]> git.ipfire.org Git - thirdparty/binutils-gdb.git/blame - bfd/elf32-ppc.c
Suppress string diagnostics for pre-release GCC
[thirdparty/binutils-gdb.git] / bfd / elf32-ppc.c
CommitLineData
252b5132 1/* PowerPC-specific support for 32-bit ELF
219d1afa 2 Copyright (C) 1994-2018 Free Software Foundation, Inc.
252b5132
RH
3 Written by Ian Lance Taylor, Cygnus Support.
4
ae9a127f 5 This file is part of BFD, the Binary File Descriptor library.
252b5132 6
ae9a127f
NC
7 This program is free software; you can redistribute it and/or modify
8 it under the terms of the GNU General Public License as published by
cd123cb7 9 the Free Software Foundation; either version 3 of the License, or
ae9a127f 10 (at your option) any later version.
252b5132 11
ae9a127f
NC
12 This program is distributed in the hope that it will be useful,
13 but WITHOUT ANY WARRANTY; without even the implied warranty of
14 MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
15 GNU General Public License for more details.
252b5132 16
ae9a127f 17 You should have received a copy of the GNU General Public License
fc0bffd6 18 along with this program; if not, write to the
3e110533 19 Free Software Foundation, Inc., 51 Franklin Street - Fifth Floor,
53e09e0a 20 Boston, MA 02110-1301, USA. */
252b5132 21
cd123cb7 22
252b5132
RH
23/* This file is based on a preliminary PowerPC ELF ABI. The
24 information may not match the final PowerPC ELF ABI. It includes
25 suggestions from the in-progress Embedded PowerPC ABI, and that
26 information may also not match. */
27
3db64b00 28#include "sysdep.h"
183e98be 29#include <stdarg.h>
252b5132 30#include "bfd.h"
252b5132
RH
31#include "bfdlink.h"
32#include "libbfd.h"
33#include "elf-bfd.h"
34#include "elf/ppc.h"
7619e7c7 35#include "elf32-ppc.h"
9d8504b1 36#include "elf-vxworks.h"
6177242a 37#include "dwarf2.h"
08dc996f 38#include "opcode/ppc.h"
252b5132 39
b9c361e0
JL
40typedef enum split16_format_type
41{
42 split16a_type = 0,
43 split16d_type
44}
45split16_format_type;
46
f0fe0e16 47/* RELA relocations are used here. */
252b5132 48
252b5132 49static bfd_reloc_status_type ppc_elf_addr16_ha_reloc
55fd94b0 50 (bfd *, arelent *, asymbol *, void *, asection *, bfd *, char **);
7619e7c7 51static bfd_reloc_status_type ppc_elf_unhandled_reloc
55fd94b0 52 (bfd *, arelent *, asymbol *, void *, asection *, bfd *, char **);
252b5132 53
70bccea4
AM
54/* Branch prediction bit for branch taken relocs. */
55#define BRANCH_PREDICT_BIT 0x200000
56/* Mask to set RA in memory instructions. */
57#define RA_REGISTER_MASK 0x001f0000
58/* Value to shift register by to insert RA. */
59#define RA_REGISTER_SHIFT 16
252b5132
RH
60
61/* The name of the dynamic interpreter. This is put in the .interp
62 section. */
252b5132
RH
63#define ELF_DYNAMIC_INTERPRETER "/usr/lib/ld.so.1"
64
d7128ce4 65/* For old-style PLT. */
252b5132
RH
66/* The number of single-slot PLT entries (the rest use two slots). */
67#define PLT_NUM_SINGLE_ENTRIES 8192
68
d7128ce4 69/* For new-style .glink and .plt. */
a6aa5195 70#define GLINK_PLTRESOLVE 16*4
9e390558 71#define GLINK_ENTRY_SIZE(htab, h) \
407aa07c 72 ((4*4 \
9e390558
AM
73 + (h != NULL \
74 && h == htab->tls_get_addr \
75 && !htab->params->no_tls_get_addr_opt ? 8*4 : 0) \
76 + (1u << htab->params->plt_stub_align) - 1) \
77 & -(1u << htab->params->plt_stub_align))
d7128ce4 78
9d8504b1
PB
79/* VxWorks uses its own plt layout, filled in by the static linker. */
80
81/* The standard VxWorks PLT entry. */
82#define VXWORKS_PLT_ENTRY_SIZE 32
83static const bfd_vma ppc_elf_vxworks_plt_entry
84 [VXWORKS_PLT_ENTRY_SIZE / 4] =
85 {
07d6d2b8
AM
86 0x3d800000, /* lis r12,0 */
87 0x818c0000, /* lwz r12,0(r12) */
88 0x7d8903a6, /* mtctr r12 */
89 0x4e800420, /* bctr */
90 0x39600000, /* li r11,0 */
91 0x48000000, /* b 14 <.PLT0resolve+0x4> */
92 0x60000000, /* nop */
93 0x60000000, /* nop */
9d8504b1
PB
94 };
95static const bfd_vma ppc_elf_vxworks_pic_plt_entry
96 [VXWORKS_PLT_ENTRY_SIZE / 4] =
97 {
98 0x3d9e0000, /* addis r12,r30,0 */
99 0x818c0000, /* lwz r12,0(r12) */
100 0x7d8903a6, /* mtctr r12 */
101 0x4e800420, /* bctr */
102 0x39600000, /* li r11,0 */
103 0x48000000, /* b 14 <.PLT0resolve+0x4> 14: R_PPC_REL24 .PLTresolve */
104 0x60000000, /* nop */
105 0x60000000, /* nop */
106 };
107
108/* The initial VxWorks PLT entry. */
109#define VXWORKS_PLT_INITIAL_ENTRY_SIZE 32
110static const bfd_vma ppc_elf_vxworks_plt0_entry
111 [VXWORKS_PLT_INITIAL_ENTRY_SIZE / 4] =
112 {
07d6d2b8
AM
113 0x3d800000, /* lis r12,0 */
114 0x398c0000, /* addi r12,r12,0 */
115 0x800c0008, /* lwz r0,8(r12) */
116 0x7c0903a6, /* mtctr r0 */
117 0x818c0004, /* lwz r12,4(r12) */
118 0x4e800420, /* bctr */
119 0x60000000, /* nop */
120 0x60000000, /* nop */
9d8504b1
PB
121 };
122static const bfd_vma ppc_elf_vxworks_pic_plt0_entry
123 [VXWORKS_PLT_INITIAL_ENTRY_SIZE / 4] =
124 {
125 0x819e0008, /* lwz r12,8(r30) */
07d6d2b8 126 0x7d8903a6, /* mtctr r12 */
9d8504b1 127 0x819e0004, /* lwz r12,4(r30) */
07d6d2b8
AM
128 0x4e800420, /* bctr */
129 0x60000000, /* nop */
130 0x60000000, /* nop */
131 0x60000000, /* nop */
132 0x60000000, /* nop */
9d8504b1
PB
133 };
134
135/* For executables, we have some additional relocations in
136 .rela.plt.unloaded, for the kernel loader. */
137
138/* The number of non-JMP_SLOT relocations per PLT0 slot. */
139#define VXWORKS_PLT_NON_JMP_SLOT_RELOCS 3
140/* The number of relocations in the PLTResolve slot. */
141#define VXWORKS_PLTRESOLVE_RELOCS 2
de194d85 142/* The number of relocations in the PLTResolve slot when creating
9d8504b1
PB
143 a shared library. */
144#define VXWORKS_PLTRESOLVE_RELOCS_SHLIB 0
145
d7128ce4 146/* Some instructions. */
d7128ce4 147#define ADDIS_11_11 0x3d6b0000
a6aa5195
AM
148#define ADDIS_11_30 0x3d7e0000
149#define ADDIS_12_12 0x3d8c0000
d7128ce4 150#define ADDI_11_11 0x396b0000
d7128ce4 151#define ADD_0_11_11 0x7c0b5a14
a7f2871e 152#define ADD_3_12_2 0x7c6c1214
d7128ce4 153#define ADD_11_0_11 0x7d605a14
a6aa5195 154#define B 0x48000000
da3a2088 155#define BA 0x48000002
a6aa5195 156#define BCL_20_31 0x429f0005
d7128ce4 157#define BCTR 0x4e800420
a7f2871e
AM
158#define BEQLR 0x4d820020
159#define CMPWI_11_0 0x2c0b0000
7e8aeb9a
AM
160#define LIS_11 0x3d600000
161#define LIS_12 0x3d800000
a6aa5195
AM
162#define LWZU_0_12 0x840c0000
163#define LWZ_0_12 0x800c0000
a7f2871e 164#define LWZ_11_3 0x81630000
a6aa5195
AM
165#define LWZ_11_11 0x816b0000
166#define LWZ_11_30 0x817e0000
a7f2871e 167#define LWZ_12_3 0x81830000
a6aa5195 168#define LWZ_12_12 0x818c0000
a7f2871e
AM
169#define MR_0_3 0x7c601b78
170#define MR_3_0 0x7c030378
a6aa5195
AM
171#define MFLR_0 0x7c0802a6
172#define MFLR_12 0x7d8802a6
173#define MTCTR_0 0x7c0903a6
174#define MTCTR_11 0x7d6903a6
175#define MTLR_0 0x7c0803a6
176#define NOP 0x60000000
177#define SUB_11_11_12 0x7d6c5850
7619e7c7
AM
178
179/* Offset of tp and dtp pointers from start of TLS block. */
180#define TP_OFFSET 0x7000
181#define DTP_OFFSET 0x8000
e87d4038
AM
182
183/* The value of a defined global symbol. */
184#define SYM_VAL(SYM) \
185 ((SYM)->root.u.def.section->output_section->vma \
186 + (SYM)->root.u.def.section->output_offset \
187 + (SYM)->root.u.def.value)
7fce784e 188\f
e47cd125 189static reloc_howto_type *ppc_elf_howto_table[R_PPC_max];
252b5132 190
8da6118f 191static reloc_howto_type ppc_elf_howto_raw[] = {
252b5132
RH
192 /* This reloc does nothing. */
193 HOWTO (R_PPC_NONE, /* type */
194 0, /* rightshift */
6346d5ca
AM
195 3, /* size (0 = byte, 1 = short, 2 = long) */
196 0, /* bitsize */
b34976b6 197 FALSE, /* pc_relative */
252b5132 198 0, /* bitpos */
86c95733 199 complain_overflow_dont, /* complain_on_overflow */
252b5132
RH
200 bfd_elf_generic_reloc, /* special_function */
201 "R_PPC_NONE", /* name */
b34976b6 202 FALSE, /* partial_inplace */
252b5132
RH
203 0, /* src_mask */
204 0, /* dst_mask */
b34976b6 205 FALSE), /* pcrel_offset */
252b5132
RH
206
207 /* A standard 32 bit relocation. */
208 HOWTO (R_PPC_ADDR32, /* type */
209 0, /* rightshift */
210 2, /* size (0 = byte, 1 = short, 2 = long) */
211 32, /* bitsize */
b34976b6 212 FALSE, /* pc_relative */
252b5132 213 0, /* bitpos */
86c95733 214 complain_overflow_dont, /* complain_on_overflow */
252b5132
RH
215 bfd_elf_generic_reloc, /* special_function */
216 "R_PPC_ADDR32", /* name */
b34976b6 217 FALSE, /* partial_inplace */
252b5132
RH
218 0, /* src_mask */
219 0xffffffff, /* dst_mask */
b34976b6 220 FALSE), /* pcrel_offset */
252b5132
RH
221
222 /* An absolute 26 bit branch; the lower two bits must be zero.
223 FIXME: we don't check that, we just clear them. */
224 HOWTO (R_PPC_ADDR24, /* type */
225 0, /* rightshift */
226 2, /* size (0 = byte, 1 = short, 2 = long) */
227 26, /* bitsize */
b34976b6 228 FALSE, /* pc_relative */
252b5132 229 0, /* bitpos */
86c95733 230 complain_overflow_signed, /* complain_on_overflow */
252b5132
RH
231 bfd_elf_generic_reloc, /* special_function */
232 "R_PPC_ADDR24", /* name */
b34976b6 233 FALSE, /* partial_inplace */
252b5132
RH
234 0, /* src_mask */
235 0x3fffffc, /* dst_mask */
b34976b6 236 FALSE), /* pcrel_offset */
252b5132
RH
237
238 /* A standard 16 bit relocation. */
239 HOWTO (R_PPC_ADDR16, /* type */
240 0, /* rightshift */
241 1, /* size (0 = byte, 1 = short, 2 = long) */
242 16, /* bitsize */
b34976b6 243 FALSE, /* pc_relative */
252b5132
RH
244 0, /* bitpos */
245 complain_overflow_bitfield, /* complain_on_overflow */
246 bfd_elf_generic_reloc, /* special_function */
247 "R_PPC_ADDR16", /* name */
b34976b6 248 FALSE, /* partial_inplace */
252b5132
RH
249 0, /* src_mask */
250 0xffff, /* dst_mask */
b34976b6 251 FALSE), /* pcrel_offset */
252b5132
RH
252
253 /* A 16 bit relocation without overflow. */
254 HOWTO (R_PPC_ADDR16_LO, /* type */
255 0, /* rightshift */
256 1, /* size (0 = byte, 1 = short, 2 = long) */
257 16, /* bitsize */
b34976b6 258 FALSE, /* pc_relative */
252b5132
RH
259 0, /* bitpos */
260 complain_overflow_dont,/* complain_on_overflow */
261 bfd_elf_generic_reloc, /* special_function */
262 "R_PPC_ADDR16_LO", /* name */
b34976b6 263 FALSE, /* partial_inplace */
252b5132
RH
264 0, /* src_mask */
265 0xffff, /* dst_mask */
b34976b6 266 FALSE), /* pcrel_offset */
252b5132
RH
267
268 /* The high order 16 bits of an address. */
269 HOWTO (R_PPC_ADDR16_HI, /* type */
270 16, /* rightshift */
271 1, /* size (0 = byte, 1 = short, 2 = long) */
272 16, /* bitsize */
b34976b6 273 FALSE, /* pc_relative */
252b5132
RH
274 0, /* bitpos */
275 complain_overflow_dont, /* complain_on_overflow */
276 bfd_elf_generic_reloc, /* special_function */
277 "R_PPC_ADDR16_HI", /* name */
b34976b6 278 FALSE, /* partial_inplace */
252b5132
RH
279 0, /* src_mask */
280 0xffff, /* dst_mask */
b34976b6 281 FALSE), /* pcrel_offset */
252b5132
RH
282
283 /* The high order 16 bits of an address, plus 1 if the contents of
8da6118f 284 the low 16 bits, treated as a signed number, is negative. */
252b5132
RH
285 HOWTO (R_PPC_ADDR16_HA, /* type */
286 16, /* rightshift */
287 1, /* size (0 = byte, 1 = short, 2 = long) */
288 16, /* bitsize */
b34976b6 289 FALSE, /* pc_relative */
252b5132
RH
290 0, /* bitpos */
291 complain_overflow_dont, /* complain_on_overflow */
292 ppc_elf_addr16_ha_reloc, /* special_function */
293 "R_PPC_ADDR16_HA", /* name */
b34976b6 294 FALSE, /* partial_inplace */
252b5132
RH
295 0, /* src_mask */
296 0xffff, /* dst_mask */
b34976b6 297 FALSE), /* pcrel_offset */
252b5132
RH
298
299 /* An absolute 16 bit branch; the lower two bits must be zero.
300 FIXME: we don't check that, we just clear them. */
301 HOWTO (R_PPC_ADDR14, /* type */
302 0, /* rightshift */
303 2, /* size (0 = byte, 1 = short, 2 = long) */
304 16, /* bitsize */
b34976b6 305 FALSE, /* pc_relative */
252b5132 306 0, /* bitpos */
86c95733 307 complain_overflow_signed, /* complain_on_overflow */
252b5132
RH
308 bfd_elf_generic_reloc, /* special_function */
309 "R_PPC_ADDR14", /* name */
b34976b6 310 FALSE, /* partial_inplace */
252b5132
RH
311 0, /* src_mask */
312 0xfffc, /* dst_mask */
b34976b6 313 FALSE), /* pcrel_offset */
252b5132
RH
314
315 /* An absolute 16 bit branch, for which bit 10 should be set to
316 indicate that the branch is expected to be taken. The lower two
8da6118f 317 bits must be zero. */
252b5132
RH
318 HOWTO (R_PPC_ADDR14_BRTAKEN, /* type */
319 0, /* rightshift */
320 2, /* size (0 = byte, 1 = short, 2 = long) */
321 16, /* bitsize */
b34976b6 322 FALSE, /* pc_relative */
252b5132 323 0, /* bitpos */
86c95733 324 complain_overflow_signed, /* complain_on_overflow */
252b5132
RH
325 bfd_elf_generic_reloc, /* special_function */
326 "R_PPC_ADDR14_BRTAKEN",/* name */
b34976b6 327 FALSE, /* partial_inplace */
252b5132
RH
328 0, /* src_mask */
329 0xfffc, /* dst_mask */
b34976b6 330 FALSE), /* pcrel_offset */
252b5132
RH
331
332 /* An absolute 16 bit branch, for which bit 10 should be set to
333 indicate that the branch is not expected to be taken. The lower
334 two bits must be zero. */
335 HOWTO (R_PPC_ADDR14_BRNTAKEN, /* type */
336 0, /* rightshift */
337 2, /* size (0 = byte, 1 = short, 2 = long) */
338 16, /* bitsize */
b34976b6 339 FALSE, /* pc_relative */
252b5132 340 0, /* bitpos */
86c95733 341 complain_overflow_signed, /* complain_on_overflow */
252b5132
RH
342 bfd_elf_generic_reloc, /* special_function */
343 "R_PPC_ADDR14_BRNTAKEN",/* name */
b34976b6 344 FALSE, /* partial_inplace */
252b5132
RH
345 0, /* src_mask */
346 0xfffc, /* dst_mask */
b34976b6 347 FALSE), /* pcrel_offset */
252b5132 348
8da6118f 349 /* A relative 26 bit branch; the lower two bits must be zero. */
252b5132
RH
350 HOWTO (R_PPC_REL24, /* type */
351 0, /* rightshift */
352 2, /* size (0 = byte, 1 = short, 2 = long) */
353 26, /* bitsize */
b34976b6 354 TRUE, /* pc_relative */
252b5132
RH
355 0, /* bitpos */
356 complain_overflow_signed, /* complain_on_overflow */
357 bfd_elf_generic_reloc, /* special_function */
358 "R_PPC_REL24", /* name */
b34976b6 359 FALSE, /* partial_inplace */
252b5132
RH
360 0, /* src_mask */
361 0x3fffffc, /* dst_mask */
b34976b6 362 TRUE), /* pcrel_offset */
252b5132 363
8da6118f 364 /* A relative 16 bit branch; the lower two bits must be zero. */
252b5132
RH
365 HOWTO (R_PPC_REL14, /* type */
366 0, /* rightshift */
367 2, /* size (0 = byte, 1 = short, 2 = long) */
368 16, /* bitsize */
b34976b6 369 TRUE, /* pc_relative */
252b5132
RH
370 0, /* bitpos */
371 complain_overflow_signed, /* complain_on_overflow */
372 bfd_elf_generic_reloc, /* special_function */
373 "R_PPC_REL14", /* name */
b34976b6 374 FALSE, /* partial_inplace */
252b5132
RH
375 0, /* src_mask */
376 0xfffc, /* dst_mask */
b34976b6 377 TRUE), /* pcrel_offset */
252b5132 378
8da6118f 379 /* A relative 16 bit branch. Bit 10 should be set to indicate that
252b5132
RH
380 the branch is expected to be taken. The lower two bits must be
381 zero. */
382 HOWTO (R_PPC_REL14_BRTAKEN, /* type */
383 0, /* rightshift */
384 2, /* size (0 = byte, 1 = short, 2 = long) */
385 16, /* bitsize */
b34976b6 386 TRUE, /* pc_relative */
252b5132
RH
387 0, /* bitpos */
388 complain_overflow_signed, /* complain_on_overflow */
389 bfd_elf_generic_reloc, /* special_function */
390 "R_PPC_REL14_BRTAKEN", /* name */
b34976b6 391 FALSE, /* partial_inplace */
252b5132
RH
392 0, /* src_mask */
393 0xfffc, /* dst_mask */
b34976b6 394 TRUE), /* pcrel_offset */
252b5132 395
8da6118f 396 /* A relative 16 bit branch. Bit 10 should be set to indicate that
252b5132
RH
397 the branch is not expected to be taken. The lower two bits must
398 be zero. */
399 HOWTO (R_PPC_REL14_BRNTAKEN, /* type */
400 0, /* rightshift */
401 2, /* size (0 = byte, 1 = short, 2 = long) */
402 16, /* bitsize */
b34976b6 403 TRUE, /* pc_relative */
252b5132
RH
404 0, /* bitpos */
405 complain_overflow_signed, /* complain_on_overflow */
406 bfd_elf_generic_reloc, /* special_function */
407 "R_PPC_REL14_BRNTAKEN",/* name */
b34976b6 408 FALSE, /* partial_inplace */
252b5132
RH
409 0, /* src_mask */
410 0xfffc, /* dst_mask */
b34976b6 411 TRUE), /* pcrel_offset */
252b5132
RH
412
413 /* Like R_PPC_ADDR16, but referring to the GOT table entry for the
414 symbol. */
415 HOWTO (R_PPC_GOT16, /* type */
416 0, /* rightshift */
417 1, /* size (0 = byte, 1 = short, 2 = long) */
418 16, /* bitsize */
b34976b6 419 FALSE, /* pc_relative */
252b5132
RH
420 0, /* bitpos */
421 complain_overflow_signed, /* complain_on_overflow */
3ce51288 422 ppc_elf_unhandled_reloc, /* special_function */
252b5132 423 "R_PPC_GOT16", /* name */
b34976b6 424 FALSE, /* partial_inplace */
252b5132
RH
425 0, /* src_mask */
426 0xffff, /* dst_mask */
b34976b6 427 FALSE), /* pcrel_offset */
252b5132
RH
428
429 /* Like R_PPC_ADDR16_LO, but referring to the GOT table entry for
430 the symbol. */
431 HOWTO (R_PPC_GOT16_LO, /* type */
432 0, /* rightshift */
433 1, /* size (0 = byte, 1 = short, 2 = long) */
434 16, /* bitsize */
b34976b6 435 FALSE, /* pc_relative */
252b5132
RH
436 0, /* bitpos */
437 complain_overflow_dont, /* complain_on_overflow */
3ce51288 438 ppc_elf_unhandled_reloc, /* special_function */
252b5132 439 "R_PPC_GOT16_LO", /* name */
b34976b6 440 FALSE, /* partial_inplace */
252b5132
RH
441 0, /* src_mask */
442 0xffff, /* dst_mask */
b34976b6 443 FALSE), /* pcrel_offset */
252b5132
RH
444
445 /* Like R_PPC_ADDR16_HI, but referring to the GOT table entry for
446 the symbol. */
447 HOWTO (R_PPC_GOT16_HI, /* type */
448 16, /* rightshift */
449 1, /* size (0 = byte, 1 = short, 2 = long) */
450 16, /* bitsize */
b34976b6 451 FALSE, /* pc_relative */
252b5132 452 0, /* bitpos */
86c95733 453 complain_overflow_dont, /* complain_on_overflow */
3ce51288 454 ppc_elf_unhandled_reloc, /* special_function */
252b5132 455 "R_PPC_GOT16_HI", /* name */
b34976b6 456 FALSE, /* partial_inplace */
252b5132
RH
457 0, /* src_mask */
458 0xffff, /* dst_mask */
b34976b6 459 FALSE), /* pcrel_offset */
252b5132
RH
460
461 /* Like R_PPC_ADDR16_HA, but referring to the GOT table entry for
462 the symbol. */
463 HOWTO (R_PPC_GOT16_HA, /* type */
464 16, /* rightshift */
465 1, /* size (0 = byte, 1 = short, 2 = long) */
466 16, /* bitsize */
b34976b6 467 FALSE, /* pc_relative */
252b5132 468 0, /* bitpos */
86c95733 469 complain_overflow_dont, /* complain_on_overflow */
3ce51288 470 ppc_elf_unhandled_reloc, /* special_function */
252b5132 471 "R_PPC_GOT16_HA", /* name */
b34976b6 472 FALSE, /* partial_inplace */
252b5132
RH
473 0, /* src_mask */
474 0xffff, /* dst_mask */
b34976b6 475 FALSE), /* pcrel_offset */
252b5132
RH
476
477 /* Like R_PPC_REL24, but referring to the procedure linkage table
478 entry for the symbol. */
479 HOWTO (R_PPC_PLTREL24, /* type */
480 0, /* rightshift */
481 2, /* size (0 = byte, 1 = short, 2 = long) */
482 26, /* bitsize */
b34976b6 483 TRUE, /* pc_relative */
252b5132 484 0, /* bitpos */
3ce51288
AM
485 complain_overflow_signed, /* complain_on_overflow */
486 ppc_elf_unhandled_reloc, /* special_function */
252b5132 487 "R_PPC_PLTREL24", /* name */
b34976b6 488 FALSE, /* partial_inplace */
252b5132
RH
489 0, /* src_mask */
490 0x3fffffc, /* dst_mask */
b34976b6 491 TRUE), /* pcrel_offset */
252b5132
RH
492
493 /* This is used only by the dynamic linker. The symbol should exist
494 both in the object being run and in some shared library. The
495 dynamic linker copies the data addressed by the symbol from the
496 shared library into the object, because the object being
497 run has to have the data at some particular address. */
498 HOWTO (R_PPC_COPY, /* type */
499 0, /* rightshift */
500 2, /* size (0 = byte, 1 = short, 2 = long) */
501 32, /* bitsize */
b34976b6 502 FALSE, /* pc_relative */
252b5132 503 0, /* bitpos */
86c95733 504 complain_overflow_dont, /* complain_on_overflow */
3ce51288 505 ppc_elf_unhandled_reloc, /* special_function */
252b5132 506 "R_PPC_COPY", /* name */
b34976b6 507 FALSE, /* partial_inplace */
252b5132
RH
508 0, /* src_mask */
509 0, /* dst_mask */
b34976b6 510 FALSE), /* pcrel_offset */
252b5132
RH
511
512 /* Like R_PPC_ADDR32, but used when setting global offset table
513 entries. */
514 HOWTO (R_PPC_GLOB_DAT, /* type */
515 0, /* rightshift */
516 2, /* size (0 = byte, 1 = short, 2 = long) */
517 32, /* bitsize */
b34976b6 518 FALSE, /* pc_relative */
252b5132 519 0, /* bitpos */
86c95733 520 complain_overflow_dont, /* complain_on_overflow */
3ce51288 521 ppc_elf_unhandled_reloc, /* special_function */
252b5132 522 "R_PPC_GLOB_DAT", /* name */
b34976b6 523 FALSE, /* partial_inplace */
252b5132
RH
524 0, /* src_mask */
525 0xffffffff, /* dst_mask */
b34976b6 526 FALSE), /* pcrel_offset */
252b5132
RH
527
528 /* Marks a procedure linkage table entry for a symbol. */
529 HOWTO (R_PPC_JMP_SLOT, /* type */
530 0, /* rightshift */
531 2, /* size (0 = byte, 1 = short, 2 = long) */
532 32, /* bitsize */
b34976b6 533 FALSE, /* pc_relative */
252b5132 534 0, /* bitpos */
86c95733 535 complain_overflow_dont, /* complain_on_overflow */
3ce51288 536 ppc_elf_unhandled_reloc, /* special_function */
252b5132 537 "R_PPC_JMP_SLOT", /* name */
b34976b6 538 FALSE, /* partial_inplace */
252b5132
RH
539 0, /* src_mask */
540 0, /* dst_mask */
b34976b6 541 FALSE), /* pcrel_offset */
252b5132
RH
542
543 /* Used only by the dynamic linker. When the object is run, this
544 longword is set to the load address of the object, plus the
545 addend. */
546 HOWTO (R_PPC_RELATIVE, /* type */
547 0, /* rightshift */
548 2, /* size (0 = byte, 1 = short, 2 = long) */
549 32, /* bitsize */
b34976b6 550 FALSE, /* pc_relative */
252b5132 551 0, /* bitpos */
86c95733 552 complain_overflow_dont, /* complain_on_overflow */
252b5132
RH
553 bfd_elf_generic_reloc, /* special_function */
554 "R_PPC_RELATIVE", /* name */
b34976b6 555 FALSE, /* partial_inplace */
252b5132
RH
556 0, /* src_mask */
557 0xffffffff, /* dst_mask */
b34976b6 558 FALSE), /* pcrel_offset */
252b5132
RH
559
560 /* Like R_PPC_REL24, but uses the value of the symbol within the
561 object rather than the final value. Normally used for
562 _GLOBAL_OFFSET_TABLE_. */
563 HOWTO (R_PPC_LOCAL24PC, /* type */
564 0, /* rightshift */
565 2, /* size (0 = byte, 1 = short, 2 = long) */
566 26, /* bitsize */
b34976b6 567 TRUE, /* pc_relative */
252b5132
RH
568 0, /* bitpos */
569 complain_overflow_signed, /* complain_on_overflow */
570 bfd_elf_generic_reloc, /* special_function */
571 "R_PPC_LOCAL24PC", /* name */
b34976b6 572 FALSE, /* partial_inplace */
252b5132
RH
573 0, /* src_mask */
574 0x3fffffc, /* dst_mask */
b34976b6 575 TRUE), /* pcrel_offset */
252b5132
RH
576
577 /* Like R_PPC_ADDR32, but may be unaligned. */
578 HOWTO (R_PPC_UADDR32, /* type */
579 0, /* rightshift */
580 2, /* size (0 = byte, 1 = short, 2 = long) */
581 32, /* bitsize */
b34976b6 582 FALSE, /* pc_relative */
252b5132 583 0, /* bitpos */
86c95733 584 complain_overflow_dont, /* complain_on_overflow */
252b5132
RH
585 bfd_elf_generic_reloc, /* special_function */
586 "R_PPC_UADDR32", /* name */
b34976b6 587 FALSE, /* partial_inplace */
252b5132
RH
588 0, /* src_mask */
589 0xffffffff, /* dst_mask */
b34976b6 590 FALSE), /* pcrel_offset */
252b5132
RH
591
592 /* Like R_PPC_ADDR16, but may be unaligned. */
593 HOWTO (R_PPC_UADDR16, /* type */
594 0, /* rightshift */
595 1, /* size (0 = byte, 1 = short, 2 = long) */
596 16, /* bitsize */
b34976b6 597 FALSE, /* pc_relative */
252b5132
RH
598 0, /* bitpos */
599 complain_overflow_bitfield, /* complain_on_overflow */
600 bfd_elf_generic_reloc, /* special_function */
601 "R_PPC_UADDR16", /* name */
b34976b6 602 FALSE, /* partial_inplace */
252b5132
RH
603 0, /* src_mask */
604 0xffff, /* dst_mask */
b34976b6 605 FALSE), /* pcrel_offset */
252b5132
RH
606
607 /* 32-bit PC relative */
608 HOWTO (R_PPC_REL32, /* type */
609 0, /* rightshift */
610 2, /* size (0 = byte, 1 = short, 2 = long) */
611 32, /* bitsize */
b34976b6 612 TRUE, /* pc_relative */
252b5132 613 0, /* bitpos */
86c95733 614 complain_overflow_dont, /* complain_on_overflow */
252b5132
RH
615 bfd_elf_generic_reloc, /* special_function */
616 "R_PPC_REL32", /* name */
b34976b6 617 FALSE, /* partial_inplace */
252b5132
RH
618 0, /* src_mask */
619 0xffffffff, /* dst_mask */
b34976b6 620 TRUE), /* pcrel_offset */
252b5132
RH
621
622 /* 32-bit relocation to the symbol's procedure linkage table.
c3668558 623 FIXME: not supported. */
252b5132
RH
624 HOWTO (R_PPC_PLT32, /* type */
625 0, /* rightshift */
626 2, /* size (0 = byte, 1 = short, 2 = long) */
627 32, /* bitsize */
b34976b6 628 FALSE, /* pc_relative */
252b5132 629 0, /* bitpos */
86c95733 630 complain_overflow_dont, /* complain_on_overflow */
3ce51288 631 ppc_elf_unhandled_reloc, /* special_function */
252b5132 632 "R_PPC_PLT32", /* name */
b34976b6 633 FALSE, /* partial_inplace */
252b5132
RH
634 0, /* src_mask */
635 0, /* dst_mask */
b34976b6 636 FALSE), /* pcrel_offset */
252b5132
RH
637
638 /* 32-bit PC relative relocation to the symbol's procedure linkage table.
c3668558 639 FIXME: not supported. */
252b5132
RH
640 HOWTO (R_PPC_PLTREL32, /* type */
641 0, /* rightshift */
642 2, /* size (0 = byte, 1 = short, 2 = long) */
643 32, /* bitsize */
b34976b6 644 TRUE, /* pc_relative */
252b5132 645 0, /* bitpos */
86c95733 646 complain_overflow_dont, /* complain_on_overflow */
3ce51288 647 ppc_elf_unhandled_reloc, /* special_function */
252b5132 648 "R_PPC_PLTREL32", /* name */
b34976b6 649 FALSE, /* partial_inplace */
252b5132
RH
650 0, /* src_mask */
651 0, /* dst_mask */
b34976b6 652 TRUE), /* pcrel_offset */
252b5132
RH
653
654 /* Like R_PPC_ADDR16_LO, but referring to the PLT table entry for
655 the symbol. */
656 HOWTO (R_PPC_PLT16_LO, /* type */
657 0, /* rightshift */
658 1, /* size (0 = byte, 1 = short, 2 = long) */
659 16, /* bitsize */
b34976b6 660 FALSE, /* pc_relative */
252b5132
RH
661 0, /* bitpos */
662 complain_overflow_dont, /* complain_on_overflow */
3ce51288 663 ppc_elf_unhandled_reloc, /* special_function */
252b5132 664 "R_PPC_PLT16_LO", /* name */
b34976b6 665 FALSE, /* partial_inplace */
252b5132
RH
666 0, /* src_mask */
667 0xffff, /* dst_mask */
b34976b6 668 FALSE), /* pcrel_offset */
252b5132
RH
669
670 /* Like R_PPC_ADDR16_HI, but referring to the PLT table entry for
671 the symbol. */
672 HOWTO (R_PPC_PLT16_HI, /* type */
673 16, /* rightshift */
674 1, /* size (0 = byte, 1 = short, 2 = long) */
675 16, /* bitsize */
b34976b6 676 FALSE, /* pc_relative */
252b5132 677 0, /* bitpos */
86c95733 678 complain_overflow_dont, /* complain_on_overflow */
3ce51288 679 ppc_elf_unhandled_reloc, /* special_function */
252b5132 680 "R_PPC_PLT16_HI", /* name */
b34976b6 681 FALSE, /* partial_inplace */
252b5132
RH
682 0, /* src_mask */
683 0xffff, /* dst_mask */
b34976b6 684 FALSE), /* pcrel_offset */
252b5132
RH
685
686 /* Like R_PPC_ADDR16_HA, but referring to the PLT table entry for
687 the symbol. */
688 HOWTO (R_PPC_PLT16_HA, /* type */
689 16, /* rightshift */
690 1, /* size (0 = byte, 1 = short, 2 = long) */
691 16, /* bitsize */
b34976b6 692 FALSE, /* pc_relative */
252b5132 693 0, /* bitpos */
86c95733 694 complain_overflow_dont, /* complain_on_overflow */
3ce51288 695 ppc_elf_unhandled_reloc, /* special_function */
252b5132 696 "R_PPC_PLT16_HA", /* name */
b34976b6 697 FALSE, /* partial_inplace */
252b5132
RH
698 0, /* src_mask */
699 0xffff, /* dst_mask */
b34976b6 700 FALSE), /* pcrel_offset */
252b5132
RH
701
702 /* A sign-extended 16 bit value relative to _SDA_BASE_, for use with
703 small data items. */
704 HOWTO (R_PPC_SDAREL16, /* type */
705 0, /* rightshift */
706 1, /* size (0 = byte, 1 = short, 2 = long) */
707 16, /* bitsize */
b34976b6 708 FALSE, /* pc_relative */
252b5132
RH
709 0, /* bitpos */
710 complain_overflow_signed, /* complain_on_overflow */
3ce51288 711 ppc_elf_unhandled_reloc, /* special_function */
252b5132 712 "R_PPC_SDAREL16", /* name */
b34976b6 713 FALSE, /* partial_inplace */
252b5132
RH
714 0, /* src_mask */
715 0xffff, /* dst_mask */
b34976b6 716 FALSE), /* pcrel_offset */
252b5132 717
c061c2d8 718 /* 16-bit section relative relocation. */
252b5132
RH
719 HOWTO (R_PPC_SECTOFF, /* type */
720 0, /* rightshift */
c061c2d8
AM
721 1, /* size (0 = byte, 1 = short, 2 = long) */
722 16, /* bitsize */
b34976b6 723 FALSE, /* pc_relative */
252b5132 724 0, /* bitpos */
86c95733 725 complain_overflow_signed, /* complain_on_overflow */
3ce51288 726 ppc_elf_unhandled_reloc, /* special_function */
252b5132 727 "R_PPC_SECTOFF", /* name */
b34976b6 728 FALSE, /* partial_inplace */
252b5132 729 0, /* src_mask */
c061c2d8 730 0xffff, /* dst_mask */
b34976b6 731 FALSE), /* pcrel_offset */
252b5132 732
c3668558 733 /* 16-bit lower half section relative relocation. */
252b5132
RH
734 HOWTO (R_PPC_SECTOFF_LO, /* type */
735 0, /* rightshift */
736 1, /* size (0 = byte, 1 = short, 2 = long) */
737 16, /* bitsize */
b34976b6 738 FALSE, /* pc_relative */
252b5132
RH
739 0, /* bitpos */
740 complain_overflow_dont, /* complain_on_overflow */
3ce51288 741 ppc_elf_unhandled_reloc, /* special_function */
252b5132 742 "R_PPC_SECTOFF_LO", /* name */
b34976b6 743 FALSE, /* partial_inplace */
252b5132
RH
744 0, /* src_mask */
745 0xffff, /* dst_mask */
b34976b6 746 FALSE), /* pcrel_offset */
252b5132 747
c3668558 748 /* 16-bit upper half section relative relocation. */
252b5132
RH
749 HOWTO (R_PPC_SECTOFF_HI, /* type */
750 16, /* rightshift */
751 1, /* size (0 = byte, 1 = short, 2 = long) */
752 16, /* bitsize */
b34976b6 753 FALSE, /* pc_relative */
252b5132 754 0, /* bitpos */
86c95733 755 complain_overflow_dont, /* complain_on_overflow */
3ce51288 756 ppc_elf_unhandled_reloc, /* special_function */
252b5132 757 "R_PPC_SECTOFF_HI", /* name */
b34976b6 758 FALSE, /* partial_inplace */
252b5132
RH
759 0, /* src_mask */
760 0xffff, /* dst_mask */
b34976b6 761 FALSE), /* pcrel_offset */
252b5132 762
c3668558 763 /* 16-bit upper half adjusted section relative relocation. */
252b5132
RH
764 HOWTO (R_PPC_SECTOFF_HA, /* type */
765 16, /* rightshift */
766 1, /* size (0 = byte, 1 = short, 2 = long) */
767 16, /* bitsize */
b34976b6 768 FALSE, /* pc_relative */
252b5132 769 0, /* bitpos */
86c95733 770 complain_overflow_dont, /* complain_on_overflow */
3ce51288 771 ppc_elf_unhandled_reloc, /* special_function */
252b5132 772 "R_PPC_SECTOFF_HA", /* name */
b34976b6 773 FALSE, /* partial_inplace */
252b5132
RH
774 0, /* src_mask */
775 0xffff, /* dst_mask */
b34976b6 776 FALSE), /* pcrel_offset */
252b5132 777
727fc41e 778 /* Marker relocs for TLS. */
7619e7c7 779 HOWTO (R_PPC_TLS,
252b5132
RH
780 0, /* rightshift */
781 2, /* size (0 = byte, 1 = short, 2 = long) */
782 32, /* bitsize */
b34976b6 783 FALSE, /* pc_relative */
252b5132 784 0, /* bitpos */
7619e7c7 785 complain_overflow_dont, /* complain_on_overflow */
252b5132 786 bfd_elf_generic_reloc, /* special_function */
7619e7c7
AM
787 "R_PPC_TLS", /* name */
788 FALSE, /* partial_inplace */
789 0, /* src_mask */
790 0, /* dst_mask */
791 FALSE), /* pcrel_offset */
792
727fc41e
AM
793 HOWTO (R_PPC_TLSGD,
794 0, /* rightshift */
795 2, /* size (0 = byte, 1 = short, 2 = long) */
796 32, /* bitsize */
797 FALSE, /* pc_relative */
798 0, /* bitpos */
799 complain_overflow_dont, /* complain_on_overflow */
800 bfd_elf_generic_reloc, /* special_function */
801 "R_PPC_TLSGD", /* name */
802 FALSE, /* partial_inplace */
803 0, /* src_mask */
804 0, /* dst_mask */
805 FALSE), /* pcrel_offset */
806
807 HOWTO (R_PPC_TLSLD,
808 0, /* rightshift */
809 2, /* size (0 = byte, 1 = short, 2 = long) */
810 32, /* bitsize */
811 FALSE, /* pc_relative */
812 0, /* bitpos */
813 complain_overflow_dont, /* complain_on_overflow */
814 bfd_elf_generic_reloc, /* special_function */
815 "R_PPC_TLSLD", /* name */
816 FALSE, /* partial_inplace */
817 0, /* src_mask */
818 0, /* dst_mask */
819 FALSE), /* pcrel_offset */
820
23cedd1d
AM
821 /* Marker relocs on inline plt call instructions. */
822 HOWTO (R_PPC_PLTSEQ,
823 0, /* rightshift */
824 2, /* size (0 = byte, 1 = short, 2 = long) */
825 32, /* bitsize */
826 FALSE, /* pc_relative */
827 0, /* bitpos */
828 complain_overflow_dont, /* complain_on_overflow */
829 bfd_elf_generic_reloc, /* special_function */
830 "R_PPC_PLTSEQ", /* name */
831 FALSE, /* partial_inplace */
832 0, /* src_mask */
833 0, /* dst_mask */
834 FALSE), /* pcrel_offset */
835
836 HOWTO (R_PPC_PLTCALL,
837 0, /* rightshift */
838 2, /* size (0 = byte, 1 = short, 2 = long) */
839 32, /* bitsize */
840 FALSE, /* pc_relative */
841 0, /* bitpos */
842 complain_overflow_dont, /* complain_on_overflow */
843 bfd_elf_generic_reloc, /* special_function */
844 "R_PPC_PLTCALL", /* name */
845 FALSE, /* partial_inplace */
846 0, /* src_mask */
847 0, /* dst_mask */
848 FALSE), /* pcrel_offset */
849
7619e7c7
AM
850 /* Computes the load module index of the load module that contains the
851 definition of its TLS sym. */
852 HOWTO (R_PPC_DTPMOD32,
853 0, /* rightshift */
854 2, /* size (0 = byte, 1 = short, 2 = long) */
855 32, /* bitsize */
856 FALSE, /* pc_relative */
857 0, /* bitpos */
858 complain_overflow_dont, /* complain_on_overflow */
859 ppc_elf_unhandled_reloc, /* special_function */
860 "R_PPC_DTPMOD32", /* name */
b34976b6 861 FALSE, /* partial_inplace */
252b5132
RH
862 0, /* src_mask */
863 0xffffffff, /* dst_mask */
b34976b6 864 FALSE), /* pcrel_offset */
252b5132 865
7619e7c7
AM
866 /* Computes a dtv-relative displacement, the difference between the value
867 of sym+add and the base address of the thread-local storage block that
868 contains the definition of sym, minus 0x8000. */
869 HOWTO (R_PPC_DTPREL32,
870 0, /* rightshift */
871 2, /* size (0 = byte, 1 = short, 2 = long) */
872 32, /* bitsize */
873 FALSE, /* pc_relative */
874 0, /* bitpos */
875 complain_overflow_dont, /* complain_on_overflow */
876 ppc_elf_unhandled_reloc, /* special_function */
877 "R_PPC_DTPREL32", /* name */
878 FALSE, /* partial_inplace */
879 0, /* src_mask */
880 0xffffffff, /* dst_mask */
881 FALSE), /* pcrel_offset */
882
883 /* A 16 bit dtprel reloc. */
884 HOWTO (R_PPC_DTPREL16,
252b5132
RH
885 0, /* rightshift */
886 1, /* size (0 = byte, 1 = short, 2 = long) */
887 16, /* bitsize */
b34976b6 888 FALSE, /* pc_relative */
252b5132 889 0, /* bitpos */
7619e7c7
AM
890 complain_overflow_signed, /* complain_on_overflow */
891 ppc_elf_unhandled_reloc, /* special_function */
892 "R_PPC_DTPREL16", /* name */
b34976b6 893 FALSE, /* partial_inplace */
252b5132
RH
894 0, /* src_mask */
895 0xffff, /* dst_mask */
b34976b6 896 FALSE), /* pcrel_offset */
252b5132 897
7619e7c7
AM
898 /* Like DTPREL16, but no overflow. */
899 HOWTO (R_PPC_DTPREL16_LO,
252b5132
RH
900 0, /* rightshift */
901 1, /* size (0 = byte, 1 = short, 2 = long) */
902 16, /* bitsize */
b34976b6 903 FALSE, /* pc_relative */
252b5132 904 0, /* bitpos */
7619e7c7
AM
905 complain_overflow_dont, /* complain_on_overflow */
906 ppc_elf_unhandled_reloc, /* special_function */
907 "R_PPC_DTPREL16_LO", /* name */
b34976b6 908 FALSE, /* partial_inplace */
252b5132
RH
909 0, /* src_mask */
910 0xffff, /* dst_mask */
b34976b6 911 FALSE), /* pcrel_offset */
252b5132 912
7619e7c7
AM
913 /* Like DTPREL16_LO, but next higher group of 16 bits. */
914 HOWTO (R_PPC_DTPREL16_HI,
252b5132
RH
915 16, /* rightshift */
916 1, /* size (0 = byte, 1 = short, 2 = long) */
917 16, /* bitsize */
b34976b6 918 FALSE, /* pc_relative */
252b5132
RH
919 0, /* bitpos */
920 complain_overflow_dont, /* complain_on_overflow */
7619e7c7
AM
921 ppc_elf_unhandled_reloc, /* special_function */
922 "R_PPC_DTPREL16_HI", /* name */
b34976b6 923 FALSE, /* partial_inplace */
252b5132
RH
924 0, /* src_mask */
925 0xffff, /* dst_mask */
b34976b6 926 FALSE), /* pcrel_offset */
252b5132 927
7619e7c7
AM
928 /* Like DTPREL16_HI, but adjust for low 16 bits. */
929 HOWTO (R_PPC_DTPREL16_HA,
252b5132
RH
930 16, /* rightshift */
931 1, /* size (0 = byte, 1 = short, 2 = long) */
932 16, /* bitsize */
b34976b6 933 FALSE, /* pc_relative */
252b5132
RH
934 0, /* bitpos */
935 complain_overflow_dont, /* complain_on_overflow */
7619e7c7
AM
936 ppc_elf_unhandled_reloc, /* special_function */
937 "R_PPC_DTPREL16_HA", /* name */
b34976b6 938 FALSE, /* partial_inplace */
252b5132
RH
939 0, /* src_mask */
940 0xffff, /* dst_mask */
b34976b6 941 FALSE), /* pcrel_offset */
252b5132 942
7619e7c7
AM
943 /* Computes a tp-relative displacement, the difference between the value of
944 sym+add and the value of the thread pointer (r13). */
945 HOWTO (R_PPC_TPREL32,
946 0, /* rightshift */
947 2, /* size (0 = byte, 1 = short, 2 = long) */
948 32, /* bitsize */
949 FALSE, /* pc_relative */
950 0, /* bitpos */
951 complain_overflow_dont, /* complain_on_overflow */
952 ppc_elf_unhandled_reloc, /* special_function */
953 "R_PPC_TPREL32", /* name */
954 FALSE, /* partial_inplace */
955 0, /* src_mask */
956 0xffffffff, /* dst_mask */
957 FALSE), /* pcrel_offset */
958
959 /* A 16 bit tprel reloc. */
960 HOWTO (R_PPC_TPREL16,
252b5132
RH
961 0, /* rightshift */
962 1, /* size (0 = byte, 1 = short, 2 = long) */
963 16, /* bitsize */
b34976b6 964 FALSE, /* pc_relative */
252b5132 965 0, /* bitpos */
7619e7c7
AM
966 complain_overflow_signed, /* complain_on_overflow */
967 ppc_elf_unhandled_reloc, /* special_function */
968 "R_PPC_TPREL16", /* name */
b34976b6 969 FALSE, /* partial_inplace */
252b5132
RH
970 0, /* src_mask */
971 0xffff, /* dst_mask */
b34976b6 972 FALSE), /* pcrel_offset */
252b5132 973
7619e7c7
AM
974 /* Like TPREL16, but no overflow. */
975 HOWTO (R_PPC_TPREL16_LO,
252b5132
RH
976 0, /* rightshift */
977 1, /* size (0 = byte, 1 = short, 2 = long) */
978 16, /* bitsize */
b34976b6 979 FALSE, /* pc_relative */
252b5132 980 0, /* bitpos */
7619e7c7
AM
981 complain_overflow_dont, /* complain_on_overflow */
982 ppc_elf_unhandled_reloc, /* special_function */
983 "R_PPC_TPREL16_LO", /* name */
b34976b6 984 FALSE, /* partial_inplace */
252b5132
RH
985 0, /* src_mask */
986 0xffff, /* dst_mask */
b34976b6 987 FALSE), /* pcrel_offset */
252b5132 988
7619e7c7
AM
989 /* Like TPREL16_LO, but next higher group of 16 bits. */
990 HOWTO (R_PPC_TPREL16_HI,
991 16, /* rightshift */
992 1, /* size (0 = byte, 1 = short, 2 = long) */
993 16, /* bitsize */
994 FALSE, /* pc_relative */
995 0, /* bitpos */
996 complain_overflow_dont, /* complain_on_overflow */
997 ppc_elf_unhandled_reloc, /* special_function */
998 "R_PPC_TPREL16_HI", /* name */
999 FALSE, /* partial_inplace */
1000 0, /* src_mask */
1001 0xffff, /* dst_mask */
1002 FALSE), /* pcrel_offset */
1003
1004 /* Like TPREL16_HI, but adjust for low 16 bits. */
1005 HOWTO (R_PPC_TPREL16_HA,
1006 16, /* rightshift */
1007 1, /* size (0 = byte, 1 = short, 2 = long) */
1008 16, /* bitsize */
1009 FALSE, /* pc_relative */
1010 0, /* bitpos */
1011 complain_overflow_dont, /* complain_on_overflow */
1012 ppc_elf_unhandled_reloc, /* special_function */
1013 "R_PPC_TPREL16_HA", /* name */
1014 FALSE, /* partial_inplace */
1015 0, /* src_mask */
1016 0xffff, /* dst_mask */
1017 FALSE), /* pcrel_offset */
1018
1019 /* Allocates two contiguous entries in the GOT to hold a tls_index structure,
1020 with values (sym+add)@dtpmod and (sym+add)@dtprel, and computes the offset
1021 to the first entry. */
1022 HOWTO (R_PPC_GOT_TLSGD16,
252b5132
RH
1023 0, /* rightshift */
1024 1, /* size (0 = byte, 1 = short, 2 = long) */
1025 16, /* bitsize */
b34976b6 1026 FALSE, /* pc_relative */
252b5132
RH
1027 0, /* bitpos */
1028 complain_overflow_signed, /* complain_on_overflow */
7619e7c7
AM
1029 ppc_elf_unhandled_reloc, /* special_function */
1030 "R_PPC_GOT_TLSGD16", /* name */
b34976b6 1031 FALSE, /* partial_inplace */
252b5132
RH
1032 0, /* src_mask */
1033 0xffff, /* dst_mask */
b34976b6 1034 FALSE), /* pcrel_offset */
252b5132 1035
7619e7c7
AM
1036 /* Like GOT_TLSGD16, but no overflow. */
1037 HOWTO (R_PPC_GOT_TLSGD16_LO,
252b5132 1038 0, /* rightshift */
7619e7c7 1039 1, /* size (0 = byte, 1 = short, 2 = long) */
252b5132 1040 16, /* bitsize */
b34976b6 1041 FALSE, /* pc_relative */
252b5132 1042 0, /* bitpos */
7619e7c7
AM
1043 complain_overflow_dont, /* complain_on_overflow */
1044 ppc_elf_unhandled_reloc, /* special_function */
1045 "R_PPC_GOT_TLSGD16_LO", /* name */
b34976b6 1046 FALSE, /* partial_inplace */
252b5132
RH
1047 0, /* src_mask */
1048 0xffff, /* dst_mask */
b34976b6 1049 FALSE), /* pcrel_offset */
252b5132 1050
7619e7c7
AM
1051 /* Like GOT_TLSGD16_LO, but next higher group of 16 bits. */
1052 HOWTO (R_PPC_GOT_TLSGD16_HI,
1053 16, /* rightshift */
1054 1, /* size (0 = byte, 1 = short, 2 = long) */
1055 16, /* bitsize */
1056 FALSE, /* pc_relative */
1057 0, /* bitpos */
1058 complain_overflow_dont, /* complain_on_overflow */
1059 ppc_elf_unhandled_reloc, /* special_function */
1060 "R_PPC_GOT_TLSGD16_HI", /* name */
1061 FALSE, /* partial_inplace */
1062 0, /* src_mask */
1063 0xffff, /* dst_mask */
1064 FALSE), /* pcrel_offset */
252b5132 1065
7619e7c7
AM
1066 /* Like GOT_TLSGD16_HI, but adjust for low 16 bits. */
1067 HOWTO (R_PPC_GOT_TLSGD16_HA,
1068 16, /* rightshift */
1069 1, /* size (0 = byte, 1 = short, 2 = long) */
1070 16, /* bitsize */
1071 FALSE, /* pc_relative */
1072 0, /* bitpos */
1073 complain_overflow_dont, /* complain_on_overflow */
1074 ppc_elf_unhandled_reloc, /* special_function */
1075 "R_PPC_GOT_TLSGD16_HA", /* name */
1076 FALSE, /* partial_inplace */
1077 0, /* src_mask */
1078 0xffff, /* dst_mask */
1079 FALSE), /* pcrel_offset */
1080
1081 /* Allocates two contiguous entries in the GOT to hold a tls_index structure,
1082 with values (sym+add)@dtpmod and zero, and computes the offset to the
1083 first entry. */
1084 HOWTO (R_PPC_GOT_TLSLD16,
252b5132
RH
1085 0, /* rightshift */
1086 1, /* size (0 = byte, 1 = short, 2 = long) */
1087 16, /* bitsize */
7619e7c7 1088 FALSE, /* pc_relative */
252b5132
RH
1089 0, /* bitpos */
1090 complain_overflow_signed, /* complain_on_overflow */
7619e7c7
AM
1091 ppc_elf_unhandled_reloc, /* special_function */
1092 "R_PPC_GOT_TLSLD16", /* name */
b34976b6 1093 FALSE, /* partial_inplace */
252b5132
RH
1094 0, /* src_mask */
1095 0xffff, /* dst_mask */
b34976b6 1096 FALSE), /* pcrel_offset */
252b5132 1097
7619e7c7
AM
1098 /* Like GOT_TLSLD16, but no overflow. */
1099 HOWTO (R_PPC_GOT_TLSLD16_LO,
252b5132 1100 0, /* rightshift */
7619e7c7
AM
1101 1, /* size (0 = byte, 1 = short, 2 = long) */
1102 16, /* bitsize */
b34976b6 1103 FALSE, /* pc_relative */
252b5132
RH
1104 0, /* bitpos */
1105 complain_overflow_dont, /* complain_on_overflow */
7619e7c7
AM
1106 ppc_elf_unhandled_reloc, /* special_function */
1107 "R_PPC_GOT_TLSLD16_LO", /* name */
b34976b6 1108 FALSE, /* partial_inplace */
252b5132 1109 0, /* src_mask */
7619e7c7 1110 0xffff, /* dst_mask */
b34976b6 1111 FALSE), /* pcrel_offset */
252b5132 1112
7619e7c7
AM
1113 /* Like GOT_TLSLD16_LO, but next higher group of 16 bits. */
1114 HOWTO (R_PPC_GOT_TLSLD16_HI,
1115 16, /* rightshift */
1116 1, /* size (0 = byte, 1 = short, 2 = long) */
1117 16, /* bitsize */
b34976b6 1118 FALSE, /* pc_relative */
252b5132
RH
1119 0, /* bitpos */
1120 complain_overflow_dont, /* complain_on_overflow */
7619e7c7
AM
1121 ppc_elf_unhandled_reloc, /* special_function */
1122 "R_PPC_GOT_TLSLD16_HI", /* name */
b34976b6 1123 FALSE, /* partial_inplace */
252b5132 1124 0, /* src_mask */
7619e7c7 1125 0xffff, /* dst_mask */
b34976b6 1126 FALSE), /* pcrel_offset */
252b5132 1127
7619e7c7
AM
1128 /* Like GOT_TLSLD16_HI, but adjust for low 16 bits. */
1129 HOWTO (R_PPC_GOT_TLSLD16_HA,
1130 16, /* rightshift */
1131 1, /* size (0 = byte, 1 = short, 2 = long) */
1132 16, /* bitsize */
1133 FALSE, /* pc_relative */
1134 0, /* bitpos */
1135 complain_overflow_dont, /* complain_on_overflow */
1136 ppc_elf_unhandled_reloc, /* special_function */
1137 "R_PPC_GOT_TLSLD16_HA", /* name */
1138 FALSE, /* partial_inplace */
1139 0, /* src_mask */
1140 0xffff, /* dst_mask */
1141 FALSE), /* pcrel_offset */
1142
1143 /* Allocates an entry in the GOT with value (sym+add)@dtprel, and computes
1144 the offset to the entry. */
1145 HOWTO (R_PPC_GOT_DTPREL16,
252b5132
RH
1146 0, /* rightshift */
1147 1, /* size (0 = byte, 1 = short, 2 = long) */
1148 16, /* bitsize */
b34976b6 1149 FALSE, /* pc_relative */
252b5132
RH
1150 0, /* bitpos */
1151 complain_overflow_signed, /* complain_on_overflow */
7619e7c7
AM
1152 ppc_elf_unhandled_reloc, /* special_function */
1153 "R_PPC_GOT_DTPREL16", /* name */
b34976b6 1154 FALSE, /* partial_inplace */
252b5132
RH
1155 0, /* src_mask */
1156 0xffff, /* dst_mask */
b34976b6 1157 FALSE), /* pcrel_offset */
252b5132 1158
7619e7c7
AM
1159 /* Like GOT_DTPREL16, but no overflow. */
1160 HOWTO (R_PPC_GOT_DTPREL16_LO,
1161 0, /* rightshift */
1162 1, /* size (0 = byte, 1 = short, 2 = long) */
1163 16, /* bitsize */
1164 FALSE, /* pc_relative */
1165 0, /* bitpos */
1166 complain_overflow_dont, /* complain_on_overflow */
1167 ppc_elf_unhandled_reloc, /* special_function */
1168 "R_PPC_GOT_DTPREL16_LO", /* name */
1169 FALSE, /* partial_inplace */
1170 0, /* src_mask */
1171 0xffff, /* dst_mask */
1172 FALSE), /* pcrel_offset */
252b5132 1173
7619e7c7
AM
1174 /* Like GOT_DTPREL16_LO, but next higher group of 16 bits. */
1175 HOWTO (R_PPC_GOT_DTPREL16_HI,
1176 16, /* rightshift */
1177 1, /* size (0 = byte, 1 = short, 2 = long) */
1178 16, /* bitsize */
1179 FALSE, /* pc_relative */
1180 0, /* bitpos */
1181 complain_overflow_dont, /* complain_on_overflow */
1182 ppc_elf_unhandled_reloc, /* special_function */
1183 "R_PPC_GOT_DTPREL16_HI", /* name */
1184 FALSE, /* partial_inplace */
1185 0, /* src_mask */
1186 0xffff, /* dst_mask */
1187 FALSE), /* pcrel_offset */
252b5132 1188
7619e7c7
AM
1189 /* Like GOT_DTPREL16_HI, but adjust for low 16 bits. */
1190 HOWTO (R_PPC_GOT_DTPREL16_HA,
1191 16, /* rightshift */
1192 1, /* size (0 = byte, 1 = short, 2 = long) */
1193 16, /* bitsize */
1194 FALSE, /* pc_relative */
1195 0, /* bitpos */
1196 complain_overflow_dont, /* complain_on_overflow */
1197 ppc_elf_unhandled_reloc, /* special_function */
1198 "R_PPC_GOT_DTPREL16_HA", /* name */
1199 FALSE, /* partial_inplace */
1200 0, /* src_mask */
1201 0xffff, /* dst_mask */
1202 FALSE), /* pcrel_offset */
c3668558 1203
7619e7c7
AM
1204 /* Allocates an entry in the GOT with value (sym+add)@tprel, and computes the
1205 offset to the entry. */
1206 HOWTO (R_PPC_GOT_TPREL16,
1207 0, /* rightshift */
1208 1, /* size (0 = byte, 1 = short, 2 = long) */
1209 16, /* bitsize */
1210 FALSE, /* pc_relative */
1211 0, /* bitpos */
1212 complain_overflow_signed, /* complain_on_overflow */
1213 ppc_elf_unhandled_reloc, /* special_function */
1214 "R_PPC_GOT_TPREL16", /* name */
1215 FALSE, /* partial_inplace */
1216 0, /* src_mask */
1217 0xffff, /* dst_mask */
1218 FALSE), /* pcrel_offset */
1219
1220 /* Like GOT_TPREL16, but no overflow. */
1221 HOWTO (R_PPC_GOT_TPREL16_LO,
1222 0, /* rightshift */
1223 1, /* size (0 = byte, 1 = short, 2 = long) */
1224 16, /* bitsize */
1225 FALSE, /* pc_relative */
1226 0, /* bitpos */
1227 complain_overflow_dont, /* complain_on_overflow */
1228 ppc_elf_unhandled_reloc, /* special_function */
1229 "R_PPC_GOT_TPREL16_LO", /* name */
1230 FALSE, /* partial_inplace */
1231 0, /* src_mask */
1232 0xffff, /* dst_mask */
1233 FALSE), /* pcrel_offset */
1234
1235 /* Like GOT_TPREL16_LO, but next higher group of 16 bits. */
1236 HOWTO (R_PPC_GOT_TPREL16_HI,
1237 16, /* rightshift */
1238 1, /* size (0 = byte, 1 = short, 2 = long) */
1239 16, /* bitsize */
1240 FALSE, /* pc_relative */
1241 0, /* bitpos */
1242 complain_overflow_dont, /* complain_on_overflow */
1243 ppc_elf_unhandled_reloc, /* special_function */
1244 "R_PPC_GOT_TPREL16_HI", /* name */
1245 FALSE, /* partial_inplace */
1246 0, /* src_mask */
1247 0xffff, /* dst_mask */
1248 FALSE), /* pcrel_offset */
1249
1250 /* Like GOT_TPREL16_HI, but adjust for low 16 bits. */
1251 HOWTO (R_PPC_GOT_TPREL16_HA,
1252 16, /* rightshift */
1253 1, /* size (0 = byte, 1 = short, 2 = long) */
1254 16, /* bitsize */
1255 FALSE, /* pc_relative */
1256 0, /* bitpos */
1257 complain_overflow_dont, /* complain_on_overflow */
1258 ppc_elf_unhandled_reloc, /* special_function */
1259 "R_PPC_GOT_TPREL16_HA", /* name */
1260 FALSE, /* partial_inplace */
1261 0, /* src_mask */
1262 0xffff, /* dst_mask */
1263 FALSE), /* pcrel_offset */
1264
1265 /* The remaining relocs are from the Embedded ELF ABI, and are not
1266 in the SVR4 ELF ABI. */
1267
1268 /* 32 bit value resulting from the addend minus the symbol. */
1269 HOWTO (R_PPC_EMB_NADDR32, /* type */
1270 0, /* rightshift */
1271 2, /* size (0 = byte, 1 = short, 2 = long) */
1272 32, /* bitsize */
1273 FALSE, /* pc_relative */
1274 0, /* bitpos */
86c95733 1275 complain_overflow_dont, /* complain_on_overflow */
