]> git.ipfire.org Git - thirdparty/binutils-gdb.git/blame - bfd/elf32-ppc.c
gdb/testsuite: use the correct .debug_str section name for DW_FORM_strp
[thirdparty/binutils-gdb.git] / bfd / elf32-ppc.c
CommitLineData
252b5132 1/* PowerPC-specific support for 32-bit ELF
250d07de 2 Copyright (C) 1994-2021 Free Software Foundation, Inc.
252b5132
RH
3 Written by Ian Lance Taylor, Cygnus Support.
4
ae9a127f 5 This file is part of BFD, the Binary File Descriptor library.
252b5132 6
ae9a127f
NC
7 This program is free software; you can redistribute it and/or modify
8 it under the terms of the GNU General Public License as published by
cd123cb7 9 the Free Software Foundation; either version 3 of the License, or
ae9a127f 10 (at your option) any later version.
252b5132 11
ae9a127f
NC
12 This program is distributed in the hope that it will be useful,
13 but WITHOUT ANY WARRANTY; without even the implied warranty of
14 MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
15 GNU General Public License for more details.
252b5132 16
ae9a127f 17 You should have received a copy of the GNU General Public License
fc0bffd6 18 along with this program; if not, write to the
3e110533 19 Free Software Foundation, Inc., 51 Franklin Street - Fifth Floor,
53e09e0a 20 Boston, MA 02110-1301, USA. */
252b5132 21
4bd7c902
AM
22/* Don't generate unused section symbols. */
23#define TARGET_KEEP_UNUSED_SECTION_SYMBOLS FALSE
252b5132 24
3db64b00 25#include "sysdep.h"
183e98be 26#include <stdarg.h>
252b5132 27#include "bfd.h"
252b5132
RH
28#include "bfdlink.h"
29#include "libbfd.h"
30#include "elf-bfd.h"
31#include "elf/ppc.h"
7619e7c7 32#include "elf32-ppc.h"
9d8504b1 33#include "elf-vxworks.h"
6177242a 34#include "dwarf2.h"
08dc996f 35#include "opcode/ppc.h"
252b5132 36
bb294208
AM
37/* All users of this file have bfd_octets_per_byte (abfd, sec) == 1. */
38#define OCTETS_PER_BYTE(ABFD, SEC) 1
39
b9c361e0
JL
40typedef enum split16_format_type
41{
42 split16a_type = 0,
43 split16d_type
44}
45split16_format_type;
46
f0fe0e16 47/* RELA relocations are used here. */
252b5132 48
252b5132 49static bfd_reloc_status_type ppc_elf_addr16_ha_reloc
55fd94b0 50 (bfd *, arelent *, asymbol *, void *, asection *, bfd *, char **);
7619e7c7 51static bfd_reloc_status_type ppc_elf_unhandled_reloc
55fd94b0 52 (bfd *, arelent *, asymbol *, void *, asection *, bfd *, char **);
252b5132 53
70bccea4
AM
54/* Branch prediction bit for branch taken relocs. */
55#define BRANCH_PREDICT_BIT 0x200000
56/* Mask to set RA in memory instructions. */
57#define RA_REGISTER_MASK 0x001f0000
58/* Value to shift register by to insert RA. */
59#define RA_REGISTER_SHIFT 16
252b5132
RH
60
61/* The name of the dynamic interpreter. This is put in the .interp
62 section. */
252b5132
RH
63#define ELF_DYNAMIC_INTERPRETER "/usr/lib/ld.so.1"
64
d7128ce4 65/* For old-style PLT. */
252b5132
RH
66/* The number of single-slot PLT entries (the rest use two slots). */
67#define PLT_NUM_SINGLE_ENTRIES 8192
68
d7128ce4 69/* For new-style .glink and .plt. */
a6aa5195 70#define GLINK_PLTRESOLVE 16*4
9e390558 71#define GLINK_ENTRY_SIZE(htab, h) \
407aa07c 72 ((4*4 \
9e390558
AM
73 + (h != NULL \
74 && h == htab->tls_get_addr \
75 && !htab->params->no_tls_get_addr_opt ? 8*4 : 0) \
76 + (1u << htab->params->plt_stub_align) - 1) \
77 & -(1u << htab->params->plt_stub_align))
d7128ce4 78
9d8504b1
PB
79/* VxWorks uses its own plt layout, filled in by the static linker. */
80
81/* The standard VxWorks PLT entry. */
82#define VXWORKS_PLT_ENTRY_SIZE 32
83static const bfd_vma ppc_elf_vxworks_plt_entry
84 [VXWORKS_PLT_ENTRY_SIZE / 4] =
85 {
07d6d2b8
AM
86 0x3d800000, /* lis r12,0 */
87 0x818c0000, /* lwz r12,0(r12) */
88 0x7d8903a6, /* mtctr r12 */
89 0x4e800420, /* bctr */
90 0x39600000, /* li r11,0 */
91 0x48000000, /* b 14 <.PLT0resolve+0x4> */
92 0x60000000, /* nop */
93 0x60000000, /* nop */
9d8504b1
PB
94 };
95static const bfd_vma ppc_elf_vxworks_pic_plt_entry
96 [VXWORKS_PLT_ENTRY_SIZE / 4] =
97 {
98 0x3d9e0000, /* addis r12,r30,0 */
99 0x818c0000, /* lwz r12,0(r12) */
100 0x7d8903a6, /* mtctr r12 */
101 0x4e800420, /* bctr */
102 0x39600000, /* li r11,0 */
103 0x48000000, /* b 14 <.PLT0resolve+0x4> 14: R_PPC_REL24 .PLTresolve */
104 0x60000000, /* nop */
105 0x60000000, /* nop */
106 };
107
108/* The initial VxWorks PLT entry. */
109#define VXWORKS_PLT_INITIAL_ENTRY_SIZE 32
110static const bfd_vma ppc_elf_vxworks_plt0_entry
111 [VXWORKS_PLT_INITIAL_ENTRY_SIZE / 4] =
112 {
07d6d2b8
AM
113 0x3d800000, /* lis r12,0 */
114 0x398c0000, /* addi r12,r12,0 */
115 0x800c0008, /* lwz r0,8(r12) */
116 0x7c0903a6, /* mtctr r0 */
117 0x818c0004, /* lwz r12,4(r12) */
118 0x4e800420, /* bctr */
119 0x60000000, /* nop */
120 0x60000000, /* nop */
9d8504b1
PB
121 };
122static const bfd_vma ppc_elf_vxworks_pic_plt0_entry
123 [VXWORKS_PLT_INITIAL_ENTRY_SIZE / 4] =
124 {
125 0x819e0008, /* lwz r12,8(r30) */
07d6d2b8 126 0x7d8903a6, /* mtctr r12 */
9d8504b1 127 0x819e0004, /* lwz r12,4(r30) */
07d6d2b8
AM
128 0x4e800420, /* bctr */
129 0x60000000, /* nop */
130 0x60000000, /* nop */
131 0x60000000, /* nop */
132 0x60000000, /* nop */
9d8504b1
PB
133 };
134
135/* For executables, we have some additional relocations in
136 .rela.plt.unloaded, for the kernel loader. */
137
138/* The number of non-JMP_SLOT relocations per PLT0 slot. */
139#define VXWORKS_PLT_NON_JMP_SLOT_RELOCS 3
140/* The number of relocations in the PLTResolve slot. */
141#define VXWORKS_PLTRESOLVE_RELOCS 2
de194d85 142/* The number of relocations in the PLTResolve slot when creating
9d8504b1
PB
143 a shared library. */
144#define VXWORKS_PLTRESOLVE_RELOCS_SHLIB 0
145
d7128ce4 146/* Some instructions. */
d7128ce4 147#define ADDIS_11_11 0x3d6b0000
a6aa5195
AM
148#define ADDIS_11_30 0x3d7e0000
149#define ADDIS_12_12 0x3d8c0000
d7128ce4 150#define ADDI_11_11 0x396b0000
d7128ce4 151#define ADD_0_11_11 0x7c0b5a14
a7f2871e 152#define ADD_3_12_2 0x7c6c1214
d7128ce4 153#define ADD_11_0_11 0x7d605a14
a6aa5195 154#define B 0x48000000
da3a2088 155#define BA 0x48000002
a6aa5195 156#define BCL_20_31 0x429f0005
d7128ce4 157#define BCTR 0x4e800420
a7f2871e
AM
158#define BEQLR 0x4d820020
159#define CMPWI_11_0 0x2c0b0000
7e8aeb9a
AM
160#define LIS_11 0x3d600000
161#define LIS_12 0x3d800000
a6aa5195
AM
162#define LWZU_0_12 0x840c0000
163#define LWZ_0_12 0x800c0000
a7f2871e 164#define LWZ_11_3 0x81630000
a6aa5195
AM
165#define LWZ_11_11 0x816b0000
166#define LWZ_11_30 0x817e0000
a7f2871e 167#define LWZ_12_3 0x81830000
a6aa5195 168#define LWZ_12_12 0x818c0000
a7f2871e
AM
169#define MR_0_3 0x7c601b78
170#define MR_3_0 0x7c030378
a6aa5195
AM
171#define MFLR_0 0x7c0802a6
172#define MFLR_12 0x7d8802a6
173#define MTCTR_0 0x7c0903a6
174#define MTCTR_11 0x7d6903a6
175#define MTLR_0 0x7c0803a6
176#define NOP 0x60000000
177#define SUB_11_11_12 0x7d6c5850
7619e7c7
AM
178
179/* Offset of tp and dtp pointers from start of TLS block. */
180#define TP_OFFSET 0x7000
181#define DTP_OFFSET 0x8000
e87d4038
AM
182
183/* The value of a defined global symbol. */
184#define SYM_VAL(SYM) \
185 ((SYM)->root.u.def.section->output_section->vma \
186 + (SYM)->root.u.def.section->output_offset \
187 + (SYM)->root.u.def.value)
7fce784e 188\f
46807bf4
AM
189/* Relocation HOWTO's. */
190/* Like other ELF RELA targets that don't apply multiple
191 field-altering relocations to the same localation, src_mask is
192 always zero and pcrel_offset is the same as pc_relative.
193 PowerPC can always use a zero bitpos, even when the field is not at
194 the LSB. For example, a REL24 could use rightshift=2, bisize=24
195 and bitpos=2 which matches the ABI description, or as we do here,
196 rightshift=0, bitsize=26 and bitpos=0. */
197#define HOW(type, size, bitsize, mask, rightshift, pc_relative, \
198 complain, special_func) \
199 HOWTO (type, rightshift, size, bitsize, pc_relative, 0, \
200 complain_overflow_ ## complain, special_func, \
201 #type, FALSE, 0, mask, pc_relative)
202
e47cd125 203static reloc_howto_type *ppc_elf_howto_table[R_PPC_max];
252b5132 204
8da6118f 205static reloc_howto_type ppc_elf_howto_raw[] = {
252b5132 206 /* This reloc does nothing. */
46807bf4
AM
207 HOW (R_PPC_NONE, 3, 0, 0, 0, FALSE, dont,
208 bfd_elf_generic_reloc),
252b5132
RH
209
210 /* A standard 32 bit relocation. */
46807bf4
AM
211 HOW (R_PPC_ADDR32, 2, 32, 0xffffffff, 0, FALSE, dont,
212 bfd_elf_generic_reloc),
252b5132
RH
213
214 /* An absolute 26 bit branch; the lower two bits must be zero.
215 FIXME: we don't check that, we just clear them. */
46807bf4
AM
216 HOW (R_PPC_ADDR24, 2, 26, 0x3fffffc, 0, FALSE, signed,
217 bfd_elf_generic_reloc),
252b5132
RH
218
219 /* A standard 16 bit relocation. */
46807bf4
AM
220 HOW (R_PPC_ADDR16, 1, 16, 0xffff, 0, FALSE, bitfield,
221 bfd_elf_generic_reloc),
252b5132
RH
222
223 /* A 16 bit relocation without overflow. */
46807bf4
AM
224 HOW (R_PPC_ADDR16_LO, 1, 16, 0xffff, 0, FALSE, dont,
225 bfd_elf_generic_reloc),
252b5132
RH
226
227 /* The high order 16 bits of an address. */
46807bf4
AM
228 HOW (R_PPC_ADDR16_HI, 1, 16, 0xffff, 16, FALSE, dont,
229 bfd_elf_generic_reloc),
252b5132
RH
230
231 /* The high order 16 bits of an address, plus 1 if the contents of
8da6118f 232 the low 16 bits, treated as a signed number, is negative. */
46807bf4
AM
233 HOW (R_PPC_ADDR16_HA, 1, 16, 0xffff, 16, FALSE, dont,
234 ppc_elf_addr16_ha_reloc),
252b5132
RH
235
236 /* An absolute 16 bit branch; the lower two bits must be zero.
237 FIXME: we don't check that, we just clear them. */
46807bf4
AM
238 HOW (R_PPC_ADDR14, 2, 16, 0xfffc, 0, FALSE, signed,
239 bfd_elf_generic_reloc),
252b5132
RH
240
241 /* An absolute 16 bit branch, for which bit 10 should be set to
242 indicate that the branch is expected to be taken. The lower two
8da6118f 243 bits must be zero. */
46807bf4
AM
244 HOW (R_PPC_ADDR14_BRTAKEN, 2, 16, 0xfffc, 0, FALSE, signed,
245 bfd_elf_generic_reloc),
252b5132
RH
246
247 /* An absolute 16 bit branch, for which bit 10 should be set to
248 indicate that the branch is not expected to be taken. The lower
249 two bits must be zero. */
46807bf4
AM
250 HOW (R_PPC_ADDR14_BRNTAKEN, 2, 16, 0xfffc, 0, FALSE, signed,
251 bfd_elf_generic_reloc),
252b5132 252
8da6118f 253 /* A relative 26 bit branch; the lower two bits must be zero. */
46807bf4
AM
254 HOW (R_PPC_REL24, 2, 26, 0x3fffffc, 0, TRUE, signed,
255 bfd_elf_generic_reloc),
252b5132 256
8da6118f 257 /* A relative 16 bit branch; the lower two bits must be zero. */
46807bf4
AM
258 HOW (R_PPC_REL14, 2, 16, 0xfffc, 0, TRUE, signed,
259 bfd_elf_generic_reloc),
252b5132 260
8da6118f 261 /* A relative 16 bit branch. Bit 10 should be set to indicate that
252b5132
RH
262 the branch is expected to be taken. The lower two bits must be
263 zero. */
46807bf4
AM
264 HOW (R_PPC_REL14_BRTAKEN, 2, 16, 0xfffc, 0, TRUE, signed,
265 bfd_elf_generic_reloc),
252b5132 266
8da6118f 267 /* A relative 16 bit branch. Bit 10 should be set to indicate that
252b5132
RH
268 the branch is not expected to be taken. The lower two bits must
269 be zero. */
46807bf4
AM
270 HOW (R_PPC_REL14_BRNTAKEN, 2, 16, 0xfffc, 0, TRUE, signed,
271 bfd_elf_generic_reloc),
252b5132
RH
272
273 /* Like R_PPC_ADDR16, but referring to the GOT table entry for the
274 symbol. */
46807bf4
AM
275 HOW (R_PPC_GOT16, 1, 16, 0xffff, 0, FALSE, signed,
276 ppc_elf_unhandled_reloc),
252b5132
RH
277
278 /* Like R_PPC_ADDR16_LO, but referring to the GOT table entry for
279 the symbol. */
46807bf4
AM
280 HOW (R_PPC_GOT16_LO, 1, 16, 0xffff, 0, FALSE, dont,
281 ppc_elf_unhandled_reloc),
252b5132
RH
282
283 /* Like R_PPC_ADDR16_HI, but referring to the GOT table entry for
284 the symbol. */
46807bf4
AM
285 HOW (R_PPC_GOT16_HI, 1, 16, 0xffff, 16, FALSE, dont,
286 ppc_elf_unhandled_reloc),
252b5132
RH
287
288 /* Like R_PPC_ADDR16_HA, but referring to the GOT table entry for
289 the symbol. */
46807bf4
AM
290 HOW (R_PPC_GOT16_HA, 1, 16, 0xffff, 16, FALSE, dont,
291 ppc_elf_unhandled_reloc),
252b5132
RH
292
293 /* Like R_PPC_REL24, but referring to the procedure linkage table
294 entry for the symbol. */
46807bf4
AM
295 HOW (R_PPC_PLTREL24, 2, 26, 0x3fffffc, 0, TRUE, signed,
296 ppc_elf_unhandled_reloc),
252b5132
RH
297
298 /* This is used only by the dynamic linker. The symbol should exist
299 both in the object being run and in some shared library. The
300 dynamic linker copies the data addressed by the symbol from the
301 shared library into the object, because the object being
302 run has to have the data at some particular address. */
46807bf4
AM
303 HOW (R_PPC_COPY, 2, 32, 0, 0, FALSE, dont,
304 ppc_elf_unhandled_reloc),
252b5132
RH
305
306 /* Like R_PPC_ADDR32, but used when setting global offset table
307 entries. */
46807bf4
AM
308 HOW (R_PPC_GLOB_DAT, 2, 32, 0xffffffff, 0, FALSE, dont,
309 ppc_elf_unhandled_reloc),
252b5132
RH
310
311 /* Marks a procedure linkage table entry for a symbol. */
46807bf4
AM
312 HOW (R_PPC_JMP_SLOT, 2, 32, 0, 0, FALSE, dont,
313 ppc_elf_unhandled_reloc),
252b5132
RH
314
315 /* Used only by the dynamic linker. When the object is run, this
316 longword is set to the load address of the object, plus the
317 addend. */
46807bf4
AM
318 HOW (R_PPC_RELATIVE, 2, 32, 0xffffffff, 0, FALSE, dont,
319 bfd_elf_generic_reloc),
252b5132
RH
320
321 /* Like R_PPC_REL24, but uses the value of the symbol within the
322 object rather than the final value. Normally used for
323 _GLOBAL_OFFSET_TABLE_. */
46807bf4
AM
324 HOW (R_PPC_LOCAL24PC, 2, 26, 0x3fffffc, 0, TRUE, signed,
325 bfd_elf_generic_reloc),
252b5132
RH
326
327 /* Like R_PPC_ADDR32, but may be unaligned. */
46807bf4
AM
328 HOW (R_PPC_UADDR32, 2, 32, 0xffffffff, 0, FALSE, dont,
329 bfd_elf_generic_reloc),
252b5132
RH
330
331 /* Like R_PPC_ADDR16, but may be unaligned. */
46807bf4
AM
332 HOW (R_PPC_UADDR16, 1, 16, 0xffff, 0, FALSE, bitfield,
333 bfd_elf_generic_reloc),
252b5132
RH
334
335 /* 32-bit PC relative */
46807bf4
AM
336 HOW (R_PPC_REL32, 2, 32, 0xffffffff, 0, TRUE, dont,
337 bfd_elf_generic_reloc),
252b5132
RH
338
339 /* 32-bit relocation to the symbol's procedure linkage table.
c3668558 340 FIXME: not supported. */
46807bf4
AM
341 HOW (R_PPC_PLT32, 2, 32, 0, 0, FALSE, dont,
342 ppc_elf_unhandled_reloc),
252b5132
RH
343
344 /* 32-bit PC relative relocation to the symbol's procedure linkage table.
c3668558 345 FIXME: not supported. */
46807bf4
AM
346 HOW (R_PPC_PLTREL32, 2, 32, 0, 0, TRUE, dont,
347 ppc_elf_unhandled_reloc),
252b5132
RH
348
349 /* Like R_PPC_ADDR16_LO, but referring to the PLT table entry for
350 the symbol. */
46807bf4
AM
351 HOW (R_PPC_PLT16_LO, 1, 16, 0xffff, 0, FALSE, dont,
352 ppc_elf_unhandled_reloc),
252b5132
RH
353
354 /* Like R_PPC_ADDR16_HI, but referring to the PLT table entry for
355 the symbol. */
46807bf4
AM
356 HOW (R_PPC_PLT16_HI, 1, 16, 0xffff, 16, FALSE, dont,
357 ppc_elf_unhandled_reloc),
252b5132
RH
358
359 /* Like R_PPC_ADDR16_HA, but referring to the PLT table entry for
360 the symbol. */
46807bf4
AM
361 HOW (R_PPC_PLT16_HA, 1, 16, 0xffff, 16, FALSE, dont,
362 ppc_elf_unhandled_reloc),
252b5132
RH
363
364 /* A sign-extended 16 bit value relative to _SDA_BASE_, for use with
365 small data items. */
46807bf4
AM
366 HOW (R_PPC_SDAREL16, 1, 16, 0xffff, 0, FALSE, signed,
367 ppc_elf_unhandled_reloc),
252b5132 368
c061c2d8 369 /* 16-bit section relative relocation. */
46807bf4
AM
370 HOW (R_PPC_SECTOFF, 1, 16, 0xffff, 0, FALSE, signed,
371 ppc_elf_unhandled_reloc),
252b5132 372
c3668558 373 /* 16-bit lower half section relative relocation. */
46807bf4
AM
374 HOW (R_PPC_SECTOFF_LO, 1, 16, 0xffff, 0, FALSE, dont,
375 ppc_elf_unhandled_reloc),
252b5132 376
c3668558 377 /* 16-bit upper half section relative relocation. */
46807bf4
AM
378 HOW (R_PPC_SECTOFF_HI, 1, 16, 0xffff, 16, FALSE, dont,
379 ppc_elf_unhandled_reloc),
252b5132 380
c3668558 381 /* 16-bit upper half adjusted section relative relocation. */
46807bf4
AM
382 HOW (R_PPC_SECTOFF_HA, 1, 16, 0xffff, 16, FALSE, dont,
383 ppc_elf_unhandled_reloc),
252b5132 384
727fc41e 385 /* Marker relocs for TLS. */
46807bf4
AM
386 HOW (R_PPC_TLS, 2, 32, 0, 0, FALSE, dont,
387 bfd_elf_generic_reloc),
388
389 HOW (R_PPC_TLSGD, 2, 32, 0, 0, FALSE, dont,
390 bfd_elf_generic_reloc),
391
392 HOW (R_PPC_TLSLD, 2, 32, 0, 0, FALSE, dont,
393 bfd_elf_generic_reloc),
727fc41e 394
23cedd1d 395 /* Marker relocs on inline plt call instructions. */
46807bf4
AM
396 HOW (R_PPC_PLTSEQ, 2, 32, 0, 0, FALSE, dont,
397 bfd_elf_generic_reloc),
398
399 HOW (R_PPC_PLTCALL, 2, 32, 0, 0, FALSE, dont,
400 bfd_elf_generic_reloc),
23cedd1d 401
7619e7c7
AM
402 /* Computes the load module index of the load module that contains the
403 definition of its TLS sym. */
46807bf4
AM
404 HOW (R_PPC_DTPMOD32, 2, 32, 0xffffffff, 0, FALSE, dont,
405 ppc_elf_unhandled_reloc),
252b5132 406
7619e7c7
AM
407 /* Computes a dtv-relative displacement, the difference between the value
408 of sym+add and the base address of the thread-local storage block that
409 contains the definition of sym, minus 0x8000. */
46807bf4
AM
410 HOW (R_PPC_DTPREL32, 2, 32, 0xffffffff, 0, FALSE, dont,
411 ppc_elf_unhandled_reloc),
7619e7c7
AM
412
413 /* A 16 bit dtprel reloc. */
46807bf4
AM
414 HOW (R_PPC_DTPREL16, 1, 16, 0xffff, 0, FALSE, signed,
415 ppc_elf_unhandled_reloc),
252b5132 416
7619e7c7 417 /* Like DTPREL16, but no overflow. */
46807bf4
AM
418 HOW (R_PPC_DTPREL16_LO, 1, 16, 0xffff, 0, FALSE, dont,
419 ppc_elf_unhandled_reloc),
252b5132 420
7619e7c7 421 /* Like DTPREL16_LO, but next higher group of 16 bits. */
46807bf4
AM
422 HOW (R_PPC_DTPREL16_HI, 1, 16, 0xffff, 16, FALSE, dont,
423 ppc_elf_unhandled_reloc),
252b5132 424
7619e7c7 425 /* Like DTPREL16_HI, but adjust for low 16 bits. */
46807bf4
AM
426 HOW (R_PPC_DTPREL16_HA, 1, 16, 0xffff, 16, FALSE, dont,
427 ppc_elf_unhandled_reloc),
252b5132 428
7619e7c7
AM
429 /* Computes a tp-relative displacement, the difference between the value of
430 sym+add and the value of the thread pointer (r13). */
46807bf4
AM
431 HOW (R_PPC_TPREL32, 2, 32, 0xffffffff, 0, FALSE, dont,
432 ppc_elf_unhandled_reloc),
7619e7c7
AM
433
434 /* A 16 bit tprel reloc. */
46807bf4
AM
435 HOW (R_PPC_TPREL16, 1, 16, 0xffff, 0, FALSE, signed,
436 ppc_elf_unhandled_reloc),
252b5132 437
7619e7c7 438 /* Like TPREL16, but no overflow. */
46807bf4
AM
439 HOW (R_PPC_TPREL16_LO, 1, 16, 0xffff, 0, FALSE, dont,
440 ppc_elf_unhandled_reloc),
252b5132 441
7619e7c7 442 /* Like TPREL16_LO, but next higher group of 16 bits. */
46807bf4
AM
443 HOW (R_PPC_TPREL16_HI, 1, 16, 0xffff, 16, FALSE, dont,
444 ppc_elf_unhandled_reloc),
7619e7c7
AM
445
446 /* Like TPREL16_HI, but adjust for low 16 bits. */
46807bf4
AM
447 HOW (R_PPC_TPREL16_HA, 1, 16, 0xffff, 16, FALSE, dont,
448 ppc_elf_unhandled_reloc),
7619e7c7
AM
449
450 /* Allocates two contiguous entries in the GOT to hold a tls_index structure,
451 with values (sym+add)@dtpmod and (sym+add)@dtprel, and computes the offset
452 to the first entry. */
46807bf4
AM
453 HOW (R_PPC_GOT_TLSGD16, 1, 16, 0xffff, 0, FALSE, signed,
454 ppc_elf_unhandled_reloc),
252b5132 455
7619e7c7 456 /* Like GOT_TLSGD16, but no overflow. */
46807bf4
AM
457 HOW (R_PPC_GOT_TLSGD16_LO, 1, 16, 0xffff, 0, FALSE, dont,
458 ppc_elf_unhandled_reloc),
252b5132 459
7619e7c7 460 /* Like GOT_TLSGD16_LO, but next higher group of 16 bits. */
46807bf4
AM
461 HOW (R_PPC_GOT_TLSGD16_HI, 1, 16, 0xffff, 16, FALSE, dont,
462 ppc_elf_unhandled_reloc),
252b5132 463
7619e7c7 464 /* Like GOT_TLSGD16_HI, but adjust for low 16 bits. */
46807bf4
AM
465 HOW (R_PPC_GOT_TLSGD16_HA, 1, 16, 0xffff, 16, FALSE, dont,
466 ppc_elf_unhandled_reloc),
7619e7c7
AM
467
468 /* Allocates two contiguous entries in the GOT to hold a tls_index structure,
469 with values (sym+add)@dtpmod and zero, and computes the offset to the
470 first entry. */
46807bf4
AM
471 HOW (R_PPC_GOT_TLSLD16, 1, 16, 0xffff, 0, FALSE, signed,
472 ppc_elf_unhandled_reloc),
252b5132 473
7619e7c7 474 /* Like GOT_TLSLD16, but no overflow. */
46807bf4
AM
475 HOW (R_PPC_GOT_TLSLD16_LO, 1, 16, 0xffff, 0, FALSE, dont,
476 ppc_elf_unhandled_reloc),
252b5132 477
7619e7c7 478 /* Like GOT_TLSLD16_LO, but next higher group of 16 bits. */
46807bf4
AM
479 HOW (R_PPC_GOT_TLSLD16_HI, 1, 16, 0xffff, 16, FALSE, dont,
480 ppc_elf_unhandled_reloc),
252b5132 481
7619e7c7 482 /* Like GOT_TLSLD16_HI, but adjust for low 16 bits. */
46807bf4
AM
483 HOW (R_PPC_GOT_TLSLD16_HA, 1, 16, 0xffff, 16, FALSE, dont,
484 ppc_elf_unhandled_reloc),
7619e7c7
AM
485
486 /* Allocates an entry in the GOT with value (sym+add)@dtprel, and computes
487 the offset to the entry. */
46807bf4
AM
488 HOW (R_PPC_GOT_DTPREL16, 1, 16, 0xffff, 0, FALSE, signed,
489 ppc_elf_unhandled_reloc),
252b5132 490
7619e7c7 491 /* Like GOT_DTPREL16, but no overflow. */
46807bf4
AM
492 HOW (R_PPC_GOT_DTPREL16_LO, 1, 16, 0xffff, 0, FALSE, dont,
493 ppc_elf_unhandled_reloc),
252b5132 494
7619e7c7 495 /* Like GOT_DTPREL16_LO, but next higher group of 16 bits. */
46807bf4
AM
496 HOW (R_PPC_GOT_DTPREL16_HI, 1, 16, 0xffff, 16, FALSE, dont,
497 ppc_elf_unhandled_reloc),
252b5132 498
7619e7c7 499 /* Like GOT_DTPREL16_HI, but adjust for low 16 bits. */
46807bf4
AM
500 HOW (R_PPC_GOT_DTPREL16_HA, 1, 16, 0xffff, 16, FALSE, dont,
501 ppc_elf_unhandled_reloc),
c3668558 502
7619e7c7
AM
503 /* Allocates an entry in the GOT with value (sym+add)@tprel, and computes the
504 offset to the entry. */
46807bf4
AM
505 HOW (R_PPC_GOT_TPREL16, 1, 16, 0xffff, 0, FALSE, signed,
506 ppc_elf_unhandled_reloc),
7619e7c7
AM
507
508 /* Like GOT_TPREL16, but no overflow. */
46807bf4
AM
509 HOW (R_PPC_GOT_TPREL16_LO, 1, 16, 0xffff, 0, FALSE, dont,
510 ppc_elf_unhandled_reloc),
7619e7c7
AM
511
512 /* Like GOT_TPREL16_LO, but next higher group of 16 bits. */
46807bf4
AM
513 HOW (R_PPC_GOT_TPREL16_HI, 1, 16, 0xffff, 16, FALSE, dont,
514 ppc_elf_unhandled_reloc),
7619e7c7
AM
515
516 /* Like GOT_TPREL16_HI, but adjust for low 16 bits. */
46807bf4
AM
517 HOW (R_PPC_GOT_TPREL16_HA, 1, 16, 0xffff, 16, FALSE, dont,
518 ppc_elf_unhandled_reloc),
7619e7c7
AM
519
520 /* The remaining relocs are from the Embedded ELF ABI, and are not
521 in the SVR4 ELF ABI. */
522
523 /* 32 bit value resulting from the addend minus the symbol. */
46807bf4
AM
524 HOW (R_PPC_EMB_NADDR32, 2, 32, 0xffffffff, 0, FALSE, dont,
525 ppc_elf_unhandled_reloc),
7619e7c7
AM
526
527 /* 16 bit value resulting from the addend minus the symbol. */
46807bf4
AM
528 HOW (R_PPC_EMB_NADDR16, 1, 16, 0xffff, 0, FALSE, signed,
529 ppc_elf_unhandled_reloc),
7619e7c7
AM
530
531 /* 16 bit value resulting from the addend minus the symbol. */
46807bf4
AM
532 HOW (R_PPC_EMB_NADDR16_LO, 1, 16, 0xffff, 0, FALSE, dont,
533 ppc_elf_unhandled_reloc),
7619e7c7
AM
534
535 /* The high order 16 bits of the addend minus the symbol. */
46807bf4
AM
536 HOW (R_PPC_EMB_NADDR16_HI, 1, 16, 0xffff, 16, FALSE, dont,
537 ppc_elf_unhandled_reloc),
7619e7c7
AM
538
539 /* The high order 16 bits of the result of the addend minus the address,
540 plus 1 if the contents of the low 16 bits, treated as a signed number,
541 is negative. */
46807bf4
AM
542 HOW (R_PPC_EMB_NADDR16_HA, 1, 16, 0xffff, 16, FALSE, dont,
543 ppc_elf_unhandled_reloc),
25dbc73a
AM
544
545 /* 16 bit value resulting from allocating a 4 byte word to hold an
546 address in the .sdata section, and returning the offset from
547 _SDA_BASE_ for that relocation. */
46807bf4
AM
548 HOW (R_PPC_EMB_SDAI16, 1, 16, 0xffff, 0, FALSE, signed,
549 ppc_elf_unhandled_reloc),
25dbc73a
AM
550
551 /* 16 bit value resulting from allocating a 4 byte word to hold an
552 address in the .sdata2 section, and returning the offset from
553 _SDA2_BASE_ for that relocation. */
46807bf4
AM
554 HOW (R_PPC_EMB_SDA2I16, 1, 16, 0xffff, 0, FALSE, signed,
555 ppc_elf_unhandled_reloc),
25dbc73a
AM
556
557 /* A sign-extended 16 bit value relative to _SDA2_BASE_, for use with
558 small data items. */
46807bf4
AM
559 HOW (R_PPC_EMB_SDA2REL, 1, 16, 0xffff, 0, FALSE, signed,
560 ppc_elf_unhandled_reloc),
25dbc73a
AM
561
562 /* Relocate against either _SDA_BASE_ or _SDA2_BASE_, filling in the 16 bit
563 signed offset from the appropriate base, and filling in the register
564 field with the appropriate register (0, 2, or 13). */
46807bf4
AM
565 HOW (R_PPC_EMB_SDA21, 2, 16, 0xffff, 0, FALSE, signed,
566 ppc_elf_unhandled_reloc),
25dbc73a
AM
567
568 /* Relocation not handled: R_PPC_EMB_MRKREF */
569 /* Relocation not handled: R_PPC_EMB_RELSEC16 */
570 /* Relocation not handled: R_PPC_EMB_RELST_LO */
571 /* Relocation not handled: R_PPC_EMB_RELST_HI */
572 /* Relocation not handled: R_PPC_EMB_RELST_HA */
573 /* Relocation not handled: R_PPC_EMB_BIT_FLD */
574
575 /* PC relative relocation against either _SDA_BASE_ or _SDA2_BASE_, filling
576 in the 16 bit signed offset from the appropriate base, and filling in the
577 register field with the appropriate register (0, 2, or 13). */
46807bf4
AM
578 HOW (R_PPC_EMB_RELSDA, 1, 16, 0xffff, 0, FALSE, signed,
579 ppc_elf_unhandled_reloc),
25dbc73a 580
b9c361e0 581 /* A relative 8 bit branch. */
46807bf4
AM
582 HOW (R_PPC_VLE_REL8, 1, 8, 0xff, 1, TRUE, signed,
583 bfd_elf_generic_reloc),
68ffbac6 584
b9c361e0 585 /* A relative 15 bit branch. */
46807bf4
AM
586 HOW (R_PPC_VLE_REL15, 2, 16, 0xfffe, 0, TRUE, signed,
587 bfd_elf_generic_reloc),
b9c361e0 588
68ffbac6 589 /* A relative 24 bit branch. */
46807bf4
AM
590 HOW (R_PPC_VLE_REL24, 2, 25, 0x1fffffe, 0, TRUE, signed,
591 bfd_elf_generic_reloc),
b9c361e0
JL
592
593 /* The 16 LSBS in split16a format. */
46807bf4
AM
594 HOW (R_PPC_VLE_LO16A, 2, 16, 0x1f07ff, 0, FALSE, dont,
595 ppc_elf_unhandled_reloc),
b9c361e0
JL
596
597 /* The 16 LSBS in split16d format. */
46807bf4
AM
598 HOW (R_PPC_VLE_LO16D, 2, 16, 0x3e007ff, 0, FALSE, dont,
599 ppc_elf_unhandled_reloc),
b9c361e0
JL
600
601 /* Bits 16-31 split16a format. */
46807bf4
AM
602 HOW (R_PPC_VLE_HI16A, 2, 16, 0x1f07ff, 16, FALSE, dont,
603 ppc_elf_unhandled_reloc),
b9c361e0
JL
604
605 /* Bits 16-31 split16d format. */
46807bf4
AM
606 HOW (R_PPC_VLE_HI16D, 2, 16, 0x3e007ff, 16, FALSE, dont,
607 ppc_elf_unhandled_reloc),
b9c361e0
JL
608
609 /* Bits 16-31 (High Adjusted) in split16a format. */
46807bf4
AM
610 HOW (R_PPC_VLE_HA16A, 2, 16, 0x1f07ff, 16, FALSE, dont,
611 ppc_elf_unhandled_reloc),
b9c361e0
JL
612
613 /* Bits 16-31 (High Adjusted) in split16d format. */
46807bf4
AM
614 HOW (R_PPC_VLE_HA16D, 2, 16, 0x3e007ff, 16, FALSE, dont,
615 ppc_elf_unhandled_reloc),
b9c361e0 616
86c95733
AM
617 /* This reloc is like R_PPC_EMB_SDA21 but only applies to e_add16i
618 instructions. If the register base is 0 then the linker changes
619 the e_add16i to an e_li instruction. */
46807bf4
AM
620 HOW (R_PPC_VLE_SDA21, 2, 16, 0xffff, 0, FALSE, signed,
621 ppc_elf_unhandled_reloc),
b9c361e0 622
86c95733 623 /* Like R_PPC_VLE_SDA21 but ignore overflow. */
46807bf4
AM
624 HOW (R_PPC_VLE_SDA21_LO, 2, 16, 0xffff, 0, FALSE, dont,
625 ppc_elf_unhandled_reloc),
b9c361e0
JL
626
627 /* The 16 LSBS relative to _SDA_BASE_ in split16a format. */
46807bf4
AM
628 HOW (R_PPC_VLE_SDAREL_LO16A, 2, 16, 0x1f07ff, 0, FALSE, dont,
629 ppc_elf_unhandled_reloc),
b9c361e0
JL
630
631 /* The 16 LSBS relative to _SDA_BASE_ in split16d format. */
46807bf4
AM
632 HOW (R_PPC_VLE_SDAREL_LO16D, 2, 16, 0x3e007ff, 0, FALSE, dont,
633 ppc_elf_unhandled_reloc),
b9c361e0
JL
634
635 /* Bits 16-31 relative to _SDA_BASE_ in split16a format. */
46807bf4
AM
636 HOW (R_PPC_VLE_SDAREL_HI16A, 2, 16, 0x1f07ff, 16, FALSE, dont,
637 ppc_elf_unhandled_reloc),
b9c361e0
JL
638
639 /* Bits 16-31 relative to _SDA_BASE_ in split16d format. */
46807bf4
AM
640 HOW (R_PPC_VLE_SDAREL_HI16D, 2, 16, 0x3e007ff, 16, FALSE, dont,
641 ppc_elf_unhandled_reloc),
b9c361e0
JL
642
643 /* Bits 16-31 (HA) relative to _SDA_BASE split16a format. */
46807bf4
AM
644 HOW (R_PPC_VLE_SDAREL_HA16A, 2, 16, 0x1f07ff, 16, FALSE, dont,
645 ppc_elf_unhandled_reloc),
b9c361e0
JL
646
647 /* Bits 16-31 (HA) relative to _SDA_BASE split16d format. */
46807bf4
AM
648 HOW (R_PPC_VLE_SDAREL_HA16D, 2, 16, 0x3e007ff, 16, FALSE, dont,
649 ppc_elf_unhandled_reloc),
b9c361e0 650
83eef883 651 /* e_li split20 format. */
bb6bf75e
AM
652 HOW (R_PPC_VLE_ADDR20, 2, 20, 0x1f7fff, 0, FALSE, dont,
653 ppc_elf_unhandled_reloc),
46807bf4
AM
654
655 HOW (R_PPC_IRELATIVE, 2, 32, 0xffffffff, 0, FALSE, dont,
656 ppc_elf_unhandled_reloc),
e054468f 657
d7128ce4 658 /* A 16 bit relative relocation. */
46807bf4
AM
659 HOW (R_PPC_REL16, 1, 16, 0xffff, 0, TRUE, signed,
660 bfd_elf_generic_reloc),
d7128ce4
AM
661
662 /* A 16 bit relative relocation without overflow. */
46807bf4
AM
663 HOW (R_PPC_REL16_LO, 1, 16, 0xffff, 0, TRUE, dont,
664 bfd_elf_generic_reloc),
d7128ce4
AM
665
666 /* The high order 16 bits of a relative address. */
46807bf4
AM
667 HOW (R_PPC_REL16_HI, 1, 16, 0xffff, 16, TRUE, dont,
668 bfd_elf_generic_reloc),
d7128ce4
AM
669
670 /* The high order 16 bits of a relative address, plus 1 if the contents of
671 the low 16 bits, treated as a signed number, is negative. */
46807bf4
AM
672 HOW (R_PPC_REL16_HA, 1, 16, 0xffff, 16, TRUE, dont,
673 ppc_elf_addr16_ha_reloc),
d7128ce4 674
a680de9a 675 /* Like R_PPC_REL16_HA but for split field in addpcis. */
46807bf4
AM
676 HOW (R_PPC_REL16DX_HA, 2, 16, 0x1fffc1, 16, TRUE, signed,
677 ppc_elf_addr16_ha_reloc),
a680de9a 678
7ba71655 679 /* A split-field reloc for addpcis, non-relative (gas internal use only). */
46807bf4
AM
680 HOW (R_PPC_16DX_HA, 2, 16, 0x1fffc1, 16, FALSE, signed,
681 ppc_elf_addr16_ha_reloc),
7ba71655 682
25dbc73a 683 /* GNU extension to record C++ vtable hierarchy. */
46807bf4
AM
684 HOW (R_PPC_GNU_VTINHERIT, 0, 0, 0, 0, FALSE, dont,
685 NULL),
25dbc73a
AM
686
687 /* GNU extension to record C++ vtable member usage. */
46807bf4
AM
688 HOW (R_PPC_GNU_VTENTRY, 0, 0, 0, 0, FALSE, dont,
689 NULL),
7619e7c7 690
25dbc73a 691 /* Phony reloc to handle AIX style TOC entries. */
46807bf4
AM
692 HOW (R_PPC_TOC16, 1, 16, 0xffff, 0, FALSE, signed,
693 ppc_elf_unhandled_reloc),
25dbc73a
AM
694};
695\f
696/* Initialize the ppc_elf_howto_table, so that linear accesses can be done. */
697
698static void
699ppc_elf_howto_init (void)
700{
701 unsigned int i, type;
702
703 for (i = 0;
704 i < sizeof (ppc_elf_howto_raw) / sizeof (ppc_elf_howto_raw[0]);
705 i++)
706 {
707 type = ppc_elf_howto_raw[i].type;
708 if (type >= (sizeof (ppc_elf_howto_table)
709 / sizeof (ppc_elf_howto_table[0])))
710 abort ();
711 ppc_elf_howto_table[type] = &ppc_elf_howto_raw[i];
712 }
713}
714
715static reloc_howto_type *
716ppc_elf_reloc_type_lookup (bfd *abfd ATTRIBUTE_UNUSED,
717 bfd_reloc_code_real_type code)
718{
719 enum elf_ppc_reloc_type r;
720
721 /* Initialize howto table if not already done. */
722 if (!ppc_elf_howto_table[R_PPC_ADDR32])
723 ppc_elf_howto_init ();
724
725 switch (code)
726 {
727 default:
728 return NULL;
729
730 case BFD_RELOC_NONE: r = R_PPC_NONE; break;
731 case BFD_RELOC_32: r = R_PPC_ADDR32; break;
732 case BFD_RELOC_PPC_BA26: r = R_PPC_ADDR24; break;
1fe532cf 733 case BFD_RELOC_PPC64_ADDR16_DS:
25dbc73a 734 case BFD_RELOC_16: r = R_PPC_ADDR16; break;
1fe532cf 735 case BFD_RELOC_PPC64_ADDR16_LO_DS:
25dbc73a
AM
736 case BFD_RELOC_LO16: r = R_PPC_ADDR16_LO; break;
737 case BFD_RELOC_HI16: r = R_PPC_ADDR16_HI; break;
738 case BFD_RELOC_HI16_S: r = R_PPC_ADDR16_HA; break;
739 case BFD_RELOC_PPC_BA16: r = R_PPC_ADDR14; break;
740 case BFD_RELOC_PPC_BA16_BRTAKEN: r = R_PPC_ADDR14_BRTAKEN; break;
741 case BFD_RELOC_PPC_BA16_BRNTAKEN: r = R_PPC_ADDR14_BRNTAKEN; break;
742 case BFD_RELOC_PPC_B26: r = R_PPC_REL24; break;
743 case BFD_RELOC_PPC_B16: r = R_PPC_REL14; break;
744 case BFD_RELOC_PPC_B16_BRTAKEN: r = R_PPC_REL14_BRTAKEN; break;
745 case BFD_RELOC_PPC_B16_BRNTAKEN: r = R_PPC_REL14_BRNTAKEN; break;
1fe532cf 746 case BFD_RELOC_PPC64_GOT16_DS:
25dbc73a 747 case BFD_RELOC_16_GOTOFF: r = R_PPC_GOT16; break;
1fe532cf 748 case BFD_RELOC_PPC64_GOT16_LO_DS:
25dbc73a
AM
749 case BFD_RELOC_LO16_GOTOFF: r = R_PPC_GOT16_LO; break;
750 case BFD_RELOC_HI16_GOTOFF: r = R_PPC_GOT16_HI; break;
751 case BFD_RELOC_HI16_S_GOTOFF: r = R_PPC_GOT16_HA; break;
752 case BFD_RELOC_24_PLT_PCREL: r = R_PPC_PLTREL24; break;
753 case BFD_RELOC_PPC_COPY: r = R_PPC_COPY; break;
754 case BFD_RELOC_PPC_GLOB_DAT: r = R_PPC_GLOB_DAT; break;
755 case BFD_RELOC_PPC_LOCAL24PC: r = R_PPC_LOCAL24PC; break;
756 case BFD_RELOC_32_PCREL: r = R_PPC_REL32; break;
757 case BFD_RELOC_32_PLTOFF: r = R_PPC_PLT32; break;
758 case BFD_RELOC_32_PLT_PCREL: r = R_PPC_PLTREL32; break;
1fe532cf 759 case BFD_RELOC_PPC64_PLT16_LO_DS:
25dbc73a
AM
760 case BFD_RELOC_LO16_PLTOFF: r = R_PPC_PLT16_LO; break;
761 case BFD_RELOC_HI16_PLTOFF: r = R_PPC_PLT16_HI; break;
762 case BFD_RELOC_HI16_S_PLTOFF: r = R_PPC_PLT16_HA; break;
763 case BFD_RELOC_GPREL16: r = R_PPC_SDAREL16; break;
1fe532cf 764 case BFD_RELOC_PPC64_SECTOFF_DS:
25dbc73a 765 case BFD_RELOC_16_BASEREL: r = R_PPC_SECTOFF; break;
1fe532cf 766 case BFD_RELOC_PPC64_SECTOFF_LO_DS:
25dbc73a
AM
767 case BFD_RELOC_LO16_BASEREL: r = R_PPC_SECTOFF_LO; break;
768 case BFD_RELOC_HI16_BASEREL: r = R_PPC_SECTOFF_HI; break;
769 case BFD_RELOC_HI16_S_BASEREL: r = R_PPC_SECTOFF_HA; break;
770 case BFD_RELOC_CTOR: r = R_PPC_ADDR32; break;
1fe532cf 771 case BFD_RELOC_PPC64_TOC16_DS:
25dbc73a
AM
772 case BFD_RELOC_PPC_TOC16: r = R_PPC_TOC16; break;
773 case BFD_RELOC_PPC_TLS: r = R_PPC_TLS; break;
727fc41e
AM
774 case BFD_RELOC_PPC_TLSGD: r = R_PPC_TLSGD; break;
775 case BFD_RELOC_PPC_TLSLD: r = R_PPC_TLSLD; break;
25dbc73a 776 case BFD_RELOC_PPC_DTPMOD: r = R_PPC_DTPMOD32; break;
1fe532cf 777 case BFD_RELOC_PPC64_TPREL16_DS:
25dbc73a 778 case BFD_RELOC_PPC_TPREL16: r = R_PPC_TPREL16; break;
1fe532cf 779 case BFD_RELOC_PPC64_TPREL16_LO_DS:
25dbc73a
AM
780 case BFD_RELOC_PPC_TPREL16_LO: r = R_PPC_TPREL16_LO; break;
781 case BFD_RELOC_PPC_TPREL16_HI: r = R_PPC_TPREL16_HI; break;
782 case BFD_RELOC_PPC_TPREL16_HA: r = R_PPC_TPREL16_HA; break;
783 case BFD_RELOC_PPC_TPREL: r = R_PPC_TPREL32; break;
1fe532cf 784 case BFD_RELOC_PPC64_DTPREL16_DS:
25dbc73a 785 case BFD_RELOC_PPC_DTPREL16: r = R_PPC_DTPREL16; break;
1fe532cf 786 case BFD_RELOC_PPC64_DTPREL16_LO_DS:
25dbc73a
AM
787 case BFD_RELOC_PPC_DTPREL16_LO: r = R_PPC_DTPREL16_LO; break;
788 case BFD_RELOC_PPC_DTPREL16_HI: r = R_PPC_DTPREL16_HI; break;
789 case BFD_RELOC_PPC_DTPREL16_HA: r = R_PPC_DTPREL16_HA; break;
790 case BFD_RELOC_PPC_DTPREL: r = R_PPC_DTPREL32; break;
791 case BFD_RELOC_PPC_GOT_TLSGD16: r = R_PPC_GOT_TLSGD16; break;
792 case BFD_RELOC_PPC_GOT_TLSGD16_LO: r = R_PPC_GOT_TLSGD16_LO; break;
793 case BFD_RELOC_PPC_GOT_TLSGD16_HI: r = R_PPC_GOT_TLSGD16_HI; break;
794 case BFD_RELOC_PPC_GOT_TLSGD16_HA: r = R_PPC_GOT_TLSGD16_HA; break;
795 case BFD_RELOC_PPC_GOT_TLSLD16: r = R_PPC_GOT_TLSLD16; break;
796 case BFD_RELOC_PPC_GOT_TLSLD16_LO: r = R_PPC_GOT_TLSLD16_LO; break;
797 case BFD_RELOC_PPC_GOT_TLSLD16_HI: r = R_PPC_GOT_TLSLD16_HI; break;
798 case BFD_RELOC_PPC_GOT_TLSLD16_HA: r = R_PPC_GOT_TLSLD16_HA; break;
799 case BFD_RELOC_PPC_GOT_TPREL16: r = R_PPC_GOT_TPREL16; break;
800 case BFD_RELOC_PPC_GOT_TPREL16_LO: r = R_PPC_GOT_TPREL16_LO; break;
801 case BFD_RELOC_PPC_GOT_TPREL16_HI: r = R_PPC_GOT_TPREL16_HI; break;
802 case BFD_RELOC_PPC_GOT_TPREL16_HA: r = R_PPC_GOT_TPREL16_HA; break;
803 case BFD_RELOC_PPC_GOT_DTPREL16: r = R_PPC_GOT_DTPREL16; break;
804 case BFD_RELOC_PPC_GOT_DTPREL16_LO: r = R_PPC_GOT_DTPREL16_LO; break;
805 case BFD_RELOC_PPC_GOT_DTPREL16_HI: r = R_PPC_GOT_DTPREL16_HI; break;
806 case BFD_RELOC_PPC_GOT_DTPREL16_HA: r = R_PPC_GOT_DTPREL16_HA; break;
807 case BFD_RELOC_PPC_EMB_NADDR32: r = R_PPC_EMB_NADDR32; break;
808 case BFD_RELOC_PPC_EMB_NADDR16: r = R_PPC_EMB_NADDR16; break;
809 case BFD_RELOC_PPC_EMB_NADDR16_LO: r = R_PPC_EMB_NADDR16_LO; break;
810 case BFD_RELOC_PPC_EMB_NADDR16_HI: r = R_PPC_EMB_NADDR16_HI; break;
811 case BFD_RELOC_PPC_EMB_NADDR16_HA: r = R_PPC_EMB_NADDR16_HA; break;
812 case BFD_RELOC_PPC_EMB_SDAI16: r = R_PPC_EMB_SDAI16; break;
813 case BFD_RELOC_PPC_EMB_SDA2I16: r = R_PPC_EMB_SDA2I16; break;
814 case BFD_RELOC_PPC_EMB_SDA2REL: r = R_PPC_EMB_SDA2REL; break;
815 case BFD_RELOC_PPC_EMB_SDA21: r = R_PPC_EMB_SDA21; break;
816 case BFD_RELOC_PPC_EMB_MRKREF: r = R_PPC_EMB_MRKREF; break;
817 case BFD_RELOC_PPC_EMB_RELSEC16: r = R_PPC_EMB_RELSEC16; break;
818 case BFD_RELOC_PPC_EMB_RELST_LO: r = R_PPC_EMB_RELST_LO; break;
819 case BFD_RELOC_PPC_EMB_RELST_HI: r = R_PPC_EMB_RELST_HI; break;
820 case BFD_RELOC_PPC_EMB_RELST_HA: r = R_PPC_EMB_RELST_HA; break;
821 case BFD_RELOC_PPC_EMB_BIT_FLD: r = R_PPC_EMB_BIT_FLD; break;
822 case BFD_RELOC_PPC_EMB_RELSDA: r = R_PPC_EMB_RELSDA; break;
b9c361e0
JL
823 case BFD_RELOC_PPC_VLE_REL8: r = R_PPC_VLE_REL8; break;
824 case BFD_RELOC_PPC_VLE_REL15: r = R_PPC_VLE_REL15; break;
825 case BFD_RELOC_PPC_VLE_REL24: r = R_PPC_VLE_REL24; break;
826 case BFD_RELOC_PPC_VLE_LO16A: r = R_PPC_VLE_LO16A; break;
827 case BFD_RELOC_PPC_VLE_LO16D: r = R_PPC_VLE_LO16D; break;
828 case BFD_RELOC_PPC_VLE_HI16A: r = R_PPC_VLE_HI16A; break;
829 case BFD_RELOC_PPC_VLE_HI16D: r = R_PPC_VLE_HI16D; break;
830 case BFD_RELOC_PPC_VLE_HA16A: r = R_PPC_VLE_HA16A; break;
831 case BFD_RELOC_PPC_VLE_HA16D: r = R_PPC_VLE_HA16D; break;
832 case BFD_RELOC_PPC_VLE_SDA21: r = R_PPC_VLE_SDA21; break;
833 case BFD_RELOC_PPC_VLE_SDA21_LO: r = R_PPC_VLE_SDA21_LO; break;
834 case BFD_RELOC_PPC_VLE_SDAREL_LO16A:
835 r = R_PPC_VLE_SDAREL_LO16A;
836 break;
837 case BFD_RELOC_PPC_VLE_SDAREL_LO16D:
838 r = R_PPC_VLE_SDAREL_LO16D;
839 break;
840 case BFD_RELOC_PPC_VLE_SDAREL_HI16A:
841 r = R_PPC_VLE_SDAREL_HI16A;
842 break;
843 case BFD_RELOC_PPC_VLE_SDAREL_HI16D:
844 r = R_PPC_VLE_SDAREL_HI16D;
845 break;
846 case BFD_RELOC_PPC_VLE_SDAREL_HA16A:
847 r = R_PPC_VLE_SDAREL_HA16A;
848 break;
849 case BFD_RELOC_PPC_VLE_SDAREL_HA16D:
850 r = R_PPC_VLE_SDAREL_HA16D;
851 break;
d7128ce4
AM
852 case BFD_RELOC_16_PCREL: r = R_PPC_REL16; break;
853 case BFD_RELOC_LO16_PCREL: r = R_PPC_REL16_LO; break;
854 case BFD_RELOC_HI16_PCREL: r = R_PPC_REL16_HI; break;
855 case BFD_RELOC_HI16_S_PCREL: r = R_PPC_REL16_HA; break;
7ba71655 856 case BFD_RELOC_PPC_16DX_HA: r = R_PPC_16DX_HA; break;
a680de9a 857 case BFD_RELOC_PPC_REL16DX_HA: r = R_PPC_REL16DX_HA; break;
25dbc73a
AM
858 case BFD_RELOC_VTABLE_INHERIT: r = R_PPC_GNU_VTINHERIT; break;
859 case BFD_RELOC_VTABLE_ENTRY: r = R_PPC_GNU_VTENTRY; break;
860 }
861
862 return ppc_elf_howto_table[r];
863};
864
157090f7
AM
865static reloc_howto_type *
866ppc_elf_reloc_name_lookup (bfd *abfd ATTRIBUTE_UNUSED,
867 const char *r_name)
868{
869 unsigned int i;
870
871 for (i = 0;
872 i < sizeof (ppc_elf_howto_raw) / sizeof (ppc_elf_howto_raw[0]);
873 i++)
874 if (ppc_elf_howto_raw[i].name != NULL
875 && strcasecmp (ppc_elf_howto_raw[i].name, r_name) == 0)
876 return &ppc_elf_howto_raw[i];
877
878 return NULL;
879}
880
25dbc73a
AM
881/* Set the howto pointer for a PowerPC ELF reloc. */
882
f3185997 883static bfd_boolean
4aef7643 884ppc_elf_info_to_howto (bfd *abfd,
25dbc73a
AM
885 arelent *cache_ptr,
886 Elf_Internal_Rela *dst)
887{
cd21f5da
NC
888 unsigned int r_type;
889
25dbc73a
AM
890 /* Initialize howto table if not already done. */
891 if (!ppc_elf_howto_table[R_PPC_ADDR32])
892 ppc_elf_howto_init ();
893
cd21f5da
NC
894 r_type = ELF32_R_TYPE (dst->r_info);
895 if (r_type >= R_PPC_max)
896 {
695344c0 897 /* xgettext:c-format */
0aa13fee 898 _bfd_error_handler (_("%pB: unsupported relocation type %#x"),
4eca0228 899 abfd, r_type);
cd21f5da 900 bfd_set_error (bfd_error_bad_value);
f3185997 901 return FALSE;
cd21f5da 902 }
f3185997 903
cd21f5da 904 cache_ptr->howto = ppc_elf_howto_table[r_type];
375de94a
AM
905
906 /* Just because the above assert didn't trigger doesn't mean that
907 ELF32_R_TYPE (dst->r_info) is necessarily a valid relocation. */
f3185997 908 if (cache_ptr->howto == NULL)
375de94a 909 {
695344c0 910 /* xgettext:c-format */
0aa13fee 911 _bfd_error_handler (_("%pB: unsupported relocation type %#x"),
4eca0228 912 abfd, r_type);
375de94a
AM
913 bfd_set_error (bfd_error_bad_value);
914
f3185997 915 return FALSE;
375de94a 916 }
f3185997
NC
917
918 return TRUE;
25dbc73a
AM
919}
920
d7128ce4 921/* Handle the R_PPC_ADDR16_HA and R_PPC_REL16_HA relocs. */
25dbc73a
AM
922
923static bfd_reloc_status_type
4aef7643 924ppc_elf_addr16_ha_reloc (bfd *abfd,
25dbc73a
AM
925 arelent *reloc_entry,
926 asymbol *symbol,
4aef7643 927 void *data,
25dbc73a
AM
928 asection *input_section,
929 bfd *output_bfd,
930 char **error_message ATTRIBUTE_UNUSED)
931{
a680de9a
PB
932 enum elf_ppc_reloc_type r_type;
933 long insn;
934 bfd_size_type octets;
935 bfd_vma value;
25dbc73a
AM
936
937 if (output_bfd != NULL)
938 {
939 reloc_entry->address += input_section->output_offset;
940 return bfd_reloc_ok;
941 }
942
a680de9a
PB
943 reloc_entry->addend += 0x8000;
944 r_type = reloc_entry->howto->type;
945 if (r_type != R_PPC_REL16DX_HA)
946 return bfd_reloc_continue;
947
948 value = 0;
949 if (!bfd_is_com_section (symbol->section))
950 value = symbol->value;
951 value += (reloc_entry->addend
952 + symbol->section->output_offset
953 + symbol->section->output_section->vma);
954 value -= (reloc_entry->address
955 + input_section->output_offset
956 + input_section->output_section->vma);
957 value >>= 16;
958
bb294208 959 octets = reloc_entry->address * OCTETS_PER_BYTE (abfd, input_section);
a680de9a
PB
960 insn = bfd_get_32 (abfd, (bfd_byte *) data + octets);
961 insn &= ~0x1fffc1;
962 insn |= (value & 0xffc1) | ((value & 0x3e) << 15);
963 bfd_put_32 (abfd, insn, (bfd_byte *) data + octets);
964 return bfd_reloc_ok;
25dbc73a
AM
965}
966
967static bfd_reloc_status_type
968ppc_elf_unhandled_reloc (bfd *abfd,
969 arelent *reloc_entry,
970 asymbol *symbol,
971 void *data,
972 asection *input_section,
973 bfd *output_bfd,
974 char **error_message)
975{
976 /* If this is a relocatable link (output_bfd test tells us), just
977 call the generic function. Any adjustment will be done at final
978 link time. */
979 if (output_bfd != NULL)
980 return bfd_elf_generic_reloc (abfd, reloc_entry, symbol, data,
981 input_section, output_bfd, error_message);
982
983 if (error_message != NULL)
984 {
7fbd5f4e
AM
985 static char *message;
986 free (message);
987 if (asprintf (&message, _("generic linker can't handle %s"),
988 reloc_entry->howto->name) < 0)
989 message = NULL;
990 *error_message = message;
25dbc73a
AM
991 }
992 return bfd_reloc_dangerous;
993}
994\f
995/* Sections created by the linker. */
996
997typedef struct elf_linker_section
998{
c9a2f333 999 /* Pointer to the bfd section. */
25dbc73a 1000 asection *section;
c9a2f333
AM
1001 /* Section name. */
1002 const char *name;
1003 /* Associated bss section name. */
1004 const char *bss_name;
1005 /* Associated symbol name. */
1006 const char *sym_name;
046183de
AM
1007 /* Associated symbol. */
1008 struct elf_link_hash_entry *sym;
25dbc73a
AM
1009} elf_linker_section_t;
1010
1011/* Linked list of allocated pointer entries. This hangs off of the
1012 symbol lists, and provides allows us to return different pointers,
1013 based on different addend's. */
1014
1015typedef struct elf_linker_section_pointers
1016{
1017 /* next allocated pointer for this symbol */
1018 struct elf_linker_section_pointers *next;
1019 /* offset of pointer from beginning of section */
1020 bfd_vma offset;
1021 /* addend used */
1022 bfd_vma addend;
1023 /* which linker section this is */
1024 elf_linker_section_t *lsect;
25dbc73a
AM
1025} elf_linker_section_pointers_t;
1026
1027struct ppc_elf_obj_tdata
1028{
1029 struct elf_obj_tdata elf;
1030
1031 /* A mapping from local symbols to offsets into the various linker
1032 sections added. This is index by the symbol index. */
1033 elf_linker_section_pointers_t **linker_section_pointers;
016687f8
AM
1034
1035 /* Flags used to auto-detect plt type. */
1036 unsigned int makes_plt_call : 1;
1037 unsigned int has_rel16 : 1;
25dbc73a
AM
1038};
1039
1040#define ppc_elf_tdata(bfd) \
1041 ((struct ppc_elf_obj_tdata *) (bfd)->tdata.any)
7619e7c7 1042
25dbc73a
AM
1043#define elf_local_ptr_offsets(bfd) \
1044 (ppc_elf_tdata (bfd)->linker_section_pointers)
7619e7c7 1045
0c8d6e5c
AM
1046#define is_ppc_elf(bfd) \
1047 (bfd_get_flavour (bfd) == bfd_target_elf_flavour \
4dfe6ac6 1048 && elf_object_id (bfd) == PPC32_ELF_DATA)
0c8d6e5c 1049
25dbc73a 1050/* Override the generic function because we store some extras. */
7619e7c7 1051
25dbc73a
AM
1052static bfd_boolean
1053ppc_elf_mkobject (bfd *abfd)
1054{
0ffa91dd 1055 return bfd_elf_allocate_object (abfd, sizeof (struct ppc_elf_obj_tdata),
4dfe6ac6 1056 PPC32_ELF_DATA);
25dbc73a 1057}
7619e7c7 1058
14b57c7c
AM
1059/* When defaulting arch/mach, decode apuinfo to find a better match. */
1060
1061bfd_boolean
1062_bfd_elf_ppc_set_arch (bfd *abfd)
1063{
1064 unsigned long mach = 0;
1065 asection *s;
1066 unsigned char *contents;
1067
1068 if (abfd->arch_info->bits_per_word == 32
1069 && bfd_big_endian (abfd))
1070 {
1071
1072 for (s = abfd->sections; s != NULL; s = s->next)
1073 if ((elf_section_data (s)->this_hdr.sh_flags & SHF_PPC_VLE) != 0)
1074 break;
1075 if (s != NULL)
1076 mach = bfd_mach_ppc_vle;
1077 }
1078
1079 if (mach == 0)
1080 {
1081 s = bfd_get_section_by_name (abfd, APUINFO_SECTION_NAME);
62a47958
AM
1082 if (s != NULL
1083 && s->size >= 24
1084 && bfd_malloc_and_get_section (abfd, s, &contents))
14b57c7c
AM
1085 {
1086 unsigned int apuinfo_size = bfd_get_32 (abfd, contents + 4);
1087 unsigned int i;
1088
1089 for (i = 20; i < apuinfo_size + 20 && i + 4 <= s->size; i += 4)
1090 {
1091 unsigned int val = bfd_get_32 (abfd, contents + i);
1092 switch (val >> 16)
1093 {
1094 case PPC_APUINFO_PMR:
1095 case PPC_APUINFO_RFMCI:
1096 if (mach == 0)
1097 mach = bfd_mach_ppc_titan;
1098 break;
1099
1100 case PPC_APUINFO_ISEL:
1101 case PPC_APUINFO_CACHELCK:
1102 if (mach == bfd_mach_ppc_titan)
1103 mach = bfd_mach_ppc_e500mc;
1104 break;
1105
1106 case PPC_APUINFO_SPE:
1107 case PPC_APUINFO_EFS:
1108 case PPC_APUINFO_BRLOCK:
1109 if (mach != bfd_mach_ppc_vle)
1110 mach = bfd_mach_ppc_e500;
8941017b 1111 break;
14b57c7c
AM
1112
1113 case PPC_APUINFO_VLE:
1114 mach = bfd_mach_ppc_vle;
1115 break;
1116
1117 default:
1118 mach = -1ul;
1119 }
1120 }
1121 free (contents);
1122 }
1123 }
1124
1125 if (mach != 0 && mach != -1ul)
1126 {
1127 const bfd_arch_info_type *arch;
1128
1129 for (arch = abfd->arch_info->next; arch; arch = arch->next)
1130 if (arch->mach == mach)
1131 {
1132 abfd->arch_info = arch;
1133 break;
1134 }
1135 }
1136 return TRUE;
1137}
1138
25dbc73a 1139/* Fix bad default arch selected for a 32 bit input bfd when the
14b57c7c 1140 default is 64 bit. Also select arch based on apuinfo. */
7619e7c7 1141
25dbc73a
AM
1142static bfd_boolean
1143ppc_elf_object_p (bfd *abfd)
1144{
14b57c7c
AM
1145 if (!abfd->arch_info->the_default)
1146 return TRUE;
1147
1148 if (abfd->arch_info->bits_per_word == 64)
25dbc73a
AM
1149 {
1150 Elf_Internal_Ehdr *i_ehdr = elf_elfheader (abfd);
7619e7c7 1151
25dbc73a
AM
1152 if (i_ehdr->e_ident[EI_CLASS] == ELFCLASS32)
1153 {
1154 /* Relies on arch after 64 bit default being 32 bit default. */
1155 abfd->arch_info = abfd->arch_info->next;
1156 BFD_ASSERT (abfd->arch_info->bits_per_word == 32);
1157 }
1158 }
14b57c7c 1159 return _bfd_elf_ppc_set_arch (abfd);
25dbc73a 1160}
7619e7c7 1161
25dbc73a 1162/* Function to set whether a module needs the -mrelocatable bit set. */
7619e7c7 1163
25dbc73a
AM
1164static bfd_boolean
1165ppc_elf_set_private_flags (bfd *abfd, flagword flags)
1166{
1167 BFD_ASSERT (!elf_flags_init (abfd)
1168 || elf_elfheader (abfd)->e_flags == flags);
7619e7c7 1169
25dbc73a
AM
1170 elf_elfheader (abfd)->e_flags = flags;
1171 elf_flags_init (abfd) = TRUE;
1172 return TRUE;
1173}
1174
25dbc73a 1175/* Support for core dump NOTE sections. */
deaaf2f3 1176
b34976b6 1177static bfd_boolean
25dbc73a 1178ppc_elf_grok_prstatus (bfd *abfd, Elf_Internal_Note *note)
252b5132 1179{
25dbc73a
AM
1180 int offset;
1181 unsigned int size;
252b5132 1182
25dbc73a
AM
1183 switch (note->descsz)
1184 {
1185 default:
1186 return FALSE;
252b5132 1187
25dbc73a
AM
1188 case 268: /* Linux/PPC. */
1189 /* pr_cursig */
228e534f 1190 elf_tdata (abfd)->core->signal = bfd_get_16 (abfd, note->descdata + 12);
deaaf2f3 1191
25dbc73a 1192 /* pr_pid */
228e534f 1193 elf_tdata (abfd)->core->lwpid = bfd_get_32 (abfd, note->descdata + 24);
9abc968f 1194
25dbc73a
AM
1195 /* pr_reg */
1196 offset = 72;
1197 size = 192;
deaaf2f3 1198
25dbc73a
AM
1199 break;
1200 }
deaaf2f3 1201
25dbc73a
AM
1202 /* Make a ".reg/999" section. */
1203 return _bfd_elfcore_make_pseudosection (abfd, ".reg",
1204 size, note->descpos + offset);
1205}
252b5132 1206
25dbc73a
AM
1207static bfd_boolean
1208ppc_elf_grok_psinfo (bfd *abfd, Elf_Internal_Note *note)
1209{
1210 switch (note->descsz)
deaaf2f3 1211 {
25dbc73a
AM
1212 default:
1213 return FALSE;
deaaf2f3 1214
25dbc73a 1215 case 128: /* Linux/PPC elf_prpsinfo. */
228e534f 1216 elf_tdata (abfd)->core->pid
bc989cdc 1217 = bfd_get_32 (abfd, note->descdata + 16);
228e534f 1218 elf_tdata (abfd)->core->program
25dbc73a 1219 = _bfd_elfcore_strndup (abfd, note->descdata + 32, 16);
228e534f 1220 elf_tdata (abfd)->core->command
25dbc73a
AM
1221 = _bfd_elfcore_strndup (abfd, note->descdata + 48, 80);
1222 }
9abc968f 1223
25dbc73a
AM
1224 /* Note that for some reason, a spurious space is tacked
1225 onto the end of the args in some (at least one anyway)
1226 implementations, so strip it off if it exists. */
70bccea4 1227
25dbc73a 1228 {
228e534f 1229 char *command = elf_tdata (abfd)->core->command;
25dbc73a 1230 int n = strlen (command);
70bccea4 1231
25dbc73a
AM
1232 if (0 < n && command[n - 1] == ' ')
1233 command[n - 1] = '\0';
1234 }
deaaf2f3 1235
25dbc73a
AM
1236 return TRUE;
1237}
deaaf2f3 1238
183e98be
AM
1239static char *
1240ppc_elf_write_core_note (bfd *abfd, char *buf, int *bufsiz, int note_type, ...)
