]> git.ipfire.org Git - thirdparty/binutils-gdb.git/blame - bfd/elf32-ppc.c
Automatic date update in version.in
[thirdparty/binutils-gdb.git] / bfd / elf32-ppc.c
CommitLineData
252b5132 1/* PowerPC-specific support for 32-bit ELF
fd67aa11 2 Copyright (C) 1994-2024 Free Software Foundation, Inc.
252b5132
RH
3 Written by Ian Lance Taylor, Cygnus Support.
4
ae9a127f 5 This file is part of BFD, the Binary File Descriptor library.
252b5132 6
ae9a127f
NC
7 This program is free software; you can redistribute it and/or modify
8 it under the terms of the GNU General Public License as published by
cd123cb7 9 the Free Software Foundation; either version 3 of the License, or
ae9a127f 10 (at your option) any later version.
252b5132 11
ae9a127f
NC
12 This program is distributed in the hope that it will be useful,
13 but WITHOUT ANY WARRANTY; without even the implied warranty of
14 MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
15 GNU General Public License for more details.
252b5132 16
ae9a127f 17 You should have received a copy of the GNU General Public License
fc0bffd6 18 along with this program; if not, write to the
3e110533 19 Free Software Foundation, Inc., 51 Franklin Street - Fifth Floor,
53e09e0a 20 Boston, MA 02110-1301, USA. */
252b5132 21
c09c8b42
AM
22/* The assembler should generate a full set of section symbols even
23 when they appear unused. The linux kernel build tool recordmcount
24 needs them. */
25#define TARGET_KEEP_UNUSED_SECTION_SYMBOLS true
252b5132 26
3db64b00 27#include "sysdep.h"
183e98be 28#include <stdarg.h>
252b5132 29#include "bfd.h"
252b5132
RH
30#include "bfdlink.h"
31#include "libbfd.h"
32#include "elf-bfd.h"
33#include "elf/ppc.h"
7619e7c7 34#include "elf32-ppc.h"
9d8504b1 35#include "elf-vxworks.h"
6177242a 36#include "dwarf2.h"
08dc996f 37#include "opcode/ppc.h"
252b5132 38
bb294208
AM
39/* All users of this file have bfd_octets_per_byte (abfd, sec) == 1. */
40#define OCTETS_PER_BYTE(ABFD, SEC) 1
41
b9c361e0
JL
42typedef enum split16_format_type
43{
44 split16a_type = 0,
45 split16d_type
46}
47split16_format_type;
48
f0fe0e16 49/* RELA relocations are used here. */
252b5132 50
252b5132 51static bfd_reloc_status_type ppc_elf_addr16_ha_reloc
55fd94b0 52 (bfd *, arelent *, asymbol *, void *, asection *, bfd *, char **);
7619e7c7 53static bfd_reloc_status_type ppc_elf_unhandled_reloc
55fd94b0 54 (bfd *, arelent *, asymbol *, void *, asection *, bfd *, char **);
252b5132 55
70bccea4
AM
56/* Branch prediction bit for branch taken relocs. */
57#define BRANCH_PREDICT_BIT 0x200000
58/* Mask to set RA in memory instructions. */
59#define RA_REGISTER_MASK 0x001f0000
60/* Value to shift register by to insert RA. */
61#define RA_REGISTER_SHIFT 16
252b5132
RH
62
63/* The name of the dynamic interpreter. This is put in the .interp
64 section. */
252b5132
RH
65#define ELF_DYNAMIC_INTERPRETER "/usr/lib/ld.so.1"
66
d7128ce4 67/* For old-style PLT. */
252b5132
RH
68/* The number of single-slot PLT entries (the rest use two slots). */
69#define PLT_NUM_SINGLE_ENTRIES 8192
70
d7128ce4 71/* For new-style .glink and .plt. */
a6aa5195 72#define GLINK_PLTRESOLVE 16*4
9e390558 73#define GLINK_ENTRY_SIZE(htab, h) \
407aa07c 74 ((4*4 \
9e390558
AM
75 + (h != NULL \
76 && h == htab->tls_get_addr \
77 && !htab->params->no_tls_get_addr_opt ? 8*4 : 0) \
78 + (1u << htab->params->plt_stub_align) - 1) \
79 & -(1u << htab->params->plt_stub_align))
d7128ce4 80
9d8504b1
PB
81/* VxWorks uses its own plt layout, filled in by the static linker. */
82
83/* The standard VxWorks PLT entry. */
84#define VXWORKS_PLT_ENTRY_SIZE 32
85static const bfd_vma ppc_elf_vxworks_plt_entry
86 [VXWORKS_PLT_ENTRY_SIZE / 4] =
87 {
07d6d2b8
AM
88 0x3d800000, /* lis r12,0 */
89 0x818c0000, /* lwz r12,0(r12) */
90 0x7d8903a6, /* mtctr r12 */
91 0x4e800420, /* bctr */
92 0x39600000, /* li r11,0 */
93 0x48000000, /* b 14 <.PLT0resolve+0x4> */
94 0x60000000, /* nop */
95 0x60000000, /* nop */
9d8504b1
PB
96 };
97static const bfd_vma ppc_elf_vxworks_pic_plt_entry
98 [VXWORKS_PLT_ENTRY_SIZE / 4] =
99 {
100 0x3d9e0000, /* addis r12,r30,0 */
101 0x818c0000, /* lwz r12,0(r12) */
102 0x7d8903a6, /* mtctr r12 */
103 0x4e800420, /* bctr */
104 0x39600000, /* li r11,0 */
105 0x48000000, /* b 14 <.PLT0resolve+0x4> 14: R_PPC_REL24 .PLTresolve */
106 0x60000000, /* nop */
107 0x60000000, /* nop */
108 };
109
110/* The initial VxWorks PLT entry. */
111#define VXWORKS_PLT_INITIAL_ENTRY_SIZE 32
112static const bfd_vma ppc_elf_vxworks_plt0_entry
113 [VXWORKS_PLT_INITIAL_ENTRY_SIZE / 4] =
114 {
07d6d2b8
AM
115 0x3d800000, /* lis r12,0 */
116 0x398c0000, /* addi r12,r12,0 */
117 0x800c0008, /* lwz r0,8(r12) */
118 0x7c0903a6, /* mtctr r0 */
119 0x818c0004, /* lwz r12,4(r12) */
120 0x4e800420, /* bctr */
121 0x60000000, /* nop */
122 0x60000000, /* nop */
9d8504b1
PB
123 };
124static const bfd_vma ppc_elf_vxworks_pic_plt0_entry
125 [VXWORKS_PLT_INITIAL_ENTRY_SIZE / 4] =
126 {
127 0x819e0008, /* lwz r12,8(r30) */
07d6d2b8 128 0x7d8903a6, /* mtctr r12 */
9d8504b1 129 0x819e0004, /* lwz r12,4(r30) */
07d6d2b8
AM
130 0x4e800420, /* bctr */
131 0x60000000, /* nop */
132 0x60000000, /* nop */
133 0x60000000, /* nop */
134 0x60000000, /* nop */
9d8504b1
PB
135 };
136
137/* For executables, we have some additional relocations in
138 .rela.plt.unloaded, for the kernel loader. */
139
140/* The number of non-JMP_SLOT relocations per PLT0 slot. */
141#define VXWORKS_PLT_NON_JMP_SLOT_RELOCS 3
142/* The number of relocations in the PLTResolve slot. */
143#define VXWORKS_PLTRESOLVE_RELOCS 2
de194d85 144/* The number of relocations in the PLTResolve slot when creating
9d8504b1
PB
145 a shared library. */
146#define VXWORKS_PLTRESOLVE_RELOCS_SHLIB 0
147
d7128ce4 148/* Some instructions. */
d7128ce4 149#define ADDIS_11_11 0x3d6b0000
a6aa5195
AM
150#define ADDIS_11_30 0x3d7e0000
151#define ADDIS_12_12 0x3d8c0000
d7128ce4 152#define ADDI_11_11 0x396b0000
d7128ce4 153#define ADD_0_11_11 0x7c0b5a14
a7f2871e 154#define ADD_3_12_2 0x7c6c1214
d7128ce4 155#define ADD_11_0_11 0x7d605a14
a6aa5195 156#define B 0x48000000
da3a2088 157#define BA 0x48000002
a6aa5195 158#define BCL_20_31 0x429f0005
d7128ce4 159#define BCTR 0x4e800420
a7f2871e
AM
160#define BEQLR 0x4d820020
161#define CMPWI_11_0 0x2c0b0000
7e8aeb9a
AM
162#define LIS_11 0x3d600000
163#define LIS_12 0x3d800000
a6aa5195
AM
164#define LWZU_0_12 0x840c0000
165#define LWZ_0_12 0x800c0000
a7f2871e 166#define LWZ_11_3 0x81630000
a6aa5195
AM
167#define LWZ_11_11 0x816b0000
168#define LWZ_11_30 0x817e0000
a7f2871e 169#define LWZ_12_3 0x81830000
a6aa5195 170#define LWZ_12_12 0x818c0000
a7f2871e
AM
171#define MR_0_3 0x7c601b78
172#define MR_3_0 0x7c030378
a6aa5195
AM
173#define MFLR_0 0x7c0802a6
174#define MFLR_12 0x7d8802a6
175#define MTCTR_0 0x7c0903a6
176#define MTCTR_11 0x7d6903a6
177#define MTLR_0 0x7c0803a6
178#define NOP 0x60000000
179#define SUB_11_11_12 0x7d6c5850
7619e7c7
AM
180
181/* Offset of tp and dtp pointers from start of TLS block. */
182#define TP_OFFSET 0x7000
183#define DTP_OFFSET 0x8000
e87d4038
AM
184
185/* The value of a defined global symbol. */
186#define SYM_VAL(SYM) \
187 ((SYM)->root.u.def.section->output_section->vma \
188 + (SYM)->root.u.def.section->output_offset \
189 + (SYM)->root.u.def.value)
7fce784e 190\f
46807bf4
AM
191/* Relocation HOWTO's. */
192/* Like other ELF RELA targets that don't apply multiple
193 field-altering relocations to the same localation, src_mask is
194 always zero and pcrel_offset is the same as pc_relative.
195 PowerPC can always use a zero bitpos, even when the field is not at
196 the LSB. For example, a REL24 could use rightshift=2, bisize=24
197 and bitpos=2 which matches the ABI description, or as we do here,
198 rightshift=0, bitsize=26 and bitpos=0. */
199#define HOW(type, size, bitsize, mask, rightshift, pc_relative, \
200 complain, special_func) \
201 HOWTO (type, rightshift, size, bitsize, pc_relative, 0, \
202 complain_overflow_ ## complain, special_func, \
0a1b45a2 203 #type, false, 0, mask, pc_relative)
46807bf4 204
e47cd125 205static reloc_howto_type *ppc_elf_howto_table[R_PPC_max];
252b5132 206
8da6118f 207static reloc_howto_type ppc_elf_howto_raw[] = {
252b5132 208 /* This reloc does nothing. */
c94cb026 209 HOW (R_PPC_NONE, 0, 0, 0, 0, false, dont,
46807bf4 210 bfd_elf_generic_reloc),
252b5132
RH
211
212 /* A standard 32 bit relocation. */
c94cb026 213 HOW (R_PPC_ADDR32, 4, 32, 0xffffffff, 0, false, dont,
46807bf4 214 bfd_elf_generic_reloc),
252b5132
RH
215
216 /* An absolute 26 bit branch; the lower two bits must be zero.
217 FIXME: we don't check that, we just clear them. */
c94cb026 218 HOW (R_PPC_ADDR24, 4, 26, 0x3fffffc, 0, false, signed,
46807bf4 219 bfd_elf_generic_reloc),
252b5132
RH
220
221 /* A standard 16 bit relocation. */
c94cb026 222 HOW (R_PPC_ADDR16, 2, 16, 0xffff, 0, false, bitfield,
46807bf4 223 bfd_elf_generic_reloc),
252b5132
RH
224
225 /* A 16 bit relocation without overflow. */
c94cb026 226 HOW (R_PPC_ADDR16_LO, 2, 16, 0xffff, 0, false, dont,
46807bf4 227 bfd_elf_generic_reloc),
252b5132
RH
228
229 /* The high order 16 bits of an address. */
c94cb026 230 HOW (R_PPC_ADDR16_HI, 2, 16, 0xffff, 16, false, dont,
46807bf4 231 bfd_elf_generic_reloc),
252b5132
RH
232
233 /* The high order 16 bits of an address, plus 1 if the contents of
8da6118f 234 the low 16 bits, treated as a signed number, is negative. */
c94cb026 235 HOW (R_PPC_ADDR16_HA, 2, 16, 0xffff, 16, false, dont,
46807bf4 236 ppc_elf_addr16_ha_reloc),
252b5132
RH
237
238 /* An absolute 16 bit branch; the lower two bits must be zero.
239 FIXME: we don't check that, we just clear them. */
c94cb026 240 HOW (R_PPC_ADDR14, 4, 16, 0xfffc, 0, false, signed,
46807bf4 241 bfd_elf_generic_reloc),
252b5132
RH
242
243 /* An absolute 16 bit branch, for which bit 10 should be set to
244 indicate that the branch is expected to be taken. The lower two
8da6118f 245 bits must be zero. */
c94cb026 246 HOW (R_PPC_ADDR14_BRTAKEN, 4, 16, 0xfffc, 0, false, signed,
46807bf4 247 bfd_elf_generic_reloc),
252b5132
RH
248
249 /* An absolute 16 bit branch, for which bit 10 should be set to
250 indicate that the branch is not expected to be taken. The lower
251 two bits must be zero. */
c94cb026 252 HOW (R_PPC_ADDR14_BRNTAKEN, 4, 16, 0xfffc, 0, false, signed,
46807bf4 253 bfd_elf_generic_reloc),
252b5132 254
8da6118f 255 /* A relative 26 bit branch; the lower two bits must be zero. */
c94cb026 256 HOW (R_PPC_REL24, 4, 26, 0x3fffffc, 0, true, signed,
46807bf4 257 bfd_elf_generic_reloc),
252b5132 258
8da6118f 259 /* A relative 16 bit branch; the lower two bits must be zero. */
c94cb026 260 HOW (R_PPC_REL14, 4, 16, 0xfffc, 0, true, signed,
46807bf4 261 bfd_elf_generic_reloc),
252b5132 262
8da6118f 263 /* A relative 16 bit branch. Bit 10 should be set to indicate that
252b5132
RH
264 the branch is expected to be taken. The lower two bits must be
265 zero. */
c94cb026 266 HOW (R_PPC_REL14_BRTAKEN, 4, 16, 0xfffc, 0, true, signed,
46807bf4 267 bfd_elf_generic_reloc),
252b5132 268
8da6118f 269 /* A relative 16 bit branch. Bit 10 should be set to indicate that
252b5132
RH
270 the branch is not expected to be taken. The lower two bits must
271 be zero. */
c94cb026 272 HOW (R_PPC_REL14_BRNTAKEN, 4, 16, 0xfffc, 0, true, signed,
46807bf4 273 bfd_elf_generic_reloc),
252b5132
RH
274
275 /* Like R_PPC_ADDR16, but referring to the GOT table entry for the
276 symbol. */
c94cb026 277 HOW (R_PPC_GOT16, 2, 16, 0xffff, 0, false, signed,
46807bf4 278 ppc_elf_unhandled_reloc),
252b5132
RH
279
280 /* Like R_PPC_ADDR16_LO, but referring to the GOT table entry for
281 the symbol. */
c94cb026 282 HOW (R_PPC_GOT16_LO, 2, 16, 0xffff, 0, false, dont,
46807bf4 283 ppc_elf_unhandled_reloc),
252b5132
RH
284
285 /* Like R_PPC_ADDR16_HI, but referring to the GOT table entry for
286 the symbol. */
c94cb026 287 HOW (R_PPC_GOT16_HI, 2, 16, 0xffff, 16, false, dont,
46807bf4 288 ppc_elf_unhandled_reloc),
252b5132
RH
289
290 /* Like R_PPC_ADDR16_HA, but referring to the GOT table entry for
291 the symbol. */
c94cb026 292 HOW (R_PPC_GOT16_HA, 2, 16, 0xffff, 16, false, dont,
46807bf4 293 ppc_elf_unhandled_reloc),
252b5132
RH
294
295 /* Like R_PPC_REL24, but referring to the procedure linkage table
296 entry for the symbol. */
c94cb026 297 HOW (R_PPC_PLTREL24, 4, 26, 0x3fffffc, 0, true, signed,
46807bf4 298 ppc_elf_unhandled_reloc),
252b5132
RH
299
300 /* This is used only by the dynamic linker. The symbol should exist
301 both in the object being run and in some shared library. The
302 dynamic linker copies the data addressed by the symbol from the
303 shared library into the object, because the object being
304 run has to have the data at some particular address. */
c94cb026 305 HOW (R_PPC_COPY, 4, 32, 0, 0, false, dont,
46807bf4 306 ppc_elf_unhandled_reloc),
252b5132
RH
307
308 /* Like R_PPC_ADDR32, but used when setting global offset table
309 entries. */
c94cb026 310 HOW (R_PPC_GLOB_DAT, 4, 32, 0xffffffff, 0, false, dont,
46807bf4 311 ppc_elf_unhandled_reloc),
252b5132
RH
312
313 /* Marks a procedure linkage table entry for a symbol. */
c94cb026 314 HOW (R_PPC_JMP_SLOT, 4, 32, 0, 0, false, dont,
46807bf4 315 ppc_elf_unhandled_reloc),
252b5132
RH
316
317 /* Used only by the dynamic linker. When the object is run, this
318 longword is set to the load address of the object, plus the
319 addend. */
c94cb026 320 HOW (R_PPC_RELATIVE, 4, 32, 0xffffffff, 0, false, dont,
46807bf4 321 bfd_elf_generic_reloc),
252b5132
RH
322
323 /* Like R_PPC_REL24, but uses the value of the symbol within the
324 object rather than the final value. Normally used for
325 _GLOBAL_OFFSET_TABLE_. */
c94cb026 326 HOW (R_PPC_LOCAL24PC, 4, 26, 0x3fffffc, 0, true, signed,
46807bf4 327 bfd_elf_generic_reloc),
252b5132
RH
328
329 /* Like R_PPC_ADDR32, but may be unaligned. */
c94cb026 330 HOW (R_PPC_UADDR32, 4, 32, 0xffffffff, 0, false, dont,
46807bf4 331 bfd_elf_generic_reloc),
252b5132
RH
332
333 /* Like R_PPC_ADDR16, but may be unaligned. */
c94cb026 334 HOW (R_PPC_UADDR16, 2, 16, 0xffff, 0, false, bitfield,
46807bf4 335 bfd_elf_generic_reloc),
252b5132
RH
336
337 /* 32-bit PC relative */
c94cb026 338 HOW (R_PPC_REL32, 4, 32, 0xffffffff, 0, true, dont,
46807bf4 339 bfd_elf_generic_reloc),
252b5132
RH
340
341 /* 32-bit relocation to the symbol's procedure linkage table.
c3668558 342 FIXME: not supported. */
c94cb026 343 HOW (R_PPC_PLT32, 4, 32, 0, 0, false, dont,
46807bf4 344 ppc_elf_unhandled_reloc),
252b5132
RH
345
346 /* 32-bit PC relative relocation to the symbol's procedure linkage table.
c3668558 347 FIXME: not supported. */
c94cb026 348 HOW (R_PPC_PLTREL32, 4, 32, 0, 0, true, dont,
46807bf4 349 ppc_elf_unhandled_reloc),
252b5132
RH
350
351 /* Like R_PPC_ADDR16_LO, but referring to the PLT table entry for
352 the symbol. */
c94cb026 353 HOW (R_PPC_PLT16_LO, 2, 16, 0xffff, 0, false, dont,
46807bf4 354 ppc_elf_unhandled_reloc),
252b5132
RH
355
356 /* Like R_PPC_ADDR16_HI, but referring to the PLT table entry for
357 the symbol. */
c94cb026 358 HOW (R_PPC_PLT16_HI, 2, 16, 0xffff, 16, false, dont,
46807bf4 359 ppc_elf_unhandled_reloc),
252b5132
RH
360
361 /* Like R_PPC_ADDR16_HA, but referring to the PLT table entry for
362 the symbol. */
c94cb026 363 HOW (R_PPC_PLT16_HA, 2, 16, 0xffff, 16, false, dont,
46807bf4 364 ppc_elf_unhandled_reloc),
252b5132
RH
365
366 /* A sign-extended 16 bit value relative to _SDA_BASE_, for use with
367 small data items. */
c94cb026 368 HOW (R_PPC_SDAREL16, 2, 16, 0xffff, 0, false, signed,
46807bf4 369 ppc_elf_unhandled_reloc),
252b5132 370
c061c2d8 371 /* 16-bit section relative relocation. */
c94cb026 372 HOW (R_PPC_SECTOFF, 2, 16, 0xffff, 0, false, signed,
46807bf4 373 ppc_elf_unhandled_reloc),
252b5132 374
c3668558 375 /* 16-bit lower half section relative relocation. */
c94cb026 376 HOW (R_PPC_SECTOFF_LO, 2, 16, 0xffff, 0, false, dont,
46807bf4 377 ppc_elf_unhandled_reloc),
252b5132 378
c3668558 379 /* 16-bit upper half section relative relocation. */
c94cb026 380 HOW (R_PPC_SECTOFF_HI, 2, 16, 0xffff, 16, false, dont,
46807bf4 381 ppc_elf_unhandled_reloc),
252b5132 382
c3668558 383 /* 16-bit upper half adjusted section relative relocation. */
c94cb026 384 HOW (R_PPC_SECTOFF_HA, 2, 16, 0xffff, 16, false, dont,
46807bf4 385 ppc_elf_unhandled_reloc),
252b5132 386
727fc41e 387 /* Marker relocs for TLS. */
c94cb026 388 HOW (R_PPC_TLS, 4, 32, 0, 0, false, dont,
46807bf4
AM
389 bfd_elf_generic_reloc),
390
c94cb026 391 HOW (R_PPC_TLSGD, 4, 32, 0, 0, false, dont,
46807bf4
AM
392 bfd_elf_generic_reloc),
393
c94cb026 394 HOW (R_PPC_TLSLD, 4, 32, 0, 0, false, dont,
46807bf4 395 bfd_elf_generic_reloc),
727fc41e 396
23cedd1d 397 /* Marker relocs on inline plt call instructions. */
c94cb026 398 HOW (R_PPC_PLTSEQ, 4, 32, 0, 0, false, dont,
46807bf4
AM
399 bfd_elf_generic_reloc),
400
c94cb026 401 HOW (R_PPC_PLTCALL, 4, 32, 0, 0, false, dont,
46807bf4 402 bfd_elf_generic_reloc),
23cedd1d 403
7619e7c7
AM
404 /* Computes the load module index of the load module that contains the
405 definition of its TLS sym. */
c94cb026 406 HOW (R_PPC_DTPMOD32, 4, 32, 0xffffffff, 0, false, dont,
46807bf4 407 ppc_elf_unhandled_reloc),
252b5132 408
7619e7c7
AM
409 /* Computes a dtv-relative displacement, the difference between the value
410 of sym+add and the base address of the thread-local storage block that
411 contains the definition of sym, minus 0x8000. */
c94cb026 412 HOW (R_PPC_DTPREL32, 4, 32, 0xffffffff, 0, false, dont,
46807bf4 413 ppc_elf_unhandled_reloc),
7619e7c7
AM
414
415 /* A 16 bit dtprel reloc. */
c94cb026 416 HOW (R_PPC_DTPREL16, 2, 16, 0xffff, 0, false, signed,
46807bf4 417 ppc_elf_unhandled_reloc),
252b5132 418
7619e7c7 419 /* Like DTPREL16, but no overflow. */
c94cb026 420 HOW (R_PPC_DTPREL16_LO, 2, 16, 0xffff, 0, false, dont,
46807bf4 421 ppc_elf_unhandled_reloc),
252b5132 422
7619e7c7 423 /* Like DTPREL16_LO, but next higher group of 16 bits. */
c94cb026 424 HOW (R_PPC_DTPREL16_HI, 2, 16, 0xffff, 16, false, dont,
46807bf4 425 ppc_elf_unhandled_reloc),
252b5132 426
7619e7c7 427 /* Like DTPREL16_HI, but adjust for low 16 bits. */
c94cb026 428 HOW (R_PPC_DTPREL16_HA, 2, 16, 0xffff, 16, false, dont,
46807bf4 429 ppc_elf_unhandled_reloc),
252b5132 430
7619e7c7
AM
431 /* Computes a tp-relative displacement, the difference between the value of
432 sym+add and the value of the thread pointer (r13). */
c94cb026 433 HOW (R_PPC_TPREL32, 4, 32, 0xffffffff, 0, false, dont,
46807bf4 434 ppc_elf_unhandled_reloc),
7619e7c7
AM
435
436 /* A 16 bit tprel reloc. */
c94cb026 437 HOW (R_PPC_TPREL16, 2, 16, 0xffff, 0, false, signed,
46807bf4 438 ppc_elf_unhandled_reloc),
252b5132 439
7619e7c7 440 /* Like TPREL16, but no overflow. */
c94cb026 441 HOW (R_PPC_TPREL16_LO, 2, 16, 0xffff, 0, false, dont,
46807bf4 442 ppc_elf_unhandled_reloc),
252b5132 443
7619e7c7 444 /* Like TPREL16_LO, but next higher group of 16 bits. */
c94cb026 445 HOW (R_PPC_TPREL16_HI, 2, 16, 0xffff, 16, false, dont,
46807bf4 446 ppc_elf_unhandled_reloc),
7619e7c7
AM
447
448 /* Like TPREL16_HI, but adjust for low 16 bits. */
c94cb026 449 HOW (R_PPC_TPREL16_HA, 2, 16, 0xffff, 16, false, dont,
46807bf4 450 ppc_elf_unhandled_reloc),
7619e7c7
AM
451
452 /* Allocates two contiguous entries in the GOT to hold a tls_index structure,
453 with values (sym+add)@dtpmod and (sym+add)@dtprel, and computes the offset
454 to the first entry. */
c94cb026 455 HOW (R_PPC_GOT_TLSGD16, 2, 16, 0xffff, 0, false, signed,
46807bf4 456 ppc_elf_unhandled_reloc),
252b5132 457
7619e7c7 458 /* Like GOT_TLSGD16, but no overflow. */
c94cb026 459 HOW (R_PPC_GOT_TLSGD16_LO, 2, 16, 0xffff, 0, false, dont,
46807bf4 460 ppc_elf_unhandled_reloc),
252b5132 461
7619e7c7 462 /* Like GOT_TLSGD16_LO, but next higher group of 16 bits. */
c94cb026 463 HOW (R_PPC_GOT_TLSGD16_HI, 2, 16, 0xffff, 16, false, dont,
46807bf4 464 ppc_elf_unhandled_reloc),
252b5132 465
7619e7c7 466 /* Like GOT_TLSGD16_HI, but adjust for low 16 bits. */
c94cb026 467 HOW (R_PPC_GOT_TLSGD16_HA, 2, 16, 0xffff, 16, false, dont,
46807bf4 468 ppc_elf_unhandled_reloc),
7619e7c7
AM
469
470 /* Allocates two contiguous entries in the GOT to hold a tls_index structure,
471 with values (sym+add)@dtpmod and zero, and computes the offset to the
472 first entry. */
c94cb026 473 HOW (R_PPC_GOT_TLSLD16, 2, 16, 0xffff, 0, false, signed,
46807bf4 474 ppc_elf_unhandled_reloc),
252b5132 475
7619e7c7 476 /* Like GOT_TLSLD16, but no overflow. */
c94cb026 477 HOW (R_PPC_GOT_TLSLD16_LO, 2, 16, 0xffff, 0, false, dont,
46807bf4 478 ppc_elf_unhandled_reloc),
252b5132 479
7619e7c7 480 /* Like GOT_TLSLD16_LO, but next higher group of 16 bits. */
c94cb026 481 HOW (R_PPC_GOT_TLSLD16_HI, 2, 16, 0xffff, 16, false, dont,
46807bf4 482 ppc_elf_unhandled_reloc),
252b5132 483
7619e7c7 484 /* Like GOT_TLSLD16_HI, but adjust for low 16 bits. */
c94cb026 485 HOW (R_PPC_GOT_TLSLD16_HA, 2, 16, 0xffff, 16, false, dont,
46807bf4 486 ppc_elf_unhandled_reloc),
7619e7c7
AM
487
488 /* Allocates an entry in the GOT with value (sym+add)@dtprel, and computes
489 the offset to the entry. */
c94cb026 490 HOW (R_PPC_GOT_DTPREL16, 2, 16, 0xffff, 0, false, signed,
46807bf4 491 ppc_elf_unhandled_reloc),
252b5132 492
7619e7c7 493 /* Like GOT_DTPREL16, but no overflow. */
c94cb026 494 HOW (R_PPC_GOT_DTPREL16_LO, 2, 16, 0xffff, 0, false, dont,
46807bf4 495 ppc_elf_unhandled_reloc),
252b5132 496
7619e7c7 497 /* Like GOT_DTPREL16_LO, but next higher group of 16 bits. */
c94cb026 498 HOW (R_PPC_GOT_DTPREL16_HI, 2, 16, 0xffff, 16, false, dont,
46807bf4 499 ppc_elf_unhandled_reloc),
252b5132 500
7619e7c7 501 /* Like GOT_DTPREL16_HI, but adjust for low 16 bits. */
c94cb026 502 HOW (R_PPC_GOT_DTPREL16_HA, 2, 16, 0xffff, 16, false, dont,
46807bf4 503 ppc_elf_unhandled_reloc),
c3668558 504
7619e7c7
AM
505 /* Allocates an entry in the GOT with value (sym+add)@tprel, and computes the
506 offset to the entry. */
c94cb026 507 HOW (R_PPC_GOT_TPREL16, 2, 16, 0xffff, 0, false, signed,
46807bf4 508 ppc_elf_unhandled_reloc),
7619e7c7
AM
509
510 /* Like GOT_TPREL16, but no overflow. */
c94cb026 511 HOW (R_PPC_GOT_TPREL16_LO, 2, 16, 0xffff, 0, false, dont,
46807bf4 512 ppc_elf_unhandled_reloc),
7619e7c7
AM
513
514 /* Like GOT_TPREL16_LO, but next higher group of 16 bits. */
c94cb026 515 HOW (R_PPC_GOT_TPREL16_HI, 2, 16, 0xffff, 16, false, dont,
46807bf4 516 ppc_elf_unhandled_reloc),
7619e7c7
AM
517
518 /* Like GOT_TPREL16_HI, but adjust for low 16 bits. */
c94cb026 519 HOW (R_PPC_GOT_TPREL16_HA, 2, 16, 0xffff, 16, false, dont,
46807bf4 520 ppc_elf_unhandled_reloc),
7619e7c7
AM
521
522 /* The remaining relocs are from the Embedded ELF ABI, and are not
523 in the SVR4 ELF ABI. */
524
525 /* 32 bit value resulting from the addend minus the symbol. */
c94cb026 526 HOW (R_PPC_EMB_NADDR32, 4, 32, 0xffffffff, 0, false, dont,
46807bf4 527 ppc_elf_unhandled_reloc),
7619e7c7
AM
528
529 /* 16 bit value resulting from the addend minus the symbol. */
c94cb026 530 HOW (R_PPC_EMB_NADDR16, 2, 16, 0xffff, 0, false, signed,
46807bf4 531 ppc_elf_unhandled_reloc),
7619e7c7
AM
532
533 /* 16 bit value resulting from the addend minus the symbol. */
c94cb026 534 HOW (R_PPC_EMB_NADDR16_LO, 2, 16, 0xffff, 0, false, dont,
46807bf4 535 ppc_elf_unhandled_reloc),
7619e7c7
AM
536
537 /* The high order 16 bits of the addend minus the symbol. */
c94cb026 538 HOW (R_PPC_EMB_NADDR16_HI, 2, 16, 0xffff, 16, false, dont,
46807bf4 539 ppc_elf_unhandled_reloc),
7619e7c7
AM
540
541 /* The high order 16 bits of the result of the addend minus the address,
542 plus 1 if the contents of the low 16 bits, treated as a signed number,
543 is negative. */
c94cb026 544 HOW (R_PPC_EMB_NADDR16_HA, 2, 16, 0xffff, 16, false, dont,
46807bf4 545 ppc_elf_unhandled_reloc),
25dbc73a
AM
546
547 /* 16 bit value resulting from allocating a 4 byte word to hold an
548 address in the .sdata section, and returning the offset from
549 _SDA_BASE_ for that relocation. */
c94cb026 550 HOW (R_PPC_EMB_SDAI16, 2, 16, 0xffff, 0, false, signed,
46807bf4 551 ppc_elf_unhandled_reloc),
25dbc73a
AM
552
553 /* 16 bit value resulting from allocating a 4 byte word to hold an
554 address in the .sdata2 section, and returning the offset from
555 _SDA2_BASE_ for that relocation. */
c94cb026 556 HOW (R_PPC_EMB_SDA2I16, 2, 16, 0xffff, 0, false, signed,
46807bf4 557 ppc_elf_unhandled_reloc),
25dbc73a
AM
558
559 /* A sign-extended 16 bit value relative to _SDA2_BASE_, for use with
560 small data items. */
c94cb026 561 HOW (R_PPC_EMB_SDA2REL, 2, 16, 0xffff, 0, false, signed,
46807bf4 562 ppc_elf_unhandled_reloc),
25dbc73a
AM
563
564 /* Relocate against either _SDA_BASE_ or _SDA2_BASE_, filling in the 16 bit
565 signed offset from the appropriate base, and filling in the register
566 field with the appropriate register (0, 2, or 13). */
c94cb026 567 HOW (R_PPC_EMB_SDA21, 4, 16, 0xffff, 0, false, signed,
46807bf4 568 ppc_elf_unhandled_reloc),
25dbc73a
AM
569
570 /* Relocation not handled: R_PPC_EMB_MRKREF */
571 /* Relocation not handled: R_PPC_EMB_RELSEC16 */
572 /* Relocation not handled: R_PPC_EMB_RELST_LO */
573 /* Relocation not handled: R_PPC_EMB_RELST_HI */
574 /* Relocation not handled: R_PPC_EMB_RELST_HA */
575 /* Relocation not handled: R_PPC_EMB_BIT_FLD */
576
577 /* PC relative relocation against either _SDA_BASE_ or _SDA2_BASE_, filling
578 in the 16 bit signed offset from the appropriate base, and filling in the
579 register field with the appropriate register (0, 2, or 13). */
c94cb026 580 HOW (R_PPC_EMB_RELSDA, 2, 16, 0xffff, 0, false, signed,
46807bf4 581 ppc_elf_unhandled_reloc),
25dbc73a 582
b9c361e0 583 /* A relative 8 bit branch. */
c94cb026 584 HOW (R_PPC_VLE_REL8, 2, 8, 0xff, 1, true, signed,
46807bf4 585 bfd_elf_generic_reloc),
68ffbac6 586
b9c361e0 587 /* A relative 15 bit branch. */
c94cb026 588 HOW (R_PPC_VLE_REL15, 4, 16, 0xfffe, 0, true, signed,
46807bf4 589 bfd_elf_generic_reloc),
b9c361e0 590
68ffbac6 591 /* A relative 24 bit branch. */
c94cb026 592 HOW (R_PPC_VLE_REL24, 4, 25, 0x1fffffe, 0, true, signed,
46807bf4 593 bfd_elf_generic_reloc),
b9c361e0
JL
594
595 /* The 16 LSBS in split16a format. */
c94cb026 596 HOW (R_PPC_VLE_LO16A, 4, 16, 0x1f07ff, 0, false, dont,
46807bf4 597 ppc_elf_unhandled_reloc),
b9c361e0
JL
598
599 /* The 16 LSBS in split16d format. */
c94cb026 600 HOW (R_PPC_VLE_LO16D, 4, 16, 0x3e007ff, 0, false, dont,
46807bf4 601 ppc_elf_unhandled_reloc),
b9c361e0
JL
602
603 /* Bits 16-31 split16a format. */
c94cb026 604 HOW (R_PPC_VLE_HI16A, 4, 16, 0x1f07ff, 16, false, dont,
46807bf4 605 ppc_elf_unhandled_reloc),
b9c361e0
JL
606
607 /* Bits 16-31 split16d format. */
c94cb026 608 HOW (R_PPC_VLE_HI16D, 4, 16, 0x3e007ff, 16, false, dont,
46807bf4 609 ppc_elf_unhandled_reloc),
b9c361e0
JL
610
611 /* Bits 16-31 (High Adjusted) in split16a format. */
c94cb026 612 HOW (R_PPC_VLE_HA16A, 4, 16, 0x1f07ff, 16, false, dont,
46807bf4 613 ppc_elf_unhandled_reloc),
b9c361e0
JL
614
615 /* Bits 16-31 (High Adjusted) in split16d format. */
c94cb026 616 HOW (R_PPC_VLE_HA16D, 4, 16, 0x3e007ff, 16, false, dont,
46807bf4 617 ppc_elf_unhandled_reloc),
b9c361e0 618
86c95733
AM
619 /* This reloc is like R_PPC_EMB_SDA21 but only applies to e_add16i
620 instructions. If the register base is 0 then the linker changes
621 the e_add16i to an e_li instruction. */
c94cb026 622 HOW (R_PPC_VLE_SDA21, 4, 16, 0xffff, 0, false, signed,
46807bf4 623 ppc_elf_unhandled_reloc),
b9c361e0 624
86c95733 625 /* Like R_PPC_VLE_SDA21 but ignore overflow. */
c94cb026 626 HOW (R_PPC_VLE_SDA21_LO, 4, 16, 0xffff, 0, false, dont,
46807bf4 627 ppc_elf_unhandled_reloc),
b9c361e0
JL
628
629 /* The 16 LSBS relative to _SDA_BASE_ in split16a format. */
c94cb026 630 HOW (R_PPC_VLE_SDAREL_LO16A, 4, 16, 0x1f07ff, 0, false, dont,
46807bf4 631 ppc_elf_unhandled_reloc),
b9c361e0
JL
632
633 /* The 16 LSBS relative to _SDA_BASE_ in split16d format. */
c94cb026 634 HOW (R_PPC_VLE_SDAREL_LO16D, 4, 16, 0x3e007ff, 0, false, dont,
46807bf4 635 ppc_elf_unhandled_reloc),
b9c361e0
JL
636
637 /* Bits 16-31 relative to _SDA_BASE_ in split16a format. */
c94cb026 638 HOW (R_PPC_VLE_SDAREL_HI16A, 4, 16, 0x1f07ff, 16, false, dont,
46807bf4 639 ppc_elf_unhandled_reloc),
b9c361e0
JL
640
641 /* Bits 16-31 relative to _SDA_BASE_ in split16d format. */
c94cb026 642 HOW (R_PPC_VLE_SDAREL_HI16D, 4, 16, 0x3e007ff, 16, false, dont,
46807bf4 643 ppc_elf_unhandled_reloc),
b9c361e0
JL
644
645 /* Bits 16-31 (HA) relative to _SDA_BASE split16a format. */
c94cb026 646 HOW (R_PPC_VLE_SDAREL_HA16A, 4, 16, 0x1f07ff, 16, false, dont,
46807bf4 647 ppc_elf_unhandled_reloc),
b9c361e0
JL
648
649 /* Bits 16-31 (HA) relative to _SDA_BASE split16d format. */
c94cb026 650 HOW (R_PPC_VLE_SDAREL_HA16D, 4, 16, 0x3e007ff, 16, false, dont,
46807bf4 651 ppc_elf_unhandled_reloc),
b9c361e0 652
83eef883 653 /* e_li split20 format. */
c94cb026 654 HOW (R_PPC_VLE_ADDR20, 4, 20, 0x1f7fff, 0, false, dont,
bb6bf75e 655 ppc_elf_unhandled_reloc),
46807bf4 656
c94cb026 657 HOW (R_PPC_IRELATIVE, 4, 32, 0xffffffff, 0, false, dont,
46807bf4 658 ppc_elf_unhandled_reloc),
e054468f 659
d7128ce4 660 /* A 16 bit relative relocation. */
c94cb026 661 HOW (R_PPC_REL16, 2, 16, 0xffff, 0, true, signed,
46807bf4 662 bfd_elf_generic_reloc),
d7128ce4
AM
663
664 /* A 16 bit relative relocation without overflow. */
c94cb026 665 HOW (R_PPC_REL16_LO, 2, 16, 0xffff, 0, true, dont,
46807bf4 666 bfd_elf_generic_reloc),
d7128ce4
AM
667
668 /* The high order 16 bits of a relative address. */
c94cb026 669 HOW (R_PPC_REL16_HI, 2, 16, 0xffff, 16, true, dont,
46807bf4 670 bfd_elf_generic_reloc),
d7128ce4
AM
671
672 /* The high order 16 bits of a relative address, plus 1 if the contents of
673 the low 16 bits, treated as a signed number, is negative. */
c94cb026 674 HOW (R_PPC_REL16_HA, 2, 16, 0xffff, 16, true, dont,
46807bf4 675 ppc_elf_addr16_ha_reloc),
d7128ce4 676
a680de9a 677 /* Like R_PPC_REL16_HA but for split field in addpcis. */
c94cb026 678 HOW (R_PPC_REL16DX_HA, 4, 16, 0x1fffc1, 16, true, signed,
46807bf4 679 ppc_elf_addr16_ha_reloc),
a680de9a 680
7ba71655 681 /* A split-field reloc for addpcis, non-relative (gas internal use only). */
c94cb026 682 HOW (R_PPC_16DX_HA, 4, 16, 0x1fffc1, 16, false, signed,
46807bf4 683 ppc_elf_addr16_ha_reloc),
7ba71655 684
25dbc73a 685 /* GNU extension to record C++ vtable hierarchy. */
5d0feb98 686 HOW (R_PPC_GNU_VTINHERIT, 0, 0, 0, 0, false, dont,
46807bf4 687 NULL),
25dbc73a
AM
688
689 /* GNU extension to record C++ vtable member usage. */
5d0feb98 690 HOW (R_PPC_GNU_VTENTRY, 0, 0, 0, 0, false, dont,
46807bf4 691 NULL),
7619e7c7 692
25dbc73a 693 /* Phony reloc to handle AIX style TOC entries. */
c94cb026 694 HOW (R_PPC_TOC16, 2, 16, 0xffff, 0, false, signed,
46807bf4 695 ppc_elf_unhandled_reloc),
25dbc73a
AM
696};
697\f
698/* Initialize the ppc_elf_howto_table, so that linear accesses can be done. */
699
700static void
701ppc_elf_howto_init (void)
702{
703 unsigned int i, type;
704
705 for (i = 0;
706 i < sizeof (ppc_elf_howto_raw) / sizeof (ppc_elf_howto_raw[0]);
707 i++)
708 {
709 type = ppc_elf_howto_raw[i].type;
710 if (type >= (sizeof (ppc_elf_howto_table)
711 / sizeof (ppc_elf_howto_table[0])))
712 abort ();
713 ppc_elf_howto_table[type] = &ppc_elf_howto_raw[i];
714 }
715}
716
717static reloc_howto_type *
718ppc_elf_reloc_type_lookup (bfd *abfd ATTRIBUTE_UNUSED,
719 bfd_reloc_code_real_type code)
720{
721 enum elf_ppc_reloc_type r;
722
723 /* Initialize howto table if not already done. */
724 if (!ppc_elf_howto_table[R_PPC_ADDR32])
725 ppc_elf_howto_init ();
726
727 switch (code)
728 {
729 default:
730 return NULL;
731
732 case BFD_RELOC_NONE: r = R_PPC_NONE; break;
733 case BFD_RELOC_32: r = R_PPC_ADDR32; break;
734 case BFD_RELOC_PPC_BA26: r = R_PPC_ADDR24; break;
1fe532cf 735 case BFD_RELOC_PPC64_ADDR16_DS:
25dbc73a 736 case BFD_RELOC_16: r = R_PPC_ADDR16; break;
1fe532cf 737 case BFD_RELOC_PPC64_ADDR16_LO_DS:
25dbc73a
AM
738 case BFD_RELOC_LO16: r = R_PPC_ADDR16_LO; break;
739 case BFD_RELOC_HI16: r = R_PPC_ADDR16_HI; break;
740 case BFD_RELOC_HI16_S: r = R_PPC_ADDR16_HA; break;
741 case BFD_RELOC_PPC_BA16: r = R_PPC_ADDR14; break;
742 case BFD_RELOC_PPC_BA16_BRTAKEN: r = R_PPC_ADDR14_BRTAKEN; break;
743 case BFD_RELOC_PPC_BA16_BRNTAKEN: r = R_PPC_ADDR14_BRNTAKEN; break;
744 case BFD_RELOC_PPC_B26: r = R_PPC_REL24; break;
745 case BFD_RELOC_PPC_B16: r = R_PPC_REL14; break;
746 case BFD_RELOC_PPC_B16_BRTAKEN: r = R_PPC_REL14_BRTAKEN; break;
747 case BFD_RELOC_PPC_B16_BRNTAKEN: r = R_PPC_REL14_BRNTAKEN; break;
1fe532cf 748 case BFD_RELOC_PPC64_GOT16_DS:
25dbc73a 749 case BFD_RELOC_16_GOTOFF: r = R_PPC_GOT16; break;
1fe532cf 750 case BFD_RELOC_PPC64_GOT16_LO_DS:
25dbc73a
AM
751 case BFD_RELOC_LO16_GOTOFF: r = R_PPC_GOT16_LO; break;
752 case BFD_RELOC_HI16_GOTOFF: r = R_PPC_GOT16_HI; break;
753 case BFD_RELOC_HI16_S_GOTOFF: r = R_PPC_GOT16_HA; break;
754 case BFD_RELOC_24_PLT_PCREL: r = R_PPC_PLTREL24; break;
755 case BFD_RELOC_PPC_COPY: r = R_PPC_COPY; break;
756 case BFD_RELOC_PPC_GLOB_DAT: r = R_PPC_GLOB_DAT; break;
757 case BFD_RELOC_PPC_LOCAL24PC: r = R_PPC_LOCAL24PC; break;
758 case BFD_RELOC_32_PCREL: r = R_PPC_REL32; break;
759 case BFD_RELOC_32_PLTOFF: r = R_PPC_PLT32; break;
760 case BFD_RELOC_32_PLT_PCREL: r = R_PPC_PLTREL32; break;
1fe532cf 761 case BFD_RELOC_PPC64_PLT16_LO_DS:
25dbc73a
AM
762 case BFD_RELOC_LO16_PLTOFF: r = R_PPC_PLT16_LO; break;
763 case BFD_RELOC_HI16_PLTOFF: r = R_PPC_PLT16_HI; break;
764 case BFD_RELOC_HI16_S_PLTOFF: r = R_PPC_PLT16_HA; break;
765 case BFD_RELOC_GPREL16: r = R_PPC_SDAREL16; break;
1fe532cf 766 case BFD_RELOC_PPC64_SECTOFF_DS:
25dbc73a 767 case BFD_RELOC_16_BASEREL: r = R_PPC_SECTOFF; break;
1fe532cf 768 case BFD_RELOC_PPC64_SECTOFF_LO_DS:
25dbc73a
AM
769 case BFD_RELOC_LO16_BASEREL: r = R_PPC_SECTOFF_LO; break;
770 case BFD_RELOC_HI16_BASEREL: r = R_PPC_SECTOFF_HI; break;
771 case BFD_RELOC_HI16_S_BASEREL: r = R_PPC_SECTOFF_HA; break;
772 case BFD_RELOC_CTOR: r = R_PPC_ADDR32; break;
1fe532cf 773 case BFD_RELOC_PPC64_TOC16_DS:
25dbc73a
AM
774 case BFD_RELOC_PPC_TOC16: r = R_PPC_TOC16; break;
775 case BFD_RELOC_PPC_TLS: r = R_PPC_TLS; break;
727fc41e
AM
776 case BFD_RELOC_PPC_TLSGD: r = R_PPC_TLSGD; break;
777 case BFD_RELOC_PPC_TLSLD: r = R_PPC_TLSLD; break;
25dbc73a 778 case BFD_RELOC_PPC_DTPMOD: r = R_PPC_DTPMOD32; break;
1fe532cf 779 case BFD_RELOC_PPC64_TPREL16_DS:
25dbc73a 780 case BFD_RELOC_PPC_TPREL16: r = R_PPC_TPREL16; break;
1fe532cf 781 case BFD_RELOC_PPC64_TPREL16_LO_DS:
25dbc73a
AM
782 case BFD_RELOC_PPC_TPREL16_LO: r = R_PPC_TPREL16_LO; break;
783 case BFD_RELOC_PPC_TPREL16_HI: r = R_PPC_TPREL16_HI; break;
784 case BFD_RELOC_PPC_TPREL16_HA: r = R_PPC_TPREL16_HA; break;
785 case BFD_RELOC_PPC_TPREL: r = R_PPC_TPREL32; break;
1fe532cf 786 case BFD_RELOC_PPC64_DTPREL16_DS:
25dbc73a 787 case BFD_RELOC_PPC_DTPREL16: r = R_PPC_DTPREL16; break;
1fe532cf 788 case BFD_RELOC_PPC64_DTPREL16_LO_DS:
25dbc73a
AM
789 case BFD_RELOC_PPC_DTPREL16_LO: r = R_PPC_DTPREL16_LO; break;
790 case BFD_RELOC_PPC_DTPREL16_HI: r = R_PPC_DTPREL16_HI; break;
791 case BFD_RELOC_PPC_DTPREL16_HA: r = R_PPC_DTPREL16_HA; break;
792 case BFD_RELOC_PPC_DTPREL: r = R_PPC_DTPREL32; break;
793 case BFD_RELOC_PPC_GOT_TLSGD16: r = R_PPC_GOT_TLSGD16; break;
794 case BFD_RELOC_PPC_GOT_TLSGD16_LO: r = R_PPC_GOT_TLSGD16_LO; break;
795 case BFD_RELOC_PPC_GOT_TLSGD16_HI: r = R_PPC_GOT_TLSGD16_HI; break;
796 case BFD_RELOC_PPC_GOT_TLSGD16_HA: r = R_PPC_GOT_TLSGD16_HA; break;
797 case BFD_RELOC_PPC_GOT_TLSLD16: r = R_PPC_GOT_TLSLD16; break;
798 case BFD_RELOC_PPC_GOT_TLSLD16_LO: r = R_PPC_GOT_TLSLD16_LO; break;
799 case BFD_RELOC_PPC_GOT_TLSLD16_HI: r = R_PPC_GOT_TLSLD16_HI; break;
800 case BFD_RELOC_PPC_GOT_TLSLD16_HA: r = R_PPC_GOT_TLSLD16_HA; break;
801 case BFD_RELOC_PPC_GOT_TPREL16: r = R_PPC_GOT_TPREL16; break;
802 case BFD_RELOC_PPC_GOT_TPREL16_LO: r = R_PPC_GOT_TPREL16_LO; break;
803 case BFD_RELOC_PPC_GOT_TPREL16_HI: r = R_PPC_GOT_TPREL16_HI; break;
804 case BFD_RELOC_PPC_GOT_TPREL16_HA: r = R_PPC_GOT_TPREL16_HA; break;
805 case BFD_RELOC_PPC_GOT_DTPREL16: r = R_PPC_GOT_DTPREL16; break;
806 case BFD_RELOC_PPC_GOT_DTPREL16_LO: r = R_PPC_GOT_DTPREL16_LO; break;
807 case BFD_RELOC_PPC_GOT_DTPREL16_HI: r = R_PPC_GOT_DTPREL16_HI; break;
808 case BFD_RELOC_PPC_GOT_DTPREL16_HA: r = R_PPC_GOT_DTPREL16_HA; break;
809 case BFD_RELOC_PPC_EMB_NADDR32: r = R_PPC_EMB_NADDR32; break;
810 case BFD_RELOC_PPC_EMB_NADDR16: r = R_PPC_EMB_NADDR16; break;
811 case BFD_RELOC_PPC_EMB_NADDR16_LO: r = R_PPC_EMB_NADDR16_LO; break;
812 case BFD_RELOC_PPC_EMB_NADDR16_HI: r = R_PPC_EMB_NADDR16_HI; break;
813 case BFD_RELOC_PPC_EMB_NADDR16_HA: r = R_PPC_EMB_NADDR16_HA; break;
814 case BFD_RELOC_PPC_EMB_SDAI16: r = R_PPC_EMB_SDAI16; break;
815 case BFD_RELOC_PPC_EMB_SDA2I16: r = R_PPC_EMB_SDA2I16; break;
816 case BFD_RELOC_PPC_EMB_SDA2REL: r = R_PPC_EMB_SDA2REL; break;
817 case BFD_RELOC_PPC_EMB_SDA21: r = R_PPC_EMB_SDA21; break;
818 case BFD_RELOC_PPC_EMB_MRKREF: r = R_PPC_EMB_MRKREF; break;
819 case BFD_RELOC_PPC_EMB_RELSEC16: r = R_PPC_EMB_RELSEC16; break;
820 case BFD_RELOC_PPC_EMB_RELST_LO: r = R_PPC_EMB_RELST_LO; break;
821 case BFD_RELOC_PPC_EMB_RELST_HI: r = R_PPC_EMB_RELST_HI; break;
822 case BFD_RELOC_PPC_EMB_RELST_HA: r = R_PPC_EMB_RELST_HA; break;
823 case BFD_RELOC_PPC_EMB_BIT_FLD: r = R_PPC_EMB_BIT_FLD; break;
824 case BFD_RELOC_PPC_EMB_RELSDA: r = R_PPC_EMB_RELSDA; break;
b9c361e0
JL
825 case BFD_RELOC_PPC_VLE_REL8: r = R_PPC_VLE_REL8; break;
826 case BFD_RELOC_PPC_VLE_REL15: r = R_PPC_VLE_REL15; break;
827 case BFD_RELOC_PPC_VLE_REL24: r = R_PPC_VLE_REL24; break;
828 case BFD_RELOC_PPC_VLE_LO16A: r = R_PPC_VLE_LO16A; break;
829 case BFD_RELOC_PPC_VLE_LO16D: r = R_PPC_VLE_LO16D; break;
830 case BFD_RELOC_PPC_VLE_HI16A: r = R_PPC_VLE_HI16A; break;
831 case BFD_RELOC_PPC_VLE_HI16D: r = R_PPC_VLE_HI16D; break;
832 case BFD_RELOC_PPC_VLE_HA16A: r = R_PPC_VLE_HA16A; break;
833 case BFD_RELOC_PPC_VLE_HA16D: r = R_PPC_VLE_HA16D; break;
834 case BFD_RELOC_PPC_VLE_SDA21: r = R_PPC_VLE_SDA21; break;
835 case BFD_RELOC_PPC_VLE_SDA21_LO: r = R_PPC_VLE_SDA21_LO; break;
836 case BFD_RELOC_PPC_VLE_SDAREL_LO16A:
837 r = R_PPC_VLE_SDAREL_LO16A;
838 break;
839 case BFD_RELOC_PPC_VLE_SDAREL_LO16D:
840 r = R_PPC_VLE_SDAREL_LO16D;
841 break;
842 case BFD_RELOC_PPC_VLE_SDAREL_HI16A:
843 r = R_PPC_VLE_SDAREL_HI16A;
844 break;
845 case BFD_RELOC_PPC_VLE_SDAREL_HI16D:
846 r = R_PPC_VLE_SDAREL_HI16D;
847 break;
848 case BFD_RELOC_PPC_VLE_SDAREL_HA16A:
849 r = R_PPC_VLE_SDAREL_HA16A;
850 break;
851 case BFD_RELOC_PPC_VLE_SDAREL_HA16D:
852 r = R_PPC_VLE_SDAREL_HA16D;
853 break;
d7128ce4
AM
854 case BFD_RELOC_16_PCREL: r = R_PPC_REL16; break;
855 case BFD_RELOC_LO16_PCREL: r = R_PPC_REL16_LO; break;
856 case BFD_RELOC_HI16_PCREL: r = R_PPC_REL16_HI; break;
857 case BFD_RELOC_HI16_S_PCREL: r = R_PPC_REL16_HA; break;
7ba71655 858 case BFD_RELOC_PPC_16DX_HA: r = R_PPC_16DX_HA; break;
a680de9a 859 case BFD_RELOC_PPC_REL16DX_HA: r = R_PPC_REL16DX_HA; break;
25dbc73a
AM
860 case BFD_RELOC_VTABLE_INHERIT: r = R_PPC_GNU_VTINHERIT; break;
861 case BFD_RELOC_VTABLE_ENTRY: r = R_PPC_GNU_VTENTRY; break;
862 }
863
864 return ppc_elf_howto_table[r];
865};
866
157090f7
AM
867static reloc_howto_type *
868ppc_elf_reloc_name_lookup (bfd *abfd ATTRIBUTE_UNUSED,
869 const char *r_name)
870{
871 unsigned int i;
872
873 for (i = 0;
874 i < sizeof (ppc_elf_howto_raw) / sizeof (ppc_elf_howto_raw[0]);
875 i++)
876 if (ppc_elf_howto_raw[i].name != NULL
877 && strcasecmp (ppc_elf_howto_raw[i].name, r_name) == 0)
878 return &ppc_elf_howto_raw[i];
879
880 return NULL;
881}
882
25dbc73a
AM
883/* Set the howto pointer for a PowerPC ELF reloc. */
884
0a1b45a2 885static bool
4aef7643 886ppc_elf_info_to_howto (bfd *abfd,
25dbc73a
AM
887 arelent *cache_ptr,
888 Elf_Internal_Rela *dst)
889{
cd21f5da
NC
890 unsigned int r_type;
891
25dbc73a
AM
892 /* Initialize howto table if not already done. */
893 if (!ppc_elf_howto_table[R_PPC_ADDR32])
894 ppc_elf_howto_init ();
895
cd21f5da
NC
896 r_type = ELF32_R_TYPE (dst->r_info);
897 if (r_type >= R_PPC_max)
898 {
695344c0 899 /* xgettext:c-format */
0aa13fee 900 _bfd_error_handler (_("%pB: unsupported relocation type %#x"),
4eca0228 901 abfd, r_type);
cd21f5da 902 bfd_set_error (bfd_error_bad_value);
0a1b45a2 903 return false;
cd21f5da 904 }
f3185997 905
cd21f5da 906 cache_ptr->howto = ppc_elf_howto_table[r_type];
375de94a
AM
907
908 /* Just because the above assert didn't trigger doesn't mean that
909 ELF32_R_TYPE (dst->r_info) is necessarily a valid relocation. */
f3185997 910 if (cache_ptr->howto == NULL)
375de94a 911 {
695344c0 912 /* xgettext:c-format */
0aa13fee 913 _bfd_error_handler (_("%pB: unsupported relocation type %#x"),
4eca0228 914 abfd, r_type);
375de94a
AM
915 bfd_set_error (bfd_error_bad_value);
916
0a1b45a2 917 return false;
375de94a 918 }
f3185997 919
0a1b45a2 920 return true;
25dbc73a
AM
921}
922
d7128ce4 923/* Handle the R_PPC_ADDR16_HA and R_PPC_REL16_HA relocs. */
25dbc73a
AM
924
925static bfd_reloc_status_type
4aef7643 926ppc_elf_addr16_ha_reloc (bfd *abfd,
25dbc73a
AM
927 arelent *reloc_entry,
928 asymbol *symbol,
4aef7643 929 void *data,
25dbc73a
AM
930 asection *input_section,
931 bfd *output_bfd,
932 char **error_message ATTRIBUTE_UNUSED)
933{
a680de9a
PB
934 enum elf_ppc_reloc_type r_type;
935 long insn;
936 bfd_size_type octets;
937 bfd_vma value;
25dbc73a
AM
938
939 if (output_bfd != NULL)
940 {
941 reloc_entry->address += input_section->output_offset;
942 return bfd_reloc_ok;
943 }
944
a680de9a
PB
945 reloc_entry->addend += 0x8000;
946 r_type = reloc_entry->howto->type;
947 if (r_type != R_PPC_REL16DX_HA)
948 return bfd_reloc_continue;
949
950 value = 0;
951 if (!bfd_is_com_section (symbol->section))
952 value = symbol->value;
953 value += (reloc_entry->addend
954 + symbol->section->output_offset
955 + symbol->section->output_section->vma);
956 value -= (reloc_entry->address
957 + input_section->output_offset
958 + input_section->output_section->vma);
959 value >>= 16;
960
bb294208 961 octets = reloc_entry->address * OCTETS_PER_BYTE (abfd, input_section);
b54509b8
AM
962 if (!bfd_reloc_offset_in_range (reloc_entry->howto, abfd,
963 input_section, octets))
964 return bfd_reloc_outofrange;
965
a680de9a
PB
966 insn = bfd_get_32 (abfd, (bfd_byte *) data + octets);
967 insn &= ~0x1fffc1;
968 insn |= (value & 0xffc1) | ((value & 0x3e) << 15);
969 bfd_put_32 (abfd, insn, (bfd_byte *) data + octets);
970 return bfd_reloc_ok;
25dbc73a
AM
971}
972
973static bfd_reloc_status_type
974ppc_elf_unhandled_reloc (bfd *abfd,
975 arelent *reloc_entry,
976 asymbol *symbol,
977 void *data,
978 asection *input_section,
979 bfd *output_bfd,
980 char **error_message)
981{
982 /* If this is a relocatable link (output_bfd test tells us), just
983 call the generic function. Any adjustment will be done at final
984 link time. */
985 if (output_bfd != NULL)
986 return bfd_elf_generic_reloc (abfd, reloc_entry, symbol, data,
987 input_section, output_bfd, error_message);
988
989 if (error_message != NULL)
6f860418
AM
990 *error_message = bfd_asprintf (_("generic linker can't handle %s"),
991 reloc_entry->howto->name);
25dbc73a
AM
992 return bfd_reloc_dangerous;
993}
994\f
995/* Sections created by the linker. */
996
997typedef struct elf_linker_section
998{
c9a2f333 999 /* Pointer to the bfd section. */
25dbc73a 1000 asection *section;
c9a2f333
AM
1001 /* Section name. */
1002 const char *name;
1003 /* Associated bss section name. */
1004 const char *bss_name;
1005 /* Associated symbol name. */
1006 const char *sym_name;
046183de
AM
1007 /* Associated symbol. */
1008 struct elf_link_hash_entry *sym;
25dbc73a
AM
1009} elf_linker_section_t;
1010
1011/* Linked list of allocated pointer entries. This hangs off of the
1012 symbol lists, and provides allows us to return different pointers,
1013 based on different addend's. */
1014
1015typedef struct elf_linker_section_pointers
1016{
1017 /* next allocated pointer for this symbol */
1018 struct elf_linker_section_pointers *next;
1019 /* offset of pointer from beginning of section */
1020 bfd_vma offset;
1021 /* addend used */
1022 bfd_vma addend;
1023 /* which linker section this is */
1024 elf_linker_section_t *lsect;
25dbc73a
AM
1025} elf_linker_section_pointers_t;
1026
1027struct ppc_elf_obj_tdata
1028{
1029 struct elf_obj_tdata elf;
1030
1031 /* A mapping from local symbols to offsets into the various linker
1032 sections added. This is index by the symbol index. */
1033 elf_linker_section_pointers_t **linker_section_pointers;
016687f8
AM
1034
1035 /* Flags used to auto-detect plt type. */
1036 unsigned int makes_plt_call : 1;
1037 unsigned int has_rel16 : 1;
25dbc73a
AM
1038};
1039
1040#define ppc_elf_tdata(bfd) \
1041 ((struct ppc_elf_obj_tdata *) (bfd)->tdata.any)
7619e7c7 1042
25dbc73a
AM
1043#define elf_local_ptr_offsets(bfd) \
1044 (ppc_elf_tdata (bfd)->linker_section_pointers)
7619e7c7 1045
0c8d6e5c
AM
1046#define is_ppc_elf(bfd) \
1047 (bfd_get_flavour (bfd) == bfd_target_elf_flavour \
4dfe6ac6 1048 && elf_object_id (bfd) == PPC32_ELF_DATA)
0c8d6e5c 1049
25dbc73a 1050/* Override the generic function because we store some extras. */
7619e7c7 1051
0a1b45a2 1052static bool
25dbc73a
AM
1053ppc_elf_mkobject (bfd *abfd)
1054{
0ffa91dd 1055 return bfd_elf_allocate_object (abfd, sizeof (struct ppc_elf_obj_tdata),
4dfe6ac6 1056 PPC32_ELF_DATA);
25dbc73a 1057}
7619e7c7 1058
14b57c7c
AM
1059/* When defaulting arch/mach, decode apuinfo to find a better match. */
1060
0a1b45a2 1061bool
14b57c7c
AM
1062_bfd_elf_ppc_set_arch (bfd *abfd)
1063{
1064 unsigned long mach = 0;
1065 asection *s;
1066 unsigned char *contents;
1067
1068 if (abfd->arch_info->bits_per_word == 32
1069 && bfd_big_endian (abfd))
1070 {
1071
1072 for (s = abfd->sections; s != NULL; s = s->next)
1073 if ((elf_section_data (s)->this_hdr.sh_flags & SHF_PPC_VLE) != 0)
1074 break;
1075 if (s != NULL)
1076 mach = bfd_mach_ppc_vle;
1077 }
1078
1079 if (mach == 0)
1080 {
1081 s = bfd_get_section_by_name (abfd, APUINFO_SECTION_NAME);
62a47958
AM
1082 if (s != NULL
1083 && s->size >= 24
81ff113f 1084 && (s->flags & SEC_HAS_CONTENTS) != 0
62a47958 1085 && bfd_malloc_and_get_section (abfd, s, &contents))
14b57c7c
AM
1086 {
1087 unsigned int apuinfo_size = bfd_get_32 (abfd, contents + 4);
1088 unsigned int i;
1089
1090 for (i = 20; i < apuinfo_size + 20 && i + 4 <= s->size; i += 4)
1091 {
1092 unsigned int val = bfd_get_32 (abfd, contents + i);
1093 switch (val >> 16)
1094 {
1095 case PPC_APUINFO_PMR:
1096 case PPC_APUINFO_RFMCI:
1097 if (mach == 0)
1098 mach = bfd_mach_ppc_titan;
1099 break;
1100
1101 case PPC_APUINFO_ISEL:
1102 case PPC_APUINFO_CACHELCK:
1103 if (mach == bfd_mach_ppc_titan)
1104 mach = bfd_mach_ppc_e500mc;
1105 break;
1106
1107 case PPC_APUINFO_SPE:
1108 case PPC_APUINFO_EFS:
1109 case PPC_APUINFO_BRLOCK:
1110 if (mach != bfd_mach_ppc_vle)
1111 mach = bfd_mach_ppc_e500;
8941017b 1112 break;
14b57c7c
AM
1113
1114 case PPC_APUINFO_VLE:
1115 mach = bfd_mach_ppc_vle;
1116 break;
1117
1118 default:
1119 mach = -1ul;
1120 }
1121 }
1122 free (contents);
1123 }
1124 }
1125
1126 if (mach != 0 && mach != -1ul)
1127 {
1128 const bfd_arch_info_type *arch;
1129
1130 for (arch = abfd->arch_info->next; arch; arch = arch->next)
1131 if (arch->mach == mach)
1132 {
1133 abfd->arch_info = arch;
1134 break;
1135 }
1136 }
0a1b45a2 1137 return true;
14b57c7c
AM
1138}
1139
25dbc73a 1140/* Fix bad default arch selected for a 32 bit input bfd when the
14b57c7c 1141 default is 64 bit. Also select arch based on apuinfo. */
7619e7c7 1142
0a1b45a2 1143static bool
25dbc73a
AM
1144ppc_elf_object_p (bfd *abfd)
1145{
14b57c7c 1146 if (!abfd->arch_info->the_default)
0a1b45a2 1147 return true;
14b57c7c
AM
1148
1149 if (abfd->arch_info->bits_per_word == 64)
25dbc73a
AM
1150 {
1151 Elf_Internal_Ehdr *i_ehdr = elf_elfheader (abfd);
7619e7c7 1152
25dbc73a
AM
1153 if (i_ehdr->e_ident[EI_CLASS] == ELFCLASS32)
1154 {
1155 /* Relies on arch after 64 bit default being 32 bit default. */
1156 abfd->arch_info = abfd->arch_info->next;
1157 BFD_ASSERT (abfd->arch_info->bits_per_word == 32);
1158 }
1159 }
14b57c7c 1160 return _bfd_elf_ppc_set_arch (abfd);
25dbc73a 1161}
7619e7c7 1162
25dbc73a 1163/* Function to set whether a module needs the -mrelocatable bit set. */
7619e7c7 1164
0a1b45a2 1165static bool
25dbc73a
AM
1166ppc_elf_set_private_flags (bfd *abfd, flagword flags)
1167{
1168 BFD_ASSERT (!elf_flags_init (abfd)
1169 || elf_elfheader (abfd)->e_flags == flags);
7619e7c7 1170
25dbc73a 1171 elf_elfheader (abfd)->e_flags = flags;
0a1b45a2
AM
1172 elf_flags_init (abfd) = true;
1173 return true;
25dbc73a
AM
1174}
1175
25dbc73a 1176/* Support for core dump NOTE sections. */
deaaf2f3 1177
0a1b45a2 1178static bool
25dbc73a 1179ppc_elf_grok_prstatus (bfd *abfd, Elf_Internal_Note *note)
252b5132 1180{
25dbc73a
AM
1181 int offset;
1182 unsigned int size;
252b5132 1183
25dbc73a
AM
1184 switch (note->descsz)
1185 {
1186 default:
0a1b45a2 1187 return false;
252b5132 1188
25dbc73a
AM
1189 case 268: /* Linux/PPC. */
1190 /* pr_cursig */
228e534f 1191 elf_tdata (abfd)->core->signal = bfd_get_16 (abfd, note->descdata + 12);
deaaf2f3 1192
25dbc73a 1193 /* pr_pid */
228e534f 1194 elf_tdata (abfd)->core->lwpid = bfd_get_32 (abfd, note->descdata + 24);
9abc968f 1195
25dbc73a
AM
1196 /* pr_reg */
1197 offset = 72;
1198 size = 192;
deaaf2f3 1199
25dbc73a
AM
1200 break;
1201 }
deaaf2f3 1202
25dbc73a
AM
1203 /* Make a ".reg/999" section. */
1204 return _bfd_elfcore_make_pseudosection (abfd, ".reg",
1205 size, note->descpos + offset);
1206}
252b5132 1207
0a1b45a2 1208static bool
25dbc73a
AM
1209ppc_elf_grok_psinfo (bfd *abfd, Elf_Internal_Note *note)
1210{
1211 switch (note->descsz)
deaaf2f3 1212 {
25dbc73a 1213 default:
0a1b45a2 1214 return false;
deaaf2f3 1215
25dbc73a 1216 case 128: /* Linux/PPC elf_prpsinfo. */
228e534f 1217 elf_tdata (abfd)->core->pid
bc989cdc 1218 = bfd_get_32 (abfd, note->descdata + 16);
228e534f 1219 elf_tdata (abfd)->core->program
25dbc73a 1220 = _bfd_elfcore_strndup (abfd, note->descdata + 32, 16);
228e534f 1221 elf_tdata (abfd)->core->command
25dbc73a
AM
1222 = _bfd_elfcore_strndup (abfd, note->descdata + 48, 80);
1223 }
9abc968f 1224
25dbc73a
AM
1225 /* Note that for some reason, a spurious space is tacked
1226 onto the end of the args in some (at least one anyway)
1227 implementations, so strip it off if it exists. */
70bccea4 1228
25dbc73a 1229 {
228e534f 1230 char *command = elf_tdata (abfd)->core->command;
25dbc73a 1231 int n = strlen (command);
70bccea4 1232
25dbc73a
AM
1233 if (0 < n && command[n - 1] == ' ')
1234 command[n - 1] = '\0';
1235 }
deaaf2f3 1236
0a1b45a2 1237 return true;
25dbc73a 1238}
deaaf2f3 1239
183e98be
AM
1240static char *
1241ppc_elf_write_core_note (bfd *abfd, char *buf, int *bufsiz, int note_type, ...)
