]> git.ipfire.org Git - thirdparty/binutils-gdb.git/blame - bfd/elf32-ppc.c
ppc: Fix warning messages when IBM and IEEE long double are mixed
[thirdparty/binutils-gdb.git] / bfd / elf32-ppc.c
CommitLineData
252b5132 1/* PowerPC-specific support for 32-bit ELF
219d1afa 2 Copyright (C) 1994-2018 Free Software Foundation, Inc.
252b5132
RH
3 Written by Ian Lance Taylor, Cygnus Support.
4
ae9a127f 5 This file is part of BFD, the Binary File Descriptor library.
252b5132 6
ae9a127f
NC
7 This program is free software; you can redistribute it and/or modify
8 it under the terms of the GNU General Public License as published by
cd123cb7 9 the Free Software Foundation; either version 3 of the License, or
ae9a127f 10 (at your option) any later version.
252b5132 11
ae9a127f
NC
12 This program is distributed in the hope that it will be useful,
13 but WITHOUT ANY WARRANTY; without even the implied warranty of
14 MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
15 GNU General Public License for more details.
252b5132 16
ae9a127f 17 You should have received a copy of the GNU General Public License
fc0bffd6 18 along with this program; if not, write to the
3e110533 19 Free Software Foundation, Inc., 51 Franklin Street - Fifth Floor,
53e09e0a 20 Boston, MA 02110-1301, USA. */
252b5132 21
cd123cb7 22
252b5132
RH
23/* This file is based on a preliminary PowerPC ELF ABI. The
24 information may not match the final PowerPC ELF ABI. It includes
25 suggestions from the in-progress Embedded PowerPC ABI, and that
26 information may also not match. */
27
3db64b00 28#include "sysdep.h"
183e98be 29#include <stdarg.h>
252b5132 30#include "bfd.h"
252b5132
RH
31#include "bfdlink.h"
32#include "libbfd.h"
33#include "elf-bfd.h"
34#include "elf/ppc.h"
7619e7c7 35#include "elf32-ppc.h"
9d8504b1 36#include "elf-vxworks.h"
6177242a 37#include "dwarf2.h"
08dc996f 38#include "opcode/ppc.h"
252b5132 39
b9c361e0
JL
40typedef enum split16_format_type
41{
42 split16a_type = 0,
43 split16d_type
44}
45split16_format_type;
46
f0fe0e16 47/* RELA relocations are used here. */
252b5132 48
252b5132 49static bfd_reloc_status_type ppc_elf_addr16_ha_reloc
55fd94b0 50 (bfd *, arelent *, asymbol *, void *, asection *, bfd *, char **);
7619e7c7 51static bfd_reloc_status_type ppc_elf_unhandled_reloc
55fd94b0 52 (bfd *, arelent *, asymbol *, void *, asection *, bfd *, char **);
252b5132 53
70bccea4
AM
54/* Branch prediction bit for branch taken relocs. */
55#define BRANCH_PREDICT_BIT 0x200000
56/* Mask to set RA in memory instructions. */
57#define RA_REGISTER_MASK 0x001f0000
58/* Value to shift register by to insert RA. */
59#define RA_REGISTER_SHIFT 16
252b5132
RH
60
61/* The name of the dynamic interpreter. This is put in the .interp
62 section. */
252b5132
RH
63#define ELF_DYNAMIC_INTERPRETER "/usr/lib/ld.so.1"
64
d7128ce4 65/* For old-style PLT. */
252b5132
RH
66/* The number of single-slot PLT entries (the rest use two slots). */
67#define PLT_NUM_SINGLE_ENTRIES 8192
68
d7128ce4 69/* For new-style .glink and .plt. */
a6aa5195 70#define GLINK_PLTRESOLVE 16*4
9e390558 71#define GLINK_ENTRY_SIZE(htab, h) \
407aa07c 72 ((4*4 \
9e390558
AM
73 + (h != NULL \
74 && h == htab->tls_get_addr \
75 && !htab->params->no_tls_get_addr_opt ? 8*4 : 0) \
76 + (1u << htab->params->plt_stub_align) - 1) \
77 & -(1u << htab->params->plt_stub_align))
d7128ce4 78
9d8504b1
PB
79/* VxWorks uses its own plt layout, filled in by the static linker. */
80
81/* The standard VxWorks PLT entry. */
82#define VXWORKS_PLT_ENTRY_SIZE 32
83static const bfd_vma ppc_elf_vxworks_plt_entry
84 [VXWORKS_PLT_ENTRY_SIZE / 4] =
85 {
07d6d2b8
AM
86 0x3d800000, /* lis r12,0 */
87 0x818c0000, /* lwz r12,0(r12) */
88 0x7d8903a6, /* mtctr r12 */
89 0x4e800420, /* bctr */
90 0x39600000, /* li r11,0 */
91 0x48000000, /* b 14 <.PLT0resolve+0x4> */
92 0x60000000, /* nop */
93 0x60000000, /* nop */
9d8504b1
PB
94 };
95static const bfd_vma ppc_elf_vxworks_pic_plt_entry
96 [VXWORKS_PLT_ENTRY_SIZE / 4] =
97 {
98 0x3d9e0000, /* addis r12,r30,0 */
99 0x818c0000, /* lwz r12,0(r12) */
100 0x7d8903a6, /* mtctr r12 */
101 0x4e800420, /* bctr */
102 0x39600000, /* li r11,0 */
103 0x48000000, /* b 14 <.PLT0resolve+0x4> 14: R_PPC_REL24 .PLTresolve */
104 0x60000000, /* nop */
105 0x60000000, /* nop */
106 };
107
108/* The initial VxWorks PLT entry. */
109#define VXWORKS_PLT_INITIAL_ENTRY_SIZE 32
110static const bfd_vma ppc_elf_vxworks_plt0_entry
111 [VXWORKS_PLT_INITIAL_ENTRY_SIZE / 4] =
112 {
07d6d2b8
AM
113 0x3d800000, /* lis r12,0 */
114 0x398c0000, /* addi r12,r12,0 */
115 0x800c0008, /* lwz r0,8(r12) */
116 0x7c0903a6, /* mtctr r0 */
117 0x818c0004, /* lwz r12,4(r12) */
118 0x4e800420, /* bctr */
119 0x60000000, /* nop */
120 0x60000000, /* nop */
9d8504b1
PB
121 };
122static const bfd_vma ppc_elf_vxworks_pic_plt0_entry
123 [VXWORKS_PLT_INITIAL_ENTRY_SIZE / 4] =
124 {
125 0x819e0008, /* lwz r12,8(r30) */
07d6d2b8 126 0x7d8903a6, /* mtctr r12 */
9d8504b1 127 0x819e0004, /* lwz r12,4(r30) */
07d6d2b8
AM
128 0x4e800420, /* bctr */
129 0x60000000, /* nop */
130 0x60000000, /* nop */
131 0x60000000, /* nop */
132 0x60000000, /* nop */
9d8504b1
PB
133 };
134
135/* For executables, we have some additional relocations in
136 .rela.plt.unloaded, for the kernel loader. */
137
138/* The number of non-JMP_SLOT relocations per PLT0 slot. */
139#define VXWORKS_PLT_NON_JMP_SLOT_RELOCS 3
140/* The number of relocations in the PLTResolve slot. */
141#define VXWORKS_PLTRESOLVE_RELOCS 2
de194d85 142/* The number of relocations in the PLTResolve slot when creating
9d8504b1
PB
143 a shared library. */
144#define VXWORKS_PLTRESOLVE_RELOCS_SHLIB 0
145
d7128ce4 146/* Some instructions. */
d7128ce4 147#define ADDIS_11_11 0x3d6b0000
a6aa5195
AM
148#define ADDIS_11_30 0x3d7e0000
149#define ADDIS_12_12 0x3d8c0000
d7128ce4 150#define ADDI_11_11 0x396b0000
d7128ce4 151#define ADD_0_11_11 0x7c0b5a14
a7f2871e 152#define ADD_3_12_2 0x7c6c1214
d7128ce4 153#define ADD_11_0_11 0x7d605a14
a6aa5195 154#define B 0x48000000
da3a2088 155#define BA 0x48000002
a6aa5195 156#define BCL_20_31 0x429f0005
d7128ce4 157#define BCTR 0x4e800420
a7f2871e
AM
158#define BEQLR 0x4d820020
159#define CMPWI_11_0 0x2c0b0000
7e8aeb9a
AM
160#define LIS_11 0x3d600000
161#define LIS_12 0x3d800000
a6aa5195
AM
162#define LWZU_0_12 0x840c0000
163#define LWZ_0_12 0x800c0000
a7f2871e 164#define LWZ_11_3 0x81630000
a6aa5195
AM
165#define LWZ_11_11 0x816b0000
166#define LWZ_11_30 0x817e0000
a7f2871e 167#define LWZ_12_3 0x81830000
a6aa5195 168#define LWZ_12_12 0x818c0000
a7f2871e
AM
169#define MR_0_3 0x7c601b78
170#define MR_3_0 0x7c030378
a6aa5195
AM
171#define MFLR_0 0x7c0802a6
172#define MFLR_12 0x7d8802a6
173#define MTCTR_0 0x7c0903a6
174#define MTCTR_11 0x7d6903a6
175#define MTLR_0 0x7c0803a6
176#define NOP 0x60000000
177#define SUB_11_11_12 0x7d6c5850
7619e7c7
AM
178
179/* Offset of tp and dtp pointers from start of TLS block. */
180#define TP_OFFSET 0x7000
181#define DTP_OFFSET 0x8000
e87d4038
AM
182
183/* The value of a defined global symbol. */
184#define SYM_VAL(SYM) \
185 ((SYM)->root.u.def.section->output_section->vma \
186 + (SYM)->root.u.def.section->output_offset \
187 + (SYM)->root.u.def.value)
7fce784e 188\f
e47cd125 189static reloc_howto_type *ppc_elf_howto_table[R_PPC_max];
252b5132 190
8da6118f 191static reloc_howto_type ppc_elf_howto_raw[] = {
252b5132
RH
192 /* This reloc does nothing. */
193 HOWTO (R_PPC_NONE, /* type */
194 0, /* rightshift */
6346d5ca
AM
195 3, /* size (0 = byte, 1 = short, 2 = long) */
196 0, /* bitsize */
b34976b6 197 FALSE, /* pc_relative */
252b5132 198 0, /* bitpos */
86c95733 199 complain_overflow_dont, /* complain_on_overflow */
252b5132
RH
200 bfd_elf_generic_reloc, /* special_function */
201 "R_PPC_NONE", /* name */
b34976b6 202 FALSE, /* partial_inplace */
252b5132
RH
203 0, /* src_mask */
204 0, /* dst_mask */
b34976b6 205 FALSE), /* pcrel_offset */
252b5132
RH
206
207 /* A standard 32 bit relocation. */
208 HOWTO (R_PPC_ADDR32, /* type */
209 0, /* rightshift */
210 2, /* size (0 = byte, 1 = short, 2 = long) */
211 32, /* bitsize */
b34976b6 212 FALSE, /* pc_relative */
252b5132 213 0, /* bitpos */
86c95733 214 complain_overflow_dont, /* complain_on_overflow */
252b5132
RH
215 bfd_elf_generic_reloc, /* special_function */
216 "R_PPC_ADDR32", /* name */
b34976b6 217 FALSE, /* partial_inplace */
252b5132
RH
218 0, /* src_mask */
219 0xffffffff, /* dst_mask */
b34976b6 220 FALSE), /* pcrel_offset */
252b5132
RH
221
222 /* An absolute 26 bit branch; the lower two bits must be zero.
223 FIXME: we don't check that, we just clear them. */
224 HOWTO (R_PPC_ADDR24, /* type */
225 0, /* rightshift */
226 2, /* size (0 = byte, 1 = short, 2 = long) */
227 26, /* bitsize */
b34976b6 228 FALSE, /* pc_relative */
252b5132 229 0, /* bitpos */
86c95733 230 complain_overflow_signed, /* complain_on_overflow */
252b5132
RH
231 bfd_elf_generic_reloc, /* special_function */
232 "R_PPC_ADDR24", /* name */
b34976b6 233 FALSE, /* partial_inplace */
252b5132
RH
234 0, /* src_mask */
235 0x3fffffc, /* dst_mask */
b34976b6 236 FALSE), /* pcrel_offset */
252b5132
RH
237
238 /* A standard 16 bit relocation. */
239 HOWTO (R_PPC_ADDR16, /* type */
240 0, /* rightshift */
241 1, /* size (0 = byte, 1 = short, 2 = long) */
242 16, /* bitsize */
b34976b6 243 FALSE, /* pc_relative */
252b5132
RH
244 0, /* bitpos */
245 complain_overflow_bitfield, /* complain_on_overflow */
246 bfd_elf_generic_reloc, /* special_function */
247 "R_PPC_ADDR16", /* name */
b34976b6 248 FALSE, /* partial_inplace */
252b5132
RH
249 0, /* src_mask */
250 0xffff, /* dst_mask */
b34976b6 251 FALSE), /* pcrel_offset */
252b5132
RH
252
253 /* A 16 bit relocation without overflow. */
254 HOWTO (R_PPC_ADDR16_LO, /* type */
255 0, /* rightshift */
256 1, /* size (0 = byte, 1 = short, 2 = long) */
257 16, /* bitsize */
b34976b6 258 FALSE, /* pc_relative */
252b5132
RH
259 0, /* bitpos */
260 complain_overflow_dont,/* complain_on_overflow */
261 bfd_elf_generic_reloc, /* special_function */
262 "R_PPC_ADDR16_LO", /* name */
b34976b6 263 FALSE, /* partial_inplace */
252b5132
RH
264 0, /* src_mask */
265 0xffff, /* dst_mask */
b34976b6 266 FALSE), /* pcrel_offset */
252b5132
RH
267
268 /* The high order 16 bits of an address. */
269 HOWTO (R_PPC_ADDR16_HI, /* type */
270 16, /* rightshift */
271 1, /* size (0 = byte, 1 = short, 2 = long) */
272 16, /* bitsize */
b34976b6 273 FALSE, /* pc_relative */
252b5132
RH
274 0, /* bitpos */
275 complain_overflow_dont, /* complain_on_overflow */
276 bfd_elf_generic_reloc, /* special_function */
277 "R_PPC_ADDR16_HI", /* name */
b34976b6 278 FALSE, /* partial_inplace */
252b5132
RH
279 0, /* src_mask */
280 0xffff, /* dst_mask */
b34976b6 281 FALSE), /* pcrel_offset */
252b5132
RH
282
283 /* The high order 16 bits of an address, plus 1 if the contents of
8da6118f 284 the low 16 bits, treated as a signed number, is negative. */
252b5132
RH
285 HOWTO (R_PPC_ADDR16_HA, /* type */
286 16, /* rightshift */
287 1, /* size (0 = byte, 1 = short, 2 = long) */
288 16, /* bitsize */
b34976b6 289 FALSE, /* pc_relative */
252b5132
RH
290 0, /* bitpos */
291 complain_overflow_dont, /* complain_on_overflow */
292 ppc_elf_addr16_ha_reloc, /* special_function */
293 "R_PPC_ADDR16_HA", /* name */
b34976b6 294 FALSE, /* partial_inplace */
252b5132
RH
295 0, /* src_mask */
296 0xffff, /* dst_mask */
b34976b6 297 FALSE), /* pcrel_offset */
252b5132
RH
298
299 /* An absolute 16 bit branch; the lower two bits must be zero.
300 FIXME: we don't check that, we just clear them. */
301 HOWTO (R_PPC_ADDR14, /* type */
302 0, /* rightshift */
303 2, /* size (0 = byte, 1 = short, 2 = long) */
304 16, /* bitsize */
b34976b6 305 FALSE, /* pc_relative */
252b5132 306 0, /* bitpos */
86c95733 307 complain_overflow_signed, /* complain_on_overflow */
252b5132
RH
308 bfd_elf_generic_reloc, /* special_function */
309 "R_PPC_ADDR14", /* name */
b34976b6 310 FALSE, /* partial_inplace */
252b5132
RH
311 0, /* src_mask */
312 0xfffc, /* dst_mask */
b34976b6 313 FALSE), /* pcrel_offset */
252b5132
RH
314
315 /* An absolute 16 bit branch, for which bit 10 should be set to
316 indicate that the branch is expected to be taken. The lower two
8da6118f 317 bits must be zero. */
252b5132
RH
318 HOWTO (R_PPC_ADDR14_BRTAKEN, /* type */
319 0, /* rightshift */
320 2, /* size (0 = byte, 1 = short, 2 = long) */
321 16, /* bitsize */
b34976b6 322 FALSE, /* pc_relative */
252b5132 323 0, /* bitpos */
86c95733 324 complain_overflow_signed, /* complain_on_overflow */
252b5132
RH
325 bfd_elf_generic_reloc, /* special_function */
326 "R_PPC_ADDR14_BRTAKEN",/* name */
b34976b6 327 FALSE, /* partial_inplace */
252b5132
RH
328 0, /* src_mask */
329 0xfffc, /* dst_mask */
b34976b6 330 FALSE), /* pcrel_offset */
252b5132
RH
331
332 /* An absolute 16 bit branch, for which bit 10 should be set to
333 indicate that the branch is not expected to be taken. The lower
334 two bits must be zero. */
335 HOWTO (R_PPC_ADDR14_BRNTAKEN, /* type */
336 0, /* rightshift */
337 2, /* size (0 = byte, 1 = short, 2 = long) */
338 16, /* bitsize */
b34976b6 339 FALSE, /* pc_relative */
252b5132 340 0, /* bitpos */
86c95733 341 complain_overflow_signed, /* complain_on_overflow */
252b5132
RH
342 bfd_elf_generic_reloc, /* special_function */
343 "R_PPC_ADDR14_BRNTAKEN",/* name */
b34976b6 344 FALSE, /* partial_inplace */
252b5132
RH
345 0, /* src_mask */
346 0xfffc, /* dst_mask */
b34976b6 347 FALSE), /* pcrel_offset */
252b5132 348
8da6118f 349 /* A relative 26 bit branch; the lower two bits must be zero. */
252b5132
RH
350 HOWTO (R_PPC_REL24, /* type */
351 0, /* rightshift */
352 2, /* size (0 = byte, 1 = short, 2 = long) */
353 26, /* bitsize */
b34976b6 354 TRUE, /* pc_relative */
252b5132
RH
355 0, /* bitpos */
356 complain_overflow_signed, /* complain_on_overflow */
357 bfd_elf_generic_reloc, /* special_function */
358 "R_PPC_REL24", /* name */
b34976b6 359 FALSE, /* partial_inplace */
252b5132
RH
360 0, /* src_mask */
361 0x3fffffc, /* dst_mask */
b34976b6 362 TRUE), /* pcrel_offset */
252b5132 363
8da6118f 364 /* A relative 16 bit branch; the lower two bits must be zero. */
252b5132
RH
365 HOWTO (R_PPC_REL14, /* type */
366 0, /* rightshift */
367 2, /* size (0 = byte, 1 = short, 2 = long) */
368 16, /* bitsize */
b34976b6 369 TRUE, /* pc_relative */
252b5132
RH
370 0, /* bitpos */
371 complain_overflow_signed, /* complain_on_overflow */
372 bfd_elf_generic_reloc, /* special_function */
373 "R_PPC_REL14", /* name */
b34976b6 374 FALSE, /* partial_inplace */
252b5132
RH
375 0, /* src_mask */
376 0xfffc, /* dst_mask */
b34976b6 377 TRUE), /* pcrel_offset */
252b5132 378
8da6118f 379 /* A relative 16 bit branch. Bit 10 should be set to indicate that
252b5132
RH
380 the branch is expected to be taken. The lower two bits must be
381 zero. */
382 HOWTO (R_PPC_REL14_BRTAKEN, /* type */
383 0, /* rightshift */
384 2, /* size (0 = byte, 1 = short, 2 = long) */
385 16, /* bitsize */
b34976b6 386 TRUE, /* pc_relative */
252b5132
RH
387 0, /* bitpos */
388 complain_overflow_signed, /* complain_on_overflow */
389 bfd_elf_generic_reloc, /* special_function */
390 "R_PPC_REL14_BRTAKEN", /* name */
b34976b6 391 FALSE, /* partial_inplace */
252b5132
RH
392 0, /* src_mask */
393 0xfffc, /* dst_mask */
b34976b6 394 TRUE), /* pcrel_offset */
252b5132 395
8da6118f 396 /* A relative 16 bit branch. Bit 10 should be set to indicate that
252b5132
RH
397 the branch is not expected to be taken. The lower two bits must
398 be zero. */
399 HOWTO (R_PPC_REL14_BRNTAKEN, /* type */
400 0, /* rightshift */
401 2, /* size (0 = byte, 1 = short, 2 = long) */
402 16, /* bitsize */
b34976b6 403 TRUE, /* pc_relative */
252b5132
RH
404 0, /* bitpos */
405 complain_overflow_signed, /* complain_on_overflow */
406 bfd_elf_generic_reloc, /* special_function */
407 "R_PPC_REL14_BRNTAKEN",/* name */
b34976b6 408 FALSE, /* partial_inplace */
252b5132
RH
409 0, /* src_mask */
410 0xfffc, /* dst_mask */
b34976b6 411 TRUE), /* pcrel_offset */
252b5132
RH
412
413 /* Like R_PPC_ADDR16, but referring to the GOT table entry for the
414 symbol. */
415 HOWTO (R_PPC_GOT16, /* type */
416 0, /* rightshift */
417 1, /* size (0 = byte, 1 = short, 2 = long) */
418 16, /* bitsize */
b34976b6 419 FALSE, /* pc_relative */
252b5132
RH
420 0, /* bitpos */
421 complain_overflow_signed, /* complain_on_overflow */
3ce51288 422 ppc_elf_unhandled_reloc, /* special_function */
252b5132 423 "R_PPC_GOT16", /* name */
b34976b6 424 FALSE, /* partial_inplace */
252b5132
RH
425 0, /* src_mask */
426 0xffff, /* dst_mask */
b34976b6 427 FALSE), /* pcrel_offset */
252b5132
RH
428
429 /* Like R_PPC_ADDR16_LO, but referring to the GOT table entry for
430 the symbol. */
431 HOWTO (R_PPC_GOT16_LO, /* type */
432 0, /* rightshift */
433 1, /* size (0 = byte, 1 = short, 2 = long) */
434 16, /* bitsize */
b34976b6 435 FALSE, /* pc_relative */
252b5132
RH
436 0, /* bitpos */
437 complain_overflow_dont, /* complain_on_overflow */
3ce51288 438 ppc_elf_unhandled_reloc, /* special_function */
252b5132 439 "R_PPC_GOT16_LO", /* name */
b34976b6 440 FALSE, /* partial_inplace */
252b5132
RH
441 0, /* src_mask */
442 0xffff, /* dst_mask */
b34976b6 443 FALSE), /* pcrel_offset */
252b5132
RH
444
445 /* Like R_PPC_ADDR16_HI, but referring to the GOT table entry for
446 the symbol. */
447 HOWTO (R_PPC_GOT16_HI, /* type */
448 16, /* rightshift */
449 1, /* size (0 = byte, 1 = short, 2 = long) */
450 16, /* bitsize */
b34976b6 451 FALSE, /* pc_relative */
252b5132 452 0, /* bitpos */
86c95733 453 complain_overflow_dont, /* complain_on_overflow */
3ce51288 454 ppc_elf_unhandled_reloc, /* special_function */
252b5132 455 "R_PPC_GOT16_HI", /* name */
b34976b6 456 FALSE, /* partial_inplace */
252b5132
RH
457 0, /* src_mask */
458 0xffff, /* dst_mask */
b34976b6 459 FALSE), /* pcrel_offset */
252b5132
RH
460
461 /* Like R_PPC_ADDR16_HA, but referring to the GOT table entry for
462 the symbol. */
463 HOWTO (R_PPC_GOT16_HA, /* type */
464 16, /* rightshift */
465 1, /* size (0 = byte, 1 = short, 2 = long) */
466 16, /* bitsize */
b34976b6 467 FALSE, /* pc_relative */
252b5132 468 0, /* bitpos */
86c95733 469 complain_overflow_dont, /* complain_on_overflow */
3ce51288 470 ppc_elf_unhandled_reloc, /* special_function */
252b5132 471 "R_PPC_GOT16_HA", /* name */
b34976b6 472 FALSE, /* partial_inplace */
252b5132
RH
473 0, /* src_mask */
474 0xffff, /* dst_mask */
b34976b6 475 FALSE), /* pcrel_offset */
252b5132
RH
476
477 /* Like R_PPC_REL24, but referring to the procedure linkage table
478 entry for the symbol. */
479 HOWTO (R_PPC_PLTREL24, /* type */
480 0, /* rightshift */
481 2, /* size (0 = byte, 1 = short, 2 = long) */
482 26, /* bitsize */
b34976b6 483 TRUE, /* pc_relative */
252b5132 484 0, /* bitpos */
3ce51288
AM
485 complain_overflow_signed, /* complain_on_overflow */
486 ppc_elf_unhandled_reloc, /* special_function */
252b5132 487 "R_PPC_PLTREL24", /* name */
b34976b6 488 FALSE, /* partial_inplace */
252b5132
RH
489 0, /* src_mask */
490 0x3fffffc, /* dst_mask */
b34976b6 491 TRUE), /* pcrel_offset */
252b5132
RH
492
493 /* This is used only by the dynamic linker. The symbol should exist
494 both in the object being run and in some shared library. The
495 dynamic linker copies the data addressed by the symbol from the
496 shared library into the object, because the object being
497 run has to have the data at some particular address. */
498 HOWTO (R_PPC_COPY, /* type */
499 0, /* rightshift */
500 2, /* size (0 = byte, 1 = short, 2 = long) */
501 32, /* bitsize */
b34976b6 502 FALSE, /* pc_relative */
252b5132 503 0, /* bitpos */
86c95733 504 complain_overflow_dont, /* complain_on_overflow */
3ce51288 505 ppc_elf_unhandled_reloc, /* special_function */
252b5132 506 "R_PPC_COPY", /* name */
b34976b6 507 FALSE, /* partial_inplace */
252b5132
RH
508 0, /* src_mask */
509 0, /* dst_mask */
b34976b6 510 FALSE), /* pcrel_offset */
252b5132
RH
511
512 /* Like R_PPC_ADDR32, but used when setting global offset table
513 entries. */
514 HOWTO (R_PPC_GLOB_DAT, /* type */
515 0, /* rightshift */
516 2, /* size (0 = byte, 1 = short, 2 = long) */
517 32, /* bitsize */
b34976b6 518 FALSE, /* pc_relative */
252b5132 519 0, /* bitpos */
86c95733 520 complain_overflow_dont, /* complain_on_overflow */
3ce51288 521 ppc_elf_unhandled_reloc, /* special_function */
252b5132 522 "R_PPC_GLOB_DAT", /* name */
b34976b6 523 FALSE, /* partial_inplace */
252b5132
RH
524 0, /* src_mask */
525 0xffffffff, /* dst_mask */
b34976b6 526 FALSE), /* pcrel_offset */
252b5132
RH
527
528 /* Marks a procedure linkage table entry for a symbol. */
529 HOWTO (R_PPC_JMP_SLOT, /* type */
530 0, /* rightshift */
531 2, /* size (0 = byte, 1 = short, 2 = long) */
532 32, /* bitsize */
b34976b6 533 FALSE, /* pc_relative */
252b5132 534 0, /* bitpos */
86c95733 535 complain_overflow_dont, /* complain_on_overflow */
3ce51288 536 ppc_elf_unhandled_reloc, /* special_function */
252b5132 537 "R_PPC_JMP_SLOT", /* name */
b34976b6 538 FALSE, /* partial_inplace */
252b5132
RH
539 0, /* src_mask */
540 0, /* dst_mask */
b34976b6 541 FALSE), /* pcrel_offset */
252b5132
RH
542
543 /* Used only by the dynamic linker. When the object is run, this
544 longword is set to the load address of the object, plus the
545 addend. */
546 HOWTO (R_PPC_RELATIVE, /* type */
547 0, /* rightshift */
548 2, /* size (0 = byte, 1 = short, 2 = long) */
549 32, /* bitsize */
b34976b6 550 FALSE, /* pc_relative */
252b5132 551 0, /* bitpos */
86c95733 552 complain_overflow_dont, /* complain_on_overflow */
252b5132
RH
553 bfd_elf_generic_reloc, /* special_function */
554 "R_PPC_RELATIVE", /* name */
b34976b6 555 FALSE, /* partial_inplace */
252b5132
RH
556 0, /* src_mask */
557 0xffffffff, /* dst_mask */
b34976b6 558 FALSE), /* pcrel_offset */
252b5132
RH
559
560 /* Like R_PPC_REL24, but uses the value of the symbol within the
561 object rather than the final value. Normally used for
562 _GLOBAL_OFFSET_TABLE_. */
563 HOWTO (R_PPC_LOCAL24PC, /* type */
564 0, /* rightshift */
565 2, /* size (0 = byte, 1 = short, 2 = long) */
566 26, /* bitsize */
b34976b6 567 TRUE, /* pc_relative */
252b5132
RH
568 0, /* bitpos */
569 complain_overflow_signed, /* complain_on_overflow */
570 bfd_elf_generic_reloc, /* special_function */
571 "R_PPC_LOCAL24PC", /* name */
b34976b6 572 FALSE, /* partial_inplace */
252b5132
RH
573 0, /* src_mask */
574 0x3fffffc, /* dst_mask */
b34976b6 575 TRUE), /* pcrel_offset */
252b5132
RH
576
577 /* Like R_PPC_ADDR32, but may be unaligned. */
578 HOWTO (R_PPC_UADDR32, /* type */
579 0, /* rightshift */
580 2, /* size (0 = byte, 1 = short, 2 = long) */
581 32, /* bitsize */
b34976b6 582 FALSE, /* pc_relative */
252b5132 583 0, /* bitpos */
86c95733 584 complain_overflow_dont, /* complain_on_overflow */
252b5132
RH
585 bfd_elf_generic_reloc, /* special_function */
586 "R_PPC_UADDR32", /* name */
b34976b6 587 FALSE, /* partial_inplace */
252b5132
RH
588 0, /* src_mask */
589 0xffffffff, /* dst_mask */
b34976b6 590 FALSE), /* pcrel_offset */
252b5132
RH
591
592 /* Like R_PPC_ADDR16, but may be unaligned. */
593 HOWTO (R_PPC_UADDR16, /* type */
594 0, /* rightshift */
595 1, /* size (0 = byte, 1 = short, 2 = long) */
596 16, /* bitsize */
b34976b6 597 FALSE, /* pc_relative */
252b5132
RH
598 0, /* bitpos */
599 complain_overflow_bitfield, /* complain_on_overflow */
600 bfd_elf_generic_reloc, /* special_function */
601 "R_PPC_UADDR16", /* name */
b34976b6 602 FALSE, /* partial_inplace */
252b5132
RH
603 0, /* src_mask */
604 0xffff, /* dst_mask */
b34976b6 605 FALSE), /* pcrel_offset */
252b5132
RH
606
607 /* 32-bit PC relative */
608 HOWTO (R_PPC_REL32, /* type */
609 0, /* rightshift */
610 2, /* size (0 = byte, 1 = short, 2 = long) */
611 32, /* bitsize */
b34976b6 612 TRUE, /* pc_relative */
252b5132 613 0, /* bitpos */
86c95733 614 complain_overflow_dont, /* complain_on_overflow */
252b5132
RH
615 bfd_elf_generic_reloc, /* special_function */
616 "R_PPC_REL32", /* name */
b34976b6 617 FALSE, /* partial_inplace */
252b5132
RH
618 0, /* src_mask */
619 0xffffffff, /* dst_mask */
b34976b6 620 TRUE), /* pcrel_offset */
252b5132
RH
621
622 /* 32-bit relocation to the symbol's procedure linkage table.
c3668558 623 FIXME: not supported. */
252b5132
RH
624 HOWTO (R_PPC_PLT32, /* type */
625 0, /* rightshift */
626 2, /* size (0 = byte, 1 = short, 2 = long) */
627 32, /* bitsize */
b34976b6 628 FALSE, /* pc_relative */
252b5132 629 0, /* bitpos */
86c95733 630 complain_overflow_dont, /* complain_on_overflow */
3ce51288 631 ppc_elf_unhandled_reloc, /* special_function */
252b5132 632 "R_PPC_PLT32", /* name */
b34976b6 633 FALSE, /* partial_inplace */
252b5132
RH
634 0, /* src_mask */
635 0, /* dst_mask */
b34976b6 636 FALSE), /* pcrel_offset */
252b5132
RH
637
638 /* 32-bit PC relative relocation to the symbol's procedure linkage table.
c3668558 639 FIXME: not supported. */
252b5132
RH
640 HOWTO (R_PPC_PLTREL32, /* type */
641 0, /* rightshift */
642 2, /* size (0 = byte, 1 = short, 2 = long) */
643 32, /* bitsize */
b34976b6 644 TRUE, /* pc_relative */
252b5132 645 0, /* bitpos */
86c95733 646 complain_overflow_dont, /* complain_on_overflow */
3ce51288 647 ppc_elf_unhandled_reloc, /* special_function */
252b5132 648 "R_PPC_PLTREL32", /* name */
b34976b6 649 FALSE, /* partial_inplace */
252b5132
RH
650 0, /* src_mask */
651 0, /* dst_mask */
b34976b6 652 TRUE), /* pcrel_offset */
252b5132
RH
653
654 /* Like R_PPC_ADDR16_LO, but referring to the PLT table entry for
655 the symbol. */
656 HOWTO (R_PPC_PLT16_LO, /* type */
657 0, /* rightshift */
658 1, /* size (0 = byte, 1 = short, 2 = long) */
659 16, /* bitsize */
b34976b6 660 FALSE, /* pc_relative */
252b5132
RH
661 0, /* bitpos */
662 complain_overflow_dont, /* complain_on_overflow */
3ce51288 663 ppc_elf_unhandled_reloc, /* special_function */
252b5132 664 "R_PPC_PLT16_LO", /* name */
b34976b6 665 FALSE, /* partial_inplace */
252b5132
RH
666 0, /* src_mask */
667 0xffff, /* dst_mask */
b34976b6 668 FALSE), /* pcrel_offset */
252b5132
RH
669
670 /* Like R_PPC_ADDR16_HI, but referring to the PLT table entry for
671 the symbol. */
672 HOWTO (R_PPC_PLT16_HI, /* type */
673 16, /* rightshift */
674 1, /* size (0 = byte, 1 = short, 2 = long) */
675 16, /* bitsize */
b34976b6 676 FALSE, /* pc_relative */
252b5132 677 0, /* bitpos */
86c95733 678 complain_overflow_dont, /* complain_on_overflow */
3ce51288 679 ppc_elf_unhandled_reloc, /* special_function */
252b5132 680 "R_PPC_PLT16_HI", /* name */
b34976b6 681 FALSE, /* partial_inplace */
252b5132
RH
682 0, /* src_mask */
683 0xffff, /* dst_mask */
b34976b6 684 FALSE), /* pcrel_offset */
252b5132
RH
685
686 /* Like R_PPC_ADDR16_HA, but referring to the PLT table entry for
687 the symbol. */
688 HOWTO (R_PPC_PLT16_HA, /* type */
689 16, /* rightshift */
690 1, /* size (0 = byte, 1 = short, 2 = long) */
691 16, /* bitsize */
b34976b6 692 FALSE, /* pc_relative */
252b5132 693 0, /* bitpos */
86c95733 694 complain_overflow_dont, /* complain_on_overflow */
3ce51288 695 ppc_elf_unhandled_reloc, /* special_function */
252b5132 696 "R_PPC_PLT16_HA", /* name */
b34976b6 697 FALSE, /* partial_inplace */
252b5132
RH
698 0, /* src_mask */
699 0xffff, /* dst_mask */
b34976b6 700 FALSE), /* pcrel_offset */
252b5132
RH
701
702 /* A sign-extended 16 bit value relative to _SDA_BASE_, for use with
703 small data items. */
704 HOWTO (R_PPC_SDAREL16, /* type */
705 0, /* rightshift */
706 1, /* size (0 = byte, 1 = short, 2 = long) */
707 16, /* bitsize */
b34976b6 708 FALSE, /* pc_relative */
252b5132
RH
709 0, /* bitpos */
710 complain_overflow_signed, /* complain_on_overflow */
3ce51288 711 ppc_elf_unhandled_reloc, /* special_function */
252b5132 712 "R_PPC_SDAREL16", /* name */
b34976b6 713 FALSE, /* partial_inplace */
252b5132
RH
714 0, /* src_mask */
715 0xffff, /* dst_mask */
b34976b6 716 FALSE), /* pcrel_offset */
252b5132 717
c061c2d8 718 /* 16-bit section relative relocation. */
252b5132
RH
719 HOWTO (R_PPC_SECTOFF, /* type */
720 0, /* rightshift */
c061c2d8
AM
721 1, /* size (0 = byte, 1 = short, 2 = long) */
722 16, /* bitsize */
b34976b6 723 FALSE, /* pc_relative */
252b5132 724 0, /* bitpos */
86c95733 725 complain_overflow_signed, /* complain_on_overflow */
3ce51288 726 ppc_elf_unhandled_reloc, /* special_function */
252b5132 727 "R_PPC_SECTOFF", /* name */
b34976b6 728 FALSE, /* partial_inplace */
252b5132 729 0, /* src_mask */
c061c2d8 730 0xffff, /* dst_mask */
b34976b6 731 FALSE), /* pcrel_offset */
252b5132 732
c3668558 733 /* 16-bit lower half section relative relocation. */
252b5132
RH
734 HOWTO (R_PPC_SECTOFF_LO, /* type */
735 0, /* rightshift */
736 1, /* size (0 = byte, 1 = short, 2 = long) */
737 16, /* bitsize */
b34976b6 738 FALSE, /* pc_relative */
252b5132
RH
739 0, /* bitpos */
740 complain_overflow_dont, /* complain_on_overflow */
3ce51288 741 ppc_elf_unhandled_reloc, /* special_function */
252b5132 742 "R_PPC_SECTOFF_LO", /* name */
b34976b6 743 FALSE, /* partial_inplace */
252b5132
RH
744 0, /* src_mask */
745 0xffff, /* dst_mask */
b34976b6 746 FALSE), /* pcrel_offset */
252b5132 747
c3668558 748 /* 16-bit upper half section relative relocation. */
252b5132
RH
749 HOWTO (R_PPC_SECTOFF_HI, /* type */
750 16, /* rightshift */
751 1, /* size (0 = byte, 1 = short, 2 = long) */
752 16, /* bitsize */
b34976b6 753 FALSE, /* pc_relative */
252b5132 754 0, /* bitpos */
86c95733 755 complain_overflow_dont, /* complain_on_overflow */
3ce51288 756 ppc_elf_unhandled_reloc, /* special_function */
252b5132 757 "R_PPC_SECTOFF_HI", /* name */
b34976b6 758 FALSE, /* partial_inplace */
252b5132
RH
759 0, /* src_mask */
760 0xffff, /* dst_mask */
b34976b6 761 FALSE), /* pcrel_offset */
252b5132 762
c3668558 763 /* 16-bit upper half adjusted section relative relocation. */
252b5132
RH
764 HOWTO (R_PPC_SECTOFF_HA, /* type */
765 16, /* rightshift */
766 1, /* size (0 = byte, 1 = short, 2 = long) */
767 16, /* bitsize */
b34976b6 768 FALSE, /* pc_relative */
252b5132 769 0, /* bitpos */
86c95733 770 complain_overflow_dont, /* complain_on_overflow */
3ce51288 771 ppc_elf_unhandled_reloc, /* special_function */
252b5132 772 "R_PPC_SECTOFF_HA", /* name */
b34976b6 773 FALSE, /* partial_inplace */
252b5132
RH
774 0, /* src_mask */
775 0xffff, /* dst_mask */
b34976b6 776 FALSE), /* pcrel_offset */
252b5132 777
727fc41e 778 /* Marker relocs for TLS. */
7619e7c7 779 HOWTO (R_PPC_TLS,
252b5132
RH
780 0, /* rightshift */
781 2, /* size (0 = byte, 1 = short, 2 = long) */
782 32, /* bitsize */
b34976b6 783 FALSE, /* pc_relative */
252b5132 784 0, /* bitpos */
7619e7c7 785 complain_overflow_dont, /* complain_on_overflow */
252b5132 786 bfd_elf_generic_reloc, /* special_function */
7619e7c7
AM
787 "R_PPC_TLS", /* name */
788 FALSE, /* partial_inplace */
789 0, /* src_mask */
790 0, /* dst_mask */
791 FALSE), /* pcrel_offset */
792
727fc41e
AM
793 HOWTO (R_PPC_TLSGD,
794 0, /* rightshift */
795 2, /* size (0 = byte, 1 = short, 2 = long) */
796 32, /* bitsize */
797 FALSE, /* pc_relative */
798 0, /* bitpos */
799 complain_overflow_dont, /* complain_on_overflow */
800 bfd_elf_generic_reloc, /* special_function */
801 "R_PPC_TLSGD", /* name */
802 FALSE, /* partial_inplace */
803 0, /* src_mask */
804 0, /* dst_mask */
805 FALSE), /* pcrel_offset */
806
807 HOWTO (R_PPC_TLSLD,
808 0, /* rightshift */
809 2, /* size (0 = byte, 1 = short, 2 = long) */
810 32, /* bitsize */
811 FALSE, /* pc_relative */
812 0, /* bitpos */
813 complain_overflow_dont, /* complain_on_overflow */
814 bfd_elf_generic_reloc, /* special_function */
815 "R_PPC_TLSLD", /* name */
816 FALSE, /* partial_inplace */
817 0, /* src_mask */
818 0, /* dst_mask */
819 FALSE), /* pcrel_offset */
820
23cedd1d
AM
821 /* Marker relocs on inline plt call instructions. */
822 HOWTO (R_PPC_PLTSEQ,
823 0, /* rightshift */
824 2, /* size (0 = byte, 1 = short, 2 = long) */
825 32, /* bitsize */
826 FALSE, /* pc_relative */
827 0, /* bitpos */
828 complain_overflow_dont, /* complain_on_overflow */
829 bfd_elf_generic_reloc, /* special_function */
830 "R_PPC_PLTSEQ", /* name */
831 FALSE, /* partial_inplace */
832 0, /* src_mask */
833 0, /* dst_mask */
834 FALSE), /* pcrel_offset */
835
836 HOWTO (R_PPC_PLTCALL,
837 0, /* rightshift */
838 2, /* size (0 = byte, 1 = short, 2 = long) */
839 32, /* bitsize */
840 FALSE, /* pc_relative */
841 0, /* bitpos */
842 complain_overflow_dont, /* complain_on_overflow */
843 bfd_elf_generic_reloc, /* special_function */
844 "R_PPC_PLTCALL", /* name */
845 FALSE, /* partial_inplace */
846 0, /* src_mask */
847 0, /* dst_mask */
848 FALSE), /* pcrel_offset */
849
7619e7c7
AM
850 /* Computes the load module index of the load module that contains the
851 definition of its TLS sym. */
852 HOWTO (R_PPC_DTPMOD32,
853 0, /* rightshift */
854 2, /* size (0 = byte, 1 = short, 2 = long) */
855 32, /* bitsize */
856 FALSE, /* pc_relative */
857 0, /* bitpos */
858 complain_overflow_dont, /* complain_on_overflow */
859 ppc_elf_unhandled_reloc, /* special_function */
860 "R_PPC_DTPMOD32", /* name */
b34976b6 861 FALSE, /* partial_inplace */
252b5132
RH
862 0, /* src_mask */
863 0xffffffff, /* dst_mask */
b34976b6 864 FALSE), /* pcrel_offset */
252b5132 865
7619e7c7
AM
866 /* Computes a dtv-relative displacement, the difference between the value
867 of sym+add and the base address of the thread-local storage block that
868 contains the definition of sym, minus 0x8000. */
869 HOWTO (R_PPC_DTPREL32,
870 0, /* rightshift */
871 2, /* size (0 = byte, 1 = short, 2 = long) */
872 32, /* bitsize */
873 FALSE, /* pc_relative */
874 0, /* bitpos */
875 complain_overflow_dont, /* complain_on_overflow */
876 ppc_elf_unhandled_reloc, /* special_function */
877 "R_PPC_DTPREL32", /* name */
878 FALSE, /* partial_inplace */
879 0, /* src_mask */
880 0xffffffff, /* dst_mask */
881 FALSE), /* pcrel_offset */
882
883 /* A 16 bit dtprel reloc. */
884 HOWTO (R_PPC_DTPREL16,
252b5132
RH
885 0, /* rightshift */
886 1, /* size (0 = byte, 1 = short, 2 = long) */
887 16, /* bitsize */
b34976b6 888 FALSE, /* pc_relative */
252b5132 889 0, /* bitpos */
7619e7c7
AM
890 complain_overflow_signed, /* complain_on_overflow */
891 ppc_elf_unhandled_reloc, /* special_function */
892 "R_PPC_DTPREL16", /* name */
b34976b6 893 FALSE, /* partial_inplace */
252b5132
RH
894 0, /* src_mask */
895 0xffff, /* dst_mask */
b34976b6 896 FALSE), /* pcrel_offset */
252b5132 897
7619e7c7
AM
898 /* Like DTPREL16, but no overflow. */
899 HOWTO (R_PPC_DTPREL16_LO,
252b5132
RH
900 0, /* rightshift */
901 1, /* size (0 = byte, 1 = short, 2 = long) */
902 16, /* bitsize */
b34976b6 903 FALSE, /* pc_relative */
252b5132 904 0, /* bitpos */
7619e7c7
AM
905 complain_overflow_dont, /* complain_on_overflow */
906 ppc_elf_unhandled_reloc, /* special_function */
907 "R_PPC_DTPREL16_LO", /* name */
b34976b6 908 FALSE, /* partial_inplace */
252b5132
RH
909 0, /* src_mask */
910 0xffff, /* dst_mask */
b34976b6 911 FALSE), /* pcrel_offset */
252b5132 912
7619e7c7
AM
913 /* Like DTPREL16_LO, but next higher group of 16 bits. */
914 HOWTO (R_PPC_DTPREL16_HI,
252b5132
RH
915 16, /* rightshift */
916 1, /* size (0 = byte, 1 = short, 2 = long) */
917 16, /* bitsize */
b34976b6 918 FALSE, /* pc_relative */
252b5132
RH
919 0, /* bitpos */
920 complain_overflow_dont, /* complain_on_overflow */
7619e7c7
AM
921 ppc_elf_unhandled_reloc, /* special_function */
922 "R_PPC_DTPREL16_HI", /* name */
b34976b6 923 FALSE, /* partial_inplace */
252b5132
RH
924 0, /* src_mask */
925 0xffff, /* dst_mask */
b34976b6 926 FALSE), /* pcrel_offset */
252b5132 927
7619e7c7
AM
928 /* Like DTPREL16_HI, but adjust for low 16 bits. */
929 HOWTO (R_PPC_DTPREL16_HA,
252b5132
RH
930 16, /* rightshift */
931 1, /* size (0 = byte, 1 = short, 2 = long) */
932 16, /* bitsize */
b34976b6 933 FALSE, /* pc_relative */
252b5132
RH
934 0, /* bitpos */
935 complain_overflow_dont, /* complain_on_overflow */
7619e7c7
AM
936 ppc_elf_unhandled_reloc, /* special_function */
937 "R_PPC_DTPREL16_HA", /* name */
b34976b6 938 FALSE, /* partial_inplace */
252b5132
RH
939 0, /* src_mask */
940 0xffff, /* dst_mask */
b34976b6 941 FALSE), /* pcrel_offset */
252b5132 942
7619e7c7
AM
943 /* Computes a tp-relative displacement, the difference between the value of
944 sym+add and the value of the thread pointer (r13). */
945 HOWTO (R_PPC_TPREL32,
946 0, /* rightshift */
947 2, /* size (0 = byte, 1 = short, 2 = long) */
948 32, /* bitsize */
949 FALSE, /* pc_relative */
950 0, /* bitpos */
951 complain_overflow_dont, /* complain_on_overflow */
952 ppc_elf_unhandled_reloc, /* special_function */
953 "R_PPC_TPREL32", /* name */
954 FALSE, /* partial_inplace */
955 0, /* src_mask */
956 0xffffffff, /* dst_mask */
957 FALSE), /* pcrel_offset */
958
959 /* A 16 bit tprel reloc. */
960 HOWTO (R_PPC_TPREL16,
252b5132
RH
961 0, /* rightshift */
962 1, /* size (0 = byte, 1 = short, 2 = long) */
963 16, /* bitsize */
b34976b6 964 FALSE, /* pc_relative */
252b5132 965 0, /* bitpos */
7619e7c7
AM
966 complain_overflow_signed, /* complain_on_overflow */
967 ppc_elf_unhandled_reloc, /* special_function */
968 "R_PPC_TPREL16", /* name */
b34976b6 969 FALSE, /* partial_inplace */
252b5132
RH
970 0, /* src_mask */
971 0xffff, /* dst_mask */
b34976b6 972 FALSE), /* pcrel_offset */
252b5132 973
7619e7c7
AM
974 /* Like TPREL16, but no overflow. */
975 HOWTO (R_PPC_TPREL16_LO,
252b5132
RH
976 0, /* rightshift */
977 1, /* size (0 = byte, 1 = short, 2 = long) */
978 16, /* bitsize */
b34976b6 979 FALSE, /* pc_relative */
252b5132 980 0, /* bitpos */
7619e7c7
AM
981 complain_overflow_dont, /* complain_on_overflow */
982 ppc_elf_unhandled_reloc, /* special_function */
983 "R_PPC_TPREL16_LO", /* name */
b34976b6 984 FALSE, /* partial_inplace */
252b5132
RH
985 0, /* src_mask */
986 0xffff, /* dst_mask */
b34976b6 987 FALSE), /* pcrel_offset */
252b5132 988
7619e7c7
AM
989 /* Like TPREL16_LO, but next higher group of 16 bits. */
990 HOWTO (R_PPC_TPREL16_HI,
991 16, /* rightshift */
992 1, /* size (0 = byte, 1 = short, 2 = long) */
993 16, /* bitsize */
994 FALSE, /* pc_relative */
995 0, /* bitpos */
996 complain_overflow_dont, /* complain_on_overflow */
997 ppc_elf_unhandled_reloc, /* special_function */
998 "R_PPC_TPREL16_HI", /* name */
999 FALSE, /* partial_inplace */
1000 0, /* src_mask */
1001 0xffff, /* dst_mask */
1002 FALSE), /* pcrel_offset */
1003
1004 /* Like TPREL16_HI, but adjust for low 16 bits. */
1005 HOWTO (R_PPC_TPREL16_HA,
1006 16, /* rightshift */
1007 1, /* size (0 = byte, 1 = short, 2 = long) */
1008 16, /* bitsize */
1009 FALSE, /* pc_relative */
1010 0, /* bitpos */
1011 complain_overflow_dont, /* complain_on_overflow */
1012 ppc_elf_unhandled_reloc, /* special_function */
1013 "R_PPC_TPREL16_HA", /* name */
1014 FALSE, /* partial_inplace */
1015 0, /* src_mask */
1016 0xffff, /* dst_mask */
1017 FALSE), /* pcrel_offset */
1018
1019 /* Allocates two contiguous entries in the GOT to hold a tls_index structure,
1020 with values (sym+add)@dtpmod and (sym+add)@dtprel, and computes the offset
1021 to the first entry. */
1022 HOWTO (R_PPC_GOT_TLSGD16,
252b5132
RH
1023 0, /* rightshift */
1024 1, /* size (0 = byte, 1 = short, 2 = long) */
1025 16, /* bitsize */
b34976b6 1026 FALSE, /* pc_relative */
252b5132
RH
1027 0, /* bitpos */
1028 complain_overflow_signed, /* complain_on_overflow */
7619e7c7
AM
1029 ppc_elf_unhandled_reloc, /* special_function */
1030 "R_PPC_GOT_TLSGD16", /* name */
b34976b6 1031 FALSE, /* partial_inplace */
252b5132
RH
1032 0, /* src_mask */
1033 0xffff, /* dst_mask */
b34976b6 1034 FALSE), /* pcrel_offset */
252b5132 1035
7619e7c7
AM
1036 /* Like GOT_TLSGD16, but no overflow. */
1037 HOWTO (R_PPC_GOT_TLSGD16_LO,
252b5132 1038 0, /* rightshift */
7619e7c7 1039 1, /* size (0 = byte, 1 = short, 2 = long) */
252b5132 1040 16, /* bitsize */
b34976b6 1041 FALSE, /* pc_relative */
252b5132 1042 0, /* bitpos */
7619e7c7
AM
1043 complain_overflow_dont, /* complain_on_overflow */
1044 ppc_elf_unhandled_reloc, /* special_function */
1045 "R_PPC_GOT_TLSGD16_LO", /* name */
b34976b6 1046 FALSE, /* partial_inplace */
252b5132
RH
1047 0, /* src_mask */
1048 0xffff, /* dst_mask */
b34976b6 1049 FALSE), /* pcrel_offset */
252b5132 1050
7619e7c7
AM
1051 /* Like GOT_TLSGD16_LO, but next higher group of 16 bits. */
1052 HOWTO (R_PPC_GOT_TLSGD16_HI,
1053 16, /* rightshift */
1054 1, /* size (0 = byte, 1 = short, 2 = long) */
1055 16, /* bitsize */
1056 FALSE, /* pc_relative */
1057 0, /* bitpos */
1058 complain_overflow_dont, /* complain_on_overflow */
1059 ppc_elf_unhandled_reloc, /* special_function */
1060 "R_PPC_GOT_TLSGD16_HI", /* name */
1061 FALSE, /* partial_inplace */
1062 0, /* src_mask */
1063 0xffff, /* dst_mask */
1064 FALSE), /* pcrel_offset */
252b5132 1065
7619e7c7
AM
1066 /* Like GOT_TLSGD16_HI, but adjust for low 16 bits. */
1067 HOWTO (R_PPC_GOT_TLSGD16_HA,
1068 16, /* rightshift */
1069 1, /* size (0 = byte, 1 = short, 2 = long) */
1070 16, /* bitsize */
1071 FALSE, /* pc_relative */
1072 0, /* bitpos */
1073 complain_overflow_dont, /* complain_on_overflow */
1074 ppc_elf_unhandled_reloc, /* special_function */
1075 "R_PPC_GOT_TLSGD16_HA", /* name */
1076 FALSE, /* partial_inplace */
1077 0, /* src_mask */
1078 0xffff, /* dst_mask */
1079 FALSE), /* pcrel_offset */
1080
1081 /* Allocates two contiguous entries in the GOT to hold a tls_index structure,
1082 with values (sym+add)@dtpmod and zero, and computes the offset to the
1083 first entry. */
1084 HOWTO (R_PPC_GOT_TLSLD16,
252b5132
RH
1085 0, /* rightshift */
1086 1, /* size (0 = byte, 1 = short, 2 = long) */
1087 16, /* bitsize */
7619e7c7 1088 FALSE, /* pc_relative */
252b5132
RH
1089 0, /* bitpos */
1090 complain_overflow_signed, /* complain_on_overflow */
7619e7c7
AM
1091 ppc_elf_unhandled_reloc, /* special_function */
1092 "R_PPC_GOT_TLSLD16", /* name */
b34976b6 1093 FALSE, /* partial_inplace */
252b5132
RH
1094 0, /* src_mask */
1095 0xffff, /* dst_mask */
b34976b6 1096 FALSE), /* pcrel_offset */
252b5132 1097
7619e7c7
AM
1098 /* Like GOT_TLSLD16, but no overflow. */
1099 HOWTO (R_PPC_GOT_TLSLD16_LO,
252b5132 1100 0, /* rightshift */
7619e7c7
AM
1101 1, /* size (0 = byte, 1 = short, 2 = long) */
1102 16, /* bitsize */
b34976b6 1103 FALSE, /* pc_relative */
252b5132
RH
1104 0, /* bitpos */
1105 complain_overflow_dont, /* complain_on_overflow */
7619e7c7
AM
1106 ppc_elf_unhandled_reloc, /* special_function */
1107 "R_PPC_GOT_TLSLD16_LO", /* name */
b34976b6 1108 FALSE, /* partial_inplace */
252b5132 1109 0, /* src_mask */
7619e7c7 1110 0xffff, /* dst_mask */
b34976b6 1111 FALSE), /* pcrel_offset */
252b5132 1112
7619e7c7
AM
1113 /* Like GOT_TLSLD16_LO, but next higher group of 16 bits. */
1114 HOWTO (R_PPC_GOT_TLSLD16_HI,
1115 16, /* rightshift */
1116 1, /* size (0 = byte, 1 = short, 2 = long) */
1117 16, /* bitsize */
b34976b6 1118 FALSE, /* pc_relative */
252b5132
RH
1119 0, /* bitpos */
1120 complain_overflow_dont, /* complain_on_overflow */
7619e7c7
AM
1121 ppc_elf_unhandled_reloc, /* special_function */
1122 "R_PPC_GOT_TLSLD16_HI", /* name */
b34976b6 1123 FALSE, /* partial_inplace */
252b5132 1124 0, /* src_mask */
7619e7c7 1125 0xffff, /* dst_mask */
b34976b6 1126 FALSE), /* pcrel_offset */
252b5132 1127
7619e7c7
AM
1128 /* Like GOT_TLSLD16_HI, but adjust for low 16 bits. */
1129 HOWTO (R_PPC_GOT_TLSLD16_HA,
1130 16, /* rightshift */
1131 1, /* size (0 = byte, 1 = short, 2 = long) */
1132 16, /* bitsize */
1133 FALSE, /* pc_relative */
1134 0, /* bitpos */
1135 complain_overflow_dont, /* complain_on_overflow */
1136 ppc_elf_unhandled_reloc, /* special_function */
1137 "R_PPC_GOT_TLSLD16_HA", /* name */
1138 FALSE, /* partial_inplace */
1139 0, /* src_mask */
1140 0xffff, /* dst_mask */
1141 FALSE), /* pcrel_offset */
1142
1143 /* Allocates an entry in the GOT with value (sym+add)@dtprel, and computes
1144 the offset to the entry. */
1145 HOWTO (R_PPC_GOT_DTPREL16,
252b5132
RH
1146 0, /* rightshift */
1147 1, /* size (0 = byte, 1 = short, 2 = long) */
1148 16, /* bitsize */
b34976b6 1149 FALSE, /* pc_relative */
252b5132
RH
1150 0, /* bitpos */
1151 complain_overflow_signed, /* complain_on_overflow */
7619e7c7
AM
1152 ppc_elf_unhandled_reloc, /* special_function */
1153 "R_PPC_GOT_DTPREL16", /* name */
b34976b6 1154 FALSE, /* partial_inplace */
252b5132
RH
1155 0, /* src_mask */
1156 0xffff, /* dst_mask */
b34976b6 1157 FALSE), /* pcrel_offset */
252b5132 1158
7619e7c7
AM
1159 /* Like GOT_DTPREL16, but no overflow. */
1160 HOWTO (R_PPC_GOT_DTPREL16_LO,
1161 0, /* rightshift */
1162 1, /* size (0 = byte, 1 = short, 2 = long) */
1163 16, /* bitsize */
1164 FALSE, /* pc_relative */
1165 0, /* bitpos */
1166 complain_overflow_dont, /* complain_on_overflow */
1167 ppc_elf_unhandled_reloc, /* special_function */
1168 "R_PPC_GOT_DTPREL16_LO", /* name */
1169 FALSE, /* partial_inplace */
1170 0, /* src_mask */
1171 0xffff, /* dst_mask */
1172 FALSE), /* pcrel_offset */
252b5132 1173
7619e7c7
AM
1174 /* Like GOT_DTPREL16_LO, but next higher group of 16 bits. */
1175 HOWTO (R_PPC_GOT_DTPREL16_HI,
1176 16, /* rightshift */
1177 1, /* size (0 = byte, 1 = short, 2 = long) */
1178 16, /* bitsize */
1179 FALSE, /* pc_relative */
1180 0, /* bitpos */
1181 complain_overflow_dont, /* complain_on_overflow */
1182 ppc_elf_unhandled_reloc, /* special_function */
1183 "R_PPC_GOT_DTPREL16_HI", /* name */
1184 FALSE, /* partial_inplace */
1185 0, /* src_mask */
1186 0xffff, /* dst_mask */
1187 FALSE), /* pcrel_offset */
252b5132 1188
7619e7c7
AM
1189 /* Like GOT_DTPREL16_HI, but adjust for low 16 bits. */
1190 HOWTO (R_PPC_GOT_DTPREL16_HA,
1191 16, /* rightshift */
1192 1, /* size (0 = byte, 1 = short, 2 = long) */
1193 16, /* bitsize */
1194 FALSE, /* pc_relative */
1195 0, /* bitpos */
1196 complain_overflow_dont, /* complain_on_overflow */
1197 ppc_elf_unhandled_reloc, /* special_function */
1198 "R_PPC_GOT_DTPREL16_HA", /* name */
1199 FALSE, /* partial_inplace */
1200 0, /* src_mask */
1201 0xffff, /* dst_mask */
1202 FALSE), /* pcrel_offset */
c3668558 1203
7619e7c7
AM
1204 /* Allocates an entry in the GOT with value (sym+add)@tprel, and computes the
1205 offset to the entry. */
1206 HOWTO (R_PPC_GOT_TPREL16,
1207 0, /* rightshift */
1208 1, /* size (0 = byte, 1 = short, 2 = long) */
1209 16, /* bitsize */
1210 FALSE, /* pc_relative */
1211 0, /* bitpos */
1212 complain_overflow_signed, /* complain_on_overflow */
1213 ppc_elf_unhandled_reloc, /* special_function */
1214 "R_PPC_GOT_TPREL16", /* name */
1215 FALSE, /* partial_inplace */
1216 0, /* src_mask */
1217 0xffff, /* dst_mask */
1218 FALSE), /* pcrel_offset */
1219
1220 /* Like GOT_TPREL16, but no overflow. */
1221 HOWTO (R_PPC_GOT_TPREL16_LO,
1222 0, /* rightshift */
1223 1, /* size (0 = byte, 1 = short, 2 = long) */
1224 16, /* bitsize */
1225 FALSE, /* pc_relative */
1226 0, /* bitpos */
1227 complain_overflow_dont, /* complain_on_overflow */
1228 ppc_elf_unhandled_reloc, /* special_function */
1229 "R_PPC_GOT_TPREL16_LO", /* name */
1230 FALSE, /* partial_inplace */
1231 0, /* src_mask */
1232 0xffff, /* dst_mask */
1233 FALSE), /* pcrel_offset */
1234
1235 /* Like GOT_TPREL16_LO, but next higher group of 16 bits. */
1236 HOWTO (R_PPC_GOT_TPREL16_HI,
1237 16, /* rightshift */
1238 1, /* size (0 = byte, 1 = short, 2 = long) */
1239 16, /* bitsize */
1240 FALSE, /* pc_relative */
1241 0, /* bitpos */
1242 complain_overflow_dont, /* complain_on_overflow */
1243 ppc_elf_unhandled_reloc, /* special_function */
1244 "R_PPC_GOT_TPREL16_HI", /* name */
1245 FALSE, /* partial_inplace */
1246 0, /* src_mask */
1247 0xffff, /* dst_mask */
1248 FALSE), /* pcrel_offset */
1249
1250 /* Like GOT_TPREL16_HI, but adjust for low 16 bits. */
1251 HOWTO (R_PPC_GOT_TPREL16_HA,
1252 16, /* rightshift */
1253 1, /* size (0 = byte, 1 = short, 2 = long) */
1254 16, /* bitsize */
1255 FALSE, /* pc_relative */
1256 0, /* bitpos */
1257 complain_overflow_dont, /* complain_on_overflow */
1258 ppc_elf_unhandled_reloc, /* special_function */
1259 "R_PPC_GOT_TPREL16_HA", /* name */
1260 FALSE, /* partial_inplace */
1261 0, /* src_mask */
1262 0xffff, /* dst_mask */
1263 FALSE), /* pcrel_offset */
1264
1265 /* The remaining relocs are from the Embedded ELF ABI, and are not
1266 in the SVR4 ELF ABI. */
1267
1268 /* 32 bit value resulting from the addend minus the symbol. */
