ECOFF slurp_relocs thinko
[deliverable/binutils-gdb.git] / bfd / elf32-ppc.c
CommitLineData
252b5132 1/* PowerPC-specific support for 32-bit ELF
b3adc24a 2 Copyright (C) 1994-2020 Free Software Foundation, Inc.
252b5132
RH
3 Written by Ian Lance Taylor, Cygnus Support.
4
ae9a127f 5 This file is part of BFD, the Binary File Descriptor library.
252b5132 6
ae9a127f
NC
7 This program is free software; you can redistribute it and/or modify
8 it under the terms of the GNU General Public License as published by
cd123cb7 9 the Free Software Foundation; either version 3 of the License, or
ae9a127f 10 (at your option) any later version.
252b5132 11
ae9a127f
NC
12 This program is distributed in the hope that it will be useful,
13 but WITHOUT ANY WARRANTY; without even the implied warranty of
14 MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
15 GNU General Public License for more details.
252b5132 16
ae9a127f 17 You should have received a copy of the GNU General Public License
fc0bffd6 18 along with this program; if not, write to the
3e110533 19 Free Software Foundation, Inc., 51 Franklin Street - Fifth Floor,
53e09e0a 20 Boston, MA 02110-1301, USA. */
252b5132 21
cd123cb7 22
252b5132
RH
23/* This file is based on a preliminary PowerPC ELF ABI. The
24 information may not match the final PowerPC ELF ABI. It includes
25 suggestions from the in-progress Embedded PowerPC ABI, and that
26 information may also not match. */
27
3db64b00 28#include "sysdep.h"
183e98be 29#include <stdarg.h>
252b5132 30#include "bfd.h"
252b5132
RH
31#include "bfdlink.h"
32#include "libbfd.h"
33#include "elf-bfd.h"
34#include "elf/ppc.h"
7619e7c7 35#include "elf32-ppc.h"
9d8504b1 36#include "elf-vxworks.h"
6177242a 37#include "dwarf2.h"
08dc996f 38#include "opcode/ppc.h"
252b5132 39
bb294208
AM
40/* All users of this file have bfd_octets_per_byte (abfd, sec) == 1. */
41#define OCTETS_PER_BYTE(ABFD, SEC) 1
42
b9c361e0
JL
43typedef enum split16_format_type
44{
45 split16a_type = 0,
46 split16d_type
47}
48split16_format_type;
49
f0fe0e16 50/* RELA relocations are used here. */
252b5132 51
252b5132 52static bfd_reloc_status_type ppc_elf_addr16_ha_reloc
55fd94b0 53 (bfd *, arelent *, asymbol *, void *, asection *, bfd *, char **);
7619e7c7 54static bfd_reloc_status_type ppc_elf_unhandled_reloc
55fd94b0 55 (bfd *, arelent *, asymbol *, void *, asection *, bfd *, char **);
252b5132 56
70bccea4
AM
57/* Branch prediction bit for branch taken relocs. */
58#define BRANCH_PREDICT_BIT 0x200000
59/* Mask to set RA in memory instructions. */
60#define RA_REGISTER_MASK 0x001f0000
61/* Value to shift register by to insert RA. */
62#define RA_REGISTER_SHIFT 16
252b5132
RH
63
64/* The name of the dynamic interpreter. This is put in the .interp
65 section. */
252b5132
RH
66#define ELF_DYNAMIC_INTERPRETER "/usr/lib/ld.so.1"
67
d7128ce4 68/* For old-style PLT. */
252b5132
RH
69/* The number of single-slot PLT entries (the rest use two slots). */
70#define PLT_NUM_SINGLE_ENTRIES 8192
71
d7128ce4 72/* For new-style .glink and .plt. */
a6aa5195 73#define GLINK_PLTRESOLVE 16*4
9e390558 74#define GLINK_ENTRY_SIZE(htab, h) \
407aa07c 75 ((4*4 \
9e390558
AM
76 + (h != NULL \
77 && h == htab->tls_get_addr \
78 && !htab->params->no_tls_get_addr_opt ? 8*4 : 0) \
79 + (1u << htab->params->plt_stub_align) - 1) \
80 & -(1u << htab->params->plt_stub_align))
d7128ce4 81
9d8504b1
PB
82/* VxWorks uses its own plt layout, filled in by the static linker. */
83
84/* The standard VxWorks PLT entry. */
85#define VXWORKS_PLT_ENTRY_SIZE 32
86static const bfd_vma ppc_elf_vxworks_plt_entry
87 [VXWORKS_PLT_ENTRY_SIZE / 4] =
88 {
07d6d2b8
AM
89 0x3d800000, /* lis r12,0 */
90 0x818c0000, /* lwz r12,0(r12) */
91 0x7d8903a6, /* mtctr r12 */
92 0x4e800420, /* bctr */
93 0x39600000, /* li r11,0 */
94 0x48000000, /* b 14 <.PLT0resolve+0x4> */
95 0x60000000, /* nop */
96 0x60000000, /* nop */
9d8504b1
PB
97 };
98static const bfd_vma ppc_elf_vxworks_pic_plt_entry
99 [VXWORKS_PLT_ENTRY_SIZE / 4] =
100 {
101 0x3d9e0000, /* addis r12,r30,0 */
102 0x818c0000, /* lwz r12,0(r12) */
103 0x7d8903a6, /* mtctr r12 */
104 0x4e800420, /* bctr */
105 0x39600000, /* li r11,0 */
106 0x48000000, /* b 14 <.PLT0resolve+0x4> 14: R_PPC_REL24 .PLTresolve */
107 0x60000000, /* nop */
108 0x60000000, /* nop */
109 };
110
111/* The initial VxWorks PLT entry. */
112#define VXWORKS_PLT_INITIAL_ENTRY_SIZE 32
113static const bfd_vma ppc_elf_vxworks_plt0_entry
114 [VXWORKS_PLT_INITIAL_ENTRY_SIZE / 4] =
115 {
07d6d2b8
AM
116 0x3d800000, /* lis r12,0 */
117 0x398c0000, /* addi r12,r12,0 */
118 0x800c0008, /* lwz r0,8(r12) */
119 0x7c0903a6, /* mtctr r0 */
120 0x818c0004, /* lwz r12,4(r12) */
121 0x4e800420, /* bctr */
122 0x60000000, /* nop */
123 0x60000000, /* nop */
9d8504b1
PB
124 };
125static const bfd_vma ppc_elf_vxworks_pic_plt0_entry
126 [VXWORKS_PLT_INITIAL_ENTRY_SIZE / 4] =
127 {
128 0x819e0008, /* lwz r12,8(r30) */
07d6d2b8 129 0x7d8903a6, /* mtctr r12 */
9d8504b1 130 0x819e0004, /* lwz r12,4(r30) */
07d6d2b8
AM
131 0x4e800420, /* bctr */
132 0x60000000, /* nop */
133 0x60000000, /* nop */
134 0x60000000, /* nop */
135 0x60000000, /* nop */
9d8504b1
PB
136 };
137
138/* For executables, we have some additional relocations in
139 .rela.plt.unloaded, for the kernel loader. */
140
141/* The number of non-JMP_SLOT relocations per PLT0 slot. */
142#define VXWORKS_PLT_NON_JMP_SLOT_RELOCS 3
143/* The number of relocations in the PLTResolve slot. */
144#define VXWORKS_PLTRESOLVE_RELOCS 2
de194d85 145/* The number of relocations in the PLTResolve slot when creating
9d8504b1
PB
146 a shared library. */
147#define VXWORKS_PLTRESOLVE_RELOCS_SHLIB 0
148
d7128ce4 149/* Some instructions. */
d7128ce4 150#define ADDIS_11_11 0x3d6b0000
a6aa5195
AM
151#define ADDIS_11_30 0x3d7e0000
152#define ADDIS_12_12 0x3d8c0000
d7128ce4 153#define ADDI_11_11 0x396b0000
d7128ce4 154#define ADD_0_11_11 0x7c0b5a14
a7f2871e 155#define ADD_3_12_2 0x7c6c1214
d7128ce4 156#define ADD_11_0_11 0x7d605a14
a6aa5195 157#define B 0x48000000
da3a2088 158#define BA 0x48000002
a6aa5195 159#define BCL_20_31 0x429f0005
d7128ce4 160#define BCTR 0x4e800420
a7f2871e
AM
161#define BEQLR 0x4d820020
162#define CMPWI_11_0 0x2c0b0000
7e8aeb9a
AM
163#define LIS_11 0x3d600000
164#define LIS_12 0x3d800000
a6aa5195
AM
165#define LWZU_0_12 0x840c0000
166#define LWZ_0_12 0x800c0000
a7f2871e 167#define LWZ_11_3 0x81630000
a6aa5195
AM
168#define LWZ_11_11 0x816b0000
169#define LWZ_11_30 0x817e0000
a7f2871e 170#define LWZ_12_3 0x81830000
a6aa5195 171#define LWZ_12_12 0x818c0000
a7f2871e
AM
172#define MR_0_3 0x7c601b78
173#define MR_3_0 0x7c030378
a6aa5195
AM
174#define MFLR_0 0x7c0802a6
175#define MFLR_12 0x7d8802a6
176#define MTCTR_0 0x7c0903a6
177#define MTCTR_11 0x7d6903a6
178#define MTLR_0 0x7c0803a6
179#define NOP 0x60000000
180#define SUB_11_11_12 0x7d6c5850
7619e7c7
AM
181
182/* Offset of tp and dtp pointers from start of TLS block. */
183#define TP_OFFSET 0x7000
184#define DTP_OFFSET 0x8000
e87d4038
AM
185
186/* The value of a defined global symbol. */
187#define SYM_VAL(SYM) \
188 ((SYM)->root.u.def.section->output_section->vma \
189 + (SYM)->root.u.def.section->output_offset \
190 + (SYM)->root.u.def.value)
7fce784e 191\f
46807bf4
AM
192/* Relocation HOWTO's. */
193/* Like other ELF RELA targets that don't apply multiple
194 field-altering relocations to the same localation, src_mask is
195 always zero and pcrel_offset is the same as pc_relative.
196 PowerPC can always use a zero bitpos, even when the field is not at
197 the LSB. For example, a REL24 could use rightshift=2, bisize=24
198 and bitpos=2 which matches the ABI description, or as we do here,
199 rightshift=0, bitsize=26 and bitpos=0. */
200#define HOW(type, size, bitsize, mask, rightshift, pc_relative, \
201 complain, special_func) \
202 HOWTO (type, rightshift, size, bitsize, pc_relative, 0, \
203 complain_overflow_ ## complain, special_func, \
204 #type, FALSE, 0, mask, pc_relative)
205
e47cd125 206static reloc_howto_type *ppc_elf_howto_table[R_PPC_max];
252b5132 207
8da6118f 208static reloc_howto_type ppc_elf_howto_raw[] = {
252b5132 209 /* This reloc does nothing. */
46807bf4
AM
210 HOW (R_PPC_NONE, 3, 0, 0, 0, FALSE, dont,
211 bfd_elf_generic_reloc),
252b5132
RH
212
213 /* A standard 32 bit relocation. */
46807bf4
AM
214 HOW (R_PPC_ADDR32, 2, 32, 0xffffffff, 0, FALSE, dont,
215 bfd_elf_generic_reloc),
252b5132
RH
216
217 /* An absolute 26 bit branch; the lower two bits must be zero.
218 FIXME: we don't check that, we just clear them. */
46807bf4
AM
219 HOW (R_PPC_ADDR24, 2, 26, 0x3fffffc, 0, FALSE, signed,
220 bfd_elf_generic_reloc),
252b5132
RH
221
222 /* A standard 16 bit relocation. */
46807bf4
AM
223 HOW (R_PPC_ADDR16, 1, 16, 0xffff, 0, FALSE, bitfield,
224 bfd_elf_generic_reloc),
252b5132
RH
225
226 /* A 16 bit relocation without overflow. */
46807bf4
AM
227 HOW (R_PPC_ADDR16_LO, 1, 16, 0xffff, 0, FALSE, dont,
228 bfd_elf_generic_reloc),
252b5132
RH
229
230 /* The high order 16 bits of an address. */
46807bf4
AM
231 HOW (R_PPC_ADDR16_HI, 1, 16, 0xffff, 16, FALSE, dont,
232 bfd_elf_generic_reloc),
252b5132
RH
233
234 /* The high order 16 bits of an address, plus 1 if the contents of
8da6118f 235 the low 16 bits, treated as a signed number, is negative. */
46807bf4
AM
236 HOW (R_PPC_ADDR16_HA, 1, 16, 0xffff, 16, FALSE, dont,
237 ppc_elf_addr16_ha_reloc),
252b5132
RH
238
239 /* An absolute 16 bit branch; the lower two bits must be zero.
240 FIXME: we don't check that, we just clear them. */
46807bf4
AM
241 HOW (R_PPC_ADDR14, 2, 16, 0xfffc, 0, FALSE, signed,
242 bfd_elf_generic_reloc),
252b5132
RH
243
244 /* An absolute 16 bit branch, for which bit 10 should be set to
245 indicate that the branch is expected to be taken. The lower two
8da6118f 246 bits must be zero. */
46807bf4
AM
247 HOW (R_PPC_ADDR14_BRTAKEN, 2, 16, 0xfffc, 0, FALSE, signed,
248 bfd_elf_generic_reloc),
252b5132
RH
249
250 /* An absolute 16 bit branch, for which bit 10 should be set to
251 indicate that the branch is not expected to be taken. The lower
252 two bits must be zero. */
46807bf4
AM
253 HOW (R_PPC_ADDR14_BRNTAKEN, 2, 16, 0xfffc, 0, FALSE, signed,
254 bfd_elf_generic_reloc),
252b5132 255
8da6118f 256 /* A relative 26 bit branch; the lower two bits must be zero. */
46807bf4
AM
257 HOW (R_PPC_REL24, 2, 26, 0x3fffffc, 0, TRUE, signed,
258 bfd_elf_generic_reloc),
252b5132 259
8da6118f 260 /* A relative 16 bit branch; the lower two bits must be zero. */
46807bf4
AM
261 HOW (R_PPC_REL14, 2, 16, 0xfffc, 0, TRUE, signed,
262 bfd_elf_generic_reloc),
252b5132 263
8da6118f 264 /* A relative 16 bit branch. Bit 10 should be set to indicate that
252b5132
RH
265 the branch is expected to be taken. The lower two bits must be
266 zero. */
46807bf4
AM
267 HOW (R_PPC_REL14_BRTAKEN, 2, 16, 0xfffc, 0, TRUE, signed,
268 bfd_elf_generic_reloc),
252b5132 269
8da6118f 270 /* A relative 16 bit branch. Bit 10 should be set to indicate that
252b5132
RH
271 the branch is not expected to be taken. The lower two bits must
272 be zero. */
46807bf4
AM
273 HOW (R_PPC_REL14_BRNTAKEN, 2, 16, 0xfffc, 0, TRUE, signed,
274 bfd_elf_generic_reloc),
252b5132
RH
275
276 /* Like R_PPC_ADDR16, but referring to the GOT table entry for the
277 symbol. */
46807bf4
AM
278 HOW (R_PPC_GOT16, 1, 16, 0xffff, 0, FALSE, signed,
279 ppc_elf_unhandled_reloc),
252b5132
RH
280
281 /* Like R_PPC_ADDR16_LO, but referring to the GOT table entry for
282 the symbol. */
46807bf4
AM
283 HOW (R_PPC_GOT16_LO, 1, 16, 0xffff, 0, FALSE, dont,
284 ppc_elf_unhandled_reloc),
252b5132
RH
285
286 /* Like R_PPC_ADDR16_HI, but referring to the GOT table entry for
287 the symbol. */
46807bf4
AM
288 HOW (R_PPC_GOT16_HI, 1, 16, 0xffff, 16, FALSE, dont,
289 ppc_elf_unhandled_reloc),
252b5132
RH
290
291 /* Like R_PPC_ADDR16_HA, but referring to the GOT table entry for
292 the symbol. */
46807bf4
AM
293 HOW (R_PPC_GOT16_HA, 1, 16, 0xffff, 16, FALSE, dont,
294 ppc_elf_unhandled_reloc),
252b5132
RH
295
296 /* Like R_PPC_REL24, but referring to the procedure linkage table
297 entry for the symbol. */
46807bf4
AM
298 HOW (R_PPC_PLTREL24, 2, 26, 0x3fffffc, 0, TRUE, signed,
299 ppc_elf_unhandled_reloc),
252b5132
RH
300
301 /* This is used only by the dynamic linker. The symbol should exist
302 both in the object being run and in some shared library. The
303 dynamic linker copies the data addressed by the symbol from the
304 shared library into the object, because the object being
305 run has to have the data at some particular address. */
46807bf4
AM
306 HOW (R_PPC_COPY, 2, 32, 0, 0, FALSE, dont,
307 ppc_elf_unhandled_reloc),
252b5132
RH
308
309 /* Like R_PPC_ADDR32, but used when setting global offset table
310 entries. */
46807bf4
AM
311 HOW (R_PPC_GLOB_DAT, 2, 32, 0xffffffff, 0, FALSE, dont,
312 ppc_elf_unhandled_reloc),
252b5132
RH
313
314 /* Marks a procedure linkage table entry for a symbol. */
46807bf4
AM
315 HOW (R_PPC_JMP_SLOT, 2, 32, 0, 0, FALSE, dont,
316 ppc_elf_unhandled_reloc),
252b5132
RH
317
318 /* Used only by the dynamic linker. When the object is run, this
319 longword is set to the load address of the object, plus the
320 addend. */
46807bf4
AM
321 HOW (R_PPC_RELATIVE, 2, 32, 0xffffffff, 0, FALSE, dont,
322 bfd_elf_generic_reloc),
252b5132
RH
323
324 /* Like R_PPC_REL24, but uses the value of the symbol within the
325 object rather than the final value. Normally used for
326 _GLOBAL_OFFSET_TABLE_. */
46807bf4
AM
327 HOW (R_PPC_LOCAL24PC, 2, 26, 0x3fffffc, 0, TRUE, signed,
328 bfd_elf_generic_reloc),
252b5132
RH
329
330 /* Like R_PPC_ADDR32, but may be unaligned. */
46807bf4
AM
331 HOW (R_PPC_UADDR32, 2, 32, 0xffffffff, 0, FALSE, dont,
332 bfd_elf_generic_reloc),
252b5132
RH
333
334 /* Like R_PPC_ADDR16, but may be unaligned. */
46807bf4
AM
335 HOW (R_PPC_UADDR16, 1, 16, 0xffff, 0, FALSE, bitfield,
336 bfd_elf_generic_reloc),
252b5132
RH
337
338 /* 32-bit PC relative */
46807bf4
AM
339 HOW (R_PPC_REL32, 2, 32, 0xffffffff, 0, TRUE, dont,
340 bfd_elf_generic_reloc),
252b5132
RH
341
342 /* 32-bit relocation to the symbol's procedure linkage table.
c3668558 343 FIXME: not supported. */
46807bf4
AM
344 HOW (R_PPC_PLT32, 2, 32, 0, 0, FALSE, dont,
345 ppc_elf_unhandled_reloc),
252b5132
RH
346
347 /* 32-bit PC relative relocation to the symbol's procedure linkage table.
c3668558 348 FIXME: not supported. */
46807bf4
AM
349 HOW (R_PPC_PLTREL32, 2, 32, 0, 0, TRUE, dont,
350 ppc_elf_unhandled_reloc),
252b5132
RH
351
352 /* Like R_PPC_ADDR16_LO, but referring to the PLT table entry for
353 the symbol. */
46807bf4
AM
354 HOW (R_PPC_PLT16_LO, 1, 16, 0xffff, 0, FALSE, dont,
355 ppc_elf_unhandled_reloc),
252b5132
RH
356
357 /* Like R_PPC_ADDR16_HI, but referring to the PLT table entry for
358 the symbol. */
46807bf4
AM
359 HOW (R_PPC_PLT16_HI, 1, 16, 0xffff, 16, FALSE, dont,
360 ppc_elf_unhandled_reloc),
252b5132
RH
361
362 /* Like R_PPC_ADDR16_HA, but referring to the PLT table entry for
363 the symbol. */
46807bf4
AM
364 HOW (R_PPC_PLT16_HA, 1, 16, 0xffff, 16, FALSE, dont,
365 ppc_elf_unhandled_reloc),
252b5132
RH
366
367 /* A sign-extended 16 bit value relative to _SDA_BASE_, for use with
368 small data items. */
46807bf4
AM
369 HOW (R_PPC_SDAREL16, 1, 16, 0xffff, 0, FALSE, signed,
370 ppc_elf_unhandled_reloc),
252b5132 371
c061c2d8 372 /* 16-bit section relative relocation. */
46807bf4
AM
373 HOW (R_PPC_SECTOFF, 1, 16, 0xffff, 0, FALSE, signed,
374 ppc_elf_unhandled_reloc),
252b5132 375
c3668558 376 /* 16-bit lower half section relative relocation. */
46807bf4
AM
377 HOW (R_PPC_SECTOFF_LO, 1, 16, 0xffff, 0, FALSE, dont,
378 ppc_elf_unhandled_reloc),
252b5132 379
c3668558 380 /* 16-bit upper half section relative relocation. */
46807bf4
AM
381 HOW (R_PPC_SECTOFF_HI, 1, 16, 0xffff, 16, FALSE, dont,
382 ppc_elf_unhandled_reloc),
252b5132 383
c3668558 384 /* 16-bit upper half adjusted section relative relocation. */
46807bf4
AM
385 HOW (R_PPC_SECTOFF_HA, 1, 16, 0xffff, 16, FALSE, dont,
386 ppc_elf_unhandled_reloc),
252b5132 387
727fc41e 388 /* Marker relocs for TLS. */
46807bf4
AM
389 HOW (R_PPC_TLS, 2, 32, 0, 0, FALSE, dont,
390 bfd_elf_generic_reloc),
391
392 HOW (R_PPC_TLSGD, 2, 32, 0, 0, FALSE, dont,
393 bfd_elf_generic_reloc),
394
395 HOW (R_PPC_TLSLD, 2, 32, 0, 0, FALSE, dont,
396 bfd_elf_generic_reloc),
727fc41e 397
23cedd1d 398 /* Marker relocs on inline plt call instructions. */
46807bf4
AM
399 HOW (R_PPC_PLTSEQ, 2, 32, 0, 0, FALSE, dont,
400 bfd_elf_generic_reloc),
401
402 HOW (R_PPC_PLTCALL, 2, 32, 0, 0, FALSE, dont,
403 bfd_elf_generic_reloc),
23cedd1d 404
7619e7c7
AM
405 /* Computes the load module index of the load module that contains the
406 definition of its TLS sym. */
46807bf4
AM
407 HOW (R_PPC_DTPMOD32, 2, 32, 0xffffffff, 0, FALSE, dont,
408 ppc_elf_unhandled_reloc),
252b5132 409
7619e7c7
AM
410 /* Computes a dtv-relative displacement, the difference between the value
411 of sym+add and the base address of the thread-local storage block that
412 contains the definition of sym, minus 0x8000. */
46807bf4
AM
413 HOW (R_PPC_DTPREL32, 2, 32, 0xffffffff, 0, FALSE, dont,
414 ppc_elf_unhandled_reloc),
7619e7c7
AM
415
416 /* A 16 bit dtprel reloc. */
46807bf4
AM
417 HOW (R_PPC_DTPREL16, 1, 16, 0xffff, 0, FALSE, signed,
418 ppc_elf_unhandled_reloc),
252b5132 419
7619e7c7 420 /* Like DTPREL16, but no overflow. */
46807bf4
AM
421 HOW (R_PPC_DTPREL16_LO, 1, 16, 0xffff, 0, FALSE, dont,
422 ppc_elf_unhandled_reloc),
252b5132 423
7619e7c7 424 /* Like DTPREL16_LO, but next higher group of 16 bits. */
46807bf4
AM
425 HOW (R_PPC_DTPREL16_HI, 1, 16, 0xffff, 16, FALSE, dont,
426 ppc_elf_unhandled_reloc),
252b5132 427
7619e7c7 428 /* Like DTPREL16_HI, but adjust for low 16 bits. */
46807bf4
AM
429 HOW (R_PPC_DTPREL16_HA, 1, 16, 0xffff, 16, FALSE, dont,
430 ppc_elf_unhandled_reloc),
252b5132 431
7619e7c7
AM
432 /* Computes a tp-relative displacement, the difference between the value of
433 sym+add and the value of the thread pointer (r13). */
46807bf4
AM
434 HOW (R_PPC_TPREL32, 2, 32, 0xffffffff, 0, FALSE, dont,
435 ppc_elf_unhandled_reloc),
7619e7c7
AM
436
437 /* A 16 bit tprel reloc. */
46807bf4
AM
438 HOW (R_PPC_TPREL16, 1, 16, 0xffff, 0, FALSE, signed,
439 ppc_elf_unhandled_reloc),
252b5132 440
7619e7c7 441 /* Like TPREL16, but no overflow. */
46807bf4
AM
442 HOW (R_PPC_TPREL16_LO, 1, 16, 0xffff, 0, FALSE, dont,
443 ppc_elf_unhandled_reloc),
252b5132 444
7619e7c7 445 /* Like TPREL16_LO, but next higher group of 16 bits. */
46807bf4
AM
446 HOW (R_PPC_TPREL16_HI, 1, 16, 0xffff, 16, FALSE, dont,
447 ppc_elf_unhandled_reloc),
7619e7c7
AM
448
449 /* Like TPREL16_HI, but adjust for low 16 bits. */
46807bf4
AM
450 HOW (R_PPC_TPREL16_HA, 1, 16, 0xffff, 16, FALSE, dont,
451 ppc_elf_unhandled_reloc),
7619e7c7
AM
452
453 /* Allocates two contiguous entries in the GOT to hold a tls_index structure,
454 with values (sym+add)@dtpmod and (sym+add)@dtprel, and computes the offset
455 to the first entry. */
46807bf4
AM
456 HOW (R_PPC_GOT_TLSGD16, 1, 16, 0xffff, 0, FALSE, signed,
457 ppc_elf_unhandled_reloc),
252b5132 458
7619e7c7 459 /* Like GOT_TLSGD16, but no overflow. */
46807bf4
AM
460 HOW (R_PPC_GOT_TLSGD16_LO, 1, 16, 0xffff, 0, FALSE, dont,
461 ppc_elf_unhandled_reloc),
252b5132 462
7619e7c7 463 /* Like GOT_TLSGD16_LO, but next higher group of 16 bits. */
46807bf4
AM
464 HOW (R_PPC_GOT_TLSGD16_HI, 1, 16, 0xffff, 16, FALSE, dont,
465 ppc_elf_unhandled_reloc),
252b5132 466
7619e7c7 467 /* Like GOT_TLSGD16_HI, but adjust for low 16 bits. */
46807bf4
AM
468 HOW (R_PPC_GOT_TLSGD16_HA, 1, 16, 0xffff, 16, FALSE, dont,
469 ppc_elf_unhandled_reloc),
7619e7c7
AM
470
471 /* Allocates two contiguous entries in the GOT to hold a tls_index structure,
472 with values (sym+add)@dtpmod and zero, and computes the offset to the
473 first entry. */
46807bf4
AM
474 HOW (R_PPC_GOT_TLSLD16, 1, 16, 0xffff, 0, FALSE, signed,
475 ppc_elf_unhandled_reloc),
252b5132 476
7619e7c7 477 /* Like GOT_TLSLD16, but no overflow. */
46807bf4
AM
478 HOW (R_PPC_GOT_TLSLD16_LO, 1, 16, 0xffff, 0, FALSE, dont,
479 ppc_elf_unhandled_reloc),
252b5132 480
7619e7c7 481 /* Like GOT_TLSLD16_LO, but next higher group of 16 bits. */
46807bf4
AM
482 HOW (R_PPC_GOT_TLSLD16_HI, 1, 16, 0xffff, 16, FALSE, dont,
483 ppc_elf_unhandled_reloc),
252b5132 484
7619e7c7 485 /* Like GOT_TLSLD16_HI, but adjust for low 16 bits. */
46807bf4
AM
486 HOW (R_PPC_GOT_TLSLD16_HA, 1, 16, 0xffff, 16, FALSE, dont,
487 ppc_elf_unhandled_reloc),
7619e7c7
AM
488
489 /* Allocates an entry in the GOT with value (sym+add)@dtprel, and computes
490 the offset to the entry. */
46807bf4
AM
491 HOW (R_PPC_GOT_DTPREL16, 1, 16, 0xffff, 0, FALSE, signed,
492 ppc_elf_unhandled_reloc),
252b5132 493
7619e7c7 494 /* Like GOT_DTPREL16, but no overflow. */
46807bf4
AM
495 HOW (R_PPC_GOT_DTPREL16_LO, 1, 16, 0xffff, 0, FALSE, dont,
496 ppc_elf_unhandled_reloc),
252b5132 497
7619e7c7 498 /* Like GOT_DTPREL16_LO, but next higher group of 16 bits. */
46807bf4
AM
499 HOW (R_PPC_GOT_DTPREL16_HI, 1, 16, 0xffff, 16, FALSE, dont,
500 ppc_elf_unhandled_reloc),
252b5132 501
7619e7c7 502 /* Like GOT_DTPREL16_HI, but adjust for low 16 bits. */
46807bf4
AM
503 HOW (R_PPC_GOT_DTPREL16_HA, 1, 16, 0xffff, 16, FALSE, dont,
504 ppc_elf_unhandled_reloc),
c3668558 505
7619e7c7
AM
506 /* Allocates an entry in the GOT with value (sym+add)@tprel, and computes the
507 offset to the entry. */
46807bf4
AM
508 HOW (R_PPC_GOT_TPREL16, 1, 16, 0xffff, 0, FALSE, signed,
509 ppc_elf_unhandled_reloc),
7619e7c7
AM
510
511 /* Like GOT_TPREL16, but no overflow. */
46807bf4
AM
512 HOW (R_PPC_GOT_TPREL16_LO, 1, 16, 0xffff, 0, FALSE, dont,
513 ppc_elf_unhandled_reloc),
7619e7c7
AM
514
515 /* Like GOT_TPREL16_LO, but next higher group of 16 bits. */
46807bf4
AM
516 HOW (R_PPC_GOT_TPREL16_HI, 1, 16, 0xffff, 16, FALSE, dont,
517 ppc_elf_unhandled_reloc),
7619e7c7
AM
518
519 /* Like GOT_TPREL16_HI, but adjust for low 16 bits. */
46807bf4
AM
520 HOW (R_PPC_GOT_TPREL16_HA, 1, 16, 0xffff, 16, FALSE, dont,
521 ppc_elf_unhandled_reloc),
7619e7c7
AM
522
523 /* The remaining relocs are from the Embedded ELF ABI, and are not
524 in the SVR4 ELF ABI. */
525
526 /* 32 bit value resulting from the addend minus the symbol. */
46807bf4
AM
527 HOW (R_PPC_EMB_NADDR32, 2, 32, 0xffffffff, 0, FALSE, dont,
528 ppc_elf_unhandled_reloc),
7619e7c7
AM
529
530 /* 16 bit value resulting from the addend minus the symbol. */
46807bf4
AM
531 HOW (R_PPC_EMB_NADDR16, 1, 16, 0xffff, 0, FALSE, signed,
532 ppc_elf_unhandled_reloc),
7619e7c7
AM
533
534 /* 16 bit value resulting from the addend minus the symbol. */
46807bf4
AM
535 HOW (R_PPC_EMB_NADDR16_LO, 1, 16, 0xffff, 0, FALSE, dont,
536 ppc_elf_unhandled_reloc),
7619e7c7
AM
537
538 /* The high order 16 bits of the addend minus the symbol. */
46807bf4
AM
539 HOW (R_PPC_EMB_NADDR16_HI, 1, 16, 0xffff, 16, FALSE, dont,
540 ppc_elf_unhandled_reloc),
7619e7c7
AM
541
542 /* The high order 16 bits of the result of the addend minus the address,
543 plus 1 if the contents of the low 16 bits, treated as a signed number,
544 is negative. */
46807bf4
AM
545 HOW (R_PPC_EMB_NADDR16_HA, 1, 16, 0xffff, 16, FALSE, dont,
546 ppc_elf_unhandled_reloc),
25dbc73a
AM
547
548 /* 16 bit value resulting from allocating a 4 byte word to hold an
549 address in the .sdata section, and returning the offset from
550 _SDA_BASE_ for that relocation. */
46807bf4
AM
551 HOW (R_PPC_EMB_SDAI16, 1, 16, 0xffff, 0, FALSE, signed,
552 ppc_elf_unhandled_reloc),
25dbc73a
AM
553
554 /* 16 bit value resulting from allocating a 4 byte word to hold an
555 address in the .sdata2 section, and returning the offset from
556 _SDA2_BASE_ for that relocation. */
46807bf4
AM
557 HOW (R_PPC_EMB_SDA2I16, 1, 16, 0xffff, 0, FALSE, signed,
558 ppc_elf_unhandled_reloc),
25dbc73a
AM
559
560 /* A sign-extended 16 bit value relative to _SDA2_BASE_, for use with
561 small data items. */
46807bf4
AM
562 HOW (R_PPC_EMB_SDA2REL, 1, 16, 0xffff, 0, FALSE, signed,
563 ppc_elf_unhandled_reloc),
25dbc73a
AM
564
565 /* Relocate against either _SDA_BASE_ or _SDA2_BASE_, filling in the 16 bit
566 signed offset from the appropriate base, and filling in the register
567 field with the appropriate register (0, 2, or 13). */
46807bf4
AM
568 HOW (R_PPC_EMB_SDA21, 2, 16, 0xffff, 0, FALSE, signed,
569 ppc_elf_unhandled_reloc),
25dbc73a
AM
570
571 /* Relocation not handled: R_PPC_EMB_MRKREF */
572 /* Relocation not handled: R_PPC_EMB_RELSEC16 */
573 /* Relocation not handled: R_PPC_EMB_RELST_LO */
574 /* Relocation not handled: R_PPC_EMB_RELST_HI */
575 /* Relocation not handled: R_PPC_EMB_RELST_HA */
576 /* Relocation not handled: R_PPC_EMB_BIT_FLD */
577
578 /* PC relative relocation against either _SDA_BASE_ or _SDA2_BASE_, filling
579 in the 16 bit signed offset from the appropriate base, and filling in the
580 register field with the appropriate register (0, 2, or 13). */
46807bf4
AM
581 HOW (R_PPC_EMB_RELSDA, 1, 16, 0xffff, 0, FALSE, signed,
582 ppc_elf_unhandled_reloc),
25dbc73a 583
b9c361e0 584 /* A relative 8 bit branch. */
46807bf4
AM
585 HOW (R_PPC_VLE_REL8, 1, 8, 0xff, 1, TRUE, signed,
586 bfd_elf_generic_reloc),
68ffbac6 587
b9c361e0 588 /* A relative 15 bit branch. */
46807bf4
AM
589 HOW (R_PPC_VLE_REL15, 2, 16, 0xfffe, 0, TRUE, signed,
590 bfd_elf_generic_reloc),
b9c361e0 591
68ffbac6 592 /* A relative 24 bit branch. */
46807bf4
AM
593 HOW (R_PPC_VLE_REL24, 2, 25, 0x1fffffe, 0, TRUE, signed,
594 bfd_elf_generic_reloc),
b9c361e0
JL
595
596 /* The 16 LSBS in split16a format. */
46807bf4
AM
597 HOW (R_PPC_VLE_LO16A, 2, 16, 0x1f07ff, 0, FALSE, dont,
598 ppc_elf_unhandled_reloc),
b9c361e0
JL
599
600 /* The 16 LSBS in split16d format. */
46807bf4
AM
601 HOW (R_PPC_VLE_LO16D, 2, 16, 0x3e007ff, 0, FALSE, dont,
602 ppc_elf_unhandled_reloc),
b9c361e0
JL
603
604 /* Bits 16-31 split16a format. */
46807bf4
AM
605 HOW (R_PPC_VLE_HI16A, 2, 16, 0x1f07ff, 16, FALSE, dont,
606 ppc_elf_unhandled_reloc),
b9c361e0
JL
607
608 /* Bits 16-31 split16d format. */
46807bf4
AM
609 HOW (R_PPC_VLE_HI16D, 2, 16, 0x3e007ff, 16, FALSE, dont,
610 ppc_elf_unhandled_reloc),
b9c361e0
JL
611
612 /* Bits 16-31 (High Adjusted) in split16a format. */
46807bf4
AM
613 HOW (R_PPC_VLE_HA16A, 2, 16, 0x1f07ff, 16, FALSE, dont,
614 ppc_elf_unhandled_reloc),
b9c361e0
JL
615
616 /* Bits 16-31 (High Adjusted) in split16d format. */
46807bf4
AM
617 HOW (R_PPC_VLE_HA16D, 2, 16, 0x3e007ff, 16, FALSE, dont,
618 ppc_elf_unhandled_reloc),
b9c361e0 619
86c95733
AM
620 /* This reloc is like R_PPC_EMB_SDA21 but only applies to e_add16i
621 instructions. If the register base is 0 then the linker changes
622 the e_add16i to an e_li instruction. */
46807bf4
AM
623 HOW (R_PPC_VLE_SDA21, 2, 16, 0xffff, 0, FALSE, signed,
624 ppc_elf_unhandled_reloc),
b9c361e0 625
86c95733 626 /* Like R_PPC_VLE_SDA21 but ignore overflow. */
46807bf4
AM
627 HOW (R_PPC_VLE_SDA21_LO, 2, 16, 0xffff, 0, FALSE, dont,
628 ppc_elf_unhandled_reloc),
b9c361e0
JL
629
630 /* The 16 LSBS relative to _SDA_BASE_ in split16a format. */
46807bf4
AM
631 HOW (R_PPC_VLE_SDAREL_LO16A, 2, 16, 0x1f07ff, 0, FALSE, dont,
632 ppc_elf_unhandled_reloc),
b9c361e0
JL
633
634 /* The 16 LSBS relative to _SDA_BASE_ in split16d format. */
46807bf4
AM
635 HOW (R_PPC_VLE_SDAREL_LO16D, 2, 16, 0x3e007ff, 0, FALSE, dont,
636 ppc_elf_unhandled_reloc),
b9c361e0
JL
637
638 /* Bits 16-31 relative to _SDA_BASE_ in split16a format. */
46807bf4
AM
639 HOW (R_PPC_VLE_SDAREL_HI16A, 2, 16, 0x1f07ff, 16, FALSE, dont,
640 ppc_elf_unhandled_reloc),
b9c361e0
JL
641
642 /* Bits 16-31 relative to _SDA_BASE_ in split16d format. */
46807bf4
AM
643 HOW (R_PPC_VLE_SDAREL_HI16D, 2, 16, 0x3e007ff, 16, FALSE, dont,
644 ppc_elf_unhandled_reloc),
b9c361e0
JL
645
646 /* Bits 16-31 (HA) relative to _SDA_BASE split16a format. */
46807bf4
AM
647 HOW (R_PPC_VLE_SDAREL_HA16A, 2, 16, 0x1f07ff, 16, FALSE, dont,
648 ppc_elf_unhandled_reloc),
b9c361e0
JL
649
650 /* Bits 16-31 (HA) relative to _SDA_BASE split16d format. */
46807bf4
AM
651 HOW (R_PPC_VLE_SDAREL_HA16D, 2, 16, 0x3e007ff, 16, FALSE, dont,
652 ppc_elf_unhandled_reloc),
b9c361e0 653
83eef883 654 /* e_li split20 format. */
bb6bf75e
AM
655 HOW (R_PPC_VLE_ADDR20, 2, 20, 0x1f7fff, 0, FALSE, dont,
656 ppc_elf_unhandled_reloc),
46807bf4
AM
657
658 HOW (R_PPC_IRELATIVE, 2, 32, 0xffffffff, 0, FALSE, dont,
659 ppc_elf_unhandled_reloc),
e054468f 660
d7128ce4 661 /* A 16 bit relative relocation. */
46807bf4
AM
662 HOW (R_PPC_REL16, 1, 16, 0xffff, 0, TRUE, signed,
663 bfd_elf_generic_reloc),
d7128ce4
AM
664
665 /* A 16 bit relative relocation without overflow. */
46807bf4
AM
666 HOW (R_PPC_REL16_LO, 1, 16, 0xffff, 0, TRUE, dont,
667 bfd_elf_generic_reloc),
d7128ce4
AM
668
669 /* The high order 16 bits of a relative address. */
46807bf4
AM
670 HOW (R_PPC_REL16_HI, 1, 16, 0xffff, 16, TRUE, dont,
671 bfd_elf_generic_reloc),
d7128ce4
AM
672
673 /* The high order 16 bits of a relative address, plus 1 if the contents of
674 the low 16 bits, treated as a signed number, is negative. */
46807bf4
AM
675 HOW (R_PPC_REL16_HA, 1, 16, 0xffff, 16, TRUE, dont,
676 ppc_elf_addr16_ha_reloc),
d7128ce4 677
a680de9a 678 /* Like R_PPC_REL16_HA but for split field in addpcis. */
46807bf4
AM
679 HOW (R_PPC_REL16DX_HA, 2, 16, 0x1fffc1, 16, TRUE, signed,
680 ppc_elf_addr16_ha_reloc),
a680de9a 681
7ba71655 682 /* A split-field reloc for addpcis, non-relative (gas internal use only). */
46807bf4
AM
683 HOW (R_PPC_16DX_HA, 2, 16, 0x1fffc1, 16, FALSE, signed,
684 ppc_elf_addr16_ha_reloc),
7ba71655 685
25dbc73a 686 /* GNU extension to record C++ vtable hierarchy. */
46807bf4
AM
687 HOW (R_PPC_GNU_VTINHERIT, 0, 0, 0, 0, FALSE, dont,
688 NULL),
25dbc73a
AM
689
690 /* GNU extension to record C++ vtable member usage. */
46807bf4
AM
691 HOW (R_PPC_GNU_VTENTRY, 0, 0, 0, 0, FALSE, dont,
692 NULL),
7619e7c7 693
25dbc73a 694 /* Phony reloc to handle AIX style TOC entries. */
46807bf4
AM
695 HOW (R_PPC_TOC16, 1, 16, 0xffff, 0, FALSE, signed,
696 ppc_elf_unhandled_reloc),
25dbc73a
AM
697};
698\f
699/* Initialize the ppc_elf_howto_table, so that linear accesses can be done. */
700
701static void
702ppc_elf_howto_init (void)
703{
704 unsigned int i, type;
705
706 for (i = 0;
707 i < sizeof (ppc_elf_howto_raw) / sizeof (ppc_elf_howto_raw[0]);
708 i++)
709 {
710 type = ppc_elf_howto_raw[i].type;
711 if (type >= (sizeof (ppc_elf_howto_table)
712 / sizeof (ppc_elf_howto_table[0])))
713 abort ();
714 ppc_elf_howto_table[type] = &ppc_elf_howto_raw[i];
715 }
716}
717
718static reloc_howto_type *
719ppc_elf_reloc_type_lookup (bfd *abfd ATTRIBUTE_UNUSED,
720 bfd_reloc_code_real_type code)
721{
722 enum elf_ppc_reloc_type r;
723
724 /* Initialize howto table if not already done. */
725 if (!ppc_elf_howto_table[R_PPC_ADDR32])
726 ppc_elf_howto_init ();
727
728 switch (code)
729 {
730 default:
731 return NULL;
732
733 case BFD_RELOC_NONE: r = R_PPC_NONE; break;
734 case BFD_RELOC_32: r = R_PPC_ADDR32; break;
735 case BFD_RELOC_PPC_BA26: r = R_PPC_ADDR24; break;
1fe532cf 736 case BFD_RELOC_PPC64_ADDR16_DS:
25dbc73a 737 case BFD_RELOC_16: r = R_PPC_ADDR16; break;
1fe532cf 738 case BFD_RELOC_PPC64_ADDR16_LO_DS:
25dbc73a
AM
739 case BFD_RELOC_LO16: r = R_PPC_ADDR16_LO; break;
740 case BFD_RELOC_HI16: r = R_PPC_ADDR16_HI; break;
741 case BFD_RELOC_HI16_S: r = R_PPC_ADDR16_HA; break;
742 case BFD_RELOC_PPC_BA16: r = R_PPC_ADDR14; break;
743 case BFD_RELOC_PPC_BA16_BRTAKEN: r = R_PPC_ADDR14_BRTAKEN; break;
744 case BFD_RELOC_PPC_BA16_BRNTAKEN: r = R_PPC_ADDR14_BRNTAKEN; break;
745 case BFD_RELOC_PPC_B26: r = R_PPC_REL24; break;
746 case BFD_RELOC_PPC_B16: r = R_PPC_REL14; break;
747 case BFD_RELOC_PPC_B16_BRTAKEN: r = R_PPC_REL14_BRTAKEN; break;
748 case BFD_RELOC_PPC_B16_BRNTAKEN: r = R_PPC_REL14_BRNTAKEN; break;
1fe532cf 749 case BFD_RELOC_PPC64_GOT16_DS:
25dbc73a 750 case BFD_RELOC_16_GOTOFF: r = R_PPC_GOT16; break;
1fe532cf 751 case BFD_RELOC_PPC64_GOT16_LO_DS:
25dbc73a
AM
752 case BFD_RELOC_LO16_GOTOFF: r = R_PPC_GOT16_LO; break;
753 case BFD_RELOC_HI16_GOTOFF: r = R_PPC_GOT16_HI; break;
754 case BFD_RELOC_HI16_S_GOTOFF: r = R_PPC_GOT16_HA; break;
755 case BFD_RELOC_24_PLT_PCREL: r = R_PPC_PLTREL24; break;
756 case BFD_RELOC_PPC_COPY: r = R_PPC_COPY; break;
757 case BFD_RELOC_PPC_GLOB_DAT: r = R_PPC_GLOB_DAT; break;
758 case BFD_RELOC_PPC_LOCAL24PC: r = R_PPC_LOCAL24PC; break;
759 case BFD_RELOC_32_PCREL: r = R_PPC_REL32; break;
760 case BFD_RELOC_32_PLTOFF: r = R_PPC_PLT32; break;
761 case BFD_RELOC_32_PLT_PCREL: r = R_PPC_PLTREL32; break;
1fe532cf 762 case BFD_RELOC_PPC64_PLT16_LO_DS:
25dbc73a
AM
763 case BFD_RELOC_LO16_PLTOFF: r = R_PPC_PLT16_LO; break;
764 case BFD_RELOC_HI16_PLTOFF: r = R_PPC_PLT16_HI; break;
765 case BFD_RELOC_HI16_S_PLTOFF: r = R_PPC_PLT16_HA; break;
766 case BFD_RELOC_GPREL16: r = R_PPC_SDAREL16; break;
1fe532cf 767 case BFD_RELOC_PPC64_SECTOFF_DS:
25dbc73a 768 case BFD_RELOC_16_BASEREL: r = R_PPC_SECTOFF; break;
1fe532cf 769 case BFD_RELOC_PPC64_SECTOFF_LO_DS:
25dbc73a
AM
770 case BFD_RELOC_LO16_BASEREL: r = R_PPC_SECTOFF_LO; break;
771 case BFD_RELOC_HI16_BASEREL: r = R_PPC_SECTOFF_HI; break;
772 case BFD_RELOC_HI16_S_BASEREL: r = R_PPC_SECTOFF_HA; break;
773 case BFD_RELOC_CTOR: r = R_PPC_ADDR32; break;
1fe532cf 774 case BFD_RELOC_PPC64_TOC16_DS:
25dbc73a
AM
775 case BFD_RELOC_PPC_TOC16: r = R_PPC_TOC16; break;
776 case BFD_RELOC_PPC_TLS: r = R_PPC_TLS; break;
727fc41e
AM
777 case BFD_RELOC_PPC_TLSGD: r = R_PPC_TLSGD; break;
778 case BFD_RELOC_PPC_TLSLD: r = R_PPC_TLSLD; break;
25dbc73a 779 case BFD_RELOC_PPC_DTPMOD: r = R_PPC_DTPMOD32; break;
1fe532cf 780 case BFD_RELOC_PPC64_TPREL16_DS:
25dbc73a 781 case BFD_RELOC_PPC_TPREL16: r = R_PPC_TPREL16; break;
1fe532cf 782 case BFD_RELOC_PPC64_TPREL16_LO_DS:
25dbc73a
AM
783 case BFD_RELOC_PPC_TPREL16_LO: r = R_PPC_TPREL16_LO; break;
784 case BFD_RELOC_PPC_TPREL16_HI: r = R_PPC_TPREL16_HI; break;
785 case BFD_RELOC_PPC_TPREL16_HA: r = R_PPC_TPREL16_HA; break;
786 case BFD_RELOC_PPC_TPREL: r = R_PPC_TPREL32; break;
1fe532cf 787 case BFD_RELOC_PPC64_DTPREL16_DS:
25dbc73a 788 case BFD_RELOC_PPC_DTPREL16: r = R_PPC_DTPREL16; break;
1fe532cf 789 case BFD_RELOC_PPC64_DTPREL16_LO_DS:
25dbc73a
AM
790 case BFD_RELOC_PPC_DTPREL16_LO: r = R_PPC_DTPREL16_LO; break;
791 case BFD_RELOC_PPC_DTPREL16_HI: r = R_PPC_DTPREL16_HI; break;
792 case BFD_RELOC_PPC_DTPREL16_HA: r = R_PPC_DTPREL16_HA; break;
793 case BFD_RELOC_PPC_DTPREL: r = R_PPC_DTPREL32; break;
794 case BFD_RELOC_PPC_GOT_TLSGD16: r = R_PPC_GOT_TLSGD16; break;
795 case BFD_RELOC_PPC_GOT_TLSGD16_LO: r = R_PPC_GOT_TLSGD16_LO; break;
796 case BFD_RELOC_PPC_GOT_TLSGD16_HI: r = R_PPC_GOT_TLSGD16_HI; break;
797 case BFD_RELOC_PPC_GOT_TLSGD16_HA: r = R_PPC_GOT_TLSGD16_HA; break;
798 case BFD_RELOC_PPC_GOT_TLSLD16: r = R_PPC_GOT_TLSLD16; break;
799 case BFD_RELOC_PPC_GOT_TLSLD16_LO: r = R_PPC_GOT_TLSLD16_LO; break;
800 case BFD_RELOC_PPC_GOT_TLSLD16_HI: r = R_PPC_GOT_TLSLD16_HI; break;
801 case BFD_RELOC_PPC_GOT_TLSLD16_HA: r = R_PPC_GOT_TLSLD16_HA; break;
802 case BFD_RELOC_PPC_GOT_TPREL16: r = R_PPC_GOT_TPREL16; break;
803 case BFD_RELOC_PPC_GOT_TPREL16_LO: r = R_PPC_GOT_TPREL16_LO; break;
804 case BFD_RELOC_PPC_GOT_TPREL16_HI: r = R_PPC_GOT_TPREL16_HI; break;
805 case BFD_RELOC_PPC_GOT_TPREL16_HA: r = R_PPC_GOT_TPREL16_HA; break;
806 case BFD_RELOC_PPC_GOT_DTPREL16: r = R_PPC_GOT_DTPREL16; break;
807 case BFD_RELOC_PPC_GOT_DTPREL16_LO: r = R_PPC_GOT_DTPREL16_LO; break;
808 case BFD_RELOC_PPC_GOT_DTPREL16_HI: r = R_PPC_GOT_DTPREL16_HI; break;
809 case BFD_RELOC_PPC_GOT_DTPREL16_HA: r = R_PPC_GOT_DTPREL16_HA; break;
810 case BFD_RELOC_PPC_EMB_NADDR32: r = R_PPC_EMB_NADDR32; break;
811 case BFD_RELOC_PPC_EMB_NADDR16: r = R_PPC_EMB_NADDR16; break;
812 case BFD_RELOC_PPC_EMB_NADDR16_LO: r = R_PPC_EMB_NADDR16_LO; break;
813 case BFD_RELOC_PPC_EMB_NADDR16_HI: r = R_PPC_EMB_NADDR16_HI; break;
814 case BFD_RELOC_PPC_EMB_NADDR16_HA: r = R_PPC_EMB_NADDR16_HA; break;
815 case BFD_RELOC_PPC_EMB_SDAI16: r = R_PPC_EMB_SDAI16; break;
816 case BFD_RELOC_PPC_EMB_SDA2I16: r = R_PPC_EMB_SDA2I16; break;
817 case BFD_RELOC_PPC_EMB_SDA2REL: r = R_PPC_EMB_SDA2REL; break;
818 case BFD_RELOC_PPC_EMB_SDA21: r = R_PPC_EMB_SDA21; break;
819 case BFD_RELOC_PPC_EMB_MRKREF: r = R_PPC_EMB_MRKREF; break;
820 case BFD_RELOC_PPC_EMB_RELSEC16: r = R_PPC_EMB_RELSEC16; break;
821 case BFD_RELOC_PPC_EMB_RELST_LO: r = R_PPC_EMB_RELST_LO; break;
822 case BFD_RELOC_PPC_EMB_RELST_HI: r = R_PPC_EMB_RELST_HI; break;
823 case BFD_RELOC_PPC_EMB_RELST_HA: r = R_PPC_EMB_RELST_HA; break;
824 case BFD_RELOC_PPC_EMB_BIT_FLD: r = R_PPC_EMB_BIT_FLD; break;
825 case BFD_RELOC_PPC_EMB_RELSDA: r = R_PPC_EMB_RELSDA; break;
b9c361e0
JL
826 case BFD_RELOC_PPC_VLE_REL8: r = R_PPC_VLE_REL8; break;
827 case BFD_RELOC_PPC_VLE_REL15: r = R_PPC_VLE_REL15; break;
828 case BFD_RELOC_PPC_VLE_REL24: r = R_PPC_VLE_REL24; break;
829 case BFD_RELOC_PPC_VLE_LO16A: r = R_PPC_VLE_LO16A; break;
830 case BFD_RELOC_PPC_VLE_LO16D: r = R_PPC_VLE_LO16D; break;
831 case BFD_RELOC_PPC_VLE_HI16A: r = R_PPC_VLE_HI16A; break;
832 case BFD_RELOC_PPC_VLE_HI16D: r = R_PPC_VLE_HI16D; break;
833 case BFD_RELOC_PPC_VLE_HA16A: r = R_PPC_VLE_HA16A; break;
834 case BFD_RELOC_PPC_VLE_HA16D: r = R_PPC_VLE_HA16D; break;
835 case BFD_RELOC_PPC_VLE_SDA21: r = R_PPC_VLE_SDA21; break;
836 case BFD_RELOC_PPC_VLE_SDA21_LO: r = R_PPC_VLE_SDA21_LO; break;
837 case BFD_RELOC_PPC_VLE_SDAREL_LO16A:
838 r = R_PPC_VLE_SDAREL_LO16A;
839 break;
840 case BFD_RELOC_PPC_VLE_SDAREL_LO16D:
841 r = R_PPC_VLE_SDAREL_LO16D;
842 break;
843 case BFD_RELOC_PPC_VLE_SDAREL_HI16A:
844 r = R_PPC_VLE_SDAREL_HI16A;
845 break;
846 case BFD_RELOC_PPC_VLE_SDAREL_HI16D:
847 r = R_PPC_VLE_SDAREL_HI16D;
848 break;
849 case BFD_RELOC_PPC_VLE_SDAREL_HA16A:
850 r = R_PPC_VLE_SDAREL_HA16A;
851 break;
852 case BFD_RELOC_PPC_VLE_SDAREL_HA16D:
853 r = R_PPC_VLE_SDAREL_HA16D;
854 break;
d7128ce4
AM
855 case BFD_RELOC_16_PCREL: r = R_PPC_REL16; break;
856 case BFD_RELOC_LO16_PCREL: r = R_PPC_REL16_LO; break;
857 case BFD_RELOC_HI16_PCREL: r = R_PPC_REL16_HI; break;
858 case BFD_RELOC_HI16_S_PCREL: r = R_PPC_REL16_HA; break;
7ba71655 859 case BFD_RELOC_PPC_16DX_HA: r = R_PPC_16DX_HA; break;
a680de9a 860 case BFD_RELOC_PPC_REL16DX_HA: r = R_PPC_REL16DX_HA; break;
25dbc73a
AM
861 case BFD_RELOC_VTABLE_INHERIT: r = R_PPC_GNU_VTINHERIT; break;
862 case BFD_RELOC_VTABLE_ENTRY: r = R_PPC_GNU_VTENTRY; break;
863 }
864
865 return ppc_elf_howto_table[r];
866};
867
157090f7
AM
868static reloc_howto_type *
869ppc_elf_reloc_name_lookup (bfd *abfd ATTRIBUTE_UNUSED,
870 const char *r_name)
871{
872 unsigned int i;
873
874 for (i = 0;
875 i < sizeof (ppc_elf_howto_raw) / sizeof (ppc_elf_howto_raw[0]);
876 i++)
877 if (ppc_elf_howto_raw[i].name != NULL
878 && strcasecmp (ppc_elf_howto_raw[i].name, r_name) == 0)
879 return &ppc_elf_howto_raw[i];
880
881 return NULL;
882}
883
25dbc73a
AM
884/* Set the howto pointer for a PowerPC ELF reloc. */
885
f3185997 886static bfd_boolean
4aef7643 887ppc_elf_info_to_howto (bfd *abfd,
25dbc73a
AM
888 arelent *cache_ptr,
889 Elf_Internal_Rela *dst)
890{
cd21f5da
NC
891 unsigned int r_type;
892
25dbc73a
AM
893 /* Initialize howto table if not already done. */
894 if (!ppc_elf_howto_table[R_PPC_ADDR32])
895 ppc_elf_howto_init ();
896
cd21f5da
NC
897 r_type = ELF32_R_TYPE (dst->r_info);
898 if (r_type >= R_PPC_max)
899 {
695344c0 900 /* xgettext:c-format */
0aa13fee 901 _bfd_error_handler (_("%pB: unsupported relocation type %#x"),
4eca0228 902 abfd, r_type);
cd21f5da 903 bfd_set_error (bfd_error_bad_value);
f3185997 904 return FALSE;
cd21f5da 905 }
f3185997 906
cd21f5da 907 cache_ptr->howto = ppc_elf_howto_table[r_type];
375de94a
AM
908
909 /* Just because the above assert didn't trigger doesn't mean that
910 ELF32_R_TYPE (dst->r_info) is necessarily a valid relocation. */
f3185997 911 if (cache_ptr->howto == NULL)
375de94a 912 {
695344c0 913 /* xgettext:c-format */
0aa13fee 914 _bfd_error_handler (_("%pB: unsupported relocation type %#x"),
4eca0228 915 abfd, r_type);
375de94a
AM
916 bfd_set_error (bfd_error_bad_value);
917
f3185997 918 return FALSE;
375de94a 919 }
f3185997
NC
920
921 return TRUE;
25dbc73a
AM
922}
923
d7128ce4 924/* Handle the R_PPC_ADDR16_HA and R_PPC_REL16_HA relocs. */
25dbc73a
AM
925
926static bfd_reloc_status_type
4aef7643 927ppc_elf_addr16_ha_reloc (bfd *abfd,
25dbc73a
AM
928 arelent *reloc_entry,
929 asymbol *symbol,
4aef7643 930 void *data,
25dbc73a
AM
931 asection *input_section,
932 bfd *output_bfd,
933 char **error_message ATTRIBUTE_UNUSED)
934{
a680de9a
PB
935 enum elf_ppc_reloc_type r_type;
936 long insn;
937 bfd_size_type octets;
938 bfd_vma value;
25dbc73a
AM
939
940 if (output_bfd != NULL)
941 {
942 reloc_entry->address += input_section->output_offset;
943 return bfd_reloc_ok;
944 }
945
a680de9a
PB
946 reloc_entry->addend += 0x8000;
947 r_type = reloc_entry->howto->type;
948 if (r_type != R_PPC_REL16DX_HA)
949 return bfd_reloc_continue;
950
951 value = 0;
952 if (!bfd_is_com_section (symbol->section))
953 value = symbol->value;
954 value += (reloc_entry->addend
955 + symbol->section->output_offset
956 + symbol->section->output_section->vma);
957 value -= (reloc_entry->address
958 + input_section->output_offset
959 + input_section->output_section->vma);
960 value >>= 16;
961
bb294208 962 octets = reloc_entry->address * OCTETS_PER_BYTE (abfd, input_section);
a680de9a
PB
963 insn = bfd_get_32 (abfd, (bfd_byte *) data + octets);
964 insn &= ~0x1fffc1;
965 insn |= (value & 0xffc1) | ((value & 0x3e) << 15);
966 bfd_put_32 (abfd, insn, (bfd_byte *) data + octets);
967 return bfd_reloc_ok;
25dbc73a
AM
968}
969
970static bfd_reloc_status_type
971ppc_elf_unhandled_reloc (bfd *abfd,
972 arelent *reloc_entry,
973 asymbol *symbol,
974 void *data,
975 asection *input_section,
976 bfd *output_bfd,
977 char **error_message)
978{
979 /* If this is a relocatable link (output_bfd test tells us), just
980 call the generic function. Any adjustment will be done at final
981 link time. */
982 if (output_bfd != NULL)
983 return bfd_elf_generic_reloc (abfd, reloc_entry, symbol, data,
984 input_section, output_bfd, error_message);
985
986 if (error_message != NULL)
987 {
988 static char buf[60];
989 sprintf (buf, _("generic linker can't handle %s"),
990 reloc_entry->howto->name);
991 *error_message = buf;
992 }
993 return bfd_reloc_dangerous;
994}
995\f
996/* Sections created by the linker. */
997
998typedef struct elf_linker_section
999{
c9a2f333 1000 /* Pointer to the bfd section. */
25dbc73a 1001 asection *section;
c9a2f333
AM
1002 /* Section name. */
1003 const char *name;
1004 /* Associated bss section name. */
1005 const char *bss_name;
1006 /* Associated symbol name. */
1007 const char *sym_name;
046183de
AM
1008 /* Associated symbol. */
1009 struct elf_link_hash_entry *sym;
25dbc73a
AM
1010} elf_linker_section_t;
1011
1012/* Linked list of allocated pointer entries. This hangs off of the
1013 symbol lists, and provides allows us to return different pointers,
1014 based on different addend's. */
1015
1016typedef struct elf_linker_section_pointers
1017{
1018 /* next allocated pointer for this symbol */
1019 struct elf_linker_section_pointers *next;
1020 /* offset of pointer from beginning of section */
1021 bfd_vma offset;
1022 /* addend used */
1023 bfd_vma addend;
1024 /* which linker section this is */
1025 elf_linker_section_t *lsect;
25dbc73a
AM
1026} elf_linker_section_pointers_t;
1027
1028struct ppc_elf_obj_tdata
1029{
1030 struct elf_obj_tdata elf;
1031
1032 /* A mapping from local symbols to offsets into the various linker
1033 sections added. This is index by the symbol index. */
1034 elf_linker_section_pointers_t **linker_section_pointers;
016687f8
AM
1035
1036 /* Flags used to auto-detect plt type. */
1037 unsigned int makes_plt_call : 1;
1038 unsigned int has_rel16 : 1;
25dbc73a
AM
1039};
1040
1041#define ppc_elf_tdata(bfd) \
1042 ((struct ppc_elf_obj_tdata *) (bfd)->tdata.any)
7619e7c7 1043
25dbc73a
AM
1044#define elf_local_ptr_offsets(bfd) \
1045 (ppc_elf_tdata (bfd)->linker_section_pointers)
7619e7c7 1046
0c8d6e5c
AM
1047#define is_ppc_elf(bfd) \
1048 (bfd_get_flavour (bfd) == bfd_target_elf_flavour \
4dfe6ac6 1049 && elf_object_id (bfd) == PPC32_ELF_DATA)
0c8d6e5c 1050
25dbc73a 1051/* Override the generic function because we store some extras. */
7619e7c7 1052
25dbc73a
AM
1053static bfd_boolean
1054ppc_elf_mkobject (bfd *abfd)
1055{
0ffa91dd 1056 return bfd_elf_allocate_object (abfd, sizeof (struct ppc_elf_obj_tdata),
4dfe6ac6 1057 PPC32_ELF_DATA);
25dbc73a 1058}
7619e7c7 1059
14b57c7c
AM
1060/* When defaulting arch/mach, decode apuinfo to find a better match. */
1061
1062bfd_boolean
1063_bfd_elf_ppc_set_arch (bfd *abfd)
1064{
1065 unsigned long mach = 0;
1066 asection *s;
1067 unsigned char *contents;
1068
1069 if (abfd->arch_info->bits_per_word == 32
1070 && bfd_big_endian (abfd))
1071 {
1072
1073 for (s = abfd->sections; s != NULL; s = s->next)
1074 if ((elf_section_data (s)->this_hdr.sh_flags & SHF_PPC_VLE) != 0)
1075 break;
1076 if (s != NULL)
1077 mach = bfd_mach_ppc_vle;
1078 }
1079
1080 if (mach == 0)
1081 {
1082 s = bfd_get_section_by_name (abfd, APUINFO_SECTION_NAME);
62a47958
AM
1083 if (s != NULL
1084 && s->size >= 24
1085 && bfd_malloc_and_get_section (abfd, s, &contents))
14b57c7c
AM
1086 {
1087 unsigned int apuinfo_size = bfd_get_32 (abfd, contents + 4);
1088 unsigned int i;
1089
1090 for (i = 20; i < apuinfo_size + 20 && i + 4 <= s->size; i += 4)
1091 {
1092 unsigned int val = bfd_get_32 (abfd, contents + i);
1093 switch (val >> 16)
1094 {
1095 case PPC_APUINFO_PMR:
1096 case PPC_APUINFO_RFMCI:
1097 if (mach == 0)
1098 mach = bfd_mach_ppc_titan;
1099 break;
1100
1101 case PPC_APUINFO_ISEL:
1102 case PPC_APUINFO_CACHELCK:
1103 if (mach == bfd_mach_ppc_titan)
1104 mach = bfd_mach_ppc_e500mc;
1105 break;
1106
1107 case PPC_APUINFO_SPE:
1108 case PPC_APUINFO_EFS:
1109 case PPC_APUINFO_BRLOCK:
1110 if (mach != bfd_mach_ppc_vle)
1111 mach = bfd_mach_ppc_e500;
8941017b 1112 break;
14b57c7c
AM
1113
1114 case PPC_APUINFO_VLE:
1115 mach = bfd_mach_ppc_vle;
1116 break;
1117
1118 default:
1119 mach = -1ul;
1120 }
1121 }
1122 free (contents);
1123 }
1124 }
1125
1126 if (mach != 0 && mach != -1ul)
1127 {
1128 const bfd_arch_info_type *arch;
1129
1130 for (arch = abfd->arch_info->next; arch; arch = arch->next)
1131 if (arch->mach == mach)
1132 {
1133 abfd->arch_info = arch;
1134 break;
1135 }
1136 }
1137 return TRUE;
1138}
1139
25dbc73a 1140/* Fix bad default arch selected for a 32 bit input bfd when the
14b57c7c 1141 default is 64 bit. Also select arch based on apuinfo. */
7619e7c7 1142
25dbc73a
AM
1143static bfd_boolean
1144ppc_elf_object_p (bfd *abfd)
1145{
14b57c7c
AM
1146 if (!abfd->arch_info->the_default)
1147 return TRUE;
1148
1149 if (abfd->arch_info->bits_per_word == 64)
25dbc73a
AM
1150 {
1151 Elf_Internal_Ehdr *i_ehdr = elf_elfheader (abfd);
7619e7c7 1152
25dbc73a
AM
1153 if (i_ehdr->e_ident[EI_CLASS] == ELFCLASS32)
1154 {
1155 /* Relies on arch after 64 bit default being 32 bit default. */
1156 abfd->arch_info = abfd->arch_info->next;
1157 BFD_ASSERT (abfd->arch_info->bits_per_word == 32);
1158 }
1159 }
14b57c7c 1160 return _bfd_elf_ppc_set_arch (abfd);
25dbc73a 1161}
7619e7c7 1162
25dbc73a 1163/* Function to set whether a module needs the -mrelocatable bit set. */
7619e7c7 1164
25dbc73a
AM
1165static bfd_boolean
1166ppc_elf_set_private_flags (bfd *abfd, flagword flags)
1167{
1168 BFD_ASSERT (!elf_flags_init (abfd)
1169 || elf_elfheader (abfd)->e_flags == flags);
7619e7c7 1170
25dbc73a
AM
1171 elf_elfheader (abfd)->e_flags = flags;
1172 elf_flags_init (abfd) = TRUE;
1173 return TRUE;
1174}
1175
25dbc73a 1176/* Support for core dump NOTE sections. */
deaaf2f3 1177
b34976b6 1178static bfd_boolean
25dbc73a 1179ppc_elf_grok_prstatus (bfd *abfd, Elf_Internal_Note *note)
252b5132 1180{
25dbc73a
AM
1181 int offset;
1182 unsigned int size;
252b5132 1183
25dbc73a
AM
1184 switch (note->descsz)
1185 {
1186 default:
1187 return FALSE;
252b5132 1188
25dbc73a
AM
1189 case 268: /* Linux/PPC. */
1190 /* pr_cursig */
228e534f 1191 elf_tdata (abfd)->core->signal = bfd_get_16 (abfd, note->descdata + 12);
deaaf2f3 1192
25dbc73a 1193 /* pr_pid */
228e534f 1194 elf_tdata (abfd)->core->lwpid = bfd_get_32 (abfd, note->descdata + 24);
9abc968f 1195
25dbc73a
AM
1196 /* pr_reg */
1197 offset = 72;
1198 size = 192;
deaaf2f3 1199
25dbc73a
AM
1200 break;
1201 }
deaaf2f3 1202
25dbc73a
AM
1203 /* Make a ".reg/999" section. */
1204 return _bfd_elfcore_make_pseudosection (abfd, ".reg",
1205 size, note->descpos + offset);
1206}
252b5132 1207
25dbc73a
AM
1208static bfd_boolean
1209ppc_elf_grok_psinfo (bfd *abfd, Elf_Internal_Note *note)
1210{
1211 switch (note->descsz)
deaaf2f3 1212 {
25dbc73a
AM
1213 default:
1214 return FALSE;
deaaf2f3 1215
25dbc73a 1216 case 128: /* Linux/PPC elf_prpsinfo. */
228e534f 1217 elf_tdata (abfd)->core->pid
bc989cdc 1218 = bfd_get_32 (abfd, note->descdata + 16);
228e534f 1219 elf_tdata (abfd)->core->program
25dbc73a 1220 = _bfd_elfcore_strndup (abfd, note->descdata + 32, 16);
228e534f 1221 elf_tdata (abfd)->core->command
25dbc73a
AM
1222 = _bfd_elfcore_strndup (abfd, note->descdata + 48, 80);
1223 }
9abc968f 1224
25dbc73a
AM
1225 /* Note that for some reason, a spurious space is tacked
1226 onto the end of the args in some (at least one anyway)
1227 implementations, so strip it off if it exists. */
70bccea4 1228
25dbc73a 1229 {
228e534f 1230 char *command = elf_tdata (abfd)->core->command;
25dbc73a 1231 int n = strlen (command);
70bccea4 1232
25dbc73a
AM
1233 if (0 < n && command[n - 1] == ' ')
1234 command[n - 1] = '\0';
1235 }
deaaf2f3 1236
25dbc73a
AM
1237 return TRUE;
1238}
deaaf2f3 1239
183e98be
AM
1240static char *
1241ppc_elf_write_core_note (bfd *abfd, char *buf, int *bufsiz, int note_type, ...)