1241{
1242 switch (note_type)
1243 {
1244 default:
1245 return NULL;
1246
1247 case NT_PRPSINFO:
1248 {
602f1657 1249 char data[128] ATTRIBUTE_NONSTRING;
183e98be
AM
1250 va_list ap;
1251
1252 va_start (ap, note_type);
75cd47ed 1253 memset (data, 0, sizeof (data));
183e98be 1254 strncpy (data + 32, va_arg (ap, const char *), 16);
be3e27bb 1255#if GCC_VERSION == 8000 || GCC_VERSION == 8001
95da9854 1256 DIAGNOSTIC_PUSH;
be3e27bb 1257 /* GCC 8.0 and 8.1 warn about 80 equals destination size with
95da9854
L
1258 -Wstringop-truncation:
1259 https://gcc.gnu.org/bugzilla/show_bug.cgi?id=85643
1260 */
95da9854
L
1261 DIAGNOSTIC_IGNORE_STRINGOP_TRUNCATION;
1262#endif
183e98be 1263 strncpy (data + 48, va_arg (ap, const char *), 80);
be3e27bb 1264#if GCC_VERSION == 8000 || GCC_VERSION == 8001
95da9854 1265 DIAGNOSTIC_POP;
fe75810f 1266#endif
183e98be
AM
1267 va_end (ap);
1268 return elfcore_write_note (abfd, buf, bufsiz,
1269 "CORE", note_type, data, sizeof (data));
1270 }
1271
1272 case NT_PRSTATUS:
1273 {
1274 char data[268];
1275 va_list ap;
1276 long pid;
1277 int cursig;
1278 const void *greg;
1279
1280 va_start (ap, note_type);
1281 memset (data, 0, 72);
1282 pid = va_arg (ap, long);
1283 bfd_put_32 (abfd, pid, data + 24);
1284 cursig = va_arg (ap, int);
1285 bfd_put_16 (abfd, cursig, data + 12);
1286 greg = va_arg (ap, const void *);
1287 memcpy (data + 72, greg, 192);
1288 memset (data + 264, 0, 4);
1289 va_end (ap);
1290 return elfcore_write_note (abfd, buf, bufsiz,
1291 "CORE", note_type, data, sizeof (data));
1292 }
1293 }
1294}
1295
b9c361e0 1296static flagword
68ffbac6 1297ppc_elf_lookup_section_flags (char *flag_name)
b9c361e0
JL
1298{
1299
1300 if (!strcmp (flag_name, "SHF_PPC_VLE"))
1301 return SHF_PPC_VLE;
1302
1303 return 0;
1304}
1305
25dbc73a
AM
1306/* Return address for Ith PLT stub in section PLT, for relocation REL
1307 or (bfd_vma) -1 if it should not be included. */
deaaf2f3 1308
25dbc73a
AM
1309static bfd_vma
1310ppc_elf_plt_sym_val (bfd_vma i ATTRIBUTE_UNUSED,
1311 const asection *plt ATTRIBUTE_UNUSED,
1312 const arelent *rel)
1313{
1314 return rel->address;
1315}
deaaf2f3 1316
25dbc73a 1317/* Handle a PowerPC specific section when reading an object file. This
6dc132d9
L
1318 is called when bfd_section_from_shdr finds a section with an unknown
1319 type. */
deaaf2f3 1320
25dbc73a 1321static bfd_boolean
6dc132d9
L
1322ppc_elf_section_from_shdr (bfd *abfd,
1323 Elf_Internal_Shdr *hdr,
1324 const char *name,
1325 int shindex)
25dbc73a
AM
1326{
1327 asection *newsect;
1328 flagword flags;
d1c6de6f 1329
6dc132d9 1330 if (! _bfd_elf_make_section_from_shdr (abfd, hdr, name, shindex))
25dbc73a 1331 return FALSE;
deaaf2f3 1332
25dbc73a 1333 newsect = hdr->bfd_section;
bf577467 1334 flags = 0;
25dbc73a
AM
1335 if (hdr->sh_flags & SHF_EXCLUDE)
1336 flags |= SEC_EXCLUDE;
9abc968f 1337
25dbc73a
AM
1338 if (hdr->sh_type == SHT_ORDERED)
1339 flags |= SEC_SORT_ENTRIES;
d1c6de6f 1340
bf577467
AM
1341 if (strncmp (name, ".PPC.EMB", 8) == 0)
1342 name += 8;
1343 if (strncmp (name, ".sbss", 5) == 0
1344 || strncmp (name, ".sdata", 6) == 0)
1345 flags |= SEC_SMALL_DATA;
1346
1347 return (flags == 0
1348 || bfd_set_section_flags (newsect, newsect->flags | flags));
25dbc73a
AM
1349}
1350
1351/* Set up any other section flags and such that may be necessary. */
1352
1353static bfd_boolean
1354ppc_elf_fake_sections (bfd *abfd ATTRIBUTE_UNUSED,
1355 Elf_Internal_Shdr *shdr,
1356 asection *asect)
1357{
25dbc73a
AM
1358 if ((asect->flags & SEC_SORT_ENTRIES) != 0)
1359 shdr->sh_type = SHT_ORDERED;
1360
1361 return TRUE;
1362}
1363
1364/* If we have .sbss2 or .PPC.EMB.sbss0 output sections, we
1365 need to bump up the number of section headers. */
1366
1367static int
a6b96beb
AM
1368ppc_elf_additional_program_headers (bfd *abfd,
1369 struct bfd_link_info *info ATTRIBUTE_UNUSED)
25dbc73a
AM
1370{
1371 asection *s;
1372 int ret = 0;
d1c6de6f 1373
25dbc73a
AM
1374 s = bfd_get_section_by_name (abfd, ".sbss2");
1375 if (s != NULL && (s->flags & SEC_ALLOC) != 0)
1376 ++ret;
d1c6de6f 1377
25dbc73a
AM
1378 s = bfd_get_section_by_name (abfd, ".PPC.EMB.sbss0");
1379 if (s != NULL && (s->flags & SEC_ALLOC) != 0)
1380 ++ret;
deaaf2f3 1381
25dbc73a
AM
1382 return ret;
1383}
deaaf2f3 1384
68ffbac6 1385/* Modify the segment map for VLE executables. */
b9c361e0
JL
1386
1387bfd_boolean
1388ppc_elf_modify_segment_map (bfd *abfd,
1389 struct bfd_link_info *info ATTRIBUTE_UNUSED)
1390{
f7d69005 1391 struct elf_segment_map *m;
b9c361e0
JL
1392
1393 /* At this point in the link, output sections have already been sorted by
1394 LMA and assigned to segments. All that is left to do is to ensure
1395 there is no mixing of VLE & non-VLE sections in a text segment.
1396 If we find that case, we split the segment.
1397 We maintain the original output section order. */
1398
12bd6957 1399 for (m = elf_seg_map (abfd); m != NULL; m = m->next)
b9c361e0 1400 {
f7d69005 1401 struct elf_segment_map *n;
986f0783 1402 size_t amt;
f7d69005
AM
1403 unsigned int j, k;
1404 unsigned int p_flags;
1405
1406 if (m->p_type != PT_LOAD || m->count == 0)
b9c361e0
JL
1407 continue;
1408
f7d69005 1409 for (p_flags = PF_R, j = 0; j != m->count; ++j)
b9c361e0 1410 {
f7d69005
AM
1411 if ((m->sections[j]->flags & SEC_READONLY) == 0)
1412 p_flags |= PF_W;
1413 if ((m->sections[j]->flags & SEC_CODE) != 0)
1414 {
1415 p_flags |= PF_X;
1416 if ((elf_section_flags (m->sections[j]) & SHF_PPC_VLE) != 0)
1417 p_flags |= PF_PPC_VLE;
1418 break;
1419 }
1420 }
1421 if (j != m->count)
1422 while (++j != m->count)
1423 {
1424 unsigned int p_flags1 = PF_R;
94caa966 1425
f7d69005
AM
1426 if ((m->sections[j]->flags & SEC_READONLY) == 0)
1427 p_flags1 |= PF_W;
1428 if ((m->sections[j]->flags & SEC_CODE) != 0)
1429 {
1430 p_flags1 |= PF_X;
1431 if ((elf_section_flags (m->sections[j]) & SHF_PPC_VLE) != 0)
1432 p_flags1 |= PF_PPC_VLE;
1433 if (((p_flags1 ^ p_flags) & PF_PPC_VLE) != 0)
1434 break;
1435 }
1436 p_flags |= p_flags1;
1437 }
1438 /* If we're splitting a segment which originally contained rw
1439 sections then those sections might now only be in one of the
1440 two parts. So always set p_flags if splitting, even if we
1441 are being called for objcopy with p_flags_valid set. */
1442 if (j != m->count || !m->p_flags_valid)
1443 {
1444 m->p_flags_valid = 1;
1445 m->p_flags = p_flags;
1446 }
1447 if (j == m->count)
b9c361e0
JL
1448 continue;
1449
f7d69005 1450 /* Sections 0..j-1 stay in this (current) segment,
b9c361e0
JL
1451 the remainder are put in a new segment.
1452 The scan resumes with the new segment. */
1453
b9c361e0
JL
1454 amt = sizeof (struct elf_segment_map);
1455 amt += (m->count - j - 1) * sizeof (asection *);
1456 n = (struct elf_segment_map *) bfd_zalloc (abfd, amt);
1457 if (n == NULL)
954b63d4 1458 return FALSE;
b9c361e0
JL
1459
1460 n->p_type = PT_LOAD;
b9c361e0
JL
1461 n->count = m->count - j;
1462 for (k = 0; k < n->count; ++k)
f7d69005
AM
1463 n->sections[k] = m->sections[j + k];
1464 m->count = j;
1465 m->p_size_valid = 0;
b9c361e0
JL
1466 n->next = m->next;
1467 m->next = n;
b9c361e0
JL
1468 }
1469
1470 return TRUE;
1471}
1472
25dbc73a
AM
1473/* Add extra PPC sections -- Note, for now, make .sbss2 and
1474 .PPC.EMB.sbss0 a normal section, and not a bss section so
1475 that the linker doesn't crater when trying to make more than
1476 2 sections. */
e656e369 1477
b35d266b 1478static const struct bfd_elf_special_section ppc_elf_special_sections[] =
7f4d3958 1479{
14b57c7c
AM
1480 { STRING_COMMA_LEN (".plt"), 0, SHT_NOBITS, SHF_ALLOC + SHF_EXECINSTR },
1481 { STRING_COMMA_LEN (".sbss"), -2, SHT_NOBITS, SHF_ALLOC + SHF_WRITE },
1482 { STRING_COMMA_LEN (".sbss2"), -2, SHT_PROGBITS, SHF_ALLOC },
1483 { STRING_COMMA_LEN (".sdata"), -2, SHT_PROGBITS, SHF_ALLOC + SHF_WRITE },
1484 { STRING_COMMA_LEN (".sdata2"), -2, SHT_PROGBITS, SHF_ALLOC },
1485 { STRING_COMMA_LEN (".tags"), 0, SHT_ORDERED, SHF_ALLOC },
1486 { STRING_COMMA_LEN (APUINFO_SECTION_NAME), 0, SHT_NOTE, 0 },
1487 { STRING_COMMA_LEN (".PPC.EMB.sbss0"), 0, SHT_PROGBITS, SHF_ALLOC },
1488 { STRING_COMMA_LEN (".PPC.EMB.sdata0"), 0, SHT_PROGBITS, SHF_ALLOC },
1489 { NULL, 0, 0, 0, 0 }
7f4d3958
L
1490};
1491
551b43fd 1492/* This is what we want for new plt/got. */
bd38246a 1493static const struct bfd_elf_special_section ppc_alt_plt =
07d6d2b8 1494 { STRING_COMMA_LEN (".plt"), 0, SHT_PROGBITS, SHF_ALLOC };
551b43fd
AM
1495
1496static const struct bfd_elf_special_section *
4aef7643 1497ppc_elf_get_sec_type_attr (bfd *abfd, asection *sec)
7f4d3958 1498{
b35d266b 1499 const struct bfd_elf_special_section *ssect;
551b43fd
AM
1500
1501 /* See if this is one of the special sections. */
1502 if (sec->name == NULL)
1503 return NULL;
1504
1505 ssect = _bfd_elf_get_special_section (sec->name, ppc_elf_special_sections,
1506 sec->use_rela_p);
1507 if (ssect != NULL)
1508 {
1509 if (ssect == ppc_elf_special_sections && (sec->flags & SEC_LOAD) != 0)
1510 ssect = &ppc_alt_plt;
1511 return ssect;
1512 }
1513
1514 return _bfd_elf_get_sec_type_attr (abfd, sec);
1515}
25dbc73a
AM
1516\f
1517/* Very simple linked list structure for recording apuinfo values. */
1518typedef struct apuinfo_list
1519{
1520 struct apuinfo_list *next;
1521 unsigned long value;
1522}
1523apuinfo_list;
e656e369 1524
25dbc73a 1525static apuinfo_list *head;
f2faa800 1526static bfd_boolean apuinfo_set;
deaaf2f3 1527
25dbc73a
AM
1528static void
1529apuinfo_list_init (void)
1530{
1531 head = NULL;
f2faa800 1532 apuinfo_set = FALSE;
25dbc73a 1533}
9abc968f 1534
25dbc73a
AM
1535static void
1536apuinfo_list_add (unsigned long value)
1537{
1538 apuinfo_list *entry = head;
deaaf2f3 1539
25dbc73a
AM
1540 while (entry != NULL)
1541 {
1542 if (entry->value == value)
1543 return;
1544 entry = entry->next;
1545 }
b4a38de6 1546
25dbc73a
AM
1547 entry = bfd_malloc (sizeof (* entry));
1548 if (entry == NULL)
1549 return;
e656e369 1550
25dbc73a
AM
1551 entry->value = value;
1552 entry->next = head;
1553 head = entry;
1554}
9abc968f 1555
25dbc73a
AM
1556static unsigned
1557apuinfo_list_length (void)
1558{
1559 apuinfo_list *entry;
1560 unsigned long count;
9abc968f 1561
25dbc73a
AM
1562 for (entry = head, count = 0;
1563 entry;
1564 entry = entry->next)
1565 ++ count;
e656e369 1566
25dbc73a
AM
1567 return count;
1568}
eea6121a 1569
25dbc73a
AM
1570static inline unsigned long
1571apuinfo_list_element (unsigned long number)
1572{
1573 apuinfo_list * entry;
e656e369 1574
25dbc73a
AM
1575 for (entry = head;
1576 entry && number --;
1577 entry = entry->next)
1578 ;
252b5132 1579
25dbc73a
AM
1580 return entry ? entry->value : 0;
1581}
1582
1583static void
1584apuinfo_list_finish (void)
1585{
1586 apuinfo_list *entry;
1587
1588 for (entry = head; entry;)
252b5132 1589 {
25dbc73a
AM
1590 apuinfo_list *next = entry->next;
1591 free (entry);
1592 entry = next;
1593 }
9abc968f 1594
25dbc73a
AM
1595 head = NULL;
1596}
9abc968f 1597
25dbc73a
AM
1598/* Scan the input BFDs and create a linked list of
1599 the APUinfo values that will need to be emitted. */
9abc968f 1600
25dbc73a
AM
1601static void
1602ppc_elf_begin_write_processing (bfd *abfd, struct bfd_link_info *link_info)
1603{
1604 bfd *ibfd;
1605 asection *asec;
deddc40b
NS
1606 char *buffer = NULL;
1607 bfd_size_type largest_input_size = 0;
25dbc73a 1608 unsigned i;
25dbc73a
AM
1609 unsigned long length;
1610 const char *error_message = NULL;
9abc968f 1611
25dbc73a
AM
1612 if (link_info == NULL)
1613 return;
9abc968f 1614
25dbc73a 1615 apuinfo_list_init ();
252b5132 1616
25dbc73a 1617 /* Read in the input sections contents. */
c72f2fb2 1618 for (ibfd = link_info->input_bfds; ibfd; ibfd = ibfd->link.next)
252b5132 1619 {
25dbc73a 1620 unsigned long datum;
252b5132 1621
25dbc73a
AM
1622 asec = bfd_get_section_by_name (ibfd, APUINFO_SECTION_NAME);
1623 if (asec == NULL)
1624 continue;
252b5132 1625
695344c0 1626 /* xgettext:c-format */
871b3ab2 1627 error_message = _("corrupt %s section in %pB");
25dbc73a 1628 length = asec->size;
deddc40b
NS
1629 if (length < 20)
1630 goto fail;
1631
f2faa800 1632 apuinfo_set = TRUE;
deddc40b 1633 if (largest_input_size < asec->size)
25dbc73a 1634 {
c9594989 1635 free (buffer);
deddc40b
NS
1636 largest_input_size = asec->size;
1637 buffer = bfd_malloc (largest_input_size);
1638 if (!buffer)
1639 return;
25dbc73a 1640 }
5b914448 1641
25dbc73a 1642 if (bfd_seek (ibfd, asec->filepos, SEEK_SET) != 0
deddc40b 1643 || (bfd_bread (buffer, length, ibfd) != length))
25dbc73a 1644 {
695344c0 1645 /* xgettext:c-format */
871b3ab2 1646 error_message = _("unable to read in %s section from %pB");
25dbc73a
AM
1647 goto fail;
1648 }
252b5132 1649
25dbc73a
AM
1650 /* Verify the contents of the header. Note - we have to
1651 extract the values this way in order to allow for a
1652 host whose endian-ness is different from the target. */
deddc40b 1653 datum = bfd_get_32 (ibfd, buffer);
25dbc73a
AM
1654 if (datum != sizeof APUINFO_LABEL)
1655 goto fail;
252b5132 1656
deddc40b 1657 datum = bfd_get_32 (ibfd, buffer + 8);
25dbc73a
AM
1658 if (datum != 0x2)
1659 goto fail;
252b5132 1660
deddc40b 1661 if (strcmp (buffer + 12, APUINFO_LABEL) != 0)
25dbc73a 1662 goto fail;
252b5132 1663
25dbc73a 1664 /* Get the number of bytes used for apuinfo entries. */
deddc40b 1665 datum = bfd_get_32 (ibfd, buffer + 4);
25dbc73a
AM
1666 if (datum + 20 != length)
1667 goto fail;
1668
25dbc73a
AM
1669 /* Scan the apuinfo section, building a list of apuinfo numbers. */
1670 for (i = 0; i < datum; i += 4)
deddc40b 1671 apuinfo_list_add (bfd_get_32 (ibfd, buffer + 20 + i));
252b5132
RH
1672 }
1673
25dbc73a 1674 error_message = NULL;
252b5132 1675
f2faa800 1676 if (apuinfo_set)
deddc40b 1677 {
f2faa800
NS
1678 /* Compute the size of the output section. */
1679 unsigned num_entries = apuinfo_list_length ();
5b914448 1680
deddc40b
NS
1681 /* Set the output section size, if it exists. */
1682 asec = bfd_get_section_by_name (abfd, APUINFO_SECTION_NAME);
f2faa800 1683
fd361982 1684 if (asec && !bfd_set_section_size (asec, 20 + num_entries * 4))
deddc40b
NS
1685 {
1686 ibfd = abfd;
695344c0 1687 /* xgettext:c-format */
871b3ab2 1688 error_message = _("warning: unable to set size of %s section in %pB");
deddc40b
NS
1689 }
1690 }
25dbc73a
AM
1691
1692 fail:
c9594989 1693 free (buffer);
25dbc73a
AM
1694
1695 if (error_message)
cd9af601 1696 _bfd_error_handler (error_message, APUINFO_SECTION_NAME, ibfd);
25dbc73a 1697}
252b5132 1698
25dbc73a
AM
1699/* Prevent the output section from accumulating the input sections'
1700 contents. We have already stored this in our linked list structure. */
252b5132 1701
25dbc73a
AM
1702static bfd_boolean
1703ppc_elf_write_section (bfd *abfd ATTRIBUTE_UNUSED,
c7b8f16e 1704 struct bfd_link_info *link_info ATTRIBUTE_UNUSED,
25dbc73a
AM
1705 asection *asec,
1706 bfd_byte *contents ATTRIBUTE_UNUSED)
1707{
f2faa800 1708 return apuinfo_set && strcmp (asec->name, APUINFO_SECTION_NAME) == 0;
252b5132
RH
1709}
1710
25dbc73a
AM
1711/* Finally we can generate the output section. */
1712
1713static void
cc364be6 1714ppc_final_write_processing (bfd *abfd)
7619e7c7 1715{
25dbc73a
AM
1716 bfd_byte *buffer;
1717 asection *asec;
1718 unsigned i;
1719 unsigned num_entries;
1720 bfd_size_type length;
7619e7c7 1721
25dbc73a
AM
1722 asec = bfd_get_section_by_name (abfd, APUINFO_SECTION_NAME);
1723 if (asec == NULL)
1724 return;
1725
f2faa800 1726 if (!apuinfo_set)
25dbc73a
AM
1727 return;
1728
1729 length = asec->size;
1730 if (length < 20)
1731 return;
1732
1733 buffer = bfd_malloc (length);
1734 if (buffer == NULL)
7619e7c7 1735 {
4eca0228 1736 _bfd_error_handler
cf97bcb0 1737 (_("failed to allocate space for new APUinfo section"));
25dbc73a 1738 return;
7619e7c7 1739 }
7619e7c7 1740
25dbc73a
AM
1741 /* Create the apuinfo header. */
1742 num_entries = apuinfo_list_length ();
1743 bfd_put_32 (abfd, sizeof APUINFO_LABEL, buffer);
1744 bfd_put_32 (abfd, num_entries * 4, buffer + 4);
1745 bfd_put_32 (abfd, 0x2, buffer + 8);
1746 strcpy ((char *) buffer + 12, APUINFO_LABEL);
feee612b 1747
25dbc73a
AM
1748 length = 20;
1749 for (i = 0; i < num_entries; i++)
feee612b 1750 {
25dbc73a
AM
1751 bfd_put_32 (abfd, apuinfo_list_element (i), buffer + length);
1752 length += 4;
feee612b 1753 }
feee612b 1754
25dbc73a 1755 if (length != asec->size)
cf97bcb0 1756 _bfd_error_handler (_("failed to compute new APUinfo section"));
252b5132 1757
25dbc73a 1758 if (! bfd_set_section_contents (abfd, asec, buffer, (file_ptr) 0, length))
cf97bcb0 1759 _bfd_error_handler (_("failed to install new APUinfo section"));
252b5132 1760
25dbc73a
AM
1761 free (buffer);
1762
1763 apuinfo_list_finish ();
252b5132 1764}
06f44071 1765
cc364be6
AM
1766static bfd_boolean
1767ppc_elf_final_write_processing (bfd *abfd)
06f44071 1768{
cc364be6
AM
1769 ppc_final_write_processing (abfd);
1770 return _bfd_elf_final_write_processing (abfd);
06f44071 1771}
25dbc73a 1772\f
7382d32a 1773static bfd_boolean
c6dd29ce 1774is_nonpic_glink_stub (bfd *abfd, asection *glink, bfd_vma off)
7382d32a 1775{
407aa07c 1776 bfd_byte buf[4 * 4];
7382d32a 1777
9e390558 1778 if (!bfd_get_section_contents (abfd, glink, buf, off, sizeof buf))
7382d32a
AM
1779 return FALSE;
1780
c6dd29ce
AM
1781 return ((bfd_get_32 (abfd, buf + 0) & 0xffff0000) == LIS_11
1782 && (bfd_get_32 (abfd, buf + 4) & 0xffff0000) == LWZ_11_11
407aa07c
AM
1783 && bfd_get_32 (abfd, buf + 8) == MTCTR_11
1784 && bfd_get_32 (abfd, buf + 12) == BCTR);
7382d32a
AM
1785}
1786
468392fb
AM
1787static bfd_boolean
1788section_covers_vma (bfd *abfd ATTRIBUTE_UNUSED, asection *section, void *ptr)
1789{
1790 bfd_vma vma = *(bfd_vma *) ptr;
1791 return ((section->flags & SEC_ALLOC) != 0
1792 && section->vma <= vma
1793 && vma < section->vma + section->size);
1794}
1795
1796static long
1797ppc_elf_get_synthetic_symtab (bfd *abfd, long symcount, asymbol **syms,
1798 long dynsymcount, asymbol **dynsyms,
1799 asymbol **ret)
1800{
1801 bfd_boolean (*slurp_relocs) (bfd *, asection *, asymbol **, bfd_boolean);
1802 asection *plt, *relplt, *dynamic, *glink;
1803 bfd_vma glink_vma = 0;
1804 bfd_vma resolv_vma = 0;
9e390558 1805 bfd_vma stub_off;
468392fb
AM
1806 asymbol *s;
1807 arelent *p;
9ad9b810 1808 size_t count, i, stub_delta;
468392fb
AM
1809 size_t size;
1810 char *names;
1811 bfd_byte buf[4];
1812
1813 *ret = NULL;
1814
1815 if ((abfd->flags & (DYNAMIC | EXEC_P)) == 0)
1816 return 0;
1817
1818 if (dynsymcount <= 0)
1819 return 0;
1820
1821 relplt = bfd_get_section_by_name (abfd, ".rela.plt");
1822 if (relplt == NULL)
1823 return 0;
1824
1825 plt = bfd_get_section_by_name (abfd, ".plt");
1826 if (plt == NULL)
1827 return 0;
1828
1829 /* Call common code to handle old-style executable PLTs. */
1830 if (elf_section_flags (plt) & SHF_EXECINSTR)
1831 return _bfd_elf_get_synthetic_symtab (abfd, symcount, syms,
1832 dynsymcount, dynsyms, ret);
1833
1834 /* If this object was prelinked, the prelinker stored the address
1835 of .glink at got[1]. If it wasn't prelinked, got[1] will be zero. */
1836 dynamic = bfd_get_section_by_name (abfd, ".dynamic");
1837 if (dynamic != NULL)
1838 {
1839 bfd_byte *dynbuf, *extdyn, *extdynend;
1840 size_t extdynsize;
1841 void (*swap_dyn_in) (bfd *, const void *, Elf_Internal_Dyn *);
1842
1843 if (!bfd_malloc_and_get_section (abfd, dynamic, &dynbuf))
1844 return -1;
1845
1846 extdynsize = get_elf_backend_data (abfd)->s->sizeof_dyn;
1847 swap_dyn_in = get_elf_backend_data (abfd)->s->swap_dyn_in;
1848
1849 extdyn = dynbuf;
1850 extdynend = extdyn + dynamic->size;
1851 for (; extdyn < extdynend; extdyn += extdynsize)
1852 {
1853 Elf_Internal_Dyn dyn;
1854 (*swap_dyn_in) (abfd, extdyn, &dyn);
1855
1856 if (dyn.d_tag == DT_NULL)
1857 break;
1858
1859 if (dyn.d_tag == DT_PPC_GOT)
1860 {
1861 unsigned int g_o_t = dyn.d_un.d_val;
1862 asection *got = bfd_get_section_by_name (abfd, ".got");
1863 if (got != NULL
1864 && bfd_get_section_contents (abfd, got, buf,
1865 g_o_t - got->vma + 4, 4))
1866 glink_vma = bfd_get_32 (abfd, buf);
1867 break;
1868 }
1869 }
1870 free (dynbuf);
1871 }
1872
1873 /* Otherwise we read the first plt entry. */
1874 if (glink_vma == 0)
1875 {
1876 if (bfd_get_section_contents (abfd, plt, buf, 0, 4))
1877 glink_vma = bfd_get_32 (abfd, buf);
1878 }
1879
1880 if (glink_vma == 0)
1881 return 0;
1882
1883 /* The .glink section usually does not survive the final
1884 link; search for the section (usually .text) where the
1885 glink stubs now reside. */
1886 glink = bfd_sections_find_if (abfd, section_covers_vma, &glink_vma);
1887 if (glink == NULL)
1888 return 0;
1889
1890 /* Determine glink PLT resolver by reading the relative branch
1891 from the first glink stub. */
1892 if (bfd_get_section_contents (abfd, glink, buf,
1893 glink_vma - glink->vma, 4))
1894 {
1895 unsigned int insn = bfd_get_32 (abfd, buf);
1896
1897 /* The first glink stub may either branch to the resolver ... */
1898 insn ^= B;
1899 if ((insn & ~0x3fffffc) == 0)
1900 resolv_vma = glink_vma + (insn ^ 0x2000000) - 0x2000000;
1901
1902 /* ... or fall through a bunch of NOPs. */
1903 else if ((insn ^ B ^ NOP) == 0)
1904 for (i = 4;
1905 bfd_get_section_contents (abfd, glink, buf,
1906 glink_vma - glink->vma + i, 4);
1907 i += 4)
1908 if (bfd_get_32 (abfd, buf) != NOP)
1909 {
1910 resolv_vma = glink_vma + i;
1911 break;
1912 }
1913 }
1914
7382d32a 1915 count = relplt->size / sizeof (Elf32_External_Rela);
7382d32a
AM
1916 /* If the stubs are those for -shared/-pie then we might have
1917 multiple stubs for each plt entry. If that is the case then
1918 there is no way to associate stubs with their plt entries short
9e390558
AM
1919 of figuring out the GOT pointer value used in the stub.
1920 The offsets tested here need to cover all possible values of
1921 GLINK_ENTRY_SIZE for other than __tls_get_addr_opt. */
1922 stub_off = glink_vma - glink->vma;
1923 for (stub_delta = 16; stub_delta <= 32; stub_delta += 8)
1924 if (is_nonpic_glink_stub (abfd, glink, stub_off - stub_delta))
1925 break;
1926 if (stub_delta > 32)
7382d32a
AM
1927 return 0;
1928
468392fb
AM
1929 slurp_relocs = get_elf_backend_data (abfd)->s->slurp_reloc_table;
1930 if (! (*slurp_relocs) (abfd, relplt, dynsyms, TRUE))
1931 return -1;
1932
468392fb
AM
1933 size = count * sizeof (asymbol);
1934 p = relplt->relocation;
1935 for (i = 0; i < count; i++, p++)
e054468f
AM
1936 {
1937 size += strlen ((*p->sym_ptr_ptr)->name) + sizeof ("@plt");
1938 if (p->addend != 0)
1939 size += sizeof ("+0x") - 1 + 8;
1940 }
468392fb
AM
1941
1942 size += sizeof (asymbol) + sizeof ("__glink");
1943
1944 if (resolv_vma)
1945 size += sizeof (asymbol) + sizeof ("__glink_PLTresolve");
1946
1947 s = *ret = bfd_malloc (size);
1948 if (s == NULL)
1949 return -1;
1950
9e390558 1951 stub_off = glink_vma - glink->vma;
468392fb 1952 names = (char *) (s + count + 1 + (resolv_vma != 0));
1079403c
AM
1953 p = relplt->relocation + count - 1;
1954 for (i = 0; i < count; i++)
468392fb
AM
1955 {
1956 size_t len;
1957
9e390558
AM
1958 stub_off -= stub_delta;
1959 if (strcmp ((*p->sym_ptr_ptr)->name, "__tls_get_addr_opt") == 0)
1960 stub_off -= 32;
468392fb
AM
1961 *s = **p->sym_ptr_ptr;
1962 /* Undefined syms won't have BSF_LOCAL or BSF_GLOBAL set. Since
1963 we are defining a symbol, ensure one of them is set. */
1964 if ((s->flags & BSF_LOCAL) == 0)
1965 s->flags |= BSF_GLOBAL;
6ba2a415 1966 s->flags |= BSF_SYNTHETIC;
468392fb 1967 s->section = glink;
9e390558 1968 s->value = stub_off;
468392fb
AM
1969 s->name = names;
1970 s->udata.p = NULL;
1971 len = strlen ((*p->sym_ptr_ptr)->name);
1972 memcpy (names, (*p->sym_ptr_ptr)->name, len);
1973 names += len;
e054468f
AM
1974 if (p->addend != 0)
1975 {
1976 memcpy (names, "+0x", sizeof ("+0x") - 1);
1977 names += sizeof ("+0x") - 1;
1978 bfd_sprintf_vma (abfd, names, p->addend);
1979 names += strlen (names);
1980 }
468392fb
AM
1981 memcpy (names, "@plt", sizeof ("@plt"));
1982 names += sizeof ("@plt");
1983 ++s;
1079403c 1984 --p;
468392fb
AM
1985 }
1986
1987 /* Add a symbol at the start of the glink branch table. */
86a4952b 1988 memset (s, 0, sizeof *s);
468392fb 1989 s->the_bfd = abfd;
6ba2a415 1990 s->flags = BSF_GLOBAL | BSF_SYNTHETIC;
468392fb
AM
1991 s->section = glink;
1992 s->value = glink_vma - glink->vma;
1993 s->name = names;
1994 memcpy (names, "__glink", sizeof ("__glink"));
1995 names += sizeof ("__glink");
1996 s++;
1997 count++;
1998
1999 if (resolv_vma)
2000 {
2001 /* Add a symbol for the glink PLT resolver. */
86a4952b 2002 memset (s, 0, sizeof *s);
468392fb 2003 s->the_bfd = abfd;
6ba2a415 2004 s->flags = BSF_GLOBAL | BSF_SYNTHETIC;
468392fb
AM
2005 s->section = glink;
2006 s->value = resolv_vma - glink->vma;
2007 s->name = names;
2008 memcpy (names, "__glink_PLTresolve", sizeof ("__glink_PLTresolve"));
2009 names += sizeof ("__glink_PLTresolve");
2010 s++;
2011 count++;
2012 }
2013
2014 return count;
2015}
2016\f
25dbc73a
AM
2017/* The following functions are specific to the ELF linker, while
2018 functions above are used generally. They appear in this file more
2019 or less in the order in which they are called. eg.
2020 ppc_elf_check_relocs is called early in the link process,
2021 ppc_elf_finish_dynamic_sections is one of the last functions
2022 called. */
252b5132 2023
a6aa5195 2024/* Track PLT entries needed for a given symbol. We might need more
a877a2b6 2025 than one glink entry per symbol when generating a pic binary. */
a6aa5195
AM
2026struct plt_entry
2027{
2028 struct plt_entry *next;
2029
2030 /* -fPIC uses multiple GOT sections, one per file, called ".got2".
2031 This field stores the offset into .got2 used to initialise the
a877a2b6
AM
2032 GOT pointer reg. It will always be at least 32768. (Current
2033 gcc always uses an offset of 32768, but ld -r will pack .got2
2034 sections together resulting in larger offsets). */
a6aa5195
AM
2035 bfd_vma addend;
2036
2037 /* The .got2 section. */
2038 asection *sec;
2039
2040 /* PLT refcount or offset. */
2041 union
2042 {
2043 bfd_signed_vma refcount;
2044 bfd_vma offset;
2045 } plt;
2046
2047 /* .glink stub offset. */
2048 bfd_vma glink_offset;
2049};
2050
7c8bbca5
AM
2051/* Of those relocs that might be copied as dynamic relocs, this
2052 function selects those that must be copied when linking a shared
2053 library or PIE, even when the symbol is local. */
252b5132 2054
1d483afe
AM
2055static int
2056must_be_dyn_reloc (struct bfd_link_info *info,
2057 enum elf_ppc_reloc_type r_type)
2058{
2059 switch (r_type)
2060 {
2061 default:
7c8bbca5
AM
2062 /* Only relative relocs can be resolved when the object load
2063 address isn't fixed. DTPREL32 is excluded because the
2064 dynamic linker needs to differentiate global dynamic from
2065 local dynamic __tls_index pairs when PPC_OPT_TLS is set. */
1d483afe
AM
2066 return 1;
2067
2068 case R_PPC_REL24:
2069 case R_PPC_REL14:
2070 case R_PPC_REL14_BRTAKEN:
2071 case R_PPC_REL14_BRNTAKEN:
2072 case R_PPC_REL32:
2073 return 0;
2074
2075 case R_PPC_TPREL32:
2076 case R_PPC_TPREL16:
2077 case R_PPC_TPREL16_LO:
2078 case R_PPC_TPREL16_HI:
2079 case R_PPC_TPREL16_HA:
7c8bbca5
AM
2080 /* These relocations are relative but in a shared library the
2081 linker doesn't know the thread pointer base. */
2082 return bfd_link_dll (info);
1d483afe
AM
2083 }
2084}
252b5132 2085
25dbc73a
AM
2086/* If ELIMINATE_COPY_RELOCS is non-zero, the linker will try to avoid
2087 copying dynamic variables from a shared lib into an app's dynbss
2088 section, and instead use a dynamic relocation to point into the
2089 shared lib. */
2090#define ELIMINATE_COPY_RELOCS 1
252b5132 2091
f95f8542
AM
2092/* Used to track dynamic relocations for local symbols. */
2093struct ppc_dyn_relocs
2094{
2095 struct ppc_dyn_relocs *next;
2096
2097 /* The input section of the reloc. */
2098 asection *sec;
2099
2100 /* Total number of relocs copied for the input section. */
2101 unsigned int count : 31;
2102
2103 /* Whether this entry is for STT_GNU_IFUNC symbols. */
2104 unsigned int ifunc : 1;
2105};
2106
25dbc73a 2107/* PPC ELF linker hash entry. */
252b5132 2108
25dbc73a
AM
2109struct ppc_elf_link_hash_entry
2110{
2111 struct elf_link_hash_entry elf;
252b5132 2112
25dbc73a
AM
2113 /* If this symbol is used in the linker created sections, the processor
2114 specific backend uses this field to map the field into the offset
2115 from the beginning of the section. */
2116 elf_linker_section_pointers_t *linker_section_pointer;
252b5132 2117
37da22e5
AM
2118 /* Contexts in which symbol is used in the GOT.
2119 Bits are or'd into the mask as the corresponding relocs are
2120 encountered during check_relocs, with TLS_TLS being set when any
2121 of the other TLS bits are set. tls_optimize clears bits when
2122 optimizing to indicate the corresponding GOT entry type is not
2123 needed. If set, TLS_TLS is never cleared. tls_optimize may also
b00a0a86 2124 set TLS_GDIE when a GD reloc turns into an IE one.