3ce51288 1276 ppc_elf_unhandled_reloc, /* special_function */
7619e7c7
AM
1277 "R_PPC_EMB_NADDR32", /* name */
1278 FALSE, /* partial_inplace */
1279 0, /* src_mask */
1280 0xffffffff, /* dst_mask */
1281 FALSE), /* pcrel_offset */
1282
1283 /* 16 bit value resulting from the addend minus the symbol. */
1284 HOWTO (R_PPC_EMB_NADDR16, /* type */
1285 0, /* rightshift */
1286 1, /* size (0 = byte, 1 = short, 2 = long) */
1287 16, /* bitsize */
1288 FALSE, /* pc_relative */
1289 0, /* bitpos */
86c95733 1290 complain_overflow_signed, /* complain_on_overflow */
3ce51288 1291 ppc_elf_unhandled_reloc, /* special_function */
7619e7c7
AM
1292 "R_PPC_EMB_NADDR16", /* name */
1293 FALSE, /* partial_inplace */
1294 0, /* src_mask */
1295 0xffff, /* dst_mask */
1296 FALSE), /* pcrel_offset */
1297
1298 /* 16 bit value resulting from the addend minus the symbol. */
1299 HOWTO (R_PPC_EMB_NADDR16_LO, /* type */
1300 0, /* rightshift */
1301 1, /* size (0 = byte, 1 = short, 2 = long) */
1302 16, /* bitsize */
1303 FALSE, /* pc_relative */
1304 0, /* bitpos */
1305 complain_overflow_dont,/* complain_on_overflow */
3ce51288 1306 ppc_elf_unhandled_reloc, /* special_function */
7619e7c7
AM
1307 "R_PPC_EMB_ADDR16_LO", /* name */
1308 FALSE, /* partial_inplace */
1309 0, /* src_mask */
1310 0xffff, /* dst_mask */
1311 FALSE), /* pcrel_offset */
1312
1313 /* The high order 16 bits of the addend minus the symbol. */
1314 HOWTO (R_PPC_EMB_NADDR16_HI, /* type */
1315 16, /* rightshift */
1316 1, /* size (0 = byte, 1 = short, 2 = long) */
1317 16, /* bitsize */
1318 FALSE, /* pc_relative */
1319 0, /* bitpos */
1320 complain_overflow_dont, /* complain_on_overflow */
3ce51288 1321 ppc_elf_unhandled_reloc, /* special_function */
7619e7c7
AM
1322 "R_PPC_EMB_NADDR16_HI", /* name */
1323 FALSE, /* partial_inplace */
1324 0, /* src_mask */
1325 0xffff, /* dst_mask */
1326 FALSE), /* pcrel_offset */
1327
1328 /* The high order 16 bits of the result of the addend minus the address,
1329 plus 1 if the contents of the low 16 bits, treated as a signed number,
1330 is negative. */
1331 HOWTO (R_PPC_EMB_NADDR16_HA, /* type */
1332 16, /* rightshift */
1333 1, /* size (0 = byte, 1 = short, 2 = long) */
1334 16, /* bitsize */
1335 FALSE, /* pc_relative */
1336 0, /* bitpos */
1337 complain_overflow_dont, /* complain_on_overflow */
3ce51288 1338 ppc_elf_unhandled_reloc, /* special_function */
25dbc73a
AM
1339 "R_PPC_EMB_NADDR16_HA", /* name */
1340 FALSE, /* partial_inplace */
1341 0, /* src_mask */
1342 0xffff, /* dst_mask */
1343 FALSE), /* pcrel_offset */
1344
1345 /* 16 bit value resulting from allocating a 4 byte word to hold an
1346 address in the .sdata section, and returning the offset from
1347 _SDA_BASE_ for that relocation. */
1348 HOWTO (R_PPC_EMB_SDAI16, /* type */
1349 0, /* rightshift */
1350 1, /* size (0 = byte, 1 = short, 2 = long) */
1351 16, /* bitsize */
1352 FALSE, /* pc_relative */
1353 0, /* bitpos */
bd6c6e2b 1354 complain_overflow_signed, /* complain_on_overflow */
3ce51288 1355 ppc_elf_unhandled_reloc, /* special_function */
25dbc73a
AM
1356 "R_PPC_EMB_SDAI16", /* name */
1357 FALSE, /* partial_inplace */
1358 0, /* src_mask */
1359 0xffff, /* dst_mask */
1360 FALSE), /* pcrel_offset */
1361
1362 /* 16 bit value resulting from allocating a 4 byte word to hold an
1363 address in the .sdata2 section, and returning the offset from
1364 _SDA2_BASE_ for that relocation. */
1365 HOWTO (R_PPC_EMB_SDA2I16, /* type */
1366 0, /* rightshift */
1367 1, /* size (0 = byte, 1 = short, 2 = long) */
1368 16, /* bitsize */
1369 FALSE, /* pc_relative */
1370 0, /* bitpos */
bd6c6e2b 1371 complain_overflow_signed, /* complain_on_overflow */
3ce51288 1372 ppc_elf_unhandled_reloc, /* special_function */
25dbc73a
AM
1373 "R_PPC_EMB_SDA2I16", /* name */
1374 FALSE, /* partial_inplace */
1375 0, /* src_mask */
1376 0xffff, /* dst_mask */
1377 FALSE), /* pcrel_offset */
1378
1379 /* A sign-extended 16 bit value relative to _SDA2_BASE_, for use with
1380 small data items. */
1381 HOWTO (R_PPC_EMB_SDA2REL, /* type */
1382 0, /* rightshift */
1383 1, /* size (0 = byte, 1 = short, 2 = long) */
1384 16, /* bitsize */
1385 FALSE, /* pc_relative */
1386 0, /* bitpos */
1387 complain_overflow_signed, /* complain_on_overflow */
3ce51288 1388 ppc_elf_unhandled_reloc, /* special_function */
25dbc73a
AM
1389 "R_PPC_EMB_SDA2REL", /* name */
1390 FALSE, /* partial_inplace */
1391 0, /* src_mask */
1392 0xffff, /* dst_mask */
1393 FALSE), /* pcrel_offset */
1394
1395 /* Relocate against either _SDA_BASE_ or _SDA2_BASE_, filling in the 16 bit
1396 signed offset from the appropriate base, and filling in the register
1397 field with the appropriate register (0, 2, or 13). */
1398 HOWTO (R_PPC_EMB_SDA21, /* type */
1399 0, /* rightshift */
1400 2, /* size (0 = byte, 1 = short, 2 = long) */
1401 16, /* bitsize */
1402 FALSE, /* pc_relative */
1403 0, /* bitpos */
1404 complain_overflow_signed, /* complain_on_overflow */
3ce51288 1405 ppc_elf_unhandled_reloc, /* special_function */
25dbc73a
AM
1406 "R_PPC_EMB_SDA21", /* name */
1407 FALSE, /* partial_inplace */
1408 0, /* src_mask */
1409 0xffff, /* dst_mask */
1410 FALSE), /* pcrel_offset */
1411
1412 /* Relocation not handled: R_PPC_EMB_MRKREF */
1413 /* Relocation not handled: R_PPC_EMB_RELSEC16 */
1414 /* Relocation not handled: R_PPC_EMB_RELST_LO */
1415 /* Relocation not handled: R_PPC_EMB_RELST_HI */
1416 /* Relocation not handled: R_PPC_EMB_RELST_HA */
1417 /* Relocation not handled: R_PPC_EMB_BIT_FLD */
1418
1419 /* PC relative relocation against either _SDA_BASE_ or _SDA2_BASE_, filling
1420 in the 16 bit signed offset from the appropriate base, and filling in the
1421 register field with the appropriate register (0, 2, or 13). */
1422 HOWTO (R_PPC_EMB_RELSDA, /* type */
1423 0, /* rightshift */
1424 1, /* size (0 = byte, 1 = short, 2 = long) */
1425 16, /* bitsize */
ddfd6795 1426 FALSE, /* pc_relative */
25dbc73a
AM
1427 0, /* bitpos */
1428 complain_overflow_signed, /* complain_on_overflow */
3ce51288 1429 ppc_elf_unhandled_reloc, /* special_function */
25dbc73a
AM
1430 "R_PPC_EMB_RELSDA", /* name */
1431 FALSE, /* partial_inplace */
1432 0, /* src_mask */
1433 0xffff, /* dst_mask */
1434 FALSE), /* pcrel_offset */
1435
b9c361e0
JL
1436 /* A relative 8 bit branch. */
1437 HOWTO (R_PPC_VLE_REL8, /* type */
1438 1, /* rightshift */
1439 1, /* size (0 = byte, 1 = short, 2 = long) */
1440 8, /* bitsize */
1441 TRUE, /* pc_relative */
1442 0, /* bitpos */
1443 complain_overflow_signed, /* complain_on_overflow */
1444 bfd_elf_generic_reloc, /* special_function */
1445 "R_PPC_VLE_REL8", /* name */
1446 FALSE, /* partial_inplace */
1447 0, /* src_mask */
1448 0xff, /* dst_mask */
1449 TRUE), /* pcrel_offset */
68ffbac6 1450
b9c361e0
JL
1451 /* A relative 15 bit branch. */
1452 HOWTO (R_PPC_VLE_REL15, /* type */
1453 1, /* rightshift */
1454 2, /* size (0 = byte, 1 = short, 2 = long) */
1455 15, /* bitsize */
1456 TRUE, /* pc_relative */
1457 1, /* bitpos */
1458 complain_overflow_signed, /* complain_on_overflow */
1459 bfd_elf_generic_reloc, /* special_function */
1460 "R_PPC_VLE_REL15", /* name */
1461 FALSE, /* partial_inplace */
1462 0, /* src_mask */
dfdaec14 1463 0xfffe, /* dst_mask */
b9c361e0
JL
1464 TRUE), /* pcrel_offset */
1465
68ffbac6 1466 /* A relative 24 bit branch. */
b9c361e0
JL
1467 HOWTO (R_PPC_VLE_REL24, /* type */
1468 1, /* rightshift */
1469 2, /* size (0 = byte, 1 = short, 2 = long) */
1470 24, /* bitsize */
1471 TRUE, /* pc_relative */
1472 1, /* bitpos */
1473 complain_overflow_signed, /* complain_on_overflow */
1474 bfd_elf_generic_reloc, /* special_function */
1475 "R_PPC_VLE_REL24", /* name */
1476 FALSE, /* partial_inplace */
1477 0, /* src_mask */
1478 0x1fffffe, /* dst_mask */
1479 TRUE), /* pcrel_offset */
1480
1481 /* The 16 LSBS in split16a format. */
1482 HOWTO (R_PPC_VLE_LO16A, /* type */
1483 0, /* rightshift */
1484 2, /* size (0 = byte, 1 = short, 2 = long) */
86c95733 1485 16, /* bitsize */
bdaacd3a 1486 FALSE, /* pc_relative */
b9c361e0 1487 0, /* bitpos */
86c95733 1488 complain_overflow_dont, /* complain_on_overflow */
3ce51288 1489 ppc_elf_unhandled_reloc, /* special_function */
b9c361e0
JL
1490 "R_PPC_VLE_LO16A", /* name */
1491 FALSE, /* partial_inplace */
1492 0, /* src_mask */
08dc996f 1493 0x1f07ff, /* dst_mask */
b9c361e0
JL
1494 FALSE), /* pcrel_offset */
1495
1496 /* The 16 LSBS in split16d format. */
1497 HOWTO (R_PPC_VLE_LO16D, /* type */
1498 0, /* rightshift */
1499 2, /* size (0 = byte, 1 = short, 2 = long) */
86c95733 1500 16, /* bitsize */
b9c361e0
JL
1501 FALSE, /* pc_relative */
1502 0, /* bitpos */
86c95733 1503 complain_overflow_dont, /* complain_on_overflow */
3ce51288
AM
1504 ppc_elf_unhandled_reloc, /* special_function */
1505 "R_PPC_VLE_LO16D", /* name */
b9c361e0
JL
1506 FALSE, /* partial_inplace */
1507 0, /* src_mask */
5499c7c7 1508 0x3e007ff, /* dst_mask */
b9c361e0
JL
1509 FALSE), /* pcrel_offset */
1510
1511 /* Bits 16-31 split16a format. */
1512 HOWTO (R_PPC_VLE_HI16A, /* type */
86c95733 1513 16, /* rightshift */
b9c361e0 1514 2, /* size (0 = byte, 1 = short, 2 = long) */
86c95733 1515 16, /* bitsize */
b9c361e0
JL
1516 FALSE, /* pc_relative */
1517 0, /* bitpos */
86c95733 1518 complain_overflow_dont, /* complain_on_overflow */
3ce51288
AM
1519 ppc_elf_unhandled_reloc, /* special_function */
1520 "R_PPC_VLE_HI16A", /* name */
b9c361e0
JL
1521 FALSE, /* partial_inplace */
1522 0, /* src_mask */
08dc996f 1523 0x1f07ff, /* dst_mask */
b9c361e0
JL
1524 FALSE), /* pcrel_offset */
1525
1526 /* Bits 16-31 split16d format. */
1527 HOWTO (R_PPC_VLE_HI16D, /* type */
86c95733 1528 16, /* rightshift */
b9c361e0 1529 2, /* size (0 = byte, 1 = short, 2 = long) */
86c95733 1530 16, /* bitsize */
b9c361e0
JL
1531 FALSE, /* pc_relative */
1532 0, /* bitpos */
86c95733 1533 complain_overflow_dont, /* complain_on_overflow */
3ce51288
AM
1534 ppc_elf_unhandled_reloc, /* special_function */
1535 "R_PPC_VLE_HI16D", /* name */
b9c361e0
JL
1536 FALSE, /* partial_inplace */
1537 0, /* src_mask */
5499c7c7 1538 0x3e007ff, /* dst_mask */
b9c361e0
JL
1539 FALSE), /* pcrel_offset */
1540
1541 /* Bits 16-31 (High Adjusted) in split16a format. */
1542 HOWTO (R_PPC_VLE_HA16A, /* type */
86c95733 1543 16, /* rightshift */
b9c361e0 1544 2, /* size (0 = byte, 1 = short, 2 = long) */
86c95733 1545 16, /* bitsize */
b9c361e0
JL
1546 FALSE, /* pc_relative */
1547 0, /* bitpos */
86c95733 1548 complain_overflow_dont, /* complain_on_overflow */
3ce51288
AM
1549 ppc_elf_unhandled_reloc, /* special_function */
1550 "R_PPC_VLE_HA16A", /* name */
b9c361e0
JL
1551 FALSE, /* partial_inplace */
1552 0, /* src_mask */
08dc996f 1553 0x1f07ff, /* dst_mask */
b9c361e0
JL
1554 FALSE), /* pcrel_offset */
1555
1556 /* Bits 16-31 (High Adjusted) in split16d format. */
1557 HOWTO (R_PPC_VLE_HA16D, /* type */
86c95733 1558 16, /* rightshift */
b9c361e0 1559 2, /* size (0 = byte, 1 = short, 2 = long) */
86c95733 1560 16, /* bitsize */
b9c361e0
JL
1561 FALSE, /* pc_relative */
1562 0, /* bitpos */
86c95733 1563 complain_overflow_dont, /* complain_on_overflow */
3ce51288
AM
1564 ppc_elf_unhandled_reloc, /* special_function */
1565 "R_PPC_VLE_HA16D", /* name */
b9c361e0
JL
1566 FALSE, /* partial_inplace */
1567 0, /* src_mask */
5499c7c7 1568 0x3e007ff, /* dst_mask */
b9c361e0
JL
1569 FALSE), /* pcrel_offset */
1570
86c95733
AM
1571 /* This reloc is like R_PPC_EMB_SDA21 but only applies to e_add16i
1572 instructions. If the register base is 0 then the linker changes
1573 the e_add16i to an e_li instruction. */
1574 HOWTO (R_PPC_VLE_SDA21, /* type */
b9c361e0
JL
1575 0, /* rightshift */
1576 2, /* size (0 = byte, 1 = short, 2 = long) */
86c95733 1577 16, /* bitsize */
b9c361e0
JL
1578 FALSE, /* pc_relative */
1579 0, /* bitpos */
86c95733 1580 complain_overflow_signed, /* complain_on_overflow */
3ce51288
AM
1581 ppc_elf_unhandled_reloc, /* special_function */
1582 "R_PPC_VLE_SDA21", /* name */
b9c361e0
JL
1583 FALSE, /* partial_inplace */
1584 0, /* src_mask */
1585 0xffff, /* dst_mask */
1586 FALSE), /* pcrel_offset */
1587
86c95733 1588 /* Like R_PPC_VLE_SDA21 but ignore overflow. */
b9c361e0
JL
1589 HOWTO (R_PPC_VLE_SDA21_LO, /* type */
1590 0, /* rightshift */
1591 2, /* size (0 = byte, 1 = short, 2 = long) */
86c95733 1592 16, /* bitsize */
b9c361e0
JL
1593 FALSE, /* pc_relative */
1594 0, /* bitpos */
86c95733 1595 complain_overflow_dont, /* complain_on_overflow */
3ce51288 1596 ppc_elf_unhandled_reloc, /* special_function */
b9c361e0
JL
1597 "R_PPC_VLE_SDA21_LO", /* name */
1598 FALSE, /* partial_inplace */
1599 0, /* src_mask */
86c95733 1600 0xffff, /* dst_mask */
b9c361e0
JL
1601 FALSE), /* pcrel_offset */
1602
1603 /* The 16 LSBS relative to _SDA_BASE_ in split16a format. */
1604 HOWTO (R_PPC_VLE_SDAREL_LO16A,/* type */
1605 0, /* rightshift */
1606 2, /* size (0 = byte, 1 = short, 2 = long) */
86c95733 1607 16, /* bitsize */
b9c361e0
JL
1608 FALSE, /* pc_relative */
1609 0, /* bitpos */
3ce51288
AM
1610 complain_overflow_dont, /* complain_on_overflow */
1611 ppc_elf_unhandled_reloc, /* special_function */
1612 "R_PPC_VLE_SDAREL_LO16A", /* name */
b9c361e0
JL
1613 FALSE, /* partial_inplace */
1614 0, /* src_mask */
08dc996f 1615 0x1f07ff, /* dst_mask */
b9c361e0
JL
1616 FALSE), /* pcrel_offset */
1617
1618 /* The 16 LSBS relative to _SDA_BASE_ in split16d format. */
b9c361e0
JL
1619 HOWTO (R_PPC_VLE_SDAREL_LO16D, /* type */
1620 0, /* rightshift */
1621 2, /* size (0 = byte, 1 = short, 2 = long) */
86c95733 1622 16, /* bitsize */
b9c361e0
JL
1623 FALSE, /* pc_relative */
1624 0, /* bitpos */
3ce51288
AM
1625 complain_overflow_dont, /* complain_on_overflow */
1626 ppc_elf_unhandled_reloc, /* special_function */
1627 "R_PPC_VLE_SDAREL_LO16D", /* name */
b9c361e0
JL
1628 FALSE, /* partial_inplace */
1629 0, /* src_mask */
5499c7c7 1630 0x3e007ff, /* dst_mask */
b9c361e0
JL
1631 FALSE), /* pcrel_offset */
1632
1633 /* Bits 16-31 relative to _SDA_BASE_ in split16a format. */
3ce51288 1634 HOWTO (R_PPC_VLE_SDAREL_HI16A, /* type */
86c95733 1635 16, /* rightshift */
b9c361e0 1636 2, /* size (0 = byte, 1 = short, 2 = long) */
86c95733 1637 16, /* bitsize */
b9c361e0
JL
1638 FALSE, /* pc_relative */
1639 0, /* bitpos */
3ce51288
AM
1640 complain_overflow_dont, /* complain_on_overflow */
1641 ppc_elf_unhandled_reloc, /* special_function */
1642 "R_PPC_VLE_SDAREL_HI16A", /* name */
b9c361e0
JL
1643 FALSE, /* partial_inplace */
1644 0, /* src_mask */
08dc996f 1645 0x1f07ff, /* dst_mask */
b9c361e0
JL
1646 FALSE), /* pcrel_offset */
1647
1648 /* Bits 16-31 relative to _SDA_BASE_ in split16d format. */
3ce51288 1649 HOWTO (R_PPC_VLE_SDAREL_HI16D, /* type */
86c95733 1650 16, /* rightshift */
b9c361e0 1651 2, /* size (0 = byte, 1 = short, 2 = long) */
86c95733 1652 16, /* bitsize */
b9c361e0
JL
1653 FALSE, /* pc_relative */
1654 0, /* bitpos */
3ce51288
AM
1655 complain_overflow_dont, /* complain_on_overflow */
1656 ppc_elf_unhandled_reloc, /* special_function */
1657 "R_PPC_VLE_SDAREL_HI16D", /* name */
b9c361e0
JL
1658 FALSE, /* partial_inplace */
1659 0, /* src_mask */
5499c7c7 1660 0x3e007ff, /* dst_mask */
b9c361e0
JL
1661 FALSE), /* pcrel_offset */
1662
1663 /* Bits 16-31 (HA) relative to _SDA_BASE split16a format. */
3ce51288 1664 HOWTO (R_PPC_VLE_SDAREL_HA16A, /* type */
86c95733 1665 16, /* rightshift */
b9c361e0 1666 2, /* size (0 = byte, 1 = short, 2 = long) */
86c95733 1667 16, /* bitsize */
b9c361e0
JL
1668 FALSE, /* pc_relative */
1669 0, /* bitpos */
3ce51288
AM
1670 complain_overflow_dont, /* complain_on_overflow */
1671 ppc_elf_unhandled_reloc, /* special_function */
1672 "R_PPC_VLE_SDAREL_HA16A", /* name */
b9c361e0
JL
1673 FALSE, /* partial_inplace */
1674 0, /* src_mask */
08dc996f 1675 0x1f07ff, /* dst_mask */
b9c361e0
JL
1676 FALSE), /* pcrel_offset */
1677
1678 /* Bits 16-31 (HA) relative to _SDA_BASE split16d format. */
3ce51288 1679 HOWTO (R_PPC_VLE_SDAREL_HA16D, /* type */
86c95733 1680 16, /* rightshift */
b9c361e0 1681 2, /* size (0 = byte, 1 = short, 2 = long) */
86c95733 1682 16, /* bitsize */
b9c361e0
JL
1683 FALSE, /* pc_relative */
1684 0, /* bitpos */
3ce51288
AM
1685 complain_overflow_dont, /* complain_on_overflow */
1686 ppc_elf_unhandled_reloc, /* special_function */
1687 "R_PPC_VLE_SDAREL_HA16D", /* name */
b9c361e0
JL
1688 FALSE, /* partial_inplace */
1689 0, /* src_mask */
5499c7c7 1690 0x3e007ff, /* dst_mask */
b9c361e0
JL
1691 FALSE), /* pcrel_offset */
1692
83eef883
AFB
1693 /* e_li split20 format. */
1694 HOWTO (R_PPC_VLE_ADDR20, /* type */
1695 16, /* rightshift */
1696 2, /* size (0 = byte, 1 = short, 2 = long) */
1697 20, /* bitsize */
1698 FALSE, /* pc_relative */
1699 0, /* bitpos */
1700 complain_overflow_dont, /* complain_on_overflow */
1701 bfd_elf_generic_reloc, /* special_function */
1702 "R_PPC_VLE_ADDR20", /* name */
1703 FALSE, /* partial_inplace */
1704 0, /* src_mask */
1705 0x1f07ff, /* dst_mask */
1706 FALSE), /* pcrel_offset */
1707
e054468f
AM
1708 HOWTO (R_PPC_IRELATIVE, /* type */
1709 0, /* rightshift */
1710 2, /* size (0 = byte, 1 = short, 2 = long) */
1711 32, /* bitsize */
1712 FALSE, /* pc_relative */
1713 0, /* bitpos */
86c95733 1714 complain_overflow_dont, /* complain_on_overflow */
3ce51288 1715 ppc_elf_unhandled_reloc, /* special_function */
e054468f
AM
1716 "R_PPC_IRELATIVE", /* name */
1717 FALSE, /* partial_inplace */
1718 0, /* src_mask */
1719 0xffffffff, /* dst_mask */
1720 FALSE), /* pcrel_offset */
1721
d7128ce4
AM
1722 /* A 16 bit relative relocation. */
1723 HOWTO (R_PPC_REL16, /* type */
1724 0, /* rightshift */
1725 1, /* size (0 = byte, 1 = short, 2 = long) */
1726 16, /* bitsize */
1727 TRUE, /* pc_relative */
1728 0, /* bitpos */
86c95733 1729 complain_overflow_signed, /* complain_on_overflow */
d7128ce4
AM
1730 bfd_elf_generic_reloc, /* special_function */
1731 "R_PPC_REL16", /* name */
1732 FALSE, /* partial_inplace */
1733 0, /* src_mask */
1734 0xffff, /* dst_mask */
1735 TRUE), /* pcrel_offset */
1736
1737 /* A 16 bit relative relocation without overflow. */
1738 HOWTO (R_PPC_REL16_LO, /* type */
1739 0, /* rightshift */
1740 1, /* size (0 = byte, 1 = short, 2 = long) */
1741 16, /* bitsize */
1742 TRUE, /* pc_relative */
1743 0, /* bitpos */
1744 complain_overflow_dont,/* complain_on_overflow */
1745 bfd_elf_generic_reloc, /* special_function */
1746 "R_PPC_REL16_LO", /* name */
1747 FALSE, /* partial_inplace */
1748 0, /* src_mask */
1749 0xffff, /* dst_mask */
1750 TRUE), /* pcrel_offset */
1751
1752 /* The high order 16 bits of a relative address. */
1753 HOWTO (R_PPC_REL16_HI, /* type */
1754 16, /* rightshift */
1755 1, /* size (0 = byte, 1 = short, 2 = long) */
1756 16, /* bitsize */
1757 TRUE, /* pc_relative */
1758 0, /* bitpos */
1759 complain_overflow_dont, /* complain_on_overflow */
1760 bfd_elf_generic_reloc, /* special_function */
1761 "R_PPC_REL16_HI", /* name */
1762 FALSE, /* partial_inplace */
1763 0, /* src_mask */
1764 0xffff, /* dst_mask */
1765 TRUE), /* pcrel_offset */
1766
1767 /* The high order 16 bits of a relative address, plus 1 if the contents of
1768 the low 16 bits, treated as a signed number, is negative. */
1769 HOWTO (R_PPC_REL16_HA, /* type */
1770 16, /* rightshift */
1771 1, /* size (0 = byte, 1 = short, 2 = long) */
1772 16, /* bitsize */
1773 TRUE, /* pc_relative */
1774 0, /* bitpos */
1775 complain_overflow_dont, /* complain_on_overflow */
1776 ppc_elf_addr16_ha_reloc, /* special_function */
1777 "R_PPC_REL16_HA", /* name */
1778 FALSE, /* partial_inplace */
1779 0, /* src_mask */
1780 0xffff, /* dst_mask */
1781 TRUE), /* pcrel_offset */
1782
a680de9a
PB
1783 /* Like R_PPC_REL16_HA but for split field in addpcis. */
1784 HOWTO (R_PPC_REL16DX_HA, /* type */
1785 16, /* rightshift */
1786 2, /* size (0 = byte, 1 = short, 2 = long) */
1787 16, /* bitsize */
1788 TRUE, /* pc_relative */
1789 0, /* bitpos */
1790 complain_overflow_signed, /* complain_on_overflow */
1791 ppc_elf_addr16_ha_reloc, /* special_function */
1792 "R_PPC_REL16DX_HA", /* name */
1793 FALSE, /* partial_inplace */
1794 0, /* src_mask */
1795 0x1fffc1, /* dst_mask */
1796 TRUE), /* pcrel_offset */
1797
7ba71655
AM
1798 /* A split-field reloc for addpcis, non-relative (gas internal use only). */
1799 HOWTO (R_PPC_16DX_HA, /* type */
1800 16, /* rightshift */
1801 2, /* size (0 = byte, 1 = short, 2 = long) */
1802 16, /* bitsize */
1803 FALSE, /* pc_relative */
1804 0, /* bitpos */
1805 complain_overflow_signed, /* complain_on_overflow */
1806 ppc_elf_addr16_ha_reloc, /* special_function */
1807 "R_PPC_16DX_HA", /* name */
1808 FALSE, /* partial_inplace */
1809 0, /* src_mask */
1810 0x1fffc1, /* dst_mask */
1811 FALSE), /* pcrel_offset */
1812
25dbc73a
AM
1813 /* GNU extension to record C++ vtable hierarchy. */
1814 HOWTO (R_PPC_GNU_VTINHERIT, /* type */
1815 0, /* rightshift */
1816 0, /* size (0 = byte, 1 = short, 2 = long) */
1817 0, /* bitsize */
1818 FALSE, /* pc_relative */
1819 0, /* bitpos */
1820 complain_overflow_dont, /* complain_on_overflow */
1821 NULL, /* special_function */
1822 "R_PPC_GNU_VTINHERIT", /* name */
1823 FALSE, /* partial_inplace */
1824 0, /* src_mask */
1825 0, /* dst_mask */
1826 FALSE), /* pcrel_offset */
1827
1828 /* GNU extension to record C++ vtable member usage. */
1829 HOWTO (R_PPC_GNU_VTENTRY, /* type */
1830 0, /* rightshift */
1831 0, /* size (0 = byte, 1 = short, 2 = long) */
1832 0, /* bitsize */
1833 FALSE, /* pc_relative */
1834 0, /* bitpos */
1835 complain_overflow_dont, /* complain_on_overflow */
1836 NULL, /* special_function */
1837 "R_PPC_GNU_VTENTRY", /* name */
7619e7c7
AM
1838 FALSE, /* partial_inplace */
1839 0, /* src_mask */
25dbc73a 1840 0, /* dst_mask */
7619e7c7
AM
1841 FALSE), /* pcrel_offset */
1842
25dbc73a
AM
1843 /* Phony reloc to handle AIX style TOC entries. */
1844 HOWTO (R_PPC_TOC16, /* type */
7619e7c7
AM
1845 0, /* rightshift */
1846 1, /* size (0 = byte, 1 = short, 2 = long) */
1847 16, /* bitsize */
1848 FALSE, /* pc_relative */
1849 0, /* bitpos */
25dbc73a 1850 complain_overflow_signed, /* complain_on_overflow */
3ce51288 1851 ppc_elf_unhandled_reloc, /* special_function */
25dbc73a 1852 "R_PPC_TOC16", /* name */
7619e7c7
AM
1853 FALSE, /* partial_inplace */
1854 0, /* src_mask */
1855 0xffff, /* dst_mask */
1856 FALSE), /* pcrel_offset */
25dbc73a
AM
1857};
1858\f
1859/* Initialize the ppc_elf_howto_table, so that linear accesses can be done. */
1860
1861static void
1862ppc_elf_howto_init (void)
1863{
1864 unsigned int i, type;
1865
1866 for (i = 0;
1867 i < sizeof (ppc_elf_howto_raw) / sizeof (ppc_elf_howto_raw[0]);
1868 i++)
1869 {
1870 type = ppc_elf_howto_raw[i].type;
1871 if (type >= (sizeof (ppc_elf_howto_table)
1872 / sizeof (ppc_elf_howto_table[0])))
1873 abort ();
1874 ppc_elf_howto_table[type] = &ppc_elf_howto_raw[i];
1875 }
1876}
1877
1878static reloc_howto_type *
1879ppc_elf_reloc_type_lookup (bfd *abfd ATTRIBUTE_UNUSED,
1880 bfd_reloc_code_real_type code)
1881{
1882 enum elf_ppc_reloc_type r;
1883
1884 /* Initialize howto table if not already done. */
1885 if (!ppc_elf_howto_table[R_PPC_ADDR32])
1886 ppc_elf_howto_init ();
1887
1888 switch (code)
1889 {
1890 default:
1891 return NULL;
1892
1893 case BFD_RELOC_NONE: r = R_PPC_NONE; break;
1894 case BFD_RELOC_32: r = R_PPC_ADDR32; break;
1895 case BFD_RELOC_PPC_BA26: r = R_PPC_ADDR24; break;
1fe532cf 1896 case BFD_RELOC_PPC64_ADDR16_DS:
25dbc73a 1897 case BFD_RELOC_16: r = R_PPC_ADDR16; break;
1fe532cf 1898 case BFD_RELOC_PPC64_ADDR16_LO_DS:
25dbc73a
AM
1899 case BFD_RELOC_LO16: r = R_PPC_ADDR16_LO; break;
1900 case BFD_RELOC_HI16: r = R_PPC_ADDR16_HI; break;
1901 case BFD_RELOC_HI16_S: r = R_PPC_ADDR16_HA; break;
1902 case BFD_RELOC_PPC_BA16: r = R_PPC_ADDR14; break;
1903 case BFD_RELOC_PPC_BA16_BRTAKEN: r = R_PPC_ADDR14_BRTAKEN; break;
1904 case BFD_RELOC_PPC_BA16_BRNTAKEN: r = R_PPC_ADDR14_BRNTAKEN; break;
1905 case BFD_RELOC_PPC_B26: r = R_PPC_REL24; break;
1906 case BFD_RELOC_PPC_B16: r = R_PPC_REL14; break;
1907 case BFD_RELOC_PPC_B16_BRTAKEN: r = R_PPC_REL14_BRTAKEN; break;
1908 case BFD_RELOC_PPC_B16_BRNTAKEN: r = R_PPC_REL14_BRNTAKEN; break;
1fe532cf 1909 case BFD_RELOC_PPC64_GOT16_DS:
25dbc73a 1910 case BFD_RELOC_16_GOTOFF: r = R_PPC_GOT16; break;
1fe532cf 1911 case BFD_RELOC_PPC64_GOT16_LO_DS:
25dbc73a
AM
1912 case BFD_RELOC_LO16_GOTOFF: r = R_PPC_GOT16_LO; break;
1913 case BFD_RELOC_HI16_GOTOFF: r = R_PPC_GOT16_HI; break;
1914 case BFD_RELOC_HI16_S_GOTOFF: r = R_PPC_GOT16_HA; break;
1915 case BFD_RELOC_24_PLT_PCREL: r = R_PPC_PLTREL24; break;
1916 case BFD_RELOC_PPC_COPY: r = R_PPC_COPY; break;
1917 case BFD_RELOC_PPC_GLOB_DAT: r = R_PPC_GLOB_DAT; break;
1918 case BFD_RELOC_PPC_LOCAL24PC: r = R_PPC_LOCAL24PC; break;
1919 case BFD_RELOC_32_PCREL: r = R_PPC_REL32; break;
1920 case BFD_RELOC_32_PLTOFF: r = R_PPC_PLT32; break;
1921 case BFD_RELOC_32_PLT_PCREL: r = R_PPC_PLTREL32; break;
1fe532cf 1922 case BFD_RELOC_PPC64_PLT16_LO_DS:
25dbc73a
AM
1923 case BFD_RELOC_LO16_PLTOFF: r = R_PPC_PLT16_LO; break;
1924 case BFD_RELOC_HI16_PLTOFF: r = R_PPC_PLT16_HI; break;
1925 case BFD_RELOC_HI16_S_PLTOFF: r = R_PPC_PLT16_HA; break;
1926 case BFD_RELOC_GPREL16: r = R_PPC_SDAREL16; break;
1fe532cf 1927 case BFD_RELOC_PPC64_SECTOFF_DS:
25dbc73a 1928 case BFD_RELOC_16_BASEREL: r = R_PPC_SECTOFF; break;
1fe532cf 1929 case BFD_RELOC_PPC64_SECTOFF_LO_DS:
25dbc73a
AM
1930 case BFD_RELOC_LO16_BASEREL: r = R_PPC_SECTOFF_LO; break;
1931 case BFD_RELOC_HI16_BASEREL: r = R_PPC_SECTOFF_HI; break;
1932 case BFD_RELOC_HI16_S_BASEREL: r = R_PPC_SECTOFF_HA; break;
1933 case BFD_RELOC_CTOR: r = R_PPC_ADDR32; break;
1fe532cf 1934 case BFD_RELOC_PPC64_TOC16_DS:
25dbc73a
AM
1935 case BFD_RELOC_PPC_TOC16: r = R_PPC_TOC16; break;
1936 case BFD_RELOC_PPC_TLS: r = R_PPC_TLS; break;
727fc41e
AM
1937 case BFD_RELOC_PPC_TLSGD: r = R_PPC_TLSGD; break;
1938 case BFD_RELOC_PPC_TLSLD: r = R_PPC_TLSLD; break;
25dbc73a 1939 case BFD_RELOC_PPC_DTPMOD: r = R_PPC_DTPMOD32; break;
1fe532cf 1940 case BFD_RELOC_PPC64_TPREL16_DS:
25dbc73a 1941 case BFD_RELOC_PPC_TPREL16: r = R_PPC_TPREL16; break;
1fe532cf 1942 case BFD_RELOC_PPC64_TPREL16_LO_DS:
25dbc73a
AM
1943 case BFD_RELOC_PPC_TPREL16_LO: r = R_PPC_TPREL16_LO; break;
1944 case BFD_RELOC_PPC_TPREL16_HI: r = R_PPC_TPREL16_HI; break;
1945 case BFD_RELOC_PPC_TPREL16_HA: r = R_PPC_TPREL16_HA; break;
1946 case BFD_RELOC_PPC_TPREL: r = R_PPC_TPREL32; break;
1fe532cf 1947 case BFD_RELOC_PPC64_DTPREL16_DS:
25dbc73a 1948 case BFD_RELOC_PPC_DTPREL16: r = R_PPC_DTPREL16; break;
1fe532cf 1949 case BFD_RELOC_PPC64_DTPREL16_LO_DS:
25dbc73a
AM
1950 case BFD_RELOC_PPC_DTPREL16_LO: r = R_PPC_DTPREL16_LO; break;
1951 case BFD_RELOC_PPC_DTPREL16_HI: r = R_PPC_DTPREL16_HI; break;
1952 case BFD_RELOC_PPC_DTPREL16_HA: r = R_PPC_DTPREL16_HA; break;
1953 case BFD_RELOC_PPC_DTPREL: r = R_PPC_DTPREL32; break;
1954 case BFD_RELOC_PPC_GOT_TLSGD16: r = R_PPC_GOT_TLSGD16; break;
1955 case BFD_RELOC_PPC_GOT_TLSGD16_LO: r = R_PPC_GOT_TLSGD16_LO; break;
1956 case BFD_RELOC_PPC_GOT_TLSGD16_HI: r = R_PPC_GOT_TLSGD16_HI; break;
1957 case BFD_RELOC_PPC_GOT_TLSGD16_HA: r = R_PPC_GOT_TLSGD16_HA; break;
1958 case BFD_RELOC_PPC_GOT_TLSLD16: r = R_PPC_GOT_TLSLD16; break;
1959 case BFD_RELOC_PPC_GOT_TLSLD16_LO: r = R_PPC_GOT_TLSLD16_LO; break;
1960 case BFD_RELOC_PPC_GOT_TLSLD16_HI: r = R_PPC_GOT_TLSLD16_HI; break;
1961 case BFD_RELOC_PPC_GOT_TLSLD16_HA: r = R_PPC_GOT_TLSLD16_HA; break;
1962 case BFD_RELOC_PPC_GOT_TPREL16: r = R_PPC_GOT_TPREL16; break;
1963 case BFD_RELOC_PPC_GOT_TPREL16_LO: r = R_PPC_GOT_TPREL16_LO; break;
1964 case BFD_RELOC_PPC_GOT_TPREL16_HI: r = R_PPC_GOT_TPREL16_HI; break;
1965 case BFD_RELOC_PPC_GOT_TPREL16_HA: r = R_PPC_GOT_TPREL16_HA; break;
1966 case BFD_RELOC_PPC_GOT_DTPREL16: r = R_PPC_GOT_DTPREL16; break;
1967 case BFD_RELOC_PPC_GOT_DTPREL16_LO: r = R_PPC_GOT_DTPREL16_LO; break;
1968 case BFD_RELOC_PPC_GOT_DTPREL16_HI: r = R_PPC_GOT_DTPREL16_HI; break;
1969 case BFD_RELOC_PPC_GOT_DTPREL16_HA: r = R_PPC_GOT_DTPREL16_HA; break;
1970 case BFD_RELOC_PPC_EMB_NADDR32: r = R_PPC_EMB_NADDR32; break;
1971 case BFD_RELOC_PPC_EMB_NADDR16: r = R_PPC_EMB_NADDR16; break;
1972 case BFD_RELOC_PPC_EMB_NADDR16_LO: r = R_PPC_EMB_NADDR16_LO; break;
1973 case BFD_RELOC_PPC_EMB_NADDR16_HI: r = R_PPC_EMB_NADDR16_HI; break;
1974 case BFD_RELOC_PPC_EMB_NADDR16_HA: r = R_PPC_EMB_NADDR16_HA; break;
1975 case BFD_RELOC_PPC_EMB_SDAI16: r = R_PPC_EMB_SDAI16; break;
1976 case BFD_RELOC_PPC_EMB_SDA2I16: r = R_PPC_EMB_SDA2I16; break;
1977 case BFD_RELOC_PPC_EMB_SDA2REL: r = R_PPC_EMB_SDA2REL; break;
1978 case BFD_RELOC_PPC_EMB_SDA21: r = R_PPC_EMB_SDA21; break;
1979 case BFD_RELOC_PPC_EMB_MRKREF: r = R_PPC_EMB_MRKREF; break;
1980 case BFD_RELOC_PPC_EMB_RELSEC16: r = R_PPC_EMB_RELSEC16; break;
1981 case BFD_RELOC_PPC_EMB_RELST_LO: r = R_PPC_EMB_RELST_LO; break;
1982 case BFD_RELOC_PPC_EMB_RELST_HI: r = R_PPC_EMB_RELST_HI; break;
1983 case BFD_RELOC_PPC_EMB_RELST_HA: r = R_PPC_EMB_RELST_HA; break;
1984 case BFD_RELOC_PPC_EMB_BIT_FLD: r = R_PPC_EMB_BIT_FLD; break;
1985 case BFD_RELOC_PPC_EMB_RELSDA: r = R_PPC_EMB_RELSDA; break;
b9c361e0
JL
1986 case BFD_RELOC_PPC_VLE_REL8: r = R_PPC_VLE_REL8; break;
1987 case BFD_RELOC_PPC_VLE_REL15: r = R_PPC_VLE_REL15; break;
1988 case BFD_RELOC_PPC_VLE_REL24: r = R_PPC_VLE_REL24; break;
1989 case BFD_RELOC_PPC_VLE_LO16A: r = R_PPC_VLE_LO16A; break;
1990 case BFD_RELOC_PPC_VLE_LO16D: r = R_PPC_VLE_LO16D; break;
1991 case BFD_RELOC_PPC_VLE_HI16A: r = R_PPC_VLE_HI16A; break;
1992 case BFD_RELOC_PPC_VLE_HI16D: r = R_PPC_VLE_HI16D; break;
1993 case BFD_RELOC_PPC_VLE_HA16A: r = R_PPC_VLE_HA16A; break;
1994 case BFD_RELOC_PPC_VLE_HA16D: r = R_PPC_VLE_HA16D; break;
1995 case BFD_RELOC_PPC_VLE_SDA21: r = R_PPC_VLE_SDA21; break;
1996 case BFD_RELOC_PPC_VLE_SDA21_LO: r = R_PPC_VLE_SDA21_LO; break;
1997 case BFD_RELOC_PPC_VLE_SDAREL_LO16A:
1998 r = R_PPC_VLE_SDAREL_LO16A;
1999 break;
2000 case BFD_RELOC_PPC_VLE_SDAREL_LO16D:
2001 r = R_PPC_VLE_SDAREL_LO16D;
2002 break;
2003 case BFD_RELOC_PPC_VLE_SDAREL_HI16A:
2004 r = R_PPC_VLE_SDAREL_HI16A;
2005 break;
2006 case BFD_RELOC_PPC_VLE_SDAREL_HI16D:
2007 r = R_PPC_VLE_SDAREL_HI16D;
2008 break;
2009 case BFD_RELOC_PPC_VLE_SDAREL_HA16A:
2010 r = R_PPC_VLE_SDAREL_HA16A;
2011 break;
2012 case BFD_RELOC_PPC_VLE_SDAREL_HA16D:
2013 r = R_PPC_VLE_SDAREL_HA16D;
2014 break;
d7128ce4
AM
2015 case BFD_RELOC_16_PCREL: r = R_PPC_REL16; break;
2016 case BFD_RELOC_LO16_PCREL: r = R_PPC_REL16_LO; break;
2017 case BFD_RELOC_HI16_PCREL: r = R_PPC_REL16_HI; break;
2018 case BFD_RELOC_HI16_S_PCREL: r = R_PPC_REL16_HA; break;
7ba71655 2019 case BFD_RELOC_PPC_16DX_HA: r = R_PPC_16DX_HA; break;
a680de9a 2020 case BFD_RELOC_PPC_REL16DX_HA: r = R_PPC_REL16DX_HA; break;
25dbc73a
AM
2021 case BFD_RELOC_VTABLE_INHERIT: r = R_PPC_GNU_VTINHERIT; break;
2022 case BFD_RELOC_VTABLE_ENTRY: r = R_PPC_GNU_VTENTRY; break;
2023 }
2024
2025 return ppc_elf_howto_table[r];
2026};
2027
157090f7
AM
2028static reloc_howto_type *
2029ppc_elf_reloc_name_lookup (bfd *abfd ATTRIBUTE_UNUSED,
2030 const char *r_name)
2031{
2032 unsigned int i;
2033
2034 for (i = 0;
2035 i < sizeof (ppc_elf_howto_raw) / sizeof (ppc_elf_howto_raw[0]);
2036 i++)
2037 if (ppc_elf_howto_raw[i].name != NULL
2038 && strcasecmp (ppc_elf_howto_raw[i].name, r_name) == 0)
2039 return &ppc_elf_howto_raw[i];
2040
2041 return NULL;
2042}
2043
25dbc73a
AM
2044/* Set the howto pointer for a PowerPC ELF reloc. */
2045
f3185997 2046static bfd_boolean
4aef7643 2047ppc_elf_info_to_howto (bfd *abfd,
25dbc73a
AM
2048 arelent *cache_ptr,
2049 Elf_Internal_Rela *dst)
2050{
cd21f5da
NC
2051 unsigned int r_type;
2052
25dbc73a
AM
2053 /* Initialize howto table if not already done. */
2054 if (!ppc_elf_howto_table[R_PPC_ADDR32])
2055 ppc_elf_howto_init ();
2056
cd21f5da
NC
2057 r_type = ELF32_R_TYPE (dst->r_info);
2058 if (r_type >= R_PPC_max)
2059 {
695344c0 2060 /* xgettext:c-format */
0aa13fee 2061 _bfd_error_handler (_("%pB: unsupported relocation type %#x"),
4eca0228 2062 abfd, r_type);
cd21f5da 2063 bfd_set_error (bfd_error_bad_value);
f3185997 2064 return FALSE;
cd21f5da 2065 }
f3185997 2066
cd21f5da 2067 cache_ptr->howto = ppc_elf_howto_table[r_type];
375de94a
AM
2068
2069 /* Just because the above assert didn't trigger doesn't mean that
2070 ELF32_R_TYPE (dst->r_info) is necessarily a valid relocation. */
f3185997 2071 if (cache_ptr->howto == NULL)
375de94a 2072 {
695344c0 2073 /* xgettext:c-format */
0aa13fee 2074 _bfd_error_handler (_("%pB: unsupported relocation type %#x"),
4eca0228 2075 abfd, r_type);
375de94a
AM
2076 bfd_set_error (bfd_error_bad_value);
2077
f3185997 2078 return FALSE;
375de94a 2079 }
f3185997
NC
2080
2081 return TRUE;
25dbc73a
AM
2082}
2083
d7128ce4 2084/* Handle the R_PPC_ADDR16_HA and R_PPC_REL16_HA relocs. */
25dbc73a
AM
2085
2086static bfd_reloc_status_type
4aef7643 2087ppc_elf_addr16_ha_reloc (bfd *abfd,
25dbc73a
AM
2088 arelent *reloc_entry,
2089 asymbol *symbol,
4aef7643 2090 void *data,
25dbc73a
AM
2091 asection *input_section,
2092 bfd *output_bfd,
2093 char **error_message ATTRIBUTE_UNUSED)
2094{
a680de9a
PB
2095 enum elf_ppc_reloc_type r_type;
2096 long insn;
2097 bfd_size_type octets;
2098 bfd_vma value;
25dbc73a
AM
2099
2100 if (output_bfd != NULL)
2101 {
2102 reloc_entry->address += input_section->output_offset;
2103 return bfd_reloc_ok;
2104 }
2105
a680de9a
PB
2106 reloc_entry->addend += 0x8000;
2107 r_type = reloc_entry->howto->type;
2108 if (r_type != R_PPC_REL16DX_HA)
2109 return bfd_reloc_continue;
2110
2111 value = 0;
2112 if (!bfd_is_com_section (symbol->section))
2113 value = symbol->value;
2114 value += (reloc_entry->addend
2115 + symbol->section->output_offset
2116 + symbol->section->output_section->vma);
2117 value -= (reloc_entry->address
2118 + input_section->output_offset
2119 + input_section->output_section->vma);
2120 value >>= 16;
2121
2122 octets = reloc_entry->address * bfd_octets_per_byte (abfd);
2123 insn = bfd_get_32 (abfd, (bfd_byte *) data + octets);
2124 insn &= ~0x1fffc1;
2125 insn |= (value & 0xffc1) | ((value & 0x3e) << 15);
2126 bfd_put_32 (abfd, insn, (bfd_byte *) data + octets);
2127 return bfd_reloc_ok;
25dbc73a
AM
2128}
2129
2130static bfd_reloc_status_type
2131ppc_elf_unhandled_reloc (bfd *abfd,
2132 arelent *reloc_entry,
2133 asymbol *symbol,
2134 void *data,
2135 asection *input_section,
2136 bfd *output_bfd,
2137 char **error_message)
2138{
2139 /* If this is a relocatable link (output_bfd test tells us), just
2140 call the generic function. Any adjustment will be done at final
2141 link time. */
2142 if (output_bfd != NULL)
2143 return bfd_elf_generic_reloc (abfd, reloc_entry, symbol, data,
2144 input_section, output_bfd, error_message);
2145
2146 if (error_message != NULL)
2147 {
2148 static char buf[60];
2149 sprintf (buf, _("generic linker can't handle %s"),
2150 reloc_entry->howto->name);
2151 *error_message = buf;
2152 }
2153 return bfd_reloc_dangerous;
2154}
2155\f
2156/* Sections created by the linker. */
2157
2158typedef struct elf_linker_section
2159{
c9a2f333 2160 /* Pointer to the bfd section. */
25dbc73a 2161 asection *section;
c9a2f333
AM
2162 /* Section name. */
2163 const char *name;
2164 /* Associated bss section name. */
2165 const char *bss_name;
2166 /* Associated symbol name. */
2167 const char *sym_name;
046183de
AM
2168 /* Associated symbol. */
2169 struct elf_link_hash_entry *sym;
25dbc73a
AM
2170} elf_linker_section_t;
2171
2172/* Linked list of allocated pointer entries. This hangs off of the
2173 symbol lists, and provides allows us to return different pointers,
2174 based on different addend's. */
2175
2176typedef struct elf_linker_section_pointers
2177{
2178 /* next allocated pointer for this symbol */
2179 struct elf_linker_section_pointers *next;
2180 /* offset of pointer from beginning of section */
2181 bfd_vma offset;
2182 /* addend used */
2183 bfd_vma addend;
2184 /* which linker section this is */
2185 elf_linker_section_t *lsect;
25dbc73a
AM
2186} elf_linker_section_pointers_t;
2187
2188struct ppc_elf_obj_tdata
2189{
2190 struct elf_obj_tdata elf;
2191
2192 /* A mapping from local symbols to offsets into the various linker
2193 sections added. This is index by the symbol index. */
2194 elf_linker_section_pointers_t **linker_section_pointers;
016687f8
AM
2195
2196 /* Flags used to auto-detect plt type. */
2197 unsigned int makes_plt_call : 1;
2198 unsigned int has_rel16 : 1;
25dbc73a
AM
2199};
2200
2201#define ppc_elf_tdata(bfd) \
2202 ((struct ppc_elf_obj_tdata *) (bfd)->tdata.any)
7619e7c7 2203
25dbc73a
AM
2204#define elf_local_ptr_offsets(bfd) \
2205 (ppc_elf_tdata (bfd)->linker_section_pointers)
7619e7c7 2206
0c8d6e5c
AM
2207#define is_ppc_elf(bfd) \
2208 (bfd_get_flavour (bfd) == bfd_target_elf_flavour \
4dfe6ac6 2209 && elf_object_id (bfd) == PPC32_ELF_DATA)
0c8d6e5c 2210
25dbc73a 2211/* Override the generic function because we store some extras. */
7619e7c7 2212
25dbc73a
AM
2213static bfd_boolean
2214ppc_elf_mkobject (bfd *abfd)
2215{
0ffa91dd 2216 return bfd_elf_allocate_object (abfd, sizeof (struct ppc_elf_obj_tdata),
4dfe6ac6 2217 PPC32_ELF_DATA);
25dbc73a 2218}
7619e7c7 2219
14b57c7c
AM
2220/* When defaulting arch/mach, decode apuinfo to find a better match. */
2221
2222bfd_boolean
2223_bfd_elf_ppc_set_arch (bfd *abfd)
2224{
2225 unsigned long mach = 0;
2226 asection *s;
2227 unsigned char *contents;
2228
2229 if (abfd->arch_info->bits_per_word == 32
2230 && bfd_big_endian (abfd))
2231 {
2232
2233 for (s = abfd->sections; s != NULL; s = s->next)
2234 if ((elf_section_data (s)->this_hdr.sh_flags & SHF_PPC_VLE) != 0)
2235 break;
2236 if (s != NULL)
2237 mach = bfd_mach_ppc_vle;
2238 }
2239
2240 if (mach == 0)
2241 {
2242 s = bfd_get_section_by_name (abfd, APUINFO_SECTION_NAME);
2243 if (s != NULL && bfd_malloc_and_get_section (abfd, s, &contents))
2244 {
2245 unsigned int apuinfo_size = bfd_get_32 (abfd, contents + 4);
2246 unsigned int i;
2247
2248 for (i = 20; i < apuinfo_size + 20 && i + 4 <= s->size; i += 4)
2249 {
2250 unsigned int val = bfd_get_32 (abfd, contents + i);
2251 switch (val >> 16)
2252 {
2253 case PPC_APUINFO_PMR:
2254 case PPC_APUINFO_RFMCI:
2255 if (mach == 0)
2256 mach = bfd_mach_ppc_titan;
2257 break;
2258
2259 case PPC_APUINFO_ISEL:
2260 case PPC_APUINFO_CACHELCK:
2261 if (mach == bfd_mach_ppc_titan)
2262 mach = bfd_mach_ppc_e500mc;
2263 break;
2264
2265 case PPC_APUINFO_SPE:
2266 case PPC_APUINFO_EFS:
2267 case PPC_APUINFO_BRLOCK:
2268 if (mach != bfd_mach_ppc_vle)
2269 mach = bfd_mach_ppc_e500;
8941017b 2270 break;
14b57c7c
AM
2271
2272 case PPC_APUINFO_VLE:
2273 mach = bfd_mach_ppc_vle;
2274 break;
2275
2276 default:
2277 mach = -1ul;
2278 }
2279 }
2280 free (contents);
2281 }
2282 }
2283
2284 if (mach != 0 && mach != -1ul)
2285 {
2286 const bfd_arch_info_type *arch;
2287
2288 for (arch = abfd->arch_info->next; arch; arch = arch->next)
2289 if (arch->mach == mach)
2290 {
2291 abfd->arch_info = arch;
2292 break;
2293 }
2294 }
2295 return TRUE;
2296}
2297
25dbc73a 2298/* Fix bad default arch selected for a 32 bit input bfd when the
14b57c7c 2299 default is 64 bit. Also select arch based on apuinfo. */
7619e7c7 2300
25dbc73a
AM
2301static bfd_boolean
2302ppc_elf_object_p (bfd *abfd)
2303{
14b57c7c
AM
2304 if (!abfd->arch_info->the_default)
2305 return TRUE;
2306
2307 if (abfd->arch_info->bits_per_word == 64)
25dbc73a
AM
2308 {
2309 Elf_Internal_Ehdr *i_ehdr = elf_elfheader (abfd);
7619e7c7 2310
25dbc73a
AM
2311 if (i_ehdr->e_ident[EI_CLASS] == ELFCLASS32)
2312 {
2313 /* Relies on arch after 64 bit default being 32 bit default. */
2314 abfd->arch_info = abfd->arch_info->next;
2315 BFD_ASSERT (abfd->arch_info->bits_per_word == 32);
2316 }
2317 }
14b57c7c 2318 return _bfd_elf_ppc_set_arch (abfd);
25dbc73a 2319}
7619e7c7 2320
25dbc73a 2321/* Function to set whether a module needs the -mrelocatable bit set. */
7619e7c7 2322
25dbc73a
AM
2323static bfd_boolean
2324ppc_elf_set_private_flags (bfd *abfd, flagword flags)
2325{
2326 BFD_ASSERT (!elf_flags_init (abfd)
2327 || elf_elfheader (abfd)->e_flags == flags);
7619e7c7 2328
25dbc73a
AM
2329 elf_elfheader (abfd)->e_flags = flags;
2330 elf_flags_init (abfd) = TRUE;
2331 return TRUE;
2332}
2333
25dbc73a 2334/* Support for core dump NOTE sections. */
deaaf2f3 2335
b34976b6 2336static bfd_boolean
25dbc73a 2337ppc_elf_grok_prstatus (bfd *abfd, Elf_Internal_Note *note)
252b5132 2338{
25dbc73a
AM
2339 int offset;
2340 unsigned int size;
252b5132 2341
25dbc73a
AM
2342 switch (note->descsz)
2343 {
2344 default:
2345 return FALSE;
252b5132 2346
25dbc73a
AM
2347 case 268: /* Linux/PPC. */
2348 /* pr_cursig */
228e534f 2349 elf_tdata (abfd)->core->signal = bfd_get_16 (abfd, note->descdata + 12);
deaaf2f3 2350
25dbc73a 2351 /* pr_pid */
228e534f 2352 elf_tdata (abfd)->core->lwpid = bfd_get_32 (abfd, note->descdata + 24);
9abc968f 2353
25dbc73a
AM
2354 /* pr_reg */
2355 offset = 72;
2356 size = 192;
deaaf2f3 2357
25dbc73a
AM
2358 break;
2359 }
deaaf2f3 2360
25dbc73a
AM
2361 /* Make a ".reg/999" section. */
2362 return _bfd_elfcore_make_pseudosection (abfd, ".reg",
2363 size, note->descpos + offset);
2364}
252b5132 2365
25dbc73a
AM
2366static bfd_boolean
2367ppc_elf_grok_psinfo (bfd *abfd, Elf_Internal_Note *note)
2368{
2369 switch (note->descsz)
deaaf2f3 2370 {
25dbc73a
AM
2371 default:
2372 return FALSE;
deaaf2f3 2373
25dbc73a 2374 case 128: /* Linux/PPC elf_prpsinfo. */
228e534f 2375 elf_tdata (abfd)->core->pid
bc989cdc 2376 = bfd_get_32 (abfd, note->descdata + 16);
228e534f 2377 elf_tdata (abfd)->core->program
25dbc73a 2378 = _bfd_elfcore_strndup (abfd, note->descdata + 32, 16);
228e534f 2379 elf_tdata (abfd)->core->command
25dbc73a
AM
2380 = _bfd_elfcore_strndup (abfd, note->descdata + 48, 80);
2381 }
9abc968f 2382
25dbc73a
AM
2383 /* Note that for some reason, a spurious space is tacked
2384 onto the end of the args in some (at least one anyway)
2385 implementations, so strip it off if it exists. */
70bccea4 2386
25dbc73a 2387 {
228e534f 2388 char *command = elf_tdata (abfd)->core->command;
25dbc73a 2389 int n = strlen (command);
70bccea4 2390
25dbc73a
AM
2391 if (0 < n && command[n - 1] == ' ')
2392 command[n - 1] = '\0';
2393 }
deaaf2f3 2394
25dbc73a
AM
2395 return TRUE;
2396}
deaaf2f3 2397
183e98be
AM
2398static char *
2399ppc_elf_write_core_note (bfd *abfd, char *buf, int *bufsiz, int note_type, ...)
2400{
2401 switch (note_type)
2402 {
2403 default:
2404 return NULL;
2405
2406 case NT_PRPSINFO:
2407 {
602f1657 2408 char data[128] ATTRIBUTE_NONSTRING;
183e98be
AM
2409 va_list ap;
2410
2411 va_start (ap, note_type);
75cd47ed 2412 memset (data, 0, sizeof (data));
183e98be 2413 strncpy (data + 32, va_arg (ap, const char *), 16);
be3e27bb 2414#if GCC_VERSION == 8000 || GCC_VERSION == 8001
95da9854 2415 DIAGNOSTIC_PUSH;
be3e27bb 2416 /* GCC 8.0 and 8.1 warn about 80 equals destination size with
95da9854
L
2417 -Wstringop-truncation:
2418 https://gcc.gnu.org/bugzilla/show_bug.cgi?id=85643
2419 */
95da9854
L
2420 DIAGNOSTIC_IGNORE_STRINGOP_TRUNCATION;
2421#endif
183e98be 2422 strncpy (data + 48, va_arg (ap, const char *), 80);
be3e27bb 2423#if GCC_VERSION == 8000 || GCC_VERSION == 8001
95da9854 2424 DIAGNOSTIC_POP;
fe75810f 2425#endif
183e98be
AM
2426 va_end (ap);
2427 return elfcore_write_note (abfd, buf, bufsiz,
2428 "CORE", note_type, data, sizeof (data));
2429 }
2430
2431 case NT_PRSTATUS:
2432 {
2433 char data[268];
2434 va_list ap;
2435 long pid;
2436 int cursig;
2437 const void *greg;
2438
2439 va_start (ap, note_type);
2440 memset (data, 0, 72);
2441 pid = va_arg (ap, long);
2442 bfd_put_32 (abfd, pid, data + 24);
2443 cursig = va_arg (ap, int);
2444 bfd_put_16 (abfd, cursig, data + 12);
2445 greg = va_arg (ap, const void *);
2446 memcpy (data + 72, greg, 192);
2447 memset (data + 264, 0, 4);
2448 va_end (ap);
2449 return elfcore_write_note (abfd, buf, bufsiz,
2450 "CORE", note_type, data, sizeof (data));
2451 }
2452 }
2453}
2454
b9c361e0 2455static flagword
68ffbac6 2456ppc_elf_lookup_section_flags (char *flag_name)
b9c361e0
JL
2457{
2458
2459 if (!strcmp (flag_name, "SHF_PPC_VLE"))
2460 return SHF_PPC_VLE;
2461
2462 return 0;
2463}
2464
25dbc73a
AM
2465/* Return address for Ith PLT stub in section PLT, for relocation REL
2466 or (bfd_vma) -1 if it should not be included. */
deaaf2f3 2467
25dbc73a
AM
2468static bfd_vma
2469ppc_elf_plt_sym_val (bfd_vma i ATTRIBUTE_UNUSED,
2470 const asection *plt ATTRIBUTE_UNUSED,
2471 const arelent *rel)
2472{
2473 return rel->address;
2474}
deaaf2f3 2475
25dbc73a 2476/* Handle a PowerPC specific section when reading an object file. This
6dc132d9
L
2477 is called when bfd_section_from_shdr finds a section with an unknown
2478 type. */
deaaf2f3 2479
25dbc73a 2480static bfd_boolean
6dc132d9
L
2481ppc_elf_section_from_shdr (bfd *abfd,
2482 Elf_Internal_Shdr *hdr,
2483 const char *name,
2484 int shindex)
25dbc73a
AM
2485{
2486 asection *newsect;
2487 flagword flags;
d1c6de6f 2488
6dc132d9 2489 if (! _bfd_elf_make_section_from_shdr (abfd, hdr, name, shindex))
25dbc73a 2490 return FALSE;
deaaf2f3 2491
25dbc73a
AM
2492 newsect = hdr->bfd_section;
2493 flags = bfd_get_section_flags (abfd, newsect);
2494 if (hdr->sh_flags & SHF_EXCLUDE)
2495 flags |= SEC_EXCLUDE;
9abc968f 2496
25dbc73a
AM
2497 if (hdr->sh_type == SHT_ORDERED)
2498 flags |= SEC_SORT_ENTRIES;
d1c6de6f 2499
25dbc73a
AM
2500 bfd_set_section_flags (abfd, newsect, flags);
2501 return TRUE;
2502}
2503
2504/* Set up any other section flags and such that may be necessary. */
2505
2506static bfd_boolean
2507ppc_elf_fake_sections (bfd *abfd ATTRIBUTE_UNUSED,
2508 Elf_Internal_Shdr *shdr,
2509 asection *asect)
2510{
25dbc73a
AM
2511 if ((asect->flags & SEC_SORT_ENTRIES) != 0)
2512 shdr->sh_type = SHT_ORDERED;
2513
2514 return TRUE;
2515}
2516
2517/* If we have .sbss2 or .PPC.EMB.sbss0 output sections, we
2518 need to bump up the number of section headers. */
2519
2520static int
a6b96beb
AM
2521ppc_elf_additional_program_headers (bfd *abfd,
2522 struct bfd_link_info *info ATTRIBUTE_UNUSED)
25dbc73a
AM
2523{
2524 asection *s;
2525 int ret = 0;
d1c6de6f 2526
25dbc73a
AM
2527 s = bfd_get_section_by_name (abfd, ".sbss2");
2528 if (s != NULL && (s->flags & SEC_ALLOC) != 0)
2529 ++ret;
d1c6de6f 2530
25dbc73a
AM
2531 s = bfd_get_section_by_name (abfd, ".PPC.EMB.sbss0");
2532 if (s != NULL && (s->flags & SEC_ALLOC) != 0)
2533 ++ret;
deaaf2f3 2534
25dbc73a
AM
2535 return ret;
2536}
deaaf2f3 2537
68ffbac6 2538/* Modify the segment map for VLE executables. */
b9c361e0
JL
2539
2540bfd_boolean
2541ppc_elf_modify_segment_map (bfd *abfd,
2542 struct bfd_link_info *info ATTRIBUTE_UNUSED)
2543{
f7d69005 2544 struct elf_segment_map *m;
b9c361e0
JL
2545
2546 /* At this point in the link, output sections have already been sorted by
2547 LMA and assigned to segments. All that is left to do is to ensure
2548 there is no mixing of VLE & non-VLE sections in a text segment.
2549 If we find that case, we split the segment.
2550 We maintain the original output section order. */
2551
12bd6957 2552 for (m = elf_seg_map (abfd); m != NULL; m = m->next)
b9c361e0 2553 {
f7d69005
AM
2554 struct elf_segment_map *n;
2555 bfd_size_type amt;
2556 unsigned int j, k;
2557 unsigned int p_flags;
2558
2559 if (m->p_type != PT_LOAD || m->count == 0)
b9c361e0
JL
2560 continue;
2561
f7d69005 2562 for (p_flags = PF_R, j = 0; j != m->count; ++j)
b9c361e0 2563 {
f7d69005
AM
2564 if ((m->sections[j]->flags & SEC_READONLY) == 0)
2565 p_flags |= PF_W;
2566 if ((m->sections[j]->flags & SEC_CODE) != 0)
2567 {
2568 p_flags |= PF_X;
2569 if ((elf_section_flags (m->sections[j]) & SHF_PPC_VLE) != 0)
2570 p_flags |= PF_PPC_VLE;
2571 break;
2572 }
2573 }
2574 if (j != m->count)
2575 while (++j != m->count)
2576 {
2577 unsigned int p_flags1 = PF_R;
94caa966 2578
f7d69005
AM
2579 if ((m->sections[j]->flags & SEC_READONLY) == 0)
2580 p_flags1 |= PF_W;
2581 if ((m->sections[j]->flags & SEC_CODE) != 0)
2582 {
2583 p_flags1 |= PF_X;
2584 if ((elf_section_flags (m->sections[j]) & SHF_PPC_VLE) != 0)
2585 p_flags1 |= PF_PPC_VLE;
2586 if (((p_flags1 ^ p_flags) & PF_PPC_VLE) != 0)
2587 break;
2588 }
2589 p_flags |= p_flags1;
2590 }
2591 /* If we're splitting a segment which originally contained rw
2592 sections then those sections might now only be in one of the
2593 two parts. So always set p_flags if splitting, even if we
2594 are being called for objcopy with p_flags_valid set. */
2595 if (j != m->count || !m->p_flags_valid)
2596 {
2597 m->p_flags_valid = 1;
2598 m->p_flags = p_flags;
2599 }
2600 if (j == m->count)
b9c361e0
JL
2601 continue;
2602
f7d69005 2603 /* Sections 0..j-1 stay in this (current) segment,
b9c361e0
JL
2604 the remainder are put in a new segment.