1269 HOWTO (R_PPC_EMB_NADDR32, /* type */
1270 0, /* rightshift */
1271 2, /* size (0 = byte, 1 = short, 2 = long) */
1272 32, /* bitsize */
1273 FALSE, /* pc_relative */
1274 0, /* bitpos */
86c95733 1275 complain_overflow_dont, /* complain_on_overflow */
3ce51288 1276 ppc_elf_unhandled_reloc, /* special_function */
7619e7c7
AM
1277 "R_PPC_EMB_NADDR32", /* name */
1278 FALSE, /* partial_inplace */
1279 0, /* src_mask */
1280 0xffffffff, /* dst_mask */
1281 FALSE), /* pcrel_offset */
1282
1283 /* 16 bit value resulting from the addend minus the symbol. */
1284 HOWTO (R_PPC_EMB_NADDR16, /* type */
1285 0, /* rightshift */
1286 1, /* size (0 = byte, 1 = short, 2 = long) */
1287 16, /* bitsize */
1288 FALSE, /* pc_relative */
1289 0, /* bitpos */
86c95733 1290 complain_overflow_signed, /* complain_on_overflow */
3ce51288 1291 ppc_elf_unhandled_reloc, /* special_function */
7619e7c7
AM
1292 "R_PPC_EMB_NADDR16", /* name */
1293 FALSE, /* partial_inplace */
1294 0, /* src_mask */
1295 0xffff, /* dst_mask */
1296 FALSE), /* pcrel_offset */
1297
1298 /* 16 bit value resulting from the addend minus the symbol. */
1299 HOWTO (R_PPC_EMB_NADDR16_LO, /* type */
1300 0, /* rightshift */
1301 1, /* size (0 = byte, 1 = short, 2 = long) */
1302 16, /* bitsize */
1303 FALSE, /* pc_relative */
1304 0, /* bitpos */
1305 complain_overflow_dont,/* complain_on_overflow */
3ce51288 1306 ppc_elf_unhandled_reloc, /* special_function */
7619e7c7
AM
1307 "R_PPC_EMB_ADDR16_LO", /* name */
1308 FALSE, /* partial_inplace */
1309 0, /* src_mask */
1310 0xffff, /* dst_mask */
1311 FALSE), /* pcrel_offset */
1312
1313 /* The high order 16 bits of the addend minus the symbol. */
1314 HOWTO (R_PPC_EMB_NADDR16_HI, /* type */
1315 16, /* rightshift */
1316 1, /* size (0 = byte, 1 = short, 2 = long) */
1317 16, /* bitsize */
1318 FALSE, /* pc_relative */
1319 0, /* bitpos */
1320 complain_overflow_dont, /* complain_on_overflow */
3ce51288 1321 ppc_elf_unhandled_reloc, /* special_function */
7619e7c7
AM
1322 "R_PPC_EMB_NADDR16_HI", /* name */
1323 FALSE, /* partial_inplace */
1324 0, /* src_mask */
1325 0xffff, /* dst_mask */
1326 FALSE), /* pcrel_offset */
1327
1328 /* The high order 16 bits of the result of the addend minus the address,
1329 plus 1 if the contents of the low 16 bits, treated as a signed number,
1330 is negative. */
1331 HOWTO (R_PPC_EMB_NADDR16_HA, /* type */
1332 16, /* rightshift */
1333 1, /* size (0 = byte, 1 = short, 2 = long) */
1334 16, /* bitsize */
1335 FALSE, /* pc_relative */
1336 0, /* bitpos */
1337 complain_overflow_dont, /* complain_on_overflow */
3ce51288 1338 ppc_elf_unhandled_reloc, /* special_function */
25dbc73a
AM
1339 "R_PPC_EMB_NADDR16_HA", /* name */
1340 FALSE, /* partial_inplace */
1341 0, /* src_mask */
1342 0xffff, /* dst_mask */
1343 FALSE), /* pcrel_offset */
1344
1345 /* 16 bit value resulting from allocating a 4 byte word to hold an
1346 address in the .sdata section, and returning the offset from
1347 _SDA_BASE_ for that relocation. */
1348 HOWTO (R_PPC_EMB_SDAI16, /* type */
1349 0, /* rightshift */
1350 1, /* size (0 = byte, 1 = short, 2 = long) */
1351 16, /* bitsize */
1352 FALSE, /* pc_relative */
1353 0, /* bitpos */
bd6c6e2b 1354 complain_overflow_signed, /* complain_on_overflow */
3ce51288 1355 ppc_elf_unhandled_reloc, /* special_function */
25dbc73a
AM
1356 "R_PPC_EMB_SDAI16", /* name */
1357 FALSE, /* partial_inplace */
1358 0, /* src_mask */
1359 0xffff, /* dst_mask */
1360 FALSE), /* pcrel_offset */
1361
1362 /* 16 bit value resulting from allocating a 4 byte word to hold an
1363 address in the .sdata2 section, and returning the offset from
1364 _SDA2_BASE_ for that relocation. */
1365 HOWTO (R_PPC_EMB_SDA2I16, /* type */
1366 0, /* rightshift */
1367 1, /* size (0 = byte, 1 = short, 2 = long) */
1368 16, /* bitsize */
1369 FALSE, /* pc_relative */
1370 0, /* bitpos */
bd6c6e2b 1371 complain_overflow_signed, /* complain_on_overflow */
3ce51288 1372 ppc_elf_unhandled_reloc, /* special_function */
25dbc73a
AM
1373 "R_PPC_EMB_SDA2I16", /* name */
1374 FALSE, /* partial_inplace */
1375 0, /* src_mask */
1376 0xffff, /* dst_mask */
1377 FALSE), /* pcrel_offset */
1378
1379 /* A sign-extended 16 bit value relative to _SDA2_BASE_, for use with
1380 small data items. */
1381 HOWTO (R_PPC_EMB_SDA2REL, /* type */
1382 0, /* rightshift */
1383 1, /* size (0 = byte, 1 = short, 2 = long) */
1384 16, /* bitsize */
1385 FALSE, /* pc_relative */
1386 0, /* bitpos */
1387 complain_overflow_signed, /* complain_on_overflow */
3ce51288 1388 ppc_elf_unhandled_reloc, /* special_function */
25dbc73a
AM
1389 "R_PPC_EMB_SDA2REL", /* name */
1390 FALSE, /* partial_inplace */
1391 0, /* src_mask */
1392 0xffff, /* dst_mask */
1393 FALSE), /* pcrel_offset */
1394
1395 /* Relocate against either _SDA_BASE_ or _SDA2_BASE_, filling in the 16 bit
1396 signed offset from the appropriate base, and filling in the register
1397 field with the appropriate register (0, 2, or 13). */
1398 HOWTO (R_PPC_EMB_SDA21, /* type */
1399 0, /* rightshift */
1400 2, /* size (0 = byte, 1 = short, 2 = long) */
1401 16, /* bitsize */
1402 FALSE, /* pc_relative */
1403 0, /* bitpos */
1404 complain_overflow_signed, /* complain_on_overflow */
3ce51288 1405 ppc_elf_unhandled_reloc, /* special_function */
25dbc73a
AM
1406 "R_PPC_EMB_SDA21", /* name */
1407 FALSE, /* partial_inplace */
1408 0, /* src_mask */
1409 0xffff, /* dst_mask */
1410 FALSE), /* pcrel_offset */
1411
1412 /* Relocation not handled: R_PPC_EMB_MRKREF */
1413 /* Relocation not handled: R_PPC_EMB_RELSEC16 */
1414 /* Relocation not handled: R_PPC_EMB_RELST_LO */
1415 /* Relocation not handled: R_PPC_EMB_RELST_HI */
1416 /* Relocation not handled: R_PPC_EMB_RELST_HA */
1417 /* Relocation not handled: R_PPC_EMB_BIT_FLD */
1418
1419 /* PC relative relocation against either _SDA_BASE_ or _SDA2_BASE_, filling
1420 in the 16 bit signed offset from the appropriate base, and filling in the
1421 register field with the appropriate register (0, 2, or 13). */
1422 HOWTO (R_PPC_EMB_RELSDA, /* type */
1423 0, /* rightshift */
1424 1, /* size (0 = byte, 1 = short, 2 = long) */
1425 16, /* bitsize */
ddfd6795 1426 FALSE, /* pc_relative */
25dbc73a
AM
1427 0, /* bitpos */
1428 complain_overflow_signed, /* complain_on_overflow */
3ce51288 1429 ppc_elf_unhandled_reloc, /* special_function */
25dbc73a
AM
1430 "R_PPC_EMB_RELSDA", /* name */
1431 FALSE, /* partial_inplace */
1432 0, /* src_mask */
1433 0xffff, /* dst_mask */
1434 FALSE), /* pcrel_offset */
1435
b9c361e0
JL
1436 /* A relative 8 bit branch. */
1437 HOWTO (R_PPC_VLE_REL8, /* type */
1438 1, /* rightshift */
1439 1, /* size (0 = byte, 1 = short, 2 = long) */
1440 8, /* bitsize */
1441 TRUE, /* pc_relative */
1442 0, /* bitpos */
1443 complain_overflow_signed, /* complain_on_overflow */
1444 bfd_elf_generic_reloc, /* special_function */
1445 "R_PPC_VLE_REL8", /* name */
1446 FALSE, /* partial_inplace */
1447 0, /* src_mask */
1448 0xff, /* dst_mask */
1449 TRUE), /* pcrel_offset */
68ffbac6 1450
b9c361e0
JL
1451 /* A relative 15 bit branch. */
1452 HOWTO (R_PPC_VLE_REL15, /* type */
1453 1, /* rightshift */
1454 2, /* size (0 = byte, 1 = short, 2 = long) */
1455 15, /* bitsize */
1456 TRUE, /* pc_relative */
1457 1, /* bitpos */
1458 complain_overflow_signed, /* complain_on_overflow */
1459 bfd_elf_generic_reloc, /* special_function */
1460 "R_PPC_VLE_REL15", /* name */
1461 FALSE, /* partial_inplace */
1462 0, /* src_mask */
dfdaec14 1463 0xfffe, /* dst_mask */
b9c361e0
JL
1464 TRUE), /* pcrel_offset */
1465
68ffbac6 1466 /* A relative 24 bit branch. */
b9c361e0
JL
1467 HOWTO (R_PPC_VLE_REL24, /* type */
1468 1, /* rightshift */
1469 2, /* size (0 = byte, 1 = short, 2 = long) */
1470 24, /* bitsize */
1471 TRUE, /* pc_relative */
1472 1, /* bitpos */
1473 complain_overflow_signed, /* complain_on_overflow */
1474 bfd_elf_generic_reloc, /* special_function */
1475 "R_PPC_VLE_REL24", /* name */
1476 FALSE, /* partial_inplace */
1477 0, /* src_mask */
1478 0x1fffffe, /* dst_mask */
1479 TRUE), /* pcrel_offset */
1480
1481 /* The 16 LSBS in split16a format. */
1482 HOWTO (R_PPC_VLE_LO16A, /* type */
1483 0, /* rightshift */
1484 2, /* size (0 = byte, 1 = short, 2 = long) */
86c95733 1485 16, /* bitsize */
bdaacd3a 1486 FALSE, /* pc_relative */
b9c361e0 1487 0, /* bitpos */
86c95733 1488 complain_overflow_dont, /* complain_on_overflow */
3ce51288 1489 ppc_elf_unhandled_reloc, /* special_function */
b9c361e0
JL
1490 "R_PPC_VLE_LO16A", /* name */
1491 FALSE, /* partial_inplace */
1492 0, /* src_mask */
08dc996f 1493 0x1f07ff, /* dst_mask */
b9c361e0
JL
1494 FALSE), /* pcrel_offset */
1495
1496 /* The 16 LSBS in split16d format. */
1497 HOWTO (R_PPC_VLE_LO16D, /* type */
1498 0, /* rightshift */
1499 2, /* size (0 = byte, 1 = short, 2 = long) */
86c95733 1500 16, /* bitsize */
b9c361e0
JL
1501 FALSE, /* pc_relative */
1502 0, /* bitpos */
86c95733 1503 complain_overflow_dont, /* complain_on_overflow */
3ce51288
AM
1504 ppc_elf_unhandled_reloc, /* special_function */
1505 "R_PPC_VLE_LO16D", /* name */
b9c361e0
JL
1506 FALSE, /* partial_inplace */
1507 0, /* src_mask */
5499c7c7 1508 0x3e007ff, /* dst_mask */
b9c361e0
JL
1509 FALSE), /* pcrel_offset */
1510
1511 /* Bits 16-31 split16a format. */
1512 HOWTO (R_PPC_VLE_HI16A, /* type */
86c95733 1513 16, /* rightshift */
b9c361e0 1514 2, /* size (0 = byte, 1 = short, 2 = long) */
86c95733 1515 16, /* bitsize */
b9c361e0
JL
1516 FALSE, /* pc_relative */
1517 0, /* bitpos */
86c95733 1518 complain_overflow_dont, /* complain_on_overflow */
3ce51288
AM
1519 ppc_elf_unhandled_reloc, /* special_function */
1520 "R_PPC_VLE_HI16A", /* name */
b9c361e0
JL
1521 FALSE, /* partial_inplace */
1522 0, /* src_mask */
08dc996f 1523 0x1f07ff, /* dst_mask */
b9c361e0
JL
1524 FALSE), /* pcrel_offset */
1525
1526 /* Bits 16-31 split16d format. */
1527 HOWTO (R_PPC_VLE_HI16D, /* type */
86c95733 1528 16, /* rightshift */
b9c361e0 1529 2, /* size (0 = byte, 1 = short, 2 = long) */
86c95733 1530 16, /* bitsize */
b9c361e0
JL
1531 FALSE, /* pc_relative */
1532 0, /* bitpos */
86c95733 1533 complain_overflow_dont, /* complain_on_overflow */
3ce51288
AM
1534 ppc_elf_unhandled_reloc, /* special_function */
1535 "R_PPC_VLE_HI16D", /* name */
b9c361e0
JL
1536 FALSE, /* partial_inplace */
1537 0, /* src_mask */
5499c7c7 1538 0x3e007ff, /* dst_mask */
b9c361e0
JL
1539 FALSE), /* pcrel_offset */
1540
1541 /* Bits 16-31 (High Adjusted) in split16a format. */
1542 HOWTO (R_PPC_VLE_HA16A, /* type */
86c95733 1543 16, /* rightshift */
b9c361e0 1544 2, /* size (0 = byte, 1 = short, 2 = long) */
86c95733 1545 16, /* bitsize */
b9c361e0
JL
1546 FALSE, /* pc_relative */
1547 0, /* bitpos */
86c95733 1548 complain_overflow_dont, /* complain_on_overflow */
3ce51288
AM
1549 ppc_elf_unhandled_reloc, /* special_function */
1550 "R_PPC_VLE_HA16A", /* name */
b9c361e0
JL
1551 FALSE, /* partial_inplace */
1552 0, /* src_mask */
08dc996f 1553 0x1f07ff, /* dst_mask */
b9c361e0
JL
1554 FALSE), /* pcrel_offset */
1555
1556 /* Bits 16-31 (High Adjusted) in split16d format. */
1557 HOWTO (R_PPC_VLE_HA16D, /* type */
86c95733 1558 16, /* rightshift */
b9c361e0 1559 2, /* size (0 = byte, 1 = short, 2 = long) */
86c95733 1560 16, /* bitsize */
b9c361e0
JL
1561 FALSE, /* pc_relative */
1562 0, /* bitpos */
86c95733 1563 complain_overflow_dont, /* complain_on_overflow */
3ce51288
AM
1564 ppc_elf_unhandled_reloc, /* special_function */
1565 "R_PPC_VLE_HA16D", /* name */
b9c361e0
JL
1566 FALSE, /* partial_inplace */
1567 0, /* src_mask */
5499c7c7 1568 0x3e007ff, /* dst_mask */
b9c361e0
JL
1569 FALSE), /* pcrel_offset */
1570
86c95733
AM
1571 /* This reloc is like R_PPC_EMB_SDA21 but only applies to e_add16i
1572 instructions. If the register base is 0 then the linker changes
1573 the e_add16i to an e_li instruction. */
1574 HOWTO (R_PPC_VLE_SDA21, /* type */
b9c361e0
JL
1575 0, /* rightshift */
1576 2, /* size (0 = byte, 1 = short, 2 = long) */
86c95733 1577 16, /* bitsize */
b9c361e0
JL
1578 FALSE, /* pc_relative */
1579 0, /* bitpos */
86c95733 1580 complain_overflow_signed, /* complain_on_overflow */
3ce51288
AM
1581 ppc_elf_unhandled_reloc, /* special_function */
1582 "R_PPC_VLE_SDA21", /* name */
b9c361e0
JL
1583 FALSE, /* partial_inplace */
1584 0, /* src_mask */
1585 0xffff, /* dst_mask */
1586 FALSE), /* pcrel_offset */
1587
86c95733 1588 /* Like R_PPC_VLE_SDA21 but ignore overflow. */
b9c361e0
JL
1589 HOWTO (R_PPC_VLE_SDA21_LO, /* type */
1590 0, /* rightshift */
1591 2, /* size (0 = byte, 1 = short, 2 = long) */
86c95733 1592 16, /* bitsize */
b9c361e0
JL
1593 FALSE, /* pc_relative */
1594 0, /* bitpos */
86c95733 1595 complain_overflow_dont, /* complain_on_overflow */
3ce51288 1596 ppc_elf_unhandled_reloc, /* special_function */
b9c361e0
JL
1597 "R_PPC_VLE_SDA21_LO", /* name */
1598 FALSE, /* partial_inplace */
1599 0, /* src_mask */
86c95733 1600 0xffff, /* dst_mask */
b9c361e0
JL
1601 FALSE), /* pcrel_offset */
1602
1603 /* The 16 LSBS relative to _SDA_BASE_ in split16a format. */
1604 HOWTO (R_PPC_VLE_SDAREL_LO16A,/* type */
1605 0, /* rightshift */
1606 2, /* size (0 = byte, 1 = short, 2 = long) */
86c95733 1607 16, /* bitsize */
b9c361e0
JL
1608 FALSE, /* pc_relative */
1609 0, /* bitpos */
3ce51288
AM
1610 complain_overflow_dont, /* complain_on_overflow */
1611 ppc_elf_unhandled_reloc, /* special_function */
1612 "R_PPC_VLE_SDAREL_LO16A", /* name */
b9c361e0
JL
1613 FALSE, /* partial_inplace */
1614 0, /* src_mask */
08dc996f 1615 0x1f07ff, /* dst_mask */
b9c361e0
JL
1616 FALSE), /* pcrel_offset */
1617
1618 /* The 16 LSBS relative to _SDA_BASE_ in split16d format. */
b9c361e0
JL
1619 HOWTO (R_PPC_VLE_SDAREL_LO16D, /* type */
1620 0, /* rightshift */
1621 2, /* size (0 = byte, 1 = short, 2 = long) */
86c95733 1622 16, /* bitsize */
b9c361e0
JL
1623 FALSE, /* pc_relative */
1624 0, /* bitpos */
3ce51288
AM
1625 complain_overflow_dont, /* complain_on_overflow */
1626 ppc_elf_unhandled_reloc, /* special_function */
1627 "R_PPC_VLE_SDAREL_LO16D", /* name */
b9c361e0
JL
1628 FALSE, /* partial_inplace */
1629 0, /* src_mask */
5499c7c7 1630 0x3e007ff, /* dst_mask */
b9c361e0
JL
1631 FALSE), /* pcrel_offset */
1632
1633 /* Bits 16-31 relative to _SDA_BASE_ in split16a format. */
3ce51288 1634 HOWTO (R_PPC_VLE_SDAREL_HI16A, /* type */
86c95733 1635 16, /* rightshift */
b9c361e0 1636 2, /* size (0 = byte, 1 = short, 2 = long) */
86c95733 1637 16, /* bitsize */
b9c361e0
JL
1638 FALSE, /* pc_relative */
1639 0, /* bitpos */
3ce51288
AM
1640 complain_overflow_dont, /* complain_on_overflow */
1641 ppc_elf_unhandled_reloc, /* special_function */
1642 "R_PPC_VLE_SDAREL_HI16A", /* name */
b9c361e0
JL
1643 FALSE, /* partial_inplace */
1644 0, /* src_mask */
08dc996f 1645 0x1f07ff, /* dst_mask */
b9c361e0
JL
1646 FALSE), /* pcrel_offset */
1647
1648 /* Bits 16-31 relative to _SDA_BASE_ in split16d format. */
3ce51288 1649 HOWTO (R_PPC_VLE_SDAREL_HI16D, /* type */
86c95733 1650 16, /* rightshift */
b9c361e0 1651 2, /* size (0 = byte, 1 = short, 2 = long) */
86c95733 1652 16, /* bitsize */
b9c361e0
JL
1653 FALSE, /* pc_relative */
1654 0, /* bitpos */
3ce51288
AM
1655 complain_overflow_dont, /* complain_on_overflow */
1656 ppc_elf_unhandled_reloc, /* special_function */
1657 "R_PPC_VLE_SDAREL_HI16D", /* name */
b9c361e0
JL
1658 FALSE, /* partial_inplace */
1659 0, /* src_mask */
5499c7c7 1660 0x3e007ff, /* dst_mask */
b9c361e0
JL
1661 FALSE), /* pcrel_offset */
1662
1663 /* Bits 16-31 (HA) relative to _SDA_BASE split16a format. */
3ce51288 1664 HOWTO (R_PPC_VLE_SDAREL_HA16A, /* type */
86c95733 1665 16, /* rightshift */
b9c361e0 1666 2, /* size (0 = byte, 1 = short, 2 = long) */
86c95733 1667 16, /* bitsize */
b9c361e0
JL
1668 FALSE, /* pc_relative */
1669 0, /* bitpos */
3ce51288
AM
1670 complain_overflow_dont, /* complain_on_overflow */
1671 ppc_elf_unhandled_reloc, /* special_function */
1672 "R_PPC_VLE_SDAREL_HA16A", /* name */
b9c361e0
JL
1673 FALSE, /* partial_inplace */
1674 0, /* src_mask */
08dc996f 1675 0x1f07ff, /* dst_mask */
b9c361e0
JL
1676 FALSE), /* pcrel_offset */
1677
1678 /* Bits 16-31 (HA) relative to _SDA_BASE split16d format. */
3ce51288 1679 HOWTO (R_PPC_VLE_SDAREL_HA16D, /* type */
86c95733 1680 16, /* rightshift */
b9c361e0 1681 2, /* size (0 = byte, 1 = short, 2 = long) */
86c95733 1682 16, /* bitsize */
b9c361e0
JL
1683 FALSE, /* pc_relative */
1684 0, /* bitpos */
3ce51288
AM
1685 complain_overflow_dont, /* complain_on_overflow */
1686 ppc_elf_unhandled_reloc, /* special_function */
1687 "R_PPC_VLE_SDAREL_HA16D", /* name */
b9c361e0
JL
1688 FALSE, /* partial_inplace */
1689 0, /* src_mask */
5499c7c7 1690 0x3e007ff, /* dst_mask */
b9c361e0
JL
1691 FALSE), /* pcrel_offset */
1692
83eef883
AFB
1693 /* e_li split20 format. */
1694 HOWTO (R_PPC_VLE_ADDR20, /* type */
1695 16, /* rightshift */
1696 2, /* size (0 = byte, 1 = short, 2 = long) */
1697 20, /* bitsize */
1698 FALSE, /* pc_relative */
1699 0, /* bitpos */
1700 complain_overflow_dont, /* complain_on_overflow */
1701 bfd_elf_generic_reloc, /* special_function */
1702 "R_PPC_VLE_ADDR20", /* name */
1703 FALSE, /* partial_inplace */
1704 0, /* src_mask */
1705 0x1f07ff, /* dst_mask */
1706 FALSE), /* pcrel_offset */
1707
e054468f
AM
1708 HOWTO (R_PPC_IRELATIVE, /* type */
1709 0, /* rightshift */
1710 2, /* size (0 = byte, 1 = short, 2 = long) */
1711 32, /* bitsize */
1712 FALSE, /* pc_relative */
1713 0, /* bitpos */
86c95733 1714 complain_overflow_dont, /* complain_on_overflow */
3ce51288 1715 ppc_elf_unhandled_reloc, /* special_function */
e054468f
AM
1716 "R_PPC_IRELATIVE", /* name */
1717 FALSE, /* partial_inplace */
1718 0, /* src_mask */
1719 0xffffffff, /* dst_mask */
1720 FALSE), /* pcrel_offset */
1721
d7128ce4
AM
1722 /* A 16 bit relative relocation. */
1723 HOWTO (R_PPC_REL16, /* type */
1724 0, /* rightshift */
1725 1, /* size (0 = byte, 1 = short, 2 = long) */
1726 16, /* bitsize */
1727 TRUE, /* pc_relative */
1728 0, /* bitpos */
86c95733 1729 complain_overflow_signed, /* complain_on_overflow */
d7128ce4
AM
1730 bfd_elf_generic_reloc, /* special_function */
1731 "R_PPC_REL16", /* name */
1732 FALSE, /* partial_inplace */
1733 0, /* src_mask */
1734 0xffff, /* dst_mask */
1735 TRUE), /* pcrel_offset */
1736
1737 /* A 16 bit relative relocation without overflow. */
1738 HOWTO (R_PPC_REL16_LO, /* type */
1739 0, /* rightshift */
1740 1, /* size (0 = byte, 1 = short, 2 = long) */
1741 16, /* bitsize */
1742 TRUE, /* pc_relative */
1743 0, /* bitpos */
1744 complain_overflow_dont,/* complain_on_overflow */
1745 bfd_elf_generic_reloc, /* special_function */
1746 "R_PPC_REL16_LO", /* name */
1747 FALSE, /* partial_inplace */
1748 0, /* src_mask */
1749 0xffff, /* dst_mask */
1750 TRUE), /* pcrel_offset */
1751
1752 /* The high order 16 bits of a relative address. */
1753 HOWTO (R_PPC_REL16_HI, /* type */
1754 16, /* rightshift */
1755 1, /* size (0 = byte, 1 = short, 2 = long) */
1756 16, /* bitsize */
1757 TRUE, /* pc_relative */
1758 0, /* bitpos */
1759 complain_overflow_dont, /* complain_on_overflow */
1760 bfd_elf_generic_reloc, /* special_function */
1761 "R_PPC_REL16_HI", /* name */
1762 FALSE, /* partial_inplace */
1763 0, /* src_mask */
1764 0xffff, /* dst_mask */
1765 TRUE), /* pcrel_offset */
1766
1767 /* The high order 16 bits of a relative address, plus 1 if the contents of
1768 the low 16 bits, treated as a signed number, is negative. */
1769 HOWTO (R_PPC_REL16_HA, /* type */
1770 16, /* rightshift */
1771 1, /* size (0 = byte, 1 = short, 2 = long) */
1772 16, /* bitsize */
1773 TRUE, /* pc_relative */
1774 0, /* bitpos */
1775 complain_overflow_dont, /* complain_on_overflow */
1776 ppc_elf_addr16_ha_reloc, /* special_function */
1777 "R_PPC_REL16_HA", /* name */
1778 FALSE, /* partial_inplace */
1779 0, /* src_mask */
1780 0xffff, /* dst_mask */
1781 TRUE), /* pcrel_offset */
1782
a680de9a
PB
1783 /* Like R_PPC_REL16_HA but for split field in addpcis. */
1784 HOWTO (R_PPC_REL16DX_HA, /* type */
1785 16, /* rightshift */
1786 2, /* size (0 = byte, 1 = short, 2 = long) */
1787 16, /* bitsize */
1788 TRUE, /* pc_relative */
1789 0, /* bitpos */
1790 complain_overflow_signed, /* complain_on_overflow */
1791 ppc_elf_addr16_ha_reloc, /* special_function */
1792 "R_PPC_REL16DX_HA", /* name */
1793 FALSE, /* partial_inplace */
1794 0, /* src_mask */
1795 0x1fffc1, /* dst_mask */
1796 TRUE), /* pcrel_offset */
1797
7ba71655
AM
1798 /* A split-field reloc for addpcis, non-relative (gas internal use only). */
1799 HOWTO (R_PPC_16DX_HA, /* type */
1800 16, /* rightshift */
1801 2, /* size (0 = byte, 1 = short, 2 = long) */
1802 16, /* bitsize */
1803 FALSE, /* pc_relative */
1804 0, /* bitpos */
1805 complain_overflow_signed, /* complain_on_overflow */
1806 ppc_elf_addr16_ha_reloc, /* special_function */
1807 "R_PPC_16DX_HA", /* name */
1808 FALSE, /* partial_inplace */
1809 0, /* src_mask */
1810 0x1fffc1, /* dst_mask */
1811 FALSE), /* pcrel_offset */
1812
25dbc73a
AM
1813 /* GNU extension to record C++ vtable hierarchy. */
1814 HOWTO (R_PPC_GNU_VTINHERIT, /* type */
1815 0, /* rightshift */
1816 0, /* size (0 = byte, 1 = short, 2 = long) */
1817 0, /* bitsize */
1818 FALSE, /* pc_relative */
1819 0, /* bitpos */
1820 complain_overflow_dont, /* complain_on_overflow */
1821 NULL, /* special_function */
1822 "R_PPC_GNU_VTINHERIT", /* name */
1823 FALSE, /* partial_inplace */
1824 0, /* src_mask */
1825 0, /* dst_mask */
1826 FALSE), /* pcrel_offset */
1827
1828 /* GNU extension to record C++ vtable member usage. */
1829 HOWTO (R_PPC_GNU_VTENTRY, /* type */
1830 0, /* rightshift */
1831 0, /* size (0 = byte, 1 = short, 2 = long) */
1832 0, /* bitsize */
1833 FALSE, /* pc_relative */
1834 0, /* bitpos */
1835 complain_overflow_dont, /* complain_on_overflow */
1836 NULL, /* special_function */
1837 "R_PPC_GNU_VTENTRY", /* name */
7619e7c7
AM
1838 FALSE, /* partial_inplace */
1839 0, /* src_mask */
25dbc73a 1840 0, /* dst_mask */
7619e7c7
AM
1841 FALSE), /* pcrel_offset */
1842
25dbc73a
AM
1843 /* Phony reloc to handle AIX style TOC entries. */
1844 HOWTO (R_PPC_TOC16, /* type */
7619e7c7
AM
1845 0, /* rightshift */
1846 1, /* size (0 = byte, 1 = short, 2 = long) */
1847 16, /* bitsize */
1848 FALSE, /* pc_relative */
1849 0, /* bitpos */
25dbc73a 1850 complain_overflow_signed, /* complain_on_overflow */
3ce51288 1851 ppc_elf_unhandled_reloc, /* special_function */
25dbc73a 1852 "R_PPC_TOC16", /* name */
7619e7c7
AM
1853 FALSE, /* partial_inplace */
1854 0, /* src_mask */
1855 0xffff, /* dst_mask */
1856 FALSE), /* pcrel_offset */
25dbc73a
AM
1857};
1858\f
1859/* Initialize the ppc_elf_howto_table, so that linear accesses can be done. */
1860
1861static void
1862ppc_elf_howto_init (void)
1863{
1864 unsigned int i, type;
1865
1866 for (i = 0;
1867 i < sizeof (ppc_elf_howto_raw) / sizeof (ppc_elf_howto_raw[0]);
1868 i++)
1869 {
1870 type = ppc_elf_howto_raw[i].type;
1871 if (type >= (sizeof (ppc_elf_howto_table)
1872 / sizeof (ppc_elf_howto_table[0])))
1873 abort ();
1874 ppc_elf_howto_table[type] = &ppc_elf_howto_raw[i];
1875 }
1876}
1877
1878static reloc_howto_type *
1879ppc_elf_reloc_type_lookup (bfd *abfd ATTRIBUTE_UNUSED,
1880 bfd_reloc_code_real_type code)
1881{
1882 enum elf_ppc_reloc_type r;
1883
1884 /* Initialize howto table if not already done. */
1885 if (!ppc_elf_howto_table[R_PPC_ADDR32])
1886 ppc_elf_howto_init ();
1887
1888 switch (code)
1889 {
1890 default:
1891 return NULL;
1892
1893 case BFD_RELOC_NONE: r = R_PPC_NONE; break;
1894 case BFD_RELOC_32: r = R_PPC_ADDR32; break;
1895 case BFD_RELOC_PPC_BA26: r = R_PPC_ADDR24; break;
1fe532cf 1896 case BFD_RELOC_PPC64_ADDR16_DS:
25dbc73a 1897 case BFD_RELOC_16: r = R_PPC_ADDR16; break;
1fe532cf 1898 case BFD_RELOC_PPC64_ADDR16_LO_DS:
25dbc73a
AM
1899 case BFD_RELOC_LO16: r = R_PPC_ADDR16_LO; break;
1900 case BFD_RELOC_HI16: r = R_PPC_ADDR16_HI; break;
1901 case BFD_RELOC_HI16_S: r = R_PPC_ADDR16_HA; break;
1902 case BFD_RELOC_PPC_BA16: r = R_PPC_ADDR14; break;
1903 case BFD_RELOC_PPC_BA16_BRTAKEN: r = R_PPC_ADDR14_BRTAKEN; break;
1904 case BFD_RELOC_PPC_BA16_BRNTAKEN: r = R_PPC_ADDR14_BRNTAKEN; break;
1905 case BFD_RELOC_PPC_B26: r = R_PPC_REL24; break;
1906 case BFD_RELOC_PPC_B16: r = R_PPC_REL14; break;
1907 case BFD_RELOC_PPC_B16_BRTAKEN: r = R_PPC_REL14_BRTAKEN; break;
1908 case BFD_RELOC_PPC_B16_BRNTAKEN: r = R_PPC_REL14_BRNTAKEN; break;
1fe532cf 1909 case BFD_RELOC_PPC64_GOT16_DS:
25dbc73a 1910 case BFD_RELOC_16_GOTOFF: r = R_PPC_GOT16; break;
1fe532cf 1911 case BFD_RELOC_PPC64_GOT16_LO_DS:
25dbc73a
AM
1912 case BFD_RELOC_LO16_GOTOFF: r = R_PPC_GOT16_LO; break;
1913 case BFD_RELOC_HI16_GOTOFF: r = R_PPC_GOT16_HI; break;
1914 case BFD_RELOC_HI16_S_GOTOFF: r = R_PPC_GOT16_HA; break;
1915 case BFD_RELOC_24_PLT_PCREL: r = R_PPC_PLTREL24; break;
1916 case BFD_RELOC_PPC_COPY: r = R_PPC_COPY; break;
1917 case BFD_RELOC_PPC_GLOB_DAT: r = R_PPC_GLOB_DAT; break;
1918 case BFD_RELOC_PPC_LOCAL24PC: r = R_PPC_LOCAL24PC; break;
1919 case BFD_RELOC_32_PCREL: r = R_PPC_REL32; break;
1920 case BFD_RELOC_32_PLTOFF: r = R_PPC_PLT32; break;
1921 case BFD_RELOC_32_PLT_PCREL: r = R_PPC_PLTREL32; break;
1fe532cf 1922 case BFD_RELOC_PPC64_PLT16_LO_DS:
25dbc73a
AM
1923 case BFD_RELOC_LO16_PLTOFF: r = R_PPC_PLT16_LO; break;
1924 case BFD_RELOC_HI16_PLTOFF: r = R_PPC_PLT16_HI; break;
1925 case BFD_RELOC_HI16_S_PLTOFF: r = R_PPC_PLT16_HA; break;
1926 case BFD_RELOC_GPREL16: r = R_PPC_SDAREL16; break;
1fe532cf 1927 case BFD_RELOC_PPC64_SECTOFF_DS:
25dbc73a 1928 case BFD_RELOC_16_BASEREL: r = R_PPC_SECTOFF; break;
1fe532cf 1929 case BFD_RELOC_PPC64_SECTOFF_LO_DS:
25dbc73a
AM
1930 case BFD_RELOC_LO16_BASEREL: r = R_PPC_SECTOFF_LO; break;
1931 case BFD_RELOC_HI16_BASEREL: r = R_PPC_SECTOFF_HI; break;
1932 case BFD_RELOC_HI16_S_BASEREL: r = R_PPC_SECTOFF_HA; break;
1933 case BFD_RELOC_CTOR: r = R_PPC_ADDR32; break;
1fe532cf 1934 case BFD_RELOC_PPC64_TOC16_DS:
25dbc73a
AM
1935 case BFD_RELOC_PPC_TOC16: r = R_PPC_TOC16; break;
1936 case BFD_RELOC_PPC_TLS: r = R_PPC_TLS; break;
727fc41e
AM
1937 case BFD_RELOC_PPC_TLSGD: r = R_PPC_TLSGD; break;
1938 case BFD_RELOC_PPC_TLSLD: r = R_PPC_TLSLD; break;
25dbc73a 1939 case BFD_RELOC_PPC_DTPMOD: r = R_PPC_DTPMOD32; break;
1fe532cf 1940 case BFD_RELOC_PPC64_TPREL16_DS:
25dbc73a 1941 case BFD_RELOC_PPC_TPREL16: r = R_PPC_TPREL16; break;
1fe532cf 1942 case BFD_RELOC_PPC64_TPREL16_LO_DS:
25dbc73a
AM
1943 case BFD_RELOC_PPC_TPREL16_LO: r = R_PPC_TPREL16_LO; break;
1944 case BFD_RELOC_PPC_TPREL16_HI: r = R_PPC_TPREL16_HI; break;
1945 case BFD_RELOC_PPC_TPREL16_HA: r = R_PPC_TPREL16_HA; break;
1946 case BFD_RELOC_PPC_TPREL: r = R_PPC_TPREL32; break;
1fe532cf 1947 case BFD_RELOC_PPC64_DTPREL16_DS:
25dbc73a 1948 case BFD_RELOC_PPC_DTPREL16: r = R_PPC_DTPREL16; break;
1fe532cf 1949 case BFD_RELOC_PPC64_DTPREL16_LO_DS:
25dbc73a
AM
1950 case BFD_RELOC_PPC_DTPREL16_LO: r = R_PPC_DTPREL16_LO; break;
1951 case BFD_RELOC_PPC_DTPREL16_HI: r = R_PPC_DTPREL16_HI; break;
1952 case BFD_RELOC_PPC_DTPREL16_HA: r = R_PPC_DTPREL16_HA; break;
1953 case BFD_RELOC_PPC_DTPREL: r = R_PPC_DTPREL32; break;
1954 case BFD_RELOC_PPC_GOT_TLSGD16: r = R_PPC_GOT_TLSGD16; break;
1955 case BFD_RELOC_PPC_GOT_TLSGD16_LO: r = R_PPC_GOT_TLSGD16_LO; break;
1956 case BFD_RELOC_PPC_GOT_TLSGD16_HI: r = R_PPC_GOT_TLSGD16_HI; break;
1957 case BFD_RELOC_PPC_GOT_TLSGD16_HA: r = R_PPC_GOT_TLSGD16_HA; break;
1958 case BFD_RELOC_PPC_GOT_TLSLD16: r = R_PPC_GOT_TLSLD16; break;
1959 case BFD_RELOC_PPC_GOT_TLSLD16_LO: r = R_PPC_GOT_TLSLD16_LO; break;
1960 case BFD_RELOC_PPC_GOT_TLSLD16_HI: r = R_PPC_GOT_TLSLD16_HI; break;
1961 case BFD_RELOC_PPC_GOT_TLSLD16_HA: r = R_PPC_GOT_TLSLD16_HA; break;
1962 case BFD_RELOC_PPC_GOT_TPREL16: r = R_PPC_GOT_TPREL16; break;
1963 case BFD_RELOC_PPC_GOT_TPREL16_LO: r = R_PPC_GOT_TPREL16_LO; break;
1964 case BFD_RELOC_PPC_GOT_TPREL16_HI: r = R_PPC_GOT_TPREL16_HI; break;
1965 case BFD_RELOC_PPC_GOT_TPREL16_HA: r = R_PPC_GOT_TPREL16_HA; break;
1966 case BFD_RELOC_PPC_GOT_DTPREL16: r = R_PPC_GOT_DTPREL16; break;
1967 case BFD_RELOC_PPC_GOT_DTPREL16_LO: r = R_PPC_GOT_DTPREL16_LO; break;
1968 case BFD_RELOC_PPC_GOT_DTPREL16_HI: r = R_PPC_GOT_DTPREL16_HI; break;
1969 case BFD_RELOC_PPC_GOT_DTPREL16_HA: r = R_PPC_GOT_DTPREL16_HA; break;
1970 case BFD_RELOC_PPC_EMB_NADDR32: r = R_PPC_EMB_NADDR32; break;
1971 case BFD_RELOC_PPC_EMB_NADDR16: r = R_PPC_EMB_NADDR16; break;
1972 case BFD_RELOC_PPC_EMB_NADDR16_LO: r = R_PPC_EMB_NADDR16_LO; break;
1973 case BFD_RELOC_PPC_EMB_NADDR16_HI: r = R_PPC_EMB_NADDR16_HI; break;
1974 case BFD_RELOC_PPC_EMB_NADDR16_HA: r = R_PPC_EMB_NADDR16_HA; break;
1975 case BFD_RELOC_PPC_EMB_SDAI16: r = R_PPC_EMB_SDAI16; break;
1976 case BFD_RELOC_PPC_EMB_SDA2I16: r = R_PPC_EMB_SDA2I16; break;
1977 case BFD_RELOC_PPC_EMB_SDA2REL: r = R_PPC_EMB_SDA2REL; break;
1978 case BFD_RELOC_PPC_EMB_SDA21: r = R_PPC_EMB_SDA21; break;
1979 case BFD_RELOC_PPC_EMB_MRKREF: r = R_PPC_EMB_MRKREF; break;
1980 case BFD_RELOC_PPC_EMB_RELSEC16: r = R_PPC_EMB_RELSEC16; break;
1981 case BFD_RELOC_PPC_EMB_RELST_LO: r = R_PPC_EMB_RELST_LO; break;
1982 case BFD_RELOC_PPC_EMB_RELST_HI: r = R_PPC_EMB_RELST_HI; break;
1983 case BFD_RELOC_PPC_EMB_RELST_HA: r = R_PPC_EMB_RELST_HA; break;
1984 case BFD_RELOC_PPC_EMB_BIT_FLD: r = R_PPC_EMB_BIT_FLD; break;
1985 case BFD_RELOC_PPC_EMB_RELSDA: r = R_PPC_EMB_RELSDA; break;
b9c361e0
JL
1986 case BFD_RELOC_PPC_VLE_REL8: r = R_PPC_VLE_REL8; break;
1987 case BFD_RELOC_PPC_VLE_REL15: r = R_PPC_VLE_REL15; break;
1988 case BFD_RELOC_PPC_VLE_REL24: r = R_PPC_VLE_REL24; break;
1989 case BFD_RELOC_PPC_VLE_LO16A: r = R_PPC_VLE_LO16A; break;
1990 case BFD_RELOC_PPC_VLE_LO16D: r = R_PPC_VLE_LO16D; break;
1991 case BFD_RELOC_PPC_VLE_HI16A: r = R_PPC_VLE_HI16A; break;
1992 case BFD_RELOC_PPC_VLE_HI16D: r = R_PPC_VLE_HI16D; break;
1993 case BFD_RELOC_PPC_VLE_HA16A: r = R_PPC_VLE_HA16A; break;
1994 case BFD_RELOC_PPC_VLE_HA16D: r = R_PPC_VLE_HA16D; break;
1995 case BFD_RELOC_PPC_VLE_SDA21: r = R_PPC_VLE_SDA21; break;
1996 case BFD_RELOC_PPC_VLE_SDA21_LO: r = R_PPC_VLE_SDA21_LO; break;
1997 case BFD_RELOC_PPC_VLE_SDAREL_LO16A:
1998 r = R_PPC_VLE_SDAREL_LO16A;
1999 break;
2000 case BFD_RELOC_PPC_VLE_SDAREL_LO16D:
2001 r = R_PPC_VLE_SDAREL_LO16D;
2002 break;
2003 case BFD_RELOC_PPC_VLE_SDAREL_HI16A:
2004 r = R_PPC_VLE_SDAREL_HI16A;
2005 break;
2006 case BFD_RELOC_PPC_VLE_SDAREL_HI16D:
2007 r = R_PPC_VLE_SDAREL_HI16D;
2008 break;
2009 case BFD_RELOC_PPC_VLE_SDAREL_HA16A:
2010 r = R_PPC_VLE_SDAREL_HA16A;
2011 break;
2012 case BFD_RELOC_PPC_VLE_SDAREL_HA16D:
2013 r = R_PPC_VLE_SDAREL_HA16D;
2014 break;
d7128ce4
AM
2015 case BFD_RELOC_16_PCREL: r = R_PPC_REL16; break;
2016 case BFD_RELOC_LO16_PCREL: r = R_PPC_REL16_LO; break;
2017 case BFD_RELOC_HI16_PCREL: r = R_PPC_REL16_HI; break;
2018 case BFD_RELOC_HI16_S_PCREL: r = R_PPC_REL16_HA; break;
7ba71655 2019 case BFD_RELOC_PPC_16DX_HA: r = R_PPC_16DX_HA; break;
a680de9a 2020 case BFD_RELOC_PPC_REL16DX_HA: r = R_PPC_REL16DX_HA; break;
25dbc73a
AM
2021 case BFD_RELOC_VTABLE_INHERIT: r = R_PPC_GNU_VTINHERIT; break;
2022 case BFD_RELOC_VTABLE_ENTRY: r = R_PPC_GNU_VTENTRY; break;
2023 }
2024
2025 return ppc_elf_howto_table[r];
2026};
2027
157090f7
AM
2028static reloc_howto_type *
2029ppc_elf_reloc_name_lookup (bfd *abfd ATTRIBUTE_UNUSED,
2030 const char *r_name)
2031{
2032 unsigned int i;
2033
2034 for (i = 0;
2035 i < sizeof (ppc_elf_howto_raw) / sizeof (ppc_elf_howto_raw[0]);
2036 i++)
2037 if (ppc_elf_howto_raw[i].name != NULL
2038 && strcasecmp (ppc_elf_howto_raw[i].name, r_name) == 0)
2039 return &ppc_elf_howto_raw[i];
2040
2041 return NULL;
2042}
2043
25dbc73a
AM
2044/* Set the howto pointer for a PowerPC ELF reloc. */
2045
f3185997 2046static bfd_boolean
4aef7643 2047ppc_elf_info_to_howto (bfd *abfd,
25dbc73a
AM
2048 arelent *cache_ptr,
2049 Elf_Internal_Rela *dst)
2050{
cd21f5da
NC
2051 unsigned int r_type;
2052
25dbc73a
AM
2053 /* Initialize howto table if not already done. */
2054 if (!ppc_elf_howto_table[R_PPC_ADDR32])
2055 ppc_elf_howto_init ();
2056
cd21f5da
NC
2057 r_type = ELF32_R_TYPE (dst->r_info);
2058 if (r_type >= R_PPC_max)
2059 {
695344c0 2060 /* xgettext:c-format */
0aa13fee 2061 _bfd_error_handler (_("%pB: unsupported relocation type %#x"),
4eca0228 2062 abfd, r_type);
cd21f5da 2063 bfd_set_error (bfd_error_bad_value);
f3185997 2064 return FALSE;
cd21f5da 2065 }
f3185997 2066
cd21f5da 2067 cache_ptr->howto = ppc_elf_howto_table[r_type];
375de94a
AM
2068
2069 /* Just because the above assert didn't trigger doesn't mean that
2070 ELF32_R_TYPE (dst->r_info) is necessarily a valid relocation. */
f3185997 2071 if (cache_ptr->howto == NULL)
375de94a 2072 {
695344c0 2073 /* xgettext:c-format */
0aa13fee 2074 _bfd_error_handler (_("%pB: unsupported relocation type %#x"),
4eca0228 2075 abfd, r_type);
375de94a
AM
2076 bfd_set_error (bfd_error_bad_value);
2077
f3185997 2078 return FALSE;
375de94a 2079 }
f3185997
NC
2080
2081 return TRUE;
25dbc73a
AM
2082}
2083
d7128ce4 2084/* Handle the R_PPC_ADDR16_HA and R_PPC_REL16_HA relocs. */
25dbc73a
AM
2085
2086static bfd_reloc_status_type
4aef7643 2087ppc_elf_addr16_ha_reloc (bfd *abfd,
25dbc73a
AM
2088 arelent *reloc_entry,
2089 asymbol *symbol,
4aef7643 2090 void *data,
25dbc73a
AM
2091 asection *input_section,
2092 bfd *output_bfd,
2093 char **error_message ATTRIBUTE_UNUSED)
2094{
a680de9a
PB
2095 enum elf_ppc_reloc_type r_type;
2096 long insn;
2097 bfd_size_type octets;
2098 bfd_vma value;
25dbc73a
AM
2099
2100 if (output_bfd != NULL)
2101 {
2102 reloc_entry->address += input_section->output_offset;
2103 return bfd_reloc_ok;
2104 }
2105
a680de9a
PB
2106 reloc_entry->addend += 0x8000;
2107 r_type = reloc_entry->howto->type;
2108 if (r_type != R_PPC_REL16DX_HA)
2109 return bfd_reloc_continue;
2110
2111 value = 0;
2112 if (!bfd_is_com_section (symbol->section))
2113 value = symbol->value;
2114 value += (reloc_entry->addend
2115 + symbol->section->output_offset
2116 + symbol->section->output_section->vma);
2117 value -= (reloc_entry->address
2118 + input_section->output_offset
2119 + input_section->output_section->vma);
2120 value >>= 16;
2121
2122 octets = reloc_entry->address * bfd_octets_per_byte (abfd);
2123 insn = bfd_get_32 (abfd, (bfd_byte *) data + octets);
2124 insn &= ~0x1fffc1;
2125 insn |= (value & 0xffc1) | ((value & 0x3e) << 15);
2126 bfd_put_32 (abfd, insn, (bfd_byte *) data + octets);
2127 return bfd_reloc_ok;
25dbc73a
AM
2128}
2129
2130static bfd_reloc_status_type
2131ppc_elf_unhandled_reloc (bfd *abfd,
2132 arelent *reloc_entry,
2133 asymbol *symbol,
2134 void *data,
2135 asection *input_section,
2136 bfd *output_bfd,
2137 char **error_message)
2138{
2139 /* If this is a relocatable link (output_bfd test tells us), just
2140 call the generic function. Any adjustment will be done at final
2141 link time. */
2142 if (output_bfd != NULL)
2143 return bfd_elf_generic_reloc (abfd, reloc_entry, symbol, data,
2144 input_section, output_bfd, error_message);
2145
2146 if (error_message != NULL)
2147 {
2148 static char buf[60];
2149 sprintf (buf, _("generic linker can't handle %s"),
2150 reloc_entry->howto->name);
2151 *error_message = buf;
2152 }
2153 return bfd_reloc_dangerous;
2154}
2155\f
2156/* Sections created by the linker. */
2157
2158typedef struct elf_linker_section
2159{
c9a2f333 2160 /* Pointer to the bfd section. */
25dbc73a 2161 asection *section;
c9a2f333
AM
2162 /* Section name. */
2163 const char *name;
2164 /* Associated bss section name. */
2165 const char *bss_name;
2166 /* Associated symbol name. */
2167 const char *sym_name;
046183de
AM
2168 /* Associated symbol. */
2169 struct elf_link_hash_entry *sym;
25dbc73a
AM
2170} elf_linker_section_t;
2171
2172/* Linked list of allocated pointer entries. This hangs off of the
2173 symbol lists, and provides allows us to return different pointers,
2174 based on different addend's. */
2175
2176typedef struct elf_linker_section_pointers
2177{
2178 /* next allocated pointer for this symbol */
2179 struct elf_linker_section_pointers *next;
2180 /* offset of pointer from beginning of section */
2181 bfd_vma offset;
2182 /* addend used */
2183 bfd_vma addend;
2184 /* which linker section this is */
2185 elf_linker_section_t *lsect;
25dbc73a
AM
2186} elf_linker_section_pointers_t;
2187
2188struct ppc_elf_obj_tdata
2189{
2190 struct elf_obj_tdata elf;
2191
2192 /* A mapping from local symbols to offsets into the various linker
2193 sections added. This is index by the symbol index. */
2194 elf_linker_section_pointers_t **linker_section_pointers;
016687f8
AM
2195
2196 /* Flags used to auto-detect plt type. */
2197 unsigned int makes_plt_call : 1;
2198 unsigned int has_rel16 : 1;
25dbc73a
AM
2199};
2200
2201#define ppc_elf_tdata(bfd) \
2202 ((struct ppc_elf_obj_tdata *) (bfd)->tdata.any)
7619e7c7 2203
25dbc73a
AM
2204#define elf_local_ptr_offsets(bfd) \
2205 (ppc_elf_tdata (bfd)->linker_section_pointers)
7619e7c7 2206
0c8d6e5c
AM
2207#define is_ppc_elf(bfd) \
2208 (bfd_get_flavour (bfd) == bfd_target_elf_flavour \
4dfe6ac6 2209 && elf_object_id (bfd) == PPC32_ELF_DATA)
0c8d6e5c 2210
25dbc73a 2211/* Override the generic function because we store some extras. */
7619e7c7 2212
25dbc73a
AM
2213static bfd_boolean
2214ppc_elf_mkobject (bfd *abfd)
2215{
0ffa91dd 2216 return bfd_elf_allocate_object (abfd, sizeof (struct ppc_elf_obj_tdata),
4dfe6ac6 2217 PPC32_ELF_DATA);
25dbc73a 2218}
7619e7c7 2219
14b57c7c
AM
2220/* When defaulting arch/mach, decode apuinfo to find a better match. */
2221
2222bfd_boolean
2223_bfd_elf_ppc_set_arch (bfd *abfd)
2224{
2225 unsigned long mach = 0;
2226 asection *s;
2227 unsigned char *contents;
2228
2229 if (abfd->arch_info->bits_per_word == 32
2230 && bfd_big_endian (abfd))
2231 {
2232
2233 for (s = abfd->sections; s != NULL; s = s->next)
2234 if ((elf_section_data (s)->this_hdr.sh_flags & SHF_PPC_VLE) != 0)
2235 break;
2236 if (s != NULL)
2237 mach = bfd_mach_ppc_vle;
2238 }
2239
2240 if (mach == 0)
2241 {
2242 s = bfd_get_section_by_name (abfd, APUINFO_SECTION_NAME);
2243 if (s != NULL && bfd_malloc_and_get_section (abfd, s, &contents))
2244 {
2245 unsigned int apuinfo_size = bfd_get_32 (abfd, contents + 4);
2246 unsigned int i;
2247
2248 for (i = 20; i < apuinfo_size + 20 && i + 4 <= s->size; i += 4)
2249 {
2250 unsigned int val = bfd_get_32 (abfd, contents + i);
2251 switch (val >> 16)
2252 {
2253 case PPC_APUINFO_PMR:
2254 case PPC_APUINFO_RFMCI:
2255 if (mach == 0)
2256 mach = bfd_mach_ppc_titan;
2257 break;
2258
2259 case PPC_APUINFO_ISEL:
2260 case PPC_APUINFO_CACHELCK:
2261 if (mach == bfd_mach_ppc_titan)
2262 mach = bfd_mach_ppc_e500mc;
2263 break;
2264
2265 case PPC_APUINFO_SPE:
2266 case PPC_APUINFO_EFS:
2267 case PPC_APUINFO_BRLOCK:
2268 if (mach != bfd_mach_ppc_vle)
2269 mach = bfd_mach_ppc_e500;
8941017b 2270 break;
14b57c7c
AM
2271
2272 case PPC_APUINFO_VLE:
2273 mach = bfd_mach_ppc_vle;
2274 break;
2275
2276 default:
2277 mach = -1ul;
2278 }
2279 }
2280 free (contents);
2281 }
2282 }
2283
2284 if (mach != 0 && mach != -1ul)
2285 {
2286 const bfd_arch_info_type *arch;
2287
2288 for (arch = abfd->arch_info->next; arch; arch = arch->next)
2289 if (arch->mach == mach)
2290 {
2291 abfd->arch_info = arch;
2292 break;
2293 }
2294 }
2295 return TRUE;
2296}
2297
25dbc73a 2298/* Fix bad default arch selected for a 32 bit input bfd when the
14b57c7c 2299 default is 64 bit. Also select arch based on apuinfo. */
7619e7c7 2300
25dbc73a
AM
2301static bfd_boolean
2302ppc_elf_object_p (bfd *abfd)
2303{
14b57c7c
AM
2304 if (!abfd->arch_info->the_default)
2305 return TRUE;
2306
2307 if (abfd->arch_info->bits_per_word == 64)
25dbc73a
AM
2308 {
2309 Elf_Internal_Ehdr *i_ehdr = elf_elfheader (abfd);
7619e7c7 2310
25dbc73a
AM
2311 if (i_ehdr->e_ident[EI_CLASS] == ELFCLASS32)
2312 {
2313 /* Relies on arch after 64 bit default being 32 bit default. */
2314 abfd->arch_info = abfd->arch_info->next;
2315 BFD_ASSERT (abfd->arch_info->bits_per_word == 32);
2316 }
2317 }
14b57c7c 2318 return _bfd_elf_ppc_set_arch (abfd);
25dbc73a 2319}
7619e7c7 2320
25dbc73a 2321/* Function to set whether a module needs the -mrelocatable bit set. */
7619e7c7 2322
25dbc73a
AM
2323static bfd_boolean
2324ppc_elf_set_private_flags (bfd *abfd, flagword flags)
2325{
2326 BFD_ASSERT (!elf_flags_init (abfd)
2327 || elf_elfheader (abfd)->e_flags == flags);
7619e7c7 2328
25dbc73a
AM
2329 elf_elfheader (abfd)->e_flags = flags;
2330 elf_flags_init (abfd) = TRUE;
2331 return TRUE;
2332}
2333
25dbc73a 2334/* Support for core dump NOTE sections. */
deaaf2f3 2335
b34976b6 2336static bfd_boolean
25dbc73a 2337ppc_elf_grok_prstatus (bfd *abfd, Elf_Internal_Note *note)
252b5132 2338{
25dbc73a
AM
2339 int offset;
2340 unsigned int size;
252b5132 2341
25dbc73a
AM
2342 switch (note->descsz)
2343 {
2344 default:
2345 return FALSE;
252b5132 2346
25dbc73a
AM
2347 case 268: /* Linux/PPC. */
2348 /* pr_cursig */
228e534f 2349 elf_tdata (abfd)->core->signal = bfd_get_16 (abfd, note->descdata + 12);
deaaf2f3 2350
25dbc73a 2351 /* pr_pid */
228e534f 2352 elf_tdata (abfd)->core->lwpid = bfd_get_32 (abfd, note->descdata + 24);
9abc968f 2353
25dbc73a
AM
2354 /* pr_reg */
2355 offset = 72;
2356 size = 192;
deaaf2f3 2357
25dbc73a
AM
2358 break;
2359 }
deaaf2f3 2360
25dbc73a
AM
2361 /* Make a ".reg/999" section. */
2362 return _bfd_elfcore_make_pseudosection (abfd, ".reg",
2363 size, note->descpos + offset);
2364}
252b5132 2365
25dbc73a
AM
2366static bfd_boolean
2367ppc_elf_grok_psinfo (bfd *abfd, Elf_Internal_Note *note)
2368{
2369 switch (note->descsz)
deaaf2f3 2370 {
25dbc73a
AM
2371 default:
2372 return FALSE;
deaaf2f3 2373
25dbc73a 2374 case 128: /* Linux/PPC elf_prpsinfo. */
228e534f 2375 elf_tdata (abfd)->core->pid
bc989cdc 2376 = bfd_get_32 (abfd, note->descdata + 16);
228e534f 2377 elf_tdata (abfd)->core->program
25dbc73a 2378 = _bfd_elfcore_strndup (abfd, note->descdata + 32, 16);
228e534f 2379 elf_tdata (abfd)->core->command
25dbc73a
AM
2380 = _bfd_elfcore_strndup (abfd, note->descdata + 48, 80);
2381 }
9abc968f 2382
25dbc73a
AM
2383 /* Note that for some reason, a spurious space is tacked
2384 onto the end of the args in some (at least one anyway)
2385 implementations, so strip it off if it exists. */
70bccea4 2386
25dbc73a 2387 {
228e534f 2388 char *command = elf_tdata (abfd)->core->command;
25dbc73a 2389 int n = strlen (command);
70bccea4 2390
25dbc73a
AM
2391 if (0 < n && command[n - 1] == ' ')
2392 command[n - 1] = '\0';
2393 }
deaaf2f3 2394
25dbc73a
AM
2395 return TRUE;
2396}
deaaf2f3 2397
183e98be
AM
2398static char *
2399ppc_elf_write_core_note (bfd *abfd, char *buf, int *bufsiz, int note_type, ...)
2400{
2401 switch (note_type)
2402 {
2403 default:
2404 return NULL;
2405
2406 case NT_PRPSINFO:
2407 {
2408 char data[128];
2409 va_list ap;
2410
2411 va_start (ap, note_type);
75cd47ed 2412 memset (data, 0, sizeof (data));
183e98be
AM
2413 strncpy (data + 32, va_arg (ap, const char *), 16);
2414 strncpy (data + 48, va_arg (ap, const char *), 80);
2415 va_end (ap);
2416 return elfcore_write_note (abfd, buf, bufsiz,
2417 "CORE", note_type, data, sizeof (data));
2418 }
2419
2420 case NT_PRSTATUS:
2421 {
2422 char data[268];
2423 va_list ap;
2424 long pid;
2425 int cursig;
2426 const void *greg;
2427
2428 va_start (ap, note_type);
2429 memset (data, 0, 72);
2430 pid = va_arg (ap, long);
2431 bfd_put_32 (abfd, pid, data + 24);
2432 cursig = va_arg (ap, int);
2433 bfd_put_16 (abfd, cursig, data + 12);
2434 greg = va_arg (ap, const void *);
2435 memcpy (data + 72, greg, 192);
2436 memset (data + 264, 0, 4);
2437 va_end (ap);
2438 return elfcore_write_note (abfd, buf, bufsiz,
2439 "CORE", note_type, data, sizeof (data));
2440 }
2441 }
2442}
2443
b9c361e0 2444static flagword
68ffbac6 2445ppc_elf_lookup_section_flags (char *flag_name)
b9c361e0
JL
2446{
2447
2448 if (!strcmp (flag_name, "SHF_PPC_VLE"))
2449 return SHF_PPC_VLE;
2450
2451 return 0;
2452}
2453
25dbc73a
AM
2454/* Return address for Ith PLT stub in section PLT, for relocation REL
2455 or (bfd_vma) -1 if it should not be included. */
deaaf2f3 2456
25dbc73a
AM
2457static bfd_vma
2458ppc_elf_plt_sym_val (bfd_vma i ATTRIBUTE_UNUSED,
2459 const asection *plt ATTRIBUTE_UNUSED,
2460 const arelent *rel)
2461{
2462 return rel->address;
2463}
deaaf2f3 2464
25dbc73a 2465/* Handle a PowerPC specific section when reading an object file. This
6dc132d9
L
2466 is called when bfd_section_from_shdr finds a section with an unknown
2467 type. */
deaaf2f3 2468
25dbc73a 2469static bfd_boolean
6dc132d9
L
2470ppc_elf_section_from_shdr (bfd *abfd,
2471 Elf_Internal_Shdr *hdr,
2472 const char *name,
2473 int shindex)
25dbc73a
AM
2474{
2475 asection *newsect;
2476 flagword flags;
d1c6de6f 2477
6dc132d9 2478 if (! _bfd_elf_make_section_from_shdr (abfd, hdr, name, shindex))
25dbc73a 2479 return FALSE;
deaaf2f3 2480
25dbc73a
AM
2481 newsect = hdr->bfd_section;
2482 flags = bfd_get_section_flags (abfd, newsect);
2483 if (hdr->sh_flags & SHF_EXCLUDE)
2484 flags |= SEC_EXCLUDE;
9abc968f 2485
25dbc73a
AM
2486 if (hdr->sh_type == SHT_ORDERED)
2487 flags |= SEC_SORT_ENTRIES;
d1c6de6f 2488
25dbc73a
AM
2489 bfd_set_section_flags (abfd, newsect, flags);
2490 return TRUE;
2491}
2492
2493/* Set up any other section flags and such that may be necessary. */
2494
2495static bfd_boolean
2496ppc_elf_fake_sections (bfd *abfd ATTRIBUTE_UNUSED,
2497 Elf_Internal_Shdr *shdr,
2498 asection *asect)
2499{
25dbc73a
AM
2500 if ((asect->flags & SEC_SORT_ENTRIES) != 0)
2501 shdr->sh_type = SHT_ORDERED;
2502
2503 return TRUE;
2504}
2505
2506/* If we have .sbss2 or .PPC.EMB.sbss0 output sections, we
2507 need to bump up the number of section headers. */
2508
2509static int
a6b96beb
AM
2510ppc_elf_additional_program_headers (bfd *abfd,
2511 struct bfd_link_info *info ATTRIBUTE_UNUSED)
25dbc73a
AM
2512{
2513 asection *s;
2514 int ret = 0;
d1c6de6f 2515
25dbc73a
AM
2516 s = bfd_get_section_by_name (abfd, ".sbss2");
2517 if (s != NULL && (s->flags & SEC_ALLOC) != 0)
2518 ++ret;
d1c6de6f 2519
25dbc73a
AM
2520 s = bfd_get_section_by_name (abfd, ".PPC.EMB.sbss0");
2521 if (s != NULL && (s->flags & SEC_ALLOC) != 0)
2522 ++ret;
deaaf2f3 2523
25dbc73a
AM
2524 return ret;
2525}
deaaf2f3 2526
68ffbac6 2527/* Modify the segment map for VLE executables. */
b9c361e0
JL
2528
2529bfd_boolean
2530ppc_elf_modify_segment_map (bfd *abfd,
2531 struct bfd_link_info *info ATTRIBUTE_UNUSED)
2532{
f7d69005 2533 struct elf_segment_map *m;
b9c361e0
JL
2534
2535 /* At this point in the link, output sections have already been sorted by
2536 LMA and assigned to segments. All that is left to do is to ensure
2537 there is no mixing of VLE & non-VLE sections in a text segment.
2538 If we find that case, we split the segment.
2539 We maintain the original output section order. */
2540
12bd6957 2541 for (m = elf_seg_map (abfd); m != NULL; m = m->next)
b9c361e0 2542 {
f7d69005
AM
2543 struct elf_segment_map *n;
2544 bfd_size_type amt;
2545 unsigned int j, k;
2546 unsigned int p_flags;
2547
2548 if (m->p_type != PT_LOAD || m->count == 0)
b9c361e0
JL
2549 continue;
2550
f7d69005 2551 for (p_flags = PF_R, j = 0; j != m->count; ++j)
b9c361e0 2552 {
f7d69005
AM
2553 if ((m->sections[j]->flags & SEC_READONLY) == 0)
2554 p_flags |= PF_W;
2555 if ((m->sections[j]->flags & SEC_CODE) != 0)
2556 {
2557 p_flags |= PF_X;
2558 if ((elf_section_flags (m->sections[j]) & SHF_PPC_VLE) != 0)
2559 p_flags |= PF_PPC_VLE;
2560 break;
2561 }
2562 }
2563 if (j != m->count)
2564 while (++j != m->count)
2565 {
2566 unsigned int p_flags1 = PF_R;
94caa966 2567
f7d69005
AM
2568 if ((m->sections[j]->flags & SEC_READONLY) == 0)
2569 p_flags1 |= PF_W;
2570 if ((m->sections[j]->flags & SEC_CODE) != 0)
2571 {
2572 p_flags1 |= PF_X;
2573 if ((elf_section_flags (m->sections[j]) & SHF_PPC_VLE) != 0)
2574 p_flags1 |= PF_PPC_VLE;
2575 if (((p_flags1 ^ p_flags) & PF_PPC_VLE) != 0)
2576 break;
2577 }
2578 p_flags |= p_flags1;
2579 }
2580 /* If we're splitting a segment which originally contained rw
2581 sections then those sections might now only be in one of the
2582 two parts. So always set p_flags if splitting, even if we
2583 are being called for objcopy with p_flags_valid set. */
2584 if (j != m->count || !m->p_flags_valid)
2585 {
2586 m->p_flags_valid = 1;
2587 m->p_flags = p_flags;
2588 }
2589 if (j == m->count)
b9c361e0
JL
2590 continue;
2591
f7d69005 2592 /* Sections 0..j-1 stay in this (current) segment,
b9c361e0
JL
2593 the remainder are put in a new segment.
