
5916 unsigned char *p = htab->glink_eh_frame->contents;
5917 bfd_vma val;
5918
5919 memcpy (p, glink_eh_frame_cie, sizeof (glink_eh_frame_cie));
5920 /* CIE length (rewrite in case little-endian). */
5921 bfd_put_32 (htab->elf.dynobj, sizeof (glink_eh_frame_cie) - 4, p);
5922 p += sizeof (glink_eh_frame_cie);
5923 /* FDE length. */
5924 val = htab->glink_eh_frame->size - 4 - sizeof (glink_eh_frame_cie);
5925 bfd_put_32 (htab->elf.dynobj, val, p);
5926 p += 4;
5927 /* CIE pointer. */
5928 val = p - htab->glink_eh_frame->contents;
5929 bfd_put_32 (htab->elf.dynobj, val, p);
5930 p += 4;
5931 /* Offset to .glink. Set later. */
5932 p += 4;
5933 /* .glink size. */
5934 bfd_put_32 (htab->elf.dynobj, htab->glink->size, p);
5935 p += 4;
5936 /* Augmentation. */
5937 p += 1;
5938
0e1862bb 5939 if (bfd_link_pic (info)
7e01508c
AM
5940 && htab->elf.dynamic_sections_created)
5941 {
5942 bfd_vma adv = (htab->glink->size - GLINK_PLTRESOLVE + 8) >> 2;
5943 if (adv < 64)
5944 *p++ = DW_CFA_advance_loc + adv;
5945 else if (adv < 256)
5946 {
5947 *p++ = DW_CFA_advance_loc1;
5948 *p++ = adv;
5949 }
5950 else if (adv < 65536)
5951 {
5952 *p++ = DW_CFA_advance_loc2;
5953 bfd_put_16 (htab->elf.dynobj, adv, p);
5954 p += 2;
5955 }
5956 else
5957 {
5958 *p++ = DW_CFA_advance_loc4;
5959 bfd_put_32 (htab->elf.dynobj, adv, p);
5960 p += 4;
5961 }
5962 *p++ = DW_CFA_register;
5963 *p++ = 65;
5964 p++;
5965 *p++ = DW_CFA_advance_loc + 4;
5966 *p++ = DW_CFA_restore_extended;
5967 *p++ = 65;
5968 }
5969 BFD_ASSERT ((bfd_vma) ((p + 3 - htab->glink_eh_frame->contents) & -4)
5970 == htab->glink_eh_frame->size);
5971 }
5972
0a1b45a2 5973 return true;
7619e7c7 5974}
0eb4a168 5975
93d1b056
AM
5976/* Arrange to have _SDA_BASE_ or _SDA2_BASE_ stripped from the output
5977 if it looks like nothing is using them. */
5978
5979static void
5980maybe_strip_sdasym (bfd *output_bfd, elf_linker_section_t *lsect)
5981{
5982 struct elf_link_hash_entry *sda = lsect->sym;
5983
5984 if (sda != NULL && !sda->ref_regular && sda->dynindx == -1)
5985 {
5986 asection *s;
5987
5988 s = bfd_get_section_by_name (output_bfd, lsect->name);
5989 if (s == NULL || bfd_section_removed_from_list (output_bfd, s))
5990 {
5991 s = bfd_get_section_by_name (output_bfd, lsect->bss_name);
5992 if (s == NULL || bfd_section_removed_from_list (output_bfd, s))
5993 {
5994 sda->def_regular = 0;
5995 /* This is somewhat magic. See elf_link_output_extsym. */
5996 sda->ref_dynamic = 1;
5997 sda->forced_local = 0;
5998 }
5999 }
6000 }
6001}
6002
6003void
6004ppc_elf_maybe_strip_sdata_syms (struct bfd_link_info *info)
6005{
6006 struct ppc_elf_link_hash_table *htab = ppc_elf_hash_table (info);
6007
6008 if (htab != NULL)
6009 {
6010 maybe_strip_sdasym (info->output_bfd, &htab->sdata[0]);
6011 maybe_strip_sdasym (info->output_bfd, &htab->sdata[1]);
6012 }
6013}
6014
6015
0eb4a168
AM
6016/* Return TRUE if symbol should be hashed in the `.gnu.hash' section. */
6017
0a1b45a2 6018static bool
0eb4a168
AM
6019ppc_elf_hash_symbol (struct elf_link_hash_entry *h)
6020{
6021 if (h->plt.plist != NULL
6022 && !h->def_regular
6023 && (!h->pointer_equality_needed
6024 || !h->ref_regular_nonweak))
0a1b45a2 6025 return false;
0eb4a168
AM
6026
6027 return _bfd_elf_hash_symbol (h);
6028}
25dbc73a
AM
6029\f
6030#define ARRAY_SIZE(a) (sizeof (a) / sizeof ((a)[0]))
6031
01017ef8
NS
6032/* Relaxation trampolines. r12 is available for clobbering (r11, is
6033 used for some functions that are allowed to break the ABI). */
25dbc73a
AM
6034static const int shared_stub_entry[] =
6035 {
6036 0x7c0802a6, /* mflr 0 */
6037 0x429f0005, /* bcl 20, 31, .Lxxx */
01017ef8
NS
6038 0x7d8802a6, /* mflr 12 */
6039 0x3d8c0000, /* addis 12, 12, (xxx-.Lxxx)@ha */
53291d1f 6040 0x398c0000, /* addi 12, 12, (xxx-.Lxxx)@l */
25dbc73a 6041 0x7c0803a6, /* mtlr 0 */
01017ef8 6042 0x7d8903a6, /* mtctr 12 */
25dbc73a
AM
6043 0x4e800420, /* bctr */
6044 };
6045
6046static const int stub_entry[] =
6047 {
01017ef8
NS
6048 0x3d800000, /* lis 12,xxx@ha */
6049 0x398c0000, /* addi 12,12,xxx@l */
6050 0x7d8903a6, /* mtctr 12 */
25dbc73a
AM
6051 0x4e800420, /* bctr */
6052 };
6053
5446cbdf
AM
6054struct ppc_elf_relax_info
6055{
6056 unsigned int workaround_size;
d3e454b9 6057 unsigned int picfixup_size;
5446cbdf
AM
6058};
6059
6060/* This function implements long branch trampolines, and the ppc476
6061 icache bug workaround. Any section needing trampolines or patch
6062 space for the workaround has its size extended so that we can
53291d1f 6063 add trampolines at the end of the section. */
5446cbdf 6064
0a1b45a2 6065static bool
25dbc73a
AM
6066ppc_elf_relax_section (bfd *abfd,
6067 asection *isec,
6068 struct bfd_link_info *link_info,
0a1b45a2 6069 bool *again)
25dbc73a 6070{
d3e454b9 6071 struct one_branch_fixup
25dbc73a 6072 {
d3e454b9 6073 struct one_branch_fixup *next;
25dbc73a 6074 asection *tsec;
01017ef8
NS
6075 /* Final link, can use the symbol offset. For a
6076 relocatable link we use the symbol's index. */
25dbc73a
AM
6077 bfd_vma toff;
6078 bfd_vma trampoff;
6079 };
7619e7c7 6080
25dbc73a
AM
6081 Elf_Internal_Shdr *symtab_hdr;
6082 bfd_byte *contents = NULL;
6083 Elf_Internal_Sym *isymbuf = NULL;
6084 Elf_Internal_Rela *internal_relocs = NULL;
5446cbdf 6085 Elf_Internal_Rela *irel, *irelend = NULL;
d3e454b9 6086 struct one_branch_fixup *branch_fixups = NULL;
5446cbdf 6087 struct ppc_elf_relax_info *relax_info = NULL;
9bc4e62b 6088 unsigned changes = 0;
0a1b45a2 6089 bool workaround_change;
d7128ce4 6090 struct ppc_elf_link_hash_table *htab;
d3e454b9 6091 bfd_size_type trampbase, trampoff, newsize, picfixup_size;
a6aa5195 6092 asection *got2;
0a1b45a2 6093 bool maybe_pasted;
7619e7c7 6094
0a1b45a2 6095 *again = false;
7619e7c7 6096
5446cbdf 6097 /* No need to do anything with non-alloc or non-code sections. */
c87b5a93 6098 if ((isec->flags & SEC_ALLOC) == 0
a8ad78a7 6099 || (isec->flags & SEC_CODE) == 0
5446cbdf
AM
6100 || (isec->flags & SEC_LINKER_CREATED) != 0
6101 || isec->size < 4)
0a1b45a2 6102 return true;
7619e7c7 6103
c8a1f254
NS
6104 /* We cannot represent the required PIC relocs in the output, so don't
6105 do anything. The linker doesn't support mixing -shared and -r
6106 anyway. */
0e1862bb 6107 if (bfd_link_relocatable (link_info) && bfd_link_pic (link_info))
0a1b45a2 6108 return true;
5b914448 6109
5446cbdf
AM
6110 htab = ppc_elf_hash_table (link_info);
6111 if (htab == NULL)
0a1b45a2 6112 return true;
5446cbdf
AM
6113
6114 isec->size = (isec->size + 3) & -4;
6115 if (isec->rawsize == 0)
6116 isec->rawsize = isec->size;
6117 trampbase = isec->size;
6118
53291d1f
AM
6119 BFD_ASSERT (isec->sec_info_type == SEC_INFO_TYPE_NONE
6120 || isec->sec_info_type == SEC_INFO_TYPE_TARGET);
6121 isec->sec_info_type = SEC_INFO_TYPE_TARGET;
6122
d3e454b9
AM
6123 if (htab->params->ppc476_workaround
6124 || htab->params->pic_fixup > 0)
5446cbdf
AM
6125 {
6126 if (elf_section_data (isec)->sec_info == NULL)
6127 {
5446cbdf
AM
6128 elf_section_data (isec)->sec_info
6129 = bfd_zalloc (abfd, sizeof (struct ppc_elf_relax_info));
6130 if (elf_section_data (isec)->sec_info == NULL)
0a1b45a2 6131 return false;
5446cbdf
AM
6132 }
6133 relax_info = elf_section_data (isec)->sec_info;
6134 trampbase -= relax_info->workaround_size;
6135 }
6136
50248c89
AM
6137 maybe_pasted = (strcmp (isec->output_section->name, ".init") == 0
6138 || strcmp (isec->output_section->name, ".fini") == 0);
25dbc73a 6139 /* Space for a branch around any trampolines. */
5446cbdf
AM
6140 trampoff = trampbase;
6141 if (maybe_pasted && trampbase == isec->rawsize)
50248c89 6142 trampoff += 4;
7619e7c7 6143
0ffa91dd 6144 symtab_hdr = &elf_symtab_hdr (abfd);
d3e454b9
AM
6145 picfixup_size = 0;
6146 if (htab->params->branch_trampolines
6147 || htab->params->pic_fixup > 0)
7619e7c7 6148 {
5446cbdf
AM
6149 /* Get a copy of the native relocations. */
6150 if (isec->reloc_count != 0)
25dbc73a 6151 {
5446cbdf
AM
6152 internal_relocs = _bfd_elf_link_read_relocs (abfd, isec, NULL, NULL,
6153 link_info->keep_memory);
6154 if (internal_relocs == NULL)
6155 goto error_return;
25dbc73a 6156 }
7619e7c7 6157
5446cbdf
AM
6158 got2 = bfd_get_section_by_name (abfd, ".got2");
6159
6160 irelend = internal_relocs + isec->reloc_count;
6161 for (irel = internal_relocs; irel < irelend; irel++)
25dbc73a 6162 {
5446cbdf
AM
6163 unsigned long r_type = ELF32_R_TYPE (irel->r_info);
6164 bfd_vma toff, roff;
6165 asection *tsec;
d3e454b9 6166 struct one_branch_fixup *f;
5446cbdf 6167 size_t insn_offset = 0;
d3e454b9 6168 bfd_vma max_branch_offset = 0, val;
5446cbdf
AM
6169 bfd_byte *hit_addr;
6170 unsigned long t0;
6171 struct elf_link_hash_entry *h;
49c09209 6172 Elf_Internal_Sym *isym;
5446cbdf
AM
6173 struct plt_entry **plist;
6174 unsigned char sym_type;
6175
6176 switch (r_type)
6177 {
6178 case R_PPC_REL24:
6179 case R_PPC_LOCAL24PC:
6180 case R_PPC_PLTREL24:
23cedd1d 6181 case R_PPC_PLTCALL:
5446cbdf
AM
6182 max_branch_offset = 1 << 25;
6183 break;
6184
6185 case R_PPC_REL14:
6186 case R_PPC_REL14_BRTAKEN:
6187 case R_PPC_REL14_BRNTAKEN:
6188 max_branch_offset = 1 << 15;
6189 break;
7fce784e 6190
d3e454b9
AM
6191 case R_PPC_ADDR16_HA:
6192 if (htab->params->pic_fixup > 0)
6193 break;
6194 continue;
6195
5446cbdf
AM
6196 default:
6197 continue;
6198 }
6199
6200 /* Get the value of the symbol referred to by the reloc. */
49c09209
AM
6201 if (!get_sym_h (&h, &isym, &tsec, NULL, &isymbuf,
6202 ELF32_R_SYM (irel->r_info), abfd))
6203 goto error_return;
5446cbdf 6204
49c09209
AM
6205 if (isym != NULL)
6206 {
6207 if (tsec != NULL)
6208 ;
5446cbdf
AM
6209 else if (isym->st_shndx == SHN_ABS)
6210 tsec = bfd_abs_section_ptr;
49199304
AM
6211 else
6212 continue;
5446cbdf
AM
6213
6214 toff = isym->st_value;
6215 sym_type = ELF_ST_TYPE (isym->st_info);
25dbc73a 6216 }
25dbc73a 6217 else
5446cbdf 6218 {
49c09209
AM
6219 if (tsec != NULL)
6220 toff = h->root.u.def.value;
5446cbdf
AM
6221 else if (h->root.type == bfd_link_hash_undefined
6222 || h->root.type == bfd_link_hash_undefweak)
6223 {
49c09209
AM
6224 unsigned long indx;
6225
6226 indx = ELF32_R_SYM (irel->r_info) - symtab_hdr->sh_info;
5446cbdf 6227 tsec = bfd_und_section_ptr;
0e1862bb 6228 toff = bfd_link_relocatable (link_info) ? indx : 0;
5446cbdf
AM
6229 }
6230 else
6231 continue;
6232
9f7552cf
AM
6233 /* If this branch is to __tls_get_addr then we may later
6234 optimise away the call. We won't be needing a long-
6235 branch stub in that case. */
0e1862bb 6236 if (bfd_link_executable (link_info)
9f7552cf
AM
6237 && h == htab->tls_get_addr
6238 && irel != internal_relocs)
6239 {
6240 unsigned long t_symndx = ELF32_R_SYM (irel[-1].r_info);
6241 unsigned long t_rtype = ELF32_R_TYPE (irel[-1].r_info);
6242 unsigned int tls_mask = 0;
6243
6244 /* The previous reloc should be one of R_PPC_TLSGD or
6245 R_PPC_TLSLD, or for older object files, a reloc
6246 on the __tls_get_addr arg setup insn. Get tls
6247 mask bits from the symbol on that reloc. */
6248 if (t_symndx < symtab_hdr->sh_info)
6249 {
6250 bfd_vma *local_got_offsets = elf_local_got_offsets (abfd);
6251
6252 if (local_got_offsets != NULL)
6253 {
6254 struct plt_entry **local_plt = (struct plt_entry **)
6255 (local_got_offsets + symtab_hdr->sh_info);
6256 char *lgot_masks = (char *)
6257 (local_plt + symtab_hdr->sh_info);
6258 tls_mask = lgot_masks[t_symndx];
6259 }
6260 }
6261 else
6262 {
6263 struct elf_link_hash_entry *th
6264 = elf_sym_hashes (abfd)[t_symndx - symtab_hdr->sh_info];
6265
6266 while (th->root.type == bfd_link_hash_indirect
6267 || th->root.type == bfd_link_hash_warning)
6268 th = (struct elf_link_hash_entry *) th->root.u.i.link;
6269
6270 tls_mask
6271 = ((struct ppc_elf_link_hash_entry *) th)->tls_mask;
6272 }
6273
6274 /* The mask bits tell us if the call will be
6275 optimised away. */
6276 if ((tls_mask & TLS_TLS) != 0 && (tls_mask & TLS_GD) == 0
6277 && (t_rtype == R_PPC_TLSGD
6278 || t_rtype == R_PPC_GOT_TLSGD16
6279 || t_rtype == R_PPC_GOT_TLSGD16_LO))
6280 continue;
6281 if ((tls_mask & TLS_TLS) != 0 && (tls_mask & TLS_LD) == 0
6282 && (t_rtype == R_PPC_TLSLD
6283 || t_rtype == R_PPC_GOT_TLSLD16
6284 || t_rtype == R_PPC_GOT_TLSLD16_LO))
6285 continue;
6286 }
6287
5446cbdf
AM
6288 sym_type = h->type;
6289 }
7619e7c7 6290
d3e454b9
AM
6291 if (r_type == R_PPC_ADDR16_HA)
6292 {
6293 if (h != NULL
6294 && !h->def_regular
6295 && h->protected_def
6296 && ppc_elf_hash_entry (h)->has_addr16_ha
6297 && ppc_elf_hash_entry (h)->has_addr16_lo)
6298 picfixup_size += 12;
6299 continue;
6300 }
6301
5446cbdf
AM
6302 /* The condition here under which we call find_plt_ent must
6303 match that in relocate_section. If we call find_plt_ent here
6304 but not in relocate_section, or vice versa, then the branch
6305 destination used here may be incorrect. */
6306 plist = NULL;
6307 if (h != NULL)
25dbc73a 6308 {
5446cbdf
AM
6309 /* We know is_branch_reloc (r_type) is true. */
6310 if (h->type == STT_GNU_IFUNC
6311 || r_type == R_PPC_PLTREL24)
6312 plist = &h->plt.plist;
25dbc73a 6313 }
5446cbdf
AM
6314 else if (sym_type == STT_GNU_IFUNC
6315 && elf_local_got_offsets (abfd) != NULL)
c8a1f254 6316 {
5446cbdf
AM
6317 bfd_vma *local_got_offsets = elf_local_got_offsets (abfd);
6318 struct plt_entry **local_plt = (struct plt_entry **)
6319 (local_got_offsets + symtab_hdr->sh_info);
6320 plist = local_plt + ELF32_R_SYM (irel->r_info);
c8a1f254 6321 }
5446cbdf 6322 if (plist != NULL)
a9585d22 6323 {
5446cbdf
AM
6324 bfd_vma addend = 0;
6325 struct plt_entry *ent;
6326
0e1862bb 6327 if (r_type == R_PPC_PLTREL24 && bfd_link_pic (link_info))
5446cbdf
AM
6328 addend = irel->r_addend;
6329 ent = find_plt_ent (plist, got2, addend);
6330 if (ent != NULL)
a9585d22 6331 {
5446cbdf
AM
6332 if (htab->plt_type == PLT_NEW
6333 || h == NULL
6334 || !htab->elf.dynamic_sections_created
6335 || h->dynindx == -1)
6336 {
6337 tsec = htab->glink;
6338 toff = ent->glink_offset;
6339 }
6340 else
6341 {
ce558b89 6342 tsec = htab->elf.splt;
5446cbdf
AM
6343 toff = ent->plt.offset;
6344 }
de972ffa
AM
6345 }
6346 }
de972ffa 6347
5446cbdf
AM
6348 /* If the branch and target are in the same section, you have
6349 no hope of adding stubs. We'll error out later should the
6350 branch overflow. */
6351 if (tsec == isec)
6352 continue;
25dbc73a 6353
49199304
AM
6354 /* toff is used for the symbol index when the symbol is
6355 undefined and we're doing a relocatable link, so we can't
6356 support addends. It would be possible to do so by
6357 putting the addend in one_branch_fixup but addends on
6358 branches are rare so it hardly seems worth supporting. */
6359 if (bfd_link_relocatable (link_info)
6360 && tsec == bfd_und_section_ptr
6361 && r_type != R_PPC_PLTREL24
6362 && irel->r_addend != 0)
6363 continue;
6364
5446cbdf
AM
6365 /* There probably isn't any reason to handle symbols in
6366 SEC_MERGE sections; SEC_MERGE doesn't seem a likely
6367 attribute for a code section, and we are only looking at
6368 branches. However, implement it correctly here as a
6369 reference for other target relax_section functions. */
6370 if (0 && tsec->sec_info_type == SEC_INFO_TYPE_MERGE)
6371 {
6372 /* At this stage in linking, no SEC_MERGE symbol has been
6373 adjusted, so all references to such symbols need to be
6374 passed through _bfd_merged_section_offset. (Later, in
6375 relocate_section, all SEC_MERGE symbols *except* for
6376 section symbols have been adjusted.)
6377
6378 gas may reduce relocations against symbols in SEC_MERGE
6379 sections to a relocation against the section symbol when
6380 the original addend was zero. When the reloc is against
6381 a section symbol we should include the addend in the
6382 offset passed to _bfd_merged_section_offset, since the
6383 location of interest is the original symbol. On the
6384 other hand, an access to "sym+addend" where "sym" is not
6385 a section symbol should not include the addend; Such an
6386 access is presumed to be an offset from "sym"; The
6387 location of interest is just "sym". */
49199304
AM
6388 if (sym_type == STT_SECTION
6389 && r_type != R_PPC_PLTREL24)
5446cbdf
AM
6390 toff += irel->r_addend;
6391
6392 toff
6393 = _bfd_merged_section_offset (abfd, &tsec,
6394 elf_section_data (tsec)->sec_info,
6395 toff);
6396
49199304
AM
6397 if (sym_type != STT_SECTION
6398 && r_type != R_PPC_PLTREL24)
5446cbdf
AM
6399 toff += irel->r_addend;
6400 }
6401 /* PLTREL24 addends are special. */
6402 else if (r_type != R_PPC_PLTREL24)
25dbc73a 6403 toff += irel->r_addend;
7619e7c7 6404
5446cbdf 6405 /* Attempted -shared link of non-pic code loses. */
0e1862bb 6406 if ((!bfd_link_relocatable (link_info)
5446cbdf
AM
6407 && tsec == bfd_und_section_ptr)
6408 || tsec->output_section == NULL
6409 || (tsec->owner != NULL
6410 && (tsec->owner->flags & BFD_PLUGIN) != 0))
6411 continue;
7619e7c7 6412
5446cbdf 6413 roff = irel->r_offset;
7de713b9 6414
49199304
AM
6415 /* Avoid creating a lot of unnecessary fixups when
6416 relocatable if the output section size is such that a
6417 fixup can be created at final link.
