Automatic date update in version.in
[deliverable/binutils-gdb.git] / bfd / elf32-ppc.c
CommitLineData
252b5132 1/* PowerPC-specific support for 32-bit ELF
250d07de 2 Copyright (C) 1994-2021 Free Software Foundation, Inc.
252b5132
RH
3 Written by Ian Lance Taylor, Cygnus Support.
4
ae9a127f 5 This file is part of BFD, the Binary File Descriptor library.
252b5132 6
ae9a127f
NC
7 This program is free software; you can redistribute it and/or modify
8 it under the terms of the GNU General Public License as published by
cd123cb7 9 the Free Software Foundation; either version 3 of the License, or
ae9a127f 10 (at your option) any later version.
252b5132 11
ae9a127f
NC
12 This program is distributed in the hope that it will be useful,
13 but WITHOUT ANY WARRANTY; without even the implied warranty of
14 MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
15 GNU General Public License for more details.
252b5132 16
ae9a127f 17 You should have received a copy of the GNU General Public License
fc0bffd6 18 along with this program; if not, write to the
3e110533 19 Free Software Foundation, Inc., 51 Franklin Street - Fifth Floor,
53e09e0a 20 Boston, MA 02110-1301, USA. */
252b5132 21
4bd7c902 22/* Don't generate unused section symbols. */
0a1b45a2 23#define TARGET_KEEP_UNUSED_SECTION_SYMBOLS false
252b5132 24
3db64b00 25#include "sysdep.h"
183e98be 26#include <stdarg.h>
252b5132 27#include "bfd.h"
252b5132
RH
28#include "bfdlink.h"
29#include "libbfd.h"
30#include "elf-bfd.h"
31#include "elf/ppc.h"
7619e7c7 32#include "elf32-ppc.h"
9d8504b1 33#include "elf-vxworks.h"
6177242a 34#include "dwarf2.h"
08dc996f 35#include "opcode/ppc.h"
252b5132 36
bb294208
AM
37/* All users of this file have bfd_octets_per_byte (abfd, sec) == 1. */
38#define OCTETS_PER_BYTE(ABFD, SEC) 1
39
b9c361e0
JL
40typedef enum split16_format_type
41{
42 split16a_type = 0,
43 split16d_type
44}
45split16_format_type;
46
f0fe0e16 47/* RELA relocations are used here. */
252b5132 48
252b5132 49static bfd_reloc_status_type ppc_elf_addr16_ha_reloc
55fd94b0 50 (bfd *, arelent *, asymbol *, void *, asection *, bfd *, char **);
7619e7c7 51static bfd_reloc_status_type ppc_elf_unhandled_reloc
55fd94b0 52 (bfd *, arelent *, asymbol *, void *, asection *, bfd *, char **);
252b5132 53
70bccea4
AM
54/* Branch prediction bit for branch taken relocs. */
55#define BRANCH_PREDICT_BIT 0x200000
56/* Mask to set RA in memory instructions. */
57#define RA_REGISTER_MASK 0x001f0000
58/* Value to shift register by to insert RA. */
59#define RA_REGISTER_SHIFT 16
252b5132
RH
60
61/* The name of the dynamic interpreter. This is put in the .interp
62 section. */
252b5132
RH
63#define ELF_DYNAMIC_INTERPRETER "/usr/lib/ld.so.1"
64
d7128ce4 65/* For old-style PLT. */
252b5132
RH
66/* The number of single-slot PLT entries (the rest use two slots). */
67#define PLT_NUM_SINGLE_ENTRIES 8192
68
d7128ce4 69/* For new-style .glink and .plt. */
a6aa5195 70#define GLINK_PLTRESOLVE 16*4
9e390558 71#define GLINK_ENTRY_SIZE(htab, h) \
407aa07c 72 ((4*4 \
9e390558
AM
73 + (h != NULL \
74 && h == htab->tls_get_addr \
75 && !htab->params->no_tls_get_addr_opt ? 8*4 : 0) \
76 + (1u << htab->params->plt_stub_align) - 1) \
77 & -(1u << htab->params->plt_stub_align))
d7128ce4 78
9d8504b1
PB
79/* VxWorks uses its own plt layout, filled in by the static linker. */
80
81/* The standard VxWorks PLT entry. */
82#define VXWORKS_PLT_ENTRY_SIZE 32
83static const bfd_vma ppc_elf_vxworks_plt_entry
84 [VXWORKS_PLT_ENTRY_SIZE / 4] =
85 {
07d6d2b8
AM
86 0x3d800000, /* lis r12,0 */
87 0x818c0000, /* lwz r12,0(r12) */
88 0x7d8903a6, /* mtctr r12 */
89 0x4e800420, /* bctr */
90 0x39600000, /* li r11,0 */
91 0x48000000, /* b 14 <.PLT0resolve+0x4> */
92 0x60000000, /* nop */
93 0x60000000, /* nop */
9d8504b1
PB
94 };
95static const bfd_vma ppc_elf_vxworks_pic_plt_entry
96 [VXWORKS_PLT_ENTRY_SIZE / 4] =
97 {
98 0x3d9e0000, /* addis r12,r30,0 */
99 0x818c0000, /* lwz r12,0(r12) */
100 0x7d8903a6, /* mtctr r12 */
101 0x4e800420, /* bctr */
102 0x39600000, /* li r11,0 */
103 0x48000000, /* b 14 <.PLT0resolve+0x4> 14: R_PPC_REL24 .PLTresolve */
104 0x60000000, /* nop */
105 0x60000000, /* nop */
106 };
107
108/* The initial VxWorks PLT entry. */
109#define VXWORKS_PLT_INITIAL_ENTRY_SIZE 32
110static const bfd_vma ppc_elf_vxworks_plt0_entry
111 [VXWORKS_PLT_INITIAL_ENTRY_SIZE / 4] =
112 {
07d6d2b8
AM
113 0x3d800000, /* lis r12,0 */
114 0x398c0000, /* addi r12,r12,0 */
115 0x800c0008, /* lwz r0,8(r12) */
116 0x7c0903a6, /* mtctr r0 */
117 0x818c0004, /* lwz r12,4(r12) */
118 0x4e800420, /* bctr */
119 0x60000000, /* nop */
120 0x60000000, /* nop */
9d8504b1
PB
121 };
122static const bfd_vma ppc_elf_vxworks_pic_plt0_entry
123 [VXWORKS_PLT_INITIAL_ENTRY_SIZE / 4] =
124 {
125 0x819e0008, /* lwz r12,8(r30) */
07d6d2b8 126 0x7d8903a6, /* mtctr r12 */
9d8504b1 127 0x819e0004, /* lwz r12,4(r30) */
07d6d2b8
AM
128 0x4e800420, /* bctr */
129 0x60000000, /* nop */
130 0x60000000, /* nop */
131 0x60000000, /* nop */
132 0x60000000, /* nop */
9d8504b1
PB
133 };
134
135/* For executables, we have some additional relocations in
136 .rela.plt.unloaded, for the kernel loader. */
137
138/* The number of non-JMP_SLOT relocations per PLT0 slot. */
139#define VXWORKS_PLT_NON_JMP_SLOT_RELOCS 3
140/* The number of relocations in the PLTResolve slot. */
141#define VXWORKS_PLTRESOLVE_RELOCS 2
de194d85 142/* The number of relocations in the PLTResolve slot when creating
9d8504b1
PB
143 a shared library. */
144#define VXWORKS_PLTRESOLVE_RELOCS_SHLIB 0
145
d7128ce4 146/* Some instructions. */
d7128ce4 147#define ADDIS_11_11 0x3d6b0000
a6aa5195
AM
148#define ADDIS_11_30 0x3d7e0000
149#define ADDIS_12_12 0x3d8c0000
d7128ce4 150#define ADDI_11_11 0x396b0000
d7128ce4 151#define ADD_0_11_11 0x7c0b5a14
a7f2871e 152#define ADD_3_12_2 0x7c6c1214
d7128ce4 153#define ADD_11_0_11 0x7d605a14
a6aa5195 154#define B 0x48000000
da3a2088 155#define BA 0x48000002
a6aa5195 156#define BCL_20_31 0x429f0005
d7128ce4 157#define BCTR 0x4e800420
a7f2871e
AM
158#define BEQLR 0x4d820020
159#define CMPWI_11_0 0x2c0b0000
7e8aeb9a
AM
160#define LIS_11 0x3d600000
161#define LIS_12 0x3d800000
a6aa5195
AM
162#define LWZU_0_12 0x840c0000
163#define LWZ_0_12 0x800c0000
a7f2871e 164#define LWZ_11_3 0x81630000
a6aa5195
AM
165#define LWZ_11_11 0x816b0000
166#define LWZ_11_30 0x817e0000
a7f2871e 167#define LWZ_12_3 0x81830000
a6aa5195 168#define LWZ_12_12 0x818c0000
a7f2871e
AM
169#define MR_0_3 0x7c601b78
170#define MR_3_0 0x7c030378
a6aa5195
AM
171#define MFLR_0 0x7c0802a6
172#define MFLR_12 0x7d8802a6
173#define MTCTR_0 0x7c0903a6
174#define MTCTR_11 0x7d6903a6
175#define MTLR_0 0x7c0803a6
176#define NOP 0x60000000
177#define SUB_11_11_12 0x7d6c5850
7619e7c7
AM
178
179/* Offset of tp and dtp pointers from start of TLS block. */
180#define TP_OFFSET 0x7000
181#define DTP_OFFSET 0x8000
e87d4038
AM
182
183/* The value of a defined global symbol. */
184#define SYM_VAL(SYM) \
185 ((SYM)->root.u.def.section->output_section->vma \
186 + (SYM)->root.u.def.section->output_offset \
187 + (SYM)->root.u.def.value)
7fce784e 188\f
46807bf4
AM
189/* Relocation HOWTO's. */
190/* Like other ELF RELA targets that don't apply multiple
191 field-altering relocations to the same localation, src_mask is
192 always zero and pcrel_offset is the same as pc_relative.
193 PowerPC can always use a zero bitpos, even when the field is not at
194 the LSB. For example, a REL24 could use rightshift=2, bisize=24
195 and bitpos=2 which matches the ABI description, or as we do here,
196 rightshift=0, bitsize=26 and bitpos=0. */
197#define HOW(type, size, bitsize, mask, rightshift, pc_relative, \
198 complain, special_func) \
199 HOWTO (type, rightshift, size, bitsize, pc_relative, 0, \
200 complain_overflow_ ## complain, special_func, \
0a1b45a2 201 #type, false, 0, mask, pc_relative)
46807bf4 202
e47cd125 203static reloc_howto_type *ppc_elf_howto_table[R_PPC_max];
252b5132 204
8da6118f 205static reloc_howto_type ppc_elf_howto_raw[] = {
252b5132 206 /* This reloc does nothing. */
0a1b45a2 207 HOW (R_PPC_NONE, 3, 0, 0, 0, false, dont,
46807bf4 208 bfd_elf_generic_reloc),
252b5132
RH
209
210 /* A standard 32 bit relocation. */
0a1b45a2 211 HOW (R_PPC_ADDR32, 2, 32, 0xffffffff, 0, false, dont,
46807bf4 212 bfd_elf_generic_reloc),
252b5132
RH
213
214 /* An absolute 26 bit branch; the lower two bits must be zero.
215 FIXME: we don't check that, we just clear them. */
0a1b45a2 216 HOW (R_PPC_ADDR24, 2, 26, 0x3fffffc, 0, false, signed,
46807bf4 217 bfd_elf_generic_reloc),
252b5132
RH
218
219 /* A standard 16 bit relocation. */
0a1b45a2 220 HOW (R_PPC_ADDR16, 1, 16, 0xffff, 0, false, bitfield,
46807bf4 221 bfd_elf_generic_reloc),
252b5132
RH
222
223 /* A 16 bit relocation without overflow. */
0a1b45a2 224 HOW (R_PPC_ADDR16_LO, 1, 16, 0xffff, 0, false, dont,
46807bf4 225 bfd_elf_generic_reloc),
252b5132
RH
226
227 /* The high order 16 bits of an address. */
0a1b45a2 228 HOW (R_PPC_ADDR16_HI, 1, 16, 0xffff, 16, false, dont,
46807bf4 229 bfd_elf_generic_reloc),
252b5132
RH
230
231 /* The high order 16 bits of an address, plus 1 if the contents of
8da6118f 232 the low 16 bits, treated as a signed number, is negative. */
0a1b45a2 233 HOW (R_PPC_ADDR16_HA, 1, 16, 0xffff, 16, false, dont,
46807bf4 234 ppc_elf_addr16_ha_reloc),
252b5132
RH
235
236 /* An absolute 16 bit branch; the lower two bits must be zero.
237 FIXME: we don't check that, we just clear them. */
0a1b45a2 238 HOW (R_PPC_ADDR14, 2, 16, 0xfffc, 0, false, signed,
46807bf4 239 bfd_elf_generic_reloc),
252b5132
RH
240
241 /* An absolute 16 bit branch, for which bit 10 should be set to
242 indicate that the branch is expected to be taken. The lower two
8da6118f 243 bits must be zero. */
0a1b45a2 244 HOW (R_PPC_ADDR14_BRTAKEN, 2, 16, 0xfffc, 0, false, signed,
46807bf4 245 bfd_elf_generic_reloc),
252b5132
RH
246
247 /* An absolute 16 bit branch, for which bit 10 should be set to
248 indicate that the branch is not expected to be taken. The lower
249 two bits must be zero. */
0a1b45a2 250 HOW (R_PPC_ADDR14_BRNTAKEN, 2, 16, 0xfffc, 0, false, signed,
46807bf4 251 bfd_elf_generic_reloc),
252b5132 252
8da6118f 253 /* A relative 26 bit branch; the lower two bits must be zero. */
0a1b45a2 254 HOW (R_PPC_REL24, 2, 26, 0x3fffffc, 0, true, signed,
46807bf4 255 bfd_elf_generic_reloc),
252b5132 256
8da6118f 257 /* A relative 16 bit branch; the lower two bits must be zero. */
0a1b45a2 258 HOW (R_PPC_REL14, 2, 16, 0xfffc, 0, true, signed,
46807bf4 259 bfd_elf_generic_reloc),
252b5132 260
8da6118f 261 /* A relative 16 bit branch. Bit 10 should be set to indicate that
252b5132
RH
262 the branch is expected to be taken. The lower two bits must be
263 zero. */
0a1b45a2 264 HOW (R_PPC_REL14_BRTAKEN, 2, 16, 0xfffc, 0, true, signed,
46807bf4 265 bfd_elf_generic_reloc),
252b5132 266
8da6118f 267 /* A relative 16 bit branch. Bit 10 should be set to indicate that
252b5132
RH
268 the branch is not expected to be taken. The lower two bits must
269 be zero. */
0a1b45a2 270 HOW (R_PPC_REL14_BRNTAKEN, 2, 16, 0xfffc, 0, true, signed,
46807bf4 271 bfd_elf_generic_reloc),
252b5132
RH
272
273 /* Like R_PPC_ADDR16, but referring to the GOT table entry for the
274 symbol. */
0a1b45a2 275 HOW (R_PPC_GOT16, 1, 16, 0xffff, 0, false, signed,
46807bf4 276 ppc_elf_unhandled_reloc),
252b5132
RH
277
278 /* Like R_PPC_ADDR16_LO, but referring to the GOT table entry for
279 the symbol. */
0a1b45a2 280 HOW (R_PPC_GOT16_LO, 1, 16, 0xffff, 0, false, dont,
46807bf4 281 ppc_elf_unhandled_reloc),
252b5132
RH
282
283 /* Like R_PPC_ADDR16_HI, but referring to the GOT table entry for
284 the symbol. */
0a1b45a2 285 HOW (R_PPC_GOT16_HI, 1, 16, 0xffff, 16, false, dont,
46807bf4 286 ppc_elf_unhandled_reloc),
252b5132
RH
287
288 /* Like R_PPC_ADDR16_HA, but referring to the GOT table entry for
289 the symbol. */
0a1b45a2 290 HOW (R_PPC_GOT16_HA, 1, 16, 0xffff, 16, false, dont,
46807bf4 291 ppc_elf_unhandled_reloc),
252b5132
RH
292
293 /* Like R_PPC_REL24, but referring to the procedure linkage table
294 entry for the symbol. */
0a1b45a2 295 HOW (R_PPC_PLTREL24, 2, 26, 0x3fffffc, 0, true, signed,
46807bf4 296 ppc_elf_unhandled_reloc),
252b5132
RH
297
298 /* This is used only by the dynamic linker. The symbol should exist
299 both in the object being run and in some shared library. The
300 dynamic linker copies the data addressed by the symbol from the
301 shared library into the object, because the object being
302 run has to have the data at some particular address. */
0a1b45a2 303 HOW (R_PPC_COPY, 2, 32, 0, 0, false, dont,
46807bf4 304 ppc_elf_unhandled_reloc),
252b5132
RH
305
306 /* Like R_PPC_ADDR32, but used when setting global offset table
307 entries. */
0a1b45a2 308 HOW (R_PPC_GLOB_DAT, 2, 32, 0xffffffff, 0, false, dont,
46807bf4 309 ppc_elf_unhandled_reloc),
252b5132
RH
310
311 /* Marks a procedure linkage table entry for a symbol. */
0a1b45a2 312 HOW (R_PPC_JMP_SLOT, 2, 32, 0, 0, false, dont,
46807bf4 313 ppc_elf_unhandled_reloc),
252b5132
RH
314
315 /* Used only by the dynamic linker. When the object is run, this
316 longword is set to the load address of the object, plus the
317 addend. */
0a1b45a2 318 HOW (R_PPC_RELATIVE, 2, 32, 0xffffffff, 0, false, dont,
46807bf4 319 bfd_elf_generic_reloc),
252b5132
RH
320
321 /* Like R_PPC_REL24, but uses the value of the symbol within the
322 object rather than the final value. Normally used for
323 _GLOBAL_OFFSET_TABLE_. */
0a1b45a2 324 HOW (R_PPC_LOCAL24PC, 2, 26, 0x3fffffc, 0, true, signed,
46807bf4 325 bfd_elf_generic_reloc),
252b5132
RH
326
327 /* Like R_PPC_ADDR32, but may be unaligned. */
0a1b45a2 328 HOW (R_PPC_UADDR32, 2, 32, 0xffffffff, 0, false, dont,
46807bf4 329 bfd_elf_generic_reloc),
252b5132
RH
330
331 /* Like R_PPC_ADDR16, but may be unaligned. */
0a1b45a2 332 HOW (R_PPC_UADDR16, 1, 16, 0xffff, 0, false, bitfield,
46807bf4 333 bfd_elf_generic_reloc),
252b5132
RH
334
335 /* 32-bit PC relative */
0a1b45a2 336 HOW (R_PPC_REL32, 2, 32, 0xffffffff, 0, true, dont,
46807bf4 337 bfd_elf_generic_reloc),
252b5132
RH
338
339 /* 32-bit relocation to the symbol's procedure linkage table.
c3668558 340 FIXME: not supported. */
0a1b45a2 341 HOW (R_PPC_PLT32, 2, 32, 0, 0, false, dont,
46807bf4 342 ppc_elf_unhandled_reloc),
252b5132
RH
343
344 /* 32-bit PC relative relocation to the symbol's procedure linkage table.