2605 The scan resumes with the new segment. */
2606
b9c361e0
JL
2607 amt = sizeof (struct elf_segment_map);
2608 amt += (m->count - j - 1) * sizeof (asection *);
2609 n = (struct elf_segment_map *) bfd_zalloc (abfd, amt);
2610 if (n == NULL)
954b63d4 2611 return FALSE;
b9c361e0
JL
2612
2613 n->p_type = PT_LOAD;
b9c361e0
JL
2614 n->count = m->count - j;
2615 for (k = 0; k < n->count; ++k)
f7d69005
AM
2616 n->sections[k] = m->sections[j + k];
2617 m->count = j;
2618 m->p_size_valid = 0;
b9c361e0
JL
2619 n->next = m->next;
2620 m->next = n;
b9c361e0
JL
2621 }
2622
2623 return TRUE;
2624}
2625
25dbc73a
AM
2626/* Add extra PPC sections -- Note, for now, make .sbss2 and
2627 .PPC.EMB.sbss0 a normal section, and not a bss section so
2628 that the linker doesn't crater when trying to make more than
2629 2 sections. */
e656e369 2630
b35d266b 2631static const struct bfd_elf_special_section ppc_elf_special_sections[] =
7f4d3958 2632{
14b57c7c
AM
2633 { STRING_COMMA_LEN (".plt"), 0, SHT_NOBITS, SHF_ALLOC + SHF_EXECINSTR },
2634 { STRING_COMMA_LEN (".sbss"), -2, SHT_NOBITS, SHF_ALLOC + SHF_WRITE },
2635 { STRING_COMMA_LEN (".sbss2"), -2, SHT_PROGBITS, SHF_ALLOC },
2636 { STRING_COMMA_LEN (".sdata"), -2, SHT_PROGBITS, SHF_ALLOC + SHF_WRITE },
2637 { STRING_COMMA_LEN (".sdata2"), -2, SHT_PROGBITS, SHF_ALLOC },
2638 { STRING_COMMA_LEN (".tags"), 0, SHT_ORDERED, SHF_ALLOC },
2639 { STRING_COMMA_LEN (APUINFO_SECTION_NAME), 0, SHT_NOTE, 0 },
2640 { STRING_COMMA_LEN (".PPC.EMB.sbss0"), 0, SHT_PROGBITS, SHF_ALLOC },
2641 { STRING_COMMA_LEN (".PPC.EMB.sdata0"), 0, SHT_PROGBITS, SHF_ALLOC },
2642 { NULL, 0, 0, 0, 0 }
7f4d3958
L
2643};
2644
551b43fd
AM
2645/* This is what we want for new plt/got. */
2646static struct bfd_elf_special_section ppc_alt_plt =
07d6d2b8 2647 { STRING_COMMA_LEN (".plt"), 0, SHT_PROGBITS, SHF_ALLOC };
551b43fd
AM
2648
2649static const struct bfd_elf_special_section *
4aef7643 2650ppc_elf_get_sec_type_attr (bfd *abfd, asection *sec)
7f4d3958 2651{
b35d266b 2652 const struct bfd_elf_special_section *ssect;
551b43fd
AM
2653
2654 /* See if this is one of the special sections. */
2655 if (sec->name == NULL)
2656 return NULL;
2657
2658 ssect = _bfd_elf_get_special_section (sec->name, ppc_elf_special_sections,
2659 sec->use_rela_p);
2660 if (ssect != NULL)
2661 {
2662 if (ssect == ppc_elf_special_sections && (sec->flags & SEC_LOAD) != 0)
2663 ssect = &ppc_alt_plt;
2664 return ssect;
2665 }
2666
2667 return _bfd_elf_get_sec_type_attr (abfd, sec);
2668}
25dbc73a
AM
2669\f
2670/* Very simple linked list structure for recording apuinfo values. */
2671typedef struct apuinfo_list
2672{
2673 struct apuinfo_list *next;
2674 unsigned long value;
2675}
2676apuinfo_list;
e656e369 2677
25dbc73a 2678static apuinfo_list *head;
f2faa800 2679static bfd_boolean apuinfo_set;
deaaf2f3 2680
25dbc73a
AM
2681static void
2682apuinfo_list_init (void)
2683{
2684 head = NULL;
f2faa800 2685 apuinfo_set = FALSE;
25dbc73a 2686}
9abc968f 2687
25dbc73a
AM
2688static void
2689apuinfo_list_add (unsigned long value)
2690{
2691 apuinfo_list *entry = head;
deaaf2f3 2692
25dbc73a
AM
2693 while (entry != NULL)
2694 {
2695 if (entry->value == value)
2696 return;
2697 entry = entry->next;
2698 }
b4a38de6 2699
25dbc73a
AM
2700 entry = bfd_malloc (sizeof (* entry));
2701 if (entry == NULL)
2702 return;
e656e369 2703
25dbc73a
AM
2704 entry->value = value;
2705 entry->next = head;
2706 head = entry;
2707}
9abc968f 2708
25dbc73a
AM
2709static unsigned
2710apuinfo_list_length (void)
2711{
2712 apuinfo_list *entry;
2713 unsigned long count;
9abc968f 2714
25dbc73a
AM
2715 for (entry = head, count = 0;
2716 entry;
2717 entry = entry->next)
2718 ++ count;
e656e369 2719
25dbc73a
AM
2720 return count;
2721}
eea6121a 2722
25dbc73a
AM
2723static inline unsigned long
2724apuinfo_list_element (unsigned long number)
2725{
2726 apuinfo_list * entry;
e656e369 2727
25dbc73a
AM
2728 for (entry = head;
2729 entry && number --;
2730 entry = entry->next)
2731 ;
252b5132 2732
25dbc73a
AM
2733 return entry ? entry->value : 0;
2734}
2735
2736static void
2737apuinfo_list_finish (void)
2738{
2739 apuinfo_list *entry;
2740
2741 for (entry = head; entry;)
252b5132 2742 {
25dbc73a
AM
2743 apuinfo_list *next = entry->next;
2744 free (entry);
2745 entry = next;
2746 }
9abc968f 2747
25dbc73a
AM
2748 head = NULL;
2749}
9abc968f 2750
25dbc73a
AM
2751/* Scan the input BFDs and create a linked list of
2752 the APUinfo values that will need to be emitted. */
9abc968f 2753
25dbc73a
AM
2754static void
2755ppc_elf_begin_write_processing (bfd *abfd, struct bfd_link_info *link_info)
2756{
2757 bfd *ibfd;
2758 asection *asec;
deddc40b
NS
2759 char *buffer = NULL;
2760 bfd_size_type largest_input_size = 0;
25dbc73a 2761 unsigned i;
25dbc73a
AM
2762 unsigned long length;
2763 const char *error_message = NULL;
9abc968f 2764
25dbc73a
AM
2765 if (link_info == NULL)
2766 return;
9abc968f 2767
25dbc73a 2768 apuinfo_list_init ();
252b5132 2769
25dbc73a 2770 /* Read in the input sections contents. */
c72f2fb2 2771 for (ibfd = link_info->input_bfds; ibfd; ibfd = ibfd->link.next)
252b5132 2772 {
25dbc73a 2773 unsigned long datum;
252b5132 2774
25dbc73a
AM
2775 asec = bfd_get_section_by_name (ibfd, APUINFO_SECTION_NAME);
2776 if (asec == NULL)
2777 continue;
252b5132 2778
695344c0 2779 /* xgettext:c-format */
871b3ab2 2780 error_message = _("corrupt %s section in %pB");
25dbc73a 2781 length = asec->size;
deddc40b
NS
2782 if (length < 20)
2783 goto fail;
2784
f2faa800 2785 apuinfo_set = TRUE;
deddc40b 2786 if (largest_input_size < asec->size)
25dbc73a 2787 {
deddc40b
NS
2788 if (buffer)
2789 free (buffer);
2790 largest_input_size = asec->size;
2791 buffer = bfd_malloc (largest_input_size);
2792 if (!buffer)
2793 return;
25dbc73a 2794 }
5b914448 2795
25dbc73a 2796 if (bfd_seek (ibfd, asec->filepos, SEEK_SET) != 0
deddc40b 2797 || (bfd_bread (buffer, length, ibfd) != length))
25dbc73a 2798 {
695344c0 2799 /* xgettext:c-format */
871b3ab2 2800 error_message = _("unable to read in %s section from %pB");
25dbc73a
AM
2801 goto fail;
2802 }
252b5132 2803
25dbc73a
AM
2804 /* Verify the contents of the header. Note - we have to
2805 extract the values this way in order to allow for a
2806 host whose endian-ness is different from the target. */
deddc40b 2807 datum = bfd_get_32 (ibfd, buffer);
25dbc73a
AM
2808 if (datum != sizeof APUINFO_LABEL)
2809 goto fail;
252b5132 2810
deddc40b 2811 datum = bfd_get_32 (ibfd, buffer + 8);
25dbc73a
AM
2812 if (datum != 0x2)
2813 goto fail;
252b5132 2814
deddc40b 2815 if (strcmp (buffer + 12, APUINFO_LABEL) != 0)
25dbc73a 2816 goto fail;
252b5132 2817
25dbc73a 2818 /* Get the number of bytes used for apuinfo entries. */
deddc40b 2819 datum = bfd_get_32 (ibfd, buffer + 4);
25dbc73a
AM
2820 if (datum + 20 != length)
2821 goto fail;
2822
25dbc73a
AM
2823 /* Scan the apuinfo section, building a list of apuinfo numbers. */
2824 for (i = 0; i < datum; i += 4)
deddc40b 2825 apuinfo_list_add (bfd_get_32 (ibfd, buffer + 20 + i));
252b5132
RH
2826 }
2827
25dbc73a 2828 error_message = NULL;
252b5132 2829
f2faa800 2830 if (apuinfo_set)
deddc40b 2831 {
f2faa800
NS
2832 /* Compute the size of the output section. */
2833 unsigned num_entries = apuinfo_list_length ();
5b914448 2834
deddc40b
NS
2835 /* Set the output section size, if it exists. */
2836 asec = bfd_get_section_by_name (abfd, APUINFO_SECTION_NAME);
f2faa800 2837
deddc40b
NS
2838 if (asec && ! bfd_set_section_size (abfd, asec, 20 + num_entries * 4))
2839 {
2840 ibfd = abfd;
695344c0 2841 /* xgettext:c-format */
871b3ab2 2842 error_message = _("warning: unable to set size of %s section in %pB");
deddc40b
NS
2843 }
2844 }
25dbc73a
AM
2845
2846 fail:
deddc40b
NS
2847 if (buffer)
2848 free (buffer);
25dbc73a
AM
2849
2850 if (error_message)
cd9af601 2851 _bfd_error_handler (error_message, APUINFO_SECTION_NAME, ibfd);
25dbc73a 2852}
252b5132 2853
25dbc73a
AM
2854/* Prevent the output section from accumulating the input sections'
2855 contents. We have already stored this in our linked list structure. */
252b5132 2856
25dbc73a
AM
2857static bfd_boolean
2858ppc_elf_write_section (bfd *abfd ATTRIBUTE_UNUSED,
c7b8f16e 2859 struct bfd_link_info *link_info ATTRIBUTE_UNUSED,
25dbc73a
AM
2860 asection *asec,
2861 bfd_byte *contents ATTRIBUTE_UNUSED)
2862{
f2faa800 2863 return apuinfo_set && strcmp (asec->name, APUINFO_SECTION_NAME) == 0;
252b5132
RH
2864}
2865
25dbc73a
AM
2866/* Finally we can generate the output section. */
2867
2868static void
2869ppc_elf_final_write_processing (bfd *abfd, bfd_boolean linker ATTRIBUTE_UNUSED)
7619e7c7 2870{
25dbc73a
AM
2871 bfd_byte *buffer;
2872 asection *asec;
2873 unsigned i;
2874 unsigned num_entries;
2875 bfd_size_type length;
7619e7c7 2876
25dbc73a
AM
2877 asec = bfd_get_section_by_name (abfd, APUINFO_SECTION_NAME);
2878 if (asec == NULL)
2879 return;
2880
f2faa800 2881 if (!apuinfo_set)
25dbc73a
AM
2882 return;
2883
2884 length = asec->size;
2885 if (length < 20)
2886 return;
2887
2888 buffer = bfd_malloc (length);
2889 if (buffer == NULL)
7619e7c7 2890 {
4eca0228 2891 _bfd_error_handler
cf97bcb0 2892 (_("failed to allocate space for new APUinfo section"));
25dbc73a 2893 return;
7619e7c7 2894 }
7619e7c7 2895
25dbc73a
AM
2896 /* Create the apuinfo header. */
2897 num_entries = apuinfo_list_length ();
2898 bfd_put_32 (abfd, sizeof APUINFO_LABEL, buffer);
2899 bfd_put_32 (abfd, num_entries * 4, buffer + 4);
2900 bfd_put_32 (abfd, 0x2, buffer + 8);
2901 strcpy ((char *) buffer + 12, APUINFO_LABEL);
feee612b 2902
25dbc73a
AM
2903 length = 20;
2904 for (i = 0; i < num_entries; i++)
feee612b 2905 {
25dbc73a
AM
2906 bfd_put_32 (abfd, apuinfo_list_element (i), buffer + length);
2907 length += 4;
feee612b 2908 }
feee612b 2909
25dbc73a 2910 if (length != asec->size)
cf97bcb0 2911 _bfd_error_handler (_("failed to compute new APUinfo section"));
252b5132 2912
25dbc73a 2913 if (! bfd_set_section_contents (abfd, asec, buffer, (file_ptr) 0, length))
cf97bcb0 2914 _bfd_error_handler (_("failed to install new APUinfo section"));
252b5132 2915
25dbc73a
AM
2916 free (buffer);
2917
2918 apuinfo_list_finish ();
252b5132 2919}
25dbc73a 2920\f
7382d32a 2921static bfd_boolean
c6dd29ce 2922is_nonpic_glink_stub (bfd *abfd, asection *glink, bfd_vma off)
7382d32a 2923{
407aa07c 2924 bfd_byte buf[4 * 4];
7382d32a 2925
9e390558 2926 if (!bfd_get_section_contents (abfd, glink, buf, off, sizeof buf))
7382d32a
AM
2927 return FALSE;
2928
c6dd29ce
AM
2929 return ((bfd_get_32 (abfd, buf + 0) & 0xffff0000) == LIS_11
2930 && (bfd_get_32 (abfd, buf + 4) & 0xffff0000) == LWZ_11_11
407aa07c
AM
2931 && bfd_get_32 (abfd, buf + 8) == MTCTR_11
2932 && bfd_get_32 (abfd, buf + 12) == BCTR);
7382d32a
AM
2933}
2934
468392fb
AM
2935static bfd_boolean
2936section_covers_vma (bfd *abfd ATTRIBUTE_UNUSED, asection *section, void *ptr)
2937{
2938 bfd_vma vma = *(bfd_vma *) ptr;
2939 return ((section->flags & SEC_ALLOC) != 0
2940 && section->vma <= vma
2941 && vma < section->vma + section->size);
2942}
2943
2944static long
2945ppc_elf_get_synthetic_symtab (bfd *abfd, long symcount, asymbol **syms,
2946 long dynsymcount, asymbol **dynsyms,
2947 asymbol **ret)
2948{
2949 bfd_boolean (*slurp_relocs) (bfd *, asection *, asymbol **, bfd_boolean);
2950 asection *plt, *relplt, *dynamic, *glink;
2951 bfd_vma glink_vma = 0;
2952 bfd_vma resolv_vma = 0;
9e390558 2953 bfd_vma stub_off;
468392fb
AM
2954 asymbol *s;
2955 arelent *p;
9e390558 2956 long count, i, stub_delta;
468392fb
AM
2957 size_t size;
2958 char *names;
2959 bfd_byte buf[4];
2960
2961 *ret = NULL;
2962
2963 if ((abfd->flags & (DYNAMIC | EXEC_P)) == 0)
2964 return 0;
2965
2966 if (dynsymcount <= 0)
2967 return 0;
2968
2969 relplt = bfd_get_section_by_name (abfd, ".rela.plt");
2970 if (relplt == NULL)
2971 return 0;
2972
2973 plt = bfd_get_section_by_name (abfd, ".plt");
2974 if (plt == NULL)
2975 return 0;
2976
2977 /* Call common code to handle old-style executable PLTs. */
2978 if (elf_section_flags (plt) & SHF_EXECINSTR)
2979 return _bfd_elf_get_synthetic_symtab (abfd, symcount, syms,
2980 dynsymcount, dynsyms, ret);
2981
2982 /* If this object was prelinked, the prelinker stored the address
2983 of .glink at got[1]. If it wasn't prelinked, got[1] will be zero. */
2984 dynamic = bfd_get_section_by_name (abfd, ".dynamic");
2985 if (dynamic != NULL)
2986 {
2987 bfd_byte *dynbuf, *extdyn, *extdynend;
2988 size_t extdynsize;
2989 void (*swap_dyn_in) (bfd *, const void *, Elf_Internal_Dyn *);
2990
2991 if (!bfd_malloc_and_get_section (abfd, dynamic, &dynbuf))
2992 return -1;
2993
2994 extdynsize = get_elf_backend_data (abfd)->s->sizeof_dyn;
2995 swap_dyn_in = get_elf_backend_data (abfd)->s->swap_dyn_in;
2996
2997 extdyn = dynbuf;
2998 extdynend = extdyn + dynamic->size;
2999 for (; extdyn < extdynend; extdyn += extdynsize)
3000 {
3001 Elf_Internal_Dyn dyn;
3002 (*swap_dyn_in) (abfd, extdyn, &dyn);
3003
3004 if (dyn.d_tag == DT_NULL)
3005 break;
3006
3007 if (dyn.d_tag == DT_PPC_GOT)
3008 {
3009 unsigned int g_o_t = dyn.d_un.d_val;
3010 asection *got = bfd_get_section_by_name (abfd, ".got");
3011 if (got != NULL
3012 && bfd_get_section_contents (abfd, got, buf,
3013 g_o_t - got->vma + 4, 4))
3014 glink_vma = bfd_get_32 (abfd, buf);
3015 break;
3016 }
3017 }
3018 free (dynbuf);
3019 }
3020
3021 /* Otherwise we read the first plt entry. */
3022 if (glink_vma == 0)
3023 {
3024 if (bfd_get_section_contents (abfd, plt, buf, 0, 4))
3025 glink_vma = bfd_get_32 (abfd, buf);
3026 }
3027
3028 if (glink_vma == 0)
3029 return 0;
3030
3031 /* The .glink section usually does not survive the final
3032 link; search for the section (usually .text) where the
3033 glink stubs now reside. */
3034 glink = bfd_sections_find_if (abfd, section_covers_vma, &glink_vma);
3035 if (glink == NULL)
3036 return 0;
3037
3038 /* Determine glink PLT resolver by reading the relative branch
3039 from the first glink stub. */
3040 if (bfd_get_section_contents (abfd, glink, buf,
3041 glink_vma - glink->vma, 4))
3042 {
3043 unsigned int insn = bfd_get_32 (abfd, buf);
3044
3045 /* The first glink stub may either branch to the resolver ... */
3046 insn ^= B;
3047 if ((insn & ~0x3fffffc) == 0)
3048 resolv_vma = glink_vma + (insn ^ 0x2000000) - 0x2000000;
3049
3050 /* ... or fall through a bunch of NOPs. */
3051 else if ((insn ^ B ^ NOP) == 0)
3052 for (i = 4;
3053 bfd_get_section_contents (abfd, glink, buf,
3054 glink_vma - glink->vma + i, 4);
3055 i += 4)
3056 if (bfd_get_32 (abfd, buf) != NOP)
3057 {
3058 resolv_vma = glink_vma + i;
3059 break;
3060 }
3061 }
3062
7382d32a 3063 count = relplt->size / sizeof (Elf32_External_Rela);
7382d32a
AM
3064 /* If the stubs are those for -shared/-pie then we might have
3065 multiple stubs for each plt entry. If that is the case then
3066 there is no way to associate stubs with their plt entries short
9e390558
AM
3067 of figuring out the GOT pointer value used in the stub.
3068 The offsets tested here need to cover all possible values of
3069 GLINK_ENTRY_SIZE for other than __tls_get_addr_opt. */
3070 stub_off = glink_vma - glink->vma;
3071 for (stub_delta = 16; stub_delta <= 32; stub_delta += 8)
3072 if (is_nonpic_glink_stub (abfd, glink, stub_off - stub_delta))
3073 break;
3074 if (stub_delta > 32)
7382d32a
AM
3075 return 0;
3076
468392fb
AM
3077 slurp_relocs = get_elf_backend_data (abfd)->s->slurp_reloc_table;
3078 if (! (*slurp_relocs) (abfd, relplt, dynsyms, TRUE))
3079 return -1;
3080
468392fb
AM
3081 size = count * sizeof (asymbol);
3082 p = relplt->relocation;
3083 for (i = 0; i < count; i++, p++)
e054468f
AM
3084 {
3085 size += strlen ((*p->sym_ptr_ptr)->name) + sizeof ("@plt");
3086 if (p->addend != 0)
3087 size += sizeof ("+0x") - 1 + 8;
3088 }
468392fb
AM
3089
3090 size += sizeof (asymbol) + sizeof ("__glink");
3091
3092 if (resolv_vma)
3093 size += sizeof (asymbol) + sizeof ("__glink_PLTresolve");
3094
3095 s = *ret = bfd_malloc (size);
3096 if (s == NULL)
3097 return -1;
3098
9e390558 3099 stub_off = glink_vma - glink->vma;
468392fb 3100 names = (char *) (s + count + 1 + (resolv_vma != 0));
1079403c
AM
3101 p = relplt->relocation + count - 1;
3102 for (i = 0; i < count; i++)
468392fb
AM
3103 {
3104 size_t len;
3105
9e390558
AM
3106 stub_off -= stub_delta;
3107 if (strcmp ((*p->sym_ptr_ptr)->name, "__tls_get_addr_opt") == 0)
3108 stub_off -= 32;
468392fb
AM
3109 *s = **p->sym_ptr_ptr;
3110 /* Undefined syms won't have BSF_LOCAL or BSF_GLOBAL set. Since
3111 we are defining a symbol, ensure one of them is set. */
3112 if ((s->flags & BSF_LOCAL) == 0)
3113 s->flags |= BSF_GLOBAL;
6ba2a415 3114 s->flags |= BSF_SYNTHETIC;
468392fb 3115 s->section = glink;
9e390558 3116 s->value = stub_off;
468392fb
AM
3117 s->name = names;
3118 s->udata.p = NULL;
3119 len = strlen ((*p->sym_ptr_ptr)->name);
3120 memcpy (names, (*p->sym_ptr_ptr)->name, len);
3121 names += len;
e054468f
AM
3122 if (p->addend != 0)
3123 {
3124 memcpy (names, "+0x", sizeof ("+0x") - 1);
3125 names += sizeof ("+0x") - 1;
3126 bfd_sprintf_vma (abfd, names, p->addend);
3127 names += strlen (names);
3128 }
468392fb
AM
3129 memcpy (names, "@plt", sizeof ("@plt"));
3130 names += sizeof ("@plt");
3131 ++s;
1079403c 3132 --p;
468392fb
AM
3133 }
3134
3135 /* Add a symbol at the start of the glink branch table. */
86a4952b 3136 memset (s, 0, sizeof *s);
468392fb 3137 s->the_bfd = abfd;
6ba2a415 3138 s->flags = BSF_GLOBAL | BSF_SYNTHETIC;
468392fb
AM
3139 s->section = glink;
3140 s->value = glink_vma - glink->vma;
3141 s->name = names;
3142 memcpy (names, "__glink", sizeof ("__glink"));
3143 names += sizeof ("__glink");
3144 s++;
3145 count++;
3146
3147 if (resolv_vma)
3148 {
3149 /* Add a symbol for the glink PLT resolver. */
86a4952b 3150 memset (s, 0, sizeof *s);
468392fb 3151 s->the_bfd = abfd;
6ba2a415 3152 s->flags = BSF_GLOBAL | BSF_SYNTHETIC;
468392fb
AM
3153 s->section = glink;
3154 s->value = resolv_vma - glink->vma;
3155 s->name = names;
3156 memcpy (names, "__glink_PLTresolve", sizeof ("__glink_PLTresolve"));
3157 names += sizeof ("__glink_PLTresolve");
3158 s++;
3159 count++;
3160 }
3161
3162 return count;
3163}
3164\f
25dbc73a
AM
3165/* The following functions are specific to the ELF linker, while
3166 functions above are used generally. They appear in this file more
3167 or less in the order in which they are called. eg.
3168 ppc_elf_check_relocs is called early in the link process,
3169 ppc_elf_finish_dynamic_sections is one of the last functions
3170 called. */
252b5132 3171
a6aa5195 3172/* Track PLT entries needed for a given symbol. We might need more
a877a2b6 3173 than one glink entry per symbol when generating a pic binary. */
a6aa5195
AM
3174struct plt_entry
3175{
3176 struct plt_entry *next;
3177
3178 /* -fPIC uses multiple GOT sections, one per file, called ".got2".
3179 This field stores the offset into .got2 used to initialise the
a877a2b6
AM
3180 GOT pointer reg. It will always be at least 32768. (Current
3181 gcc always uses an offset of 32768, but ld -r will pack .got2
3182 sections together resulting in larger offsets). */
a6aa5195
AM
3183 bfd_vma addend;
3184
3185 /* The .got2 section. */
3186 asection *sec;
3187
3188 /* PLT refcount or offset. */
3189 union
3190 {
3191 bfd_signed_vma refcount;
3192 bfd_vma offset;
3193 } plt;
3194
3195 /* .glink stub offset. */
3196 bfd_vma glink_offset;
3197};
3198
7c8bbca5
AM
3199/* Of those relocs that might be copied as dynamic relocs, this
3200 function selects those that must be copied when linking a shared
3201 library or PIE, even when the symbol is local. */
252b5132 3202
1d483afe
AM
3203static int
3204must_be_dyn_reloc (struct bfd_link_info *info,
3205 enum elf_ppc_reloc_type r_type)
3206{
3207 switch (r_type)
3208 {
3209 default:
7c8bbca5
AM
3210 /* Only relative relocs can be resolved when the object load
3211 address isn't fixed. DTPREL32 is excluded because the
3212 dynamic linker needs to differentiate global dynamic from
3213 local dynamic __tls_index pairs when PPC_OPT_TLS is set. */
1d483afe
AM
3214 return 1;
3215
3216 case R_PPC_REL24:
3217 case R_PPC_REL14:
3218 case R_PPC_REL14_BRTAKEN:
3219 case R_PPC_REL14_BRNTAKEN:
3220 case R_PPC_REL32:
3221 return 0;
3222
3223 case R_PPC_TPREL32:
3224 case R_PPC_TPREL16:
3225 case R_PPC_TPREL16_LO:
3226 case R_PPC_TPREL16_HI:
3227 case R_PPC_TPREL16_HA:
7c8bbca5
AM
3228 /* These relocations are relative but in a shared library the
3229 linker doesn't know the thread pointer base. */
3230 return bfd_link_dll (info);
1d483afe
AM
3231 }
3232}
252b5132 3233
25dbc73a
AM
3234/* If ELIMINATE_COPY_RELOCS is non-zero, the linker will try to avoid
3235 copying dynamic variables from a shared lib into an app's dynbss
3236 section, and instead use a dynamic relocation to point into the
3237 shared lib. */
3238#define ELIMINATE_COPY_RELOCS 1
252b5132 3239
f95f8542
AM
3240/* Used to track dynamic relocations for local symbols. */
3241struct ppc_dyn_relocs
3242{
3243 struct ppc_dyn_relocs *next;
3244
3245 /* The input section of the reloc. */
3246 asection *sec;
3247
3248 /* Total number of relocs copied for the input section. */
3249 unsigned int count : 31;
3250
3251 /* Whether this entry is for STT_GNU_IFUNC symbols. */
3252 unsigned int ifunc : 1;
3253};
3254
25dbc73a 3255/* PPC ELF linker hash entry. */
252b5132 3256
25dbc73a
AM
3257struct ppc_elf_link_hash_entry
3258{
3259 struct elf_link_hash_entry elf;
252b5132 3260
25dbc73a
AM
3261 /* If this symbol is used in the linker created sections, the processor
3262 specific backend uses this field to map the field into the offset
3263 from the beginning of the section. */
3264 elf_linker_section_pointers_t *linker_section_pointer;
252b5132 3265
25dbc73a 3266 /* Track dynamic relocs copied for this symbol. */
6061a67d 3267 struct elf_dyn_relocs *dyn_relocs;
252b5132 3268
37da22e5
AM
3269 /* Contexts in which symbol is used in the GOT.
3270 Bits are or'd into the mask as the corresponding relocs are
3271 encountered during check_relocs, with TLS_TLS being set when any
3272 of the other TLS bits are set. tls_optimize clears bits when
3273 optimizing to indicate the corresponding GOT entry type is not
3274 needed. If set, TLS_TLS is never cleared. tls_optimize may also
3275 set TLS_TPRELGD when a GD reloc turns into a TPREL one. We use a
3276 separate flag rather than setting TPREL just for convenience in
3277 distinguishing the two cases.
3278 These flags are also kept for local symbols. */
3279#define TLS_TLS 1 /* Any TLS reloc. */
3280#define TLS_GD 2 /* GD reloc. */
3281#define TLS_LD 4 /* LD reloc. */
3282#define TLS_TPREL 8 /* TPREL reloc, => IE. */
3283#define TLS_DTPREL 16 /* DTPREL reloc, => LD. */
3284#define TLS_MARK 32 /* __tls_get_addr call marked. */
3285#define TLS_TPRELGD 64 /* TPREL reloc resulting from GD->IE. */
bac3c8c5 3286 unsigned char tls_mask;
4dc4a9a5 3287
37da22e5
AM
3288 /* The above field is also used to mark function symbols. In which
3289 case TLS_TLS will be 0. */
3290#define PLT_IFUNC 2 /* STT_GNU_IFUNC. */
2d7ad24e 3291#define PLT_KEEP 4 /* inline plt call requires plt entry. */
37da22e5
AM
3292#define NON_GOT 256 /* local symbol plt, not stored. */
3293
4dc4a9a5
DJ
3294 /* Nonzero if we have seen a small data relocation referring to this
3295 symbol. */
d3e454b9
AM
3296 unsigned char has_sda_refs : 1;
3297
3298 /* Flag use of given relocations. */
3299 unsigned char has_addr16_ha : 1;
3300 unsigned char has_addr16_lo : 1;
25dbc73a 3301};
252b5132 3302
25dbc73a
AM
3303#define ppc_elf_hash_entry(ent) ((struct ppc_elf_link_hash_entry *) (ent))
3304
3305/* PPC ELF linker hash table. */
3306
3307struct ppc_elf_link_hash_table
3308{
3309 struct elf_link_hash_table elf;
3310
5446cbdf
AM
3311 /* Various options passed from the linker. */
3312 struct ppc_elf_params *params;
3313
25dbc73a 3314 /* Short-cuts to get to dynamic linker sections. */
d7128ce4 3315 asection *glink;
25dbc73a
AM
3316 asection *dynsbss;
3317 asection *relsbss;
c9a2f333 3318 elf_linker_section_t sdata[2];
25dbc73a 3319 asection *sbss;
6177242a 3320 asection *glink_eh_frame;
2d7ad24e
AM
3321 asection *pltlocal;
3322 asection *relpltlocal;
25dbc73a 3323
016687f8
AM
3324 /* The (unloaded but important) .rela.plt.unloaded on VxWorks. */
3325 asection *srelplt2;
3326
1d483afe 3327 /* Shortcut to __tls_get_addr. */
25dbc73a 3328 struct elf_link_hash_entry *tls_get_addr;
252b5132 3329
016687f8
AM
3330 /* The bfd that forced an old-style PLT. */
3331 bfd *old_bfd;
5b914448 3332
25dbc73a
AM
3333 /* TLS local dynamic got entry handling. */
3334 union {
3335 bfd_signed_vma refcount;
3336 bfd_vma offset;
3337 } tlsld_got;
252b5132 3338
c6dd29ce 3339 /* Offset of branch table to PltResolve function in glink. */
d7128ce4
AM
3340 bfd_vma glink_pltresolve;
3341
3b36f7e6
AM
3342 /* Size of reserved GOT entries. */
3343 unsigned int got_header_size;
3344 /* Non-zero if allocating the header left a gap. */
3345 unsigned int got_gap;
3346
4a3dc543
RS
3347 /* The type of PLT we have chosen to use. */
3348 enum ppc_elf_plt_type plt_type;
3349
9d8504b1 3350 /* True if the target system is VxWorks. */
016687f8 3351 unsigned int is_vxworks:1;
9d8504b1 3352
82e66161
AM
3353 /* Whether there exist local gnu indirect function resolvers,
3354 referenced by dynamic relocations. */
3355 unsigned int local_ifunc_resolver:1;
3356 unsigned int maybe_local_ifunc_resolver:1;
3357
9a23f96e
AM
3358 /* Set if tls optimization is enabled. */
3359 unsigned int do_tls_opt:1;
3360
3e04d765
AM
3361 /* Set if inline plt calls should be converted to direct calls. */
3362 unsigned int can_convert_all_inline_plt:1;
3363
9d8504b1
PB
3364 /* The size of PLT entries. */
3365 int plt_entry_size;
3366 /* The distance between adjacent PLT slots. */
3367 int plt_slot_size;
3368 /* The size of the first PLT entry. */
3369 int plt_initial_entry_size;
016687f8 3370
87d72d41
AM
3371 /* Small local sym cache. */
3372 struct sym_cache sym_cache;
25dbc73a 3373};
252b5132 3374
94caa966
AM
3375/* Rename some of the generic section flags to better document how they
3376 are used for ppc32. The flags are only valid for ppc32 elf objects. */
3377
3378/* Nonzero if this section has TLS related relocations. */
3379#define has_tls_reloc sec_flg0
3380
3381/* Nonzero if this section has a call to __tls_get_addr. */
3382#define has_tls_get_addr_call sec_flg1
3383
3e04d765
AM
3384 /* Flag set when PLTCALL relocs are detected. */
3385#define has_pltcall sec_flg2
3386
25dbc73a 3387/* Get the PPC ELF linker hash table from a link_info structure. */
252b5132 3388
25dbc73a 3389#define ppc_elf_hash_table(p) \
4dfe6ac6
NC
3390 (elf_hash_table_id ((struct elf_link_hash_table *) ((p)->hash)) \
3391 == PPC32_ELF_DATA ? ((struct ppc_elf_link_hash_table *) ((p)->hash)) : NULL)
252b5132 3392
25dbc73a 3393/* Create an entry in a PPC ELF linker hash table. */
252b5132 3394
25dbc73a
AM
3395static struct bfd_hash_entry *
3396ppc_elf_link_hash_newfunc (struct bfd_hash_entry *entry,
3397 struct bfd_hash_table *table,
3398 const char *string)
252b5132 3399{
25dbc73a
AM
3400 /* Allocate the structure if it has not already been allocated by a
3401 subclass. */
3402 if (entry == NULL)
3403 {
3404 entry = bfd_hash_allocate (table,
3405 sizeof (struct ppc_elf_link_hash_entry));
3406 if (entry == NULL)
3407 return entry;
3408 }
252b5132 3409
25dbc73a
AM
3410 /* Call the allocation method of the superclass. */
3411 entry = _bfd_elf_link_hash_newfunc (entry, table, string);
3412 if (entry != NULL)
3413 {
3414 ppc_elf_hash_entry (entry)->linker_section_pointer = NULL;
3415 ppc_elf_hash_entry (entry)->dyn_relocs = NULL;
3416 ppc_elf_hash_entry (entry)->tls_mask = 0;
5240d94d 3417 ppc_elf_hash_entry (entry)->has_sda_refs = 0;
25dbc73a 3418 }
252b5132 3419
25dbc73a 3420 return entry;
252b5132 3421}
3dab13f6 3422
25dbc73a 3423/* Create a PPC ELF linker hash table. */
3dab13f6 3424
25dbc73a
AM
3425static struct bfd_link_hash_table *
3426ppc_elf_link_hash_table_create (bfd *abfd)
3dab13f6 3427{
25dbc73a 3428 struct ppc_elf_link_hash_table *ret;
76e7a751 3429 static struct ppc_elf_params default_params
407aa07c 3430 = { PLT_OLD, 0, 0, 1, 0, 0, 12, 0, 0, 0 };
3dab13f6 3431
25dbc73a
AM
3432 ret = bfd_zmalloc (sizeof (struct ppc_elf_link_hash_table));
3433 if (ret == NULL)
3434 return NULL;
3dab13f6 3435
66eb6687
AM
3436 if (!_bfd_elf_link_hash_table_init (&ret->elf, abfd,
3437 ppc_elf_link_hash_newfunc,
4dfe6ac6
NC
3438 sizeof (struct ppc_elf_link_hash_entry),
3439 PPC32_ELF_DATA))
3dab13f6 3440 {
25dbc73a
AM
3441 free (ret);
3442 return NULL;
3443 }
58111eb7 3444
a6aa5195
AM
3445 ret->elf.init_plt_refcount.refcount = 0;
3446 ret->elf.init_plt_refcount.glist = NULL;
3447 ret->elf.init_plt_offset.offset = 0;
3448 ret->elf.init_plt_offset.glist = NULL;
3449
db434ba0
AM
3450 ret->params = &default_params;
3451
c9a2f333
AM
3452 ret->sdata[0].name = ".sdata";
3453 ret->sdata[0].sym_name = "_SDA_BASE_";
3454 ret->sdata[0].bss_name = ".sbss";
3455
3456 ret->sdata[1].name = ".sdata2";
3457 ret->sdata[1].sym_name = "_SDA2_BASE_";
3458 ret->sdata[1].bss_name = ".sbss2";
3459
9d8504b1
PB
3460 ret->plt_entry_size = 12;
3461 ret->plt_slot_size = 8;
3462 ret->plt_initial_entry_size = 72;
9d8504b1 3463
25dbc73a
AM
3464 return &ret->elf.root;
3465}
3dab13f6 3466
5446cbdf
AM
3467/* Hook linker params into hash table. */
3468
3469void
3470ppc_elf_link_params (struct bfd_link_info *info, struct ppc_elf_params *params)
3471{
3472 struct ppc_elf_link_hash_table *htab = ppc_elf_hash_table (info);
3473
3474 if (htab)
3475 htab->params = params;
76e7a751 3476 params->pagesize_p2 = bfd_log2 (params->pagesize);
5446cbdf
AM
3477}
3478
9d8504b1 3479/* Create .got and the related sections. */
3dab13f6 3480
25dbc73a
AM
3481static bfd_boolean
3482ppc_elf_create_got (bfd *abfd, struct bfd_link_info *info)
3483{
3484 struct ppc_elf_link_hash_table *htab;
3dab13f6 3485
25dbc73a
AM
3486 if (!_bfd_elf_create_got_section (abfd, info))
3487 return FALSE;
3dab13f6 3488
25dbc73a 3489 htab = ppc_elf_hash_table (info);
ce558b89 3490 if (!htab->is_vxworks)
9d8504b1
PB
3491 {
3492 /* The powerpc .got has a blrl instruction in it. Mark it
3493 executable. */
ce558b89
AM
3494 flagword flags = (SEC_ALLOC | SEC_LOAD | SEC_CODE | SEC_HAS_CONTENTS
3495 | SEC_IN_MEMORY | SEC_LINKER_CREATED);
3496 if (!bfd_set_section_flags (abfd, htab->elf.sgot, flags))
9d8504b1
PB
3497 return FALSE;
3498 }
3dab13f6 3499
25dbc73a
AM
3500 return TRUE;
3501}
3dab13f6 3502
93d1b056
AM
3503/* Create a special linker section, used for R_PPC_EMB_SDAI16 and
3504 R_PPC_EMB_SDA2I16 pointers. These sections become part of .sdata
3505 and .sdata2. Create _SDA_BASE_ and _SDA2_BASE too. */
3506
3507static bfd_boolean
3508ppc_elf_create_linker_section (bfd *abfd,
3509 struct bfd_link_info *info,
3510 flagword flags,
3511 elf_linker_section_t *lsect)
3512{
3513 asection *s;
3514
3515 flags |= (SEC_ALLOC | SEC_LOAD | SEC_HAS_CONTENTS | SEC_IN_MEMORY
3516 | SEC_LINKER_CREATED);
3517
3518 s = bfd_make_section_anyway_with_flags (abfd, lsect->name, flags);
3519 if (s == NULL)
3520 return FALSE;
3521 lsect->section = s;
3522
3523 /* Define the sym on the first section of this name. */
3524 s = bfd_get_section_by_name (abfd, lsect->name);
3525
3526 lsect->sym = _bfd_elf_define_linkage_sym (abfd, info, s, lsect->sym_name);
3527 if (lsect->sym == NULL)
3528 return FALSE;
3529 lsect->sym->root.u.def.value = 0x8000;
3530 return TRUE;
3531}
3532
e054468f
AM
3533static bfd_boolean
3534ppc_elf_create_glink (bfd *abfd, struct bfd_link_info *info)
3535{
3536 struct ppc_elf_link_hash_table *htab = ppc_elf_hash_table (info);
3537 asection *s;
3538 flagword flags;
691d2e9a 3539 int p2align;
e054468f
AM
3540
3541 flags = (SEC_ALLOC | SEC_LOAD | SEC_CODE | SEC_READONLY | SEC_HAS_CONTENTS
3542 | SEC_IN_MEMORY | SEC_LINKER_CREATED);
3543 s = bfd_make_section_anyway_with_flags (abfd, ".glink", flags);
3544 htab->glink = s;
691d2e9a
AM
3545 p2align = htab->params->ppc476_workaround ? 6 : 4;
3546 if (p2align < htab->params->plt_stub_align)
3547 p2align = htab->params->plt_stub_align;
e054468f 3548 if (s == NULL
691d2e9a 3549 || !bfd_set_section_alignment (abfd, s, p2align))
e054468f
AM
3550 return FALSE;
3551
6177242a
AM
3552 if (!info->no_ld_generated_unwind_info)
3553 {
3554 flags = (SEC_ALLOC | SEC_LOAD | SEC_READONLY | SEC_HAS_CONTENTS
3555 | SEC_IN_MEMORY | SEC_LINKER_CREATED);
3556 s = bfd_make_section_anyway_with_flags (abfd, ".eh_frame", flags);
3557 htab->glink_eh_frame = s;
3558 if (s == NULL
3559 || !bfd_set_section_alignment (abfd, s, 2))
3560 return FALSE;
3561 }
3562
e054468f
AM
3563 flags = SEC_ALLOC | SEC_LINKER_CREATED;
3564 s = bfd_make_section_anyway_with_flags (abfd, ".iplt", flags);
ce558b89 3565 htab->elf.iplt = s;
e054468f
AM
3566 if (s == NULL
3567 || !bfd_set_section_alignment (abfd, s, 4))
3568 return FALSE;
3569
3570 flags = (SEC_ALLOC | SEC_LOAD | SEC_READONLY | SEC_HAS_CONTENTS
3571 | SEC_IN_MEMORY | SEC_LINKER_CREATED);
14b2f831 3572 s = bfd_make_section_anyway_with_flags (abfd, ".rela.iplt", flags);
ce558b89 3573 htab->elf.irelplt = s;
e054468f
AM
3574 if (s == NULL
3575 || ! bfd_set_section_alignment (abfd, s, 2))
3576 return FALSE;
93d1b056 3577
2d7ad24e
AM
3578 /* Local plt entries. */
3579 flags = (SEC_ALLOC | SEC_LOAD
3580 | SEC_HAS_CONTENTS | SEC_IN_MEMORY | SEC_LINKER_CREATED);
3581 htab->pltlocal = bfd_make_section_anyway_with_flags (abfd, ".branch_lt",
3582 flags);
3583 if (htab->pltlocal == NULL
3584 || ! bfd_set_section_alignment (abfd, htab->pltlocal, 2))
3585 return FALSE;
3586
3587 if (bfd_link_pic (info))
3588 {
3589 flags = (SEC_ALLOC | SEC_LOAD | SEC_READONLY
3590 | SEC_HAS_CONTENTS | SEC_IN_MEMORY | SEC_LINKER_CREATED);
3591 htab->relpltlocal
3592 = bfd_make_section_anyway_with_flags (abfd, ".rela.branch_lt", flags);
3593 if (htab->relpltlocal == NULL
3594 || ! bfd_set_section_alignment (abfd, htab->relpltlocal, 2))
3595 return FALSE;
3596 }
3597
93d1b056
AM
3598 if (!ppc_elf_create_linker_section (abfd, info, 0,
3599 &htab->sdata[0]))
3600 return FALSE;
3601
3602 if (!ppc_elf_create_linker_section (abfd, info, SEC_READONLY,
3603 &htab->sdata[1]))
3604 return FALSE;
3605
e054468f
AM
3606 return TRUE;
3607}
3608
25dbc73a
AM
3609/* We have to create .dynsbss and .rela.sbss here so that they get mapped
3610 to output sections (just like _bfd_elf_create_dynamic_sections has
3611 to create .dynbss and .rela.bss). */
3dab13f6 3612
25dbc73a
AM
3613static bfd_boolean
3614ppc_elf_create_dynamic_sections (bfd *abfd, struct bfd_link_info *info)
3615{
3616 struct ppc_elf_link_hash_table *htab;
3617 asection *s;
3618 flagword flags;
3dab13f6 3619
25dbc73a 3620 htab = ppc_elf_hash_table (info);
3dab13f6 3621
ce558b89 3622 if (htab->elf.sgot == NULL
25dbc73a 3623 && !ppc_elf_create_got (abfd, info))
3dab13f6
AM
3624 return FALSE;
3625
25dbc73a
AM
3626 if (!_bfd_elf_create_dynamic_sections (abfd, info))
3627 return FALSE;
3dab13f6 3628
e054468f
AM
3629 if (htab->glink == NULL
3630 && !ppc_elf_create_glink (abfd, info))
d7128ce4 3631 return FALSE;
3dab13f6 3632
14b2f831
AM
3633 s = bfd_make_section_anyway_with_flags (abfd, ".dynsbss",
3634 SEC_ALLOC | SEC_LINKER_CREATED);
3b36f7e6 3635 htab->dynsbss = s;
3496cb2a 3636 if (s == NULL)
25dbc73a 3637 return FALSE;
3dab13f6 3638
0e1862bb 3639 if (! bfd_link_pic (info))
25dbc73a 3640 {
e054468f
AM
3641 flags = (SEC_ALLOC | SEC_LOAD | SEC_READONLY | SEC_HAS_CONTENTS
3642 | SEC_IN_MEMORY | SEC_LINKER_CREATED);
14b2f831 3643 s = bfd_make_section_anyway_with_flags (abfd, ".rela.sbss", flags);
3b36f7e6 3644 htab->relsbss = s;
25dbc73a 3645 if (s == NULL
25dbc73a
AM
3646 || ! bfd_set_section_alignment (abfd, s, 2))
3647 return FALSE;
3648 }
3dab13f6 3649
711de32c
RS
3650 if (htab->is_vxworks
3651 && !elf_vxworks_create_dynamic_sections (abfd, info, &htab->srelplt2))
3652 return FALSE;
9d8504b1 3653
ce558b89 3654 s = htab->elf.splt;
3b36f7e6 3655 flags = SEC_ALLOC | SEC_CODE | SEC_LINKER_CREATED;
4a3dc543
RS
3656 if (htab->plt_type == PLT_VXWORKS)
3657 /* The VxWorks PLT is a loaded section with contents. */
3658 flags |= SEC_HAS_CONTENTS | SEC_LOAD | SEC_READONLY;
25dbc73a
AM
3659 return bfd_set_section_flags (abfd, s, flags);
3660}
3dab13f6 3661
25dbc73a 3662/* Copy the extra info we tack onto an elf_link_hash_entry. */
58111eb7 3663
25dbc73a 3664static void
fcfa13d2 3665ppc_elf_copy_indirect_symbol (struct bfd_link_info *info,
25dbc73a
AM
3666 struct elf_link_hash_entry *dir,
3667 struct elf_link_hash_entry *ind)
3668{
3669 struct ppc_elf_link_hash_entry *edir, *eind;
3dab13f6 3670
25dbc73a
AM
3671 edir = (struct ppc_elf_link_hash_entry *) dir;
3672 eind = (struct ppc_elf_link_hash_entry *) ind;
3dab13f6 3673
c79d6685
AM
3674 edir->tls_mask |= eind->tls_mask;
3675 edir->has_sda_refs |= eind->has_sda_refs;
3676
e81830c5
AM
3677 if (edir->elf.versioned != versioned_hidden)
3678 edir->elf.ref_dynamic |= eind->elf.ref_dynamic;
c79d6685
AM
3679 edir->elf.ref_regular |= eind->elf.ref_regular;
3680 edir->elf.ref_regular_nonweak |= eind->elf.ref_regular_nonweak;
4a7e5234 3681 edir->elf.non_got_ref |= eind->elf.non_got_ref;
c79d6685
AM
3682 edir->elf.needs_plt |= eind->elf.needs_plt;
3683 edir->elf.pointer_equality_needed |= eind->elf.pointer_equality_needed;
3684
287c7eaf
AM
3685 /* If we were called to copy over info for a weak sym, that's all. */
3686 if (eind->elf.root.type != bfd_link_hash_indirect)
3687 return;
3688
25dbc73a
AM
3689 if (eind->dyn_relocs != NULL)
3690 {
3691 if (edir->dyn_relocs != NULL)
3dab13f6 3692 {
6061a67d
AM
3693 struct elf_dyn_relocs **pp;
3694 struct elf_dyn_relocs *p;
3dab13f6 3695
fcfa13d2 3696 /* Add reloc counts against the indirect sym to the direct sym
25dbc73a
AM
3697 list. Merge any entries against the same section. */
3698 for (pp = &eind->dyn_relocs; (p = *pp) != NULL; )
3dab13f6 3699 {
6061a67d 3700 struct elf_dyn_relocs *q;
25dbc73a
AM
3701
3702 for (q = edir->dyn_relocs; q != NULL; q = q->next)
3703 if (q->sec == p->sec)
3704 {
3705 q->pc_count += p->pc_count;
3706 q->count += p->count;
3707 *pp = p->next;
3708 break;
3709 }
3710 if (q == NULL)
3711 pp = &p->next;
3dab13f6 3712 }
25dbc73a 3713 *pp = edir->dyn_relocs;
3dab13f6 3714 }
25dbc73a
AM
3715
3716 edir->dyn_relocs = eind->dyn_relocs;
3717 eind->dyn_relocs = NULL;
3dab13f6 3718 }
3dab13f6 3719
a6aa5195
AM
3720 /* Copy over the GOT refcount entries that we may have already seen to
3721 the symbol which just became indirect. */
fcfa13d2
AM
3722 edir->elf.got.refcount += eind->elf.got.refcount;
3723 eind->elf.got.refcount = 0;
a6aa5195
AM
3724
3725 /* And plt entries. */
3726 if (eind->elf.plt.plist != NULL)
3727 {
3728 if (edir->elf.plt.plist != NULL)
3729 {
3730 struct plt_entry **entp;
3731 struct plt_entry *ent;
3732
3733 for (entp = &eind->elf.plt.plist; (ent = *entp) != NULL; )
3734 {
3735 struct plt_entry *dent;
3736
3737 for (dent = edir->elf.plt.plist; dent != NULL; dent = dent->next)
3738 if (dent->sec == ent->sec && dent->addend == ent->addend)
3739 {
3740 dent->plt.refcount += ent->plt.refcount;
3741 *entp = ent->next;
3742 break;
3743 }
3744 if (dent == NULL)
3745 entp = &ent->next;
3746 }
3747 *entp = edir->elf.plt.plist;
3748 }
3749
3750 edir->elf.plt.plist = eind->elf.plt.plist;
3751 eind->elf.plt.plist = NULL;
3752 }
3753
fcfa13d2 3754 if (eind->elf.dynindx != -1)
25dbc73a 3755 {
fcfa13d2
AM
3756 if (edir->elf.dynindx != -1)
3757 _bfd_elf_strtab_delref (elf_hash_table (info)->dynstr,
3758 edir->elf.dynstr_index);
a6aa5195
AM
3759 edir->elf.dynindx = eind->elf.dynindx;
3760 edir->elf.dynstr_index = eind->elf.dynstr_index;
3761 eind->elf.dynindx = -1;
3762 eind->elf.dynstr_index = 0;
25dbc73a 3763 }
25dbc73a 3764}
3dab13f6 3765
25dbc73a
AM
3766/* Hook called by the linker routine which adds symbols from an object
3767 file. We use it to put .comm items in .sbss, and not .bss. */
58111eb7 3768
25dbc73a
AM
3769static bfd_boolean
3770ppc_elf_add_symbol_hook (bfd *abfd,
3771 struct bfd_link_info *info,
3772 Elf_Internal_Sym *sym,
3773 const char **namep ATTRIBUTE_UNUSED,
3774 flagword *flagsp ATTRIBUTE_UNUSED,
3775 asection **secp,
3776 bfd_vma *valp)
3777{
3778 if (sym->st_shndx == SHN_COMMON
0e1862bb 3779 && !bfd_link_relocatable (info)
0c8d6e5c
AM
3780 && is_ppc_elf (info->output_bfd)
3781 && sym->st_size <= elf_gp_size (abfd))
25dbc73a
AM
3782 {
3783 /* Common symbols less than or equal to -G nn bytes are automatically
3784 put into .sbss. */
3785 struct ppc_elf_link_hash_table *htab;
3dab13f6 3786
25dbc73a
AM
3787 htab = ppc_elf_hash_table (info);
3788 if (htab->sbss == NULL)
3789 {
644285ef 3790 flagword flags = SEC_IS_COMMON | SEC_LINKER_CREATED;
3dab13f6 3791
644285ef
AM
3792 if (!htab->elf.dynobj)
3793 htab->elf.dynobj = abfd;
3794
3496cb2a
L
3795 htab->sbss = bfd_make_section_anyway_with_flags (htab->elf.dynobj,
3796 ".sbss",
3797 flags);
3798 if (htab->sbss == NULL)
25dbc73a 3799 return FALSE;
3dab13f6 3800 }
3dab13f6 3801
25dbc73a
AM
3802 *secp = htab->sbss;
3803 *valp = sym->st_size;
3804 }
3dab13f6 3805
25dbc73a 3806 return TRUE;
3dab13f6
AM
3807}
3808\f
25dbc73a
AM
3809/* Find a linker generated pointer with a given addend and type. */
3810
3811static elf_linker_section_pointers_t *
3812elf_find_pointer_linker_section
3813 (elf_linker_section_pointers_t *linker_pointers,
3814 bfd_vma addend,
3815 elf_linker_section_t *lsect)
252b5132 3816{
25dbc73a
AM
3817 for ( ; linker_pointers != NULL; linker_pointers = linker_pointers->next)
3818 if (lsect == linker_pointers->lsect && addend == linker_pointers->addend)
3819 return linker_pointers;
252b5132 3820
25dbc73a
AM
3821 return NULL;
3822}
3823
3824/* Allocate a pointer to live in a linker created section. */
3825
3826static bfd_boolean
93d1b056
AM
3827elf_allocate_pointer_linker_section (bfd *abfd,
3828 elf_linker_section_t *lsect,
3829 struct elf_link_hash_entry *h,
3830 const Elf_Internal_Rela *rel)
25dbc73a
AM
3831{
3832 elf_linker_section_pointers_t **ptr_linker_section_ptr = NULL;
3833 elf_linker_section_pointers_t *linker_section_ptr;
3834 unsigned long r_symndx = ELF32_R_SYM (rel->r_info);
3835 bfd_size_type amt;
3836
3837 BFD_ASSERT (lsect != NULL);
3838
3839 /* Is this a global symbol? */
3840 if (h != NULL)
3841 {
3842 struct ppc_elf_link_hash_entry *eh;
3843
3844 /* Has this symbol already been allocated? If so, our work is done. */
3845 eh = (struct ppc_elf_link_hash_entry *) h;
3846 if (elf_find_pointer_linker_section (eh->linker_section_pointer,
3847 rel->r_addend,
3848 lsect))
3849 return TRUE;
3850
3851 ptr_linker_section_ptr = &eh->linker_section_pointer;
25dbc73a
AM
3852 }
3853 else
3854 {
0c8d6e5c 3855 BFD_ASSERT (is_ppc_elf (abfd));
0ffa91dd 3856
25dbc73a
AM
3857 /* Allocation of a pointer to a local symbol. */
3858 elf_linker_section_pointers_t **ptr = elf_local_ptr_offsets (abfd);
3859
3860 /* Allocate a table to hold the local symbols if first time. */
3861 if (!ptr)
3862 {
0ffa91dd 3863 unsigned int num_symbols = elf_symtab_hdr (abfd).sh_info;
25dbc73a
AM
3864
3865 amt = num_symbols;
3866 amt *= sizeof (elf_linker_section_pointers_t *);
3867 ptr = bfd_zalloc (abfd, amt);
3868
3869 if (!ptr)
3870 return FALSE;
3871
3872 elf_local_ptr_offsets (abfd) = ptr;
3873 }
3874
3875 /* Has this symbol already been allocated? If so, our work is done. */
3876 if (elf_find_pointer_linker_section (ptr[r_symndx],
3877 rel->r_addend,
3878 lsect))
3879 return TRUE;
252b5132 3880
25dbc73a 3881 ptr_linker_section_ptr = &ptr[r_symndx];
25dbc73a 3882 }
41fcb14e 3883
25dbc73a
AM
3884 /* Allocate space for a pointer in the linker section, and allocate
3885 a new pointer record from internal memory. */
3886 BFD_ASSERT (ptr_linker_section_ptr != NULL);
3887 amt = sizeof (elf_linker_section_pointers_t);
3888 linker_section_ptr = bfd_alloc (abfd, amt);
41fcb14e 3889
25dbc73a 3890 if (!linker_section_ptr)
7619e7c7 3891 return FALSE;
41fcb14e 3892
25dbc73a
AM
3893 linker_section_ptr->next = *ptr_linker_section_ptr;
3894 linker_section_ptr->addend = rel->r_addend;
3895 linker_section_ptr->lsect = lsect;
25dbc73a 3896 *ptr_linker_section_ptr = linker_section_ptr;
41fcb14e 3897
93d1b056
AM
3898 if (!bfd_set_section_alignment (lsect->section->owner, lsect->section, 2))
3899 return FALSE;
25dbc73a
AM
3900 linker_section_ptr->offset = lsect->section->size;
3901 lsect->section->size += 4;
7619e7c7 3902
25dbc73a
AM
3903#ifdef DEBUG
3904 fprintf (stderr,
3905 "Create pointer in linker section %s, offset = %ld, section size = %ld\n",
3906 lsect->name, (long) linker_section_ptr->offset,
3907 (long) lsect->section->size);
3908#endif
7619e7c7
AM
3909
3910 return TRUE;
41fcb14e
AM
3911}
3912
e054468f 3913static struct plt_entry **
25dbc73a
AM
3914update_local_sym_info (bfd *abfd,
3915 Elf_Internal_Shdr *symtab_hdr,
3916 unsigned long r_symndx,
3917 int tls_type)
252b5132 3918{
25dbc73a 3919 bfd_signed_vma *local_got_refcounts = elf_local_got_refcounts (abfd);
e054468f 3920 struct plt_entry **local_plt;
bac3c8c5 3921 unsigned char *local_got_tls_masks;
252b5132 3922
25dbc73a 3923 if (local_got_refcounts == NULL)
252b5132 3924 {
25dbc73a
AM
3925 bfd_size_type size = symtab_hdr->sh_info;
3926
e054468f
AM
3927 size *= (sizeof (*local_got_refcounts)
3928 + sizeof (*local_plt)
3929 + sizeof (*local_got_tls_masks));
25dbc73a
AM
3930 local_got_refcounts = bfd_zalloc (abfd, size);
3931 if (local_got_refcounts == NULL)
e054468f 3932 return NULL;
25dbc73a 3933 elf_local_got_refcounts (abfd) = local_got_refcounts;
252b5132 3934 }
41fcb14e 3935
e054468f 3936 local_plt = (struct plt_entry **) (local_got_refcounts + symtab_hdr->sh_info);
bac3c8c5 3937 local_got_tls_masks = (unsigned char *) (local_plt + symtab_hdr->sh_info);
37da22e5
AM
3938 local_got_tls_masks[r_symndx] |= tls_type & 0xff;
3939 if ((tls_type & NON_GOT) == 0)
e054468f
AM
3940 local_got_refcounts[r_symndx] += 1;
3941 return local_plt + r_symndx;
25dbc73a 3942}
41fcb14e 3943
a6aa5195 3944static bfd_boolean
3ec01793 3945update_plt_info (bfd *abfd, struct plt_entry **plist,
a6aa5195
AM
3946 asection *sec, bfd_vma addend)
3947{
3948 struct plt_entry *ent;
3949
32af9f6e
AM
3950 if (addend < 32768)
3951 sec = NULL;
3ec01793 3952 for (ent = *plist; ent != NULL; ent = ent->next)
a6aa5195
AM
3953 if (ent->sec == sec && ent->addend == addend)
3954 break;
3955 if (ent == NULL)
3956 {
3957 bfd_size_type amt = sizeof (*ent);
3958 ent = bfd_alloc (abfd, amt);
3959 if (ent == NULL)
3960 return FALSE;
3ec01793 3961 ent->next = *plist;
a6aa5195
AM
3962 ent->sec = sec;
3963 ent->addend = addend;
3964 ent->plt.refcount = 0;
3ec01793 3965 *plist = ent;
a6aa5195
AM
3966 }
3967 ent->plt.refcount += 1;
3968 return TRUE;
3969}
3970
3971static struct plt_entry *
3ec01793 3972find_plt_ent (struct plt_entry **plist, asection *sec, bfd_vma addend)
a6aa5195
AM
3973{
3974 struct plt_entry *ent;
3975
3976 if (addend < 32768)
3977 sec = NULL;
3ec01793 3978 for (ent = *plist; ent != NULL; ent = ent->next)
a6aa5195
AM
3979 if (ent->sec == sec && ent->addend == addend)
3980 break;
3981 return ent;
3982}
3983
e054468f
AM
3984static bfd_boolean
3985is_branch_reloc (enum elf_ppc_reloc_type r_type)
3986{
3987 return (r_type == R_PPC_PLTREL24
3988 || r_type == R_PPC_LOCAL24PC
3989 || r_type == R_PPC_REL24
3990 || r_type == R_PPC_REL14
3991 || r_type == R_PPC_REL14_BRTAKEN
3992 || r_type == R_PPC_REL14_BRNTAKEN
3993 || r_type == R_PPC_ADDR24
3994 || r_type == R_PPC_ADDR14
3995 || r_type == R_PPC_ADDR14_BRTAKEN
dfdaec14
AJ
3996 || r_type == R_PPC_ADDR14_BRNTAKEN
3997 || r_type == R_PPC_VLE_REL24);
e054468f
AM
3998}
3999
23cedd1d
AM
4000/* Relocs on inline plt call sequence insns prior to the call. */
4001
4002static bfd_boolean
4003is_plt_seq_reloc (enum elf_ppc_reloc_type r_type)
4004{
4005 return (r_type == R_PPC_PLT16_HA
4006 || r_type == R_PPC_PLT16_HI
4007 || r_type == R_PPC_PLT16_LO
4008 || r_type == R_PPC_PLTSEQ);
4009}
4010
25dbc73a
AM
4011static void
4012bad_shared_reloc (bfd *abfd, enum elf_ppc_reloc_type r_type)
4013{
4eca0228 4014 _bfd_error_handler
695344c0 4015 /* xgettext:c-format */
871b3ab2 4016 (_("%pB: relocation %s cannot be used when making a shared object"),
25dbc73a
AM
4017 abfd,
4018 ppc_elf_howto_table[r_type]->name);
4019 bfd_set_error (bfd_error_bad_value);
252b5132
RH
4020}
4021
25dbc73a
AM
4022/* Look through the relocs for a section during the first phase, and
4023 allocate space in the global offset table or procedure linkage
4024 table. */
252b5132 4025
b34976b6 4026static bfd_boolean
25dbc73a
AM
4027ppc_elf_check_relocs (bfd *abfd,
4028 struct bfd_link_info *info,
4029 asection *sec,
4030 const Elf_Internal_Rela *relocs)
252b5132 4031{
7619e7c7 4032 struct ppc_elf_link_hash_table *htab;
25dbc73a
AM
4033 Elf_Internal_Shdr *symtab_hdr;
4034 struct elf_link_hash_entry **sym_hashes;
4035 const Elf_Internal_Rela *rel;
4036 const Elf_Internal_Rela *rel_end;
a6aa5195 4037 asection *got2, *sreloc;
727fc41e 4038 struct elf_link_hash_entry *tga;
25dbc73a 4039
0e1862bb 4040 if (bfd_link_relocatable (info))
25dbc73a 4041 return TRUE;
252b5132 4042
c87b5a93
AM
4043 /* Don't do anything special with non-loaded, non-alloced sections.
4044 In particular, any relocs in such sections should not affect GOT
4045 and PLT reference counting (ie. we don't allow them to create GOT
4046 or PLT entries), there's no possibility or desire to optimize TLS
4047 relocs, and there's not much point in propagating relocs to shared
4048 libs that the dynamic linker won't relocate. */
4049 if ((sec->flags & SEC_ALLOC) == 0)
4050 return TRUE;
4051
252b5132 4052#ifdef DEBUG
871b3ab2 4053 _bfd_error_handler ("ppc_elf_check_relocs called for section %pA in %pB",
25dbc73a 4054 sec, abfd);
252b5132
RH
4055#endif
4056
0c8d6e5c 4057 BFD_ASSERT (is_ppc_elf (abfd));
0ffa91dd 4058
25dbc73a
AM
4059 /* Initialize howto table if not already done. */
4060 if (!ppc_elf_howto_table[R_PPC_ADDR32])
4061 ppc_elf_howto_init ();
4062
7619e7c7 4063 htab = ppc_elf_hash_table (info);
25f23106
AM
4064 if (htab->glink == NULL)
4065 {
4066 if (htab->elf.dynobj == NULL)
4067 htab->elf.dynobj = abfd;
4068 if (!ppc_elf_create_glink (htab->elf.dynobj, info))
4069 return FALSE;
4070 }
727fc41e
AM
4071 tga = elf_link_hash_lookup (&htab->elf, "__tls_get_addr",
4072 FALSE, FALSE, TRUE);
0ffa91dd 4073 symtab_hdr = &elf_symtab_hdr (abfd);
25dbc73a 4074 sym_hashes = elf_sym_hashes (abfd);
a6aa5195 4075 got2 = bfd_get_section_by_name (abfd, ".got2");
25dbc73a
AM
4076 sreloc = NULL;
4077
4078 rel_end = relocs + sec->reloc_count;
4079 for (rel = relocs; rel < rel_end; rel++)
4080 {
4081 unsigned long r_symndx;
4082 enum elf_ppc_reloc_type r_type;
4083 struct elf_link_hash_entry *h;
727fc41e 4084 int tls_type;
cbf95972 4085 struct plt_entry **ifunc;
2d7ad24e
AM
4086 struct plt_entry **pltent;
4087 bfd_vma addend;
25dbc73a
AM
4088
4089 r_symndx = ELF32_R_SYM (rel->r_info);
4090 if (r_symndx < symtab_hdr->sh_info)
4091 h = NULL;
4092 else
973a3492
L
4093 {
4094 h = sym_hashes[r_symndx - symtab_hdr->sh_info];
4095 while (h->root.type == bfd_link_hash_indirect
4096 || h->root.type == bfd_link_hash_warning)
4097 h = (struct elf_link_hash_entry *) h->root.u.i.link;
4098 }
25dbc73a
AM
4099
4100 /* If a relocation refers to _GLOBAL_OFFSET_TABLE_, create the .got.