2594 The scan resumes with the new segment. */
2595
b9c361e0
JL
2596 amt = sizeof (struct elf_segment_map);
2597 amt += (m->count - j - 1) * sizeof (asection *);
2598 n = (struct elf_segment_map *) bfd_zalloc (abfd, amt);
2599 if (n == NULL)
954b63d4 2600 return FALSE;
b9c361e0
JL
2601
2602 n->p_type = PT_LOAD;
b9c361e0
JL
2603 n->count = m->count - j;
2604 for (k = 0; k < n->count; ++k)
f7d69005
AM
2605 n->sections[k] = m->sections[j + k];
2606 m->count = j;
2607 m->p_size_valid = 0;
b9c361e0
JL
2608 n->next = m->next;
2609 m->next = n;
b9c361e0
JL
2610 }
2611
2612 return TRUE;
2613}
2614
25dbc73a
AM
2615/* Add extra PPC sections -- Note, for now, make .sbss2 and
2616 .PPC.EMB.sbss0 a normal section, and not a bss section so
2617 that the linker doesn't crater when trying to make more than
2618 2 sections. */
e656e369 2619
b35d266b 2620static const struct bfd_elf_special_section ppc_elf_special_sections[] =
7f4d3958 2621{
14b57c7c
AM
2622 { STRING_COMMA_LEN (".plt"), 0, SHT_NOBITS, SHF_ALLOC + SHF_EXECINSTR },
2623 { STRING_COMMA_LEN (".sbss"), -2, SHT_NOBITS, SHF_ALLOC + SHF_WRITE },
2624 { STRING_COMMA_LEN (".sbss2"), -2, SHT_PROGBITS, SHF_ALLOC },
2625 { STRING_COMMA_LEN (".sdata"), -2, SHT_PROGBITS, SHF_ALLOC + SHF_WRITE },
2626 { STRING_COMMA_LEN (".sdata2"), -2, SHT_PROGBITS, SHF_ALLOC },
2627 { STRING_COMMA_LEN (".tags"), 0, SHT_ORDERED, SHF_ALLOC },
2628 { STRING_COMMA_LEN (APUINFO_SECTION_NAME), 0, SHT_NOTE, 0 },
2629 { STRING_COMMA_LEN (".PPC.EMB.sbss0"), 0, SHT_PROGBITS, SHF_ALLOC },
2630 { STRING_COMMA_LEN (".PPC.EMB.sdata0"), 0, SHT_PROGBITS, SHF_ALLOC },
2631 { NULL, 0, 0, 0, 0 }
7f4d3958
L
2632};
2633
551b43fd
AM
2634/* This is what we want for new plt/got. */
2635static struct bfd_elf_special_section ppc_alt_plt =
07d6d2b8 2636 { STRING_COMMA_LEN (".plt"), 0, SHT_PROGBITS, SHF_ALLOC };
551b43fd
AM
2637
2638static const struct bfd_elf_special_section *
4aef7643 2639ppc_elf_get_sec_type_attr (bfd *abfd, asection *sec)
7f4d3958 2640{
b35d266b 2641 const struct bfd_elf_special_section *ssect;
551b43fd
AM
2642
2643 /* See if this is one of the special sections. */
2644 if (sec->name == NULL)
2645 return NULL;
2646
2647 ssect = _bfd_elf_get_special_section (sec->name, ppc_elf_special_sections,
2648 sec->use_rela_p);
2649 if (ssect != NULL)
2650 {
2651 if (ssect == ppc_elf_special_sections && (sec->flags & SEC_LOAD) != 0)
2652 ssect = &ppc_alt_plt;
2653 return ssect;
2654 }
2655
2656 return _bfd_elf_get_sec_type_attr (abfd, sec);
2657}
25dbc73a
AM
2658\f
2659/* Very simple linked list structure for recording apuinfo values. */
2660typedef struct apuinfo_list
2661{
2662 struct apuinfo_list *next;
2663 unsigned long value;
2664}
2665apuinfo_list;
e656e369 2666
25dbc73a 2667static apuinfo_list *head;
f2faa800 2668static bfd_boolean apuinfo_set;
deaaf2f3 2669
25dbc73a
AM
2670static void
2671apuinfo_list_init (void)
2672{
2673 head = NULL;
f2faa800 2674 apuinfo_set = FALSE;
25dbc73a 2675}
9abc968f 2676
25dbc73a
AM
2677static void
2678apuinfo_list_add (unsigned long value)
2679{
2680 apuinfo_list *entry = head;
deaaf2f3 2681
25dbc73a
AM
2682 while (entry != NULL)
2683 {
2684 if (entry->value == value)
2685 return;
2686 entry = entry->next;
2687 }
b4a38de6 2688
25dbc73a
AM
2689 entry = bfd_malloc (sizeof (* entry));
2690 if (entry == NULL)
2691 return;
e656e369 2692
25dbc73a
AM
2693 entry->value = value;
2694 entry->next = head;
2695 head = entry;
2696}
9abc968f 2697
25dbc73a
AM
2698static unsigned
2699apuinfo_list_length (void)
2700{
2701 apuinfo_list *entry;
2702 unsigned long count;
9abc968f 2703
25dbc73a
AM
2704 for (entry = head, count = 0;
2705 entry;
2706 entry = entry->next)
2707 ++ count;
e656e369 2708
25dbc73a
AM
2709 return count;
2710}
eea6121a 2711
25dbc73a
AM
2712static inline unsigned long
2713apuinfo_list_element (unsigned long number)
2714{
2715 apuinfo_list * entry;
e656e369 2716
25dbc73a
AM
2717 for (entry = head;
2718 entry && number --;
2719 entry = entry->next)
2720 ;
252b5132 2721
25dbc73a
AM
2722 return entry ? entry->value : 0;
2723}
2724
2725static void
2726apuinfo_list_finish (void)
2727{
2728 apuinfo_list *entry;
2729
2730 for (entry = head; entry;)
252b5132 2731 {
25dbc73a
AM
2732 apuinfo_list *next = entry->next;
2733 free (entry);
2734 entry = next;
2735 }
9abc968f 2736
25dbc73a
AM
2737 head = NULL;
2738}
9abc968f 2739
25dbc73a
AM
2740/* Scan the input BFDs and create a linked list of
2741 the APUinfo values that will need to be emitted. */
9abc968f 2742
25dbc73a
AM
2743static void
2744ppc_elf_begin_write_processing (bfd *abfd, struct bfd_link_info *link_info)
2745{
2746 bfd *ibfd;
2747 asection *asec;
deddc40b
NS
2748 char *buffer = NULL;
2749 bfd_size_type largest_input_size = 0;
25dbc73a 2750 unsigned i;
25dbc73a
AM
2751 unsigned long length;
2752 const char *error_message = NULL;
9abc968f 2753
25dbc73a
AM
2754 if (link_info == NULL)
2755 return;
9abc968f 2756
25dbc73a 2757 apuinfo_list_init ();
252b5132 2758
25dbc73a 2759 /* Read in the input sections contents. */
c72f2fb2 2760 for (ibfd = link_info->input_bfds; ibfd; ibfd = ibfd->link.next)
252b5132 2761 {
25dbc73a 2762 unsigned long datum;
252b5132 2763
25dbc73a
AM
2764 asec = bfd_get_section_by_name (ibfd, APUINFO_SECTION_NAME);
2765 if (asec == NULL)
2766 continue;
252b5132 2767
695344c0 2768 /* xgettext:c-format */
871b3ab2 2769 error_message = _("corrupt %s section in %pB");
25dbc73a 2770 length = asec->size;
deddc40b
NS
2771 if (length < 20)
2772 goto fail;
2773
f2faa800 2774 apuinfo_set = TRUE;
deddc40b 2775 if (largest_input_size < asec->size)
25dbc73a 2776 {
deddc40b
NS
2777 if (buffer)
2778 free (buffer);
2779 largest_input_size = asec->size;
2780 buffer = bfd_malloc (largest_input_size);
2781 if (!buffer)
2782 return;
25dbc73a 2783 }
5b914448 2784
25dbc73a 2785 if (bfd_seek (ibfd, asec->filepos, SEEK_SET) != 0
deddc40b 2786 || (bfd_bread (buffer, length, ibfd) != length))
25dbc73a 2787 {
695344c0 2788 /* xgettext:c-format */
871b3ab2 2789 error_message = _("unable to read in %s section from %pB");
25dbc73a
AM
2790 goto fail;
2791 }
252b5132 2792
25dbc73a
AM
2793 /* Verify the contents of the header. Note - we have to
2794 extract the values this way in order to allow for a
2795 host whose endian-ness is different from the target. */
deddc40b 2796 datum = bfd_get_32 (ibfd, buffer);
25dbc73a
AM
2797 if (datum != sizeof APUINFO_LABEL)
2798 goto fail;
252b5132 2799
deddc40b 2800 datum = bfd_get_32 (ibfd, buffer + 8);
25dbc73a
AM
2801 if (datum != 0x2)
2802 goto fail;
252b5132 2803
deddc40b 2804 if (strcmp (buffer + 12, APUINFO_LABEL) != 0)
25dbc73a 2805 goto fail;
252b5132 2806
25dbc73a 2807 /* Get the number of bytes used for apuinfo entries. */
deddc40b 2808 datum = bfd_get_32 (ibfd, buffer + 4);
25dbc73a
AM
2809 if (datum + 20 != length)
2810 goto fail;
2811
25dbc73a
AM
2812 /* Scan the apuinfo section, building a list of apuinfo numbers. */
2813 for (i = 0; i < datum; i += 4)
deddc40b 2814 apuinfo_list_add (bfd_get_32 (ibfd, buffer + 20 + i));
252b5132
RH
2815 }
2816
25dbc73a 2817 error_message = NULL;
252b5132 2818
f2faa800 2819 if (apuinfo_set)
deddc40b 2820 {
f2faa800
NS
2821 /* Compute the size of the output section. */
2822 unsigned num_entries = apuinfo_list_length ();
5b914448 2823
deddc40b
NS
2824 /* Set the output section size, if it exists. */
2825 asec = bfd_get_section_by_name (abfd, APUINFO_SECTION_NAME);
f2faa800 2826
deddc40b
NS
2827 if (asec && ! bfd_set_section_size (abfd, asec, 20 + num_entries * 4))
2828 {
2829 ibfd = abfd;
695344c0 2830 /* xgettext:c-format */
871b3ab2 2831 error_message = _("warning: unable to set size of %s section in %pB");
deddc40b
NS
2832 }
2833 }
25dbc73a
AM
2834
2835 fail:
deddc40b
NS
2836 if (buffer)
2837 free (buffer);
25dbc73a
AM
2838
2839 if (error_message)
cd9af601 2840 _bfd_error_handler (error_message, APUINFO_SECTION_NAME, ibfd);
25dbc73a 2841}
252b5132 2842
25dbc73a
AM
2843/* Prevent the output section from accumulating the input sections'
2844 contents. We have already stored this in our linked list structure. */
252b5132 2845
25dbc73a
AM
2846static bfd_boolean
2847ppc_elf_write_section (bfd *abfd ATTRIBUTE_UNUSED,
c7b8f16e 2848 struct bfd_link_info *link_info ATTRIBUTE_UNUSED,
25dbc73a
AM
2849 asection *asec,
2850 bfd_byte *contents ATTRIBUTE_UNUSED)
2851{
f2faa800 2852 return apuinfo_set && strcmp (asec->name, APUINFO_SECTION_NAME) == 0;
252b5132
RH
2853}
2854
25dbc73a
AM
2855/* Finally we can generate the output section. */
2856
2857static void
2858ppc_elf_final_write_processing (bfd *abfd, bfd_boolean linker ATTRIBUTE_UNUSED)
7619e7c7 2859{
25dbc73a
AM
2860 bfd_byte *buffer;
2861 asection *asec;
2862 unsigned i;
2863 unsigned num_entries;
2864 bfd_size_type length;
7619e7c7 2865
25dbc73a
AM
2866 asec = bfd_get_section_by_name (abfd, APUINFO_SECTION_NAME);
2867 if (asec == NULL)
2868 return;
2869
f2faa800 2870 if (!apuinfo_set)
25dbc73a
AM
2871 return;
2872
2873 length = asec->size;
2874 if (length < 20)
2875 return;
2876
2877 buffer = bfd_malloc (length);
2878 if (buffer == NULL)
7619e7c7 2879 {
4eca0228 2880 _bfd_error_handler
cf97bcb0 2881 (_("failed to allocate space for new APUinfo section"));
25dbc73a 2882 return;
7619e7c7 2883 }
7619e7c7 2884
25dbc73a
AM
2885 /* Create the apuinfo header. */
2886 num_entries = apuinfo_list_length ();
2887 bfd_put_32 (abfd, sizeof APUINFO_LABEL, buffer);
2888 bfd_put_32 (abfd, num_entries * 4, buffer + 4);
2889 bfd_put_32 (abfd, 0x2, buffer + 8);
2890 strcpy ((char *) buffer + 12, APUINFO_LABEL);
feee612b 2891
25dbc73a
AM
2892 length = 20;
2893 for (i = 0; i < num_entries; i++)
feee612b 2894 {
25dbc73a
AM
2895 bfd_put_32 (abfd, apuinfo_list_element (i), buffer + length);
2896 length += 4;
feee612b 2897 }
feee612b 2898
25dbc73a 2899 if (length != asec->size)
cf97bcb0 2900 _bfd_error_handler (_("failed to compute new APUinfo section"));
252b5132 2901
25dbc73a 2902 if (! bfd_set_section_contents (abfd, asec, buffer, (file_ptr) 0, length))
cf97bcb0 2903 _bfd_error_handler (_("failed to install new APUinfo section"));
252b5132 2904
25dbc73a
AM
2905 free (buffer);
2906
2907 apuinfo_list_finish ();
252b5132 2908}
25dbc73a 2909\f
7382d32a 2910static bfd_boolean
c6dd29ce 2911is_nonpic_glink_stub (bfd *abfd, asection *glink, bfd_vma off)
7382d32a 2912{
407aa07c 2913 bfd_byte buf[4 * 4];
7382d32a 2914
9e390558 2915 if (!bfd_get_section_contents (abfd, glink, buf, off, sizeof buf))
7382d32a
AM
2916 return FALSE;
2917
c6dd29ce
AM
2918 return ((bfd_get_32 (abfd, buf + 0) & 0xffff0000) == LIS_11
2919 && (bfd_get_32 (abfd, buf + 4) & 0xffff0000) == LWZ_11_11
407aa07c
AM
2920 && bfd_get_32 (abfd, buf + 8) == MTCTR_11
2921 && bfd_get_32 (abfd, buf + 12) == BCTR);
7382d32a
AM
2922}
2923
468392fb
AM
2924static bfd_boolean
2925section_covers_vma (bfd *abfd ATTRIBUTE_UNUSED, asection *section, void *ptr)
2926{
2927 bfd_vma vma = *(bfd_vma *) ptr;
2928 return ((section->flags & SEC_ALLOC) != 0
2929 && section->vma <= vma
2930 && vma < section->vma + section->size);
2931}
2932
2933static long
2934ppc_elf_get_synthetic_symtab (bfd *abfd, long symcount, asymbol **syms,
2935 long dynsymcount, asymbol **dynsyms,
2936 asymbol **ret)
2937{
2938 bfd_boolean (*slurp_relocs) (bfd *, asection *, asymbol **, bfd_boolean);
2939 asection *plt, *relplt, *dynamic, *glink;
2940 bfd_vma glink_vma = 0;
2941 bfd_vma resolv_vma = 0;
9e390558 2942 bfd_vma stub_off;
468392fb
AM
2943 asymbol *s;
2944 arelent *p;
9e390558 2945 long count, i, stub_delta;
468392fb
AM
2946 size_t size;
2947 char *names;
2948 bfd_byte buf[4];
2949
2950 *ret = NULL;
2951
2952 if ((abfd->flags & (DYNAMIC | EXEC_P)) == 0)
2953 return 0;
2954
2955 if (dynsymcount <= 0)
2956 return 0;
2957
2958 relplt = bfd_get_section_by_name (abfd, ".rela.plt");
2959 if (relplt == NULL)
2960 return 0;
2961
2962 plt = bfd_get_section_by_name (abfd, ".plt");
2963 if (plt == NULL)
2964 return 0;
2965
2966 /* Call common code to handle old-style executable PLTs. */
2967 if (elf_section_flags (plt) & SHF_EXECINSTR)
2968 return _bfd_elf_get_synthetic_symtab (abfd, symcount, syms,
2969 dynsymcount, dynsyms, ret);
2970
2971 /* If this object was prelinked, the prelinker stored the address
2972 of .glink at got[1]. If it wasn't prelinked, got[1] will be zero. */
2973 dynamic = bfd_get_section_by_name (abfd, ".dynamic");
2974 if (dynamic != NULL)
2975 {
2976 bfd_byte *dynbuf, *extdyn, *extdynend;
2977 size_t extdynsize;
2978 void (*swap_dyn_in) (bfd *, const void *, Elf_Internal_Dyn *);
2979
2980 if (!bfd_malloc_and_get_section (abfd, dynamic, &dynbuf))
2981 return -1;
2982
2983 extdynsize = get_elf_backend_data (abfd)->s->sizeof_dyn;
2984 swap_dyn_in = get_elf_backend_data (abfd)->s->swap_dyn_in;
2985
2986 extdyn = dynbuf;
2987 extdynend = extdyn + dynamic->size;
2988 for (; extdyn < extdynend; extdyn += extdynsize)
2989 {
2990 Elf_Internal_Dyn dyn;
2991 (*swap_dyn_in) (abfd, extdyn, &dyn);
2992
2993 if (dyn.d_tag == DT_NULL)
2994 break;
2995
2996 if (dyn.d_tag == DT_PPC_GOT)
2997 {
2998 unsigned int g_o_t = dyn.d_un.d_val;
2999 asection *got = bfd_get_section_by_name (abfd, ".got");
3000 if (got != NULL
3001 && bfd_get_section_contents (abfd, got, buf,
3002 g_o_t - got->vma + 4, 4))
3003 glink_vma = bfd_get_32 (abfd, buf);
3004 break;
3005 }
3006 }
3007 free (dynbuf);
3008 }
3009
3010 /* Otherwise we read the first plt entry. */
3011 if (glink_vma == 0)
3012 {
3013 if (bfd_get_section_contents (abfd, plt, buf, 0, 4))
3014 glink_vma = bfd_get_32 (abfd, buf);
3015 }
3016
3017 if (glink_vma == 0)
3018 return 0;
3019
3020 /* The .glink section usually does not survive the final
3021 link; search for the section (usually .text) where the
3022 glink stubs now reside. */
3023 glink = bfd_sections_find_if (abfd, section_covers_vma, &glink_vma);
3024 if (glink == NULL)
3025 return 0;
3026
3027 /* Determine glink PLT resolver by reading the relative branch
3028 from the first glink stub. */
3029 if (bfd_get_section_contents (abfd, glink, buf,
3030 glink_vma - glink->vma, 4))
3031 {
3032 unsigned int insn = bfd_get_32 (abfd, buf);
3033
3034 /* The first glink stub may either branch to the resolver ... */
3035 insn ^= B;
3036 if ((insn & ~0x3fffffc) == 0)
3037 resolv_vma = glink_vma + (insn ^ 0x2000000) - 0x2000000;
3038
3039 /* ... or fall through a bunch of NOPs. */
3040 else if ((insn ^ B ^ NOP) == 0)
3041 for (i = 4;
3042 bfd_get_section_contents (abfd, glink, buf,
3043 glink_vma - glink->vma + i, 4);
3044 i += 4)
3045 if (bfd_get_32 (abfd, buf) != NOP)
3046 {
3047 resolv_vma = glink_vma + i;
3048 break;
3049 }
3050 }
3051
7382d32a 3052 count = relplt->size / sizeof (Elf32_External_Rela);
7382d32a
AM
3053 /* If the stubs are those for -shared/-pie then we might have
3054 multiple stubs for each plt entry. If that is the case then
3055 there is no way to associate stubs with their plt entries short
9e390558
AM
3056 of figuring out the GOT pointer value used in the stub.
3057 The offsets tested here need to cover all possible values of
3058 GLINK_ENTRY_SIZE for other than __tls_get_addr_opt. */
3059 stub_off = glink_vma - glink->vma;
3060 for (stub_delta = 16; stub_delta <= 32; stub_delta += 8)
3061 if (is_nonpic_glink_stub (abfd, glink, stub_off - stub_delta))
3062 break;
3063 if (stub_delta > 32)
7382d32a
AM
3064 return 0;
3065
468392fb
AM
3066 slurp_relocs = get_elf_backend_data (abfd)->s->slurp_reloc_table;
3067 if (! (*slurp_relocs) (abfd, relplt, dynsyms, TRUE))
3068 return -1;
3069
468392fb
AM
3070 size = count * sizeof (asymbol);
3071 p = relplt->relocation;
3072 for (i = 0; i < count; i++, p++)
e054468f
AM
3073 {
3074 size += strlen ((*p->sym_ptr_ptr)->name) + sizeof ("@plt");
3075 if (p->addend != 0)
3076 size += sizeof ("+0x") - 1 + 8;
3077 }
468392fb
AM
3078
3079 size += sizeof (asymbol) + sizeof ("__glink");
3080
3081 if (resolv_vma)
3082 size += sizeof (asymbol) + sizeof ("__glink_PLTresolve");
3083
3084 s = *ret = bfd_malloc (size);
3085 if (s == NULL)
3086 return -1;
3087
9e390558 3088 stub_off = glink_vma - glink->vma;
468392fb 3089 names = (char *) (s + count + 1 + (resolv_vma != 0));
1079403c
AM
3090 p = relplt->relocation + count - 1;
3091 for (i = 0; i < count; i++)
468392fb
AM
3092 {
3093 size_t len;
3094
9e390558
AM
3095 stub_off -= stub_delta;
3096 if (strcmp ((*p->sym_ptr_ptr)->name, "__tls_get_addr_opt") == 0)
3097 stub_off -= 32;
468392fb
AM
3098 *s = **p->sym_ptr_ptr;
3099 /* Undefined syms won't have BSF_LOCAL or BSF_GLOBAL set. Since
3100 we are defining a symbol, ensure one of them is set. */
3101 if ((s->flags & BSF_LOCAL) == 0)
3102 s->flags |= BSF_GLOBAL;
6ba2a415 3103 s->flags |= BSF_SYNTHETIC;
468392fb 3104 s->section = glink;
9e390558 3105 s->value = stub_off;
468392fb
AM
3106 s->name = names;
3107 s->udata.p = NULL;
3108 len = strlen ((*p->sym_ptr_ptr)->name);
3109 memcpy (names, (*p->sym_ptr_ptr)->name, len);
3110 names += len;
e054468f
AM
3111 if (p->addend != 0)
3112 {
3113 memcpy (names, "+0x", sizeof ("+0x") - 1);
3114 names += sizeof ("+0x") - 1;
3115 bfd_sprintf_vma (abfd, names, p->addend);
3116 names += strlen (names);
3117 }
468392fb
AM
3118 memcpy (names, "@plt", sizeof ("@plt"));
3119 names += sizeof ("@plt");
3120 ++s;
1079403c 3121 --p;
468392fb
AM
3122 }
3123
3124 /* Add a symbol at the start of the glink branch table. */
86a4952b 3125 memset (s, 0, sizeof *s);
468392fb 3126 s->the_bfd = abfd;
6ba2a415 3127 s->flags = BSF_GLOBAL | BSF_SYNTHETIC;
468392fb
AM
3128 s->section = glink;
3129 s->value = glink_vma - glink->vma;
3130 s->name = names;
3131 memcpy (names, "__glink", sizeof ("__glink"));
3132 names += sizeof ("__glink");
3133 s++;
3134 count++;
3135
3136 if (resolv_vma)
3137 {
3138 /* Add a symbol for the glink PLT resolver. */
86a4952b 3139 memset (s, 0, sizeof *s);
468392fb 3140 s->the_bfd = abfd;
6ba2a415 3141 s->flags = BSF_GLOBAL | BSF_SYNTHETIC;
468392fb
AM
3142 s->section = glink;
3143 s->value = resolv_vma - glink->vma;
3144 s->name = names;
3145 memcpy (names, "__glink_PLTresolve", sizeof ("__glink_PLTresolve"));
3146 names += sizeof ("__glink_PLTresolve");
3147 s++;
3148 count++;
3149 }
3150
3151 return count;
3152}
3153\f
25dbc73a
AM
3154/* The following functions are specific to the ELF linker, while
3155 functions above are used generally. They appear in this file more
3156 or less in the order in which they are called. eg.
3157 ppc_elf_check_relocs is called early in the link process,
3158 ppc_elf_finish_dynamic_sections is one of the last functions
3159 called. */
252b5132 3160
a6aa5195 3161/* Track PLT entries needed for a given symbol. We might need more
a877a2b6 3162 than one glink entry per symbol when generating a pic binary. */
a6aa5195
AM
3163struct plt_entry
3164{
3165 struct plt_entry *next;
3166
3167 /* -fPIC uses multiple GOT sections, one per file, called ".got2".
3168 This field stores the offset into .got2 used to initialise the
a877a2b6
AM
3169 GOT pointer reg. It will always be at least 32768. (Current
3170 gcc always uses an offset of 32768, but ld -r will pack .got2
3171 sections together resulting in larger offsets). */
a6aa5195
AM
3172 bfd_vma addend;
3173
3174 /* The .got2 section. */
3175 asection *sec;
3176
3177 /* PLT refcount or offset. */
3178 union
3179 {
3180 bfd_signed_vma refcount;
3181 bfd_vma offset;
3182 } plt;
3183
3184 /* .glink stub offset. */
3185 bfd_vma glink_offset;
3186};
3187
7c8bbca5
AM
3188/* Of those relocs that might be copied as dynamic relocs, this
3189 function selects those that must be copied when linking a shared
3190 library or PIE, even when the symbol is local. */
252b5132 3191
1d483afe
AM
3192static int
3193must_be_dyn_reloc (struct bfd_link_info *info,
3194 enum elf_ppc_reloc_type r_type)
3195{
3196 switch (r_type)
3197 {
3198 default:
7c8bbca5
AM
3199 /* Only relative relocs can be resolved when the object load
3200 address isn't fixed. DTPREL32 is excluded because the
3201 dynamic linker needs to differentiate global dynamic from
3202 local dynamic __tls_index pairs when PPC_OPT_TLS is set. */
1d483afe
AM
3203 return 1;
3204
3205 case R_PPC_REL24:
3206 case R_PPC_REL14:
3207 case R_PPC_REL14_BRTAKEN:
3208 case R_PPC_REL14_BRNTAKEN:
3209 case R_PPC_REL32:
3210 return 0;
3211
3212 case R_PPC_TPREL32:
3213 case R_PPC_TPREL16:
3214 case R_PPC_TPREL16_LO:
3215 case R_PPC_TPREL16_HI:
3216 case R_PPC_TPREL16_HA:
7c8bbca5
AM
3217 /* These relocations are relative but in a shared library the
3218 linker doesn't know the thread pointer base. */
3219 return bfd_link_dll (info);
1d483afe
AM
3220 }
3221}
252b5132 3222
25dbc73a
AM
3223/* If ELIMINATE_COPY_RELOCS is non-zero, the linker will try to avoid
3224 copying dynamic variables from a shared lib into an app's dynbss
3225 section, and instead use a dynamic relocation to point into the
3226 shared lib. */
3227#define ELIMINATE_COPY_RELOCS 1
252b5132 3228
f95f8542
AM
3229/* Used to track dynamic relocations for local symbols. */
3230struct ppc_dyn_relocs
3231{
3232 struct ppc_dyn_relocs *next;
3233
3234 /* The input section of the reloc. */
3235 asection *sec;
3236
3237 /* Total number of relocs copied for the input section. */
3238 unsigned int count : 31;
3239
3240 /* Whether this entry is for STT_GNU_IFUNC symbols. */
3241 unsigned int ifunc : 1;
3242};
3243
25dbc73a 3244/* PPC ELF linker hash entry. */
252b5132 3245
25dbc73a
AM
3246struct ppc_elf_link_hash_entry
3247{
3248 struct elf_link_hash_entry elf;
252b5132 3249
25dbc73a
AM
3250 /* If this symbol is used in the linker created sections, the processor
3251 specific backend uses this field to map the field into the offset
3252 from the beginning of the section. */
3253 elf_linker_section_pointers_t *linker_section_pointer;
252b5132 3254
25dbc73a 3255 /* Track dynamic relocs copied for this symbol. */
6061a67d 3256 struct elf_dyn_relocs *dyn_relocs;
252b5132 3257
37da22e5
AM
3258 /* Contexts in which symbol is used in the GOT.
3259 Bits are or'd into the mask as the corresponding relocs are
3260 encountered during check_relocs, with TLS_TLS being set when any
3261 of the other TLS bits are set. tls_optimize clears bits when
3262 optimizing to indicate the corresponding GOT entry type is not
3263 needed. If set, TLS_TLS is never cleared. tls_optimize may also
3264 set TLS_TPRELGD when a GD reloc turns into a TPREL one. We use a
3265 separate flag rather than setting TPREL just for convenience in
3266 distinguishing the two cases.
3267 These flags are also kept for local symbols. */
3268#define TLS_TLS 1 /* Any TLS reloc. */
3269#define TLS_GD 2 /* GD reloc. */
3270#define TLS_LD 4 /* LD reloc. */
3271#define TLS_TPREL 8 /* TPREL reloc, => IE. */
3272#define TLS_DTPREL 16 /* DTPREL reloc, => LD. */
3273#define TLS_MARK 32 /* __tls_get_addr call marked. */
3274#define TLS_TPRELGD 64 /* TPREL reloc resulting from GD->IE. */
bac3c8c5 3275 unsigned char tls_mask;
4dc4a9a5 3276
37da22e5
AM
3277 /* The above field is also used to mark function symbols. In which
3278 case TLS_TLS will be 0. */
3279#define PLT_IFUNC 2 /* STT_GNU_IFUNC. */
2d7ad24e 3280#define PLT_KEEP 4 /* inline plt call requires plt entry. */
37da22e5
AM
3281#define NON_GOT 256 /* local symbol plt, not stored. */
3282
4dc4a9a5
DJ
3283 /* Nonzero if we have seen a small data relocation referring to this
3284 symbol. */
d3e454b9
AM
3285 unsigned char has_sda_refs : 1;
3286
3287 /* Flag use of given relocations. */
3288 unsigned char has_addr16_ha : 1;
3289 unsigned char has_addr16_lo : 1;
25dbc73a 3290};
252b5132 3291
25dbc73a
AM
3292#define ppc_elf_hash_entry(ent) ((struct ppc_elf_link_hash_entry *) (ent))
3293
3294/* PPC ELF linker hash table. */
3295
3296struct ppc_elf_link_hash_table
3297{
3298 struct elf_link_hash_table elf;
3299
5446cbdf
AM
3300 /* Various options passed from the linker. */
3301 struct ppc_elf_params *params;
3302
25dbc73a 3303 /* Short-cuts to get to dynamic linker sections. */
d7128ce4 3304 asection *glink;
25dbc73a
AM
3305 asection *dynsbss;
3306 asection *relsbss;
c9a2f333 3307 elf_linker_section_t sdata[2];
25dbc73a 3308 asection *sbss;
6177242a 3309 asection *glink_eh_frame;
2d7ad24e
AM
3310 asection *pltlocal;
3311 asection *relpltlocal;
25dbc73a 3312
016687f8
AM
3313 /* The (unloaded but important) .rela.plt.unloaded on VxWorks. */
3314 asection *srelplt2;
3315
1d483afe 3316 /* Shortcut to __tls_get_addr. */
25dbc73a 3317 struct elf_link_hash_entry *tls_get_addr;
252b5132 3318
016687f8
AM
3319 /* The bfd that forced an old-style PLT. */
3320 bfd *old_bfd;
5b914448 3321
25dbc73a
AM
3322 /* TLS local dynamic got entry handling. */
3323 union {
3324 bfd_signed_vma refcount;
3325 bfd_vma offset;
3326 } tlsld_got;
252b5132 3327
c6dd29ce 3328 /* Offset of branch table to PltResolve function in glink. */
d7128ce4
AM
3329 bfd_vma glink_pltresolve;
3330
3b36f7e6
AM
3331 /* Size of reserved GOT entries. */
3332 unsigned int got_header_size;
3333 /* Non-zero if allocating the header left a gap. */
3334 unsigned int got_gap;
3335
4a3dc543
RS
3336 /* The type of PLT we have chosen to use. */
3337 enum ppc_elf_plt_type plt_type;
3338
9d8504b1 3339 /* True if the target system is VxWorks. */
016687f8 3340 unsigned int is_vxworks:1;
9d8504b1 3341
82e66161
AM
3342 /* Whether there exist local gnu indirect function resolvers,
3343 referenced by dynamic relocations. */
3344 unsigned int local_ifunc_resolver:1;
3345 unsigned int maybe_local_ifunc_resolver:1;
3346
9a23f96e
AM
3347 /* Set if tls optimization is enabled. */
3348 unsigned int do_tls_opt:1;
3349
3e04d765
AM
3350 /* Set if inline plt calls should be converted to direct calls. */
3351 unsigned int can_convert_all_inline_plt:1;
3352
9d8504b1
PB
3353 /* The size of PLT entries. */
3354 int plt_entry_size;
3355 /* The distance between adjacent PLT slots. */
3356 int plt_slot_size;
3357 /* The size of the first PLT entry. */
3358 int plt_initial_entry_size;
016687f8 3359
87d72d41
AM
3360 /* Small local sym cache. */
3361 struct sym_cache sym_cache;
25dbc73a 3362};
252b5132 3363
94caa966
AM
3364/* Rename some of the generic section flags to better document how they
3365 are used for ppc32. The flags are only valid for ppc32 elf objects. */
3366
3367/* Nonzero if this section has TLS related relocations. */
3368#define has_tls_reloc sec_flg0
3369
3370/* Nonzero if this section has a call to __tls_get_addr. */
3371#define has_tls_get_addr_call sec_flg1
3372
3e04d765
AM
3373 /* Flag set when PLTCALL relocs are detected. */
3374#define has_pltcall sec_flg2
3375
25dbc73a 3376/* Get the PPC ELF linker hash table from a link_info structure. */
252b5132 3377
25dbc73a 3378#define ppc_elf_hash_table(p) \
4dfe6ac6
NC
3379 (elf_hash_table_id ((struct elf_link_hash_table *) ((p)->hash)) \
3380 == PPC32_ELF_DATA ? ((struct ppc_elf_link_hash_table *) ((p)->hash)) : NULL)
252b5132 3381
25dbc73a 3382/* Create an entry in a PPC ELF linker hash table. */
252b5132 3383
25dbc73a
AM
3384static struct bfd_hash_entry *
3385ppc_elf_link_hash_newfunc (struct bfd_hash_entry *entry,
3386 struct bfd_hash_table *table,
3387 const char *string)
252b5132 3388{
25dbc73a
AM
3389 /* Allocate the structure if it has not already been allocated by a
3390 subclass. */
3391 if (entry == NULL)
3392 {
3393 entry = bfd_hash_allocate (table,
3394 sizeof (struct ppc_elf_link_hash_entry));
3395 if (entry == NULL)
3396 return entry;
3397 }
252b5132 3398
25dbc73a
AM
3399 /* Call the allocation method of the superclass. */
3400 entry = _bfd_elf_link_hash_newfunc (entry, table, string);
3401 if (entry != NULL)
3402 {
3403 ppc_elf_hash_entry (entry)->linker_section_pointer = NULL;
3404 ppc_elf_hash_entry (entry)->dyn_relocs = NULL;
3405 ppc_elf_hash_entry (entry)->tls_mask = 0;
5240d94d 3406 ppc_elf_hash_entry (entry)->has_sda_refs = 0;
25dbc73a 3407 }
252b5132 3408
25dbc73a 3409 return entry;
252b5132 3410}
3dab13f6 3411
25dbc73a 3412/* Create a PPC ELF linker hash table. */
3dab13f6 3413
25dbc73a
AM
3414static struct bfd_link_hash_table *
3415ppc_elf_link_hash_table_create (bfd *abfd)
3dab13f6 3416{
25dbc73a 3417 struct ppc_elf_link_hash_table *ret;
76e7a751 3418 static struct ppc_elf_params default_params
407aa07c 3419 = { PLT_OLD, 0, 0, 1, 0, 0, 12, 0, 0, 0 };
3dab13f6 3420
25dbc73a
AM
3421 ret = bfd_zmalloc (sizeof (struct ppc_elf_link_hash_table));
3422 if (ret == NULL)
3423 return NULL;
3dab13f6 3424
66eb6687
AM
3425 if (!_bfd_elf_link_hash_table_init (&ret->elf, abfd,
3426 ppc_elf_link_hash_newfunc,
4dfe6ac6
NC
3427 sizeof (struct ppc_elf_link_hash_entry),
3428 PPC32_ELF_DATA))
3dab13f6 3429 {
25dbc73a
AM
3430 free (ret);
3431 return NULL;
3432 }
58111eb7 3433
a6aa5195
AM
3434 ret->elf.init_plt_refcount.refcount = 0;
3435 ret->elf.init_plt_refcount.glist = NULL;
3436 ret->elf.init_plt_offset.offset = 0;
3437 ret->elf.init_plt_offset.glist = NULL;
3438
db434ba0
AM
3439 ret->params = &default_params;
3440
c9a2f333
AM
3441 ret->sdata[0].name = ".sdata";
3442 ret->sdata[0].sym_name = "_SDA_BASE_";
3443 ret->sdata[0].bss_name = ".sbss";
3444
3445 ret->sdata[1].name = ".sdata2";
3446 ret->sdata[1].sym_name = "_SDA2_BASE_";
3447 ret->sdata[1].bss_name = ".sbss2";
3448
9d8504b1
PB
3449 ret->plt_entry_size = 12;
3450 ret->plt_slot_size = 8;
3451 ret->plt_initial_entry_size = 72;
9d8504b1 3452
25dbc73a
AM
3453 return &ret->elf.root;
3454}
3dab13f6 3455
5446cbdf
AM
3456/* Hook linker params into hash table. */
3457
3458void
3459ppc_elf_link_params (struct bfd_link_info *info, struct ppc_elf_params *params)
3460{
3461 struct ppc_elf_link_hash_table *htab = ppc_elf_hash_table (info);
3462
3463 if (htab)
3464 htab->params = params;
76e7a751 3465 params->pagesize_p2 = bfd_log2 (params->pagesize);
5446cbdf
AM
3466}
3467
9d8504b1 3468/* Create .got and the related sections. */
3dab13f6 3469
25dbc73a
AM
3470static bfd_boolean
3471ppc_elf_create_got (bfd *abfd, struct bfd_link_info *info)
3472{
3473 struct ppc_elf_link_hash_table *htab;
3dab13f6 3474
25dbc73a
AM
3475 if (!_bfd_elf_create_got_section (abfd, info))
3476 return FALSE;
3dab13f6 3477
25dbc73a 3478 htab = ppc_elf_hash_table (info);
ce558b89 3479 if (!htab->is_vxworks)
9d8504b1
PB
3480 {
3481 /* The powerpc .got has a blrl instruction in it. Mark it
3482 executable. */
ce558b89
AM
3483 flagword flags = (SEC_ALLOC | SEC_LOAD | SEC_CODE | SEC_HAS_CONTENTS
3484 | SEC_IN_MEMORY | SEC_LINKER_CREATED);
3485 if (!bfd_set_section_flags (abfd, htab->elf.sgot, flags))
9d8504b1
PB
3486 return FALSE;
3487 }
3dab13f6 3488
25dbc73a
AM
3489 return TRUE;
3490}
3dab13f6 3491
93d1b056
AM
3492/* Create a special linker section, used for R_PPC_EMB_SDAI16 and
3493 R_PPC_EMB_SDA2I16 pointers. These sections become part of .sdata
3494 and .sdata2. Create _SDA_BASE_ and _SDA2_BASE too. */
3495
3496static bfd_boolean
3497ppc_elf_create_linker_section (bfd *abfd,
3498 struct bfd_link_info *info,
3499 flagword flags,
3500 elf_linker_section_t *lsect)
3501{
3502 asection *s;
3503
3504 flags |= (SEC_ALLOC | SEC_LOAD | SEC_HAS_CONTENTS | SEC_IN_MEMORY
3505 | SEC_LINKER_CREATED);
3506
3507 s = bfd_make_section_anyway_with_flags (abfd, lsect->name, flags);
3508 if (s == NULL)
3509 return FALSE;
3510 lsect->section = s;
3511
3512 /* Define the sym on the first section of this name. */
3513 s = bfd_get_section_by_name (abfd, lsect->name);
3514
3515 lsect->sym = _bfd_elf_define_linkage_sym (abfd, info, s, lsect->sym_name);
3516 if (lsect->sym == NULL)
3517 return FALSE;
3518 lsect->sym->root.u.def.value = 0x8000;
3519 return TRUE;
3520}
3521
e054468f
AM
3522static bfd_boolean
3523ppc_elf_create_glink (bfd *abfd, struct bfd_link_info *info)
3524{
3525 struct ppc_elf_link_hash_table *htab = ppc_elf_hash_table (info);
3526 asection *s;
3527 flagword flags;
691d2e9a 3528 int p2align;
e054468f
AM
3529
3530 flags = (SEC_ALLOC | SEC_LOAD | SEC_CODE | SEC_READONLY | SEC_HAS_CONTENTS
3531 | SEC_IN_MEMORY | SEC_LINKER_CREATED);
3532 s = bfd_make_section_anyway_with_flags (abfd, ".glink", flags);
3533 htab->glink = s;
691d2e9a
AM
3534 p2align = htab->params->ppc476_workaround ? 6 : 4;
3535 if (p2align < htab->params->plt_stub_align)
3536 p2align = htab->params->plt_stub_align;
e054468f 3537 if (s == NULL
691d2e9a 3538 || !bfd_set_section_alignment (abfd, s, p2align))
e054468f
AM
3539 return FALSE;
3540
6177242a
AM
3541 if (!info->no_ld_generated_unwind_info)
3542 {
3543 flags = (SEC_ALLOC | SEC_LOAD | SEC_READONLY | SEC_HAS_CONTENTS
3544 | SEC_IN_MEMORY | SEC_LINKER_CREATED);
3545 s = bfd_make_section_anyway_with_flags (abfd, ".eh_frame", flags);
3546 htab->glink_eh_frame = s;
3547 if (s == NULL
3548 || !bfd_set_section_alignment (abfd, s, 2))
3549 return FALSE;
3550 }
3551
e054468f
AM
3552 flags = SEC_ALLOC | SEC_LINKER_CREATED;
3553 s = bfd_make_section_anyway_with_flags (abfd, ".iplt", flags);
ce558b89 3554 htab->elf.iplt = s;
e054468f
AM
3555 if (s == NULL
3556 || !bfd_set_section_alignment (abfd, s, 4))
3557 return FALSE;
3558
3559 flags = (SEC_ALLOC | SEC_LOAD | SEC_READONLY | SEC_HAS_CONTENTS
3560 | SEC_IN_MEMORY | SEC_LINKER_CREATED);
14b2f831 3561 s = bfd_make_section_anyway_with_flags (abfd, ".rela.iplt", flags);
ce558b89 3562 htab->elf.irelplt = s;
e054468f
AM
3563 if (s == NULL
3564 || ! bfd_set_section_alignment (abfd, s, 2))
3565 return FALSE;
93d1b056 3566
2d7ad24e
AM
3567 /* Local plt entries. */
3568 flags = (SEC_ALLOC | SEC_LOAD
3569 | SEC_HAS_CONTENTS | SEC_IN_MEMORY | SEC_LINKER_CREATED);
3570 htab->pltlocal = bfd_make_section_anyway_with_flags (abfd, ".branch_lt",
3571 flags);
3572 if (htab->pltlocal == NULL
3573 || ! bfd_set_section_alignment (abfd, htab->pltlocal, 2))
3574 return FALSE;
3575
3576 if (bfd_link_pic (info))
3577 {
3578 flags = (SEC_ALLOC | SEC_LOAD | SEC_READONLY
3579 | SEC_HAS_CONTENTS | SEC_IN_MEMORY | SEC_LINKER_CREATED);
3580 htab->relpltlocal
3581 = bfd_make_section_anyway_with_flags (abfd, ".rela.branch_lt", flags);
3582 if (htab->relpltlocal == NULL
3583 || ! bfd_set_section_alignment (abfd, htab->relpltlocal, 2))
3584 return FALSE;
3585 }
3586
93d1b056
AM
3587 if (!ppc_elf_create_linker_section (abfd, info, 0,
3588 &htab->sdata[0]))
3589 return FALSE;
3590
3591 if (!ppc_elf_create_linker_section (abfd, info, SEC_READONLY,
3592 &htab->sdata[1]))
3593 return FALSE;
3594
e054468f
AM
3595 return TRUE;
3596}
3597
25dbc73a
AM
3598/* We have to create .dynsbss and .rela.sbss here so that they get mapped
3599 to output sections (just like _bfd_elf_create_dynamic_sections has
3600 to create .dynbss and .rela.bss). */
3dab13f6 3601
25dbc73a
AM
3602static bfd_boolean
3603ppc_elf_create_dynamic_sections (bfd *abfd, struct bfd_link_info *info)
3604{
3605 struct ppc_elf_link_hash_table *htab;
3606 asection *s;
3607 flagword flags;
3dab13f6 3608
25dbc73a 3609 htab = ppc_elf_hash_table (info);
3dab13f6 3610
ce558b89 3611 if (htab->elf.sgot == NULL
25dbc73a 3612 && !ppc_elf_create_got (abfd, info))
3dab13f6
AM
3613 return FALSE;
3614
25dbc73a
AM
3615 if (!_bfd_elf_create_dynamic_sections (abfd, info))
3616 return FALSE;
3dab13f6 3617
e054468f
AM
3618 if (htab->glink == NULL
3619 && !ppc_elf_create_glink (abfd, info))
d7128ce4 3620 return FALSE;
3dab13f6 3621
14b2f831
AM
3622 s = bfd_make_section_anyway_with_flags (abfd, ".dynsbss",
3623 SEC_ALLOC | SEC_LINKER_CREATED);
3b36f7e6 3624 htab->dynsbss = s;
3496cb2a 3625 if (s == NULL)
25dbc73a 3626 return FALSE;
3dab13f6 3627
0e1862bb 3628 if (! bfd_link_pic (info))
25dbc73a 3629 {
e054468f
AM
3630 flags = (SEC_ALLOC | SEC_LOAD | SEC_READONLY | SEC_HAS_CONTENTS
3631 | SEC_IN_MEMORY | SEC_LINKER_CREATED);
14b2f831 3632 s = bfd_make_section_anyway_with_flags (abfd, ".rela.sbss", flags);
3b36f7e6 3633 htab->relsbss = s;
25dbc73a 3634 if (s == NULL
25dbc73a
AM
3635 || ! bfd_set_section_alignment (abfd, s, 2))
3636 return FALSE;
3637 }
3dab13f6 3638
711de32c
RS
3639 if (htab->is_vxworks
3640 && !elf_vxworks_create_dynamic_sections (abfd, info, &htab->srelplt2))
3641 return FALSE;
9d8504b1 3642
ce558b89 3643 s = htab->elf.splt;
3b36f7e6 3644 flags = SEC_ALLOC | SEC_CODE | SEC_LINKER_CREATED;
4a3dc543
RS
3645 if (htab->plt_type == PLT_VXWORKS)
3646 /* The VxWorks PLT is a loaded section with contents. */
3647 flags |= SEC_HAS_CONTENTS | SEC_LOAD | SEC_READONLY;
25dbc73a
AM
3648 return bfd_set_section_flags (abfd, s, flags);
3649}
3dab13f6 3650
25dbc73a 3651/* Copy the extra info we tack onto an elf_link_hash_entry. */
58111eb7 3652
25dbc73a 3653static void
fcfa13d2 3654ppc_elf_copy_indirect_symbol (struct bfd_link_info *info,
25dbc73a
AM
3655 struct elf_link_hash_entry *dir,
3656 struct elf_link_hash_entry *ind)
3657{
3658 struct ppc_elf_link_hash_entry *edir, *eind;
3dab13f6 3659
25dbc73a
AM
3660 edir = (struct ppc_elf_link_hash_entry *) dir;
3661 eind = (struct ppc_elf_link_hash_entry *) ind;
3dab13f6 3662
c79d6685
AM
3663 edir->tls_mask |= eind->tls_mask;
3664 edir->has_sda_refs |= eind->has_sda_refs;
3665
e81830c5
AM
3666 if (edir->elf.versioned != versioned_hidden)
3667 edir->elf.ref_dynamic |= eind->elf.ref_dynamic;
c79d6685
AM
3668 edir->elf.ref_regular |= eind->elf.ref_regular;
3669 edir->elf.ref_regular_nonweak |= eind->elf.ref_regular_nonweak;
4a7e5234 3670 edir->elf.non_got_ref |= eind->elf.non_got_ref;
c79d6685
AM
3671 edir->elf.needs_plt |= eind->elf.needs_plt;
3672 edir->elf.pointer_equality_needed |= eind->elf.pointer_equality_needed;
3673
287c7eaf
AM
3674 /* If we were called to copy over info for a weak sym, that's all. */
3675 if (eind->elf.root.type != bfd_link_hash_indirect)
3676 return;
3677
25dbc73a
AM
3678 if (eind->dyn_relocs != NULL)
3679 {
3680 if (edir->dyn_relocs != NULL)
3dab13f6 3681 {
6061a67d
AM
3682 struct elf_dyn_relocs **pp;
3683 struct elf_dyn_relocs *p;
3dab13f6 3684
fcfa13d2 3685 /* Add reloc counts against the indirect sym to the direct sym
25dbc73a
AM
3686 list. Merge any entries against the same section. */
3687 for (pp = &eind->dyn_relocs; (p = *pp) != NULL; )
3dab13f6 3688 {
6061a67d 3689 struct elf_dyn_relocs *q;
25dbc73a
AM
3690
3691 for (q = edir->dyn_relocs; q != NULL; q = q->next)
3692 if (q->sec == p->sec)
3693 {
3694 q->pc_count += p->pc_count;
3695 q->count += p->count;
3696 *pp = p->next;
3697 break;
3698 }
3699 if (q == NULL)
3700 pp = &p->next;
3dab13f6 3701 }
25dbc73a 3702 *pp = edir->dyn_relocs;
3dab13f6 3703 }
25dbc73a
AM
3704
3705 edir->dyn_relocs = eind->dyn_relocs;
3706 eind->dyn_relocs = NULL;
3dab13f6 3707 }
3dab13f6 3708
a6aa5195
AM
3709 /* Copy over the GOT refcount entries that we may have already seen to
3710 the symbol which just became indirect. */
fcfa13d2
AM
3711 edir->elf.got.refcount += eind->elf.got.refcount;
3712 eind->elf.got.refcount = 0;
a6aa5195
AM
3713
3714 /* And plt entries. */
3715 if (eind->elf.plt.plist != NULL)
3716 {
3717 if (edir->elf.plt.plist != NULL)
3718 {
3719 struct plt_entry **entp;
3720 struct plt_entry *ent;
3721
3722 for (entp = &eind->elf.plt.plist; (ent = *entp) != NULL; )
3723 {
3724 struct plt_entry *dent;
3725
3726 for (dent = edir->elf.plt.plist; dent != NULL; dent = dent->next)
3727 if (dent->sec == ent->sec && dent->addend == ent->addend)
3728 {
3729 dent->plt.refcount += ent->plt.refcount;
3730 *entp = ent->next;
3731 break;
3732 }
3733 if (dent == NULL)
3734 entp = &ent->next;
3735 }
3736 *entp = edir->elf.plt.plist;
3737 }
3738
3739 edir->elf.plt.plist = eind->elf.plt.plist;
3740 eind->elf.plt.plist = NULL;
3741 }
3742
fcfa13d2 3743 if (eind->elf.dynindx != -1)
25dbc73a 3744 {
fcfa13d2
AM
3745 if (edir->elf.dynindx != -1)
3746 _bfd_elf_strtab_delref (elf_hash_table (info)->dynstr,
3747 edir->elf.dynstr_index);
a6aa5195
AM
3748 edir->elf.dynindx = eind->elf.dynindx;
3749 edir->elf.dynstr_index = eind->elf.dynstr_index;
3750 eind->elf.dynindx = -1;
3751 eind->elf.dynstr_index = 0;
25dbc73a 3752 }
25dbc73a 3753}
3dab13f6 3754
25dbc73a
AM
3755/* Hook called by the linker routine which adds symbols from an object
3756 file. We use it to put .comm items in .sbss, and not .bss. */
58111eb7 3757
25dbc73a
AM
3758static bfd_boolean
3759ppc_elf_add_symbol_hook (bfd *abfd,
3760 struct bfd_link_info *info,
3761 Elf_Internal_Sym *sym,
3762 const char **namep ATTRIBUTE_UNUSED,
3763 flagword *flagsp ATTRIBUTE_UNUSED,
3764 asection **secp,
3765 bfd_vma *valp)
3766{
3767 if (sym->st_shndx == SHN_COMMON
0e1862bb 3768 && !bfd_link_relocatable (info)
0c8d6e5c
AM
3769 && is_ppc_elf (info->output_bfd)
3770 && sym->st_size <= elf_gp_size (abfd))
25dbc73a
AM
3771 {
3772 /* Common symbols less than or equal to -G nn bytes are automatically
3773 put into .sbss. */
3774 struct ppc_elf_link_hash_table *htab;
3dab13f6 3775
25dbc73a
AM
3776 htab = ppc_elf_hash_table (info);
3777 if (htab->sbss == NULL)
3778 {
644285ef 3779 flagword flags = SEC_IS_COMMON | SEC_LINKER_CREATED;
3dab13f6 3780
644285ef
AM
3781 if (!htab->elf.dynobj)
3782 htab->elf.dynobj = abfd;
3783
3496cb2a
L
3784 htab->sbss = bfd_make_section_anyway_with_flags (htab->elf.dynobj,
3785 ".sbss",
3786 flags);
3787 if (htab->sbss == NULL)
25dbc73a 3788 return FALSE;
3dab13f6 3789 }
3dab13f6 3790
25dbc73a
AM
3791 *secp = htab->sbss;
3792 *valp = sym->st_size;
3793 }
3dab13f6 3794
a43942db 3795 if (ELF_ST_TYPE (sym->st_info) == STT_GNU_IFUNC
f1885d1e
AM
3796 && (abfd->flags & DYNAMIC) == 0
3797 && bfd_get_flavour (info->output_bfd) == bfd_target_elf_flavour)
a43942db 3798 elf_tdata (info->output_bfd)->has_gnu_symbols |= elf_gnu_symbol_ifunc;
e054468f 3799
25dbc73a 3800 return TRUE;
3dab13f6
AM
3801}
3802\f
25dbc73a
AM
3803/* Find a linker generated pointer with a given addend and type. */
3804
3805static elf_linker_section_pointers_t *
3806elf_find_pointer_linker_section
3807 (elf_linker_section_pointers_t *linker_pointers,
3808 bfd_vma addend,
3809 elf_linker_section_t *lsect)
252b5132 3810{
25dbc73a
AM
3811 for ( ; linker_pointers != NULL; linker_pointers = linker_pointers->next)
3812 if (lsect == linker_pointers->lsect && addend == linker_pointers->addend)
3813 return linker_pointers;
252b5132 3814
25dbc73a
AM
3815 return NULL;
3816}
3817
3818/* Allocate a pointer to live in a linker created section. */
3819
3820static bfd_boolean
93d1b056
AM
3821elf_allocate_pointer_linker_section (bfd *abfd,
3822 elf_linker_section_t *lsect,
3823 struct elf_link_hash_entry *h,
3824 const Elf_Internal_Rela *rel)
25dbc73a
AM
3825{
3826 elf_linker_section_pointers_t **ptr_linker_section_ptr = NULL;
3827 elf_linker_section_pointers_t *linker_section_ptr;
3828 unsigned long r_symndx = ELF32_R_SYM (rel->r_info);
3829 bfd_size_type amt;
3830
3831 BFD_ASSERT (lsect != NULL);
3832
3833 /* Is this a global symbol? */
3834 if (h != NULL)
3835 {
3836 struct ppc_elf_link_hash_entry *eh;
3837
3838 /* Has this symbol already been allocated? If so, our work is done. */
3839 eh = (struct ppc_elf_link_hash_entry *) h;
3840 if (elf_find_pointer_linker_section (eh->linker_section_pointer,
3841 rel->r_addend,
3842 lsect))
3843 return TRUE;
3844
3845 ptr_linker_section_ptr = &eh->linker_section_pointer;
25dbc73a
AM
3846 }
3847 else
3848 {
0c8d6e5c 3849 BFD_ASSERT (is_ppc_elf (abfd));
0ffa91dd 3850
25dbc73a
AM
3851 /* Allocation of a pointer to a local symbol. */
3852 elf_linker_section_pointers_t **ptr = elf_local_ptr_offsets (abfd);
3853
3854 /* Allocate a table to hold the local symbols if first time. */
3855 if (!ptr)
3856 {
0ffa91dd 3857 unsigned int num_symbols = elf_symtab_hdr (abfd).sh_info;
25dbc73a
AM
3858
3859 amt = num_symbols;
3860 amt *= sizeof (elf_linker_section_pointers_t *);
3861 ptr = bfd_zalloc (abfd, amt);
3862
3863 if (!ptr)
3864 return FALSE;
3865
3866 elf_local_ptr_offsets (abfd) = ptr;
3867 }
3868
3869 /* Has this symbol already been allocated? If so, our work is done. */
3870 if (elf_find_pointer_linker_section (ptr[r_symndx],
3871 rel->r_addend,
3872 lsect))
3873 return TRUE;
252b5132 3874
25dbc73a 3875 ptr_linker_section_ptr = &ptr[r_symndx];
25dbc73a 3876 }
41fcb14e 3877
25dbc73a
AM
3878 /* Allocate space for a pointer in the linker section, and allocate
3879 a new pointer record from internal memory. */
3880 BFD_ASSERT (ptr_linker_section_ptr != NULL);
3881 amt = sizeof (elf_linker_section_pointers_t);
3882 linker_section_ptr = bfd_alloc (abfd, amt);
41fcb14e 3883
25dbc73a 3884 if (!linker_section_ptr)
7619e7c7 3885 return FALSE;
41fcb14e 3886
25dbc73a
AM
3887 linker_section_ptr->next = *ptr_linker_section_ptr;
3888 linker_section_ptr->addend = rel->r_addend;
3889 linker_section_ptr->lsect = lsect;
25dbc73a 3890 *ptr_linker_section_ptr = linker_section_ptr;
41fcb14e 3891
93d1b056
AM
3892 if (!bfd_set_section_alignment (lsect->section->owner, lsect->section, 2))
3893 return FALSE;
25dbc73a
AM
3894 linker_section_ptr->offset = lsect->section->size;
3895 lsect->section->size += 4;
7619e7c7 3896
25dbc73a
AM
3897#ifdef DEBUG
3898 fprintf (stderr,
3899 "Create pointer in linker section %s, offset = %ld, section size = %ld\n",
3900 lsect->name, (long) linker_section_ptr->offset,
3901 (long) lsect->section->size);
3902#endif
7619e7c7
AM
3903
3904 return TRUE;
41fcb14e
AM
3905}
3906
e054468f 3907static struct plt_entry **
25dbc73a
AM
3908update_local_sym_info (bfd *abfd,
3909 Elf_Internal_Shdr *symtab_hdr,
3910 unsigned long r_symndx,
3911 int tls_type)
252b5132 3912{
25dbc73a 3913 bfd_signed_vma *local_got_refcounts = elf_local_got_refcounts (abfd);
e054468f 3914 struct plt_entry **local_plt;
bac3c8c5 3915 unsigned char *local_got_tls_masks;
252b5132 3916
25dbc73a 3917 if (local_got_refcounts == NULL)
252b5132 3918 {
25dbc73a
AM
3919 bfd_size_type size = symtab_hdr->sh_info;
3920
e054468f
AM
3921 size *= (sizeof (*local_got_refcounts)
3922 + sizeof (*local_plt)
3923 + sizeof (*local_got_tls_masks));
25dbc73a
AM
3924 local_got_refcounts = bfd_zalloc (abfd, size);
3925 if (local_got_refcounts == NULL)
e054468f 3926 return NULL;
25dbc73a 3927 elf_local_got_refcounts (abfd) = local_got_refcounts;
252b5132 3928 }
41fcb14e 3929
e054468f 3930 local_plt = (struct plt_entry **) (local_got_refcounts + symtab_hdr->sh_info);
bac3c8c5 3931 local_got_tls_masks = (unsigned char *) (local_plt + symtab_hdr->sh_info);
37da22e5
AM
3932 local_got_tls_masks[r_symndx] |= tls_type & 0xff;
3933 if ((tls_type & NON_GOT) == 0)
e054468f
AM
3934 local_got_refcounts[r_symndx] += 1;
3935 return local_plt + r_symndx;
25dbc73a 3936}
41fcb14e 3937
a6aa5195 3938static bfd_boolean
3ec01793 3939update_plt_info (bfd *abfd, struct plt_entry **plist,
a6aa5195
AM
3940 asection *sec, bfd_vma addend)
3941{
3942 struct plt_entry *ent;
3943
32af9f6e
AM
3944 if (addend < 32768)
3945 sec = NULL;
3ec01793 3946 for (ent = *plist; ent != NULL; ent = ent->next)
a6aa5195
AM
3947 if (ent->sec == sec && ent->addend == addend)
3948 break;
3949 if (ent == NULL)
3950 {
3951 bfd_size_type amt = sizeof (*ent);
3952 ent = bfd_alloc (abfd, amt);
3953 if (ent == NULL)
3954 return FALSE;
3ec01793 3955 ent->next = *plist;
a6aa5195
AM
3956 ent->sec = sec;
3957 ent->addend = addend;
3958 ent->plt.refcount = 0;
3ec01793 3959 *plist = ent;
a6aa5195
AM
3960 }
3961 ent->plt.refcount += 1;
3962 return TRUE;
3963}
3964
3965static struct plt_entry *
3ec01793 3966find_plt_ent (struct plt_entry **plist, asection *sec, bfd_vma addend)
a6aa5195
AM
3967{
3968 struct plt_entry *ent;
3969
3970 if (addend < 32768)
3971 sec = NULL;
3ec01793 3972 for (ent = *plist; ent != NULL; ent = ent->next)
a6aa5195
AM
3973 if (ent->sec == sec && ent->addend == addend)
3974 break;
3975 return ent;
3976}
3977
e054468f
AM
3978static bfd_boolean
3979is_branch_reloc (enum elf_ppc_reloc_type r_type)
3980{
3981 return (r_type == R_PPC_PLTREL24
3982 || r_type == R_PPC_LOCAL24PC
3983 || r_type == R_PPC_REL24
3984 || r_type == R_PPC_REL14
3985 || r_type == R_PPC_REL14_BRTAKEN
3986 || r_type == R_PPC_REL14_BRNTAKEN
3987 || r_type == R_PPC_ADDR24
3988 || r_type == R_PPC_ADDR14
3989 || r_type == R_PPC_ADDR14_BRTAKEN
dfdaec14
AJ
3990 || r_type == R_PPC_ADDR14_BRNTAKEN
3991 || r_type == R_PPC_VLE_REL24);
e054468f
AM
3992}
3993
23cedd1d
AM
3994/* Relocs on inline plt call sequence insns prior to the call. */
3995
3996static bfd_boolean
3997is_plt_seq_reloc (enum elf_ppc_reloc_type r_type)
3998{
3999 return (r_type == R_PPC_PLT16_HA
4000 || r_type == R_PPC_PLT16_HI
4001 || r_type == R_PPC_PLT16_LO
4002 || r_type == R_PPC_PLTSEQ);
4003}
4004
25dbc73a
AM
4005static void
4006bad_shared_reloc (bfd *abfd, enum elf_ppc_reloc_type r_type)
4007{
4eca0228 4008 _bfd_error_handler
695344c0 4009 /* xgettext:c-format */
871b3ab2 4010 (_("%pB: relocation %s cannot be used when making a shared object"),
25dbc73a
AM
4011 abfd,
4012 ppc_elf_howto_table[r_type]->name);
4013 bfd_set_error (bfd_error_bad_value);
252b5132
RH
4014}
4015
25dbc73a
AM
4016/* Look through the relocs for a section during the first phase, and
4017 allocate space in the global offset table or procedure linkage
4018 table. */
252b5132 4019
b34976b6 4020static bfd_boolean
25dbc73a
AM
4021ppc_elf_check_relocs (bfd *abfd,
4022 struct bfd_link_info *info,
4023 asection *sec,
4024 const Elf_Internal_Rela *relocs)
252b5132 4025{
7619e7c7 4026 struct ppc_elf_link_hash_table *htab;
25dbc73a
AM
4027 Elf_Internal_Shdr *symtab_hdr;
4028 struct elf_link_hash_entry **sym_hashes;
4029 const Elf_Internal_Rela *rel;
4030 const Elf_Internal_Rela *rel_end;
a6aa5195 4031 asection *got2, *sreloc;
727fc41e 4032 struct elf_link_hash_entry *tga;
25dbc73a 4033
0e1862bb 4034 if (bfd_link_relocatable (info))
25dbc73a 4035 return TRUE;
252b5132 4036
c87b5a93
AM
4037 /* Don't do anything special with non-loaded, non-alloced sections.
4038 In particular, any relocs in such sections should not affect GOT
4039 and PLT reference counting (ie. we don't allow them to create GOT
4040 or PLT entries), there's no possibility or desire to optimize TLS
4041 relocs, and there's not much point in propagating relocs to shared
4042 libs that the dynamic linker won't relocate. */
4043 if ((sec->flags & SEC_ALLOC) == 0)
4044 return TRUE;
4045
252b5132 4046#ifdef DEBUG
871b3ab2 4047 _bfd_error_handler ("ppc_elf_check_relocs called for section %pA in %pB",
25dbc73a 4048 sec, abfd);
252b5132
RH
4049#endif
4050
0c8d6e5c 4051 BFD_ASSERT (is_ppc_elf (abfd));
0ffa91dd 4052
25dbc73a
AM
4053 /* Initialize howto table if not already done. */
4054 if (!ppc_elf_howto_table[R_PPC_ADDR32])
4055 ppc_elf_howto_init ();
4056
7619e7c7 4057 htab = ppc_elf_hash_table (info);
25f23106
AM
4058 if (htab->glink == NULL)
4059 {
4060 if (htab->elf.dynobj == NULL)
4061 htab->elf.dynobj = abfd;
4062 if (!ppc_elf_create_glink (htab->elf.dynobj, info))
4063 return FALSE;
4064 }
727fc41e
AM
4065 tga = elf_link_hash_lookup (&htab->elf, "__tls_get_addr",
4066 FALSE, FALSE, TRUE);
0ffa91dd 4067 symtab_hdr = &elf_symtab_hdr (abfd);
25dbc73a 4068 sym_hashes = elf_sym_hashes (abfd);
a6aa5195 4069 got2 = bfd_get_section_by_name (abfd, ".got2");
25dbc73a
AM
4070 sreloc = NULL;
4071
4072 rel_end = relocs + sec->reloc_count;
4073 for (rel = relocs; rel < rel_end; rel++)
4074 {
4075 unsigned long r_symndx;
4076 enum elf_ppc_reloc_type r_type;
4077 struct elf_link_hash_entry *h;
727fc41e 4078 int tls_type;
cbf95972 4079 struct plt_entry **ifunc;
2d7ad24e
AM
4080 struct plt_entry **pltent;
4081 bfd_vma addend;
25dbc73a
AM
4082
4083 r_symndx = ELF32_R_SYM (rel->r_info);
4084 if (r_symndx < symtab_hdr->sh_info)
4085 h = NULL;
4086 else
973a3492
L
4087 {
4088 h = sym_hashes[r_symndx - symtab_hdr->sh_info];
4089 while (h->root.type == bfd_link_hash_indirect
4090 || h->root.type == bfd_link_hash_warning)
4091 h = (struct elf_link_hash_entry *) h->root.u.i.link;
4092 }
25dbc73a
AM
4093
4094 /* If a relocation refers to _GLOBAL_OFFSET_TABLE_, create the .got.