c3668558 345 FIXME: not supported. */
0a1b45a2 346 HOW (R_PPC_PLTREL32, 2, 32, 0, 0, true, dont,
46807bf4 347 ppc_elf_unhandled_reloc),
252b5132
RH
348
349 /* Like R_PPC_ADDR16_LO, but referring to the PLT table entry for
350 the symbol. */
0a1b45a2 351 HOW (R_PPC_PLT16_LO, 1, 16, 0xffff, 0, false, dont,
46807bf4 352 ppc_elf_unhandled_reloc),
252b5132
RH
353
354 /* Like R_PPC_ADDR16_HI, but referring to the PLT table entry for
355 the symbol. */
0a1b45a2 356 HOW (R_PPC_PLT16_HI, 1, 16, 0xffff, 16, false, dont,
46807bf4 357 ppc_elf_unhandled_reloc),
252b5132
RH
358
359 /* Like R_PPC_ADDR16_HA, but referring to the PLT table entry for
360 the symbol. */
0a1b45a2 361 HOW (R_PPC_PLT16_HA, 1, 16, 0xffff, 16, false, dont,
46807bf4 362 ppc_elf_unhandled_reloc),
252b5132
RH
363
364 /* A sign-extended 16 bit value relative to _SDA_BASE_, for use with
365 small data items. */
0a1b45a2 366 HOW (R_PPC_SDAREL16, 1, 16, 0xffff, 0, false, signed,
46807bf4 367 ppc_elf_unhandled_reloc),
252b5132 368
c061c2d8 369 /* 16-bit section relative relocation. */
0a1b45a2 370 HOW (R_PPC_SECTOFF, 1, 16, 0xffff, 0, false, signed,
46807bf4 371 ppc_elf_unhandled_reloc),
252b5132 372
c3668558 373 /* 16-bit lower half section relative relocation. */
0a1b45a2 374 HOW (R_PPC_SECTOFF_LO, 1, 16, 0xffff, 0, false, dont,
46807bf4 375 ppc_elf_unhandled_reloc),
252b5132 376
c3668558 377 /* 16-bit upper half section relative relocation. */
0a1b45a2 378 HOW (R_PPC_SECTOFF_HI, 1, 16, 0xffff, 16, false, dont,
46807bf4 379 ppc_elf_unhandled_reloc),
252b5132 380
c3668558 381 /* 16-bit upper half adjusted section relative relocation. */
0a1b45a2 382 HOW (R_PPC_SECTOFF_HA, 1, 16, 0xffff, 16, false, dont,
46807bf4 383 ppc_elf_unhandled_reloc),
252b5132 384
727fc41e 385 /* Marker relocs for TLS. */
0a1b45a2 386 HOW (R_PPC_TLS, 2, 32, 0, 0, false, dont,
46807bf4
AM
387 bfd_elf_generic_reloc),
388
0a1b45a2 389 HOW (R_PPC_TLSGD, 2, 32, 0, 0, false, dont,
46807bf4
AM
390 bfd_elf_generic_reloc),
391
0a1b45a2 392 HOW (R_PPC_TLSLD, 2, 32, 0, 0, false, dont,
46807bf4 393 bfd_elf_generic_reloc),
727fc41e 394
23cedd1d 395 /* Marker relocs on inline plt call instructions. */
0a1b45a2 396 HOW (R_PPC_PLTSEQ, 2, 32, 0, 0, false, dont,
46807bf4
AM
397 bfd_elf_generic_reloc),
398
0a1b45a2 399 HOW (R_PPC_PLTCALL, 2, 32, 0, 0, false, dont,
46807bf4 400 bfd_elf_generic_reloc),
23cedd1d 401
7619e7c7
AM
402 /* Computes the load module index of the load module that contains the
403 definition of its TLS sym. */
0a1b45a2 404 HOW (R_PPC_DTPMOD32, 2, 32, 0xffffffff, 0, false, dont,
46807bf4 405 ppc_elf_unhandled_reloc),
252b5132 406
7619e7c7
AM
407 /* Computes a dtv-relative displacement, the difference between the value
408 of sym+add and the base address of the thread-local storage block that
409 contains the definition of sym, minus 0x8000. */
0a1b45a2 410 HOW (R_PPC_DTPREL32, 2, 32, 0xffffffff, 0, false, dont,
46807bf4 411 ppc_elf_unhandled_reloc),
7619e7c7
AM
412
413 /* A 16 bit dtprel reloc. */
0a1b45a2 414 HOW (R_PPC_DTPREL16, 1, 16, 0xffff, 0, false, signed,
46807bf4 415 ppc_elf_unhandled_reloc),
252b5132 416
7619e7c7 417 /* Like DTPREL16, but no overflow. */
0a1b45a2 418 HOW (R_PPC_DTPREL16_LO, 1, 16, 0xffff, 0, false, dont,
46807bf4 419 ppc_elf_unhandled_reloc),
252b5132 420
7619e7c7 421 /* Like DTPREL16_LO, but next higher group of 16 bits. */
0a1b45a2 422 HOW (R_PPC_DTPREL16_HI, 1, 16, 0xffff, 16, false, dont,
46807bf4 423 ppc_elf_unhandled_reloc),
252b5132 424
7619e7c7 425 /* Like DTPREL16_HI, but adjust for low 16 bits. */
0a1b45a2 426 HOW (R_PPC_DTPREL16_HA, 1, 16, 0xffff, 16, false, dont,
46807bf4 427 ppc_elf_unhandled_reloc),
252b5132 428
7619e7c7
AM
429 /* Computes a tp-relative displacement, the difference between the value of
430 sym+add and the value of the thread pointer (r13). */
0a1b45a2 431 HOW (R_PPC_TPREL32, 2, 32, 0xffffffff, 0, false, dont,
46807bf4 432 ppc_elf_unhandled_reloc),
7619e7c7
AM
433
434 /* A 16 bit tprel reloc. */
0a1b45a2 435 HOW (R_PPC_TPREL16, 1, 16, 0xffff, 0, false, signed,
46807bf4 436 ppc_elf_unhandled_reloc),
252b5132 437
7619e7c7 438 /* Like TPREL16, but no overflow. */
0a1b45a2 439 HOW (R_PPC_TPREL16_LO, 1, 16, 0xffff, 0, false, dont,
46807bf4 440 ppc_elf_unhandled_reloc),
252b5132 441
7619e7c7 442 /* Like TPREL16_LO, but next higher group of 16 bits. */
0a1b45a2 443 HOW (R_PPC_TPREL16_HI, 1, 16, 0xffff, 16, false, dont,
46807bf4 444 ppc_elf_unhandled_reloc),
7619e7c7
AM
445
446 /* Like TPREL16_HI, but adjust for low 16 bits. */
0a1b45a2 447 HOW (R_PPC_TPREL16_HA, 1, 16, 0xffff, 16, false, dont,
46807bf4 448 ppc_elf_unhandled_reloc),
7619e7c7
AM
449
450 /* Allocates two contiguous entries in the GOT to hold a tls_index structure,
451 with values (sym+add)@dtpmod and (sym+add)@dtprel, and computes the offset
452 to the first entry. */
0a1b45a2 453 HOW (R_PPC_GOT_TLSGD16, 1, 16, 0xffff, 0, false, signed,
46807bf4 454 ppc_elf_unhandled_reloc),
252b5132 455
7619e7c7 456 /* Like GOT_TLSGD16, but no overflow. */
0a1b45a2 457 HOW (R_PPC_GOT_TLSGD16_LO, 1, 16, 0xffff, 0, false, dont,
46807bf4 458 ppc_elf_unhandled_reloc),
252b5132 459
7619e7c7 460 /* Like GOT_TLSGD16_LO, but next higher group of 16 bits. */
0a1b45a2 461 HOW (R_PPC_GOT_TLSGD16_HI, 1, 16, 0xffff, 16, false, dont,
46807bf4 462 ppc_elf_unhandled_reloc),
252b5132 463
7619e7c7 464 /* Like GOT_TLSGD16_HI, but adjust for low 16 bits. */
0a1b45a2 465 HOW (R_PPC_GOT_TLSGD16_HA, 1, 16, 0xffff, 16, false, dont,
46807bf4 466 ppc_elf_unhandled_reloc),
7619e7c7
AM
467
468 /* Allocates two contiguous entries in the GOT to hold a tls_index structure,
469 with values (sym+add)@dtpmod and zero, and computes the offset to the
470 first entry. */
0a1b45a2 471 HOW (R_PPC_GOT_TLSLD16, 1, 16, 0xffff, 0, false, signed,
46807bf4 472 ppc_elf_unhandled_reloc),
252b5132 473
7619e7c7 474 /* Like GOT_TLSLD16, but no overflow. */
0a1b45a2 475 HOW (R_PPC_GOT_TLSLD16_LO, 1, 16, 0xffff, 0, false, dont,
46807bf4 476 ppc_elf_unhandled_reloc),
252b5132 477
7619e7c7 478 /* Like GOT_TLSLD16_LO, but next higher group of 16 bits. */
0a1b45a2 479 HOW (R_PPC_GOT_TLSLD16_HI, 1, 16, 0xffff, 16, false, dont,
46807bf4 480 ppc_elf_unhandled_reloc),
252b5132 481
7619e7c7 482 /* Like GOT_TLSLD16_HI, but adjust for low 16 bits. */
0a1b45a2 483 HOW (R_PPC_GOT_TLSLD16_HA, 1, 16, 0xffff, 16, false, dont,
46807bf4 484 ppc_elf_unhandled_reloc),
7619e7c7
AM
485
486 /* Allocates an entry in the GOT with value (sym+add)@dtprel, and computes
487 the offset to the entry. */
0a1b45a2 488 HOW (R_PPC_GOT_DTPREL16, 1, 16, 0xffff, 0, false, signed,
46807bf4 489 ppc_elf_unhandled_reloc),
252b5132 490
7619e7c7 491 /* Like GOT_DTPREL16, but no overflow. */
0a1b45a2 492 HOW (R_PPC_GOT_DTPREL16_LO, 1, 16, 0xffff, 0, false, dont,
46807bf4 493 ppc_elf_unhandled_reloc),
252b5132 494
7619e7c7 495 /* Like GOT_DTPREL16_LO, but next higher group of 16 bits. */
0a1b45a2 496 HOW (R_PPC_GOT_DTPREL16_HI, 1, 16, 0xffff, 16, false, dont,
46807bf4 497 ppc_elf_unhandled_reloc),
252b5132 498
7619e7c7 499 /* Like GOT_DTPREL16_HI, but adjust for low 16 bits. */
0a1b45a2 500 HOW (R_PPC_GOT_DTPREL16_HA, 1, 16, 0xffff, 16, false, dont,
46807bf4 501 ppc_elf_unhandled_reloc),
c3668558 502
7619e7c7
AM
503 /* Allocates an entry in the GOT with value (sym+add)@tprel, and computes the
504 offset to the entry. */
0a1b45a2 505 HOW (R_PPC_GOT_TPREL16, 1, 16, 0xffff, 0, false, signed,
46807bf4 506 ppc_elf_unhandled_reloc),
7619e7c7
AM
507
508 /* Like GOT_TPREL16, but no overflow. */
0a1b45a2 509 HOW (R_PPC_GOT_TPREL16_LO, 1, 16, 0xffff, 0, false, dont,
46807bf4 510 ppc_elf_unhandled_reloc),
7619e7c7
AM
511
512 /* Like GOT_TPREL16_LO, but next higher group of 16 bits. */
0a1b45a2 513 HOW (R_PPC_GOT_TPREL16_HI, 1, 16, 0xffff, 16, false, dont,
46807bf4 514 ppc_elf_unhandled_reloc),
7619e7c7
AM
515
516 /* Like GOT_TPREL16_HI, but adjust for low 16 bits. */
0a1b45a2 517 HOW (R_PPC_GOT_TPREL16_HA, 1, 16, 0xffff, 16, false, dont,
46807bf4 518 ppc_elf_unhandled_reloc),
7619e7c7
AM
519
520 /* The remaining relocs are from the Embedded ELF ABI, and are not
521 in the SVR4 ELF ABI. */
522
523 /* 32 bit value resulting from the addend minus the symbol. */
0a1b45a2 524 HOW (R_PPC_EMB_NADDR32, 2, 32, 0xffffffff, 0, false, dont,
46807bf4 525 ppc_elf_unhandled_reloc),
7619e7c7
AM
526
527 /* 16 bit value resulting from the addend minus the symbol. */
0a1b45a2 528 HOW (R_PPC_EMB_NADDR16, 1, 16, 0xffff, 0, false, signed,
46807bf4 529 ppc_elf_unhandled_reloc),
7619e7c7
AM
530
531 /* 16 bit value resulting from the addend minus the symbol. */
0a1b45a2 532 HOW (R_PPC_EMB_NADDR16_LO, 1, 16, 0xffff, 0, false, dont,
46807bf4 533 ppc_elf_unhandled_reloc),
7619e7c7
AM
534
535 /* The high order 16 bits of the addend minus the symbol. */
0a1b45a2 536 HOW (R_PPC_EMB_NADDR16_HI, 1, 16, 0xffff, 16, false, dont,
46807bf4 537 ppc_elf_unhandled_reloc),
7619e7c7
AM
538
539 /* The high order 16 bits of the result of the addend minus the address,
540 plus 1 if the contents of the low 16 bits, treated as a signed number,
541 is negative. */
0a1b45a2 542 HOW (R_PPC_EMB_NADDR16_HA, 1, 16, 0xffff, 16, false, dont,
46807bf4 543 ppc_elf_unhandled_reloc),
25dbc73a
AM
544
545 /* 16 bit value resulting from allocating a 4 byte word to hold an
546 address in the .sdata section, and returning the offset from
547 _SDA_BASE_ for that relocation. */
0a1b45a2 548 HOW (R_PPC_EMB_SDAI16, 1, 16, 0xffff, 0, false, signed,
46807bf4 549 ppc_elf_unhandled_reloc),
25dbc73a
AM
550
551 /* 16 bit value resulting from allocating a 4 byte word to hold an
552 address in the .sdata2 section, and returning the offset from
553 _SDA2_BASE_ for that relocation. */
0a1b45a2 554 HOW (R_PPC_EMB_SDA2I16, 1, 16, 0xffff, 0, false, signed,
46807bf4 555 ppc_elf_unhandled_reloc),
25dbc73a
AM
556
557 /* A sign-extended 16 bit value relative to _SDA2_BASE_, for use with
558 small data items. */
0a1b45a2 559 HOW (R_PPC_EMB_SDA2REL, 1, 16, 0xffff, 0, false, signed,
46807bf4 560 ppc_elf_unhandled_reloc),
25dbc73a
AM
561
562 /* Relocate against either _SDA_BASE_ or _SDA2_BASE_, filling in the 16 bit
563 signed offset from the appropriate base, and filling in the register
564 field with the appropriate register (0, 2, or 13). */
0a1b45a2 565 HOW (R_PPC_EMB_SDA21, 2, 16, 0xffff, 0, false, signed,
46807bf4 566 ppc_elf_unhandled_reloc),
25dbc73a
AM
567
568 /* Relocation not handled: R_PPC_EMB_MRKREF */
569 /* Relocation not handled: R_PPC_EMB_RELSEC16 */
570 /* Relocation not handled: R_PPC_EMB_RELST_LO */
571 /* Relocation not handled: R_PPC_EMB_RELST_HI */
572 /* Relocation not handled: R_PPC_EMB_RELST_HA */
573 /* Relocation not handled: R_PPC_EMB_BIT_FLD */
574
575 /* PC relative relocation against either _SDA_BASE_ or _SDA2_BASE_, filling
576 in the 16 bit signed offset from the appropriate base, and filling in the
577 register field with the appropriate register (0, 2, or 13). */
0a1b45a2 578 HOW (R_PPC_EMB_RELSDA, 1, 16, 0xffff, 0, false, signed,
46807bf4 579 ppc_elf_unhandled_reloc),
25dbc73a 580
b9c361e0 581 /* A relative 8 bit branch. */
0a1b45a2 582 HOW (R_PPC_VLE_REL8, 1, 8, 0xff, 1, true, signed,
46807bf4 583 bfd_elf_generic_reloc),
68ffbac6 584
b9c361e0 585 /* A relative 15 bit branch. */
0a1b45a2 586 HOW (R_PPC_VLE_REL15, 2, 16, 0xfffe, 0, true, signed,
46807bf4 587 bfd_elf_generic_reloc),
b9c361e0 588
68ffbac6 589 /* A relative 24 bit branch. */
0a1b45a2 590 HOW (R_PPC_VLE_REL24, 2, 25, 0x1fffffe, 0, true, signed,
46807bf4 591 bfd_elf_generic_reloc),
b9c361e0
JL
592
593 /* The 16 LSBS in split16a format. */
0a1b45a2 594 HOW (R_PPC_VLE_LO16A, 2, 16, 0x1f07ff, 0, false, dont,
46807bf4 595 ppc_elf_unhandled_reloc),
b9c361e0
JL
596
597 /* The 16 LSBS in split16d format. */
0a1b45a2 598 HOW (R_PPC_VLE_LO16D, 2, 16, 0x3e007ff, 0, false, dont,
46807bf4 599 ppc_elf_unhandled_reloc),
b9c361e0
JL
600
601 /* Bits 16-31 split16a format. */
0a1b45a2 602 HOW (R_PPC_VLE_HI16A, 2, 16, 0x1f07ff, 16, false, dont,
46807bf4 603 ppc_elf_unhandled_reloc),
b9c361e0
JL
604
605 /* Bits 16-31 split16d format. */
0a1b45a2 606 HOW (R_PPC_VLE_HI16D, 2, 16, 0x3e007ff, 16, false, dont,
46807bf4 607 ppc_elf_unhandled_reloc),
b9c361e0
JL
608
609 /* Bits 16-31 (High Adjusted) in split16a format. */
0a1b45a2 610 HOW (R_PPC_VLE_HA16A, 2, 16, 0x1f07ff, 16, false, dont,
46807bf4 611 ppc_elf_unhandled_reloc),
b9c361e0
JL
612
613 /* Bits 16-31 (High Adjusted) in split16d format. */
0a1b45a2 614 HOW (R_PPC_VLE_HA16D, 2, 16, 0x3e007ff, 16, false, dont,
46807bf4 615 ppc_elf_unhandled_reloc),
b9c361e0 616
86c95733
AM
617 /* This reloc is like R_PPC_EMB_SDA21 but only applies to e_add16i
618 instructions. If the register base is 0 then the linker changes
619 the e_add16i to an e_li instruction. */
0a1b45a2 620 HOW (R_PPC_VLE_SDA21, 2, 16, 0xffff, 0, false, signed,
46807bf4 621 ppc_elf_unhandled_reloc),
b9c361e0 622
86c95733 623 /* Like R_PPC_VLE_SDA21 but ignore overflow. */
0a1b45a2 624 HOW (R_PPC_VLE_SDA21_LO, 2, 16, 0xffff, 0, false, dont,
46807bf4 625 ppc_elf_unhandled_reloc),
b9c361e0
JL
626
627 /* The 16 LSBS relative to _SDA_BASE_ in split16a format. */
0a1b45a2 628 HOW (R_PPC_VLE_SDAREL_LO16A, 2, 16, 0x1f07ff, 0, false, dont,
46807bf4 629 ppc_elf_unhandled_reloc),
b9c361e0
JL
630
631 /* The 16 LSBS relative to _SDA_BASE_ in split16d format. */
0a1b45a2 632 HOW (R_PPC_VLE_SDAREL_LO16D, 2, 16, 0x3e007ff, 0, false, dont,
46807bf4 633 ppc_elf_unhandled_reloc),
b9c361e0
JL
634
635 /* Bits 16-31 relative to _SDA_BASE_ in split16a format. */
0a1b45a2 636 HOW (R_PPC_VLE_SDAREL_HI16A, 2, 16, 0x1f07ff, 16, false, dont,
46807bf4 637 ppc_elf_unhandled_reloc),
b9c361e0
JL
638
639 /* Bits 16-31 relative to _SDA_BASE_ in split16d format. */
0a1b45a2 640 HOW (R_PPC_VLE_SDAREL_HI16D, 2, 16, 0x3e007ff, 16, false, dont,
46807bf4 641 ppc_elf_unhandled_reloc),
b9c361e0
JL
642
643 /* Bits 16-31 (HA) relative to _SDA_BASE split16a format. */
0a1b45a2 644 HOW (R_PPC_VLE_SDAREL_HA16A, 2, 16, 0x1f07ff, 16, false, dont,
46807bf4 645 ppc_elf_unhandled_reloc),
b9c361e0
JL
646
647 /* Bits 16-31 (HA) relative to _SDA_BASE split16d format. */
0a1b45a2 648 HOW (R_PPC_VLE_SDAREL_HA16D, 2, 16, 0x3e007ff, 16, false, dont,
46807bf4 649 ppc_elf_unhandled_reloc),
b9c361e0 650
83eef883 651 /* e_li split20 format. */