6418 The max_branch_offset adjustment allows for some number
6419 of other fixups being needed at final link. */
6420 if (bfd_link_relocatable (link_info)
6421 && (isec->output_section->rawsize - (isec->output_offset + roff)
6422 < max_branch_offset - (max_branch_offset >> 4)))
6423 continue;
6424
5446cbdf
AM
6425 /* If the branch is in range, no need to do anything. */
6426 if (tsec != bfd_und_section_ptr
0e1862bb 6427 && (!bfd_link_relocatable (link_info)
5446cbdf
AM
6428 /* A relocatable link may have sections moved during
6429 final link, so do not presume they remain in range. */
6430 || tsec->output_section == isec->output_section))
6431 {
6432 bfd_vma symaddr, reladdr;
7619e7c7 6433
5446cbdf
AM
6434 symaddr = tsec->output_section->vma + tsec->output_offset + toff;
6435 reladdr = isec->output_section->vma + isec->output_offset + roff;
6436 if (symaddr - reladdr + max_branch_offset
6437 < 2 * max_branch_offset)
6438 continue;
6439 }
01017ef8 6440
5446cbdf 6441 /* Look for an existing fixup to this address. */
d3e454b9 6442 for (f = branch_fixups; f ; f = f->next)
5446cbdf
AM
6443 if (f->tsec == tsec && f->toff == toff)
6444 break;
252b5132 6445
5446cbdf
AM
6446 if (f == NULL)
6447 {
6448 size_t size;
6449 unsigned long stub_rtype;
25dbc73a 6450
5446cbdf
AM
6451 val = trampoff - roff;
6452 if (val >= max_branch_offset)
6453 /* Oh dear, we can't reach a trampoline. Don't try to add
6454 one. We'll report an error later. */
6455 continue;
252b5132 6456
0e1862bb 6457 if (bfd_link_pic (link_info))
5446cbdf
AM
6458 {
6459 size = 4 * ARRAY_SIZE (shared_stub_entry);
6460 insn_offset = 12;
6461 }
6462 else
6463 {
6464 size = 4 * ARRAY_SIZE (stub_entry);
6465 insn_offset = 0;
6466 }
6467 stub_rtype = R_PPC_RELAX;
ce558b89 6468 if (tsec == htab->elf.splt
5446cbdf
AM
6469 || tsec == htab->glink)
6470 {
6471 stub_rtype = R_PPC_RELAX_PLT;
6472 if (r_type == R_PPC_PLTREL24)
6473 stub_rtype = R_PPC_RELAX_PLTREL24;
6474 }
252b5132 6475
5446cbdf
AM
6476 /* Hijack the old relocation. Since we need two
6477 relocations for this use a "composite" reloc. */
6478 irel->r_info = ELF32_R_INFO (ELF32_R_SYM (irel->r_info),
6479 stub_rtype);
6480 irel->r_offset = trampoff + insn_offset;
6481 if (r_type == R_PPC_PLTREL24
6482 && stub_rtype != R_PPC_RELAX_PLTREL24)
6483 irel->r_addend = 0;
6484
6485 /* Record the fixup so we don't do it again this section. */
6486 f = bfd_malloc (sizeof (*f));
d3e454b9 6487 f->next = branch_fixups;
5446cbdf
AM
6488 f->tsec = tsec;
6489 f->toff = toff;
6490 f->trampoff = trampoff;
d3e454b9 6491 branch_fixups = f;
5446cbdf
AM
6492
6493 trampoff += size;
6494 changes++;
25dbc73a
AM
6495 }
6496 else
6497 {
5446cbdf
AM
6498 val = f->trampoff - roff;
6499 if (val >= max_branch_offset)
6500 continue;
252b5132 6501
5446cbdf
AM
6502 /* Nop out the reloc, since we're finalizing things here. */
6503 irel->r_info = ELF32_R_INFO (0, R_PPC_NONE);
6504 }
252b5132 6505
5446cbdf
AM
6506 /* Get the section contents. */
6507 if (contents == NULL)
25dbc73a 6508 {
5446cbdf
AM
6509 /* Get cached copy if it exists. */
6510 if (elf_section_data (isec)->this_hdr.contents != NULL)
6511 contents = elf_section_data (isec)->this_hdr.contents;
25dbc73a 6512 /* Go get them off disk. */
5446cbdf 6513 else if (!bfd_malloc_and_get_section (abfd, isec, &contents))
25dbc73a
AM
6514 goto error_return;
6515 }
252b5132 6516
5446cbdf
AM
6517 /* Fix up the existing branch to hit the trampoline. */
6518 hit_addr = contents + roff;
6519 switch (r_type)
6520 {
6521 case R_PPC_REL24:
6522 case R_PPC_LOCAL24PC:
6523 case R_PPC_PLTREL24:
6524 t0 = bfd_get_32 (abfd, hit_addr);
6525 t0 &= ~0x3fffffc;
6526 t0 |= val & 0x3fffffc;
6527 bfd_put_32 (abfd, t0, hit_addr);
6528 break;
252b5132 6529
5446cbdf
AM
6530 case R_PPC_REL14:
6531 case R_PPC_REL14_BRTAKEN:
6532 case R_PPC_REL14_BRNTAKEN:
6533 t0 = bfd_get_32 (abfd, hit_addr);
6534 t0 &= ~0xfffc;
6535 t0 |= val & 0xfffc;
6536 bfd_put_32 (abfd, t0, hit_addr);
6537 break;
6538 }
25dbc73a 6539 }
252b5132 6540
d3e454b9 6541 while (branch_fixups != NULL)
25dbc73a 6542 {
d3e454b9
AM
6543 struct one_branch_fixup *f = branch_fixups;
6544 branch_fixups = branch_fixups->next;
25dbc73a
AM
6545 free (f);
6546 }
5446cbdf 6547 }
252b5132 6548
0a1b45a2 6549 workaround_change = false;
5446cbdf 6550 newsize = trampoff;
795bc6b3 6551 if (htab->params->ppc476_workaround
0e1862bb 6552 && (!bfd_link_relocatable (link_info)
795bc6b3 6553 || isec->output_section->alignment_power >= htab->params->pagesize_p2))
5446cbdf
AM
6554 {
6555 bfd_vma addr, end_addr;
6556 unsigned int crossings;
795bc6b3 6557 bfd_vma pagesize = (bfd_vma) 1 << htab->params->pagesize_p2;
5446cbdf
AM
6558
6559 addr = isec->output_section->vma + isec->output_offset;
6128f9cf 6560 end_addr = addr + trampoff;
5446cbdf 6561 addr &= -pagesize;
795bc6b3 6562 crossings = ((end_addr & -pagesize) - addr) >> htab->params->pagesize_p2;
5446cbdf
AM
6563 if (crossings != 0)
6564 {
6565 /* Keep space aligned, to ensure the patch code itself does
6566 not cross a page. Don't decrease size calculated on a
6567 previous pass as otherwise we might never settle on a layout. */
1e269e9b 6568 newsize = 15 - ((end_addr - 1) & 15);
5446cbdf
AM
6569 newsize += crossings * 16;
6570 if (relax_info->workaround_size < newsize)
6571 {
6572 relax_info->workaround_size = newsize;
0a1b45a2 6573 workaround_change = true;
5446cbdf
AM
6574 }
6575 /* Ensure relocate_section is called. */
6576 isec->flags |= SEC_RELOC;
6577 }
6578 newsize = trampoff + relax_info->workaround_size;
6579 }
6580
d3e454b9
AM
6581 if (htab->params->pic_fixup > 0)
6582 {
6583 picfixup_size -= relax_info->picfixup_size;
6584 if (picfixup_size != 0)
6585 relax_info->picfixup_size += picfixup_size;
6586 newsize += relax_info->picfixup_size;
6587 }
6588
6589 if (changes != 0 || picfixup_size != 0 || workaround_change)
5446cbdf
AM
6590 isec->size = newsize;
6591
25dbc73a
AM
6592 if (isymbuf != NULL
6593 && symtab_hdr->contents != (unsigned char *) isymbuf)
252b5132 6594 {
25dbc73a
AM
6595 if (! link_info->keep_memory)
6596 free (isymbuf);
252b5132 6597 else
25dbc73a
AM
6598 {
6599 /* Cache the symbols for elf_link_input_bfd. */
6600 symtab_hdr->contents = (unsigned char *) isymbuf;
6601 }
252b5132
RH
6602 }
6603
25dbc73a
AM
6604 if (contents != NULL
6605 && elf_section_data (isec)->this_hdr.contents != contents)
6606 {
53291d1f 6607 if (!changes && !link_info->keep_memory)
25dbc73a
AM
6608 free (contents);
6609 else
6610 {
6611 /* Cache the section contents for elf_link_input_bfd. */
6612 elf_section_data (isec)->this_hdr.contents = contents;
6613 }
6614 }
252b5132 6615
d3e454b9 6616 changes += picfixup_size;
9bc4e62b 6617 if (changes != 0)
25dbc73a 6618 {
9bc4e62b
NS
6619 /* Append sufficient NOP relocs so we can write out relocation
6620 information for the trampolines. */
d4730f92 6621 Elf_Internal_Shdr *rel_hdr;
9bc4e62b
NS
6622 Elf_Internal_Rela *new_relocs = bfd_malloc ((changes + isec->reloc_count)
6623 * sizeof (*new_relocs));
6624 unsigned ix;
5b914448 6625
9bc4e62b
NS
6626 if (!new_relocs)
6627 goto error_return;
6628 memcpy (new_relocs, internal_relocs,
6629 isec->reloc_count * sizeof (*new_relocs));
6630 for (ix = changes; ix--;)
6631 {
6632 irel = new_relocs + ix + isec->reloc_count;
6633
6634 irel->r_info = ELF32_R_INFO (0, R_PPC_NONE);
6635 }
6636 if (internal_relocs != elf_section_data (isec)->relocs)
25dbc73a 6637 free (internal_relocs);
9bc4e62b
NS
6638 elf_section_data (isec)->relocs = new_relocs;
6639 isec->reloc_count += changes;
d4730f92
BS
6640 rel_hdr = _bfd_elf_single_rel_hdr (isec);
6641 rel_hdr->sh_size += changes * rel_hdr->sh_entsize;
25dbc73a 6642 }
c9594989 6643 else if (elf_section_data (isec)->relocs != internal_relocs)
9bc4e62b 6644 free (internal_relocs);
252b5132 6645
5446cbdf 6646 *again = changes != 0 || workaround_change;
0a1b45a2 6647 return true;
25dbc73a
AM
6648
6649 error_return:
d3e454b9 6650 while (branch_fixups != NULL)
5446cbdf 6651 {
d3e454b9
AM
6652 struct one_branch_fixup *f = branch_fixups;
6653 branch_fixups = branch_fixups->next;
5446cbdf
AM
6654 free (f);
6655 }
c9594989 6656 if ((unsigned char *) isymbuf != symtab_hdr->contents)
25dbc73a 6657 free (isymbuf);
c9594989 6658 if (elf_section_data (isec)->this_hdr.contents != contents)
25dbc73a 6659 free (contents);
c9594989 6660 if (elf_section_data (isec)->relocs != internal_relocs)
25dbc73a 6661 free (internal_relocs);
0a1b45a2 6662 return false;
252b5132 6663}
252b5132 6664\f
8a696751
AM
6665/* What to do when ld finds relocations against symbols defined in
6666 discarded sections. */
6667
6668static unsigned int
6669ppc_elf_action_discarded (asection *sec)
6670{
6671 if (strcmp (".fixup", sec->name) == 0)
6672 return 0;
6673
6674 if (strcmp (".got2", sec->name) == 0)
6675 return 0;
6676
6677 return _bfd_elf_default_action_discarded (sec);
6678}
c9a2f333 6679\f
25dbc73a 6680/* Fill in the address for a pointer generated in a linker section. */
252b5132 6681
25dbc73a 6682static bfd_vma
76750a2f 6683elf_finish_pointer_linker_section (bfd *input_bfd,
25dbc73a
AM
6684 elf_linker_section_t *lsect,
6685 struct elf_link_hash_entry *h,
6686 bfd_vma relocation,
2bb04cf2 6687 const Elf_Internal_Rela *rel)
25dbc73a
AM
6688{
6689 elf_linker_section_pointers_t *linker_section_ptr;
252b5132 6690
25dbc73a 6691 BFD_ASSERT (lsect != NULL);
252b5132 6692
25dbc73a 6693 if (h != NULL)
252b5132 6694 {
25dbc73a
AM
6695 /* Handle global symbol. */
6696 struct ppc_elf_link_hash_entry *eh;
252b5132 6697
25dbc73a 6698 eh = (struct ppc_elf_link_hash_entry *) h;
76750a2f
AM
6699 BFD_ASSERT (eh->elf.def_regular);
6700 linker_section_ptr = eh->linker_section_pointer;
25dbc73a
AM
6701 }
6702 else
6703 {
6704 /* Handle local symbol. */
6705 unsigned long r_symndx = ELF32_R_SYM (rel->r_info);
76750a2f 6706
0c8d6e5c 6707 BFD_ASSERT (is_ppc_elf (input_bfd));
25dbc73a 6708 BFD_ASSERT (elf_local_ptr_offsets (input_bfd) != NULL);
76750a2f
AM
6709 linker_section_ptr = elf_local_ptr_offsets (input_bfd)[r_symndx];
6710 }
252b5132 6711
76750a2f
AM
6712 linker_section_ptr = elf_find_pointer_linker_section (linker_section_ptr,
6713 rel->r_addend,
6714 lsect);
6715 BFD_ASSERT (linker_section_ptr != NULL);
25dbc73a 6716
76750a2f
AM
6717 /* Offset will always be a multiple of four, so use the bottom bit
6718 as a "written" flag. */
6719 if ((linker_section_ptr->offset & 1) == 0)
6720 {
6721 bfd_put_32 (lsect->section->owner,
6722 relocation + linker_section_ptr->addend,
6723 lsect->section->contents + linker_section_ptr->offset);
6724 linker_section_ptr->offset += 1;
252b5132
RH
6725 }
6726
bd6c6e2b
AM
6727 relocation = (lsect->section->output_section->vma
6728 + lsect->section->output_offset
76750a2f 6729 + linker_section_ptr->offset - 1
bd6c6e2b 6730 - SYM_VAL (lsect->sym));
252b5132 6731
25dbc73a
AM
6732#ifdef DEBUG
6733 fprintf (stderr,
6734 "Finish pointer in linker section %s, offset = %ld (0x%lx)\n",
6735 lsect->name, (long) relocation, (long) relocation);
6736#endif
252b5132 6737
bd6c6e2b 6738 return relocation;
252b5132 6739}
25dbc73a 6740
e054468f
AM
6741#define PPC_LO(v) ((v) & 0xffff)
6742#define PPC_HI(v) (((v) >> 16) & 0xffff)
6743#define PPC_HA(v) PPC_HI ((v) + 0x8000)
6744
6745static void
9e390558
AM
6746write_glink_stub (struct elf_link_hash_entry *h, struct plt_entry *ent,
6747 asection *plt_sec, unsigned char *p,
e054468f
AM
6748 struct bfd_link_info *info)
6749{
6750 struct ppc_elf_link_hash_table *htab = ppc_elf_hash_table (info);
6751 bfd *output_bfd = info->output_bfd;
6752 bfd_vma plt;
9e390558
AM
6753 unsigned char *end = p + GLINK_ENTRY_SIZE (htab, h);
6754
6755 if (h != NULL
6756 && h == htab->tls_get_addr
6757 && !htab->params->no_tls_get_addr_opt)
6758 {
6759 bfd_put_32 (output_bfd, LWZ_11_3, p);
6760 p += 4;
6761 bfd_put_32 (output_bfd, LWZ_12_3 + 4, p);
6762 p += 4;
6763 bfd_put_32 (output_bfd, MR_0_3, p);
6764 p += 4;
6765 bfd_put_32 (output_bfd, CMPWI_11_0, p);
6766 p += 4;
6767 bfd_put_32 (output_bfd, ADD_3_12_2, p);
6768 p += 4;
6769 bfd_put_32 (output_bfd, BEQLR, p);
6770 p += 4;
6771 bfd_put_32 (output_bfd, MR_3_0, p);
6772 p += 4;
6773 bfd_put_32 (output_bfd, NOP, p);
6774 p += 4;
6775 }
e054468f
AM
6776
6777 plt = ((ent->plt.offset & ~1)
6778 + plt_sec->output_section->vma
6779 + plt_sec->output_offset);
e054468f 6780
0e1862bb 6781 if (bfd_link_pic (info))
e054468f
AM
6782 {
6783 bfd_vma got = 0;
6784
6785 if (ent->addend >= 32768)
6786 got = (ent->addend
6787 + ent->sec->output_section->vma
6788 + ent->sec->output_offset);
6789 else if (htab->elf.hgot != NULL)
6790 got = SYM_VAL (htab->elf.hgot);
6791
6792 plt -= got;
6793
6794 if (plt + 0x8000 < 0x10000)
9e390558 6795 bfd_put_32 (output_bfd, LWZ_11_30 + PPC_LO (plt), p);
e054468f
AM
6796 else
6797 {
6798 bfd_put_32 (output_bfd, ADDIS_11_30 + PPC_HA (plt), p);
6799 p += 4;
6800 bfd_put_32 (output_bfd, LWZ_11_11 + PPC_LO (plt), p);
e054468f
AM
6801 }
6802 }
6803 else
6804 {
6805 bfd_put_32 (output_bfd, LIS_11 + PPC_HA (plt), p);
6806 p += 4;
6807 bfd_put_32 (output_bfd, LWZ_11_11 + PPC_LO (plt), p);
9e390558
AM
6808 }
6809 p += 4;
6810 bfd_put_32 (output_bfd, MTCTR_11, p);
6811 p += 4;
407aa07c
AM
6812 bfd_put_32 (output_bfd, BCTR, p);
6813 p += 4;
9e390558
AM
6814 while (p < end)
6815 {
6816 bfd_put_32 (output_bfd, htab->params->ppc476_workaround ? BA : NOP, p);
e054468f
AM
6817 p += 4;
6818 }
6819}
6820
bd6c6e2b
AM
6821/* Return true if symbol is defined statically. */
6822
0a1b45a2 6823static bool
bd6c6e2b
AM
6824is_static_defined (struct elf_link_hash_entry *h)
6825{
6826 return ((h->root.type == bfd_link_hash_defined
6827 || h->root.type == bfd_link_hash_defweak)
6828 && h->root.u.def.section != NULL
6829 && h->root.u.def.section->output_section != NULL);
6830}
6831
2d0f3896
AM
6832/* If INSN is an opcode that may be used with an @tls operand, return
6833 the transformed insn for TLS optimisation, otherwise return 0. If
6834 REG is non-zero only match an insn with RB or RA equal to REG. */
6835
6836unsigned int
6837_bfd_elf_ppc_at_tls_transform (unsigned int insn, unsigned int reg)
6838{
6839 unsigned int rtra;
6840
2365f8d7 6841 if ((insn & (0x3fu << 26)) != 31 << 26)
2d0f3896
AM
6842 return 0;
6843
6844 if (reg == 0 || ((insn >> 11) & 0x1f) == reg)
6845 rtra = insn & ((1 << 26) - (1 << 16));
6846 else if (((insn >> 16) & 0x1f) == reg)
6847 rtra = (insn & (0x1f << 21)) | ((insn & (0x1f << 11)) << 5);
6848 else
6849 return 0;
6850
6851 if ((insn & (0x3ff << 1)) == 266 << 1)
6852 /* add -> addi. */
6853 insn = 14 << 26;
6854 else if ((insn & (0x1f << 1)) == 23 << 1
6855 && ((insn & (0x1f << 6)) < 14 << 6
6856 || ((insn & (0x1f << 6)) >= 16 << 6
6857 && (insn & (0x1f << 6)) < 24 << 6)))
6858 /* load and store indexed -> dform. */
2365f8d7 6859 insn = (32u | ((insn >> 6) & 0x1f)) << 26;
2d0f3896
AM
6860 else if ((insn & (((0x1a << 5) | 0x1f) << 1)) == 21 << 1)
6861 /* ldx, ldux, stdx, stdux -> ld, ldu, std, stdu. */
2365f8d7 6862 insn = ((58u | ((insn >> 6) & 4)) << 26) | ((insn >> 6) & 1);
2d0f3896
AM
6863 else if ((insn & (((0x1f << 5) | 0x1f) << 1)) == 341 << 1)
6864 /* lwax -> lwa. */
2365f8d7 6865 insn = (58u << 26) | 2;
2d0f3896
AM
6866 else
6867 return 0;
6868 insn |= rtra;
6869 return insn;
6870}
6871
766bc656
AM
6872/* If INSN is an opcode that may be used with an @tprel operand, return
6873 the transformed insn for an undefined weak symbol, ie. with the
6874 thread pointer REG operand removed. Otherwise return 0. */
6875
6876unsigned int
6877_bfd_elf_ppc_at_tprel_transform (unsigned int insn, unsigned int reg)
6878{
6879 if ((insn & (0x1f << 16)) == reg << 16
2365f8d7
AM
6880 && ((insn & (0x3fu << 26)) == 14u << 26 /* addi */
6881 || (insn & (0x3fu << 26)) == 15u << 26 /* addis */
6882 || (insn & (0x3fu << 26)) == 32u << 26 /* lwz */
6883 || (insn & (0x3fu << 26)) == 34u << 26 /* lbz */
6884 || (insn & (0x3fu << 26)) == 36u << 26 /* stw */
6885 || (insn & (0x3fu << 26)) == 38u << 26 /* stb */
6886 || (insn & (0x3fu << 26)) == 40u << 26 /* lhz */
6887 || (insn & (0x3fu << 26)) == 42u << 26 /* lha */
6888 || (insn & (0x3fu << 26)) == 44u << 26 /* sth */
6889 || (insn & (0x3fu << 26)) == 46u << 26 /* lmw */
6890 || (insn & (0x3fu << 26)) == 47u << 26 /* stmw */
6891 || (insn & (0x3fu << 26)) == 48u << 26 /* lfs */
6892 || (insn & (0x3fu << 26)) == 50u << 26 /* lfd */
6893 || (insn & (0x3fu << 26)) == 52u << 26 /* stfs */
6894 || (insn & (0x3fu << 26)) == 54u << 26 /* stfd */
6895 || ((insn & (0x3fu << 26)) == 58u << 26 /* lwa,ld,lmd */
766bc656 6896 && (insn & 3) != 1)
2365f8d7 6897 || ((insn & (0x3fu << 26)) == 62u << 26 /* std, stmd */
766bc656
AM
6898 && ((insn & 3) == 0 || (insn & 3) == 3))))
6899 {
6900 insn &= ~(0x1f << 16);
6901 }
6902 else if ((insn & (0x1f << 21)) == reg << 21
2365f8d7
AM
6903 && ((insn & (0x3eu << 26)) == 24u << 26 /* ori, oris */
6904 || (insn & (0x3eu << 26)) == 26u << 26 /* xori,xoris */
6905 || (insn & (0x3eu << 26)) == 28u << 26 /* andi,andis */))
766bc656
AM
6906 {
6907 insn &= ~(0x1f << 21);
6908 insn |= (insn & (0x1f << 16)) << 5;
2365f8d7 6909 if ((insn & (0x3eu << 26)) == 26u << 26 /* xori,xoris */)
766bc656
AM
6910 insn -= 2 >> 26; /* convert to ori,oris */
6911 }
6912 else
6913 insn = 0;
6914 return insn;
6915}
6916
0a1b45a2 6917static bool
1fe532cf
AM
6918is_insn_ds_form (unsigned int insn)
6919{
2365f8d7
AM
6920 return ((insn & (0x3fu << 26)) == 58u << 26 /* ld,ldu,lwa */
6921 || (insn & (0x3fu << 26)) == 62u << 26 /* std,stdu,stq */
6922 || (insn & (0x3fu << 26)) == 57u << 26 /* lfdp */
6923 || (insn & (0x3fu << 26)) == 61u << 26 /* stfdp */);
1fe532cf
AM
6924}
6925
0a1b45a2 6926static bool
1fe532cf
AM
6927is_insn_dq_form (unsigned int insn)
6928{
2365f8d7
AM
6929 return ((insn & (0x3fu << 26)) == 56u << 26 /* lq */
6930 || ((insn & (0x3fu << 26)) == (61u << 26) /* lxv, stxv */
a680de9a 6931 && (insn & 3) == 1));
1fe532cf
AM
6932}
6933
252b5132
RH
6934/* The RELOCATE_SECTION function is called by the ELF backend linker
6935 to handle the relocations for a section.
6936
6937 The relocs are always passed as Rela structures; if the section
6938 actually uses Rel structures, the r_addend field will always be
6939 zero.
6940
6941 This function is responsible for adjust the section contents as
6942 necessary, and (if using Rela relocs and generating a
1049f94e 6943 relocatable output file) adjusting the reloc addend as
252b5132
RH
6944 necessary.
6945
6946 This function does not have to worry about setting the reloc
6947 address or the reloc symbol index.
6948
6949 LOCAL_SYMS is a pointer to the swapped in local symbols.
6950
6951 LOCAL_SECTIONS is an array giving the section in the input file
6952 corresponding to the st_shndx field of each local symbol.
6953
6954 The global hash table entry for the global symbols can be found
6955 via elf_sym_hashes (input_bfd).