4101 This shows up in particular in an R_PPC_ADDR32 in the eabi
4102 startup code. */
3b36f7e6 4103 if (h != NULL
ce558b89 4104 && htab->elf.sgot == NULL
3b36f7e6 4105 && strcmp (h->root.root.string, "_GLOBAL_OFFSET_TABLE_") == 0)
252b5132 4106 {
3b36f7e6
AM
4107 if (htab->elf.dynobj == NULL)
4108 htab->elf.dynobj = abfd;
4109 if (!ppc_elf_create_got (htab->elf.dynobj, info))
4110 return FALSE;
4111 BFD_ASSERT (h == htab->elf.hgot);
25dbc73a 4112 }
252b5132 4113
727fc41e 4114 tls_type = 0;
de972ffa 4115 r_type = ELF32_R_TYPE (rel->r_info);
cbf95972 4116 ifunc = NULL;
06a162cf 4117 if (h == NULL && !htab->is_vxworks)
e054468f 4118 {
06a162cf
AM
4119 Elf_Internal_Sym *isym = bfd_sym_from_r_symndx (&htab->sym_cache,
4120 abfd, r_symndx);
4121 if (isym == NULL)
4122 return FALSE;
4123
0bed072f 4124 if (ELF_ST_TYPE (isym->st_info) == STT_GNU_IFUNC)
e054468f 4125 {
0bed072f 4126 /* Set PLT_IFUNC flag for this sym, no GOT entry yet. */
06a162cf 4127 ifunc = update_local_sym_info (abfd, symtab_hdr, r_symndx,
37da22e5 4128 NON_GOT | PLT_IFUNC);
06a162cf 4129 if (ifunc == NULL)
e054468f
AM
4130 return FALSE;
4131
06a162cf
AM
4132 /* STT_GNU_IFUNC symbols must have a PLT entry;
4133 In a non-pie executable even when there are
4134 no plt calls. */
0e1862bb 4135 if (!bfd_link_pic (info)
08be3224
AM
4136 || is_branch_reloc (r_type)
4137 || r_type == R_PPC_PLT16_LO
4138 || r_type == R_PPC_PLT16_HI
4139 || r_type == R_PPC_PLT16_HA)
e054468f 4140 {
2d7ad24e 4141 addend = 0;
0bed072f 4142 if (r_type == R_PPC_PLTREL24)
08be3224
AM
4143 ppc_elf_tdata (abfd)->makes_plt_call = 1;
4144 if (bfd_link_pic (info)
4145 && (r_type == R_PPC_PLTREL24
4146 || r_type == R_PPC_PLT16_LO
4147 || r_type == R_PPC_PLT16_HI
4148 || r_type == R_PPC_PLT16_HA))
4149 addend = rel->r_addend;
0bed072f
AM
4150 if (!update_plt_info (abfd, ifunc, got2, addend))
4151 return FALSE;
e054468f
AM
4152 }
4153 }
25f23106
AM
4154 }
4155
de972ffa
AM
4156 if (!htab->is_vxworks
4157 && is_branch_reloc (r_type)
4158 && h != NULL
4159 && h == tga)
25f23106 4160 {
de972ffa
AM
4161 if (rel != relocs
4162 && (ELF32_R_TYPE (rel[-1].r_info) == R_PPC_TLSGD
4163 || ELF32_R_TYPE (rel[-1].r_info) == R_PPC_TLSLD))
4164 /* We have a new-style __tls_get_addr call with a marker
4165 reloc. */
4166 ;
4167 else
4168 /* Mark this section as having an old-style call. */
4169 sec->has_tls_get_addr_call = 1;
e054468f 4170 }
727fc41e 4171
25dbc73a
AM
4172 switch (r_type)
4173 {
727fc41e
AM
4174 case R_PPC_TLSGD:
4175 case R_PPC_TLSLD:
4176 /* These special tls relocs tie a call to __tls_get_addr with
4177 its parameter symbol. */
37da22e5
AM
4178 if (h != NULL)
4179 ppc_elf_hash_entry (h)->tls_mask |= TLS_TLS | TLS_MARK;
4180 else
4181 if (!update_local_sym_info (abfd, symtab_hdr, r_symndx,
4182 NON_GOT | TLS_TLS | TLS_MARK))
4183 return FALSE;
727fc41e
AM
4184 break;
4185
23cedd1d
AM
4186 case R_PPC_PLTSEQ:
4187 break;
4188
25dbc73a
AM
4189 case R_PPC_GOT_TLSLD16:
4190 case R_PPC_GOT_TLSLD16_LO:
4191 case R_PPC_GOT_TLSLD16_HI:
4192 case R_PPC_GOT_TLSLD16_HA:
25dbc73a
AM
4193 tls_type = TLS_TLS | TLS_LD;
4194 goto dogottls;
252b5132 4195
25dbc73a
AM
4196 case R_PPC_GOT_TLSGD16:
4197 case R_PPC_GOT_TLSGD16_LO:
4198 case R_PPC_GOT_TLSGD16_HI:
4199 case R_PPC_GOT_TLSGD16_HA:
4200 tls_type = TLS_TLS | TLS_GD;
4201 goto dogottls;
4202
4203 case R_PPC_GOT_TPREL16:
4204 case R_PPC_GOT_TPREL16_LO:
4205 case R_PPC_GOT_TPREL16_HI:
4206 case R_PPC_GOT_TPREL16_HA:
7c8bbca5 4207 if (bfd_link_dll (info))
25dbc73a
AM
4208 info->flags |= DF_STATIC_TLS;
4209 tls_type = TLS_TLS | TLS_TPREL;
4210 goto dogottls;
4211
4212 case R_PPC_GOT_DTPREL16:
4213 case R_PPC_GOT_DTPREL16_LO:
4214 case R_PPC_GOT_DTPREL16_HI:
4215 case R_PPC_GOT_DTPREL16_HA:
4216 tls_type = TLS_TLS | TLS_DTPREL;
4217 dogottls:
4218 sec->has_tls_reloc = 1;
1a0670f3 4219 /* Fall through. */
252b5132 4220
25dbc73a
AM
4221 /* GOT16 relocations */
4222 case R_PPC_GOT16:
4223 case R_PPC_GOT16_LO:
4224 case R_PPC_GOT16_HI:
4225 case R_PPC_GOT16_HA:
4226 /* This symbol requires a global offset table entry. */
ce558b89 4227 if (htab->elf.sgot == NULL)
25dbc73a
AM
4228 {
4229 if (htab->elf.dynobj == NULL)
4230 htab->elf.dynobj = abfd;
4231 if (!ppc_elf_create_got (htab->elf.dynobj, info))
4232 return FALSE;
4233 }
4234 if (h != NULL)
4235 {
4236 h->got.refcount += 1;
4237 ppc_elf_hash_entry (h)->tls_mask |= tls_type;
4238 }
4239 else
4240 /* This is a global offset table entry for a local symbol. */
4241 if (!update_local_sym_info (abfd, symtab_hdr, r_symndx, tls_type))
4242 return FALSE;
91e21fb7
AM
4243
4244 /* We may also need a plt entry if the symbol turns out to be
4245 an ifunc. */
0e1862bb 4246 if (h != NULL && !bfd_link_pic (info))
91e21fb7
AM
4247 {
4248 if (!update_plt_info (abfd, &h->plt.plist, NULL, 0))
4249 return FALSE;
4250 }
25dbc73a 4251 break;
252b5132 4252
25dbc73a
AM
4253 /* Indirect .sdata relocation. */
4254 case R_PPC_EMB_SDAI16:
0e1862bb 4255 if (bfd_link_pic (info))
25dbc73a
AM
4256 {
4257 bad_shared_reloc (abfd, r_type);
4258 return FALSE;
4259 }
93d1b056
AM
4260 htab->sdata[0].sym->ref_regular = 1;
4261 if (!elf_allocate_pointer_linker_section (abfd, &htab->sdata[0],
4262 h, rel))
25dbc73a 4263 return FALSE;
046183de
AM
4264 if (h != NULL)
4265 {
4266 ppc_elf_hash_entry (h)->has_sda_refs = TRUE;
4267 h->non_got_ref = TRUE;
4268 }
25dbc73a 4269 break;
252b5132 4270
25dbc73a
AM
4271 /* Indirect .sdata2 relocation. */
4272 case R_PPC_EMB_SDA2I16:
0e1862bb 4273 if (bfd_link_pic (info))
25dbc73a
AM
4274 {
4275 bad_shared_reloc (abfd, r_type);
4276 return FALSE;
4277 }
93d1b056
AM
4278 htab->sdata[1].sym->ref_regular = 1;
4279 if (!elf_allocate_pointer_linker_section (abfd, &htab->sdata[1],
4280 h, rel))
25dbc73a 4281 return FALSE;
046183de
AM
4282 if (h != NULL)
4283 {
4284 ppc_elf_hash_entry (h)->has_sda_refs = TRUE;
4285 h->non_got_ref = TRUE;
4286 }
25dbc73a 4287 break;
252b5132 4288
93d1b056
AM
4289 case R_PPC_SDAREL16:
4290 htab->sdata[0].sym->ref_regular = 1;
1a0670f3 4291 /* Fall through. */
93d1b056 4292
b9c361e0
JL
4293 case R_PPC_VLE_SDAREL_LO16A:
4294 case R_PPC_VLE_SDAREL_LO16D:
4295 case R_PPC_VLE_SDAREL_HI16A:
4296 case R_PPC_VLE_SDAREL_HI16D:
4297 case R_PPC_VLE_SDAREL_HA16A:
4298 case R_PPC_VLE_SDAREL_HA16D:
046183de
AM
4299 if (h != NULL)
4300 {
4301 ppc_elf_hash_entry (h)->has_sda_refs = TRUE;
4302 h->non_got_ref = TRUE;
4303 }
4304 break;
4305
b9c361e0
JL
4306 case R_PPC_VLE_REL8:
4307 case R_PPC_VLE_REL15:
4308 case R_PPC_VLE_REL24:
4309 case R_PPC_VLE_LO16A:
4310 case R_PPC_VLE_LO16D:
4311 case R_PPC_VLE_HI16A:
4312 case R_PPC_VLE_HI16D:
4313 case R_PPC_VLE_HA16A:
4314 case R_PPC_VLE_HA16D:
83eef883 4315 case R_PPC_VLE_ADDR20:
b9c361e0
JL
4316 break;
4317
25dbc73a 4318 case R_PPC_EMB_SDA2REL:
0e1862bb 4319 if (bfd_link_pic (info))
046183de
AM
4320 {
4321 bad_shared_reloc (abfd, r_type);
4322 return FALSE;
4323 }
93d1b056 4324 htab->sdata[1].sym->ref_regular = 1;
046183de
AM
4325 if (h != NULL)
4326 {
4327 ppc_elf_hash_entry (h)->has_sda_refs = TRUE;
4328 h->non_got_ref = TRUE;
4329 }
4330 break;
4331
b9c361e0
JL
4332 case R_PPC_VLE_SDA21_LO:
4333 case R_PPC_VLE_SDA21:
25dbc73a
AM
4334 case R_PPC_EMB_SDA21:
4335 case R_PPC_EMB_RELSDA:
0e1862bb 4336 if (bfd_link_pic (info))
046183de
AM
4337 {
4338 bad_shared_reloc (abfd, r_type);
4339 return FALSE;
4340 }
046183de
AM
4341 if (h != NULL)
4342 {
4343 ppc_elf_hash_entry (h)->has_sda_refs = TRUE;
4344 h->non_got_ref = TRUE;
4345 }
4346 break;
4347
25dbc73a
AM
4348 case R_PPC_EMB_NADDR32:
4349 case R_PPC_EMB_NADDR16:
4350 case R_PPC_EMB_NADDR16_LO:
4351 case R_PPC_EMB_NADDR16_HI:
4352 case R_PPC_EMB_NADDR16_HA:
0e1862bb 4353 if (bfd_link_pic (info))
25dbc73a
AM
4354 {
4355 bad_shared_reloc (abfd, r_type);
4356 return FALSE;
4357 }
4dc4a9a5 4358 if (h != NULL)
046183de 4359 h->non_got_ref = TRUE;
25dbc73a 4360 break;
252b5132 4361
25dbc73a 4362 case R_PPC_PLTREL24:
de972ffa 4363 if (h == NULL)
6d78d0b9 4364 break;
08be3224 4365 ppc_elf_tdata (abfd)->makes_plt_call = 1;
3e04d765 4366 goto pltentry;
08be3224 4367
23cedd1d 4368 case R_PPC_PLTCALL:
3e04d765
AM
4369 sec->has_pltcall = 1;
4370 /* Fall through. */
4371
6d78d0b9 4372 case R_PPC_PLT32:
25dbc73a
AM
4373 case R_PPC_PLTREL32:
4374 case R_PPC_PLT16_LO:
4375 case R_PPC_PLT16_HI:
4376 case R_PPC_PLT16_HA:
3e04d765 4377 pltentry:
25dbc73a
AM
4378#ifdef DEBUG
4379 fprintf (stderr, "Reloc requires a PLT entry\n");
4380#endif
cbf95972 4381 /* This symbol requires a procedure linkage table entry. */
25dbc73a
AM
4382 if (h == NULL)
4383 {
2d7ad24e
AM
4384 pltent = update_local_sym_info (abfd, symtab_hdr, r_symndx,
4385 NON_GOT | PLT_KEEP);
4386 if (pltent == NULL)
4387 return FALSE;
25dbc73a 4388 }
a6aa5195
AM
4389 else
4390 {
2d7ad24e
AM
4391 if (r_type != R_PPC_PLTREL24)
4392 ppc_elf_hash_entry (h)->tls_mask |= PLT_KEEP;
a6aa5195 4393 h->needs_plt = 1;
2d7ad24e 4394 pltent = &h->plt.plist;
a6aa5195 4395 }
2d7ad24e
AM
4396 addend = 0;
4397 if (bfd_link_pic (info)
4398 && (r_type == R_PPC_PLTREL24
4399 || r_type == R_PPC_PLT16_LO
4400 || r_type == R_PPC_PLT16_HI
4401 || r_type == R_PPC_PLT16_HA))
4402 addend = rel->r_addend;
4403 if (!update_plt_info (abfd, pltent, got2, addend))
4404 return FALSE;
25dbc73a 4405 break;
ee05f2fe 4406
25dbc73a
AM
4407 /* The following relocations don't need to propagate the
4408 relocation if linking a shared object since they are
4409 section relative. */
4410 case R_PPC_SECTOFF:
4411 case R_PPC_SECTOFF_LO:
4412 case R_PPC_SECTOFF_HI:
4413 case R_PPC_SECTOFF_HA:
4414 case R_PPC_DTPREL16:
4415 case R_PPC_DTPREL16_LO:
4416 case R_PPC_DTPREL16_HI:
4417 case R_PPC_DTPREL16_HA:
4418 case R_PPC_TOC16:
4419 break;
252b5132 4420
d7128ce4
AM
4421 case R_PPC_REL16:
4422 case R_PPC_REL16_LO:
4423 case R_PPC_REL16_HI:
4424 case R_PPC_REL16_HA:
a680de9a 4425 case R_PPC_REL16DX_HA:
016687f8 4426 ppc_elf_tdata (abfd)->has_rel16 = 1;
d7128ce4
AM
4427 break;
4428
a6aa5195 4429 /* These are just markers. */
25dbc73a
AM
4430 case R_PPC_TLS:
4431 case R_PPC_EMB_MRKREF:
4432 case R_PPC_NONE:
4433 case R_PPC_max:
32af9f6e
AM
4434 case R_PPC_RELAX:
4435 case R_PPC_RELAX_PLT:
4436 case R_PPC_RELAX_PLTREL24:
7ba71655 4437 case R_PPC_16DX_HA:
25dbc73a 4438 break;
252b5132 4439
25dbc73a
AM
4440 /* These should only appear in dynamic objects. */
4441 case R_PPC_COPY:
4442 case R_PPC_GLOB_DAT:
4443 case R_PPC_JMP_SLOT:
4444 case R_PPC_RELATIVE:
e054468f 4445 case R_PPC_IRELATIVE:
25dbc73a 4446 break;
252b5132 4447
25dbc73a
AM
4448 /* These aren't handled yet. We'll report an error later. */
4449 case R_PPC_ADDR30:
4450 case R_PPC_EMB_RELSEC16:
4451 case R_PPC_EMB_RELST_LO:
4452 case R_PPC_EMB_RELST_HI:
4453 case R_PPC_EMB_RELST_HA:
4454 case R_PPC_EMB_BIT_FLD:
4455 break;
252b5132 4456
25dbc73a
AM
4457 /* This refers only to functions defined in the shared library. */
4458 case R_PPC_LOCAL24PC:
727fc41e 4459 if (h != NULL && h == htab->elf.hgot && htab->plt_type == PLT_UNSET)
016687f8
AM
4460 {
4461 htab->plt_type = PLT_OLD;
4462 htab->old_bfd = abfd;
4463 }
c7e17e05
AM
4464 if (h != NULL && h->type == STT_GNU_IFUNC)
4465 {
c7e17e05
AM
4466 h->needs_plt = 1;
4467 if (!update_plt_info (abfd, &h->plt.plist, NULL, 0))
4468 return FALSE;
4469 }
25dbc73a 4470 break;
252b5132 4471
25dbc73a
AM
4472 /* This relocation describes the C++ object vtable hierarchy.
4473 Reconstruct it for later use during GC. */
4474 case R_PPC_GNU_VTINHERIT:
4475 if (!bfd_elf_gc_record_vtinherit (abfd, sec, h, rel->r_offset))
4476 return FALSE;
4477 break;
252b5132 4478
25dbc73a
AM
4479 /* This relocation describes which C++ vtable entries are actually
4480 used. Record for later use during GC. */
4481 case R_PPC_GNU_VTENTRY:
d17e0c6e
JB
4482 BFD_ASSERT (h != NULL);
4483 if (h != NULL
4484 && !bfd_elf_gc_record_vtentry (abfd, sec, h, rel->r_addend))
25dbc73a
AM
4485 return FALSE;
4486 break;
252b5132 4487
7c8bbca5 4488 /* We shouldn't really be seeing TPREL32. */
25dbc73a 4489 case R_PPC_TPREL32:
1d483afe
AM
4490 case R_PPC_TPREL16:
4491 case R_PPC_TPREL16_LO:
4492 case R_PPC_TPREL16_HI:
4493 case R_PPC_TPREL16_HA:
7c8bbca5 4494 if (bfd_link_dll (info))
25dbc73a
AM
4495 info->flags |= DF_STATIC_TLS;
4496 goto dodyn;
252b5132 4497
25dbc73a
AM
4498 /* Nor these. */
4499 case R_PPC_DTPMOD32:
4500 case R_PPC_DTPREL32:
4501 goto dodyn;
252b5132 4502
9edfd1af
AM
4503 case R_PPC_REL32:
4504 if (h == NULL
4505 && got2 != NULL
4506 && (sec->flags & SEC_CODE) != 0
0e1862bb 4507 && bfd_link_pic (info)
4a3dc543 4508 && htab->plt_type == PLT_UNSET)
9edfd1af
AM
4509 {
4510 /* Old -fPIC gcc code has .long LCTOC1-LCFx just before
4511 the start of a function, which assembles to a REL32
4512 reference to .got2. If we detect one of these, then
4513 force the old PLT layout because the linker cannot
4514 reliably deduce the GOT pointer value needed for
4515 PLT call stubs. */
4516 asection *s;
87d72d41 4517 Elf_Internal_Sym *isym;
9edfd1af 4518
87d72d41
AM
4519 isym = bfd_sym_from_r_symndx (&htab->sym_cache,
4520 abfd, r_symndx);
4521 if (isym == NULL)
4522 return FALSE;
4523
4524 s = bfd_section_from_elf_index (abfd, isym->st_shndx);
9edfd1af 4525 if (s == got2)
016687f8
AM
4526 {
4527 htab->plt_type = PLT_OLD;
4528 htab->old_bfd = abfd;
4529 }
9edfd1af 4530 }
7123df0e 4531 if (h == NULL || h == htab->elf.hgot)
fd38b44c 4532 break;
625af618
AM
4533 /* fall through */
4534
4535 case R_PPC_ADDR32:
4536 case R_PPC_ADDR16:
4537 case R_PPC_ADDR16_LO:
4538 case R_PPC_ADDR16_HI:
4539 case R_PPC_ADDR16_HA:
4540 case R_PPC_UADDR32:
4541 case R_PPC_UADDR16:
0e1862bb 4542 if (h != NULL && !bfd_link_pic (info))
625af618
AM
4543 {
4544 /* We may need a plt entry if the symbol turns out to be
4545 a function defined in a dynamic object. */
3ec01793 4546 if (!update_plt_info (abfd, &h->plt.plist, NULL, 0))
625af618
AM
4547 return FALSE;
4548
4549 /* We may need a copy reloc too. */
4550 h->non_got_ref = 1;
4551 h->pointer_equality_needed = 1;
d3e454b9
AM
4552 if (r_type == R_PPC_ADDR16_HA)
4553 ppc_elf_hash_entry (h)->has_addr16_ha = 1;
4554 if (r_type == R_PPC_ADDR16_LO)
4555 ppc_elf_hash_entry (h)->has_addr16_lo = 1;
625af618
AM
4556 }
4557 goto dodyn;
9edfd1af 4558
25dbc73a
AM
4559 case R_PPC_REL24:
4560 case R_PPC_REL14:
4561 case R_PPC_REL14_BRTAKEN:
4562 case R_PPC_REL14_BRNTAKEN:
d7128ce4 4563 if (h == NULL)
25dbc73a 4564 break;
7123df0e 4565 if (h == htab->elf.hgot)
d7128ce4 4566 {
7123df0e 4567 if (htab->plt_type == PLT_UNSET)
016687f8
AM
4568 {
4569 htab->plt_type = PLT_OLD;
4570 htab->old_bfd = abfd;
4571 }
d7128ce4
AM
4572 break;
4573 }
25dbc73a 4574 /* fall through */
ee05f2fe 4575
25dbc73a 4576 case R_PPC_ADDR24:
25dbc73a
AM
4577 case R_PPC_ADDR14:
4578 case R_PPC_ADDR14_BRTAKEN:
4579 case R_PPC_ADDR14_BRNTAKEN:
0e1862bb 4580 if (h != NULL && !bfd_link_pic (info))
25dbc73a
AM
4581 {
4582 /* We may need a plt entry if the symbol turns out to be
4583 a function defined in a dynamic object. */
e054468f 4584 h->needs_plt = 1;
de972ffa 4585 if (!update_plt_info (abfd, &h->plt.plist, NULL, 0))
a6aa5195 4586 return FALSE;
625af618 4587 break;
25dbc73a 4588 }
7619e7c7 4589
25dbc73a
AM
4590 dodyn:
4591 /* If we are creating a shared library, and this is a reloc
4592 against a global symbol, or a non PC relative reloc
4593 against a local symbol, then we need to copy the reloc
4594 into the shared library. However, if we are linking with
4595 -Bsymbolic, we do not need to copy a reloc against a
4596 global symbol which is defined in an object we are
4597 including in the link (i.e., DEF_REGULAR is set). At
4598 this point we have not seen all the input files, so it is
4599 possible that DEF_REGULAR is not set now but will be set
4600 later (it is never cleared). In case of a weak definition,
4601 DEF_REGULAR may be cleared later by a strong definition in
4602 a shared library. We account for that possibility below by
4603 storing information in the dyn_relocs field of the hash
4604 table entry. A similar situation occurs when creating
4605 shared libraries and symbol visibility changes render the
4606 symbol local.
7619e7c7 4607
25dbc73a
AM
4608 If on the other hand, we are creating an executable, we
4609 may need to keep relocations for symbols satisfied by a
4610 dynamic library if we manage to avoid copy relocs for the
4611 symbol. */
0e1862bb 4612 if ((bfd_link_pic (info)
1d483afe 4613 && (must_be_dyn_reloc (info, r_type)
25dbc73a 4614 || (h != NULL
198f1157 4615 && (!SYMBOLIC_BIND (info, h)
25dbc73a
AM
4616 || h->root.type == bfd_link_hash_defweak
4617 || !h->def_regular))))
4618 || (ELIMINATE_COPY_RELOCS
0e1862bb 4619 && !bfd_link_pic (info)
25dbc73a
AM
4620 && h != NULL
4621 && (h->root.type == bfd_link_hash_defweak
de972ffa 4622 || !h->def_regular)))
25dbc73a 4623 {
25dbc73a
AM
4624#ifdef DEBUG
4625 fprintf (stderr,
4626 "ppc_elf_check_relocs needs to "
4627 "create relocation for %s\n",
4628 (h && h->root.root.string
4629 ? h->root.root.string : "<unknown>"));
4630#endif
4631 if (sreloc == NULL)
4632 {
c9a2f333
AM
4633 if (htab->elf.dynobj == NULL)
4634 htab->elf.dynobj = abfd;
83bac4b0
NC
4635
4636 sreloc = _bfd_elf_make_dynamic_reloc_section
4637 (sec, htab->elf.dynobj, 2, abfd, /*rela?*/ TRUE);
4638
25dbc73a 4639 if (sreloc == NULL)
83bac4b0 4640 return FALSE;
25dbc73a 4641 }
7619e7c7 4642
25dbc73a
AM
4643 /* If this is a global symbol, we count the number of
4644 relocations we need for this symbol. */
4645 if (h != NULL)
4646 {
f95f8542
AM
4647 struct elf_dyn_relocs *p;
4648 struct elf_dyn_relocs **rel_head;
4649
91d6fa6a 4650 rel_head = &ppc_elf_hash_entry (h)->dyn_relocs;
f95f8542
AM
4651 p = *rel_head;
4652 if (p == NULL || p->sec != sec)
4653 {
4654 p = bfd_alloc (htab->elf.dynobj, sizeof *p);
4655 if (p == NULL)
4656 return FALSE;
4657 p->next = *rel_head;
4658 *rel_head = p;
4659 p->sec = sec;
4660 p->count = 0;
4661 p->pc_count = 0;
4662 }
4663 p->count += 1;
4664 if (!must_be_dyn_reloc (info, r_type))
4665 p->pc_count += 1;
25dbc73a
AM
4666 }
4667 else
4668 {
4669 /* Track dynamic relocs needed for local syms too.
4670 We really need local syms available to do this
4671 easily. Oh well. */
f95f8542
AM
4672 struct ppc_dyn_relocs *p;
4673 struct ppc_dyn_relocs **rel_head;
4674 bfd_boolean is_ifunc;
25dbc73a 4675 asection *s;
6edfbbad 4676 void *vpp;
87d72d41 4677 Elf_Internal_Sym *isym;
6edfbbad 4678
87d72d41
AM
4679 isym = bfd_sym_from_r_symndx (&htab->sym_cache,
4680 abfd, r_symndx);
4681 if (isym == NULL)
25dbc73a 4682 return FALSE;
7fce784e 4683
87d72d41
AM
4684 s = bfd_section_from_elf_index (abfd, isym->st_shndx);
4685 if (s == NULL)
4686 s = sec;
4687
6edfbbad 4688 vpp = &elf_section_data (s)->local_dynrel;
f95f8542
AM
4689 rel_head = (struct ppc_dyn_relocs **) vpp;
4690 is_ifunc = ELF_ST_TYPE (isym->st_info) == STT_GNU_IFUNC;
4691 p = *rel_head;
4692 if (p != NULL && p->sec == sec && p->ifunc != is_ifunc)
4693 p = p->next;
4694 if (p == NULL || p->sec != sec || p->ifunc != is_ifunc)
4695 {
4696 p = bfd_alloc (htab->elf.dynobj, sizeof *p);
4697 if (p == NULL)
4698 return FALSE;
4699 p->next = *rel_head;
4700 *rel_head = p;
4701 p->sec = sec;
4702 p->ifunc = is_ifunc;
4703 p->count = 0;
4704 }
4705 p->count += 1;
25dbc73a 4706 }
7619e7c7 4707 }
25dbc73a
AM
4708
4709 break;
7619e7c7
AM
4710 }
4711 }
ee05f2fe 4712
25dbc73a
AM
4713 return TRUE;
4714}
4715\f
005d79fd
AM
4716/* Warn for conflicting Tag_GNU_Power_ABI_FP attributes between IBFD
4717 and OBFD, and merge non-conflicting ones. */
4a91d0ba 4718bfd_boolean
50e03d47 4719_bfd_elf_ppc_merge_fp_attributes (bfd *ibfd, struct bfd_link_info *info)
34c8bcba 4720{
50e03d47 4721 bfd *obfd = info->output_bfd;
c6e65352
DJ
4722 obj_attribute *in_attr, *in_attrs;
4723 obj_attribute *out_attr, *out_attrs;
4a91d0ba 4724 bfd_boolean ret = TRUE;
34c8bcba 4725
c6e65352
DJ
4726 in_attrs = elf_known_obj_attributes (ibfd)[OBJ_ATTR_GNU];
4727 out_attrs = elf_known_obj_attributes (obfd)[OBJ_ATTR_GNU];
4728
c6e65352
DJ
4729 in_attr = &in_attrs[Tag_GNU_Power_ABI_FP];
4730 out_attr = &out_attrs[Tag_GNU_Power_ABI_FP];
005d79fd 4731
c6e65352 4732 if (in_attr->i != out_attr->i)
34c8bcba 4733 {
005d79fd
AM
4734 int in_fp = in_attr->i & 3;
4735 int out_fp = out_attr->i & 3;
4a91d0ba 4736 static bfd *last_fp, *last_ld;
005d79fd
AM
4737
4738 if (in_fp == 0)
34c8bcba 4739 ;
005d79fd
AM
4740 else if (out_fp == 0)
4741 {
8d2c8c3d 4742 out_attr->type = ATTR_TYPE_FLAG_INT_VAL;
005d79fd 4743 out_attr->i ^= in_fp;
4a91d0ba 4744 last_fp = ibfd;
005d79fd
AM
4745 }
4746 else if (out_fp != 2 && in_fp == 2)
8d2c8c3d
AM
4747 {
4748 _bfd_error_handler
4749 /* xgettext:c-format */
4a91d0ba
AM
4750 (_("%pB uses hard float, %pB uses soft float"),
4751 last_fp, ibfd);
4752 ret = FALSE;
8d2c8c3d 4753 }
005d79fd 4754 else if (out_fp == 2 && in_fp != 2)
8d2c8c3d
AM
4755 {
4756 _bfd_error_handler
4757 /* xgettext:c-format */
4a91d0ba
AM
4758 (_("%pB uses hard float, %pB uses soft float"),
4759 ibfd, last_fp);
4760 ret = FALSE;
8d2c8c3d 4761 }
005d79fd 4762 else if (out_fp == 1 && in_fp == 3)
8d2c8c3d
AM
4763 {
4764 _bfd_error_handler
4765 /* xgettext:c-format */
4a91d0ba
AM
4766 (_("%pB uses double-precision hard float, "
4767 "%pB uses single-precision hard float"), last_fp, ibfd);
4768 ret = FALSE;
8d2c8c3d 4769 }
005d79fd 4770 else if (out_fp == 3 && in_fp == 1)
8d2c8c3d
AM
4771 {
4772 _bfd_error_handler
4773 /* xgettext:c-format */
4a91d0ba
AM
4774 (_("%pB uses double-precision hard float, "
4775 "%pB uses single-precision hard float"), ibfd, last_fp);
4776 ret = FALSE;
8d2c8c3d 4777 }
005d79fd
AM
4778
4779 in_fp = in_attr->i & 0xc;
4780 out_fp = out_attr->i & 0xc;
4781 if (in_fp == 0)
4782 ;
4783 else if (out_fp == 0)
4784 {
8d2c8c3d 4785 out_attr->type = ATTR_TYPE_FLAG_INT_VAL;
005d79fd 4786 out_attr->i ^= in_fp;
4a91d0ba 4787 last_ld = ibfd;
005d79fd
AM
4788 }
4789 else if (out_fp != 2 * 4 && in_fp == 2 * 4)
8d2c8c3d
AM
4790 {
4791 _bfd_error_handler
4792 /* xgettext:c-format */
4a91d0ba
AM
4793 (_("%pB uses 64-bit long double, "
4794 "%pB uses 128-bit long double"), ibfd, last_ld);
4795 ret = FALSE;
8d2c8c3d 4796 }
005d79fd 4797 else if (in_fp != 2 * 4 && out_fp == 2 * 4)
8d2c8c3d
AM
4798 {
4799 _bfd_error_handler
4800 /* xgettext:c-format */
4a91d0ba
AM
4801 (_("%pB uses 64-bit long double, "
4802 "%pB uses 128-bit long double"), last_ld, ibfd);
4803 ret = FALSE;
8d2c8c3d 4804 }
005d79fd 4805 else if (out_fp == 1 * 4 && in_fp == 3 * 4)
8d2c8c3d
AM
4806 {
4807 _bfd_error_handler
4808 /* xgettext:c-format */
4a91d0ba
AM
4809 (_("%pB uses IBM long double, "
4810 "%pB uses IEEE long double"), last_ld, ibfd);
4811 ret = FALSE;
8d2c8c3d 4812 }
005d79fd 4813 else if (out_fp == 3 * 4 && in_fp == 1 * 4)
8d2c8c3d
AM
4814 {
4815 _bfd_error_handler
4816 /* xgettext:c-format */
4a91d0ba
AM
4817 (_("%pB uses IBM long double, "
4818 "%pB uses IEEE long double"), ibfd, last_ld);
4819 ret = FALSE;
8d2c8c3d 4820 }
c6e65352 4821 }
4a91d0ba
AM
4822
4823 if (!ret)
4824 {
4825 out_attr->type = ATTR_TYPE_FLAG_INT_VAL | ATTR_TYPE_FLAG_ERROR;
4826 bfd_set_error (bfd_error_bad_value);
4827 }
4828 return ret;
005d79fd
AM
4829}
4830
4831/* Merge object attributes from IBFD into OBFD. Warn if
4832 there are conflicting attributes. */
4833static bfd_boolean
50e03d47 4834ppc_elf_merge_obj_attributes (bfd *ibfd, struct bfd_link_info *info)
005d79fd 4835{
50e03d47 4836 bfd *obfd;
005d79fd
AM
4837 obj_attribute *in_attr, *in_attrs;
4838 obj_attribute *out_attr, *out_attrs;
4a91d0ba 4839 bfd_boolean ret;
005d79fd 4840
4a91d0ba
AM
4841 if (!_bfd_elf_ppc_merge_fp_attributes (ibfd, info))
4842 return FALSE;
005d79fd 4843
50e03d47 4844 obfd = info->output_bfd;
005d79fd
AM
4845 in_attrs = elf_known_obj_attributes (ibfd)[OBJ_ATTR_GNU];
4846 out_attrs = elf_known_obj_attributes (obfd)[OBJ_ATTR_GNU];
c6e65352
DJ
4847
4848 /* Check for conflicting Tag_GNU_Power_ABI_Vector attributes and
4849 merge non-conflicting ones. */
4850 in_attr = &in_attrs[Tag_GNU_Power_ABI_Vector];
4851 out_attr = &out_attrs[Tag_GNU_Power_ABI_Vector];
4a91d0ba 4852 ret = TRUE;
c6e65352
DJ
4853 if (in_attr->i != out_attr->i)
4854 {
005d79fd
AM
4855 int in_vec = in_attr->i & 3;
4856 int out_vec = out_attr->i & 3;
4a91d0ba 4857 static bfd *last_vec;
c6e65352 4858
005d79fd
AM
4859 if (in_vec == 0)
4860 ;
4861 else if (out_vec == 0)
c6e65352 4862 {
8d2c8c3d 4863 out_attr->type = ATTR_TYPE_FLAG_INT_VAL;
005d79fd 4864 out_attr->i = in_vec;
4a91d0ba 4865 last_vec = ibfd;
c6e65352 4866 }
c6e65352
DJ
4867 /* For now, allow generic to transition to AltiVec or SPE
4868 without a warning. If GCC marked files with their stack
4869 alignment and used don't-care markings for files which are
4870 not affected by the vector ABI, we could warn about this
4871 case too. */
005d79fd 4872 else if (in_vec == 1)
c6e65352 4873 ;
005d79fd
AM
4874 else if (out_vec == 1)
4875 {
8d2c8c3d 4876 out_attr->type = ATTR_TYPE_FLAG_INT_VAL;
005d79fd 4877 out_attr->i = in_vec;
4a91d0ba 4878 last_vec = ibfd;
005d79fd
AM
4879 }
4880 else if (out_vec < in_vec)
8d2c8c3d
AM
4881 {
4882 _bfd_error_handler
4883 /* xgettext:c-format */
4a91d0ba
AM
4884 (_("%pB uses AltiVec vector ABI, %pB uses SPE vector ABI"),
4885 last_vec, ibfd);
8d2c8c3d 4886 out_attr->type = ATTR_TYPE_FLAG_INT_VAL | ATTR_TYPE_FLAG_ERROR;
4a91d0ba 4887 ret = FALSE;
8d2c8c3d 4888 }
005d79fd 4889 else if (out_vec > in_vec)
8d2c8c3d
AM
4890 {
4891 _bfd_error_handler
4892 /* xgettext:c-format */
4a91d0ba
AM
4893 (_("%pB uses AltiVec vector ABI, %pB uses SPE vector ABI"),
4894 ibfd, last_vec);
8d2c8c3d 4895 out_attr->type = ATTR_TYPE_FLAG_INT_VAL | ATTR_TYPE_FLAG_ERROR;
4a91d0ba 4896 ret = FALSE;
8d2c8c3d 4897 }
34c8bcba
JM
4898 }
4899
f82e0623
NF
4900 /* Check for conflicting Tag_GNU_Power_ABI_Struct_Return attributes
4901 and merge non-conflicting ones. */
4902 in_attr = &in_attrs[Tag_GNU_Power_ABI_Struct_Return];
4903 out_attr = &out_attrs[Tag_GNU_Power_ABI_Struct_Return];
4904 if (in_attr->i != out_attr->i)
4905 {
005d79fd
AM
4906 int in_struct = in_attr->i & 3;
4907 int out_struct = out_attr->i & 3;
4a91d0ba 4908 static bfd *last_struct;
005d79fd
AM
4909
4910 if (in_struct == 0 || in_struct == 3)
f82e0623 4911 ;
005d79fd
AM
4912 else if (out_struct == 0)
4913 {
8d2c8c3d 4914 out_attr->type = ATTR_TYPE_FLAG_INT_VAL;
005d79fd 4915 out_attr->i = in_struct;
4a91d0ba 4916 last_struct = ibfd;
005d79fd
AM
4917 }
4918 else if (out_struct < in_struct)
8d2c8c3d
AM
4919 {
4920 _bfd_error_handler
4921 /* xgettext:c-format */
4a91d0ba
AM
4922 (_("%pB uses r3/r4 for small structure returns, "
4923 "%pB uses memory"), last_struct, ibfd);
8d2c8c3d 4924 out_attr->type = ATTR_TYPE_FLAG_INT_VAL | ATTR_TYPE_FLAG_ERROR;
4a91d0ba 4925 ret = FALSE;
8d2c8c3d 4926 }
005d79fd 4927 else if (out_struct > in_struct)
8d2c8c3d
AM
4928 {
4929 _bfd_error_handler
4930 /* xgettext:c-format */
4a91d0ba
AM
4931 (_("%pB uses r3/r4 for small structure returns, "
4932 "%pB uses memory"), ibfd, last_struct);
8d2c8c3d 4933 out_attr->type = ATTR_TYPE_FLAG_INT_VAL | ATTR_TYPE_FLAG_ERROR;
4a91d0ba 4934 ret = FALSE;
8d2c8c3d 4935 }
f82e0623 4936 }
4a91d0ba
AM
4937 if (!ret)
4938 {
4939 bfd_set_error (bfd_error_bad_value);
4940 return FALSE;
4941 }
f82e0623 4942
34c8bcba 4943 /* Merge Tag_compatibility attributes and any common GNU ones. */
8d2c8c3d 4944 return _bfd_elf_merge_object_attributes (ibfd, info);
34c8bcba
JM
4945}
4946
8853c3d3
AM
4947/* Merge backend specific data from an object file to the output
4948 object file when linking. */
4949
4950static bfd_boolean
50e03d47 4951ppc_elf_merge_private_bfd_data (bfd *ibfd, struct bfd_link_info *info)
8853c3d3 4952{
50e03d47 4953 bfd *obfd = info->output_bfd;
8853c3d3
AM
4954 flagword old_flags;
4955 flagword new_flags;
4956 bfd_boolean error;
4957
0c8d6e5c 4958 if (!is_ppc_elf (ibfd) || !is_ppc_elf (obfd))
8853c3d3
AM
4959 return TRUE;
4960
cc643b88 4961 /* Check if we have the same endianness. */
50e03d47 4962 if (! _bfd_generic_verify_endian_match (ibfd, info))
8853c3d3
AM
4963 return FALSE;
4964
50e03d47 4965 if (!ppc_elf_merge_obj_attributes (ibfd, info))
34c8bcba
JM
4966 return FALSE;
4967
8853c3d3
AM
4968 new_flags = elf_elfheader (ibfd)->e_flags;
4969 old_flags = elf_elfheader (obfd)->e_flags;
4970 if (!elf_flags_init (obfd))
4971 {
4972 /* First call, no flags set. */
4973 elf_flags_init (obfd) = TRUE;
4974 elf_elfheader (obfd)->e_flags = new_flags;
4975 }
4976
4977 /* Compatible flags are ok. */
4978 else if (new_flags == old_flags)
4979 ;
4980
4981 /* Incompatible flags. */
4982 else
4983 {
4984 /* Warn about -mrelocatable mismatch. Allow -mrelocatable-lib
4985 to be linked with either. */
4986 error = FALSE;
4987 if ((new_flags & EF_PPC_RELOCATABLE) != 0
4988 && (old_flags & (EF_PPC_RELOCATABLE | EF_PPC_RELOCATABLE_LIB)) == 0)
4989 {
4990 error = TRUE;
4eca0228 4991 _bfd_error_handler
871b3ab2 4992 (_("%pB: compiled with -mrelocatable and linked with "
8853c3d3
AM
4993 "modules compiled normally"), ibfd);
4994 }
4995 else if ((new_flags & (EF_PPC_RELOCATABLE | EF_PPC_RELOCATABLE_LIB)) == 0
4996 && (old_flags & EF_PPC_RELOCATABLE) != 0)
4997 {
4998 error = TRUE;
4eca0228 4999 _bfd_error_handler
871b3ab2 5000 (_("%pB: compiled normally and linked with "
8853c3d3
AM
5001 "modules compiled with -mrelocatable"), ibfd);
5002 }
5003
5004 /* The output is -mrelocatable-lib iff both the input files are. */
5005 if (! (new_flags & EF_PPC_RELOCATABLE_LIB))
5006 elf_elfheader (obfd)->e_flags &= ~EF_PPC_RELOCATABLE_LIB;
5007
5008 /* The output is -mrelocatable iff it can't be -mrelocatable-lib,
5009 but each input file is either -mrelocatable or -mrelocatable-lib. */
5010 if (! (elf_elfheader (obfd)->e_flags & EF_PPC_RELOCATABLE_LIB)
5011 && (new_flags & (EF_PPC_RELOCATABLE_LIB | EF_PPC_RELOCATABLE))
5012 && (old_flags & (EF_PPC_RELOCATABLE_LIB | EF_PPC_RELOCATABLE)))
5013 elf_elfheader (obfd)->e_flags |= EF_PPC_RELOCATABLE;
5014
5015 /* Do not warn about eabi vs. V.4 mismatch, just or in the bit if
5016 any module uses it. */
5017 elf_elfheader (obfd)->e_flags |= (new_flags & EF_PPC_EMB);
5018
5019 new_flags &= ~(EF_PPC_RELOCATABLE | EF_PPC_RELOCATABLE_LIB | EF_PPC_EMB);
5020 old_flags &= ~(EF_PPC_RELOCATABLE | EF_PPC_RELOCATABLE_LIB | EF_PPC_EMB);
5021
5022 /* Warn about any other mismatches. */
5023 if (new_flags != old_flags)
5024 {
5025 error = TRUE;
4eca0228 5026 _bfd_error_handler
695344c0 5027 /* xgettext:c-format */
871b3ab2 5028 (_("%pB: uses different e_flags (%#x) fields "
cd9af601
AM
5029 "than previous modules (%#x)"),
5030 ibfd, new_flags, old_flags);
8853c3d3
AM
5031 }
5032
5033 if (error)
5034 {
5035 bfd_set_error (bfd_error_bad_value);
5036 return FALSE;
5037 }
5038 }
5039
5040 return TRUE;
5041}
b9c361e0
JL
5042
5043static void
95f0d0d2 5044ppc_elf_vle_split16 (bfd *input_bfd,
08dc996f
AM
5045 asection *input_section,
5046 unsigned long offset,
95f0d0d2 5047 bfd_byte *loc,
86c95733 5048 bfd_vma value,
08dc996f
AM
5049 split16_format_type split16_format,
5050 bfd_boolean fixup)
b9c361e0 5051{
08dc996f 5052 unsigned int insn, opcode, top5;
b9c361e0 5053
95f0d0d2 5054 insn = bfd_get_32 (input_bfd, loc);
673cff9b 5055 opcode = insn & 0xfc00f800;
08dc996f
AM
5056 if (opcode == E_OR2I_INSN
5057 || opcode == E_AND2I_DOT_INSN
5058 || opcode == E_OR2IS_INSN
5059 || opcode == E_LIS_INSN
5060 || opcode == E_AND2IS_DOT_INSN)
5061 {
5062 if (split16_format != split16a_type)
5063 {
5064 if (fixup)
5065 split16_format = split16a_type;
5066 else
5067 _bfd_error_handler
5068 /* xgettext:c-format */
871b3ab2 5069 (_("%pB(%pA+0x%lx): expected 16A style relocation on 0x%08x insn"),
08dc996f
AM
5070 input_bfd, input_section, offset, opcode);
5071 }
5072 }
5073 else if (opcode == E_ADD2I_DOT_INSN
5074 || opcode == E_ADD2IS_INSN
5075 || opcode == E_CMP16I_INSN
5076 || opcode == E_MULL2I_INSN
5077 || opcode == E_CMPL16I_INSN
5078 || opcode == E_CMPH16I_INSN
5079 || opcode == E_CMPHL16I_INSN)
5080 {
5081 if (split16_format != split16d_type)
5082 {
5083 if (fixup)
5084 split16_format = split16d_type;
5085 else
5086 _bfd_error_handler
5087 /* xgettext:c-format */
871b3ab2 5088 (_("%pB(%pA+0x%lx): expected 16D style relocation on 0x%08x insn"),
08dc996f
AM
5089 input_bfd, input_section, offset, opcode);
5090 }
5091 }
86c95733 5092 top5 = value & 0xf800;
5499c7c7
AM
5093 top5 = top5 << (split16_format == split16a_type ? 5 : 10);
5094 insn &= (split16_format == split16a_type ? ~0x1f07ff : ~0x3e007ff);
b9c361e0 5095 insn |= top5;
86c95733 5096 insn |= value & 0x7ff;
95f0d0d2 5097 bfd_put_32 (input_bfd, insn, loc);
b9c361e0 5098}
83eef883
AFB
5099
5100static void
5101ppc_elf_vle_split20 (bfd *output_bfd, bfd_byte *loc, bfd_vma value)
5102{
5103 unsigned int insn;
5104
5105 insn = bfd_get_32 (output_bfd, loc);
5106 /* We have an li20 field, bits 17..20, 11..15, 21..31. */
5107 /* Top 4 bits of value to 17..20. */
5108 insn |= (value & 0xf0000) >> 5;
5109 /* Next 5 bits of the value to 11..15. */
5110 insn |= (value & 0xf800) << 5;
5111 /* And the final 11 bits of the value to bits 21 to 31. */
5112 insn |= value & 0x7ff;
5113 bfd_put_32 (output_bfd, insn, loc);
5114}
5115
8853c3d3 5116\f
d7128ce4
AM
5117/* Choose which PLT scheme to use, and set .plt flags appropriately.
5118 Returns -1 on error, 0 for old PLT, 1 for new PLT. */
5119int
5120ppc_elf_select_plt_layout (bfd *output_bfd ATTRIBUTE_UNUSED,
5446cbdf 5121 struct bfd_link_info *info)
d7128ce4
AM
5122{
5123 struct ppc_elf_link_hash_table *htab;
9d8504b1 5124 flagword flags;
d7128ce4
AM
5125
5126 htab = ppc_elf_hash_table (info);
4a3dc543
RS
5127
5128 if (htab->plt_type == PLT_UNSET)
016687f8 5129 {
b3874e1a
AM
5130 struct elf_link_hash_entry *h;
5131
5446cbdf 5132 if (htab->params->plt_style == PLT_OLD)
016687f8 5133 htab->plt_type = PLT_OLD;
0e1862bb 5134 else if (bfd_link_pic (info)
b3874e1a
AM
5135 && htab->elf.dynamic_sections_created
5136 && (h = elf_link_hash_lookup (&htab->elf, "_mcount",
5137 FALSE, FALSE, TRUE)) != NULL
5138 && (h->type == STT_FUNC
5139 || h->needs_plt)
5140 && h->ref_regular
5141 && !(SYMBOL_CALLS_LOCAL (info, h)
21d68fcd 5142 || UNDEFWEAK_NO_DYNAMIC_RELOC (info, h)))
b3874e1a
AM
5143 {
5144 /* Profiling of shared libs (and pies) is not supported with
5145 secure plt, because ppc32 does profiling before a
5146 function prologue and a secure plt pic call stubs needs
5147 r30 to be set up. */
5148 htab->plt_type = PLT_OLD;
5149 }
016687f8
AM
5150 else
5151 {
5152 bfd *ibfd;
5446cbdf 5153 enum ppc_elf_plt_type plt_type = htab->params->plt_style;
016687f8
AM
5154
5155 /* Look through the reloc flags left by ppc_elf_check_relocs.
5156 Use the old style bss plt if a file makes plt calls
5157 without using the new relocs, and if ld isn't given
5158 --secure-plt and we never see REL16 relocs. */
5159 if (plt_type == PLT_UNSET)
5160 plt_type = PLT_OLD;
c72f2fb2 5161 for (ibfd = info->input_bfds; ibfd; ibfd = ibfd->link.next)
0c8d6e5c 5162 if (is_ppc_elf (ibfd))
016687f8
AM
5163 {
5164 if (ppc_elf_tdata (ibfd)->has_rel16)
5165 plt_type = PLT_NEW;
5166 else if (ppc_elf_tdata (ibfd)->makes_plt_call)
5167 {
5168 plt_type = PLT_OLD;
5169 htab->old_bfd = ibfd;
5170 break;
5171 }
5172 }
5173 htab->plt_type = plt_type;
5174 }
5175 }
5446cbdf 5176 if (htab->plt_type == PLT_OLD && htab->params->plt_style == PLT_NEW)
b3874e1a
AM
5177 {
5178 if (htab->old_bfd != NULL)
cf97bcb0 5179 _bfd_error_handler (_("bss-plt forced due to %pB"), htab->old_bfd);
b3874e1a 5180 else
cf97bcb0 5181 _bfd_error_handler (_("bss-plt forced by profiling"));
b3874e1a 5182 }
d7128ce4 5183
4a3dc543 5184 BFD_ASSERT (htab->plt_type != PLT_VXWORKS);
9d8504b1 5185
4a3dc543 5186 if (htab->plt_type == PLT_NEW)
9d8504b1
PB
5187 {
5188 flags = (SEC_ALLOC | SEC_LOAD | SEC_HAS_CONTENTS
5189 | SEC_IN_MEMORY | SEC_LINKER_CREATED);
86b9da88
AM
5190
5191 /* The new PLT is a loaded section. */
ce558b89
AM
5192 if (htab->elf.splt != NULL
5193 && !bfd_set_section_flags (htab->elf.dynobj, htab->elf.splt, flags))
86b9da88
AM
5194 return -1;
5195
5196 /* The new GOT is not executable. */
ce558b89
AM
5197 if (htab->elf.sgot != NULL
5198 && !bfd_set_section_flags (htab->elf.dynobj, htab->elf.sgot, flags))
86b9da88 5199 return -1;
d7128ce4
AM
5200 }
5201 else
5202 {
5203 /* Stop an unused .glink section from affecting .text alignment. */
86b9da88
AM
5204 if (htab->glink != NULL
5205 && !bfd_set_section_alignment (htab->elf.dynobj, htab->glink, 0))
5206 return -1;
d7128ce4 5207 }
4a3dc543 5208 return htab->plt_type == PLT_NEW;
d7128ce4
AM
5209}
5210\f
25dbc73a
AM
5211/* Return the section that should be marked against GC for a given
5212 relocation. */
586119b3 5213
25dbc73a
AM
5214static asection *
5215ppc_elf_gc_mark_hook (asection *sec,
07adf181 5216 struct bfd_link_info *info,
25dbc73a
AM
5217 Elf_Internal_Rela *rel,
5218 struct elf_link_hash_entry *h,
5219 Elf_Internal_Sym *sym)
5220{
5221 if (h != NULL)
07adf181
AM
5222 switch (ELF32_R_TYPE (rel->r_info))
5223 {
5224 case R_PPC_GNU_VTINHERIT:
5225 case R_PPC_GNU_VTENTRY:
5226 return NULL;
5227 }
5228
5229 return _bfd_elf_gc_mark_hook (sec, info, rel, h, sym);
25dbc73a 5230}
49c09209
AM
5231
5232static bfd_boolean
5233get_sym_h (struct elf_link_hash_entry **hp,
5234 Elf_Internal_Sym **symp,
5235 asection **symsecp,
5236 unsigned char **tls_maskp,
5237 Elf_Internal_Sym **locsymsp,
5238 unsigned long r_symndx,
5239 bfd *ibfd)
5240{
5241 Elf_Internal_Shdr *symtab_hdr = &elf_symtab_hdr (ibfd);
5242
5243 if (r_symndx >= symtab_hdr->sh_info)
5244 {
5245 struct elf_link_hash_entry **sym_hashes = elf_sym_hashes (ibfd);
5246 struct elf_link_hash_entry *h;
5247
5248 h = sym_hashes[r_symndx - symtab_hdr->sh_info];
5249 while (h->root.type == bfd_link_hash_indirect
5250 || h->root.type == bfd_link_hash_warning)
5251 h = (struct elf_link_hash_entry *) h->root.u.i.link;
5252
5253 if (hp != NULL)
5254 *hp = h;
5255
5256 if (symp != NULL)
5257 *symp = NULL;
5258
5259 if (symsecp != NULL)
5260 {
5261 asection *symsec = NULL;
5262 if (h->root.type == bfd_link_hash_defined
5263 || h->root.type == bfd_link_hash_defweak)
5264 symsec = h->root.u.def.section;
5265 *symsecp = symsec;
5266 }
5267
5268 if (tls_maskp != NULL)
5269 *tls_maskp = &ppc_elf_hash_entry (h)->tls_mask;
5270 }
5271 else
5272 {
5273 Elf_Internal_Sym *sym;
5274 Elf_Internal_Sym *locsyms = *locsymsp;
5275
5276 if (locsyms == NULL)
5277 {
5278 locsyms = (Elf_Internal_Sym *) symtab_hdr->contents;
5279 if (locsyms == NULL)
5280 locsyms = bfd_elf_get_elf_syms (ibfd, symtab_hdr,
5281 symtab_hdr->sh_info,
5282 0, NULL, NULL, NULL);
5283 if (locsyms == NULL)
5284 return FALSE;
5285 *locsymsp = locsyms;
5286 }
5287 sym = locsyms + r_symndx;
5288
5289 if (hp != NULL)
5290 *hp = NULL;
5291
5292 if (symp != NULL)
5293 *symp = sym;
5294
5295 if (symsecp != NULL)
5296 *symsecp = bfd_section_from_elf_index (ibfd, sym->st_shndx);
5297
5298 if (tls_maskp != NULL)
5299 {
5300 bfd_signed_vma *local_got;
5301 unsigned char *tls_mask;
5302
5303 tls_mask = NULL;
5304 local_got = elf_local_got_refcounts (ibfd);
5305 if (local_got != NULL)
5306 {
5307 struct plt_entry **local_plt = (struct plt_entry **)
5308 (local_got + symtab_hdr->sh_info);
5309 unsigned char *lgot_masks = (unsigned char *)
5310 (local_plt + symtab_hdr->sh_info);
5311 tls_mask = &lgot_masks[r_symndx];
5312 }
5313 *tls_maskp = tls_mask;
5314 }
5315 }
5316 return TRUE;
5317}
25dbc73a 5318\f
3e04d765
AM
5319/* Analyze inline PLT call relocations to see whether calls to locally
5320 defined functions can be converted to direct calls. */
5321
5322bfd_boolean
5323ppc_elf_inline_plt (struct bfd_link_info *info)
5324{
5325 struct ppc_elf_link_hash_table *htab;
5326 bfd *ibfd;
5327 asection *sec;
5328 bfd_vma low_vma, high_vma, limit;
5329
5330 htab = ppc_elf_hash_table (info);
5331 if (htab == NULL)
5332 return FALSE;
5333
5334 /* A bl insn can reach -0x2000000 to 0x1fffffc. The limit is
5335 reduced somewhat to cater for possible stubs that might be added
5336 between the call and its destination. */
5337 limit = 0x1e00000;
5338 low_vma = -1;
5339 high_vma = 0;
5340 for (sec = info->output_bfd->sections; sec != NULL; sec = sec->next)
5341 if ((sec->flags & (SEC_ALLOC | SEC_CODE)) == (SEC_ALLOC | SEC_CODE))
5342 {
5343 if (low_vma > sec->vma)
5344 low_vma = sec->vma;
5345 if (high_vma < sec->vma + sec->size)
5346 high_vma = sec->vma + sec->size;
5347 }
5348
5349 /* If a "bl" can reach anywhere in local code sections, then we can
5350 convert all inline PLT sequences to direct calls when the symbol
5351 is local. */
5352 if (high_vma - low_vma < limit)
5353 {
5354 htab->can_convert_all_inline_plt = 1;
5355 return TRUE;
5356 }
5357
5358 /* Otherwise, go looking through relocs for cases where a direct
5359 call won't reach. Mark the symbol on any such reloc to disable
5360 the optimization and keep the PLT entry as it seems likely that
5361 this will be better than creating trampolines. Note that this
5362 will disable the optimization for all inline PLT calls to a
5363 particular symbol, not just those that won't reach. The
5364 difficulty in doing a more precise optimization is that the
5365 linker needs to make a decision depending on whether a
5366 particular R_PPC_PLTCALL insn can be turned into a direct
5367 call, for each of the R_PPC_PLTSEQ and R_PPC_PLT16* insns in
5368 the sequence, and there is nothing that ties those relocs
5369 together except their symbol. */
5370
5371 for (ibfd = info->input_bfds; ibfd != NULL; ibfd = ibfd->link.next)
5372 {
5373 Elf_Internal_Shdr *symtab_hdr;
5374 Elf_Internal_Sym *local_syms;
5375
5376 if (!is_ppc_elf (ibfd))
5377 continue;
5378
5379 local_syms = NULL;
5380 symtab_hdr = &elf_symtab_hdr (ibfd);
5381
5382 for (sec = ibfd->sections; sec != NULL; sec = sec->next)
5383 if (sec->has_pltcall
5384 && !bfd_is_abs_section (sec->output_section))
5385 {
5386 Elf_Internal_Rela *relstart, *rel, *relend;
5387
5388 /* Read the relocations. */
5389 relstart = _bfd_elf_link_read_relocs (ibfd, sec, NULL, NULL,
5390 info->keep_memory);
5391 if (relstart == NULL)
5392 return FALSE;
5393
5394 relend = relstart + sec->reloc_count;
5395 for (rel = relstart; rel < relend; )
5396 {
5397 enum elf_ppc_reloc_type r_type;
5398 unsigned long r_symndx;
5399 asection *sym_sec;
5400 struct elf_link_hash_entry *h;
5401 Elf_Internal_Sym *sym;
5402 unsigned char *tls_maskp;
5403
5404 r_type = ELF32_R_TYPE (rel->r_info);
5405 if (r_type != R_PPC_PLTCALL)
5406 continue;
5407
5408 r_symndx = ELF32_R_SYM (rel->r_info);
5409 if (!get_sym_h (&h, &sym, &sym_sec, &tls_maskp, &local_syms,
5410 r_symndx, ibfd))
5411 {
5412 if (elf_section_data (sec)->relocs != relstart)
5413 free (relstart);
5414 if (local_syms != NULL
5415 && symtab_hdr->contents != (unsigned char *) local_syms)
5416 free (local_syms);
5417 return FALSE;
5418 }
5419
5420 if (sym_sec != NULL && sym_sec->output_section != NULL)
5421 {
5422 bfd_vma from, to;
5423 if (h != NULL)
5424 to = h->root.u.def.value;
5425 else
5426 to = sym->st_value;
5427 to += (rel->r_addend
5428 + sym_sec->output_offset
5429 + sym_sec->output_section->vma);
5430 from = (rel->r_offset
5431 + sec->output_offset
5432 + sec->output_section->vma);
5433 if (to - from + limit < 2 * limit)
5434 *tls_maskp &= ~PLT_KEEP;
5435 }
5436 }
5437 if (elf_section_data (sec)->relocs != relstart)
5438 free (relstart);
5439 }
5440
5441 if (local_syms != NULL
5442 && symtab_hdr->contents != (unsigned char *) local_syms)
5443 {
5444 if (!info->keep_memory)
5445 free (local_syms);
5446 else
5447 symtab_hdr->contents = (unsigned char *) local_syms;
5448 }
5449 }
5450
5451 return TRUE;
5452}
5453
3a71aa26
AM
5454/* Set plt output section type, htab->tls_get_addr, and call the
5455 generic ELF tls_setup function. */
7fce784e 5456
25dbc73a 5457asection *
5446cbdf 5458ppc_elf_tls_setup (bfd *obfd, struct bfd_link_info *info)
7fce784e 5459{
25dbc73a 5460 struct ppc_elf_link_hash_table *htab;
7fce784e 5461
25dbc73a 5462 htab = ppc_elf_hash_table (info);
a7f2871e
AM
5463 htab->tls_get_addr = elf_link_hash_lookup (&htab->elf, "__tls_get_addr",
5464 FALSE, FALSE, TRUE);
f01f1741
AM
5465 if (htab->plt_type != PLT_NEW)
5466 htab->params->no_tls_get_addr_opt = TRUE;
5467
5446cbdf 5468 if (!htab->params->no_tls_get_addr_opt)
a7f2871e
AM
5469 {
5470 struct elf_link_hash_entry *opt, *tga;
5471 opt = elf_link_hash_lookup (&htab->elf, "__tls_get_addr_opt",
5472 FALSE, FALSE, TRUE);
5473 if (opt != NULL
5474 && (opt->root.type == bfd_link_hash_defined
5475 || opt->root.type == bfd_link_hash_defweak))
5476 {
5477 /* If glibc supports an optimized __tls_get_addr call stub,
5478 signalled by the presence of __tls_get_addr_opt, and we'll
5479 be calling __tls_get_addr via a plt call stub, then
5480 make __tls_get_addr point to __tls_get_addr_opt. */
5481 tga = htab->tls_get_addr;
5482 if (htab->elf.dynamic_sections_created
5483 && tga != NULL
5484 && (tga->type == STT_FUNC
5485 || tga->needs_plt)
5486 && !(SYMBOL_CALLS_LOCAL (info, tga)
21d68fcd 5487 || UNDEFWEAK_NO_DYNAMIC_RELOC (info, tga)))
a7f2871e
AM
5488 {
5489 struct plt_entry *ent;
32af9f6e
AM
5490 for (ent = tga->plt.plist; ent != NULL; ent = ent->next)
5491 if (ent->plt.refcount > 0)
5492 break;
5493 if (ent != NULL)
a7f2871e
AM
5494 {
5495 tga->root.type = bfd_link_hash_indirect;
5496 tga->root.u.i.link = &opt->root;
5497 ppc_elf_copy_indirect_symbol (info, opt, tga);
b531344c 5498 opt->mark = 1;
a7f2871e
AM
5499 if (opt->dynindx != -1)
5500 {
5501 /* Use __tls_get_addr_opt in dynamic relocations. */
5502 opt->dynindx = -1;
5503 _bfd_elf_strtab_delref (elf_hash_table (info)->dynstr,
5504 opt->dynstr_index);
5505 if (!bfd_elf_link_record_dynamic_symbol (info, opt))
5506 return FALSE;
5507 }
5508 htab->tls_get_addr = opt;
5509 }
5510 }
5511 }
5512 else
5446cbdf 5513 htab->params->no_tls_get_addr_opt = TRUE;
a7f2871e 5514 }
4a3dc543 5515 if (htab->plt_type == PLT_NEW
ce558b89
AM
5516 && htab->elf.splt != NULL
5517 && htab->elf.splt->output_section != NULL)
d7128ce4 5518 {
ce558b89
AM
5519 elf_section_type (htab->elf.splt->output_section) = SHT_PROGBITS;
5520 elf_section_flags (htab->elf.splt->output_section) = SHF_ALLOC + SHF_WRITE;
d7128ce4
AM
5521 }
5522
25dbc73a 5523 return _bfd_elf_tls_setup (obfd, info);
7fce784e
AS
5524}
5525
3a71aa26
AM
5526/* Return TRUE iff REL is a branch reloc with a global symbol matching
5527 HASH. */
5528
5529static bfd_boolean
5530branch_reloc_hash_match (const bfd *ibfd,
5531 const Elf_Internal_Rela *rel,
5532 const struct elf_link_hash_entry *hash)
5533{
5534 Elf_Internal_Shdr *symtab_hdr = &elf_symtab_hdr (ibfd);
5535 enum elf_ppc_reloc_type r_type = ELF32_R_TYPE (rel->r_info);
5536 unsigned int r_symndx = ELF32_R_SYM (rel->r_info);
5537
e054468f 5538 if (r_symndx >= symtab_hdr->sh_info && is_branch_reloc (r_type))
3a71aa26
AM
5539 {
5540 struct elf_link_hash_entry **sym_hashes = elf_sym_hashes (ibfd);
5541 struct elf_link_hash_entry *h;
5542
5543 h = sym_hashes[r_symndx - symtab_hdr->sh_info];
5544 while (h->root.type == bfd_link_hash_indirect
5545 || h->root.type == bfd_link_hash_warning)
5546 h = (struct elf_link_hash_entry *) h->root.u.i.link;
5547 if (h == hash)
5548 return TRUE;
5549 }
5550 return FALSE;
5551}
5552
25dbc73a
AM
5553/* Run through all the TLS relocs looking for optimization
5554 opportunities. */
252b5132 5555
25dbc73a
AM
5556bfd_boolean
5557ppc_elf_tls_optimize (bfd *obfd ATTRIBUTE_UNUSED,
5558 struct bfd_link_info *info)
252b5132 5559{
7fce784e 5560 bfd *ibfd;
25dbc73a
AM
5561 asection *sec;
5562 struct ppc_elf_link_hash_table *htab;
b7fcf6f6 5563 int pass;
252b5132 5564
3cbc1e5e 5565 if (!bfd_link_executable (info))
25dbc73a 5566 return TRUE;
252b5132 5567
7619e7c7 5568 htab = ppc_elf_hash_table (info);
663a1470
AM
5569 if (htab == NULL)
5570 return FALSE;
5571
b7fcf6f6
AM
5572 /* Make two passes through the relocs. First time check that tls
5573 relocs involved in setting up a tls_get_addr call are indeed
663a1470
AM
5574 followed by such a call. If they are not, don't do any tls
5575 optimization. On the second pass twiddle tls_mask flags to
5576 notify relocate_section that optimization can be done, and
5577 adjust got and plt refcounts. */
b7fcf6f6 5578 for (pass = 0; pass < 2; ++pass)
c72f2fb2 5579 for (ibfd = info->input_bfds; ibfd != NULL; ibfd = ibfd->link.next)
b7fcf6f6 5580 {
0ffa91dd 5581 Elf_Internal_Shdr *symtab_hdr = &elf_symtab_hdr (ibfd);
32af9f6e 5582 asection *got2 = bfd_get_section_by_name (ibfd, ".got2");
7619e7c7 5583
b7fcf6f6
AM
5584 for (sec = ibfd->sections; sec != NULL; sec = sec->next)
5585 if (sec->has_tls_reloc && !bfd_is_abs_section (sec->output_section))
5586 {
5587 Elf_Internal_Rela *relstart, *rel, *relend;
663a1470 5588 int expecting_tls_get_addr = 0;
252b5132 5589
b7fcf6f6
AM
5590 /* Read the relocations. */
5591 relstart = _bfd_elf_link_read_relocs (ibfd, sec, NULL, NULL,
5592 info->keep_memory);
5593 if (relstart == NULL)
5594 return FALSE;
7619e7c7 5595
b7fcf6f6
AM
5596 relend = relstart + sec->reloc_count;
5597 for (rel = relstart; rel < relend; rel++)
5598 {
5599 enum elf_ppc_reloc_type r_type;
5600 unsigned long r_symndx;
5601 struct elf_link_hash_entry *h = NULL;
bac3c8c5 5602 unsigned char *tls_mask;
37da22e5 5603 unsigned char tls_set, tls_clear;
b7fcf6f6 5604 bfd_boolean is_local;
b7fcf6f6
AM
5605 bfd_signed_vma *got_count;
5606
5607 r_symndx = ELF32_R_SYM (rel->r_info);
5608 if (r_symndx >= symtab_hdr->sh_info)
5609 {
5610 struct elf_link_hash_entry **sym_hashes;
7fce784e 5611
b7fcf6f6
AM
5612 sym_hashes = elf_sym_hashes (ibfd);
5613 h = sym_hashes[r_symndx - symtab_hdr->sh_info];
5614 while (h->root.type == bfd_link_hash_indirect
5615 || h->root.type == bfd_link_hash_warning)
5616 h = (struct elf_link_hash_entry *) h->root.u.i.link;
5617 }
7619e7c7 5618
b7fcf6f6
AM
5619 is_local = FALSE;
5620 if (h == NULL
5621 || !h->def_dynamic)
5622 is_local = TRUE;
7619e7c7 5623
b7fcf6f6 5624 r_type = ELF32_R_TYPE (rel->r_info);
663a1470
AM
5625 /* If this section has old-style __tls_get_addr calls
5626 without marker relocs, then check that each
5627 __tls_get_addr call reloc is preceded by a reloc
5628 that conceivably belongs to the __tls_get_addr arg
5629 setup insn. If we don't find matching arg setup
5630 relocs, don't do any tls optimization. */
5631 if (pass == 0
5632 && sec->has_tls_get_addr_call
5633 && h != NULL
5634 && h == htab->tls_get_addr
5635 && !expecting_tls_get_addr
5636 && is_branch_reloc (r_type))
5637 {
25f53a85 5638 info->callbacks->minfo ("%H __tls_get_addr lost arg, "
663a1470
AM
5639 "TLS optimization disabled\n",
5640 ibfd, sec, rel->r_offset);
5641 if (elf_section_data (sec)->relocs != relstart)
5642 free (relstart);
5643 return TRUE;
5644 }
5645
5646 expecting_tls_get_addr = 0;
b7fcf6f6
AM
5647 switch (r_type)
5648 {
5649 case R_PPC_GOT_TLSLD16:
5650 case R_PPC_GOT_TLSLD16_LO:
5651 expecting_tls_get_addr = 1;
1a0670f3 5652 /* Fall through. */
b7fcf6f6
AM
5653
5654 case R_PPC_GOT_TLSLD16_HI:
5655 case R_PPC_GOT_TLSLD16_HA:
5656 /* These relocs should never be against a symbol
5657 defined in a shared lib. Leave them alone if
5658 that turns out to be the case. */
5659 if (!is_local)
5660 continue;
5661
5662 /* LD -> LE */
5663 tls_set = 0;
5664 tls_clear = TLS_LD;
5665 break;
5666
5667 case R_PPC_GOT_TLSGD16:
5668 case R_PPC_GOT_TLSGD16_LO:
5669 expecting_tls_get_addr = 1;
1a0670f3 5670 /* Fall through. */
b7fcf6f6
AM
5671
5672 case R_PPC_GOT_TLSGD16_HI:
5673 case R_PPC_GOT_TLSGD16_HA:
5674 if (is_local)
5675 /* GD -> LE */
5676 tls_set = 0;
5677 else
5678 /* GD -> IE */
5679 tls_set = TLS_TLS | TLS_TPRELGD;
5680 tls_clear = TLS_GD;
5681 break;
5682
5683 case R_PPC_GOT_TPREL16:
5684 case R_PPC_GOT_TPREL16_LO:
5685 case R_PPC_GOT_TPREL16_HI:
5686 case R_PPC_GOT_TPREL16_HA:
5687 if (is_local)
5688 {
5689 /* IE -> LE */
5690 tls_set = 0;
5691 tls_clear = TLS_TPREL;
5692 break;
5693 }
5694 else
5695 continue;
5696
32af9f6e
AM
5697 case R_PPC_TLSGD:
5698 case R_PPC_TLSLD:
23cedd1d
AM
5699 if (rel + 1 < relend
5700 && is_plt_seq_reloc (ELF32_R_TYPE (rel[1].r_info)))
5701 {
5702 if (pass != 0
5703 && ELF32_R_TYPE (rel[1].r_info) != R_PPC_PLTSEQ)
5704 {
5705 r_type = ELF32_R_TYPE (rel[1].r_info);
5706 r_symndx = ELF32_R_SYM (rel[1].r_info);
5707 if (r_symndx >= symtab_hdr->sh_info)
5708 {
5709 struct elf_link_hash_entry **sym_hashes;
5710
5711 sym_hashes = elf_sym_hashes (ibfd);
5712 h = sym_hashes[r_symndx - symtab_hdr->sh_info];
5713 while (h->root.type == bfd_link_hash_indirect
5714 || h->root.type == bfd_link_hash_warning)
5715 h = (struct elf_link_hash_entry *) h->root.u.i.link;
5716 if (h != NULL)
5717 {
5718 struct plt_entry *ent = NULL;
5719 bfd_vma addend = 0;
5720
5721 if (bfd_link_pic (info))
5722 addend = rel->r_addend;
5723 ent = find_plt_ent (&h->plt.plist,
5724 got2, addend);
5725 if (ent != NULL
5726 && ent->plt.refcount > 0)
5727 ent->plt.refcount -= 1;
5728 }
5729 }
5730 }
5731 continue;
5732 }
32af9f6e
AM
5733 expecting_tls_get_addr = 2;
5734 tls_set = 0;
5735 tls_clear = 0;
5736 break;
5737
b7fcf6f6 5738 default:
25dbc73a 5739 continue;
b7fcf6f6 5740 }
25dbc73a 5741
b7fcf6f6
AM
5742 if (pass == 0)
5743 {
727fc41e 5744 if (!expecting_tls_get_addr
23cedd1d 5745 || !sec->has_tls_get_addr_call)
b7fcf6f6 5746 continue;
25dbc73a 5747
3a71aa26
AM
5748 if (rel + 1 < relend
5749 && branch_reloc_hash_match (ibfd, rel + 1,
5750 htab->tls_get_addr))
5751 continue;
25dbc73a 5752
b7fcf6f6
AM
5753 /* Uh oh, we didn't find the expected call. We
5754 could just mark this symbol to exclude it
5755 from tls optimization but it's safer to skip
663a1470 5756 the entire optimization. */
25f53a85 5757 info->callbacks->minfo (_("%H arg lost __tls_get_addr, "
663a1470
AM
5758 "TLS optimization disabled\n"),
5759 ibfd, sec, rel->r_offset);
5760 if (elf_section_data (sec)->relocs != relstart)
5761 free (relstart);
5762 return TRUE;
b7fcf6f6 5763 }
25dbc73a 5764
b7fcf6f6
AM
5765 if (h != NULL)
5766 {
5767 tls_mask = &ppc_elf_hash_entry (h)->tls_mask;
5768 got_count = &h->got.refcount;
5769 }
5770 else
5771 {
b7fcf6f6 5772 bfd_signed_vma *lgot_refs;
e054468f 5773 struct plt_entry **local_plt;
bac3c8c5 5774 unsigned char *lgot_masks;
25dbc73a 5775
b7fcf6f6
AM
5776 lgot_refs = elf_local_got_refcounts (ibfd);
5777 if (lgot_refs == NULL)
5778 abort ();
e054468f
AM
5779 local_plt = (struct plt_entry **)
5780 (lgot_refs + symtab_hdr->sh_info);
bac3c8c5
AM
5781 lgot_masks = (unsigned char *)
5782 (local_plt + symtab_hdr->sh_info);
b7fcf6f6
AM
5783 tls_mask = &lgot_masks[r_symndx];
5784 got_count = &lgot_refs[r_symndx];
5785 }
25dbc73a 5786
37da22e5
AM
5787 /* If we don't have old-style __tls_get_addr calls
5788 without TLSGD/TLSLD marker relocs, and we haven't
5789 found a new-style __tls_get_addr call with a
5790 marker for this symbol, then we either have a
5791 broken object file or an -mlongcall style
5792 indirect call to __tls_get_addr without a marker.