0a1b45a2 652 HOW (R_PPC_VLE_ADDR20, 2, 20, 0x1f7fff, 0, false, dont,
bb6bf75e 653 ppc_elf_unhandled_reloc),
46807bf4 654
0a1b45a2 655 HOW (R_PPC_IRELATIVE, 2, 32, 0xffffffff, 0, false, dont,
46807bf4 656 ppc_elf_unhandled_reloc),
e054468f 657
d7128ce4 658 /* A 16 bit relative relocation. */
0a1b45a2 659 HOW (R_PPC_REL16, 1, 16, 0xffff, 0, true, signed,
46807bf4 660 bfd_elf_generic_reloc),
d7128ce4
AM
661
662 /* A 16 bit relative relocation without overflow. */
0a1b45a2 663 HOW (R_PPC_REL16_LO, 1, 16, 0xffff, 0, true, dont,
46807bf4 664 bfd_elf_generic_reloc),
d7128ce4
AM
665
666 /* The high order 16 bits of a relative address. */
0a1b45a2 667 HOW (R_PPC_REL16_HI, 1, 16, 0xffff, 16, true, dont,
46807bf4 668 bfd_elf_generic_reloc),
d7128ce4
AM
669
670 /* The high order 16 bits of a relative address, plus 1 if the contents of
671 the low 16 bits, treated as a signed number, is negative. */
0a1b45a2 672 HOW (R_PPC_REL16_HA, 1, 16, 0xffff, 16, true, dont,
46807bf4 673 ppc_elf_addr16_ha_reloc),
d7128ce4 674
a680de9a 675 /* Like R_PPC_REL16_HA but for split field in addpcis. */
0a1b45a2 676 HOW (R_PPC_REL16DX_HA, 2, 16, 0x1fffc1, 16, true, signed,
46807bf4 677 ppc_elf_addr16_ha_reloc),
a680de9a 678
7ba71655 679 /* A split-field reloc for addpcis, non-relative (gas internal use only). */
0a1b45a2 680 HOW (R_PPC_16DX_HA, 2, 16, 0x1fffc1, 16, false, signed,
46807bf4 681 ppc_elf_addr16_ha_reloc),
7ba71655 682
25dbc73a 683 /* GNU extension to record C++ vtable hierarchy. */
0a1b45a2 684 HOW (R_PPC_GNU_VTINHERIT, 0, 0, 0, 0, false, dont,
46807bf4 685 NULL),
25dbc73a
AM
686
687 /* GNU extension to record C++ vtable member usage. */
0a1b45a2 688 HOW (R_PPC_GNU_VTENTRY, 0, 0, 0, 0, false, dont,
46807bf4 689 NULL),
7619e7c7 690
25dbc73a 691 /* Phony reloc to handle AIX style TOC entries. */
0a1b45a2 692 HOW (R_PPC_TOC16, 1, 16, 0xffff, 0, false, signed,
46807bf4 693 ppc_elf_unhandled_reloc),
25dbc73a
AM
694};
695\f
696/* Initialize the ppc_elf_howto_table, so that linear accesses can be done. */
697
698static void
699ppc_elf_howto_init (void)
700{
701 unsigned int i, type;
702
703 for (i = 0;
704 i < sizeof (ppc_elf_howto_raw) / sizeof (ppc_elf_howto_raw[0]);
705 i++)
706 {
707 type = ppc_elf_howto_raw[i].type;
708 if (type >= (sizeof (ppc_elf_howto_table)
709 / sizeof (ppc_elf_howto_table[0])))
710 abort ();
711 ppc_elf_howto_table[type] = &ppc_elf_howto_raw[i];
712 }
713}
714
715static reloc_howto_type *
716ppc_elf_reloc_type_lookup (bfd *abfd ATTRIBUTE_UNUSED,
717 bfd_reloc_code_real_type code)
718{
719 enum elf_ppc_reloc_type r;
720
721 /* Initialize howto table if not already done. */
722 if (!ppc_elf_howto_table[R_PPC_ADDR32])
723 ppc_elf_howto_init ();
724
725 switch (code)
726 {
727 default:
728 return NULL;
729
730 case BFD_RELOC_NONE: r = R_PPC_NONE; break;
731 case BFD_RELOC_32: r = R_PPC_ADDR32; break;
732 case BFD_RELOC_PPC_BA26: r = R_PPC_ADDR24; break;
1fe532cf 733 case BFD_RELOC_PPC64_ADDR16_DS:
25dbc73a 734 case BFD_RELOC_16: r = R_PPC_ADDR16; break;
1fe532cf 735 case BFD_RELOC_PPC64_ADDR16_LO_DS:
25dbc73a
AM
736 case BFD_RELOC_LO16: r = R_PPC_ADDR16_LO; break;
737 case BFD_RELOC_HI16: r = R_PPC_ADDR16_HI; break;
738 case BFD_RELOC_HI16_S: r = R_PPC_ADDR16_HA; break;
739 case BFD_RELOC_PPC_BA16: r = R_PPC_ADDR14; break;
740 case BFD_RELOC_PPC_BA16_BRTAKEN: r = R_PPC_ADDR14_BRTAKEN; break;
741 case BFD_RELOC_PPC_BA16_BRNTAKEN: r = R_PPC_ADDR14_BRNTAKEN; break;
742 case BFD_RELOC_PPC_B26: r = R_PPC_REL24; break;
743 case BFD_RELOC_PPC_B16: r = R_PPC_REL14; break;
744 case BFD_RELOC_PPC_B16_BRTAKEN: r = R_PPC_REL14_BRTAKEN; break;
745 case BFD_RELOC_PPC_B16_BRNTAKEN: r = R_PPC_REL14_BRNTAKEN; break;
1fe532cf 746 case BFD_RELOC_PPC64_GOT16_DS:
25dbc73a 747 case BFD_RELOC_16_GOTOFF: r = R_PPC_GOT16; break;
1fe532cf 748 case BFD_RELOC_PPC64_GOT16_LO_DS:
25dbc73a
AM
749 case BFD_RELOC_LO16_GOTOFF: r = R_PPC_GOT16_LO; break;
750 case BFD_RELOC_HI16_GOTOFF: r = R_PPC_GOT16_HI; break;
751 case BFD_RELOC_HI16_S_GOTOFF: r = R_PPC_GOT16_HA; break;
752 case BFD_RELOC_24_PLT_PCREL: r = R_PPC_PLTREL24; break;
753 case BFD_RELOC_PPC_COPY: r = R_PPC_COPY; break;
754 case BFD_RELOC_PPC_GLOB_DAT: r = R_PPC_GLOB_DAT; break;
755 case BFD_RELOC_PPC_LOCAL24PC: r = R_PPC_LOCAL24PC; break;
756 case BFD_RELOC_32_PCREL: r = R_PPC_REL32; break;
757 case BFD_RELOC_32_PLTOFF: r = R_PPC_PLT32; break;
758 case BFD_RELOC_32_PLT_PCREL: r = R_PPC_PLTREL32; break;
1fe532cf 759 case BFD_RELOC_PPC64_PLT16_LO_DS:
25dbc73a
AM
760 case BFD_RELOC_LO16_PLTOFF: r = R_PPC_PLT16_LO; break;
761 case BFD_RELOC_HI16_PLTOFF: r = R_PPC_PLT16_HI; break;
762 case BFD_RELOC_HI16_S_PLTOFF: r = R_PPC_PLT16_HA; break;
763 case BFD_RELOC_GPREL16: r = R_PPC_SDAREL16; break;
1fe532cf 764 case BFD_RELOC_PPC64_SECTOFF_DS:
25dbc73a 765 case BFD_RELOC_16_BASEREL: r = R_PPC_SECTOFF; break;
1fe532cf 766 case BFD_RELOC_PPC64_SECTOFF_LO_DS:
25dbc73a
AM
767 case BFD_RELOC_LO16_BASEREL: r = R_PPC_SECTOFF_LO; break;
768 case BFD_RELOC_HI16_BASEREL: r = R_PPC_SECTOFF_HI; break;
769 case BFD_RELOC_HI16_S_BASEREL: r = R_PPC_SECTOFF_HA; break;
770 case BFD_RELOC_CTOR: r = R_PPC_ADDR32; break;
1fe532cf 771 case BFD_RELOC_PPC64_TOC16_DS:
25dbc73a
AM
772 case BFD_RELOC_PPC_TOC16: r = R_PPC_TOC16; break;
773 case BFD_RELOC_PPC_TLS: r = R_PPC_TLS; break;
727fc41e
AM
774 case BFD_RELOC_PPC_TLSGD: r = R_PPC_TLSGD; break;
775 case BFD_RELOC_PPC_TLSLD: r = R_PPC_TLSLD; break;
25dbc73a 776 case BFD_RELOC_PPC_DTPMOD: r = R_PPC_DTPMOD32; break;
1fe532cf 777 case BFD_RELOC_PPC64_TPREL16_DS:
25dbc73a 778 case BFD_RELOC_PPC_TPREL16: r = R_PPC_TPREL16; break;
1fe532cf 779 case BFD_RELOC_PPC64_TPREL16_LO_DS:
25dbc73a
AM
780 case BFD_RELOC_PPC_TPREL16_LO: r = R_PPC_TPREL16_LO; break;
781 case BFD_RELOC_PPC_TPREL16_HI: r = R_PPC_TPREL16_HI; break;
782 case BFD_RELOC_PPC_TPREL16_HA: r = R_PPC_TPREL16_HA; break;
783 case BFD_RELOC_PPC_TPREL: r = R_PPC_TPREL32; break;
1fe532cf 784 case BFD_RELOC_PPC64_DTPREL16_DS:
25dbc73a 785 case BFD_RELOC_PPC_DTPREL16: r = R_PPC_DTPREL16; break;
1fe532cf 786 case BFD_RELOC_PPC64_DTPREL16_LO_DS:
25dbc73a
AM
787 case BFD_RELOC_PPC_DTPREL16_LO: r = R_PPC_DTPREL16_LO; break;
788 case BFD_RELOC_PPC_DTPREL16_HI: r = R_PPC_DTPREL16_HI; break;
789 case BFD_RELOC_PPC_DTPREL16_HA: r = R_PPC_DTPREL16_HA; break;
790 case BFD_RELOC_PPC_DTPREL: r = R_PPC_DTPREL32; break;
791 case BFD_RELOC_PPC_GOT_TLSGD16: r = R_PPC_GOT_TLSGD16; break;
792 case BFD_RELOC_PPC_GOT_TLSGD16_LO: r = R_PPC_GOT_TLSGD16_LO; break;
793 case BFD_RELOC_PPC_GOT_TLSGD16_HI: r = R_PPC_GOT_TLSGD16_HI; break;
794 case BFD_RELOC_PPC_GOT_TLSGD16_HA: r = R_PPC_GOT_TLSGD16_HA; break;
795 case BFD_RELOC_PPC_GOT_TLSLD16: r = R_PPC_GOT_TLSLD16; break;
796 case BFD_RELOC_PPC_GOT_TLSLD16_LO: r = R_PPC_GOT_TLSLD16_LO; break;
797 case BFD_RELOC_PPC_GOT_TLSLD16_HI: r = R_PPC_GOT_TLSLD16_HI; break;
798 case BFD_RELOC_PPC_GOT_TLSLD16_HA: r = R_PPC_GOT_TLSLD16_HA; break;
799 case BFD_RELOC_PPC_GOT_TPREL16: r = R_PPC_GOT_TPREL16; break;
800 case BFD_RELOC_PPC_GOT_TPREL16_LO: r = R_PPC_GOT_TPREL16_LO; break;
801 case BFD_RELOC_PPC_GOT_TPREL16_HI: r = R_PPC_GOT_TPREL16_HI; break;
802 case BFD_RELOC_PPC_GOT_TPREL16_HA: r = R_PPC_GOT_TPREL16_HA; break;
803 case BFD_RELOC_PPC_GOT_DTPREL16: r = R_PPC_GOT_DTPREL16; break;
804 case BFD_RELOC_PPC_GOT_DTPREL16_LO: r = R_PPC_GOT_DTPREL16_LO; break;
805 case BFD_RELOC_PPC_GOT_DTPREL16_HI: r = R_PPC_GOT_DTPREL16_HI; break;
806 case BFD_RELOC_PPC_GOT_DTPREL16_HA: r = R_PPC_GOT_DTPREL16_HA; break;
807 case BFD_RELOC_PPC_EMB_NADDR32: r = R_PPC_EMB_NADDR32; break;
808 case BFD_RELOC_PPC_EMB_NADDR16: r = R_PPC_EMB_NADDR16; break;
809 case BFD_RELOC_PPC_EMB_NADDR16_LO: r = R_PPC_EMB_NADDR16_LO; break;
810 case BFD_RELOC_PPC_EMB_NADDR16_HI: r = R_PPC_EMB_NADDR16_HI; break;
811 case BFD_RELOC_PPC_EMB_NADDR16_HA: r = R_PPC_EMB_NADDR16_HA; break;
812 case BFD_RELOC_PPC_EMB_SDAI16: r = R_PPC_EMB_SDAI16; break;
813 case BFD_RELOC_PPC_EMB_SDA2I16: r = R_PPC_EMB_SDA2I16; break;
814 case BFD_RELOC_PPC_EMB_SDA2REL: r = R_PPC_EMB_SDA2REL; break;
815 case BFD_RELOC_PPC_EMB_SDA21: r = R_PPC_EMB_SDA21; break;
816 case BFD_RELOC_PPC_EMB_MRKREF: r = R_PPC_EMB_MRKREF; break;
817 case BFD_RELOC_PPC_EMB_RELSEC16: r = R_PPC_EMB_RELSEC16; break;
818 case BFD_RELOC_PPC_EMB_RELST_LO: r = R_PPC_EMB_RELST_LO; break;
819 case BFD_RELOC_PPC_EMB_RELST_HI: r = R_PPC_EMB_RELST_HI; break;
820 case BFD_RELOC_PPC_EMB_RELST_HA: r = R_PPC_EMB_RELST_HA; break;
821 case BFD_RELOC_PPC_EMB_BIT_FLD: r = R_PPC_EMB_BIT_FLD; break;
822 case BFD_RELOC_PPC_EMB_RELSDA: r = R_PPC_EMB_RELSDA; break;
b9c361e0
JL
823 case BFD_RELOC_PPC_VLE_REL8: r = R_PPC_VLE_REL8; break;
824 case BFD_RELOC_PPC_VLE_REL15: r = R_PPC_VLE_REL15; break;
825 case BFD_RELOC_PPC_VLE_REL24: r = R_PPC_VLE_REL24; break;
826 case BFD_RELOC_PPC_VLE_LO16A: r = R_PPC_VLE_LO16A; break;
827 case BFD_RELOC_PPC_VLE_LO16D: r = R_PPC_VLE_LO16D; break;
828 case BFD_RELOC_PPC_VLE_HI16A: r = R_PPC_VLE_HI16A; break;
829 case BFD_RELOC_PPC_VLE_HI16D: r = R_PPC_VLE_HI16D; break;
830 case BFD_RELOC_PPC_VLE_HA16A: r = R_PPC_VLE_HA16A; break;
831 case BFD_RELOC_PPC_VLE_HA16D: r = R_PPC_VLE_HA16D; break;
832 case BFD_RELOC_PPC_VLE_SDA21: r = R_PPC_VLE_SDA21; break;
833 case BFD_RELOC_PPC_VLE_SDA21_LO: r = R_PPC_VLE_SDA21_LO; break;
834 case BFD_RELOC_PPC_VLE_SDAREL_LO16A:
835 r = R_PPC_VLE_SDAREL_LO16A;
836 break;
837 case BFD_RELOC_PPC_VLE_SDAREL_LO16D:
838 r = R_PPC_VLE_SDAREL_LO16D;
839 break;
840 case BFD_RELOC_PPC_VLE_SDAREL_HI16A:
841 r = R_PPC_VLE_SDAREL_HI16A;
842 break;
843 case BFD_RELOC_PPC_VLE_SDAREL_HI16D:
844 r = R_PPC_VLE_SDAREL_HI16D;
845 break;
846 case BFD_RELOC_PPC_VLE_SDAREL_HA16A:
847 r = R_PPC_VLE_SDAREL_HA16A;
848 break;
849 case BFD_RELOC_PPC_VLE_SDAREL_HA16D:
850 r = R_PPC_VLE_SDAREL_HA16D;
851 break;
d7128ce4
AM
852 case BFD_RELOC_16_PCREL: r = R_PPC_REL16; break;
853 case BFD_RELOC_LO16_PCREL: r = R_PPC_REL16_LO; break;
854 case BFD_RELOC_HI16_PCREL: r = R_PPC_REL16_HI; break;
855 case BFD_RELOC_HI16_S_PCREL: r = R_PPC_REL16_HA; break;
7ba71655 856 case BFD_RELOC_PPC_16DX_HA: r = R_PPC_16DX_HA; break;
a680de9a 857 case BFD_RELOC_PPC_REL16DX_HA: r = R_PPC_REL16DX_HA; break;
25dbc73a
AM
858 case BFD_RELOC_VTABLE_INHERIT: r = R_PPC_GNU_VTINHERIT; break;
859 case BFD_RELOC_VTABLE_ENTRY: r = R_PPC_GNU_VTENTRY; break;
860 }
861
862 return ppc_elf_howto_table[r];
863};
864
157090f7
AM
865static reloc_howto_type *
866ppc_elf_reloc_name_lookup (bfd *abfd ATTRIBUTE_UNUSED,
867 const char *r_name)
868{
869 unsigned int i;
870
871 for (i = 0;
872 i < sizeof (ppc_elf_howto_raw) / sizeof (ppc_elf_howto_raw[0]);
873 i++)
874 if (ppc_elf_howto_raw[i].name != NULL
875 && strcasecmp (ppc_elf_howto_raw[i].name, r_name) == 0)
876 return &ppc_elf_howto_raw[i];
877
878 return NULL;
879}
880
25dbc73a
AM
881/* Set the howto pointer for a PowerPC ELF reloc. */
882
0a1b45a2 883static bool
4aef7643 884ppc_elf_info_to_howto (bfd *abfd,
25dbc73a
AM
885 arelent *cache_ptr,
886 Elf_Internal_Rela *dst)
887{
cd21f5da
NC
888 unsigned int r_type;
889
25dbc73a
AM
890 /* Initialize howto table if not already done. */
891 if (!ppc_elf_howto_table[R_PPC_ADDR32])
892 ppc_elf_howto_init ();
893
cd21f5da
NC
894 r_type = ELF32_R_TYPE (dst->r_info);
895 if (r_type >= R_PPC_max)
896 {
695344c0 897 /* xgettext:c-format */
0aa13fee 898 _bfd_error_handler (_("%pB: unsupported relocation type %#x"),
4eca0228 899 abfd, r_type);
cd21f5da 900 bfd_set_error (bfd_error_bad_value);
0a1b45a2 901 return false;
cd21f5da 902 }
f3185997 903
cd21f5da 904 cache_ptr->howto = ppc_elf_howto_table[r_type];
375de94a
AM
905
906 /* Just because the above assert didn't trigger doesn't mean that
907 ELF32_R_TYPE (dst->r_info) is necessarily a valid relocation. */
f3185997 908 if (cache_ptr->howto == NULL)
375de94a 909 {
695344c0 910 /* xgettext:c-format */
0aa13fee 911 _bfd_error_handler (_("%pB: unsupported relocation type %#x"),
4eca0228 912 abfd, r_type);
375de94a
AM
913 bfd_set_error (bfd_error_bad_value);
914
0a1b45a2 915 return false;
375de94a 916 }
f3185997 917
0a1b45a2 918 return true;
25dbc73a
AM
919}
920
d7128ce4 921/* Handle the R_PPC_ADDR16_HA and R_PPC_REL16_HA relocs. */
25dbc73a
AM
922
923static bfd_reloc_status_type
4aef7643 924ppc_elf_addr16_ha_reloc (bfd *abfd,
25dbc73a
AM
925 arelent *reloc_entry,
926 asymbol *symbol,
4aef7643 927 void *data,
25dbc73a
AM
928 asection *input_section,
929 bfd *output_bfd,
930 char **error_message ATTRIBUTE_UNUSED)
931{
a680de9a
PB
932 enum elf_ppc_reloc_type r_type;
933 long insn;
934 bfd_size_type octets;
935 bfd_vma value;
25dbc73a
AM
936
937 if (output_bfd != NULL)
938 {
939 reloc_entry->address += input_section->output_offset;
940 return bfd_reloc_ok;
941 }
942
a680de9a
PB
943 reloc_entry->addend += 0x8000;
944 r_type = reloc_entry->howto->type;
945 if (r_type != R_PPC_REL16DX_HA)
946 return bfd_reloc_continue;
947
948 value = 0;
949 if (!bfd_is_com_section (symbol->section))
950 value = symbol->value;
951 value += (reloc_entry->addend
952 + symbol->section->output_offset
953 + symbol->section->output_section->vma);
954 value -= (reloc_entry->address
955 + input_section->output_offset
956 + input_section->output_section->vma);
957 value >>= 16;
958
bb294208 959 octets = reloc_entry->address * OCTETS_PER_BYTE (abfd, input_section);
a680de9a
PB
960 insn = bfd_get_32 (abfd, (bfd_byte *) data + octets);
961 insn &= ~0x1fffc1;
962 insn |= (value & 0xffc1) | ((value & 0x3e) << 15);
963 bfd_put_32 (abfd, insn, (bfd_byte *) data + octets);
964 return bfd_reloc_ok;
25dbc73a
AM
965}
966
967static bfd_reloc_status_type
968ppc_elf_unhandled_reloc (bfd *abfd,
969 arelent *reloc_entry,
970 asymbol *symbol,
971 void *data,
972 asection *input_section,
973 bfd *output_bfd,
974 char **error_message)
975{
976 /* If this is a relocatable link (output_bfd test tells us), just
977 call the generic function. Any adjustment will be done at final
978 link time. */
979 if (output_bfd != NULL)
980 return bfd_elf_generic_reloc (abfd, reloc_entry, symbol, data,
981 input_section, output_bfd, error_message);
982
983 if (error_message != NULL)
984 {
7fbd5f4e
AM
985 static char *message;
986 free (message);
987 if (asprintf (&message, _("generic linker can't handle %s"),
988 reloc_entry->howto->name) < 0)
989 message = NULL;