37da22e5
AM
2125 These flags are also kept for local symbols. */
2126#define TLS_TLS 1 /* Any TLS reloc. */
2127#define TLS_GD 2 /* GD reloc. */
2128#define TLS_LD 4 /* LD reloc. */
2129#define TLS_TPREL 8 /* TPREL reloc, => IE. */
2130#define TLS_DTPREL 16 /* DTPREL reloc, => LD. */
2131#define TLS_MARK 32 /* __tls_get_addr call marked. */
b00a0a86 2132#define TLS_GDIE 64 /* GOT TPREL reloc resulting from GD->IE. */
bac3c8c5 2133 unsigned char tls_mask;
4dc4a9a5 2134
37da22e5
AM
2135 /* The above field is also used to mark function symbols. In which
2136 case TLS_TLS will be 0. */
2137#define PLT_IFUNC 2 /* STT_GNU_IFUNC. */
2d7ad24e 2138#define PLT_KEEP 4 /* inline plt call requires plt entry. */
37da22e5
AM
2139#define NON_GOT 256 /* local symbol plt, not stored. */
2140
4dc4a9a5
DJ
2141 /* Nonzero if we have seen a small data relocation referring to this
2142 symbol. */
d3e454b9
AM
2143 unsigned char has_sda_refs : 1;
2144
2145 /* Flag use of given relocations. */
2146 unsigned char has_addr16_ha : 1;
2147 unsigned char has_addr16_lo : 1;
25dbc73a 2148};
252b5132 2149
25dbc73a
AM
2150#define ppc_elf_hash_entry(ent) ((struct ppc_elf_link_hash_entry *) (ent))
2151
2152/* PPC ELF linker hash table. */
2153
2154struct ppc_elf_link_hash_table
2155{
2156 struct elf_link_hash_table elf;
2157
5446cbdf
AM
2158 /* Various options passed from the linker. */
2159 struct ppc_elf_params *params;
2160
25dbc73a 2161 /* Short-cuts to get to dynamic linker sections. */
d7128ce4 2162 asection *glink;
25dbc73a
AM
2163 asection *dynsbss;
2164 asection *relsbss;
c9a2f333 2165 elf_linker_section_t sdata[2];
25dbc73a 2166 asection *sbss;
6177242a 2167 asection *glink_eh_frame;
2d7ad24e
AM
2168 asection *pltlocal;
2169 asection *relpltlocal;
25dbc73a 2170
016687f8
AM
2171 /* The (unloaded but important) .rela.plt.unloaded on VxWorks. */
2172 asection *srelplt2;
2173
1d483afe 2174 /* Shortcut to __tls_get_addr. */
25dbc73a 2175 struct elf_link_hash_entry *tls_get_addr;
252b5132 2176
016687f8
AM
2177 /* The bfd that forced an old-style PLT. */
2178 bfd *old_bfd;
5b914448 2179
25dbc73a
AM
2180 /* TLS local dynamic got entry handling. */
2181 union {
2182 bfd_signed_vma refcount;
2183 bfd_vma offset;
2184 } tlsld_got;
252b5132 2185
c6dd29ce 2186 /* Offset of branch table to PltResolve function in glink. */
d7128ce4
AM
2187 bfd_vma glink_pltresolve;
2188
3b36f7e6
AM
2189 /* Size of reserved GOT entries. */
2190 unsigned int got_header_size;
2191 /* Non-zero if allocating the header left a gap. */
2192 unsigned int got_gap;
2193
4a3dc543
RS
2194 /* The type of PLT we have chosen to use. */
2195 enum ppc_elf_plt_type plt_type;
2196
82e66161
AM
2197 /* Whether there exist local gnu indirect function resolvers,
2198 referenced by dynamic relocations. */
2199 unsigned int local_ifunc_resolver:1;
2200 unsigned int maybe_local_ifunc_resolver:1;
2201
9a23f96e
AM
2202 /* Set if tls optimization is enabled. */
2203 unsigned int do_tls_opt:1;
2204
3e04d765
AM
2205 /* Set if inline plt calls should be converted to direct calls. */
2206 unsigned int can_convert_all_inline_plt:1;
2207
9d8504b1
PB
2208 /* The size of PLT entries. */
2209 int plt_entry_size;
2210 /* The distance between adjacent PLT slots. */
2211 int plt_slot_size;
2212 /* The size of the first PLT entry. */
2213 int plt_initial_entry_size;
25dbc73a 2214};
252b5132 2215
94caa966
AM
2216/* Rename some of the generic section flags to better document how they
2217 are used for ppc32. The flags are only valid for ppc32 elf objects. */
2218
2219/* Nonzero if this section has TLS related relocations. */
2220#define has_tls_reloc sec_flg0
2221
9737e8af
AM
2222/* Nonzero if this section has a call to __tls_get_addr lacking marker
2223 relocs. */
2224#define nomark_tls_get_addr sec_flg1
94caa966 2225
3e04d765
AM
2226 /* Flag set when PLTCALL relocs are detected. */
2227#define has_pltcall sec_flg2
2228
25dbc73a 2229/* Get the PPC ELF linker hash table from a link_info structure. */
252b5132 2230
25dbc73a 2231#define ppc_elf_hash_table(p) \
a8d549c0
AM
2232 ((is_elf_hash_table ((p)->hash) \
2233 && elf_hash_table_id (elf_hash_table (p)) == PPC32_ELF_DATA) \
2234 ? (struct ppc_elf_link_hash_table *) (p)->hash : NULL)
252b5132 2235
25dbc73a 2236/* Create an entry in a PPC ELF linker hash table. */
252b5132 2237
25dbc73a
AM
2238static struct bfd_hash_entry *
2239ppc_elf_link_hash_newfunc (struct bfd_hash_entry *entry,
2240 struct bfd_hash_table *table,
2241 const char *string)
252b5132 2242{
25dbc73a
AM
2243 /* Allocate the structure if it has not already been allocated by a
2244 subclass. */
2245 if (entry == NULL)
2246 {
2247 entry = bfd_hash_allocate (table,
2248 sizeof (struct ppc_elf_link_hash_entry));
2249 if (entry == NULL)
2250 return entry;
2251 }
252b5132 2252
25dbc73a
AM
2253 /* Call the allocation method of the superclass. */
2254 entry = _bfd_elf_link_hash_newfunc (entry, table, string);
2255 if (entry != NULL)
2256 {
2257 ppc_elf_hash_entry (entry)->linker_section_pointer = NULL;
25dbc73a 2258 ppc_elf_hash_entry (entry)->tls_mask = 0;
5240d94d 2259 ppc_elf_hash_entry (entry)->has_sda_refs = 0;
25dbc73a 2260 }
252b5132 2261
25dbc73a 2262 return entry;
252b5132 2263}
3dab13f6 2264
25dbc73a 2265/* Create a PPC ELF linker hash table. */
3dab13f6 2266
25dbc73a
AM
2267static struct bfd_link_hash_table *
2268ppc_elf_link_hash_table_create (bfd *abfd)
3dab13f6 2269{
25dbc73a 2270 struct ppc_elf_link_hash_table *ret;
76e7a751 2271 static struct ppc_elf_params default_params
407aa07c 2272 = { PLT_OLD, 0, 0, 1, 0, 0, 12, 0, 0, 0 };
3dab13f6 2273
25dbc73a
AM
2274 ret = bfd_zmalloc (sizeof (struct ppc_elf_link_hash_table));
2275 if (ret == NULL)
2276 return NULL;
3dab13f6 2277
66eb6687
AM
2278 if (!_bfd_elf_link_hash_table_init (&ret->elf, abfd,
2279 ppc_elf_link_hash_newfunc,
4dfe6ac6
NC
2280 sizeof (struct ppc_elf_link_hash_entry),
2281 PPC32_ELF_DATA))
3dab13f6 2282 {
25dbc73a
AM
2283 free (ret);
2284 return NULL;
2285 }
58111eb7 2286
a6aa5195
AM
2287 ret->elf.init_plt_refcount.refcount = 0;
2288 ret->elf.init_plt_refcount.glist = NULL;
2289 ret->elf.init_plt_offset.offset = 0;
2290 ret->elf.init_plt_offset.glist = NULL;
2291
db434ba0
AM
2292 ret->params = &default_params;
2293
c9a2f333
AM
2294 ret->sdata[0].name = ".sdata";
2295 ret->sdata[0].sym_name = "_SDA_BASE_";
2296 ret->sdata[0].bss_name = ".sbss";
2297
2298 ret->sdata[1].name = ".sdata2";
2299 ret->sdata[1].sym_name = "_SDA2_BASE_";
2300 ret->sdata[1].bss_name = ".sbss2";
2301
9d8504b1
PB
2302 ret->plt_entry_size = 12;
2303 ret->plt_slot_size = 8;
2304 ret->plt_initial_entry_size = 72;
9d8504b1 2305
25dbc73a
AM
2306 return &ret->elf.root;
2307}
3dab13f6 2308
5446cbdf
AM
2309/* Hook linker params into hash table. */
2310
2311void
2312ppc_elf_link_params (struct bfd_link_info *info, struct ppc_elf_params *params)
2313{
2314 struct ppc_elf_link_hash_table *htab = ppc_elf_hash_table (info);
2315
2316 if (htab)
2317 htab->params = params;
76e7a751 2318 params->pagesize_p2 = bfd_log2 (params->pagesize);
5446cbdf
AM
2319}
2320
9d8504b1 2321/* Create .got and the related sections. */
3dab13f6 2322
25dbc73a
AM
2323static bfd_boolean
2324ppc_elf_create_got (bfd *abfd, struct bfd_link_info *info)
2325{
2326 struct ppc_elf_link_hash_table *htab;
3dab13f6 2327
25dbc73a
AM
2328 if (!_bfd_elf_create_got_section (abfd, info))
2329 return FALSE;
3dab13f6 2330
25dbc73a 2331 htab = ppc_elf_hash_table (info);
90c14f0c 2332 if (htab->elf.target_os != is_vxworks)
9d8504b1
PB
2333 {
2334 /* The powerpc .got has a blrl instruction in it. Mark it
2335 executable. */
ce558b89
AM
2336 flagword flags = (SEC_ALLOC | SEC_LOAD | SEC_CODE | SEC_HAS_CONTENTS
2337 | SEC_IN_MEMORY | SEC_LINKER_CREATED);
fd361982 2338 if (!bfd_set_section_flags (htab->elf.sgot, flags))
9d8504b1
PB
2339 return FALSE;
2340 }
3dab13f6 2341
25dbc73a
AM
2342 return TRUE;
2343}
3dab13f6 2344
93d1b056
AM
2345/* Create a special linker section, used for R_PPC_EMB_SDAI16 and
2346 R_PPC_EMB_SDA2I16 pointers. These sections become part of .sdata
2347 and .sdata2. Create _SDA_BASE_ and _SDA2_BASE too. */
2348
2349static bfd_boolean
2350ppc_elf_create_linker_section (bfd *abfd,
2351 struct bfd_link_info *info,
2352 flagword flags,
2353 elf_linker_section_t *lsect)
2354{
2355 asection *s;
2356
2357 flags |= (SEC_ALLOC | SEC_LOAD | SEC_HAS_CONTENTS | SEC_IN_MEMORY
2358 | SEC_LINKER_CREATED);
2359
2360 s = bfd_make_section_anyway_with_flags (abfd, lsect->name, flags);
2361 if (s == NULL)
2362 return FALSE;
2363 lsect->section = s;
2364
2365 /* Define the sym on the first section of this name. */
2366 s = bfd_get_section_by_name (abfd, lsect->name);
2367
2368 lsect->sym = _bfd_elf_define_linkage_sym (abfd, info, s, lsect->sym_name);
2369 if (lsect->sym == NULL)
2370 return FALSE;
2371 lsect->sym->root.u.def.value = 0x8000;
2372 return TRUE;
2373}
2374
e054468f
AM
2375static bfd_boolean
2376ppc_elf_create_glink (bfd *abfd, struct bfd_link_info *info)
2377{
2378 struct ppc_elf_link_hash_table *htab = ppc_elf_hash_table (info);
2379 asection *s;
2380 flagword flags;
691d2e9a 2381 int p2align;
e054468f
AM
2382
2383 flags = (SEC_ALLOC | SEC_LOAD | SEC_CODE | SEC_READONLY | SEC_HAS_CONTENTS
2384 | SEC_IN_MEMORY | SEC_LINKER_CREATED);
2385 s = bfd_make_section_anyway_with_flags (abfd, ".glink", flags);
2386 htab->glink = s;
691d2e9a
AM
2387 p2align = htab->params->ppc476_workaround ? 6 : 4;
2388 if (p2align < htab->params->plt_stub_align)
2389 p2align = htab->params->plt_stub_align;
e054468f 2390 if (s == NULL
fd361982 2391 || !bfd_set_section_alignment (s, p2align))
e054468f
AM
2392 return FALSE;
2393
6177242a
AM
2394 if (!info->no_ld_generated_unwind_info)
2395 {
2396 flags = (SEC_ALLOC | SEC_LOAD | SEC_READONLY | SEC_HAS_CONTENTS
2397 | SEC_IN_MEMORY | SEC_LINKER_CREATED);
2398 s = bfd_make_section_anyway_with_flags (abfd, ".eh_frame", flags);
2399 htab->glink_eh_frame = s;
2400 if (s == NULL
fd361982 2401 || !bfd_set_section_alignment (s, 2))
6177242a
AM
2402 return FALSE;
2403 }
2404
e054468f
AM
2405 flags = SEC_ALLOC | SEC_LINKER_CREATED;
2406 s = bfd_make_section_anyway_with_flags (abfd, ".iplt", flags);
ce558b89 2407 htab->elf.iplt = s;
e054468f 2408 if (s == NULL
fd361982 2409 || !bfd_set_section_alignment (s, 4))
e054468f
AM
2410 return FALSE;
2411
2412 flags = (SEC_ALLOC | SEC_LOAD | SEC_READONLY | SEC_HAS_CONTENTS
2413 | SEC_IN_MEMORY | SEC_LINKER_CREATED);
14b2f831 2414 s = bfd_make_section_anyway_with_flags (abfd, ".rela.iplt", flags);
ce558b89 2415 htab->elf.irelplt = s;
e054468f 2416 if (s == NULL
fd361982 2417 || ! bfd_set_section_alignment (s, 2))
e054468f 2418 return FALSE;
93d1b056 2419
2d7ad24e
AM
2420 /* Local plt entries. */
2421 flags = (SEC_ALLOC | SEC_LOAD
2422 | SEC_HAS_CONTENTS | SEC_IN_MEMORY | SEC_LINKER_CREATED);
2423 htab->pltlocal = bfd_make_section_anyway_with_flags (abfd, ".branch_lt",
2424 flags);
2425 if (htab->pltlocal == NULL
fd361982 2426 || !bfd_set_section_alignment (htab->pltlocal, 2))
2d7ad24e
AM
2427 return FALSE;
2428
2429 if (bfd_link_pic (info))
2430 {
2431 flags = (SEC_ALLOC | SEC_LOAD | SEC_READONLY
2432 | SEC_HAS_CONTENTS | SEC_IN_MEMORY | SEC_LINKER_CREATED);
2433 htab->relpltlocal
2434 = bfd_make_section_anyway_with_flags (abfd, ".rela.branch_lt", flags);
2435 if (htab->relpltlocal == NULL
fd361982 2436 || !bfd_set_section_alignment (htab->relpltlocal, 2))
2d7ad24e
AM
2437 return FALSE;
2438 }
2439
93d1b056
AM
2440 if (!ppc_elf_create_linker_section (abfd, info, 0,
2441 &htab->sdata[0]))
2442 return FALSE;
2443
2444 if (!ppc_elf_create_linker_section (abfd, info, SEC_READONLY,
2445 &htab->sdata[1]))
2446 return FALSE;
2447
e054468f
AM
2448 return TRUE;
2449}
2450
25dbc73a
AM
2451/* We have to create .dynsbss and .rela.sbss here so that they get mapped
2452 to output sections (just like _bfd_elf_create_dynamic_sections has
2453 to create .dynbss and .rela.bss). */
3dab13f6 2454
25dbc73a
AM
2455static bfd_boolean
2456ppc_elf_create_dynamic_sections (bfd *abfd, struct bfd_link_info *info)
2457{
2458 struct ppc_elf_link_hash_table *htab;
2459 asection *s;
2460 flagword flags;
3dab13f6 2461
25dbc73a 2462 htab = ppc_elf_hash_table (info);
3dab13f6 2463
ce558b89 2464 if (htab->elf.sgot == NULL
25dbc73a 2465 && !ppc_elf_create_got (abfd, info))
3dab13f6
AM
2466 return FALSE;
2467
25dbc73a
AM
2468 if (!_bfd_elf_create_dynamic_sections (abfd, info))
2469 return FALSE;
3dab13f6 2470
e054468f
AM
2471 if (htab->glink == NULL
2472 && !ppc_elf_create_glink (abfd, info))
d7128ce4 2473 return FALSE;
3dab13f6 2474
14b2f831
AM
2475 s = bfd_make_section_anyway_with_flags (abfd, ".dynsbss",
2476 SEC_ALLOC | SEC_LINKER_CREATED);
3b36f7e6 2477 htab->dynsbss = s;
3496cb2a 2478 if (s == NULL)
25dbc73a 2479 return FALSE;
3dab13f6 2480
0e1862bb 2481 if (! bfd_link_pic (info))
25dbc73a 2482 {
e054468f
AM
2483 flags = (SEC_ALLOC | SEC_LOAD | SEC_READONLY | SEC_HAS_CONTENTS
2484 | SEC_IN_MEMORY | SEC_LINKER_CREATED);
14b2f831 2485 s = bfd_make_section_anyway_with_flags (abfd, ".rela.sbss", flags);
3b36f7e6 2486 htab->relsbss = s;
25dbc73a 2487 if (s == NULL
fd361982 2488 || !bfd_set_section_alignment (s, 2))
25dbc73a
AM
2489 return FALSE;
2490 }
3dab13f6 2491
90c14f0c 2492 if (htab->elf.target_os == is_vxworks
711de32c
RS
2493 && !elf_vxworks_create_dynamic_sections (abfd, info, &htab->srelplt2))
2494 return FALSE;
9d8504b1 2495
ce558b89 2496 s = htab->elf.splt;
3b36f7e6 2497 flags = SEC_ALLOC | SEC_CODE | SEC_LINKER_CREATED;
4a3dc543
RS
2498 if (htab->plt_type == PLT_VXWORKS)
2499 /* The VxWorks PLT is a loaded section with contents. */
2500 flags |= SEC_HAS_CONTENTS | SEC_LOAD | SEC_READONLY;
fd361982 2501 return bfd_set_section_flags (s, flags);
25dbc73a 2502}
3dab13f6 2503
25dbc73a 2504/* Copy the extra info we tack onto an elf_link_hash_entry. */
58111eb7 2505
25dbc73a 2506static void
fcfa13d2 2507ppc_elf_copy_indirect_symbol (struct bfd_link_info *info,
25dbc73a
AM
2508 struct elf_link_hash_entry *dir,
2509 struct elf_link_hash_entry *ind)
2510{
2511 struct ppc_elf_link_hash_entry *edir, *eind;
3dab13f6 2512
25dbc73a
AM
2513 edir = (struct ppc_elf_link_hash_entry *) dir;
2514 eind = (struct ppc_elf_link_hash_entry *) ind;
3dab13f6 2515
c79d6685
AM
2516 edir->tls_mask |= eind->tls_mask;
2517 edir->has_sda_refs |= eind->has_sda_refs;
2518
e81830c5
AM
2519 if (edir->elf.versioned != versioned_hidden)
2520 edir->elf.ref_dynamic |= eind->elf.ref_dynamic;
c79d6685
AM
2521 edir->elf.ref_regular |= eind->elf.ref_regular;
2522 edir->elf.ref_regular_nonweak |= eind->elf.ref_regular_nonweak;
4a7e5234 2523 edir->elf.non_got_ref |= eind->elf.non_got_ref;
c79d6685
AM
2524 edir->elf.needs_plt |= eind->elf.needs_plt;
2525 edir->elf.pointer_equality_needed |= eind->elf.pointer_equality_needed;
2526
287c7eaf
AM
2527 /* If we were called to copy over info for a weak sym, that's all. */
2528 if (eind->elf.root.type != bfd_link_hash_indirect)
2529 return;
2530
190eb1dd 2531 if (ind->dyn_relocs != NULL)
25dbc73a 2532 {
190eb1dd 2533 if (dir->dyn_relocs != NULL)
3dab13f6 2534 {
6061a67d
AM
2535 struct elf_dyn_relocs **pp;
2536 struct elf_dyn_relocs *p;
3dab13f6 2537
fcfa13d2 2538 /* Add reloc counts against the indirect sym to the direct sym
25dbc73a 2539 list. Merge any entries against the same section. */
190eb1dd 2540 for (pp = &ind->dyn_relocs; (p = *pp) != NULL; )
3dab13f6 2541 {
6061a67d 2542 struct elf_dyn_relocs *q;
25dbc73a 2543
190eb1dd 2544 for (q = dir->dyn_relocs; q != NULL; q = q->next)
25dbc73a
AM
2545 if (q->sec == p->sec)
2546 {
2547 q->pc_count += p->pc_count;
2548 q->count += p->count;
2549 *pp = p->next;
2550 break;
2551 }
2552 if (q == NULL)
2553 pp = &p->next;
3dab13f6 2554 }
190eb1dd 2555 *pp = dir->dyn_relocs;
3dab13f6 2556 }
25dbc73a 2557
190eb1dd
L
2558 dir->dyn_relocs = ind->dyn_relocs;
2559 ind->dyn_relocs = NULL;
3dab13f6 2560 }
3dab13f6 2561
a6aa5195
AM
2562 /* Copy over the GOT refcount entries that we may have already seen to
2563 the symbol which just became indirect. */
fcfa13d2
AM
2564 edir->elf.got.refcount += eind->elf.got.refcount;
2565 eind->elf.got.refcount = 0;
a6aa5195
AM
2566
2567 /* And plt entries. */
2568 if (eind->elf.plt.plist != NULL)
2569 {
2570 if (edir->elf.plt.plist != NULL)
2571 {
2572 struct plt_entry **entp;
2573 struct plt_entry *ent;
2574
2575 for (entp = &eind->elf.plt.plist; (ent = *entp) != NULL; )
2576 {
2577 struct plt_entry *dent;
2578
2579 for (dent = edir->elf.plt.plist; dent != NULL; dent = dent->next)
2580 if (dent->sec == ent->sec && dent->addend == ent->addend)
2581 {
2582 dent->plt.refcount += ent->plt.refcount;
2583 *entp = ent->next;
2584 break;
2585 }
2586 if (dent == NULL)
2587 entp = &ent->next;
2588 }
2589 *entp = edir->elf.plt.plist;
2590 }
2591
2592 edir->elf.plt.plist = eind->elf.plt.plist;
2593 eind->elf.plt.plist = NULL;
2594 }
2595
fcfa13d2 2596 if (eind->elf.dynindx != -1)
25dbc73a 2597 {
fcfa13d2
AM
2598 if (edir->elf.dynindx != -1)
2599 _bfd_elf_strtab_delref (elf_hash_table (info)->dynstr,
2600 edir->elf.dynstr_index);
a6aa5195
AM
2601 edir->elf.dynindx = eind->elf.dynindx;
2602 edir->elf.dynstr_index = eind->elf.dynstr_index;
2603 eind->elf.dynindx = -1;
2604 eind->elf.dynstr_index = 0;
25dbc73a 2605 }
25dbc73a 2606}
3dab13f6 2607
25dbc73a
AM
2608/* Hook called by the linker routine which adds symbols from an object
2609 file. We use it to put .comm items in .sbss, and not .bss. */
58111eb7 2610
25dbc73a
AM
2611static bfd_boolean
2612ppc_elf_add_symbol_hook (bfd *abfd,
2613 struct bfd_link_info *info,
2614 Elf_Internal_Sym *sym,
2615 const char **namep ATTRIBUTE_UNUSED,
2616 flagword *flagsp ATTRIBUTE_UNUSED,
2617 asection **secp,
2618 bfd_vma *valp)
2619{
2620 if (sym->st_shndx == SHN_COMMON
0e1862bb 2621 && !bfd_link_relocatable (info)
0c8d6e5c
AM
2622 && is_ppc_elf (info->output_bfd)
2623 && sym->st_size <= elf_gp_size (abfd))
25dbc73a
AM
2624 {
2625 /* Common symbols less than or equal to -G nn bytes are automatically
2626 put into .sbss. */
2627 struct ppc_elf_link_hash_table *htab;
3dab13f6 2628
25dbc73a
AM
2629 htab = ppc_elf_hash_table (info);
2630 if (htab->sbss == NULL)
2631 {
10885e24 2632 flagword flags = SEC_IS_COMMON | SEC_SMALL_DATA | SEC_LINKER_CREATED;
3dab13f6 2633
644285ef
AM
2634 if (!htab->elf.dynobj)
2635 htab->elf.dynobj = abfd;
2636
3496cb2a
L
2637 htab->sbss = bfd_make_section_anyway_with_flags (htab->elf.dynobj,
2638 ".sbss",
2639 flags);
2640 if (htab->sbss == NULL)
25dbc73a 2641 return FALSE;
3dab13f6 2642 }
3dab13f6 2643
25dbc73a
AM
2644 *secp = htab->sbss;
2645 *valp = sym->st_size;
2646 }
3dab13f6 2647
25dbc73a 2648 return TRUE;
3dab13f6
AM
2649}
2650\f
25dbc73a
AM
2651/* Find a linker generated pointer with a given addend and type. */
2652
2653static elf_linker_section_pointers_t *
2654elf_find_pointer_linker_section
2655 (elf_linker_section_pointers_t *linker_pointers,
2656 bfd_vma addend,
2657 elf_linker_section_t *lsect)
252b5132 2658{
25dbc73a
AM
2659 for ( ; linker_pointers != NULL; linker_pointers = linker_pointers->next)
2660 if (lsect == linker_pointers->lsect && addend == linker_pointers->addend)
2661 return linker_pointers;
252b5132 2662
25dbc73a
AM
2663 return NULL;
2664}
2665
2666/* Allocate a pointer to live in a linker created section. */
2667
2668static bfd_boolean
93d1b056
AM
2669elf_allocate_pointer_linker_section (bfd *abfd,
2670 elf_linker_section_t *lsect,
2671 struct elf_link_hash_entry *h,
2672 const Elf_Internal_Rela *rel)
25dbc73a
AM
2673{
2674 elf_linker_section_pointers_t **ptr_linker_section_ptr = NULL;
2675 elf_linker_section_pointers_t *linker_section_ptr;
2676 unsigned long r_symndx = ELF32_R_SYM (rel->r_info);
2677 bfd_size_type amt;
2678
2679 BFD_ASSERT (lsect != NULL);
2680
2681 /* Is this a global symbol? */
2682 if (h != NULL)
2683 {
2684 struct ppc_elf_link_hash_entry *eh;
2685
2686 /* Has this symbol already been allocated? If so, our work is done. */
2687 eh = (struct ppc_elf_link_hash_entry *) h;
2688 if (elf_find_pointer_linker_section (eh->linker_section_pointer,
2689 rel->r_addend,
2690 lsect))
2691 return TRUE;
2692
2693 ptr_linker_section_ptr = &eh->linker_section_pointer;
25dbc73a
AM
2694 }
2695 else
2696 {
0c8d6e5c 2697 BFD_ASSERT (is_ppc_elf (abfd));
0ffa91dd 2698
25dbc73a
AM
2699 /* Allocation of a pointer to a local symbol. */
2700 elf_linker_section_pointers_t **ptr = elf_local_ptr_offsets (abfd);
2701
2702 /* Allocate a table to hold the local symbols if first time. */
2703 if (!ptr)
2704 {
0ffa91dd 2705 unsigned int num_symbols = elf_symtab_hdr (abfd).sh_info;
25dbc73a
AM
2706
2707 amt = num_symbols;
2708 amt *= sizeof (elf_linker_section_pointers_t *);
2709 ptr = bfd_zalloc (abfd, amt);
2710
2711 if (!ptr)
2712 return FALSE;
2713
2714 elf_local_ptr_offsets (abfd) = ptr;
2715 }
2716
2717 /* Has this symbol already been allocated? If so, our work is done. */
2718 if (elf_find_pointer_linker_section (ptr[r_symndx],
2719 rel->r_addend,
2720 lsect))
2721 return TRUE;
252b5132 2722
25dbc73a 2723 ptr_linker_section_ptr = &ptr[r_symndx];
25dbc73a 2724 }
41fcb14e 2725
25dbc73a
AM
2726 /* Allocate space for a pointer in the linker section, and allocate
2727 a new pointer record from internal memory. */
2728 BFD_ASSERT (ptr_linker_section_ptr != NULL);
2729 amt = sizeof (elf_linker_section_pointers_t);
2730 linker_section_ptr = bfd_alloc (abfd, amt);
41fcb14e 2731
25dbc73a 2732 if (!linker_section_ptr)
7619e7c7 2733 return FALSE;
41fcb14e 2734
25dbc73a
AM
2735 linker_section_ptr->next = *ptr_linker_section_ptr;
2736 linker_section_ptr->addend = rel->r_addend;
2737 linker_section_ptr->lsect = lsect;
25dbc73a 2738 *ptr_linker_section_ptr = linker_section_ptr;
41fcb14e 2739
fd361982 2740 if (!bfd_set_section_alignment (lsect->section, 2))
93d1b056 2741 return FALSE;
25dbc73a
AM
2742 linker_section_ptr->offset = lsect->section->size;
2743 lsect->section->size += 4;
7619e7c7 2744
25dbc73a
AM
2745#ifdef DEBUG
2746 fprintf (stderr,
2747 "Create pointer in linker section %s, offset = %ld, section size = %ld\n",
2748 lsect->name, (long) linker_section_ptr->offset,
2749 (long) lsect->section->size);
2750#endif
7619e7c7
AM
2751
2752 return TRUE;
41fcb14e
AM
2753}
2754
e054468f 2755static struct plt_entry **
25dbc73a
AM
2756update_local_sym_info (bfd *abfd,
2757 Elf_Internal_Shdr *symtab_hdr,
2758 unsigned long r_symndx,
2759 int tls_type)
252b5132 2760{
25dbc73a 2761 bfd_signed_vma *local_got_refcounts = elf_local_got_refcounts (abfd);
e054468f 2762 struct plt_entry **local_plt;
bac3c8c5 2763 unsigned char *local_got_tls_masks;
252b5132 2764
25dbc73a 2765 if (local_got_refcounts == NULL)
252b5132 2766 {
25dbc73a
AM
2767 bfd_size_type size = symtab_hdr->sh_info;
2768
e054468f
AM
2769 size *= (sizeof (*local_got_refcounts)
2770 + sizeof (*local_plt)
2771 + sizeof (*local_got_tls_masks));
25dbc73a
AM
2772 local_got_refcounts = bfd_zalloc (abfd, size);
2773 if (local_got_refcounts == NULL)
e054468f 2774 return NULL;
25dbc73a 2775 elf_local_got_refcounts (abfd) = local_got_refcounts;
252b5132 2776 }
41fcb14e 2777
e054468f 2778 local_plt = (struct plt_entry **) (local_got_refcounts + symtab_hdr->sh_info);
bac3c8c5 2779 local_got_tls_masks = (unsigned char *) (local_plt + symtab_hdr->sh_info);
37da22e5
AM
2780 local_got_tls_masks[r_symndx] |= tls_type & 0xff;
2781 if ((tls_type & NON_GOT) == 0)
e054468f
AM
2782 local_got_refcounts[r_symndx] += 1;
2783 return local_plt + r_symndx;
25dbc73a 2784}
41fcb14e 2785
a6aa5195 2786static bfd_boolean
3ec01793 2787update_plt_info (bfd *abfd, struct plt_entry **plist,
a6aa5195
AM
2788 asection *sec, bfd_vma addend)
2789{
2790 struct plt_entry *ent;
2791
32af9f6e
AM
2792 if (addend < 32768)
2793 sec = NULL;
3ec01793 2794 for (ent = *plist; ent != NULL; ent = ent->next)
a6aa5195
AM
2795 if (ent->sec == sec && ent->addend == addend)
2796 break;
2797 if (ent == NULL)
2798 {
986f0783 2799 size_t amt = sizeof (*ent);
a6aa5195
AM
2800 ent = bfd_alloc (abfd, amt);
2801 if (ent == NULL)
2802 return FALSE;
3ec01793 2803 ent->next = *plist;
a6aa5195
AM
2804 ent->sec = sec;
2805 ent->addend = addend;
2806 ent->plt.refcount = 0;
3ec01793 2807 *plist = ent;
a6aa5195
AM
2808 }
2809 ent->plt.refcount += 1;
2810 return TRUE;
2811}
2812
2813static struct plt_entry *
3ec01793 2814find_plt_ent (struct plt_entry **plist, asection *sec, bfd_vma addend)
a6aa5195
AM
2815{
2816 struct plt_entry *ent;
2817
2818 if (addend < 32768)
2819 sec = NULL;
3ec01793 2820 for (ent = *plist; ent != NULL; ent = ent->next)
a6aa5195
AM
2821 if (ent->sec == sec && ent->addend == addend)
2822 break;
2823 return ent;
2824}
2825
e054468f
AM
2826static bfd_boolean
2827is_branch_reloc (enum elf_ppc_reloc_type r_type)
2828{
2829 return (r_type == R_PPC_PLTREL24
2830 || r_type == R_PPC_LOCAL24PC
2831 || r_type == R_PPC_REL24
2832 || r_type == R_PPC_REL14
2833 || r_type == R_PPC_REL14_BRTAKEN
2834 || r_type == R_PPC_REL14_BRNTAKEN
2835 || r_type == R_PPC_ADDR24
2836 || r_type == R_PPC_ADDR14
2837 || r_type == R_PPC_ADDR14_BRTAKEN
dfdaec14
AJ
2838 || r_type == R_PPC_ADDR14_BRNTAKEN
2839 || r_type == R_PPC_VLE_REL24);
e054468f
AM
2840}
2841
23cedd1d
AM
2842/* Relocs on inline plt call sequence insns prior to the call. */
2843
2844static bfd_boolean
2845is_plt_seq_reloc (enum elf_ppc_reloc_type r_type)
2846{
2847 return (r_type == R_PPC_PLT16_HA
2848 || r_type == R_PPC_PLT16_HI
2849 || r_type == R_PPC_PLT16_LO
2850 || r_type == R_PPC_PLTSEQ);
2851}
2852
25dbc73a
AM
2853static void
2854bad_shared_reloc (bfd *abfd, enum elf_ppc_reloc_type r_type)
2855{
4eca0228 2856 _bfd_error_handler
695344c0 2857 /* xgettext:c-format */
871b3ab2 2858 (_("%pB: relocation %s cannot be used when making a shared object"),
25dbc73a
AM
2859 abfd,
2860 ppc_elf_howto_table[r_type]->name);
2861 bfd_set_error (bfd_error_bad_value);
252b5132
RH
2862}
2863
25dbc73a
AM
2864/* Look through the relocs for a section during the first phase, and
2865 allocate space in the global offset table or procedure linkage
2866 table. */
252b5132 2867
b34976b6 2868static bfd_boolean
25dbc73a
AM
2869ppc_elf_check_relocs (bfd *abfd,
2870 struct bfd_link_info *info,
2871 asection *sec,
2872 const Elf_Internal_Rela *relocs)
252b5132 2873{
7619e7c7 2874 struct ppc_elf_link_hash_table *htab;
25dbc73a
AM
2875 Elf_Internal_Shdr *symtab_hdr;
2876 struct elf_link_hash_entry **sym_hashes;
2877 const Elf_Internal_Rela *rel;
2878 const Elf_Internal_Rela *rel_end;
a6aa5195 2879 asection *got2, *sreloc;
727fc41e 2880 struct elf_link_hash_entry *tga;
25dbc73a 2881
0e1862bb 2882 if (bfd_link_relocatable (info))
25dbc73a 2883 return TRUE;
252b5132
RH
2884
2885#ifdef DEBUG
871b3ab2 2886 _bfd_error_handler ("ppc_elf_check_relocs called for section %pA in %pB",
25dbc73a 2887 sec, abfd);
252b5132
RH
2888#endif
2889
0c8d6e5c 2890 BFD_ASSERT (is_ppc_elf (abfd));
0ffa91dd 2891
25dbc73a
AM
2892 /* Initialize howto table if not already done. */
2893 if (!ppc_elf_howto_table[R_PPC_ADDR32])
2894 ppc_elf_howto_init ();
2895
7619e7c7 2896 htab = ppc_elf_hash_table (info);
25f23106
AM
2897 if (htab->glink == NULL)
2898 {
2899 if (htab->elf.dynobj == NULL)
2900 htab->elf.dynobj = abfd;
2901 if (!ppc_elf_create_glink (htab->elf.dynobj, info))
2902 return FALSE;
2903 }
727fc41e
AM
2904 tga = elf_link_hash_lookup (&htab->elf, "__tls_get_addr",
2905 FALSE, FALSE, TRUE);
0ffa91dd 2906 symtab_hdr = &elf_symtab_hdr (abfd);
25dbc73a 2907 sym_hashes = elf_sym_hashes (abfd);
a6aa5195 2908 got2 = bfd_get_section_by_name (abfd, ".got2");
25dbc73a
AM
2909 sreloc = NULL;
2910
2911 rel_end = relocs + sec->reloc_count;
2912 for (rel = relocs; rel < rel_end; rel++)
2913 {
2914 unsigned long r_symndx;
2915 enum elf_ppc_reloc_type r_type;
2916 struct elf_link_hash_entry *h;
727fc41e 2917 int tls_type;
cbf95972 2918 struct plt_entry **ifunc;
2d7ad24e
AM
2919 struct plt_entry **pltent;
2920 bfd_vma addend;
25dbc73a
AM
2921
2922 r_symndx = ELF32_R_SYM (rel->r_info);
2923 if (r_symndx < symtab_hdr->sh_info)
2924 h = NULL;
2925 else
973a3492
L
2926 {
2927 h = sym_hashes[r_symndx - symtab_hdr->sh_info];
2928 while (h->root.type == bfd_link_hash_indirect
2929 || h->root.type == bfd_link_hash_warning)
2930 h = (struct elf_link_hash_entry *) h->root.u.i.link;
2931 }
25dbc73a
AM
2932
2933 /* If a relocation refers to _GLOBAL_OFFSET_TABLE_, create the .got.
2934 This shows up in particular in an R_PPC_ADDR32 in the eabi
2935 startup code. */
3b36f7e6 2936 if (h != NULL
ce558b89 2937 && htab->elf.sgot == NULL
3b36f7e6 2938 && strcmp (h->root.root.string, "_GLOBAL_OFFSET_TABLE_") == 0)
252b5132 2939 {
3b36f7e6
AM
2940 if (htab->elf.dynobj == NULL)
2941 htab->elf.dynobj = abfd;
2942 if (!ppc_elf_create_got (htab->elf.dynobj, info))
2943 return FALSE;
2944 BFD_ASSERT (h == htab->elf.hgot);
25dbc73a 2945 }
252b5132 2946
727fc41e 2947 tls_type = 0;
de972ffa 2948 r_type = ELF32_R_TYPE (rel->r_info);
cbf95972 2949 ifunc = NULL;
90c14f0c 2950 if (h == NULL && htab->elf.target_os != is_vxworks)
e054468f 2951 {
f1dfbfdb 2952 Elf_Internal_Sym *isym = bfd_sym_from_r_symndx (&htab->elf.sym_cache,
06a162cf
AM
2953 abfd, r_symndx);
2954 if (isym == NULL)
2955 return FALSE;
2956
0bed072f 2957 if (ELF_ST_TYPE (isym->st_info) == STT_GNU_IFUNC)
e054468f 2958 {
0bed072f 2959 /* Set PLT_IFUNC flag for this sym, no GOT entry yet. */
06a162cf 2960 ifunc = update_local_sym_info (abfd, symtab_hdr, r_symndx,
37da22e5 2961 NON_GOT | PLT_IFUNC);
06a162cf 2962 if (ifunc == NULL)
e054468f
AM
2963 return FALSE;
2964
06a162cf
AM
2965 /* STT_GNU_IFUNC symbols must have a PLT entry;
2966 In a non-pie executable even when there are
2967 no plt calls. */
0e1862bb 2968 if (!bfd_link_pic (info)
08be3224
AM
2969 || is_branch_reloc (r_type)
2970 || r_type == R_PPC_PLT16_LO
2971 || r_type == R_PPC_PLT16_HI
2972 || r_type == R_PPC_PLT16_HA)
e054468f 2973 {
2d7ad24e 2974 addend = 0;
0bed072f 2975 if (r_type == R_PPC_PLTREL24)
08be3224
AM
2976 ppc_elf_tdata (abfd)->makes_plt_call = 1;
2977 if (bfd_link_pic (info)
2978 && (r_type == R_PPC_PLTREL24
2979 || r_type == R_PPC_PLT16_LO
2980 || r_type == R_PPC_PLT16_HI
2981 || r_type == R_PPC_PLT16_HA))
2982 addend = rel->r_addend;
0bed072f
AM
2983 if (!update_plt_info (abfd, ifunc, got2, addend))
2984 return FALSE;
e054468f
AM
2985 }
2986 }
25f23106
AM
2987 }
2988
90c14f0c 2989 if (htab->elf.target_os != is_vxworks
de972ffa
AM
2990 && is_branch_reloc (r_type)
2991 && h != NULL
2992 && h == tga)
25f23106 2993 {
de972ffa
AM
2994 if (rel != relocs
2995 && (ELF32_R_TYPE (rel[-1].r_info) == R_PPC_TLSGD
2996 || ELF32_R_TYPE (rel[-1].r_info) == R_PPC_TLSLD))
2997 /* We have a new-style __tls_get_addr call with a marker
2998 reloc. */
2999 ;
3000 else
3001 /* Mark this section as having an old-style call. */
9737e8af 3002 sec->nomark_tls_get_addr = 1;
e054468f 3003 }
727fc41e 3004
25dbc73a
AM
3005 switch (r_type)
3006 {
727fc41e
AM
3007 case R_PPC_TLSGD:
3008 case R_PPC_TLSLD:
3009 /* These special tls relocs tie a call to __tls_get_addr with
3010 its parameter symbol. */
37da22e5
AM
3011 if (h != NULL)
3012 ppc_elf_hash_entry (h)->tls_mask |= TLS_TLS | TLS_MARK;
3013 else
3014 if (!update_local_sym_info (abfd, symtab_hdr, r_symndx,
3015 NON_GOT | TLS_TLS | TLS_MARK))
3016 return FALSE;
727fc41e
AM
3017 break;
3018
23cedd1d
AM
3019 case R_PPC_PLTSEQ:
3020 break;
3021
25dbc73a
AM
3022 case R_PPC_GOT_TLSLD16:
3023 case R_PPC_GOT_TLSLD16_LO:
3024 case R_PPC_GOT_TLSLD16_HI:
3025 case R_PPC_GOT_TLSLD16_HA:
25dbc73a
AM
3026 tls_type = TLS_TLS | TLS_LD;
3027 goto dogottls;
252b5132 3028
25dbc73a
AM
3029 case R_PPC_GOT_TLSGD16:
3030 case R_PPC_GOT_TLSGD16_LO:
3031 case R_PPC_GOT_TLSGD16_HI:
3032 case R_PPC_GOT_TLSGD16_HA:
3033 tls_type = TLS_TLS | TLS_GD;
3034 goto dogottls;
3035
3036 case R_PPC_GOT_TPREL16:
3037 case R_PPC_GOT_TPREL16_LO:
3038 case R_PPC_GOT_TPREL16_HI:
3039 case R_PPC_GOT_TPREL16_HA:
7c8bbca5 3040 if (bfd_link_dll (info))
25dbc73a
AM
3041 info->flags |= DF_STATIC_TLS;
3042 tls_type = TLS_TLS | TLS_TPREL;
3043 goto dogottls;
3044
3045 case R_PPC_GOT_DTPREL16:
3046 case R_PPC_GOT_DTPREL16_LO:
3047 case R_PPC_GOT_DTPREL16_HI:
3048 case R_PPC_GOT_DTPREL16_HA:
3049 tls_type = TLS_TLS | TLS_DTPREL;
3050 dogottls:
3051 sec->has_tls_reloc = 1;
1a0670f3 3052 /* Fall through. */
252b5132 3053
25dbc73a
AM
3054 /* GOT16 relocations */
3055 case R_PPC_GOT16:
3056 case R_PPC_GOT16_LO:
3057 case R_PPC_GOT16_HI:
3058 case R_PPC_GOT16_HA:
3059 /* This symbol requires a global offset table entry. */
ce558b89 3060 if (htab->elf.sgot == NULL)
25dbc73a
AM
3061 {
3062 if (htab->elf.dynobj == NULL)
3063 htab->elf.dynobj = abfd;
3064 if (!ppc_elf_create_got (htab->elf.dynobj, info))
3065 return FALSE;
3066 }
3067 if (h != NULL)
3068 {
3069 h->got.refcount += 1;
3070 ppc_elf_hash_entry (h)->tls_mask |= tls_type;
3071 }
3072 else
3073 /* This is a global offset table entry for a local symbol. */
3074 if (!update_local_sym_info (abfd, symtab_hdr, r_symndx, tls_type))
3075 return FALSE;
91e21fb7
AM
3076
3077 /* We may also need a plt entry if the symbol turns out to be
3078 an ifunc. */
0e1862bb 3079 if (h != NULL && !bfd_link_pic (info))
91e21fb7
AM
3080 {
3081 if (!update_plt_info (abfd, &h->plt.plist, NULL, 0))
3082 return FALSE;
3083 }
25dbc73a 3084 break;
252b5132 3085
25dbc73a
AM
3086 /* Indirect .sdata relocation. */
3087 case R_PPC_EMB_SDAI16:
93d1b056
AM
3088 htab->sdata[0].sym->ref_regular = 1;
3089 if (!elf_allocate_pointer_linker_section (abfd, &htab->sdata[0],
3090 h, rel))
25dbc73a 3091 return FALSE;
046183de
AM
3092 if (h != NULL)
3093 {
3094 ppc_elf_hash_entry (h)->has_sda_refs = TRUE;
3095 h->non_got_ref = TRUE;
3096 }
25dbc73a 3097 break;
252b5132 3098
25dbc73a
AM
3099 /* Indirect .sdata2 relocation. */
3100 case R_PPC_EMB_SDA2I16:
c0d9f31d 3101 if (!bfd_link_executable (info))
25dbc73a
AM
3102 {
3103 bad_shared_reloc (abfd, r_type);
3104 return FALSE;
3105 }
93d1b056
AM
3106 htab->sdata[1].sym->ref_regular = 1;
3107 if (!elf_allocate_pointer_linker_section (abfd, &htab->sdata[1],
3108 h, rel))
25dbc73a 3109 return FALSE;
046183de
AM
3110 if (h != NULL)
3111 {
3112 ppc_elf_hash_entry (h)->has_sda_refs = TRUE;
3113 h->non_got_ref = TRUE;
3114 }
25dbc73a 3115 break;
252b5132 3116
93d1b056
AM
3117 case R_PPC_SDAREL16:
3118 htab->sdata[0].sym->ref_regular = 1;
1a0670f3 3119 /* Fall through. */
93d1b056 3120
b9c361e0
JL
3121 case R_PPC_VLE_SDAREL_LO16A:
3122 case R_PPC_VLE_SDAREL_LO16D:
3123 case R_PPC_VLE_SDAREL_HI16A:
3124 case R_PPC_VLE_SDAREL_HI16D:
3125 case R_PPC_VLE_SDAREL_HA16A:
3126 case R_PPC_VLE_SDAREL_HA16D:
046183de
AM
3127 if (h != NULL)
3128 {
3129 ppc_elf_hash_entry (h)->has_sda_refs = TRUE;
3130 h->non_got_ref = TRUE;
3131 }
3132 break;
3133
b9c361e0
JL
3134 case R_PPC_VLE_REL8:
3135 case R_PPC_VLE_REL15:
3136 case R_PPC_VLE_REL24:
3137 case R_PPC_VLE_LO16A:
3138 case R_PPC_VLE_LO16D:
3139 case R_PPC_VLE_HI16A:
3140 case R_PPC_VLE_HI16D:
3141 case R_PPC_VLE_HA16A:
3142 case R_PPC_VLE_HA16D:
83eef883 3143 case R_PPC_VLE_ADDR20:
b9c361e0
JL
3144 break;
3145
25dbc73a 3146 case R_PPC_EMB_SDA2REL:
c0d9f31d 3147 if (!bfd_link_executable (info))
046183de
AM
3148 {
3149 bad_shared_reloc (abfd, r_type);
3150 return FALSE;
3151 }
93d1b056 3152 htab->sdata[1].sym->ref_regular = 1;
046183de
AM
3153 if (h != NULL)
3154 {
3155 ppc_elf_hash_entry (h)->has_sda_refs = TRUE;
3156 h->non_got_ref = TRUE;
3157 }
3158 break;
3159
b9c361e0
JL
3160 case R_PPC_VLE_SDA21_LO:
3161 case R_PPC_VLE_SDA21:
25dbc73a
AM
3162 case R_PPC_EMB_SDA21:
3163 case R_PPC_EMB_RELSDA:
046183de
AM
3164 if (h != NULL)
3165 {
3166 ppc_elf_hash_entry (h)->has_sda_refs = TRUE;
3167 h->non_got_ref = TRUE;
3168 }
3169 break;
3170
25dbc73a
AM
3171 case R_PPC_EMB_NADDR32:
3172 case R_PPC_EMB_NADDR16:
3173 case R_PPC_EMB_NADDR16_LO:
3174 case R_PPC_EMB_NADDR16_HI:
3175 case R_PPC_EMB_NADDR16_HA:
4dc4a9a5 3176 if (h != NULL)
046183de 3177 h->non_got_ref = TRUE;
25dbc73a 3178 break;
252b5132 3179
25dbc73a 3180 case R_PPC_PLTREL24:
de972ffa 3181 if (h == NULL)
6d78d0b9 3182 break;
08be3224 3183 ppc_elf_tdata (abfd)->makes_plt_call = 1;
3e04d765 3184 goto pltentry;
08be3224 3185
23cedd1d 3186 case R_PPC_PLTCALL:
3e04d765
AM
3187 sec->has_pltcall = 1;
3188 /* Fall through. */
3189
6d78d0b9 3190 case R_PPC_PLT32:
25dbc73a
AM
3191 case R_PPC_PLTREL32:
3192 case R_PPC_PLT16_LO:
3193 case R_PPC_PLT16_HI:
3194 case R_PPC_PLT16_HA:
3e04d765 3195 pltentry:
25dbc73a
AM
3196#ifdef DEBUG
3197 fprintf (stderr, "Reloc requires a PLT entry\n");
3198#endif
cbf95972 3199 /* This symbol requires a procedure linkage table entry. */
25dbc73a
AM
3200 if (h == NULL)
3201 {
2d7ad24e
AM
3202 pltent = update_local_sym_info (abfd, symtab_hdr, r_symndx,
3203 NON_GOT | PLT_KEEP);
3204 if (pltent == NULL)
3205 return FALSE;
25dbc73a 3206 }
a6aa5195
AM
3207 else
3208 {
2d7ad24e
AM
3209 if (r_type != R_PPC_PLTREL24)
3210 ppc_elf_hash_entry (h)->tls_mask |= PLT_KEEP;
a6aa5195 3211 h->needs_plt = 1;
2d7ad24e 3212 pltent = &h->plt.plist;
a6aa5195 3213 }
2d7ad24e
AM
3214 addend = 0;
3215 if (bfd_link_pic (info)
3216 && (r_type == R_PPC_PLTREL24
3217 || r_type == R_PPC_PLT16_LO
3218 || r_type == R_PPC_PLT16_HI
3219 || r_type == R_PPC_PLT16_HA))
3220 addend = rel->r_addend;
3221 if (!update_plt_info (abfd, pltent, got2, addend))
3222 return FALSE;
25dbc73a 3223 break;
ee05f2fe 3224
25dbc73a
AM
3225 /* The following relocations don't need to propagate the
3226 relocation if linking a shared object since they are
3227 section relative. */
3228 case R_PPC_SECTOFF:
3229 case R_PPC_SECTOFF_LO:
3230 case R_PPC_SECTOFF_HI:
3231 case R_PPC_SECTOFF_HA:
3232 case R_PPC_DTPREL16:
3233 case R_PPC_DTPREL16_LO:
3234 case R_PPC_DTPREL16_HI:
3235 case R_PPC_DTPREL16_HA:
3236 case R_PPC_TOC16:
3237 break;
252b5132 3238
d7128ce4
AM
3239 case R_PPC_REL16:
3240 case R_PPC_REL16_LO:
3241 case R_PPC_REL16_HI:
3242 case R_PPC_REL16_HA:
a680de9a 3243 case R_PPC_REL16DX_HA:
016687f8 3244 ppc_elf_tdata (abfd)->has_rel16 = 1;
d7128ce4
AM
3245 break;
3246
a6aa5195 3247 /* These are just markers. */
25dbc73a
AM
3248 case R_PPC_TLS:
3249 case R_PPC_EMB_MRKREF:
3250 case R_PPC_NONE:
3251 case R_PPC_max:
32af9f6e
AM
3252 case R_PPC_RELAX:
3253 case R_PPC_RELAX_PLT:
3254 case R_PPC_RELAX_PLTREL24:
7ba71655 3255 case R_PPC_16DX_HA:
25dbc73a 3256 break;
252b5132 3257
25dbc73a
AM
3258 /* These should only appear in dynamic objects. */
3259 case R_PPC_COPY:
3260 case R_PPC_GLOB_DAT:
3261 case R_PPC_JMP_SLOT:
3262 case R_PPC_RELATIVE:
e054468f 3263 case R_PPC_IRELATIVE:
25dbc73a 3264 break;
252b5132 3265
25dbc73a
AM
3266 /* These aren't handled yet. We'll report an error later. */
3267 case R_PPC_ADDR30:
3268 case R_PPC_EMB_RELSEC16:
3269 case R_PPC_EMB_RELST_LO:
3270 case R_PPC_EMB_RELST_HI:
3271 case R_PPC_EMB_RELST_HA:
3272 case R_PPC_EMB_BIT_FLD:
3273 break;
252b5132 3274
25dbc73a
AM
3275 /* This refers only to functions defined in the shared library. */
3276 case R_PPC_LOCAL24PC:
727fc41e 3277 if (h != NULL && h == htab->elf.hgot && htab->plt_type == PLT_UNSET)
016687f8
AM
3278 {
3279 htab->plt_type = PLT_OLD;
3280 htab->old_bfd = abfd;
3281 }
c7e17e05
AM
3282 if (h != NULL && h->type == STT_GNU_IFUNC)
3283 {
c7e17e05
AM
3284 h->needs_plt = 1;
3285 if (!update_plt_info (abfd, &h->plt.plist, NULL, 0))
3286 return FALSE;
3287 }
25dbc73a 3288 break;
252b5132 3289
25dbc73a
AM
3290 /* This relocation describes the C++ object vtable hierarchy.
3291 Reconstruct it for later use during GC. */
3292 case R_PPC_GNU_VTINHERIT:
3293 if (!bfd_elf_gc_record_vtinherit (abfd, sec, h, rel->r_offset))
3294 return FALSE;
3295 break;
252b5132 3296
25dbc73a
AM
3297 /* This relocation describes which C++ vtable entries are actually
3298 used. Record for later use during GC. */
3299 case R_PPC_GNU_VTENTRY:
a0ea3a14 3300 if (!bfd_elf_gc_record_vtentry (abfd, sec, h, rel->r_addend))
25dbc73a
AM
3301 return FALSE;
3302 break;
252b5132 3303
252dcdf4
AM
3304 case R_PPC_TPREL16_HI:
3305 case R_PPC_TPREL16_HA:
3306 sec->has_tls_reloc = 1;
3307 /* Fall through. */
7c8bbca5 3308 /* We shouldn't really be seeing TPREL32. */
25dbc73a 3309 case R_PPC_TPREL32:
1d483afe
AM
3310 case R_PPC_TPREL16:
3311 case R_PPC_TPREL16_LO:
7c8bbca5 3312 if (bfd_link_dll (info))
25dbc73a
AM
3313 info->flags |= DF_STATIC_TLS;
3314 goto dodyn;
252b5132 3315
25dbc73a
AM
3316 /* Nor these. */
3317 case R_PPC_DTPMOD32:
3318 case R_PPC_DTPREL32:
3319 goto dodyn;
252b5132 3320
9edfd1af
AM
3321 case R_PPC_REL32:
3322 if (h == NULL
3323 && got2 != NULL
3324 && (sec->flags & SEC_CODE) != 0
0e1862bb 3325 && bfd_link_pic (info)
4a3dc543 3326 && htab->plt_type == PLT_UNSET)
9edfd1af
AM
3327 {
3328 /* Old -fPIC gcc code has .long LCTOC1-LCFx just before
3329 the start of a function, which assembles to a REL32
3330 reference to .got2. If we detect one of these, then
3331 force the old PLT layout because the linker cannot
3332 reliably deduce the GOT pointer value needed for
3333 PLT call stubs. */
3334 asection *s;
87d72d41 3335 Elf_Internal_Sym *isym;
9edfd1af 3336
f1dfbfdb 3337 isym = bfd_sym_from_r_symndx (&htab->elf.sym_cache,
87d72d41
AM
3338 abfd, r_symndx);
3339 if (isym == NULL)
3340 return FALSE;
3341
3342 s = bfd_section_from_elf_index (abfd, isym->st_shndx);
9edfd1af 3343 if (s == got2)
016687f8
AM
3344 {
3345 htab->plt_type = PLT_OLD;
3346 htab->old_bfd = abfd;
3347 }
9edfd1af 3348 }
7123df0e 3349 if (h == NULL || h == htab->elf.hgot)
fd38b44c 3350 break;
625af618
AM
3351 /* fall through */
3352
3353 case R_PPC_ADDR32:
3354 case R_PPC_ADDR16:
3355 case R_PPC_ADDR16_LO:
3356 case R_PPC_ADDR16_HI:
3357 case R_PPC_ADDR16_HA:
3358 case R_PPC_UADDR32:
3359 case R_PPC_UADDR16:
0e1862bb 3360 if (h != NULL && !bfd_link_pic (info))
625af618
AM
3361 {
3362 /* We may need a plt entry if the symbol turns out to be
3363 a function defined in a dynamic object. */
3ec01793 3364 if (!update_plt_info (abfd, &h->plt.plist, NULL, 0))
625af618
AM
3365 return FALSE;
3366
3367 /* We may need a copy reloc too. */
3368 h->non_got_ref = 1;
3369 h->pointer_equality_needed = 1;
d3e454b9
AM
3370 if (r_type == R_PPC_ADDR16_HA)
3371 ppc_elf_hash_entry (h)->has_addr16_ha = 1;
3372 if (r_type == R_PPC_ADDR16_LO)
3373 ppc_elf_hash_entry (h)->has_addr16_lo = 1;
625af618
AM
3374 }
3375 goto dodyn;
9edfd1af 3376
25dbc73a
AM
3377 case R_PPC_REL24:
3378 case R_PPC_REL14:
3379 case R_PPC_REL14_BRTAKEN:
3380 case R_PPC_REL14_BRNTAKEN:
d7128ce4 3381 if (h == NULL)
25dbc73a 3382 break;
7123df0e 3383 if (h == htab->elf.hgot)
d7128ce4 3384 {
7123df0e 3385 if (htab->plt_type == PLT_UNSET)
016687f8
AM
3386 {
3387 htab->plt_type = PLT_OLD;
3388 htab->old_bfd = abfd;
3389 }
d7128ce4
AM
3390 break;
3391 }
25dbc73a 3392 /* fall through */
ee05f2fe 3393
25dbc73a 3394 case R_PPC_ADDR24:
25dbc73a
AM
3395 case R_PPC_ADDR14:
3396 case R_PPC_ADDR14_BRTAKEN:
3397 case R_PPC_ADDR14_BRNTAKEN:
0e1862bb 3398 if (h != NULL && !bfd_link_pic (info))
25dbc73a
AM
3399 {
3400 /* We may need a plt entry if the symbol turns out to be
3401 a function defined in a dynamic object. */
e054468f 3402 h->needs_plt = 1;
de972ffa 3403 if (!update_plt_info (abfd, &h->plt.plist, NULL, 0))
a6aa5195 3404 return FALSE;
625af618 3405 break;
25dbc73a 3406 }
7619e7c7 3407
25dbc73a
AM
3408 dodyn:
3409 /* If we are creating a shared library, and this is a reloc
3410 against a global symbol, or a non PC relative reloc
3411 against a local symbol, then we need to copy the reloc
3412 into the shared library. However, if we are linking with
3413 -Bsymbolic, we do not need to copy a reloc against a
3414 global symbol which is defined in an object we are
3415 including in the link (i.e., DEF_REGULAR is set). At
3416 this point we have not seen all the input files, so it is
3417 possible that DEF_REGULAR is not set now but will be set
3418 later (it is never cleared). In case of a weak definition,
3419 DEF_REGULAR may be cleared later by a strong definition in
3420 a shared library. We account for that possibility below by
3421 storing information in the dyn_relocs field of the hash
3422 table entry. A similar situation occurs when creating
3423 shared libraries and symbol visibility changes render the
3424 symbol local.
7619e7c7 3425
25dbc73a
AM
3426 If on the other hand, we are creating an executable, we
3427 may need to keep relocations for symbols satisfied by a
3428 dynamic library if we manage to avoid copy relocs for the
3429 symbol. */
0e1862bb 3430 if ((bfd_link_pic (info)
1d483afe 3431 && (must_be_dyn_reloc (info, r_type)
25dbc73a 3432 || (h != NULL
198f1157 3433 && (!SYMBOLIC_BIND (info, h)
25dbc73a
AM
3434 || h->root.type == bfd_link_hash_defweak
3435 || !h->def_regular))))
3436 || (ELIMINATE_COPY_RELOCS
0e1862bb 3437 && !bfd_link_pic (info)
25dbc73a
AM
3438 && h != NULL
3439 && (h->root.type == bfd_link_hash_defweak
de972ffa 3440 || !h->def_regular)))
25dbc73a 3441 {
25dbc73a
AM
3442#ifdef DEBUG
3443 fprintf (stderr,
3444 "ppc_elf_check_relocs needs to "
3445 "create relocation for %s\n",
3446 (h && h->root.root.string
3447 ? h->root.root.string : "<unknown>"));
3448#endif
3449 if (sreloc == NULL)
3450 {
c9a2f333
AM
3451 if (htab->elf.dynobj == NULL)
3452 htab->elf.dynobj = abfd;
83bac4b0
NC
3453
3454 sreloc = _bfd_elf_make_dynamic_reloc_section
3455 (sec, htab->elf.dynobj, 2, abfd, /*rela?*/ TRUE);
3456
25dbc73a 3457 if (sreloc == NULL)
83bac4b0 3458 return FALSE;
25dbc73a 3459 }
7619e7c7 3460
25dbc73a
AM
3461 /* If this is a global symbol, we count the number of
3462 relocations we need for this symbol. */
3463 if (h != NULL)
3464 {
f95f8542
AM
3465 struct elf_dyn_relocs *p;
3466 struct elf_dyn_relocs **rel_head;
3467
190eb1dd 3468 rel_head = &h->dyn_relocs;
f95f8542
AM
3469 p = *rel_head;
3470 if (p == NULL || p->sec != sec)
3471 {
3472 p = bfd_alloc (htab->elf.dynobj, sizeof *p);
3473 if (p == NULL)
3474 return FALSE;
3475 p->next = *rel_head;
3476 *rel_head = p;
3477 p->sec = sec;
3478 p->count = 0;
3479 p->pc_count = 0;
3480 }
3481 p->count += 1;
3482 if (!must_be_dyn_reloc (info, r_type))
3483 p->pc_count += 1;
25dbc73a
AM
3484 }
3485 else
3486 {
3487 /* Track dynamic relocs needed for local syms too.
3488 We really need local syms available to do this
3489 easily. Oh well. */
f95f8542
AM
3490 struct ppc_dyn_relocs *p;
3491 struct ppc_dyn_relocs **rel_head;
3492 bfd_boolean is_ifunc;
25dbc73a 3493 asection *s;
6edfbbad 3494 void *vpp;
87d72d41 3495 Elf_Internal_Sym *isym;
6edfbbad 3496
f1dfbfdb 3497 isym = bfd_sym_from_r_symndx (&htab->elf.sym_cache,
87d72d41
AM
3498 abfd, r_symndx);
3499 if (isym == NULL)
25dbc73a 3500 return FALSE;
7fce784e 3501
87d72d41
AM
3502 s = bfd_section_from_elf_index (abfd, isym->st_shndx);
3503 if (s == NULL)
3504 s = sec;
3505
6edfbbad 3506 vpp = &elf_section_data (s)->local_dynrel;
f95f8542
AM
3507 rel_head = (struct ppc_dyn_relocs **) vpp;
3508 is_ifunc = ELF_ST_TYPE (isym->st_info) == STT_GNU_IFUNC;
3509 p = *rel_head;
3510 if (p != NULL && p->sec == sec && p->ifunc != is_ifunc)
3511 p = p->next;
3512 if (p == NULL || p->sec != sec || p->ifunc != is_ifunc)
3513 {
3514 p = bfd_alloc (htab->elf.dynobj, sizeof *p);
3515 if (p == NULL)
3516 return FALSE;
3517 p->next = *rel_head;
3518 *rel_head = p;
3519 p->sec = sec;
3520 p->ifunc = is_ifunc;
3521 p->count = 0;
3522 }
3523 p->count += 1;
25dbc73a 3524 }
7619e7c7 3525 }
25dbc73a
AM
3526
3527 break;
7619e7c7
AM
3528 }
3529 }
ee05f2fe 3530
25dbc73a
AM
3531 return TRUE;
3532}
3533\f
005d79fd
AM
3534/* Warn for conflicting Tag_GNU_Power_ABI_FP attributes between IBFD
3535 and OBFD, and merge non-conflicting ones. */
4a91d0ba 3536bfd_boolean
50e03d47 3537_bfd_elf_ppc_merge_fp_attributes (bfd *ibfd, struct bfd_link_info *info)
34c8bcba 3538{
50e03d47 3539 bfd *obfd = info->output_bfd;
c6e65352
DJ
3540 obj_attribute *in_attr, *in_attrs;
3541 obj_attribute *out_attr, *out_attrs;
4a91d0ba 3542 bfd_boolean ret = TRUE;
6f3fe02b
AM
3543 bfd_boolean warn_only;
3544
3545 /* We only warn about shared library mismatches, because common
3546 libraries advertise support for a particular long double variant
3547 but actually support more than one variant. For example, glibc
3548 typically supports 128-bit IBM long double in the shared library
3549 but has a compatibility static archive for 64-bit long double.