5793 Disable optimization in this case. */
5794 if ((tls_clear & (TLS_GD | TLS_LD)) != 0
5795 && !sec->has_tls_get_addr_call
5796 && ((*tls_mask & (TLS_TLS | TLS_MARK))
5797 != (TLS_TLS | TLS_MARK)))
5798 continue;
5799
5800 if (expecting_tls_get_addr)
5801 {
5802 struct plt_entry *ent;
5803 bfd_vma addend = 0;
5804
5805 if (bfd_link_pic (info)
23cedd1d
AM
5806 && (ELF32_R_TYPE (rel[1].r_info) == R_PPC_PLTREL24
5807 || ELF32_R_TYPE (rel[1].r_info) == R_PPC_PLTCALL))
37da22e5
AM
5808 addend = rel[1].r_addend;
5809 ent = find_plt_ent (&htab->tls_get_addr->plt.plist,
5810 got2, addend);
5811 if (ent != NULL && ent->plt.refcount > 0)
5812 ent->plt.refcount -= 1;
5813
5814 if (expecting_tls_get_addr == 2)
5815 continue;
5816 }
5817
b7fcf6f6
AM
5818 if (tls_set == 0)
5819 {
5820 /* We managed to get rid of a got entry. */
5821 if (*got_count > 0)
5822 *got_count -= 1;
5823 }
25dbc73a 5824
b7fcf6f6
AM
5825 *tls_mask |= tls_set;
5826 *tls_mask &= ~tls_clear;
5827 }
25dbc73a 5828
b7fcf6f6
AM
5829 if (elf_section_data (sec)->relocs != relstart)
5830 free (relstart);
5831 }
b7fcf6f6 5832 }
9a23f96e 5833 htab->do_tls_opt = 1;
25dbc73a
AM
5834 return TRUE;
5835}
5836\f
98bbb1b8 5837/* Find dynamic relocs for H that apply to read-only sections. */
625af618 5838
98bbb1b8
AM
5839static asection *
5840readonly_dynrelocs (struct elf_link_hash_entry *h)
625af618 5841{
6061a67d 5842 struct elf_dyn_relocs *p;
625af618
AM
5843
5844 for (p = ppc_elf_hash_entry (h)->dyn_relocs; p != NULL; p = p->next)
5845 {
5846 asection *s = p->sec->output_section;
5847
98bbb1b8
AM
5848 if (s != NULL && (s->flags & SEC_READONLY) != 0)
5849 return p->sec;
625af618 5850 }
98bbb1b8 5851 return NULL;
625af618
AM
5852}
5853
287c7eaf
AM
5854/* Return true if we have dynamic relocs against H or any of its weak
5855 aliases, that apply to read-only sections. Cannot be used after
5856 size_dynamic_sections. */
5857
5858static bfd_boolean
5859alias_readonly_dynrelocs (struct elf_link_hash_entry *h)
5860{
5861 struct ppc_elf_link_hash_entry *eh = ppc_elf_hash_entry (h);
5862 do
5863 {
5864 if (readonly_dynrelocs (&eh->elf))
5865 return TRUE;
5866 eh = ppc_elf_hash_entry (eh->elf.u.alias);
5867 } while (eh != NULL && &eh->elf != h);
5868
5869 return FALSE;
5870}
5871
5872/* Return whether H has pc-relative dynamic relocs. */
5873
5874static bfd_boolean
5875pc_dynrelocs (struct elf_link_hash_entry *h)
5876{
5877 struct elf_dyn_relocs *p;
5878
5879 for (p = ppc_elf_hash_entry (h)->dyn_relocs; p != NULL; p = p->next)
5880 if (p->pc_count != 0)
5881 return TRUE;
5882 return FALSE;
5883}
5884
25dbc73a
AM
5885/* Adjust a symbol defined by a dynamic object and referenced by a
5886 regular object. The current definition is in some section of the
5887 dynamic object, but we're not including those sections. We have to
5888 change the definition to something the rest of the link can
5889 understand. */
7fce784e 5890
25dbc73a
AM
5891static bfd_boolean
5892ppc_elf_adjust_dynamic_symbol (struct bfd_link_info *info,
5893 struct elf_link_hash_entry *h)
5894{
5895 struct ppc_elf_link_hash_table *htab;
5896 asection *s;
7fce784e 5897
25dbc73a
AM
5898#ifdef DEBUG
5899 fprintf (stderr, "ppc_elf_adjust_dynamic_symbol called for %s\n",
5900 h->root.root.string);
5901#endif
252b5132 5902
25dbc73a
AM
5903 /* Make sure we know what is going on here. */
5904 htab = ppc_elf_hash_table (info);
5905 BFD_ASSERT (htab->elf.dynobj != NULL
5906 && (h->needs_plt
91e21fb7 5907 || h->type == STT_GNU_IFUNC
60d67dc8 5908 || h->is_weakalias
25dbc73a
AM
5909 || (h->def_dynamic
5910 && h->ref_regular
5911 && !h->def_regular)));
252b5132 5912
25dbc73a
AM
5913 /* Deal with function syms. */
5914 if (h->type == STT_FUNC
e054468f 5915 || h->type == STT_GNU_IFUNC
25dbc73a
AM
5916 || h->needs_plt)
5917 {
529fe20e
AM
5918 bfd_boolean local = (SYMBOL_CALLS_LOCAL (info, h)
5919 || UNDEFWEAK_NO_DYNAMIC_RELOC (info, h));
287c7eaf
AM
5920 /* Discard dyn_relocs when non-pic if we've decided that a
5921 function symbol is local. */
5922 if (!bfd_link_pic (info) && local)
5923 ppc_elf_hash_entry (h)->dyn_relocs = NULL;
529fe20e 5924
25dbc73a
AM
5925 /* Clear procedure linkage table information for any symbol that
5926 won't need a .plt entry. */
a6aa5195
AM
5927 struct plt_entry *ent;
5928 for (ent = h->plt.plist; ent != NULL; ent = ent->next)
5929 if (ent->plt.refcount > 0)
5930 break;
5931 if (ent == NULL
2d7ad24e
AM
5932 || (h->type != STT_GNU_IFUNC
5933 && local
3e04d765
AM
5934 && (htab->can_convert_all_inline_plt
5935 || (ppc_elf_hash_entry (h)->tls_mask
5936 & (TLS_TLS | PLT_KEEP)) != PLT_KEEP)))
252b5132 5937 {
25dbc73a 5938 /* A PLT entry is not required/allowed when:
252b5132 5939
25dbc73a
AM
5940 1. We are not using ld.so; because then the PLT entry
5941 can't be set up, so we can't use one. In this case,
5942 ppc_elf_adjust_dynamic_symbol won't even be called.
252b5132 5943
25dbc73a
AM
5944 2. GC has rendered the entry unused.
5945
5946 3. We know for certain that a call to this symbol
5947 will go to this object, or will remain undefined. */
a6aa5195 5948 h->plt.plist = NULL;
25dbc73a 5949 h->needs_plt = 0;
d1eca1e4 5950 h->pointer_equality_needed = 0;
25dbc73a 5951 }
625af618
AM
5952 else
5953 {
d1eca1e4
AM
5954 /* Taking a function's address in a read/write section
5955 doesn't require us to define the function symbol in the
1009ef28 5956 executable on a plt call stub. A dynamic reloc can
f0158f44
AM
5957 be used instead, giving better runtime performance.
5958 (Calls via that function pointer don't need to bounce
5959 through the plt call stub.) Similarly, use a dynamic
5960 reloc for a weak reference when possible, allowing the
5961 resolution of the symbol to be set at load time rather
5962 than link time. */
5963 if ((h->pointer_equality_needed
3988aed5
AM
5964 || (h->non_got_ref
5965 && !h->ref_regular_nonweak
5966 && !UNDEFWEAK_NO_DYNAMIC_RELOC (info, h)))
1009ef28
AM
5967 && !htab->is_vxworks
5968 && !ppc_elf_hash_entry (h)->has_sda_refs
98bbb1b8 5969 && !readonly_dynrelocs (h))
d1eca1e4
AM
5970 {
5971 h->pointer_equality_needed = 0;
04383fd1
AM
5972 /* If we haven't seen a branch reloc and the symbol
5973 isn't an ifunc then we don't need a plt entry. */
5974 if (!h->needs_plt && h->type != STT_GNU_IFUNC)
3988aed5 5975 h->plt.plist = NULL;
d1eca1e4 5976 }
287c7eaf 5977 else if (!bfd_link_pic (info))
529fe20e
AM
5978 /* We are going to be defining the function symbol on the
5979 plt stub, so no dyn_relocs needed when non-pic. */
287c7eaf 5980 ppc_elf_hash_entry (h)->dyn_relocs = NULL;
625af618 5981 }
d3e454b9 5982 h->protected_def = 0;
3988aed5 5983 /* Function symbols can't have copy relocs. */
25dbc73a 5984 return TRUE;
252b5132 5985 }
25dbc73a 5986 else
a6aa5195 5987 h->plt.plist = NULL;
252b5132 5988
25dbc73a
AM
5989 /* If this is a weak symbol, and there is a real definition, the
5990 processor independent code will have arranged for us to see the
5991 real definition first, and we can just use the same value. */
60d67dc8 5992 if (h->is_weakalias)
252b5132 5993 {
60d67dc8
AM
5994 struct elf_link_hash_entry *def = weakdef (h);
5995 BFD_ASSERT (def->root.type == bfd_link_hash_defined);
5996 h->root.u.def.section = def->root.u.def.section;
5997 h->root.u.def.value = def->root.u.def.value;
4a7e5234
AM
5998 if (def->root.u.def.section == htab->elf.sdynbss
5999 || def->root.u.def.section == htab->elf.sdynrelro
6000 || def->root.u.def.section == htab->dynsbss)
6001 ppc_elf_hash_entry (h)->dyn_relocs = NULL;
25dbc73a
AM
6002 return TRUE;
6003 }
dc810e39 6004
25dbc73a
AM
6005 /* This is a reference to a symbol defined by a dynamic object which
6006 is not a function. */
252b5132 6007
25dbc73a
AM
6008 /* If we are creating a shared library, we must presume that the
6009 only references to the symbol are via the global offset table.
6010 For such cases we need not do anything here; the relocations will
6011 be handled correctly by relocate_section. */
0e1862bb 6012 if (bfd_link_pic (info))
d3e454b9
AM
6013 {
6014 h->protected_def = 0;
6015 return TRUE;
6016 }
252b5132 6017
25dbc73a
AM
6018 /* If there are no references to this symbol that do not use the
6019 GOT, we don't need to generate a copy reloc. */
6020 if (!h->non_got_ref)
d3e454b9
AM
6021 {
6022 h->protected_def = 0;
6023 return TRUE;
6024 }
6025
6026 /* Protected variables do not work with .dynbss. The copy in
6027 .dynbss won't be used by the shared library with the protected
6028 definition for the variable. Editing to PIC, or text relocations
6029 are preferable to an incorrect program. */
6030 if (h->protected_def)
6031 {
6032 if (ELIMINATE_COPY_RELOCS
6033 && ppc_elf_hash_entry (h)->has_addr16_ha
6034 && ppc_elf_hash_entry (h)->has_addr16_lo
6035 && htab->params->pic_fixup == 0
6036 && info->disable_target_specific_optimizations <= 1)
6037 htab->params->pic_fixup = 1;
d3e454b9
AM
6038 return TRUE;
6039 }
25dbc73a 6040
a127494f
AM
6041 /* If -z nocopyreloc was given, we won't generate them either. */
6042 if (info->nocopyreloc)
529fe20e 6043 return TRUE;
a127494f 6044
dce2246a 6045 /* If we don't find any dynamic relocs in read-only sections, then
cfd2c773
NS
6046 we'll be keeping the dynamic relocs and avoiding the copy reloc.
6047 We can't do this if there are any small data relocations. This
6048 doesn't work on VxWorks, where we can not have dynamic
6049 relocations (other than copy and jump slot relocations) in an
6050 executable. */
4dc4a9a5 6051 if (ELIMINATE_COPY_RELOCS
cfd2c773 6052 && !ppc_elf_hash_entry (h)->has_sda_refs
625af618
AM
6053 && !htab->is_vxworks
6054 && !h->def_regular
287c7eaf 6055 && !alias_readonly_dynrelocs (h))
529fe20e 6056 return TRUE;
252b5132 6057
25dbc73a
AM
6058 /* We must allocate the symbol in our .dynbss section, which will
6059 become part of the .bss section of the executable. There will be
6060 an entry for this symbol in the .dynsym section. The dynamic
6061 object will contain position independent code, so all references
6062 from the dynamic object to this symbol will go through the global
6063 offset table. The dynamic linker will use the .dynsym entry to
6064 determine the address it must put in the global offset table, so
6065 both the dynamic object and the regular object will refer to the
6066 same memory location for the variable.
6067
4dc4a9a5
DJ
6068 Of course, if the symbol is referenced using SDAREL relocs, we
6069 must instead allocate it in .sbss. */
4dc4a9a5 6070 if (ppc_elf_hash_entry (h)->has_sda_refs)
25dbc73a 6071 s = htab->dynsbss;
5474d94f
AM
6072 else if ((h->root.u.def.section->flags & SEC_READONLY) != 0)
6073 s = htab->elf.sdynrelro;
25dbc73a 6074 else
9d19e4fd 6075 s = htab->elf.sdynbss;
25dbc73a
AM
6076 BFD_ASSERT (s != NULL);
6077
1d7e9d18 6078 if ((h->root.u.def.section->flags & SEC_ALLOC) != 0 && h->size != 0)
25dbc73a
AM
6079 {
6080 asection *srel;
6081
4a7e5234
AM
6082 /* We must generate a R_PPC_COPY reloc to tell the dynamic
6083 linker to copy the initial value out of the dynamic object
6084 and into the runtime process image. */
4dc4a9a5 6085 if (ppc_elf_hash_entry (h)->has_sda_refs)
25dbc73a 6086 srel = htab->relsbss;
5474d94f
AM
6087 else if ((h->root.u.def.section->flags & SEC_READONLY) != 0)
6088 srel = htab->elf.sreldynrelro;
25dbc73a 6089 else
9d19e4fd 6090 srel = htab->elf.srelbss;
25dbc73a
AM
6091 BFD_ASSERT (srel != NULL);
6092 srel->size += sizeof (Elf32_External_Rela);
6093 h->needs_copy = 1;
6094 }
7619e7c7 6095
529fe20e 6096 /* We no longer want dyn_relocs. */
287c7eaf 6097 ppc_elf_hash_entry (h)->dyn_relocs = NULL;
6cabe1ea 6098 return _bfd_elf_adjust_dynamic_copy (info, h, s);
25dbc73a
AM
6099}
6100\f
ac39eb42
AM
6101/* Generate a symbol to mark plt call stubs. For non-PIC code the sym is
6102 xxxxxxxx.plt_call32.<callee> where xxxxxxxx is a hex number, usually 0,
6103 specifying the addend on the plt relocation. For -fpic code, the sym
6104 is xxxxxxxx.plt_pic32.<callee>, and for -fPIC
6105 xxxxxxxx.got2.plt_pic32.<callee>. */
0ba07910
AM
6106
6107static bfd_boolean
6108add_stub_sym (struct plt_entry *ent,
6109 struct elf_link_hash_entry *h,
ac39eb42 6110 struct bfd_link_info *info)
0ba07910
AM
6111{
6112 struct elf_link_hash_entry *sh;
6113 size_t len1, len2, len3;
6114 char *name;
ac39eb42
AM
6115 const char *stub;
6116 struct ppc_elf_link_hash_table *htab = ppc_elf_hash_table (info);
6117
0e1862bb 6118 if (bfd_link_pic (info))
ac39eb42
AM
6119 stub = ".plt_pic32.";
6120 else
6121 stub = ".plt_call32.";
0ba07910
AM
6122
6123 len1 = strlen (h->root.root.string);
ac39eb42 6124 len2 = strlen (stub);
0ba07910
AM
6125 len3 = 0;
6126 if (ent->sec)
6127 len3 = strlen (ent->sec->name);
ac39eb42 6128 name = bfd_malloc (len1 + len2 + len3 + 9);
0ba07910
AM
6129 if (name == NULL)
6130 return FALSE;
6131 sprintf (name, "%08x", (unsigned) ent->addend & 0xffffffff);
6132 if (ent->sec)
6133 memcpy (name + 8, ent->sec->name, len3);
ac39eb42
AM
6134 memcpy (name + 8 + len3, stub, len2);
6135 memcpy (name + 8 + len3 + len2, h->root.root.string, len1 + 1);
0ba07910
AM
6136 sh = elf_link_hash_lookup (&htab->elf, name, TRUE, FALSE, FALSE);
6137 if (sh == NULL)
6138 return FALSE;
6139 if (sh->root.type == bfd_link_hash_new)
6140 {
6141 sh->root.type = bfd_link_hash_defined;
6142 sh->root.u.def.section = htab->glink;
6143 sh->root.u.def.value = ent->glink_offset;
6144 sh->ref_regular = 1;
6145 sh->def_regular = 1;
6146 sh->ref_regular_nonweak = 1;
6147 sh->forced_local = 1;
6148 sh->non_elf = 0;
2ec55de3 6149 sh->root.linker_def = 1;
0ba07910
AM
6150 }
6151 return TRUE;
6152}
6153
3b36f7e6
AM
6154/* Allocate NEED contiguous space in .got, and return the offset.
6155 Handles allocation of the got header when crossing 32k. */
6156
6157static bfd_vma
6158allocate_got (struct ppc_elf_link_hash_table *htab, unsigned int need)
6159{
6160 bfd_vma where;
4a3dc543 6161 unsigned int max_before_header;
3b36f7e6 6162
4a3dc543 6163 if (htab->plt_type == PLT_VXWORKS)
9d8504b1 6164 {
ce558b89
AM
6165 where = htab->elf.sgot->size;
6166 htab->elf.sgot->size += need;
9d8504b1 6167 }
3b36f7e6
AM
6168 else
6169 {
4a3dc543
RS
6170 max_before_header = htab->plt_type == PLT_NEW ? 32768 : 32764;
6171 if (need <= htab->got_gap)
3b36f7e6 6172 {
4a3dc543
RS
6173 where = max_before_header - htab->got_gap;
6174 htab->got_gap -= need;
6175 }
6176 else
6177 {
ce558b89
AM
6178 if (htab->elf.sgot->size + need > max_before_header
6179 && htab->elf.sgot->size <= max_before_header)
4a3dc543 6180 {
ce558b89
AM
6181 htab->got_gap = max_before_header - htab->elf.sgot->size;
6182 htab->elf.sgot->size = max_before_header + htab->got_header_size;
4a3dc543 6183 }
ce558b89
AM
6184 where = htab->elf.sgot->size;
6185 htab->elf.sgot->size += need;
3b36f7e6 6186 }
3b36f7e6
AM
6187 }
6188 return where;
6189}
6190
f15d0b54
AM
6191/* Calculate size of GOT entries for symbol given its TLS_MASK.
6192 TLS_LD is excluded because those go in a special GOT slot. */
6193
6194static inline unsigned int
6195got_entries_needed (int tls_mask)
6196{
6197 unsigned int need;
6198 if ((tls_mask & TLS_TLS) == 0)
6199 need = 4;
6200 else
6201 {
6202 need = 0;
6203 if ((tls_mask & TLS_GD) != 0)
6204 need += 8;
6205 if ((tls_mask & (TLS_TPREL | TLS_TPRELGD)) != 0)
6206 need += 4;
6207 if ((tls_mask & TLS_DTPREL) != 0)
6208 need += 4;
6209 }
6210 return need;
6211}
6212
6213/* Calculate size of relocs needed for symbol given its TLS_MASK and
6214 NEEDed GOT entries. KNOWN says a TPREL offset can be calculated at
6215 link time. */
6216
6217static inline unsigned int
6218got_relocs_needed (int tls_mask, unsigned int need, bfd_boolean known)
6219{
6220 /* All the entries we allocated need relocs.
6221 Except IE in executable with a local symbol. We could also omit
6222 the DTPREL reloc on the second word of a GD entry under the same
6223 condition as that for IE, but ld.so needs to differentiate
6224 LD and GD entries. */
37da22e5
AM
6225 if (known && (tls_mask & TLS_TLS) != 0
6226 && (tls_mask & (TLS_TPREL | TLS_TPRELGD)) != 0)
f15d0b54
AM
6227 need -= 4;
6228 return need * sizeof (Elf32_External_Rela) / 4;
6229}
6230
46434633 6231/* If H is undefined, make it dynamic if that makes sense. */
f0158f44
AM
6232
6233static bfd_boolean
46434633
AM
6234ensure_undef_dynamic (struct bfd_link_info *info,
6235 struct elf_link_hash_entry *h)
f0158f44
AM
6236{
6237 struct elf_link_hash_table *htab = elf_hash_table (info);
6238
6239 if (htab->dynamic_sections_created
46434633
AM
6240 && ((info->dynamic_undefined_weak != 0
6241 && h->root.type == bfd_link_hash_undefweak)
6242 || h->root.type == bfd_link_hash_undefined)
f0158f44
AM
6243 && h->dynindx == -1
6244 && !h->forced_local
6245 && ELF_ST_VISIBILITY (h->other) == STV_DEFAULT)
6246 return bfd_elf_link_record_dynamic_symbol (info, h);
6247 return TRUE;
6248}
6249
25dbc73a 6250/* Allocate space in associated reloc sections for dynamic relocs. */
252b5132 6251
b34976b6 6252static bfd_boolean
25dbc73a 6253allocate_dynrelocs (struct elf_link_hash_entry *h, void *inf)
252b5132 6254{
25dbc73a
AM
6255 struct bfd_link_info *info = inf;
6256 struct ppc_elf_link_hash_entry *eh;
7619e7c7 6257 struct ppc_elf_link_hash_table *htab;
6061a67d 6258 struct elf_dyn_relocs *p;
f0158f44 6259 bfd_boolean dyn;
252b5132 6260
25dbc73a 6261 if (h->root.type == bfd_link_hash_indirect)
b34976b6 6262 return TRUE;
252b5132 6263
7619e7c7 6264 htab = ppc_elf_hash_table (info);
25dbc73a 6265 eh = (struct ppc_elf_link_hash_entry *) h;
d3e454b9
AM
6266 if (eh->elf.got.refcount > 0
6267 || (ELIMINATE_COPY_RELOCS
6268 && !eh->elf.def_regular
6269 && eh->elf.protected_def
6270 && eh->has_addr16_ha
6271 && eh->has_addr16_lo
6272 && htab->params->pic_fixup > 0))
25dbc73a 6273 {
d6e14abc
AM
6274 unsigned int need;
6275
46434633
AM
6276 /* Make sure this symbol is output as a dynamic symbol. */
6277 if (!ensure_undef_dynamic (info, &eh->elf))
f0158f44 6278 return FALSE;
252b5132 6279
d6e14abc 6280 need = 0;
37da22e5 6281 if ((eh->tls_mask & (TLS_TLS | TLS_LD)) == (TLS_TLS | TLS_LD))
25dbc73a 6282 {
f15d0b54
AM
6283 if (!eh->elf.def_dynamic)
6284 /* We'll just use htab->tlsld_got.offset. This should
6285 always be the case. It's a little odd if we have
6286 a local dynamic reloc against a non-local symbol. */
6287 htab->tlsld_got.refcount += 1;
6288 else
d6e14abc 6289 need += 8;
d6e14abc 6290 }
f15d0b54 6291 need += got_entries_needed (eh->tls_mask);
d6e14abc
AM
6292 if (need == 0)
6293 eh->elf.got.offset = (bfd_vma) -1;
6294 else
6295 {
3b36f7e6 6296 eh->elf.got.offset = allocate_got (htab, need);
0e1862bb 6297 if ((bfd_link_pic (info)
f0158f44
AM
6298 || (htab->elf.dynamic_sections_created
6299 && eh->elf.dynindx != -1
6300 && !SYMBOL_REFERENCES_LOCAL (info, &eh->elf)))
21d68fcd 6301 && !UNDEFWEAK_NO_DYNAMIC_RELOC (info, &eh->elf))
252b5132 6302 {
f15d0b54
AM
6303 asection *rsec;
6304 bfd_boolean tprel_known = (bfd_link_executable (info)
6305 && SYMBOL_REFERENCES_LOCAL (info,
6306 &eh->elf));
6307
6308 need = got_relocs_needed (eh->tls_mask, need, tprel_known);
37da22e5
AM
6309 if ((eh->tls_mask & (TLS_TLS | TLS_LD)) == (TLS_TLS | TLS_LD)
6310 && eh->elf.def_dynamic)
f15d0b54
AM
6311 need -= sizeof (Elf32_External_Rela);
6312 rsec = htab->elf.srelgot;
0bed072f 6313 if (eh->elf.type == STT_GNU_IFUNC)
ce558b89 6314 rsec = htab->elf.irelplt;
f15d0b54 6315 rsec->size += need;
252b5132 6316 }
25dbc73a
AM
6317 }
6318 }
6319 else
6320 eh->elf.got.offset = (bfd_vma) -1;
252b5132 6321
954b63d4
AM
6322 /* If no dynamic sections we can't have dynamic relocs, except for
6323 IFUNCs which are handled even in static executables. */
f0158f44
AM
6324 if (!htab->elf.dynamic_sections_created
6325 && h->type != STT_GNU_IFUNC)
6326 eh->dyn_relocs = NULL;
6327
529fe20e
AM
6328 /* Discard relocs on undefined symbols that must be local. */
6329 else if (h->root.type == bfd_link_hash_undefined
6330 && ELF_ST_VISIBILITY (h->other) != STV_DEFAULT)
6331 eh->dyn_relocs = NULL;
6332
6333 /* Also discard relocs on undefined weak syms with non-default
6334 visibility, or when dynamic_undefined_weak says so. */
6335 else if (UNDEFWEAK_NO_DYNAMIC_RELOC (info, h))
6336 eh->dyn_relocs = NULL;
6337
f0158f44 6338 if (eh->dyn_relocs == NULL)
287c7eaf 6339 ;
252b5132 6340
25dbc73a
AM
6341 /* In the shared -Bsymbolic case, discard space allocated for
6342 dynamic pc-relative relocs against symbols which turn out to be
6343 defined in regular objects. For the normal shared case, discard
6344 space for relocs that have become local due to symbol visibility
6345 changes. */
f0158f44 6346 else if (bfd_link_pic (info))
25dbc73a
AM
6347 {
6348 /* Relocs that use pc_count are those that appear on a call insn,
1d483afe 6349 or certain REL relocs (see must_be_dyn_reloc) that can be
25dbc73a
AM
6350 generated via assembly. We want calls to protected symbols to
6351 resolve directly to the function rather than going via the plt.
6352 If people want function pointer comparisons to work as expected
6353 then they should avoid writing weird assembly. */
529fe20e 6354 if (SYMBOL_CALLS_LOCAL (info, h))
25dbc73a 6355 {
6061a67d 6356 struct elf_dyn_relocs **pp;
25dbc73a
AM
6357
6358 for (pp = &eh->dyn_relocs; (p = *pp) != NULL; )
252b5132 6359 {
25dbc73a
AM
6360 p->count -= p->pc_count;
6361 p->pc_count = 0;
6362 if (p->count == 0)
6363 *pp = p->next;
6364 else
6365 pp = &p->next;
252b5132 6366 }
25dbc73a 6367 }
252b5132 6368
3348747a
NS
6369 if (htab->is_vxworks)
6370 {
6061a67d 6371 struct elf_dyn_relocs **pp;
3348747a
NS
6372
6373 for (pp = &eh->dyn_relocs; (p = *pp) != NULL; )
6374 {
6375 if (strcmp (p->sec->output_section->name, ".tls_vars") == 0)
6376 *pp = p->next;
6377 else
6378 pp = &p->next;
6379 }
6380 }
6381
954b63d4 6382 if (eh->dyn_relocs != NULL)
25dbc73a 6383 {
46434633
AM
6384 /* Make sure this symbol is output as a dynamic symbol. */
6385 if (!ensure_undef_dynamic (info, h))
f0158f44 6386 return FALSE;
25dbc73a
AM
6387 }
6388 }
6389 else if (ELIMINATE_COPY_RELOCS)
6390 {
f0158f44 6391 /* For the non-pic case, discard space for relocs against
25dbc73a
AM
6392 symbols which turn out to need copy relocs or are not
6393 dynamic. */
529fe20e 6394 if (h->dynamic_adjusted
d3e454b9 6395 && !h->def_regular
529fe20e 6396 && !ELF_COMMON_DEF_P (h)
d3e454b9
AM
6397 && !(h->protected_def
6398 && eh->has_addr16_ha
6399 && eh->has_addr16_lo
6400 && htab->params->pic_fixup > 0))
25dbc73a 6401 {
46434633
AM
6402 /* Make sure this symbol is output as a dynamic symbol. */
6403 if (!ensure_undef_dynamic (info, h))
f0158f44 6404 return FALSE;
7619e7c7 6405
f0158f44 6406 if (h->dynindx == -1)
287c7eaf 6407 eh->dyn_relocs = NULL;
25dbc73a 6408 }
f0158f44 6409 else
287c7eaf 6410 eh->dyn_relocs = NULL;
25dbc73a 6411 }
252b5132 6412
f0158f44 6413 /* Allocate space. */
25dbc73a
AM
6414 for (p = eh->dyn_relocs; p != NULL; p = p->next)
6415 {
6416 asection *sreloc = elf_section_data (p->sec)->sreloc;
f95f8542 6417 if (eh->elf.type == STT_GNU_IFUNC)
ce558b89 6418 sreloc = htab->elf.irelplt;
25dbc73a
AM
6419 sreloc->size += p->count * sizeof (Elf32_External_Rela);
6420 }
252b5132 6421
2d7ad24e
AM
6422 /* Handle PLT relocs. Done last, after dynindx has settled.
6423 We might need a PLT entry when the symbol
6424 a) is dynamic, or
6425 b) is an ifunc, or
6426 c) has plt16 relocs and has been processed by adjust_dynamic_symbol, or
6427 d) has plt16 relocs and we are linking statically. */
f0158f44 6428 dyn = htab->elf.dynamic_sections_created && h->dynindx != -1;
2d7ad24e
AM
6429 if (dyn
6430 || h->type == STT_GNU_IFUNC
6431 || (h->needs_plt && h->dynamic_adjusted)
6432 || (h->needs_plt
6433 && h->def_regular
6434 && !htab->elf.dynamic_sections_created
3e04d765 6435 && !htab->can_convert_all_inline_plt
2d7ad24e
AM
6436 && (ppc_elf_hash_entry (h)->tls_mask
6437 & (TLS_TLS | PLT_KEEP)) == PLT_KEEP))
f0158f44
AM
6438 {
6439 struct plt_entry *ent;
6440 bfd_boolean doneone = FALSE;
2d7ad24e 6441 bfd_vma plt_offset = 0, glink_offset = (bfd_vma) -1;
f0158f44
AM
6442
6443 for (ent = h->plt.plist; ent != NULL; ent = ent->next)
6444 if (ent->plt.refcount > 0)
6445 {
6446 asection *s = htab->elf.splt;
6447
6448 if (!dyn)
2d7ad24e
AM
6449 {
6450 if (h->type == STT_GNU_IFUNC)
6451 s = htab->elf.iplt;
6452 else
6453 s = htab->pltlocal;
6454 }
f0158f44
AM
6455
6456 if (htab->plt_type == PLT_NEW || !dyn)
6457 {
6458 if (!doneone)
6459 {
6460 plt_offset = s->size;
6461 s->size += 4;
6462 }
6463 ent->plt.offset = plt_offset;
6464
2d7ad24e
AM
6465 if (s == htab->pltlocal)
6466 ent->glink_offset = glink_offset;
6467 else
f0158f44 6468 {
2d7ad24e
AM
6469 s = htab->glink;
6470 if (!doneone || bfd_link_pic (info))
6471 {
6472 glink_offset = s->size;
6473 s->size += GLINK_ENTRY_SIZE (htab, h);
6474 }
6475 if (!doneone
6476 && !bfd_link_pic (info)
6477 && h->def_dynamic
6478 && !h->def_regular)
6479 {
6480 h->root.u.def.section = s;
6481 h->root.u.def.value = glink_offset;
6482 }
6483 ent->glink_offset = glink_offset;
f0158f44 6484
2d7ad24e
AM
6485 if (htab->params->emit_stub_syms
6486 && !add_stub_sym (ent, h, info))
6487 return FALSE;
6488 }
f0158f44
AM
6489 }
6490 else
6491 {
6492 if (!doneone)
6493 {
6494 /* If this is the first .plt entry, make room
6495 for the special first entry. */
6496 if (s->size == 0)
6497 s->size += htab->plt_initial_entry_size;
6498
6499 /* The PowerPC PLT is actually composed of two
6500 parts, the first part is 2 words (for a load
6501 and a jump), and then there is a remaining
6502 word available at the end. */
6503 plt_offset = (htab->plt_initial_entry_size
6504 + (htab->plt_slot_size
6505 * ((s->size
6506 - htab->plt_initial_entry_size)
6507 / htab->plt_entry_size)));
6508
6509 /* If this symbol is not defined in a regular
6510 file, and we are not generating a shared
6511 library, then set the symbol to this location
6512 in the .plt. This is to avoid text
6513 relocations, and is required to make
6514 function pointers compare as equal between
6515 the normal executable and the shared library. */
6516 if (! bfd_link_pic (info)
6517 && h->def_dynamic
6518 && !h->def_regular)
6519 {
6520 h->root.u.def.section = s;
6521 h->root.u.def.value = plt_offset;
6522 }
6523
6524 /* Make room for this entry. */
6525 s->size += htab->plt_entry_size;
6526 /* After the 8192nd entry, room for two entries
6527 is allocated. */
6528 if (htab->plt_type == PLT_OLD
6529 && (s->size - htab->plt_initial_entry_size)
6530 / htab->plt_entry_size
6531 > PLT_NUM_SINGLE_ENTRIES)
6532 s->size += htab->plt_entry_size;
6533 }
6534 ent->plt.offset = plt_offset;
6535 }
6536
6537 /* We also need to make an entry in the .rela.plt section. */
6538 if (!doneone)
6539 {
6540 if (!dyn)
2d7ad24e
AM
6541 {
6542 if (h->type == STT_GNU_IFUNC)
6543 {
6544 s = htab->elf.irelplt;
6545 s->size += sizeof (Elf32_External_Rela);
6546 }
6547 else if (bfd_link_pic (info))
6548 {
6549 s = htab->relpltlocal;
6550 s->size += sizeof (Elf32_External_Rela);
6551 }
6552 }
f0158f44
AM
6553 else
6554 {
6555 htab->elf.srelplt->size += sizeof (Elf32_External_Rela);
6556
6557 if (htab->plt_type == PLT_VXWORKS)
6558 {
6559 /* Allocate space for the unloaded relocations. */
6560 if (!bfd_link_pic (info)
6561 && htab->elf.dynamic_sections_created)
6562 {
6563 if (ent->plt.offset
6564 == (bfd_vma) htab->plt_initial_entry_size)
6565 {
6566 htab->srelplt2->size
6567 += (sizeof (Elf32_External_Rela)
6568 * VXWORKS_PLTRESOLVE_RELOCS);
6569 }
6570
6571 htab->srelplt2->size
6572 += (sizeof (Elf32_External_Rela)
6573 * VXWORKS_PLT_NON_JMP_SLOT_RELOCS);
6574 }
6575
6576 /* Every PLT entry has an associated GOT entry in
6577 .got.plt. */
6578 htab->elf.sgotplt->size += 4;
6579 }
6580 }
6581 doneone = TRUE;
6582 }
6583 }
6584 else
6585 ent->plt.offset = (bfd_vma) -1;
6586
6587 if (!doneone)
6588 {
6589 h->plt.plist = NULL;
6590 h->needs_plt = 0;
6591 }
6592 }
6593 else
6594 {
6595 h->plt.plist = NULL;
6596 h->needs_plt = 0;
6597 }
6598
25dbc73a
AM
6599 return TRUE;
6600}
7619e7c7 6601
625af618
AM
6602/* Set DF_TEXTREL if we find any dynamic relocs that apply to
6603 read-only sections. */
7619e7c7 6604
25dbc73a 6605static bfd_boolean
0caf6c82 6606maybe_set_textrel (struct elf_link_hash_entry *h, void *info_p)
25dbc73a 6607{
98bbb1b8 6608 asection *sec;
0caf6c82 6609
25dbc73a
AM
6610 if (h->root.type == bfd_link_hash_indirect)
6611 return TRUE;
252b5132 6612
98bbb1b8
AM
6613 sec = readonly_dynrelocs (h);
6614 if (sec != NULL)
25dbc73a 6615 {
98bbb1b8
AM
6616 struct bfd_link_info *info = (struct bfd_link_info *) info_p;
6617
0caf6c82 6618 info->flags |= DF_TEXTREL;
98bbb1b8 6619 info->callbacks->minfo
c1c8c1ef 6620 (_("%pB: dynamic relocation against `%pT' in read-only section `%pA'\n"),
63c1f59d 6621 sec->owner, h->root.root.string, sec);
ee05f2fe 6622
625af618
AM
6623 /* Not an error, just cut short the traversal. */
6624 return FALSE;
25dbc73a
AM
6625 }
6626 return TRUE;
6627}
6628
6177242a
AM
6629static const unsigned char glink_eh_frame_cie[] =
6630{
6631 0, 0, 0, 16, /* length. */
6632 0, 0, 0, 0, /* id. */
6633 1, /* CIE version. */
6634 'z', 'R', 0, /* Augmentation string. */
6635 4, /* Code alignment. */
6636 0x7c, /* Data alignment. */
6637 65, /* RA reg. */
6638 1, /* Augmentation size. */
6639 DW_EH_PE_pcrel | DW_EH_PE_sdata4, /* FDE encoding. */
6640 DW_CFA_def_cfa, 1, 0 /* def_cfa: r1 offset 0. */
6641};
6642
25dbc73a
AM
6643/* Set the sizes of the dynamic sections. */
6644
6645static bfd_boolean
93d1b056 6646ppc_elf_size_dynamic_sections (bfd *output_bfd,
25dbc73a
AM
6647 struct bfd_link_info *info)
6648{
6649 struct ppc_elf_link_hash_table *htab;
6650 asection *s;
6651 bfd_boolean relocs;
6652 bfd *ibfd;
7fce784e 6653
252b5132 6654#ifdef DEBUG
25dbc73a 6655 fprintf (stderr, "ppc_elf_size_dynamic_sections called\n");
252b5132 6656#endif
252b5132 6657
25dbc73a
AM
6658 htab = ppc_elf_hash_table (info);
6659 BFD_ASSERT (htab->elf.dynobj != NULL);
252b5132 6660
25dbc73a
AM
6661 if (elf_hash_table (info)->dynamic_sections_created)
6662 {
6663 /* Set the contents of the .interp section to the interpreter. */
9b8b325a 6664 if (bfd_link_executable (info) && !info->nointerp)
25dbc73a 6665 {
3d4d4302 6666 s = bfd_get_linker_section (htab->elf.dynobj, ".interp");
25dbc73a
AM
6667 BFD_ASSERT (s != NULL);
6668 s->size = sizeof ELF_DYNAMIC_INTERPRETER;
6669 s->contents = (unsigned char *) ELF_DYNAMIC_INTERPRETER;
6670 }
6671 }
252b5132 6672
4a3dc543 6673 if (htab->plt_type == PLT_OLD)
d7128ce4 6674 htab->got_header_size = 16;
4a3dc543 6675 else if (htab->plt_type == PLT_NEW)
d7128ce4 6676 htab->got_header_size = 12;
252b5132 6677
25dbc73a
AM
6678 /* Set up .got offsets for local syms, and space for local dynamic
6679 relocs. */
c72f2fb2 6680 for (ibfd = info->input_bfds; ibfd != NULL; ibfd = ibfd->link.next)
25dbc73a
AM
6681 {
6682 bfd_signed_vma *local_got;
6683 bfd_signed_vma *end_local_got;
e054468f
AM
6684 struct plt_entry **local_plt;
6685 struct plt_entry **end_local_plt;
25dbc73a
AM
6686 char *lgot_masks;
6687 bfd_size_type locsymcount;
6688 Elf_Internal_Shdr *symtab_hdr;
7fce784e 6689
0c8d6e5c 6690 if (!is_ppc_elf (ibfd))
25dbc73a 6691 continue;
7fce784e 6692
25dbc73a
AM
6693 for (s = ibfd->sections; s != NULL; s = s->next)
6694 {
f95f8542 6695 struct ppc_dyn_relocs *p;
252b5132 6696
f95f8542 6697 for (p = ((struct ppc_dyn_relocs *)
25dbc73a
AM
6698 elf_section_data (s)->local_dynrel);
6699 p != NULL;
6700 p = p->next)
6701 {
6702 if (!bfd_is_abs_section (p->sec)
6703 && bfd_is_abs_section (p->sec->output_section))
6704 {
6705 /* Input section has been discarded, either because
6706 it is a copy of a linkonce section or due to
6707 linker script /DISCARD/, so we'll be discarding
6708 the relocs too. */
7fce784e 6709 }
3348747a
NS
6710 else if (htab->is_vxworks
6711 && strcmp (p->sec->output_section->name,
6712 ".tls_vars") == 0)
6713 {
6714 /* Relocations in vxworks .tls_vars sections are
6715 handled specially by the loader. */
6716 }
25dbc73a 6717 else if (p->count != 0)
7fce784e 6718 {
25f23106 6719 asection *sreloc = elf_section_data (p->sec)->sreloc;
f95f8542 6720 if (p->ifunc)
ce558b89 6721 sreloc = htab->elf.irelplt;
25f23106 6722 sreloc->size += p->count * sizeof (Elf32_External_Rela);
25dbc73a
AM
6723 if ((p->sec->output_section->flags
6724 & (SEC_READONLY | SEC_ALLOC))
6725 == (SEC_READONLY | SEC_ALLOC))
0caf6c82
L
6726 {
6727 info->flags |= DF_TEXTREL;
871b3ab2 6728 info->callbacks->minfo (_("%pB: dynamic relocation in read-only section `%pA'\n"),
0caf6c82
L
6729 p->sec->owner, p->sec);
6730 }
7fce784e 6731 }
252b5132 6732 }
252b5132 6733 }
252b5132 6734
25dbc73a
AM
6735 local_got = elf_local_got_refcounts (ibfd);
6736 if (!local_got)
6737 continue;
252b5132 6738
0ffa91dd 6739 symtab_hdr = &elf_symtab_hdr (ibfd);
25dbc73a
AM
6740 locsymcount = symtab_hdr->sh_info;
6741 end_local_got = local_got + locsymcount;
e054468f
AM
6742 local_plt = (struct plt_entry **) end_local_got;
6743 end_local_plt = local_plt + locsymcount;
6744 lgot_masks = (char *) end_local_plt;
91d6fa6a 6745
25dbc73a
AM
6746 for (; local_got < end_local_got; ++local_got, ++lgot_masks)
6747 if (*local_got > 0)
6748 {
f15d0b54 6749 unsigned int need;
37da22e5 6750 if ((*lgot_masks & (TLS_TLS | TLS_LD)) == (TLS_TLS | TLS_LD))
f15d0b54
AM
6751 htab->tlsld_got.refcount += 1;
6752 need = got_entries_needed (*lgot_masks);
d6e14abc
AM
6753 if (need == 0)
6754 *local_got = (bfd_vma) -1;
25dbc73a
AM
6755 else
6756 {
3b36f7e6 6757 *local_got = allocate_got (htab, need);
0e1862bb 6758 if (bfd_link_pic (info))
0bed072f 6759 {
f15d0b54
AM
6760 asection *srel;
6761 bfd_boolean tprel_known = bfd_link_executable (info);
6762
6763 need = got_relocs_needed (*lgot_masks, need, tprel_known);
6764 srel = htab->elf.srelgot;
37da22e5 6765 if ((*lgot_masks & (TLS_TLS | PLT_IFUNC)) == PLT_IFUNC)
ce558b89 6766 srel = htab->elf.irelplt;
f15d0b54 6767 srel->size += need;
0bed072f 6768 }
25dbc73a
AM
6769 }
6770 }
6771 else
6772 *local_got = (bfd_vma) -1;
e054468f
AM
6773
6774 if (htab->is_vxworks)
6775 continue;
6776
6777 /* Allocate space for calls to local STT_GNU_IFUNC syms in .iplt. */
2d7ad24e
AM
6778 lgot_masks = (char *) end_local_plt;
6779 for (; local_plt < end_local_plt; ++local_plt, ++lgot_masks)
e054468f
AM
6780 {
6781 struct plt_entry *ent;
6782 bfd_boolean doneone = FALSE;
2d7ad24e 6783 bfd_vma plt_offset = 0, glink_offset = (bfd_vma) -1;
e054468f
AM
6784
6785 for (ent = *local_plt; ent != NULL; ent = ent->next)
6786 if (ent->plt.refcount > 0)
6787 {
2d7ad24e
AM
6788 if ((*lgot_masks & (TLS_TLS | PLT_IFUNC)) == PLT_IFUNC)
6789 s = htab->elf.iplt;
3e04d765
AM
6790 else if (htab->can_convert_all_inline_plt
6791 || (*lgot_masks & (TLS_TLS | PLT_KEEP)) != PLT_KEEP)
2d7ad24e
AM
6792 {
6793 ent->plt.offset = (bfd_vma) -1;
6794 continue;
6795 }
6796 else
6797 s = htab->pltlocal;
e054468f
AM
6798
6799 if (!doneone)
6800 {
6801 plt_offset = s->size;
6802 s->size += 4;
6803 }
6804 ent->plt.offset = plt_offset;
6805
2d7ad24e 6806 if (s != htab->pltlocal && (!doneone || bfd_link_pic (info)))
e054468f 6807 {
2d7ad24e 6808 s = htab->glink;
e054468f 6809 glink_offset = s->size;
9e390558 6810 s->size += GLINK_ENTRY_SIZE (htab, NULL);
e054468f
AM
6811 }
6812 ent->glink_offset = glink_offset;
6813
6814 if (!doneone)
6815 {
2d7ad24e
AM
6816 if ((*lgot_masks & (TLS_TLS | PLT_IFUNC)) == PLT_IFUNC)
6817 {
6818 s = htab->elf.irelplt;
6819 s->size += sizeof (Elf32_External_Rela);
6820 }
6821 else if (bfd_link_pic (info))
6822 {
6823 s = htab->relpltlocal;
6824 s->size += sizeof (Elf32_External_Rela);
6825 }
e054468f
AM
6826 doneone = TRUE;
6827 }
6828 }
6829 else
6830 ent->plt.offset = (bfd_vma) -1;
6831 }
25dbc73a 6832 }
252b5132 6833
b7fcf6f6
AM
6834 /* Allocate space for global sym dynamic relocs. */
6835 elf_link_hash_traverse (elf_hash_table (info), allocate_dynrelocs, info);
6836
3b36f7e6
AM
6837 if (htab->tlsld_got.refcount > 0)
6838 {
6839 htab->tlsld_got.offset = allocate_got (htab, 8);
0e1862bb 6840 if (bfd_link_pic (info))
ce558b89 6841 htab->elf.srelgot->size += sizeof (Elf32_External_Rela);
3b36f7e6
AM
6842 }
6843 else
6844 htab->tlsld_got.offset = (bfd_vma) -1;
6845
ce558b89 6846 if (htab->elf.sgot != NULL && htab->plt_type != PLT_VXWORKS)
3b36f7e6
AM
6847 {
6848 unsigned int g_o_t = 32768;
6849
4d962050
AM
6850 /* If we haven't allocated the header, do so now. When we get here,
6851 for old plt/got the got size will be 0 to 32764 (not allocated),
6852 or 32780 to 65536 (header allocated). For new plt/got, the
6853 corresponding ranges are 0 to 32768 and 32780 to 65536. */
ce558b89 6854 if (htab->elf.sgot->size <= 32768)
3b36f7e6 6855 {
ce558b89 6856 g_o_t = htab->elf.sgot->size;
4a3dc543 6857 if (htab->plt_type == PLT_OLD)
4d962050 6858 g_o_t += 4;
ce558b89 6859 htab->elf.sgot->size += htab->got_header_size;
3b36f7e6 6860 }
3b36f7e6
AM
6861
6862 htab->elf.hgot->root.u.def.value = g_o_t;
6863 }
0e1862bb 6864 if (bfd_link_pic (info))
bd6c6e2b
AM
6865 {
6866 struct elf_link_hash_entry *sda = htab->sdata[0].sym;
93d1b056
AM
6867
6868 sda->root.u.def.section = htab->elf.hgot->root.u.def.section;
6869 sda->root.u.def.value = htab->elf.hgot->root.u.def.value;
bd6c6e2b 6870 }
15bfcc77
AM
6871 if (info->emitrelocations)
6872 {
6873 struct elf_link_hash_entry *sda = htab->sdata[0].sym;
6874
6875 if (sda != NULL && sda->ref_regular)
6876 sda->root.u.def.section->flags |= SEC_KEEP;
6877 sda = htab->sdata[1].sym;
6878 if (sda != NULL && sda->ref_regular)
6879 sda->root.u.def.section->flags |= SEC_KEEP;
6880 }
3b36f7e6 6881
e054468f
AM
6882 if (htab->glink != NULL
6883 && htab->glink->size != 0
6884 && htab->elf.dynamic_sections_created)
d7128ce4
AM
6885 {
6886 htab->glink_pltresolve = htab->glink->size;
9e390558
AM
6887 /* Space for the branch table. */
6888 htab->glink->size
6889 += htab->elf.srelplt->size / (sizeof (Elf32_External_Rela) / 4) - 4;
86b9da88 6890 /* Pad out to align the start of PLTresolve. */
5446cbdf
AM
6891 htab->glink->size += -htab->glink->size & (htab->params->ppc476_workaround
6892 ? 63 : 15);
d7128ce4 6893 htab->glink->size += GLINK_PLTRESOLVE;
0ba07910 6894
5446cbdf 6895 if (htab->params->emit_stub_syms)
0ba07910
AM
6896 {
6897 struct elf_link_hash_entry *sh;
6898 sh = elf_link_hash_lookup (&htab->elf, "__glink",
6899 TRUE, FALSE, FALSE);
6900 if (sh == NULL)
6901 return FALSE;
6902 if (sh->root.type == bfd_link_hash_new)
6903 {
6904 sh->root.type = bfd_link_hash_defined;
6905 sh->root.u.def.section = htab->glink;
6906 sh->root.u.def.value = htab->glink_pltresolve;
6907 sh->ref_regular = 1;
6908 sh->def_regular = 1;
6909 sh->ref_regular_nonweak = 1;
6910 sh->forced_local = 1;
6911 sh->non_elf = 0;
2ec55de3 6912 sh->root.linker_def = 1;
0ba07910
AM
6913 }
6914 sh = elf_link_hash_lookup (&htab->elf, "__glink_PLTresolve",
6915 TRUE, FALSE, FALSE);
6916 if (sh == NULL)
6917 return FALSE;
6918 if (sh->root.type == bfd_link_hash_new)
6919 {
6920 sh->root.type = bfd_link_hash_defined;
6921 sh->root.u.def.section = htab->glink;
6922 sh->root.u.def.value = htab->glink->size - GLINK_PLTRESOLVE;
6923 sh->ref_regular = 1;
6924 sh->def_regular = 1;
6925 sh->ref_regular_nonweak = 1;
6926 sh->forced_local = 1;
6927 sh->non_elf = 0;
2ec55de3 6928 sh->root.linker_def = 1;
0ba07910
AM
6929 }
6930 }
d7128ce4
AM
6931 }
6932
6177242a
AM
6933 if (htab->glink != NULL
6934 && htab->glink->size != 0
6935 && htab->glink_eh_frame != NULL
9a2a56cc
AM
6936 && !bfd_is_abs_section (htab->glink_eh_frame->output_section)
6937 && _bfd_elf_eh_frame_present (info))
6177242a
AM
6938 {
6939 s = htab->glink_eh_frame;
6940 s->size = sizeof (glink_eh_frame_cie) + 20;
0e1862bb 6941 if (bfd_link_pic (info))
6177242a
AM
6942 {
6943 s->size += 4;
6944 if (htab->glink->size - GLINK_PLTRESOLVE + 8 >= 256)
6945 s->size += 4;
6946 }
6947 }
6948
25dbc73a
AM
6949 /* We've now determined the sizes of the various dynamic sections.
6950 Allocate memory for them. */
6951 relocs = FALSE;
6952 for (s = htab->elf.dynobj->sections; s != NULL; s = s->next)
252b5132 6953 {
9d8504b1
PB
6954 bfd_boolean strip_section = TRUE;
6955
25dbc73a
AM
6956 if ((s->flags & SEC_LINKER_CREATED) == 0)
6957 continue;
252b5132 6958
ce558b89
AM
6959 if (s == htab->elf.splt
6960 || s == htab->elf.sgot)
25dbc73a 6961 {
9d8504b1
PB
6962 /* We'd like to strip these sections if they aren't needed, but if
6963 we've exported dynamic symbols from them we must leave them.