990 *error_message = message;
25dbc73a
AM
991 }
992 return bfd_reloc_dangerous;
993}
994\f
995/* Sections created by the linker. */
996
997typedef struct elf_linker_section
998{
c9a2f333 999 /* Pointer to the bfd section. */
25dbc73a 1000 asection *section;
c9a2f333
AM
1001 /* Section name. */
1002 const char *name;
1003 /* Associated bss section name. */
1004 const char *bss_name;
1005 /* Associated symbol name. */
1006 const char *sym_name;
046183de
AM
1007 /* Associated symbol. */
1008 struct elf_link_hash_entry *sym;
25dbc73a
AM
1009} elf_linker_section_t;
1010
1011/* Linked list of allocated pointer entries. This hangs off of the
1012 symbol lists, and provides allows us to return different pointers,
1013 based on different addend's. */
1014
1015typedef struct elf_linker_section_pointers
1016{
1017 /* next allocated pointer for this symbol */
1018 struct elf_linker_section_pointers *next;
1019 /* offset of pointer from beginning of section */
1020 bfd_vma offset;
1021 /* addend used */
1022 bfd_vma addend;
1023 /* which linker section this is */
1024 elf_linker_section_t *lsect;
25dbc73a
AM
1025} elf_linker_section_pointers_t;
1026
1027struct ppc_elf_obj_tdata
1028{
1029 struct elf_obj_tdata elf;
1030
1031 /* A mapping from local symbols to offsets into the various linker
1032 sections added. This is index by the symbol index. */
1033 elf_linker_section_pointers_t **linker_section_pointers;
016687f8
AM
1034
1035 /* Flags used to auto-detect plt type. */
1036 unsigned int makes_plt_call : 1;
1037 unsigned int has_rel16 : 1;
25dbc73a
AM
1038};
1039
1040#define ppc_elf_tdata(bfd) \
1041 ((struct ppc_elf_obj_tdata *) (bfd)->tdata.any)
7619e7c7 1042
25dbc73a
AM
1043#define elf_local_ptr_offsets(bfd) \
1044 (ppc_elf_tdata (bfd)->linker_section_pointers)
7619e7c7 1045
0c8d6e5c
AM
1046#define is_ppc_elf(bfd) \
1047 (bfd_get_flavour (bfd) == bfd_target_elf_flavour \
4dfe6ac6 1048 && elf_object_id (bfd) == PPC32_ELF_DATA)
0c8d6e5c 1049
25dbc73a 1050/* Override the generic function because we store some extras. */
7619e7c7 1051
0a1b45a2 1052static bool
25dbc73a
AM
1053ppc_elf_mkobject (bfd *abfd)
1054{
0ffa91dd 1055 return bfd_elf_allocate_object (abfd, sizeof (struct ppc_elf_obj_tdata),
4dfe6ac6 1056 PPC32_ELF_DATA);
25dbc73a 1057}
7619e7c7 1058
14b57c7c
AM
1059/* When defaulting arch/mach, decode apuinfo to find a better match. */
1060
0a1b45a2 1061bool
14b57c7c
AM
1062_bfd_elf_ppc_set_arch (bfd *abfd)
1063{
1064 unsigned long mach = 0;
1065 asection *s;
1066 unsigned char *contents;
1067
1068 if (abfd->arch_info->bits_per_word == 32
1069 && bfd_big_endian (abfd))
1070 {
1071
1072 for (s = abfd->sections; s != NULL; s = s->next)
1073 if ((elf_section_data (s)->this_hdr.sh_flags & SHF_PPC_VLE) != 0)
1074 break;
1075 if (s != NULL)
1076 mach = bfd_mach_ppc_vle;
1077 }
1078
1079 if (mach == 0)
1080 {
1081 s = bfd_get_section_by_name (abfd, APUINFO_SECTION_NAME);
62a47958
AM
1082 if (s != NULL
1083 && s->size >= 24
1084 && bfd_malloc_and_get_section (abfd, s, &contents))
14b57c7c
AM
1085 {
1086 unsigned int apuinfo_size = bfd_get_32 (abfd, contents + 4);
1087 unsigned int i;
1088
1089 for (i = 20; i < apuinfo_size + 20 && i + 4 <= s->size; i += 4)
1090 {
1091 unsigned int val = bfd_get_32 (abfd, contents + i);
1092 switch (val >> 16)
1093 {
1094 case PPC_APUINFO_PMR:
1095 case PPC_APUINFO_RFMCI:
1096 if (mach == 0)
1097 mach = bfd_mach_ppc_titan;
1098 break;
1099
1100 case PPC_APUINFO_ISEL:
1101 case PPC_APUINFO_CACHELCK:
1102 if (mach == bfd_mach_ppc_titan)
1103 mach = bfd_mach_ppc_e500mc;
1104 break;
1105
1106 case PPC_APUINFO_SPE:
1107 case PPC_APUINFO_EFS:
1108 case PPC_APUINFO_BRLOCK:
1109 if (mach != bfd_mach_ppc_vle)
1110 mach = bfd_mach_ppc_e500;
8941017b 1111 break;
14b57c7c
AM
1112
1113 case PPC_APUINFO_VLE:
1114 mach = bfd_mach_ppc_vle;
1115 break;
1116
1117 default:
1118 mach = -1ul;
1119 }
1120 }
1121 free (contents);
1122 }
1123 }
1124
1125 if (mach != 0 && mach != -1ul)
1126 {
1127 const bfd_arch_info_type *arch;
1128
1129 for (arch = abfd->arch_info->next; arch; arch = arch->next)
1130 if (arch->mach == mach)
1131 {
1132 abfd->arch_info = arch;
1133 break;
1134 }
1135 }
0a1b45a2 1136 return true;
14b57c7c
AM
1137}
1138
25dbc73a 1139/* Fix bad default arch selected for a 32 bit input bfd when the
14b57c7c 1140 default is 64 bit. Also select arch based on apuinfo. */
7619e7c7 1141
0a1b45a2 1142static bool
25dbc73a
AM
1143ppc_elf_object_p (bfd *abfd)
1144{
14b57c7c 1145 if (!abfd->arch_info->the_default)
0a1b45a2 1146 return true;
14b57c7c
AM
1147
1148 if (abfd->arch_info->bits_per_word == 64)
25dbc73a
AM
1149 {
1150 Elf_Internal_Ehdr *i_ehdr = elf_elfheader (abfd);
7619e7c7 1151
25dbc73a
AM
1152 if (i_ehdr->e_ident[EI_CLASS] == ELFCLASS32)
1153 {
1154 /* Relies on arch after 64 bit default being 32 bit default. */
1155 abfd->arch_info = abfd->arch_info->next;
1156 BFD_ASSERT (abfd->arch_info->bits_per_word == 32);
1157 }
1158 }
14b57c7c 1159 return _bfd_elf_ppc_set_arch (abfd);
25dbc73a 1160}
7619e7c7 1161
25dbc73a 1162/* Function to set whether a module needs the -mrelocatable bit set. */
7619e7c7 1163
0a1b45a2 1164static bool
25dbc73a
AM
1165ppc_elf_set_private_flags (bfd *abfd, flagword flags)
1166{
1167 BFD_ASSERT (!elf_flags_init (abfd)
1168 || elf_elfheader (abfd)->e_flags == flags);
7619e7c7 1169
25dbc73a 1170 elf_elfheader (abfd)->e_flags = flags;
0a1b45a2
AM
1171 elf_flags_init (abfd) = true;
1172 return true;
25dbc73a
AM
1173}
1174
25dbc73a 1175/* Support for core dump NOTE sections. */
deaaf2f3 1176
0a1b45a2 1177static bool
25dbc73a 1178ppc_elf_grok_prstatus (bfd *abfd, Elf_Internal_Note *note)
252b5132 1179{
25dbc73a
AM
1180 int offset;
1181 unsigned int size;
252b5132 1182
25dbc73a
AM
1183 switch (note->descsz)
1184 {
1185 default:
0a1b45a2 1186 return false;
252b5132 1187
25dbc73a
AM
1188 case 268: /* Linux/PPC. */
1189 /* pr_cursig */
228e534f 1190 elf_tdata (abfd)->core->signal = bfd_get_16 (abfd, note->descdata + 12);
deaaf2f3 1191
25dbc73a 1192 /* pr_pid */
228e534f 1193 elf_tdata (abfd)->core->lwpid = bfd_get_32 (abfd, note->descdata + 24);
9abc968f 1194
25dbc73a
AM
1195 /* pr_reg */
1196 offset = 72;
1197 size = 192;
deaaf2f3 1198
25dbc73a
AM
1199 break;
1200 }
deaaf2f3 1201
25dbc73a
AM
1202 /* Make a ".reg/999" section. */
1203 return _bfd_elfcore_make_pseudosection (abfd, ".reg",
1204 size, note->descpos + offset);
1205}
252b5132 1206
0a1b45a2 1207static bool
25dbc73a
AM
1208ppc_elf_grok_psinfo (bfd *abfd, Elf_Internal_Note *note)
1209{
1210 switch (note->descsz)
deaaf2f3 1211 {
25dbc73a 1212 default:
0a1b45a2 1213 return false;
deaaf2f3 1214
25dbc73a 1215 case 128: /* Linux/PPC elf_prpsinfo. */
228e534f 1216 elf_tdata (abfd)->core->pid
bc989cdc 1217 = bfd_get_32 (abfd, note->descdata + 16);
228e534f 1218 elf_tdata (abfd)->core->program
25dbc73a 1219 = _bfd_elfcore_strndup (abfd, note->descdata + 32, 16);
228e534f 1220 elf_tdata (abfd)->core->command
25dbc73a
AM
1221 = _bfd_elfcore_strndup (abfd, note->descdata + 48, 80);
1222 }
9abc968f 1223
25dbc73a
AM
1224 /* Note that for some reason, a spurious space is tacked
1225 onto the end of the args in some (at least one anyway)
1226 implementations, so strip it off if it exists. */
70bccea4 1227
25dbc73a 1228 {
228e534f 1229 char *command = elf_tdata (abfd)->core->command;
25dbc73a 1230 int n = strlen (command);
70bccea4 1231
25dbc73a
AM
1232 if (0 < n && command[n - 1] == ' ')
1233 command[n - 1] = '\0';
1234 }
deaaf2f3 1235
0a1b45a2 1236 return true;
25dbc73a 1237}
deaaf2f3 1238
183e98be
AM
1239static char *
1240ppc_elf_write_core_note (bfd *abfd, char *buf, int *bufsiz, int note_type, ...)
1241{
1242 switch (note_type)
1243 {
1244 default:
1245 return NULL;
1246
1247 case NT_PRPSINFO:
1248 {
602f1657 1249 char data[128] ATTRIBUTE_NONSTRING;
183e98be
AM
1250 va_list ap;
1251
1252 va_start (ap, note_type);
75cd47ed 1253 memset (data, 0, sizeof (data));
183e98be 1254 strncpy (data + 32, va_arg (ap, const char *), 16);
be3e27bb 1255#if GCC_VERSION == 8000 || GCC_VERSION == 8001
95da9854 1256 DIAGNOSTIC_PUSH;
be3e27bb 1257 /* GCC 8.0 and 8.1 warn about 80 equals destination size with
95da9854
L
1258 -Wstringop-truncation:
1259 https://gcc.gnu.org/bugzilla/show_bug.cgi?id=85643
1260 */
95da9854
L
1261 DIAGNOSTIC_IGNORE_STRINGOP_TRUNCATION;
1262#endif
183e98be 1263 strncpy (data + 48, va_arg (ap, const char *), 80);
be3e27bb 1264#if GCC_VERSION == 8000 || GCC_VERSION == 8001
95da9854 1265 DIAGNOSTIC_POP;
fe75810f 1266#endif
183e98be
AM
1267 va_end (ap);
1268 return elfcore_write_note (abfd, buf, bufsiz,
1269 "CORE", note_type, data, sizeof (data));
1270 }
1271
1272 case NT_PRSTATUS:
1273 {
1274 char data[268];
1275 va_list ap;
1276 long pid;
1277 int cursig;
1278 const void *greg;
1279
1280 va_start (ap, note_type);
1281 memset (data, 0, 72);
1282 pid = va_arg (ap, long);
1283 bfd_put_32 (abfd, pid, data + 24);
1284 cursig = va_arg (ap, int);
1285 bfd_put_16 (abfd, cursig, data + 12);
1286 greg = va_arg (ap, const void *);
1287 memcpy (data + 72, greg, 192);
1288 memset (data + 264, 0, 4);
1289 va_end (ap);
1290 return elfcore_write_note (abfd, buf, bufsiz,
1291 "CORE", note_type, data, sizeof (data));
1292 }
1293 }
1294}
1295
b9c361e0 1296static flagword
68ffbac6 1297ppc_elf_lookup_section_flags (char *flag_name)
b9c361e0
JL
1298{
1299
1300 if (!strcmp (flag_name, "SHF_PPC_VLE"))
1301 return SHF_PPC_VLE;
1302
1303 return 0;
1304}
1305
25dbc73a
AM
1306/* Return address for Ith PLT stub in section PLT, for relocation REL
1307 or (bfd_vma) -1 if it should not be included. */
deaaf2f3 1308
25dbc73a
AM
1309static bfd_vma
1310ppc_elf_plt_sym_val (bfd_vma i ATTRIBUTE_UNUSED,
1311 const asection *plt ATTRIBUTE_UNUSED,
1312 const arelent *rel)
1313{
1314 return rel->address;
1315}
deaaf2f3 1316
25dbc73a 1317/* Handle a PowerPC specific section when reading an object file. This
6dc132d9
L
1318 is called when bfd_section_from_shdr finds a section with an unknown
1319 type. */
deaaf2f3 1320
0a1b45a2 1321static bool
6dc132d9
L
1322ppc_elf_section_from_shdr (bfd *abfd,
1323 Elf_Internal_Shdr *hdr,
1324 const char *name,
1325 int shindex)
25dbc73a
AM
1326{
1327 asection *newsect;
1328 flagword flags;
d1c6de6f 1329
6dc132d9 1330 if (! _bfd_elf_make_section_from_shdr (abfd, hdr, name, shindex))
0a1b45a2 1331 return false;
deaaf2f3 1332
25dbc73a 1333 newsect = hdr->bfd_section;
bf577467 1334 flags = 0;
25dbc73a
AM
1335 if (hdr->sh_flags & SHF_EXCLUDE)
1336 flags |= SEC_EXCLUDE;
9abc968f 1337
25dbc73a
AM
1338 if (hdr->sh_type == SHT_ORDERED)
1339 flags |= SEC_SORT_ENTRIES;
d1c6de6f 1340
3f3328b8 1341 if (startswith (name, ".PPC.EMB"))
bf577467 1342 name += 8;
3f3328b8
ML
1343 if (startswith (name, ".sbss")
1344 || startswith (name, ".sdata"))
bf577467
AM
1345 flags |= SEC_SMALL_DATA;
1346
1347 return (flags == 0
1348 || bfd_set_section_flags (newsect, newsect->flags | flags));
25dbc73a
AM
1349}
1350
1351/* Set up any other section flags and such that may be necessary. */
1352
0a1b45a2 1353static bool
25dbc73a
AM
1354ppc_elf_fake_sections (bfd *abfd ATTRIBUTE_UNUSED,
1355 Elf_Internal_Shdr *shdr,
1356 asection *asect)
1357{
25dbc73a
AM
1358 if ((asect->flags & SEC_SORT_ENTRIES) != 0)
1359 shdr->sh_type = SHT_ORDERED;
1360
0a1b45a2 1361 return true;
25dbc73a
AM
1362}
1363
1364/* If we have .sbss2 or .PPC.EMB.sbss0 output sections, we
1365 need to bump up the number of section headers. */
1366
1367static int
a6b96beb
AM
1368ppc_elf_additional_program_headers (bfd *abfd,
1369 struct bfd_link_info *info ATTRIBUTE_UNUSED)
25dbc73a
AM
1370{
1371 asection *s;
1372 int ret = 0;
d1c6de6f 1373
25dbc73a
AM
1374 s = bfd_get_section_by_name (abfd, ".sbss2");
1375 if (s != NULL && (s->flags & SEC_ALLOC) != 0)
1376 ++ret;
d1c6de6f 1377
25dbc73a
AM
1378 s = bfd_get_section_by_name (abfd, ".PPC.EMB.sbss0");
1379 if (s != NULL && (s->flags & SEC_ALLOC) != 0)
1380 ++ret;
deaaf2f3 1381
25dbc73a
AM
1382 return ret;
1383}
deaaf2f3 1384
68ffbac6 1385/* Modify the segment map for VLE executables. */
b9c361e0 1386
0a1b45a2 1387bool
b9c361e0
JL
1388ppc_elf_modify_segment_map (bfd *abfd,
1389 struct bfd_link_info *info ATTRIBUTE_UNUSED)
1390{
f7d69005 1391 struct elf_segment_map *m;
b9c361e0
JL
1392
1393 /* At this point in the link, output sections have already been sorted by
1394 LMA and assigned to segments. All that is left to do is to ensure
1395 there is no mixing of VLE & non-VLE sections in a text segment.
1396 If we find that case, we split the segment.
1397 We maintain the original output section order. */
1398
12bd6957 1399 for (m = elf_seg_map (abfd); m != NULL; m = m->next)
b9c361e0 1400 {
f7d69005 1401 struct elf_segment_map *n;
986f0783 1402 size_t amt;
f7d69005
AM
1403 unsigned int j, k;
1404 unsigned int p_flags;
1405
1406 if (m->p_type != PT_LOAD || m->count == 0)
b9c361e0
JL
1407 continue;
1408
f7d69005 1409 for (p_flags = PF_R, j = 0; j != m->count; ++j)
b9c361e0 1410 {
f7d69005
AM
1411 if ((m->sections[j]->flags & SEC_READONLY) == 0)
1412 p_flags |= PF_W;
1413 if ((m->sections[j]->flags & SEC_CODE) != 0)
1414 {
1415 p_flags |= PF_X;
1416 if ((elf_section_flags (m->sections[j]) & SHF_PPC_VLE) != 0)
1417 p_flags |= PF_PPC_VLE;
1418 break;
1419 }
1420 }
1421 if (j != m->count)
1422 while (++j != m->count)
1423 {
1424 unsigned int p_flags1 = PF_R;
94caa966 1425
f7d69005
AM
1426 if ((m->sections[j]->flags & SEC_READONLY) == 0)
1427 p_flags1 |= PF_W;
1428 if ((m->sections[j]->flags & SEC_CODE) != 0)
1429 {
1430 p_flags1 |= PF_X;
1431 if ((elf_section_flags (m->sections[j]) & SHF_PPC_VLE) != 0)
1432 p_flags1 |= PF_PPC_VLE;
1433 if (((p_flags1 ^ p_flags) & PF_PPC_VLE) != 0)
1434 break;
1435 }
1436 p_flags |= p_flags1;
1437 }
1438 /* If we're splitting a segment which originally contained rw
1439 sections then those sections might now only be in one of the
1440 two parts. So always set p_flags if splitting, even if we
1441 are being called for objcopy with p_flags_valid set. */
1442 if (j != m->count || !m->p_flags_valid)
1443 {
1444 m->p_flags_valid = 1;
1445 m->p_flags = p_flags;
1446 }
1447 if (j == m->count)
b9c361e0
JL
1448 continue;
1449
f7d69005 1450 /* Sections 0..j-1 stay in this (current) segment,
b9c361e0
JL
1451 the remainder are put in a new segment.