4095 This shows up in particular in an R_PPC_ADDR32 in the eabi
4096 startup code. */
3b36f7e6 4097 if (h != NULL
ce558b89 4098 && htab->elf.sgot == NULL
3b36f7e6 4099 && strcmp (h->root.root.string, "_GLOBAL_OFFSET_TABLE_") == 0)
252b5132 4100 {
3b36f7e6
AM
4101 if (htab->elf.dynobj == NULL)
4102 htab->elf.dynobj = abfd;
4103 if (!ppc_elf_create_got (htab->elf.dynobj, info))
4104 return FALSE;
4105 BFD_ASSERT (h == htab->elf.hgot);
25dbc73a 4106 }
252b5132 4107
727fc41e 4108 tls_type = 0;
de972ffa 4109 r_type = ELF32_R_TYPE (rel->r_info);
cbf95972 4110 ifunc = NULL;
06a162cf 4111 if (h == NULL && !htab->is_vxworks)
e054468f 4112 {
06a162cf
AM
4113 Elf_Internal_Sym *isym = bfd_sym_from_r_symndx (&htab->sym_cache,
4114 abfd, r_symndx);
4115 if (isym == NULL)
4116 return FALSE;
4117
0bed072f 4118 if (ELF_ST_TYPE (isym->st_info) == STT_GNU_IFUNC)
e054468f 4119 {
0bed072f 4120 /* Set PLT_IFUNC flag for this sym, no GOT entry yet. */
06a162cf 4121 ifunc = update_local_sym_info (abfd, symtab_hdr, r_symndx,
37da22e5 4122 NON_GOT | PLT_IFUNC);
06a162cf 4123 if (ifunc == NULL)
e054468f
AM
4124 return FALSE;
4125
06a162cf
AM
4126 /* STT_GNU_IFUNC symbols must have a PLT entry;
4127 In a non-pie executable even when there are
4128 no plt calls. */
0e1862bb 4129 if (!bfd_link_pic (info)
08be3224
AM
4130 || is_branch_reloc (r_type)
4131 || r_type == R_PPC_PLT16_LO
4132 || r_type == R_PPC_PLT16_HI
4133 || r_type == R_PPC_PLT16_HA)
e054468f 4134 {
2d7ad24e 4135 addend = 0;
0bed072f 4136 if (r_type == R_PPC_PLTREL24)
08be3224
AM
4137 ppc_elf_tdata (abfd)->makes_plt_call = 1;
4138 if (bfd_link_pic (info)
4139 && (r_type == R_PPC_PLTREL24
4140 || r_type == R_PPC_PLT16_LO
4141 || r_type == R_PPC_PLT16_HI
4142 || r_type == R_PPC_PLT16_HA))
4143 addend = rel->r_addend;
0bed072f
AM
4144 if (!update_plt_info (abfd, ifunc, got2, addend))
4145 return FALSE;
e054468f
AM
4146 }
4147 }
25f23106
AM
4148 }
4149
de972ffa
AM
4150 if (!htab->is_vxworks
4151 && is_branch_reloc (r_type)
4152 && h != NULL
4153 && h == tga)
25f23106 4154 {
de972ffa
AM
4155 if (rel != relocs
4156 && (ELF32_R_TYPE (rel[-1].r_info) == R_PPC_TLSGD
4157 || ELF32_R_TYPE (rel[-1].r_info) == R_PPC_TLSLD))
4158 /* We have a new-style __tls_get_addr call with a marker
4159 reloc. */
4160 ;
4161 else
4162 /* Mark this section as having an old-style call. */
4163 sec->has_tls_get_addr_call = 1;
e054468f 4164 }
727fc41e 4165
25dbc73a
AM
4166 switch (r_type)
4167 {
727fc41e
AM
4168 case R_PPC_TLSGD:
4169 case R_PPC_TLSLD:
4170 /* These special tls relocs tie a call to __tls_get_addr with
4171 its parameter symbol. */
37da22e5
AM
4172 if (h != NULL)
4173 ppc_elf_hash_entry (h)->tls_mask |= TLS_TLS | TLS_MARK;
4174 else
4175 if (!update_local_sym_info (abfd, symtab_hdr, r_symndx,
4176 NON_GOT | TLS_TLS | TLS_MARK))
4177 return FALSE;
727fc41e
AM
4178 break;
4179
23cedd1d
AM
4180 case R_PPC_PLTSEQ:
4181 break;
4182
25dbc73a
AM
4183 case R_PPC_GOT_TLSLD16:
4184 case R_PPC_GOT_TLSLD16_LO:
4185 case R_PPC_GOT_TLSLD16_HI:
4186 case R_PPC_GOT_TLSLD16_HA:
25dbc73a
AM
4187 tls_type = TLS_TLS | TLS_LD;
4188 goto dogottls;
252b5132 4189
25dbc73a
AM
4190 case R_PPC_GOT_TLSGD16:
4191 case R_PPC_GOT_TLSGD16_LO:
4192 case R_PPC_GOT_TLSGD16_HI:
4193 case R_PPC_GOT_TLSGD16_HA:
4194 tls_type = TLS_TLS | TLS_GD;
4195 goto dogottls;
4196
4197 case R_PPC_GOT_TPREL16:
4198 case R_PPC_GOT_TPREL16_LO:
4199 case R_PPC_GOT_TPREL16_HI:
4200 case R_PPC_GOT_TPREL16_HA:
7c8bbca5 4201 if (bfd_link_dll (info))
25dbc73a
AM
4202 info->flags |= DF_STATIC_TLS;
4203 tls_type = TLS_TLS | TLS_TPREL;
4204 goto dogottls;
4205
4206 case R_PPC_GOT_DTPREL16:
4207 case R_PPC_GOT_DTPREL16_LO:
4208 case R_PPC_GOT_DTPREL16_HI:
4209 case R_PPC_GOT_DTPREL16_HA:
4210 tls_type = TLS_TLS | TLS_DTPREL;
4211 dogottls:
4212 sec->has_tls_reloc = 1;
1a0670f3 4213 /* Fall through. */
252b5132 4214
25dbc73a
AM
4215 /* GOT16 relocations */
4216 case R_PPC_GOT16:
4217 case R_PPC_GOT16_LO:
4218 case R_PPC_GOT16_HI:
4219 case R_PPC_GOT16_HA:
4220 /* This symbol requires a global offset table entry. */
ce558b89 4221 if (htab->elf.sgot == NULL)
25dbc73a
AM
4222 {
4223 if (htab->elf.dynobj == NULL)
4224 htab->elf.dynobj = abfd;
4225 if (!ppc_elf_create_got (htab->elf.dynobj, info))
4226 return FALSE;
4227 }
4228 if (h != NULL)
4229 {
4230 h->got.refcount += 1;
4231 ppc_elf_hash_entry (h)->tls_mask |= tls_type;
4232 }
4233 else
4234 /* This is a global offset table entry for a local symbol. */
4235 if (!update_local_sym_info (abfd, symtab_hdr, r_symndx, tls_type))
4236 return FALSE;
91e21fb7
AM
4237
4238 /* We may also need a plt entry if the symbol turns out to be
4239 an ifunc. */
0e1862bb 4240 if (h != NULL && !bfd_link_pic (info))
91e21fb7
AM
4241 {
4242 if (!update_plt_info (abfd, &h->plt.plist, NULL, 0))
4243 return FALSE;
4244 }
25dbc73a 4245 break;
252b5132 4246
25dbc73a
AM
4247 /* Indirect .sdata relocation. */
4248 case R_PPC_EMB_SDAI16:
0e1862bb 4249 if (bfd_link_pic (info))
25dbc73a
AM
4250 {
4251 bad_shared_reloc (abfd, r_type);
4252 return FALSE;
4253 }
93d1b056
AM
4254 htab->sdata[0].sym->ref_regular = 1;
4255 if (!elf_allocate_pointer_linker_section (abfd, &htab->sdata[0],
4256 h, rel))
25dbc73a 4257 return FALSE;
046183de
AM
4258 if (h != NULL)
4259 {
4260 ppc_elf_hash_entry (h)->has_sda_refs = TRUE;
4261 h->non_got_ref = TRUE;
4262 }
25dbc73a 4263 break;
252b5132 4264
25dbc73a
AM
4265 /* Indirect .sdata2 relocation. */
4266 case R_PPC_EMB_SDA2I16:
0e1862bb 4267 if (bfd_link_pic (info))
25dbc73a
AM
4268 {
4269 bad_shared_reloc (abfd, r_type);
4270 return FALSE;
4271 }
93d1b056
AM
4272 htab->sdata[1].sym->ref_regular = 1;
4273 if (!elf_allocate_pointer_linker_section (abfd, &htab->sdata[1],
4274 h, rel))
25dbc73a 4275 return FALSE;
046183de
AM
4276 if (h != NULL)
4277 {
4278 ppc_elf_hash_entry (h)->has_sda_refs = TRUE;
4279 h->non_got_ref = TRUE;
4280 }
25dbc73a 4281 break;
252b5132 4282
93d1b056
AM
4283 case R_PPC_SDAREL16:
4284 htab->sdata[0].sym->ref_regular = 1;
1a0670f3 4285 /* Fall through. */
93d1b056 4286
b9c361e0
JL
4287 case R_PPC_VLE_SDAREL_LO16A:
4288 case R_PPC_VLE_SDAREL_LO16D:
4289 case R_PPC_VLE_SDAREL_HI16A:
4290 case R_PPC_VLE_SDAREL_HI16D:
4291 case R_PPC_VLE_SDAREL_HA16A:
4292 case R_PPC_VLE_SDAREL_HA16D:
046183de
AM
4293 if (h != NULL)
4294 {
4295 ppc_elf_hash_entry (h)->has_sda_refs = TRUE;
4296 h->non_got_ref = TRUE;
4297 }
4298 break;
4299
b9c361e0
JL
4300 case R_PPC_VLE_REL8:
4301 case R_PPC_VLE_REL15:
4302 case R_PPC_VLE_REL24:
4303 case R_PPC_VLE_LO16A:
4304 case R_PPC_VLE_LO16D:
4305 case R_PPC_VLE_HI16A:
4306 case R_PPC_VLE_HI16D:
4307 case R_PPC_VLE_HA16A:
4308 case R_PPC_VLE_HA16D:
83eef883 4309 case R_PPC_VLE_ADDR20:
b9c361e0
JL
4310 break;
4311
25dbc73a 4312 case R_PPC_EMB_SDA2REL:
0e1862bb 4313 if (bfd_link_pic (info))
046183de
AM
4314 {
4315 bad_shared_reloc (abfd, r_type);
4316 return FALSE;
4317 }
93d1b056 4318 htab->sdata[1].sym->ref_regular = 1;
046183de
AM
4319 if (h != NULL)
4320 {
4321 ppc_elf_hash_entry (h)->has_sda_refs = TRUE;
4322 h->non_got_ref = TRUE;
4323 }
4324 break;
4325
b9c361e0
JL
4326 case R_PPC_VLE_SDA21_LO:
4327 case R_PPC_VLE_SDA21:
25dbc73a
AM
4328 case R_PPC_EMB_SDA21:
4329 case R_PPC_EMB_RELSDA:
0e1862bb 4330 if (bfd_link_pic (info))
046183de
AM
4331 {
4332 bad_shared_reloc (abfd, r_type);
4333 return FALSE;
4334 }
046183de
AM
4335 if (h != NULL)
4336 {
4337 ppc_elf_hash_entry (h)->has_sda_refs = TRUE;
4338 h->non_got_ref = TRUE;
4339 }
4340 break;
4341
25dbc73a
AM
4342 case R_PPC_EMB_NADDR32:
4343 case R_PPC_EMB_NADDR16:
4344 case R_PPC_EMB_NADDR16_LO:
4345 case R_PPC_EMB_NADDR16_HI:
4346 case R_PPC_EMB_NADDR16_HA:
0e1862bb 4347 if (bfd_link_pic (info))
25dbc73a
AM
4348 {
4349 bad_shared_reloc (abfd, r_type);
4350 return FALSE;
4351 }
4dc4a9a5 4352 if (h != NULL)
046183de 4353 h->non_got_ref = TRUE;
25dbc73a 4354 break;
252b5132 4355
25dbc73a 4356 case R_PPC_PLTREL24:
de972ffa 4357 if (h == NULL)
6d78d0b9 4358 break;
08be3224 4359 ppc_elf_tdata (abfd)->makes_plt_call = 1;
3e04d765 4360 goto pltentry;
08be3224 4361
23cedd1d 4362 case R_PPC_PLTCALL:
3e04d765
AM
4363 sec->has_pltcall = 1;
4364 /* Fall through. */
4365
6d78d0b9 4366 case R_PPC_PLT32:
25dbc73a
AM
4367 case R_PPC_PLTREL32:
4368 case R_PPC_PLT16_LO:
4369 case R_PPC_PLT16_HI:
4370 case R_PPC_PLT16_HA:
3e04d765 4371 pltentry:
25dbc73a
AM
4372#ifdef DEBUG
4373 fprintf (stderr, "Reloc requires a PLT entry\n");
4374#endif
cbf95972 4375 /* This symbol requires a procedure linkage table entry. */
25dbc73a
AM
4376 if (h == NULL)
4377 {
2d7ad24e
AM
4378 pltent = update_local_sym_info (abfd, symtab_hdr, r_symndx,
4379 NON_GOT | PLT_KEEP);
4380 if (pltent == NULL)
4381 return FALSE;
25dbc73a 4382 }
a6aa5195
AM
4383 else
4384 {
2d7ad24e
AM
4385 if (r_type != R_PPC_PLTREL24)
4386 ppc_elf_hash_entry (h)->tls_mask |= PLT_KEEP;
a6aa5195 4387 h->needs_plt = 1;
2d7ad24e 4388 pltent = &h->plt.plist;
a6aa5195 4389 }
2d7ad24e
AM
4390 addend = 0;
4391 if (bfd_link_pic (info)
4392 && (r_type == R_PPC_PLTREL24
4393 || r_type == R_PPC_PLT16_LO
4394 || r_type == R_PPC_PLT16_HI
4395 || r_type == R_PPC_PLT16_HA))
4396 addend = rel->r_addend;
4397 if (!update_plt_info (abfd, pltent, got2, addend))
4398 return FALSE;
25dbc73a 4399 break;
ee05f2fe 4400
25dbc73a
AM
4401 /* The following relocations don't need to propagate the
4402 relocation if linking a shared object since they are
4403 section relative. */
4404 case R_PPC_SECTOFF:
4405 case R_PPC_SECTOFF_LO:
4406 case R_PPC_SECTOFF_HI:
4407 case R_PPC_SECTOFF_HA:
4408 case R_PPC_DTPREL16:
4409 case R_PPC_DTPREL16_LO:
4410 case R_PPC_DTPREL16_HI:
4411 case R_PPC_DTPREL16_HA:
4412 case R_PPC_TOC16:
4413 break;
252b5132 4414
d7128ce4
AM
4415 case R_PPC_REL16:
4416 case R_PPC_REL16_LO:
4417 case R_PPC_REL16_HI:
4418 case R_PPC_REL16_HA:
a680de9a 4419 case R_PPC_REL16DX_HA:
016687f8 4420 ppc_elf_tdata (abfd)->has_rel16 = 1;
d7128ce4
AM
4421 break;
4422
a6aa5195 4423 /* These are just markers. */
25dbc73a
AM
4424 case R_PPC_TLS:
4425 case R_PPC_EMB_MRKREF:
4426 case R_PPC_NONE:
4427 case R_PPC_max:
32af9f6e
AM
4428 case R_PPC_RELAX:
4429 case R_PPC_RELAX_PLT:
4430 case R_PPC_RELAX_PLTREL24:
7ba71655 4431 case R_PPC_16DX_HA:
25dbc73a 4432 break;
252b5132 4433
25dbc73a
AM
4434 /* These should only appear in dynamic objects. */
4435 case R_PPC_COPY:
4436 case R_PPC_GLOB_DAT:
4437 case R_PPC_JMP_SLOT:
4438 case R_PPC_RELATIVE:
e054468f 4439 case R_PPC_IRELATIVE:
25dbc73a 4440 break;
252b5132 4441
25dbc73a
AM
4442 /* These aren't handled yet. We'll report an error later. */
4443 case R_PPC_ADDR30:
4444 case R_PPC_EMB_RELSEC16:
4445 case R_PPC_EMB_RELST_LO:
4446 case R_PPC_EMB_RELST_HI:
4447 case R_PPC_EMB_RELST_HA:
4448 case R_PPC_EMB_BIT_FLD:
4449 break;
252b5132 4450
25dbc73a
AM
4451 /* This refers only to functions defined in the shared library. */
4452 case R_PPC_LOCAL24PC:
727fc41e 4453 if (h != NULL && h == htab->elf.hgot && htab->plt_type == PLT_UNSET)
016687f8
AM
4454 {
4455 htab->plt_type = PLT_OLD;
4456 htab->old_bfd = abfd;
4457 }
c7e17e05
AM
4458 if (h != NULL && h->type == STT_GNU_IFUNC)
4459 {
c7e17e05
AM
4460 h->needs_plt = 1;
4461 if (!update_plt_info (abfd, &h->plt.plist, NULL, 0))
4462 return FALSE;
4463 }
25dbc73a 4464 break;
252b5132 4465
25dbc73a
AM
4466 /* This relocation describes the C++ object vtable hierarchy.
4467 Reconstruct it for later use during GC. */
4468 case R_PPC_GNU_VTINHERIT:
4469 if (!bfd_elf_gc_record_vtinherit (abfd, sec, h, rel->r_offset))
4470 return FALSE;
4471 break;
252b5132 4472
25dbc73a
AM
4473 /* This relocation describes which C++ vtable entries are actually
4474 used. Record for later use during GC. */
4475 case R_PPC_GNU_VTENTRY:
d17e0c6e
JB
4476 BFD_ASSERT (h != NULL);
4477 if (h != NULL
4478 && !bfd_elf_gc_record_vtentry (abfd, sec, h, rel->r_addend))
25dbc73a
AM
4479 return FALSE;
4480 break;
252b5132 4481
7c8bbca5 4482 /* We shouldn't really be seeing TPREL32. */
25dbc73a 4483 case R_PPC_TPREL32:
1d483afe
AM
4484 case R_PPC_TPREL16:
4485 case R_PPC_TPREL16_LO:
4486 case R_PPC_TPREL16_HI:
4487 case R_PPC_TPREL16_HA:
7c8bbca5 4488 if (bfd_link_dll (info))
25dbc73a
AM
4489 info->flags |= DF_STATIC_TLS;
4490 goto dodyn;
252b5132 4491
25dbc73a
AM
4492 /* Nor these. */
4493 case R_PPC_DTPMOD32:
4494 case R_PPC_DTPREL32:
4495 goto dodyn;
252b5132 4496
9edfd1af
AM
4497 case R_PPC_REL32:
4498 if (h == NULL
4499 && got2 != NULL
4500 && (sec->flags & SEC_CODE) != 0
0e1862bb 4501 && bfd_link_pic (info)
4a3dc543 4502 && htab->plt_type == PLT_UNSET)
9edfd1af
AM
4503 {
4504 /* Old -fPIC gcc code has .long LCTOC1-LCFx just before
4505 the start of a function, which assembles to a REL32
4506 reference to .got2. If we detect one of these, then
4507 force the old PLT layout because the linker cannot
4508 reliably deduce the GOT pointer value needed for
4509 PLT call stubs. */
4510 asection *s;
87d72d41 4511 Elf_Internal_Sym *isym;
9edfd1af 4512
87d72d41
AM
4513 isym = bfd_sym_from_r_symndx (&htab->sym_cache,
4514 abfd, r_symndx);
4515 if (isym == NULL)
4516 return FALSE;
4517
4518 s = bfd_section_from_elf_index (abfd, isym->st_shndx);
9edfd1af 4519 if (s == got2)
016687f8
AM
4520 {
4521 htab->plt_type = PLT_OLD;
4522 htab->old_bfd = abfd;
4523 }
9edfd1af 4524 }
7123df0e 4525 if (h == NULL || h == htab->elf.hgot)
fd38b44c 4526 break;
625af618
AM
4527 /* fall through */
4528
4529 case R_PPC_ADDR32:
4530 case R_PPC_ADDR16:
4531 case R_PPC_ADDR16_LO:
4532 case R_PPC_ADDR16_HI:
4533 case R_PPC_ADDR16_HA:
4534 case R_PPC_UADDR32:
4535 case R_PPC_UADDR16:
0e1862bb 4536 if (h != NULL && !bfd_link_pic (info))
625af618
AM
4537 {
4538 /* We may need a plt entry if the symbol turns out to be
4539 a function defined in a dynamic object. */
3ec01793 4540 if (!update_plt_info (abfd, &h->plt.plist, NULL, 0))
625af618
AM
4541 return FALSE;
4542
4543 /* We may need a copy reloc too. */
4544 h->non_got_ref = 1;
4545 h->pointer_equality_needed = 1;
d3e454b9
AM
4546 if (r_type == R_PPC_ADDR16_HA)
4547 ppc_elf_hash_entry (h)->has_addr16_ha = 1;
4548 if (r_type == R_PPC_ADDR16_LO)
4549 ppc_elf_hash_entry (h)->has_addr16_lo = 1;
625af618
AM
4550 }
4551 goto dodyn;
9edfd1af 4552
25dbc73a
AM
4553 case R_PPC_REL24:
4554 case R_PPC_REL14:
4555 case R_PPC_REL14_BRTAKEN:
4556 case R_PPC_REL14_BRNTAKEN:
d7128ce4 4557 if (h == NULL)
25dbc73a 4558 break;
7123df0e 4559 if (h == htab->elf.hgot)
d7128ce4 4560 {
7123df0e 4561 if (htab->plt_type == PLT_UNSET)
016687f8
AM
4562 {
4563 htab->plt_type = PLT_OLD;
4564 htab->old_bfd = abfd;
4565 }
d7128ce4
AM
4566 break;
4567 }
25dbc73a 4568 /* fall through */
ee05f2fe 4569
25dbc73a 4570 case R_PPC_ADDR24:
25dbc73a
AM
4571 case R_PPC_ADDR14:
4572 case R_PPC_ADDR14_BRTAKEN:
4573 case R_PPC_ADDR14_BRNTAKEN:
0e1862bb 4574 if (h != NULL && !bfd_link_pic (info))
25dbc73a
AM
4575 {
4576 /* We may need a plt entry if the symbol turns out to be
4577 a function defined in a dynamic object. */
e054468f 4578 h->needs_plt = 1;
de972ffa 4579 if (!update_plt_info (abfd, &h->plt.plist, NULL, 0))
a6aa5195 4580 return FALSE;
625af618 4581 break;
25dbc73a 4582 }
7619e7c7 4583
25dbc73a
AM
4584 dodyn:
4585 /* If we are creating a shared library, and this is a reloc
4586 against a global symbol, or a non PC relative reloc
4587 against a local symbol, then we need to copy the reloc
4588 into the shared library. However, if we are linking with
4589 -Bsymbolic, we do not need to copy a reloc against a
4590 global symbol which is defined in an object we are
4591 including in the link (i.e., DEF_REGULAR is set). At
4592 this point we have not seen all the input files, so it is
4593 possible that DEF_REGULAR is not set now but will be set
4594 later (it is never cleared). In case of a weak definition,
4595 DEF_REGULAR may be cleared later by a strong definition in
4596 a shared library. We account for that possibility below by
4597 storing information in the dyn_relocs field of the hash
4598 table entry. A similar situation occurs when creating
4599 shared libraries and symbol visibility changes render the
4600 symbol local.
7619e7c7 4601
25dbc73a
AM
4602 If on the other hand, we are creating an executable, we
4603 may need to keep relocations for symbols satisfied by a
4604 dynamic library if we manage to avoid copy relocs for the
4605 symbol. */
0e1862bb 4606 if ((bfd_link_pic (info)
1d483afe 4607 && (must_be_dyn_reloc (info, r_type)
25dbc73a 4608 || (h != NULL
198f1157 4609 && (!SYMBOLIC_BIND (info, h)
25dbc73a
AM
4610 || h->root.type == bfd_link_hash_defweak
4611 || !h->def_regular))))
4612 || (ELIMINATE_COPY_RELOCS
0e1862bb 4613 && !bfd_link_pic (info)
25dbc73a
AM
4614 && h != NULL
4615 && (h->root.type == bfd_link_hash_defweak
de972ffa 4616 || !h->def_regular)))
25dbc73a 4617 {
25dbc73a
AM
4618#ifdef DEBUG
4619 fprintf (stderr,
4620 "ppc_elf_check_relocs needs to "
4621 "create relocation for %s\n",
4622 (h && h->root.root.string
4623 ? h->root.root.string : "<unknown>"));
4624#endif
4625 if (sreloc == NULL)
4626 {
c9a2f333
AM
4627 if (htab->elf.dynobj == NULL)
4628 htab->elf.dynobj = abfd;
83bac4b0
NC
4629
4630 sreloc = _bfd_elf_make_dynamic_reloc_section
4631 (sec, htab->elf.dynobj, 2, abfd, /*rela?*/ TRUE);
4632
25dbc73a 4633 if (sreloc == NULL)
83bac4b0 4634 return FALSE;
25dbc73a 4635 }
7619e7c7 4636
25dbc73a
AM
4637 /* If this is a global symbol, we count the number of
4638 relocations we need for this symbol. */
4639 if (h != NULL)
4640 {
f95f8542
AM
4641 struct elf_dyn_relocs *p;
4642 struct elf_dyn_relocs **rel_head;
4643
91d6fa6a 4644 rel_head = &ppc_elf_hash_entry (h)->dyn_relocs;
f95f8542
AM
4645 p = *rel_head;
4646 if (p == NULL || p->sec != sec)
4647 {
4648 p = bfd_alloc (htab->elf.dynobj, sizeof *p);
4649 if (p == NULL)
4650 return FALSE;
4651 p->next = *rel_head;
4652 *rel_head = p;
4653 p->sec = sec;
4654 p->count = 0;
4655 p->pc_count = 0;
4656 }
4657 p->count += 1;
4658 if (!must_be_dyn_reloc (info, r_type))
4659 p->pc_count += 1;
25dbc73a
AM
4660 }
4661 else
4662 {
4663 /* Track dynamic relocs needed for local syms too.
4664 We really need local syms available to do this
4665 easily. Oh well. */
f95f8542
AM
4666 struct ppc_dyn_relocs *p;
4667 struct ppc_dyn_relocs **rel_head;
4668 bfd_boolean is_ifunc;
25dbc73a 4669 asection *s;
6edfbbad 4670 void *vpp;
87d72d41 4671 Elf_Internal_Sym *isym;
6edfbbad 4672
87d72d41
AM
4673 isym = bfd_sym_from_r_symndx (&htab->sym_cache,
4674 abfd, r_symndx);
4675 if (isym == NULL)
25dbc73a 4676 return FALSE;
7fce784e 4677
87d72d41
AM
4678 s = bfd_section_from_elf_index (abfd, isym->st_shndx);
4679 if (s == NULL)
4680 s = sec;
4681
6edfbbad 4682 vpp = &elf_section_data (s)->local_dynrel;
f95f8542
AM
4683 rel_head = (struct ppc_dyn_relocs **) vpp;
4684 is_ifunc = ELF_ST_TYPE (isym->st_info) == STT_GNU_IFUNC;
4685 p = *rel_head;
4686 if (p != NULL && p->sec == sec && p->ifunc != is_ifunc)
4687 p = p->next;
4688 if (p == NULL || p->sec != sec || p->ifunc != is_ifunc)
4689 {
4690 p = bfd_alloc (htab->elf.dynobj, sizeof *p);
4691 if (p == NULL)
4692 return FALSE;
4693 p->next = *rel_head;
4694 *rel_head = p;
4695 p->sec = sec;
4696 p->ifunc = is_ifunc;
4697 p->count = 0;
4698 }
4699 p->count += 1;
25dbc73a 4700 }
7619e7c7 4701 }
25dbc73a
AM
4702
4703 break;
7619e7c7
AM
4704 }
4705 }
ee05f2fe 4706
25dbc73a
AM
4707 return TRUE;
4708}
4709\f
005d79fd
AM
4710/* Warn for conflicting Tag_GNU_Power_ABI_FP attributes between IBFD
4711 and OBFD, and merge non-conflicting ones. */
4712void
50e03d47 4713_bfd_elf_ppc_merge_fp_attributes (bfd *ibfd, struct bfd_link_info *info)
34c8bcba 4714{
50e03d47 4715 bfd *obfd = info->output_bfd;
c6e65352
DJ
4716 obj_attribute *in_attr, *in_attrs;
4717 obj_attribute *out_attr, *out_attrs;
34c8bcba 4718
c6e65352
DJ
4719 in_attrs = elf_known_obj_attributes (ibfd)[OBJ_ATTR_GNU];
4720 out_attrs = elf_known_obj_attributes (obfd)[OBJ_ATTR_GNU];
4721
c6e65352
DJ
4722 in_attr = &in_attrs[Tag_GNU_Power_ABI_FP];
4723 out_attr = &out_attrs[Tag_GNU_Power_ABI_FP];
005d79fd 4724
c6e65352 4725 if (in_attr->i != out_attr->i)
34c8bcba 4726 {
005d79fd
AM
4727 int in_fp = in_attr->i & 3;
4728 int out_fp = out_attr->i & 3;
4729
4730 if (in_fp == 0)
34c8bcba 4731 ;
005d79fd
AM
4732 else if (out_fp == 0)
4733 {
4734 out_attr->type = 1;
4735 out_attr->i ^= in_fp;
4736 }
4737 else if (out_fp != 2 && in_fp == 2)
34c8bcba 4738 _bfd_error_handler
695344c0 4739 /* xgettext:c-format */
cf97bcb0 4740 (_("warning: %pB uses hard float, %pB uses soft float"), obfd, ibfd);
005d79fd
AM
4741 else if (out_fp == 2 && in_fp != 2)
4742 _bfd_error_handler
695344c0 4743 /* xgettext:c-format */
cf97bcb0 4744 (_("warning: %pB uses hard float, %pB uses soft float"), ibfd, obfd);
005d79fd 4745 else if (out_fp == 1 && in_fp == 3)
3c7b9897 4746 _bfd_error_handler
695344c0 4747 /* xgettext:c-format */
cf97bcb0 4748 (_("warning: %pB uses double-precision hard float, "
871b3ab2 4749 "%pB uses single-precision hard float"), obfd, ibfd);
005d79fd 4750 else if (out_fp == 3 && in_fp == 1)
3c7b9897 4751 _bfd_error_handler
695344c0 4752 /* xgettext:c-format */
cf97bcb0 4753 (_("warning: %pB uses double-precision hard float, "
871b3ab2 4754 "%pB uses single-precision hard float"), ibfd, obfd);
005d79fd
AM
4755
4756 in_fp = in_attr->i & 0xc;
4757 out_fp = out_attr->i & 0xc;
4758 if (in_fp == 0)
4759 ;
4760 else if (out_fp == 0)
4761 {
4762 out_attr->type = 1;
4763 out_attr->i ^= in_fp;
4764 }
4765 else if (out_fp != 2 * 4 && in_fp == 2 * 4)
3c7b9897 4766 _bfd_error_handler
695344c0 4767 /* xgettext:c-format */
cf97bcb0 4768 (_("warning: %pB uses 64-bit long double, "
871b3ab2 4769 "%pB uses 128-bit long double"), ibfd, obfd);
005d79fd 4770 else if (in_fp != 2 * 4 && out_fp == 2 * 4)
34c8bcba 4771 _bfd_error_handler
695344c0 4772 /* xgettext:c-format */
cf97bcb0 4773 (_("warning: %pB uses 64-bit long double, "
871b3ab2 4774 "%pB uses 128-bit long double"), obfd, ibfd);
005d79fd 4775 else if (out_fp == 1 * 4 && in_fp == 3 * 4)
34c8bcba 4776 _bfd_error_handler
695344c0 4777 /* xgettext:c-format */
cf97bcb0 4778 (_("warning: %pB uses IBM long double, "
a27ca19c 4779 "%pB uses IEEE long double"), obfd, ibfd);
005d79fd 4780 else if (out_fp == 3 * 4 && in_fp == 1 * 4)
34c8bcba 4781 _bfd_error_handler
695344c0 4782 /* xgettext:c-format */
cf97bcb0 4783 (_("warning: %pB uses IBM long double, "
a27ca19c 4784 "%pB uses IEEE long double"), ibfd, obfd);
c6e65352 4785 }
005d79fd
AM
4786}
4787
4788/* Merge object attributes from IBFD into OBFD. Warn if
4789 there are conflicting attributes. */
4790static bfd_boolean
50e03d47 4791ppc_elf_merge_obj_attributes (bfd *ibfd, struct bfd_link_info *info)
005d79fd 4792{
50e03d47 4793 bfd *obfd;
005d79fd
AM
4794 obj_attribute *in_attr, *in_attrs;
4795 obj_attribute *out_attr, *out_attrs;
4796
50e03d47 4797 _bfd_elf_ppc_merge_fp_attributes (ibfd, info);
005d79fd 4798
50e03d47 4799 obfd = info->output_bfd;
005d79fd
AM
4800 in_attrs = elf_known_obj_attributes (ibfd)[OBJ_ATTR_GNU];
4801 out_attrs = elf_known_obj_attributes (obfd)[OBJ_ATTR_GNU];
c6e65352
DJ
4802
4803 /* Check for conflicting Tag_GNU_Power_ABI_Vector attributes and
4804 merge non-conflicting ones. */
4805 in_attr = &in_attrs[Tag_GNU_Power_ABI_Vector];
4806 out_attr = &out_attrs[Tag_GNU_Power_ABI_Vector];
4807 if (in_attr->i != out_attr->i)
4808 {
005d79fd
AM
4809 int in_vec = in_attr->i & 3;
4810 int out_vec = out_attr->i & 3;
c6e65352 4811
005d79fd
AM
4812 if (in_vec == 0)
4813 ;
4814 else if (out_vec == 0)
c6e65352 4815 {
005d79fd
AM
4816 out_attr->type = 1;
4817 out_attr->i = in_vec;
c6e65352 4818 }
c6e65352
DJ
4819 /* For now, allow generic to transition to AltiVec or SPE
4820 without a warning. If GCC marked files with their stack
4821 alignment and used don't-care markings for files which are
4822 not affected by the vector ABI, we could warn about this
4823 case too. */
005d79fd 4824 else if (in_vec == 1)
c6e65352 4825 ;
005d79fd
AM
4826 else if (out_vec == 1)
4827 {
4828 out_attr->type = 1;
4829 out_attr->i = in_vec;
4830 }
4831 else if (out_vec < in_vec)
c6e65352 4832 _bfd_error_handler
695344c0 4833 /* xgettext:c-format */
cf97bcb0 4834 (_("warning: %pB uses AltiVec vector ABI, %pB uses SPE vector ABI"),
005d79fd
AM
4835 obfd, ibfd);
4836 else if (out_vec > in_vec)
c6e65352 4837 _bfd_error_handler
695344c0 4838 /* xgettext:c-format */
cf97bcb0 4839 (_("warning: %pB uses AltiVec vector ABI, %pB uses SPE vector ABI"),
005d79fd 4840 ibfd, obfd);
34c8bcba
JM
4841 }
4842
f82e0623
NF
4843 /* Check for conflicting Tag_GNU_Power_ABI_Struct_Return attributes
4844 and merge non-conflicting ones. */
4845 in_attr = &in_attrs[Tag_GNU_Power_ABI_Struct_Return];
4846 out_attr = &out_attrs[Tag_GNU_Power_ABI_Struct_Return];
4847 if (in_attr->i != out_attr->i)
4848 {
005d79fd
AM
4849 int in_struct = in_attr->i & 3;
4850 int out_struct = out_attr->i & 3;
4851
4852 if (in_struct == 0 || in_struct == 3)
f82e0623 4853 ;
005d79fd
AM
4854 else if (out_struct == 0)
4855 {
4856 out_attr->type = 1;
4857 out_attr->i = in_struct;
4858 }
4859 else if (out_struct < in_struct)
4860 _bfd_error_handler
695344c0 4861 /* xgettext:c-format */
cf97bcb0 4862 (_("warning: %pB uses r3/r4 for small structure returns, "
871b3ab2 4863 "%pB uses memory"), obfd, ibfd);
005d79fd
AM
4864 else if (out_struct > in_struct)
4865 _bfd_error_handler
695344c0 4866 /* xgettext:c-format */
cf97bcb0 4867 (_("warning: %pB uses r3/r4 for small structure returns, "
871b3ab2 4868 "%pB uses memory"), ibfd, obfd);
f82e0623
NF
4869 }
4870
34c8bcba 4871 /* Merge Tag_compatibility attributes and any common GNU ones. */
50e03d47 4872 _bfd_elf_merge_object_attributes (ibfd, info);
34c8bcba
JM
4873
4874 return TRUE;
4875}
4876
8853c3d3
AM
4877/* Merge backend specific data from an object file to the output
4878 object file when linking. */
4879
4880static bfd_boolean
50e03d47 4881ppc_elf_merge_private_bfd_data (bfd *ibfd, struct bfd_link_info *info)
8853c3d3 4882{
50e03d47 4883 bfd *obfd = info->output_bfd;
8853c3d3
AM
4884 flagword old_flags;
4885 flagword new_flags;
4886 bfd_boolean error;
4887
0c8d6e5c 4888 if (!is_ppc_elf (ibfd) || !is_ppc_elf (obfd))
8853c3d3
AM
4889 return TRUE;
4890
cc643b88 4891 /* Check if we have the same endianness. */
50e03d47 4892 if (! _bfd_generic_verify_endian_match (ibfd, info))
8853c3d3
AM
4893 return FALSE;
4894
50e03d47 4895 if (!ppc_elf_merge_obj_attributes (ibfd, info))
34c8bcba
JM
4896 return FALSE;
4897
8853c3d3
AM
4898 new_flags = elf_elfheader (ibfd)->e_flags;
4899 old_flags = elf_elfheader (obfd)->e_flags;
4900 if (!elf_flags_init (obfd))
4901 {
4902 /* First call, no flags set. */
4903 elf_flags_init (obfd) = TRUE;
4904 elf_elfheader (obfd)->e_flags = new_flags;
4905 }
4906
4907 /* Compatible flags are ok. */
4908 else if (new_flags == old_flags)
4909 ;
4910
4911 /* Incompatible flags. */
4912 else
4913 {
4914 /* Warn about -mrelocatable mismatch. Allow -mrelocatable-lib
4915 to be linked with either. */
4916 error = FALSE;
4917 if ((new_flags & EF_PPC_RELOCATABLE) != 0
4918 && (old_flags & (EF_PPC_RELOCATABLE | EF_PPC_RELOCATABLE_LIB)) == 0)
4919 {
4920 error = TRUE;
4eca0228 4921 _bfd_error_handler
871b3ab2 4922 (_("%pB: compiled with -mrelocatable and linked with "
8853c3d3
AM
4923 "modules compiled normally"), ibfd);
4924 }
4925 else if ((new_flags & (EF_PPC_RELOCATABLE | EF_PPC_RELOCATABLE_LIB)) == 0
4926 && (old_flags & EF_PPC_RELOCATABLE) != 0)
4927 {
4928 error = TRUE;
4eca0228 4929 _bfd_error_handler
871b3ab2 4930 (_("%pB: compiled normally and linked with "
8853c3d3
AM
4931 "modules compiled with -mrelocatable"), ibfd);
4932 }
4933
4934 /* The output is -mrelocatable-lib iff both the input files are. */
4935 if (! (new_flags & EF_PPC_RELOCATABLE_LIB))
4936 elf_elfheader (obfd)->e_flags &= ~EF_PPC_RELOCATABLE_LIB;
4937
4938 /* The output is -mrelocatable iff it can't be -mrelocatable-lib,
4939 but each input file is either -mrelocatable or -mrelocatable-lib. */
4940 if (! (elf_elfheader (obfd)->e_flags & EF_PPC_RELOCATABLE_LIB)
4941 && (new_flags & (EF_PPC_RELOCATABLE_LIB | EF_PPC_RELOCATABLE))
4942 && (old_flags & (EF_PPC_RELOCATABLE_LIB | EF_PPC_RELOCATABLE)))
4943 elf_elfheader (obfd)->e_flags |= EF_PPC_RELOCATABLE;
4944
4945 /* Do not warn about eabi vs. V.4 mismatch, just or in the bit if
4946 any module uses it. */
4947 elf_elfheader (obfd)->e_flags |= (new_flags & EF_PPC_EMB);
4948
4949 new_flags &= ~(EF_PPC_RELOCATABLE | EF_PPC_RELOCATABLE_LIB | EF_PPC_EMB);
4950 old_flags &= ~(EF_PPC_RELOCATABLE | EF_PPC_RELOCATABLE_LIB | EF_PPC_EMB);
4951
4952 /* Warn about any other mismatches. */
4953 if (new_flags != old_flags)
4954 {
4955 error = TRUE;
4eca0228 4956 _bfd_error_handler
695344c0 4957 /* xgettext:c-format */
871b3ab2 4958 (_("%pB: uses different e_flags (%#x) fields "
cd9af601
AM
4959 "than previous modules (%#x)"),
4960 ibfd, new_flags, old_flags);
8853c3d3
AM
4961 }
4962
4963 if (error)
4964 {
4965 bfd_set_error (bfd_error_bad_value);
4966 return FALSE;
4967 }
4968 }
4969
4970 return TRUE;
4971}
b9c361e0
JL
4972
4973static void
95f0d0d2 4974ppc_elf_vle_split16 (bfd *input_bfd,
08dc996f
AM
4975 asection *input_section,
4976 unsigned long offset,
95f0d0d2 4977 bfd_byte *loc,
86c95733 4978 bfd_vma value,
08dc996f
AM
4979 split16_format_type split16_format,
4980 bfd_boolean fixup)
b9c361e0 4981{
08dc996f 4982 unsigned int insn, opcode, top5;
b9c361e0 4983
95f0d0d2 4984 insn = bfd_get_32 (input_bfd, loc);
673cff9b 4985 opcode = insn & 0xfc00f800;
08dc996f
AM
4986 if (opcode == E_OR2I_INSN
4987 || opcode == E_AND2I_DOT_INSN
4988 || opcode == E_OR2IS_INSN
4989 || opcode == E_LIS_INSN
4990 || opcode == E_AND2IS_DOT_INSN)
4991 {
4992 if (split16_format != split16a_type)
4993 {
4994 if (fixup)
4995 split16_format = split16a_type;
4996 else
4997 _bfd_error_handler
4998 /* xgettext:c-format */
871b3ab2 4999 (_("%pB(%pA+0x%lx): expected 16A style relocation on 0x%08x insn"),
08dc996f
AM
5000 input_bfd, input_section, offset, opcode);
5001 }
5002 }
5003 else if (opcode == E_ADD2I_DOT_INSN
5004 || opcode == E_ADD2IS_INSN
5005 || opcode == E_CMP16I_INSN
5006 || opcode == E_MULL2I_INSN
5007 || opcode == E_CMPL16I_INSN
5008 || opcode == E_CMPH16I_INSN
5009 || opcode == E_CMPHL16I_INSN)
5010 {
5011 if (split16_format != split16d_type)
5012 {
5013 if (fixup)
5014 split16_format = split16d_type;
5015 else
5016 _bfd_error_handler
5017 /* xgettext:c-format */
871b3ab2 5018 (_("%pB(%pA+0x%lx): expected 16D style relocation on 0x%08x insn"),
08dc996f
AM
5019 input_bfd, input_section, offset, opcode);
5020 }
5021 }
86c95733 5022 top5 = value & 0xf800;
5499c7c7
AM
5023 top5 = top5 << (split16_format == split16a_type ? 5 : 10);
5024 insn &= (split16_format == split16a_type ? ~0x1f07ff : ~0x3e007ff);
b9c361e0 5025 insn |= top5;
86c95733 5026 insn |= value & 0x7ff;
95f0d0d2 5027 bfd_put_32 (input_bfd, insn, loc);
b9c361e0 5028}
83eef883
AFB
5029
5030static void
5031ppc_elf_vle_split20 (bfd *output_bfd, bfd_byte *loc, bfd_vma value)
5032{
5033 unsigned int insn;
5034
5035 insn = bfd_get_32 (output_bfd, loc);
5036 /* We have an li20 field, bits 17..20, 11..15, 21..31. */
5037 /* Top 4 bits of value to 17..20. */
5038 insn |= (value & 0xf0000) >> 5;
5039 /* Next 5 bits of the value to 11..15. */
5040 insn |= (value & 0xf800) << 5;
5041 /* And the final 11 bits of the value to bits 21 to 31. */
5042 insn |= value & 0x7ff;
5043 bfd_put_32 (output_bfd, insn, loc);
5044}
5045
8853c3d3 5046\f
d7128ce4
AM
5047/* Choose which PLT scheme to use, and set .plt flags appropriately.
5048 Returns -1 on error, 0 for old PLT, 1 for new PLT. */
5049int
5050ppc_elf_select_plt_layout (bfd *output_bfd ATTRIBUTE_UNUSED,
5446cbdf 5051 struct bfd_link_info *info)
d7128ce4
AM
5052{
5053 struct ppc_elf_link_hash_table *htab;
9d8504b1 5054 flagword flags;
d7128ce4
AM
5055
5056 htab = ppc_elf_hash_table (info);
4a3dc543
RS
5057
5058 if (htab->plt_type == PLT_UNSET)
016687f8 5059 {
b3874e1a
AM
5060 struct elf_link_hash_entry *h;
5061
5446cbdf 5062 if (htab->params->plt_style == PLT_OLD)
016687f8 5063 htab->plt_type = PLT_OLD;
0e1862bb 5064 else if (bfd_link_pic (info)
b3874e1a
AM
5065 && htab->elf.dynamic_sections_created
5066 && (h = elf_link_hash_lookup (&htab->elf, "_mcount",
5067 FALSE, FALSE, TRUE)) != NULL
5068 && (h->type == STT_FUNC
5069 || h->needs_plt)
5070 && h->ref_regular
5071 && !(SYMBOL_CALLS_LOCAL (info, h)
21d68fcd 5072 || UNDEFWEAK_NO_DYNAMIC_RELOC (info, h)))
b3874e1a
AM
5073 {
5074 /* Profiling of shared libs (and pies) is not supported with
5075 secure plt, because ppc32 does profiling before a
5076 function prologue and a secure plt pic call stubs needs
5077 r30 to be set up. */
5078 htab->plt_type = PLT_OLD;
5079 }
016687f8
AM
5080 else
5081 {
5082 bfd *ibfd;
5446cbdf 5083 enum ppc_elf_plt_type plt_type = htab->params->plt_style;
016687f8
AM
5084
5085 /* Look through the reloc flags left by ppc_elf_check_relocs.
5086 Use the old style bss plt if a file makes plt calls
5087 without using the new relocs, and if ld isn't given
5088 --secure-plt and we never see REL16 relocs. */
5089 if (plt_type == PLT_UNSET)
5090 plt_type = PLT_OLD;
c72f2fb2 5091 for (ibfd = info->input_bfds; ibfd; ibfd = ibfd->link.next)
0c8d6e5c 5092 if (is_ppc_elf (ibfd))
016687f8
AM
5093 {
5094 if (ppc_elf_tdata (ibfd)->has_rel16)
5095 plt_type = PLT_NEW;
5096 else if (ppc_elf_tdata (ibfd)->makes_plt_call)
5097 {
5098 plt_type = PLT_OLD;
5099 htab->old_bfd = ibfd;
5100 break;
5101 }
5102 }
5103 htab->plt_type = plt_type;
5104 }
5105 }
5446cbdf 5106 if (htab->plt_type == PLT_OLD && htab->params->plt_style == PLT_NEW)
b3874e1a
AM
5107 {
5108 if (htab->old_bfd != NULL)
cf97bcb0 5109 _bfd_error_handler (_("bss-plt forced due to %pB"), htab->old_bfd);
b3874e1a 5110 else
cf97bcb0 5111 _bfd_error_handler (_("bss-plt forced by profiling"));
b3874e1a 5112 }
d7128ce4 5113
4a3dc543 5114 BFD_ASSERT (htab->plt_type != PLT_VXWORKS);
9d8504b1 5115
4a3dc543 5116 if (htab->plt_type == PLT_NEW)
9d8504b1
PB
5117 {
5118 flags = (SEC_ALLOC | SEC_LOAD | SEC_HAS_CONTENTS
5119 | SEC_IN_MEMORY | SEC_LINKER_CREATED);
86b9da88
AM
5120
5121 /* The new PLT is a loaded section. */
ce558b89
AM
5122 if (htab->elf.splt != NULL
5123 && !bfd_set_section_flags (htab->elf.dynobj, htab->elf.splt, flags))
86b9da88
AM
5124 return -1;
5125
5126 /* The new GOT is not executable. */
ce558b89
AM
5127 if (htab->elf.sgot != NULL
5128 && !bfd_set_section_flags (htab->elf.dynobj, htab->elf.sgot, flags))
86b9da88 5129 return -1;
d7128ce4
AM
5130 }
5131 else
5132 {
5133 /* Stop an unused .glink section from affecting .text alignment. */
86b9da88
AM
5134 if (htab->glink != NULL
5135 && !bfd_set_section_alignment (htab->elf.dynobj, htab->glink, 0))
5136 return -1;
d7128ce4 5137 }
4a3dc543 5138 return htab->plt_type == PLT_NEW;
d7128ce4
AM
5139}
5140\f
25dbc73a
AM
5141/* Return the section that should be marked against GC for a given
5142 relocation. */
586119b3 5143
25dbc73a
AM
5144static asection *
5145ppc_elf_gc_mark_hook (asection *sec,
07adf181 5146 struct bfd_link_info *info,
25dbc73a
AM
5147 Elf_Internal_Rela *rel,
5148 struct elf_link_hash_entry *h,
5149 Elf_Internal_Sym *sym)
5150{
5151 if (h != NULL)
07adf181
AM
5152 switch (ELF32_R_TYPE (rel->r_info))
5153 {
5154 case R_PPC_GNU_VTINHERIT:
5155 case R_PPC_GNU_VTENTRY:
5156 return NULL;
5157 }
5158
5159 return _bfd_elf_gc_mark_hook (sec, info, rel, h, sym);
25dbc73a 5160}
49c09209
AM
5161
5162static bfd_boolean
5163get_sym_h (struct elf_link_hash_entry **hp,
5164 Elf_Internal_Sym **symp,
5165 asection **symsecp,
5166 unsigned char **tls_maskp,
5167 Elf_Internal_Sym **locsymsp,
5168 unsigned long r_symndx,
5169 bfd *ibfd)
5170{
5171 Elf_Internal_Shdr *symtab_hdr = &elf_symtab_hdr (ibfd);
5172
5173 if (r_symndx >= symtab_hdr->sh_info)
5174 {
5175 struct elf_link_hash_entry **sym_hashes = elf_sym_hashes (ibfd);
5176 struct elf_link_hash_entry *h;
5177
5178 h = sym_hashes[r_symndx - symtab_hdr->sh_info];
5179 while (h->root.type == bfd_link_hash_indirect
5180 || h->root.type == bfd_link_hash_warning)
5181 h = (struct elf_link_hash_entry *) h->root.u.i.link;
5182
5183 if (hp != NULL)
5184 *hp = h;
5185
5186 if (symp != NULL)
5187 *symp = NULL;
5188
5189 if (symsecp != NULL)
5190 {
5191 asection *symsec = NULL;
5192 if (h->root.type == bfd_link_hash_defined
5193 || h->root.type == bfd_link_hash_defweak)
5194 symsec = h->root.u.def.section;
5195 *symsecp = symsec;
5196 }
5197
5198 if (tls_maskp != NULL)
5199 *tls_maskp = &ppc_elf_hash_entry (h)->tls_mask;
5200 }
5201 else
5202 {
5203 Elf_Internal_Sym *sym;
5204 Elf_Internal_Sym *locsyms = *locsymsp;
5205
5206 if (locsyms == NULL)
5207 {
5208 locsyms = (Elf_Internal_Sym *) symtab_hdr->contents;
5209 if (locsyms == NULL)
5210 locsyms = bfd_elf_get_elf_syms (ibfd, symtab_hdr,
5211 symtab_hdr->sh_info,
5212 0, NULL, NULL, NULL);
5213 if (locsyms == NULL)
5214 return FALSE;
5215 *locsymsp = locsyms;
5216 }
5217 sym = locsyms + r_symndx;
5218
5219 if (hp != NULL)
5220 *hp = NULL;
5221
5222 if (symp != NULL)
5223 *symp = sym;
5224
5225 if (symsecp != NULL)
5226 *symsecp = bfd_section_from_elf_index (ibfd, sym->st_shndx);
5227
5228 if (tls_maskp != NULL)
5229 {
5230 bfd_signed_vma *local_got;
5231 unsigned char *tls_mask;
5232
5233 tls_mask = NULL;
5234 local_got = elf_local_got_refcounts (ibfd);
5235 if (local_got != NULL)
5236 {
5237 struct plt_entry **local_plt = (struct plt_entry **)
5238 (local_got + symtab_hdr->sh_info);
5239 unsigned char *lgot_masks = (unsigned char *)
5240 (local_plt + symtab_hdr->sh_info);
5241 tls_mask = &lgot_masks[r_symndx];
5242 }
5243 *tls_maskp = tls_mask;
5244 }
5245 }
5246 return TRUE;
5247}
25dbc73a 5248\f
3e04d765
AM
5249/* Analyze inline PLT call relocations to see whether calls to locally
5250 defined functions can be converted to direct calls. */
5251
5252bfd_boolean
5253ppc_elf_inline_plt (struct bfd_link_info *info)
5254{
5255 struct ppc_elf_link_hash_table *htab;
5256 bfd *ibfd;
5257 asection *sec;
5258 bfd_vma low_vma, high_vma, limit;
5259
5260 htab = ppc_elf_hash_table (info);
5261 if (htab == NULL)
5262 return FALSE;
5263
5264 /* A bl insn can reach -0x2000000 to 0x1fffffc. The limit is
5265 reduced somewhat to cater for possible stubs that might be added
5266 between the call and its destination. */
5267 limit = 0x1e00000;
5268 low_vma = -1;
5269 high_vma = 0;
5270 for (sec = info->output_bfd->sections; sec != NULL; sec = sec->next)
5271 if ((sec->flags & (SEC_ALLOC | SEC_CODE)) == (SEC_ALLOC | SEC_CODE))
5272 {
5273 if (low_vma > sec->vma)
5274 low_vma = sec->vma;
5275 if (high_vma < sec->vma + sec->size)
5276 high_vma = sec->vma + sec->size;
5277 }
5278
5279 /* If a "bl" can reach anywhere in local code sections, then we can
5280 convert all inline PLT sequences to direct calls when the symbol
5281 is local. */
5282 if (high_vma - low_vma < limit)
5283 {
5284 htab->can_convert_all_inline_plt = 1;
5285 return TRUE;
5286 }
5287
5288 /* Otherwise, go looking through relocs for cases where a direct
5289 call won't reach. Mark the symbol on any such reloc to disable
5290 the optimization and keep the PLT entry as it seems likely that
5291 this will be better than creating trampolines. Note that this
5292 will disable the optimization for all inline PLT calls to a
5293 particular symbol, not just those that won't reach. The
5294 difficulty in doing a more precise optimization is that the
5295 linker needs to make a decision depending on whether a
5296 particular R_PPC_PLTCALL insn can be turned into a direct
5297 call, for each of the R_PPC_PLTSEQ and R_PPC_PLT16* insns in
5298 the sequence, and there is nothing that ties those relocs
5299 together except their symbol. */
5300
5301 for (ibfd = info->input_bfds; ibfd != NULL; ibfd = ibfd->link.next)
5302 {
5303 Elf_Internal_Shdr *symtab_hdr;
5304 Elf_Internal_Sym *local_syms;
5305
5306 if (!is_ppc_elf (ibfd))
5307 continue;
5308
5309 local_syms = NULL;
5310 symtab_hdr = &elf_symtab_hdr (ibfd);
5311
5312 for (sec = ibfd->sections; sec != NULL; sec = sec->next)
5313 if (sec->has_pltcall
5314 && !bfd_is_abs_section (sec->output_section))
5315 {
5316 Elf_Internal_Rela *relstart, *rel, *relend;
5317
5318 /* Read the relocations. */
5319 relstart = _bfd_elf_link_read_relocs (ibfd, sec, NULL, NULL,
5320 info->keep_memory);
5321 if (relstart == NULL)
5322 return FALSE;
5323
5324 relend = relstart + sec->reloc_count;
5325 for (rel = relstart; rel < relend; )
5326 {
5327 enum elf_ppc_reloc_type r_type;
5328 unsigned long r_symndx;
5329 asection *sym_sec;
5330 struct elf_link_hash_entry *h;
5331 Elf_Internal_Sym *sym;
5332 unsigned char *tls_maskp;
5333
5334 r_type = ELF32_R_TYPE (rel->r_info);
5335 if (r_type != R_PPC_PLTCALL)
5336 continue;
5337
5338 r_symndx = ELF32_R_SYM (rel->r_info);
5339 if (!get_sym_h (&h, &sym, &sym_sec, &tls_maskp, &local_syms,
5340 r_symndx, ibfd))
5341 {
5342 if (elf_section_data (sec)->relocs != relstart)
5343 free (relstart);
5344 if (local_syms != NULL
5345 && symtab_hdr->contents != (unsigned char *) local_syms)
5346 free (local_syms);
5347 return FALSE;
5348 }
5349
5350 if (sym_sec != NULL && sym_sec->output_section != NULL)
5351 {
5352 bfd_vma from, to;
5353 if (h != NULL)
5354 to = h->root.u.def.value;
5355 else
5356 to = sym->st_value;
5357 to += (rel->r_addend
5358 + sym_sec->output_offset
5359 + sym_sec->output_section->vma);
5360 from = (rel->r_offset
5361 + sec->output_offset
5362 + sec->output_section->vma);
5363 if (to - from + limit < 2 * limit)
5364 *tls_maskp &= ~PLT_KEEP;
5365 }
5366 }
5367 if (elf_section_data (sec)->relocs != relstart)
5368 free (relstart);
5369 }
5370
5371 if (local_syms != NULL
5372 && symtab_hdr->contents != (unsigned char *) local_syms)
5373 {
5374 if (!info->keep_memory)
5375 free (local_syms);
5376 else
5377 symtab_hdr->contents = (unsigned char *) local_syms;
5378 }
5379 }
5380
5381 return TRUE;
5382}
5383
3a71aa26
AM
5384/* Set plt output section type, htab->tls_get_addr, and call the
5385 generic ELF tls_setup function. */
7fce784e 5386
25dbc73a 5387asection *
5446cbdf 5388ppc_elf_tls_setup (bfd *obfd, struct bfd_link_info *info)
7fce784e 5389{
25dbc73a 5390 struct ppc_elf_link_hash_table *htab;
7fce784e 5391
25dbc73a 5392 htab = ppc_elf_hash_table (info);
a7f2871e
AM
5393 htab->tls_get_addr = elf_link_hash_lookup (&htab->elf, "__tls_get_addr",
5394 FALSE, FALSE, TRUE);
f01f1741
AM
5395 if (htab->plt_type != PLT_NEW)
5396 htab->params->no_tls_get_addr_opt = TRUE;
5397
5446cbdf 5398 if (!htab->params->no_tls_get_addr_opt)
a7f2871e
AM
5399 {
5400 struct elf_link_hash_entry *opt, *tga;
5401 opt = elf_link_hash_lookup (&htab->elf, "__tls_get_addr_opt",
5402 FALSE, FALSE, TRUE);
5403 if (opt != NULL
5404 && (opt->root.type == bfd_link_hash_defined
5405 || opt->root.type == bfd_link_hash_defweak))
5406 {
5407 /* If glibc supports an optimized __tls_get_addr call stub,
5408 signalled by the presence of __tls_get_addr_opt, and we'll
5409 be calling __tls_get_addr via a plt call stub, then
5410 make __tls_get_addr point to __tls_get_addr_opt. */
5411 tga = htab->tls_get_addr;
5412 if (htab->elf.dynamic_sections_created
5413 && tga != NULL
5414 && (tga->type == STT_FUNC
5415 || tga->needs_plt)
5416 && !(SYMBOL_CALLS_LOCAL (info, tga)
21d68fcd 5417 || UNDEFWEAK_NO_DYNAMIC_RELOC (info, tga)))
a7f2871e
AM
5418 {
5419 struct plt_entry *ent;
32af9f6e
AM
5420 for (ent = tga->plt.plist; ent != NULL; ent = ent->next)
5421 if (ent->plt.refcount > 0)
5422 break;
5423 if (ent != NULL)
a7f2871e
AM
5424 {
5425 tga->root.type = bfd_link_hash_indirect;
5426 tga->root.u.i.link = &opt->root;
5427 ppc_elf_copy_indirect_symbol (info, opt, tga);
b531344c 5428 opt->mark = 1;
a7f2871e
AM
5429 if (opt->dynindx != -1)
5430 {
5431 /* Use __tls_get_addr_opt in dynamic relocations. */
5432 opt->dynindx = -1;
5433 _bfd_elf_strtab_delref (elf_hash_table (info)->dynstr,
5434 opt->dynstr_index);
5435 if (!bfd_elf_link_record_dynamic_symbol (info, opt))
5436 return FALSE;
5437 }
5438 htab->tls_get_addr = opt;
5439 }
5440 }
5441 }
5442 else
5446cbdf 5443 htab->params->no_tls_get_addr_opt = TRUE;
a7f2871e 5444 }
4a3dc543 5445 if (htab->plt_type == PLT_NEW
ce558b89
AM
5446 && htab->elf.splt != NULL
5447 && htab->elf.splt->output_section != NULL)
d7128ce4 5448 {
ce558b89
AM
5449 elf_section_type (htab->elf.splt->output_section) = SHT_PROGBITS;
5450 elf_section_flags (htab->elf.splt->output_section) = SHF_ALLOC + SHF_WRITE;
d7128ce4
AM
5451 }
5452
25dbc73a 5453 return _bfd_elf_tls_setup (obfd, info);
7fce784e
AS
5454}
5455
3a71aa26
AM
5456/* Return TRUE iff REL is a branch reloc with a global symbol matching
5457 HASH. */
5458
5459static bfd_boolean
5460branch_reloc_hash_match (const bfd *ibfd,
5461 const Elf_Internal_Rela *rel,
5462 const struct elf_link_hash_entry *hash)
5463{
5464 Elf_Internal_Shdr *symtab_hdr = &elf_symtab_hdr (ibfd);
5465 enum elf_ppc_reloc_type r_type = ELF32_R_TYPE (rel->r_info);
5466 unsigned int r_symndx = ELF32_R_SYM (rel->r_info);
5467
e054468f 5468 if (r_symndx >= symtab_hdr->sh_info && is_branch_reloc (r_type))
3a71aa26
AM
5469 {
5470 struct elf_link_hash_entry **sym_hashes = elf_sym_hashes (ibfd);
5471 struct elf_link_hash_entry *h;
5472
5473 h = sym_hashes[r_symndx - symtab_hdr->sh_info];
5474 while (h->root.type == bfd_link_hash_indirect
5475 || h->root.type == bfd_link_hash_warning)
5476 h = (struct elf_link_hash_entry *) h->root.u.i.link;
5477 if (h == hash)
5478 return TRUE;
5479 }
5480 return FALSE;
5481}
5482
25dbc73a
AM
5483/* Run through all the TLS relocs looking for optimization
5484 opportunities. */
252b5132 5485
25dbc73a
AM
5486bfd_boolean
5487ppc_elf_tls_optimize (bfd *obfd ATTRIBUTE_UNUSED,
5488 struct bfd_link_info *info)
252b5132 5489{
7fce784e 5490 bfd *ibfd;
25dbc73a
AM
5491 asection *sec;
5492 struct ppc_elf_link_hash_table *htab;
b7fcf6f6 5493 int pass;
252b5132 5494
3cbc1e5e 5495 if (!bfd_link_executable (info))
25dbc73a 5496 return TRUE;
252b5132 5497
7619e7c7 5498 htab = ppc_elf_hash_table (info);
663a1470
AM
5499 if (htab == NULL)
5500 return FALSE;
5501
b7fcf6f6
AM
5502 /* Make two passes through the relocs. First time check that tls
5503 relocs involved in setting up a tls_get_addr call are indeed
663a1470
AM
5504 followed by such a call. If they are not, don't do any tls
5505 optimization. On the second pass twiddle tls_mask flags to
5506 notify relocate_section that optimization can be done, and
5507 adjust got and plt refcounts. */
b7fcf6f6 5508 for (pass = 0; pass < 2; ++pass)
c72f2fb2 5509 for (ibfd = info->input_bfds; ibfd != NULL; ibfd = ibfd->link.next)
b7fcf6f6 5510 {
0ffa91dd 5511 Elf_Internal_Shdr *symtab_hdr = &elf_symtab_hdr (ibfd);
32af9f6e 5512 asection *got2 = bfd_get_section_by_name (ibfd, ".got2");
7619e7c7 5513
b7fcf6f6
AM
5514 for (sec = ibfd->sections; sec != NULL; sec = sec->next)
5515 if (sec->has_tls_reloc && !bfd_is_abs_section (sec->output_section))
5516 {
5517 Elf_Internal_Rela *relstart, *rel, *relend;
663a1470 5518 int expecting_tls_get_addr = 0;
252b5132 5519
b7fcf6f6
AM
5520 /* Read the relocations. */
5521 relstart = _bfd_elf_link_read_relocs (ibfd, sec, NULL, NULL,
5522 info->keep_memory);
5523 if (relstart == NULL)
5524 return FALSE;
7619e7c7 5525
b7fcf6f6
AM
5526 relend = relstart + sec->reloc_count;
5527 for (rel = relstart; rel < relend; rel++)
5528 {
5529 enum elf_ppc_reloc_type r_type;
5530 unsigned long r_symndx;
5531 struct elf_link_hash_entry *h = NULL;
bac3c8c5 5532 unsigned char *tls_mask;
37da22e5 5533 unsigned char tls_set, tls_clear;
b7fcf6f6 5534 bfd_boolean is_local;
b7fcf6f6
AM
5535 bfd_signed_vma *got_count;
5536
5537 r_symndx = ELF32_R_SYM (rel->r_info);
5538 if (r_symndx >= symtab_hdr->sh_info)
5539 {
5540 struct elf_link_hash_entry **sym_hashes;
7fce784e 5541
b7fcf6f6
AM
5542 sym_hashes = elf_sym_hashes (ibfd);
5543 h = sym_hashes[r_symndx - symtab_hdr->sh_info];
5544 while (h->root.type == bfd_link_hash_indirect
5545 || h->root.type == bfd_link_hash_warning)
5546 h = (struct elf_link_hash_entry *) h->root.u.i.link;
5547 }
7619e7c7 5548
b7fcf6f6
AM
5549 is_local = FALSE;
5550 if (h == NULL
5551 || !h->def_dynamic)
5552 is_local = TRUE;
7619e7c7 5553
b7fcf6f6 5554 r_type = ELF32_R_TYPE (rel->r_info);
663a1470
AM
5555 /* If this section has old-style __tls_get_addr calls
5556 without marker relocs, then check that each
5557 __tls_get_addr call reloc is preceded by a reloc
5558 that conceivably belongs to the __tls_get_addr arg
5559 setup insn. If we don't find matching arg setup
5560 relocs, don't do any tls optimization. */
5561 if (pass == 0
5562 && sec->has_tls_get_addr_call
5563 && h != NULL
5564 && h == htab->tls_get_addr
5565 && !expecting_tls_get_addr
5566 && is_branch_reloc (r_type))
5567 {
25f53a85 5568 info->callbacks->minfo ("%H __tls_get_addr lost arg, "
663a1470
AM
5569 "TLS optimization disabled\n",
5570 ibfd, sec, rel->r_offset);
5571 if (elf_section_data (sec)->relocs != relstart)
5572 free (relstart);
5573 return TRUE;
5574 }
5575
5576 expecting_tls_get_addr = 0;
b7fcf6f6
AM
5577 switch (r_type)
5578 {
5579 case R_PPC_GOT_TLSLD16:
5580 case R_PPC_GOT_TLSLD16_LO:
5581 expecting_tls_get_addr = 1;
1a0670f3 5582 /* Fall through. */
b7fcf6f6
AM
5583
5584 case R_PPC_GOT_TLSLD16_HI:
5585 case R_PPC_GOT_TLSLD16_HA:
5586 /* These relocs should never be against a symbol
5587 defined in a shared lib. Leave them alone if
5588 that turns out to be the case. */
5589 if (!is_local)
5590 continue;
5591
5592 /* LD -> LE */
5593 tls_set = 0;
5594 tls_clear = TLS_LD;
5595 break;
5596
5597 case R_PPC_GOT_TLSGD16:
5598 case R_PPC_GOT_TLSGD16_LO:
5599 expecting_tls_get_addr = 1;
1a0670f3 5600 /* Fall through. */
b7fcf6f6
AM
5601
5602 case R_PPC_GOT_TLSGD16_HI:
5603 case R_PPC_GOT_TLSGD16_HA:
5604 if (is_local)
5605 /* GD -> LE */
5606 tls_set = 0;
5607 else
5608 /* GD -> IE */
5609 tls_set = TLS_TLS | TLS_TPRELGD;
5610 tls_clear = TLS_GD;
5611 break;
5612
5613 case R_PPC_GOT_TPREL16:
5614 case R_PPC_GOT_TPREL16_LO:
5615 case R_PPC_GOT_TPREL16_HI:
5616 case R_PPC_GOT_TPREL16_HA:
5617 if (is_local)
5618 {
5619 /* IE -> LE */
5620 tls_set = 0;
5621 tls_clear = TLS_TPREL;
5622 break;
5623 }
5624 else
5625 continue;
5626
32af9f6e
AM
5627 case R_PPC_TLSGD:
5628 case R_PPC_TLSLD:
23cedd1d
AM
5629 if (rel + 1 < relend
5630 && is_plt_seq_reloc (ELF32_R_TYPE (rel[1].r_info)))
5631 {
5632 if (pass != 0
5633 && ELF32_R_TYPE (rel[1].r_info) != R_PPC_PLTSEQ)
5634 {
5635 r_type = ELF32_R_TYPE (rel[1].r_info);
5636 r_symndx = ELF32_R_SYM (rel[1].r_info);
5637 if (r_symndx >= symtab_hdr->sh_info)
5638 {
5639 struct elf_link_hash_entry **sym_hashes;
5640
5641 sym_hashes = elf_sym_hashes (ibfd);
5642 h = sym_hashes[r_symndx - symtab_hdr->sh_info];
5643 while (h->root.type == bfd_link_hash_indirect
5644 || h->root.type == bfd_link_hash_warning)
5645 h = (struct elf_link_hash_entry *) h->root.u.i.link;
5646 if (h != NULL)
5647 {
5648 struct plt_entry *ent = NULL;
5649 bfd_vma addend = 0;
5650
5651 if (bfd_link_pic (info))
5652 addend = rel->r_addend;
5653 ent = find_plt_ent (&h->plt.plist,
5654 got2, addend);
5655 if (ent != NULL
5656 && ent->plt.refcount > 0)
5657 ent->plt.refcount -= 1;
5658 }
5659 }
5660 }
5661 continue;
5662 }
32af9f6e
AM
5663 expecting_tls_get_addr = 2;
5664 tls_set = 0;
5665 tls_clear = 0;
5666 break;
5667
b7fcf6f6 5668 default:
25dbc73a 5669 continue;
b7fcf6f6 5670 }
25dbc73a 5671
b7fcf6f6
AM
5672 if (pass == 0)
5673 {
727fc41e 5674 if (!expecting_tls_get_addr
23cedd1d 5675 || !sec->has_tls_get_addr_call)
b7fcf6f6 5676 continue;
25dbc73a 5677
3a71aa26
AM
5678 if (rel + 1 < relend
5679 && branch_reloc_hash_match (ibfd, rel + 1,
5680 htab->tls_get_addr))
5681 continue;
25dbc73a 5682
b7fcf6f6
AM
5683 /* Uh oh, we didn't find the expected call. We
5684 could just mark this symbol to exclude it
5685 from tls optimization but it's safer to skip
663a1470 5686 the entire optimization. */
25f53a85 5687 info->callbacks->minfo (_("%H arg lost __tls_get_addr, "
663a1470
AM
5688 "TLS optimization disabled\n"),
5689 ibfd, sec, rel->r_offset);
5690 if (elf_section_data (sec)->relocs != relstart)
5691 free (relstart);
5692 return TRUE;
b7fcf6f6 5693 }
25dbc73a 5694
b7fcf6f6
AM
5695 if (h != NULL)
5696 {
5697 tls_mask = &ppc_elf_hash_entry (h)->tls_mask;
5698 got_count = &h->got.refcount;
5699 }
5700 else
5701 {
b7fcf6f6 5702 bfd_signed_vma *lgot_refs;
e054468f 5703 struct plt_entry **local_plt;
bac3c8c5 5704 unsigned char *lgot_masks;
25dbc73a 5705
b7fcf6f6
AM
5706 lgot_refs = elf_local_got_refcounts (ibfd);
5707 if (lgot_refs == NULL)
5708 abort ();
e054468f
AM
5709 local_plt = (struct plt_entry **)
5710 (lgot_refs + symtab_hdr->sh_info);
bac3c8c5
AM
5711 lgot_masks = (unsigned char *)
5712 (local_plt + symtab_hdr->sh_info);
b7fcf6f6
AM
5713 tls_mask = &lgot_masks[r_symndx];
5714 got_count = &lgot_refs[r_symndx];
5715 }
25dbc73a 5716
37da22e5
AM
5717 /* If we don't have old-style __tls_get_addr calls
5718 without TLSGD/TLSLD marker relocs, and we haven't
5719 found a new-style __tls_get_addr call with a
5720 marker for this symbol, then we either have a
5721 broken object file or an -mlongcall style
5722 indirect call to __tls_get_addr without a marker.