6964 It's too late to tell BFD to get rid of the symbols. */
e054468f 6965 if (htab->elf.hplt != NULL)
9d8504b1 6966 strip_section = FALSE;
25dbc73a
AM
6967 /* Strip this section if we don't need it; see the
6968 comment below. */
6969 }
ce558b89 6970 else if (s == htab->elf.iplt
2d7ad24e 6971 || s == htab->pltlocal
e054468f 6972 || s == htab->glink
6177242a 6973 || s == htab->glink_eh_frame
ce558b89 6974 || s == htab->elf.sgotplt
e054468f 6975 || s == htab->sbss
9d19e4fd 6976 || s == htab->elf.sdynbss
5474d94f 6977 || s == htab->elf.sdynrelro
15bfcc77 6978 || s == htab->dynsbss)
25dbc73a 6979 {
c9a2f333 6980 /* Strip these too. */
25dbc73a 6981 }
15bfcc77
AM
6982 else if (s == htab->sdata[0].section
6983 || s == htab->sdata[1].section)
6984 {
6985 strip_section = (s->flags & SEC_KEEP) == 0;
6986 }
a0f49396
NC
6987 else if (CONST_STRNEQ (bfd_get_section_name (htab->elf.dynobj, s),
6988 ".rela"))
25dbc73a 6989 {
c456f082 6990 if (s->size != 0)
25dbc73a
AM
6991 {
6992 /* Remember whether there are any relocation sections. */
6993 relocs = TRUE;
252b5132 6994
25dbc73a
AM
6995 /* We use the reloc_count field as a counter if we need
6996 to copy relocs into the output file. */
6997 s->reloc_count = 0;
252b5132
RH
6998 }
6999 }
25dbc73a
AM
7000 else
7001 {
7002 /* It's not one of our sections, so don't allocate space. */
7003 continue;
7004 }
252b5132 7005
9d8504b1 7006 if (s->size == 0 && strip_section)
25dbc73a 7007 {
c456f082
AM
7008 /* If we don't need this section, strip it from the
7009 output file. This is mostly to handle .rela.bss and
7010 .rela.plt. We must create both sections in
7011 create_dynamic_sections, because they must be created
7012 before the linker maps input sections to output
7013 sections. The linker does that before
7014 adjust_dynamic_symbol is called, and it is that
7015 function which decides whether anything needs to go
7016 into these sections. */
8423293d 7017 s->flags |= SEC_EXCLUDE;
25dbc73a
AM
7018 continue;
7019 }
7fce784e 7020
d7128ce4 7021 if ((s->flags & SEC_HAS_CONTENTS) == 0)
644285ef
AM
7022 continue;
7023
25dbc73a
AM
7024 /* Allocate memory for the section contents. */
7025 s->contents = bfd_zalloc (htab->elf.dynobj, s->size);
7026 if (s->contents == NULL)
7027 return FALSE;
7028 }
252b5132 7029
25dbc73a 7030 if (htab->elf.dynamic_sections_created)
7619e7c7 7031 {
25dbc73a
AM
7032 /* Add some entries to the .dynamic section. We fill in the
7033 values later, in ppc_elf_finish_dynamic_sections, but we
7034 must add the entries now so that we get the correct size for
7035 the .dynamic section. The DT_DEBUG entry is filled in by the
7036 dynamic linker and used by the debugger. */
7037#define add_dynamic_entry(TAG, VAL) \
7038 _bfd_elf_add_dynamic_entry (info, TAG, VAL)
252b5132 7039
0e1862bb 7040 if (bfd_link_executable (info))
7619e7c7 7041 {
25dbc73a
AM
7042 if (!add_dynamic_entry (DT_DEBUG, 0))
7043 return FALSE;
7619e7c7
AM
7044 }
7045
ce558b89 7046 if (htab->elf.splt != NULL && htab->elf.splt->size != 0)
7619e7c7 7047 {
25dbc73a
AM
7048 if (!add_dynamic_entry (DT_PLTGOT, 0)
7049 || !add_dynamic_entry (DT_PLTRELSZ, 0)
7050 || !add_dynamic_entry (DT_PLTREL, DT_RELA)
7051 || !add_dynamic_entry (DT_JMPREL, 0))
7052 return FALSE;
7053 }
7619e7c7 7054
c7e17e05
AM
7055 if (htab->plt_type == PLT_NEW
7056 && htab->glink != NULL
7057 && htab->glink->size != 0)
d7128ce4 7058 {
1fe44d79 7059 if (!add_dynamic_entry (DT_PPC_GOT, 0))
d7128ce4 7060 return FALSE;
5446cbdf 7061 if (!htab->params->no_tls_get_addr_opt
a7f2871e
AM
7062 && htab->tls_get_addr != NULL
7063 && htab->tls_get_addr->plt.plist != NULL
e8910a83 7064 && !add_dynamic_entry (DT_PPC_OPT, PPC_OPT_TLS))
a7f2871e 7065 return FALSE;
d7128ce4
AM
7066 }
7067
25dbc73a
AM
7068 if (relocs)
7069 {
7070 if (!add_dynamic_entry (DT_RELA, 0)
7071 || !add_dynamic_entry (DT_RELASZ, 0)
7072 || !add_dynamic_entry (DT_RELAENT, sizeof (Elf32_External_Rela)))
7073 return FALSE;
7074 }
7619e7c7 7075
25dbc73a
AM
7076 /* If any dynamic relocs apply to a read-only section, then we
7077 need a DT_TEXTREL entry. */
7078 if ((info->flags & DF_TEXTREL) == 0)
625af618 7079 elf_link_hash_traverse (elf_hash_table (info), maybe_set_textrel,
25dbc73a 7080 info);
7619e7c7 7081
25dbc73a
AM
7082 if ((info->flags & DF_TEXTREL) != 0)
7083 {
7084 if (!add_dynamic_entry (DT_TEXTREL, 0))
7085 return FALSE;
7619e7c7 7086 }
7a2b07ff
NS
7087 if (htab->is_vxworks
7088 && !elf_vxworks_add_dynamic_entries (output_bfd, info))
7089 return FALSE;
7090 }
25dbc73a
AM
7091#undef add_dynamic_entry
7092
7e01508c
AM
7093 if (htab->glink_eh_frame != NULL
7094 && htab->glink_eh_frame->contents != NULL)
7095 {
7096 unsigned char *p = htab->glink_eh_frame->contents;
7097 bfd_vma val;
7098
7099 memcpy (p, glink_eh_frame_cie, sizeof (glink_eh_frame_cie));
7100 /* CIE length (rewrite in case little-endian). */
7101 bfd_put_32 (htab->elf.dynobj, sizeof (glink_eh_frame_cie) - 4, p);
7102 p += sizeof (glink_eh_frame_cie);
7103 /* FDE length. */
7104 val = htab->glink_eh_frame->size - 4 - sizeof (glink_eh_frame_cie);
7105 bfd_put_32 (htab->elf.dynobj, val, p);
7106 p += 4;
7107 /* CIE pointer. */
7108 val = p - htab->glink_eh_frame->contents;
7109 bfd_put_32 (htab->elf.dynobj, val, p);
7110 p += 4;
7111 /* Offset to .glink. Set later. */
7112 p += 4;
7113 /* .glink size. */
7114 bfd_put_32 (htab->elf.dynobj, htab->glink->size, p);
7115 p += 4;
7116 /* Augmentation. */
7117 p += 1;
7118
0e1862bb 7119 if (bfd_link_pic (info)
7e01508c
AM
7120 && htab->elf.dynamic_sections_created)
7121 {
7122 bfd_vma adv = (htab->glink->size - GLINK_PLTRESOLVE + 8) >> 2;
7123 if (adv < 64)
7124 *p++ = DW_CFA_advance_loc + adv;
7125 else if (adv < 256)
7126 {
7127 *p++ = DW_CFA_advance_loc1;
7128 *p++ = adv;
7129 }
7130 else if (adv < 65536)
7131 {
7132 *p++ = DW_CFA_advance_loc2;
7133 bfd_put_16 (htab->elf.dynobj, adv, p);
7134 p += 2;
7135 }
7136 else
7137 {
7138 *p++ = DW_CFA_advance_loc4;
7139 bfd_put_32 (htab->elf.dynobj, adv, p);
7140 p += 4;
7141 }
7142 *p++ = DW_CFA_register;
7143 *p++ = 65;
7144 p++;
7145 *p++ = DW_CFA_advance_loc + 4;
7146 *p++ = DW_CFA_restore_extended;
7147 *p++ = 65;
7148 }
7149 BFD_ASSERT ((bfd_vma) ((p + 3 - htab->glink_eh_frame->contents) & -4)
7150 == htab->glink_eh_frame->size);
7151 }
7152
7619e7c7
AM
7153 return TRUE;
7154}
0eb4a168 7155
93d1b056
AM
7156/* Arrange to have _SDA_BASE_ or _SDA2_BASE_ stripped from the output
7157 if it looks like nothing is using them. */
7158
7159static void
7160maybe_strip_sdasym (bfd *output_bfd, elf_linker_section_t *lsect)
7161{
7162 struct elf_link_hash_entry *sda = lsect->sym;
7163
7164 if (sda != NULL && !sda->ref_regular && sda->dynindx == -1)
7165 {
7166 asection *s;
7167
7168 s = bfd_get_section_by_name (output_bfd, lsect->name);
7169 if (s == NULL || bfd_section_removed_from_list (output_bfd, s))
7170 {
7171 s = bfd_get_section_by_name (output_bfd, lsect->bss_name);
7172 if (s == NULL || bfd_section_removed_from_list (output_bfd, s))
7173 {
7174 sda->def_regular = 0;
7175 /* This is somewhat magic. See elf_link_output_extsym. */
7176 sda->ref_dynamic = 1;
7177 sda->forced_local = 0;
7178 }
7179 }
7180 }
7181}
7182
7183void
7184ppc_elf_maybe_strip_sdata_syms (struct bfd_link_info *info)
7185{
7186 struct ppc_elf_link_hash_table *htab = ppc_elf_hash_table (info);
7187
7188 if (htab != NULL)
7189 {
7190 maybe_strip_sdasym (info->output_bfd, &htab->sdata[0]);
7191 maybe_strip_sdasym (info->output_bfd, &htab->sdata[1]);
7192 }
7193}
7194
7195
0eb4a168
AM
7196/* Return TRUE if symbol should be hashed in the `.gnu.hash' section. */
7197
7198static bfd_boolean
7199ppc_elf_hash_symbol (struct elf_link_hash_entry *h)
7200{
7201 if (h->plt.plist != NULL
7202 && !h->def_regular
7203 && (!h->pointer_equality_needed
7204 || !h->ref_regular_nonweak))
7205 return FALSE;
7206
7207 return _bfd_elf_hash_symbol (h);
7208}
25dbc73a
AM
7209\f
7210#define ARRAY_SIZE(a) (sizeof (a) / sizeof ((a)[0]))
7211
01017ef8
NS
7212/* Relaxation trampolines. r12 is available for clobbering (r11, is
7213 used for some functions that are allowed to break the ABI). */
25dbc73a
AM
7214static const int shared_stub_entry[] =
7215 {
7216 0x7c0802a6, /* mflr 0 */
7217 0x429f0005, /* bcl 20, 31, .Lxxx */
01017ef8
NS
7218 0x7d8802a6, /* mflr 12 */
7219 0x3d8c0000, /* addis 12, 12, (xxx-.Lxxx)@ha */
53291d1f 7220 0x398c0000, /* addi 12, 12, (xxx-.Lxxx)@l */
25dbc73a 7221 0x7c0803a6, /* mtlr 0 */
01017ef8 7222 0x7d8903a6, /* mtctr 12 */
25dbc73a
AM
7223 0x4e800420, /* bctr */
7224 };
7225
7226static const int stub_entry[] =
7227 {
01017ef8
NS
7228 0x3d800000, /* lis 12,xxx@ha */
7229 0x398c0000, /* addi 12,12,xxx@l */
7230 0x7d8903a6, /* mtctr 12 */
25dbc73a
AM
7231 0x4e800420, /* bctr */
7232 };
7233
5446cbdf
AM
7234struct ppc_elf_relax_info
7235{
7236 unsigned int workaround_size;
d3e454b9 7237 unsigned int picfixup_size;
5446cbdf
AM
7238};
7239
7240/* This function implements long branch trampolines, and the ppc476
7241 icache bug workaround. Any section needing trampolines or patch
7242 space for the workaround has its size extended so that we can
53291d1f 7243 add trampolines at the end of the section. */
5446cbdf 7244
25dbc73a
AM
7245static bfd_boolean
7246ppc_elf_relax_section (bfd *abfd,
7247 asection *isec,
7248 struct bfd_link_info *link_info,
7249 bfd_boolean *again)
7250{
d3e454b9 7251 struct one_branch_fixup
25dbc73a 7252 {
d3e454b9 7253 struct one_branch_fixup *next;
25dbc73a 7254 asection *tsec;
01017ef8
NS
7255 /* Final link, can use the symbol offset. For a
7256 relocatable link we use the symbol's index. */
25dbc73a
AM
7257 bfd_vma toff;
7258 bfd_vma trampoff;
7259 };
7619e7c7 7260
25dbc73a
AM
7261 Elf_Internal_Shdr *symtab_hdr;
7262 bfd_byte *contents = NULL;
7263 Elf_Internal_Sym *isymbuf = NULL;
7264 Elf_Internal_Rela *internal_relocs = NULL;
5446cbdf 7265 Elf_Internal_Rela *irel, *irelend = NULL;
d3e454b9 7266 struct one_branch_fixup *branch_fixups = NULL;
5446cbdf 7267 struct ppc_elf_relax_info *relax_info = NULL;
9bc4e62b 7268 unsigned changes = 0;
5446cbdf 7269 bfd_boolean workaround_change;
d7128ce4 7270 struct ppc_elf_link_hash_table *htab;
d3e454b9 7271 bfd_size_type trampbase, trampoff, newsize, picfixup_size;
a6aa5195 7272 asection *got2;
50248c89 7273 bfd_boolean maybe_pasted;
7619e7c7 7274
25dbc73a 7275 *again = FALSE;
7619e7c7 7276
5446cbdf 7277 /* No need to do anything with non-alloc or non-code sections. */
c87b5a93 7278 if ((isec->flags & SEC_ALLOC) == 0
a8ad78a7 7279 || (isec->flags & SEC_CODE) == 0
5446cbdf
AM
7280 || (isec->flags & SEC_LINKER_CREATED) != 0
7281 || isec->size < 4)
25dbc73a 7282 return TRUE;
7619e7c7 7283
c8a1f254
NS
7284 /* We cannot represent the required PIC relocs in the output, so don't
7285 do anything. The linker doesn't support mixing -shared and -r
7286 anyway. */
0e1862bb 7287 if (bfd_link_relocatable (link_info) && bfd_link_pic (link_info))
795bc6b3 7288 return TRUE;
5b914448 7289
5446cbdf
AM
7290 htab = ppc_elf_hash_table (link_info);
7291 if (htab == NULL)
7292 return TRUE;
7293
7294 isec->size = (isec->size + 3) & -4;
7295 if (isec->rawsize == 0)
7296 isec->rawsize = isec->size;
7297 trampbase = isec->size;
7298
53291d1f
AM
7299 BFD_ASSERT (isec->sec_info_type == SEC_INFO_TYPE_NONE
7300 || isec->sec_info_type == SEC_INFO_TYPE_TARGET);
7301 isec->sec_info_type = SEC_INFO_TYPE_TARGET;
7302
d3e454b9
AM
7303 if (htab->params->ppc476_workaround
7304 || htab->params->pic_fixup > 0)
5446cbdf
AM
7305 {
7306 if (elf_section_data (isec)->sec_info == NULL)
7307 {
5446cbdf
AM
7308 elf_section_data (isec)->sec_info
7309 = bfd_zalloc (abfd, sizeof (struct ppc_elf_relax_info));
7310 if (elf_section_data (isec)->sec_info == NULL)
7311 return FALSE;
7312 }
7313 relax_info = elf_section_data (isec)->sec_info;
7314 trampbase -= relax_info->workaround_size;
7315 }
7316
50248c89
AM
7317 maybe_pasted = (strcmp (isec->output_section->name, ".init") == 0
7318 || strcmp (isec->output_section->name, ".fini") == 0);
25dbc73a 7319 /* Space for a branch around any trampolines. */
5446cbdf
AM
7320 trampoff = trampbase;
7321 if (maybe_pasted && trampbase == isec->rawsize)
50248c89 7322 trampoff += 4;
7619e7c7 7323
0ffa91dd 7324 symtab_hdr = &elf_symtab_hdr (abfd);
d3e454b9
AM
7325 picfixup_size = 0;
7326 if (htab->params->branch_trampolines
7327 || htab->params->pic_fixup > 0)
7619e7c7 7328 {
5446cbdf
AM
7329 /* Get a copy of the native relocations. */
7330 if (isec->reloc_count != 0)
25dbc73a 7331 {
5446cbdf
AM
7332 internal_relocs = _bfd_elf_link_read_relocs (abfd, isec, NULL, NULL,
7333 link_info->keep_memory);
7334 if (internal_relocs == NULL)
7335 goto error_return;
25dbc73a 7336 }
7619e7c7 7337
5446cbdf
AM
7338 got2 = bfd_get_section_by_name (abfd, ".got2");
7339
7340 irelend = internal_relocs + isec->reloc_count;
7341 for (irel = internal_relocs; irel < irelend; irel++)
25dbc73a 7342 {
5446cbdf
AM
7343 unsigned long r_type = ELF32_R_TYPE (irel->r_info);
7344 bfd_vma toff, roff;
7345 asection *tsec;
d3e454b9 7346 struct one_branch_fixup *f;
5446cbdf 7347 size_t insn_offset = 0;
d3e454b9 7348 bfd_vma max_branch_offset = 0, val;
5446cbdf
AM
7349 bfd_byte *hit_addr;
7350 unsigned long t0;
7351 struct elf_link_hash_entry *h;
49c09209 7352 Elf_Internal_Sym *isym;
5446cbdf
AM
7353 struct plt_entry **plist;
7354 unsigned char sym_type;
7355
7356 switch (r_type)
7357 {
7358 case R_PPC_REL24:
7359 case R_PPC_LOCAL24PC:
7360 case R_PPC_PLTREL24:
23cedd1d 7361 case R_PPC_PLTCALL:
5446cbdf
AM
7362 max_branch_offset = 1 << 25;
7363 break;
7364
7365 case R_PPC_REL14:
7366 case R_PPC_REL14_BRTAKEN:
7367 case R_PPC_REL14_BRNTAKEN:
7368 max_branch_offset = 1 << 15;
7369 break;
7fce784e 7370
d3e454b9
AM
7371 case R_PPC_ADDR16_HA:
7372 if (htab->params->pic_fixup > 0)
7373 break;
7374 continue;
7375
5446cbdf
AM
7376 default:
7377 continue;
7378 }
7379
7380 /* Get the value of the symbol referred to by the reloc. */
49c09209
AM
7381 if (!get_sym_h (&h, &isym, &tsec, NULL, &isymbuf,
7382 ELF32_R_SYM (irel->r_info), abfd))
7383 goto error_return;
5446cbdf 7384
49c09209
AM
7385 if (isym != NULL)
7386 {
7387 if (tsec != NULL)
7388 ;
7389 else if (isym->st_shndx == SHN_UNDEF)
5446cbdf
AM
7390 tsec = bfd_und_section_ptr;
7391 else if (isym->st_shndx == SHN_ABS)
7392 tsec = bfd_abs_section_ptr;
7393 else if (isym->st_shndx == SHN_COMMON)
7394 tsec = bfd_com_section_ptr;
5446cbdf
AM
7395
7396 toff = isym->st_value;
7397 sym_type = ELF_ST_TYPE (isym->st_info);
25dbc73a 7398 }
25dbc73a 7399 else
5446cbdf 7400 {
49c09209
AM
7401 if (tsec != NULL)
7402 toff = h->root.u.def.value;
5446cbdf
AM
7403 else if (h->root.type == bfd_link_hash_undefined
7404 || h->root.type == bfd_link_hash_undefweak)
7405 {
49c09209
AM
7406 unsigned long indx;
7407
7408 indx = ELF32_R_SYM (irel->r_info) - symtab_hdr->sh_info;
5446cbdf 7409 tsec = bfd_und_section_ptr;
0e1862bb 7410 toff = bfd_link_relocatable (link_info) ? indx : 0;
5446cbdf
AM
7411 }
7412 else
7413 continue;
7414
9f7552cf
AM
7415 /* If this branch is to __tls_get_addr then we may later
7416 optimise away the call. We won't be needing a long-
7417 branch stub in that case. */
0e1862bb 7418 if (bfd_link_executable (link_info)
9f7552cf
AM
7419 && h == htab->tls_get_addr
7420 && irel != internal_relocs)
7421 {
7422 unsigned long t_symndx = ELF32_R_SYM (irel[-1].r_info);
7423 unsigned long t_rtype = ELF32_R_TYPE (irel[-1].r_info);
7424 unsigned int tls_mask = 0;
7425
7426 /* The previous reloc should be one of R_PPC_TLSGD or
7427 R_PPC_TLSLD, or for older object files, a reloc
7428 on the __tls_get_addr arg setup insn. Get tls
7429 mask bits from the symbol on that reloc. */
7430 if (t_symndx < symtab_hdr->sh_info)
7431 {
7432 bfd_vma *local_got_offsets = elf_local_got_offsets (abfd);
7433
7434 if (local_got_offsets != NULL)
7435 {
7436 struct plt_entry **local_plt = (struct plt_entry **)
7437 (local_got_offsets + symtab_hdr->sh_info);
7438 char *lgot_masks = (char *)
7439 (local_plt + symtab_hdr->sh_info);
7440 tls_mask = lgot_masks[t_symndx];
7441 }
7442 }
7443 else
7444 {
7445 struct elf_link_hash_entry *th
7446 = elf_sym_hashes (abfd)[t_symndx - symtab_hdr->sh_info];
7447
7448 while (th->root.type == bfd_link_hash_indirect
7449 || th->root.type == bfd_link_hash_warning)
7450 th = (struct elf_link_hash_entry *) th->root.u.i.link;
7451
7452 tls_mask
7453 = ((struct ppc_elf_link_hash_entry *) th)->tls_mask;
7454 }
7455
7456 /* The mask bits tell us if the call will be
7457 optimised away. */
7458 if ((tls_mask & TLS_TLS) != 0 && (tls_mask & TLS_GD) == 0
7459 && (t_rtype == R_PPC_TLSGD
7460 || t_rtype == R_PPC_GOT_TLSGD16
7461 || t_rtype == R_PPC_GOT_TLSGD16_LO))
7462 continue;
7463 if ((tls_mask & TLS_TLS) != 0 && (tls_mask & TLS_LD) == 0
7464 && (t_rtype == R_PPC_TLSLD
7465 || t_rtype == R_PPC_GOT_TLSLD16
7466 || t_rtype == R_PPC_GOT_TLSLD16_LO))
7467 continue;
7468 }
7469
5446cbdf
AM
7470 sym_type = h->type;
7471 }
7619e7c7 7472
d3e454b9
AM
7473 if (r_type == R_PPC_ADDR16_HA)
7474 {
7475 if (h != NULL
7476 && !h->def_regular
7477 && h->protected_def
7478 && ppc_elf_hash_entry (h)->has_addr16_ha
7479 && ppc_elf_hash_entry (h)->has_addr16_lo)
7480 picfixup_size += 12;
7481 continue;
7482 }
7483
5446cbdf
AM
7484 /* The condition here under which we call find_plt_ent must
7485 match that in relocate_section. If we call find_plt_ent here
7486 but not in relocate_section, or vice versa, then the branch
7487 destination used here may be incorrect. */
7488 plist = NULL;
7489 if (h != NULL)
25dbc73a 7490 {
5446cbdf
AM
7491 /* We know is_branch_reloc (r_type) is true. */
7492 if (h->type == STT_GNU_IFUNC
7493 || r_type == R_PPC_PLTREL24)
7494 plist = &h->plt.plist;
25dbc73a 7495 }
5446cbdf
AM
7496 else if (sym_type == STT_GNU_IFUNC
7497 && elf_local_got_offsets (abfd) != NULL)
c8a1f254 7498 {
5446cbdf
AM
7499 bfd_vma *local_got_offsets = elf_local_got_offsets (abfd);
7500 struct plt_entry **local_plt = (struct plt_entry **)
7501 (local_got_offsets + symtab_hdr->sh_info);
7502 plist = local_plt + ELF32_R_SYM (irel->r_info);
c8a1f254 7503 }
5446cbdf 7504 if (plist != NULL)
a9585d22 7505 {
5446cbdf
AM
7506 bfd_vma addend = 0;
7507 struct plt_entry *ent;
7508
0e1862bb 7509 if (r_type == R_PPC_PLTREL24 && bfd_link_pic (link_info))
5446cbdf
AM
7510 addend = irel->r_addend;
7511 ent = find_plt_ent (plist, got2, addend);
7512 if (ent != NULL)
a9585d22 7513 {
5446cbdf
AM
7514 if (htab->plt_type == PLT_NEW
7515 || h == NULL
7516 || !htab->elf.dynamic_sections_created
7517 || h->dynindx == -1)
7518 {
7519 tsec = htab->glink;
7520 toff = ent->glink_offset;
7521 }
7522 else
7523 {
ce558b89 7524 tsec = htab->elf.splt;
5446cbdf
AM
7525 toff = ent->plt.offset;
7526 }
de972ffa
AM
7527 }
7528 }
de972ffa 7529
5446cbdf
AM
7530 /* If the branch and target are in the same section, you have
7531 no hope of adding stubs. We'll error out later should the
7532 branch overflow. */
7533 if (tsec == isec)
7534 continue;
25dbc73a 7535
5446cbdf
AM
7536 /* There probably isn't any reason to handle symbols in
7537 SEC_MERGE sections; SEC_MERGE doesn't seem a likely
7538 attribute for a code section, and we are only looking at
7539 branches. However, implement it correctly here as a
7540 reference for other target relax_section functions. */
7541 if (0 && tsec->sec_info_type == SEC_INFO_TYPE_MERGE)
7542 {
7543 /* At this stage in linking, no SEC_MERGE symbol has been
7544 adjusted, so all references to such symbols need to be
7545 passed through _bfd_merged_section_offset. (Later, in
7546 relocate_section, all SEC_MERGE symbols *except* for
7547 section symbols have been adjusted.)
7548
7549 gas may reduce relocations against symbols in SEC_MERGE
7550 sections to a relocation against the section symbol when
7551 the original addend was zero. When the reloc is against
7552 a section symbol we should include the addend in the
7553 offset passed to _bfd_merged_section_offset, since the
7554 location of interest is the original symbol. On the
7555 other hand, an access to "sym+addend" where "sym" is not
7556 a section symbol should not include the addend; Such an
7557 access is presumed to be an offset from "sym"; The
7558 location of interest is just "sym". */
7559 if (sym_type == STT_SECTION)
7560 toff += irel->r_addend;
7561
7562 toff
7563 = _bfd_merged_section_offset (abfd, &tsec,
7564 elf_section_data (tsec)->sec_info,
7565 toff);
7566
7567 if (sym_type != STT_SECTION)
7568 toff += irel->r_addend;
7569 }
7570 /* PLTREL24 addends are special. */
7571 else if (r_type != R_PPC_PLTREL24)
25dbc73a 7572 toff += irel->r_addend;
7619e7c7 7573
5446cbdf 7574 /* Attempted -shared link of non-pic code loses. */
0e1862bb 7575 if ((!bfd_link_relocatable (link_info)
5446cbdf
AM
7576 && tsec == bfd_und_section_ptr)
7577 || tsec->output_section == NULL
7578 || (tsec->owner != NULL
7579 && (tsec->owner->flags & BFD_PLUGIN) != 0))
7580 continue;
7619e7c7 7581
5446cbdf 7582 roff = irel->r_offset;
7de713b9 7583
5446cbdf
AM
7584 /* If the branch is in range, no need to do anything. */
7585 if (tsec != bfd_und_section_ptr
0e1862bb 7586 && (!bfd_link_relocatable (link_info)
5446cbdf
AM
7587 /* A relocatable link may have sections moved during
7588 final link, so do not presume they remain in range. */
7589 || tsec->output_section == isec->output_section))
7590 {
7591 bfd_vma symaddr, reladdr;
7619e7c7 7592
5446cbdf
AM
7593 symaddr = tsec->output_section->vma + tsec->output_offset + toff;
7594 reladdr = isec->output_section->vma + isec->output_offset + roff;
7595 if (symaddr - reladdr + max_branch_offset
7596 < 2 * max_branch_offset)
7597 continue;
7598 }
01017ef8 7599
5446cbdf 7600 /* Look for an existing fixup to this address. */
d3e454b9 7601 for (f = branch_fixups; f ; f = f->next)
5446cbdf
AM
7602 if (f->tsec == tsec && f->toff == toff)
7603 break;
252b5132 7604
5446cbdf
AM
7605 if (f == NULL)
7606 {
7607 size_t size;
7608 unsigned long stub_rtype;
25dbc73a 7609
5446cbdf
AM
7610 val = trampoff - roff;
7611 if (val >= max_branch_offset)
7612 /* Oh dear, we can't reach a trampoline. Don't try to add
7613 one. We'll report an error later. */
7614 continue;
252b5132 7615
0e1862bb 7616 if (bfd_link_pic (link_info))
5446cbdf
AM
7617 {
7618 size = 4 * ARRAY_SIZE (shared_stub_entry);
7619 insn_offset = 12;
7620 }
7621 else
7622 {
7623 size = 4 * ARRAY_SIZE (stub_entry);
7624 insn_offset = 0;
7625 }
7626 stub_rtype = R_PPC_RELAX;
ce558b89 7627 if (tsec == htab->elf.splt
5446cbdf
AM
7628 || tsec == htab->glink)
7629 {
7630 stub_rtype = R_PPC_RELAX_PLT;
7631 if (r_type == R_PPC_PLTREL24)
7632 stub_rtype = R_PPC_RELAX_PLTREL24;
7633 }
252b5132 7634
5446cbdf
AM
7635 /* Hijack the old relocation. Since we need two
7636 relocations for this use a "composite" reloc. */
7637 irel->r_info = ELF32_R_INFO (ELF32_R_SYM (irel->r_info),
7638 stub_rtype);
7639 irel->r_offset = trampoff + insn_offset;
7640 if (r_type == R_PPC_PLTREL24
7641 && stub_rtype != R_PPC_RELAX_PLTREL24)
7642 irel->r_addend = 0;
7643
7644 /* Record the fixup so we don't do it again this section. */
7645 f = bfd_malloc (sizeof (*f));
d3e454b9 7646 f->next = branch_fixups;
5446cbdf
AM
7647 f->tsec = tsec;
7648 f->toff = toff;
7649 f->trampoff = trampoff;
d3e454b9 7650 branch_fixups = f;
5446cbdf
AM
7651
7652 trampoff += size;
7653 changes++;
25dbc73a
AM
7654 }
7655 else
7656 {
5446cbdf
AM
7657 val = f->trampoff - roff;
7658 if (val >= max_branch_offset)
7659 continue;
252b5132 7660
5446cbdf
AM
7661 /* Nop out the reloc, since we're finalizing things here. */
7662 irel->r_info = ELF32_R_INFO (0, R_PPC_NONE);
7663 }
252b5132 7664
5446cbdf
AM
7665 /* Get the section contents. */
7666 if (contents == NULL)
25dbc73a 7667 {
5446cbdf
AM
7668 /* Get cached copy if it exists. */
7669 if (elf_section_data (isec)->this_hdr.contents != NULL)
7670 contents = elf_section_data (isec)->this_hdr.contents;
25dbc73a 7671 /* Go get them off disk. */
5446cbdf 7672 else if (!bfd_malloc_and_get_section (abfd, isec, &contents))
25dbc73a
AM
7673 goto error_return;
7674 }
252b5132 7675
5446cbdf
AM
7676 /* Fix up the existing branch to hit the trampoline. */
7677 hit_addr = contents + roff;
7678 switch (r_type)
7679 {
7680 case R_PPC_REL24:
7681 case R_PPC_LOCAL24PC:
7682 case R_PPC_PLTREL24:
7683 t0 = bfd_get_32 (abfd, hit_addr);
7684 t0 &= ~0x3fffffc;
7685 t0 |= val & 0x3fffffc;
7686 bfd_put_32 (abfd, t0, hit_addr);
7687 break;
252b5132 7688
5446cbdf
AM
7689 case R_PPC_REL14:
7690 case R_PPC_REL14_BRTAKEN:
7691 case R_PPC_REL14_BRNTAKEN:
7692 t0 = bfd_get_32 (abfd, hit_addr);
7693 t0 &= ~0xfffc;
7694 t0 |= val & 0xfffc;
7695 bfd_put_32 (abfd, t0, hit_addr);
7696 break;
7697 }
25dbc73a 7698 }
252b5132 7699
d3e454b9 7700 while (branch_fixups != NULL)
25dbc73a 7701 {
d3e454b9
AM
7702 struct one_branch_fixup *f = branch_fixups;
7703 branch_fixups = branch_fixups->next;
25dbc73a
AM
7704 free (f);
7705 }
5446cbdf 7706 }
252b5132 7707
5446cbdf
AM
7708 workaround_change = FALSE;
7709 newsize = trampoff;
795bc6b3 7710 if (htab->params->ppc476_workaround
0e1862bb 7711 && (!bfd_link_relocatable (link_info)
795bc6b3 7712 || isec->output_section->alignment_power >= htab->params->pagesize_p2))
5446cbdf
AM
7713 {
7714 bfd_vma addr, end_addr;
7715 unsigned int crossings;
795bc6b3 7716 bfd_vma pagesize = (bfd_vma) 1 << htab->params->pagesize_p2;
5446cbdf
AM
7717
7718 addr = isec->output_section->vma + isec->output_offset;
6128f9cf 7719 end_addr = addr + trampoff;
5446cbdf 7720 addr &= -pagesize;
795bc6b3 7721 crossings = ((end_addr & -pagesize) - addr) >> htab->params->pagesize_p2;
5446cbdf
AM
7722 if (crossings != 0)
7723 {
7724 /* Keep space aligned, to ensure the patch code itself does
7725 not cross a page. Don't decrease size calculated on a
7726 previous pass as otherwise we might never settle on a layout. */
1e269e9b 7727 newsize = 15 - ((end_addr - 1) & 15);
5446cbdf
AM
7728 newsize += crossings * 16;
7729 if (relax_info->workaround_size < newsize)
7730 {
7731 relax_info->workaround_size = newsize;
7732 workaround_change = TRUE;
5446cbdf
AM
7733 }
7734 /* Ensure relocate_section is called. */
7735 isec->flags |= SEC_RELOC;
7736 }
7737 newsize = trampoff + relax_info->workaround_size;
7738 }
7739
d3e454b9
AM
7740 if (htab->params->pic_fixup > 0)
7741 {
7742 picfixup_size -= relax_info->picfixup_size;
7743 if (picfixup_size != 0)
7744 relax_info->picfixup_size += picfixup_size;
7745 newsize += relax_info->picfixup_size;
7746 }
7747
7748 if (changes != 0 || picfixup_size != 0 || workaround_change)
5446cbdf
AM
7749 isec->size = newsize;
7750
25dbc73a
AM
7751 if (isymbuf != NULL
7752 && symtab_hdr->contents != (unsigned char *) isymbuf)
252b5132 7753 {
25dbc73a
AM
7754 if (! link_info->keep_memory)
7755 free (isymbuf);
252b5132 7756 else
25dbc73a
AM
7757 {
7758 /* Cache the symbols for elf_link_input_bfd. */
7759 symtab_hdr->contents = (unsigned char *) isymbuf;
7760 }
252b5132
RH
7761 }
7762
25dbc73a
AM
7763 if (contents != NULL
7764 && elf_section_data (isec)->this_hdr.contents != contents)
7765 {
53291d1f 7766 if (!changes && !link_info->keep_memory)
25dbc73a
AM
7767 free (contents);
7768 else
7769 {
7770 /* Cache the section contents for elf_link_input_bfd. */
7771 elf_section_data (isec)->this_hdr.contents = contents;
7772 }
7773 }
252b5132 7774
d3e454b9 7775 changes += picfixup_size;
9bc4e62b 7776 if (changes != 0)
25dbc73a 7777 {
9bc4e62b
NS
7778 /* Append sufficient NOP relocs so we can write out relocation
7779 information for the trampolines. */
d4730f92 7780 Elf_Internal_Shdr *rel_hdr;
9bc4e62b
NS
7781 Elf_Internal_Rela *new_relocs = bfd_malloc ((changes + isec->reloc_count)
7782 * sizeof (*new_relocs));
7783 unsigned ix;
5b914448 7784
9bc4e62b
NS
7785 if (!new_relocs)
7786 goto error_return;
7787 memcpy (new_relocs, internal_relocs,
7788 isec->reloc_count * sizeof (*new_relocs));
7789 for (ix = changes; ix--;)
7790 {
7791 irel = new_relocs + ix + isec->reloc_count;
7792
7793 irel->r_info = ELF32_R_INFO (0, R_PPC_NONE);
7794 }
7795 if (internal_relocs != elf_section_data (isec)->relocs)
25dbc73a 7796 free (internal_relocs);
9bc4e62b
NS
7797 elf_section_data (isec)->relocs = new_relocs;
7798 isec->reloc_count += changes;
d4730f92
BS
7799 rel_hdr = _bfd_elf_single_rel_hdr (isec);
7800 rel_hdr->sh_size += changes * rel_hdr->sh_entsize;
25dbc73a 7801 }
5446cbdf
AM
7802 else if (internal_relocs != NULL
7803 && elf_section_data (isec)->relocs != internal_relocs)
9bc4e62b 7804 free (internal_relocs);
252b5132 7805
5446cbdf 7806 *again = changes != 0 || workaround_change;
b34976b6 7807 return TRUE;
25dbc73a
AM
7808
7809 error_return:
d3e454b9 7810 while (branch_fixups != NULL)
5446cbdf 7811 {
d3e454b9
AM
7812 struct one_branch_fixup *f = branch_fixups;
7813 branch_fixups = branch_fixups->next;
5446cbdf
AM
7814 free (f);
7815 }
25dbc73a
AM
7816 if (isymbuf != NULL && (unsigned char *) isymbuf != symtab_hdr->contents)
7817 free (isymbuf);
7818 if (contents != NULL
7819 && elf_section_data (isec)->this_hdr.contents != contents)
7820 free (contents);
7821 if (internal_relocs != NULL
7822 && elf_section_data (isec)->relocs != internal_relocs)
7823 free (internal_relocs);
7824 return FALSE;
252b5132 7825}
252b5132 7826\f
8a696751
AM
7827/* What to do when ld finds relocations against symbols defined in
7828 discarded sections. */
7829
7830static unsigned int
7831ppc_elf_action_discarded (asection *sec)
7832{
7833 if (strcmp (".fixup", sec->name) == 0)
7834 return 0;
7835
7836 if (strcmp (".got2", sec->name) == 0)
7837 return 0;
7838
7839 return _bfd_elf_default_action_discarded (sec);
7840}
c9a2f333 7841\f
25dbc73a 7842/* Fill in the address for a pointer generated in a linker section. */
252b5132 7843
25dbc73a 7844static bfd_vma
76750a2f 7845elf_finish_pointer_linker_section (bfd *input_bfd,
25dbc73a
AM
7846 elf_linker_section_t *lsect,
7847 struct elf_link_hash_entry *h,
7848 bfd_vma relocation,
2bb04cf2 7849 const Elf_Internal_Rela *rel)
25dbc73a
AM
7850{
7851 elf_linker_section_pointers_t *linker_section_ptr;
252b5132 7852
25dbc73a 7853 BFD_ASSERT (lsect != NULL);
252b5132 7854
25dbc73a 7855 if (h != NULL)
252b5132 7856 {
25dbc73a
AM
7857 /* Handle global symbol. */
7858 struct ppc_elf_link_hash_entry *eh;
252b5132 7859
25dbc73a 7860 eh = (struct ppc_elf_link_hash_entry *) h;
76750a2f
AM
7861 BFD_ASSERT (eh->elf.def_regular);
7862 linker_section_ptr = eh->linker_section_pointer;
25dbc73a
AM
7863 }
7864 else
7865 {
7866 /* Handle local symbol. */
7867 unsigned long r_symndx = ELF32_R_SYM (rel->r_info);
76750a2f 7868
0c8d6e5c 7869 BFD_ASSERT (is_ppc_elf (input_bfd));
25dbc73a 7870 BFD_ASSERT (elf_local_ptr_offsets (input_bfd) != NULL);
76750a2f
AM
7871 linker_section_ptr = elf_local_ptr_offsets (input_bfd)[r_symndx];
7872 }
252b5132 7873
76750a2f
AM
7874 linker_section_ptr = elf_find_pointer_linker_section (linker_section_ptr,
7875 rel->r_addend,
7876 lsect);
7877 BFD_ASSERT (linker_section_ptr != NULL);
25dbc73a 7878
76750a2f
AM
7879 /* Offset will always be a multiple of four, so use the bottom bit
7880 as a "written" flag. */
7881 if ((linker_section_ptr->offset & 1) == 0)
7882 {
7883 bfd_put_32 (lsect->section->owner,
7884 relocation + linker_section_ptr->addend,
7885 lsect->section->contents + linker_section_ptr->offset);
7886 linker_section_ptr->offset += 1;
252b5132
RH
7887 }
7888
bd6c6e2b
AM
7889 relocation = (lsect->section->output_section->vma
7890 + lsect->section->output_offset
76750a2f 7891 + linker_section_ptr->offset - 1
bd6c6e2b 7892 - SYM_VAL (lsect->sym));
252b5132 7893
25dbc73a
AM
7894#ifdef DEBUG
7895 fprintf (stderr,
7896 "Finish pointer in linker section %s, offset = %ld (0x%lx)\n",
7897 lsect->name, (long) relocation, (long) relocation);
7898#endif
252b5132 7899
bd6c6e2b 7900 return relocation;
252b5132 7901}
25dbc73a 7902
e054468f
AM
7903#define PPC_LO(v) ((v) & 0xffff)
7904#define PPC_HI(v) (((v) >> 16) & 0xffff)
7905#define PPC_HA(v) PPC_HI ((v) + 0x8000)
7906
7907static void
9e390558
AM
7908write_glink_stub (struct elf_link_hash_entry *h, struct plt_entry *ent,
7909 asection *plt_sec, unsigned char *p,
e054468f
AM
7910 struct bfd_link_info *info)
7911{
7912 struct ppc_elf_link_hash_table *htab = ppc_elf_hash_table (info);
7913 bfd *output_bfd = info->output_bfd;
7914 bfd_vma plt;
9e390558
AM
7915 unsigned char *end = p + GLINK_ENTRY_SIZE (htab, h);
7916
7917 if (h != NULL
7918 && h == htab->tls_get_addr
7919 && !htab->params->no_tls_get_addr_opt)
7920 {
7921 bfd_put_32 (output_bfd, LWZ_11_3, p);
7922 p += 4;
7923 bfd_put_32 (output_bfd, LWZ_12_3 + 4, p);
7924 p += 4;
7925 bfd_put_32 (output_bfd, MR_0_3, p);
7926 p += 4;
7927 bfd_put_32 (output_bfd, CMPWI_11_0, p);
7928 p += 4;
7929 bfd_put_32 (output_bfd, ADD_3_12_2, p);
7930 p += 4;
7931 bfd_put_32 (output_bfd, BEQLR, p);
7932 p += 4;
7933 bfd_put_32 (output_bfd, MR_3_0, p);
7934 p += 4;
7935 bfd_put_32 (output_bfd, NOP, p);
7936 p += 4;
7937 }
e054468f
AM
7938
7939 plt = ((ent->plt.offset & ~1)
7940 + plt_sec->output_section->vma
7941 + plt_sec->output_offset);
e054468f 7942
0e1862bb 7943 if (bfd_link_pic (info))
e054468f
AM
7944 {
7945 bfd_vma got = 0;
7946
7947 if (ent->addend >= 32768)
7948 got = (ent->addend
7949 + ent->sec->output_section->vma
7950 + ent->sec->output_offset);
7951 else if (htab->elf.hgot != NULL)
7952 got = SYM_VAL (htab->elf.hgot);
7953
7954 plt -= got;
7955
7956 if (plt + 0x8000 < 0x10000)
9e390558 7957 bfd_put_32 (output_bfd, LWZ_11_30 + PPC_LO (plt), p);
e054468f
AM
7958 else
7959 {
7960 bfd_put_32 (output_bfd, ADDIS_11_30 + PPC_HA (plt), p);
7961 p += 4;
7962 bfd_put_32 (output_bfd, LWZ_11_11 + PPC_LO (plt), p);
e054468f
AM
7963 }
7964 }
7965 else
7966 {
7967 bfd_put_32 (output_bfd, LIS_11 + PPC_HA (plt), p);
7968 p += 4;
7969 bfd_put_32 (output_bfd, LWZ_11_11 + PPC_LO (plt), p);
9e390558
AM
7970 }
7971 p += 4;
7972 bfd_put_32 (output_bfd, MTCTR_11, p);
7973 p += 4;
407aa07c
AM
7974 bfd_put_32 (output_bfd, BCTR, p);
7975 p += 4;
9e390558
AM
7976 while (p < end)
7977 {
7978 bfd_put_32 (output_bfd, htab->params->ppc476_workaround ? BA : NOP, p);
e054468f
AM
7979 p += 4;
7980 }
7981}
7982
bd6c6e2b
AM
7983/* Return true if symbol is defined statically. */
7984
7985static bfd_boolean
7986is_static_defined (struct elf_link_hash_entry *h)
7987{
7988 return ((h->root.type == bfd_link_hash_defined
7989 || h->root.type == bfd_link_hash_defweak)
7990 && h->root.u.def.section != NULL
7991 && h->root.u.def.section->output_section != NULL);
7992}
7993
2d0f3896
AM
7994/* If INSN is an opcode that may be used with an @tls operand, return
7995 the transformed insn for TLS optimisation, otherwise return 0. If
7996 REG is non-zero only match an insn with RB or RA equal to REG. */
7997
7998unsigned int
7999_bfd_elf_ppc_at_tls_transform (unsigned int insn, unsigned int reg)
8000{
8001 unsigned int rtra;
8002
8003 if ((insn & (0x3f << 26)) != 31 << 26)
8004 return 0;
8005
8006 if (reg == 0 || ((insn >> 11) & 0x1f) == reg)
8007 rtra = insn & ((1 << 26) - (1 << 16));
8008 else if (((insn >> 16) & 0x1f) == reg)
8009 rtra = (insn & (0x1f << 21)) | ((insn & (0x1f << 11)) << 5);
8010 else
8011 return 0;
8012
8013 if ((insn & (0x3ff << 1)) == 266 << 1)
8014 /* add -> addi. */
8015 insn = 14 << 26;
8016 else if ((insn & (0x1f << 1)) == 23 << 1
8017 && ((insn & (0x1f << 6)) < 14 << 6
8018 || ((insn & (0x1f << 6)) >= 16 << 6
8019 && (insn & (0x1f << 6)) < 24 << 6)))
8020 /* load and store indexed -> dform. */
8021 insn = (32 | ((insn >> 6) & 0x1f)) << 26;
8022 else if ((insn & (((0x1a << 5) | 0x1f) << 1)) == 21 << 1)
8023 /* ldx, ldux, stdx, stdux -> ld, ldu, std, stdu. */
8024 insn = ((58 | ((insn >> 6) & 4)) << 26) | ((insn >> 6) & 1);
8025 else if ((insn & (((0x1f << 5) | 0x1f) << 1)) == 341 << 1)
8026 /* lwax -> lwa. */
8027 insn = (58 << 26) | 2;
8028 else
8029 return 0;
8030 insn |= rtra;
8031 return insn;
8032}
8033
766bc656
AM
8034/* If INSN is an opcode that may be used with an @tprel operand, return
8035 the transformed insn for an undefined weak symbol, ie. with the
8036 thread pointer REG operand removed. Otherwise return 0. */
8037
8038unsigned int
8039_bfd_elf_ppc_at_tprel_transform (unsigned int insn, unsigned int reg)
8040{
8041 if ((insn & (0x1f << 16)) == reg << 16
8042 && ((insn & (0x3f << 26)) == 14u << 26 /* addi */
8043 || (insn & (0x3f << 26)) == 15u << 26 /* addis */
8044 || (insn & (0x3f << 26)) == 32u << 26 /* lwz */
8045 || (insn & (0x3f << 26)) == 34u << 26 /* lbz */
8046 || (insn & (0x3f << 26)) == 36u << 26 /* stw */
8047 || (insn & (0x3f << 26)) == 38u << 26 /* stb */
8048 || (insn & (0x3f << 26)) == 40u << 26 /* lhz */
8049 || (insn & (0x3f << 26)) == 42u << 26 /* lha */
8050 || (insn & (0x3f << 26)) == 44u << 26 /* sth */
8051 || (insn & (0x3f << 26)) == 46u << 26 /* lmw */
8052 || (insn & (0x3f << 26)) == 47u << 26 /* stmw */
8053 || (insn & (0x3f << 26)) == 48u << 26 /* lfs */
8054 || (insn & (0x3f << 26)) == 50u << 26 /* lfd */
8055 || (insn & (0x3f << 26)) == 52u << 26 /* stfs */
8056 || (insn & (0x3f << 26)) == 54u << 26 /* stfd */
8057 || ((insn & (0x3f << 26)) == 58u << 26 /* lwa,ld,lmd */
8058 && (insn & 3) != 1)
8059 || ((insn & (0x3f << 26)) == 62u << 26 /* std, stmd */
8060 && ((insn & 3) == 0 || (insn & 3) == 3))))
8061 {
8062 insn &= ~(0x1f << 16);
8063 }
8064 else if ((insn & (0x1f << 21)) == reg << 21
8065 && ((insn & (0x3e << 26)) == 24u << 26 /* ori, oris */
8066 || (insn & (0x3e << 26)) == 26u << 26 /* xori,xoris */
8067 || (insn & (0x3e << 26)) == 28u << 26 /* andi,andis */))
8068 {
8069 insn &= ~(0x1f << 21);
8070 insn |= (insn & (0x1f << 16)) << 5;
8071 if ((insn & (0x3e << 26)) == 26 << 26 /* xori,xoris */)
8072 insn -= 2 >> 26; /* convert to ori,oris */
8073 }
8074 else
8075 insn = 0;
8076 return insn;
8077}
8078
1fe532cf
AM
8079static bfd_boolean
8080is_insn_ds_form (unsigned int insn)
8081{
8082 return ((insn & (0x3f << 26)) == 58u << 26 /* ld,ldu,lwa */
8083 || (insn & (0x3f << 26)) == 62u << 26 /* std,stdu,stq */
8084 || (insn & (0x3f << 26)) == 57u << 26 /* lfdp */
8085 || (insn & (0x3f << 26)) == 61u << 26 /* stfdp */);
8086}
8087
8088static bfd_boolean
8089is_insn_dq_form (unsigned int insn)
8090{
a680de9a
PB
8091 return ((insn & (0x3f << 26)) == 56u << 26 /* lq */
8092 || ((insn & (0x3f << 26)) == (61u << 26) /* lxv, stxv */
8093 && (insn & 3) == 1));
1fe532cf
AM
8094}
8095
252b5132
RH
8096/* The RELOCATE_SECTION function is called by the ELF backend linker
8097 to handle the relocations for a section.
8098
8099 The relocs are always passed as Rela structures; if the section
8100 actually uses Rel structures, the r_addend field will always be
8101 zero.
8102
8103 This function is responsible for adjust the section contents as
8104 necessary, and (if using Rela relocs and generating a
1049f94e 8105 relocatable output file) adjusting the reloc addend as
252b5132
RH
8106 necessary.
8107
8108 This function does not have to worry about setting the reloc
8109 address or the reloc symbol index.
8110
8111 LOCAL_SYMS is a pointer to the swapped in local symbols.
8112
8113 LOCAL_SECTIONS is an array giving the section in the input file
8114 corresponding to the st_shndx field of each local symbol.
8115
8116 The global hash table entry for the global symbols can be found
8117 via elf_sym_hashes (input_bfd).
8118
1049f94e 8119 When generating relocatable output, this function must handle
252b5132
RH
8120 STB_LOCAL/STT_SECTION symbols specially. The output symbol is
8121 going to be the section symbol corresponding to the output
8122 section, which means that the addend must be adjusted
8123 accordingly. */
8124
b34976b6 8125static bfd_boolean
55fd94b0
AM
8126ppc_elf_relocate_section (bfd *output_bfd,
8127 struct bfd_link_info *info,
8128 bfd *input_bfd,
8129 asection *input_section,
8130 bfd_byte *contents,
8131 Elf_Internal_Rela *relocs,
8132 Elf_Internal_Sym *local_syms,
8133 asection **local_sections)
252b5132 8134{
7619e7c7
AM
8135 Elf_Internal_Shdr *symtab_hdr;
8136 struct elf_link_hash_entry **sym_hashes;
8137 struct ppc_elf_link_hash_table *htab;
8138 Elf_Internal_Rela *rel;
c316a17c 8139 Elf_Internal_Rela *wrel;
7619e7c7
AM
8140 Elf_Internal_Rela *relend;
8141 Elf_Internal_Rela outrel;
f95f8542 8142 asection *got2;
252b5132 8143 bfd_vma *local_got_offsets;
b34976b6 8144 bfd_boolean ret = TRUE;
95f0d0d2 8145 bfd_vma d_offset = (bfd_big_endian (input_bfd) ? 2 : 0);
3348747a 8146 bfd_boolean is_vxworks_tls;
d3e454b9
AM
8147 unsigned int picfixup_size = 0;
8148 struct ppc_elf_relax_info *relax_info = NULL;
b34976b6 8149
252b5132 8150#ifdef DEBUG
871b3ab2 8151 _bfd_error_handler ("ppc_elf_relocate_section called for %pB section %pA, "
d003868e
AM
8152 "%ld relocations%s",
8153 input_bfd, input_section,
8154 (long) input_section->reloc_count,
0e1862bb 8155 (bfd_link_relocatable (info)) ? " (relocatable)" : "");
252b5132
RH
8156#endif
8157
a6aa5195
AM
8158 got2 = bfd_get_section_by_name (input_bfd, ".got2");
8159
e47cd125 8160 /* Initialize howto table if not already done. */
8da6118f 8161 if (!ppc_elf_howto_table[R_PPC_ADDR32])
252b5132
RH
8162 ppc_elf_howto_init ();
8163
7619e7c7 8164 htab = ppc_elf_hash_table (info);
252b5132 8165 local_got_offsets = elf_local_got_offsets (input_bfd);
0ffa91dd 8166 symtab_hdr = &elf_symtab_hdr (input_bfd);
7619e7c7 8167 sym_hashes = elf_sym_hashes (input_bfd);
3348747a
NS
8168 /* We have to handle relocations in vxworks .tls_vars sections
8169 specially, because the dynamic loader is 'weird'. */
0e1862bb 8170 is_vxworks_tls = (htab->is_vxworks && bfd_link_pic (info)
3348747a
NS
8171 && !strcmp (input_section->output_section->name,
8172 ".tls_vars"));
d3e454b9
AM
8173 if (input_section->sec_info_type == SEC_INFO_TYPE_TARGET)
8174 relax_info = elf_section_data (input_section)->sec_info;
c316a17c 8175 rel = wrel = relocs;
7619e7c7 8176 relend = relocs + input_section->reloc_count;
c316a17c 8177 for (; rel < relend; wrel++, rel++)
252b5132 8178 {
7619e7c7
AM
8179 enum elf_ppc_reloc_type r_type;
8180 bfd_vma addend;
8181 bfd_reloc_status_type r;
8182 Elf_Internal_Sym *sym;
8183 asection *sec;
8184 struct elf_link_hash_entry *h;
8185 const char *sym_name;
252b5132
RH
8186 reloc_howto_type *howto;
8187 unsigned long r_symndx;
8188 bfd_vma relocation;
91d6fa6a 8189 bfd_vma branch_bit, from;
23cedd1d 8190 bfd_boolean unresolved_reloc, save_unresolved_reloc;
7619e7c7
AM
8191 bfd_boolean warned;
8192 unsigned int tls_type, tls_mask, tls_gd;
08be3224 8193 struct plt_entry **ifunc, **plt_list;
86c95733 8194 struct reloc_howto_struct alt_howto;
7619e7c7 8195
c316a17c 8196 again:
55fd94b0
AM
8197 r_type = ELF32_R_TYPE (rel->r_info);
8198 sym = NULL;
8199 sec = NULL;
8200 h = NULL;
7619e7c7
AM
8201 unresolved_reloc = FALSE;
8202 warned = FALSE;
252b5132 8203 r_symndx = ELF32_R_SYM (rel->r_info);
560e09e9 8204
252b5132
RH
8205 if (r_symndx < symtab_hdr->sh_info)
8206 {
8207 sym = local_syms + r_symndx;
8208 sec = local_sections[r_symndx];
26c61ae5 8209 sym_name = bfd_elf_sym_name (input_bfd, symtab_hdr, sym, sec);
252b5132 8210
8517fae7 8211 relocation = _bfd_elf_rela_local_sym (output_bfd, sym, &sec, rel);
252b5132
RH
8212 }
8213 else
8214 {
62d887d4
L
8215 bfd_boolean ignored;
8216
b2a8e766
AM
8217 RELOC_FOR_GLOBAL_SYMBOL (info, input_bfd, input_section, rel,
8218 r_symndx, symtab_hdr, sym_hashes,
8219 h, sec, relocation,
62d887d4 8220 unresolved_reloc, warned, ignored);
9abc968f 8221
252b5132 8222 sym_name = h->root.root.string;
7619e7c7
AM
8223 }
8224
dbaa2011 8225 if (sec != NULL && discarded_section (sec))
ab96bf03
AM
8226 {
8227 /* For relocs against symbols from removed linkonce sections,
8228 or sections discarded by a linker script, we just want the
8229 section contents zeroed. Avoid any special processing. */
8230 howto = NULL;
8231 if (r_type < R_PPC_max)
8232 howto = ppc_elf_howto_table[r_type];
c316a17c
AM
8233
8234 _bfd_clear_contents (howto, input_bfd, input_section,
8235 contents + rel->r_offset);
8236 wrel->r_offset = rel->r_offset;
8237 wrel->r_info = 0;
8238 wrel->r_addend = 0;
8239
8240 /* For ld -r, remove relocations in debug sections against
dcd2b8a0 8241 symbols defined in discarded sections. Not done for
c316a17c
AM
8242 non-debug to preserve relocs in .eh_frame which the
8243 eh_frame editing code expects to be present. */
8244 if (bfd_link_relocatable (info)
8245 && (input_section->flags & SEC_DEBUGGING))
8246 wrel--;
8247
8248 continue;
ab96bf03
AM
8249 }
8250
0e1862bb 8251 if (bfd_link_relocatable (info))
ab96bf03
AM
8252 {
8253 if (got2 != NULL
8254 && r_type == R_PPC_PLTREL24
f75e0e33 8255 && rel->r_addend != 0)
ab96bf03
AM
8256 {
8257 /* R_PPC_PLTREL24 is rather special. If non-zero, the
8258 addend specifies the GOT pointer offset within .got2. */
8259 rel->r_addend += got2->output_offset;
8260 }
53291d1f
AM
8261 if (r_type != R_PPC_RELAX_PLT
8262 && r_type != R_PPC_RELAX_PLTREL24
8263 && r_type != R_PPC_RELAX)
c316a17c 8264 goto copy_reloc;
ab96bf03
AM
8265 }
8266
7619e7c7
AM
8267 /* TLS optimizations. Replace instruction sequences and relocs
8268 based on information we collected in tls_optimize. We edit
8269 RELOCS so that --emit-relocs will output something sensible
8270 for the final instruction stream. */
8271 tls_mask = 0;
8272 tls_gd = 0;
727fc41e
AM
8273 if (h != NULL)
8274 tls_mask = ((struct ppc_elf_link_hash_entry *) h)->tls_mask;
8275 else if (local_got_offsets != NULL)
7619e7c7 8276 {
e054468f 8277 struct plt_entry **local_plt;
727fc41e 8278 char *lgot_masks;
e054468f
AM
8279 local_plt
8280 = (struct plt_entry **) (local_got_offsets + symtab_hdr->sh_info);
8281 lgot_masks = (char *) (local_plt + symtab_hdr->sh_info);
727fc41e 8282 tls_mask = lgot_masks[r_symndx];
7619e7c7
AM
8283 }
8284
8285 /* Ensure reloc mapping code below stays sane. */
8286 if ((R_PPC_GOT_TLSLD16 & 3) != (R_PPC_GOT_TLSGD16 & 3)
8287 || (R_PPC_GOT_TLSLD16_LO & 3) != (R_PPC_GOT_TLSGD16_LO & 3)
8288 || (R_PPC_GOT_TLSLD16_HI & 3) != (R_PPC_GOT_TLSGD16_HI & 3)
8289 || (R_PPC_GOT_TLSLD16_HA & 3) != (R_PPC_GOT_TLSGD16_HA & 3)
8290 || (R_PPC_GOT_TLSLD16 & 3) != (R_PPC_GOT_TPREL16 & 3)
8291 || (R_PPC_GOT_TLSLD16_LO & 3) != (R_PPC_GOT_TPREL16_LO & 3)
8292 || (R_PPC_GOT_TLSLD16_HI & 3) != (R_PPC_GOT_TPREL16_HI & 3)
8293 || (R_PPC_GOT_TLSLD16_HA & 3) != (R_PPC_GOT_TPREL16_HA & 3))
8294 abort ();
8295 switch (r_type)
8296 {
8297 default:
8298 break;
8299
8300 case R_PPC_GOT_TPREL16:
8301 case R_PPC_GOT_TPREL16_LO:
e054468f 8302 if ((tls_mask & TLS_TLS) != 0
7619e7c7
AM
8303 && (tls_mask & TLS_TPREL) == 0)
8304 {
8305 bfd_vma insn;
91d6fa6a 8306
95f0d0d2 8307 insn = bfd_get_32 (input_bfd,
c316a17c 8308 contents + rel->r_offset - d_offset);
7619e7c7
AM
8309 insn &= 31 << 21;
8310 insn |= 0x3c020000; /* addis 0,2,0 */
95f0d0d2 8311 bfd_put_32 (input_bfd, insn,
c316a17c 8312 contents + rel->r_offset - d_offset);
7619e7c7
AM
8313 r_type = R_PPC_TPREL16_HA;
8314 rel->r_info = ELF32_R_INFO (r_symndx, r_type);
8315 }
8316 break;
8317
8318 case R_PPC_TLS:
e054468f 8319 if ((tls_mask & TLS_TLS) != 0
7619e7c7
AM
8320 && (tls_mask & TLS_TPREL) == 0)
8321 {
2d0f3896
AM
8322 bfd_vma insn;
8323
95f0d0d2 8324 insn = bfd_get_32 (input_bfd, contents + rel->r_offset);
2d0f3896
AM
8325 insn = _bfd_elf_ppc_at_tls_transform (insn, 2);
8326 if (insn == 0)
7619e7c7 8327 abort ();
95f0d0d2 8328 bfd_put_32 (input_bfd, insn, contents + rel->r_offset);
7619e7c7
AM
8329 r_type = R_PPC_TPREL16_LO;
8330 rel->r_info = ELF32_R_INFO (r_symndx, r_type);
4fe5ca5b 8331
7619e7c7 8332 /* Was PPC_TLS which sits on insn boundary, now
4fe5ca5b
GM
8333 PPC_TPREL16_LO which is at low-order half-word. */
8334 rel->r_offset += d_offset;
7619e7c7
AM
8335 }
8336 break;
8337
8338 case R_PPC_GOT_TLSGD16_HI:
8339 case R_PPC_GOT_TLSGD16_HA:
8340 tls_gd = TLS_TPRELGD;
e054468f 8341 if ((tls_mask & TLS_TLS) != 0 && (tls_mask & TLS_GD) == 0)
7619e7c7
AM
8342 goto tls_gdld_hi;
8343 break;
8344
8345 case R_PPC_GOT_TLSLD16_HI:
8346 case R_PPC_GOT_TLSLD16_HA:
e054468f 8347 if ((tls_mask & TLS_TLS) != 0 && (tls_mask & TLS_LD) == 0)
7619e7c7
AM
8348 {
8349 tls_gdld_hi:
8350 if ((tls_mask & tls_gd) != 0)
8351 r_type = (((r_type - (R_PPC_GOT_TLSGD16 & 3)) & 3)
8352 + R_PPC_GOT_TPREL16);
8353 else
8354 {
4fe5ca5b 8355 rel->r_offset -= d_offset;
95f0d0d2 8356 bfd_put_32 (input_bfd, NOP, contents + rel->r_offset);
7619e7c7
AM
8357 r_type = R_PPC_NONE;
8358 }
8359 rel->r_info = ELF32_R_INFO (r_symndx, r_type);
8360 }
8361 break;
8362
8363 case R_PPC_GOT_TLSGD16:
8364 case R_PPC_GOT_TLSGD16_LO:
8365 tls_gd = TLS_TPRELGD;
e054468f 8366 if ((tls_mask & TLS_TLS) != 0 && (tls_mask & TLS_GD) == 0)
b7fcf6f6 8367 goto tls_ldgd_opt;
7619e7c7
AM
8368 break;
8369
8370 case R_PPC_GOT_TLSLD16:
8371 case R_PPC_GOT_TLSLD16_LO:
e054468f 8372 if ((tls_mask & TLS_TLS) != 0 && (tls_mask & TLS_LD) == 0)
7619e7c7 8373 {
3a71aa26 8374 unsigned int insn1, insn2;
b7fcf6f6 8375 bfd_vma offset;
7619e7c7 8376
b7fcf6f6 8377 tls_ldgd_opt:
727fc41e
AM
8378 offset = (bfd_vma) -1;
8379 /* If not using the newer R_PPC_TLSGD/LD to mark
8380 __tls_get_addr calls, we must trust that the call
8381 stays with its arg setup insns, ie. that the next
8382 reloc is the __tls_get_addr call associated with
8383 the current reloc. Edit both insns. */
8384 if (input_section->has_tls_get_addr_call
8385 && rel + 1 < relend
8386 && branch_reloc_hash_match (input_bfd, rel + 1,
8387 htab->tls_get_addr))
8388 offset = rel[1].r_offset;
b86ac8e3
AM
8389 /* We read the low GOT_TLS insn because we need to keep
8390 the destination reg. It may be something other than
8391 the usual r3, and moved to r3 before the call by
8392 intervening code. */
95f0d0d2 8393 insn1 = bfd_get_32 (input_bfd,
b86ac8e3 8394 contents + rel->r_offset - d_offset);
b7fcf6f6
AM
8395 if ((tls_mask & tls_gd) != 0)
8396 {
8397 /* IE */
b86ac8e3 8398 insn1 &= (0x1f << 21) | (0x1f << 16);
b7fcf6f6 8399 insn1 |= 32 << 26; /* lwz */
727fc41e
AM
8400 if (offset != (bfd_vma) -1)
8401 {
f58d5a2d 8402 rel[1].r_info = ELF32_R_INFO (STN_UNDEF, R_PPC_NONE);
727fc41e 8403 insn2 = 0x7c631214; /* add 3,3,2 */
95f0d0d2 8404 bfd_put_32 (input_bfd, insn2, contents + offset);
727fc41e 8405 }
b7fcf6f6
AM
8406 r_type = (((r_type - (R_PPC_GOT_TLSGD16 & 3)) & 3)
8407 + R_PPC_GOT_TPREL16);
8408 rel->r_info = ELF32_R_INFO (r_symndx, r_type);
8409 }
8410 else
8411 {
8412 /* LE */
b86ac8e3
AM
8413 insn1 &= 0x1f << 21;
8414 insn1 |= 0x3c020000; /* addis r,2,0 */
7619e7c7
AM
8415 if (tls_gd == 0)
8416 {
b7fcf6f6 8417 /* Was an LD reloc. */
1d483afe
AM
8418 for (r_symndx = 0;
8419 r_symndx < symtab_hdr->sh_info;
8420 r_symndx++)
8421 if (local_sections[r_symndx] == sec)
8422 break;
8423 if (r_symndx >= symtab_hdr->sh_info)
cf35638d 8424 r_symndx = STN_UNDEF;
b7fcf6f6 8425 rel->r_addend = htab->elf.tls_sec->vma + DTP_OFFSET;
cf35638d 8426 if (r_symndx != STN_UNDEF)
1d483afe
AM
8427 rel->r_addend -= (local_syms[r_symndx].st_value
8428 + sec->output_offset
8429 + sec->output_section->vma);
7619e7c7 8430 }
b7fcf6f6
AM
8431 r_type = R_PPC_TPREL16_HA;
8432 rel->r_info = ELF32_R_INFO (r_symndx, r_type);
727fc41e
AM
8433 if (offset != (bfd_vma) -1)
8434 {
8435 rel[1].r_info = ELF32_R_INFO (r_symndx, R_PPC_TPREL16_LO);
8436 rel[1].r_offset = offset + d_offset;
8437 rel[1].r_addend = rel->r_addend;
8438 insn2 = 0x38630000; /* addi 3,3,0 */
95f0d0d2 8439 bfd_put_32 (input_bfd, insn2, contents + offset);
727fc41e 8440 }
b7fcf6f6 8441 }
95f0d0d2 8442 bfd_put_32 (input_bfd, insn1,
b7fcf6f6 8443 contents + rel->r_offset - d_offset);
b7fcf6f6
AM
8444 if (tls_gd == 0)
8445 {
8446 /* We changed the symbol on an LD reloc. Start over
8447 in order to get h, sym, sec etc. right. */
c316a17c 8448 goto again;
7619e7c7 8449 }
252b5132 8450 }
7619e7c7 8451 break;
727fc41e
AM
8452
8453 case R_PPC_TLSGD:
675e2809
AM
8454 if ((tls_mask & TLS_TLS) != 0 && (tls_mask & TLS_GD) == 0
8455 && rel + 1 < relend)
727fc41e
AM
8456 {
8457 unsigned int insn2;
8458 bfd_vma offset = rel->r_offset;
8459
23cedd1d
AM
8460 if (is_plt_seq_reloc (ELF32_R_TYPE (rel[1].r_info)))
8461 {
8462 bfd_put_32 (input_bfd, NOP, contents + offset);
8463 rel[1].r_info = ELF32_R_INFO (STN_UNDEF, R_PPC_NONE);
8464 break;
8465 }
8466
727fc41e
AM
8467 if ((tls_mask & TLS_TPRELGD) != 0)
8468 {
8469 /* IE */
8470 r_type = R_PPC_NONE;
8471 insn2 = 0x7c631214; /* add 3,3,2 */
8472 }
8473 else
8474 {
8475 /* LE */
8476 r_type = R_PPC_TPREL16_LO;
8477 rel->r_offset += d_offset;
8478 insn2 = 0x38630000; /* addi 3,3,0 */
8479 }
8480 rel->r_info = ELF32_R_INFO (r_symndx, r_type);
95f0d0d2 8481 bfd_put_32 (input_bfd, insn2, contents + offset);
727fc41e
AM
8482 /* Zap the reloc on the _tls_get_addr call too. */
8483 BFD_ASSERT (offset == rel[1].r_offset);
f58d5a2d 8484 rel[1].r_info = ELF32_R_INFO (STN_UNDEF, R_PPC_NONE);
727fc41e
AM
8485 }
8486 break;
8487
8488 case R_PPC_TLSLD:
675e2809
AM
8489 if ((tls_mask & TLS_TLS) != 0 && (tls_mask & TLS_LD) == 0
8490 && rel + 1 < relend)
727fc41e
AM
8491 {
8492 unsigned int insn2;
8493
23cedd1d
AM
8494 if (is_plt_seq_reloc (ELF32_R_TYPE (rel[1].r_info)))
8495 {
8496 bfd_put_32 (input_bfd, NOP, contents + rel->r_offset);
8497 rel[1].r_info = ELF32_R_INFO (STN_UNDEF, R_PPC_NONE);
8498 break;
8499 }
8500
727fc41e
AM
8501 for (r_symndx = 0;
8502 r_symndx < symtab_hdr->sh_info;
8503 r_symndx++)
8504 if (local_sections[r_symndx] == sec)
8505 break;
8506 if (r_symndx >= symtab_hdr->sh_info)
cf35638d 8507 r_symndx = STN_UNDEF;
727fc41e 8508 rel->r_addend = htab->elf.tls_sec->vma + DTP_OFFSET;
cf35638d 8509 if (r_symndx != STN_UNDEF)
727fc41e
AM
8510 rel->r_addend -= (local_syms[r_symndx].st_value
8511 + sec->output_offset
8512 + sec->output_section->vma);
8513
8514 rel->r_info = ELF32_R_INFO (r_symndx, R_PPC_TPREL16_LO);
8515 rel->r_offset += d_offset;
8516 insn2 = 0x38630000; /* addi 3,3,0 */
95f0d0d2 8517 bfd_put_32 (input_bfd, insn2,
727fc41e
AM
8518 contents + rel->r_offset - d_offset);
8519 /* Zap the reloc on the _tls_get_addr call too. */
8520 BFD_ASSERT (rel->r_offset - d_offset == rel[1].r_offset);
f58d5a2d 8521 rel[1].r_info = ELF32_R_INFO (STN_UNDEF, R_PPC_NONE);
c316a17c 8522 goto again;
727fc41e
AM
8523 }
8524 break;
7619e7c7
AM
8525 }
8526
8527 /* Handle other relocations that tweak non-addend part of insn. */
8528 branch_bit = 0;
8529 switch (r_type)
8530 {
8531 default:
8532 break;
8533
8534 /* Branch taken prediction relocations. */
8535 case R_PPC_ADDR14_BRTAKEN:
8536 case R_PPC_REL14_BRTAKEN:
8537 branch_bit = BRANCH_PREDICT_BIT;
1a0670f3 8538 /* Fall through. */
7619e7c7 8539
4cc11e76 8540 /* Branch not taken prediction relocations. */
7619e7c7
AM
8541 case R_PPC_ADDR14_BRNTAKEN:
8542 case R_PPC_REL14_BRNTAKEN:
91d6fa6a 8543 {
23cedd1d 8544 unsigned int insn;
7619e7c7 8545
95f0d0d2 8546 insn = bfd_get_32 (input_bfd, contents + rel->r_offset);
91d6fa6a
NC
8547 insn &= ~BRANCH_PREDICT_BIT;
8548 insn |= branch_bit;
7619e7c7 8549
91d6fa6a
NC
8550 from = (rel->r_offset
8551 + input_section->output_offset
8552 + input_section->output_section->vma);
7619e7c7 8553
91d6fa6a
NC
8554 /* Invert 'y' bit if not the default. */
8555 if ((bfd_signed_vma) (relocation + rel->r_addend - from) < 0)
8556 insn ^= BRANCH_PREDICT_BIT;
8557
95f0d0d2 8558 bfd_put_32 (input_bfd, insn, contents + rel->r_offset);
91d6fa6a 8559 }
08be3224
AM
8560 break;
8561
8562 case R_PPC_PLT16_HA:
8563 {
8564 unsigned int insn;
8565
8566 insn = bfd_get_32 (input_bfd,
8567 contents + rel->r_offset - d_offset);
8568 if ((insn & (0x3f << 26)) == 15u << 26
8569 && (insn & (0x1f << 16)) != 0)
8570 {
8571 if (!bfd_link_pic (info))
8572 {
8573 /* Convert addis to lis. */
8574 insn &= ~(0x1f << 16);
8575 bfd_put_32 (input_bfd, insn,
8576 contents + rel->r_offset - d_offset);
8577 }
8578 }
8579 else if (bfd_link_pic (info))
8580 info->callbacks->einfo
8581 (_("%P: %H: error: %s with unexpected instruction %x\n"),
8582 input_bfd, input_section, rel->r_offset,
8583 "R_PPC_PLT16_HA", insn);
8584 }
8585 break;
252b5132
RH
8586 }
8587
d3e454b9
AM
8588 if (ELIMINATE_COPY_RELOCS
8589 && h != NULL
8590 && !h->def_regular
8591 && h->protected_def
8592 && ppc_elf_hash_entry (h)->has_addr16_ha
8593 && ppc_elf_hash_entry (h)->has_addr16_lo
8594 && htab->params->pic_fixup > 0)
8595 {
8596 /* Convert lis;addi or lis;load/store accessing a protected
8597 variable defined in a shared library to PIC. */
8598 unsigned int insn;
8599
8600 if (r_type == R_PPC_ADDR16_HA)
8601 {
95f0d0d2 8602 insn = bfd_get_32 (input_bfd,
d3e454b9
AM
8603 contents + rel->r_offset - d_offset);
8604 if ((insn & (0x3f << 26)) == (15u << 26)
8605 && (insn & (0x1f << 16)) == 0 /* lis */)
8606 {
8607 bfd_byte *p;
8608 bfd_vma off;
8609 bfd_vma got_addr;
8610
8611 p = (contents + input_section->size
8612 - relax_info->workaround_size
8613 - relax_info->picfixup_size
8614 + picfixup_size);
8615 off = (p - contents) - (rel->r_offset - d_offset);
8616 if (off > 0x1fffffc || (off & 3) != 0)
8617 info->callbacks->einfo
174d0a74 8618 (_("%H: fixup branch overflow\n"),
d3e454b9
AM
8619 input_bfd, input_section, rel->r_offset);
8620
95f0d0d2 8621 bfd_put_32 (input_bfd, B | off,
d3e454b9 8622 contents + rel->r_offset - d_offset);
ce558b89
AM
8623 got_addr = (htab->elf.sgot->output_section->vma
8624 + htab->elf.sgot->output_offset
d3e454b9 8625 + (h->got.offset & ~1));
c316a17c
AM
8626 wrel->r_offset = (p - contents) + d_offset;
8627 wrel->r_info = ELF32_R_INFO (0, R_PPC_ADDR16_HA);
8628 wrel->r_addend = got_addr;
d3e454b9 8629 insn &= ~0xffff;
4aef7643 8630 insn |= ((unsigned int) (got_addr + 0x8000) >> 16) & 0xffff;
95f0d0d2 8631 bfd_put_32 (input_bfd, insn, p);
d3e454b9
AM
8632
8633 /* Convert lis to lwz, loading address from GOT. */
8634 insn &= ~0xffff;
8635 insn ^= (32u ^ 15u) << 26;
8636 insn |= (insn & (0x1f << 21)) >> 5;
8637 insn |= got_addr & 0xffff;
95f0d0d2 8638 bfd_put_32 (input_bfd, insn, p + 4);
d3e454b9 8639
95f0d0d2 8640 bfd_put_32 (input_bfd, B | ((-4 - off) & 0x3ffffff), p + 8);
d3e454b9
AM
8641 picfixup_size += 12;
8642
8643 /* Use one of the spare relocs, so --emit-relocs
8644 output is reasonable. */
8645 memmove (rel + 1, rel, (relend - rel - 1) * sizeof (*rel));
c316a17c
AM
8646 wrel++, rel++;
8647 rel->r_offset = wrel[-1].r_offset + 4;
d3e454b9 8648 rel->r_info = ELF32_R_INFO (0, R_PPC_ADDR16_LO);
c316a17c 8649 rel->r_addend = wrel[-1].r_addend;
d3e454b9
AM
8650
8651 /* Continue on as if we had a got reloc, to output
8652 dynamic reloc. */
8653 r_type = R_PPC_GOT16_LO;
8654 }
8655 else
2c4d9cbe 8656 _bfd_error_handler
695344c0 8657 /* xgettext:c-format */
2dcf00ce
AM
8658 (_("%pB(%pA+%#" PRIx64 "): error: "
8659 "%s with unexpected instruction %#x"),
8660 input_bfd, input_section, (uint64_t) rel->r_offset,
d3e454b9
AM
8661 "R_PPC_ADDR16_HA", insn);
8662 }
8663 else if (r_type == R_PPC_ADDR16_LO)
8664 {
95f0d0d2 8665 insn = bfd_get_32 (input_bfd,
d3e454b9
AM
8666 contents + rel->r_offset - d_offset);
8667 if ((insn & (0x3f << 26)) == 14u << 26 /* addi */
8668 || (insn & (0x3f << 26)) == 32u << 26 /* lwz */
8669 || (insn & (0x3f << 26)) == 34u << 26 /* lbz */
8670 || (insn & (0x3f << 26)) == 36u << 26 /* stw */
8671 || (insn & (0x3f << 26)) == 38u << 26 /* stb */
8672 || (insn & (0x3f << 26)) == 40u << 26 /* lhz */
8673 || (insn & (0x3f << 26)) == 42u << 26 /* lha */
8674 || (insn & (0x3f << 26)) == 44u << 26 /* sth */
8675 || (insn & (0x3f << 26)) == 46u << 26 /* lmw */
8676 || (insn & (0x3f << 26)) == 47u << 26 /* stmw */
8677 || (insn & (0x3f << 26)) == 48u << 26 /* lfs */
8678 || (insn & (0x3f << 26)) == 50u << 26 /* lfd */
8679 || (insn & (0x3f << 26)) == 52u << 26 /* stfs */
8680 || (insn & (0x3f << 26)) == 54u << 26 /* stfd */
8681 || ((insn & (0x3f << 26)) == 58u << 26 /* lwa,ld,lmd */
8682 && (insn & 3) != 1)
8683 || ((insn & (0x3f << 26)) == 62u << 26 /* std, stmd */
8684 && ((insn & 3) == 0 || (insn & 3) == 3)))
8685 {
8686 /* Arrange to apply the reloc addend, if any. */
8687 relocation = 0;
8688 unresolved_reloc = FALSE;
8689 rel->r_info = ELF32_R_INFO (0, r_type);
8690 }
8691 else
2c4d9cbe 8692 _bfd_error_handler
695344c0 8693 /* xgettext:c-format */
2dcf00ce
AM
8694 (_("%pB(%pA+%#" PRIx64 "): error: "
8695 "%s with unexpected instruction %#x"),
8696 input_bfd, input_section, (uint64_t) rel->r_offset,
d3e454b9
AM
8697 "R_PPC_ADDR16_LO", insn);
8698 }
8699 }
8700
e054468f 8701 ifunc = NULL;
25f23106 8702 if (!htab->is_vxworks)
e054468f 8703 {
de972ffa
AM
8704 struct plt_entry *ent;
8705
e054468f
AM
8706 if (h != NULL)
8707 {
8708 if (h->type == STT_GNU_IFUNC)
8709 ifunc = &h->plt.plist;
8710 }
de972ffa
AM
8711 else if (local_got_offsets != NULL
8712 && ELF_ST_TYPE (sym->st_info) == STT_GNU_IFUNC)
e054468f 8713 {
de972ffa 8714 struct plt_entry **local_plt;
e054468f 8715
de972ffa
AM
8716 local_plt = (struct plt_entry **) (local_got_offsets
8717 + symtab_hdr->sh_info);
8718 ifunc = local_plt + r_symndx;
e054468f 8719 }
e054468f 8720
de972ffa
AM
8721 ent = NULL;
8722 if (ifunc != NULL
0e1862bb 8723 && (!bfd_link_pic (info)
08be3224
AM
8724 || is_branch_reloc (r_type)
8725 || r_type == R_PPC_PLT16_LO
8726 || r_type == R_PPC_PLT16_HI
8727 || r_type == R_PPC_PLT16_HA))
de972ffa
AM
8728 {
8729 addend = 0;
08be3224
AM
8730 if (bfd_link_pic (info)
8731 && (r_type == R_PPC_PLTREL24
8732 || r_type == R_PPC_PLT16_LO
8733 || r_type == R_PPC_PLT16_HI
8734 || r_type == R_PPC_PLT16_HA))
de972ffa
AM
8735 addend = rel->r_addend;
8736 ent = find_plt_ent (ifunc, got2, addend);
8737 }
8738 if (ent != NULL)
8739 {
888a7fc3
AM
8740 if (bfd_link_pic (info)
8741 && ent->sec != got2
8742 && htab->plt_type != PLT_NEW
8743 && (!htab->elf.dynamic_sections_created
8744 || h == NULL
8745 || h->dynindx == -1))
8746 {
8747 /* Uh oh, we are going to create a pic glink stub
8748 for an ifunc (here for h == NULL and later in
8749 finish_dynamic_symbol for h != NULL), and
8750 apparently are using code compiled with
8751 -mbss-plt. The difficulty is that -mbss-plt code
8752 gives no indication via a magic PLTREL24 addend
8753 whether r30 is equal to _GLOBAL_OFFSET_TABLE_ or
8754 is pointing into a .got2 section (and how far
8755 into .got2). */
8756 info->callbacks->einfo
695344c0 8757 /* xgettext:c-format */
174d0a74 8758 (_("%X%H: unsupported bss-plt -fPIC ifunc %s\n"),
888a7fc3
AM
8759 input_bfd, input_section, rel->r_offset, sym_name);
8760 }
e054468f
AM
8761
8762 unresolved_reloc = FALSE;
8763 if (htab->plt_type == PLT_NEW
8764 || !htab->elf.dynamic_sections_created
c7e17e05
AM
8765 || h == NULL
8766 || h->dynindx == -1)
e054468f
AM
8767 relocation = (htab->glink->output_section->vma
8768 + htab->glink->output_offset
8769 + (ent->glink_offset & ~1));
8770 else
ce558b89
AM
8771 relocation = (htab->elf.splt->output_section->vma
8772 + htab->elf.splt->output_offset
e054468f
AM
8773 + ent->plt.offset);
8774 }
8775 }
8776
7619e7c7 8777 addend = rel->r_addend;
23cedd1d 8778 save_unresolved_reloc = unresolved_reloc;
7619e7c7 8779 howto = NULL;
55fd94b0
AM
8780 if (r_type < R_PPC_max)
8781 howto = ppc_elf_howto_table[r_type];
9a23f96e
AM
8782
8783 switch (r_type)
8784 {
8785 default:
8786 break;
8787
8788 case R_PPC_TPREL16_HA:
8789 if (htab->do_tls_opt && relocation + addend + 0x8000 < 0x10000)
8790 {
8791 bfd_byte *p = contents + (rel->r_offset & ~3);
8792 unsigned int insn = bfd_get_32 (input_bfd, p);
8793 if ((insn & ((0x3f << 26) | 0x1f << 16))
8794 != ((15u << 26) | (2 << 16)) /* addis rt,2,imm */)
8795 /* xgettext:c-format */
8796 info->callbacks->minfo
8797 (_("%H: warning: %s unexpected insn %#x.\n"),
8798 input_bfd, input_section, rel->r_offset, howto->name, insn);
8799 else
8800 bfd_put_32 (input_bfd, NOP, p);
8801 }
8802 break;
8803
8804 case R_PPC_TPREL16_LO:
8805 if (htab->do_tls_opt && relocation + addend + 0x8000 < 0x10000)
8806 {
8807 bfd_byte *p = contents + (rel->r_offset & ~3);
8808 unsigned int insn = bfd_get_32 (input_bfd, p);
8809 insn &= ~(0x1f << 16);
8810 insn |= 2 << 16;
8811 bfd_put_32 (input_bfd, insn, p);
8812 }
8813 break;
8814 }
8815
8816 tls_type = 0;
7619e7c7 8817 switch (r_type)
252b5132
RH
8818 {
8819 default:
cf97bcb0
AM
8820 /* xgettext:c-format */
8821 _bfd_error_handler (_("%pB: %s unsupported"),
8822 input_bfd, howto->name);
252b5132
RH
8823
8824 bfd_set_error (bfd_error_bad_value);
b34976b6 8825 ret = FALSE;
c316a17c 8826 goto copy_reloc;
252b5132 8827
7619e7c7
AM
8828 case R_PPC_NONE:
8829 case R_PPC_TLS:
727fc41e
AM
8830 case R_PPC_TLSGD:
8831 case R_PPC_TLSLD:
7619e7c7
AM
8832 case R_PPC_EMB_MRKREF:
8833 case R_PPC_GNU_VTINHERIT:
8834 case R_PPC_GNU_VTENTRY:
c316a17c 8835 goto copy_reloc;
7595d193 8836
7619e7c7
AM
8837 /* GOT16 relocations. Like an ADDR16 using the symbol's
8838 address in the GOT as relocation value instead of the
8839 symbol's value itself. Also, create a GOT entry for the
8840 symbol and put the symbol value there. */
8841 case R_PPC_GOT_TLSGD16:
8842 case R_PPC_GOT_TLSGD16_LO:
8843 case R_PPC_GOT_TLSGD16_HI:
8844 case R_PPC_GOT_TLSGD16_HA:
8845 tls_type = TLS_TLS | TLS_GD;
8846 goto dogot;
8847
8848 case R_PPC_GOT_TLSLD16:
8849 case R_PPC_GOT_TLSLD16_LO:
8850 case R_PPC_GOT_TLSLD16_HI:
8851 case R_PPC_GOT_TLSLD16_HA:
8852 tls_type = TLS_TLS | TLS_LD;
8853 goto dogot;
8854
8855 case R_PPC_GOT_TPREL16:
8856 case R_PPC_GOT_TPREL16_LO:
8857 case R_PPC_GOT_TPREL16_HI:
8858 case R_PPC_GOT_TPREL16_HA:
8859 tls_type = TLS_TLS | TLS_TPREL;
8860 goto dogot;
8861
8862 case R_PPC_GOT_DTPREL16:
8863 case R_PPC_GOT_DTPREL16_LO:
8864 case R_PPC_GOT_DTPREL16_HI:
8865 case R_PPC_GOT_DTPREL16_HA:
8866 tls_type = TLS_TLS | TLS_DTPREL;
8867 goto dogot;
8868
8869 case R_PPC_GOT16:
8870 case R_PPC_GOT16_LO:
8871 case R_PPC_GOT16_HI:
8872 case R_PPC_GOT16_HA:
727fc41e 8873 tls_mask = 0;
7619e7c7
AM
8874 dogot:
8875 {
8876 /* Relocation is to the entry for this symbol in the global
8877 offset table. */
8878 bfd_vma off;
8879 bfd_vma *offp;
8880 unsigned long indx;
8881
ce558b89 8882 if (htab->elf.sgot == NULL)
7619e7c7
AM
8883 abort ();
8884
8885 indx = 0;
8886 if (tls_type == (TLS_TLS | TLS_LD)
d881513a 8887 && (h == NULL
f5385ebf 8888 || !h->def_dynamic))
7619e7c7
AM
8889 offp = &htab->tlsld_got.offset;
8890 else if (h != NULL)
8891 {
f0158f44
AM
8892 if (!htab->elf.dynamic_sections_created
8893 || h->dynindx == -1
8894 || SYMBOL_REFERENCES_LOCAL (info, h)
21d68fcd 8895 || UNDEFWEAK_NO_DYNAMIC_RELOC (info, h))
7619e7c7
AM
8896 /* This is actually a static link, or it is a
8897 -Bsymbolic link and the symbol is defined
8898 locally, or the symbol was forced to be local
8899 because of a version file. */
8900 ;
8901 else
8902 {
8903 indx = h->dynindx;
8904 unresolved_reloc = FALSE;
8905 }
8906 offp = &h->got.offset;
8907 }
8908 else
8909 {
8910 if (local_got_offsets == NULL)
8911 abort ();
8912 offp = &local_got_offsets[r_symndx];
8913 }
8914
8915 /* The offset must always be a multiple of 4. We use the
8916 least significant bit to record whether we have already
8917 processed this entry. */
8918 off = *offp;
8919 if ((off & 1) != 0)
8920 off &= ~1;
8921 else
8922 {
37da22e5
AM
8923 unsigned int tls_m = ((tls_mask & TLS_TLS) != 0
8924 ? tls_mask & (TLS_LD | TLS_GD | TLS_DTPREL
8925 | TLS_TPREL | TLS_TPRELGD)
8926 : 0);
70bccea4
AM
8927
8928 if (offp == &htab->tlsld_got.offset)
8929 tls_m = TLS_LD;
8930 else if (h == NULL
f5385ebf 8931 || !h->def_dynamic)
70bccea4
AM
8932 tls_m &= ~TLS_LD;
8933
8934 /* We might have multiple got entries for this sym.