1452 The scan resumes with the new segment. */
1453
b9c361e0
JL
1454 amt = sizeof (struct elf_segment_map);
1455 amt += (m->count - j - 1) * sizeof (asection *);
1456 n = (struct elf_segment_map *) bfd_zalloc (abfd, amt);
1457 if (n == NULL)
0a1b45a2 1458 return false;
b9c361e0
JL
1459
1460 n->p_type = PT_LOAD;
b9c361e0
JL
1461 n->count = m->count - j;
1462 for (k = 0; k < n->count; ++k)
f7d69005
AM
1463 n->sections[k] = m->sections[j + k];
1464 m->count = j;
1465 m->p_size_valid = 0;
b9c361e0
JL
1466 n->next = m->next;
1467 m->next = n;
b9c361e0
JL
1468 }
1469
0a1b45a2 1470 return true;
b9c361e0
JL
1471}
1472
25dbc73a
AM
1473/* Add extra PPC sections -- Note, for now, make .sbss2 and
1474 .PPC.EMB.sbss0 a normal section, and not a bss section so
1475 that the linker doesn't crater when trying to make more than
1476 2 sections. */
e656e369 1477
b35d266b 1478static const struct bfd_elf_special_section ppc_elf_special_sections[] =
7f4d3958 1479{
14b57c7c
AM
1480 { STRING_COMMA_LEN (".plt"), 0, SHT_NOBITS, SHF_ALLOC + SHF_EXECINSTR },
1481 { STRING_COMMA_LEN (".sbss"), -2, SHT_NOBITS, SHF_ALLOC + SHF_WRITE },
1482 { STRING_COMMA_LEN (".sbss2"), -2, SHT_PROGBITS, SHF_ALLOC },
1483 { STRING_COMMA_LEN (".sdata"), -2, SHT_PROGBITS, SHF_ALLOC + SHF_WRITE },
1484 { STRING_COMMA_LEN (".sdata2"), -2, SHT_PROGBITS, SHF_ALLOC },
1485 { STRING_COMMA_LEN (".tags"), 0, SHT_ORDERED, SHF_ALLOC },
1486 { STRING_COMMA_LEN (APUINFO_SECTION_NAME), 0, SHT_NOTE, 0 },
1487 { STRING_COMMA_LEN (".PPC.EMB.sbss0"), 0, SHT_PROGBITS, SHF_ALLOC },
1488 { STRING_COMMA_LEN (".PPC.EMB.sdata0"), 0, SHT_PROGBITS, SHF_ALLOC },
1489 { NULL, 0, 0, 0, 0 }
7f4d3958
L
1490};
1491
551b43fd 1492/* This is what we want for new plt/got. */
bd38246a 1493static const struct bfd_elf_special_section ppc_alt_plt =
07d6d2b8 1494 { STRING_COMMA_LEN (".plt"), 0, SHT_PROGBITS, SHF_ALLOC };
551b43fd
AM
1495
1496static const struct bfd_elf_special_section *
4aef7643 1497ppc_elf_get_sec_type_attr (bfd *abfd, asection *sec)
7f4d3958 1498{
b35d266b 1499 const struct bfd_elf_special_section *ssect;
551b43fd
AM
1500
1501 /* See if this is one of the special sections. */
1502 if (sec->name == NULL)
1503 return NULL;
1504
1505 ssect = _bfd_elf_get_special_section (sec->name, ppc_elf_special_sections,
1506 sec->use_rela_p);
1507 if (ssect != NULL)
1508 {
1509 if (ssect == ppc_elf_special_sections && (sec->flags & SEC_LOAD) != 0)
1510 ssect = &ppc_alt_plt;
1511 return ssect;
1512 }
1513
1514 return _bfd_elf_get_sec_type_attr (abfd, sec);
1515}
25dbc73a
AM
1516\f
1517/* Very simple linked list structure for recording apuinfo values. */
1518typedef struct apuinfo_list
1519{
1520 struct apuinfo_list *next;
1521 unsigned long value;
1522}
1523apuinfo_list;
e656e369 1524
25dbc73a 1525static apuinfo_list *head;
0a1b45a2 1526static bool apuinfo_set;
deaaf2f3 1527
25dbc73a
AM
1528static void
1529apuinfo_list_init (void)
1530{
1531 head = NULL;
0a1b45a2 1532 apuinfo_set = false;
25dbc73a 1533}
9abc968f 1534
25dbc73a
AM
1535static void
1536apuinfo_list_add (unsigned long value)
1537{
1538 apuinfo_list *entry = head;
deaaf2f3 1539
25dbc73a
AM
1540 while (entry != NULL)
1541 {
1542 if (entry->value == value)
1543 return;
1544 entry = entry->next;
1545 }
b4a38de6 1546
25dbc73a
AM
1547 entry = bfd_malloc (sizeof (* entry));
1548 if (entry == NULL)
1549 return;
e656e369 1550
25dbc73a
AM
1551 entry->value = value;
1552 entry->next = head;
1553 head = entry;
1554}
9abc968f 1555
25dbc73a
AM
1556static unsigned
1557apuinfo_list_length (void)
1558{
1559 apuinfo_list *entry;
1560 unsigned long count;
9abc968f 1561
25dbc73a
AM
1562 for (entry = head, count = 0;
1563 entry;
1564 entry = entry->next)
1565 ++ count;
e656e369 1566
25dbc73a
AM
1567 return count;
1568}
eea6121a 1569
25dbc73a
AM
1570static inline unsigned long
1571apuinfo_list_element (unsigned long number)
1572{
1573 apuinfo_list * entry;
e656e369 1574
25dbc73a
AM
1575 for (entry = head;
1576 entry && number --;
1577 entry = entry->next)
1578 ;
252b5132 1579
25dbc73a
AM
1580 return entry ? entry->value : 0;
1581}
1582
1583static void
1584apuinfo_list_finish (void)
1585{
1586 apuinfo_list *entry;
1587
1588 for (entry = head; entry;)
252b5132 1589 {
25dbc73a
AM
1590 apuinfo_list *next = entry->next;
1591 free (entry);
1592 entry = next;
1593 }
9abc968f 1594
25dbc73a
AM
1595 head = NULL;
1596}
9abc968f 1597
25dbc73a
AM
1598/* Scan the input BFDs and create a linked list of
1599 the APUinfo values that will need to be emitted. */
9abc968f 1600
25dbc73a
AM
1601static void
1602ppc_elf_begin_write_processing (bfd *abfd, struct bfd_link_info *link_info)
1603{
1604 bfd *ibfd;
1605 asection *asec;
deddc40b
NS
1606 char *buffer = NULL;
1607 bfd_size_type largest_input_size = 0;
25dbc73a 1608 unsigned i;
25dbc73a
AM
1609 unsigned long length;
1610 const char *error_message = NULL;
9abc968f 1611
25dbc73a
AM
1612 if (link_info == NULL)
1613 return;
9abc968f 1614
25dbc73a 1615 apuinfo_list_init ();
252b5132 1616
25dbc73a 1617 /* Read in the input sections contents. */
c72f2fb2 1618 for (ibfd = link_info->input_bfds; ibfd; ibfd = ibfd->link.next)
252b5132 1619 {
25dbc73a 1620 unsigned long datum;
252b5132 1621
25dbc73a
AM
1622 asec = bfd_get_section_by_name (ibfd, APUINFO_SECTION_NAME);
1623 if (asec == NULL)
1624 continue;
252b5132 1625
695344c0 1626 /* xgettext:c-format */
871b3ab2 1627 error_message = _("corrupt %s section in %pB");
25dbc73a 1628 length = asec->size;
deddc40b
NS
1629 if (length < 20)
1630 goto fail;
1631
0a1b45a2 1632 apuinfo_set = true;
deddc40b 1633 if (largest_input_size < asec->size)
25dbc73a 1634 {
c9594989 1635 free (buffer);
deddc40b
NS
1636 largest_input_size = asec->size;
1637 buffer = bfd_malloc (largest_input_size);
1638 if (!buffer)
1639 return;
25dbc73a 1640 }
5b914448 1641
25dbc73a 1642 if (bfd_seek (ibfd, asec->filepos, SEEK_SET) != 0
deddc40b 1643 || (bfd_bread (buffer, length, ibfd) != length))
25dbc73a 1644 {
695344c0 1645 /* xgettext:c-format */
871b3ab2 1646 error_message = _("unable to read in %s section from %pB");
25dbc73a
AM
1647 goto fail;
1648 }
252b5132 1649
25dbc73a
AM
1650 /* Verify the contents of the header. Note - we have to
1651 extract the values this way in order to allow for a
1652 host whose endian-ness is different from the target. */
deddc40b 1653 datum = bfd_get_32 (ibfd, buffer);
25dbc73a
AM
1654 if (datum != sizeof APUINFO_LABEL)
1655 goto fail;
252b5132 1656
deddc40b 1657 datum = bfd_get_32 (ibfd, buffer + 8);
25dbc73a
AM
1658 if (datum != 0x2)
1659 goto fail;
252b5132 1660
deddc40b 1661 if (strcmp (buffer + 12, APUINFO_LABEL) != 0)
25dbc73a 1662 goto fail;
252b5132 1663
25dbc73a 1664 /* Get the number of bytes used for apuinfo entries. */
deddc40b 1665 datum = bfd_get_32 (ibfd, buffer + 4);
25dbc73a
AM
1666 if (datum + 20 != length)
1667 goto fail;
1668
25dbc73a
AM
1669 /* Scan the apuinfo section, building a list of apuinfo numbers. */
1670 for (i = 0; i < datum; i += 4)
deddc40b 1671 apuinfo_list_add (bfd_get_32 (ibfd, buffer + 20 + i));
252b5132
RH
1672 }
1673
25dbc73a 1674 error_message = NULL;
252b5132 1675
f2faa800 1676 if (apuinfo_set)
deddc40b 1677 {
f2faa800
NS
1678 /* Compute the size of the output section. */
1679 unsigned num_entries = apuinfo_list_length ();
5b914448 1680
deddc40b
NS
1681 /* Set the output section size, if it exists. */
1682 asec = bfd_get_section_by_name (abfd, APUINFO_SECTION_NAME);
f2faa800 1683
fd361982 1684 if (asec && !bfd_set_section_size (asec, 20 + num_entries * 4))
deddc40b
NS
1685 {
1686 ibfd = abfd;
695344c0 1687 /* xgettext:c-format */
871b3ab2 1688 error_message = _("warning: unable to set size of %s section in %pB");
deddc40b
NS
1689 }
1690 }
25dbc73a
AM
1691
1692 fail:
c9594989 1693 free (buffer);
25dbc73a
AM
1694
1695 if (error_message)
cd9af601 1696 _bfd_error_handler (error_message, APUINFO_SECTION_NAME, ibfd);
25dbc73a 1697}
252b5132 1698
25dbc73a
AM
1699/* Prevent the output section from accumulating the input sections'
1700 contents. We have already stored this in our linked list structure. */
252b5132 1701
0a1b45a2 1702static bool
25dbc73a 1703ppc_elf_write_section (bfd *abfd ATTRIBUTE_UNUSED,
c7b8f16e 1704 struct bfd_link_info *link_info ATTRIBUTE_UNUSED,
25dbc73a
AM
1705 asection *asec,
1706 bfd_byte *contents ATTRIBUTE_UNUSED)
1707{
f2faa800 1708 return apuinfo_set && strcmp (asec->name, APUINFO_SECTION_NAME) == 0;
252b5132
RH
1709}
1710
25dbc73a
AM
1711/* Finally we can generate the output section. */
1712
1713static void
cc364be6 1714ppc_final_write_processing (bfd *abfd)
7619e7c7 1715{
25dbc73a
AM
1716 bfd_byte *buffer;
1717 asection *asec;
1718 unsigned i;
1719 unsigned num_entries;
1720 bfd_size_type length;
7619e7c7 1721
25dbc73a
AM
1722 asec = bfd_get_section_by_name (abfd, APUINFO_SECTION_NAME);
1723 if (asec == NULL)
1724 return;
1725
f2faa800 1726 if (!apuinfo_set)
25dbc73a
AM
1727 return;
1728
1729 length = asec->size;
1730 if (length < 20)
1731 return;
1732
1733 buffer = bfd_malloc (length);
1734 if (buffer == NULL)
7619e7c7 1735 {
4eca0228 1736 _bfd_error_handler
cf97bcb0 1737 (_("failed to allocate space for new APUinfo section"));
25dbc73a 1738 return;
7619e7c7 1739 }
7619e7c7 1740
25dbc73a
AM
1741 /* Create the apuinfo header. */
1742 num_entries = apuinfo_list_length ();
1743 bfd_put_32 (abfd, sizeof APUINFO_LABEL, buffer);
1744 bfd_put_32 (abfd, num_entries * 4, buffer + 4);
1745 bfd_put_32 (abfd, 0x2, buffer + 8);
1746 strcpy ((char *) buffer + 12, APUINFO_LABEL);
feee612b 1747
25dbc73a
AM
1748 length = 20;
1749 for (i = 0; i < num_entries; i++)
feee612b 1750 {
25dbc73a
AM
1751 bfd_put_32 (abfd, apuinfo_list_element (i), buffer + length);
1752 length += 4;
feee612b 1753 }
feee612b 1754
25dbc73a 1755 if (length != asec->size)
cf97bcb0 1756 _bfd_error_handler (_("failed to compute new APUinfo section"));
252b5132 1757
25dbc73a 1758 if (! bfd_set_section_contents (abfd, asec, buffer, (file_ptr) 0, length))
cf97bcb0 1759 _bfd_error_handler (_("failed to install new APUinfo section"));
252b5132 1760
25dbc73a
AM
1761 free (buffer);
1762
1763 apuinfo_list_finish ();
252b5132 1764}
06f44071 1765
0a1b45a2 1766static bool
cc364be6 1767ppc_elf_final_write_processing (bfd *abfd)
06f44071 1768{
cc364be6
AM
1769 ppc_final_write_processing (abfd);
1770 return _bfd_elf_final_write_processing (abfd);
06f44071 1771}
25dbc73a 1772\f
0a1b45a2 1773static bool
c6dd29ce 1774is_nonpic_glink_stub (bfd *abfd, asection *glink, bfd_vma off)
7382d32a 1775{
407aa07c 1776 bfd_byte buf[4 * 4];
7382d32a 1777
9e390558 1778 if (!bfd_get_section_contents (abfd, glink, buf, off, sizeof buf))
0a1b45a2 1779 return false;
7382d32a 1780
c6dd29ce
AM
1781 return ((bfd_get_32 (abfd, buf + 0) & 0xffff0000) == LIS_11
1782 && (bfd_get_32 (abfd, buf + 4) & 0xffff0000) == LWZ_11_11
407aa07c
AM
1783 && bfd_get_32 (abfd, buf + 8) == MTCTR_11
1784 && bfd_get_32 (abfd, buf + 12) == BCTR);
7382d32a
AM
1785}
1786
0a1b45a2 1787static bool
468392fb
AM
1788section_covers_vma (bfd *abfd ATTRIBUTE_UNUSED, asection *section, void *ptr)
1789{
1790 bfd_vma vma = *(bfd_vma *) ptr;
1791 return ((section->flags & SEC_ALLOC) != 0
1792 && section->vma <= vma
1793 && vma < section->vma + section->size);
1794}
1795
1796static long
1797ppc_elf_get_synthetic_symtab (bfd *abfd, long symcount, asymbol **syms,
1798 long dynsymcount, asymbol **dynsyms,
1799 asymbol **ret)
1800{
0a1b45a2 1801 bool (*slurp_relocs) (bfd *, asection *, asymbol **, bool);
468392fb
AM
1802 asection *plt, *relplt, *dynamic, *glink;
1803 bfd_vma glink_vma = 0;
1804 bfd_vma resolv_vma = 0;
9e390558 1805 bfd_vma stub_off;
468392fb
AM
1806 asymbol *s;
1807 arelent *p;
9ad9b810 1808 size_t count, i, stub_delta;
468392fb
AM
1809 size_t size;
1810 char *names;
1811 bfd_byte buf[4];
1812
1813 *ret = NULL;
1814
1815 if ((abfd->flags & (DYNAMIC | EXEC_P)) == 0)
1816 return 0;
1817
1818 if (dynsymcount <= 0)
1819 return 0;
1820
1821 relplt = bfd_get_section_by_name (abfd, ".rela.plt");
1822 if (relplt == NULL)
1823 return 0;
1824
1825 plt = bfd_get_section_by_name (abfd, ".plt");
1826 if (plt == NULL)
1827 return 0;
1828
1829 /* Call common code to handle old-style executable PLTs. */
1830 if (elf_section_flags (plt) & SHF_EXECINSTR)
1831 return _bfd_elf_get_synthetic_symtab (abfd, symcount, syms,
1832 dynsymcount, dynsyms, ret);
1833
1834 /* If this object was prelinked, the prelinker stored the address
1835 of .glink at got[1]. If it wasn't prelinked, got[1] will be zero. */
1836 dynamic = bfd_get_section_by_name (abfd, ".dynamic");
1837 if (dynamic != NULL)
1838 {
1839 bfd_byte *dynbuf, *extdyn, *extdynend;
1840 size_t extdynsize;
1841 void (*swap_dyn_in) (bfd *, const void *, Elf_Internal_Dyn *);
1842
1843 if (!bfd_malloc_and_get_section (abfd, dynamic, &dynbuf))
1844 return -1;
1845
1846 extdynsize = get_elf_backend_data (abfd)->s->sizeof_dyn;
1847 swap_dyn_in = get_elf_backend_data (abfd)->s->swap_dyn_in;
1848
1849 extdyn = dynbuf;
1850 extdynend = extdyn + dynamic->size;
1851 for (; extdyn < extdynend; extdyn += extdynsize)
1852 {
1853 Elf_Internal_Dyn dyn;
1854 (*swap_dyn_in) (abfd, extdyn, &dyn);
1855
1856 if (dyn.d_tag == DT_NULL)
1857 break;
1858
1859 if (dyn.d_tag == DT_PPC_GOT)
1860 {
1861 unsigned int g_o_t = dyn.d_un.d_val;
1862 asection *got = bfd_get_section_by_name (abfd, ".got");
1863 if (got != NULL
1864 && bfd_get_section_contents (abfd, got, buf,
1865 g_o_t - got->vma + 4, 4))
1866 glink_vma = bfd_get_32 (abfd, buf);
1867 break;
1868 }
1869 }
1870 free (dynbuf);
1871 }
1872
1873 /* Otherwise we read the first plt entry. */
1874 if (glink_vma == 0)
1875 {
1876 if (bfd_get_section_contents (abfd, plt, buf, 0, 4))
1877 glink_vma = bfd_get_32 (abfd, buf);
1878 }
1879
1880 if (glink_vma == 0)
1881 return 0;
1882
1883 /* The .glink section usually does not survive the final
1884 link; search for the section (usually .text) where the
1885 glink stubs now reside. */
1886 glink = bfd_sections_find_if (abfd, section_covers_vma, &glink_vma);
1887 if (glink == NULL)
1888 return 0;
1889
1890 /* Determine glink PLT resolver by reading the relative branch
1891 from the first glink stub. */
1892 if (bfd_get_section_contents (abfd, glink, buf,
1893 glink_vma - glink->vma, 4))
1894 {
1895 unsigned int insn = bfd_get_32 (abfd, buf);
1896
1897 /* The first glink stub may either branch to the resolver ... */
1898 insn ^= B;
1899 if ((insn & ~0x3fffffc) == 0)
1900 resolv_vma = glink_vma + (insn ^ 0x2000000) - 0x2000000;
1901
1902 /* ... or fall through a bunch of NOPs. */
1903 else if ((insn ^ B ^ NOP) == 0)
1904 for (i = 4;
1905 bfd_get_section_contents (abfd, glink, buf,
1906 glink_vma - glink->vma + i, 4);
1907 i += 4)
1908 if (bfd_get_32 (abfd, buf) != NOP)
1909 {
1910 resolv_vma = glink_vma + i;
1911 break;
1912 }
1913 }
1914
7382d32a 1915 count = relplt->size / sizeof (Elf32_External_Rela);
7382d32a
AM
1916 /* If the stubs are those for -shared/-pie then we might have
1917 multiple stubs for each plt entry. If that is the case then
1918 there is no way to associate stubs with their plt entries short
9e390558
AM
1919 of figuring out the GOT pointer value used in the stub.