5723 Disable optimization in this case. */
5724 if ((tls_clear & (TLS_GD | TLS_LD)) != 0
5725 && !sec->has_tls_get_addr_call
5726 && ((*tls_mask & (TLS_TLS | TLS_MARK))
5727 != (TLS_TLS | TLS_MARK)))
5728 continue;
5729
5730 if (expecting_tls_get_addr)
5731 {
5732 struct plt_entry *ent;
5733 bfd_vma addend = 0;
5734
5735 if (bfd_link_pic (info)
23cedd1d
AM
5736 && (ELF32_R_TYPE (rel[1].r_info) == R_PPC_PLTREL24
5737 || ELF32_R_TYPE (rel[1].r_info) == R_PPC_PLTCALL))
37da22e5
AM
5738 addend = rel[1].r_addend;
5739 ent = find_plt_ent (&htab->tls_get_addr->plt.plist,
5740 got2, addend);
5741 if (ent != NULL && ent->plt.refcount > 0)
5742 ent->plt.refcount -= 1;
5743
5744 if (expecting_tls_get_addr == 2)
5745 continue;
5746 }
5747
b7fcf6f6
AM
5748 if (tls_set == 0)
5749 {
5750 /* We managed to get rid of a got entry. */
5751 if (*got_count > 0)
5752 *got_count -= 1;
5753 }
25dbc73a 5754
b7fcf6f6
AM
5755 *tls_mask |= tls_set;
5756 *tls_mask &= ~tls_clear;
5757 }
25dbc73a 5758
b7fcf6f6
AM
5759 if (elf_section_data (sec)->relocs != relstart)
5760 free (relstart);
5761 }
b7fcf6f6 5762 }
9a23f96e 5763 htab->do_tls_opt = 1;
25dbc73a
AM
5764 return TRUE;
5765}
5766\f
98bbb1b8 5767/* Find dynamic relocs for H that apply to read-only sections. */
625af618 5768
98bbb1b8
AM
5769static asection *
5770readonly_dynrelocs (struct elf_link_hash_entry *h)
625af618 5771{
6061a67d 5772 struct elf_dyn_relocs *p;
625af618
AM
5773
5774 for (p = ppc_elf_hash_entry (h)->dyn_relocs; p != NULL; p = p->next)
5775 {
5776 asection *s = p->sec->output_section;
5777
98bbb1b8
AM
5778 if (s != NULL && (s->flags & SEC_READONLY) != 0)
5779 return p->sec;
625af618 5780 }
98bbb1b8 5781 return NULL;
625af618
AM
5782}
5783
287c7eaf
AM
5784/* Return true if we have dynamic relocs against H or any of its weak
5785 aliases, that apply to read-only sections. Cannot be used after
5786 size_dynamic_sections. */
5787
5788static bfd_boolean
5789alias_readonly_dynrelocs (struct elf_link_hash_entry *h)
5790{
5791 struct ppc_elf_link_hash_entry *eh = ppc_elf_hash_entry (h);
5792 do
5793 {
5794 if (readonly_dynrelocs (&eh->elf))
5795 return TRUE;
5796 eh = ppc_elf_hash_entry (eh->elf.u.alias);
5797 } while (eh != NULL && &eh->elf != h);
5798
5799 return FALSE;
5800}
5801
5802/* Return whether H has pc-relative dynamic relocs. */
5803
5804static bfd_boolean
5805pc_dynrelocs (struct elf_link_hash_entry *h)
5806{
5807 struct elf_dyn_relocs *p;
5808
5809 for (p = ppc_elf_hash_entry (h)->dyn_relocs; p != NULL; p = p->next)
5810 if (p->pc_count != 0)
5811 return TRUE;
5812 return FALSE;
5813}
5814
25dbc73a
AM
5815/* Adjust a symbol defined by a dynamic object and referenced by a
5816 regular object. The current definition is in some section of the
5817 dynamic object, but we're not including those sections. We have to
5818 change the definition to something the rest of the link can
5819 understand. */
7fce784e 5820
25dbc73a
AM
5821static bfd_boolean
5822ppc_elf_adjust_dynamic_symbol (struct bfd_link_info *info,
5823 struct elf_link_hash_entry *h)
5824{
5825 struct ppc_elf_link_hash_table *htab;
5826 asection *s;
7fce784e 5827
25dbc73a
AM
5828#ifdef DEBUG
5829 fprintf (stderr, "ppc_elf_adjust_dynamic_symbol called for %s\n",
5830 h->root.root.string);
5831#endif
252b5132 5832
25dbc73a
AM
5833 /* Make sure we know what is going on here. */
5834 htab = ppc_elf_hash_table (info);
5835 BFD_ASSERT (htab->elf.dynobj != NULL
5836 && (h->needs_plt
91e21fb7 5837 || h->type == STT_GNU_IFUNC
60d67dc8 5838 || h->is_weakalias
25dbc73a
AM
5839 || (h->def_dynamic
5840 && h->ref_regular
5841 && !h->def_regular)));
252b5132 5842
25dbc73a
AM
5843 /* Deal with function syms. */
5844 if (h->type == STT_FUNC
e054468f 5845 || h->type == STT_GNU_IFUNC
25dbc73a
AM
5846 || h->needs_plt)
5847 {
529fe20e
AM
5848 bfd_boolean local = (SYMBOL_CALLS_LOCAL (info, h)
5849 || UNDEFWEAK_NO_DYNAMIC_RELOC (info, h));
287c7eaf
AM
5850 /* Discard dyn_relocs when non-pic if we've decided that a
5851 function symbol is local. */
5852 if (!bfd_link_pic (info) && local)
5853 ppc_elf_hash_entry (h)->dyn_relocs = NULL;
529fe20e 5854
25dbc73a
AM
5855 /* Clear procedure linkage table information for any symbol that
5856 won't need a .plt entry. */
a6aa5195
AM
5857 struct plt_entry *ent;
5858 for (ent = h->plt.plist; ent != NULL; ent = ent->next)
5859 if (ent->plt.refcount > 0)
5860 break;
5861 if (ent == NULL
2d7ad24e
AM
5862 || (h->type != STT_GNU_IFUNC
5863 && local
3e04d765
AM
5864 && (htab->can_convert_all_inline_plt
5865 || (ppc_elf_hash_entry (h)->tls_mask
5866 & (TLS_TLS | PLT_KEEP)) != PLT_KEEP)))
252b5132 5867 {
25dbc73a 5868 /* A PLT entry is not required/allowed when:
252b5132 5869
25dbc73a
AM
5870 1. We are not using ld.so; because then the PLT entry
5871 can't be set up, so we can't use one. In this case,
5872 ppc_elf_adjust_dynamic_symbol won't even be called.
252b5132 5873
25dbc73a
AM
5874 2. GC has rendered the entry unused.
5875
5876 3. We know for certain that a call to this symbol
5877 will go to this object, or will remain undefined. */
a6aa5195 5878 h->plt.plist = NULL;
25dbc73a 5879 h->needs_plt = 0;
d1eca1e4 5880 h->pointer_equality_needed = 0;
25dbc73a 5881 }
625af618
AM
5882 else
5883 {
d1eca1e4
AM
5884 /* Taking a function's address in a read/write section
5885 doesn't require us to define the function symbol in the
1009ef28 5886 executable on a plt call stub. A dynamic reloc can
f0158f44
AM
5887 be used instead, giving better runtime performance.
5888 (Calls via that function pointer don't need to bounce
5889 through the plt call stub.) Similarly, use a dynamic
5890 reloc for a weak reference when possible, allowing the
5891 resolution of the symbol to be set at load time rather
5892 than link time. */
5893 if ((h->pointer_equality_needed
3988aed5
AM
5894 || (h->non_got_ref
5895 && !h->ref_regular_nonweak
5896 && !UNDEFWEAK_NO_DYNAMIC_RELOC (info, h)))
1009ef28
AM
5897 && !htab->is_vxworks
5898 && !ppc_elf_hash_entry (h)->has_sda_refs
98bbb1b8 5899 && !readonly_dynrelocs (h))
d1eca1e4
AM
5900 {
5901 h->pointer_equality_needed = 0;
04383fd1
AM
5902 /* If we haven't seen a branch reloc and the symbol
5903 isn't an ifunc then we don't need a plt entry. */
5904 if (!h->needs_plt && h->type != STT_GNU_IFUNC)
3988aed5 5905 h->plt.plist = NULL;
d1eca1e4 5906 }
287c7eaf 5907 else if (!bfd_link_pic (info))
529fe20e
AM
5908 /* We are going to be defining the function symbol on the
5909 plt stub, so no dyn_relocs needed when non-pic. */
287c7eaf 5910 ppc_elf_hash_entry (h)->dyn_relocs = NULL;
625af618 5911 }
d3e454b9 5912 h->protected_def = 0;
3988aed5 5913 /* Function symbols can't have copy relocs. */
25dbc73a 5914 return TRUE;
252b5132 5915 }
25dbc73a 5916 else
a6aa5195 5917 h->plt.plist = NULL;
252b5132 5918
25dbc73a
AM
5919 /* If this is a weak symbol, and there is a real definition, the
5920 processor independent code will have arranged for us to see the
5921 real definition first, and we can just use the same value. */
60d67dc8 5922 if (h->is_weakalias)
252b5132 5923 {
60d67dc8
AM
5924 struct elf_link_hash_entry *def = weakdef (h);
5925 BFD_ASSERT (def->root.type == bfd_link_hash_defined);
5926 h->root.u.def.section = def->root.u.def.section;
5927 h->root.u.def.value = def->root.u.def.value;
4a7e5234
AM
5928 if (def->root.u.def.section == htab->elf.sdynbss
5929 || def->root.u.def.section == htab->elf.sdynrelro
5930 || def->root.u.def.section == htab->dynsbss)
5931 ppc_elf_hash_entry (h)->dyn_relocs = NULL;
25dbc73a
AM
5932 return TRUE;
5933 }
dc810e39 5934
25dbc73a
AM
5935 /* This is a reference to a symbol defined by a dynamic object which
5936 is not a function. */
252b5132 5937
25dbc73a
AM
5938 /* If we are creating a shared library, we must presume that the
5939 only references to the symbol are via the global offset table.
5940 For such cases we need not do anything here; the relocations will
5941 be handled correctly by relocate_section. */
0e1862bb 5942 if (bfd_link_pic (info))
d3e454b9
AM
5943 {
5944 h->protected_def = 0;
5945 return TRUE;
5946 }
252b5132 5947
25dbc73a
AM
5948 /* If there are no references to this symbol that do not use the
5949 GOT, we don't need to generate a copy reloc. */
5950 if (!h->non_got_ref)
d3e454b9
AM
5951 {
5952 h->protected_def = 0;
5953 return TRUE;
5954 }
5955
5956 /* Protected variables do not work with .dynbss. The copy in
5957 .dynbss won't be used by the shared library with the protected
5958 definition for the variable. Editing to PIC, or text relocations
5959 are preferable to an incorrect program. */
5960 if (h->protected_def)
5961 {
5962 if (ELIMINATE_COPY_RELOCS
5963 && ppc_elf_hash_entry (h)->has_addr16_ha
5964 && ppc_elf_hash_entry (h)->has_addr16_lo
5965 && htab->params->pic_fixup == 0
5966 && info->disable_target_specific_optimizations <= 1)
5967 htab->params->pic_fixup = 1;
d3e454b9
AM
5968 return TRUE;
5969 }
25dbc73a 5970
a127494f
AM
5971 /* If -z nocopyreloc was given, we won't generate them either. */
5972 if (info->nocopyreloc)
529fe20e 5973 return TRUE;
a127494f 5974
dce2246a 5975 /* If we don't find any dynamic relocs in read-only sections, then
cfd2c773
NS
5976 we'll be keeping the dynamic relocs and avoiding the copy reloc.
5977 We can't do this if there are any small data relocations. This
5978 doesn't work on VxWorks, where we can not have dynamic
5979 relocations (other than copy and jump slot relocations) in an
5980 executable. */
4dc4a9a5 5981 if (ELIMINATE_COPY_RELOCS
cfd2c773 5982 && !ppc_elf_hash_entry (h)->has_sda_refs
625af618
AM
5983 && !htab->is_vxworks
5984 && !h->def_regular
287c7eaf 5985 && !alias_readonly_dynrelocs (h))
529fe20e 5986 return TRUE;
252b5132 5987
25dbc73a
AM
5988 /* We must allocate the symbol in our .dynbss section, which will
5989 become part of the .bss section of the executable. There will be
5990 an entry for this symbol in the .dynsym section. The dynamic
5991 object will contain position independent code, so all references
5992 from the dynamic object to this symbol will go through the global
5993 offset table. The dynamic linker will use the .dynsym entry to
5994 determine the address it must put in the global offset table, so
5995 both the dynamic object and the regular object will refer to the
5996 same memory location for the variable.
5997
4dc4a9a5
DJ
5998 Of course, if the symbol is referenced using SDAREL relocs, we
5999 must instead allocate it in .sbss. */
4dc4a9a5 6000 if (ppc_elf_hash_entry (h)->has_sda_refs)
25dbc73a 6001 s = htab->dynsbss;
5474d94f
AM
6002 else if ((h->root.u.def.section->flags & SEC_READONLY) != 0)
6003 s = htab->elf.sdynrelro;
25dbc73a 6004 else
9d19e4fd 6005 s = htab->elf.sdynbss;
25dbc73a
AM
6006 BFD_ASSERT (s != NULL);
6007
1d7e9d18 6008 if ((h->root.u.def.section->flags & SEC_ALLOC) != 0 && h->size != 0)
25dbc73a
AM
6009 {
6010 asection *srel;
6011
4a7e5234
AM
6012 /* We must generate a R_PPC_COPY reloc to tell the dynamic
6013 linker to copy the initial value out of the dynamic object
6014 and into the runtime process image. */
4dc4a9a5 6015 if (ppc_elf_hash_entry (h)->has_sda_refs)
25dbc73a 6016 srel = htab->relsbss;
5474d94f
AM
6017 else if ((h->root.u.def.section->flags & SEC_READONLY) != 0)
6018 srel = htab->elf.sreldynrelro;
25dbc73a 6019 else
9d19e4fd 6020 srel = htab->elf.srelbss;
25dbc73a
AM
6021 BFD_ASSERT (srel != NULL);
6022 srel->size += sizeof (Elf32_External_Rela);
6023 h->needs_copy = 1;
6024 }
7619e7c7 6025
529fe20e 6026 /* We no longer want dyn_relocs. */
287c7eaf 6027 ppc_elf_hash_entry (h)->dyn_relocs = NULL;
6cabe1ea 6028 return _bfd_elf_adjust_dynamic_copy (info, h, s);
25dbc73a
AM
6029}
6030\f
ac39eb42
AM
6031/* Generate a symbol to mark plt call stubs. For non-PIC code the sym is
6032 xxxxxxxx.plt_call32.<callee> where xxxxxxxx is a hex number, usually 0,
6033 specifying the addend on the plt relocation. For -fpic code, the sym
6034 is xxxxxxxx.plt_pic32.<callee>, and for -fPIC
6035 xxxxxxxx.got2.plt_pic32.<callee>. */
0ba07910
AM
6036
6037static bfd_boolean
6038add_stub_sym (struct plt_entry *ent,
6039 struct elf_link_hash_entry *h,
ac39eb42 6040 struct bfd_link_info *info)
0ba07910
AM
6041{
6042 struct elf_link_hash_entry *sh;
6043 size_t len1, len2, len3;
6044 char *name;
ac39eb42
AM
6045 const char *stub;
6046 struct ppc_elf_link_hash_table *htab = ppc_elf_hash_table (info);
6047
0e1862bb 6048 if (bfd_link_pic (info))
ac39eb42
AM
6049 stub = ".plt_pic32.";
6050 else
6051 stub = ".plt_call32.";
0ba07910
AM
6052
6053 len1 = strlen (h->root.root.string);
ac39eb42 6054 len2 = strlen (stub);
0ba07910
AM
6055 len3 = 0;
6056 if (ent->sec)
6057 len3 = strlen (ent->sec->name);
ac39eb42 6058 name = bfd_malloc (len1 + len2 + len3 + 9);
0ba07910
AM
6059 if (name == NULL)
6060 return FALSE;
6061 sprintf (name, "%08x", (unsigned) ent->addend & 0xffffffff);
6062 if (ent->sec)
6063 memcpy (name + 8, ent->sec->name, len3);
ac39eb42
AM
6064 memcpy (name + 8 + len3, stub, len2);
6065 memcpy (name + 8 + len3 + len2, h->root.root.string, len1 + 1);
0ba07910
AM
6066 sh = elf_link_hash_lookup (&htab->elf, name, TRUE, FALSE, FALSE);
6067 if (sh == NULL)
6068 return FALSE;
6069 if (sh->root.type == bfd_link_hash_new)
6070 {
6071 sh->root.type = bfd_link_hash_defined;
6072 sh->root.u.def.section = htab->glink;
6073 sh->root.u.def.value = ent->glink_offset;
6074 sh->ref_regular = 1;
6075 sh->def_regular = 1;
6076 sh->ref_regular_nonweak = 1;
6077 sh->forced_local = 1;
6078 sh->non_elf = 0;
2ec55de3 6079 sh->root.linker_def = 1;
0ba07910
AM
6080 }
6081 return TRUE;
6082}
6083
3b36f7e6
AM
6084/* Allocate NEED contiguous space in .got, and return the offset.
6085 Handles allocation of the got header when crossing 32k. */
6086
6087static bfd_vma
6088allocate_got (struct ppc_elf_link_hash_table *htab, unsigned int need)
6089{
6090 bfd_vma where;
4a3dc543 6091 unsigned int max_before_header;
3b36f7e6 6092
4a3dc543 6093 if (htab->plt_type == PLT_VXWORKS)
9d8504b1 6094 {
ce558b89
AM
6095 where = htab->elf.sgot->size;
6096 htab->elf.sgot->size += need;
9d8504b1 6097 }
3b36f7e6
AM
6098 else
6099 {
4a3dc543
RS
6100 max_before_header = htab->plt_type == PLT_NEW ? 32768 : 32764;
6101 if (need <= htab->got_gap)
3b36f7e6 6102 {
4a3dc543
RS
6103 where = max_before_header - htab->got_gap;
6104 htab->got_gap -= need;
6105 }
6106 else
6107 {
ce558b89
AM
6108 if (htab->elf.sgot->size + need > max_before_header
6109 && htab->elf.sgot->size <= max_before_header)
4a3dc543 6110 {
ce558b89
AM
6111 htab->got_gap = max_before_header - htab->elf.sgot->size;
6112 htab->elf.sgot->size = max_before_header + htab->got_header_size;
4a3dc543 6113 }
ce558b89
AM
6114 where = htab->elf.sgot->size;
6115 htab->elf.sgot->size += need;
3b36f7e6 6116 }
3b36f7e6
AM
6117 }
6118 return where;
6119}
6120
f15d0b54
AM
6121/* Calculate size of GOT entries for symbol given its TLS_MASK.
6122 TLS_LD is excluded because those go in a special GOT slot. */
6123
6124static inline unsigned int
6125got_entries_needed (int tls_mask)
6126{
6127 unsigned int need;
6128 if ((tls_mask & TLS_TLS) == 0)
6129 need = 4;
6130 else
6131 {
6132 need = 0;
6133 if ((tls_mask & TLS_GD) != 0)
6134 need += 8;
6135 if ((tls_mask & (TLS_TPREL | TLS_TPRELGD)) != 0)
6136 need += 4;
6137 if ((tls_mask & TLS_DTPREL) != 0)
6138 need += 4;
6139 }
6140 return need;
6141}
6142
6143/* Calculate size of relocs needed for symbol given its TLS_MASK and
6144 NEEDed GOT entries. KNOWN says a TPREL offset can be calculated at
6145 link time. */
6146
6147static inline unsigned int
6148got_relocs_needed (int tls_mask, unsigned int need, bfd_boolean known)
6149{
6150 /* All the entries we allocated need relocs.
6151 Except IE in executable with a local symbol. We could also omit
6152 the DTPREL reloc on the second word of a GD entry under the same
6153 condition as that for IE, but ld.so needs to differentiate
6154 LD and GD entries. */
37da22e5
AM
6155 if (known && (tls_mask & TLS_TLS) != 0
6156 && (tls_mask & (TLS_TPREL | TLS_TPRELGD)) != 0)
f15d0b54
AM
6157 need -= 4;
6158 return need * sizeof (Elf32_External_Rela) / 4;
6159}
6160
46434633 6161/* If H is undefined, make it dynamic if that makes sense. */
f0158f44
AM
6162
6163static bfd_boolean
46434633
AM
6164ensure_undef_dynamic (struct bfd_link_info *info,
6165 struct elf_link_hash_entry *h)
f0158f44
AM
6166{
6167 struct elf_link_hash_table *htab = elf_hash_table (info);
6168
6169 if (htab->dynamic_sections_created
46434633
AM
6170 && ((info->dynamic_undefined_weak != 0
6171 && h->root.type == bfd_link_hash_undefweak)
6172 || h->root.type == bfd_link_hash_undefined)
f0158f44
AM
6173 && h->dynindx == -1
6174 && !h->forced_local
6175 && ELF_ST_VISIBILITY (h->other) == STV_DEFAULT)
6176 return bfd_elf_link_record_dynamic_symbol (info, h);
6177 return TRUE;
6178}
6179
25dbc73a 6180/* Allocate space in associated reloc sections for dynamic relocs. */
252b5132 6181
b34976b6 6182static bfd_boolean
25dbc73a 6183allocate_dynrelocs (struct elf_link_hash_entry *h, void *inf)
252b5132 6184{
25dbc73a
AM
6185 struct bfd_link_info *info = inf;
6186 struct ppc_elf_link_hash_entry *eh;
7619e7c7 6187 struct ppc_elf_link_hash_table *htab;
6061a67d 6188 struct elf_dyn_relocs *p;
f0158f44 6189 bfd_boolean dyn;
252b5132 6190
25dbc73a 6191 if (h->root.type == bfd_link_hash_indirect)
b34976b6 6192 return TRUE;
252b5132 6193
7619e7c7 6194 htab = ppc_elf_hash_table (info);
25dbc73a 6195 eh = (struct ppc_elf_link_hash_entry *) h;
d3e454b9
AM
6196 if (eh->elf.got.refcount > 0
6197 || (ELIMINATE_COPY_RELOCS
6198 && !eh->elf.def_regular
6199 && eh->elf.protected_def
6200 && eh->has_addr16_ha
6201 && eh->has_addr16_lo
6202 && htab->params->pic_fixup > 0))
25dbc73a 6203 {
d6e14abc
AM
6204 unsigned int need;
6205
46434633
AM
6206 /* Make sure this symbol is output as a dynamic symbol. */
6207 if (!ensure_undef_dynamic (info, &eh->elf))
f0158f44 6208 return FALSE;
252b5132 6209
d6e14abc 6210 need = 0;
37da22e5 6211 if ((eh->tls_mask & (TLS_TLS | TLS_LD)) == (TLS_TLS | TLS_LD))
25dbc73a 6212 {
f15d0b54
AM
6213 if (!eh->elf.def_dynamic)
6214 /* We'll just use htab->tlsld_got.offset. This should
6215 always be the case. It's a little odd if we have
6216 a local dynamic reloc against a non-local symbol. */
6217 htab->tlsld_got.refcount += 1;
6218 else
d6e14abc 6219 need += 8;
d6e14abc 6220 }
f15d0b54 6221 need += got_entries_needed (eh->tls_mask);
d6e14abc
AM
6222 if (need == 0)
6223 eh->elf.got.offset = (bfd_vma) -1;
6224 else
6225 {
3b36f7e6 6226 eh->elf.got.offset = allocate_got (htab, need);
0e1862bb 6227 if ((bfd_link_pic (info)
f0158f44
AM
6228 || (htab->elf.dynamic_sections_created
6229 && eh->elf.dynindx != -1
6230 && !SYMBOL_REFERENCES_LOCAL (info, &eh->elf)))
21d68fcd 6231 && !UNDEFWEAK_NO_DYNAMIC_RELOC (info, &eh->elf))
252b5132 6232 {
f15d0b54
AM
6233 asection *rsec;
6234 bfd_boolean tprel_known = (bfd_link_executable (info)
6235 && SYMBOL_REFERENCES_LOCAL (info,
6236 &eh->elf));
6237
6238 need = got_relocs_needed (eh->tls_mask, need, tprel_known);
37da22e5
AM
6239 if ((eh->tls_mask & (TLS_TLS | TLS_LD)) == (TLS_TLS | TLS_LD)
6240 && eh->elf.def_dynamic)
f15d0b54
AM
6241 need -= sizeof (Elf32_External_Rela);
6242 rsec = htab->elf.srelgot;
0bed072f 6243 if (eh->elf.type == STT_GNU_IFUNC)
ce558b89 6244 rsec = htab->elf.irelplt;
f15d0b54 6245 rsec->size += need;
252b5132 6246 }
25dbc73a
AM
6247 }
6248 }
6249 else
6250 eh->elf.got.offset = (bfd_vma) -1;
252b5132 6251
954b63d4
AM
6252 /* If no dynamic sections we can't have dynamic relocs, except for
6253 IFUNCs which are handled even in static executables. */
f0158f44
AM
6254 if (!htab->elf.dynamic_sections_created
6255 && h->type != STT_GNU_IFUNC)
6256 eh->dyn_relocs = NULL;
6257
529fe20e
AM
6258 /* Discard relocs on undefined symbols that must be local. */
6259 else if (h->root.type == bfd_link_hash_undefined
6260 && ELF_ST_VISIBILITY (h->other) != STV_DEFAULT)
6261 eh->dyn_relocs = NULL;
6262
6263 /* Also discard relocs on undefined weak syms with non-default
6264 visibility, or when dynamic_undefined_weak says so. */
6265 else if (UNDEFWEAK_NO_DYNAMIC_RELOC (info, h))
6266 eh->dyn_relocs = NULL;
6267
f0158f44 6268 if (eh->dyn_relocs == NULL)
287c7eaf 6269 ;
252b5132 6270
25dbc73a
AM
6271 /* In the shared -Bsymbolic case, discard space allocated for
6272 dynamic pc-relative relocs against symbols which turn out to be
6273 defined in regular objects. For the normal shared case, discard
6274 space for relocs that have become local due to symbol visibility
6275 changes. */
f0158f44 6276 else if (bfd_link_pic (info))
25dbc73a
AM
6277 {
6278 /* Relocs that use pc_count are those that appear on a call insn,
1d483afe 6279 or certain REL relocs (see must_be_dyn_reloc) that can be
25dbc73a
AM
6280 generated via assembly. We want calls to protected symbols to
6281 resolve directly to the function rather than going via the plt.
6282 If people want function pointer comparisons to work as expected
6283 then they should avoid writing weird assembly. */
529fe20e 6284 if (SYMBOL_CALLS_LOCAL (info, h))
25dbc73a 6285 {
6061a67d 6286 struct elf_dyn_relocs **pp;
25dbc73a
AM
6287
6288 for (pp = &eh->dyn_relocs; (p = *pp) != NULL; )
252b5132 6289 {
25dbc73a
AM
6290 p->count -= p->pc_count;
6291 p->pc_count = 0;
6292 if (p->count == 0)
6293 *pp = p->next;
6294 else
6295 pp = &p->next;
252b5132 6296 }
25dbc73a 6297 }
252b5132 6298
3348747a
NS
6299 if (htab->is_vxworks)
6300 {
6061a67d 6301 struct elf_dyn_relocs **pp;
3348747a
NS
6302
6303 for (pp = &eh->dyn_relocs; (p = *pp) != NULL; )
6304 {
6305 if (strcmp (p->sec->output_section->name, ".tls_vars") == 0)
6306 *pp = p->next;
6307 else
6308 pp = &p->next;
6309 }
6310 }
6311
954b63d4 6312 if (eh->dyn_relocs != NULL)
25dbc73a 6313 {
46434633
AM
6314 /* Make sure this symbol is output as a dynamic symbol. */
6315 if (!ensure_undef_dynamic (info, h))
f0158f44 6316 return FALSE;
25dbc73a
AM
6317 }
6318 }
6319 else if (ELIMINATE_COPY_RELOCS)
6320 {
f0158f44 6321 /* For the non-pic case, discard space for relocs against
25dbc73a
AM
6322 symbols which turn out to need copy relocs or are not
6323 dynamic. */
529fe20e 6324 if (h->dynamic_adjusted
d3e454b9 6325 && !h->def_regular
529fe20e 6326 && !ELF_COMMON_DEF_P (h)
d3e454b9
AM
6327 && !(h->protected_def
6328 && eh->has_addr16_ha
6329 && eh->has_addr16_lo
6330 && htab->params->pic_fixup > 0))
25dbc73a 6331 {
46434633
AM
6332 /* Make sure this symbol is output as a dynamic symbol. */
6333 if (!ensure_undef_dynamic (info, h))
f0158f44 6334 return FALSE;
7619e7c7 6335
f0158f44 6336 if (h->dynindx == -1)
287c7eaf 6337 eh->dyn_relocs = NULL;
25dbc73a 6338 }
f0158f44 6339 else
287c7eaf 6340 eh->dyn_relocs = NULL;
25dbc73a 6341 }
252b5132 6342
f0158f44 6343 /* Allocate space. */
25dbc73a
AM
6344 for (p = eh->dyn_relocs; p != NULL; p = p->next)
6345 {
6346 asection *sreloc = elf_section_data (p->sec)->sreloc;
f95f8542 6347 if (eh->elf.type == STT_GNU_IFUNC)
ce558b89 6348 sreloc = htab->elf.irelplt;
25dbc73a
AM
6349 sreloc->size += p->count * sizeof (Elf32_External_Rela);
6350 }
252b5132 6351
2d7ad24e
AM
6352 /* Handle PLT relocs. Done last, after dynindx has settled.
6353 We might need a PLT entry when the symbol
6354 a) is dynamic, or
6355 b) is an ifunc, or
6356 c) has plt16 relocs and has been processed by adjust_dynamic_symbol, or
6357 d) has plt16 relocs and we are linking statically. */
f0158f44 6358 dyn = htab->elf.dynamic_sections_created && h->dynindx != -1;
2d7ad24e
AM
6359 if (dyn
6360 || h->type == STT_GNU_IFUNC
6361 || (h->needs_plt && h->dynamic_adjusted)
6362 || (h->needs_plt
6363 && h->def_regular
6364 && !htab->elf.dynamic_sections_created
3e04d765 6365 && !htab->can_convert_all_inline_plt
2d7ad24e
AM
6366 && (ppc_elf_hash_entry (h)->tls_mask
6367 & (TLS_TLS | PLT_KEEP)) == PLT_KEEP))
f0158f44
AM
6368 {
6369 struct plt_entry *ent;
6370 bfd_boolean doneone = FALSE;
2d7ad24e 6371 bfd_vma plt_offset = 0, glink_offset = (bfd_vma) -1;
f0158f44
AM
6372
6373 for (ent = h->plt.plist; ent != NULL; ent = ent->next)
6374 if (ent->plt.refcount > 0)
6375 {
6376 asection *s = htab->elf.splt;
6377
6378 if (!dyn)
2d7ad24e
AM
6379 {
6380 if (h->type == STT_GNU_IFUNC)
6381 s = htab->elf.iplt;
6382 else
6383 s = htab->pltlocal;
6384 }
f0158f44
AM
6385
6386 if (htab->plt_type == PLT_NEW || !dyn)
6387 {
6388 if (!doneone)
6389 {
6390 plt_offset = s->size;
6391 s->size += 4;
6392 }
6393 ent->plt.offset = plt_offset;
6394
2d7ad24e
AM
6395 if (s == htab->pltlocal)
6396 ent->glink_offset = glink_offset;
6397 else
f0158f44 6398 {
2d7ad24e
AM
6399 s = htab->glink;
6400 if (!doneone || bfd_link_pic (info))
6401 {
6402 glink_offset = s->size;
6403 s->size += GLINK_ENTRY_SIZE (htab, h);
6404 }
6405 if (!doneone
6406 && !bfd_link_pic (info)
6407 && h->def_dynamic
6408 && !h->def_regular)
6409 {
6410 h->root.u.def.section = s;
6411 h->root.u.def.value = glink_offset;
6412 }
6413 ent->glink_offset = glink_offset;
f0158f44 6414
2d7ad24e
AM
6415 if (htab->params->emit_stub_syms
6416 && !add_stub_sym (ent, h, info))
6417 return FALSE;
6418 }
f0158f44
AM
6419 }
6420 else
6421 {
6422 if (!doneone)
6423 {
6424 /* If this is the first .plt entry, make room
6425 for the special first entry. */
6426 if (s->size == 0)
6427 s->size += htab->plt_initial_entry_size;
6428
6429 /* The PowerPC PLT is actually composed of two
6430 parts, the first part is 2 words (for a load
6431 and a jump), and then there is a remaining
6432 word available at the end. */
6433 plt_offset = (htab->plt_initial_entry_size
6434 + (htab->plt_slot_size
6435 * ((s->size
6436 - htab->plt_initial_entry_size)
6437 / htab->plt_entry_size)));
6438
6439 /* If this symbol is not defined in a regular
6440 file, and we are not generating a shared
6441 library, then set the symbol to this location
6442 in the .plt. This is to avoid text
6443 relocations, and is required to make
6444 function pointers compare as equal between
6445 the normal executable and the shared library. */
6446 if (! bfd_link_pic (info)
6447 && h->def_dynamic
6448 && !h->def_regular)
6449 {
6450 h->root.u.def.section = s;
6451 h->root.u.def.value = plt_offset;
6452 }
6453
6454 /* Make room for this entry. */
6455 s->size += htab->plt_entry_size;
6456 /* After the 8192nd entry, room for two entries
6457 is allocated. */
6458 if (htab->plt_type == PLT_OLD
6459 && (s->size - htab->plt_initial_entry_size)
6460 / htab->plt_entry_size
6461 > PLT_NUM_SINGLE_ENTRIES)
6462 s->size += htab->plt_entry_size;
6463 }
6464 ent->plt.offset = plt_offset;
6465 }
6466
6467 /* We also need to make an entry in the .rela.plt section. */
6468 if (!doneone)
6469 {
6470 if (!dyn)
2d7ad24e
AM
6471 {
6472 if (h->type == STT_GNU_IFUNC)
6473 {
6474 s = htab->elf.irelplt;
6475 s->size += sizeof (Elf32_External_Rela);
6476 }
6477 else if (bfd_link_pic (info))
6478 {
6479 s = htab->relpltlocal;
6480 s->size += sizeof (Elf32_External_Rela);
6481 }
6482 }
f0158f44
AM
6483 else
6484 {
6485 htab->elf.srelplt->size += sizeof (Elf32_External_Rela);
6486
6487 if (htab->plt_type == PLT_VXWORKS)
6488 {
6489 /* Allocate space for the unloaded relocations. */
6490 if (!bfd_link_pic (info)
6491 && htab->elf.dynamic_sections_created)
6492 {
6493 if (ent->plt.offset
6494 == (bfd_vma) htab->plt_initial_entry_size)
6495 {
6496 htab->srelplt2->size
6497 += (sizeof (Elf32_External_Rela)
6498 * VXWORKS_PLTRESOLVE_RELOCS);
6499 }
6500
6501 htab->srelplt2->size
6502 += (sizeof (Elf32_External_Rela)
6503 * VXWORKS_PLT_NON_JMP_SLOT_RELOCS);
6504 }
6505
6506 /* Every PLT entry has an associated GOT entry in
6507 .got.plt. */
6508 htab->elf.sgotplt->size += 4;
6509 }
6510 }
6511 doneone = TRUE;
6512 }
6513 }
6514 else
6515 ent->plt.offset = (bfd_vma) -1;
6516
6517 if (!doneone)
6518 {
6519 h->plt.plist = NULL;
6520 h->needs_plt = 0;
6521 }
6522 }
6523 else
6524 {
6525 h->plt.plist = NULL;
6526 h->needs_plt = 0;
6527 }
6528
25dbc73a
AM
6529 return TRUE;
6530}
7619e7c7 6531
625af618
AM
6532/* Set DF_TEXTREL if we find any dynamic relocs that apply to
6533 read-only sections. */
7619e7c7 6534
25dbc73a 6535static bfd_boolean
0caf6c82 6536maybe_set_textrel (struct elf_link_hash_entry *h, void *info_p)
25dbc73a 6537{
98bbb1b8 6538 asection *sec;
0caf6c82 6539
25dbc73a
AM
6540 if (h->root.type == bfd_link_hash_indirect)
6541 return TRUE;
252b5132 6542
98bbb1b8
AM
6543 sec = readonly_dynrelocs (h);
6544 if (sec != NULL)
25dbc73a 6545 {
98bbb1b8
AM
6546 struct bfd_link_info *info = (struct bfd_link_info *) info_p;
6547
0caf6c82 6548 info->flags |= DF_TEXTREL;
98bbb1b8 6549 info->callbacks->minfo
c1c8c1ef 6550 (_("%pB: dynamic relocation against `%pT' in read-only section `%pA'\n"),
63c1f59d 6551 sec->owner, h->root.root.string, sec);
ee05f2fe 6552
625af618
AM
6553 /* Not an error, just cut short the traversal. */
6554 return FALSE;
25dbc73a
AM
6555 }
6556 return TRUE;
6557}
6558
6177242a
AM
6559static const unsigned char glink_eh_frame_cie[] =
6560{
6561 0, 0, 0, 16, /* length. */
6562 0, 0, 0, 0, /* id. */
6563 1, /* CIE version. */
6564 'z', 'R', 0, /* Augmentation string. */
6565 4, /* Code alignment. */
6566 0x7c, /* Data alignment. */
6567 65, /* RA reg. */
6568 1, /* Augmentation size. */
6569 DW_EH_PE_pcrel | DW_EH_PE_sdata4, /* FDE encoding. */
6570 DW_CFA_def_cfa, 1, 0 /* def_cfa: r1 offset 0. */
6571};
6572
25dbc73a
AM
6573/* Set the sizes of the dynamic sections. */
6574
6575static bfd_boolean
93d1b056 6576ppc_elf_size_dynamic_sections (bfd *output_bfd,
25dbc73a
AM
6577 struct bfd_link_info *info)
6578{
6579 struct ppc_elf_link_hash_table *htab;
6580 asection *s;
6581 bfd_boolean relocs;
6582 bfd *ibfd;
7fce784e 6583
252b5132 6584#ifdef DEBUG
25dbc73a 6585 fprintf (stderr, "ppc_elf_size_dynamic_sections called\n");
252b5132 6586#endif
252b5132 6587
25dbc73a
AM
6588 htab = ppc_elf_hash_table (info);
6589 BFD_ASSERT (htab->elf.dynobj != NULL);
252b5132 6590
25dbc73a
AM
6591 if (elf_hash_table (info)->dynamic_sections_created)
6592 {
6593 /* Set the contents of the .interp section to the interpreter. */
9b8b325a 6594 if (bfd_link_executable (info) && !info->nointerp)
25dbc73a 6595 {
3d4d4302 6596 s = bfd_get_linker_section (htab->elf.dynobj, ".interp");
25dbc73a
AM
6597 BFD_ASSERT (s != NULL);
6598 s->size = sizeof ELF_DYNAMIC_INTERPRETER;
6599 s->contents = (unsigned char *) ELF_DYNAMIC_INTERPRETER;
6600 }
6601 }
252b5132 6602
4a3dc543 6603 if (htab->plt_type == PLT_OLD)
d7128ce4 6604 htab->got_header_size = 16;
4a3dc543 6605 else if (htab->plt_type == PLT_NEW)
d7128ce4 6606 htab->got_header_size = 12;
252b5132 6607
25dbc73a
AM
6608 /* Set up .got offsets for local syms, and space for local dynamic
6609 relocs. */
c72f2fb2 6610 for (ibfd = info->input_bfds; ibfd != NULL; ibfd = ibfd->link.next)
25dbc73a
AM
6611 {
6612 bfd_signed_vma *local_got;
6613 bfd_signed_vma *end_local_got;
e054468f
AM
6614 struct plt_entry **local_plt;
6615 struct plt_entry **end_local_plt;
25dbc73a
AM
6616 char *lgot_masks;
6617 bfd_size_type locsymcount;
6618 Elf_Internal_Shdr *symtab_hdr;
7fce784e 6619
0c8d6e5c 6620 if (!is_ppc_elf (ibfd))
25dbc73a 6621 continue;
7fce784e 6622
25dbc73a
AM
6623 for (s = ibfd->sections; s != NULL; s = s->next)
6624 {
f95f8542 6625 struct ppc_dyn_relocs *p;
252b5132 6626
f95f8542 6627 for (p = ((struct ppc_dyn_relocs *)
25dbc73a
AM
6628 elf_section_data (s)->local_dynrel);
6629 p != NULL;
6630 p = p->next)
6631 {
6632 if (!bfd_is_abs_section (p->sec)
6633 && bfd_is_abs_section (p->sec->output_section))
6634 {
6635 /* Input section has been discarded, either because
6636 it is a copy of a linkonce section or due to
6637 linker script /DISCARD/, so we'll be discarding
6638 the relocs too. */
7fce784e 6639 }
3348747a
NS
6640 else if (htab->is_vxworks
6641 && strcmp (p->sec->output_section->name,
6642 ".tls_vars") == 0)
6643 {
6644 /* Relocations in vxworks .tls_vars sections are
6645 handled specially by the loader. */
6646 }
25dbc73a 6647 else if (p->count != 0)
7fce784e 6648 {
25f23106 6649 asection *sreloc = elf_section_data (p->sec)->sreloc;
f95f8542 6650 if (p->ifunc)
ce558b89 6651 sreloc = htab->elf.irelplt;
25f23106 6652 sreloc->size += p->count * sizeof (Elf32_External_Rela);
25dbc73a
AM
6653 if ((p->sec->output_section->flags
6654 & (SEC_READONLY | SEC_ALLOC))
6655 == (SEC_READONLY | SEC_ALLOC))
0caf6c82
L
6656 {
6657 info->flags |= DF_TEXTREL;
871b3ab2 6658 info->callbacks->minfo (_("%pB: dynamic relocation in read-only section `%pA'\n"),
0caf6c82
L
6659 p->sec->owner, p->sec);
6660 }
7fce784e 6661 }
252b5132 6662 }
252b5132 6663 }
252b5132 6664
25dbc73a
AM
6665 local_got = elf_local_got_refcounts (ibfd);
6666 if (!local_got)
6667 continue;
252b5132 6668
0ffa91dd 6669 symtab_hdr = &elf_symtab_hdr (ibfd);
25dbc73a
AM
6670 locsymcount = symtab_hdr->sh_info;
6671 end_local_got = local_got + locsymcount;
e054468f
AM
6672 local_plt = (struct plt_entry **) end_local_got;
6673 end_local_plt = local_plt + locsymcount;
6674 lgot_masks = (char *) end_local_plt;
91d6fa6a 6675
25dbc73a
AM
6676 for (; local_got < end_local_got; ++local_got, ++lgot_masks)
6677 if (*local_got > 0)
6678 {
f15d0b54 6679 unsigned int need;
37da22e5 6680 if ((*lgot_masks & (TLS_TLS | TLS_LD)) == (TLS_TLS | TLS_LD))
f15d0b54
AM
6681 htab->tlsld_got.refcount += 1;
6682 need = got_entries_needed (*lgot_masks);
d6e14abc
AM
6683 if (need == 0)
6684 *local_got = (bfd_vma) -1;
25dbc73a
AM
6685 else
6686 {
3b36f7e6 6687 *local_got = allocate_got (htab, need);
0e1862bb 6688 if (bfd_link_pic (info))
0bed072f 6689 {
f15d0b54
AM
6690 asection *srel;
6691 bfd_boolean tprel_known = bfd_link_executable (info);
6692
6693 need = got_relocs_needed (*lgot_masks, need, tprel_known);
6694 srel = htab->elf.srelgot;
37da22e5 6695 if ((*lgot_masks & (TLS_TLS | PLT_IFUNC)) == PLT_IFUNC)
ce558b89 6696 srel = htab->elf.irelplt;
f15d0b54 6697 srel->size += need;
0bed072f 6698 }
25dbc73a
AM
6699 }
6700 }
6701 else
6702 *local_got = (bfd_vma) -1;
e054468f
AM
6703
6704 if (htab->is_vxworks)
6705 continue;
6706
6707 /* Allocate space for calls to local STT_GNU_IFUNC syms in .iplt. */
2d7ad24e
AM
6708 lgot_masks = (char *) end_local_plt;
6709 for (; local_plt < end_local_plt; ++local_plt, ++lgot_masks)
e054468f
AM
6710 {
6711 struct plt_entry *ent;
6712 bfd_boolean doneone = FALSE;
2d7ad24e 6713 bfd_vma plt_offset = 0, glink_offset = (bfd_vma) -1;
e054468f
AM
6714
6715 for (ent = *local_plt; ent != NULL; ent = ent->next)
6716 if (ent->plt.refcount > 0)
6717 {
2d7ad24e
AM
6718 if ((*lgot_masks & (TLS_TLS | PLT_IFUNC)) == PLT_IFUNC)
6719 s = htab->elf.iplt;
3e04d765
AM
6720 else if (htab->can_convert_all_inline_plt
6721 || (*lgot_masks & (TLS_TLS | PLT_KEEP)) != PLT_KEEP)
2d7ad24e
AM
6722 {
6723 ent->plt.offset = (bfd_vma) -1;
6724 continue;
6725 }
6726 else
6727 s = htab->pltlocal;
e054468f
AM
6728
6729 if (!doneone)
6730 {
6731 plt_offset = s->size;
6732 s->size += 4;
6733 }
6734 ent->plt.offset = plt_offset;
6735
2d7ad24e 6736 if (s != htab->pltlocal && (!doneone || bfd_link_pic (info)))
e054468f 6737 {
2d7ad24e 6738 s = htab->glink;
e054468f 6739 glink_offset = s->size;
9e390558 6740 s->size += GLINK_ENTRY_SIZE (htab, NULL);
e054468f
AM
6741 }
6742 ent->glink_offset = glink_offset;
6743
6744 if (!doneone)
6745 {
2d7ad24e
AM
6746 if ((*lgot_masks & (TLS_TLS | PLT_IFUNC)) == PLT_IFUNC)
6747 {
6748 s = htab->elf.irelplt;
6749 s->size += sizeof (Elf32_External_Rela);
6750 }
6751 else if (bfd_link_pic (info))
6752 {
6753 s = htab->relpltlocal;
6754 s->size += sizeof (Elf32_External_Rela);
6755 }
e054468f
AM
6756 doneone = TRUE;
6757 }
6758 }
6759 else
6760 ent->plt.offset = (bfd_vma) -1;
6761 }
25dbc73a 6762 }
252b5132 6763
b7fcf6f6
AM
6764 /* Allocate space for global sym dynamic relocs. */
6765 elf_link_hash_traverse (elf_hash_table (info), allocate_dynrelocs, info);
6766
3b36f7e6
AM
6767 if (htab->tlsld_got.refcount > 0)
6768 {
6769 htab->tlsld_got.offset = allocate_got (htab, 8);
0e1862bb 6770 if (bfd_link_pic (info))
ce558b89 6771 htab->elf.srelgot->size += sizeof (Elf32_External_Rela);
3b36f7e6
AM
6772 }
6773 else
6774 htab->tlsld_got.offset = (bfd_vma) -1;
6775
ce558b89 6776 if (htab->elf.sgot != NULL && htab->plt_type != PLT_VXWORKS)
3b36f7e6
AM
6777 {
6778 unsigned int g_o_t = 32768;
6779
4d962050
AM
6780 /* If we haven't allocated the header, do so now. When we get here,
6781 for old plt/got the got size will be 0 to 32764 (not allocated),
6782 or 32780 to 65536 (header allocated). For new plt/got, the
6783 corresponding ranges are 0 to 32768 and 32780 to 65536. */
ce558b89 6784 if (htab->elf.sgot->size <= 32768)
3b36f7e6 6785 {
ce558b89 6786 g_o_t = htab->elf.sgot->size;
4a3dc543 6787 if (htab->plt_type == PLT_OLD)
4d962050 6788 g_o_t += 4;
ce558b89 6789 htab->elf.sgot->size += htab->got_header_size;
3b36f7e6 6790 }
3b36f7e6
AM
6791
6792 htab->elf.hgot->root.u.def.value = g_o_t;
6793 }
0e1862bb 6794 if (bfd_link_pic (info))
bd6c6e2b
AM
6795 {
6796 struct elf_link_hash_entry *sda = htab->sdata[0].sym;
93d1b056
AM
6797
6798 sda->root.u.def.section = htab->elf.hgot->root.u.def.section;
6799 sda->root.u.def.value = htab->elf.hgot->root.u.def.value;
bd6c6e2b 6800 }
15bfcc77
AM
6801 if (info->emitrelocations)
6802 {
6803 struct elf_link_hash_entry *sda = htab->sdata[0].sym;
6804
6805 if (sda != NULL && sda->ref_regular)
6806 sda->root.u.def.section->flags |= SEC_KEEP;
6807 sda = htab->sdata[1].sym;
6808 if (sda != NULL && sda->ref_regular)
6809 sda->root.u.def.section->flags |= SEC_KEEP;
6810 }
3b36f7e6 6811
e054468f
AM
6812 if (htab->glink != NULL
6813 && htab->glink->size != 0
6814 && htab->elf.dynamic_sections_created)
d7128ce4
AM
6815 {
6816 htab->glink_pltresolve = htab->glink->size;
9e390558
AM
6817 /* Space for the branch table. */
6818 htab->glink->size
6819 += htab->elf.srelplt->size / (sizeof (Elf32_External_Rela) / 4) - 4;
86b9da88 6820 /* Pad out to align the start of PLTresolve. */
5446cbdf
AM
6821 htab->glink->size += -htab->glink->size & (htab->params->ppc476_workaround
6822 ? 63 : 15);
d7128ce4 6823 htab->glink->size += GLINK_PLTRESOLVE;
0ba07910 6824
5446cbdf 6825 if (htab->params->emit_stub_syms)
0ba07910
AM
6826 {
6827 struct elf_link_hash_entry *sh;
6828 sh = elf_link_hash_lookup (&htab->elf, "__glink",
6829 TRUE, FALSE, FALSE);
6830 if (sh == NULL)
6831 return FALSE;
6832 if (sh->root.type == bfd_link_hash_new)
6833 {
6834 sh->root.type = bfd_link_hash_defined;
6835 sh->root.u.def.section = htab->glink;
6836 sh->root.u.def.value = htab->glink_pltresolve;
6837 sh->ref_regular = 1;
6838 sh->def_regular = 1;
6839 sh->ref_regular_nonweak = 1;
6840 sh->forced_local = 1;
6841 sh->non_elf = 0;
2ec55de3 6842 sh->root.linker_def = 1;
0ba07910
AM
6843 }
6844 sh = elf_link_hash_lookup (&htab->elf, "__glink_PLTresolve",
6845 TRUE, FALSE, FALSE);
6846 if (sh == NULL)
6847 return FALSE;
6848 if (sh->root.type == bfd_link_hash_new)
6849 {
6850 sh->root.type = bfd_link_hash_defined;
6851 sh->root.u.def.section = htab->glink;
6852 sh->root.u.def.value = htab->glink->size - GLINK_PLTRESOLVE;
6853 sh->ref_regular = 1;
6854 sh->def_regular = 1;
6855 sh->ref_regular_nonweak = 1;
6856 sh->forced_local = 1;
6857 sh->non_elf = 0;
2ec55de3 6858 sh->root.linker_def = 1;
0ba07910
AM
6859 }
6860 }
d7128ce4
AM
6861 }
6862
6177242a
AM
6863 if (htab->glink != NULL
6864 && htab->glink->size != 0
6865 && htab->glink_eh_frame != NULL
9a2a56cc
AM
6866 && !bfd_is_abs_section (htab->glink_eh_frame->output_section)
6867 && _bfd_elf_eh_frame_present (info))
6177242a
AM
6868 {
6869 s = htab->glink_eh_frame;
6870 s->size = sizeof (glink_eh_frame_cie) + 20;
0e1862bb 6871 if (bfd_link_pic (info))
6177242a
AM
6872 {
6873 s->size += 4;
6874 if (htab->glink->size - GLINK_PLTRESOLVE + 8 >= 256)
6875 s->size += 4;
6876 }
6877 }
6878
25dbc73a
AM
6879 /* We've now determined the sizes of the various dynamic sections.
6880 Allocate memory for them. */
6881 relocs = FALSE;
6882 for (s = htab->elf.dynobj->sections; s != NULL; s = s->next)
252b5132 6883 {
9d8504b1
PB
6884 bfd_boolean strip_section = TRUE;
6885
25dbc73a
AM
6886 if ((s->flags & SEC_LINKER_CREATED) == 0)
6887 continue;
252b5132 6888
ce558b89
AM
6889 if (s == htab->elf.splt
6890 || s == htab->elf.sgot)
25dbc73a 6891 {
9d8504b1
PB
6892 /* We'd like to strip these sections if they aren't needed, but if
6893 we've exported dynamic symbols from them we must leave them.