6956
1049f94e 6957 When generating relocatable output, this function must handle
252b5132
RH
6958 STB_LOCAL/STT_SECTION symbols specially. The output symbol is
6959 going to be the section symbol corresponding to the output
6960 section, which means that the addend must be adjusted
6961 accordingly. */
6962
0f684201 6963static int
55fd94b0
AM
6964ppc_elf_relocate_section (bfd *output_bfd,
6965 struct bfd_link_info *info,
6966 bfd *input_bfd,
6967 asection *input_section,
6968 bfd_byte *contents,
6969 Elf_Internal_Rela *relocs,
6970 Elf_Internal_Sym *local_syms,
6971 asection **local_sections)
252b5132 6972{
7619e7c7
AM
6973 Elf_Internal_Shdr *symtab_hdr;
6974 struct elf_link_hash_entry **sym_hashes;
6975 struct ppc_elf_link_hash_table *htab;
6976 Elf_Internal_Rela *rel;
c316a17c 6977 Elf_Internal_Rela *wrel;
7619e7c7
AM
6978 Elf_Internal_Rela *relend;
6979 Elf_Internal_Rela outrel;
f95f8542 6980 asection *got2;
252b5132 6981 bfd_vma *local_got_offsets;
0a1b45a2 6982 bool ret = true;
95f0d0d2 6983 bfd_vma d_offset = (bfd_big_endian (input_bfd) ? 2 : 0);
0a1b45a2 6984 bool is_vxworks_tls;
d3e454b9
AM
6985 unsigned int picfixup_size = 0;
6986 struct ppc_elf_relax_info *relax_info = NULL;
b34976b6 6987
252b5132 6988#ifdef DEBUG
871b3ab2 6989 _bfd_error_handler ("ppc_elf_relocate_section called for %pB section %pA, "
d003868e
AM
6990 "%ld relocations%s",
6991 input_bfd, input_section,
6992 (long) input_section->reloc_count,
0e1862bb 6993 (bfd_link_relocatable (info)) ? " (relocatable)" : "");
252b5132
RH
6994#endif
6995
7af5d5c4
AM
6996 if (!is_ppc_elf (input_bfd))
6997 {
6998 bfd_set_error (bfd_error_wrong_format);
0a1b45a2 6999 return false;
7af5d5c4
AM
7000 }
7001
a6aa5195
AM
7002 got2 = bfd_get_section_by_name (input_bfd, ".got2");
7003
e47cd125 7004 /* Initialize howto table if not already done. */
8da6118f 7005 if (!ppc_elf_howto_table[R_PPC_ADDR32])
252b5132
RH
7006 ppc_elf_howto_init ();
7007
7619e7c7 7008 htab = ppc_elf_hash_table (info);
252b5132 7009 local_got_offsets = elf_local_got_offsets (input_bfd);
0ffa91dd 7010 symtab_hdr = &elf_symtab_hdr (input_bfd);
7619e7c7 7011 sym_hashes = elf_sym_hashes (input_bfd);
3348747a
NS
7012 /* We have to handle relocations in vxworks .tls_vars sections
7013 specially, because the dynamic loader is 'weird'. */
90c14f0c 7014 is_vxworks_tls = (htab->elf.target_os == is_vxworks && bfd_link_pic (info)
3348747a
NS
7015 && !strcmp (input_section->output_section->name,
7016 ".tls_vars"));
d3e454b9
AM
7017 if (input_section->sec_info_type == SEC_INFO_TYPE_TARGET)
7018 relax_info = elf_section_data (input_section)->sec_info;
c316a17c 7019 rel = wrel = relocs;
7619e7c7 7020 relend = relocs + input_section->reloc_count;
c316a17c 7021 for (; rel < relend; wrel++, rel++)
252b5132 7022 {
7619e7c7
AM
7023 enum elf_ppc_reloc_type r_type;
7024 bfd_vma addend;
7025 bfd_reloc_status_type r;
7026 Elf_Internal_Sym *sym;
7027 asection *sec;
7028 struct elf_link_hash_entry *h;
7029 const char *sym_name;
252b5132
RH
7030 reloc_howto_type *howto;
7031 unsigned long r_symndx;
7032 bfd_vma relocation;
91d6fa6a 7033 bfd_vma branch_bit, from;
0a1b45a2
AM
7034 bool unresolved_reloc, save_unresolved_reloc;
7035 bool warned;
7619e7c7 7036 unsigned int tls_type, tls_mask, tls_gd;
08be3224 7037 struct plt_entry **ifunc, **plt_list;
86c95733 7038 struct reloc_howto_struct alt_howto;
7619e7c7 7039
c316a17c 7040 again:
55fd94b0
AM
7041 r_type = ELF32_R_TYPE (rel->r_info);
7042 sym = NULL;
7043 sec = NULL;
7044 h = NULL;
0a1b45a2
AM
7045 unresolved_reloc = false;
7046 warned = false;
252b5132 7047 r_symndx = ELF32_R_SYM (rel->r_info);
560e09e9 7048
252b5132
RH
7049 if (r_symndx < symtab_hdr->sh_info)
7050 {
7051 sym = local_syms + r_symndx;
7052 sec = local_sections[r_symndx];
26c61ae5 7053 sym_name = bfd_elf_sym_name (input_bfd, symtab_hdr, sym, sec);
252b5132 7054
8517fae7 7055 relocation = _bfd_elf_rela_local_sym (output_bfd, sym, &sec, rel);
252b5132
RH
7056 }
7057 else
7058 {
0a1b45a2 7059 bool ignored;
62d887d4 7060
b2a8e766
AM
7061 RELOC_FOR_GLOBAL_SYMBOL (info, input_bfd, input_section, rel,
7062 r_symndx, symtab_hdr, sym_hashes,
7063 h, sec, relocation,
62d887d4 7064 unresolved_reloc, warned, ignored);
9abc968f 7065
252b5132 7066 sym_name = h->root.root.string;
7619e7c7
AM
7067 }
7068
dbaa2011 7069 if (sec != NULL && discarded_section (sec))
ab96bf03
AM
7070 {
7071 /* For relocs against symbols from removed linkonce sections,
7072 or sections discarded by a linker script, we just want the
7073 section contents zeroed. Avoid any special processing. */
7074 howto = NULL;
7075 if (r_type < R_PPC_max)
7076 howto = ppc_elf_howto_table[r_type];
c316a17c
AM
7077
7078 _bfd_clear_contents (howto, input_bfd, input_section,
0930cb30 7079 contents, rel->r_offset);
c316a17c
AM
7080 wrel->r_offset = rel->r_offset;
7081 wrel->r_info = 0;
7082 wrel->r_addend = 0;
7083
7084 /* For ld -r, remove relocations in debug sections against
dcd2b8a0 7085 symbols defined in discarded sections. Not done for
c316a17c
AM
7086 non-debug to preserve relocs in .eh_frame which the
7087 eh_frame editing code expects to be present. */
7088 if (bfd_link_relocatable (info)
7089 && (input_section->flags & SEC_DEBUGGING))
7090 wrel--;
7091
7092 continue;
ab96bf03
AM
7093 }
7094
0e1862bb 7095 if (bfd_link_relocatable (info))
ab96bf03
AM
7096 {
7097 if (got2 != NULL
7098 && r_type == R_PPC_PLTREL24
f75e0e33 7099 && rel->r_addend != 0)
ab96bf03
AM
7100 {
7101 /* R_PPC_PLTREL24 is rather special. If non-zero, the
7102 addend specifies the GOT pointer offset within .got2. */
7103 rel->r_addend += got2->output_offset;
7104 }
53291d1f
AM
7105 if (r_type != R_PPC_RELAX_PLT
7106 && r_type != R_PPC_RELAX_PLTREL24
7107 && r_type != R_PPC_RELAX)
c316a17c 7108 goto copy_reloc;
ab96bf03
AM
7109 }
7110
7619e7c7
AM
7111 /* TLS optimizations. Replace instruction sequences and relocs
7112 based on information we collected in tls_optimize. We edit
7113 RELOCS so that --emit-relocs will output something sensible
7114 for the final instruction stream. */
7115 tls_mask = 0;
7116 tls_gd = 0;
727fc41e
AM
7117 if (h != NULL)
7118 tls_mask = ((struct ppc_elf_link_hash_entry *) h)->tls_mask;
7119 else if (local_got_offsets != NULL)
7619e7c7 7120 {
e054468f 7121 struct plt_entry **local_plt;
727fc41e 7122 char *lgot_masks;
e054468f
AM
7123 local_plt
7124 = (struct plt_entry **) (local_got_offsets + symtab_hdr->sh_info);
7125 lgot_masks = (char *) (local_plt + symtab_hdr->sh_info);
727fc41e 7126 tls_mask = lgot_masks[r_symndx];
7619e7c7
AM
7127 }
7128
7129 /* Ensure reloc mapping code below stays sane. */
7130 if ((R_PPC_GOT_TLSLD16 & 3) != (R_PPC_GOT_TLSGD16 & 3)
7131 || (R_PPC_GOT_TLSLD16_LO & 3) != (R_PPC_GOT_TLSGD16_LO & 3)
7132 || (R_PPC_GOT_TLSLD16_HI & 3) != (R_PPC_GOT_TLSGD16_HI & 3)
7133 || (R_PPC_GOT_TLSLD16_HA & 3) != (R_PPC_GOT_TLSGD16_HA & 3)
7134 || (R_PPC_GOT_TLSLD16 & 3) != (R_PPC_GOT_TPREL16 & 3)
7135 || (R_PPC_GOT_TLSLD16_LO & 3) != (R_PPC_GOT_TPREL16_LO & 3)
7136 || (R_PPC_GOT_TLSLD16_HI & 3) != (R_PPC_GOT_TPREL16_HI & 3)
7137 || (R_PPC_GOT_TLSLD16_HA & 3) != (R_PPC_GOT_TPREL16_HA & 3))
7138 abort ();
7139 switch (r_type)
7140 {
7141 default:
7142 break;
7143
7144 case R_PPC_GOT_TPREL16:
7145 case R_PPC_GOT_TPREL16_LO:
e054468f 7146 if ((tls_mask & TLS_TLS) != 0
e7776f52
AM
7147 && (tls_mask & TLS_TPREL) == 0
7148 && offset_in_range (input_section, rel->r_offset - d_offset, 4))
7619e7c7
AM
7149 {
7150 bfd_vma insn;
91d6fa6a 7151
95f0d0d2 7152 insn = bfd_get_32 (input_bfd,
c316a17c 7153 contents + rel->r_offset - d_offset);
7619e7c7
AM
7154 insn &= 31 << 21;
7155 insn |= 0x3c020000; /* addis 0,2,0 */
95f0d0d2 7156 bfd_put_32 (input_bfd, insn,
c316a17c 7157 contents + rel->r_offset - d_offset);
7619e7c7
AM
7158 r_type = R_PPC_TPREL16_HA;
7159 rel->r_info = ELF32_R_INFO (r_symndx, r_type);
7160 }
7161 break;
7162
7163 case R_PPC_TLS:
e054468f 7164 if ((tls_mask & TLS_TLS) != 0
e7776f52
AM
7165 && (tls_mask & TLS_TPREL) == 0
7166 && offset_in_range (input_section, rel->r_offset, 4))
7619e7c7 7167 {
2d0f3896
AM
7168 bfd_vma insn;
7169
95f0d0d2 7170 insn = bfd_get_32 (input_bfd, contents + rel->r_offset);
2d0f3896
AM
7171 insn = _bfd_elf_ppc_at_tls_transform (insn, 2);
7172 if (insn == 0)
7619e7c7 7173 abort ();
95f0d0d2 7174 bfd_put_32 (input_bfd, insn, contents + rel->r_offset);
7619e7c7
AM
7175 r_type = R_PPC_TPREL16_LO;
7176 rel->r_info = ELF32_R_INFO (r_symndx, r_type);
4fe5ca5b 7177
7619e7c7 7178 /* Was PPC_TLS which sits on insn boundary, now
4fe5ca5b
GM
7179 PPC_TPREL16_LO which is at low-order half-word. */
7180 rel->r_offset += d_offset;
7619e7c7
AM
7181 }
7182 break;
7183
7184 case R_PPC_GOT_TLSGD16_HI:
7185 case R_PPC_GOT_TLSGD16_HA:
b00a0a86 7186 tls_gd = TLS_GDIE;
e7776f52
AM
7187 if ((tls_mask & TLS_TLS) != 0 && (tls_mask & TLS_GD) == 0
7188 && offset_in_range (input_section, rel->r_offset - d_offset, 4))
7619e7c7
AM
7189 goto tls_gdld_hi;
7190 break;
7191
7192 case R_PPC_GOT_TLSLD16_HI:
7193 case R_PPC_GOT_TLSLD16_HA:
e7776f52
AM
7194 if ((tls_mask & TLS_TLS) != 0 && (tls_mask & TLS_LD) == 0
7195 && offset_in_range (input_section, rel->r_offset - d_offset, 4))
7619e7c7
AM
7196 {
7197 tls_gdld_hi:
7198 if ((tls_mask & tls_gd) != 0)
7199 r_type = (((r_type - (R_PPC_GOT_TLSGD16 & 3)) & 3)
7200 + R_PPC_GOT_TPREL16);
7201 else
7202 {
4fe5ca5b 7203 rel->r_offset -= d_offset;
95f0d0d2 7204 bfd_put_32 (input_bfd, NOP, contents + rel->r_offset);
7619e7c7
AM
7205 r_type = R_PPC_NONE;
7206 }
7207 rel->r_info = ELF32_R_INFO (r_symndx, r_type);
7208 }
7209 break;
7210
7211 case R_PPC_GOT_TLSGD16:
7212 case R_PPC_GOT_TLSGD16_LO:
b00a0a86 7213 tls_gd = TLS_GDIE;
e7776f52
AM
7214 if ((tls_mask & TLS_TLS) != 0 && (tls_mask & TLS_GD) == 0
7215 && offset_in_range (input_section, rel->r_offset - d_offset, 4))
b7fcf6f6 7216 goto tls_ldgd_opt;
7619e7c7
AM
7217 break;
7218
7219 case R_PPC_GOT_TLSLD16:
7220 case R_PPC_GOT_TLSLD16_LO:
e7776f52
AM
7221 if ((tls_mask & TLS_TLS) != 0 && (tls_mask & TLS_LD) == 0
7222 && offset_in_range (input_section, rel->r_offset - d_offset, 4))
7619e7c7 7223 {
3a71aa26 7224 unsigned int insn1, insn2;
b7fcf6f6 7225 bfd_vma offset;
7619e7c7 7226
b7fcf6f6 7227 tls_ldgd_opt:
727fc41e
AM
7228 offset = (bfd_vma) -1;
7229 /* If not using the newer R_PPC_TLSGD/LD to mark
7230 __tls_get_addr calls, we must trust that the call
7231 stays with its arg setup insns, ie. that the next
7232 reloc is the __tls_get_addr call associated with
7233 the current reloc. Edit both insns. */
9737e8af 7234 if (input_section->nomark_tls_get_addr
727fc41e
AM
7235 && rel + 1 < relend
7236 && branch_reloc_hash_match (input_bfd, rel + 1,
7237 htab->tls_get_addr))
7238 offset = rel[1].r_offset;
b86ac8e3
AM
7239 /* We read the low GOT_TLS insn because we need to keep
7240 the destination reg. It may be something other than
7241 the usual r3, and moved to r3 before the call by
7242 intervening code. */
95f0d0d2 7243 insn1 = bfd_get_32 (input_bfd,
b86ac8e3 7244 contents + rel->r_offset - d_offset);
b7fcf6f6
AM
7245 if ((tls_mask & tls_gd) != 0)
7246 {
7247 /* IE */
b86ac8e3 7248 insn1 &= (0x1f << 21) | (0x1f << 16);
2365f8d7 7249 insn1 |= 32u << 26; /* lwz */
e7776f52
AM
7250 if (offset != (bfd_vma) -1
7251 && offset_in_range (input_section, offset, 4))
727fc41e 7252 {
f58d5a2d 7253 rel[1].r_info = ELF32_R_INFO (STN_UNDEF, R_PPC_NONE);
727fc41e 7254 insn2 = 0x7c631214; /* add 3,3,2 */
95f0d0d2 7255 bfd_put_32 (input_bfd, insn2, contents + offset);
727fc41e 7256 }
b7fcf6f6
AM
7257 r_type = (((r_type - (R_PPC_GOT_TLSGD16 & 3)) & 3)
7258 + R_PPC_GOT_TPREL16);
7259 rel->r_info = ELF32_R_INFO (r_symndx, r_type);
7260 }
7261 else
7262 {
7263 /* LE */
b86ac8e3
AM
7264 insn1 &= 0x1f << 21;
7265 insn1 |= 0x3c020000; /* addis r,2,0 */
7619e7c7
AM
7266 if (tls_gd == 0)
7267 {
b7fcf6f6 7268 /* Was an LD reloc. */
1d483afe
AM
7269 for (r_symndx = 0;
7270 r_symndx < symtab_hdr->sh_info;
7271 r_symndx++)
7272 if (local_sections[r_symndx] == sec)
7273 break;
7274 if (r_symndx >= symtab_hdr->sh_info)
cf35638d 7275 r_symndx = STN_UNDEF;
b7fcf6f6 7276 rel->r_addend = htab->elf.tls_sec->vma + DTP_OFFSET;
cf35638d 7277 if (r_symndx != STN_UNDEF)
1d483afe
AM
7278 rel->r_addend -= (local_syms[r_symndx].st_value
7279 + sec->output_offset
7280 + sec->output_section->vma);
7619e7c7 7281 }
b7fcf6f6
AM
7282 r_type = R_PPC_TPREL16_HA;
7283 rel->r_info = ELF32_R_INFO (r_symndx, r_type);
e7776f52
AM
7284 if (offset != (bfd_vma) -1
7285 && offset_in_range (input_section, offset, 4))
727fc41e
AM
7286 {
7287 rel[1].r_info = ELF32_R_INFO (r_symndx, R_PPC_TPREL16_LO);
7288 rel[1].r_offset = offset + d_offset;
7289 rel[1].r_addend = rel->r_addend;
7290 insn2 = 0x38630000; /* addi 3,3,0 */
95f0d0d2 7291 bfd_put_32 (input_bfd, insn2, contents + offset);
727fc41e 7292 }
b7fcf6f6 7293 }
95f0d0d2 7294 bfd_put_32 (input_bfd, insn1,
b7fcf6f6 7295 contents + rel->r_offset - d_offset);
b7fcf6f6
AM
7296 if (tls_gd == 0)
7297 {
7298 /* We changed the symbol on an LD reloc. Start over
7299 in order to get h, sym, sec etc. right. */
c316a17c 7300 goto again;
7619e7c7 7301 }
252b5132 7302 }
7619e7c7 7303 break;
727fc41e
AM
7304
7305 case R_PPC_TLSGD:
675e2809 7306 if ((tls_mask & TLS_TLS) != 0 && (tls_mask & TLS_GD) == 0
e7776f52
AM
7307 && rel + 1 < relend
7308 && offset_in_range (input_section, rel->r_offset, 4))
727fc41e
AM
7309 {
7310 unsigned int insn2;
7311 bfd_vma offset = rel->r_offset;
7312
23cedd1d
AM
7313 if (is_plt_seq_reloc (ELF32_R_TYPE (rel[1].r_info)))
7314 {
7315 bfd_put_32 (input_bfd, NOP, contents + offset);
7316 rel[1].r_info = ELF32_R_INFO (STN_UNDEF, R_PPC_NONE);
7317 break;
7318 }
7319
b00a0a86 7320 if ((tls_mask & TLS_GDIE) != 0)
727fc41e
AM
7321 {
7322 /* IE */
7323 r_type = R_PPC_NONE;
7324 insn2 = 0x7c631214; /* add 3,3,2 */
7325 }
7326 else
7327 {
7328 /* LE */
7329 r_type = R_PPC_TPREL16_LO;
7330 rel->r_offset += d_offset;
7331 insn2 = 0x38630000; /* addi 3,3,0 */
7332 }
7333 rel->r_info = ELF32_R_INFO (r_symndx, r_type);
95f0d0d2 7334 bfd_put_32 (input_bfd, insn2, contents + offset);
727fc41e
AM
7335 /* Zap the reloc on the _tls_get_addr call too. */
7336 BFD_ASSERT (offset == rel[1].r_offset);
f58d5a2d 7337 rel[1].r_info = ELF32_R_INFO (STN_UNDEF, R_PPC_NONE);
727fc41e
AM
7338 }
7339 break;
7340
7341 case R_PPC_TLSLD:
675e2809 7342 if ((tls_mask & TLS_TLS) != 0 && (tls_mask & TLS_LD) == 0
e7776f52
AM
7343 && rel + 1 < relend
7344 && offset_in_range (input_section, rel->r_offset, 4))
727fc41e
AM
7345 {
7346 unsigned int insn2;
7347
23cedd1d
AM
7348 if (is_plt_seq_reloc (ELF32_R_TYPE (rel[1].r_info)))
7349 {
7350 bfd_put_32 (input_bfd, NOP, contents + rel->r_offset);
7351 rel[1].r_info = ELF32_R_INFO (STN_UNDEF, R_PPC_NONE);
7352 break;
7353 }
7354
727fc41e
AM
7355 for (r_symndx = 0;
7356 r_symndx < symtab_hdr->sh_info;
7357 r_symndx++)
7358 if (local_sections[r_symndx] == sec)
7359 break;
7360 if (r_symndx >= symtab_hdr->sh_info)
cf35638d 7361 r_symndx = STN_UNDEF;
727fc41e 7362 rel->r_addend = htab->elf.tls_sec->vma + DTP_OFFSET;
cf35638d 7363 if (r_symndx != STN_UNDEF)
727fc41e
AM
7364 rel->r_addend -= (local_syms[r_symndx].st_value
7365 + sec->output_offset
7366 + sec->output_section->vma);
7367
7368 rel->r_info = ELF32_R_INFO (r_symndx, R_PPC_TPREL16_LO);
7369 rel->r_offset += d_offset;
7370 insn2 = 0x38630000; /* addi 3,3,0 */
95f0d0d2 7371 bfd_put_32 (input_bfd, insn2,
727fc41e
AM
7372 contents + rel->r_offset - d_offset);
7373 /* Zap the reloc on the _tls_get_addr call too. */
7374 BFD_ASSERT (rel->r_offset - d_offset == rel[1].r_offset);
f58d5a2d 7375 rel[1].r_info = ELF32_R_INFO (STN_UNDEF, R_PPC_NONE);
c316a17c 7376 goto again;
727fc41e
AM
7377 }
7378 break;
7619e7c7
AM
7379 }
7380
7381 /* Handle other relocations that tweak non-addend part of insn. */
7382 branch_bit = 0;
7383 switch (r_type)
7384 {
7385 default:
7386 break;
7387
7388 /* Branch taken prediction relocations. */
7389 case R_PPC_ADDR14_BRTAKEN:
7390 case R_PPC_REL14_BRTAKEN:
7391 branch_bit = BRANCH_PREDICT_BIT;
1a0670f3 7392 /* Fall through. */
7619e7c7 7393
4cc11e76 7394 /* Branch not taken prediction relocations. */
7619e7c7
AM
7395 case R_PPC_ADDR14_BRNTAKEN:
7396 case R_PPC_REL14_BRNTAKEN:
e7776f52
AM
7397 if (offset_in_range (input_section, rel->r_offset, 4))
7398 {
7399 unsigned int insn;
7619e7c7 7400
e7776f52
AM
7401 insn = bfd_get_32 (input_bfd, contents + rel->r_offset);
7402 insn &= ~BRANCH_PREDICT_BIT;
7403 insn |= branch_bit;
7619e7c7 7404
e7776f52
AM
7405 from = (rel->r_offset
7406 + input_section->output_offset
7407 + input_section->output_section->vma);
7619e7c7 7408
e7776f52
AM
7409 /* Invert 'y' bit if not the default. */
7410 if ((bfd_signed_vma) (relocation + rel->r_addend - from) < 0)
7411 insn ^= BRANCH_PREDICT_BIT;
91d6fa6a 7412
e7776f52
AM
7413 bfd_put_32 (input_bfd, insn, contents + rel->r_offset);
7414 }
08be3224
AM
7415 break;
7416
7417 case R_PPC_PLT16_HA:
e7776f52
AM
7418 if (offset_in_range (input_section, rel->r_offset - d_offset, 4))
7419 {
7420 unsigned int insn;
08be3224 7421
e7776f52
AM
7422 insn = bfd_get_32 (input_bfd,
7423 contents + rel->r_offset - d_offset);
7424 if ((insn & (0x3fu << 26)) == 15u << 26
7425 && (insn & (0x1f << 16)) != 0)
7426 {
7427 if (!bfd_link_pic (info))
7428 {
7429 /* Convert addis to lis. */
7430 insn &= ~(0x1f << 16);
7431 bfd_put_32 (input_bfd, insn,
7432 contents + rel->r_offset - d_offset);
7433 }
7434 }
7435 else if (bfd_link_pic (info))
7436 info->callbacks->einfo
7437 (_("%P: %H: error: %s with unexpected instruction %x\n"),
7438 input_bfd, input_section, rel->r_offset,
7439 "R_PPC_PLT16_HA", insn);
7440 }
08be3224 7441 break;
252b5132
RH
7442 }
7443
d3e454b9
AM
7444 if (ELIMINATE_COPY_RELOCS
7445 && h != NULL
7446 && !h->def_regular
7447 && h->protected_def
7448 && ppc_elf_hash_entry (h)->has_addr16_ha
7449 && ppc_elf_hash_entry (h)->has_addr16_lo
7450 && htab->params->pic_fixup > 0)
7451 {
7452 /* Convert lis;addi or lis;load/store accessing a protected
7453 variable defined in a shared library to PIC. */
7454 unsigned int insn;
7455
e7776f52
AM
7456 if (r_type == R_PPC_ADDR16_HA
7457 && offset_in_range (input_section, rel->r_offset - d_offset, 4))
d3e454b9 7458 {
95f0d0d2 7459 insn = bfd_get_32 (input_bfd,
d3e454b9 7460 contents + rel->r_offset - d_offset);
2365f8d7 7461 if ((insn & (0x3fu << 26)) == (15u << 26)
d3e454b9
AM
7462 && (insn & (0x1f << 16)) == 0 /* lis */)
7463 {
7464 bfd_byte *p;
7465 bfd_vma off;
7466 bfd_vma got_addr;
7467
7468 p = (contents + input_section->size
7469 - relax_info->workaround_size
7470 - relax_info->picfixup_size
7471 + picfixup_size);
7472 off = (p - contents) - (rel->r_offset - d_offset);
7473 if (off > 0x1fffffc || (off & 3) != 0)
7474 info->callbacks->einfo
174d0a74 7475 (_("%H: fixup branch overflow\n"),
d3e454b9
AM
7476 input_bfd, input_section, rel->r_offset);
7477
95f0d0d2 7478 bfd_put_32 (input_bfd, B | off,
d3e454b9 7479 contents + rel->r_offset - d_offset);
ce558b89
AM
7480 got_addr = (htab->elf.sgot->output_section->vma
7481 + htab->elf.sgot->output_offset
d3e454b9 7482 + (h->got.offset & ~1));
c316a17c
AM
7483 wrel->r_offset = (p - contents) + d_offset;
7484 wrel->r_info = ELF32_R_INFO (0, R_PPC_ADDR16_HA);
7485 wrel->r_addend = got_addr;
d3e454b9 7486 insn &= ~0xffff;
4aef7643 7487 insn |= ((unsigned int) (got_addr + 0x8000) >> 16) & 0xffff;
95f0d0d2 7488 bfd_put_32 (input_bfd, insn, p);
d3e454b9
AM
7489
7490 /* Convert lis to lwz, loading address from GOT. */
7491 insn &= ~0xffff;
7492 insn ^= (32u ^ 15u) << 26;
7493 insn |= (insn & (0x1f << 21)) >> 5;
7494 insn |= got_addr & 0xffff;
95f0d0d2 7495 bfd_put_32 (input_bfd, insn, p + 4);
d3e454b9 7496
95f0d0d2 7497 bfd_put_32 (input_bfd, B | ((-4 - off) & 0x3ffffff), p + 8);
d3e454b9
AM
7498 picfixup_size += 12;
7499
7500 /* Use one of the spare relocs, so --emit-relocs
7501 output is reasonable. */
7502 memmove (rel + 1, rel, (relend - rel - 1) * sizeof (*rel));
c316a17c
AM
7503 wrel++, rel++;
7504 rel->r_offset = wrel[-1].r_offset + 4;
d3e454b9 7505 rel->r_info = ELF32_R_INFO (0, R_PPC_ADDR16_LO);
c316a17c 7506 rel->r_addend = wrel[-1].r_addend;
d3e454b9
AM
7507
7508 /* Continue on as if we had a got reloc, to output
7509 dynamic reloc. */
7510 r_type = R_PPC_GOT16_LO;
7511 }
7512 else
2c4d9cbe 7513 _bfd_error_handler
695344c0 7514 /* xgettext:c-format */
2dcf00ce
AM
7515 (_("%pB(%pA+%#" PRIx64 "): error: "
7516 "%s with unexpected instruction %#x"),
7517 input_bfd, input_section, (uint64_t) rel->r_offset,
d3e454b9
AM
7518 "R_PPC_ADDR16_HA", insn);
7519 }
e7776f52
AM
7520 else if (r_type == R_PPC_ADDR16_LO
7521 && offset_in_range (input_section,
7522 rel->r_offset - d_offset, 4))
d3e454b9 7523 {
95f0d0d2 7524 insn = bfd_get_32 (input_bfd,
d3e454b9 7525 contents + rel->r_offset - d_offset);
2365f8d7
AM
7526 if ((insn & (0x3fu << 26)) == 14u << 26 /* addi */
7527 || (insn & (0x3fu << 26)) == 32u << 26 /* lwz */
7528 || (insn & (0x3fu << 26)) == 34u << 26 /* lbz */
7529 || (insn & (0x3fu << 26)) == 36u << 26 /* stw */
7530 || (insn & (0x3fu << 26)) == 38u << 26 /* stb */
7531 || (insn & (0x3fu << 26)) == 40u << 26 /* lhz */
7532 || (insn & (0x3fu << 26)) == 42u << 26 /* lha */
7533 || (insn & (0x3fu << 26)) == 44u << 26 /* sth */
7534 || (insn & (0x3fu << 26)) == 46u << 26 /* lmw */
7535 || (insn & (0x3fu << 26)) == 47u << 26 /* stmw */
7536 || (insn & (0x3fu << 26)) == 48u << 26 /* lfs */
7537 || (insn & (0x3fu << 26)) == 50u << 26 /* lfd */
7538 || (insn & (0x3fu << 26)) == 52u << 26 /* stfs */
7539 || (insn & (0x3fu << 26)) == 54u << 26 /* stfd */
7540 || ((insn & (0x3fu << 26)) == 58u << 26 /* lwa,ld,lmd */
d3e454b9 7541 && (insn & 3) != 1)
2365f8d7 7542 || ((insn & (0x3fu << 26)) == 62u << 26 /* std, stmd */
d3e454b9
AM
7543 && ((insn & 3) == 0 || (insn & 3) == 3)))
7544 {
7545 /* Arrange to apply the reloc addend, if any. */
7546 relocation = 0;
0a1b45a2 7547 unresolved_reloc = false;
d3e454b9
AM
7548 rel->r_info = ELF32_R_INFO (0, r_type);
7549 }
7550 else
2c4d9cbe 7551 _bfd_error_handler
695344c0 7552 /* xgettext:c-format */
2dcf00ce
AM
7553 (_("%pB(%pA+%#" PRIx64 "): error: "
7554 "%s with unexpected instruction %#x"),
7555 input_bfd, input_section, (uint64_t) rel->r_offset,
d3e454b9
AM
7556 "R_PPC_ADDR16_LO", insn);
7557 }
7558 }
7559
e054468f 7560 ifunc = NULL;
90c14f0c 7561 if (htab->elf.target_os != is_vxworks)
e054468f 7562 {
de972ffa
AM
7563 struct plt_entry *ent;
7564
e054468f
AM
7565 if (h != NULL)
7566 {
7567 if (h->type == STT_GNU_IFUNC)
7568 ifunc = &h->plt.plist;
7569 }
de972ffa
AM
7570 else if (local_got_offsets != NULL
7571 && ELF_ST_TYPE (sym->st_info) == STT_GNU_IFUNC)
e054468f 7572 {
de972ffa 7573 struct plt_entry **local_plt;
e054468f 7574
de972ffa
AM
7575 local_plt = (struct plt_entry **) (local_got_offsets
7576 + symtab_hdr->sh_info);
7577 ifunc = local_plt + r_symndx;
e054468f 7578 }
e054468f 7579
de972ffa
AM
7580 ent = NULL;
7581 if (ifunc != NULL
0e1862bb 7582 && (!bfd_link_pic (info)
08be3224
AM
7583 || is_branch_reloc (r_type)
7584 || r_type == R_PPC_PLT16_LO
7585 || r_type == R_PPC_PLT16_HI
7586 || r_type == R_PPC_PLT16_HA))
de972ffa
AM
7587 {
7588 addend = 0;
08be3224
AM
7589 if (bfd_link_pic (info)
7590 && (r_type == R_PPC_PLTREL24
7591 || r_type == R_PPC_PLT16_LO
7592 || r_type == R_PPC_PLT16_HI
7593 || r_type == R_PPC_PLT16_HA))
de972ffa
AM
7594 addend = rel->r_addend;
7595 ent = find_plt_ent (ifunc, got2, addend);
7596 }
7597 if (ent != NULL)
7598 {
888a7fc3
AM
7599 if (bfd_link_pic (info)
7600 && ent->sec != got2
7601 && htab->plt_type != PLT_NEW
7602 && (!htab->elf.dynamic_sections_created
7603 || h == NULL
7604 || h->dynindx == -1))
7605 {
7606 /* Uh oh, we are going to create a pic glink stub
7607 for an ifunc (here for h == NULL and later in
7608 finish_dynamic_symbol for h != NULL), and
7609 apparently are using code compiled with
7610 -mbss-plt. The difficulty is that -mbss-plt code
7611 gives no indication via a magic PLTREL24 addend
7612 whether r30 is equal to _GLOBAL_OFFSET_TABLE_ or
7613 is pointing into a .got2 section (and how far
7614 into .got2). */
7615 info->callbacks->einfo
695344c0 7616 /* xgettext:c-format */
174d0a74 7617 (_("%X%H: unsupported bss-plt -fPIC ifunc %s\n"),
888a7fc3
AM
7618 input_bfd, input_section, rel->r_offset, sym_name);
7619 }
e054468f 7620
0a1b45a2 7621 unresolved_reloc = false;
e054468f
AM
7622 if (htab->plt_type == PLT_NEW
7623 || !htab->elf.dynamic_sections_created
c7e17e05
AM
7624 || h == NULL
7625 || h->dynindx == -1)
e054468f
AM
7626 relocation = (htab->glink->output_section->vma
7627 + htab->glink->output_offset
7628 + (ent->glink_offset & ~1));
7629 else
ce558b89
AM
7630 relocation = (htab->elf.splt->output_section->vma
7631 + htab->elf.splt->output_offset
e054468f
AM
7632 + ent->plt.offset);
7633 }
7634 }
7635
7619e7c7 7636 addend = rel->r_addend;
23cedd1d 7637 save_unresolved_reloc = unresolved_reloc;
7619e7c7 7638 howto = NULL;
55fd94b0
AM
7639 if (r_type < R_PPC_max)
7640 howto = ppc_elf_howto_table[r_type];
9a23f96e 7641
9a23f96e 7642 tls_type = 0;
7619e7c7 7643 switch (r_type)
252b5132
RH
7644 {
7645 default:
e7776f52
AM
7646 de_fault:
7647 if (howto)
7648 /* xgettext:c-format */
7649 _bfd_error_handler (_("%pB: %s unsupported"),
7650 input_bfd, howto->name);
7651 else
7652 /* xgettext:c-format */
7653 _bfd_error_handler (_("%pB: reloc %#x unsupported"),
7654 input_bfd, r_type);
252b5132
RH
7655
7656 bfd_set_error (bfd_error_bad_value);
0a1b45a2 7657 ret = false;
c316a17c 7658 goto copy_reloc;
252b5132 7659
7619e7c7
AM
7660 case R_PPC_NONE:
7661 case R_PPC_TLS:
727fc41e
AM
7662 case R_PPC_TLSGD:
7663 case R_PPC_TLSLD:
7619e7c7
AM
7664 case R_PPC_EMB_MRKREF:
7665 case R_PPC_GNU_VTINHERIT:
7666 case R_PPC_GNU_VTENTRY:
c316a17c 7667 goto copy_reloc;
7595d193 7668
7619e7c7
AM
7669 /* GOT16 relocations. Like an ADDR16 using the symbol's
7670 address in the GOT as relocation value instead of the
7671 symbol's value itself. Also, create a GOT entry for the
7672 symbol and put the symbol value there. */
7673 case R_PPC_GOT_TLSGD16:
7674 case R_PPC_GOT_TLSGD16_LO:
7675 case R_PPC_GOT_TLSGD16_HI:
7676 case R_PPC_GOT_TLSGD16_HA:
7677 tls_type = TLS_TLS | TLS_GD;
7678 goto dogot;
7679
7680 case R_PPC_GOT_TLSLD16:
7681 case R_PPC_GOT_TLSLD16_LO:
7682 case R_PPC_GOT_TLSLD16_HI:
7683 case R_PPC_GOT_TLSLD16_HA:
7684 tls_type = TLS_TLS | TLS_LD;
7685 goto dogot;
7686
7687 case R_PPC_GOT_TPREL16:
7688 case R_PPC_GOT_TPREL16_LO:
7689 case R_PPC_GOT_TPREL16_HI:
7690 case R_PPC_GOT_TPREL16_HA:
7691 tls_type = TLS_TLS | TLS_TPREL;
7692 goto dogot;
7693
7694 case R_PPC_GOT_DTPREL16:
7695 case R_PPC_GOT_DTPREL16_LO:
7696 case R_PPC_GOT_DTPREL16_HI:
7697 case R_PPC_GOT_DTPREL16_HA:
7698 tls_type = TLS_TLS | TLS_DTPREL;
7699 goto dogot;
7700
7701 case R_PPC_GOT16:
7702 case R_PPC_GOT16_LO:
7703 case R_PPC_GOT16_HI:
7704 case R_PPC_GOT16_HA:
727fc41e 7705 tls_mask = 0;
7619e7c7
AM
7706 dogot:
7707 {
7708 /* Relocation is to the entry for this symbol in the global
7709 offset table. */
7710 bfd_vma off;
7711 bfd_vma *offp;
7712 unsigned long indx;
7713
ce558b89 7714 if (htab->elf.sgot == NULL)
7619e7c7
AM
7715 abort ();
7716
7717 indx = 0;
7718 if (tls_type == (TLS_TLS | TLS_LD)
f749f26e 7719 && SYMBOL_REFERENCES_LOCAL (info, h))
7619e7c7
AM
7720 offp = &htab->tlsld_got.offset;
7721 else if (h != NULL)
7722 {
f0158f44
AM
7723 if (!htab->elf.dynamic_sections_created
7724 || h->dynindx == -1
7725 || SYMBOL_REFERENCES_LOCAL (info, h)
21d68fcd 7726 || UNDEFWEAK_NO_DYNAMIC_RELOC (info, h))
7619e7c7
AM
7727 /* This is actually a static link, or it is a
7728 -Bsymbolic link and the symbol is defined
7729 locally, or the symbol was forced to be local
7730 because of a version file. */
7731 ;
7732 else
7733 {
7734 indx = h->dynindx;
0a1b45a2 7735 unresolved_reloc = false;
7619e7c7
AM
7736 }
7737 offp = &h->got.offset;
7738 }
7739 else
7740 {
7741 if (local_got_offsets == NULL)
7742 abort ();
7743 offp = &local_got_offsets[r_symndx];
7744 }
7745
7746 /* The offset must always be a multiple of 4. We use the
7747 least significant bit to record whether we have already
7748 processed this entry. */
7749 off = *offp;
7750 if ((off & 1) != 0)
7751 off &= ~1;
7752 else
7753 {
37da22e5
AM
7754 unsigned int tls_m = ((tls_mask & TLS_TLS) != 0
7755 ? tls_mask & (TLS_LD | TLS_GD | TLS_DTPREL
b00a0a86 7756 | TLS_TPREL | TLS_GDIE)
37da22e5 7757 : 0);
70bccea4
AM
7758
7759 if (offp == &htab->tlsld_got.offset)
7760 tls_m = TLS_LD;
f749f26e
AM
7761 else if ((tls_m & TLS_LD) != 0
7762 && SYMBOL_REFERENCES_LOCAL (info, h))
70bccea4
AM
7763 tls_m &= ~TLS_LD;
7764
7765 /* We might have multiple got entries for this sym.