3550 The linker doesn't have the smarts to see that an app using
3551 object files marked as 64-bit long double call the compatibility
3552 layer objects and only from there call into the shared library. */
3553 warn_only = (ibfd->flags & DYNAMIC) != 0;
34c8bcba 3554
c6e65352
DJ
3555 in_attrs = elf_known_obj_attributes (ibfd)[OBJ_ATTR_GNU];
3556 out_attrs = elf_known_obj_attributes (obfd)[OBJ_ATTR_GNU];
3557
c6e65352
DJ
3558 in_attr = &in_attrs[Tag_GNU_Power_ABI_FP];
3559 out_attr = &out_attrs[Tag_GNU_Power_ABI_FP];
005d79fd 3560
c6e65352 3561 if (in_attr->i != out_attr->i)
34c8bcba 3562 {
005d79fd
AM
3563 int in_fp = in_attr->i & 3;
3564 int out_fp = out_attr->i & 3;
4a91d0ba 3565 static bfd *last_fp, *last_ld;
005d79fd
AM
3566
3567 if (in_fp == 0)
34c8bcba 3568 ;
005d79fd
AM
3569 else if (out_fp == 0)
3570 {
6f3fe02b
AM
3571 if (!warn_only)
3572 {
3573 out_attr->type = ATTR_TYPE_FLAG_INT_VAL;
3574 out_attr->i ^= in_fp;
3575 last_fp = ibfd;
3576 }
005d79fd
AM
3577 }
3578 else if (out_fp != 2 && in_fp == 2)
8d2c8c3d
AM
3579 {
3580 _bfd_error_handler
3581 /* xgettext:c-format */
4a91d0ba
AM
3582 (_("%pB uses hard float, %pB uses soft float"),
3583 last_fp, ibfd);
6f3fe02b 3584 ret = warn_only;
8d2c8c3d 3585 }
005d79fd 3586 else if (out_fp == 2 && in_fp != 2)
8d2c8c3d
AM
3587 {
3588 _bfd_error_handler
3589 /* xgettext:c-format */
4a91d0ba
AM
3590 (_("%pB uses hard float, %pB uses soft float"),
3591 ibfd, last_fp);
6f3fe02b 3592 ret = warn_only;
8d2c8c3d 3593 }
005d79fd 3594 else if (out_fp == 1 && in_fp == 3)
8d2c8c3d
AM
3595 {
3596 _bfd_error_handler
3597 /* xgettext:c-format */
4a91d0ba
AM
3598 (_("%pB uses double-precision hard float, "
3599 "%pB uses single-precision hard float"), last_fp, ibfd);
6f3fe02b 3600 ret = warn_only;
8d2c8c3d 3601 }
005d79fd 3602 else if (out_fp == 3 && in_fp == 1)
8d2c8c3d
AM
3603 {
3604 _bfd_error_handler
3605 /* xgettext:c-format */
4a91d0ba
AM
3606 (_("%pB uses double-precision hard float, "
3607 "%pB uses single-precision hard float"), ibfd, last_fp);
6f3fe02b 3608 ret = warn_only;
8d2c8c3d 3609 }
005d79fd
AM
3610
3611 in_fp = in_attr->i & 0xc;
3612 out_fp = out_attr->i & 0xc;
3613 if (in_fp == 0)
3614 ;
3615 else if (out_fp == 0)
3616 {
6f3fe02b
AM
3617 if (!warn_only)
3618 {
3619 out_attr->type = ATTR_TYPE_FLAG_INT_VAL;
3620 out_attr->i ^= in_fp;
3621 last_ld = ibfd;
3622 }
005d79fd
AM
3623 }
3624 else if (out_fp != 2 * 4 && in_fp == 2 * 4)
8d2c8c3d
AM
3625 {
3626 _bfd_error_handler
3627 /* xgettext:c-format */
4a91d0ba
AM
3628 (_("%pB uses 64-bit long double, "
3629 "%pB uses 128-bit long double"), ibfd, last_ld);
6f3fe02b 3630 ret = warn_only;
8d2c8c3d 3631 }
005d79fd 3632 else if (in_fp != 2 * 4 && out_fp == 2 * 4)
8d2c8c3d
AM
3633 {
3634 _bfd_error_handler
3635 /* xgettext:c-format */
4a91d0ba
AM
3636 (_("%pB uses 64-bit long double, "
3637 "%pB uses 128-bit long double"), last_ld, ibfd);
6f3fe02b 3638 ret = warn_only;
8d2c8c3d 3639 }
005d79fd 3640 else if (out_fp == 1 * 4 && in_fp == 3 * 4)
8d2c8c3d
AM
3641 {
3642 _bfd_error_handler
3643 /* xgettext:c-format */
4a91d0ba
AM
3644 (_("%pB uses IBM long double, "
3645 "%pB uses IEEE long double"), last_ld, ibfd);
6f3fe02b 3646 ret = warn_only;
8d2c8c3d 3647 }
005d79fd 3648 else if (out_fp == 3 * 4 && in_fp == 1 * 4)
8d2c8c3d
AM
3649 {
3650 _bfd_error_handler
3651 /* xgettext:c-format */
4a91d0ba
AM
3652 (_("%pB uses IBM long double, "
3653 "%pB uses IEEE long double"), ibfd, last_ld);
6f3fe02b 3654 ret = warn_only;
8d2c8c3d 3655 }
c6e65352 3656 }
4a91d0ba
AM
3657
3658 if (!ret)
3659 {
3660 out_attr->type = ATTR_TYPE_FLAG_INT_VAL | ATTR_TYPE_FLAG_ERROR;
3661 bfd_set_error (bfd_error_bad_value);
3662 }
3663 return ret;
005d79fd
AM
3664}
3665
3666/* Merge object attributes from IBFD into OBFD. Warn if
3667 there are conflicting attributes. */
3668static bfd_boolean
50e03d47 3669ppc_elf_merge_obj_attributes (bfd *ibfd, struct bfd_link_info *info)
005d79fd 3670{
50e03d47 3671 bfd *obfd;
005d79fd
AM
3672 obj_attribute *in_attr, *in_attrs;
3673 obj_attribute *out_attr, *out_attrs;
4a91d0ba 3674 bfd_boolean ret;
005d79fd 3675
4a91d0ba
AM
3676 if (!_bfd_elf_ppc_merge_fp_attributes (ibfd, info))
3677 return FALSE;
005d79fd 3678
50e03d47 3679 obfd = info->output_bfd;
005d79fd
AM
3680 in_attrs = elf_known_obj_attributes (ibfd)[OBJ_ATTR_GNU];
3681 out_attrs = elf_known_obj_attributes (obfd)[OBJ_ATTR_GNU];
c6e65352
DJ
3682
3683 /* Check for conflicting Tag_GNU_Power_ABI_Vector attributes and
3684 merge non-conflicting ones. */
3685 in_attr = &in_attrs[Tag_GNU_Power_ABI_Vector];
3686 out_attr = &out_attrs[Tag_GNU_Power_ABI_Vector];
4a91d0ba 3687 ret = TRUE;
c6e65352
DJ
3688 if (in_attr->i != out_attr->i)
3689 {
005d79fd
AM
3690 int in_vec = in_attr->i & 3;
3691 int out_vec = out_attr->i & 3;
4a91d0ba 3692 static bfd *last_vec;
c6e65352 3693
005d79fd
AM
3694 if (in_vec == 0)
3695 ;
3696 else if (out_vec == 0)
c6e65352 3697 {
8d2c8c3d 3698 out_attr->type = ATTR_TYPE_FLAG_INT_VAL;
005d79fd 3699 out_attr->i = in_vec;
4a91d0ba 3700 last_vec = ibfd;
c6e65352 3701 }
c6e65352
DJ
3702 /* For now, allow generic to transition to AltiVec or SPE
3703 without a warning. If GCC marked files with their stack
3704 alignment and used don't-care markings for files which are
3705 not affected by the vector ABI, we could warn about this
3706 case too. */
005d79fd 3707 else if (in_vec == 1)
c6e65352 3708 ;
005d79fd
AM
3709 else if (out_vec == 1)
3710 {
8d2c8c3d 3711 out_attr->type = ATTR_TYPE_FLAG_INT_VAL;
005d79fd 3712 out_attr->i = in_vec;
4a91d0ba 3713 last_vec = ibfd;
005d79fd
AM
3714 }
3715 else if (out_vec < in_vec)
8d2c8c3d
AM
3716 {
3717 _bfd_error_handler
3718 /* xgettext:c-format */
4a91d0ba
AM
3719 (_("%pB uses AltiVec vector ABI, %pB uses SPE vector ABI"),
3720 last_vec, ibfd);
8d2c8c3d 3721 out_attr->type = ATTR_TYPE_FLAG_INT_VAL | ATTR_TYPE_FLAG_ERROR;
4a91d0ba 3722 ret = FALSE;
8d2c8c3d 3723 }
005d79fd 3724 else if (out_vec > in_vec)
8d2c8c3d
AM
3725 {
3726 _bfd_error_handler
3727 /* xgettext:c-format */
4a91d0ba
AM
3728 (_("%pB uses AltiVec vector ABI, %pB uses SPE vector ABI"),
3729 ibfd, last_vec);
8d2c8c3d 3730 out_attr->type = ATTR_TYPE_FLAG_INT_VAL | ATTR_TYPE_FLAG_ERROR;
4a91d0ba 3731 ret = FALSE;
8d2c8c3d 3732 }
34c8bcba
JM
3733 }
3734
f82e0623
NF
3735 /* Check for conflicting Tag_GNU_Power_ABI_Struct_Return attributes
3736 and merge non-conflicting ones. */
3737 in_attr = &in_attrs[Tag_GNU_Power_ABI_Struct_Return];
3738 out_attr = &out_attrs[Tag_GNU_Power_ABI_Struct_Return];
3739 if (in_attr->i != out_attr->i)
3740 {
005d79fd
AM
3741 int in_struct = in_attr->i & 3;
3742 int out_struct = out_attr->i & 3;
4a91d0ba 3743 static bfd *last_struct;
005d79fd
AM
3744
3745 if (in_struct == 0 || in_struct == 3)
f82e0623 3746 ;
005d79fd
AM
3747 else if (out_struct == 0)
3748 {
8d2c8c3d 3749 out_attr->type = ATTR_TYPE_FLAG_INT_VAL;
005d79fd 3750 out_attr->i = in_struct;
4a91d0ba 3751 last_struct = ibfd;
005d79fd
AM
3752 }
3753 else if (out_struct < in_struct)
8d2c8c3d
AM
3754 {
3755 _bfd_error_handler
3756 /* xgettext:c-format */
4a91d0ba
AM
3757 (_("%pB uses r3/r4 for small structure returns, "
3758 "%pB uses memory"), last_struct, ibfd);
8d2c8c3d 3759 out_attr->type = ATTR_TYPE_FLAG_INT_VAL | ATTR_TYPE_FLAG_ERROR;
4a91d0ba 3760 ret = FALSE;
8d2c8c3d 3761 }
005d79fd 3762 else if (out_struct > in_struct)
8d2c8c3d
AM
3763 {
3764 _bfd_error_handler
3765 /* xgettext:c-format */
4a91d0ba
AM
3766 (_("%pB uses r3/r4 for small structure returns, "
3767 "%pB uses memory"), ibfd, last_struct);
8d2c8c3d 3768 out_attr->type = ATTR_TYPE_FLAG_INT_VAL | ATTR_TYPE_FLAG_ERROR;
4a91d0ba 3769 ret = FALSE;
8d2c8c3d 3770 }
f82e0623 3771 }
4a91d0ba
AM
3772 if (!ret)
3773 {
3774 bfd_set_error (bfd_error_bad_value);
3775 return FALSE;
3776 }
f82e0623 3777
34c8bcba 3778 /* Merge Tag_compatibility attributes and any common GNU ones. */
8d2c8c3d 3779 return _bfd_elf_merge_object_attributes (ibfd, info);
34c8bcba
JM
3780}
3781
8853c3d3
AM
3782/* Merge backend specific data from an object file to the output
3783 object file when linking. */
3784
3785static bfd_boolean
50e03d47 3786ppc_elf_merge_private_bfd_data (bfd *ibfd, struct bfd_link_info *info)
8853c3d3 3787{
50e03d47 3788 bfd *obfd = info->output_bfd;
8853c3d3
AM
3789 flagword old_flags;
3790 flagword new_flags;
3791 bfd_boolean error;
3792
0c8d6e5c 3793 if (!is_ppc_elf (ibfd) || !is_ppc_elf (obfd))
8853c3d3
AM
3794 return TRUE;
3795
cc643b88 3796 /* Check if we have the same endianness. */
50e03d47 3797 if (! _bfd_generic_verify_endian_match (ibfd, info))
8853c3d3
AM
3798 return FALSE;
3799
50e03d47 3800 if (!ppc_elf_merge_obj_attributes (ibfd, info))
34c8bcba
JM
3801 return FALSE;
3802
91ed9b71
AM
3803 if ((ibfd->flags & DYNAMIC) != 0)
3804 return TRUE;
3805
8853c3d3
AM
3806 new_flags = elf_elfheader (ibfd)->e_flags;
3807 old_flags = elf_elfheader (obfd)->e_flags;
3808 if (!elf_flags_init (obfd))
3809 {
3810 /* First call, no flags set. */
3811 elf_flags_init (obfd) = TRUE;
3812 elf_elfheader (obfd)->e_flags = new_flags;
3813 }
3814
3815 /* Compatible flags are ok. */
3816 else if (new_flags == old_flags)
3817 ;
3818
3819 /* Incompatible flags. */
3820 else
3821 {
3822 /* Warn about -mrelocatable mismatch. Allow -mrelocatable-lib
3823 to be linked with either. */
3824 error = FALSE;
3825 if ((new_flags & EF_PPC_RELOCATABLE) != 0
3826 && (old_flags & (EF_PPC_RELOCATABLE | EF_PPC_RELOCATABLE_LIB)) == 0)
3827 {
3828 error = TRUE;
4eca0228 3829 _bfd_error_handler
871b3ab2 3830 (_("%pB: compiled with -mrelocatable and linked with "
8853c3d3
AM
3831 "modules compiled normally"), ibfd);
3832 }
3833 else if ((new_flags & (EF_PPC_RELOCATABLE | EF_PPC_RELOCATABLE_LIB)) == 0
3834 && (old_flags & EF_PPC_RELOCATABLE) != 0)
3835 {
3836 error = TRUE;
4eca0228 3837 _bfd_error_handler
871b3ab2 3838 (_("%pB: compiled normally and linked with "
8853c3d3
AM
3839 "modules compiled with -mrelocatable"), ibfd);
3840 }
3841
3842 /* The output is -mrelocatable-lib iff both the input files are. */
3843 if (! (new_flags & EF_PPC_RELOCATABLE_LIB))
3844 elf_elfheader (obfd)->e_flags &= ~EF_PPC_RELOCATABLE_LIB;
3845
3846 /* The output is -mrelocatable iff it can't be -mrelocatable-lib,
3847 but each input file is either -mrelocatable or -mrelocatable-lib. */
3848 if (! (elf_elfheader (obfd)->e_flags & EF_PPC_RELOCATABLE_LIB)
3849 && (new_flags & (EF_PPC_RELOCATABLE_LIB | EF_PPC_RELOCATABLE))
3850 && (old_flags & (EF_PPC_RELOCATABLE_LIB | EF_PPC_RELOCATABLE)))
3851 elf_elfheader (obfd)->e_flags |= EF_PPC_RELOCATABLE;
3852
3853 /* Do not warn about eabi vs. V.4 mismatch, just or in the bit if
3854 any module uses it. */
3855 elf_elfheader (obfd)->e_flags |= (new_flags & EF_PPC_EMB);
3856
3857 new_flags &= ~(EF_PPC_RELOCATABLE | EF_PPC_RELOCATABLE_LIB | EF_PPC_EMB);
3858 old_flags &= ~(EF_PPC_RELOCATABLE | EF_PPC_RELOCATABLE_LIB | EF_PPC_EMB);
3859
3860 /* Warn about any other mismatches. */
3861 if (new_flags != old_flags)
3862 {
3863 error = TRUE;
4eca0228 3864 _bfd_error_handler
695344c0 3865 /* xgettext:c-format */
871b3ab2 3866 (_("%pB: uses different e_flags (%#x) fields "
cd9af601
AM
3867 "than previous modules (%#x)"),
3868 ibfd, new_flags, old_flags);
8853c3d3
AM
3869 }
3870
3871 if (error)
3872 {
3873 bfd_set_error (bfd_error_bad_value);
3874 return FALSE;
3875 }
3876 }
3877
3878 return TRUE;
3879}
b9c361e0
JL
3880
3881static void
95f0d0d2 3882ppc_elf_vle_split16 (bfd *input_bfd,
08dc996f
AM
3883 asection *input_section,
3884 unsigned long offset,
95f0d0d2 3885 bfd_byte *loc,
86c95733 3886 bfd_vma value,
08dc996f
AM
3887 split16_format_type split16_format,
3888 bfd_boolean fixup)
b9c361e0 3889{
bb6bf75e 3890 unsigned int insn, opcode;
b9c361e0 3891
95f0d0d2 3892 insn = bfd_get_32 (input_bfd, loc);
bb6bf75e 3893 opcode = insn & E_OPCODE_MASK;
08dc996f
AM
3894 if (opcode == E_OR2I_INSN
3895 || opcode == E_AND2I_DOT_INSN
3896 || opcode == E_OR2IS_INSN
3897 || opcode == E_LIS_INSN
3898 || opcode == E_AND2IS_DOT_INSN)
3899 {
3900 if (split16_format != split16a_type)
3901 {
3902 if (fixup)
3903 split16_format = split16a_type;
3904 else
3905 _bfd_error_handler
3906 /* xgettext:c-format */
871b3ab2 3907 (_("%pB(%pA+0x%lx): expected 16A style relocation on 0x%08x insn"),
08dc996f
AM
3908 input_bfd, input_section, offset, opcode);
3909 }
3910 }
3911 else if (opcode == E_ADD2I_DOT_INSN
3912 || opcode == E_ADD2IS_INSN
3913 || opcode == E_CMP16I_INSN
3914 || opcode == E_MULL2I_INSN
3915 || opcode == E_CMPL16I_INSN
3916 || opcode == E_CMPH16I_INSN
3917 || opcode == E_CMPHL16I_INSN)
3918 {
3919 if (split16_format != split16d_type)
3920 {
3921 if (fixup)
3922 split16_format = split16d_type;
3923 else
3924 _bfd_error_handler
3925 /* xgettext:c-format */
871b3ab2 3926 (_("%pB(%pA+0x%lx): expected 16D style relocation on 0x%08x insn"),
08dc996f
AM
3927 input_bfd, input_section, offset, opcode);
3928 }
3929 }
bb6bf75e
AM
3930 if (split16_format == split16a_type)
3931 {
3932 insn &= ~((0xf800 << 5) | 0x7ff);
3933 insn |= (value & 0xf800) << 5;
3934 if ((insn & E_LI_MASK) == E_LI_INSN)
3935 {
3936 /* Hack for e_li. Extend sign. */
3937 insn &= ~(0xf0000 >> 5);
3938 insn |= (-(value & 0x8000) & 0xf0000) >> 5;
3939 }
3940 }
3941 else
3942 {
3943 insn &= ~((0xf800 << 10) | 0x7ff);
3944 insn |= (value & 0xf800) << 10;
3945 }
86c95733 3946 insn |= value & 0x7ff;
95f0d0d2 3947 bfd_put_32 (input_bfd, insn, loc);
b9c361e0 3948}
83eef883
AFB
3949
3950static void
3951ppc_elf_vle_split20 (bfd *output_bfd, bfd_byte *loc, bfd_vma value)
3952{
3953 unsigned int insn;
3954
3955 insn = bfd_get_32 (output_bfd, loc);
3956 /* We have an li20 field, bits 17..20, 11..15, 21..31. */
3957 /* Top 4 bits of value to 17..20. */
3958 insn |= (value & 0xf0000) >> 5;
3959 /* Next 5 bits of the value to 11..15. */
3960 insn |= (value & 0xf800) << 5;
3961 /* And the final 11 bits of the value to bits 21 to 31. */
3962 insn |= value & 0x7ff;
3963 bfd_put_32 (output_bfd, insn, loc);
3964}
3965
8853c3d3 3966\f
d7128ce4
AM
3967/* Choose which PLT scheme to use, and set .plt flags appropriately.
3968 Returns -1 on error, 0 for old PLT, 1 for new PLT. */
3969int
3970ppc_elf_select_plt_layout (bfd *output_bfd ATTRIBUTE_UNUSED,
5446cbdf 3971 struct bfd_link_info *info)
d7128ce4
AM
3972{
3973 struct ppc_elf_link_hash_table *htab;
9d8504b1 3974 flagword flags;
d7128ce4
AM
3975
3976 htab = ppc_elf_hash_table (info);
4a3dc543
RS
3977
3978 if (htab->plt_type == PLT_UNSET)
016687f8 3979 {
b3874e1a
AM
3980 struct elf_link_hash_entry *h;
3981
5446cbdf 3982 if (htab->params->plt_style == PLT_OLD)
016687f8 3983 htab->plt_type = PLT_OLD;
0e1862bb 3984 else if (bfd_link_pic (info)
b3874e1a
AM
3985 && htab->elf.dynamic_sections_created
3986 && (h = elf_link_hash_lookup (&htab->elf, "_mcount",
3987 FALSE, FALSE, TRUE)) != NULL
3988 && (h->type == STT_FUNC
3989 || h->needs_plt)
3990 && h->ref_regular
3991 && !(SYMBOL_CALLS_LOCAL (info, h)
21d68fcd 3992 || UNDEFWEAK_NO_DYNAMIC_RELOC (info, h)))
b3874e1a
AM
3993 {
3994 /* Profiling of shared libs (and pies) is not supported with
3995 secure plt, because ppc32 does profiling before a
3996 function prologue and a secure plt pic call stubs needs
3997 r30 to be set up. */
3998 htab->plt_type = PLT_OLD;
3999 }
016687f8
AM
4000 else
4001 {
4002 bfd *ibfd;
5446cbdf 4003 enum ppc_elf_plt_type plt_type = htab->params->plt_style;
016687f8
AM
4004
4005 /* Look through the reloc flags left by ppc_elf_check_relocs.
4006 Use the old style bss plt if a file makes plt calls
4007 without using the new relocs, and if ld isn't given
4008 --secure-plt and we never see REL16 relocs. */
4009 if (plt_type == PLT_UNSET)
4010 plt_type = PLT_OLD;
c72f2fb2 4011 for (ibfd = info->input_bfds; ibfd; ibfd = ibfd->link.next)
0c8d6e5c 4012 if (is_ppc_elf (ibfd))
016687f8
AM
4013 {
4014 if (ppc_elf_tdata (ibfd)->has_rel16)
4015 plt_type = PLT_NEW;
4016 else if (ppc_elf_tdata (ibfd)->makes_plt_call)
4017 {
4018 plt_type = PLT_OLD;
4019 htab->old_bfd = ibfd;
4020 break;
4021 }
4022 }
4023 htab->plt_type = plt_type;
4024 }
4025 }
5446cbdf 4026 if (htab->plt_type == PLT_OLD && htab->params->plt_style == PLT_NEW)
b3874e1a
AM
4027 {
4028 if (htab->old_bfd != NULL)
cf97bcb0 4029 _bfd_error_handler (_("bss-plt forced due to %pB"), htab->old_bfd);
b3874e1a 4030 else
cf97bcb0 4031 _bfd_error_handler (_("bss-plt forced by profiling"));
b3874e1a 4032 }
d7128ce4 4033
4a3dc543 4034 BFD_ASSERT (htab->plt_type != PLT_VXWORKS);
9d8504b1 4035
4a3dc543 4036 if (htab->plt_type == PLT_NEW)
9d8504b1
PB
4037 {
4038 flags = (SEC_ALLOC | SEC_LOAD | SEC_HAS_CONTENTS
4039 | SEC_IN_MEMORY | SEC_LINKER_CREATED);
86b9da88
AM
4040
4041 /* The new PLT is a loaded section. */
ce558b89 4042 if (htab->elf.splt != NULL
fd361982 4043 && !bfd_set_section_flags (htab->elf.splt, flags))
86b9da88
AM
4044 return -1;
4045
4046 /* The new GOT is not executable. */
ce558b89 4047 if (htab->elf.sgot != NULL
fd361982 4048 && !bfd_set_section_flags (htab->elf.sgot, flags))
86b9da88 4049 return -1;
d7128ce4
AM
4050 }
4051 else
4052 {
4053 /* Stop an unused .glink section from affecting .text alignment. */
86b9da88 4054 if (htab->glink != NULL
fd361982 4055 && !bfd_set_section_alignment (htab->glink, 0))
86b9da88 4056 return -1;
d7128ce4 4057 }
4a3dc543 4058 return htab->plt_type == PLT_NEW;
d7128ce4
AM
4059}
4060\f
25dbc73a
AM
4061/* Return the section that should be marked against GC for a given
4062 relocation. */
586119b3 4063
25dbc73a
AM
4064static asection *
4065ppc_elf_gc_mark_hook (asection *sec,
07adf181 4066 struct bfd_link_info *info,
25dbc73a
AM
4067 Elf_Internal_Rela *rel,
4068 struct elf_link_hash_entry *h,
4069 Elf_Internal_Sym *sym)
4070{
4071 if (h != NULL)
07adf181
AM
4072 switch (ELF32_R_TYPE (rel->r_info))
4073 {
4074 case R_PPC_GNU_VTINHERIT:
4075 case R_PPC_GNU_VTENTRY:
4076 return NULL;
4077 }
4078
4079 return _bfd_elf_gc_mark_hook (sec, info, rel, h, sym);
25dbc73a 4080}
49c09209
AM
4081
4082static bfd_boolean
4083get_sym_h (struct elf_link_hash_entry **hp,
4084 Elf_Internal_Sym **symp,
4085 asection **symsecp,
4086 unsigned char **tls_maskp,
4087 Elf_Internal_Sym **locsymsp,
4088 unsigned long r_symndx,
4089 bfd *ibfd)
4090{
4091 Elf_Internal_Shdr *symtab_hdr = &elf_symtab_hdr (ibfd);
4092
4093 if (r_symndx >= symtab_hdr->sh_info)
4094 {
4095 struct elf_link_hash_entry **sym_hashes = elf_sym_hashes (ibfd);
4096 struct elf_link_hash_entry *h;
4097
4098 h = sym_hashes[r_symndx - symtab_hdr->sh_info];
4099 while (h->root.type == bfd_link_hash_indirect
4100 || h->root.type == bfd_link_hash_warning)
4101 h = (struct elf_link_hash_entry *) h->root.u.i.link;
4102
4103 if (hp != NULL)
4104 *hp = h;
4105
4106 if (symp != NULL)
4107 *symp = NULL;
4108
4109 if (symsecp != NULL)
4110 {
4111 asection *symsec = NULL;
4112 if (h->root.type == bfd_link_hash_defined
4113 || h->root.type == bfd_link_hash_defweak)
4114 symsec = h->root.u.def.section;
4115 *symsecp = symsec;
4116 }
4117
4118 if (tls_maskp != NULL)
4119 *tls_maskp = &ppc_elf_hash_entry (h)->tls_mask;
4120 }
4121 else
4122 {
4123 Elf_Internal_Sym *sym;
4124 Elf_Internal_Sym *locsyms = *locsymsp;
4125
4126 if (locsyms == NULL)
4127 {
4128 locsyms = (Elf_Internal_Sym *) symtab_hdr->contents;
4129 if (locsyms == NULL)
4130 locsyms = bfd_elf_get_elf_syms (ibfd, symtab_hdr,
4131 symtab_hdr->sh_info,
4132 0, NULL, NULL, NULL);
4133 if (locsyms == NULL)
4134 return FALSE;
4135 *locsymsp = locsyms;
4136 }
4137 sym = locsyms + r_symndx;
4138
4139 if (hp != NULL)
4140 *hp = NULL;
4141
4142 if (symp != NULL)
4143 *symp = sym;
4144
4145 if (symsecp != NULL)
4146 *symsecp = bfd_section_from_elf_index (ibfd, sym->st_shndx);
4147
4148 if (tls_maskp != NULL)
4149 {
4150 bfd_signed_vma *local_got;
4151 unsigned char *tls_mask;
4152
4153 tls_mask = NULL;
4154 local_got = elf_local_got_refcounts (ibfd);
4155 if (local_got != NULL)
4156 {
4157 struct plt_entry **local_plt = (struct plt_entry **)
4158 (local_got + symtab_hdr->sh_info);
4159 unsigned char *lgot_masks = (unsigned char *)
4160 (local_plt + symtab_hdr->sh_info);
4161 tls_mask = &lgot_masks[r_symndx];
4162 }
4163 *tls_maskp = tls_mask;
4164 }
4165 }
4166 return TRUE;
4167}
25dbc73a 4168\f
3e04d765
AM
4169/* Analyze inline PLT call relocations to see whether calls to locally
4170 defined functions can be converted to direct calls. */
4171
4172bfd_boolean
4173ppc_elf_inline_plt (struct bfd_link_info *info)
4174{
4175 struct ppc_elf_link_hash_table *htab;
4176 bfd *ibfd;
4177 asection *sec;
4178 bfd_vma low_vma, high_vma, limit;
4179
4180 htab = ppc_elf_hash_table (info);
4181 if (htab == NULL)
4182 return FALSE;
4183
4184 /* A bl insn can reach -0x2000000 to 0x1fffffc. The limit is
4185 reduced somewhat to cater for possible stubs that might be added
4186 between the call and its destination. */
4187 limit = 0x1e00000;
4188 low_vma = -1;
4189 high_vma = 0;
4190 for (sec = info->output_bfd->sections; sec != NULL; sec = sec->next)
4191 if ((sec->flags & (SEC_ALLOC | SEC_CODE)) == (SEC_ALLOC | SEC_CODE))
4192 {
4193 if (low_vma > sec->vma)
4194 low_vma = sec->vma;
4195 if (high_vma < sec->vma + sec->size)
4196 high_vma = sec->vma + sec->size;
4197 }
4198
4199 /* If a "bl" can reach anywhere in local code sections, then we can
4200 convert all inline PLT sequences to direct calls when the symbol
4201 is local. */
4202 if (high_vma - low_vma < limit)
4203 {
4204 htab->can_convert_all_inline_plt = 1;
4205 return TRUE;
4206 }
4207
4208 /* Otherwise, go looking through relocs for cases where a direct
4209 call won't reach. Mark the symbol on any such reloc to disable
4210 the optimization and keep the PLT entry as it seems likely that
4211 this will be better than creating trampolines. Note that this
4212 will disable the optimization for all inline PLT calls to a
4213 particular symbol, not just those that won't reach. The
4214 difficulty in doing a more precise optimization is that the
4215 linker needs to make a decision depending on whether a
4216 particular R_PPC_PLTCALL insn can be turned into a direct
4217 call, for each of the R_PPC_PLTSEQ and R_PPC_PLT16* insns in
4218 the sequence, and there is nothing that ties those relocs
4219 together except their symbol. */
4220
4221 for (ibfd = info->input_bfds; ibfd != NULL; ibfd = ibfd->link.next)
4222 {
4223 Elf_Internal_Shdr *symtab_hdr;
4224 Elf_Internal_Sym *local_syms;
4225
4226 if (!is_ppc_elf (ibfd))
4227 continue;
4228
4229 local_syms = NULL;
4230 symtab_hdr = &elf_symtab_hdr (ibfd);
4231
4232 for (sec = ibfd->sections; sec != NULL; sec = sec->next)
4233 if (sec->has_pltcall
4234 && !bfd_is_abs_section (sec->output_section))
4235 {
4236 Elf_Internal_Rela *relstart, *rel, *relend;
4237
4238 /* Read the relocations. */
4239 relstart = _bfd_elf_link_read_relocs (ibfd, sec, NULL, NULL,
4240 info->keep_memory);
4241 if (relstart == NULL)
4242 return FALSE;
4243
4244 relend = relstart + sec->reloc_count;
4245 for (rel = relstart; rel < relend; )
4246 {
4247 enum elf_ppc_reloc_type r_type;
4248 unsigned long r_symndx;
4249 asection *sym_sec;
4250 struct elf_link_hash_entry *h;
4251 Elf_Internal_Sym *sym;
4252 unsigned char *tls_maskp;
4253
4254 r_type = ELF32_R_TYPE (rel->r_info);
4255 if (r_type != R_PPC_PLTCALL)
4256 continue;
4257
4258 r_symndx = ELF32_R_SYM (rel->r_info);
4259 if (!get_sym_h (&h, &sym, &sym_sec, &tls_maskp, &local_syms,
4260 r_symndx, ibfd))
4261 {
4262 if (elf_section_data (sec)->relocs != relstart)
4263 free (relstart);
c9594989 4264 if (symtab_hdr->contents != (unsigned char *) local_syms)
3e04d765
AM
4265 free (local_syms);
4266 return FALSE;
4267 }
4268
4269 if (sym_sec != NULL && sym_sec->output_section != NULL)
4270 {
4271 bfd_vma from, to;
4272 if (h != NULL)
4273 to = h->root.u.def.value;
4274 else
4275 to = sym->st_value;
4276 to += (rel->r_addend
4277 + sym_sec->output_offset
4278 + sym_sec->output_section->vma);
4279 from = (rel->r_offset
4280 + sec->output_offset
4281 + sec->output_section->vma);
4282 if (to - from + limit < 2 * limit)
4283 *tls_maskp &= ~PLT_KEEP;
4284 }
4285 }
4286 if (elf_section_data (sec)->relocs != relstart)
4287 free (relstart);
4288 }
4289
4290 if (local_syms != NULL
4291 && symtab_hdr->contents != (unsigned char *) local_syms)
4292 {
4293 if (!info->keep_memory)
4294 free (local_syms);
4295 else
4296 symtab_hdr->contents = (unsigned char *) local_syms;
4297 }
4298 }
4299
4300 return TRUE;
4301}
4302
3a71aa26
AM
4303/* Set plt output section type, htab->tls_get_addr, and call the
4304 generic ELF tls_setup function. */
7fce784e 4305
25dbc73a 4306asection *
5446cbdf 4307ppc_elf_tls_setup (bfd *obfd, struct bfd_link_info *info)
7fce784e 4308{
25dbc73a 4309 struct ppc_elf_link_hash_table *htab;
7fce784e 4310
25dbc73a 4311 htab = ppc_elf_hash_table (info);
a7f2871e
AM
4312 htab->tls_get_addr = elf_link_hash_lookup (&htab->elf, "__tls_get_addr",
4313 FALSE, FALSE, TRUE);
f01f1741
AM
4314 if (htab->plt_type != PLT_NEW)
4315 htab->params->no_tls_get_addr_opt = TRUE;
4316
5446cbdf 4317 if (!htab->params->no_tls_get_addr_opt)
a7f2871e
AM
4318 {
4319 struct elf_link_hash_entry *opt, *tga;
4320 opt = elf_link_hash_lookup (&htab->elf, "__tls_get_addr_opt",
4321 FALSE, FALSE, TRUE);
4322 if (opt != NULL
4323 && (opt->root.type == bfd_link_hash_defined
4324 || opt->root.type == bfd_link_hash_defweak))
4325 {
4326 /* If glibc supports an optimized __tls_get_addr call stub,
4327 signalled by the presence of __tls_get_addr_opt, and we'll
4328 be calling __tls_get_addr via a plt call stub, then
4329 make __tls_get_addr point to __tls_get_addr_opt. */
4330 tga = htab->tls_get_addr;
4331 if (htab->elf.dynamic_sections_created
4332 && tga != NULL
4333 && (tga->type == STT_FUNC
4334 || tga->needs_plt)
4335 && !(SYMBOL_CALLS_LOCAL (info, tga)
21d68fcd 4336 || UNDEFWEAK_NO_DYNAMIC_RELOC (info, tga)))
a7f2871e
AM
4337 {
4338 struct plt_entry *ent;
32af9f6e
AM
4339 for (ent = tga->plt.plist; ent != NULL; ent = ent->next)
4340 if (ent->plt.refcount > 0)
4341 break;
4342 if (ent != NULL)
a7f2871e
AM
4343 {
4344 tga->root.type = bfd_link_hash_indirect;
4345 tga->root.u.i.link = &opt->root;
4346 ppc_elf_copy_indirect_symbol (info, opt, tga);
b531344c 4347 opt->mark = 1;
a7f2871e
AM
4348 if (opt->dynindx != -1)
4349 {
4350 /* Use __tls_get_addr_opt in dynamic relocations. */
4351 opt->dynindx = -1;
4352 _bfd_elf_strtab_delref (elf_hash_table (info)->dynstr,
4353 opt->dynstr_index);
4354 if (!bfd_elf_link_record_dynamic_symbol (info, opt))
4355 return FALSE;
4356 }
4357 htab->tls_get_addr = opt;
4358 }
4359 }
4360 }
4361 else
5446cbdf 4362 htab->params->no_tls_get_addr_opt = TRUE;
a7f2871e 4363 }
4a3dc543 4364 if (htab->plt_type == PLT_NEW
ce558b89
AM
4365 && htab->elf.splt != NULL
4366 && htab->elf.splt->output_section != NULL)
d7128ce4 4367 {
ce558b89
AM
4368 elf_section_type (htab->elf.splt->output_section) = SHT_PROGBITS;
4369 elf_section_flags (htab->elf.splt->output_section) = SHF_ALLOC + SHF_WRITE;
d7128ce4
AM
4370 }
4371
25dbc73a 4372 return _bfd_elf_tls_setup (obfd, info);
7fce784e
AS
4373}
4374
3a71aa26
AM
4375/* Return TRUE iff REL is a branch reloc with a global symbol matching
4376 HASH. */
4377
4378static bfd_boolean
4379branch_reloc_hash_match (const bfd *ibfd,
4380 const Elf_Internal_Rela *rel,
4381 const struct elf_link_hash_entry *hash)
4382{
4383 Elf_Internal_Shdr *symtab_hdr = &elf_symtab_hdr (ibfd);
4384 enum elf_ppc_reloc_type r_type = ELF32_R_TYPE (rel->r_info);
4385 unsigned int r_symndx = ELF32_R_SYM (rel->r_info);
4386
e054468f 4387 if (r_symndx >= symtab_hdr->sh_info && is_branch_reloc (r_type))
3a71aa26
AM
4388 {
4389 struct elf_link_hash_entry **sym_hashes = elf_sym_hashes (ibfd);
4390 struct elf_link_hash_entry *h;
4391
4392 h = sym_hashes[r_symndx - symtab_hdr->sh_info];
4393 while (h->root.type == bfd_link_hash_indirect
4394 || h->root.type == bfd_link_hash_warning)
4395 h = (struct elf_link_hash_entry *) h->root.u.i.link;
4396 if (h == hash)
4397 return TRUE;
4398 }
4399 return FALSE;
4400}
4401
25dbc73a
AM
4402/* Run through all the TLS relocs looking for optimization
4403 opportunities. */
252b5132 4404
25dbc73a
AM
4405bfd_boolean
4406ppc_elf_tls_optimize (bfd *obfd ATTRIBUTE_UNUSED,
4407 struct bfd_link_info *info)
252b5132 4408{
7fce784e 4409 bfd *ibfd;
25dbc73a
AM
4410 asection *sec;
4411 struct ppc_elf_link_hash_table *htab;
b7fcf6f6 4412 int pass;
252b5132 4413
3cbc1e5e 4414 if (!bfd_link_executable (info))
25dbc73a 4415 return TRUE;
252b5132 4416
7619e7c7 4417 htab = ppc_elf_hash_table (info);
663a1470
AM
4418 if (htab == NULL)
4419 return FALSE;
4420
252dcdf4
AM
4421 htab->do_tls_opt = 1;
4422
b7fcf6f6
AM
4423 /* Make two passes through the relocs. First time check that tls
4424 relocs involved in setting up a tls_get_addr call are indeed
663a1470
AM
4425 followed by such a call. If they are not, don't do any tls
4426 optimization. On the second pass twiddle tls_mask flags to
4427 notify relocate_section that optimization can be done, and
4428 adjust got and plt refcounts. */
b7fcf6f6 4429 for (pass = 0; pass < 2; ++pass)
c72f2fb2 4430 for (ibfd = info->input_bfds; ibfd != NULL; ibfd = ibfd->link.next)
b7fcf6f6 4431 {
0ffa91dd 4432 Elf_Internal_Shdr *symtab_hdr = &elf_symtab_hdr (ibfd);
32af9f6e 4433 asection *got2 = bfd_get_section_by_name (ibfd, ".got2");
7619e7c7 4434
b7fcf6f6
AM
4435 for (sec = ibfd->sections; sec != NULL; sec = sec->next)
4436 if (sec->has_tls_reloc && !bfd_is_abs_section (sec->output_section))
4437 {
4438 Elf_Internal_Rela *relstart, *rel, *relend;
663a1470 4439 int expecting_tls_get_addr = 0;
252b5132 4440
b7fcf6f6
AM
4441 /* Read the relocations. */
4442 relstart = _bfd_elf_link_read_relocs (ibfd, sec, NULL, NULL,
4443 info->keep_memory);
4444 if (relstart == NULL)
4445 return FALSE;
7619e7c7 4446
b7fcf6f6
AM
4447 relend = relstart + sec->reloc_count;
4448 for (rel = relstart; rel < relend; rel++)
4449 {
4450 enum elf_ppc_reloc_type r_type;
4451 unsigned long r_symndx;
4452 struct elf_link_hash_entry *h = NULL;
bac3c8c5 4453 unsigned char *tls_mask;
37da22e5 4454 unsigned char tls_set, tls_clear;
b7fcf6f6 4455 bfd_boolean is_local;
b7fcf6f6
AM
4456 bfd_signed_vma *got_count;
4457
4458 r_symndx = ELF32_R_SYM (rel->r_info);
4459 if (r_symndx >= symtab_hdr->sh_info)
4460 {
4461 struct elf_link_hash_entry **sym_hashes;
7fce784e 4462
b7fcf6f6
AM
4463 sym_hashes = elf_sym_hashes (ibfd);
4464 h = sym_hashes[r_symndx - symtab_hdr->sh_info];
4465 while (h->root.type == bfd_link_hash_indirect
4466 || h->root.type == bfd_link_hash_warning)
4467 h = (struct elf_link_hash_entry *) h->root.u.i.link;
4468 }
7619e7c7 4469
f749f26e 4470 is_local = SYMBOL_REFERENCES_LOCAL (info, h);
b7fcf6f6 4471 r_type = ELF32_R_TYPE (rel->r_info);
663a1470
AM
4472 /* If this section has old-style __tls_get_addr calls
4473 without marker relocs, then check that each
4474 __tls_get_addr call reloc is preceded by a reloc
4475 that conceivably belongs to the __tls_get_addr arg
4476 setup insn. If we don't find matching arg setup
4477 relocs, don't do any tls optimization. */
4478 if (pass == 0
9737e8af 4479 && sec->nomark_tls_get_addr
663a1470
AM
4480 && h != NULL
4481 && h == htab->tls_get_addr
4482 && !expecting_tls_get_addr
4483 && is_branch_reloc (r_type))
4484 {
25f53a85 4485 info->callbacks->minfo ("%H __tls_get_addr lost arg, "
663a1470
AM
4486 "TLS optimization disabled\n",
4487 ibfd, sec, rel->r_offset);
4488 if (elf_section_data (sec)->relocs != relstart)
4489 free (relstart);
4490 return TRUE;
4491 }
4492
4493 expecting_tls_get_addr = 0;
b7fcf6f6
AM
4494 switch (r_type)
4495 {
4496 case R_PPC_GOT_TLSLD16:
4497 case R_PPC_GOT_TLSLD16_LO:
4498 expecting_tls_get_addr = 1;
1a0670f3 4499 /* Fall through. */
b7fcf6f6
AM
4500
4501 case R_PPC_GOT_TLSLD16_HI:
4502 case R_PPC_GOT_TLSLD16_HA:
4503 /* These relocs should never be against a symbol
4504 defined in a shared lib. Leave them alone if
4505 that turns out to be the case. */
4506 if (!is_local)
4507 continue;
4508
4509 /* LD -> LE */
4510 tls_set = 0;
4511 tls_clear = TLS_LD;
4512 break;
4513
4514 case R_PPC_GOT_TLSGD16:
4515 case R_PPC_GOT_TLSGD16_LO:
4516 expecting_tls_get_addr = 1;
1a0670f3 4517 /* Fall through. */
b7fcf6f6
AM
4518
4519 case R_PPC_GOT_TLSGD16_HI:
4520 case R_PPC_GOT_TLSGD16_HA:
4521 if (is_local)
4522 /* GD -> LE */
4523 tls_set = 0;
4524 else
4525 /* GD -> IE */
b00a0a86 4526 tls_set = TLS_TLS | TLS_GDIE;
b7fcf6f6
AM
4527 tls_clear = TLS_GD;
4528 break;
4529
4530 case R_PPC_GOT_TPREL16:
4531 case R_PPC_GOT_TPREL16_LO:
4532 case R_PPC_GOT_TPREL16_HI:
4533 case R_PPC_GOT_TPREL16_HA:
4534 if (is_local)
4535 {
4536 /* IE -> LE */
4537 tls_set = 0;
4538 tls_clear = TLS_TPREL;
4539 break;
4540 }
4541 else
4542 continue;
4543
32af9f6e 4544 case R_PPC_TLSLD:
7d04a20a
AM
4545 if (!is_local)
4546 continue;
4547 /* Fall through. */
4548 case R_PPC_TLSGD:
23cedd1d
AM
4549 if (rel + 1 < relend
4550 && is_plt_seq_reloc (ELF32_R_TYPE (rel[1].r_info)))
4551 {
4552 if (pass != 0
4553 && ELF32_R_TYPE (rel[1].r_info) != R_PPC_PLTSEQ)
4554 {
4555 r_type = ELF32_R_TYPE (rel[1].r_info);
4556 r_symndx = ELF32_R_SYM (rel[1].r_info);
4557 if (r_symndx >= symtab_hdr->sh_info)
4558 {
4559 struct elf_link_hash_entry **sym_hashes;
4560
4561 sym_hashes = elf_sym_hashes (ibfd);
4562 h = sym_hashes[r_symndx - symtab_hdr->sh_info];
4563 while (h->root.type == bfd_link_hash_indirect
4564 || h->root.type == bfd_link_hash_warning)
4565 h = (struct elf_link_hash_entry *) h->root.u.i.link;
4566 if (h != NULL)
4567 {
4568 struct plt_entry *ent = NULL;
4569 bfd_vma addend = 0;
4570
4571 if (bfd_link_pic (info))
4572 addend = rel->r_addend;
4573 ent = find_plt_ent (&h->plt.plist,
4574 got2, addend);
4575 if (ent != NULL
4576 && ent->plt.refcount > 0)
4577 ent->plt.refcount -= 1;
4578 }
4579 }
4580 }
4581 continue;
4582 }
32af9f6e
AM
4583 expecting_tls_get_addr = 2;
4584 tls_set = 0;
4585 tls_clear = 0;
4586 break;
4587
252dcdf4
AM
4588 case R_PPC_TPREL16_HA:
4589 if (pass == 0)
4590 {
4591 unsigned char buf[4];
4592 unsigned int insn;
4593 bfd_vma off = rel->r_offset & ~3;
4594 if (!bfd_get_section_contents (ibfd, sec, buf,
4595 off, 4))
4596 {
4597 if (elf_section_data (sec)->relocs != relstart)
4598 free (relstart);
4599 return FALSE;
4600 }
4601 insn = bfd_get_32 (ibfd, buf);
4602 /* addis rt,2,imm */
4603 if ((insn & ((0x3fu << 26) | 0x1f << 16))
4604 != ((15u << 26) | (2 << 16)))
4605 {
4606 /* xgettext:c-format */
4607 info->callbacks->minfo
4608 (_("%H: warning: %s unexpected insn %#x.\n"),
4609 ibfd, sec, off, "R_PPC_TPREL16_HA", insn);
4610 htab->do_tls_opt = 0;
4611 }
4612 }
4613 continue;
4614
4615 case R_PPC_TPREL16_HI:
4616 htab->do_tls_opt = 0;
4617 continue;
4618
b7fcf6f6 4619 default:
25dbc73a 4620 continue;
b7fcf6f6 4621 }
25dbc73a 4622
b7fcf6f6
AM
4623 if (pass == 0)
4624 {
727fc41e 4625 if (!expecting_tls_get_addr
9737e8af 4626 || !sec->nomark_tls_get_addr)
b7fcf6f6 4627 continue;
25dbc73a 4628
3a71aa26
AM
4629 if (rel + 1 < relend
4630 && branch_reloc_hash_match (ibfd, rel + 1,
4631 htab->tls_get_addr))
4632 continue;
25dbc73a 4633
b7fcf6f6
AM
4634 /* Uh oh, we didn't find the expected call. We
4635 could just mark this symbol to exclude it
4636 from tls optimization but it's safer to skip
663a1470 4637 the entire optimization. */
25f53a85 4638 info->callbacks->minfo (_("%H arg lost __tls_get_addr, "
663a1470
AM
4639 "TLS optimization disabled\n"),
4640 ibfd, sec, rel->r_offset);
4641 if (elf_section_data (sec)->relocs != relstart)
4642 free (relstart);
4643 return TRUE;
b7fcf6f6 4644 }
25dbc73a 4645
b7fcf6f6
AM
4646 if (h != NULL)
4647 {
4648 tls_mask = &ppc_elf_hash_entry (h)->tls_mask;
4649 got_count = &h->got.refcount;
4650 }
4651 else
4652 {
b7fcf6f6 4653 bfd_signed_vma *lgot_refs;
e054468f 4654 struct plt_entry **local_plt;
bac3c8c5 4655 unsigned char *lgot_masks;
25dbc73a 4656
b7fcf6f6
AM
4657 lgot_refs = elf_local_got_refcounts (ibfd);
4658 if (lgot_refs == NULL)
4659 abort ();
e054468f
AM
4660 local_plt = (struct plt_entry **)
4661 (lgot_refs + symtab_hdr->sh_info);
bac3c8c5
AM
4662 lgot_masks = (unsigned char *)
4663 (local_plt + symtab_hdr->sh_info);
b7fcf6f6
AM
4664 tls_mask = &lgot_masks[r_symndx];
4665 got_count = &lgot_refs[r_symndx];
4666 }
25dbc73a 4667
37da22e5
AM
4668 /* If we don't have old-style __tls_get_addr calls
4669 without TLSGD/TLSLD marker relocs, and we haven't
4670 found a new-style __tls_get_addr call with a
4671 marker for this symbol, then we either have a
4672 broken object file or an -mlongcall style
4673 indirect call to __tls_get_addr without a marker.
4674 Disable optimization in this case. */
4675 if ((tls_clear & (TLS_GD | TLS_LD)) != 0
9737e8af 4676 && !sec->nomark_tls_get_addr
37da22e5
AM
4677 && ((*tls_mask & (TLS_TLS | TLS_MARK))
4678 != (TLS_TLS | TLS_MARK)))
4679 continue;
4680
7d04a20a 4681 if (expecting_tls_get_addr == 1 + !sec->nomark_tls_get_addr)
37da22e5
AM
4682 {
4683 struct plt_entry *ent;
4684 bfd_vma addend = 0;
4685
4686 if (bfd_link_pic (info)
23cedd1d
AM
4687 && (ELF32_R_TYPE (rel[1].r_info) == R_PPC_PLTREL24
4688 || ELF32_R_TYPE (rel[1].r_info) == R_PPC_PLTCALL))
37da22e5
AM
4689 addend = rel[1].r_addend;
4690 ent = find_plt_ent (&htab->tls_get_addr->plt.plist,
4691 got2, addend);
4692 if (ent != NULL && ent->plt.refcount > 0)
4693 ent->plt.refcount -= 1;
37da22e5 4694 }
7d04a20a
AM
4695 if (tls_clear == 0)
4696 continue;
37da22e5 4697
b7fcf6f6
AM
4698 if (tls_set == 0)
4699 {
4700 /* We managed to get rid of a got entry. */
4701 if (*got_count > 0)
4702 *got_count -= 1;
4703 }
25dbc73a 4704
b7fcf6f6
AM
4705 *tls_mask |= tls_set;
4706 *tls_mask &= ~tls_clear;
4707 }
25dbc73a 4708
b7fcf6f6
AM
4709 if (elf_section_data (sec)->relocs != relstart)
4710 free (relstart);
4711 }
b7fcf6f6 4712 }
25dbc73a
AM
4713 return TRUE;
4714}
4715\f
287c7eaf
AM
4716/* Return true if we have dynamic relocs against H or any of its weak
4717 aliases, that apply to read-only sections. Cannot be used after
4718 size_dynamic_sections. */
4719
4720static bfd_boolean
4721alias_readonly_dynrelocs (struct elf_link_hash_entry *h)
4722{
4723 struct ppc_elf_link_hash_entry *eh = ppc_elf_hash_entry (h);
4724 do
4725 {
5dbc8b37 4726 if (_bfd_elf_readonly_dynrelocs (&eh->elf))
287c7eaf
AM
4727 return TRUE;
4728 eh = ppc_elf_hash_entry (eh->elf.u.alias);
4729 } while (eh != NULL && &eh->elf != h);
4730
4731 return FALSE;
4732}
4733
4734/* Return whether H has pc-relative dynamic relocs. */
4735
4736static bfd_boolean
4737pc_dynrelocs (struct elf_link_hash_entry *h)
4738{
4739 struct elf_dyn_relocs *p;
4740
190eb1dd 4741 for (p = h->dyn_relocs; p != NULL; p = p->next)
287c7eaf
AM
4742 if (p->pc_count != 0)
4743 return TRUE;
4744 return FALSE;
4745}
4746
25dbc73a
AM
4747/* Adjust a symbol defined by a dynamic object and referenced by a
4748 regular object. The current definition is in some section of the
4749 dynamic object, but we're not including those sections. We have to
4750 change the definition to something the rest of the link can
4751 understand. */
7fce784e 4752
25dbc73a
AM
4753static bfd_boolean
4754ppc_elf_adjust_dynamic_symbol (struct bfd_link_info *info,
4755 struct elf_link_hash_entry *h)
4756{
4757 struct ppc_elf_link_hash_table *htab;
4758 asection *s;
7fce784e 4759
25dbc73a
AM
4760#ifdef DEBUG
4761 fprintf (stderr, "ppc_elf_adjust_dynamic_symbol called for %s\n",
4762 h->root.root.string);
4763#endif
252b5132 4764
25dbc73a
AM
4765 /* Make sure we know what is going on here. */
4766 htab = ppc_elf_hash_table (info);
4767 BFD_ASSERT (htab->elf.dynobj != NULL
4768 && (h->needs_plt
91e21fb7 4769 || h->type == STT_GNU_IFUNC
60d67dc8 4770 || h->is_weakalias
25dbc73a
AM
4771 || (h->def_dynamic
4772 && h->ref_regular
4773 && !h->def_regular)));
252b5132 4774
25dbc73a
AM
4775 /* Deal with function syms. */
4776 if (h->type == STT_FUNC
e054468f 4777 || h->type == STT_GNU_IFUNC
25dbc73a
AM
4778 || h->needs_plt)
4779 {
529fe20e
AM
4780 bfd_boolean local = (SYMBOL_CALLS_LOCAL (info, h)
4781 || UNDEFWEAK_NO_DYNAMIC_RELOC (info, h));
287c7eaf
AM
4782 /* Discard dyn_relocs when non-pic if we've decided that a
4783 function symbol is local. */
4784 if (!bfd_link_pic (info) && local)
190eb1dd 4785 h->dyn_relocs = NULL;
529fe20e 4786
25dbc73a
AM
4787 /* Clear procedure linkage table information for any symbol that
4788 won't need a .plt entry. */
a6aa5195
AM
4789 struct plt_entry *ent;
4790 for (ent = h->plt.plist; ent != NULL; ent = ent->next)
4791 if (ent->plt.refcount > 0)
4792 break;
4793 if (ent == NULL
2d7ad24e
AM
4794 || (h->type != STT_GNU_IFUNC
4795 && local
3e04d765
AM
4796 && (htab->can_convert_all_inline_plt
4797 || (ppc_elf_hash_entry (h)->tls_mask
4798 & (TLS_TLS | PLT_KEEP)) != PLT_KEEP)))
252b5132 4799 {
25dbc73a 4800 /* A PLT entry is not required/allowed when:
252b5132 4801
25dbc73a
AM
4802 1. We are not using ld.so; because then the PLT entry
4803 can't be set up, so we can't use one. In this case,
4804 ppc_elf_adjust_dynamic_symbol won't even be called.
252b5132 4805
25dbc73a
AM
4806 2. GC has rendered the entry unused.
4807
4808 3. We know for certain that a call to this symbol
4809 will go to this object, or will remain undefined. */
a6aa5195 4810 h->plt.plist = NULL;
25dbc73a 4811 h->needs_plt = 0;
d1eca1e4 4812 h->pointer_equality_needed = 0;
25dbc73a 4813 }
625af618
AM
4814 else
4815 {
d1eca1e4
AM
4816 /* Taking a function's address in a read/write section
4817 doesn't require us to define the function symbol in the
1009ef28 4818 executable on a plt call stub. A dynamic reloc can
f0158f44
AM
4819 be used instead, giving better runtime performance.
4820 (Calls via that function pointer don't need to bounce
4821 through the plt call stub.) Similarly, use a dynamic
4822 reloc for a weak reference when possible, allowing the
4823 resolution of the symbol to be set at load time rather
4824 than link time. */
4825 if ((h->pointer_equality_needed
3988aed5
AM
4826 || (h->non_got_ref
4827 && !h->ref_regular_nonweak
4828 && !UNDEFWEAK_NO_DYNAMIC_RELOC (info, h)))
90c14f0c 4829 && htab->elf.target_os != is_vxworks
1009ef28 4830 && !ppc_elf_hash_entry (h)->has_sda_refs
5dbc8b37 4831 && !_bfd_elf_readonly_dynrelocs (h))
d1eca1e4
AM
4832 {
4833 h->pointer_equality_needed = 0;
04383fd1
AM
4834 /* If we haven't seen a branch reloc and the symbol
4835 isn't an ifunc then we don't need a plt entry. */
4836 if (!h->needs_plt && h->type != STT_GNU_IFUNC)
3988aed5 4837 h->plt.plist = NULL;
d1eca1e4 4838 }
287c7eaf 4839 else if (!bfd_link_pic (info))
529fe20e
AM
4840 /* We are going to be defining the function symbol on the
4841 plt stub, so no dyn_relocs needed when non-pic. */
190eb1dd 4842 h->dyn_relocs = NULL;
625af618 4843 }
d3e454b9 4844 h->protected_def = 0;
3988aed5 4845 /* Function symbols can't have copy relocs. */
25dbc73a 4846 return TRUE;
252b5132 4847 }
25dbc73a 4848 else
a6aa5195 4849 h->plt.plist = NULL;
252b5132 4850
25dbc73a
AM
4851 /* If this is a weak symbol, and there is a real definition, the
4852 processor independent code will have arranged for us to see the
4853 real definition first, and we can just use the same value. */
60d67dc8 4854 if (h->is_weakalias)
252b5132 4855 {
60d67dc8
AM
4856 struct elf_link_hash_entry *def = weakdef (h);
4857 BFD_ASSERT (def->root.type == bfd_link_hash_defined);
4858 h->root.u.def.section = def->root.u.def.section;
4859 h->root.u.def.value = def->root.u.def.value;
4a7e5234
AM
4860 if (def->root.u.def.section == htab->elf.sdynbss
4861 || def->root.u.def.section == htab->elf.sdynrelro
4862 || def->root.u.def.section == htab->dynsbss)
190eb1dd 4863 h->dyn_relocs = NULL;
25dbc73a
AM
4864 return TRUE;
4865 }
dc810e39 4866
25dbc73a
AM
4867 /* This is a reference to a symbol defined by a dynamic object which
4868 is not a function. */
252b5132 4869
25dbc73a
AM
4870 /* If we are creating a shared library, we must presume that the
4871 only references to the symbol are via the global offset table.
4872 For such cases we need not do anything here; the relocations will
4873 be handled correctly by relocate_section. */
0e1862bb 4874 if (bfd_link_pic (info))
d3e454b9
AM
4875 {
4876 h->protected_def = 0;
4877 return TRUE;
4878 }
252b5132 4879
25dbc73a
AM
4880 /* If there are no references to this symbol that do not use the
4881 GOT, we don't need to generate a copy reloc. */
4882 if (!h->non_got_ref)
d3e454b9
AM
4883 {
4884 h->protected_def = 0;
4885 return TRUE;
4886 }
4887
4888 /* Protected variables do not work with .dynbss. The copy in
4889 .dynbss won't be used by the shared library with the protected
4890 definition for the variable. Editing to PIC, or text relocations
4891 are preferable to an incorrect program. */
4892 if (h->protected_def)
4893 {
4894 if (ELIMINATE_COPY_RELOCS
4895 && ppc_elf_hash_entry (h)->has_addr16_ha
4896 && ppc_elf_hash_entry (h)->has_addr16_lo
4897 && htab->params->pic_fixup == 0
4898 && info->disable_target_specific_optimizations <= 1)
4899 htab->params->pic_fixup = 1;
d3e454b9
AM
4900 return TRUE;
4901 }
25dbc73a 4902
a127494f
AM
4903 /* If -z nocopyreloc was given, we won't generate them either. */
4904 if (info->nocopyreloc)
529fe20e 4905 return TRUE;
a127494f 4906
dce2246a 4907 /* If we don't find any dynamic relocs in read-only sections, then
cfd2c773
NS
4908 we'll be keeping the dynamic relocs and avoiding the copy reloc.
4909 We can't do this if there are any small data relocations. This
4910 doesn't work on VxWorks, where we can not have dynamic
4911 relocations (other than copy and jump slot relocations) in an
4912 executable. */
4dc4a9a5 4913 if (ELIMINATE_COPY_RELOCS
cfd2c773 4914 && !ppc_elf_hash_entry (h)->has_sda_refs
90c14f0c 4915 && htab->elf.target_os != is_vxworks
625af618 4916 && !h->def_regular
287c7eaf 4917 && !alias_readonly_dynrelocs (h))
529fe20e 4918 return TRUE;
252b5132 4919
25dbc73a
AM
4920 /* We must allocate the symbol in our .dynbss section, which will
4921 become part of the .bss section of the executable. There will be
4922 an entry for this symbol in the .dynsym section. The dynamic
4923 object will contain position independent code, so all references
4924 from the dynamic object to this symbol will go through the global
4925 offset table. The dynamic linker will use the .dynsym entry to
4926 determine the address it must put in the global offset table, so
4927 both the dynamic object and the regular object will refer to the
4928 same memory location for the variable.
4929
4dc4a9a5
DJ
4930 Of course, if the symbol is referenced using SDAREL relocs, we
4931 must instead allocate it in .sbss. */
4dc4a9a5 4932 if (ppc_elf_hash_entry (h)->has_sda_refs)
25dbc73a 4933 s = htab->dynsbss;
5474d94f
AM
4934 else if ((h->root.u.def.section->flags & SEC_READONLY) != 0)
4935 s = htab->elf.sdynrelro;
25dbc73a 4936 else
9d19e4fd 4937 s = htab->elf.sdynbss;
25dbc73a
AM
4938 BFD_ASSERT (s != NULL);
4939
1d7e9d18 4940 if ((h->root.u.def.section->flags & SEC_ALLOC) != 0 && h->size != 0)
25dbc73a
AM
4941 {
4942 asection *srel;
4943
4a7e5234
AM
4944 /* We must generate a R_PPC_COPY reloc to tell the dynamic
4945 linker to copy the initial value out of the dynamic object
4946 and into the runtime process image. */
4dc4a9a5 4947 if (ppc_elf_hash_entry (h)->has_sda_refs)
25dbc73a 4948 srel = htab->relsbss;
5474d94f
AM
4949 else if ((h->root.u.def.section->flags & SEC_READONLY) != 0)
4950 srel = htab->elf.sreldynrelro;
25dbc73a 4951 else
9d19e4fd 4952 srel = htab->elf.srelbss;
25dbc73a
AM
4953 BFD_ASSERT (srel != NULL);
4954 srel->size += sizeof (Elf32_External_Rela);
4955 h->needs_copy = 1;
4956 }
7619e7c7 4957
529fe20e 4958 /* We no longer want dyn_relocs. */
190eb1dd 4959 h->dyn_relocs = NULL;
6cabe1ea 4960 return _bfd_elf_adjust_dynamic_copy (info, h, s);
25dbc73a
AM
4961}
4962\f
ac39eb42
AM
4963/* Generate a symbol to mark plt call stubs. For non-PIC code the sym is
4964 xxxxxxxx.plt_call32.<callee> where xxxxxxxx is a hex number, usually 0,
4965 specifying the addend on the plt relocation. For -fpic code, the sym
4966 is xxxxxxxx.plt_pic32.<callee>, and for -fPIC
4967 xxxxxxxx.got2.plt_pic32.<callee>. */
0ba07910
AM
4968
4969static bfd_boolean
4970add_stub_sym (struct plt_entry *ent,
4971 struct elf_link_hash_entry *h,
ac39eb42 4972 struct bfd_link_info *info)
0ba07910
AM
4973{
4974 struct elf_link_hash_entry *sh;
4975 size_t len1, len2, len3;
4976 char *name;
ac39eb42
AM
4977 const char *stub;
4978 struct ppc_elf_link_hash_table *htab = ppc_elf_hash_table (info);
4979
0e1862bb 4980 if (bfd_link_pic (info))
ac39eb42
AM
4981 stub = ".plt_pic32.";
4982 else
4983 stub = ".plt_call32.";
0ba07910
AM
4984
4985 len1 = strlen (h->root.root.string);
ac39eb42 4986 len2 = strlen (stub);
0ba07910
AM
4987 len3 = 0;
4988 if (ent->sec)
4989 len3 = strlen (ent->sec->name);
ac39eb42 4990 name = bfd_malloc (len1 + len2 + len3 + 9);
0ba07910
AM
4991 if (name == NULL)
4992 return FALSE;
4993 sprintf (name, "%08x", (unsigned) ent->addend & 0xffffffff);
4994 if (ent->sec)
4995 memcpy (name + 8, ent->sec->name, len3);
ac39eb42
AM
4996 memcpy (name + 8 + len3, stub, len2);
4997 memcpy (name + 8 + len3 + len2, h->root.root.string, len1 + 1);
0ba07910
AM
4998 sh = elf_link_hash_lookup (&htab->elf, name, TRUE, FALSE, FALSE);
4999 if (sh == NULL)
5000 return FALSE;
5001 if (sh->root.type == bfd_link_hash_new)
5002 {
5003 sh->root.type = bfd_link_hash_defined;
5004 sh->root.u.def.section = htab->glink;
5005 sh->root.u.def.value = ent->glink_offset;
5006 sh->ref_regular = 1;
5007 sh->def_regular = 1;
5008 sh->ref_regular_nonweak = 1;
5009 sh->forced_local = 1;
5010 sh->non_elf = 0;
2ec55de3 5011 sh->root.linker_def = 1;
0ba07910
AM
5012 }
5013 return TRUE;
5014}
5015
3b36f7e6
AM
5016/* Allocate NEED contiguous space in .got, and return the offset.
5017 Handles allocation of the got header when crossing 32k. */
5018
5019static bfd_vma
5020allocate_got (struct ppc_elf_link_hash_table *htab, unsigned int need)
5021{
5022 bfd_vma where;
4a3dc543 5023 unsigned int max_before_header;
3b36f7e6 5024
4a3dc543 5025 if (htab->plt_type == PLT_VXWORKS)
9d8504b1 5026 {
ce558b89
AM
5027 where = htab->elf.sgot->size;
5028 htab->elf.sgot->size += need;
9d8504b1 5029 }
3b36f7e6
AM
5030 else
5031 {
4a3dc543
RS
5032 max_before_header = htab->plt_type == PLT_NEW ? 32768 : 32764;
5033 if (need <= htab->got_gap)
3b36f7e6 5034 {
4a3dc543
RS
5035 where = max_before_header - htab->got_gap;
5036 htab->got_gap -= need;
5037 }
5038 else
5039 {
ce558b89
AM
5040 if (htab->elf.sgot->size + need > max_before_header
5041 && htab->elf.sgot->size <= max_before_header)
4a3dc543 5042 {
ce558b89
AM
5043 htab->got_gap = max_before_header - htab->elf.sgot->size;
5044 htab->elf.sgot->size = max_before_header + htab->got_header_size;
4a3dc543 5045 }
ce558b89
AM
5046 where = htab->elf.sgot->size;
5047 htab->elf.sgot->size += need;
3b36f7e6 5048 }
3b36f7e6
AM
5049 }
5050 return where;
5051}
5052
f15d0b54
AM
5053/* Calculate size of GOT entries for symbol given its TLS_MASK.