1242{
1243 switch (note_type)
1244 {
1245 default:
1246 return NULL;
1247
1248 case NT_PRPSINFO:
1249 {
602f1657 1250 char data[128] ATTRIBUTE_NONSTRING;
183e98be
AM
1251 va_list ap;
1252
1253 va_start (ap, note_type);
75cd47ed 1254 memset (data, 0, sizeof (data));
183e98be 1255 strncpy (data + 32, va_arg (ap, const char *), 16);
be3e27bb 1256#if GCC_VERSION == 8000 || GCC_VERSION == 8001
95da9854 1257 DIAGNOSTIC_PUSH;
be3e27bb 1258 /* GCC 8.0 and 8.1 warn about 80 equals destination size with
95da9854
L
1259 -Wstringop-truncation:
1260 https://gcc.gnu.org/bugzilla/show_bug.cgi?id=85643
1261 */
95da9854
L
1262 DIAGNOSTIC_IGNORE_STRINGOP_TRUNCATION;
1263#endif
183e98be 1264 strncpy (data + 48, va_arg (ap, const char *), 80);
be3e27bb 1265#if GCC_VERSION == 8000 || GCC_VERSION == 8001
95da9854 1266 DIAGNOSTIC_POP;
fe75810f 1267#endif
183e98be
AM
1268 va_end (ap);
1269 return elfcore_write_note (abfd, buf, bufsiz,
1270 "CORE", note_type, data, sizeof (data));
1271 }
1272
1273 case NT_PRSTATUS:
1274 {
1275 char data[268];
1276 va_list ap;
1277 long pid;
1278 int cursig;
1279 const void *greg;
1280
1281 va_start (ap, note_type);
1282 memset (data, 0, 72);
1283 pid = va_arg (ap, long);
1284 bfd_put_32 (abfd, pid, data + 24);
1285 cursig = va_arg (ap, int);
1286 bfd_put_16 (abfd, cursig, data + 12);
1287 greg = va_arg (ap, const void *);
1288 memcpy (data + 72, greg, 192);
1289 memset (data + 264, 0, 4);
1290 va_end (ap);
1291 return elfcore_write_note (abfd, buf, bufsiz,
1292 "CORE", note_type, data, sizeof (data));
1293 }
1294 }
1295}
1296
b9c361e0 1297static flagword
68ffbac6 1298ppc_elf_lookup_section_flags (char *flag_name)
b9c361e0
JL
1299{
1300
1301 if (!strcmp (flag_name, "SHF_PPC_VLE"))
1302 return SHF_PPC_VLE;
1303
1304 return 0;
1305}
1306
25dbc73a
AM
1307/* Return address for Ith PLT stub in section PLT, for relocation REL
1308 or (bfd_vma) -1 if it should not be included. */
deaaf2f3 1309
25dbc73a
AM
1310static bfd_vma
1311ppc_elf_plt_sym_val (bfd_vma i ATTRIBUTE_UNUSED,
1312 const asection *plt ATTRIBUTE_UNUSED,
1313 const arelent *rel)
1314{
1315 return rel->address;
1316}
deaaf2f3 1317
25dbc73a 1318/* Handle a PowerPC specific section when reading an object file. This
6dc132d9
L
1319 is called when bfd_section_from_shdr finds a section with an unknown
1320 type. */
deaaf2f3 1321
25dbc73a 1322static bfd_boolean
6dc132d9
L
1323ppc_elf_section_from_shdr (bfd *abfd,
1324 Elf_Internal_Shdr *hdr,
1325 const char *name,
1326 int shindex)
25dbc73a
AM
1327{
1328 asection *newsect;
1329 flagword flags;
d1c6de6f 1330
6dc132d9 1331 if (! _bfd_elf_make_section_from_shdr (abfd, hdr, name, shindex))
25dbc73a 1332 return FALSE;
deaaf2f3 1333
25dbc73a 1334 newsect = hdr->bfd_section;
bf577467 1335 flags = 0;
25dbc73a
AM
1336 if (hdr->sh_flags & SHF_EXCLUDE)
1337 flags |= SEC_EXCLUDE;
9abc968f 1338
25dbc73a
AM
1339 if (hdr->sh_type == SHT_ORDERED)
1340 flags |= SEC_SORT_ENTRIES;
d1c6de6f 1341
bf577467
AM
1342 if (strncmp (name, ".PPC.EMB", 8) == 0)
1343 name += 8;
1344 if (strncmp (name, ".sbss", 5) == 0
1345 || strncmp (name, ".sdata", 6) == 0)
1346 flags |= SEC_SMALL_DATA;
1347
1348 return (flags == 0
1349 || bfd_set_section_flags (newsect, newsect->flags | flags));
25dbc73a
AM
1350}
1351
1352/* Set up any other section flags and such that may be necessary. */
1353
1354static bfd_boolean
1355ppc_elf_fake_sections (bfd *abfd ATTRIBUTE_UNUSED,
1356 Elf_Internal_Shdr *shdr,
1357 asection *asect)
1358{
25dbc73a
AM
1359 if ((asect->flags & SEC_SORT_ENTRIES) != 0)
1360 shdr->sh_type = SHT_ORDERED;
1361
1362 return TRUE;
1363}
1364
1365/* If we have .sbss2 or .PPC.EMB.sbss0 output sections, we
1366 need to bump up the number of section headers. */
1367
1368static int
a6b96beb
AM
1369ppc_elf_additional_program_headers (bfd *abfd,
1370 struct bfd_link_info *info ATTRIBUTE_UNUSED)
25dbc73a
AM
1371{
1372 asection *s;
1373 int ret = 0;
d1c6de6f 1374
25dbc73a
AM
1375 s = bfd_get_section_by_name (abfd, ".sbss2");
1376 if (s != NULL && (s->flags & SEC_ALLOC) != 0)
1377 ++ret;
d1c6de6f 1378
25dbc73a
AM
1379 s = bfd_get_section_by_name (abfd, ".PPC.EMB.sbss0");
1380 if (s != NULL && (s->flags & SEC_ALLOC) != 0)
1381 ++ret;
deaaf2f3 1382
25dbc73a
AM
1383 return ret;
1384}
deaaf2f3 1385
68ffbac6 1386/* Modify the segment map for VLE executables. */
b9c361e0
JL
1387
1388bfd_boolean
1389ppc_elf_modify_segment_map (bfd *abfd,
1390 struct bfd_link_info *info ATTRIBUTE_UNUSED)
1391{
f7d69005 1392 struct elf_segment_map *m;
b9c361e0
JL
1393
1394 /* At this point in the link, output sections have already been sorted by
1395 LMA and assigned to segments. All that is left to do is to ensure
1396 there is no mixing of VLE & non-VLE sections in a text segment.
1397 If we find that case, we split the segment.
1398 We maintain the original output section order. */
1399
12bd6957 1400 for (m = elf_seg_map (abfd); m != NULL; m = m->next)
b9c361e0 1401 {
f7d69005 1402 struct elf_segment_map *n;
986f0783 1403 size_t amt;
f7d69005
AM
1404 unsigned int j, k;
1405 unsigned int p_flags;
1406
1407 if (m->p_type != PT_LOAD || m->count == 0)
b9c361e0
JL
1408 continue;
1409
f7d69005 1410 for (p_flags = PF_R, j = 0; j != m->count; ++j)
b9c361e0 1411 {
f7d69005
AM
1412 if ((m->sections[j]->flags & SEC_READONLY) == 0)
1413 p_flags |= PF_W;
1414 if ((m->sections[j]->flags & SEC_CODE) != 0)
1415 {
1416 p_flags |= PF_X;
1417 if ((elf_section_flags (m->sections[j]) & SHF_PPC_VLE) != 0)
1418 p_flags |= PF_PPC_VLE;
1419 break;
1420 }
1421 }
1422 if (j != m->count)
1423 while (++j != m->count)
1424 {
1425 unsigned int p_flags1 = PF_R;
94caa966 1426
f7d69005
AM
1427 if ((m->sections[j]->flags & SEC_READONLY) == 0)
1428 p_flags1 |= PF_W;
1429 if ((m->sections[j]->flags & SEC_CODE) != 0)
1430 {
1431 p_flags1 |= PF_X;
1432 if ((elf_section_flags (m->sections[j]) & SHF_PPC_VLE) != 0)
1433 p_flags1 |= PF_PPC_VLE;
1434 if (((p_flags1 ^ p_flags) & PF_PPC_VLE) != 0)
1435 break;
1436 }
1437 p_flags |= p_flags1;
1438 }
1439 /* If we're splitting a segment which originally contained rw
1440 sections then those sections might now only be in one of the
1441 two parts. So always set p_flags if splitting, even if we
1442 are being called for objcopy with p_flags_valid set. */
1443 if (j != m->count || !m->p_flags_valid)
1444 {
1445 m->p_flags_valid = 1;
1446 m->p_flags = p_flags;
1447 }
1448 if (j == m->count)
b9c361e0
JL
1449 continue;
1450
f7d69005 1451 /* Sections 0..j-1 stay in this (current) segment,
b9c361e0
JL
1452 the remainder are put in a new segment.
1453 The scan resumes with the new segment. */
1454
b9c361e0
JL
1455 amt = sizeof (struct elf_segment_map);
1456 amt += (m->count - j - 1) * sizeof (asection *);
1457 n = (struct elf_segment_map *) bfd_zalloc (abfd, amt);
1458 if (n == NULL)
954b63d4 1459 return FALSE;
b9c361e0
JL
1460
1461 n->p_type = PT_LOAD;
b9c361e0
JL
1462 n->count = m->count - j;
1463 for (k = 0; k < n->count; ++k)
f7d69005
AM
1464 n->sections[k] = m->sections[j + k];
1465 m->count = j;
1466 m->p_size_valid = 0;
b9c361e0
JL
1467 n->next = m->next;
1468 m->next = n;
b9c361e0
JL
1469 }
1470
1471 return TRUE;
1472}
1473
25dbc73a
AM
1474/* Add extra PPC sections -- Note, for now, make .sbss2 and
1475 .PPC.EMB.sbss0 a normal section, and not a bss section so
1476 that the linker doesn't crater when trying to make more than
1477 2 sections. */
e656e369 1478
b35d266b 1479static const struct bfd_elf_special_section ppc_elf_special_sections[] =
7f4d3958 1480{
14b57c7c
AM
1481 { STRING_COMMA_LEN (".plt"), 0, SHT_NOBITS, SHF_ALLOC + SHF_EXECINSTR },
1482 { STRING_COMMA_LEN (".sbss"), -2, SHT_NOBITS, SHF_ALLOC + SHF_WRITE },
1483 { STRING_COMMA_LEN (".sbss2"), -2, SHT_PROGBITS, SHF_ALLOC },
1484 { STRING_COMMA_LEN (".sdata"), -2, SHT_PROGBITS, SHF_ALLOC + SHF_WRITE },
1485 { STRING_COMMA_LEN (".sdata2"), -2, SHT_PROGBITS, SHF_ALLOC },
1486 { STRING_COMMA_LEN (".tags"), 0, SHT_ORDERED, SHF_ALLOC },
1487 { STRING_COMMA_LEN (APUINFO_SECTION_NAME), 0, SHT_NOTE, 0 },
1488 { STRING_COMMA_LEN (".PPC.EMB.sbss0"), 0, SHT_PROGBITS, SHF_ALLOC },
1489 { STRING_COMMA_LEN (".PPC.EMB.sdata0"), 0, SHT_PROGBITS, SHF_ALLOC },
1490 { NULL, 0, 0, 0, 0 }
7f4d3958
L
1491};
1492
551b43fd
AM
1493/* This is what we want for new plt/got. */
1494static struct bfd_elf_special_section ppc_alt_plt =
07d6d2b8 1495 { STRING_COMMA_LEN (".plt"), 0, SHT_PROGBITS, SHF_ALLOC };
551b43fd
AM
1496
1497static const struct bfd_elf_special_section *
4aef7643 1498ppc_elf_get_sec_type_attr (bfd *abfd, asection *sec)
7f4d3958 1499{
b35d266b 1500 const struct bfd_elf_special_section *ssect;
551b43fd
AM
1501
1502 /* See if this is one of the special sections. */
1503 if (sec->name == NULL)
1504 return NULL;
1505
1506 ssect = _bfd_elf_get_special_section (sec->name, ppc_elf_special_sections,
1507 sec->use_rela_p);
1508 if (ssect != NULL)
1509 {
1510 if (ssect == ppc_elf_special_sections && (sec->flags & SEC_LOAD) != 0)
1511 ssect = &ppc_alt_plt;
1512 return ssect;
1513 }
1514
1515 return _bfd_elf_get_sec_type_attr (abfd, sec);
1516}
25dbc73a
AM
1517\f
1518/* Very simple linked list structure for recording apuinfo values. */
1519typedef struct apuinfo_list
1520{
1521 struct apuinfo_list *next;
1522 unsigned long value;
1523}
1524apuinfo_list;
e656e369 1525
25dbc73a 1526static apuinfo_list *head;
f2faa800 1527static bfd_boolean apuinfo_set;
deaaf2f3 1528
25dbc73a
AM
1529static void
1530apuinfo_list_init (void)
1531{
1532 head = NULL;
f2faa800 1533 apuinfo_set = FALSE;
25dbc73a 1534}
9abc968f 1535
25dbc73a
AM
1536static void
1537apuinfo_list_add (unsigned long value)
1538{
1539 apuinfo_list *entry = head;
deaaf2f3 1540
25dbc73a
AM
1541 while (entry != NULL)
1542 {
1543 if (entry->value == value)
1544 return;
1545 entry = entry->next;
1546 }
b4a38de6 1547
25dbc73a
AM
1548 entry = bfd_malloc (sizeof (* entry));
1549 if (entry == NULL)
1550 return;
e656e369 1551
25dbc73a
AM
1552 entry->value = value;
1553 entry->next = head;
1554 head = entry;
1555}
9abc968f 1556
25dbc73a
AM
1557static unsigned
1558apuinfo_list_length (void)
1559{
1560 apuinfo_list *entry;
1561 unsigned long count;
9abc968f 1562
25dbc73a
AM
1563 for (entry = head, count = 0;
1564 entry;
1565 entry = entry->next)
1566 ++ count;
e656e369 1567
25dbc73a
AM
1568 return count;
1569}
eea6121a 1570
25dbc73a
AM
1571static inline unsigned long
1572apuinfo_list_element (unsigned long number)
1573{
1574 apuinfo_list * entry;
e656e369 1575
25dbc73a
AM
1576 for (entry = head;
1577 entry && number --;
1578 entry = entry->next)
1579 ;
252b5132 1580
25dbc73a
AM
1581 return entry ? entry->value : 0;
1582}
1583
1584static void
1585apuinfo_list_finish (void)
1586{
1587 apuinfo_list *entry;
1588
1589 for (entry = head; entry;)
252b5132 1590 {
25dbc73a
AM
1591 apuinfo_list *next = entry->next;
1592 free (entry);
1593 entry = next;
1594 }
9abc968f 1595
25dbc73a
AM
1596 head = NULL;
1597}
9abc968f 1598
25dbc73a
AM
1599/* Scan the input BFDs and create a linked list of
1600 the APUinfo values that will need to be emitted. */
9abc968f 1601
25dbc73a
AM
1602static void
1603ppc_elf_begin_write_processing (bfd *abfd, struct bfd_link_info *link_info)
1604{
1605 bfd *ibfd;
1606 asection *asec;
deddc40b
NS
1607 char *buffer = NULL;
1608 bfd_size_type largest_input_size = 0;
25dbc73a 1609 unsigned i;
25dbc73a
AM
1610 unsigned long length;
1611 const char *error_message = NULL;
9abc968f 1612
25dbc73a
AM
1613 if (link_info == NULL)
1614 return;
9abc968f 1615
25dbc73a 1616 apuinfo_list_init ();
252b5132 1617
25dbc73a 1618 /* Read in the input sections contents. */
c72f2fb2 1619 for (ibfd = link_info->input_bfds; ibfd; ibfd = ibfd->link.next)
252b5132 1620 {
25dbc73a 1621 unsigned long datum;
252b5132 1622
25dbc73a
AM
1623 asec = bfd_get_section_by_name (ibfd, APUINFO_SECTION_NAME);
1624 if (asec == NULL)
1625 continue;
252b5132 1626
695344c0 1627 /* xgettext:c-format */
871b3ab2 1628 error_message = _("corrupt %s section in %pB");
25dbc73a 1629 length = asec->size;
deddc40b
NS
1630 if (length < 20)
1631 goto fail;
1632
f2faa800 1633 apuinfo_set = TRUE;
deddc40b 1634 if (largest_input_size < asec->size)
25dbc73a 1635 {
deddc40b
NS
1636 if (buffer)
1637 free (buffer);
1638 largest_input_size = asec->size;
1639 buffer = bfd_malloc (largest_input_size);
1640 if (!buffer)
1641 return;
25dbc73a 1642 }
5b914448 1643
25dbc73a 1644 if (bfd_seek (ibfd, asec->filepos, SEEK_SET) != 0
deddc40b 1645 || (bfd_bread (buffer, length, ibfd) != length))
25dbc73a 1646 {
695344c0 1647 /* xgettext:c-format */
871b3ab2 1648 error_message = _("unable to read in %s section from %pB");
25dbc73a
AM
1649 goto fail;
1650 }
252b5132 1651
25dbc73a
AM
1652 /* Verify the contents of the header. Note - we have to
1653 extract the values this way in order to allow for a
1654 host whose endian-ness is different from the target. */
deddc40b 1655 datum = bfd_get_32 (ibfd, buffer);
25dbc73a
AM
1656 if (datum != sizeof APUINFO_LABEL)
1657 goto fail;
252b5132 1658
deddc40b 1659 datum = bfd_get_32 (ibfd, buffer + 8);
25dbc73a
AM
1660 if (datum != 0x2)
1661 goto fail;
252b5132 1662
deddc40b 1663 if (strcmp (buffer + 12, APUINFO_LABEL) != 0)
25dbc73a 1664 goto fail;
252b5132 1665
25dbc73a 1666 /* Get the number of bytes used for apuinfo entries. */
deddc40b 1667 datum = bfd_get_32 (ibfd, buffer + 4);
25dbc73a
AM
1668 if (datum + 20 != length)
1669 goto fail;
1670
25dbc73a
AM
1671 /* Scan the apuinfo section, building a list of apuinfo numbers. */
1672 for (i = 0; i < datum; i += 4)
deddc40b 1673 apuinfo_list_add (bfd_get_32 (ibfd, buffer + 20 + i));
252b5132
RH
1674 }
1675
25dbc73a 1676 error_message = NULL;
252b5132 1677
f2faa800 1678 if (apuinfo_set)
deddc40b 1679 {
f2faa800
NS
1680 /* Compute the size of the output section. */
1681 unsigned num_entries = apuinfo_list_length ();
5b914448 1682
deddc40b
NS
1683 /* Set the output section size, if it exists. */
1684 asec = bfd_get_section_by_name (abfd, APUINFO_SECTION_NAME);
f2faa800 1685
fd361982 1686 if (asec && !bfd_set_section_size (asec, 20 + num_entries * 4))
deddc40b
NS
1687 {
1688 ibfd = abfd;
695344c0 1689 /* xgettext:c-format */
871b3ab2 1690 error_message = _("warning: unable to set size of %s section in %pB");
deddc40b
NS
1691 }
1692 }
25dbc73a
AM
1693
1694 fail:
deddc40b
NS
1695 if (buffer)
1696 free (buffer);
25dbc73a
AM
1697
1698 if (error_message)
cd9af601 1699 _bfd_error_handler (error_message, APUINFO_SECTION_NAME, ibfd);
25dbc73a 1700}
252b5132 1701
25dbc73a
AM
1702/* Prevent the output section from accumulating the input sections'
1703 contents. We have already stored this in our linked list structure. */
252b5132 1704
25dbc73a
AM
1705static bfd_boolean
1706ppc_elf_write_section (bfd *abfd ATTRIBUTE_UNUSED,
c7b8f16e 1707 struct bfd_link_info *link_info ATTRIBUTE_UNUSED,
25dbc73a
AM
1708 asection *asec,
1709 bfd_byte *contents ATTRIBUTE_UNUSED)
1710{
f2faa800 1711 return apuinfo_set && strcmp (asec->name, APUINFO_SECTION_NAME) == 0;
252b5132
RH
1712}
1713
25dbc73a
AM
1714/* Finally we can generate the output section. */
1715
1716static void
cc364be6 1717ppc_final_write_processing (bfd *abfd)
7619e7c7 1718{
25dbc73a
AM
1719 bfd_byte *buffer;
1720 asection *asec;
1721 unsigned i;
1722 unsigned num_entries;
1723 bfd_size_type length;
7619e7c7 1724
25dbc73a
AM
1725 asec = bfd_get_section_by_name (abfd, APUINFO_SECTION_NAME);
1726 if (asec == NULL)
1727 return;
1728
f2faa800 1729 if (!apuinfo_set)
25dbc73a
AM
1730 return;
1731
1732 length = asec->size;
1733 if (length < 20)
1734 return;
1735
1736 buffer = bfd_malloc (length);
1737 if (buffer == NULL)
7619e7c7 1738 {
4eca0228 1739 _bfd_error_handler
cf97bcb0 1740 (_("failed to allocate space for new APUinfo section"));
25dbc73a 1741 return;
7619e7c7 1742 }
7619e7c7 1743
25dbc73a
AM
1744 /* Create the apuinfo header. */
1745 num_entries = apuinfo_list_length ();
1746 bfd_put_32 (abfd, sizeof APUINFO_LABEL, buffer);
1747 bfd_put_32 (abfd, num_entries * 4, buffer + 4);
1748 bfd_put_32 (abfd, 0x2, buffer + 8);
1749 strcpy ((char *) buffer + 12, APUINFO_LABEL);
feee612b 1750
25dbc73a
AM
1751 length = 20;
1752 for (i = 0; i < num_entries; i++)
feee612b 1753 {
25dbc73a
AM
1754 bfd_put_32 (abfd, apuinfo_list_element (i), buffer + length);
1755 length += 4;
feee612b 1756 }
feee612b 1757
25dbc73a 1758 if (length != asec->size)
cf97bcb0 1759 _bfd_error_handler (_("failed to compute new APUinfo section"));
252b5132 1760
25dbc73a 1761 if (! bfd_set_section_contents (abfd, asec, buffer, (file_ptr) 0, length))
cf97bcb0 1762 _bfd_error_handler (_("failed to install new APUinfo section"));
252b5132 1763
25dbc73a
AM
1764 free (buffer);
1765
1766 apuinfo_list_finish ();
252b5132 1767}
06f44071 1768
cc364be6
AM
1769static bfd_boolean
1770ppc_elf_final_write_processing (bfd *abfd)
06f44071 1771{
cc364be6
AM
1772 ppc_final_write_processing (abfd);
1773 return _bfd_elf_final_write_processing (abfd);
06f44071 1774}
25dbc73a 1775\f
7382d32a 1776static bfd_boolean
c6dd29ce 1777is_nonpic_glink_stub (bfd *abfd, asection *glink, bfd_vma off)
7382d32a 1778{
407aa07c 1779 bfd_byte buf[4 * 4];
7382d32a 1780
9e390558 1781 if (!bfd_get_section_contents (abfd, glink, buf, off, sizeof buf))
7382d32a
AM
1782 return FALSE;
1783
c6dd29ce
AM
1784 return ((bfd_get_32 (abfd, buf + 0) & 0xffff0000) == LIS_11
1785 && (bfd_get_32 (abfd, buf + 4) & 0xffff0000) == LWZ_11_11
407aa07c
AM
1786 && bfd_get_32 (abfd, buf + 8) == MTCTR_11
1787 && bfd_get_32 (abfd, buf + 12) == BCTR);
7382d32a
AM
1788}
1789
468392fb
AM
1790static bfd_boolean
1791section_covers_vma (bfd *abfd ATTRIBUTE_UNUSED, asection *section, void *ptr)
1792{
1793 bfd_vma vma = *(bfd_vma *) ptr;
1794 return ((section->flags & SEC_ALLOC) != 0
1795 && section->vma <= vma
1796 && vma < section->vma + section->size);
1797}
1798
1799static long
1800ppc_elf_get_synthetic_symtab (bfd *abfd, long symcount, asymbol **syms,
1801 long dynsymcount, asymbol **dynsyms,
1802 asymbol **ret)
1803{
1804 bfd_boolean (*slurp_relocs) (bfd *, asection *, asymbol **, bfd_boolean);
1805 asection *plt, *relplt, *dynamic, *glink;
1806 bfd_vma glink_vma = 0;
1807 bfd_vma resolv_vma = 0;
9e390558 1808 bfd_vma stub_off;
468392fb
AM
1809 asymbol *s;
1810 arelent *p;
9ad9b810 1811 size_t count, i, stub_delta;
468392fb
AM
1812 size_t size;
1813 char *names;
1814 bfd_byte buf[4];
1815
1816 *ret = NULL;
1817
1818 if ((abfd->flags & (DYNAMIC | EXEC_P)) == 0)
1819 return 0;
1820
1821 if (dynsymcount <= 0)
1822 return 0;
1823
1824 relplt = bfd_get_section_by_name (abfd, ".rela.plt");
1825 if (relplt == NULL)
1826 return 0;
1827
1828 plt = bfd_get_section_by_name (abfd, ".plt");
1829 if (plt == NULL)
1830 return 0;
1831
1832 /* Call common code to handle old-style executable PLTs. */
1833 if (elf_section_flags (plt) & SHF_EXECINSTR)
1834 return _bfd_elf_get_synthetic_symtab (abfd, symcount, syms,
1835 dynsymcount, dynsyms, ret);
1836
1837 /* If this object was prelinked, the prelinker stored the address
1838 of .glink at got[1]. If it wasn't prelinked, got[1] will be zero. */
1839 dynamic = bfd_get_section_by_name (abfd, ".dynamic");
1840 if (dynamic != NULL)
1841 {
1842 bfd_byte *dynbuf, *extdyn, *extdynend;
1843 size_t extdynsize;
1844 void (*swap_dyn_in) (bfd *, const void *, Elf_Internal_Dyn *);
1845
1846 if (!bfd_malloc_and_get_section (abfd, dynamic, &dynbuf))
1847 return -1;
1848
1849 extdynsize = get_elf_backend_data (abfd)->s->sizeof_dyn;
1850 swap_dyn_in = get_elf_backend_data (abfd)->s->swap_dyn_in;
1851
1852 extdyn = dynbuf;
1853 extdynend = extdyn + dynamic->size;
1854 for (; extdyn < extdynend; extdyn += extdynsize)
1855 {
1856 Elf_Internal_Dyn dyn;
1857 (*swap_dyn_in) (abfd, extdyn, &dyn);
1858
1859 if (dyn.d_tag == DT_NULL)
1860 break;
1861
1862 if (dyn.d_tag == DT_PPC_GOT)
1863 {
1864 unsigned int g_o_t = dyn.d_un.d_val;
1865 asection *got = bfd_get_section_by_name (abfd, ".got");
1866 if (got != NULL
1867 && bfd_get_section_contents (abfd, got, buf,
1868 g_o_t - got->vma + 4, 4))
1869 glink_vma = bfd_get_32 (abfd, buf);
1870 break;
1871 }
1872 }
1873 free (dynbuf);
1874 }
1875
1876 /* Otherwise we read the first plt entry. */
1877 if (glink_vma == 0)
1878 {
1879 if (bfd_get_section_contents (abfd, plt, buf, 0, 4))
1880 glink_vma = bfd_get_32 (abfd, buf);
1881 }
1882
1883 if (glink_vma == 0)
1884 return 0;
1885
1886 /* The .glink section usually does not survive the final
1887 link; search for the section (usually .text) where the
1888 glink stubs now reside. */
1889 glink = bfd_sections_find_if (abfd, section_covers_vma, &glink_vma);
1890 if (glink == NULL)
1891 return 0;
1892
1893 /* Determine glink PLT resolver by reading the relative branch
1894 from the first glink stub. */
1895 if (bfd_get_section_contents (abfd, glink, buf,
1896 glink_vma - glink->vma, 4))
1897 {
1898 unsigned int insn = bfd_get_32 (abfd, buf);
1899
1900 /* The first glink stub may either branch to the resolver ... */
1901 insn ^= B;
1902 if ((insn & ~0x3fffffc) == 0)
1903 resolv_vma = glink_vma + (insn ^ 0x2000000) - 0x2000000;
1904
1905 /* ... or fall through a bunch of NOPs. */
1906 else if ((insn ^ B ^ NOP) == 0)
1907 for (i = 4;
1908 bfd_get_section_contents (abfd, glink, buf,
1909 glink_vma - glink->vma + i, 4);
1910 i += 4)
1911 if (bfd_get_32 (abfd, buf) != NOP)
1912 {
1913 resolv_vma = glink_vma + i;
1914 break;
1915 }
1916 }
1917
7382d32a 1918 count = relplt->size / sizeof (Elf32_External_Rela);
7382d32a
AM
1919 /* If the stubs are those for -shared/-pie then we might have
1920 multiple stubs for each plt entry. If that is the case then
1921 there is no way to associate stubs with their plt entries short
9e390558
AM
1922 of figuring out the GOT pointer value used in the stub.
1923 The offsets tested here need to cover all possible values of
1924 GLINK_ENTRY_SIZE for other than __tls_get_addr_opt. */
1925 stub_off = glink_vma - glink->vma;
1926 for (stub_delta = 16; stub_delta <= 32; stub_delta += 8)
1927 if (is_nonpic_glink_stub (abfd, glink, stub_off - stub_delta))
1928 break;
1929 if (stub_delta > 32)
7382d32a
AM
1930 return 0;
1931
468392fb
AM
1932 slurp_relocs = get_elf_backend_data (abfd)->s->slurp_reloc_table;
1933 if (! (*slurp_relocs) (abfd, relplt, dynsyms, TRUE))
1934 return -1;
1935
468392fb
AM
1936 size = count * sizeof (asymbol);
1937 p = relplt->relocation;
1938 for (i = 0; i < count; i++, p++)
e054468f
AM
1939 {
1940 size += strlen ((*p->sym_ptr_ptr)->name) + sizeof ("@plt");
1941 if (p->addend != 0)
1942 size += sizeof ("+0x") - 1 + 8;
1943 }
468392fb
AM
1944
1945 size += sizeof (asymbol) + sizeof ("__glink");
1946
1947 if (resolv_vma)
1948 size += sizeof (asymbol) + sizeof ("__glink_PLTresolve");
1949
1950 s = *ret = bfd_malloc (size);
1951 if (s == NULL)
1952 return -1;
1953
9e390558 1954 stub_off = glink_vma - glink->vma;
468392fb 1955 names = (char *) (s + count + 1 + (resolv_vma != 0));
1079403c
AM
1956 p = relplt->relocation + count - 1;
1957 for (i = 0; i < count; i++)
468392fb
AM
1958 {
1959 size_t len;
1960
9e390558
AM
1961 stub_off -= stub_delta;
1962 if (strcmp ((*p->sym_ptr_ptr)->name, "__tls_get_addr_opt") == 0)
1963 stub_off -= 32;
468392fb
AM
1964 *s = **p->sym_ptr_ptr;
1965 /* Undefined syms won't have BSF_LOCAL or BSF_GLOBAL set. Since
1966 we are defining a symbol, ensure one of them is set. */
1967 if ((s->flags & BSF_LOCAL) == 0)
1968 s->flags |= BSF_GLOBAL;
6ba2a415 1969 s->flags |= BSF_SYNTHETIC;
468392fb 1970 s->section = glink;
9e390558 1971 s->value = stub_off;
468392fb
AM
1972 s->name = names;
1973 s->udata.p = NULL;
1974 len = strlen ((*p->sym_ptr_ptr)->name);
1975 memcpy (names, (*p->sym_ptr_ptr)->name, len);
1976 names += len;
e054468f
AM
1977 if (p->addend != 0)
1978 {
1979 memcpy (names, "+0x", sizeof ("+0x") - 1);
1980 names += sizeof ("+0x") - 1;
1981 bfd_sprintf_vma (abfd, names, p->addend);
1982 names += strlen (names);
1983 }
468392fb
AM
1984 memcpy (names, "@plt", sizeof ("@plt"));
1985 names += sizeof ("@plt");
1986 ++s;
1079403c 1987 --p;
468392fb
AM
1988 }
1989
1990 /* Add a symbol at the start of the glink branch table. */
86a4952b 1991 memset (s, 0, sizeof *s);
468392fb 1992 s->the_bfd = abfd;
6ba2a415 1993 s->flags = BSF_GLOBAL | BSF_SYNTHETIC;
468392fb
AM
1994 s->section = glink;
1995 s->value = glink_vma - glink->vma;
1996 s->name = names;
1997 memcpy (names, "__glink", sizeof ("__glink"));
1998 names += sizeof ("__glink");
1999 s++;
2000 count++;
2001
2002 if (resolv_vma)
2003 {
2004 /* Add a symbol for the glink PLT resolver. */
86a4952b 2005 memset (s, 0, sizeof *s);
468392fb 2006 s->the_bfd = abfd;
6ba2a415 2007 s->flags = BSF_GLOBAL | BSF_SYNTHETIC;
468392fb
AM
2008 s->section = glink;
2009 s->value = resolv_vma - glink->vma;
2010 s->name = names;
2011 memcpy (names, "__glink_PLTresolve", sizeof ("__glink_PLTresolve"));
2012 names += sizeof ("__glink_PLTresolve");
2013 s++;
2014 count++;
2015 }
2016
2017 return count;
2018}
2019\f
25dbc73a
AM
2020/* The following functions are specific to the ELF linker, while
2021 functions above are used generally. They appear in this file more
2022 or less in the order in which they are called. eg.
2023 ppc_elf_check_relocs is called early in the link process,
2024 ppc_elf_finish_dynamic_sections is one of the last functions
2025 called. */
252b5132 2026
a6aa5195 2027/* Track PLT entries needed for a given symbol. We might need more
a877a2b6 2028 than one glink entry per symbol when generating a pic binary. */
a6aa5195
AM
2029struct plt_entry
2030{
2031 struct plt_entry *next;
2032
2033 /* -fPIC uses multiple GOT sections, one per file, called ".got2".
2034 This field stores the offset into .got2 used to initialise the
a877a2b6
AM
2035 GOT pointer reg. It will always be at least 32768. (Current
2036 gcc always uses an offset of 32768, but ld -r will pack .got2
2037 sections together resulting in larger offsets). */
a6aa5195
AM
2038 bfd_vma addend;
2039
2040 /* The .got2 section. */
2041 asection *sec;
2042
2043 /* PLT refcount or offset. */
2044 union
2045 {
2046 bfd_signed_vma refcount;
2047 bfd_vma offset;
2048 } plt;
2049
2050 /* .glink stub offset. */
2051 bfd_vma glink_offset;
2052};
2053
7c8bbca5
AM
2054/* Of those relocs that might be copied as dynamic relocs, this
2055 function selects those that must be copied when linking a shared
2056 library or PIE, even when the symbol is local. */
252b5132 2057
1d483afe
AM
2058static int
2059must_be_dyn_reloc (struct bfd_link_info *info,
2060 enum elf_ppc_reloc_type r_type)
2061{
2062 switch (r_type)
2063 {
2064 default:
7c8bbca5
AM
2065 /* Only relative relocs can be resolved when the object load
2066 address isn't fixed. DTPREL32 is excluded because the
2067 dynamic linker needs to differentiate global dynamic from
2068 local dynamic __tls_index pairs when PPC_OPT_TLS is set. */
1d483afe
AM
2069 return 1;
2070
2071 case R_PPC_REL24:
2072 case R_PPC_REL14:
2073 case R_PPC_REL14_BRTAKEN:
2074 case R_PPC_REL14_BRNTAKEN:
2075 case R_PPC_REL32:
2076 return 0;
2077
2078 case R_PPC_TPREL32:
2079 case R_PPC_TPREL16:
2080 case R_PPC_TPREL16_LO:
2081 case R_PPC_TPREL16_HI:
2082 case R_PPC_TPREL16_HA:
7c8bbca5
AM
2083 /* These relocations are relative but in a shared library the
2084 linker doesn't know the thread pointer base. */
2085 return bfd_link_dll (info);
1d483afe
AM
2086 }
2087}
252b5132 2088
25dbc73a
AM
2089/* If ELIMINATE_COPY_RELOCS is non-zero, the linker will try to avoid
2090 copying dynamic variables from a shared lib into an app's dynbss
2091 section, and instead use a dynamic relocation to point into the
2092 shared lib. */
2093#define ELIMINATE_COPY_RELOCS 1
252b5132 2094
f95f8542
AM
2095/* Used to track dynamic relocations for local symbols. */
2096struct ppc_dyn_relocs
2097{
2098 struct ppc_dyn_relocs *next;
2099
2100 /* The input section of the reloc. */
2101 asection *sec;
2102
2103 /* Total number of relocs copied for the input section. */
2104 unsigned int count : 31;
2105
2106 /* Whether this entry is for STT_GNU_IFUNC symbols. */
2107 unsigned int ifunc : 1;
2108};
2109
25dbc73a 2110/* PPC ELF linker hash entry. */
252b5132 2111
25dbc73a
AM
2112struct ppc_elf_link_hash_entry
2113{
2114 struct elf_link_hash_entry elf;
252b5132 2115
25dbc73a
AM
2116 /* If this symbol is used in the linker created sections, the processor
2117 specific backend uses this field to map the field into the offset
2118 from the beginning of the section. */
2119 elf_linker_section_pointers_t *linker_section_pointer;
252b5132 2120
25dbc73a 2121 /* Track dynamic relocs copied for this symbol. */
6061a67d 2122 struct elf_dyn_relocs *dyn_relocs;
252b5132 2123
37da22e5
AM
2124 /* Contexts in which symbol is used in the GOT.
2125 Bits are or'd into the mask as the corresponding relocs are
2126 encountered during check_relocs, with TLS_TLS being set when any
2127 of the other TLS bits are set. tls_optimize clears bits when
2128 optimizing to indicate the corresponding GOT entry type is not
2129 needed. If set, TLS_TLS is never cleared. tls_optimize may also
b00a0a86 2130 set TLS_GDIE when a GD reloc turns into an IE one.