7766 Initialize them all. */
7767 do
7619e7c7 7768 {
70bccea4
AM
7769 int tls_ty = 0;
7770
7771 if ((tls_m & TLS_LD) != 0)
7619e7c7 7772 {
70bccea4
AM
7773 tls_ty = TLS_TLS | TLS_LD;
7774 tls_m &= ~TLS_LD;
7775 }
7776 else if ((tls_m & TLS_GD) != 0)
7777 {
7778 tls_ty = TLS_TLS | TLS_GD;
7779 tls_m &= ~TLS_GD;
7780 }
7781 else if ((tls_m & TLS_DTPREL) != 0)
7782 {
7783 tls_ty = TLS_TLS | TLS_DTPREL;
7784 tls_m &= ~TLS_DTPREL;
7785 }
b00a0a86 7786 else if ((tls_m & (TLS_TPREL | TLS_GDIE)) != 0)
70bccea4
AM
7787 {
7788 tls_ty = TLS_TLS | TLS_TPREL;
7789 tls_m = 0;
7619e7c7 7790 }
7619e7c7 7791
70bccea4 7792 /* Generate relocs for the dynamic linker. */
f0158f44
AM
7793 if (indx != 0
7794 || (bfd_link_pic (info)
7795 && (h == NULL
f749f26e
AM
7796 || !UNDEFWEAK_NO_DYNAMIC_RELOC (info, h))
7797 && !(tls_ty != 0
f15d0b54
AM
7798 && bfd_link_executable (info)
7799 && SYMBOL_REFERENCES_LOCAL (info, h))))
7619e7c7 7800 {
ce558b89 7801 asection *rsec = htab->elf.srelgot;
91d6fa6a 7802 bfd_byte * loc;
91e21fb7 7803
0bed072f 7804 if (ifunc != NULL)
82e66161
AM
7805 {
7806 rsec = htab->elf.irelplt;
7807 if (indx == 0)
7808 htab->local_ifunc_resolver = 1;
7809 else if (is_static_defined (h))
7810 htab->maybe_local_ifunc_resolver = 1;
7811 }
ce558b89
AM
7812 outrel.r_offset = (htab->elf.sgot->output_section->vma
7813 + htab->elf.sgot->output_offset
70bccea4 7814 + off);
e515b051 7815 outrel.r_addend = 0;
70bccea4
AM
7816 if (tls_ty & (TLS_LD | TLS_GD))
7817 {
7818 outrel.r_info = ELF32_R_INFO (indx, R_PPC_DTPMOD32);
70bccea4
AM
7819 if (tls_ty == (TLS_TLS | TLS_GD))
7820 {
25f23106
AM
7821 loc = rsec->contents;
7822 loc += (rsec->reloc_count++
70bccea4
AM
7823 * sizeof (Elf32_External_Rela));
7824 bfd_elf32_swap_reloca_out (output_bfd,
7825 &outrel, loc);
e515b051 7826 outrel.r_offset += 4;
70bccea4
AM
7827 outrel.r_info
7828 = ELF32_R_INFO (indx, R_PPC_DTPREL32);
70bccea4
AM
7829 }
7830 }
7831 else if (tls_ty == (TLS_TLS | TLS_DTPREL))
7832 outrel.r_info = ELF32_R_INFO (indx, R_PPC_DTPREL32);
7833 else if (tls_ty == (TLS_TLS | TLS_TPREL))
7834 outrel.r_info = ELF32_R_INFO (indx, R_PPC_TPREL32);
25f23106 7835 else if (indx != 0)
70bccea4 7836 outrel.r_info = ELF32_R_INFO (indx, R_PPC_GLOB_DAT);
25f23106
AM
7837 else if (ifunc != NULL)
7838 outrel.r_info = ELF32_R_INFO (0, R_PPC_IRELATIVE);
7839 else
7840 outrel.r_info = ELF32_R_INFO (0, R_PPC_RELATIVE);
d6e14abc 7841 if (indx == 0 && tls_ty != (TLS_TLS | TLS_LD))
e515b051
AM
7842 {
7843 outrel.r_addend += relocation;
7844 if (tls_ty & (TLS_GD | TLS_DTPREL | TLS_TPREL))
989f9879
AM
7845 {
7846 if (htab->elf.tls_sec == NULL)
7847 outrel.r_addend = 0;
7848 else
7849 outrel.r_addend -= htab->elf.tls_sec->vma;
7850 }
e515b051 7851 }
25f23106
AM
7852 loc = rsec->contents;
7853 loc += (rsec->reloc_count++
70bccea4
AM
7854 * sizeof (Elf32_External_Rela));
7855 bfd_elf32_swap_reloca_out (output_bfd, &outrel, loc);
7619e7c7
AM
7856 }
7857
70bccea4
AM
7858 /* Init the .got section contents if we're not
7859 emitting a reloc. */
7860 else
7619e7c7 7861 {
70bccea4
AM
7862 bfd_vma value = relocation;
7863
f0158f44 7864 if (tls_ty != 0)
70bccea4 7865 {
989f9879
AM
7866 if (htab->elf.tls_sec == NULL)
7867 value = 0;
7868 else
7869 {
f0158f44
AM
7870 if (tls_ty & TLS_LD)
7871 value = 0;
7872 else
7873 value -= htab->elf.tls_sec->vma + DTP_OFFSET;
676ee2b5 7874 if (tls_ty & TLS_TPREL)
989f9879
AM
7875 value += DTP_OFFSET - TP_OFFSET;
7876 }
70bccea4 7877
f0158f44 7878 if (tls_ty & (TLS_LD | TLS_GD))
7b609f53 7879 {
95f0d0d2 7880 bfd_put_32 (input_bfd, value,
ce558b89 7881 htab->elf.sgot->contents + off + 4);
676ee2b5 7882 value = 1;
7b609f53 7883 }
70bccea4 7884 }
95f0d0d2 7885 bfd_put_32 (input_bfd, value,
ce558b89 7886 htab->elf.sgot->contents + off);
7619e7c7 7887 }
70bccea4
AM
7888
7889 off += 4;
7890 if (tls_ty & (TLS_LD | TLS_GD))
7891 off += 4;
7619e7c7 7892 }
70bccea4
AM
7893 while (tls_m != 0);
7894
7895 off = *offp;
7896 *offp = off | 1;
7619e7c7
AM
7897 }
7898
7899 if (off >= (bfd_vma) -2)
7900 abort ();
7901
70bccea4
AM
7902 if ((tls_type & TLS_TLS) != 0)
7903 {
7904 if (tls_type != (TLS_TLS | TLS_LD))
7905 {
7906 if ((tls_mask & TLS_LD) != 0
f749f26e 7907 && !SYMBOL_REFERENCES_LOCAL (info, h))
70bccea4
AM
7908 off += 8;
7909 if (tls_type != (TLS_TLS | TLS_GD))
7910 {
7911 if ((tls_mask & TLS_GD) != 0)
7912 off += 8;
7913 if (tls_type != (TLS_TLS | TLS_DTPREL))
7914 {
7915 if ((tls_mask & TLS_DTPREL) != 0)
7916 off += 4;
7917 }
7918 }
7919 }
7920 }
7921
d3e454b9
AM
7922 /* If here for a picfixup, we're done. */
7923 if (r_type != ELF32_R_TYPE (rel->r_info))
c316a17c 7924 goto copy_reloc;
d3e454b9 7925
ce558b89
AM
7926 relocation = (htab->elf.sgot->output_section->vma
7927 + htab->elf.sgot->output_offset
e87d4038
AM
7928 + off
7929 - SYM_VAL (htab->elf.hgot));
7619e7c7
AM
7930
7931 /* Addends on got relocations don't make much sense.
7932 x+off@got is actually x@got+off, and since the got is
7933 generated by a hash table traversal, the value in the
7934 got at entry m+n bears little relation to the entry m. */
7935 if (addend != 0)
25f53a85 7936 info->callbacks->einfo
695344c0 7937 /* xgettext:c-format */
174d0a74 7938 (_("%H: non-zero addend on %s reloc against `%s'\n"),
25f53a85 7939 input_bfd, input_section, rel->r_offset,
7b609f53 7940 howto->name,
7619e7c7
AM
7941 sym_name);
7942 }
86c95733 7943 break;
7619e7c7 7944
86c95733 7945 /* Relocations that need no special processing. */
7619e7c7 7946 case R_PPC_LOCAL24PC:
252b5132
RH
7947 /* It makes no sense to point a local relocation
7948 at a symbol not in this object. */
7b609f53 7949 if (unresolved_reloc)
252b5132 7950 {
1a72702b
AM
7951 (*info->callbacks->undefined_symbol) (info,
7952 h->root.root.string,
7953 input_bfd,
7954 input_section,
7955 rel->r_offset,
0a1b45a2 7956 true);
c316a17c 7957 goto copy_reloc;
252b5132 7958 }
888a7fc3
AM
7959 if (h != NULL && h->type == STT_GNU_IFUNC && bfd_link_pic (info))
7960 {
7961 /* @local on an ifunc does not really make sense since
7962 the ifunc resolver can take you anywhere. More
7963 seriously, calls to ifuncs must go through a plt call
7964 stub, and for pic the plt call stubs uses r30 to
7965 access the PLT. The problem is that a call that is
7966 local won't have the +32k reloc addend trick marking
7967 -fPIC code, so the linker won't know whether r30 is
7968 _GLOBAL_OFFSET_TABLE_ or pointing into a .got2 section. */
695344c0 7969 /* xgettext:c-format */
174d0a74 7970 info->callbacks->einfo (_("%X%H: @local call to ifunc %s\n"),
888a7fc3
AM
7971 input_bfd, input_section, rel->r_offset,
7972 h->root.root.string);
7973 }
252b5132
RH
7974 break;
7975
7619e7c7
AM
7976 case R_PPC_DTPREL16:
7977 case R_PPC_DTPREL16_LO:
7978 case R_PPC_DTPREL16_HI:
7979 case R_PPC_DTPREL16_HA:
989f9879
AM
7980 if (htab->elf.tls_sec != NULL)
7981 addend -= htab->elf.tls_sec->vma + DTP_OFFSET;
7619e7c7
AM
7982 break;
7983
70bccea4
AM
7984 /* Relocations that may need to be propagated if this is a shared
7985 object. */
7619e7c7
AM
7986 case R_PPC_TPREL16:
7987 case R_PPC_TPREL16_LO:
7988 case R_PPC_TPREL16_HI:
7989 case R_PPC_TPREL16_HA:
766bc656
AM
7990 if (h != NULL
7991 && h->root.type == bfd_link_hash_undefweak
e7776f52
AM
7992 && h->dynindx == -1
7993 && offset_in_range (input_section, rel->r_offset - d_offset, 4))
766bc656
AM
7994 {
7995 /* Make this relocation against an undefined weak symbol
7996 resolve to zero. This is really just a tweak, since
7997 code using weak externs ought to check that they are
7998 defined before using them. */
7999 bfd_byte *p = contents + rel->r_offset - d_offset;
95f0d0d2 8000 unsigned int insn = bfd_get_32 (input_bfd, p);
766bc656
AM
8001 insn = _bfd_elf_ppc_at_tprel_transform (insn, 2);
8002 if (insn != 0)
95f0d0d2 8003 bfd_put_32 (input_bfd, insn, p);
766bc656
AM
8004 break;
8005 }
989f9879
AM
8006 if (htab->elf.tls_sec != NULL)
8007 addend -= htab->elf.tls_sec->vma + TP_OFFSET;
7619e7c7 8008 /* The TPREL16 relocs shouldn't really be used in shared
7c8bbca5
AM
8009 libs or with non-local symbols as that will result in
8010 DT_TEXTREL being set, but support them anyway. */
7619e7c7
AM
8011 goto dodyn;
8012
8013 case R_PPC_TPREL32:
989f9879
AM
8014 if (htab->elf.tls_sec != NULL)
8015 addend -= htab->elf.tls_sec->vma + TP_OFFSET;
7619e7c7
AM
8016 goto dodyn;
8017
8018 case R_PPC_DTPREL32:
989f9879
AM
8019 if (htab->elf.tls_sec != NULL)
8020 addend -= htab->elf.tls_sec->vma + DTP_OFFSET;
7619e7c7
AM
8021 goto dodyn;
8022
e515b051
AM
8023 case R_PPC_DTPMOD32:
8024 relocation = 1;
8025 addend = 0;
8026 goto dodyn;
8027
d7128ce4
AM
8028 case R_PPC_REL16:
8029 case R_PPC_REL16_LO:
8030 case R_PPC_REL16_HI:
8031 case R_PPC_REL16_HA:
a680de9a 8032 case R_PPC_REL16DX_HA:
d7128ce4
AM
8033 break;
8034
7619e7c7 8035 case R_PPC_REL32:
625af618
AM
8036 if (h == NULL || h == htab->elf.hgot)
8037 break;
8038 /* fall through */
8039
8040 case R_PPC_ADDR32:
8041 case R_PPC_ADDR16:
8042 case R_PPC_ADDR16_LO:
8043 case R_PPC_ADDR16_HI:
8044 case R_PPC_ADDR16_HA:
8045 case R_PPC_UADDR32:
8046 case R_PPC_UADDR16:
8047 goto dodyn;
8048
b9c361e0
JL
8049 case R_PPC_VLE_REL8:
8050 case R_PPC_VLE_REL15:
8051 case R_PPC_VLE_REL24:
625af618 8052 case R_PPC_REL24:
7619e7c7
AM
8053 case R_PPC_REL14:
8054 case R_PPC_REL14_BRTAKEN:
8055 case R_PPC_REL14_BRNTAKEN:
252b5132
RH
8056 /* If these relocations are not to a named symbol, they can be
8057 handled right here, no need to bother the dynamic linker. */
89200bf8 8058 if (SYMBOL_CALLS_LOCAL (info, h)
3b36f7e6 8059 || h == htab->elf.hgot)
252b5132 8060 break;
70bccea4 8061 /* fall through */
252b5132 8062
7619e7c7 8063 case R_PPC_ADDR24:
7619e7c7
AM
8064 case R_PPC_ADDR14:
8065 case R_PPC_ADDR14_BRTAKEN:
8066 case R_PPC_ADDR14_BRNTAKEN:
0e1862bb 8067 if (h != NULL && !bfd_link_pic (info))
625af618
AM
8068 break;
8069 /* fall through */
8070
7619e7c7 8071 dodyn:
3348747a
NS
8072 if ((input_section->flags & SEC_ALLOC) == 0
8073 || is_vxworks_tls)
c87b5a93 8074 break;
c87b5a93 8075
287c7eaf
AM
8076 if (bfd_link_pic (info)
8077 ? ((h == NULL
190eb1dd 8078 || h->dyn_relocs != NULL)
287c7eaf
AM
8079 && ((h != NULL && pc_dynrelocs (h))
8080 || must_be_dyn_reloc (info, r_type)))
8081 : (h != NULL
190eb1dd 8082 && h->dyn_relocs != NULL))
252b5132 8083 {
0bb2d96a 8084 int skip;
f95f8542
AM
8085 bfd_byte *loc;
8086 asection *sreloc;
82e66161
AM
8087 long indx = 0;
8088
252b5132 8089#ifdef DEBUG
55fd94b0
AM
8090 fprintf (stderr, "ppc_elf_relocate_section needs to "
8091 "create relocation for %s\n",
70bccea4
AM
8092 (h && h->root.root.string
8093 ? h->root.root.string : "<unknown>"));
252b5132
RH
8094#endif
8095
8096 /* When generating a shared object, these relocations
70bccea4
AM
8097 are copied into the output file to be resolved at run
8098 time. */
0bb2d96a 8099 skip = 0;
5b914448
AM
8100 outrel.r_offset = _bfd_elf_section_offset (output_bfd, info,
8101 input_section,
8102 rel->r_offset);
0bb2d96a
JJ
8103 if (outrel.r_offset == (bfd_vma) -1
8104 || outrel.r_offset == (bfd_vma) -2)
8105 skip = (int) outrel.r_offset;
252b5132
RH
8106 outrel.r_offset += (input_section->output_section->vma
8107 + input_section->output_offset);
8108
63f6e94f
AM
8109 /* Optimize unaligned reloc use. */
8110 if ((r_type == R_PPC_ADDR32 && (outrel.r_offset & 3) != 0)
8111 || (r_type == R_PPC_UADDR32 && (outrel.r_offset & 3) == 0))
8112 r_type ^= R_PPC_ADDR32 ^ R_PPC_UADDR32;
8113 if ((r_type == R_PPC_ADDR16 && (outrel.r_offset & 1) != 0)
8114 || (r_type == R_PPC_UADDR16 && (outrel.r_offset & 1) == 0))
8115 r_type ^= R_PPC_ADDR16 ^ R_PPC_UADDR16;
8116
252b5132
RH
8117 if (skip)
8118 memset (&outrel, 0, sizeof outrel);
21d68fcd 8119 else if (!SYMBOL_REFERENCES_LOCAL (info, h))
252b5132 8120 {
82e66161
AM
8121 indx = h->dynindx;
8122 BFD_ASSERT (indx != -1);
0a1b45a2 8123 unresolved_reloc = false;
82e66161 8124 outrel.r_info = ELF32_R_INFO (indx, r_type);
252b5132
RH
8125 outrel.r_addend = rel->r_addend;
8126 }
8127 else
8128 {
47388f4c
AM
8129 outrel.r_addend = relocation + rel->r_addend;
8130
25f23106 8131 if (r_type != R_PPC_ADDR32)
252b5132 8132 {
25f23106
AM
8133 if (ifunc != NULL)
8134 {
8135 /* If we get here when building a static
8136 executable, then the libc startup function
8137 responsible for applying indirect function
8138 relocations is going to complain about
8139 the reloc type.
8140 If we get here when building a dynamic
8141 executable, it will be because we have
8142 a text relocation. The dynamic loader
8143 will set the text segment writable and
8144 non-executable to apply text relocations.
8145 So we'll segfault when trying to run the
8146 indirection function to resolve the reloc. */
25f53a85 8147 info->callbacks->einfo
695344c0 8148 /* xgettext:c-format */
174d0a74 8149 (_("%H: relocation %s for indirect "
25f53a85
AM
8150 "function %s unsupported\n"),
8151 input_bfd, input_section, rel->r_offset,
25f23106
AM
8152 howto->name,
8153 sym_name);
0a1b45a2 8154 ret = false;
25f23106 8155 }
cf35638d 8156 else if (r_symndx == STN_UNDEF || bfd_is_abs_section (sec))
89200bf8 8157 ;
252b5132
RH
8158 else if (sec == NULL || sec->owner == NULL)
8159 {
8160 bfd_set_error (bfd_error_bad_value);
0a1b45a2 8161 ret = false;
252b5132
RH
8162 }
8163 else
8164 {
8165 asection *osec;
8166
47388f4c
AM
8167 /* We are turning this relocation into one
8168 against a section symbol. It would be
8169 proper to subtract the symbol's value,
8170 osec->vma, from the emitted reloc addend,
25f23106
AM
8171 but ld.so expects buggy relocs.
8172 FIXME: Why not always use a zero index? */
252b5132 8173 osec = sec->output_section;
f26a3287
AM
8174 if ((osec->flags & SEC_THREAD_LOCAL) != 0)
8175 {
8176 osec = htab->elf.tls_sec;
8177 indx = 0;
8178 }
8179 else
74541ad4 8180 {
74541ad4 8181 indx = elf_section_data (osec)->dynindx;
f26a3287
AM
8182 if (indx == 0)
8183 {
8184 osec = htab->elf.text_index_section;
8185 indx = elf_section_data (osec)->dynindx;
8186 }
8187 BFD_ASSERT (indx != 0);
74541ad4 8188 }
f26a3287
AM
8189
8190 /* ld.so doesn't expect buggy TLS relocs.