1242{
1243 switch (note_type)
1244 {
1245 default:
1246 return NULL;
1247
1248 case NT_PRPSINFO:
1249 {
602f1657 1250 char data[128] ATTRIBUTE_NONSTRING;
183e98be
AM
1251 va_list ap;
1252
1253 va_start (ap, note_type);
75cd47ed 1254 memset (data, 0, sizeof (data));
183e98be 1255 strncpy (data + 32, va_arg (ap, const char *), 16);
be3e27bb 1256#if GCC_VERSION == 8000 || GCC_VERSION == 8001
95da9854 1257 DIAGNOSTIC_PUSH;
be3e27bb 1258 /* GCC 8.0 and 8.1 warn about 80 equals destination size with
95da9854
L
1259 -Wstringop-truncation:
1260 https://gcc.gnu.org/bugzilla/show_bug.cgi?id=85643
1261 */
95da9854
L
1262 DIAGNOSTIC_IGNORE_STRINGOP_TRUNCATION;
1263#endif
183e98be 1264 strncpy (data + 48, va_arg (ap, const char *), 80);
be3e27bb 1265#if GCC_VERSION == 8000 || GCC_VERSION == 8001
95da9854 1266 DIAGNOSTIC_POP;
fe75810f 1267#endif
183e98be
AM
1268 va_end (ap);
1269 return elfcore_write_note (abfd, buf, bufsiz,
1270 "CORE", note_type, data, sizeof (data));
1271 }
1272
1273 case NT_PRSTATUS:
1274 {
1275 char data[268];
1276 va_list ap;
1277 long pid;
1278 int cursig;
1279 const void *greg;
1280
1281 va_start (ap, note_type);
1282 memset (data, 0, 72);
1283 pid = va_arg (ap, long);
1284 bfd_put_32 (abfd, pid, data + 24);
1285 cursig = va_arg (ap, int);
1286 bfd_put_16 (abfd, cursig, data + 12);
1287 greg = va_arg (ap, const void *);
1288 memcpy (data + 72, greg, 192);
1289 memset (data + 264, 0, 4);
1290 va_end (ap);
1291 return elfcore_write_note (abfd, buf, bufsiz,
1292 "CORE", note_type, data, sizeof (data));
1293 }
1294 }
1295}
1296
b9c361e0 1297static flagword
68ffbac6 1298ppc_elf_lookup_section_flags (char *flag_name)
b9c361e0
JL
1299{
1300
1301 if (!strcmp (flag_name, "SHF_PPC_VLE"))
1302 return SHF_PPC_VLE;
1303
1304 return 0;
1305}
1306
25dbc73a
AM
1307/* Return address for Ith PLT stub in section PLT, for relocation REL
1308 or (bfd_vma) -1 if it should not be included. */
deaaf2f3 1309
25dbc73a
AM
1310static bfd_vma
1311ppc_elf_plt_sym_val (bfd_vma i ATTRIBUTE_UNUSED,
1312 const asection *plt ATTRIBUTE_UNUSED,
1313 const arelent *rel)
1314{
1315 return rel->address;
1316}
deaaf2f3 1317
25dbc73a 1318/* Handle a PowerPC specific section when reading an object file. This
6dc132d9
L
1319 is called when bfd_section_from_shdr finds a section with an unknown
1320 type. */
deaaf2f3 1321
0a1b45a2 1322static bool
6dc132d9
L
1323ppc_elf_section_from_shdr (bfd *abfd,
1324 Elf_Internal_Shdr *hdr,
1325 const char *name,
1326 int shindex)
25dbc73a
AM
1327{
1328 asection *newsect;
1329 flagword flags;
d1c6de6f 1330
6dc132d9 1331 if (! _bfd_elf_make_section_from_shdr (abfd, hdr, name, shindex))
0a1b45a2 1332 return false;
deaaf2f3 1333
25dbc73a 1334 newsect = hdr->bfd_section;
bf577467 1335 flags = 0;
25dbc73a
AM
1336 if (hdr->sh_flags & SHF_EXCLUDE)
1337 flags |= SEC_EXCLUDE;
9abc968f 1338
25dbc73a
AM
1339 if (hdr->sh_type == SHT_ORDERED)
1340 flags |= SEC_SORT_ENTRIES;
d1c6de6f 1341
3f3328b8 1342 if (startswith (name, ".PPC.EMB"))
bf577467 1343 name += 8;
3f3328b8
ML
1344 if (startswith (name, ".sbss")
1345 || startswith (name, ".sdata"))
bf577467
AM
1346 flags |= SEC_SMALL_DATA;
1347
1348 return (flags == 0
1349 || bfd_set_section_flags (newsect, newsect->flags | flags));
25dbc73a
AM
1350}
1351
1352/* Set up any other section flags and such that may be necessary. */
1353
0a1b45a2 1354static bool
25dbc73a
AM
1355ppc_elf_fake_sections (bfd *abfd ATTRIBUTE_UNUSED,
1356 Elf_Internal_Shdr *shdr,
1357 asection *asect)
1358{
25dbc73a
AM
1359 if ((asect->flags & SEC_SORT_ENTRIES) != 0)
1360 shdr->sh_type = SHT_ORDERED;
1361
0a1b45a2 1362 return true;
25dbc73a
AM
1363}
1364
1365/* If we have .sbss2 or .PPC.EMB.sbss0 output sections, we
1366 need to bump up the number of section headers. */
1367
1368static int
a6b96beb
AM
1369ppc_elf_additional_program_headers (bfd *abfd,
1370 struct bfd_link_info *info ATTRIBUTE_UNUSED)
25dbc73a
AM
1371{
1372 asection *s;
1373 int ret = 0;
d1c6de6f 1374
25dbc73a
AM
1375 s = bfd_get_section_by_name (abfd, ".sbss2");
1376 if (s != NULL && (s->flags & SEC_ALLOC) != 0)
1377 ++ret;
d1c6de6f 1378
25dbc73a
AM
1379 s = bfd_get_section_by_name (abfd, ".PPC.EMB.sbss0");
1380 if (s != NULL && (s->flags & SEC_ALLOC) != 0)
1381 ++ret;
deaaf2f3 1382
25dbc73a
AM
1383 return ret;
1384}
deaaf2f3 1385
68ffbac6 1386/* Modify the segment map for VLE executables. */
b9c361e0 1387
0a1b45a2 1388bool
b9c361e0
JL
1389ppc_elf_modify_segment_map (bfd *abfd,
1390 struct bfd_link_info *info ATTRIBUTE_UNUSED)
1391{
f7d69005 1392 struct elf_segment_map *m;
b9c361e0
JL
1393
1394 /* At this point in the link, output sections have already been sorted by
1395 LMA and assigned to segments. All that is left to do is to ensure
1396 there is no mixing of VLE & non-VLE sections in a text segment.
1397 If we find that case, we split the segment.
1398 We maintain the original output section order. */
1399
12bd6957 1400 for (m = elf_seg_map (abfd); m != NULL; m = m->next)
b9c361e0 1401 {
f7d69005 1402 struct elf_segment_map *n;
986f0783 1403 size_t amt;
f7d69005
AM
1404 unsigned int j, k;
1405 unsigned int p_flags;
1406
1407 if (m->p_type != PT_LOAD || m->count == 0)
b9c361e0
JL
1408 continue;
1409
f7d69005 1410 for (p_flags = PF_R, j = 0; j != m->count; ++j)
b9c361e0 1411 {
f7d69005
AM
1412 if ((m->sections[j]->flags & SEC_READONLY) == 0)
1413 p_flags |= PF_W;
1414 if ((m->sections[j]->flags & SEC_CODE) != 0)
1415 {
1416 p_flags |= PF_X;
1417 if ((elf_section_flags (m->sections[j]) & SHF_PPC_VLE) != 0)
1418 p_flags |= PF_PPC_VLE;
1419 break;
1420 }
1421 }
1422 if (j != m->count)
1423 while (++j != m->count)
1424 {
1425 unsigned int p_flags1 = PF_R;
94caa966 1426
f7d69005
AM
1427 if ((m->sections[j]->flags & SEC_READONLY) == 0)
1428 p_flags1 |= PF_W;
1429 if ((m->sections[j]->flags & SEC_CODE) != 0)
1430 {
1431 p_flags1 |= PF_X;
1432 if ((elf_section_flags (m->sections[j]) & SHF_PPC_VLE) != 0)
1433 p_flags1 |= PF_PPC_VLE;
1434 if (((p_flags1 ^ p_flags) & PF_PPC_VLE) != 0)
1435 break;
1436 }
1437 p_flags |= p_flags1;
1438 }
1439 /* If we're splitting a segment which originally contained rw
1440 sections then those sections might now only be in one of the
1441 two parts. So always set p_flags if splitting, even if we
1442 are being called for objcopy with p_flags_valid set. */
1443 if (j != m->count || !m->p_flags_valid)
1444 {
1445 m->p_flags_valid = 1;
1446 m->p_flags = p_flags;
1447 }
1448 if (j == m->count)
b9c361e0
JL
1449 continue;
1450
f7d69005 1451 /* Sections 0..j-1 stay in this (current) segment,
b9c361e0
JL
1452 the remainder are put in a new segment.
1453 The scan resumes with the new segment. */
1454
b9c361e0
JL
1455 amt = sizeof (struct elf_segment_map);
1456 amt += (m->count - j - 1) * sizeof (asection *);
1457 n = (struct elf_segment_map *) bfd_zalloc (abfd, amt);
1458 if (n == NULL)
0a1b45a2 1459 return false;
b9c361e0
JL
1460
1461 n->p_type = PT_LOAD;
b9c361e0
JL
1462 n->count = m->count - j;
1463 for (k = 0; k < n->count; ++k)
f7d69005
AM
1464 n->sections[k] = m->sections[j + k];
1465 m->count = j;
1466 m->p_size_valid = 0;
b9c361e0
JL
1467 n->next = m->next;
1468 m->next = n;
b9c361e0
JL
1469 }
1470
0a1b45a2 1471 return true;
b9c361e0
JL
1472}
1473
25dbc73a
AM
1474/* Add extra PPC sections -- Note, for now, make .sbss2 and
1475 .PPC.EMB.sbss0 a normal section, and not a bss section so
1476 that the linker doesn't crater when trying to make more than
1477 2 sections. */
e656e369 1478
b35d266b 1479static const struct bfd_elf_special_section ppc_elf_special_sections[] =
7f4d3958 1480{
14b57c7c
AM
1481 { STRING_COMMA_LEN (".plt"), 0, SHT_NOBITS, SHF_ALLOC + SHF_EXECINSTR },
1482 { STRING_COMMA_LEN (".sbss"), -2, SHT_NOBITS, SHF_ALLOC + SHF_WRITE },
1483 { STRING_COMMA_LEN (".sbss2"), -2, SHT_PROGBITS, SHF_ALLOC },
1484 { STRING_COMMA_LEN (".sdata"), -2, SHT_PROGBITS, SHF_ALLOC + SHF_WRITE },
1485 { STRING_COMMA_LEN (".sdata2"), -2, SHT_PROGBITS, SHF_ALLOC },
1486 { STRING_COMMA_LEN (".tags"), 0, SHT_ORDERED, SHF_ALLOC },
1487 { STRING_COMMA_LEN (APUINFO_SECTION_NAME), 0, SHT_NOTE, 0 },
1488 { STRING_COMMA_LEN (".PPC.EMB.sbss0"), 0, SHT_PROGBITS, SHF_ALLOC },
1489 { STRING_COMMA_LEN (".PPC.EMB.sdata0"), 0, SHT_PROGBITS, SHF_ALLOC },
1490 { NULL, 0, 0, 0, 0 }
7f4d3958
L
1491};
1492
551b43fd 1493/* This is what we want for new plt/got. */
bd38246a 1494static const struct bfd_elf_special_section ppc_alt_plt =
07d6d2b8 1495 { STRING_COMMA_LEN (".plt"), 0, SHT_PROGBITS, SHF_ALLOC };
551b43fd
AM
1496
1497static const struct bfd_elf_special_section *
4aef7643 1498ppc_elf_get_sec_type_attr (bfd *abfd, asection *sec)
7f4d3958 1499{
b35d266b 1500 const struct bfd_elf_special_section *ssect;
551b43fd
AM
1501
1502 /* See if this is one of the special sections. */
1503 if (sec->name == NULL)
1504 return NULL;
1505
1506 ssect = _bfd_elf_get_special_section (sec->name, ppc_elf_special_sections,
1507 sec->use_rela_p);
1508 if (ssect != NULL)
1509 {
1510 if (ssect == ppc_elf_special_sections && (sec->flags & SEC_LOAD) != 0)
1511 ssect = &ppc_alt_plt;
1512 return ssect;
1513 }
1514
1515 return _bfd_elf_get_sec_type_attr (abfd, sec);
1516}
25dbc73a
AM
1517\f
1518/* Very simple linked list structure for recording apuinfo values. */
1519typedef struct apuinfo_list
1520{
1521 struct apuinfo_list *next;
1522 unsigned long value;
1523}
1524apuinfo_list;
e656e369 1525
25dbc73a 1526static apuinfo_list *head;
0a1b45a2 1527static bool apuinfo_set;
deaaf2f3 1528
25dbc73a
AM
1529static void
1530apuinfo_list_init (void)
1531{
1532 head = NULL;
0a1b45a2 1533 apuinfo_set = false;
25dbc73a 1534}
9abc968f 1535
25dbc73a
AM
1536static void
1537apuinfo_list_add (unsigned long value)
1538{
1539 apuinfo_list *entry = head;
deaaf2f3 1540
25dbc73a
AM
1541 while (entry != NULL)
1542 {
1543 if (entry->value == value)
1544 return;
1545 entry = entry->next;
1546 }
b4a38de6 1547
25dbc73a
AM
1548 entry = bfd_malloc (sizeof (* entry));
1549 if (entry == NULL)
1550 return;
e656e369 1551
25dbc73a
AM
1552 entry->value = value;
1553 entry->next = head;
1554 head = entry;
1555}
9abc968f 1556
25dbc73a
AM
1557static unsigned
1558apuinfo_list_length (void)
1559{
1560 apuinfo_list *entry;
1561 unsigned long count;
9abc968f 1562
25dbc73a
AM
1563 for (entry = head, count = 0;
1564 entry;
1565 entry = entry->next)
1566 ++ count;
e656e369 1567
25dbc73a
AM
1568 return count;
1569}
eea6121a 1570
25dbc73a
AM
1571static inline unsigned long
1572apuinfo_list_element (unsigned long number)
1573{
1574 apuinfo_list * entry;
e656e369 1575
25dbc73a
AM
1576 for (entry = head;
1577 entry && number --;
1578 entry = entry->next)
1579 ;
252b5132 1580
25dbc73a
AM
1581 return entry ? entry->value : 0;
1582}
1583
1584static void
1585apuinfo_list_finish (void)
1586{
1587 apuinfo_list *entry;
1588
1589 for (entry = head; entry;)
252b5132 1590 {
25dbc73a
AM
1591 apuinfo_list *next = entry->next;
1592 free (entry);
1593 entry = next;
1594 }
9abc968f 1595
25dbc73a
AM
1596 head = NULL;
1597}
9abc968f 1598
25dbc73a
AM
1599/* Scan the input BFDs and create a linked list of
1600 the APUinfo values that will need to be emitted. */
9abc968f 1601
25dbc73a
AM
1602static void
1603ppc_elf_begin_write_processing (bfd *abfd, struct bfd_link_info *link_info)
1604{
1605 bfd *ibfd;
1606 asection *asec;
deddc40b
NS
1607 char *buffer = NULL;
1608 bfd_size_type largest_input_size = 0;
25dbc73a 1609 unsigned i;
25dbc73a
AM
1610 unsigned long length;
1611 const char *error_message = NULL;
9abc968f 1612
25dbc73a
AM
1613 if (link_info == NULL)
1614 return;
9abc968f 1615
25dbc73a 1616 apuinfo_list_init ();
252b5132 1617
25dbc73a 1618 /* Read in the input sections contents. */
c72f2fb2 1619 for (ibfd = link_info->input_bfds; ibfd; ibfd = ibfd->link.next)
252b5132 1620 {
25dbc73a 1621 unsigned long datum;
252b5132 1622
25dbc73a
AM
1623 asec = bfd_get_section_by_name (ibfd, APUINFO_SECTION_NAME);
1624 if (asec == NULL)
1625 continue;
252b5132 1626
695344c0 1627 /* xgettext:c-format */
871b3ab2 1628 error_message = _("corrupt %s section in %pB");
25dbc73a 1629 length = asec->size;
deddc40b
NS
1630 if (length < 20)
1631 goto fail;
1632
0a1b45a2 1633 apuinfo_set = true;
deddc40b 1634 if (largest_input_size < asec->size)
25dbc73a 1635 {
c9594989 1636 free (buffer);
deddc40b
NS
1637 largest_input_size = asec->size;
1638 buffer = bfd_malloc (largest_input_size);
1639 if (!buffer)
1640 return;
25dbc73a 1641 }
5b914448 1642
25dbc73a 1643 if (bfd_seek (ibfd, asec->filepos, SEEK_SET) != 0
226f9f4f 1644 || (bfd_read (buffer, length, ibfd) != length))
25dbc73a 1645 {
695344c0 1646 /* xgettext:c-format */
871b3ab2 1647 error_message = _("unable to read in %s section from %pB");
25dbc73a
AM
1648 goto fail;
1649 }
252b5132 1650
25dbc73a
AM
1651 /* Verify the contents of the header. Note - we have to
1652 extract the values this way in order to allow for a
1653 host whose endian-ness is different from the target. */
deddc40b 1654 datum = bfd_get_32 (ibfd, buffer);
25dbc73a
AM
1655 if (datum != sizeof APUINFO_LABEL)
1656 goto fail;
252b5132 1657
deddc40b 1658 datum = bfd_get_32 (ibfd, buffer + 8);
25dbc73a
AM
1659 if (datum != 0x2)
1660 goto fail;
252b5132 1661
deddc40b 1662 if (strcmp (buffer + 12, APUINFO_LABEL) != 0)
25dbc73a 1663 goto fail;
252b5132 1664
25dbc73a 1665 /* Get the number of bytes used for apuinfo entries. */
deddc40b 1666 datum = bfd_get_32 (ibfd, buffer + 4);
25dbc73a
AM
1667 if (datum + 20 != length)
1668 goto fail;
1669
25dbc73a
AM
1670 /* Scan the apuinfo section, building a list of apuinfo numbers. */
1671 for (i = 0; i < datum; i += 4)
deddc40b 1672 apuinfo_list_add (bfd_get_32 (ibfd, buffer + 20 + i));
252b5132
RH
1673 }
1674
25dbc73a 1675 error_message = NULL;
252b5132 1676
f2faa800 1677 if (apuinfo_set)
deddc40b 1678 {
f2faa800
NS
1679 /* Compute the size of the output section. */
1680 unsigned num_entries = apuinfo_list_length ();
5b914448 1681
deddc40b
NS
1682 /* Set the output section size, if it exists. */
1683 asec = bfd_get_section_by_name (abfd, APUINFO_SECTION_NAME);
f2faa800 1684
fd361982 1685 if (asec && !bfd_set_section_size (asec, 20 + num_entries * 4))
deddc40b
NS
1686 {
1687 ibfd = abfd;
695344c0 1688 /* xgettext:c-format */
871b3ab2 1689 error_message = _("warning: unable to set size of %s section in %pB");
deddc40b
NS
1690 }
1691 }
25dbc73a
AM
1692
1693 fail:
c9594989 1694 free (buffer);
25dbc73a
AM
1695
1696 if (error_message)
cd9af601 1697 _bfd_error_handler (error_message, APUINFO_SECTION_NAME, ibfd);
25dbc73a 1698}
252b5132 1699
25dbc73a
AM
1700/* Prevent the output section from accumulating the input sections'
1701 contents. We have already stored this in our linked list structure. */
252b5132 1702
0a1b45a2 1703static bool
25dbc73a 1704ppc_elf_write_section (bfd *abfd ATTRIBUTE_UNUSED,
c7b8f16e 1705 struct bfd_link_info *link_info ATTRIBUTE_UNUSED,
25dbc73a
AM
1706 asection *asec,
1707 bfd_byte *contents ATTRIBUTE_UNUSED)
1708{
f2faa800 1709 return apuinfo_set && strcmp (asec->name, APUINFO_SECTION_NAME) == 0;
252b5132
RH
1710}
1711
25dbc73a
AM
1712/* Finally we can generate the output section. */
1713
1714static void
cc364be6 1715ppc_final_write_processing (bfd *abfd)
7619e7c7 1716{
25dbc73a
AM
1717 bfd_byte *buffer;
1718 asection *asec;
1719 unsigned i;
1720 unsigned num_entries;
1721 bfd_size_type length;
7619e7c7 1722
25dbc73a
AM
1723 asec = bfd_get_section_by_name (abfd, APUINFO_SECTION_NAME);
1724 if (asec == NULL)
1725 return;
1726
f2faa800 1727 if (!apuinfo_set)
25dbc73a
AM
1728 return;
1729
1730 length = asec->size;
1731 if (length < 20)
1732 return;
1733
1734 buffer = bfd_malloc (length);
1735 if (buffer == NULL)
7619e7c7 1736 {
4eca0228 1737 _bfd_error_handler
cf97bcb0 1738 (_("failed to allocate space for new APUinfo section"));
25dbc73a 1739 return;
7619e7c7 1740 }
7619e7c7 1741
25dbc73a
AM
1742 /* Create the apuinfo header. */
1743 num_entries = apuinfo_list_length ();
1744 bfd_put_32 (abfd, sizeof APUINFO_LABEL, buffer);
1745 bfd_put_32 (abfd, num_entries * 4, buffer + 4);
1746 bfd_put_32 (abfd, 0x2, buffer + 8);
1747 strcpy ((char *) buffer + 12, APUINFO_LABEL);
feee612b 1748
25dbc73a
AM
1749 length = 20;
1750 for (i = 0; i < num_entries; i++)
feee612b 1751 {
25dbc73a
AM
1752 bfd_put_32 (abfd, apuinfo_list_element (i), buffer + length);
1753 length += 4;
feee612b 1754 }
feee612b 1755
25dbc73a 1756 if (length != asec->size)
cf97bcb0 1757 _bfd_error_handler (_("failed to compute new APUinfo section"));
252b5132 1758
25dbc73a 1759 if (! bfd_set_section_contents (abfd, asec, buffer, (file_ptr) 0, length))
cf97bcb0 1760 _bfd_error_handler (_("failed to install new APUinfo section"));
252b5132 1761
25dbc73a
AM
1762 free (buffer);
1763
1764 apuinfo_list_finish ();
252b5132 1765}
06f44071 1766
0a1b45a2 1767static bool
cc364be6 1768ppc_elf_final_write_processing (bfd *abfd)
06f44071 1769{
cc364be6
AM
1770 ppc_final_write_processing (abfd);
1771 return _bfd_elf_final_write_processing (abfd);
06f44071 1772}
25dbc73a 1773\f
0a1b45a2 1774static bool
c6dd29ce 1775is_nonpic_glink_stub (bfd *abfd, asection *glink, bfd_vma off)
7382d32a 1776{
407aa07c 1777 bfd_byte buf[4 * 4];
7382d32a 1778
9e390558 1779 if (!bfd_get_section_contents (abfd, glink, buf, off, sizeof buf))
0a1b45a2 1780 return false;
7382d32a 1781
c6dd29ce
AM
1782 return ((bfd_get_32 (abfd, buf + 0) & 0xffff0000) == LIS_11
1783 && (bfd_get_32 (abfd, buf + 4) & 0xffff0000) == LWZ_11_11
407aa07c
AM
1784 && bfd_get_32 (abfd, buf + 8) == MTCTR_11
1785 && bfd_get_32 (abfd, buf + 12) == BCTR);
7382d32a
AM
1786}
1787
0a1b45a2 1788static bool
468392fb
AM
1789section_covers_vma (bfd *abfd ATTRIBUTE_UNUSED, asection *section, void *ptr)
1790{
1791 bfd_vma vma = *(bfd_vma *) ptr;
1792 return ((section->flags & SEC_ALLOC) != 0
1793 && section->vma <= vma
1794 && vma < section->vma + section->size);
1795}
1796
1797static long
1798ppc_elf_get_synthetic_symtab (bfd *abfd, long symcount, asymbol **syms,
1799 long dynsymcount, asymbol **dynsyms,
1800 asymbol **ret)
1801{
0a1b45a2 1802 bool (*slurp_relocs) (bfd *, asection *, asymbol **, bool);
468392fb
AM
1803 asection *plt, *relplt, *dynamic, *glink;
1804 bfd_vma glink_vma = 0;
1805 bfd_vma resolv_vma = 0;
9e390558 1806 bfd_vma stub_off;
468392fb
AM
1807 asymbol *s;
1808 arelent *p;
9ad9b810 1809 size_t count, i, stub_delta;
468392fb
AM
1810 size_t size;
1811 char *names;
1812 bfd_byte buf[4];
1813
1814 *ret = NULL;
1815
1816 if ((abfd->flags & (DYNAMIC | EXEC_P)) == 0)
1817 return 0;
1818
1819 if (dynsymcount <= 0)
1820 return 0;
1821
1822 relplt = bfd_get_section_by_name (abfd, ".rela.plt");
1823 if (relplt == NULL)
1824 return 0;
1825
1826 plt = bfd_get_section_by_name (abfd, ".plt");
1827 if (plt == NULL)
1828 return 0;
1829
1830 /* Call common code to handle old-style executable PLTs. */
1831 if (elf_section_flags (plt) & SHF_EXECINSTR)
1832 return _bfd_elf_get_synthetic_symtab (abfd, symcount, syms,
1833 dynsymcount, dynsyms, ret);
1834
1835 /* If this object was prelinked, the prelinker stored the address
1836 of .glink at got[1]. If it wasn't prelinked, got[1] will be zero. */
1837 dynamic = bfd_get_section_by_name (abfd, ".dynamic");
81ff113f
AM
1838 if (dynamic != NULL
1839 && (dynamic->flags & SEC_HAS_CONTENTS) != 0)
468392fb
AM
1840 {
1841 bfd_byte *dynbuf, *extdyn, *extdynend;
1842 size_t extdynsize;
1843 void (*swap_dyn_in) (bfd *, const void *, Elf_Internal_Dyn *);
1844
1845 if (!bfd_malloc_and_get_section (abfd, dynamic, &dynbuf))
1846 return -1;
1847
1848 extdynsize = get_elf_backend_data (abfd)->s->sizeof_dyn;
1849 swap_dyn_in = get_elf_backend_data (abfd)->s->swap_dyn_in;
1850
37c59664
AM
1851 for (extdyn = dynbuf, extdynend = dynbuf + dynamic->size;
1852 (size_t) (extdynend - extdyn) >= extdynsize;
1853 extdyn += extdynsize)
468392fb
AM
1854 {
1855 Elf_Internal_Dyn dyn;
1856 (*swap_dyn_in) (abfd, extdyn, &dyn);
1857
1858 if (dyn.d_tag == DT_NULL)
1859 break;
1860
1861 if (dyn.d_tag == DT_PPC_GOT)
1862 {
1863 unsigned int g_o_t = dyn.d_un.d_val;
1864 asection *got = bfd_get_section_by_name (abfd, ".got");
1865 if (got != NULL
1866 && bfd_get_section_contents (abfd, got, buf,
1867 g_o_t - got->vma + 4, 4))
1868 glink_vma = bfd_get_32 (abfd, buf);
1869 break;
1870 }
1871 }
1872 free (dynbuf);
1873 }
1874
1875 /* Otherwise we read the first plt entry. */
1876 if (glink_vma == 0)
1877 {
1878 if (bfd_get_section_contents (abfd, plt, buf, 0, 4))
1879 glink_vma = bfd_get_32 (abfd, buf);
1880 }
1881
1882 if (glink_vma == 0)
1883 return 0;
1884
1885 /* The .glink section usually does not survive the final
1886 link; search for the section (usually .text) where the
1887 glink stubs now reside. */
1888 glink = bfd_sections_find_if (abfd, section_covers_vma, &glink_vma);
1889 if (glink == NULL)
1890 return 0;
1891
1892 /* Determine glink PLT resolver by reading the relative branch
1893 from the first glink stub. */
1894 if (bfd_get_section_contents (abfd, glink, buf,
1895 glink_vma - glink->vma, 4))
1896 {
1897 unsigned int insn = bfd_get_32 (abfd, buf);
1898
1899 /* The first glink stub may either branch to the resolver ... */
1900 insn ^= B;
1901 if ((insn & ~0x3fffffc) == 0)
1902 resolv_vma = glink_vma + (insn ^ 0x2000000) - 0x2000000;
1903
1904 /* ... or fall through a bunch of NOPs. */
1905 else if ((insn ^ B ^ NOP) == 0)
1906 for (i = 4;
1907 bfd_get_section_contents (abfd, glink, buf,
1908 glink_vma - glink->vma + i, 4);
1909 i += 4)
1910 if (bfd_get_32 (abfd, buf) != NOP)
1911 {
1912 resolv_vma = glink_vma + i;
1913 break;
1914 }
1915 }
1916
93c6e8c3 1917 count = NUM_SHDR_ENTRIES (&elf_section_data (relplt)->this_hdr);
7382d32a
AM
1918 /* If the stubs are those for -shared/-pie then we might have
1919 multiple stubs for each plt entry. If that is the case then
1920 there is no way to associate stubs with their plt entries short
9e390558
AM
1921 of figuring out the GOT pointer value used in the stub.
1922 The offsets tested here need to cover all possible values of
1923 GLINK_ENTRY_SIZE for other than __tls_get_addr_opt. */
1924 stub_off = glink_vma - glink->vma;
1925 for (stub_delta = 16; stub_delta <= 32; stub_delta += 8)
1926 if (is_nonpic_glink_stub (abfd, glink, stub_off - stub_delta))
1927 break;
1928 if (stub_delta > 32)
7382d32a
AM
1929 return 0;
1930
468392fb 1931 slurp_relocs = get_elf_backend_data (abfd)->s->slurp_reloc_table;
0a1b45a2 1932 if (! (*slurp_relocs) (abfd, relplt, dynsyms, true))
468392fb
AM
1933 return -1;
1934
468392fb
AM
1935 size = count * sizeof (asymbol);
1936 p = relplt->relocation;
1937 for (i = 0; i < count; i++, p++)
e054468f
AM
1938 {
1939 size += strlen ((*p->sym_ptr_ptr)->name) + sizeof ("@plt");
1940 if (p->addend != 0)
1941 size += sizeof ("+0x") - 1 + 8;
1942 }
468392fb
AM
1943
1944 size += sizeof (asymbol) + sizeof ("__glink");
1945
1946 if (resolv_vma)
1947 size += sizeof (asymbol) + sizeof ("__glink_PLTresolve");
1948
1949 s = *ret = bfd_malloc (size);
1950 if (s == NULL)
1951 return -1;
1952
9e390558 1953 stub_off = glink_vma - glink->vma;
468392fb 1954 names = (char *) (s + count + 1 + (resolv_vma != 0));
1079403c
AM
1955 p = relplt->relocation + count - 1;
1956 for (i = 0; i < count; i++)
468392fb
AM
1957 {
1958 size_t len;
1959
9e390558
AM
1960 stub_off -= stub_delta;
1961 if (strcmp ((*p->sym_ptr_ptr)->name, "__tls_get_addr_opt") == 0)
1962 stub_off -= 32;
468392fb
AM
1963 *s = **p->sym_ptr_ptr;
1964 /* Undefined syms won't have BSF_LOCAL or BSF_GLOBAL set. Since
1965 we are defining a symbol, ensure one of them is set. */
1966 if ((s->flags & BSF_LOCAL) == 0)
1967 s->flags |= BSF_GLOBAL;
6ba2a415 1968 s->flags |= BSF_SYNTHETIC;
468392fb 1969 s->section = glink;
9e390558 1970 s->value = stub_off;
468392fb
AM
1971 s->name = names;
1972 s->udata.p = NULL;
1973 len = strlen ((*p->sym_ptr_ptr)->name);
1974 memcpy (names, (*p->sym_ptr_ptr)->name, len);
1975 names += len;
e054468f
AM
1976 if (p->addend != 0)
1977 {
1978 memcpy (names, "+0x", sizeof ("+0x") - 1);
1979 names += sizeof ("+0x") - 1;
1980 bfd_sprintf_vma (abfd, names, p->addend);
1981 names += strlen (names);
1982 }
468392fb
AM
1983 memcpy (names, "@plt", sizeof ("@plt"));
1984 names += sizeof ("@plt");
1985 ++s;
1079403c 1986 --p;
468392fb
AM
1987 }
1988
1989 /* Add a symbol at the start of the glink branch table. */
86a4952b 1990 memset (s, 0, sizeof *s);
468392fb 1991 s->the_bfd = abfd;
6ba2a415 1992 s->flags = BSF_GLOBAL | BSF_SYNTHETIC;
468392fb
AM
1993 s->section = glink;
1994 s->value = glink_vma - glink->vma;
1995 s->name = names;
1996 memcpy (names, "__glink", sizeof ("__glink"));
1997 names += sizeof ("__glink");
1998 s++;
1999 count++;
2000
2001 if (resolv_vma)
2002 {
2003 /* Add a symbol for the glink PLT resolver. */
86a4952b 2004 memset (s, 0, sizeof *s);
468392fb 2005 s->the_bfd = abfd;
6ba2a415 2006 s->flags = BSF_GLOBAL | BSF_SYNTHETIC;
468392fb
AM
2007 s->section = glink;
2008 s->value = resolv_vma - glink->vma;
2009 s->name = names;
2010 memcpy (names, "__glink_PLTresolve", sizeof ("__glink_PLTresolve"));
2011 names += sizeof ("__glink_PLTresolve");
2012 s++;
2013 count++;
2014 }
2015
2016 return count;
2017}
2018\f
25dbc73a
AM
2019/* The following functions are specific to the ELF linker, while
2020 functions above are used generally. They appear in this file more
2021 or less in the order in which they are called. eg.
2022 ppc_elf_check_relocs is called early in the link process,
2023 ppc_elf_finish_dynamic_sections is one of the last functions
2024 called. */
252b5132 2025
a6aa5195 2026/* Track PLT entries needed for a given symbol. We might need more
a877a2b6 2027 than one glink entry per symbol when generating a pic binary. */
a6aa5195
AM
2028struct plt_entry
2029{
2030 struct plt_entry *next;
2031
2032 /* -fPIC uses multiple GOT sections, one per file, called ".got2".
2033 This field stores the offset into .got2 used to initialise the
a877a2b6
AM
2034 GOT pointer reg. It will always be at least 32768. (Current
2035 gcc always uses an offset of 32768, but ld -r will pack .got2
2036 sections together resulting in larger offsets). */
a6aa5195
AM
2037 bfd_vma addend;
2038
2039 /* The .got2 section. */
2040 asection *sec;
2041
2042 /* PLT refcount or offset. */
2043 union
2044 {
2045 bfd_signed_vma refcount;
2046 bfd_vma offset;
2047 } plt;
2048
2049 /* .glink stub offset. */
2050 bfd_vma glink_offset;
2051};
2052
7c8bbca5
AM
2053/* Of those relocs that might be copied as dynamic relocs, this
2054 function selects those that must be copied when linking a shared
2055 library or PIE, even when the symbol is local. */
252b5132 2056
1d483afe
AM
2057static int
2058must_be_dyn_reloc (struct bfd_link_info *info,
2059 enum elf_ppc_reloc_type r_type)
2060{
2061 switch (r_type)
2062 {
2063 default:
7c8bbca5
AM
2064 /* Only relative relocs can be resolved when the object load
2065 address isn't fixed. DTPREL32 is excluded because the
2066 dynamic linker needs to differentiate global dynamic from
2067 local dynamic __tls_index pairs when PPC_OPT_TLS is set. */
1d483afe
AM
2068 return 1;
2069
2070 case R_PPC_REL24:
2071 case R_PPC_REL14:
2072 case R_PPC_REL14_BRTAKEN:
2073 case R_PPC_REL14_BRNTAKEN:
2074 case R_PPC_REL32:
2075 return 0;
2076
2077 case R_PPC_TPREL32:
2078 case R_PPC_TPREL16:
2079 case R_PPC_TPREL16_LO:
2080 case R_PPC_TPREL16_HI:
2081 case R_PPC_TPREL16_HA:
7c8bbca5
AM
2082 /* These relocations are relative but in a shared library the
2083 linker doesn't know the thread pointer base. */
2084 return bfd_link_dll (info);
1d483afe
AM
2085 }
2086}
252b5132 2087
25dbc73a
AM
2088/* If ELIMINATE_COPY_RELOCS is non-zero, the linker will try to avoid
2089 copying dynamic variables from a shared lib into an app's dynbss
2090 section, and instead use a dynamic relocation to point into the
2091 shared lib. */
2092#define ELIMINATE_COPY_RELOCS 1
252b5132 2093
f95f8542
AM
2094/* Used to track dynamic relocations for local symbols. */
2095struct ppc_dyn_relocs
2096{
2097 struct ppc_dyn_relocs *next;
2098
2099 /* The input section of the reloc. */
2100 asection *sec;
2101
2102 /* Total number of relocs copied for the input section. */
2103 unsigned int count : 31;
2104
2105 /* Whether this entry is for STT_GNU_IFUNC symbols. */
2106 unsigned int ifunc : 1;
2107};
2108
25dbc73a 2109/* PPC ELF linker hash entry. */
252b5132 2110
25dbc73a
AM
2111struct ppc_elf_link_hash_entry
2112{
2113 struct elf_link_hash_entry elf;
252b5132 2114
25dbc73a
AM
2115 /* If this symbol is used in the linker created sections, the processor
2116 specific backend uses this field to map the field into the offset
2117 from the beginning of the section. */
2118 elf_linker_section_pointers_t *linker_section_pointer;
252b5132 2119
37da22e5
AM
2120 /* Contexts in which symbol is used in the GOT.
2121 Bits are or'd into the mask as the corresponding relocs are
2122 encountered during check_relocs, with TLS_TLS being set when any
2123 of the other TLS bits are set. tls_optimize clears bits when
2124 optimizing to indicate the corresponding GOT entry type is not
2125 needed. If set, TLS_TLS is never cleared. tls_optimize may also
b00a0a86 2126 set TLS_GDIE when a GD reloc turns into an IE one.