37da22e5
AM
2131 These flags are also kept for local symbols. */
2132#define TLS_TLS 1 /* Any TLS reloc. */
2133#define TLS_GD 2 /* GD reloc. */
2134#define TLS_LD 4 /* LD reloc. */
2135#define TLS_TPREL 8 /* TPREL reloc, => IE. */
2136#define TLS_DTPREL 16 /* DTPREL reloc, => LD. */
2137#define TLS_MARK 32 /* __tls_get_addr call marked. */
b00a0a86 2138#define TLS_GDIE 64 /* GOT TPREL reloc resulting from GD->IE. */
bac3c8c5 2139 unsigned char tls_mask;
4dc4a9a5 2140
37da22e5
AM
2141 /* The above field is also used to mark function symbols. In which
2142 case TLS_TLS will be 0. */
2143#define PLT_IFUNC 2 /* STT_GNU_IFUNC. */
2d7ad24e 2144#define PLT_KEEP 4 /* inline plt call requires plt entry. */
37da22e5
AM
2145#define NON_GOT 256 /* local symbol plt, not stored. */
2146
4dc4a9a5
DJ
2147 /* Nonzero if we have seen a small data relocation referring to this
2148 symbol. */
d3e454b9
AM
2149 unsigned char has_sda_refs : 1;
2150
2151 /* Flag use of given relocations. */
2152 unsigned char has_addr16_ha : 1;
2153 unsigned char has_addr16_lo : 1;
25dbc73a 2154};
252b5132 2155
25dbc73a
AM
2156#define ppc_elf_hash_entry(ent) ((struct ppc_elf_link_hash_entry *) (ent))
2157
2158/* PPC ELF linker hash table. */
2159
2160struct ppc_elf_link_hash_table
2161{
2162 struct elf_link_hash_table elf;
2163
5446cbdf
AM
2164 /* Various options passed from the linker. */
2165 struct ppc_elf_params *params;
2166
25dbc73a 2167 /* Short-cuts to get to dynamic linker sections. */
d7128ce4 2168 asection *glink;
25dbc73a
AM
2169 asection *dynsbss;
2170 asection *relsbss;
c9a2f333 2171 elf_linker_section_t sdata[2];
25dbc73a 2172 asection *sbss;
6177242a 2173 asection *glink_eh_frame;
2d7ad24e
AM
2174 asection *pltlocal;
2175 asection *relpltlocal;
25dbc73a 2176
016687f8
AM
2177 /* The (unloaded but important) .rela.plt.unloaded on VxWorks. */
2178 asection *srelplt2;
2179
1d483afe 2180 /* Shortcut to __tls_get_addr. */
25dbc73a 2181 struct elf_link_hash_entry *tls_get_addr;
252b5132 2182
016687f8
AM
2183 /* The bfd that forced an old-style PLT. */
2184 bfd *old_bfd;
5b914448 2185
25dbc73a
AM
2186 /* TLS local dynamic got entry handling. */
2187 union {
2188 bfd_signed_vma refcount;
2189 bfd_vma offset;
2190 } tlsld_got;
252b5132 2191
c6dd29ce 2192 /* Offset of branch table to PltResolve function in glink. */
d7128ce4
AM
2193 bfd_vma glink_pltresolve;
2194
3b36f7e6
AM
2195 /* Size of reserved GOT entries. */
2196 unsigned int got_header_size;
2197 /* Non-zero if allocating the header left a gap. */
2198 unsigned int got_gap;
2199
4a3dc543
RS
2200 /* The type of PLT we have chosen to use. */
2201 enum ppc_elf_plt_type plt_type;
2202
9d8504b1 2203 /* True if the target system is VxWorks. */
016687f8 2204 unsigned int is_vxworks:1;
9d8504b1 2205
82e66161
AM
2206 /* Whether there exist local gnu indirect function resolvers,
2207 referenced by dynamic relocations. */
2208 unsigned int local_ifunc_resolver:1;
2209 unsigned int maybe_local_ifunc_resolver:1;
2210
9a23f96e
AM
2211 /* Set if tls optimization is enabled. */
2212 unsigned int do_tls_opt:1;
2213
3e04d765
AM
2214 /* Set if inline plt calls should be converted to direct calls. */
2215 unsigned int can_convert_all_inline_plt:1;
2216
9d8504b1
PB
2217 /* The size of PLT entries. */
2218 int plt_entry_size;
2219 /* The distance between adjacent PLT slots. */
2220 int plt_slot_size;
2221 /* The size of the first PLT entry. */
2222 int plt_initial_entry_size;
016687f8 2223
87d72d41
AM
2224 /* Small local sym cache. */
2225 struct sym_cache sym_cache;
25dbc73a 2226};
252b5132 2227
94caa966
AM
2228/* Rename some of the generic section flags to better document how they
2229 are used for ppc32. The flags are only valid for ppc32 elf objects. */
2230
2231/* Nonzero if this section has TLS related relocations. */
2232#define has_tls_reloc sec_flg0
2233
9737e8af
AM
2234/* Nonzero if this section has a call to __tls_get_addr lacking marker
2235 relocs. */
2236#define nomark_tls_get_addr sec_flg1
94caa966 2237
3e04d765
AM
2238 /* Flag set when PLTCALL relocs are detected. */
2239#define has_pltcall sec_flg2
2240
25dbc73a 2241/* Get the PPC ELF linker hash table from a link_info structure. */
252b5132 2242
25dbc73a 2243#define ppc_elf_hash_table(p) \
4dfe6ac6
NC
2244 (elf_hash_table_id ((struct elf_link_hash_table *) ((p)->hash)) \
2245 == PPC32_ELF_DATA ? ((struct ppc_elf_link_hash_table *) ((p)->hash)) : NULL)
252b5132 2246
25dbc73a 2247/* Create an entry in a PPC ELF linker hash table. */
252b5132 2248
25dbc73a
AM
2249static struct bfd_hash_entry *
2250ppc_elf_link_hash_newfunc (struct bfd_hash_entry *entry,
2251 struct bfd_hash_table *table,
2252 const char *string)
252b5132 2253{
25dbc73a
AM
2254 /* Allocate the structure if it has not already been allocated by a
2255 subclass. */
2256 if (entry == NULL)
2257 {
2258 entry = bfd_hash_allocate (table,
2259 sizeof (struct ppc_elf_link_hash_entry));
2260 if (entry == NULL)
2261 return entry;
2262 }
252b5132 2263
25dbc73a
AM
2264 /* Call the allocation method of the superclass. */
2265 entry = _bfd_elf_link_hash_newfunc (entry, table, string);
2266 if (entry != NULL)
2267 {
2268 ppc_elf_hash_entry (entry)->linker_section_pointer = NULL;
2269 ppc_elf_hash_entry (entry)->dyn_relocs = NULL;
2270 ppc_elf_hash_entry (entry)->tls_mask = 0;
5240d94d 2271 ppc_elf_hash_entry (entry)->has_sda_refs = 0;
25dbc73a 2272 }
252b5132 2273
25dbc73a 2274 return entry;
252b5132 2275}
3dab13f6 2276
25dbc73a 2277/* Create a PPC ELF linker hash table. */
3dab13f6 2278
25dbc73a
AM
2279static struct bfd_link_hash_table *
2280ppc_elf_link_hash_table_create (bfd *abfd)
3dab13f6 2281{
25dbc73a 2282 struct ppc_elf_link_hash_table *ret;
76e7a751 2283 static struct ppc_elf_params default_params
407aa07c 2284 = { PLT_OLD, 0, 0, 1, 0, 0, 12, 0, 0, 0 };
3dab13f6 2285
25dbc73a
AM
2286 ret = bfd_zmalloc (sizeof (struct ppc_elf_link_hash_table));
2287 if (ret == NULL)
2288 return NULL;
3dab13f6 2289
66eb6687
AM
2290 if (!_bfd_elf_link_hash_table_init (&ret->elf, abfd,
2291 ppc_elf_link_hash_newfunc,
4dfe6ac6
NC
2292 sizeof (struct ppc_elf_link_hash_entry),
2293 PPC32_ELF_DATA))
3dab13f6 2294 {
25dbc73a
AM
2295 free (ret);
2296 return NULL;
2297 }
58111eb7 2298
a6aa5195
AM
2299 ret->elf.init_plt_refcount.refcount = 0;
2300 ret->elf.init_plt_refcount.glist = NULL;
2301 ret->elf.init_plt_offset.offset = 0;
2302 ret->elf.init_plt_offset.glist = NULL;
2303
db434ba0
AM
2304 ret->params = &default_params;
2305
c9a2f333
AM
2306 ret->sdata[0].name = ".sdata";
2307 ret->sdata[0].sym_name = "_SDA_BASE_";
2308 ret->sdata[0].bss_name = ".sbss";
2309
2310 ret->sdata[1].name = ".sdata2";
2311 ret->sdata[1].sym_name = "_SDA2_BASE_";
2312 ret->sdata[1].bss_name = ".sbss2";
2313
9d8504b1
PB
2314 ret->plt_entry_size = 12;
2315 ret->plt_slot_size = 8;
2316 ret->plt_initial_entry_size = 72;
9d8504b1 2317
25dbc73a
AM
2318 return &ret->elf.root;
2319}
3dab13f6 2320
5446cbdf
AM
2321/* Hook linker params into hash table. */
2322
2323void
2324ppc_elf_link_params (struct bfd_link_info *info, struct ppc_elf_params *params)
2325{
2326 struct ppc_elf_link_hash_table *htab = ppc_elf_hash_table (info);
2327
2328 if (htab)
2329 htab->params = params;
76e7a751 2330 params->pagesize_p2 = bfd_log2 (params->pagesize);
5446cbdf
AM
2331}
2332
9d8504b1 2333/* Create .got and the related sections. */
3dab13f6 2334
25dbc73a
AM
2335static bfd_boolean
2336ppc_elf_create_got (bfd *abfd, struct bfd_link_info *info)
2337{
2338 struct ppc_elf_link_hash_table *htab;
3dab13f6 2339
25dbc73a
AM
2340 if (!_bfd_elf_create_got_section (abfd, info))
2341 return FALSE;
3dab13f6 2342
25dbc73a 2343 htab = ppc_elf_hash_table (info);
ce558b89 2344 if (!htab->is_vxworks)
9d8504b1
PB
2345 {
2346 /* The powerpc .got has a blrl instruction in it. Mark it
2347 executable. */
ce558b89
AM
2348 flagword flags = (SEC_ALLOC | SEC_LOAD | SEC_CODE | SEC_HAS_CONTENTS
2349 | SEC_IN_MEMORY | SEC_LINKER_CREATED);
fd361982 2350 if (!bfd_set_section_flags (htab->elf.sgot, flags))
9d8504b1
PB
2351 return FALSE;
2352 }
3dab13f6 2353
25dbc73a
AM
2354 return TRUE;
2355}
3dab13f6 2356
93d1b056
AM
2357/* Create a special linker section, used for R_PPC_EMB_SDAI16 and
2358 R_PPC_EMB_SDA2I16 pointers. These sections become part of .sdata
2359 and .sdata2. Create _SDA_BASE_ and _SDA2_BASE too. */
2360
2361static bfd_boolean
2362ppc_elf_create_linker_section (bfd *abfd,
2363 struct bfd_link_info *info,
2364 flagword flags,
2365 elf_linker_section_t *lsect)
2366{
2367 asection *s;
2368
2369 flags |= (SEC_ALLOC | SEC_LOAD | SEC_HAS_CONTENTS | SEC_IN_MEMORY
2370 | SEC_LINKER_CREATED);
2371
2372 s = bfd_make_section_anyway_with_flags (abfd, lsect->name, flags);
2373 if (s == NULL)
2374 return FALSE;
2375 lsect->section = s;
2376
2377 /* Define the sym on the first section of this name. */
2378 s = bfd_get_section_by_name (abfd, lsect->name);
2379
2380 lsect->sym = _bfd_elf_define_linkage_sym (abfd, info, s, lsect->sym_name);
2381 if (lsect->sym == NULL)
2382 return FALSE;
2383 lsect->sym->root.u.def.value = 0x8000;
2384 return TRUE;
2385}
2386
e054468f
AM
2387static bfd_boolean
2388ppc_elf_create_glink (bfd *abfd, struct bfd_link_info *info)
2389{
2390 struct ppc_elf_link_hash_table *htab = ppc_elf_hash_table (info);
2391 asection *s;
2392 flagword flags;
691d2e9a 2393 int p2align;
e054468f
AM
2394
2395 flags = (SEC_ALLOC | SEC_LOAD | SEC_CODE | SEC_READONLY | SEC_HAS_CONTENTS
2396 | SEC_IN_MEMORY | SEC_LINKER_CREATED);
2397 s = bfd_make_section_anyway_with_flags (abfd, ".glink", flags);
2398 htab->glink = s;
691d2e9a
AM
2399 p2align = htab->params->ppc476_workaround ? 6 : 4;
2400 if (p2align < htab->params->plt_stub_align)
2401 p2align = htab->params->plt_stub_align;
e054468f 2402 if (s == NULL
fd361982 2403 || !bfd_set_section_alignment (s, p2align))
e054468f
AM
2404 return FALSE;
2405
6177242a
AM
2406 if (!info->no_ld_generated_unwind_info)
2407 {
2408 flags = (SEC_ALLOC | SEC_LOAD | SEC_READONLY | SEC_HAS_CONTENTS
2409 | SEC_IN_MEMORY | SEC_LINKER_CREATED);
2410 s = bfd_make_section_anyway_with_flags (abfd, ".eh_frame", flags);
2411 htab->glink_eh_frame = s;
2412 if (s == NULL
fd361982 2413 || !bfd_set_section_alignment (s, 2))
6177242a
AM
2414 return FALSE;
2415 }
2416
e054468f
AM
2417 flags = SEC_ALLOC | SEC_LINKER_CREATED;
2418 s = bfd_make_section_anyway_with_flags (abfd, ".iplt", flags);
ce558b89 2419 htab->elf.iplt = s;
e054468f 2420 if (s == NULL
fd361982 2421 || !bfd_set_section_alignment (s, 4))
e054468f
AM
2422 return FALSE;
2423
2424 flags = (SEC_ALLOC | SEC_LOAD | SEC_READONLY | SEC_HAS_CONTENTS
2425 | SEC_IN_MEMORY | SEC_LINKER_CREATED);
14b2f831 2426 s = bfd_make_section_anyway_with_flags (abfd, ".rela.iplt", flags);
ce558b89 2427 htab->elf.irelplt = s;
e054468f 2428 if (s == NULL
fd361982 2429 || ! bfd_set_section_alignment (s, 2))
e054468f 2430 return FALSE;
93d1b056 2431
2d7ad24e
AM
2432 /* Local plt entries. */
2433 flags = (SEC_ALLOC | SEC_LOAD
2434 | SEC_HAS_CONTENTS | SEC_IN_MEMORY | SEC_LINKER_CREATED);
2435 htab->pltlocal = bfd_make_section_anyway_with_flags (abfd, ".branch_lt",
2436 flags);
2437 if (htab->pltlocal == NULL
fd361982 2438 || !bfd_set_section_alignment (htab->pltlocal, 2))
2d7ad24e
AM
2439 return FALSE;
2440
2441 if (bfd_link_pic (info))
2442 {
2443 flags = (SEC_ALLOC | SEC_LOAD | SEC_READONLY
2444 | SEC_HAS_CONTENTS | SEC_IN_MEMORY | SEC_LINKER_CREATED);
2445 htab->relpltlocal
2446 = bfd_make_section_anyway_with_flags (abfd, ".rela.branch_lt", flags);
2447 if (htab->relpltlocal == NULL
fd361982 2448 || !bfd_set_section_alignment (htab->relpltlocal, 2))
2d7ad24e
AM
2449 return FALSE;
2450 }
2451
93d1b056
AM
2452 if (!ppc_elf_create_linker_section (abfd, info, 0,
2453 &htab->sdata[0]))
2454 return FALSE;
2455
2456 if (!ppc_elf_create_linker_section (abfd, info, SEC_READONLY,
2457 &htab->sdata[1]))
2458 return FALSE;
2459
e054468f
AM
2460 return TRUE;
2461}
2462
25dbc73a
AM
2463/* We have to create .dynsbss and .rela.sbss here so that they get mapped
2464 to output sections (just like _bfd_elf_create_dynamic_sections has
2465 to create .dynbss and .rela.bss). */
3dab13f6 2466
25dbc73a
AM
2467static bfd_boolean
2468ppc_elf_create_dynamic_sections (bfd *abfd, struct bfd_link_info *info)
2469{
2470 struct ppc_elf_link_hash_table *htab;
2471 asection *s;
2472 flagword flags;
3dab13f6 2473
25dbc73a 2474 htab = ppc_elf_hash_table (info);
3dab13f6 2475
ce558b89 2476 if (htab->elf.sgot == NULL
25dbc73a 2477 && !ppc_elf_create_got (abfd, info))
3dab13f6
AM
2478 return FALSE;
2479
25dbc73a
AM
2480 if (!_bfd_elf_create_dynamic_sections (abfd, info))
2481 return FALSE;
3dab13f6 2482
e054468f
AM
2483 if (htab->glink == NULL
2484 && !ppc_elf_create_glink (abfd, info))
d7128ce4 2485 return FALSE;
3dab13f6 2486
14b2f831
AM
2487 s = bfd_make_section_anyway_with_flags (abfd, ".dynsbss",
2488 SEC_ALLOC | SEC_LINKER_CREATED);
3b36f7e6 2489 htab->dynsbss = s;
3496cb2a 2490 if (s == NULL)
25dbc73a 2491 return FALSE;
3dab13f6 2492
0e1862bb 2493 if (! bfd_link_pic (info))
25dbc73a 2494 {
e054468f
AM
2495 flags = (SEC_ALLOC | SEC_LOAD | SEC_READONLY | SEC_HAS_CONTENTS
2496 | SEC_IN_MEMORY | SEC_LINKER_CREATED);
14b2f831 2497 s = bfd_make_section_anyway_with_flags (abfd, ".rela.sbss", flags);
3b36f7e6 2498 htab->relsbss = s;
25dbc73a 2499 if (s == NULL
fd361982 2500 || !bfd_set_section_alignment (s, 2))
25dbc73a
AM
2501 return FALSE;
2502 }
3dab13f6 2503
711de32c
RS
2504 if (htab->is_vxworks
2505 && !elf_vxworks_create_dynamic_sections (abfd, info, &htab->srelplt2))
2506 return FALSE;
9d8504b1 2507
ce558b89 2508 s = htab->elf.splt;
3b36f7e6 2509 flags = SEC_ALLOC | SEC_CODE | SEC_LINKER_CREATED;
4a3dc543
RS
2510 if (htab->plt_type == PLT_VXWORKS)
2511 /* The VxWorks PLT is a loaded section with contents. */
2512 flags |= SEC_HAS_CONTENTS | SEC_LOAD | SEC_READONLY;
fd361982 2513 return bfd_set_section_flags (s, flags);
25dbc73a 2514}
3dab13f6 2515
25dbc73a 2516/* Copy the extra info we tack onto an elf_link_hash_entry. */
58111eb7 2517
25dbc73a 2518static void
fcfa13d2 2519ppc_elf_copy_indirect_symbol (struct bfd_link_info *info,
25dbc73a
AM
2520 struct elf_link_hash_entry *dir,
2521 struct elf_link_hash_entry *ind)
2522{
2523 struct ppc_elf_link_hash_entry *edir, *eind;
3dab13f6 2524
25dbc73a
AM
2525 edir = (struct ppc_elf_link_hash_entry *) dir;
2526 eind = (struct ppc_elf_link_hash_entry *) ind;
3dab13f6 2527
c79d6685
AM
2528 edir->tls_mask |= eind->tls_mask;
2529 edir->has_sda_refs |= eind->has_sda_refs;
2530
e81830c5
AM
2531 if (edir->elf.versioned != versioned_hidden)
2532 edir->elf.ref_dynamic |= eind->elf.ref_dynamic;
c79d6685
AM
2533 edir->elf.ref_regular |= eind->elf.ref_regular;
2534 edir->elf.ref_regular_nonweak |= eind->elf.ref_regular_nonweak;
4a7e5234 2535 edir->elf.non_got_ref |= eind->elf.non_got_ref;
c79d6685
AM
2536 edir->elf.needs_plt |= eind->elf.needs_plt;
2537 edir->elf.pointer_equality_needed |= eind->elf.pointer_equality_needed;
2538
287c7eaf
AM
2539 /* If we were called to copy over info for a weak sym, that's all. */
2540 if (eind->elf.root.type != bfd_link_hash_indirect)
2541 return;
2542
25dbc73a
AM
2543 if (eind->dyn_relocs != NULL)
2544 {
2545 if (edir->dyn_relocs != NULL)
3dab13f6 2546 {
6061a67d
AM
2547 struct elf_dyn_relocs **pp;
2548 struct elf_dyn_relocs *p;
3dab13f6 2549
fcfa13d2 2550 /* Add reloc counts against the indirect sym to the direct sym
25dbc73a
AM
2551 list. Merge any entries against the same section. */
2552 for (pp = &eind->dyn_relocs; (p = *pp) != NULL; )
3dab13f6 2553 {
6061a67d 2554 struct elf_dyn_relocs *q;
25dbc73a
AM
2555
2556 for (q = edir->dyn_relocs; q != NULL; q = q->next)
2557 if (q->sec == p->sec)
2558 {
2559 q->pc_count += p->pc_count;
2560 q->count += p->count;
2561 *pp = p->next;
2562 break;
2563 }
2564 if (q == NULL)
2565 pp = &p->next;
3dab13f6 2566 }
25dbc73a 2567 *pp = edir->dyn_relocs;
3dab13f6 2568 }
25dbc73a
AM
2569
2570 edir->dyn_relocs = eind->dyn_relocs;
2571 eind->dyn_relocs = NULL;
3dab13f6 2572 }
3dab13f6 2573
a6aa5195
AM
2574 /* Copy over the GOT refcount entries that we may have already seen to
2575 the symbol which just became indirect. */
fcfa13d2
AM
2576 edir->elf.got.refcount += eind->elf.got.refcount;
2577 eind->elf.got.refcount = 0;
a6aa5195
AM
2578
2579 /* And plt entries. */
2580 if (eind->elf.plt.plist != NULL)
2581 {
2582 if (edir->elf.plt.plist != NULL)
2583 {
2584 struct plt_entry **entp;
2585 struct plt_entry *ent;
2586
2587 for (entp = &eind->elf.plt.plist; (ent = *entp) != NULL; )
2588 {
2589 struct plt_entry *dent;
2590
2591 for (dent = edir->elf.plt.plist; dent != NULL; dent = dent->next)
2592 if (dent->sec == ent->sec && dent->addend == ent->addend)
2593 {
2594 dent->plt.refcount += ent->plt.refcount;
2595 *entp = ent->next;
2596 break;
2597 }
2598 if (dent == NULL)
2599 entp = &ent->next;
2600 }
2601 *entp = edir->elf.plt.plist;
2602 }
2603
2604 edir->elf.plt.plist = eind->elf.plt.plist;
2605 eind->elf.plt.plist = NULL;
2606 }
2607
fcfa13d2 2608 if (eind->elf.dynindx != -1)
25dbc73a 2609 {
fcfa13d2
AM
2610 if (edir->elf.dynindx != -1)
2611 _bfd_elf_strtab_delref (elf_hash_table (info)->dynstr,
2612 edir->elf.dynstr_index);
a6aa5195
AM
2613 edir->elf.dynindx = eind->elf.dynindx;
2614 edir->elf.dynstr_index = eind->elf.dynstr_index;
2615 eind->elf.dynindx = -1;
2616 eind->elf.dynstr_index = 0;
25dbc73a 2617 }
25dbc73a 2618}
3dab13f6 2619
25dbc73a
AM
2620/* Hook called by the linker routine which adds symbols from an object
2621 file. We use it to put .comm items in .sbss, and not .bss. */
58111eb7 2622
25dbc73a
AM
2623static bfd_boolean
2624ppc_elf_add_symbol_hook (bfd *abfd,
2625 struct bfd_link_info *info,
2626 Elf_Internal_Sym *sym,
2627 const char **namep ATTRIBUTE_UNUSED,
2628 flagword *flagsp ATTRIBUTE_UNUSED,
2629 asection **secp,
2630 bfd_vma *valp)
2631{
2632 if (sym->st_shndx == SHN_COMMON
0e1862bb 2633 && !bfd_link_relocatable (info)
0c8d6e5c
AM
2634 && is_ppc_elf (info->output_bfd)
2635 && sym->st_size <= elf_gp_size (abfd))
25dbc73a
AM
2636 {
2637 /* Common symbols less than or equal to -G nn bytes are automatically
2638 put into .sbss. */
2639 struct ppc_elf_link_hash_table *htab;
3dab13f6 2640
25dbc73a
AM
2641 htab = ppc_elf_hash_table (info);
2642 if (htab->sbss == NULL)
2643 {
644285ef 2644 flagword flags = SEC_IS_COMMON | SEC_LINKER_CREATED;
3dab13f6 2645
644285ef
AM
2646 if (!htab->elf.dynobj)
2647 htab->elf.dynobj = abfd;
2648
3496cb2a
L
2649 htab->sbss = bfd_make_section_anyway_with_flags (htab->elf.dynobj,
2650 ".sbss",
2651 flags);
2652 if (htab->sbss == NULL)
25dbc73a 2653 return FALSE;
3dab13f6 2654 }
3dab13f6 2655
25dbc73a
AM
2656 *secp = htab->sbss;
2657 *valp = sym->st_size;
2658 }
3dab13f6 2659
25dbc73a 2660 return TRUE;
3dab13f6
AM
2661}
2662\f
25dbc73a
AM
2663/* Find a linker generated pointer with a given addend and type. */
2664
2665static elf_linker_section_pointers_t *
2666elf_find_pointer_linker_section
2667 (elf_linker_section_pointers_t *linker_pointers,
2668 bfd_vma addend,
2669 elf_linker_section_t *lsect)
252b5132 2670{
25dbc73a
AM
2671 for ( ; linker_pointers != NULL; linker_pointers = linker_pointers->next)
2672 if (lsect == linker_pointers->lsect && addend == linker_pointers->addend)
2673 return linker_pointers;
252b5132 2674
25dbc73a
AM
2675 return NULL;
2676}
2677
2678/* Allocate a pointer to live in a linker created section. */
2679
2680static bfd_boolean
93d1b056
AM
2681elf_allocate_pointer_linker_section (bfd *abfd,
2682 elf_linker_section_t *lsect,
2683 struct elf_link_hash_entry *h,
2684 const Elf_Internal_Rela *rel)
25dbc73a
AM
2685{
2686 elf_linker_section_pointers_t **ptr_linker_section_ptr = NULL;
2687 elf_linker_section_pointers_t *linker_section_ptr;
2688 unsigned long r_symndx = ELF32_R_SYM (rel->r_info);
2689 bfd_size_type amt;
2690
2691 BFD_ASSERT (lsect != NULL);
2692
2693 /* Is this a global symbol? */
2694 if (h != NULL)
2695 {
2696 struct ppc_elf_link_hash_entry *eh;
2697
2698 /* Has this symbol already been allocated? If so, our work is done. */
2699 eh = (struct ppc_elf_link_hash_entry *) h;
2700 if (elf_find_pointer_linker_section (eh->linker_section_pointer,
2701 rel->r_addend,
2702 lsect))
2703 return TRUE;
2704
2705 ptr_linker_section_ptr = &eh->linker_section_pointer;
25dbc73a
AM
2706 }
2707 else
2708 {
0c8d6e5c 2709 BFD_ASSERT (is_ppc_elf (abfd));
0ffa91dd 2710
25dbc73a
AM
2711 /* Allocation of a pointer to a local symbol. */
2712 elf_linker_section_pointers_t **ptr = elf_local_ptr_offsets (abfd);
2713
2714 /* Allocate a table to hold the local symbols if first time. */
2715 if (!ptr)
2716 {
0ffa91dd 2717 unsigned int num_symbols = elf_symtab_hdr (abfd).sh_info;
25dbc73a
AM
2718
2719 amt = num_symbols;
2720 amt *= sizeof (elf_linker_section_pointers_t *);
2721 ptr = bfd_zalloc (abfd, amt);
2722
2723 if (!ptr)
2724 return FALSE;
2725
2726 elf_local_ptr_offsets (abfd) = ptr;
2727 }
2728
2729 /* Has this symbol already been allocated? If so, our work is done. */
2730 if (elf_find_pointer_linker_section (ptr[r_symndx],
2731 rel->r_addend,
2732 lsect))
2733 return TRUE;
252b5132 2734
25dbc73a 2735 ptr_linker_section_ptr = &ptr[r_symndx];
25dbc73a 2736 }
41fcb14e 2737
25dbc73a
AM
2738 /* Allocate space for a pointer in the linker section, and allocate
2739 a new pointer record from internal memory. */
2740 BFD_ASSERT (ptr_linker_section_ptr != NULL);
2741 amt = sizeof (elf_linker_section_pointers_t);
2742 linker_section_ptr = bfd_alloc (abfd, amt);
41fcb14e 2743
25dbc73a 2744 if (!linker_section_ptr)
7619e7c7 2745 return FALSE;
41fcb14e 2746
25dbc73a
AM
2747 linker_section_ptr->next = *ptr_linker_section_ptr;
2748 linker_section_ptr->addend = rel->r_addend;
2749 linker_section_ptr->lsect = lsect;
25dbc73a 2750 *ptr_linker_section_ptr = linker_section_ptr;
41fcb14e 2751
fd361982 2752 if (!bfd_set_section_alignment (lsect->section, 2))
93d1b056 2753 return FALSE;
25dbc73a
AM
2754 linker_section_ptr->offset = lsect->section->size;
2755 lsect->section->size += 4;
7619e7c7 2756
25dbc73a
AM
2757#ifdef DEBUG
2758 fprintf (stderr,
2759 "Create pointer in linker section %s, offset = %ld, section size = %ld\n",
2760 lsect->name, (long) linker_section_ptr->offset,
2761 (long) lsect->section->size);
2762#endif
7619e7c7
AM
2763
2764 return TRUE;
41fcb14e
AM
2765}
2766
e054468f 2767static struct plt_entry **
25dbc73a
AM
2768update_local_sym_info (bfd *abfd,
2769 Elf_Internal_Shdr *symtab_hdr,
2770 unsigned long r_symndx,
2771 int tls_type)
252b5132 2772{
25dbc73a 2773 bfd_signed_vma *local_got_refcounts = elf_local_got_refcounts (abfd);
e054468f 2774 struct plt_entry **local_plt;
bac3c8c5 2775 unsigned char *local_got_tls_masks;
252b5132 2776
25dbc73a 2777 if (local_got_refcounts == NULL)
252b5132 2778 {
25dbc73a
AM
2779 bfd_size_type size = symtab_hdr->sh_info;
2780
e054468f
AM
2781 size *= (sizeof (*local_got_refcounts)
2782 + sizeof (*local_plt)
2783 + sizeof (*local_got_tls_masks));
25dbc73a
AM
2784 local_got_refcounts = bfd_zalloc (abfd, size);
2785 if (local_got_refcounts == NULL)
e054468f 2786 return NULL;
25dbc73a 2787 elf_local_got_refcounts (abfd) = local_got_refcounts;
252b5132 2788 }
41fcb14e 2789
e054468f 2790 local_plt = (struct plt_entry **) (local_got_refcounts + symtab_hdr->sh_info);
bac3c8c5 2791 local_got_tls_masks = (unsigned char *) (local_plt + symtab_hdr->sh_info);
37da22e5
AM
2792 local_got_tls_masks[r_symndx] |= tls_type & 0xff;
2793 if ((tls_type & NON_GOT) == 0)
e054468f
AM
2794 local_got_refcounts[r_symndx] += 1;
2795 return local_plt + r_symndx;
25dbc73a 2796}
41fcb14e 2797
a6aa5195 2798static bfd_boolean
3ec01793 2799update_plt_info (bfd *abfd, struct plt_entry **plist,
a6aa5195
AM
2800 asection *sec, bfd_vma addend)
2801{
2802 struct plt_entry *ent;
2803
32af9f6e
AM
2804 if (addend < 32768)
2805 sec = NULL;
3ec01793 2806 for (ent = *plist; ent != NULL; ent = ent->next)
a6aa5195
AM
2807 if (ent->sec == sec && ent->addend == addend)
2808 break;
2809 if (ent == NULL)
2810 {
986f0783 2811 size_t amt = sizeof (*ent);
a6aa5195
AM
2812 ent = bfd_alloc (abfd, amt);
2813 if (ent == NULL)
2814 return FALSE;
3ec01793 2815 ent->next = *plist;
a6aa5195
AM
2816 ent->sec = sec;
2817 ent->addend = addend;
2818 ent->plt.refcount = 0;
3ec01793 2819 *plist = ent;
a6aa5195
AM
2820 }
2821 ent->plt.refcount += 1;
2822 return TRUE;
2823}
2824
2825static struct plt_entry *
3ec01793 2826find_plt_ent (struct plt_entry **plist, asection *sec, bfd_vma addend)
a6aa5195
AM
2827{
2828 struct plt_entry *ent;
2829
2830 if (addend < 32768)
2831 sec = NULL;
3ec01793 2832 for (ent = *plist; ent != NULL; ent = ent->next)
a6aa5195
AM
2833 if (ent->sec == sec && ent->addend == addend)
2834 break;
2835 return ent;
2836}
2837
e054468f
AM
2838static bfd_boolean
2839is_branch_reloc (enum elf_ppc_reloc_type r_type)
2840{
2841 return (r_type == R_PPC_PLTREL24
2842 || r_type == R_PPC_LOCAL24PC
2843 || r_type == R_PPC_REL24
2844 || r_type == R_PPC_REL14
2845 || r_type == R_PPC_REL14_BRTAKEN
2846 || r_type == R_PPC_REL14_BRNTAKEN
2847 || r_type == R_PPC_ADDR24
2848 || r_type == R_PPC_ADDR14
2849 || r_type == R_PPC_ADDR14_BRTAKEN
dfdaec14
AJ
2850 || r_type == R_PPC_ADDR14_BRNTAKEN
2851 || r_type == R_PPC_VLE_REL24);
e054468f
AM
2852}
2853
23cedd1d
AM
2854/* Relocs on inline plt call sequence insns prior to the call. */
2855
2856static bfd_boolean
2857is_plt_seq_reloc (enum elf_ppc_reloc_type r_type)
2858{
2859 return (r_type == R_PPC_PLT16_HA
2860 || r_type == R_PPC_PLT16_HI
2861 || r_type == R_PPC_PLT16_LO
2862 || r_type == R_PPC_PLTSEQ);
2863}
2864
25dbc73a
AM
2865static void
2866bad_shared_reloc (bfd *abfd, enum elf_ppc_reloc_type r_type)
2867{
4eca0228 2868 _bfd_error_handler
695344c0 2869 /* xgettext:c-format */
871b3ab2 2870 (_("%pB: relocation %s cannot be used when making a shared object"),
25dbc73a
AM
2871 abfd,
2872 ppc_elf_howto_table[r_type]->name);
2873 bfd_set_error (bfd_error_bad_value);
252b5132
RH
2874}
2875
25dbc73a
AM
2876/* Look through the relocs for a section during the first phase, and
2877 allocate space in the global offset table or procedure linkage
2878 table. */
252b5132 2879
b34976b6 2880static bfd_boolean
25dbc73a
AM
2881ppc_elf_check_relocs (bfd *abfd,
2882 struct bfd_link_info *info,
2883 asection *sec,
2884 const Elf_Internal_Rela *relocs)
252b5132 2885{
7619e7c7 2886 struct ppc_elf_link_hash_table *htab;
25dbc73a
AM
2887 Elf_Internal_Shdr *symtab_hdr;
2888 struct elf_link_hash_entry **sym_hashes;
2889 const Elf_Internal_Rela *rel;
2890 const Elf_Internal_Rela *rel_end;
a6aa5195 2891 asection *got2, *sreloc;
727fc41e 2892 struct elf_link_hash_entry *tga;
25dbc73a 2893
0e1862bb 2894 if (bfd_link_relocatable (info))
25dbc73a 2895 return TRUE;
252b5132 2896
c87b5a93
AM
2897 /* Don't do anything special with non-loaded, non-alloced sections.
2898 In particular, any relocs in such sections should not affect GOT
2899 and PLT reference counting (ie. we don't allow them to create GOT
2900 or PLT entries), there's no possibility or desire to optimize TLS
2901 relocs, and there's not much point in propagating relocs to shared
2902 libs that the dynamic linker won't relocate. */
2903 if ((sec->flags & SEC_ALLOC) == 0)
2904 return TRUE;
2905
252b5132 2906#ifdef DEBUG
871b3ab2 2907 _bfd_error_handler ("ppc_elf_check_relocs called for section %pA in %pB",
25dbc73a 2908 sec, abfd);
252b5132
RH
2909#endif
2910
0c8d6e5c 2911 BFD_ASSERT (is_ppc_elf (abfd));
0ffa91dd 2912
25dbc73a
AM
2913 /* Initialize howto table if not already done. */
2914 if (!ppc_elf_howto_table[R_PPC_ADDR32])
2915 ppc_elf_howto_init ();
2916
7619e7c7 2917 htab = ppc_elf_hash_table (info);
25f23106
AM
2918 if (htab->glink == NULL)
2919 {
2920 if (htab->elf.dynobj == NULL)
2921 htab->elf.dynobj = abfd;
2922 if (!ppc_elf_create_glink (htab->elf.dynobj, info))
2923 return FALSE;
2924 }
727fc41e
AM
2925 tga = elf_link_hash_lookup (&htab->elf, "__tls_get_addr",
2926 FALSE, FALSE, TRUE);
0ffa91dd 2927 symtab_hdr = &elf_symtab_hdr (abfd);
25dbc73a 2928 sym_hashes = elf_sym_hashes (abfd);
a6aa5195 2929 got2 = bfd_get_section_by_name (abfd, ".got2");
25dbc73a
AM
2930 sreloc = NULL;
2931
2932 rel_end = relocs + sec->reloc_count;
2933 for (rel = relocs; rel < rel_end; rel++)
2934 {
2935 unsigned long r_symndx;
2936 enum elf_ppc_reloc_type r_type;
2937 struct elf_link_hash_entry *h;
727fc41e 2938 int tls_type;
cbf95972 2939 struct plt_entry **ifunc;
2d7ad24e
AM
2940 struct plt_entry **pltent;
2941 bfd_vma addend;
25dbc73a
AM
2942
2943 r_symndx = ELF32_R_SYM (rel->r_info);
2944 if (r_symndx < symtab_hdr->sh_info)
2945 h = NULL;
2946 else
973a3492
L
2947 {
2948 h = sym_hashes[r_symndx - symtab_hdr->sh_info];
2949 while (h->root.type == bfd_link_hash_indirect
2950 || h->root.type == bfd_link_hash_warning)
2951 h = (struct elf_link_hash_entry *) h->root.u.i.link;
2952 }
25dbc73a
AM
2953
2954 /* If a relocation refers to _GLOBAL_OFFSET_TABLE_, create the .got.
2955 This shows up in particular in an R_PPC_ADDR32 in the eabi
2956 startup code. */
3b36f7e6 2957 if (h != NULL
ce558b89 2958 && htab->elf.sgot == NULL
3b36f7e6 2959 && strcmp (h->root.root.string, "_GLOBAL_OFFSET_TABLE_") == 0)
252b5132 2960 {
3b36f7e6
AM
2961 if (htab->elf.dynobj == NULL)
2962 htab->elf.dynobj = abfd;
2963 if (!ppc_elf_create_got (htab->elf.dynobj, info))
2964 return FALSE;
2965 BFD_ASSERT (h == htab->elf.hgot);
25dbc73a 2966 }
252b5132 2967
727fc41e 2968 tls_type = 0;
de972ffa 2969 r_type = ELF32_R_TYPE (rel->r_info);
cbf95972 2970 ifunc = NULL;
06a162cf 2971 if (h == NULL && !htab->is_vxworks)
e054468f 2972 {
06a162cf
AM
2973 Elf_Internal_Sym *isym = bfd_sym_from_r_symndx (&htab->sym_cache,
2974 abfd, r_symndx);
2975 if (isym == NULL)
2976 return FALSE;
2977
0bed072f 2978 if (ELF_ST_TYPE (isym->st_info) == STT_GNU_IFUNC)
e054468f 2979 {
0bed072f 2980 /* Set PLT_IFUNC flag for this sym, no GOT entry yet. */
06a162cf 2981 ifunc = update_local_sym_info (abfd, symtab_hdr, r_symndx,
37da22e5 2982 NON_GOT | PLT_IFUNC);
06a162cf 2983 if (ifunc == NULL)
e054468f
AM
2984 return FALSE;
2985
06a162cf
AM
2986 /* STT_GNU_IFUNC symbols must have a PLT entry;
2987 In a non-pie executable even when there are
2988 no plt calls. */
0e1862bb 2989 if (!bfd_link_pic (info)
08be3224
AM
2990 || is_branch_reloc (r_type)
2991 || r_type == R_PPC_PLT16_LO
2992 || r_type == R_PPC_PLT16_HI
2993 || r_type == R_PPC_PLT16_HA)
e054468f 2994 {
2d7ad24e 2995 addend = 0;
0bed072f 2996 if (r_type == R_PPC_PLTREL24)
08be3224
AM
2997 ppc_elf_tdata (abfd)->makes_plt_call = 1;
2998 if (bfd_link_pic (info)
2999 && (r_type == R_PPC_PLTREL24
3000 || r_type == R_PPC_PLT16_LO
3001 || r_type == R_PPC_PLT16_HI
3002 || r_type == R_PPC_PLT16_HA))
3003 addend = rel->r_addend;
0bed072f
AM
3004 if (!update_plt_info (abfd, ifunc, got2, addend))
3005 return FALSE;
e054468f
AM
3006 }
3007 }
25f23106
AM
3008 }
3009
de972ffa
AM
3010 if (!htab->is_vxworks
3011 && is_branch_reloc (r_type)
3012 && h != NULL
3013 && h == tga)
25f23106 3014 {
de972ffa
AM
3015 if (rel != relocs
3016 && (ELF32_R_TYPE (rel[-1].r_info) == R_PPC_TLSGD
3017 || ELF32_R_TYPE (rel[-1].r_info) == R_PPC_TLSLD))
3018 /* We have a new-style __tls_get_addr call with a marker
3019 reloc. */
3020 ;
3021 else
3022 /* Mark this section as having an old-style call. */
9737e8af 3023 sec->nomark_tls_get_addr = 1;
e054468f 3024 }
727fc41e 3025
25dbc73a
AM
3026 switch (r_type)
3027 {
727fc41e
AM
3028 case R_PPC_TLSGD:
3029 case R_PPC_TLSLD:
3030 /* These special tls relocs tie a call to __tls_get_addr with
3031 its parameter symbol. */
37da22e5
AM
3032 if (h != NULL)
3033 ppc_elf_hash_entry (h)->tls_mask |= TLS_TLS | TLS_MARK;
3034 else
3035 if (!update_local_sym_info (abfd, symtab_hdr, r_symndx,
3036 NON_GOT | TLS_TLS | TLS_MARK))
3037 return FALSE;
727fc41e
AM
3038 break;
3039
23cedd1d
AM
3040 case R_PPC_PLTSEQ:
3041 break;
3042
25dbc73a
AM
3043 case R_PPC_GOT_TLSLD16:
3044 case R_PPC_GOT_TLSLD16_LO:
3045 case R_PPC_GOT_TLSLD16_HI:
3046 case R_PPC_GOT_TLSLD16_HA:
25dbc73a
AM
3047 tls_type = TLS_TLS | TLS_LD;
3048 goto dogottls;
252b5132 3049
25dbc73a
AM
3050 case R_PPC_GOT_TLSGD16:
3051 case R_PPC_GOT_TLSGD16_LO:
3052 case R_PPC_GOT_TLSGD16_HI:
3053 case R_PPC_GOT_TLSGD16_HA:
3054 tls_type = TLS_TLS | TLS_GD;
3055 goto dogottls;
3056
3057 case R_PPC_GOT_TPREL16:
3058 case R_PPC_GOT_TPREL16_LO:
3059 case R_PPC_GOT_TPREL16_HI:
3060 case R_PPC_GOT_TPREL16_HA:
7c8bbca5 3061 if (bfd_link_dll (info))
25dbc73a
AM
3062 info->flags |= DF_STATIC_TLS;
3063 tls_type = TLS_TLS | TLS_TPREL;
3064 goto dogottls;
3065
3066 case R_PPC_GOT_DTPREL16:
3067 case R_PPC_GOT_DTPREL16_LO:
3068 case R_PPC_GOT_DTPREL16_HI:
3069 case R_PPC_GOT_DTPREL16_HA:
3070 tls_type = TLS_TLS | TLS_DTPREL;
3071 dogottls:
3072 sec->has_tls_reloc = 1;
1a0670f3 3073 /* Fall through. */
252b5132 3074
25dbc73a
AM
3075 /* GOT16 relocations */
3076 case R_PPC_GOT16:
3077 case R_PPC_GOT16_LO:
3078 case R_PPC_GOT16_HI:
3079 case R_PPC_GOT16_HA:
3080 /* This symbol requires a global offset table entry. */
ce558b89 3081 if (htab->elf.sgot == NULL)
25dbc73a
AM
3082 {
3083 if (htab->elf.dynobj == NULL)
3084 htab->elf.dynobj = abfd;
3085 if (!ppc_elf_create_got (htab->elf.dynobj, info))
3086 return FALSE;
3087 }
3088 if (h != NULL)
3089 {
3090 h->got.refcount += 1;
3091 ppc_elf_hash_entry (h)->tls_mask |= tls_type;
3092 }
3093 else
3094 /* This is a global offset table entry for a local symbol. */
3095 if (!update_local_sym_info (abfd, symtab_hdr, r_symndx, tls_type))
3096 return FALSE;
91e21fb7
AM
3097
3098 /* We may also need a plt entry if the symbol turns out to be
3099 an ifunc. */
0e1862bb 3100 if (h != NULL && !bfd_link_pic (info))
91e21fb7
AM
3101 {
3102 if (!update_plt_info (abfd, &h->plt.plist, NULL, 0))
3103 return FALSE;
3104 }
25dbc73a 3105 break;
252b5132 3106
25dbc73a
AM
3107 /* Indirect .sdata relocation. */
3108 case R_PPC_EMB_SDAI16:
93d1b056
AM
3109 htab->sdata[0].sym->ref_regular = 1;
3110 if (!elf_allocate_pointer_linker_section (abfd, &htab->sdata[0],
3111 h, rel))
25dbc73a 3112 return FALSE;
046183de
AM
3113 if (h != NULL)
3114 {
3115 ppc_elf_hash_entry (h)->has_sda_refs = TRUE;
3116 h->non_got_ref = TRUE;
3117 }
25dbc73a 3118 break;
252b5132 3119
25dbc73a
AM
3120 /* Indirect .sdata2 relocation. */
3121 case R_PPC_EMB_SDA2I16:
c0d9f31d 3122 if (!bfd_link_executable (info))
25dbc73a
AM
3123 {
3124 bad_shared_reloc (abfd, r_type);
3125 return FALSE;
3126 }
93d1b056
AM
3127 htab->sdata[1].sym->ref_regular = 1;
3128 if (!elf_allocate_pointer_linker_section (abfd, &htab->sdata[1],
3129 h, rel))
25dbc73a 3130 return FALSE;
046183de
AM
3131 if (h != NULL)
3132 {
3133 ppc_elf_hash_entry (h)->has_sda_refs = TRUE;
3134 h->non_got_ref = TRUE;
3135 }
25dbc73a 3136 break;
252b5132 3137
93d1b056
AM
3138 case R_PPC_SDAREL16:
3139 htab->sdata[0].sym->ref_regular = 1;
1a0670f3 3140 /* Fall through. */
93d1b056 3141
b9c361e0
JL
3142 case R_PPC_VLE_SDAREL_LO16A:
3143 case R_PPC_VLE_SDAREL_LO16D:
3144 case R_PPC_VLE_SDAREL_HI16A:
3145 case R_PPC_VLE_SDAREL_HI16D:
3146 case R_PPC_VLE_SDAREL_HA16A:
3147 case R_PPC_VLE_SDAREL_HA16D:
046183de
AM
3148 if (h != NULL)
3149 {
3150 ppc_elf_hash_entry (h)->has_sda_refs = TRUE;
3151 h->non_got_ref = TRUE;
3152 }
3153 break;
3154
b9c361e0
JL
3155 case R_PPC_VLE_REL8:
3156 case R_PPC_VLE_REL15:
3157 case R_PPC_VLE_REL24:
3158 case R_PPC_VLE_LO16A:
3159 case R_PPC_VLE_LO16D:
3160 case R_PPC_VLE_HI16A:
3161 case R_PPC_VLE_HI16D:
3162 case R_PPC_VLE_HA16A:
3163 case R_PPC_VLE_HA16D:
83eef883 3164 case R_PPC_VLE_ADDR20:
b9c361e0
JL
3165 break;
3166
25dbc73a 3167 case R_PPC_EMB_SDA2REL:
c0d9f31d 3168 if (!bfd_link_executable (info))
046183de
AM
3169 {
3170 bad_shared_reloc (abfd, r_type);
3171 return FALSE;
3172 }
93d1b056 3173 htab->sdata[1].sym->ref_regular = 1;
046183de
AM
3174 if (h != NULL)
3175 {
3176 ppc_elf_hash_entry (h)->has_sda_refs = TRUE;
3177 h->non_got_ref = TRUE;
3178 }
3179 break;
3180
b9c361e0
JL
3181 case R_PPC_VLE_SDA21_LO:
3182 case R_PPC_VLE_SDA21:
25dbc73a
AM
3183 case R_PPC_EMB_SDA21:
3184 case R_PPC_EMB_RELSDA:
046183de
AM
3185 if (h != NULL)
3186 {
3187 ppc_elf_hash_entry (h)->has_sda_refs = TRUE;
3188 h->non_got_ref = TRUE;
3189 }
3190 break;
3191
25dbc73a
AM
3192 case R_PPC_EMB_NADDR32:
3193 case R_PPC_EMB_NADDR16:
3194 case R_PPC_EMB_NADDR16_LO:
3195 case R_PPC_EMB_NADDR16_HI:
3196 case R_PPC_EMB_NADDR16_HA:
4dc4a9a5 3197 if (h != NULL)
046183de 3198 h->non_got_ref = TRUE;
25dbc73a 3199 break;
252b5132 3200
25dbc73a 3201 case R_PPC_PLTREL24:
de972ffa 3202 if (h == NULL)
6d78d0b9 3203 break;
08be3224 3204 ppc_elf_tdata (abfd)->makes_plt_call = 1;
3e04d765 3205 goto pltentry;
08be3224 3206
23cedd1d 3207 case R_PPC_PLTCALL:
3e04d765
AM
3208 sec->has_pltcall = 1;
3209 /* Fall through. */
3210
6d78d0b9 3211 case R_PPC_PLT32:
25dbc73a
AM
3212 case R_PPC_PLTREL32:
3213 case R_PPC_PLT16_LO:
3214 case R_PPC_PLT16_HI:
3215 case R_PPC_PLT16_HA:
3e04d765 3216 pltentry:
25dbc73a
AM
3217#ifdef DEBUG
3218 fprintf (stderr, "Reloc requires a PLT entry\n");
3219#endif
cbf95972 3220 /* This symbol requires a procedure linkage table entry. */
25dbc73a
AM
3221 if (h == NULL)
3222 {
2d7ad24e
AM
3223 pltent = update_local_sym_info (abfd, symtab_hdr, r_symndx,
3224 NON_GOT | PLT_KEEP);
3225 if (pltent == NULL)
3226 return FALSE;
25dbc73a 3227 }
a6aa5195
AM
3228 else
3229 {
2d7ad24e
AM
3230 if (r_type != R_PPC_PLTREL24)
3231 ppc_elf_hash_entry (h)->tls_mask |= PLT_KEEP;
a6aa5195 3232 h->needs_plt = 1;
2d7ad24e 3233 pltent = &h->plt.plist;
a6aa5195 3234 }
2d7ad24e
AM
3235 addend = 0;
3236 if (bfd_link_pic (info)
3237 && (r_type == R_PPC_PLTREL24
3238 || r_type == R_PPC_PLT16_LO
3239 || r_type == R_PPC_PLT16_HI
3240 || r_type == R_PPC_PLT16_HA))
3241 addend = rel->r_addend;
3242 if (!update_plt_info (abfd, pltent, got2, addend))
3243 return FALSE;
25dbc73a 3244 break;
ee05f2fe 3245
25dbc73a
AM
3246 /* The following relocations don't need to propagate the
3247 relocation if linking a shared object since they are
3248 section relative. */
3249 case R_PPC_SECTOFF:
3250 case R_PPC_SECTOFF_LO:
3251 case R_PPC_SECTOFF_HI:
3252 case R_PPC_SECTOFF_HA:
3253 case R_PPC_DTPREL16:
3254 case R_PPC_DTPREL16_LO:
3255 case R_PPC_DTPREL16_HI:
3256 case R_PPC_DTPREL16_HA:
3257 case R_PPC_TOC16:
3258 break;
252b5132 3259
d7128ce4
AM
3260 case R_PPC_REL16:
3261 case R_PPC_REL16_LO:
3262 case R_PPC_REL16_HI:
3263 case R_PPC_REL16_HA:
a680de9a 3264 case R_PPC_REL16DX_HA:
016687f8 3265 ppc_elf_tdata (abfd)->has_rel16 = 1;
d7128ce4
AM
3266 break;
3267
a6aa5195 3268 /* These are just markers. */
25dbc73a
AM
3269 case R_PPC_TLS:
3270 case R_PPC_EMB_MRKREF:
3271 case R_PPC_NONE:
3272 case R_PPC_max:
32af9f6e
AM
3273 case R_PPC_RELAX:
3274 case R_PPC_RELAX_PLT:
3275 case R_PPC_RELAX_PLTREL24:
7ba71655 3276 case R_PPC_16DX_HA:
25dbc73a 3277 break;
252b5132 3278
25dbc73a
AM
3279 /* These should only appear in dynamic objects. */
3280 case R_PPC_COPY:
3281 case R_PPC_GLOB_DAT:
3282 case R_PPC_JMP_SLOT:
3283 case R_PPC_RELATIVE:
e054468f 3284 case R_PPC_IRELATIVE:
25dbc73a 3285 break;
252b5132 3286
25dbc73a
AM
3287 /* These aren't handled yet. We'll report an error later. */
3288 case R_PPC_ADDR30:
3289 case R_PPC_EMB_RELSEC16:
3290 case R_PPC_EMB_RELST_LO:
3291 case R_PPC_EMB_RELST_HI:
3292 case R_PPC_EMB_RELST_HA:
3293 case R_PPC_EMB_BIT_FLD:
3294 break;
252b5132 3295
25dbc73a
AM
3296 /* This refers only to functions defined in the shared library. */
3297 case R_PPC_LOCAL24PC:
727fc41e 3298 if (h != NULL && h == htab->elf.hgot && htab->plt_type == PLT_UNSET)
016687f8
AM
3299 {
3300 htab->plt_type = PLT_OLD;
3301 htab->old_bfd = abfd;
3302 }
c7e17e05
AM
3303 if (h != NULL && h->type == STT_GNU_IFUNC)
3304 {
c7e17e05
AM
3305 h->needs_plt = 1;
3306 if (!update_plt_info (abfd, &h->plt.plist, NULL, 0))
3307 return FALSE;
3308 }
25dbc73a 3309 break;
252b5132 3310
25dbc73a
AM
3311 /* This relocation describes the C++ object vtable hierarchy.
3312 Reconstruct it for later use during GC. */
3313 case R_PPC_GNU_VTINHERIT:
3314 if (!bfd_elf_gc_record_vtinherit (abfd, sec, h, rel->r_offset))
3315 return FALSE;
3316 break;
252b5132 3317
25dbc73a
AM
3318 /* This relocation describes which C++ vtable entries are actually
3319 used. Record for later use during GC. */
3320 case R_PPC_GNU_VTENTRY:
a0ea3a14 3321 if (!bfd_elf_gc_record_vtentry (abfd, sec, h, rel->r_addend))
25dbc73a
AM
3322 return FALSE;
3323 break;
252b5132 3324
7c8bbca5 3325 /* We shouldn't really be seeing TPREL32. */
25dbc73a 3326 case R_PPC_TPREL32:
1d483afe
AM
3327 case R_PPC_TPREL16:
3328 case R_PPC_TPREL16_LO:
3329 case R_PPC_TPREL16_HI:
3330 case R_PPC_TPREL16_HA:
7c8bbca5 3331 if (bfd_link_dll (info))
25dbc73a
AM
3332 info->flags |= DF_STATIC_TLS;
3333 goto dodyn;
252b5132 3334
25dbc73a
AM
3335 /* Nor these. */
3336 case R_PPC_DTPMOD32:
3337 case R_PPC_DTPREL32:
3338 goto dodyn;
252b5132 3339
9edfd1af
AM
3340 case R_PPC_REL32:
3341 if (h == NULL
3342 && got2 != NULL
3343 && (sec->flags & SEC_CODE) != 0
0e1862bb 3344 && bfd_link_pic (info)
4a3dc543 3345 && htab->plt_type == PLT_UNSET)
9edfd1af
AM
3346 {
3347 /* Old -fPIC gcc code has .long LCTOC1-LCFx just before
3348 the start of a function, which assembles to a REL32
3349 reference to .got2. If we detect one of these, then
3350 force the old PLT layout because the linker cannot
3351 reliably deduce the GOT pointer value needed for
3352 PLT call stubs. */
3353 asection *s;
87d72d41 3354 Elf_Internal_Sym *isym;
9edfd1af 3355
87d72d41
AM
3356 isym = bfd_sym_from_r_symndx (&htab->sym_cache,
3357 abfd, r_symndx);
3358 if (isym == NULL)
3359 return FALSE;
3360
3361 s = bfd_section_from_elf_index (abfd, isym->st_shndx);
9edfd1af 3362 if (s == got2)
016687f8
AM
3363 {
3364 htab->plt_type = PLT_OLD;
3365 htab->old_bfd = abfd;
3366 }
9edfd1af 3367 }
7123df0e 3368 if (h == NULL || h == htab->elf.hgot)
fd38b44c 3369 break;
625af618
AM
3370 /* fall through */
3371
3372 case R_PPC_ADDR32:
3373 case R_PPC_ADDR16:
3374 case R_PPC_ADDR16_LO:
3375 case R_PPC_ADDR16_HI:
3376 case R_PPC_ADDR16_HA:
3377 case R_PPC_UADDR32:
3378 case R_PPC_UADDR16:
0e1862bb 3379 if (h != NULL && !bfd_link_pic (info))
625af618
AM
3380 {
3381 /* We may need a plt entry if the symbol turns out to be
3382 a function defined in a dynamic object. */
3ec01793 3383 if (!update_plt_info (abfd, &h->plt.plist, NULL, 0))
625af618
AM
3384 return FALSE;
3385
3386 /* We may need a copy reloc too. */
3387 h->non_got_ref = 1;
3388 h->pointer_equality_needed = 1;
d3e454b9
AM
3389 if (r_type == R_PPC_ADDR16_HA)
3390 ppc_elf_hash_entry (h)->has_addr16_ha = 1;
3391 if (r_type == R_PPC_ADDR16_LO)
3392 ppc_elf_hash_entry (h)->has_addr16_lo = 1;
625af618
AM
3393 }
3394 goto dodyn;
9edfd1af 3395
25dbc73a
AM
3396 case R_PPC_REL24:
3397 case R_PPC_REL14:
3398 case R_PPC_REL14_BRTAKEN:
3399 case R_PPC_REL14_BRNTAKEN:
d7128ce4 3400 if (h == NULL)
25dbc73a 3401 break;
7123df0e 3402 if (h == htab->elf.hgot)
d7128ce4 3403 {
7123df0e 3404 if (htab->plt_type == PLT_UNSET)
016687f8
AM
3405 {
3406 htab->plt_type = PLT_OLD;
3407 htab->old_bfd = abfd;
3408 }
d7128ce4
AM
3409 break;
3410 }
25dbc73a 3411 /* fall through */
ee05f2fe 3412
25dbc73a 3413 case R_PPC_ADDR24:
25dbc73a
AM
3414 case R_PPC_ADDR14:
3415 case R_PPC_ADDR14_BRTAKEN:
3416 case R_PPC_ADDR14_BRNTAKEN:
0e1862bb 3417 if (h != NULL && !bfd_link_pic (info))
25dbc73a
AM
3418 {
3419 /* We may need a plt entry if the symbol turns out to be
3420 a function defined in a dynamic object. */
e054468f 3421 h->needs_plt = 1;
de972ffa 3422 if (!update_plt_info (abfd, &h->plt.plist, NULL, 0))
a6aa5195 3423 return FALSE;
625af618 3424 break;
25dbc73a 3425 }
7619e7c7 3426
25dbc73a
AM
3427 dodyn:
3428 /* If we are creating a shared library, and this is a reloc
3429 against a global symbol, or a non PC relative reloc
3430 against a local symbol, then we need to copy the reloc
3431 into the shared library. However, if we are linking with
3432 -Bsymbolic, we do not need to copy a reloc against a
3433 global symbol which is defined in an object we are
3434 including in the link (i.e., DEF_REGULAR is set). At
3435 this point we have not seen all the input files, so it is
3436 possible that DEF_REGULAR is not set now but will be set
3437 later (it is never cleared). In case of a weak definition,
3438 DEF_REGULAR may be cleared later by a strong definition in
3439 a shared library. We account for that possibility below by
3440 storing information in the dyn_relocs field of the hash
3441 table entry. A similar situation occurs when creating
3442 shared libraries and symbol visibility changes render the
3443 symbol local.
7619e7c7 3444
25dbc73a
AM
3445 If on the other hand, we are creating an executable, we
3446 may need to keep relocations for symbols satisfied by a
3447 dynamic library if we manage to avoid copy relocs for the
3448 symbol. */
0e1862bb 3449 if ((bfd_link_pic (info)
1d483afe 3450 && (must_be_dyn_reloc (info, r_type)
25dbc73a 3451 || (h != NULL
198f1157 3452 && (!SYMBOLIC_BIND (info, h)
25dbc73a
AM
3453 || h->root.type == bfd_link_hash_defweak
3454 || !h->def_regular))))
3455 || (ELIMINATE_COPY_RELOCS
0e1862bb 3456 && !bfd_link_pic (info)
25dbc73a
AM
3457 && h != NULL
3458 && (h->root.type == bfd_link_hash_defweak
de972ffa 3459 || !h->def_regular)))
25dbc73a 3460 {
25dbc73a
AM
3461#ifdef DEBUG
3462 fprintf (stderr,
3463 "ppc_elf_check_relocs needs to "
3464 "create relocation for %s\n",
3465 (h && h->root.root.string
3466 ? h->root.root.string : "<unknown>"));
3467#endif
3468 if (sreloc == NULL)
3469 {
c9a2f333
AM
3470 if (htab->elf.dynobj == NULL)
3471 htab->elf.dynobj = abfd;
83bac4b0
NC
3472
3473 sreloc = _bfd_elf_make_dynamic_reloc_section
3474 (sec, htab->elf.dynobj, 2, abfd, /*rela?*/ TRUE);
3475
25dbc73a 3476 if (sreloc == NULL)
83bac4b0 3477 return FALSE;
25dbc73a 3478 }
7619e7c7 3479
25dbc73a
AM
3480 /* If this is a global symbol, we count the number of
3481 relocations we need for this symbol. */
3482 if (h != NULL)
3483 {
f95f8542
AM
3484 struct elf_dyn_relocs *p;
3485 struct elf_dyn_relocs **rel_head;
3486
91d6fa6a 3487 rel_head = &ppc_elf_hash_entry (h)->dyn_relocs;
f95f8542
AM
3488 p = *rel_head;
3489 if (p == NULL || p->sec != sec)
3490 {
3491 p = bfd_alloc (htab->elf.dynobj, sizeof *p);
3492 if (p == NULL)
3493 return FALSE;
3494 p->next = *rel_head;
3495 *rel_head = p;
3496 p->sec = sec;
3497 p->count = 0;
3498 p->pc_count = 0;
3499 }
3500 p->count += 1;
3501 if (!must_be_dyn_reloc (info, r_type))
3502 p->pc_count += 1;
25dbc73a
AM
3503 }
3504 else
3505 {
3506 /* Track dynamic relocs needed for local syms too.
3507 We really need local syms available to do this
3508 easily. Oh well. */
f95f8542
AM
3509 struct ppc_dyn_relocs *p;
3510 struct ppc_dyn_relocs **rel_head;
3511 bfd_boolean is_ifunc;
25dbc73a 3512 asection *s;
6edfbbad 3513 void *vpp;
87d72d41 3514 Elf_Internal_Sym *isym;
6edfbbad 3515
87d72d41
AM
3516 isym = bfd_sym_from_r_symndx (&htab->sym_cache,
3517 abfd, r_symndx);
3518 if (isym == NULL)
25dbc73a 3519 return FALSE;
7fce784e 3520
87d72d41
AM
3521 s = bfd_section_from_elf_index (abfd, isym->st_shndx);
3522 if (s == NULL)
3523 s = sec;
3524
6edfbbad 3525 vpp = &elf_section_data (s)->local_dynrel;
f95f8542
AM
3526 rel_head = (struct ppc_dyn_relocs **) vpp;
3527 is_ifunc = ELF_ST_TYPE (isym->st_info) == STT_GNU_IFUNC;
3528 p = *rel_head;
3529 if (p != NULL && p->sec == sec && p->ifunc != is_ifunc)
3530 p = p->next;
3531 if (p == NULL || p->sec != sec || p->ifunc != is_ifunc)
3532 {
3533 p = bfd_alloc (htab->elf.dynobj, sizeof *p);
3534 if (p == NULL)
3535 return FALSE;
3536 p->next = *rel_head;
3537 *rel_head = p;
3538 p->sec = sec;
3539 p->ifunc = is_ifunc;
3540 p->count = 0;
3541 }
3542 p->count += 1;
25dbc73a 3543 }
7619e7c7 3544 }
25dbc73a
AM
3545
3546 break;
7619e7c7
AM
3547 }
3548 }
ee05f2fe 3549
25dbc73a
AM
3550 return TRUE;
3551}
3552\f
005d79fd
AM
3553/* Warn for conflicting Tag_GNU_Power_ABI_FP attributes between IBFD
3554 and OBFD, and merge non-conflicting ones. */
4a91d0ba 3555bfd_boolean
50e03d47 3556_bfd_elf_ppc_merge_fp_attributes (bfd *ibfd, struct bfd_link_info *info)
34c8bcba 3557{
50e03d47 3558 bfd *obfd = info->output_bfd;
c6e65352
DJ
3559 obj_attribute *in_attr, *in_attrs;
3560 obj_attribute *out_attr, *out_attrs;
4a91d0ba 3561 bfd_boolean ret = TRUE;
34c8bcba 3562
c6e65352
DJ
3563 in_attrs = elf_known_obj_attributes (ibfd)[OBJ_ATTR_GNU];
3564 out_attrs = elf_known_obj_attributes (obfd)[OBJ_ATTR_GNU];
3565
c6e65352
DJ
3566 in_attr = &in_attrs[Tag_GNU_Power_ABI_FP];
3567 out_attr = &out_attrs[Tag_GNU_Power_ABI_FP];
005d79fd 3568
c6e65352 3569 if (in_attr->i != out_attr->i)
34c8bcba 3570 {
005d79fd
AM
3571 int in_fp = in_attr->i & 3;
3572 int out_fp = out_attr->i & 3;
4a91d0ba 3573 static bfd *last_fp, *last_ld;
005d79fd
AM
3574
3575 if (in_fp == 0)
34c8bcba 3576 ;
005d79fd
AM
3577 else if (out_fp == 0)
3578 {
8d2c8c3d 3579 out_attr->type = ATTR_TYPE_FLAG_INT_VAL;
005d79fd 3580 out_attr->i ^= in_fp;
4a91d0ba 3581 last_fp = ibfd;
005d79fd
AM
3582 }
3583 else if (out_fp != 2 && in_fp == 2)
8d2c8c3d
AM
3584 {
3585 _bfd_error_handler
3586 /* xgettext:c-format */
4a91d0ba
AM
3587 (_("%pB uses hard float, %pB uses soft float"),
3588 last_fp, ibfd);
3589 ret = FALSE;
8d2c8c3d 3590 }
005d79fd 3591 else if (out_fp == 2 && in_fp != 2)
8d2c8c3d
AM
3592 {
3593 _bfd_error_handler
3594 /* xgettext:c-format */
4a91d0ba
AM
3595 (_("%pB uses hard float, %pB uses soft float"),
3596 ibfd, last_fp);
3597 ret = FALSE;
8d2c8c3d 3598 }
005d79fd 3599 else if (out_fp == 1 && in_fp == 3)
8d2c8c3d
AM
3600 {
3601 _bfd_error_handler
3602 /* xgettext:c-format */
4a91d0ba
AM
3603 (_("%pB uses double-precision hard float, "
3604 "%pB uses single-precision hard float"), last_fp, ibfd);
3605 ret = FALSE;
8d2c8c3d 3606 }
005d79fd 3607 else if (out_fp == 3 && in_fp == 1)
8d2c8c3d
AM
3608 {
3609 _bfd_error_handler
3610 /* xgettext:c-format */
4a91d0ba
AM
3611 (_("%pB uses double-precision hard float, "
3612 "%pB uses single-precision hard float"), ibfd, last_fp);
3613 ret = FALSE;
8d2c8c3d 3614 }
005d79fd
AM
3615
3616 in_fp = in_attr->i & 0xc;
3617 out_fp = out_attr->i & 0xc;
3618 if (in_fp == 0)
3619 ;
3620 else if (out_fp == 0)
3621 {
8d2c8c3d 3622 out_attr->type = ATTR_TYPE_FLAG_INT_VAL;
005d79fd 3623 out_attr->i ^= in_fp;
4a91d0ba 3624 last_ld = ibfd;
005d79fd
AM
3625 }
3626 else if (out_fp != 2 * 4 && in_fp == 2 * 4)
8d2c8c3d
AM
3627 {
3628 _bfd_error_handler
3629 /* xgettext:c-format */
4a91d0ba
AM
3630 (_("%pB uses 64-bit long double, "
3631 "%pB uses 128-bit long double"), ibfd, last_ld);
3632 ret = FALSE;
8d2c8c3d 3633 }
005d79fd 3634 else if (in_fp != 2 * 4 && out_fp == 2 * 4)
8d2c8c3d
AM
3635 {
3636 _bfd_error_handler
3637 /* xgettext:c-format */
4a91d0ba
AM
3638 (_("%pB uses 64-bit long double, "
3639 "%pB uses 128-bit long double"), last_ld, ibfd);
3640 ret = FALSE;
8d2c8c3d 3641 }
005d79fd 3642 else if (out_fp == 1 * 4 && in_fp == 3 * 4)
8d2c8c3d
AM
3643 {
3644 _bfd_error_handler
3645 /* xgettext:c-format */
4a91d0ba
AM
3646 (_("%pB uses IBM long double, "
3647 "%pB uses IEEE long double"), last_ld, ibfd);
3648 ret = FALSE;
8d2c8c3d 3649 }
005d79fd 3650 else if (out_fp == 3 * 4 && in_fp == 1 * 4)
8d2c8c3d
AM
3651 {
3652 _bfd_error_handler
3653 /* xgettext:c-format */
4a91d0ba
AM
3654 (_("%pB uses IBM long double, "
3655 "%pB uses IEEE long double"), ibfd, last_ld);
3656 ret = FALSE;
8d2c8c3d 3657 }
c6e65352 3658 }
4a91d0ba
AM
3659
3660 if (!ret)
3661 {
3662 out_attr->type = ATTR_TYPE_FLAG_INT_VAL | ATTR_TYPE_FLAG_ERROR;
3663 bfd_set_error (bfd_error_bad_value);
3664 }
3665 return ret;
005d79fd
AM
3666}
3667
3668/* Merge object attributes from IBFD into OBFD. Warn if
3669 there are conflicting attributes. */
3670static bfd_boolean
50e03d47 3671ppc_elf_merge_obj_attributes (bfd *ibfd, struct bfd_link_info *info)
005d79fd 3672{
50e03d47 3673 bfd *obfd;
005d79fd
AM
3674 obj_attribute *in_attr, *in_attrs;
3675 obj_attribute *out_attr, *out_attrs;
4a91d0ba 3676 bfd_boolean ret;
005d79fd 3677
4a91d0ba
AM
3678 if (!_bfd_elf_ppc_merge_fp_attributes (ibfd, info))
3679 return FALSE;
005d79fd 3680
50e03d47 3681 obfd = info->output_bfd;
005d79fd
AM
3682 in_attrs = elf_known_obj_attributes (ibfd)[OBJ_ATTR_GNU];
3683 out_attrs = elf_known_obj_attributes (obfd)[OBJ_ATTR_GNU];
c6e65352
DJ
3684
3685 /* Check for conflicting Tag_GNU_Power_ABI_Vector attributes and
3686 merge non-conflicting ones. */
3687 in_attr = &in_attrs[Tag_GNU_Power_ABI_Vector];
3688 out_attr = &out_attrs[Tag_GNU_Power_ABI_Vector];
4a91d0ba 3689 ret = TRUE;
c6e65352
DJ
3690 if (in_attr->i != out_attr->i)
3691 {
005d79fd
AM
3692 int in_vec = in_attr->i & 3;
3693 int out_vec = out_attr->i & 3;
4a91d0ba 3694 static bfd *last_vec;
c6e65352 3695
005d79fd
AM
3696 if (in_vec == 0)
3697 ;
3698 else if (out_vec == 0)
c6e65352 3699 {
8d2c8c3d 3700 out_attr->type = ATTR_TYPE_FLAG_INT_VAL;
005d79fd 3701 out_attr->i = in_vec;
4a91d0ba 3702 last_vec = ibfd;
c6e65352 3703 }
c6e65352
DJ
3704 /* For now, allow generic to transition to AltiVec or SPE
3705 without a warning. If GCC marked files with their stack
3706 alignment and used don't-care markings for files which are
3707 not affected by the vector ABI, we could warn about this
3708 case too. */
005d79fd 3709 else if (in_vec == 1)
c6e65352 3710 ;
005d79fd
AM
3711 else if (out_vec == 1)
3712 {
8d2c8c3d 3713 out_attr->type = ATTR_TYPE_FLAG_INT_VAL;
005d79fd 3714 out_attr->i = in_vec;
4a91d0ba 3715 last_vec = ibfd;
005d79fd
AM
3716 }
3717 else if (out_vec < in_vec)
8d2c8c3d
AM
3718 {
3719 _bfd_error_handler
3720 /* xgettext:c-format */
4a91d0ba
AM
3721 (_("%pB uses AltiVec vector ABI, %pB uses SPE vector ABI"),
3722 last_vec, ibfd);
8d2c8c3d 3723 out_attr->type = ATTR_TYPE_FLAG_INT_VAL | ATTR_TYPE_FLAG_ERROR;
4a91d0ba 3724 ret = FALSE;
8d2c8c3d 3725 }
005d79fd 3726 else if (out_vec > in_vec)
8d2c8c3d
AM
3727 {
3728 _bfd_error_handler
3729 /* xgettext:c-format */
4a91d0ba
AM
3730 (_("%pB uses AltiVec vector ABI, %pB uses SPE vector ABI"),
3731 ibfd, last_vec);
8d2c8c3d 3732 out_attr->type = ATTR_TYPE_FLAG_INT_VAL | ATTR_TYPE_FLAG_ERROR;
4a91d0ba 3733 ret = FALSE;
8d2c8c3d 3734 }
34c8bcba
JM
3735 }
3736
f82e0623
NF
3737 /* Check for conflicting Tag_GNU_Power_ABI_Struct_Return attributes
3738 and merge non-conflicting ones. */
3739 in_attr = &in_attrs[Tag_GNU_Power_ABI_Struct_Return];
3740 out_attr = &out_attrs[Tag_GNU_Power_ABI_Struct_Return];
3741 if (in_attr->i != out_attr->i)
3742 {
005d79fd
AM
3743 int in_struct = in_attr->i & 3;
3744 int out_struct = out_attr->i & 3;
4a91d0ba 3745 static bfd *last_struct;
005d79fd
AM
3746
3747 if (in_struct == 0 || in_struct == 3)
f82e0623 3748 ;
005d79fd
AM
3749 else if (out_struct == 0)
3750 {
8d2c8c3d 3751 out_attr->type = ATTR_TYPE_FLAG_INT_VAL;
005d79fd 3752 out_attr->i = in_struct;
4a91d0ba 3753 last_struct = ibfd;
005d79fd
AM
3754 }
3755 else if (out_struct < in_struct)
8d2c8c3d
AM
3756 {
3757 _bfd_error_handler
3758 /* xgettext:c-format */
4a91d0ba
AM
3759 (_("%pB uses r3/r4 for small structure returns, "
3760 "%pB uses memory"), last_struct, ibfd);
8d2c8c3d 3761 out_attr->type = ATTR_TYPE_FLAG_INT_VAL | ATTR_TYPE_FLAG_ERROR;
4a91d0ba 3762 ret = FALSE;
8d2c8c3d 3763 }
005d79fd 3764 else if (out_struct > in_struct)
8d2c8c3d
AM
3765 {
3766 _bfd_error_handler
3767 /* xgettext:c-format */
4a91d0ba
AM
3768 (_("%pB uses r3/r4 for small structure returns, "
3769 "%pB uses memory"), ibfd, last_struct);
8d2c8c3d 3770 out_attr->type = ATTR_TYPE_FLAG_INT_VAL | ATTR_TYPE_FLAG_ERROR;
4a91d0ba 3771 ret = FALSE;
8d2c8c3d 3772 }
f82e0623 3773 }
4a91d0ba
AM
3774 if (!ret)
3775 {
3776 bfd_set_error (bfd_error_bad_value);
3777 return FALSE;
3778 }
f82e0623 3779
34c8bcba 3780 /* Merge Tag_compatibility attributes and any common GNU ones. */
8d2c8c3d 3781 return _bfd_elf_merge_object_attributes (ibfd, info);
34c8bcba
JM
3782}
3783
8853c3d3
AM
3784/* Merge backend specific data from an object file to the output
3785 object file when linking. */
3786
3787static bfd_boolean
50e03d47 3788ppc_elf_merge_private_bfd_data (bfd *ibfd, struct bfd_link_info *info)
8853c3d3 3789{
50e03d47 3790 bfd *obfd = info->output_bfd;
8853c3d3
AM
3791 flagword old_flags;
3792 flagword new_flags;
3793 bfd_boolean error;
3794
0c8d6e5c 3795 if (!is_ppc_elf (ibfd) || !is_ppc_elf (obfd))
8853c3d3
AM
3796 return TRUE;
3797
cc643b88 3798 /* Check if we have the same endianness. */
50e03d47 3799 if (! _bfd_generic_verify_endian_match (ibfd, info))
8853c3d3
AM
3800 return FALSE;
3801
50e03d47 3802 if (!ppc_elf_merge_obj_attributes (ibfd, info))
34c8bcba
JM
3803 return FALSE;
3804
91ed9b71
AM
3805 if ((ibfd->flags & DYNAMIC) != 0)
3806 return TRUE;
3807
8853c3d3
AM
3808 new_flags = elf_elfheader (ibfd)->e_flags;
3809 old_flags = elf_elfheader (obfd)->e_flags;
3810 if (!elf_flags_init (obfd))
3811 {
3812 /* First call, no flags set. */
3813 elf_flags_init (obfd) = TRUE;
3814 elf_elfheader (obfd)->e_flags = new_flags;
3815 }
3816
3817 /* Compatible flags are ok. */
3818 else if (new_flags == old_flags)
3819 ;
3820
3821 /* Incompatible flags. */
3822 else
3823 {
3824 /* Warn about -mrelocatable mismatch. Allow -mrelocatable-lib
3825 to be linked with either. */
3826 error = FALSE;
3827 if ((new_flags & EF_PPC_RELOCATABLE) != 0
3828 && (old_flags & (EF_PPC_RELOCATABLE | EF_PPC_RELOCATABLE_LIB)) == 0)
3829 {
3830 error = TRUE;
4eca0228 3831 _bfd_error_handler
871b3ab2 3832 (_("%pB: compiled with -mrelocatable and linked with "
8853c3d3
AM
3833 "modules compiled normally"), ibfd);
3834 }
3835 else if ((new_flags & (EF_PPC_RELOCATABLE | EF_PPC_RELOCATABLE_LIB)) == 0
3836 && (old_flags & EF_PPC_RELOCATABLE) != 0)
3837 {
3838 error = TRUE;
4eca0228 3839 _bfd_error_handler
871b3ab2 3840 (_("%pB: compiled normally and linked with "
8853c3d3
AM
3841 "modules compiled with -mrelocatable"), ibfd);
3842 }
3843
3844 /* The output is -mrelocatable-lib iff both the input files are. */
3845 if (! (new_flags & EF_PPC_RELOCATABLE_LIB))
3846 elf_elfheader (obfd)->e_flags &= ~EF_PPC_RELOCATABLE_LIB;
3847
3848 /* The output is -mrelocatable iff it can't be -mrelocatable-lib,
3849 but each input file is either -mrelocatable or -mrelocatable-lib. */
3850 if (! (elf_elfheader (obfd)->e_flags & EF_PPC_RELOCATABLE_LIB)
3851 && (new_flags & (EF_PPC_RELOCATABLE_LIB | EF_PPC_RELOCATABLE))
3852 && (old_flags & (EF_PPC_RELOCATABLE_LIB | EF_PPC_RELOCATABLE)))
3853 elf_elfheader (obfd)->e_flags |= EF_PPC_RELOCATABLE;
3854
3855 /* Do not warn about eabi vs. V.4 mismatch, just or in the bit if
3856 any module uses it. */
3857 elf_elfheader (obfd)->e_flags |= (new_flags & EF_PPC_EMB);
3858
3859 new_flags &= ~(EF_PPC_RELOCATABLE | EF_PPC_RELOCATABLE_LIB | EF_PPC_EMB);
3860 old_flags &= ~(EF_PPC_RELOCATABLE | EF_PPC_RELOCATABLE_LIB | EF_PPC_EMB);
3861
3862 /* Warn about any other mismatches. */
3863 if (new_flags != old_flags)
3864 {
3865 error = TRUE;
4eca0228 3866 _bfd_error_handler
695344c0 3867 /* xgettext:c-format */
871b3ab2 3868 (_("%pB: uses different e_flags (%#x) fields "
cd9af601
AM
3869 "than previous modules (%#x)"),
3870 ibfd, new_flags, old_flags);
8853c3d3
AM
3871 }
3872
3873 if (error)
3874 {
3875 bfd_set_error (bfd_error_bad_value);
3876 return FALSE;
3877 }
3878 }
3879
3880 return TRUE;
3881}
b9c361e0
JL
3882
3883static void
95f0d0d2 3884ppc_elf_vle_split16 (bfd *input_bfd,
08dc996f
AM
3885 asection *input_section,
3886 unsigned long offset,
95f0d0d2 3887 bfd_byte *loc,
86c95733 3888 bfd_vma value,
08dc996f
AM
3889 split16_format_type split16_format,
3890 bfd_boolean fixup)
b9c361e0 3891{
bb6bf75e 3892 unsigned int insn, opcode;
b9c361e0 3893
95f0d0d2 3894 insn = bfd_get_32 (input_bfd, loc);
bb6bf75e 3895 opcode = insn & E_OPCODE_MASK;
08dc996f
AM
3896 if (opcode == E_OR2I_INSN
3897 || opcode == E_AND2I_DOT_INSN
3898 || opcode == E_OR2IS_INSN
3899 || opcode == E_LIS_INSN
3900 || opcode == E_AND2IS_DOT_INSN)
3901 {
3902 if (split16_format != split16a_type)
3903 {
3904 if (fixup)
3905 split16_format = split16a_type;
3906 else
3907 _bfd_error_handler
3908 /* xgettext:c-format */
871b3ab2 3909 (_("%pB(%pA+0x%lx): expected 16A style relocation on 0x%08x insn"),
08dc996f
AM
3910 input_bfd, input_section, offset, opcode);
3911 }
3912 }
3913 else if (opcode == E_ADD2I_DOT_INSN
3914 || opcode == E_ADD2IS_INSN
3915 || opcode == E_CMP16I_INSN
3916 || opcode == E_MULL2I_INSN
3917 || opcode == E_CMPL16I_INSN
3918 || opcode == E_CMPH16I_INSN
3919 || opcode == E_CMPHL16I_INSN)
3920 {
3921 if (split16_format != split16d_type)
3922 {
3923 if (fixup)
3924 split16_format = split16d_type;
3925 else
3926 _bfd_error_handler
3927 /* xgettext:c-format */
871b3ab2 3928 (_("%pB(%pA+0x%lx): expected 16D style relocation on 0x%08x insn"),
08dc996f
AM
3929 input_bfd, input_section, offset, opcode);
3930 }
3931 }
bb6bf75e
AM
3932 if (split16_format == split16a_type)
3933 {
3934 insn &= ~((0xf800 << 5) | 0x7ff);
3935 insn |= (value & 0xf800) << 5;
3936 if ((insn & E_LI_MASK) == E_LI_INSN)
3937 {
3938 /* Hack for e_li. Extend sign. */
3939 insn &= ~(0xf0000 >> 5);
3940 insn |= (-(value & 0x8000) & 0xf0000) >> 5;
3941 }
3942 }
3943 else
3944 {
3945 insn &= ~((0xf800 << 10) | 0x7ff);
3946 insn |= (value & 0xf800) << 10;
3947 }
86c95733 3948 insn |= value & 0x7ff;
95f0d0d2 3949 bfd_put_32 (input_bfd, insn, loc);
b9c361e0 3950}
83eef883
AFB
3951
3952static void
3953ppc_elf_vle_split20 (bfd *output_bfd, bfd_byte *loc, bfd_vma value)
3954{
3955 unsigned int insn;
3956
3957 insn = bfd_get_32 (output_bfd, loc);
3958 /* We have an li20 field, bits 17..20, 11..15, 21..31. */
3959 /* Top 4 bits of value to 17..20. */
3960 insn |= (value & 0xf0000) >> 5;
3961 /* Next 5 bits of the value to 11..15. */
3962 insn |= (value & 0xf800) << 5;
3963 /* And the final 11 bits of the value to bits 21 to 31. */
3964 insn |= value & 0x7ff;
3965 bfd_put_32 (output_bfd, insn, loc);
3966}
3967
8853c3d3 3968\f
d7128ce4
AM
3969/* Choose which PLT scheme to use, and set .plt flags appropriately.