8191 Don't leave the symbol value in the
8192 addend for them. */
8193 if (IS_PPC_TLS_RELOC (r_type))
8194 outrel.r_addend -= osec->vma;
252b5132
RH
8195 }
8196
8197 outrel.r_info = ELF32_R_INFO (indx, r_type);
252b5132 8198 }
25f23106
AM
8199 else if (ifunc != NULL)
8200 outrel.r_info = ELF32_R_INFO (0, R_PPC_IRELATIVE);
8201 else
8202 outrel.r_info = ELF32_R_INFO (0, R_PPC_RELATIVE);
252b5132
RH
8203 }
8204
82e66161
AM
8205 sreloc = elf_section_data (input_section)->sreloc;
8206 if (ifunc)
8207 {
8208 sreloc = htab->elf.irelplt;
8209 if (indx == 0)
8210 htab->local_ifunc_resolver = 1;
8211 else if (is_static_defined (h))
8212 htab->maybe_local_ifunc_resolver = 1;
8213 }
8214 if (sreloc == NULL)
0a1b45a2 8215 return false;
82e66161 8216
947216bf
AM
8217 loc = sreloc->contents;
8218 loc += sreloc->reloc_count++ * sizeof (Elf32_External_Rela);
8219 bfd_elf32_swap_reloca_out (output_bfd, &outrel, loc);
252b5132 8220
2243deae 8221 if (skip == -1)
c316a17c 8222 goto copy_reloc;
2243deae 8223
f0158f44
AM
8224 /* This reloc will be computed at runtime. Clear the memory
8225 so that it contains a predictable value for prelink. */
8226 if (!skip)
2243deae
L
8227 {
8228 relocation = howto->pc_relative ? outrel.r_offset : 0;
8229 addend = 0;
8230 break;
8231 }
252b5132 8232 }
252b5132
RH
8233 break;
8234
32af9f6e
AM
8235 case R_PPC_RELAX_PLT:
8236 case R_PPC_RELAX_PLTREL24:
de972ffa
AM
8237 if (h != NULL)
8238 {
32af9f6e
AM
8239 struct plt_entry *ent;
8240 bfd_vma got2_addend = 0;
8241
8242 if (r_type == R_PPC_RELAX_PLTREL24)
8243 {
0e1862bb 8244 if (bfd_link_pic (info))
32af9f6e
AM
8245 got2_addend = addend;
8246 addend = 0;
8247 }
8248 ent = find_plt_ent (&h->plt.plist, got2, got2_addend);
de972ffa
AM
8249 if (htab->plt_type == PLT_NEW)
8250 relocation = (htab->glink->output_section->vma
8251 + htab->glink->output_offset
8252 + ent->glink_offset);
8253 else
ce558b89
AM
8254 relocation = (htab->elf.splt->output_section->vma
8255 + htab->elf.splt->output_offset
de972ffa
AM
8256 + ent->plt.offset);
8257 }
1a0670f3 8258 /* Fall through. */
b4a38de6 8259
32af9f6e 8260 case R_PPC_RELAX:
e7776f52
AM
8261 if (bfd_link_pic (info)
8262 ? offset_in_range (input_section, rel->r_offset - 12,
8263 ARRAY_SIZE (shared_stub_entry) * 4)
8264 : offset_in_range (input_section, rel->r_offset,
8265 ARRAY_SIZE (stub_entry) * 4))
8266 {
8267 const int *stub;
8268 size_t size;
8269 size_t insn_offset = rel->r_offset;
8270 unsigned int insn;
53291d1f 8271
e7776f52
AM
8272 if (bfd_link_pic (info))
8273 {
8274 relocation -= (input_section->output_section->vma
8275 + input_section->output_offset
8276 + rel->r_offset - 4);
8277 stub = shared_stub_entry;
8278 bfd_put_32 (input_bfd, stub[0], contents + insn_offset - 12);
8279 bfd_put_32 (input_bfd, stub[1], contents + insn_offset - 8);
8280 bfd_put_32 (input_bfd, stub[2], contents + insn_offset - 4);
8281 stub += 3;
8282 size = ARRAY_SIZE (shared_stub_entry) - 3;
8283 }
8284 else
8285 {
8286 stub = stub_entry;
8287 size = ARRAY_SIZE (stub_entry);
8288 }
53291d1f 8289
e7776f52
AM
8290 relocation += addend;
8291 if (bfd_link_relocatable (info))
8292 relocation = 0;
8293
8294 /* First insn is HA, second is LO. */
8295 insn = *stub++;
8296 insn |= ((relocation + 0x8000) >> 16) & 0xffff;
8297 bfd_put_32 (input_bfd, insn, contents + insn_offset);
8298 insn_offset += 4;
8299
8300 insn = *stub++;
8301 insn |= relocation & 0xffff;
8302 bfd_put_32 (input_bfd, insn, contents + insn_offset);
8303 insn_offset += 4;
8304 size -= 2;
8305
8306 while (size != 0)
8307 {
8308 insn = *stub++;
8309 --size;
8310 bfd_put_32 (input_bfd, insn, contents + insn_offset);
8311 insn_offset += 4;
8312 }
9bc4e62b 8313
e7776f52
AM
8314 /* Rewrite the reloc and convert one of the trailing nop
8315 relocs to describe this relocation. */
8316 BFD_ASSERT (ELF32_R_TYPE (relend[-1].r_info) == R_PPC_NONE);
8317 /* The relocs are at the bottom 2 bytes */
8318 wrel->r_offset = rel->r_offset + d_offset;
8319 wrel->r_info = ELF32_R_INFO (r_symndx, R_PPC_ADDR16_HA);
8320 wrel->r_addend = rel->r_addend;
8321 memmove (wrel + 1, wrel, (relend - wrel - 1) * sizeof (*wrel));
8322 wrel++, rel++;
8323 wrel->r_offset += 4;
8324 wrel->r_info = ELF32_R_INFO (r_symndx, R_PPC_ADDR16_LO);
8325 }
8326 else
8327 goto de_fault;
8517fae7 8328 continue;
deaaf2f3 8329
70bccea4 8330 /* Indirect .sdata relocation. */
7619e7c7 8331 case R_PPC_EMB_SDAI16:
c9a2f333 8332 BFD_ASSERT (htab->sdata[0].section != NULL);
bd6c6e2b
AM
8333 if (!is_static_defined (htab->sdata[0].sym))
8334 {
0a1b45a2 8335 unresolved_reloc = true;
bd6c6e2b
AM
8336 break;
8337 }
7619e7c7 8338 relocation
76750a2f
AM
8339 = elf_finish_pointer_linker_section (input_bfd, &htab->sdata[0],
8340 h, relocation, rel);
bd6c6e2b 8341 addend = 0;
252b5132
RH
8342 break;
8343
70bccea4 8344 /* Indirect .sdata2 relocation. */
7619e7c7 8345 case R_PPC_EMB_SDA2I16:
c9a2f333 8346 BFD_ASSERT (htab->sdata[1].section != NULL);
bd6c6e2b
AM
8347 if (!is_static_defined (htab->sdata[1].sym))
8348 {
0a1b45a2 8349 unresolved_reloc = true;
bd6c6e2b
AM
8350 break;
8351 }
7619e7c7 8352 relocation
76750a2f
AM
8353 = elf_finish_pointer_linker_section (input_bfd, &htab->sdata[1],
8354 h, relocation, rel);
bd6c6e2b 8355 addend = 0;
252b5132
RH
8356 break;
8357
70bccea4
AM
8358 /* Handle the TOC16 reloc. We want to use the offset within the .got
8359 section, not the actual VMA. This is appropriate when generating
8360 an embedded ELF object, for which the .got section acts like the
8361 AIX .toc section. */
7619e7c7 8362 case R_PPC_TOC16: /* phony GOT16 relocations */
3b4f3a11
AM
8363 if (sec == NULL || sec->output_section == NULL)
8364 {
0a1b45a2 8365 unresolved_reloc = true;
3b4f3a11
AM
8366 break;
8367 }
fd361982
AM
8368 BFD_ASSERT (strcmp (bfd_section_name (sec), ".got") == 0
8369 || strcmp (bfd_section_name (sec), ".cgot") == 0);
252b5132 8370
3b4f3a11 8371 addend -= sec->output_section->vma + sec->output_offset + 0x8000;
252b5132
RH
8372 break;
8373
7619e7c7 8374 case R_PPC_PLTREL24:
f75e0e33
AM
8375 if (h != NULL && ifunc == NULL)
8376 {
cbf95972
AM
8377 struct plt_entry *ent;
8378
8379 ent = find_plt_ent (&h->plt.plist, got2,
8380 bfd_link_pic (info) ? addend : 0);
f75e0e33 8381 if (ent == NULL
ce558b89 8382 || htab->elf.splt == NULL)
f75e0e33
AM
8383 {
8384 /* We didn't make a PLT entry for this symbol. This
8385 happens when statically linking PIC code, or when
8386 using -Bsymbolic. */
8387 }
8388 else
8389 {
8390 /* Relocation is to the entry for this symbol in the
8391 procedure linkage table. */
0a1b45a2 8392 unresolved_reloc = false;
f75e0e33
AM
8393 if (htab->plt_type == PLT_NEW)
8394 relocation = (htab->glink->output_section->vma
8395 + htab->glink->output_offset
8396 + ent->glink_offset);
8397 else
ce558b89
AM
8398 relocation = (htab->elf.splt->output_section->vma
8399 + htab->elf.splt->output_offset
f75e0e33
AM
8400 + ent->plt.offset);
8401 }
8402 }
252b5132 8403
f75e0e33
AM
8404 /* R_PPC_PLTREL24 is rather special. If non-zero, the
8405 addend specifies the GOT pointer offset within .got2.
8406 Don't apply it to the relocation field. */
8407 addend = 0;
8da6118f 8408 break;
252b5132 8409
23cedd1d
AM
8410 case R_PPC_PLTSEQ:
8411 case R_PPC_PLTCALL:
08be3224
AM
8412 case R_PPC_PLT16_LO:
8413 case R_PPC_PLT16_HI:
8414 case R_PPC_PLT16_HA:
2d7ad24e 8415 plt_list = NULL;
08be3224
AM
8416 if (h != NULL)
8417 plt_list = &h->plt.plist;
2d7ad24e
AM
8418 else if (ifunc != NULL)
8419 plt_list = ifunc;
8420 else if (local_got_offsets != NULL)
8421 {
8422 struct plt_entry **local_plt;
8423 local_plt = (struct plt_entry **) (local_got_offsets
8424 + symtab_hdr->sh_info);
8425 plt_list = local_plt + r_symndx;
8426 }
0a1b45a2 8427 unresolved_reloc = true;
08be3224
AM
8428 if (plt_list != NULL)
8429 {
8430 struct plt_entry *ent;
8431
8432 ent = find_plt_ent (plt_list, got2,
8433 bfd_link_pic (info) ? addend : 0);
2d7ad24e 8434 if (ent != NULL && ent->plt.offset != (bfd_vma) -1)
08be3224 8435 {
2d7ad24e
AM
8436 asection *plt;
8437
0a1b45a2 8438 unresolved_reloc = false;
2d7ad24e 8439 plt = htab->elf.splt;
30845f11 8440 if (use_local_plt (info, h))
2d7ad24e
AM
8441 {
8442 if (ifunc != NULL)
8443 plt = htab->elf.iplt;
8444 else
8445 plt = htab->pltlocal;
8446 }
8447 relocation = (plt->output_section->vma
8448 + plt->output_offset
08be3224
AM
8449 + ent->plt.offset);
8450 if (bfd_link_pic (info))
8451 {
8452 bfd_vma got = 0;
8453
8454 if (ent->addend >= 32768)
8455 got = (ent->addend
8456 + ent->sec->output_section->vma
8457 + ent->sec->output_offset);
8458 else
8459 got = SYM_VAL (htab->elf.hgot);
8460 relocation -= got;
8461 }
8462 }
8463 }
8464 addend = 0;
8465 break;
8466
70bccea4 8467 /* Relocate against _SDA_BASE_. */
7619e7c7 8468 case R_PPC_SDAREL16:
252b5132
RH
8469 {
8470 const char *name;
bd6c6e2b 8471 struct elf_link_hash_entry *sda = htab->sdata[0].sym;
252b5132 8472
bd6c6e2b
AM
8473 if (sec == NULL
8474 || sec->output_section == NULL
8475 || !is_static_defined (sda))
3b4f3a11 8476 {
0a1b45a2 8477 unresolved_reloc = true;
3b4f3a11
AM
8478 break;
8479 }
bd6c6e2b 8480 addend -= SYM_VAL (sda);
3b4f3a11 8481
fd361982 8482 name = bfd_section_name (sec->output_section);
93d1b056
AM
8483 if (!(strcmp (name, ".sdata") == 0
8484 || strcmp (name, ".sbss") == 0))
252b5132 8485 {
cf97bcb0 8486 _bfd_error_handler
695344c0 8487 /* xgettext:c-format */
cf97bcb0
AM
8488 (_("%pB: the target (%s) of a %s relocation is "
8489 "in the wrong output section (%s)"),
d003868e 8490 input_bfd,
55fd94b0
AM
8491 sym_name,
8492 howto->name,
8493 name);
252b5132 8494 }
252b5132
RH
8495 }
8496 break;
8497
70bccea4 8498 /* Relocate against _SDA2_BASE_. */
7619e7c7 8499 case R_PPC_EMB_SDA2REL:
252b5132
RH
8500 {
8501 const char *name;
bd6c6e2b 8502 struct elf_link_hash_entry *sda = htab->sdata[1].sym;
252b5132 8503
bd6c6e2b
AM
8504 if (sec == NULL
8505 || sec->output_section == NULL
8506 || !is_static_defined (sda))
3b4f3a11 8507 {
0a1b45a2 8508 unresolved_reloc = true;
3b4f3a11
AM
8509 break;
8510 }
bd6c6e2b 8511 addend -= SYM_VAL (sda);
3b4f3a11 8512
fd361982 8513 name = bfd_section_name (sec->output_section);
93d1b056
AM
8514 if (!(strcmp (name, ".sdata2") == 0
8515 || strcmp (name, ".sbss2") == 0))
252b5132 8516 {
cf97bcb0 8517 _bfd_error_handler
695344c0 8518 /* xgettext:c-format */
cf97bcb0
AM
8519 (_("%pB: the target (%s) of a %s relocation is "
8520 "in the wrong output section (%s)"),
d003868e 8521 input_bfd,
55fd94b0
AM
8522 sym_name,
8523 howto->name,
8524 name);
252b5132 8525 }
252b5132
RH
8526 }
8527 break;
8528
b9c361e0 8529 case R_PPC_VLE_LO16A:
86c95733 8530 relocation = relocation + addend;
e7776f52
AM
8531 r = ppc_elf_vle_split16 (input_bfd, input_section, rel->r_offset,
8532 contents + rel->r_offset, relocation,
8533 split16a_type,
8534 htab->params->vle_reloc_fixup);
8535 goto report_reloc;
b9c361e0
JL
8536
8537 case R_PPC_VLE_LO16D:
86c95733 8538 relocation = relocation + addend;
e7776f52
AM
8539 r = ppc_elf_vle_split16 (input_bfd, input_section, rel->r_offset,
8540 contents + rel->r_offset, relocation,
8541 split16d_type,
8542 htab->params->vle_reloc_fixup);
8543 goto report_reloc;
b9c361e0
JL
8544
8545 case R_PPC_VLE_HI16A:
86c95733 8546 relocation = (relocation + addend) >> 16;
e7776f52
AM
8547 r = ppc_elf_vle_split16 (input_bfd, input_section, rel->r_offset,
8548 contents + rel->r_offset, relocation,
8549 split16a_type,
8550 htab->params->vle_reloc_fixup);
8551 goto report_reloc;
b9c361e0
JL
8552
8553 case R_PPC_VLE_HI16D:
86c95733 8554 relocation = (relocation + addend) >> 16;
e7776f52
AM
8555 r = ppc_elf_vle_split16 (input_bfd, input_section, rel->r_offset,
8556 contents + rel->r_offset, relocation,
8557 split16d_type,
8558 htab->params->vle_reloc_fixup);
8559 goto report_reloc;
b9c361e0
JL
8560
8561 case R_PPC_VLE_HA16A:
86c95733 8562 relocation = (relocation + addend + 0x8000) >> 16;
e7776f52
AM
8563 r = ppc_elf_vle_split16 (input_bfd, input_section, rel->r_offset,
8564 contents + rel->r_offset, relocation,
8565 split16a_type,
8566 htab->params->vle_reloc_fixup);
8567 goto report_reloc;
b9c361e0
JL
8568
8569 case R_PPC_VLE_HA16D:
86c95733 8570 relocation = (relocation + addend + 0x8000) >> 16;
e7776f52
AM
8571 r = ppc_elf_vle_split16 (input_bfd, input_section, rel->r_offset,
8572 contents + rel->r_offset, relocation,
8573 split16d_type,
8574 htab->params->vle_reloc_fixup);
8575 goto report_reloc;
b9c361e0 8576
70bccea4 8577 /* Relocate against either _SDA_BASE_, _SDA2_BASE_, or 0. */
7619e7c7 8578 case R_PPC_EMB_SDA21:
b9c361e0 8579 case R_PPC_VLE_SDA21:
7619e7c7 8580 case R_PPC_EMB_RELSDA:
b9c361e0 8581 case R_PPC_VLE_SDA21_LO:
e7776f52
AM
8582 if (!offset_in_range (input_section, rel->r_offset, 4))
8583 {
8584 r = bfd_reloc_outofrange;
8585 goto report_reloc;
8586 }
8587 else
8588 {
8589 const char *name;
8590 int reg;
8591 unsigned int insn;
8592 struct elf_link_hash_entry *sda = NULL;
252b5132 8593
e7776f52
AM
8594 if (sec == NULL || sec->output_section == NULL)
8595 {
8596 unresolved_reloc = true;
8597 break;
8598 }
3b4f3a11 8599
e7776f52
AM
8600 name = bfd_section_name (sec->output_section);
8601 if (strcmp (name, ".sdata") == 0
8602 || strcmp (name, ".sbss") == 0)
8603 {
8604 reg = 13;
8605 sda = htab->sdata[0].sym;
8606 }
8607 else if (strcmp (name, ".sdata2") == 0
8608 || strcmp (name, ".sbss2") == 0)
8609 {
8610 reg = 2;
8611 sda = htab->sdata[1].sym;
8612 }
8613 else if (strcmp (name, ".PPC.EMB.sdata0") == 0
8614 || strcmp (name, ".PPC.EMB.sbss0") == 0)
8615 {
8616 reg = 0;
8617 }
8618 else
8619 {
8620 _bfd_error_handler
8621 /* xgettext:c-format */
8622 (_("%pB: the target (%s) of a %s relocation is "
8623 "in the wrong output section (%s)"),
8624 input_bfd,
8625 sym_name,
8626 howto->name,
8627 name);
8628
8629 bfd_set_error (bfd_error_bad_value);
8630 ret = false;
8631 goto copy_reloc;
8632 }
252b5132 8633
e7776f52
AM
8634 if (sda != NULL)
8635 {
8636 if (!is_static_defined (sda))
8637 {
8638 unresolved_reloc = true;
8639 break;
8640 }
8641 addend -= SYM_VAL (sda);
8642 }
252b5132 8643
e7776f52
AM
8644 if (r_type == R_PPC_EMB_RELSDA)
8645 break;
bd6c6e2b 8646
e7776f52
AM
8647 /* The PowerPC Embedded Application Binary Interface
8648 version 1.0 insanely chose to specify R_PPC_EMB_SDA21
8649 operating on a 24-bit field at r_offset. GNU as and
8650 GNU ld have always assumed R_PPC_EMB_SDA21 operates on
8651 a 32-bit bit insn at r_offset. Cope with object file
8652 producers that possibly comply with the EABI in
8653 generating an odd r_offset for big-endian objects. */
8654 if (r_type == R_PPC_EMB_SDA21)
8655 rel->r_offset &= ~1;
6f5601c4 8656
e7776f52
AM
8657 insn = bfd_get_32 (input_bfd, contents + rel->r_offset);
8658 if (reg == 0
8659 && (r_type == R_PPC_VLE_SDA21
8660 || r_type == R_PPC_VLE_SDA21_LO))
8661 {
8662 relocation = relocation + addend;
8663 addend = 0;
8664
8665 /* Force e_li insn, keeping RT from original insn. */
8666 insn &= 0x1f << 21;
8667 insn |= 28u << 26;
8668
8669 /* We have an li20 field, bits 17..20, 11..15, 21..31. */
8670 /* Top 4 bits of value to 17..20. */
8671 insn |= (relocation & 0xf0000) >> 5;
8672 /* Next 5 bits of the value to 11..15. */
8673 insn |= (relocation & 0xf800) << 5;
8674 /* And the final 11 bits of the value to bits 21 to 31. */
8675 insn |= relocation & 0x7ff;
8676
8677 bfd_put_32 (input_bfd, insn, contents + rel->r_offset);
8678
8679 r = bfd_reloc_ok;
8680 if (r_type == R_PPC_VLE_SDA21
8681 && ((relocation + 0x80000) & 0xffffffff) > 0x100000)
8682 r = bfd_reloc_overflow;
8683 goto report_reloc;
8684 }
8685 /* Fill in register field. */
8686 insn = (insn & ~RA_REGISTER_MASK) | (reg << RA_REGISTER_SHIFT);
8687 bfd_put_32 (input_bfd, insn, contents + rel->r_offset);
8688 }
252b5132
RH
8689 break;
8690
b9c361e0
JL
8691 case R_PPC_VLE_SDAREL_LO16A:
8692 case R_PPC_VLE_SDAREL_LO16D:
8693 case R_PPC_VLE_SDAREL_HI16A:
8694 case R_PPC_VLE_SDAREL_HI16D:
8695 case R_PPC_VLE_SDAREL_HA16A:
8696 case R_PPC_VLE_SDAREL_HA16D:
e7776f52
AM
8697 if (!offset_in_range (input_section, rel->r_offset, 4))
8698 r = bfd_reloc_outofrange;
8699 else
8700 {
8701 bfd_vma value;
8702 const char *name;
8703 struct elf_link_hash_entry *sda = NULL;
b9c361e0 8704
e7776f52
AM
8705 if (sec == NULL || sec->output_section == NULL)
8706 {
8707 unresolved_reloc = true;
8708 break;
8709 }
b9c361e0 8710
e7776f52
AM
8711 name = bfd_section_name (sec->output_section);
8712 if (strcmp (name, ".sdata") == 0
8713 || strcmp (name, ".sbss") == 0)
8714 sda = htab->sdata[0].sym;
8715 else if (strcmp (name, ".sdata2") == 0
8716 || strcmp (name, ".sbss2") == 0)
8717 sda = htab->sdata[1].sym;
8718 else
8719 {
8720 _bfd_error_handler
8721 /* xgettext:c-format */
8722 (_("%pB: the target (%s) of a %s relocation is "
8723 "in the wrong output section (%s)"),
8724 input_bfd,
8725 sym_name,
8726 howto->name,
8727 name);
8728
8729 bfd_set_error (bfd_error_bad_value);
8730 ret = false;
8731 goto copy_reloc;
8732 }
86c95733 8733
e7776f52
AM
8734 if (sda == NULL || !is_static_defined (sda))
8735 {
8736 unresolved_reloc = true;
8737 break;
8738 }
8739 value = relocation + addend - SYM_VAL (sda);
8740
8741 if (r_type == R_PPC_VLE_SDAREL_LO16A)
8742 r = ppc_elf_vle_split16 (input_bfd, input_section,
8743 rel->r_offset,
8744 contents + rel->r_offset, value,
8745 split16a_type,
8746 htab->params->vle_reloc_fixup);
8747 else if (r_type == R_PPC_VLE_SDAREL_LO16D)
8748 r = ppc_elf_vle_split16 (input_bfd, input_section,
8749 rel->r_offset,
8750 contents + rel->r_offset, value,
8751 split16d_type,
8752 htab->params->vle_reloc_fixup);
8753 else if (r_type == R_PPC_VLE_SDAREL_HI16A)
8754 {
8755 value = value >> 16;
8756 r = ppc_elf_vle_split16 (input_bfd, input_section,
8757 rel->r_offset,
8758 contents + rel->r_offset, value,
8759 split16a_type,
8760 htab->params->vle_reloc_fixup);
8761 }
8762 else if (r_type == R_PPC_VLE_SDAREL_HI16D)
8763 {
8764 value = value >> 16;
8765 r = ppc_elf_vle_split16 (input_bfd, input_section,
8766 rel->r_offset,
8767 contents + rel->r_offset, value,
8768 split16d_type,
8769 htab->params->vle_reloc_fixup);
8770 }
8771 else if (r_type == R_PPC_VLE_SDAREL_HA16A)
8772 {
8773 value = (value + 0x8000) >> 16;
8774 r = ppc_elf_vle_split16 (input_bfd, input_section,
8775 rel->r_offset,
8776 contents + rel->r_offset, value,
8777 split16a_type,
8778 htab->params->vle_reloc_fixup);
8779 }
8780 else if (r_type == R_PPC_VLE_SDAREL_HA16D)
8781 {
8782 value = (value + 0x8000) >> 16;
8783 r = ppc_elf_vle_split16 (input_bfd, input_section,
8784 rel->r_offset,
8785 contents + rel->r_offset, value,
8786 split16d_type,
8787 htab->params->vle_reloc_fixup);
8788 }
8789 else
8790 abort ();
8791 }
8792 goto report_reloc;
b9c361e0 8793
83eef883 8794 case R_PPC_VLE_ADDR20:
e7776f52
AM
8795 if (!offset_in_range (input_section, rel->r_offset, 4))
8796 r = bfd_reloc_outofrange;
8797 else
8798 {
8799 ppc_elf_vle_split20 (output_bfd, contents + rel->r_offset,
8800 relocation);
8801 r = bfd_reloc_ok;
8802 }
8803 goto report_reloc;
83eef883 8804
70bccea4 8805 /* Relocate against the beginning of the section. */
7619e7c7
AM
8806 case R_PPC_SECTOFF:
8807 case R_PPC_SECTOFF_LO:
8808 case R_PPC_SECTOFF_HI:
8809 case R_PPC_SECTOFF_HA:
3b4f3a11
AM
8810 if (sec == NULL || sec->output_section == NULL)
8811 {
0a1b45a2 8812 unresolved_reloc = true;
3b4f3a11
AM
8813 break;
8814 }
252b5132 8815 addend -= sec->output_section->vma;
252b5132
RH
8816 break;
8817
70bccea4 8818 /* Negative relocations. */
7619e7c7
AM
8819 case R_PPC_EMB_NADDR32:
8820 case R_PPC_EMB_NADDR16:
8821 case R_PPC_EMB_NADDR16_LO:
8822 case R_PPC_EMB_NADDR16_HI:
8823 case R_PPC_EMB_NADDR16_HA:
8da6118f 8824 addend -= 2 * relocation;
252b5132
RH
8825 break;
8826
7619e7c7
AM
8827 case R_PPC_COPY:
8828 case R_PPC_GLOB_DAT:
8829 case R_PPC_JMP_SLOT:
8830 case R_PPC_RELATIVE:
e054468f 8831 case R_PPC_IRELATIVE:
7619e7c7
AM
8832 case R_PPC_PLT32:
8833 case R_PPC_PLTREL32:
7619e7c7
AM
8834 case R_PPC_ADDR30:
8835 case R_PPC_EMB_RELSEC16:
8836 case R_PPC_EMB_RELST_LO:
8837 case R_PPC_EMB_RELST_HI:
8838 case R_PPC_EMB_RELST_HA:
8839 case R_PPC_EMB_BIT_FLD:
cf97bcb0
AM
8840 /* xgettext:c-format */
8841 _bfd_error_handler (_("%pB: %s unsupported"),
8842 input_bfd, howto->name);
252b5132
RH
8843
8844 bfd_set_error (bfd_error_invalid_operation);
0a1b45a2 8845 ret = false;
c316a17c 8846 goto copy_reloc;
7619e7c7 8847 }
252b5132 8848
252dcdf4
AM
8849 switch (r_type)
8850 {
8851 default:
8852 break;
8853
8854 case R_PPC_TPREL16_HA:
e7776f52
AM
8855 if (htab->do_tls_opt
8856 && relocation + addend + 0x8000 < 0x10000
8857 && offset_in_range (input_section, rel->r_offset & ~3, 4))
8858
252dcdf4
AM
8859 {
8860 bfd_byte *p = contents + (rel->r_offset & ~3);
8861 bfd_put_32 (input_bfd, NOP, p);
8862 }
8863 break;
8864
8865 case R_PPC_TPREL16_LO:
e7776f52
AM
8866 if (htab->do_tls_opt
8867 && relocation + addend + 0x8000 < 0x10000
8868 && offset_in_range (input_section, rel->r_offset & ~3, 4))
252dcdf4
AM
8869 {
8870 bfd_byte *p = contents + (rel->r_offset & ~3);
8871 unsigned int insn = bfd_get_32 (input_bfd, p);
8872 insn &= ~(0x1f << 16);
8873 insn |= 2 << 16;
8874 bfd_put_32 (input_bfd, insn, p);
8875 }
8876 break;
8877 }
8878
23cedd1d
AM
8879 switch (r_type)
8880 {
8881 default:
8882 break;
8883
8884 case R_PPC_PLTCALL:
8885 if (unresolved_reloc)
8886 {
e7776f52
AM
8887 if (offset_in_range (input_section, rel->r_offset, 4))
8888 {
8889 bfd_byte *p = contents + rel->r_offset;
8890 unsigned int insn = bfd_get_32 (input_bfd, p);
8891 insn &= 1;
8892 bfd_put_32 (input_bfd, B | insn, p);
8893 unresolved_reloc = save_unresolved_reloc;
8894 r_type = R_PPC_REL24;
8895 howto = ppc_elf_howto_table[r_type];
8896 }
23cedd1d
AM
8897 }
8898 else if (htab->plt_type != PLT_NEW)
8899 info->callbacks->einfo
482f3505 8900 (_("%X%P: %H: %s relocation unsupported for bss-plt\n"),
23cedd1d
AM
8901 input_bfd, input_section, rel->r_offset,
8902 howto->name);
8903 break;
8904
8905 case R_PPC_PLTSEQ:
8906 case R_PPC_PLT16_HA:
8907 case R_PPC_PLT16_LO:
8908 if (unresolved_reloc)
8909 {
e7776f52
AM
8910 if (offset_in_range (input_section, rel->r_offset & ~3, 4))
8911 {
8912 bfd_byte *p = contents + (rel->r_offset & ~3);
8913 bfd_put_32 (input_bfd, NOP, p);
8914 unresolved_reloc = false;
8915 r_type = R_PPC_NONE;
8916 howto = ppc_elf_howto_table[r_type];
8917 }
23cedd1d
AM
8918 }
8919 else if (htab->plt_type != PLT_NEW)
8920 info->callbacks->einfo
482f3505 8921 (_("%X%P: %H: %s relocation unsupported for bss-plt\n"),
23cedd1d
AM
8922 input_bfd, input_section, rel->r_offset,
8923 howto->name);
8924 break;
8925 }
8926
7619e7c7
AM
8927 /* Do any further special processing. */
8928 switch (r_type)
8929 {
8930 default:
8931 break;
8932
8933 case R_PPC_ADDR16_HA:
d7128ce4 8934 case R_PPC_REL16_HA:
a680de9a 8935 case R_PPC_REL16DX_HA:
7619e7c7
AM
8936 case R_PPC_SECTOFF_HA:
8937 case R_PPC_TPREL16_HA:
8938 case R_PPC_DTPREL16_HA:
7619e7c7
AM
8939 case R_PPC_EMB_NADDR16_HA:
8940 case R_PPC_EMB_RELST_HA:
8941 /* It's just possible that this symbol is a weak symbol
7b609f53 8942 that's not actually defined anywhere. In that case,
7619e7c7
AM
8943 'sec' would be NULL, and we should leave the symbol
8944 alone (it will be set to zero elsewhere in the link). */
5c5f6e17
AM
8945 if (sec == NULL)
8946 break;
1a0670f3 8947 /* Fall through. */
5c5f6e17
AM
8948
8949 case R_PPC_PLT16_HA:
8950 case R_PPC_GOT16_HA:
8951 case R_PPC_GOT_TLSGD16_HA:
8952 case R_PPC_GOT_TLSLD16_HA:
8953 case R_PPC_GOT_TPREL16_HA:
8954 case R_PPC_GOT_DTPREL16_HA:
8955 /* Add 0x10000 if sign bit in 0:15 is set.