37da22e5
AM
2127 These flags are also kept for local symbols. */
2128#define TLS_TLS 1 /* Any TLS reloc. */
2129#define TLS_GD 2 /* GD reloc. */
2130#define TLS_LD 4 /* LD reloc. */
2131#define TLS_TPREL 8 /* TPREL reloc, => IE. */
2132#define TLS_DTPREL 16 /* DTPREL reloc, => LD. */
2133#define TLS_MARK 32 /* __tls_get_addr call marked. */
b00a0a86 2134#define TLS_GDIE 64 /* GOT TPREL reloc resulting from GD->IE. */
bac3c8c5 2135 unsigned char tls_mask;
4dc4a9a5 2136
37da22e5
AM
2137 /* The above field is also used to mark function symbols. In which
2138 case TLS_TLS will be 0. */
2139#define PLT_IFUNC 2 /* STT_GNU_IFUNC. */
2d7ad24e 2140#define PLT_KEEP 4 /* inline plt call requires plt entry. */
37da22e5
AM
2141#define NON_GOT 256 /* local symbol plt, not stored. */
2142
4dc4a9a5
DJ
2143 /* Nonzero if we have seen a small data relocation referring to this
2144 symbol. */
d3e454b9
AM
2145 unsigned char has_sda_refs : 1;
2146
2147 /* Flag use of given relocations. */
2148 unsigned char has_addr16_ha : 1;
2149 unsigned char has_addr16_lo : 1;
25dbc73a 2150};
252b5132 2151
25dbc73a
AM
2152#define ppc_elf_hash_entry(ent) ((struct ppc_elf_link_hash_entry *) (ent))
2153
2154/* PPC ELF linker hash table. */
2155
2156struct ppc_elf_link_hash_table
2157{
2158 struct elf_link_hash_table elf;
2159
5446cbdf
AM
2160 /* Various options passed from the linker. */
2161 struct ppc_elf_params *params;
2162
25dbc73a 2163 /* Short-cuts to get to dynamic linker sections. */
d7128ce4 2164 asection *glink;
25dbc73a
AM
2165 asection *dynsbss;
2166 asection *relsbss;
c9a2f333 2167 elf_linker_section_t sdata[2];
25dbc73a 2168 asection *sbss;
6177242a 2169 asection *glink_eh_frame;
2d7ad24e
AM
2170 asection *pltlocal;
2171 asection *relpltlocal;
25dbc73a 2172
016687f8
AM
2173 /* The (unloaded but important) .rela.plt.unloaded on VxWorks. */
2174 asection *srelplt2;
2175
1d483afe 2176 /* Shortcut to __tls_get_addr. */
25dbc73a 2177 struct elf_link_hash_entry *tls_get_addr;
252b5132 2178
016687f8
AM
2179 /* The bfd that forced an old-style PLT. */
2180 bfd *old_bfd;
5b914448 2181
25dbc73a
AM
2182 /* TLS local dynamic got entry handling. */
2183 union {
2184 bfd_signed_vma refcount;
2185 bfd_vma offset;
2186 } tlsld_got;
252b5132 2187
c6dd29ce 2188 /* Offset of branch table to PltResolve function in glink. */
d7128ce4
AM
2189 bfd_vma glink_pltresolve;
2190
3b36f7e6
AM
2191 /* Size of reserved GOT entries. */
2192 unsigned int got_header_size;
2193 /* Non-zero if allocating the header left a gap. */
2194 unsigned int got_gap;
2195
4a3dc543
RS
2196 /* The type of PLT we have chosen to use. */
2197 enum ppc_elf_plt_type plt_type;
2198
82e66161
AM
2199 /* Whether there exist local gnu indirect function resolvers,
2200 referenced by dynamic relocations. */
2201 unsigned int local_ifunc_resolver:1;
2202 unsigned int maybe_local_ifunc_resolver:1;
2203
9a23f96e
AM
2204 /* Set if tls optimization is enabled. */
2205 unsigned int do_tls_opt:1;
2206
3e04d765
AM
2207 /* Set if inline plt calls should be converted to direct calls. */
2208 unsigned int can_convert_all_inline_plt:1;
2209
9d8504b1
PB
2210 /* The size of PLT entries. */
2211 int plt_entry_size;
2212 /* The distance between adjacent PLT slots. */
2213 int plt_slot_size;
2214 /* The size of the first PLT entry. */
2215 int plt_initial_entry_size;
25dbc73a 2216};
252b5132 2217
94caa966
AM
2218/* Rename some of the generic section flags to better document how they
2219 are used for ppc32. The flags are only valid for ppc32 elf objects. */
2220
2221/* Nonzero if this section has TLS related relocations. */
2222#define has_tls_reloc sec_flg0
2223
9737e8af
AM
2224/* Nonzero if this section has a call to __tls_get_addr lacking marker
2225 relocs. */
2226#define nomark_tls_get_addr sec_flg1
94caa966 2227
3e04d765
AM
2228 /* Flag set when PLTCALL relocs are detected. */
2229#define has_pltcall sec_flg2
2230
25dbc73a 2231/* Get the PPC ELF linker hash table from a link_info structure. */
252b5132 2232
25dbc73a 2233#define ppc_elf_hash_table(p) \
a8d549c0
AM
2234 ((is_elf_hash_table ((p)->hash) \
2235 && elf_hash_table_id (elf_hash_table (p)) == PPC32_ELF_DATA) \
2236 ? (struct ppc_elf_link_hash_table *) (p)->hash : NULL)
252b5132 2237
25dbc73a 2238/* Create an entry in a PPC ELF linker hash table. */
252b5132 2239
25dbc73a
AM
2240static struct bfd_hash_entry *
2241ppc_elf_link_hash_newfunc (struct bfd_hash_entry *entry,
2242 struct bfd_hash_table *table,
2243 const char *string)
252b5132 2244{
25dbc73a
AM
2245 /* Allocate the structure if it has not already been allocated by a
2246 subclass. */
2247 if (entry == NULL)
2248 {
2249 entry = bfd_hash_allocate (table,
2250 sizeof (struct ppc_elf_link_hash_entry));
2251 if (entry == NULL)
2252 return entry;
2253 }
252b5132 2254
25dbc73a
AM
2255 /* Call the allocation method of the superclass. */
2256 entry = _bfd_elf_link_hash_newfunc (entry, table, string);
2257 if (entry != NULL)
2258 {
2259 ppc_elf_hash_entry (entry)->linker_section_pointer = NULL;
25dbc73a 2260 ppc_elf_hash_entry (entry)->tls_mask = 0;
5240d94d 2261 ppc_elf_hash_entry (entry)->has_sda_refs = 0;
25dbc73a 2262 }
252b5132 2263
25dbc73a 2264 return entry;
252b5132 2265}
3dab13f6 2266
25dbc73a 2267/* Create a PPC ELF linker hash table. */
3dab13f6 2268
25dbc73a
AM
2269static struct bfd_link_hash_table *
2270ppc_elf_link_hash_table_create (bfd *abfd)
3dab13f6 2271{
25dbc73a 2272 struct ppc_elf_link_hash_table *ret;
76e7a751 2273 static struct ppc_elf_params default_params
407aa07c 2274 = { PLT_OLD, 0, 0, 1, 0, 0, 12, 0, 0, 0 };
3dab13f6 2275
25dbc73a
AM
2276 ret = bfd_zmalloc (sizeof (struct ppc_elf_link_hash_table));
2277 if (ret == NULL)
2278 return NULL;
3dab13f6 2279
66eb6687
AM
2280 if (!_bfd_elf_link_hash_table_init (&ret->elf, abfd,
2281 ppc_elf_link_hash_newfunc,
4dfe6ac6
NC
2282 sizeof (struct ppc_elf_link_hash_entry),
2283 PPC32_ELF_DATA))
3dab13f6 2284 {
25dbc73a
AM
2285 free (ret);
2286 return NULL;
2287 }
58111eb7 2288
a6aa5195
AM
2289 ret->elf.init_plt_refcount.refcount = 0;
2290 ret->elf.init_plt_refcount.glist = NULL;
2291 ret->elf.init_plt_offset.offset = 0;
2292 ret->elf.init_plt_offset.glist = NULL;
2293
db434ba0
AM
2294 ret->params = &default_params;
2295
c9a2f333
AM
2296 ret->sdata[0].name = ".sdata";
2297 ret->sdata[0].sym_name = "_SDA_BASE_";
2298 ret->sdata[0].bss_name = ".sbss";
2299
2300 ret->sdata[1].name = ".sdata2";
2301 ret->sdata[1].sym_name = "_SDA2_BASE_";
2302 ret->sdata[1].bss_name = ".sbss2";
2303
9d8504b1
PB
2304 ret->plt_entry_size = 12;
2305 ret->plt_slot_size = 8;
2306 ret->plt_initial_entry_size = 72;
9d8504b1 2307
25dbc73a
AM
2308 return &ret->elf.root;
2309}
3dab13f6 2310
5446cbdf
AM
2311/* Hook linker params into hash table. */
2312
2313void
2314ppc_elf_link_params (struct bfd_link_info *info, struct ppc_elf_params *params)
2315{
2316 struct ppc_elf_link_hash_table *htab = ppc_elf_hash_table (info);
2317
2318 if (htab)
2319 htab->params = params;
76e7a751 2320 params->pagesize_p2 = bfd_log2 (params->pagesize);
5446cbdf
AM
2321}
2322
9d8504b1 2323/* Create .got and the related sections. */
3dab13f6 2324
0a1b45a2 2325static bool
25dbc73a
AM
2326ppc_elf_create_got (bfd *abfd, struct bfd_link_info *info)
2327{
2328 struct ppc_elf_link_hash_table *htab;
3dab13f6 2329
25dbc73a 2330 if (!_bfd_elf_create_got_section (abfd, info))
0a1b45a2 2331 return false;
3dab13f6 2332
25dbc73a 2333 htab = ppc_elf_hash_table (info);
90c14f0c 2334 if (htab->elf.target_os != is_vxworks)
9d8504b1
PB
2335 {
2336 /* The powerpc .got has a blrl instruction in it. Mark it
2337 executable. */
ce558b89
AM
2338 flagword flags = (SEC_ALLOC | SEC_LOAD | SEC_CODE | SEC_HAS_CONTENTS
2339 | SEC_IN_MEMORY | SEC_LINKER_CREATED);
fd361982 2340 if (!bfd_set_section_flags (htab->elf.sgot, flags))
0a1b45a2 2341 return false;
9d8504b1 2342 }
3dab13f6 2343
0a1b45a2 2344 return true;
25dbc73a 2345}
3dab13f6 2346
93d1b056
AM
2347/* Create a special linker section, used for R_PPC_EMB_SDAI16 and
2348 R_PPC_EMB_SDA2I16 pointers. These sections become part of .sdata
2349 and .sdata2. Create _SDA_BASE_ and _SDA2_BASE too. */
2350
0a1b45a2 2351static bool
93d1b056
AM
2352ppc_elf_create_linker_section (bfd *abfd,
2353 struct bfd_link_info *info,
2354 flagword flags,
2355 elf_linker_section_t *lsect)
2356{
2357 asection *s;
2358
2359 flags |= (SEC_ALLOC | SEC_LOAD | SEC_HAS_CONTENTS | SEC_IN_MEMORY
2360 | SEC_LINKER_CREATED);
2361
2362 s = bfd_make_section_anyway_with_flags (abfd, lsect->name, flags);
2363 if (s == NULL)
0a1b45a2 2364 return false;
93d1b056
AM
2365 lsect->section = s;
2366
2367 /* Define the sym on the first section of this name. */
2368 s = bfd_get_section_by_name (abfd, lsect->name);
2369
2370 lsect->sym = _bfd_elf_define_linkage_sym (abfd, info, s, lsect->sym_name);
2371 if (lsect->sym == NULL)
0a1b45a2 2372 return false;
93d1b056 2373 lsect->sym->root.u.def.value = 0x8000;
0a1b45a2 2374 return true;
93d1b056
AM
2375}
2376
0a1b45a2 2377static bool
e054468f
AM
2378ppc_elf_create_glink (bfd *abfd, struct bfd_link_info *info)
2379{
2380 struct ppc_elf_link_hash_table *htab = ppc_elf_hash_table (info);
2381 asection *s;
2382 flagword flags;
691d2e9a 2383 int p2align;
e054468f
AM
2384
2385 flags = (SEC_ALLOC | SEC_LOAD | SEC_CODE | SEC_READONLY | SEC_HAS_CONTENTS
2386 | SEC_IN_MEMORY | SEC_LINKER_CREATED);
2387 s = bfd_make_section_anyway_with_flags (abfd, ".glink", flags);
2388 htab->glink = s;
691d2e9a
AM
2389 p2align = htab->params->ppc476_workaround ? 6 : 4;
2390 if (p2align < htab->params->plt_stub_align)
2391 p2align = htab->params->plt_stub_align;
e054468f 2392 if (s == NULL
fd361982 2393 || !bfd_set_section_alignment (s, p2align))
0a1b45a2 2394 return false;
e054468f 2395
6177242a
AM
2396 if (!info->no_ld_generated_unwind_info)
2397 {
2398 flags = (SEC_ALLOC | SEC_LOAD | SEC_READONLY | SEC_HAS_CONTENTS
2399 | SEC_IN_MEMORY | SEC_LINKER_CREATED);
2400 s = bfd_make_section_anyway_with_flags (abfd, ".eh_frame", flags);
2401 htab->glink_eh_frame = s;
2402 if (s == NULL
fd361982 2403 || !bfd_set_section_alignment (s, 2))
0a1b45a2 2404 return false;
6177242a
AM
2405 }
2406
e054468f
AM
2407 flags = SEC_ALLOC | SEC_LINKER_CREATED;
2408 s = bfd_make_section_anyway_with_flags (abfd, ".iplt", flags);
ce558b89 2409 htab->elf.iplt = s;
e054468f 2410 if (s == NULL
fd361982 2411 || !bfd_set_section_alignment (s, 4))
0a1b45a2 2412 return false;
e054468f
AM
2413
2414 flags = (SEC_ALLOC | SEC_LOAD | SEC_READONLY | SEC_HAS_CONTENTS
2415 | SEC_IN_MEMORY | SEC_LINKER_CREATED);
14b2f831 2416 s = bfd_make_section_anyway_with_flags (abfd, ".rela.iplt", flags);
ce558b89 2417 htab->elf.irelplt = s;
e054468f 2418 if (s == NULL
fd361982 2419 || ! bfd_set_section_alignment (s, 2))
0a1b45a2 2420 return false;
93d1b056 2421
2d7ad24e
AM
2422 /* Local plt entries. */
2423 flags = (SEC_ALLOC | SEC_LOAD
2424 | SEC_HAS_CONTENTS | SEC_IN_MEMORY | SEC_LINKER_CREATED);
2425 htab->pltlocal = bfd_make_section_anyway_with_flags (abfd, ".branch_lt",
2426 flags);
2427 if (htab->pltlocal == NULL
fd361982 2428 || !bfd_set_section_alignment (htab->pltlocal, 2))
0a1b45a2 2429 return false;
2d7ad24e
AM
2430
2431 if (bfd_link_pic (info))
2432 {
2433 flags = (SEC_ALLOC | SEC_LOAD | SEC_READONLY
2434 | SEC_HAS_CONTENTS | SEC_IN_MEMORY | SEC_LINKER_CREATED);
2435 htab->relpltlocal
2436 = bfd_make_section_anyway_with_flags (abfd, ".rela.branch_lt", flags);
2437 if (htab->relpltlocal == NULL
fd361982 2438 || !bfd_set_section_alignment (htab->relpltlocal, 2))
0a1b45a2 2439 return false;
2d7ad24e
AM
2440 }
2441
93d1b056
AM
2442 if (!ppc_elf_create_linker_section (abfd, info, 0,
2443 &htab->sdata[0]))
0a1b45a2 2444 return false;
93d1b056
AM
2445
2446 if (!ppc_elf_create_linker_section (abfd, info, SEC_READONLY,
2447 &htab->sdata[1]))
0a1b45a2 2448 return false;
93d1b056 2449
0a1b45a2 2450 return true;
e054468f
AM
2451}
2452
25dbc73a
AM
2453/* We have to create .dynsbss and .rela.sbss here so that they get mapped
2454 to output sections (just like _bfd_elf_create_dynamic_sections has
2455 to create .dynbss and .rela.bss). */
3dab13f6 2456
0a1b45a2 2457static bool
25dbc73a
AM
2458ppc_elf_create_dynamic_sections (bfd *abfd, struct bfd_link_info *info)
2459{
2460 struct ppc_elf_link_hash_table *htab;
2461 asection *s;
2462 flagword flags;
3dab13f6 2463
25dbc73a 2464 htab = ppc_elf_hash_table (info);
3dab13f6 2465
ce558b89 2466 if (htab->elf.sgot == NULL
25dbc73a 2467 && !ppc_elf_create_got (abfd, info))
0a1b45a2 2468 return false;
3dab13f6 2469
25dbc73a 2470 if (!_bfd_elf_create_dynamic_sections (abfd, info))
0a1b45a2 2471 return false;
3dab13f6 2472
e054468f
AM
2473 if (htab->glink == NULL
2474 && !ppc_elf_create_glink (abfd, info))
0a1b45a2 2475 return false;
3dab13f6 2476
14b2f831
AM
2477 s = bfd_make_section_anyway_with_flags (abfd, ".dynsbss",
2478 SEC_ALLOC | SEC_LINKER_CREATED);
3b36f7e6 2479 htab->dynsbss = s;
3496cb2a 2480 if (s == NULL)
0a1b45a2 2481 return false;
3dab13f6 2482
0e1862bb 2483 if (! bfd_link_pic (info))
25dbc73a 2484 {
e054468f
AM
2485 flags = (SEC_ALLOC | SEC_LOAD | SEC_READONLY | SEC_HAS_CONTENTS
2486 | SEC_IN_MEMORY | SEC_LINKER_CREATED);
14b2f831 2487 s = bfd_make_section_anyway_with_flags (abfd, ".rela.sbss", flags);
3b36f7e6 2488 htab->relsbss = s;
25dbc73a 2489 if (s == NULL
fd361982 2490 || !bfd_set_section_alignment (s, 2))
0a1b45a2 2491 return false;
25dbc73a 2492 }
3dab13f6 2493
90c14f0c 2494 if (htab->elf.target_os == is_vxworks
711de32c 2495 && !elf_vxworks_create_dynamic_sections (abfd, info, &htab->srelplt2))
0a1b45a2 2496 return false;
9d8504b1 2497
ce558b89 2498 s = htab->elf.splt;
3b36f7e6 2499 flags = SEC_ALLOC | SEC_CODE | SEC_LINKER_CREATED;
4a3dc543
RS
2500 if (htab->plt_type == PLT_VXWORKS)
2501 /* The VxWorks PLT is a loaded section with contents. */
2502 flags |= SEC_HAS_CONTENTS | SEC_LOAD | SEC_READONLY;
fd361982 2503 return bfd_set_section_flags (s, flags);
25dbc73a 2504}
3dab13f6 2505
25dbc73a 2506/* Copy the extra info we tack onto an elf_link_hash_entry. */
58111eb7 2507
25dbc73a 2508static void
fcfa13d2 2509ppc_elf_copy_indirect_symbol (struct bfd_link_info *info,
25dbc73a
AM
2510 struct elf_link_hash_entry *dir,
2511 struct elf_link_hash_entry *ind)
2512{
2513 struct ppc_elf_link_hash_entry *edir, *eind;
3dab13f6 2514
25dbc73a
AM
2515 edir = (struct ppc_elf_link_hash_entry *) dir;
2516 eind = (struct ppc_elf_link_hash_entry *) ind;
3dab13f6 2517
c79d6685
AM
2518 edir->tls_mask |= eind->tls_mask;
2519 edir->has_sda_refs |= eind->has_sda_refs;
2520
e81830c5
AM
2521 if (edir->elf.versioned != versioned_hidden)
2522 edir->elf.ref_dynamic |= eind->elf.ref_dynamic;
c79d6685
AM
2523 edir->elf.ref_regular |= eind->elf.ref_regular;
2524 edir->elf.ref_regular_nonweak |= eind->elf.ref_regular_nonweak;
4a7e5234 2525 edir->elf.non_got_ref |= eind->elf.non_got_ref;
c79d6685
AM
2526 edir->elf.needs_plt |= eind->elf.needs_plt;
2527 edir->elf.pointer_equality_needed |= eind->elf.pointer_equality_needed;
2528
287c7eaf
AM
2529 /* If we were called to copy over info for a weak sym, that's all. */
2530 if (eind->elf.root.type != bfd_link_hash_indirect)
2531 return;
2532
190eb1dd 2533 if (ind->dyn_relocs != NULL)
25dbc73a 2534 {
190eb1dd 2535 if (dir->dyn_relocs != NULL)
3dab13f6 2536 {
6061a67d
AM
2537 struct elf_dyn_relocs **pp;
2538 struct elf_dyn_relocs *p;
3dab13f6 2539
fcfa13d2 2540 /* Add reloc counts against the indirect sym to the direct sym
25dbc73a 2541 list. Merge any entries against the same section. */
190eb1dd 2542 for (pp = &ind->dyn_relocs; (p = *pp) != NULL; )
3dab13f6 2543 {
6061a67d 2544 struct elf_dyn_relocs *q;
25dbc73a 2545
190eb1dd 2546 for (q = dir->dyn_relocs; q != NULL; q = q->next)
25dbc73a
AM
2547 if (q->sec == p->sec)
2548 {
2549 q->pc_count += p->pc_count;
2550 q->count += p->count;
2551 *pp = p->next;
2552 break;
2553 }
2554 if (q == NULL)
2555 pp = &p->next;
3dab13f6 2556 }
190eb1dd 2557 *pp = dir->dyn_relocs;
3dab13f6 2558 }
25dbc73a 2559
190eb1dd
L
2560 dir->dyn_relocs = ind->dyn_relocs;
2561 ind->dyn_relocs = NULL;
3dab13f6 2562 }
3dab13f6 2563
a6aa5195
AM
2564 /* Copy over the GOT refcount entries that we may have already seen to
2565 the symbol which just became indirect. */
fcfa13d2
AM
2566 edir->elf.got.refcount += eind->elf.got.refcount;
2567 eind->elf.got.refcount = 0;
a6aa5195
AM
2568
2569 /* And plt entries. */
2570 if (eind->elf.plt.plist != NULL)
2571 {
2572 if (edir->elf.plt.plist != NULL)
2573 {
2574 struct plt_entry **entp;
2575 struct plt_entry *ent;
2576
2577 for (entp = &eind->elf.plt.plist; (ent = *entp) != NULL; )
2578 {
2579 struct plt_entry *dent;
2580
2581 for (dent = edir->elf.plt.plist; dent != NULL; dent = dent->next)
2582 if (dent->sec == ent->sec && dent->addend == ent->addend)
2583 {
2584 dent->plt.refcount += ent->plt.refcount;
2585 *entp = ent->next;
2586 break;
2587 }
2588 if (dent == NULL)
2589 entp = &ent->next;
2590 }
2591 *entp = edir->elf.plt.plist;
2592 }
2593
2594 edir->elf.plt.plist = eind->elf.plt.plist;
2595 eind->elf.plt.plist = NULL;
2596 }
2597
fcfa13d2 2598 if (eind->elf.dynindx != -1)
25dbc73a 2599 {
fcfa13d2
AM
2600 if (edir->elf.dynindx != -1)
2601 _bfd_elf_strtab_delref (elf_hash_table (info)->dynstr,
2602 edir->elf.dynstr_index);
a6aa5195
AM
2603 edir->elf.dynindx = eind->elf.dynindx;
2604 edir->elf.dynstr_index = eind->elf.dynstr_index;
2605 eind->elf.dynindx = -1;
2606 eind->elf.dynstr_index = 0;
25dbc73a 2607 }
25dbc73a 2608}
3dab13f6 2609
25dbc73a
AM
2610/* Hook called by the linker routine which adds symbols from an object
2611 file. We use it to put .comm items in .sbss, and not .bss. */
58111eb7 2612
0a1b45a2 2613static bool
25dbc73a
AM
2614ppc_elf_add_symbol_hook (bfd *abfd,
2615 struct bfd_link_info *info,
2616 Elf_Internal_Sym *sym,
2617 const char **namep ATTRIBUTE_UNUSED,
2618 flagword *flagsp ATTRIBUTE_UNUSED,
2619 asection **secp,
2620 bfd_vma *valp)
2621{
2622 if (sym->st_shndx == SHN_COMMON
0e1862bb 2623 && !bfd_link_relocatable (info)
0c8d6e5c
AM
2624 && is_ppc_elf (info->output_bfd)
2625 && sym->st_size <= elf_gp_size (abfd))
25dbc73a
AM
2626 {
2627 /* Common symbols less than or equal to -G nn bytes are automatically
2628 put into .sbss. */
2629 struct ppc_elf_link_hash_table *htab;
3dab13f6 2630
25dbc73a
AM
2631 htab = ppc_elf_hash_table (info);
2632 if (htab->sbss == NULL)
2633 {
10885e24 2634 flagword flags = SEC_IS_COMMON | SEC_SMALL_DATA | SEC_LINKER_CREATED;
3dab13f6 2635
644285ef
AM
2636 if (!htab->elf.dynobj)
2637 htab->elf.dynobj = abfd;
2638
3496cb2a
L
2639 htab->sbss = bfd_make_section_anyway_with_flags (htab->elf.dynobj,
2640 ".sbss",
2641 flags);
2642 if (htab->sbss == NULL)
0a1b45a2 2643 return false;
3dab13f6 2644 }
3dab13f6 2645
25dbc73a
AM
2646 *secp = htab->sbss;
2647 *valp = sym->st_size;
2648 }
3dab13f6 2649
0a1b45a2 2650 return true;
3dab13f6
AM
2651}
2652\f
25dbc73a
AM
2653/* Find a linker generated pointer with a given addend and type. */
2654
2655static elf_linker_section_pointers_t *
2656elf_find_pointer_linker_section
2657 (elf_linker_section_pointers_t *linker_pointers,
2658 bfd_vma addend,
2659 elf_linker_section_t *lsect)
252b5132 2660{
25dbc73a
AM
2661 for ( ; linker_pointers != NULL; linker_pointers = linker_pointers->next)
2662 if (lsect == linker_pointers->lsect && addend == linker_pointers->addend)
2663 return linker_pointers;
252b5132 2664
25dbc73a
AM
2665 return NULL;
2666}
2667
2668/* Allocate a pointer to live in a linker created section. */
2669
0a1b45a2 2670static bool
93d1b056
AM
2671elf_allocate_pointer_linker_section (bfd *abfd,
2672 elf_linker_section_t *lsect,
2673 struct elf_link_hash_entry *h,
2674 const Elf_Internal_Rela *rel)
25dbc73a
AM
2675{
2676 elf_linker_section_pointers_t **ptr_linker_section_ptr = NULL;
2677 elf_linker_section_pointers_t *linker_section_ptr;
2678 unsigned long r_symndx = ELF32_R_SYM (rel->r_info);
2679 bfd_size_type amt;
2680
2681 BFD_ASSERT (lsect != NULL);
2682
2683 /* Is this a global symbol? */
2684 if (h != NULL)
2685 {
2686 struct ppc_elf_link_hash_entry *eh;
2687
2688 /* Has this symbol already been allocated? If so, our work is done. */
2689 eh = (struct ppc_elf_link_hash_entry *) h;
2690 if (elf_find_pointer_linker_section (eh->linker_section_pointer,
2691 rel->r_addend,
2692 lsect))
0a1b45a2 2693 return true;
25dbc73a
AM
2694
2695 ptr_linker_section_ptr = &eh->linker_section_pointer;
25dbc73a
AM
2696 }
2697 else
2698 {
0c8d6e5c 2699 BFD_ASSERT (is_ppc_elf (abfd));
0ffa91dd 2700
25dbc73a
AM
2701 /* Allocation of a pointer to a local symbol. */
2702 elf_linker_section_pointers_t **ptr = elf_local_ptr_offsets (abfd);
2703
2704 /* Allocate a table to hold the local symbols if first time. */
2705 if (!ptr)
2706 {
0ffa91dd 2707 unsigned int num_symbols = elf_symtab_hdr (abfd).sh_info;
25dbc73a
AM
2708
2709 amt = num_symbols;
2710 amt *= sizeof (elf_linker_section_pointers_t *);
2711 ptr = bfd_zalloc (abfd, amt);
2712
2713 if (!ptr)
0a1b45a2 2714 return false;
25dbc73a
AM
2715
2716 elf_local_ptr_offsets (abfd) = ptr;
2717 }
2718
2719 /* Has this symbol already been allocated? If so, our work is done. */
2720 if (elf_find_pointer_linker_section (ptr[r_symndx],
2721 rel->r_addend,
2722 lsect))
0a1b45a2 2723 return true;
252b5132 2724
25dbc73a 2725 ptr_linker_section_ptr = &ptr[r_symndx];
25dbc73a 2726 }
41fcb14e 2727
25dbc73a
AM
2728 /* Allocate space for a pointer in the linker section, and allocate
2729 a new pointer record from internal memory. */
2730 BFD_ASSERT (ptr_linker_section_ptr != NULL);
2731 amt = sizeof (elf_linker_section_pointers_t);
2732 linker_section_ptr = bfd_alloc (abfd, amt);
41fcb14e 2733
25dbc73a 2734 if (!linker_section_ptr)
0a1b45a2 2735 return false;
41fcb14e 2736
25dbc73a
AM
2737 linker_section_ptr->next = *ptr_linker_section_ptr;
2738 linker_section_ptr->addend = rel->r_addend;
2739 linker_section_ptr->lsect = lsect;
25dbc73a 2740 *ptr_linker_section_ptr = linker_section_ptr;
41fcb14e 2741
fd361982 2742 if (!bfd_set_section_alignment (lsect->section, 2))
0a1b45a2 2743 return false;
25dbc73a
AM
2744 linker_section_ptr->offset = lsect->section->size;
2745 lsect->section->size += 4;
7619e7c7 2746
25dbc73a
AM
2747#ifdef DEBUG
2748 fprintf (stderr,
2749 "Create pointer in linker section %s, offset = %ld, section size = %ld\n",
2750 lsect->name, (long) linker_section_ptr->offset,
2751 (long) lsect->section->size);
2752#endif
7619e7c7 2753
0a1b45a2 2754 return true;
41fcb14e
AM
2755}
2756
e054468f 2757static struct plt_entry **
25dbc73a
AM
2758update_local_sym_info (bfd *abfd,
2759 Elf_Internal_Shdr *symtab_hdr,
2760 unsigned long r_symndx,
2761 int tls_type)
252b5132 2762{
25dbc73a 2763 bfd_signed_vma *local_got_refcounts = elf_local_got_refcounts (abfd);
e054468f 2764 struct plt_entry **local_plt;
bac3c8c5 2765 unsigned char *local_got_tls_masks;
252b5132 2766
25dbc73a 2767 if (local_got_refcounts == NULL)
252b5132 2768 {
25dbc73a
AM
2769 bfd_size_type size = symtab_hdr->sh_info;
2770
e054468f
AM
2771 size *= (sizeof (*local_got_refcounts)
2772 + sizeof (*local_plt)
2773 + sizeof (*local_got_tls_masks));
25dbc73a
AM
2774 local_got_refcounts = bfd_zalloc (abfd, size);
2775 if (local_got_refcounts == NULL)
e054468f 2776 return NULL;
25dbc73a 2777 elf_local_got_refcounts (abfd) = local_got_refcounts;
252b5132 2778 }
41fcb14e 2779
e054468f 2780 local_plt = (struct plt_entry **) (local_got_refcounts + symtab_hdr->sh_info);
bac3c8c5 2781 local_got_tls_masks = (unsigned char *) (local_plt + symtab_hdr->sh_info);
37da22e5
AM
2782 local_got_tls_masks[r_symndx] |= tls_type & 0xff;
2783 if ((tls_type & NON_GOT) == 0)
e054468f
AM
2784 local_got_refcounts[r_symndx] += 1;
2785 return local_plt + r_symndx;
25dbc73a 2786}
41fcb14e 2787
0a1b45a2 2788static bool
3ec01793 2789update_plt_info (bfd *abfd, struct plt_entry **plist,
a6aa5195
AM
2790 asection *sec, bfd_vma addend)
2791{
2792 struct plt_entry *ent;
2793
32af9f6e
AM
2794 if (addend < 32768)
2795 sec = NULL;
3ec01793 2796 for (ent = *plist; ent != NULL; ent = ent->next)
a6aa5195
AM
2797 if (ent->sec == sec && ent->addend == addend)
2798 break;
2799 if (ent == NULL)
2800 {
986f0783 2801 size_t amt = sizeof (*ent);
a6aa5195
AM
2802 ent = bfd_alloc (abfd, amt);
2803 if (ent == NULL)
0a1b45a2 2804 return false;
3ec01793 2805 ent->next = *plist;
a6aa5195
AM
2806 ent->sec = sec;
2807 ent->addend = addend;
2808 ent->plt.refcount = 0;
3ec01793 2809 *plist = ent;
a6aa5195
AM
2810 }
2811 ent->plt.refcount += 1;
0a1b45a2 2812 return true;
a6aa5195
AM
2813}
2814
2815static struct plt_entry *
3ec01793 2816find_plt_ent (struct plt_entry **plist, asection *sec, bfd_vma addend)
a6aa5195
AM
2817{
2818 struct plt_entry *ent;
2819
2820 if (addend < 32768)
2821 sec = NULL;
3ec01793 2822 for (ent = *plist; ent != NULL; ent = ent->next)
a6aa5195
AM
2823 if (ent->sec == sec && ent->addend == addend)
2824 break;
2825 return ent;
2826}
2827
0a1b45a2 2828static bool
e054468f
AM
2829is_branch_reloc (enum elf_ppc_reloc_type r_type)
2830{
2831 return (r_type == R_PPC_PLTREL24
2832 || r_type == R_PPC_LOCAL24PC
2833 || r_type == R_PPC_REL24
2834 || r_type == R_PPC_REL14
2835 || r_type == R_PPC_REL14_BRTAKEN
2836 || r_type == R_PPC_REL14_BRNTAKEN
2837 || r_type == R_PPC_ADDR24
2838 || r_type == R_PPC_ADDR14
2839 || r_type == R_PPC_ADDR14_BRTAKEN
dfdaec14
AJ
2840 || r_type == R_PPC_ADDR14_BRNTAKEN
2841 || r_type == R_PPC_VLE_REL24);
e054468f
AM
2842}
2843
23cedd1d
AM
2844/* Relocs on inline plt call sequence insns prior to the call. */
2845
0a1b45a2 2846static bool
23cedd1d
AM
2847is_plt_seq_reloc (enum elf_ppc_reloc_type r_type)
2848{
2849 return (r_type == R_PPC_PLT16_HA
2850 || r_type == R_PPC_PLT16_HI
2851 || r_type == R_PPC_PLT16_LO
2852 || r_type == R_PPC_PLTSEQ);
2853}
2854
e7776f52
AM
2855/* Like bfd_reloc_offset_in_range but without a howto. Return true
2856 iff a field of SIZE bytes at OFFSET is within SEC limits. */
2857
2858static bool
2859offset_in_range (asection *sec, bfd_vma offset, size_t size)
2860{
2861 return offset <= sec->size && size <= sec->size - offset;
2862}
2863
25dbc73a
AM
2864static void
2865bad_shared_reloc (bfd *abfd, enum elf_ppc_reloc_type r_type)
2866{
4eca0228 2867 _bfd_error_handler
695344c0 2868 /* xgettext:c-format */
871b3ab2 2869 (_("%pB: relocation %s cannot be used when making a shared object"),
25dbc73a
AM
2870 abfd,
2871 ppc_elf_howto_table[r_type]->name);
2872 bfd_set_error (bfd_error_bad_value);
252b5132
RH
2873}
2874
25dbc73a
AM
2875/* Look through the relocs for a section during the first phase, and
2876 allocate space in the global offset table or procedure linkage
2877 table. */
252b5132 2878
0a1b45a2 2879static bool
25dbc73a
AM
2880ppc_elf_check_relocs (bfd *abfd,
2881 struct bfd_link_info *info,
2882 asection *sec,
2883 const Elf_Internal_Rela *relocs)
252b5132 2884{
7619e7c7 2885 struct ppc_elf_link_hash_table *htab;
25dbc73a
AM
2886 Elf_Internal_Shdr *symtab_hdr;
2887 struct elf_link_hash_entry **sym_hashes;
2888 const Elf_Internal_Rela *rel;
2889 const Elf_Internal_Rela *rel_end;
a6aa5195 2890 asection *got2, *sreloc;
727fc41e 2891 struct elf_link_hash_entry *tga;
25dbc73a 2892
0e1862bb 2893 if (bfd_link_relocatable (info))
0a1b45a2 2894 return true;
252b5132
RH
2895
2896#ifdef DEBUG
871b3ab2 2897 _bfd_error_handler ("ppc_elf_check_relocs called for section %pA in %pB",
25dbc73a 2898 sec, abfd);
252b5132
RH
2899#endif
2900
0c8d6e5c 2901 BFD_ASSERT (is_ppc_elf (abfd));
0ffa91dd 2902
25dbc73a
AM
2903 /* Initialize howto table if not already done. */
2904 if (!ppc_elf_howto_table[R_PPC_ADDR32])
2905 ppc_elf_howto_init ();
2906
7619e7c7 2907 htab = ppc_elf_hash_table (info);
25f23106
AM
2908 if (htab->glink == NULL)
2909 {
2910 if (htab->elf.dynobj == NULL)
2911 htab->elf.dynobj = abfd;
2912 if (!ppc_elf_create_glink (htab->elf.dynobj, info))
0a1b45a2 2913 return false;
25f23106 2914 }
727fc41e 2915 tga = elf_link_hash_lookup (&htab->elf, "__tls_get_addr",
0a1b45a2 2916 false, false, true);
0ffa91dd 2917 symtab_hdr = &elf_symtab_hdr (abfd);
25dbc73a 2918 sym_hashes = elf_sym_hashes (abfd);
a6aa5195 2919 got2 = bfd_get_section_by_name (abfd, ".got2");
25dbc73a
AM
2920 sreloc = NULL;
2921
2922 rel_end = relocs + sec->reloc_count;
2923 for (rel = relocs; rel < rel_end; rel++)
2924 {
2925 unsigned long r_symndx;
2926 enum elf_ppc_reloc_type r_type;
2927 struct elf_link_hash_entry *h;
7a9361c0 2928 Elf_Internal_Sym *isym;
727fc41e 2929 int tls_type;
cbf95972 2930 struct plt_entry **ifunc;
2d7ad24e
AM
2931 struct plt_entry **pltent;
2932 bfd_vma addend;
25dbc73a
AM
2933
2934 r_symndx = ELF32_R_SYM (rel->r_info);
2935 if (r_symndx < symtab_hdr->sh_info)
7a9361c0
AM
2936 {
2937 h = NULL;
2938 isym = bfd_sym_from_r_symndx (&htab->elf.sym_cache, abfd, r_symndx);
2939 if (isym == NULL)
2940 return false;
2941 }
25dbc73a 2942 else
973a3492
L
2943 {
2944 h = sym_hashes[r_symndx - symtab_hdr->sh_info];
2945 while (h->root.type == bfd_link_hash_indirect
2946 || h->root.type == bfd_link_hash_warning)
2947 h = (struct elf_link_hash_entry *) h->root.u.i.link;
7a9361c0 2948 isym = NULL;
973a3492 2949 }
25dbc73a
AM
2950
2951 /* If a relocation refers to _GLOBAL_OFFSET_TABLE_, create the .got.
2952 This shows up in particular in an R_PPC_ADDR32 in the eabi
2953 startup code. */
3b36f7e6 2954 if (h != NULL
ce558b89 2955 && htab->elf.sgot == NULL
3b36f7e6 2956 && strcmp (h->root.root.string, "_GLOBAL_OFFSET_TABLE_") == 0)
252b5132 2957 {
3b36f7e6
AM
2958 if (htab->elf.dynobj == NULL)
2959 htab->elf.dynobj = abfd;
2960 if (!ppc_elf_create_got (htab->elf.dynobj, info))
0a1b45a2 2961 return false;
3b36f7e6 2962 BFD_ASSERT (h == htab->elf.hgot);
25dbc73a 2963 }
252b5132 2964
727fc41e 2965 tls_type = 0;
de972ffa 2966 r_type = ELF32_R_TYPE (rel->r_info);
cbf95972 2967 ifunc = NULL;
7a9361c0
AM
2968 if (h != NULL)
2969 {
2970 if (h->type == STT_GNU_IFUNC)
2971 {
2972 h->needs_plt = 1;
2973 ifunc = &h->plt.plist;
2974 }
2975 }
2976 else if (htab->elf.target_os != is_vxworks)
e054468f 2977 {
0bed072f 2978 if (ELF_ST_TYPE (isym->st_info) == STT_GNU_IFUNC)
e054468f 2979 {
0bed072f 2980 /* Set PLT_IFUNC flag for this sym, no GOT entry yet. */
06a162cf 2981 ifunc = update_local_sym_info (abfd, symtab_hdr, r_symndx,
37da22e5 2982 NON_GOT | PLT_IFUNC);
06a162cf 2983 if (ifunc == NULL)
0a1b45a2 2984 return false;
e054468f 2985
06a162cf
AM
2986 /* STT_GNU_IFUNC symbols must have a PLT entry;
2987 In a non-pie executable even when there are
2988 no plt calls. */
0e1862bb 2989 if (!bfd_link_pic (info)
08be3224
AM
2990 || is_branch_reloc (r_type)
2991 || r_type == R_PPC_PLT16_LO
2992 || r_type == R_PPC_PLT16_HI
2993 || r_type == R_PPC_PLT16_HA)
e054468f 2994 {
2d7ad24e 2995 addend = 0;
0bed072f 2996 if (r_type == R_PPC_PLTREL24)
08be3224
AM
2997 ppc_elf_tdata (abfd)->makes_plt_call = 1;
2998 if (bfd_link_pic (info)
2999 && (r_type == R_PPC_PLTREL24
3000 || r_type == R_PPC_PLT16_LO
3001 || r_type == R_PPC_PLT16_HI
3002 || r_type == R_PPC_PLT16_HA))
3003 addend = rel->r_addend;
0bed072f 3004 if (!update_plt_info (abfd, ifunc, got2, addend))
0a1b45a2 3005 return false;
e054468f
AM
3006 }
3007 }
25f23106
AM
3008 }
3009
90c14f0c 3010 if (htab->elf.target_os != is_vxworks
de972ffa
AM
3011 && is_branch_reloc (r_type)
3012 && h != NULL
3013 && h == tga)
25f23106 3014 {
de972ffa
AM
3015 if (rel != relocs
3016 && (ELF32_R_TYPE (rel[-1].r_info) == R_PPC_TLSGD
3017 || ELF32_R_TYPE (rel[-1].r_info) == R_PPC_TLSLD))
3018 /* We have a new-style __tls_get_addr call with a marker
3019 reloc. */
3020 ;
3021 else
3022 /* Mark this section as having an old-style call. */
9737e8af 3023 sec->nomark_tls_get_addr = 1;
e054468f 3024 }
727fc41e 3025
25dbc73a
AM
3026 switch (r_type)
3027 {
727fc41e
AM
3028 case R_PPC_TLSGD:
3029 case R_PPC_TLSLD:
3030 /* These special tls relocs tie a call to __tls_get_addr with
3031 its parameter symbol. */
37da22e5
AM
3032 if (h != NULL)
3033 ppc_elf_hash_entry (h)->tls_mask |= TLS_TLS | TLS_MARK;
3034 else
3035 if (!update_local_sym_info (abfd, symtab_hdr, r_symndx,
3036 NON_GOT | TLS_TLS | TLS_MARK))
0a1b45a2 3037 return false;
727fc41e
AM
3038 break;
3039
23cedd1d
AM
3040 case R_PPC_PLTSEQ:
3041 break;
3042
25dbc73a
AM
3043 case R_PPC_GOT_TLSLD16:
3044 case R_PPC_GOT_TLSLD16_LO:
3045 case R_PPC_GOT_TLSLD16_HI:
3046 case R_PPC_GOT_TLSLD16_HA:
25dbc73a
AM
3047 tls_type = TLS_TLS | TLS_LD;
3048 goto dogottls;
252b5132 3049
25dbc73a
AM
3050 case R_PPC_GOT_TLSGD16:
3051 case R_PPC_GOT_TLSGD16_LO:
3052 case R_PPC_GOT_TLSGD16_HI:
3053 case R_PPC_GOT_TLSGD16_HA:
3054 tls_type = TLS_TLS | TLS_GD;
3055 goto dogottls;
3056
3057 case R_PPC_GOT_TPREL16:
3058 case R_PPC_GOT_TPREL16_LO:
3059 case R_PPC_GOT_TPREL16_HI:
3060 case R_PPC_GOT_TPREL16_HA:
7c8bbca5 3061 if (bfd_link_dll (info))
25dbc73a
AM
3062 info->flags |= DF_STATIC_TLS;
3063 tls_type = TLS_TLS | TLS_TPREL;
3064 goto dogottls;
3065
3066 case R_PPC_GOT_DTPREL16:
3067 case R_PPC_GOT_DTPREL16_LO:
3068 case R_PPC_GOT_DTPREL16_HI:
3069 case R_PPC_GOT_DTPREL16_HA:
3070 tls_type = TLS_TLS | TLS_DTPREL;
3071 dogottls:
3072 sec->has_tls_reloc = 1;
1a0670f3 3073 /* Fall through. */
252b5132 3074
25dbc73a
AM
3075 /* GOT16 relocations */
3076 case R_PPC_GOT16:
3077 case R_PPC_GOT16_LO:
3078 case R_PPC_GOT16_HI:
3079 case R_PPC_GOT16_HA:
3080 /* This symbol requires a global offset table entry. */
ce558b89 3081 if (htab->elf.sgot == NULL)
25dbc73a
AM
3082 {
3083 if (htab->elf.dynobj == NULL)
3084 htab->elf.dynobj = abfd;
3085 if (!ppc_elf_create_got (htab->elf.dynobj, info))
0a1b45a2 3086 return false;
25dbc73a
AM
3087 }
3088 if (h != NULL)
3089 {
3090 h->got.refcount += 1;
3091 ppc_elf_hash_entry (h)->tls_mask |= tls_type;
3092 }
3093 else
3094 /* This is a global offset table entry for a local symbol. */
3095 if (!update_local_sym_info (abfd, symtab_hdr, r_symndx, tls_type))
0a1b45a2 3096 return false;
91e21fb7
AM
3097
3098 /* We may also need a plt entry if the symbol turns out to be
3099 an ifunc. */
0e1862bb 3100 if (h != NULL && !bfd_link_pic (info))
91e21fb7
AM
3101 {
3102 if (!update_plt_info (abfd, &h->plt.plist, NULL, 0))
0a1b45a2 3103 return false;
91e21fb7 3104 }
25dbc73a 3105 break;
252b5132 3106
25dbc73a
AM
3107 /* Indirect .sdata relocation. */
3108 case R_PPC_EMB_SDAI16:
93d1b056
AM
3109 htab->sdata[0].sym->ref_regular = 1;
3110 if (!elf_allocate_pointer_linker_section (abfd, &htab->sdata[0],
3111 h, rel))
0a1b45a2 3112 return false;
046183de
AM
3113 if (h != NULL)
3114 {
0a1b45a2
AM
3115 ppc_elf_hash_entry (h)->has_sda_refs = true;
3116 h->non_got_ref = true;
046183de 3117 }
25dbc73a 3118 break;
252b5132 3119
25dbc73a
AM
3120 /* Indirect .sdata2 relocation. */
3121 case R_PPC_EMB_SDA2I16:
c0d9f31d 3122 if (!bfd_link_executable (info))
25dbc73a
AM
3123 {
3124 bad_shared_reloc (abfd, r_type);
0a1b45a2 3125 return false;
25dbc73a 3126 }
93d1b056
AM
3127 htab->sdata[1].sym->ref_regular = 1;
3128 if (!elf_allocate_pointer_linker_section (abfd, &htab->sdata[1],
3129 h, rel))
0a1b45a2 3130 return false;
046183de
AM
3131 if (h != NULL)
3132 {
0a1b45a2
AM
3133 ppc_elf_hash_entry (h)->has_sda_refs = true;
3134 h->non_got_ref = true;
046183de 3135 }
25dbc73a 3136 break;
252b5132 3137
93d1b056
AM
3138 case R_PPC_SDAREL16:
3139 htab->sdata[0].sym->ref_regular = 1;
1a0670f3 3140 /* Fall through. */
93d1b056 3141
b9c361e0
JL
3142 case R_PPC_VLE_SDAREL_LO16A:
3143 case R_PPC_VLE_SDAREL_LO16D:
3144 case R_PPC_VLE_SDAREL_HI16A:
3145 case R_PPC_VLE_SDAREL_HI16D:
3146 case R_PPC_VLE_SDAREL_HA16A:
3147 case R_PPC_VLE_SDAREL_HA16D:
046183de
AM
3148 if (h != NULL)
3149 {
0a1b45a2
AM
3150 ppc_elf_hash_entry (h)->has_sda_refs = true;
3151 h->non_got_ref = true;
046183de
AM
3152 }
3153 break;
3154
b9c361e0
JL
3155 case R_PPC_VLE_REL8:
3156 case R_PPC_VLE_REL15:
3157 case R_PPC_VLE_REL24:
3158 case R_PPC_VLE_LO16A:
3159 case R_PPC_VLE_LO16D:
3160 case R_PPC_VLE_HI16A:
3161 case R_PPC_VLE_HI16D:
3162 case R_PPC_VLE_HA16A:
3163 case R_PPC_VLE_HA16D:
83eef883 3164 case R_PPC_VLE_ADDR20:
b9c361e0
JL
3165 break;
3166
25dbc73a 3167 case R_PPC_EMB_SDA2REL:
c0d9f31d 3168 if (!bfd_link_executable (info))
046183de
AM
3169 {
3170 bad_shared_reloc (abfd, r_type);
0a1b45a2 3171 return false;
046183de 3172 }
93d1b056 3173 htab->sdata[1].sym->ref_regular = 1;
046183de
AM
3174 if (h != NULL)
3175 {
0a1b45a2
AM
3176 ppc_elf_hash_entry (h)->has_sda_refs = true;
3177 h->non_got_ref = true;
046183de
AM
3178 }
3179 break;
3180
b9c361e0
JL
3181 case R_PPC_VLE_SDA21_LO:
3182 case R_PPC_VLE_SDA21:
25dbc73a
AM
3183 case R_PPC_EMB_SDA21:
3184 case R_PPC_EMB_RELSDA:
046183de
AM
3185 if (h != NULL)
3186 {
0a1b45a2
AM
3187 ppc_elf_hash_entry (h)->has_sda_refs = true;
3188 h->non_got_ref = true;
046183de
AM
3189 }
3190 break;
3191
25dbc73a
AM
3192 case R_PPC_EMB_NADDR32:
3193 case R_PPC_EMB_NADDR16:
3194 case R_PPC_EMB_NADDR16_LO:
3195 case R_PPC_EMB_NADDR16_HI:
3196 case R_PPC_EMB_NADDR16_HA:
4dc4a9a5 3197 if (h != NULL)
0a1b45a2 3198 h->non_got_ref = true;
25dbc73a 3199 break;
252b5132 3200
25dbc73a 3201 case R_PPC_PLTREL24:
de972ffa 3202 if (h == NULL)
6d78d0b9 3203 break;
08be3224 3204 ppc_elf_tdata (abfd)->makes_plt_call = 1;
3e04d765 3205 goto pltentry;
08be3224 3206
23cedd1d 3207 case R_PPC_PLTCALL:
3e04d765
AM
3208 sec->has_pltcall = 1;
3209 /* Fall through. */
3210
6d78d0b9 3211 case R_PPC_PLT32:
25dbc73a
AM
3212 case R_PPC_PLTREL32:
3213 case R_PPC_PLT16_LO:
3214 case R_PPC_PLT16_HI:
3215 case R_PPC_PLT16_HA:
3e04d765 3216 pltentry:
25dbc73a
AM
3217#ifdef DEBUG
3218 fprintf (stderr, "Reloc requires a PLT entry\n");
3219#endif
cbf95972 3220 /* This symbol requires a procedure linkage table entry. */
25dbc73a
AM
3221 if (h == NULL)
3222 {
2d7ad24e
AM
3223 pltent = update_local_sym_info (abfd, symtab_hdr, r_symndx,
3224 NON_GOT | PLT_KEEP);
3225 if (pltent == NULL)
0a1b45a2 3226 return false;
25dbc73a 3227 }
a6aa5195
AM
3228 else
3229 {
2d7ad24e
AM
3230 if (r_type != R_PPC_PLTREL24)
3231 ppc_elf_hash_entry (h)->tls_mask |= PLT_KEEP;
a6aa5195 3232 h->needs_plt = 1;
2d7ad24e 3233 pltent = &h->plt.plist;
a6aa5195 3234 }
2d7ad24e
AM
3235 addend = 0;
3236 if (bfd_link_pic (info)
3237 && (r_type == R_PPC_PLTREL24
3238 || r_type == R_PPC_PLT16_LO
3239 || r_type == R_PPC_PLT16_HI
3240 || r_type == R_PPC_PLT16_HA))
3241 addend = rel->r_addend;
3242 if (!update_plt_info (abfd, pltent, got2, addend))
0a1b45a2 3243 return false;
25dbc73a 3244 break;
ee05f2fe 3245
25dbc73a
AM
3246 /* The following relocations don't need to propagate the
3247 relocation if linking a shared object since they are
3248 section relative. */
3249 case R_PPC_SECTOFF:
3250 case R_PPC_SECTOFF_LO:
3251 case R_PPC_SECTOFF_HI:
3252 case R_PPC_SECTOFF_HA:
3253 case R_PPC_DTPREL16:
3254 case R_PPC_DTPREL16_LO:
3255 case R_PPC_DTPREL16_HI:
3256 case R_PPC_DTPREL16_HA:
3257 case R_PPC_TOC16:
3258 break;
252b5132 3259
d7128ce4
AM
3260 case R_PPC_REL16:
3261 case R_PPC_REL16_LO:
3262 case R_PPC_REL16_HI:
3263 case R_PPC_REL16_HA:
a680de9a 3264 case R_PPC_REL16DX_HA:
016687f8 3265 ppc_elf_tdata (abfd)->has_rel16 = 1;
d7128ce4
AM
3266 break;
3267
a6aa5195 3268 /* These are just markers. */
25dbc73a
AM
3269 case R_PPC_TLS:
3270 case R_PPC_EMB_MRKREF:
3271 case R_PPC_NONE:
3272 case R_PPC_max:
32af9f6e
AM
3273 case R_PPC_RELAX:
3274 case R_PPC_RELAX_PLT:
3275 case R_PPC_RELAX_PLTREL24:
7ba71655 3276 case R_PPC_16DX_HA:
25dbc73a 3277 break;
252b5132 3278
25dbc73a
AM
3279 /* These should only appear in dynamic objects. */
3280 case R_PPC_COPY:
3281 case R_PPC_GLOB_DAT:
3282 case R_PPC_JMP_SLOT:
3283 case R_PPC_RELATIVE:
e054468f 3284 case R_PPC_IRELATIVE:
25dbc73a 3285 break;
252b5132 3286
25dbc73a
AM
3287 /* These aren't handled yet. We'll report an error later. */
3288 case R_PPC_ADDR30:
3289 case R_PPC_EMB_RELSEC16:
3290 case R_PPC_EMB_RELST_LO:
3291 case R_PPC_EMB_RELST_HI:
3292 case R_PPC_EMB_RELST_HA:
3293 case R_PPC_EMB_BIT_FLD:
3294 break;
252b5132 3295
25dbc73a
AM
3296 /* This refers only to functions defined in the shared library. */
3297 case R_PPC_LOCAL24PC:
727fc41e 3298 if (h != NULL && h == htab->elf.hgot && htab->plt_type == PLT_UNSET)
016687f8
AM
3299 {
3300 htab->plt_type = PLT_OLD;
3301 htab->old_bfd = abfd;
3302 }
7a9361c0
AM
3303 if (h != NULL
3304 && ifunc != NULL
3305 && !update_plt_info (abfd, ifunc, NULL, 0))
3306 return false;
25dbc73a 3307 break;
252b5132 3308
25dbc73a
AM
3309 /* This relocation describes the C++ object vtable hierarchy.
3310 Reconstruct it for later use during GC. */
3311 case R_PPC_GNU_VTINHERIT:
3312 if (!bfd_elf_gc_record_vtinherit (abfd, sec, h, rel->r_offset))
0a1b45a2 3313 return false;
25dbc73a 3314 break;
252b5132 3315
25dbc73a
AM
3316 /* This relocation describes which C++ vtable entries are actually
3317 used. Record for later use during GC. */
3318 case R_PPC_GNU_VTENTRY:
a0ea3a14 3319 if (!bfd_elf_gc_record_vtentry (abfd, sec, h, rel->r_addend))
0a1b45a2 3320 return false;
25dbc73a 3321 break;
252b5132 3322
252dcdf4
AM
3323 case R_PPC_TPREL16_HI:
3324 case R_PPC_TPREL16_HA:
3325 sec->has_tls_reloc = 1;
3326 /* Fall through. */
7c8bbca5 3327 /* We shouldn't really be seeing TPREL32. */
25dbc73a 3328 case R_PPC_TPREL32:
1d483afe
AM
3329 case R_PPC_TPREL16:
3330 case R_PPC_TPREL16_LO:
7c8bbca5 3331 if (bfd_link_dll (info))
25dbc73a
AM
3332 info->flags |= DF_STATIC_TLS;
3333 goto dodyn;
252b5132 3334
25dbc73a
AM
3335 /* Nor these. */
3336 case R_PPC_DTPMOD32:
3337 case R_PPC_DTPREL32:
3338 goto dodyn;
252b5132 3339
9edfd1af
AM
3340 case R_PPC_REL32:
3341 if (h == NULL
3342 && got2 != NULL
3343 && (sec->flags & SEC_CODE) != 0
0e1862bb 3344 && bfd_link_pic (info)
4a3dc543 3345 && htab->plt_type == PLT_UNSET)
9edfd1af
AM
3346 {
3347 /* Old -fPIC gcc code has .long LCTOC1-LCFx just before
3348 the start of a function, which assembles to a REL32
3349 reference to .got2. If we detect one of these, then
3350 force the old PLT layout because the linker cannot
3351 reliably deduce the GOT pointer value needed for
3352 PLT call stubs. */
3353 asection *s;
87d72d41
AM
3354
3355 s = bfd_section_from_elf_index (abfd, isym->st_shndx);
9edfd1af 3356 if (s == got2)
016687f8
AM
3357 {
3358 htab->plt_type = PLT_OLD;
3359 htab->old_bfd = abfd;
3360 }
9edfd1af 3361 }
7123df0e 3362 if (h == NULL || h == htab->elf.hgot)
fd38b44c 3363 break;
625af618
AM
3364 /* fall through */
3365
3366 case R_PPC_ADDR32:
3367 case R_PPC_ADDR16:
3368 case R_PPC_ADDR16_LO:
3369 case R_PPC_ADDR16_HI:
3370 case R_PPC_ADDR16_HA:
3371 case R_PPC_UADDR32:
3372 case R_PPC_UADDR16:
0e1862bb 3373 if (h != NULL && !bfd_link_pic (info))
625af618
AM
3374 {
3375 /* We may need a plt entry if the symbol turns out to be
3376 a function defined in a dynamic object. */
3ec01793 3377 if (!update_plt_info (abfd, &h->plt.plist, NULL, 0))
0a1b45a2 3378 return false;
625af618
AM
3379
3380 /* We may need a copy reloc too. */
3381 h->non_got_ref = 1;
3382 h->pointer_equality_needed = 1;
d3e454b9
AM
3383 if (r_type == R_PPC_ADDR16_HA)
3384 ppc_elf_hash_entry (h)->has_addr16_ha = 1;
3385 if (r_type == R_PPC_ADDR16_LO)
3386 ppc_elf_hash_entry (h)->has_addr16_lo = 1;
625af618
AM
3387 }
3388 goto dodyn;
9edfd1af 3389
25dbc73a
AM
3390 case R_PPC_REL24:
3391 case R_PPC_REL14:
3392 case R_PPC_REL14_BRTAKEN:
3393 case R_PPC_REL14_BRNTAKEN:
d7128ce4 3394 if (h == NULL)
25dbc73a 3395 break;
7123df0e 3396 if (h == htab->elf.hgot)
d7128ce4 3397 {
7123df0e 3398 if (htab->plt_type == PLT_UNSET)
016687f8
AM
3399 {
3400 htab->plt_type = PLT_OLD;
3401 htab->old_bfd = abfd;
3402 }
d7128ce4
AM
3403 break;
3404 }
25dbc73a 3405 /* fall through */
ee05f2fe 3406
25dbc73a 3407 case R_PPC_ADDR24:
25dbc73a
AM
3408 case R_PPC_ADDR14:
3409 case R_PPC_ADDR14_BRTAKEN:
3410 case R_PPC_ADDR14_BRNTAKEN:
0e1862bb 3411 if (h != NULL && !bfd_link_pic (info))
25dbc73a
AM
3412 {
3413 /* We may need a plt entry if the symbol turns out to be
3414 a function defined in a dynamic object. */
e054468f 3415 h->needs_plt = 1;
de972ffa 3416 if (!update_plt_info (abfd, &h->plt.plist, NULL, 0))
0a1b45a2 3417 return false;
625af618 3418 break;
25dbc73a 3419 }
7619e7c7 3420
25dbc73a 3421 dodyn:
7a9361c0
AM
3422 /* Set up information for symbols that might need dynamic
3423 relocations. At this point in linking we have read all
3424 the input files and resolved most symbols, but have not
3425 yet decided whether symbols are dynamic or finalized
3426 symbol flags. In some cases we might be setting dynamic
3427 reloc info for symbols that do not end up needing such.
3428 That's OK, adjust_dynamic_symbol and allocate_dynrelocs
3429 work together with this code. */
3430 if ((h != NULL
3431 && !SYMBOL_REFERENCES_LOCAL (info, h))
3432 || (bfd_link_pic (info)
3433 && (h != NULL
3434 ? !bfd_is_abs_symbol (&h->root)
3435 : isym->st_shndx != SHN_ABS)
3436 && must_be_dyn_reloc (info, r_type)))
25dbc73a 3437 {
25dbc73a
AM
3438#ifdef DEBUG
3439 fprintf (stderr,
3440 "ppc_elf_check_relocs needs to "
3441 "create relocation for %s\n",
3442 (h && h->root.root.string
3443 ? h->root.root.string : "<unknown>"));
3444#endif
3445 if (sreloc == NULL)
3446 {
c9a2f333
AM
3447 if (htab->elf.dynobj == NULL)
3448 htab->elf.dynobj = abfd;
83bac4b0
NC
3449
3450 sreloc = _bfd_elf_make_dynamic_reloc_section
0a1b45a2 3451 (sec, htab->elf.dynobj, 2, abfd, /*rela?*/ true);
83bac4b0 3452
25dbc73a 3453 if (sreloc == NULL)
0a1b45a2 3454 return false;
25dbc73a 3455 }
7619e7c7 3456
25dbc73a
AM
3457 /* If this is a global symbol, we count the number of
3458 relocations we need for this symbol. */
3459 if (h != NULL)
3460 {
f95f8542
AM
3461 struct elf_dyn_relocs *p;
3462 struct elf_dyn_relocs **rel_head;
3463
190eb1dd 3464 rel_head = &h->dyn_relocs;
f95f8542
AM
3465 p = *rel_head;
3466 if (p == NULL || p->sec != sec)
3467 {
3468 p = bfd_alloc (htab->elf.dynobj, sizeof *p);
3469 if (p == NULL)
0a1b45a2 3470 return false;
f95f8542
AM
3471 p->next = *rel_head;
3472 *rel_head = p;
3473 p->sec = sec;
3474 p->count = 0;
3475 p->pc_count = 0;
3476 }
3477 p->count += 1;
3478 if (!must_be_dyn_reloc (info, r_type))
3479 p->pc_count += 1;
25dbc73a
AM
3480 }
3481 else
3482 {
3483 /* Track dynamic relocs needed for local syms too.
3484 We really need local syms available to do this
3485 easily. Oh well. */
f95f8542
AM
3486 struct ppc_dyn_relocs *p;
3487 struct ppc_dyn_relocs **rel_head;
0a1b45a2 3488 bool is_ifunc;
25dbc73a 3489 asection *s;
6edfbbad 3490 void *vpp;
7fce784e 3491
87d72d41
AM
3492 s = bfd_section_from_elf_index (abfd, isym->st_shndx);
3493 if (s == NULL)
3494 s = sec;
3495
6edfbbad 3496 vpp = &elf_section_data (s)->local_dynrel;
f95f8542 3497 rel_head = (struct ppc_dyn_relocs **) vpp;
7a9361c0 3498 is_ifunc = ifunc != NULL;
f95f8542
AM
3499 p = *rel_head;
3500 if (p != NULL && p->sec == sec && p->ifunc != is_ifunc)
3501 p = p->next;
3502 if (p == NULL || p->sec != sec || p->ifunc != is_ifunc)
3503 {
3504 p = bfd_alloc (htab->elf.dynobj, sizeof *p);
3505 if (p == NULL)
0a1b45a2 3506 return false;
f95f8542
AM
3507 p->next = *rel_head;
3508 *rel_head = p;
3509 p->sec = sec;
3510 p->ifunc = is_ifunc;
3511 p->count = 0;
3512 }
3513 p->count += 1;
25dbc73a 3514 }
7619e7c7 3515 }
25dbc73a
AM
3516
3517 break;
7619e7c7
AM
3518 }
3519 }
ee05f2fe 3520
0a1b45a2 3521 return true;
25dbc73a
AM
3522}
3523\f
005d79fd
AM
3524/* Warn for conflicting Tag_GNU_Power_ABI_FP attributes between IBFD
3525 and OBFD, and merge non-conflicting ones. */
0a1b45a2 3526bool
50e03d47 3527_bfd_elf_ppc_merge_fp_attributes (bfd *ibfd, struct bfd_link_info *info)
34c8bcba 3528{
50e03d47 3529 bfd *obfd = info->output_bfd;
c6e65352
DJ
3530 obj_attribute *in_attr, *in_attrs;
3531 obj_attribute *out_attr, *out_attrs;
0a1b45a2
AM
3532 bool ret = true;
3533 bool warn_only;
6f3fe02b
AM
3534
3535 /* We only warn about shared library mismatches, because common
3536 libraries advertise support for a particular long double variant
3537 but actually support more than one variant. For example, glibc
3538 typically supports 128-bit IBM long double in the shared library
3539 but has a compatibility static archive for 64-bit long double.
3540 The linker doesn't have the smarts to see that an app using
3541 object files marked as 64-bit long double call the compatibility
3542 layer objects and only from there call into the shared library. */
3543 warn_only = (ibfd->flags & DYNAMIC) != 0;
34c8bcba 3544
c6e65352
DJ
3545 in_attrs = elf_known_obj_attributes (ibfd)[OBJ_ATTR_GNU];
3546 out_attrs = elf_known_obj_attributes (obfd)[OBJ_ATTR_GNU];
3547
c6e65352
DJ
3548 in_attr = &in_attrs[Tag_GNU_Power_ABI_FP];
3549 out_attr = &out_attrs[Tag_GNU_Power_ABI_FP];
005d79fd 3550
c6e65352 3551 if (in_attr->i != out_attr->i)
34c8bcba 3552 {
005d79fd
AM
3553 int in_fp = in_attr->i & 3;
3554 int out_fp = out_attr->i & 3;
4a91d0ba 3555 static bfd *last_fp, *last_ld;
005d79fd
AM
3556
3557 if (in_fp == 0)
34c8bcba 3558 ;
005d79fd
AM
3559 else if (out_fp == 0)
3560 {
6f3fe02b
AM
3561 if (!warn_only)
3562 {
3563 out_attr->type = ATTR_TYPE_FLAG_INT_VAL;
3564 out_attr->i ^= in_fp;
3565 last_fp = ibfd;
3566 }
005d79fd
AM
3567 }
3568 else if (out_fp != 2 && in_fp == 2)
8d2c8c3d
AM
3569 {
3570 _bfd_error_handler
3571 /* xgettext:c-format */
4a91d0ba
AM
3572 (_("%pB uses hard float, %pB uses soft float"),
3573 last_fp, ibfd);
6f3fe02b 3574 ret = warn_only;
8d2c8c3d 3575 }
005d79fd 3576 else if (out_fp == 2 && in_fp != 2)
8d2c8c3d
AM
3577 {
3578 _bfd_error_handler
3579 /* xgettext:c-format */
4a91d0ba
AM
3580 (_("%pB uses hard float, %pB uses soft float"),
3581 ibfd, last_fp);
6f3fe02b 3582 ret = warn_only;
8d2c8c3d 3583 }
005d79fd 3584 else if (out_fp == 1 && in_fp == 3)
8d2c8c3d
AM
3585 {
3586 _bfd_error_handler
3587 /* xgettext:c-format */
4a91d0ba
AM
3588 (_("%pB uses double-precision hard float, "
3589 "%pB uses single-precision hard float"), last_fp, ibfd);
6f3fe02b 3590 ret = warn_only;
8d2c8c3d 3591 }
005d79fd 3592 else if (out_fp == 3 && in_fp == 1)
8d2c8c3d
AM
3593 {
3594 _bfd_error_handler
3595 /* xgettext:c-format */
4a91d0ba
AM
3596 (_("%pB uses double-precision hard float, "
3597 "%pB uses single-precision hard float"), ibfd, last_fp);
6f3fe02b 3598 ret = warn_only;
8d2c8c3d 3599 }
005d79fd
AM
3600
3601 in_fp = in_attr->i & 0xc;
3602 out_fp = out_attr->i & 0xc;
3603 if (in_fp == 0)
3604 ;
3605 else if (out_fp == 0)
3606 {
6f3fe02b
AM
3607 if (!warn_only)
3608 {
3609 out_attr->type = ATTR_TYPE_FLAG_INT_VAL;
3610 out_attr->i ^= in_fp;
3611 last_ld = ibfd;
3612 }
005d79fd
AM
3613 }
3614 else if (out_fp != 2 * 4 && in_fp == 2 * 4)
8d2c8c3d
AM
3615 {
3616 _bfd_error_handler
3617 /* xgettext:c-format */
4a91d0ba
AM
3618 (_("%pB uses 64-bit long double, "
3619 "%pB uses 128-bit long double"), ibfd, last_ld);
6f3fe02b 3620 ret = warn_only;
8d2c8c3d 3621 }
005d79fd 3622 else if (in_fp != 2 * 4 && out_fp == 2 * 4)
8d2c8c3d
AM
3623 {
3624 _bfd_error_handler
3625 /* xgettext:c-format */
4a91d0ba
AM
3626 (_("%pB uses 64-bit long double, "
3627 "%pB uses 128-bit long double"), last_ld, ibfd);
6f3fe02b 3628 ret = warn_only;
8d2c8c3d 3629 }
005d79fd 3630 else if (out_fp == 1 * 4 && in_fp == 3 * 4)
8d2c8c3d
AM
3631 {
3632 _bfd_error_handler
3633 /* xgettext:c-format */
4a91d0ba
AM
3634 (_("%pB uses IBM long double, "
3635 "%pB uses IEEE long double"), last_ld, ibfd);
6f3fe02b 3636 ret = warn_only;
8d2c8c3d 3637 }
005d79fd 3638 else if (out_fp == 3 * 4 && in_fp == 1 * 4)
8d2c8c3d
AM
3639 {
3640 _bfd_error_handler
3641 /* xgettext:c-format */
4a91d0ba
AM
3642 (_("%pB uses IBM long double, "
3643 "%pB uses IEEE long double"), ibfd, last_ld);
6f3fe02b 3644 ret = warn_only;
8d2c8c3d 3645 }
c6e65352 3646 }
4a91d0ba
AM
3647
3648 if (!ret)
3649 {
3650 out_attr->type = ATTR_TYPE_FLAG_INT_VAL | ATTR_TYPE_FLAG_ERROR;
3651 bfd_set_error (bfd_error_bad_value);
3652 }
3653 return ret;
005d79fd
AM
3654}
3655
3656/* Merge object attributes from IBFD into OBFD. Warn if
3657 there are conflicting attributes. */
0a1b45a2 3658static bool
50e03d47 3659ppc_elf_merge_obj_attributes (bfd *ibfd, struct bfd_link_info *info)
005d79fd 3660{
50e03d47 3661 bfd *obfd;
005d79fd
AM
3662 obj_attribute *in_attr, *in_attrs;
3663 obj_attribute *out_attr, *out_attrs;
0a1b45a2 3664 bool ret;
005d79fd 3665
4a91d0ba 3666 if (!_bfd_elf_ppc_merge_fp_attributes (ibfd, info))
0a1b45a2 3667 return false;
005d79fd 3668
50e03d47 3669 obfd = info->output_bfd;
005d79fd
AM
3670 in_attrs = elf_known_obj_attributes (ibfd)[OBJ_ATTR_GNU];
3671 out_attrs = elf_known_obj_attributes (obfd)[OBJ_ATTR_GNU];
c6e65352
DJ
3672
3673 /* Check for conflicting Tag_GNU_Power_ABI_Vector attributes and
3674 merge non-conflicting ones. */
3675 in_attr = &in_attrs[Tag_GNU_Power_ABI_Vector];
3676 out_attr = &out_attrs[Tag_GNU_Power_ABI_Vector];
0a1b45a2 3677 ret = true;
c6e65352
DJ
3678 if (in_attr->i != out_attr->i)
3679 {
005d79fd
AM
3680 int in_vec = in_attr->i & 3;
3681 int out_vec = out_attr->i & 3;
4a91d0ba 3682 static bfd *last_vec;
c6e65352 3683
005d79fd
AM
3684 if (in_vec == 0)
3685 ;
3686 else if (out_vec == 0)
c6e65352 3687 {
8d2c8c3d 3688 out_attr->type = ATTR_TYPE_FLAG_INT_VAL;
005d79fd 3689 out_attr->i = in_vec;
4a91d0ba 3690 last_vec = ibfd;
c6e65352 3691 }
c6e65352
DJ
3692 /* For now, allow generic to transition to AltiVec or SPE
3693 without a warning. If GCC marked files with their stack
3694 alignment and used don't-care markings for files which are
3695 not affected by the vector ABI, we could warn about this
3696 case too. */
005d79fd 3697 else if (in_vec == 1)
c6e65352 3698 ;
005d79fd
AM
3699 else if (out_vec == 1)
3700 {
8d2c8c3d 3701 out_attr->type = ATTR_TYPE_FLAG_INT_VAL;
005d79fd 3702 out_attr->i = in_vec;
4a91d0ba 3703 last_vec = ibfd;
005d79fd
AM
3704 }
3705 else if (out_vec < in_vec)
8d2c8c3d
AM
3706 {
3707 _bfd_error_handler
3708 /* xgettext:c-format */
4a91d0ba
AM
3709 (_("%pB uses AltiVec vector ABI, %pB uses SPE vector ABI"),
3710 last_vec, ibfd);
8d2c8c3d 3711 out_attr->type = ATTR_TYPE_FLAG_INT_VAL | ATTR_TYPE_FLAG_ERROR;
0a1b45a2 3712 ret = false;
8d2c8c3d 3713 }
005d79fd 3714 else if (out_vec > in_vec)
8d2c8c3d
AM
3715 {
3716 _bfd_error_handler
3717 /* xgettext:c-format */
4a91d0ba
AM
3718 (_("%pB uses AltiVec vector ABI, %pB uses SPE vector ABI"),
3719 ibfd, last_vec);
8d2c8c3d 3720 out_attr->type = ATTR_TYPE_FLAG_INT_VAL | ATTR_TYPE_FLAG_ERROR;
0a1b45a2 3721 ret = false;
8d2c8c3d 3722 }
34c8bcba
JM
3723 }
3724
f82e0623
NF
3725 /* Check for conflicting Tag_GNU_Power_ABI_Struct_Return attributes
3726 and merge non-conflicting ones. */
3727 in_attr = &in_attrs[Tag_GNU_Power_ABI_Struct_Return];
3728 out_attr = &out_attrs[Tag_GNU_Power_ABI_Struct_Return];
3729 if (in_attr->i != out_attr->i)
3730 {
005d79fd
AM
3731 int in_struct = in_attr->i & 3;
3732 int out_struct = out_attr->i & 3;
4a91d0ba 3733 static bfd *last_struct;
005d79fd
AM
3734
3735 if (in_struct == 0 || in_struct == 3)
f82e0623 3736 ;
005d79fd
AM
3737 else if (out_struct == 0)
3738 {
8d2c8c3d 3739 out_attr->type = ATTR_TYPE_FLAG_INT_VAL;
005d79fd 3740 out_attr->i = in_struct;
4a91d0ba 3741 last_struct = ibfd;
005d79fd
AM
3742 }
3743 else if (out_struct < in_struct)
8d2c8c3d
AM
3744 {
3745 _bfd_error_handler
3746 /* xgettext:c-format */
4a91d0ba
AM
3747 (_("%pB uses r3/r4 for small structure returns, "
3748 "%pB uses memory"), last_struct, ibfd);
8d2c8c3d 3749 out_attr->type = ATTR_TYPE_FLAG_INT_VAL | ATTR_TYPE_FLAG_ERROR;
0a1b45a2 3750 ret = false;
8d2c8c3d 3751 }
005d79fd 3752 else if (out_struct > in_struct)
8d2c8c3d
AM
3753 {
3754 _bfd_error_handler
3755 /* xgettext:c-format */
4a91d0ba
AM
3756 (_("%pB uses r3/r4 for small structure returns, "
3757 "%pB uses memory"), ibfd, last_struct);
8d2c8c3d 3758 out_attr->type = ATTR_TYPE_FLAG_INT_VAL | ATTR_TYPE_FLAG_ERROR;
0a1b45a2 3759 ret = false;
8d2c8c3d 3760 }
f82e0623 3761 }
4a91d0ba
AM
3762 if (!ret)
3763 {
3764 bfd_set_error (bfd_error_bad_value);
0a1b45a2 3765 return false;
4a91d0ba 3766 }
f82e0623 3767
34c8bcba 3768 /* Merge Tag_compatibility attributes and any common GNU ones. */
8d2c8c3d 3769 return _bfd_elf_merge_object_attributes (ibfd, info);
34c8bcba
JM
3770}
3771
8853c3d3
AM
3772/* Merge backend specific data from an object file to the output
3773 object file when linking. */
3774
0a1b45a2 3775static bool
50e03d47 3776ppc_elf_merge_private_bfd_data (bfd *ibfd, struct bfd_link_info *info)
8853c3d3 3777{
50e03d47 3778 bfd *obfd = info->output_bfd;
8853c3d3
AM
3779 flagword old_flags;
3780 flagword new_flags;
0a1b45a2 3781 bool error;
8853c3d3 3782
0c8d6e5c 3783 if (!is_ppc_elf (ibfd) || !is_ppc_elf (obfd))
0a1b45a2 3784 return true;
8853c3d3 3785
cc643b88 3786 /* Check if we have the same endianness. */
50e03d47 3787 if (! _bfd_generic_verify_endian_match (ibfd, info))
0a1b45a2 3788 return false;
8853c3d3 3789
50e03d47 3790 if (!ppc_elf_merge_obj_attributes (ibfd, info))
0a1b45a2 3791 return false;
34c8bcba 3792
91ed9b71 3793 if ((ibfd->flags & DYNAMIC) != 0)
0a1b45a2 3794 return true;
91ed9b71 3795
8853c3d3
AM
3796 new_flags = elf_elfheader (ibfd)->e_flags;
3797 old_flags = elf_elfheader (obfd)->e_flags;
3798 if (!elf_flags_init (obfd))
3799 {
3800 /* First call, no flags set. */
0a1b45a2 3801 elf_flags_init (obfd) = true;
8853c3d3
AM
3802 elf_elfheader (obfd)->e_flags = new_flags;
3803 }
3804
3805 /* Compatible flags are ok. */
3806 else if (new_flags == old_flags)
3807 ;
3808
3809 /* Incompatible flags. */
3810 else
3811 {
3812 /* Warn about -mrelocatable mismatch. Allow -mrelocatable-lib
3813 to be linked with either. */
0a1b45a2 3814 error = false;
8853c3d3
AM
3815 if ((new_flags & EF_PPC_RELOCATABLE) != 0
3816 && (old_flags & (EF_PPC_RELOCATABLE | EF_PPC_RELOCATABLE_LIB)) == 0)
3817 {
0a1b45a2 3818 error = true;
4eca0228 3819 _bfd_error_handler
871b3ab2 3820 (_("%pB: compiled with -mrelocatable and linked with "
8853c3d3
AM
3821 "modules compiled normally"), ibfd);
3822 }
3823 else if ((new_flags & (EF_PPC_RELOCATABLE | EF_PPC_RELOCATABLE_LIB)) == 0
3824 && (old_flags & EF_PPC_RELOCATABLE) != 0)
3825 {
0a1b45a2 3826 error = true;
4eca0228 3827 _bfd_error_handler
871b3ab2 3828 (_("%pB: compiled normally and linked with "
8853c3d3
AM
3829 "modules compiled with -mrelocatable"), ibfd);
3830 }
3831
3832 /* The output is -mrelocatable-lib iff both the input files are. */
3833 if (! (new_flags & EF_PPC_RELOCATABLE_LIB))
3834 elf_elfheader (obfd)->e_flags &= ~EF_PPC_RELOCATABLE_LIB;
3835
3836 /* The output is -mrelocatable iff it can't be -mrelocatable-lib,
3837 but each input file is either -mrelocatable or -mrelocatable-lib. */
3838 if (! (elf_elfheader (obfd)->e_flags & EF_PPC_RELOCATABLE_LIB)
3839 && (new_flags & (EF_PPC_RELOCATABLE_LIB | EF_PPC_RELOCATABLE))
3840 && (old_flags & (EF_PPC_RELOCATABLE_LIB | EF_PPC_RELOCATABLE)))
3841 elf_elfheader (obfd)->e_flags |= EF_PPC_RELOCATABLE;
3842
3843 /* Do not warn about eabi vs. V.4 mismatch, just or in the bit if
3844 any module uses it. */
3845 elf_elfheader (obfd)->e_flags |= (new_flags & EF_PPC_EMB);
3846
3847 new_flags &= ~(EF_PPC_RELOCATABLE | EF_PPC_RELOCATABLE_LIB | EF_PPC_EMB);
3848 old_flags &= ~(EF_PPC_RELOCATABLE | EF_PPC_RELOCATABLE_LIB | EF_PPC_EMB);
3849
3850 /* Warn about any other mismatches. */
3851 if (new_flags != old_flags)
3852 {
0a1b45a2 3853 error = true;
4eca0228 3854 _bfd_error_handler
695344c0 3855 /* xgettext:c-format */
871b3ab2 3856 (_("%pB: uses different e_flags (%#x) fields "
cd9af601
AM
3857 "than previous modules (%#x)"),
3858 ibfd, new_flags, old_flags);
8853c3d3
AM
3859 }
3860
3861 if (error)
3862 {
3863 bfd_set_error (bfd_error_bad_value);
0a1b45a2 3864 return false;
8853c3d3
AM
3865 }
3866 }
3867
0a1b45a2 3868 return true;
8853c3d3 3869}
b9c361e0 3870
e7776f52 3871static bfd_reloc_status_type
95f0d0d2 3872ppc_elf_vle_split16 (bfd *input_bfd,
08dc996f
AM
3873 asection *input_section,
3874 unsigned long offset,
95f0d0d2 3875 bfd_byte *loc,
86c95733 3876 bfd_vma value,
08dc996f 3877 split16_format_type split16_format,
0a1b45a2 3878 bool fixup)
b9c361e0 3879{
bb6bf75e 3880 unsigned int insn, opcode;
b9c361e0 3881
e7776f52
AM
3882 if (!offset_in_range (input_section, offset, 4))
3883 return bfd_reloc_outofrange;
95f0d0d2 3884 insn = bfd_get_32 (input_bfd, loc);
bb6bf75e 3885 opcode = insn & E_OPCODE_MASK;
08dc996f
AM
3886 if (opcode == E_OR2I_INSN
3887 || opcode == E_AND2I_DOT_INSN
3888 || opcode == E_OR2IS_INSN
3889 || opcode == E_LIS_INSN
3890 || opcode == E_AND2IS_DOT_INSN)
3891 {
3892 if (split16_format != split16a_type)
3893 {
3894 if (fixup)
3895 split16_format = split16a_type;
3896 else
3897 _bfd_error_handler
3898 /* xgettext:c-format */
871b3ab2 3899 (_("%pB(%pA+0x%lx): expected 16A style relocation on 0x%08x insn"),
08dc996f
AM
3900 input_bfd, input_section, offset, opcode);
3901 }
3902 }
3903 else if (opcode == E_ADD2I_DOT_INSN
3904 || opcode == E_ADD2IS_INSN
3905 || opcode == E_CMP16I_INSN
3906 || opcode == E_MULL2I_INSN
3907 || opcode == E_CMPL16I_INSN
3908 || opcode == E_CMPH16I_INSN
3909 || opcode == E_CMPHL16I_INSN)
3910 {
3911 if (split16_format != split16d_type)
3912 {
3913 if (fixup)
3914 split16_format = split16d_type;
3915 else
3916 _bfd_error_handler
3917 /* xgettext:c-format */
871b3ab2 3918 (_("%pB(%pA+0x%lx): expected 16D style relocation on 0x%08x insn"),
08dc996f
AM
3919 input_bfd, input_section, offset, opcode);
3920 }
3921 }
bb6bf75e
AM
3922 if (split16_format == split16a_type)
3923 {
3924 insn &= ~((0xf800 << 5) | 0x7ff);
3925 insn |= (value & 0xf800) << 5;
3926 if ((insn & E_LI_MASK) == E_LI_INSN)
3927 {
3928 /* Hack for e_li. Extend sign. */
3929 insn &= ~(0xf0000 >> 5);
3930 insn |= (-(value & 0x8000) & 0xf0000) >> 5;
3931 }
3932 }
3933 else
3934 {
3935 insn &= ~((0xf800 << 10) | 0x7ff);
3936 insn |= (value & 0xf800) << 10;
3937 }
86c95733 3938 insn |= value & 0x7ff;
95f0d0d2 3939 bfd_put_32 (input_bfd, insn, loc);
e7776f52 3940 return bfd_reloc_ok;
b9c361e0 3941}
83eef883
AFB
3942
3943static void
3944ppc_elf_vle_split20 (bfd *output_bfd, bfd_byte *loc, bfd_vma value)
3945{
3946 unsigned int insn;
3947
3948 insn = bfd_get_32 (output_bfd, loc);
3949 /* We have an li20 field, bits 17..20, 11..15, 21..31. */
3950 /* Top 4 bits of value to 17..20. */
3951 insn |= (value & 0xf0000) >> 5;
3952 /* Next 5 bits of the value to 11..15. */
3953 insn |= (value & 0xf800) << 5;
3954 /* And the final 11 bits of the value to bits 21 to 31. */
3955 insn |= value & 0x7ff;
3956 bfd_put_32 (output_bfd, insn, loc);
3957}
3958
8853c3d3 3959\f
d7128ce4
AM
3960/* Choose which PLT scheme to use, and set .plt flags appropriately.