8935 Initialize them all. */
8936 do
7619e7c7 8937 {
70bccea4
AM
8938 int tls_ty = 0;
8939
8940 if ((tls_m & TLS_LD) != 0)
7619e7c7 8941 {
70bccea4
AM
8942 tls_ty = TLS_TLS | TLS_LD;
8943 tls_m &= ~TLS_LD;
8944 }
8945 else if ((tls_m & TLS_GD) != 0)
8946 {
8947 tls_ty = TLS_TLS | TLS_GD;
8948 tls_m &= ~TLS_GD;
8949 }
8950 else if ((tls_m & TLS_DTPREL) != 0)
8951 {
8952 tls_ty = TLS_TLS | TLS_DTPREL;
8953 tls_m &= ~TLS_DTPREL;
8954 }
8955 else if ((tls_m & (TLS_TPREL | TLS_TPRELGD)) != 0)
8956 {
8957 tls_ty = TLS_TLS | TLS_TPREL;
8958 tls_m = 0;
7619e7c7 8959 }
7619e7c7 8960
70bccea4 8961 /* Generate relocs for the dynamic linker. */
f0158f44
AM
8962 if (indx != 0
8963 || (bfd_link_pic (info)
8964 && (h == NULL
21d68fcd 8965 || !UNDEFWEAK_NO_DYNAMIC_RELOC (info, h)
f15d0b54
AM
8966 || offp == &htab->tlsld_got.offset)
8967 && !(tls_ty == (TLS_TLS | TLS_TPREL)
8968 && bfd_link_executable (info)
8969 && SYMBOL_REFERENCES_LOCAL (info, h))))
7619e7c7 8970 {
ce558b89 8971 asection *rsec = htab->elf.srelgot;
91d6fa6a 8972 bfd_byte * loc;
91e21fb7 8973
0bed072f 8974 if (ifunc != NULL)
82e66161
AM
8975 {
8976 rsec = htab->elf.irelplt;
8977 if (indx == 0)
8978 htab->local_ifunc_resolver = 1;
8979 else if (is_static_defined (h))
8980 htab->maybe_local_ifunc_resolver = 1;
8981 }
ce558b89
AM
8982 outrel.r_offset = (htab->elf.sgot->output_section->vma
8983 + htab->elf.sgot->output_offset
70bccea4 8984 + off);
e515b051 8985 outrel.r_addend = 0;
70bccea4
AM
8986 if (tls_ty & (TLS_LD | TLS_GD))
8987 {
8988 outrel.r_info = ELF32_R_INFO (indx, R_PPC_DTPMOD32);
70bccea4
AM
8989 if (tls_ty == (TLS_TLS | TLS_GD))
8990 {
25f23106
AM
8991 loc = rsec->contents;
8992 loc += (rsec->reloc_count++
70bccea4
AM
8993 * sizeof (Elf32_External_Rela));
8994 bfd_elf32_swap_reloca_out (output_bfd,
8995 &outrel, loc);
e515b051 8996 outrel.r_offset += 4;
70bccea4
AM
8997 outrel.r_info
8998 = ELF32_R_INFO (indx, R_PPC_DTPREL32);
70bccea4
AM
8999 }
9000 }
9001 else if (tls_ty == (TLS_TLS | TLS_DTPREL))
9002 outrel.r_info = ELF32_R_INFO (indx, R_PPC_DTPREL32);
9003 else if (tls_ty == (TLS_TLS | TLS_TPREL))
9004 outrel.r_info = ELF32_R_INFO (indx, R_PPC_TPREL32);
25f23106 9005 else if (indx != 0)
70bccea4 9006 outrel.r_info = ELF32_R_INFO (indx, R_PPC_GLOB_DAT);
25f23106
AM
9007 else if (ifunc != NULL)
9008 outrel.r_info = ELF32_R_INFO (0, R_PPC_IRELATIVE);
9009 else
9010 outrel.r_info = ELF32_R_INFO (0, R_PPC_RELATIVE);
d6e14abc 9011 if (indx == 0 && tls_ty != (TLS_TLS | TLS_LD))
e515b051
AM
9012 {
9013 outrel.r_addend += relocation;
9014 if (tls_ty & (TLS_GD | TLS_DTPREL | TLS_TPREL))
989f9879
AM
9015 {
9016 if (htab->elf.tls_sec == NULL)
9017 outrel.r_addend = 0;
9018 else
9019 outrel.r_addend -= htab->elf.tls_sec->vma;
9020 }
e515b051 9021 }
25f23106
AM
9022 loc = rsec->contents;
9023 loc += (rsec->reloc_count++
70bccea4
AM
9024 * sizeof (Elf32_External_Rela));
9025 bfd_elf32_swap_reloca_out (output_bfd, &outrel, loc);
7619e7c7
AM
9026 }
9027
70bccea4
AM
9028 /* Init the .got section contents if we're not
9029 emitting a reloc. */
9030 else
7619e7c7 9031 {
70bccea4
AM
9032 bfd_vma value = relocation;
9033
f0158f44 9034 if (tls_ty != 0)
70bccea4 9035 {
989f9879
AM
9036 if (htab->elf.tls_sec == NULL)
9037 value = 0;
9038 else
9039 {
f0158f44
AM
9040 if (tls_ty & TLS_LD)
9041 value = 0;
9042 else
9043 value -= htab->elf.tls_sec->vma + DTP_OFFSET;
676ee2b5 9044 if (tls_ty & TLS_TPREL)
989f9879
AM
9045 value += DTP_OFFSET - TP_OFFSET;
9046 }
70bccea4 9047
f0158f44 9048 if (tls_ty & (TLS_LD | TLS_GD))
7b609f53 9049 {
95f0d0d2 9050 bfd_put_32 (input_bfd, value,
ce558b89 9051 htab->elf.sgot->contents + off + 4);
676ee2b5 9052 value = 1;
7b609f53 9053 }
70bccea4 9054 }
95f0d0d2 9055 bfd_put_32 (input_bfd, value,
ce558b89 9056 htab->elf.sgot->contents + off);
7619e7c7 9057 }
70bccea4
AM
9058
9059 off += 4;
9060 if (tls_ty & (TLS_LD | TLS_GD))
9061 off += 4;
7619e7c7 9062 }
70bccea4
AM
9063 while (tls_m != 0);
9064
9065 off = *offp;
9066 *offp = off | 1;
7619e7c7
AM
9067 }
9068
9069 if (off >= (bfd_vma) -2)
9070 abort ();
9071
70bccea4
AM
9072 if ((tls_type & TLS_TLS) != 0)
9073 {
9074 if (tls_type != (TLS_TLS | TLS_LD))
9075 {
9076 if ((tls_mask & TLS_LD) != 0
9077 && !(h == NULL
f5385ebf 9078 || !h->def_dynamic))
70bccea4
AM
9079 off += 8;
9080 if (tls_type != (TLS_TLS | TLS_GD))
9081 {
9082 if ((tls_mask & TLS_GD) != 0)
9083 off += 8;
9084 if (tls_type != (TLS_TLS | TLS_DTPREL))
9085 {
9086 if ((tls_mask & TLS_DTPREL) != 0)
9087 off += 4;
9088 }
9089 }
9090 }
9091 }
9092
d3e454b9
AM
9093 /* If here for a picfixup, we're done. */
9094 if (r_type != ELF32_R_TYPE (rel->r_info))
c316a17c 9095 goto copy_reloc;
d3e454b9 9096
ce558b89
AM
9097 relocation = (htab->elf.sgot->output_section->vma
9098 + htab->elf.sgot->output_offset
e87d4038
AM
9099 + off
9100 - SYM_VAL (htab->elf.hgot));
7619e7c7
AM
9101
9102 /* Addends on got relocations don't make much sense.
9103 x+off@got is actually x@got+off, and since the got is
9104 generated by a hash table traversal, the value in the
9105 got at entry m+n bears little relation to the entry m. */
9106 if (addend != 0)
25f53a85 9107 info->callbacks->einfo
695344c0 9108 /* xgettext:c-format */
174d0a74 9109 (_("%H: non-zero addend on %s reloc against `%s'\n"),
25f53a85 9110 input_bfd, input_section, rel->r_offset,
7b609f53 9111 howto->name,
7619e7c7
AM
9112 sym_name);
9113 }
86c95733 9114 break;
7619e7c7 9115
86c95733 9116 /* Relocations that need no special processing. */
7619e7c7 9117 case R_PPC_LOCAL24PC:
252b5132
RH
9118 /* It makes no sense to point a local relocation
9119 at a symbol not in this object. */
7b609f53 9120 if (unresolved_reloc)
252b5132 9121 {
1a72702b
AM
9122 (*info->callbacks->undefined_symbol) (info,
9123 h->root.root.string,
9124 input_bfd,
9125 input_section,
9126 rel->r_offset,
9127 TRUE);
c316a17c 9128 goto copy_reloc;
252b5132 9129 }
888a7fc3
AM
9130 if (h != NULL && h->type == STT_GNU_IFUNC && bfd_link_pic (info))
9131 {
9132 /* @local on an ifunc does not really make sense since
9133 the ifunc resolver can take you anywhere. More
9134 seriously, calls to ifuncs must go through a plt call
9135 stub, and for pic the plt call stubs uses r30 to
9136 access the PLT. The problem is that a call that is
9137 local won't have the +32k reloc addend trick marking
9138 -fPIC code, so the linker won't know whether r30 is
9139 _GLOBAL_OFFSET_TABLE_ or pointing into a .got2 section. */
695344c0 9140 /* xgettext:c-format */
174d0a74 9141 info->callbacks->einfo (_("%X%H: @local call to ifunc %s\n"),
888a7fc3
AM
9142 input_bfd, input_section, rel->r_offset,
9143 h->root.root.string);
9144 }
252b5132
RH
9145 break;
9146
7619e7c7
AM
9147 case R_PPC_DTPREL16:
9148 case R_PPC_DTPREL16_LO:
9149 case R_PPC_DTPREL16_HI:
9150 case R_PPC_DTPREL16_HA:
989f9879
AM
9151 if (htab->elf.tls_sec != NULL)
9152 addend -= htab->elf.tls_sec->vma + DTP_OFFSET;
7619e7c7
AM
9153 break;
9154
70bccea4
AM
9155 /* Relocations that may need to be propagated if this is a shared
9156 object. */
7619e7c7
AM
9157 case R_PPC_TPREL16:
9158 case R_PPC_TPREL16_LO:
9159 case R_PPC_TPREL16_HI:
9160 case R_PPC_TPREL16_HA:
766bc656
AM
9161 if (h != NULL
9162 && h->root.type == bfd_link_hash_undefweak
9163 && h->dynindx == -1)
9164 {
9165 /* Make this relocation against an undefined weak symbol
9166 resolve to zero. This is really just a tweak, since
9167 code using weak externs ought to check that they are
9168 defined before using them. */
9169 bfd_byte *p = contents + rel->r_offset - d_offset;
95f0d0d2 9170 unsigned int insn = bfd_get_32 (input_bfd, p);
766bc656
AM
9171 insn = _bfd_elf_ppc_at_tprel_transform (insn, 2);
9172 if (insn != 0)
95f0d0d2 9173 bfd_put_32 (input_bfd, insn, p);
766bc656
AM
9174 break;
9175 }
989f9879
AM
9176 if (htab->elf.tls_sec != NULL)
9177 addend -= htab->elf.tls_sec->vma + TP_OFFSET;
7619e7c7 9178 /* The TPREL16 relocs shouldn't really be used in shared
7c8bbca5
AM
9179 libs or with non-local symbols as that will result in
9180 DT_TEXTREL being set, but support them anyway. */
7619e7c7
AM
9181 goto dodyn;
9182
9183 case R_PPC_TPREL32:
989f9879
AM
9184 if (htab->elf.tls_sec != NULL)
9185 addend -= htab->elf.tls_sec->vma + TP_OFFSET;
7619e7c7
AM
9186 goto dodyn;
9187
9188 case R_PPC_DTPREL32:
989f9879
AM
9189 if (htab->elf.tls_sec != NULL)
9190 addend -= htab->elf.tls_sec->vma + DTP_OFFSET;
7619e7c7
AM
9191 goto dodyn;
9192
e515b051
AM
9193 case R_PPC_DTPMOD32:
9194 relocation = 1;
9195 addend = 0;
9196 goto dodyn;
9197
d7128ce4
AM
9198 case R_PPC_REL16:
9199 case R_PPC_REL16_LO:
9200 case R_PPC_REL16_HI:
9201 case R_PPC_REL16_HA:
a680de9a 9202 case R_PPC_REL16DX_HA:
d7128ce4
AM
9203 break;
9204
7619e7c7 9205 case R_PPC_REL32:
625af618
AM
9206 if (h == NULL || h == htab->elf.hgot)
9207 break;
9208 /* fall through */
9209
9210 case R_PPC_ADDR32:
9211 case R_PPC_ADDR16:
9212 case R_PPC_ADDR16_LO:
9213 case R_PPC_ADDR16_HI:
9214 case R_PPC_ADDR16_HA:
9215 case R_PPC_UADDR32:
9216 case R_PPC_UADDR16:
9217 goto dodyn;
9218
b9c361e0
JL
9219 case R_PPC_VLE_REL8:
9220 case R_PPC_VLE_REL15:
9221 case R_PPC_VLE_REL24:
625af618 9222 case R_PPC_REL24:
7619e7c7
AM
9223 case R_PPC_REL14:
9224 case R_PPC_REL14_BRTAKEN:
9225 case R_PPC_REL14_BRNTAKEN:
252b5132
RH
9226 /* If these relocations are not to a named symbol, they can be
9227 handled right here, no need to bother the dynamic linker. */
89200bf8 9228 if (SYMBOL_CALLS_LOCAL (info, h)
3b36f7e6 9229 || h == htab->elf.hgot)
252b5132 9230 break;
70bccea4 9231 /* fall through */
252b5132 9232
7619e7c7 9233 case R_PPC_ADDR24:
7619e7c7
AM
9234 case R_PPC_ADDR14:
9235 case R_PPC_ADDR14_BRTAKEN:
9236 case R_PPC_ADDR14_BRNTAKEN:
0e1862bb 9237 if (h != NULL && !bfd_link_pic (info))
625af618
AM
9238 break;
9239 /* fall through */
9240
7619e7c7 9241 dodyn:
3348747a
NS
9242 if ((input_section->flags & SEC_ALLOC) == 0
9243 || is_vxworks_tls)
c87b5a93 9244 break;
c87b5a93 9245
287c7eaf
AM
9246 if (bfd_link_pic (info)
9247 ? ((h == NULL
9248 || ppc_elf_hash_entry (h)->dyn_relocs != NULL)
9249 && ((h != NULL && pc_dynrelocs (h))
9250 || must_be_dyn_reloc (info, r_type)))
9251 : (h != NULL
9252 && ppc_elf_hash_entry (h)->dyn_relocs != NULL))
252b5132 9253 {
0bb2d96a 9254 int skip;
f95f8542
AM
9255 bfd_byte *loc;
9256 asection *sreloc;
82e66161
AM
9257 long indx = 0;
9258
252b5132 9259#ifdef DEBUG
55fd94b0
AM
9260 fprintf (stderr, "ppc_elf_relocate_section needs to "
9261 "create relocation for %s\n",
70bccea4
AM
9262 (h && h->root.root.string
9263 ? h->root.root.string : "<unknown>"));
252b5132
RH
9264#endif
9265
9266 /* When generating a shared object, these relocations
70bccea4
AM
9267 are copied into the output file to be resolved at run
9268 time. */
0bb2d96a 9269 skip = 0;
5b914448
AM
9270 outrel.r_offset = _bfd_elf_section_offset (output_bfd, info,
9271 input_section,
9272 rel->r_offset);
0bb2d96a
JJ
9273 if (outrel.r_offset == (bfd_vma) -1
9274 || outrel.r_offset == (bfd_vma) -2)
9275 skip = (int) outrel.r_offset;
252b5132
RH
9276 outrel.r_offset += (input_section->output_section->vma
9277 + input_section->output_offset);
9278
9279 if (skip)
9280 memset (&outrel, 0, sizeof outrel);
21d68fcd 9281 else if (!SYMBOL_REFERENCES_LOCAL (info, h))
252b5132 9282 {
82e66161
AM
9283 indx = h->dynindx;
9284 BFD_ASSERT (indx != -1);
7619e7c7 9285 unresolved_reloc = FALSE;
82e66161 9286 outrel.r_info = ELF32_R_INFO (indx, r_type);
252b5132
RH
9287 outrel.r_addend = rel->r_addend;
9288 }
9289 else
9290 {
47388f4c
AM
9291 outrel.r_addend = relocation + rel->r_addend;
9292
25f23106 9293 if (r_type != R_PPC_ADDR32)
252b5132 9294 {
25f23106
AM
9295 if (ifunc != NULL)
9296 {
9297 /* If we get here when building a static
9298 executable, then the libc startup function
9299 responsible for applying indirect function
9300 relocations is going to complain about
9301 the reloc type.
9302 If we get here when building a dynamic
9303 executable, it will be because we have
9304 a text relocation. The dynamic loader
9305 will set the text segment writable and
9306 non-executable to apply text relocations.
9307 So we'll segfault when trying to run the
9308 indirection function to resolve the reloc. */
25f53a85 9309 info->callbacks->einfo
695344c0 9310 /* xgettext:c-format */
174d0a74 9311 (_("%H: relocation %s for indirect "
25f53a85
AM
9312 "function %s unsupported\n"),
9313 input_bfd, input_section, rel->r_offset,
25f23106
AM
9314 howto->name,
9315 sym_name);
9316 ret = FALSE;
9317 }
cf35638d 9318 else if (r_symndx == STN_UNDEF || bfd_is_abs_section (sec))
89200bf8 9319 ;
252b5132
RH
9320 else if (sec == NULL || sec->owner == NULL)
9321 {
9322 bfd_set_error (bfd_error_bad_value);
89200bf8 9323 ret = FALSE;
252b5132
RH
9324 }
9325 else
9326 {
9327 asection *osec;
9328
47388f4c
AM
9329 /* We are turning this relocation into one
9330 against a section symbol. It would be
9331 proper to subtract the symbol's value,
9332 osec->vma, from the emitted reloc addend,
25f23106
AM
9333 but ld.so expects buggy relocs.
9334 FIXME: Why not always use a zero index? */
252b5132
RH
9335 osec = sec->output_section;
9336 indx = elf_section_data (osec)->dynindx;
74541ad4
AM
9337 if (indx == 0)
9338 {
9339 osec = htab->elf.text_index_section;
9340 indx = elf_section_data (osec)->dynindx;
9341 }
9342 BFD_ASSERT (indx != 0);
252b5132 9343#ifdef DEBUG
74541ad4 9344 if (indx == 0)
e460dd0d 9345 printf ("indx=%ld section=%s flags=%08x name=%s\n",
55fd94b0
AM
9346 indx, osec->name, osec->flags,
9347 h->root.root.string);
252b5132
RH
9348#endif
9349 }
9350
9351 outrel.r_info = ELF32_R_INFO (indx, r_type);
252b5132 9352 }
25f23106
AM
9353 else if (ifunc != NULL)
9354 outrel.r_info = ELF32_R_INFO (0, R_PPC_IRELATIVE);
9355 else
9356 outrel.r_info = ELF32_R_INFO (0, R_PPC_RELATIVE);
252b5132
RH
9357 }
9358
82e66161
AM
9359 sreloc = elf_section_data (input_section)->sreloc;
9360 if (ifunc)
9361 {
9362 sreloc = htab->elf.irelplt;
9363 if (indx == 0)
9364 htab->local_ifunc_resolver = 1;
9365 else if (is_static_defined (h))
9366 htab->maybe_local_ifunc_resolver = 1;
9367 }
9368 if (sreloc == NULL)
9369 return FALSE;
9370
947216bf
AM
9371 loc = sreloc->contents;
9372 loc += sreloc->reloc_count++ * sizeof (Elf32_External_Rela);
9373 bfd_elf32_swap_reloca_out (output_bfd, &outrel, loc);
252b5132 9374
2243deae 9375 if (skip == -1)
c316a17c 9376 goto copy_reloc;
2243deae 9377
f0158f44
AM
9378 /* This reloc will be computed at runtime. Clear the memory
9379 so that it contains a predictable value for prelink. */
9380 if (!skip)
2243deae
L
9381 {
9382 relocation = howto->pc_relative ? outrel.r_offset : 0;
9383 addend = 0;
9384 break;
9385 }
252b5132 9386 }
252b5132
RH
9387 break;
9388
32af9f6e
AM
9389 case R_PPC_RELAX_PLT:
9390 case R_PPC_RELAX_PLTREL24:
de972ffa
AM
9391 if (h != NULL)
9392 {
32af9f6e
AM
9393 struct plt_entry *ent;
9394 bfd_vma got2_addend = 0;
9395
9396 if (r_type == R_PPC_RELAX_PLTREL24)
9397 {
0e1862bb 9398 if (bfd_link_pic (info))
32af9f6e
AM
9399 got2_addend = addend;
9400 addend = 0;
9401 }
9402 ent = find_plt_ent (&h->plt.plist, got2, got2_addend);
de972ffa
AM
9403 if (htab->plt_type == PLT_NEW)
9404 relocation = (htab->glink->output_section->vma
9405 + htab->glink->output_offset
9406 + ent->glink_offset);
9407 else
ce558b89
AM
9408 relocation = (htab->elf.splt->output_section->vma
9409 + htab->elf.splt->output_offset
de972ffa
AM
9410 + ent->plt.offset);
9411 }
1a0670f3 9412 /* Fall through. */
b4a38de6 9413
32af9f6e 9414 case R_PPC_RELAX:
9abc968f 9415 {
53291d1f
AM
9416 const int *stub;
9417 size_t size;
9418 size_t insn_offset = rel->r_offset;
9419 unsigned int insn;
9abc968f 9420
0e1862bb 9421 if (bfd_link_pic (info))
53291d1f
AM
9422 {
9423 relocation -= (input_section->output_section->vma
9424 + input_section->output_offset
9425 + rel->r_offset - 4);
9426 stub = shared_stub_entry;
95f0d0d2
AM
9427 bfd_put_32 (input_bfd, stub[0], contents + insn_offset - 12);
9428 bfd_put_32 (input_bfd, stub[1], contents + insn_offset - 8);
9429 bfd_put_32 (input_bfd, stub[2], contents + insn_offset - 4);
53291d1f
AM
9430 stub += 3;
9431 size = ARRAY_SIZE (shared_stub_entry) - 3;
9432 }
9433 else
9434 {
9435 stub = stub_entry;
9436 size = ARRAY_SIZE (stub_entry);
9437 }
9abc968f 9438
9abc968f 9439 relocation += addend;
0e1862bb 9440 if (bfd_link_relocatable (info))
53291d1f
AM
9441 relocation = 0;
9442
9443 /* First insn is HA, second is LO. */
9444 insn = *stub++;
9445 insn |= ((relocation + 0x8000) >> 16) & 0xffff;
95f0d0d2 9446 bfd_put_32 (input_bfd, insn, contents + insn_offset);
53291d1f
AM
9447 insn_offset += 4;
9448
9449 insn = *stub++;
9450 insn |= relocation & 0xffff;
95f0d0d2 9451 bfd_put_32 (input_bfd, insn, contents + insn_offset);
53291d1f
AM
9452 insn_offset += 4;
9453 size -= 2;
9454
9455 while (size != 0)
9456 {
9457 insn = *stub++;
9458 --size;
95f0d0d2 9459 bfd_put_32 (input_bfd, insn, contents + insn_offset);
53291d1f
AM
9460 insn_offset += 4;
9461 }
9bc4e62b
NS
9462
9463 /* Rewrite the reloc and convert one of the trailing nop
9464 relocs to describe this relocation. */
9465 BFD_ASSERT (ELF32_R_TYPE (relend[-1].r_info) == R_PPC_NONE);
9466 /* The relocs are at the bottom 2 bytes */
c316a17c
AM
9467 wrel->r_offset = rel->r_offset + d_offset;
9468 wrel->r_info = ELF32_R_INFO (r_symndx, R_PPC_ADDR16_HA);
9469 wrel->r_addend = rel->r_addend;
9470 memmove (wrel + 1, wrel, (relend - wrel - 1) * sizeof (*wrel));
9471 wrel++, rel++;
9472 wrel->r_offset += 4;
9473 wrel->r_info = ELF32_R_INFO (r_symndx, R_PPC_ADDR16_LO);
9abc968f 9474 }
8517fae7 9475 continue;
deaaf2f3 9476
70bccea4 9477 /* Indirect .sdata relocation. */
7619e7c7 9478 case R_PPC_EMB_SDAI16:
c9a2f333 9479 BFD_ASSERT (htab->sdata[0].section != NULL);
bd6c6e2b
AM
9480 if (!is_static_defined (htab->sdata[0].sym))
9481 {
9482 unresolved_reloc = TRUE;
9483 break;
9484 }
7619e7c7 9485 relocation
76750a2f
AM
9486 = elf_finish_pointer_linker_section (input_bfd, &htab->sdata[0],
9487 h, relocation, rel);
bd6c6e2b 9488 addend = 0;
252b5132
RH
9489 break;
9490
70bccea4 9491 /* Indirect .sdata2 relocation. */
7619e7c7 9492 case R_PPC_EMB_SDA2I16:
c9a2f333 9493 BFD_ASSERT (htab->sdata[1].section != NULL);
bd6c6e2b
AM
9494 if (!is_static_defined (htab->sdata[1].sym))
9495 {
9496 unresolved_reloc = TRUE;
9497 break;
9498 }
7619e7c7 9499 relocation
76750a2f
AM
9500 = elf_finish_pointer_linker_section (input_bfd, &htab->sdata[1],
9501 h, relocation, rel);
bd6c6e2b 9502 addend = 0;
252b5132
RH
9503 break;
9504
70bccea4
AM
9505 /* Handle the TOC16 reloc. We want to use the offset within the .got
9506 section, not the actual VMA. This is appropriate when generating
9507 an embedded ELF object, for which the .got section acts like the
9508 AIX .toc section. */
7619e7c7 9509 case R_PPC_TOC16: /* phony GOT16 relocations */
3b4f3a11
AM
9510 if (sec == NULL || sec->output_section == NULL)
9511 {
9512 unresolved_reloc = TRUE;
9513 break;
9514 }
a0f49396
NC
9515 BFD_ASSERT (strcmp (bfd_get_section_name (sec->owner, sec),
9516 ".got") == 0
9517 || strcmp (bfd_get_section_name (sec->owner, sec),
9518 ".cgot") == 0);
252b5132 9519
3b4f3a11 9520 addend -= sec->output_section->vma + sec->output_offset + 0x8000;
252b5132
RH
9521 break;
9522
7619e7c7 9523 case R_PPC_PLTREL24:
f75e0e33
AM
9524 if (h != NULL && ifunc == NULL)
9525 {
cbf95972
AM
9526 struct plt_entry *ent;
9527
9528 ent = find_plt_ent (&h->plt.plist, got2,
9529 bfd_link_pic (info) ? addend : 0);
f75e0e33 9530 if (ent == NULL
ce558b89 9531 || htab->elf.splt == NULL)
f75e0e33
AM
9532 {
9533 /* We didn't make a PLT entry for this symbol. This
9534 happens when statically linking PIC code, or when
9535 using -Bsymbolic. */
9536 }
9537 else
9538 {
9539 /* Relocation is to the entry for this symbol in the
9540 procedure linkage table. */
9541 unresolved_reloc = FALSE;
9542 if (htab->plt_type == PLT_NEW)
9543 relocation = (htab->glink->output_section->vma
9544 + htab->glink->output_offset
9545 + ent->glink_offset);
9546 else
ce558b89
AM
9547 relocation = (htab->elf.splt->output_section->vma
9548 + htab->elf.splt->output_offset
f75e0e33
AM
9549 + ent->plt.offset);
9550 }
9551 }
252b5132 9552
f75e0e33
AM
9553 /* R_PPC_PLTREL24 is rather special. If non-zero, the
9554 addend specifies the GOT pointer offset within .got2.
9555 Don't apply it to the relocation field. */
9556 addend = 0;
8da6118f 9557 break;
252b5132 9558
23cedd1d
AM
9559 case R_PPC_PLTSEQ:
9560 case R_PPC_PLTCALL:
08be3224
AM
9561 case R_PPC_PLT16_LO:
9562 case R_PPC_PLT16_HI:
9563 case R_PPC_PLT16_HA:
2d7ad24e 9564 plt_list = NULL;
08be3224
AM
9565 if (h != NULL)
9566 plt_list = &h->plt.plist;
2d7ad24e
AM
9567 else if (ifunc != NULL)
9568 plt_list = ifunc;
9569 else if (local_got_offsets != NULL)
9570 {
9571 struct plt_entry **local_plt;
9572 local_plt = (struct plt_entry **) (local_got_offsets
9573 + symtab_hdr->sh_info);
9574 plt_list = local_plt + r_symndx;
9575 }
08be3224
AM
9576 unresolved_reloc = TRUE;
9577 if (plt_list != NULL)
9578 {
9579 struct plt_entry *ent;
9580
9581 ent = find_plt_ent (plt_list, got2,
9582 bfd_link_pic (info) ? addend : 0);
2d7ad24e 9583 if (ent != NULL && ent->plt.offset != (bfd_vma) -1)
08be3224 9584 {
2d7ad24e
AM
9585 asection *plt;
9586
08be3224 9587 unresolved_reloc = FALSE;
2d7ad24e
AM
9588 plt = htab->elf.splt;
9589 if (!htab->elf.dynamic_sections_created
9590 || h == NULL
9591 || h->dynindx == -1)
9592 {
9593 if (ifunc != NULL)
9594 plt = htab->elf.iplt;
9595 else
9596 plt = htab->pltlocal;
9597 }
9598 relocation = (plt->output_section->vma
9599 + plt->output_offset
08be3224
AM
9600 + ent->plt.offset);
9601 if (bfd_link_pic (info))
9602 {
9603 bfd_vma got = 0;
9604
9605 if (ent->addend >= 32768)
9606 got = (ent->addend
9607 + ent->sec->output_section->vma
9608 + ent->sec->output_offset);
9609 else
9610 got = SYM_VAL (htab->elf.hgot);
9611 relocation -= got;
9612 }
9613 }
9614 }
9615 addend = 0;
9616 break;
9617
70bccea4 9618 /* Relocate against _SDA_BASE_. */
7619e7c7 9619 case R_PPC_SDAREL16:
252b5132
RH
9620 {
9621 const char *name;
bd6c6e2b 9622 struct elf_link_hash_entry *sda = htab->sdata[0].sym;
252b5132 9623
bd6c6e2b
AM
9624 if (sec == NULL
9625 || sec->output_section == NULL
9626 || !is_static_defined (sda))
3b4f3a11
AM
9627 {
9628 unresolved_reloc = TRUE;
9629 break;
9630 }
bd6c6e2b 9631 addend -= SYM_VAL (sda);
3b4f3a11 9632
a0f49396 9633 name = bfd_get_section_name (output_bfd, sec->output_section);
93d1b056
AM
9634 if (!(strcmp (name, ".sdata") == 0
9635 || strcmp (name, ".sbss") == 0))
252b5132 9636 {
cf97bcb0 9637 _bfd_error_handler
695344c0 9638 /* xgettext:c-format */
cf97bcb0
AM
9639 (_("%pB: the target (%s) of a %s relocation is "
9640 "in the wrong output section (%s)"),
d003868e 9641 input_bfd,
55fd94b0
AM
9642 sym_name,
9643 howto->name,
9644 name);
252b5132 9645 }
252b5132
RH
9646 }
9647 break;
9648
70bccea4 9649 /* Relocate against _SDA2_BASE_. */
7619e7c7 9650 case R_PPC_EMB_SDA2REL:
252b5132
RH
9651 {
9652 const char *name;
bd6c6e2b 9653 struct elf_link_hash_entry *sda = htab->sdata[1].sym;
252b5132 9654
bd6c6e2b
AM
9655 if (sec == NULL
9656 || sec->output_section == NULL
9657 || !is_static_defined (sda))
3b4f3a11
AM
9658 {
9659 unresolved_reloc = TRUE;
9660 break;
9661 }
bd6c6e2b 9662 addend -= SYM_VAL (sda);
3b4f3a11 9663
a0f49396 9664 name = bfd_get_section_name (output_bfd, sec->output_section);
93d1b056
AM
9665 if (!(strcmp (name, ".sdata2") == 0
9666 || strcmp (name, ".sbss2") == 0))
252b5132 9667 {
cf97bcb0 9668 _bfd_error_handler
695344c0 9669 /* xgettext:c-format */
cf97bcb0
AM
9670 (_("%pB: the target (%s) of a %s relocation is "
9671 "in the wrong output section (%s)"),
d003868e 9672 input_bfd,
55fd94b0
AM
9673 sym_name,
9674 howto->name,
9675 name);
252b5132 9676 }
252b5132
RH
9677 }
9678 break;
9679
b9c361e0 9680 case R_PPC_VLE_LO16A:
86c95733 9681 relocation = relocation + addend;
08dc996f
AM
9682 ppc_elf_vle_split16 (input_bfd, input_section, rel->r_offset,
9683 contents + rel->r_offset, relocation,
9684 split16a_type, htab->params->vle_reloc_fixup);
c316a17c 9685 goto copy_reloc;
b9c361e0
JL
9686
9687 case R_PPC_VLE_LO16D:
86c95733 9688 relocation = relocation + addend;
08dc996f
AM
9689 ppc_elf_vle_split16 (input_bfd, input_section, rel->r_offset,
9690 contents + rel->r_offset, relocation,
9691 split16d_type, htab->params->vle_reloc_fixup);
c316a17c 9692 goto copy_reloc;
b9c361e0
JL
9693
9694 case R_PPC_VLE_HI16A:
86c95733 9695 relocation = (relocation + addend) >> 16;
08dc996f
AM
9696 ppc_elf_vle_split16 (input_bfd, input_section, rel->r_offset,
9697 contents + rel->r_offset, relocation,
9698 split16a_type, htab->params->vle_reloc_fixup);
c316a17c 9699 goto copy_reloc;
b9c361e0
JL
9700
9701 case R_PPC_VLE_HI16D:
86c95733 9702 relocation = (relocation + addend) >> 16;
08dc996f
AM
9703 ppc_elf_vle_split16 (input_bfd, input_section, rel->r_offset,
9704 contents + rel->r_offset, relocation,
9705 split16d_type, htab->params->vle_reloc_fixup);
c316a17c 9706 goto copy_reloc;
b9c361e0
JL
9707
9708 case R_PPC_VLE_HA16A:
86c95733 9709 relocation = (relocation + addend + 0x8000) >> 16;
08dc996f
AM
9710 ppc_elf_vle_split16 (input_bfd, input_section, rel->r_offset,
9711 contents + rel->r_offset, relocation,
9712 split16a_type, htab->params->vle_reloc_fixup);
c316a17c 9713 goto copy_reloc;
b9c361e0
JL
9714
9715 case R_PPC_VLE_HA16D:
86c95733 9716 relocation = (relocation + addend + 0x8000) >> 16;
08dc996f
AM
9717 ppc_elf_vle_split16 (input_bfd, input_section, rel->r_offset,
9718 contents + rel->r_offset, relocation,
9719 split16d_type, htab->params->vle_reloc_fixup);
c316a17c 9720 goto copy_reloc;
b9c361e0 9721
70bccea4 9722 /* Relocate against either _SDA_BASE_, _SDA2_BASE_, or 0. */
7619e7c7 9723 case R_PPC_EMB_SDA21:
b9c361e0 9724 case R_PPC_VLE_SDA21:
7619e7c7 9725 case R_PPC_EMB_RELSDA:
b9c361e0 9726 case R_PPC_VLE_SDA21_LO:
252b5132
RH
9727 {
9728 const char *name;
9729 int reg;
86c95733 9730 unsigned int insn;
bd6c6e2b 9731 struct elf_link_hash_entry *sda = NULL;
252b5132 9732
3b4f3a11
AM
9733 if (sec == NULL || sec->output_section == NULL)
9734 {
9735 unresolved_reloc = TRUE;
9736 break;
9737 }
9738
a0f49396 9739 name = bfd_get_section_name (output_bfd, sec->output_section);
93d1b056
AM
9740 if (strcmp (name, ".sdata") == 0
9741 || strcmp (name, ".sbss") == 0)
252b5132
RH
9742 {
9743 reg = 13;
bd6c6e2b 9744 sda = htab->sdata[0].sym;
252b5132 9745 }
93d1b056
AM
9746 else if (strcmp (name, ".sdata2") == 0
9747 || strcmp (name, ".sbss2") == 0)
252b5132
RH
9748 {
9749 reg = 2;
bd6c6e2b 9750 sda = htab->sdata[1].sym;
252b5132 9751 }
8da6118f
KH
9752 else if (strcmp (name, ".PPC.EMB.sdata0") == 0
9753 || strcmp (name, ".PPC.EMB.sbss0") == 0)
252b5132
RH
9754 {
9755 reg = 0;
9756 }
252b5132
RH
9757 else
9758 {
cf97bcb0 9759 _bfd_error_handler
695344c0 9760 /* xgettext:c-format */
cf97bcb0
AM
9761 (_("%pB: the target (%s) of a %s relocation is "
9762 "in the wrong output section (%s)"),
d003868e 9763 input_bfd,
55fd94b0
AM
9764 sym_name,
9765 howto->name,
9766 name);
252b5132
RH
9767
9768 bfd_set_error (bfd_error_bad_value);
b34976b6 9769 ret = FALSE;
c316a17c 9770 goto copy_reloc;
252b5132
RH
9771 }
9772
bd6c6e2b
AM
9773 if (sda != NULL)
9774 {
9775 if (!is_static_defined (sda))
9776 {
9777 unresolved_reloc = TRUE;
9778 break;
9779 }
9780 addend -= SYM_VAL (sda);
9781 }
9782
95f0d0d2 9783 insn = bfd_get_32 (input_bfd, contents + rel->r_offset);
b9c361e0
JL
9784 if (reg == 0
9785 && (r_type == R_PPC_VLE_SDA21
9786 || r_type == R_PPC_VLE_SDA21_LO))
9787 {
86c95733
AM
9788 relocation = relocation + addend;
9789 addend = 0;
9790
9791 /* Force e_li insn, keeping RT from original insn. */
9792 insn &= 0x1f << 21;
9793 insn |= 28u << 26;
9794
9795 /* We have an li20 field, bits 17..20, 11..15, 21..31. */
9796 /* Top 4 bits of value to 17..20. */
9797 insn |= (relocation & 0xf0000) >> 5;
9798 /* Next 5 bits of the value to 11..15. */
9799 insn |= (relocation & 0xf800) << 5;
9800 /* And the final 11 bits of the value to bits 21 to 31. */
9801 insn |= relocation & 0x7ff;
9802
95f0d0d2 9803 bfd_put_32 (input_bfd, insn, contents + rel->r_offset);
c3301df1
AM
9804
9805 if (r_type == R_PPC_VLE_SDA21
9806 && ((relocation + 0x80000) & 0xffffffff) > 0x100000)
9807 goto overflow;
c316a17c 9808 goto copy_reloc;
b9c361e0
JL
9809 }
9810 else if (r_type == R_PPC_EMB_SDA21
9811 || r_type == R_PPC_VLE_SDA21
9812 || r_type == R_PPC_VLE_SDA21_LO)
91d6fa6a 9813 {
86c95733 9814 /* Fill in register field. */
252b5132 9815 insn = (insn & ~RA_REGISTER_MASK) | (reg << RA_REGISTER_SHIFT);
252b5132 9816 }
95f0d0d2 9817 bfd_put_32 (input_bfd, insn, contents + rel->r_offset);
252b5132
RH
9818 }
9819 break;
9820
b9c361e0
JL
9821 case R_PPC_VLE_SDAREL_LO16A:
9822 case R_PPC_VLE_SDAREL_LO16D:
9823 case R_PPC_VLE_SDAREL_HI16A:
9824 case R_PPC_VLE_SDAREL_HI16D:
9825 case R_PPC_VLE_SDAREL_HA16A:
9826 case R_PPC_VLE_SDAREL_HA16D:
9827 {
9828 bfd_vma value;
9829 const char *name;
b9c361e0
JL
9830 struct elf_link_hash_entry *sda = NULL;
9831
9832 if (sec == NULL || sec->output_section == NULL)
9833 {
9834 unresolved_reloc = TRUE;
9835 break;
9836 }
9837
a0f49396 9838 name = bfd_get_section_name (output_bfd, sec->output_section);
93d1b056
AM
9839 if (strcmp (name, ".sdata") == 0
9840 || strcmp (name, ".sbss") == 0)
5499c7c7 9841 sda = htab->sdata[0].sym;
93d1b056
AM
9842 else if (strcmp (name, ".sdata2") == 0
9843 || strcmp (name, ".sbss2") == 0)
5499c7c7 9844 sda = htab->sdata[1].sym;
b9c361e0
JL
9845 else
9846 {
4eca0228 9847 _bfd_error_handler
695344c0 9848 /* xgettext:c-format */
871b3ab2 9849 (_("%pB: the target (%s) of a %s relocation is "
b9c361e0
JL
9850 "in the wrong output section (%s)"),
9851 input_bfd,
9852 sym_name,
9853 howto->name,
9854 name);
9855
9856 bfd_set_error (bfd_error_bad_value);
9857 ret = FALSE;
c316a17c 9858 goto copy_reloc;
b9c361e0
JL
9859 }
9860
5499c7c7 9861 if (sda == NULL || !is_static_defined (sda))
b9c361e0 9862 {
5499c7c7
AM
9863 unresolved_reloc = TRUE;
9864 break;
b9c361e0 9865 }
5499c7c7 9866 value = relocation + addend - SYM_VAL (sda);
86c95733
AM
9867
9868 if (r_type == R_PPC_VLE_SDAREL_LO16A)
08dc996f
AM
9869 ppc_elf_vle_split16 (input_bfd, input_section, rel->r_offset,
9870 contents + rel->r_offset, value,
9871 split16a_type,
9872 htab->params->vle_reloc_fixup);
86c95733 9873 else if (r_type == R_PPC_VLE_SDAREL_LO16D)
08dc996f
AM
9874 ppc_elf_vle_split16 (input_bfd, input_section, rel->r_offset,
9875 contents + rel->r_offset, value,
9876 split16d_type,
9877 htab->params->vle_reloc_fixup);
86c95733 9878 else if (r_type == R_PPC_VLE_SDAREL_HI16A)
b9c361e0 9879 {
86c95733 9880 value = value >> 16;
08dc996f
AM
9881 ppc_elf_vle_split16 (input_bfd, input_section, rel->r_offset,
9882 contents + rel->r_offset, value,
9883 split16a_type,
9884 htab->params->vle_reloc_fixup);
b9c361e0 9885 }
86c95733 9886 else if (r_type == R_PPC_VLE_SDAREL_HI16D)
b9c361e0 9887 {
86c95733 9888 value = value >> 16;
08dc996f
AM
9889 ppc_elf_vle_split16 (input_bfd, input_section, rel->r_offset,
9890 contents + rel->r_offset, value,
9891 split16d_type,
9892 htab->params->vle_reloc_fixup);
b9c361e0 9893 }
86c95733 9894 else if (r_type == R_PPC_VLE_SDAREL_HA16A)
b9c361e0 9895 {
86c95733 9896 value = (value + 0x8000) >> 16;
08dc996f
AM
9897 ppc_elf_vle_split16 (input_bfd, input_section, rel->r_offset,
9898 contents + rel->r_offset, value,
9899 split16a_type,
9900 htab->params->vle_reloc_fixup);
b9c361e0 9901 }
86c95733 9902 else if (r_type == R_PPC_VLE_SDAREL_HA16D)
b9c361e0 9903 {
86c95733 9904 value = (value + 0x8000) >> 16;
08dc996f
AM
9905 ppc_elf_vle_split16 (input_bfd, input_section, rel->r_offset,
9906 contents + rel->r_offset, value,
9907 split16d_type,
9908 htab->params->vle_reloc_fixup);
b9c361e0
JL
9909 }
9910 }
c316a17c 9911 goto copy_reloc;
b9c361e0 9912
83eef883
AFB
9913 case R_PPC_VLE_ADDR20:
9914 ppc_elf_vle_split20 (output_bfd, contents + rel->r_offset, relocation);
9915 continue;
9916
70bccea4 9917 /* Relocate against the beginning of the section. */
7619e7c7
AM
9918 case R_PPC_SECTOFF:
9919 case R_PPC_SECTOFF_LO:
9920 case R_PPC_SECTOFF_HI:
9921 case R_PPC_SECTOFF_HA:
3b4f3a11
AM
9922 if (sec == NULL || sec->output_section == NULL)
9923 {
9924 unresolved_reloc = TRUE;
9925 break;
9926 }
252b5132 9927 addend -= sec->output_section->vma;
252b5132
RH
9928 break;
9929
70bccea4 9930 /* Negative relocations. */
7619e7c7
AM
9931 case R_PPC_EMB_NADDR32:
9932 case R_PPC_EMB_NADDR16:
9933 case R_PPC_EMB_NADDR16_LO:
9934 case R_PPC_EMB_NADDR16_HI:
9935 case R_PPC_EMB_NADDR16_HA:
8da6118f 9936 addend -= 2 * relocation;
252b5132
RH
9937 break;
9938
7619e7c7
AM
9939 case R_PPC_COPY:
9940 case R_PPC_GLOB_DAT:
9941 case R_PPC_JMP_SLOT:
9942 case R_PPC_RELATIVE:
e054468f 9943 case R_PPC_IRELATIVE:
7619e7c7
AM
9944 case R_PPC_PLT32:
9945 case R_PPC_PLTREL32:
7619e7c7
AM
9946 case R_PPC_ADDR30:
9947 case R_PPC_EMB_RELSEC16:
9948 case R_PPC_EMB_RELST_LO:
9949 case R_PPC_EMB_RELST_HI:
9950 case R_PPC_EMB_RELST_HA:
9951 case R_PPC_EMB_BIT_FLD:
cf97bcb0
AM
9952 /* xgettext:c-format */
9953 _bfd_error_handler (_("%pB: %s unsupported"),
9954 input_bfd, howto->name);
252b5132
RH
9955
9956 bfd_set_error (bfd_error_invalid_operation);
b34976b6 9957 ret = FALSE;
c316a17c 9958 goto copy_reloc;
7619e7c7 9959 }
252b5132 9960
23cedd1d
AM
9961 switch (r_type)
9962 {
9963 default:
9964 break;
9965
9966 case R_PPC_PLTCALL:
9967 if (unresolved_reloc)
9968 {
9969 bfd_byte *p = contents + rel->r_offset;
9970 unsigned int insn = bfd_get_32 (input_bfd, p);
9971 insn &= 1;
9972 bfd_put_32 (input_bfd, B | insn, p);
9973 unresolved_reloc = save_unresolved_reloc;
9974 r_type = R_PPC_REL24;
9975 howto = ppc_elf_howto_table[r_type];
9976 }
9977 else if (htab->plt_type != PLT_NEW)
9978 info->callbacks->einfo
9979 (_("%P: %H: %s relocation unsupported for bss-plt\n"),
9980 input_bfd, input_section, rel->r_offset,
9981 howto->name);
9982 break;
9983
9984 case R_PPC_PLTSEQ:
9985 case R_PPC_PLT16_HA:
9986 case R_PPC_PLT16_LO:
9987 if (unresolved_reloc)
9988 {
9989 bfd_byte *p = contents + (rel->r_offset & ~3);
9990 bfd_put_32 (input_bfd, NOP, p);
9991 unresolved_reloc = FALSE;
9992 r_type = R_PPC_NONE;
9993 howto = ppc_elf_howto_table[r_type];
9994 }
9995 else if (htab->plt_type != PLT_NEW)
9996 info->callbacks->einfo
9997 (_("%P: %H: %s relocation unsupported for bss-plt\n"),
9998 input_bfd, input_section, rel->r_offset,
9999 howto->name);
10000 break;
10001 }
10002
7619e7c7
AM
10003 /* Do any further special processing. */
10004 switch (r_type)
10005 {
10006 default:
10007 break;
10008
10009 case R_PPC_ADDR16_HA:
d7128ce4 10010 case R_PPC_REL16_HA:
a680de9a 10011 case R_PPC_REL16DX_HA:
7619e7c7
AM
10012 case R_PPC_SECTOFF_HA:
10013 case R_PPC_TPREL16_HA:
10014 case R_PPC_DTPREL16_HA:
7619e7c7
AM
10015 case R_PPC_EMB_NADDR16_HA:
10016 case R_PPC_EMB_RELST_HA:
10017 /* It's just possible that this symbol is a weak symbol
7b609f53 10018 that's not actually defined anywhere. In that case,
7619e7c7
AM
10019 'sec' would be NULL, and we should leave the symbol
10020 alone (it will be set to zero elsewhere in the link). */
5c5f6e17
AM
10021 if (sec == NULL)
10022 break;
1a0670f3 10023 /* Fall through. */
5c5f6e17
AM
10024
10025 case R_PPC_PLT16_HA:
10026 case R_PPC_GOT16_HA:
10027 case R_PPC_GOT_TLSGD16_HA:
10028 case R_PPC_GOT_TLSLD16_HA:
10029 case R_PPC_GOT_TPREL16_HA:
10030 case R_PPC_GOT_DTPREL16_HA:
10031 /* Add 0x10000 if sign bit in 0:15 is set.
10032 Bits 0:15 are not used. */
10033 addend += 0x8000;
7619e7c7 10034 break;
1fe532cf
AM
10035
10036 case R_PPC_ADDR16:
10037 case R_PPC_ADDR16_LO:
10038 case R_PPC_GOT16:
10039 case R_PPC_GOT16_LO:
10040 case R_PPC_SDAREL16:
10041 case R_PPC_SECTOFF:
10042 case R_PPC_SECTOFF_LO:
10043 case R_PPC_DTPREL16:
10044 case R_PPC_DTPREL16_LO:
10045 case R_PPC_TPREL16:
10046 case R_PPC_TPREL16_LO:
10047 case R_PPC_GOT_TLSGD16:
10048 case R_PPC_GOT_TLSGD16_LO:
10049 case R_PPC_GOT_TLSLD16:
10050 case R_PPC_GOT_TLSLD16_LO:
10051 case R_PPC_GOT_DTPREL16:
10052 case R_PPC_GOT_DTPREL16_LO:
10053 case R_PPC_GOT_TPREL16:
10054 case R_PPC_GOT_TPREL16_LO:
10055 {
10056 /* The 32-bit ABI lacks proper relocations to deal with
10057 certain 64-bit instructions. Prevent damage to bits
10058 that make up part of the insn opcode. */
10059 unsigned int insn, mask, lobit;
10060
95f0d0d2 10061 insn = bfd_get_32 (input_bfd,
c316a17c 10062 contents + rel->r_offset - d_offset);
1fe532cf
AM
10063 mask = 0;
10064 if (is_insn_ds_form (insn))
10065 mask = 3;
10066 else if (is_insn_dq_form (insn))
10067 mask = 15;
10068 else
10069 break;
a680de9a
PB
10070 relocation += addend;
10071 addend = insn & mask;
10072 lobit = mask & relocation;
1fe532cf
AM
10073 if (lobit != 0)
10074 {
a680de9a 10075 relocation ^= lobit;
1fe532cf 10076 info->callbacks->einfo
695344c0 10077 /* xgettext:c-format */
174d0a74 10078 (_("%H: error: %s against `%s' not a multiple of %u\n"),
1fe532cf
AM
10079 input_bfd, input_section, rel->r_offset,
10080 howto->name, sym_name, mask + 1);
10081 bfd_set_error (bfd_error_bad_value);
10082 ret = FALSE;
10083 }
1fe532cf
AM
10084 }
10085 break;
252b5132
RH
10086 }
10087
252b5132 10088#ifdef DEBUG
55fd94b0
AM
10089 fprintf (stderr, "\ttype = %s (%d), name = %s, symbol index = %ld, "
10090 "offset = %ld, addend = %ld\n",
252b5132 10091 howto->name,
8da6118f 10092 (int) r_type,
252b5132
RH
10093 sym_name,
10094 r_symndx,
7619e7c7 10095 (long) rel->r_offset,
8da6118f 10096 (long) addend);
252b5132
RH
10097#endif
10098
7619e7c7
AM
10099 if (unresolved_reloc
10100 && !((input_section->flags & SEC_DEBUGGING) != 0
1d5316ab
AM
10101 && h->def_dynamic)
10102 && _bfd_elf_section_offset (output_bfd, info, input_section,
10103 rel->r_offset) != (bfd_vma) -1)
7619e7c7 10104 {
25f53a85 10105 info->callbacks->einfo
695344c0 10106 /* xgettext:c-format */
174d0a74 10107 (_("%H: unresolvable %s relocation against symbol `%s'\n"),
25f53a85 10108 input_bfd, input_section, rel->r_offset,
7b609f53 10109 howto->name,
7619e7c7
AM
10110 sym_name);
10111 ret = FALSE;
10112 }
10113
86c95733
AM
10114 /* 16-bit fields in insns mostly have signed values, but a
10115 few insns have 16-bit unsigned values. Really, we should
10116 have different reloc types. */
10117 if (howto->complain_on_overflow != complain_overflow_dont
10118 && howto->dst_mask == 0xffff
10119 && (input_section->flags & SEC_CODE) != 0)
10120 {
10121 enum complain_overflow complain = complain_overflow_signed;
10122
10123 if ((elf_section_flags (input_section) & SHF_PPC_VLE) == 0)
10124 {
10125 unsigned int insn;
10126
10127 insn = bfd_get_32 (input_bfd, contents + (rel->r_offset & ~3));
a47622ac
AM
10128 if ((insn & (0x3f << 26)) == 10u << 26 /* cmpli */)
10129 complain = complain_overflow_bitfield;
10130 else if ((insn & (0x3f << 26)) == 28u << 26 /* andi */
10131 || (insn & (0x3f << 26)) == 24u << 26 /* ori */
10132 || (insn & (0x3f << 26)) == 26u << 26 /* xori */)
86c95733
AM
10133 complain = complain_overflow_unsigned;
10134 }
10135 if (howto->complain_on_overflow != complain)
10136 {
10137 alt_howto = *howto;
10138 alt_howto.complain_on_overflow = complain;
10139 howto = &alt_howto;
10140 }
10141 }
10142
a680de9a
PB
10143 if (r_type == R_PPC_REL16DX_HA)
10144 {
10145 /* Split field reloc isn't handled by _bfd_final_link_relocate. */
10146 if (rel->r_offset + 4 > input_section->size)
10147 r = bfd_reloc_outofrange;
10148 else
10149 {
10150 unsigned int insn;
10151
10152 relocation += addend;
10153 relocation -= (rel->r_offset
10154 + input_section->output_offset
10155 + input_section->output_section->vma);
10156 relocation >>= 16;
10157 insn = bfd_get_32 (input_bfd, contents + rel->r_offset);
10158 insn &= ~0x1fffc1;
10159 insn |= (relocation & 0xffc1) | ((relocation & 0x3e) << 15);
10160 bfd_put_32 (input_bfd, insn, contents + rel->r_offset);
10161 r = bfd_reloc_ok;
10162 }
10163 }
10164 else
10165 r = _bfd_final_link_relocate (howto, input_bfd, input_section, contents,
10166 rel->r_offset, relocation, addend);
252b5132 10167
7619e7c7 10168 if (r != bfd_reloc_ok)
252b5132 10169 {
7619e7c7 10170 if (r == bfd_reloc_overflow)
252b5132 10171 {
c3301df1 10172 overflow:
8131c122
AM
10173 /* On code like "if (foo) foo();" don't report overflow
10174 on a branch to zero when foo is undefined. */
10175 if (!warned
10176 && !(h != NULL
10177 && (h->root.type == bfd_link_hash_undefweak
10178 || h->root.type == bfd_link_hash_undefined)
10179 && is_branch_reloc (r_type)))
1a72702b
AM
10180 info->callbacks->reloc_overflow
10181 (info, (h ? &h->root : NULL), sym_name, howto->name,
10182 rel->r_addend, input_bfd, input_section, rel->r_offset);
dc1bc0c9
RH
10183 }
10184 else
10185 {
25f53a85 10186 info->callbacks->einfo
695344c0 10187 /* xgettext:c-format */
174d0a74 10188 (_("%H: %s reloc against `%s': error %d\n"),
25f53a85
AM
10189 input_bfd, input_section, rel->r_offset,
10190 howto->name, sym_name, (int) r);
7619e7c7 10191 ret = FALSE;
252b5132
RH
10192 }
10193 }
c316a17c
AM
10194 copy_reloc:
10195 if (wrel != rel)
10196 *wrel = *rel;
10197 }
10198
10199 if (wrel != rel)
10200 {
10201 Elf_Internal_Shdr *rel_hdr;
10202 size_t deleted = rel - wrel;
10203
10204 rel_hdr = _bfd_elf_single_rel_hdr (input_section->output_section);
10205 rel_hdr->sh_size -= rel_hdr->sh_entsize * deleted;
10206 if (rel_hdr->sh_size == 0)
10207 {
10208 /* It is too late to remove an empty reloc section. Leave
10209 one NONE reloc.