8956 Bits 0:15 are not used. */
8957 addend += 0x8000;
7619e7c7 8958 break;
1fe532cf
AM
8959
8960 case R_PPC_ADDR16:
8961 case R_PPC_ADDR16_LO:
8962 case R_PPC_GOT16:
8963 case R_PPC_GOT16_LO:
8964 case R_PPC_SDAREL16:
8965 case R_PPC_SECTOFF:
8966 case R_PPC_SECTOFF_LO:
8967 case R_PPC_DTPREL16:
8968 case R_PPC_DTPREL16_LO:
8969 case R_PPC_TPREL16:
8970 case R_PPC_TPREL16_LO:
8971 case R_PPC_GOT_TLSGD16:
8972 case R_PPC_GOT_TLSGD16_LO:
8973 case R_PPC_GOT_TLSLD16:
8974 case R_PPC_GOT_TLSLD16_LO:
8975 case R_PPC_GOT_DTPREL16:
8976 case R_PPC_GOT_DTPREL16_LO:
8977 case R_PPC_GOT_TPREL16:
8978 case R_PPC_GOT_TPREL16_LO:
e7776f52
AM
8979 if (offset_in_range (input_section, rel->r_offset - d_offset, 4))
8980 {
8981 /* The 32-bit ABI lacks proper relocations to deal with
8982 certain 64-bit instructions. Prevent damage to bits
8983 that make up part of the insn opcode. */
8984 unsigned int insn, mask, lobit;
8985
8986 insn = bfd_get_32 (input_bfd,
8987 contents + rel->r_offset - d_offset);
8988 mask = 0;
8989 if (is_insn_ds_form (insn))
8990 mask = 3;
8991 else if (is_insn_dq_form (insn))
8992 mask = 15;
8993 else
8994 break;
8995 relocation += addend;
8996 addend = insn & mask;
8997 lobit = mask & relocation;
8998 if (lobit != 0)
8999 {
9000 relocation ^= lobit;
9001 info->callbacks->einfo
9002 /* xgettext:c-format */
9003 (_("%H: error: %s against `%s' not a multiple of %u\n"),
9004 input_bfd, input_section, rel->r_offset,
9005 howto->name, sym_name, mask + 1);
9006 bfd_set_error (bfd_error_bad_value);
9007 ret = false;
9008 }
9009 }
1fe532cf 9010 break;
252b5132
RH
9011 }
9012
252b5132 9013#ifdef DEBUG
55fd94b0
AM
9014 fprintf (stderr, "\ttype = %s (%d), name = %s, symbol index = %ld, "
9015 "offset = %ld, addend = %ld\n",
252b5132 9016 howto->name,
8da6118f 9017 (int) r_type,
252b5132
RH
9018 sym_name,
9019 r_symndx,
7619e7c7 9020 (long) rel->r_offset,
8da6118f 9021 (long) addend);
252b5132
RH
9022#endif
9023
7619e7c7
AM
9024 if (unresolved_reloc
9025 && !((input_section->flags & SEC_DEBUGGING) != 0
1d5316ab
AM
9026 && h->def_dynamic)
9027 && _bfd_elf_section_offset (output_bfd, info, input_section,
9028 rel->r_offset) != (bfd_vma) -1)
7619e7c7 9029 {
25f53a85 9030 info->callbacks->einfo
695344c0 9031 /* xgettext:c-format */
174d0a74 9032 (_("%H: unresolvable %s relocation against symbol `%s'\n"),
25f53a85 9033 input_bfd, input_section, rel->r_offset,
7b609f53 9034 howto->name,
7619e7c7 9035 sym_name);
0a1b45a2 9036 ret = false;
7619e7c7
AM
9037 }
9038
86c95733
AM
9039 /* 16-bit fields in insns mostly have signed values, but a
9040 few insns have 16-bit unsigned values. Really, we should
9041 have different reloc types. */
9042 if (howto->complain_on_overflow != complain_overflow_dont
9043 && howto->dst_mask == 0xffff
e7776f52
AM
9044 && (input_section->flags & SEC_CODE) != 0
9045 && offset_in_range (input_section, rel->r_offset & ~3, 4))
86c95733
AM
9046 {
9047 enum complain_overflow complain = complain_overflow_signed;
9048
9049 if ((elf_section_flags (input_section) & SHF_PPC_VLE) == 0)
9050 {
9051 unsigned int insn;
9052
9053 insn = bfd_get_32 (input_bfd, contents + (rel->r_offset & ~3));
2365f8d7 9054 if ((insn & (0x3fu << 26)) == 10u << 26 /* cmpli */)
a47622ac 9055 complain = complain_overflow_bitfield;
2365f8d7
AM
9056 else if ((insn & (0x3fu << 26)) == 28u << 26 /* andi */
9057 || (insn & (0x3fu << 26)) == 24u << 26 /* ori */
9058 || (insn & (0x3fu << 26)) == 26u << 26 /* xori */)
86c95733
AM
9059 complain = complain_overflow_unsigned;
9060 }
9061 if (howto->complain_on_overflow != complain)
9062 {
9063 alt_howto = *howto;
9064 alt_howto.complain_on_overflow = complain;
9065 howto = &alt_howto;
9066 }
9067 }
9068
a680de9a
PB
9069 if (r_type == R_PPC_REL16DX_HA)
9070 {
9071 /* Split field reloc isn't handled by _bfd_final_link_relocate. */
e7776f52 9072 if (offset_in_range (input_section, rel->r_offset, 4))
a680de9a
PB
9073 r = bfd_reloc_outofrange;
9074 else
9075 {
9076 unsigned int insn;
9077
9078 relocation += addend;
9079 relocation -= (rel->r_offset
9080 + input_section->output_offset
9081 + input_section->output_section->vma);
9082 relocation >>= 16;
9083 insn = bfd_get_32 (input_bfd, contents + rel->r_offset);
9084 insn &= ~0x1fffc1;
9085 insn |= (relocation & 0xffc1) | ((relocation & 0x3e) << 15);
9086 bfd_put_32 (input_bfd, insn, contents + rel->r_offset);
9087 r = bfd_reloc_ok;
9088 }
9089 }
9090 else
9091 r = _bfd_final_link_relocate (howto, input_bfd, input_section, contents,
9092 rel->r_offset, relocation, addend);
252b5132 9093
e7776f52 9094 report_reloc:
7619e7c7 9095 if (r != bfd_reloc_ok)
252b5132 9096 {
7619e7c7 9097 if (r == bfd_reloc_overflow)
252b5132 9098 {
8131c122
AM
9099 /* On code like "if (foo) foo();" don't report overflow
9100 on a branch to zero when foo is undefined. */
9101 if (!warned
9102 && !(h != NULL
9103 && (h->root.type == bfd_link_hash_undefweak
9104 || h->root.type == bfd_link_hash_undefined)
9105 && is_branch_reloc (r_type)))
1a72702b
AM
9106 info->callbacks->reloc_overflow
9107 (info, (h ? &h->root : NULL), sym_name, howto->name,
9108 rel->r_addend, input_bfd, input_section, rel->r_offset);
dc1bc0c9
RH
9109 }
9110 else
9111 {
25f53a85 9112 info->callbacks->einfo
695344c0 9113 /* xgettext:c-format */
174d0a74 9114 (_("%H: %s reloc against `%s': error %d\n"),
25f53a85
AM
9115 input_bfd, input_section, rel->r_offset,
9116 howto->name, sym_name, (int) r);
0a1b45a2 9117 ret = false;
252b5132
RH
9118 }
9119 }
c316a17c
AM
9120 copy_reloc:
9121 if (wrel != rel)
9122 *wrel = *rel;
9123 }
9124
9125 if (wrel != rel)
9126 {
9127 Elf_Internal_Shdr *rel_hdr;
9128 size_t deleted = rel - wrel;
9129
9130 rel_hdr = _bfd_elf_single_rel_hdr (input_section->output_section);
9131 rel_hdr->sh_size -= rel_hdr->sh_entsize * deleted;
9132 if (rel_hdr->sh_size == 0)
9133 {
9134 /* It is too late to remove an empty reloc section. Leave
9135 one NONE reloc.
9136 ??? What is wrong with an empty section??? */
9137 rel_hdr->sh_size = rel_hdr->sh_entsize;
9138 deleted -= 1;
9139 wrel++;
9140 }
9141 relend = wrel;
9142 rel_hdr = _bfd_elf_single_rel_hdr (input_section);
9143 rel_hdr->sh_size -= rel_hdr->sh_entsize * deleted;
9144 input_section->reloc_count -= deleted;
252b5132
RH
9145 }
9146
252b5132
RH
9147#ifdef DEBUG
9148 fprintf (stderr, "\n");
9149#endif
9150
53291d1f
AM
9151 if (input_section->sec_info_type == SEC_INFO_TYPE_TARGET
9152 && input_section->size != input_section->rawsize
9153 && (strcmp (input_section->output_section->name, ".init") == 0
9154 || strcmp (input_section->output_section->name, ".fini") == 0))
9155 {
9156 /* Branch around the trampolines. */
9157 unsigned int insn = B + input_section->size - input_section->rawsize;
9158 bfd_put_32 (input_bfd, insn, contents + input_section->rawsize);
9159 }
9160
5446cbdf 9161 if (htab->params->ppc476_workaround
795bc6b3 9162 && input_section->sec_info_type == SEC_INFO_TYPE_TARGET
0e1862bb 9163 && (!bfd_link_relocatable (info)
795bc6b3
AM
9164 || (input_section->output_section->alignment_power
9165 >= htab->params->pagesize_p2)))
5446cbdf 9166 {
5446cbdf 9167 bfd_vma start_addr, end_addr, addr;
795bc6b3 9168 bfd_vma pagesize = (bfd_vma) 1 << htab->params->pagesize_p2;
5446cbdf 9169
5446cbdf 9170 if (relax_info->workaround_size != 0)
40fd06d1
AM
9171 {
9172 bfd_byte *p;
9173 unsigned int n;
9174 bfd_byte fill[4];
9175
9176 bfd_put_32 (input_bfd, BA, fill);
9177 p = contents + input_section->size - relax_info->workaround_size;
9178 n = relax_info->workaround_size >> 2;
9179 while (n--)
9180 {
9181 memcpy (p, fill, 4);
9182 p += 4;
9183 }
9184 }
5446cbdf
AM
9185
9186 /* The idea is: Replace the last instruction on a page with a
9187 branch to a patch area. Put the insn there followed by a
9188 branch back to the next page. Complicated a little by
9189 needing to handle moved conditional branches, and by not
9190 wanting to touch data-in-text. */
9191
9192 start_addr = (input_section->output_section->vma
9193 + input_section->output_offset);
9194 end_addr = (start_addr + input_section->size
9195 - relax_info->workaround_size);
9196 for (addr = ((start_addr & -pagesize) + pagesize - 4);
9197 addr < end_addr;
9198 addr += pagesize)
9199 {
9200 bfd_vma offset = addr - start_addr;
9201 Elf_Internal_Rela *lo, *hi;
0a1b45a2 9202 bool is_data;
5446cbdf
AM
9203 bfd_vma patch_off, patch_addr;
9204 unsigned int insn;
9205
9206 /* Do we have a data reloc at this offset? If so, leave
9207 the word alone. */
0a1b45a2 9208 is_data = false;
5446cbdf 9209 lo = relocs;
668e22e5
AM
9210 hi = relend;
9211 rel = NULL;
5446cbdf
AM
9212 while (lo < hi)
9213 {
9214 rel = lo + (hi - lo) / 2;
9215 if (rel->r_offset < offset)
9216 lo = rel + 1;
668e22e5 9217 else if (rel->r_offset > offset + 3)
5446cbdf
AM
9218 hi = rel;
9219 else
9220 {
9221 switch (ELF32_R_TYPE (rel->r_info))
9222 {
9223 case R_PPC_ADDR32:
9224 case R_PPC_UADDR32:
9225 case R_PPC_REL32:
9226 case R_PPC_ADDR30:
0a1b45a2 9227 is_data = true;
5446cbdf
AM
9228 break;
9229 default:
9230 break;
9231 }
9232 break;
9233 }
9234 }
9235 if (is_data)
9236 continue;
9237
b4ab4364
AM
9238 /* Some instructions can be left alone too. Unconditional
9239 branches, except for bcctr with BO=0x14 (bctr, bctrl),
9240 avoid the icache failure.
9241
9242 The problem occurs due to prefetch across a page boundary
9243 where stale instructions can be fetched from the next
9244 page, and the mechanism for flushing these bad
9245 instructions fails under certain circumstances. The
9246 unconditional branches:
9247 1) Branch: b, bl, ba, bla,
9248 2) Branch Conditional: bc, bca, bcl, bcla,
9249 3) Branch Conditional to Link Register: bclr, bclrl,
9250 where (2) and (3) have BO=0x14 making them unconditional,
9251 prevent the bad prefetch because the prefetch itself is
9252 affected by these instructions. This happens even if the
9253 instruction is not executed.
9254
9255 A bctr example:
9256 .
9257 . lis 9,new_page@ha
9258 . addi 9,9,new_page@l
9259 . mtctr 9
9260 . bctr
9261 . nop
9262 . nop
9263 . new_page:
9264 .
9265 The bctr is not predicted taken due to ctr not being
9266 ready, so prefetch continues on past the bctr into the
9267 new page which might have stale instructions. If they
9268 fail to be flushed, then they will be executed after the
9269 bctr executes. Either of the following modifications
9270 prevent the bad prefetch from happening in the first
9271 place:
9272 .
1b786873
L
9273 . lis 9,new_page@ha lis 9,new_page@ha
9274 . addi 9,9,new_page@l addi 9,9,new_page@l
9275 . mtctr 9 mtctr 9
9276 . bctr bctr
b4ab4364 9277 . nop b somewhere_else
1b786873
L
9278 . b somewhere_else nop
9279 . new_page: new_page:
b4ab4364 9280 . */
5446cbdf 9281 insn = bfd_get_32 (input_bfd, contents + offset);
2365f8d7
AM
9282 if ((insn & (0x3fu << 26)) == (18u << 26) /* b,bl,ba,bla */
9283 || ((insn & (0x3fu << 26)) == (16u << 26) /* bc,bcl,bca,bcla*/
07d6d2b8 9284 && (insn & (0x14 << 21)) == (0x14 << 21)) /* with BO=0x14 */
2365f8d7 9285 || ((insn & (0x3fu << 26)) == (19u << 26)
b4ab4364 9286 && (insn & (0x3ff << 1)) == (16u << 1) /* bclr,bclrl */
07d6d2b8 9287 && (insn & (0x14 << 21)) == (0x14 << 21)))/* with BO=0x14 */
5446cbdf
AM
9288 continue;
9289
9290 patch_addr = (start_addr + input_section->size
9291 - relax_info->workaround_size);
9292 patch_addr = (patch_addr + 15) & -16;
9293 patch_off = patch_addr - start_addr;
9294 bfd_put_32 (input_bfd, B + patch_off - offset, contents + offset);
668e22e5
AM
9295
9296 if (rel != NULL
9297 && rel->r_offset >= offset
9298 && rel->r_offset < offset + 4)
9299 {
f8b44781
AM
9300 asection *sreloc;
9301
668e22e5
AM
9302 /* If the insn we are patching had a reloc, adjust the
9303 reloc r_offset so that the reloc applies to the moved
9304 location. This matters for -r and --emit-relocs. */
9305 if (rel + 1 != relend)
9306 {
9307 Elf_Internal_Rela tmp = *rel;
9308
9309 /* Keep the relocs sorted by r_offset. */
9310 memmove (rel, rel + 1, (relend - (rel + 1)) * sizeof (*rel));
9311 relend[-1] = tmp;
9312 }
9313 relend[-1].r_offset += patch_off - offset;
f8b44781
AM
9314
9315 /* Adjust REL16 addends too. */
9316 switch (ELF32_R_TYPE (relend[-1].r_info))
9317 {
9318 case R_PPC_REL16:
9319 case R_PPC_REL16_LO:
9320 case R_PPC_REL16_HI:
9321 case R_PPC_REL16_HA:
9322 relend[-1].r_addend += patch_off - offset;
9323 break;
9324 default:
9325 break;
9326 }
9327
9328 /* If we are building a PIE or shared library with
9329 non-PIC objects, perhaps we had a dynamic reloc too?
9330 If so, the dynamic reloc must move with the insn. */
9331 sreloc = elf_section_data (input_section)->sreloc;
9332 if (sreloc != NULL)
9333 {
1d5c94cb 9334 Elf32_External_Rela *slo, *shi, *srelend;
f8b44781
AM
9335 bfd_vma soffset;
9336
1d5c94cb
AM
9337 slo = (Elf32_External_Rela *) sreloc->contents;
9338 shi = srelend = slo + sreloc->reloc_count;
f8b44781
AM
9339 soffset = (offset + input_section->output_section->vma
9340 + input_section->output_offset);
9341 while (slo < shi)
9342 {
1d5c94cb
AM
9343 Elf32_External_Rela *srel = slo + (shi - slo) / 2;
9344 bfd_elf32_swap_reloca_in (output_bfd, (bfd_byte *) srel,
9345 &outrel);
f8b44781
AM
9346 if (outrel.r_offset < soffset)
9347 slo = srel + 1;
9348 else if (outrel.r_offset > soffset + 3)
9349 shi = srel;
9350 else
9351 {
1d5c94cb 9352 if (srel + 1 != srelend)
f8b44781 9353 {
1d5c94cb
AM
9354 memmove (srel, srel + 1,
9355 (srelend - (srel + 1)) * sizeof (*srel));
9356 srel = srelend - 1;
f8b44781
AM
9357 }
9358 outrel.r_offset += patch_off - offset;
1d5c94cb
AM
9359 bfd_elf32_swap_reloca_out (output_bfd, &outrel,
9360 (bfd_byte *) srel);
f8b44781
AM
9361 break;
9362 }
9363 }
9364 }
668e22e5
AM
9365 }
9366 else
9367 rel = NULL;
9368
2365f8d7 9369 if ((insn & (0x3fu << 26)) == (16u << 26) /* bc */
5446cbdf
AM
9370 && (insn & 2) == 0 /* relative */)
9371 {
9372 bfd_vma delta = ((insn & 0xfffc) ^ 0x8000) - 0x8000;
9373
9374 delta += offset - patch_off;
0e1862bb 9375 if (bfd_link_relocatable (info) && rel != NULL)
668e22e5 9376 delta = 0;
0e1862bb 9377 if (!bfd_link_relocatable (info) && rel != NULL)
668e22e5
AM
9378 {
9379 enum elf_ppc_reloc_type r_type;
9380
9381 r_type = ELF32_R_TYPE (relend[-1].r_info);
9382 if (r_type == R_PPC_REL14_BRTAKEN)
9383 insn |= BRANCH_PREDICT_BIT;
9384 else if (r_type == R_PPC_REL14_BRNTAKEN)
9385 insn &= ~BRANCH_PREDICT_BIT;
9386 else
9387 BFD_ASSERT (r_type == R_PPC_REL14);
9388
9389 if ((r_type == R_PPC_REL14_BRTAKEN
9390 || r_type == R_PPC_REL14_BRNTAKEN)
9391 && delta + 0x8000 < 0x10000
9392 && (bfd_signed_vma) delta < 0)
9393 insn ^= BRANCH_PREDICT_BIT;
9394 }
5446cbdf
AM
9395 if (delta + 0x8000 < 0x10000)
9396 {
9397 bfd_put_32 (input_bfd,
9398 (insn & ~0xfffc) | (delta & 0xfffc),
9399 contents + patch_off);
9400 patch_off += 4;
9401 bfd_put_32 (input_bfd,
9402 B | ((offset + 4 - patch_off) & 0x3fffffc),
9403 contents + patch_off);
9404 patch_off += 4;
9405 }
9406 else
9407 {
668e22e5
AM
9408 if (rel != NULL)
9409 {
9410 unsigned int r_sym = ELF32_R_SYM (relend[-1].r_info);
9411
9412 relend[-1].r_offset += 8;
9413 relend[-1].r_info = ELF32_R_INFO (r_sym, R_PPC_REL24);
9414 }
5446cbdf
AM
9415 bfd_put_32 (input_bfd,
9416 (insn & ~0xfffc) | 8,
9417 contents + patch_off);
9418 patch_off += 4;
9419 bfd_put_32 (input_bfd,
9420 B | ((offset + 4 - patch_off) & 0x3fffffc),
9421 contents + patch_off);
9422 patch_off += 4;
9423 bfd_put_32 (input_bfd,
9424 B | ((delta - 8) & 0x3fffffc),
9425 contents + patch_off);
9426 patch_off += 4;
9427 }
9428 }
9429 else
9430 {
9431 bfd_put_32 (input_bfd, insn, contents + patch_off);
9432 patch_off += 4;
9433 bfd_put_32 (input_bfd,
9434 B | ((offset + 4 - patch_off) & 0x3fffffc),
9435 contents + patch_off);
9436 patch_off += 4;
9437 }
9438 BFD_ASSERT (patch_off <= input_section->size);
9439 relax_info->workaround_size = input_section->size - patch_off;
9440 }
9441 }
9442
252b5132
RH
9443 return ret;
9444}
252b5132 9445\f
49c09209 9446/* Write out the PLT relocs and entries for H. */
c5fccbec 9447
0a1b45a2 9448static bool
49c09209 9449write_global_sym_plt (struct elf_link_hash_entry *h, void *inf)
e1a9cb8e 9450{
49c09209
AM
9451 struct bfd_link_info *info = (struct bfd_link_info *) inf;
9452 struct ppc_elf_link_hash_table *htab = ppc_elf_hash_table (info);
a6aa5195 9453 struct plt_entry *ent;
0a1b45a2 9454 bool doneone;
e1a9cb8e 9455
0a1b45a2 9456 doneone = false;
a6aa5195
AM
9457 for (ent = h->plt.plist; ent != NULL; ent = ent->next)
9458 if (ent->plt.offset != (bfd_vma) -1)
9459 {
0a1b45a2 9460 bool dyn = !use_local_plt (info, h);
30845f11 9461
a6aa5195
AM
9462 if (!doneone)
9463 {
9464 Elf_Internal_Rela rela;
9465 bfd_byte *loc;
9466 bfd_vma reloc_index;
2d7ad24e
AM
9467 asection *plt = htab->elf.splt;
9468 asection *relplt = htab->elf.srelplt;
e1a9cb8e 9469
30845f11 9470 if (htab->plt_type == PLT_NEW || !dyn)
9d8504b1
PB
9471 reloc_index = ent->plt.offset / 4;
9472 else
9473 {
9474 reloc_index = ((ent->plt.offset - htab->plt_initial_entry_size)
9475 / htab->plt_slot_size);
9476 if (reloc_index > PLT_NUM_SINGLE_ENTRIES
4a3dc543 9477 && htab->plt_type == PLT_OLD)
9d8504b1
PB
9478 reloc_index -= (reloc_index - PLT_NUM_SINGLE_ENTRIES) / 2;
9479 }
9480
a6aa5195
AM
9481 /* This symbol has an entry in the procedure linkage table.