6894 It's too late to tell BFD to get rid of the symbols. */
e054468f 6895 if (htab->elf.hplt != NULL)
9d8504b1 6896 strip_section = FALSE;
25dbc73a
AM
6897 /* Strip this section if we don't need it; see the
6898 comment below. */
6899 }
ce558b89 6900 else if (s == htab->elf.iplt
2d7ad24e 6901 || s == htab->pltlocal
e054468f 6902 || s == htab->glink
6177242a 6903 || s == htab->glink_eh_frame
ce558b89 6904 || s == htab->elf.sgotplt
e054468f 6905 || s == htab->sbss
9d19e4fd 6906 || s == htab->elf.sdynbss
5474d94f 6907 || s == htab->elf.sdynrelro
15bfcc77 6908 || s == htab->dynsbss)
25dbc73a 6909 {
c9a2f333 6910 /* Strip these too. */
25dbc73a 6911 }
15bfcc77
AM
6912 else if (s == htab->sdata[0].section
6913 || s == htab->sdata[1].section)
6914 {
6915 strip_section = (s->flags & SEC_KEEP) == 0;
6916 }
a0f49396
NC
6917 else if (CONST_STRNEQ (bfd_get_section_name (htab->elf.dynobj, s),
6918 ".rela"))
25dbc73a 6919 {
c456f082 6920 if (s->size != 0)
25dbc73a
AM
6921 {
6922 /* Remember whether there are any relocation sections. */
6923 relocs = TRUE;
252b5132 6924
25dbc73a
AM
6925 /* We use the reloc_count field as a counter if we need
6926 to copy relocs into the output file. */
6927 s->reloc_count = 0;
252b5132
RH
6928 }
6929 }
25dbc73a
AM
6930 else
6931 {
6932 /* It's not one of our sections, so don't allocate space. */
6933 continue;
6934 }
252b5132 6935
9d8504b1 6936 if (s->size == 0 && strip_section)
25dbc73a 6937 {
c456f082
AM
6938 /* If we don't need this section, strip it from the
6939 output file. This is mostly to handle .rela.bss and
6940 .rela.plt. We must create both sections in
6941 create_dynamic_sections, because they must be created
6942 before the linker maps input sections to output
6943 sections. The linker does that before
6944 adjust_dynamic_symbol is called, and it is that
6945 function which decides whether anything needs to go
6946 into these sections. */
8423293d 6947 s->flags |= SEC_EXCLUDE;
25dbc73a
AM
6948 continue;
6949 }
7fce784e 6950
d7128ce4 6951 if ((s->flags & SEC_HAS_CONTENTS) == 0)
644285ef
AM
6952 continue;
6953
25dbc73a
AM
6954 /* Allocate memory for the section contents. */
6955 s->contents = bfd_zalloc (htab->elf.dynobj, s->size);
6956 if (s->contents == NULL)
6957 return FALSE;
6958 }
252b5132 6959
25dbc73a 6960 if (htab->elf.dynamic_sections_created)
7619e7c7 6961 {
25dbc73a
AM
6962 /* Add some entries to the .dynamic section. We fill in the
6963 values later, in ppc_elf_finish_dynamic_sections, but we
6964 must add the entries now so that we get the correct size for
6965 the .dynamic section. The DT_DEBUG entry is filled in by the
6966 dynamic linker and used by the debugger. */
6967#define add_dynamic_entry(TAG, VAL) \
6968 _bfd_elf_add_dynamic_entry (info, TAG, VAL)
252b5132 6969
0e1862bb 6970 if (bfd_link_executable (info))
7619e7c7 6971 {
25dbc73a
AM
6972 if (!add_dynamic_entry (DT_DEBUG, 0))
6973 return FALSE;
7619e7c7
AM
6974 }
6975
ce558b89 6976 if (htab->elf.splt != NULL && htab->elf.splt->size != 0)
7619e7c7 6977 {
25dbc73a
AM
6978 if (!add_dynamic_entry (DT_PLTGOT, 0)
6979 || !add_dynamic_entry (DT_PLTRELSZ, 0)
6980 || !add_dynamic_entry (DT_PLTREL, DT_RELA)
6981 || !add_dynamic_entry (DT_JMPREL, 0))
6982 return FALSE;
6983 }
7619e7c7 6984
c7e17e05
AM
6985 if (htab->plt_type == PLT_NEW
6986 && htab->glink != NULL
6987 && htab->glink->size != 0)
d7128ce4 6988 {
1fe44d79 6989 if (!add_dynamic_entry (DT_PPC_GOT, 0))
d7128ce4 6990 return FALSE;
5446cbdf 6991 if (!htab->params->no_tls_get_addr_opt
a7f2871e
AM
6992 && htab->tls_get_addr != NULL
6993 && htab->tls_get_addr->plt.plist != NULL
e8910a83 6994 && !add_dynamic_entry (DT_PPC_OPT, PPC_OPT_TLS))
a7f2871e 6995 return FALSE;
d7128ce4
AM
6996 }
6997
25dbc73a
AM
6998 if (relocs)
6999 {
7000 if (!add_dynamic_entry (DT_RELA, 0)
7001 || !add_dynamic_entry (DT_RELASZ, 0)
7002 || !add_dynamic_entry (DT_RELAENT, sizeof (Elf32_External_Rela)))
7003 return FALSE;
7004 }
7619e7c7 7005
25dbc73a
AM
7006 /* If any dynamic relocs apply to a read-only section, then we
7007 need a DT_TEXTREL entry. */
7008 if ((info->flags & DF_TEXTREL) == 0)
625af618 7009 elf_link_hash_traverse (elf_hash_table (info), maybe_set_textrel,
25dbc73a 7010 info);
7619e7c7 7011
25dbc73a
AM
7012 if ((info->flags & DF_TEXTREL) != 0)
7013 {
7014 if (!add_dynamic_entry (DT_TEXTREL, 0))
7015 return FALSE;
7619e7c7 7016 }
7a2b07ff
NS
7017 if (htab->is_vxworks
7018 && !elf_vxworks_add_dynamic_entries (output_bfd, info))
7019 return FALSE;
7020 }
25dbc73a
AM
7021#undef add_dynamic_entry
7022
7e01508c
AM
7023 if (htab->glink_eh_frame != NULL
7024 && htab->glink_eh_frame->contents != NULL)
7025 {
7026 unsigned char *p = htab->glink_eh_frame->contents;
7027 bfd_vma val;
7028
7029 memcpy (p, glink_eh_frame_cie, sizeof (glink_eh_frame_cie));
7030 /* CIE length (rewrite in case little-endian). */
7031 bfd_put_32 (htab->elf.dynobj, sizeof (glink_eh_frame_cie) - 4, p);
7032 p += sizeof (glink_eh_frame_cie);
7033 /* FDE length. */
7034 val = htab->glink_eh_frame->size - 4 - sizeof (glink_eh_frame_cie);
7035 bfd_put_32 (htab->elf.dynobj, val, p);
7036 p += 4;
7037 /* CIE pointer. */
7038 val = p - htab->glink_eh_frame->contents;
7039 bfd_put_32 (htab->elf.dynobj, val, p);
7040 p += 4;
7041 /* Offset to .glink. Set later. */
7042 p += 4;
7043 /* .glink size. */
7044 bfd_put_32 (htab->elf.dynobj, htab->glink->size, p);
7045 p += 4;
7046 /* Augmentation. */
7047 p += 1;
7048
0e1862bb 7049 if (bfd_link_pic (info)
7e01508c
AM
7050 && htab->elf.dynamic_sections_created)
7051 {
7052 bfd_vma adv = (htab->glink->size - GLINK_PLTRESOLVE + 8) >> 2;
7053 if (adv < 64)
7054 *p++ = DW_CFA_advance_loc + adv;
7055 else if (adv < 256)
7056 {
7057 *p++ = DW_CFA_advance_loc1;
7058 *p++ = adv;
7059 }
7060 else if (adv < 65536)
7061 {
7062 *p++ = DW_CFA_advance_loc2;
7063 bfd_put_16 (htab->elf.dynobj, adv, p);
7064 p += 2;
7065 }
7066 else
7067 {
7068 *p++ = DW_CFA_advance_loc4;
7069 bfd_put_32 (htab->elf.dynobj, adv, p);
7070 p += 4;
7071 }
7072 *p++ = DW_CFA_register;
7073 *p++ = 65;
7074 p++;
7075 *p++ = DW_CFA_advance_loc + 4;
7076 *p++ = DW_CFA_restore_extended;
7077 *p++ = 65;
7078 }
7079 BFD_ASSERT ((bfd_vma) ((p + 3 - htab->glink_eh_frame->contents) & -4)
7080 == htab->glink_eh_frame->size);
7081 }
7082
7619e7c7
AM
7083 return TRUE;
7084}
0eb4a168 7085
93d1b056
AM
7086/* Arrange to have _SDA_BASE_ or _SDA2_BASE_ stripped from the output
7087 if it looks like nothing is using them. */
7088
7089static void
7090maybe_strip_sdasym (bfd *output_bfd, elf_linker_section_t *lsect)
7091{
7092 struct elf_link_hash_entry *sda = lsect->sym;
7093
7094 if (sda != NULL && !sda->ref_regular && sda->dynindx == -1)
7095 {
7096 asection *s;
7097
7098 s = bfd_get_section_by_name (output_bfd, lsect->name);
7099 if (s == NULL || bfd_section_removed_from_list (output_bfd, s))
7100 {
7101 s = bfd_get_section_by_name (output_bfd, lsect->bss_name);
7102 if (s == NULL || bfd_section_removed_from_list (output_bfd, s))
7103 {
7104 sda->def_regular = 0;
7105 /* This is somewhat magic. See elf_link_output_extsym. */
7106 sda->ref_dynamic = 1;
7107 sda->forced_local = 0;
7108 }
7109 }
7110 }
7111}
7112
7113void
7114ppc_elf_maybe_strip_sdata_syms (struct bfd_link_info *info)
7115{
7116 struct ppc_elf_link_hash_table *htab = ppc_elf_hash_table (info);
7117
7118 if (htab != NULL)
7119 {
7120 maybe_strip_sdasym (info->output_bfd, &htab->sdata[0]);
7121 maybe_strip_sdasym (info->output_bfd, &htab->sdata[1]);
7122 }
7123}
7124
7125
0eb4a168
AM
7126/* Return TRUE if symbol should be hashed in the `.gnu.hash' section. */
7127
7128static bfd_boolean
7129ppc_elf_hash_symbol (struct elf_link_hash_entry *h)
7130{
7131 if (h->plt.plist != NULL
7132 && !h->def_regular
7133 && (!h->pointer_equality_needed
7134 || !h->ref_regular_nonweak))
7135 return FALSE;
7136
7137 return _bfd_elf_hash_symbol (h);
7138}
25dbc73a
AM
7139\f
7140#define ARRAY_SIZE(a) (sizeof (a) / sizeof ((a)[0]))
7141
01017ef8
NS
7142/* Relaxation trampolines. r12 is available for clobbering (r11, is
7143 used for some functions that are allowed to break the ABI). */
25dbc73a
AM
7144static const int shared_stub_entry[] =
7145 {
7146 0x7c0802a6, /* mflr 0 */
7147 0x429f0005, /* bcl 20, 31, .Lxxx */
01017ef8
NS
7148 0x7d8802a6, /* mflr 12 */
7149 0x3d8c0000, /* addis 12, 12, (xxx-.Lxxx)@ha */
53291d1f 7150 0x398c0000, /* addi 12, 12, (xxx-.Lxxx)@l */
25dbc73a 7151 0x7c0803a6, /* mtlr 0 */
01017ef8 7152 0x7d8903a6, /* mtctr 12 */
25dbc73a
AM
7153 0x4e800420, /* bctr */
7154 };
7155
7156static const int stub_entry[] =
7157 {
01017ef8
NS
7158 0x3d800000, /* lis 12,xxx@ha */
7159 0x398c0000, /* addi 12,12,xxx@l */
7160 0x7d8903a6, /* mtctr 12 */
25dbc73a
AM
7161 0x4e800420, /* bctr */
7162 };
7163
5446cbdf
AM
7164struct ppc_elf_relax_info
7165{
7166 unsigned int workaround_size;
d3e454b9 7167 unsigned int picfixup_size;
5446cbdf
AM
7168};
7169
7170/* This function implements long branch trampolines, and the ppc476
7171 icache bug workaround. Any section needing trampolines or patch
7172 space for the workaround has its size extended so that we can
53291d1f 7173 add trampolines at the end of the section. */
5446cbdf 7174
25dbc73a
AM
7175static bfd_boolean
7176ppc_elf_relax_section (bfd *abfd,
7177 asection *isec,
7178 struct bfd_link_info *link_info,
7179 bfd_boolean *again)
7180{
d3e454b9 7181 struct one_branch_fixup
25dbc73a 7182 {
d3e454b9 7183 struct one_branch_fixup *next;
25dbc73a 7184 asection *tsec;
01017ef8
NS
7185 /* Final link, can use the symbol offset. For a
7186 relocatable link we use the symbol's index. */
25dbc73a
AM
7187 bfd_vma toff;
7188 bfd_vma trampoff;
7189 };
7619e7c7 7190
25dbc73a
AM
7191 Elf_Internal_Shdr *symtab_hdr;
7192 bfd_byte *contents = NULL;
7193 Elf_Internal_Sym *isymbuf = NULL;
7194 Elf_Internal_Rela *internal_relocs = NULL;
5446cbdf 7195 Elf_Internal_Rela *irel, *irelend = NULL;
d3e454b9 7196 struct one_branch_fixup *branch_fixups = NULL;
5446cbdf 7197 struct ppc_elf_relax_info *relax_info = NULL;
9bc4e62b 7198 unsigned changes = 0;
5446cbdf 7199 bfd_boolean workaround_change;
d7128ce4 7200 struct ppc_elf_link_hash_table *htab;
d3e454b9 7201 bfd_size_type trampbase, trampoff, newsize, picfixup_size;
a6aa5195 7202 asection *got2;
50248c89 7203 bfd_boolean maybe_pasted;
7619e7c7 7204
25dbc73a 7205 *again = FALSE;
7619e7c7 7206
5446cbdf 7207 /* No need to do anything with non-alloc or non-code sections. */
c87b5a93 7208 if ((isec->flags & SEC_ALLOC) == 0
a8ad78a7 7209 || (isec->flags & SEC_CODE) == 0
5446cbdf
AM
7210 || (isec->flags & SEC_LINKER_CREATED) != 0
7211 || isec->size < 4)
25dbc73a 7212 return TRUE;
7619e7c7 7213
c8a1f254
NS
7214 /* We cannot represent the required PIC relocs in the output, so don't
7215 do anything. The linker doesn't support mixing -shared and -r
7216 anyway. */
0e1862bb 7217 if (bfd_link_relocatable (link_info) && bfd_link_pic (link_info))
795bc6b3 7218 return TRUE;
5b914448 7219
5446cbdf
AM
7220 htab = ppc_elf_hash_table (link_info);
7221 if (htab == NULL)
7222 return TRUE;
7223
7224 isec->size = (isec->size + 3) & -4;
7225 if (isec->rawsize == 0)
7226 isec->rawsize = isec->size;
7227 trampbase = isec->size;
7228
53291d1f
AM
7229 BFD_ASSERT (isec->sec_info_type == SEC_INFO_TYPE_NONE
7230 || isec->sec_info_type == SEC_INFO_TYPE_TARGET);
7231 isec->sec_info_type = SEC_INFO_TYPE_TARGET;
7232
d3e454b9
AM
7233 if (htab->params->ppc476_workaround
7234 || htab->params->pic_fixup > 0)
5446cbdf
AM
7235 {
7236 if (elf_section_data (isec)->sec_info == NULL)
7237 {
5446cbdf
AM
7238 elf_section_data (isec)->sec_info
7239 = bfd_zalloc (abfd, sizeof (struct ppc_elf_relax_info));
7240 if (elf_section_data (isec)->sec_info == NULL)
7241 return FALSE;
7242 }
7243 relax_info = elf_section_data (isec)->sec_info;
7244 trampbase -= relax_info->workaround_size;
7245 }
7246
50248c89
AM
7247 maybe_pasted = (strcmp (isec->output_section->name, ".init") == 0
7248 || strcmp (isec->output_section->name, ".fini") == 0);
25dbc73a 7249 /* Space for a branch around any trampolines. */
5446cbdf
AM
7250 trampoff = trampbase;
7251 if (maybe_pasted && trampbase == isec->rawsize)
50248c89 7252 trampoff += 4;
7619e7c7 7253
0ffa91dd 7254 symtab_hdr = &elf_symtab_hdr (abfd);
d3e454b9
AM
7255 picfixup_size = 0;
7256 if (htab->params->branch_trampolines
7257 || htab->params->pic_fixup > 0)
7619e7c7 7258 {
5446cbdf
AM
7259 /* Get a copy of the native relocations. */
7260 if (isec->reloc_count != 0)
25dbc73a 7261 {
5446cbdf
AM
7262 internal_relocs = _bfd_elf_link_read_relocs (abfd, isec, NULL, NULL,
7263 link_info->keep_memory);
7264 if (internal_relocs == NULL)
7265 goto error_return;
25dbc73a 7266 }
7619e7c7 7267
5446cbdf
AM
7268 got2 = bfd_get_section_by_name (abfd, ".got2");
7269
7270 irelend = internal_relocs + isec->reloc_count;
7271 for (irel = internal_relocs; irel < irelend; irel++)
25dbc73a 7272 {
5446cbdf
AM
7273 unsigned long r_type = ELF32_R_TYPE (irel->r_info);
7274 bfd_vma toff, roff;
7275 asection *tsec;
d3e454b9 7276 struct one_branch_fixup *f;
5446cbdf 7277 size_t insn_offset = 0;
d3e454b9 7278 bfd_vma max_branch_offset = 0, val;
5446cbdf
AM
7279 bfd_byte *hit_addr;
7280 unsigned long t0;
7281 struct elf_link_hash_entry *h;
49c09209 7282 Elf_Internal_Sym *isym;
5446cbdf
AM
7283 struct plt_entry **plist;
7284 unsigned char sym_type;
7285
7286 switch (r_type)
7287 {
7288 case R_PPC_REL24:
7289 case R_PPC_LOCAL24PC:
7290 case R_PPC_PLTREL24:
23cedd1d 7291 case R_PPC_PLTCALL:
5446cbdf
AM
7292 max_branch_offset = 1 << 25;
7293 break;
7294
7295 case R_PPC_REL14:
7296 case R_PPC_REL14_BRTAKEN:
7297 case R_PPC_REL14_BRNTAKEN:
7298 max_branch_offset = 1 << 15;
7299 break;
7fce784e 7300
d3e454b9
AM
7301 case R_PPC_ADDR16_HA:
7302 if (htab->params->pic_fixup > 0)
7303 break;
7304 continue;
7305
5446cbdf
AM
7306 default:
7307 continue;
7308 }
7309
7310 /* Get the value of the symbol referred to by the reloc. */
49c09209
AM
7311 if (!get_sym_h (&h, &isym, &tsec, NULL, &isymbuf,
7312 ELF32_R_SYM (irel->r_info), abfd))
7313 goto error_return;
5446cbdf 7314
49c09209
AM
7315 if (isym != NULL)
7316 {
7317 if (tsec != NULL)
7318 ;
7319 else if (isym->st_shndx == SHN_UNDEF)
5446cbdf
AM
7320 tsec = bfd_und_section_ptr;
7321 else if (isym->st_shndx == SHN_ABS)
7322 tsec = bfd_abs_section_ptr;
7323 else if (isym->st_shndx == SHN_COMMON)
7324 tsec = bfd_com_section_ptr;
5446cbdf
AM
7325
7326 toff = isym->st_value;
7327 sym_type = ELF_ST_TYPE (isym->st_info);
25dbc73a 7328 }
25dbc73a 7329 else
5446cbdf 7330 {
49c09209
AM
7331 if (tsec != NULL)
7332 toff = h->root.u.def.value;
5446cbdf
AM
7333 else if (h->root.type == bfd_link_hash_undefined
7334 || h->root.type == bfd_link_hash_undefweak)
7335 {
49c09209
AM
7336 unsigned long indx;
7337
7338 indx = ELF32_R_SYM (irel->r_info) - symtab_hdr->sh_info;
5446cbdf 7339 tsec = bfd_und_section_ptr;
0e1862bb 7340 toff = bfd_link_relocatable (link_info) ? indx : 0;
5446cbdf
AM
7341 }
7342 else
7343 continue;
7344
9f7552cf
AM
7345 /* If this branch is to __tls_get_addr then we may later
7346 optimise away the call. We won't be needing a long-
7347 branch stub in that case. */
0e1862bb 7348 if (bfd_link_executable (link_info)
9f7552cf
AM
7349 && h == htab->tls_get_addr
7350 && irel != internal_relocs)
7351 {
7352 unsigned long t_symndx = ELF32_R_SYM (irel[-1].r_info);
7353 unsigned long t_rtype = ELF32_R_TYPE (irel[-1].r_info);
7354 unsigned int tls_mask = 0;
7355
7356 /* The previous reloc should be one of R_PPC_TLSGD or
7357 R_PPC_TLSLD, or for older object files, a reloc
7358 on the __tls_get_addr arg setup insn. Get tls
7359 mask bits from the symbol on that reloc. */
7360 if (t_symndx < symtab_hdr->sh_info)
7361 {
7362 bfd_vma *local_got_offsets = elf_local_got_offsets (abfd);
7363
7364 if (local_got_offsets != NULL)
7365 {
7366 struct plt_entry **local_plt = (struct plt_entry **)
7367 (local_got_offsets + symtab_hdr->sh_info);
7368 char *lgot_masks = (char *)
7369 (local_plt + symtab_hdr->sh_info);
7370 tls_mask = lgot_masks[t_symndx];
7371 }
7372 }
7373 else
7374 {
7375 struct elf_link_hash_entry *th
7376 = elf_sym_hashes (abfd)[t_symndx - symtab_hdr->sh_info];
7377
7378 while (th->root.type == bfd_link_hash_indirect
7379 || th->root.type == bfd_link_hash_warning)
7380 th = (struct elf_link_hash_entry *) th->root.u.i.link;
7381
7382 tls_mask
7383 = ((struct ppc_elf_link_hash_entry *) th)->tls_mask;
7384 }
7385
7386 /* The mask bits tell us if the call will be
7387 optimised away. */
7388 if ((tls_mask & TLS_TLS) != 0 && (tls_mask & TLS_GD) == 0
7389 && (t_rtype == R_PPC_TLSGD
7390 || t_rtype == R_PPC_GOT_TLSGD16
7391 || t_rtype == R_PPC_GOT_TLSGD16_LO))
7392 continue;
7393 if ((tls_mask & TLS_TLS) != 0 && (tls_mask & TLS_LD) == 0
7394 && (t_rtype == R_PPC_TLSLD
7395 || t_rtype == R_PPC_GOT_TLSLD16
7396 || t_rtype == R_PPC_GOT_TLSLD16_LO))
7397 continue;
7398 }
7399
5446cbdf
AM
7400 sym_type = h->type;
7401 }
7619e7c7 7402
d3e454b9
AM
7403 if (r_type == R_PPC_ADDR16_HA)
7404 {
7405 if (h != NULL
7406 && !h->def_regular
7407 && h->protected_def
7408 && ppc_elf_hash_entry (h)->has_addr16_ha
7409 && ppc_elf_hash_entry (h)->has_addr16_lo)
7410 picfixup_size += 12;
7411 continue;
7412 }
7413
5446cbdf
AM
7414 /* The condition here under which we call find_plt_ent must
7415 match that in relocate_section. If we call find_plt_ent here
7416 but not in relocate_section, or vice versa, then the branch
7417 destination used here may be incorrect. */
7418 plist = NULL;
7419 if (h != NULL)
25dbc73a 7420 {
5446cbdf
AM
7421 /* We know is_branch_reloc (r_type) is true. */
7422 if (h->type == STT_GNU_IFUNC
7423 || r_type == R_PPC_PLTREL24)
7424 plist = &h->plt.plist;
25dbc73a 7425 }
5446cbdf
AM
7426 else if (sym_type == STT_GNU_IFUNC
7427 && elf_local_got_offsets (abfd) != NULL)
c8a1f254 7428 {
5446cbdf
AM
7429 bfd_vma *local_got_offsets = elf_local_got_offsets (abfd);
7430 struct plt_entry **local_plt = (struct plt_entry **)
7431 (local_got_offsets + symtab_hdr->sh_info);
7432 plist = local_plt + ELF32_R_SYM (irel->r_info);
c8a1f254 7433 }
5446cbdf 7434 if (plist != NULL)
a9585d22 7435 {
5446cbdf
AM
7436 bfd_vma addend = 0;
7437 struct plt_entry *ent;
7438
0e1862bb 7439 if (r_type == R_PPC_PLTREL24 && bfd_link_pic (link_info))
5446cbdf
AM
7440 addend = irel->r_addend;
7441 ent = find_plt_ent (plist, got2, addend);
7442 if (ent != NULL)
a9585d22 7443 {
5446cbdf
AM
7444 if (htab->plt_type == PLT_NEW
7445 || h == NULL
7446 || !htab->elf.dynamic_sections_created
7447 || h->dynindx == -1)
7448 {
7449 tsec = htab->glink;
7450 toff = ent->glink_offset;
7451 }
7452 else
7453 {
ce558b89 7454 tsec = htab->elf.splt;
5446cbdf
AM
7455 toff = ent->plt.offset;
7456 }
de972ffa
AM
7457 }
7458 }
de972ffa 7459
5446cbdf
AM
7460 /* If the branch and target are in the same section, you have
7461 no hope of adding stubs. We'll error out later should the
7462 branch overflow. */
7463 if (tsec == isec)
7464 continue;
25dbc73a 7465
5446cbdf
AM
7466 /* There probably isn't any reason to handle symbols in
7467 SEC_MERGE sections; SEC_MERGE doesn't seem a likely
7468 attribute for a code section, and we are only looking at
7469 branches. However, implement it correctly here as a
7470 reference for other target relax_section functions. */
7471 if (0 && tsec->sec_info_type == SEC_INFO_TYPE_MERGE)
7472 {
7473 /* At this stage in linking, no SEC_MERGE symbol has been
7474 adjusted, so all references to such symbols need to be
7475 passed through _bfd_merged_section_offset. (Later, in
7476 relocate_section, all SEC_MERGE symbols *except* for
7477 section symbols have been adjusted.)
7478
7479 gas may reduce relocations against symbols in SEC_MERGE
7480 sections to a relocation against the section symbol when
7481 the original addend was zero. When the reloc is against
7482 a section symbol we should include the addend in the
7483 offset passed to _bfd_merged_section_offset, since the
7484 location of interest is the original symbol. On the
7485 other hand, an access to "sym+addend" where "sym" is not
7486 a section symbol should not include the addend; Such an
7487 access is presumed to be an offset from "sym"; The
7488 location of interest is just "sym". */
7489 if (sym_type == STT_SECTION)
7490 toff += irel->r_addend;
7491
7492 toff
7493 = _bfd_merged_section_offset (abfd, &tsec,
7494 elf_section_data (tsec)->sec_info,
7495 toff);
7496
7497 if (sym_type != STT_SECTION)
7498 toff += irel->r_addend;
7499 }
7500 /* PLTREL24 addends are special. */
7501 else if (r_type != R_PPC_PLTREL24)
25dbc73a 7502 toff += irel->r_addend;
7619e7c7 7503
5446cbdf 7504 /* Attempted -shared link of non-pic code loses. */
0e1862bb 7505 if ((!bfd_link_relocatable (link_info)
5446cbdf
AM
7506 && tsec == bfd_und_section_ptr)
7507 || tsec->output_section == NULL
7508 || (tsec->owner != NULL
7509 && (tsec->owner->flags & BFD_PLUGIN) != 0))
7510 continue;
7619e7c7 7511
5446cbdf 7512 roff = irel->r_offset;
7de713b9 7513
5446cbdf
AM
7514 /* If the branch is in range, no need to do anything. */
7515 if (tsec != bfd_und_section_ptr
0e1862bb 7516 && (!bfd_link_relocatable (link_info)
5446cbdf
AM
7517 /* A relocatable link may have sections moved during
7518 final link, so do not presume they remain in range. */
7519 || tsec->output_section == isec->output_section))
7520 {
7521 bfd_vma symaddr, reladdr;
7619e7c7 7522
5446cbdf
AM
7523 symaddr = tsec->output_section->vma + tsec->output_offset + toff;
7524 reladdr = isec->output_section->vma + isec->output_offset + roff;
7525 if (symaddr - reladdr + max_branch_offset
7526 < 2 * max_branch_offset)
7527 continue;
7528 }
01017ef8 7529
5446cbdf 7530 /* Look for an existing fixup to this address. */
d3e454b9 7531 for (f = branch_fixups; f ; f = f->next)
5446cbdf
AM
7532 if (f->tsec == tsec && f->toff == toff)
7533 break;
252b5132 7534
5446cbdf
AM
7535 if (f == NULL)
7536 {
7537 size_t size;
7538 unsigned long stub_rtype;
25dbc73a 7539
5446cbdf
AM
7540 val = trampoff - roff;
7541 if (val >= max_branch_offset)
7542 /* Oh dear, we can't reach a trampoline. Don't try to add
7543 one. We'll report an error later. */
7544 continue;
252b5132 7545
0e1862bb 7546 if (bfd_link_pic (link_info))
5446cbdf
AM
7547 {
7548 size = 4 * ARRAY_SIZE (shared_stub_entry);
7549 insn_offset = 12;
7550 }
7551 else
7552 {
7553 size = 4 * ARRAY_SIZE (stub_entry);
7554 insn_offset = 0;
7555 }
7556 stub_rtype = R_PPC_RELAX;
ce558b89 7557 if (tsec == htab->elf.splt
5446cbdf
AM
7558 || tsec == htab->glink)
7559 {
7560 stub_rtype = R_PPC_RELAX_PLT;
7561 if (r_type == R_PPC_PLTREL24)
7562 stub_rtype = R_PPC_RELAX_PLTREL24;
7563 }
252b5132 7564
5446cbdf
AM
7565 /* Hijack the old relocation. Since we need two
7566 relocations for this use a "composite" reloc. */
7567 irel->r_info = ELF32_R_INFO (ELF32_R_SYM (irel->r_info),
7568 stub_rtype);
7569 irel->r_offset = trampoff + insn_offset;
7570 if (r_type == R_PPC_PLTREL24
7571 && stub_rtype != R_PPC_RELAX_PLTREL24)
7572 irel->r_addend = 0;
7573
7574 /* Record the fixup so we don't do it again this section. */
7575 f = bfd_malloc (sizeof (*f));
d3e454b9 7576 f->next = branch_fixups;
5446cbdf
AM
7577 f->tsec = tsec;
7578 f->toff = toff;
7579 f->trampoff = trampoff;
d3e454b9 7580 branch_fixups = f;
5446cbdf
AM
7581
7582 trampoff += size;
7583 changes++;
25dbc73a
AM
7584 }
7585 else
7586 {
5446cbdf
AM
7587 val = f->trampoff - roff;
7588 if (val >= max_branch_offset)
7589 continue;
252b5132 7590
5446cbdf
AM
7591 /* Nop out the reloc, since we're finalizing things here. */
7592 irel->r_info = ELF32_R_INFO (0, R_PPC_NONE);
7593 }
252b5132 7594
5446cbdf
AM
7595 /* Get the section contents. */
7596 if (contents == NULL)
25dbc73a 7597 {
5446cbdf
AM
7598 /* Get cached copy if it exists. */
7599 if (elf_section_data (isec)->this_hdr.contents != NULL)
7600 contents = elf_section_data (isec)->this_hdr.contents;
25dbc73a 7601 /* Go get them off disk. */
5446cbdf 7602 else if (!bfd_malloc_and_get_section (abfd, isec, &contents))
25dbc73a
AM
7603 goto error_return;
7604 }
252b5132 7605
5446cbdf
AM
7606 /* Fix up the existing branch to hit the trampoline. */
7607 hit_addr = contents + roff;
7608 switch (r_type)
7609 {
7610 case R_PPC_REL24:
7611 case R_PPC_LOCAL24PC:
7612 case R_PPC_PLTREL24:
7613 t0 = bfd_get_32 (abfd, hit_addr);
7614 t0 &= ~0x3fffffc;
7615 t0 |= val & 0x3fffffc;
7616 bfd_put_32 (abfd, t0, hit_addr);
7617 break;
252b5132 7618
5446cbdf
AM
7619 case R_PPC_REL14:
7620 case R_PPC_REL14_BRTAKEN:
7621 case R_PPC_REL14_BRNTAKEN:
7622 t0 = bfd_get_32 (abfd, hit_addr);
7623 t0 &= ~0xfffc;
7624 t0 |= val & 0xfffc;
7625 bfd_put_32 (abfd, t0, hit_addr);
7626 break;
7627 }
25dbc73a 7628 }
252b5132 7629
d3e454b9 7630 while (branch_fixups != NULL)
25dbc73a 7631 {
d3e454b9
AM
7632 struct one_branch_fixup *f = branch_fixups;
7633 branch_fixups = branch_fixups->next;
25dbc73a
AM
7634 free (f);
7635 }
5446cbdf 7636 }
252b5132 7637
5446cbdf
AM
7638 workaround_change = FALSE;
7639 newsize = trampoff;
795bc6b3 7640 if (htab->params->ppc476_workaround
0e1862bb 7641 && (!bfd_link_relocatable (link_info)
795bc6b3 7642 || isec->output_section->alignment_power >= htab->params->pagesize_p2))
5446cbdf
AM
7643 {
7644 bfd_vma addr, end_addr;
7645 unsigned int crossings;
795bc6b3 7646 bfd_vma pagesize = (bfd_vma) 1 << htab->params->pagesize_p2;
5446cbdf
AM
7647
7648 addr = isec->output_section->vma + isec->output_offset;
6128f9cf 7649 end_addr = addr + trampoff;
5446cbdf 7650 addr &= -pagesize;
795bc6b3 7651 crossings = ((end_addr & -pagesize) - addr) >> htab->params->pagesize_p2;
5446cbdf
AM
7652 if (crossings != 0)
7653 {
7654 /* Keep space aligned, to ensure the patch code itself does
7655 not cross a page. Don't decrease size calculated on a
7656 previous pass as otherwise we might never settle on a layout. */
1e269e9b 7657 newsize = 15 - ((end_addr - 1) & 15);
5446cbdf
AM
7658 newsize += crossings * 16;
7659 if (relax_info->workaround_size < newsize)
7660 {
7661 relax_info->workaround_size = newsize;
7662 workaround_change = TRUE;
5446cbdf
AM
7663 }
7664 /* Ensure relocate_section is called. */
7665 isec->flags |= SEC_RELOC;
7666 }
7667 newsize = trampoff + relax_info->workaround_size;
7668 }
7669
d3e454b9
AM
7670 if (htab->params->pic_fixup > 0)
7671 {
7672 picfixup_size -= relax_info->picfixup_size;
7673 if (picfixup_size != 0)
7674 relax_info->picfixup_size += picfixup_size;
7675 newsize += relax_info->picfixup_size;
7676 }
7677
7678 if (changes != 0 || picfixup_size != 0 || workaround_change)
5446cbdf
AM
7679 isec->size = newsize;
7680
25dbc73a
AM
7681 if (isymbuf != NULL
7682 && symtab_hdr->contents != (unsigned char *) isymbuf)
252b5132 7683 {
25dbc73a
AM
7684 if (! link_info->keep_memory)
7685 free (isymbuf);
252b5132 7686 else
25dbc73a
AM
7687 {
7688 /* Cache the symbols for elf_link_input_bfd. */
7689 symtab_hdr->contents = (unsigned char *) isymbuf;
7690 }
252b5132
RH
7691 }
7692
25dbc73a
AM
7693 if (contents != NULL
7694 && elf_section_data (isec)->this_hdr.contents != contents)
7695 {
53291d1f 7696 if (!changes && !link_info->keep_memory)
25dbc73a
AM
7697 free (contents);
7698 else
7699 {
7700 /* Cache the section contents for elf_link_input_bfd. */
7701 elf_section_data (isec)->this_hdr.contents = contents;
7702 }
7703 }
252b5132 7704
d3e454b9 7705 changes += picfixup_size;
9bc4e62b 7706 if (changes != 0)
25dbc73a 7707 {
9bc4e62b
NS
7708 /* Append sufficient NOP relocs so we can write out relocation
7709 information for the trampolines. */
d4730f92 7710 Elf_Internal_Shdr *rel_hdr;
9bc4e62b
NS
7711 Elf_Internal_Rela *new_relocs = bfd_malloc ((changes + isec->reloc_count)
7712 * sizeof (*new_relocs));
7713 unsigned ix;
5b914448 7714
9bc4e62b
NS
7715 if (!new_relocs)
7716 goto error_return;
7717 memcpy (new_relocs, internal_relocs,
7718 isec->reloc_count * sizeof (*new_relocs));
7719 for (ix = changes; ix--;)
7720 {
7721 irel = new_relocs + ix + isec->reloc_count;
7722
7723 irel->r_info = ELF32_R_INFO (0, R_PPC_NONE);
7724 }
7725 if (internal_relocs != elf_section_data (isec)->relocs)
25dbc73a 7726 free (internal_relocs);
9bc4e62b
NS
7727 elf_section_data (isec)->relocs = new_relocs;
7728 isec->reloc_count += changes;
d4730f92
BS
7729 rel_hdr = _bfd_elf_single_rel_hdr (isec);
7730 rel_hdr->sh_size += changes * rel_hdr->sh_entsize;
25dbc73a 7731 }
5446cbdf
AM
7732 else if (internal_relocs != NULL
7733 && elf_section_data (isec)->relocs != internal_relocs)
9bc4e62b 7734 free (internal_relocs);
252b5132 7735
5446cbdf 7736 *again = changes != 0 || workaround_change;
b34976b6 7737 return TRUE;
25dbc73a
AM
7738
7739 error_return:
d3e454b9 7740 while (branch_fixups != NULL)
5446cbdf 7741 {
d3e454b9
AM
7742 struct one_branch_fixup *f = branch_fixups;
7743 branch_fixups = branch_fixups->next;
5446cbdf
AM
7744 free (f);
7745 }
25dbc73a
AM
7746 if (isymbuf != NULL && (unsigned char *) isymbuf != symtab_hdr->contents)
7747 free (isymbuf);
7748 if (contents != NULL
7749 && elf_section_data (isec)->this_hdr.contents != contents)
7750 free (contents);
7751 if (internal_relocs != NULL
7752 && elf_section_data (isec)->relocs != internal_relocs)
7753 free (internal_relocs);
7754 return FALSE;
252b5132 7755}
252b5132 7756\f
8a696751
AM
7757/* What to do when ld finds relocations against symbols defined in
7758 discarded sections. */
7759
7760static unsigned int
7761ppc_elf_action_discarded (asection *sec)
7762{
7763 if (strcmp (".fixup", sec->name) == 0)
7764 return 0;
7765
7766 if (strcmp (".got2", sec->name) == 0)
7767 return 0;
7768
7769 return _bfd_elf_default_action_discarded (sec);
7770}
c9a2f333 7771\f
25dbc73a 7772/* Fill in the address for a pointer generated in a linker section. */
252b5132 7773
25dbc73a 7774static bfd_vma
76750a2f 7775elf_finish_pointer_linker_section (bfd *input_bfd,
25dbc73a
AM
7776 elf_linker_section_t *lsect,
7777 struct elf_link_hash_entry *h,
7778 bfd_vma relocation,
2bb04cf2 7779 const Elf_Internal_Rela *rel)
25dbc73a
AM
7780{
7781 elf_linker_section_pointers_t *linker_section_ptr;
252b5132 7782
25dbc73a 7783 BFD_ASSERT (lsect != NULL);
252b5132 7784
25dbc73a 7785 if (h != NULL)
252b5132 7786 {
25dbc73a
AM
7787 /* Handle global symbol. */
7788 struct ppc_elf_link_hash_entry *eh;
252b5132 7789
25dbc73a 7790 eh = (struct ppc_elf_link_hash_entry *) h;
76750a2f
AM
7791 BFD_ASSERT (eh->elf.def_regular);
7792 linker_section_ptr = eh->linker_section_pointer;
25dbc73a
AM
7793 }
7794 else
7795 {
7796 /* Handle local symbol. */
7797 unsigned long r_symndx = ELF32_R_SYM (rel->r_info);
76750a2f 7798
0c8d6e5c 7799 BFD_ASSERT (is_ppc_elf (input_bfd));
25dbc73a 7800 BFD_ASSERT (elf_local_ptr_offsets (input_bfd) != NULL);
76750a2f
AM
7801 linker_section_ptr = elf_local_ptr_offsets (input_bfd)[r_symndx];
7802 }
252b5132 7803
76750a2f
AM
7804 linker_section_ptr = elf_find_pointer_linker_section (linker_section_ptr,
7805 rel->r_addend,
7806 lsect);
7807 BFD_ASSERT (linker_section_ptr != NULL);
25dbc73a 7808
76750a2f
AM
7809 /* Offset will always be a multiple of four, so use the bottom bit
7810 as a "written" flag. */
7811 if ((linker_section_ptr->offset & 1) == 0)
7812 {
7813 bfd_put_32 (lsect->section->owner,
7814 relocation + linker_section_ptr->addend,
7815 lsect->section->contents + linker_section_ptr->offset);
7816 linker_section_ptr->offset += 1;
252b5132
RH
7817 }
7818
bd6c6e2b
AM
7819 relocation = (lsect->section->output_section->vma
7820 + lsect->section->output_offset
76750a2f 7821 + linker_section_ptr->offset - 1
bd6c6e2b 7822 - SYM_VAL (lsect->sym));
252b5132 7823
25dbc73a
AM
7824#ifdef DEBUG
7825 fprintf (stderr,
7826 "Finish pointer in linker section %s, offset = %ld (0x%lx)\n",
7827 lsect->name, (long) relocation, (long) relocation);
7828#endif
252b5132 7829
bd6c6e2b 7830 return relocation;
252b5132 7831}
25dbc73a 7832
e054468f
AM
7833#define PPC_LO(v) ((v) & 0xffff)
7834#define PPC_HI(v) (((v) >> 16) & 0xffff)
7835#define PPC_HA(v) PPC_HI ((v) + 0x8000)
7836
7837static void
9e390558
AM
7838write_glink_stub (struct elf_link_hash_entry *h, struct plt_entry *ent,
7839 asection *plt_sec, unsigned char *p,
e054468f
AM
7840 struct bfd_link_info *info)
7841{
7842 struct ppc_elf_link_hash_table *htab = ppc_elf_hash_table (info);
7843 bfd *output_bfd = info->output_bfd;
7844 bfd_vma plt;
9e390558
AM
7845 unsigned char *end = p + GLINK_ENTRY_SIZE (htab, h);
7846
7847 if (h != NULL
7848 && h == htab->tls_get_addr
7849 && !htab->params->no_tls_get_addr_opt)
7850 {
7851 bfd_put_32 (output_bfd, LWZ_11_3, p);
7852 p += 4;
7853 bfd_put_32 (output_bfd, LWZ_12_3 + 4, p);
7854 p += 4;
7855 bfd_put_32 (output_bfd, MR_0_3, p);
7856 p += 4;
7857 bfd_put_32 (output_bfd, CMPWI_11_0, p);
7858 p += 4;
7859 bfd_put_32 (output_bfd, ADD_3_12_2, p);
7860 p += 4;
7861 bfd_put_32 (output_bfd, BEQLR, p);
7862 p += 4;
7863 bfd_put_32 (output_bfd, MR_3_0, p);
7864 p += 4;
7865 bfd_put_32 (output_bfd, NOP, p);
7866 p += 4;
7867 }
e054468f
AM
7868
7869 plt = ((ent->plt.offset & ~1)
7870 + plt_sec->output_section->vma
7871 + plt_sec->output_offset);
e054468f 7872
0e1862bb 7873 if (bfd_link_pic (info))
e054468f
AM
7874 {
7875 bfd_vma got = 0;
7876
7877 if (ent->addend >= 32768)
7878 got = (ent->addend
7879 + ent->sec->output_section->vma
7880 + ent->sec->output_offset);
7881 else if (htab->elf.hgot != NULL)
7882 got = SYM_VAL (htab->elf.hgot);
7883
7884 plt -= got;
7885
7886 if (plt + 0x8000 < 0x10000)
9e390558 7887 bfd_put_32 (output_bfd, LWZ_11_30 + PPC_LO (plt), p);
e054468f
AM
7888 else
7889 {
7890 bfd_put_32 (output_bfd, ADDIS_11_30 + PPC_HA (plt), p);
7891 p += 4;
7892 bfd_put_32 (output_bfd, LWZ_11_11 + PPC_LO (plt), p);
e054468f
AM
7893 }
7894 }
7895 else
7896 {
7897 bfd_put_32 (output_bfd, LIS_11 + PPC_HA (plt), p);
7898 p += 4;
7899 bfd_put_32 (output_bfd, LWZ_11_11 + PPC_LO (plt), p);
9e390558
AM
7900 }
7901 p += 4;
7902 bfd_put_32 (output_bfd, MTCTR_11, p);
7903 p += 4;
407aa07c
AM
7904 bfd_put_32 (output_bfd, BCTR, p);
7905 p += 4;
9e390558
AM
7906 while (p < end)
7907 {
7908 bfd_put_32 (output_bfd, htab->params->ppc476_workaround ? BA : NOP, p);
e054468f
AM
7909 p += 4;
7910 }
7911}
7912
bd6c6e2b
AM
7913/* Return true if symbol is defined statically. */
7914
7915static bfd_boolean
7916is_static_defined (struct elf_link_hash_entry *h)
7917{
7918 return ((h->root.type == bfd_link_hash_defined
7919 || h->root.type == bfd_link_hash_defweak)
7920 && h->root.u.def.section != NULL
7921 && h->root.u.def.section->output_section != NULL);
7922}
7923
2d0f3896
AM
7924/* If INSN is an opcode that may be used with an @tls operand, return
7925 the transformed insn for TLS optimisation, otherwise return 0. If
7926 REG is non-zero only match an insn with RB or RA equal to REG. */
7927
7928unsigned int
7929_bfd_elf_ppc_at_tls_transform (unsigned int insn, unsigned int reg)
7930{
7931 unsigned int rtra;
7932
7933 if ((insn & (0x3f << 26)) != 31 << 26)
7934 return 0;
7935
7936 if (reg == 0 || ((insn >> 11) & 0x1f) == reg)
7937 rtra = insn & ((1 << 26) - (1 << 16));
7938 else if (((insn >> 16) & 0x1f) == reg)
7939 rtra = (insn & (0x1f << 21)) | ((insn & (0x1f << 11)) << 5);
7940 else
7941 return 0;
7942
7943 if ((insn & (0x3ff << 1)) == 266 << 1)
7944 /* add -> addi. */
7945 insn = 14 << 26;
7946 else if ((insn & (0x1f << 1)) == 23 << 1
7947 && ((insn & (0x1f << 6)) < 14 << 6
7948 || ((insn & (0x1f << 6)) >= 16 << 6
7949 && (insn & (0x1f << 6)) < 24 << 6)))
7950 /* load and store indexed -> dform. */
7951 insn = (32 | ((insn >> 6) & 0x1f)) << 26;
7952 else if ((insn & (((0x1a << 5) | 0x1f) << 1)) == 21 << 1)
7953 /* ldx, ldux, stdx, stdux -> ld, ldu, std, stdu. */
7954 insn = ((58 | ((insn >> 6) & 4)) << 26) | ((insn >> 6) & 1);
7955 else if ((insn & (((0x1f << 5) | 0x1f) << 1)) == 341 << 1)
7956 /* lwax -> lwa. */
7957 insn = (58 << 26) | 2;
7958 else
7959 return 0;
7960 insn |= rtra;
7961 return insn;
7962}
7963
766bc656
AM
7964/* If INSN is an opcode that may be used with an @tprel operand, return
7965 the transformed insn for an undefined weak symbol, ie. with the
7966 thread pointer REG operand removed. Otherwise return 0. */
7967
7968unsigned int
7969_bfd_elf_ppc_at_tprel_transform (unsigned int insn, unsigned int reg)
7970{
7971 if ((insn & (0x1f << 16)) == reg << 16
7972 && ((insn & (0x3f << 26)) == 14u << 26 /* addi */
7973 || (insn & (0x3f << 26)) == 15u << 26 /* addis */
7974 || (insn & (0x3f << 26)) == 32u << 26 /* lwz */
7975 || (insn & (0x3f << 26)) == 34u << 26 /* lbz */
7976 || (insn & (0x3f << 26)) == 36u << 26 /* stw */
7977 || (insn & (0x3f << 26)) == 38u << 26 /* stb */
7978 || (insn & (0x3f << 26)) == 40u << 26 /* lhz */
7979 || (insn & (0x3f << 26)) == 42u << 26 /* lha */
7980 || (insn & (0x3f << 26)) == 44u << 26 /* sth */
7981 || (insn & (0x3f << 26)) == 46u << 26 /* lmw */
7982 || (insn & (0x3f << 26)) == 47u << 26 /* stmw */
7983 || (insn & (0x3f << 26)) == 48u << 26 /* lfs */
7984 || (insn & (0x3f << 26)) == 50u << 26 /* lfd */
7985 || (insn & (0x3f << 26)) == 52u << 26 /* stfs */
7986 || (insn & (0x3f << 26)) == 54u << 26 /* stfd */
7987 || ((insn & (0x3f << 26)) == 58u << 26 /* lwa,ld,lmd */
7988 && (insn & 3) != 1)
7989 || ((insn & (0x3f << 26)) == 62u << 26 /* std, stmd */
7990 && ((insn & 3) == 0 || (insn & 3) == 3))))
7991 {
7992 insn &= ~(0x1f << 16);
7993 }
7994 else if ((insn & (0x1f << 21)) == reg << 21
7995 && ((insn & (0x3e << 26)) == 24u << 26 /* ori, oris */
7996 || (insn & (0x3e << 26)) == 26u << 26 /* xori,xoris */
7997 || (insn & (0x3e << 26)) == 28u << 26 /* andi,andis */))
7998 {
7999 insn &= ~(0x1f << 21);
8000 insn |= (insn & (0x1f << 16)) << 5;
8001 if ((insn & (0x3e << 26)) == 26 << 26 /* xori,xoris */)
8002 insn -= 2 >> 26; /* convert to ori,oris */
8003 }
8004 else
8005 insn = 0;
8006 return insn;
8007}
8008
1fe532cf
AM
8009static bfd_boolean
8010is_insn_ds_form (unsigned int insn)
8011{
8012 return ((insn & (0x3f << 26)) == 58u << 26 /* ld,ldu,lwa */
8013 || (insn & (0x3f << 26)) == 62u << 26 /* std,stdu,stq */
8014 || (insn & (0x3f << 26)) == 57u << 26 /* lfdp */
8015 || (insn & (0x3f << 26)) == 61u << 26 /* stfdp */);
8016}
8017
8018static bfd_boolean
8019is_insn_dq_form (unsigned int insn)
8020{
a680de9a
PB
8021 return ((insn & (0x3f << 26)) == 56u << 26 /* lq */
8022 || ((insn & (0x3f << 26)) == (61u << 26) /* lxv, stxv */
8023 && (insn & 3) == 1));
1fe532cf
AM
8024}
8025
252b5132
RH
8026/* The RELOCATE_SECTION function is called by the ELF backend linker
8027 to handle the relocations for a section.
8028
8029 The relocs are always passed as Rela structures; if the section
8030 actually uses Rel structures, the r_addend field will always be
8031 zero.
8032
8033 This function is responsible for adjust the section contents as
8034 necessary, and (if using Rela relocs and generating a
1049f94e 8035 relocatable output file) adjusting the reloc addend as
252b5132
RH
8036 necessary.
8037
8038 This function does not have to worry about setting the reloc
8039 address or the reloc symbol index.
8040
8041 LOCAL_SYMS is a pointer to the swapped in local symbols.
8042
8043 LOCAL_SECTIONS is an array giving the section in the input file
8044 corresponding to the st_shndx field of each local symbol.
8045
8046 The global hash table entry for the global symbols can be found
8047 via elf_sym_hashes (input_bfd).
8048
1049f94e 8049 When generating relocatable output, this function must handle
252b5132
RH
8050 STB_LOCAL/STT_SECTION symbols specially. The output symbol is
8051 going to be the section symbol corresponding to the output
8052 section, which means that the addend must be adjusted
8053 accordingly. */
8054
b34976b6 8055static bfd_boolean
55fd94b0
AM
8056ppc_elf_relocate_section (bfd *output_bfd,
8057 struct bfd_link_info *info,
8058 bfd *input_bfd,
8059 asection *input_section,
8060 bfd_byte *contents,
8061 Elf_Internal_Rela *relocs,
8062 Elf_Internal_Sym *local_syms,
8063 asection **local_sections)
252b5132 8064{
7619e7c7
AM
8065 Elf_Internal_Shdr *symtab_hdr;
8066 struct elf_link_hash_entry **sym_hashes;
8067 struct ppc_elf_link_hash_table *htab;
8068 Elf_Internal_Rela *rel;
c316a17c 8069 Elf_Internal_Rela *wrel;
7619e7c7
AM
8070 Elf_Internal_Rela *relend;
8071 Elf_Internal_Rela outrel;
f95f8542 8072 asection *got2;
252b5132 8073 bfd_vma *local_got_offsets;
b34976b6 8074 bfd_boolean ret = TRUE;
95f0d0d2 8075 bfd_vma d_offset = (bfd_big_endian (input_bfd) ? 2 : 0);
3348747a 8076 bfd_boolean is_vxworks_tls;
d3e454b9
AM
8077 unsigned int picfixup_size = 0;
8078 struct ppc_elf_relax_info *relax_info = NULL;
b34976b6 8079
252b5132 8080#ifdef DEBUG
871b3ab2 8081 _bfd_error_handler ("ppc_elf_relocate_section called for %pB section %pA, "
d003868e
AM
8082 "%ld relocations%s",
8083 input_bfd, input_section,
8084 (long) input_section->reloc_count,
0e1862bb 8085 (bfd_link_relocatable (info)) ? " (relocatable)" : "");
252b5132
RH
8086#endif
8087
a6aa5195
AM
8088 got2 = bfd_get_section_by_name (input_bfd, ".got2");
8089
e47cd125 8090 /* Initialize howto table if not already done. */
8da6118f 8091 if (!ppc_elf_howto_table[R_PPC_ADDR32])
252b5132
RH
8092 ppc_elf_howto_init ();
8093
7619e7c7 8094 htab = ppc_elf_hash_table (info);
252b5132 8095 local_got_offsets = elf_local_got_offsets (input_bfd);
0ffa91dd 8096 symtab_hdr = &elf_symtab_hdr (input_bfd);
7619e7c7 8097 sym_hashes = elf_sym_hashes (input_bfd);
3348747a
NS
8098 /* We have to handle relocations in vxworks .tls_vars sections
8099 specially, because the dynamic loader is 'weird'. */
0e1862bb 8100 is_vxworks_tls = (htab->is_vxworks && bfd_link_pic (info)
3348747a
NS
8101 && !strcmp (input_section->output_section->name,
8102 ".tls_vars"));
d3e454b9
AM
8103 if (input_section->sec_info_type == SEC_INFO_TYPE_TARGET)
8104 relax_info = elf_section_data (input_section)->sec_info;
c316a17c 8105 rel = wrel = relocs;
7619e7c7 8106 relend = relocs + input_section->reloc_count;
c316a17c 8107 for (; rel < relend; wrel++, rel++)
252b5132 8108 {
7619e7c7
AM
8109 enum elf_ppc_reloc_type r_type;
8110 bfd_vma addend;
8111 bfd_reloc_status_type r;
8112 Elf_Internal_Sym *sym;
8113 asection *sec;
8114 struct elf_link_hash_entry *h;
8115 const char *sym_name;
252b5132
RH
8116 reloc_howto_type *howto;
8117 unsigned long r_symndx;
8118 bfd_vma relocation;
91d6fa6a 8119 bfd_vma branch_bit, from;
23cedd1d 8120 bfd_boolean unresolved_reloc, save_unresolved_reloc;
7619e7c7
AM
8121 bfd_boolean warned;
8122 unsigned int tls_type, tls_mask, tls_gd;
08be3224 8123 struct plt_entry **ifunc, **plt_list;
86c95733 8124 struct reloc_howto_struct alt_howto;
7619e7c7 8125
c316a17c 8126 again:
55fd94b0
AM
8127 r_type = ELF32_R_TYPE (rel->r_info);
8128 sym = NULL;
8129 sec = NULL;
8130 h = NULL;
7619e7c7
AM
8131 unresolved_reloc = FALSE;
8132 warned = FALSE;
252b5132 8133 r_symndx = ELF32_R_SYM (rel->r_info);
560e09e9 8134
252b5132
RH
8135 if (r_symndx < symtab_hdr->sh_info)
8136 {
8137 sym = local_syms + r_symndx;
8138 sec = local_sections[r_symndx];
26c61ae5 8139 sym_name = bfd_elf_sym_name (input_bfd, symtab_hdr, sym, sec);
252b5132 8140
8517fae7 8141 relocation = _bfd_elf_rela_local_sym (output_bfd, sym, &sec, rel);
252b5132
RH
8142 }
8143 else
8144 {
62d887d4
L
8145 bfd_boolean ignored;
8146
b2a8e766
AM
8147 RELOC_FOR_GLOBAL_SYMBOL (info, input_bfd, input_section, rel,
8148 r_symndx, symtab_hdr, sym_hashes,
8149 h, sec, relocation,
62d887d4 8150 unresolved_reloc, warned, ignored);
9abc968f 8151
252b5132 8152 sym_name = h->root.root.string;
7619e7c7
AM
8153 }
8154
dbaa2011 8155 if (sec != NULL && discarded_section (sec))
ab96bf03
AM
8156 {
8157 /* For relocs against symbols from removed linkonce sections,
8158 or sections discarded by a linker script, we just want the
8159 section contents zeroed. Avoid any special processing. */
8160 howto = NULL;
8161 if (r_type < R_PPC_max)
8162 howto = ppc_elf_howto_table[r_type];
c316a17c
AM
8163
8164 _bfd_clear_contents (howto, input_bfd, input_section,
8165 contents + rel->r_offset);
8166 wrel->r_offset = rel->r_offset;
8167 wrel->r_info = 0;
8168 wrel->r_addend = 0;
8169
8170 /* For ld -r, remove relocations in debug sections against
dcd2b8a0 8171 symbols defined in discarded sections. Not done for
c316a17c
AM
8172 non-debug to preserve relocs in .eh_frame which the
8173 eh_frame editing code expects to be present. */
8174 if (bfd_link_relocatable (info)
8175 && (input_section->flags & SEC_DEBUGGING))
8176 wrel--;
8177
8178 continue;
ab96bf03
AM
8179 }
8180
0e1862bb 8181 if (bfd_link_relocatable (info))
ab96bf03
AM
8182 {
8183 if (got2 != NULL
8184 && r_type == R_PPC_PLTREL24
f75e0e33 8185 && rel->r_addend != 0)
ab96bf03
AM
8186 {
8187 /* R_PPC_PLTREL24 is rather special. If non-zero, the
8188 addend specifies the GOT pointer offset within .got2. */
8189 rel->r_addend += got2->output_offset;
8190 }
53291d1f
AM
8191 if (r_type != R_PPC_RELAX_PLT
8192 && r_type != R_PPC_RELAX_PLTREL24
8193 && r_type != R_PPC_RELAX)
c316a17c 8194 goto copy_reloc;
ab96bf03
AM
8195 }
8196
7619e7c7
AM
8197 /* TLS optimizations. Replace instruction sequences and relocs
8198 based on information we collected in tls_optimize. We edit
8199 RELOCS so that --emit-relocs will output something sensible
8200 for the final instruction stream. */
8201 tls_mask = 0;
8202 tls_gd = 0;
727fc41e
AM
8203 if (h != NULL)
8204 tls_mask = ((struct ppc_elf_link_hash_entry *) h)->tls_mask;
8205 else if (local_got_offsets != NULL)
7619e7c7 8206 {
e054468f 8207 struct plt_entry **local_plt;
727fc41e 8208 char *lgot_masks;
e054468f
AM
8209 local_plt
8210 = (struct plt_entry **) (local_got_offsets + symtab_hdr->sh_info);
8211 lgot_masks = (char *) (local_plt + symtab_hdr->sh_info);
727fc41e 8212 tls_mask = lgot_masks[r_symndx];
7619e7c7
AM
8213 }
8214
8215 /* Ensure reloc mapping code below stays sane. */
8216 if ((R_PPC_GOT_TLSLD16 & 3) != (R_PPC_GOT_TLSGD16 & 3)
8217 || (R_PPC_GOT_TLSLD16_LO & 3) != (R_PPC_GOT_TLSGD16_LO & 3)
8218 || (R_PPC_GOT_TLSLD16_HI & 3) != (R_PPC_GOT_TLSGD16_HI & 3)
8219 || (R_PPC_GOT_TLSLD16_HA & 3) != (R_PPC_GOT_TLSGD16_HA & 3)
8220 || (R_PPC_GOT_TLSLD16 & 3) != (R_PPC_GOT_TPREL16 & 3)
8221 || (R_PPC_GOT_TLSLD16_LO & 3) != (R_PPC_GOT_TPREL16_LO & 3)
8222 || (R_PPC_GOT_TLSLD16_HI & 3) != (R_PPC_GOT_TPREL16_HI & 3)
8223 || (R_PPC_GOT_TLSLD16_HA & 3) != (R_PPC_GOT_TPREL16_HA & 3))
8224 abort ();
8225 switch (r_type)
8226 {
8227 default:
8228 break;
8229
8230 case R_PPC_GOT_TPREL16:
8231 case R_PPC_GOT_TPREL16_LO:
e054468f 8232 if ((tls_mask & TLS_TLS) != 0
7619e7c7
AM
8233 && (tls_mask & TLS_TPREL) == 0)
8234 {
8235 bfd_vma insn;
91d6fa6a 8236
95f0d0d2 8237 insn = bfd_get_32 (input_bfd,
c316a17c 8238 contents + rel->r_offset - d_offset);
7619e7c7
AM
8239 insn &= 31 << 21;
8240 insn |= 0x3c020000; /* addis 0,2,0 */
95f0d0d2 8241 bfd_put_32 (input_bfd, insn,
c316a17c 8242 contents + rel->r_offset - d_offset);
7619e7c7
AM
8243 r_type = R_PPC_TPREL16_HA;
8244 rel->r_info = ELF32_R_INFO (r_symndx, r_type);
8245 }
8246 break;
8247
8248 case R_PPC_TLS:
e054468f 8249 if ((tls_mask & TLS_TLS) != 0
7619e7c7
AM
8250 && (tls_mask & TLS_TPREL) == 0)
8251 {
2d0f3896
AM
8252 bfd_vma insn;
8253
95f0d0d2 8254 insn = bfd_get_32 (input_bfd, contents + rel->r_offset);
2d0f3896
AM
8255 insn = _bfd_elf_ppc_at_tls_transform (insn, 2);
8256 if (insn == 0)
7619e7c7 8257 abort ();
95f0d0d2 8258 bfd_put_32 (input_bfd, insn, contents + rel->r_offset);
7619e7c7
AM
8259 r_type = R_PPC_TPREL16_LO;
8260 rel->r_info = ELF32_R_INFO (r_symndx, r_type);
4fe5ca5b 8261
7619e7c7 8262 /* Was PPC_TLS which sits on insn boundary, now
4fe5ca5b
GM
8263 PPC_TPREL16_LO which is at low-order half-word. */
8264 rel->r_offset += d_offset;
7619e7c7
AM
8265 }
8266 break;
8267
8268 case R_PPC_GOT_TLSGD16_HI:
8269 case R_PPC_GOT_TLSGD16_HA:
8270 tls_gd = TLS_TPRELGD;
e054468f 8271 if ((tls_mask & TLS_TLS) != 0 && (tls_mask & TLS_GD) == 0)
7619e7c7
AM
8272 goto tls_gdld_hi;
8273 break;
8274
8275 case R_PPC_GOT_TLSLD16_HI:
8276 case R_PPC_GOT_TLSLD16_HA:
e054468f 8277 if ((tls_mask & TLS_TLS) != 0 && (tls_mask & TLS_LD) == 0)
7619e7c7
AM
8278 {
8279 tls_gdld_hi:
8280 if ((tls_mask & tls_gd) != 0)
8281 r_type = (((r_type - (R_PPC_GOT_TLSGD16 & 3)) & 3)
8282 + R_PPC_GOT_TPREL16);
8283 else
8284 {
4fe5ca5b 8285 rel->r_offset -= d_offset;
95f0d0d2 8286 bfd_put_32 (input_bfd, NOP, contents + rel->r_offset);
7619e7c7
AM
8287 r_type = R_PPC_NONE;
8288 }
8289 rel->r_info = ELF32_R_INFO (r_symndx, r_type);
8290 }
8291 break;
8292
8293 case R_PPC_GOT_TLSGD16:
8294 case R_PPC_GOT_TLSGD16_LO:
8295 tls_gd = TLS_TPRELGD;
e054468f 8296 if ((tls_mask & TLS_TLS) != 0 && (tls_mask & TLS_GD) == 0)
b7fcf6f6 8297 goto tls_ldgd_opt;
7619e7c7
AM
8298 break;
8299
8300 case R_PPC_GOT_TLSLD16:
8301 case R_PPC_GOT_TLSLD16_LO:
e054468f 8302 if ((tls_mask & TLS_TLS) != 0 && (tls_mask & TLS_LD) == 0)
7619e7c7 8303 {
3a71aa26 8304 unsigned int insn1, insn2;
b7fcf6f6 8305 bfd_vma offset;
7619e7c7 8306
b7fcf6f6 8307 tls_ldgd_opt:
727fc41e
AM
8308 offset = (bfd_vma) -1;
8309 /* If not using the newer R_PPC_TLSGD/LD to mark
8310 __tls_get_addr calls, we must trust that the call
8311 stays with its arg setup insns, ie. that the next
8312 reloc is the __tls_get_addr call associated with
8313 the current reloc. Edit both insns. */
8314 if (input_section->has_tls_get_addr_call
8315 && rel + 1 < relend
8316 && branch_reloc_hash_match (input_bfd, rel + 1,
8317 htab->tls_get_addr))
8318 offset = rel[1].r_offset;
b86ac8e3
AM
8319 /* We read the low GOT_TLS insn because we need to keep
8320 the destination reg. It may be something other than
8321 the usual r3, and moved to r3 before the call by
8322 intervening code. */
95f0d0d2 8323 insn1 = bfd_get_32 (input_bfd,
b86ac8e3 8324 contents + rel->r_offset - d_offset);
b7fcf6f6
AM
8325 if ((tls_mask & tls_gd) != 0)
8326 {
8327 /* IE */
b86ac8e3 8328 insn1 &= (0x1f << 21) | (0x1f << 16);
b7fcf6f6 8329 insn1 |= 32 << 26; /* lwz */
727fc41e
AM
8330 if (offset != (bfd_vma) -1)
8331 {
f58d5a2d 8332 rel[1].r_info = ELF32_R_INFO (STN_UNDEF, R_PPC_NONE);
727fc41e 8333 insn2 = 0x7c631214; /* add 3,3,2 */
95f0d0d2 8334 bfd_put_32 (input_bfd, insn2, contents + offset);
727fc41e 8335 }
b7fcf6f6
AM
8336 r_type = (((r_type - (R_PPC_GOT_TLSGD16 & 3)) & 3)
8337 + R_PPC_GOT_TPREL16);
8338 rel->r_info = ELF32_R_INFO (r_symndx, r_type);
8339 }
8340 else
8341 {
8342 /* LE */
b86ac8e3
AM
8343 insn1 &= 0x1f << 21;
8344 insn1 |= 0x3c020000; /* addis r,2,0 */
7619e7c7
AM
8345 if (tls_gd == 0)
8346 {
b7fcf6f6 8347 /* Was an LD reloc. */
1d483afe
AM
8348 for (r_symndx = 0;
8349 r_symndx < symtab_hdr->sh_info;
8350 r_symndx++)
8351 if (local_sections[r_symndx] == sec)
8352 break;
8353 if (r_symndx >= symtab_hdr->sh_info)
cf35638d 8354 r_symndx = STN_UNDEF;
b7fcf6f6 8355 rel->r_addend = htab->elf.tls_sec->vma + DTP_OFFSET;
cf35638d 8356 if (r_symndx != STN_UNDEF)
1d483afe
AM
8357 rel->r_addend -= (local_syms[r_symndx].st_value
8358 + sec->output_offset
8359 + sec->output_section->vma);
7619e7c7 8360 }
b7fcf6f6
AM
8361 r_type = R_PPC_TPREL16_HA;
8362 rel->r_info = ELF32_R_INFO (r_symndx, r_type);
727fc41e
AM
8363 if (offset != (bfd_vma) -1)
8364 {
8365 rel[1].r_info = ELF32_R_INFO (r_symndx, R_PPC_TPREL16_LO);
8366 rel[1].r_offset = offset + d_offset;
8367 rel[1].r_addend = rel->r_addend;
8368 insn2 = 0x38630000; /* addi 3,3,0 */
95f0d0d2 8369 bfd_put_32 (input_bfd, insn2, contents + offset);
727fc41e 8370 }
b7fcf6f6 8371 }
95f0d0d2 8372 bfd_put_32 (input_bfd, insn1,
b7fcf6f6 8373 contents + rel->r_offset - d_offset);
b7fcf6f6
AM
8374 if (tls_gd == 0)
8375 {
8376 /* We changed the symbol on an LD reloc. Start over
8377 in order to get h, sym, sec etc. right. */
c316a17c 8378 goto again;
7619e7c7 8379 }
252b5132 8380 }
7619e7c7 8381 break;
727fc41e
AM
8382
8383 case R_PPC_TLSGD:
675e2809
AM
8384 if ((tls_mask & TLS_TLS) != 0 && (tls_mask & TLS_GD) == 0
8385 && rel + 1 < relend)
727fc41e
AM
8386 {
8387 unsigned int insn2;
8388 bfd_vma offset = rel->r_offset;
8389
23cedd1d
AM
8390 if (is_plt_seq_reloc (ELF32_R_TYPE (rel[1].r_info)))
8391 {
8392 bfd_put_32 (input_bfd, NOP, contents + offset);
8393 rel[1].r_info = ELF32_R_INFO (STN_UNDEF, R_PPC_NONE);
8394 break;
8395 }
8396
727fc41e
AM
8397 if ((tls_mask & TLS_TPRELGD) != 0)
8398 {
8399 /* IE */
8400 r_type = R_PPC_NONE;
8401 insn2 = 0x7c631214; /* add 3,3,2 */
8402 }
8403 else
8404 {
8405 /* LE */
8406 r_type = R_PPC_TPREL16_LO;
8407 rel->r_offset += d_offset;
8408 insn2 = 0x38630000; /* addi 3,3,0 */
8409 }
8410 rel->r_info = ELF32_R_INFO (r_symndx, r_type);
95f0d0d2 8411 bfd_put_32 (input_bfd, insn2, contents + offset);
727fc41e
AM
8412 /* Zap the reloc on the _tls_get_addr call too. */
8413 BFD_ASSERT (offset == rel[1].r_offset);
f58d5a2d 8414 rel[1].r_info = ELF32_R_INFO (STN_UNDEF, R_PPC_NONE);
727fc41e
AM
8415 }
8416 break;
8417
8418 case R_PPC_TLSLD:
675e2809
AM
8419 if ((tls_mask & TLS_TLS) != 0 && (tls_mask & TLS_LD) == 0
8420 && rel + 1 < relend)
727fc41e
AM
8421 {
8422 unsigned int insn2;
8423
23cedd1d
AM
8424 if (is_plt_seq_reloc (ELF32_R_TYPE (rel[1].r_info)))
8425 {
8426 bfd_put_32 (input_bfd, NOP, contents + rel->r_offset);
8427 rel[1].r_info = ELF32_R_INFO (STN_UNDEF, R_PPC_NONE);
8428 break;
8429 }
8430
727fc41e
AM
8431 for (r_symndx = 0;
8432 r_symndx < symtab_hdr->sh_info;
8433 r_symndx++)
8434 if (local_sections[r_symndx] == sec)
8435 break;
8436 if (r_symndx >= symtab_hdr->sh_info)
cf35638d 8437 r_symndx = STN_UNDEF;
727fc41e 8438 rel->r_addend = htab->elf.tls_sec->vma + DTP_OFFSET;
cf35638d 8439 if (r_symndx != STN_UNDEF)
727fc41e
AM
8440 rel->r_addend -= (local_syms[r_symndx].st_value
8441 + sec->output_offset
8442 + sec->output_section->vma);
8443
8444 rel->r_info = ELF32_R_INFO (r_symndx, R_PPC_TPREL16_LO);
8445 rel->r_offset += d_offset;
8446 insn2 = 0x38630000; /* addi 3,3,0 */
95f0d0d2 8447 bfd_put_32 (input_bfd, insn2,
727fc41e
AM
8448 contents + rel->r_offset - d_offset);
8449 /* Zap the reloc on the _tls_get_addr call too. */
8450 BFD_ASSERT (rel->r_offset - d_offset == rel[1].r_offset);
f58d5a2d 8451 rel[1].r_info = ELF32_R_INFO (STN_UNDEF, R_PPC_NONE);
c316a17c 8452 goto again;
727fc41e
AM
8453 }
8454 break;
7619e7c7
AM
8455 }
8456
8457 /* Handle other relocations that tweak non-addend part of insn. */
8458 branch_bit = 0;
8459 switch (r_type)
8460 {
8461 default:
8462 break;
8463
8464 /* Branch taken prediction relocations. */
8465 case R_PPC_ADDR14_BRTAKEN:
8466 case R_PPC_REL14_BRTAKEN:
8467 branch_bit = BRANCH_PREDICT_BIT;
1a0670f3 8468 /* Fall through. */
7619e7c7 8469
4cc11e76 8470 /* Branch not taken prediction relocations. */
7619e7c7
AM
8471 case R_PPC_ADDR14_BRNTAKEN:
8472 case R_PPC_REL14_BRNTAKEN:
91d6fa6a 8473 {
23cedd1d 8474 unsigned int insn;
7619e7c7 8475
95f0d0d2 8476 insn = bfd_get_32 (input_bfd, contents + rel->r_offset);
91d6fa6a
NC
8477 insn &= ~BRANCH_PREDICT_BIT;
8478 insn |= branch_bit;
7619e7c7 8479
91d6fa6a
NC
8480 from = (rel->r_offset
8481 + input_section->output_offset
8482 + input_section->output_section->vma);
7619e7c7 8483
91d6fa6a
NC
8484 /* Invert 'y' bit if not the default. */
8485 if ((bfd_signed_vma) (relocation + rel->r_addend - from) < 0)
8486 insn ^= BRANCH_PREDICT_BIT;
8487
95f0d0d2 8488 bfd_put_32 (input_bfd, insn, contents + rel->r_offset);
91d6fa6a 8489 }
08be3224
AM
8490 break;
8491
8492 case R_PPC_PLT16_HA:
8493 {
8494 unsigned int insn;
8495
8496 insn = bfd_get_32 (input_bfd,
8497 contents + rel->r_offset - d_offset);
8498 if ((insn & (0x3f << 26)) == 15u << 26
8499 && (insn & (0x1f << 16)) != 0)
8500 {
8501 if (!bfd_link_pic (info))
8502 {
8503 /* Convert addis to lis. */
8504 insn &= ~(0x1f << 16);
8505 bfd_put_32 (input_bfd, insn,
8506 contents + rel->r_offset - d_offset);
8507 }
8508 }
8509 else if (bfd_link_pic (info))
8510 info->callbacks->einfo
8511 (_("%P: %H: error: %s with unexpected instruction %x\n"),
8512 input_bfd, input_section, rel->r_offset,
8513 "R_PPC_PLT16_HA", insn);
8514 }
8515 break;
252b5132
RH
8516 }
8517
d3e454b9
AM
8518 if (ELIMINATE_COPY_RELOCS
8519 && h != NULL
8520 && !h->def_regular
8521 && h->protected_def
8522 && ppc_elf_hash_entry (h)->has_addr16_ha
8523 && ppc_elf_hash_entry (h)->has_addr16_lo
8524 && htab->params->pic_fixup > 0)
8525 {
8526 /* Convert lis;addi or lis;load/store accessing a protected
8527 variable defined in a shared library to PIC. */
8528 unsigned int insn;
8529
8530 if (r_type == R_PPC_ADDR16_HA)
8531 {
95f0d0d2 8532 insn = bfd_get_32 (input_bfd,
d3e454b9
AM
8533 contents + rel->r_offset - d_offset);
8534 if ((insn & (0x3f << 26)) == (15u << 26)
8535 && (insn & (0x1f << 16)) == 0 /* lis */)
8536 {
8537 bfd_byte *p;
8538 bfd_vma off;
8539 bfd_vma got_addr;
8540
8541 p = (contents + input_section->size
8542 - relax_info->workaround_size
8543 - relax_info->picfixup_size
8544 + picfixup_size);
8545 off = (p - contents) - (rel->r_offset - d_offset);
8546 if (off > 0x1fffffc || (off & 3) != 0)
8547 info->callbacks->einfo
174d0a74 8548 (_("%H: fixup branch overflow\n"),
d3e454b9
AM
8549 input_bfd, input_section, rel->r_offset);
8550
95f0d0d2 8551 bfd_put_32 (input_bfd, B | off,
d3e454b9 8552 contents + rel->r_offset - d_offset);
ce558b89
AM
8553 got_addr = (htab->elf.sgot->output_section->vma
8554 + htab->elf.sgot->output_offset
d3e454b9 8555 + (h->got.offset & ~1));
c316a17c
AM
8556 wrel->r_offset = (p - contents) + d_offset;
8557 wrel->r_info = ELF32_R_INFO (0, R_PPC_ADDR16_HA);
8558 wrel->r_addend = got_addr;
d3e454b9 8559 insn &= ~0xffff;
4aef7643 8560 insn |= ((unsigned int) (got_addr + 0x8000) >> 16) & 0xffff;
95f0d0d2 8561 bfd_put_32 (input_bfd, insn, p);
d3e454b9
AM
8562
8563 /* Convert lis to lwz, loading address from GOT. */
8564 insn &= ~0xffff;
8565 insn ^= (32u ^ 15u) << 26;
8566 insn |= (insn & (0x1f << 21)) >> 5;
8567 insn |= got_addr & 0xffff;
95f0d0d2 8568 bfd_put_32 (input_bfd, insn, p + 4);
d3e454b9 8569
95f0d0d2 8570 bfd_put_32 (input_bfd, B | ((-4 - off) & 0x3ffffff), p + 8);
d3e454b9
AM
8571 picfixup_size += 12;
8572
8573 /* Use one of the spare relocs, so --emit-relocs
8574 output is reasonable. */
8575 memmove (rel + 1, rel, (relend - rel - 1) * sizeof (*rel));
c316a17c
AM
8576 wrel++, rel++;
8577 rel->r_offset = wrel[-1].r_offset + 4;
d3e454b9 8578 rel->r_info = ELF32_R_INFO (0, R_PPC_ADDR16_LO);
c316a17c 8579 rel->r_addend = wrel[-1].r_addend;
d3e454b9
AM
8580
8581 /* Continue on as if we had a got reloc, to output
8582 dynamic reloc. */
8583 r_type = R_PPC_GOT16_LO;
8584 }
8585 else
2c4d9cbe 8586 _bfd_error_handler
695344c0 8587 /* xgettext:c-format */
2dcf00ce
AM
8588 (_("%pB(%pA+%#" PRIx64 "): error: "
8589 "%s with unexpected instruction %#x"),
8590 input_bfd, input_section, (uint64_t) rel->r_offset,
d3e454b9
AM
8591 "R_PPC_ADDR16_HA", insn);
8592 }
8593 else if (r_type == R_PPC_ADDR16_LO)
8594 {
95f0d0d2 8595 insn = bfd_get_32 (input_bfd,
d3e454b9
AM
8596 contents + rel->r_offset - d_offset);
8597 if ((insn & (0x3f << 26)) == 14u << 26 /* addi */
8598 || (insn & (0x3f << 26)) == 32u << 26 /* lwz */
8599 || (insn & (0x3f << 26)) == 34u << 26 /* lbz */
8600 || (insn & (0x3f << 26)) == 36u << 26 /* stw */
8601 || (insn & (0x3f << 26)) == 38u << 26 /* stb */
8602 || (insn & (0x3f << 26)) == 40u << 26 /* lhz */
8603 || (insn & (0x3f << 26)) == 42u << 26 /* lha */
8604 || (insn & (0x3f << 26)) == 44u << 26 /* sth */
8605 || (insn & (0x3f << 26)) == 46u << 26 /* lmw */
8606 || (insn & (0x3f << 26)) == 47u << 26 /* stmw */
8607 || (insn & (0x3f << 26)) == 48u << 26 /* lfs */
8608 || (insn & (0x3f << 26)) == 50u << 26 /* lfd */
8609 || (insn & (0x3f << 26)) == 52u << 26 /* stfs */
8610 || (insn & (0x3f << 26)) == 54u << 26 /* stfd */
8611 || ((insn & (0x3f << 26)) == 58u << 26 /* lwa,ld,lmd */
8612 && (insn & 3) != 1)
8613 || ((insn & (0x3f << 26)) == 62u << 26 /* std, stmd */
8614 && ((insn & 3) == 0 || (insn & 3) == 3)))
8615 {
8616 /* Arrange to apply the reloc addend, if any. */
8617 relocation = 0;
8618 unresolved_reloc = FALSE;
8619 rel->r_info = ELF32_R_INFO (0, r_type);
8620 }
8621 else
2c4d9cbe 8622 _bfd_error_handler
695344c0 8623 /* xgettext:c-format */
2dcf00ce
AM
8624 (_("%pB(%pA+%#" PRIx64 "): error: "
8625 "%s with unexpected instruction %#x"),
8626 input_bfd, input_section, (uint64_t) rel->r_offset,
d3e454b9
AM
8627 "R_PPC_ADDR16_LO", insn);
8628 }
8629 }
8630
e054468f 8631 ifunc = NULL;
25f23106 8632 if (!htab->is_vxworks)
e054468f 8633 {
de972ffa
AM
8634 struct plt_entry *ent;
8635
e054468f
AM
8636 if (h != NULL)
8637 {
8638 if (h->type == STT_GNU_IFUNC)
8639 ifunc = &h->plt.plist;
8640 }
de972ffa
AM
8641 else if (local_got_offsets != NULL
8642 && ELF_ST_TYPE (sym->st_info) == STT_GNU_IFUNC)
e054468f 8643 {
de972ffa 8644 struct plt_entry **local_plt;
e054468f 8645
de972ffa
AM
8646 local_plt = (struct plt_entry **) (local_got_offsets
8647 + symtab_hdr->sh_info);
8648 ifunc = local_plt + r_symndx;
e054468f 8649 }
e054468f 8650
de972ffa
AM
8651 ent = NULL;
8652 if (ifunc != NULL
0e1862bb 8653 && (!bfd_link_pic (info)
08be3224
AM
8654 || is_branch_reloc (r_type)
8655 || r_type == R_PPC_PLT16_LO
8656 || r_type == R_PPC_PLT16_HI
8657 || r_type == R_PPC_PLT16_HA))
de972ffa
AM
8658 {
8659 addend = 0;
08be3224
AM
8660 if (bfd_link_pic (info)
8661 && (r_type == R_PPC_PLTREL24
8662 || r_type == R_PPC_PLT16_LO
8663 || r_type == R_PPC_PLT16_HI
8664 || r_type == R_PPC_PLT16_HA))
de972ffa
AM
8665 addend = rel->r_addend;
8666 ent = find_plt_ent (ifunc, got2, addend);
8667 }
8668 if (ent != NULL)
8669 {
888a7fc3
AM
8670 if (bfd_link_pic (info)
8671 && ent->sec != got2
8672 && htab->plt_type != PLT_NEW
8673 && (!htab->elf.dynamic_sections_created
8674 || h == NULL
8675 || h->dynindx == -1))
8676 {
8677 /* Uh oh, we are going to create a pic glink stub
8678 for an ifunc (here for h == NULL and later in
8679 finish_dynamic_symbol for h != NULL), and
8680 apparently are using code compiled with
8681 -mbss-plt. The difficulty is that -mbss-plt code
8682 gives no indication via a magic PLTREL24 addend
8683 whether r30 is equal to _GLOBAL_OFFSET_TABLE_ or
8684 is pointing into a .got2 section (and how far
8685 into .got2). */
8686 info->callbacks->einfo
695344c0 8687 /* xgettext:c-format */
174d0a74 8688 (_("%X%H: unsupported bss-plt -fPIC ifunc %s\n"),
888a7fc3
AM
8689 input_bfd, input_section, rel->r_offset, sym_name);
8690 }
e054468f
AM
8691
8692 unresolved_reloc = FALSE;
8693 if (htab->plt_type == PLT_NEW
8694 || !htab->elf.dynamic_sections_created
c7e17e05
AM
8695 || h == NULL
8696 || h->dynindx == -1)
e054468f
AM
8697 relocation = (htab->glink->output_section->vma
8698 + htab->glink->output_offset
8699 + (ent->glink_offset & ~1));
8700 else
ce558b89
AM
8701 relocation = (htab->elf.splt->output_section->vma
8702 + htab->elf.splt->output_offset
e054468f
AM
8703 + ent->plt.offset);
8704 }
8705 }
8706
7619e7c7 8707 addend = rel->r_addend;
23cedd1d 8708 save_unresolved_reloc = unresolved_reloc;
7619e7c7 8709 howto = NULL;
55fd94b0
AM
8710 if (r_type < R_PPC_max)
8711 howto = ppc_elf_howto_table[r_type];
9a23f96e
AM
8712
8713 switch (r_type)
8714 {
8715 default:
8716 break;
8717
8718 case R_PPC_TPREL16_HA:
8719 if (htab->do_tls_opt && relocation + addend + 0x8000 < 0x10000)
8720 {
8721 bfd_byte *p = contents + (rel->r_offset & ~3);
8722 unsigned int insn = bfd_get_32 (input_bfd, p);
8723 if ((insn & ((0x3f << 26) | 0x1f << 16))
8724 != ((15u << 26) | (2 << 16)) /* addis rt,2,imm */)
8725 /* xgettext:c-format */
8726 info->callbacks->minfo
8727 (_("%H: warning: %s unexpected insn %#x.\n"),
8728 input_bfd, input_section, rel->r_offset, howto->name, insn);
8729 else
8730 bfd_put_32 (input_bfd, NOP, p);
8731 }
8732 break;
8733
8734 case R_PPC_TPREL16_LO:
8735 if (htab->do_tls_opt && relocation + addend + 0x8000 < 0x10000)
8736 {
8737 bfd_byte *p = contents + (rel->r_offset & ~3);
8738 unsigned int insn = bfd_get_32 (input_bfd, p);
8739 insn &= ~(0x1f << 16);
8740 insn |= 2 << 16;
8741 bfd_put_32 (input_bfd, insn, p);
8742 }
8743 break;
8744 }
8745
8746 tls_type = 0;
7619e7c7 8747 switch (r_type)
252b5132
RH
8748 {
8749 default:
cf97bcb0
AM
8750 /* xgettext:c-format */
8751 _bfd_error_handler (_("%pB: %s unsupported"),
8752 input_bfd, howto->name);
252b5132
RH
8753
8754 bfd_set_error (bfd_error_bad_value);
b34976b6 8755 ret = FALSE;
c316a17c 8756 goto copy_reloc;
252b5132 8757
7619e7c7
AM
8758 case R_PPC_NONE:
8759 case R_PPC_TLS:
727fc41e
AM
8760 case R_PPC_TLSGD:
8761 case R_PPC_TLSLD:
7619e7c7
AM
8762 case R_PPC_EMB_MRKREF:
8763 case R_PPC_GNU_VTINHERIT:
8764 case R_PPC_GNU_VTENTRY:
c316a17c 8765 goto copy_reloc;
7595d193 8766
7619e7c7
AM
8767 /* GOT16 relocations. Like an ADDR16 using the symbol's
8768 address in the GOT as relocation value instead of the
8769 symbol's value itself. Also, create a GOT entry for the
8770 symbol and put the symbol value there. */
8771 case R_PPC_GOT_TLSGD16:
8772 case R_PPC_GOT_TLSGD16_LO:
8773 case R_PPC_GOT_TLSGD16_HI:
8774 case R_PPC_GOT_TLSGD16_HA:
8775 tls_type = TLS_TLS | TLS_GD;
8776 goto dogot;
8777
8778 case R_PPC_GOT_TLSLD16:
8779 case R_PPC_GOT_TLSLD16_LO:
8780 case R_PPC_GOT_TLSLD16_HI:
8781 case R_PPC_GOT_TLSLD16_HA:
8782 tls_type = TLS_TLS | TLS_LD;
8783 goto dogot;
8784
8785 case R_PPC_GOT_TPREL16:
8786 case R_PPC_GOT_TPREL16_LO:
8787 case R_PPC_GOT_TPREL16_HI:
8788 case R_PPC_GOT_TPREL16_HA:
8789 tls_type = TLS_TLS | TLS_TPREL;
8790 goto dogot;
8791
8792 case R_PPC_GOT_DTPREL16:
8793 case R_PPC_GOT_DTPREL16_LO:
8794 case R_PPC_GOT_DTPREL16_HI:
8795 case R_PPC_GOT_DTPREL16_HA:
8796 tls_type = TLS_TLS | TLS_DTPREL;
8797 goto dogot;
8798
8799 case R_PPC_GOT16:
8800 case R_PPC_GOT16_LO:
8801 case R_PPC_GOT16_HI:
8802 case R_PPC_GOT16_HA:
727fc41e 8803 tls_mask = 0;
7619e7c7
AM
8804 dogot:
8805 {
8806 /* Relocation is to the entry for this symbol in the global
8807 offset table. */
8808 bfd_vma off;
8809 bfd_vma *offp;
8810 unsigned long indx;
8811
ce558b89 8812 if (htab->elf.sgot == NULL)
7619e7c7
AM
8813 abort ();
8814
8815 indx = 0;
8816 if (tls_type == (TLS_TLS | TLS_LD)
d881513a 8817 && (h == NULL
f5385ebf 8818 || !h->def_dynamic))
7619e7c7
AM
8819 offp = &htab->tlsld_got.offset;
8820 else if (h != NULL)
8821 {
f0158f44
AM
8822 if (!htab->elf.dynamic_sections_created
8823 || h->dynindx == -1
8824 || SYMBOL_REFERENCES_LOCAL (info, h)
21d68fcd 8825 || UNDEFWEAK_NO_DYNAMIC_RELOC (info, h))
7619e7c7
AM
8826 /* This is actually a static link, or it is a
8827 -Bsymbolic link and the symbol is defined
8828 locally, or the symbol was forced to be local
8829 because of a version file. */
8830 ;
8831 else
8832 {
8833 indx = h->dynindx;
8834 unresolved_reloc = FALSE;
8835 }
8836 offp = &h->got.offset;
8837 }
8838 else
8839 {
8840 if (local_got_offsets == NULL)
8841 abort ();
8842 offp = &local_got_offsets[r_symndx];
8843 }
8844
8845 /* The offset must always be a multiple of 4. We use the
8846 least significant bit to record whether we have already
8847 processed this entry. */
8848 off = *offp;
8849 if ((off & 1) != 0)
8850 off &= ~1;
8851 else
8852 {
37da22e5
AM
8853 unsigned int tls_m = ((tls_mask & TLS_TLS) != 0
8854 ? tls_mask & (TLS_LD | TLS_GD | TLS_DTPREL
8855 | TLS_TPREL | TLS_TPRELGD)
8856 : 0);
70bccea4
AM
8857
8858 if (offp == &htab->tlsld_got.offset)
8859 tls_m = TLS_LD;
8860 else if (h == NULL
f5385ebf 8861 || !h->def_dynamic)
70bccea4
AM
8862 tls_m &= ~TLS_LD;
8863
8864 /* We might have multiple got entries for this sym.