3961 Returns -1 on error, 0 for old PLT, 1 for new PLT. */
3962int
3963ppc_elf_select_plt_layout (bfd *output_bfd ATTRIBUTE_UNUSED,
5446cbdf 3964 struct bfd_link_info *info)
d7128ce4
AM
3965{
3966 struct ppc_elf_link_hash_table *htab;
9d8504b1 3967 flagword flags;
d7128ce4
AM
3968
3969 htab = ppc_elf_hash_table (info);
4a3dc543
RS
3970
3971 if (htab->plt_type == PLT_UNSET)
016687f8 3972 {
b3874e1a
AM
3973 struct elf_link_hash_entry *h;
3974
5446cbdf 3975 if (htab->params->plt_style == PLT_OLD)
016687f8 3976 htab->plt_type = PLT_OLD;
0e1862bb 3977 else if (bfd_link_pic (info)
b3874e1a
AM
3978 && htab->elf.dynamic_sections_created
3979 && (h = elf_link_hash_lookup (&htab->elf, "_mcount",
0a1b45a2 3980 false, false, true)) != NULL
b3874e1a
AM
3981 && (h->type == STT_FUNC
3982 || h->needs_plt)
3983 && h->ref_regular
3984 && !(SYMBOL_CALLS_LOCAL (info, h)
21d68fcd 3985 || UNDEFWEAK_NO_DYNAMIC_RELOC (info, h)))
b3874e1a
AM
3986 {
3987 /* Profiling of shared libs (and pies) is not supported with
3988 secure plt, because ppc32 does profiling before a
3989 function prologue and a secure plt pic call stubs needs
3990 r30 to be set up. */
3991 htab->plt_type = PLT_OLD;
3992 }
016687f8
AM
3993 else
3994 {
3995 bfd *ibfd;
5446cbdf 3996 enum ppc_elf_plt_type plt_type = htab->params->plt_style;
016687f8
AM
3997
3998 /* Look through the reloc flags left by ppc_elf_check_relocs.
3999 Use the old style bss plt if a file makes plt calls
4000 without using the new relocs, and if ld isn't given
4001 --secure-plt and we never see REL16 relocs. */
4002 if (plt_type == PLT_UNSET)
4003 plt_type = PLT_OLD;
c72f2fb2 4004 for (ibfd = info->input_bfds; ibfd; ibfd = ibfd->link.next)
0c8d6e5c 4005 if (is_ppc_elf (ibfd))
016687f8
AM
4006 {
4007 if (ppc_elf_tdata (ibfd)->has_rel16)
4008 plt_type = PLT_NEW;
4009 else if (ppc_elf_tdata (ibfd)->makes_plt_call)
4010 {
4011 plt_type = PLT_OLD;
4012 htab->old_bfd = ibfd;
4013 break;
4014 }
4015 }
4016 htab->plt_type = plt_type;
4017 }
4018 }
84789002 4019 if (htab->plt_type == PLT_OLD)
b3874e1a 4020 {
84789002
AM
4021 if (!info->user_warn_rwx_segments)
4022 info->no_warn_rwx_segments = 1;
4023 if (htab->params->plt_style == PLT_NEW
4024 || (htab->params->plt_style != PLT_OLD
4025 && !info->no_warn_rwx_segments))
4026 {
4027 if (htab->old_bfd != NULL)
4028 _bfd_error_handler (_("bss-plt forced due to %pB"), htab->old_bfd);
4029 else
4030 _bfd_error_handler (_("bss-plt forced by profiling"));
4031 }
b3874e1a 4032 }
d7128ce4 4033
4a3dc543 4034 BFD_ASSERT (htab->plt_type != PLT_VXWORKS);
9d8504b1 4035
4a3dc543 4036 if (htab->plt_type == PLT_NEW)
9d8504b1
PB
4037 {
4038 flags = (SEC_ALLOC | SEC_LOAD | SEC_HAS_CONTENTS
4039 | SEC_IN_MEMORY | SEC_LINKER_CREATED);
86b9da88
AM
4040
4041 /* The new PLT is a loaded section. */
ce558b89 4042 if (htab->elf.splt != NULL
fd361982 4043 && !bfd_set_section_flags (htab->elf.splt, flags))
86b9da88
AM
4044 return -1;
4045
4046 /* The new GOT is not executable. */
ce558b89 4047 if (htab->elf.sgot != NULL
fd361982 4048 && !bfd_set_section_flags (htab->elf.sgot, flags))
86b9da88 4049 return -1;
d7128ce4
AM
4050 }
4051 else
4052 {
4053 /* Stop an unused .glink section from affecting .text alignment. */
86b9da88 4054 if (htab->glink != NULL
fd361982 4055 && !bfd_set_section_alignment (htab->glink, 0))
86b9da88 4056 return -1;
d7128ce4 4057 }
4a3dc543 4058 return htab->plt_type == PLT_NEW;
d7128ce4
AM
4059}
4060\f
25dbc73a
AM
4061/* Return the section that should be marked against GC for a given
4062 relocation. */
586119b3 4063
25dbc73a
AM
4064static asection *
4065ppc_elf_gc_mark_hook (asection *sec,
07adf181 4066 struct bfd_link_info *info,
25dbc73a
AM
4067 Elf_Internal_Rela *rel,
4068 struct elf_link_hash_entry *h,
4069 Elf_Internal_Sym *sym)
4070{
4071 if (h != NULL)
07adf181
AM
4072 switch (ELF32_R_TYPE (rel->r_info))
4073 {
4074 case R_PPC_GNU_VTINHERIT:
4075 case R_PPC_GNU_VTENTRY:
4076 return NULL;
4077 }
4078
4079 return _bfd_elf_gc_mark_hook (sec, info, rel, h, sym);
25dbc73a 4080}
49c09209 4081
0a1b45a2 4082static bool
49c09209
AM
4083get_sym_h (struct elf_link_hash_entry **hp,
4084 Elf_Internal_Sym **symp,
4085 asection **symsecp,
4086 unsigned char **tls_maskp,
4087 Elf_Internal_Sym **locsymsp,
4088 unsigned long r_symndx,
4089 bfd *ibfd)
4090{
4091 Elf_Internal_Shdr *symtab_hdr = &elf_symtab_hdr (ibfd);
4092
4093 if (r_symndx >= symtab_hdr->sh_info)
4094 {
4095 struct elf_link_hash_entry **sym_hashes = elf_sym_hashes (ibfd);
4096 struct elf_link_hash_entry *h;
4097
4098 h = sym_hashes[r_symndx - symtab_hdr->sh_info];
4099 while (h->root.type == bfd_link_hash_indirect
4100 || h->root.type == bfd_link_hash_warning)
4101 h = (struct elf_link_hash_entry *) h->root.u.i.link;
4102
4103 if (hp != NULL)
4104 *hp = h;
4105
4106 if (symp != NULL)
4107 *symp = NULL;
4108
4109 if (symsecp != NULL)
4110 {
4111 asection *symsec = NULL;
4112 if (h->root.type == bfd_link_hash_defined
4113 || h->root.type == bfd_link_hash_defweak)
4114 symsec = h->root.u.def.section;
4115 *symsecp = symsec;
4116 }
4117
4118 if (tls_maskp != NULL)
4119 *tls_maskp = &ppc_elf_hash_entry (h)->tls_mask;
4120 }
4121 else
4122 {
4123 Elf_Internal_Sym *sym;
4124 Elf_Internal_Sym *locsyms = *locsymsp;
4125
4126 if (locsyms == NULL)
4127 {
4128 locsyms = (Elf_Internal_Sym *) symtab_hdr->contents;
4129 if (locsyms == NULL)
4130 locsyms = bfd_elf_get_elf_syms (ibfd, symtab_hdr,
4131 symtab_hdr->sh_info,
4132 0, NULL, NULL, NULL);
4133 if (locsyms == NULL)
0a1b45a2 4134 return false;
49c09209
AM
4135 *locsymsp = locsyms;
4136 }
4137 sym = locsyms + r_symndx;
4138
4139 if (hp != NULL)
4140 *hp = NULL;
4141
4142 if (symp != NULL)
4143 *symp = sym;
4144
4145 if (symsecp != NULL)
4146 *symsecp = bfd_section_from_elf_index (ibfd, sym->st_shndx);
4147
4148 if (tls_maskp != NULL)
4149 {
4150 bfd_signed_vma *local_got;
4151 unsigned char *tls_mask;
4152
4153 tls_mask = NULL;
4154 local_got = elf_local_got_refcounts (ibfd);
4155 if (local_got != NULL)
4156 {
4157 struct plt_entry **local_plt = (struct plt_entry **)
4158 (local_got + symtab_hdr->sh_info);
4159 unsigned char *lgot_masks = (unsigned char *)
4160 (local_plt + symtab_hdr->sh_info);
4161 tls_mask = &lgot_masks[r_symndx];
4162 }
4163 *tls_maskp = tls_mask;
4164 }
4165 }
0a1b45a2 4166 return true;
49c09209 4167}
25dbc73a 4168\f
3e04d765
AM
4169/* Analyze inline PLT call relocations to see whether calls to locally
4170 defined functions can be converted to direct calls. */
4171
0a1b45a2 4172bool
3e04d765
AM
4173ppc_elf_inline_plt (struct bfd_link_info *info)
4174{
4175 struct ppc_elf_link_hash_table *htab;
4176 bfd *ibfd;
4177 asection *sec;
4178 bfd_vma low_vma, high_vma, limit;
4179
4180 htab = ppc_elf_hash_table (info);
4181 if (htab == NULL)
0a1b45a2 4182 return false;
3e04d765
AM
4183
4184 /* A bl insn can reach -0x2000000 to 0x1fffffc. The limit is
4185 reduced somewhat to cater for possible stubs that might be added
4186 between the call and its destination. */
4187 limit = 0x1e00000;
4188 low_vma = -1;
4189 high_vma = 0;
4190 for (sec = info->output_bfd->sections; sec != NULL; sec = sec->next)
4191 if ((sec->flags & (SEC_ALLOC | SEC_CODE)) == (SEC_ALLOC | SEC_CODE))
4192 {
4193 if (low_vma > sec->vma)
4194 low_vma = sec->vma;
4195 if (high_vma < sec->vma + sec->size)
4196 high_vma = sec->vma + sec->size;
4197 }
4198
4199 /* If a "bl" can reach anywhere in local code sections, then we can
4200 convert all inline PLT sequences to direct calls when the symbol
4201 is local. */
4202 if (high_vma - low_vma < limit)
4203 {
4204 htab->can_convert_all_inline_plt = 1;
0a1b45a2 4205 return true;
3e04d765
AM
4206 }
4207
4208 /* Otherwise, go looking through relocs for cases where a direct
4209 call won't reach. Mark the symbol on any such reloc to disable
4210 the optimization and keep the PLT entry as it seems likely that
4211 this will be better than creating trampolines. Note that this
4212 will disable the optimization for all inline PLT calls to a
4213 particular symbol, not just those that won't reach. The
4214 difficulty in doing a more precise optimization is that the
4215 linker needs to make a decision depending on whether a
4216 particular R_PPC_PLTCALL insn can be turned into a direct
4217 call, for each of the R_PPC_PLTSEQ and R_PPC_PLT16* insns in
4218 the sequence, and there is nothing that ties those relocs
4219 together except their symbol. */
4220
4221 for (ibfd = info->input_bfds; ibfd != NULL; ibfd = ibfd->link.next)
4222 {
4223 Elf_Internal_Shdr *symtab_hdr;
4224 Elf_Internal_Sym *local_syms;
4225
4226 if (!is_ppc_elf (ibfd))
4227 continue;
4228
4229 local_syms = NULL;
4230 symtab_hdr = &elf_symtab_hdr (ibfd);
4231
4232 for (sec = ibfd->sections; sec != NULL; sec = sec->next)
4233 if (sec->has_pltcall
4234 && !bfd_is_abs_section (sec->output_section))
4235 {
4236 Elf_Internal_Rela *relstart, *rel, *relend;
4237
4238 /* Read the relocations. */
4239 relstart = _bfd_elf_link_read_relocs (ibfd, sec, NULL, NULL,
4240 info->keep_memory);
4241 if (relstart == NULL)
0a1b45a2 4242 return false;
3e04d765
AM
4243
4244 relend = relstart + sec->reloc_count;
337d0bf8 4245 for (rel = relstart; rel < relend; rel++)
3e04d765
AM
4246 {
4247 enum elf_ppc_reloc_type r_type;
4248 unsigned long r_symndx;
4249 asection *sym_sec;
4250 struct elf_link_hash_entry *h;
4251 Elf_Internal_Sym *sym;
4252 unsigned char *tls_maskp;
4253
4254 r_type = ELF32_R_TYPE (rel->r_info);
4255 if (r_type != R_PPC_PLTCALL)
4256 continue;
4257
4258 r_symndx = ELF32_R_SYM (rel->r_info);
4259 if (!get_sym_h (&h, &sym, &sym_sec, &tls_maskp, &local_syms,
4260 r_symndx, ibfd))
4261 {
4262 if (elf_section_data (sec)->relocs != relstart)
4263 free (relstart);
c9594989 4264 if (symtab_hdr->contents != (unsigned char *) local_syms)
3e04d765 4265 free (local_syms);
0a1b45a2 4266 return false;
3e04d765
AM
4267 }
4268
4269 if (sym_sec != NULL && sym_sec->output_section != NULL)
4270 {
4271 bfd_vma from, to;
4272 if (h != NULL)
4273 to = h->root.u.def.value;
4274 else
4275 to = sym->st_value;
4276 to += (rel->r_addend
4277 + sym_sec->output_offset
4278 + sym_sec->output_section->vma);
4279 from = (rel->r_offset
4280 + sec->output_offset
4281 + sec->output_section->vma);
4282 if (to - from + limit < 2 * limit)
4283 *tls_maskp &= ~PLT_KEEP;
4284 }
4285 }
4286 if (elf_section_data (sec)->relocs != relstart)
4287 free (relstart);
4288 }
4289
4290 if (local_syms != NULL
4291 && symtab_hdr->contents != (unsigned char *) local_syms)
4292 {
4293 if (!info->keep_memory)
4294 free (local_syms);
4295 else
4296 symtab_hdr->contents = (unsigned char *) local_syms;
4297 }
4298 }
4299
0a1b45a2 4300 return true;
3e04d765
AM
4301}
4302
3a71aa26
AM
4303/* Set plt output section type, htab->tls_get_addr, and call the
4304 generic ELF tls_setup function. */
7fce784e 4305
25dbc73a 4306asection *
5446cbdf 4307ppc_elf_tls_setup (bfd *obfd, struct bfd_link_info *info)
7fce784e 4308{
25dbc73a 4309 struct ppc_elf_link_hash_table *htab;
7fce784e 4310
25dbc73a 4311 htab = ppc_elf_hash_table (info);
a7f2871e 4312 htab->tls_get_addr = elf_link_hash_lookup (&htab->elf, "__tls_get_addr",
0a1b45a2 4313 false, false, true);
f01f1741 4314 if (htab->plt_type != PLT_NEW)
0a1b45a2 4315 htab->params->no_tls_get_addr_opt = true;
f01f1741 4316
5446cbdf 4317 if (!htab->params->no_tls_get_addr_opt)
a7f2871e
AM
4318 {
4319 struct elf_link_hash_entry *opt, *tga;
4320 opt = elf_link_hash_lookup (&htab->elf, "__tls_get_addr_opt",
0a1b45a2 4321 false, false, true);
a7f2871e
AM
4322 if (opt != NULL
4323 && (opt->root.type == bfd_link_hash_defined
4324 || opt->root.type == bfd_link_hash_defweak))
4325 {
4326 /* If glibc supports an optimized __tls_get_addr call stub,
4327 signalled by the presence of __tls_get_addr_opt, and we'll
4328 be calling __tls_get_addr via a plt call stub, then
4329 make __tls_get_addr point to __tls_get_addr_opt. */
4330 tga = htab->tls_get_addr;
4331 if (htab->elf.dynamic_sections_created
4332 && tga != NULL
4333 && (tga->type == STT_FUNC
4334 || tga->needs_plt)
4335 && !(SYMBOL_CALLS_LOCAL (info, tga)
21d68fcd 4336 || UNDEFWEAK_NO_DYNAMIC_RELOC (info, tga)))
a7f2871e
AM
4337 {
4338 struct plt_entry *ent;
32af9f6e
AM
4339 for (ent = tga->plt.plist; ent != NULL; ent = ent->next)
4340 if (ent->plt.refcount > 0)
4341 break;
4342 if (ent != NULL)
a7f2871e
AM
4343 {
4344 tga->root.type = bfd_link_hash_indirect;
4345 tga->root.u.i.link = &opt->root;
4346 ppc_elf_copy_indirect_symbol (info, opt, tga);
b531344c 4347 opt->mark = 1;
a7f2871e
AM
4348 if (opt->dynindx != -1)
4349 {
4350 /* Use __tls_get_addr_opt in dynamic relocations. */
4351 opt->dynindx = -1;
4352 _bfd_elf_strtab_delref (elf_hash_table (info)->dynstr,
4353 opt->dynstr_index);
4354 if (!bfd_elf_link_record_dynamic_symbol (info, opt))
0a1b45a2 4355 return false;
a7f2871e
AM
4356 }
4357 htab->tls_get_addr = opt;
4358 }
4359 }
4360 }
4361 else
0a1b45a2 4362 htab->params->no_tls_get_addr_opt = true;
a7f2871e 4363 }
4a3dc543 4364 if (htab->plt_type == PLT_NEW
ce558b89
AM
4365 && htab->elf.splt != NULL
4366 && htab->elf.splt->output_section != NULL)
d7128ce4 4367 {
ce558b89
AM
4368 elf_section_type (htab->elf.splt->output_section) = SHT_PROGBITS;
4369 elf_section_flags (htab->elf.splt->output_section) = SHF_ALLOC + SHF_WRITE;
d7128ce4
AM
4370 }
4371
25dbc73a 4372 return _bfd_elf_tls_setup (obfd, info);
7fce784e
AS
4373}
4374
3a71aa26
AM
4375/* Return TRUE iff REL is a branch reloc with a global symbol matching
4376 HASH. */
4377
0a1b45a2 4378static bool
3a71aa26
AM
4379branch_reloc_hash_match (const bfd *ibfd,
4380 const Elf_Internal_Rela *rel,
4381 const struct elf_link_hash_entry *hash)
4382{
4383 Elf_Internal_Shdr *symtab_hdr = &elf_symtab_hdr (ibfd);
4384 enum elf_ppc_reloc_type r_type = ELF32_R_TYPE (rel->r_info);
4385 unsigned int r_symndx = ELF32_R_SYM (rel->r_info);
4386
e054468f 4387 if (r_symndx >= symtab_hdr->sh_info && is_branch_reloc (r_type))
3a71aa26
AM
4388 {
4389 struct elf_link_hash_entry **sym_hashes = elf_sym_hashes (ibfd);
4390 struct elf_link_hash_entry *h;
4391
4392 h = sym_hashes[r_symndx - symtab_hdr->sh_info];
4393 while (h->root.type == bfd_link_hash_indirect
4394 || h->root.type == bfd_link_hash_warning)
4395 h = (struct elf_link_hash_entry *) h->root.u.i.link;
4396 if (h == hash)
0a1b45a2 4397 return true;
3a71aa26 4398 }
0a1b45a2 4399 return false;
3a71aa26
AM
4400}
4401
25dbc73a
AM
4402/* Run through all the TLS relocs looking for optimization
4403 opportunities. */
252b5132 4404
0a1b45a2 4405bool
25dbc73a
AM
4406ppc_elf_tls_optimize (bfd *obfd ATTRIBUTE_UNUSED,
4407 struct bfd_link_info *info)
252b5132 4408{
7fce784e 4409 bfd *ibfd;
25dbc73a
AM
4410 asection *sec;
4411 struct ppc_elf_link_hash_table *htab;
b7fcf6f6 4412 int pass;
252b5132 4413
3cbc1e5e 4414 if (!bfd_link_executable (info))
0a1b45a2 4415 return true;
252b5132 4416
7619e7c7 4417 htab = ppc_elf_hash_table (info);
663a1470 4418 if (htab == NULL)
0a1b45a2 4419 return false;
663a1470 4420
252dcdf4
AM
4421 htab->do_tls_opt = 1;
4422
b7fcf6f6
AM
4423 /* Make two passes through the relocs. First time check that tls
4424 relocs involved in setting up a tls_get_addr call are indeed
663a1470
AM
4425 followed by such a call. If they are not, don't do any tls
4426 optimization. On the second pass twiddle tls_mask flags to
4427 notify relocate_section that optimization can be done, and
4428 adjust got and plt refcounts. */
b7fcf6f6 4429 for (pass = 0; pass < 2; ++pass)
c72f2fb2 4430 for (ibfd = info->input_bfds; ibfd != NULL; ibfd = ibfd->link.next)
b7fcf6f6 4431 {
0ffa91dd 4432 Elf_Internal_Shdr *symtab_hdr = &elf_symtab_hdr (ibfd);
32af9f6e 4433 asection *got2 = bfd_get_section_by_name (ibfd, ".got2");
7619e7c7 4434
b7fcf6f6
AM
4435 for (sec = ibfd->sections; sec != NULL; sec = sec->next)
4436 if (sec->has_tls_reloc && !bfd_is_abs_section (sec->output_section))
4437 {
4438 Elf_Internal_Rela *relstart, *rel, *relend;
663a1470 4439 int expecting_tls_get_addr = 0;
252b5132 4440
b7fcf6f6
AM
4441 /* Read the relocations. */
4442 relstart = _bfd_elf_link_read_relocs (ibfd, sec, NULL, NULL,
4443 info->keep_memory);
4444 if (relstart == NULL)
0a1b45a2 4445 return false;
7619e7c7 4446
b7fcf6f6
AM
4447 relend = relstart + sec->reloc_count;
4448 for (rel = relstart; rel < relend; rel++)
4449 {
4450 enum elf_ppc_reloc_type r_type;
4451 unsigned long r_symndx;
4452 struct elf_link_hash_entry *h = NULL;
bac3c8c5 4453 unsigned char *tls_mask;
37da22e5 4454 unsigned char tls_set, tls_clear;
0a1b45a2 4455 bool is_local;
b7fcf6f6
AM
4456 bfd_signed_vma *got_count;
4457
4458 r_symndx = ELF32_R_SYM (rel->r_info);
4459 if (r_symndx >= symtab_hdr->sh_info)
4460 {
4461 struct elf_link_hash_entry **sym_hashes;
7fce784e 4462
b7fcf6f6
AM
4463 sym_hashes = elf_sym_hashes (ibfd);
4464 h = sym_hashes[r_symndx - symtab_hdr->sh_info];
4465 while (h->root.type == bfd_link_hash_indirect
4466 || h->root.type == bfd_link_hash_warning)
4467 h = (struct elf_link_hash_entry *) h->root.u.i.link;
4468 }
7619e7c7 4469
f749f26e 4470 is_local = SYMBOL_REFERENCES_LOCAL (info, h);
b7fcf6f6 4471 r_type = ELF32_R_TYPE (rel->r_info);
663a1470
AM
4472 /* If this section has old-style __tls_get_addr calls
4473 without marker relocs, then check that each
4474 __tls_get_addr call reloc is preceded by a reloc
4475 that conceivably belongs to the __tls_get_addr arg
4476 setup insn. If we don't find matching arg setup
4477 relocs, don't do any tls optimization. */
4478 if (pass == 0
9737e8af 4479 && sec->nomark_tls_get_addr
663a1470
AM
4480 && h != NULL
4481 && h == htab->tls_get_addr
4482 && !expecting_tls_get_addr
4483 && is_branch_reloc (r_type))
4484 {
25f53a85 4485 info->callbacks->minfo ("%H __tls_get_addr lost arg, "
663a1470
AM
4486 "TLS optimization disabled\n",
4487 ibfd, sec, rel->r_offset);
4488 if (elf_section_data (sec)->relocs != relstart)
4489 free (relstart);
0a1b45a2 4490 return true;
663a1470
AM
4491 }
4492
4493 expecting_tls_get_addr = 0;
b7fcf6f6
AM
4494 switch (r_type)
4495 {
4496 case R_PPC_GOT_TLSLD16:
4497 case R_PPC_GOT_TLSLD16_LO:
4498 expecting_tls_get_addr = 1;
1a0670f3 4499 /* Fall through. */
b7fcf6f6
AM
4500
4501 case R_PPC_GOT_TLSLD16_HI:
4502 case R_PPC_GOT_TLSLD16_HA:
4503 /* These relocs should never be against a symbol
4504 defined in a shared lib. Leave them alone if
4505 that turns out to be the case. */
4506 if (!is_local)
4507 continue;
4508
4509 /* LD -> LE */
4510 tls_set = 0;
4511 tls_clear = TLS_LD;
4512 break;
4513
4514 case R_PPC_GOT_TLSGD16:
4515 case R_PPC_GOT_TLSGD16_LO:
4516 expecting_tls_get_addr = 1;
1a0670f3 4517 /* Fall through. */
b7fcf6f6
AM
4518
4519 case R_PPC_GOT_TLSGD16_HI:
4520 case R_PPC_GOT_TLSGD16_HA:
4521 if (is_local)
4522 /* GD -> LE */
4523 tls_set = 0;
4524 else
4525 /* GD -> IE */
b00a0a86 4526 tls_set = TLS_TLS | TLS_GDIE;
b7fcf6f6
AM
4527 tls_clear = TLS_GD;
4528 break;
4529
4530 case R_PPC_GOT_TPREL16:
4531 case R_PPC_GOT_TPREL16_LO:
4532 case R_PPC_GOT_TPREL16_HI:
4533 case R_PPC_GOT_TPREL16_HA:
4534 if (is_local)
4535 {
4536 /* IE -> LE */
4537 tls_set = 0;
4538 tls_clear = TLS_TPREL;
4539 break;
4540 }
4541 else
4542 continue;
4543
32af9f6e 4544 case R_PPC_TLSLD:
7d04a20a
AM
4545 if (!is_local)
4546 continue;
4547 /* Fall through. */
4548 case R_PPC_TLSGD:
23cedd1d
AM
4549 if (rel + 1 < relend
4550 && is_plt_seq_reloc (ELF32_R_TYPE (rel[1].r_info)))
4551 {
4552 if (pass != 0
4553 && ELF32_R_TYPE (rel[1].r_info) != R_PPC_PLTSEQ)
4554 {
4555 r_type = ELF32_R_TYPE (rel[1].r_info);
4556 r_symndx = ELF32_R_SYM (rel[1].r_info);
4557 if (r_symndx >= symtab_hdr->sh_info)
4558 {
4559 struct elf_link_hash_entry **sym_hashes;
4560
4561 sym_hashes = elf_sym_hashes (ibfd);
4562 h = sym_hashes[r_symndx - symtab_hdr->sh_info];
4563 while (h->root.type == bfd_link_hash_indirect
4564 || h->root.type == bfd_link_hash_warning)
4565 h = (struct elf_link_hash_entry *) h->root.u.i.link;
4566 if (h != NULL)
4567 {
4568 struct plt_entry *ent = NULL;
4569 bfd_vma addend = 0;
4570
4571 if (bfd_link_pic (info))
4572 addend = rel->r_addend;
4573 ent = find_plt_ent (&h->plt.plist,
4574 got2, addend);
4575 if (ent != NULL
4576 && ent->plt.refcount > 0)
4577 ent->plt.refcount -= 1;
4578 }
4579 }
4580 }
4581 continue;
4582 }
32af9f6e
AM
4583 expecting_tls_get_addr = 2;
4584 tls_set = 0;
4585 tls_clear = 0;
4586 break;
4587
252dcdf4
AM
4588 case R_PPC_TPREL16_HA:
4589 if (pass == 0)
4590 {
4591 unsigned char buf[4];
4592 unsigned int insn;
4593 bfd_vma off = rel->r_offset & ~3;
4594 if (!bfd_get_section_contents (ibfd, sec, buf,
4595 off, 4))
4596 {
4597 if (elf_section_data (sec)->relocs != relstart)
4598 free (relstart);
0a1b45a2 4599 return false;
252dcdf4
AM
4600 }
4601 insn = bfd_get_32 (ibfd, buf);
4602 /* addis rt,2,imm */
4603 if ((insn & ((0x3fu << 26) | 0x1f << 16))
4604 != ((15u << 26) | (2 << 16)))
4605 {
4606 /* xgettext:c-format */
4607 info->callbacks->minfo
4608 (_("%H: warning: %s unexpected insn %#x.\n"),
4609 ibfd, sec, off, "R_PPC_TPREL16_HA", insn);
4610 htab->do_tls_opt = 0;
4611 }
4612 }
4613 continue;
4614
4615 case R_PPC_TPREL16_HI:
4616 htab->do_tls_opt = 0;
4617 continue;
4618
b7fcf6f6 4619 default:
25dbc73a 4620 continue;
b7fcf6f6 4621 }
25dbc73a 4622
b7fcf6f6
AM
4623 if (pass == 0)
4624 {
727fc41e 4625 if (!expecting_tls_get_addr
9737e8af 4626 || !sec->nomark_tls_get_addr)
b7fcf6f6 4627 continue;
25dbc73a 4628
3a71aa26
AM
4629 if (rel + 1 < relend
4630 && branch_reloc_hash_match (ibfd, rel + 1,
4631 htab->tls_get_addr))
4632 continue;
25dbc73a 4633
b7fcf6f6
AM
4634 /* Uh oh, we didn't find the expected call. We
4635 could just mark this symbol to exclude it
4636 from tls optimization but it's safer to skip
663a1470 4637 the entire optimization. */
25f53a85 4638 info->callbacks->minfo (_("%H arg lost __tls_get_addr, "
663a1470
AM
4639 "TLS optimization disabled\n"),
4640 ibfd, sec, rel->r_offset);
4641 if (elf_section_data (sec)->relocs != relstart)
4642 free (relstart);
0a1b45a2 4643 return true;
b7fcf6f6 4644 }
25dbc73a 4645
b7fcf6f6
AM
4646 if (h != NULL)
4647 {
4648 tls_mask = &ppc_elf_hash_entry (h)->tls_mask;
4649 got_count = &h->got.refcount;
4650 }
4651 else
4652 {
b7fcf6f6 4653 bfd_signed_vma *lgot_refs;
e054468f 4654 struct plt_entry **local_plt;
bac3c8c5 4655 unsigned char *lgot_masks;
25dbc73a 4656
b7fcf6f6
AM
4657 lgot_refs = elf_local_got_refcounts (ibfd);
4658 if (lgot_refs == NULL)
4659 abort ();
e054468f
AM
4660 local_plt = (struct plt_entry **)
4661 (lgot_refs + symtab_hdr->sh_info);
bac3c8c5
AM
4662 lgot_masks = (unsigned char *)
4663 (local_plt + symtab_hdr->sh_info);
b7fcf6f6
AM
4664 tls_mask = &lgot_masks[r_symndx];
4665 got_count = &lgot_refs[r_symndx];
4666 }
25dbc73a 4667
37da22e5
AM
4668 /* If we don't have old-style __tls_get_addr calls
4669 without TLSGD/TLSLD marker relocs, and we haven't
4670 found a new-style __tls_get_addr call with a
4671 marker for this symbol, then we either have a
4672 broken object file or an -mlongcall style
4673 indirect call to __tls_get_addr without a marker.
4674 Disable optimization in this case. */
4675 if ((tls_clear & (TLS_GD | TLS_LD)) != 0
9737e8af 4676 && !sec->nomark_tls_get_addr
37da22e5
AM
4677 && ((*tls_mask & (TLS_TLS | TLS_MARK))
4678 != (TLS_TLS | TLS_MARK)))
4679 continue;
4680
7d04a20a 4681 if (expecting_tls_get_addr == 1 + !sec->nomark_tls_get_addr)
37da22e5
AM
4682 {
4683 struct plt_entry *ent;
4684 bfd_vma addend = 0;
4685
4686 if (bfd_link_pic (info)
23cedd1d
AM
4687 && (ELF32_R_TYPE (rel[1].r_info) == R_PPC_PLTREL24
4688 || ELF32_R_TYPE (rel[1].r_info) == R_PPC_PLTCALL))
37da22e5
AM
4689 addend = rel[1].r_addend;
4690 ent = find_plt_ent (&htab->tls_get_addr->plt.plist,
4691 got2, addend);
4692 if (ent != NULL && ent->plt.refcount > 0)
4693 ent->plt.refcount -= 1;
37da22e5 4694 }
7d04a20a
AM
4695 if (tls_clear == 0)
4696 continue;
37da22e5 4697
b7fcf6f6
AM
4698 if (tls_set == 0)
4699 {
4700 /* We managed to get rid of a got entry. */
4701 if (*got_count > 0)
4702 *got_count -= 1;
4703 }
25dbc73a 4704
b7fcf6f6
AM
4705 *tls_mask |= tls_set;
4706 *tls_mask &= ~tls_clear;
4707 }
25dbc73a 4708
b7fcf6f6
AM
4709 if (elf_section_data (sec)->relocs != relstart)
4710 free (relstart);
4711 }
b7fcf6f6 4712 }
0a1b45a2 4713 return true;
25dbc73a
AM
4714}
4715\f
287c7eaf
AM
4716/* Return true if we have dynamic relocs against H or any of its weak
4717 aliases, that apply to read-only sections. Cannot be used after
4718 size_dynamic_sections. */
4719
0a1b45a2 4720static bool
287c7eaf
AM
4721alias_readonly_dynrelocs (struct elf_link_hash_entry *h)
4722{
4723 struct ppc_elf_link_hash_entry *eh = ppc_elf_hash_entry (h);
4724 do
4725 {
5dbc8b37 4726 if (_bfd_elf_readonly_dynrelocs (&eh->elf))
0a1b45a2 4727 return true;
287c7eaf
AM
4728 eh = ppc_elf_hash_entry (eh->elf.u.alias);
4729 } while (eh != NULL && &eh->elf != h);
4730
0a1b45a2 4731 return false;
287c7eaf
AM
4732}
4733
4734/* Return whether H has pc-relative dynamic relocs. */
4735
0a1b45a2 4736static bool
287c7eaf
AM
4737pc_dynrelocs (struct elf_link_hash_entry *h)
4738{
4739 struct elf_dyn_relocs *p;
4740
190eb1dd 4741 for (p = h->dyn_relocs; p != NULL; p = p->next)
287c7eaf 4742 if (p->pc_count != 0)
0a1b45a2
AM
4743 return true;
4744 return false;
287c7eaf
AM
4745}
4746
25dbc73a
AM
4747/* Adjust a symbol defined by a dynamic object and referenced by a
4748 regular object. The current definition is in some section of the
4749 dynamic object, but we're not including those sections. We have to
4750 change the definition to something the rest of the link can
4751 understand. */
7fce784e 4752
0a1b45a2 4753static bool
25dbc73a
AM
4754ppc_elf_adjust_dynamic_symbol (struct bfd_link_info *info,
4755 struct elf_link_hash_entry *h)
4756{
4757 struct ppc_elf_link_hash_table *htab;
4758 asection *s;
7fce784e 4759
25dbc73a
AM
4760#ifdef DEBUG
4761 fprintf (stderr, "ppc_elf_adjust_dynamic_symbol called for %s\n",
4762 h->root.root.string);
4763#endif
252b5132 4764
25dbc73a
AM
4765 /* Make sure we know what is going on here. */
4766 htab = ppc_elf_hash_table (info);
4767 BFD_ASSERT (htab->elf.dynobj != NULL
4768 && (h->needs_plt
91e21fb7 4769 || h->type == STT_GNU_IFUNC
60d67dc8 4770 || h->is_weakalias
25dbc73a
AM
4771 || (h->def_dynamic
4772 && h->ref_regular
4773 && !h->def_regular)));
252b5132 4774
25dbc73a
AM
4775 /* Deal with function syms. */
4776 if (h->type == STT_FUNC
e054468f 4777 || h->type == STT_GNU_IFUNC
25dbc73a
AM
4778 || h->needs_plt)
4779 {
0a1b45a2 4780 bool local = (SYMBOL_CALLS_LOCAL (info, h)
529fe20e 4781 || UNDEFWEAK_NO_DYNAMIC_RELOC (info, h));
287c7eaf
AM
4782 /* Discard dyn_relocs when non-pic if we've decided that a
4783 function symbol is local. */
4784 if (!bfd_link_pic (info) && local)
190eb1dd 4785 h->dyn_relocs = NULL;
529fe20e 4786
25dbc73a
AM
4787 /* Clear procedure linkage table information for any symbol that
4788 won't need a .plt entry. */
a6aa5195
AM
4789 struct plt_entry *ent;
4790 for (ent = h->plt.plist; ent != NULL; ent = ent->next)
4791 if (ent->plt.refcount > 0)
4792 break;
4793 if (ent == NULL
2d7ad24e
AM
4794 || (h->type != STT_GNU_IFUNC
4795 && local
3e04d765
AM
4796 && (htab->can_convert_all_inline_plt
4797 || (ppc_elf_hash_entry (h)->tls_mask
4798 & (TLS_TLS | PLT_KEEP)) != PLT_KEEP)))
252b5132 4799 {
25dbc73a 4800 /* A PLT entry is not required/allowed when:
252b5132 4801
25dbc73a
AM
4802 1. We are not using ld.so; because then the PLT entry
4803 can't be set up, so we can't use one. In this case,
4804 ppc_elf_adjust_dynamic_symbol won't even be called.
252b5132 4805
25dbc73a
AM
4806 2. GC has rendered the entry unused.
4807
4808 3. We know for certain that a call to this symbol
4809 will go to this object, or will remain undefined. */
a6aa5195 4810 h->plt.plist = NULL;
25dbc73a 4811 h->needs_plt = 0;
d1eca1e4 4812 h->pointer_equality_needed = 0;
25dbc73a 4813 }
625af618
AM
4814 else
4815 {
d1eca1e4
AM
4816 /* Taking a function's address in a read/write section
4817 doesn't require us to define the function symbol in the
1009ef28 4818 executable on a plt call stub. A dynamic reloc can
f0158f44
AM
4819 be used instead, giving better runtime performance.
4820 (Calls via that function pointer don't need to bounce
4821 through the plt call stub.) Similarly, use a dynamic
4822 reloc for a weak reference when possible, allowing the
4823 resolution of the symbol to be set at load time rather
4824 than link time. */
4825 if ((h->pointer_equality_needed
3988aed5
AM
4826 || (h->non_got_ref
4827 && !h->ref_regular_nonweak
4828 && !UNDEFWEAK_NO_DYNAMIC_RELOC (info, h)))
90c14f0c 4829 && htab->elf.target_os != is_vxworks
1009ef28 4830 && !ppc_elf_hash_entry (h)->has_sda_refs
5dbc8b37 4831 && !_bfd_elf_readonly_dynrelocs (h))
d1eca1e4
AM
4832 {
4833 h->pointer_equality_needed = 0;
04383fd1
AM
4834 /* If we haven't seen a branch reloc and the symbol
4835 isn't an ifunc then we don't need a plt entry. */
4836 if (!h->needs_plt && h->type != STT_GNU_IFUNC)
3988aed5 4837 h->plt.plist = NULL;
d1eca1e4 4838 }
287c7eaf 4839 else if (!bfd_link_pic (info))
529fe20e
AM
4840 /* We are going to be defining the function symbol on the
4841 plt stub, so no dyn_relocs needed when non-pic. */
190eb1dd 4842 h->dyn_relocs = NULL;
625af618 4843 }
d3e454b9 4844 h->protected_def = 0;
3988aed5 4845 /* Function symbols can't have copy relocs. */
0a1b45a2 4846 return true;
252b5132 4847 }
25dbc73a 4848 else
a6aa5195 4849 h->plt.plist = NULL;
252b5132 4850
25dbc73a
AM
4851 /* If this is a weak symbol, and there is a real definition, the
4852 processor independent code will have arranged for us to see the
4853 real definition first, and we can just use the same value. */
60d67dc8 4854 if (h->is_weakalias)
252b5132 4855 {
60d67dc8
AM
4856 struct elf_link_hash_entry *def = weakdef (h);
4857 BFD_ASSERT (def->root.type == bfd_link_hash_defined);
4858 h->root.u.def.section = def->root.u.def.section;
4859 h->root.u.def.value = def->root.u.def.value;
4a7e5234
AM
4860 if (def->root.u.def.section == htab->elf.sdynbss
4861 || def->root.u.def.section == htab->elf.sdynrelro
4862 || def->root.u.def.section == htab->dynsbss)
190eb1dd 4863 h->dyn_relocs = NULL;
0a1b45a2 4864 return true;
25dbc73a 4865 }
dc810e39 4866
25dbc73a
AM
4867 /* This is a reference to a symbol defined by a dynamic object which
4868 is not a function. */
252b5132 4869
25dbc73a
AM
4870 /* If we are creating a shared library, we must presume that the
4871 only references to the symbol are via the global offset table.
4872 For such cases we need not do anything here; the relocations will
4873 be handled correctly by relocate_section. */
0e1862bb 4874 if (bfd_link_pic (info))
d3e454b9
AM
4875 {
4876 h->protected_def = 0;
0a1b45a2 4877 return true;
d3e454b9 4878 }
252b5132 4879
25dbc73a
AM
4880 /* If there are no references to this symbol that do not use the
4881 GOT, we don't need to generate a copy reloc. */
4882 if (!h->non_got_ref)
d3e454b9
AM
4883 {
4884 h->protected_def = 0;
0a1b45a2 4885 return true;
d3e454b9
AM
4886 }
4887
4888 /* Protected variables do not work with .dynbss. The copy in
4889 .dynbss won't be used by the shared library with the protected
4890 definition for the variable. Editing to PIC, or text relocations
4891 are preferable to an incorrect program. */
4892 if (h->protected_def)
4893 {
4894 if (ELIMINATE_COPY_RELOCS
4895 && ppc_elf_hash_entry (h)->has_addr16_ha
4896 && ppc_elf_hash_entry (h)->has_addr16_lo
4897 && htab->params->pic_fixup == 0
4898 && info->disable_target_specific_optimizations <= 1)
4899 htab->params->pic_fixup = 1;
0a1b45a2 4900 return true;
d3e454b9 4901 }
25dbc73a 4902
a127494f
AM
4903 /* If -z nocopyreloc was given, we won't generate them either. */
4904 if (info->nocopyreloc)
0a1b45a2 4905 return true;
a127494f 4906
dce2246a 4907 /* If we don't find any dynamic relocs in read-only sections, then
cfd2c773
NS
4908 we'll be keeping the dynamic relocs and avoiding the copy reloc.
4909 We can't do this if there are any small data relocations. This
4910 doesn't work on VxWorks, where we can not have dynamic
4911 relocations (other than copy and jump slot relocations) in an
4912 executable. */
4dc4a9a5 4913 if (ELIMINATE_COPY_RELOCS
cfd2c773 4914 && !ppc_elf_hash_entry (h)->has_sda_refs
90c14f0c 4915 && htab->elf.target_os != is_vxworks
625af618 4916 && !h->def_regular
287c7eaf 4917 && !alias_readonly_dynrelocs (h))
0a1b45a2 4918 return true;
252b5132 4919
25dbc73a
AM
4920 /* We must allocate the symbol in our .dynbss section, which will
4921 become part of the .bss section of the executable. There will be
4922 an entry for this symbol in the .dynsym section. The dynamic
4923 object will contain position independent code, so all references
4924 from the dynamic object to this symbol will go through the global
4925 offset table. The dynamic linker will use the .dynsym entry to
4926 determine the address it must put in the global offset table, so
4927 both the dynamic object and the regular object will refer to the
4928 same memory location for the variable.
4929
4dc4a9a5
DJ
4930 Of course, if the symbol is referenced using SDAREL relocs, we
4931 must instead allocate it in .sbss. */
4dc4a9a5 4932 if (ppc_elf_hash_entry (h)->has_sda_refs)
25dbc73a 4933 s = htab->dynsbss;
5474d94f
AM
4934 else if ((h->root.u.def.section->flags & SEC_READONLY) != 0)
4935 s = htab->elf.sdynrelro;
25dbc73a 4936 else
9d19e4fd 4937 s = htab->elf.sdynbss;
25dbc73a
AM
4938 BFD_ASSERT (s != NULL);
4939
1d7e9d18 4940 if ((h->root.u.def.section->flags & SEC_ALLOC) != 0 && h->size != 0)
25dbc73a
AM
4941 {
4942 asection *srel;
4943
4a7e5234
AM
4944 /* We must generate a R_PPC_COPY reloc to tell the dynamic
4945 linker to copy the initial value out of the dynamic object
4946 and into the runtime process image. */
4dc4a9a5 4947 if (ppc_elf_hash_entry (h)->has_sda_refs)
25dbc73a 4948 srel = htab->relsbss;
5474d94f
AM
4949 else if ((h->root.u.def.section->flags & SEC_READONLY) != 0)
4950 srel = htab->elf.sreldynrelro;
25dbc73a 4951 else
9d19e4fd 4952 srel = htab->elf.srelbss;
25dbc73a
AM
4953 BFD_ASSERT (srel != NULL);
4954 srel->size += sizeof (Elf32_External_Rela);
4955 h->needs_copy = 1;
4956 }
7619e7c7 4957
529fe20e 4958 /* We no longer want dyn_relocs. */
190eb1dd 4959 h->dyn_relocs = NULL;
6cabe1ea 4960 return _bfd_elf_adjust_dynamic_copy (info, h, s);
25dbc73a
AM
4961}
4962\f
ac39eb42
AM
4963/* Generate a symbol to mark plt call stubs. For non-PIC code the sym is
4964 xxxxxxxx.plt_call32.<callee> where xxxxxxxx is a hex number, usually 0,
4965 specifying the addend on the plt relocation. For -fpic code, the sym
4966 is xxxxxxxx.plt_pic32.<callee>, and for -fPIC
4967 xxxxxxxx.got2.plt_pic32.<callee>. */
0ba07910 4968
0a1b45a2 4969static bool
0ba07910
AM
4970add_stub_sym (struct plt_entry *ent,
4971 struct elf_link_hash_entry *h,
ac39eb42 4972 struct bfd_link_info *info)
0ba07910
AM
4973{
4974 struct elf_link_hash_entry *sh;
4975 size_t len1, len2, len3;
4976 char *name;
ac39eb42
AM
4977 const char *stub;
4978 struct ppc_elf_link_hash_table *htab = ppc_elf_hash_table (info);
4979
0e1862bb 4980 if (bfd_link_pic (info))
ac39eb42
AM
4981 stub = ".plt_pic32.";
4982 else
4983 stub = ".plt_call32.";
0ba07910
AM
4984
4985 len1 = strlen (h->root.root.string);
ac39eb42 4986 len2 = strlen (stub);
0ba07910
AM
4987 len3 = 0;
4988 if (ent->sec)
4989 len3 = strlen (ent->sec->name);
ac39eb42 4990 name = bfd_malloc (len1 + len2 + len3 + 9);
0ba07910 4991 if (name == NULL)
0a1b45a2 4992 return false;
0ba07910
AM
4993 sprintf (name, "%08x", (unsigned) ent->addend & 0xffffffff);
4994 if (ent->sec)
4995 memcpy (name + 8, ent->sec->name, len3);
ac39eb42
AM
4996 memcpy (name + 8 + len3, stub, len2);
4997 memcpy (name + 8 + len3 + len2, h->root.root.string, len1 + 1);
0a1b45a2 4998 sh = elf_link_hash_lookup (&htab->elf, name, true, false, false);
0ba07910 4999 if (sh == NULL)
0a1b45a2 5000 return false;
0ba07910
AM
5001 if (sh->root.type == bfd_link_hash_new)
5002 {
5003 sh->root.type = bfd_link_hash_defined;
5004 sh->root.u.def.section = htab->glink;
5005 sh->root.u.def.value = ent->glink_offset;
5006 sh->ref_regular = 1;
5007 sh->def_regular = 1;
5008 sh->ref_regular_nonweak = 1;
5009 sh->forced_local = 1;
5010 sh->non_elf = 0;
2ec55de3 5011 sh->root.linker_def = 1;
0ba07910 5012 }
0a1b45a2 5013 return true;
0ba07910
AM
5014}
5015
3b36f7e6
AM
5016/* Allocate NEED contiguous space in .got, and return the offset.
5017 Handles allocation of the got header when crossing 32k. */
5018
5019static bfd_vma
5020allocate_got (struct ppc_elf_link_hash_table *htab, unsigned int need)
5021{
5022 bfd_vma where;
4a3dc543 5023 unsigned int max_before_header;
3b36f7e6 5024
4a3dc543 5025 if (htab->plt_type == PLT_VXWORKS)
9d8504b1 5026 {
ce558b89
AM
5027 where = htab->elf.sgot->size;
5028 htab->elf.sgot->size += need;
9d8504b1 5029 }
3b36f7e6
AM
5030 else
5031 {
4a3dc543
RS
5032 max_before_header = htab->plt_type == PLT_NEW ? 32768 : 32764;
5033 if (need <= htab->got_gap)
3b36f7e6 5034 {
4a3dc543
RS
5035 where = max_before_header - htab->got_gap;
5036 htab->got_gap -= need;
5037 }
5038 else
5039 {
ce558b89
AM
5040 if (htab->elf.sgot->size + need > max_before_header
5041 && htab->elf.sgot->size <= max_before_header)
4a3dc543 5042 {
ce558b89
AM
5043 htab->got_gap = max_before_header - htab->elf.sgot->size;
5044 htab->elf.sgot->size = max_before_header + htab->got_header_size;
4a3dc543 5045 }
ce558b89
AM
5046 where = htab->elf.sgot->size;
5047 htab->elf.sgot->size += need;
3b36f7e6 5048 }
3b36f7e6
AM
5049 }
5050 return where;
5051}
5052
f15d0b54
AM
5053/* Calculate size of GOT entries for symbol given its TLS_MASK.
5054 TLS_LD is excluded because those go in a special GOT slot. */
5055
5056static inline unsigned int
5057got_entries_needed (int tls_mask)
5058{
5059 unsigned int need;
5060 if ((tls_mask & TLS_TLS) == 0)
5061 need = 4;
5062 else
5063 {
5064 need = 0;
5065 if ((tls_mask & TLS_GD) != 0)
5066 need += 8;
b00a0a86 5067 if ((tls_mask & (TLS_TPREL | TLS_GDIE)) != 0)
f15d0b54
AM
5068 need += 4;
5069 if ((tls_mask & TLS_DTPREL) != 0)
5070 need += 4;
5071 }
5072 return need;
5073}
5074
46434633 5075/* If H is undefined, make it dynamic if that makes sense. */
f0158f44 5076
0a1b45a2 5077static bool
46434633
AM
5078ensure_undef_dynamic (struct bfd_link_info *info,
5079 struct elf_link_hash_entry *h)
f0158f44
AM
5080{
5081 struct elf_link_hash_table *htab = elf_hash_table (info);
5082
5083 if (htab->dynamic_sections_created
46434633
AM
5084 && ((info->dynamic_undefined_weak != 0
5085 && h->root.type == bfd_link_hash_undefweak)
5086 || h->root.type == bfd_link_hash_undefined)
f0158f44
AM
5087 && h->dynindx == -1
5088 && !h->forced_local
5089 && ELF_ST_VISIBILITY (h->other) == STV_DEFAULT)
5090 return bfd_elf_link_record_dynamic_symbol (info, h);
0a1b45a2 5091 return true;
f0158f44
AM
5092}
5093
30845f11
AM
5094/* Choose whether to use htab->iplt or htab->pltlocal rather than the
5095 usual htab->elf.splt section for a PLT entry. */
5096
5097static inline
0a1b45a2 5098bool use_local_plt (struct bfd_link_info *info,
30845f11
AM
5099 struct elf_link_hash_entry *h)
5100{
5101 return (h == NULL
5102 || h->dynindx == -1
5103 || !elf_hash_table (info)->dynamic_sections_created);
5104}
5105
25dbc73a 5106/* Allocate space in associated reloc sections for dynamic relocs. */
252b5132 5107
0a1b45a2 5108static bool
25dbc73a 5109allocate_dynrelocs (struct elf_link_hash_entry *h, void *inf)
252b5132 5110{
25dbc73a
AM
5111 struct bfd_link_info *info = inf;
5112 struct ppc_elf_link_hash_entry *eh;
7619e7c7 5113 struct ppc_elf_link_hash_table *htab;
6061a67d 5114 struct elf_dyn_relocs *p;
252b5132 5115
25dbc73a 5116 if (h->root.type == bfd_link_hash_indirect)
0a1b45a2 5117 return true;
252b5132 5118
7619e7c7 5119 htab = ppc_elf_hash_table (info);
25dbc73a 5120 eh = (struct ppc_elf_link_hash_entry *) h;
d3e454b9
AM
5121 if (eh->elf.got.refcount > 0
5122 || (ELIMINATE_COPY_RELOCS
5123 && !eh->elf.def_regular
5124 && eh->elf.protected_def
5125 && eh->has_addr16_ha
5126 && eh->has_addr16_lo
5127 && htab->params->pic_fixup > 0))
25dbc73a 5128 {
46434633
AM
5129 /* Make sure this symbol is output as a dynamic symbol. */
5130 if (!ensure_undef_dynamic (info, &eh->elf))
0a1b45a2 5131 return false;
252b5132 5132
ae337712
AM
5133 unsigned int need = got_entries_needed (eh->tls_mask);
5134 unsigned int rel_need = need * sizeof (Elf32_External_Rela) / 4;
37da22e5 5135 if ((eh->tls_mask & (TLS_TLS | TLS_LD)) == (TLS_TLS | TLS_LD))
25dbc73a 5136 {
f749f26e 5137 if (SYMBOL_REFERENCES_LOCAL (info, &eh->elf))
f15d0b54
AM
5138 /* We'll just use htab->tlsld_got.offset. This should
5139 always be the case. It's a little odd if we have
5140 a local dynamic reloc against a non-local symbol. */
5141 htab->tlsld_got.refcount += 1;
5142 else
ae337712
AM
5143 {
5144 need += 8;
5145 rel_need += sizeof (Elf32_External_Rela);
5146 }
d6e14abc 5147 }
d6e14abc
AM
5148 if (need == 0)
5149 eh->elf.got.offset = (bfd_vma) -1;
5150 else
5151 {
3b36f7e6 5152 eh->elf.got.offset = allocate_got (htab, need);
f749f26e
AM
5153 if (((bfd_link_pic (info)
5154 && !((eh->tls_mask & TLS_TLS) != 0
5155 && bfd_link_executable (info)
7a9361c0
AM
5156 && SYMBOL_REFERENCES_LOCAL (info, &eh->elf))
5157 && !bfd_is_abs_symbol (&h->root))
f0158f44
AM
5158 || (htab->elf.dynamic_sections_created
5159 && eh->elf.dynindx != -1
5160 && !SYMBOL_REFERENCES_LOCAL (info, &eh->elf)))
21d68fcd 5161 && !UNDEFWEAK_NO_DYNAMIC_RELOC (info, &eh->elf))
252b5132 5162 {
f15d0b54 5163 asection *rsec;
f15d0b54 5164
f15d0b54 5165 rsec = htab->elf.srelgot;
0bed072f 5166 if (eh->elf.type == STT_GNU_IFUNC)
ce558b89 5167 rsec = htab->elf.irelplt;
ae337712 5168 rsec->size += rel_need;
252b5132 5169 }
25dbc73a
AM
5170 }
5171 }
5172 else
5173 eh->elf.got.offset = (bfd_vma) -1;
252b5132 5174
954b63d4
AM
5175 /* If no dynamic sections we can't have dynamic relocs, except for
5176 IFUNCs which are handled even in static executables. */
f0158f44
AM
5177 if (!htab->elf.dynamic_sections_created
5178 && h->type != STT_GNU_IFUNC)
190eb1dd 5179 h->dyn_relocs = NULL;
f0158f44 5180
529fe20e
AM
5181 /* Discard relocs on undefined symbols that must be local. */
5182 else if (h->root.type == bfd_link_hash_undefined
5183 && ELF_ST_VISIBILITY (h->other) != STV_DEFAULT)
190eb1dd 5184 h->dyn_relocs = NULL;
529fe20e
AM
5185
5186 /* Also discard relocs on undefined weak syms with non-default
5187 visibility, or when dynamic_undefined_weak says so. */
5188 else if (UNDEFWEAK_NO_DYNAMIC_RELOC (info, h))
190eb1dd 5189 h->dyn_relocs = NULL;
529fe20e 5190
190eb1dd 5191 if (h->dyn_relocs == NULL)
287c7eaf 5192 ;
252b5132 5193
25dbc73a
AM
5194 /* In the shared -Bsymbolic case, discard space allocated for
5195 dynamic pc-relative relocs against symbols which turn out to be
5196 defined in regular objects. For the normal shared case, discard
5197 space for relocs that have become local due to symbol visibility
5198 changes. */
f0158f44 5199 else if (bfd_link_pic (info))
25dbc73a
AM
5200 {
5201 /* Relocs that use pc_count are those that appear on a call insn,
1d483afe 5202 or certain REL relocs (see must_be_dyn_reloc) that can be
25dbc73a
AM
5203 generated via assembly. We want calls to protected symbols to
5204 resolve directly to the function rather than going via the plt.