9482 Set it up. */
30845f11 9483 if (htab->plt_type == PLT_VXWORKS && dyn)
a6aa5195 9484 {
9d8504b1
PB
9485 bfd_vma got_offset;
9486 const bfd_vma *plt_entry;
5b914448 9487
9d8504b1
PB
9488 /* The first three entries in .got.plt are reserved. */
9489 got_offset = (reloc_index + 3) * 4;
9490
9491 /* Use the right PLT. */
0e1862bb 9492 plt_entry = bfd_link_pic (info) ? ppc_elf_vxworks_pic_plt_entry
9d8504b1
PB
9493 : ppc_elf_vxworks_plt_entry;
9494
9495 /* Fill in the .plt on VxWorks. */
0e1862bb 9496 if (bfd_link_pic (info))
9d8504b1 9497 {
49c09209 9498 bfd_put_32 (info->output_bfd,
e87d4038 9499 plt_entry[0] | PPC_HA (got_offset),
2d7ad24e 9500 plt->contents + ent->plt.offset + 0);
49c09209 9501 bfd_put_32 (info->output_bfd,
e87d4038 9502 plt_entry[1] | PPC_LO (got_offset),
2d7ad24e 9503 plt->contents + ent->plt.offset + 4);
9d8504b1
PB
9504 }
9505 else
9506 {
e87d4038 9507 bfd_vma got_loc = got_offset + SYM_VAL (htab->elf.hgot);
9d8504b1 9508
49c09209 9509 bfd_put_32 (info->output_bfd,
e87d4038 9510 plt_entry[0] | PPC_HA (got_loc),
2d7ad24e 9511 plt->contents + ent->plt.offset + 0);
49c09209 9512 bfd_put_32 (info->output_bfd,
e87d4038 9513 plt_entry[1] | PPC_LO (got_loc),
2d7ad24e 9514 plt->contents + ent->plt.offset + 4);
9d8504b1
PB
9515 }
9516
49c09209 9517 bfd_put_32 (info->output_bfd, plt_entry[2],
2d7ad24e 9518 plt->contents + ent->plt.offset + 8);
49c09209 9519 bfd_put_32 (info->output_bfd, plt_entry[3],
2d7ad24e 9520 plt->contents + ent->plt.offset + 12);
9d8504b1
PB
9521
9522 /* This instruction is an immediate load. The value loaded is
9523 the byte offset of the R_PPC_JMP_SLOT relocation from the
9524 start of the .rela.plt section. The value is stored in the
9525 low-order 16 bits of the load instruction. */
9526 /* NOTE: It appears that this is now an index rather than a
9527 prescaled offset. */
49c09209 9528 bfd_put_32 (info->output_bfd,
9d8504b1 9529 plt_entry[4] | reloc_index,
2d7ad24e 9530 plt->contents + ent->plt.offset + 16);
9d8504b1
PB
9531 /* This instruction is a PC-relative branch whose target is
9532 the start of the PLT section. The address of this branch
9533 instruction is 20 bytes beyond the start of this PLT entry.
9534 The address is encoded in bits 6-29, inclusive. The value
9535 stored is right-shifted by two bits, permitting a 26-bit
9536 offset. */
49c09209 9537 bfd_put_32 (info->output_bfd,
5b914448 9538 (plt_entry[5]
9d8504b1 9539 | (-(ent->plt.offset + 20) & 0x03fffffc)),
2d7ad24e 9540 plt->contents + ent->plt.offset + 20);
49c09209 9541 bfd_put_32 (info->output_bfd, plt_entry[6],
2d7ad24e 9542 plt->contents + ent->plt.offset + 24);
49c09209 9543 bfd_put_32 (info->output_bfd, plt_entry[7],
2d7ad24e 9544 plt->contents + ent->plt.offset + 28);
9d8504b1
PB
9545
9546 /* Fill in the GOT entry corresponding to this PLT slot with
a8685210 9547 the address immediately after the "bctr" instruction
9d8504b1 9548 in this PLT entry. */
2d7ad24e
AM
9549 bfd_put_32 (info->output_bfd, (plt->output_section->vma
9550 + plt->output_offset
9551 + ent->plt.offset + 16),
ce558b89 9552 htab->elf.sgotplt->contents + got_offset);
9d8504b1 9553
0e1862bb 9554 if (!bfd_link_pic (info))
9d8504b1
PB
9555 {
9556 /* Fill in a couple of entries in .rela.plt.unloaded. */
9557 loc = htab->srelplt2->contents
9558 + ((VXWORKS_PLTRESOLVE_RELOCS + reloc_index
9559 * VXWORKS_PLT_NON_JMP_SLOT_RELOCS)
9560 * sizeof (Elf32_External_Rela));
9561
9562 /* Provide the @ha relocation for the first instruction. */
2d7ad24e
AM
9563 rela.r_offset = (plt->output_section->vma
9564 + plt->output_offset
9d8504b1 9565 + ent->plt.offset + 2);
636ce3f5 9566 rela.r_info = ELF32_R_INFO (htab->elf.hgot->indx,
9d8504b1
PB
9567 R_PPC_ADDR16_HA);
9568 rela.r_addend = got_offset;
49c09209 9569 bfd_elf32_swap_reloca_out (info->output_bfd, &rela, loc);
9d8504b1
PB
9570 loc += sizeof (Elf32_External_Rela);
9571
9572 /* Provide the @l relocation for the second instruction. */
2d7ad24e
AM
9573 rela.r_offset = (plt->output_section->vma
9574 + plt->output_offset
9d8504b1 9575 + ent->plt.offset + 6);
636ce3f5 9576 rela.r_info = ELF32_R_INFO (htab->elf.hgot->indx,
9d8504b1
PB
9577 R_PPC_ADDR16_LO);
9578 rela.r_addend = got_offset;
49c09209 9579 bfd_elf32_swap_reloca_out (info->output_bfd, &rela, loc);
9d8504b1
PB
9580 loc += sizeof (Elf32_External_Rela);
9581
9582 /* Provide a relocation for the GOT entry corresponding to this
9583 PLT slot. Point it at the middle of the .plt entry. */
ce558b89
AM
9584 rela.r_offset = (htab->elf.sgotplt->output_section->vma
9585 + htab->elf.sgotplt->output_offset
9d8504b1 9586 + got_offset);
7325306f 9587 rela.r_info = ELF32_R_INFO (htab->elf.hplt->indx,
9d8504b1
PB
9588 R_PPC_ADDR32);
9589 rela.r_addend = ent->plt.offset + 16;
49c09209 9590 bfd_elf32_swap_reloca_out (info->output_bfd, &rela, loc);
9d8504b1
PB
9591 }
9592
9593 /* VxWorks uses non-standard semantics for R_PPC_JMP_SLOT.
9594 In particular, the offset for the relocation is not the
9595 address of the PLT entry for this function, as specified
9596 by the ABI. Instead, the offset is set to the address of
9597 the GOT slot for this function. See EABI 4.4.4.1. */
ce558b89
AM
9598 rela.r_offset = (htab->elf.sgotplt->output_section->vma
9599 + htab->elf.sgotplt->output_offset
9d8504b1 9600 + got_offset);
2d7ad24e 9601 rela.r_addend = 0;
a6aa5195
AM
9602 }
9603 else
9604 {
2d7ad24e 9605 rela.r_addend = 0;
30845f11 9606 if (!dyn)
2d7ad24e
AM
9607 {
9608 if (h->type == STT_GNU_IFUNC)
9609 {
9610 plt = htab->elf.iplt;
9611 relplt = htab->elf.irelplt;
9612 }
9613 else
9614 {
9615 plt = htab->pltlocal;
9616 relplt = bfd_link_pic (info) ? htab->relpltlocal : NULL;
9617 }
9618 if (h->def_regular
9619 && (h->root.type == bfd_link_hash_defined
9620 || h->root.type == bfd_link_hash_defweak))
9621 rela.r_addend = SYM_VAL (h);
9622 }
e054468f 9623
2d7ad24e 9624 if (relplt == NULL)
9d8504b1 9625 {
2d7ad24e
AM
9626 loc = plt->contents + ent->plt.offset;
9627 bfd_put_32 (info->output_bfd, rela.r_addend, loc);
9d8504b1
PB
9628 }
9629 else
9630 {
2d7ad24e
AM
9631 rela.r_offset = (plt->output_section->vma
9632 + plt->output_offset
9633 + ent->plt.offset);
9634
30845f11 9635 if (htab->plt_type == PLT_OLD || !dyn)
2d7ad24e
AM
9636 {
9637 /* We don't need to fill in the .plt. The ppc dynamic
9638 linker will fill it in. */
9639 }
9640 else
9641 {
9642 bfd_vma val = (htab->glink_pltresolve + ent->plt.offset
9643 + htab->glink->output_section->vma
9644 + htab->glink->output_offset);
9645 bfd_put_32 (info->output_bfd, val,
9646 plt->contents + ent->plt.offset);
9647 }
9d8504b1 9648 }
a6aa5195 9649 }
e1a9cb8e 9650
2d7ad24e 9651 if (relplt != NULL)
e054468f 9652 {
2d7ad24e 9653 /* Fill in the entry in the .rela.plt section. */
30845f11 9654 if (!dyn)
2d7ad24e
AM
9655 {
9656 if (h->type == STT_GNU_IFUNC)
9657 rela.r_info = ELF32_R_INFO (0, R_PPC_IRELATIVE);
9658 else
9659 rela.r_info = ELF32_R_INFO (0, R_PPC_RELATIVE);
9660 loc = relplt->contents + (relplt->reloc_count++
9661 * sizeof (Elf32_External_Rela));
9662 htab->local_ifunc_resolver = 1;
9663 }
9664 else
9665 {
9666 rela.r_info = ELF32_R_INFO (h->dynindx, R_PPC_JMP_SLOT);
9667 loc = relplt->contents + (reloc_index
9668 * sizeof (Elf32_External_Rela));
9669 if (h->type == STT_GNU_IFUNC && is_static_defined (h))
9670 htab->maybe_local_ifunc_resolver = 1;
9671 }
9672 bfd_elf32_swap_reloca_out (info->output_bfd, &rela, loc);
82e66161 9673 }
0a1b45a2 9674 doneone = true;
a6aa5195 9675 }
e1a9cb8e 9676
30845f11 9677 if (htab->plt_type == PLT_NEW || !dyn)
a6aa5195 9678 {
a7f2871e 9679 unsigned char *p;
49c09209 9680 asection *plt = htab->elf.splt;
9e390558 9681
30845f11 9682 if (!dyn)
2d7ad24e
AM
9683 {
9684 if (h->type == STT_GNU_IFUNC)
9685 plt = htab->elf.iplt;
9686 else
9687 break;
9688 }
e1a9cb8e 9689
a7f2871e 9690 p = (unsigned char *) htab->glink->contents + ent->glink_offset;
49c09209 9691 write_glink_stub (h, ent, plt, p, info);
e1a9cb8e 9692
0e1862bb 9693 if (!bfd_link_pic (info))
e054468f
AM
9694 /* We only need one non-PIC glink stub. */
9695 break;
a6aa5195
AM
9696 }
9697 else
9698 break;
9699 }
0a1b45a2 9700 return true;
49c09209
AM
9701}
9702
9703/* Finish up PLT handling. */
9704
0a1b45a2 9705bool
49c09209
AM
9706ppc_finish_symbols (struct bfd_link_info *info)
9707{
9708 struct ppc_elf_link_hash_table *htab = ppc_elf_hash_table (info);
9709 bfd *ibfd;
9710
9711 if (!htab)
0a1b45a2 9712 return true;
49c09209
AM
9713
9714 elf_link_hash_traverse (&htab->elf, write_global_sym_plt, info);
9715
9716 for (ibfd = info->input_bfds; ibfd != NULL; ibfd = ibfd->link.next)
9717 {
9718 bfd_vma *local_got, *end_local_got;
9719 struct plt_entry **local_plt, **lplt, **end_local_plt;
9720 Elf_Internal_Shdr *symtab_hdr;
9721 bfd_size_type locsymcount;
9722 Elf_Internal_Sym *local_syms = NULL;
9723 struct plt_entry *ent;
9724
9725 if (!is_ppc_elf (ibfd))
9726 continue;
9727
9728 local_got = elf_local_got_offsets (ibfd);
9729 if (!local_got)
9730 continue;
9731
9732 symtab_hdr = &elf_symtab_hdr (ibfd);
9733 locsymcount = symtab_hdr->sh_info;
9734 end_local_got = local_got + locsymcount;
9735 local_plt = (struct plt_entry **) end_local_got;
9736 end_local_plt = local_plt + locsymcount;
9737 for (lplt = local_plt; lplt < end_local_plt; ++lplt)
9738 for (ent = *lplt; ent != NULL; ent = ent->next)
9739 {
9740 if (ent->plt.offset != (bfd_vma) -1)
9741 {
9742 Elf_Internal_Sym *sym;
9743 asection *sym_sec;
9744 asection *plt, *relplt;
9745 bfd_byte *loc;
9746 bfd_vma val;
9747 Elf_Internal_Rela rela;
8cd1fe1b 9748 unsigned char *p;
49c09209
AM
9749
9750 if (!get_sym_h (NULL, &sym, &sym_sec, NULL, &local_syms,
9751 lplt - local_plt, ibfd))
9752 {
c9594989 9753 if (symtab_hdr->contents != (unsigned char *) local_syms)
49c09209 9754 free (local_syms);
0a1b45a2 9755 return false;
49c09209
AM
9756 }
9757
9758 val = sym->st_value;
9759 if (sym_sec != NULL && sym_sec->output_section != NULL)
9760 val += sym_sec->output_offset + sym_sec->output_section->vma;
9761
2d7ad24e
AM
9762 if (ELF_ST_TYPE (sym->st_info) == STT_GNU_IFUNC)
9763 {
9764 htab->local_ifunc_resolver = 1;
9765 plt = htab->elf.iplt;
9766 relplt = htab->elf.irelplt;
9767 rela.r_info = ELF32_R_INFO (0, R_PPC_IRELATIVE);
9768 }
9769 else
9770 {
9771 plt = htab->pltlocal;
9772 if (bfd_link_pic (info))
9773 {
9774 relplt = htab->relpltlocal;
9775 rela.r_info = ELF32_R_INFO (0, R_PPC_RELATIVE);
9776 }
9777 else
9778 {
9779 loc = plt->contents + ent->plt.offset;
9780 bfd_put_32 (info->output_bfd, val, loc);
9781 continue;
9782 }
9783 }
49c09209
AM
9784
9785 rela.r_offset = (ent->plt.offset
9786 + plt->output_offset
9787 + plt->output_section->vma);
49c09209
AM
9788 rela.r_addend = val;
9789 loc = relplt->contents + (relplt->reloc_count++
9790 * sizeof (Elf32_External_Rela));
9791 bfd_elf32_swap_reloca_out (info->output_bfd, &rela, loc);
49c09209 9792
8cd1fe1b 9793 p = (unsigned char *) htab->glink->contents + ent->glink_offset;
49c09209 9794 write_glink_stub (NULL, ent, htab->elf.iplt, p, info);
49c09209
AM
9795 }
9796 }
9797
9798 if (local_syms != NULL
9799 && symtab_hdr->contents != (unsigned char *) local_syms)
9800 {
9801 if (!info->keep_memory)
9802 free (local_syms);
9803 else
9804 symtab_hdr->contents = (unsigned char *) local_syms;
9805 }
9806 }
0a1b45a2 9807 return true;
49c09209
AM
9808}
9809
9810/* Finish up dynamic symbol handling. We set the contents of various
9811 dynamic sections here. */
9812
0a1b45a2 9813static bool
49c09209
AM
9814ppc_elf_finish_dynamic_symbol (bfd *output_bfd,
9815 struct bfd_link_info *info,
9816 struct elf_link_hash_entry *h,
9817 Elf_Internal_Sym *sym)
9818{
9819 struct ppc_elf_link_hash_table *htab = ppc_elf_hash_table (info);
9820 struct plt_entry *ent;
9821
9822#ifdef DEBUG
9823 fprintf (stderr, "ppc_elf_finish_dynamic_symbol called for %s",
9824 h->root.root.string);
9825#endif
9826
9827 if (!h->def_regular
9828 || (h->type == STT_GNU_IFUNC && !bfd_link_pic (info)))
9829 for (ent = h->plt.plist; ent != NULL; ent = ent->next)
9830 if (ent->plt.offset != (bfd_vma) -1)
9831 {
9832 if (!h->def_regular)
9833 {
9834 /* Mark the symbol as undefined, rather than as
9835 defined in the .plt section. Leave the value if
9836 there were any relocations where pointer equality
9837 matters (this is a clue for the dynamic linker, to
9838 make function pointer comparisons work between an
9839 application and shared library), otherwise set it
9840 to zero. */
9841 sym->st_shndx = SHN_UNDEF;
9842 if (!h->pointer_equality_needed)
9843 sym->st_value = 0;
9844 else if (!h->ref_regular_nonweak)
9845 {
9846 /* This breaks function pointer comparisons, but
9847 that is better than breaking tests for a NULL
9848 function pointer. */
9849 sym->st_value = 0;
9850 }
9851 }
9852 else
9853 {
9854 /* Set the value of ifunc symbols in a non-pie
9855 executable to the glink entry. This is to avoid
9856 text relocations. We can't do this for ifunc in
9857 allocate_dynrelocs, as we do for normal dynamic
9858 function symbols with plt entries, because we need
9859 to keep the original value around for the ifunc
9860 relocation. */
9861 sym->st_shndx
9862 = (_bfd_elf_section_from_bfd_section
9863 (info->output_bfd, htab->glink->output_section));
9864 sym->st_value = (ent->glink_offset
9865 + htab->glink->output_offset
9866 + htab->glink->output_section->vma);
9867 }
9868 break;
9869 }
e1a9cb8e 9870
25dbc73a
AM
9871 if (h->needs_copy)
9872 {
9873 asection *s;
9874 Elf_Internal_Rela rela;
9875 bfd_byte *loc;
e1a9cb8e 9876
25dbc73a 9877 /* This symbols needs a copy reloc. Set it up. */
e1a9cb8e 9878
25dbc73a
AM
9879#ifdef DEBUG
9880 fprintf (stderr, ", copy");
9881#endif
e1a9cb8e 9882
25dbc73a 9883 BFD_ASSERT (h->dynindx != -1);
86bbe32f 9884
4dc4a9a5 9885 if (ppc_elf_hash_entry (h)->has_sda_refs)
25dbc73a 9886 s = htab->relsbss;
afbf7e8e 9887 else if (h->root.u.def.section == htab->elf.sdynrelro)
5474d94f 9888 s = htab->elf.sreldynrelro;
25dbc73a 9889 else
9d19e4fd 9890 s = htab->elf.srelbss;
25dbc73a 9891 BFD_ASSERT (s != NULL);
e1a9cb8e 9892
e87d4038 9893 rela.r_offset = SYM_VAL (h);
25dbc73a
AM
9894 rela.r_info = ELF32_R_INFO (h->dynindx, R_PPC_COPY);
9895 rela.r_addend = 0;
9896 loc = s->contents + s->reloc_count++ * sizeof (Elf32_External_Rela);
9897 bfd_elf32_swap_reloca_out (output_bfd, &rela, loc);
9898 }
e1a9cb8e 9899
25dbc73a
AM
9900#ifdef DEBUG
9901 fprintf (stderr, "\n");
9902#endif
e1a9cb8e 9903
0a1b45a2 9904 return true;
25dbc73a
AM
9905}
9906\f
9907static enum elf_reloc_type_class
7e612e98
AM
9908ppc_elf_reloc_type_class (const struct bfd_link_info *info,
9909 const asection *rel_sec,
9910 const Elf_Internal_Rela *rela)
e1a9cb8e 9911{
7e612e98
AM
9912 struct ppc_elf_link_hash_table *htab = ppc_elf_hash_table (info);
9913
ce558b89 9914 if (rel_sec == htab->elf.irelplt)
7e612e98
AM
9915 return reloc_class_ifunc;
9916
25dbc73a
AM
9917 switch (ELF32_R_TYPE (rela->r_info))
9918 {
9919 case R_PPC_RELATIVE:
9920 return reloc_class_relative;
25dbc73a
AM
9921 case R_PPC_JMP_SLOT:
9922 return reloc_class_plt;
9923 case R_PPC_COPY:
9924 return reloc_class_copy;
9925 default:
9926 return reloc_class_normal;
9927 }
e1a9cb8e 9928}
25dbc73a
AM
9929\f
9930/* Finish up the dynamic sections. */
e1a9cb8e 9931
0a1b45a2 9932static bool
25dbc73a
AM
9933ppc_elf_finish_dynamic_sections (bfd *output_bfd,
9934 struct bfd_link_info *info)
e1a9cb8e 9935{
25dbc73a
AM
9936 asection *sdyn;
9937 struct ppc_elf_link_hash_table *htab;
1fe44d79 9938 bfd_vma got;
e87d4038 9939 bfd *dynobj;
0a1b45a2 9940 bool ret = true;
e1a9cb8e 9941
25dbc73a
AM
9942#ifdef DEBUG
9943 fprintf (stderr, "ppc_elf_finish_dynamic_sections called\n");
9944#endif
6b0817e5 9945
25dbc73a 9946 htab = ppc_elf_hash_table (info);
ce558b89 9947 dynobj = htab->elf.dynobj;
3d4d4302 9948 sdyn = bfd_get_linker_section (dynobj, ".dynamic");
e1a9cb8e 9949
1fe44d79
AM
9950 got = 0;
9951 if (htab->elf.hgot != NULL)
e87d4038 9952 got = SYM_VAL (htab->elf.hgot);
1fe44d79 9953
25dbc73a 9954 if (htab->elf.dynamic_sections_created)
e1a9cb8e 9955 {
25dbc73a 9956 Elf32_External_Dyn *dyncon, *dynconend;
e1a9cb8e 9957
ce558b89 9958 BFD_ASSERT (htab->elf.splt != NULL && sdyn != NULL);
86bbe32f 9959
25dbc73a
AM
9960 dyncon = (Elf32_External_Dyn *) sdyn->contents;
9961 dynconend = (Elf32_External_Dyn *) (sdyn->contents + sdyn->size);
9962 for (; dyncon < dynconend; dyncon++)
9963 {
9964 Elf_Internal_Dyn dyn;
9965 asection *s;
e1a9cb8e 9966
9d8504b1 9967 bfd_elf32_swap_dyn_in (dynobj, dyncon, &dyn);
86bbe32f 9968
25dbc73a
AM
9969 switch (dyn.d_tag)
9970 {
9971 case DT_PLTGOT:
90c14f0c 9972 if (htab->elf.target_os == is_vxworks)
ce558b89 9973 s = htab->elf.sgotplt;
9d8504b1 9974 else
ce558b89 9975 s = htab->elf.splt;
25dbc73a
AM
9976 dyn.d_un.d_ptr = s->output_section->vma + s->output_offset;
9977 break;
86bbe32f 9978
25dbc73a 9979 case DT_PLTRELSZ:
ce558b89 9980 dyn.d_un.d_val = htab->elf.srelplt->size;
25dbc73a 9981 break;
e1a9cb8e 9982
25dbc73a 9983 case DT_JMPREL:
ce558b89 9984 s = htab->elf.srelplt;
25dbc73a
AM
9985 dyn.d_un.d_ptr = s->output_section->vma + s->output_offset;
9986 break;
2f89ff8d 9987
1fe44d79
AM
9988 case DT_PPC_GOT:
9989 dyn.d_un.d_ptr = got;
d7128ce4
AM
9990 break;
9991
82e66161
AM
9992 case DT_TEXTREL:
9993 if (htab->local_ifunc_resolver)
9994 info->callbacks->einfo
9995 (_("%X%P: text relocations and GNU indirect "
9996 "functions will result in a segfault at runtime\n"));
9997 else if (htab->maybe_local_ifunc_resolver)
9998 info->callbacks->einfo
9999 (_("%P: warning: text relocations and GNU indirect "
10000 "functions may result in a segfault at runtime\n"));
10001 continue;
10002
25dbc73a 10003 default:
90c14f0c 10004 if (htab->elf.target_os == is_vxworks
7a2b07ff
NS
10005 && elf_vxworks_finish_dynamic_entry (output_bfd, &dyn))
10006 break;
25dbc73a
AM
10007 continue;
10008 }
4c45e5c9 10009
25dbc73a
AM
10010 bfd_elf32_swap_dyn_out (output_bfd, &dyn, dyncon);
10011 }
10012 }
4c45e5c9 10013
6528b6eb
AM
10014 if (htab->elf.sgot != NULL
10015 && htab->elf.sgot->output_section != bfd_abs_section_ptr)
25dbc73a 10016 {
ce558b89
AM
10017 if (htab->elf.hgot->root.u.def.section == htab->elf.sgot
10018 || htab->elf.hgot->root.u.def.section == htab->elf.sgotplt)
e87d4038 10019 {
e79f5955 10020 unsigned char *p = htab->elf.hgot->root.u.def.section->contents;
2f89ff8d 10021
e87d4038
AM
10022 p += htab->elf.hgot->root.u.def.value;
10023 if (htab->plt_type == PLT_OLD)
e79f5955
AM
10024 {
10025 /* Add a blrl instruction at _GLOBAL_OFFSET_TABLE_-4
10026 so that a function can easily find the address of
10027 _GLOBAL_OFFSET_TABLE_. */
10028 BFD_ASSERT (htab->elf.hgot->root.u.def.value - 4
10029 < htab->elf.hgot->root.u.def.section->size);
10030 bfd_put_32 (output_bfd, 0x4e800021, p - 4);
10031 }
3b36f7e6 10032
e87d4038 10033 if (sdyn != NULL)
e79f5955
AM
10034 {
10035 bfd_vma val = sdyn->output_section->vma + sdyn->output_offset;
10036 BFD_ASSERT (htab->elf.hgot->root.u.def.value
10037 < htab->elf.hgot->root.u.def.section->size);
10038 bfd_put_32 (output_bfd, val, p);
10039 }
e87d4038
AM
10040 }
10041 else
10042 {
695344c0 10043 /* xgettext:c-format */
cf97bcb0
AM
10044 _bfd_error_handler (_("%s not defined in linker created %pA"),
10045 htab->elf.hgot->root.root.string,
10046 (htab->elf.sgotplt != NULL
10047 ? htab->elf.sgotplt : htab->elf.sgot));
e87d4038 10048 bfd_set_error (bfd_error_bad_value);
0a1b45a2 10049 ret = false;
e87d4038 10050 }
25dbc73a 10051
ce558b89 10052 elf_section_data (htab->elf.sgot->output_section)->this_hdr.sh_entsize = 4;
25dbc73a
AM
10053 }
10054
9d8504b1 10055 /* Fill in the first entry in the VxWorks procedure linkage table. */
90c14f0c 10056 if (htab->elf.target_os == is_vxworks
6528b6eb
AM
10057 && htab->elf.splt != NULL
10058 && htab->elf.splt->size != 0
10059 && htab->elf.splt->output_section != bfd_abs_section_ptr)
9d8504b1 10060 {
6528b6eb 10061 asection *splt = htab->elf.splt;
9d8504b1 10062 /* Use the right PLT. */
0e1862bb 10063 const bfd_vma *plt_entry = (bfd_link_pic (info)
5b914448
AM
10064 ? ppc_elf_vxworks_pic_plt0_entry
10065 : ppc_elf_vxworks_plt0_entry);
9d8504b1 10066
0e1862bb 10067 if (!bfd_link_pic (info))
9d8504b1 10068 {
e87d4038 10069 bfd_vma got_value = SYM_VAL (htab->elf.hgot);
9d8504b1 10070
e87d4038 10071 bfd_put_32 (output_bfd, plt_entry[0] | PPC_HA (got_value),
9d8504b1 10072 splt->contents + 0);
e87d4038 10073 bfd_put_32 (output_bfd, plt_entry[1] | PPC_LO (got_value),
9d8504b1
PB
10074 splt->contents + 4);
10075 }
10076 else
10077 {
10078 bfd_put_32 (output_bfd, plt_entry[0], splt->contents + 0);
10079 bfd_put_32 (output_bfd, plt_entry[1], splt->contents + 4);
10080 }
10081 bfd_put_32 (output_bfd, plt_entry[2], splt->contents + 8);
10082 bfd_put_32 (output_bfd, plt_entry[3], splt->contents + 12);
10083 bfd_put_32 (output_bfd, plt_entry[4], splt->contents + 16);
10084 bfd_put_32 (output_bfd, plt_entry[5], splt->contents + 20);
10085 bfd_put_32 (output_bfd, plt_entry[6], splt->contents + 24);
10086 bfd_put_32 (output_bfd, plt_entry[7], splt->contents + 28);
10087
0e1862bb 10088 if (! bfd_link_pic (info))
9d8504b1
PB
10089 {
10090 Elf_Internal_Rela rela;
10091 bfd_byte *loc;
10092
10093 loc = htab->srelplt2->contents;
10094
10095 /* Output the @ha relocation for the first instruction. */
ce558b89
AM
10096 rela.r_offset = (htab->elf.splt->output_section->vma
10097 + htab->elf.splt->output_offset
9d8504b1 10098 + 2);
636ce3f5 10099 rela.r_info = ELF32_R_INFO (htab->elf.hgot->indx, R_PPC_ADDR16_HA);
9d8504b1
PB
10100 rela.r_addend = 0;
10101 bfd_elf32_swap_reloca_out (output_bfd, &rela, loc);
10102 loc += sizeof (Elf32_External_Rela);
5b914448 10103
9d8504b1 10104 /* Output the @l relocation for the second instruction. */
ce558b89
AM
10105 rela.r_offset = (htab->elf.splt->output_section->vma
10106 + htab->elf.splt->output_offset
9d8504b1 10107 + 6);
636ce3f5 10108 rela.r_info = ELF32_R_INFO (htab->elf.hgot->indx, R_PPC_ADDR16_LO);
9d8504b1
PB
10109 rela.r_addend = 0;
10110 bfd_elf32_swap_reloca_out (output_bfd, &rela, loc);
10111 loc += sizeof (Elf32_External_Rela);
10112
10113 /* Fix up the remaining relocations. They may have the wrong
10114 symbol index for _G_O_T_ or _P_L_T_ depending on the order
10115 in which symbols were output. */
10116 while (loc < htab->srelplt2->contents + htab->srelplt2->size)
10117 {
10118 Elf_Internal_Rela rel;
10119
10120 bfd_elf32_swap_reloc_in (output_bfd, loc, &rel);
636ce3f5 10121 rel.r_info = ELF32_R_INFO (htab->elf.hgot->indx, R_PPC_ADDR16_HA);
9d8504b1
PB
10122 bfd_elf32_swap_reloc_out (output_bfd, &rel, loc);
10123 loc += sizeof (Elf32_External_Rela);
10124
10125 bfd_elf32_swap_reloc_in (output_bfd, loc, &rel);
636ce3f5 10126 rel.r_info = ELF32_R_INFO (htab->elf.hgot->indx, R_PPC_ADDR16_LO);
9d8504b1
PB
10127 bfd_elf32_swap_reloc_out (output_bfd, &rel, loc);
10128 loc += sizeof (Elf32_External_Rela);
10129
10130 bfd_elf32_swap_reloc_in (output_bfd, loc, &rel);
7325306f 10131 rel.r_info = ELF32_R_INFO (htab->elf.hplt->indx, R_PPC_ADDR32);
9d8504b1
PB
10132 bfd_elf32_swap_reloc_out (output_bfd, &rel, loc);
10133 loc += sizeof (Elf32_External_Rela);
10134 }
10135 }
10136 }
10137
e054468f
AM
10138 if (htab->glink != NULL
10139 && htab->glink->contents != NULL
10140 && htab->elf.dynamic_sections_created)
d7128ce4
AM
10141 {
10142 unsigned char *p;
10143 unsigned char *endp;
a6aa5195 10144 bfd_vma res0;
a6aa5195
AM
10145
10146 /*
10147 * PIC glink code is the following:
10148 *
10149 * # ith PLT code stub.