3970 Returns -1 on error, 0 for old PLT, 1 for new PLT. */
3971int
3972ppc_elf_select_plt_layout (bfd *output_bfd ATTRIBUTE_UNUSED,
5446cbdf 3973 struct bfd_link_info *info)
d7128ce4
AM
3974{
3975 struct ppc_elf_link_hash_table *htab;
9d8504b1 3976 flagword flags;
d7128ce4
AM
3977
3978 htab = ppc_elf_hash_table (info);
4a3dc543
RS
3979
3980 if (htab->plt_type == PLT_UNSET)
016687f8 3981 {
b3874e1a
AM
3982 struct elf_link_hash_entry *h;
3983
5446cbdf 3984 if (htab->params->plt_style == PLT_OLD)
016687f8 3985 htab->plt_type = PLT_OLD;
0e1862bb 3986 else if (bfd_link_pic (info)
b3874e1a
AM
3987 && htab->elf.dynamic_sections_created
3988 && (h = elf_link_hash_lookup (&htab->elf, "_mcount",
3989 FALSE, FALSE, TRUE)) != NULL
3990 && (h->type == STT_FUNC
3991 || h->needs_plt)
3992 && h->ref_regular
3993 && !(SYMBOL_CALLS_LOCAL (info, h)
21d68fcd 3994 || UNDEFWEAK_NO_DYNAMIC_RELOC (info, h)))
b3874e1a
AM
3995 {
3996 /* Profiling of shared libs (and pies) is not supported with
3997 secure plt, because ppc32 does profiling before a
3998 function prologue and a secure plt pic call stubs needs
3999 r30 to be set up. */
4000 htab->plt_type = PLT_OLD;
4001 }
016687f8
AM
4002 else
4003 {
4004 bfd *ibfd;
5446cbdf 4005 enum ppc_elf_plt_type plt_type = htab->params->plt_style;
016687f8
AM
4006
4007 /* Look through the reloc flags left by ppc_elf_check_relocs.
4008 Use the old style bss plt if a file makes plt calls
4009 without using the new relocs, and if ld isn't given
4010 --secure-plt and we never see REL16 relocs. */
4011 if (plt_type == PLT_UNSET)
4012 plt_type = PLT_OLD;
c72f2fb2 4013 for (ibfd = info->input_bfds; ibfd; ibfd = ibfd->link.next)
0c8d6e5c 4014 if (is_ppc_elf (ibfd))
016687f8
AM
4015 {
4016 if (ppc_elf_tdata (ibfd)->has_rel16)
4017 plt_type = PLT_NEW;
4018 else if (ppc_elf_tdata (ibfd)->makes_plt_call)
4019 {
4020 plt_type = PLT_OLD;
4021 htab->old_bfd = ibfd;
4022 break;
4023 }
4024 }
4025 htab->plt_type = plt_type;
4026 }
4027 }
5446cbdf 4028 if (htab->plt_type == PLT_OLD && htab->params->plt_style == PLT_NEW)
b3874e1a
AM
4029 {
4030 if (htab->old_bfd != NULL)
cf97bcb0 4031 _bfd_error_handler (_("bss-plt forced due to %pB"), htab->old_bfd);
b3874e1a 4032 else
cf97bcb0 4033 _bfd_error_handler (_("bss-plt forced by profiling"));
b3874e1a 4034 }
d7128ce4 4035
4a3dc543 4036 BFD_ASSERT (htab->plt_type != PLT_VXWORKS);
9d8504b1 4037
4a3dc543 4038 if (htab->plt_type == PLT_NEW)
9d8504b1
PB
4039 {
4040 flags = (SEC_ALLOC | SEC_LOAD | SEC_HAS_CONTENTS
4041 | SEC_IN_MEMORY | SEC_LINKER_CREATED);
86b9da88
AM
4042
4043 /* The new PLT is a loaded section. */
ce558b89 4044 if (htab->elf.splt != NULL
fd361982 4045 && !bfd_set_section_flags (htab->elf.splt, flags))
86b9da88
AM
4046 return -1;
4047
4048 /* The new GOT is not executable. */
ce558b89 4049 if (htab->elf.sgot != NULL
fd361982 4050 && !bfd_set_section_flags (htab->elf.sgot, flags))
86b9da88 4051 return -1;
d7128ce4
AM
4052 }
4053 else
4054 {
4055 /* Stop an unused .glink section from affecting .text alignment. */
86b9da88 4056 if (htab->glink != NULL
fd361982 4057 && !bfd_set_section_alignment (htab->glink, 0))
86b9da88 4058 return -1;
d7128ce4 4059 }
4a3dc543 4060 return htab->plt_type == PLT_NEW;
d7128ce4
AM
4061}
4062\f
25dbc73a
AM
4063/* Return the section that should be marked against GC for a given
4064 relocation. */
586119b3 4065
25dbc73a
AM
4066static asection *
4067ppc_elf_gc_mark_hook (asection *sec,
07adf181 4068 struct bfd_link_info *info,
25dbc73a
AM
4069 Elf_Internal_Rela *rel,
4070 struct elf_link_hash_entry *h,
4071 Elf_Internal_Sym *sym)
4072{
4073 if (h != NULL)
07adf181
AM
4074 switch (ELF32_R_TYPE (rel->r_info))
4075 {
4076 case R_PPC_GNU_VTINHERIT:
4077 case R_PPC_GNU_VTENTRY:
4078 return NULL;
4079 }
4080
4081 return _bfd_elf_gc_mark_hook (sec, info, rel, h, sym);
25dbc73a 4082}
49c09209
AM
4083
4084static bfd_boolean
4085get_sym_h (struct elf_link_hash_entry **hp,
4086 Elf_Internal_Sym **symp,
4087 asection **symsecp,
4088 unsigned char **tls_maskp,
4089 Elf_Internal_Sym **locsymsp,
4090 unsigned long r_symndx,
4091 bfd *ibfd)
4092{
4093 Elf_Internal_Shdr *symtab_hdr = &elf_symtab_hdr (ibfd);
4094
4095 if (r_symndx >= symtab_hdr->sh_info)
4096 {
4097 struct elf_link_hash_entry **sym_hashes = elf_sym_hashes (ibfd);
4098 struct elf_link_hash_entry *h;
4099
4100 h = sym_hashes[r_symndx - symtab_hdr->sh_info];
4101 while (h->root.type == bfd_link_hash_indirect
4102 || h->root.type == bfd_link_hash_warning)
4103 h = (struct elf_link_hash_entry *) h->root.u.i.link;
4104
4105 if (hp != NULL)
4106 *hp = h;
4107
4108 if (symp != NULL)
4109 *symp = NULL;
4110
4111 if (symsecp != NULL)
4112 {
4113 asection *symsec = NULL;
4114 if (h->root.type == bfd_link_hash_defined
4115 || h->root.type == bfd_link_hash_defweak)
4116 symsec = h->root.u.def.section;
4117 *symsecp = symsec;
4118 }
4119
4120 if (tls_maskp != NULL)
4121 *tls_maskp = &ppc_elf_hash_entry (h)->tls_mask;
4122 }
4123 else
4124 {
4125 Elf_Internal_Sym *sym;
4126 Elf_Internal_Sym *locsyms = *locsymsp;
4127
4128 if (locsyms == NULL)
4129 {
4130 locsyms = (Elf_Internal_Sym *) symtab_hdr->contents;
4131 if (locsyms == NULL)
4132 locsyms = bfd_elf_get_elf_syms (ibfd, symtab_hdr,
4133 symtab_hdr->sh_info,
4134 0, NULL, NULL, NULL);
4135 if (locsyms == NULL)
4136 return FALSE;
4137 *locsymsp = locsyms;
4138 }
4139 sym = locsyms + r_symndx;
4140
4141 if (hp != NULL)
4142 *hp = NULL;
4143
4144 if (symp != NULL)
4145 *symp = sym;
4146
4147 if (symsecp != NULL)
4148 *symsecp = bfd_section_from_elf_index (ibfd, sym->st_shndx);
4149
4150 if (tls_maskp != NULL)
4151 {
4152 bfd_signed_vma *local_got;
4153 unsigned char *tls_mask;
4154
4155 tls_mask = NULL;
4156 local_got = elf_local_got_refcounts (ibfd);
4157 if (local_got != NULL)
4158 {
4159 struct plt_entry **local_plt = (struct plt_entry **)
4160 (local_got + symtab_hdr->sh_info);
4161 unsigned char *lgot_masks = (unsigned char *)
4162 (local_plt + symtab_hdr->sh_info);
4163 tls_mask = &lgot_masks[r_symndx];
4164 }
4165 *tls_maskp = tls_mask;
4166 }
4167 }
4168 return TRUE;
4169}
25dbc73a 4170\f
3e04d765
AM
4171/* Analyze inline PLT call relocations to see whether calls to locally
4172 defined functions can be converted to direct calls. */
4173
4174bfd_boolean
4175ppc_elf_inline_plt (struct bfd_link_info *info)
4176{
4177 struct ppc_elf_link_hash_table *htab;
4178 bfd *ibfd;
4179 asection *sec;
4180 bfd_vma low_vma, high_vma, limit;
4181
4182 htab = ppc_elf_hash_table (info);
4183 if (htab == NULL)
4184 return FALSE;
4185
4186 /* A bl insn can reach -0x2000000 to 0x1fffffc. The limit is
4187 reduced somewhat to cater for possible stubs that might be added
4188 between the call and its destination. */
4189 limit = 0x1e00000;
4190 low_vma = -1;
4191 high_vma = 0;
4192 for (sec = info->output_bfd->sections; sec != NULL; sec = sec->next)
4193 if ((sec->flags & (SEC_ALLOC | SEC_CODE)) == (SEC_ALLOC | SEC_CODE))
4194 {
4195 if (low_vma > sec->vma)
4196 low_vma = sec->vma;
4197 if (high_vma < sec->vma + sec->size)
4198 high_vma = sec->vma + sec->size;
4199 }
4200
4201 /* If a "bl" can reach anywhere in local code sections, then we can
4202 convert all inline PLT sequences to direct calls when the symbol
4203 is local. */
4204 if (high_vma - low_vma < limit)
4205 {
4206 htab->can_convert_all_inline_plt = 1;
4207 return TRUE;
4208 }
4209
4210 /* Otherwise, go looking through relocs for cases where a direct
4211 call won't reach. Mark the symbol on any such reloc to disable
4212 the optimization and keep the PLT entry as it seems likely that
4213 this will be better than creating trampolines. Note that this
4214 will disable the optimization for all inline PLT calls to a
4215 particular symbol, not just those that won't reach. The
4216 difficulty in doing a more precise optimization is that the
4217 linker needs to make a decision depending on whether a
4218 particular R_PPC_PLTCALL insn can be turned into a direct
4219 call, for each of the R_PPC_PLTSEQ and R_PPC_PLT16* insns in
4220 the sequence, and there is nothing that ties those relocs
4221 together except their symbol. */
4222
4223 for (ibfd = info->input_bfds; ibfd != NULL; ibfd = ibfd->link.next)
4224 {
4225 Elf_Internal_Shdr *symtab_hdr;
4226 Elf_Internal_Sym *local_syms;
4227
4228 if (!is_ppc_elf (ibfd))
4229 continue;
4230
4231 local_syms = NULL;
4232 symtab_hdr = &elf_symtab_hdr (ibfd);
4233
4234 for (sec = ibfd->sections; sec != NULL; sec = sec->next)
4235 if (sec->has_pltcall
4236 && !bfd_is_abs_section (sec->output_section))
4237 {
4238 Elf_Internal_Rela *relstart, *rel, *relend;
4239
4240 /* Read the relocations. */
4241 relstart = _bfd_elf_link_read_relocs (ibfd, sec, NULL, NULL,
4242 info->keep_memory);
4243 if (relstart == NULL)
4244 return FALSE;
4245
4246 relend = relstart + sec->reloc_count;
4247 for (rel = relstart; rel < relend; )
4248 {
4249 enum elf_ppc_reloc_type r_type;
4250 unsigned long r_symndx;
4251 asection *sym_sec;
4252 struct elf_link_hash_entry *h;
4253 Elf_Internal_Sym *sym;
4254 unsigned char *tls_maskp;
4255
4256 r_type = ELF32_R_TYPE (rel->r_info);
4257 if (r_type != R_PPC_PLTCALL)
4258 continue;
4259
4260 r_symndx = ELF32_R_SYM (rel->r_info);
4261 if (!get_sym_h (&h, &sym, &sym_sec, &tls_maskp, &local_syms,
4262 r_symndx, ibfd))
4263 {
4264 if (elf_section_data (sec)->relocs != relstart)
4265 free (relstart);
4266 if (local_syms != NULL
4267 && symtab_hdr->contents != (unsigned char *) local_syms)
4268 free (local_syms);
4269 return FALSE;
4270 }
4271
4272 if (sym_sec != NULL && sym_sec->output_section != NULL)
4273 {
4274 bfd_vma from, to;
4275 if (h != NULL)
4276 to = h->root.u.def.value;
4277 else
4278 to = sym->st_value;
4279 to += (rel->r_addend
4280 + sym_sec->output_offset
4281 + sym_sec->output_section->vma);
4282 from = (rel->r_offset
4283 + sec->output_offset
4284 + sec->output_section->vma);
4285 if (to - from + limit < 2 * limit)
4286 *tls_maskp &= ~PLT_KEEP;
4287 }
4288 }
4289 if (elf_section_data (sec)->relocs != relstart)
4290 free (relstart);
4291 }
4292
4293 if (local_syms != NULL
4294 && symtab_hdr->contents != (unsigned char *) local_syms)
4295 {
4296 if (!info->keep_memory)
4297 free (local_syms);
4298 else
4299 symtab_hdr->contents = (unsigned char *) local_syms;
4300 }
4301 }
4302
4303 return TRUE;
4304}
4305
3a71aa26
AM
4306/* Set plt output section type, htab->tls_get_addr, and call the
4307 generic ELF tls_setup function. */
7fce784e 4308
25dbc73a 4309asection *
5446cbdf 4310ppc_elf_tls_setup (bfd *obfd, struct bfd_link_info *info)
7fce784e 4311{
25dbc73a 4312 struct ppc_elf_link_hash_table *htab;
7fce784e 4313
25dbc73a 4314 htab = ppc_elf_hash_table (info);
a7f2871e
AM
4315 htab->tls_get_addr = elf_link_hash_lookup (&htab->elf, "__tls_get_addr",
4316 FALSE, FALSE, TRUE);
f01f1741
AM
4317 if (htab->plt_type != PLT_NEW)
4318 htab->params->no_tls_get_addr_opt = TRUE;
4319
5446cbdf 4320 if (!htab->params->no_tls_get_addr_opt)
a7f2871e
AM
4321 {
4322 struct elf_link_hash_entry *opt, *tga;
4323 opt = elf_link_hash_lookup (&htab->elf, "__tls_get_addr_opt",
4324 FALSE, FALSE, TRUE);
4325 if (opt != NULL
4326 && (opt->root.type == bfd_link_hash_defined
4327 || opt->root.type == bfd_link_hash_defweak))
4328 {
4329 /* If glibc supports an optimized __tls_get_addr call stub,
4330 signalled by the presence of __tls_get_addr_opt, and we'll
4331 be calling __tls_get_addr via a plt call stub, then
4332 make __tls_get_addr point to __tls_get_addr_opt. */
4333 tga = htab->tls_get_addr;
4334 if (htab->elf.dynamic_sections_created
4335 && tga != NULL
4336 && (tga->type == STT_FUNC
4337 || tga->needs_plt)
4338 && !(SYMBOL_CALLS_LOCAL (info, tga)
21d68fcd 4339 || UNDEFWEAK_NO_DYNAMIC_RELOC (info, tga)))
a7f2871e
AM
4340 {
4341 struct plt_entry *ent;
32af9f6e
AM
4342 for (ent = tga->plt.plist; ent != NULL; ent = ent->next)
4343 if (ent->plt.refcount > 0)
4344 break;
4345 if (ent != NULL)
a7f2871e
AM
4346 {
4347 tga->root.type = bfd_link_hash_indirect;
4348 tga->root.u.i.link = &opt->root;
4349 ppc_elf_copy_indirect_symbol (info, opt, tga);
b531344c 4350 opt->mark = 1;
a7f2871e
AM
4351 if (opt->dynindx != -1)
4352 {
4353 /* Use __tls_get_addr_opt in dynamic relocations. */
4354 opt->dynindx = -1;
4355 _bfd_elf_strtab_delref (elf_hash_table (info)->dynstr,
4356 opt->dynstr_index);
4357 if (!bfd_elf_link_record_dynamic_symbol (info, opt))
4358 return FALSE;
4359 }
4360 htab->tls_get_addr = opt;
4361 }
4362 }
4363 }
4364 else
5446cbdf 4365 htab->params->no_tls_get_addr_opt = TRUE;
a7f2871e 4366 }
4a3dc543 4367 if (htab->plt_type == PLT_NEW
ce558b89
AM
4368 && htab->elf.splt != NULL
4369 && htab->elf.splt->output_section != NULL)
d7128ce4 4370 {
ce558b89
AM
4371 elf_section_type (htab->elf.splt->output_section) = SHT_PROGBITS;
4372 elf_section_flags (htab->elf.splt->output_section) = SHF_ALLOC + SHF_WRITE;
d7128ce4
AM
4373 }
4374
25dbc73a 4375 return _bfd_elf_tls_setup (obfd, info);
7fce784e
AS
4376}
4377
3a71aa26
AM
4378/* Return TRUE iff REL is a branch reloc with a global symbol matching
4379 HASH. */
4380
4381static bfd_boolean
4382branch_reloc_hash_match (const bfd *ibfd,
4383 const Elf_Internal_Rela *rel,
4384 const struct elf_link_hash_entry *hash)
4385{
4386 Elf_Internal_Shdr *symtab_hdr = &elf_symtab_hdr (ibfd);
4387 enum elf_ppc_reloc_type r_type = ELF32_R_TYPE (rel->r_info);
4388 unsigned int r_symndx = ELF32_R_SYM (rel->r_info);
4389
e054468f 4390 if (r_symndx >= symtab_hdr->sh_info && is_branch_reloc (r_type))
3a71aa26
AM
4391 {
4392 struct elf_link_hash_entry **sym_hashes = elf_sym_hashes (ibfd);
4393 struct elf_link_hash_entry *h;
4394
4395 h = sym_hashes[r_symndx - symtab_hdr->sh_info];
4396 while (h->root.type == bfd_link_hash_indirect
4397 || h->root.type == bfd_link_hash_warning)
4398 h = (struct elf_link_hash_entry *) h->root.u.i.link;
4399 if (h == hash)
4400 return TRUE;
4401 }
4402 return FALSE;
4403}
4404
25dbc73a
AM
4405/* Run through all the TLS relocs looking for optimization
4406 opportunities. */
252b5132 4407
25dbc73a
AM
4408bfd_boolean
4409ppc_elf_tls_optimize (bfd *obfd ATTRIBUTE_UNUSED,
4410 struct bfd_link_info *info)
252b5132 4411{
7fce784e 4412 bfd *ibfd;
25dbc73a
AM
4413 asection *sec;
4414 struct ppc_elf_link_hash_table *htab;
b7fcf6f6 4415 int pass;
252b5132 4416
3cbc1e5e 4417 if (!bfd_link_executable (info))
25dbc73a 4418 return TRUE;
252b5132 4419
7619e7c7 4420 htab = ppc_elf_hash_table (info);
663a1470
AM
4421 if (htab == NULL)
4422 return FALSE;
4423
b7fcf6f6
AM
4424 /* Make two passes through the relocs. First time check that tls
4425 relocs involved in setting up a tls_get_addr call are indeed
663a1470
AM
4426 followed by such a call. If they are not, don't do any tls
4427 optimization. On the second pass twiddle tls_mask flags to
4428 notify relocate_section that optimization can be done, and
4429 adjust got and plt refcounts. */
b7fcf6f6 4430 for (pass = 0; pass < 2; ++pass)
c72f2fb2 4431 for (ibfd = info->input_bfds; ibfd != NULL; ibfd = ibfd->link.next)
b7fcf6f6 4432 {
0ffa91dd 4433 Elf_Internal_Shdr *symtab_hdr = &elf_symtab_hdr (ibfd);
32af9f6e 4434 asection *got2 = bfd_get_section_by_name (ibfd, ".got2");
7619e7c7 4435
b7fcf6f6
AM
4436 for (sec = ibfd->sections; sec != NULL; sec = sec->next)
4437 if (sec->has_tls_reloc && !bfd_is_abs_section (sec->output_section))
4438 {
4439 Elf_Internal_Rela *relstart, *rel, *relend;
663a1470 4440 int expecting_tls_get_addr = 0;
252b5132 4441
b7fcf6f6
AM
4442 /* Read the relocations. */
4443 relstart = _bfd_elf_link_read_relocs (ibfd, sec, NULL, NULL,
4444 info->keep_memory);
4445 if (relstart == NULL)
4446 return FALSE;
7619e7c7 4447
b7fcf6f6
AM
4448 relend = relstart + sec->reloc_count;
4449 for (rel = relstart; rel < relend; rel++)
4450 {
4451 enum elf_ppc_reloc_type r_type;
4452 unsigned long r_symndx;
4453 struct elf_link_hash_entry *h = NULL;
bac3c8c5 4454 unsigned char *tls_mask;
37da22e5 4455 unsigned char tls_set, tls_clear;
b7fcf6f6 4456 bfd_boolean is_local;
b7fcf6f6
AM
4457 bfd_signed_vma *got_count;
4458
4459 r_symndx = ELF32_R_SYM (rel->r_info);
4460 if (r_symndx >= symtab_hdr->sh_info)
4461 {
4462 struct elf_link_hash_entry **sym_hashes;
7fce784e 4463
b7fcf6f6
AM
4464 sym_hashes = elf_sym_hashes (ibfd);
4465 h = sym_hashes[r_symndx - symtab_hdr->sh_info];
4466 while (h->root.type == bfd_link_hash_indirect
4467 || h->root.type == bfd_link_hash_warning)
4468 h = (struct elf_link_hash_entry *) h->root.u.i.link;
4469 }
7619e7c7 4470
f749f26e 4471 is_local = SYMBOL_REFERENCES_LOCAL (info, h);
b7fcf6f6 4472 r_type = ELF32_R_TYPE (rel->r_info);
663a1470
AM
4473 /* If this section has old-style __tls_get_addr calls
4474 without marker relocs, then check that each
4475 __tls_get_addr call reloc is preceded by a reloc
4476 that conceivably belongs to the __tls_get_addr arg
4477 setup insn. If we don't find matching arg setup
4478 relocs, don't do any tls optimization. */
4479 if (pass == 0
9737e8af 4480 && sec->nomark_tls_get_addr
663a1470
AM
4481 && h != NULL
4482 && h == htab->tls_get_addr
4483 && !expecting_tls_get_addr
4484 && is_branch_reloc (r_type))
4485 {
25f53a85 4486 info->callbacks->minfo ("%H __tls_get_addr lost arg, "
663a1470
AM
4487 "TLS optimization disabled\n",
4488 ibfd, sec, rel->r_offset);
4489 if (elf_section_data (sec)->relocs != relstart)
4490 free (relstart);
4491 return TRUE;
4492 }
4493
4494 expecting_tls_get_addr = 0;
b7fcf6f6
AM
4495 switch (r_type)
4496 {
4497 case R_PPC_GOT_TLSLD16:
4498 case R_PPC_GOT_TLSLD16_LO:
4499 expecting_tls_get_addr = 1;
1a0670f3 4500 /* Fall through. */
b7fcf6f6
AM
4501
4502 case R_PPC_GOT_TLSLD16_HI:
4503 case R_PPC_GOT_TLSLD16_HA:
4504 /* These relocs should never be against a symbol
4505 defined in a shared lib. Leave them alone if
4506 that turns out to be the case. */
4507 if (!is_local)
4508 continue;
4509
4510 /* LD -> LE */
4511 tls_set = 0;
4512 tls_clear = TLS_LD;
4513 break;
4514
4515 case R_PPC_GOT_TLSGD16:
4516 case R_PPC_GOT_TLSGD16_LO:
4517 expecting_tls_get_addr = 1;
1a0670f3 4518 /* Fall through. */
b7fcf6f6
AM
4519
4520 case R_PPC_GOT_TLSGD16_HI:
4521 case R_PPC_GOT_TLSGD16_HA:
4522 if (is_local)
4523 /* GD -> LE */
4524 tls_set = 0;
4525 else
4526 /* GD -> IE */
b00a0a86 4527 tls_set = TLS_TLS | TLS_GDIE;
b7fcf6f6
AM
4528 tls_clear = TLS_GD;
4529 break;
4530
4531 case R_PPC_GOT_TPREL16:
4532 case R_PPC_GOT_TPREL16_LO:
4533 case R_PPC_GOT_TPREL16_HI:
4534 case R_PPC_GOT_TPREL16_HA:
4535 if (is_local)
4536 {
4537 /* IE -> LE */
4538 tls_set = 0;
4539 tls_clear = TLS_TPREL;
4540 break;
4541 }
4542 else
4543 continue;
4544
32af9f6e 4545 case R_PPC_TLSLD:
7d04a20a
AM
4546 if (!is_local)
4547 continue;
4548 /* Fall through. */
4549 case R_PPC_TLSGD:
23cedd1d
AM
4550 if (rel + 1 < relend
4551 && is_plt_seq_reloc (ELF32_R_TYPE (rel[1].r_info)))
4552 {
4553 if (pass != 0
4554 && ELF32_R_TYPE (rel[1].r_info) != R_PPC_PLTSEQ)
4555 {
4556 r_type = ELF32_R_TYPE (rel[1].r_info);
4557 r_symndx = ELF32_R_SYM (rel[1].r_info);
4558 if (r_symndx >= symtab_hdr->sh_info)
4559 {
4560 struct elf_link_hash_entry **sym_hashes;
4561
4562 sym_hashes = elf_sym_hashes (ibfd);
4563 h = sym_hashes[r_symndx - symtab_hdr->sh_info];
4564 while (h->root.type == bfd_link_hash_indirect
4565 || h->root.type == bfd_link_hash_warning)
4566 h = (struct elf_link_hash_entry *) h->root.u.i.link;
4567 if (h != NULL)
4568 {
4569 struct plt_entry *ent = NULL;
4570 bfd_vma addend = 0;
4571
4572 if (bfd_link_pic (info))
4573 addend = rel->r_addend;
4574 ent = find_plt_ent (&h->plt.plist,
4575 got2, addend);
4576 if (ent != NULL
4577 && ent->plt.refcount > 0)
4578 ent->plt.refcount -= 1;
4579 }
4580 }
4581 }
4582 continue;
4583 }
32af9f6e
AM
4584 expecting_tls_get_addr = 2;
4585 tls_set = 0;
4586 tls_clear = 0;
4587 break;
4588
b7fcf6f6 4589 default:
25dbc73a 4590 continue;
b7fcf6f6 4591 }
25dbc73a 4592
b7fcf6f6
AM
4593 if (pass == 0)
4594 {
727fc41e 4595 if (!expecting_tls_get_addr
9737e8af 4596 || !sec->nomark_tls_get_addr)
b7fcf6f6 4597 continue;
25dbc73a 4598
3a71aa26
AM
4599 if (rel + 1 < relend
4600 && branch_reloc_hash_match (ibfd, rel + 1,
4601 htab->tls_get_addr))
4602 continue;
25dbc73a 4603
b7fcf6f6
AM
4604 /* Uh oh, we didn't find the expected call. We
4605 could just mark this symbol to exclude it
4606 from tls optimization but it's safer to skip
663a1470 4607 the entire optimization. */
25f53a85 4608 info->callbacks->minfo (_("%H arg lost __tls_get_addr, "
663a1470
AM
4609 "TLS optimization disabled\n"),
4610 ibfd, sec, rel->r_offset);
4611 if (elf_section_data (sec)->relocs != relstart)
4612 free (relstart);
4613 return TRUE;
b7fcf6f6 4614 }
25dbc73a 4615
b7fcf6f6
AM
4616 if (h != NULL)
4617 {
4618 tls_mask = &ppc_elf_hash_entry (h)->tls_mask;
4619 got_count = &h->got.refcount;
4620 }
4621 else
4622 {
b7fcf6f6 4623 bfd_signed_vma *lgot_refs;
e054468f 4624 struct plt_entry **local_plt;
bac3c8c5 4625 unsigned char *lgot_masks;
25dbc73a 4626
b7fcf6f6
AM
4627 lgot_refs = elf_local_got_refcounts (ibfd);
4628 if (lgot_refs == NULL)
4629 abort ();
e054468f
AM
4630 local_plt = (struct plt_entry **)
4631 (lgot_refs + symtab_hdr->sh_info);
bac3c8c5
AM
4632 lgot_masks = (unsigned char *)
4633 (local_plt + symtab_hdr->sh_info);
b7fcf6f6
AM
4634 tls_mask = &lgot_masks[r_symndx];
4635 got_count = &lgot_refs[r_symndx];
4636 }
25dbc73a 4637
37da22e5
AM
4638 /* If we don't have old-style __tls_get_addr calls
4639 without TLSGD/TLSLD marker relocs, and we haven't
4640 found a new-style __tls_get_addr call with a
4641 marker for this symbol, then we either have a
4642 broken object file or an -mlongcall style
4643 indirect call to __tls_get_addr without a marker.
4644 Disable optimization in this case. */
4645 if ((tls_clear & (TLS_GD | TLS_LD)) != 0
9737e8af 4646 && !sec->nomark_tls_get_addr
37da22e5
AM
4647 && ((*tls_mask & (TLS_TLS | TLS_MARK))
4648 != (TLS_TLS | TLS_MARK)))
4649 continue;
4650
7d04a20a 4651 if (expecting_tls_get_addr == 1 + !sec->nomark_tls_get_addr)
37da22e5
AM
4652 {
4653 struct plt_entry *ent;
4654 bfd_vma addend = 0;
4655
4656 if (bfd_link_pic (info)
23cedd1d
AM
4657 && (ELF32_R_TYPE (rel[1].r_info) == R_PPC_PLTREL24
4658 || ELF32_R_TYPE (rel[1].r_info) == R_PPC_PLTCALL))
37da22e5
AM
4659 addend = rel[1].r_addend;
4660 ent = find_plt_ent (&htab->tls_get_addr->plt.plist,
4661 got2, addend);
4662 if (ent != NULL && ent->plt.refcount > 0)
4663 ent->plt.refcount -= 1;
37da22e5 4664 }
7d04a20a
AM
4665 if (tls_clear == 0)
4666 continue;
37da22e5 4667
b7fcf6f6
AM
4668 if (tls_set == 0)
4669 {
4670 /* We managed to get rid of a got entry. */
4671 if (*got_count > 0)
4672 *got_count -= 1;
4673 }
25dbc73a 4674
b7fcf6f6
AM
4675 *tls_mask |= tls_set;
4676 *tls_mask &= ~tls_clear;
4677 }
25dbc73a 4678
b7fcf6f6
AM
4679 if (elf_section_data (sec)->relocs != relstart)
4680 free (relstart);
4681 }
b7fcf6f6 4682 }
9a23f96e 4683 htab->do_tls_opt = 1;
25dbc73a
AM
4684 return TRUE;
4685}
4686\f
98bbb1b8 4687/* Find dynamic relocs for H that apply to read-only sections. */
625af618 4688
98bbb1b8
AM
4689static asection *
4690readonly_dynrelocs (struct elf_link_hash_entry *h)
625af618 4691{
6061a67d 4692 struct elf_dyn_relocs *p;
625af618
AM
4693
4694 for (p = ppc_elf_hash_entry (h)->dyn_relocs; p != NULL; p = p->next)
4695 {
4696 asection *s = p->sec->output_section;
4697
98bbb1b8
AM
4698 if (s != NULL && (s->flags & SEC_READONLY) != 0)
4699 return p->sec;
625af618 4700 }
98bbb1b8 4701 return NULL;
625af618
AM
4702}
4703
287c7eaf
AM
4704/* Return true if we have dynamic relocs against H or any of its weak
4705 aliases, that apply to read-only sections. Cannot be used after
4706 size_dynamic_sections. */
4707
4708static bfd_boolean
4709alias_readonly_dynrelocs (struct elf_link_hash_entry *h)
4710{
4711 struct ppc_elf_link_hash_entry *eh = ppc_elf_hash_entry (h);
4712 do
4713 {
4714 if (readonly_dynrelocs (&eh->elf))
4715 return TRUE;
4716 eh = ppc_elf_hash_entry (eh->elf.u.alias);
4717 } while (eh != NULL && &eh->elf != h);
4718
4719 return FALSE;
4720}
4721
4722/* Return whether H has pc-relative dynamic relocs. */
4723
4724static bfd_boolean
4725pc_dynrelocs (struct elf_link_hash_entry *h)
4726{
4727 struct elf_dyn_relocs *p;
4728
4729 for (p = ppc_elf_hash_entry (h)->dyn_relocs; p != NULL; p = p->next)
4730 if (p->pc_count != 0)
4731 return TRUE;
4732 return FALSE;
4733}
4734
25dbc73a
AM
4735/* Adjust a symbol defined by a dynamic object and referenced by a
4736 regular object. The current definition is in some section of the
4737 dynamic object, but we're not including those sections. We have to
4738 change the definition to something the rest of the link can
4739 understand. */
7fce784e 4740
25dbc73a
AM
4741static bfd_boolean
4742ppc_elf_adjust_dynamic_symbol (struct bfd_link_info *info,
4743 struct elf_link_hash_entry *h)
4744{
4745 struct ppc_elf_link_hash_table *htab;
4746 asection *s;
7fce784e 4747
25dbc73a
AM
4748#ifdef DEBUG
4749 fprintf (stderr, "ppc_elf_adjust_dynamic_symbol called for %s\n",
4750 h->root.root.string);
4751#endif
252b5132 4752
25dbc73a
AM
4753 /* Make sure we know what is going on here. */
4754 htab = ppc_elf_hash_table (info);
4755 BFD_ASSERT (htab->elf.dynobj != NULL
4756 && (h->needs_plt
91e21fb7 4757 || h->type == STT_GNU_IFUNC
60d67dc8 4758 || h->is_weakalias
25dbc73a
AM
4759 || (h->def_dynamic
4760 && h->ref_regular
4761 && !h->def_regular)));
252b5132 4762
25dbc73a
AM
4763 /* Deal with function syms. */
4764 if (h->type == STT_FUNC
e054468f 4765 || h->type == STT_GNU_IFUNC
25dbc73a
AM
4766 || h->needs_plt)
4767 {
529fe20e
AM
4768 bfd_boolean local = (SYMBOL_CALLS_LOCAL (info, h)
4769 || UNDEFWEAK_NO_DYNAMIC_RELOC (info, h));
287c7eaf
AM
4770 /* Discard dyn_relocs when non-pic if we've decided that a
4771 function symbol is local. */
4772 if (!bfd_link_pic (info) && local)
4773 ppc_elf_hash_entry (h)->dyn_relocs = NULL;
529fe20e 4774
25dbc73a
AM
4775 /* Clear procedure linkage table information for any symbol that
4776 won't need a .plt entry. */
a6aa5195
AM
4777 struct plt_entry *ent;
4778 for (ent = h->plt.plist; ent != NULL; ent = ent->next)
4779 if (ent->plt.refcount > 0)
4780 break;
4781 if (ent == NULL
2d7ad24e
AM
4782 || (h->type != STT_GNU_IFUNC
4783 && local
3e04d765
AM
4784 && (htab->can_convert_all_inline_plt
4785 || (ppc_elf_hash_entry (h)->tls_mask
4786 & (TLS_TLS | PLT_KEEP)) != PLT_KEEP)))
252b5132 4787 {
25dbc73a 4788 /* A PLT entry is not required/allowed when:
252b5132 4789
25dbc73a
AM
4790 1. We are not using ld.so; because then the PLT entry
4791 can't be set up, so we can't use one. In this case,
4792 ppc_elf_adjust_dynamic_symbol won't even be called.
252b5132 4793
25dbc73a
AM
4794 2. GC has rendered the entry unused.
4795
4796 3. We know for certain that a call to this symbol
4797 will go to this object, or will remain undefined. */
a6aa5195 4798 h->plt.plist = NULL;
25dbc73a 4799 h->needs_plt = 0;
d1eca1e4 4800 h->pointer_equality_needed = 0;
25dbc73a 4801 }
625af618
AM
4802 else
4803 {
d1eca1e4
AM
4804 /* Taking a function's address in a read/write section
4805 doesn't require us to define the function symbol in the
1009ef28 4806 executable on a plt call stub. A dynamic reloc can
f0158f44
AM
4807 be used instead, giving better runtime performance.
4808 (Calls via that function pointer don't need to bounce
4809 through the plt call stub.) Similarly, use a dynamic
4810 reloc for a weak reference when possible, allowing the
4811 resolution of the symbol to be set at load time rather
4812 than link time. */
4813 if ((h->pointer_equality_needed
3988aed5
AM
4814 || (h->non_got_ref
4815 && !h->ref_regular_nonweak
4816 && !UNDEFWEAK_NO_DYNAMIC_RELOC (info, h)))
1009ef28
AM
4817 && !htab->is_vxworks
4818 && !ppc_elf_hash_entry (h)->has_sda_refs
98bbb1b8 4819 && !readonly_dynrelocs (h))
d1eca1e4
AM
4820 {
4821 h->pointer_equality_needed = 0;
04383fd1
AM
4822 /* If we haven't seen a branch reloc and the symbol
4823 isn't an ifunc then we don't need a plt entry. */
4824 if (!h->needs_plt && h->type != STT_GNU_IFUNC)
3988aed5 4825 h->plt.plist = NULL;
d1eca1e4 4826 }
287c7eaf 4827 else if (!bfd_link_pic (info))
529fe20e
AM
4828 /* We are going to be defining the function symbol on the
4829 plt stub, so no dyn_relocs needed when non-pic. */
287c7eaf 4830 ppc_elf_hash_entry (h)->dyn_relocs = NULL;
625af618 4831 }
d3e454b9 4832 h->protected_def = 0;
3988aed5 4833 /* Function symbols can't have copy relocs. */
25dbc73a 4834 return TRUE;
252b5132 4835 }
25dbc73a 4836 else
a6aa5195 4837 h->plt.plist = NULL;
252b5132 4838
25dbc73a
AM
4839 /* If this is a weak symbol, and there is a real definition, the
4840 processor independent code will have arranged for us to see the
4841 real definition first, and we can just use the same value. */
60d67dc8 4842 if (h->is_weakalias)
252b5132 4843 {
60d67dc8
AM
4844 struct elf_link_hash_entry *def = weakdef (h);
4845 BFD_ASSERT (def->root.type == bfd_link_hash_defined);
4846 h->root.u.def.section = def->root.u.def.section;
4847 h->root.u.def.value = def->root.u.def.value;
4a7e5234
AM
4848 if (def->root.u.def.section == htab->elf.sdynbss
4849 || def->root.u.def.section == htab->elf.sdynrelro
4850 || def->root.u.def.section == htab->dynsbss)
4851 ppc_elf_hash_entry (h)->dyn_relocs = NULL;
25dbc73a
AM
4852 return TRUE;
4853 }
dc810e39 4854
25dbc73a
AM
4855 /* This is a reference to a symbol defined by a dynamic object which
4856 is not a function. */
252b5132 4857
25dbc73a
AM
4858 /* If we are creating a shared library, we must presume that the
4859 only references to the symbol are via the global offset table.
4860 For such cases we need not do anything here; the relocations will
4861 be handled correctly by relocate_section. */
0e1862bb 4862 if (bfd_link_pic (info))
d3e454b9
AM
4863 {
4864 h->protected_def = 0;
4865 return TRUE;
4866 }
252b5132 4867
25dbc73a
AM
4868 /* If there are no references to this symbol that do not use the
4869 GOT, we don't need to generate a copy reloc. */
4870 if (!h->non_got_ref)
d3e454b9
AM
4871 {
4872 h->protected_def = 0;
4873 return TRUE;
4874 }
4875
4876 /* Protected variables do not work with .dynbss. The copy in
4877 .dynbss won't be used by the shared library with the protected
4878 definition for the variable. Editing to PIC, or text relocations
4879 are preferable to an incorrect program. */
4880 if (h->protected_def)
4881 {
4882 if (ELIMINATE_COPY_RELOCS
4883 && ppc_elf_hash_entry (h)->has_addr16_ha
4884 && ppc_elf_hash_entry (h)->has_addr16_lo
4885 && htab->params->pic_fixup == 0
4886 && info->disable_target_specific_optimizations <= 1)
4887 htab->params->pic_fixup = 1;
d3e454b9
AM
4888 return TRUE;
4889 }
25dbc73a 4890
a127494f
AM
4891 /* If -z nocopyreloc was given, we won't generate them either. */
4892 if (info->nocopyreloc)
529fe20e 4893 return TRUE;
a127494f 4894
dce2246a 4895 /* If we don't find any dynamic relocs in read-only sections, then
cfd2c773
NS
4896 we'll be keeping the dynamic relocs and avoiding the copy reloc.
4897 We can't do this if there are any small data relocations. This
4898 doesn't work on VxWorks, where we can not have dynamic
4899 relocations (other than copy and jump slot relocations) in an
4900 executable. */
4dc4a9a5 4901 if (ELIMINATE_COPY_RELOCS
cfd2c773 4902 && !ppc_elf_hash_entry (h)->has_sda_refs
625af618
AM
4903 && !htab->is_vxworks
4904 && !h->def_regular
287c7eaf 4905 && !alias_readonly_dynrelocs (h))
529fe20e 4906 return TRUE;
252b5132 4907
25dbc73a
AM
4908 /* We must allocate the symbol in our .dynbss section, which will
4909 become part of the .bss section of the executable. There will be
4910 an entry for this symbol in the .dynsym section. The dynamic
4911 object will contain position independent code, so all references
4912 from the dynamic object to this symbol will go through the global
4913 offset table. The dynamic linker will use the .dynsym entry to
4914 determine the address it must put in the global offset table, so
4915 both the dynamic object and the regular object will refer to the
4916 same memory location for the variable.
4917
4dc4a9a5
DJ
4918 Of course, if the symbol is referenced using SDAREL relocs, we
4919 must instead allocate it in .sbss. */
4dc4a9a5 4920 if (ppc_elf_hash_entry (h)->has_sda_refs)
25dbc73a 4921 s = htab->dynsbss;
5474d94f
AM
4922 else if ((h->root.u.def.section->flags & SEC_READONLY) != 0)
4923 s = htab->elf.sdynrelro;
25dbc73a 4924 else
9d19e4fd 4925 s = htab->elf.sdynbss;
25dbc73a
AM
4926 BFD_ASSERT (s != NULL);
4927
1d7e9d18 4928 if ((h->root.u.def.section->flags & SEC_ALLOC) != 0 && h->size != 0)
25dbc73a
AM
4929 {
4930 asection *srel;
4931
4a7e5234
AM
4932 /* We must generate a R_PPC_COPY reloc to tell the dynamic
4933 linker to copy the initial value out of the dynamic object
4934 and into the runtime process image. */
4dc4a9a5 4935 if (ppc_elf_hash_entry (h)->has_sda_refs)
25dbc73a 4936 srel = htab->relsbss;
5474d94f
AM
4937 else if ((h->root.u.def.section->flags & SEC_READONLY) != 0)
4938 srel = htab->elf.sreldynrelro;
25dbc73a 4939 else
9d19e4fd 4940 srel = htab->elf.srelbss;
25dbc73a
AM
4941 BFD_ASSERT (srel != NULL);
4942 srel->size += sizeof (Elf32_External_Rela);
4943 h->needs_copy = 1;
4944 }
7619e7c7 4945
529fe20e 4946 /* We no longer want dyn_relocs. */
287c7eaf 4947 ppc_elf_hash_entry (h)->dyn_relocs = NULL;
6cabe1ea 4948 return _bfd_elf_adjust_dynamic_copy (info, h, s);
25dbc73a
AM
4949}
4950\f
ac39eb42
AM
4951/* Generate a symbol to mark plt call stubs. For non-PIC code the sym is
4952 xxxxxxxx.plt_call32.<callee> where xxxxxxxx is a hex number, usually 0,
4953 specifying the addend on the plt relocation. For -fpic code, the sym
4954 is xxxxxxxx.plt_pic32.<callee>, and for -fPIC
4955 xxxxxxxx.got2.plt_pic32.<callee>. */
0ba07910
AM
4956
4957static bfd_boolean
4958add_stub_sym (struct plt_entry *ent,
4959 struct elf_link_hash_entry *h,
ac39eb42 4960 struct bfd_link_info *info)
0ba07910
AM
4961{
4962 struct elf_link_hash_entry *sh;
4963 size_t len1, len2, len3;
4964 char *name;
ac39eb42
AM
4965 const char *stub;
4966 struct ppc_elf_link_hash_table *htab = ppc_elf_hash_table (info);
4967
0e1862bb 4968 if (bfd_link_pic (info))
ac39eb42
AM
4969 stub = ".plt_pic32.";
4970 else
4971 stub = ".plt_call32.";
0ba07910
AM
4972
4973 len1 = strlen (h->root.root.string);
ac39eb42 4974 len2 = strlen (stub);
0ba07910
AM
4975 len3 = 0;
4976 if (ent->sec)
4977 len3 = strlen (ent->sec->name);
ac39eb42 4978 name = bfd_malloc (len1 + len2 + len3 + 9);
0ba07910
AM
4979 if (name == NULL)
4980 return FALSE;
4981 sprintf (name, "%08x", (unsigned) ent->addend & 0xffffffff);
4982 if (ent->sec)
4983 memcpy (name + 8, ent->sec->name, len3);
ac39eb42
AM
4984 memcpy (name + 8 + len3, stub, len2);
4985 memcpy (name + 8 + len3 + len2, h->root.root.string, len1 + 1);
0ba07910
AM
4986 sh = elf_link_hash_lookup (&htab->elf, name, TRUE, FALSE, FALSE);
4987 if (sh == NULL)
4988 return FALSE;
4989 if (sh->root.type == bfd_link_hash_new)
4990 {
4991 sh->root.type = bfd_link_hash_defined;
4992 sh->root.u.def.section = htab->glink;
4993 sh->root.u.def.value = ent->glink_offset;
4994 sh->ref_regular = 1;
4995 sh->def_regular = 1;
4996 sh->ref_regular_nonweak = 1;
4997 sh->forced_local = 1;
4998 sh->non_elf = 0;
2ec55de3 4999 sh->root.linker_def = 1;
0ba07910
AM
5000 }
5001 return TRUE;
5002}
5003
3b36f7e6
AM
5004/* Allocate NEED contiguous space in .got, and return the offset.
5005 Handles allocation of the got header when crossing 32k. */
5006
5007static bfd_vma
5008allocate_got (struct ppc_elf_link_hash_table *htab, unsigned int need)
5009{
5010 bfd_vma where;
4a3dc543 5011 unsigned int max_before_header;
3b36f7e6 5012
4a3dc543 5013 if (htab->plt_type == PLT_VXWORKS)
9d8504b1 5014 {
ce558b89
AM
5015 where = htab->elf.sgot->size;
5016 htab->elf.sgot->size += need;
9d8504b1 5017 }
3b36f7e6
AM
5018 else
5019 {
4a3dc543
RS
5020 max_before_header = htab->plt_type == PLT_NEW ? 32768 : 32764;
5021 if (need <= htab->got_gap)
3b36f7e6 5022 {
4a3dc543
RS
5023 where = max_before_header - htab->got_gap;
5024 htab->got_gap -= need;
5025 }
5026 else
5027 {
ce558b89
AM
5028 if (htab->elf.sgot->size + need > max_before_header
5029 && htab->elf.sgot->size <= max_before_header)
4a3dc543 5030 {
ce558b89
AM
5031 htab->got_gap = max_before_header - htab->elf.sgot->size;
5032 htab->elf.sgot->size = max_before_header + htab->got_header_size;
4a3dc543 5033 }
ce558b89
AM
5034 where = htab->elf.sgot->size;
5035 htab->elf.sgot->size += need;
3b36f7e6 5036 }
3b36f7e6
AM
5037 }
5038 return where;
5039}
5040
f15d0b54
AM
5041/* Calculate size of GOT entries for symbol given its TLS_MASK.
5042 TLS_LD is excluded because those go in a special GOT slot. */
5043
5044static inline unsigned int
5045got_entries_needed (int tls_mask)
5046{
5047 unsigned int need;
5048 if ((tls_mask & TLS_TLS) == 0)
5049 need = 4;
5050 else
5051 {
5052 need = 0;
5053 if ((tls_mask & TLS_GD) != 0)
5054 need += 8;
b00a0a86 5055 if ((tls_mask & (TLS_TPREL | TLS_GDIE)) != 0)
f15d0b54
AM
5056 need += 4;
5057 if ((tls_mask & TLS_DTPREL) != 0)
5058 need += 4;
5059 }
5060 return need;
5061}
5062
46434633 5063/* If H is undefined, make it dynamic if that makes sense. */
f0158f44
AM
5064
5065static bfd_boolean
46434633
AM
5066ensure_undef_dynamic (struct bfd_link_info *info,
5067 struct elf_link_hash_entry *h)
f0158f44
AM
5068{
5069 struct elf_link_hash_table *htab = elf_hash_table (info);
5070
5071 if (htab->dynamic_sections_created
46434633
AM
5072 && ((info->dynamic_undefined_weak != 0
5073 && h->root.type == bfd_link_hash_undefweak)
5074 || h->root.type == bfd_link_hash_undefined)
f0158f44
AM
5075 && h->dynindx == -1
5076 && !h->forced_local
5077 && ELF_ST_VISIBILITY (h->other) == STV_DEFAULT)
5078 return bfd_elf_link_record_dynamic_symbol (info, h);
5079 return TRUE;
5080}
5081
25dbc73a 5082/* Allocate space in associated reloc sections for dynamic relocs. */
252b5132 5083
b34976b6 5084static bfd_boolean
25dbc73a 5085allocate_dynrelocs (struct elf_link_hash_entry *h, void *inf)
252b5132 5086{
25dbc73a
AM
5087 struct bfd_link_info *info = inf;
5088 struct ppc_elf_link_hash_entry *eh;
7619e7c7 5089 struct ppc_elf_link_hash_table *htab;
6061a67d 5090 struct elf_dyn_relocs *p;
f0158f44 5091 bfd_boolean dyn;
252b5132 5092
25dbc73a 5093 if (h->root.type == bfd_link_hash_indirect)
b34976b6 5094 return TRUE;
252b5132 5095
7619e7c7 5096 htab = ppc_elf_hash_table (info);
25dbc73a 5097 eh = (struct ppc_elf_link_hash_entry *) h;
d3e454b9
AM
5098 if (eh->elf.got.refcount > 0
5099 || (ELIMINATE_COPY_RELOCS
5100 && !eh->elf.def_regular
5101 && eh->elf.protected_def
5102 && eh->has_addr16_ha
5103 && eh->has_addr16_lo
5104 && htab->params->pic_fixup > 0))
25dbc73a 5105 {
d6e14abc
AM
5106 unsigned int need;
5107
46434633
AM
5108 /* Make sure this symbol is output as a dynamic symbol. */
5109 if (!ensure_undef_dynamic (info, &eh->elf))
f0158f44 5110 return FALSE;
252b5132 5111
d6e14abc 5112 need = 0;
37da22e5 5113 if ((eh->tls_mask & (TLS_TLS | TLS_LD)) == (TLS_TLS | TLS_LD))
25dbc73a 5114 {
f749f26e 5115 if (SYMBOL_REFERENCES_LOCAL (info, &eh->elf))
f15d0b54
AM
5116 /* We'll just use htab->tlsld_got.offset. This should
5117 always be the case. It's a little odd if we have
5118 a local dynamic reloc against a non-local symbol. */
5119 htab->tlsld_got.refcount += 1;
5120 else
d6e14abc 5121 need += 8;
d6e14abc 5122 }
f15d0b54 5123 need += got_entries_needed (eh->tls_mask);
d6e14abc
AM
5124 if (need == 0)
5125 eh->elf.got.offset = (bfd_vma) -1;
5126 else
5127 {
3b36f7e6 5128 eh->elf.got.offset = allocate_got (htab, need);
f749f26e
AM
5129 if (((bfd_link_pic (info)
5130 && !((eh->tls_mask & TLS_TLS) != 0
5131 && bfd_link_executable (info)
5132 && SYMBOL_REFERENCES_LOCAL (info, &eh->elf)))
f0158f44
AM
5133 || (htab->elf.dynamic_sections_created
5134 && eh->elf.dynindx != -1
5135 && !SYMBOL_REFERENCES_LOCAL (info, &eh->elf)))
21d68fcd 5136 && !UNDEFWEAK_NO_DYNAMIC_RELOC (info, &eh->elf))
252b5132 5137 {
f15d0b54 5138 asection *rsec;
f15d0b54 5139
f749f26e
AM
5140 need *= sizeof (Elf32_External_Rela) / 4;
5141 if ((eh->tls_mask & (TLS_TLS | TLS_LD)) == (TLS_TLS | TLS_LD))
f15d0b54
AM
5142 need -= sizeof (Elf32_External_Rela);
5143 rsec = htab->elf.srelgot;
0bed072f 5144 if (eh->elf.type == STT_GNU_IFUNC)
ce558b89 5145 rsec = htab->elf.irelplt;
f15d0b54 5146 rsec->size += need;
252b5132 5147 }
25dbc73a
AM
5148 }
5149 }
5150 else
5151 eh->elf.got.offset = (bfd_vma) -1;
252b5132 5152
954b63d4
AM
5153 /* If no dynamic sections we can't have dynamic relocs, except for
5154 IFUNCs which are handled even in static executables. */
f0158f44
AM
5155 if (!htab->elf.dynamic_sections_created
5156 && h->type != STT_GNU_IFUNC)
5157 eh->dyn_relocs = NULL;
5158
529fe20e
AM
5159 /* Discard relocs on undefined symbols that must be local. */
5160 else if (h->root.type == bfd_link_hash_undefined
5161 && ELF_ST_VISIBILITY (h->other) != STV_DEFAULT)
5162 eh->dyn_relocs = NULL;
5163
5164 /* Also discard relocs on undefined weak syms with non-default
5165 visibility, or when dynamic_undefined_weak says so. */
5166 else if (UNDEFWEAK_NO_DYNAMIC_RELOC (info, h))
5167 eh->dyn_relocs = NULL;
5168
f0158f44 5169 if (eh->dyn_relocs == NULL)
287c7eaf 5170 ;
252b5132 5171
25dbc73a
AM
5172 /* In the shared -Bsymbolic case, discard space allocated for
5173 dynamic pc-relative relocs against symbols which turn out to be
5174 defined in regular objects. For the normal shared case, discard
5175 space for relocs that have become local due to symbol visibility
5176 changes. */
f0158f44 5177 else if (bfd_link_pic (info))
25dbc73a
AM
5178 {
5179 /* Relocs that use pc_count are those that appear on a call insn,
1d483afe 5180 or certain REL relocs (see must_be_dyn_reloc) that can be
25dbc73a
AM
5181 generated via assembly. We want calls to protected symbols to
5182 resolve directly to the function rather than going via the plt.