10210 ??? What is wrong with an empty section??? */
10211 rel_hdr->sh_size = rel_hdr->sh_entsize;
10212 deleted -= 1;
10213 wrel++;
10214 }
10215 relend = wrel;
10216 rel_hdr = _bfd_elf_single_rel_hdr (input_section);
10217 rel_hdr->sh_size -= rel_hdr->sh_entsize * deleted;
10218 input_section->reloc_count -= deleted;
252b5132
RH
10219 }
10220
252b5132
RH
10221#ifdef DEBUG
10222 fprintf (stderr, "\n");
10223#endif
10224
53291d1f
AM
10225 if (input_section->sec_info_type == SEC_INFO_TYPE_TARGET
10226 && input_section->size != input_section->rawsize
10227 && (strcmp (input_section->output_section->name, ".init") == 0
10228 || strcmp (input_section->output_section->name, ".fini") == 0))
10229 {
10230 /* Branch around the trampolines. */
10231 unsigned int insn = B + input_section->size - input_section->rawsize;
10232 bfd_put_32 (input_bfd, insn, contents + input_section->rawsize);
10233 }
10234
5446cbdf 10235 if (htab->params->ppc476_workaround
795bc6b3 10236 && input_section->sec_info_type == SEC_INFO_TYPE_TARGET
0e1862bb 10237 && (!bfd_link_relocatable (info)
795bc6b3
AM
10238 || (input_section->output_section->alignment_power
10239 >= htab->params->pagesize_p2)))
5446cbdf 10240 {
5446cbdf 10241 bfd_vma start_addr, end_addr, addr;
795bc6b3 10242 bfd_vma pagesize = (bfd_vma) 1 << htab->params->pagesize_p2;
5446cbdf 10243
5446cbdf 10244 if (relax_info->workaround_size != 0)
40fd06d1
AM
10245 {
10246 bfd_byte *p;
10247 unsigned int n;
10248 bfd_byte fill[4];
10249
10250 bfd_put_32 (input_bfd, BA, fill);
10251 p = contents + input_section->size - relax_info->workaround_size;
10252 n = relax_info->workaround_size >> 2;
10253 while (n--)
10254 {
10255 memcpy (p, fill, 4);
10256 p += 4;
10257 }
10258 }
5446cbdf
AM
10259
10260 /* The idea is: Replace the last instruction on a page with a
10261 branch to a patch area. Put the insn there followed by a
10262 branch back to the next page. Complicated a little by
10263 needing to handle moved conditional branches, and by not
10264 wanting to touch data-in-text. */
10265
10266 start_addr = (input_section->output_section->vma
10267 + input_section->output_offset);
10268 end_addr = (start_addr + input_section->size
10269 - relax_info->workaround_size);
10270 for (addr = ((start_addr & -pagesize) + pagesize - 4);
10271 addr < end_addr;
10272 addr += pagesize)
10273 {
10274 bfd_vma offset = addr - start_addr;
10275 Elf_Internal_Rela *lo, *hi;
10276 bfd_boolean is_data;
10277 bfd_vma patch_off, patch_addr;
10278 unsigned int insn;
10279
10280 /* Do we have a data reloc at this offset? If so, leave
10281 the word alone. */
10282 is_data = FALSE;
10283 lo = relocs;
668e22e5
AM
10284 hi = relend;
10285 rel = NULL;
5446cbdf
AM
10286 while (lo < hi)
10287 {
10288 rel = lo + (hi - lo) / 2;
10289 if (rel->r_offset < offset)
10290 lo = rel + 1;
668e22e5 10291 else if (rel->r_offset > offset + 3)
5446cbdf
AM
10292 hi = rel;
10293 else
10294 {
10295 switch (ELF32_R_TYPE (rel->r_info))
10296 {
10297 case R_PPC_ADDR32:
10298 case R_PPC_UADDR32:
10299 case R_PPC_REL32:
10300 case R_PPC_ADDR30:
10301 is_data = TRUE;
10302 break;
10303 default:
10304 break;
10305 }
10306 break;
10307 }
10308 }
10309 if (is_data)
10310 continue;
10311
b4ab4364
AM
10312 /* Some instructions can be left alone too. Unconditional
10313 branches, except for bcctr with BO=0x14 (bctr, bctrl),
10314 avoid the icache failure.
10315
10316 The problem occurs due to prefetch across a page boundary
10317 where stale instructions can be fetched from the next
10318 page, and the mechanism for flushing these bad
10319 instructions fails under certain circumstances. The
10320 unconditional branches:
10321 1) Branch: b, bl, ba, bla,
10322 2) Branch Conditional: bc, bca, bcl, bcla,
10323 3) Branch Conditional to Link Register: bclr, bclrl,
10324 where (2) and (3) have BO=0x14 making them unconditional,
10325 prevent the bad prefetch because the prefetch itself is
10326 affected by these instructions. This happens even if the
10327 instruction is not executed.
10328
10329 A bctr example:
10330 .
10331 . lis 9,new_page@ha
10332 . addi 9,9,new_page@l
10333 . mtctr 9
10334 . bctr
10335 . nop
10336 . nop
10337 . new_page:
10338 .
10339 The bctr is not predicted taken due to ctr not being
10340 ready, so prefetch continues on past the bctr into the
10341 new page which might have stale instructions. If they
10342 fail to be flushed, then they will be executed after the
10343 bctr executes. Either of the following modifications
10344 prevent the bad prefetch from happening in the first
10345 place:
10346 .
1b786873
L
10347 . lis 9,new_page@ha lis 9,new_page@ha
10348 . addi 9,9,new_page@l addi 9,9,new_page@l
10349 . mtctr 9 mtctr 9
10350 . bctr bctr
b4ab4364 10351 . nop b somewhere_else
1b786873
L
10352 . b somewhere_else nop
10353 . new_page: new_page:
b4ab4364 10354 . */
5446cbdf 10355 insn = bfd_get_32 (input_bfd, contents + offset);
07d6d2b8
AM
10356 if ((insn & (0x3f << 26)) == (18u << 26) /* b,bl,ba,bla */
10357 || ((insn & (0x3f << 26)) == (16u << 26) /* bc,bcl,bca,bcla*/
10358 && (insn & (0x14 << 21)) == (0x14 << 21)) /* with BO=0x14 */
5446cbdf 10359 || ((insn & (0x3f << 26)) == (19u << 26)
b4ab4364 10360 && (insn & (0x3ff << 1)) == (16u << 1) /* bclr,bclrl */
07d6d2b8 10361 && (insn & (0x14 << 21)) == (0x14 << 21)))/* with BO=0x14 */
5446cbdf
AM
10362 continue;
10363
10364 patch_addr = (start_addr + input_section->size
10365 - relax_info->workaround_size);
10366 patch_addr = (patch_addr + 15) & -16;
10367 patch_off = patch_addr - start_addr;
10368 bfd_put_32 (input_bfd, B + patch_off - offset, contents + offset);
668e22e5
AM
10369
10370 if (rel != NULL
10371 && rel->r_offset >= offset
10372 && rel->r_offset < offset + 4)
10373 {
f8b44781
AM
10374 asection *sreloc;
10375
668e22e5
AM
10376 /* If the insn we are patching had a reloc, adjust the
10377 reloc r_offset so that the reloc applies to the moved
10378 location. This matters for -r and --emit-relocs. */
10379 if (rel + 1 != relend)
10380 {
10381 Elf_Internal_Rela tmp = *rel;
10382
10383 /* Keep the relocs sorted by r_offset. */
10384 memmove (rel, rel + 1, (relend - (rel + 1)) * sizeof (*rel));
10385 relend[-1] = tmp;
10386 }
10387 relend[-1].r_offset += patch_off - offset;
f8b44781
AM
10388
10389 /* Adjust REL16 addends too. */
10390 switch (ELF32_R_TYPE (relend[-1].r_info))
10391 {
10392 case R_PPC_REL16:
10393 case R_PPC_REL16_LO:
10394 case R_PPC_REL16_HI:
10395 case R_PPC_REL16_HA:
10396 relend[-1].r_addend += patch_off - offset;
10397 break;
10398 default:
10399 break;
10400 }
10401
10402 /* If we are building a PIE or shared library with
10403 non-PIC objects, perhaps we had a dynamic reloc too?
10404 If so, the dynamic reloc must move with the insn. */
10405 sreloc = elf_section_data (input_section)->sreloc;
10406 if (sreloc != NULL)
10407 {
1d5c94cb 10408 Elf32_External_Rela *slo, *shi, *srelend;
f8b44781
AM
10409 bfd_vma soffset;
10410
1d5c94cb
AM
10411 slo = (Elf32_External_Rela *) sreloc->contents;
10412 shi = srelend = slo + sreloc->reloc_count;
f8b44781
AM
10413 soffset = (offset + input_section->output_section->vma
10414 + input_section->output_offset);
10415 while (slo < shi)
10416 {
1d5c94cb
AM
10417 Elf32_External_Rela *srel = slo + (shi - slo) / 2;
10418 bfd_elf32_swap_reloca_in (output_bfd, (bfd_byte *) srel,
10419 &outrel);
f8b44781
AM
10420 if (outrel.r_offset < soffset)
10421 slo = srel + 1;
10422 else if (outrel.r_offset > soffset + 3)
10423 shi = srel;
10424 else
10425 {
1d5c94cb 10426 if (srel + 1 != srelend)
f8b44781 10427 {
1d5c94cb
AM
10428 memmove (srel, srel + 1,
10429 (srelend - (srel + 1)) * sizeof (*srel));
10430 srel = srelend - 1;
f8b44781
AM
10431 }
10432 outrel.r_offset += patch_off - offset;
1d5c94cb
AM
10433 bfd_elf32_swap_reloca_out (output_bfd, &outrel,
10434 (bfd_byte *) srel);
f8b44781
AM
10435 break;
10436 }
10437 }
10438 }
668e22e5
AM
10439 }
10440 else
10441 rel = NULL;
10442
5446cbdf
AM
10443 if ((insn & (0x3f << 26)) == (16u << 26) /* bc */
10444 && (insn & 2) == 0 /* relative */)
10445 {
10446 bfd_vma delta = ((insn & 0xfffc) ^ 0x8000) - 0x8000;
10447
10448 delta += offset - patch_off;
0e1862bb 10449 if (bfd_link_relocatable (info) && rel != NULL)
668e22e5 10450 delta = 0;
0e1862bb 10451 if (!bfd_link_relocatable (info) && rel != NULL)
668e22e5
AM
10452 {
10453 enum elf_ppc_reloc_type r_type;
10454
10455 r_type = ELF32_R_TYPE (relend[-1].r_info);
10456 if (r_type == R_PPC_REL14_BRTAKEN)
10457 insn |= BRANCH_PREDICT_BIT;
10458 else if (r_type == R_PPC_REL14_BRNTAKEN)
10459 insn &= ~BRANCH_PREDICT_BIT;
10460 else
10461 BFD_ASSERT (r_type == R_PPC_REL14);
10462
10463 if ((r_type == R_PPC_REL14_BRTAKEN
10464 || r_type == R_PPC_REL14_BRNTAKEN)
10465 && delta + 0x8000 < 0x10000
10466 && (bfd_signed_vma) delta < 0)
10467 insn ^= BRANCH_PREDICT_BIT;
10468 }
5446cbdf
AM
10469 if (delta + 0x8000 < 0x10000)
10470 {
10471 bfd_put_32 (input_bfd,
10472 (insn & ~0xfffc) | (delta & 0xfffc),
10473 contents + patch_off);
10474 patch_off += 4;
10475 bfd_put_32 (input_bfd,
10476 B | ((offset + 4 - patch_off) & 0x3fffffc),
10477 contents + patch_off);
10478 patch_off += 4;
10479 }
10480 else
10481 {
668e22e5
AM
10482 if (rel != NULL)
10483 {
10484 unsigned int r_sym = ELF32_R_SYM (relend[-1].r_info);
10485
10486 relend[-1].r_offset += 8;
10487 relend[-1].r_info = ELF32_R_INFO (r_sym, R_PPC_REL24);
10488 }
5446cbdf
AM
10489 bfd_put_32 (input_bfd,
10490 (insn & ~0xfffc) | 8,
10491 contents + patch_off);
10492 patch_off += 4;
10493 bfd_put_32 (input_bfd,
10494 B | ((offset + 4 - patch_off) & 0x3fffffc),
10495 contents + patch_off);
10496 patch_off += 4;
10497 bfd_put_32 (input_bfd,
10498 B | ((delta - 8) & 0x3fffffc),
10499 contents + patch_off);
10500 patch_off += 4;
10501 }
10502 }
10503 else
10504 {
10505 bfd_put_32 (input_bfd, insn, contents + patch_off);
10506 patch_off += 4;
10507 bfd_put_32 (input_bfd,
10508 B | ((offset + 4 - patch_off) & 0x3fffffc),
10509 contents + patch_off);
10510 patch_off += 4;
10511 }
10512 BFD_ASSERT (patch_off <= input_section->size);
10513 relax_info->workaround_size = input_section->size - patch_off;
10514 }
10515 }
10516
252b5132
RH
10517 return ret;
10518}
252b5132 10519\f
49c09209 10520/* Write out the PLT relocs and entries for H. */
c5fccbec 10521
b34976b6 10522static bfd_boolean
49c09209 10523write_global_sym_plt (struct elf_link_hash_entry *h, void *inf)
e1a9cb8e 10524{
49c09209
AM
10525 struct bfd_link_info *info = (struct bfd_link_info *) inf;
10526 struct ppc_elf_link_hash_table *htab = ppc_elf_hash_table (info);
a6aa5195
AM
10527 struct plt_entry *ent;
10528 bfd_boolean doneone;
e1a9cb8e 10529
a6aa5195
AM
10530 doneone = FALSE;
10531 for (ent = h->plt.plist; ent != NULL; ent = ent->next)
10532 if (ent->plt.offset != (bfd_vma) -1)
10533 {
10534 if (!doneone)
10535 {
10536 Elf_Internal_Rela rela;
10537 bfd_byte *loc;
10538 bfd_vma reloc_index;
2d7ad24e
AM
10539 asection *plt = htab->elf.splt;
10540 asection *relplt = htab->elf.srelplt;
e1a9cb8e 10541
e054468f 10542 if (htab->plt_type == PLT_NEW
25f23106
AM
10543 || !htab->elf.dynamic_sections_created
10544 || h->dynindx == -1)
9d8504b1
PB
10545 reloc_index = ent->plt.offset / 4;
10546 else
10547 {
10548 reloc_index = ((ent->plt.offset - htab->plt_initial_entry_size)
10549 / htab->plt_slot_size);
10550 if (reloc_index > PLT_NUM_SINGLE_ENTRIES
4a3dc543 10551 && htab->plt_type == PLT_OLD)
9d8504b1
PB
10552 reloc_index -= (reloc_index - PLT_NUM_SINGLE_ENTRIES) / 2;
10553 }
10554
a6aa5195
AM
10555 /* This symbol has an entry in the procedure linkage table.
10556 Set it up. */
e054468f 10557 if (htab->plt_type == PLT_VXWORKS
25f23106
AM
10558 && htab->elf.dynamic_sections_created
10559 && h->dynindx != -1)
a6aa5195 10560 {
9d8504b1
PB
10561 bfd_vma got_offset;
10562 const bfd_vma *plt_entry;
5b914448 10563
9d8504b1
PB
10564 /* The first three entries in .got.plt are reserved. */
10565 got_offset = (reloc_index + 3) * 4;
10566
10567 /* Use the right PLT. */
0e1862bb 10568 plt_entry = bfd_link_pic (info) ? ppc_elf_vxworks_pic_plt_entry
9d8504b1
PB
10569 : ppc_elf_vxworks_plt_entry;
10570
10571 /* Fill in the .plt on VxWorks. */
0e1862bb 10572 if (bfd_link_pic (info))
9d8504b1 10573 {
49c09209 10574 bfd_put_32 (info->output_bfd,
e87d4038 10575 plt_entry[0] | PPC_HA (got_offset),
2d7ad24e 10576 plt->contents + ent->plt.offset + 0);
49c09209 10577 bfd_put_32 (info->output_bfd,
e87d4038 10578 plt_entry[1] | PPC_LO (got_offset),
2d7ad24e 10579 plt->contents + ent->plt.offset + 4);
9d8504b1
PB
10580 }
10581 else
10582 {
e87d4038 10583 bfd_vma got_loc = got_offset + SYM_VAL (htab->elf.hgot);
9d8504b1 10584
49c09209 10585 bfd_put_32 (info->output_bfd,
e87d4038 10586 plt_entry[0] | PPC_HA (got_loc),
2d7ad24e 10587 plt->contents + ent->plt.offset + 0);
49c09209 10588 bfd_put_32 (info->output_bfd,
e87d4038 10589 plt_entry[1] | PPC_LO (got_loc),
2d7ad24e 10590 plt->contents + ent->plt.offset + 4);
9d8504b1
PB
10591 }
10592
49c09209 10593 bfd_put_32 (info->output_bfd, plt_entry[2],
2d7ad24e 10594 plt->contents + ent->plt.offset + 8);
49c09209 10595 bfd_put_32 (info->output_bfd, plt_entry[3],
2d7ad24e 10596 plt->contents + ent->plt.offset + 12);
9d8504b1
PB
10597
10598 /* This instruction is an immediate load. The value loaded is
10599 the byte offset of the R_PPC_JMP_SLOT relocation from the
10600 start of the .rela.plt section. The value is stored in the
10601 low-order 16 bits of the load instruction. */
10602 /* NOTE: It appears that this is now an index rather than a
10603 prescaled offset. */
49c09209 10604 bfd_put_32 (info->output_bfd,
9d8504b1 10605 plt_entry[4] | reloc_index,
2d7ad24e 10606 plt->contents + ent->plt.offset + 16);
9d8504b1
PB
10607 /* This instruction is a PC-relative branch whose target is
10608 the start of the PLT section. The address of this branch
10609 instruction is 20 bytes beyond the start of this PLT entry.
10610 The address is encoded in bits 6-29, inclusive. The value
10611 stored is right-shifted by two bits, permitting a 26-bit
10612 offset. */
49c09209 10613 bfd_put_32 (info->output_bfd,
5b914448 10614 (plt_entry[5]
9d8504b1 10615 | (-(ent->plt.offset + 20) & 0x03fffffc)),
2d7ad24e 10616 plt->contents + ent->plt.offset + 20);
49c09209 10617 bfd_put_32 (info->output_bfd, plt_entry[6],
2d7ad24e 10618 plt->contents + ent->plt.offset + 24);
49c09209 10619 bfd_put_32 (info->output_bfd, plt_entry[7],
2d7ad24e 10620 plt->contents + ent->plt.offset + 28);
9d8504b1
PB
10621
10622 /* Fill in the GOT entry corresponding to this PLT slot with
a8685210 10623 the address immediately after the "bctr" instruction
9d8504b1 10624 in this PLT entry. */
2d7ad24e
AM
10625 bfd_put_32 (info->output_bfd, (plt->output_section->vma
10626 + plt->output_offset
10627 + ent->plt.offset + 16),
ce558b89 10628 htab->elf.sgotplt->contents + got_offset);
9d8504b1 10629
0e1862bb 10630 if (!bfd_link_pic (info))
9d8504b1
PB
10631 {
10632 /* Fill in a couple of entries in .rela.plt.unloaded. */
10633 loc = htab->srelplt2->contents
10634 + ((VXWORKS_PLTRESOLVE_RELOCS + reloc_index
10635 * VXWORKS_PLT_NON_JMP_SLOT_RELOCS)
10636 * sizeof (Elf32_External_Rela));
10637
10638 /* Provide the @ha relocation for the first instruction. */
2d7ad24e
AM
10639 rela.r_offset = (plt->output_section->vma
10640 + plt->output_offset
9d8504b1 10641 + ent->plt.offset + 2);
636ce3f5 10642 rela.r_info = ELF32_R_INFO (htab->elf.hgot->indx,
9d8504b1
PB
10643 R_PPC_ADDR16_HA);
10644 rela.r_addend = got_offset;
49c09209 10645 bfd_elf32_swap_reloca_out (info->output_bfd, &rela, loc);
9d8504b1
PB
10646 loc += sizeof (Elf32_External_Rela);
10647
10648 /* Provide the @l relocation for the second instruction. */
2d7ad24e
AM
10649 rela.r_offset = (plt->output_section->vma
10650 + plt->output_offset
9d8504b1 10651 + ent->plt.offset + 6);
636ce3f5 10652 rela.r_info = ELF32_R_INFO (htab->elf.hgot->indx,
9d8504b1
PB
10653 R_PPC_ADDR16_LO);
10654 rela.r_addend = got_offset;
49c09209 10655 bfd_elf32_swap_reloca_out (info->output_bfd, &rela, loc);
9d8504b1
PB
10656 loc += sizeof (Elf32_External_Rela);
10657
10658 /* Provide a relocation for the GOT entry corresponding to this
10659 PLT slot. Point it at the middle of the .plt entry. */
ce558b89
AM
10660 rela.r_offset = (htab->elf.sgotplt->output_section->vma
10661 + htab->elf.sgotplt->output_offset
9d8504b1 10662 + got_offset);
7325306f 10663 rela.r_info = ELF32_R_INFO (htab->elf.hplt->indx,
9d8504b1
PB
10664 R_PPC_ADDR32);
10665 rela.r_addend = ent->plt.offset + 16;
49c09209 10666 bfd_elf32_swap_reloca_out (info->output_bfd, &rela, loc);
9d8504b1
PB
10667 }
10668
10669 /* VxWorks uses non-standard semantics for R_PPC_JMP_SLOT.
10670 In particular, the offset for the relocation is not the
10671 address of the PLT entry for this function, as specified
10672 by the ABI. Instead, the offset is set to the address of
10673 the GOT slot for this function. See EABI 4.4.4.1. */
ce558b89
AM
10674 rela.r_offset = (htab->elf.sgotplt->output_section->vma
10675 + htab->elf.sgotplt->output_offset
9d8504b1 10676 + got_offset);
2d7ad24e 10677 rela.r_addend = 0;
a6aa5195
AM
10678 }
10679 else
10680 {
2d7ad24e 10681 rela.r_addend = 0;
25f23106
AM
10682 if (!htab->elf.dynamic_sections_created
10683 || h->dynindx == -1)
2d7ad24e
AM
10684 {
10685 if (h->type == STT_GNU_IFUNC)
10686 {
10687 plt = htab->elf.iplt;
10688 relplt = htab->elf.irelplt;
10689 }
10690 else
10691 {
10692 plt = htab->pltlocal;
10693 relplt = bfd_link_pic (info) ? htab->relpltlocal : NULL;
10694 }
10695 if (h->def_regular
10696 && (h->root.type == bfd_link_hash_defined
10697 || h->root.type == bfd_link_hash_defweak))
10698 rela.r_addend = SYM_VAL (h);
10699 }
e054468f 10700
2d7ad24e 10701 if (relplt == NULL)
9d8504b1 10702 {
2d7ad24e
AM
10703 loc = plt->contents + ent->plt.offset;
10704 bfd_put_32 (info->output_bfd, rela.r_addend, loc);
9d8504b1
PB
10705 }
10706 else
10707 {
2d7ad24e
AM
10708 rela.r_offset = (plt->output_section->vma
10709 + plt->output_offset
10710 + ent->plt.offset);
10711
10712 if (htab->plt_type == PLT_OLD
10713 || !htab->elf.dynamic_sections_created
10714 || h->dynindx == -1)
10715 {
10716 /* We don't need to fill in the .plt. The ppc dynamic
10717 linker will fill it in. */
10718 }
10719 else
10720 {
10721 bfd_vma val = (htab->glink_pltresolve + ent->plt.offset
10722 + htab->glink->output_section->vma
10723 + htab->glink->output_offset);
10724 bfd_put_32 (info->output_bfd, val,
10725 plt->contents + ent->plt.offset);
10726 }
9d8504b1 10727 }
a6aa5195 10728 }
e1a9cb8e 10729
2d7ad24e 10730 if (relplt != NULL)
e054468f 10731 {
2d7ad24e
AM
10732 /* Fill in the entry in the .rela.plt section. */
10733 if (!htab->elf.dynamic_sections_created
10734 || h->dynindx == -1)
10735 {
10736 if (h->type == STT_GNU_IFUNC)
10737 rela.r_info = ELF32_R_INFO (0, R_PPC_IRELATIVE);
10738 else
10739 rela.r_info = ELF32_R_INFO (0, R_PPC_RELATIVE);
10740 loc = relplt->contents + (relplt->reloc_count++
10741 * sizeof (Elf32_External_Rela));
10742 htab->local_ifunc_resolver = 1;
10743 }
10744 else
10745 {
10746 rela.r_info = ELF32_R_INFO (h->dynindx, R_PPC_JMP_SLOT);
10747 loc = relplt->contents + (reloc_index
10748 * sizeof (Elf32_External_Rela));
10749 if (h->type == STT_GNU_IFUNC && is_static_defined (h))
10750 htab->maybe_local_ifunc_resolver = 1;
10751 }
10752 bfd_elf32_swap_reloca_out (info->output_bfd, &rela, loc);
82e66161 10753 }
a6aa5195
AM
10754 doneone = TRUE;
10755 }
e1a9cb8e 10756
e054468f 10757 if (htab->plt_type == PLT_NEW
25f23106
AM
10758 || !htab->elf.dynamic_sections_created
10759 || h->dynindx == -1)
a6aa5195 10760 {
a7f2871e 10761 unsigned char *p;
49c09209 10762 asection *plt = htab->elf.splt;
9e390558 10763
25f23106
AM
10764 if (!htab->elf.dynamic_sections_created
10765 || h->dynindx == -1)
2d7ad24e
AM
10766 {
10767 if (h->type == STT_GNU_IFUNC)
10768 plt = htab->elf.iplt;
10769 else
10770 break;
10771 }
e1a9cb8e 10772
a7f2871e 10773 p = (unsigned char *) htab->glink->contents + ent->glink_offset;
49c09209 10774 write_glink_stub (h, ent, plt, p, info);
e1a9cb8e 10775
0e1862bb 10776 if (!bfd_link_pic (info))
e054468f
AM
10777 /* We only need one non-PIC glink stub. */
10778 break;
a6aa5195
AM
10779 }
10780 else
10781 break;
10782 }
49c09209
AM
10783 return TRUE;
10784}
10785
10786/* Finish up PLT handling. */
10787
10788bfd_boolean
10789ppc_finish_symbols (struct bfd_link_info *info)
10790{
10791 struct ppc_elf_link_hash_table *htab = ppc_elf_hash_table (info);
10792 bfd *ibfd;
10793
10794 if (!htab)
10795 return TRUE;
10796
10797 elf_link_hash_traverse (&htab->elf, write_global_sym_plt, info);
10798
10799 for (ibfd = info->input_bfds; ibfd != NULL; ibfd = ibfd->link.next)
10800 {
10801 bfd_vma *local_got, *end_local_got;
10802 struct plt_entry **local_plt, **lplt, **end_local_plt;
10803 Elf_Internal_Shdr *symtab_hdr;
10804 bfd_size_type locsymcount;
10805 Elf_Internal_Sym *local_syms = NULL;
10806 struct plt_entry *ent;
10807
10808 if (!is_ppc_elf (ibfd))
10809 continue;
10810
10811 local_got = elf_local_got_offsets (ibfd);
10812 if (!local_got)
10813 continue;
10814
10815 symtab_hdr = &elf_symtab_hdr (ibfd);
10816 locsymcount = symtab_hdr->sh_info;
10817 end_local_got = local_got + locsymcount;
10818 local_plt = (struct plt_entry **) end_local_got;
10819 end_local_plt = local_plt + locsymcount;
10820 for (lplt = local_plt; lplt < end_local_plt; ++lplt)
10821 for (ent = *lplt; ent != NULL; ent = ent->next)
10822 {
10823 if (ent->plt.offset != (bfd_vma) -1)
10824 {
10825 Elf_Internal_Sym *sym;
10826 asection *sym_sec;
10827 asection *plt, *relplt;
10828 bfd_byte *loc;
10829 bfd_vma val;
10830 Elf_Internal_Rela rela;
10831
10832 if (!get_sym_h (NULL, &sym, &sym_sec, NULL, &local_syms,
10833 lplt - local_plt, ibfd))
10834 {
10835 if (local_syms != NULL
10836 && symtab_hdr->contents != (unsigned char *) local_syms)
10837 free (local_syms);
10838 return FALSE;
10839 }
10840
10841 val = sym->st_value;
10842 if (sym_sec != NULL && sym_sec->output_section != NULL)
10843 val += sym_sec->output_offset + sym_sec->output_section->vma;
10844
2d7ad24e
AM
10845 if (ELF_ST_TYPE (sym->st_info) == STT_GNU_IFUNC)
10846 {
10847 htab->local_ifunc_resolver = 1;
10848 plt = htab->elf.iplt;
10849 relplt = htab->elf.irelplt;
10850 rela.r_info = ELF32_R_INFO (0, R_PPC_IRELATIVE);
10851 }
10852 else
10853 {
10854 plt = htab->pltlocal;
10855 if (bfd_link_pic (info))
10856 {
10857 relplt = htab->relpltlocal;
10858 rela.r_info = ELF32_R_INFO (0, R_PPC_RELATIVE);
10859 }
10860 else
10861 {
10862 loc = plt->contents + ent->plt.offset;
10863 bfd_put_32 (info->output_bfd, val, loc);
10864 continue;
10865 }
10866 }
49c09209
AM
10867
10868 rela.r_offset = (ent->plt.offset
10869 + plt->output_offset
10870 + plt->output_section->vma);
49c09209
AM
10871 rela.r_addend = val;
10872 loc = relplt->contents + (relplt->reloc_count++
10873 * sizeof (Elf32_External_Rela));
10874 bfd_elf32_swap_reloca_out (info->output_bfd, &rela, loc);
10875 }
10876 if ((ent->glink_offset & 1) == 0)
10877 {
10878 unsigned char *p = ((unsigned char *) htab->glink->contents
10879 + ent->glink_offset);
10880
10881 write_glink_stub (NULL, ent, htab->elf.iplt, p, info);
10882 ent->glink_offset |= 1;
10883 }
10884 }
10885
10886 if (local_syms != NULL
10887 && symtab_hdr->contents != (unsigned char *) local_syms)
10888 {
10889 if (!info->keep_memory)
10890 free (local_syms);
10891 else
10892 symtab_hdr->contents = (unsigned char *) local_syms;
10893 }
10894 }
10895 return TRUE;
10896}
10897
10898/* Finish up dynamic symbol handling. We set the contents of various
10899 dynamic sections here. */
10900
10901static bfd_boolean
10902ppc_elf_finish_dynamic_symbol (bfd *output_bfd,
10903 struct bfd_link_info *info,
10904 struct elf_link_hash_entry *h,
10905 Elf_Internal_Sym *sym)
10906{
10907 struct ppc_elf_link_hash_table *htab = ppc_elf_hash_table (info);
10908 struct plt_entry *ent;
10909
10910#ifdef DEBUG
10911 fprintf (stderr, "ppc_elf_finish_dynamic_symbol called for %s",
10912 h->root.root.string);
10913#endif
10914
10915 if (!h->def_regular
10916 || (h->type == STT_GNU_IFUNC && !bfd_link_pic (info)))
10917 for (ent = h->plt.plist; ent != NULL; ent = ent->next)
10918 if (ent->plt.offset != (bfd_vma) -1)
10919 {
10920 if (!h->def_regular)
10921 {
10922 /* Mark the symbol as undefined, rather than as
10923 defined in the .plt section. Leave the value if
10924 there were any relocations where pointer equality
10925 matters (this is a clue for the dynamic linker, to
10926 make function pointer comparisons work between an
10927 application and shared library), otherwise set it
10928 to zero. */
10929 sym->st_shndx = SHN_UNDEF;
10930 if (!h->pointer_equality_needed)
10931 sym->st_value = 0;
10932 else if (!h->ref_regular_nonweak)
10933 {
10934 /* This breaks function pointer comparisons, but
10935 that is better than breaking tests for a NULL
10936 function pointer. */
10937 sym->st_value = 0;
10938 }
10939 }
10940 else
10941 {
10942 /* Set the value of ifunc symbols in a non-pie
10943 executable to the glink entry. This is to avoid
10944 text relocations. We can't do this for ifunc in
10945 allocate_dynrelocs, as we do for normal dynamic
10946 function symbols with plt entries, because we need
10947 to keep the original value around for the ifunc
10948 relocation. */
10949 sym->st_shndx
10950 = (_bfd_elf_section_from_bfd_section
10951 (info->output_bfd, htab->glink->output_section));
10952 sym->st_value = (ent->glink_offset
10953 + htab->glink->output_offset
10954 + htab->glink->output_section->vma);
10955 }
10956 break;
10957 }
e1a9cb8e 10958
25dbc73a
AM
10959 if (h->needs_copy)
10960 {
10961 asection *s;
10962 Elf_Internal_Rela rela;
10963 bfd_byte *loc;
e1a9cb8e 10964
25dbc73a 10965 /* This symbols needs a copy reloc. Set it up. */
e1a9cb8e 10966
25dbc73a
AM
10967#ifdef DEBUG
10968 fprintf (stderr, ", copy");
10969#endif
e1a9cb8e 10970
25dbc73a 10971 BFD_ASSERT (h->dynindx != -1);
86bbe32f 10972
4dc4a9a5 10973 if (ppc_elf_hash_entry (h)->has_sda_refs)
25dbc73a 10974 s = htab->relsbss;
afbf7e8e 10975 else if (h->root.u.def.section == htab->elf.sdynrelro)
5474d94f 10976 s = htab->elf.sreldynrelro;
25dbc73a 10977 else
9d19e4fd 10978 s = htab->elf.srelbss;
25dbc73a 10979 BFD_ASSERT (s != NULL);
e1a9cb8e 10980
e87d4038 10981 rela.r_offset = SYM_VAL (h);
25dbc73a
AM
10982 rela.r_info = ELF32_R_INFO (h->dynindx, R_PPC_COPY);
10983 rela.r_addend = 0;
10984 loc = s->contents + s->reloc_count++ * sizeof (Elf32_External_Rela);
10985 bfd_elf32_swap_reloca_out (output_bfd, &rela, loc);
10986 }
e1a9cb8e 10987
25dbc73a
AM
10988#ifdef DEBUG
10989 fprintf (stderr, "\n");
10990#endif
e1a9cb8e 10991
25dbc73a
AM
10992 return TRUE;
10993}
10994\f
10995static enum elf_reloc_type_class
7e612e98
AM
10996ppc_elf_reloc_type_class (const struct bfd_link_info *info,
10997 const asection *rel_sec,
10998 const Elf_Internal_Rela *rela)
e1a9cb8e 10999{
7e612e98
AM
11000 struct ppc_elf_link_hash_table *htab = ppc_elf_hash_table (info);
11001
ce558b89 11002 if (rel_sec == htab->elf.irelplt)
7e612e98
AM
11003 return reloc_class_ifunc;
11004
25dbc73a
AM
11005 switch (ELF32_R_TYPE (rela->r_info))
11006 {
11007 case R_PPC_RELATIVE:
11008 return reloc_class_relative;
25dbc73a
AM
11009 case R_PPC_JMP_SLOT:
11010 return reloc_class_plt;
11011 case R_PPC_COPY:
11012 return reloc_class_copy;
11013 default:
11014 return reloc_class_normal;
11015 }
e1a9cb8e 11016}
25dbc73a
AM
11017\f
11018/* Finish up the dynamic sections. */
e1a9cb8e 11019
25dbc73a
AM
11020static bfd_boolean
11021ppc_elf_finish_dynamic_sections (bfd *output_bfd,
11022 struct bfd_link_info *info)
e1a9cb8e 11023{
25dbc73a
AM
11024 asection *sdyn;
11025 struct ppc_elf_link_hash_table *htab;
1fe44d79 11026 bfd_vma got;
e87d4038
AM
11027 bfd *dynobj;
11028 bfd_boolean ret = TRUE;
e1a9cb8e 11029
25dbc73a
AM
11030#ifdef DEBUG
11031 fprintf (stderr, "ppc_elf_finish_dynamic_sections called\n");
11032#endif
6b0817e5 11033
25dbc73a 11034 htab = ppc_elf_hash_table (info);
ce558b89 11035 dynobj = htab->elf.dynobj;
3d4d4302 11036 sdyn = bfd_get_linker_section (dynobj, ".dynamic");
e1a9cb8e 11037
1fe44d79
AM
11038 got = 0;
11039 if (htab->elf.hgot != NULL)
e87d4038 11040 got = SYM_VAL (htab->elf.hgot);
1fe44d79 11041
25dbc73a 11042 if (htab->elf.dynamic_sections_created)
e1a9cb8e 11043 {
25dbc73a 11044 Elf32_External_Dyn *dyncon, *dynconend;
e1a9cb8e 11045
ce558b89 11046 BFD_ASSERT (htab->elf.splt != NULL && sdyn != NULL);
86bbe32f 11047
25dbc73a
AM
11048 dyncon = (Elf32_External_Dyn *) sdyn->contents;
11049 dynconend = (Elf32_External_Dyn *) (sdyn->contents + sdyn->size);
11050 for (; dyncon < dynconend; dyncon++)
11051 {
11052 Elf_Internal_Dyn dyn;
11053 asection *s;
e1a9cb8e 11054
9d8504b1 11055 bfd_elf32_swap_dyn_in (dynobj, dyncon, &dyn);
86bbe32f 11056
25dbc73a
AM
11057 switch (dyn.d_tag)
11058 {
11059 case DT_PLTGOT:
9d8504b1 11060 if (htab->is_vxworks)
ce558b89 11061 s = htab->elf.sgotplt;
9d8504b1 11062 else
ce558b89 11063 s = htab->elf.splt;
25dbc73a
AM
11064 dyn.d_un.d_ptr = s->output_section->vma + s->output_offset;
11065 break;
86bbe32f 11066
25dbc73a 11067 case DT_PLTRELSZ:
ce558b89 11068 dyn.d_un.d_val = htab->elf.srelplt->size;
25dbc73a 11069 break;
e1a9cb8e 11070
25dbc73a 11071 case DT_JMPREL:
ce558b89 11072 s = htab->elf.srelplt;
25dbc73a
AM
11073 dyn.d_un.d_ptr = s->output_section->vma + s->output_offset;
11074 break;
2f89ff8d 11075
1fe44d79
AM
11076 case DT_PPC_GOT:
11077 dyn.d_un.d_ptr = got;
d7128ce4
AM
11078 break;
11079
82e66161
AM
11080 case DT_TEXTREL:
11081 if (htab->local_ifunc_resolver)
11082 info->callbacks->einfo
11083 (_("%X%P: text relocations and GNU indirect "
11084 "functions will result in a segfault at runtime\n"));
11085 else if (htab->maybe_local_ifunc_resolver)
11086 info->callbacks->einfo
11087 (_("%P: warning: text relocations and GNU indirect "
11088 "functions may result in a segfault at runtime\n"));
11089 continue;
11090
25dbc73a 11091 default:
7a2b07ff
NS
11092 if (htab->is_vxworks
11093 && elf_vxworks_finish_dynamic_entry (output_bfd, &dyn))
11094 break;
25dbc73a
AM
11095 continue;
11096 }
4c45e5c9 11097
25dbc73a
AM
11098 bfd_elf32_swap_dyn_out (output_bfd, &dyn, dyncon);
11099 }
11100 }
4c45e5c9 11101
6528b6eb
AM
11102 if (htab->elf.sgot != NULL
11103 && htab->elf.sgot->output_section != bfd_abs_section_ptr)
25dbc73a 11104 {
ce558b89
AM
11105 if (htab->elf.hgot->root.u.def.section == htab->elf.sgot
11106 || htab->elf.hgot->root.u.def.section == htab->elf.sgotplt)
e87d4038 11107 {
e79f5955 11108 unsigned char *p = htab->elf.hgot->root.u.def.section->contents;
2f89ff8d 11109
e87d4038
AM
11110 p += htab->elf.hgot->root.u.def.value;
11111 if (htab->plt_type == PLT_OLD)
e79f5955
AM
11112 {
11113 /* Add a blrl instruction at _GLOBAL_OFFSET_TABLE_-4
11114 so that a function can easily find the address of
11115 _GLOBAL_OFFSET_TABLE_. */
11116 BFD_ASSERT (htab->elf.hgot->root.u.def.value - 4
11117 < htab->elf.hgot->root.u.def.section->size);
11118 bfd_put_32 (output_bfd, 0x4e800021, p - 4);
11119 }
3b36f7e6 11120
e87d4038 11121 if (sdyn != NULL)
e79f5955
AM
11122 {
11123 bfd_vma val = sdyn->output_section->vma + sdyn->output_offset;
11124 BFD_ASSERT (htab->elf.hgot->root.u.def.value
11125 < htab->elf.hgot->root.u.def.section->size);
11126 bfd_put_32 (output_bfd, val, p);
11127 }
e87d4038
AM
11128 }
11129 else
11130 {
695344c0 11131 /* xgettext:c-format */
cf97bcb0
AM
11132 _bfd_error_handler (_("%s not defined in linker created %pA"),
11133 htab->elf.hgot->root.root.string,
11134 (htab->elf.sgotplt != NULL
11135 ? htab->elf.sgotplt : htab->elf.sgot));
e87d4038
AM
11136 bfd_set_error (bfd_error_bad_value);
11137 ret = FALSE;
11138 }
25dbc73a 11139
ce558b89 11140 elf_section_data (htab->elf.sgot->output_section)->this_hdr.sh_entsize = 4;
25dbc73a
AM
11141 }
11142
9d8504b1 11143 /* Fill in the first entry in the VxWorks procedure linkage table. */
6528b6eb
AM
11144 if (htab->is_vxworks
11145 && htab->elf.splt != NULL
11146 && htab->elf.splt->size != 0
11147 && htab->elf.splt->output_section != bfd_abs_section_ptr)
9d8504b1 11148 {
6528b6eb 11149 asection *splt = htab->elf.splt;
9d8504b1 11150 /* Use the right PLT. */
0e1862bb 11151 const bfd_vma *plt_entry = (bfd_link_pic (info)
5b914448
AM
11152 ? ppc_elf_vxworks_pic_plt0_entry
11153 : ppc_elf_vxworks_plt0_entry);
9d8504b1 11154
0e1862bb 11155 if (!bfd_link_pic (info))
9d8504b1 11156 {
e87d4038 11157 bfd_vma got_value = SYM_VAL (htab->elf.hgot);
9d8504b1 11158
e87d4038 11159 bfd_put_32 (output_bfd, plt_entry[0] | PPC_HA (got_value),
9d8504b1 11160 splt->contents + 0);
e87d4038 11161 bfd_put_32 (output_bfd, plt_entry[1] | PPC_LO (got_value),
9d8504b1
PB
11162 splt->contents + 4);
11163 }
11164 else
11165 {
11166 bfd_put_32 (output_bfd, plt_entry[0], splt->contents + 0);
11167 bfd_put_32 (output_bfd, plt_entry[1], splt->contents + 4);
11168 }
11169 bfd_put_32 (output_bfd, plt_entry[2], splt->contents + 8);
11170 bfd_put_32 (output_bfd, plt_entry[3], splt->contents + 12);
11171 bfd_put_32 (output_bfd, plt_entry[4], splt->contents + 16);
11172 bfd_put_32 (output_bfd, plt_entry[5], splt->contents + 20);
11173 bfd_put_32 (output_bfd, plt_entry[6], splt->contents + 24);
11174 bfd_put_32 (output_bfd, plt_entry[7], splt->contents + 28);
11175
0e1862bb 11176 if (! bfd_link_pic (info))
9d8504b1
PB
11177 {
11178 Elf_Internal_Rela rela;
11179 bfd_byte *loc;
11180
11181 loc = htab->srelplt2->contents;
11182
11183 /* Output the @ha relocation for the first instruction. */
ce558b89
AM
11184 rela.r_offset = (htab->elf.splt->output_section->vma
11185 + htab->elf.splt->output_offset
9d8504b1 11186 + 2);
636ce3f5 11187 rela.r_info = ELF32_R_INFO (htab->elf.hgot->indx, R_PPC_ADDR16_HA);
9d8504b1
PB
11188 rela.r_addend = 0;
11189 bfd_elf32_swap_reloca_out (output_bfd, &rela, loc);
11190 loc += sizeof (Elf32_External_Rela);
5b914448 11191
9d8504b1 11192 /* Output the @l relocation for the second instruction. */
ce558b89
AM
11193 rela.r_offset = (htab->elf.splt->output_section->vma
11194 + htab->elf.splt->output_offset
9d8504b1 11195 + 6);
636ce3f5 11196 rela.r_info = ELF32_R_INFO (htab->elf.hgot->indx, R_PPC_ADDR16_LO);
9d8504b1
PB
11197 rela.r_addend = 0;
11198 bfd_elf32_swap_reloca_out (output_bfd, &rela, loc);
11199 loc += sizeof (Elf32_External_Rela);
11200
11201 /* Fix up the remaining relocations. They may have the wrong
11202 symbol index for _G_O_T_ or _P_L_T_ depending on the order
11203 in which symbols were output. */
11204 while (loc < htab->srelplt2->contents + htab->srelplt2->size)
11205 {
11206 Elf_Internal_Rela rel;
11207
11208 bfd_elf32_swap_reloc_in (output_bfd, loc, &rel);
636ce3f5 11209 rel.r_info = ELF32_R_INFO (htab->elf.hgot->indx, R_PPC_ADDR16_HA);
9d8504b1
PB
11210 bfd_elf32_swap_reloc_out (output_bfd, &rel, loc);
11211 loc += sizeof (Elf32_External_Rela);
11212
11213 bfd_elf32_swap_reloc_in (output_bfd, loc, &rel);
636ce3f5 11214 rel.r_info = ELF32_R_INFO (htab->elf.hgot->indx, R_PPC_ADDR16_LO);
9d8504b1
PB
11215 bfd_elf32_swap_reloc_out (output_bfd, &rel, loc);
11216 loc += sizeof (Elf32_External_Rela);
11217
11218 bfd_elf32_swap_reloc_in (output_bfd, loc, &rel);
7325306f 11219 rel.r_info = ELF32_R_INFO (htab->elf.hplt->indx, R_PPC_ADDR32);
9d8504b1
PB
11220 bfd_elf32_swap_reloc_out (output_bfd, &rel, loc);
11221 loc += sizeof (Elf32_External_Rela);
11222 }
11223 }
11224 }
11225
e054468f
AM
11226 if (htab->glink != NULL
11227 && htab->glink->contents != NULL
11228 && htab->elf.dynamic_sections_created)
d7128ce4
AM
11229 {
11230 unsigned char *p;
11231 unsigned char *endp;
a6aa5195 11232 bfd_vma res0;
a6aa5195
AM
11233
11234 /*
11235 * PIC glink code is the following:
11236 *
11237 * # ith PLT code stub.
11238 * addis 11,30,(plt+(i-1)*4-got)@ha
11239 * lwz 11,(plt+(i-1)*4-got)@l(11)
11240 * mtctr 11
11241 * bctr
11242 *
11243 * # A table of branches, one for each plt entry.
176a0d42 11244 * # The idea is that the plt call stub loads ctr and r11 with these
a6aa5195
AM
11245 * # addresses, so (r11 - res_0) gives the plt index * 4.
11246 * res_0: b PLTresolve
11247 * res_1: b PLTresolve
11248 * .
11249 * # Some number of entries towards the end can be nops
11250 * res_n_m3: nop
11251 * res_n_m2: nop
11252 * res_n_m1:
11253 *
11254 * PLTresolve:
11255 * addis 11,11,(1f-res_0)@ha
11256 * mflr 0
11257 * bcl 20,31,1f
11258 * 1: addi 11,11,(1b-res_0)@l
11259 * mflr 12
11260 * mtlr 0
07d6d2b8 11261 * sub 11,11,12 # r11 = index * 4
a6aa5195 11262 * addis 12,12,(got+4-1b)@ha
07d6d2b8
AM
11263 * lwz 0,(got+4-1b)@l(12) # got[1] address of dl_runtime_resolve
11264 * lwz 12,(got+8-1b)@l(12) # got[2] contains the map address
a6aa5195
AM
11265 * mtctr 0
11266 * add 0,11,11
07d6d2b8 11267 * add 11,0,11 # r11 = index * 12 = reloc offset.
a6aa5195 11268 * bctr
9e390558 11269 *
176a0d42
AM
11270 * Non-PIC glink code is a little simpler.
11271 *
11272 * # ith PLT code stub.
11273 * lis 11,(plt+(i-1)*4)@ha
11274 * lwz 11,(plt+(i-1)*4)@l(11)
11275 * mtctr 11
11276 * bctr
11277 *
11278 * The branch table is the same, then comes
11279 *
11280 * PLTresolve:
11281 * lis 12,(got+4)@ha
11282 * addis 11,11,(-res_0)@ha
07d6d2b8
AM
11283 * lwz 0,(got+4)@l(12) # got[1] address of dl_runtime_resolve
11284 * addi 11,11,(-res_0)@l # r11 = index * 4
176a0d42
AM
11285 * mtctr 0
11286 * add 0,11,11
07d6d2b8
AM
11287 * lwz 12,(got+8)@l(12) # got[2] contains the map address
11288 * add 11,0,11 # r11 = index * 12 = reloc offset.
176a0d42
AM
11289 * bctr
11290 */
7e8aeb9a 11291
a6aa5195 11292 /* Build the branch table, one for each plt entry (less one),
86b9da88 11293 and perhaps some padding. */
a6aa5195
AM
11294 p = htab->glink->contents;
11295 p += htab->glink_pltresolve;
86b9da88
AM
11296 endp = htab->glink->contents;
11297 endp += htab->glink->size - GLINK_PLTRESOLVE;
da3a2088 11298 while (p < endp - (htab->params->ppc476_workaround ? 0 : 8 * 4))
86b9da88
AM
11299 {
11300 bfd_put_32 (output_bfd, B + endp - p, p);
11301 p += 4;
11302 }
11303 while (p < endp)
11304 {
11305 bfd_put_32 (output_bfd, NOP, p);
11306 p += 4;
11307 }
11308
7e8aeb9a 11309 res0 = (htab->glink_pltresolve
86b9da88
AM
11310 + htab->glink->output_section->vma
11311 + htab->glink->output_offset);
11312
da3a2088
AM
11313 if (htab->params->ppc476_workaround)
11314 {
11315 /* Ensure that a call stub at the end of a page doesn't
11316 result in prefetch over the end of the page into the
11317 glink branch table. */
11318 bfd_vma pagesize = (bfd_vma) 1 << htab->params->pagesize_p2;
11319 bfd_vma page_addr;
11320 bfd_vma glink_start = (htab->glink->output_section->vma
11321 + htab->glink->output_offset);
11322
11323 for (page_addr = res0 & -pagesize;
11324 page_addr > glink_start;
11325 page_addr -= pagesize)
11326 {
11327 /* We have a plt call stub that may need fixing. */
11328 bfd_byte *loc;
11329 unsigned int insn;
11330
11331 loc = htab->glink->contents + page_addr - 4 - glink_start;
11332 insn = bfd_get_32 (output_bfd, loc);
11333 if (insn == BCTR)
11334 {
11335 /* By alignment, we know that there must be at least
11336 one other call stub before this one. */
11337 insn = bfd_get_32 (output_bfd, loc - 16);
11338 if (insn == BCTR)
11339 bfd_put_32 (output_bfd, B | (-16 & 0x3fffffc), loc);
11340 else
11341 bfd_put_32 (output_bfd, B | (-20 & 0x3fffffc), loc);
11342 }
11343 }
11344 }
11345
86b9da88 11346 /* Last comes the PLTresolve stub. */
9e390558 11347 endp = p + GLINK_PLTRESOLVE;
0e1862bb 11348 if (bfd_link_pic (info))
7e8aeb9a 11349 {
a6aa5195 11350 bfd_vma bcl;
d7128ce4 11351
a6aa5195
AM
11352 bcl = (htab->glink->size - GLINK_PLTRESOLVE + 3*4
11353 + htab->glink->output_section->vma
11354 + htab->glink->output_offset);
11355
9e390558
AM
11356 bfd_put_32 (output_bfd, ADDIS_11_11 + PPC_HA (bcl - res0), p);
11357 p += 4;
11358 bfd_put_32 (output_bfd, MFLR_0, p);
11359 p += 4;
11360 bfd_put_32 (output_bfd, BCL_20_31, p);
11361 p += 4;
11362 bfd_put_32 (output_bfd, ADDI_11_11 + PPC_LO (bcl - res0), p);
11363 p += 4;
11364 bfd_put_32 (output_bfd, MFLR_12, p);
11365 p += 4;
11366 bfd_put_32 (output_bfd, MTLR_0, p);
11367 p += 4;
11368 bfd_put_32 (output_bfd, SUB_11_11_12, p);
11369 p += 4;
11370 bfd_put_32 (output_bfd, ADDIS_12_12 + PPC_HA (got + 4 - bcl), p);
11371 p += 4;
a6aa5195
AM
11372 if (PPC_HA (got + 4 - bcl) == PPC_HA (got + 8 - bcl))
11373 {
9e390558
AM
11374 bfd_put_32 (output_bfd, LWZ_0_12 + PPC_LO (got + 4 - bcl), p);
11375 p += 4;
11376 bfd_put_32 (output_bfd, LWZ_12_12 + PPC_LO (got + 8 - bcl), p);
11377 p += 4;
a6aa5195
AM
11378 }
11379 else
11380 {
9e390558
AM
11381 bfd_put_32 (output_bfd, LWZU_0_12 + PPC_LO (got + 4 - bcl), p);
11382 p += 4;
11383 bfd_put_32 (output_bfd, LWZ_12_12 + 4, p);
11384 p += 4;
a6aa5195 11385 }
9e390558
AM
11386 bfd_put_32 (output_bfd, MTCTR_0, p);
11387 p += 4;
11388 bfd_put_32 (output_bfd, ADD_0_11_11, p);
7e8aeb9a
AM
11389 }
11390 else
d7128ce4 11391 {
9e390558
AM
11392 bfd_put_32 (output_bfd, LIS_12 + PPC_HA (got + 4), p);
11393 p += 4;
11394 bfd_put_32 (output_bfd, ADDIS_11_11 + PPC_HA (-res0), p);
11395 p += 4;
a6aa5195 11396 if (PPC_HA (got + 4) == PPC_HA (got + 8))
9e390558 11397 bfd_put_32 (output_bfd, LWZ_0_12 + PPC_LO (got + 4), p);
a6aa5195 11398 else
9e390558
AM
11399 bfd_put_32 (output_bfd, LWZU_0_12 + PPC_LO (got + 4), p);
11400 p += 4;
11401 bfd_put_32 (output_bfd, ADDI_11_11 + PPC_LO (-res0), p);
11402 p += 4;
11403 bfd_put_32 (output_bfd, MTCTR_0, p);
11404 p += 4;
11405 bfd_put_32 (output_bfd, ADD_0_11_11, p);
11406 p += 4;
11407 if (PPC_HA (got + 4) == PPC_HA (got + 8))
11408 bfd_put_32 (output_bfd, LWZ_12_12 + PPC_LO (got + 8), p);
11409 else
11410 bfd_put_32 (output_bfd, LWZ_12_12 + 4, p);
11411 }
11412 p += 4;
11413 bfd_put_32 (output_bfd, ADD_11_0_11, p);
11414 p += 4;
407aa07c
AM
11415 bfd_put_32 (output_bfd, BCTR, p);
11416 p += 4;
9e390558
AM
11417 while (p < endp)
11418 {
11419 bfd_put_32 (output_bfd,
11420 htab->params->ppc476_workaround ? BA : NOP, p);
11421 p += 4;
d7128ce4 11422 }
9e390558 11423 BFD_ASSERT (p == endp);
d7128ce4
AM
11424 }
11425
6177242a
AM
11426 if (htab->glink_eh_frame != NULL
11427 && htab->glink_eh_frame->contents != NULL)
11428 {
11429 unsigned char *p = htab->glink_eh_frame->contents;
11430 bfd_vma val;
11431
6177242a
AM
11432 p += sizeof (glink_eh_frame_cie);
11433 /* FDE length. */
6177242a
AM
11434 p += 4;
11435 /* CIE pointer. */
6177242a
AM
11436 p += 4;
11437 /* Offset to .glink. */
11438 val = (htab->glink->output_section->vma
11439 + htab->glink->output_offset);
11440 val -= (htab->glink_eh_frame->output_section->vma
11441 + htab->glink_eh_frame->output_offset);
11442 val -= p - htab->glink_eh_frame->contents;
11443 bfd_put_32 (htab->elf.dynobj, val, p);
6177242a 11444
dbaa2011 11445 if (htab->glink_eh_frame->sec_info_type == SEC_INFO_TYPE_EH_FRAME
6177242a
AM
11446 && !_bfd_elf_write_section_eh_frame (output_bfd, info,
11447 htab->glink_eh_frame,
11448 htab->glink_eh_frame->contents))
11449 return FALSE;
11450 }
11451
e87d4038 11452 return ret;
25dbc73a 11453}
e1a9cb8e 11454\f
6d00b590 11455#define TARGET_LITTLE_SYM powerpc_elf32_le_vec
252b5132 11456#define TARGET_LITTLE_NAME "elf32-powerpcle"
6d00b590 11457#define TARGET_BIG_SYM powerpc_elf32_vec
252b5132
RH
11458#define TARGET_BIG_NAME "elf32-powerpc"
11459#define ELF_ARCH bfd_arch_powerpc
ae95ffa6 11460#define ELF_TARGET_ID PPC32_ELF_DATA
252b5132
RH
11461#define ELF_MACHINE_CODE EM_PPC
11462#define ELF_MAXPAGESIZE 0x10000
702d1671
AM
11463#define ELF_COMMONPAGESIZE 0x1000
11464#define ELF_RELROPAGESIZE ELF_MAXPAGESIZE
252b5132
RH
11465#define elf_info_to_howto ppc_elf_info_to_howto
11466
11467#ifdef EM_CYGNUS_POWERPC
11468#define ELF_MACHINE_ALT1 EM_CYGNUS_POWERPC
11469#endif
11470
11471#ifdef EM_PPC_OLD
11472#define ELF_MACHINE_ALT2 EM_PPC_OLD
11473#endif
11474
11475#define elf_backend_plt_not_loaded 1
5474d94f 11476#define elf_backend_want_dynrelro 1
252b5132 11477#define elf_backend_can_gc_sections 1
51b64d56 11478#define elf_backend_can_refcount 1
b491616a 11479#define elf_backend_rela_normal 1
53291d1f 11480#define elf_backend_caches_rawsize 1
252b5132 11481
43c40ab2 11482#define bfd_elf32_mkobject ppc_elf_mkobject
252b5132 11483#define bfd_elf32_bfd_merge_private_bfd_data ppc_elf_merge_private_bfd_data
70bccea4 11484#define bfd_elf32_bfd_relax_section ppc_elf_relax_section
252b5132 11485#define bfd_elf32_bfd_reloc_type_lookup ppc_elf_reloc_type_lookup
b9c361e0 11486#define bfd_elf32_bfd_reloc_name_lookup ppc_elf_reloc_name_lookup
252b5132 11487#define bfd_elf32_bfd_set_private_flags ppc_elf_set_private_flags
70bccea4 11488#define bfd_elf32_bfd_link_hash_table_create ppc_elf_link_hash_table_create
468392fb 11489#define bfd_elf32_get_synthetic_symtab ppc_elf_get_synthetic_symtab
252b5132 11490
feee612b 11491#define elf_backend_object_p ppc_elf_object_p
252b5132 11492#define elf_backend_gc_mark_hook ppc_elf_gc_mark_hook
252b5132
RH
11493#define elf_backend_section_from_shdr ppc_elf_section_from_shdr
11494#define elf_backend_relocate_section ppc_elf_relocate_section
11495#define elf_backend_create_dynamic_sections ppc_elf_create_dynamic_sections
11496#define elf_backend_check_relocs ppc_elf_check_relocs
c0e331c7 11497#define elf_backend_relocs_compatible _bfd_elf_relocs_compatible
7fce784e 11498#define elf_backend_copy_indirect_symbol ppc_elf_copy_indirect_symbol
252b5132
RH
11499#define elf_backend_adjust_dynamic_symbol ppc_elf_adjust_dynamic_symbol
11500#define elf_backend_add_symbol_hook ppc_elf_add_symbol_hook
11501#define elf_backend_size_dynamic_sections ppc_elf_size_dynamic_sections
0eb4a168 11502#define elf_backend_hash_symbol ppc_elf_hash_symbol
252b5132
RH
11503#define elf_backend_finish_dynamic_symbol ppc_elf_finish_dynamic_symbol
11504#define elf_backend_finish_dynamic_sections ppc_elf_finish_dynamic_sections
11505#define elf_backend_fake_sections ppc_elf_fake_sections
11506#define elf_backend_additional_program_headers ppc_elf_additional_program_headers
954b63d4 11507#define elf_backend_modify_segment_map ppc_elf_modify_segment_map
c5fccbec
DJ
11508#define elf_backend_grok_prstatus ppc_elf_grok_prstatus
11509#define elf_backend_grok_psinfo ppc_elf_grok_psinfo
183e98be 11510#define elf_backend_write_core_note ppc_elf_write_core_note
29c2fb7c 11511#define elf_backend_reloc_type_class ppc_elf_reloc_type_class
70bccea4
AM
11512#define elf_backend_begin_write_processing ppc_elf_begin_write_processing
11513#define elf_backend_final_write_processing ppc_elf_final_write_processing
11514#define elf_backend_write_section ppc_elf_write_section
551b43fd 11515#define elf_backend_get_sec_type_attr ppc_elf_get_sec_type_attr
4c45e5c9 11516#define elf_backend_plt_sym_val ppc_elf_plt_sym_val
8a696751 11517#define elf_backend_action_discarded ppc_elf_action_discarded
74541ad4 11518#define elf_backend_init_index_section _bfd_elf_init_1_index_section
b9c361e0 11519#define elf_backend_lookup_section_flags_hook ppc_elf_lookup_section_flags
252b5132
RH
11520
11521#include "elf32-target.h"
9d8504b1 11522
7b8e7dad
AM
11523/* FreeBSD Target */
11524
11525#undef TARGET_LITTLE_SYM
11526#undef TARGET_LITTLE_NAME
11527
11528#undef TARGET_BIG_SYM
6d00b590 11529#define TARGET_BIG_SYM powerpc_elf32_fbsd_vec
7b8e7dad
AM
11530#undef TARGET_BIG_NAME
11531#define TARGET_BIG_NAME "elf32-powerpc-freebsd"
11532
11533#undef ELF_OSABI
11534#define ELF_OSABI ELFOSABI_FREEBSD
11535
11536#undef elf32_bed
11537#define elf32_bed elf32_powerpc_fbsd_bed
11538
11539#include "elf32-target.h"
11540
9d8504b1
PB
11541/* VxWorks Target */
11542
11543#undef TARGET_LITTLE_SYM
11544#undef TARGET_LITTLE_NAME
11545
11546#undef TARGET_BIG_SYM
6d00b590 11547#define TARGET_BIG_SYM powerpc_elf32_vxworks_vec
9d8504b1
PB
11548#undef TARGET_BIG_NAME
11549#define TARGET_BIG_NAME "elf32-powerpc-vxworks"
11550
7b8e7dad
AM
11551#undef ELF_OSABI
11552
d5e3d971
PB
11553/* VxWorks uses the elf default section flags for .plt. */
11554static const struct bfd_elf_special_section *
4aef7643 11555ppc_elf_vxworks_get_sec_type_attr (bfd *abfd, asection *sec)
9d8504b1 11556{
d5e3d971
PB
11557 if (sec->name == NULL)
11558 return NULL;
11559
11560 if (strcmp (sec->name, ".plt") == 0)
11561 return _bfd_elf_get_sec_type_attr (abfd, sec);
11562
11563 return ppc_elf_get_sec_type_attr (abfd, sec);
11564}
9d8504b1
PB
11565
11566/* Like ppc_elf_link_hash_table_create, but overrides
11567 appropriately for VxWorks. */
11568static struct bfd_link_hash_table *
11569ppc_elf_vxworks_link_hash_table_create (bfd *abfd)
11570{
11571 struct bfd_link_hash_table *ret;
11572
11573 ret = ppc_elf_link_hash_table_create (abfd);
11574 if (ret)
11575 {
11576 struct ppc_elf_link_hash_table *htab
954b63d4 11577 = (struct ppc_elf_link_hash_table *)ret;
9d8504b1 11578 htab->is_vxworks = 1;
4a3dc543 11579 htab->plt_type = PLT_VXWORKS;
9d8504b1
PB
11580 htab->plt_entry_size = VXWORKS_PLT_ENTRY_SIZE;
11581 htab->plt_slot_size = VXWORKS_PLT_ENTRY_SIZE;
11582 htab->plt_initial_entry_size = VXWORKS_PLT_INITIAL_ENTRY_SIZE;
11583 }
11584 return ret;
11585}
11586
11587/* Tweak magic VxWorks symbols as they are loaded. */
11588static bfd_boolean
11589ppc_elf_vxworks_add_symbol_hook (bfd *abfd,
11590 struct bfd_link_info *info,
11591 Elf_Internal_Sym *sym,
4aef7643
AM
11592 const char **namep,
11593 flagword *flagsp,
9d8504b1
PB
11594 asection **secp,
11595 bfd_vma *valp)
11596{
4aef7643
AM
11597 if (!elf_vxworks_add_symbol_hook (abfd, info, sym, namep, flagsp, secp,
11598 valp))
9d8504b1
PB
11599 return FALSE;
11600
4aef7643 11601 return ppc_elf_add_symbol_hook (abfd, info, sym, namep, flagsp, secp, valp);
9d8504b1
PB
11602}
11603
9d8504b1
PB
11604static void
11605ppc_elf_vxworks_final_write_processing (bfd *abfd, bfd_boolean linker)
11606{
4aef7643
AM
11607 ppc_elf_final_write_processing (abfd, linker);
11608 elf_vxworks_final_write_processing (abfd, linker);
9d8504b1
PB
11609}
11610
11611/* On VxWorks, we emit relocations against _PROCEDURE_LINKAGE_TABLE_, so
11612 define it. */
11613#undef elf_backend_want_plt_sym
11614#define elf_backend_want_plt_sym 1
11615#undef elf_backend_want_got_plt
11616#define elf_backend_want_got_plt 1
11617#undef elf_backend_got_symbol_offset
11618#define elf_backend_got_symbol_offset 0
11619#undef elf_backend_plt_not_loaded
11620#define elf_backend_plt_not_loaded 0
11621#undef elf_backend_plt_readonly
11622#define elf_backend_plt_readonly 1
11623#undef elf_backend_got_header_size
11624#define elf_backend_got_header_size 12
64f52338
AM
11625#undef elf_backend_dtrel_excludes_plt
11626#define elf_backend_dtrel_excludes_plt 1
9d8504b1 11627
468392fb
AM
11628#undef bfd_elf32_get_synthetic_symtab
11629
9d8504b1
PB
11630#undef bfd_elf32_bfd_link_hash_table_create
11631#define bfd_elf32_bfd_link_hash_table_create \
11632 ppc_elf_vxworks_link_hash_table_create
9d8504b1
PB
11633#undef elf_backend_add_symbol_hook
11634#define elf_backend_add_symbol_hook \
11635 ppc_elf_vxworks_add_symbol_hook
11636#undef elf_backend_link_output_symbol_hook
11637#define elf_backend_link_output_symbol_hook \
9c72ff84 11638 elf_vxworks_link_output_symbol_hook
9d8504b1
PB
11639#undef elf_backend_final_write_processing
11640#define elf_backend_final_write_processing \
11641 ppc_elf_vxworks_final_write_processing
d5e3d971
PB
11642#undef elf_backend_get_sec_type_attr
11643#define elf_backend_get_sec_type_attr \
11644 ppc_elf_vxworks_get_sec_type_attr
9d8504b1
PB
11645#undef elf_backend_emit_relocs
11646#define elf_backend_emit_relocs \
11647 elf_vxworks_emit_relocs
11648
11649#undef elf32_bed
11650#define elf32_bed ppc_elf_vxworks_bed
e054468f 11651#undef elf_backend_post_process_headers
9d8504b1
PB
11652
11653#include "elf32-target.h"