10150 * addis 11,30,(plt+(i-1)*4-got)@ha
10151 * lwz 11,(plt+(i-1)*4-got)@l(11)
10152 * mtctr 11
10153 * bctr
10154 *
10155 * # A table of branches, one for each plt entry.
176a0d42 10156 * # The idea is that the plt call stub loads ctr and r11 with these
a6aa5195
AM
10157 * # addresses, so (r11 - res_0) gives the plt index * 4.
10158 * res_0: b PLTresolve
10159 * res_1: b PLTresolve
10160 * .
10161 * # Some number of entries towards the end can be nops
10162 * res_n_m3: nop
10163 * res_n_m2: nop
10164 * res_n_m1:
10165 *
10166 * PLTresolve:
10167 * addis 11,11,(1f-res_0)@ha
10168 * mflr 0
10169 * bcl 20,31,1f
10170 * 1: addi 11,11,(1b-res_0)@l
10171 * mflr 12
10172 * mtlr 0
07d6d2b8 10173 * sub 11,11,12 # r11 = index * 4
a6aa5195 10174 * addis 12,12,(got+4-1b)@ha
07d6d2b8
AM
10175 * lwz 0,(got+4-1b)@l(12) # got[1] address of dl_runtime_resolve
10176 * lwz 12,(got+8-1b)@l(12) # got[2] contains the map address
a6aa5195
AM
10177 * mtctr 0
10178 * add 0,11,11
07d6d2b8 10179 * add 11,0,11 # r11 = index * 12 = reloc offset.
a6aa5195 10180 * bctr
9e390558 10181 *
176a0d42
AM
10182 * Non-PIC glink code is a little simpler.
10183 *
10184 * # ith PLT code stub.
10185 * lis 11,(plt+(i-1)*4)@ha
10186 * lwz 11,(plt+(i-1)*4)@l(11)
10187 * mtctr 11
10188 * bctr
10189 *
10190 * The branch table is the same, then comes
10191 *
10192 * PLTresolve:
10193 * lis 12,(got+4)@ha
10194 * addis 11,11,(-res_0)@ha
07d6d2b8
AM
10195 * lwz 0,(got+4)@l(12) # got[1] address of dl_runtime_resolve
10196 * addi 11,11,(-res_0)@l # r11 = index * 4
176a0d42
AM
10197 * mtctr 0
10198 * add 0,11,11
07d6d2b8
AM
10199 * lwz 12,(got+8)@l(12) # got[2] contains the map address
10200 * add 11,0,11 # r11 = index * 12 = reloc offset.
176a0d42
AM
10201 * bctr
10202 */
7e8aeb9a 10203
a6aa5195 10204 /* Build the branch table, one for each plt entry (less one),
86b9da88 10205 and perhaps some padding. */
a6aa5195
AM
10206 p = htab->glink->contents;
10207 p += htab->glink_pltresolve;
86b9da88
AM
10208 endp = htab->glink->contents;
10209 endp += htab->glink->size - GLINK_PLTRESOLVE;
da3a2088 10210 while (p < endp - (htab->params->ppc476_workaround ? 0 : 8 * 4))
86b9da88
AM
10211 {
10212 bfd_put_32 (output_bfd, B + endp - p, p);
10213 p += 4;
10214 }
10215 while (p < endp)
10216 {
10217 bfd_put_32 (output_bfd, NOP, p);
10218 p += 4;
10219 }
10220
7e8aeb9a 10221 res0 = (htab->glink_pltresolve
86b9da88
AM
10222 + htab->glink->output_section->vma
10223 + htab->glink->output_offset);
10224
da3a2088
AM
10225 if (htab->params->ppc476_workaround)
10226 {
10227 /* Ensure that a call stub at the end of a page doesn't
10228 result in prefetch over the end of the page into the
10229 glink branch table. */
10230 bfd_vma pagesize = (bfd_vma) 1 << htab->params->pagesize_p2;
10231 bfd_vma page_addr;
10232 bfd_vma glink_start = (htab->glink->output_section->vma
10233 + htab->glink->output_offset);
10234
10235 for (page_addr = res0 & -pagesize;
10236 page_addr > glink_start;
10237 page_addr -= pagesize)
10238 {
10239 /* We have a plt call stub that may need fixing. */
10240 bfd_byte *loc;
10241 unsigned int insn;
10242
10243 loc = htab->glink->contents + page_addr - 4 - glink_start;
10244 insn = bfd_get_32 (output_bfd, loc);
10245 if (insn == BCTR)
10246 {
10247 /* By alignment, we know that there must be at least
10248 one other call stub before this one. */
10249 insn = bfd_get_32 (output_bfd, loc - 16);
10250 if (insn == BCTR)
10251 bfd_put_32 (output_bfd, B | (-16 & 0x3fffffc), loc);
10252 else
10253 bfd_put_32 (output_bfd, B | (-20 & 0x3fffffc), loc);
10254 }
10255 }
10256 }
10257
86b9da88 10258 /* Last comes the PLTresolve stub. */
9e390558 10259 endp = p + GLINK_PLTRESOLVE;
0e1862bb 10260 if (bfd_link_pic (info))
7e8aeb9a 10261 {
a6aa5195 10262 bfd_vma bcl;
d7128ce4 10263
a6aa5195
AM
10264 bcl = (htab->glink->size - GLINK_PLTRESOLVE + 3*4
10265 + htab->glink->output_section->vma
10266 + htab->glink->output_offset);
10267
9e390558
AM
10268 bfd_put_32 (output_bfd, ADDIS_11_11 + PPC_HA (bcl - res0), p);
10269 p += 4;
10270 bfd_put_32 (output_bfd, MFLR_0, p);
10271 p += 4;
10272 bfd_put_32 (output_bfd, BCL_20_31, p);
10273 p += 4;
10274 bfd_put_32 (output_bfd, ADDI_11_11 + PPC_LO (bcl - res0), p);
10275 p += 4;
10276 bfd_put_32 (output_bfd, MFLR_12, p);
10277 p += 4;
10278 bfd_put_32 (output_bfd, MTLR_0, p);
10279 p += 4;
10280 bfd_put_32 (output_bfd, SUB_11_11_12, p);
10281 p += 4;
10282 bfd_put_32 (output_bfd, ADDIS_12_12 + PPC_HA (got + 4 - bcl), p);
10283 p += 4;
a6aa5195
AM
10284 if (PPC_HA (got + 4 - bcl) == PPC_HA (got + 8 - bcl))
10285 {
9e390558
AM
10286 bfd_put_32 (output_bfd, LWZ_0_12 + PPC_LO (got + 4 - bcl), p);
10287 p += 4;
10288 bfd_put_32 (output_bfd, LWZ_12_12 + PPC_LO (got + 8 - bcl), p);
10289 p += 4;
a6aa5195
AM
10290 }
10291 else
10292 {
9e390558
AM
10293 bfd_put_32 (output_bfd, LWZU_0_12 + PPC_LO (got + 4 - bcl), p);
10294 p += 4;
10295 bfd_put_32 (output_bfd, LWZ_12_12 + 4, p);
10296 p += 4;
a6aa5195 10297 }
9e390558
AM
10298 bfd_put_32 (output_bfd, MTCTR_0, p);
10299 p += 4;
10300 bfd_put_32 (output_bfd, ADD_0_11_11, p);
7e8aeb9a
AM
10301 }
10302 else
d7128ce4 10303 {
9e390558
AM
10304 bfd_put_32 (output_bfd, LIS_12 + PPC_HA (got + 4), p);
10305 p += 4;
10306 bfd_put_32 (output_bfd, ADDIS_11_11 + PPC_HA (-res0), p);
10307 p += 4;
a6aa5195 10308 if (PPC_HA (got + 4) == PPC_HA (got + 8))
9e390558 10309 bfd_put_32 (output_bfd, LWZ_0_12 + PPC_LO (got + 4), p);
a6aa5195 10310 else
9e390558
AM
10311 bfd_put_32 (output_bfd, LWZU_0_12 + PPC_LO (got + 4), p);
10312 p += 4;
10313 bfd_put_32 (output_bfd, ADDI_11_11 + PPC_LO (-res0), p);
10314 p += 4;
10315 bfd_put_32 (output_bfd, MTCTR_0, p);
10316 p += 4;
10317 bfd_put_32 (output_bfd, ADD_0_11_11, p);
10318 p += 4;
10319 if (PPC_HA (got + 4) == PPC_HA (got + 8))
10320 bfd_put_32 (output_bfd, LWZ_12_12 + PPC_LO (got + 8), p);
10321 else
10322 bfd_put_32 (output_bfd, LWZ_12_12 + 4, p);
10323 }
10324 p += 4;
10325 bfd_put_32 (output_bfd, ADD_11_0_11, p);
10326 p += 4;
407aa07c
AM
10327 bfd_put_32 (output_bfd, BCTR, p);
10328 p += 4;
9e390558
AM
10329 while (p < endp)
10330 {
10331 bfd_put_32 (output_bfd,
10332 htab->params->ppc476_workaround ? BA : NOP, p);
10333 p += 4;
d7128ce4 10334 }
9e390558 10335 BFD_ASSERT (p == endp);
d7128ce4
AM
10336 }
10337
6177242a
AM
10338 if (htab->glink_eh_frame != NULL
10339 && htab->glink_eh_frame->contents != NULL)
10340 {
10341 unsigned char *p = htab->glink_eh_frame->contents;
10342 bfd_vma val;
10343
6177242a
AM
10344 p += sizeof (glink_eh_frame_cie);
10345 /* FDE length. */
6177242a
AM
10346 p += 4;
10347 /* CIE pointer. */
6177242a
AM
10348 p += 4;
10349 /* Offset to .glink. */
10350 val = (htab->glink->output_section->vma
10351 + htab->glink->output_offset);
10352 val -= (htab->glink_eh_frame->output_section->vma
10353 + htab->glink_eh_frame->output_offset);
10354 val -= p - htab->glink_eh_frame->contents;
10355 bfd_put_32 (htab->elf.dynobj, val, p);
6177242a 10356
dbaa2011 10357 if (htab->glink_eh_frame->sec_info_type == SEC_INFO_TYPE_EH_FRAME
6177242a
AM
10358 && !_bfd_elf_write_section_eh_frame (output_bfd, info,
10359 htab->glink_eh_frame,
10360 htab->glink_eh_frame->contents))
0a1b45a2 10361 return false;
6177242a
AM
10362 }
10363
e87d4038 10364 return ret;
25dbc73a 10365}
e1a9cb8e 10366\f
6d00b590 10367#define TARGET_LITTLE_SYM powerpc_elf32_le_vec
252b5132 10368#define TARGET_LITTLE_NAME "elf32-powerpcle"
6d00b590 10369#define TARGET_BIG_SYM powerpc_elf32_vec
252b5132
RH
10370#define TARGET_BIG_NAME "elf32-powerpc"
10371#define ELF_ARCH bfd_arch_powerpc
ae95ffa6 10372#define ELF_TARGET_ID PPC32_ELF_DATA
252b5132
RH
10373#define ELF_MACHINE_CODE EM_PPC
10374#define ELF_MAXPAGESIZE 0x10000
702d1671 10375#define ELF_COMMONPAGESIZE 0x1000
252b5132
RH
10376#define elf_info_to_howto ppc_elf_info_to_howto
10377
10378#ifdef EM_CYGNUS_POWERPC
10379#define ELF_MACHINE_ALT1 EM_CYGNUS_POWERPC
10380#endif
10381
10382#ifdef EM_PPC_OLD
10383#define ELF_MACHINE_ALT2 EM_PPC_OLD
10384#endif
10385
10386#define elf_backend_plt_not_loaded 1
5474d94f 10387#define elf_backend_want_dynrelro 1
252b5132 10388#define elf_backend_can_gc_sections 1
51b64d56 10389#define elf_backend_can_refcount 1
b491616a 10390#define elf_backend_rela_normal 1
53291d1f 10391#define elf_backend_caches_rawsize 1
252b5132 10392
43c40ab2 10393#define bfd_elf32_mkobject ppc_elf_mkobject
252b5132 10394#define bfd_elf32_bfd_merge_private_bfd_data ppc_elf_merge_private_bfd_data
70bccea4 10395#define bfd_elf32_bfd_relax_section ppc_elf_relax_section
252b5132 10396#define bfd_elf32_bfd_reloc_type_lookup ppc_elf_reloc_type_lookup
b9c361e0 10397#define bfd_elf32_bfd_reloc_name_lookup ppc_elf_reloc_name_lookup
252b5132 10398#define bfd_elf32_bfd_set_private_flags ppc_elf_set_private_flags
70bccea4 10399#define bfd_elf32_bfd_link_hash_table_create ppc_elf_link_hash_table_create
468392fb 10400#define bfd_elf32_get_synthetic_symtab ppc_elf_get_synthetic_symtab
252b5132 10401
feee612b 10402#define elf_backend_object_p ppc_elf_object_p
252b5132 10403#define elf_backend_gc_mark_hook ppc_elf_gc_mark_hook
252b5132
RH
10404#define elf_backend_section_from_shdr ppc_elf_section_from_shdr
10405#define elf_backend_relocate_section ppc_elf_relocate_section
10406#define elf_backend_create_dynamic_sections ppc_elf_create_dynamic_sections
10407#define elf_backend_check_relocs ppc_elf_check_relocs
c0e331c7 10408#define elf_backend_relocs_compatible _bfd_elf_relocs_compatible
7fce784e 10409#define elf_backend_copy_indirect_symbol ppc_elf_copy_indirect_symbol
252b5132
RH
10410#define elf_backend_adjust_dynamic_symbol ppc_elf_adjust_dynamic_symbol
10411#define elf_backend_add_symbol_hook ppc_elf_add_symbol_hook
10412#define elf_backend_size_dynamic_sections ppc_elf_size_dynamic_sections
0eb4a168 10413#define elf_backend_hash_symbol ppc_elf_hash_symbol
252b5132
RH
10414#define elf_backend_finish_dynamic_symbol ppc_elf_finish_dynamic_symbol
10415#define elf_backend_finish_dynamic_sections ppc_elf_finish_dynamic_sections
10416#define elf_backend_fake_sections ppc_elf_fake_sections
10417#define elf_backend_additional_program_headers ppc_elf_additional_program_headers
954b63d4 10418#define elf_backend_modify_segment_map ppc_elf_modify_segment_map
c5fccbec
DJ
10419#define elf_backend_grok_prstatus ppc_elf_grok_prstatus
10420#define elf_backend_grok_psinfo ppc_elf_grok_psinfo
183e98be 10421#define elf_backend_write_core_note ppc_elf_write_core_note
29c2fb7c 10422#define elf_backend_reloc_type_class ppc_elf_reloc_type_class
70bccea4
AM
10423#define elf_backend_begin_write_processing ppc_elf_begin_write_processing
10424#define elf_backend_final_write_processing ppc_elf_final_write_processing
10425#define elf_backend_write_section ppc_elf_write_section
551b43fd 10426#define elf_backend_get_sec_type_attr ppc_elf_get_sec_type_attr
4c45e5c9 10427#define elf_backend_plt_sym_val ppc_elf_plt_sym_val
8a696751 10428#define elf_backend_action_discarded ppc_elf_action_discarded
74541ad4 10429#define elf_backend_init_index_section _bfd_elf_init_1_index_section
b9c361e0 10430#define elf_backend_lookup_section_flags_hook ppc_elf_lookup_section_flags
252b5132
RH
10431
10432#include "elf32-target.h"
9d8504b1 10433
7b8e7dad
AM
10434/* FreeBSD Target */
10435
10436#undef TARGET_LITTLE_SYM
10437#undef TARGET_LITTLE_NAME
10438
10439#undef TARGET_BIG_SYM
6d00b590 10440#define TARGET_BIG_SYM powerpc_elf32_fbsd_vec
7b8e7dad
AM
10441#undef TARGET_BIG_NAME
10442#define TARGET_BIG_NAME "elf32-powerpc-freebsd"
10443
10444#undef ELF_OSABI
10445#define ELF_OSABI ELFOSABI_FREEBSD
10446
10447#undef elf32_bed
10448#define elf32_bed elf32_powerpc_fbsd_bed
10449
10450#include "elf32-target.h"
10451
9d8504b1
PB
10452/* VxWorks Target */
10453
10454#undef TARGET_LITTLE_SYM
10455#undef TARGET_LITTLE_NAME
10456
10457#undef TARGET_BIG_SYM
6d00b590 10458#define TARGET_BIG_SYM powerpc_elf32_vxworks_vec
9d8504b1
PB
10459#undef TARGET_BIG_NAME
10460#define TARGET_BIG_NAME "elf32-powerpc-vxworks"
10461
7b8e7dad
AM
10462#undef ELF_OSABI
10463
90c14f0c
L
10464#undef ELF_TARGET_OS
10465#define ELF_TARGET_OS is_vxworks
10466
d5e3d971
PB
10467/* VxWorks uses the elf default section flags for .plt. */
10468static const struct bfd_elf_special_section *
4aef7643 10469ppc_elf_vxworks_get_sec_type_attr (bfd *abfd, asection *sec)
9d8504b1 10470{
d5e3d971
PB
10471 if (sec->name == NULL)
10472 return NULL;
10473
10474 if (strcmp (sec->name, ".plt") == 0)
10475 return _bfd_elf_get_sec_type_attr (abfd, sec);
10476
10477 return ppc_elf_get_sec_type_attr (abfd, sec);
10478}
9d8504b1
PB
10479
10480/* Like ppc_elf_link_hash_table_create, but overrides
10481 appropriately for VxWorks. */
10482static struct bfd_link_hash_table *
10483ppc_elf_vxworks_link_hash_table_create (bfd *abfd)
10484{
10485 struct bfd_link_hash_table *ret;
10486
10487 ret = ppc_elf_link_hash_table_create (abfd);
10488 if (ret)
10489 {
10490 struct ppc_elf_link_hash_table *htab
954b63d4 10491 = (struct ppc_elf_link_hash_table *)ret;
4a3dc543 10492 htab->plt_type = PLT_VXWORKS;
9d8504b1
PB
10493 htab->plt_entry_size = VXWORKS_PLT_ENTRY_SIZE;
10494 htab->plt_slot_size = VXWORKS_PLT_ENTRY_SIZE;
10495 htab->plt_initial_entry_size = VXWORKS_PLT_INITIAL_ENTRY_SIZE;
10496 }
10497 return ret;
10498}
10499
10500/* Tweak magic VxWorks symbols as they are loaded. */
0a1b45a2 10501static bool
9d8504b1
PB
10502ppc_elf_vxworks_add_symbol_hook (bfd *abfd,
10503 struct bfd_link_info *info,
10504 Elf_Internal_Sym *sym,
4aef7643
AM
10505 const char **namep,
10506 flagword *flagsp,
9d8504b1
PB
10507 asection **secp,
10508 bfd_vma *valp)
10509{
4aef7643
AM
10510 if (!elf_vxworks_add_symbol_hook (abfd, info, sym, namep, flagsp, secp,
10511 valp))
0a1b45a2 10512 return false;
9d8504b1 10513
4aef7643 10514 return ppc_elf_add_symbol_hook (abfd, info, sym, namep, flagsp, secp, valp);
9d8504b1
PB
10515}
10516
0a1b45a2 10517static bool
cc364be6 10518ppc_elf_vxworks_final_write_processing (bfd *abfd)
9d8504b1 10519{
cc364be6
AM
10520 ppc_final_write_processing (abfd);
10521 return elf_vxworks_final_write_processing (abfd);
9d8504b1
PB
10522}
10523
10524/* On VxWorks, we emit relocations against _PROCEDURE_LINKAGE_TABLE_, so
10525 define it. */
10526#undef elf_backend_want_plt_sym
10527#define elf_backend_want_plt_sym 1
10528#undef elf_backend_want_got_plt
10529#define elf_backend_want_got_plt 1
10530#undef elf_backend_got_symbol_offset
10531#define elf_backend_got_symbol_offset 0
10532#undef elf_backend_plt_not_loaded
10533#define elf_backend_plt_not_loaded 0
10534#undef elf_backend_plt_readonly
10535#define elf_backend_plt_readonly 1
10536#undef elf_backend_got_header_size
10537#define elf_backend_got_header_size 12
64f52338
AM
10538#undef elf_backend_dtrel_excludes_plt
10539#define elf_backend_dtrel_excludes_plt 1
9d8504b1 10540
468392fb
AM
10541#undef bfd_elf32_get_synthetic_symtab
10542
9d8504b1
PB
10543#undef bfd_elf32_bfd_link_hash_table_create
10544#define bfd_elf32_bfd_link_hash_table_create \
10545 ppc_elf_vxworks_link_hash_table_create
9d8504b1
PB
10546#undef elf_backend_add_symbol_hook
10547#define elf_backend_add_symbol_hook \
10548 ppc_elf_vxworks_add_symbol_hook
10549#undef elf_backend_link_output_symbol_hook
10550#define elf_backend_link_output_symbol_hook \
9c72ff84 10551 elf_vxworks_link_output_symbol_hook
9d8504b1
PB
10552#undef elf_backend_final_write_processing
10553#define elf_backend_final_write_processing \
10554 ppc_elf_vxworks_final_write_processing
d5e3d971
PB
10555#undef elf_backend_get_sec_type_attr
10556#define elf_backend_get_sec_type_attr \
10557 ppc_elf_vxworks_get_sec_type_attr
9d8504b1
PB
10558#undef elf_backend_emit_relocs
10559#define elf_backend_emit_relocs \
10560 elf_vxworks_emit_relocs
10561
10562#undef elf32_bed
10563#define elf32_bed ppc_elf_vxworks_bed
10564
10565#include "elf32-target.h"