1920 The offsets tested here need to cover all possible values of
1921 GLINK_ENTRY_SIZE for other than __tls_get_addr_opt. */
1922 stub_off = glink_vma - glink->vma;
1923 for (stub_delta = 16; stub_delta <= 32; stub_delta += 8)
1924 if (is_nonpic_glink_stub (abfd, glink, stub_off - stub_delta))
1925 break;
1926 if (stub_delta > 32)
7382d32a
AM
1927 return 0;
1928
468392fb 1929 slurp_relocs = get_elf_backend_data (abfd)->s->slurp_reloc_table;
0a1b45a2 1930 if (! (*slurp_relocs) (abfd, relplt, dynsyms, true))
468392fb
AM
1931 return -1;
1932
468392fb
AM
1933 size = count * sizeof (asymbol);
1934 p = relplt->relocation;
1935 for (i = 0; i < count; i++, p++)
e054468f
AM
1936 {
1937 size += strlen ((*p->sym_ptr_ptr)->name) + sizeof ("@plt");
1938 if (p->addend != 0)
1939 size += sizeof ("+0x") - 1 + 8;
1940 }
468392fb
AM
1941
1942 size += sizeof (asymbol) + sizeof ("__glink");
1943
1944 if (resolv_vma)
1945 size += sizeof (asymbol) + sizeof ("__glink_PLTresolve");
1946
1947 s = *ret = bfd_malloc (size);
1948 if (s == NULL)
1949 return -1;
1950
9e390558 1951 stub_off = glink_vma - glink->vma;
468392fb 1952 names = (char *) (s + count + 1 + (resolv_vma != 0));
1079403c
AM
1953 p = relplt->relocation + count - 1;
1954 for (i = 0; i < count; i++)
468392fb
AM
1955 {
1956 size_t len;
1957
9e390558
AM
1958 stub_off -= stub_delta;
1959 if (strcmp ((*p->sym_ptr_ptr)->name, "__tls_get_addr_opt") == 0)
1960 stub_off -= 32;
468392fb
AM
1961 *s = **p->sym_ptr_ptr;
1962 /* Undefined syms won't have BSF_LOCAL or BSF_GLOBAL set. Since
1963 we are defining a symbol, ensure one of them is set. */
1964 if ((s->flags & BSF_LOCAL) == 0)
1965 s->flags |= BSF_GLOBAL;
6ba2a415 1966 s->flags |= BSF_SYNTHETIC;
468392fb 1967 s->section = glink;
9e390558 1968 s->value = stub_off;
468392fb
AM
1969 s->name = names;
1970 s->udata.p = NULL;
1971 len = strlen ((*p->sym_ptr_ptr)->name);
1972 memcpy (names, (*p->sym_ptr_ptr)->name, len);
1973 names += len;
e054468f
AM
1974 if (p->addend != 0)
1975 {
1976 memcpy (names, "+0x", sizeof ("+0x") - 1);
1977 names += sizeof ("+0x") - 1;
1978 bfd_sprintf_vma (abfd, names, p->addend);
1979 names += strlen (names);
1980 }
468392fb
AM
1981 memcpy (names, "@plt", sizeof ("@plt"));
1982 names += sizeof ("@plt");
1983 ++s;
1079403c 1984 --p;
468392fb
AM
1985 }
1986
1987 /* Add a symbol at the start of the glink branch table. */
86a4952b 1988 memset (s, 0, sizeof *s);
468392fb 1989 s->the_bfd = abfd;
6ba2a415 1990 s->flags = BSF_GLOBAL | BSF_SYNTHETIC;
468392fb
AM
1991 s->section = glink;
1992 s->value = glink_vma - glink->vma;
1993 s->name = names;
1994 memcpy (names, "__glink", sizeof ("__glink"));
1995 names += sizeof ("__glink");
1996 s++;
1997 count++;
1998
1999 if (resolv_vma)
2000 {
2001 /* Add a symbol for the glink PLT resolver. */
86a4952b 2002 memset (s, 0, sizeof *s);
468392fb 2003 s->the_bfd = abfd;
6ba2a415 2004 s->flags = BSF_GLOBAL | BSF_SYNTHETIC;
468392fb
AM
2005 s->section = glink;
2006 s->value = resolv_vma - glink->vma;
2007 s->name = names;
2008 memcpy (names, "__glink_PLTresolve", sizeof ("__glink_PLTresolve"));
2009 names += sizeof ("__glink_PLTresolve");
2010 s++;
2011 count++;
2012 }
2013
2014 return count;
2015}
2016\f
25dbc73a
AM
2017/* The following functions are specific to the ELF linker, while
2018 functions above are used generally. They appear in this file more
2019 or less in the order in which they are called. eg.
2020 ppc_elf_check_relocs is called early in the link process,
2021 ppc_elf_finish_dynamic_sections is one of the last functions
2022 called. */
252b5132 2023
a6aa5195 2024/* Track PLT entries needed for a given symbol. We might need more
a877a2b6 2025 than one glink entry per symbol when generating a pic binary. */
a6aa5195
AM
2026struct plt_entry
2027{
2028 struct plt_entry *next;
2029
2030 /* -fPIC uses multiple GOT sections, one per file, called ".got2".
2031 This field stores the offset into .got2 used to initialise the
a877a2b6
AM
2032 GOT pointer reg. It will always be at least 32768. (Current
2033 gcc always uses an offset of 32768, but ld -r will pack .got2
2034 sections together resulting in larger offsets). */
a6aa5195
AM
2035 bfd_vma addend;
2036
2037 /* The .got2 section. */
2038 asection *sec;
2039
2040 /* PLT refcount or offset. */
2041 union
2042 {
2043 bfd_signed_vma refcount;
2044 bfd_vma offset;
2045 } plt;
2046
2047 /* .glink stub offset. */
2048 bfd_vma glink_offset;
2049};
2050
7c8bbca5
AM
2051/* Of those relocs that might be copied as dynamic relocs, this
2052 function selects those that must be copied when linking a shared
2053 library or PIE, even when the symbol is local. */
252b5132 2054
1d483afe
AM
2055static int
2056must_be_dyn_reloc (struct bfd_link_info *info,
2057 enum elf_ppc_reloc_type r_type)
2058{
2059 switch (r_type)
2060 {
2061 default:
7c8bbca5
AM
2062 /* Only relative relocs can be resolved when the object load
2063 address isn't fixed. DTPREL32 is excluded because the
2064 dynamic linker needs to differentiate global dynamic from
2065 local dynamic __tls_index pairs when PPC_OPT_TLS is set. */
1d483afe
AM
2066 return 1;
2067
2068 case R_PPC_REL24:
2069 case R_PPC_REL14:
2070 case R_PPC_REL14_BRTAKEN:
2071 case R_PPC_REL14_BRNTAKEN:
2072 case R_PPC_REL32:
2073 return 0;
2074
2075 case R_PPC_TPREL32:
2076 case R_PPC_TPREL16:
2077 case R_PPC_TPREL16_LO:
2078 case R_PPC_TPREL16_HI:
2079 case R_PPC_TPREL16_HA:
7c8bbca5
AM
2080 /* These relocations are relative but in a shared library the
2081 linker doesn't know the thread pointer base. */
2082 return bfd_link_dll (info);
1d483afe
AM
2083 }
2084}
252b5132 2085
25dbc73a
AM
2086/* If ELIMINATE_COPY_RELOCS is non-zero, the linker will try to avoid
2087 copying dynamic variables from a shared lib into an app's dynbss
2088 section, and instead use a dynamic relocation to point into the
2089 shared lib. */
2090#define ELIMINATE_COPY_RELOCS 1
252b5132 2091
f95f8542
AM
2092/* Used to track dynamic relocations for local symbols. */
2093struct ppc_dyn_relocs
2094{
2095 struct ppc_dyn_relocs *next;
2096
2097 /* The input section of the reloc. */
2098 asection *sec;
2099
2100 /* Total number of relocs copied for the input section. */
2101 unsigned int count : 31;
2102
2103 /* Whether this entry is for STT_GNU_IFUNC symbols. */
2104 unsigned int ifunc : 1;
2105};
2106
25dbc73a 2107/* PPC ELF linker hash entry. */
252b5132 2108
25dbc73a
AM
2109struct ppc_elf_link_hash_entry
2110{
2111 struct elf_link_hash_entry elf;
252b5132 2112
25dbc73a
AM
2113 /* If this symbol is used in the linker created sections, the processor
2114 specific backend uses this field to map the field into the offset
2115 from the beginning of the section. */
2116 elf_linker_section_pointers_t *linker_section_pointer;
252b5132 2117
37da22e5
AM
2118 /* Contexts in which symbol is used in the GOT.
2119 Bits are or'd into the mask as the corresponding relocs are
2120 encountered during check_relocs, with TLS_TLS being set when any
2121 of the other TLS bits are set. tls_optimize clears bits when
2122 optimizing to indicate the corresponding GOT entry type is not
2123 needed. If set, TLS_TLS is never cleared. tls_optimize may also
b00a0a86 2124 set TLS_GDIE when a GD reloc turns into an IE one.
37da22e5
AM
2125 These flags are also kept for local symbols. */
2126#define TLS_TLS 1 /* Any TLS reloc. */
2127#define TLS_GD 2 /* GD reloc. */
2128#define TLS_LD 4 /* LD reloc. */
2129#define TLS_TPREL 8 /* TPREL reloc, => IE. */
2130#define TLS_DTPREL 16 /* DTPREL reloc, => LD. */
2131#define TLS_MARK 32 /* __tls_get_addr call marked. */
b00a0a86 2132#define TLS_GDIE 64 /* GOT TPREL reloc resulting from GD->IE. */
bac3c8c5 2133 unsigned char tls_mask;
4dc4a9a5 2134
37da22e5
AM
2135 /* The above field is also used to mark function symbols. In which
2136 case TLS_TLS will be 0. */
2137#define PLT_IFUNC 2 /* STT_GNU_IFUNC. */
2d7ad24e 2138#define PLT_KEEP 4 /* inline plt call requires plt entry. */
37da22e5
AM
2139#define NON_GOT 256 /* local symbol plt, not stored. */
2140
4dc4a9a5
DJ
2141 /* Nonzero if we have seen a small data relocation referring to this
2142 symbol. */
d3e454b9
AM
2143 unsigned char has_sda_refs : 1;
2144
2145 /* Flag use of given relocations. */
2146 unsigned char has_addr16_ha : 1;
2147 unsigned char has_addr16_lo : 1;
25dbc73a 2148};
252b5132 2149
25dbc73a
AM
2150#define ppc_elf_hash_entry(ent) ((struct ppc_elf_link_hash_entry *) (ent))
2151
2152/* PPC ELF linker hash table. */
2153
2154struct ppc_elf_link_hash_table
2155{
2156 struct elf_link_hash_table elf;
2157
5446cbdf
AM
2158 /* Various options passed from the linker. */
2159 struct ppc_elf_params *params;
2160
25dbc73a 2161 /* Short-cuts to get to dynamic linker sections. */
d7128ce4 2162 asection *glink;
25dbc73a
AM
2163 asection *dynsbss;
2164 asection *relsbss;
c9a2f333 2165 elf_linker_section_t sdata[2];
25dbc73a 2166 asection *sbss;
6177242a 2167 asection *glink_eh_frame;
2d7ad24e
AM
2168 asection *pltlocal;
2169 asection *relpltlocal;
25dbc73a 2170
016687f8
AM
2171 /* The (unloaded but important) .rela.plt.unloaded on VxWorks. */
2172 asection *srelplt2;
2173
1d483afe 2174 /* Shortcut to __tls_get_addr. */
25dbc73a 2175 struct elf_link_hash_entry *tls_get_addr;
252b5132 2176
016687f8
AM
2177 /* The bfd that forced an old-style PLT. */
2178 bfd *old_bfd;
5b914448 2179
25dbc73a
AM
2180 /* TLS local dynamic got entry handling. */
2181 union {
2182 bfd_signed_vma refcount;
2183 bfd_vma offset;
2184 } tlsld_got;
252b5132 2185
c6dd29ce 2186 /* Offset of branch table to PltResolve function in glink. */
d7128ce4
AM
2187 bfd_vma glink_pltresolve;
2188
3b36f7e6
AM
2189 /* Size of reserved GOT entries. */
2190 unsigned int got_header_size;
2191 /* Non-zero if allocating the header left a gap. */
2192 unsigned int got_gap;
2193
4a3dc543
RS
2194 /* The type of PLT we have chosen to use. */
2195 enum ppc_elf_plt_type plt_type;
2196
82e66161
AM
2197 /* Whether there exist local gnu indirect function resolvers,
2198 referenced by dynamic relocations. */
2199 unsigned int local_ifunc_resolver:1;
2200 unsigned int maybe_local_ifunc_resolver:1;
2201
9a23f96e
AM
2202 /* Set if tls optimization is enabled. */
2203 unsigned int do_tls_opt:1;
2204
3e04d765
AM
2205 /* Set if inline plt calls should be converted to direct calls. */
2206 unsigned int can_convert_all_inline_plt:1;
2207
9d8504b1
PB
2208 /* The size of PLT entries. */
2209 int plt_entry_size;
2210 /* The distance between adjacent PLT slots. */
2211 int plt_slot_size;
2212 /* The size of the first PLT entry. */
2213 int plt_initial_entry_size;
25dbc73a 2214};
252b5132 2215
94caa966
AM
2216/* Rename some of the generic section flags to better document how they
2217 are used for ppc32. The flags are only valid for ppc32 elf objects. */
2218
2219/* Nonzero if this section has TLS related relocations. */
2220#define has_tls_reloc sec_flg0
2221
9737e8af
AM
2222/* Nonzero if this section has a call to __tls_get_addr lacking marker
2223 relocs. */
2224#define nomark_tls_get_addr sec_flg1
94caa966 2225
3e04d765
AM
2226 /* Flag set when PLTCALL relocs are detected. */
2227#define has_pltcall sec_flg2
2228
25dbc73a 2229/* Get the PPC ELF linker hash table from a link_info structure. */
252b5132 2230
25dbc73a 2231#define ppc_elf_hash_table(p) \
a8d549c0
AM
2232 ((is_elf_hash_table ((p)->hash) \
2233 && elf_hash_table_id (elf_hash_table (p)) == PPC32_ELF_DATA) \
2234 ? (struct ppc_elf_link_hash_table *) (p)->hash : NULL)
252b5132 2235
25dbc73a 2236/* Create an entry in a PPC ELF linker hash table. */
252b5132 2237
25dbc73a
AM
2238static struct bfd_hash_entry *
2239ppc_elf_link_hash_newfunc (struct bfd_hash_entry *entry,
2240 struct bfd_hash_table *table,
2241 const char *string)
252b5132 2242{
25dbc73a
AM
2243 /* Allocate the structure if it has not already been allocated by a
2244 subclass. */
2245 if (entry == NULL)
2246 {
2247 entry = bfd_hash_allocate (table,
2248 sizeof (struct ppc_elf_link_hash_entry));
2249 if (entry == NULL)
2250 return entry;
2251 }
252b5132 2252
25dbc73a
AM
2253 /* Call the allocation method of the superclass. */
2254 entry = _bfd_elf_link_hash_newfunc (entry, table, string);
2255 if (entry != NULL)
2256 {
2257 ppc_elf_hash_entry (entry)->linker_section_pointer = NULL;
25dbc73a 2258 ppc_elf_hash_entry (entry)->tls_mask = 0;
5240d94d 2259 ppc_elf_hash_entry (entry)->has_sda_refs = 0;
25dbc73a 2260 }
252b5132 2261
25dbc73a 2262 return entry;
252b5132 2263}
3dab13f6 2264
25dbc73a 2265/* Create a PPC ELF linker hash table. */
3dab13f6 2266
25dbc73a
AM
2267static struct bfd_link_hash_table *
2268ppc_elf_link_hash_table_create (bfd *abfd)
3dab13f6 2269{
25dbc73a 2270 struct ppc_elf_link_hash_table *ret;
76e7a751 2271 static struct ppc_elf_params default_params
407aa07c 2272 = { PLT_OLD, 0, 0, 1, 0, 0, 12, 0, 0, 0 };
3dab13f6 2273
25dbc73a
AM
2274 ret = bfd_zmalloc (sizeof (struct ppc_elf_link_hash_table));
2275 if (ret == NULL)
2276 return NULL;
3dab13f6 2277
66eb6687
AM
2278 if (!_bfd_elf_link_hash_table_init (&ret->elf, abfd,
2279 ppc_elf_link_hash_newfunc,
4dfe6ac6
NC
2280 sizeof (struct ppc_elf_link_hash_entry),
2281 PPC32_ELF_DATA))
3dab13f6 2282 {
25dbc73a
AM
2283 free (ret);
2284 return NULL;
2285 }
58111eb7 2286
a6aa5195
AM
2287 ret->elf.init_plt_refcount.refcount = 0;
2288 ret->elf.init_plt_refcount.glist = NULL;
2289 ret->elf.init_plt_offset.offset = 0;
2290 ret->elf.init_plt_offset.glist = NULL;
2291
db434ba0
AM
2292 ret->params = &default_params;
2293
c9a2f333
AM
2294 ret->sdata[0].name = ".sdata";
2295 ret->sdata[0].sym_name = "_SDA_BASE_";
2296 ret->sdata[0].bss_name = ".sbss";
2297
2298 ret->sdata[1].name = ".sdata2";
2299 ret->sdata[1].sym_name = "_SDA2_BASE_";
2300 ret->sdata[1].bss_name = ".sbss2";
2301
9d8504b1
PB
2302 ret->plt_entry_size = 12;
2303 ret->plt_slot_size = 8;
2304 ret->plt_initial_entry_size = 72;
9d8504b1 2305
25dbc73a
AM
2306 return &ret->elf.root;
2307}
3dab13f6 2308
5446cbdf
AM
2309/* Hook linker params into hash table. */
2310
2311void
2312ppc_elf_link_params (struct bfd_link_info *info, struct ppc_elf_params *params)
2313{
2314 struct ppc_elf_link_hash_table *htab = ppc_elf_hash_table (info);
2315
2316 if (htab)
2317 htab->params = params;
76e7a751 2318 params->pagesize_p2 = bfd_log2 (params->pagesize);
5446cbdf
AM
2319}
2320
9d8504b1 2321/* Create .got and the related sections. */
3dab13f6 2322
0a1b45a2 2323static bool
25dbc73a
AM
2324ppc_elf_create_got (bfd *abfd, struct bfd_link_info *info)
2325{
2326 struct ppc_elf_link_hash_table *htab;
3dab13f6 2327
25dbc73a 2328 if (!_bfd_elf_create_got_section (abfd, info))
0a1b45a2 2329 return false;
3dab13f6 2330
25dbc73a 2331 htab = ppc_elf_hash_table (info);
90c14f0c 2332 if (htab->elf.target_os != is_vxworks)
9d8504b1
PB
2333 {
2334 /* The powerpc .got has a blrl instruction in it. Mark it
2335 executable. */
ce558b89
AM
2336 flagword flags = (SEC_ALLOC | SEC_LOAD | SEC_CODE | SEC_HAS_CONTENTS