5205 If people want function pointer comparisons to work as expected
5206 then they should avoid writing weird assembly. */
529fe20e 5207 if (SYMBOL_CALLS_LOCAL (info, h))
25dbc73a 5208 {
6061a67d 5209 struct elf_dyn_relocs **pp;
25dbc73a 5210
190eb1dd 5211 for (pp = &h->dyn_relocs; (p = *pp) != NULL; )
252b5132 5212 {
25dbc73a
AM
5213 p->count -= p->pc_count;
5214 p->pc_count = 0;
5215 if (p->count == 0)
5216 *pp = p->next;
5217 else
5218 pp = &p->next;
252b5132 5219 }
25dbc73a 5220 }
252b5132 5221
90c14f0c 5222 if (htab->elf.target_os == is_vxworks)
3348747a 5223 {
6061a67d 5224 struct elf_dyn_relocs **pp;
3348747a 5225
190eb1dd 5226 for (pp = &h->dyn_relocs; (p = *pp) != NULL; )
3348747a
NS
5227 {
5228 if (strcmp (p->sec->output_section->name, ".tls_vars") == 0)
5229 *pp = p->next;
5230 else
5231 pp = &p->next;
5232 }
5233 }
5234
190eb1dd 5235 if (h->dyn_relocs != NULL)
25dbc73a 5236 {
46434633
AM
5237 /* Make sure this symbol is output as a dynamic symbol. */
5238 if (!ensure_undef_dynamic (info, h))
0a1b45a2 5239 return false;
25dbc73a
AM
5240 }
5241 }
5242 else if (ELIMINATE_COPY_RELOCS)
5243 {
f0158f44 5244 /* For the non-pic case, discard space for relocs against
25dbc73a
AM
5245 symbols which turn out to need copy relocs or are not
5246 dynamic. */
49160308
AM
5247 if ((h->dynamic_adjusted
5248 || (h->ref_regular
5249 && h->root.type == bfd_link_hash_undefweak
5250 && (info->dynamic_undefined_weak > 0
5251 || !_bfd_elf_readonly_dynrelocs (h))))
d3e454b9 5252 && !h->def_regular
529fe20e 5253 && !ELF_COMMON_DEF_P (h)
d3e454b9
AM
5254 && !(h->protected_def
5255 && eh->has_addr16_ha
5256 && eh->has_addr16_lo
5257 && htab->params->pic_fixup > 0))
25dbc73a 5258 {
46434633
AM
5259 /* Make sure this symbol is output as a dynamic symbol. */
5260 if (!ensure_undef_dynamic (info, h))
0a1b45a2 5261 return false;
7619e7c7 5262
f0158f44 5263 if (h->dynindx == -1)
190eb1dd 5264 h->dyn_relocs = NULL;
25dbc73a 5265 }
f0158f44 5266 else
190eb1dd 5267 h->dyn_relocs = NULL;
25dbc73a 5268 }
252b5132 5269
f0158f44 5270 /* Allocate space. */
190eb1dd 5271 for (p = h->dyn_relocs; p != NULL; p = p->next)
365bf300
AM
5272 if (!discarded_section (p->sec))
5273 {
5274 asection *sreloc = elf_section_data (p->sec)->sreloc;
5275 if (eh->elf.type == STT_GNU_IFUNC)
5276 sreloc = htab->elf.irelplt;
5277 sreloc->size += p->count * sizeof (Elf32_External_Rela);
5278 }
252b5132 5279
2d7ad24e
AM
5280 /* Handle PLT relocs. Done last, after dynindx has settled.
5281 We might need a PLT entry when the symbol
5282 a) is dynamic, or
5283 b) is an ifunc, or
5284 c) has plt16 relocs and has been processed by adjust_dynamic_symbol, or
5285 d) has plt16 relocs and we are linking statically. */
30845f11 5286 if ((htab->elf.dynamic_sections_created && h->dynindx != -1)
2d7ad24e
AM
5287 || h->type == STT_GNU_IFUNC
5288 || (h->needs_plt && h->dynamic_adjusted)
5289 || (h->needs_plt
5290 && h->def_regular
5291 && !htab->elf.dynamic_sections_created
3e04d765 5292 && !htab->can_convert_all_inline_plt
2d7ad24e
AM
5293 && (ppc_elf_hash_entry (h)->tls_mask
5294 & (TLS_TLS | PLT_KEEP)) == PLT_KEEP))
f0158f44
AM
5295 {
5296 struct plt_entry *ent;
0a1b45a2 5297 bool doneone = false;
2d7ad24e 5298 bfd_vma plt_offset = 0, glink_offset = (bfd_vma) -1;
f0158f44
AM
5299
5300 for (ent = h->plt.plist; ent != NULL; ent = ent->next)
5301 if (ent->plt.refcount > 0)
5302 {
b2936612
AM
5303 asection *s;
5304 bool dyn;
f0158f44 5305
b2936612
AM
5306 if (!ensure_undef_dynamic (info, h))
5307 return false;
5308
5309 dyn = !use_local_plt (info, h);
5310 s = htab->elf.splt;
f0158f44 5311 if (!dyn)
2d7ad24e
AM
5312 {
5313 if (h->type == STT_GNU_IFUNC)
5314 s = htab->elf.iplt;
5315 else
5316 s = htab->pltlocal;
5317 }
f0158f44
AM
5318
5319 if (htab->plt_type == PLT_NEW || !dyn)
5320 {
5321 if (!doneone)
5322 {
5323 plt_offset = s->size;
5324 s->size += 4;
5325 }
5326 ent->plt.offset = plt_offset;
5327
2d7ad24e
AM
5328 if (s == htab->pltlocal)
5329 ent->glink_offset = glink_offset;
5330 else
f0158f44 5331 {
2d7ad24e
AM
5332 s = htab->glink;
5333 if (!doneone || bfd_link_pic (info))
5334 {
5335 glink_offset = s->size;
5336 s->size += GLINK_ENTRY_SIZE (htab, h);
5337 }
5338 if (!doneone
5339 && !bfd_link_pic (info)
5340 && h->def_dynamic
5341 && !h->def_regular)
5342 {
5343 h->root.u.def.section = s;
5344 h->root.u.def.value = glink_offset;
5345 }
5346 ent->glink_offset = glink_offset;
f0158f44 5347
2d7ad24e
AM
5348 if (htab->params->emit_stub_syms
5349 && !add_stub_sym (ent, h, info))
0a1b45a2 5350 return false;
2d7ad24e 5351 }
f0158f44
AM
5352 }
5353 else
5354 {
5355 if (!doneone)
5356 {
5357 /* If this is the first .plt entry, make room
5358 for the special first entry. */
5359 if (s->size == 0)
5360 s->size += htab->plt_initial_entry_size;
5361
5362 /* The PowerPC PLT is actually composed of two
5363 parts, the first part is 2 words (for a load
5364 and a jump), and then there is a remaining
5365 word available at the end. */
5366 plt_offset = (htab->plt_initial_entry_size
5367 + (htab->plt_slot_size
5368 * ((s->size
5369 - htab->plt_initial_entry_size)
5370 / htab->plt_entry_size)));
5371
5372 /* If this symbol is not defined in a regular
5373 file, and we are not generating a shared
5374 library, then set the symbol to this location
5375 in the .plt. This is to avoid text
5376 relocations, and is required to make
5377 function pointers compare as equal between
5378 the normal executable and the shared library. */
5379 if (! bfd_link_pic (info)
5380 && h->def_dynamic
5381 && !h->def_regular)
5382 {
5383 h->root.u.def.section = s;
5384 h->root.u.def.value = plt_offset;
5385 }
5386
5387 /* Make room for this entry. */
5388 s->size += htab->plt_entry_size;
5389 /* After the 8192nd entry, room for two entries
5390 is allocated. */
5391 if (htab->plt_type == PLT_OLD
5392 && (s->size - htab->plt_initial_entry_size)
5393 / htab->plt_entry_size
5394 > PLT_NUM_SINGLE_ENTRIES)
5395 s->size += htab->plt_entry_size;
5396 }
5397 ent->plt.offset = plt_offset;
5398 }
5399
5400 /* We also need to make an entry in the .rela.plt section. */
5401 if (!doneone)
5402 {
5403 if (!dyn)
2d7ad24e
AM
5404 {
5405 if (h->type == STT_GNU_IFUNC)
5406 {
5407 s = htab->elf.irelplt;
5408 s->size += sizeof (Elf32_External_Rela);
5409 }
5410 else if (bfd_link_pic (info))
5411 {
5412 s = htab->relpltlocal;
5413 s->size += sizeof (Elf32_External_Rela);
5414 }
5415 }
f0158f44
AM
5416 else
5417 {
5418 htab->elf.srelplt->size += sizeof (Elf32_External_Rela);
5419
5420 if (htab->plt_type == PLT_VXWORKS)
5421 {
5422 /* Allocate space for the unloaded relocations. */
5423 if (!bfd_link_pic (info)
5424 && htab->elf.dynamic_sections_created)
5425 {
5426 if (ent->plt.offset
5427 == (bfd_vma) htab->plt_initial_entry_size)
5428 {
5429 htab->srelplt2->size
5430 += (sizeof (Elf32_External_Rela)
5431 * VXWORKS_PLTRESOLVE_RELOCS);
5432 }
5433
5434 htab->srelplt2->size
5435 += (sizeof (Elf32_External_Rela)
5436 * VXWORKS_PLT_NON_JMP_SLOT_RELOCS);
5437 }
5438
5439 /* Every PLT entry has an associated GOT entry in
5440 .got.plt. */
5441 htab->elf.sgotplt->size += 4;
5442 }
5443 }
0a1b45a2 5444 doneone = true;
f0158f44
AM
5445 }
5446 }
5447 else
5448 ent->plt.offset = (bfd_vma) -1;
5449
5450 if (!doneone)
5451 {
5452 h->plt.plist = NULL;
5453 h->needs_plt = 0;
5454 }
5455 }
5456 else
5457 {
5458 h->plt.plist = NULL;
5459 h->needs_plt = 0;
5460 }
5461
0a1b45a2 5462 return true;
25dbc73a 5463}
7619e7c7 5464
6177242a
AM
5465static const unsigned char glink_eh_frame_cie[] =
5466{
5467 0, 0, 0, 16, /* length. */
5468 0, 0, 0, 0, /* id. */
5469 1, /* CIE version. */
5470 'z', 'R', 0, /* Augmentation string. */
5471 4, /* Code alignment. */
5472 0x7c, /* Data alignment. */
5473 65, /* RA reg. */
5474 1, /* Augmentation size. */
5475 DW_EH_PE_pcrel | DW_EH_PE_sdata4, /* FDE encoding. */
5476 DW_CFA_def_cfa, 1, 0 /* def_cfa: r1 offset 0. */
5477};
5478
25dbc73a
AM
5479/* Set the sizes of the dynamic sections. */
5480
0a1b45a2 5481static bool
af969b14
AM
5482ppc_elf_late_size_sections (bfd *output_bfd,
5483 struct bfd_link_info *info)
25dbc73a
AM
5484{
5485 struct ppc_elf_link_hash_table *htab;
5486 asection *s;
0a1b45a2 5487 bool relocs;
25dbc73a 5488 bfd *ibfd;
7fce784e 5489
252b5132 5490#ifdef DEBUG
af969b14 5491 fprintf (stderr, "ppc_elf_late_size_sections called\n");
252b5132 5492#endif
252b5132 5493
25dbc73a 5494 htab = ppc_elf_hash_table (info);
af969b14
AM
5495 if (htab->elf.dynobj == NULL)
5496 return true;
252b5132 5497
25dbc73a
AM
5498 if (elf_hash_table (info)->dynamic_sections_created)
5499 {
5500 /* Set the contents of the .interp section to the interpreter. */
9b8b325a 5501 if (bfd_link_executable (info) && !info->nointerp)
25dbc73a 5502 {
3d4d4302 5503 s = bfd_get_linker_section (htab->elf.dynobj, ".interp");
25dbc73a
AM
5504 BFD_ASSERT (s != NULL);
5505 s->size = sizeof ELF_DYNAMIC_INTERPRETER;
5506 s->contents = (unsigned char *) ELF_DYNAMIC_INTERPRETER;
5507 }
5508 }
252b5132 5509
4a3dc543 5510 if (htab->plt_type == PLT_OLD)
d7128ce4 5511 htab->got_header_size = 16;
4a3dc543 5512 else if (htab->plt_type == PLT_NEW)
d7128ce4 5513 htab->got_header_size = 12;
252b5132 5514
25dbc73a
AM
5515 /* Set up .got offsets for local syms, and space for local dynamic
5516 relocs. */
c72f2fb2 5517 for (ibfd = info->input_bfds; ibfd != NULL; ibfd = ibfd->link.next)
25dbc73a
AM
5518 {
5519 bfd_signed_vma *local_got;
5520 bfd_signed_vma *end_local_got;
e054468f
AM
5521 struct plt_entry **local_plt;
5522 struct plt_entry **end_local_plt;
25dbc73a
AM
5523 char *lgot_masks;
5524 bfd_size_type locsymcount;
5525 Elf_Internal_Shdr *symtab_hdr;
7a9361c0
AM
5526 Elf_Internal_Sym *local_syms;
5527 Elf_Internal_Sym *isym;
7fce784e 5528
0c8d6e5c 5529 if (!is_ppc_elf (ibfd))
25dbc73a 5530 continue;
7fce784e 5531
25dbc73a
AM
5532 for (s = ibfd->sections; s != NULL; s = s->next)
5533 {
f95f8542 5534 struct ppc_dyn_relocs *p;
252b5132 5535
f95f8542 5536 for (p = ((struct ppc_dyn_relocs *)
25dbc73a
AM
5537 elf_section_data (s)->local_dynrel);
5538 p != NULL;
5539 p = p->next)
5540 {
365bf300 5541 if (discarded_section (p->sec))
25dbc73a
AM
5542 {
5543 /* Input section has been discarded, either because
5544 it is a copy of a linkonce section or due to
5545 linker script /DISCARD/, so we'll be discarding
5546 the relocs too. */
7fce784e 5547 }
90c14f0c 5548 else if (htab->elf.target_os == is_vxworks
3348747a
NS
5549 && strcmp (p->sec->output_section->name,
5550 ".tls_vars") == 0)
5551 {
5552 /* Relocations in vxworks .tls_vars sections are
5553 handled specially by the loader. */
5554 }
25dbc73a 5555 else if (p->count != 0)
7fce784e 5556 {
25f23106 5557 asection *sreloc = elf_section_data (p->sec)->sreloc;
f95f8542 5558 if (p->ifunc)
ce558b89 5559 sreloc = htab->elf.irelplt;
25f23106 5560 sreloc->size += p->count * sizeof (Elf32_External_Rela);
25dbc73a
AM
5561 if ((p->sec->output_section->flags
5562 & (SEC_READONLY | SEC_ALLOC))
5563 == (SEC_READONLY | SEC_ALLOC))
0caf6c82
L
5564 {
5565 info->flags |= DF_TEXTREL;
871b3ab2 5566 info->callbacks->minfo (_("%pB: dynamic relocation in read-only section `%pA'\n"),
0caf6c82
L
5567 p->sec->owner, p->sec);
5568 }
7fce784e 5569 }
252b5132 5570 }
252b5132 5571 }
252b5132 5572
25dbc73a
AM
5573 local_got = elf_local_got_refcounts (ibfd);
5574 if (!local_got)
5575 continue;
252b5132 5576
0ffa91dd 5577 symtab_hdr = &elf_symtab_hdr (ibfd);
25dbc73a
AM
5578 locsymcount = symtab_hdr->sh_info;
5579 end_local_got = local_got + locsymcount;
e054468f
AM
5580 local_plt = (struct plt_entry **) end_local_got;
5581 end_local_plt = local_plt + locsymcount;
5582 lgot_masks = (char *) end_local_plt;
7a9361c0
AM
5583 local_syms = (Elf_Internal_Sym *) symtab_hdr->contents;
5584 if (local_syms == NULL && locsymcount != 0)
5585 {
5586 local_syms = bfd_elf_get_elf_syms (ibfd, symtab_hdr, locsymcount,
5587 0, NULL, NULL, NULL);
5588 if (local_syms == NULL)
5589 return false;
5590 }
91d6fa6a 5591
7a9361c0
AM
5592 for (isym = local_syms;
5593 local_got < end_local_got;
5594 ++local_got, ++lgot_masks, ++isym)
25dbc73a
AM
5595 if (*local_got > 0)
5596 {
f15d0b54 5597 unsigned int need;
37da22e5 5598 if ((*lgot_masks & (TLS_TLS | TLS_LD)) == (TLS_TLS | TLS_LD))
f15d0b54
AM
5599 htab->tlsld_got.refcount += 1;
5600 need = got_entries_needed (*lgot_masks);
d6e14abc
AM
5601 if (need == 0)
5602 *local_got = (bfd_vma) -1;
25dbc73a
AM
5603 else
5604 {
3b36f7e6 5605 *local_got = allocate_got (htab, need);
f749f26e
AM
5606 if (bfd_link_pic (info)
5607 && !((*lgot_masks & TLS_TLS) != 0
7a9361c0
AM
5608 && bfd_link_executable (info))
5609 && isym->st_shndx != SHN_ABS)
0bed072f 5610 {
f15d0b54 5611 asection *srel;
f15d0b54 5612
f749f26e 5613 need *= sizeof (Elf32_External_Rela) / 4;
f15d0b54 5614 srel = htab->elf.srelgot;
37da22e5 5615 if ((*lgot_masks & (TLS_TLS | PLT_IFUNC)) == PLT_IFUNC)
ce558b89 5616 srel = htab->elf.irelplt;
f15d0b54 5617 srel->size += need;
0bed072f 5618 }
25dbc73a
AM
5619 }
5620 }
5621 else
5622 *local_got = (bfd_vma) -1;
e054468f 5623
90c14f0c 5624 if (htab->elf.target_os == is_vxworks)
e054468f
AM
5625 continue;
5626
5627 /* Allocate space for calls to local STT_GNU_IFUNC syms in .iplt. */
2d7ad24e
AM
5628 lgot_masks = (char *) end_local_plt;
5629 for (; local_plt < end_local_plt; ++local_plt, ++lgot_masks)
e054468f
AM
5630 {
5631 struct plt_entry *ent;
0a1b45a2 5632 bool doneone = false;
2d7ad24e 5633 bfd_vma plt_offset = 0, glink_offset = (bfd_vma) -1;
e054468f
AM
5634
5635 for (ent = *local_plt; ent != NULL; ent = ent->next)
5636 if (ent->plt.refcount > 0)
5637 {
2d7ad24e
AM
5638 if ((*lgot_masks & (TLS_TLS | PLT_IFUNC)) == PLT_IFUNC)
5639 s = htab->elf.iplt;
3e04d765
AM
5640 else if (htab->can_convert_all_inline_plt
5641 || (*lgot_masks & (TLS_TLS | PLT_KEEP)) != PLT_KEEP)
2d7ad24e
AM
5642 {
5643 ent->plt.offset = (bfd_vma) -1;
5644 continue;
5645 }
5646 else
5647 s = htab->pltlocal;
e054468f
AM
5648
5649 if (!doneone)
5650 {
5651 plt_offset = s->size;
5652 s->size += 4;
5653 }
5654 ent->plt.offset = plt_offset;
5655
2d7ad24e 5656 if (s != htab->pltlocal && (!doneone || bfd_link_pic (info)))
e054468f 5657 {
2d7ad24e 5658 s = htab->glink;
e054468f 5659 glink_offset = s->size;
9e390558 5660 s->size += GLINK_ENTRY_SIZE (htab, NULL);
e054468f
AM
5661 }
5662 ent->glink_offset = glink_offset;
5663
5664 if (!doneone)
5665 {
2d7ad24e
AM
5666 if ((*lgot_masks & (TLS_TLS | PLT_IFUNC)) == PLT_IFUNC)
5667 {
5668 s = htab->elf.irelplt;
5669 s->size += sizeof (Elf32_External_Rela);
5670 }
5671 else if (bfd_link_pic (info))
5672 {
5673 s = htab->relpltlocal;
5674 s->size += sizeof (Elf32_External_Rela);
5675 }
0a1b45a2 5676 doneone = true;
e054468f
AM
5677 }
5678 }
5679 else
5680 ent->plt.offset = (bfd_vma) -1;
5681 }
7a9361c0
AM
5682
5683 if (local_syms != NULL
5684 && symtab_hdr->contents != (unsigned char *) local_syms)
5685 {
5686 if (!info->keep_memory)
5687 free (local_syms);
5688 else
5689 symtab_hdr->contents = (unsigned char *) local_syms;
5690 }
25dbc73a 5691 }
252b5132 5692
b7fcf6f6
AM
5693 /* Allocate space for global sym dynamic relocs. */
5694 elf_link_hash_traverse (elf_hash_table (info), allocate_dynrelocs, info);
5695
3b36f7e6
AM
5696 if (htab->tlsld_got.refcount > 0)
5697 {
5698 htab->tlsld_got.offset = allocate_got (htab, 8);
f749f26e 5699 if (bfd_link_dll (info))
ce558b89 5700 htab->elf.srelgot->size += sizeof (Elf32_External_Rela);
3b36f7e6
AM
5701 }
5702 else
5703 htab->tlsld_got.offset = (bfd_vma) -1;
5704
ce558b89 5705 if (htab->elf.sgot != NULL && htab->plt_type != PLT_VXWORKS)
3b36f7e6
AM
5706 {
5707 unsigned int g_o_t = 32768;
5708
4d962050
AM
5709 /* If we haven't allocated the header, do so now. When we get here,
5710 for old plt/got the got size will be 0 to 32764 (not allocated),
5711 or 32780 to 65536 (header allocated). For new plt/got, the
5712 corresponding ranges are 0 to 32768 and 32780 to 65536. */
ce558b89 5713 if (htab->elf.sgot->size <= 32768)
3b36f7e6 5714 {
ce558b89 5715 g_o_t = htab->elf.sgot->size;
4a3dc543 5716 if (htab->plt_type == PLT_OLD)
4d962050 5717 g_o_t += 4;
ce558b89 5718 htab->elf.sgot->size += htab->got_header_size;
3b36f7e6 5719 }
3b36f7e6
AM
5720
5721 htab->elf.hgot->root.u.def.value = g_o_t;
5722 }
0e1862bb 5723 if (bfd_link_pic (info))
bd6c6e2b
AM
5724 {
5725 struct elf_link_hash_entry *sda = htab->sdata[0].sym;
93d1b056
AM
5726
5727 sda->root.u.def.section = htab->elf.hgot->root.u.def.section;
5728 sda->root.u.def.value = htab->elf.hgot->root.u.def.value;
bd6c6e2b 5729 }
15bfcc77
AM
5730 if (info->emitrelocations)
5731 {
5732 struct elf_link_hash_entry *sda = htab->sdata[0].sym;
5733
5734 if (sda != NULL && sda->ref_regular)
5735 sda->root.u.def.section->flags |= SEC_KEEP;
5736 sda = htab->sdata[1].sym;
5737 if (sda != NULL && sda->ref_regular)
5738 sda->root.u.def.section->flags |= SEC_KEEP;
5739 }
3b36f7e6 5740
e054468f
AM
5741 if (htab->glink != NULL
5742 && htab->glink->size != 0
5743 && htab->elf.dynamic_sections_created)
d7128ce4
AM
5744 {
5745 htab->glink_pltresolve = htab->glink->size;
9e390558
AM
5746 /* Space for the branch table. */
5747 htab->glink->size
5748 += htab->elf.srelplt->size / (sizeof (Elf32_External_Rela) / 4) - 4;
86b9da88 5749 /* Pad out to align the start of PLTresolve. */
5446cbdf
AM
5750 htab->glink->size += -htab->glink->size & (htab->params->ppc476_workaround
5751 ? 63 : 15);
d7128ce4 5752 htab->glink->size += GLINK_PLTRESOLVE;
0ba07910 5753
5446cbdf 5754 if (htab->params->emit_stub_syms)
0ba07910
AM
5755 {
5756 struct elf_link_hash_entry *sh;
5757 sh = elf_link_hash_lookup (&htab->elf, "__glink",
0a1b45a2 5758 true, false, false);
0ba07910 5759 if (sh == NULL)
0a1b45a2 5760 return false;
0ba07910
AM
5761 if (sh->root.type == bfd_link_hash_new)
5762 {
5763 sh->root.type = bfd_link_hash_defined;
5764 sh->root.u.def.section = htab->glink;
5765 sh->root.u.def.value = htab->glink_pltresolve;
5766 sh->ref_regular = 1;
5767 sh->def_regular = 1;
5768 sh->ref_regular_nonweak = 1;
5769 sh->forced_local = 1;
5770 sh->non_elf = 0;
2ec55de3 5771 sh->root.linker_def = 1;
0ba07910
AM
5772 }
5773 sh = elf_link_hash_lookup (&htab->elf, "__glink_PLTresolve",
0a1b45a2 5774 true, false, false);
0ba07910 5775 if (sh == NULL)
0a1b45a2 5776 return false;
0ba07910
AM
5777 if (sh->root.type == bfd_link_hash_new)
5778 {
5779 sh->root.type = bfd_link_hash_defined;
5780 sh->root.u.def.section = htab->glink;
5781 sh->root.u.def.value = htab->glink->size - GLINK_PLTRESOLVE;
5782 sh->ref_regular = 1;
5783 sh->def_regular = 1;
5784 sh->ref_regular_nonweak = 1;
5785 sh->forced_local = 1;
5786 sh->non_elf = 0;
2ec55de3 5787 sh->root.linker_def = 1;
0ba07910
AM
5788 }
5789 }
d7128ce4
AM
5790 }
5791
6177242a
AM
5792 if (htab->glink != NULL
5793 && htab->glink->size != 0
5794 && htab->glink_eh_frame != NULL
9a2a56cc
AM
5795 && !bfd_is_abs_section (htab->glink_eh_frame->output_section)
5796 && _bfd_elf_eh_frame_present (info))
6177242a
AM
5797 {
5798 s = htab->glink_eh_frame;
5799 s->size = sizeof (glink_eh_frame_cie) + 20;
0e1862bb 5800 if (bfd_link_pic (info))
6177242a
AM
5801 {
5802 s->size += 4;
5803 if (htab->glink->size - GLINK_PLTRESOLVE + 8 >= 256)
5804 s->size += 4;
5805 }
5806 }
5807
25dbc73a
AM
5808 /* We've now determined the sizes of the various dynamic sections.
5809 Allocate memory for them. */
0a1b45a2 5810 relocs = false;
25dbc73a 5811 for (s = htab->elf.dynobj->sections; s != NULL; s = s->next)
252b5132 5812 {
0a1b45a2 5813 bool strip_section = true;
9d8504b1 5814
25dbc73a
AM
5815 if ((s->flags & SEC_LINKER_CREATED) == 0)
5816 continue;
252b5132 5817
ce558b89
AM
5818 if (s == htab->elf.splt
5819 || s == htab->elf.sgot)
25dbc73a 5820 {
9d8504b1
PB
5821 /* We'd like to strip these sections if they aren't needed, but if
5822 we've exported dynamic symbols from them we must leave them.
5823 It's too late to tell BFD to get rid of the symbols. */
e054468f 5824 if (htab->elf.hplt != NULL)
0a1b45a2 5825 strip_section = false;
25dbc73a
AM
5826 /* Strip this section if we don't need it; see the
5827 comment below. */
5828 }
ce558b89 5829 else if (s == htab->elf.iplt
2d7ad24e 5830 || s == htab->pltlocal
e054468f 5831 || s == htab->glink
6177242a 5832 || s == htab->glink_eh_frame
ce558b89 5833 || s == htab->elf.sgotplt
e054468f 5834 || s == htab->sbss
9d19e4fd 5835 || s == htab->elf.sdynbss
5474d94f 5836 || s == htab->elf.sdynrelro
15bfcc77 5837 || s == htab->dynsbss)
25dbc73a 5838 {
c9a2f333 5839 /* Strip these too. */
25dbc73a 5840 }
15bfcc77
AM
5841 else if (s == htab->sdata[0].section
5842 || s == htab->sdata[1].section)
5843 {
5844 strip_section = (s->flags & SEC_KEEP) == 0;
5845 }
08dedd66 5846 else if (startswith (bfd_section_name (s), ".rela"))
25dbc73a 5847 {
c456f082 5848 if (s->size != 0)
25dbc73a
AM
5849 {
5850 /* Remember whether there are any relocation sections. */
0a1b45a2 5851 relocs = true;
252b5132 5852
25dbc73a
AM
5853 /* We use the reloc_count field as a counter if we need
5854 to copy relocs into the output file. */
5855 s->reloc_count = 0;
252b5132
RH
5856 }
5857 }
25dbc73a
AM
5858 else
5859 {
5860 /* It's not one of our sections, so don't allocate space. */
5861 continue;
5862 }
252b5132 5863
9d8504b1 5864 if (s->size == 0 && strip_section)
25dbc73a 5865 {
c456f082
AM
5866 /* If we don't need this section, strip it from the
5867 output file. This is mostly to handle .rela.bss and
5868 .rela.plt. We must create both sections in
5869 create_dynamic_sections, because they must be created
5870 before the linker maps input sections to output
5871 sections. The linker does that before
5872 adjust_dynamic_symbol is called, and it is that
5873 function which decides whether anything needs to go
5874 into these sections. */
8423293d 5875 s->flags |= SEC_EXCLUDE;
25dbc73a
AM
5876 continue;
5877 }
7fce784e 5878
d7128ce4 5879 if ((s->flags & SEC_HAS_CONTENTS) == 0)
644285ef
AM
5880 continue;
5881
25dbc73a
AM
5882 /* Allocate memory for the section contents. */
5883 s->contents = bfd_zalloc (htab->elf.dynobj, s->size);
5884 if (s->contents == NULL)
0a1b45a2 5885 return false;
25dbc73a 5886 }
252b5132 5887
25dbc73a 5888 if (htab->elf.dynamic_sections_created)
7619e7c7 5889 {
25dbc73a
AM
5890 /* Add some entries to the .dynamic section. We fill in the
5891 values later, in ppc_elf_finish_dynamic_sections, but we
5892 must add the entries now so that we get the correct size for
5893 the .dynamic section. The DT_DEBUG entry is filled in by the
5894 dynamic linker and used by the debugger. */
5895#define add_dynamic_entry(TAG, VAL) \
5896 _bfd_elf_add_dynamic_entry (info, TAG, VAL)
252b5132 5897
3084d7a2
L
5898 if (!_bfd_elf_maybe_vxworks_add_dynamic_tags (output_bfd, info,
5899 relocs))
0a1b45a2 5900 return false;
7619e7c7 5901
c7e17e05
AM
5902 if (htab->plt_type == PLT_NEW
5903 && htab->glink != NULL
5904 && htab->glink->size != 0)
d7128ce4 5905 {
1fe44d79 5906 if (!add_dynamic_entry (DT_PPC_GOT, 0))
0a1b45a2 5907 return false;
5446cbdf 5908 if (!htab->params->no_tls_get_addr_opt
a7f2871e
AM
5909 && htab->tls_get_addr != NULL
5910 && htab->tls_get_addr->plt.plist != NULL
e8910a83 5911 && !add_dynamic_entry (DT_PPC_OPT, PPC_OPT_TLS))
0a1b45a2 5912 return false;
d7128ce4 5913 }
7a2b07ff 5914 }
25dbc73a
AM
5915#undef add_dynamic_entry
5916
7e01508c
AM
5917 if (htab->glink_eh_frame != NULL
5918 && htab->glink_eh_frame->contents != NULL)
5919 {
5920 unsigned char *p = htab->glink_eh_frame->contents;
5921 bfd_vma val;
5922
5923 memcpy (p, glink_eh_frame_cie, sizeof (glink_eh_frame_cie));
5924 /* CIE length (rewrite in case little-endian). */
5925 bfd_put_32 (htab->elf.dynobj, sizeof (glink_eh_frame_cie) - 4, p);
5926 p += sizeof (glink_eh_frame_cie);
5927 /* FDE length. */
5928 val = htab->glink_eh_frame->size - 4 - sizeof (glink_eh_frame_cie);
5929 bfd_put_32 (htab->elf.dynobj, val, p);
5930 p += 4;
5931 /* CIE pointer. */
5932 val = p - htab->glink_eh_frame->contents;
5933 bfd_put_32 (htab->elf.dynobj, val, p);
5934 p += 4;
5935 /* Offset to .glink. Set later. */
5936 p += 4;
5937 /* .glink size. */
5938 bfd_put_32 (htab->elf.dynobj, htab->glink->size, p);
5939 p += 4;
5940 /* Augmentation. */
5941 p += 1;
5942
0e1862bb 5943 if (bfd_link_pic (info)
7e01508c
AM
5944 && htab->elf.dynamic_sections_created)
5945 {
5946 bfd_vma adv = (htab->glink->size - GLINK_PLTRESOLVE + 8) >> 2;
5947 if (adv < 64)
5948 *p++ = DW_CFA_advance_loc + adv;
5949 else if (adv < 256)
5950 {
5951 *p++ = DW_CFA_advance_loc1;
5952 *p++ = adv;
5953 }
5954 else if (adv < 65536)
5955 {
5956 *p++ = DW_CFA_advance_loc2;
5957 bfd_put_16 (htab->elf.dynobj, adv, p);
5958 p += 2;
5959 }
5960 else
5961 {
5962 *p++ = DW_CFA_advance_loc4;
5963 bfd_put_32 (htab->elf.dynobj, adv, p);
5964 p += 4;
5965 }
5966 *p++ = DW_CFA_register;
5967 *p++ = 65;
5968 p++;
5969 *p++ = DW_CFA_advance_loc + 4;
5970 *p++ = DW_CFA_restore_extended;
5971 *p++ = 65;
5972 }
5973 BFD_ASSERT ((bfd_vma) ((p + 3 - htab->glink_eh_frame->contents) & -4)
5974 == htab->glink_eh_frame->size);
5975 }
5976
0a1b45a2 5977 return true;
7619e7c7 5978}
0eb4a168 5979
93d1b056
AM
5980/* Arrange to have _SDA_BASE_ or _SDA2_BASE_ stripped from the output
5981 if it looks like nothing is using them. */
5982
5983static void
5984maybe_strip_sdasym (bfd *output_bfd, elf_linker_section_t *lsect)
5985{
5986 struct elf_link_hash_entry *sda = lsect->sym;
5987
5988 if (sda != NULL && !sda->ref_regular && sda->dynindx == -1)
5989 {
5990 asection *s;
5991
5992 s = bfd_get_section_by_name (output_bfd, lsect->name);
5993 if (s == NULL || bfd_section_removed_from_list (output_bfd, s))
5994 {
5995 s = bfd_get_section_by_name (output_bfd, lsect->bss_name);
5996 if (s == NULL || bfd_section_removed_from_list (output_bfd, s))
5997 {
5998 sda->def_regular = 0;
5999 /* This is somewhat magic. See elf_link_output_extsym. */
6000 sda->ref_dynamic = 1;
6001 sda->forced_local = 0;
6002 }
6003 }
6004 }
6005}
6006
6007void
6008ppc_elf_maybe_strip_sdata_syms (struct bfd_link_info *info)
6009{
6010 struct ppc_elf_link_hash_table *htab = ppc_elf_hash_table (info);
6011
6012 if (htab != NULL)
6013 {
6014 maybe_strip_sdasym (info->output_bfd, &htab->sdata[0]);
6015 maybe_strip_sdasym (info->output_bfd, &htab->sdata[1]);
6016 }
6017}
6018
6019
0eb4a168
AM
6020/* Return TRUE if symbol should be hashed in the `.gnu.hash' section. */
6021
0a1b45a2 6022static bool
0eb4a168
AM
6023ppc_elf_hash_symbol (struct elf_link_hash_entry *h)
6024{
6025 if (h->plt.plist != NULL
6026 && !h->def_regular
6027 && (!h->pointer_equality_needed
6028 || !h->ref_regular_nonweak))
0a1b45a2 6029 return false;
0eb4a168
AM
6030
6031 return _bfd_elf_hash_symbol (h);
6032}
25dbc73a
AM
6033\f
6034#define ARRAY_SIZE(a) (sizeof (a) / sizeof ((a)[0]))
6035
01017ef8
NS
6036/* Relaxation trampolines. r12 is available for clobbering (r11, is
6037 used for some functions that are allowed to break the ABI). */
25dbc73a
AM
6038static const int shared_stub_entry[] =
6039 {
6040 0x7c0802a6, /* mflr 0 */
6041 0x429f0005, /* bcl 20, 31, .Lxxx */
01017ef8
NS
6042 0x7d8802a6, /* mflr 12 */
6043 0x3d8c0000, /* addis 12, 12, (xxx-.Lxxx)@ha */
53291d1f 6044 0x398c0000, /* addi 12, 12, (xxx-.Lxxx)@l */
25dbc73a 6045 0x7c0803a6, /* mtlr 0 */
01017ef8 6046 0x7d8903a6, /* mtctr 12 */
25dbc73a
AM
6047 0x4e800420, /* bctr */
6048 };
6049
6050static const int stub_entry[] =
6051 {
01017ef8
NS
6052 0x3d800000, /* lis 12,xxx@ha */
6053 0x398c0000, /* addi 12,12,xxx@l */
6054 0x7d8903a6, /* mtctr 12 */
25dbc73a
AM
6055 0x4e800420, /* bctr */
6056 };
6057
5446cbdf
AM
6058struct ppc_elf_relax_info
6059{
6060 unsigned int workaround_size;
d3e454b9 6061 unsigned int picfixup_size;
5446cbdf
AM
6062};
6063
6064/* This function implements long branch trampolines, and the ppc476
6065 icache bug workaround. Any section needing trampolines or patch
6066 space for the workaround has its size extended so that we can
53291d1f 6067 add trampolines at the end of the section. */
5446cbdf 6068
0a1b45a2 6069static bool
25dbc73a
AM
6070ppc_elf_relax_section (bfd *abfd,
6071 asection *isec,
6072 struct bfd_link_info *link_info,
0a1b45a2 6073 bool *again)
25dbc73a 6074{
d3e454b9 6075 struct one_branch_fixup
25dbc73a 6076 {
d3e454b9 6077 struct one_branch_fixup *next;
25dbc73a 6078 asection *tsec;
01017ef8
NS
6079 /* Final link, can use the symbol offset. For a
6080 relocatable link we use the symbol's index. */
25dbc73a
AM
6081 bfd_vma toff;
6082 bfd_vma trampoff;
6083 };
7619e7c7 6084
25dbc73a
AM
6085 Elf_Internal_Shdr *symtab_hdr;
6086 bfd_byte *contents = NULL;
6087 Elf_Internal_Sym *isymbuf = NULL;
6088 Elf_Internal_Rela *internal_relocs = NULL;
5446cbdf 6089 Elf_Internal_Rela *irel, *irelend = NULL;
d3e454b9 6090 struct one_branch_fixup *branch_fixups = NULL;
5446cbdf 6091 struct ppc_elf_relax_info *relax_info = NULL;
9bc4e62b 6092 unsigned changes = 0;
0a1b45a2 6093 bool workaround_change;
d7128ce4 6094 struct ppc_elf_link_hash_table *htab;
d3e454b9 6095 bfd_size_type trampbase, trampoff, newsize, picfixup_size;
a6aa5195 6096 asection *got2;
0a1b45a2 6097 bool maybe_pasted;
7619e7c7 6098
0a1b45a2 6099 *again = false;
7619e7c7 6100
5446cbdf 6101 /* No need to do anything with non-alloc or non-code sections. */
c87b5a93 6102 if ((isec->flags & SEC_ALLOC) == 0
a8ad78a7 6103 || (isec->flags & SEC_CODE) == 0
81ff113f 6104 || (isec->flags & SEC_HAS_CONTENTS) == 0
5446cbdf
AM
6105 || (isec->flags & SEC_LINKER_CREATED) != 0
6106 || isec->size < 4)
0a1b45a2 6107 return true;
7619e7c7 6108
c8a1f254
NS
6109 /* We cannot represent the required PIC relocs in the output, so don't
6110 do anything. The linker doesn't support mixing -shared and -r
6111 anyway. */
0e1862bb 6112 if (bfd_link_relocatable (link_info) && bfd_link_pic (link_info))
0a1b45a2 6113 return true;
5b914448 6114
5446cbdf
AM
6115 htab = ppc_elf_hash_table (link_info);
6116 if (htab == NULL)
0a1b45a2 6117 return true;
5446cbdf
AM
6118
6119 isec->size = (isec->size + 3) & -4;
6120 if (isec->rawsize == 0)
6121 isec->rawsize = isec->size;
6122 trampbase = isec->size;
6123
53291d1f
AM
6124 BFD_ASSERT (isec->sec_info_type == SEC_INFO_TYPE_NONE
6125 || isec->sec_info_type == SEC_INFO_TYPE_TARGET);
6126 isec->sec_info_type = SEC_INFO_TYPE_TARGET;
6127
d3e454b9
AM
6128 if (htab->params->ppc476_workaround
6129 || htab->params->pic_fixup > 0)
5446cbdf
AM
6130 {
6131 if (elf_section_data (isec)->sec_info == NULL)
6132 {
5446cbdf
AM
6133 elf_section_data (isec)->sec_info
6134 = bfd_zalloc (abfd, sizeof (struct ppc_elf_relax_info));
6135 if (elf_section_data (isec)->sec_info == NULL)
0a1b45a2 6136 return false;
5446cbdf
AM
6137 }
6138 relax_info = elf_section_data (isec)->sec_info;
6139 trampbase -= relax_info->workaround_size;
6140 }
6141
50248c89
AM
6142 maybe_pasted = (strcmp (isec->output_section->name, ".init") == 0
6143 || strcmp (isec->output_section->name, ".fini") == 0);
25dbc73a 6144 /* Space for a branch around any trampolines. */
5446cbdf
AM
6145 trampoff = trampbase;
6146 if (maybe_pasted && trampbase == isec->rawsize)
50248c89 6147 trampoff += 4;
7619e7c7 6148
0ffa91dd 6149 symtab_hdr = &elf_symtab_hdr (abfd);
d3e454b9
AM
6150 picfixup_size = 0;
6151 if (htab->params->branch_trampolines
6152 || htab->params->pic_fixup > 0)
7619e7c7 6153 {
5446cbdf
AM
6154 /* Get a copy of the native relocations. */
6155 if (isec->reloc_count != 0)
25dbc73a 6156 {
5446cbdf
AM
6157 internal_relocs = _bfd_elf_link_read_relocs (abfd, isec, NULL, NULL,
6158 link_info->keep_memory);
6159 if (internal_relocs == NULL)
6160 goto error_return;
25dbc73a 6161 }
7619e7c7 6162
5446cbdf
AM
6163 got2 = bfd_get_section_by_name (abfd, ".got2");
6164
6165 irelend = internal_relocs + isec->reloc_count;
6166 for (irel = internal_relocs; irel < irelend; irel++)
25dbc73a 6167 {
5446cbdf
AM
6168 unsigned long r_type = ELF32_R_TYPE (irel->r_info);
6169 bfd_vma toff, roff;
6170 asection *tsec;
d3e454b9 6171 struct one_branch_fixup *f;
5446cbdf 6172 size_t insn_offset = 0;
fb290809 6173 bfd_vma max_branch_offset = 0, val, reladdr;
5446cbdf
AM
6174 bfd_byte *hit_addr;
6175 unsigned long t0;
6176 struct elf_link_hash_entry *h;
49c09209 6177 Elf_Internal_Sym *isym;
5446cbdf
AM
6178 struct plt_entry **plist;
6179 unsigned char sym_type;
6180
6181 switch (r_type)
6182 {
6183 case R_PPC_REL24:
6184 case R_PPC_LOCAL24PC:
6185 case R_PPC_PLTREL24:
23cedd1d 6186 case R_PPC_PLTCALL:
5446cbdf
AM
6187 max_branch_offset = 1 << 25;
6188 break;
6189
6190 case R_PPC_REL14:
6191 case R_PPC_REL14_BRTAKEN:
6192 case R_PPC_REL14_BRNTAKEN:
6193 max_branch_offset = 1 << 15;
6194 break;
7fce784e 6195
d3e454b9
AM
6196 case R_PPC_ADDR16_HA:
6197 if (htab->params->pic_fixup > 0)
6198 break;
6199 continue;
6200
5446cbdf
AM
6201 default:
6202 continue;
6203 }
6204
6205 /* Get the value of the symbol referred to by the reloc. */
49c09209
AM
6206 if (!get_sym_h (&h, &isym, &tsec, NULL, &isymbuf,
6207 ELF32_R_SYM (irel->r_info), abfd))
6208 goto error_return;
5446cbdf 6209
49c09209
AM
6210 if (isym != NULL)
6211 {
6212 if (tsec != NULL)
6213 ;
5446cbdf
AM
6214 else if (isym->st_shndx == SHN_ABS)
6215 tsec = bfd_abs_section_ptr;
49199304
AM
6216 else
6217 continue;
5446cbdf
AM
6218
6219 toff = isym->st_value;
6220 sym_type = ELF_ST_TYPE (isym->st_info);
25dbc73a 6221 }
25dbc73a 6222 else
5446cbdf 6223 {
49c09209
AM
6224 if (tsec != NULL)
6225 toff = h->root.u.def.value;
5446cbdf
AM
6226 else if (h->root.type == bfd_link_hash_undefined
6227 || h->root.type == bfd_link_hash_undefweak)
6228 {
49c09209
AM
6229 unsigned long indx;
6230
6231 indx = ELF32_R_SYM (irel->r_info) - symtab_hdr->sh_info;
5446cbdf 6232 tsec = bfd_und_section_ptr;
0e1862bb 6233 toff = bfd_link_relocatable (link_info) ? indx : 0;
5446cbdf
AM
6234 }
6235 else
6236 continue;
6237
9f7552cf
AM
6238 /* If this branch is to __tls_get_addr then we may later
6239 optimise away the call. We won't be needing a long-
6240 branch stub in that case. */
0e1862bb 6241 if (bfd_link_executable (link_info)
9f7552cf
AM
6242 && h == htab->tls_get_addr
6243 && irel != internal_relocs)
6244 {
6245 unsigned long t_symndx = ELF32_R_SYM (irel[-1].r_info);
6246 unsigned long t_rtype = ELF32_R_TYPE (irel[-1].r_info);
6247 unsigned int tls_mask = 0;
6248
6249 /* The previous reloc should be one of R_PPC_TLSGD or
6250 R_PPC_TLSLD, or for older object files, a reloc
6251 on the __tls_get_addr arg setup insn. Get tls
6252 mask bits from the symbol on that reloc. */
6253 if (t_symndx < symtab_hdr->sh_info)
6254 {
6255 bfd_vma *local_got_offsets = elf_local_got_offsets (abfd);
6256
6257 if (local_got_offsets != NULL)
6258 {
6259 struct plt_entry **local_plt = (struct plt_entry **)
6260 (local_got_offsets + symtab_hdr->sh_info);
6261 char *lgot_masks = (char *)
6262 (local_plt + symtab_hdr->sh_info);
6263 tls_mask = lgot_masks[t_symndx];
6264 }
6265 }
6266 else
6267 {
6268 struct elf_link_hash_entry *th
6269 = elf_sym_hashes (abfd)[t_symndx - symtab_hdr->sh_info];
6270
6271 while (th->root.type == bfd_link_hash_indirect
6272 || th->root.type == bfd_link_hash_warning)
6273 th = (struct elf_link_hash_entry *) th->root.u.i.link;
6274
6275 tls_mask
6276 = ((struct ppc_elf_link_hash_entry *) th)->tls_mask;
6277 }
6278
6279 /* The mask bits tell us if the call will be
6280 optimised away. */
6281 if ((tls_mask & TLS_TLS) != 0 && (tls_mask & TLS_GD) == 0
6282 && (t_rtype == R_PPC_TLSGD
6283 || t_rtype == R_PPC_GOT_TLSGD16
6284 || t_rtype == R_PPC_GOT_TLSGD16_LO))
6285 continue;
6286 if ((tls_mask & TLS_TLS) != 0 && (tls_mask & TLS_LD) == 0
6287 && (t_rtype == R_PPC_TLSLD
6288 || t_rtype == R_PPC_GOT_TLSLD16
6289 || t_rtype == R_PPC_GOT_TLSLD16_LO))
6290 continue;
6291 }
6292
5446cbdf
AM
6293 sym_type = h->type;
6294 }
7619e7c7 6295
d3e454b9
AM
6296 if (r_type == R_PPC_ADDR16_HA)
6297 {
6298 if (h != NULL
6299 && !h->def_regular
6300 && h->protected_def
6301 && ppc_elf_hash_entry (h)->has_addr16_ha
6302 && ppc_elf_hash_entry (h)->has_addr16_lo)
6303 picfixup_size += 12;
6304 continue;
6305 }
6306
5446cbdf
AM
6307 /* The condition here under which we call find_plt_ent must
6308 match that in relocate_section. If we call find_plt_ent here
6309 but not in relocate_section, or vice versa, then the branch
6310 destination used here may be incorrect. */
6311 plist = NULL;
6312 if (h != NULL)
25dbc73a 6313 {
5446cbdf
AM
6314 /* We know is_branch_reloc (r_type) is true. */
6315 if (h->type == STT_GNU_IFUNC
6316 || r_type == R_PPC_PLTREL24)
6317 plist = &h->plt.plist;
25dbc73a 6318 }
5446cbdf
AM
6319 else if (sym_type == STT_GNU_IFUNC
6320 && elf_local_got_offsets (abfd) != NULL)
c8a1f254 6321 {
5446cbdf
AM
6322 bfd_vma *local_got_offsets = elf_local_got_offsets (abfd);
6323 struct plt_entry **local_plt = (struct plt_entry **)
6324 (local_got_offsets + symtab_hdr->sh_info);
6325 plist = local_plt + ELF32_R_SYM (irel->r_info);
c8a1f254 6326 }
5446cbdf 6327 if (plist != NULL)
a9585d22 6328 {
5446cbdf
AM
6329 bfd_vma addend = 0;
6330 struct plt_entry *ent;
6331
0e1862bb 6332 if (r_type == R_PPC_PLTREL24 && bfd_link_pic (link_info))
5446cbdf
AM
6333 addend = irel->r_addend;
6334 ent = find_plt_ent (plist, got2, addend);
6335 if (ent != NULL)
a9585d22 6336 {
5446cbdf
AM
6337 if (htab->plt_type == PLT_NEW
6338 || h == NULL
6339 || !htab->elf.dynamic_sections_created
6340 || h->dynindx == -1)
6341 {
6342 tsec = htab->glink;
6343 toff = ent->glink_offset;
6344 }
6345 else
6346 {
ce558b89 6347 tsec = htab->elf.splt;
5446cbdf
AM
6348 toff = ent->plt.offset;
6349 }
de972ffa
AM
6350 }
6351 }
de972ffa 6352
5446cbdf
AM
6353 /* If the branch and target are in the same section, you have
6354 no hope of adding stubs. We'll error out later should the
6355 branch overflow. */
6356 if (tsec == isec)
6357 continue;
25dbc73a 6358
49199304
AM
6359 /* toff is used for the symbol index when the symbol is
6360 undefined and we're doing a relocatable link, so we can't
6361 support addends. It would be possible to do so by
6362 putting the addend in one_branch_fixup but addends on
6363 branches are rare so it hardly seems worth supporting. */
6364 if (bfd_link_relocatable (link_info)
6365 && tsec == bfd_und_section_ptr
6366 && r_type != R_PPC_PLTREL24
6367 && irel->r_addend != 0)
6368 continue;
6369
5446cbdf
AM
6370 /* There probably isn't any reason to handle symbols in
6371 SEC_MERGE sections; SEC_MERGE doesn't seem a likely
6372 attribute for a code section, and we are only looking at
6373 branches. However, implement it correctly here as a
6374 reference for other target relax_section functions. */
6375 if (0 && tsec->sec_info_type == SEC_INFO_TYPE_MERGE)
6376 {
6377 /* At this stage in linking, no SEC_MERGE symbol has been
6378 adjusted, so all references to such symbols need to be
6379 passed through _bfd_merged_section_offset. (Later, in
6380 relocate_section, all SEC_MERGE symbols *except* for
6381 section symbols have been adjusted.)
6382
6383 gas may reduce relocations against symbols in SEC_MERGE
6384 sections to a relocation against the section symbol when
6385 the original addend was zero. When the reloc is against
6386 a section symbol we should include the addend in the
6387 offset passed to _bfd_merged_section_offset, since the
6388 location of interest is the original symbol. On the
6389 other hand, an access to "sym+addend" where "sym" is not
6390 a section symbol should not include the addend; Such an
6391 access is presumed to be an offset from "sym"; The
6392 location of interest is just "sym". */
49199304
AM
6393 if (sym_type == STT_SECTION
6394 && r_type != R_PPC_PLTREL24)
5446cbdf
AM
6395 toff += irel->r_addend;
6396
6397 toff
6398 = _bfd_merged_section_offset (abfd, &tsec,
6399 elf_section_data (tsec)->sec_info,
6400 toff);
6401
49199304
AM
6402 if (sym_type != STT_SECTION
6403 && r_type != R_PPC_PLTREL24)
5446cbdf
AM
6404 toff += irel->r_addend;
6405 }
6406 /* PLTREL24 addends are special. */
6407 else if (r_type != R_PPC_PLTREL24)
25dbc73a 6408 toff += irel->r_addend;
7619e7c7 6409
5446cbdf 6410 /* Attempted -shared link of non-pic code loses. */
0e1862bb 6411 if ((!bfd_link_relocatable (link_info)
5446cbdf
AM
6412 && tsec == bfd_und_section_ptr)
6413 || tsec->output_section == NULL
6414 || (tsec->owner != NULL
6415 && (tsec->owner->flags & BFD_PLUGIN) != 0))
6416 continue;
7619e7c7 6417
5446cbdf 6418 roff = irel->r_offset;
fb290809 6419 reladdr = isec->output_section->vma + isec->output_offset + roff;
7de713b9 6420
49199304
AM
6421 /* Avoid creating a lot of unnecessary fixups when
6422 relocatable if the output section size is such that a
6423 fixup can be created at final link.