5054 TLS_LD is excluded because those go in a special GOT slot. */
5055
5056static inline unsigned int
5057got_entries_needed (int tls_mask)
5058{
5059 unsigned int need;
5060 if ((tls_mask & TLS_TLS) == 0)
5061 need = 4;
5062 else
5063 {
5064 need = 0;
5065 if ((tls_mask & TLS_GD) != 0)
5066 need += 8;
b00a0a86 5067 if ((tls_mask & (TLS_TPREL | TLS_GDIE)) != 0)
f15d0b54
AM
5068 need += 4;
5069 if ((tls_mask & TLS_DTPREL) != 0)
5070 need += 4;
5071 }
5072 return need;
5073}
5074
46434633 5075/* If H is undefined, make it dynamic if that makes sense. */
f0158f44
AM
5076
5077static bfd_boolean
46434633
AM
5078ensure_undef_dynamic (struct bfd_link_info *info,
5079 struct elf_link_hash_entry *h)
f0158f44
AM
5080{
5081 struct elf_link_hash_table *htab = elf_hash_table (info);
5082
5083 if (htab->dynamic_sections_created
46434633
AM
5084 && ((info->dynamic_undefined_weak != 0
5085 && h->root.type == bfd_link_hash_undefweak)
5086 || h->root.type == bfd_link_hash_undefined)
f0158f44
AM
5087 && h->dynindx == -1
5088 && !h->forced_local
5089 && ELF_ST_VISIBILITY (h->other) == STV_DEFAULT)
5090 return bfd_elf_link_record_dynamic_symbol (info, h);
5091 return TRUE;
5092}
5093
30845f11
AM
5094/* Choose whether to use htab->iplt or htab->pltlocal rather than the
5095 usual htab->elf.splt section for a PLT entry. */
5096
5097static inline
5098bfd_boolean use_local_plt (struct bfd_link_info *info,
5099 struct elf_link_hash_entry *h)
5100{
5101 return (h == NULL
5102 || h->dynindx == -1
5103 || !elf_hash_table (info)->dynamic_sections_created);
5104}
5105
25dbc73a 5106/* Allocate space in associated reloc sections for dynamic relocs. */
252b5132 5107
b34976b6 5108static bfd_boolean
25dbc73a 5109allocate_dynrelocs (struct elf_link_hash_entry *h, void *inf)
252b5132 5110{
25dbc73a
AM
5111 struct bfd_link_info *info = inf;
5112 struct ppc_elf_link_hash_entry *eh;
7619e7c7 5113 struct ppc_elf_link_hash_table *htab;
6061a67d 5114 struct elf_dyn_relocs *p;
252b5132 5115
25dbc73a 5116 if (h->root.type == bfd_link_hash_indirect)
b34976b6 5117 return TRUE;
252b5132 5118
7619e7c7 5119 htab = ppc_elf_hash_table (info);
25dbc73a 5120 eh = (struct ppc_elf_link_hash_entry *) h;
d3e454b9
AM
5121 if (eh->elf.got.refcount > 0
5122 || (ELIMINATE_COPY_RELOCS
5123 && !eh->elf.def_regular
5124 && eh->elf.protected_def
5125 && eh->has_addr16_ha
5126 && eh->has_addr16_lo
5127 && htab->params->pic_fixup > 0))
25dbc73a 5128 {
d6e14abc
AM
5129 unsigned int need;
5130
46434633
AM
5131 /* Make sure this symbol is output as a dynamic symbol. */
5132 if (!ensure_undef_dynamic (info, &eh->elf))
f0158f44 5133 return FALSE;
252b5132 5134
d6e14abc 5135 need = 0;
37da22e5 5136 if ((eh->tls_mask & (TLS_TLS | TLS_LD)) == (TLS_TLS | TLS_LD))
25dbc73a 5137 {
f749f26e 5138 if (SYMBOL_REFERENCES_LOCAL (info, &eh->elf))
f15d0b54
AM
5139 /* We'll just use htab->tlsld_got.offset. This should
5140 always be the case. It's a little odd if we have
5141 a local dynamic reloc against a non-local symbol. */
5142 htab->tlsld_got.refcount += 1;
5143 else
d6e14abc 5144 need += 8;
d6e14abc 5145 }
f15d0b54 5146 need += got_entries_needed (eh->tls_mask);
d6e14abc
AM
5147 if (need == 0)
5148 eh->elf.got.offset = (bfd_vma) -1;
5149 else
5150 {
3b36f7e6 5151 eh->elf.got.offset = allocate_got (htab, need);
f749f26e
AM
5152 if (((bfd_link_pic (info)
5153 && !((eh->tls_mask & TLS_TLS) != 0
5154 && bfd_link_executable (info)
5155 && SYMBOL_REFERENCES_LOCAL (info, &eh->elf)))
f0158f44
AM
5156 || (htab->elf.dynamic_sections_created
5157 && eh->elf.dynindx != -1
5158 && !SYMBOL_REFERENCES_LOCAL (info, &eh->elf)))
21d68fcd 5159 && !UNDEFWEAK_NO_DYNAMIC_RELOC (info, &eh->elf))
252b5132 5160 {
f15d0b54 5161 asection *rsec;
f15d0b54 5162
f749f26e
AM
5163 need *= sizeof (Elf32_External_Rela) / 4;
5164 if ((eh->tls_mask & (TLS_TLS | TLS_LD)) == (TLS_TLS | TLS_LD))
f15d0b54
AM
5165 need -= sizeof (Elf32_External_Rela);
5166 rsec = htab->elf.srelgot;
0bed072f 5167 if (eh->elf.type == STT_GNU_IFUNC)
ce558b89 5168 rsec = htab->elf.irelplt;
f15d0b54 5169 rsec->size += need;
252b5132 5170 }
25dbc73a
AM
5171 }
5172 }
5173 else
5174 eh->elf.got.offset = (bfd_vma) -1;
252b5132 5175
954b63d4
AM
5176 /* If no dynamic sections we can't have dynamic relocs, except for
5177 IFUNCs which are handled even in static executables. */
f0158f44
AM
5178 if (!htab->elf.dynamic_sections_created
5179 && h->type != STT_GNU_IFUNC)
190eb1dd 5180 h->dyn_relocs = NULL;
f0158f44 5181
529fe20e
AM
5182 /* Discard relocs on undefined symbols that must be local. */
5183 else if (h->root.type == bfd_link_hash_undefined
5184 && ELF_ST_VISIBILITY (h->other) != STV_DEFAULT)
190eb1dd 5185 h->dyn_relocs = NULL;
529fe20e
AM
5186
5187 /* Also discard relocs on undefined weak syms with non-default
5188 visibility, or when dynamic_undefined_weak says so. */
5189 else if (UNDEFWEAK_NO_DYNAMIC_RELOC (info, h))
190eb1dd 5190 h->dyn_relocs = NULL;
529fe20e 5191
190eb1dd 5192 if (h->dyn_relocs == NULL)
287c7eaf 5193 ;
252b5132 5194
25dbc73a
AM
5195 /* In the shared -Bsymbolic case, discard space allocated for
5196 dynamic pc-relative relocs against symbols which turn out to be
5197 defined in regular objects. For the normal shared case, discard
5198 space for relocs that have become local due to symbol visibility
5199 changes. */
f0158f44 5200 else if (bfd_link_pic (info))
25dbc73a
AM
5201 {
5202 /* Relocs that use pc_count are those that appear on a call insn,
1d483afe 5203 or certain REL relocs (see must_be_dyn_reloc) that can be
25dbc73a
AM
5204 generated via assembly. We want calls to protected symbols to
5205 resolve directly to the function rather than going via the plt.
5206 If people want function pointer comparisons to work as expected
5207 then they should avoid writing weird assembly. */
529fe20e 5208 if (SYMBOL_CALLS_LOCAL (info, h))
25dbc73a 5209 {
6061a67d 5210 struct elf_dyn_relocs **pp;
25dbc73a 5211
190eb1dd 5212 for (pp = &h->dyn_relocs; (p = *pp) != NULL; )
252b5132 5213 {
25dbc73a
AM
5214 p->count -= p->pc_count;
5215 p->pc_count = 0;
5216 if (p->count == 0)
5217 *pp = p->next;
5218 else
5219 pp = &p->next;
252b5132 5220 }
25dbc73a 5221 }
252b5132 5222
90c14f0c 5223 if (htab->elf.target_os == is_vxworks)
3348747a 5224 {
6061a67d 5225 struct elf_dyn_relocs **pp;
3348747a 5226
190eb1dd 5227 for (pp = &h->dyn_relocs; (p = *pp) != NULL; )
3348747a
NS
5228 {
5229 if (strcmp (p->sec->output_section->name, ".tls_vars") == 0)
5230 *pp = p->next;
5231 else
5232 pp = &p->next;
5233 }
5234 }
5235
190eb1dd 5236 if (h->dyn_relocs != NULL)
25dbc73a 5237 {
46434633
AM
5238 /* Make sure this symbol is output as a dynamic symbol. */
5239 if (!ensure_undef_dynamic (info, h))
f0158f44 5240 return FALSE;
25dbc73a
AM
5241 }
5242 }
5243 else if (ELIMINATE_COPY_RELOCS)
5244 {
f0158f44 5245 /* For the non-pic case, discard space for relocs against
25dbc73a
AM
5246 symbols which turn out to need copy relocs or are not
5247 dynamic. */
529fe20e 5248 if (h->dynamic_adjusted
d3e454b9 5249 && !h->def_regular
529fe20e 5250 && !ELF_COMMON_DEF_P (h)
d3e454b9
AM
5251 && !(h->protected_def
5252 && eh->has_addr16_ha
5253 && eh->has_addr16_lo
5254 && htab->params->pic_fixup > 0))
25dbc73a 5255 {
46434633
AM
5256 /* Make sure this symbol is output as a dynamic symbol. */
5257 if (!ensure_undef_dynamic (info, h))
f0158f44 5258 return FALSE;
7619e7c7 5259
f0158f44 5260 if (h->dynindx == -1)
190eb1dd 5261 h->dyn_relocs = NULL;
25dbc73a 5262 }
f0158f44 5263 else
190eb1dd 5264 h->dyn_relocs = NULL;
25dbc73a 5265 }
252b5132 5266
f0158f44 5267 /* Allocate space. */
190eb1dd 5268 for (p = h->dyn_relocs; p != NULL; p = p->next)
25dbc73a
AM
5269 {
5270 asection *sreloc = elf_section_data (p->sec)->sreloc;
f95f8542 5271 if (eh->elf.type == STT_GNU_IFUNC)
ce558b89 5272 sreloc = htab->elf.irelplt;
25dbc73a
AM
5273 sreloc->size += p->count * sizeof (Elf32_External_Rela);
5274 }
252b5132 5275
2d7ad24e
AM
5276 /* Handle PLT relocs. Done last, after dynindx has settled.
5277 We might need a PLT entry when the symbol
5278 a) is dynamic, or
5279 b) is an ifunc, or
5280 c) has plt16 relocs and has been processed by adjust_dynamic_symbol, or
5281 d) has plt16 relocs and we are linking statically. */
30845f11 5282 if ((htab->elf.dynamic_sections_created && h->dynindx != -1)
2d7ad24e
AM
5283 || h->type == STT_GNU_IFUNC
5284 || (h->needs_plt && h->dynamic_adjusted)
5285 || (h->needs_plt
5286 && h->def_regular
5287 && !htab->elf.dynamic_sections_created
3e04d765 5288 && !htab->can_convert_all_inline_plt
2d7ad24e
AM
5289 && (ppc_elf_hash_entry (h)->tls_mask
5290 & (TLS_TLS | PLT_KEEP)) == PLT_KEEP))
f0158f44
AM
5291 {
5292 struct plt_entry *ent;
5293 bfd_boolean doneone = FALSE;
2d7ad24e 5294 bfd_vma plt_offset = 0, glink_offset = (bfd_vma) -1;
f0158f44
AM
5295
5296 for (ent = h->plt.plist; ent != NULL; ent = ent->next)
5297 if (ent->plt.refcount > 0)
5298 {
5299 asection *s = htab->elf.splt;
30845f11 5300 bfd_boolean dyn = !use_local_plt (info, h);
f0158f44
AM
5301
5302 if (!dyn)
2d7ad24e
AM
5303 {
5304 if (h->type == STT_GNU_IFUNC)
5305 s = htab->elf.iplt;
5306 else
5307 s = htab->pltlocal;
5308 }
f0158f44
AM
5309
5310 if (htab->plt_type == PLT_NEW || !dyn)
5311 {
5312 if (!doneone)
5313 {
5314 plt_offset = s->size;
5315 s->size += 4;
5316 }
5317 ent->plt.offset = plt_offset;
5318
2d7ad24e
AM
5319 if (s == htab->pltlocal)
5320 ent->glink_offset = glink_offset;
5321 else
f0158f44 5322 {
2d7ad24e
AM
5323 s = htab->glink;
5324 if (!doneone || bfd_link_pic (info))
5325 {
5326 glink_offset = s->size;
5327 s->size += GLINK_ENTRY_SIZE (htab, h);
5328 }
5329 if (!doneone
5330 && !bfd_link_pic (info)
5331 && h->def_dynamic
5332 && !h->def_regular)
5333 {
5334 h->root.u.def.section = s;
5335 h->root.u.def.value = glink_offset;
5336 }
5337 ent->glink_offset = glink_offset;
f0158f44 5338
2d7ad24e
AM
5339 if (htab->params->emit_stub_syms
5340 && !add_stub_sym (ent, h, info))
5341 return FALSE;
5342 }
f0158f44
AM
5343 }
5344 else
5345 {
5346 if (!doneone)
5347 {
5348 /* If this is the first .plt entry, make room
5349 for the special first entry. */
5350 if (s->size == 0)
5351 s->size += htab->plt_initial_entry_size;
5352
5353 /* The PowerPC PLT is actually composed of two
5354 parts, the first part is 2 words (for a load
5355 and a jump), and then there is a remaining
5356 word available at the end. */
5357 plt_offset = (htab->plt_initial_entry_size
5358 + (htab->plt_slot_size
5359 * ((s->size
5360 - htab->plt_initial_entry_size)
5361 / htab->plt_entry_size)));
5362
5363 /* If this symbol is not defined in a regular
5364 file, and we are not generating a shared
5365 library, then set the symbol to this location
5366 in the .plt. This is to avoid text
5367 relocations, and is required to make
5368 function pointers compare as equal between
5369 the normal executable and the shared library. */
5370 if (! bfd_link_pic (info)
5371 && h->def_dynamic
5372 && !h->def_regular)
5373 {
5374 h->root.u.def.section = s;
5375 h->root.u.def.value = plt_offset;
5376 }
5377
5378 /* Make room for this entry. */
5379 s->size += htab->plt_entry_size;
5380 /* After the 8192nd entry, room for two entries
5381 is allocated. */
5382 if (htab->plt_type == PLT_OLD
5383 && (s->size - htab->plt_initial_entry_size)
5384 / htab->plt_entry_size
5385 > PLT_NUM_SINGLE_ENTRIES)
5386 s->size += htab->plt_entry_size;
5387 }
5388 ent->plt.offset = plt_offset;
5389 }
5390
5391 /* We also need to make an entry in the .rela.plt section. */
5392 if (!doneone)
5393 {
5394 if (!dyn)
2d7ad24e
AM
5395 {
5396 if (h->type == STT_GNU_IFUNC)
5397 {
5398 s = htab->elf.irelplt;
5399 s->size += sizeof (Elf32_External_Rela);
5400 }
5401 else if (bfd_link_pic (info))
5402 {
5403 s = htab->relpltlocal;
5404 s->size += sizeof (Elf32_External_Rela);
5405 }
5406 }
f0158f44
AM
5407 else
5408 {
5409 htab->elf.srelplt->size += sizeof (Elf32_External_Rela);
5410
5411 if (htab->plt_type == PLT_VXWORKS)
5412 {
5413 /* Allocate space for the unloaded relocations. */
5414 if (!bfd_link_pic (info)
5415 && htab->elf.dynamic_sections_created)
5416 {
5417 if (ent->plt.offset
5418 == (bfd_vma) htab->plt_initial_entry_size)
5419 {
5420 htab->srelplt2->size
5421 += (sizeof (Elf32_External_Rela)
5422 * VXWORKS_PLTRESOLVE_RELOCS);
5423 }
5424
5425 htab->srelplt2->size
5426 += (sizeof (Elf32_External_Rela)
5427 * VXWORKS_PLT_NON_JMP_SLOT_RELOCS);
5428 }
5429
5430 /* Every PLT entry has an associated GOT entry in
5431 .got.plt. */
5432 htab->elf.sgotplt->size += 4;
5433 }
5434 }
5435 doneone = TRUE;
5436 }
5437 }
5438 else
5439 ent->plt.offset = (bfd_vma) -1;
5440
5441 if (!doneone)
5442 {
5443 h->plt.plist = NULL;
5444 h->needs_plt = 0;
5445 }
5446 }
5447 else
5448 {
5449 h->plt.plist = NULL;
5450 h->needs_plt = 0;
5451 }
5452
25dbc73a
AM
5453 return TRUE;
5454}
7619e7c7 5455
6177242a
AM
5456static const unsigned char glink_eh_frame_cie[] =
5457{
5458 0, 0, 0, 16, /* length. */
5459 0, 0, 0, 0, /* id. */
5460 1, /* CIE version. */
5461 'z', 'R', 0, /* Augmentation string. */
5462 4, /* Code alignment. */
5463 0x7c, /* Data alignment. */
5464 65, /* RA reg. */
5465 1, /* Augmentation size. */
5466 DW_EH_PE_pcrel | DW_EH_PE_sdata4, /* FDE encoding. */
5467 DW_CFA_def_cfa, 1, 0 /* def_cfa: r1 offset 0. */
5468};
5469
25dbc73a
AM
5470/* Set the sizes of the dynamic sections. */
5471
5472static bfd_boolean
93d1b056 5473ppc_elf_size_dynamic_sections (bfd *output_bfd,
25dbc73a
AM
5474 struct bfd_link_info *info)
5475{
5476 struct ppc_elf_link_hash_table *htab;
5477 asection *s;
5478 bfd_boolean relocs;
5479 bfd *ibfd;
7fce784e 5480
252b5132 5481#ifdef DEBUG
25dbc73a 5482 fprintf (stderr, "ppc_elf_size_dynamic_sections called\n");
252b5132 5483#endif
252b5132 5484
25dbc73a
AM
5485 htab = ppc_elf_hash_table (info);
5486 BFD_ASSERT (htab->elf.dynobj != NULL);
252b5132 5487
25dbc73a
AM
5488 if (elf_hash_table (info)->dynamic_sections_created)
5489 {
5490 /* Set the contents of the .interp section to the interpreter. */
9b8b325a 5491 if (bfd_link_executable (info) && !info->nointerp)
25dbc73a 5492 {
3d4d4302 5493 s = bfd_get_linker_section (htab->elf.dynobj, ".interp");
25dbc73a
AM
5494 BFD_ASSERT (s != NULL);
5495 s->size = sizeof ELF_DYNAMIC_INTERPRETER;
5496 s->contents = (unsigned char *) ELF_DYNAMIC_INTERPRETER;
5497 }
5498 }
252b5132 5499
4a3dc543 5500 if (htab->plt_type == PLT_OLD)
d7128ce4 5501 htab->got_header_size = 16;
4a3dc543 5502 else if (htab->plt_type == PLT_NEW)
d7128ce4 5503 htab->got_header_size = 12;
252b5132 5504
25dbc73a
AM
5505 /* Set up .got offsets for local syms, and space for local dynamic
5506 relocs. */
c72f2fb2 5507 for (ibfd = info->input_bfds; ibfd != NULL; ibfd = ibfd->link.next)
25dbc73a
AM
5508 {
5509 bfd_signed_vma *local_got;
5510 bfd_signed_vma *end_local_got;
e054468f
AM
5511 struct plt_entry **local_plt;
5512 struct plt_entry **end_local_plt;
25dbc73a
AM
5513 char *lgot_masks;
5514 bfd_size_type locsymcount;
5515 Elf_Internal_Shdr *symtab_hdr;
7fce784e 5516
0c8d6e5c 5517 if (!is_ppc_elf (ibfd))
25dbc73a 5518 continue;
7fce784e 5519
25dbc73a
AM
5520 for (s = ibfd->sections; s != NULL; s = s->next)
5521 {
f95f8542 5522 struct ppc_dyn_relocs *p;
252b5132 5523
f95f8542 5524 for (p = ((struct ppc_dyn_relocs *)
25dbc73a
AM
5525 elf_section_data (s)->local_dynrel);
5526 p != NULL;
5527 p = p->next)
5528 {
5529 if (!bfd_is_abs_section (p->sec)
5530 && bfd_is_abs_section (p->sec->output_section))
5531 {
5532 /* Input section has been discarded, either because
5533 it is a copy of a linkonce section or due to
5534 linker script /DISCARD/, so we'll be discarding
5535 the relocs too. */
7fce784e 5536 }
90c14f0c 5537 else if (htab->elf.target_os == is_vxworks
3348747a
NS
5538 && strcmp (p->sec->output_section->name,
5539 ".tls_vars") == 0)
5540 {
5541 /* Relocations in vxworks .tls_vars sections are
5542 handled specially by the loader. */
5543 }
25dbc73a 5544 else if (p->count != 0)
7fce784e 5545 {
25f23106 5546 asection *sreloc = elf_section_data (p->sec)->sreloc;
f95f8542 5547 if (p->ifunc)
ce558b89 5548 sreloc = htab->elf.irelplt;
25f23106 5549 sreloc->size += p->count * sizeof (Elf32_External_Rela);
25dbc73a
AM
5550 if ((p->sec->output_section->flags
5551 & (SEC_READONLY | SEC_ALLOC))
5552 == (SEC_READONLY | SEC_ALLOC))
0caf6c82
L
5553 {
5554 info->flags |= DF_TEXTREL;
871b3ab2 5555 info->callbacks->minfo (_("%pB: dynamic relocation in read-only section `%pA'\n"),
0caf6c82
L
5556 p->sec->owner, p->sec);
5557 }
7fce784e 5558 }
252b5132 5559 }
252b5132 5560 }
252b5132 5561
25dbc73a
AM
5562 local_got = elf_local_got_refcounts (ibfd);
5563 if (!local_got)
5564 continue;
252b5132 5565
0ffa91dd 5566 symtab_hdr = &elf_symtab_hdr (ibfd);
25dbc73a
AM
5567 locsymcount = symtab_hdr->sh_info;
5568 end_local_got = local_got + locsymcount;
e054468f
AM
5569 local_plt = (struct plt_entry **) end_local_got;
5570 end_local_plt = local_plt + locsymcount;
5571 lgot_masks = (char *) end_local_plt;
91d6fa6a 5572
25dbc73a
AM
5573 for (; local_got < end_local_got; ++local_got, ++lgot_masks)
5574 if (*local_got > 0)
5575 {
f15d0b54 5576 unsigned int need;
37da22e5 5577 if ((*lgot_masks & (TLS_TLS | TLS_LD)) == (TLS_TLS | TLS_LD))
f15d0b54
AM
5578 htab->tlsld_got.refcount += 1;
5579 need = got_entries_needed (*lgot_masks);
d6e14abc
AM
5580 if (need == 0)
5581 *local_got = (bfd_vma) -1;
25dbc73a
AM
5582 else
5583 {
3b36f7e6 5584 *local_got = allocate_got (htab, need);
f749f26e
AM
5585 if (bfd_link_pic (info)
5586 && !((*lgot_masks & TLS_TLS) != 0
5587 && bfd_link_executable (info)))
0bed072f 5588 {
f15d0b54 5589 asection *srel;
f15d0b54 5590
f749f26e 5591 need *= sizeof (Elf32_External_Rela) / 4;
f15d0b54 5592 srel = htab->elf.srelgot;
37da22e5 5593 if ((*lgot_masks & (TLS_TLS | PLT_IFUNC)) == PLT_IFUNC)
ce558b89 5594 srel = htab->elf.irelplt;
f15d0b54 5595 srel->size += need;
0bed072f 5596 }
25dbc73a
AM
5597 }
5598 }
5599 else
5600 *local_got = (bfd_vma) -1;
e054468f 5601
90c14f0c 5602 if (htab->elf.target_os == is_vxworks)
e054468f
AM
5603 continue;
5604
5605 /* Allocate space for calls to local STT_GNU_IFUNC syms in .iplt. */
2d7ad24e
AM
5606 lgot_masks = (char *) end_local_plt;
5607 for (; local_plt < end_local_plt; ++local_plt, ++lgot_masks)
e054468f
AM
5608 {
5609 struct plt_entry *ent;
5610 bfd_boolean doneone = FALSE;
2d7ad24e 5611 bfd_vma plt_offset = 0, glink_offset = (bfd_vma) -1;
e054468f
AM
5612
5613 for (ent = *local_plt; ent != NULL; ent = ent->next)
5614 if (ent->plt.refcount > 0)
5615 {
2d7ad24e
AM
5616 if ((*lgot_masks & (TLS_TLS | PLT_IFUNC)) == PLT_IFUNC)
5617 s = htab->elf.iplt;
3e04d765
AM
5618 else if (htab->can_convert_all_inline_plt
5619 || (*lgot_masks & (TLS_TLS | PLT_KEEP)) != PLT_KEEP)
2d7ad24e
AM
5620 {
5621 ent->plt.offset = (bfd_vma) -1;
5622 continue;
5623 }
5624 else
5625 s = htab->pltlocal;
e054468f
AM
5626
5627 if (!doneone)
5628 {
5629 plt_offset = s->size;
5630 s->size += 4;
5631 }
5632 ent->plt.offset = plt_offset;
5633
2d7ad24e 5634 if (s != htab->pltlocal && (!doneone || bfd_link_pic (info)))
e054468f 5635 {
2d7ad24e 5636 s = htab->glink;
e054468f 5637 glink_offset = s->size;
9e390558 5638 s->size += GLINK_ENTRY_SIZE (htab, NULL);
e054468f
AM
5639 }
5640 ent->glink_offset = glink_offset;
5641
5642 if (!doneone)
5643 {
2d7ad24e
AM
5644 if ((*lgot_masks & (TLS_TLS | PLT_IFUNC)) == PLT_IFUNC)
5645 {
5646 s = htab->elf.irelplt;
5647 s->size += sizeof (Elf32_External_Rela);
5648 }
5649 else if (bfd_link_pic (info))
5650 {
5651 s = htab->relpltlocal;
5652 s->size += sizeof (Elf32_External_Rela);
5653 }
e054468f
AM
5654 doneone = TRUE;
5655 }
5656 }
5657 else
5658 ent->plt.offset = (bfd_vma) -1;
5659 }
25dbc73a 5660 }
252b5132 5661
b7fcf6f6
AM
5662 /* Allocate space for global sym dynamic relocs. */
5663 elf_link_hash_traverse (elf_hash_table (info), allocate_dynrelocs, info);
5664
3b36f7e6
AM
5665 if (htab->tlsld_got.refcount > 0)
5666 {
5667 htab->tlsld_got.offset = allocate_got (htab, 8);
f749f26e 5668 if (bfd_link_dll (info))
ce558b89 5669 htab->elf.srelgot->size += sizeof (Elf32_External_Rela);
3b36f7e6
AM
5670 }
5671 else
5672 htab->tlsld_got.offset = (bfd_vma) -1;
5673
ce558b89 5674 if (htab->elf.sgot != NULL && htab->plt_type != PLT_VXWORKS)
3b36f7e6
AM
5675 {
5676 unsigned int g_o_t = 32768;
5677
4d962050
AM
5678 /* If we haven't allocated the header, do so now. When we get here,
5679 for old plt/got the got size will be 0 to 32764 (not allocated),
5680 or 32780 to 65536 (header allocated). For new plt/got, the
5681 corresponding ranges are 0 to 32768 and 32780 to 65536. */
ce558b89 5682 if (htab->elf.sgot->size <= 32768)
3b36f7e6 5683 {
ce558b89 5684 g_o_t = htab->elf.sgot->size;
4a3dc543 5685 if (htab->plt_type == PLT_OLD)
4d962050 5686 g_o_t += 4;
ce558b89 5687 htab->elf.sgot->size += htab->got_header_size;
3b36f7e6 5688 }
3b36f7e6
AM
5689
5690 htab->elf.hgot->root.u.def.value = g_o_t;
5691 }
0e1862bb 5692 if (bfd_link_pic (info))
bd6c6e2b
AM
5693 {
5694 struct elf_link_hash_entry *sda = htab->sdata[0].sym;
93d1b056
AM
5695
5696 sda->root.u.def.section = htab->elf.hgot->root.u.def.section;
5697 sda->root.u.def.value = htab->elf.hgot->root.u.def.value;
bd6c6e2b 5698 }
15bfcc77
AM
5699 if (info->emitrelocations)
5700 {
5701 struct elf_link_hash_entry *sda = htab->sdata[0].sym;
5702
5703 if (sda != NULL && sda->ref_regular)
5704 sda->root.u.def.section->flags |= SEC_KEEP;
5705 sda = htab->sdata[1].sym;
5706 if (sda != NULL && sda->ref_regular)
5707 sda->root.u.def.section->flags |= SEC_KEEP;
5708 }
3b36f7e6 5709
e054468f
AM
5710 if (htab->glink != NULL
5711 && htab->glink->size != 0
5712 && htab->elf.dynamic_sections_created)
d7128ce4
AM
5713 {
5714 htab->glink_pltresolve = htab->glink->size;
9e390558
AM
5715 /* Space for the branch table. */
5716 htab->glink->size
5717 += htab->elf.srelplt->size / (sizeof (Elf32_External_Rela) / 4) - 4;
86b9da88 5718 /* Pad out to align the start of PLTresolve. */
5446cbdf
AM
5719 htab->glink->size += -htab->glink->size & (htab->params->ppc476_workaround
5720 ? 63 : 15);
d7128ce4 5721 htab->glink->size += GLINK_PLTRESOLVE;
0ba07910 5722
5446cbdf 5723 if (htab->params->emit_stub_syms)
0ba07910
AM
5724 {
5725 struct elf_link_hash_entry *sh;
5726 sh = elf_link_hash_lookup (&htab->elf, "__glink",
5727 TRUE, FALSE, FALSE);
5728 if (sh == NULL)
5729 return FALSE;
5730 if (sh->root.type == bfd_link_hash_new)
5731 {
5732 sh->root.type = bfd_link_hash_defined;
5733 sh->root.u.def.section = htab->glink;
5734 sh->root.u.def.value = htab->glink_pltresolve;
5735 sh->ref_regular = 1;
5736 sh->def_regular = 1;
5737 sh->ref_regular_nonweak = 1;
5738 sh->forced_local = 1;
5739 sh->non_elf = 0;
2ec55de3 5740 sh->root.linker_def = 1;
0ba07910
AM
5741 }
5742 sh = elf_link_hash_lookup (&htab->elf, "__glink_PLTresolve",
5743 TRUE, FALSE, FALSE);
5744 if (sh == NULL)
5745 return FALSE;
5746 if (sh->root.type == bfd_link_hash_new)
5747 {
5748 sh->root.type = bfd_link_hash_defined;
5749 sh->root.u.def.section = htab->glink;
5750 sh->root.u.def.value = htab->glink->size - GLINK_PLTRESOLVE;
5751 sh->ref_regular = 1;
5752 sh->def_regular = 1;
5753 sh->ref_regular_nonweak = 1;
5754 sh->forced_local = 1;
5755 sh->non_elf = 0;
2ec55de3 5756 sh->root.linker_def = 1;
0ba07910
AM
5757 }
5758 }
d7128ce4
AM
5759 }
5760
6177242a
AM
5761 if (htab->glink != NULL
5762 && htab->glink->size != 0
5763 && htab->glink_eh_frame != NULL
9a2a56cc
AM
5764 && !bfd_is_abs_section (htab->glink_eh_frame->output_section)
5765 && _bfd_elf_eh_frame_present (info))
6177242a
AM
5766 {
5767 s = htab->glink_eh_frame;
5768 s->size = sizeof (glink_eh_frame_cie) + 20;
0e1862bb 5769 if (bfd_link_pic (info))
6177242a
AM
5770 {
5771 s->size += 4;
5772 if (htab->glink->size - GLINK_PLTRESOLVE + 8 >= 256)
5773 s->size += 4;
5774 }
5775 }
5776
25dbc73a
AM
5777 /* We've now determined the sizes of the various dynamic sections.
5778 Allocate memory for them. */
5779 relocs = FALSE;
5780 for (s = htab->elf.dynobj->sections; s != NULL; s = s->next)
252b5132 5781 {
9d8504b1
PB
5782 bfd_boolean strip_section = TRUE;
5783
25dbc73a
AM
5784 if ((s->flags & SEC_LINKER_CREATED) == 0)
5785 continue;
252b5132 5786
ce558b89
AM
5787 if (s == htab->elf.splt
5788 || s == htab->elf.sgot)
25dbc73a 5789 {
9d8504b1
PB
5790 /* We'd like to strip these sections if they aren't needed, but if
5791 we've exported dynamic symbols from them we must leave them.
5792 It's too late to tell BFD to get rid of the symbols. */
e054468f 5793 if (htab->elf.hplt != NULL)
9d8504b1 5794 strip_section = FALSE;
25dbc73a
AM
5795 /* Strip this section if we don't need it; see the
5796 comment below. */
5797 }
ce558b89 5798 else if (s == htab->elf.iplt
2d7ad24e 5799 || s == htab->pltlocal
e054468f 5800 || s == htab->glink
6177242a 5801 || s == htab->glink_eh_frame
ce558b89 5802 || s == htab->elf.sgotplt
e054468f 5803 || s == htab->sbss
9d19e4fd 5804 || s == htab->elf.sdynbss
5474d94f 5805 || s == htab->elf.sdynrelro
15bfcc77 5806 || s == htab->dynsbss)
25dbc73a 5807 {
c9a2f333 5808 /* Strip these too. */
25dbc73a 5809 }
15bfcc77
AM
5810 else if (s == htab->sdata[0].section
5811 || s == htab->sdata[1].section)
5812 {
5813 strip_section = (s->flags & SEC_KEEP) == 0;
5814 }
fd361982 5815 else if (CONST_STRNEQ (bfd_section_name (s), ".rela"))
25dbc73a 5816 {
c456f082 5817 if (s->size != 0)
25dbc73a
AM
5818 {
5819 /* Remember whether there are any relocation sections. */
5820 relocs = TRUE;
252b5132 5821
25dbc73a
AM
5822 /* We use the reloc_count field as a counter if we need
5823 to copy relocs into the output file. */
5824 s->reloc_count = 0;
252b5132
RH
5825 }
5826 }
25dbc73a
AM
5827 else
5828 {
5829 /* It's not one of our sections, so don't allocate space. */
5830 continue;
5831 }
252b5132 5832
9d8504b1 5833 if (s->size == 0 && strip_section)
25dbc73a 5834 {
c456f082
AM
5835 /* If we don't need this section, strip it from the
5836 output file. This is mostly to handle .rela.bss and
5837 .rela.plt. We must create both sections in
5838 create_dynamic_sections, because they must be created
5839 before the linker maps input sections to output
5840 sections. The linker does that before
5841 adjust_dynamic_symbol is called, and it is that
5842 function which decides whether anything needs to go
5843 into these sections. */
8423293d 5844 s->flags |= SEC_EXCLUDE;
25dbc73a
AM
5845 continue;
5846 }
7fce784e 5847
d7128ce4 5848 if ((s->flags & SEC_HAS_CONTENTS) == 0)
644285ef
AM
5849 continue;
5850
25dbc73a
AM
5851 /* Allocate memory for the section contents. */
5852 s->contents = bfd_zalloc (htab->elf.dynobj, s->size);
5853 if (s->contents == NULL)
5854 return FALSE;
5855 }
252b5132 5856
25dbc73a 5857 if (htab->elf.dynamic_sections_created)
7619e7c7 5858 {
25dbc73a
AM
5859 /* Add some entries to the .dynamic section. We fill in the
5860 values later, in ppc_elf_finish_dynamic_sections, but we
5861 must add the entries now so that we get the correct size for
5862 the .dynamic section. The DT_DEBUG entry is filled in by the
5863 dynamic linker and used by the debugger. */
5864#define add_dynamic_entry(TAG, VAL) \
5865 _bfd_elf_add_dynamic_entry (info, TAG, VAL)
252b5132 5866
3084d7a2
L
5867 if (!_bfd_elf_maybe_vxworks_add_dynamic_tags (output_bfd, info,
5868 relocs))
5869 return FALSE;
7619e7c7 5870
c7e17e05
AM
5871 if (htab->plt_type == PLT_NEW
5872 && htab->glink != NULL
5873 && htab->glink->size != 0)
d7128ce4 5874 {
1fe44d79 5875 if (!add_dynamic_entry (DT_PPC_GOT, 0))
d7128ce4 5876 return FALSE;
5446cbdf 5877 if (!htab->params->no_tls_get_addr_opt
a7f2871e
AM
5878 && htab->tls_get_addr != NULL
5879 && htab->tls_get_addr->plt.plist != NULL
e8910a83 5880 && !add_dynamic_entry (DT_PPC_OPT, PPC_OPT_TLS))
a7f2871e 5881 return FALSE;
d7128ce4 5882 }
7a2b07ff 5883 }
25dbc73a
AM
5884#undef add_dynamic_entry
5885
7e01508c
AM
5886 if (htab->glink_eh_frame != NULL
5887 && htab->glink_eh_frame->contents != NULL)
5888 {
5889 unsigned char *p = htab->glink_eh_frame->contents;
5890 bfd_vma val;
5891
5892 memcpy (p, glink_eh_frame_cie, sizeof (glink_eh_frame_cie));
5893 /* CIE length (rewrite in case little-endian). */
5894 bfd_put_32 (htab->elf.dynobj, sizeof (glink_eh_frame_cie) - 4, p);
5895 p += sizeof (glink_eh_frame_cie);
5896 /* FDE length. */
5897 val = htab->glink_eh_frame->size - 4 - sizeof (glink_eh_frame_cie);
5898 bfd_put_32 (htab->elf.dynobj, val, p);
5899 p += 4;
5900 /* CIE pointer. */
5901 val = p - htab->glink_eh_frame->contents;
5902 bfd_put_32 (htab->elf.dynobj, val, p);
5903 p += 4;
5904 /* Offset to .glink. Set later. */
5905 p += 4;
5906 /* .glink size. */
5907 bfd_put_32 (htab->elf.dynobj, htab->glink->size, p);
5908 p += 4;
5909 /* Augmentation. */
5910 p += 1;
5911
0e1862bb 5912 if (bfd_link_pic (info)
7e01508c
AM
5913 && htab->elf.dynamic_sections_created)
5914 {
5915 bfd_vma adv = (htab->glink->size - GLINK_PLTRESOLVE + 8) >> 2;
5916 if (adv < 64)
5917 *p++ = DW_CFA_advance_loc + adv;
5918 else if (adv < 256)
5919 {
5920 *p++ = DW_CFA_advance_loc1;
5921 *p++ = adv;
5922 }
5923 else if (adv < 65536)
5924 {
5925 *p++ = DW_CFA_advance_loc2;
5926 bfd_put_16 (htab->elf.dynobj, adv, p);
5927 p += 2;
5928 }
5929 else
5930 {
5931 *p++ = DW_CFA_advance_loc4;
5932 bfd_put_32 (htab->elf.dynobj, adv, p);
5933 p += 4;
5934 }
5935 *p++ = DW_CFA_register;
5936 *p++ = 65;
5937 p++;
5938 *p++ = DW_CFA_advance_loc + 4;
5939 *p++ = DW_CFA_restore_extended;
5940 *p++ = 65;
5941 }
5942 BFD_ASSERT ((bfd_vma) ((p + 3 - htab->glink_eh_frame->contents) & -4)
5943 == htab->glink_eh_frame->size);
5944 }
5945
7619e7c7
AM
5946 return TRUE;
5947}
0eb4a168 5948
93d1b056
AM
5949/* Arrange to have _SDA_BASE_ or _SDA2_BASE_ stripped from the output
5950 if it looks like nothing is using them. */
5951
5952static void
5953maybe_strip_sdasym (bfd *output_bfd, elf_linker_section_t *lsect)
5954{
5955 struct elf_link_hash_entry *sda = lsect->sym;
5956
5957 if (sda != NULL && !sda->ref_regular && sda->dynindx == -1)
5958 {
5959 asection *s;
5960
5961 s = bfd_get_section_by_name (output_bfd, lsect->name);
5962 if (s == NULL || bfd_section_removed_from_list (output_bfd, s))
5963 {
5964 s = bfd_get_section_by_name (output_bfd, lsect->bss_name);
5965 if (s == NULL || bfd_section_removed_from_list (output_bfd, s))
5966 {
5967 sda->def_regular = 0;
5968 /* This is somewhat magic. See elf_link_output_extsym. */
5969 sda->ref_dynamic = 1;
5970 sda->forced_local = 0;
5971 }
5972 }
5973 }
5974}
5975
5976void
5977ppc_elf_maybe_strip_sdata_syms (struct bfd_link_info *info)
5978{
5979 struct ppc_elf_link_hash_table *htab = ppc_elf_hash_table (info);
5980
5981 if (htab != NULL)
5982 {
5983 maybe_strip_sdasym (info->output_bfd, &htab->sdata[0]);
5984 maybe_strip_sdasym (info->output_bfd, &htab->sdata[1]);
5985 }
5986}
5987
5988
0eb4a168
AM
5989/* Return TRUE if symbol should be hashed in the `.gnu.hash' section. */
5990
5991static bfd_boolean
5992ppc_elf_hash_symbol (struct elf_link_hash_entry *h)
5993{
5994 if (h->plt.plist != NULL
5995 && !h->def_regular
5996 && (!h->pointer_equality_needed
5997 || !h->ref_regular_nonweak))
5998 return FALSE;
5999
6000 return _bfd_elf_hash_symbol (h);
6001}
25dbc73a
AM
6002\f
6003#define ARRAY_SIZE(a) (sizeof (a) / sizeof ((a)[0]))
6004
01017ef8
NS
6005/* Relaxation trampolines. r12 is available for clobbering (r11, is
6006 used for some functions that are allowed to break the ABI). */
25dbc73a
AM
6007static const int shared_stub_entry[] =
6008 {
6009 0x7c0802a6, /* mflr 0 */
6010 0x429f0005, /* bcl 20, 31, .Lxxx */
01017ef8
NS
6011 0x7d8802a6, /* mflr 12 */
6012 0x3d8c0000, /* addis 12, 12, (xxx-.Lxxx)@ha */
53291d1f 6013 0x398c0000, /* addi 12, 12, (xxx-.Lxxx)@l */
25dbc73a 6014 0x7c0803a6, /* mtlr 0 */
01017ef8 6015 0x7d8903a6, /* mtctr 12 */
25dbc73a
AM
6016 0x4e800420, /* bctr */
6017 };
6018
6019static const int stub_entry[] =
6020 {
01017ef8
NS
6021 0x3d800000, /* lis 12,xxx@ha */
6022 0x398c0000, /* addi 12,12,xxx@l */
6023 0x7d8903a6, /* mtctr 12 */
25dbc73a
AM
6024 0x4e800420, /* bctr */
6025 };
6026
5446cbdf
AM
6027struct ppc_elf_relax_info
6028{
6029 unsigned int workaround_size;
d3e454b9 6030 unsigned int picfixup_size;
5446cbdf
AM
6031};
6032
6033/* This function implements long branch trampolines, and the ppc476
6034 icache bug workaround. Any section needing trampolines or patch
6035 space for the workaround has its size extended so that we can
53291d1f 6036 add trampolines at the end of the section. */
5446cbdf 6037
25dbc73a
AM
6038static bfd_boolean
6039ppc_elf_relax_section (bfd *abfd,
6040 asection *isec,
6041 struct bfd_link_info *link_info,
6042 bfd_boolean *again)
6043{
d3e454b9 6044 struct one_branch_fixup
25dbc73a 6045 {
d3e454b9 6046 struct one_branch_fixup *next;
25dbc73a 6047 asection *tsec;
01017ef8
NS
6048 /* Final link, can use the symbol offset. For a
6049 relocatable link we use the symbol's index. */
25dbc73a
AM
6050 bfd_vma toff;
6051 bfd_vma trampoff;
6052 };
7619e7c7 6053
25dbc73a
AM
6054 Elf_Internal_Shdr *symtab_hdr;
6055 bfd_byte *contents = NULL;
6056 Elf_Internal_Sym *isymbuf = NULL;
6057 Elf_Internal_Rela *internal_relocs = NULL;
5446cbdf 6058 Elf_Internal_Rela *irel, *irelend = NULL;
d3e454b9 6059 struct one_branch_fixup *branch_fixups = NULL;
5446cbdf 6060 struct ppc_elf_relax_info *relax_info = NULL;
9bc4e62b 6061 unsigned changes = 0;
5446cbdf 6062 bfd_boolean workaround_change;
d7128ce4 6063 struct ppc_elf_link_hash_table *htab;
d3e454b9 6064 bfd_size_type trampbase, trampoff, newsize, picfixup_size;
a6aa5195 6065 asection *got2;
50248c89 6066 bfd_boolean maybe_pasted;
7619e7c7 6067
25dbc73a 6068 *again = FALSE;
7619e7c7 6069
5446cbdf 6070 /* No need to do anything with non-alloc or non-code sections. */
c87b5a93 6071 if ((isec->flags & SEC_ALLOC) == 0
a8ad78a7 6072 || (isec->flags & SEC_CODE) == 0
5446cbdf
AM
6073 || (isec->flags & SEC_LINKER_CREATED) != 0
6074 || isec->size < 4)
25dbc73a 6075 return TRUE;
7619e7c7 6076
c8a1f254
NS
6077 /* We cannot represent the required PIC relocs in the output, so don't
6078 do anything. The linker doesn't support mixing -shared and -r
6079 anyway. */
0e1862bb 6080 if (bfd_link_relocatable (link_info) && bfd_link_pic (link_info))
795bc6b3 6081 return TRUE;
5b914448 6082
5446cbdf
AM
6083 htab = ppc_elf_hash_table (link_info);
6084 if (htab == NULL)
6085 return TRUE;
6086
6087 isec->size = (isec->size + 3) & -4;
6088 if (isec->rawsize == 0)
6089 isec->rawsize = isec->size;
6090 trampbase = isec->size;
6091
53291d1f
AM
6092 BFD_ASSERT (isec->sec_info_type == SEC_INFO_TYPE_NONE
6093 || isec->sec_info_type == SEC_INFO_TYPE_TARGET);
6094 isec->sec_info_type = SEC_INFO_TYPE_TARGET;
6095
d3e454b9
AM
6096 if (htab->params->ppc476_workaround
6097 || htab->params->pic_fixup > 0)
5446cbdf
AM
6098 {
6099 if (elf_section_data (isec)->sec_info == NULL)
6100 {
5446cbdf
AM
6101 elf_section_data (isec)->sec_info
6102 = bfd_zalloc (abfd, sizeof (struct ppc_elf_relax_info));
6103 if (elf_section_data (isec)->sec_info == NULL)
6104 return FALSE;
6105 }
6106 relax_info = elf_section_data (isec)->sec_info;
6107 trampbase -= relax_info->workaround_size;
6108 }
6109
50248c89
AM
6110 maybe_pasted = (strcmp (isec->output_section->name, ".init") == 0
6111 || strcmp (isec->output_section->name, ".fini") == 0);
25dbc73a 6112 /* Space for a branch around any trampolines. */
5446cbdf
AM
6113 trampoff = trampbase;
6114 if (maybe_pasted && trampbase == isec->rawsize)
50248c89 6115 trampoff += 4;
7619e7c7 6116
0ffa91dd 6117 symtab_hdr = &elf_symtab_hdr (abfd);
d3e454b9
AM
6118 picfixup_size = 0;
6119 if (htab->params->branch_trampolines
6120 || htab->params->pic_fixup > 0)
7619e7c7 6121 {
5446cbdf
AM
6122 /* Get a copy of the native relocations. */
6123 if (isec->reloc_count != 0)
25dbc73a 6124 {
5446cbdf
AM
6125 internal_relocs = _bfd_elf_link_read_relocs (abfd, isec, NULL, NULL,
6126 link_info->keep_memory);
6127 if (internal_relocs == NULL)
6128 goto error_return;
25dbc73a 6129 }
7619e7c7 6130
5446cbdf
AM
6131 got2 = bfd_get_section_by_name (abfd, ".got2");
6132
6133 irelend = internal_relocs + isec->reloc_count;
6134 for (irel = internal_relocs; irel < irelend; irel++)
25dbc73a 6135 {
5446cbdf
AM
6136 unsigned long r_type = ELF32_R_TYPE (irel->r_info);
6137 bfd_vma toff, roff;
6138 asection *tsec;
d3e454b9 6139 struct one_branch_fixup *f;
5446cbdf 6140 size_t insn_offset = 0;
d3e454b9 6141 bfd_vma max_branch_offset = 0, val;
5446cbdf
AM
6142 bfd_byte *hit_addr;
6143 unsigned long t0;
6144 struct elf_link_hash_entry *h;
49c09209 6145 Elf_Internal_Sym *isym;
5446cbdf
AM
6146 struct plt_entry **plist;
6147 unsigned char sym_type;
6148
6149 switch (r_type)
6150 {
6151 case R_PPC_REL24:
6152 case R_PPC_LOCAL24PC:
6153 case R_PPC_PLTREL24:
23cedd1d 6154 case R_PPC_PLTCALL:
5446cbdf
AM
6155 max_branch_offset = 1 << 25;
6156 break;
6157
6158 case R_PPC_REL14:
6159 case R_PPC_REL14_BRTAKEN:
6160 case R_PPC_REL14_BRNTAKEN:
6161 max_branch_offset = 1 << 15;
6162 break;
7fce784e 6163
d3e454b9
AM
6164 case R_PPC_ADDR16_HA:
6165 if (htab->params->pic_fixup > 0)
6166 break;
6167 continue;
6168
5446cbdf
AM
6169 default:
6170 continue;
6171 }
6172
6173 /* Get the value of the symbol referred to by the reloc. */
49c09209
AM
6174 if (!get_sym_h (&h, &isym, &tsec, NULL, &isymbuf,
6175 ELF32_R_SYM (irel->r_info), abfd))
6176 goto error_return;
5446cbdf 6177
49c09209
AM
6178 if (isym != NULL)
6179 {
6180 if (tsec != NULL)
6181 ;
5446cbdf
AM
6182 else if (isym->st_shndx == SHN_ABS)
6183 tsec = bfd_abs_section_ptr;
49199304
AM
6184 else
6185 continue;
5446cbdf
AM
6186
6187 toff = isym->st_value;
6188 sym_type = ELF_ST_TYPE (isym->st_info);
25dbc73a 6189 }
25dbc73a 6190 else
5446cbdf 6191 {
49c09209
AM
6192 if (tsec != NULL)
6193 toff = h->root.u.def.value;
5446cbdf
AM
6194 else if (h->root.type == bfd_link_hash_undefined
6195 || h->root.type == bfd_link_hash_undefweak)
6196 {
49c09209
AM
6197 unsigned long indx;
6198
6199 indx = ELF32_R_SYM (irel->r_info) - symtab_hdr->sh_info;
5446cbdf 6200 tsec = bfd_und_section_ptr;
0e1862bb 6201 toff = bfd_link_relocatable (link_info) ? indx : 0;
5446cbdf
AM
6202 }
6203 else
6204 continue;
6205
9f7552cf
AM
6206 /* If this branch is to __tls_get_addr then we may later
6207 optimise away the call. We won't be needing a long-
6208 branch stub in that case. */
0e1862bb 6209 if (bfd_link_executable (link_info)
9f7552cf
AM
6210 && h == htab->tls_get_addr
6211 && irel != internal_relocs)
6212 {
6213 unsigned long t_symndx = ELF32_R_SYM (irel[-1].r_info);
6214 unsigned long t_rtype = ELF32_R_TYPE (irel[-1].r_info);
6215 unsigned int tls_mask = 0;
6216
6217 /* The previous reloc should be one of R_PPC_TLSGD or
6218 R_PPC_TLSLD, or for older object files, a reloc
6219 on the __tls_get_addr arg setup insn. Get tls
6220 mask bits from the symbol on that reloc. */
6221 if (t_symndx < symtab_hdr->sh_info)
6222 {
6223 bfd_vma *local_got_offsets = elf_local_got_offsets (abfd);
6224
6225 if (local_got_offsets != NULL)
6226 {
6227 struct plt_entry **local_plt = (struct plt_entry **)
6228 (local_got_offsets + symtab_hdr->sh_info);
6229 char *lgot_masks = (char *)
6230 (local_plt + symtab_hdr->sh_info);
6231 tls_mask = lgot_masks[t_symndx];
6232 }
6233 }
6234 else
6235 {
6236 struct elf_link_hash_entry *th
6237 = elf_sym_hashes (abfd)[t_symndx - symtab_hdr->sh_info];
6238
6239 while (th->root.type == bfd_link_hash_indirect
6240 || th->root.type == bfd_link_hash_warning)
6241 th = (struct elf_link_hash_entry *) th->root.u.i.link;
6242
6243 tls_mask
6244 = ((struct ppc_elf_link_hash_entry *) th)->tls_mask;
6245 }
6246
6247 /* The mask bits tell us if the call will be
6248 optimised away. */
6249 if ((tls_mask & TLS_TLS) != 0 && (tls_mask & TLS_GD) == 0
6250 && (t_rtype == R_PPC_TLSGD
6251 || t_rtype == R_PPC_GOT_TLSGD16
6252 || t_rtype == R_PPC_GOT_TLSGD16_LO))
6253 continue;
6254 if ((tls_mask & TLS_TLS) != 0 && (tls_mask & TLS_LD) == 0
6255 && (t_rtype == R_PPC_TLSLD
6256 || t_rtype == R_PPC_GOT_TLSLD16
6257 || t_rtype == R_PPC_GOT_TLSLD16_LO))
6258 continue;
6259 }
6260
5446cbdf
AM
6261 sym_type = h->type;
6262 }
7619e7c7 6263
d3e454b9
AM
6264 if (r_type == R_PPC_ADDR16_HA)
6265 {
6266 if (h != NULL
6267 && !h->def_regular
6268 && h->protected_def
6269 && ppc_elf_hash_entry (h)->has_addr16_ha
6270 && ppc_elf_hash_entry (h)->has_addr16_lo)
6271 picfixup_size += 12;
6272 continue;
6273 }
6274
5446cbdf
AM
6275 /* The condition here under which we call find_plt_ent must
6276 match that in relocate_section. If we call find_plt_ent here
6277 but not in relocate_section, or vice versa, then the branch
6278 destination used here may be incorrect. */
6279 plist = NULL;
6280 if (h != NULL)
25dbc73a 6281 {
5446cbdf
AM
6282 /* We know is_branch_reloc (r_type) is true. */
6283 if (h->type == STT_GNU_IFUNC
6284 || r_type == R_PPC_PLTREL24)
6285 plist = &h->plt.plist;
25dbc73a 6286 }
5446cbdf
AM
6287 else if (sym_type == STT_GNU_IFUNC
6288 && elf_local_got_offsets (abfd) != NULL)
c8a1f254 6289 {
5446cbdf
AM
6290 bfd_vma *local_got_offsets = elf_local_got_offsets (abfd);
6291 struct plt_entry **local_plt = (struct plt_entry **)
6292 (local_got_offsets + symtab_hdr->sh_info);
6293 plist = local_plt + ELF32_R_SYM (irel->r_info);
c8a1f254 6294 }
5446cbdf 6295 if (plist != NULL)
a9585d22 6296 {
5446cbdf
AM
6297 bfd_vma addend = 0;
6298 struct plt_entry *ent;
6299
0e1862bb 6300 if (r_type == R_PPC_PLTREL24 && bfd_link_pic (link_info))
5446cbdf
AM
6301 addend = irel->r_addend;
6302 ent = find_plt_ent (plist, got2, addend);
6303 if (ent != NULL)
a9585d22 6304 {
5446cbdf
AM
6305 if (htab->plt_type == PLT_NEW
6306 || h == NULL
6307 || !htab->elf.dynamic_sections_created
6308 || h->dynindx == -1)
6309 {
6310 tsec = htab->glink;
6311 toff = ent->glink_offset;
6312 }
6313 else
6314 {
ce558b89 6315 tsec = htab->elf.splt;
5446cbdf
AM
6316 toff = ent->plt.offset;
6317 }
de972ffa
AM
6318 }
6319 }
de972ffa 6320
5446cbdf
AM
6321 /* If the branch and target are in the same section, you have
6322 no hope of adding stubs. We'll error out later should the
6323 branch overflow. */
6324 if (tsec == isec)
6325 continue;
25dbc73a 6326
49199304
AM
6327 /* toff is used for the symbol index when the symbol is
6328 undefined and we're doing a relocatable link, so we can't
6329 support addends. It would be possible to do so by
6330 putting the addend in one_branch_fixup but addends on
6331 branches are rare so it hardly seems worth supporting. */
6332 if (bfd_link_relocatable (link_info)
6333 && tsec == bfd_und_section_ptr
6334 && r_type != R_PPC_PLTREL24
6335 && irel->r_addend != 0)
6336 continue;
6337
5446cbdf
AM
6338 /* There probably isn't any reason to handle symbols in
6339 SEC_MERGE sections; SEC_MERGE doesn't seem a likely
6340 attribute for a code section, and we are only looking at
6341 branches. However, implement it correctly here as a
6342 reference for other target relax_section functions. */
6343 if (0 && tsec->sec_info_type == SEC_INFO_TYPE_MERGE)
6344 {
6345 /* At this stage in linking, no SEC_MERGE symbol has been
6346 adjusted, so all references to such symbols need to be
6347 passed through _bfd_merged_section_offset. (Later, in
6348 relocate_section, all SEC_MERGE symbols *except* for
6349 section symbols have been adjusted.)
6350
6351 gas may reduce relocations against symbols in SEC_MERGE
6352 sections to a relocation against the section symbol when
6353 the original addend was zero. When the reloc is against
6354 a section symbol we should include the addend in the
6355 offset passed to _bfd_merged_section_offset, since the
6356 location of interest is the original symbol. On the
6357 other hand, an access to "sym+addend" where "sym" is not
6358 a section symbol should not include the addend; Such an
6359 access is presumed to be an offset from "sym"; The
6360 location of interest is just "sym". */
49199304
AM
6361 if (sym_type == STT_SECTION
6362 && r_type != R_PPC_PLTREL24)
5446cbdf
AM
6363 toff += irel->r_addend;
6364
6365 toff
6366 = _bfd_merged_section_offset (abfd, &tsec,
6367 elf_section_data (tsec)->sec_info,
6368 toff);
6369
49199304
AM
6370 if (sym_type != STT_SECTION
6371 && r_type != R_PPC_PLTREL24)
5446cbdf
AM
6372 toff += irel->r_addend;
6373 }
6374 /* PLTREL24 addends are special. */
6375 else if (r_type != R_PPC_PLTREL24)
25dbc73a 6376 toff += irel->r_addend;
7619e7c7 6377
5446cbdf 6378 /* Attempted -shared link of non-pic code loses. */
0e1862bb 6379 if ((!bfd_link_relocatable (link_info)
5446cbdf
AM
6380 && tsec == bfd_und_section_ptr)
6381 || tsec->output_section == NULL
6382 || (tsec->owner != NULL
6383 && (tsec->owner->flags & BFD_PLUGIN) != 0))
6384 continue;
7619e7c7 6385
5446cbdf 6386 roff = irel->r_offset;
7de713b9 6387
49199304
AM
6388 /* Avoid creating a lot of unnecessary fixups when
6389 relocatable if the output section size is such that a
6390 fixup can be created at final link.