5183 If people want function pointer comparisons to work as expected
5184 then they should avoid writing weird assembly. */
529fe20e 5185 if (SYMBOL_CALLS_LOCAL (info, h))
25dbc73a 5186 {
6061a67d 5187 struct elf_dyn_relocs **pp;
25dbc73a
AM
5188
5189 for (pp = &eh->dyn_relocs; (p = *pp) != NULL; )
252b5132 5190 {
25dbc73a
AM
5191 p->count -= p->pc_count;
5192 p->pc_count = 0;
5193 if (p->count == 0)
5194 *pp = p->next;
5195 else
5196 pp = &p->next;
252b5132 5197 }
25dbc73a 5198 }
252b5132 5199
3348747a
NS
5200 if (htab->is_vxworks)
5201 {
6061a67d 5202 struct elf_dyn_relocs **pp;
3348747a
NS
5203
5204 for (pp = &eh->dyn_relocs; (p = *pp) != NULL; )
5205 {
5206 if (strcmp (p->sec->output_section->name, ".tls_vars") == 0)
5207 *pp = p->next;
5208 else
5209 pp = &p->next;
5210 }
5211 }
5212
954b63d4 5213 if (eh->dyn_relocs != NULL)
25dbc73a 5214 {
46434633
AM
5215 /* Make sure this symbol is output as a dynamic symbol. */
5216 if (!ensure_undef_dynamic (info, h))
f0158f44 5217 return FALSE;
25dbc73a
AM
5218 }
5219 }
5220 else if (ELIMINATE_COPY_RELOCS)
5221 {
f0158f44 5222 /* For the non-pic case, discard space for relocs against
25dbc73a
AM
5223 symbols which turn out to need copy relocs or are not
5224 dynamic. */
529fe20e 5225 if (h->dynamic_adjusted
d3e454b9 5226 && !h->def_regular
529fe20e 5227 && !ELF_COMMON_DEF_P (h)
d3e454b9
AM
5228 && !(h->protected_def
5229 && eh->has_addr16_ha
5230 && eh->has_addr16_lo
5231 && htab->params->pic_fixup > 0))
25dbc73a 5232 {
46434633
AM
5233 /* Make sure this symbol is output as a dynamic symbol. */
5234 if (!ensure_undef_dynamic (info, h))
f0158f44 5235 return FALSE;
7619e7c7 5236
f0158f44 5237 if (h->dynindx == -1)
287c7eaf 5238 eh->dyn_relocs = NULL;
25dbc73a 5239 }
f0158f44 5240 else
287c7eaf 5241 eh->dyn_relocs = NULL;
25dbc73a 5242 }
252b5132 5243
f0158f44 5244 /* Allocate space. */
25dbc73a
AM
5245 for (p = eh->dyn_relocs; p != NULL; p = p->next)
5246 {
5247 asection *sreloc = elf_section_data (p->sec)->sreloc;
f95f8542 5248 if (eh->elf.type == STT_GNU_IFUNC)
ce558b89 5249 sreloc = htab->elf.irelplt;
25dbc73a
AM
5250 sreloc->size += p->count * sizeof (Elf32_External_Rela);
5251 }
252b5132 5252
2d7ad24e
AM
5253 /* Handle PLT relocs. Done last, after dynindx has settled.
5254 We might need a PLT entry when the symbol
5255 a) is dynamic, or
5256 b) is an ifunc, or
5257 c) has plt16 relocs and has been processed by adjust_dynamic_symbol, or
5258 d) has plt16 relocs and we are linking statically. */
f0158f44 5259 dyn = htab->elf.dynamic_sections_created && h->dynindx != -1;
2d7ad24e
AM
5260 if (dyn
5261 || h->type == STT_GNU_IFUNC
5262 || (h->needs_plt && h->dynamic_adjusted)
5263 || (h->needs_plt
5264 && h->def_regular
5265 && !htab->elf.dynamic_sections_created
3e04d765 5266 && !htab->can_convert_all_inline_plt
2d7ad24e
AM
5267 && (ppc_elf_hash_entry (h)->tls_mask
5268 & (TLS_TLS | PLT_KEEP)) == PLT_KEEP))
f0158f44
AM
5269 {
5270 struct plt_entry *ent;
5271 bfd_boolean doneone = FALSE;
2d7ad24e 5272 bfd_vma plt_offset = 0, glink_offset = (bfd_vma) -1;
f0158f44
AM
5273
5274 for (ent = h->plt.plist; ent != NULL; ent = ent->next)
5275 if (ent->plt.refcount > 0)
5276 {
5277 asection *s = htab->elf.splt;
5278
5279 if (!dyn)
2d7ad24e
AM
5280 {
5281 if (h->type == STT_GNU_IFUNC)
5282 s = htab->elf.iplt;
5283 else
5284 s = htab->pltlocal;
5285 }
f0158f44
AM
5286
5287 if (htab->plt_type == PLT_NEW || !dyn)
5288 {
5289 if (!doneone)
5290 {
5291 plt_offset = s->size;
5292 s->size += 4;
5293 }
5294 ent->plt.offset = plt_offset;
5295
2d7ad24e
AM
5296 if (s == htab->pltlocal)
5297 ent->glink_offset = glink_offset;
5298 else
f0158f44 5299 {
2d7ad24e
AM
5300 s = htab->glink;
5301 if (!doneone || bfd_link_pic (info))
5302 {
5303 glink_offset = s->size;
5304 s->size += GLINK_ENTRY_SIZE (htab, h);
5305 }
5306 if (!doneone
5307 && !bfd_link_pic (info)
5308 && h->def_dynamic
5309 && !h->def_regular)
5310 {
5311 h->root.u.def.section = s;
5312 h->root.u.def.value = glink_offset;
5313 }
5314 ent->glink_offset = glink_offset;
f0158f44 5315
2d7ad24e
AM
5316 if (htab->params->emit_stub_syms
5317 && !add_stub_sym (ent, h, info))
5318 return FALSE;
5319 }
f0158f44
AM
5320 }
5321 else
5322 {
5323 if (!doneone)
5324 {
5325 /* If this is the first .plt entry, make room
5326 for the special first entry. */
5327 if (s->size == 0)
5328 s->size += htab->plt_initial_entry_size;
5329
5330 /* The PowerPC PLT is actually composed of two
5331 parts, the first part is 2 words (for a load
5332 and a jump), and then there is a remaining
5333 word available at the end. */
5334 plt_offset = (htab->plt_initial_entry_size
5335 + (htab->plt_slot_size
5336 * ((s->size
5337 - htab->plt_initial_entry_size)
5338 / htab->plt_entry_size)));
5339
5340 /* If this symbol is not defined in a regular
5341 file, and we are not generating a shared
5342 library, then set the symbol to this location
5343 in the .plt. This is to avoid text
5344 relocations, and is required to make
5345 function pointers compare as equal between
5346 the normal executable and the shared library. */
5347 if (! bfd_link_pic (info)
5348 && h->def_dynamic
5349 && !h->def_regular)
5350 {
5351 h->root.u.def.section = s;
5352 h->root.u.def.value = plt_offset;
5353 }
5354
5355 /* Make room for this entry. */
5356 s->size += htab->plt_entry_size;
5357 /* After the 8192nd entry, room for two entries
5358 is allocated. */
5359 if (htab->plt_type == PLT_OLD
5360 && (s->size - htab->plt_initial_entry_size)
5361 / htab->plt_entry_size
5362 > PLT_NUM_SINGLE_ENTRIES)
5363 s->size += htab->plt_entry_size;
5364 }
5365 ent->plt.offset = plt_offset;
5366 }
5367
5368 /* We also need to make an entry in the .rela.plt section. */
5369 if (!doneone)
5370 {
5371 if (!dyn)
2d7ad24e
AM
5372 {
5373 if (h->type == STT_GNU_IFUNC)
5374 {
5375 s = htab->elf.irelplt;
5376 s->size += sizeof (Elf32_External_Rela);
5377 }
5378 else if (bfd_link_pic (info))
5379 {
5380 s = htab->relpltlocal;
5381 s->size += sizeof (Elf32_External_Rela);
5382 }
5383 }
f0158f44
AM
5384 else
5385 {
5386 htab->elf.srelplt->size += sizeof (Elf32_External_Rela);
5387
5388 if (htab->plt_type == PLT_VXWORKS)
5389 {
5390 /* Allocate space for the unloaded relocations. */
5391 if (!bfd_link_pic (info)
5392 && htab->elf.dynamic_sections_created)
5393 {
5394 if (ent->plt.offset
5395 == (bfd_vma) htab->plt_initial_entry_size)
5396 {
5397 htab->srelplt2->size
5398 += (sizeof (Elf32_External_Rela)
5399 * VXWORKS_PLTRESOLVE_RELOCS);
5400 }
5401
5402 htab->srelplt2->size
5403 += (sizeof (Elf32_External_Rela)
5404 * VXWORKS_PLT_NON_JMP_SLOT_RELOCS);
5405 }
5406
5407 /* Every PLT entry has an associated GOT entry in
5408 .got.plt. */
5409 htab->elf.sgotplt->size += 4;
5410 }
5411 }
5412 doneone = TRUE;
5413 }
5414 }
5415 else
5416 ent->plt.offset = (bfd_vma) -1;
5417
5418 if (!doneone)
5419 {
5420 h->plt.plist = NULL;
5421 h->needs_plt = 0;
5422 }
5423 }
5424 else
5425 {
5426 h->plt.plist = NULL;
5427 h->needs_plt = 0;
5428 }
5429
25dbc73a
AM
5430 return TRUE;
5431}
7619e7c7 5432
625af618
AM
5433/* Set DF_TEXTREL if we find any dynamic relocs that apply to
5434 read-only sections. */
7619e7c7 5435
25dbc73a 5436static bfd_boolean
0caf6c82 5437maybe_set_textrel (struct elf_link_hash_entry *h, void *info_p)
25dbc73a 5438{
98bbb1b8 5439 asection *sec;
0caf6c82 5440
25dbc73a
AM
5441 if (h->root.type == bfd_link_hash_indirect)
5442 return TRUE;
252b5132 5443
98bbb1b8
AM
5444 sec = readonly_dynrelocs (h);
5445 if (sec != NULL)
25dbc73a 5446 {
98bbb1b8
AM
5447 struct bfd_link_info *info = (struct bfd_link_info *) info_p;
5448
0caf6c82 5449 info->flags |= DF_TEXTREL;
98bbb1b8 5450 info->callbacks->minfo
c1c8c1ef 5451 (_("%pB: dynamic relocation against `%pT' in read-only section `%pA'\n"),
63c1f59d 5452 sec->owner, h->root.root.string, sec);
ee05f2fe 5453
625af618
AM
5454 /* Not an error, just cut short the traversal. */
5455 return FALSE;
25dbc73a
AM
5456 }
5457 return TRUE;
5458}
5459
6177242a
AM
5460static const unsigned char glink_eh_frame_cie[] =
5461{
5462 0, 0, 0, 16, /* length. */
5463 0, 0, 0, 0, /* id. */
5464 1, /* CIE version. */
5465 'z', 'R', 0, /* Augmentation string. */
5466 4, /* Code alignment. */
5467 0x7c, /* Data alignment. */
5468 65, /* RA reg. */
5469 1, /* Augmentation size. */
5470 DW_EH_PE_pcrel | DW_EH_PE_sdata4, /* FDE encoding. */
5471 DW_CFA_def_cfa, 1, 0 /* def_cfa: r1 offset 0. */
5472};
5473
25dbc73a
AM
5474/* Set the sizes of the dynamic sections. */
5475
5476static bfd_boolean
93d1b056 5477ppc_elf_size_dynamic_sections (bfd *output_bfd,
25dbc73a
AM
5478 struct bfd_link_info *info)
5479{
5480 struct ppc_elf_link_hash_table *htab;
5481 asection *s;
5482 bfd_boolean relocs;
5483 bfd *ibfd;
7fce784e 5484
252b5132 5485#ifdef DEBUG
25dbc73a 5486 fprintf (stderr, "ppc_elf_size_dynamic_sections called\n");
252b5132 5487#endif
252b5132 5488
25dbc73a
AM
5489 htab = ppc_elf_hash_table (info);
5490 BFD_ASSERT (htab->elf.dynobj != NULL);
252b5132 5491
25dbc73a
AM
5492 if (elf_hash_table (info)->dynamic_sections_created)
5493 {
5494 /* Set the contents of the .interp section to the interpreter. */
9b8b325a 5495 if (bfd_link_executable (info) && !info->nointerp)
25dbc73a 5496 {
3d4d4302 5497 s = bfd_get_linker_section (htab->elf.dynobj, ".interp");
25dbc73a
AM
5498 BFD_ASSERT (s != NULL);
5499 s->size = sizeof ELF_DYNAMIC_INTERPRETER;
5500 s->contents = (unsigned char *) ELF_DYNAMIC_INTERPRETER;
5501 }
5502 }
252b5132 5503
4a3dc543 5504 if (htab->plt_type == PLT_OLD)
d7128ce4 5505 htab->got_header_size = 16;
4a3dc543 5506 else if (htab->plt_type == PLT_NEW)
d7128ce4 5507 htab->got_header_size = 12;
252b5132 5508
25dbc73a
AM
5509 /* Set up .got offsets for local syms, and space for local dynamic
5510 relocs. */
c72f2fb2 5511 for (ibfd = info->input_bfds; ibfd != NULL; ibfd = ibfd->link.next)
25dbc73a
AM
5512 {
5513 bfd_signed_vma *local_got;
5514 bfd_signed_vma *end_local_got;
e054468f
AM
5515 struct plt_entry **local_plt;
5516 struct plt_entry **end_local_plt;
25dbc73a
AM
5517 char *lgot_masks;
5518 bfd_size_type locsymcount;
5519 Elf_Internal_Shdr *symtab_hdr;
7fce784e 5520
0c8d6e5c 5521 if (!is_ppc_elf (ibfd))
25dbc73a 5522 continue;
7fce784e 5523
25dbc73a
AM
5524 for (s = ibfd->sections; s != NULL; s = s->next)
5525 {
f95f8542 5526 struct ppc_dyn_relocs *p;
252b5132 5527
f95f8542 5528 for (p = ((struct ppc_dyn_relocs *)
25dbc73a
AM
5529 elf_section_data (s)->local_dynrel);
5530 p != NULL;
5531 p = p->next)
5532 {
5533 if (!bfd_is_abs_section (p->sec)
5534 && bfd_is_abs_section (p->sec->output_section))
5535 {
5536 /* Input section has been discarded, either because
5537 it is a copy of a linkonce section or due to
5538 linker script /DISCARD/, so we'll be discarding
5539 the relocs too. */
7fce784e 5540 }
3348747a
NS
5541 else if (htab->is_vxworks
5542 && strcmp (p->sec->output_section->name,
5543 ".tls_vars") == 0)
5544 {
5545 /* Relocations in vxworks .tls_vars sections are
5546 handled specially by the loader. */
5547 }
25dbc73a 5548 else if (p->count != 0)
7fce784e 5549 {
25f23106 5550 asection *sreloc = elf_section_data (p->sec)->sreloc;
f95f8542 5551 if (p->ifunc)
ce558b89 5552 sreloc = htab->elf.irelplt;
25f23106 5553 sreloc->size += p->count * sizeof (Elf32_External_Rela);
25dbc73a
AM
5554 if ((p->sec->output_section->flags
5555 & (SEC_READONLY | SEC_ALLOC))
5556 == (SEC_READONLY | SEC_ALLOC))
0caf6c82
L
5557 {
5558 info->flags |= DF_TEXTREL;
871b3ab2 5559 info->callbacks->minfo (_("%pB: dynamic relocation in read-only section `%pA'\n"),
0caf6c82
L
5560 p->sec->owner, p->sec);
5561 }
7fce784e 5562 }
252b5132 5563 }
252b5132 5564 }
252b5132 5565
25dbc73a
AM
5566 local_got = elf_local_got_refcounts (ibfd);
5567 if (!local_got)
5568 continue;
252b5132 5569
0ffa91dd 5570 symtab_hdr = &elf_symtab_hdr (ibfd);
25dbc73a
AM
5571 locsymcount = symtab_hdr->sh_info;
5572 end_local_got = local_got + locsymcount;
e054468f
AM
5573 local_plt = (struct plt_entry **) end_local_got;
5574 end_local_plt = local_plt + locsymcount;
5575 lgot_masks = (char *) end_local_plt;
91d6fa6a 5576
25dbc73a
AM
5577 for (; local_got < end_local_got; ++local_got, ++lgot_masks)
5578 if (*local_got > 0)
5579 {
f15d0b54 5580 unsigned int need;
37da22e5 5581 if ((*lgot_masks & (TLS_TLS | TLS_LD)) == (TLS_TLS | TLS_LD))
f15d0b54
AM
5582 htab->tlsld_got.refcount += 1;
5583 need = got_entries_needed (*lgot_masks);
d6e14abc
AM
5584 if (need == 0)
5585 *local_got = (bfd_vma) -1;
25dbc73a
AM
5586 else
5587 {
3b36f7e6 5588 *local_got = allocate_got (htab, need);
f749f26e
AM
5589 if (bfd_link_pic (info)
5590 && !((*lgot_masks & TLS_TLS) != 0
5591 && bfd_link_executable (info)))
0bed072f 5592 {
f15d0b54 5593 asection *srel;
f15d0b54 5594
f749f26e 5595 need *= sizeof (Elf32_External_Rela) / 4;
f15d0b54 5596 srel = htab->elf.srelgot;
37da22e5 5597 if ((*lgot_masks & (TLS_TLS | PLT_IFUNC)) == PLT_IFUNC)
ce558b89 5598 srel = htab->elf.irelplt;
f15d0b54 5599 srel->size += need;
0bed072f 5600 }
25dbc73a
AM
5601 }
5602 }
5603 else
5604 *local_got = (bfd_vma) -1;
e054468f
AM
5605
5606 if (htab->is_vxworks)
5607 continue;
5608
5609 /* Allocate space for calls to local STT_GNU_IFUNC syms in .iplt. */
2d7ad24e
AM
5610 lgot_masks = (char *) end_local_plt;
5611 for (; local_plt < end_local_plt; ++local_plt, ++lgot_masks)
e054468f
AM
5612 {
5613 struct plt_entry *ent;
5614 bfd_boolean doneone = FALSE;
2d7ad24e 5615 bfd_vma plt_offset = 0, glink_offset = (bfd_vma) -1;
e054468f
AM
5616
5617 for (ent = *local_plt; ent != NULL; ent = ent->next)
5618 if (ent->plt.refcount > 0)
5619 {
2d7ad24e
AM
5620 if ((*lgot_masks & (TLS_TLS | PLT_IFUNC)) == PLT_IFUNC)
5621 s = htab->elf.iplt;
3e04d765
AM
5622 else if (htab->can_convert_all_inline_plt
5623 || (*lgot_masks & (TLS_TLS | PLT_KEEP)) != PLT_KEEP)
2d7ad24e
AM
5624 {
5625 ent->plt.offset = (bfd_vma) -1;
5626 continue;
5627 }
5628 else
5629 s = htab->pltlocal;
e054468f
AM
5630
5631 if (!doneone)
5632 {
5633 plt_offset = s->size;
5634 s->size += 4;
5635 }
5636 ent->plt.offset = plt_offset;
5637
2d7ad24e 5638 if (s != htab->pltlocal && (!doneone || bfd_link_pic (info)))
e054468f 5639 {
2d7ad24e 5640 s = htab->glink;
e054468f 5641 glink_offset = s->size;
9e390558 5642 s->size += GLINK_ENTRY_SIZE (htab, NULL);
e054468f
AM
5643 }
5644 ent->glink_offset = glink_offset;
5645
5646 if (!doneone)
5647 {
2d7ad24e
AM
5648 if ((*lgot_masks & (TLS_TLS | PLT_IFUNC)) == PLT_IFUNC)
5649 {
5650 s = htab->elf.irelplt;
5651 s->size += sizeof (Elf32_External_Rela);
5652 }
5653 else if (bfd_link_pic (info))
5654 {
5655 s = htab->relpltlocal;
5656 s->size += sizeof (Elf32_External_Rela);
5657 }
e054468f
AM
5658 doneone = TRUE;
5659 }
5660 }
5661 else
5662 ent->plt.offset = (bfd_vma) -1;
5663 }
25dbc73a 5664 }
252b5132 5665
b7fcf6f6
AM
5666 /* Allocate space for global sym dynamic relocs. */
5667 elf_link_hash_traverse (elf_hash_table (info), allocate_dynrelocs, info);
5668
3b36f7e6
AM
5669 if (htab->tlsld_got.refcount > 0)
5670 {
5671 htab->tlsld_got.offset = allocate_got (htab, 8);
f749f26e 5672 if (bfd_link_dll (info))
ce558b89 5673 htab->elf.srelgot->size += sizeof (Elf32_External_Rela);
3b36f7e6
AM
5674 }
5675 else
5676 htab->tlsld_got.offset = (bfd_vma) -1;
5677
ce558b89 5678 if (htab->elf.sgot != NULL && htab->plt_type != PLT_VXWORKS)
3b36f7e6
AM
5679 {
5680 unsigned int g_o_t = 32768;
5681
4d962050
AM
5682 /* If we haven't allocated the header, do so now. When we get here,
5683 for old plt/got the got size will be 0 to 32764 (not allocated),
5684 or 32780 to 65536 (header allocated). For new plt/got, the
5685 corresponding ranges are 0 to 32768 and 32780 to 65536. */
ce558b89 5686 if (htab->elf.sgot->size <= 32768)
3b36f7e6 5687 {
ce558b89 5688 g_o_t = htab->elf.sgot->size;
4a3dc543 5689 if (htab->plt_type == PLT_OLD)
4d962050 5690 g_o_t += 4;
ce558b89 5691 htab->elf.sgot->size += htab->got_header_size;
3b36f7e6 5692 }
3b36f7e6
AM
5693
5694 htab->elf.hgot->root.u.def.value = g_o_t;
5695 }
0e1862bb 5696 if (bfd_link_pic (info))
bd6c6e2b
AM
5697 {
5698 struct elf_link_hash_entry *sda = htab->sdata[0].sym;
93d1b056
AM
5699
5700 sda->root.u.def.section = htab->elf.hgot->root.u.def.section;
5701 sda->root.u.def.value = htab->elf.hgot->root.u.def.value;
bd6c6e2b 5702 }
15bfcc77
AM
5703 if (info->emitrelocations)
5704 {
5705 struct elf_link_hash_entry *sda = htab->sdata[0].sym;
5706
5707 if (sda != NULL && sda->ref_regular)
5708 sda->root.u.def.section->flags |= SEC_KEEP;
5709 sda = htab->sdata[1].sym;
5710 if (sda != NULL && sda->ref_regular)
5711 sda->root.u.def.section->flags |= SEC_KEEP;
5712 }
3b36f7e6 5713
e054468f
AM
5714 if (htab->glink != NULL
5715 && htab->glink->size != 0
5716 && htab->elf.dynamic_sections_created)
d7128ce4
AM
5717 {
5718 htab->glink_pltresolve = htab->glink->size;
9e390558
AM
5719 /* Space for the branch table. */
5720 htab->glink->size
5721 += htab->elf.srelplt->size / (sizeof (Elf32_External_Rela) / 4) - 4;
86b9da88 5722 /* Pad out to align the start of PLTresolve. */
5446cbdf
AM
5723 htab->glink->size += -htab->glink->size & (htab->params->ppc476_workaround
5724 ? 63 : 15);
d7128ce4 5725 htab->glink->size += GLINK_PLTRESOLVE;
0ba07910 5726
5446cbdf 5727 if (htab->params->emit_stub_syms)
0ba07910
AM
5728 {
5729 struct elf_link_hash_entry *sh;
5730 sh = elf_link_hash_lookup (&htab->elf, "__glink",
5731 TRUE, FALSE, FALSE);
5732 if (sh == NULL)
5733 return FALSE;
5734 if (sh->root.type == bfd_link_hash_new)
5735 {
5736 sh->root.type = bfd_link_hash_defined;
5737 sh->root.u.def.section = htab->glink;
5738 sh->root.u.def.value = htab->glink_pltresolve;
5739 sh->ref_regular = 1;
5740 sh->def_regular = 1;
5741 sh->ref_regular_nonweak = 1;
5742 sh->forced_local = 1;
5743 sh->non_elf = 0;
2ec55de3 5744 sh->root.linker_def = 1;
0ba07910
AM
5745 }
5746 sh = elf_link_hash_lookup (&htab->elf, "__glink_PLTresolve",
5747 TRUE, FALSE, FALSE);
5748 if (sh == NULL)
5749 return FALSE;
5750 if (sh->root.type == bfd_link_hash_new)
5751 {
5752 sh->root.type = bfd_link_hash_defined;
5753 sh->root.u.def.section = htab->glink;
5754 sh->root.u.def.value = htab->glink->size - GLINK_PLTRESOLVE;
5755 sh->ref_regular = 1;
5756 sh->def_regular = 1;
5757 sh->ref_regular_nonweak = 1;
5758 sh->forced_local = 1;
5759 sh->non_elf = 0;
2ec55de3 5760 sh->root.linker_def = 1;
0ba07910
AM
5761 }
5762 }
d7128ce4
AM
5763 }
5764
6177242a
AM
5765 if (htab->glink != NULL
5766 && htab->glink->size != 0
5767 && htab->glink_eh_frame != NULL
9a2a56cc
AM
5768 && !bfd_is_abs_section (htab->glink_eh_frame->output_section)
5769 && _bfd_elf_eh_frame_present (info))
6177242a
AM
5770 {
5771 s = htab->glink_eh_frame;
5772 s->size = sizeof (glink_eh_frame_cie) + 20;
0e1862bb 5773 if (bfd_link_pic (info))
6177242a
AM
5774 {
5775 s->size += 4;
5776 if (htab->glink->size - GLINK_PLTRESOLVE + 8 >= 256)
5777 s->size += 4;
5778 }
5779 }
5780
25dbc73a
AM
5781 /* We've now determined the sizes of the various dynamic sections.
5782 Allocate memory for them. */
5783 relocs = FALSE;
5784 for (s = htab->elf.dynobj->sections; s != NULL; s = s->next)
252b5132 5785 {
9d8504b1
PB
5786 bfd_boolean strip_section = TRUE;
5787
25dbc73a
AM
5788 if ((s->flags & SEC_LINKER_CREATED) == 0)
5789 continue;
252b5132 5790
ce558b89
AM
5791 if (s == htab->elf.splt
5792 || s == htab->elf.sgot)
25dbc73a 5793 {
9d8504b1
PB
5794 /* We'd like to strip these sections if they aren't needed, but if
5795 we've exported dynamic symbols from them we must leave them.
5796 It's too late to tell BFD to get rid of the symbols. */
e054468f 5797 if (htab->elf.hplt != NULL)
9d8504b1 5798 strip_section = FALSE;
25dbc73a
AM
5799 /* Strip this section if we don't need it; see the
5800 comment below. */
5801 }
ce558b89 5802 else if (s == htab->elf.iplt
2d7ad24e 5803 || s == htab->pltlocal
e054468f 5804 || s == htab->glink
6177242a 5805 || s == htab->glink_eh_frame
ce558b89 5806 || s == htab->elf.sgotplt
e054468f 5807 || s == htab->sbss
9d19e4fd 5808 || s == htab->elf.sdynbss
5474d94f 5809 || s == htab->elf.sdynrelro
15bfcc77 5810 || s == htab->dynsbss)
25dbc73a 5811 {
c9a2f333 5812 /* Strip these too. */
25dbc73a 5813 }
15bfcc77
AM
5814 else if (s == htab->sdata[0].section
5815 || s == htab->sdata[1].section)
5816 {
5817 strip_section = (s->flags & SEC_KEEP) == 0;
5818 }
fd361982 5819 else if (CONST_STRNEQ (bfd_section_name (s), ".rela"))
25dbc73a 5820 {
c456f082 5821 if (s->size != 0)
25dbc73a
AM
5822 {
5823 /* Remember whether there are any relocation sections. */
5824 relocs = TRUE;
252b5132 5825
25dbc73a
AM
5826 /* We use the reloc_count field as a counter if we need
5827 to copy relocs into the output file. */
5828 s->reloc_count = 0;
252b5132
RH
5829 }
5830 }
25dbc73a
AM
5831 else
5832 {
5833 /* It's not one of our sections, so don't allocate space. */
5834 continue;
5835 }
252b5132 5836
9d8504b1 5837 if (s->size == 0 && strip_section)
25dbc73a 5838 {
c456f082
AM
5839 /* If we don't need this section, strip it from the
5840 output file. This is mostly to handle .rela.bss and
5841 .rela.plt. We must create both sections in
5842 create_dynamic_sections, because they must be created
5843 before the linker maps input sections to output
5844 sections. The linker does that before
5845 adjust_dynamic_symbol is called, and it is that
5846 function which decides whether anything needs to go
5847 into these sections. */
8423293d 5848 s->flags |= SEC_EXCLUDE;
25dbc73a
AM
5849 continue;
5850 }
7fce784e 5851
d7128ce4 5852 if ((s->flags & SEC_HAS_CONTENTS) == 0)
644285ef
AM
5853 continue;
5854
25dbc73a
AM
5855 /* Allocate memory for the section contents. */
5856 s->contents = bfd_zalloc (htab->elf.dynobj, s->size);
5857 if (s->contents == NULL)
5858 return FALSE;
5859 }
252b5132 5860
25dbc73a 5861 if (htab->elf.dynamic_sections_created)
7619e7c7 5862 {
25dbc73a
AM
5863 /* Add some entries to the .dynamic section. We fill in the
5864 values later, in ppc_elf_finish_dynamic_sections, but we
5865 must add the entries now so that we get the correct size for
5866 the .dynamic section. The DT_DEBUG entry is filled in by the
5867 dynamic linker and used by the debugger. */
5868#define add_dynamic_entry(TAG, VAL) \
5869 _bfd_elf_add_dynamic_entry (info, TAG, VAL)
252b5132 5870
0e1862bb 5871 if (bfd_link_executable (info))
7619e7c7 5872 {
25dbc73a
AM
5873 if (!add_dynamic_entry (DT_DEBUG, 0))
5874 return FALSE;
7619e7c7
AM
5875 }
5876
ce558b89 5877 if (htab->elf.splt != NULL && htab->elf.splt->size != 0)
7619e7c7 5878 {
25dbc73a
AM
5879 if (!add_dynamic_entry (DT_PLTGOT, 0)
5880 || !add_dynamic_entry (DT_PLTRELSZ, 0)
5881 || !add_dynamic_entry (DT_PLTREL, DT_RELA)
5882 || !add_dynamic_entry (DT_JMPREL, 0))
5883 return FALSE;
5884 }
7619e7c7 5885
c7e17e05
AM
5886 if (htab->plt_type == PLT_NEW
5887 && htab->glink != NULL
5888 && htab->glink->size != 0)
d7128ce4 5889 {
1fe44d79 5890 if (!add_dynamic_entry (DT_PPC_GOT, 0))
d7128ce4 5891 return FALSE;
5446cbdf 5892 if (!htab->params->no_tls_get_addr_opt
a7f2871e
AM
5893 && htab->tls_get_addr != NULL
5894 && htab->tls_get_addr->plt.plist != NULL
e8910a83 5895 && !add_dynamic_entry (DT_PPC_OPT, PPC_OPT_TLS))
a7f2871e 5896 return FALSE;
d7128ce4
AM
5897 }
5898
25dbc73a
AM
5899 if (relocs)
5900 {
5901 if (!add_dynamic_entry (DT_RELA, 0)
5902 || !add_dynamic_entry (DT_RELASZ, 0)
5903 || !add_dynamic_entry (DT_RELAENT, sizeof (Elf32_External_Rela)))
5904 return FALSE;
5905 }
7619e7c7 5906
25dbc73a
AM
5907 /* If any dynamic relocs apply to a read-only section, then we
5908 need a DT_TEXTREL entry. */
5909 if ((info->flags & DF_TEXTREL) == 0)
625af618 5910 elf_link_hash_traverse (elf_hash_table (info), maybe_set_textrel,
25dbc73a 5911 info);
7619e7c7 5912
25dbc73a
AM
5913 if ((info->flags & DF_TEXTREL) != 0)
5914 {
5915 if (!add_dynamic_entry (DT_TEXTREL, 0))
5916 return FALSE;
7619e7c7 5917 }
7a2b07ff
NS
5918 if (htab->is_vxworks
5919 && !elf_vxworks_add_dynamic_entries (output_bfd, info))
5920 return FALSE;
5921 }
25dbc73a
AM
5922#undef add_dynamic_entry
5923
7e01508c
AM
5924 if (htab->glink_eh_frame != NULL
5925 && htab->glink_eh_frame->contents != NULL)
5926 {
5927 unsigned char *p = htab->glink_eh_frame->contents;
5928 bfd_vma val;
5929
5930 memcpy (p, glink_eh_frame_cie, sizeof (glink_eh_frame_cie));
5931 /* CIE length (rewrite in case little-endian). */
5932 bfd_put_32 (htab->elf.dynobj, sizeof (glink_eh_frame_cie) - 4, p);
5933 p += sizeof (glink_eh_frame_cie);
5934 /* FDE length. */
5935 val = htab->glink_eh_frame->size - 4 - sizeof (glink_eh_frame_cie);
5936 bfd_put_32 (htab->elf.dynobj, val, p);
5937 p += 4;
5938 /* CIE pointer. */
5939 val = p - htab->glink_eh_frame->contents;
5940 bfd_put_32 (htab->elf.dynobj, val, p);
5941 p += 4;
5942 /* Offset to .glink. Set later. */
5943 p += 4;
5944 /* .glink size. */
5945 bfd_put_32 (htab->elf.dynobj, htab->glink->size, p);
5946 p += 4;
5947 /* Augmentation. */
5948 p += 1;
5949
0e1862bb 5950 if (bfd_link_pic (info)
7e01508c
AM
5951 && htab->elf.dynamic_sections_created)
5952 {
5953 bfd_vma adv = (htab->glink->size - GLINK_PLTRESOLVE + 8) >> 2;
5954 if (adv < 64)
5955 *p++ = DW_CFA_advance_loc + adv;
5956 else if (adv < 256)
5957 {
5958 *p++ = DW_CFA_advance_loc1;
5959 *p++ = adv;
5960 }
5961 else if (adv < 65536)
5962 {
5963 *p++ = DW_CFA_advance_loc2;
5964 bfd_put_16 (htab->elf.dynobj, adv, p);
5965 p += 2;
5966 }
5967 else
5968 {
5969 *p++ = DW_CFA_advance_loc4;
5970 bfd_put_32 (htab->elf.dynobj, adv, p);
5971 p += 4;
5972 }
5973 *p++ = DW_CFA_register;
5974 *p++ = 65;
5975 p++;
5976 *p++ = DW_CFA_advance_loc + 4;
5977 *p++ = DW_CFA_restore_extended;
5978 *p++ = 65;
5979 }
5980 BFD_ASSERT ((bfd_vma) ((p + 3 - htab->glink_eh_frame->contents) & -4)
5981 == htab->glink_eh_frame->size);
5982 }
5983
7619e7c7
AM
5984 return TRUE;
5985}
0eb4a168 5986
93d1b056
AM
5987/* Arrange to have _SDA_BASE_ or _SDA2_BASE_ stripped from the output
5988 if it looks like nothing is using them. */
5989
5990static void
5991maybe_strip_sdasym (bfd *output_bfd, elf_linker_section_t *lsect)
5992{
5993 struct elf_link_hash_entry *sda = lsect->sym;
5994
5995 if (sda != NULL && !sda->ref_regular && sda->dynindx == -1)
5996 {
5997 asection *s;
5998
5999 s = bfd_get_section_by_name (output_bfd, lsect->name);
6000 if (s == NULL || bfd_section_removed_from_list (output_bfd, s))
6001 {
6002 s = bfd_get_section_by_name (output_bfd, lsect->bss_name);
6003 if (s == NULL || bfd_section_removed_from_list (output_bfd, s))
6004 {
6005 sda->def_regular = 0;
6006 /* This is somewhat magic. See elf_link_output_extsym. */
6007 sda->ref_dynamic = 1;
6008 sda->forced_local = 0;
6009 }
6010 }
6011 }
6012}
6013
6014void
6015ppc_elf_maybe_strip_sdata_syms (struct bfd_link_info *info)
6016{
6017 struct ppc_elf_link_hash_table *htab = ppc_elf_hash_table (info);
6018
6019 if (htab != NULL)
6020 {
6021 maybe_strip_sdasym (info->output_bfd, &htab->sdata[0]);
6022 maybe_strip_sdasym (info->output_bfd, &htab->sdata[1]);
6023 }
6024}
6025
6026
0eb4a168
AM
6027/* Return TRUE if symbol should be hashed in the `.gnu.hash' section. */
6028
6029static bfd_boolean
6030ppc_elf_hash_symbol (struct elf_link_hash_entry *h)
6031{
6032 if (h->plt.plist != NULL
6033 && !h->def_regular
6034 && (!h->pointer_equality_needed
6035 || !h->ref_regular_nonweak))
6036 return FALSE;
6037
6038 return _bfd_elf_hash_symbol (h);
6039}
25dbc73a
AM
6040\f
6041#define ARRAY_SIZE(a) (sizeof (a) / sizeof ((a)[0]))
6042
01017ef8
NS
6043/* Relaxation trampolines. r12 is available for clobbering (r11, is
6044 used for some functions that are allowed to break the ABI). */
25dbc73a
AM
6045static const int shared_stub_entry[] =
6046 {
6047 0x7c0802a6, /* mflr 0 */
6048 0x429f0005, /* bcl 20, 31, .Lxxx */
01017ef8
NS
6049 0x7d8802a6, /* mflr 12 */
6050 0x3d8c0000, /* addis 12, 12, (xxx-.Lxxx)@ha */
53291d1f 6051 0x398c0000, /* addi 12, 12, (xxx-.Lxxx)@l */
25dbc73a 6052 0x7c0803a6, /* mtlr 0 */
01017ef8 6053 0x7d8903a6, /* mtctr 12 */
25dbc73a
AM
6054 0x4e800420, /* bctr */
6055 };
6056
6057static const int stub_entry[] =
6058 {
01017ef8
NS
6059 0x3d800000, /* lis 12,xxx@ha */
6060 0x398c0000, /* addi 12,12,xxx@l */
6061 0x7d8903a6, /* mtctr 12 */
25dbc73a
AM
6062 0x4e800420, /* bctr */
6063 };
6064
5446cbdf
AM
6065struct ppc_elf_relax_info
6066{
6067 unsigned int workaround_size;
d3e454b9 6068 unsigned int picfixup_size;
5446cbdf
AM
6069};
6070
6071/* This function implements long branch trampolines, and the ppc476
6072 icache bug workaround. Any section needing trampolines or patch
6073 space for the workaround has its size extended so that we can
53291d1f 6074 add trampolines at the end of the section. */
5446cbdf 6075
25dbc73a
AM
6076static bfd_boolean
6077ppc_elf_relax_section (bfd *abfd,
6078 asection *isec,
6079 struct bfd_link_info *link_info,
6080 bfd_boolean *again)
6081{
d3e454b9 6082 struct one_branch_fixup
25dbc73a 6083 {
d3e454b9 6084 struct one_branch_fixup *next;
25dbc73a 6085 asection *tsec;
01017ef8
NS
6086 /* Final link, can use the symbol offset. For a
6087 relocatable link we use the symbol's index. */
25dbc73a
AM
6088 bfd_vma toff;
6089 bfd_vma trampoff;
6090 };
7619e7c7 6091
25dbc73a
AM
6092 Elf_Internal_Shdr *symtab_hdr;
6093 bfd_byte *contents = NULL;
6094 Elf_Internal_Sym *isymbuf = NULL;
6095 Elf_Internal_Rela *internal_relocs = NULL;
5446cbdf 6096 Elf_Internal_Rela *irel, *irelend = NULL;
d3e454b9 6097 struct one_branch_fixup *branch_fixups = NULL;
5446cbdf 6098 struct ppc_elf_relax_info *relax_info = NULL;
9bc4e62b 6099 unsigned changes = 0;
5446cbdf 6100 bfd_boolean workaround_change;
d7128ce4 6101 struct ppc_elf_link_hash_table *htab;
d3e454b9 6102 bfd_size_type trampbase, trampoff, newsize, picfixup_size;
a6aa5195 6103 asection *got2;
50248c89 6104 bfd_boolean maybe_pasted;
7619e7c7 6105
25dbc73a 6106 *again = FALSE;
7619e7c7 6107
5446cbdf 6108 /* No need to do anything with non-alloc or non-code sections. */
c87b5a93 6109 if ((isec->flags & SEC_ALLOC) == 0
a8ad78a7 6110 || (isec->flags & SEC_CODE) == 0
5446cbdf
AM
6111 || (isec->flags & SEC_LINKER_CREATED) != 0
6112 || isec->size < 4)
25dbc73a 6113 return TRUE;
7619e7c7 6114
c8a1f254
NS
6115 /* We cannot represent the required PIC relocs in the output, so don't
6116 do anything. The linker doesn't support mixing -shared and -r
6117 anyway. */
0e1862bb 6118 if (bfd_link_relocatable (link_info) && bfd_link_pic (link_info))
795bc6b3 6119 return TRUE;
5b914448 6120
5446cbdf
AM
6121 htab = ppc_elf_hash_table (link_info);
6122 if (htab == NULL)
6123 return TRUE;
6124
6125 isec->size = (isec->size + 3) & -4;
6126 if (isec->rawsize == 0)
6127 isec->rawsize = isec->size;
6128 trampbase = isec->size;
6129
53291d1f
AM
6130 BFD_ASSERT (isec->sec_info_type == SEC_INFO_TYPE_NONE
6131 || isec->sec_info_type == SEC_INFO_TYPE_TARGET);
6132 isec->sec_info_type = SEC_INFO_TYPE_TARGET;
6133
d3e454b9
AM
6134 if (htab->params->ppc476_workaround
6135 || htab->params->pic_fixup > 0)
5446cbdf
AM
6136 {
6137 if (elf_section_data (isec)->sec_info == NULL)
6138 {
5446cbdf
AM
6139 elf_section_data (isec)->sec_info
6140 = bfd_zalloc (abfd, sizeof (struct ppc_elf_relax_info));
6141 if (elf_section_data (isec)->sec_info == NULL)
6142 return FALSE;
6143 }
6144 relax_info = elf_section_data (isec)->sec_info;
6145 trampbase -= relax_info->workaround_size;
6146 }
6147
50248c89
AM
6148 maybe_pasted = (strcmp (isec->output_section->name, ".init") == 0
6149 || strcmp (isec->output_section->name, ".fini") == 0);
25dbc73a 6150 /* Space for a branch around any trampolines. */
5446cbdf
AM
6151 trampoff = trampbase;
6152 if (maybe_pasted && trampbase == isec->rawsize)
50248c89 6153 trampoff += 4;
7619e7c7 6154
0ffa91dd 6155 symtab_hdr = &elf_symtab_hdr (abfd);
d3e454b9
AM
6156 picfixup_size = 0;
6157 if (htab->params->branch_trampolines
6158 || htab->params->pic_fixup > 0)
7619e7c7 6159 {
5446cbdf
AM
6160 /* Get a copy of the native relocations. */
6161 if (isec->reloc_count != 0)
25dbc73a 6162 {
5446cbdf
AM
6163 internal_relocs = _bfd_elf_link_read_relocs (abfd, isec, NULL, NULL,
6164 link_info->keep_memory);
6165 if (internal_relocs == NULL)
6166 goto error_return;
25dbc73a 6167 }
7619e7c7 6168
5446cbdf
AM
6169 got2 = bfd_get_section_by_name (abfd, ".got2");
6170
6171 irelend = internal_relocs + isec->reloc_count;
6172 for (irel = internal_relocs; irel < irelend; irel++)
25dbc73a 6173 {
5446cbdf
AM
6174 unsigned long r_type = ELF32_R_TYPE (irel->r_info);
6175 bfd_vma toff, roff;
6176 asection *tsec;
d3e454b9 6177 struct one_branch_fixup *f;
5446cbdf 6178 size_t insn_offset = 0;
d3e454b9 6179 bfd_vma max_branch_offset = 0, val;
5446cbdf
AM
6180 bfd_byte *hit_addr;
6181 unsigned long t0;
6182 struct elf_link_hash_entry *h;
49c09209 6183 Elf_Internal_Sym *isym;
5446cbdf
AM
6184 struct plt_entry **plist;
6185 unsigned char sym_type;
6186
6187 switch (r_type)
6188 {
6189 case R_PPC_REL24:
6190 case R_PPC_LOCAL24PC:
6191 case R_PPC_PLTREL24:
23cedd1d 6192 case R_PPC_PLTCALL:
5446cbdf
AM
6193 max_branch_offset = 1 << 25;
6194 break;
6195
6196 case R_PPC_REL14:
6197 case R_PPC_REL14_BRTAKEN:
6198 case R_PPC_REL14_BRNTAKEN:
6199 max_branch_offset = 1 << 15;
6200 break;
7fce784e 6201
d3e454b9
AM
6202 case R_PPC_ADDR16_HA:
6203 if (htab->params->pic_fixup > 0)
6204 break;
6205 continue;
6206
5446cbdf
AM
6207 default:
6208 continue;
6209 }
6210
6211 /* Get the value of the symbol referred to by the reloc. */
49c09209
AM
6212 if (!get_sym_h (&h, &isym, &tsec, NULL, &isymbuf,
6213 ELF32_R_SYM (irel->r_info), abfd))
6214 goto error_return;
5446cbdf 6215
49c09209
AM
6216 if (isym != NULL)
6217 {
6218 if (tsec != NULL)
6219 ;
5446cbdf
AM
6220 else if (isym->st_shndx == SHN_ABS)
6221 tsec = bfd_abs_section_ptr;
49199304
AM
6222 else
6223 continue;
5446cbdf
AM
6224
6225 toff = isym->st_value;
6226 sym_type = ELF_ST_TYPE (isym->st_info);
25dbc73a 6227 }
25dbc73a 6228 else
5446cbdf 6229 {
49c09209
AM
6230 if (tsec != NULL)
6231 toff = h->root.u.def.value;
5446cbdf
AM
6232 else if (h->root.type == bfd_link_hash_undefined
6233 || h->root.type == bfd_link_hash_undefweak)
6234 {
49c09209
AM
6235 unsigned long indx;
6236
6237 indx = ELF32_R_SYM (irel->r_info) - symtab_hdr->sh_info;
5446cbdf 6238 tsec = bfd_und_section_ptr;
0e1862bb 6239 toff = bfd_link_relocatable (link_info) ? indx : 0;
5446cbdf
AM
6240 }
6241 else
6242 continue;
6243
9f7552cf
AM
6244 /* If this branch is to __tls_get_addr then we may later
6245 optimise away the call. We won't be needing a long-
6246 branch stub in that case. */
0e1862bb 6247 if (bfd_link_executable (link_info)
9f7552cf
AM
6248 && h == htab->tls_get_addr
6249 && irel != internal_relocs)
6250 {
6251 unsigned long t_symndx = ELF32_R_SYM (irel[-1].r_info);
6252 unsigned long t_rtype = ELF32_R_TYPE (irel[-1].r_info);
6253 unsigned int tls_mask = 0;
6254
6255 /* The previous reloc should be one of R_PPC_TLSGD or
6256 R_PPC_TLSLD, or for older object files, a reloc
6257 on the __tls_get_addr arg setup insn. Get tls
6258 mask bits from the symbol on that reloc. */
6259 if (t_symndx < symtab_hdr->sh_info)
6260 {
6261 bfd_vma *local_got_offsets = elf_local_got_offsets (abfd);
6262
6263 if (local_got_offsets != NULL)
6264 {
6265 struct plt_entry **local_plt = (struct plt_entry **)
6266 (local_got_offsets + symtab_hdr->sh_info);
6267 char *lgot_masks = (char *)
6268 (local_plt + symtab_hdr->sh_info);
6269 tls_mask = lgot_masks[t_symndx];
6270 }
6271 }
6272 else
6273 {
6274 struct elf_link_hash_entry *th
6275 = elf_sym_hashes (abfd)[t_symndx - symtab_hdr->sh_info];
6276
6277 while (th->root.type == bfd_link_hash_indirect
6278 || th->root.type == bfd_link_hash_warning)
6279 th = (struct elf_link_hash_entry *) th->root.u.i.link;
6280
6281 tls_mask
6282 = ((struct ppc_elf_link_hash_entry *) th)->tls_mask;
6283 }
6284
6285 /* The mask bits tell us if the call will be
6286 optimised away. */
6287 if ((tls_mask & TLS_TLS) != 0 && (tls_mask & TLS_GD) == 0
6288 && (t_rtype == R_PPC_TLSGD
6289 || t_rtype == R_PPC_GOT_TLSGD16
6290 || t_rtype == R_PPC_GOT_TLSGD16_LO))
6291 continue;
6292 if ((tls_mask & TLS_TLS) != 0 && (tls_mask & TLS_LD) == 0
6293 && (t_rtype == R_PPC_TLSLD
6294 || t_rtype == R_PPC_GOT_TLSLD16
6295 || t_rtype == R_PPC_GOT_TLSLD16_LO))
6296 continue;
6297 }
6298
5446cbdf
AM
6299 sym_type = h->type;
6300 }
7619e7c7 6301
d3e454b9
AM
6302 if (r_type == R_PPC_ADDR16_HA)
6303 {
6304 if (h != NULL
6305 && !h->def_regular
6306 && h->protected_def
6307 && ppc_elf_hash_entry (h)->has_addr16_ha
6308 && ppc_elf_hash_entry (h)->has_addr16_lo)
6309 picfixup_size += 12;
6310 continue;
6311 }
6312
5446cbdf
AM
6313 /* The condition here under which we call find_plt_ent must
6314 match that in relocate_section. If we call find_plt_ent here
6315 but not in relocate_section, or vice versa, then the branch
6316 destination used here may be incorrect. */
6317 plist = NULL;
6318 if (h != NULL)
25dbc73a 6319 {
5446cbdf
AM
6320 /* We know is_branch_reloc (r_type) is true. */
6321 if (h->type == STT_GNU_IFUNC
6322 || r_type == R_PPC_PLTREL24)
6323 plist = &h->plt.plist;
25dbc73a 6324 }
5446cbdf
AM
6325 else if (sym_type == STT_GNU_IFUNC
6326 && elf_local_got_offsets (abfd) != NULL)
c8a1f254 6327 {
5446cbdf
AM
6328 bfd_vma *local_got_offsets = elf_local_got_offsets (abfd);
6329 struct plt_entry **local_plt = (struct plt_entry **)
6330 (local_got_offsets + symtab_hdr->sh_info);
6331 plist = local_plt + ELF32_R_SYM (irel->r_info);
c8a1f254 6332 }
5446cbdf 6333 if (plist != NULL)
a9585d22 6334 {
5446cbdf
AM
6335 bfd_vma addend = 0;
6336 struct plt_entry *ent;
6337
0e1862bb 6338 if (r_type == R_PPC_PLTREL24 && bfd_link_pic (link_info))
5446cbdf
AM
6339 addend = irel->r_addend;
6340 ent = find_plt_ent (plist, got2, addend);
6341 if (ent != NULL)
a9585d22 6342 {
5446cbdf
AM
6343 if (htab->plt_type == PLT_NEW
6344 || h == NULL
6345 || !htab->elf.dynamic_sections_created
6346 || h->dynindx == -1)
6347 {
6348 tsec = htab->glink;
6349 toff = ent->glink_offset;
6350 }
6351 else
6352 {
ce558b89 6353 tsec = htab->elf.splt;
5446cbdf
AM
6354 toff = ent->plt.offset;
6355 }
de972ffa
AM
6356 }
6357 }
de972ffa 6358
5446cbdf
AM
6359 /* If the branch and target are in the same section, you have
6360 no hope of adding stubs. We'll error out later should the
6361 branch overflow. */
6362 if (tsec == isec)
6363 continue;
25dbc73a 6364
49199304
AM
6365 /* toff is used for the symbol index when the symbol is
6366 undefined and we're doing a relocatable link, so we can't
6367 support addends. It would be possible to do so by
6368 putting the addend in one_branch_fixup but addends on
6369 branches are rare so it hardly seems worth supporting. */
6370 if (bfd_link_relocatable (link_info)
6371 && tsec == bfd_und_section_ptr
6372 && r_type != R_PPC_PLTREL24
6373 && irel->r_addend != 0)
6374 continue;
6375
5446cbdf
AM
6376 /* There probably isn't any reason to handle symbols in
6377 SEC_MERGE sections; SEC_MERGE doesn't seem a likely
6378 attribute for a code section, and we are only looking at
6379 branches. However, implement it correctly here as a
6380 reference for other target relax_section functions. */
6381 if (0 && tsec->sec_info_type == SEC_INFO_TYPE_MERGE)
6382 {
6383 /* At this stage in linking, no SEC_MERGE symbol has been
6384 adjusted, so all references to such symbols need to be
6385 passed through _bfd_merged_section_offset. (Later, in
6386 relocate_section, all SEC_MERGE symbols *except* for
6387 section symbols have been adjusted.)
6388
6389 gas may reduce relocations against symbols in SEC_MERGE
6390 sections to a relocation against the section symbol when
6391 the original addend was zero. When the reloc is against
6392 a section symbol we should include the addend in the
6393 offset passed to _bfd_merged_section_offset, since the
6394 location of interest is the original symbol. On the
6395 other hand, an access to "sym+addend" where "sym" is not
6396 a section symbol should not include the addend; Such an
6397 access is presumed to be an offset from "sym"; The
6398 location of interest is just "sym". */
49199304
AM
6399 if (sym_type == STT_SECTION
6400 && r_type != R_PPC_PLTREL24)
5446cbdf
AM
6401 toff += irel->r_addend;
6402
6403 toff
6404 = _bfd_merged_section_offset (abfd, &tsec,
6405 elf_section_data (tsec)->sec_info,
6406 toff);
6407
49199304
AM
6408 if (sym_type != STT_SECTION
6409 && r_type != R_PPC_PLTREL24)
5446cbdf
AM
6410 toff += irel->r_addend;
6411 }
6412 /* PLTREL24 addends are special. */
6413 else if (r_type != R_PPC_PLTREL24)
25dbc73a 6414 toff += irel->r_addend;
7619e7c7 6415
5446cbdf 6416 /* Attempted -shared link of non-pic code loses. */
0e1862bb 6417 if ((!bfd_link_relocatable (link_info)
5446cbdf
AM
6418 && tsec == bfd_und_section_ptr)
6419 || tsec->output_section == NULL
6420 || (tsec->owner != NULL
6421 && (tsec->owner->flags & BFD_PLUGIN) != 0))
6422 continue;
7619e7c7 6423
5446cbdf 6424 roff = irel->r_offset;
7de713b9 6425
49199304
AM
6426 /* Avoid creating a lot of unnecessary fixups when
6427 relocatable if the output section size is such that a
6428 fixup can be created at final link.