6424 The max_branch_offset adjustment allows for some number
6425 of other fixups being needed at final link. */
6426 if (bfd_link_relocatable (link_info)
6427 && (isec->output_section->rawsize - (isec->output_offset + roff)
6428 < max_branch_offset - (max_branch_offset >> 4)))
6429 continue;
6430
5446cbdf
AM
6431 /* If the branch is in range, no need to do anything. */
6432 if (tsec != bfd_und_section_ptr
0e1862bb 6433 && (!bfd_link_relocatable (link_info)
5446cbdf
AM
6434 /* A relocatable link may have sections moved during
6435 final link, so do not presume they remain in range. */
6436 || tsec->output_section == isec->output_section))
6437 {
fb290809 6438 bfd_vma symaddr;
7619e7c7 6439
5446cbdf 6440 symaddr = tsec->output_section->vma + tsec->output_offset + toff;
5446cbdf
AM
6441 if (symaddr - reladdr + max_branch_offset
6442 < 2 * max_branch_offset)
6443 continue;
6444 }
01017ef8 6445
5446cbdf 6446 /* Look for an existing fixup to this address. */
d3e454b9 6447 for (f = branch_fixups; f ; f = f->next)
5446cbdf
AM
6448 if (f->tsec == tsec && f->toff == toff)
6449 break;
252b5132 6450
5446cbdf
AM
6451 if (f == NULL)
6452 {
6453 size_t size;
6454 unsigned long stub_rtype;
25dbc73a 6455
5446cbdf
AM
6456 val = trampoff - roff;
6457 if (val >= max_branch_offset)
6458 /* Oh dear, we can't reach a trampoline. Don't try to add
6459 one. We'll report an error later. */
6460 continue;
252b5132 6461
0e1862bb 6462 if (bfd_link_pic (link_info))
5446cbdf
AM
6463 {
6464 size = 4 * ARRAY_SIZE (shared_stub_entry);
6465 insn_offset = 12;
6466 }
6467 else
6468 {
6469 size = 4 * ARRAY_SIZE (stub_entry);
6470 insn_offset = 0;
6471 }
6472 stub_rtype = R_PPC_RELAX;
ce558b89 6473 if (tsec == htab->elf.splt
5446cbdf
AM
6474 || tsec == htab->glink)
6475 {
6476 stub_rtype = R_PPC_RELAX_PLT;
6477 if (r_type == R_PPC_PLTREL24)
6478 stub_rtype = R_PPC_RELAX_PLTREL24;
6479 }
252b5132 6480
5446cbdf
AM
6481 /* Hijack the old relocation. Since we need two
6482 relocations for this use a "composite" reloc. */
6483 irel->r_info = ELF32_R_INFO (ELF32_R_SYM (irel->r_info),
6484 stub_rtype);
6485 irel->r_offset = trampoff + insn_offset;
6486 if (r_type == R_PPC_PLTREL24
6487 && stub_rtype != R_PPC_RELAX_PLTREL24)
6488 irel->r_addend = 0;
6489
6490 /* Record the fixup so we don't do it again this section. */
6491 f = bfd_malloc (sizeof (*f));
d3e454b9 6492 f->next = branch_fixups;
5446cbdf
AM
6493 f->tsec = tsec;
6494 f->toff = toff;
6495 f->trampoff = trampoff;
d3e454b9 6496 branch_fixups = f;
5446cbdf
AM
6497
6498 trampoff += size;
6499 changes++;
25dbc73a
AM
6500 }
6501 else
6502 {
5446cbdf
AM
6503 val = f->trampoff - roff;
6504 if (val >= max_branch_offset)
6505 continue;
252b5132 6506
5446cbdf
AM
6507 /* Nop out the reloc, since we're finalizing things here. */
6508 irel->r_info = ELF32_R_INFO (0, R_PPC_NONE);
6509 }
252b5132 6510
fb290809
CC
6511 link_info->callbacks->minfo
6512 (_("%pB: Adjusting branch at 0x%V towards \"%s\" in section %s\n"),
6513 abfd, reladdr,
6514 (h && h->root.root.string? h->root.root.string : "<unknown>"),
6515 f->tsec->name);
6516
5446cbdf
AM
6517 /* Get the section contents. */
6518 if (contents == NULL)
25dbc73a 6519 {
5446cbdf
AM
6520 /* Get cached copy if it exists. */
6521 if (elf_section_data (isec)->this_hdr.contents != NULL)
6522 contents = elf_section_data (isec)->this_hdr.contents;
25dbc73a 6523 /* Go get them off disk. */
5446cbdf 6524 else if (!bfd_malloc_and_get_section (abfd, isec, &contents))
25dbc73a
AM
6525 goto error_return;
6526 }
252b5132 6527
5446cbdf
AM
6528 /* Fix up the existing branch to hit the trampoline. */
6529 hit_addr = contents + roff;
6530 switch (r_type)
6531 {
6532 case R_PPC_REL24:
6533 case R_PPC_LOCAL24PC:
6534 case R_PPC_PLTREL24:
6535 t0 = bfd_get_32 (abfd, hit_addr);
6536 t0 &= ~0x3fffffc;
6537 t0 |= val & 0x3fffffc;
6538 bfd_put_32 (abfd, t0, hit_addr);
6539 break;
252b5132 6540
5446cbdf
AM
6541 case R_PPC_REL14:
6542 case R_PPC_REL14_BRTAKEN:
6543 case R_PPC_REL14_BRNTAKEN:
6544 t0 = bfd_get_32 (abfd, hit_addr);
6545 t0 &= ~0xfffc;
6546 t0 |= val & 0xfffc;
6547 bfd_put_32 (abfd, t0, hit_addr);
6548 break;
6549 }
25dbc73a 6550 }
252b5132 6551
d3e454b9 6552 while (branch_fixups != NULL)
25dbc73a 6553 {
d3e454b9
AM
6554 struct one_branch_fixup *f = branch_fixups;
6555 branch_fixups = branch_fixups->next;
25dbc73a
AM
6556 free (f);
6557 }
5446cbdf 6558 }
252b5132 6559
0a1b45a2 6560 workaround_change = false;
5446cbdf 6561 newsize = trampoff;
795bc6b3 6562 if (htab->params->ppc476_workaround
0e1862bb 6563 && (!bfd_link_relocatable (link_info)
795bc6b3 6564 || isec->output_section->alignment_power >= htab->params->pagesize_p2))
5446cbdf
AM
6565 {
6566 bfd_vma addr, end_addr;
6567 unsigned int crossings;
795bc6b3 6568 bfd_vma pagesize = (bfd_vma) 1 << htab->params->pagesize_p2;
5446cbdf
AM
6569
6570 addr = isec->output_section->vma + isec->output_offset;
6128f9cf 6571 end_addr = addr + trampoff;
5446cbdf 6572 addr &= -pagesize;
795bc6b3 6573 crossings = ((end_addr & -pagesize) - addr) >> htab->params->pagesize_p2;
5446cbdf
AM
6574 if (crossings != 0)
6575 {
6576 /* Keep space aligned, to ensure the patch code itself does
6577 not cross a page. Don't decrease size calculated on a
6578 previous pass as otherwise we might never settle on a layout. */
1e269e9b 6579 newsize = 15 - ((end_addr - 1) & 15);
5446cbdf
AM
6580 newsize += crossings * 16;
6581 if (relax_info->workaround_size < newsize)
6582 {
6583 relax_info->workaround_size = newsize;
0a1b45a2 6584 workaround_change = true;
5446cbdf
AM
6585 }
6586 /* Ensure relocate_section is called. */
6587 isec->flags |= SEC_RELOC;
6588 }
6589 newsize = trampoff + relax_info->workaround_size;
6590 }
6591
d3e454b9
AM
6592 if (htab->params->pic_fixup > 0)
6593 {
6594 picfixup_size -= relax_info->picfixup_size;
6595 if (picfixup_size != 0)
6596 relax_info->picfixup_size += picfixup_size;
6597 newsize += relax_info->picfixup_size;
6598 }
6599
6600 if (changes != 0 || picfixup_size != 0 || workaround_change)
5446cbdf
AM
6601 isec->size = newsize;
6602
25dbc73a
AM
6603 if (isymbuf != NULL
6604 && symtab_hdr->contents != (unsigned char *) isymbuf)
252b5132 6605 {
25dbc73a
AM
6606 if (! link_info->keep_memory)
6607 free (isymbuf);
252b5132 6608 else
25dbc73a
AM
6609 {
6610 /* Cache the symbols for elf_link_input_bfd. */
6611 symtab_hdr->contents = (unsigned char *) isymbuf;
6612 }
252b5132
RH
6613 }
6614
25dbc73a
AM
6615 if (contents != NULL
6616 && elf_section_data (isec)->this_hdr.contents != contents)
6617 {
53291d1f 6618 if (!changes && !link_info->keep_memory)
25dbc73a
AM
6619 free (contents);
6620 else
6621 {
6622 /* Cache the section contents for elf_link_input_bfd. */
6623 elf_section_data (isec)->this_hdr.contents = contents;
6624 }
6625 }
252b5132 6626
d3e454b9 6627 changes += picfixup_size;
9bc4e62b 6628 if (changes != 0)
25dbc73a 6629 {
9bc4e62b
NS
6630 /* Append sufficient NOP relocs so we can write out relocation
6631 information for the trampolines. */
d4730f92 6632 Elf_Internal_Shdr *rel_hdr;
9bc4e62b
NS
6633 Elf_Internal_Rela *new_relocs = bfd_malloc ((changes + isec->reloc_count)
6634 * sizeof (*new_relocs));
6635 unsigned ix;
5b914448 6636
9bc4e62b
NS
6637 if (!new_relocs)
6638 goto error_return;
6639 memcpy (new_relocs, internal_relocs,
6640 isec->reloc_count * sizeof (*new_relocs));
6641 for (ix = changes; ix--;)
6642 {
6643 irel = new_relocs + ix + isec->reloc_count;
6644
6645 irel->r_info = ELF32_R_INFO (0, R_PPC_NONE);
6646 }
6647 if (internal_relocs != elf_section_data (isec)->relocs)
25dbc73a 6648 free (internal_relocs);
9bc4e62b
NS
6649 elf_section_data (isec)->relocs = new_relocs;
6650 isec->reloc_count += changes;
d4730f92
BS
6651 rel_hdr = _bfd_elf_single_rel_hdr (isec);
6652 rel_hdr->sh_size += changes * rel_hdr->sh_entsize;
25dbc73a 6653 }
c9594989 6654 else if (elf_section_data (isec)->relocs != internal_relocs)
9bc4e62b 6655 free (internal_relocs);
252b5132 6656
5446cbdf 6657 *again = changes != 0 || workaround_change;
0a1b45a2 6658 return true;
25dbc73a
AM
6659
6660 error_return:
d3e454b9 6661 while (branch_fixups != NULL)
5446cbdf 6662 {
d3e454b9
AM
6663 struct one_branch_fixup *f = branch_fixups;
6664 branch_fixups = branch_fixups->next;
5446cbdf
AM
6665 free (f);
6666 }
c9594989 6667 if ((unsigned char *) isymbuf != symtab_hdr->contents)
25dbc73a 6668 free (isymbuf);
c9594989 6669 if (elf_section_data (isec)->this_hdr.contents != contents)
25dbc73a 6670 free (contents);
c9594989 6671 if (elf_section_data (isec)->relocs != internal_relocs)
25dbc73a 6672 free (internal_relocs);
0a1b45a2 6673 return false;
252b5132 6674}
252b5132 6675\f
8a696751
AM
6676/* What to do when ld finds relocations against symbols defined in
6677 discarded sections. */
6678
6679static unsigned int
6680ppc_elf_action_discarded (asection *sec)
6681{
6682 if (strcmp (".fixup", sec->name) == 0)
6683 return 0;
6684
6685 if (strcmp (".got2", sec->name) == 0)
6686 return 0;
6687
6688 return _bfd_elf_default_action_discarded (sec);
6689}
c9a2f333 6690\f
25dbc73a 6691/* Fill in the address for a pointer generated in a linker section. */
252b5132 6692
25dbc73a 6693static bfd_vma
76750a2f 6694elf_finish_pointer_linker_section (bfd *input_bfd,
25dbc73a
AM
6695 elf_linker_section_t *lsect,
6696 struct elf_link_hash_entry *h,
6697 bfd_vma relocation,
2bb04cf2 6698 const Elf_Internal_Rela *rel)
25dbc73a
AM
6699{
6700 elf_linker_section_pointers_t *linker_section_ptr;
252b5132 6701
25dbc73a 6702 BFD_ASSERT (lsect != NULL);
252b5132 6703
25dbc73a 6704 if (h != NULL)
252b5132 6705 {
25dbc73a
AM
6706 /* Handle global symbol. */
6707 struct ppc_elf_link_hash_entry *eh;
252b5132 6708
25dbc73a 6709 eh = (struct ppc_elf_link_hash_entry *) h;
76750a2f
AM
6710 BFD_ASSERT (eh->elf.def_regular);
6711 linker_section_ptr = eh->linker_section_pointer;
25dbc73a
AM
6712 }
6713 else
6714 {
6715 /* Handle local symbol. */
6716 unsigned long r_symndx = ELF32_R_SYM (rel->r_info);
76750a2f 6717
0c8d6e5c 6718 BFD_ASSERT (is_ppc_elf (input_bfd));
25dbc73a 6719 BFD_ASSERT (elf_local_ptr_offsets (input_bfd) != NULL);
76750a2f
AM
6720 linker_section_ptr = elf_local_ptr_offsets (input_bfd)[r_symndx];
6721 }
252b5132 6722
76750a2f
AM
6723 linker_section_ptr = elf_find_pointer_linker_section (linker_section_ptr,
6724 rel->r_addend,
6725 lsect);
6726 BFD_ASSERT (linker_section_ptr != NULL);
25dbc73a 6727
76750a2f
AM
6728 /* Offset will always be a multiple of four, so use the bottom bit
6729 as a "written" flag. */
6730 if ((linker_section_ptr->offset & 1) == 0)
6731 {
6732 bfd_put_32 (lsect->section->owner,
6733 relocation + linker_section_ptr->addend,
6734 lsect->section->contents + linker_section_ptr->offset);
6735 linker_section_ptr->offset += 1;
252b5132
RH
6736 }
6737
bd6c6e2b
AM
6738 relocation = (lsect->section->output_section->vma
6739 + lsect->section->output_offset
76750a2f 6740 + linker_section_ptr->offset - 1
bd6c6e2b 6741 - SYM_VAL (lsect->sym));
252b5132 6742
25dbc73a
AM
6743#ifdef DEBUG
6744 fprintf (stderr,
6745 "Finish pointer in linker section %s, offset = %ld (0x%lx)\n",
6746 lsect->name, (long) relocation, (long) relocation);
6747#endif
252b5132 6748
bd6c6e2b 6749 return relocation;
252b5132 6750}
25dbc73a 6751
e054468f
AM
6752#define PPC_LO(v) ((v) & 0xffff)
6753#define PPC_HI(v) (((v) >> 16) & 0xffff)
6754#define PPC_HA(v) PPC_HI ((v) + 0x8000)
6755
6756static void
9e390558
AM
6757write_glink_stub (struct elf_link_hash_entry *h, struct plt_entry *ent,
6758 asection *plt_sec, unsigned char *p,
e054468f
AM
6759 struct bfd_link_info *info)
6760{
6761 struct ppc_elf_link_hash_table *htab = ppc_elf_hash_table (info);
6762 bfd *output_bfd = info->output_bfd;
6763 bfd_vma plt;
9e390558
AM
6764 unsigned char *end = p + GLINK_ENTRY_SIZE (htab, h);
6765
6766 if (h != NULL
6767 && h == htab->tls_get_addr
6768 && !htab->params->no_tls_get_addr_opt)
6769 {
6770 bfd_put_32 (output_bfd, LWZ_11_3, p);
6771 p += 4;
6772 bfd_put_32 (output_bfd, LWZ_12_3 + 4, p);
6773 p += 4;
6774 bfd_put_32 (output_bfd, MR_0_3, p);
6775 p += 4;
6776 bfd_put_32 (output_bfd, CMPWI_11_0, p);
6777 p += 4;
6778 bfd_put_32 (output_bfd, ADD_3_12_2, p);
6779 p += 4;
6780 bfd_put_32 (output_bfd, BEQLR, p);
6781 p += 4;
6782 bfd_put_32 (output_bfd, MR_3_0, p);
6783 p += 4;
6784 bfd_put_32 (output_bfd, NOP, p);
6785 p += 4;
6786 }
e054468f
AM
6787
6788 plt = ((ent->plt.offset & ~1)
6789 + plt_sec->output_section->vma
6790 + plt_sec->output_offset);
e054468f 6791
0e1862bb 6792 if (bfd_link_pic (info))
e054468f
AM
6793 {
6794 bfd_vma got = 0;
6795
6796 if (ent->addend >= 32768)
6797 got = (ent->addend
6798 + ent->sec->output_section->vma
6799 + ent->sec->output_offset);
6800 else if (htab->elf.hgot != NULL)
6801 got = SYM_VAL (htab->elf.hgot);
6802
6803 plt -= got;
6804
6805 if (plt + 0x8000 < 0x10000)
9e390558 6806 bfd_put_32 (output_bfd, LWZ_11_30 + PPC_LO (plt), p);
e054468f
AM
6807 else
6808 {
6809 bfd_put_32 (output_bfd, ADDIS_11_30 + PPC_HA (plt), p);
6810 p += 4;
6811 bfd_put_32 (output_bfd, LWZ_11_11 + PPC_LO (plt), p);
e054468f
AM
6812 }
6813 }
6814 else
6815 {
6816 bfd_put_32 (output_bfd, LIS_11 + PPC_HA (plt), p);
6817 p += 4;
6818 bfd_put_32 (output_bfd, LWZ_11_11 + PPC_LO (plt), p);
9e390558
AM
6819 }
6820 p += 4;
6821 bfd_put_32 (output_bfd, MTCTR_11, p);
6822 p += 4;
407aa07c
AM
6823 bfd_put_32 (output_bfd, BCTR, p);
6824 p += 4;
9e390558
AM
6825 while (p < end)
6826 {
6827 bfd_put_32 (output_bfd, htab->params->ppc476_workaround ? BA : NOP, p);
e054468f
AM
6828 p += 4;
6829 }
6830}
6831
bd6c6e2b
AM
6832/* Return true if symbol is defined statically. */
6833
0a1b45a2 6834static bool
bd6c6e2b
AM
6835is_static_defined (struct elf_link_hash_entry *h)
6836{
6837 return ((h->root.type == bfd_link_hash_defined
6838 || h->root.type == bfd_link_hash_defweak)
6839 && h->root.u.def.section != NULL
6840 && h->root.u.def.section->output_section != NULL);
6841}
6842
2d0f3896
AM
6843/* If INSN is an opcode that may be used with an @tls operand, return
6844 the transformed insn for TLS optimisation, otherwise return 0. If
6845 REG is non-zero only match an insn with RB or RA equal to REG. */
6846
6847unsigned int
6848_bfd_elf_ppc_at_tls_transform (unsigned int insn, unsigned int reg)
6849{
6850 unsigned int rtra;
6851
2365f8d7 6852 if ((insn & (0x3fu << 26)) != 31 << 26)
2d0f3896
AM
6853 return 0;
6854
6855 if (reg == 0 || ((insn >> 11) & 0x1f) == reg)
6856 rtra = insn & ((1 << 26) - (1 << 16));
6857 else if (((insn >> 16) & 0x1f) == reg)
6858 rtra = (insn & (0x1f << 21)) | ((insn & (0x1f << 11)) << 5);
6859 else
6860 return 0;
6861
6862 if ((insn & (0x3ff << 1)) == 266 << 1)
6863 /* add -> addi. */
6864 insn = 14 << 26;
6865 else if ((insn & (0x1f << 1)) == 23 << 1
6866 && ((insn & (0x1f << 6)) < 14 << 6
6867 || ((insn & (0x1f << 6)) >= 16 << 6
6868 && (insn & (0x1f << 6)) < 24 << 6)))
6869 /* load and store indexed -> dform. */
2365f8d7 6870 insn = (32u | ((insn >> 6) & 0x1f)) << 26;
2d0f3896
AM
6871 else if ((insn & (((0x1a << 5) | 0x1f) << 1)) == 21 << 1)
6872 /* ldx, ldux, stdx, stdux -> ld, ldu, std, stdu. */
2365f8d7 6873 insn = ((58u | ((insn >> 6) & 4)) << 26) | ((insn >> 6) & 1);
2d0f3896
AM
6874 else if ((insn & (((0x1f << 5) | 0x1f) << 1)) == 341 << 1)
6875 /* lwax -> lwa. */
2365f8d7 6876 insn = (58u << 26) | 2;
2d0f3896
AM
6877 else
6878 return 0;
6879 insn |= rtra;
6880 return insn;
6881}
6882
766bc656
AM
6883/* If INSN is an opcode that may be used with an @tprel operand, return
6884 the transformed insn for an undefined weak symbol, ie. with the
6885 thread pointer REG operand removed. Otherwise return 0. */
6886
6887unsigned int
6888_bfd_elf_ppc_at_tprel_transform (unsigned int insn, unsigned int reg)
6889{
6890 if ((insn & (0x1f << 16)) == reg << 16
2365f8d7
AM
6891 && ((insn & (0x3fu << 26)) == 14u << 26 /* addi */
6892 || (insn & (0x3fu << 26)) == 15u << 26 /* addis */
6893 || (insn & (0x3fu << 26)) == 32u << 26 /* lwz */
6894 || (insn & (0x3fu << 26)) == 34u << 26 /* lbz */
6895 || (insn & (0x3fu << 26)) == 36u << 26 /* stw */
6896 || (insn & (0x3fu << 26)) == 38u << 26 /* stb */
6897 || (insn & (0x3fu << 26)) == 40u << 26 /* lhz */
6898 || (insn & (0x3fu << 26)) == 42u << 26 /* lha */
6899 || (insn & (0x3fu << 26)) == 44u << 26 /* sth */
6900 || (insn & (0x3fu << 26)) == 46u << 26 /* lmw */
6901 || (insn & (0x3fu << 26)) == 47u << 26 /* stmw */
6902 || (insn & (0x3fu << 26)) == 48u << 26 /* lfs */
6903 || (insn & (0x3fu << 26)) == 50u << 26 /* lfd */
6904 || (insn & (0x3fu << 26)) == 52u << 26 /* stfs */
6905 || (insn & (0x3fu << 26)) == 54u << 26 /* stfd */
6906 || ((insn & (0x3fu << 26)) == 58u << 26 /* lwa,ld,lmd */
766bc656 6907 && (insn & 3) != 1)
2365f8d7 6908 || ((insn & (0x3fu << 26)) == 62u << 26 /* std, stmd */
766bc656
AM
6909 && ((insn & 3) == 0 || (insn & 3) == 3))))
6910 {
6911 insn &= ~(0x1f << 16);
6912 }
6913 else if ((insn & (0x1f << 21)) == reg << 21
2365f8d7
AM
6914 && ((insn & (0x3eu << 26)) == 24u << 26 /* ori, oris */
6915 || (insn & (0x3eu << 26)) == 26u << 26 /* xori,xoris */
6916 || (insn & (0x3eu << 26)) == 28u << 26 /* andi,andis */))
766bc656
AM
6917 {
6918 insn &= ~(0x1f << 21);
6919 insn |= (insn & (0x1f << 16)) << 5;
2365f8d7 6920 if ((insn & (0x3eu << 26)) == 26u << 26 /* xori,xoris */)
766bc656
AM
6921 insn -= 2 >> 26; /* convert to ori,oris */
6922 }
6923 else
6924 insn = 0;
6925 return insn;
6926}
6927
0a1b45a2 6928static bool
1fe532cf
AM
6929is_insn_ds_form (unsigned int insn)
6930{
2365f8d7
AM
6931 return ((insn & (0x3fu << 26)) == 58u << 26 /* ld,ldu,lwa */
6932 || (insn & (0x3fu << 26)) == 62u << 26 /* std,stdu,stq */
6933 || (insn & (0x3fu << 26)) == 57u << 26 /* lfdp */
6934 || (insn & (0x3fu << 26)) == 61u << 26 /* stfdp */);
1fe532cf
AM
6935}
6936
0a1b45a2 6937static bool
1fe532cf
AM
6938is_insn_dq_form (unsigned int insn)
6939{
2365f8d7
AM
6940 return ((insn & (0x3fu << 26)) == 56u << 26 /* lq */
6941 || ((insn & (0x3fu << 26)) == (61u << 26) /* lxv, stxv */
a680de9a 6942 && (insn & 3) == 1));
1fe532cf
AM
6943}
6944
066c738e
AM
6945static bool
6946swap_reloc_out (bfd *obfd, Elf_Internal_Rela *rel, bfd_byte *loc, asection *s)
6947{
6948 if ((size_t) (loc - s->contents) >= s->size)
6949 return false;
6950 bfd_elf32_swap_reloca_out (obfd, rel, loc);
6951 return true;
6952}
6953
6954static bool
6955count_and_swap_reloc_out (bfd *obfd, Elf_Internal_Rela *rel, asection *s)
6956{
6957 bfd_byte *loc = s->contents;
6958 loc += s->reloc_count++ * sizeof (Elf32_External_Rela);
6959 return swap_reloc_out (obfd, rel, loc, s);
6960}
6961
252b5132
RH
6962/* The RELOCATE_SECTION function is called by the ELF backend linker
6963 to handle the relocations for a section.
6964
6965 The relocs are always passed as Rela structures; if the section
6966 actually uses Rel structures, the r_addend field will always be
6967 zero.
6968
6969 This function is responsible for adjust the section contents as
6970 necessary, and (if using Rela relocs and generating a
1049f94e 6971 relocatable output file) adjusting the reloc addend as
252b5132
RH
6972 necessary.
6973
6974 This function does not have to worry about setting the reloc
6975 address or the reloc symbol index.
6976
6977 LOCAL_SYMS is a pointer to the swapped in local symbols.
6978
6979 LOCAL_SECTIONS is an array giving the section in the input file
6980 corresponding to the st_shndx field of each local symbol.
6981
6982 The global hash table entry for the global symbols can be found
6983 via elf_sym_hashes (input_bfd).
6984
1049f94e 6985 When generating relocatable output, this function must handle
252b5132
RH
6986 STB_LOCAL/STT_SECTION symbols specially. The output symbol is
6987 going to be the section symbol corresponding to the output
6988 section, which means that the addend must be adjusted
6989 accordingly. */
6990
0f684201 6991static int
55fd94b0
AM
6992ppc_elf_relocate_section (bfd *output_bfd,
6993 struct bfd_link_info *info,
6994 bfd *input_bfd,
6995 asection *input_section,
6996 bfd_byte *contents,
6997 Elf_Internal_Rela *relocs,
6998 Elf_Internal_Sym *local_syms,
6999 asection **local_sections)
252b5132 7000{
7619e7c7
AM
7001 Elf_Internal_Shdr *symtab_hdr;
7002 struct elf_link_hash_entry **sym_hashes;
7003 struct ppc_elf_link_hash_table *htab;
7004 Elf_Internal_Rela *rel;
c316a17c 7005 Elf_Internal_Rela *wrel;
7619e7c7
AM
7006 Elf_Internal_Rela *relend;
7007 Elf_Internal_Rela outrel;
f95f8542 7008 asection *got2;
252b5132 7009 bfd_vma *local_got_offsets;
0a1b45a2 7010 bool ret = true;
95f0d0d2 7011 bfd_vma d_offset = (bfd_big_endian (input_bfd) ? 2 : 0);
0a1b45a2 7012 bool is_vxworks_tls;
d3e454b9
AM
7013 unsigned int picfixup_size = 0;
7014 struct ppc_elf_relax_info *relax_info = NULL;
b34976b6 7015
252b5132 7016#ifdef DEBUG
871b3ab2 7017 _bfd_error_handler ("ppc_elf_relocate_section called for %pB section %pA, "
d003868e
AM
7018 "%ld relocations%s",
7019 input_bfd, input_section,
7020 (long) input_section->reloc_count,
0e1862bb 7021 (bfd_link_relocatable (info)) ? " (relocatable)" : "");
252b5132
RH
7022#endif
7023
7af5d5c4
AM
7024 if (!is_ppc_elf (input_bfd))
7025 {
7026 bfd_set_error (bfd_error_wrong_format);
0a1b45a2 7027 return false;
7af5d5c4
AM
7028 }
7029
a6aa5195
AM
7030 got2 = bfd_get_section_by_name (input_bfd, ".got2");
7031
e47cd125 7032 /* Initialize howto table if not already done. */
8da6118f 7033 if (!ppc_elf_howto_table[R_PPC_ADDR32])
252b5132
RH
7034 ppc_elf_howto_init ();
7035
7619e7c7 7036 htab = ppc_elf_hash_table (info);
252b5132 7037 local_got_offsets = elf_local_got_offsets (input_bfd);
0ffa91dd 7038 symtab_hdr = &elf_symtab_hdr (input_bfd);
7619e7c7 7039 sym_hashes = elf_sym_hashes (input_bfd);
3348747a
NS
7040 /* We have to handle relocations in vxworks .tls_vars sections
7041 specially, because the dynamic loader is 'weird'. */
90c14f0c 7042 is_vxworks_tls = (htab->elf.target_os == is_vxworks && bfd_link_pic (info)
3348747a
NS
7043 && !strcmp (input_section->output_section->name,
7044 ".tls_vars"));
d3e454b9
AM
7045 if (input_section->sec_info_type == SEC_INFO_TYPE_TARGET)
7046 relax_info = elf_section_data (input_section)->sec_info;
c316a17c 7047 rel = wrel = relocs;
7619e7c7 7048 relend = relocs + input_section->reloc_count;
c316a17c 7049 for (; rel < relend; wrel++, rel++)
252b5132 7050 {
7619e7c7
AM
7051 enum elf_ppc_reloc_type r_type;
7052 bfd_vma addend;
7053 bfd_reloc_status_type r;
7054 Elf_Internal_Sym *sym;
7055 asection *sec;
7056 struct elf_link_hash_entry *h;
7057 const char *sym_name;
252b5132
RH
7058 reloc_howto_type *howto;
7059 unsigned long r_symndx;
7060 bfd_vma relocation;
91d6fa6a 7061 bfd_vma branch_bit, from;
0a1b45a2
AM
7062 bool unresolved_reloc, save_unresolved_reloc;
7063 bool warned;
7619e7c7 7064 unsigned int tls_type, tls_mask, tls_gd;
08be3224 7065 struct plt_entry **ifunc, **plt_list;
86c95733 7066 struct reloc_howto_struct alt_howto;
7619e7c7 7067
c316a17c 7068 again:
55fd94b0
AM
7069 r_type = ELF32_R_TYPE (rel->r_info);
7070 sym = NULL;
7071 sec = NULL;
7072 h = NULL;
0a1b45a2
AM
7073 unresolved_reloc = false;
7074 warned = false;
252b5132 7075 r_symndx = ELF32_R_SYM (rel->r_info);
560e09e9 7076
252b5132
RH
7077 if (r_symndx < symtab_hdr->sh_info)
7078 {
7079 sym = local_syms + r_symndx;
7080 sec = local_sections[r_symndx];
26c61ae5 7081 sym_name = bfd_elf_sym_name (input_bfd, symtab_hdr, sym, sec);
252b5132 7082
8517fae7 7083 relocation = _bfd_elf_rela_local_sym (output_bfd, sym, &sec, rel);
252b5132
RH
7084 }
7085 else
7086 {
0a1b45a2 7087 bool ignored;
62d887d4 7088
b2a8e766
AM
7089 RELOC_FOR_GLOBAL_SYMBOL (info, input_bfd, input_section, rel,
7090 r_symndx, symtab_hdr, sym_hashes,
7091 h, sec, relocation,
62d887d4 7092 unresolved_reloc, warned, ignored);
9abc968f 7093
252b5132 7094 sym_name = h->root.root.string;
7619e7c7
AM
7095 }
7096
dbaa2011 7097 if (sec != NULL && discarded_section (sec))
ab96bf03
AM
7098 {
7099 /* For relocs against symbols from removed linkonce sections,
7100 or sections discarded by a linker script, we just want the
7101 section contents zeroed. Avoid any special processing. */
7102 howto = NULL;
7103 if (r_type < R_PPC_max)
7104 howto = ppc_elf_howto_table[r_type];
c316a17c
AM
7105
7106 _bfd_clear_contents (howto, input_bfd, input_section,
0930cb30 7107 contents, rel->r_offset);
c316a17c
AM
7108 wrel->r_offset = rel->r_offset;
7109 wrel->r_info = 0;
7110 wrel->r_addend = 0;
7111
7112 /* For ld -r, remove relocations in debug sections against
dcd2b8a0 7113 symbols defined in discarded sections. Not done for
c316a17c
AM
7114 non-debug to preserve relocs in .eh_frame which the
7115 eh_frame editing code expects to be present. */
7116 if (bfd_link_relocatable (info)
7117 && (input_section->flags & SEC_DEBUGGING))
7118 wrel--;
7119
7120 continue;
ab96bf03
AM
7121 }
7122
0e1862bb 7123 if (bfd_link_relocatable (info))
ab96bf03
AM
7124 {
7125 if (got2 != NULL
7126 && r_type == R_PPC_PLTREL24
f75e0e33 7127 && rel->r_addend != 0)
ab96bf03
AM
7128 {
7129 /* R_PPC_PLTREL24 is rather special. If non-zero, the
7130 addend specifies the GOT pointer offset within .got2. */
7131 rel->r_addend += got2->output_offset;
7132 }
53291d1f
AM
7133 if (r_type != R_PPC_RELAX_PLT
7134 && r_type != R_PPC_RELAX_PLTREL24
7135 && r_type != R_PPC_RELAX)
c316a17c 7136 goto copy_reloc;
ab96bf03
AM
7137 }
7138
7619e7c7
AM
7139 /* TLS optimizations. Replace instruction sequences and relocs
7140 based on information we collected in tls_optimize. We edit
7141 RELOCS so that --emit-relocs will output something sensible
7142 for the final instruction stream. */
7143 tls_mask = 0;
7144 tls_gd = 0;
727fc41e
AM
7145 if (h != NULL)
7146 tls_mask = ((struct ppc_elf_link_hash_entry *) h)->tls_mask;
7147 else if (local_got_offsets != NULL)
7619e7c7 7148 {
e054468f 7149 struct plt_entry **local_plt;
727fc41e 7150 char *lgot_masks;
e054468f
AM
7151 local_plt
7152 = (struct plt_entry **) (local_got_offsets + symtab_hdr->sh_info);
7153 lgot_masks = (char *) (local_plt + symtab_hdr->sh_info);
727fc41e 7154 tls_mask = lgot_masks[r_symndx];
7619e7c7
AM
7155 }
7156
7157 /* Ensure reloc mapping code below stays sane. */
7158 if ((R_PPC_GOT_TLSLD16 & 3) != (R_PPC_GOT_TLSGD16 & 3)
7159 || (R_PPC_GOT_TLSLD16_LO & 3) != (R_PPC_GOT_TLSGD16_LO & 3)
7160 || (R_PPC_GOT_TLSLD16_HI & 3) != (R_PPC_GOT_TLSGD16_HI & 3)
7161 || (R_PPC_GOT_TLSLD16_HA & 3) != (R_PPC_GOT_TLSGD16_HA & 3)
7162 || (R_PPC_GOT_TLSLD16 & 3) != (R_PPC_GOT_TPREL16 & 3)
7163 || (R_PPC_GOT_TLSLD16_LO & 3) != (R_PPC_GOT_TPREL16_LO & 3)
7164 || (R_PPC_GOT_TLSLD16_HI & 3) != (R_PPC_GOT_TPREL16_HI & 3)
7165 || (R_PPC_GOT_TLSLD16_HA & 3) != (R_PPC_GOT_TPREL16_HA & 3))
7166 abort ();
7167 switch (r_type)
7168 {
7169 default:
7170 break;
7171
7172 case R_PPC_GOT_TPREL16:
7173 case R_PPC_GOT_TPREL16_LO:
e054468f 7174 if ((tls_mask & TLS_TLS) != 0
e7776f52
AM
7175 && (tls_mask & TLS_TPREL) == 0
7176 && offset_in_range (input_section, rel->r_offset - d_offset, 4))
7619e7c7
AM
7177 {
7178 bfd_vma insn;
91d6fa6a 7179
95f0d0d2 7180 insn = bfd_get_32 (input_bfd,
c316a17c 7181 contents + rel->r_offset - d_offset);
7619e7c7
AM
7182 insn &= 31 << 21;
7183 insn |= 0x3c020000; /* addis 0,2,0 */
95f0d0d2 7184 bfd_put_32 (input_bfd, insn,
c316a17c 7185 contents + rel->r_offset - d_offset);
7619e7c7
AM
7186 r_type = R_PPC_TPREL16_HA;
7187 rel->r_info = ELF32_R_INFO (r_symndx, r_type);
7188 }
7189 break;
7190
7191 case R_PPC_TLS:
e054468f 7192 if ((tls_mask & TLS_TLS) != 0
e7776f52
AM
7193 && (tls_mask & TLS_TPREL) == 0
7194 && offset_in_range (input_section, rel->r_offset, 4))
7619e7c7 7195 {
2d0f3896
AM
7196 bfd_vma insn;
7197
95f0d0d2 7198 insn = bfd_get_32 (input_bfd, contents + rel->r_offset);
2d0f3896
AM
7199 insn = _bfd_elf_ppc_at_tls_transform (insn, 2);
7200 if (insn == 0)
7619e7c7 7201 abort ();
95f0d0d2 7202 bfd_put_32 (input_bfd, insn, contents + rel->r_offset);
7619e7c7
AM
7203 r_type = R_PPC_TPREL16_LO;
7204 rel->r_info = ELF32_R_INFO (r_symndx, r_type);
4fe5ca5b 7205
7619e7c7 7206 /* Was PPC_TLS which sits on insn boundary, now
4fe5ca5b
GM
7207 PPC_TPREL16_LO which is at low-order half-word. */
7208 rel->r_offset += d_offset;
7619e7c7
AM
7209 }
7210 break;
7211
7212 case R_PPC_GOT_TLSGD16_HI:
7213 case R_PPC_GOT_TLSGD16_HA:
b00a0a86 7214 tls_gd = TLS_GDIE;
e7776f52
AM
7215 if ((tls_mask & TLS_TLS) != 0 && (tls_mask & TLS_GD) == 0
7216 && offset_in_range (input_section, rel->r_offset - d_offset, 4))
7619e7c7
AM
7217 goto tls_gdld_hi;
7218 break;
7219
7220 case R_PPC_GOT_TLSLD16_HI:
7221 case R_PPC_GOT_TLSLD16_HA:
e7776f52
AM
7222 if ((tls_mask & TLS_TLS) != 0 && (tls_mask & TLS_LD) == 0
7223 && offset_in_range (input_section, rel->r_offset - d_offset, 4))
7619e7c7
AM
7224 {
7225 tls_gdld_hi:
7226 if ((tls_mask & tls_gd) != 0)
7227 r_type = (((r_type - (R_PPC_GOT_TLSGD16 & 3)) & 3)
7228 + R_PPC_GOT_TPREL16);
7229 else
7230 {
4fe5ca5b 7231 rel->r_offset -= d_offset;
95f0d0d2 7232 bfd_put_32 (input_bfd, NOP, contents + rel->r_offset);
7619e7c7
AM
7233 r_type = R_PPC_NONE;
7234 }
7235 rel->r_info = ELF32_R_INFO (r_symndx, r_type);
7236 }
7237 break;
7238
7239 case R_PPC_GOT_TLSGD16:
7240 case R_PPC_GOT_TLSGD16_LO:
b00a0a86 7241 tls_gd = TLS_GDIE;
e7776f52
AM
7242 if ((tls_mask & TLS_TLS) != 0 && (tls_mask & TLS_GD) == 0
7243 && offset_in_range (input_section, rel->r_offset - d_offset, 4))
b7fcf6f6 7244 goto tls_ldgd_opt;
7619e7c7
AM
7245 break;
7246
7247 case R_PPC_GOT_TLSLD16:
7248 case R_PPC_GOT_TLSLD16_LO:
e7776f52
AM
7249 if ((tls_mask & TLS_TLS) != 0 && (tls_mask & TLS_LD) == 0
7250 && offset_in_range (input_section, rel->r_offset - d_offset, 4))
7619e7c7 7251 {
3a71aa26 7252 unsigned int insn1, insn2;
b7fcf6f6 7253 bfd_vma offset;
7619e7c7 7254
b7fcf6f6 7255 tls_ldgd_opt:
727fc41e
AM
7256 offset = (bfd_vma) -1;
7257 /* If not using the newer R_PPC_TLSGD/LD to mark
7258 __tls_get_addr calls, we must trust that the call
7259 stays with its arg setup insns, ie. that the next
7260 reloc is the __tls_get_addr call associated with
7261 the current reloc. Edit both insns. */
9737e8af 7262 if (input_section->nomark_tls_get_addr
727fc41e
AM
7263 && rel + 1 < relend
7264 && branch_reloc_hash_match (input_bfd, rel + 1,
7265 htab->tls_get_addr))
7266 offset = rel[1].r_offset;
b86ac8e3
AM
7267 /* We read the low GOT_TLS insn because we need to keep
7268 the destination reg. It may be something other than
7269 the usual r3, and moved to r3 before the call by
7270 intervening code. */
95f0d0d2 7271 insn1 = bfd_get_32 (input_bfd,
b86ac8e3 7272 contents + rel->r_offset - d_offset);
b7fcf6f6
AM
7273 if ((tls_mask & tls_gd) != 0)
7274 {
7275 /* IE */
b86ac8e3 7276 insn1 &= (0x1f << 21) | (0x1f << 16);
2365f8d7 7277 insn1 |= 32u << 26; /* lwz */
e7776f52
AM
7278 if (offset != (bfd_vma) -1
7279 && offset_in_range (input_section, offset, 4))
727fc41e 7280 {
f58d5a2d 7281 rel[1].r_info = ELF32_R_INFO (STN_UNDEF, R_PPC_NONE);
727fc41e 7282 insn2 = 0x7c631214; /* add 3,3,2 */
95f0d0d2 7283 bfd_put_32 (input_bfd, insn2, contents + offset);
727fc41e 7284 }
b7fcf6f6
AM
7285 r_type = (((r_type - (R_PPC_GOT_TLSGD16 & 3)) & 3)
7286 + R_PPC_GOT_TPREL16);
7287 rel->r_info = ELF32_R_INFO (r_symndx, r_type);
7288 }
7289 else
7290 {
7291 /* LE */
b86ac8e3
AM
7292 insn1 &= 0x1f << 21;
7293 insn1 |= 0x3c020000; /* addis r,2,0 */
7619e7c7
AM
7294 if (tls_gd == 0)
7295 {
b7fcf6f6 7296 /* Was an LD reloc. */
1d483afe
AM
7297 for (r_symndx = 0;
7298 r_symndx < symtab_hdr->sh_info;
7299 r_symndx++)
7300 if (local_sections[r_symndx] == sec)
7301 break;
7302 if (r_symndx >= symtab_hdr->sh_info)
cf35638d 7303 r_symndx = STN_UNDEF;
b7fcf6f6 7304 rel->r_addend = htab->elf.tls_sec->vma + DTP_OFFSET;
cf35638d 7305 if (r_symndx != STN_UNDEF)
1d483afe
AM
7306 rel->r_addend -= (local_syms[r_symndx].st_value
7307 + sec->output_offset
7308 + sec->output_section->vma);
7619e7c7 7309 }
b7fcf6f6
AM
7310 r_type = R_PPC_TPREL16_HA;
7311 rel->r_info = ELF32_R_INFO (r_symndx, r_type);
e7776f52
AM
7312 if (offset != (bfd_vma) -1
7313 && offset_in_range (input_section, offset, 4))
727fc41e
AM
7314 {
7315 rel[1].r_info = ELF32_R_INFO (r_symndx, R_PPC_TPREL16_LO);
7316 rel[1].r_offset = offset + d_offset;
7317 rel[1].r_addend = rel->r_addend;
7318 insn2 = 0x38630000; /* addi 3,3,0 */
95f0d0d2 7319 bfd_put_32 (input_bfd, insn2, contents + offset);
727fc41e 7320 }
b7fcf6f6 7321 }
95f0d0d2 7322 bfd_put_32 (input_bfd, insn1,
b7fcf6f6 7323 contents + rel->r_offset - d_offset);
b7fcf6f6
AM
7324 if (tls_gd == 0)
7325 {
7326 /* We changed the symbol on an LD reloc. Start over
7327 in order to get h, sym, sec etc. right. */
c316a17c 7328 goto again;
7619e7c7 7329 }
252b5132 7330 }
7619e7c7 7331 break;
727fc41e
AM
7332
7333 case R_PPC_TLSGD:
675e2809 7334 if ((tls_mask & TLS_TLS) != 0 && (tls_mask & TLS_GD) == 0
e7776f52
AM
7335 && rel + 1 < relend
7336 && offset_in_range (input_section, rel->r_offset, 4))
727fc41e
AM
7337 {
7338 unsigned int insn2;
7339 bfd_vma offset = rel->r_offset;
7340
23cedd1d
AM
7341 if (is_plt_seq_reloc (ELF32_R_TYPE (rel[1].r_info)))
7342 {
7343 bfd_put_32 (input_bfd, NOP, contents + offset);
7344 rel[1].r_info = ELF32_R_INFO (STN_UNDEF, R_PPC_NONE);
7345 break;
7346 }
7347
b00a0a86 7348 if ((tls_mask & TLS_GDIE) != 0)
727fc41e
AM
7349 {
7350 /* IE */
7351 r_type = R_PPC_NONE;
7352 insn2 = 0x7c631214; /* add 3,3,2 */
7353 }
7354 else
7355 {
7356 /* LE */
7357 r_type = R_PPC_TPREL16_LO;
7358 rel->r_offset += d_offset;
7359 insn2 = 0x38630000; /* addi 3,3,0 */
7360 }
7361 rel->r_info = ELF32_R_INFO (r_symndx, r_type);
95f0d0d2 7362 bfd_put_32 (input_bfd, insn2, contents + offset);
727fc41e
AM
7363 /* Zap the reloc on the _tls_get_addr call too. */
7364 BFD_ASSERT (offset == rel[1].r_offset);
f58d5a2d 7365 rel[1].r_info = ELF32_R_INFO (STN_UNDEF, R_PPC_NONE);
727fc41e
AM
7366 }
7367 break;
7368
7369 case R_PPC_TLSLD:
675e2809 7370 if ((tls_mask & TLS_TLS) != 0 && (tls_mask & TLS_LD) == 0
e7776f52
AM
7371 && rel + 1 < relend
7372 && offset_in_range (input_section, rel->r_offset, 4))
727fc41e
AM
7373 {
7374 unsigned int insn2;
7375
23cedd1d
AM
7376 if (is_plt_seq_reloc (ELF32_R_TYPE (rel[1].r_info)))
7377 {
7378 bfd_put_32 (input_bfd, NOP, contents + rel->r_offset);
7379 rel[1].r_info = ELF32_R_INFO (STN_UNDEF, R_PPC_NONE);
7380 break;
7381 }
7382
727fc41e
AM
7383 for (r_symndx = 0;
7384 r_symndx < symtab_hdr->sh_info;
7385 r_symndx++)
7386 if (local_sections[r_symndx] == sec)
7387 break;
7388 if (r_symndx >= symtab_hdr->sh_info)
cf35638d 7389 r_symndx = STN_UNDEF;
727fc41e 7390 rel->r_addend = htab->elf.tls_sec->vma + DTP_OFFSET;
cf35638d 7391 if (r_symndx != STN_UNDEF)
727fc41e
AM
7392 rel->r_addend -= (local_syms[r_symndx].st_value
7393 + sec->output_offset
7394 + sec->output_section->vma);
7395
7396 rel->r_info = ELF32_R_INFO (r_symndx, R_PPC_TPREL16_LO);
7397 rel->r_offset += d_offset;
7398 insn2 = 0x38630000; /* addi 3,3,0 */
95f0d0d2 7399 bfd_put_32 (input_bfd, insn2,
727fc41e
AM
7400 contents + rel->r_offset - d_offset);
7401 /* Zap the reloc on the _tls_get_addr call too. */
7402 BFD_ASSERT (rel->r_offset - d_offset == rel[1].r_offset);
f58d5a2d 7403 rel[1].r_info = ELF32_R_INFO (STN_UNDEF, R_PPC_NONE);
c316a17c 7404 goto again;
727fc41e
AM
7405 }
7406 break;
7619e7c7
AM
7407 }
7408
7409 /* Handle other relocations that tweak non-addend part of insn. */
7410 branch_bit = 0;
7411 switch (r_type)
7412 {
7413 default:
7414 break;
7415
7416 /* Branch taken prediction relocations. */
7417 case R_PPC_ADDR14_BRTAKEN:
7418 case R_PPC_REL14_BRTAKEN:
7419 branch_bit = BRANCH_PREDICT_BIT;
1a0670f3 7420 /* Fall through. */
7619e7c7 7421
4cc11e76 7422 /* Branch not taken prediction relocations. */
7619e7c7
AM
7423 case R_PPC_ADDR14_BRNTAKEN:
7424 case R_PPC_REL14_BRNTAKEN:
e7776f52
AM
7425 if (offset_in_range (input_section, rel->r_offset, 4))
7426 {
7427 unsigned int insn;
7619e7c7 7428
e7776f52
AM
7429 insn = bfd_get_32 (input_bfd, contents + rel->r_offset);
7430 insn &= ~BRANCH_PREDICT_BIT;
7431 insn |= branch_bit;
7619e7c7 7432
e7776f52
AM
7433 from = (rel->r_offset
7434 + input_section->output_offset
7435 + input_section->output_section->vma);
7619e7c7 7436
e7776f52
AM
7437 /* Invert 'y' bit if not the default. */
7438 if ((bfd_signed_vma) (relocation + rel->r_addend - from) < 0)
7439 insn ^= BRANCH_PREDICT_BIT;
91d6fa6a 7440
e7776f52
AM
7441 bfd_put_32 (input_bfd, insn, contents + rel->r_offset);
7442 }
08be3224
AM
7443 break;
7444
7445 case R_PPC_PLT16_HA:
e7776f52
AM
7446 if (offset_in_range (input_section, rel->r_offset - d_offset, 4))
7447 {
7448 unsigned int insn;
08be3224 7449
e7776f52
AM
7450 insn = bfd_get_32 (input_bfd,
7451 contents + rel->r_offset - d_offset);
7452 if ((insn & (0x3fu << 26)) == 15u << 26
7453 && (insn & (0x1f << 16)) != 0)
7454 {
7455 if (!bfd_link_pic (info))
7456 {
7457 /* Convert addis to lis. */
7458 insn &= ~(0x1f << 16);
7459 bfd_put_32 (input_bfd, insn,
7460 contents + rel->r_offset - d_offset);
7461 }
7462 }
7463 else if (bfd_link_pic (info))
7464 info->callbacks->einfo
7465 (_("%P: %H: error: %s with unexpected instruction %x\n"),
7466 input_bfd, input_section, rel->r_offset,
7467 "R_PPC_PLT16_HA", insn);
7468 }
08be3224 7469 break;
252b5132
RH
7470 }
7471
d3e454b9
AM
7472 if (ELIMINATE_COPY_RELOCS
7473 && h != NULL
7474 && !h->def_regular
7475 && h->protected_def
7476 && ppc_elf_hash_entry (h)->has_addr16_ha
7477 && ppc_elf_hash_entry (h)->has_addr16_lo
7478 && htab->params->pic_fixup > 0)
7479 {
7480 /* Convert lis;addi or lis;load/store accessing a protected
7481 variable defined in a shared library to PIC. */
7482 unsigned int insn;
7483
e7776f52
AM
7484 if (r_type == R_PPC_ADDR16_HA
7485 && offset_in_range (input_section, rel->r_offset - d_offset, 4))
d3e454b9 7486 {
95f0d0d2 7487 insn = bfd_get_32 (input_bfd,
d3e454b9 7488 contents + rel->r_offset - d_offset);
2365f8d7 7489 if ((insn & (0x3fu << 26)) == (15u << 26)
d3e454b9
AM
7490 && (insn & (0x1f << 16)) == 0 /* lis */)
7491 {
7492 bfd_byte *p;
7493 bfd_vma off;
7494 bfd_vma got_addr;
7495
7496 p = (contents + input_section->size
7497 - relax_info->workaround_size
7498 - relax_info->picfixup_size
7499 + picfixup_size);
7500 off = (p - contents) - (rel->r_offset - d_offset);
7501 if (off > 0x1fffffc || (off & 3) != 0)
7502 info->callbacks->einfo
174d0a74 7503 (_("%H: fixup branch overflow\n"),
d3e454b9
AM
7504 input_bfd, input_section, rel->r_offset);
7505
95f0d0d2 7506 bfd_put_32 (input_bfd, B | off,
d3e454b9 7507 contents + rel->r_offset - d_offset);
ce558b89
AM
7508 got_addr = (htab->elf.sgot->output_section->vma
7509 + htab->elf.sgot->output_offset
d3e454b9 7510 + (h->got.offset & ~1));
c316a17c
AM
7511 wrel->r_offset = (p - contents) + d_offset;
7512 wrel->r_info = ELF32_R_INFO (0, R_PPC_ADDR16_HA);
7513 wrel->r_addend = got_addr;
d3e454b9 7514 insn &= ~0xffff;
4aef7643 7515 insn |= ((unsigned int) (got_addr + 0x8000) >> 16) & 0xffff;
95f0d0d2 7516 bfd_put_32 (input_bfd, insn, p);
d3e454b9
AM
7517
7518 /* Convert lis to lwz, loading address from GOT. */
7519 insn &= ~0xffff;
7520 insn ^= (32u ^ 15u) << 26;
7521 insn |= (insn & (0x1f << 21)) >> 5;
7522 insn |= got_addr & 0xffff;
95f0d0d2 7523 bfd_put_32 (input_bfd, insn, p + 4);
d3e454b9 7524
95f0d0d2 7525 bfd_put_32 (input_bfd, B | ((-4 - off) & 0x3ffffff), p + 8);
d3e454b9
AM
7526 picfixup_size += 12;
7527
7528 /* Use one of the spare relocs, so --emit-relocs
7529 output is reasonable. */
7530 memmove (rel + 1, rel, (relend - rel - 1) * sizeof (*rel));
c316a17c
AM
7531 wrel++, rel++;
7532 rel->r_offset = wrel[-1].r_offset + 4;
d3e454b9 7533 rel->r_info = ELF32_R_INFO (0, R_PPC_ADDR16_LO);
c316a17c 7534 rel->r_addend = wrel[-1].r_addend;
d3e454b9
AM
7535
7536 /* Continue on as if we had a got reloc, to output
7537 dynamic reloc. */
7538 r_type = R_PPC_GOT16_LO;
7539 }
7540 else
2c4d9cbe 7541 _bfd_error_handler
695344c0 7542 /* xgettext:c-format */
2dcf00ce
AM
7543 (_("%pB(%pA+%#" PRIx64 "): error: "
7544 "%s with unexpected instruction %#x"),
7545 input_bfd, input_section, (uint64_t) rel->r_offset,
d3e454b9
AM
7546 "R_PPC_ADDR16_HA", insn);
7547 }
e7776f52
AM
7548 else if (r_type == R_PPC_ADDR16_LO
7549 && offset_in_range (input_section,
7550 rel->r_offset - d_offset, 4))
d3e454b9 7551 {
95f0d0d2 7552 insn = bfd_get_32 (input_bfd,
d3e454b9 7553 contents + rel->r_offset - d_offset);
2365f8d7
AM
7554 if ((insn & (0x3fu << 26)) == 14u << 26 /* addi */
7555 || (insn & (0x3fu << 26)) == 32u << 26 /* lwz */
7556 || (insn & (0x3fu << 26)) == 34u << 26 /* lbz */
7557 || (insn & (0x3fu << 26)) == 36u << 26 /* stw */
7558 || (insn & (0x3fu << 26)) == 38u << 26 /* stb */
7559 || (insn & (0x3fu << 26)) == 40u << 26 /* lhz */
7560 || (insn & (0x3fu << 26)) == 42u << 26 /* lha */
7561 || (insn & (0x3fu << 26)) == 44u << 26 /* sth */
7562 || (insn & (0x3fu << 26)) == 46u << 26 /* lmw */
7563 || (insn & (0x3fu << 26)) == 47u << 26 /* stmw */
7564 || (insn & (0x3fu << 26)) == 48u << 26 /* lfs */
7565 || (insn & (0x3fu << 26)) == 50u << 26 /* lfd */
7566 || (insn & (0x3fu << 26)) == 52u << 26 /* stfs */
7567 || (insn & (0x3fu << 26)) == 54u << 26 /* stfd */
7568 || ((insn & (0x3fu << 26)) == 58u << 26 /* lwa,ld,lmd */
d3e454b9 7569 && (insn & 3) != 1)
2365f8d7 7570 || ((insn & (0x3fu << 26)) == 62u << 26 /* std, stmd */
d3e454b9
AM
7571 && ((insn & 3) == 0 || (insn & 3) == 3)))
7572 {
7573 /* Arrange to apply the reloc addend, if any. */
7574 relocation = 0;
0a1b45a2 7575 unresolved_reloc = false;
d3e454b9
AM
7576 rel->r_info = ELF32_R_INFO (0, r_type);
7577 }
7578 else
2c4d9cbe 7579 _bfd_error_handler
695344c0 7580 /* xgettext:c-format */
2dcf00ce
AM
7581 (_("%pB(%pA+%#" PRIx64 "): error: "
7582 "%s with unexpected instruction %#x"),
7583 input_bfd, input_section, (uint64_t) rel->r_offset,
d3e454b9
AM
7584 "R_PPC_ADDR16_LO", insn);
7585 }
7586 }
7587
e054468f 7588 ifunc = NULL;
90c14f0c 7589 if (htab->elf.target_os != is_vxworks)
e054468f 7590 {
de972ffa
AM
7591 struct plt_entry *ent;
7592
e054468f
AM
7593 if (h != NULL)
7594 {
7595 if (h->type == STT_GNU_IFUNC)
7596 ifunc = &h->plt.plist;
7597 }
de972ffa
AM
7598 else if (local_got_offsets != NULL
7599 && ELF_ST_TYPE (sym->st_info) == STT_GNU_IFUNC)
e054468f 7600 {
de972ffa 7601 struct plt_entry **local_plt;
e054468f 7602
de972ffa
AM
7603 local_plt = (struct plt_entry **) (local_got_offsets
7604 + symtab_hdr->sh_info);
7605 ifunc = local_plt + r_symndx;
e054468f 7606 }
e054468f 7607
de972ffa
AM
7608 ent = NULL;
7609 if (ifunc != NULL
0e1862bb 7610 && (!bfd_link_pic (info)
08be3224
AM
7611 || is_branch_reloc (r_type)
7612 || r_type == R_PPC_PLT16_LO
7613 || r_type == R_PPC_PLT16_HI
7614 || r_type == R_PPC_PLT16_HA))
de972ffa
AM
7615 {
7616 addend = 0;
08be3224
AM
7617 if (bfd_link_pic (info)
7618 && (r_type == R_PPC_PLTREL24
7619 || r_type == R_PPC_PLT16_LO
7620 || r_type == R_PPC_PLT16_HI
7621 || r_type == R_PPC_PLT16_HA))
de972ffa
AM
7622 addend = rel->r_addend;
7623 ent = find_plt_ent (ifunc, got2, addend);
7624 }
7625 if (ent != NULL)
7626 {
888a7fc3
AM
7627 if (bfd_link_pic (info)
7628 && ent->sec != got2
7629 && htab->plt_type != PLT_NEW
7630 && (!htab->elf.dynamic_sections_created
7631 || h == NULL
7632 || h->dynindx == -1))
7633 {
7634 /* Uh oh, we are going to create a pic glink stub
7635 for an ifunc (here for h == NULL and later in
7636 finish_dynamic_symbol for h != NULL), and
7637 apparently are using code compiled with
7638 -mbss-plt. The difficulty is that -mbss-plt code
7639 gives no indication via a magic PLTREL24 addend
7640 whether r30 is equal to _GLOBAL_OFFSET_TABLE_ or
7641 is pointing into a .got2 section (and how far
7642 into .got2). */
7643 info->callbacks->einfo
695344c0 7644 /* xgettext:c-format */
174d0a74 7645 (_("%X%H: unsupported bss-plt -fPIC ifunc %s\n"),
888a7fc3
AM
7646 input_bfd, input_section, rel->r_offset, sym_name);
7647 }
e054468f 7648
0a1b45a2 7649 unresolved_reloc = false;
e054468f
AM
7650 if (htab->plt_type == PLT_NEW
7651 || !htab->elf.dynamic_sections_created
c7e17e05
AM
7652 || h == NULL
7653 || h->dynindx == -1)
e054468f
AM
7654 relocation = (htab->glink->output_section->vma
7655 + htab->glink->output_offset
7656 + (ent->glink_offset & ~1));
7657 else
ce558b89
AM
7658 relocation = (htab->elf.splt->output_section->vma
7659 + htab->elf.splt->output_offset
e054468f
AM
7660 + ent->plt.offset);
7661 }
7662 }
7663
7619e7c7 7664 addend = rel->r_addend;
23cedd1d 7665 save_unresolved_reloc = unresolved_reloc;
7619e7c7 7666 howto = NULL;
55fd94b0
AM
7667 if (r_type < R_PPC_max)
7668 howto = ppc_elf_howto_table[r_type];
9a23f96e 7669
9a23f96e 7670 tls_type = 0;
7619e7c7 7671 switch (r_type)
252b5132
RH
7672 {
7673 default:
e7776f52
AM
7674 de_fault:
7675 if (howto)
7676 /* xgettext:c-format */
7677 _bfd_error_handler (_("%pB: %s unsupported"),
7678 input_bfd, howto->name);
7679 else
7680 /* xgettext:c-format */
7681 _bfd_error_handler (_("%pB: reloc %#x unsupported"),
7682 input_bfd, r_type);
252b5132
RH
7683
7684 bfd_set_error (bfd_error_bad_value);
0a1b45a2 7685 ret = false;
c316a17c 7686 goto copy_reloc;
252b5132 7687
7619e7c7
AM
7688 case R_PPC_NONE:
7689 case R_PPC_TLS:
727fc41e
AM
7690 case R_PPC_TLSGD:
7691 case R_PPC_TLSLD:
7619e7c7
AM
7692 case R_PPC_EMB_MRKREF:
7693 case R_PPC_GNU_VTINHERIT:
7694 case R_PPC_GNU_VTENTRY:
c316a17c 7695 goto copy_reloc;
7595d193 7696
7619e7c7
AM
7697 /* GOT16 relocations. Like an ADDR16 using the symbol's
7698 address in the GOT as relocation value instead of the
7699 symbol's value itself. Also, create a GOT entry for the
7700 symbol and put the symbol value there. */
7701 case R_PPC_GOT_TLSGD16:
7702 case R_PPC_GOT_TLSGD16_LO:
7703 case R_PPC_GOT_TLSGD16_HI:
7704 case R_PPC_GOT_TLSGD16_HA:
7705 tls_type = TLS_TLS | TLS_GD;
7706 goto dogot;
7707
7708 case R_PPC_GOT_TLSLD16:
7709 case R_PPC_GOT_TLSLD16_LO:
7710 case R_PPC_GOT_TLSLD16_HI:
7711 case R_PPC_GOT_TLSLD16_HA:
7712 tls_type = TLS_TLS | TLS_LD;
7713 goto dogot;
7714
7715 case R_PPC_GOT_TPREL16:
7716 case R_PPC_GOT_TPREL16_LO:
7717 case R_PPC_GOT_TPREL16_HI:
7718 case R_PPC_GOT_TPREL16_HA:
7719 tls_type = TLS_TLS | TLS_TPREL;
7720 goto dogot;
7721
7722 case R_PPC_GOT_DTPREL16:
7723 case R_PPC_GOT_DTPREL16_LO:
7724 case R_PPC_GOT_DTPREL16_HI:
7725 case R_PPC_GOT_DTPREL16_HA:
7726 tls_type = TLS_TLS | TLS_DTPREL;
7727 goto dogot;
7728
7729 case R_PPC_GOT16:
7730 case R_PPC_GOT16_LO:
7731 case R_PPC_GOT16_HI:
7732 case R_PPC_GOT16_HA:
727fc41e 7733 tls_mask = 0;
7619e7c7
AM
7734 dogot:
7735 {
7736 /* Relocation is to the entry for this symbol in the global
7737 offset table. */
7738 bfd_vma off;
7739 bfd_vma *offp;
7740 unsigned long indx;
7741
ce558b89 7742 if (htab->elf.sgot == NULL)
7619e7c7
AM
7743 abort ();
7744
7745 indx = 0;
7746 if (tls_type == (TLS_TLS | TLS_LD)
f749f26e 7747 && SYMBOL_REFERENCES_LOCAL (info, h))
7619e7c7
AM
7748 offp = &htab->tlsld_got.offset;
7749 else if (h != NULL)
7750 {
f0158f44
AM
7751 if (!htab->elf.dynamic_sections_created
7752 || h->dynindx == -1
7753 || SYMBOL_REFERENCES_LOCAL (info, h)
21d68fcd 7754 || UNDEFWEAK_NO_DYNAMIC_RELOC (info, h))
7619e7c7
AM
7755 /* This is actually a static link, or it is a
7756 -Bsymbolic link and the symbol is defined
7757 locally, or the symbol was forced to be local
7758 because of a version file. */
7759 ;
7760 else
7761 {
7762 indx = h->dynindx;
0a1b45a2 7763 unresolved_reloc = false;
7619e7c7
AM
7764 }
7765 offp = &h->got.offset;
7766 }
7767 else
7768 {
7769 if (local_got_offsets == NULL)
7770 abort ();
7771 offp = &local_got_offsets[r_symndx];
7772 }
7773
7774 /* The offset must always be a multiple of 4. We use the
7775 least significant bit to record whether we have already
7776 processed this entry. */
7777 off = *offp;
7778 if ((off & 1) != 0)
7779 off &= ~1;
7780 else
7781 {
37da22e5
AM
7782 unsigned int tls_m = ((tls_mask & TLS_TLS) != 0
7783 ? tls_mask & (TLS_LD | TLS_GD | TLS_DTPREL
b00a0a86 7784 | TLS_TPREL | TLS_GDIE)
37da22e5 7785 : 0);
70bccea4
AM
7786
7787 if (offp == &htab->tlsld_got.offset)
7788 tls_m = TLS_LD;
f749f26e
AM
7789 else if ((tls_m & TLS_LD) != 0
7790 && SYMBOL_REFERENCES_LOCAL (info, h))
70bccea4
AM
7791 tls_m &= ~TLS_LD;
7792
7793 /* We might have multiple got entries for this sym.