8865 Initialize them all. */
8866 do
7619e7c7 8867 {
70bccea4
AM
8868 int tls_ty = 0;
8869
8870 if ((tls_m & TLS_LD) != 0)
7619e7c7 8871 {
70bccea4
AM
8872 tls_ty = TLS_TLS | TLS_LD;
8873 tls_m &= ~TLS_LD;
8874 }
8875 else if ((tls_m & TLS_GD) != 0)
8876 {
8877 tls_ty = TLS_TLS | TLS_GD;
8878 tls_m &= ~TLS_GD;
8879 }
8880 else if ((tls_m & TLS_DTPREL) != 0)
8881 {
8882 tls_ty = TLS_TLS | TLS_DTPREL;
8883 tls_m &= ~TLS_DTPREL;
8884 }
8885 else if ((tls_m & (TLS_TPREL | TLS_TPRELGD)) != 0)
8886 {
8887 tls_ty = TLS_TLS | TLS_TPREL;
8888 tls_m = 0;
7619e7c7 8889 }
7619e7c7 8890
70bccea4 8891 /* Generate relocs for the dynamic linker. */
f0158f44
AM
8892 if (indx != 0
8893 || (bfd_link_pic (info)
8894 && (h == NULL
21d68fcd 8895 || !UNDEFWEAK_NO_DYNAMIC_RELOC (info, h)
f15d0b54
AM
8896 || offp == &htab->tlsld_got.offset)
8897 && !(tls_ty == (TLS_TLS | TLS_TPREL)
8898 && bfd_link_executable (info)
8899 && SYMBOL_REFERENCES_LOCAL (info, h))))
7619e7c7 8900 {
ce558b89 8901 asection *rsec = htab->elf.srelgot;
91d6fa6a 8902 bfd_byte * loc;
91e21fb7 8903
0bed072f 8904 if (ifunc != NULL)
82e66161
AM
8905 {
8906 rsec = htab->elf.irelplt;
8907 if (indx == 0)
8908 htab->local_ifunc_resolver = 1;
8909 else if (is_static_defined (h))
8910 htab->maybe_local_ifunc_resolver = 1;
8911 }
ce558b89
AM
8912 outrel.r_offset = (htab->elf.sgot->output_section->vma
8913 + htab->elf.sgot->output_offset
70bccea4 8914 + off);
e515b051 8915 outrel.r_addend = 0;
70bccea4
AM
8916 if (tls_ty & (TLS_LD | TLS_GD))
8917 {
8918 outrel.r_info = ELF32_R_INFO (indx, R_PPC_DTPMOD32);
70bccea4
AM
8919 if (tls_ty == (TLS_TLS | TLS_GD))
8920 {
25f23106
AM
8921 loc = rsec->contents;
8922 loc += (rsec->reloc_count++
70bccea4
AM
8923 * sizeof (Elf32_External_Rela));
8924 bfd_elf32_swap_reloca_out (output_bfd,
8925 &outrel, loc);
e515b051 8926 outrel.r_offset += 4;
70bccea4
AM
8927 outrel.r_info
8928 = ELF32_R_INFO (indx, R_PPC_DTPREL32);
70bccea4
AM
8929 }
8930 }
8931 else if (tls_ty == (TLS_TLS | TLS_DTPREL))
8932 outrel.r_info = ELF32_R_INFO (indx, R_PPC_DTPREL32);
8933 else if (tls_ty == (TLS_TLS | TLS_TPREL))
8934 outrel.r_info = ELF32_R_INFO (indx, R_PPC_TPREL32);
25f23106 8935 else if (indx != 0)
70bccea4 8936 outrel.r_info = ELF32_R_INFO (indx, R_PPC_GLOB_DAT);
25f23106
AM
8937 else if (ifunc != NULL)
8938 outrel.r_info = ELF32_R_INFO (0, R_PPC_IRELATIVE);
8939 else
8940 outrel.r_info = ELF32_R_INFO (0, R_PPC_RELATIVE);
d6e14abc 8941 if (indx == 0 && tls_ty != (TLS_TLS | TLS_LD))
e515b051
AM
8942 {
8943 outrel.r_addend += relocation;
8944 if (tls_ty & (TLS_GD | TLS_DTPREL | TLS_TPREL))
989f9879
AM
8945 {
8946 if (htab->elf.tls_sec == NULL)
8947 outrel.r_addend = 0;
8948 else
8949 outrel.r_addend -= htab->elf.tls_sec->vma;
8950 }
e515b051 8951 }
25f23106
AM
8952 loc = rsec->contents;
8953 loc += (rsec->reloc_count++
70bccea4
AM
8954 * sizeof (Elf32_External_Rela));
8955 bfd_elf32_swap_reloca_out (output_bfd, &outrel, loc);
7619e7c7
AM
8956 }
8957
70bccea4
AM
8958 /* Init the .got section contents if we're not
8959 emitting a reloc. */
8960 else
7619e7c7 8961 {
70bccea4
AM
8962 bfd_vma value = relocation;
8963
f0158f44 8964 if (tls_ty != 0)
70bccea4 8965 {
989f9879
AM
8966 if (htab->elf.tls_sec == NULL)
8967 value = 0;
8968 else
8969 {
f0158f44
AM
8970 if (tls_ty & TLS_LD)
8971 value = 0;
8972 else
8973 value -= htab->elf.tls_sec->vma + DTP_OFFSET;
676ee2b5 8974 if (tls_ty & TLS_TPREL)
989f9879
AM
8975 value += DTP_OFFSET - TP_OFFSET;
8976 }
70bccea4 8977
f0158f44 8978 if (tls_ty & (TLS_LD | TLS_GD))
7b609f53 8979 {
95f0d0d2 8980 bfd_put_32 (input_bfd, value,
ce558b89 8981 htab->elf.sgot->contents + off + 4);
676ee2b5 8982 value = 1;
7b609f53 8983 }
70bccea4 8984 }
95f0d0d2 8985 bfd_put_32 (input_bfd, value,
ce558b89 8986 htab->elf.sgot->contents + off);
7619e7c7 8987 }
70bccea4
AM
8988
8989 off += 4;
8990 if (tls_ty & (TLS_LD | TLS_GD))
8991 off += 4;
7619e7c7 8992 }
70bccea4
AM
8993 while (tls_m != 0);
8994
8995 off = *offp;
8996 *offp = off | 1;
7619e7c7
AM
8997 }
8998
8999 if (off >= (bfd_vma) -2)
9000 abort ();
9001
70bccea4
AM
9002 if ((tls_type & TLS_TLS) != 0)
9003 {
9004 if (tls_type != (TLS_TLS | TLS_LD))
9005 {
9006 if ((tls_mask & TLS_LD) != 0
9007 && !(h == NULL
f5385ebf 9008 || !h->def_dynamic))
70bccea4
AM
9009 off += 8;
9010 if (tls_type != (TLS_TLS | TLS_GD))
9011 {
9012 if ((tls_mask & TLS_GD) != 0)
9013 off += 8;
9014 if (tls_type != (TLS_TLS | TLS_DTPREL))
9015 {
9016 if ((tls_mask & TLS_DTPREL) != 0)
9017 off += 4;
9018 }
9019 }
9020 }
9021 }
9022
d3e454b9
AM
9023 /* If here for a picfixup, we're done. */
9024 if (r_type != ELF32_R_TYPE (rel->r_info))
c316a17c 9025 goto copy_reloc;
d3e454b9 9026
ce558b89
AM
9027 relocation = (htab->elf.sgot->output_section->vma
9028 + htab->elf.sgot->output_offset
e87d4038
AM
9029 + off
9030 - SYM_VAL (htab->elf.hgot));
7619e7c7
AM
9031
9032 /* Addends on got relocations don't make much sense.
9033 x+off@got is actually x@got+off, and since the got is
9034 generated by a hash table traversal, the value in the
9035 got at entry m+n bears little relation to the entry m. */
9036 if (addend != 0)
25f53a85 9037 info->callbacks->einfo
695344c0 9038 /* xgettext:c-format */
174d0a74 9039 (_("%H: non-zero addend on %s reloc against `%s'\n"),
25f53a85 9040 input_bfd, input_section, rel->r_offset,
7b609f53 9041 howto->name,
7619e7c7
AM
9042 sym_name);
9043 }
86c95733 9044 break;
7619e7c7 9045
86c95733 9046 /* Relocations that need no special processing. */
7619e7c7 9047 case R_PPC_LOCAL24PC:
252b5132
RH
9048 /* It makes no sense to point a local relocation
9049 at a symbol not in this object. */
7b609f53 9050 if (unresolved_reloc)
252b5132 9051 {
1a72702b
AM
9052 (*info->callbacks->undefined_symbol) (info,
9053 h->root.root.string,
9054 input_bfd,
9055 input_section,
9056 rel->r_offset,
9057 TRUE);
c316a17c 9058 goto copy_reloc;
252b5132 9059 }
888a7fc3
AM
9060 if (h != NULL && h->type == STT_GNU_IFUNC && bfd_link_pic (info))
9061 {
9062 /* @local on an ifunc does not really make sense since
9063 the ifunc resolver can take you anywhere. More
9064 seriously, calls to ifuncs must go through a plt call
9065 stub, and for pic the plt call stubs uses r30 to
9066 access the PLT. The problem is that a call that is
9067 local won't have the +32k reloc addend trick marking
9068 -fPIC code, so the linker won't know whether r30 is
9069 _GLOBAL_OFFSET_TABLE_ or pointing into a .got2 section. */
695344c0 9070 /* xgettext:c-format */
174d0a74 9071 info->callbacks->einfo (_("%X%H: @local call to ifunc %s\n"),
888a7fc3
AM
9072 input_bfd, input_section, rel->r_offset,
9073 h->root.root.string);
9074 }
252b5132
RH
9075 break;
9076
7619e7c7
AM
9077 case R_PPC_DTPREL16:
9078 case R_PPC_DTPREL16_LO:
9079 case R_PPC_DTPREL16_HI:
9080 case R_PPC_DTPREL16_HA:
989f9879
AM
9081 if (htab->elf.tls_sec != NULL)
9082 addend -= htab->elf.tls_sec->vma + DTP_OFFSET;
7619e7c7
AM
9083 break;
9084
70bccea4
AM
9085 /* Relocations that may need to be propagated if this is a shared
9086 object. */
7619e7c7
AM
9087 case R_PPC_TPREL16:
9088 case R_PPC_TPREL16_LO:
9089 case R_PPC_TPREL16_HI:
9090 case R_PPC_TPREL16_HA:
766bc656
AM
9091 if (h != NULL
9092 && h->root.type == bfd_link_hash_undefweak
9093 && h->dynindx == -1)
9094 {
9095 /* Make this relocation against an undefined weak symbol
9096 resolve to zero. This is really just a tweak, since
9097 code using weak externs ought to check that they are
9098 defined before using them. */
9099 bfd_byte *p = contents + rel->r_offset - d_offset;
95f0d0d2 9100 unsigned int insn = bfd_get_32 (input_bfd, p);
766bc656
AM
9101 insn = _bfd_elf_ppc_at_tprel_transform (insn, 2);
9102 if (insn != 0)
95f0d0d2 9103 bfd_put_32 (input_bfd, insn, p);
766bc656
AM
9104 break;
9105 }
989f9879
AM
9106 if (htab->elf.tls_sec != NULL)
9107 addend -= htab->elf.tls_sec->vma + TP_OFFSET;
7619e7c7 9108 /* The TPREL16 relocs shouldn't really be used in shared
7c8bbca5
AM
9109 libs or with non-local symbols as that will result in
9110 DT_TEXTREL being set, but support them anyway. */
7619e7c7
AM
9111 goto dodyn;
9112
9113 case R_PPC_TPREL32:
989f9879
AM
9114 if (htab->elf.tls_sec != NULL)
9115 addend -= htab->elf.tls_sec->vma + TP_OFFSET;
7619e7c7
AM
9116 goto dodyn;
9117
9118 case R_PPC_DTPREL32:
989f9879
AM
9119 if (htab->elf.tls_sec != NULL)
9120 addend -= htab->elf.tls_sec->vma + DTP_OFFSET;
7619e7c7
AM
9121 goto dodyn;
9122
e515b051
AM
9123 case R_PPC_DTPMOD32:
9124 relocation = 1;
9125 addend = 0;
9126 goto dodyn;
9127
d7128ce4
AM
9128 case R_PPC_REL16:
9129 case R_PPC_REL16_LO:
9130 case R_PPC_REL16_HI:
9131 case R_PPC_REL16_HA:
a680de9a 9132 case R_PPC_REL16DX_HA:
d7128ce4
AM
9133 break;
9134
7619e7c7 9135 case R_PPC_REL32:
625af618
AM
9136 if (h == NULL || h == htab->elf.hgot)
9137 break;
9138 /* fall through */
9139
9140 case R_PPC_ADDR32:
9141 case R_PPC_ADDR16:
9142 case R_PPC_ADDR16_LO:
9143 case R_PPC_ADDR16_HI:
9144 case R_PPC_ADDR16_HA:
9145 case R_PPC_UADDR32:
9146 case R_PPC_UADDR16:
9147 goto dodyn;
9148
b9c361e0
JL
9149 case R_PPC_VLE_REL8:
9150 case R_PPC_VLE_REL15:
9151 case R_PPC_VLE_REL24:
625af618 9152 case R_PPC_REL24:
7619e7c7
AM
9153 case R_PPC_REL14:
9154 case R_PPC_REL14_BRTAKEN:
9155 case R_PPC_REL14_BRNTAKEN:
252b5132
RH
9156 /* If these relocations are not to a named symbol, they can be
9157 handled right here, no need to bother the dynamic linker. */
89200bf8 9158 if (SYMBOL_CALLS_LOCAL (info, h)
3b36f7e6 9159 || h == htab->elf.hgot)
252b5132 9160 break;
70bccea4 9161 /* fall through */
252b5132 9162
7619e7c7 9163 case R_PPC_ADDR24:
7619e7c7
AM
9164 case R_PPC_ADDR14:
9165 case R_PPC_ADDR14_BRTAKEN:
9166 case R_PPC_ADDR14_BRNTAKEN:
0e1862bb 9167 if (h != NULL && !bfd_link_pic (info))
625af618
AM
9168 break;
9169 /* fall through */
9170
7619e7c7 9171 dodyn:
3348747a
NS
9172 if ((input_section->flags & SEC_ALLOC) == 0
9173 || is_vxworks_tls)
c87b5a93 9174 break;
c87b5a93 9175
287c7eaf
AM
9176 if (bfd_link_pic (info)
9177 ? ((h == NULL
9178 || ppc_elf_hash_entry (h)->dyn_relocs != NULL)
9179 && ((h != NULL && pc_dynrelocs (h))
9180 || must_be_dyn_reloc (info, r_type)))
9181 : (h != NULL
9182 && ppc_elf_hash_entry (h)->dyn_relocs != NULL))
252b5132 9183 {
0bb2d96a 9184 int skip;
f95f8542
AM
9185 bfd_byte *loc;
9186 asection *sreloc;
82e66161
AM
9187 long indx = 0;
9188
252b5132 9189#ifdef DEBUG
55fd94b0
AM
9190 fprintf (stderr, "ppc_elf_relocate_section needs to "
9191 "create relocation for %s\n",
70bccea4
AM
9192 (h && h->root.root.string
9193 ? h->root.root.string : "<unknown>"));
252b5132
RH
9194#endif
9195
9196 /* When generating a shared object, these relocations
70bccea4
AM
9197 are copied into the output file to be resolved at run
9198 time. */
0bb2d96a 9199 skip = 0;
5b914448
AM
9200 outrel.r_offset = _bfd_elf_section_offset (output_bfd, info,
9201 input_section,
9202 rel->r_offset);
0bb2d96a
JJ
9203 if (outrel.r_offset == (bfd_vma) -1
9204 || outrel.r_offset == (bfd_vma) -2)
9205 skip = (int) outrel.r_offset;
252b5132
RH
9206 outrel.r_offset += (input_section->output_section->vma
9207 + input_section->output_offset);
9208
9209 if (skip)
9210 memset (&outrel, 0, sizeof outrel);
21d68fcd 9211 else if (!SYMBOL_REFERENCES_LOCAL (info, h))
252b5132 9212 {
82e66161
AM
9213 indx = h->dynindx;
9214 BFD_ASSERT (indx != -1);
7619e7c7 9215 unresolved_reloc = FALSE;
82e66161 9216 outrel.r_info = ELF32_R_INFO (indx, r_type);
252b5132
RH
9217 outrel.r_addend = rel->r_addend;
9218 }
9219 else
9220 {
47388f4c
AM
9221 outrel.r_addend = relocation + rel->r_addend;
9222
25f23106 9223 if (r_type != R_PPC_ADDR32)
252b5132 9224 {
25f23106
AM
9225 if (ifunc != NULL)
9226 {
9227 /* If we get here when building a static
9228 executable, then the libc startup function
9229 responsible for applying indirect function
9230 relocations is going to complain about
9231 the reloc type.
9232 If we get here when building a dynamic
9233 executable, it will be because we have
9234 a text relocation. The dynamic loader
9235 will set the text segment writable and
9236 non-executable to apply text relocations.
9237 So we'll segfault when trying to run the
9238 indirection function to resolve the reloc. */
25f53a85 9239 info->callbacks->einfo
695344c0 9240 /* xgettext:c-format */
174d0a74 9241 (_("%H: relocation %s for indirect "
25f53a85
AM
9242 "function %s unsupported\n"),
9243 input_bfd, input_section, rel->r_offset,
25f23106
AM
9244 howto->name,
9245 sym_name);
9246 ret = FALSE;
9247 }
cf35638d 9248 else if (r_symndx == STN_UNDEF || bfd_is_abs_section (sec))
89200bf8 9249 ;
252b5132
RH
9250 else if (sec == NULL || sec->owner == NULL)
9251 {
9252 bfd_set_error (bfd_error_bad_value);
89200bf8 9253 ret = FALSE;
252b5132
RH
9254 }
9255 else
9256 {
9257 asection *osec;
9258
47388f4c
AM
9259 /* We are turning this relocation into one
9260 against a section symbol. It would be
9261 proper to subtract the symbol's value,
9262 osec->vma, from the emitted reloc addend,
25f23106
AM
9263 but ld.so expects buggy relocs.
9264 FIXME: Why not always use a zero index? */
252b5132
RH
9265 osec = sec->output_section;
9266 indx = elf_section_data (osec)->dynindx;
74541ad4
AM
9267 if (indx == 0)
9268 {
9269 osec = htab->elf.text_index_section;
9270 indx = elf_section_data (osec)->dynindx;
9271 }
9272 BFD_ASSERT (indx != 0);
252b5132 9273#ifdef DEBUG
74541ad4 9274 if (indx == 0)
e460dd0d 9275 printf ("indx=%ld section=%s flags=%08x name=%s\n",
55fd94b0
AM
9276 indx, osec->name, osec->flags,
9277 h->root.root.string);
252b5132
RH
9278#endif
9279 }
9280
9281 outrel.r_info = ELF32_R_INFO (indx, r_type);
252b5132 9282 }
25f23106
AM
9283 else if (ifunc != NULL)
9284 outrel.r_info = ELF32_R_INFO (0, R_PPC_IRELATIVE);
9285 else
9286 outrel.r_info = ELF32_R_INFO (0, R_PPC_RELATIVE);
252b5132
RH
9287 }
9288
82e66161
AM
9289 sreloc = elf_section_data (input_section)->sreloc;
9290 if (ifunc)
9291 {
9292 sreloc = htab->elf.irelplt;
9293 if (indx == 0)
9294 htab->local_ifunc_resolver = 1;
9295 else if (is_static_defined (h))
9296 htab->maybe_local_ifunc_resolver = 1;
9297 }
9298 if (sreloc == NULL)
9299 return FALSE;
9300
947216bf
AM
9301 loc = sreloc->contents;
9302 loc += sreloc->reloc_count++ * sizeof (Elf32_External_Rela);
9303 bfd_elf32_swap_reloca_out (output_bfd, &outrel, loc);
252b5132 9304
2243deae 9305 if (skip == -1)
c316a17c 9306 goto copy_reloc;
2243deae 9307
f0158f44
AM
9308 /* This reloc will be computed at runtime. Clear the memory
9309 so that it contains a predictable value for prelink. */
9310 if (!skip)
2243deae
L
9311 {
9312 relocation = howto->pc_relative ? outrel.r_offset : 0;
9313 addend = 0;
9314 break;
9315 }
252b5132 9316 }
252b5132
RH
9317 break;
9318
32af9f6e
AM
9319 case R_PPC_RELAX_PLT:
9320 case R_PPC_RELAX_PLTREL24:
de972ffa
AM
9321 if (h != NULL)
9322 {
32af9f6e
AM
9323 struct plt_entry *ent;
9324 bfd_vma got2_addend = 0;
9325
9326 if (r_type == R_PPC_RELAX_PLTREL24)
9327 {
0e1862bb 9328 if (bfd_link_pic (info))
32af9f6e
AM
9329 got2_addend = addend;
9330 addend = 0;
9331 }
9332 ent = find_plt_ent (&h->plt.plist, got2, got2_addend);
de972ffa
AM
9333 if (htab->plt_type == PLT_NEW)
9334 relocation = (htab->glink->output_section->vma
9335 + htab->glink->output_offset
9336 + ent->glink_offset);
9337 else
ce558b89
AM
9338 relocation = (htab->elf.splt->output_section->vma
9339 + htab->elf.splt->output_offset
de972ffa
AM
9340 + ent->plt.offset);
9341 }
1a0670f3 9342 /* Fall through. */
b4a38de6 9343
32af9f6e 9344 case R_PPC_RELAX:
9abc968f 9345 {
53291d1f
AM
9346 const int *stub;
9347 size_t size;
9348 size_t insn_offset = rel->r_offset;
9349 unsigned int insn;
9abc968f 9350
0e1862bb 9351 if (bfd_link_pic (info))
53291d1f
AM
9352 {
9353 relocation -= (input_section->output_section->vma
9354 + input_section->output_offset
9355 + rel->r_offset - 4);
9356 stub = shared_stub_entry;
95f0d0d2
AM
9357 bfd_put_32 (input_bfd, stub[0], contents + insn_offset - 12);
9358 bfd_put_32 (input_bfd, stub[1], contents + insn_offset - 8);
9359 bfd_put_32 (input_bfd, stub[2], contents + insn_offset - 4);
53291d1f
AM
9360 stub += 3;
9361 size = ARRAY_SIZE (shared_stub_entry) - 3;
9362 }
9363 else
9364 {
9365 stub = stub_entry;
9366 size = ARRAY_SIZE (stub_entry);
9367 }
9abc968f 9368
9abc968f 9369 relocation += addend;
0e1862bb 9370 if (bfd_link_relocatable (info))
53291d1f
AM
9371 relocation = 0;
9372
9373 /* First insn is HA, second is LO. */
9374 insn = *stub++;
9375 insn |= ((relocation + 0x8000) >> 16) & 0xffff;
95f0d0d2 9376 bfd_put_32 (input_bfd, insn, contents + insn_offset);
53291d1f
AM
9377 insn_offset += 4;
9378
9379 insn = *stub++;
9380 insn |= relocation & 0xffff;
95f0d0d2 9381 bfd_put_32 (input_bfd, insn, contents + insn_offset);
53291d1f
AM
9382 insn_offset += 4;
9383 size -= 2;
9384
9385 while (size != 0)
9386 {
9387 insn = *stub++;
9388 --size;
95f0d0d2 9389 bfd_put_32 (input_bfd, insn, contents + insn_offset);
53291d1f
AM
9390 insn_offset += 4;
9391 }
9bc4e62b
NS
9392
9393 /* Rewrite the reloc and convert one of the trailing nop
9394 relocs to describe this relocation. */
9395 BFD_ASSERT (ELF32_R_TYPE (relend[-1].r_info) == R_PPC_NONE);
9396 /* The relocs are at the bottom 2 bytes */
c316a17c
AM
9397 wrel->r_offset = rel->r_offset + d_offset;
9398 wrel->r_info = ELF32_R_INFO (r_symndx, R_PPC_ADDR16_HA);
9399 wrel->r_addend = rel->r_addend;
9400 memmove (wrel + 1, wrel, (relend - wrel - 1) * sizeof (*wrel));
9401 wrel++, rel++;
9402 wrel->r_offset += 4;
9403 wrel->r_info = ELF32_R_INFO (r_symndx, R_PPC_ADDR16_LO);
9abc968f 9404 }
8517fae7 9405 continue;
deaaf2f3 9406
70bccea4 9407 /* Indirect .sdata relocation. */
7619e7c7 9408 case R_PPC_EMB_SDAI16:
c9a2f333 9409 BFD_ASSERT (htab->sdata[0].section != NULL);
bd6c6e2b
AM
9410 if (!is_static_defined (htab->sdata[0].sym))
9411 {
9412 unresolved_reloc = TRUE;
9413 break;
9414 }
7619e7c7 9415 relocation
76750a2f
AM
9416 = elf_finish_pointer_linker_section (input_bfd, &htab->sdata[0],
9417 h, relocation, rel);
bd6c6e2b 9418 addend = 0;
252b5132
RH
9419 break;
9420
70bccea4 9421 /* Indirect .sdata2 relocation. */
7619e7c7 9422 case R_PPC_EMB_SDA2I16:
c9a2f333 9423 BFD_ASSERT (htab->sdata[1].section != NULL);
bd6c6e2b
AM
9424 if (!is_static_defined (htab->sdata[1].sym))
9425 {
9426 unresolved_reloc = TRUE;
9427 break;
9428 }
7619e7c7 9429 relocation
76750a2f
AM
9430 = elf_finish_pointer_linker_section (input_bfd, &htab->sdata[1],
9431 h, relocation, rel);
bd6c6e2b 9432 addend = 0;
252b5132
RH
9433 break;
9434
70bccea4
AM
9435 /* Handle the TOC16 reloc. We want to use the offset within the .got
9436 section, not the actual VMA. This is appropriate when generating
9437 an embedded ELF object, for which the .got section acts like the
9438 AIX .toc section. */
7619e7c7 9439 case R_PPC_TOC16: /* phony GOT16 relocations */
3b4f3a11
AM
9440 if (sec == NULL || sec->output_section == NULL)
9441 {
9442 unresolved_reloc = TRUE;
9443 break;
9444 }
a0f49396
NC
9445 BFD_ASSERT (strcmp (bfd_get_section_name (sec->owner, sec),
9446 ".got") == 0
9447 || strcmp (bfd_get_section_name (sec->owner, sec),
9448 ".cgot") == 0);
252b5132 9449
3b4f3a11 9450 addend -= sec->output_section->vma + sec->output_offset + 0x8000;
252b5132
RH
9451 break;
9452
7619e7c7 9453 case R_PPC_PLTREL24:
f75e0e33
AM
9454 if (h != NULL && ifunc == NULL)
9455 {
cbf95972
AM
9456 struct plt_entry *ent;
9457
9458 ent = find_plt_ent (&h->plt.plist, got2,
9459 bfd_link_pic (info) ? addend : 0);
f75e0e33 9460 if (ent == NULL
ce558b89 9461 || htab->elf.splt == NULL)
f75e0e33
AM
9462 {
9463 /* We didn't make a PLT entry for this symbol. This
9464 happens when statically linking PIC code, or when
9465 using -Bsymbolic. */
9466 }
9467 else
9468 {
9469 /* Relocation is to the entry for this symbol in the
9470 procedure linkage table. */
9471 unresolved_reloc = FALSE;
9472 if (htab->plt_type == PLT_NEW)
9473 relocation = (htab->glink->output_section->vma
9474 + htab->glink->output_offset
9475 + ent->glink_offset);
9476 else
ce558b89
AM
9477 relocation = (htab->elf.splt->output_section->vma
9478 + htab->elf.splt->output_offset
f75e0e33
AM
9479 + ent->plt.offset);
9480 }
9481 }
252b5132 9482
f75e0e33
AM
9483 /* R_PPC_PLTREL24 is rather special. If non-zero, the
9484 addend specifies the GOT pointer offset within .got2.
9485 Don't apply it to the relocation field. */
9486 addend = 0;
8da6118f 9487 break;
252b5132 9488
23cedd1d
AM
9489 case R_PPC_PLTSEQ:
9490 case R_PPC_PLTCALL:
08be3224
AM
9491 case R_PPC_PLT16_LO:
9492 case R_PPC_PLT16_HI:
9493 case R_PPC_PLT16_HA:
2d7ad24e 9494 plt_list = NULL;
08be3224
AM
9495 if (h != NULL)
9496 plt_list = &h->plt.plist;
2d7ad24e
AM
9497 else if (ifunc != NULL)
9498 plt_list = ifunc;
9499 else if (local_got_offsets != NULL)
9500 {
9501 struct plt_entry **local_plt;
9502 local_plt = (struct plt_entry **) (local_got_offsets
9503 + symtab_hdr->sh_info);
9504 plt_list = local_plt + r_symndx;
9505 }
08be3224
AM
9506 unresolved_reloc = TRUE;
9507 if (plt_list != NULL)
9508 {
9509 struct plt_entry *ent;
9510
9511 ent = find_plt_ent (plt_list, got2,
9512 bfd_link_pic (info) ? addend : 0);
2d7ad24e 9513 if (ent != NULL && ent->plt.offset != (bfd_vma) -1)
08be3224 9514 {
2d7ad24e
AM
9515 asection *plt;
9516
08be3224 9517 unresolved_reloc = FALSE;
2d7ad24e
AM
9518 plt = htab->elf.splt;
9519 if (!htab->elf.dynamic_sections_created
9520 || h == NULL
9521 || h->dynindx == -1)
9522 {
9523 if (ifunc != NULL)
9524 plt = htab->elf.iplt;
9525 else
9526 plt = htab->pltlocal;
9527 }
9528 relocation = (plt->output_section->vma
9529 + plt->output_offset
08be3224
AM
9530 + ent->plt.offset);
9531 if (bfd_link_pic (info))
9532 {
9533 bfd_vma got = 0;
9534
9535 if (ent->addend >= 32768)
9536 got = (ent->addend
9537 + ent->sec->output_section->vma
9538 + ent->sec->output_offset);
9539 else
9540 got = SYM_VAL (htab->elf.hgot);
9541 relocation -= got;
9542 }
9543 }
9544 }
9545 addend = 0;
9546 break;
9547
70bccea4 9548 /* Relocate against _SDA_BASE_. */
7619e7c7 9549 case R_PPC_SDAREL16:
252b5132
RH
9550 {
9551 const char *name;
bd6c6e2b 9552 struct elf_link_hash_entry *sda = htab->sdata[0].sym;
252b5132 9553
bd6c6e2b
AM
9554 if (sec == NULL
9555 || sec->output_section == NULL
9556 || !is_static_defined (sda))
3b4f3a11
AM
9557 {
9558 unresolved_reloc = TRUE;
9559 break;
9560 }
bd6c6e2b 9561 addend -= SYM_VAL (sda);
3b4f3a11 9562
a0f49396 9563 name = bfd_get_section_name (output_bfd, sec->output_section);
93d1b056
AM
9564 if (!(strcmp (name, ".sdata") == 0
9565 || strcmp (name, ".sbss") == 0))
252b5132 9566 {
cf97bcb0 9567 _bfd_error_handler
695344c0 9568 /* xgettext:c-format */
cf97bcb0
AM
9569 (_("%pB: the target (%s) of a %s relocation is "
9570 "in the wrong output section (%s)"),
d003868e 9571 input_bfd,
55fd94b0
AM
9572 sym_name,
9573 howto->name,
9574 name);
252b5132 9575 }
252b5132
RH
9576 }
9577 break;
9578
70bccea4 9579 /* Relocate against _SDA2_BASE_. */
7619e7c7 9580 case R_PPC_EMB_SDA2REL:
252b5132
RH
9581 {
9582 const char *name;
bd6c6e2b 9583 struct elf_link_hash_entry *sda = htab->sdata[1].sym;
252b5132 9584
bd6c6e2b
AM
9585 if (sec == NULL
9586 || sec->output_section == NULL
9587 || !is_static_defined (sda))
3b4f3a11
AM
9588 {
9589 unresolved_reloc = TRUE;
9590 break;
9591 }
bd6c6e2b 9592 addend -= SYM_VAL (sda);
3b4f3a11 9593
a0f49396 9594 name = bfd_get_section_name (output_bfd, sec->output_section);
93d1b056
AM
9595 if (!(strcmp (name, ".sdata2") == 0
9596 || strcmp (name, ".sbss2") == 0))
252b5132 9597 {
cf97bcb0 9598 _bfd_error_handler
695344c0 9599 /* xgettext:c-format */
cf97bcb0
AM
9600 (_("%pB: the target (%s) of a %s relocation is "
9601 "in the wrong output section (%s)"),
d003868e 9602 input_bfd,
55fd94b0
AM
9603 sym_name,
9604 howto->name,
9605 name);
252b5132 9606 }
252b5132
RH
9607 }
9608 break;
9609
b9c361e0 9610 case R_PPC_VLE_LO16A:
86c95733 9611 relocation = relocation + addend;
08dc996f
AM
9612 ppc_elf_vle_split16 (input_bfd, input_section, rel->r_offset,
9613 contents + rel->r_offset, relocation,
9614 split16a_type, htab->params->vle_reloc_fixup);
c316a17c 9615 goto copy_reloc;
b9c361e0
JL
9616
9617 case R_PPC_VLE_LO16D:
86c95733 9618 relocation = relocation + addend;
08dc996f
AM
9619 ppc_elf_vle_split16 (input_bfd, input_section, rel->r_offset,
9620 contents + rel->r_offset, relocation,
9621 split16d_type, htab->params->vle_reloc_fixup);
c316a17c 9622 goto copy_reloc;
b9c361e0
JL
9623
9624 case R_PPC_VLE_HI16A:
86c95733 9625 relocation = (relocation + addend) >> 16;
08dc996f
AM
9626 ppc_elf_vle_split16 (input_bfd, input_section, rel->r_offset,
9627 contents + rel->r_offset, relocation,
9628 split16a_type, htab->params->vle_reloc_fixup);
c316a17c 9629 goto copy_reloc;
b9c361e0
JL
9630
9631 case R_PPC_VLE_HI16D:
86c95733 9632 relocation = (relocation + addend) >> 16;
08dc996f
AM
9633 ppc_elf_vle_split16 (input_bfd, input_section, rel->r_offset,
9634 contents + rel->r_offset, relocation,
9635 split16d_type, htab->params->vle_reloc_fixup);
c316a17c 9636 goto copy_reloc;
b9c361e0
JL
9637
9638 case R_PPC_VLE_HA16A:
86c95733 9639 relocation = (relocation + addend + 0x8000) >> 16;
08dc996f
AM
9640 ppc_elf_vle_split16 (input_bfd, input_section, rel->r_offset,
9641 contents + rel->r_offset, relocation,
9642 split16a_type, htab->params->vle_reloc_fixup);
c316a17c 9643 goto copy_reloc;
b9c361e0
JL
9644
9645 case R_PPC_VLE_HA16D:
86c95733 9646 relocation = (relocation + addend + 0x8000) >> 16;
08dc996f
AM
9647 ppc_elf_vle_split16 (input_bfd, input_section, rel->r_offset,
9648 contents + rel->r_offset, relocation,
9649 split16d_type, htab->params->vle_reloc_fixup);
c316a17c 9650 goto copy_reloc;
b9c361e0 9651
70bccea4 9652 /* Relocate against either _SDA_BASE_, _SDA2_BASE_, or 0. */
7619e7c7 9653 case R_PPC_EMB_SDA21:
b9c361e0 9654 case R_PPC_VLE_SDA21:
7619e7c7 9655 case R_PPC_EMB_RELSDA:
b9c361e0 9656 case R_PPC_VLE_SDA21_LO:
252b5132
RH
9657 {
9658 const char *name;
9659 int reg;
86c95733 9660 unsigned int insn;
bd6c6e2b 9661 struct elf_link_hash_entry *sda = NULL;
252b5132 9662
3b4f3a11
AM
9663 if (sec == NULL || sec->output_section == NULL)
9664 {
9665 unresolved_reloc = TRUE;
9666 break;
9667 }
9668
a0f49396 9669 name = bfd_get_section_name (output_bfd, sec->output_section);
93d1b056
AM
9670 if (strcmp (name, ".sdata") == 0
9671 || strcmp (name, ".sbss") == 0)
252b5132
RH
9672 {
9673 reg = 13;
bd6c6e2b 9674 sda = htab->sdata[0].sym;
252b5132 9675 }
93d1b056
AM
9676 else if (strcmp (name, ".sdata2") == 0
9677 || strcmp (name, ".sbss2") == 0)
252b5132
RH
9678 {
9679 reg = 2;
bd6c6e2b 9680 sda = htab->sdata[1].sym;
252b5132 9681 }
8da6118f
KH
9682 else if (strcmp (name, ".PPC.EMB.sdata0") == 0
9683 || strcmp (name, ".PPC.EMB.sbss0") == 0)
252b5132
RH
9684 {
9685 reg = 0;
9686 }
252b5132
RH
9687 else
9688 {
cf97bcb0 9689 _bfd_error_handler
695344c0 9690 /* xgettext:c-format */
cf97bcb0
AM
9691 (_("%pB: the target (%s) of a %s relocation is "
9692 "in the wrong output section (%s)"),
d003868e 9693 input_bfd,
55fd94b0
AM
9694 sym_name,
9695 howto->name,
9696 name);
252b5132
RH
9697
9698 bfd_set_error (bfd_error_bad_value);
b34976b6 9699 ret = FALSE;
c316a17c 9700 goto copy_reloc;
252b5132
RH
9701 }
9702
bd6c6e2b
AM
9703 if (sda != NULL)
9704 {
9705 if (!is_static_defined (sda))
9706 {
9707 unresolved_reloc = TRUE;
9708 break;
9709 }
9710 addend -= SYM_VAL (sda);
9711 }
9712
95f0d0d2 9713 insn = bfd_get_32 (input_bfd, contents + rel->r_offset);
b9c361e0
JL
9714 if (reg == 0
9715 && (r_type == R_PPC_VLE_SDA21
9716 || r_type == R_PPC_VLE_SDA21_LO))
9717 {
86c95733
AM
9718 relocation = relocation + addend;
9719 addend = 0;
9720
9721 /* Force e_li insn, keeping RT from original insn. */
9722 insn &= 0x1f << 21;
9723 insn |= 28u << 26;
9724
9725 /* We have an li20 field, bits 17..20, 11..15, 21..31. */
9726 /* Top 4 bits of value to 17..20. */
9727 insn |= (relocation & 0xf0000) >> 5;
9728 /* Next 5 bits of the value to 11..15. */
9729 insn |= (relocation & 0xf800) << 5;
9730 /* And the final 11 bits of the value to bits 21 to 31. */
9731 insn |= relocation & 0x7ff;
9732
95f0d0d2 9733 bfd_put_32 (input_bfd, insn, contents + rel->r_offset);
c3301df1
AM
9734
9735 if (r_type == R_PPC_VLE_SDA21
9736 && ((relocation + 0x80000) & 0xffffffff) > 0x100000)
9737 goto overflow;
c316a17c 9738 goto copy_reloc;
b9c361e0
JL
9739 }
9740 else if (r_type == R_PPC_EMB_SDA21
9741 || r_type == R_PPC_VLE_SDA21
9742 || r_type == R_PPC_VLE_SDA21_LO)
91d6fa6a 9743 {
86c95733 9744 /* Fill in register field. */
252b5132 9745 insn = (insn & ~RA_REGISTER_MASK) | (reg << RA_REGISTER_SHIFT);
252b5132 9746 }
95f0d0d2 9747 bfd_put_32 (input_bfd, insn, contents + rel->r_offset);
252b5132
RH
9748 }
9749 break;
9750
b9c361e0
JL
9751 case R_PPC_VLE_SDAREL_LO16A:
9752 case R_PPC_VLE_SDAREL_LO16D:
9753 case R_PPC_VLE_SDAREL_HI16A:
9754 case R_PPC_VLE_SDAREL_HI16D:
9755 case R_PPC_VLE_SDAREL_HA16A:
9756 case R_PPC_VLE_SDAREL_HA16D:
9757 {
9758 bfd_vma value;
9759 const char *name;
b9c361e0
JL
9760 struct elf_link_hash_entry *sda = NULL;
9761
9762 if (sec == NULL || sec->output_section == NULL)
9763 {
9764 unresolved_reloc = TRUE;
9765 break;
9766 }
9767
a0f49396 9768 name = bfd_get_section_name (output_bfd, sec->output_section);
93d1b056
AM
9769 if (strcmp (name, ".sdata") == 0
9770 || strcmp (name, ".sbss") == 0)
5499c7c7 9771 sda = htab->sdata[0].sym;
93d1b056
AM
9772 else if (strcmp (name, ".sdata2") == 0
9773 || strcmp (name, ".sbss2") == 0)
5499c7c7 9774 sda = htab->sdata[1].sym;
b9c361e0
JL
9775 else
9776 {
4eca0228 9777 _bfd_error_handler
695344c0 9778 /* xgettext:c-format */
871b3ab2 9779 (_("%pB: the target (%s) of a %s relocation is "
b9c361e0
JL
9780 "in the wrong output section (%s)"),
9781 input_bfd,
9782 sym_name,
9783 howto->name,
9784 name);
9785
9786 bfd_set_error (bfd_error_bad_value);
9787 ret = FALSE;
c316a17c 9788 goto copy_reloc;
b9c361e0
JL
9789 }
9790
5499c7c7 9791 if (sda == NULL || !is_static_defined (sda))
b9c361e0 9792 {
5499c7c7
AM
9793 unresolved_reloc = TRUE;
9794 break;
b9c361e0 9795 }
5499c7c7 9796 value = relocation + addend - SYM_VAL (sda);
86c95733
AM
9797
9798 if (r_type == R_PPC_VLE_SDAREL_LO16A)
08dc996f
AM
9799 ppc_elf_vle_split16 (input_bfd, input_section, rel->r_offset,
9800 contents + rel->r_offset, value,
9801 split16a_type,
9802 htab->params->vle_reloc_fixup);
86c95733 9803 else if (r_type == R_PPC_VLE_SDAREL_LO16D)
08dc996f
AM
9804 ppc_elf_vle_split16 (input_bfd, input_section, rel->r_offset,
9805 contents + rel->r_offset, value,
9806 split16d_type,
9807 htab->params->vle_reloc_fixup);
86c95733 9808 else if (r_type == R_PPC_VLE_SDAREL_HI16A)
b9c361e0 9809 {
86c95733 9810 value = value >> 16;
08dc996f
AM
9811 ppc_elf_vle_split16 (input_bfd, input_section, rel->r_offset,
9812 contents + rel->r_offset, value,
9813 split16a_type,
9814 htab->params->vle_reloc_fixup);
b9c361e0 9815 }
86c95733 9816 else if (r_type == R_PPC_VLE_SDAREL_HI16D)
b9c361e0 9817 {
86c95733 9818 value = value >> 16;
08dc996f
AM
9819 ppc_elf_vle_split16 (input_bfd, input_section, rel->r_offset,
9820 contents + rel->r_offset, value,
9821 split16d_type,
9822 htab->params->vle_reloc_fixup);
b9c361e0 9823 }
86c95733 9824 else if (r_type == R_PPC_VLE_SDAREL_HA16A)
b9c361e0 9825 {
86c95733 9826 value = (value + 0x8000) >> 16;
08dc996f
AM
9827 ppc_elf_vle_split16 (input_bfd, input_section, rel->r_offset,
9828 contents + rel->r_offset, value,
9829 split16a_type,
9830 htab->params->vle_reloc_fixup);
b9c361e0 9831 }
86c95733 9832 else if (r_type == R_PPC_VLE_SDAREL_HA16D)
b9c361e0 9833 {
86c95733 9834 value = (value + 0x8000) >> 16;
08dc996f
AM
9835 ppc_elf_vle_split16 (input_bfd, input_section, rel->r_offset,
9836 contents + rel->r_offset, value,
9837 split16d_type,
9838 htab->params->vle_reloc_fixup);
b9c361e0
JL
9839 }
9840 }
c316a17c 9841 goto copy_reloc;
b9c361e0 9842
83eef883
AFB
9843 case R_PPC_VLE_ADDR20:
9844 ppc_elf_vle_split20 (output_bfd, contents + rel->r_offset, relocation);
9845 continue;
9846
70bccea4 9847 /* Relocate against the beginning of the section. */
7619e7c7
AM
9848 case R_PPC_SECTOFF:
9849 case R_PPC_SECTOFF_LO:
9850 case R_PPC_SECTOFF_HI:
9851 case R_PPC_SECTOFF_HA:
3b4f3a11
AM
9852 if (sec == NULL || sec->output_section == NULL)
9853 {
9854 unresolved_reloc = TRUE;
9855 break;
9856 }
252b5132 9857 addend -= sec->output_section->vma;
252b5132
RH
9858 break;
9859
70bccea4 9860 /* Negative relocations. */
7619e7c7
AM
9861 case R_PPC_EMB_NADDR32:
9862 case R_PPC_EMB_NADDR16:
9863 case R_PPC_EMB_NADDR16_LO:
9864 case R_PPC_EMB_NADDR16_HI:
9865 case R_PPC_EMB_NADDR16_HA:
8da6118f 9866 addend -= 2 * relocation;
252b5132
RH
9867 break;
9868
7619e7c7
AM
9869 case R_PPC_COPY:
9870 case R_PPC_GLOB_DAT:
9871 case R_PPC_JMP_SLOT:
9872 case R_PPC_RELATIVE:
e054468f 9873 case R_PPC_IRELATIVE:
7619e7c7
AM
9874 case R_PPC_PLT32:
9875 case R_PPC_PLTREL32:
7619e7c7
AM
9876 case R_PPC_ADDR30:
9877 case R_PPC_EMB_RELSEC16:
9878 case R_PPC_EMB_RELST_LO:
9879 case R_PPC_EMB_RELST_HI:
9880 case R_PPC_EMB_RELST_HA:
9881 case R_PPC_EMB_BIT_FLD:
cf97bcb0
AM
9882 /* xgettext:c-format */
9883 _bfd_error_handler (_("%pB: %s unsupported"),
9884 input_bfd, howto->name);
252b5132
RH
9885
9886 bfd_set_error (bfd_error_invalid_operation);
b34976b6 9887 ret = FALSE;
c316a17c 9888 goto copy_reloc;
7619e7c7 9889 }
252b5132 9890
23cedd1d
AM
9891 switch (r_type)
9892 {
9893 default:
9894 break;
9895
9896 case R_PPC_PLTCALL:
9897 if (unresolved_reloc)
9898 {
9899 bfd_byte *p = contents + rel->r_offset;
9900 unsigned int insn = bfd_get_32 (input_bfd, p);
9901 insn &= 1;
9902 bfd_put_32 (input_bfd, B | insn, p);
9903 unresolved_reloc = save_unresolved_reloc;
9904 r_type = R_PPC_REL24;
9905 howto = ppc_elf_howto_table[r_type];
9906 }
9907 else if (htab->plt_type != PLT_NEW)
9908 info->callbacks->einfo
9909 (_("%P: %H: %s relocation unsupported for bss-plt\n"),
9910 input_bfd, input_section, rel->r_offset,
9911 howto->name);
9912 break;
9913
9914 case R_PPC_PLTSEQ:
9915 case R_PPC_PLT16_HA:
9916 case R_PPC_PLT16_LO:
9917 if (unresolved_reloc)
9918 {
9919 bfd_byte *p = contents + (rel->r_offset & ~3);
9920 bfd_put_32 (input_bfd, NOP, p);
9921 unresolved_reloc = FALSE;
9922 r_type = R_PPC_NONE;
9923 howto = ppc_elf_howto_table[r_type];
9924 }
9925 else if (htab->plt_type != PLT_NEW)
9926 info->callbacks->einfo
9927 (_("%P: %H: %s relocation unsupported for bss-plt\n"),
9928 input_bfd, input_section, rel->r_offset,
9929 howto->name);
9930 break;
9931 }
9932
7619e7c7
AM
9933 /* Do any further special processing. */
9934 switch (r_type)
9935 {
9936 default:
9937 break;
9938
9939 case R_PPC_ADDR16_HA:
d7128ce4 9940 case R_PPC_REL16_HA:
a680de9a 9941 case R_PPC_REL16DX_HA:
7619e7c7
AM
9942 case R_PPC_SECTOFF_HA:
9943 case R_PPC_TPREL16_HA:
9944 case R_PPC_DTPREL16_HA:
7619e7c7
AM
9945 case R_PPC_EMB_NADDR16_HA:
9946 case R_PPC_EMB_RELST_HA:
9947 /* It's just possible that this symbol is a weak symbol
7b609f53 9948 that's not actually defined anywhere. In that case,
7619e7c7
AM
9949 'sec' would be NULL, and we should leave the symbol
9950 alone (it will be set to zero elsewhere in the link). */
5c5f6e17
AM
9951 if (sec == NULL)
9952 break;
1a0670f3 9953 /* Fall through. */
5c5f6e17
AM
9954
9955 case R_PPC_PLT16_HA:
9956 case R_PPC_GOT16_HA:
9957 case R_PPC_GOT_TLSGD16_HA:
9958 case R_PPC_GOT_TLSLD16_HA:
9959 case R_PPC_GOT_TPREL16_HA:
9960 case R_PPC_GOT_DTPREL16_HA:
9961 /* Add 0x10000 if sign bit in 0:15 is set.
9962 Bits 0:15 are not used. */
9963 addend += 0x8000;
7619e7c7 9964 break;
1fe532cf
AM
9965
9966 case R_PPC_ADDR16:
9967 case R_PPC_ADDR16_LO:
9968 case R_PPC_GOT16:
9969 case R_PPC_GOT16_LO:
9970 case R_PPC_SDAREL16:
9971 case R_PPC_SECTOFF:
9972 case R_PPC_SECTOFF_LO:
9973 case R_PPC_DTPREL16:
9974 case R_PPC_DTPREL16_LO:
9975 case R_PPC_TPREL16:
9976 case R_PPC_TPREL16_LO:
9977 case R_PPC_GOT_TLSGD16:
9978 case R_PPC_GOT_TLSGD16_LO:
9979 case R_PPC_GOT_TLSLD16:
9980 case R_PPC_GOT_TLSLD16_LO:
9981 case R_PPC_GOT_DTPREL16:
9982 case R_PPC_GOT_DTPREL16_LO:
9983 case R_PPC_GOT_TPREL16:
9984 case R_PPC_GOT_TPREL16_LO:
9985 {
9986 /* The 32-bit ABI lacks proper relocations to deal with
9987 certain 64-bit instructions. Prevent damage to bits
9988 that make up part of the insn opcode. */
9989 unsigned int insn, mask, lobit;
9990
95f0d0d2 9991 insn = bfd_get_32 (input_bfd,
c316a17c 9992 contents + rel->r_offset - d_offset);
1fe532cf
AM
9993 mask = 0;
9994 if (is_insn_ds_form (insn))
9995 mask = 3;
9996 else if (is_insn_dq_form (insn))
9997 mask = 15;
9998 else
9999 break;
a680de9a
PB
10000 relocation += addend;
10001 addend = insn & mask;
10002 lobit = mask & relocation;
1fe532cf
AM
10003 if (lobit != 0)
10004 {
a680de9a 10005 relocation ^= lobit;
1fe532cf 10006 info->callbacks->einfo
695344c0 10007 /* xgettext:c-format */
174d0a74 10008 (_("%H: error: %s against `%s' not a multiple of %u\n"),
1fe532cf
AM
10009 input_bfd, input_section, rel->r_offset,
10010 howto->name, sym_name, mask + 1);
10011 bfd_set_error (bfd_error_bad_value);
10012 ret = FALSE;
10013 }
1fe532cf
AM
10014 }
10015 break;
252b5132
RH
10016 }
10017
252b5132 10018#ifdef DEBUG
55fd94b0
AM
10019 fprintf (stderr, "\ttype = %s (%d), name = %s, symbol index = %ld, "
10020 "offset = %ld, addend = %ld\n",
252b5132 10021 howto->name,
8da6118f 10022 (int) r_type,
252b5132
RH
10023 sym_name,
10024 r_symndx,
7619e7c7 10025 (long) rel->r_offset,
8da6118f 10026 (long) addend);
252b5132
RH
10027#endif
10028
7619e7c7
AM
10029 if (unresolved_reloc
10030 && !((input_section->flags & SEC_DEBUGGING) != 0
1d5316ab
AM
10031 && h->def_dynamic)
10032 && _bfd_elf_section_offset (output_bfd, info, input_section,
10033 rel->r_offset) != (bfd_vma) -1)
7619e7c7 10034 {
25f53a85 10035 info->callbacks->einfo
695344c0 10036 /* xgettext:c-format */
174d0a74 10037 (_("%H: unresolvable %s relocation against symbol `%s'\n"),
25f53a85 10038 input_bfd, input_section, rel->r_offset,
7b609f53 10039 howto->name,
7619e7c7
AM
10040 sym_name);
10041 ret = FALSE;
10042 }
10043
86c95733
AM
10044 /* 16-bit fields in insns mostly have signed values, but a
10045 few insns have 16-bit unsigned values. Really, we should
10046 have different reloc types. */
10047 if (howto->complain_on_overflow != complain_overflow_dont
10048 && howto->dst_mask == 0xffff
10049 && (input_section->flags & SEC_CODE) != 0)
10050 {
10051 enum complain_overflow complain = complain_overflow_signed;
10052
10053 if ((elf_section_flags (input_section) & SHF_PPC_VLE) == 0)
10054 {
10055 unsigned int insn;
10056
10057 insn = bfd_get_32 (input_bfd, contents + (rel->r_offset & ~3));
a47622ac
AM
10058 if ((insn & (0x3f << 26)) == 10u << 26 /* cmpli */)
10059 complain = complain_overflow_bitfield;
10060 else if ((insn & (0x3f << 26)) == 28u << 26 /* andi */
10061 || (insn & (0x3f << 26)) == 24u << 26 /* ori */
10062 || (insn & (0x3f << 26)) == 26u << 26 /* xori */)
86c95733
AM
10063 complain = complain_overflow_unsigned;
10064 }
10065 if (howto->complain_on_overflow != complain)
10066 {
10067 alt_howto = *howto;
10068 alt_howto.complain_on_overflow = complain;
10069 howto = &alt_howto;
10070 }
10071 }
10072
a680de9a
PB
10073 if (r_type == R_PPC_REL16DX_HA)
10074 {
10075 /* Split field reloc isn't handled by _bfd_final_link_relocate. */
10076 if (rel->r_offset + 4 > input_section->size)
10077 r = bfd_reloc_outofrange;
10078 else
10079 {
10080 unsigned int insn;
10081
10082 relocation += addend;
10083 relocation -= (rel->r_offset
10084 + input_section->output_offset
10085 + input_section->output_section->vma);
10086 relocation >>= 16;
10087 insn = bfd_get_32 (input_bfd, contents + rel->r_offset);
10088 insn &= ~0x1fffc1;
10089 insn |= (relocation & 0xffc1) | ((relocation & 0x3e) << 15);
10090 bfd_put_32 (input_bfd, insn, contents + rel->r_offset);
10091 r = bfd_reloc_ok;
10092 }
10093 }
10094 else
10095 r = _bfd_final_link_relocate (howto, input_bfd, input_section, contents,
10096 rel->r_offset, relocation, addend);
252b5132 10097
7619e7c7 10098 if (r != bfd_reloc_ok)
252b5132 10099 {
7619e7c7 10100 if (r == bfd_reloc_overflow)
252b5132 10101 {
c3301df1 10102 overflow:
8131c122
AM
10103 /* On code like "if (foo) foo();" don't report overflow
10104 on a branch to zero when foo is undefined. */
10105 if (!warned
10106 && !(h != NULL
10107 && (h->root.type == bfd_link_hash_undefweak
10108 || h->root.type == bfd_link_hash_undefined)
10109 && is_branch_reloc (r_type)))
1a72702b
AM
10110 info->callbacks->reloc_overflow
10111 (info, (h ? &h->root : NULL), sym_name, howto->name,
10112 rel->r_addend, input_bfd, input_section, rel->r_offset);
dc1bc0c9
RH
10113 }
10114 else
10115 {
25f53a85 10116 info->callbacks->einfo
695344c0 10117 /* xgettext:c-format */
174d0a74 10118 (_("%H: %s reloc against `%s': error %d\n"),
25f53a85
AM
10119 input_bfd, input_section, rel->r_offset,
10120 howto->name, sym_name, (int) r);
7619e7c7 10121 ret = FALSE;
252b5132
RH
10122 }
10123 }
c316a17c
AM
10124 copy_reloc:
10125 if (wrel != rel)
10126 *wrel = *rel;
10127 }
10128
10129 if (wrel != rel)
10130 {
10131 Elf_Internal_Shdr *rel_hdr;
10132 size_t deleted = rel - wrel;
10133
10134 rel_hdr = _bfd_elf_single_rel_hdr (input_section->output_section);
10135 rel_hdr->sh_size -= rel_hdr->sh_entsize * deleted;
10136 if (rel_hdr->sh_size == 0)
10137 {
10138 /* It is too late to remove an empty reloc section. Leave
10139 one NONE reloc.