6429 The max_branch_offset adjustment allows for some number
6430 of other fixups being needed at final link. */
6431 if (bfd_link_relocatable (link_info)
6432 && (isec->output_section->rawsize - (isec->output_offset + roff)
6433 < max_branch_offset - (max_branch_offset >> 4)))
6434 continue;
6435
5446cbdf
AM
6436 /* If the branch is in range, no need to do anything. */
6437 if (tsec != bfd_und_section_ptr
0e1862bb 6438 && (!bfd_link_relocatable (link_info)
5446cbdf
AM
6439 /* A relocatable link may have sections moved during
6440 final link, so do not presume they remain in range. */
6441 || tsec->output_section == isec->output_section))
6442 {
6443 bfd_vma symaddr, reladdr;
7619e7c7 6444
5446cbdf
AM
6445 symaddr = tsec->output_section->vma + tsec->output_offset + toff;
6446 reladdr = isec->output_section->vma + isec->output_offset + roff;
6447 if (symaddr - reladdr + max_branch_offset
6448 < 2 * max_branch_offset)
6449 continue;
6450 }
01017ef8 6451
5446cbdf 6452 /* Look for an existing fixup to this address. */
d3e454b9 6453 for (f = branch_fixups; f ; f = f->next)
5446cbdf
AM
6454 if (f->tsec == tsec && f->toff == toff)
6455 break;
252b5132 6456
5446cbdf
AM
6457 if (f == NULL)
6458 {
6459 size_t size;
6460 unsigned long stub_rtype;
25dbc73a 6461
5446cbdf
AM
6462 val = trampoff - roff;
6463 if (val >= max_branch_offset)
6464 /* Oh dear, we can't reach a trampoline. Don't try to add
6465 one. We'll report an error later. */
6466 continue;
252b5132 6467
0e1862bb 6468 if (bfd_link_pic (link_info))
5446cbdf
AM
6469 {
6470 size = 4 * ARRAY_SIZE (shared_stub_entry);
6471 insn_offset = 12;
6472 }
6473 else
6474 {
6475 size = 4 * ARRAY_SIZE (stub_entry);
6476 insn_offset = 0;
6477 }
6478 stub_rtype = R_PPC_RELAX;
ce558b89 6479 if (tsec == htab->elf.splt
5446cbdf
AM
6480 || tsec == htab->glink)
6481 {
6482 stub_rtype = R_PPC_RELAX_PLT;
6483 if (r_type == R_PPC_PLTREL24)
6484 stub_rtype = R_PPC_RELAX_PLTREL24;
6485 }
252b5132 6486
5446cbdf
AM
6487 /* Hijack the old relocation. Since we need two
6488 relocations for this use a "composite" reloc. */
6489 irel->r_info = ELF32_R_INFO (ELF32_R_SYM (irel->r_info),
6490 stub_rtype);
6491 irel->r_offset = trampoff + insn_offset;
6492 if (r_type == R_PPC_PLTREL24
6493 && stub_rtype != R_PPC_RELAX_PLTREL24)
6494 irel->r_addend = 0;
6495
6496 /* Record the fixup so we don't do it again this section. */
6497 f = bfd_malloc (sizeof (*f));
d3e454b9 6498 f->next = branch_fixups;
5446cbdf
AM
6499 f->tsec = tsec;
6500 f->toff = toff;
6501 f->trampoff = trampoff;
d3e454b9 6502 branch_fixups = f;
5446cbdf
AM
6503
6504 trampoff += size;
6505 changes++;
25dbc73a
AM
6506 }
6507 else
6508 {
5446cbdf
AM
6509 val = f->trampoff - roff;
6510 if (val >= max_branch_offset)
6511 continue;
252b5132 6512
5446cbdf
AM
6513 /* Nop out the reloc, since we're finalizing things here. */
6514 irel->r_info = ELF32_R_INFO (0, R_PPC_NONE);
6515 }
252b5132 6516
5446cbdf
AM
6517 /* Get the section contents. */
6518 if (contents == NULL)
25dbc73a 6519 {
5446cbdf
AM
6520 /* Get cached copy if it exists. */
6521 if (elf_section_data (isec)->this_hdr.contents != NULL)
6522 contents = elf_section_data (isec)->this_hdr.contents;
25dbc73a 6523 /* Go get them off disk. */
5446cbdf 6524 else if (!bfd_malloc_and_get_section (abfd, isec, &contents))
25dbc73a
AM
6525 goto error_return;
6526 }
252b5132 6527
5446cbdf
AM
6528 /* Fix up the existing branch to hit the trampoline. */
6529 hit_addr = contents + roff;
6530 switch (r_type)
6531 {
6532 case R_PPC_REL24:
6533 case R_PPC_LOCAL24PC:
6534 case R_PPC_PLTREL24:
6535 t0 = bfd_get_32 (abfd, hit_addr);
6536 t0 &= ~0x3fffffc;
6537 t0 |= val & 0x3fffffc;
6538 bfd_put_32 (abfd, t0, hit_addr);
6539 break;
252b5132 6540
5446cbdf
AM
6541 case R_PPC_REL14:
6542 case R_PPC_REL14_BRTAKEN:
6543 case R_PPC_REL14_BRNTAKEN:
6544 t0 = bfd_get_32 (abfd, hit_addr);
6545 t0 &= ~0xfffc;
6546 t0 |= val & 0xfffc;
6547 bfd_put_32 (abfd, t0, hit_addr);
6548 break;
6549 }
25dbc73a 6550 }
252b5132 6551
d3e454b9 6552 while (branch_fixups != NULL)
25dbc73a 6553 {
d3e454b9
AM
6554 struct one_branch_fixup *f = branch_fixups;
6555 branch_fixups = branch_fixups->next;
25dbc73a
AM
6556 free (f);
6557 }
5446cbdf 6558 }
252b5132 6559
5446cbdf
AM
6560 workaround_change = FALSE;
6561 newsize = trampoff;
795bc6b3 6562 if (htab->params->ppc476_workaround
0e1862bb 6563 && (!bfd_link_relocatable (link_info)
795bc6b3 6564 || isec->output_section->alignment_power >= htab->params->pagesize_p2))
5446cbdf
AM
6565 {
6566 bfd_vma addr, end_addr;
6567 unsigned int crossings;
795bc6b3 6568 bfd_vma pagesize = (bfd_vma) 1 << htab->params->pagesize_p2;
5446cbdf
AM
6569
6570 addr = isec->output_section->vma + isec->output_offset;
6128f9cf 6571 end_addr = addr + trampoff;
5446cbdf 6572 addr &= -pagesize;
795bc6b3 6573 crossings = ((end_addr & -pagesize) - addr) >> htab->params->pagesize_p2;
5446cbdf
AM
6574 if (crossings != 0)
6575 {
6576 /* Keep space aligned, to ensure the patch code itself does
6577 not cross a page. Don't decrease size calculated on a
6578 previous pass as otherwise we might never settle on a layout. */
1e269e9b 6579 newsize = 15 - ((end_addr - 1) & 15);
5446cbdf
AM
6580 newsize += crossings * 16;
6581 if (relax_info->workaround_size < newsize)
6582 {
6583 relax_info->workaround_size = newsize;
6584 workaround_change = TRUE;
5446cbdf
AM
6585 }
6586 /* Ensure relocate_section is called. */
6587 isec->flags |= SEC_RELOC;
6588 }
6589 newsize = trampoff + relax_info->workaround_size;
6590 }
6591
d3e454b9
AM
6592 if (htab->params->pic_fixup > 0)
6593 {
6594 picfixup_size -= relax_info->picfixup_size;
6595 if (picfixup_size != 0)
6596 relax_info->picfixup_size += picfixup_size;
6597 newsize += relax_info->picfixup_size;
6598 }
6599
6600 if (changes != 0 || picfixup_size != 0 || workaround_change)
5446cbdf
AM
6601 isec->size = newsize;
6602
25dbc73a
AM
6603 if (isymbuf != NULL
6604 && symtab_hdr->contents != (unsigned char *) isymbuf)
252b5132 6605 {
25dbc73a
AM
6606 if (! link_info->keep_memory)
6607 free (isymbuf);
252b5132 6608 else
25dbc73a
AM
6609 {
6610 /* Cache the symbols for elf_link_input_bfd. */
6611 symtab_hdr->contents = (unsigned char *) isymbuf;
6612 }
252b5132
RH
6613 }
6614
25dbc73a
AM
6615 if (contents != NULL
6616 && elf_section_data (isec)->this_hdr.contents != contents)
6617 {
53291d1f 6618 if (!changes && !link_info->keep_memory)
25dbc73a
AM
6619 free (contents);
6620 else
6621 {
6622 /* Cache the section contents for elf_link_input_bfd. */
6623 elf_section_data (isec)->this_hdr.contents = contents;
6624 }
6625 }
252b5132 6626
d3e454b9 6627 changes += picfixup_size;
9bc4e62b 6628 if (changes != 0)
25dbc73a 6629 {
9bc4e62b
NS
6630 /* Append sufficient NOP relocs so we can write out relocation
6631 information for the trampolines. */
d4730f92 6632 Elf_Internal_Shdr *rel_hdr;
9bc4e62b
NS
6633 Elf_Internal_Rela *new_relocs = bfd_malloc ((changes + isec->reloc_count)
6634 * sizeof (*new_relocs));
6635 unsigned ix;
5b914448 6636
9bc4e62b
NS
6637 if (!new_relocs)
6638 goto error_return;
6639 memcpy (new_relocs, internal_relocs,
6640 isec->reloc_count * sizeof (*new_relocs));
6641 for (ix = changes; ix--;)
6642 {
6643 irel = new_relocs + ix + isec->reloc_count;
6644
6645 irel->r_info = ELF32_R_INFO (0, R_PPC_NONE);
6646 }
6647 if (internal_relocs != elf_section_data (isec)->relocs)
25dbc73a 6648 free (internal_relocs);
9bc4e62b
NS
6649 elf_section_data (isec)->relocs = new_relocs;
6650 isec->reloc_count += changes;
d4730f92
BS
6651 rel_hdr = _bfd_elf_single_rel_hdr (isec);
6652 rel_hdr->sh_size += changes * rel_hdr->sh_entsize;
25dbc73a 6653 }
5446cbdf
AM
6654 else if (internal_relocs != NULL
6655 && elf_section_data (isec)->relocs != internal_relocs)
9bc4e62b 6656 free (internal_relocs);
252b5132 6657
5446cbdf 6658 *again = changes != 0 || workaround_change;
b34976b6 6659 return TRUE;
25dbc73a
AM
6660
6661 error_return:
d3e454b9 6662 while (branch_fixups != NULL)
5446cbdf 6663 {
d3e454b9
AM
6664 struct one_branch_fixup *f = branch_fixups;
6665 branch_fixups = branch_fixups->next;
5446cbdf
AM
6666 free (f);
6667 }
25dbc73a
AM
6668 if (isymbuf != NULL && (unsigned char *) isymbuf != symtab_hdr->contents)
6669 free (isymbuf);
6670 if (contents != NULL
6671 && elf_section_data (isec)->this_hdr.contents != contents)
6672 free (contents);
6673 if (internal_relocs != NULL
6674 && elf_section_data (isec)->relocs != internal_relocs)
6675 free (internal_relocs);
6676 return FALSE;
252b5132 6677}
252b5132 6678\f
8a696751
AM
6679/* What to do when ld finds relocations against symbols defined in
6680 discarded sections. */
6681
6682static unsigned int
6683ppc_elf_action_discarded (asection *sec)
6684{
6685 if (strcmp (".fixup", sec->name) == 0)
6686 return 0;
6687
6688 if (strcmp (".got2", sec->name) == 0)
6689 return 0;
6690
6691 return _bfd_elf_default_action_discarded (sec);
6692}
c9a2f333 6693\f
25dbc73a 6694/* Fill in the address for a pointer generated in a linker section. */
252b5132 6695
25dbc73a 6696static bfd_vma
76750a2f 6697elf_finish_pointer_linker_section (bfd *input_bfd,
25dbc73a
AM
6698 elf_linker_section_t *lsect,
6699 struct elf_link_hash_entry *h,
6700 bfd_vma relocation,
2bb04cf2 6701 const Elf_Internal_Rela *rel)
25dbc73a
AM
6702{
6703 elf_linker_section_pointers_t *linker_section_ptr;
252b5132 6704
25dbc73a 6705 BFD_ASSERT (lsect != NULL);
252b5132 6706
25dbc73a 6707 if (h != NULL)
252b5132 6708 {
25dbc73a
AM
6709 /* Handle global symbol. */
6710 struct ppc_elf_link_hash_entry *eh;
252b5132 6711
25dbc73a 6712 eh = (struct ppc_elf_link_hash_entry *) h;
76750a2f
AM
6713 BFD_ASSERT (eh->elf.def_regular);
6714 linker_section_ptr = eh->linker_section_pointer;
25dbc73a
AM
6715 }
6716 else
6717 {
6718 /* Handle local symbol. */
6719 unsigned long r_symndx = ELF32_R_SYM (rel->r_info);
76750a2f 6720
0c8d6e5c 6721 BFD_ASSERT (is_ppc_elf (input_bfd));
25dbc73a 6722 BFD_ASSERT (elf_local_ptr_offsets (input_bfd) != NULL);
76750a2f
AM
6723 linker_section_ptr = elf_local_ptr_offsets (input_bfd)[r_symndx];
6724 }
252b5132 6725
76750a2f
AM
6726 linker_section_ptr = elf_find_pointer_linker_section (linker_section_ptr,
6727 rel->r_addend,
6728 lsect);
6729 BFD_ASSERT (linker_section_ptr != NULL);
25dbc73a 6730
76750a2f
AM
6731 /* Offset will always be a multiple of four, so use the bottom bit
6732 as a "written" flag. */
6733 if ((linker_section_ptr->offset & 1) == 0)
6734 {
6735 bfd_put_32 (lsect->section->owner,
6736 relocation + linker_section_ptr->addend,
6737 lsect->section->contents + linker_section_ptr->offset);
6738 linker_section_ptr->offset += 1;
252b5132
RH
6739 }
6740
bd6c6e2b
AM
6741 relocation = (lsect->section->output_section->vma
6742 + lsect->section->output_offset
76750a2f 6743 + linker_section_ptr->offset - 1
bd6c6e2b 6744 - SYM_VAL (lsect->sym));
252b5132 6745
25dbc73a
AM
6746#ifdef DEBUG
6747 fprintf (stderr,
6748 "Finish pointer in linker section %s, offset = %ld (0x%lx)\n",
6749 lsect->name, (long) relocation, (long) relocation);
6750#endif
252b5132 6751
bd6c6e2b 6752 return relocation;
252b5132 6753}
25dbc73a 6754
e054468f
AM
6755#define PPC_LO(v) ((v) & 0xffff)
6756#define PPC_HI(v) (((v) >> 16) & 0xffff)
6757#define PPC_HA(v) PPC_HI ((v) + 0x8000)
6758
6759static void
9e390558
AM
6760write_glink_stub (struct elf_link_hash_entry *h, struct plt_entry *ent,
6761 asection *plt_sec, unsigned char *p,
e054468f
AM
6762 struct bfd_link_info *info)
6763{
6764 struct ppc_elf_link_hash_table *htab = ppc_elf_hash_table (info);
6765 bfd *output_bfd = info->output_bfd;
6766 bfd_vma plt;
9e390558
AM
6767 unsigned char *end = p + GLINK_ENTRY_SIZE (htab, h);
6768
6769 if (h != NULL
6770 && h == htab->tls_get_addr
6771 && !htab->params->no_tls_get_addr_opt)
6772 {
6773 bfd_put_32 (output_bfd, LWZ_11_3, p);
6774 p += 4;
6775 bfd_put_32 (output_bfd, LWZ_12_3 + 4, p);
6776 p += 4;
6777 bfd_put_32 (output_bfd, MR_0_3, p);
6778 p += 4;
6779 bfd_put_32 (output_bfd, CMPWI_11_0, p);
6780 p += 4;
6781 bfd_put_32 (output_bfd, ADD_3_12_2, p);
6782 p += 4;
6783 bfd_put_32 (output_bfd, BEQLR, p);
6784 p += 4;
6785 bfd_put_32 (output_bfd, MR_3_0, p);
6786 p += 4;
6787 bfd_put_32 (output_bfd, NOP, p);
6788 p += 4;
6789 }
e054468f
AM
6790
6791 plt = ((ent->plt.offset & ~1)
6792 + plt_sec->output_section->vma
6793 + plt_sec->output_offset);
e054468f 6794
0e1862bb 6795 if (bfd_link_pic (info))
e054468f
AM
6796 {
6797 bfd_vma got = 0;
6798
6799 if (ent->addend >= 32768)
6800 got = (ent->addend
6801 + ent->sec->output_section->vma
6802 + ent->sec->output_offset);
6803 else if (htab->elf.hgot != NULL)
6804 got = SYM_VAL (htab->elf.hgot);
6805
6806 plt -= got;
6807
6808 if (plt + 0x8000 < 0x10000)
9e390558 6809 bfd_put_32 (output_bfd, LWZ_11_30 + PPC_LO (plt), p);
e054468f
AM
6810 else
6811 {
6812 bfd_put_32 (output_bfd, ADDIS_11_30 + PPC_HA (plt), p);
6813 p += 4;
6814 bfd_put_32 (output_bfd, LWZ_11_11 + PPC_LO (plt), p);
e054468f
AM
6815 }
6816 }
6817 else
6818 {
6819 bfd_put_32 (output_bfd, LIS_11 + PPC_HA (plt), p);
6820 p += 4;
6821 bfd_put_32 (output_bfd, LWZ_11_11 + PPC_LO (plt), p);
9e390558
AM
6822 }
6823 p += 4;
6824 bfd_put_32 (output_bfd, MTCTR_11, p);
6825 p += 4;
407aa07c
AM
6826 bfd_put_32 (output_bfd, BCTR, p);
6827 p += 4;
9e390558
AM
6828 while (p < end)
6829 {
6830 bfd_put_32 (output_bfd, htab->params->ppc476_workaround ? BA : NOP, p);
e054468f
AM
6831 p += 4;
6832 }
6833}
6834
bd6c6e2b
AM
6835/* Return true if symbol is defined statically. */
6836
6837static bfd_boolean
6838is_static_defined (struct elf_link_hash_entry *h)
6839{
6840 return ((h->root.type == bfd_link_hash_defined
6841 || h->root.type == bfd_link_hash_defweak)
6842 && h->root.u.def.section != NULL
6843 && h->root.u.def.section->output_section != NULL);
6844}
6845
2d0f3896
AM
6846/* If INSN is an opcode that may be used with an @tls operand, return
6847 the transformed insn for TLS optimisation, otherwise return 0. If
6848 REG is non-zero only match an insn with RB or RA equal to REG. */
6849
6850unsigned int
6851_bfd_elf_ppc_at_tls_transform (unsigned int insn, unsigned int reg)
6852{
6853 unsigned int rtra;
6854
2365f8d7 6855 if ((insn & (0x3fu << 26)) != 31 << 26)
2d0f3896
AM
6856 return 0;
6857
6858 if (reg == 0 || ((insn >> 11) & 0x1f) == reg)
6859 rtra = insn & ((1 << 26) - (1 << 16));
6860 else if (((insn >> 16) & 0x1f) == reg)
6861 rtra = (insn & (0x1f << 21)) | ((insn & (0x1f << 11)) << 5);
6862 else
6863 return 0;
6864
6865 if ((insn & (0x3ff << 1)) == 266 << 1)
6866 /* add -> addi. */
6867 insn = 14 << 26;
6868 else if ((insn & (0x1f << 1)) == 23 << 1
6869 && ((insn & (0x1f << 6)) < 14 << 6
6870 || ((insn & (0x1f << 6)) >= 16 << 6
6871 && (insn & (0x1f << 6)) < 24 << 6)))
6872 /* load and store indexed -> dform. */
2365f8d7 6873 insn = (32u | ((insn >> 6) & 0x1f)) << 26;
2d0f3896
AM
6874 else if ((insn & (((0x1a << 5) | 0x1f) << 1)) == 21 << 1)
6875 /* ldx, ldux, stdx, stdux -> ld, ldu, std, stdu. */
2365f8d7 6876 insn = ((58u | ((insn >> 6) & 4)) << 26) | ((insn >> 6) & 1);
2d0f3896
AM
6877 else if ((insn & (((0x1f << 5) | 0x1f) << 1)) == 341 << 1)
6878 /* lwax -> lwa. */
2365f8d7 6879 insn = (58u << 26) | 2;
2d0f3896
AM
6880 else
6881 return 0;
6882 insn |= rtra;
6883 return insn;
6884}
6885
766bc656
AM
6886/* If INSN is an opcode that may be used with an @tprel operand, return
6887 the transformed insn for an undefined weak symbol, ie. with the
6888 thread pointer REG operand removed. Otherwise return 0. */
6889
6890unsigned int
6891_bfd_elf_ppc_at_tprel_transform (unsigned int insn, unsigned int reg)
6892{
6893 if ((insn & (0x1f << 16)) == reg << 16
2365f8d7
AM
6894 && ((insn & (0x3fu << 26)) == 14u << 26 /* addi */
6895 || (insn & (0x3fu << 26)) == 15u << 26 /* addis */
6896 || (insn & (0x3fu << 26)) == 32u << 26 /* lwz */
6897 || (insn & (0x3fu << 26)) == 34u << 26 /* lbz */
6898 || (insn & (0x3fu << 26)) == 36u << 26 /* stw */
6899 || (insn & (0x3fu << 26)) == 38u << 26 /* stb */
6900 || (insn & (0x3fu << 26)) == 40u << 26 /* lhz */
6901 || (insn & (0x3fu << 26)) == 42u << 26 /* lha */
6902 || (insn & (0x3fu << 26)) == 44u << 26 /* sth */
6903 || (insn & (0x3fu << 26)) == 46u << 26 /* lmw */
6904 || (insn & (0x3fu << 26)) == 47u << 26 /* stmw */
6905 || (insn & (0x3fu << 26)) == 48u << 26 /* lfs */
6906 || (insn & (0x3fu << 26)) == 50u << 26 /* lfd */
6907 || (insn & (0x3fu << 26)) == 52u << 26 /* stfs */
6908 || (insn & (0x3fu << 26)) == 54u << 26 /* stfd */
6909 || ((insn & (0x3fu << 26)) == 58u << 26 /* lwa,ld,lmd */
766bc656 6910 && (insn & 3) != 1)
2365f8d7 6911 || ((insn & (0x3fu << 26)) == 62u << 26 /* std, stmd */
766bc656
AM
6912 && ((insn & 3) == 0 || (insn & 3) == 3))))
6913 {
6914 insn &= ~(0x1f << 16);
6915 }
6916 else if ((insn & (0x1f << 21)) == reg << 21
2365f8d7
AM
6917 && ((insn & (0x3eu << 26)) == 24u << 26 /* ori, oris */
6918 || (insn & (0x3eu << 26)) == 26u << 26 /* xori,xoris */
6919 || (insn & (0x3eu << 26)) == 28u << 26 /* andi,andis */))
766bc656
AM
6920 {
6921 insn &= ~(0x1f << 21);
6922 insn |= (insn & (0x1f << 16)) << 5;
2365f8d7 6923 if ((insn & (0x3eu << 26)) == 26u << 26 /* xori,xoris */)
766bc656
AM
6924 insn -= 2 >> 26; /* convert to ori,oris */
6925 }
6926 else
6927 insn = 0;
6928 return insn;
6929}
6930
1fe532cf
AM
6931static bfd_boolean
6932is_insn_ds_form (unsigned int insn)
6933{
2365f8d7
AM
6934 return ((insn & (0x3fu << 26)) == 58u << 26 /* ld,ldu,lwa */
6935 || (insn & (0x3fu << 26)) == 62u << 26 /* std,stdu,stq */
6936 || (insn & (0x3fu << 26)) == 57u << 26 /* lfdp */
6937 || (insn & (0x3fu << 26)) == 61u << 26 /* stfdp */);
1fe532cf
AM
6938}
6939
6940static bfd_boolean
6941is_insn_dq_form (unsigned int insn)
6942{
2365f8d7
AM
6943 return ((insn & (0x3fu << 26)) == 56u << 26 /* lq */
6944 || ((insn & (0x3fu << 26)) == (61u << 26) /* lxv, stxv */
a680de9a 6945 && (insn & 3) == 1));
1fe532cf
AM
6946}
6947
252b5132
RH
6948/* The RELOCATE_SECTION function is called by the ELF backend linker
6949 to handle the relocations for a section.
6950
6951 The relocs are always passed as Rela structures; if the section
6952 actually uses Rel structures, the r_addend field will always be
6953 zero.
6954
6955 This function is responsible for adjust the section contents as
6956 necessary, and (if using Rela relocs and generating a
1049f94e 6957 relocatable output file) adjusting the reloc addend as
252b5132
RH
6958 necessary.
6959
6960 This function does not have to worry about setting the reloc
6961 address or the reloc symbol index.
6962
6963 LOCAL_SYMS is a pointer to the swapped in local symbols.
6964
6965 LOCAL_SECTIONS is an array giving the section in the input file
6966 corresponding to the st_shndx field of each local symbol.
6967
6968 The global hash table entry for the global symbols can be found
6969 via elf_sym_hashes (input_bfd).
6970
1049f94e 6971 When generating relocatable output, this function must handle
252b5132
RH
6972 STB_LOCAL/STT_SECTION symbols specially. The output symbol is
6973 going to be the section symbol corresponding to the output
6974 section, which means that the addend must be adjusted
6975 accordingly. */
6976
b34976b6 6977static bfd_boolean
55fd94b0
AM
6978ppc_elf_relocate_section (bfd *output_bfd,
6979 struct bfd_link_info *info,
6980 bfd *input_bfd,
6981 asection *input_section,
6982 bfd_byte *contents,
6983 Elf_Internal_Rela *relocs,
6984 Elf_Internal_Sym *local_syms,
6985 asection **local_sections)
252b5132 6986{
7619e7c7
AM
6987 Elf_Internal_Shdr *symtab_hdr;
6988 struct elf_link_hash_entry **sym_hashes;
6989 struct ppc_elf_link_hash_table *htab;
6990 Elf_Internal_Rela *rel;
c316a17c 6991 Elf_Internal_Rela *wrel;
7619e7c7
AM
6992 Elf_Internal_Rela *relend;
6993 Elf_Internal_Rela outrel;
f95f8542 6994 asection *got2;
252b5132 6995 bfd_vma *local_got_offsets;
b34976b6 6996 bfd_boolean ret = TRUE;
95f0d0d2 6997 bfd_vma d_offset = (bfd_big_endian (input_bfd) ? 2 : 0);
3348747a 6998 bfd_boolean is_vxworks_tls;
d3e454b9
AM
6999 unsigned int picfixup_size = 0;
7000 struct ppc_elf_relax_info *relax_info = NULL;
b34976b6 7001
252b5132 7002#ifdef DEBUG
871b3ab2 7003 _bfd_error_handler ("ppc_elf_relocate_section called for %pB section %pA, "
d003868e
AM
7004 "%ld relocations%s",
7005 input_bfd, input_section,
7006 (long) input_section->reloc_count,
0e1862bb 7007 (bfd_link_relocatable (info)) ? " (relocatable)" : "");
252b5132
RH
7008#endif
7009
7af5d5c4
AM
7010 if (!is_ppc_elf (input_bfd))
7011 {
7012 bfd_set_error (bfd_error_wrong_format);
7013 return FALSE;
7014 }
7015
a6aa5195
AM
7016 got2 = bfd_get_section_by_name (input_bfd, ".got2");
7017
e47cd125 7018 /* Initialize howto table if not already done. */
8da6118f 7019 if (!ppc_elf_howto_table[R_PPC_ADDR32])
252b5132
RH
7020 ppc_elf_howto_init ();
7021
7619e7c7 7022 htab = ppc_elf_hash_table (info);
252b5132 7023 local_got_offsets = elf_local_got_offsets (input_bfd);
0ffa91dd 7024 symtab_hdr = &elf_symtab_hdr (input_bfd);
7619e7c7 7025 sym_hashes = elf_sym_hashes (input_bfd);
3348747a
NS
7026 /* We have to handle relocations in vxworks .tls_vars sections
7027 specially, because the dynamic loader is 'weird'. */
0e1862bb 7028 is_vxworks_tls = (htab->is_vxworks && bfd_link_pic (info)
3348747a
NS
7029 && !strcmp (input_section->output_section->name,
7030 ".tls_vars"));
d3e454b9
AM
7031 if (input_section->sec_info_type == SEC_INFO_TYPE_TARGET)
7032 relax_info = elf_section_data (input_section)->sec_info;
c316a17c 7033 rel = wrel = relocs;
7619e7c7 7034 relend = relocs + input_section->reloc_count;
c316a17c 7035 for (; rel < relend; wrel++, rel++)
252b5132 7036 {
7619e7c7
AM
7037 enum elf_ppc_reloc_type r_type;
7038 bfd_vma addend;
7039 bfd_reloc_status_type r;
7040 Elf_Internal_Sym *sym;
7041 asection *sec;
7042 struct elf_link_hash_entry *h;
7043 const char *sym_name;
252b5132
RH
7044 reloc_howto_type *howto;
7045 unsigned long r_symndx;
7046 bfd_vma relocation;
91d6fa6a 7047 bfd_vma branch_bit, from;
23cedd1d 7048 bfd_boolean unresolved_reloc, save_unresolved_reloc;
7619e7c7
AM
7049 bfd_boolean warned;
7050 unsigned int tls_type, tls_mask, tls_gd;
08be3224 7051 struct plt_entry **ifunc, **plt_list;
86c95733 7052 struct reloc_howto_struct alt_howto;
7619e7c7 7053
c316a17c 7054 again:
55fd94b0
AM
7055 r_type = ELF32_R_TYPE (rel->r_info);
7056 sym = NULL;
7057 sec = NULL;
7058 h = NULL;
7619e7c7
AM
7059 unresolved_reloc = FALSE;
7060 warned = FALSE;
252b5132 7061 r_symndx = ELF32_R_SYM (rel->r_info);
560e09e9 7062
252b5132
RH
7063 if (r_symndx < symtab_hdr->sh_info)
7064 {
7065 sym = local_syms + r_symndx;
7066 sec = local_sections[r_symndx];
26c61ae5 7067 sym_name = bfd_elf_sym_name (input_bfd, symtab_hdr, sym, sec);
252b5132 7068
8517fae7 7069 relocation = _bfd_elf_rela_local_sym (output_bfd, sym, &sec, rel);
252b5132
RH
7070 }
7071 else
7072 {
62d887d4
L
7073 bfd_boolean ignored;
7074
b2a8e766
AM
7075 RELOC_FOR_GLOBAL_SYMBOL (info, input_bfd, input_section, rel,
7076 r_symndx, symtab_hdr, sym_hashes,
7077 h, sec, relocation,
62d887d4 7078 unresolved_reloc, warned, ignored);
9abc968f 7079
252b5132 7080 sym_name = h->root.root.string;
7619e7c7
AM
7081 }
7082
dbaa2011 7083 if (sec != NULL && discarded_section (sec))
ab96bf03
AM
7084 {
7085 /* For relocs against symbols from removed linkonce sections,
7086 or sections discarded by a linker script, we just want the
7087 section contents zeroed. Avoid any special processing. */
7088 howto = NULL;
7089 if (r_type < R_PPC_max)
7090 howto = ppc_elf_howto_table[r_type];
c316a17c
AM
7091
7092 _bfd_clear_contents (howto, input_bfd, input_section,
0930cb30 7093 contents, rel->r_offset);
c316a17c
AM
7094 wrel->r_offset = rel->r_offset;
7095 wrel->r_info = 0;
7096 wrel->r_addend = 0;
7097
7098 /* For ld -r, remove relocations in debug sections against
dcd2b8a0 7099 symbols defined in discarded sections. Not done for
c316a17c
AM
7100 non-debug to preserve relocs in .eh_frame which the
7101 eh_frame editing code expects to be present. */
7102 if (bfd_link_relocatable (info)
7103 && (input_section->flags & SEC_DEBUGGING))
7104 wrel--;
7105
7106 continue;
ab96bf03
AM
7107 }
7108
0e1862bb 7109 if (bfd_link_relocatable (info))
ab96bf03
AM
7110 {
7111 if (got2 != NULL
7112 && r_type == R_PPC_PLTREL24
f75e0e33 7113 && rel->r_addend != 0)
ab96bf03
AM
7114 {
7115 /* R_PPC_PLTREL24 is rather special. If non-zero, the
7116 addend specifies the GOT pointer offset within .got2. */
7117 rel->r_addend += got2->output_offset;
7118 }
53291d1f
AM
7119 if (r_type != R_PPC_RELAX_PLT
7120 && r_type != R_PPC_RELAX_PLTREL24
7121 && r_type != R_PPC_RELAX)
c316a17c 7122 goto copy_reloc;
ab96bf03
AM
7123 }
7124
7619e7c7
AM
7125 /* TLS optimizations. Replace instruction sequences and relocs
7126 based on information we collected in tls_optimize. We edit
7127 RELOCS so that --emit-relocs will output something sensible
7128 for the final instruction stream. */
7129 tls_mask = 0;
7130 tls_gd = 0;
727fc41e
AM
7131 if (h != NULL)
7132 tls_mask = ((struct ppc_elf_link_hash_entry *) h)->tls_mask;
7133 else if (local_got_offsets != NULL)
7619e7c7 7134 {
e054468f 7135 struct plt_entry **local_plt;
727fc41e 7136 char *lgot_masks;
e054468f
AM
7137 local_plt
7138 = (struct plt_entry **) (local_got_offsets + symtab_hdr->sh_info);
7139 lgot_masks = (char *) (local_plt + symtab_hdr->sh_info);
727fc41e 7140 tls_mask = lgot_masks[r_symndx];
7619e7c7
AM
7141 }
7142
7143 /* Ensure reloc mapping code below stays sane. */
7144 if ((R_PPC_GOT_TLSLD16 & 3) != (R_PPC_GOT_TLSGD16 & 3)
7145 || (R_PPC_GOT_TLSLD16_LO & 3) != (R_PPC_GOT_TLSGD16_LO & 3)
7146 || (R_PPC_GOT_TLSLD16_HI & 3) != (R_PPC_GOT_TLSGD16_HI & 3)
7147 || (R_PPC_GOT_TLSLD16_HA & 3) != (R_PPC_GOT_TLSGD16_HA & 3)
7148 || (R_PPC_GOT_TLSLD16 & 3) != (R_PPC_GOT_TPREL16 & 3)
7149 || (R_PPC_GOT_TLSLD16_LO & 3) != (R_PPC_GOT_TPREL16_LO & 3)
7150 || (R_PPC_GOT_TLSLD16_HI & 3) != (R_PPC_GOT_TPREL16_HI & 3)
7151 || (R_PPC_GOT_TLSLD16_HA & 3) != (R_PPC_GOT_TPREL16_HA & 3))
7152 abort ();
7153 switch (r_type)
7154 {
7155 default:
7156 break;
7157
7158 case R_PPC_GOT_TPREL16:
7159 case R_PPC_GOT_TPREL16_LO:
e054468f 7160 if ((tls_mask & TLS_TLS) != 0
7619e7c7
AM
7161 && (tls_mask & TLS_TPREL) == 0)
7162 {
7163 bfd_vma insn;
91d6fa6a 7164
95f0d0d2 7165 insn = bfd_get_32 (input_bfd,
c316a17c 7166 contents + rel->r_offset - d_offset);
7619e7c7
AM
7167 insn &= 31 << 21;
7168 insn |= 0x3c020000; /* addis 0,2,0 */
95f0d0d2 7169 bfd_put_32 (input_bfd, insn,
c316a17c 7170 contents + rel->r_offset - d_offset);
7619e7c7
AM
7171 r_type = R_PPC_TPREL16_HA;
7172 rel->r_info = ELF32_R_INFO (r_symndx, r_type);
7173 }
7174 break;
7175
7176 case R_PPC_TLS:
e054468f 7177 if ((tls_mask & TLS_TLS) != 0
7619e7c7
AM
7178 && (tls_mask & TLS_TPREL) == 0)
7179 {
2d0f3896
AM
7180 bfd_vma insn;
7181
95f0d0d2 7182 insn = bfd_get_32 (input_bfd, contents + rel->r_offset);
2d0f3896
AM
7183 insn = _bfd_elf_ppc_at_tls_transform (insn, 2);
7184 if (insn == 0)
7619e7c7 7185 abort ();
95f0d0d2 7186 bfd_put_32 (input_bfd, insn, contents + rel->r_offset);
7619e7c7
AM
7187 r_type = R_PPC_TPREL16_LO;
7188 rel->r_info = ELF32_R_INFO (r_symndx, r_type);
4fe5ca5b 7189
7619e7c7 7190 /* Was PPC_TLS which sits on insn boundary, now
4fe5ca5b
GM
7191 PPC_TPREL16_LO which is at low-order half-word. */
7192 rel->r_offset += d_offset;
7619e7c7
AM
7193 }
7194 break;
7195
7196 case R_PPC_GOT_TLSGD16_HI:
7197 case R_PPC_GOT_TLSGD16_HA:
b00a0a86 7198 tls_gd = TLS_GDIE;
e054468f 7199 if ((tls_mask & TLS_TLS) != 0 && (tls_mask & TLS_GD) == 0)
7619e7c7
AM
7200 goto tls_gdld_hi;
7201 break;
7202
7203 case R_PPC_GOT_TLSLD16_HI:
7204 case R_PPC_GOT_TLSLD16_HA:
e054468f 7205 if ((tls_mask & TLS_TLS) != 0 && (tls_mask & TLS_LD) == 0)
7619e7c7
AM
7206 {
7207 tls_gdld_hi:
7208 if ((tls_mask & tls_gd) != 0)
7209 r_type = (((r_type - (R_PPC_GOT_TLSGD16 & 3)) & 3)
7210 + R_PPC_GOT_TPREL16);
7211 else
7212 {
4fe5ca5b 7213 rel->r_offset -= d_offset;
95f0d0d2 7214 bfd_put_32 (input_bfd, NOP, contents + rel->r_offset);
7619e7c7
AM
7215 r_type = R_PPC_NONE;
7216 }
7217 rel->r_info = ELF32_R_INFO (r_symndx, r_type);
7218 }
7219 break;
7220
7221 case R_PPC_GOT_TLSGD16:
7222 case R_PPC_GOT_TLSGD16_LO:
b00a0a86 7223 tls_gd = TLS_GDIE;
e054468f 7224 if ((tls_mask & TLS_TLS) != 0 && (tls_mask & TLS_GD) == 0)
b7fcf6f6 7225 goto tls_ldgd_opt;
7619e7c7
AM
7226 break;
7227
7228 case R_PPC_GOT_TLSLD16:
7229 case R_PPC_GOT_TLSLD16_LO:
e054468f 7230 if ((tls_mask & TLS_TLS) != 0 && (tls_mask & TLS_LD) == 0)
7619e7c7 7231 {
3a71aa26 7232 unsigned int insn1, insn2;
b7fcf6f6 7233 bfd_vma offset;
7619e7c7 7234
b7fcf6f6 7235 tls_ldgd_opt:
727fc41e
AM
7236 offset = (bfd_vma) -1;
7237 /* If not using the newer R_PPC_TLSGD/LD to mark
7238 __tls_get_addr calls, we must trust that the call
7239 stays with its arg setup insns, ie. that the next
7240 reloc is the __tls_get_addr call associated with
7241 the current reloc. Edit both insns. */
9737e8af 7242 if (input_section->nomark_tls_get_addr
727fc41e
AM
7243 && rel + 1 < relend
7244 && branch_reloc_hash_match (input_bfd, rel + 1,
7245 htab->tls_get_addr))
7246 offset = rel[1].r_offset;
b86ac8e3
AM
7247 /* We read the low GOT_TLS insn because we need to keep
7248 the destination reg. It may be something other than
7249 the usual r3, and moved to r3 before the call by
7250 intervening code. */
95f0d0d2 7251 insn1 = bfd_get_32 (input_bfd,
b86ac8e3 7252 contents + rel->r_offset - d_offset);
b7fcf6f6
AM
7253 if ((tls_mask & tls_gd) != 0)
7254 {
7255 /* IE */
b86ac8e3 7256 insn1 &= (0x1f << 21) | (0x1f << 16);
2365f8d7 7257 insn1 |= 32u << 26; /* lwz */
727fc41e
AM
7258 if (offset != (bfd_vma) -1)
7259 {
f58d5a2d 7260 rel[1].r_info = ELF32_R_INFO (STN_UNDEF, R_PPC_NONE);
727fc41e 7261 insn2 = 0x7c631214; /* add 3,3,2 */
95f0d0d2 7262 bfd_put_32 (input_bfd, insn2, contents + offset);
727fc41e 7263 }
b7fcf6f6
AM
7264 r_type = (((r_type - (R_PPC_GOT_TLSGD16 & 3)) & 3)
7265 + R_PPC_GOT_TPREL16);
7266 rel->r_info = ELF32_R_INFO (r_symndx, r_type);
7267 }
7268 else
7269 {
7270 /* LE */
b86ac8e3
AM
7271 insn1 &= 0x1f << 21;
7272 insn1 |= 0x3c020000; /* addis r,2,0 */
7619e7c7
AM
7273 if (tls_gd == 0)
7274 {
b7fcf6f6 7275 /* Was an LD reloc. */
1d483afe
AM
7276 for (r_symndx = 0;
7277 r_symndx < symtab_hdr->sh_info;
7278 r_symndx++)
7279 if (local_sections[r_symndx] == sec)
7280 break;
7281 if (r_symndx >= symtab_hdr->sh_info)
cf35638d 7282 r_symndx = STN_UNDEF;
b7fcf6f6 7283 rel->r_addend = htab->elf.tls_sec->vma + DTP_OFFSET;
cf35638d 7284 if (r_symndx != STN_UNDEF)
1d483afe
AM
7285 rel->r_addend -= (local_syms[r_symndx].st_value
7286 + sec->output_offset
7287 + sec->output_section->vma);
7619e7c7 7288 }
b7fcf6f6
AM
7289 r_type = R_PPC_TPREL16_HA;
7290 rel->r_info = ELF32_R_INFO (r_symndx, r_type);
727fc41e
AM
7291 if (offset != (bfd_vma) -1)
7292 {
7293 rel[1].r_info = ELF32_R_INFO (r_symndx, R_PPC_TPREL16_LO);
7294 rel[1].r_offset = offset + d_offset;
7295 rel[1].r_addend = rel->r_addend;
7296 insn2 = 0x38630000; /* addi 3,3,0 */
95f0d0d2 7297 bfd_put_32 (input_bfd, insn2, contents + offset);
727fc41e 7298 }
b7fcf6f6 7299 }
95f0d0d2 7300 bfd_put_32 (input_bfd, insn1,
b7fcf6f6 7301 contents + rel->r_offset - d_offset);
b7fcf6f6
AM
7302 if (tls_gd == 0)
7303 {
7304 /* We changed the symbol on an LD reloc. Start over
7305 in order to get h, sym, sec etc. right. */
c316a17c 7306 goto again;
7619e7c7 7307 }
252b5132 7308 }
7619e7c7 7309 break;
727fc41e
AM
7310
7311 case R_PPC_TLSGD:
675e2809
AM
7312 if ((tls_mask & TLS_TLS) != 0 && (tls_mask & TLS_GD) == 0
7313 && rel + 1 < relend)
727fc41e
AM
7314 {
7315 unsigned int insn2;
7316 bfd_vma offset = rel->r_offset;
7317
23cedd1d
AM
7318 if (is_plt_seq_reloc (ELF32_R_TYPE (rel[1].r_info)))
7319 {
7320 bfd_put_32 (input_bfd, NOP, contents + offset);
7321 rel[1].r_info = ELF32_R_INFO (STN_UNDEF, R_PPC_NONE);
7322 break;
7323 }
7324
b00a0a86 7325 if ((tls_mask & TLS_GDIE) != 0)
727fc41e
AM
7326 {
7327 /* IE */
7328 r_type = R_PPC_NONE;
7329 insn2 = 0x7c631214; /* add 3,3,2 */
7330 }
7331 else
7332 {
7333 /* LE */
7334 r_type = R_PPC_TPREL16_LO;
7335 rel->r_offset += d_offset;
7336 insn2 = 0x38630000; /* addi 3,3,0 */
7337 }
7338 rel->r_info = ELF32_R_INFO (r_symndx, r_type);
95f0d0d2 7339 bfd_put_32 (input_bfd, insn2, contents + offset);
727fc41e
AM
7340 /* Zap the reloc on the _tls_get_addr call too. */
7341 BFD_ASSERT (offset == rel[1].r_offset);
f58d5a2d 7342 rel[1].r_info = ELF32_R_INFO (STN_UNDEF, R_PPC_NONE);
727fc41e
AM
7343 }
7344 break;
7345
7346 case R_PPC_TLSLD:
675e2809
AM
7347 if ((tls_mask & TLS_TLS) != 0 && (tls_mask & TLS_LD) == 0
7348 && rel + 1 < relend)
727fc41e
AM
7349 {
7350 unsigned int insn2;
7351
23cedd1d
AM
7352 if (is_plt_seq_reloc (ELF32_R_TYPE (rel[1].r_info)))
7353 {
7354 bfd_put_32 (input_bfd, NOP, contents + rel->r_offset);
7355 rel[1].r_info = ELF32_R_INFO (STN_UNDEF, R_PPC_NONE);
7356 break;
7357 }
7358
727fc41e
AM
7359 for (r_symndx = 0;
7360 r_symndx < symtab_hdr->sh_info;
7361 r_symndx++)
7362 if (local_sections[r_symndx] == sec)
7363 break;
7364 if (r_symndx >= symtab_hdr->sh_info)
cf35638d 7365 r_symndx = STN_UNDEF;
727fc41e 7366 rel->r_addend = htab->elf.tls_sec->vma + DTP_OFFSET;
cf35638d 7367 if (r_symndx != STN_UNDEF)
727fc41e
AM
7368 rel->r_addend -= (local_syms[r_symndx].st_value
7369 + sec->output_offset
7370 + sec->output_section->vma);
7371
7372 rel->r_info = ELF32_R_INFO (r_symndx, R_PPC_TPREL16_LO);
7373 rel->r_offset += d_offset;
7374 insn2 = 0x38630000; /* addi 3,3,0 */
95f0d0d2 7375 bfd_put_32 (input_bfd, insn2,
727fc41e
AM
7376 contents + rel->r_offset - d_offset);
7377 /* Zap the reloc on the _tls_get_addr call too. */
7378 BFD_ASSERT (rel->r_offset - d_offset == rel[1].r_offset);
f58d5a2d 7379 rel[1].r_info = ELF32_R_INFO (STN_UNDEF, R_PPC_NONE);
c316a17c 7380 goto again;
727fc41e
AM
7381 }
7382 break;
7619e7c7
AM
7383 }
7384
7385 /* Handle other relocations that tweak non-addend part of insn. */
7386 branch_bit = 0;
7387 switch (r_type)
7388 {
7389 default:
7390 break;
7391
7392 /* Branch taken prediction relocations. */
7393 case R_PPC_ADDR14_BRTAKEN:
7394 case R_PPC_REL14_BRTAKEN:
7395 branch_bit = BRANCH_PREDICT_BIT;
1a0670f3 7396 /* Fall through. */
7619e7c7 7397
4cc11e76 7398 /* Branch not taken prediction relocations. */
7619e7c7
AM
7399 case R_PPC_ADDR14_BRNTAKEN:
7400 case R_PPC_REL14_BRNTAKEN:
91d6fa6a 7401 {
23cedd1d 7402 unsigned int insn;
7619e7c7 7403
95f0d0d2 7404 insn = bfd_get_32 (input_bfd, contents + rel->r_offset);
91d6fa6a
NC
7405 insn &= ~BRANCH_PREDICT_BIT;
7406 insn |= branch_bit;
7619e7c7 7407
91d6fa6a
NC
7408 from = (rel->r_offset
7409 + input_section->output_offset
7410 + input_section->output_section->vma);
7619e7c7 7411
91d6fa6a
NC
7412 /* Invert 'y' bit if not the default. */
7413 if ((bfd_signed_vma) (relocation + rel->r_addend - from) < 0)
7414 insn ^= BRANCH_PREDICT_BIT;
7415
95f0d0d2 7416 bfd_put_32 (input_bfd, insn, contents + rel->r_offset);
91d6fa6a 7417 }
08be3224
AM
7418 break;
7419
7420 case R_PPC_PLT16_HA:
7421 {
7422 unsigned int insn;
7423
7424 insn = bfd_get_32 (input_bfd,
7425 contents + rel->r_offset - d_offset);
2365f8d7 7426 if ((insn & (0x3fu << 26)) == 15u << 26
08be3224
AM
7427 && (insn & (0x1f << 16)) != 0)
7428 {
7429 if (!bfd_link_pic (info))
7430 {
7431 /* Convert addis to lis. */
7432 insn &= ~(0x1f << 16);
7433 bfd_put_32 (input_bfd, insn,
7434 contents + rel->r_offset - d_offset);
7435 }
7436 }
7437 else if (bfd_link_pic (info))
7438 info->callbacks->einfo
7439 (_("%P: %H: error: %s with unexpected instruction %x\n"),
7440 input_bfd, input_section, rel->r_offset,
7441 "R_PPC_PLT16_HA", insn);
7442 }
7443 break;
252b5132
RH
7444 }
7445
d3e454b9
AM
7446 if (ELIMINATE_COPY_RELOCS
7447 && h != NULL
7448 && !h->def_regular
7449 && h->protected_def
7450 && ppc_elf_hash_entry (h)->has_addr16_ha
7451 && ppc_elf_hash_entry (h)->has_addr16_lo
7452 && htab->params->pic_fixup > 0)
7453 {
7454 /* Convert lis;addi or lis;load/store accessing a protected
7455 variable defined in a shared library to PIC. */
7456 unsigned int insn;
7457
7458 if (r_type == R_PPC_ADDR16_HA)
7459 {
95f0d0d2 7460 insn = bfd_get_32 (input_bfd,
d3e454b9 7461 contents + rel->r_offset - d_offset);
2365f8d7 7462 if ((insn & (0x3fu << 26)) == (15u << 26)
d3e454b9
AM
7463 && (insn & (0x1f << 16)) == 0 /* lis */)
7464 {
7465 bfd_byte *p;
7466 bfd_vma off;
7467 bfd_vma got_addr;
7468
7469 p = (contents + input_section->size
7470 - relax_info->workaround_size
7471 - relax_info->picfixup_size
7472 + picfixup_size);
7473 off = (p - contents) - (rel->r_offset - d_offset);
7474 if (off > 0x1fffffc || (off & 3) != 0)
7475 info->callbacks->einfo
174d0a74 7476 (_("%H: fixup branch overflow\n"),
d3e454b9
AM
7477 input_bfd, input_section, rel->r_offset);
7478
95f0d0d2 7479 bfd_put_32 (input_bfd, B | off,
d3e454b9 7480 contents + rel->r_offset - d_offset);
ce558b89
AM
7481 got_addr = (htab->elf.sgot->output_section->vma
7482 + htab->elf.sgot->output_offset
d3e454b9 7483 + (h->got.offset & ~1));
c316a17c
AM
7484 wrel->r_offset = (p - contents) + d_offset;
7485 wrel->r_info = ELF32_R_INFO (0, R_PPC_ADDR16_HA);
7486 wrel->r_addend = got_addr;
d3e454b9 7487 insn &= ~0xffff;
4aef7643 7488 insn |= ((unsigned int) (got_addr + 0x8000) >> 16) & 0xffff;
95f0d0d2 7489 bfd_put_32 (input_bfd, insn, p);
d3e454b9
AM
7490
7491 /* Convert lis to lwz, loading address from GOT. */
7492 insn &= ~0xffff;
7493 insn ^= (32u ^ 15u) << 26;
7494 insn |= (insn & (0x1f << 21)) >> 5;
7495 insn |= got_addr & 0xffff;
95f0d0d2 7496 bfd_put_32 (input_bfd, insn, p + 4);
d3e454b9 7497
95f0d0d2 7498 bfd_put_32 (input_bfd, B | ((-4 - off) & 0x3ffffff), p + 8);
d3e454b9
AM
7499 picfixup_size += 12;
7500
7501 /* Use one of the spare relocs, so --emit-relocs
7502 output is reasonable. */
7503 memmove (rel + 1, rel, (relend - rel - 1) * sizeof (*rel));
c316a17c
AM
7504 wrel++, rel++;
7505 rel->r_offset = wrel[-1].r_offset + 4;
d3e454b9 7506 rel->r_info = ELF32_R_INFO (0, R_PPC_ADDR16_LO);
c316a17c 7507 rel->r_addend = wrel[-1].r_addend;
d3e454b9
AM
7508
7509 /* Continue on as if we had a got reloc, to output
7510 dynamic reloc. */
7511 r_type = R_PPC_GOT16_LO;
7512 }
7513 else
2c4d9cbe 7514 _bfd_error_handler
695344c0 7515 /* xgettext:c-format */
2dcf00ce
AM
7516 (_("%pB(%pA+%#" PRIx64 "): error: "
7517 "%s with unexpected instruction %#x"),
7518 input_bfd, input_section, (uint64_t) rel->r_offset,
d3e454b9
AM
7519 "R_PPC_ADDR16_HA", insn);
7520 }
7521 else if (r_type == R_PPC_ADDR16_LO)
7522 {
95f0d0d2 7523 insn = bfd_get_32 (input_bfd,
d3e454b9 7524 contents + rel->r_offset - d_offset);
2365f8d7
AM
7525 if ((insn & (0x3fu << 26)) == 14u << 26 /* addi */
7526 || (insn & (0x3fu << 26)) == 32u << 26 /* lwz */
7527 || (insn & (0x3fu << 26)) == 34u << 26 /* lbz */
7528 || (insn & (0x3fu << 26)) == 36u << 26 /* stw */
7529 || (insn & (0x3fu << 26)) == 38u << 26 /* stb */
7530 || (insn & (0x3fu << 26)) == 40u << 26 /* lhz */
7531 || (insn & (0x3fu << 26)) == 42u << 26 /* lha */
7532 || (insn & (0x3fu << 26)) == 44u << 26 /* sth */
7533 || (insn & (0x3fu << 26)) == 46u << 26 /* lmw */
7534 || (insn & (0x3fu << 26)) == 47u << 26 /* stmw */
7535 || (insn & (0x3fu << 26)) == 48u << 26 /* lfs */
7536 || (insn & (0x3fu << 26)) == 50u << 26 /* lfd */
7537 || (insn & (0x3fu << 26)) == 52u << 26 /* stfs */
7538 || (insn & (0x3fu << 26)) == 54u << 26 /* stfd */
7539 || ((insn & (0x3fu << 26)) == 58u << 26 /* lwa,ld,lmd */
d3e454b9 7540 && (insn & 3) != 1)
2365f8d7 7541 || ((insn & (0x3fu << 26)) == 62u << 26 /* std, stmd */
d3e454b9
AM
7542 && ((insn & 3) == 0 || (insn & 3) == 3)))
7543 {
7544 /* Arrange to apply the reloc addend, if any. */
7545 relocation = 0;
7546 unresolved_reloc = FALSE;
7547 rel->r_info = ELF32_R_INFO (0, r_type);
7548 }
7549 else
2c4d9cbe 7550 _bfd_error_handler
695344c0 7551 /* xgettext:c-format */
2dcf00ce
AM
7552 (_("%pB(%pA+%#" PRIx64 "): error: "
7553 "%s with unexpected instruction %#x"),
7554 input_bfd, input_section, (uint64_t) rel->r_offset,
d3e454b9
AM
7555 "R_PPC_ADDR16_LO", insn);
7556 }
7557 }
7558
e054468f 7559 ifunc = NULL;
25f23106 7560 if (!htab->is_vxworks)
e054468f 7561 {
de972ffa
AM
7562 struct plt_entry *ent;
7563
e054468f
AM
7564 if (h != NULL)
7565 {
7566 if (h->type == STT_GNU_IFUNC)
7567 ifunc = &h->plt.plist;
7568 }
de972ffa
AM
7569 else if (local_got_offsets != NULL
7570 && ELF_ST_TYPE (sym->st_info) == STT_GNU_IFUNC)
e054468f 7571 {
de972ffa 7572 struct plt_entry **local_plt;
e054468f 7573
de972ffa
AM
7574 local_plt = (struct plt_entry **) (local_got_offsets
7575 + symtab_hdr->sh_info);
7576 ifunc = local_plt + r_symndx;
e054468f 7577 }
e054468f 7578
de972ffa
AM
7579 ent = NULL;
7580 if (ifunc != NULL
0e1862bb 7581 && (!bfd_link_pic (info)
08be3224
AM
7582 || is_branch_reloc (r_type)
7583 || r_type == R_PPC_PLT16_LO
7584 || r_type == R_PPC_PLT16_HI
7585 || r_type == R_PPC_PLT16_HA))
de972ffa
AM
7586 {
7587 addend = 0;
08be3224
AM
7588 if (bfd_link_pic (info)
7589 && (r_type == R_PPC_PLTREL24
7590 || r_type == R_PPC_PLT16_LO
7591 || r_type == R_PPC_PLT16_HI
7592 || r_type == R_PPC_PLT16_HA))
de972ffa
AM
7593 addend = rel->r_addend;
7594 ent = find_plt_ent (ifunc, got2, addend);
7595 }
7596 if (ent != NULL)
7597 {
888a7fc3
AM
7598 if (bfd_link_pic (info)
7599 && ent->sec != got2
7600 && htab->plt_type != PLT_NEW
7601 && (!htab->elf.dynamic_sections_created
7602 || h == NULL
7603 || h->dynindx == -1))
7604 {
7605 /* Uh oh, we are going to create a pic glink stub
7606 for an ifunc (here for h == NULL and later in
7607 finish_dynamic_symbol for h != NULL), and
7608 apparently are using code compiled with
7609 -mbss-plt. The difficulty is that -mbss-plt code
7610 gives no indication via a magic PLTREL24 addend
7611 whether r30 is equal to _GLOBAL_OFFSET_TABLE_ or
7612 is pointing into a .got2 section (and how far
7613 into .got2). */
7614 info->callbacks->einfo
695344c0 7615 /* xgettext:c-format */
174d0a74 7616 (_("%X%H: unsupported bss-plt -fPIC ifunc %s\n"),
888a7fc3
AM
7617 input_bfd, input_section, rel->r_offset, sym_name);
7618 }
e054468f
AM
7619
7620 unresolved_reloc = FALSE;
7621 if (htab->plt_type == PLT_NEW
7622 || !htab->elf.dynamic_sections_created
c7e17e05
AM
7623 || h == NULL
7624 || h->dynindx == -1)
e054468f
AM
7625 relocation = (htab->glink->output_section->vma
7626 + htab->glink->output_offset
7627 + (ent->glink_offset & ~1));
7628 else
ce558b89
AM
7629 relocation = (htab->elf.splt->output_section->vma
7630 + htab->elf.splt->output_offset
e054468f
AM
7631 + ent->plt.offset);
7632 }
7633 }
7634
7619e7c7 7635 addend = rel->r_addend;
23cedd1d 7636 save_unresolved_reloc = unresolved_reloc;
7619e7c7 7637 howto = NULL;
55fd94b0
AM
7638 if (r_type < R_PPC_max)
7639 howto = ppc_elf_howto_table[r_type];
9a23f96e
AM
7640
7641 switch (r_type)
7642 {
7643 default:
7644 break;
7645
7646 case R_PPC_TPREL16_HA:
7647 if (htab->do_tls_opt && relocation + addend + 0x8000 < 0x10000)
7648 {
7649 bfd_byte *p = contents + (rel->r_offset & ~3);
7650 unsigned int insn = bfd_get_32 (input_bfd, p);
2365f8d7 7651 if ((insn & ((0x3fu << 26) | 0x1f << 16))
9a23f96e
AM
7652 != ((15u << 26) | (2 << 16)) /* addis rt,2,imm */)
7653 /* xgettext:c-format */
7654 info->callbacks->minfo
7655 (_("%H: warning: %s unexpected insn %#x.\n"),
7656 input_bfd, input_section, rel->r_offset, howto->name, insn);
7657 else
7658 bfd_put_32 (input_bfd, NOP, p);
7659 }
7660 break;
7661
7662 case R_PPC_TPREL16_LO:
7663 if (htab->do_tls_opt && relocation + addend + 0x8000 < 0x10000)
7664 {
7665 bfd_byte *p = contents + (rel->r_offset & ~3);
7666 unsigned int insn = bfd_get_32 (input_bfd, p);
7667 insn &= ~(0x1f << 16);
7668 insn |= 2 << 16;
7669 bfd_put_32 (input_bfd, insn, p);
7670 }
7671 break;
7672 }
7673
7674 tls_type = 0;
7619e7c7 7675 switch (r_type)
252b5132
RH
7676 {
7677 default:
cf97bcb0
AM
7678 /* xgettext:c-format */
7679 _bfd_error_handler (_("%pB: %s unsupported"),
7680 input_bfd, howto->name);
252b5132
RH
7681
7682 bfd_set_error (bfd_error_bad_value);
b34976b6 7683 ret = FALSE;
c316a17c 7684 goto copy_reloc;
252b5132 7685
7619e7c7
AM
7686 case R_PPC_NONE:
7687 case R_PPC_TLS:
727fc41e
AM
7688 case R_PPC_TLSGD:
7689 case R_PPC_TLSLD:
7619e7c7
AM
7690 case R_PPC_EMB_MRKREF:
7691 case R_PPC_GNU_VTINHERIT:
7692 case R_PPC_GNU_VTENTRY:
c316a17c 7693 goto copy_reloc;
7595d193 7694
7619e7c7
AM
7695 /* GOT16 relocations. Like an ADDR16 using the symbol's
7696 address in the GOT as relocation value instead of the
7697 symbol's value itself. Also, create a GOT entry for the
7698 symbol and put the symbol value there. */
7699 case R_PPC_GOT_TLSGD16:
7700 case R_PPC_GOT_TLSGD16_LO:
7701 case R_PPC_GOT_TLSGD16_HI:
7702 case R_PPC_GOT_TLSGD16_HA:
7703 tls_type = TLS_TLS | TLS_GD;
7704 goto dogot;
7705
7706 case R_PPC_GOT_TLSLD16:
7707 case R_PPC_GOT_TLSLD16_LO:
7708 case R_PPC_GOT_TLSLD16_HI:
7709 case R_PPC_GOT_TLSLD16_HA:
7710 tls_type = TLS_TLS | TLS_LD;
7711 goto dogot;
7712
7713 case R_PPC_GOT_TPREL16:
7714 case R_PPC_GOT_TPREL16_LO:
7715 case R_PPC_GOT_TPREL16_HI:
7716 case R_PPC_GOT_TPREL16_HA:
7717 tls_type = TLS_TLS | TLS_TPREL;
7718 goto dogot;
7719
7720 case R_PPC_GOT_DTPREL16:
7721 case R_PPC_GOT_DTPREL16_LO:
7722 case R_PPC_GOT_DTPREL16_HI:
7723 case R_PPC_GOT_DTPREL16_HA:
7724 tls_type = TLS_TLS | TLS_DTPREL;
7725 goto dogot;
7726
7727 case R_PPC_GOT16:
7728 case R_PPC_GOT16_LO:
7729 case R_PPC_GOT16_HI:
7730 case R_PPC_GOT16_HA:
727fc41e 7731 tls_mask = 0;
7619e7c7
AM
7732 dogot:
7733 {
7734 /* Relocation is to the entry for this symbol in the global
7735 offset table. */
7736 bfd_vma off;
7737 bfd_vma *offp;
7738 unsigned long indx;
7739
ce558b89 7740 if (htab->elf.sgot == NULL)
7619e7c7
AM
7741 abort ();
7742
7743 indx = 0;
7744 if (tls_type == (TLS_TLS | TLS_LD)
f749f26e 7745 && SYMBOL_REFERENCES_LOCAL (info, h))
7619e7c7
AM
7746 offp = &htab->tlsld_got.offset;
7747 else if (h != NULL)
7748 {
f0158f44
AM
7749 if (!htab->elf.dynamic_sections_created
7750 || h->dynindx == -1
7751 || SYMBOL_REFERENCES_LOCAL (info, h)
21d68fcd 7752 || UNDEFWEAK_NO_DYNAMIC_RELOC (info, h))
7619e7c7
AM
7753 /* This is actually a static link, or it is a
7754 -Bsymbolic link and the symbol is defined
7755 locally, or the symbol was forced to be local
7756 because of a version file. */
7757 ;
7758 else
7759 {
7760 indx = h->dynindx;
7761 unresolved_reloc = FALSE;
7762 }
7763 offp = &h->got.offset;
7764 }
7765 else
7766 {
7767 if (local_got_offsets == NULL)
7768 abort ();
7769 offp = &local_got_offsets[r_symndx];
7770 }
7771
7772 /* The offset must always be a multiple of 4. We use the
7773 least significant bit to record whether we have already
7774 processed this entry. */
7775 off = *offp;
7776 if ((off & 1) != 0)
7777 off &= ~1;
7778 else
7779 {
37da22e5
AM
7780 unsigned int tls_m = ((tls_mask & TLS_TLS) != 0
7781 ? tls_mask & (TLS_LD | TLS_GD | TLS_DTPREL
b00a0a86 7782 | TLS_TPREL | TLS_GDIE)
37da22e5 7783 : 0);
70bccea4
AM
7784
7785 if (offp == &htab->tlsld_got.offset)
7786 tls_m = TLS_LD;
f749f26e
AM
7787 else if ((tls_m & TLS_LD) != 0
7788 && SYMBOL_REFERENCES_LOCAL (info, h))
70bccea4
AM
7789 tls_m &= ~TLS_LD;
7790
7791 /* We might have multiple got entries for this sym.