7794 Initialize them all. */
7795 do
7619e7c7 7796 {
70bccea4
AM
7797 int tls_ty = 0;
7798
7799 if ((tls_m & TLS_LD) != 0)
7619e7c7 7800 {
70bccea4
AM
7801 tls_ty = TLS_TLS | TLS_LD;
7802 tls_m &= ~TLS_LD;
7803 }
7804 else if ((tls_m & TLS_GD) != 0)
7805 {
7806 tls_ty = TLS_TLS | TLS_GD;
7807 tls_m &= ~TLS_GD;
7808 }
7809 else if ((tls_m & TLS_DTPREL) != 0)
7810 {
7811 tls_ty = TLS_TLS | TLS_DTPREL;
7812 tls_m &= ~TLS_DTPREL;
7813 }
b00a0a86 7814 else if ((tls_m & (TLS_TPREL | TLS_GDIE)) != 0)
70bccea4
AM
7815 {
7816 tls_ty = TLS_TLS | TLS_TPREL;
7817 tls_m = 0;
7619e7c7 7818 }
7619e7c7 7819
70bccea4 7820 /* Generate relocs for the dynamic linker. */
f0158f44
AM
7821 if (indx != 0
7822 || (bfd_link_pic (info)
7823 && (h == NULL
f749f26e
AM
7824 || !UNDEFWEAK_NO_DYNAMIC_RELOC (info, h))
7825 && !(tls_ty != 0
f15d0b54 7826 && bfd_link_executable (info)
7a9361c0
AM
7827 && SYMBOL_REFERENCES_LOCAL (info, h))
7828 && (h != NULL
7829 ? !bfd_is_abs_symbol (&h->root)
7830 : sym->st_shndx != SHN_ABS)))
7619e7c7 7831 {
ce558b89 7832 asection *rsec = htab->elf.srelgot;
91e21fb7 7833
0bed072f 7834 if (ifunc != NULL)
82e66161
AM
7835 {
7836 rsec = htab->elf.irelplt;
7837 if (indx == 0)
7838 htab->local_ifunc_resolver = 1;
7839 else if (is_static_defined (h))
7840 htab->maybe_local_ifunc_resolver = 1;
7841 }
ce558b89
AM
7842 outrel.r_offset = (htab->elf.sgot->output_section->vma
7843 + htab->elf.sgot->output_offset
70bccea4 7844 + off);
e515b051 7845 outrel.r_addend = 0;
70bccea4
AM
7846 if (tls_ty & (TLS_LD | TLS_GD))
7847 {
7848 outrel.r_info = ELF32_R_INFO (indx, R_PPC_DTPMOD32);
70bccea4
AM
7849 if (tls_ty == (TLS_TLS | TLS_GD))
7850 {
066c738e
AM
7851 BFD_ASSERT (count_and_swap_reloc_out (output_bfd,
7852 &outrel,
7853 rsec));
e515b051 7854 outrel.r_offset += 4;
70bccea4
AM
7855 outrel.r_info
7856 = ELF32_R_INFO (indx, R_PPC_DTPREL32);
70bccea4
AM
7857 }
7858 }
7859 else if (tls_ty == (TLS_TLS | TLS_DTPREL))
7860 outrel.r_info = ELF32_R_INFO (indx, R_PPC_DTPREL32);
7861 else if (tls_ty == (TLS_TLS | TLS_TPREL))
7862 outrel.r_info = ELF32_R_INFO (indx, R_PPC_TPREL32);
25f23106 7863 else if (indx != 0)
70bccea4 7864 outrel.r_info = ELF32_R_INFO (indx, R_PPC_GLOB_DAT);
25f23106
AM
7865 else if (ifunc != NULL)
7866 outrel.r_info = ELF32_R_INFO (0, R_PPC_IRELATIVE);
7867 else
7868 outrel.r_info = ELF32_R_INFO (0, R_PPC_RELATIVE);
d6e14abc 7869 if (indx == 0 && tls_ty != (TLS_TLS | TLS_LD))
e515b051
AM
7870 {
7871 outrel.r_addend += relocation;
7872 if (tls_ty & (TLS_GD | TLS_DTPREL | TLS_TPREL))
989f9879
AM
7873 {
7874 if (htab->elf.tls_sec == NULL)
7875 outrel.r_addend = 0;
7876 else
7877 outrel.r_addend -= htab->elf.tls_sec->vma;
7878 }
e515b051 7879 }
066c738e
AM
7880 BFD_ASSERT (count_and_swap_reloc_out (output_bfd,
7881 &outrel, rsec));
7619e7c7
AM
7882 }
7883
70bccea4
AM
7884 /* Init the .got section contents if we're not
7885 emitting a reloc. */
7886 else
7619e7c7 7887 {
70bccea4
AM
7888 bfd_vma value = relocation;
7889
f0158f44 7890 if (tls_ty != 0)
70bccea4 7891 {
989f9879
AM
7892 if (htab->elf.tls_sec == NULL)
7893 value = 0;
7894 else
7895 {
f0158f44
AM
7896 if (tls_ty & TLS_LD)
7897 value = 0;
7898 else
7899 value -= htab->elf.tls_sec->vma + DTP_OFFSET;
676ee2b5 7900 if (tls_ty & TLS_TPREL)
989f9879
AM
7901 value += DTP_OFFSET - TP_OFFSET;
7902 }
70bccea4 7903
f0158f44 7904 if (tls_ty & (TLS_LD | TLS_GD))
7b609f53 7905 {
95f0d0d2 7906 bfd_put_32 (input_bfd, value,
ce558b89 7907 htab->elf.sgot->contents + off + 4);
676ee2b5 7908 value = 1;
7b609f53 7909 }
70bccea4 7910 }
95f0d0d2 7911 bfd_put_32 (input_bfd, value,
ce558b89 7912 htab->elf.sgot->contents + off);
7619e7c7 7913 }
70bccea4
AM
7914
7915 off += 4;
7916 if (tls_ty & (TLS_LD | TLS_GD))
7917 off += 4;
7619e7c7 7918 }
70bccea4
AM
7919 while (tls_m != 0);
7920
7921 off = *offp;
7922 *offp = off | 1;
7619e7c7
AM
7923 }
7924
7925 if (off >= (bfd_vma) -2)
7926 abort ();
7927
70bccea4
AM
7928 if ((tls_type & TLS_TLS) != 0)
7929 {
7930 if (tls_type != (TLS_TLS | TLS_LD))
7931 {
7932 if ((tls_mask & TLS_LD) != 0
f749f26e 7933 && !SYMBOL_REFERENCES_LOCAL (info, h))
70bccea4
AM
7934 off += 8;
7935 if (tls_type != (TLS_TLS | TLS_GD))
7936 {
7937 if ((tls_mask & TLS_GD) != 0)
7938 off += 8;
7939 if (tls_type != (TLS_TLS | TLS_DTPREL))
7940 {
7941 if ((tls_mask & TLS_DTPREL) != 0)
7942 off += 4;
7943 }
7944 }
7945 }
7946 }
7947
d3e454b9
AM
7948 /* If here for a picfixup, we're done. */
7949 if (r_type != ELF32_R_TYPE (rel->r_info))
c316a17c 7950 goto copy_reloc;
d3e454b9 7951
ce558b89
AM
7952 relocation = (htab->elf.sgot->output_section->vma
7953 + htab->elf.sgot->output_offset
e87d4038
AM
7954 + off
7955 - SYM_VAL (htab->elf.hgot));
7619e7c7
AM
7956
7957 /* Addends on got relocations don't make much sense.
7958 x+off@got is actually x@got+off, and since the got is
7959 generated by a hash table traversal, the value in the
7960 got at entry m+n bears little relation to the entry m. */
7961 if (addend != 0)
25f53a85 7962 info->callbacks->einfo
695344c0 7963 /* xgettext:c-format */
174d0a74 7964 (_("%H: non-zero addend on %s reloc against `%s'\n"),
25f53a85 7965 input_bfd, input_section, rel->r_offset,
7b609f53 7966 howto->name,
7619e7c7
AM
7967 sym_name);
7968 }
86c95733 7969 break;
7619e7c7 7970
86c95733 7971 /* Relocations that need no special processing. */
7619e7c7 7972 case R_PPC_LOCAL24PC:
252b5132
RH
7973 /* It makes no sense to point a local relocation
7974 at a symbol not in this object. */
7b609f53 7975 if (unresolved_reloc)
252b5132 7976 {
1a72702b
AM
7977 (*info->callbacks->undefined_symbol) (info,
7978 h->root.root.string,
7979 input_bfd,
7980 input_section,
7981 rel->r_offset,
0a1b45a2 7982 true);
c316a17c 7983 goto copy_reloc;
252b5132 7984 }
888a7fc3
AM
7985 if (h != NULL && h->type == STT_GNU_IFUNC && bfd_link_pic (info))
7986 {
7987 /* @local on an ifunc does not really make sense since
7988 the ifunc resolver can take you anywhere. More
7989 seriously, calls to ifuncs must go through a plt call
7990 stub, and for pic the plt call stubs uses r30 to
7991 access the PLT. The problem is that a call that is
7992 local won't have the +32k reloc addend trick marking
7993 -fPIC code, so the linker won't know whether r30 is
7994 _GLOBAL_OFFSET_TABLE_ or pointing into a .got2 section. */
695344c0 7995 /* xgettext:c-format */
174d0a74 7996 info->callbacks->einfo (_("%X%H: @local call to ifunc %s\n"),
888a7fc3
AM
7997 input_bfd, input_section, rel->r_offset,
7998 h->root.root.string);
7999 }
252b5132
RH
8000 break;
8001
7619e7c7
AM
8002 case R_PPC_DTPREL16:
8003 case R_PPC_DTPREL16_LO:
8004 case R_PPC_DTPREL16_HI:
8005 case R_PPC_DTPREL16_HA:
989f9879
AM
8006 if (htab->elf.tls_sec != NULL)
8007 addend -= htab->elf.tls_sec->vma + DTP_OFFSET;
7619e7c7
AM
8008 break;
8009
70bccea4
AM
8010 /* Relocations that may need to be propagated if this is a shared
8011 object. */
7619e7c7
AM
8012 case R_PPC_TPREL16:
8013 case R_PPC_TPREL16_LO:
8014 case R_PPC_TPREL16_HI:
8015 case R_PPC_TPREL16_HA:
766bc656
AM
8016 if (h != NULL
8017 && h->root.type == bfd_link_hash_undefweak
e7776f52
AM
8018 && h->dynindx == -1
8019 && offset_in_range (input_section, rel->r_offset - d_offset, 4))
766bc656
AM
8020 {
8021 /* Make this relocation against an undefined weak symbol
8022 resolve to zero. This is really just a tweak, since
8023 code using weak externs ought to check that they are
8024 defined before using them. */
8025 bfd_byte *p = contents + rel->r_offset - d_offset;
95f0d0d2 8026 unsigned int insn = bfd_get_32 (input_bfd, p);
766bc656
AM
8027 insn = _bfd_elf_ppc_at_tprel_transform (insn, 2);
8028 if (insn != 0)
95f0d0d2 8029 bfd_put_32 (input_bfd, insn, p);
766bc656
AM
8030 break;
8031 }
989f9879
AM
8032 if (htab->elf.tls_sec != NULL)
8033 addend -= htab->elf.tls_sec->vma + TP_OFFSET;
7619e7c7 8034 /* The TPREL16 relocs shouldn't really be used in shared
7c8bbca5
AM
8035 libs or with non-local symbols as that will result in
8036 DT_TEXTREL being set, but support them anyway. */
7619e7c7
AM
8037 goto dodyn;
8038
8039 case R_PPC_TPREL32:
989f9879
AM
8040 if (htab->elf.tls_sec != NULL)
8041 addend -= htab->elf.tls_sec->vma + TP_OFFSET;
7619e7c7
AM
8042 goto dodyn;
8043
8044 case R_PPC_DTPREL32:
989f9879
AM
8045 if (htab->elf.tls_sec != NULL)
8046 addend -= htab->elf.tls_sec->vma + DTP_OFFSET;
7619e7c7
AM
8047 goto dodyn;
8048
e515b051
AM
8049 case R_PPC_DTPMOD32:
8050 relocation = 1;
8051 addend = 0;
8052 goto dodyn;
8053
d7128ce4
AM
8054 case R_PPC_REL16:
8055 case R_PPC_REL16_LO:
8056 case R_PPC_REL16_HI:
8057 case R_PPC_REL16_HA:
a680de9a 8058 case R_PPC_REL16DX_HA:
d7128ce4
AM
8059 break;
8060
7619e7c7 8061 case R_PPC_REL32:
625af618
AM
8062 if (h == NULL || h == htab->elf.hgot)
8063 break;
8064 /* fall through */
8065
8066 case R_PPC_ADDR32:
8067 case R_PPC_ADDR16:
8068 case R_PPC_ADDR16_LO:
8069 case R_PPC_ADDR16_HI:
8070 case R_PPC_ADDR16_HA:
8071 case R_PPC_UADDR32:
8072 case R_PPC_UADDR16:
8073 goto dodyn;
8074
b9c361e0
JL
8075 case R_PPC_VLE_REL8:
8076 case R_PPC_VLE_REL15:
8077 case R_PPC_VLE_REL24:
625af618 8078 case R_PPC_REL24:
7619e7c7
AM
8079 case R_PPC_REL14:
8080 case R_PPC_REL14_BRTAKEN:
8081 case R_PPC_REL14_BRNTAKEN:
252b5132
RH
8082 /* If these relocations are not to a named symbol, they can be
8083 handled right here, no need to bother the dynamic linker. */
89200bf8 8084 if (SYMBOL_CALLS_LOCAL (info, h)
3b36f7e6 8085 || h == htab->elf.hgot)
252b5132 8086 break;
70bccea4 8087 /* fall through */
252b5132 8088
7619e7c7 8089 case R_PPC_ADDR24:
7619e7c7
AM
8090 case R_PPC_ADDR14:
8091 case R_PPC_ADDR14_BRTAKEN:
8092 case R_PPC_ADDR14_BRNTAKEN:
0e1862bb 8093 if (h != NULL && !bfd_link_pic (info))
625af618
AM
8094 break;
8095 /* fall through */
8096
7619e7c7 8097 dodyn:
3348747a
NS
8098 if ((input_section->flags & SEC_ALLOC) == 0
8099 || is_vxworks_tls)
c87b5a93 8100 break;
c87b5a93 8101
287c7eaf
AM
8102 if (bfd_link_pic (info)
8103 ? ((h == NULL
190eb1dd 8104 || h->dyn_relocs != NULL)
287c7eaf
AM
8105 && ((h != NULL && pc_dynrelocs (h))
8106 || must_be_dyn_reloc (info, r_type)))
8107 : (h != NULL
190eb1dd 8108 && h->dyn_relocs != NULL))
252b5132 8109 {
0bb2d96a 8110 int skip;
f95f8542 8111 asection *sreloc;
82e66161
AM
8112 long indx = 0;
8113
252b5132 8114#ifdef DEBUG
55fd94b0
AM
8115 fprintf (stderr, "ppc_elf_relocate_section needs to "
8116 "create relocation for %s\n",
70bccea4
AM
8117 (h && h->root.root.string
8118 ? h->root.root.string : "<unknown>"));
252b5132
RH
8119#endif
8120
8121 /* When generating a shared object, these relocations
70bccea4
AM
8122 are copied into the output file to be resolved at run
8123 time. */
0bb2d96a 8124 skip = 0;
5b914448
AM
8125 outrel.r_offset = _bfd_elf_section_offset (output_bfd, info,
8126 input_section,
8127 rel->r_offset);
0bb2d96a
JJ
8128 if (outrel.r_offset == (bfd_vma) -1
8129 || outrel.r_offset == (bfd_vma) -2)
8130 skip = (int) outrel.r_offset;
252b5132
RH
8131 outrel.r_offset += (input_section->output_section->vma
8132 + input_section->output_offset);
8133
63f6e94f
AM
8134 /* Optimize unaligned reloc use. */
8135 if ((r_type == R_PPC_ADDR32 && (outrel.r_offset & 3) != 0)
8136 || (r_type == R_PPC_UADDR32 && (outrel.r_offset & 3) == 0))
8137 r_type ^= R_PPC_ADDR32 ^ R_PPC_UADDR32;
8138 if ((r_type == R_PPC_ADDR16 && (outrel.r_offset & 1) != 0)
8139 || (r_type == R_PPC_UADDR16 && (outrel.r_offset & 1) == 0))
8140 r_type ^= R_PPC_ADDR16 ^ R_PPC_UADDR16;
8141
252b5132
RH
8142 if (skip)
8143 memset (&outrel, 0, sizeof outrel);
21d68fcd 8144 else if (!SYMBOL_REFERENCES_LOCAL (info, h))
252b5132 8145 {
82e66161
AM
8146 indx = h->dynindx;
8147 BFD_ASSERT (indx != -1);
0a1b45a2 8148 unresolved_reloc = false;
82e66161 8149 outrel.r_info = ELF32_R_INFO (indx, r_type);
252b5132
RH
8150 outrel.r_addend = rel->r_addend;
8151 }
8152 else
8153 {
47388f4c
AM
8154 outrel.r_addend = relocation + rel->r_addend;
8155
25f23106 8156 if (r_type != R_PPC_ADDR32)
252b5132 8157 {
25f23106
AM
8158 if (ifunc != NULL)
8159 {
8160 /* If we get here when building a static
8161 executable, then the libc startup function
8162 responsible for applying indirect function
8163 relocations is going to complain about
8164 the reloc type.
8165 If we get here when building a dynamic
8166 executable, it will be because we have
8167 a text relocation. The dynamic loader
8168 will set the text segment writable and
8169 non-executable to apply text relocations.
8170 So we'll segfault when trying to run the
8171 indirection function to resolve the reloc. */
25f53a85 8172 info->callbacks->einfo
695344c0 8173 /* xgettext:c-format */
174d0a74 8174 (_("%H: relocation %s for indirect "
25f53a85
AM
8175 "function %s unsupported\n"),
8176 input_bfd, input_section, rel->r_offset,
25f23106
AM
8177 howto->name,
8178 sym_name);
0a1b45a2 8179 ret = false;
25f23106 8180 }
cf35638d 8181 else if (r_symndx == STN_UNDEF || bfd_is_abs_section (sec))
89200bf8 8182 ;
252b5132
RH
8183 else if (sec == NULL || sec->owner == NULL)
8184 {
8185 bfd_set_error (bfd_error_bad_value);
0a1b45a2 8186 ret = false;
252b5132
RH
8187 }
8188 else
8189 {
8190 asection *osec;
8191
47388f4c
AM
8192 /* We are turning this relocation into one
8193 against a section symbol. It would be
8194 proper to subtract the symbol's value,
8195 osec->vma, from the emitted reloc addend,
25f23106
AM
8196 but ld.so expects buggy relocs.
8197 FIXME: Why not always use a zero index? */
252b5132 8198 osec = sec->output_section;
f26a3287
AM
8199 if ((osec->flags & SEC_THREAD_LOCAL) != 0)
8200 {
8201 osec = htab->elf.tls_sec;
8202 indx = 0;
8203 }
8204 else
74541ad4 8205 {
74541ad4 8206 indx = elf_section_data (osec)->dynindx;
f26a3287
AM
8207 if (indx == 0)
8208 {
8209 osec = htab->elf.text_index_section;
8210 indx = elf_section_data (osec)->dynindx;
8211 }
8212 BFD_ASSERT (indx != 0);
74541ad4 8213 }
f26a3287
AM
8214
8215 /* ld.so doesn't expect buggy TLS relocs.
8216 Don't leave the symbol value in the
8217 addend for them. */
8218 if (IS_PPC_TLS_RELOC (r_type))
8219 outrel.r_addend -= osec->vma;
252b5132
RH
8220 }
8221
8222 outrel.r_info = ELF32_R_INFO (indx, r_type);
252b5132 8223 }
25f23106
AM
8224 else if (ifunc != NULL)
8225 outrel.r_info = ELF32_R_INFO (0, R_PPC_IRELATIVE);
8226 else
8227 outrel.r_info = ELF32_R_INFO (0, R_PPC_RELATIVE);
252b5132
RH
8228 }
8229
82e66161
AM
8230 sreloc = elf_section_data (input_section)->sreloc;
8231 if (ifunc)
8232 {
8233 sreloc = htab->elf.irelplt;
8234 if (indx == 0)
8235 htab->local_ifunc_resolver = 1;
8236 else if (is_static_defined (h))
8237 htab->maybe_local_ifunc_resolver = 1;
8238 }
8239 if (sreloc == NULL)
0a1b45a2 8240 return false;
82e66161 8241
066c738e
AM
8242 BFD_ASSERT (count_and_swap_reloc_out (output_bfd, &outrel,
8243 sreloc));
252b5132 8244
2243deae 8245 if (skip == -1)
c316a17c 8246 goto copy_reloc;
2243deae 8247
f0158f44
AM
8248 /* This reloc will be computed at runtime. Clear the memory
8249 so that it contains a predictable value for prelink. */
8250 if (!skip)
2243deae
L
8251 {
8252 relocation = howto->pc_relative ? outrel.r_offset : 0;
8253 addend = 0;
8254 break;
8255 }
252b5132 8256 }
252b5132
RH
8257 break;
8258
32af9f6e
AM
8259 case R_PPC_RELAX_PLT:
8260 case R_PPC_RELAX_PLTREL24:
de972ffa
AM
8261 if (h != NULL)
8262 {
32af9f6e
AM
8263 struct plt_entry *ent;
8264 bfd_vma got2_addend = 0;
8265
8266 if (r_type == R_PPC_RELAX_PLTREL24)
8267 {
0e1862bb 8268 if (bfd_link_pic (info))
32af9f6e
AM
8269 got2_addend = addend;
8270 addend = 0;
8271 }
8272 ent = find_plt_ent (&h->plt.plist, got2, got2_addend);
de972ffa
AM
8273 if (htab->plt_type == PLT_NEW)
8274 relocation = (htab->glink->output_section->vma
8275 + htab->glink->output_offset
8276 + ent->glink_offset);
8277 else
ce558b89
AM
8278 relocation = (htab->elf.splt->output_section->vma
8279 + htab->elf.splt->output_offset
de972ffa
AM
8280 + ent->plt.offset);
8281 }
1a0670f3 8282 /* Fall through. */
b4a38de6 8283
32af9f6e 8284 case R_PPC_RELAX:
e7776f52
AM
8285 if (bfd_link_pic (info)
8286 ? offset_in_range (input_section, rel->r_offset - 12,
8287 ARRAY_SIZE (shared_stub_entry) * 4)
8288 : offset_in_range (input_section, rel->r_offset,
8289 ARRAY_SIZE (stub_entry) * 4))
8290 {
8291 const int *stub;
8292 size_t size;
8293 size_t insn_offset = rel->r_offset;
8294 unsigned int insn;
53291d1f 8295
e7776f52
AM
8296 if (bfd_link_pic (info))
8297 {
8298 relocation -= (input_section->output_section->vma
8299 + input_section->output_offset
8300 + rel->r_offset - 4);
8301 stub = shared_stub_entry;
8302 bfd_put_32 (input_bfd, stub[0], contents + insn_offset - 12);
8303 bfd_put_32 (input_bfd, stub[1], contents + insn_offset - 8);
8304 bfd_put_32 (input_bfd, stub[2], contents + insn_offset - 4);
8305 stub += 3;
8306 size = ARRAY_SIZE (shared_stub_entry) - 3;
8307 }
8308 else
8309 {
8310 stub = stub_entry;
8311 size = ARRAY_SIZE (stub_entry);
8312 }
53291d1f 8313
e7776f52
AM
8314 relocation += addend;
8315 if (bfd_link_relocatable (info))
8316 relocation = 0;
8317
8318 /* First insn is HA, second is LO. */
8319 insn = *stub++;
8320 insn |= ((relocation + 0x8000) >> 16) & 0xffff;
8321 bfd_put_32 (input_bfd, insn, contents + insn_offset);
8322 insn_offset += 4;
8323
8324 insn = *stub++;
8325 insn |= relocation & 0xffff;
8326 bfd_put_32 (input_bfd, insn, contents + insn_offset);
8327 insn_offset += 4;
8328 size -= 2;
8329
8330 while (size != 0)
8331 {
8332 insn = *stub++;
8333 --size;
8334 bfd_put_32 (input_bfd, insn, contents + insn_offset);
8335 insn_offset += 4;
8336 }
9bc4e62b 8337
e7776f52
AM
8338 /* Rewrite the reloc and convert one of the trailing nop
8339 relocs to describe this relocation. */
8340 BFD_ASSERT (ELF32_R_TYPE (relend[-1].r_info) == R_PPC_NONE);
8341 /* The relocs are at the bottom 2 bytes */
8342 wrel->r_offset = rel->r_offset + d_offset;
8343 wrel->r_info = ELF32_R_INFO (r_symndx, R_PPC_ADDR16_HA);
8344 wrel->r_addend = rel->r_addend;
8345 memmove (wrel + 1, wrel, (relend - wrel - 1) * sizeof (*wrel));
8346 wrel++, rel++;
8347 wrel->r_offset += 4;
8348 wrel->r_info = ELF32_R_INFO (r_symndx, R_PPC_ADDR16_LO);
8349 }
8350 else
8351 goto de_fault;
8517fae7 8352 continue;
deaaf2f3 8353
70bccea4 8354 /* Indirect .sdata relocation. */
7619e7c7 8355 case R_PPC_EMB_SDAI16:
c9a2f333 8356 BFD_ASSERT (htab->sdata[0].section != NULL);
bd6c6e2b
AM
8357 if (!is_static_defined (htab->sdata[0].sym))
8358 {
0a1b45a2 8359 unresolved_reloc = true;
bd6c6e2b
AM
8360 break;
8361 }
7619e7c7 8362 relocation
76750a2f
AM
8363 = elf_finish_pointer_linker_section (input_bfd, &htab->sdata[0],
8364 h, relocation, rel);
bd6c6e2b 8365 addend = 0;
252b5132
RH
8366 break;
8367
70bccea4 8368 /* Indirect .sdata2 relocation. */
7619e7c7 8369 case R_PPC_EMB_SDA2I16:
c9a2f333 8370 BFD_ASSERT (htab->sdata[1].section != NULL);
bd6c6e2b
AM
8371 if (!is_static_defined (htab->sdata[1].sym))
8372 {
0a1b45a2 8373 unresolved_reloc = true;
bd6c6e2b
AM
8374 break;
8375 }
7619e7c7 8376 relocation
76750a2f
AM
8377 = elf_finish_pointer_linker_section (input_bfd, &htab->sdata[1],
8378 h, relocation, rel);
bd6c6e2b 8379 addend = 0;
252b5132
RH
8380 break;
8381
70bccea4
AM
8382 /* Handle the TOC16 reloc. We want to use the offset within the .got
8383 section, not the actual VMA. This is appropriate when generating
8384 an embedded ELF object, for which the .got section acts like the
8385 AIX .toc section. */
7619e7c7 8386 case R_PPC_TOC16: /* phony GOT16 relocations */
3b4f3a11
AM
8387 if (sec == NULL || sec->output_section == NULL)
8388 {
0a1b45a2 8389 unresolved_reloc = true;
3b4f3a11
AM
8390 break;
8391 }
fd361982
AM
8392 BFD_ASSERT (strcmp (bfd_section_name (sec), ".got") == 0
8393 || strcmp (bfd_section_name (sec), ".cgot") == 0);
252b5132 8394
3b4f3a11 8395 addend -= sec->output_section->vma + sec->output_offset + 0x8000;
252b5132
RH
8396 break;
8397
7619e7c7 8398 case R_PPC_PLTREL24:
f75e0e33
AM
8399 if (h != NULL && ifunc == NULL)
8400 {
cbf95972
AM
8401 struct plt_entry *ent;
8402
8403 ent = find_plt_ent (&h->plt.plist, got2,
8404 bfd_link_pic (info) ? addend : 0);
f75e0e33 8405 if (ent == NULL
ce558b89 8406 || htab->elf.splt == NULL)
f75e0e33
AM
8407 {
8408 /* We didn't make a PLT entry for this symbol. This
8409 happens when statically linking PIC code, or when
8410 using -Bsymbolic. */
8411 }
8412 else
8413 {
8414 /* Relocation is to the entry for this symbol in the
8415 procedure linkage table. */
0a1b45a2 8416 unresolved_reloc = false;
f75e0e33
AM
8417 if (htab->plt_type == PLT_NEW)
8418 relocation = (htab->glink->output_section->vma
8419 + htab->glink->output_offset
8420 + ent->glink_offset);
8421 else
ce558b89
AM
8422 relocation = (htab->elf.splt->output_section->vma
8423 + htab->elf.splt->output_offset
f75e0e33
AM
8424 + ent->plt.offset);
8425 }
8426 }
252b5132 8427
f75e0e33
AM
8428 /* R_PPC_PLTREL24 is rather special. If non-zero, the
8429 addend specifies the GOT pointer offset within .got2.
8430 Don't apply it to the relocation field. */
8431 addend = 0;
8da6118f 8432 break;
252b5132 8433
23cedd1d
AM
8434 case R_PPC_PLTSEQ:
8435 case R_PPC_PLTCALL:
08be3224
AM
8436 case R_PPC_PLT16_LO:
8437 case R_PPC_PLT16_HI:
8438 case R_PPC_PLT16_HA:
2d7ad24e 8439 plt_list = NULL;
08be3224
AM
8440 if (h != NULL)
8441 plt_list = &h->plt.plist;
2d7ad24e
AM
8442 else if (ifunc != NULL)
8443 plt_list = ifunc;
8444 else if (local_got_offsets != NULL)
8445 {
8446 struct plt_entry **local_plt;
8447 local_plt = (struct plt_entry **) (local_got_offsets
8448 + symtab_hdr->sh_info);
8449 plt_list = local_plt + r_symndx;
8450 }
0a1b45a2 8451 unresolved_reloc = true;
08be3224
AM
8452 if (plt_list != NULL)
8453 {
8454 struct plt_entry *ent;
8455
8456 ent = find_plt_ent (plt_list, got2,
8457 bfd_link_pic (info) ? addend : 0);
2d7ad24e 8458 if (ent != NULL && ent->plt.offset != (bfd_vma) -1)
08be3224 8459 {
2d7ad24e
AM
8460 asection *plt;
8461
0a1b45a2 8462 unresolved_reloc = false;
2d7ad24e 8463 plt = htab->elf.splt;
30845f11 8464 if (use_local_plt (info, h))
2d7ad24e
AM
8465 {
8466 if (ifunc != NULL)
8467 plt = htab->elf.iplt;
8468 else
8469 plt = htab->pltlocal;
8470 }
8471 relocation = (plt->output_section->vma
8472 + plt->output_offset
08be3224
AM
8473 + ent->plt.offset);
8474 if (bfd_link_pic (info))
8475 {
8476 bfd_vma got = 0;
8477
8478 if (ent->addend >= 32768)
8479 got = (ent->addend
8480 + ent->sec->output_section->vma
8481 + ent->sec->output_offset);
8482 else
8483 got = SYM_VAL (htab->elf.hgot);
8484 relocation -= got;
8485 }
8486 }
8487 }
8488 addend = 0;
8489 break;
8490
70bccea4 8491 /* Relocate against _SDA_BASE_. */
7619e7c7 8492 case R_PPC_SDAREL16:
252b5132
RH
8493 {
8494 const char *name;
bd6c6e2b 8495 struct elf_link_hash_entry *sda = htab->sdata[0].sym;
252b5132 8496
bd6c6e2b
AM
8497 if (sec == NULL
8498 || sec->output_section == NULL
8499 || !is_static_defined (sda))
3b4f3a11 8500 {
0a1b45a2 8501 unresolved_reloc = true;
3b4f3a11
AM
8502 break;
8503 }
bd6c6e2b 8504 addend -= SYM_VAL (sda);
3b4f3a11 8505
fd361982 8506 name = bfd_section_name (sec->output_section);
93d1b056
AM
8507 if (!(strcmp (name, ".sdata") == 0
8508 || strcmp (name, ".sbss") == 0))
252b5132 8509 {
cf97bcb0 8510 _bfd_error_handler
695344c0 8511 /* xgettext:c-format */
cf97bcb0
AM
8512 (_("%pB: the target (%s) of a %s relocation is "
8513 "in the wrong output section (%s)"),
d003868e 8514 input_bfd,
55fd94b0
AM
8515 sym_name,
8516 howto->name,
8517 name);
252b5132 8518 }
252b5132
RH
8519 }
8520 break;
8521
70bccea4 8522 /* Relocate against _SDA2_BASE_. */
7619e7c7 8523 case R_PPC_EMB_SDA2REL:
252b5132
RH
8524 {
8525 const char *name;
bd6c6e2b 8526 struct elf_link_hash_entry *sda = htab->sdata[1].sym;
252b5132 8527
bd6c6e2b
AM
8528 if (sec == NULL
8529 || sec->output_section == NULL
8530 || !is_static_defined (sda))
3b4f3a11 8531 {
0a1b45a2 8532 unresolved_reloc = true;
3b4f3a11
AM
8533 break;
8534 }
bd6c6e2b 8535 addend -= SYM_VAL (sda);
3b4f3a11 8536
fd361982 8537 name = bfd_section_name (sec->output_section);
93d1b056
AM
8538 if (!(strcmp (name, ".sdata2") == 0
8539 || strcmp (name, ".sbss2") == 0))
252b5132 8540 {
cf97bcb0 8541 _bfd_error_handler
695344c0 8542 /* xgettext:c-format */
cf97bcb0
AM
8543 (_("%pB: the target (%s) of a %s relocation is "
8544 "in the wrong output section (%s)"),
d003868e 8545 input_bfd,
55fd94b0
AM
8546 sym_name,
8547 howto->name,
8548 name);
252b5132 8549 }
252b5132
RH
8550 }
8551 break;
8552
b9c361e0 8553 case R_PPC_VLE_LO16A:
86c95733 8554 relocation = relocation + addend;
e7776f52
AM
8555 r = ppc_elf_vle_split16 (input_bfd, input_section, rel->r_offset,
8556 contents + rel->r_offset, relocation,
8557 split16a_type,
8558 htab->params->vle_reloc_fixup);
8559 goto report_reloc;
b9c361e0
JL
8560
8561 case R_PPC_VLE_LO16D:
86c95733 8562 relocation = relocation + addend;
e7776f52
AM
8563 r = ppc_elf_vle_split16 (input_bfd, input_section, rel->r_offset,
8564 contents + rel->r_offset, relocation,
8565 split16d_type,
8566 htab->params->vle_reloc_fixup);
8567 goto report_reloc;
b9c361e0
JL
8568
8569 case R_PPC_VLE_HI16A:
86c95733 8570 relocation = (relocation + addend) >> 16;
e7776f52
AM
8571 r = ppc_elf_vle_split16 (input_bfd, input_section, rel->r_offset,
8572 contents + rel->r_offset, relocation,
8573 split16a_type,
8574 htab->params->vle_reloc_fixup);
8575 goto report_reloc;
b9c361e0
JL
8576
8577 case R_PPC_VLE_HI16D:
86c95733 8578 relocation = (relocation + addend) >> 16;
e7776f52
AM
8579 r = ppc_elf_vle_split16 (input_bfd, input_section, rel->r_offset,
8580 contents + rel->r_offset, relocation,
8581 split16d_type,
8582 htab->params->vle_reloc_fixup);
8583 goto report_reloc;
b9c361e0
JL
8584
8585 case R_PPC_VLE_HA16A:
86c95733 8586 relocation = (relocation + addend + 0x8000) >> 16;
e7776f52
AM
8587 r = ppc_elf_vle_split16 (input_bfd, input_section, rel->r_offset,
8588 contents + rel->r_offset, relocation,
8589 split16a_type,
8590 htab->params->vle_reloc_fixup);
8591 goto report_reloc;
b9c361e0
JL
8592
8593 case R_PPC_VLE_HA16D:
86c95733 8594 relocation = (relocation + addend + 0x8000) >> 16;
e7776f52
AM
8595 r = ppc_elf_vle_split16 (input_bfd, input_section, rel->r_offset,
8596 contents + rel->r_offset, relocation,
8597 split16d_type,
8598 htab->params->vle_reloc_fixup);
8599 goto report_reloc;
b9c361e0 8600
70bccea4 8601 /* Relocate against either _SDA_BASE_, _SDA2_BASE_, or 0. */
7619e7c7 8602 case R_PPC_EMB_SDA21:
b9c361e0 8603 case R_PPC_VLE_SDA21:
7619e7c7 8604 case R_PPC_EMB_RELSDA:
b9c361e0 8605 case R_PPC_VLE_SDA21_LO:
e7776f52
AM
8606 if (!offset_in_range (input_section, rel->r_offset, 4))
8607 {
8608 r = bfd_reloc_outofrange;
8609 goto report_reloc;
8610 }
8611 else
8612 {
8613 const char *name;
8614 int reg;
8615 unsigned int insn;
8616 struct elf_link_hash_entry *sda = NULL;
252b5132 8617
e7776f52
AM
8618 if (sec == NULL || sec->output_section == NULL)
8619 {
8620 unresolved_reloc = true;
8621 break;
8622 }
3b4f3a11 8623
e7776f52
AM
8624 name = bfd_section_name (sec->output_section);
8625 if (strcmp (name, ".sdata") == 0
8626 || strcmp (name, ".sbss") == 0)
8627 {
8628 reg = 13;
8629 sda = htab->sdata[0].sym;
8630 }
8631 else if (strcmp (name, ".sdata2") == 0
8632 || strcmp (name, ".sbss2") == 0)
8633 {
8634 reg = 2;
8635 sda = htab->sdata[1].sym;
8636 }
8637 else if (strcmp (name, ".PPC.EMB.sdata0") == 0
8638 || strcmp (name, ".PPC.EMB.sbss0") == 0)
8639 {
8640 reg = 0;
8641 }
8642 else
8643 {
8644 _bfd_error_handler
8645 /* xgettext:c-format */
8646 (_("%pB: the target (%s) of a %s relocation is "
8647 "in the wrong output section (%s)"),
8648 input_bfd,
8649 sym_name,
8650 howto->name,
8651 name);
8652
8653 bfd_set_error (bfd_error_bad_value);
8654 ret = false;
8655 goto copy_reloc;
8656 }
252b5132 8657
e7776f52
AM
8658 if (sda != NULL)
8659 {
8660 if (!is_static_defined (sda))
8661 {
8662 unresolved_reloc = true;
8663 break;
8664 }
8665 addend -= SYM_VAL (sda);
8666 }
252b5132 8667
e7776f52
AM
8668 if (r_type == R_PPC_EMB_RELSDA)
8669 break;
bd6c6e2b 8670
e7776f52
AM
8671 /* The PowerPC Embedded Application Binary Interface
8672 version 1.0 insanely chose to specify R_PPC_EMB_SDA21
8673 operating on a 24-bit field at r_offset. GNU as and
8674 GNU ld have always assumed R_PPC_EMB_SDA21 operates on
8675 a 32-bit bit insn at r_offset. Cope with object file
8676 producers that possibly comply with the EABI in
8677 generating an odd r_offset for big-endian objects. */
8678 if (r_type == R_PPC_EMB_SDA21)
8679 rel->r_offset &= ~1;
6f5601c4 8680
e7776f52
AM
8681 insn = bfd_get_32 (input_bfd, contents + rel->r_offset);
8682 if (reg == 0
8683 && (r_type == R_PPC_VLE_SDA21
8684 || r_type == R_PPC_VLE_SDA21_LO))
8685 {
8686 relocation = relocation + addend;
8687 addend = 0;
8688
8689 /* Force e_li insn, keeping RT from original insn. */
8690 insn &= 0x1f << 21;
8691 insn |= 28u << 26;
8692
8693 /* We have an li20 field, bits 17..20, 11..15, 21..31. */
8694 /* Top 4 bits of value to 17..20. */
8695 insn |= (relocation & 0xf0000) >> 5;
8696 /* Next 5 bits of the value to 11..15. */
8697 insn |= (relocation & 0xf800) << 5;
8698 /* And the final 11 bits of the value to bits 21 to 31. */
8699 insn |= relocation & 0x7ff;
8700
8701 bfd_put_32 (input_bfd, insn, contents + rel->r_offset);
8702
8703 r = bfd_reloc_ok;
8704 if (r_type == R_PPC_VLE_SDA21
8705 && ((relocation + 0x80000) & 0xffffffff) > 0x100000)
8706 r = bfd_reloc_overflow;
8707 goto report_reloc;
8708 }
8709 /* Fill in register field. */
8710 insn = (insn & ~RA_REGISTER_MASK) | (reg << RA_REGISTER_SHIFT);
8711 bfd_put_32 (input_bfd, insn, contents + rel->r_offset);
8712 }
252b5132
RH
8713 break;
8714
b9c361e0
JL
8715 case R_PPC_VLE_SDAREL_LO16A:
8716 case R_PPC_VLE_SDAREL_LO16D:
8717 case R_PPC_VLE_SDAREL_HI16A:
8718 case R_PPC_VLE_SDAREL_HI16D:
8719 case R_PPC_VLE_SDAREL_HA16A:
8720 case R_PPC_VLE_SDAREL_HA16D:
e7776f52
AM
8721 if (!offset_in_range (input_section, rel->r_offset, 4))
8722 r = bfd_reloc_outofrange;
8723 else
8724 {
8725 bfd_vma value;
8726 const char *name;
8727 struct elf_link_hash_entry *sda = NULL;
b9c361e0 8728
e7776f52
AM
8729 if (sec == NULL || sec->output_section == NULL)
8730 {
8731 unresolved_reloc = true;
8732 break;
8733 }
b9c361e0 8734
e7776f52
AM
8735 name = bfd_section_name (sec->output_section);
8736 if (strcmp (name, ".sdata") == 0
8737 || strcmp (name, ".sbss") == 0)
8738 sda = htab->sdata[0].sym;
8739 else if (strcmp (name, ".sdata2") == 0
8740 || strcmp (name, ".sbss2") == 0)
8741 sda = htab->sdata[1].sym;
8742 else
8743 {
8744 _bfd_error_handler
8745 /* xgettext:c-format */
8746 (_("%pB: the target (%s) of a %s relocation is "
8747 "in the wrong output section (%s)"),
8748 input_bfd,
8749 sym_name,
8750 howto->name,
8751 name);
8752
8753 bfd_set_error (bfd_error_bad_value);
8754 ret = false;
8755 goto copy_reloc;
8756 }
86c95733 8757
e7776f52
AM
8758 if (sda == NULL || !is_static_defined (sda))
8759 {
8760 unresolved_reloc = true;
8761 break;
8762 }
8763 value = relocation + addend - SYM_VAL (sda);
8764
8765 if (r_type == R_PPC_VLE_SDAREL_LO16A)
8766 r = ppc_elf_vle_split16 (input_bfd, input_section,
8767 rel->r_offset,
8768 contents + rel->r_offset, value,
8769 split16a_type,
8770 htab->params->vle_reloc_fixup);
8771 else if (r_type == R_PPC_VLE_SDAREL_LO16D)
8772 r = ppc_elf_vle_split16 (input_bfd, input_section,
8773 rel->r_offset,
8774 contents + rel->r_offset, value,
8775 split16d_type,
8776 htab->params->vle_reloc_fixup);
8777 else if (r_type == R_PPC_VLE_SDAREL_HI16A)
8778 {
8779 value = value >> 16;
8780 r = ppc_elf_vle_split16 (input_bfd, input_section,
8781 rel->r_offset,
8782 contents + rel->r_offset, value,
8783 split16a_type,
8784 htab->params->vle_reloc_fixup);
8785 }
8786 else if (r_type == R_PPC_VLE_SDAREL_HI16D)
8787 {
8788 value = value >> 16;
8789 r = ppc_elf_vle_split16 (input_bfd, input_section,
8790 rel->r_offset,
8791 contents + rel->r_offset, value,
8792 split16d_type,
8793 htab->params->vle_reloc_fixup);
8794 }
8795 else if (r_type == R_PPC_VLE_SDAREL_HA16A)
8796 {
8797 value = (value + 0x8000) >> 16;
8798 r = ppc_elf_vle_split16 (input_bfd, input_section,
8799 rel->r_offset,
8800 contents + rel->r_offset, value,
8801 split16a_type,
8802 htab->params->vle_reloc_fixup);
8803 }
8804 else if (r_type == R_PPC_VLE_SDAREL_HA16D)
8805 {
8806 value = (value + 0x8000) >> 16;
8807 r = ppc_elf_vle_split16 (input_bfd, input_section,
8808 rel->r_offset,
8809 contents + rel->r_offset, value,
8810 split16d_type,
8811 htab->params->vle_reloc_fixup);
8812 }
8813 else
8814 abort ();
8815 }
8816 goto report_reloc;
b9c361e0 8817
83eef883 8818 case R_PPC_VLE_ADDR20:
e7776f52
AM
8819 if (!offset_in_range (input_section, rel->r_offset, 4))
8820 r = bfd_reloc_outofrange;
8821 else
8822 {
8823 ppc_elf_vle_split20 (output_bfd, contents + rel->r_offset,
8824 relocation);
8825 r = bfd_reloc_ok;
8826 }
8827 goto report_reloc;
83eef883 8828
70bccea4 8829 /* Relocate against the beginning of the section. */
7619e7c7
AM
8830 case R_PPC_SECTOFF:
8831 case R_PPC_SECTOFF_LO:
8832 case R_PPC_SECTOFF_HI:
8833 case R_PPC_SECTOFF_HA:
3b4f3a11
AM
8834 if (sec == NULL || sec->output_section == NULL)
8835 {
0a1b45a2 8836 unresolved_reloc = true;
3b4f3a11
AM
8837 break;
8838 }
252b5132 8839 addend -= sec->output_section->vma;
252b5132
RH
8840 break;
8841
70bccea4 8842 /* Negative relocations. */
7619e7c7
AM
8843 case R_PPC_EMB_NADDR32:
8844 case R_PPC_EMB_NADDR16:
8845 case R_PPC_EMB_NADDR16_LO:
8846 case R_PPC_EMB_NADDR16_HI:
8847 case R_PPC_EMB_NADDR16_HA:
8da6118f 8848 addend -= 2 * relocation;
252b5132
RH
8849 break;
8850
7619e7c7
AM
8851 case R_PPC_COPY:
8852 case R_PPC_GLOB_DAT:
8853 case R_PPC_JMP_SLOT:
8854 case R_PPC_RELATIVE:
e054468f 8855 case R_PPC_IRELATIVE:
7619e7c7
AM
8856 case R_PPC_PLT32:
8857 case R_PPC_PLTREL32:
7619e7c7
AM
8858 case R_PPC_ADDR30:
8859 case R_PPC_EMB_RELSEC16:
8860 case R_PPC_EMB_RELST_LO:
8861 case R_PPC_EMB_RELST_HI:
8862 case R_PPC_EMB_RELST_HA:
8863 case R_PPC_EMB_BIT_FLD:
cf97bcb0
AM
8864 /* xgettext:c-format */
8865 _bfd_error_handler (_("%pB: %s unsupported"),
8866 input_bfd, howto->name);
252b5132
RH
8867
8868 bfd_set_error (bfd_error_invalid_operation);
0a1b45a2 8869 ret = false;
c316a17c 8870 goto copy_reloc;
7619e7c7 8871 }
252b5132 8872
252dcdf4
AM
8873 switch (r_type)
8874 {
8875 default:
8876 break;
8877
8878 case R_PPC_TPREL16_HA:
e7776f52
AM
8879 if (htab->do_tls_opt
8880 && relocation + addend + 0x8000 < 0x10000
8881 && offset_in_range (input_section, rel->r_offset & ~3, 4))
8882
252dcdf4
AM
8883 {
8884 bfd_byte *p = contents + (rel->r_offset & ~3);
8885 bfd_put_32 (input_bfd, NOP, p);
8886 }
8887 break;
8888
8889 case R_PPC_TPREL16_LO:
e7776f52
AM
8890 if (htab->do_tls_opt
8891 && relocation + addend + 0x8000 < 0x10000
8892 && offset_in_range (input_section, rel->r_offset & ~3, 4))
252dcdf4
AM
8893 {
8894 bfd_byte *p = contents + (rel->r_offset & ~3);
8895 unsigned int insn = bfd_get_32 (input_bfd, p);
8896 insn &= ~(0x1f << 16);
8897 insn |= 2 << 16;
8898 bfd_put_32 (input_bfd, insn, p);
8899 }
8900 break;
8901 }
8902
23cedd1d
AM
8903 switch (r_type)
8904 {
8905 default:
8906 break;
8907
8908 case R_PPC_PLTCALL:
8909 if (unresolved_reloc)
8910 {
e7776f52
AM
8911 if (offset_in_range (input_section, rel->r_offset, 4))
8912 {
8913 bfd_byte *p = contents + rel->r_offset;
8914 unsigned int insn = bfd_get_32 (input_bfd, p);
8915 insn &= 1;
8916 bfd_put_32 (input_bfd, B | insn, p);
8917 unresolved_reloc = save_unresolved_reloc;
8918 r_type = R_PPC_REL24;
8919 howto = ppc_elf_howto_table[r_type];
8920 }
23cedd1d
AM
8921 }
8922 else if (htab->plt_type != PLT_NEW)
8923 info->callbacks->einfo
482f3505 8924 (_("%X%P: %H: %s relocation unsupported for bss-plt\n"),
23cedd1d
AM
8925 input_bfd, input_section, rel->r_offset,
8926 howto->name);
8927 break;
8928
8929 case R_PPC_PLTSEQ:
8930 case R_PPC_PLT16_HA:
8931 case R_PPC_PLT16_LO:
8932 if (unresolved_reloc)
8933 {
e7776f52
AM
8934 if (offset_in_range (input_section, rel->r_offset & ~3, 4))
8935 {
8936 bfd_byte *p = contents + (rel->r_offset & ~3);
8937 bfd_put_32 (input_bfd, NOP, p);
8938 unresolved_reloc = false;
8939 r_type = R_PPC_NONE;
8940 howto = ppc_elf_howto_table[r_type];
8941 }
23cedd1d
AM
8942 }
8943 else if (htab->plt_type != PLT_NEW)
8944 info->callbacks->einfo
482f3505 8945 (_("%X%P: %H: %s relocation unsupported for bss-plt\n"),
23cedd1d
AM
8946 input_bfd, input_section, rel->r_offset,
8947 howto->name);
8948 break;
8949 }
8950
7619e7c7
AM
8951 /* Do any further special processing. */
8952 switch (r_type)
8953 {
8954 default:
8955 break;
8956
8957 case R_PPC_ADDR16_HA:
d7128ce4 8958 case R_PPC_REL16_HA:
a680de9a 8959 case R_PPC_REL16DX_HA:
7619e7c7
AM
8960 case R_PPC_SECTOFF_HA:
8961 case R_PPC_TPREL16_HA:
8962 case R_PPC_DTPREL16_HA:
7619e7c7
AM
8963 case R_PPC_EMB_NADDR16_HA:
8964 case R_PPC_EMB_RELST_HA:
8965 /* It's just possible that this symbol is a weak symbol
7b609f53 8966 that's not actually defined anywhere. In that case,
7619e7c7
AM
8967 'sec' would be NULL, and we should leave the symbol
8968 alone (it will be set to zero elsewhere in the link). */
5c5f6e17
AM
8969 if (sec == NULL)
8970 break;
1a0670f3 8971 /* Fall through. */
5c5f6e17
AM
8972
8973 case R_PPC_PLT16_HA:
8974 case R_PPC_GOT16_HA:
8975 case R_PPC_GOT_TLSGD16_HA:
8976 case R_PPC_GOT_TLSLD16_HA:
8977 case R_PPC_GOT_TPREL16_HA:
8978 case R_PPC_GOT_DTPREL16_HA:
8979 /* Add 0x10000 if sign bit in 0:15 is set.
8980 Bits 0:15 are not used. */
8981 addend += 0x8000;
7619e7c7 8982 break;
1fe532cf
AM
8983
8984 case R_PPC_ADDR16:
8985 case R_PPC_ADDR16_LO:
8986 case R_PPC_GOT16:
8987 case R_PPC_GOT16_LO:
8988 case R_PPC_SDAREL16:
8989 case R_PPC_SECTOFF:
8990 case R_PPC_SECTOFF_LO:
8991 case R_PPC_DTPREL16:
8992 case R_PPC_DTPREL16_LO:
8993 case R_PPC_TPREL16:
8994 case R_PPC_TPREL16_LO:
8995 case R_PPC_GOT_TLSGD16:
8996 case R_PPC_GOT_TLSGD16_LO:
8997 case R_PPC_GOT_TLSLD16:
8998 case R_PPC_GOT_TLSLD16_LO:
8999 case R_PPC_GOT_DTPREL16:
9000 case R_PPC_GOT_DTPREL16_LO:
9001 case R_PPC_GOT_TPREL16:
9002 case R_PPC_GOT_TPREL16_LO:
e7776f52
AM
9003 if (offset_in_range (input_section, rel->r_offset - d_offset, 4))
9004 {
9005 /* The 32-bit ABI lacks proper relocations to deal with
9006 certain 64-bit instructions. Prevent damage to bits
9007 that make up part of the insn opcode. */
9008 unsigned int insn, mask, lobit;
9009
9010 insn = bfd_get_32 (input_bfd,
9011 contents + rel->r_offset - d_offset);
9012 mask = 0;
9013 if (is_insn_ds_form (insn))
9014 mask = 3;
9015 else if (is_insn_dq_form (insn))
9016 mask = 15;
9017 else
9018 break;
9019 relocation += addend;
9020 addend = insn & mask;
9021 lobit = mask & relocation;
9022 if (lobit != 0)
9023 {
9024 relocation ^= lobit;
9025 info->callbacks->einfo
9026 /* xgettext:c-format */
9027 (_("%H: error: %s against `%s' not a multiple of %u\n"),
9028 input_bfd, input_section, rel->r_offset,
9029 howto->name, sym_name, mask + 1);
9030 bfd_set_error (bfd_error_bad_value);
9031 ret = false;
9032 }
9033 }
1fe532cf 9034 break;
252b5132
RH
9035 }
9036
252b5132 9037#ifdef DEBUG
55fd94b0
AM
9038 fprintf (stderr, "\ttype = %s (%d), name = %s, symbol index = %ld, "
9039 "offset = %ld, addend = %ld\n",
252b5132 9040 howto->name,
8da6118f 9041 (int) r_type,
252b5132
RH
9042 sym_name,
9043 r_symndx,
7619e7c7 9044 (long) rel->r_offset,
8da6118f 9045 (long) addend);
252b5132
RH
9046#endif
9047
7619e7c7
AM
9048 if (unresolved_reloc
9049 && !((input_section->flags & SEC_DEBUGGING) != 0
1d5316ab
AM
9050 && h->def_dynamic)
9051 && _bfd_elf_section_offset (output_bfd, info, input_section,
9052 rel->r_offset) != (bfd_vma) -1)
7619e7c7 9053 {
25f53a85 9054 info->callbacks->einfo
695344c0 9055 /* xgettext:c-format */
174d0a74 9056 (_("%H: unresolvable %s relocation against symbol `%s'\n"),
25f53a85 9057 input_bfd, input_section, rel->r_offset,
7b609f53 9058 howto->name,
7619e7c7 9059 sym_name);
0a1b45a2 9060 ret = false;
7619e7c7
AM
9061 }
9062
86c95733
AM
9063 /* 16-bit fields in insns mostly have signed values, but a
9064 few insns have 16-bit unsigned values. Really, we should
9065 have different reloc types. */
9066 if (howto->complain_on_overflow != complain_overflow_dont
9067 && howto->dst_mask == 0xffff
e7776f52
AM
9068 && (input_section->flags & SEC_CODE) != 0
9069 && offset_in_range (input_section, rel->r_offset & ~3, 4))
86c95733
AM
9070 {
9071 enum complain_overflow complain = complain_overflow_signed;
9072
9073 if ((elf_section_flags (input_section) & SHF_PPC_VLE) == 0)
9074 {
9075 unsigned int insn;
9076
9077 insn = bfd_get_32 (input_bfd, contents + (rel->r_offset & ~3));
2365f8d7 9078 if ((insn & (0x3fu << 26)) == 10u << 26 /* cmpli */)
a47622ac 9079 complain = complain_overflow_bitfield;
2365f8d7
AM
9080 else if ((insn & (0x3fu << 26)) == 28u << 26 /* andi */
9081 || (insn & (0x3fu << 26)) == 24u << 26 /* ori */
9082 || (insn & (0x3fu << 26)) == 26u << 26 /* xori */)
86c95733
AM
9083 complain = complain_overflow_unsigned;
9084 }
9085 if (howto->complain_on_overflow != complain)
9086 {
9087 alt_howto = *howto;
9088 alt_howto.complain_on_overflow = complain;
9089 howto = &alt_howto;
9090 }
9091 }
9092
a680de9a
PB
9093 if (r_type == R_PPC_REL16DX_HA)
9094 {
9095 /* Split field reloc isn't handled by _bfd_final_link_relocate. */
e7776f52 9096 if (offset_in_range (input_section, rel->r_offset, 4))
a680de9a
PB
9097 r = bfd_reloc_outofrange;
9098 else
9099 {
9100 unsigned int insn;
9101
9102 relocation += addend;
9103 relocation -= (rel->r_offset
9104 + input_section->output_offset
9105 + input_section->output_section->vma);
9106 relocation >>= 16;
9107 insn = bfd_get_32 (input_bfd, contents + rel->r_offset);
9108 insn &= ~0x1fffc1;
9109 insn |= (relocation & 0xffc1) | ((relocation & 0x3e) << 15);
9110 bfd_put_32 (input_bfd, insn, contents + rel->r_offset);
9111 r = bfd_reloc_ok;
9112 }
9113 }
9114 else
9115 r = _bfd_final_link_relocate (howto, input_bfd, input_section, contents,
9116 rel->r_offset, relocation, addend);
252b5132 9117
e7776f52 9118 report_reloc:
7619e7c7 9119 if (r != bfd_reloc_ok)
252b5132 9120 {
7619e7c7 9121 if (r == bfd_reloc_overflow)
252b5132 9122 {
8131c122
AM
9123 /* On code like "if (foo) foo();" don't report overflow
9124 on a branch to zero when foo is undefined. */
9125 if (!warned
9126 && !(h != NULL
9127 && (h->root.type == bfd_link_hash_undefweak
9128 || h->root.type == bfd_link_hash_undefined)
9129 && is_branch_reloc (r_type)))
1a72702b
AM
9130 info->callbacks->reloc_overflow
9131 (info, (h ? &h->root : NULL), sym_name, howto->name,
9132 rel->r_addend, input_bfd, input_section, rel->r_offset);
dc1bc0c9
RH
9133 }
9134 else
9135 {
25f53a85 9136 info->callbacks->einfo
695344c0 9137 /* xgettext:c-format */
174d0a74 9138 (_("%H: %s reloc against `%s': error %d\n"),
25f53a85
AM
9139 input_bfd, input_section, rel->r_offset,
9140 howto->name, sym_name, (int) r);
0a1b45a2 9141 ret = false;
252b5132
RH
9142 }
9143 }
c316a17c
AM
9144 copy_reloc:
9145 if (wrel != rel)
9146 *wrel = *rel;
9147 }
9148
9149 if (wrel != rel)
9150 {
9151 Elf_Internal_Shdr *rel_hdr;
9152 size_t deleted = rel - wrel;
9153
9154 rel_hdr = _bfd_elf_single_rel_hdr (input_section->output_section);
9155 rel_hdr->sh_size -= rel_hdr->sh_entsize * deleted;
9156 if (rel_hdr->sh_size == 0)
9157 {
9158 /* It is too late to remove an empty reloc section. Leave
9159 one NONE reloc.
9160 ??? What is wrong with an empty section??? */
9161 rel_hdr->sh_size = rel_hdr->sh_entsize;
9162 deleted -= 1;
9163 wrel++;
9164 }
9165 relend = wrel;
9166 rel_hdr = _bfd_elf_single_rel_hdr (input_section);
9167 rel_hdr->sh_size -= rel_hdr->sh_entsize * deleted;
9168 input_section->reloc_count -= deleted;
252b5132
RH
9169 }
9170
252b5132
RH
9171#ifdef DEBUG
9172 fprintf (stderr, "\n");
9173#endif
9174
53291d1f
AM
9175 if (input_section->sec_info_type == SEC_INFO_TYPE_TARGET
9176 && input_section->size != input_section->rawsize
9177 && (strcmp (input_section->output_section->name, ".init") == 0
9178 || strcmp (input_section->output_section->name, ".fini") == 0))
9179 {
9180 /* Branch around the trampolines. */
9181 unsigned int insn = B + input_section->size - input_section->rawsize;
9182 bfd_put_32 (input_bfd, insn, contents + input_section->rawsize);
9183 }
9184
5446cbdf 9185 if (htab->params->ppc476_workaround
795bc6b3 9186 && input_section->sec_info_type == SEC_INFO_TYPE_TARGET
0e1862bb 9187 && (!bfd_link_relocatable (info)
795bc6b3
AM
9188 || (input_section->output_section->alignment_power
9189 >= htab->params->pagesize_p2)))
5446cbdf 9190 {
5446cbdf 9191 bfd_vma start_addr, end_addr, addr;
795bc6b3 9192 bfd_vma pagesize = (bfd_vma) 1 << htab->params->pagesize_p2;
5446cbdf 9193
5446cbdf 9194 if (relax_info->workaround_size != 0)
40fd06d1
AM
9195 {
9196 bfd_byte *p;
9197 unsigned int n;
9198 bfd_byte fill[4];
9199
9200 bfd_put_32 (input_bfd, BA, fill);
9201 p = contents + input_section->size - relax_info->workaround_size;
9202 n = relax_info->workaround_size >> 2;
9203 while (n--)
9204 {
9205 memcpy (p, fill, 4);
9206 p += 4;
9207 }
9208 }
5446cbdf
AM
9209
9210 /* The idea is: Replace the last instruction on a page with a
9211 branch to a patch area. Put the insn there followed by a
9212 branch back to the next page. Complicated a little by
9213 needing to handle moved conditional branches, and by not
9214 wanting to touch data-in-text. */
9215
9216 start_addr = (input_section->output_section->vma
9217 + input_section->output_offset);
9218 end_addr = (start_addr + input_section->size
9219 - relax_info->workaround_size);
9220 for (addr = ((start_addr & -pagesize) + pagesize - 4);
9221 addr < end_addr;
9222 addr += pagesize)
9223 {
9224 bfd_vma offset = addr - start_addr;
9225 Elf_Internal_Rela *lo, *hi;
0a1b45a2 9226 bool is_data;
5446cbdf
AM
9227 bfd_vma patch_off, patch_addr;
9228 unsigned int insn;
9229
9230 /* Do we have a data reloc at this offset? If so, leave
9231 the word alone. */
0a1b45a2 9232 is_data = false;
5446cbdf 9233 lo = relocs;
668e22e5
AM
9234 hi = relend;
9235 rel = NULL;
5446cbdf
AM
9236 while (lo < hi)
9237 {
9238 rel = lo + (hi - lo) / 2;
9239 if (rel->r_offset < offset)
9240 lo = rel + 1;
668e22e5 9241 else if (rel->r_offset > offset + 3)
5446cbdf
AM
9242 hi = rel;
9243 else
9244 {
9245 switch (ELF32_R_TYPE (rel->r_info))
9246 {
9247 case R_PPC_ADDR32:
9248 case R_PPC_UADDR32:
9249 case R_PPC_REL32:
9250 case R_PPC_ADDR30:
0a1b45a2 9251 is_data = true;
5446cbdf
AM
9252 break;
9253 default:
9254 break;
9255 }
9256 break;
9257 }
9258 }
9259 if (is_data)
9260 continue;
9261
b4ab4364
AM
9262 /* Some instructions can be left alone too. Unconditional
9263 branches, except for bcctr with BO=0x14 (bctr, bctrl),
9264 avoid the icache failure.
9265
9266 The problem occurs due to prefetch across a page boundary
9267 where stale instructions can be fetched from the next
9268 page, and the mechanism for flushing these bad
9269 instructions fails under certain circumstances. The
9270 unconditional branches:
9271 1) Branch: b, bl, ba, bla,
9272 2) Branch Conditional: bc, bca, bcl, bcla,
9273 3) Branch Conditional to Link Register: bclr, bclrl,
9274 where (2) and (3) have BO=0x14 making them unconditional,
9275 prevent the bad prefetch because the prefetch itself is
9276 affected by these instructions. This happens even if the
9277 instruction is not executed.
9278
9279 A bctr example:
9280 .
9281 . lis 9,new_page@ha
9282 . addi 9,9,new_page@l
9283 . mtctr 9
9284 . bctr
9285 . nop
9286 . nop
9287 . new_page:
9288 .
9289 The bctr is not predicted taken due to ctr not being
9290 ready, so prefetch continues on past the bctr into the
9291 new page which might have stale instructions. If they
9292 fail to be flushed, then they will be executed after the
9293 bctr executes. Either of the following modifications
9294 prevent the bad prefetch from happening in the first
9295 place:
9296 .