2337 | SEC_IN_MEMORY | SEC_LINKER_CREATED);
fd361982 2338 if (!bfd_set_section_flags (htab->elf.sgot, flags))
0a1b45a2 2339 return false;
9d8504b1 2340 }
3dab13f6 2341
0a1b45a2 2342 return true;
25dbc73a 2343}
3dab13f6 2344
93d1b056
AM
2345/* Create a special linker section, used for R_PPC_EMB_SDAI16 and
2346 R_PPC_EMB_SDA2I16 pointers. These sections become part of .sdata
2347 and .sdata2. Create _SDA_BASE_ and _SDA2_BASE too. */
2348
0a1b45a2 2349static bool
93d1b056
AM
2350ppc_elf_create_linker_section (bfd *abfd,
2351 struct bfd_link_info *info,
2352 flagword flags,
2353 elf_linker_section_t *lsect)
2354{
2355 asection *s;
2356
2357 flags |= (SEC_ALLOC | SEC_LOAD | SEC_HAS_CONTENTS | SEC_IN_MEMORY
2358 | SEC_LINKER_CREATED);
2359
2360 s = bfd_make_section_anyway_with_flags (abfd, lsect->name, flags);
2361 if (s == NULL)
0a1b45a2 2362 return false;
93d1b056
AM
2363 lsect->section = s;
2364
2365 /* Define the sym on the first section of this name. */
2366 s = bfd_get_section_by_name (abfd, lsect->name);
2367
2368 lsect->sym = _bfd_elf_define_linkage_sym (abfd, info, s, lsect->sym_name);
2369 if (lsect->sym == NULL)
0a1b45a2 2370 return false;
93d1b056 2371 lsect->sym->root.u.def.value = 0x8000;
0a1b45a2 2372 return true;
93d1b056
AM
2373}
2374
0a1b45a2 2375static bool
e054468f
AM
2376ppc_elf_create_glink (bfd *abfd, struct bfd_link_info *info)
2377{
2378 struct ppc_elf_link_hash_table *htab = ppc_elf_hash_table (info);
2379 asection *s;
2380 flagword flags;
691d2e9a 2381 int p2align;
e054468f
AM
2382
2383 flags = (SEC_ALLOC | SEC_LOAD | SEC_CODE | SEC_READONLY | SEC_HAS_CONTENTS
2384 | SEC_IN_MEMORY | SEC_LINKER_CREATED);
2385 s = bfd_make_section_anyway_with_flags (abfd, ".glink", flags);
2386 htab->glink = s;
691d2e9a
AM
2387 p2align = htab->params->ppc476_workaround ? 6 : 4;
2388 if (p2align < htab->params->plt_stub_align)
2389 p2align = htab->params->plt_stub_align;
e054468f 2390 if (s == NULL
fd361982 2391 || !bfd_set_section_alignment (s, p2align))
0a1b45a2 2392 return false;
e054468f 2393
6177242a
AM
2394 if (!info->no_ld_generated_unwind_info)
2395 {
2396 flags = (SEC_ALLOC | SEC_LOAD | SEC_READONLY | SEC_HAS_CONTENTS
2397 | SEC_IN_MEMORY | SEC_LINKER_CREATED);
2398 s = bfd_make_section_anyway_with_flags (abfd, ".eh_frame", flags);
2399 htab->glink_eh_frame = s;
2400 if (s == NULL
fd361982 2401 || !bfd_set_section_alignment (s, 2))
0a1b45a2 2402 return false;
6177242a
AM
2403 }
2404
e054468f
AM
2405 flags = SEC_ALLOC | SEC_LINKER_CREATED;
2406 s = bfd_make_section_anyway_with_flags (abfd, ".iplt", flags);
ce558b89 2407 htab->elf.iplt = s;
e054468f 2408 if (s == NULL
fd361982 2409 || !bfd_set_section_alignment (s, 4))
0a1b45a2 2410 return false;
e054468f
AM
2411
2412 flags = (SEC_ALLOC | SEC_LOAD | SEC_READONLY | SEC_HAS_CONTENTS
2413 | SEC_IN_MEMORY | SEC_LINKER_CREATED);
14b2f831 2414 s = bfd_make_section_anyway_with_flags (abfd, ".rela.iplt", flags);
ce558b89 2415 htab->elf.irelplt = s;
e054468f 2416 if (s == NULL
fd361982 2417 || ! bfd_set_section_alignment (s, 2))
0a1b45a2 2418 return false;
93d1b056 2419
2d7ad24e
AM
2420 /* Local plt entries. */
2421 flags = (SEC_ALLOC | SEC_LOAD
2422 | SEC_HAS_CONTENTS | SEC_IN_MEMORY | SEC_LINKER_CREATED);
2423 htab->pltlocal = bfd_make_section_anyway_with_flags (abfd, ".branch_lt",
2424 flags);
2425 if (htab->pltlocal == NULL
fd361982 2426 || !bfd_set_section_alignment (htab->pltlocal, 2))
0a1b45a2 2427 return false;
2d7ad24e
AM
2428
2429 if (bfd_link_pic (info))
2430 {
2431 flags = (SEC_ALLOC | SEC_LOAD | SEC_READONLY
2432 | SEC_HAS_CONTENTS | SEC_IN_MEMORY | SEC_LINKER_CREATED);
2433 htab->relpltlocal
2434 = bfd_make_section_anyway_with_flags (abfd, ".rela.branch_lt", flags);
2435 if (htab->relpltlocal == NULL
fd361982 2436 || !bfd_set_section_alignment (htab->relpltlocal, 2))
0a1b45a2 2437 return false;
2d7ad24e
AM
2438 }
2439
93d1b056
AM
2440 if (!ppc_elf_create_linker_section (abfd, info, 0,
2441 &htab->sdata[0]))
0a1b45a2 2442 return false;
93d1b056
AM
2443
2444 if (!ppc_elf_create_linker_section (abfd, info, SEC_READONLY,
2445 &htab->sdata[1]))
0a1b45a2 2446 return false;
93d1b056 2447
0a1b45a2 2448 return true;
e054468f
AM
2449}
2450
25dbc73a
AM
2451/* We have to create .dynsbss and .rela.sbss here so that they get mapped
2452 to output sections (just like _bfd_elf_create_dynamic_sections has
2453 to create .dynbss and .rela.bss). */
3dab13f6 2454
0a1b45a2 2455static bool
25dbc73a
AM
2456ppc_elf_create_dynamic_sections (bfd *abfd, struct bfd_link_info *info)
2457{
2458 struct ppc_elf_link_hash_table *htab;
2459 asection *s;
2460 flagword flags;
3dab13f6 2461
25dbc73a 2462 htab = ppc_elf_hash_table (info);
3dab13f6 2463
ce558b89 2464 if (htab->elf.sgot == NULL
25dbc73a 2465 && !ppc_elf_create_got (abfd, info))
0a1b45a2 2466 return false;
3dab13f6 2467
25dbc73a 2468 if (!_bfd_elf_create_dynamic_sections (abfd, info))
0a1b45a2 2469 return false;
3dab13f6 2470
e054468f
AM
2471 if (htab->glink == NULL
2472 && !ppc_elf_create_glink (abfd, info))
0a1b45a2 2473 return false;
3dab13f6 2474
14b2f831
AM
2475 s = bfd_make_section_anyway_with_flags (abfd, ".dynsbss",
2476 SEC_ALLOC | SEC_LINKER_CREATED);
3b36f7e6 2477 htab->dynsbss = s;
3496cb2a 2478 if (s == NULL)
0a1b45a2 2479 return false;
3dab13f6 2480
0e1862bb 2481 if (! bfd_link_pic (info))
25dbc73a 2482 {
e054468f
AM
2483 flags = (SEC_ALLOC | SEC_LOAD | SEC_READONLY | SEC_HAS_CONTENTS
2484 | SEC_IN_MEMORY | SEC_LINKER_CREATED);
14b2f831 2485 s = bfd_make_section_anyway_with_flags (abfd, ".rela.sbss", flags);
3b36f7e6 2486 htab->relsbss = s;
25dbc73a 2487 if (s == NULL
fd361982 2488 || !bfd_set_section_alignment (s, 2))
0a1b45a2 2489 return false;
25dbc73a 2490 }
3dab13f6 2491
90c14f0c 2492 if (htab->elf.target_os == is_vxworks
711de32c 2493 && !elf_vxworks_create_dynamic_sections (abfd, info, &htab->srelplt2))
0a1b45a2 2494 return false;
9d8504b1 2495
ce558b89 2496 s = htab->elf.splt;
3b36f7e6 2497 flags = SEC_ALLOC | SEC_CODE | SEC_LINKER_CREATED;
4a3dc543
RS
2498 if (htab->plt_type == PLT_VXWORKS)
2499 /* The VxWorks PLT is a loaded section with contents. */
2500 flags |= SEC_HAS_CONTENTS | SEC_LOAD | SEC_READONLY;
fd361982 2501 return bfd_set_section_flags (s, flags);
25dbc73a 2502}
3dab13f6 2503
25dbc73a 2504/* Copy the extra info we tack onto an elf_link_hash_entry. */
58111eb7 2505
25dbc73a 2506static void
fcfa13d2 2507ppc_elf_copy_indirect_symbol (struct bfd_link_info *info,
25dbc73a
AM
2508 struct elf_link_hash_entry *dir,
2509 struct elf_link_hash_entry *ind)
2510{
2511 struct ppc_elf_link_hash_entry *edir, *eind;
3dab13f6 2512
25dbc73a
AM
2513 edir = (struct ppc_elf_link_hash_entry *) dir;
2514 eind = (struct ppc_elf_link_hash_entry *) ind;
3dab13f6 2515
c79d6685
AM
2516 edir->tls_mask |= eind->tls_mask;
2517 edir->has_sda_refs |= eind->has_sda_refs;
2518
e81830c5
AM
2519 if (edir->elf.versioned != versioned_hidden)
2520 edir->elf.ref_dynamic |= eind->elf.ref_dynamic;
c79d6685
AM
2521 edir->elf.ref_regular |= eind->elf.ref_regular;
2522 edir->elf.ref_regular_nonweak |= eind->elf.ref_regular_nonweak;
4a7e5234 2523 edir->elf.non_got_ref |= eind->elf.non_got_ref;
c79d6685
AM
2524 edir->elf.needs_plt |= eind->elf.needs_plt;
2525 edir->elf.pointer_equality_needed |= eind->elf.pointer_equality_needed;
2526
287c7eaf
AM
2527 /* If we were called to copy over info for a weak sym, that's all. */
2528 if (eind->elf.root.type != bfd_link_hash_indirect)
2529 return;
2530
190eb1dd 2531 if (ind->dyn_relocs != NULL)
25dbc73a 2532 {
190eb1dd 2533 if (dir->dyn_relocs != NULL)
3dab13f6 2534 {
6061a67d
AM
2535 struct elf_dyn_relocs **pp;
2536 struct elf_dyn_relocs *p;
3dab13f6 2537
fcfa13d2 2538 /* Add reloc counts against the indirect sym to the direct sym
25dbc73a 2539 list. Merge any entries against the same section. */
190eb1dd 2540 for (pp = &ind->dyn_relocs; (p = *pp) != NULL; )
3dab13f6 2541 {
6061a67d 2542 struct elf_dyn_relocs *q;
25dbc73a 2543
190eb1dd 2544 for (q = dir->dyn_relocs; q != NULL; q = q->next)
25dbc73a
AM
2545 if (q->sec == p->sec)
2546 {
2547 q->pc_count += p->pc_count;
2548 q->count += p->count;
2549 *pp = p->next;
2550 break;
2551 }
2552 if (q == NULL)
2553 pp = &p->next;
3dab13f6 2554 }
190eb1dd 2555 *pp = dir->dyn_relocs;
3dab13f6 2556 }
25dbc73a 2557
190eb1dd
L
2558 dir->dyn_relocs = ind->dyn_relocs;
2559 ind->dyn_relocs = NULL;
3dab13f6 2560 }
3dab13f6 2561
a6aa5195
AM
2562 /* Copy over the GOT refcount entries that we may have already seen to
2563 the symbol which just became indirect. */
fcfa13d2
AM
2564 edir->elf.got.refcount += eind->elf.got.refcount;
2565 eind->elf.got.refcount = 0;
a6aa5195
AM
2566
2567 /* And plt entries. */
2568 if (eind->elf.plt.plist != NULL)
2569 {
2570 if (edir->elf.plt.plist != NULL)
2571 {
2572 struct plt_entry **entp;
2573 struct plt_entry *ent;
2574
2575 for (entp = &eind->elf.plt.plist; (ent = *entp) != NULL; )
2576 {
2577 struct plt_entry *dent;
2578
2579 for (dent = edir->elf.plt.plist; dent != NULL; dent = dent->next)
2580 if (dent->sec == ent->sec && dent->addend == ent->addend)
2581 {
2582 dent->plt.refcount += ent->plt.refcount;
2583 *entp = ent->next;
2584 break;
2585 }
2586 if (dent == NULL)
2587 entp = &ent->next;
2588 }
2589 *entp = edir->elf.plt.plist;
2590 }
2591
2592 edir->elf.plt.plist = eind->elf.plt.plist;
2593 eind->elf.plt.plist = NULL;
2594 }
2595
fcfa13d2 2596 if (eind->elf.dynindx != -1)
25dbc73a 2597 {
fcfa13d2
AM
2598 if (edir->elf.dynindx != -1)
2599 _bfd_elf_strtab_delref (elf_hash_table (info)->dynstr,
2600 edir->elf.dynstr_index);
a6aa5195
AM
2601 edir->elf.dynindx = eind->elf.dynindx;
2602 edir->elf.dynstr_index = eind->elf.dynstr_index;
2603 eind->elf.dynindx = -1;
2604 eind->elf.dynstr_index = 0;
25dbc73a 2605 }
25dbc73a 2606}
3dab13f6 2607
25dbc73a
AM
2608/* Hook called by the linker routine which adds symbols from an object
2609 file. We use it to put .comm items in .sbss, and not .bss. */
58111eb7 2610
0a1b45a2 2611static bool
25dbc73a
AM
2612ppc_elf_add_symbol_hook (bfd *abfd,
2613 struct bfd_link_info *info,
2614 Elf_Internal_Sym *sym,
2615 const char **namep ATTRIBUTE_UNUSED,
2616 flagword *flagsp ATTRIBUTE_UNUSED,
2617 asection **secp,
2618 bfd_vma *valp)
2619{
2620 if (sym->st_shndx == SHN_COMMON
0e1862bb 2621 && !bfd_link_relocatable (info)
0c8d6e5c
AM
2622 && is_ppc_elf (info->output_bfd)
2623 && sym->st_size <= elf_gp_size (abfd))
25dbc73a
AM
2624 {
2625 /* Common symbols less than or equal to -G nn bytes are automatically
2626 put into .sbss. */
2627 struct ppc_elf_link_hash_table *htab;
3dab13f6 2628
25dbc73a
AM
2629 htab = ppc_elf_hash_table (info);
2630 if (htab->sbss == NULL)
2631 {
10885e24 2632 flagword flags = SEC_IS_COMMON | SEC_SMALL_DATA | SEC_LINKER_CREATED;
3dab13f6 2633
644285ef
AM
2634 if (!htab->elf.dynobj)
2635 htab->elf.dynobj = abfd;
2636
3496cb2a
L
2637 htab->sbss = bfd_make_section_anyway_with_flags (htab->elf.dynobj,
2638 ".sbss",
2639 flags);
2640 if (htab->sbss == NULL)
0a1b45a2 2641 return false;
3dab13f6 2642 }
3dab13f6 2643
25dbc73a
AM
2644 *secp = htab->sbss;
2645 *valp = sym->st_size;
2646 }
3dab13f6 2647
0a1b45a2 2648 return true;
3dab13f6
AM
2649}
2650\f
25dbc73a
AM
2651/* Find a linker generated pointer with a given addend and type. */
2652
2653static elf_linker_section_pointers_t *
2654elf_find_pointer_linker_section
2655 (elf_linker_section_pointers_t *linker_pointers,
2656 bfd_vma addend,
2657 elf_linker_section_t *lsect)
252b5132 2658{
25dbc73a
AM
2659 for ( ; linker_pointers != NULL; linker_pointers = linker_pointers->next)
2660 if (lsect == linker_pointers->lsect && addend == linker_pointers->addend)
2661 return linker_pointers;
252b5132 2662
25dbc73a
AM
2663 return NULL;
2664}
2665
2666/* Allocate a pointer to live in a linker created section. */
2667
0a1b45a2 2668static bool
93d1b056
AM
2669elf_allocate_pointer_linker_section (bfd *abfd,
2670 elf_linker_section_t *lsect,
2671 struct elf_link_hash_entry *h,
2672 const Elf_Internal_Rela *rel)
25dbc73a
AM
2673{
2674 elf_linker_section_pointers_t **ptr_linker_section_ptr = NULL;
2675 elf_linker_section_pointers_t *linker_section_ptr;
2676 unsigned long r_symndx = ELF32_R_SYM (rel->r_info);
2677 bfd_size_type amt;
2678
2679 BFD_ASSERT (lsect != NULL);
2680
2681 /* Is this a global symbol? */
2682 if (h != NULL)
2683 {
2684 struct ppc_elf_link_hash_entry *eh;
2685
2686 /* Has this symbol already been allocated? If so, our work is done. */
2687 eh = (struct ppc_elf_link_hash_entry *) h;
2688 if (elf_find_pointer_linker_section (eh->linker_section_pointer,
2689 rel->r_addend,
2690 lsect))
0a1b45a2 2691 return true;
25dbc73a
AM
2692
2693 ptr_linker_section_ptr = &eh->linker_section_pointer;
25dbc73a
AM
2694 }
2695 else
2696 {
0c8d6e5c 2697 BFD_ASSERT (is_ppc_elf (abfd));
0ffa91dd 2698
25dbc73a
AM
2699 /* Allocation of a pointer to a local symbol. */
2700 elf_linker_section_pointers_t **ptr = elf_local_ptr_offsets (abfd);
2701
2702 /* Allocate a table to hold the local symbols if first time. */
2703 if (!ptr)
2704 {
0ffa91dd 2705 unsigned int num_symbols = elf_symtab_hdr (abfd).sh_info;
25dbc73a
AM
2706
2707 amt = num_symbols;
2708 amt *= sizeof (elf_linker_section_pointers_t *);
2709 ptr = bfd_zalloc (abfd, amt);
2710
2711 if (!ptr)
0a1b45a2 2712 return false;
25dbc73a
AM
2713
2714 elf_local_ptr_offsets (abfd) = ptr;
2715 }
2716
2717 /* Has this symbol already been allocated? If so, our work is done. */
2718 if (elf_find_pointer_linker_section (ptr[r_symndx],
2719 rel->r_addend,
2720 lsect))
0a1b45a2 2721 return true;
252b5132 2722
25dbc73a 2723 ptr_linker_section_ptr = &ptr[r_symndx];
25dbc73a 2724 }
41fcb14e 2725
25dbc73a
AM
2726 /* Allocate space for a pointer in the linker section, and allocate
2727 a new pointer record from internal memory. */
2728 BFD_ASSERT (ptr_linker_section_ptr != NULL);
2729 amt = sizeof (elf_linker_section_pointers_t);
2730 linker_section_ptr = bfd_alloc (abfd, amt);
41fcb14e 2731
25dbc73a 2732 if (!linker_section_ptr)
0a1b45a2 2733 return false;
41fcb14e 2734
25dbc73a
AM
2735 linker_section_ptr->next = *ptr_linker_section_ptr;
2736 linker_section_ptr->addend = rel->r_addend;
2737 linker_section_ptr->lsect = lsect;
25dbc73a 2738 *ptr_linker_section_ptr = linker_section_ptr;
41fcb14e 2739
fd361982 2740 if (!bfd_set_section_alignment (lsect->section, 2))
0a1b45a2 2741 return false;
25dbc73a
AM
2742 linker_section_ptr->offset = lsect->section->size;
2743 lsect->section->size += 4;
7619e7c7 2744
25dbc73a
AM
2745#ifdef DEBUG
2746 fprintf (stderr,
2747 "Create pointer in linker section %s, offset = %ld, section size = %ld\n",
2748 lsect->name, (long) linker_section_ptr->offset,
2749 (long) lsect->section->size);
2750#endif
7619e7c7 2751
0a1b45a2 2752 return true;
41fcb14e
AM
2753}
2754
e054468f 2755static struct plt_entry **
25dbc73a
AM
2756update_local_sym_info (bfd *abfd,
2757 Elf_Internal_Shdr *symtab_hdr,
2758 unsigned long r_symndx,