7792 Initialize them all. */
7793 do
7619e7c7 7794 {
70bccea4
AM
7795 int tls_ty = 0;
7796
7797 if ((tls_m & TLS_LD) != 0)
7619e7c7 7798 {
70bccea4
AM
7799 tls_ty = TLS_TLS | TLS_LD;
7800 tls_m &= ~TLS_LD;
7801 }
7802 else if ((tls_m & TLS_GD) != 0)
7803 {
7804 tls_ty = TLS_TLS | TLS_GD;
7805 tls_m &= ~TLS_GD;
7806 }
7807 else if ((tls_m & TLS_DTPREL) != 0)
7808 {
7809 tls_ty = TLS_TLS | TLS_DTPREL;
7810 tls_m &= ~TLS_DTPREL;
7811 }
b00a0a86 7812 else if ((tls_m & (TLS_TPREL | TLS_GDIE)) != 0)
70bccea4
AM
7813 {
7814 tls_ty = TLS_TLS | TLS_TPREL;
7815 tls_m = 0;
7619e7c7 7816 }
7619e7c7 7817
70bccea4 7818 /* Generate relocs for the dynamic linker. */
f0158f44
AM
7819 if (indx != 0
7820 || (bfd_link_pic (info)
7821 && (h == NULL
f749f26e
AM
7822 || !UNDEFWEAK_NO_DYNAMIC_RELOC (info, h))
7823 && !(tls_ty != 0
f15d0b54
AM
7824 && bfd_link_executable (info)
7825 && SYMBOL_REFERENCES_LOCAL (info, h))))
7619e7c7 7826 {
ce558b89 7827 asection *rsec = htab->elf.srelgot;
91d6fa6a 7828 bfd_byte * loc;
91e21fb7 7829
0bed072f 7830 if (ifunc != NULL)
82e66161
AM
7831 {
7832 rsec = htab->elf.irelplt;
7833 if (indx == 0)
7834 htab->local_ifunc_resolver = 1;
7835 else if (is_static_defined (h))
7836 htab->maybe_local_ifunc_resolver = 1;
7837 }
ce558b89
AM
7838 outrel.r_offset = (htab->elf.sgot->output_section->vma
7839 + htab->elf.sgot->output_offset
70bccea4 7840 + off);
e515b051 7841 outrel.r_addend = 0;
70bccea4
AM
7842 if (tls_ty & (TLS_LD | TLS_GD))
7843 {
7844 outrel.r_info = ELF32_R_INFO (indx, R_PPC_DTPMOD32);
70bccea4
AM
7845 if (tls_ty == (TLS_TLS | TLS_GD))
7846 {
25f23106
AM
7847 loc = rsec->contents;
7848 loc += (rsec->reloc_count++
70bccea4
AM
7849 * sizeof (Elf32_External_Rela));
7850 bfd_elf32_swap_reloca_out (output_bfd,
7851 &outrel, loc);
e515b051 7852 outrel.r_offset += 4;
70bccea4
AM
7853 outrel.r_info
7854 = ELF32_R_INFO (indx, R_PPC_DTPREL32);
70bccea4
AM
7855 }
7856 }
7857 else if (tls_ty == (TLS_TLS | TLS_DTPREL))
7858 outrel.r_info = ELF32_R_INFO (indx, R_PPC_DTPREL32);
7859 else if (tls_ty == (TLS_TLS | TLS_TPREL))
7860 outrel.r_info = ELF32_R_INFO (indx, R_PPC_TPREL32);
25f23106 7861 else if (indx != 0)
70bccea4 7862 outrel.r_info = ELF32_R_INFO (indx, R_PPC_GLOB_DAT);
25f23106
AM
7863 else if (ifunc != NULL)
7864 outrel.r_info = ELF32_R_INFO (0, R_PPC_IRELATIVE);
7865 else
7866 outrel.r_info = ELF32_R_INFO (0, R_PPC_RELATIVE);
d6e14abc 7867 if (indx == 0 && tls_ty != (TLS_TLS | TLS_LD))
e515b051
AM
7868 {
7869 outrel.r_addend += relocation;
7870 if (tls_ty & (TLS_GD | TLS_DTPREL | TLS_TPREL))
989f9879
AM
7871 {
7872 if (htab->elf.tls_sec == NULL)
7873 outrel.r_addend = 0;
7874 else
7875 outrel.r_addend -= htab->elf.tls_sec->vma;
7876 }
e515b051 7877 }
25f23106
AM
7878 loc = rsec->contents;
7879 loc += (rsec->reloc_count++
70bccea4
AM
7880 * sizeof (Elf32_External_Rela));
7881 bfd_elf32_swap_reloca_out (output_bfd, &outrel, loc);
7619e7c7
AM
7882 }
7883
70bccea4
AM
7884 /* Init the .got section contents if we're not
7885 emitting a reloc. */
7886 else
7619e7c7 7887 {
70bccea4
AM
7888 bfd_vma value = relocation;
7889
f0158f44 7890 if (tls_ty != 0)
70bccea4 7891 {
989f9879
AM
7892 if (htab->elf.tls_sec == NULL)
7893 value = 0;
7894 else
7895 {
f0158f44
AM
7896 if (tls_ty & TLS_LD)
7897 value = 0;
7898 else
7899 value -= htab->elf.tls_sec->vma + DTP_OFFSET;
676ee2b5 7900 if (tls_ty & TLS_TPREL)
989f9879
AM
7901 value += DTP_OFFSET - TP_OFFSET;
7902 }
70bccea4 7903
f0158f44 7904 if (tls_ty & (TLS_LD | TLS_GD))
7b609f53 7905 {
95f0d0d2 7906 bfd_put_32 (input_bfd, value,
ce558b89 7907 htab->elf.sgot->contents + off + 4);
676ee2b5 7908 value = 1;
7b609f53 7909 }
70bccea4 7910 }
95f0d0d2 7911 bfd_put_32 (input_bfd, value,
ce558b89 7912 htab->elf.sgot->contents + off);
7619e7c7 7913 }
70bccea4
AM
7914
7915 off += 4;
7916 if (tls_ty & (TLS_LD | TLS_GD))
7917 off += 4;
7619e7c7 7918 }
70bccea4
AM
7919 while (tls_m != 0);
7920
7921 off = *offp;
7922 *offp = off | 1;
7619e7c7
AM
7923 }
7924
7925 if (off >= (bfd_vma) -2)
7926 abort ();
7927
70bccea4
AM
7928 if ((tls_type & TLS_TLS) != 0)
7929 {
7930 if (tls_type != (TLS_TLS | TLS_LD))
7931 {
7932 if ((tls_mask & TLS_LD) != 0
f749f26e 7933 && !SYMBOL_REFERENCES_LOCAL (info, h))
70bccea4
AM
7934 off += 8;
7935 if (tls_type != (TLS_TLS | TLS_GD))
7936 {
7937 if ((tls_mask & TLS_GD) != 0)
7938 off += 8;
7939 if (tls_type != (TLS_TLS | TLS_DTPREL))
7940 {
7941 if ((tls_mask & TLS_DTPREL) != 0)
7942 off += 4;
7943 }
7944 }
7945 }
7946 }
7947
d3e454b9
AM
7948 /* If here for a picfixup, we're done. */
7949 if (r_type != ELF32_R_TYPE (rel->r_info))
c316a17c 7950 goto copy_reloc;
d3e454b9 7951
ce558b89
AM
7952 relocation = (htab->elf.sgot->output_section->vma
7953 + htab->elf.sgot->output_offset
e87d4038
AM
7954 + off
7955 - SYM_VAL (htab->elf.hgot));
7619e7c7
AM
7956
7957 /* Addends on got relocations don't make much sense.
7958 x+off@got is actually x@got+off, and since the got is
7959 generated by a hash table traversal, the value in the
7960 got at entry m+n bears little relation to the entry m. */
7961 if (addend != 0)
25f53a85 7962 info->callbacks->einfo
695344c0 7963 /* xgettext:c-format */
174d0a74 7964 (_("%H: non-zero addend on %s reloc against `%s'\n"),
25f53a85 7965 input_bfd, input_section, rel->r_offset,
7b609f53 7966 howto->name,
7619e7c7
AM
7967 sym_name);
7968 }
86c95733 7969 break;
7619e7c7 7970
86c95733 7971 /* Relocations that need no special processing. */
7619e7c7 7972 case R_PPC_LOCAL24PC:
252b5132
RH
7973 /* It makes no sense to point a local relocation
7974 at a symbol not in this object. */
7b609f53 7975 if (unresolved_reloc)
252b5132 7976 {
1a72702b
AM
7977 (*info->callbacks->undefined_symbol) (info,
7978 h->root.root.string,
7979 input_bfd,
7980 input_section,
7981 rel->r_offset,
7982 TRUE);
c316a17c 7983 goto copy_reloc;
252b5132 7984 }
888a7fc3
AM
7985 if (h != NULL && h->type == STT_GNU_IFUNC && bfd_link_pic (info))
7986 {
7987 /* @local on an ifunc does not really make sense since
7988 the ifunc resolver can take you anywhere. More
7989 seriously, calls to ifuncs must go through a plt call
7990 stub, and for pic the plt call stubs uses r30 to
7991 access the PLT. The problem is that a call that is
7992 local won't have the +32k reloc addend trick marking
7993 -fPIC code, so the linker won't know whether r30 is
7994 _GLOBAL_OFFSET_TABLE_ or pointing into a .got2 section. */
695344c0 7995 /* xgettext:c-format */
174d0a74 7996 info->callbacks->einfo (_("%X%H: @local call to ifunc %s\n"),
888a7fc3
AM
7997 input_bfd, input_section, rel->r_offset,
7998 h->root.root.string);
7999 }
252b5132
RH
8000 break;
8001
7619e7c7
AM
8002 case R_PPC_DTPREL16:
8003 case R_PPC_DTPREL16_LO:
8004 case R_PPC_DTPREL16_HI:
8005 case R_PPC_DTPREL16_HA:
989f9879
AM
8006 if (htab->elf.tls_sec != NULL)
8007 addend -= htab->elf.tls_sec->vma + DTP_OFFSET;
7619e7c7
AM
8008 break;
8009
70bccea4
AM
8010 /* Relocations that may need to be propagated if this is a shared
8011 object. */
7619e7c7
AM
8012 case R_PPC_TPREL16:
8013 case R_PPC_TPREL16_LO:
8014 case R_PPC_TPREL16_HI:
8015 case R_PPC_TPREL16_HA:
766bc656
AM
8016 if (h != NULL
8017 && h->root.type == bfd_link_hash_undefweak
8018 && h->dynindx == -1)
8019 {
8020 /* Make this relocation against an undefined weak symbol
8021 resolve to zero. This is really just a tweak, since
8022 code using weak externs ought to check that they are
8023 defined before using them. */
8024 bfd_byte *p = contents + rel->r_offset - d_offset;
95f0d0d2 8025 unsigned int insn = bfd_get_32 (input_bfd, p);
766bc656
AM
8026 insn = _bfd_elf_ppc_at_tprel_transform (insn, 2);
8027 if (insn != 0)
95f0d0d2 8028 bfd_put_32 (input_bfd, insn, p);
766bc656
AM
8029 break;
8030 }
989f9879
AM
8031 if (htab->elf.tls_sec != NULL)
8032 addend -= htab->elf.tls_sec->vma + TP_OFFSET;
7619e7c7 8033 /* The TPREL16 relocs shouldn't really be used in shared
7c8bbca5
AM
8034 libs or with non-local symbols as that will result in
8035 DT_TEXTREL being set, but support them anyway. */
7619e7c7
AM
8036 goto dodyn;
8037
8038 case R_PPC_TPREL32:
989f9879
AM
8039 if (htab->elf.tls_sec != NULL)
8040 addend -= htab->elf.tls_sec->vma + TP_OFFSET;
7619e7c7
AM
8041 goto dodyn;
8042
8043 case R_PPC_DTPREL32:
989f9879
AM
8044 if (htab->elf.tls_sec != NULL)
8045 addend -= htab->elf.tls_sec->vma + DTP_OFFSET;
7619e7c7
AM
8046 goto dodyn;
8047
e515b051
AM
8048 case R_PPC_DTPMOD32:
8049 relocation = 1;
8050 addend = 0;
8051 goto dodyn;
8052
d7128ce4
AM
8053 case R_PPC_REL16:
8054 case R_PPC_REL16_LO:
8055 case R_PPC_REL16_HI:
8056 case R_PPC_REL16_HA:
a680de9a 8057 case R_PPC_REL16DX_HA:
d7128ce4
AM
8058 break;
8059
7619e7c7 8060 case R_PPC_REL32:
625af618
AM
8061 if (h == NULL || h == htab->elf.hgot)
8062 break;
8063 /* fall through */
8064
8065 case R_PPC_ADDR32:
8066 case R_PPC_ADDR16:
8067 case R_PPC_ADDR16_LO:
8068 case R_PPC_ADDR16_HI:
8069 case R_PPC_ADDR16_HA:
8070 case R_PPC_UADDR32:
8071 case R_PPC_UADDR16:
8072 goto dodyn;
8073
b9c361e0
JL
8074 case R_PPC_VLE_REL8:
8075 case R_PPC_VLE_REL15:
8076 case R_PPC_VLE_REL24:
625af618 8077 case R_PPC_REL24:
7619e7c7
AM
8078 case R_PPC_REL14:
8079 case R_PPC_REL14_BRTAKEN:
8080 case R_PPC_REL14_BRNTAKEN:
252b5132
RH
8081 /* If these relocations are not to a named symbol, they can be
8082 handled right here, no need to bother the dynamic linker. */
89200bf8 8083 if (SYMBOL_CALLS_LOCAL (info, h)
3b36f7e6 8084 || h == htab->elf.hgot)
252b5132 8085 break;
70bccea4 8086 /* fall through */
252b5132 8087
7619e7c7 8088 case R_PPC_ADDR24:
7619e7c7
AM
8089 case R_PPC_ADDR14:
8090 case R_PPC_ADDR14_BRTAKEN:
8091 case R_PPC_ADDR14_BRNTAKEN:
0e1862bb 8092 if (h != NULL && !bfd_link_pic (info))
625af618
AM
8093 break;
8094 /* fall through */
8095
7619e7c7 8096 dodyn:
3348747a
NS
8097 if ((input_section->flags & SEC_ALLOC) == 0
8098 || is_vxworks_tls)
c87b5a93 8099 break;
c87b5a93 8100
287c7eaf
AM
8101 if (bfd_link_pic (info)
8102 ? ((h == NULL
8103 || ppc_elf_hash_entry (h)->dyn_relocs != NULL)
8104 && ((h != NULL && pc_dynrelocs (h))
8105 || must_be_dyn_reloc (info, r_type)))
8106 : (h != NULL
8107 && ppc_elf_hash_entry (h)->dyn_relocs != NULL))
252b5132 8108 {
0bb2d96a 8109 int skip;
f95f8542
AM
8110 bfd_byte *loc;
8111 asection *sreloc;
82e66161
AM
8112 long indx = 0;
8113
252b5132 8114#ifdef DEBUG
55fd94b0
AM
8115 fprintf (stderr, "ppc_elf_relocate_section needs to "
8116 "create relocation for %s\n",
70bccea4
AM
8117 (h && h->root.root.string
8118 ? h->root.root.string : "<unknown>"));
252b5132
RH
8119#endif
8120
8121 /* When generating a shared object, these relocations
70bccea4
AM
8122 are copied into the output file to be resolved at run
8123 time. */
0bb2d96a 8124 skip = 0;
5b914448
AM
8125 outrel.r_offset = _bfd_elf_section_offset (output_bfd, info,
8126 input_section,
8127 rel->r_offset);
0bb2d96a
JJ
8128 if (outrel.r_offset == (bfd_vma) -1
8129 || outrel.r_offset == (bfd_vma) -2)
8130 skip = (int) outrel.r_offset;
252b5132
RH
8131 outrel.r_offset += (input_section->output_section->vma
8132 + input_section->output_offset);
8133
63f6e94f
AM
8134 /* Optimize unaligned reloc use. */
8135 if ((r_type == R_PPC_ADDR32 && (outrel.r_offset & 3) != 0)
8136 || (r_type == R_PPC_UADDR32 && (outrel.r_offset & 3) == 0))
8137 r_type ^= R_PPC_ADDR32 ^ R_PPC_UADDR32;
8138 if ((r_type == R_PPC_ADDR16 && (outrel.r_offset & 1) != 0)
8139 || (r_type == R_PPC_UADDR16 && (outrel.r_offset & 1) == 0))
8140 r_type ^= R_PPC_ADDR16 ^ R_PPC_UADDR16;
8141
252b5132
RH
8142 if (skip)
8143 memset (&outrel, 0, sizeof outrel);
21d68fcd 8144 else if (!SYMBOL_REFERENCES_LOCAL (info, h))
252b5132 8145 {
82e66161
AM
8146 indx = h->dynindx;
8147 BFD_ASSERT (indx != -1);
7619e7c7 8148 unresolved_reloc = FALSE;
82e66161 8149 outrel.r_info = ELF32_R_INFO (indx, r_type);
252b5132
RH
8150 outrel.r_addend = rel->r_addend;
8151 }
8152 else
8153 {
47388f4c
AM
8154 outrel.r_addend = relocation + rel->r_addend;
8155
25f23106 8156 if (r_type != R_PPC_ADDR32)
252b5132 8157 {
25f23106
AM
8158 if (ifunc != NULL)
8159 {
8160 /* If we get here when building a static
8161 executable, then the libc startup function
8162 responsible for applying indirect function
8163 relocations is going to complain about
8164 the reloc type.
8165 If we get here when building a dynamic
8166 executable, it will be because we have
8167 a text relocation. The dynamic loader
8168 will set the text segment writable and
8169 non-executable to apply text relocations.
8170 So we'll segfault when trying to run the
8171 indirection function to resolve the reloc. */
25f53a85 8172 info->callbacks->einfo
695344c0 8173 /* xgettext:c-format */
174d0a74 8174 (_("%H: relocation %s for indirect "
25f53a85
AM
8175 "function %s unsupported\n"),
8176 input_bfd, input_section, rel->r_offset,
25f23106
AM
8177 howto->name,
8178 sym_name);
8179 ret = FALSE;
8180 }
cf35638d 8181 else if (r_symndx == STN_UNDEF || bfd_is_abs_section (sec))
89200bf8 8182 ;
252b5132
RH
8183 else if (sec == NULL || sec->owner == NULL)
8184 {
8185 bfd_set_error (bfd_error_bad_value);
89200bf8 8186 ret = FALSE;
252b5132
RH
8187 }
8188 else
8189 {
8190 asection *osec;
8191
47388f4c
AM
8192 /* We are turning this relocation into one
8193 against a section symbol. It would be
8194 proper to subtract the symbol's value,
8195 osec->vma, from the emitted reloc addend,
25f23106
AM
8196 but ld.so expects buggy relocs.
8197 FIXME: Why not always use a zero index? */
252b5132 8198 osec = sec->output_section;
f26a3287
AM
8199 if ((osec->flags & SEC_THREAD_LOCAL) != 0)
8200 {
8201 osec = htab->elf.tls_sec;
8202 indx = 0;
8203 }
8204 else
74541ad4 8205 {
74541ad4 8206 indx = elf_section_data (osec)->dynindx;
f26a3287
AM
8207 if (indx == 0)
8208 {
8209 osec = htab->elf.text_index_section;
8210 indx = elf_section_data (osec)->dynindx;
8211 }
8212 BFD_ASSERT (indx != 0);
74541ad4 8213 }
f26a3287
AM
8214
8215 /* ld.so doesn't expect buggy TLS relocs.
8216 Don't leave the symbol value in the
8217 addend for them. */
8218 if (IS_PPC_TLS_RELOC (r_type))
8219 outrel.r_addend -= osec->vma;
252b5132
RH
8220 }
8221
8222 outrel.r_info = ELF32_R_INFO (indx, r_type);
252b5132 8223 }
25f23106
AM
8224 else if (ifunc != NULL)
8225 outrel.r_info = ELF32_R_INFO (0, R_PPC_IRELATIVE);
8226 else
8227 outrel.r_info = ELF32_R_INFO (0, R_PPC_RELATIVE);
252b5132
RH
8228 }
8229
82e66161
AM
8230 sreloc = elf_section_data (input_section)->sreloc;
8231 if (ifunc)
8232 {
8233 sreloc = htab->elf.irelplt;
8234 if (indx == 0)
8235 htab->local_ifunc_resolver = 1;
8236 else if (is_static_defined (h))
8237 htab->maybe_local_ifunc_resolver = 1;
8238 }
8239 if (sreloc == NULL)
8240 return FALSE;
8241
947216bf
AM
8242 loc = sreloc->contents;
8243 loc += sreloc->reloc_count++ * sizeof (Elf32_External_Rela);
8244 bfd_elf32_swap_reloca_out (output_bfd, &outrel, loc);
252b5132 8245
2243deae 8246 if (skip == -1)
c316a17c 8247 goto copy_reloc;
2243deae 8248
f0158f44
AM
8249 /* This reloc will be computed at runtime. Clear the memory
8250 so that it contains a predictable value for prelink. */
8251 if (!skip)
2243deae
L
8252 {
8253 relocation = howto->pc_relative ? outrel.r_offset : 0;
8254 addend = 0;
8255 break;
8256 }
252b5132 8257 }
252b5132
RH
8258 break;
8259
32af9f6e
AM
8260 case R_PPC_RELAX_PLT:
8261 case R_PPC_RELAX_PLTREL24:
de972ffa
AM
8262 if (h != NULL)
8263 {
32af9f6e
AM
8264 struct plt_entry *ent;
8265 bfd_vma got2_addend = 0;
8266
8267 if (r_type == R_PPC_RELAX_PLTREL24)
8268 {
0e1862bb 8269 if (bfd_link_pic (info))
32af9f6e
AM
8270 got2_addend = addend;
8271 addend = 0;
8272 }
8273 ent = find_plt_ent (&h->plt.plist, got2, got2_addend);
de972ffa
AM
8274 if (htab->plt_type == PLT_NEW)
8275 relocation = (htab->glink->output_section->vma
8276 + htab->glink->output_offset
8277 + ent->glink_offset);
8278 else
ce558b89
AM
8279 relocation = (htab->elf.splt->output_section->vma
8280 + htab->elf.splt->output_offset
de972ffa
AM
8281 + ent->plt.offset);
8282 }
1a0670f3 8283 /* Fall through. */
b4a38de6 8284
32af9f6e 8285 case R_PPC_RELAX:
9abc968f 8286 {
53291d1f
AM
8287 const int *stub;
8288 size_t size;
8289 size_t insn_offset = rel->r_offset;
8290 unsigned int insn;
9abc968f 8291
0e1862bb 8292 if (bfd_link_pic (info))
53291d1f
AM
8293 {
8294 relocation -= (input_section->output_section->vma
8295 + input_section->output_offset
8296 + rel->r_offset - 4);
8297 stub = shared_stub_entry;
95f0d0d2
AM
8298 bfd_put_32 (input_bfd, stub[0], contents + insn_offset - 12);
8299 bfd_put_32 (input_bfd, stub[1], contents + insn_offset - 8);
8300 bfd_put_32 (input_bfd, stub[2], contents + insn_offset - 4);
53291d1f
AM
8301 stub += 3;
8302 size = ARRAY_SIZE (shared_stub_entry) - 3;
8303 }
8304 else
8305 {
8306 stub = stub_entry;
8307 size = ARRAY_SIZE (stub_entry);
8308 }
9abc968f 8309
9abc968f 8310 relocation += addend;
0e1862bb 8311 if (bfd_link_relocatable (info))
53291d1f
AM
8312 relocation = 0;
8313
8314 /* First insn is HA, second is LO. */
8315 insn = *stub++;
8316 insn |= ((relocation + 0x8000) >> 16) & 0xffff;
95f0d0d2 8317 bfd_put_32 (input_bfd, insn, contents + insn_offset);
53291d1f
AM
8318 insn_offset += 4;
8319
8320 insn = *stub++;
8321 insn |= relocation & 0xffff;
95f0d0d2 8322 bfd_put_32 (input_bfd, insn, contents + insn_offset);
53291d1f
AM
8323 insn_offset += 4;
8324 size -= 2;
8325
8326 while (size != 0)
8327 {
8328 insn = *stub++;
8329 --size;
95f0d0d2 8330 bfd_put_32 (input_bfd, insn, contents + insn_offset);
53291d1f
AM
8331 insn_offset += 4;
8332 }
9bc4e62b
NS
8333
8334 /* Rewrite the reloc and convert one of the trailing nop
8335 relocs to describe this relocation. */
8336 BFD_ASSERT (ELF32_R_TYPE (relend[-1].r_info) == R_PPC_NONE);
8337 /* The relocs are at the bottom 2 bytes */
c316a17c
AM
8338 wrel->r_offset = rel->r_offset + d_offset;
8339 wrel->r_info = ELF32_R_INFO (r_symndx, R_PPC_ADDR16_HA);
8340 wrel->r_addend = rel->r_addend;
8341 memmove (wrel + 1, wrel, (relend - wrel - 1) * sizeof (*wrel));
8342 wrel++, rel++;
8343 wrel->r_offset += 4;
8344 wrel->r_info = ELF32_R_INFO (r_symndx, R_PPC_ADDR16_LO);
9abc968f 8345 }
8517fae7 8346 continue;
deaaf2f3 8347
70bccea4 8348 /* Indirect .sdata relocation. */
7619e7c7 8349 case R_PPC_EMB_SDAI16:
c9a2f333 8350 BFD_ASSERT (htab->sdata[0].section != NULL);
bd6c6e2b
AM
8351 if (!is_static_defined (htab->sdata[0].sym))
8352 {
8353 unresolved_reloc = TRUE;
8354 break;
8355 }
7619e7c7 8356 relocation
76750a2f
AM
8357 = elf_finish_pointer_linker_section (input_bfd, &htab->sdata[0],
8358 h, relocation, rel);
bd6c6e2b 8359 addend = 0;
252b5132
RH
8360 break;
8361
70bccea4 8362 /* Indirect .sdata2 relocation. */
7619e7c7 8363 case R_PPC_EMB_SDA2I16:
c9a2f333 8364 BFD_ASSERT (htab->sdata[1].section != NULL);
bd6c6e2b
AM
8365 if (!is_static_defined (htab->sdata[1].sym))
8366 {
8367 unresolved_reloc = TRUE;
8368 break;
8369 }
7619e7c7 8370 relocation
76750a2f
AM
8371 = elf_finish_pointer_linker_section (input_bfd, &htab->sdata[1],
8372 h, relocation, rel);
bd6c6e2b 8373 addend = 0;
252b5132
RH
8374 break;
8375
70bccea4
AM
8376 /* Handle the TOC16 reloc. We want to use the offset within the .got
8377 section, not the actual VMA. This is appropriate when generating
8378 an embedded ELF object, for which the .got section acts like the
8379 AIX .toc section. */
7619e7c7 8380 case R_PPC_TOC16: /* phony GOT16 relocations */
3b4f3a11
AM
8381 if (sec == NULL || sec->output_section == NULL)
8382 {
8383 unresolved_reloc = TRUE;
8384 break;
8385 }
fd361982
AM
8386 BFD_ASSERT (strcmp (bfd_section_name (sec), ".got") == 0
8387 || strcmp (bfd_section_name (sec), ".cgot") == 0);
252b5132 8388
3b4f3a11 8389 addend -= sec->output_section->vma + sec->output_offset + 0x8000;
252b5132
RH
8390 break;
8391
7619e7c7 8392 case R_PPC_PLTREL24:
f75e0e33
AM
8393 if (h != NULL && ifunc == NULL)
8394 {
cbf95972
AM
8395 struct plt_entry *ent;
8396
8397 ent = find_plt_ent (&h->plt.plist, got2,
8398 bfd_link_pic (info) ? addend : 0);
f75e0e33 8399 if (ent == NULL
ce558b89 8400 || htab->elf.splt == NULL)
f75e0e33
AM
8401 {
8402 /* We didn't make a PLT entry for this symbol. This
8403 happens when statically linking PIC code, or when
8404 using -Bsymbolic. */
8405 }
8406 else
8407 {
8408 /* Relocation is to the entry for this symbol in the
8409 procedure linkage table. */
8410 unresolved_reloc = FALSE;
8411 if (htab->plt_type == PLT_NEW)
8412 relocation = (htab->glink->output_section->vma
8413 + htab->glink->output_offset
8414 + ent->glink_offset);
8415 else
ce558b89
AM
8416 relocation = (htab->elf.splt->output_section->vma
8417 + htab->elf.splt->output_offset
f75e0e33
AM
8418 + ent->plt.offset);
8419 }
8420 }
252b5132 8421
f75e0e33
AM
8422 /* R_PPC_PLTREL24 is rather special. If non-zero, the
8423 addend specifies the GOT pointer offset within .got2.
8424 Don't apply it to the relocation field. */
8425 addend = 0;
8da6118f 8426 break;
252b5132 8427
23cedd1d
AM
8428 case R_PPC_PLTSEQ:
8429 case R_PPC_PLTCALL:
08be3224
AM
8430 case R_PPC_PLT16_LO:
8431 case R_PPC_PLT16_HI:
8432 case R_PPC_PLT16_HA:
2d7ad24e 8433 plt_list = NULL;
08be3224
AM
8434 if (h != NULL)
8435 plt_list = &h->plt.plist;
2d7ad24e
AM
8436 else if (ifunc != NULL)
8437 plt_list = ifunc;
8438 else if (local_got_offsets != NULL)
8439 {
8440 struct plt_entry **local_plt;
8441 local_plt = (struct plt_entry **) (local_got_offsets
8442 + symtab_hdr->sh_info);
8443 plt_list = local_plt + r_symndx;
8444 }
08be3224
AM
8445 unresolved_reloc = TRUE;
8446 if (plt_list != NULL)
8447 {
8448 struct plt_entry *ent;
8449
8450 ent = find_plt_ent (plt_list, got2,
8451 bfd_link_pic (info) ? addend : 0);
2d7ad24e 8452 if (ent != NULL && ent->plt.offset != (bfd_vma) -1)
08be3224 8453 {
2d7ad24e
AM
8454 asection *plt;
8455
08be3224 8456 unresolved_reloc = FALSE;
2d7ad24e
AM
8457 plt = htab->elf.splt;
8458 if (!htab->elf.dynamic_sections_created
8459 || h == NULL
8460 || h->dynindx == -1)
8461 {
8462 if (ifunc != NULL)
8463 plt = htab->elf.iplt;
8464 else
8465 plt = htab->pltlocal;
8466 }
8467 relocation = (plt->output_section->vma
8468 + plt->output_offset
08be3224
AM
8469 + ent->plt.offset);
8470 if (bfd_link_pic (info))
8471 {
8472 bfd_vma got = 0;
8473
8474 if (ent->addend >= 32768)
8475 got = (ent->addend
8476 + ent->sec->output_section->vma
8477 + ent->sec->output_offset);
8478 else
8479 got = SYM_VAL (htab->elf.hgot);
8480 relocation -= got;
8481 }
8482 }
8483 }
8484 addend = 0;
8485 break;
8486
70bccea4 8487 /* Relocate against _SDA_BASE_. */
7619e7c7 8488 case R_PPC_SDAREL16:
252b5132
RH
8489 {
8490 const char *name;
bd6c6e2b 8491 struct elf_link_hash_entry *sda = htab->sdata[0].sym;
252b5132 8492
bd6c6e2b
AM
8493 if (sec == NULL
8494 || sec->output_section == NULL
8495 || !is_static_defined (sda))
3b4f3a11
AM
8496 {
8497 unresolved_reloc = TRUE;
8498 break;
8499 }
bd6c6e2b 8500 addend -= SYM_VAL (sda);
3b4f3a11 8501
fd361982 8502 name = bfd_section_name (sec->output_section);
93d1b056
AM
8503 if (!(strcmp (name, ".sdata") == 0
8504 || strcmp (name, ".sbss") == 0))
252b5132 8505 {
cf97bcb0 8506 _bfd_error_handler
695344c0 8507 /* xgettext:c-format */
cf97bcb0
AM
8508 (_("%pB: the target (%s) of a %s relocation is "
8509 "in the wrong output section (%s)"),
d003868e 8510 input_bfd,
55fd94b0
AM
8511 sym_name,
8512 howto->name,
8513 name);
252b5132 8514 }
252b5132
RH
8515 }
8516 break;
8517
70bccea4 8518 /* Relocate against _SDA2_BASE_. */
7619e7c7 8519 case R_PPC_EMB_SDA2REL:
252b5132
RH
8520 {
8521 const char *name;
bd6c6e2b 8522 struct elf_link_hash_entry *sda = htab->sdata[1].sym;
252b5132 8523
bd6c6e2b
AM
8524 if (sec == NULL
8525 || sec->output_section == NULL
8526 || !is_static_defined (sda))
3b4f3a11
AM
8527 {
8528 unresolved_reloc = TRUE;
8529 break;
8530 }
bd6c6e2b 8531 addend -= SYM_VAL (sda);
3b4f3a11 8532
fd361982 8533 name = bfd_section_name (sec->output_section);
93d1b056
AM
8534 if (!(strcmp (name, ".sdata2") == 0
8535 || strcmp (name, ".sbss2") == 0))
252b5132 8536 {
cf97bcb0 8537 _bfd_error_handler
695344c0 8538 /* xgettext:c-format */
cf97bcb0
AM
8539 (_("%pB: the target (%s) of a %s relocation is "
8540 "in the wrong output section (%s)"),
d003868e 8541 input_bfd,
55fd94b0
AM
8542 sym_name,
8543 howto->name,
8544 name);
252b5132 8545 }
252b5132
RH
8546 }
8547 break;
8548
b9c361e0 8549 case R_PPC_VLE_LO16A:
86c95733 8550 relocation = relocation + addend;
08dc996f
AM
8551 ppc_elf_vle_split16 (input_bfd, input_section, rel->r_offset,
8552 contents + rel->r_offset, relocation,
8553 split16a_type, htab->params->vle_reloc_fixup);
c316a17c 8554 goto copy_reloc;
b9c361e0
JL
8555
8556 case R_PPC_VLE_LO16D:
86c95733 8557 relocation = relocation + addend;
08dc996f
AM
8558 ppc_elf_vle_split16 (input_bfd, input_section, rel->r_offset,
8559 contents + rel->r_offset, relocation,
8560 split16d_type, htab->params->vle_reloc_fixup);
c316a17c 8561 goto copy_reloc;
b9c361e0
JL
8562
8563 case R_PPC_VLE_HI16A:
86c95733 8564 relocation = (relocation + addend) >> 16;
08dc996f
AM
8565 ppc_elf_vle_split16 (input_bfd, input_section, rel->r_offset,
8566 contents + rel->r_offset, relocation,
8567 split16a_type, htab->params->vle_reloc_fixup);
c316a17c 8568 goto copy_reloc;
b9c361e0
JL
8569
8570 case R_PPC_VLE_HI16D:
86c95733 8571 relocation = (relocation + addend) >> 16;
08dc996f
AM
8572 ppc_elf_vle_split16 (input_bfd, input_section, rel->r_offset,
8573 contents + rel->r_offset, relocation,
8574 split16d_type, htab->params->vle_reloc_fixup);
c316a17c 8575 goto copy_reloc;
b9c361e0
JL
8576
8577 case R_PPC_VLE_HA16A:
86c95733 8578 relocation = (relocation + addend + 0x8000) >> 16;
08dc996f
AM
8579 ppc_elf_vle_split16 (input_bfd, input_section, rel->r_offset,
8580 contents + rel->r_offset, relocation,
8581 split16a_type, htab->params->vle_reloc_fixup);
c316a17c 8582 goto copy_reloc;
b9c361e0
JL
8583
8584 case R_PPC_VLE_HA16D:
86c95733 8585 relocation = (relocation + addend + 0x8000) >> 16;
08dc996f
AM
8586 ppc_elf_vle_split16 (input_bfd, input_section, rel->r_offset,
8587 contents + rel->r_offset, relocation,
8588 split16d_type, htab->params->vle_reloc_fixup);
c316a17c 8589 goto copy_reloc;
b9c361e0 8590
70bccea4 8591 /* Relocate against either _SDA_BASE_, _SDA2_BASE_, or 0. */
7619e7c7 8592 case R_PPC_EMB_SDA21:
b9c361e0 8593 case R_PPC_VLE_SDA21:
7619e7c7 8594 case R_PPC_EMB_RELSDA:
b9c361e0 8595 case R_PPC_VLE_SDA21_LO:
252b5132
RH
8596 {
8597 const char *name;
8598 int reg;
86c95733 8599 unsigned int insn;
bd6c6e2b 8600 struct elf_link_hash_entry *sda = NULL;
252b5132 8601
3b4f3a11
AM
8602 if (sec == NULL || sec->output_section == NULL)
8603 {
8604 unresolved_reloc = TRUE;
8605 break;
8606 }
8607
fd361982 8608 name = bfd_section_name (sec->output_section);
93d1b056
AM
8609 if (strcmp (name, ".sdata") == 0
8610 || strcmp (name, ".sbss") == 0)
252b5132
RH
8611 {
8612 reg = 13;
bd6c6e2b 8613 sda = htab->sdata[0].sym;
252b5132 8614 }
93d1b056
AM
8615 else if (strcmp (name, ".sdata2") == 0
8616 || strcmp (name, ".sbss2") == 0)
252b5132
RH
8617 {
8618 reg = 2;
bd6c6e2b 8619 sda = htab->sdata[1].sym;
252b5132 8620 }
8da6118f
KH
8621 else if (strcmp (name, ".PPC.EMB.sdata0") == 0
8622 || strcmp (name, ".PPC.EMB.sbss0") == 0)
252b5132
RH
8623 {
8624 reg = 0;
8625 }
252b5132
RH
8626 else
8627 {
cf97bcb0 8628 _bfd_error_handler
695344c0 8629 /* xgettext:c-format */
cf97bcb0
AM
8630 (_("%pB: the target (%s) of a %s relocation is "
8631 "in the wrong output section (%s)"),
d003868e 8632 input_bfd,
55fd94b0
AM
8633 sym_name,
8634 howto->name,
8635 name);
252b5132
RH
8636
8637 bfd_set_error (bfd_error_bad_value);
b34976b6 8638 ret = FALSE;
c316a17c 8639 goto copy_reloc;
252b5132
RH
8640 }
8641
bd6c6e2b
AM
8642 if (sda != NULL)
8643 {
8644 if (!is_static_defined (sda))
8645 {
8646 unresolved_reloc = TRUE;
8647 break;
8648 }
8649 addend -= SYM_VAL (sda);
8650 }
8651
6f5601c4
AM
8652 if (r_type == R_PPC_EMB_RELSDA)
8653 break;
8654
8655 /* The PowerPC Embedded Application Binary Interface
8656 version 1.0 insanely chose to specify R_PPC_EMB_SDA21
8657 operating on a 24-bit field at r_offset. GNU as and
8658 GNU ld have always assumed R_PPC_EMB_SDA21 operates on
8659 a 32-bit bit insn at r_offset. Cope with object file
8660 producers that possibly comply with the EABI in
8661 generating an odd r_offset for big-endian objects. */
8662 if (r_type == R_PPC_EMB_SDA21)
8663 rel->r_offset &= ~1;
8664
95f0d0d2 8665 insn = bfd_get_32 (input_bfd, contents + rel->r_offset);
b9c361e0
JL
8666 if (reg == 0
8667 && (r_type == R_PPC_VLE_SDA21
8668 || r_type == R_PPC_VLE_SDA21_LO))
8669 {
86c95733
AM
8670 relocation = relocation + addend;
8671 addend = 0;
8672
8673 /* Force e_li insn, keeping RT from original insn. */
8674 insn &= 0x1f << 21;
8675 insn |= 28u << 26;
8676
8677 /* We have an li20 field, bits 17..20, 11..15, 21..31. */
8678 /* Top 4 bits of value to 17..20. */
8679 insn |= (relocation & 0xf0000) >> 5;
8680 /* Next 5 bits of the value to 11..15. */
8681 insn |= (relocation & 0xf800) << 5;
8682 /* And the final 11 bits of the value to bits 21 to 31. */
8683 insn |= relocation & 0x7ff;
8684
95f0d0d2 8685 bfd_put_32 (input_bfd, insn, contents + rel->r_offset);
c3301df1
AM
8686
8687 if (r_type == R_PPC_VLE_SDA21
8688 && ((relocation + 0x80000) & 0xffffffff) > 0x100000)
8689 goto overflow;
c316a17c 8690 goto copy_reloc;
b9c361e0 8691 }
6f5601c4
AM
8692 /* Fill in register field. */
8693 insn = (insn & ~RA_REGISTER_MASK) | (reg << RA_REGISTER_SHIFT);
95f0d0d2 8694 bfd_put_32 (input_bfd, insn, contents + rel->r_offset);
252b5132
RH
8695 }
8696 break;
8697
b9c361e0
JL
8698 case R_PPC_VLE_SDAREL_LO16A:
8699 case R_PPC_VLE_SDAREL_LO16D:
8700 case R_PPC_VLE_SDAREL_HI16A:
8701 case R_PPC_VLE_SDAREL_HI16D:
8702 case R_PPC_VLE_SDAREL_HA16A:
8703 case R_PPC_VLE_SDAREL_HA16D:
8704 {
8705 bfd_vma value;
8706 const char *name;
b9c361e0
JL
8707 struct elf_link_hash_entry *sda = NULL;
8708
8709 if (sec == NULL || sec->output_section == NULL)
8710 {
8711 unresolved_reloc = TRUE;
8712 break;
8713 }
8714
fd361982 8715 name = bfd_section_name (sec->output_section);
93d1b056
AM
8716 if (strcmp (name, ".sdata") == 0
8717 || strcmp (name, ".sbss") == 0)
5499c7c7 8718 sda = htab->sdata[0].sym;
93d1b056
AM
8719 else if (strcmp (name, ".sdata2") == 0
8720 || strcmp (name, ".sbss2") == 0)
5499c7c7 8721 sda = htab->sdata[1].sym;
b9c361e0
JL
8722 else
8723 {
4eca0228 8724 _bfd_error_handler
695344c0 8725 /* xgettext:c-format */
871b3ab2 8726 (_("%pB: the target (%s) of a %s relocation is "
b9c361e0
JL
8727 "in the wrong output section (%s)"),
8728 input_bfd,
8729 sym_name,
8730 howto->name,
8731 name);
8732
8733 bfd_set_error (bfd_error_bad_value);
8734 ret = FALSE;
c316a17c 8735 goto copy_reloc;
b9c361e0
JL
8736 }
8737
5499c7c7 8738 if (sda == NULL || !is_static_defined (sda))
b9c361e0 8739 {
5499c7c7
AM
8740 unresolved_reloc = TRUE;
8741 break;
b9c361e0 8742 }
5499c7c7 8743 value = relocation + addend - SYM_VAL (sda);
86c95733
AM
8744
8745 if (r_type == R_PPC_VLE_SDAREL_LO16A)
08dc996f
AM
8746 ppc_elf_vle_split16 (input_bfd, input_section, rel->r_offset,
8747 contents + rel->r_offset, value,
8748 split16a_type,
8749 htab->params->vle_reloc_fixup);
86c95733 8750 else if (r_type == R_PPC_VLE_SDAREL_LO16D)
08dc996f
AM
8751 ppc_elf_vle_split16 (input_bfd, input_section, rel->r_offset,
8752 contents + rel->r_offset, value,
8753 split16d_type,
8754 htab->params->vle_reloc_fixup);
86c95733 8755 else if (r_type == R_PPC_VLE_SDAREL_HI16A)
b9c361e0 8756 {
86c95733 8757 value = value >> 16;
08dc996f
AM
8758 ppc_elf_vle_split16 (input_bfd, input_section, rel->r_offset,
8759 contents + rel->r_offset, value,
8760 split16a_type,
8761 htab->params->vle_reloc_fixup);
b9c361e0 8762 }
86c95733 8763 else if (r_type == R_PPC_VLE_SDAREL_HI16D)
b9c361e0 8764 {
86c95733 8765 value = value >> 16;
08dc996f
AM
8766 ppc_elf_vle_split16 (input_bfd, input_section, rel->r_offset,
8767 contents + rel->r_offset, value,
8768 split16d_type,
8769 htab->params->vle_reloc_fixup);
b9c361e0 8770 }
86c95733 8771 else if (r_type == R_PPC_VLE_SDAREL_HA16A)
b9c361e0 8772 {
86c95733 8773 value = (value + 0x8000) >> 16;
08dc996f
AM
8774 ppc_elf_vle_split16 (input_bfd, input_section, rel->r_offset,
8775 contents + rel->r_offset, value,
8776 split16a_type,
8777 htab->params->vle_reloc_fixup);
b9c361e0 8778 }
86c95733 8779 else if (r_type == R_PPC_VLE_SDAREL_HA16D)
b9c361e0 8780 {
86c95733 8781 value = (value + 0x8000) >> 16;
08dc996f
AM
8782 ppc_elf_vle_split16 (input_bfd, input_section, rel->r_offset,
8783 contents + rel->r_offset, value,
8784 split16d_type,
8785 htab->params->vle_reloc_fixup);
b9c361e0
JL
8786 }
8787 }
c316a17c 8788 goto copy_reloc;
b9c361e0 8789
83eef883
AFB
8790 case R_PPC_VLE_ADDR20:
8791 ppc_elf_vle_split20 (output_bfd, contents + rel->r_offset, relocation);
24872cb3 8792 goto copy_reloc;
83eef883 8793
70bccea4 8794 /* Relocate against the beginning of the section. */
7619e7c7
AM
8795 case R_PPC_SECTOFF:
8796 case R_PPC_SECTOFF_LO:
8797 case R_PPC_SECTOFF_HI:
8798 case R_PPC_SECTOFF_HA:
3b4f3a11
AM
8799 if (sec == NULL || sec->output_section == NULL)
8800 {
8801 unresolved_reloc = TRUE;
8802 break;
8803 }
252b5132 8804 addend -= sec->output_section->vma;
252b5132
RH
8805 break;
8806
70bccea4 8807 /* Negative relocations. */
7619e7c7
AM
8808 case R_PPC_EMB_NADDR32:
8809 case R_PPC_EMB_NADDR16:
8810 case R_PPC_EMB_NADDR16_LO:
8811 case R_PPC_EMB_NADDR16_HI:
8812 case R_PPC_EMB_NADDR16_HA:
8da6118f 8813 addend -= 2 * relocation;
252b5132
RH
8814 break;
8815
7619e7c7
AM
8816 case R_PPC_COPY:
8817 case R_PPC_GLOB_DAT:
8818 case R_PPC_JMP_SLOT:
8819 case R_PPC_RELATIVE:
e054468f 8820 case R_PPC_IRELATIVE:
7619e7c7
AM
8821 case R_PPC_PLT32:
8822 case R_PPC_PLTREL32:
7619e7c7
AM
8823 case R_PPC_ADDR30:
8824 case R_PPC_EMB_RELSEC16:
8825 case R_PPC_EMB_RELST_LO:
8826 case R_PPC_EMB_RELST_HI:
8827 case R_PPC_EMB_RELST_HA:
8828 case R_PPC_EMB_BIT_FLD:
cf97bcb0
AM
8829 /* xgettext:c-format */
8830 _bfd_error_handler (_("%pB: %s unsupported"),
8831 input_bfd, howto->name);
252b5132
RH
8832
8833 bfd_set_error (bfd_error_invalid_operation);
b34976b6 8834 ret = FALSE;
c316a17c 8835 goto copy_reloc;
7619e7c7 8836 }
252b5132 8837
23cedd1d
AM
8838 switch (r_type)
8839 {
8840 default:
8841 break;
8842
8843 case R_PPC_PLTCALL:
8844 if (unresolved_reloc)
8845 {
8846 bfd_byte *p = contents + rel->r_offset;
8847 unsigned int insn = bfd_get_32 (input_bfd, p);
8848 insn &= 1;
8849 bfd_put_32 (input_bfd, B | insn, p);
8850 unresolved_reloc = save_unresolved_reloc;
8851 r_type = R_PPC_REL24;
8852 howto = ppc_elf_howto_table[r_type];
8853 }
8854 else if (htab->plt_type != PLT_NEW)
8855 info->callbacks->einfo
482f3505 8856 (_("%X%P: %H: %s relocation unsupported for bss-plt\n"),
23cedd1d
AM
8857 input_bfd, input_section, rel->r_offset,
8858 howto->name);
8859 break;
8860
8861 case R_PPC_PLTSEQ:
8862 case R_PPC_PLT16_HA:
8863 case R_PPC_PLT16_LO:
8864 if (unresolved_reloc)
8865 {
8866 bfd_byte *p = contents + (rel->r_offset & ~3);
8867 bfd_put_32 (input_bfd, NOP, p);
8868 unresolved_reloc = FALSE;
8869 r_type = R_PPC_NONE;
8870 howto = ppc_elf_howto_table[r_type];
8871 }
8872 else if (htab->plt_type != PLT_NEW)
8873 info->callbacks->einfo
482f3505 8874 (_("%X%P: %H: %s relocation unsupported for bss-plt\n"),
23cedd1d
AM
8875 input_bfd, input_section, rel->r_offset,
8876 howto->name);
8877 break;
8878 }
8879
7619e7c7
AM
8880 /* Do any further special processing. */
8881 switch (r_type)
8882 {
8883 default:
8884 break;
8885
8886 case R_PPC_ADDR16_HA:
d7128ce4 8887 case R_PPC_REL16_HA:
a680de9a 8888 case R_PPC_REL16DX_HA:
7619e7c7
AM
8889 case R_PPC_SECTOFF_HA:
8890 case R_PPC_TPREL16_HA:
8891 case R_PPC_DTPREL16_HA:
7619e7c7
AM
8892 case R_PPC_EMB_NADDR16_HA:
8893 case R_PPC_EMB_RELST_HA:
8894 /* It's just possible that this symbol is a weak symbol
7b609f53 8895 that's not actually defined anywhere. In that case,
7619e7c7
AM
8896 'sec' would be NULL, and we should leave the symbol
8897 alone (it will be set to zero elsewhere in the link). */
5c5f6e17
AM
8898 if (sec == NULL)
8899 break;
1a0670f3 8900 /* Fall through. */
5c5f6e17
AM
8901
8902 case R_PPC_PLT16_HA:
8903 case R_PPC_GOT16_HA:
8904 case R_PPC_GOT_TLSGD16_HA:
8905 case R_PPC_GOT_TLSLD16_HA:
8906 case R_PPC_GOT_TPREL16_HA:
8907 case R_PPC_GOT_DTPREL16_HA:
8908 /* Add 0x10000 if sign bit in 0:15 is set.
8909 Bits 0:15 are not used. */
8910 addend += 0x8000;
7619e7c7 8911 break;
1fe532cf
AM
8912
8913 case R_PPC_ADDR16:
8914 case R_PPC_ADDR16_LO:
8915 case R_PPC_GOT16:
8916 case R_PPC_GOT16_LO:
8917 case R_PPC_SDAREL16:
8918 case R_PPC_SECTOFF:
8919 case R_PPC_SECTOFF_LO:
8920 case R_PPC_DTPREL16:
8921 case R_PPC_DTPREL16_LO:
8922 case R_PPC_TPREL16:
8923 case R_PPC_TPREL16_LO:
8924 case R_PPC_GOT_TLSGD16:
8925 case R_PPC_GOT_TLSGD16_LO:
8926 case R_PPC_GOT_TLSLD16:
8927 case R_PPC_GOT_TLSLD16_LO:
8928 case R_PPC_GOT_DTPREL16:
8929 case R_PPC_GOT_DTPREL16_LO:
8930 case R_PPC_GOT_TPREL16:
8931 case R_PPC_GOT_TPREL16_LO:
8932 {
8933 /* The 32-bit ABI lacks proper relocations to deal with
8934 certain 64-bit instructions. Prevent damage to bits
8935 that make up part of the insn opcode. */
8936 unsigned int insn, mask, lobit;
8937
95f0d0d2 8938 insn = bfd_get_32 (input_bfd,
c316a17c 8939 contents + rel->r_offset - d_offset);
1fe532cf
AM
8940 mask = 0;
8941 if (is_insn_ds_form (insn))
8942 mask = 3;
8943 else if (is_insn_dq_form (insn))
8944 mask = 15;
8945 else
8946 break;
a680de9a
PB
8947 relocation += addend;
8948 addend = insn & mask;
8949 lobit = mask & relocation;
1fe532cf
AM
8950 if (lobit != 0)
8951 {
a680de9a 8952 relocation ^= lobit;
1fe532cf 8953 info->callbacks->einfo
695344c0 8954 /* xgettext:c-format */
174d0a74 8955 (_("%H: error: %s against `%s' not a multiple of %u\n"),
1fe532cf
AM
8956 input_bfd, input_section, rel->r_offset,
8957 howto->name, sym_name, mask + 1);
8958 bfd_set_error (bfd_error_bad_value);
8959 ret = FALSE;
8960 }
1fe532cf
AM
8961 }
8962 break;
252b5132
RH
8963 }
8964
252b5132 8965#ifdef DEBUG
55fd94b0
AM
8966 fprintf (stderr, "\ttype = %s (%d), name = %s, symbol index = %ld, "
8967 "offset = %ld, addend = %ld\n",
252b5132 8968 howto->name,
8da6118f 8969 (int) r_type,
252b5132
RH
8970 sym_name,
8971 r_symndx,
7619e7c7 8972 (long) rel->r_offset,
8da6118f 8973 (long) addend);
252b5132
RH
8974#endif
8975
7619e7c7
AM
8976 if (unresolved_reloc
8977 && !((input_section->flags & SEC_DEBUGGING) != 0
1d5316ab
AM
8978 && h->def_dynamic)
8979 && _bfd_elf_section_offset (output_bfd, info, input_section,
8980 rel->r_offset) != (bfd_vma) -1)
7619e7c7 8981 {
25f53a85 8982 info->callbacks->einfo
695344c0 8983 /* xgettext:c-format */
174d0a74 8984 (_("%H: unresolvable %s relocation against symbol `%s'\n"),
25f53a85 8985 input_bfd, input_section, rel->r_offset,
7b609f53 8986 howto->name,
7619e7c7
AM
8987 sym_name);
8988 ret = FALSE;
8989 }
8990
86c95733
AM
8991 /* 16-bit fields in insns mostly have signed values, but a
8992 few insns have 16-bit unsigned values. Really, we should
8993 have different reloc types. */
8994 if (howto->complain_on_overflow != complain_overflow_dont
8995 && howto->dst_mask == 0xffff
8996 && (input_section->flags & SEC_CODE) != 0)
8997 {
8998 enum complain_overflow complain = complain_overflow_signed;
8999
9000 if ((elf_section_flags (input_section) & SHF_PPC_VLE) == 0)
9001 {
9002 unsigned int insn;
9003
9004 insn = bfd_get_32 (input_bfd, contents + (rel->r_offset & ~3));
2365f8d7 9005 if ((insn & (0x3fu << 26)) == 10u << 26 /* cmpli */)
a47622ac 9006 complain = complain_overflow_bitfield;
2365f8d7
AM
9007 else if ((insn & (0x3fu << 26)) == 28u << 26 /* andi */
9008 || (insn & (0x3fu << 26)) == 24u << 26 /* ori */
9009 || (insn & (0x3fu << 26)) == 26u << 26 /* xori */)
86c95733
AM
9010 complain = complain_overflow_unsigned;
9011 }
9012 if (howto->complain_on_overflow != complain)
9013 {
9014 alt_howto = *howto;
9015 alt_howto.complain_on_overflow = complain;
9016 howto = &alt_howto;
9017 }
9018 }
9019
a680de9a
PB
9020 if (r_type == R_PPC_REL16DX_HA)
9021 {
9022 /* Split field reloc isn't handled by _bfd_final_link_relocate. */
9023 if (rel->r_offset + 4 > input_section->size)
9024 r = bfd_reloc_outofrange;
9025 else
9026 {
9027 unsigned int insn;
9028
9029 relocation += addend;
9030 relocation -= (rel->r_offset
9031 + input_section->output_offset
9032 + input_section->output_section->vma);
9033 relocation >>= 16;
9034 insn = bfd_get_32 (input_bfd, contents + rel->r_offset);
9035 insn &= ~0x1fffc1;
9036 insn |= (relocation & 0xffc1) | ((relocation & 0x3e) << 15);
9037 bfd_put_32 (input_bfd, insn, contents + rel->r_offset);
9038 r = bfd_reloc_ok;
9039 }
9040 }
9041 else
9042 r = _bfd_final_link_relocate (howto, input_bfd, input_section, contents,
9043 rel->r_offset, relocation, addend);
252b5132 9044
7619e7c7 9045 if (r != bfd_reloc_ok)
252b5132 9046 {
7619e7c7 9047 if (r == bfd_reloc_overflow)
252b5132 9048 {
c3301df1 9049 overflow:
8131c122
AM
9050 /* On code like "if (foo) foo();" don't report overflow
9051 on a branch to zero when foo is undefined. */
9052 if (!warned
9053 && !(h != NULL
9054 && (h->root.type == bfd_link_hash_undefweak
9055 || h->root.type == bfd_link_hash_undefined)
9056 && is_branch_reloc (r_type)))
1a72702b
AM
9057 info->callbacks->reloc_overflow
9058 (info, (h ? &h->root : NULL), sym_name, howto->name,
9059 rel->r_addend, input_bfd, input_section, rel->r_offset);
dc1bc0c9
RH
9060 }
9061 else
9062 {
25f53a85 9063 info->callbacks->einfo
695344c0 9064 /* xgettext:c-format */
174d0a74 9065 (_("%H: %s reloc against `%s': error %d\n"),
25f53a85
AM
9066 input_bfd, input_section, rel->r_offset,
9067 howto->name, sym_name, (int) r);
7619e7c7 9068 ret = FALSE;
252b5132
RH
9069 }
9070 }
c316a17c
AM
9071 copy_reloc:
9072 if (wrel != rel)
9073 *wrel = *rel;
9074 }
9075
9076 if (wrel != rel)
9077 {
9078 Elf_Internal_Shdr *rel_hdr;
9079 size_t deleted = rel - wrel;
9080
9081 rel_hdr = _bfd_elf_single_rel_hdr (input_section->output_section);
9082 rel_hdr->sh_size -= rel_hdr->sh_entsize * deleted;
9083 if (rel_hdr->sh_size == 0)
9084 {
9085 /* It is too late to remove an empty reloc section. Leave
9086 one NONE reloc.
9087 ??? What is wrong with an empty section??? */
9088 rel_hdr->sh_size = rel_hdr->sh_entsize;
9089 deleted -= 1;
9090 wrel++;
9091 }
9092 relend = wrel;
9093 rel_hdr = _bfd_elf_single_rel_hdr (input_section);
9094 rel_hdr->sh_size -= rel_hdr->sh_entsize * deleted;
9095 input_section->reloc_count -= deleted;
252b5132
RH
9096 }
9097
252b5132
RH
9098#ifdef DEBUG
9099 fprintf (stderr, "\n");
9100#endif
9101
53291d1f
AM
9102 if (input_section->sec_info_type == SEC_INFO_TYPE_TARGET
9103 && input_section->size != input_section->rawsize
9104 && (strcmp (input_section->output_section->name, ".init") == 0
9105 || strcmp (input_section->output_section->name, ".fini") == 0))
9106 {
9107 /* Branch around the trampolines. */
9108 unsigned int insn = B + input_section->size - input_section->rawsize;
9109 bfd_put_32 (input_bfd, insn, contents + input_section->rawsize);
9110 }
9111
5446cbdf 9112 if (htab->params->ppc476_workaround
795bc6b3 9113 && input_section->sec_info_type == SEC_INFO_TYPE_TARGET
0e1862bb 9114 && (!bfd_link_relocatable (info)
795bc6b3
AM
9115 || (input_section->output_section->alignment_power
9116 >= htab->params->pagesize_p2)))
5446cbdf 9117 {
5446cbdf 9118 bfd_vma start_addr, end_addr, addr;
795bc6b3 9119 bfd_vma pagesize = (bfd_vma) 1 << htab->params->pagesize_p2;
5446cbdf 9120
5446cbdf 9121 if (relax_info->workaround_size != 0)
40fd06d1
AM
9122 {
9123 bfd_byte *p;
9124 unsigned int n;
9125 bfd_byte fill[4];
9126
9127 bfd_put_32 (input_bfd, BA, fill);
9128 p = contents + input_section->size - relax_info->workaround_size;
9129 n = relax_info->workaround_size >> 2;
9130 while (n--)
9131 {
9132 memcpy (p, fill, 4);
9133 p += 4;
9134 }
9135 }
5446cbdf
AM
9136
9137 /* The idea is: Replace the last instruction on a page with a
9138 branch to a patch area. Put the insn there followed by a
9139 branch back to the next page. Complicated a little by
9140 needing to handle moved conditional branches, and by not
9141 wanting to touch data-in-text. */
9142
9143 start_addr = (input_section->output_section->vma
9144 + input_section->output_offset);
9145 end_addr = (start_addr + input_section->size
9146 - relax_info->workaround_size);
9147 for (addr = ((start_addr & -pagesize) + pagesize - 4);
9148 addr < end_addr;
9149 addr += pagesize)
9150 {
9151 bfd_vma offset = addr - start_addr;
9152 Elf_Internal_Rela *lo, *hi;
9153 bfd_boolean is_data;
9154 bfd_vma patch_off, patch_addr;
9155 unsigned int insn;
9156
9157 /* Do we have a data reloc at this offset? If so, leave
9158 the word alone. */
9159 is_data = FALSE;
9160 lo = relocs;
668e22e5
AM
9161 hi = relend;
9162 rel = NULL;
5446cbdf
AM
9163 while (lo < hi)
9164 {
9165 rel = lo + (hi - lo) / 2;
9166 if (rel->r_offset < offset)
9167 lo = rel + 1;
668e22e5 9168 else if (rel->r_offset > offset + 3)
5446cbdf
AM
9169 hi = rel;
9170 else
9171 {
9172 switch (ELF32_R_TYPE (rel->r_info))
9173 {
9174 case R_PPC_ADDR32:
9175 case R_PPC_UADDR32:
9176 case R_PPC_REL32:
9177 case R_PPC_ADDR30:
9178 is_data = TRUE;
9179 break;
9180 default:
9181 break;
9182 }
9183 break;
9184 }
9185 }
9186 if (is_data)
9187 continue;
9188
b4ab4364
AM
9189 /* Some instructions can be left alone too. Unconditional
9190 branches, except for bcctr with BO=0x14 (bctr, bctrl),
9191 avoid the icache failure.
9192
9193 The problem occurs due to prefetch across a page boundary
9194 where stale instructions can be fetched from the next
9195 page, and the mechanism for flushing these bad
9196 instructions fails under certain circumstances. The
9197 unconditional branches:
9198 1) Branch: b, bl, ba, bla,
9199 2) Branch Conditional: bc, bca, bcl, bcla,
9200 3) Branch Conditional to Link Register: bclr, bclrl,
9201 where (2) and (3) have BO=0x14 making them unconditional,
9202 prevent the bad prefetch because the prefetch itself is
9203 affected by these instructions. This happens even if the
9204 instruction is not executed.
9205
9206 A bctr example:
9207 .
9208 . lis 9,new_page@ha
9209 . addi 9,9,new_page@l
9210 . mtctr 9
9211 . bctr
9212 . nop
9213 . nop
9214 . new_page:
9215 .
9216 The bctr is not predicted taken due to ctr not being
9217 ready, so prefetch continues on past the bctr into the
9218 new page which might have stale instructions. If they
9219 fail to be flushed, then they will be executed after the
9220 bctr executes. Either of the following modifications
9221 prevent the bad prefetch from happening in the first
9222 place:
9223 .