6391 The max_branch_offset adjustment allows for some number
6392 of other fixups being needed at final link. */
6393 if (bfd_link_relocatable (link_info)
6394 && (isec->output_section->rawsize - (isec->output_offset + roff)
6395 < max_branch_offset - (max_branch_offset >> 4)))
6396 continue;
6397
5446cbdf
AM
6398 /* If the branch is in range, no need to do anything. */
6399 if (tsec != bfd_und_section_ptr
0e1862bb 6400 && (!bfd_link_relocatable (link_info)
5446cbdf
AM
6401 /* A relocatable link may have sections moved during
6402 final link, so do not presume they remain in range. */
6403 || tsec->output_section == isec->output_section))
6404 {
6405 bfd_vma symaddr, reladdr;
7619e7c7 6406
5446cbdf
AM
6407 symaddr = tsec->output_section->vma + tsec->output_offset + toff;
6408 reladdr = isec->output_section->vma + isec->output_offset + roff;
6409 if (symaddr - reladdr + max_branch_offset
6410 < 2 * max_branch_offset)
6411 continue;
6412 }
01017ef8 6413
5446cbdf 6414 /* Look for an existing fixup to this address. */
d3e454b9 6415 for (f = branch_fixups; f ; f = f->next)
5446cbdf
AM
6416 if (f->tsec == tsec && f->toff == toff)
6417 break;
252b5132 6418
5446cbdf
AM
6419 if (f == NULL)
6420 {
6421 size_t size;
6422 unsigned long stub_rtype;
25dbc73a 6423
5446cbdf
AM
6424 val = trampoff - roff;
6425 if (val >= max_branch_offset)
6426 /* Oh dear, we can't reach a trampoline. Don't try to add
6427 one. We'll report an error later. */
6428 continue;
252b5132 6429
0e1862bb 6430 if (bfd_link_pic (link_info))
5446cbdf
AM
6431 {
6432 size = 4 * ARRAY_SIZE (shared_stub_entry);
6433 insn_offset = 12;
6434 }
6435 else
6436 {
6437 size = 4 * ARRAY_SIZE (stub_entry);
6438 insn_offset = 0;
6439 }
6440 stub_rtype = R_PPC_RELAX;
ce558b89 6441 if (tsec == htab->elf.splt
5446cbdf
AM
6442 || tsec == htab->glink)
6443 {
6444 stub_rtype = R_PPC_RELAX_PLT;
6445 if (r_type == R_PPC_PLTREL24)
6446 stub_rtype = R_PPC_RELAX_PLTREL24;
6447 }
252b5132 6448
5446cbdf
AM
6449 /* Hijack the old relocation. Since we need two
6450 relocations for this use a "composite" reloc. */
6451 irel->r_info = ELF32_R_INFO (ELF32_R_SYM (irel->r_info),
6452 stub_rtype);
6453 irel->r_offset = trampoff + insn_offset;
6454 if (r_type == R_PPC_PLTREL24
6455 && stub_rtype != R_PPC_RELAX_PLTREL24)
6456 irel->r_addend = 0;
6457
6458 /* Record the fixup so we don't do it again this section. */
6459 f = bfd_malloc (sizeof (*f));
d3e454b9 6460 f->next = branch_fixups;
5446cbdf
AM
6461 f->tsec = tsec;
6462 f->toff = toff;
6463 f->trampoff = trampoff;
d3e454b9 6464 branch_fixups = f;
5446cbdf
AM
6465
6466 trampoff += size;
6467 changes++;
25dbc73a
AM
6468 }
6469 else
6470 {
5446cbdf
AM
6471 val = f->trampoff - roff;
6472 if (val >= max_branch_offset)
6473 continue;
252b5132 6474
5446cbdf
AM
6475 /* Nop out the reloc, since we're finalizing things here. */
6476 irel->r_info = ELF32_R_INFO (0, R_PPC_NONE);
6477 }
252b5132 6478
5446cbdf
AM
6479 /* Get the section contents. */
6480 if (contents == NULL)
25dbc73a 6481 {
5446cbdf
AM
6482 /* Get cached copy if it exists. */
6483 if (elf_section_data (isec)->this_hdr.contents != NULL)
6484 contents = elf_section_data (isec)->this_hdr.contents;
25dbc73a 6485 /* Go get them off disk. */
5446cbdf 6486 else if (!bfd_malloc_and_get_section (abfd, isec, &contents))
25dbc73a
AM
6487 goto error_return;
6488 }
252b5132 6489
5446cbdf
AM
6490 /* Fix up the existing branch to hit the trampoline. */
6491 hit_addr = contents + roff;
6492 switch (r_type)
6493 {
6494 case R_PPC_REL24:
6495 case R_PPC_LOCAL24PC:
6496 case R_PPC_PLTREL24:
6497 t0 = bfd_get_32 (abfd, hit_addr);
6498 t0 &= ~0x3fffffc;
6499 t0 |= val & 0x3fffffc;
6500 bfd_put_32 (abfd, t0, hit_addr);
6501 break;
252b5132 6502
5446cbdf
AM
6503 case R_PPC_REL14:
6504 case R_PPC_REL14_BRTAKEN:
6505 case R_PPC_REL14_BRNTAKEN:
6506 t0 = bfd_get_32 (abfd, hit_addr);
6507 t0 &= ~0xfffc;
6508 t0 |= val & 0xfffc;
6509 bfd_put_32 (abfd, t0, hit_addr);
6510 break;
6511 }
25dbc73a 6512 }
252b5132 6513
d3e454b9 6514 while (branch_fixups != NULL)
25dbc73a 6515 {
d3e454b9
AM
6516 struct one_branch_fixup *f = branch_fixups;
6517 branch_fixups = branch_fixups->next;
25dbc73a
AM
6518 free (f);
6519 }
5446cbdf 6520 }
252b5132 6521
5446cbdf
AM
6522 workaround_change = FALSE;
6523 newsize = trampoff;
795bc6b3 6524 if (htab->params->ppc476_workaround
0e1862bb 6525 && (!bfd_link_relocatable (link_info)
795bc6b3 6526 || isec->output_section->alignment_power >= htab->params->pagesize_p2))
5446cbdf
AM
6527 {
6528 bfd_vma addr, end_addr;
6529 unsigned int crossings;
795bc6b3 6530 bfd_vma pagesize = (bfd_vma) 1 << htab->params->pagesize_p2;
5446cbdf
AM
6531
6532 addr = isec->output_section->vma + isec->output_offset;
6128f9cf 6533 end_addr = addr + trampoff;
5446cbdf 6534 addr &= -pagesize;
795bc6b3 6535 crossings = ((end_addr & -pagesize) - addr) >> htab->params->pagesize_p2;
5446cbdf
AM
6536 if (crossings != 0)
6537 {
6538 /* Keep space aligned, to ensure the patch code itself does
6539 not cross a page. Don't decrease size calculated on a
6540 previous pass as otherwise we might never settle on a layout. */
1e269e9b 6541 newsize = 15 - ((end_addr - 1) & 15);
5446cbdf
AM
6542 newsize += crossings * 16;
6543 if (relax_info->workaround_size < newsize)
6544 {
6545 relax_info->workaround_size = newsize;
6546 workaround_change = TRUE;
5446cbdf
AM
6547 }
6548 /* Ensure relocate_section is called. */
6549 isec->flags |= SEC_RELOC;
6550 }
6551 newsize = trampoff + relax_info->workaround_size;
6552 }
6553
d3e454b9
AM
6554 if (htab->params->pic_fixup > 0)
6555 {
6556 picfixup_size -= relax_info->picfixup_size;
6557 if (picfixup_size != 0)
6558 relax_info->picfixup_size += picfixup_size;
6559 newsize += relax_info->picfixup_size;
6560 }
6561
6562 if (changes != 0 || picfixup_size != 0 || workaround_change)
5446cbdf
AM
6563 isec->size = newsize;
6564
25dbc73a
AM
6565 if (isymbuf != NULL
6566 && symtab_hdr->contents != (unsigned char *) isymbuf)
252b5132 6567 {
25dbc73a
AM
6568 if (! link_info->keep_memory)
6569 free (isymbuf);
252b5132 6570 else
25dbc73a
AM
6571 {
6572 /* Cache the symbols for elf_link_input_bfd. */
6573 symtab_hdr->contents = (unsigned char *) isymbuf;
6574 }
252b5132
RH
6575 }
6576
25dbc73a
AM
6577 if (contents != NULL
6578 && elf_section_data (isec)->this_hdr.contents != contents)
6579 {
53291d1f 6580 if (!changes && !link_info->keep_memory)
25dbc73a
AM
6581 free (contents);
6582 else
6583 {
6584 /* Cache the section contents for elf_link_input_bfd. */
6585 elf_section_data (isec)->this_hdr.contents = contents;
6586 }
6587 }
252b5132 6588
d3e454b9 6589 changes += picfixup_size;
9bc4e62b 6590 if (changes != 0)
25dbc73a 6591 {
9bc4e62b
NS
6592 /* Append sufficient NOP relocs so we can write out relocation
6593 information for the trampolines. */
d4730f92 6594 Elf_Internal_Shdr *rel_hdr;
9bc4e62b
NS
6595 Elf_Internal_Rela *new_relocs = bfd_malloc ((changes + isec->reloc_count)
6596 * sizeof (*new_relocs));
6597 unsigned ix;
5b914448 6598
9bc4e62b
NS
6599 if (!new_relocs)
6600 goto error_return;
6601 memcpy (new_relocs, internal_relocs,
6602 isec->reloc_count * sizeof (*new_relocs));
6603 for (ix = changes; ix--;)
6604 {
6605 irel = new_relocs + ix + isec->reloc_count;
6606
6607 irel->r_info = ELF32_R_INFO (0, R_PPC_NONE);
6608 }
6609 if (internal_relocs != elf_section_data (isec)->relocs)
25dbc73a 6610 free (internal_relocs);
9bc4e62b
NS
6611 elf_section_data (isec)->relocs = new_relocs;
6612 isec->reloc_count += changes;
d4730f92
BS
6613 rel_hdr = _bfd_elf_single_rel_hdr (isec);
6614 rel_hdr->sh_size += changes * rel_hdr->sh_entsize;
25dbc73a 6615 }
c9594989 6616 else if (elf_section_data (isec)->relocs != internal_relocs)
9bc4e62b 6617 free (internal_relocs);
252b5132 6618
5446cbdf 6619 *again = changes != 0 || workaround_change;
b34976b6 6620 return TRUE;
25dbc73a
AM
6621
6622 error_return:
d3e454b9 6623 while (branch_fixups != NULL)
5446cbdf 6624 {
d3e454b9
AM
6625 struct one_branch_fixup *f = branch_fixups;
6626 branch_fixups = branch_fixups->next;
5446cbdf
AM
6627 free (f);
6628 }
c9594989 6629 if ((unsigned char *) isymbuf != symtab_hdr->contents)
25dbc73a 6630 free (isymbuf);
c9594989 6631 if (elf_section_data (isec)->this_hdr.contents != contents)
25dbc73a 6632 free (contents);
c9594989 6633 if (elf_section_data (isec)->relocs != internal_relocs)
25dbc73a
AM
6634 free (internal_relocs);
6635 return FALSE;
252b5132 6636}
252b5132 6637\f
8a696751
AM
6638/* What to do when ld finds relocations against symbols defined in
6639 discarded sections. */
6640
6641static unsigned int
6642ppc_elf_action_discarded (asection *sec)
6643{
6644 if (strcmp (".fixup", sec->name) == 0)
6645 return 0;
6646
6647 if (strcmp (".got2", sec->name) == 0)
6648 return 0;
6649
6650 return _bfd_elf_default_action_discarded (sec);
6651}
c9a2f333 6652\f
25dbc73a 6653/* Fill in the address for a pointer generated in a linker section. */
252b5132 6654
25dbc73a 6655static bfd_vma
76750a2f 6656elf_finish_pointer_linker_section (bfd *input_bfd,
25dbc73a
AM
6657 elf_linker_section_t *lsect,
6658 struct elf_link_hash_entry *h,
6659 bfd_vma relocation,
2bb04cf2 6660 const Elf_Internal_Rela *rel)
25dbc73a
AM
6661{
6662 elf_linker_section_pointers_t *linker_section_ptr;
252b5132 6663
25dbc73a 6664 BFD_ASSERT (lsect != NULL);
252b5132 6665
25dbc73a 6666 if (h != NULL)
252b5132 6667 {
25dbc73a
AM
6668 /* Handle global symbol. */
6669 struct ppc_elf_link_hash_entry *eh;
252b5132 6670
25dbc73a 6671 eh = (struct ppc_elf_link_hash_entry *) h;
76750a2f
AM
6672 BFD_ASSERT (eh->elf.def_regular);
6673 linker_section_ptr = eh->linker_section_pointer;
25dbc73a
AM
6674 }
6675 else
6676 {
6677 /* Handle local symbol. */
6678 unsigned long r_symndx = ELF32_R_SYM (rel->r_info);
76750a2f 6679
0c8d6e5c 6680 BFD_ASSERT (is_ppc_elf (input_bfd));
25dbc73a 6681 BFD_ASSERT (elf_local_ptr_offsets (input_bfd) != NULL);
76750a2f
AM
6682 linker_section_ptr = elf_local_ptr_offsets (input_bfd)[r_symndx];
6683 }
252b5132 6684
76750a2f
AM
6685 linker_section_ptr = elf_find_pointer_linker_section (linker_section_ptr,
6686 rel->r_addend,
6687 lsect);
6688 BFD_ASSERT (linker_section_ptr != NULL);
25dbc73a 6689
76750a2f
AM
6690 /* Offset will always be a multiple of four, so use the bottom bit
6691 as a "written" flag. */
6692 if ((linker_section_ptr->offset & 1) == 0)
6693 {
6694 bfd_put_32 (lsect->section->owner,
6695 relocation + linker_section_ptr->addend,
6696 lsect->section->contents + linker_section_ptr->offset);
6697 linker_section_ptr->offset += 1;
252b5132
RH
6698 }
6699
bd6c6e2b
AM
6700 relocation = (lsect->section->output_section->vma
6701 + lsect->section->output_offset
76750a2f 6702 + linker_section_ptr->offset - 1
bd6c6e2b 6703 - SYM_VAL (lsect->sym));
252b5132 6704
25dbc73a
AM
6705#ifdef DEBUG
6706 fprintf (stderr,
6707 "Finish pointer in linker section %s, offset = %ld (0x%lx)\n",
6708 lsect->name, (long) relocation, (long) relocation);
6709#endif
252b5132 6710
bd6c6e2b 6711 return relocation;
252b5132 6712}
25dbc73a 6713
e054468f
AM
6714#define PPC_LO(v) ((v) & 0xffff)
6715#define PPC_HI(v) (((v) >> 16) & 0xffff)
6716#define PPC_HA(v) PPC_HI ((v) + 0x8000)
6717
6718static void
9e390558
AM
6719write_glink_stub (struct elf_link_hash_entry *h, struct plt_entry *ent,
6720 asection *plt_sec, unsigned char *p,
e054468f
AM
6721 struct bfd_link_info *info)
6722{
6723 struct ppc_elf_link_hash_table *htab = ppc_elf_hash_table (info);
6724 bfd *output_bfd = info->output_bfd;
6725 bfd_vma plt;
9e390558
AM
6726 unsigned char *end = p + GLINK_ENTRY_SIZE (htab, h);
6727
6728 if (h != NULL
6729 && h == htab->tls_get_addr
6730 && !htab->params->no_tls_get_addr_opt)
6731 {
6732 bfd_put_32 (output_bfd, LWZ_11_3, p);
6733 p += 4;
6734 bfd_put_32 (output_bfd, LWZ_12_3 + 4, p);
6735 p += 4;
6736 bfd_put_32 (output_bfd, MR_0_3, p);
6737 p += 4;
6738 bfd_put_32 (output_bfd, CMPWI_11_0, p);
6739 p += 4;
6740 bfd_put_32 (output_bfd, ADD_3_12_2, p);
6741 p += 4;
6742 bfd_put_32 (output_bfd, BEQLR, p);
6743 p += 4;
6744 bfd_put_32 (output_bfd, MR_3_0, p);
6745 p += 4;
6746 bfd_put_32 (output_bfd, NOP, p);
6747 p += 4;
6748 }
e054468f
AM
6749
6750 plt = ((ent->plt.offset & ~1)
6751 + plt_sec->output_section->vma
6752 + plt_sec->output_offset);
e054468f 6753
0e1862bb 6754 if (bfd_link_pic (info))
e054468f
AM
6755 {
6756 bfd_vma got = 0;
6757
6758 if (ent->addend >= 32768)
6759 got = (ent->addend
6760 + ent->sec->output_section->vma
6761 + ent->sec->output_offset);
6762 else if (htab->elf.hgot != NULL)
6763 got = SYM_VAL (htab->elf.hgot);
6764
6765 plt -= got;
6766
6767 if (plt + 0x8000 < 0x10000)
9e390558 6768 bfd_put_32 (output_bfd, LWZ_11_30 + PPC_LO (plt), p);
e054468f
AM
6769 else
6770 {
6771 bfd_put_32 (output_bfd, ADDIS_11_30 + PPC_HA (plt), p);
6772 p += 4;
6773 bfd_put_32 (output_bfd, LWZ_11_11 + PPC_LO (plt), p);
e054468f
AM
6774 }
6775 }
6776 else
6777 {
6778 bfd_put_32 (output_bfd, LIS_11 + PPC_HA (plt), p);
6779 p += 4;
6780 bfd_put_32 (output_bfd, LWZ_11_11 + PPC_LO (plt), p);
9e390558
AM
6781 }
6782 p += 4;
6783 bfd_put_32 (output_bfd, MTCTR_11, p);
6784 p += 4;
407aa07c
AM
6785 bfd_put_32 (output_bfd, BCTR, p);
6786 p += 4;
9e390558
AM
6787 while (p < end)
6788 {
6789 bfd_put_32 (output_bfd, htab->params->ppc476_workaround ? BA : NOP, p);
e054468f
AM
6790 p += 4;
6791 }
6792}
6793
bd6c6e2b
AM
6794/* Return true if symbol is defined statically. */
6795
6796static bfd_boolean
6797is_static_defined (struct elf_link_hash_entry *h)
6798{
6799 return ((h->root.type == bfd_link_hash_defined
6800 || h->root.type == bfd_link_hash_defweak)
6801 && h->root.u.def.section != NULL
6802 && h->root.u.def.section->output_section != NULL);
6803}
6804
2d0f3896
AM
6805/* If INSN is an opcode that may be used with an @tls operand, return
6806 the transformed insn for TLS optimisation, otherwise return 0. If
6807 REG is non-zero only match an insn with RB or RA equal to REG. */
6808
6809unsigned int
6810_bfd_elf_ppc_at_tls_transform (unsigned int insn, unsigned int reg)
6811{
6812 unsigned int rtra;
6813
2365f8d7 6814 if ((insn & (0x3fu << 26)) != 31 << 26)
2d0f3896
AM
6815 return 0;
6816
6817 if (reg == 0 || ((insn >> 11) & 0x1f) == reg)
6818 rtra = insn & ((1 << 26) - (1 << 16));
6819 else if (((insn >> 16) & 0x1f) == reg)
6820 rtra = (insn & (0x1f << 21)) | ((insn & (0x1f << 11)) << 5);
6821 else
6822 return 0;
6823
6824 if ((insn & (0x3ff << 1)) == 266 << 1)
6825 /* add -> addi. */
6826 insn = 14 << 26;
6827 else if ((insn & (0x1f << 1)) == 23 << 1
6828 && ((insn & (0x1f << 6)) < 14 << 6
6829 || ((insn & (0x1f << 6)) >= 16 << 6
6830 && (insn & (0x1f << 6)) < 24 << 6)))
6831 /* load and store indexed -> dform. */
2365f8d7 6832 insn = (32u | ((insn >> 6) & 0x1f)) << 26;
2d0f3896
AM
6833 else if ((insn & (((0x1a << 5) | 0x1f) << 1)) == 21 << 1)
6834 /* ldx, ldux, stdx, stdux -> ld, ldu, std, stdu. */
2365f8d7 6835 insn = ((58u | ((insn >> 6) & 4)) << 26) | ((insn >> 6) & 1);
2d0f3896
AM
6836 else if ((insn & (((0x1f << 5) | 0x1f) << 1)) == 341 << 1)
6837 /* lwax -> lwa. */
2365f8d7 6838 insn = (58u << 26) | 2;
2d0f3896
AM
6839 else
6840 return 0;
6841 insn |= rtra;
6842 return insn;
6843}
6844
766bc656
AM
6845/* If INSN is an opcode that may be used with an @tprel operand, return
6846 the transformed insn for an undefined weak symbol, ie. with the
6847 thread pointer REG operand removed. Otherwise return 0. */
6848
6849unsigned int
6850_bfd_elf_ppc_at_tprel_transform (unsigned int insn, unsigned int reg)
6851{
6852 if ((insn & (0x1f << 16)) == reg << 16
2365f8d7
AM
6853 && ((insn & (0x3fu << 26)) == 14u << 26 /* addi */
6854 || (insn & (0x3fu << 26)) == 15u << 26 /* addis */
6855 || (insn & (0x3fu << 26)) == 32u << 26 /* lwz */
6856 || (insn & (0x3fu << 26)) == 34u << 26 /* lbz */
6857 || (insn & (0x3fu << 26)) == 36u << 26 /* stw */
6858 || (insn & (0x3fu << 26)) == 38u << 26 /* stb */
6859 || (insn & (0x3fu << 26)) == 40u << 26 /* lhz */
6860 || (insn & (0x3fu << 26)) == 42u << 26 /* lha */
6861 || (insn & (0x3fu << 26)) == 44u << 26 /* sth */
6862 || (insn & (0x3fu << 26)) == 46u << 26 /* lmw */
6863 || (insn & (0x3fu << 26)) == 47u << 26 /* stmw */
6864 || (insn & (0x3fu << 26)) == 48u << 26 /* lfs */
6865 || (insn & (0x3fu << 26)) == 50u << 26 /* lfd */
6866 || (insn & (0x3fu << 26)) == 52u << 26 /* stfs */
6867 || (insn & (0x3fu << 26)) == 54u << 26 /* stfd */
6868 || ((insn & (0x3fu << 26)) == 58u << 26 /* lwa,ld,lmd */
766bc656 6869 && (insn & 3) != 1)
2365f8d7 6870 || ((insn & (0x3fu << 26)) == 62u << 26 /* std, stmd */
766bc656
AM
6871 && ((insn & 3) == 0 || (insn & 3) == 3))))
6872 {
6873 insn &= ~(0x1f << 16);
6874 }
6875 else if ((insn & (0x1f << 21)) == reg << 21
2365f8d7
AM
6876 && ((insn & (0x3eu << 26)) == 24u << 26 /* ori, oris */
6877 || (insn & (0x3eu << 26)) == 26u << 26 /* xori,xoris */
6878 || (insn & (0x3eu << 26)) == 28u << 26 /* andi,andis */))
766bc656
AM
6879 {
6880 insn &= ~(0x1f << 21);
6881 insn |= (insn & (0x1f << 16)) << 5;
2365f8d7 6882 if ((insn & (0x3eu << 26)) == 26u << 26 /* xori,xoris */)
766bc656
AM
6883 insn -= 2 >> 26; /* convert to ori,oris */
6884 }
6885 else
6886 insn = 0;
6887 return insn;
6888}
6889
1fe532cf
AM
6890static bfd_boolean
6891is_insn_ds_form (unsigned int insn)
6892{
2365f8d7
AM
6893 return ((insn & (0x3fu << 26)) == 58u << 26 /* ld,ldu,lwa */
6894 || (insn & (0x3fu << 26)) == 62u << 26 /* std,stdu,stq */
6895 || (insn & (0x3fu << 26)) == 57u << 26 /* lfdp */
6896 || (insn & (0x3fu << 26)) == 61u << 26 /* stfdp */);
1fe532cf
AM
6897}
6898
6899static bfd_boolean
6900is_insn_dq_form (unsigned int insn)
6901{
2365f8d7
AM
6902 return ((insn & (0x3fu << 26)) == 56u << 26 /* lq */
6903 || ((insn & (0x3fu << 26)) == (61u << 26) /* lxv, stxv */
a680de9a 6904 && (insn & 3) == 1));
1fe532cf
AM
6905}
6906
252b5132
RH
6907/* The RELOCATE_SECTION function is called by the ELF backend linker
6908 to handle the relocations for a section.
6909
6910 The relocs are always passed as Rela structures; if the section
6911 actually uses Rel structures, the r_addend field will always be
6912 zero.
6913
6914 This function is responsible for adjust the section contents as
6915 necessary, and (if using Rela relocs and generating a
1049f94e 6916 relocatable output file) adjusting the reloc addend as
252b5132
RH
6917 necessary.
6918
6919 This function does not have to worry about setting the reloc
6920 address or the reloc symbol index.
6921
6922 LOCAL_SYMS is a pointer to the swapped in local symbols.
6923
6924 LOCAL_SECTIONS is an array giving the section in the input file
6925 corresponding to the st_shndx field of each local symbol.
6926
6927 The global hash table entry for the global symbols can be found
6928 via elf_sym_hashes (input_bfd).
6929
1049f94e 6930 When generating relocatable output, this function must handle
252b5132
RH
6931 STB_LOCAL/STT_SECTION symbols specially. The output symbol is
6932 going to be the section symbol corresponding to the output
6933 section, which means that the addend must be adjusted
6934 accordingly. */
6935
b34976b6 6936static bfd_boolean
55fd94b0
AM
6937ppc_elf_relocate_section (bfd *output_bfd,
6938 struct bfd_link_info *info,
6939 bfd *input_bfd,
6940 asection *input_section,
6941 bfd_byte *contents,
6942 Elf_Internal_Rela *relocs,
6943 Elf_Internal_Sym *local_syms,
6944 asection **local_sections)
252b5132 6945{
7619e7c7
AM
6946 Elf_Internal_Shdr *symtab_hdr;
6947 struct elf_link_hash_entry **sym_hashes;
6948 struct ppc_elf_link_hash_table *htab;
6949 Elf_Internal_Rela *rel;
c316a17c 6950 Elf_Internal_Rela *wrel;
7619e7c7
AM
6951 Elf_Internal_Rela *relend;
6952 Elf_Internal_Rela outrel;
f95f8542 6953 asection *got2;
252b5132 6954 bfd_vma *local_got_offsets;
b34976b6 6955 bfd_boolean ret = TRUE;
95f0d0d2 6956 bfd_vma d_offset = (bfd_big_endian (input_bfd) ? 2 : 0);
3348747a 6957 bfd_boolean is_vxworks_tls;
d3e454b9
AM
6958 unsigned int picfixup_size = 0;
6959 struct ppc_elf_relax_info *relax_info = NULL;
b34976b6 6960
252b5132 6961#ifdef DEBUG
871b3ab2 6962 _bfd_error_handler ("ppc_elf_relocate_section called for %pB section %pA, "
d003868e
AM
6963 "%ld relocations%s",
6964 input_bfd, input_section,
6965 (long) input_section->reloc_count,
0e1862bb 6966 (bfd_link_relocatable (info)) ? " (relocatable)" : "");
252b5132
RH
6967#endif
6968
7af5d5c4
AM
6969 if (!is_ppc_elf (input_bfd))
6970 {
6971 bfd_set_error (bfd_error_wrong_format);
6972 return FALSE;
6973 }
6974
a6aa5195
AM
6975 got2 = bfd_get_section_by_name (input_bfd, ".got2");
6976
e47cd125 6977 /* Initialize howto table if not already done. */
8da6118f 6978 if (!ppc_elf_howto_table[R_PPC_ADDR32])
252b5132
RH
6979 ppc_elf_howto_init ();
6980
7619e7c7 6981 htab = ppc_elf_hash_table (info);
252b5132 6982 local_got_offsets = elf_local_got_offsets (input_bfd);
0ffa91dd 6983 symtab_hdr = &elf_symtab_hdr (input_bfd);
7619e7c7 6984 sym_hashes = elf_sym_hashes (input_bfd);
3348747a
NS
6985 /* We have to handle relocations in vxworks .tls_vars sections
6986 specially, because the dynamic loader is 'weird'. */
90c14f0c 6987 is_vxworks_tls = (htab->elf.target_os == is_vxworks && bfd_link_pic (info)
3348747a
NS
6988 && !strcmp (input_section->output_section->name,
6989 ".tls_vars"));
d3e454b9
AM
6990 if (input_section->sec_info_type == SEC_INFO_TYPE_TARGET)
6991 relax_info = elf_section_data (input_section)->sec_info;
c316a17c 6992 rel = wrel = relocs;
7619e7c7 6993 relend = relocs + input_section->reloc_count;
c316a17c 6994 for (; rel < relend; wrel++, rel++)
252b5132 6995 {
7619e7c7
AM
6996 enum elf_ppc_reloc_type r_type;
6997 bfd_vma addend;
6998 bfd_reloc_status_type r;
6999 Elf_Internal_Sym *sym;
7000 asection *sec;
7001 struct elf_link_hash_entry *h;
7002 const char *sym_name;
252b5132
RH
7003 reloc_howto_type *howto;
7004 unsigned long r_symndx;
7005 bfd_vma relocation;
91d6fa6a 7006 bfd_vma branch_bit, from;
23cedd1d 7007 bfd_boolean unresolved_reloc, save_unresolved_reloc;
7619e7c7
AM
7008 bfd_boolean warned;
7009 unsigned int tls_type, tls_mask, tls_gd;
08be3224 7010 struct plt_entry **ifunc, **plt_list;
86c95733 7011 struct reloc_howto_struct alt_howto;
7619e7c7 7012
c316a17c 7013 again:
55fd94b0
AM
7014 r_type = ELF32_R_TYPE (rel->r_info);
7015 sym = NULL;
7016 sec = NULL;
7017 h = NULL;
7619e7c7
AM
7018 unresolved_reloc = FALSE;
7019 warned = FALSE;
252b5132 7020 r_symndx = ELF32_R_SYM (rel->r_info);
560e09e9 7021
252b5132
RH
7022 if (r_symndx < symtab_hdr->sh_info)
7023 {
7024 sym = local_syms + r_symndx;
7025 sec = local_sections[r_symndx];
26c61ae5 7026 sym_name = bfd_elf_sym_name (input_bfd, symtab_hdr, sym, sec);
252b5132 7027
8517fae7 7028 relocation = _bfd_elf_rela_local_sym (output_bfd, sym, &sec, rel);
252b5132
RH
7029 }
7030 else
7031 {
62d887d4
L
7032 bfd_boolean ignored;
7033
b2a8e766
AM
7034 RELOC_FOR_GLOBAL_SYMBOL (info, input_bfd, input_section, rel,
7035 r_symndx, symtab_hdr, sym_hashes,
7036 h, sec, relocation,
62d887d4 7037 unresolved_reloc, warned, ignored);
9abc968f 7038
252b5132 7039 sym_name = h->root.root.string;
7619e7c7
AM
7040 }
7041
dbaa2011 7042 if (sec != NULL && discarded_section (sec))
ab96bf03
AM
7043 {
7044 /* For relocs against symbols from removed linkonce sections,
7045 or sections discarded by a linker script, we just want the
7046 section contents zeroed. Avoid any special processing. */
7047 howto = NULL;
7048 if (r_type < R_PPC_max)
7049 howto = ppc_elf_howto_table[r_type];
c316a17c
AM
7050
7051 _bfd_clear_contents (howto, input_bfd, input_section,
0930cb30 7052 contents, rel->r_offset);
c316a17c
AM
7053 wrel->r_offset = rel->r_offset;
7054 wrel->r_info = 0;
7055 wrel->r_addend = 0;
7056
7057 /* For ld -r, remove relocations in debug sections against
dcd2b8a0 7058 symbols defined in discarded sections. Not done for
c316a17c
AM
7059 non-debug to preserve relocs in .eh_frame which the
7060 eh_frame editing code expects to be present. */
7061 if (bfd_link_relocatable (info)
7062 && (input_section->flags & SEC_DEBUGGING))
7063 wrel--;
7064
7065 continue;
ab96bf03
AM
7066 }
7067
0e1862bb 7068 if (bfd_link_relocatable (info))
ab96bf03
AM
7069 {
7070 if (got2 != NULL
7071 && r_type == R_PPC_PLTREL24
f75e0e33 7072 && rel->r_addend != 0)
ab96bf03
AM
7073 {
7074 /* R_PPC_PLTREL24 is rather special. If non-zero, the
7075 addend specifies the GOT pointer offset within .got2. */
7076 rel->r_addend += got2->output_offset;
7077 }
53291d1f
AM
7078 if (r_type != R_PPC_RELAX_PLT
7079 && r_type != R_PPC_RELAX_PLTREL24
7080 && r_type != R_PPC_RELAX)
c316a17c 7081 goto copy_reloc;
ab96bf03
AM
7082 }
7083
7619e7c7
AM
7084 /* TLS optimizations. Replace instruction sequences and relocs
7085 based on information we collected in tls_optimize. We edit
7086 RELOCS so that --emit-relocs will output something sensible
7087 for the final instruction stream. */
7088 tls_mask = 0;
7089 tls_gd = 0;
727fc41e
AM
7090 if (h != NULL)
7091 tls_mask = ((struct ppc_elf_link_hash_entry *) h)->tls_mask;
7092 else if (local_got_offsets != NULL)
7619e7c7 7093 {
e054468f 7094 struct plt_entry **local_plt;
727fc41e 7095 char *lgot_masks;
e054468f
AM
7096 local_plt
7097 = (struct plt_entry **) (local_got_offsets + symtab_hdr->sh_info);
7098 lgot_masks = (char *) (local_plt + symtab_hdr->sh_info);
727fc41e 7099 tls_mask = lgot_masks[r_symndx];
7619e7c7
AM
7100 }
7101
7102 /* Ensure reloc mapping code below stays sane. */
7103 if ((R_PPC_GOT_TLSLD16 & 3) != (R_PPC_GOT_TLSGD16 & 3)
7104 || (R_PPC_GOT_TLSLD16_LO & 3) != (R_PPC_GOT_TLSGD16_LO & 3)
7105 || (R_PPC_GOT_TLSLD16_HI & 3) != (R_PPC_GOT_TLSGD16_HI & 3)
7106 || (R_PPC_GOT_TLSLD16_HA & 3) != (R_PPC_GOT_TLSGD16_HA & 3)
7107 || (R_PPC_GOT_TLSLD16 & 3) != (R_PPC_GOT_TPREL16 & 3)
7108 || (R_PPC_GOT_TLSLD16_LO & 3) != (R_PPC_GOT_TPREL16_LO & 3)
7109 || (R_PPC_GOT_TLSLD16_HI & 3) != (R_PPC_GOT_TPREL16_HI & 3)
7110 || (R_PPC_GOT_TLSLD16_HA & 3) != (R_PPC_GOT_TPREL16_HA & 3))
7111 abort ();
7112 switch (r_type)
7113 {
7114 default:
7115 break;
7116
7117 case R_PPC_GOT_TPREL16:
7118 case R_PPC_GOT_TPREL16_LO:
e054468f 7119 if ((tls_mask & TLS_TLS) != 0
7619e7c7
AM
7120 && (tls_mask & TLS_TPREL) == 0)
7121 {
7122 bfd_vma insn;
91d6fa6a 7123
95f0d0d2 7124 insn = bfd_get_32 (input_bfd,
c316a17c 7125 contents + rel->r_offset - d_offset);
7619e7c7
AM
7126 insn &= 31 << 21;
7127 insn |= 0x3c020000; /* addis 0,2,0 */
95f0d0d2 7128 bfd_put_32 (input_bfd, insn,
c316a17c 7129 contents + rel->r_offset - d_offset);
7619e7c7
AM
7130 r_type = R_PPC_TPREL16_HA;
7131 rel->r_info = ELF32_R_INFO (r_symndx, r_type);
7132 }
7133 break;
7134
7135 case R_PPC_TLS:
e054468f 7136 if ((tls_mask & TLS_TLS) != 0
7619e7c7
AM
7137 && (tls_mask & TLS_TPREL) == 0)
7138 {
2d0f3896
AM
7139 bfd_vma insn;
7140
95f0d0d2 7141 insn = bfd_get_32 (input_bfd, contents + rel->r_offset);
2d0f3896
AM
7142 insn = _bfd_elf_ppc_at_tls_transform (insn, 2);
7143 if (insn == 0)
7619e7c7 7144 abort ();
95f0d0d2 7145 bfd_put_32 (input_bfd, insn, contents + rel->r_offset);
7619e7c7
AM
7146 r_type = R_PPC_TPREL16_LO;
7147 rel->r_info = ELF32_R_INFO (r_symndx, r_type);
4fe5ca5b 7148
7619e7c7 7149 /* Was PPC_TLS which sits on insn boundary, now
4fe5ca5b
GM
7150 PPC_TPREL16_LO which is at low-order half-word. */
7151 rel->r_offset += d_offset;
7619e7c7
AM
7152 }
7153 break;
7154
7155 case R_PPC_GOT_TLSGD16_HI:
7156 case R_PPC_GOT_TLSGD16_HA:
b00a0a86 7157 tls_gd = TLS_GDIE;
e054468f 7158 if ((tls_mask & TLS_TLS) != 0 && (tls_mask & TLS_GD) == 0)
7619e7c7
AM
7159 goto tls_gdld_hi;
7160 break;
7161
7162 case R_PPC_GOT_TLSLD16_HI:
7163 case R_PPC_GOT_TLSLD16_HA:
e054468f 7164 if ((tls_mask & TLS_TLS) != 0 && (tls_mask & TLS_LD) == 0)
7619e7c7
AM
7165 {
7166 tls_gdld_hi:
7167 if ((tls_mask & tls_gd) != 0)
7168 r_type = (((r_type - (R_PPC_GOT_TLSGD16 & 3)) & 3)
7169 + R_PPC_GOT_TPREL16);
7170 else
7171 {
4fe5ca5b 7172 rel->r_offset -= d_offset;
95f0d0d2 7173 bfd_put_32 (input_bfd, NOP, contents + rel->r_offset);
7619e7c7
AM
7174 r_type = R_PPC_NONE;
7175 }
7176 rel->r_info = ELF32_R_INFO (r_symndx, r_type);
7177 }
7178 break;
7179
7180 case R_PPC_GOT_TLSGD16:
7181 case R_PPC_GOT_TLSGD16_LO:
b00a0a86 7182 tls_gd = TLS_GDIE;
e054468f 7183 if ((tls_mask & TLS_TLS) != 0 && (tls_mask & TLS_GD) == 0)
b7fcf6f6 7184 goto tls_ldgd_opt;
7619e7c7
AM
7185 break;
7186
7187 case R_PPC_GOT_TLSLD16:
7188 case R_PPC_GOT_TLSLD16_LO:
e054468f 7189 if ((tls_mask & TLS_TLS) != 0 && (tls_mask & TLS_LD) == 0)
7619e7c7 7190 {
3a71aa26 7191 unsigned int insn1, insn2;
b7fcf6f6 7192 bfd_vma offset;
7619e7c7 7193
b7fcf6f6 7194 tls_ldgd_opt:
727fc41e
AM
7195 offset = (bfd_vma) -1;
7196 /* If not using the newer R_PPC_TLSGD/LD to mark
7197 __tls_get_addr calls, we must trust that the call
7198 stays with its arg setup insns, ie. that the next
7199 reloc is the __tls_get_addr call associated with
7200 the current reloc. Edit both insns. */
9737e8af 7201 if (input_section->nomark_tls_get_addr
727fc41e
AM
7202 && rel + 1 < relend
7203 && branch_reloc_hash_match (input_bfd, rel + 1,
7204 htab->tls_get_addr))
7205 offset = rel[1].r_offset;
b86ac8e3
AM
7206 /* We read the low GOT_TLS insn because we need to keep
7207 the destination reg. It may be something other than
7208 the usual r3, and moved to r3 before the call by
7209 intervening code. */
95f0d0d2 7210 insn1 = bfd_get_32 (input_bfd,
b86ac8e3 7211 contents + rel->r_offset - d_offset);
b7fcf6f6
AM
7212 if ((tls_mask & tls_gd) != 0)
7213 {
7214 /* IE */
b86ac8e3 7215 insn1 &= (0x1f << 21) | (0x1f << 16);
2365f8d7 7216 insn1 |= 32u << 26; /* lwz */
727fc41e
AM
7217 if (offset != (bfd_vma) -1)
7218 {
f58d5a2d 7219 rel[1].r_info = ELF32_R_INFO (STN_UNDEF, R_PPC_NONE);
727fc41e 7220 insn2 = 0x7c631214; /* add 3,3,2 */
95f0d0d2 7221 bfd_put_32 (input_bfd, insn2, contents + offset);
727fc41e 7222 }
b7fcf6f6
AM
7223 r_type = (((r_type - (R_PPC_GOT_TLSGD16 & 3)) & 3)
7224 + R_PPC_GOT_TPREL16);
7225 rel->r_info = ELF32_R_INFO (r_symndx, r_type);
7226 }
7227 else
7228 {
7229 /* LE */
b86ac8e3
AM
7230 insn1 &= 0x1f << 21;
7231 insn1 |= 0x3c020000; /* addis r,2,0 */
7619e7c7
AM
7232 if (tls_gd == 0)
7233 {
b7fcf6f6 7234 /* Was an LD reloc. */
1d483afe
AM
7235 for (r_symndx = 0;
7236 r_symndx < symtab_hdr->sh_info;
7237 r_symndx++)
7238 if (local_sections[r_symndx] == sec)
7239 break;
7240 if (r_symndx >= symtab_hdr->sh_info)
cf35638d 7241 r_symndx = STN_UNDEF;
b7fcf6f6 7242 rel->r_addend = htab->elf.tls_sec->vma + DTP_OFFSET;
cf35638d 7243 if (r_symndx != STN_UNDEF)
1d483afe
AM
7244 rel->r_addend -= (local_syms[r_symndx].st_value
7245 + sec->output_offset
7246 + sec->output_section->vma);
7619e7c7 7247 }
b7fcf6f6
AM
7248 r_type = R_PPC_TPREL16_HA;
7249 rel->r_info = ELF32_R_INFO (r_symndx, r_type);
727fc41e
AM
7250 if (offset != (bfd_vma) -1)
7251 {
7252 rel[1].r_info = ELF32_R_INFO (r_symndx, R_PPC_TPREL16_LO);
7253 rel[1].r_offset = offset + d_offset;
7254 rel[1].r_addend = rel->r_addend;
7255 insn2 = 0x38630000; /* addi 3,3,0 */
95f0d0d2 7256 bfd_put_32 (input_bfd, insn2, contents + offset);
727fc41e 7257 }
b7fcf6f6 7258 }
95f0d0d2 7259 bfd_put_32 (input_bfd, insn1,
b7fcf6f6 7260 contents + rel->r_offset - d_offset);
b7fcf6f6
AM
7261 if (tls_gd == 0)
7262 {
7263 /* We changed the symbol on an LD reloc. Start over
7264 in order to get h, sym, sec etc. right. */
c316a17c 7265 goto again;
7619e7c7 7266 }
252b5132 7267 }
7619e7c7 7268 break;
727fc41e
AM
7269
7270 case R_PPC_TLSGD:
675e2809
AM
7271 if ((tls_mask & TLS_TLS) != 0 && (tls_mask & TLS_GD) == 0
7272 && rel + 1 < relend)
727fc41e
AM
7273 {
7274 unsigned int insn2;
7275 bfd_vma offset = rel->r_offset;
7276
23cedd1d
AM
7277 if (is_plt_seq_reloc (ELF32_R_TYPE (rel[1].r_info)))
7278 {
7279 bfd_put_32 (input_bfd, NOP, contents + offset);
7280 rel[1].r_info = ELF32_R_INFO (STN_UNDEF, R_PPC_NONE);
7281 break;
7282 }
7283
b00a0a86 7284 if ((tls_mask & TLS_GDIE) != 0)
727fc41e
AM
7285 {
7286 /* IE */
7287 r_type = R_PPC_NONE;
7288 insn2 = 0x7c631214; /* add 3,3,2 */
7289 }
7290 else
7291 {
7292 /* LE */
7293 r_type = R_PPC_TPREL16_LO;
7294 rel->r_offset += d_offset;
7295 insn2 = 0x38630000; /* addi 3,3,0 */
7296 }
7297 rel->r_info = ELF32_R_INFO (r_symndx, r_type);
95f0d0d2 7298 bfd_put_32 (input_bfd, insn2, contents + offset);
727fc41e
AM
7299 /* Zap the reloc on the _tls_get_addr call too. */
7300 BFD_ASSERT (offset == rel[1].r_offset);
f58d5a2d 7301 rel[1].r_info = ELF32_R_INFO (STN_UNDEF, R_PPC_NONE);
727fc41e
AM
7302 }
7303 break;
7304
7305 case R_PPC_TLSLD:
675e2809
AM
7306 if ((tls_mask & TLS_TLS) != 0 && (tls_mask & TLS_LD) == 0
7307 && rel + 1 < relend)
727fc41e
AM
7308 {
7309 unsigned int insn2;
7310
23cedd1d
AM
7311 if (is_plt_seq_reloc (ELF32_R_TYPE (rel[1].r_info)))
7312 {
7313 bfd_put_32 (input_bfd, NOP, contents + rel->r_offset);
7314 rel[1].r_info = ELF32_R_INFO (STN_UNDEF, R_PPC_NONE);
7315 break;
7316 }
7317
727fc41e
AM
7318 for (r_symndx = 0;
7319 r_symndx < symtab_hdr->sh_info;
7320 r_symndx++)
7321 if (local_sections[r_symndx] == sec)
7322 break;
7323 if (r_symndx >= symtab_hdr->sh_info)
cf35638d 7324 r_symndx = STN_UNDEF;
727fc41e 7325 rel->r_addend = htab->elf.tls_sec->vma + DTP_OFFSET;
cf35638d 7326 if (r_symndx != STN_UNDEF)
727fc41e
AM
7327 rel->r_addend -= (local_syms[r_symndx].st_value
7328 + sec->output_offset
7329 + sec->output_section->vma);
7330
7331 rel->r_info = ELF32_R_INFO (r_symndx, R_PPC_TPREL16_LO);
7332 rel->r_offset += d_offset;
7333 insn2 = 0x38630000; /* addi 3,3,0 */
95f0d0d2 7334 bfd_put_32 (input_bfd, insn2,
727fc41e
AM
7335 contents + rel->r_offset - d_offset);
7336 /* Zap the reloc on the _tls_get_addr call too. */
7337 BFD_ASSERT (rel->r_offset - d_offset == rel[1].r_offset);
f58d5a2d 7338 rel[1].r_info = ELF32_R_INFO (STN_UNDEF, R_PPC_NONE);
c316a17c 7339 goto again;
727fc41e
AM
7340 }
7341 break;
7619e7c7
AM
7342 }
7343
7344 /* Handle other relocations that tweak non-addend part of insn. */
7345 branch_bit = 0;
7346 switch (r_type)
7347 {
7348 default:
7349 break;
7350
7351 /* Branch taken prediction relocations. */
7352 case R_PPC_ADDR14_BRTAKEN:
7353 case R_PPC_REL14_BRTAKEN:
7354 branch_bit = BRANCH_PREDICT_BIT;
1a0670f3 7355 /* Fall through. */
7619e7c7 7356
4cc11e76 7357 /* Branch not taken prediction relocations. */
7619e7c7
AM
7358 case R_PPC_ADDR14_BRNTAKEN:
7359 case R_PPC_REL14_BRNTAKEN:
91d6fa6a 7360 {
23cedd1d 7361 unsigned int insn;
7619e7c7 7362
95f0d0d2 7363 insn = bfd_get_32 (input_bfd, contents + rel->r_offset);
91d6fa6a
NC
7364 insn &= ~BRANCH_PREDICT_BIT;
7365 insn |= branch_bit;
7619e7c7 7366
91d6fa6a
NC
7367 from = (rel->r_offset
7368 + input_section->output_offset
7369 + input_section->output_section->vma);
7619e7c7 7370
91d6fa6a
NC
7371 /* Invert 'y' bit if not the default. */
7372 if ((bfd_signed_vma) (relocation + rel->r_addend - from) < 0)
7373 insn ^= BRANCH_PREDICT_BIT;
7374
95f0d0d2 7375 bfd_put_32 (input_bfd, insn, contents + rel->r_offset);
91d6fa6a 7376 }
08be3224
AM
7377 break;
7378
7379 case R_PPC_PLT16_HA:
7380 {
7381 unsigned int insn;
7382
7383 insn = bfd_get_32 (input_bfd,
7384 contents + rel->r_offset - d_offset);
2365f8d7 7385 if ((insn & (0x3fu << 26)) == 15u << 26
08be3224
AM
7386 && (insn & (0x1f << 16)) != 0)
7387 {
7388 if (!bfd_link_pic (info))
7389 {
7390 /* Convert addis to lis. */
7391 insn &= ~(0x1f << 16);
7392 bfd_put_32 (input_bfd, insn,
7393 contents + rel->r_offset - d_offset);
7394 }
7395 }
7396 else if (bfd_link_pic (info))
7397 info->callbacks->einfo
7398 (_("%P: %H: error: %s with unexpected instruction %x\n"),
7399 input_bfd, input_section, rel->r_offset,
7400 "R_PPC_PLT16_HA", insn);
7401 }
7402 break;
252b5132
RH
7403 }
7404
d3e454b9
AM
7405 if (ELIMINATE_COPY_RELOCS
7406 && h != NULL
7407 && !h->def_regular
7408 && h->protected_def
7409 && ppc_elf_hash_entry (h)->has_addr16_ha
7410 && ppc_elf_hash_entry (h)->has_addr16_lo
7411 && htab->params->pic_fixup > 0)
7412 {
7413 /* Convert lis;addi or lis;load/store accessing a protected
7414 variable defined in a shared library to PIC. */
7415 unsigned int insn;
7416
7417 if (r_type == R_PPC_ADDR16_HA)
7418 {
95f0d0d2 7419 insn = bfd_get_32 (input_bfd,
d3e454b9 7420 contents + rel->r_offset - d_offset);
2365f8d7 7421 if ((insn & (0x3fu << 26)) == (15u << 26)
d3e454b9
AM
7422 && (insn & (0x1f << 16)) == 0 /* lis */)
7423 {
7424 bfd_byte *p;
7425 bfd_vma off;
7426 bfd_vma got_addr;
7427
7428 p = (contents + input_section->size
7429 - relax_info->workaround_size
7430 - relax_info->picfixup_size
7431 + picfixup_size);
7432 off = (p - contents) - (rel->r_offset - d_offset);
7433 if (off > 0x1fffffc || (off & 3) != 0)
7434 info->callbacks->einfo
174d0a74 7435 (_("%H: fixup branch overflow\n"),
d3e454b9
AM
7436 input_bfd, input_section, rel->r_offset);
7437
95f0d0d2 7438 bfd_put_32 (input_bfd, B | off,
d3e454b9 7439 contents + rel->r_offset - d_offset);
ce558b89
AM
7440 got_addr = (htab->elf.sgot->output_section->vma
7441 + htab->elf.sgot->output_offset
d3e454b9 7442 + (h->got.offset & ~1));
c316a17c
AM
7443 wrel->r_offset = (p - contents) + d_offset;
7444 wrel->r_info = ELF32_R_INFO (0, R_PPC_ADDR16_HA);
7445 wrel->r_addend = got_addr;
d3e454b9 7446 insn &= ~0xffff;
4aef7643 7447 insn |= ((unsigned int) (got_addr + 0x8000) >> 16) & 0xffff;
95f0d0d2 7448 bfd_put_32 (input_bfd, insn, p);
d3e454b9
AM
7449
7450 /* Convert lis to lwz, loading address from GOT. */
7451 insn &= ~0xffff;
7452 insn ^= (32u ^ 15u) << 26;
7453 insn |= (insn & (0x1f << 21)) >> 5;
7454 insn |= got_addr & 0xffff;
95f0d0d2 7455 bfd_put_32 (input_bfd, insn, p + 4);
d3e454b9 7456
95f0d0d2 7457 bfd_put_32 (input_bfd, B | ((-4 - off) & 0x3ffffff), p + 8);
d3e454b9
AM
7458 picfixup_size += 12;
7459
7460 /* Use one of the spare relocs, so --emit-relocs
7461 output is reasonable. */
7462 memmove (rel + 1, rel, (relend - rel - 1) * sizeof (*rel));
c316a17c
AM
7463 wrel++, rel++;
7464 rel->r_offset = wrel[-1].r_offset + 4;
d3e454b9 7465 rel->r_info = ELF32_R_INFO (0, R_PPC_ADDR16_LO);
c316a17c 7466 rel->r_addend = wrel[-1].r_addend;
d3e454b9
AM
7467
7468 /* Continue on as if we had a got reloc, to output
7469 dynamic reloc. */
7470 r_type = R_PPC_GOT16_LO;
7471 }
7472 else
2c4d9cbe 7473 _bfd_error_handler
695344c0 7474 /* xgettext:c-format */
2dcf00ce
AM
7475 (_("%pB(%pA+%#" PRIx64 "): error: "
7476 "%s with unexpected instruction %#x"),
7477 input_bfd, input_section, (uint64_t) rel->r_offset,
d3e454b9
AM
7478 "R_PPC_ADDR16_HA", insn);
7479 }
7480 else if (r_type == R_PPC_ADDR16_LO)
7481 {
95f0d0d2 7482 insn = bfd_get_32 (input_bfd,
d3e454b9 7483 contents + rel->r_offset - d_offset);
2365f8d7
AM
7484 if ((insn & (0x3fu << 26)) == 14u << 26 /* addi */
7485 || (insn & (0x3fu << 26)) == 32u << 26 /* lwz */
7486 || (insn & (0x3fu << 26)) == 34u << 26 /* lbz */
7487 || (insn & (0x3fu << 26)) == 36u << 26 /* stw */
7488 || (insn & (0x3fu << 26)) == 38u << 26 /* stb */
7489 || (insn & (0x3fu << 26)) == 40u << 26 /* lhz */
7490 || (insn & (0x3fu << 26)) == 42u << 26 /* lha */
7491 || (insn & (0x3fu << 26)) == 44u << 26 /* sth */
7492 || (insn & (0x3fu << 26)) == 46u << 26 /* lmw */
7493 || (insn & (0x3fu << 26)) == 47u << 26 /* stmw */
7494 || (insn & (0x3fu << 26)) == 48u << 26 /* lfs */
7495 || (insn & (0x3fu << 26)) == 50u << 26 /* lfd */
7496 || (insn & (0x3fu << 26)) == 52u << 26 /* stfs */
7497 || (insn & (0x3fu << 26)) == 54u << 26 /* stfd */
7498 || ((insn & (0x3fu << 26)) == 58u << 26 /* lwa,ld,lmd */
d3e454b9 7499 && (insn & 3) != 1)
2365f8d7 7500 || ((insn & (0x3fu << 26)) == 62u << 26 /* std, stmd */
d3e454b9
AM
7501 && ((insn & 3) == 0 || (insn & 3) == 3)))
7502 {
7503 /* Arrange to apply the reloc addend, if any. */
7504 relocation = 0;
7505 unresolved_reloc = FALSE;
7506 rel->r_info = ELF32_R_INFO (0, r_type);
7507 }
7508 else
2c4d9cbe 7509 _bfd_error_handler
695344c0 7510 /* xgettext:c-format */
2dcf00ce
AM
7511 (_("%pB(%pA+%#" PRIx64 "): error: "
7512 "%s with unexpected instruction %#x"),
7513 input_bfd, input_section, (uint64_t) rel->r_offset,
d3e454b9
AM
7514 "R_PPC_ADDR16_LO", insn);
7515 }
7516 }
7517
e054468f 7518 ifunc = NULL;
90c14f0c 7519 if (htab->elf.target_os != is_vxworks)
e054468f 7520 {
de972ffa
AM
7521 struct plt_entry *ent;
7522
e054468f
AM
7523 if (h != NULL)
7524 {
7525 if (h->type == STT_GNU_IFUNC)
7526 ifunc = &h->plt.plist;
7527 }
de972ffa
AM
7528 else if (local_got_offsets != NULL
7529 && ELF_ST_TYPE (sym->st_info) == STT_GNU_IFUNC)
e054468f 7530 {
de972ffa 7531 struct plt_entry **local_plt;
e054468f 7532
de972ffa
AM
7533 local_plt = (struct plt_entry **) (local_got_offsets
7534 + symtab_hdr->sh_info);
7535 ifunc = local_plt + r_symndx;
e054468f 7536 }
e054468f 7537
de972ffa
AM
7538 ent = NULL;
7539 if (ifunc != NULL
0e1862bb 7540 && (!bfd_link_pic (info)
08be3224
AM
7541 || is_branch_reloc (r_type)
7542 || r_type == R_PPC_PLT16_LO
7543 || r_type == R_PPC_PLT16_HI
7544 || r_type == R_PPC_PLT16_HA))
de972ffa
AM
7545 {
7546 addend = 0;
08be3224
AM
7547 if (bfd_link_pic (info)
7548 && (r_type == R_PPC_PLTREL24
7549 || r_type == R_PPC_PLT16_LO
7550 || r_type == R_PPC_PLT16_HI
7551 || r_type == R_PPC_PLT16_HA))
de972ffa
AM
7552 addend = rel->r_addend;
7553 ent = find_plt_ent (ifunc, got2, addend);
7554 }
7555 if (ent != NULL)
7556 {
888a7fc3
AM
7557 if (bfd_link_pic (info)
7558 && ent->sec != got2
7559 && htab->plt_type != PLT_NEW
7560 && (!htab->elf.dynamic_sections_created
7561 || h == NULL
7562 || h->dynindx == -1))
7563 {
7564 /* Uh oh, we are going to create a pic glink stub
7565 for an ifunc (here for h == NULL and later in
7566 finish_dynamic_symbol for h != NULL), and
7567 apparently are using code compiled with
7568 -mbss-plt. The difficulty is that -mbss-plt code
7569 gives no indication via a magic PLTREL24 addend
7570 whether r30 is equal to _GLOBAL_OFFSET_TABLE_ or
7571 is pointing into a .got2 section (and how far
7572 into .got2). */
7573 info->callbacks->einfo
695344c0 7574 /* xgettext:c-format */
174d0a74 7575 (_("%X%H: unsupported bss-plt -fPIC ifunc %s\n"),
888a7fc3
AM
7576 input_bfd, input_section, rel->r_offset, sym_name);
7577 }
e054468f
AM
7578
7579 unresolved_reloc = FALSE;
7580 if (htab->plt_type == PLT_NEW
7581 || !htab->elf.dynamic_sections_created
c7e17e05
AM
7582 || h == NULL
7583 || h->dynindx == -1)
e054468f
AM
7584 relocation = (htab->glink->output_section->vma
7585 + htab->glink->output_offset
7586 + (ent->glink_offset & ~1));
7587 else
ce558b89
AM
7588 relocation = (htab->elf.splt->output_section->vma
7589 + htab->elf.splt->output_offset
e054468f
AM
7590 + ent->plt.offset);
7591 }
7592 }
7593
7619e7c7 7594 addend = rel->r_addend;
23cedd1d 7595 save_unresolved_reloc = unresolved_reloc;
7619e7c7 7596 howto = NULL;
55fd94b0
AM
7597 if (r_type < R_PPC_max)
7598 howto = ppc_elf_howto_table[r_type];
9a23f96e 7599
9a23f96e 7600 tls_type = 0;
7619e7c7 7601 switch (r_type)
252b5132
RH
7602 {
7603 default:
cf97bcb0
AM
7604 /* xgettext:c-format */
7605 _bfd_error_handler (_("%pB: %s unsupported"),
7606 input_bfd, howto->name);
252b5132
RH
7607
7608 bfd_set_error (bfd_error_bad_value);
b34976b6 7609 ret = FALSE;
c316a17c 7610 goto copy_reloc;
252b5132 7611
7619e7c7
AM
7612 case R_PPC_NONE:
7613 case R_PPC_TLS:
727fc41e
AM
7614 case R_PPC_TLSGD:
7615 case R_PPC_TLSLD:
7619e7c7
AM
7616 case R_PPC_EMB_MRKREF:
7617 case R_PPC_GNU_VTINHERIT:
7618 case R_PPC_GNU_VTENTRY:
c316a17c 7619 goto copy_reloc;
7595d193 7620
7619e7c7
AM
7621 /* GOT16 relocations. Like an ADDR16 using the symbol's
7622 address in the GOT as relocation value instead of the
7623 symbol's value itself. Also, create a GOT entry for the
7624 symbol and put the symbol value there. */
7625 case R_PPC_GOT_TLSGD16:
7626 case R_PPC_GOT_TLSGD16_LO:
7627 case R_PPC_GOT_TLSGD16_HI:
7628 case R_PPC_GOT_TLSGD16_HA:
7629 tls_type = TLS_TLS | TLS_GD;
7630 goto dogot;
7631
7632 case R_PPC_GOT_TLSLD16:
7633 case R_PPC_GOT_TLSLD16_LO:
7634 case R_PPC_GOT_TLSLD16_HI:
7635 case R_PPC_GOT_TLSLD16_HA:
7636 tls_type = TLS_TLS | TLS_LD;
7637 goto dogot;
7638
7639 case R_PPC_GOT_TPREL16:
7640 case R_PPC_GOT_TPREL16_LO:
7641 case R_PPC_GOT_TPREL16_HI:
7642 case R_PPC_GOT_TPREL16_HA:
7643 tls_type = TLS_TLS | TLS_TPREL;
7644 goto dogot;
7645
7646 case R_PPC_GOT_DTPREL16:
7647 case R_PPC_GOT_DTPREL16_LO:
7648 case R_PPC_GOT_DTPREL16_HI:
7649 case R_PPC_GOT_DTPREL16_HA:
7650 tls_type = TLS_TLS | TLS_DTPREL;
7651 goto dogot;
7652
7653 case R_PPC_GOT16:
7654 case R_PPC_GOT16_LO:
7655 case R_PPC_GOT16_HI:
7656 case R_PPC_GOT16_HA:
727fc41e 7657 tls_mask = 0;
7619e7c7
AM
7658 dogot:
7659 {
7660 /* Relocation is to the entry for this symbol in the global
7661 offset table. */
7662 bfd_vma off;
7663 bfd_vma *offp;
7664 unsigned long indx;
7665
ce558b89 7666 if (htab->elf.sgot == NULL)
7619e7c7
AM
7667 abort ();
7668
7669 indx = 0;
7670 if (tls_type == (TLS_TLS | TLS_LD)
f749f26e 7671 && SYMBOL_REFERENCES_LOCAL (info, h))
7619e7c7
AM
7672 offp = &htab->tlsld_got.offset;
7673 else if (h != NULL)
7674 {
f0158f44
AM
7675 if (!htab->elf.dynamic_sections_created
7676 || h->dynindx == -1
7677 || SYMBOL_REFERENCES_LOCAL (info, h)
21d68fcd 7678 || UNDEFWEAK_NO_DYNAMIC_RELOC (info, h))
7619e7c7
AM
7679 /* This is actually a static link, or it is a
7680 -Bsymbolic link and the symbol is defined
7681 locally, or the symbol was forced to be local
7682 because of a version file. */
7683 ;
7684 else
7685 {
7686 indx = h->dynindx;
7687 unresolved_reloc = FALSE;
7688 }
7689 offp = &h->got.offset;
7690 }
7691 else
7692 {
7693 if (local_got_offsets == NULL)
7694 abort ();
7695 offp = &local_got_offsets[r_symndx];
7696 }
7697
7698 /* The offset must always be a multiple of 4. We use the
7699 least significant bit to record whether we have already
7700 processed this entry. */
7701 off = *offp;
7702 if ((off & 1) != 0)
7703 off &= ~1;
7704 else
7705 {
37da22e5
AM
7706 unsigned int tls_m = ((tls_mask & TLS_TLS) != 0
7707 ? tls_mask & (TLS_LD | TLS_GD | TLS_DTPREL
b00a0a86 7708 | TLS_TPREL | TLS_GDIE)
37da22e5 7709 : 0);
70bccea4
AM
7710
7711 if (offp == &htab->tlsld_got.offset)
7712 tls_m = TLS_LD;
f749f26e
AM
7713 else if ((tls_m & TLS_LD) != 0
7714 && SYMBOL_REFERENCES_LOCAL (info, h))
70bccea4
AM
7715 tls_m &= ~TLS_LD;
7716
7717 /* We might have multiple got entries for this sym.