1b786873
L
9297 . lis 9,new_page@ha lis 9,new_page@ha
9298 . addi 9,9,new_page@l addi 9,9,new_page@l
9299 . mtctr 9 mtctr 9
9300 . bctr bctr
b4ab4364 9301 . nop b somewhere_else
1b786873
L
9302 . b somewhere_else nop
9303 . new_page: new_page:
b4ab4364 9304 . */
5446cbdf 9305 insn = bfd_get_32 (input_bfd, contents + offset);
2365f8d7
AM
9306 if ((insn & (0x3fu << 26)) == (18u << 26) /* b,bl,ba,bla */
9307 || ((insn & (0x3fu << 26)) == (16u << 26) /* bc,bcl,bca,bcla*/
07d6d2b8 9308 && (insn & (0x14 << 21)) == (0x14 << 21)) /* with BO=0x14 */
2365f8d7 9309 || ((insn & (0x3fu << 26)) == (19u << 26)
b4ab4364 9310 && (insn & (0x3ff << 1)) == (16u << 1) /* bclr,bclrl */
07d6d2b8 9311 && (insn & (0x14 << 21)) == (0x14 << 21)))/* with BO=0x14 */
5446cbdf
AM
9312 continue;
9313
9314 patch_addr = (start_addr + input_section->size
9315 - relax_info->workaround_size);
9316 patch_addr = (patch_addr + 15) & -16;
9317 patch_off = patch_addr - start_addr;
9318 bfd_put_32 (input_bfd, B + patch_off - offset, contents + offset);
668e22e5
AM
9319
9320 if (rel != NULL
9321 && rel->r_offset >= offset
9322 && rel->r_offset < offset + 4)
9323 {
f8b44781
AM
9324 asection *sreloc;
9325
668e22e5
AM
9326 /* If the insn we are patching had a reloc, adjust the
9327 reloc r_offset so that the reloc applies to the moved
9328 location. This matters for -r and --emit-relocs. */
9329 if (rel + 1 != relend)
9330 {
9331 Elf_Internal_Rela tmp = *rel;
9332
9333 /* Keep the relocs sorted by r_offset. */
9334 memmove (rel, rel + 1, (relend - (rel + 1)) * sizeof (*rel));
9335 relend[-1] = tmp;
9336 }
9337 relend[-1].r_offset += patch_off - offset;
f8b44781
AM
9338
9339 /* Adjust REL16 addends too. */
9340 switch (ELF32_R_TYPE (relend[-1].r_info))
9341 {
9342 case R_PPC_REL16:
9343 case R_PPC_REL16_LO:
9344 case R_PPC_REL16_HI:
9345 case R_PPC_REL16_HA:
9346 relend[-1].r_addend += patch_off - offset;
9347 break;
9348 default:
9349 break;
9350 }
9351
9352 /* If we are building a PIE or shared library with
9353 non-PIC objects, perhaps we had a dynamic reloc too?
9354 If so, the dynamic reloc must move with the insn. */
9355 sreloc = elf_section_data (input_section)->sreloc;
9356 if (sreloc != NULL)
9357 {
1d5c94cb 9358 Elf32_External_Rela *slo, *shi, *srelend;
f8b44781
AM
9359 bfd_vma soffset;
9360
1d5c94cb
AM
9361 slo = (Elf32_External_Rela *) sreloc->contents;
9362 shi = srelend = slo + sreloc->reloc_count;
f8b44781
AM
9363 soffset = (offset + input_section->output_section->vma
9364 + input_section->output_offset);
9365 while (slo < shi)
9366 {
1d5c94cb
AM
9367 Elf32_External_Rela *srel = slo + (shi - slo) / 2;
9368 bfd_elf32_swap_reloca_in (output_bfd, (bfd_byte *) srel,
9369 &outrel);
f8b44781
AM
9370 if (outrel.r_offset < soffset)
9371 slo = srel + 1;
9372 else if (outrel.r_offset > soffset + 3)
9373 shi = srel;
9374 else
9375 {
1d5c94cb 9376 if (srel + 1 != srelend)
f8b44781 9377 {
1d5c94cb
AM
9378 memmove (srel, srel + 1,
9379 (srelend - (srel + 1)) * sizeof (*srel));
9380 srel = srelend - 1;
f8b44781
AM
9381 }
9382 outrel.r_offset += patch_off - offset;
1d5c94cb
AM
9383 bfd_elf32_swap_reloca_out (output_bfd, &outrel,
9384 (bfd_byte *) srel);
f8b44781
AM
9385 break;
9386 }
9387 }
9388 }
668e22e5
AM
9389 }
9390 else
9391 rel = NULL;
9392
2365f8d7 9393 if ((insn & (0x3fu << 26)) == (16u << 26) /* bc */
5446cbdf
AM
9394 && (insn & 2) == 0 /* relative */)
9395 {
9396 bfd_vma delta = ((insn & 0xfffc) ^ 0x8000) - 0x8000;
9397
9398 delta += offset - patch_off;
0e1862bb 9399 if (bfd_link_relocatable (info) && rel != NULL)
668e22e5 9400 delta = 0;
0e1862bb 9401 if (!bfd_link_relocatable (info) && rel != NULL)
668e22e5
AM
9402 {
9403 enum elf_ppc_reloc_type r_type;
9404
9405 r_type = ELF32_R_TYPE (relend[-1].r_info);
9406 if (r_type == R_PPC_REL14_BRTAKEN)
9407 insn |= BRANCH_PREDICT_BIT;
9408 else if (r_type == R_PPC_REL14_BRNTAKEN)
9409 insn &= ~BRANCH_PREDICT_BIT;
9410 else
9411 BFD_ASSERT (r_type == R_PPC_REL14);
9412
9413 if ((r_type == R_PPC_REL14_BRTAKEN
9414 || r_type == R_PPC_REL14_BRNTAKEN)
9415 && delta + 0x8000 < 0x10000
9416 && (bfd_signed_vma) delta < 0)
9417 insn ^= BRANCH_PREDICT_BIT;
9418 }
5446cbdf
AM
9419 if (delta + 0x8000 < 0x10000)
9420 {
9421 bfd_put_32 (input_bfd,
9422 (insn & ~0xfffc) | (delta & 0xfffc),
9423 contents + patch_off);
9424 patch_off += 4;
9425 bfd_put_32 (input_bfd,
9426 B | ((offset + 4 - patch_off) & 0x3fffffc),
9427 contents + patch_off);
9428 patch_off += 4;
9429 }
9430 else
9431 {
668e22e5
AM
9432 if (rel != NULL)
9433 {
9434 unsigned int r_sym = ELF32_R_SYM (relend[-1].r_info);
9435
9436 relend[-1].r_offset += 8;
9437 relend[-1].r_info = ELF32_R_INFO (r_sym, R_PPC_REL24);
9438 }
5446cbdf
AM
9439 bfd_put_32 (input_bfd,
9440 (insn & ~0xfffc) | 8,
9441 contents + patch_off);
9442 patch_off += 4;
9443 bfd_put_32 (input_bfd,
9444 B | ((offset + 4 - patch_off) & 0x3fffffc),
9445 contents + patch_off);
9446 patch_off += 4;
9447 bfd_put_32 (input_bfd,
9448 B | ((delta - 8) & 0x3fffffc),
9449 contents + patch_off);
9450 patch_off += 4;
9451 }
9452 }
9453 else
9454 {
9455 bfd_put_32 (input_bfd, insn, contents + patch_off);
9456 patch_off += 4;
9457 bfd_put_32 (input_bfd,
9458 B | ((offset + 4 - patch_off) & 0x3fffffc),
9459 contents + patch_off);
9460 patch_off += 4;
9461 }
9462 BFD_ASSERT (patch_off <= input_section->size);
9463 relax_info->workaround_size = input_section->size - patch_off;
9464 }
9465 }
9466
252b5132
RH
9467 return ret;
9468}
252b5132 9469\f
49c09209 9470/* Write out the PLT relocs and entries for H. */
c5fccbec 9471
0a1b45a2 9472static bool
49c09209 9473write_global_sym_plt (struct elf_link_hash_entry *h, void *inf)
e1a9cb8e 9474{
49c09209
AM
9475 struct bfd_link_info *info = (struct bfd_link_info *) inf;
9476 struct ppc_elf_link_hash_table *htab = ppc_elf_hash_table (info);
a6aa5195 9477 struct plt_entry *ent;
0a1b45a2 9478 bool doneone;
e1a9cb8e 9479
0a1b45a2 9480 doneone = false;
a6aa5195
AM
9481 for (ent = h->plt.plist; ent != NULL; ent = ent->next)
9482 if (ent->plt.offset != (bfd_vma) -1)
9483 {
0a1b45a2 9484 bool dyn = !use_local_plt (info, h);
30845f11 9485
a6aa5195
AM
9486 if (!doneone)
9487 {
9488 Elf_Internal_Rela rela;
9489 bfd_byte *loc;
9490 bfd_vma reloc_index;
2d7ad24e
AM
9491 asection *plt = htab->elf.splt;
9492 asection *relplt = htab->elf.srelplt;
e1a9cb8e 9493
30845f11 9494 if (htab->plt_type == PLT_NEW || !dyn)
9d8504b1
PB
9495 reloc_index = ent->plt.offset / 4;
9496 else
9497 {
9498 reloc_index = ((ent->plt.offset - htab->plt_initial_entry_size)
9499 / htab->plt_slot_size);
9500 if (reloc_index > PLT_NUM_SINGLE_ENTRIES
4a3dc543 9501 && htab->plt_type == PLT_OLD)
9d8504b1
PB
9502 reloc_index -= (reloc_index - PLT_NUM_SINGLE_ENTRIES) / 2;
9503 }
9504
a6aa5195
AM
9505 /* This symbol has an entry in the procedure linkage table.
9506 Set it up. */
30845f11 9507 if (htab->plt_type == PLT_VXWORKS && dyn)
a6aa5195 9508 {
9d8504b1
PB
9509 bfd_vma got_offset;
9510 const bfd_vma *plt_entry;
5b914448 9511
9d8504b1
PB
9512 /* The first three entries in .got.plt are reserved. */
9513 got_offset = (reloc_index + 3) * 4;
9514
9515 /* Use the right PLT. */
0e1862bb 9516 plt_entry = bfd_link_pic (info) ? ppc_elf_vxworks_pic_plt_entry
9d8504b1
PB
9517 : ppc_elf_vxworks_plt_entry;
9518
9519 /* Fill in the .plt on VxWorks. */
0e1862bb 9520 if (bfd_link_pic (info))
9d8504b1 9521 {
49c09209 9522 bfd_put_32 (info->output_bfd,
e87d4038 9523 plt_entry[0] | PPC_HA (got_offset),
2d7ad24e 9524 plt->contents + ent->plt.offset + 0);
49c09209 9525 bfd_put_32 (info->output_bfd,
e87d4038 9526 plt_entry[1] | PPC_LO (got_offset),
2d7ad24e 9527 plt->contents + ent->plt.offset + 4);
9d8504b1
PB
9528 }
9529 else
9530 {
e87d4038 9531 bfd_vma got_loc = got_offset + SYM_VAL (htab->elf.hgot);
9d8504b1 9532
49c09209 9533 bfd_put_32 (info->output_bfd,
e87d4038 9534 plt_entry[0] | PPC_HA (got_loc),
2d7ad24e 9535 plt->contents + ent->plt.offset + 0);
49c09209 9536 bfd_put_32 (info->output_bfd,
e87d4038 9537 plt_entry[1] | PPC_LO (got_loc),
2d7ad24e 9538 plt->contents + ent->plt.offset + 4);
9d8504b1
PB
9539 }
9540
49c09209 9541 bfd_put_32 (info->output_bfd, plt_entry[2],
2d7ad24e 9542 plt->contents + ent->plt.offset + 8);
49c09209 9543 bfd_put_32 (info->output_bfd, plt_entry[3],
2d7ad24e 9544 plt->contents + ent->plt.offset + 12);
9d8504b1
PB
9545
9546 /* This instruction is an immediate load. The value loaded is
9547 the byte offset of the R_PPC_JMP_SLOT relocation from the
9548 start of the .rela.plt section. The value is stored in the
9549 low-order 16 bits of the load instruction. */
9550 /* NOTE: It appears that this is now an index rather than a
9551 prescaled offset. */
49c09209 9552 bfd_put_32 (info->output_bfd,
9d8504b1 9553 plt_entry[4] | reloc_index,
2d7ad24e 9554 plt->contents + ent->plt.offset + 16);
9d8504b1
PB
9555 /* This instruction is a PC-relative branch whose target is
9556 the start of the PLT section. The address of this branch
9557 instruction is 20 bytes beyond the start of this PLT entry.
9558 The address is encoded in bits 6-29, inclusive. The value
9559 stored is right-shifted by two bits, permitting a 26-bit
9560 offset. */
49c09209 9561 bfd_put_32 (info->output_bfd,
5b914448 9562 (plt_entry[5]
9d8504b1 9563 | (-(ent->plt.offset + 20) & 0x03fffffc)),
2d7ad24e 9564 plt->contents + ent->plt.offset + 20);
49c09209 9565 bfd_put_32 (info->output_bfd, plt_entry[6],
2d7ad24e 9566 plt->contents + ent->plt.offset + 24);
49c09209 9567 bfd_put_32 (info->output_bfd, plt_entry[7],
2d7ad24e 9568 plt->contents + ent->plt.offset + 28);
9d8504b1
PB
9569
9570 /* Fill in the GOT entry corresponding to this PLT slot with
a8685210 9571 the address immediately after the "bctr" instruction
9d8504b1 9572 in this PLT entry. */
2d7ad24e
AM
9573 bfd_put_32 (info->output_bfd, (plt->output_section->vma
9574 + plt->output_offset
9575 + ent->plt.offset + 16),
ce558b89 9576 htab->elf.sgotplt->contents + got_offset);
9d8504b1 9577
0e1862bb 9578 if (!bfd_link_pic (info))
9d8504b1
PB
9579 {
9580 /* Fill in a couple of entries in .rela.plt.unloaded. */
9581 loc = htab->srelplt2->contents
9582 + ((VXWORKS_PLTRESOLVE_RELOCS + reloc_index
9583 * VXWORKS_PLT_NON_JMP_SLOT_RELOCS)
9584 * sizeof (Elf32_External_Rela));
9585
9586 /* Provide the @ha relocation for the first instruction. */
2d7ad24e
AM
9587 rela.r_offset = (plt->output_section->vma
9588 + plt->output_offset
9d8504b1 9589 + ent->plt.offset + 2);
636ce3f5 9590 rela.r_info = ELF32_R_INFO (htab->elf.hgot->indx,
9d8504b1
PB
9591 R_PPC_ADDR16_HA);
9592 rela.r_addend = got_offset;
066c738e
AM
9593 BFD_ASSERT (swap_reloc_out (info->output_bfd, &rela, loc,
9594 htab->srelplt2));
9d8504b1
PB
9595 loc += sizeof (Elf32_External_Rela);
9596
9597 /* Provide the @l relocation for the second instruction. */
2d7ad24e
AM
9598 rela.r_offset = (plt->output_section->vma
9599 + plt->output_offset
9d8504b1 9600 + ent->plt.offset + 6);
636ce3f5 9601 rela.r_info = ELF32_R_INFO (htab->elf.hgot->indx,
9d8504b1
PB
9602 R_PPC_ADDR16_LO);
9603 rela.r_addend = got_offset;
066c738e
AM
9604 BFD_ASSERT (swap_reloc_out (info->output_bfd, &rela, loc,
9605 htab->srelplt2));
9d8504b1
PB
9606 loc += sizeof (Elf32_External_Rela);
9607
9608 /* Provide a relocation for the GOT entry corresponding to this
9609 PLT slot. Point it at the middle of the .plt entry. */
ce558b89
AM
9610 rela.r_offset = (htab->elf.sgotplt->output_section->vma
9611 + htab->elf.sgotplt->output_offset
9d8504b1 9612 + got_offset);
7325306f 9613 rela.r_info = ELF32_R_INFO (htab->elf.hplt->indx,
9d8504b1
PB
9614 R_PPC_ADDR32);
9615 rela.r_addend = ent->plt.offset + 16;
066c738e
AM
9616 BFD_ASSERT (swap_reloc_out (info->output_bfd, &rela, loc,
9617 htab->srelplt2));
9d8504b1
PB
9618 }
9619
9620 /* VxWorks uses non-standard semantics for R_PPC_JMP_SLOT.
9621 In particular, the offset for the relocation is not the
9622 address of the PLT entry for this function, as specified
9623 by the ABI. Instead, the offset is set to the address of
9624 the GOT slot for this function. See EABI 4.4.4.1. */
ce558b89
AM
9625 rela.r_offset = (htab->elf.sgotplt->output_section->vma
9626 + htab->elf.sgotplt->output_offset
9d8504b1 9627 + got_offset);
2d7ad24e 9628 rela.r_addend = 0;
a6aa5195
AM
9629 }
9630 else
9631 {
2d7ad24e 9632 rela.r_addend = 0;
30845f11 9633 if (!dyn)
2d7ad24e
AM
9634 {
9635 if (h->type == STT_GNU_IFUNC)
9636 {
9637 plt = htab->elf.iplt;
9638 relplt = htab->elf.irelplt;
9639 }
9640 else
9641 {
9642 plt = htab->pltlocal;
9643 relplt = bfd_link_pic (info) ? htab->relpltlocal : NULL;
9644 }
9645 if (h->def_regular
9646 && (h->root.type == bfd_link_hash_defined
9647 || h->root.type == bfd_link_hash_defweak))
9648 rela.r_addend = SYM_VAL (h);
9649 }
e054468f 9650
2d7ad24e 9651 if (relplt == NULL)
9d8504b1 9652 {
2d7ad24e
AM
9653 loc = plt->contents + ent->plt.offset;
9654 bfd_put_32 (info->output_bfd, rela.r_addend, loc);
9d8504b1
PB
9655 }
9656 else
9657 {
2d7ad24e
AM
9658 rela.r_offset = (plt->output_section->vma
9659 + plt->output_offset
9660 + ent->plt.offset);
9661
30845f11 9662 if (htab->plt_type == PLT_OLD || !dyn)
2d7ad24e
AM
9663 {
9664 /* We don't need to fill in the .plt. The ppc dynamic
9665 linker will fill it in. */
9666 }
9667 else
9668 {
9669 bfd_vma val = (htab->glink_pltresolve + ent->plt.offset
9670 + htab->glink->output_section->vma
9671 + htab->glink->output_offset);
9672 bfd_put_32 (info->output_bfd, val,
9673 plt->contents + ent->plt.offset);
9674 }
9d8504b1 9675 }
a6aa5195 9676 }
e1a9cb8e 9677
2d7ad24e 9678 if (relplt != NULL)
e054468f 9679 {
2d7ad24e 9680 /* Fill in the entry in the .rela.plt section. */
30845f11 9681 if (!dyn)
2d7ad24e
AM
9682 {
9683 if (h->type == STT_GNU_IFUNC)
9684 rela.r_info = ELF32_R_INFO (0, R_PPC_IRELATIVE);
9685 else
9686 rela.r_info = ELF32_R_INFO (0, R_PPC_RELATIVE);
9687 loc = relplt->contents + (relplt->reloc_count++
9688 * sizeof (Elf32_External_Rela));
9689 htab->local_ifunc_resolver = 1;
9690 }
9691 else
9692 {
9693 rela.r_info = ELF32_R_INFO (h->dynindx, R_PPC_JMP_SLOT);
9694 loc = relplt->contents + (reloc_index
9695 * sizeof (Elf32_External_Rela));
9696 if (h->type == STT_GNU_IFUNC && is_static_defined (h))
9697 htab->maybe_local_ifunc_resolver = 1;
9698 }
066c738e
AM
9699 BFD_ASSERT (swap_reloc_out (info->output_bfd, &rela,
9700 loc, relplt));
82e66161 9701 }
0a1b45a2 9702 doneone = true;
a6aa5195 9703 }
e1a9cb8e 9704
30845f11 9705 if (htab->plt_type == PLT_NEW || !dyn)
a6aa5195 9706 {
a7f2871e 9707 unsigned char *p;
49c09209 9708 asection *plt = htab->elf.splt;
9e390558 9709
30845f11 9710 if (!dyn)
2d7ad24e
AM
9711 {
9712 if (h->type == STT_GNU_IFUNC)
9713 plt = htab->elf.iplt;
9714 else
9715 break;
9716 }
e1a9cb8e 9717
a7f2871e 9718 p = (unsigned char *) htab->glink->contents + ent->glink_offset;
49c09209 9719 write_glink_stub (h, ent, plt, p, info);
e1a9cb8e 9720
0e1862bb 9721 if (!bfd_link_pic (info))
e054468f
AM
9722 /* We only need one non-PIC glink stub. */
9723 break;
a6aa5195
AM
9724 }
9725 else
9726 break;
9727 }
0a1b45a2 9728 return true;
49c09209
AM
9729}
9730
9731/* Finish up PLT handling. */
9732
0a1b45a2 9733bool
49c09209
AM
9734ppc_finish_symbols (struct bfd_link_info *info)
9735{
9736 struct ppc_elf_link_hash_table *htab = ppc_elf_hash_table (info);
9737 bfd *ibfd;
9738
9739 if (!htab)
0a1b45a2 9740 return true;
49c09209
AM
9741
9742 elf_link_hash_traverse (&htab->elf, write_global_sym_plt, info);
9743
9744 for (ibfd = info->input_bfds; ibfd != NULL; ibfd = ibfd->link.next)
9745 {
9746 bfd_vma *local_got, *end_local_got;
9747 struct plt_entry **local_plt, **lplt, **end_local_plt;
9748 Elf_Internal_Shdr *symtab_hdr;
9749 bfd_size_type locsymcount;
9750 Elf_Internal_Sym *local_syms = NULL;
9751 struct plt_entry *ent;
9752
9753 if (!is_ppc_elf (ibfd))
9754 continue;
9755
9756 local_got = elf_local_got_offsets (ibfd);
9757 if (!local_got)
9758 continue;
9759
9760 symtab_hdr = &elf_symtab_hdr (ibfd);
9761 locsymcount = symtab_hdr->sh_info;
9762 end_local_got = local_got + locsymcount;
9763 local_plt = (struct plt_entry **) end_local_got;
9764 end_local_plt = local_plt + locsymcount;
9765 for (lplt = local_plt; lplt < end_local_plt; ++lplt)
9766 for (ent = *lplt; ent != NULL; ent = ent->next)
9767 {
9768 if (ent->plt.offset != (bfd_vma) -1)
9769 {
9770 Elf_Internal_Sym *sym;
9771 asection *sym_sec;
9772 asection *plt, *relplt;
9773 bfd_byte *loc;
9774 bfd_vma val;
9775 Elf_Internal_Rela rela;
8cd1fe1b 9776 unsigned char *p;
49c09209
AM
9777
9778 if (!get_sym_h (NULL, &sym, &sym_sec, NULL, &local_syms,
9779 lplt - local_plt, ibfd))
9780 {
c9594989 9781 if (symtab_hdr->contents != (unsigned char *) local_syms)
49c09209 9782 free (local_syms);
0a1b45a2 9783 return false;
49c09209
AM
9784 }
9785
9786 val = sym->st_value;
9787 if (sym_sec != NULL && sym_sec->output_section != NULL)
9788 val += sym_sec->output_offset + sym_sec->output_section->vma;
9789
2d7ad24e
AM
9790 if (ELF_ST_TYPE (sym->st_info) == STT_GNU_IFUNC)
9791 {
9792 htab->local_ifunc_resolver = 1;
9793 plt = htab->elf.iplt;
9794 relplt = htab->elf.irelplt;
9795 rela.r_info = ELF32_R_INFO (0, R_PPC_IRELATIVE);
9796 }
9797 else
9798 {
9799 plt = htab->pltlocal;
9800 if (bfd_link_pic (info))
9801 {
9802 relplt = htab->relpltlocal;
9803 rela.r_info = ELF32_R_INFO (0, R_PPC_RELATIVE);
9804 }
9805 else
9806 {
9807 loc = plt->contents + ent->plt.offset;
9808 bfd_put_32 (info->output_bfd, val, loc);
9809 continue;
9810 }
9811 }
49c09209
AM
9812
9813 rela.r_offset = (ent->plt.offset
9814 + plt->output_offset
9815 + plt->output_section->vma);
49c09209 9816 rela.r_addend = val;
066c738e
AM
9817 BFD_ASSERT (count_and_swap_reloc_out (info->output_bfd, &rela,
9818 relplt));
49c09209 9819
8cd1fe1b 9820 p = (unsigned char *) htab->glink->contents + ent->glink_offset;
49c09209 9821 write_glink_stub (NULL, ent, htab->elf.iplt, p, info);
49c09209
AM
9822 }
9823 }
9824
9825 if (local_syms != NULL
9826 && symtab_hdr->contents != (unsigned char *) local_syms)
9827 {
9828 if (!info->keep_memory)
9829 free (local_syms);
9830 else
9831 symtab_hdr->contents = (unsigned char *) local_syms;
9832 }
9833 }
0a1b45a2 9834 return true;
49c09209
AM
9835}
9836
9837/* Finish up dynamic symbol handling. We set the contents of various
9838 dynamic sections here. */
9839
0a1b45a2 9840static bool
49c09209
AM
9841ppc_elf_finish_dynamic_symbol (bfd *output_bfd,
9842 struct bfd_link_info *info,
9843 struct elf_link_hash_entry *h,
9844 Elf_Internal_Sym *sym)
9845{
9846 struct ppc_elf_link_hash_table *htab = ppc_elf_hash_table (info);
9847 struct plt_entry *ent;
9848
9849#ifdef DEBUG
9850 fprintf (stderr, "ppc_elf_finish_dynamic_symbol called for %s",
9851 h->root.root.string);
9852#endif
9853
9854 if (!h->def_regular
9855 || (h->type == STT_GNU_IFUNC && !bfd_link_pic (info)))
9856 for (ent = h->plt.plist; ent != NULL; ent = ent->next)
9857 if (ent->plt.offset != (bfd_vma) -1)
9858 {
9859 if (!h->def_regular)
9860 {
9861 /* Mark the symbol as undefined, rather than as
9862 defined in the .plt section. Leave the value if
9863 there were any relocations where pointer equality
9864 matters (this is a clue for the dynamic linker, to
9865 make function pointer comparisons work between an
9866 application and shared library), otherwise set it
9867 to zero. */
9868 sym->st_shndx = SHN_UNDEF;
9869 if (!h->pointer_equality_needed)
9870 sym->st_value = 0;
9871 else if (!h->ref_regular_nonweak)
9872 {
9873 /* This breaks function pointer comparisons, but
9874 that is better than breaking tests for a NULL
9875 function pointer. */
9876 sym->st_value = 0;
9877 }
9878 }
9879 else
9880 {
9881 /* Set the value of ifunc symbols in a non-pie
9882 executable to the glink entry. This is to avoid
9883 text relocations. We can't do this for ifunc in
9884 allocate_dynrelocs, as we do for normal dynamic
9885 function symbols with plt entries, because we need
9886 to keep the original value around for the ifunc
9887 relocation. */
9888 sym->st_shndx
9889 = (_bfd_elf_section_from_bfd_section
9890 (info->output_bfd, htab->glink->output_section));
9891 sym->st_value = (ent->glink_offset
9892 + htab->glink->output_offset
9893 + htab->glink->output_section->vma);
9894 }
9895 break;
9896 }
e1a9cb8e 9897
25dbc73a
AM
9898 if (h->needs_copy)
9899 {
9900 asection *s;
9901 Elf_Internal_Rela rela;
e1a9cb8e 9902
25dbc73a 9903 /* This symbols needs a copy reloc. Set it up. */
e1a9cb8e 9904
25dbc73a
AM
9905#ifdef DEBUG
9906 fprintf (stderr, ", copy");
9907#endif
e1a9cb8e 9908
25dbc73a 9909 BFD_ASSERT (h->dynindx != -1);
86bbe32f 9910
4dc4a9a5 9911 if (ppc_elf_hash_entry (h)->has_sda_refs)
25dbc73a 9912 s = htab->relsbss;
afbf7e8e 9913 else if (h->root.u.def.section == htab->elf.sdynrelro)
5474d94f 9914 s = htab->elf.sreldynrelro;
25dbc73a 9915 else
9d19e4fd 9916 s = htab->elf.srelbss;
25dbc73a 9917 BFD_ASSERT (s != NULL);
e1a9cb8e 9918
e87d4038 9919 rela.r_offset = SYM_VAL (h);
25dbc73a
AM
9920 rela.r_info = ELF32_R_INFO (h->dynindx, R_PPC_COPY);
9921 rela.r_addend = 0;
066c738e 9922 BFD_ASSERT (count_and_swap_reloc_out (output_bfd, &rela, s));
25dbc73a 9923 }
e1a9cb8e 9924
25dbc73a
AM
9925#ifdef DEBUG
9926 fprintf (stderr, "\n");
9927#endif
e1a9cb8e 9928
0a1b45a2 9929 return true;
25dbc73a
AM
9930}
9931\f
9932static enum elf_reloc_type_class
7e612e98
AM
9933ppc_elf_reloc_type_class (const struct bfd_link_info *info,
9934 const asection *rel_sec,
9935 const Elf_Internal_Rela *rela)
e1a9cb8e 9936{
7e612e98
AM
9937 struct ppc_elf_link_hash_table *htab = ppc_elf_hash_table (info);
9938
ce558b89 9939 if (rel_sec == htab->elf.irelplt)
7e612e98
AM
9940 return reloc_class_ifunc;
9941
25dbc73a
AM
9942 switch (ELF32_R_TYPE (rela->r_info))
9943 {
9944 case R_PPC_RELATIVE:
9945 return reloc_class_relative;
25dbc73a
AM
9946 case R_PPC_JMP_SLOT:
9947 return reloc_class_plt;
9948 case R_PPC_COPY:
9949 return reloc_class_copy;
9950 default:
9951 return reloc_class_normal;
9952 }
e1a9cb8e 9953}
25dbc73a
AM
9954\f
9955/* Finish up the dynamic sections. */
e1a9cb8e 9956
0a1b45a2 9957static bool
25dbc73a
AM
9958ppc_elf_finish_dynamic_sections (bfd *output_bfd,
9959 struct bfd_link_info *info)
e1a9cb8e 9960{
25dbc73a
AM
9961 asection *sdyn;
9962 struct ppc_elf_link_hash_table *htab;
1fe44d79 9963 bfd_vma got;
e87d4038 9964 bfd *dynobj;
0a1b45a2 9965 bool ret = true;
e1a9cb8e 9966
25dbc73a
AM
9967#ifdef DEBUG
9968 fprintf (stderr, "ppc_elf_finish_dynamic_sections called\n");
9969#endif
6b0817e5 9970
25dbc73a 9971 htab = ppc_elf_hash_table (info);
ce558b89 9972 dynobj = htab->elf.dynobj;
3d4d4302 9973 sdyn = bfd_get_linker_section (dynobj, ".dynamic");
e1a9cb8e 9974
1fe44d79
AM
9975 got = 0;
9976 if (htab->elf.hgot != NULL)
e87d4038 9977 got = SYM_VAL (htab->elf.hgot);
1fe44d79 9978
25dbc73a 9979 if (htab->elf.dynamic_sections_created)
e1a9cb8e 9980 {
25dbc73a 9981 Elf32_External_Dyn *dyncon, *dynconend;
e1a9cb8e 9982
ce558b89 9983 BFD_ASSERT (htab->elf.splt != NULL && sdyn != NULL);
86bbe32f 9984
25dbc73a
AM
9985 dyncon = (Elf32_External_Dyn *) sdyn->contents;
9986 dynconend = (Elf32_External_Dyn *) (sdyn->contents + sdyn->size);
9987 for (; dyncon < dynconend; dyncon++)
9988 {
9989 Elf_Internal_Dyn dyn;
9990 asection *s;
e1a9cb8e 9991
9d8504b1 9992 bfd_elf32_swap_dyn_in (dynobj, dyncon, &dyn);
86bbe32f 9993
25dbc73a
AM
9994 switch (dyn.d_tag)
9995 {
9996 case DT_PLTGOT:
90c14f0c 9997 if (htab->elf.target_os == is_vxworks)
ce558b89 9998 s = htab->elf.sgotplt;
9d8504b1 9999 else
ce558b89 10000 s = htab->elf.splt;
25dbc73a
AM
10001 dyn.d_un.d_ptr = s->output_section->vma + s->output_offset;
10002 break;
86bbe32f 10003
25dbc73a 10004 case DT_PLTRELSZ:
ce558b89 10005 dyn.d_un.d_val = htab->elf.srelplt->size;
25dbc73a 10006 break;
e1a9cb8e 10007
25dbc73a 10008 case DT_JMPREL:
ce558b89 10009 s = htab->elf.srelplt;
25dbc73a
AM
10010 dyn.d_un.d_ptr = s->output_section->vma + s->output_offset;
10011 break;
2f89ff8d 10012
1fe44d79
AM
10013 case DT_PPC_GOT:
10014 dyn.d_un.d_ptr = got;
d7128ce4
AM
10015 break;
10016
82e66161
AM
10017 case DT_TEXTREL:
10018 if (htab->local_ifunc_resolver)
10019 info->callbacks->einfo
10020 (_("%X%P: text relocations and GNU indirect "
10021 "functions will result in a segfault at runtime\n"));
10022 else if (htab->maybe_local_ifunc_resolver)
10023 info->callbacks->einfo
10024 (_("%P: warning: text relocations and GNU indirect "
10025 "functions may result in a segfault at runtime\n"));
10026 continue;
10027
25dbc73a 10028 default:
90c14f0c 10029 if (htab->elf.target_os == is_vxworks
7a2b07ff
NS
10030 && elf_vxworks_finish_dynamic_entry (output_bfd, &dyn))
10031 break;
25dbc73a
AM
10032 continue;
10033 }
4c45e5c9 10034
25dbc73a
AM
10035 bfd_elf32_swap_dyn_out (output_bfd, &dyn, dyncon);
10036 }
10037 }
4c45e5c9 10038
6528b6eb
AM
10039 if (htab->elf.sgot != NULL
10040 && htab->elf.sgot->output_section != bfd_abs_section_ptr)
25dbc73a 10041 {
ce558b89
AM
10042 if (htab->elf.hgot->root.u.def.section == htab->elf.sgot
10043 || htab->elf.hgot->root.u.def.section == htab->elf.sgotplt)
e87d4038 10044 {
e79f5955 10045 unsigned char *p = htab->elf.hgot->root.u.def.section->contents;
2f89ff8d 10046
e87d4038
AM
10047 p += htab->elf.hgot->root.u.def.value;
10048 if (htab->plt_type == PLT_OLD)
e79f5955
AM
10049 {
10050 /* Add a blrl instruction at _GLOBAL_OFFSET_TABLE_-4
10051 so that a function can easily find the address of
10052 _GLOBAL_OFFSET_TABLE_. */
10053 BFD_ASSERT (htab->elf.hgot->root.u.def.value - 4
10054 < htab->elf.hgot->root.u.def.section->size);
10055 bfd_put_32 (output_bfd, 0x4e800021, p - 4);
10056 }
3b36f7e6 10057
e87d4038 10058 if (sdyn != NULL)
e79f5955
AM
10059 {
10060 bfd_vma val = sdyn->output_section->vma + sdyn->output_offset;
10061 BFD_ASSERT (htab->elf.hgot->root.u.def.value
10062 < htab->elf.hgot->root.u.def.section->size);
10063 bfd_put_32 (output_bfd, val, p);
10064 }
e87d4038
AM
10065 }
10066 else
10067 {
695344c0 10068 /* xgettext:c-format */
cf97bcb0
AM
10069 _bfd_error_handler (_("%s not defined in linker created %pA"),
10070 htab->elf.hgot->root.root.string,
10071 (htab->elf.sgotplt != NULL
10072 ? htab->elf.sgotplt : htab->elf.sgot));
e87d4038 10073 bfd_set_error (bfd_error_bad_value);
0a1b45a2 10074 ret = false;
e87d4038 10075 }
25dbc73a 10076
ce558b89 10077 elf_section_data (htab->elf.sgot->output_section)->this_hdr.sh_entsize = 4;
25dbc73a
AM
10078 }
10079
9d8504b1 10080 /* Fill in the first entry in the VxWorks procedure linkage table. */
90c14f0c 10081 if (htab->elf.target_os == is_vxworks
6528b6eb
AM
10082 && htab->elf.splt != NULL
10083 && htab->elf.splt->size != 0
10084 && htab->elf.splt->output_section != bfd_abs_section_ptr)
9d8504b1 10085 {
6528b6eb 10086 asection *splt = htab->elf.splt;
9d8504b1 10087 /* Use the right PLT. */
0e1862bb 10088 const bfd_vma *plt_entry = (bfd_link_pic (info)
5b914448
AM
10089 ? ppc_elf_vxworks_pic_plt0_entry
10090 : ppc_elf_vxworks_plt0_entry);
9d8504b1 10091
0e1862bb 10092 if (!bfd_link_pic (info))
9d8504b1 10093 {
e87d4038 10094 bfd_vma got_value = SYM_VAL (htab->elf.hgot);
9d8504b1 10095
e87d4038 10096 bfd_put_32 (output_bfd, plt_entry[0] | PPC_HA (got_value),
9d8504b1 10097 splt->contents + 0);
e87d4038 10098 bfd_put_32 (output_bfd, plt_entry[1] | PPC_LO (got_value),
9d8504b1
PB
10099 splt->contents + 4);
10100 }
10101 else
10102 {
10103 bfd_put_32 (output_bfd, plt_entry[0], splt->contents + 0);
10104 bfd_put_32 (output_bfd, plt_entry[1], splt->contents + 4);
10105 }
10106 bfd_put_32 (output_bfd, plt_entry[2], splt->contents + 8);
10107 bfd_put_32 (output_bfd, plt_entry[3], splt->contents + 12);
10108 bfd_put_32 (output_bfd, plt_entry[4], splt->contents + 16);
10109 bfd_put_32 (output_bfd, plt_entry[5], splt->contents + 20);
10110 bfd_put_32 (output_bfd, plt_entry[6], splt->contents + 24);
10111 bfd_put_32 (output_bfd, plt_entry[7], splt->contents + 28);
10112
0e1862bb 10113 if (! bfd_link_pic (info))
9d8504b1
PB
10114 {
10115 Elf_Internal_Rela rela;
10116 bfd_byte *loc;
10117
10118 loc = htab->srelplt2->contents;
10119
10120 /* Output the @ha relocation for the first instruction. */
ce558b89
AM
10121 rela.r_offset = (htab->elf.splt->output_section->vma
10122 + htab->elf.splt->output_offset
9d8504b1 10123 + 2);
636ce3f5 10124 rela.r_info = ELF32_R_INFO (htab->elf.hgot->indx, R_PPC_ADDR16_HA);
9d8504b1 10125 rela.r_addend = 0;
066c738e 10126 BFD_ASSERT (swap_reloc_out (output_bfd, &rela, loc, htab->srelplt2));
9d8504b1 10127 loc += sizeof (Elf32_External_Rela);
5b914448 10128
9d8504b1 10129 /* Output the @l relocation for the second instruction. */
ce558b89
AM
10130 rela.r_offset = (htab->elf.splt->output_section->vma
10131 + htab->elf.splt->output_offset
9d8504b1 10132 + 6);
636ce3f5 10133 rela.r_info = ELF32_R_INFO (htab->elf.hgot->indx, R_PPC_ADDR16_LO);
9d8504b1 10134 rela.r_addend = 0;
066c738e 10135 BFD_ASSERT (swap_reloc_out (output_bfd, &rela, loc, htab->srelplt2));
9d8504b1
PB
10136 loc += sizeof (Elf32_External_Rela);
10137
10138 /* Fix up the remaining relocations. They may have the wrong
10139 symbol index for _G_O_T_ or _P_L_T_ depending on the order
10140 in which symbols were output. */
10141 while (loc < htab->srelplt2->contents + htab->srelplt2->size)
10142 {
10143 Elf_Internal_Rela rel;
10144
10145 bfd_elf32_swap_reloc_in (output_bfd, loc, &rel);
636ce3f5 10146 rel.r_info = ELF32_R_INFO (htab->elf.hgot->indx, R_PPC_ADDR16_HA);
9d8504b1
PB
10147 bfd_elf32_swap_reloc_out (output_bfd, &rel, loc);
10148 loc += sizeof (Elf32_External_Rela);
10149
10150 bfd_elf32_swap_reloc_in (output_bfd, loc, &rel);
636ce3f5 10151 rel.r_info = ELF32_R_INFO (htab->elf.hgot->indx, R_PPC_ADDR16_LO);
9d8504b1
PB
10152 bfd_elf32_swap_reloc_out (output_bfd, &rel, loc);
10153 loc += sizeof (Elf32_External_Rela);
10154
10155 bfd_elf32_swap_reloc_in (output_bfd, loc, &rel);
7325306f 10156 rel.r_info = ELF32_R_INFO (htab->elf.hplt->indx, R_PPC_ADDR32);
9d8504b1
PB
10157 bfd_elf32_swap_reloc_out (output_bfd, &rel, loc);
10158 loc += sizeof (Elf32_External_Rela);
10159 }
10160 }
10161 }
10162
e054468f
AM
10163 if (htab->glink != NULL
10164 && htab->glink->contents != NULL
10165 && htab->elf.dynamic_sections_created)
d7128ce4
AM
10166 {
10167 unsigned char *p;
10168 unsigned char *endp;
a6aa5195 10169 bfd_vma res0;
a6aa5195
AM
10170
10171 /*
10172 * PIC glink code is the following:
10173 *
10174 * # ith PLT code stub.
10175 * addis 11,30,(plt+(i-1)*4-got)@ha
10176 * lwz 11,(plt+(i-1)*4-got)@l(11)
10177 * mtctr 11
10178 * bctr
10179 *
10180 * # A table of branches, one for each plt entry.
176a0d42 10181 * # The idea is that the plt call stub loads ctr and r11 with these
a6aa5195
AM
10182 * # addresses, so (r11 - res_0) gives the plt index * 4.
10183 * res_0: b PLTresolve
10184 * res_1: b PLTresolve
10185 * .
10186 * # Some number of entries towards the end can be nops
10187 * res_n_m3: nop
10188 * res_n_m2: nop
10189 * res_n_m1:
10190 *
10191 * PLTresolve:
10192 * addis 11,11,(1f-res_0)@ha
10193 * mflr 0
10194 * bcl 20,31,1f
10195 * 1: addi 11,11,(1b-res_0)@l
10196 * mflr 12
10197 * mtlr 0
07d6d2b8 10198 * sub 11,11,12 # r11 = index * 4
a6aa5195 10199 * addis 12,12,(got+4-1b)@ha
07d6d2b8
AM
10200 * lwz 0,(got+4-1b)@l(12) # got[1] address of dl_runtime_resolve
10201 * lwz 12,(got+8-1b)@l(12) # got[2] contains the map address
a6aa5195
AM
10202 * mtctr 0
10203 * add 0,11,11
07d6d2b8 10204 * add 11,0,11 # r11 = index * 12 = reloc offset.
a6aa5195 10205 * bctr
9e390558 10206 *
176a0d42
AM
10207 * Non-PIC glink code is a little simpler.
10208 *
10209 * # ith PLT code stub.
10210 * lis 11,(plt+(i-1)*4)@ha
10211 * lwz 11,(plt+(i-1)*4)@l(11)
10212 * mtctr 11
10213 * bctr
10214 *
10215 * The branch table is the same, then comes
10216 *
10217 * PLTresolve:
10218 * lis 12,(got+4)@ha
10219 * addis 11,11,(-res_0)@ha
07d6d2b8
AM
10220 * lwz 0,(got+4)@l(12) # got[1] address of dl_runtime_resolve
10221 * addi 11,11,(-res_0)@l # r11 = index * 4
176a0d42
AM
10222 * mtctr 0
10223 * add 0,11,11
07d6d2b8
AM
10224 * lwz 12,(got+8)@l(12) # got[2] contains the map address
10225 * add 11,0,11 # r11 = index * 12 = reloc offset.
176a0d42
AM
10226 * bctr
10227 */
7e8aeb9a 10228
a6aa5195 10229 /* Build the branch table, one for each plt entry (less one),
86b9da88 10230 and perhaps some padding. */
a6aa5195
AM
10231 p = htab->glink->contents;
10232 p += htab->glink_pltresolve;
86b9da88
AM
10233 endp = htab->glink->contents;
10234 endp += htab->glink->size - GLINK_PLTRESOLVE;
da3a2088 10235 while (p < endp - (htab->params->ppc476_workaround ? 0 : 8 * 4))
86b9da88
AM
10236 {
10237 bfd_put_32 (output_bfd, B + endp - p, p);
10238 p += 4;
10239 }
10240 while (p < endp)
10241 {
10242 bfd_put_32 (output_bfd, NOP, p);
10243 p += 4;
10244 }
10245
7e8aeb9a 10246 res0 = (htab->glink_pltresolve
86b9da88
AM
10247 + htab->glink->output_section->vma
10248 + htab->glink->output_offset);
10249
da3a2088
AM
10250 if (htab->params->ppc476_workaround)
10251 {
10252 /* Ensure that a call stub at the end of a page doesn't
10253 result in prefetch over the end of the page into the
10254 glink branch table. */
10255 bfd_vma pagesize = (bfd_vma) 1 << htab->params->pagesize_p2;
10256 bfd_vma page_addr;
10257 bfd_vma glink_start = (htab->glink->output_section->vma
10258 + htab->glink->output_offset);
10259
10260 for (page_addr = res0 & -pagesize;
10261 page_addr > glink_start;
10262 page_addr -= pagesize)
10263 {
10264 /* We have a plt call stub that may need fixing. */
10265 bfd_byte *loc;
10266 unsigned int insn;
10267
10268 loc = htab->glink->contents + page_addr - 4 - glink_start;
10269 insn = bfd_get_32 (output_bfd, loc);
10270 if (insn == BCTR)
10271 {
10272 /* By alignment, we know that there must be at least
10273 one other call stub before this one. */
10274 insn = bfd_get_32 (output_bfd, loc - 16);
10275 if (insn == BCTR)
10276 bfd_put_32 (output_bfd, B | (-16 & 0x3fffffc), loc);
10277 else
10278 bfd_put_32 (output_bfd, B | (-20 & 0x3fffffc), loc);
10279 }
10280 }
10281 }
10282
86b9da88 10283 /* Last comes the PLTresolve stub. */
9e390558 10284 endp = p + GLINK_PLTRESOLVE;
0e1862bb 10285 if (bfd_link_pic (info))
7e8aeb9a 10286 {
a6aa5195 10287 bfd_vma bcl;
d7128ce4 10288
a6aa5195
AM
10289 bcl = (htab->glink->size - GLINK_PLTRESOLVE + 3*4
10290 + htab->glink->output_section->vma
10291 + htab->glink->output_offset);
10292
9e390558
AM
10293 bfd_put_32 (output_bfd, ADDIS_11_11 + PPC_HA (bcl - res0), p);
10294 p += 4;
10295 bfd_put_32 (output_bfd, MFLR_0, p);
10296 p += 4;
10297 bfd_put_32 (output_bfd, BCL_20_31, p);
10298 p += 4;
10299 bfd_put_32 (output_bfd, ADDI_11_11 + PPC_LO (bcl - res0), p);
10300 p += 4;
10301 bfd_put_32 (output_bfd, MFLR_12, p);
10302 p += 4;
10303 bfd_put_32 (output_bfd, MTLR_0, p);
10304 p += 4;
10305 bfd_put_32 (output_bfd, SUB_11_11_12, p);
10306 p += 4;
10307 bfd_put_32 (output_bfd, ADDIS_12_12 + PPC_HA (got + 4 - bcl), p);
10308 p += 4;
a6aa5195
AM
10309 if (PPC_HA (got + 4 - bcl) == PPC_HA (got + 8 - bcl))
10310 {
9e390558
AM
10311 bfd_put_32 (output_bfd, LWZ_0_12 + PPC_LO (got + 4 - bcl), p);
10312 p += 4;
10313 bfd_put_32 (output_bfd, LWZ_12_12 + PPC_LO (got + 8 - bcl), p);
10314 p += 4;
a6aa5195
AM
10315 }
10316 else
10317 {
9e390558
AM
10318 bfd_put_32 (output_bfd, LWZU_0_12 + PPC_LO (got + 4 - bcl), p);
10319 p += 4;
10320 bfd_put_32 (output_bfd, LWZ_12_12 + 4, p);
10321 p += 4;
a6aa5195 10322 }
9e390558
AM
10323 bfd_put_32 (output_bfd, MTCTR_0, p);
10324 p += 4;
10325 bfd_put_32 (output_bfd, ADD_0_11_11, p);
7e8aeb9a
AM
10326 }
10327 else
d7128ce4 10328 {
9e390558
AM
10329 bfd_put_32 (output_bfd, LIS_12 + PPC_HA (got + 4), p);
10330 p += 4;
10331 bfd_put_32 (output_bfd, ADDIS_11_11 + PPC_HA (-res0), p);
10332 p += 4;
a6aa5195 10333 if (PPC_HA (got + 4) == PPC_HA (got + 8))
9e390558 10334 bfd_put_32 (output_bfd, LWZ_0_12 + PPC_LO (got + 4), p);
a6aa5195 10335 else
9e390558
AM
10336 bfd_put_32 (output_bfd, LWZU_0_12 + PPC_LO (got + 4), p);
10337 p += 4;
10338 bfd_put_32 (output_bfd, ADDI_11_11 + PPC_LO (-res0), p);
10339 p += 4;
10340 bfd_put_32 (output_bfd, MTCTR_0, p);
10341 p += 4;
10342 bfd_put_32 (output_bfd, ADD_0_11_11, p);
10343 p += 4;
10344 if (PPC_HA (got + 4) == PPC_HA (got + 8))
10345 bfd_put_32 (output_bfd, LWZ_12_12 + PPC_LO (got + 8), p);
10346 else
10347 bfd_put_32 (output_bfd, LWZ_12_12 + 4, p);
10348 }
10349 p += 4;
10350 bfd_put_32 (output_bfd, ADD_11_0_11, p);
10351 p += 4;
407aa07c
AM
10352 bfd_put_32 (output_bfd, BCTR, p);
10353 p += 4;
9e390558
AM
10354 while (p < endp)
10355 {
10356 bfd_put_32 (output_bfd,
10357 htab->params->ppc476_workaround ? BA : NOP, p);
10358 p += 4;
d7128ce4 10359 }
9e390558 10360 BFD_ASSERT (p == endp);
d7128ce4
AM
10361 }
10362
6177242a
AM
10363 if (htab->glink_eh_frame != NULL
10364 && htab->glink_eh_frame->contents != NULL)
10365 {
10366 unsigned char *p = htab->glink_eh_frame->contents;
10367 bfd_vma val;
10368
6177242a
AM
10369 p += sizeof (glink_eh_frame_cie);
10370 /* FDE length. */
6177242a
AM
10371 p += 4;
10372 /* CIE pointer. */
6177242a
AM
10373 p += 4;
10374 /* Offset to .glink. */
10375 val = (htab->glink->output_section->vma
10376 + htab->glink->output_offset);
10377 val -= (htab->glink_eh_frame->output_section->vma
10378 + htab->glink_eh_frame->output_offset);
10379 val -= p - htab->glink_eh_frame->contents;
10380 bfd_put_32 (htab->elf.dynobj, val, p);
6177242a 10381
dbaa2011 10382 if (htab->glink_eh_frame->sec_info_type == SEC_INFO_TYPE_EH_FRAME
6177242a
AM
10383 && !_bfd_elf_write_section_eh_frame (output_bfd, info,
10384 htab->glink_eh_frame,
10385 htab->glink_eh_frame->contents))
0a1b45a2 10386 return false;
6177242a
AM
10387 }
10388
e87d4038 10389 return ret;
25dbc73a 10390}
e1a9cb8e 10391\f
6d00b590 10392#define TARGET_LITTLE_SYM powerpc_elf32_le_vec
252b5132 10393#define TARGET_LITTLE_NAME "elf32-powerpcle"
6d00b590 10394#define TARGET_BIG_SYM powerpc_elf32_vec
252b5132
RH
10395#define TARGET_BIG_NAME "elf32-powerpc"
10396#define ELF_ARCH bfd_arch_powerpc
ae95ffa6 10397#define ELF_TARGET_ID PPC32_ELF_DATA
252b5132
RH
10398#define ELF_MACHINE_CODE EM_PPC
10399#define ELF_MAXPAGESIZE 0x10000
702d1671 10400#define ELF_COMMONPAGESIZE 0x1000
252b5132
RH
10401#define elf_info_to_howto ppc_elf_info_to_howto
10402
10403#ifdef EM_CYGNUS_POWERPC
10404#define ELF_MACHINE_ALT1 EM_CYGNUS_POWERPC
10405#endif
10406
10407#ifdef EM_PPC_OLD
10408#define ELF_MACHINE_ALT2 EM_PPC_OLD
10409#endif
10410
10411#define elf_backend_plt_not_loaded 1
5474d94f 10412#define elf_backend_want_dynrelro 1
252b5132 10413#define elf_backend_can_gc_sections 1
51b64d56 10414#define elf_backend_can_refcount 1
b491616a 10415#define elf_backend_rela_normal 1
53291d1f 10416#define elf_backend_caches_rawsize 1
252b5132 10417
43c40ab2 10418#define bfd_elf32_mkobject ppc_elf_mkobject
252b5132 10419#define bfd_elf32_bfd_merge_private_bfd_data ppc_elf_merge_private_bfd_data
70bccea4 10420#define bfd_elf32_bfd_relax_section ppc_elf_relax_section
252b5132 10421#define bfd_elf32_bfd_reloc_type_lookup ppc_elf_reloc_type_lookup
b9c361e0 10422#define bfd_elf32_bfd_reloc_name_lookup ppc_elf_reloc_name_lookup
252b5132 10423#define bfd_elf32_bfd_set_private_flags ppc_elf_set_private_flags
70bccea4 10424#define bfd_elf32_bfd_link_hash_table_create ppc_elf_link_hash_table_create
468392fb 10425#define bfd_elf32_get_synthetic_symtab ppc_elf_get_synthetic_symtab
252b5132 10426
feee612b 10427#define elf_backend_object_p ppc_elf_object_p
252b5132 10428#define elf_backend_gc_mark_hook ppc_elf_gc_mark_hook
252b5132
RH
10429#define elf_backend_section_from_shdr ppc_elf_section_from_shdr
10430#define elf_backend_relocate_section ppc_elf_relocate_section
10431#define elf_backend_create_dynamic_sections ppc_elf_create_dynamic_sections
10432#define elf_backend_check_relocs ppc_elf_check_relocs
c0e331c7 10433#define elf_backend_relocs_compatible _bfd_elf_relocs_compatible
7fce784e 10434#define elf_backend_copy_indirect_symbol ppc_elf_copy_indirect_symbol
252b5132
RH
10435#define elf_backend_adjust_dynamic_symbol ppc_elf_adjust_dynamic_symbol
10436#define elf_backend_add_symbol_hook ppc_elf_add_symbol_hook
af969b14 10437#define elf_backend_late_size_sections ppc_elf_late_size_sections
0eb4a168 10438#define elf_backend_hash_symbol ppc_elf_hash_symbol
252b5132
RH
10439#define elf_backend_finish_dynamic_symbol ppc_elf_finish_dynamic_symbol
10440#define elf_backend_finish_dynamic_sections ppc_elf_finish_dynamic_sections
10441#define elf_backend_fake_sections ppc_elf_fake_sections
10442#define elf_backend_additional_program_headers ppc_elf_additional_program_headers
954b63d4 10443#define elf_backend_modify_segment_map ppc_elf_modify_segment_map
c5fccbec
DJ
10444#define elf_backend_grok_prstatus ppc_elf_grok_prstatus
10445#define elf_backend_grok_psinfo ppc_elf_grok_psinfo
183e98be 10446#define elf_backend_write_core_note ppc_elf_write_core_note
29c2fb7c 10447#define elf_backend_reloc_type_class ppc_elf_reloc_type_class
70bccea4
AM
10448#define elf_backend_begin_write_processing ppc_elf_begin_write_processing
10449#define elf_backend_final_write_processing ppc_elf_final_write_processing
10450#define elf_backend_write_section ppc_elf_write_section
551b43fd 10451#define elf_backend_get_sec_type_attr ppc_elf_get_sec_type_attr
4c45e5c9 10452#define elf_backend_plt_sym_val ppc_elf_plt_sym_val
8a696751 10453#define elf_backend_action_discarded ppc_elf_action_discarded
74541ad4 10454#define elf_backend_init_index_section _bfd_elf_init_1_index_section
b9c361e0 10455#define elf_backend_lookup_section_flags_hook ppc_elf_lookup_section_flags
252b5132
RH
10456
10457#include "elf32-target.h"
9d8504b1 10458
7b8e7dad
AM
10459/* FreeBSD Target */
10460
10461#undef TARGET_LITTLE_SYM
10462#undef TARGET_LITTLE_NAME
10463
10464#undef TARGET_BIG_SYM
6d00b590 10465#define TARGET_BIG_SYM powerpc_elf32_fbsd_vec
7b8e7dad
AM
10466#undef TARGET_BIG_NAME
10467#define TARGET_BIG_NAME "elf32-powerpc-freebsd"
10468
10469#undef ELF_OSABI
10470#define ELF_OSABI ELFOSABI_FREEBSD
10471
10472#undef elf32_bed
10473#define elf32_bed elf32_powerpc_fbsd_bed
10474
10475#include "elf32-target.h"
10476
9d8504b1
PB
10477/* VxWorks Target */
10478
10479#undef TARGET_LITTLE_SYM
10480#undef TARGET_LITTLE_NAME
10481
10482#undef TARGET_BIG_SYM
6d00b590 10483#define TARGET_BIG_SYM powerpc_elf32_vxworks_vec
9d8504b1
PB
10484#undef TARGET_BIG_NAME
10485#define TARGET_BIG_NAME "elf32-powerpc-vxworks"
10486
7b8e7dad
AM
10487#undef ELF_OSABI
10488
90c14f0c
L
10489#undef ELF_TARGET_OS
10490#define ELF_TARGET_OS is_vxworks
10491
d5e3d971
PB
10492/* VxWorks uses the elf default section flags for .plt. */
10493static const struct bfd_elf_special_section *
4aef7643 10494ppc_elf_vxworks_get_sec_type_attr (bfd *abfd, asection *sec)
9d8504b1 10495{
d5e3d971
PB
10496 if (sec->name == NULL)
10497 return NULL;
10498
10499 if (strcmp (sec->name, ".plt") == 0)
10500 return _bfd_elf_get_sec_type_attr (abfd, sec);
10501
10502 return ppc_elf_get_sec_type_attr (abfd, sec);
10503}
9d8504b1
PB
10504
10505/* Like ppc_elf_link_hash_table_create, but overrides
10506 appropriately for VxWorks. */
10507static struct bfd_link_hash_table *
10508ppc_elf_vxworks_link_hash_table_create (bfd *abfd)
10509{
10510 struct bfd_link_hash_table *ret;
10511
10512 ret = ppc_elf_link_hash_table_create (abfd);
10513 if (ret)
10514 {
10515 struct ppc_elf_link_hash_table *htab
954b63d4 10516 = (struct ppc_elf_link_hash_table *)ret;
4a3dc543 10517 htab->plt_type = PLT_VXWORKS;
9d8504b1
PB
10518 htab->plt_entry_size = VXWORKS_PLT_ENTRY_SIZE;
10519 htab->plt_slot_size = VXWORKS_PLT_ENTRY_SIZE;
10520 htab->plt_initial_entry_size = VXWORKS_PLT_INITIAL_ENTRY_SIZE;
10521 }
10522 return ret;
10523}
10524
10525/* Tweak magic VxWorks symbols as they are loaded. */
0a1b45a2 10526static bool
9d8504b1
PB
10527ppc_elf_vxworks_add_symbol_hook (bfd *abfd,
10528 struct bfd_link_info *info,
10529 Elf_Internal_Sym *sym,
4aef7643
AM
10530 const char **namep,
10531 flagword *flagsp,
9d8504b1
PB
10532 asection **secp,
10533 bfd_vma *valp)
10534{
4aef7643
AM
10535 if (!elf_vxworks_add_symbol_hook (abfd, info, sym, namep, flagsp, secp,
10536 valp))
0a1b45a2 10537 return false;
9d8504b1 10538
4aef7643 10539 return ppc_elf_add_symbol_hook (abfd, info, sym, namep, flagsp, secp, valp);
9d8504b1
PB
10540}
10541
0a1b45a2 10542static bool
cc364be6 10543ppc_elf_vxworks_final_write_processing (bfd *abfd)
9d8504b1 10544{
cc364be6
AM
10545 ppc_final_write_processing (abfd);
10546 return elf_vxworks_final_write_processing (abfd);
9d8504b1
PB
10547}
10548
10549/* On VxWorks, we emit relocations against _PROCEDURE_LINKAGE_TABLE_, so
10550 define it. */
10551#undef elf_backend_want_plt_sym
10552#define elf_backend_want_plt_sym 1
10553#undef elf_backend_want_got_plt
10554#define elf_backend_want_got_plt 1
10555#undef elf_backend_got_symbol_offset
10556#define elf_backend_got_symbol_offset 0
10557#undef elf_backend_plt_not_loaded
10558#define elf_backend_plt_not_loaded 0
10559#undef elf_backend_plt_readonly
10560#define elf_backend_plt_readonly 1
10561#undef elf_backend_got_header_size
10562#define elf_backend_got_header_size 12
64f52338
AM
10563#undef elf_backend_dtrel_excludes_plt
10564#define elf_backend_dtrel_excludes_plt 1
9d8504b1 10565
468392fb
AM
10566#undef bfd_elf32_get_synthetic_symtab
10567
9d8504b1
PB
10568#undef bfd_elf32_bfd_link_hash_table_create
10569#define bfd_elf32_bfd_link_hash_table_create \
10570 ppc_elf_vxworks_link_hash_table_create
9d8504b1
PB
10571#undef elf_backend_add_symbol_hook
10572#define elf_backend_add_symbol_hook \
10573 ppc_elf_vxworks_add_symbol_hook
10574#undef elf_backend_link_output_symbol_hook
10575#define elf_backend_link_output_symbol_hook \
9c72ff84 10576 elf_vxworks_link_output_symbol_hook
9d8504b1
PB
10577#undef elf_backend_final_write_processing
10578#define elf_backend_final_write_processing \
10579 ppc_elf_vxworks_final_write_processing
d5e3d971
PB
10580#undef elf_backend_get_sec_type_attr
10581#define elf_backend_get_sec_type_attr \
10582 ppc_elf_vxworks_get_sec_type_attr
9d8504b1
PB
10583#undef elf_backend_emit_relocs
10584#define elf_backend_emit_relocs \
10585 elf_vxworks_emit_relocs
10586
10587#undef elf32_bed
10588#define elf32_bed ppc_elf_vxworks_bed
10589
10590#include "elf32-target.h"