1b786873
L
9224 . lis 9,new_page@ha lis 9,new_page@ha
9225 . addi 9,9,new_page@l addi 9,9,new_page@l
9226 . mtctr 9 mtctr 9
9227 . bctr bctr
b4ab4364 9228 . nop b somewhere_else
1b786873
L
9229 . b somewhere_else nop
9230 . new_page: new_page:
b4ab4364 9231 . */
5446cbdf 9232 insn = bfd_get_32 (input_bfd, contents + offset);
2365f8d7
AM
9233 if ((insn & (0x3fu << 26)) == (18u << 26) /* b,bl,ba,bla */
9234 || ((insn & (0x3fu << 26)) == (16u << 26) /* bc,bcl,bca,bcla*/
07d6d2b8 9235 && (insn & (0x14 << 21)) == (0x14 << 21)) /* with BO=0x14 */
2365f8d7 9236 || ((insn & (0x3fu << 26)) == (19u << 26)
b4ab4364 9237 && (insn & (0x3ff << 1)) == (16u << 1) /* bclr,bclrl */
07d6d2b8 9238 && (insn & (0x14 << 21)) == (0x14 << 21)))/* with BO=0x14 */
5446cbdf
AM
9239 continue;
9240
9241 patch_addr = (start_addr + input_section->size
9242 - relax_info->workaround_size);
9243 patch_addr = (patch_addr + 15) & -16;
9244 patch_off = patch_addr - start_addr;
9245 bfd_put_32 (input_bfd, B + patch_off - offset, contents + offset);
668e22e5
AM
9246
9247 if (rel != NULL
9248 && rel->r_offset >= offset
9249 && rel->r_offset < offset + 4)
9250 {
f8b44781
AM
9251 asection *sreloc;
9252
668e22e5
AM
9253 /* If the insn we are patching had a reloc, adjust the
9254 reloc r_offset so that the reloc applies to the moved
9255 location. This matters for -r and --emit-relocs. */
9256 if (rel + 1 != relend)
9257 {
9258 Elf_Internal_Rela tmp = *rel;
9259
9260 /* Keep the relocs sorted by r_offset. */
9261 memmove (rel, rel + 1, (relend - (rel + 1)) * sizeof (*rel));
9262 relend[-1] = tmp;
9263 }
9264 relend[-1].r_offset += patch_off - offset;
f8b44781
AM
9265
9266 /* Adjust REL16 addends too. */
9267 switch (ELF32_R_TYPE (relend[-1].r_info))
9268 {
9269 case R_PPC_REL16:
9270 case R_PPC_REL16_LO:
9271 case R_PPC_REL16_HI:
9272 case R_PPC_REL16_HA:
9273 relend[-1].r_addend += patch_off - offset;
9274 break;
9275 default:
9276 break;
9277 }
9278
9279 /* If we are building a PIE or shared library with
9280 non-PIC objects, perhaps we had a dynamic reloc too?
9281 If so, the dynamic reloc must move with the insn. */
9282 sreloc = elf_section_data (input_section)->sreloc;
9283 if (sreloc != NULL)
9284 {
1d5c94cb 9285 Elf32_External_Rela *slo, *shi, *srelend;
f8b44781
AM
9286 bfd_vma soffset;
9287
1d5c94cb
AM
9288 slo = (Elf32_External_Rela *) sreloc->contents;
9289 shi = srelend = slo + sreloc->reloc_count;
f8b44781
AM
9290 soffset = (offset + input_section->output_section->vma
9291 + input_section->output_offset);
9292 while (slo < shi)
9293 {
1d5c94cb
AM
9294 Elf32_External_Rela *srel = slo + (shi - slo) / 2;
9295 bfd_elf32_swap_reloca_in (output_bfd, (bfd_byte *) srel,
9296 &outrel);
f8b44781
AM
9297 if (outrel.r_offset < soffset)
9298 slo = srel + 1;
9299 else if (outrel.r_offset > soffset + 3)
9300 shi = srel;
9301 else
9302 {
1d5c94cb 9303 if (srel + 1 != srelend)
f8b44781 9304 {
1d5c94cb
AM
9305 memmove (srel, srel + 1,
9306 (srelend - (srel + 1)) * sizeof (*srel));
9307 srel = srelend - 1;
f8b44781
AM
9308 }
9309 outrel.r_offset += patch_off - offset;
1d5c94cb
AM
9310 bfd_elf32_swap_reloca_out (output_bfd, &outrel,
9311 (bfd_byte *) srel);
f8b44781
AM
9312 break;
9313 }
9314 }
9315 }
668e22e5
AM
9316 }
9317 else
9318 rel = NULL;
9319
2365f8d7 9320 if ((insn & (0x3fu << 26)) == (16u << 26) /* bc */
5446cbdf
AM
9321 && (insn & 2) == 0 /* relative */)
9322 {
9323 bfd_vma delta = ((insn & 0xfffc) ^ 0x8000) - 0x8000;
9324
9325 delta += offset - patch_off;
0e1862bb 9326 if (bfd_link_relocatable (info) && rel != NULL)
668e22e5 9327 delta = 0;
0e1862bb 9328 if (!bfd_link_relocatable (info) && rel != NULL)
668e22e5
AM
9329 {
9330 enum elf_ppc_reloc_type r_type;
9331
9332 r_type = ELF32_R_TYPE (relend[-1].r_info);
9333 if (r_type == R_PPC_REL14_BRTAKEN)
9334 insn |= BRANCH_PREDICT_BIT;
9335 else if (r_type == R_PPC_REL14_BRNTAKEN)
9336 insn &= ~BRANCH_PREDICT_BIT;
9337 else
9338 BFD_ASSERT (r_type == R_PPC_REL14);
9339
9340 if ((r_type == R_PPC_REL14_BRTAKEN
9341 || r_type == R_PPC_REL14_BRNTAKEN)
9342 && delta + 0x8000 < 0x10000
9343 && (bfd_signed_vma) delta < 0)
9344 insn ^= BRANCH_PREDICT_BIT;
9345 }
5446cbdf
AM
9346 if (delta + 0x8000 < 0x10000)
9347 {
9348 bfd_put_32 (input_bfd,
9349 (insn & ~0xfffc) | (delta & 0xfffc),
9350 contents + patch_off);
9351 patch_off += 4;
9352 bfd_put_32 (input_bfd,
9353 B | ((offset + 4 - patch_off) & 0x3fffffc),
9354 contents + patch_off);
9355 patch_off += 4;
9356 }
9357 else
9358 {
668e22e5
AM
9359 if (rel != NULL)
9360 {
9361 unsigned int r_sym = ELF32_R_SYM (relend[-1].r_info);
9362
9363 relend[-1].r_offset += 8;
9364 relend[-1].r_info = ELF32_R_INFO (r_sym, R_PPC_REL24);
9365 }
5446cbdf
AM
9366 bfd_put_32 (input_bfd,
9367 (insn & ~0xfffc) | 8,
9368 contents + patch_off);
9369 patch_off += 4;
9370 bfd_put_32 (input_bfd,
9371 B | ((offset + 4 - patch_off) & 0x3fffffc),
9372 contents + patch_off);
9373 patch_off += 4;
9374 bfd_put_32 (input_bfd,
9375 B | ((delta - 8) & 0x3fffffc),
9376 contents + patch_off);
9377 patch_off += 4;
9378 }
9379 }
9380 else
9381 {
9382 bfd_put_32 (input_bfd, insn, contents + patch_off);
9383 patch_off += 4;
9384 bfd_put_32 (input_bfd,
9385 B | ((offset + 4 - patch_off) & 0x3fffffc),
9386 contents + patch_off);
9387 patch_off += 4;
9388 }
9389 BFD_ASSERT (patch_off <= input_section->size);
9390 relax_info->workaround_size = input_section->size - patch_off;
9391 }
9392 }
9393
252b5132
RH
9394 return ret;
9395}
252b5132 9396\f
49c09209 9397/* Write out the PLT relocs and entries for H. */
c5fccbec 9398
b34976b6 9399static bfd_boolean
49c09209 9400write_global_sym_plt (struct elf_link_hash_entry *h, void *inf)
e1a9cb8e 9401{
49c09209
AM
9402 struct bfd_link_info *info = (struct bfd_link_info *) inf;
9403 struct ppc_elf_link_hash_table *htab = ppc_elf_hash_table (info);
a6aa5195
AM
9404 struct plt_entry *ent;
9405 bfd_boolean doneone;
e1a9cb8e 9406
a6aa5195
AM
9407 doneone = FALSE;
9408 for (ent = h->plt.plist; ent != NULL; ent = ent->next)
9409 if (ent->plt.offset != (bfd_vma) -1)
9410 {
9411 if (!doneone)
9412 {
9413 Elf_Internal_Rela rela;
9414 bfd_byte *loc;
9415 bfd_vma reloc_index;
2d7ad24e
AM
9416 asection *plt = htab->elf.splt;
9417 asection *relplt = htab->elf.srelplt;
e1a9cb8e 9418
e054468f 9419 if (htab->plt_type == PLT_NEW
25f23106
AM
9420 || !htab->elf.dynamic_sections_created
9421 || h->dynindx == -1)
9d8504b1
PB
9422 reloc_index = ent->plt.offset / 4;
9423 else
9424 {
9425 reloc_index = ((ent->plt.offset - htab->plt_initial_entry_size)
9426 / htab->plt_slot_size);
9427 if (reloc_index > PLT_NUM_SINGLE_ENTRIES
4a3dc543 9428 && htab->plt_type == PLT_OLD)
9d8504b1
PB
9429 reloc_index -= (reloc_index - PLT_NUM_SINGLE_ENTRIES) / 2;
9430 }
9431
a6aa5195
AM
9432 /* This symbol has an entry in the procedure linkage table.
9433 Set it up. */
e054468f 9434 if (htab->plt_type == PLT_VXWORKS
25f23106
AM
9435 && htab->elf.dynamic_sections_created
9436 && h->dynindx != -1)
a6aa5195 9437 {
9d8504b1
PB
9438 bfd_vma got_offset;
9439 const bfd_vma *plt_entry;
5b914448 9440
9d8504b1
PB
9441 /* The first three entries in .got.plt are reserved. */
9442 got_offset = (reloc_index + 3) * 4;
9443
9444 /* Use the right PLT. */
0e1862bb 9445 plt_entry = bfd_link_pic (info) ? ppc_elf_vxworks_pic_plt_entry
9d8504b1
PB
9446 : ppc_elf_vxworks_plt_entry;
9447
9448 /* Fill in the .plt on VxWorks. */
0e1862bb 9449 if (bfd_link_pic (info))
9d8504b1 9450 {
49c09209 9451 bfd_put_32 (info->output_bfd,
e87d4038 9452 plt_entry[0] | PPC_HA (got_offset),
2d7ad24e 9453 plt->contents + ent->plt.offset + 0);
49c09209 9454 bfd_put_32 (info->output_bfd,
e87d4038 9455 plt_entry[1] | PPC_LO (got_offset),
2d7ad24e 9456 plt->contents + ent->plt.offset + 4);
9d8504b1
PB
9457 }
9458 else
9459 {
e87d4038 9460 bfd_vma got_loc = got_offset + SYM_VAL (htab->elf.hgot);
9d8504b1 9461
49c09209 9462 bfd_put_32 (info->output_bfd,
e87d4038 9463 plt_entry[0] | PPC_HA (got_loc),
2d7ad24e 9464 plt->contents + ent->plt.offset + 0);
49c09209 9465 bfd_put_32 (info->output_bfd,
e87d4038 9466 plt_entry[1] | PPC_LO (got_loc),
2d7ad24e 9467 plt->contents + ent->plt.offset + 4);
9d8504b1
PB
9468 }
9469
49c09209 9470 bfd_put_32 (info->output_bfd, plt_entry[2],
2d7ad24e 9471 plt->contents + ent->plt.offset + 8);
49c09209 9472 bfd_put_32 (info->output_bfd, plt_entry[3],
2d7ad24e 9473 plt->contents + ent->plt.offset + 12);
9d8504b1
PB
9474
9475 /* This instruction is an immediate load. The value loaded is
9476 the byte offset of the R_PPC_JMP_SLOT relocation from the
9477 start of the .rela.plt section. The value is stored in the
9478 low-order 16 bits of the load instruction. */
9479 /* NOTE: It appears that this is now an index rather than a
9480 prescaled offset. */
49c09209 9481 bfd_put_32 (info->output_bfd,
9d8504b1 9482 plt_entry[4] | reloc_index,
2d7ad24e 9483 plt->contents + ent->plt.offset + 16);
9d8504b1
PB
9484 /* This instruction is a PC-relative branch whose target is
9485 the start of the PLT section. The address of this branch
9486 instruction is 20 bytes beyond the start of this PLT entry.
9487 The address is encoded in bits 6-29, inclusive. The value
9488 stored is right-shifted by two bits, permitting a 26-bit
9489 offset. */
49c09209 9490 bfd_put_32 (info->output_bfd,
5b914448 9491 (plt_entry[5]
9d8504b1 9492 | (-(ent->plt.offset + 20) & 0x03fffffc)),
2d7ad24e 9493 plt->contents + ent->plt.offset + 20);
49c09209 9494 bfd_put_32 (info->output_bfd, plt_entry[6],
2d7ad24e 9495 plt->contents + ent->plt.offset + 24);
49c09209 9496 bfd_put_32 (info->output_bfd, plt_entry[7],
2d7ad24e 9497 plt->contents + ent->plt.offset + 28);
9d8504b1
PB
9498
9499 /* Fill in the GOT entry corresponding to this PLT slot with
a8685210 9500 the address immediately after the "bctr" instruction
9d8504b1 9501 in this PLT entry. */
2d7ad24e
AM
9502 bfd_put_32 (info->output_bfd, (plt->output_section->vma
9503 + plt->output_offset
9504 + ent->plt.offset + 16),
ce558b89 9505 htab->elf.sgotplt->contents + got_offset);
9d8504b1 9506
0e1862bb 9507 if (!bfd_link_pic (info))
9d8504b1
PB
9508 {
9509 /* Fill in a couple of entries in .rela.plt.unloaded. */
9510 loc = htab->srelplt2->contents
9511 + ((VXWORKS_PLTRESOLVE_RELOCS + reloc_index
9512 * VXWORKS_PLT_NON_JMP_SLOT_RELOCS)
9513 * sizeof (Elf32_External_Rela));
9514
9515 /* Provide the @ha relocation for the first instruction. */
2d7ad24e
AM
9516 rela.r_offset = (plt->output_section->vma
9517 + plt->output_offset
9d8504b1 9518 + ent->plt.offset + 2);
636ce3f5 9519 rela.r_info = ELF32_R_INFO (htab->elf.hgot->indx,
9d8504b1
PB
9520 R_PPC_ADDR16_HA);
9521 rela.r_addend = got_offset;
49c09209 9522 bfd_elf32_swap_reloca_out (info->output_bfd, &rela, loc);
9d8504b1
PB
9523 loc += sizeof (Elf32_External_Rela);
9524
9525 /* Provide the @l relocation for the second instruction. */
2d7ad24e
AM
9526 rela.r_offset = (plt->output_section->vma
9527 + plt->output_offset
9d8504b1 9528 + ent->plt.offset + 6);
636ce3f5 9529 rela.r_info = ELF32_R_INFO (htab->elf.hgot->indx,
9d8504b1
PB
9530 R_PPC_ADDR16_LO);
9531 rela.r_addend = got_offset;
49c09209 9532 bfd_elf32_swap_reloca_out (info->output_bfd, &rela, loc);
9d8504b1
PB
9533 loc += sizeof (Elf32_External_Rela);
9534
9535 /* Provide a relocation for the GOT entry corresponding to this
9536 PLT slot. Point it at the middle of the .plt entry. */
ce558b89
AM
9537 rela.r_offset = (htab->elf.sgotplt->output_section->vma
9538 + htab->elf.sgotplt->output_offset
9d8504b1 9539 + got_offset);
7325306f 9540 rela.r_info = ELF32_R_INFO (htab->elf.hplt->indx,
9d8504b1
PB
9541 R_PPC_ADDR32);
9542 rela.r_addend = ent->plt.offset + 16;
49c09209 9543 bfd_elf32_swap_reloca_out (info->output_bfd, &rela, loc);
9d8504b1
PB
9544 }
9545
9546 /* VxWorks uses non-standard semantics for R_PPC_JMP_SLOT.
9547 In particular, the offset for the relocation is not the
9548 address of the PLT entry for this function, as specified
9549 by the ABI. Instead, the offset is set to the address of
9550 the GOT slot for this function. See EABI 4.4.4.1. */
ce558b89
AM
9551 rela.r_offset = (htab->elf.sgotplt->output_section->vma
9552 + htab->elf.sgotplt->output_offset
9d8504b1 9553 + got_offset);
2d7ad24e 9554 rela.r_addend = 0;
a6aa5195
AM
9555 }
9556 else
9557 {
2d7ad24e 9558 rela.r_addend = 0;
25f23106
AM
9559 if (!htab->elf.dynamic_sections_created
9560 || h->dynindx == -1)
2d7ad24e
AM
9561 {
9562 if (h->type == STT_GNU_IFUNC)
9563 {
9564 plt = htab->elf.iplt;
9565 relplt = htab->elf.irelplt;
9566 }
9567 else
9568 {
9569 plt = htab->pltlocal;
9570 relplt = bfd_link_pic (info) ? htab->relpltlocal : NULL;
9571 }
9572 if (h->def_regular
9573 && (h->root.type == bfd_link_hash_defined
9574 || h->root.type == bfd_link_hash_defweak))
9575 rela.r_addend = SYM_VAL (h);
9576 }
e054468f 9577
2d7ad24e 9578 if (relplt == NULL)
9d8504b1 9579 {
2d7ad24e
AM
9580 loc = plt->contents + ent->plt.offset;
9581 bfd_put_32 (info->output_bfd, rela.r_addend, loc);
9d8504b1
PB
9582 }
9583 else
9584 {
2d7ad24e
AM
9585 rela.r_offset = (plt->output_section->vma
9586 + plt->output_offset
9587 + ent->plt.offset);
9588
9589 if (htab->plt_type == PLT_OLD
9590 || !htab->elf.dynamic_sections_created
9591 || h->dynindx == -1)
9592 {
9593 /* We don't need to fill in the .plt. The ppc dynamic
9594 linker will fill it in. */
9595 }
9596 else
9597 {
9598 bfd_vma val = (htab->glink_pltresolve + ent->plt.offset
9599 + htab->glink->output_section->vma
9600 + htab->glink->output_offset);
9601 bfd_put_32 (info->output_bfd, val,
9602 plt->contents + ent->plt.offset);
9603 }
9d8504b1 9604 }
a6aa5195 9605 }
e1a9cb8e 9606
2d7ad24e 9607 if (relplt != NULL)
e054468f 9608 {
2d7ad24e
AM
9609 /* Fill in the entry in the .rela.plt section. */
9610 if (!htab->elf.dynamic_sections_created
9611 || h->dynindx == -1)
9612 {
9613 if (h->type == STT_GNU_IFUNC)
9614 rela.r_info = ELF32_R_INFO (0, R_PPC_IRELATIVE);
9615 else
9616 rela.r_info = ELF32_R_INFO (0, R_PPC_RELATIVE);
9617 loc = relplt->contents + (relplt->reloc_count++
9618 * sizeof (Elf32_External_Rela));
9619 htab->local_ifunc_resolver = 1;
9620 }
9621 else
9622 {
9623 rela.r_info = ELF32_R_INFO (h->dynindx, R_PPC_JMP_SLOT);
9624 loc = relplt->contents + (reloc_index
9625 * sizeof (Elf32_External_Rela));
9626 if (h->type == STT_GNU_IFUNC && is_static_defined (h))
9627 htab->maybe_local_ifunc_resolver = 1;
9628 }
9629 bfd_elf32_swap_reloca_out (info->output_bfd, &rela, loc);
82e66161 9630 }
a6aa5195
AM
9631 doneone = TRUE;
9632 }
e1a9cb8e 9633
e054468f 9634 if (htab->plt_type == PLT_NEW
25f23106
AM
9635 || !htab->elf.dynamic_sections_created
9636 || h->dynindx == -1)
a6aa5195 9637 {
a7f2871e 9638 unsigned char *p;
49c09209 9639 asection *plt = htab->elf.splt;
9e390558 9640
25f23106
AM
9641 if (!htab->elf.dynamic_sections_created
9642 || h->dynindx == -1)
2d7ad24e
AM
9643 {
9644 if (h->type == STT_GNU_IFUNC)
9645 plt = htab->elf.iplt;
9646 else
9647 break;
9648 }
e1a9cb8e 9649
a7f2871e 9650 p = (unsigned char *) htab->glink->contents + ent->glink_offset;
49c09209 9651 write_glink_stub (h, ent, plt, p, info);
e1a9cb8e 9652
0e1862bb 9653 if (!bfd_link_pic (info))
e054468f
AM
9654 /* We only need one non-PIC glink stub. */
9655 break;
a6aa5195
AM
9656 }
9657 else
9658 break;
9659 }
49c09209
AM
9660 return TRUE;
9661}
9662
9663/* Finish up PLT handling. */
9664
9665bfd_boolean
9666ppc_finish_symbols (struct bfd_link_info *info)
9667{
9668 struct ppc_elf_link_hash_table *htab = ppc_elf_hash_table (info);
9669 bfd *ibfd;
9670
9671 if (!htab)
9672 return TRUE;
9673
9674 elf_link_hash_traverse (&htab->elf, write_global_sym_plt, info);
9675
9676 for (ibfd = info->input_bfds; ibfd != NULL; ibfd = ibfd->link.next)
9677 {
9678 bfd_vma *local_got, *end_local_got;
9679 struct plt_entry **local_plt, **lplt, **end_local_plt;
9680 Elf_Internal_Shdr *symtab_hdr;
9681 bfd_size_type locsymcount;
9682 Elf_Internal_Sym *local_syms = NULL;
9683 struct plt_entry *ent;
9684
9685 if (!is_ppc_elf (ibfd))
9686 continue;
9687
9688 local_got = elf_local_got_offsets (ibfd);
9689 if (!local_got)
9690 continue;
9691
9692 symtab_hdr = &elf_symtab_hdr (ibfd);
9693 locsymcount = symtab_hdr->sh_info;
9694 end_local_got = local_got + locsymcount;
9695 local_plt = (struct plt_entry **) end_local_got;
9696 end_local_plt = local_plt + locsymcount;
9697 for (lplt = local_plt; lplt < end_local_plt; ++lplt)
9698 for (ent = *lplt; ent != NULL; ent = ent->next)
9699 {
9700 if (ent->plt.offset != (bfd_vma) -1)
9701 {
9702 Elf_Internal_Sym *sym;
9703 asection *sym_sec;
9704 asection *plt, *relplt;
9705 bfd_byte *loc;
9706 bfd_vma val;
9707 Elf_Internal_Rela rela;
8cd1fe1b 9708 unsigned char *p;
49c09209
AM
9709
9710 if (!get_sym_h (NULL, &sym, &sym_sec, NULL, &local_syms,
9711 lplt - local_plt, ibfd))
9712 {
9713 if (local_syms != NULL
9714 && symtab_hdr->contents != (unsigned char *) local_syms)
9715 free (local_syms);
9716 return FALSE;
9717 }
9718
9719 val = sym->st_value;
9720 if (sym_sec != NULL && sym_sec->output_section != NULL)
9721 val += sym_sec->output_offset + sym_sec->output_section->vma;
9722
2d7ad24e
AM
9723 if (ELF_ST_TYPE (sym->st_info) == STT_GNU_IFUNC)
9724 {
9725 htab->local_ifunc_resolver = 1;
9726 plt = htab->elf.iplt;
9727 relplt = htab->elf.irelplt;
9728 rela.r_info = ELF32_R_INFO (0, R_PPC_IRELATIVE);
9729 }
9730 else
9731 {
9732 plt = htab->pltlocal;
9733 if (bfd_link_pic (info))
9734 {
9735 relplt = htab->relpltlocal;
9736 rela.r_info = ELF32_R_INFO (0, R_PPC_RELATIVE);
9737 }
9738 else
9739 {
9740 loc = plt->contents + ent->plt.offset;
9741 bfd_put_32 (info->output_bfd, val, loc);
9742 continue;
9743 }
9744 }
49c09209
AM
9745
9746 rela.r_offset = (ent->plt.offset
9747 + plt->output_offset
9748 + plt->output_section->vma);
49c09209
AM
9749 rela.r_addend = val;
9750 loc = relplt->contents + (relplt->reloc_count++
9751 * sizeof (Elf32_External_Rela));
9752 bfd_elf32_swap_reloca_out (info->output_bfd, &rela, loc);
49c09209 9753
8cd1fe1b 9754 p = (unsigned char *) htab->glink->contents + ent->glink_offset;
49c09209 9755 write_glink_stub (NULL, ent, htab->elf.iplt, p, info);
49c09209
AM
9756 }
9757 }
9758
9759 if (local_syms != NULL
9760 && symtab_hdr->contents != (unsigned char *) local_syms)
9761 {
9762 if (!info->keep_memory)
9763 free (local_syms);
9764 else
9765 symtab_hdr->contents = (unsigned char *) local_syms;
9766 }
9767 }
9768 return TRUE;
9769}
9770
9771/* Finish up dynamic symbol handling. We set the contents of various
9772 dynamic sections here. */
9773
9774static bfd_boolean
9775ppc_elf_finish_dynamic_symbol (bfd *output_bfd,
9776 struct bfd_link_info *info,
9777 struct elf_link_hash_entry *h,
9778 Elf_Internal_Sym *sym)
9779{
9780 struct ppc_elf_link_hash_table *htab = ppc_elf_hash_table (info);
9781 struct plt_entry *ent;
9782
9783#ifdef DEBUG
9784 fprintf (stderr, "ppc_elf_finish_dynamic_symbol called for %s",
9785 h->root.root.string);
9786#endif
9787
9788 if (!h->def_regular
9789 || (h->type == STT_GNU_IFUNC && !bfd_link_pic (info)))
9790 for (ent = h->plt.plist; ent != NULL; ent = ent->next)
9791 if (ent->plt.offset != (bfd_vma) -1)
9792 {
9793 if (!h->def_regular)
9794 {
9795 /* Mark the symbol as undefined, rather than as
9796 defined in the .plt section. Leave the value if
9797 there were any relocations where pointer equality
9798 matters (this is a clue for the dynamic linker, to
9799 make function pointer comparisons work between an
9800 application and shared library), otherwise set it
9801 to zero. */
9802 sym->st_shndx = SHN_UNDEF;
9803 if (!h->pointer_equality_needed)
9804 sym->st_value = 0;
9805 else if (!h->ref_regular_nonweak)
9806 {
9807 /* This breaks function pointer comparisons, but
9808 that is better than breaking tests for a NULL
9809 function pointer. */
9810 sym->st_value = 0;
9811 }
9812 }
9813 else
9814 {
9815 /* Set the value of ifunc symbols in a non-pie
9816 executable to the glink entry. This is to avoid
9817 text relocations. We can't do this for ifunc in
9818 allocate_dynrelocs, as we do for normal dynamic
9819 function symbols with plt entries, because we need
9820 to keep the original value around for the ifunc
9821 relocation. */
9822 sym->st_shndx
9823 = (_bfd_elf_section_from_bfd_section
9824 (info->output_bfd, htab->glink->output_section));
9825 sym->st_value = (ent->glink_offset
9826 + htab->glink->output_offset
9827 + htab->glink->output_section->vma);
9828 }
9829 break;
9830 }
e1a9cb8e 9831
25dbc73a
AM
9832 if (h->needs_copy)
9833 {
9834 asection *s;
9835 Elf_Internal_Rela rela;
9836 bfd_byte *loc;
e1a9cb8e 9837
25dbc73a 9838 /* This symbols needs a copy reloc. Set it up. */
e1a9cb8e 9839
25dbc73a
AM
9840#ifdef DEBUG
9841 fprintf (stderr, ", copy");
9842#endif
e1a9cb8e 9843
25dbc73a 9844 BFD_ASSERT (h->dynindx != -1);
86bbe32f 9845
4dc4a9a5 9846 if (ppc_elf_hash_entry (h)->has_sda_refs)
25dbc73a 9847 s = htab->relsbss;
afbf7e8e 9848 else if (h->root.u.def.section == htab->elf.sdynrelro)
5474d94f 9849 s = htab->elf.sreldynrelro;
25dbc73a 9850 else
9d19e4fd 9851 s = htab->elf.srelbss;
25dbc73a 9852 BFD_ASSERT (s != NULL);
e1a9cb8e 9853
e87d4038 9854 rela.r_offset = SYM_VAL (h);
25dbc73a
AM
9855 rela.r_info = ELF32_R_INFO (h->dynindx, R_PPC_COPY);
9856 rela.r_addend = 0;
9857 loc = s->contents + s->reloc_count++ * sizeof (Elf32_External_Rela);
9858 bfd_elf32_swap_reloca_out (output_bfd, &rela, loc);
9859 }
e1a9cb8e 9860
25dbc73a
AM
9861#ifdef DEBUG
9862 fprintf (stderr, "\n");
9863#endif
e1a9cb8e 9864
25dbc73a
AM
9865 return TRUE;
9866}
9867\f
9868static enum elf_reloc_type_class
7e612e98
AM
9869ppc_elf_reloc_type_class (const struct bfd_link_info *info,
9870 const asection *rel_sec,
9871 const Elf_Internal_Rela *rela)
e1a9cb8e 9872{
7e612e98
AM
9873 struct ppc_elf_link_hash_table *htab = ppc_elf_hash_table (info);
9874
ce558b89 9875 if (rel_sec == htab->elf.irelplt)
7e612e98
AM
9876 return reloc_class_ifunc;
9877
25dbc73a
AM
9878 switch (ELF32_R_TYPE (rela->r_info))
9879 {
9880 case R_PPC_RELATIVE:
9881 return reloc_class_relative;
25dbc73a
AM
9882 case R_PPC_JMP_SLOT:
9883 return reloc_class_plt;
9884 case R_PPC_COPY:
9885 return reloc_class_copy;
9886 default:
9887 return reloc_class_normal;
9888 }
e1a9cb8e 9889}
25dbc73a
AM
9890\f
9891/* Finish up the dynamic sections. */
e1a9cb8e 9892
25dbc73a
AM
9893static bfd_boolean
9894ppc_elf_finish_dynamic_sections (bfd *output_bfd,
9895 struct bfd_link_info *info)
e1a9cb8e 9896{
25dbc73a
AM
9897 asection *sdyn;
9898 struct ppc_elf_link_hash_table *htab;
1fe44d79 9899 bfd_vma got;
e87d4038
AM
9900 bfd *dynobj;
9901 bfd_boolean ret = TRUE;
e1a9cb8e 9902
25dbc73a
AM
9903#ifdef DEBUG
9904 fprintf (stderr, "ppc_elf_finish_dynamic_sections called\n");
9905#endif
6b0817e5 9906
25dbc73a 9907 htab = ppc_elf_hash_table (info);
ce558b89 9908 dynobj = htab->elf.dynobj;
3d4d4302 9909 sdyn = bfd_get_linker_section (dynobj, ".dynamic");
e1a9cb8e 9910
1fe44d79
AM
9911 got = 0;
9912 if (htab->elf.hgot != NULL)
e87d4038 9913 got = SYM_VAL (htab->elf.hgot);
1fe44d79 9914
25dbc73a 9915 if (htab->elf.dynamic_sections_created)
e1a9cb8e 9916 {
25dbc73a 9917 Elf32_External_Dyn *dyncon, *dynconend;
e1a9cb8e 9918
ce558b89 9919 BFD_ASSERT (htab->elf.splt != NULL && sdyn != NULL);
86bbe32f 9920
25dbc73a
AM
9921 dyncon = (Elf32_External_Dyn *) sdyn->contents;
9922 dynconend = (Elf32_External_Dyn *) (sdyn->contents + sdyn->size);
9923 for (; dyncon < dynconend; dyncon++)
9924 {
9925 Elf_Internal_Dyn dyn;
9926 asection *s;
e1a9cb8e 9927
9d8504b1 9928 bfd_elf32_swap_dyn_in (dynobj, dyncon, &dyn);
86bbe32f 9929
25dbc73a
AM
9930 switch (dyn.d_tag)
9931 {
9932 case DT_PLTGOT:
9d8504b1 9933 if (htab->is_vxworks)
ce558b89 9934 s = htab->elf.sgotplt;
9d8504b1 9935 else
ce558b89 9936 s = htab->elf.splt;
25dbc73a
AM
9937 dyn.d_un.d_ptr = s->output_section->vma + s->output_offset;
9938 break;
86bbe32f 9939
25dbc73a 9940 case DT_PLTRELSZ:
ce558b89 9941 dyn.d_un.d_val = htab->elf.srelplt->size;
25dbc73a 9942 break;
e1a9cb8e 9943
25dbc73a 9944 case DT_JMPREL:
ce558b89 9945 s = htab->elf.srelplt;
25dbc73a
AM
9946 dyn.d_un.d_ptr = s->output_section->vma + s->output_offset;
9947 break;
2f89ff8d 9948
1fe44d79
AM
9949 case DT_PPC_GOT:
9950 dyn.d_un.d_ptr = got;
d7128ce4
AM
9951 break;
9952
82e66161
AM
9953 case DT_TEXTREL:
9954 if (htab->local_ifunc_resolver)
9955 info->callbacks->einfo
9956 (_("%X%P: text relocations and GNU indirect "
9957 "functions will result in a segfault at runtime\n"));
9958 else if (htab->maybe_local_ifunc_resolver)
9959 info->callbacks->einfo
9960 (_("%P: warning: text relocations and GNU indirect "
9961 "functions may result in a segfault at runtime\n"));
9962 continue;
9963
25dbc73a 9964 default:
7a2b07ff
NS
9965 if (htab->is_vxworks
9966 && elf_vxworks_finish_dynamic_entry (output_bfd, &dyn))
9967 break;
25dbc73a
AM
9968 continue;
9969 }
4c45e5c9 9970
25dbc73a
AM
9971 bfd_elf32_swap_dyn_out (output_bfd, &dyn, dyncon);
9972 }
9973 }
4c45e5c9 9974
6528b6eb
AM
9975 if (htab->elf.sgot != NULL
9976 && htab->elf.sgot->output_section != bfd_abs_section_ptr)
25dbc73a 9977 {
ce558b89
AM
9978 if (htab->elf.hgot->root.u.def.section == htab->elf.sgot
9979 || htab->elf.hgot->root.u.def.section == htab->elf.sgotplt)
e87d4038 9980 {
e79f5955 9981 unsigned char *p = htab->elf.hgot->root.u.def.section->contents;
2f89ff8d 9982
e87d4038
AM
9983 p += htab->elf.hgot->root.u.def.value;
9984 if (htab->plt_type == PLT_OLD)
e79f5955
AM
9985 {
9986 /* Add a blrl instruction at _GLOBAL_OFFSET_TABLE_-4
9987 so that a function can easily find the address of
9988 _GLOBAL_OFFSET_TABLE_. */
9989 BFD_ASSERT (htab->elf.hgot->root.u.def.value - 4
9990 < htab->elf.hgot->root.u.def.section->size);
9991 bfd_put_32 (output_bfd, 0x4e800021, p - 4);
9992 }
3b36f7e6 9993
e87d4038 9994 if (sdyn != NULL)
e79f5955
AM
9995 {
9996 bfd_vma val = sdyn->output_section->vma + sdyn->output_offset;
9997 BFD_ASSERT (htab->elf.hgot->root.u.def.value
9998 < htab->elf.hgot->root.u.def.section->size);
9999 bfd_put_32 (output_bfd, val, p);
10000 }
e87d4038
AM
10001 }
10002 else
10003 {
695344c0 10004 /* xgettext:c-format */
cf97bcb0
AM
10005 _bfd_error_handler (_("%s not defined in linker created %pA"),
10006 htab->elf.hgot->root.root.string,
10007 (htab->elf.sgotplt != NULL
10008 ? htab->elf.sgotplt : htab->elf.sgot));
e87d4038
AM
10009 bfd_set_error (bfd_error_bad_value);
10010 ret = FALSE;
10011 }
25dbc73a 10012
ce558b89 10013 elf_section_data (htab->elf.sgot->output_section)->this_hdr.sh_entsize = 4;
25dbc73a
AM
10014 }
10015
9d8504b1 10016 /* Fill in the first entry in the VxWorks procedure linkage table. */
6528b6eb
AM
10017 if (htab->is_vxworks
10018 && htab->elf.splt != NULL
10019 && htab->elf.splt->size != 0
10020 && htab->elf.splt->output_section != bfd_abs_section_ptr)
9d8504b1 10021 {
6528b6eb 10022 asection *splt = htab->elf.splt;
9d8504b1 10023 /* Use the right PLT. */
0e1862bb 10024 const bfd_vma *plt_entry = (bfd_link_pic (info)
5b914448
AM
10025 ? ppc_elf_vxworks_pic_plt0_entry
10026 : ppc_elf_vxworks_plt0_entry);
9d8504b1 10027
0e1862bb 10028 if (!bfd_link_pic (info))
9d8504b1 10029 {
e87d4038 10030 bfd_vma got_value = SYM_VAL (htab->elf.hgot);
9d8504b1 10031
e87d4038 10032 bfd_put_32 (output_bfd, plt_entry[0] | PPC_HA (got_value),
9d8504b1 10033 splt->contents + 0);
e87d4038 10034 bfd_put_32 (output_bfd, plt_entry[1] | PPC_LO (got_value),
9d8504b1
PB
10035 splt->contents + 4);
10036 }
10037 else
10038 {
10039 bfd_put_32 (output_bfd, plt_entry[0], splt->contents + 0);
10040 bfd_put_32 (output_bfd, plt_entry[1], splt->contents + 4);
10041 }
10042 bfd_put_32 (output_bfd, plt_entry[2], splt->contents + 8);
10043 bfd_put_32 (output_bfd, plt_entry[3], splt->contents + 12);
10044 bfd_put_32 (output_bfd, plt_entry[4], splt->contents + 16);
10045 bfd_put_32 (output_bfd, plt_entry[5], splt->contents + 20);
10046 bfd_put_32 (output_bfd, plt_entry[6], splt->contents + 24);
10047 bfd_put_32 (output_bfd, plt_entry[7], splt->contents + 28);
10048
0e1862bb 10049 if (! bfd_link_pic (info))
9d8504b1
PB
10050 {
10051 Elf_Internal_Rela rela;
10052 bfd_byte *loc;
10053
10054 loc = htab->srelplt2->contents;
10055
10056 /* Output the @ha relocation for the first instruction. */
ce558b89
AM
10057 rela.r_offset = (htab->elf.splt->output_section->vma
10058 + htab->elf.splt->output_offset
9d8504b1 10059 + 2);
636ce3f5 10060 rela.r_info = ELF32_R_INFO (htab->elf.hgot->indx, R_PPC_ADDR16_HA);
9d8504b1
PB
10061 rela.r_addend = 0;
10062 bfd_elf32_swap_reloca_out (output_bfd, &rela, loc);
10063 loc += sizeof (Elf32_External_Rela);
5b914448 10064
9d8504b1 10065 /* Output the @l relocation for the second instruction. */
ce558b89
AM
10066 rela.r_offset = (htab->elf.splt->output_section->vma
10067 + htab->elf.splt->output_offset
9d8504b1 10068 + 6);
636ce3f5 10069 rela.r_info = ELF32_R_INFO (htab->elf.hgot->indx, R_PPC_ADDR16_LO);
9d8504b1
PB
10070 rela.r_addend = 0;
10071 bfd_elf32_swap_reloca_out (output_bfd, &rela, loc);
10072 loc += sizeof (Elf32_External_Rela);
10073
10074 /* Fix up the remaining relocations. They may have the wrong
10075 symbol index for _G_O_T_ or _P_L_T_ depending on the order
10076 in which symbols were output. */
10077 while (loc < htab->srelplt2->contents + htab->srelplt2->size)
10078 {
10079 Elf_Internal_Rela rel;
10080
10081 bfd_elf32_swap_reloc_in (output_bfd, loc, &rel);
636ce3f5 10082 rel.r_info = ELF32_R_INFO (htab->elf.hgot->indx, R_PPC_ADDR16_HA);
9d8504b1
PB
10083 bfd_elf32_swap_reloc_out (output_bfd, &rel, loc);
10084 loc += sizeof (Elf32_External_Rela);
10085
10086 bfd_elf32_swap_reloc_in (output_bfd, loc, &rel);
636ce3f5 10087 rel.r_info = ELF32_R_INFO (htab->elf.hgot->indx, R_PPC_ADDR16_LO);
9d8504b1
PB
10088 bfd_elf32_swap_reloc_out (output_bfd, &rel, loc);
10089 loc += sizeof (Elf32_External_Rela);
10090
10091 bfd_elf32_swap_reloc_in (output_bfd, loc, &rel);
7325306f 10092 rel.r_info = ELF32_R_INFO (htab->elf.hplt->indx, R_PPC_ADDR32);
9d8504b1
PB
10093 bfd_elf32_swap_reloc_out (output_bfd, &rel, loc);
10094 loc += sizeof (Elf32_External_Rela);
10095 }
10096 }
10097 }
10098
e054468f
AM
10099 if (htab->glink != NULL
10100 && htab->glink->contents != NULL
10101 && htab->elf.dynamic_sections_created)
d7128ce4
AM
10102 {
10103 unsigned char *p;
10104 unsigned char *endp;
a6aa5195 10105 bfd_vma res0;
a6aa5195
AM
10106
10107 /*
10108 * PIC glink code is the following:
10109 *
10110 * # ith PLT code stub.
10111 * addis 11,30,(plt+(i-1)*4-got)@ha
10112 * lwz 11,(plt+(i-1)*4-got)@l(11)
10113 * mtctr 11
10114 * bctr
10115 *
10116 * # A table of branches, one for each plt entry.
176a0d42 10117 * # The idea is that the plt call stub loads ctr and r11 with these
a6aa5195
AM
10118 * # addresses, so (r11 - res_0) gives the plt index * 4.
10119 * res_0: b PLTresolve
10120 * res_1: b PLTresolve
10121 * .
10122 * # Some number of entries towards the end can be nops
10123 * res_n_m3: nop
10124 * res_n_m2: nop
10125 * res_n_m1:
10126 *
10127 * PLTresolve:
10128 * addis 11,11,(1f-res_0)@ha
10129 * mflr 0
10130 * bcl 20,31,1f
10131 * 1: addi 11,11,(1b-res_0)@l
10132 * mflr 12
10133 * mtlr 0
07d6d2b8 10134 * sub 11,11,12 # r11 = index * 4
a6aa5195 10135 * addis 12,12,(got+4-1b)@ha
07d6d2b8
AM
10136 * lwz 0,(got+4-1b)@l(12) # got[1] address of dl_runtime_resolve
10137 * lwz 12,(got+8-1b)@l(12) # got[2] contains the map address
a6aa5195
AM
10138 * mtctr 0
10139 * add 0,11,11
07d6d2b8 10140 * add 11,0,11 # r11 = index * 12 = reloc offset.
a6aa5195 10141 * bctr
9e390558 10142 *
176a0d42
AM
10143 * Non-PIC glink code is a little simpler.
10144 *
10145 * # ith PLT code stub.
10146 * lis 11,(plt+(i-1)*4)@ha
10147 * lwz 11,(plt+(i-1)*4)@l(11)
10148 * mtctr 11
10149 * bctr
10150 *
10151 * The branch table is the same, then comes
10152 *
10153 * PLTresolve:
10154 * lis 12,(got+4)@ha
10155 * addis 11,11,(-res_0)@ha
07d6d2b8
AM
10156 * lwz 0,(got+4)@l(12) # got[1] address of dl_runtime_resolve
10157 * addi 11,11,(-res_0)@l # r11 = index * 4
176a0d42
AM
10158 * mtctr 0
10159 * add 0,11,11
07d6d2b8
AM
10160 * lwz 12,(got+8)@l(12) # got[2] contains the map address
10161 * add 11,0,11 # r11 = index * 12 = reloc offset.
176a0d42
AM
10162 * bctr
10163 */
7e8aeb9a 10164
a6aa5195 10165 /* Build the branch table, one for each plt entry (less one),
86b9da88 10166 and perhaps some padding. */
a6aa5195
AM
10167 p = htab->glink->contents;
10168 p += htab->glink_pltresolve;
86b9da88
AM
10169 endp = htab->glink->contents;
10170 endp += htab->glink->size - GLINK_PLTRESOLVE;
da3a2088 10171 while (p < endp - (htab->params->ppc476_workaround ? 0 : 8 * 4))
86b9da88
AM
10172 {
10173 bfd_put_32 (output_bfd, B + endp - p, p);
10174 p += 4;
10175 }
10176 while (p < endp)
10177 {
10178 bfd_put_32 (output_bfd, NOP, p);
10179 p += 4;
10180 }
10181
7e8aeb9a 10182 res0 = (htab->glink_pltresolve
86b9da88
AM
10183 + htab->glink->output_section->vma
10184 + htab->glink->output_offset);
10185
da3a2088
AM
10186 if (htab->params->ppc476_workaround)
10187 {
10188 /* Ensure that a call stub at the end of a page doesn't
10189 result in prefetch over the end of the page into the
10190 glink branch table. */
10191 bfd_vma pagesize = (bfd_vma) 1 << htab->params->pagesize_p2;
10192 bfd_vma page_addr;
10193 bfd_vma glink_start = (htab->glink->output_section->vma
10194 + htab->glink->output_offset);
10195
10196 for (page_addr = res0 & -pagesize;
10197 page_addr > glink_start;
10198 page_addr -= pagesize)
10199 {
10200 /* We have a plt call stub that may need fixing. */
10201 bfd_byte *loc;
10202 unsigned int insn;
10203
10204 loc = htab->glink->contents + page_addr - 4 - glink_start;
10205 insn = bfd_get_32 (output_bfd, loc);
10206 if (insn == BCTR)
10207 {
10208 /* By alignment, we know that there must be at least
10209 one other call stub before this one. */
10210 insn = bfd_get_32 (output_bfd, loc - 16);
10211 if (insn == BCTR)
10212 bfd_put_32 (output_bfd, B | (-16 & 0x3fffffc), loc);
10213 else
10214 bfd_put_32 (output_bfd, B | (-20 & 0x3fffffc), loc);
10215 }
10216 }
10217 }
10218
86b9da88 10219 /* Last comes the PLTresolve stub. */
9e390558 10220 endp = p + GLINK_PLTRESOLVE;
0e1862bb 10221 if (bfd_link_pic (info))
7e8aeb9a 10222 {
a6aa5195 10223 bfd_vma bcl;
d7128ce4 10224
a6aa5195
AM
10225 bcl = (htab->glink->size - GLINK_PLTRESOLVE + 3*4
10226 + htab->glink->output_section->vma
10227 + htab->glink->output_offset);
10228
9e390558
AM
10229 bfd_put_32 (output_bfd, ADDIS_11_11 + PPC_HA (bcl - res0), p);
10230 p += 4;
10231 bfd_put_32 (output_bfd, MFLR_0, p);
10232 p += 4;
10233 bfd_put_32 (output_bfd, BCL_20_31, p);
10234 p += 4;
10235 bfd_put_32 (output_bfd, ADDI_11_11 + PPC_LO (bcl - res0), p);
10236 p += 4;
10237 bfd_put_32 (output_bfd, MFLR_12, p);
10238 p += 4;
10239 bfd_put_32 (output_bfd, MTLR_0, p);
10240 p += 4;
10241 bfd_put_32 (output_bfd, SUB_11_11_12, p);
10242 p += 4;
10243 bfd_put_32 (output_bfd, ADDIS_12_12 + PPC_HA (got + 4 - bcl), p);
10244 p += 4;
a6aa5195
AM
10245 if (PPC_HA (got + 4 - bcl) == PPC_HA (got + 8 - bcl))
10246 {
9e390558
AM
10247 bfd_put_32 (output_bfd, LWZ_0_12 + PPC_LO (got + 4 - bcl), p);
10248 p += 4;
10249 bfd_put_32 (output_bfd, LWZ_12_12 + PPC_LO (got + 8 - bcl), p);
10250 p += 4;
a6aa5195
AM
10251 }
10252 else
10253 {
9e390558
AM
10254 bfd_put_32 (output_bfd, LWZU_0_12 + PPC_LO (got + 4 - bcl), p);
10255 p += 4;
10256 bfd_put_32 (output_bfd, LWZ_12_12 + 4, p);
10257 p += 4;
a6aa5195 10258 }
9e390558
AM
10259 bfd_put_32 (output_bfd, MTCTR_0, p);
10260 p += 4;
10261 bfd_put_32 (output_bfd, ADD_0_11_11, p);
7e8aeb9a
AM
10262 }
10263 else
d7128ce4 10264 {
9e390558
AM
10265 bfd_put_32 (output_bfd, LIS_12 + PPC_HA (got + 4), p);
10266 p += 4;
10267 bfd_put_32 (output_bfd, ADDIS_11_11 + PPC_HA (-res0), p);
10268 p += 4;
a6aa5195 10269 if (PPC_HA (got + 4) == PPC_HA (got + 8))
9e390558 10270 bfd_put_32 (output_bfd, LWZ_0_12 + PPC_LO (got + 4), p);
a6aa5195 10271 else
9e390558
AM
10272 bfd_put_32 (output_bfd, LWZU_0_12 + PPC_LO (got + 4), p);
10273 p += 4;
10274 bfd_put_32 (output_bfd, ADDI_11_11 + PPC_LO (-res0), p);
10275 p += 4;
10276 bfd_put_32 (output_bfd, MTCTR_0, p);
10277 p += 4;
10278 bfd_put_32 (output_bfd, ADD_0_11_11, p);
10279 p += 4;
10280 if (PPC_HA (got + 4) == PPC_HA (got + 8))
10281 bfd_put_32 (output_bfd, LWZ_12_12 + PPC_LO (got + 8), p);
10282 else
10283 bfd_put_32 (output_bfd, LWZ_12_12 + 4, p);
10284 }
10285 p += 4;
10286 bfd_put_32 (output_bfd, ADD_11_0_11, p);
10287 p += 4;
407aa07c
AM
10288 bfd_put_32 (output_bfd, BCTR, p);
10289 p += 4;
9e390558
AM
10290 while (p < endp)
10291 {
10292 bfd_put_32 (output_bfd,
10293 htab->params->ppc476_workaround ? BA : NOP, p);
10294 p += 4;
d7128ce4 10295 }
9e390558 10296 BFD_ASSERT (p == endp);
d7128ce4
AM
10297 }
10298
6177242a
AM
10299 if (htab->glink_eh_frame != NULL
10300 && htab->glink_eh_frame->contents != NULL)
10301 {
10302 unsigned char *p = htab->glink_eh_frame->contents;
10303 bfd_vma val;
10304
6177242a
AM
10305 p += sizeof (glink_eh_frame_cie);
10306 /* FDE length. */
6177242a
AM
10307 p += 4;
10308 /* CIE pointer. */
6177242a
AM
10309 p += 4;
10310 /* Offset to .glink. */
10311 val = (htab->glink->output_section->vma
10312 + htab->glink->output_offset);
10313 val -= (htab->glink_eh_frame->output_section->vma
10314 + htab->glink_eh_frame->output_offset);
10315 val -= p - htab->glink_eh_frame->contents;
10316 bfd_put_32 (htab->elf.dynobj, val, p);
6177242a 10317
dbaa2011 10318 if (htab->glink_eh_frame->sec_info_type == SEC_INFO_TYPE_EH_FRAME
6177242a
AM
10319 && !_bfd_elf_write_section_eh_frame (output_bfd, info,
10320 htab->glink_eh_frame,
10321 htab->glink_eh_frame->contents))
10322 return FALSE;
10323 }
10324
e87d4038 10325 return ret;
25dbc73a 10326}
e1a9cb8e 10327\f
6d00b590 10328#define TARGET_LITTLE_SYM powerpc_elf32_le_vec
252b5132 10329#define TARGET_LITTLE_NAME "elf32-powerpcle"
6d00b590 10330#define TARGET_BIG_SYM powerpc_elf32_vec
252b5132
RH
10331#define TARGET_BIG_NAME "elf32-powerpc"
10332#define ELF_ARCH bfd_arch_powerpc
ae95ffa6 10333#define ELF_TARGET_ID PPC32_ELF_DATA
252b5132
RH
10334#define ELF_MACHINE_CODE EM_PPC
10335#define ELF_MAXPAGESIZE 0x10000
702d1671
AM
10336#define ELF_COMMONPAGESIZE 0x1000
10337#define ELF_RELROPAGESIZE ELF_MAXPAGESIZE
252b5132
RH
10338#define elf_info_to_howto ppc_elf_info_to_howto
10339
10340#ifdef EM_CYGNUS_POWERPC
10341#define ELF_MACHINE_ALT1 EM_CYGNUS_POWERPC
10342#endif
10343
10344#ifdef EM_PPC_OLD
10345#define ELF_MACHINE_ALT2 EM_PPC_OLD
10346#endif
10347
10348#define elf_backend_plt_not_loaded 1
5474d94f 10349#define elf_backend_want_dynrelro 1
252b5132 10350#define elf_backend_can_gc_sections 1
51b64d56 10351#define elf_backend_can_refcount 1
b491616a 10352#define elf_backend_rela_normal 1
53291d1f 10353#define elf_backend_caches_rawsize 1
252b5132 10354
43c40ab2 10355#define bfd_elf32_mkobject ppc_elf_mkobject
252b5132 10356#define bfd_elf32_bfd_merge_private_bfd_data ppc_elf_merge_private_bfd_data
70bccea4 10357#define bfd_elf32_bfd_relax_section ppc_elf_relax_section
252b5132 10358#define bfd_elf32_bfd_reloc_type_lookup ppc_elf_reloc_type_lookup
b9c361e0 10359#define bfd_elf32_bfd_reloc_name_lookup ppc_elf_reloc_name_lookup
252b5132 10360#define bfd_elf32_bfd_set_private_flags ppc_elf_set_private_flags
70bccea4 10361#define bfd_elf32_bfd_link_hash_table_create ppc_elf_link_hash_table_create
468392fb 10362#define bfd_elf32_get_synthetic_symtab ppc_elf_get_synthetic_symtab
252b5132 10363
feee612b 10364#define elf_backend_object_p ppc_elf_object_p
252b5132 10365#define elf_backend_gc_mark_hook ppc_elf_gc_mark_hook
252b5132
RH
10366#define elf_backend_section_from_shdr ppc_elf_section_from_shdr
10367#define elf_backend_relocate_section ppc_elf_relocate_section
10368#define elf_backend_create_dynamic_sections ppc_elf_create_dynamic_sections
10369#define elf_backend_check_relocs ppc_elf_check_relocs
c0e331c7 10370#define elf_backend_relocs_compatible _bfd_elf_relocs_compatible
7fce784e 10371#define elf_backend_copy_indirect_symbol ppc_elf_copy_indirect_symbol
252b5132
RH
10372#define elf_backend_adjust_dynamic_symbol ppc_elf_adjust_dynamic_symbol
10373#define elf_backend_add_symbol_hook ppc_elf_add_symbol_hook
10374#define elf_backend_size_dynamic_sections ppc_elf_size_dynamic_sections
0eb4a168 10375#define elf_backend_hash_symbol ppc_elf_hash_symbol
252b5132
RH
10376#define elf_backend_finish_dynamic_symbol ppc_elf_finish_dynamic_symbol
10377#define elf_backend_finish_dynamic_sections ppc_elf_finish_dynamic_sections
10378#define elf_backend_fake_sections ppc_elf_fake_sections
10379#define elf_backend_additional_program_headers ppc_elf_additional_program_headers
954b63d4 10380#define elf_backend_modify_segment_map ppc_elf_modify_segment_map
c5fccbec
DJ
10381#define elf_backend_grok_prstatus ppc_elf_grok_prstatus
10382#define elf_backend_grok_psinfo ppc_elf_grok_psinfo
183e98be 10383#define elf_backend_write_core_note ppc_elf_write_core_note
29c2fb7c 10384#define elf_backend_reloc_type_class ppc_elf_reloc_type_class
70bccea4
AM
10385#define elf_backend_begin_write_processing ppc_elf_begin_write_processing
10386#define elf_backend_final_write_processing ppc_elf_final_write_processing
10387#define elf_backend_write_section ppc_elf_write_section
551b43fd 10388#define elf_backend_get_sec_type_attr ppc_elf_get_sec_type_attr
4c45e5c9 10389#define elf_backend_plt_sym_val ppc_elf_plt_sym_val
8a696751 10390#define elf_backend_action_discarded ppc_elf_action_discarded
74541ad4 10391#define elf_backend_init_index_section _bfd_elf_init_1_index_section
b9c361e0 10392#define elf_backend_lookup_section_flags_hook ppc_elf_lookup_section_flags
252b5132
RH
10393
10394#include "elf32-target.h"
9d8504b1 10395
7b8e7dad
AM
10396/* FreeBSD Target */
10397
10398#undef TARGET_LITTLE_SYM
10399#undef TARGET_LITTLE_NAME
10400
10401#undef TARGET_BIG_SYM
6d00b590 10402#define TARGET_BIG_SYM powerpc_elf32_fbsd_vec
7b8e7dad
AM
10403#undef TARGET_BIG_NAME
10404#define TARGET_BIG_NAME "elf32-powerpc-freebsd"
10405
10406#undef ELF_OSABI
10407#define ELF_OSABI ELFOSABI_FREEBSD
10408
10409#undef elf32_bed
10410#define elf32_bed elf32_powerpc_fbsd_bed
10411
10412#include "elf32-target.h"
10413
9d8504b1
PB
10414/* VxWorks Target */
10415
10416#undef TARGET_LITTLE_SYM
10417#undef TARGET_LITTLE_NAME
10418
10419#undef TARGET_BIG_SYM
6d00b590 10420#define TARGET_BIG_SYM powerpc_elf32_vxworks_vec
9d8504b1
PB
10421#undef TARGET_BIG_NAME
10422#define TARGET_BIG_NAME "elf32-powerpc-vxworks"
10423
7b8e7dad
AM
10424#undef ELF_OSABI
10425
d5e3d971
PB
10426/* VxWorks uses the elf default section flags for .plt. */
10427static const struct bfd_elf_special_section *
4aef7643 10428ppc_elf_vxworks_get_sec_type_attr (bfd *abfd, asection *sec)
9d8504b1 10429{
d5e3d971
PB
10430 if (sec->name == NULL)
10431 return NULL;
10432
10433 if (strcmp (sec->name, ".plt") == 0)
10434 return _bfd_elf_get_sec_type_attr (abfd, sec);
10435
10436 return ppc_elf_get_sec_type_attr (abfd, sec);
10437}
9d8504b1
PB
10438
10439/* Like ppc_elf_link_hash_table_create, but overrides
10440 appropriately for VxWorks. */
10441static struct bfd_link_hash_table *
10442ppc_elf_vxworks_link_hash_table_create (bfd *abfd)
10443{
10444 struct bfd_link_hash_table *ret;
10445
10446 ret = ppc_elf_link_hash_table_create (abfd);
10447 if (ret)
10448 {
10449 struct ppc_elf_link_hash_table *htab
954b63d4 10450 = (struct ppc_elf_link_hash_table *)ret;
9d8504b1 10451 htab->is_vxworks = 1;
4a3dc543 10452 htab->plt_type = PLT_VXWORKS;
9d8504b1
PB
10453 htab->plt_entry_size = VXWORKS_PLT_ENTRY_SIZE;
10454 htab->plt_slot_size = VXWORKS_PLT_ENTRY_SIZE;
10455 htab->plt_initial_entry_size = VXWORKS_PLT_INITIAL_ENTRY_SIZE;
10456 }
10457 return ret;
10458}
10459
10460/* Tweak magic VxWorks symbols as they are loaded. */
10461static bfd_boolean
10462ppc_elf_vxworks_add_symbol_hook (bfd *abfd,
10463 struct bfd_link_info *info,
10464 Elf_Internal_Sym *sym,
4aef7643
AM
10465 const char **namep,
10466 flagword *flagsp,
9d8504b1
PB
10467 asection **secp,
10468 bfd_vma *valp)
10469{
4aef7643
AM
10470 if (!elf_vxworks_add_symbol_hook (abfd, info, sym, namep, flagsp, secp,
10471 valp))
9d8504b1
PB
10472 return FALSE;
10473
4aef7643 10474 return ppc_elf_add_symbol_hook (abfd, info, sym, namep, flagsp, secp, valp);
9d8504b1
PB
10475}
10476
cc364be6
AM
10477static bfd_boolean
10478ppc_elf_vxworks_final_write_processing (bfd *abfd)
9d8504b1 10479{
cc364be6
AM
10480 ppc_final_write_processing (abfd);
10481 return elf_vxworks_final_write_processing (abfd);
9d8504b1
PB
10482}
10483
10484/* On VxWorks, we emit relocations against _PROCEDURE_LINKAGE_TABLE_, so
10485 define it. */
10486#undef elf_backend_want_plt_sym
10487#define elf_backend_want_plt_sym 1
10488#undef elf_backend_want_got_plt
10489#define elf_backend_want_got_plt 1
10490#undef elf_backend_got_symbol_offset
10491#define elf_backend_got_symbol_offset 0
10492#undef elf_backend_plt_not_loaded
10493#define elf_backend_plt_not_loaded 0
10494#undef elf_backend_plt_readonly
10495#define elf_backend_plt_readonly 1
10496#undef elf_backend_got_header_size
10497#define elf_backend_got_header_size 12
64f52338
AM
10498#undef elf_backend_dtrel_excludes_plt
10499#define elf_backend_dtrel_excludes_plt 1
9d8504b1 10500
468392fb
AM
10501#undef bfd_elf32_get_synthetic_symtab
10502
9d8504b1
PB
10503#undef bfd_elf32_bfd_link_hash_table_create
10504#define bfd_elf32_bfd_link_hash_table_create \
10505 ppc_elf_vxworks_link_hash_table_create
9d8504b1
PB
10506#undef elf_backend_add_symbol_hook
10507#define elf_backend_add_symbol_hook \
10508 ppc_elf_vxworks_add_symbol_hook
10509#undef elf_backend_link_output_symbol_hook
10510#define elf_backend_link_output_symbol_hook \
9c72ff84 10511 elf_vxworks_link_output_symbol_hook
9d8504b1
PB
10512#undef elf_backend_final_write_processing
10513#define elf_backend_final_write_processing \
10514 ppc_elf_vxworks_final_write_processing
d5e3d971
PB
10515#undef elf_backend_get_sec_type_attr
10516#define elf_backend_get_sec_type_attr \
10517 ppc_elf_vxworks_get_sec_type_attr
9d8504b1
PB
10518#undef elf_backend_emit_relocs
10519#define elf_backend_emit_relocs \
10520 elf_vxworks_emit_relocs
10521
10522#undef elf32_bed
10523#define elf32_bed ppc_elf_vxworks_bed
10524
10525#include "elf32-target.h"
This page took 2.280196 seconds and 4 git commands to generate.