7718 Initialize them all. */
7719 do
7619e7c7 7720 {
70bccea4
AM
7721 int tls_ty = 0;
7722
7723 if ((tls_m & TLS_LD) != 0)
7619e7c7 7724 {
70bccea4
AM
7725 tls_ty = TLS_TLS | TLS_LD;
7726 tls_m &= ~TLS_LD;
7727 }
7728 else if ((tls_m & TLS_GD) != 0)
7729 {
7730 tls_ty = TLS_TLS | TLS_GD;
7731 tls_m &= ~TLS_GD;
7732 }
7733 else if ((tls_m & TLS_DTPREL) != 0)
7734 {
7735 tls_ty = TLS_TLS | TLS_DTPREL;
7736 tls_m &= ~TLS_DTPREL;
7737 }
b00a0a86 7738 else if ((tls_m & (TLS_TPREL | TLS_GDIE)) != 0)
70bccea4
AM
7739 {
7740 tls_ty = TLS_TLS | TLS_TPREL;
7741 tls_m = 0;
7619e7c7 7742 }
7619e7c7 7743
70bccea4 7744 /* Generate relocs for the dynamic linker. */
f0158f44
AM
7745 if (indx != 0
7746 || (bfd_link_pic (info)
7747 && (h == NULL
f749f26e
AM
7748 || !UNDEFWEAK_NO_DYNAMIC_RELOC (info, h))
7749 && !(tls_ty != 0
f15d0b54
AM
7750 && bfd_link_executable (info)
7751 && SYMBOL_REFERENCES_LOCAL (info, h))))
7619e7c7 7752 {
ce558b89 7753 asection *rsec = htab->elf.srelgot;
91d6fa6a 7754 bfd_byte * loc;
91e21fb7 7755
0bed072f 7756 if (ifunc != NULL)
82e66161
AM
7757 {
7758 rsec = htab->elf.irelplt;
7759 if (indx == 0)
7760 htab->local_ifunc_resolver = 1;
7761 else if (is_static_defined (h))
7762 htab->maybe_local_ifunc_resolver = 1;
7763 }
ce558b89
AM
7764 outrel.r_offset = (htab->elf.sgot->output_section->vma
7765 + htab->elf.sgot->output_offset
70bccea4 7766 + off);
e515b051 7767 outrel.r_addend = 0;
70bccea4
AM
7768 if (tls_ty & (TLS_LD | TLS_GD))
7769 {
7770 outrel.r_info = ELF32_R_INFO (indx, R_PPC_DTPMOD32);
70bccea4
AM
7771 if (tls_ty == (TLS_TLS | TLS_GD))
7772 {
25f23106
AM
7773 loc = rsec->contents;
7774 loc += (rsec->reloc_count++
70bccea4
AM
7775 * sizeof (Elf32_External_Rela));
7776 bfd_elf32_swap_reloca_out (output_bfd,
7777 &outrel, loc);
e515b051 7778 outrel.r_offset += 4;
70bccea4
AM
7779 outrel.r_info
7780 = ELF32_R_INFO (indx, R_PPC_DTPREL32);
70bccea4
AM
7781 }
7782 }
7783 else if (tls_ty == (TLS_TLS | TLS_DTPREL))
7784 outrel.r_info = ELF32_R_INFO (indx, R_PPC_DTPREL32);
7785 else if (tls_ty == (TLS_TLS | TLS_TPREL))
7786 outrel.r_info = ELF32_R_INFO (indx, R_PPC_TPREL32);
25f23106 7787 else if (indx != 0)
70bccea4 7788 outrel.r_info = ELF32_R_INFO (indx, R_PPC_GLOB_DAT);
25f23106
AM
7789 else if (ifunc != NULL)
7790 outrel.r_info = ELF32_R_INFO (0, R_PPC_IRELATIVE);
7791 else
7792 outrel.r_info = ELF32_R_INFO (0, R_PPC_RELATIVE);
d6e14abc 7793 if (indx == 0 && tls_ty != (TLS_TLS | TLS_LD))
e515b051
AM
7794 {
7795 outrel.r_addend += relocation;
7796 if (tls_ty & (TLS_GD | TLS_DTPREL | TLS_TPREL))
989f9879
AM
7797 {
7798 if (htab->elf.tls_sec == NULL)
7799 outrel.r_addend = 0;
7800 else
7801 outrel.r_addend -= htab->elf.tls_sec->vma;
7802 }
e515b051 7803 }
25f23106
AM
7804 loc = rsec->contents;
7805 loc += (rsec->reloc_count++
70bccea4
AM
7806 * sizeof (Elf32_External_Rela));
7807 bfd_elf32_swap_reloca_out (output_bfd, &outrel, loc);
7619e7c7
AM
7808 }
7809
70bccea4
AM
7810 /* Init the .got section contents if we're not
7811 emitting a reloc. */
7812 else
7619e7c7 7813 {
70bccea4
AM
7814 bfd_vma value = relocation;
7815
f0158f44 7816 if (tls_ty != 0)
70bccea4 7817 {
989f9879
AM
7818 if (htab->elf.tls_sec == NULL)
7819 value = 0;
7820 else
7821 {
f0158f44
AM
7822 if (tls_ty & TLS_LD)
7823 value = 0;
7824 else
7825 value -= htab->elf.tls_sec->vma + DTP_OFFSET;
676ee2b5 7826 if (tls_ty & TLS_TPREL)
989f9879
AM
7827 value += DTP_OFFSET - TP_OFFSET;
7828 }
70bccea4 7829
f0158f44 7830 if (tls_ty & (TLS_LD | TLS_GD))
7b609f53 7831 {
95f0d0d2 7832 bfd_put_32 (input_bfd, value,
ce558b89 7833 htab->elf.sgot->contents + off + 4);
676ee2b5 7834 value = 1;
7b609f53 7835 }
70bccea4 7836 }
95f0d0d2 7837 bfd_put_32 (input_bfd, value,
ce558b89 7838 htab->elf.sgot->contents + off);
7619e7c7 7839 }
70bccea4
AM
7840
7841 off += 4;
7842 if (tls_ty & (TLS_LD | TLS_GD))
7843 off += 4;
7619e7c7 7844 }
70bccea4
AM
7845 while (tls_m != 0);
7846
7847 off = *offp;
7848 *offp = off | 1;
7619e7c7
AM
7849 }
7850
7851 if (off >= (bfd_vma) -2)
7852 abort ();
7853
70bccea4
AM
7854 if ((tls_type & TLS_TLS) != 0)
7855 {
7856 if (tls_type != (TLS_TLS | TLS_LD))
7857 {
7858 if ((tls_mask & TLS_LD) != 0
f749f26e 7859 && !SYMBOL_REFERENCES_LOCAL (info, h))
70bccea4
AM
7860 off += 8;
7861 if (tls_type != (TLS_TLS | TLS_GD))
7862 {
7863 if ((tls_mask & TLS_GD) != 0)
7864 off += 8;
7865 if (tls_type != (TLS_TLS | TLS_DTPREL))
7866 {
7867 if ((tls_mask & TLS_DTPREL) != 0)
7868 off += 4;
7869 }
7870 }
7871 }
7872 }
7873
d3e454b9
AM
7874 /* If here for a picfixup, we're done. */
7875 if (r_type != ELF32_R_TYPE (rel->r_info))
c316a17c 7876 goto copy_reloc;
d3e454b9 7877
ce558b89
AM
7878 relocation = (htab->elf.sgot->output_section->vma
7879 + htab->elf.sgot->output_offset
e87d4038
AM
7880 + off
7881 - SYM_VAL (htab->elf.hgot));
7619e7c7
AM
7882
7883 /* Addends on got relocations don't make much sense.
7884 x+off@got is actually x@got+off, and since the got is
7885 generated by a hash table traversal, the value in the
7886 got at entry m+n bears little relation to the entry m. */
7887 if (addend != 0)
25f53a85 7888 info->callbacks->einfo
695344c0 7889 /* xgettext:c-format */
174d0a74 7890 (_("%H: non-zero addend on %s reloc against `%s'\n"),
25f53a85 7891 input_bfd, input_section, rel->r_offset,
7b609f53 7892 howto->name,
7619e7c7
AM
7893 sym_name);
7894 }
86c95733 7895 break;
7619e7c7 7896
86c95733 7897 /* Relocations that need no special processing. */
7619e7c7 7898 case R_PPC_LOCAL24PC:
252b5132
RH
7899 /* It makes no sense to point a local relocation
7900 at a symbol not in this object. */
7b609f53 7901 if (unresolved_reloc)
252b5132 7902 {
1a72702b
AM
7903 (*info->callbacks->undefined_symbol) (info,
7904 h->root.root.string,
7905 input_bfd,
7906 input_section,
7907 rel->r_offset,
7908 TRUE);
c316a17c 7909 goto copy_reloc;
252b5132 7910 }
888a7fc3
AM
7911 if (h != NULL && h->type == STT_GNU_IFUNC && bfd_link_pic (info))
7912 {
7913 /* @local on an ifunc does not really make sense since
7914 the ifunc resolver can take you anywhere. More
7915 seriously, calls to ifuncs must go through a plt call
7916 stub, and for pic the plt call stubs uses r30 to
7917 access the PLT. The problem is that a call that is
7918 local won't have the +32k reloc addend trick marking
7919 -fPIC code, so the linker won't know whether r30 is
7920 _GLOBAL_OFFSET_TABLE_ or pointing into a .got2 section. */
695344c0 7921 /* xgettext:c-format */
174d0a74 7922 info->callbacks->einfo (_("%X%H: @local call to ifunc %s\n"),
888a7fc3
AM
7923 input_bfd, input_section, rel->r_offset,
7924 h->root.root.string);
7925 }
252b5132
RH
7926 break;
7927
7619e7c7
AM
7928 case R_PPC_DTPREL16:
7929 case R_PPC_DTPREL16_LO:
7930 case R_PPC_DTPREL16_HI:
7931 case R_PPC_DTPREL16_HA:
989f9879
AM
7932 if (htab->elf.tls_sec != NULL)
7933 addend -= htab->elf.tls_sec->vma + DTP_OFFSET;
7619e7c7
AM
7934 break;
7935
70bccea4
AM
7936 /* Relocations that may need to be propagated if this is a shared
7937 object. */
7619e7c7
AM
7938 case R_PPC_TPREL16:
7939 case R_PPC_TPREL16_LO:
7940 case R_PPC_TPREL16_HI:
7941 case R_PPC_TPREL16_HA:
766bc656
AM
7942 if (h != NULL
7943 && h->root.type == bfd_link_hash_undefweak
7944 && h->dynindx == -1)
7945 {
7946 /* Make this relocation against an undefined weak symbol
7947 resolve to zero. This is really just a tweak, since
7948 code using weak externs ought to check that they are
7949 defined before using them. */
7950 bfd_byte *p = contents + rel->r_offset - d_offset;
95f0d0d2 7951 unsigned int insn = bfd_get_32 (input_bfd, p);
766bc656
AM
7952 insn = _bfd_elf_ppc_at_tprel_transform (insn, 2);
7953 if (insn != 0)
95f0d0d2 7954 bfd_put_32 (input_bfd, insn, p);
766bc656
AM
7955 break;
7956 }
989f9879
AM
7957 if (htab->elf.tls_sec != NULL)
7958 addend -= htab->elf.tls_sec->vma + TP_OFFSET;
7619e7c7 7959 /* The TPREL16 relocs shouldn't really be used in shared
7c8bbca5
AM
7960 libs or with non-local symbols as that will result in
7961 DT_TEXTREL being set, but support them anyway. */
7619e7c7
AM
7962 goto dodyn;
7963
7964 case R_PPC_TPREL32:
989f9879
AM
7965 if (htab->elf.tls_sec != NULL)
7966 addend -= htab->elf.tls_sec->vma + TP_OFFSET;
7619e7c7
AM
7967 goto dodyn;
7968
7969 case R_PPC_DTPREL32:
989f9879
AM
7970 if (htab->elf.tls_sec != NULL)
7971 addend -= htab->elf.tls_sec->vma + DTP_OFFSET;
7619e7c7
AM
7972 goto dodyn;
7973
e515b051
AM
7974 case R_PPC_DTPMOD32:
7975 relocation = 1;
7976 addend = 0;
7977 goto dodyn;
7978
d7128ce4
AM
7979 case R_PPC_REL16:
7980 case R_PPC_REL16_LO:
7981 case R_PPC_REL16_HI:
7982 case R_PPC_REL16_HA:
a680de9a 7983 case R_PPC_REL16DX_HA:
d7128ce4
AM
7984 break;
7985
7619e7c7 7986 case R_PPC_REL32:
625af618
AM
7987 if (h == NULL || h == htab->elf.hgot)
7988 break;
7989 /* fall through */
7990
7991 case R_PPC_ADDR32:
7992 case R_PPC_ADDR16:
7993 case R_PPC_ADDR16_LO:
7994 case R_PPC_ADDR16_HI:
7995 case R_PPC_ADDR16_HA:
7996 case R_PPC_UADDR32:
7997 case R_PPC_UADDR16:
7998 goto dodyn;
7999
b9c361e0
JL
8000 case R_PPC_VLE_REL8:
8001 case R_PPC_VLE_REL15:
8002 case R_PPC_VLE_REL24:
625af618 8003 case R_PPC_REL24:
7619e7c7
AM
8004 case R_PPC_REL14:
8005 case R_PPC_REL14_BRTAKEN:
8006 case R_PPC_REL14_BRNTAKEN:
252b5132
RH
8007 /* If these relocations are not to a named symbol, they can be
8008 handled right here, no need to bother the dynamic linker. */
89200bf8 8009 if (SYMBOL_CALLS_LOCAL (info, h)
3b36f7e6 8010 || h == htab->elf.hgot)
252b5132 8011 break;
70bccea4 8012 /* fall through */
252b5132 8013
7619e7c7 8014 case R_PPC_ADDR24:
7619e7c7
AM
8015 case R_PPC_ADDR14:
8016 case R_PPC_ADDR14_BRTAKEN:
8017 case R_PPC_ADDR14_BRNTAKEN:
0e1862bb 8018 if (h != NULL && !bfd_link_pic (info))
625af618
AM
8019 break;
8020 /* fall through */
8021
7619e7c7 8022 dodyn:
3348747a
NS
8023 if ((input_section->flags & SEC_ALLOC) == 0
8024 || is_vxworks_tls)
c87b5a93 8025 break;
c87b5a93 8026
287c7eaf
AM
8027 if (bfd_link_pic (info)
8028 ? ((h == NULL
190eb1dd 8029 || h->dyn_relocs != NULL)
287c7eaf
AM
8030 && ((h != NULL && pc_dynrelocs (h))
8031 || must_be_dyn_reloc (info, r_type)))
8032 : (h != NULL
190eb1dd 8033 && h->dyn_relocs != NULL))
252b5132 8034 {
0bb2d96a 8035 int skip;
f95f8542
AM
8036 bfd_byte *loc;
8037 asection *sreloc;
82e66161
AM
8038 long indx = 0;
8039
252b5132 8040#ifdef DEBUG
55fd94b0
AM
8041 fprintf (stderr, "ppc_elf_relocate_section needs to "
8042 "create relocation for %s\n",
70bccea4
AM
8043 (h && h->root.root.string
8044 ? h->root.root.string : "<unknown>"));
252b5132
RH
8045#endif
8046
8047 /* When generating a shared object, these relocations
70bccea4
AM
8048 are copied into the output file to be resolved at run
8049 time. */
0bb2d96a 8050 skip = 0;
5b914448
AM
8051 outrel.r_offset = _bfd_elf_section_offset (output_bfd, info,
8052 input_section,
8053 rel->r_offset);
0bb2d96a
JJ
8054 if (outrel.r_offset == (bfd_vma) -1
8055 || outrel.r_offset == (bfd_vma) -2)
8056 skip = (int) outrel.r_offset;
252b5132
RH
8057 outrel.r_offset += (input_section->output_section->vma
8058 + input_section->output_offset);
8059
63f6e94f
AM
8060 /* Optimize unaligned reloc use. */
8061 if ((r_type == R_PPC_ADDR32 && (outrel.r_offset & 3) != 0)
8062 || (r_type == R_PPC_UADDR32 && (outrel.r_offset & 3) == 0))
8063 r_type ^= R_PPC_ADDR32 ^ R_PPC_UADDR32;
8064 if ((r_type == R_PPC_ADDR16 && (outrel.r_offset & 1) != 0)
8065 || (r_type == R_PPC_UADDR16 && (outrel.r_offset & 1) == 0))
8066 r_type ^= R_PPC_ADDR16 ^ R_PPC_UADDR16;
8067
252b5132
RH
8068 if (skip)
8069 memset (&outrel, 0, sizeof outrel);
21d68fcd 8070 else if (!SYMBOL_REFERENCES_LOCAL (info, h))
252b5132 8071 {
82e66161
AM
8072 indx = h->dynindx;
8073 BFD_ASSERT (indx != -1);
7619e7c7 8074 unresolved_reloc = FALSE;
82e66161 8075 outrel.r_info = ELF32_R_INFO (indx, r_type);
252b5132
RH
8076 outrel.r_addend = rel->r_addend;
8077 }
8078 else
8079 {
47388f4c
AM
8080 outrel.r_addend = relocation + rel->r_addend;
8081
25f23106 8082 if (r_type != R_PPC_ADDR32)
252b5132 8083 {
25f23106
AM
8084 if (ifunc != NULL)
8085 {
8086 /* If we get here when building a static
8087 executable, then the libc startup function
8088 responsible for applying indirect function
8089 relocations is going to complain about
8090 the reloc type.
8091 If we get here when building a dynamic
8092 executable, it will be because we have
8093 a text relocation. The dynamic loader
8094 will set the text segment writable and
8095 non-executable to apply text relocations.
8096 So we'll segfault when trying to run the
8097 indirection function to resolve the reloc. */
25f53a85 8098 info->callbacks->einfo
695344c0 8099 /* xgettext:c-format */
174d0a74 8100 (_("%H: relocation %s for indirect "
25f53a85
AM
8101 "function %s unsupported\n"),
8102 input_bfd, input_section, rel->r_offset,
25f23106
AM
8103 howto->name,
8104 sym_name);
8105 ret = FALSE;
8106 }
cf35638d 8107 else if (r_symndx == STN_UNDEF || bfd_is_abs_section (sec))
89200bf8 8108 ;
252b5132
RH
8109 else if (sec == NULL || sec->owner == NULL)
8110 {
8111 bfd_set_error (bfd_error_bad_value);
89200bf8 8112 ret = FALSE;
252b5132
RH
8113 }
8114 else
8115 {
8116 asection *osec;
8117
47388f4c
AM
8118 /* We are turning this relocation into one
8119 against a section symbol. It would be
8120 proper to subtract the symbol's value,
8121 osec->vma, from the emitted reloc addend,
25f23106
AM
8122 but ld.so expects buggy relocs.
8123 FIXME: Why not always use a zero index? */
252b5132 8124 osec = sec->output_section;
f26a3287
AM
8125 if ((osec->flags & SEC_THREAD_LOCAL) != 0)
8126 {
8127 osec = htab->elf.tls_sec;
8128 indx = 0;
8129 }
8130 else
74541ad4 8131 {
74541ad4 8132 indx = elf_section_data (osec)->dynindx;
f26a3287
AM
8133 if (indx == 0)
8134 {
8135 osec = htab->elf.text_index_section;
8136 indx = elf_section_data (osec)->dynindx;
8137 }
8138 BFD_ASSERT (indx != 0);
74541ad4 8139 }
f26a3287
AM
8140
8141 /* ld.so doesn't expect buggy TLS relocs.
8142 Don't leave the symbol value in the
8143 addend for them. */
8144 if (IS_PPC_TLS_RELOC (r_type))
8145 outrel.r_addend -= osec->vma;
252b5132
RH
8146 }
8147
8148 outrel.r_info = ELF32_R_INFO (indx, r_type);
252b5132 8149 }
25f23106
AM
8150 else if (ifunc != NULL)
8151 outrel.r_info = ELF32_R_INFO (0, R_PPC_IRELATIVE);
8152 else
8153 outrel.r_info = ELF32_R_INFO (0, R_PPC_RELATIVE);
252b5132
RH
8154 }
8155
82e66161
AM
8156 sreloc = elf_section_data (input_section)->sreloc;
8157 if (ifunc)
8158 {
8159 sreloc = htab->elf.irelplt;
8160 if (indx == 0)
8161 htab->local_ifunc_resolver = 1;
8162 else if (is_static_defined (h))
8163 htab->maybe_local_ifunc_resolver = 1;
8164 }
8165 if (sreloc == NULL)
8166 return FALSE;
8167
947216bf
AM
8168 loc = sreloc->contents;
8169 loc += sreloc->reloc_count++ * sizeof (Elf32_External_Rela);
8170 bfd_elf32_swap_reloca_out (output_bfd, &outrel, loc);
252b5132 8171
2243deae 8172 if (skip == -1)
c316a17c 8173 goto copy_reloc;
2243deae 8174
f0158f44
AM
8175 /* This reloc will be computed at runtime. Clear the memory
8176 so that it contains a predictable value for prelink. */
8177 if (!skip)
2243deae
L
8178 {
8179 relocation = howto->pc_relative ? outrel.r_offset : 0;
8180 addend = 0;
8181 break;
8182 }
252b5132 8183 }
252b5132
RH
8184 break;
8185
32af9f6e
AM
8186 case R_PPC_RELAX_PLT:
8187 case R_PPC_RELAX_PLTREL24:
de972ffa
AM
8188 if (h != NULL)
8189 {
32af9f6e
AM
8190 struct plt_entry *ent;
8191 bfd_vma got2_addend = 0;
8192
8193 if (r_type == R_PPC_RELAX_PLTREL24)
8194 {
0e1862bb 8195 if (bfd_link_pic (info))
32af9f6e
AM
8196 got2_addend = addend;
8197 addend = 0;
8198 }
8199 ent = find_plt_ent (&h->plt.plist, got2, got2_addend);
de972ffa
AM
8200 if (htab->plt_type == PLT_NEW)
8201 relocation = (htab->glink->output_section->vma
8202 + htab->glink->output_offset
8203 + ent->glink_offset);
8204 else
ce558b89
AM
8205 relocation = (htab->elf.splt->output_section->vma
8206 + htab->elf.splt->output_offset
de972ffa
AM
8207 + ent->plt.offset);
8208 }
1a0670f3 8209 /* Fall through. */
b4a38de6 8210
32af9f6e 8211 case R_PPC_RELAX:
9abc968f 8212 {
53291d1f
AM
8213 const int *stub;
8214 size_t size;
8215 size_t insn_offset = rel->r_offset;
8216 unsigned int insn;
9abc968f 8217
0e1862bb 8218 if (bfd_link_pic (info))
53291d1f
AM
8219 {
8220 relocation -= (input_section->output_section->vma
8221 + input_section->output_offset
8222 + rel->r_offset - 4);
8223 stub = shared_stub_entry;
95f0d0d2
AM
8224 bfd_put_32 (input_bfd, stub[0], contents + insn_offset - 12);
8225 bfd_put_32 (input_bfd, stub[1], contents + insn_offset - 8);
8226 bfd_put_32 (input_bfd, stub[2], contents + insn_offset - 4);
53291d1f
AM
8227 stub += 3;
8228 size = ARRAY_SIZE (shared_stub_entry) - 3;
8229 }
8230 else
8231 {
8232 stub = stub_entry;
8233 size = ARRAY_SIZE (stub_entry);
8234 }
9abc968f 8235
9abc968f 8236 relocation += addend;
0e1862bb 8237 if (bfd_link_relocatable (info))
53291d1f
AM
8238 relocation = 0;
8239
8240 /* First insn is HA, second is LO. */
8241 insn = *stub++;
8242 insn |= ((relocation + 0x8000) >> 16) & 0xffff;
95f0d0d2 8243 bfd_put_32 (input_bfd, insn, contents + insn_offset);
53291d1f
AM
8244 insn_offset += 4;
8245
8246 insn = *stub++;
8247 insn |= relocation & 0xffff;
95f0d0d2 8248 bfd_put_32 (input_bfd, insn, contents + insn_offset);
53291d1f
AM
8249 insn_offset += 4;
8250 size -= 2;
8251
8252 while (size != 0)
8253 {
8254 insn = *stub++;
8255 --size;
95f0d0d2 8256 bfd_put_32 (input_bfd, insn, contents + insn_offset);
53291d1f
AM
8257 insn_offset += 4;
8258 }
9bc4e62b
NS
8259
8260 /* Rewrite the reloc and convert one of the trailing nop
8261 relocs to describe this relocation. */
8262 BFD_ASSERT (ELF32_R_TYPE (relend[-1].r_info) == R_PPC_NONE);
8263 /* The relocs are at the bottom 2 bytes */
c316a17c
AM
8264 wrel->r_offset = rel->r_offset + d_offset;
8265 wrel->r_info = ELF32_R_INFO (r_symndx, R_PPC_ADDR16_HA);
8266 wrel->r_addend = rel->r_addend;
8267 memmove (wrel + 1, wrel, (relend - wrel - 1) * sizeof (*wrel));
8268 wrel++, rel++;
8269 wrel->r_offset += 4;
8270 wrel->r_info = ELF32_R_INFO (r_symndx, R_PPC_ADDR16_LO);
9abc968f 8271 }
8517fae7 8272 continue;
deaaf2f3 8273
70bccea4 8274 /* Indirect .sdata relocation. */
7619e7c7 8275 case R_PPC_EMB_SDAI16:
c9a2f333 8276 BFD_ASSERT (htab->sdata[0].section != NULL);
bd6c6e2b
AM
8277 if (!is_static_defined (htab->sdata[0].sym))
8278 {
8279 unresolved_reloc = TRUE;
8280 break;
8281 }
7619e7c7 8282 relocation
76750a2f
AM
8283 = elf_finish_pointer_linker_section (input_bfd, &htab->sdata[0],
8284 h, relocation, rel);
bd6c6e2b 8285 addend = 0;
252b5132
RH
8286 break;
8287
70bccea4 8288 /* Indirect .sdata2 relocation. */
7619e7c7 8289 case R_PPC_EMB_SDA2I16:
c9a2f333 8290 BFD_ASSERT (htab->sdata[1].section != NULL);
bd6c6e2b
AM
8291 if (!is_static_defined (htab->sdata[1].sym))
8292 {
8293 unresolved_reloc = TRUE;
8294 break;
8295 }
7619e7c7 8296 relocation
76750a2f
AM
8297 = elf_finish_pointer_linker_section (input_bfd, &htab->sdata[1],
8298 h, relocation, rel);
bd6c6e2b 8299 addend = 0;
252b5132
RH
8300 break;
8301
70bccea4
AM
8302 /* Handle the TOC16 reloc. We want to use the offset within the .got
8303 section, not the actual VMA. This is appropriate when generating
8304 an embedded ELF object, for which the .got section acts like the
8305 AIX .toc section. */
7619e7c7 8306 case R_PPC_TOC16: /* phony GOT16 relocations */
3b4f3a11
AM
8307 if (sec == NULL || sec->output_section == NULL)
8308 {
8309 unresolved_reloc = TRUE;
8310 break;
8311 }
fd361982
AM
8312 BFD_ASSERT (strcmp (bfd_section_name (sec), ".got") == 0
8313 || strcmp (bfd_section_name (sec), ".cgot") == 0);
252b5132 8314
3b4f3a11 8315 addend -= sec->output_section->vma + sec->output_offset + 0x8000;
252b5132
RH
8316 break;
8317
7619e7c7 8318 case R_PPC_PLTREL24:
f75e0e33
AM
8319 if (h != NULL && ifunc == NULL)
8320 {
cbf95972
AM
8321 struct plt_entry *ent;
8322
8323 ent = find_plt_ent (&h->plt.plist, got2,
8324 bfd_link_pic (info) ? addend : 0);
f75e0e33 8325 if (ent == NULL
ce558b89 8326 || htab->elf.splt == NULL)
f75e0e33
AM
8327 {
8328 /* We didn't make a PLT entry for this symbol. This
8329 happens when statically linking PIC code, or when
8330 using -Bsymbolic. */
8331 }
8332 else
8333 {
8334 /* Relocation is to the entry for this symbol in the
8335 procedure linkage table. */
8336 unresolved_reloc = FALSE;
8337 if (htab->plt_type == PLT_NEW)
8338 relocation = (htab->glink->output_section->vma
8339 + htab->glink->output_offset
8340 + ent->glink_offset);
8341 else
ce558b89
AM
8342 relocation = (htab->elf.splt->output_section->vma
8343 + htab->elf.splt->output_offset
f75e0e33
AM
8344 + ent->plt.offset);
8345 }
8346 }
252b5132 8347
f75e0e33
AM
8348 /* R_PPC_PLTREL24 is rather special. If non-zero, the
8349 addend specifies the GOT pointer offset within .got2.
8350 Don't apply it to the relocation field. */
8351 addend = 0;
8da6118f 8352 break;
252b5132 8353
23cedd1d
AM
8354 case R_PPC_PLTSEQ:
8355 case R_PPC_PLTCALL:
08be3224
AM
8356 case R_PPC_PLT16_LO:
8357 case R_PPC_PLT16_HI:
8358 case R_PPC_PLT16_HA:
2d7ad24e 8359 plt_list = NULL;
08be3224
AM
8360 if (h != NULL)
8361 plt_list = &h->plt.plist;
2d7ad24e
AM
8362 else if (ifunc != NULL)
8363 plt_list = ifunc;
8364 else if (local_got_offsets != NULL)
8365 {
8366 struct plt_entry **local_plt;
8367 local_plt = (struct plt_entry **) (local_got_offsets
8368 + symtab_hdr->sh_info);
8369 plt_list = local_plt + r_symndx;
8370 }
08be3224
AM
8371 unresolved_reloc = TRUE;
8372 if (plt_list != NULL)
8373 {
8374 struct plt_entry *ent;
8375
8376 ent = find_plt_ent (plt_list, got2,
8377 bfd_link_pic (info) ? addend : 0);
2d7ad24e 8378 if (ent != NULL && ent->plt.offset != (bfd_vma) -1)
08be3224 8379 {
2d7ad24e
AM
8380 asection *plt;
8381
08be3224 8382 unresolved_reloc = FALSE;
2d7ad24e 8383 plt = htab->elf.splt;
30845f11 8384 if (use_local_plt (info, h))
2d7ad24e
AM
8385 {
8386 if (ifunc != NULL)
8387 plt = htab->elf.iplt;
8388 else
8389 plt = htab->pltlocal;
8390 }
8391 relocation = (plt->output_section->vma
8392 + plt->output_offset
08be3224
AM
8393 + ent->plt.offset);
8394 if (bfd_link_pic (info))
8395 {
8396 bfd_vma got = 0;
8397
8398 if (ent->addend >= 32768)
8399 got = (ent->addend
8400 + ent->sec->output_section->vma
8401 + ent->sec->output_offset);
8402 else
8403 got = SYM_VAL (htab->elf.hgot);
8404 relocation -= got;
8405 }
8406 }
8407 }
8408 addend = 0;
8409 break;
8410
70bccea4 8411 /* Relocate against _SDA_BASE_. */
7619e7c7 8412 case R_PPC_SDAREL16:
252b5132
RH
8413 {
8414 const char *name;
bd6c6e2b 8415 struct elf_link_hash_entry *sda = htab->sdata[0].sym;
252b5132 8416
bd6c6e2b
AM
8417 if (sec == NULL
8418 || sec->output_section == NULL
8419 || !is_static_defined (sda))
3b4f3a11
AM
8420 {
8421 unresolved_reloc = TRUE;
8422 break;
8423 }
bd6c6e2b 8424 addend -= SYM_VAL (sda);
3b4f3a11 8425
fd361982 8426 name = bfd_section_name (sec->output_section);
93d1b056
AM
8427 if (!(strcmp (name, ".sdata") == 0
8428 || strcmp (name, ".sbss") == 0))
252b5132 8429 {
cf97bcb0 8430 _bfd_error_handler
695344c0 8431 /* xgettext:c-format */
cf97bcb0
AM
8432 (_("%pB: the target (%s) of a %s relocation is "
8433 "in the wrong output section (%s)"),
d003868e 8434 input_bfd,
55fd94b0
AM
8435 sym_name,
8436 howto->name,
8437 name);
252b5132 8438 }
252b5132
RH
8439 }
8440 break;
8441
70bccea4 8442 /* Relocate against _SDA2_BASE_. */
7619e7c7 8443 case R_PPC_EMB_SDA2REL:
252b5132
RH
8444 {
8445 const char *name;
bd6c6e2b 8446 struct elf_link_hash_entry *sda = htab->sdata[1].sym;
252b5132 8447
bd6c6e2b
AM
8448 if (sec == NULL
8449 || sec->output_section == NULL
8450 || !is_static_defined (sda))
3b4f3a11
AM
8451 {
8452 unresolved_reloc = TRUE;
8453 break;
8454 }
bd6c6e2b 8455 addend -= SYM_VAL (sda);
3b4f3a11 8456
fd361982 8457 name = bfd_section_name (sec->output_section);
93d1b056
AM
8458 if (!(strcmp (name, ".sdata2") == 0
8459 || strcmp (name, ".sbss2") == 0))
252b5132 8460 {
cf97bcb0 8461 _bfd_error_handler
695344c0 8462 /* xgettext:c-format */
cf97bcb0
AM
8463 (_("%pB: the target (%s) of a %s relocation is "
8464 "in the wrong output section (%s)"),
d003868e 8465 input_bfd,
55fd94b0
AM
8466 sym_name,
8467 howto->name,
8468 name);
252b5132 8469 }
252b5132
RH
8470 }
8471 break;
8472
b9c361e0 8473 case R_PPC_VLE_LO16A:
86c95733 8474 relocation = relocation + addend;
08dc996f
AM
8475 ppc_elf_vle_split16 (input_bfd, input_section, rel->r_offset,
8476 contents + rel->r_offset, relocation,
8477 split16a_type, htab->params->vle_reloc_fixup);
c316a17c 8478 goto copy_reloc;
b9c361e0
JL
8479
8480 case R_PPC_VLE_LO16D:
86c95733 8481 relocation = relocation + addend;
08dc996f
AM
8482 ppc_elf_vle_split16 (input_bfd, input_section, rel->r_offset,
8483 contents + rel->r_offset, relocation,
8484 split16d_type, htab->params->vle_reloc_fixup);
c316a17c 8485 goto copy_reloc;
b9c361e0
JL
8486
8487 case R_PPC_VLE_HI16A:
86c95733 8488 relocation = (relocation + addend) >> 16;
08dc996f
AM
8489 ppc_elf_vle_split16 (input_bfd, input_section, rel->r_offset,
8490 contents + rel->r_offset, relocation,
8491 split16a_type, htab->params->vle_reloc_fixup);
c316a17c 8492 goto copy_reloc;
b9c361e0
JL
8493
8494 case R_PPC_VLE_HI16D:
86c95733 8495 relocation = (relocation + addend) >> 16;
08dc996f
AM
8496 ppc_elf_vle_split16 (input_bfd, input_section, rel->r_offset,
8497 contents + rel->r_offset, relocation,
8498 split16d_type, htab->params->vle_reloc_fixup);
c316a17c 8499 goto copy_reloc;
b9c361e0
JL
8500
8501 case R_PPC_VLE_HA16A:
86c95733 8502 relocation = (relocation + addend + 0x8000) >> 16;
08dc996f
AM
8503 ppc_elf_vle_split16 (input_bfd, input_section, rel->r_offset,
8504 contents + rel->r_offset, relocation,
8505 split16a_type, htab->params->vle_reloc_fixup);
c316a17c 8506 goto copy_reloc;
b9c361e0
JL
8507
8508 case R_PPC_VLE_HA16D:
86c95733 8509 relocation = (relocation + addend + 0x8000) >> 16;
08dc996f
AM
8510 ppc_elf_vle_split16 (input_bfd, input_section, rel->r_offset,
8511 contents + rel->r_offset, relocation,
8512 split16d_type, htab->params->vle_reloc_fixup);
c316a17c 8513 goto copy_reloc;
b9c361e0 8514
70bccea4 8515 /* Relocate against either _SDA_BASE_, _SDA2_BASE_, or 0. */
7619e7c7 8516 case R_PPC_EMB_SDA21:
b9c361e0 8517 case R_PPC_VLE_SDA21:
7619e7c7 8518 case R_PPC_EMB_RELSDA:
b9c361e0 8519 case R_PPC_VLE_SDA21_LO:
252b5132
RH
8520 {
8521 const char *name;
8522 int reg;
86c95733 8523 unsigned int insn;
bd6c6e2b 8524 struct elf_link_hash_entry *sda = NULL;
252b5132 8525
3b4f3a11
AM
8526 if (sec == NULL || sec->output_section == NULL)
8527 {
8528 unresolved_reloc = TRUE;
8529 break;
8530 }
8531
fd361982 8532 name = bfd_section_name (sec->output_section);
93d1b056
AM
8533 if (strcmp (name, ".sdata") == 0
8534 || strcmp (name, ".sbss") == 0)
252b5132
RH
8535 {
8536 reg = 13;
bd6c6e2b 8537 sda = htab->sdata[0].sym;
252b5132 8538 }
93d1b056
AM
8539 else if (strcmp (name, ".sdata2") == 0
8540 || strcmp (name, ".sbss2") == 0)
252b5132
RH
8541 {
8542 reg = 2;
bd6c6e2b 8543 sda = htab->sdata[1].sym;
252b5132 8544 }
8da6118f
KH
8545 else if (strcmp (name, ".PPC.EMB.sdata0") == 0
8546 || strcmp (name, ".PPC.EMB.sbss0") == 0)
252b5132
RH
8547 {
8548 reg = 0;
8549 }
252b5132
RH
8550 else
8551 {
cf97bcb0 8552 _bfd_error_handler
695344c0 8553 /* xgettext:c-format */
cf97bcb0
AM
8554 (_("%pB: the target (%s) of a %s relocation is "
8555 "in the wrong output section (%s)"),
d003868e 8556 input_bfd,
55fd94b0
AM
8557 sym_name,
8558 howto->name,
8559 name);
252b5132
RH
8560
8561 bfd_set_error (bfd_error_bad_value);
b34976b6 8562 ret = FALSE;
c316a17c 8563 goto copy_reloc;
252b5132
RH
8564 }
8565
bd6c6e2b
AM
8566 if (sda != NULL)
8567 {
8568 if (!is_static_defined (sda))
8569 {
8570 unresolved_reloc = TRUE;
8571 break;
8572 }
8573 addend -= SYM_VAL (sda);
8574 }
8575
6f5601c4
AM
8576 if (r_type == R_PPC_EMB_RELSDA)
8577 break;
8578
8579 /* The PowerPC Embedded Application Binary Interface
8580 version 1.0 insanely chose to specify R_PPC_EMB_SDA21
8581 operating on a 24-bit field at r_offset. GNU as and
8582 GNU ld have always assumed R_PPC_EMB_SDA21 operates on
8583 a 32-bit bit insn at r_offset. Cope with object file
8584 producers that possibly comply with the EABI in
8585 generating an odd r_offset for big-endian objects. */
8586 if (r_type == R_PPC_EMB_SDA21)
8587 rel->r_offset &= ~1;
8588
95f0d0d2 8589 insn = bfd_get_32 (input_bfd, contents + rel->r_offset);
b9c361e0
JL
8590 if (reg == 0
8591 && (r_type == R_PPC_VLE_SDA21
8592 || r_type == R_PPC_VLE_SDA21_LO))
8593 {
86c95733
AM
8594 relocation = relocation + addend;
8595 addend = 0;
8596
8597 /* Force e_li insn, keeping RT from original insn. */
8598 insn &= 0x1f << 21;
8599 insn |= 28u << 26;
8600
8601 /* We have an li20 field, bits 17..20, 11..15, 21..31. */
8602 /* Top 4 bits of value to 17..20. */
8603 insn |= (relocation & 0xf0000) >> 5;
8604 /* Next 5 bits of the value to 11..15. */
8605 insn |= (relocation & 0xf800) << 5;
8606 /* And the final 11 bits of the value to bits 21 to 31. */
8607 insn |= relocation & 0x7ff;
8608
95f0d0d2 8609 bfd_put_32 (input_bfd, insn, contents + rel->r_offset);
c3301df1
AM
8610
8611 if (r_type == R_PPC_VLE_SDA21
8612 && ((relocation + 0x80000) & 0xffffffff) > 0x100000)
8613 goto overflow;
c316a17c 8614 goto copy_reloc;
b9c361e0 8615 }
6f5601c4
AM
8616 /* Fill in register field. */
8617 insn = (insn & ~RA_REGISTER_MASK) | (reg << RA_REGISTER_SHIFT);
95f0d0d2 8618 bfd_put_32 (input_bfd, insn, contents + rel->r_offset);
252b5132
RH
8619 }
8620 break;
8621
b9c361e0
JL
8622 case R_PPC_VLE_SDAREL_LO16A:
8623 case R_PPC_VLE_SDAREL_LO16D:
8624 case R_PPC_VLE_SDAREL_HI16A:
8625 case R_PPC_VLE_SDAREL_HI16D:
8626 case R_PPC_VLE_SDAREL_HA16A:
8627 case R_PPC_VLE_SDAREL_HA16D:
8628 {
8629 bfd_vma value;
8630 const char *name;
b9c361e0
JL
8631 struct elf_link_hash_entry *sda = NULL;
8632
8633 if (sec == NULL || sec->output_section == NULL)
8634 {
8635 unresolved_reloc = TRUE;
8636 break;
8637 }
8638
fd361982 8639 name = bfd_section_name (sec->output_section);
93d1b056
AM
8640 if (strcmp (name, ".sdata") == 0
8641 || strcmp (name, ".sbss") == 0)
5499c7c7 8642 sda = htab->sdata[0].sym;
93d1b056
AM
8643 else if (strcmp (name, ".sdata2") == 0
8644 || strcmp (name, ".sbss2") == 0)
5499c7c7 8645 sda = htab->sdata[1].sym;
b9c361e0
JL
8646 else
8647 {
4eca0228 8648 _bfd_error_handler
695344c0 8649 /* xgettext:c-format */
871b3ab2 8650 (_("%pB: the target (%s) of a %s relocation is "
b9c361e0
JL
8651 "in the wrong output section (%s)"),
8652 input_bfd,
8653 sym_name,
8654 howto->name,
8655 name);
8656
8657 bfd_set_error (bfd_error_bad_value);
8658 ret = FALSE;
c316a17c 8659 goto copy_reloc;
b9c361e0
JL
8660 }
8661
5499c7c7 8662 if (sda == NULL || !is_static_defined (sda))
b9c361e0 8663 {
5499c7c7
AM
8664 unresolved_reloc = TRUE;
8665 break;
b9c361e0 8666 }
5499c7c7 8667 value = relocation + addend - SYM_VAL (sda);
86c95733
AM
8668
8669 if (r_type == R_PPC_VLE_SDAREL_LO16A)
08dc996f
AM
8670 ppc_elf_vle_split16 (input_bfd, input_section, rel->r_offset,
8671 contents + rel->r_offset, value,
8672 split16a_type,
8673 htab->params->vle_reloc_fixup);
86c95733 8674 else if (r_type == R_PPC_VLE_SDAREL_LO16D)
08dc996f
AM
8675 ppc_elf_vle_split16 (input_bfd, input_section, rel->r_offset,
8676 contents + rel->r_offset, value,
8677 split16d_type,
8678 htab->params->vle_reloc_fixup);
86c95733 8679 else if (r_type == R_PPC_VLE_SDAREL_HI16A)
b9c361e0 8680 {
86c95733 8681 value = value >> 16;
08dc996f
AM
8682 ppc_elf_vle_split16 (input_bfd, input_section, rel->r_offset,
8683 contents + rel->r_offset, value,
8684 split16a_type,
8685 htab->params->vle_reloc_fixup);
b9c361e0 8686 }
86c95733 8687 else if (r_type == R_PPC_VLE_SDAREL_HI16D)
b9c361e0 8688 {
86c95733 8689 value = value >> 16;
08dc996f
AM
8690 ppc_elf_vle_split16 (input_bfd, input_section, rel->r_offset,
8691 contents + rel->r_offset, value,
8692 split16d_type,
8693 htab->params->vle_reloc_fixup);
b9c361e0 8694 }
86c95733 8695 else if (r_type == R_PPC_VLE_SDAREL_HA16A)
b9c361e0 8696 {
86c95733 8697 value = (value + 0x8000) >> 16;
08dc996f
AM
8698 ppc_elf_vle_split16 (input_bfd, input_section, rel->r_offset,
8699 contents + rel->r_offset, value,
8700 split16a_type,
8701 htab->params->vle_reloc_fixup);
b9c361e0 8702 }
86c95733 8703 else if (r_type == R_PPC_VLE_SDAREL_HA16D)
b9c361e0 8704 {
86c95733 8705 value = (value + 0x8000) >> 16;
08dc996f
AM
8706 ppc_elf_vle_split16 (input_bfd, input_section, rel->r_offset,
8707 contents + rel->r_offset, value,
8708 split16d_type,
8709 htab->params->vle_reloc_fixup);
b9c361e0
JL
8710 }
8711 }
c316a17c 8712 goto copy_reloc;
b9c361e0 8713
83eef883
AFB
8714 case R_PPC_VLE_ADDR20:
8715 ppc_elf_vle_split20 (output_bfd, contents + rel->r_offset, relocation);
24872cb3 8716 goto copy_reloc;
83eef883 8717
70bccea4 8718 /* Relocate against the beginning of the section. */
7619e7c7
AM
8719 case R_PPC_SECTOFF:
8720 case R_PPC_SECTOFF_LO:
8721 case R_PPC_SECTOFF_HI:
8722 case R_PPC_SECTOFF_HA:
3b4f3a11
AM
8723 if (sec == NULL || sec->output_section == NULL)
8724 {
8725 unresolved_reloc = TRUE;
8726 break;
8727 }
252b5132 8728 addend -= sec->output_section->vma;
252b5132
RH
8729 break;
8730
70bccea4 8731 /* Negative relocations. */
7619e7c7
AM
8732 case R_PPC_EMB_NADDR32:
8733 case R_PPC_EMB_NADDR16:
8734 case R_PPC_EMB_NADDR16_LO:
8735 case R_PPC_EMB_NADDR16_HI:
8736 case R_PPC_EMB_NADDR16_HA:
8da6118f 8737 addend -= 2 * relocation;
252b5132
RH
8738 break;
8739
7619e7c7
AM
8740 case R_PPC_COPY:
8741 case R_PPC_GLOB_DAT:
8742 case R_PPC_JMP_SLOT:
8743 case R_PPC_RELATIVE:
e054468f 8744 case R_PPC_IRELATIVE:
7619e7c7
AM
8745 case R_PPC_PLT32:
8746 case R_PPC_PLTREL32:
7619e7c7
AM
8747 case R_PPC_ADDR30:
8748 case R_PPC_EMB_RELSEC16:
8749 case R_PPC_EMB_RELST_LO:
8750 case R_PPC_EMB_RELST_HI:
8751 case R_PPC_EMB_RELST_HA:
8752 case R_PPC_EMB_BIT_FLD:
cf97bcb0
AM
8753 /* xgettext:c-format */
8754 _bfd_error_handler (_("%pB: %s unsupported"),
8755 input_bfd, howto->name);
252b5132
RH
8756
8757 bfd_set_error (bfd_error_invalid_operation);
b34976b6 8758 ret = FALSE;
c316a17c 8759 goto copy_reloc;
7619e7c7 8760 }
252b5132 8761
252dcdf4
AM
8762 switch (r_type)
8763 {
8764 default:
8765 break;
8766
8767 case R_PPC_TPREL16_HA:
8768 if (htab->do_tls_opt && relocation + addend + 0x8000 < 0x10000)
8769 {
8770 bfd_byte *p = contents + (rel->r_offset & ~3);
8771 bfd_put_32 (input_bfd, NOP, p);
8772 }
8773 break;
8774
8775 case R_PPC_TPREL16_LO:
8776 if (htab->do_tls_opt && relocation + addend + 0x8000 < 0x10000)
8777 {
8778 bfd_byte *p = contents + (rel->r_offset & ~3);
8779 unsigned int insn = bfd_get_32 (input_bfd, p);
8780 insn &= ~(0x1f << 16);
8781 insn |= 2 << 16;
8782 bfd_put_32 (input_bfd, insn, p);
8783 }
8784 break;
8785 }
8786
23cedd1d
AM
8787 switch (r_type)
8788 {
8789 default:
8790 break;
8791
8792 case R_PPC_PLTCALL:
8793 if (unresolved_reloc)
8794 {
8795 bfd_byte *p = contents + rel->r_offset;
8796 unsigned int insn = bfd_get_32 (input_bfd, p);
8797 insn &= 1;
8798 bfd_put_32 (input_bfd, B | insn, p);
8799 unresolved_reloc = save_unresolved_reloc;
8800 r_type = R_PPC_REL24;
8801 howto = ppc_elf_howto_table[r_type];
8802 }
8803 else if (htab->plt_type != PLT_NEW)
8804 info->callbacks->einfo
482f3505 8805 (_("%X%P: %H: %s relocation unsupported for bss-plt\n"),
23cedd1d
AM
8806 input_bfd, input_section, rel->r_offset,
8807 howto->name);
8808 break;
8809
8810 case R_PPC_PLTSEQ:
8811 case R_PPC_PLT16_HA:
8812 case R_PPC_PLT16_LO:
8813 if (unresolved_reloc)
8814 {
8815 bfd_byte *p = contents + (rel->r_offset & ~3);
8816 bfd_put_32 (input_bfd, NOP, p);
8817 unresolved_reloc = FALSE;
8818 r_type = R_PPC_NONE;
8819 howto = ppc_elf_howto_table[r_type];
8820 }
8821 else if (htab->plt_type != PLT_NEW)
8822 info->callbacks->einfo
482f3505 8823 (_("%X%P: %H: %s relocation unsupported for bss-plt\n"),
23cedd1d
AM
8824 input_bfd, input_section, rel->r_offset,
8825 howto->name);
8826 break;
8827 }
8828
7619e7c7
AM
8829 /* Do any further special processing. */
8830 switch (r_type)
8831 {
8832 default:
8833 break;
8834
8835 case R_PPC_ADDR16_HA:
d7128ce4 8836 case R_PPC_REL16_HA:
a680de9a 8837 case R_PPC_REL16DX_HA:
7619e7c7
AM
8838 case R_PPC_SECTOFF_HA:
8839 case R_PPC_TPREL16_HA:
8840 case R_PPC_DTPREL16_HA:
7619e7c7
AM
8841 case R_PPC_EMB_NADDR16_HA:
8842 case R_PPC_EMB_RELST_HA:
8843 /* It's just possible that this symbol is a weak symbol
7b609f53 8844 that's not actually defined anywhere. In that case,
7619e7c7
AM
8845 'sec' would be NULL, and we should leave the symbol
8846 alone (it will be set to zero elsewhere in the link). */
5c5f6e17
AM
8847 if (sec == NULL)
8848 break;
1a0670f3 8849 /* Fall through. */
5c5f6e17
AM
8850
8851 case R_PPC_PLT16_HA:
8852 case R_PPC_GOT16_HA:
8853 case R_PPC_GOT_TLSGD16_HA:
8854 case R_PPC_GOT_TLSLD16_HA:
8855 case R_PPC_GOT_TPREL16_HA:
8856 case R_PPC_GOT_DTPREL16_HA:
8857 /* Add 0x10000 if sign bit in 0:15 is set.
8858 Bits 0:15 are not used. */
8859 addend += 0x8000;
7619e7c7 8860 break;
1fe532cf
AM
8861
8862 case R_PPC_ADDR16:
8863 case R_PPC_ADDR16_LO:
8864 case R_PPC_GOT16:
8865 case R_PPC_GOT16_LO:
8866 case R_PPC_SDAREL16:
8867 case R_PPC_SECTOFF:
8868 case R_PPC_SECTOFF_LO:
8869 case R_PPC_DTPREL16:
8870 case R_PPC_DTPREL16_LO:
8871 case R_PPC_TPREL16:
8872 case R_PPC_TPREL16_LO:
8873 case R_PPC_GOT_TLSGD16:
8874 case R_PPC_GOT_TLSGD16_LO:
8875 case R_PPC_GOT_TLSLD16:
8876 case R_PPC_GOT_TLSLD16_LO:
8877 case R_PPC_GOT_DTPREL16:
8878 case R_PPC_GOT_DTPREL16_LO:
8879 case R_PPC_GOT_TPREL16:
8880 case R_PPC_GOT_TPREL16_LO:
8881 {
8882 /* The 32-bit ABI lacks proper relocations to deal with
8883 certain 64-bit instructions. Prevent damage to bits
8884 that make up part of the insn opcode. */
8885 unsigned int insn, mask, lobit;
8886
95f0d0d2 8887 insn = bfd_get_32 (input_bfd,
c316a17c 8888 contents + rel->r_offset - d_offset);
1fe532cf
AM
8889 mask = 0;
8890 if (is_insn_ds_form (insn))
8891 mask = 3;
8892 else if (is_insn_dq_form (insn))
8893 mask = 15;
8894 else
8895 break;
a680de9a
PB
8896 relocation += addend;
8897 addend = insn & mask;
8898 lobit = mask & relocation;
1fe532cf
AM
8899 if (lobit != 0)
8900 {
a680de9a 8901 relocation ^= lobit;
1fe532cf 8902 info->callbacks->einfo
695344c0 8903 /* xgettext:c-format */
174d0a74 8904 (_("%H: error: %s against `%s' not a multiple of %u\n"),
1fe532cf
AM
8905 input_bfd, input_section, rel->r_offset,
8906 howto->name, sym_name, mask + 1);
8907 bfd_set_error (bfd_error_bad_value);
8908 ret = FALSE;
8909 }
1fe532cf
AM
8910 }
8911 break;
252b5132
RH
8912 }
8913
252b5132 8914#ifdef DEBUG
55fd94b0
AM
8915 fprintf (stderr, "\ttype = %s (%d), name = %s, symbol index = %ld, "
8916 "offset = %ld, addend = %ld\n",
252b5132 8917 howto->name,
8da6118f 8918 (int) r_type,
252b5132
RH
8919 sym_name,
8920 r_symndx,
7619e7c7 8921 (long) rel->r_offset,
8da6118f 8922 (long) addend);
252b5132
RH
8923#endif
8924
7619e7c7
AM
8925 if (unresolved_reloc
8926 && !((input_section->flags & SEC_DEBUGGING) != 0
1d5316ab
AM
8927 && h->def_dynamic)
8928 && _bfd_elf_section_offset (output_bfd, info, input_section,
8929 rel->r_offset) != (bfd_vma) -1)
7619e7c7 8930 {
25f53a85 8931 info->callbacks->einfo
695344c0 8932 /* xgettext:c-format */
174d0a74 8933 (_("%H: unresolvable %s relocation against symbol `%s'\n"),
25f53a85 8934 input_bfd, input_section, rel->r_offset,
7b609f53 8935 howto->name,
7619e7c7
AM
8936 sym_name);
8937 ret = FALSE;
8938 }
8939
86c95733
AM
8940 /* 16-bit fields in insns mostly have signed values, but a
8941 few insns have 16-bit unsigned values. Really, we should
8942 have different reloc types. */
8943 if (howto->complain_on_overflow != complain_overflow_dont
8944 && howto->dst_mask == 0xffff
8945 && (input_section->flags & SEC_CODE) != 0)
8946 {
8947 enum complain_overflow complain = complain_overflow_signed;
8948
8949 if ((elf_section_flags (input_section) & SHF_PPC_VLE) == 0)
8950 {
8951 unsigned int insn;
8952
8953 insn = bfd_get_32 (input_bfd, contents + (rel->r_offset & ~3));
2365f8d7 8954 if ((insn & (0x3fu << 26)) == 10u << 26 /* cmpli */)
a47622ac 8955 complain = complain_overflow_bitfield;
2365f8d7
AM
8956 else if ((insn & (0x3fu << 26)) == 28u << 26 /* andi */
8957 || (insn & (0x3fu << 26)) == 24u << 26 /* ori */
8958 || (insn & (0x3fu << 26)) == 26u << 26 /* xori */)
86c95733
AM
8959 complain = complain_overflow_unsigned;
8960 }
8961 if (howto->complain_on_overflow != complain)
8962 {
8963 alt_howto = *howto;
8964 alt_howto.complain_on_overflow = complain;
8965 howto = &alt_howto;
8966 }
8967 }
8968
a680de9a
PB
8969 if (r_type == R_PPC_REL16DX_HA)
8970 {
8971 /* Split field reloc isn't handled by _bfd_final_link_relocate. */
8972 if (rel->r_offset + 4 > input_section->size)
8973 r = bfd_reloc_outofrange;
8974 else
8975 {
8976 unsigned int insn;
8977
8978 relocation += addend;
8979 relocation -= (rel->r_offset
8980 + input_section->output_offset
8981 + input_section->output_section->vma);
8982 relocation >>= 16;
8983 insn = bfd_get_32 (input_bfd, contents + rel->r_offset);
8984 insn &= ~0x1fffc1;
8985 insn |= (relocation & 0xffc1) | ((relocation & 0x3e) << 15);
8986 bfd_put_32 (input_bfd, insn, contents + rel->r_offset);
8987 r = bfd_reloc_ok;
8988 }
8989 }
8990 else
8991 r = _bfd_final_link_relocate (howto, input_bfd, input_section, contents,
8992 rel->r_offset, relocation, addend);
252b5132 8993
7619e7c7 8994 if (r != bfd_reloc_ok)
252b5132 8995 {
7619e7c7 8996 if (r == bfd_reloc_overflow)
252b5132 8997 {
c3301df1 8998 overflow:
8131c122
AM
8999 /* On code like "if (foo) foo();" don't report overflow
9000 on a branch to zero when foo is undefined. */
9001 if (!warned
9002 && !(h != NULL
9003 && (h->root.type == bfd_link_hash_undefweak
9004 || h->root.type == bfd_link_hash_undefined)
9005 && is_branch_reloc (r_type)))
1a72702b
AM
9006 info->callbacks->reloc_overflow
9007 (info, (h ? &h->root : NULL), sym_name, howto->name,
9008 rel->r_addend, input_bfd, input_section, rel->r_offset);
dc1bc0c9
RH
9009 }
9010 else
9011 {
25f53a85 9012 info->callbacks->einfo
695344c0 9013 /* xgettext:c-format */
174d0a74 9014 (_("%H: %s reloc against `%s': error %d\n"),
25f53a85
AM
9015 input_bfd, input_section, rel->r_offset,
9016 howto->name, sym_name, (int) r);
7619e7c7 9017 ret = FALSE;
252b5132
RH
9018 }
9019 }
c316a17c
AM
9020 copy_reloc:
9021 if (wrel != rel)
9022 *wrel = *rel;
9023 }
9024
9025 if (wrel != rel)
9026 {
9027 Elf_Internal_Shdr *rel_hdr;
9028 size_t deleted = rel - wrel;
9029
9030 rel_hdr = _bfd_elf_single_rel_hdr (input_section->output_section);
9031 rel_hdr->sh_size -= rel_hdr->sh_entsize * deleted;
9032 if (rel_hdr->sh_size == 0)
9033 {
9034 /* It is too late to remove an empty reloc section. Leave
9035 one NONE reloc.
9036 ??? What is wrong with an empty section??? */
9037 rel_hdr->sh_size = rel_hdr->sh_entsize;
9038 deleted -= 1;
9039 wrel++;
9040 }
9041 relend = wrel;
9042 rel_hdr = _bfd_elf_single_rel_hdr (input_section);
9043 rel_hdr->sh_size -= rel_hdr->sh_entsize * deleted;
9044 input_section->reloc_count -= deleted;
252b5132
RH
9045 }
9046
252b5132
RH
9047#ifdef DEBUG
9048 fprintf (stderr, "\n");
9049#endif
9050
53291d1f
AM
9051 if (input_section->sec_info_type == SEC_INFO_TYPE_TARGET
9052 && input_section->size != input_section->rawsize
9053 && (strcmp (input_section->output_section->name, ".init") == 0
9054 || strcmp (input_section->output_section->name, ".fini") == 0))
9055 {
9056 /* Branch around the trampolines. */
9057 unsigned int insn = B + input_section->size - input_section->rawsize;
9058 bfd_put_32 (input_bfd, insn, contents + input_section->rawsize);
9059 }
9060
5446cbdf 9061 if (htab->params->ppc476_workaround
795bc6b3 9062 && input_section->sec_info_type == SEC_INFO_TYPE_TARGET
0e1862bb 9063 && (!bfd_link_relocatable (info)
795bc6b3
AM
9064 || (input_section->output_section->alignment_power
9065 >= htab->params->pagesize_p2)))
5446cbdf 9066 {
5446cbdf 9067 bfd_vma start_addr, end_addr, addr;
795bc6b3 9068 bfd_vma pagesize = (bfd_vma) 1 << htab->params->pagesize_p2;
5446cbdf 9069
5446cbdf 9070 if (relax_info->workaround_size != 0)
40fd06d1
AM
9071 {
9072 bfd_byte *p;
9073 unsigned int n;
9074 bfd_byte fill[4];
9075
9076 bfd_put_32 (input_bfd, BA, fill);
9077 p = contents + input_section->size - relax_info->workaround_size;
9078 n = relax_info->workaround_size >> 2;
9079 while (n--)
9080 {
9081 memcpy (p, fill, 4);
9082 p += 4;
9083 }
9084 }
5446cbdf
AM
9085
9086 /* The idea is: Replace the last instruction on a page with a
9087 branch to a patch area. Put the insn there followed by a
9088 branch back to the next page. Complicated a little by
9089 needing to handle moved conditional branches, and by not
9090 wanting to touch data-in-text. */
9091
9092 start_addr = (input_section->output_section->vma
9093 + input_section->output_offset);
9094 end_addr = (start_addr + input_section->size
9095 - relax_info->workaround_size);
9096 for (addr = ((start_addr & -pagesize) + pagesize - 4);
9097 addr < end_addr;
9098 addr += pagesize)
9099 {
9100 bfd_vma offset = addr - start_addr;
9101 Elf_Internal_Rela *lo, *hi;
9102 bfd_boolean is_data;
9103 bfd_vma patch_off, patch_addr;
9104 unsigned int insn;
9105
9106 /* Do we have a data reloc at this offset? If so, leave
9107 the word alone. */
9108 is_data = FALSE;
9109 lo = relocs;
668e22e5
AM
9110 hi = relend;
9111 rel = NULL;
5446cbdf
AM
9112 while (lo < hi)
9113 {
9114 rel = lo + (hi - lo) / 2;
9115 if (rel->r_offset < offset)
9116 lo = rel + 1;
668e22e5 9117 else if (rel->r_offset > offset + 3)
5446cbdf
AM
9118 hi = rel;
9119 else
9120 {
9121 switch (ELF32_R_TYPE (rel->r_info))
9122 {
9123 case R_PPC_ADDR32:
9124 case R_PPC_UADDR32:
9125 case R_PPC_REL32:
9126 case R_PPC_ADDR30:
9127 is_data = TRUE;
9128 break;
9129 default:
9130 break;
9131 }
9132 break;
9133 }
9134 }
9135 if (is_data)
9136 continue;
9137
b4ab4364
AM
9138 /* Some instructions can be left alone too. Unconditional
9139 branches, except for bcctr with BO=0x14 (bctr, bctrl),
9140 avoid the icache failure.
9141
9142 The problem occurs due to prefetch across a page boundary
9143 where stale instructions can be fetched from the next
9144 page, and the mechanism for flushing these bad
9145 instructions fails under certain circumstances. The
9146 unconditional branches:
9147 1) Branch: b, bl, ba, bla,
9148 2) Branch Conditional: bc, bca, bcl, bcla,
9149 3) Branch Conditional to Link Register: bclr, bclrl,
9150 where (2) and (3) have BO=0x14 making them unconditional,
9151 prevent the bad prefetch because the prefetch itself is
9152 affected by these instructions. This happens even if the
9153 instruction is not executed.
9154
9155 A bctr example:
9156 .
9157 . lis 9,new_page@ha
9158 . addi 9,9,new_page@l
9159 . mtctr 9
9160 . bctr
9161 . nop
9162 . nop
9163 . new_page:
9164 .
9165 The bctr is not predicted taken due to ctr not being
9166 ready, so prefetch continues on past the bctr into the
9167 new page which might have stale instructions. If they
9168 fail to be flushed, then they will be executed after the
9169 bctr executes. Either of the following modifications
9170 prevent the bad prefetch from happening in the first
9171 place:
9172 .