10140 ??? What is wrong with an empty section??? */
10141 rel_hdr->sh_size = rel_hdr->sh_entsize;
10142 deleted -= 1;
10143 wrel++;
10144 }
10145 relend = wrel;
10146 rel_hdr = _bfd_elf_single_rel_hdr (input_section);
10147 rel_hdr->sh_size -= rel_hdr->sh_entsize * deleted;
10148 input_section->reloc_count -= deleted;
252b5132
RH
10149 }
10150
252b5132
RH
10151#ifdef DEBUG
10152 fprintf (stderr, "\n");
10153#endif
10154
53291d1f
AM
10155 if (input_section->sec_info_type == SEC_INFO_TYPE_TARGET
10156 && input_section->size != input_section->rawsize
10157 && (strcmp (input_section->output_section->name, ".init") == 0
10158 || strcmp (input_section->output_section->name, ".fini") == 0))
10159 {
10160 /* Branch around the trampolines. */
10161 unsigned int insn = B + input_section->size - input_section->rawsize;
10162 bfd_put_32 (input_bfd, insn, contents + input_section->rawsize);
10163 }
10164
5446cbdf 10165 if (htab->params->ppc476_workaround
795bc6b3 10166 && input_section->sec_info_type == SEC_INFO_TYPE_TARGET
0e1862bb 10167 && (!bfd_link_relocatable (info)
795bc6b3
AM
10168 || (input_section->output_section->alignment_power
10169 >= htab->params->pagesize_p2)))
5446cbdf 10170 {
5446cbdf 10171 bfd_vma start_addr, end_addr, addr;
795bc6b3 10172 bfd_vma pagesize = (bfd_vma) 1 << htab->params->pagesize_p2;
5446cbdf 10173
5446cbdf 10174 if (relax_info->workaround_size != 0)
40fd06d1
AM
10175 {
10176 bfd_byte *p;
10177 unsigned int n;
10178 bfd_byte fill[4];
10179
10180 bfd_put_32 (input_bfd, BA, fill);
10181 p = contents + input_section->size - relax_info->workaround_size;
10182 n = relax_info->workaround_size >> 2;
10183 while (n--)
10184 {
10185 memcpy (p, fill, 4);
10186 p += 4;
10187 }
10188 }
5446cbdf
AM
10189
10190 /* The idea is: Replace the last instruction on a page with a
10191 branch to a patch area. Put the insn there followed by a
10192 branch back to the next page. Complicated a little by
10193 needing to handle moved conditional branches, and by not
10194 wanting to touch data-in-text. */
10195
10196 start_addr = (input_section->output_section->vma
10197 + input_section->output_offset);
10198 end_addr = (start_addr + input_section->size
10199 - relax_info->workaround_size);
10200 for (addr = ((start_addr & -pagesize) + pagesize - 4);
10201 addr < end_addr;
10202 addr += pagesize)
10203 {
10204 bfd_vma offset = addr - start_addr;
10205 Elf_Internal_Rela *lo, *hi;
10206 bfd_boolean is_data;
10207 bfd_vma patch_off, patch_addr;
10208 unsigned int insn;
10209
10210 /* Do we have a data reloc at this offset? If so, leave
10211 the word alone. */
10212 is_data = FALSE;
10213 lo = relocs;
668e22e5
AM
10214 hi = relend;
10215 rel = NULL;
5446cbdf
AM
10216 while (lo < hi)
10217 {
10218 rel = lo + (hi - lo) / 2;
10219 if (rel->r_offset < offset)
10220 lo = rel + 1;
668e22e5 10221 else if (rel->r_offset > offset + 3)
5446cbdf
AM
10222 hi = rel;
10223 else
10224 {
10225 switch (ELF32_R_TYPE (rel->r_info))
10226 {
10227 case R_PPC_ADDR32:
10228 case R_PPC_UADDR32:
10229 case R_PPC_REL32:
10230 case R_PPC_ADDR30:
10231 is_data = TRUE;
10232 break;
10233 default:
10234 break;
10235 }
10236 break;
10237 }
10238 }
10239 if (is_data)
10240 continue;
10241
b4ab4364
AM
10242 /* Some instructions can be left alone too. Unconditional
10243 branches, except for bcctr with BO=0x14 (bctr, bctrl),
10244 avoid the icache failure.
10245
10246 The problem occurs due to prefetch across a page boundary
10247 where stale instructions can be fetched from the next
10248 page, and the mechanism for flushing these bad
10249 instructions fails under certain circumstances. The
10250 unconditional branches:
10251 1) Branch: b, bl, ba, bla,
10252 2) Branch Conditional: bc, bca, bcl, bcla,
10253 3) Branch Conditional to Link Register: bclr, bclrl,
10254 where (2) and (3) have BO=0x14 making them unconditional,
10255 prevent the bad prefetch because the prefetch itself is
10256 affected by these instructions. This happens even if the
10257 instruction is not executed.
10258
10259 A bctr example:
10260 .
10261 . lis 9,new_page@ha
10262 . addi 9,9,new_page@l
10263 . mtctr 9
10264 . bctr
10265 . nop
10266 . nop
10267 . new_page:
10268 .
10269 The bctr is not predicted taken due to ctr not being
10270 ready, so prefetch continues on past the bctr into the
10271 new page which might have stale instructions. If they
10272 fail to be flushed, then they will be executed after the
10273 bctr executes. Either of the following modifications
10274 prevent the bad prefetch from happening in the first
10275 place:
10276 .
1b786873
L
10277 . lis 9,new_page@ha lis 9,new_page@ha
10278 . addi 9,9,new_page@l addi 9,9,new_page@l
10279 . mtctr 9 mtctr 9
10280 . bctr bctr
b4ab4364 10281 . nop b somewhere_else
1b786873
L
10282 . b somewhere_else nop
10283 . new_page: new_page:
b4ab4364 10284 . */
5446cbdf 10285 insn = bfd_get_32 (input_bfd, contents + offset);
07d6d2b8
AM
10286 if ((insn & (0x3f << 26)) == (18u << 26) /* b,bl,ba,bla */
10287 || ((insn & (0x3f << 26)) == (16u << 26) /* bc,bcl,bca,bcla*/
10288 && (insn & (0x14 << 21)) == (0x14 << 21)) /* with BO=0x14 */
5446cbdf 10289 || ((insn & (0x3f << 26)) == (19u << 26)
b4ab4364 10290 && (insn & (0x3ff << 1)) == (16u << 1) /* bclr,bclrl */
07d6d2b8 10291 && (insn & (0x14 << 21)) == (0x14 << 21)))/* with BO=0x14 */
5446cbdf
AM
10292 continue;
10293
10294 patch_addr = (start_addr + input_section->size
10295 - relax_info->workaround_size);
10296 patch_addr = (patch_addr + 15) & -16;
10297 patch_off = patch_addr - start_addr;
10298 bfd_put_32 (input_bfd, B + patch_off - offset, contents + offset);
668e22e5
AM
10299
10300 if (rel != NULL
10301 && rel->r_offset >= offset
10302 && rel->r_offset < offset + 4)
10303 {
f8b44781
AM
10304 asection *sreloc;
10305
668e22e5
AM
10306 /* If the insn we are patching had a reloc, adjust the
10307 reloc r_offset so that the reloc applies to the moved
10308 location. This matters for -r and --emit-relocs. */
10309 if (rel + 1 != relend)
10310 {
10311 Elf_Internal_Rela tmp = *rel;
10312
10313 /* Keep the relocs sorted by r_offset. */
10314 memmove (rel, rel + 1, (relend - (rel + 1)) * sizeof (*rel));
10315 relend[-1] = tmp;
10316 }
10317 relend[-1].r_offset += patch_off - offset;
f8b44781
AM
10318
10319 /* Adjust REL16 addends too. */
10320 switch (ELF32_R_TYPE (relend[-1].r_info))
10321 {
10322 case R_PPC_REL16:
10323 case R_PPC_REL16_LO:
10324 case R_PPC_REL16_HI:
10325 case R_PPC_REL16_HA:
10326 relend[-1].r_addend += patch_off - offset;
10327 break;
10328 default:
10329 break;
10330 }
10331
10332 /* If we are building a PIE or shared library with
10333 non-PIC objects, perhaps we had a dynamic reloc too?
10334 If so, the dynamic reloc must move with the insn. */
10335 sreloc = elf_section_data (input_section)->sreloc;
10336 if (sreloc != NULL)
10337 {
1d5c94cb 10338 Elf32_External_Rela *slo, *shi, *srelend;
f8b44781
AM
10339 bfd_vma soffset;
10340
1d5c94cb
AM
10341 slo = (Elf32_External_Rela *) sreloc->contents;
10342 shi = srelend = slo + sreloc->reloc_count;
f8b44781
AM
10343 soffset = (offset + input_section->output_section->vma
10344 + input_section->output_offset);
10345 while (slo < shi)
10346 {
1d5c94cb
AM
10347 Elf32_External_Rela *srel = slo + (shi - slo) / 2;
10348 bfd_elf32_swap_reloca_in (output_bfd, (bfd_byte *) srel,
10349 &outrel);
f8b44781
AM
10350 if (outrel.r_offset < soffset)
10351 slo = srel + 1;
10352 else if (outrel.r_offset > soffset + 3)
10353 shi = srel;
10354 else
10355 {
1d5c94cb 10356 if (srel + 1 != srelend)
f8b44781 10357 {
1d5c94cb
AM
10358 memmove (srel, srel + 1,
10359 (srelend - (srel + 1)) * sizeof (*srel));
10360 srel = srelend - 1;
f8b44781
AM
10361 }
10362 outrel.r_offset += patch_off - offset;
1d5c94cb
AM
10363 bfd_elf32_swap_reloca_out (output_bfd, &outrel,
10364 (bfd_byte *) srel);
f8b44781
AM
10365 break;
10366 }
10367 }
10368 }
668e22e5
AM
10369 }
10370 else
10371 rel = NULL;
10372
5446cbdf
AM
10373 if ((insn & (0x3f << 26)) == (16u << 26) /* bc */
10374 && (insn & 2) == 0 /* relative */)
10375 {
10376 bfd_vma delta = ((insn & 0xfffc) ^ 0x8000) - 0x8000;
10377
10378 delta += offset - patch_off;
0e1862bb 10379 if (bfd_link_relocatable (info) && rel != NULL)
668e22e5 10380 delta = 0;
0e1862bb 10381 if (!bfd_link_relocatable (info) && rel != NULL)
668e22e5
AM
10382 {
10383 enum elf_ppc_reloc_type r_type;
10384
10385 r_type = ELF32_R_TYPE (relend[-1].r_info);
10386 if (r_type == R_PPC_REL14_BRTAKEN)
10387 insn |= BRANCH_PREDICT_BIT;
10388 else if (r_type == R_PPC_REL14_BRNTAKEN)
10389 insn &= ~BRANCH_PREDICT_BIT;
10390 else
10391 BFD_ASSERT (r_type == R_PPC_REL14);
10392
10393 if ((r_type == R_PPC_REL14_BRTAKEN
10394 || r_type == R_PPC_REL14_BRNTAKEN)
10395 && delta + 0x8000 < 0x10000
10396 && (bfd_signed_vma) delta < 0)
10397 insn ^= BRANCH_PREDICT_BIT;
10398 }
5446cbdf
AM
10399 if (delta + 0x8000 < 0x10000)
10400 {
10401 bfd_put_32 (input_bfd,
10402 (insn & ~0xfffc) | (delta & 0xfffc),
10403 contents + patch_off);
10404 patch_off += 4;
10405 bfd_put_32 (input_bfd,
10406 B | ((offset + 4 - patch_off) & 0x3fffffc),
10407 contents + patch_off);
10408 patch_off += 4;
10409 }
10410 else
10411 {
668e22e5
AM
10412 if (rel != NULL)
10413 {
10414 unsigned int r_sym = ELF32_R_SYM (relend[-1].r_info);
10415
10416 relend[-1].r_offset += 8;
10417 relend[-1].r_info = ELF32_R_INFO (r_sym, R_PPC_REL24);
10418 }
5446cbdf
AM
10419 bfd_put_32 (input_bfd,
10420 (insn & ~0xfffc) | 8,
10421 contents + patch_off);
10422 patch_off += 4;
10423 bfd_put_32 (input_bfd,
10424 B | ((offset + 4 - patch_off) & 0x3fffffc),
10425 contents + patch_off);
10426 patch_off += 4;
10427 bfd_put_32 (input_bfd,
10428 B | ((delta - 8) & 0x3fffffc),
10429 contents + patch_off);
10430 patch_off += 4;
10431 }
10432 }
10433 else
10434 {
10435 bfd_put_32 (input_bfd, insn, contents + patch_off);
10436 patch_off += 4;
10437 bfd_put_32 (input_bfd,
10438 B | ((offset + 4 - patch_off) & 0x3fffffc),
10439 contents + patch_off);
10440 patch_off += 4;
10441 }
10442 BFD_ASSERT (patch_off <= input_section->size);
10443 relax_info->workaround_size = input_section->size - patch_off;
10444 }
10445 }
10446
252b5132
RH
10447 return ret;
10448}
252b5132 10449\f
49c09209 10450/* Write out the PLT relocs and entries for H. */
c5fccbec 10451
b34976b6 10452static bfd_boolean
49c09209 10453write_global_sym_plt (struct elf_link_hash_entry *h, void *inf)
e1a9cb8e 10454{
49c09209
AM
10455 struct bfd_link_info *info = (struct bfd_link_info *) inf;
10456 struct ppc_elf_link_hash_table *htab = ppc_elf_hash_table (info);
a6aa5195
AM
10457 struct plt_entry *ent;
10458 bfd_boolean doneone;
e1a9cb8e 10459
a6aa5195
AM
10460 doneone = FALSE;
10461 for (ent = h->plt.plist; ent != NULL; ent = ent->next)
10462 if (ent->plt.offset != (bfd_vma) -1)
10463 {
10464 if (!doneone)
10465 {
10466 Elf_Internal_Rela rela;
10467 bfd_byte *loc;
10468 bfd_vma reloc_index;
2d7ad24e
AM
10469 asection *plt = htab->elf.splt;
10470 asection *relplt = htab->elf.srelplt;
e1a9cb8e 10471
e054468f 10472 if (htab->plt_type == PLT_NEW
25f23106
AM
10473 || !htab->elf.dynamic_sections_created
10474 || h->dynindx == -1)
9d8504b1
PB
10475 reloc_index = ent->plt.offset / 4;
10476 else
10477 {
10478 reloc_index = ((ent->plt.offset - htab->plt_initial_entry_size)
10479 / htab->plt_slot_size);
10480 if (reloc_index > PLT_NUM_SINGLE_ENTRIES
4a3dc543 10481 && htab->plt_type == PLT_OLD)
9d8504b1
PB
10482 reloc_index -= (reloc_index - PLT_NUM_SINGLE_ENTRIES) / 2;
10483 }
10484
a6aa5195
AM
10485 /* This symbol has an entry in the procedure linkage table.
10486 Set it up. */
e054468f 10487 if (htab->plt_type == PLT_VXWORKS
25f23106
AM
10488 && htab->elf.dynamic_sections_created
10489 && h->dynindx != -1)
a6aa5195 10490 {
9d8504b1
PB
10491 bfd_vma got_offset;
10492 const bfd_vma *plt_entry;
5b914448 10493
9d8504b1
PB
10494 /* The first three entries in .got.plt are reserved. */
10495 got_offset = (reloc_index + 3) * 4;
10496
10497 /* Use the right PLT. */
0e1862bb 10498 plt_entry = bfd_link_pic (info) ? ppc_elf_vxworks_pic_plt_entry
9d8504b1
PB
10499 : ppc_elf_vxworks_plt_entry;
10500
10501 /* Fill in the .plt on VxWorks. */
0e1862bb 10502 if (bfd_link_pic (info))
9d8504b1 10503 {
49c09209 10504 bfd_put_32 (info->output_bfd,
e87d4038 10505 plt_entry[0] | PPC_HA (got_offset),
2d7ad24e 10506 plt->contents + ent->plt.offset + 0);
49c09209 10507 bfd_put_32 (info->output_bfd,
e87d4038 10508 plt_entry[1] | PPC_LO (got_offset),
2d7ad24e 10509 plt->contents + ent->plt.offset + 4);
9d8504b1
PB
10510 }
10511 else
10512 {
e87d4038 10513 bfd_vma got_loc = got_offset + SYM_VAL (htab->elf.hgot);
9d8504b1 10514
49c09209 10515 bfd_put_32 (info->output_bfd,
e87d4038 10516 plt_entry[0] | PPC_HA (got_loc),
2d7ad24e 10517 plt->contents + ent->plt.offset + 0);
49c09209 10518 bfd_put_32 (info->output_bfd,
e87d4038 10519 plt_entry[1] | PPC_LO (got_loc),
2d7ad24e 10520 plt->contents + ent->plt.offset + 4);
9d8504b1
PB
10521 }
10522
49c09209 10523 bfd_put_32 (info->output_bfd, plt_entry[2],
2d7ad24e 10524 plt->contents + ent->plt.offset + 8);
49c09209 10525 bfd_put_32 (info->output_bfd, plt_entry[3],
2d7ad24e 10526 plt->contents + ent->plt.offset + 12);
9d8504b1
PB
10527
10528 /* This instruction is an immediate load. The value loaded is
10529 the byte offset of the R_PPC_JMP_SLOT relocation from the
10530 start of the .rela.plt section. The value is stored in the
10531 low-order 16 bits of the load instruction. */
10532 /* NOTE: It appears that this is now an index rather than a
10533 prescaled offset. */
49c09209 10534 bfd_put_32 (info->output_bfd,
9d8504b1 10535 plt_entry[4] | reloc_index,
2d7ad24e 10536 plt->contents + ent->plt.offset + 16);
9d8504b1
PB
10537 /* This instruction is a PC-relative branch whose target is
10538 the start of the PLT section. The address of this branch
10539 instruction is 20 bytes beyond the start of this PLT entry.
10540 The address is encoded in bits 6-29, inclusive. The value
10541 stored is right-shifted by two bits, permitting a 26-bit
10542 offset. */
49c09209 10543 bfd_put_32 (info->output_bfd,
5b914448 10544 (plt_entry[5]
9d8504b1 10545 | (-(ent->plt.offset + 20) & 0x03fffffc)),
2d7ad24e 10546 plt->contents + ent->plt.offset + 20);
49c09209 10547 bfd_put_32 (info->output_bfd, plt_entry[6],
2d7ad24e 10548 plt->contents + ent->plt.offset + 24);
49c09209 10549 bfd_put_32 (info->output_bfd, plt_entry[7],
2d7ad24e 10550 plt->contents + ent->plt.offset + 28);
9d8504b1
PB
10551
10552 /* Fill in the GOT entry corresponding to this PLT slot with
a8685210 10553 the address immediately after the "bctr" instruction
9d8504b1 10554 in this PLT entry. */
2d7ad24e
AM
10555 bfd_put_32 (info->output_bfd, (plt->output_section->vma
10556 + plt->output_offset
10557 + ent->plt.offset + 16),
ce558b89 10558 htab->elf.sgotplt->contents + got_offset);
9d8504b1 10559
0e1862bb 10560 if (!bfd_link_pic (info))
9d8504b1
PB
10561 {
10562 /* Fill in a couple of entries in .rela.plt.unloaded. */
10563 loc = htab->srelplt2->contents
10564 + ((VXWORKS_PLTRESOLVE_RELOCS + reloc_index
10565 * VXWORKS_PLT_NON_JMP_SLOT_RELOCS)
10566 * sizeof (Elf32_External_Rela));
10567
10568 /* Provide the @ha relocation for the first instruction. */
2d7ad24e
AM
10569 rela.r_offset = (plt->output_section->vma
10570 + plt->output_offset
9d8504b1 10571 + ent->plt.offset + 2);
636ce3f5 10572 rela.r_info = ELF32_R_INFO (htab->elf.hgot->indx,
9d8504b1
PB
10573 R_PPC_ADDR16_HA);
10574 rela.r_addend = got_offset;
49c09209 10575 bfd_elf32_swap_reloca_out (info->output_bfd, &rela, loc);
9d8504b1
PB
10576 loc += sizeof (Elf32_External_Rela);
10577
10578 /* Provide the @l relocation for the second instruction. */
2d7ad24e
AM
10579 rela.r_offset = (plt->output_section->vma
10580 + plt->output_offset
9d8504b1 10581 + ent->plt.offset + 6);
636ce3f5 10582 rela.r_info = ELF32_R_INFO (htab->elf.hgot->indx,
9d8504b1
PB
10583 R_PPC_ADDR16_LO);
10584 rela.r_addend = got_offset;
49c09209 10585 bfd_elf32_swap_reloca_out (info->output_bfd, &rela, loc);
9d8504b1
PB
10586 loc += sizeof (Elf32_External_Rela);
10587
10588 /* Provide a relocation for the GOT entry corresponding to this
10589 PLT slot. Point it at the middle of the .plt entry. */
ce558b89
AM
10590 rela.r_offset = (htab->elf.sgotplt->output_section->vma
10591 + htab->elf.sgotplt->output_offset
9d8504b1 10592 + got_offset);
7325306f 10593 rela.r_info = ELF32_R_INFO (htab->elf.hplt->indx,
9d8504b1
PB
10594 R_PPC_ADDR32);
10595 rela.r_addend = ent->plt.offset + 16;
49c09209 10596 bfd_elf32_swap_reloca_out (info->output_bfd, &rela, loc);
9d8504b1
PB
10597 }
10598
10599 /* VxWorks uses non-standard semantics for R_PPC_JMP_SLOT.
10600 In particular, the offset for the relocation is not the
10601 address of the PLT entry for this function, as specified
10602 by the ABI. Instead, the offset is set to the address of
10603 the GOT slot for this function. See EABI 4.4.4.1. */
ce558b89
AM
10604 rela.r_offset = (htab->elf.sgotplt->output_section->vma
10605 + htab->elf.sgotplt->output_offset
9d8504b1 10606 + got_offset);
2d7ad24e 10607 rela.r_addend = 0;
a6aa5195
AM
10608 }
10609 else
10610 {
2d7ad24e 10611 rela.r_addend = 0;
25f23106
AM
10612 if (!htab->elf.dynamic_sections_created
10613 || h->dynindx == -1)
2d7ad24e
AM
10614 {
10615 if (h->type == STT_GNU_IFUNC)
10616 {
10617 plt = htab->elf.iplt;
10618 relplt = htab->elf.irelplt;
10619 }
10620 else
10621 {
10622 plt = htab->pltlocal;
10623 relplt = bfd_link_pic (info) ? htab->relpltlocal : NULL;
10624 }
10625 if (h->def_regular
10626 && (h->root.type == bfd_link_hash_defined
10627 || h->root.type == bfd_link_hash_defweak))
10628 rela.r_addend = SYM_VAL (h);
10629 }
e054468f 10630
2d7ad24e 10631 if (relplt == NULL)
9d8504b1 10632 {
2d7ad24e
AM
10633 loc = plt->contents + ent->plt.offset;
10634 bfd_put_32 (info->output_bfd, rela.r_addend, loc);
9d8504b1
PB
10635 }
10636 else
10637 {
2d7ad24e
AM
10638 rela.r_offset = (plt->output_section->vma
10639 + plt->output_offset
10640 + ent->plt.offset);
10641
10642 if (htab->plt_type == PLT_OLD
10643 || !htab->elf.dynamic_sections_created
10644 || h->dynindx == -1)
10645 {
10646 /* We don't need to fill in the .plt. The ppc dynamic
10647 linker will fill it in. */
10648 }
10649 else
10650 {
10651 bfd_vma val = (htab->glink_pltresolve + ent->plt.offset
10652 + htab->glink->output_section->vma
10653 + htab->glink->output_offset);
10654 bfd_put_32 (info->output_bfd, val,
10655 plt->contents + ent->plt.offset);
10656 }
9d8504b1 10657 }
a6aa5195 10658 }
e1a9cb8e 10659
2d7ad24e 10660 if (relplt != NULL)
e054468f 10661 {
2d7ad24e
AM
10662 /* Fill in the entry in the .rela.plt section. */
10663 if (!htab->elf.dynamic_sections_created
10664 || h->dynindx == -1)
10665 {
10666 if (h->type == STT_GNU_IFUNC)
10667 rela.r_info = ELF32_R_INFO (0, R_PPC_IRELATIVE);
10668 else
10669 rela.r_info = ELF32_R_INFO (0, R_PPC_RELATIVE);
10670 loc = relplt->contents + (relplt->reloc_count++
10671 * sizeof (Elf32_External_Rela));
10672 htab->local_ifunc_resolver = 1;
10673 }
10674 else
10675 {
10676 rela.r_info = ELF32_R_INFO (h->dynindx, R_PPC_JMP_SLOT);
10677 loc = relplt->contents + (reloc_index
10678 * sizeof (Elf32_External_Rela));
10679 if (h->type == STT_GNU_IFUNC && is_static_defined (h))
10680 htab->maybe_local_ifunc_resolver = 1;
10681 }
10682 bfd_elf32_swap_reloca_out (info->output_bfd, &rela, loc);
82e66161 10683 }
a6aa5195
AM
10684 doneone = TRUE;
10685 }
e1a9cb8e 10686
e054468f 10687 if (htab->plt_type == PLT_NEW
25f23106
AM
10688 || !htab->elf.dynamic_sections_created
10689 || h->dynindx == -1)
a6aa5195 10690 {
a7f2871e 10691 unsigned char *p;
49c09209 10692 asection *plt = htab->elf.splt;
9e390558 10693
25f23106
AM
10694 if (!htab->elf.dynamic_sections_created
10695 || h->dynindx == -1)
2d7ad24e
AM
10696 {
10697 if (h->type == STT_GNU_IFUNC)
10698 plt = htab->elf.iplt;
10699 else
10700 break;
10701 }
e1a9cb8e 10702
a7f2871e 10703 p = (unsigned char *) htab->glink->contents + ent->glink_offset;
49c09209 10704 write_glink_stub (h, ent, plt, p, info);
e1a9cb8e 10705
0e1862bb 10706 if (!bfd_link_pic (info))
e054468f
AM
10707 /* We only need one non-PIC glink stub. */
10708 break;
a6aa5195
AM
10709 }
10710 else
10711 break;
10712 }
49c09209
AM
10713 return TRUE;
10714}
10715
10716/* Finish up PLT handling. */
10717
10718bfd_boolean
10719ppc_finish_symbols (struct bfd_link_info *info)
10720{
10721 struct ppc_elf_link_hash_table *htab = ppc_elf_hash_table (info);
10722 bfd *ibfd;
10723
10724 if (!htab)
10725 return TRUE;
10726
10727 elf_link_hash_traverse (&htab->elf, write_global_sym_plt, info);
10728
10729 for (ibfd = info->input_bfds; ibfd != NULL; ibfd = ibfd->link.next)
10730 {
10731 bfd_vma *local_got, *end_local_got;
10732 struct plt_entry **local_plt, **lplt, **end_local_plt;
10733 Elf_Internal_Shdr *symtab_hdr;
10734 bfd_size_type locsymcount;
10735 Elf_Internal_Sym *local_syms = NULL;
10736 struct plt_entry *ent;
10737
10738 if (!is_ppc_elf (ibfd))
10739 continue;
10740
10741 local_got = elf_local_got_offsets (ibfd);
10742 if (!local_got)
10743 continue;
10744
10745 symtab_hdr = &elf_symtab_hdr (ibfd);
10746 locsymcount = symtab_hdr->sh_info;
10747 end_local_got = local_got + locsymcount;
10748 local_plt = (struct plt_entry **) end_local_got;
10749 end_local_plt = local_plt + locsymcount;
10750 for (lplt = local_plt; lplt < end_local_plt; ++lplt)
10751 for (ent = *lplt; ent != NULL; ent = ent->next)
10752 {
10753 if (ent->plt.offset != (bfd_vma) -1)
10754 {
10755 Elf_Internal_Sym *sym;
10756 asection *sym_sec;
10757 asection *plt, *relplt;
10758 bfd_byte *loc;
10759 bfd_vma val;
10760 Elf_Internal_Rela rela;
10761
10762 if (!get_sym_h (NULL, &sym, &sym_sec, NULL, &local_syms,
10763 lplt - local_plt, ibfd))
10764 {
10765 if (local_syms != NULL
10766 && symtab_hdr->contents != (unsigned char *) local_syms)
10767 free (local_syms);
10768 return FALSE;
10769 }
10770
10771 val = sym->st_value;
10772 if (sym_sec != NULL && sym_sec->output_section != NULL)
10773 val += sym_sec->output_offset + sym_sec->output_section->vma;
10774
2d7ad24e
AM
10775 if (ELF_ST_TYPE (sym->st_info) == STT_GNU_IFUNC)
10776 {
10777 htab->local_ifunc_resolver = 1;
10778 plt = htab->elf.iplt;
10779 relplt = htab->elf.irelplt;
10780 rela.r_info = ELF32_R_INFO (0, R_PPC_IRELATIVE);
10781 }
10782 else
10783 {
10784 plt = htab->pltlocal;
10785 if (bfd_link_pic (info))
10786 {
10787 relplt = htab->relpltlocal;
10788 rela.r_info = ELF32_R_INFO (0, R_PPC_RELATIVE);
10789 }
10790 else
10791 {
10792 loc = plt->contents + ent->plt.offset;
10793 bfd_put_32 (info->output_bfd, val, loc);
10794 continue;
10795 }
10796 }
49c09209
AM
10797
10798 rela.r_offset = (ent->plt.offset
10799 + plt->output_offset
10800 + plt->output_section->vma);
49c09209
AM
10801 rela.r_addend = val;
10802 loc = relplt->contents + (relplt->reloc_count++
10803 * sizeof (Elf32_External_Rela));
10804 bfd_elf32_swap_reloca_out (info->output_bfd, &rela, loc);
10805 }
10806 if ((ent->glink_offset & 1) == 0)
10807 {
10808 unsigned char *p = ((unsigned char *) htab->glink->contents
10809 + ent->glink_offset);
10810
10811 write_glink_stub (NULL, ent, htab->elf.iplt, p, info);
10812 ent->glink_offset |= 1;
10813 }
10814 }
10815
10816 if (local_syms != NULL
10817 && symtab_hdr->contents != (unsigned char *) local_syms)
10818 {
10819 if (!info->keep_memory)
10820 free (local_syms);
10821 else
10822 symtab_hdr->contents = (unsigned char *) local_syms;
10823 }
10824 }
10825 return TRUE;
10826}
10827
10828/* Finish up dynamic symbol handling. We set the contents of various
10829 dynamic sections here. */
10830
10831static bfd_boolean
10832ppc_elf_finish_dynamic_symbol (bfd *output_bfd,
10833 struct bfd_link_info *info,
10834 struct elf_link_hash_entry *h,
10835 Elf_Internal_Sym *sym)
10836{
10837 struct ppc_elf_link_hash_table *htab = ppc_elf_hash_table (info);
10838 struct plt_entry *ent;
10839
10840#ifdef DEBUG
10841 fprintf (stderr, "ppc_elf_finish_dynamic_symbol called for %s",
10842 h->root.root.string);
10843#endif
10844
10845 if (!h->def_regular
10846 || (h->type == STT_GNU_IFUNC && !bfd_link_pic (info)))
10847 for (ent = h->plt.plist; ent != NULL; ent = ent->next)
10848 if (ent->plt.offset != (bfd_vma) -1)
10849 {
10850 if (!h->def_regular)
10851 {
10852 /* Mark the symbol as undefined, rather than as
10853 defined in the .plt section. Leave the value if
10854 there were any relocations where pointer equality
10855 matters (this is a clue for the dynamic linker, to
10856 make function pointer comparisons work between an
10857 application and shared library), otherwise set it
10858 to zero. */
10859 sym->st_shndx = SHN_UNDEF;
10860 if (!h->pointer_equality_needed)
10861 sym->st_value = 0;
10862 else if (!h->ref_regular_nonweak)
10863 {
10864 /* This breaks function pointer comparisons, but
10865 that is better than breaking tests for a NULL
10866 function pointer. */
10867 sym->st_value = 0;
10868 }
10869 }
10870 else
10871 {
10872 /* Set the value of ifunc symbols in a non-pie
10873 executable to the glink entry. This is to avoid
10874 text relocations. We can't do this for ifunc in
10875 allocate_dynrelocs, as we do for normal dynamic
10876 function symbols with plt entries, because we need
10877 to keep the original value around for the ifunc
10878 relocation. */
10879 sym->st_shndx
10880 = (_bfd_elf_section_from_bfd_section
10881 (info->output_bfd, htab->glink->output_section));
10882 sym->st_value = (ent->glink_offset
10883 + htab->glink->output_offset
10884 + htab->glink->output_section->vma);
10885 }
10886 break;
10887 }
e1a9cb8e 10888
25dbc73a
AM
10889 if (h->needs_copy)
10890 {
10891 asection *s;
10892 Elf_Internal_Rela rela;
10893 bfd_byte *loc;
e1a9cb8e 10894
25dbc73a 10895 /* This symbols needs a copy reloc. Set it up. */
e1a9cb8e 10896
25dbc73a
AM
10897#ifdef DEBUG
10898 fprintf (stderr, ", copy");
10899#endif
e1a9cb8e 10900
25dbc73a 10901 BFD_ASSERT (h->dynindx != -1);
86bbe32f 10902
4dc4a9a5 10903 if (ppc_elf_hash_entry (h)->has_sda_refs)
25dbc73a 10904 s = htab->relsbss;
afbf7e8e 10905 else if (h->root.u.def.section == htab->elf.sdynrelro)
5474d94f 10906 s = htab->elf.sreldynrelro;
25dbc73a 10907 else
9d19e4fd 10908 s = htab->elf.srelbss;
25dbc73a 10909 BFD_ASSERT (s != NULL);
e1a9cb8e 10910
e87d4038 10911 rela.r_offset = SYM_VAL (h);
25dbc73a
AM
10912 rela.r_info = ELF32_R_INFO (h->dynindx, R_PPC_COPY);
10913 rela.r_addend = 0;
10914 loc = s->contents + s->reloc_count++ * sizeof (Elf32_External_Rela);
10915 bfd_elf32_swap_reloca_out (output_bfd, &rela, loc);
10916 }
e1a9cb8e 10917
25dbc73a
AM
10918#ifdef DEBUG
10919 fprintf (stderr, "\n");
10920#endif
e1a9cb8e 10921
25dbc73a
AM
10922 return TRUE;
10923}
10924\f
10925static enum elf_reloc_type_class
7e612e98
AM
10926ppc_elf_reloc_type_class (const struct bfd_link_info *info,
10927 const asection *rel_sec,
10928 const Elf_Internal_Rela *rela)
e1a9cb8e 10929{
7e612e98
AM
10930 struct ppc_elf_link_hash_table *htab = ppc_elf_hash_table (info);
10931
ce558b89 10932 if (rel_sec == htab->elf.irelplt)
7e612e98
AM
10933 return reloc_class_ifunc;
10934
25dbc73a
AM
10935 switch (ELF32_R_TYPE (rela->r_info))
10936 {
10937 case R_PPC_RELATIVE:
10938 return reloc_class_relative;
25dbc73a
AM
10939 case R_PPC_JMP_SLOT:
10940 return reloc_class_plt;
10941 case R_PPC_COPY:
10942 return reloc_class_copy;
10943 default:
10944 return reloc_class_normal;
10945 }
e1a9cb8e 10946}
25dbc73a
AM
10947\f
10948/* Finish up the dynamic sections. */
e1a9cb8e 10949
25dbc73a
AM
10950static bfd_boolean
10951ppc_elf_finish_dynamic_sections (bfd *output_bfd,
10952 struct bfd_link_info *info)
e1a9cb8e 10953{
25dbc73a
AM
10954 asection *sdyn;
10955 struct ppc_elf_link_hash_table *htab;
1fe44d79 10956 bfd_vma got;
e87d4038
AM
10957 bfd *dynobj;
10958 bfd_boolean ret = TRUE;
e1a9cb8e 10959
25dbc73a
AM
10960#ifdef DEBUG
10961 fprintf (stderr, "ppc_elf_finish_dynamic_sections called\n");
10962#endif
6b0817e5 10963
25dbc73a 10964 htab = ppc_elf_hash_table (info);
ce558b89 10965 dynobj = htab->elf.dynobj;
3d4d4302 10966 sdyn = bfd_get_linker_section (dynobj, ".dynamic");
e1a9cb8e 10967
1fe44d79
AM
10968 got = 0;
10969 if (htab->elf.hgot != NULL)
e87d4038 10970 got = SYM_VAL (htab->elf.hgot);
1fe44d79 10971
25dbc73a 10972 if (htab->elf.dynamic_sections_created)
e1a9cb8e 10973 {
25dbc73a 10974 Elf32_External_Dyn *dyncon, *dynconend;
e1a9cb8e 10975
ce558b89 10976 BFD_ASSERT (htab->elf.splt != NULL && sdyn != NULL);
86bbe32f 10977
25dbc73a
AM
10978 dyncon = (Elf32_External_Dyn *) sdyn->contents;
10979 dynconend = (Elf32_External_Dyn *) (sdyn->contents + sdyn->size);
10980 for (; dyncon < dynconend; dyncon++)
10981 {
10982 Elf_Internal_Dyn dyn;
10983 asection *s;
e1a9cb8e 10984
9d8504b1 10985 bfd_elf32_swap_dyn_in (dynobj, dyncon, &dyn);
86bbe32f 10986
25dbc73a
AM
10987 switch (dyn.d_tag)
10988 {
10989 case DT_PLTGOT:
9d8504b1 10990 if (htab->is_vxworks)
ce558b89 10991 s = htab->elf.sgotplt;
9d8504b1 10992 else
ce558b89 10993 s = htab->elf.splt;
25dbc73a
AM
10994 dyn.d_un.d_ptr = s->output_section->vma + s->output_offset;
10995 break;
86bbe32f 10996
25dbc73a 10997 case DT_PLTRELSZ:
ce558b89 10998 dyn.d_un.d_val = htab->elf.srelplt->size;
25dbc73a 10999 break;
e1a9cb8e 11000
25dbc73a 11001 case DT_JMPREL:
ce558b89 11002 s = htab->elf.srelplt;
25dbc73a
AM
11003 dyn.d_un.d_ptr = s->output_section->vma + s->output_offset;
11004 break;
2f89ff8d 11005
1fe44d79
AM
11006 case DT_PPC_GOT:
11007 dyn.d_un.d_ptr = got;
d7128ce4
AM
11008 break;
11009
82e66161
AM
11010 case DT_TEXTREL:
11011 if (htab->local_ifunc_resolver)
11012 info->callbacks->einfo
11013 (_("%X%P: text relocations and GNU indirect "
11014 "functions will result in a segfault at runtime\n"));
11015 else if (htab->maybe_local_ifunc_resolver)
11016 info->callbacks->einfo
11017 (_("%P: warning: text relocations and GNU indirect "
11018 "functions may result in a segfault at runtime\n"));
11019 continue;
11020
25dbc73a 11021 default:
7a2b07ff
NS
11022 if (htab->is_vxworks
11023 && elf_vxworks_finish_dynamic_entry (output_bfd, &dyn))
11024 break;
25dbc73a
AM
11025 continue;
11026 }
4c45e5c9 11027
25dbc73a
AM
11028 bfd_elf32_swap_dyn_out (output_bfd, &dyn, dyncon);
11029 }
11030 }
4c45e5c9 11031
6528b6eb
AM
11032 if (htab->elf.sgot != NULL
11033 && htab->elf.sgot->output_section != bfd_abs_section_ptr)
25dbc73a 11034 {
ce558b89
AM
11035 if (htab->elf.hgot->root.u.def.section == htab->elf.sgot
11036 || htab->elf.hgot->root.u.def.section == htab->elf.sgotplt)
e87d4038 11037 {
e79f5955 11038 unsigned char *p = htab->elf.hgot->root.u.def.section->contents;
2f89ff8d 11039
e87d4038
AM
11040 p += htab->elf.hgot->root.u.def.value;
11041 if (htab->plt_type == PLT_OLD)
e79f5955
AM
11042 {
11043 /* Add a blrl instruction at _GLOBAL_OFFSET_TABLE_-4
11044 so that a function can easily find the address of
11045 _GLOBAL_OFFSET_TABLE_. */
11046 BFD_ASSERT (htab->elf.hgot->root.u.def.value - 4
11047 < htab->elf.hgot->root.u.def.section->size);
11048 bfd_put_32 (output_bfd, 0x4e800021, p - 4);
11049 }
3b36f7e6 11050
e87d4038 11051 if (sdyn != NULL)
e79f5955
AM
11052 {
11053 bfd_vma val = sdyn->output_section->vma + sdyn->output_offset;
11054 BFD_ASSERT (htab->elf.hgot->root.u.def.value
11055 < htab->elf.hgot->root.u.def.section->size);
11056 bfd_put_32 (output_bfd, val, p);
11057 }
e87d4038
AM
11058 }
11059 else
11060 {
695344c0 11061 /* xgettext:c-format */
cf97bcb0
AM
11062 _bfd_error_handler (_("%s not defined in linker created %pA"),
11063 htab->elf.hgot->root.root.string,
11064 (htab->elf.sgotplt != NULL
11065 ? htab->elf.sgotplt : htab->elf.sgot));
e87d4038
AM
11066 bfd_set_error (bfd_error_bad_value);
11067 ret = FALSE;
11068 }
25dbc73a 11069
ce558b89 11070 elf_section_data (htab->elf.sgot->output_section)->this_hdr.sh_entsize = 4;
25dbc73a
AM
11071 }
11072
9d8504b1 11073 /* Fill in the first entry in the VxWorks procedure linkage table. */
6528b6eb
AM
11074 if (htab->is_vxworks
11075 && htab->elf.splt != NULL
11076 && htab->elf.splt->size != 0
11077 && htab->elf.splt->output_section != bfd_abs_section_ptr)
9d8504b1 11078 {
6528b6eb 11079 asection *splt = htab->elf.splt;
9d8504b1 11080 /* Use the right PLT. */
0e1862bb 11081 const bfd_vma *plt_entry = (bfd_link_pic (info)
5b914448
AM
11082 ? ppc_elf_vxworks_pic_plt0_entry
11083 : ppc_elf_vxworks_plt0_entry);
9d8504b1 11084
0e1862bb 11085 if (!bfd_link_pic (info))
9d8504b1 11086 {
e87d4038 11087 bfd_vma got_value = SYM_VAL (htab->elf.hgot);
9d8504b1 11088
e87d4038 11089 bfd_put_32 (output_bfd, plt_entry[0] | PPC_HA (got_value),
9d8504b1 11090 splt->contents + 0);
e87d4038 11091 bfd_put_32 (output_bfd, plt_entry[1] | PPC_LO (got_value),
9d8504b1
PB
11092 splt->contents + 4);
11093 }
11094 else
11095 {
11096 bfd_put_32 (output_bfd, plt_entry[0], splt->contents + 0);
11097 bfd_put_32 (output_bfd, plt_entry[1], splt->contents + 4);
11098 }
11099 bfd_put_32 (output_bfd, plt_entry[2], splt->contents + 8);
11100 bfd_put_32 (output_bfd, plt_entry[3], splt->contents + 12);
11101 bfd_put_32 (output_bfd, plt_entry[4], splt->contents + 16);
11102 bfd_put_32 (output_bfd, plt_entry[5], splt->contents + 20);
11103 bfd_put_32 (output_bfd, plt_entry[6], splt->contents + 24);
11104 bfd_put_32 (output_bfd, plt_entry[7], splt->contents + 28);
11105
0e1862bb 11106 if (! bfd_link_pic (info))
9d8504b1
PB
11107 {
11108 Elf_Internal_Rela rela;
11109 bfd_byte *loc;
11110
11111 loc = htab->srelplt2->contents;
11112
11113 /* Output the @ha relocation for the first instruction. */
ce558b89
AM
11114 rela.r_offset = (htab->elf.splt->output_section->vma
11115 + htab->elf.splt->output_offset
9d8504b1 11116 + 2);
636ce3f5 11117 rela.r_info = ELF32_R_INFO (htab->elf.hgot->indx, R_PPC_ADDR16_HA);
9d8504b1
PB
11118 rela.r_addend = 0;
11119 bfd_elf32_swap_reloca_out (output_bfd, &rela, loc);
11120 loc += sizeof (Elf32_External_Rela);
5b914448 11121
9d8504b1 11122 /* Output the @l relocation for the second instruction. */
ce558b89
AM
11123 rela.r_offset = (htab->elf.splt->output_section->vma
11124 + htab->elf.splt->output_offset
9d8504b1 11125 + 6);
636ce3f5 11126 rela.r_info = ELF32_R_INFO (htab->elf.hgot->indx, R_PPC_ADDR16_LO);
9d8504b1
PB
11127 rela.r_addend = 0;
11128 bfd_elf32_swap_reloca_out (output_bfd, &rela, loc);
11129 loc += sizeof (Elf32_External_Rela);
11130
11131 /* Fix up the remaining relocations. They may have the wrong
11132 symbol index for _G_O_T_ or _P_L_T_ depending on the order
11133 in which symbols were output. */
11134 while (loc < htab->srelplt2->contents + htab->srelplt2->size)
11135 {
11136 Elf_Internal_Rela rel;
11137
11138 bfd_elf32_swap_reloc_in (output_bfd, loc, &rel);
636ce3f5 11139 rel.r_info = ELF32_R_INFO (htab->elf.hgot->indx, R_PPC_ADDR16_HA);
9d8504b1
PB
11140 bfd_elf32_swap_reloc_out (output_bfd, &rel, loc);
11141 loc += sizeof (Elf32_External_Rela);
11142
11143 bfd_elf32_swap_reloc_in (output_bfd, loc, &rel);
636ce3f5 11144 rel.r_info = ELF32_R_INFO (htab->elf.hgot->indx, R_PPC_ADDR16_LO);
9d8504b1
PB
11145 bfd_elf32_swap_reloc_out (output_bfd, &rel, loc);
11146 loc += sizeof (Elf32_External_Rela);
11147
11148 bfd_elf32_swap_reloc_in (output_bfd, loc, &rel);
7325306f 11149 rel.r_info = ELF32_R_INFO (htab->elf.hplt->indx, R_PPC_ADDR32);
9d8504b1
PB
11150 bfd_elf32_swap_reloc_out (output_bfd, &rel, loc);
11151 loc += sizeof (Elf32_External_Rela);
11152 }
11153 }
11154 }
11155
e054468f
AM
11156 if (htab->glink != NULL
11157 && htab->glink->contents != NULL
11158 && htab->elf.dynamic_sections_created)
d7128ce4
AM
11159 {
11160 unsigned char *p;
11161 unsigned char *endp;
a6aa5195 11162 bfd_vma res0;
a6aa5195
AM
11163
11164 /*
11165 * PIC glink code is the following:
11166 *
11167 * # ith PLT code stub.
11168 * addis 11,30,(plt+(i-1)*4-got)@ha
11169 * lwz 11,(plt+(i-1)*4-got)@l(11)
11170 * mtctr 11
11171 * bctr
11172 *
11173 * # A table of branches, one for each plt entry.
176a0d42 11174 * # The idea is that the plt call stub loads ctr and r11 with these
a6aa5195
AM
11175 * # addresses, so (r11 - res_0) gives the plt index * 4.
11176 * res_0: b PLTresolve
11177 * res_1: b PLTresolve
11178 * .
11179 * # Some number of entries towards the end can be nops
11180 * res_n_m3: nop
11181 * res_n_m2: nop
11182 * res_n_m1:
11183 *
11184 * PLTresolve:
11185 * addis 11,11,(1f-res_0)@ha
11186 * mflr 0
11187 * bcl 20,31,1f
11188 * 1: addi 11,11,(1b-res_0)@l
11189 * mflr 12
11190 * mtlr 0
07d6d2b8 11191 * sub 11,11,12 # r11 = index * 4
a6aa5195 11192 * addis 12,12,(got+4-1b)@ha
07d6d2b8
AM
11193 * lwz 0,(got+4-1b)@l(12) # got[1] address of dl_runtime_resolve
11194 * lwz 12,(got+8-1b)@l(12) # got[2] contains the map address
a6aa5195
AM
11195 * mtctr 0
11196 * add 0,11,11
07d6d2b8 11197 * add 11,0,11 # r11 = index * 12 = reloc offset.
a6aa5195 11198 * bctr
9e390558 11199 *
176a0d42
AM
11200 * Non-PIC glink code is a little simpler.
11201 *
11202 * # ith PLT code stub.
11203 * lis 11,(plt+(i-1)*4)@ha
11204 * lwz 11,(plt+(i-1)*4)@l(11)
11205 * mtctr 11
11206 * bctr
11207 *
11208 * The branch table is the same, then comes
11209 *
11210 * PLTresolve:
11211 * lis 12,(got+4)@ha
11212 * addis 11,11,(-res_0)@ha
07d6d2b8
AM
11213 * lwz 0,(got+4)@l(12) # got[1] address of dl_runtime_resolve
11214 * addi 11,11,(-res_0)@l # r11 = index * 4
176a0d42
AM
11215 * mtctr 0
11216 * add 0,11,11
07d6d2b8
AM
11217 * lwz 12,(got+8)@l(12) # got[2] contains the map address
11218 * add 11,0,11 # r11 = index * 12 = reloc offset.
176a0d42
AM
11219 * bctr
11220 */
7e8aeb9a 11221
a6aa5195 11222 /* Build the branch table, one for each plt entry (less one),
86b9da88 11223 and perhaps some padding. */
a6aa5195
AM
11224 p = htab->glink->contents;
11225 p += htab->glink_pltresolve;
86b9da88
AM
11226 endp = htab->glink->contents;
11227 endp += htab->glink->size - GLINK_PLTRESOLVE;
da3a2088 11228 while (p < endp - (htab->params->ppc476_workaround ? 0 : 8 * 4))
86b9da88
AM
11229 {
11230 bfd_put_32 (output_bfd, B + endp - p, p);
11231 p += 4;
11232 }
11233 while (p < endp)
11234 {
11235 bfd_put_32 (output_bfd, NOP, p);
11236 p += 4;
11237 }
11238
7e8aeb9a 11239 res0 = (htab->glink_pltresolve
86b9da88
AM
11240 + htab->glink->output_section->vma
11241 + htab->glink->output_offset);
11242
da3a2088
AM
11243 if (htab->params->ppc476_workaround)
11244 {
11245 /* Ensure that a call stub at the end of a page doesn't
11246 result in prefetch over the end of the page into the
11247 glink branch table. */
11248 bfd_vma pagesize = (bfd_vma) 1 << htab->params->pagesize_p2;
11249 bfd_vma page_addr;
11250 bfd_vma glink_start = (htab->glink->output_section->vma
11251 + htab->glink->output_offset);
11252
11253 for (page_addr = res0 & -pagesize;
11254 page_addr > glink_start;
11255 page_addr -= pagesize)
11256 {
11257 /* We have a plt call stub that may need fixing. */
11258 bfd_byte *loc;
11259 unsigned int insn;
11260
11261 loc = htab->glink->contents + page_addr - 4 - glink_start;
11262 insn = bfd_get_32 (output_bfd, loc);
11263 if (insn == BCTR)
11264 {
11265 /* By alignment, we know that there must be at least
11266 one other call stub before this one. */
11267 insn = bfd_get_32 (output_bfd, loc - 16);
11268 if (insn == BCTR)
11269 bfd_put_32 (output_bfd, B | (-16 & 0x3fffffc), loc);
11270 else
11271 bfd_put_32 (output_bfd, B | (-20 & 0x3fffffc), loc);
11272 }
11273 }
11274 }
11275
86b9da88 11276 /* Last comes the PLTresolve stub. */
9e390558 11277 endp = p + GLINK_PLTRESOLVE;
0e1862bb 11278 if (bfd_link_pic (info))
7e8aeb9a 11279 {
a6aa5195 11280 bfd_vma bcl;
d7128ce4 11281
a6aa5195
AM
11282 bcl = (htab->glink->size - GLINK_PLTRESOLVE + 3*4
11283 + htab->glink->output_section->vma
11284 + htab->glink->output_offset);
11285
9e390558
AM
11286 bfd_put_32 (output_bfd, ADDIS_11_11 + PPC_HA (bcl - res0), p);
11287 p += 4;
11288 bfd_put_32 (output_bfd, MFLR_0, p);
11289 p += 4;
11290 bfd_put_32 (output_bfd, BCL_20_31, p);
11291 p += 4;
11292 bfd_put_32 (output_bfd, ADDI_11_11 + PPC_LO (bcl - res0), p);
11293 p += 4;
11294 bfd_put_32 (output_bfd, MFLR_12, p);
11295 p += 4;
11296 bfd_put_32 (output_bfd, MTLR_0, p);
11297 p += 4;
11298 bfd_put_32 (output_bfd, SUB_11_11_12, p);
11299 p += 4;
11300 bfd_put_32 (output_bfd, ADDIS_12_12 + PPC_HA (got + 4 - bcl), p);
11301 p += 4;
a6aa5195
AM
11302 if (PPC_HA (got + 4 - bcl) == PPC_HA (got + 8 - bcl))
11303 {
9e390558
AM
11304 bfd_put_32 (output_bfd, LWZ_0_12 + PPC_LO (got + 4 - bcl), p);
11305 p += 4;
11306 bfd_put_32 (output_bfd, LWZ_12_12 + PPC_LO (got + 8 - bcl), p);
11307 p += 4;
a6aa5195
AM
11308 }
11309 else
11310 {
9e390558
AM
11311 bfd_put_32 (output_bfd, LWZU_0_12 + PPC_LO (got + 4 - bcl), p);
11312 p += 4;
11313 bfd_put_32 (output_bfd, LWZ_12_12 + 4, p);
11314 p += 4;
a6aa5195 11315 }
9e390558
AM
11316 bfd_put_32 (output_bfd, MTCTR_0, p);
11317 p += 4;
11318 bfd_put_32 (output_bfd, ADD_0_11_11, p);
7e8aeb9a
AM
11319 }
11320 else
d7128ce4 11321 {
9e390558
AM
11322 bfd_put_32 (output_bfd, LIS_12 + PPC_HA (got + 4), p);
11323 p += 4;
11324 bfd_put_32 (output_bfd, ADDIS_11_11 + PPC_HA (-res0), p);
11325 p += 4;
a6aa5195 11326 if (PPC_HA (got + 4) == PPC_HA (got + 8))
9e390558 11327 bfd_put_32 (output_bfd, LWZ_0_12 + PPC_LO (got + 4), p);
a6aa5195 11328 else
9e390558
AM
11329 bfd_put_32 (output_bfd, LWZU_0_12 + PPC_LO (got + 4), p);
11330 p += 4;
11331 bfd_put_32 (output_bfd, ADDI_11_11 + PPC_LO (-res0), p);
11332 p += 4;
11333 bfd_put_32 (output_bfd, MTCTR_0, p);
11334 p += 4;
11335 bfd_put_32 (output_bfd, ADD_0_11_11, p);
11336 p += 4;
11337 if (PPC_HA (got + 4) == PPC_HA (got + 8))
11338 bfd_put_32 (output_bfd, LWZ_12_12 + PPC_LO (got + 8), p);
11339 else
11340 bfd_put_32 (output_bfd, LWZ_12_12 + 4, p);
11341 }
11342 p += 4;
11343 bfd_put_32 (output_bfd, ADD_11_0_11, p);
11344 p += 4;
407aa07c
AM
11345 bfd_put_32 (output_bfd, BCTR, p);
11346 p += 4;
9e390558
AM
11347 while (p < endp)
11348 {
11349 bfd_put_32 (output_bfd,
11350 htab->params->ppc476_workaround ? BA : NOP, p);
11351 p += 4;
d7128ce4 11352 }
9e390558 11353 BFD_ASSERT (p == endp);
d7128ce4
AM
11354 }
11355
6177242a
AM
11356 if (htab->glink_eh_frame != NULL
11357 && htab->glink_eh_frame->contents != NULL)
11358 {
11359 unsigned char *p = htab->glink_eh_frame->contents;
11360 bfd_vma val;
11361
6177242a
AM
11362 p += sizeof (glink_eh_frame_cie);
11363 /* FDE length. */
6177242a
AM
11364 p += 4;
11365 /* CIE pointer. */
6177242a
AM
11366 p += 4;
11367 /* Offset to .glink. */
11368 val = (htab->glink->output_section->vma
11369 + htab->glink->output_offset);
11370 val -= (htab->glink_eh_frame->output_section->vma
11371 + htab->glink_eh_frame->output_offset);
11372 val -= p - htab->glink_eh_frame->contents;
11373 bfd_put_32 (htab->elf.dynobj, val, p);
6177242a 11374
dbaa2011 11375 if (htab->glink_eh_frame->sec_info_type == SEC_INFO_TYPE_EH_FRAME
6177242a
AM
11376 && !_bfd_elf_write_section_eh_frame (output_bfd, info,
11377 htab->glink_eh_frame,
11378 htab->glink_eh_frame->contents))
11379 return FALSE;
11380 }
11381
e87d4038 11382 return ret;
25dbc73a 11383}
e1a9cb8e 11384\f
6d00b590 11385#define TARGET_LITTLE_SYM powerpc_elf32_le_vec
252b5132 11386#define TARGET_LITTLE_NAME "elf32-powerpcle"
6d00b590 11387#define TARGET_BIG_SYM powerpc_elf32_vec
252b5132
RH
11388#define TARGET_BIG_NAME "elf32-powerpc"
11389#define ELF_ARCH bfd_arch_powerpc
ae95ffa6 11390#define ELF_TARGET_ID PPC32_ELF_DATA
252b5132
RH
11391#define ELF_MACHINE_CODE EM_PPC
11392#define ELF_MAXPAGESIZE 0x10000
702d1671
AM
11393#define ELF_COMMONPAGESIZE 0x1000
11394#define ELF_RELROPAGESIZE ELF_MAXPAGESIZE
252b5132
RH
11395#define elf_info_to_howto ppc_elf_info_to_howto
11396
11397#ifdef EM_CYGNUS_POWERPC
11398#define ELF_MACHINE_ALT1 EM_CYGNUS_POWERPC
11399#endif
11400
11401#ifdef EM_PPC_OLD
11402#define ELF_MACHINE_ALT2 EM_PPC_OLD
11403#endif
11404
11405#define elf_backend_plt_not_loaded 1
5474d94f 11406#define elf_backend_want_dynrelro 1
252b5132 11407#define elf_backend_can_gc_sections 1
51b64d56 11408#define elf_backend_can_refcount 1
b491616a 11409#define elf_backend_rela_normal 1
53291d1f 11410#define elf_backend_caches_rawsize 1
252b5132 11411
43c40ab2 11412#define bfd_elf32_mkobject ppc_elf_mkobject
252b5132 11413#define bfd_elf32_bfd_merge_private_bfd_data ppc_elf_merge_private_bfd_data
70bccea4 11414#define bfd_elf32_bfd_relax_section ppc_elf_relax_section
252b5132 11415#define bfd_elf32_bfd_reloc_type_lookup ppc_elf_reloc_type_lookup
b9c361e0 11416#define bfd_elf32_bfd_reloc_name_lookup ppc_elf_reloc_name_lookup
252b5132 11417#define bfd_elf32_bfd_set_private_flags ppc_elf_set_private_flags
70bccea4 11418#define bfd_elf32_bfd_link_hash_table_create ppc_elf_link_hash_table_create
468392fb 11419#define bfd_elf32_get_synthetic_symtab ppc_elf_get_synthetic_symtab
252b5132 11420
feee612b 11421#define elf_backend_object_p ppc_elf_object_p
252b5132 11422#define elf_backend_gc_mark_hook ppc_elf_gc_mark_hook
252b5132
RH
11423#define elf_backend_section_from_shdr ppc_elf_section_from_shdr
11424#define elf_backend_relocate_section ppc_elf_relocate_section
11425#define elf_backend_create_dynamic_sections ppc_elf_create_dynamic_sections
11426#define elf_backend_check_relocs ppc_elf_check_relocs
c0e331c7 11427#define elf_backend_relocs_compatible _bfd_elf_relocs_compatible
7fce784e 11428#define elf_backend_copy_indirect_symbol ppc_elf_copy_indirect_symbol
252b5132
RH
11429#define elf_backend_adjust_dynamic_symbol ppc_elf_adjust_dynamic_symbol
11430#define elf_backend_add_symbol_hook ppc_elf_add_symbol_hook
11431#define elf_backend_size_dynamic_sections ppc_elf_size_dynamic_sections
0eb4a168 11432#define elf_backend_hash_symbol ppc_elf_hash_symbol
252b5132
RH
11433#define elf_backend_finish_dynamic_symbol ppc_elf_finish_dynamic_symbol
11434#define elf_backend_finish_dynamic_sections ppc_elf_finish_dynamic_sections
11435#define elf_backend_fake_sections ppc_elf_fake_sections
11436#define elf_backend_additional_program_headers ppc_elf_additional_program_headers
954b63d4 11437#define elf_backend_modify_segment_map ppc_elf_modify_segment_map
c5fccbec
DJ
11438#define elf_backend_grok_prstatus ppc_elf_grok_prstatus
11439#define elf_backend_grok_psinfo ppc_elf_grok_psinfo
183e98be 11440#define elf_backend_write_core_note ppc_elf_write_core_note
29c2fb7c 11441#define elf_backend_reloc_type_class ppc_elf_reloc_type_class
70bccea4
AM
11442#define elf_backend_begin_write_processing ppc_elf_begin_write_processing
11443#define elf_backend_final_write_processing ppc_elf_final_write_processing
11444#define elf_backend_write_section ppc_elf_write_section
551b43fd 11445#define elf_backend_get_sec_type_attr ppc_elf_get_sec_type_attr
4c45e5c9 11446#define elf_backend_plt_sym_val ppc_elf_plt_sym_val
8a696751 11447#define elf_backend_action_discarded ppc_elf_action_discarded
74541ad4 11448#define elf_backend_init_index_section _bfd_elf_init_1_index_section
b9c361e0 11449#define elf_backend_lookup_section_flags_hook ppc_elf_lookup_section_flags
252b5132
RH
11450
11451#include "elf32-target.h"
9d8504b1 11452
7b8e7dad
AM
11453/* FreeBSD Target */
11454
11455#undef TARGET_LITTLE_SYM
11456#undef TARGET_LITTLE_NAME
11457
11458#undef TARGET_BIG_SYM
6d00b590 11459#define TARGET_BIG_SYM powerpc_elf32_fbsd_vec
7b8e7dad
AM
11460#undef TARGET_BIG_NAME
11461#define TARGET_BIG_NAME "elf32-powerpc-freebsd"
11462
11463#undef ELF_OSABI
11464#define ELF_OSABI ELFOSABI_FREEBSD
11465
11466#undef elf32_bed
11467#define elf32_bed elf32_powerpc_fbsd_bed
11468
11469#include "elf32-target.h"
11470
9d8504b1
PB
11471/* VxWorks Target */
11472
11473#undef TARGET_LITTLE_SYM
11474#undef TARGET_LITTLE_NAME
11475
11476#undef TARGET_BIG_SYM
6d00b590 11477#define TARGET_BIG_SYM powerpc_elf32_vxworks_vec
9d8504b1
PB
11478#undef TARGET_BIG_NAME
11479#define TARGET_BIG_NAME "elf32-powerpc-vxworks"
11480
7b8e7dad
AM
11481#undef ELF_OSABI
11482
d5e3d971
PB
11483/* VxWorks uses the elf default section flags for .plt. */
11484static const struct bfd_elf_special_section *
4aef7643 11485ppc_elf_vxworks_get_sec_type_attr (bfd *abfd, asection *sec)
9d8504b1 11486{
d5e3d971
PB
11487 if (sec->name == NULL)
11488 return NULL;
11489
11490 if (strcmp (sec->name, ".plt") == 0)
11491 return _bfd_elf_get_sec_type_attr (abfd, sec);
11492
11493 return ppc_elf_get_sec_type_attr (abfd, sec);
11494}
9d8504b1
PB
11495
11496/* Like ppc_elf_link_hash_table_create, but overrides
11497 appropriately for VxWorks. */
11498static struct bfd_link_hash_table *
11499ppc_elf_vxworks_link_hash_table_create (bfd *abfd)
11500{
11501 struct bfd_link_hash_table *ret;
11502
11503 ret = ppc_elf_link_hash_table_create (abfd);
11504 if (ret)
11505 {
11506 struct ppc_elf_link_hash_table *htab
954b63d4 11507 = (struct ppc_elf_link_hash_table *)ret;
9d8504b1 11508 htab->is_vxworks = 1;
4a3dc543 11509 htab->plt_type = PLT_VXWORKS;
9d8504b1
PB
11510 htab->plt_entry_size = VXWORKS_PLT_ENTRY_SIZE;
11511 htab->plt_slot_size = VXWORKS_PLT_ENTRY_SIZE;
11512 htab->plt_initial_entry_size = VXWORKS_PLT_INITIAL_ENTRY_SIZE;
11513 }
11514 return ret;
11515}
11516
11517/* Tweak magic VxWorks symbols as they are loaded. */
11518static bfd_boolean
11519ppc_elf_vxworks_add_symbol_hook (bfd *abfd,
11520 struct bfd_link_info *info,
11521 Elf_Internal_Sym *sym,
4aef7643
AM
11522 const char **namep,
11523 flagword *flagsp,
9d8504b1
PB
11524 asection **secp,
11525 bfd_vma *valp)
11526{
4aef7643
AM
11527 if (!elf_vxworks_add_symbol_hook (abfd, info, sym, namep, flagsp, secp,
11528 valp))
9d8504b1
PB
11529 return FALSE;
11530
4aef7643 11531 return ppc_elf_add_symbol_hook (abfd, info, sym, namep, flagsp, secp, valp);
9d8504b1
PB
11532}
11533
9d8504b1
PB
11534static void
11535ppc_elf_vxworks_final_write_processing (bfd *abfd, bfd_boolean linker)
11536{
4aef7643
AM
11537 ppc_elf_final_write_processing (abfd, linker);
11538 elf_vxworks_final_write_processing (abfd, linker);
9d8504b1
PB
11539}
11540
11541/* On VxWorks, we emit relocations against _PROCEDURE_LINKAGE_TABLE_, so
11542 define it. */
11543#undef elf_backend_want_plt_sym
11544#define elf_backend_want_plt_sym 1
11545#undef elf_backend_want_got_plt
11546#define elf_backend_want_got_plt 1
11547#undef elf_backend_got_symbol_offset
11548#define elf_backend_got_symbol_offset 0
11549#undef elf_backend_plt_not_loaded
11550#define elf_backend_plt_not_loaded 0
11551#undef elf_backend_plt_readonly
11552#define elf_backend_plt_readonly 1
11553#undef elf_backend_got_header_size
11554#define elf_backend_got_header_size 12
64f52338
AM
11555#undef elf_backend_dtrel_excludes_plt
11556#define elf_backend_dtrel_excludes_plt 1
9d8504b1 11557
468392fb
AM
11558#undef bfd_elf32_get_synthetic_symtab
11559
9d8504b1
PB
11560#undef bfd_elf32_bfd_link_hash_table_create
11561#define bfd_elf32_bfd_link_hash_table_create \
11562 ppc_elf_vxworks_link_hash_table_create
9d8504b1
PB
11563#undef elf_backend_add_symbol_hook
11564#define elf_backend_add_symbol_hook \
11565 ppc_elf_vxworks_add_symbol_hook
11566#undef elf_backend_link_output_symbol_hook
11567#define elf_backend_link_output_symbol_hook \
9c72ff84 11568 elf_vxworks_link_output_symbol_hook
9d8504b1
PB
11569#undef elf_backend_final_write_processing
11570#define elf_backend_final_write_processing \
11571 ppc_elf_vxworks_final_write_processing
d5e3d971
PB
11572#undef elf_backend_get_sec_type_attr
11573#define elf_backend_get_sec_type_attr \
11574 ppc_elf_vxworks_get_sec_type_attr
9d8504b1
PB
11575#undef elf_backend_emit_relocs
11576#define elf_backend_emit_relocs \
11577 elf_vxworks_emit_relocs
11578
11579#undef elf32_bed
11580#define elf32_bed ppc_elf_vxworks_bed
e054468f 11581#undef elf_backend_post_process_headers
9d8504b1
PB
11582
11583#include "elf32-target.h"