1b786873
L
9173 . lis 9,new_page@ha lis 9,new_page@ha
9174 . addi 9,9,new_page@l addi 9,9,new_page@l
9175 . mtctr 9 mtctr 9
9176 . bctr bctr
b4ab4364 9177 . nop b somewhere_else
1b786873
L
9178 . b somewhere_else nop
9179 . new_page: new_page:
b4ab4364 9180 . */
5446cbdf 9181 insn = bfd_get_32 (input_bfd, contents + offset);
2365f8d7
AM
9182 if ((insn & (0x3fu << 26)) == (18u << 26) /* b,bl,ba,bla */
9183 || ((insn & (0x3fu << 26)) == (16u << 26) /* bc,bcl,bca,bcla*/
07d6d2b8 9184 && (insn & (0x14 << 21)) == (0x14 << 21)) /* with BO=0x14 */
2365f8d7 9185 || ((insn & (0x3fu << 26)) == (19u << 26)
b4ab4364 9186 && (insn & (0x3ff << 1)) == (16u << 1) /* bclr,bclrl */
07d6d2b8 9187 && (insn & (0x14 << 21)) == (0x14 << 21)))/* with BO=0x14 */
5446cbdf
AM
9188 continue;
9189
9190 patch_addr = (start_addr + input_section->size
9191 - relax_info->workaround_size);
9192 patch_addr = (patch_addr + 15) & -16;
9193 patch_off = patch_addr - start_addr;
9194 bfd_put_32 (input_bfd, B + patch_off - offset, contents + offset);
668e22e5
AM
9195
9196 if (rel != NULL
9197 && rel->r_offset >= offset
9198 && rel->r_offset < offset + 4)
9199 {
f8b44781
AM
9200 asection *sreloc;
9201
668e22e5
AM
9202 /* If the insn we are patching had a reloc, adjust the
9203 reloc r_offset so that the reloc applies to the moved
9204 location. This matters for -r and --emit-relocs. */
9205 if (rel + 1 != relend)
9206 {
9207 Elf_Internal_Rela tmp = *rel;
9208
9209 /* Keep the relocs sorted by r_offset. */
9210 memmove (rel, rel + 1, (relend - (rel + 1)) * sizeof (*rel));
9211 relend[-1] = tmp;
9212 }
9213 relend[-1].r_offset += patch_off - offset;
f8b44781
AM
9214
9215 /* Adjust REL16 addends too. */
9216 switch (ELF32_R_TYPE (relend[-1].r_info))
9217 {
9218 case R_PPC_REL16:
9219 case R_PPC_REL16_LO:
9220 case R_PPC_REL16_HI:
9221 case R_PPC_REL16_HA:
9222 relend[-1].r_addend += patch_off - offset;
9223 break;
9224 default:
9225 break;
9226 }
9227
9228 /* If we are building a PIE or shared library with
9229 non-PIC objects, perhaps we had a dynamic reloc too?
9230 If so, the dynamic reloc must move with the insn. */
9231 sreloc = elf_section_data (input_section)->sreloc;
9232 if (sreloc != NULL)
9233 {
1d5c94cb 9234 Elf32_External_Rela *slo, *shi, *srelend;
f8b44781
AM
9235 bfd_vma soffset;
9236
1d5c94cb
AM
9237 slo = (Elf32_External_Rela *) sreloc->contents;
9238 shi = srelend = slo + sreloc->reloc_count;
f8b44781
AM
9239 soffset = (offset + input_section->output_section->vma
9240 + input_section->output_offset);
9241 while (slo < shi)
9242 {
1d5c94cb
AM
9243 Elf32_External_Rela *srel = slo + (shi - slo) / 2;
9244 bfd_elf32_swap_reloca_in (output_bfd, (bfd_byte *) srel,
9245 &outrel);
f8b44781
AM
9246 if (outrel.r_offset < soffset)
9247 slo = srel + 1;
9248 else if (outrel.r_offset > soffset + 3)
9249 shi = srel;
9250 else
9251 {
1d5c94cb 9252 if (srel + 1 != srelend)
f8b44781 9253 {
1d5c94cb
AM
9254 memmove (srel, srel + 1,
9255 (srelend - (srel + 1)) * sizeof (*srel));
9256 srel = srelend - 1;
f8b44781
AM
9257 }
9258 outrel.r_offset += patch_off - offset;
1d5c94cb
AM
9259 bfd_elf32_swap_reloca_out (output_bfd, &outrel,
9260 (bfd_byte *) srel);
f8b44781
AM
9261 break;
9262 }
9263 }
9264 }
668e22e5
AM
9265 }
9266 else
9267 rel = NULL;
9268
2365f8d7 9269 if ((insn & (0x3fu << 26)) == (16u << 26) /* bc */
5446cbdf
AM
9270 && (insn & 2) == 0 /* relative */)
9271 {
9272 bfd_vma delta = ((insn & 0xfffc) ^ 0x8000) - 0x8000;
9273
9274 delta += offset - patch_off;
0e1862bb 9275 if (bfd_link_relocatable (info) && rel != NULL)
668e22e5 9276 delta = 0;
0e1862bb 9277 if (!bfd_link_relocatable (info) && rel != NULL)
668e22e5
AM
9278 {
9279 enum elf_ppc_reloc_type r_type;
9280
9281 r_type = ELF32_R_TYPE (relend[-1].r_info);
9282 if (r_type == R_PPC_REL14_BRTAKEN)
9283 insn |= BRANCH_PREDICT_BIT;
9284 else if (r_type == R_PPC_REL14_BRNTAKEN)
9285 insn &= ~BRANCH_PREDICT_BIT;
9286 else
9287 BFD_ASSERT (r_type == R_PPC_REL14);
9288
9289 if ((r_type == R_PPC_REL14_BRTAKEN
9290 || r_type == R_PPC_REL14_BRNTAKEN)
9291 && delta + 0x8000 < 0x10000
9292 && (bfd_signed_vma) delta < 0)
9293 insn ^= BRANCH_PREDICT_BIT;
9294 }
5446cbdf
AM
9295 if (delta + 0x8000 < 0x10000)
9296 {
9297 bfd_put_32 (input_bfd,
9298 (insn & ~0xfffc) | (delta & 0xfffc),
9299 contents + patch_off);
9300 patch_off += 4;
9301 bfd_put_32 (input_bfd,
9302 B | ((offset + 4 - patch_off) & 0x3fffffc),
9303 contents + patch_off);
9304 patch_off += 4;
9305 }
9306 else
9307 {
668e22e5
AM
9308 if (rel != NULL)
9309 {
9310 unsigned int r_sym = ELF32_R_SYM (relend[-1].r_info);
9311
9312 relend[-1].r_offset += 8;
9313 relend[-1].r_info = ELF32_R_INFO (r_sym, R_PPC_REL24);
9314 }
5446cbdf
AM
9315 bfd_put_32 (input_bfd,
9316 (insn & ~0xfffc) | 8,
9317 contents + patch_off);
9318 patch_off += 4;
9319 bfd_put_32 (input_bfd,
9320 B | ((offset + 4 - patch_off) & 0x3fffffc),
9321 contents + patch_off);
9322 patch_off += 4;
9323 bfd_put_32 (input_bfd,
9324 B | ((delta - 8) & 0x3fffffc),
9325 contents + patch_off);
9326 patch_off += 4;
9327 }
9328 }
9329 else
9330 {
9331 bfd_put_32 (input_bfd, insn, contents + patch_off);
9332 patch_off += 4;
9333 bfd_put_32 (input_bfd,
9334 B | ((offset + 4 - patch_off) & 0x3fffffc),
9335 contents + patch_off);
9336 patch_off += 4;
9337 }
9338 BFD_ASSERT (patch_off <= input_section->size);
9339 relax_info->workaround_size = input_section->size - patch_off;
9340 }
9341 }
9342
252b5132
RH
9343 return ret;
9344}
252b5132 9345\f
49c09209 9346/* Write out the PLT relocs and entries for H. */
c5fccbec 9347
b34976b6 9348static bfd_boolean
49c09209 9349write_global_sym_plt (struct elf_link_hash_entry *h, void *inf)
e1a9cb8e 9350{
49c09209
AM
9351 struct bfd_link_info *info = (struct bfd_link_info *) inf;
9352 struct ppc_elf_link_hash_table *htab = ppc_elf_hash_table (info);
a6aa5195
AM
9353 struct plt_entry *ent;
9354 bfd_boolean doneone;
e1a9cb8e 9355
a6aa5195
AM
9356 doneone = FALSE;
9357 for (ent = h->plt.plist; ent != NULL; ent = ent->next)
9358 if (ent->plt.offset != (bfd_vma) -1)
9359 {
30845f11
AM
9360 bfd_boolean dyn = !use_local_plt (info, h);
9361
a6aa5195
AM
9362 if (!doneone)
9363 {
9364 Elf_Internal_Rela rela;
9365 bfd_byte *loc;
9366 bfd_vma reloc_index;
2d7ad24e
AM
9367 asection *plt = htab->elf.splt;
9368 asection *relplt = htab->elf.srelplt;
e1a9cb8e 9369
30845f11 9370 if (htab->plt_type == PLT_NEW || !dyn)
9d8504b1
PB
9371 reloc_index = ent->plt.offset / 4;
9372 else
9373 {
9374 reloc_index = ((ent->plt.offset - htab->plt_initial_entry_size)
9375 / htab->plt_slot_size);
9376 if (reloc_index > PLT_NUM_SINGLE_ENTRIES
4a3dc543 9377 && htab->plt_type == PLT_OLD)
9d8504b1
PB
9378 reloc_index -= (reloc_index - PLT_NUM_SINGLE_ENTRIES) / 2;
9379 }
9380
a6aa5195
AM
9381 /* This symbol has an entry in the procedure linkage table.
9382 Set it up. */
30845f11 9383 if (htab->plt_type == PLT_VXWORKS && dyn)
a6aa5195 9384 {
9d8504b1
PB
9385 bfd_vma got_offset;
9386 const bfd_vma *plt_entry;
5b914448 9387
9d8504b1
PB
9388 /* The first three entries in .got.plt are reserved. */
9389 got_offset = (reloc_index + 3) * 4;
9390
9391 /* Use the right PLT. */
0e1862bb 9392 plt_entry = bfd_link_pic (info) ? ppc_elf_vxworks_pic_plt_entry
9d8504b1
PB
9393 : ppc_elf_vxworks_plt_entry;
9394
9395 /* Fill in the .plt on VxWorks. */
0e1862bb 9396 if (bfd_link_pic (info))
9d8504b1 9397 {
49c09209 9398 bfd_put_32 (info->output_bfd,
e87d4038 9399 plt_entry[0] | PPC_HA (got_offset),
2d7ad24e 9400 plt->contents + ent->plt.offset + 0);
49c09209 9401 bfd_put_32 (info->output_bfd,
e87d4038 9402 plt_entry[1] | PPC_LO (got_offset),
2d7ad24e 9403 plt->contents + ent->plt.offset + 4);
9d8504b1
PB
9404 }
9405 else
9406 {
e87d4038 9407 bfd_vma got_loc = got_offset + SYM_VAL (htab->elf.hgot);
9d8504b1 9408
49c09209 9409 bfd_put_32 (info->output_bfd,
e87d4038 9410 plt_entry[0] | PPC_HA (got_loc),
2d7ad24e 9411 plt->contents + ent->plt.offset + 0);
49c09209 9412 bfd_put_32 (info->output_bfd,
e87d4038 9413 plt_entry[1] | PPC_LO (got_loc),
2d7ad24e 9414 plt->contents + ent->plt.offset + 4);
9d8504b1
PB
9415 }
9416
49c09209 9417 bfd_put_32 (info->output_bfd, plt_entry[2],
2d7ad24e 9418 plt->contents + ent->plt.offset + 8);
49c09209 9419 bfd_put_32 (info->output_bfd, plt_entry[3],
2d7ad24e 9420 plt->contents + ent->plt.offset + 12);
9d8504b1
PB
9421
9422 /* This instruction is an immediate load. The value loaded is
9423 the byte offset of the R_PPC_JMP_SLOT relocation from the
9424 start of the .rela.plt section. The value is stored in the
9425 low-order 16 bits of the load instruction. */
9426 /* NOTE: It appears that this is now an index rather than a
9427 prescaled offset. */
49c09209 9428 bfd_put_32 (info->output_bfd,
9d8504b1 9429 plt_entry[4] | reloc_index,
2d7ad24e 9430 plt->contents + ent->plt.offset + 16);
9d8504b1
PB
9431 /* This instruction is a PC-relative branch whose target is
9432 the start of the PLT section. The address of this branch
9433 instruction is 20 bytes beyond the start of this PLT entry.
9434 The address is encoded in bits 6-29, inclusive. The value
9435 stored is right-shifted by two bits, permitting a 26-bit
9436 offset. */
49c09209 9437 bfd_put_32 (info->output_bfd,
5b914448 9438 (plt_entry[5]
9d8504b1 9439 | (-(ent->plt.offset + 20) & 0x03fffffc)),
2d7ad24e 9440 plt->contents + ent->plt.offset + 20);
49c09209 9441 bfd_put_32 (info->output_bfd, plt_entry[6],
2d7ad24e 9442 plt->contents + ent->plt.offset + 24);
49c09209 9443 bfd_put_32 (info->output_bfd, plt_entry[7],
2d7ad24e 9444 plt->contents + ent->plt.offset + 28);
9d8504b1
PB
9445
9446 /* Fill in the GOT entry corresponding to this PLT slot with
a8685210 9447 the address immediately after the "bctr" instruction
9d8504b1 9448 in this PLT entry. */
2d7ad24e
AM
9449 bfd_put_32 (info->output_bfd, (plt->output_section->vma
9450 + plt->output_offset
9451 + ent->plt.offset + 16),
ce558b89 9452 htab->elf.sgotplt->contents + got_offset);
9d8504b1 9453
0e1862bb 9454 if (!bfd_link_pic (info))
9d8504b1
PB
9455 {
9456 /* Fill in a couple of entries in .rela.plt.unloaded. */
9457 loc = htab->srelplt2->contents
9458 + ((VXWORKS_PLTRESOLVE_RELOCS + reloc_index
9459 * VXWORKS_PLT_NON_JMP_SLOT_RELOCS)
9460 * sizeof (Elf32_External_Rela));
9461
9462 /* Provide the @ha relocation for the first instruction. */
2d7ad24e
AM
9463 rela.r_offset = (plt->output_section->vma
9464 + plt->output_offset
9d8504b1 9465 + ent->plt.offset + 2);
636ce3f5 9466 rela.r_info = ELF32_R_INFO (htab->elf.hgot->indx,
9d8504b1
PB
9467 R_PPC_ADDR16_HA);
9468 rela.r_addend = got_offset;
49c09209 9469 bfd_elf32_swap_reloca_out (info->output_bfd, &rela, loc);
9d8504b1
PB
9470 loc += sizeof (Elf32_External_Rela);
9471
9472 /* Provide the @l relocation for the second instruction. */
2d7ad24e
AM
9473 rela.r_offset = (plt->output_section->vma
9474 + plt->output_offset
9d8504b1 9475 + ent->plt.offset + 6);
636ce3f5 9476 rela.r_info = ELF32_R_INFO (htab->elf.hgot->indx,
9d8504b1
PB
9477 R_PPC_ADDR16_LO);
9478 rela.r_addend = got_offset;
49c09209 9479 bfd_elf32_swap_reloca_out (info->output_bfd, &rela, loc);
9d8504b1
PB
9480 loc += sizeof (Elf32_External_Rela);
9481
9482 /* Provide a relocation for the GOT entry corresponding to this
9483 PLT slot. Point it at the middle of the .plt entry. */
ce558b89
AM
9484 rela.r_offset = (htab->elf.sgotplt->output_section->vma
9485 + htab->elf.sgotplt->output_offset
9d8504b1 9486 + got_offset);
7325306f 9487 rela.r_info = ELF32_R_INFO (htab->elf.hplt->indx,
9d8504b1
PB
9488 R_PPC_ADDR32);
9489 rela.r_addend = ent->plt.offset + 16;
49c09209 9490 bfd_elf32_swap_reloca_out (info->output_bfd, &rela, loc);
9d8504b1
PB
9491 }
9492
9493 /* VxWorks uses non-standard semantics for R_PPC_JMP_SLOT.
9494 In particular, the offset for the relocation is not the
9495 address of the PLT entry for this function, as specified
9496 by the ABI. Instead, the offset is set to the address of
9497 the GOT slot for this function. See EABI 4.4.4.1. */
ce558b89
AM
9498 rela.r_offset = (htab->elf.sgotplt->output_section->vma
9499 + htab->elf.sgotplt->output_offset
9d8504b1 9500 + got_offset);
2d7ad24e 9501 rela.r_addend = 0;
a6aa5195
AM
9502 }
9503 else
9504 {
2d7ad24e 9505 rela.r_addend = 0;
30845f11 9506 if (!dyn)
2d7ad24e
AM
9507 {
9508 if (h->type == STT_GNU_IFUNC)
9509 {
9510 plt = htab->elf.iplt;
9511 relplt = htab->elf.irelplt;
9512 }
9513 else
9514 {
9515 plt = htab->pltlocal;
9516 relplt = bfd_link_pic (info) ? htab->relpltlocal : NULL;
9517 }
9518 if (h->def_regular
9519 && (h->root.type == bfd_link_hash_defined
9520 || h->root.type == bfd_link_hash_defweak))
9521 rela.r_addend = SYM_VAL (h);
9522 }
e054468f 9523
2d7ad24e 9524 if (relplt == NULL)
9d8504b1 9525 {
2d7ad24e
AM
9526 loc = plt->contents + ent->plt.offset;
9527 bfd_put_32 (info->output_bfd, rela.r_addend, loc);
9d8504b1
PB
9528 }
9529 else
9530 {
2d7ad24e
AM
9531 rela.r_offset = (plt->output_section->vma
9532 + plt->output_offset
9533 + ent->plt.offset);
9534
30845f11 9535 if (htab->plt_type == PLT_OLD || !dyn)
2d7ad24e
AM
9536 {
9537 /* We don't need to fill in the .plt. The ppc dynamic
9538 linker will fill it in. */
9539 }
9540 else
9541 {
9542 bfd_vma val = (htab->glink_pltresolve + ent->plt.offset
9543 + htab->glink->output_section->vma
9544 + htab->glink->output_offset);
9545 bfd_put_32 (info->output_bfd, val,
9546 plt->contents + ent->plt.offset);
9547 }
9d8504b1 9548 }
a6aa5195 9549 }
e1a9cb8e 9550
2d7ad24e 9551 if (relplt != NULL)
e054468f 9552 {
2d7ad24e 9553 /* Fill in the entry in the .rela.plt section. */
30845f11 9554 if (!dyn)
2d7ad24e
AM
9555 {
9556 if (h->type == STT_GNU_IFUNC)
9557 rela.r_info = ELF32_R_INFO (0, R_PPC_IRELATIVE);
9558 else
9559 rela.r_info = ELF32_R_INFO (0, R_PPC_RELATIVE);
9560 loc = relplt->contents + (relplt->reloc_count++
9561 * sizeof (Elf32_External_Rela));
9562 htab->local_ifunc_resolver = 1;
9563 }
9564 else
9565 {
9566 rela.r_info = ELF32_R_INFO (h->dynindx, R_PPC_JMP_SLOT);
9567 loc = relplt->contents + (reloc_index
9568 * sizeof (Elf32_External_Rela));
9569 if (h->type == STT_GNU_IFUNC && is_static_defined (h))
9570 htab->maybe_local_ifunc_resolver = 1;
9571 }
9572 bfd_elf32_swap_reloca_out (info->output_bfd, &rela, loc);
82e66161 9573 }
a6aa5195
AM
9574 doneone = TRUE;
9575 }
e1a9cb8e 9576
30845f11 9577 if (htab->plt_type == PLT_NEW || !dyn)
a6aa5195 9578 {
a7f2871e 9579 unsigned char *p;
49c09209 9580 asection *plt = htab->elf.splt;
9e390558 9581
30845f11 9582 if (!dyn)
2d7ad24e
AM
9583 {
9584 if (h->type == STT_GNU_IFUNC)
9585 plt = htab->elf.iplt;
9586 else
9587 break;
9588 }
e1a9cb8e 9589
a7f2871e 9590 p = (unsigned char *) htab->glink->contents + ent->glink_offset;
49c09209 9591 write_glink_stub (h, ent, plt, p, info);
e1a9cb8e 9592
0e1862bb 9593 if (!bfd_link_pic (info))
e054468f
AM
9594 /* We only need one non-PIC glink stub. */
9595 break;
a6aa5195
AM
9596 }
9597 else
9598 break;
9599 }
49c09209
AM
9600 return TRUE;
9601}
9602
9603/* Finish up PLT handling. */
9604
9605bfd_boolean
9606ppc_finish_symbols (struct bfd_link_info *info)
9607{
9608 struct ppc_elf_link_hash_table *htab = ppc_elf_hash_table (info);
9609 bfd *ibfd;
9610
9611 if (!htab)
9612 return TRUE;
9613
9614 elf_link_hash_traverse (&htab->elf, write_global_sym_plt, info);
9615
9616 for (ibfd = info->input_bfds; ibfd != NULL; ibfd = ibfd->link.next)
9617 {
9618 bfd_vma *local_got, *end_local_got;
9619 struct plt_entry **local_plt, **lplt, **end_local_plt;
9620 Elf_Internal_Shdr *symtab_hdr;
9621 bfd_size_type locsymcount;
9622 Elf_Internal_Sym *local_syms = NULL;
9623 struct plt_entry *ent;
9624
9625 if (!is_ppc_elf (ibfd))
9626 continue;
9627
9628 local_got = elf_local_got_offsets (ibfd);
9629 if (!local_got)
9630 continue;
9631
9632 symtab_hdr = &elf_symtab_hdr (ibfd);
9633 locsymcount = symtab_hdr->sh_info;
9634 end_local_got = local_got + locsymcount;
9635 local_plt = (struct plt_entry **) end_local_got;
9636 end_local_plt = local_plt + locsymcount;
9637 for (lplt = local_plt; lplt < end_local_plt; ++lplt)
9638 for (ent = *lplt; ent != NULL; ent = ent->next)
9639 {
9640 if (ent->plt.offset != (bfd_vma) -1)
9641 {
9642 Elf_Internal_Sym *sym;
9643 asection *sym_sec;
9644 asection *plt, *relplt;
9645 bfd_byte *loc;
9646 bfd_vma val;
9647 Elf_Internal_Rela rela;
8cd1fe1b 9648 unsigned char *p;
49c09209
AM
9649
9650 if (!get_sym_h (NULL, &sym, &sym_sec, NULL, &local_syms,
9651 lplt - local_plt, ibfd))
9652 {
c9594989 9653 if (symtab_hdr->contents != (unsigned char *) local_syms)
49c09209
AM
9654 free (local_syms);
9655 return FALSE;
9656 }
9657
9658 val = sym->st_value;
9659 if (sym_sec != NULL && sym_sec->output_section != NULL)
9660 val += sym_sec->output_offset + sym_sec->output_section->vma;
9661
2d7ad24e
AM
9662 if (ELF_ST_TYPE (sym->st_info) == STT_GNU_IFUNC)
9663 {
9664 htab->local_ifunc_resolver = 1;
9665 plt = htab->elf.iplt;
9666 relplt = htab->elf.irelplt;
9667 rela.r_info = ELF32_R_INFO (0, R_PPC_IRELATIVE);
9668 }
9669 else
9670 {
9671 plt = htab->pltlocal;
9672 if (bfd_link_pic (info))
9673 {
9674 relplt = htab->relpltlocal;
9675 rela.r_info = ELF32_R_INFO (0, R_PPC_RELATIVE);
9676 }
9677 else
9678 {
9679 loc = plt->contents + ent->plt.offset;
9680 bfd_put_32 (info->output_bfd, val, loc);
9681 continue;
9682 }
9683 }
49c09209
AM
9684
9685 rela.r_offset = (ent->plt.offset
9686 + plt->output_offset
9687 + plt->output_section->vma);
49c09209
AM
9688 rela.r_addend = val;
9689 loc = relplt->contents + (relplt->reloc_count++
9690 * sizeof (Elf32_External_Rela));
9691 bfd_elf32_swap_reloca_out (info->output_bfd, &rela, loc);
49c09209 9692
8cd1fe1b 9693 p = (unsigned char *) htab->glink->contents + ent->glink_offset;
49c09209 9694 write_glink_stub (NULL, ent, htab->elf.iplt, p, info);
49c09209
AM
9695 }
9696 }
9697
9698 if (local_syms != NULL
9699 && symtab_hdr->contents != (unsigned char *) local_syms)
9700 {
9701 if (!info->keep_memory)
9702 free (local_syms);
9703 else
9704 symtab_hdr->contents = (unsigned char *) local_syms;
9705 }
9706 }
9707 return TRUE;
9708}
9709
9710/* Finish up dynamic symbol handling. We set the contents of various
9711 dynamic sections here. */
9712
9713static bfd_boolean
9714ppc_elf_finish_dynamic_symbol (bfd *output_bfd,
9715 struct bfd_link_info *info,
9716 struct elf_link_hash_entry *h,
9717 Elf_Internal_Sym *sym)
9718{
9719 struct ppc_elf_link_hash_table *htab = ppc_elf_hash_table (info);
9720 struct plt_entry *ent;
9721
9722#ifdef DEBUG
9723 fprintf (stderr, "ppc_elf_finish_dynamic_symbol called for %s",
9724 h->root.root.string);
9725#endif
9726
9727 if (!h->def_regular
9728 || (h->type == STT_GNU_IFUNC && !bfd_link_pic (info)))
9729 for (ent = h->plt.plist; ent != NULL; ent = ent->next)
9730 if (ent->plt.offset != (bfd_vma) -1)
9731 {
9732 if (!h->def_regular)
9733 {
9734 /* Mark the symbol as undefined, rather than as
9735 defined in the .plt section. Leave the value if
9736 there were any relocations where pointer equality
9737 matters (this is a clue for the dynamic linker, to
9738 make function pointer comparisons work between an
9739 application and shared library), otherwise set it
9740 to zero. */
9741 sym->st_shndx = SHN_UNDEF;
9742 if (!h->pointer_equality_needed)
9743 sym->st_value = 0;
9744 else if (!h->ref_regular_nonweak)
9745 {
9746 /* This breaks function pointer comparisons, but
9747 that is better than breaking tests for a NULL
9748 function pointer. */
9749 sym->st_value = 0;
9750 }
9751 }
9752 else
9753 {
9754 /* Set the value of ifunc symbols in a non-pie
9755 executable to the glink entry. This is to avoid
9756 text relocations. We can't do this for ifunc in
9757 allocate_dynrelocs, as we do for normal dynamic
9758 function symbols with plt entries, because we need
9759 to keep the original value around for the ifunc
9760 relocation. */
9761 sym->st_shndx
9762 = (_bfd_elf_section_from_bfd_section
9763 (info->output_bfd, htab->glink->output_section));
9764 sym->st_value = (ent->glink_offset
9765 + htab->glink->output_offset
9766 + htab->glink->output_section->vma);
9767 }
9768 break;
9769 }
e1a9cb8e 9770
25dbc73a
AM
9771 if (h->needs_copy)
9772 {
9773 asection *s;
9774 Elf_Internal_Rela rela;
9775 bfd_byte *loc;
e1a9cb8e 9776
25dbc73a 9777 /* This symbols needs a copy reloc. Set it up. */
e1a9cb8e 9778
25dbc73a
AM
9779#ifdef DEBUG
9780 fprintf (stderr, ", copy");
9781#endif
e1a9cb8e 9782
25dbc73a 9783 BFD_ASSERT (h->dynindx != -1);
86bbe32f 9784
4dc4a9a5 9785 if (ppc_elf_hash_entry (h)->has_sda_refs)
25dbc73a 9786 s = htab->relsbss;
afbf7e8e 9787 else if (h->root.u.def.section == htab->elf.sdynrelro)
5474d94f 9788 s = htab->elf.sreldynrelro;
25dbc73a 9789 else
9d19e4fd 9790 s = htab->elf.srelbss;
25dbc73a 9791 BFD_ASSERT (s != NULL);
e1a9cb8e 9792
e87d4038 9793 rela.r_offset = SYM_VAL (h);
25dbc73a
AM
9794 rela.r_info = ELF32_R_INFO (h->dynindx, R_PPC_COPY);
9795 rela.r_addend = 0;
9796 loc = s->contents + s->reloc_count++ * sizeof (Elf32_External_Rela);
9797 bfd_elf32_swap_reloca_out (output_bfd, &rela, loc);
9798 }
e1a9cb8e 9799
25dbc73a
AM
9800#ifdef DEBUG
9801 fprintf (stderr, "\n");
9802#endif
e1a9cb8e 9803
25dbc73a
AM
9804 return TRUE;
9805}
9806\f
9807static enum elf_reloc_type_class
7e612e98
AM
9808ppc_elf_reloc_type_class (const struct bfd_link_info *info,
9809 const asection *rel_sec,
9810 const Elf_Internal_Rela *rela)
e1a9cb8e 9811{
7e612e98
AM
9812 struct ppc_elf_link_hash_table *htab = ppc_elf_hash_table (info);
9813
ce558b89 9814 if (rel_sec == htab->elf.irelplt)
7e612e98
AM
9815 return reloc_class_ifunc;
9816
25dbc73a
AM
9817 switch (ELF32_R_TYPE (rela->r_info))
9818 {
9819 case R_PPC_RELATIVE:
9820 return reloc_class_relative;
25dbc73a
AM
9821 case R_PPC_JMP_SLOT:
9822 return reloc_class_plt;
9823 case R_PPC_COPY:
9824 return reloc_class_copy;
9825 default:
9826 return reloc_class_normal;
9827 }
e1a9cb8e 9828}
25dbc73a
AM
9829\f
9830/* Finish up the dynamic sections. */
e1a9cb8e 9831
25dbc73a
AM
9832static bfd_boolean
9833ppc_elf_finish_dynamic_sections (bfd *output_bfd,
9834 struct bfd_link_info *info)
e1a9cb8e 9835{
25dbc73a
AM
9836 asection *sdyn;
9837 struct ppc_elf_link_hash_table *htab;
1fe44d79 9838 bfd_vma got;
e87d4038
AM
9839 bfd *dynobj;
9840 bfd_boolean ret = TRUE;
e1a9cb8e 9841
25dbc73a
AM
9842#ifdef DEBUG
9843 fprintf (stderr, "ppc_elf_finish_dynamic_sections called\n");
9844#endif
6b0817e5 9845
25dbc73a 9846 htab = ppc_elf_hash_table (info);
ce558b89 9847 dynobj = htab->elf.dynobj;
3d4d4302 9848 sdyn = bfd_get_linker_section (dynobj, ".dynamic");
e1a9cb8e 9849
1fe44d79
AM
9850 got = 0;
9851 if (htab->elf.hgot != NULL)
e87d4038 9852 got = SYM_VAL (htab->elf.hgot);
1fe44d79 9853
25dbc73a 9854 if (htab->elf.dynamic_sections_created)
e1a9cb8e 9855 {
25dbc73a 9856 Elf32_External_Dyn *dyncon, *dynconend;
e1a9cb8e 9857
ce558b89 9858 BFD_ASSERT (htab->elf.splt != NULL && sdyn != NULL);
86bbe32f 9859
25dbc73a
AM
9860 dyncon = (Elf32_External_Dyn *) sdyn->contents;
9861 dynconend = (Elf32_External_Dyn *) (sdyn->contents + sdyn->size);
9862 for (; dyncon < dynconend; dyncon++)
9863 {
9864 Elf_Internal_Dyn dyn;
9865 asection *s;
e1a9cb8e 9866
9d8504b1 9867 bfd_elf32_swap_dyn_in (dynobj, dyncon, &dyn);
86bbe32f 9868
25dbc73a
AM
9869 switch (dyn.d_tag)
9870 {
9871 case DT_PLTGOT:
90c14f0c 9872 if (htab->elf.target_os == is_vxworks)
ce558b89 9873 s = htab->elf.sgotplt;
9d8504b1 9874 else
ce558b89 9875 s = htab->elf.splt;
25dbc73a
AM
9876 dyn.d_un.d_ptr = s->output_section->vma + s->output_offset;
9877 break;
86bbe32f 9878
25dbc73a 9879 case DT_PLTRELSZ:
ce558b89 9880 dyn.d_un.d_val = htab->elf.srelplt->size;
25dbc73a 9881 break;
e1a9cb8e 9882
25dbc73a 9883 case DT_JMPREL:
ce558b89 9884 s = htab->elf.srelplt;
25dbc73a
AM
9885 dyn.d_un.d_ptr = s->output_section->vma + s->output_offset;
9886 break;
2f89ff8d 9887
1fe44d79
AM
9888 case DT_PPC_GOT:
9889 dyn.d_un.d_ptr = got;
d7128ce4
AM
9890 break;
9891
82e66161
AM
9892 case DT_TEXTREL:
9893 if (htab->local_ifunc_resolver)
9894 info->callbacks->einfo
9895 (_("%X%P: text relocations and GNU indirect "
9896 "functions will result in a segfault at runtime\n"));
9897 else if (htab->maybe_local_ifunc_resolver)
9898 info->callbacks->einfo
9899 (_("%P: warning: text relocations and GNU indirect "
9900 "functions may result in a segfault at runtime\n"));
9901 continue;
9902
25dbc73a 9903 default:
90c14f0c 9904 if (htab->elf.target_os == is_vxworks
7a2b07ff
NS
9905 && elf_vxworks_finish_dynamic_entry (output_bfd, &dyn))
9906 break;
25dbc73a
AM
9907 continue;
9908 }
4c45e5c9 9909
25dbc73a
AM
9910 bfd_elf32_swap_dyn_out (output_bfd, &dyn, dyncon);
9911 }
9912 }
4c45e5c9 9913
6528b6eb
AM
9914 if (htab->elf.sgot != NULL
9915 && htab->elf.sgot->output_section != bfd_abs_section_ptr)
25dbc73a 9916 {
ce558b89
AM
9917 if (htab->elf.hgot->root.u.def.section == htab->elf.sgot
9918 || htab->elf.hgot->root.u.def.section == htab->elf.sgotplt)
e87d4038 9919 {
e79f5955 9920 unsigned char *p = htab->elf.hgot->root.u.def.section->contents;
2f89ff8d 9921
e87d4038
AM
9922 p += htab->elf.hgot->root.u.def.value;
9923 if (htab->plt_type == PLT_OLD)
e79f5955
AM
9924 {
9925 /* Add a blrl instruction at _GLOBAL_OFFSET_TABLE_-4
9926 so that a function can easily find the address of
9927 _GLOBAL_OFFSET_TABLE_. */
9928 BFD_ASSERT (htab->elf.hgot->root.u.def.value - 4
9929 < htab->elf.hgot->root.u.def.section->size);
9930 bfd_put_32 (output_bfd, 0x4e800021, p - 4);
9931 }
3b36f7e6 9932
e87d4038 9933 if (sdyn != NULL)
e79f5955
AM
9934 {
9935 bfd_vma val = sdyn->output_section->vma + sdyn->output_offset;
9936 BFD_ASSERT (htab->elf.hgot->root.u.def.value
9937 < htab->elf.hgot->root.u.def.section->size);
9938 bfd_put_32 (output_bfd, val, p);
9939 }
e87d4038
AM
9940 }
9941 else
9942 {
695344c0 9943 /* xgettext:c-format */
cf97bcb0
AM
9944 _bfd_error_handler (_("%s not defined in linker created %pA"),
9945 htab->elf.hgot->root.root.string,
9946 (htab->elf.sgotplt != NULL
9947 ? htab->elf.sgotplt : htab->elf.sgot));
e87d4038
AM
9948 bfd_set_error (bfd_error_bad_value);
9949 ret = FALSE;
9950 }
25dbc73a 9951
ce558b89 9952 elf_section_data (htab->elf.sgot->output_section)->this_hdr.sh_entsize = 4;
25dbc73a
AM
9953 }
9954
9d8504b1 9955 /* Fill in the first entry in the VxWorks procedure linkage table. */
90c14f0c 9956 if (htab->elf.target_os == is_vxworks
6528b6eb
AM
9957 && htab->elf.splt != NULL
9958 && htab->elf.splt->size != 0
9959 && htab->elf.splt->output_section != bfd_abs_section_ptr)
9d8504b1 9960 {
6528b6eb 9961 asection *splt = htab->elf.splt;
9d8504b1 9962 /* Use the right PLT. */
0e1862bb 9963 const bfd_vma *plt_entry = (bfd_link_pic (info)
5b914448
AM
9964 ? ppc_elf_vxworks_pic_plt0_entry
9965 : ppc_elf_vxworks_plt0_entry);
9d8504b1 9966
0e1862bb 9967 if (!bfd_link_pic (info))
9d8504b1 9968 {
e87d4038 9969 bfd_vma got_value = SYM_VAL (htab->elf.hgot);
9d8504b1 9970
e87d4038 9971 bfd_put_32 (output_bfd, plt_entry[0] | PPC_HA (got_value),
9d8504b1 9972 splt->contents + 0);
e87d4038 9973 bfd_put_32 (output_bfd, plt_entry[1] | PPC_LO (got_value),
9d8504b1
PB
9974 splt->contents + 4);
9975 }
9976 else
9977 {
9978 bfd_put_32 (output_bfd, plt_entry[0], splt->contents + 0);
9979 bfd_put_32 (output_bfd, plt_entry[1], splt->contents + 4);
9980 }
9981 bfd_put_32 (output_bfd, plt_entry[2], splt->contents + 8);
9982 bfd_put_32 (output_bfd, plt_entry[3], splt->contents + 12);
9983 bfd_put_32 (output_bfd, plt_entry[4], splt->contents + 16);
9984 bfd_put_32 (output_bfd, plt_entry[5], splt->contents + 20);
9985 bfd_put_32 (output_bfd, plt_entry[6], splt->contents + 24);
9986 bfd_put_32 (output_bfd, plt_entry[7], splt->contents + 28);
9987
0e1862bb 9988 if (! bfd_link_pic (info))
9d8504b1
PB
9989 {
9990 Elf_Internal_Rela rela;
9991 bfd_byte *loc;
9992
9993 loc = htab->srelplt2->contents;
9994
9995 /* Output the @ha relocation for the first instruction. */
ce558b89
AM
9996 rela.r_offset = (htab->elf.splt->output_section->vma
9997 + htab->elf.splt->output_offset
9d8504b1 9998 + 2);
636ce3f5 9999 rela.r_info = ELF32_R_INFO (htab->elf.hgot->indx, R_PPC_ADDR16_HA);
9d8504b1
PB
10000 rela.r_addend = 0;
10001 bfd_elf32_swap_reloca_out (output_bfd, &rela, loc);
10002 loc += sizeof (Elf32_External_Rela);
5b914448 10003
9d8504b1 10004 /* Output the @l relocation for the second instruction. */
ce558b89
AM
10005 rela.r_offset = (htab->elf.splt->output_section->vma
10006 + htab->elf.splt->output_offset
9d8504b1 10007 + 6);
636ce3f5 10008 rela.r_info = ELF32_R_INFO (htab->elf.hgot->indx, R_PPC_ADDR16_LO);
9d8504b1
PB
10009 rela.r_addend = 0;
10010 bfd_elf32_swap_reloca_out (output_bfd, &rela, loc);
10011 loc += sizeof (Elf32_External_Rela);
10012
10013 /* Fix up the remaining relocations. They may have the wrong
10014 symbol index for _G_O_T_ or _P_L_T_ depending on the order
10015 in which symbols were output. */
10016 while (loc < htab->srelplt2->contents + htab->srelplt2->size)
10017 {
10018 Elf_Internal_Rela rel;
10019
10020 bfd_elf32_swap_reloc_in (output_bfd, loc, &rel);
636ce3f5 10021 rel.r_info = ELF32_R_INFO (htab->elf.hgot->indx, R_PPC_ADDR16_HA);
9d8504b1
PB
10022 bfd_elf32_swap_reloc_out (output_bfd, &rel, loc);
10023 loc += sizeof (Elf32_External_Rela);
10024
10025 bfd_elf32_swap_reloc_in (output_bfd, loc, &rel);
636ce3f5 10026 rel.r_info = ELF32_R_INFO (htab->elf.hgot->indx, R_PPC_ADDR16_LO);
9d8504b1
PB
10027 bfd_elf32_swap_reloc_out (output_bfd, &rel, loc);
10028 loc += sizeof (Elf32_External_Rela);
10029
10030 bfd_elf32_swap_reloc_in (output_bfd, loc, &rel);
7325306f 10031 rel.r_info = ELF32_R_INFO (htab->elf.hplt->indx, R_PPC_ADDR32);
9d8504b1
PB
10032 bfd_elf32_swap_reloc_out (output_bfd, &rel, loc);
10033 loc += sizeof (Elf32_External_Rela);
10034 }
10035 }
10036 }
10037
e054468f
AM
10038 if (htab->glink != NULL
10039 && htab->glink->contents != NULL
10040 && htab->elf.dynamic_sections_created)
d7128ce4
AM
10041 {
10042 unsigned char *p;
10043 unsigned char *endp;
a6aa5195 10044 bfd_vma res0;
a6aa5195
AM
10045
10046 /*
10047 * PIC glink code is the following:
10048 *
10049 * # ith PLT code stub.
10050 * addis 11,30,(plt+(i-1)*4-got)@ha
10051 * lwz 11,(plt+(i-1)*4-got)@l(11)
10052 * mtctr 11
10053 * bctr
10054 *
10055 * # A table of branches, one for each plt entry.
176a0d42 10056 * # The idea is that the plt call stub loads ctr and r11 with these
a6aa5195
AM
10057 * # addresses, so (r11 - res_0) gives the plt index * 4.
10058 * res_0: b PLTresolve
10059 * res_1: b PLTresolve
10060 * .
10061 * # Some number of entries towards the end can be nops
10062 * res_n_m3: nop
10063 * res_n_m2: nop
10064 * res_n_m1:
10065 *
10066 * PLTresolve:
10067 * addis 11,11,(1f-res_0)@ha
10068 * mflr 0
10069 * bcl 20,31,1f
10070 * 1: addi 11,11,(1b-res_0)@l
10071 * mflr 12
10072 * mtlr 0
07d6d2b8 10073 * sub 11,11,12 # r11 = index * 4
a6aa5195 10074 * addis 12,12,(got+4-1b)@ha
07d6d2b8
AM
10075 * lwz 0,(got+4-1b)@l(12) # got[1] address of dl_runtime_resolve
10076 * lwz 12,(got+8-1b)@l(12) # got[2] contains the map address
a6aa5195
AM
10077 * mtctr 0
10078 * add 0,11,11
07d6d2b8 10079 * add 11,0,11 # r11 = index * 12 = reloc offset.
a6aa5195 10080 * bctr
9e390558 10081 *
176a0d42
AM
10082 * Non-PIC glink code is a little simpler.
10083 *
10084 * # ith PLT code stub.
10085 * lis 11,(plt+(i-1)*4)@ha
10086 * lwz 11,(plt+(i-1)*4)@l(11)
10087 * mtctr 11
10088 * bctr
10089 *
10090 * The branch table is the same, then comes
10091 *
10092 * PLTresolve:
10093 * lis 12,(got+4)@ha
10094 * addis 11,11,(-res_0)@ha
07d6d2b8
AM
10095 * lwz 0,(got+4)@l(12) # got[1] address of dl_runtime_resolve
10096 * addi 11,11,(-res_0)@l # r11 = index * 4
176a0d42
AM
10097 * mtctr 0
10098 * add 0,11,11
07d6d2b8
AM
10099 * lwz 12,(got+8)@l(12) # got[2] contains the map address
10100 * add 11,0,11 # r11 = index * 12 = reloc offset.
176a0d42
AM
10101 * bctr
10102 */
7e8aeb9a 10103
a6aa5195 10104 /* Build the branch table, one for each plt entry (less one),
86b9da88 10105 and perhaps some padding. */
a6aa5195
AM
10106 p = htab->glink->contents;
10107 p += htab->glink_pltresolve;
86b9da88
AM
10108 endp = htab->glink->contents;
10109 endp += htab->glink->size - GLINK_PLTRESOLVE;
da3a2088 10110 while (p < endp - (htab->params->ppc476_workaround ? 0 : 8 * 4))
86b9da88
AM
10111 {
10112 bfd_put_32 (output_bfd, B + endp - p, p);
10113 p += 4;
10114 }
10115 while (p < endp)
10116 {
10117 bfd_put_32 (output_bfd, NOP, p);
10118 p += 4;
10119 }
10120
7e8aeb9a 10121 res0 = (htab->glink_pltresolve
86b9da88
AM
10122 + htab->glink->output_section->vma
10123 + htab->glink->output_offset);
10124
da3a2088
AM
10125 if (htab->params->ppc476_workaround)
10126 {
10127 /* Ensure that a call stub at the end of a page doesn't
10128 result in prefetch over the end of the page into the
10129 glink branch table. */
10130 bfd_vma pagesize = (bfd_vma) 1 << htab->params->pagesize_p2;
10131 bfd_vma page_addr;
10132 bfd_vma glink_start = (htab->glink->output_section->vma
10133 + htab->glink->output_offset);
10134
10135 for (page_addr = res0 & -pagesize;
10136 page_addr > glink_start;
10137 page_addr -= pagesize)
10138 {
10139 /* We have a plt call stub that may need fixing. */
10140 bfd_byte *loc;
10141 unsigned int insn;
10142
10143 loc = htab->glink->contents + page_addr - 4 - glink_start;
10144 insn = bfd_get_32 (output_bfd, loc);
10145 if (insn == BCTR)
10146 {
10147 /* By alignment, we know that there must be at least
10148 one other call stub before this one. */
10149 insn = bfd_get_32 (output_bfd, loc - 16);
10150 if (insn == BCTR)
10151 bfd_put_32 (output_bfd, B | (-16 & 0x3fffffc), loc);
10152 else
10153 bfd_put_32 (output_bfd, B | (-20 & 0x3fffffc), loc);
10154 }
10155 }
10156 }
10157
86b9da88 10158 /* Last comes the PLTresolve stub. */
9e390558 10159 endp = p + GLINK_PLTRESOLVE;
0e1862bb 10160 if (bfd_link_pic (info))
7e8aeb9a 10161 {
a6aa5195 10162 bfd_vma bcl;
d7128ce4 10163
a6aa5195
AM
10164 bcl = (htab->glink->size - GLINK_PLTRESOLVE + 3*4
10165 + htab->glink->output_section->vma
10166 + htab->glink->output_offset);
10167
9e390558
AM
10168 bfd_put_32 (output_bfd, ADDIS_11_11 + PPC_HA (bcl - res0), p);
10169 p += 4;
10170 bfd_put_32 (output_bfd, MFLR_0, p);
10171 p += 4;
10172 bfd_put_32 (output_bfd, BCL_20_31, p);
10173 p += 4;
10174 bfd_put_32 (output_bfd, ADDI_11_11 + PPC_LO (bcl - res0), p);
10175 p += 4;
10176 bfd_put_32 (output_bfd, MFLR_12, p);
10177 p += 4;
10178 bfd_put_32 (output_bfd, MTLR_0, p);
10179 p += 4;
10180 bfd_put_32 (output_bfd, SUB_11_11_12, p);
10181 p += 4;
10182 bfd_put_32 (output_bfd, ADDIS_12_12 + PPC_HA (got + 4 - bcl), p);
10183 p += 4;
a6aa5195
AM
10184 if (PPC_HA (got + 4 - bcl) == PPC_HA (got + 8 - bcl))
10185 {
9e390558
AM
10186 bfd_put_32 (output_bfd, LWZ_0_12 + PPC_LO (got + 4 - bcl), p);
10187 p += 4;
10188 bfd_put_32 (output_bfd, LWZ_12_12 + PPC_LO (got + 8 - bcl), p);
10189 p += 4;
a6aa5195
AM
10190 }
10191 else
10192 {
9e390558
AM
10193 bfd_put_32 (output_bfd, LWZU_0_12 + PPC_LO (got + 4 - bcl), p);
10194 p += 4;
10195 bfd_put_32 (output_bfd, LWZ_12_12 + 4, p);
10196 p += 4;
a6aa5195 10197 }
9e390558
AM
10198 bfd_put_32 (output_bfd, MTCTR_0, p);
10199 p += 4;
10200 bfd_put_32 (output_bfd, ADD_0_11_11, p);
7e8aeb9a
AM
10201 }
10202 else
d7128ce4 10203 {
9e390558
AM
10204 bfd_put_32 (output_bfd, LIS_12 + PPC_HA (got + 4), p);
10205 p += 4;
10206 bfd_put_32 (output_bfd, ADDIS_11_11 + PPC_HA (-res0), p);
10207 p += 4;
a6aa5195 10208 if (PPC_HA (got + 4) == PPC_HA (got + 8))
9e390558 10209 bfd_put_32 (output_bfd, LWZ_0_12 + PPC_LO (got + 4), p);
a6aa5195 10210 else
9e390558
AM
10211 bfd_put_32 (output_bfd, LWZU_0_12 + PPC_LO (got + 4), p);
10212 p += 4;
10213 bfd_put_32 (output_bfd, ADDI_11_11 + PPC_LO (-res0), p);
10214 p += 4;
10215 bfd_put_32 (output_bfd, MTCTR_0, p);
10216 p += 4;
10217 bfd_put_32 (output_bfd, ADD_0_11_11, p);
10218 p += 4;
10219 if (PPC_HA (got + 4) == PPC_HA (got + 8))
10220 bfd_put_32 (output_bfd, LWZ_12_12 + PPC_LO (got + 8), p);
10221 else
10222 bfd_put_32 (output_bfd, LWZ_12_12 + 4, p);
10223 }
10224 p += 4;
10225 bfd_put_32 (output_bfd, ADD_11_0_11, p);
10226 p += 4;
407aa07c
AM
10227 bfd_put_32 (output_bfd, BCTR, p);
10228 p += 4;
9e390558
AM
10229 while (p < endp)
10230 {
10231 bfd_put_32 (output_bfd,
10232 htab->params->ppc476_workaround ? BA : NOP, p);
10233 p += 4;
d7128ce4 10234 }
9e390558 10235 BFD_ASSERT (p == endp);
d7128ce4
AM
10236 }
10237
6177242a
AM
10238 if (htab->glink_eh_frame != NULL
10239 && htab->glink_eh_frame->contents != NULL)
10240 {
10241 unsigned char *p = htab->glink_eh_frame->contents;
10242 bfd_vma val;
10243
6177242a
AM
10244 p += sizeof (glink_eh_frame_cie);
10245 /* FDE length. */
6177242a
AM
10246 p += 4;
10247 /* CIE pointer. */
6177242a
AM
10248 p += 4;
10249 /* Offset to .glink. */
10250 val = (htab->glink->output_section->vma
10251 + htab->glink->output_offset);
10252 val -= (htab->glink_eh_frame->output_section->vma
10253 + htab->glink_eh_frame->output_offset);
10254 val -= p - htab->glink_eh_frame->contents;
10255 bfd_put_32 (htab->elf.dynobj, val, p);
6177242a 10256
dbaa2011 10257 if (htab->glink_eh_frame->sec_info_type == SEC_INFO_TYPE_EH_FRAME
6177242a
AM
10258 && !_bfd_elf_write_section_eh_frame (output_bfd, info,
10259 htab->glink_eh_frame,
10260 htab->glink_eh_frame->contents))
10261 return FALSE;
10262 }
10263
e87d4038 10264 return ret;
25dbc73a 10265}
e1a9cb8e 10266\f
6d00b590 10267#define TARGET_LITTLE_SYM powerpc_elf32_le_vec
252b5132 10268#define TARGET_LITTLE_NAME "elf32-powerpcle"
6d00b590 10269#define TARGET_BIG_SYM powerpc_elf32_vec
252b5132
RH
10270#define TARGET_BIG_NAME "elf32-powerpc"
10271#define ELF_ARCH bfd_arch_powerpc
ae95ffa6 10272#define ELF_TARGET_ID PPC32_ELF_DATA
252b5132
RH
10273#define ELF_MACHINE_CODE EM_PPC
10274#define ELF_MAXPAGESIZE 0x10000
702d1671
AM
10275#define ELF_COMMONPAGESIZE 0x1000
10276#define ELF_RELROPAGESIZE ELF_MAXPAGESIZE
252b5132
RH
10277#define elf_info_to_howto ppc_elf_info_to_howto
10278
10279#ifdef EM_CYGNUS_POWERPC
10280#define ELF_MACHINE_ALT1 EM_CYGNUS_POWERPC
10281#endif
10282
10283#ifdef EM_PPC_OLD
10284#define ELF_MACHINE_ALT2 EM_PPC_OLD
10285#endif
10286
10287#define elf_backend_plt_not_loaded 1
5474d94f 10288#define elf_backend_want_dynrelro 1
252b5132 10289#define elf_backend_can_gc_sections 1
51b64d56 10290#define elf_backend_can_refcount 1
b491616a 10291#define elf_backend_rela_normal 1
53291d1f 10292#define elf_backend_caches_rawsize 1
252b5132 10293
43c40ab2 10294#define bfd_elf32_mkobject ppc_elf_mkobject
252b5132 10295#define bfd_elf32_bfd_merge_private_bfd_data ppc_elf_merge_private_bfd_data
70bccea4 10296#define bfd_elf32_bfd_relax_section ppc_elf_relax_section
252b5132 10297#define bfd_elf32_bfd_reloc_type_lookup ppc_elf_reloc_type_lookup
b9c361e0 10298#define bfd_elf32_bfd_reloc_name_lookup ppc_elf_reloc_name_lookup
252b5132 10299#define bfd_elf32_bfd_set_private_flags ppc_elf_set_private_flags
70bccea4 10300#define bfd_elf32_bfd_link_hash_table_create ppc_elf_link_hash_table_create
468392fb 10301#define bfd_elf32_get_synthetic_symtab ppc_elf_get_synthetic_symtab
252b5132 10302
feee612b 10303#define elf_backend_object_p ppc_elf_object_p
252b5132 10304#define elf_backend_gc_mark_hook ppc_elf_gc_mark_hook
252b5132
RH
10305#define elf_backend_section_from_shdr ppc_elf_section_from_shdr
10306#define elf_backend_relocate_section ppc_elf_relocate_section
10307#define elf_backend_create_dynamic_sections ppc_elf_create_dynamic_sections
10308#define elf_backend_check_relocs ppc_elf_check_relocs
c0e331c7 10309#define elf_backend_relocs_compatible _bfd_elf_relocs_compatible
7fce784e 10310#define elf_backend_copy_indirect_symbol ppc_elf_copy_indirect_symbol
252b5132
RH
10311#define elf_backend_adjust_dynamic_symbol ppc_elf_adjust_dynamic_symbol
10312#define elf_backend_add_symbol_hook ppc_elf_add_symbol_hook
10313#define elf_backend_size_dynamic_sections ppc_elf_size_dynamic_sections
0eb4a168 10314#define elf_backend_hash_symbol ppc_elf_hash_symbol
252b5132
RH
10315#define elf_backend_finish_dynamic_symbol ppc_elf_finish_dynamic_symbol
10316#define elf_backend_finish_dynamic_sections ppc_elf_finish_dynamic_sections
10317#define elf_backend_fake_sections ppc_elf_fake_sections
10318#define elf_backend_additional_program_headers ppc_elf_additional_program_headers
954b63d4 10319#define elf_backend_modify_segment_map ppc_elf_modify_segment_map
c5fccbec
DJ
10320#define elf_backend_grok_prstatus ppc_elf_grok_prstatus
10321#define elf_backend_grok_psinfo ppc_elf_grok_psinfo
183e98be 10322#define elf_backend_write_core_note ppc_elf_write_core_note
29c2fb7c 10323#define elf_backend_reloc_type_class ppc_elf_reloc_type_class
70bccea4
AM
10324#define elf_backend_begin_write_processing ppc_elf_begin_write_processing
10325#define elf_backend_final_write_processing ppc_elf_final_write_processing
10326#define elf_backend_write_section ppc_elf_write_section
551b43fd 10327#define elf_backend_get_sec_type_attr ppc_elf_get_sec_type_attr
4c45e5c9 10328#define elf_backend_plt_sym_val ppc_elf_plt_sym_val
8a696751 10329#define elf_backend_action_discarded ppc_elf_action_discarded
74541ad4 10330#define elf_backend_init_index_section _bfd_elf_init_1_index_section
b9c361e0 10331#define elf_backend_lookup_section_flags_hook ppc_elf_lookup_section_flags
252b5132
RH
10332
10333#include "elf32-target.h"
9d8504b1 10334
7b8e7dad
AM
10335/* FreeBSD Target */
10336
10337#undef TARGET_LITTLE_SYM
10338#undef TARGET_LITTLE_NAME
10339
10340#undef TARGET_BIG_SYM
6d00b590 10341#define TARGET_BIG_SYM powerpc_elf32_fbsd_vec
7b8e7dad
AM
10342#undef TARGET_BIG_NAME
10343#define TARGET_BIG_NAME "elf32-powerpc-freebsd"
10344
10345#undef ELF_OSABI
10346#define ELF_OSABI ELFOSABI_FREEBSD
10347
10348#undef elf32_bed
10349#define elf32_bed elf32_powerpc_fbsd_bed
10350
10351#include "elf32-target.h"
10352
9d8504b1
PB
10353/* VxWorks Target */
10354
10355#undef TARGET_LITTLE_SYM
10356#undef TARGET_LITTLE_NAME
10357
10358#undef TARGET_BIG_SYM
6d00b590 10359#define TARGET_BIG_SYM powerpc_elf32_vxworks_vec
9d8504b1
PB
10360#undef TARGET_BIG_NAME
10361#define TARGET_BIG_NAME "elf32-powerpc-vxworks"
10362
7b8e7dad
AM
10363#undef ELF_OSABI
10364
90c14f0c
L
10365#undef ELF_TARGET_OS
10366#define ELF_TARGET_OS is_vxworks
10367
d5e3d971
PB
10368/* VxWorks uses the elf default section flags for .plt. */
10369static const struct bfd_elf_special_section *
4aef7643 10370ppc_elf_vxworks_get_sec_type_attr (bfd *abfd, asection *sec)
9d8504b1 10371{
d5e3d971
PB
10372 if (sec->name == NULL)
10373 return NULL;
10374
10375 if (strcmp (sec->name, ".plt") == 0)
10376 return _bfd_elf_get_sec_type_attr (abfd, sec);
10377
10378 return ppc_elf_get_sec_type_attr (abfd, sec);
10379}
9d8504b1
PB
10380
10381/* Like ppc_elf_link_hash_table_create, but overrides
10382 appropriately for VxWorks. */
10383static struct bfd_link_hash_table *
10384ppc_elf_vxworks_link_hash_table_create (bfd *abfd)
10385{
10386 struct bfd_link_hash_table *ret;
10387
10388 ret = ppc_elf_link_hash_table_create (abfd);
10389 if (ret)
10390 {
10391 struct ppc_elf_link_hash_table *htab
954b63d4 10392 = (struct ppc_elf_link_hash_table *)ret;
4a3dc543 10393 htab->plt_type = PLT_VXWORKS;
9d8504b1
PB
10394 htab->plt_entry_size = VXWORKS_PLT_ENTRY_SIZE;
10395 htab->plt_slot_size = VXWORKS_PLT_ENTRY_SIZE;
10396 htab->plt_initial_entry_size = VXWORKS_PLT_INITIAL_ENTRY_SIZE;
10397 }
10398 return ret;
10399}
10400
10401/* Tweak magic VxWorks symbols as they are loaded. */
10402static bfd_boolean
10403ppc_elf_vxworks_add_symbol_hook (bfd *abfd,
10404 struct bfd_link_info *info,
10405 Elf_Internal_Sym *sym,
4aef7643
AM
10406 const char **namep,
10407 flagword *flagsp,
9d8504b1
PB
10408 asection **secp,
10409 bfd_vma *valp)
10410{
4aef7643
AM
10411 if (!elf_vxworks_add_symbol_hook (abfd, info, sym, namep, flagsp, secp,
10412 valp))
9d8504b1
PB
10413 return FALSE;
10414
4aef7643 10415 return ppc_elf_add_symbol_hook (abfd, info, sym, namep, flagsp, secp, valp);
9d8504b1
PB
10416}
10417
cc364be6
AM
10418static bfd_boolean
10419ppc_elf_vxworks_final_write_processing (bfd *abfd)
9d8504b1 10420{
cc364be6
AM
10421 ppc_final_write_processing (abfd);
10422 return elf_vxworks_final_write_processing (abfd);
9d8504b1
PB
10423}
10424
10425/* On VxWorks, we emit relocations against _PROCEDURE_LINKAGE_TABLE_, so
10426 define it. */
10427#undef elf_backend_want_plt_sym
10428#define elf_backend_want_plt_sym 1
10429#undef elf_backend_want_got_plt
10430#define elf_backend_want_got_plt 1
10431#undef elf_backend_got_symbol_offset
10432#define elf_backend_got_symbol_offset 0
10433#undef elf_backend_plt_not_loaded
10434#define elf_backend_plt_not_loaded 0
10435#undef elf_backend_plt_readonly
10436#define elf_backend_plt_readonly 1
10437#undef elf_backend_got_header_size
10438#define elf_backend_got_header_size 12
64f52338
AM
10439#undef elf_backend_dtrel_excludes_plt
10440#define elf_backend_dtrel_excludes_plt 1
9d8504b1 10441
468392fb
AM
10442#undef bfd_elf32_get_synthetic_symtab
10443
9d8504b1
PB
10444#undef bfd_elf32_bfd_link_hash_table_create
10445#define bfd_elf32_bfd_link_hash_table_create \
10446 ppc_elf_vxworks_link_hash_table_create
9d8504b1
PB
10447#undef elf_backend_add_symbol_hook
10448#define elf_backend_add_symbol_hook \
10449 ppc_elf_vxworks_add_symbol_hook
10450#undef elf_backend_link_output_symbol_hook
10451#define elf_backend_link_output_symbol_hook \
9c72ff84 10452 elf_vxworks_link_output_symbol_hook
9d8504b1
PB
10453#undef elf_backend_final_write_processing
10454#define elf_backend_final_write_processing \
10455 ppc_elf_vxworks_final_write_processing
d5e3d971
PB
10456#undef elf_backend_get_sec_type_attr
10457#define elf_backend_get_sec_type_attr \
10458 ppc_elf_vxworks_get_sec_type_attr
9d8504b1
PB
10459#undef elf_backend_emit_relocs
10460#define elf_backend_emit_relocs \
10461 elf_vxworks_emit_relocs
10462
10463#undef elf32_bed
10464#define elf32_bed ppc_elf_vxworks_bed
10465
10466#include "elf32-target.h"