2759 int tls_type)
252b5132 2760{
25dbc73a 2761 bfd_signed_vma *local_got_refcounts = elf_local_got_refcounts (abfd);
e054468f 2762 struct plt_entry **local_plt;
bac3c8c5 2763 unsigned char *local_got_tls_masks;
252b5132 2764
25dbc73a 2765 if (local_got_refcounts == NULL)
252b5132 2766 {
25dbc73a
AM
2767 bfd_size_type size = symtab_hdr->sh_info;
2768
e054468f
AM
2769 size *= (sizeof (*local_got_refcounts)
2770 + sizeof (*local_plt)
2771 + sizeof (*local_got_tls_masks));
25dbc73a
AM
2772 local_got_refcounts = bfd_zalloc (abfd, size);
2773 if (local_got_refcounts == NULL)
e054468f 2774 return NULL;
25dbc73a 2775 elf_local_got_refcounts (abfd) = local_got_refcounts;
252b5132 2776 }
41fcb14e 2777
e054468f 2778 local_plt = (struct plt_entry **) (local_got_refcounts + symtab_hdr->sh_info);
bac3c8c5 2779 local_got_tls_masks = (unsigned char *) (local_plt + symtab_hdr->sh_info);
37da22e5
AM
2780 local_got_tls_masks[r_symndx] |= tls_type & 0xff;
2781 if ((tls_type & NON_GOT) == 0)
e054468f
AM
2782 local_got_refcounts[r_symndx] += 1;
2783 return local_plt + r_symndx;
25dbc73a 2784}
41fcb14e 2785
0a1b45a2 2786static bool
3ec01793 2787update_plt_info (bfd *abfd, struct plt_entry **plist,
a6aa5195
AM
2788 asection *sec, bfd_vma addend)
2789{
2790 struct plt_entry *ent;
2791
32af9f6e
AM
2792 if (addend < 32768)
2793 sec = NULL;
3ec01793 2794 for (ent = *plist; ent != NULL; ent = ent->next)
a6aa5195
AM
2795 if (ent->sec == sec && ent->addend == addend)
2796 break;
2797 if (ent == NULL)
2798 {
986f0783 2799 size_t amt = sizeof (*ent);
a6aa5195
AM
2800 ent = bfd_alloc (abfd, amt);
2801 if (ent == NULL)
0a1b45a2 2802 return false;
3ec01793 2803 ent->next = *plist;
a6aa5195
AM
2804 ent->sec = sec;
2805 ent->addend = addend;
2806 ent->plt.refcount = 0;
3ec01793 2807 *plist = ent;
a6aa5195
AM
2808 }
2809 ent->plt.refcount += 1;
0a1b45a2 2810 return true;
a6aa5195
AM
2811}
2812
2813static struct plt_entry *
3ec01793 2814find_plt_ent (struct plt_entry **plist, asection *sec, bfd_vma addend)
a6aa5195
AM
2815{
2816 struct plt_entry *ent;
2817
2818 if (addend < 32768)
2819 sec = NULL;
3ec01793 2820 for (ent = *plist; ent != NULL; ent = ent->next)
a6aa5195
AM
2821 if (ent->sec == sec && ent->addend == addend)
2822 break;
2823 return ent;
2824}
2825
0a1b45a2 2826static bool
e054468f
AM
2827is_branch_reloc (enum elf_ppc_reloc_type r_type)
2828{
2829 return (r_type == R_PPC_PLTREL24
2830 || r_type == R_PPC_LOCAL24PC
2831 || r_type == R_PPC_REL24
2832 || r_type == R_PPC_REL14
2833 || r_type == R_PPC_REL14_BRTAKEN
2834 || r_type == R_PPC_REL14_BRNTAKEN
2835 || r_type == R_PPC_ADDR24
2836 || r_type == R_PPC_ADDR14
2837 || r_type == R_PPC_ADDR14_BRTAKEN
dfdaec14
AJ
2838 || r_type == R_PPC_ADDR14_BRNTAKEN
2839 || r_type == R_PPC_VLE_REL24);
e054468f
AM
2840}
2841
23cedd1d
AM
2842/* Relocs on inline plt call sequence insns prior to the call. */
2843
0a1b45a2 2844static bool
23cedd1d
AM
2845is_plt_seq_reloc (enum elf_ppc_reloc_type r_type)
2846{
2847 return (r_type == R_PPC_PLT16_HA
2848 || r_type == R_PPC_PLT16_HI
2849 || r_type == R_PPC_PLT16_LO
2850 || r_type == R_PPC_PLTSEQ);
2851}
2852
25dbc73a
AM
2853static void
2854bad_shared_reloc (bfd *abfd, enum elf_ppc_reloc_type r_type)
2855{
4eca0228 2856 _bfd_error_handler
695344c0 2857 /* xgettext:c-format */
871b3ab2 2858 (_("%pB: relocation %s cannot be used when making a shared object"),
25dbc73a
AM
2859 abfd,
2860 ppc_elf_howto_table[r_type]->name);
2861 bfd_set_error (bfd_error_bad_value);
252b5132
RH
2862}
2863
25dbc73a
AM
2864/* Look through the relocs for a section during the first phase, and
2865 allocate space in the global offset table or procedure linkage
2866 table. */
252b5132 2867
0a1b45a2 2868static bool
25dbc73a
AM
2869ppc_elf_check_relocs (bfd *abfd,
2870 struct bfd_link_info *info,
2871 asection *sec,
2872 const Elf_Internal_Rela *relocs)
252b5132 2873{
7619e7c7 2874 struct ppc_elf_link_hash_table *htab;
25dbc73a
AM
2875 Elf_Internal_Shdr *symtab_hdr;
2876 struct elf_link_hash_entry **sym_hashes;
2877 const Elf_Internal_Rela *rel;
2878 const Elf_Internal_Rela *rel_end;
a6aa5195 2879 asection *got2, *sreloc;
727fc41e 2880 struct elf_link_hash_entry *tga;
25dbc73a 2881
0e1862bb 2882 if (bfd_link_relocatable (info))
0a1b45a2 2883 return true;
252b5132
RH
2884
2885#ifdef DEBUG
871b3ab2 2886 _bfd_error_handler ("ppc_elf_check_relocs called for section %pA in %pB",
25dbc73a 2887 sec, abfd);
252b5132
RH
2888#endif
2889
0c8d6e5c 2890 BFD_ASSERT (is_ppc_elf (abfd));
0ffa91dd 2891
25dbc73a
AM
2892 /* Initialize howto table if not already done. */
2893 if (!ppc_elf_howto_table[R_PPC_ADDR32])
2894 ppc_elf_howto_init ();
2895
7619e7c7 2896 htab = ppc_elf_hash_table (info);
25f23106
AM
2897 if (htab->glink == NULL)
2898 {
2899 if (htab->elf.dynobj == NULL)
2900 htab->elf.dynobj = abfd;
2901 if (!ppc_elf_create_glink (htab->elf.dynobj, info))
0a1b45a2 2902 return false;
25f23106 2903 }
727fc41e 2904 tga = elf_link_hash_lookup (&htab->elf, "__tls_get_addr",
0a1b45a2 2905 false, false, true);
0ffa91dd 2906 symtab_hdr = &elf_symtab_hdr (abfd);
25dbc73a 2907 sym_hashes = elf_sym_hashes (abfd);
a6aa5195 2908 got2 = bfd_get_section_by_name (abfd, ".got2");
25dbc73a
AM
2909 sreloc = NULL;
2910
2911 rel_end = relocs + sec->reloc_count;
2912 for (rel = relocs; rel < rel_end; rel++)
2913 {
2914 unsigned long r_symndx;
2915 enum elf_ppc_reloc_type r_type;
2916 struct elf_link_hash_entry *h;
727fc41e 2917 int tls_type;
cbf95972 2918 struct plt_entry **ifunc;
2d7ad24e
AM
2919 struct plt_entry **pltent;
2920 bfd_vma addend;
25dbc73a
AM
2921
2922 r_symndx = ELF32_R_SYM (rel->r_info);
2923 if (r_symndx < symtab_hdr->sh_info)
2924 h = NULL;
2925 else
973a3492
L
2926 {
2927 h = sym_hashes[r_symndx - symtab_hdr->sh_info];
2928 while (h->root.type == bfd_link_hash_indirect
2929 || h->root.type == bfd_link_hash_warning)
2930 h = (struct elf_link_hash_entry *) h->root.u.i.link;
2931 }
25dbc73a
AM
2932
2933 /* If a relocation refers to _GLOBAL_OFFSET_TABLE_, create the .got.
2934 This shows up in particular in an R_PPC_ADDR32 in the eabi
2935 startup code. */
3b36f7e6 2936 if (h != NULL
ce558b89 2937 && htab->elf.sgot == NULL
3b36f7e6 2938 && strcmp (h->root.root.string, "_GLOBAL_OFFSET_TABLE_") == 0)
252b5132 2939 {
3b36f7e6
AM
2940 if (htab->elf.dynobj == NULL)
2941 htab->elf.dynobj = abfd;
2942 if (!ppc_elf_create_got (htab->elf.dynobj, info))
0a1b45a2 2943 return false;
3b36f7e6 2944 BFD_ASSERT (h == htab->elf.hgot);
25dbc73a 2945 }
252b5132 2946
727fc41e 2947 tls_type = 0;
de972ffa 2948 r_type = ELF32_R_TYPE (rel->r_info);
cbf95972 2949 ifunc = NULL;
90c14f0c 2950 if (h == NULL && htab->elf.target_os != is_vxworks)
e054468f 2951 {
f1dfbfdb 2952 Elf_Internal_Sym *isym = bfd_sym_from_r_symndx (&htab->elf.sym_cache,
06a162cf
AM
2953 abfd, r_symndx);
2954 if (isym == NULL)
0a1b45a2 2955 return false;
06a162cf 2956
0bed072f 2957 if (ELF_ST_TYPE (isym->st_info) == STT_GNU_IFUNC)
e054468f 2958 {
0bed072f 2959 /* Set PLT_IFUNC flag for this sym, no GOT entry yet. */
06a162cf 2960 ifunc = update_local_sym_info (abfd, symtab_hdr, r_symndx,
37da22e5 2961 NON_GOT | PLT_IFUNC);
06a162cf 2962 if (ifunc == NULL)
0a1b45a2 2963 return false;
e054468f 2964
06a162cf
AM
2965 /* STT_GNU_IFUNC symbols must have a PLT entry;
2966 In a non-pie executable even when there are
2967 no plt calls. */
0e1862bb 2968 if (!bfd_link_pic (info)
08be3224
AM
2969 || is_branch_reloc (r_type)
2970 || r_type == R_PPC_PLT16_LO
2971 || r_type == R_PPC_PLT16_HI
2972 || r_type == R_PPC_PLT16_HA)
e054468f 2973 {
2d7ad24e 2974 addend = 0;
0bed072f 2975 if (r_type == R_PPC_PLTREL24)
08be3224
AM
2976 ppc_elf_tdata (abfd)->makes_plt_call = 1;
2977 if (bfd_link_pic (info)
2978 && (r_type == R_PPC_PLTREL24
2979 || r_type == R_PPC_PLT16_LO
2980 || r_type == R_PPC_PLT16_HI
2981 || r_type == R_PPC_PLT16_HA))
2982 addend = rel->r_addend;
0bed072f 2983 if (!update_plt_info (abfd, ifunc, got2, addend))
0a1b45a2 2984 return false;
e054468f
AM
2985 }
2986 }
25f23106
AM
2987 }
2988
90c14f0c 2989 if (htab->elf.target_os != is_vxworks
de972ffa
AM
2990 && is_branch_reloc (r_type)
2991 && h != NULL
2992 && h == tga)
25f23106 2993 {
de972ffa
AM
2994 if (rel != relocs
2995 && (ELF32_R_TYPE (rel[-1].r_info) == R_PPC_TLSGD
2996 || ELF32_R_TYPE (rel[-1].r_info) == R_PPC_TLSLD))
2997 /* We have a new-style __tls_get_addr call with a marker
2998 reloc. */
2999 ;
3000 else
3001 /* Mark this section as having an old-style call. */
9737e8af 3002 sec->nomark_tls_get_addr = 1;
e054468f 3003 }
727fc41e 3004
25dbc73a
AM
3005 switch (r_type)
3006 {
727fc41e
AM
3007 case R_PPC_TLSGD:
3008 case R_PPC_TLSLD:
3009 /* These special tls relocs tie a call to __tls_get_addr with
3010 its parameter symbol. */
37da22e5
AM
3011 if (h != NULL)
3012 ppc_elf_hash_entry (h)->tls_mask |= TLS_TLS | TLS_MARK;
3013 else
3014 if (!update_local_sym_info (abfd, symtab_hdr, r_symndx,
3015 NON_GOT | TLS_TLS | TLS_MARK))
0a1b45a2 3016 return false;
727fc41e
AM
3017 break;
3018
23cedd1d
AM
3019 case R_PPC_PLTSEQ:
3020 break;
3021
25dbc73a
AM
3022 case R_PPC_GOT_TLSLD16:
3023 case R_PPC_GOT_TLSLD16_LO:
3024 case R_PPC_GOT_TLSLD16_HI:
3025 case R_PPC_GOT_TLSLD16_HA:
25dbc73a
AM
3026 tls_type = TLS_TLS | TLS_LD;
3027 goto dogottls;
252b5132 3028
25dbc73a
AM
3029 case R_PPC_GOT_TLSGD16:
3030 case R_PPC_GOT_TLSGD16_LO:
3031 case R_PPC_GOT_TLSGD16_HI:
3032 case R_PPC_GOT_TLSGD16_HA:
3033 tls_type = TLS_TLS | TLS_GD;
3034 goto dogottls;
3035
3036 case R_PPC_GOT_TPREL16:
3037 case R_PPC_GOT_TPREL16_LO:
3038 case R_PPC_GOT_TPREL16_HI:
3039 case R_PPC_GOT_TPREL16_HA:
7c8bbca5 3040 if (bfd_link_dll (info))
25dbc73a
AM
3041 info->flags |= DF_STATIC_TLS;
3042 tls_type = TLS_TLS | TLS_TPREL;
3043 goto dogottls;
3044
3045 case R_PPC_GOT_DTPREL16:
3046 case R_PPC_GOT_DTPREL16_LO:
3047 case R_PPC_GOT_DTPREL16_HI:
3048 case R_PPC_GOT_DTPREL16_HA:
3049 tls_type = TLS_TLS | TLS_DTPREL;
3050 dogottls:
3051 sec->has_tls_reloc = 1;
1a0670f3 3052 /* Fall through. */
252b5132 3053
25dbc73a
AM
3054 /* GOT16 relocations */
3055 case R_PPC_GOT16:
3056 case R_PPC_GOT16_LO:
3057 case R_PPC_GOT16_HI:
3058 case R_PPC_GOT16_HA:
3059 /* This symbol requires a global offset table entry. */
ce558b89 3060 if (htab->elf.sgot == NULL)
25dbc73a
AM
3061 {
3062 if (htab->elf.dynobj == NULL)
3063 htab->elf.dynobj = abfd;
3064 if (!ppc_elf_create_got (htab->elf.dynobj, info))
0a1b45a2 3065 return false;
25dbc73a
AM
3066 }
3067 if (h != NULL)
3068 {
3069 h->got.refcount += 1;
3070 ppc_elf_hash_entry (h)->tls_mask |= tls_type;
3071 }
3072 else
3073 /* This is a global offset table entry for a local symbol. */
3074 if (!update_local_sym_info (abfd, symtab_hdr, r_symndx, tls_type))
0a1b45a2 3075 return false;
91e21fb7
AM
3076
3077 /* We may also need a plt entry if the symbol turns out to be
3078 an ifunc. */
0e1862bb 3079 if (h != NULL && !bfd_link_pic (info))
91e21fb7
AM
3080 {
3081 if (!update_plt_info (abfd, &h->plt.plist, NULL, 0))
0a1b45a2 3082 return false;
91e21fb7 3083 }
25dbc73a 3084 break;
252b5132 3085
25dbc73a
AM
3086 /* Indirect .sdata relocation. */
3087 case R_PPC_EMB_SDAI16:
93d1b056
AM
3088 htab->sdata[0].sym->ref_regular = 1;
3089 if (!elf_allocate_pointer_linker_section (abfd, &htab->sdata[0],
3090 h, rel))
0a1b45a2 3091 return false;
046183de
AM
3092 if (h != NULL)
3093 {
0a1b45a2
AM
3094 ppc_elf_hash_entry (h)->has_sda_refs = true;
3095 h->non_got_ref = true;
046183de 3096 }
25dbc73a 3097 break;
252b5132 3098
25dbc73a
AM
3099 /* Indirect .sdata2 relocation. */
3100 case R_PPC_EMB_SDA2I16:
c0d9f31d 3101 if (!bfd_link_executable (info))
25dbc73a
AM
3102 {
3103 bad_shared_reloc (abfd, r_type);
0a1b45a2 3104 return false;
25dbc73a 3105 }
93d1b056
AM
3106 htab->sdata[1].sym->ref_regular = 1;
3107 if (!elf_allocate_pointer_linker_section (abfd, &htab->sdata[1],
3108 h, rel))
0a1b45a2 3109 return false;
046183de
AM
3110 if (h != NULL)
3111 {
0a1b45a2
AM
3112 ppc_elf_hash_entry (h)->has_sda_refs = true;
3113 h->non_got_ref = true;
046183de 3114 }
25dbc73a 3115 break;
252b5132 3116
93d1b056
AM
3117 case R_PPC_SDAREL16:
3118 htab->sdata[0].sym->ref_regular = 1;
1a0670f3 3119 /* Fall through. */
93d1b056 3120
b9c361e0
JL
3121 case R_PPC_VLE_SDAREL_LO16A:
3122 case R_PPC_VLE_SDAREL_LO16D:
3123 case R_PPC_VLE_SDAREL_HI16A:
3124 case R_PPC_VLE_SDAREL_HI16D:
3125 case R_PPC_VLE_SDAREL_HA16A:
3126 case R_PPC_VLE_SDAREL_HA16D:
046183de
AM
3127 if (h != NULL)
3128 {
0a1b45a2
AM
3129 ppc_elf_hash_entry (h)->has_sda_refs = true;
3130 h->non_got_ref = true;
046183de
AM
3131 }
3132 break;
3133
b9c361e0
JL
3134 case R_PPC_VLE_REL8:
3135 case R_PPC_VLE_REL15:
3136 case R_PPC_VLE_REL24:
3137 case R_PPC_VLE_LO16A:
3138 case R_PPC_VLE_LO16D:
3139 case R_PPC_VLE_HI16A:
3140 case R_PPC_VLE_HI16D:
3141 case R_PPC_VLE_HA16A:
3142 case R_PPC_VLE_HA16D:
83eef883 3143 case R_PPC_VLE_ADDR20:
b9c361e0
JL
3144 break;
3145
25dbc73a 3146 case R_PPC_EMB_SDA2REL:
c0d9f31d 3147 if (!bfd_link_executable (info))
046183de
AM
3148 {
3149 bad_shared_reloc (abfd, r_type);
0a1b45a2 3150 return false;
046183de 3151 }
93d1b056 3152 htab->sdata[1].sym->ref_regular = 1;
046183de
AM
3153 if (h != NULL)
3154 {
0a1b45a2
AM
3155 ppc_elf_hash_entry (h)->has_sda_refs = true;
3156 h->non_got_ref = true;
046183de
AM
3157 }
3158 break;
3159
b9c361e0
JL
3160 case R_PPC_VLE_SDA21_LO:
3161 case R_PPC_VLE_SDA21:
25dbc73a
AM
3162 case R_PPC_EMB_SDA21:
3163 case R_PPC_EMB_RELSDA:
046183de
AM
3164 if (h != NULL)
3165 {
0a1b45a2
AM
3166 ppc_elf_hash_entry (h)->has_sda_refs = true;
3167 h->non_got_ref = true;
046183de
AM
3168 }
3169 break;
3170
25dbc73a
AM
3171 case R_PPC_EMB_NADDR32:
3172 case R_PPC_EMB_NADDR16:
3173 case R_PPC_EMB_NADDR16_LO:
3174 case R_PPC_EMB_NADDR16_HI:
3175 case R_PPC_EMB_NADDR16_HA:
4dc4a9a5 3176 if (h != NULL)
0a1b45a2 3177 h->non_got_ref = true;
25dbc73a 3178 break;
252b5132 3179
25dbc73a 3180 case R_PPC_PLTREL24:
de972ffa 3181 if (h == NULL)
6d78d0b9 3182 break;
08be3224 3183 ppc_elf_tdata (abfd)->makes_plt_call = 1;
3e04d765 3184 goto pltentry;
08be3224 3185
23cedd1d 3186 case R_PPC_PLTCALL:
3e04d765
AM
3187 sec->has_pltcall = 1;
3188 /* Fall through. */
3189
6d78d0b9 3190 case R_PPC_PLT32:
25dbc73a
AM
3191 case R_PPC_PLTREL32:
3192 case R_PPC_PLT16_LO:
3193 case R_PPC_PLT16_HI:
3194 case R_PPC_PLT16_HA:
3e04d765 3195 pltentry:
25dbc73a
AM
3196#ifdef DEBUG
3197 fprintf (stderr, "Reloc requires a PLT entry\n");
3198#endif
cbf95972 3199 /* This symbol requires a procedure linkage table entry. */
25dbc73a
AM
3200 if (h == NULL)
3201 {
2d7ad24e
AM
3202 pltent = update_local_sym_info (abfd, symtab_hdr, r_symndx,
3203 NON_GOT | PLT_KEEP);
3204 if (pltent == NULL)
0a1b45a2 3205 return false;
25dbc73a 3206 }
a6aa5195
AM
3207 else
3208 {
2d7ad24e
AM
3209 if (r_type != R_PPC_PLTREL24)
3210 ppc_elf_hash_entry (h)->tls_mask |= PLT_KEEP;
a6aa5195 3211 h->needs_plt = 1;
2d7ad24e 3212 pltent = &h->plt.plist;
a6aa5195 3213 }
2d7ad24e
AM
3214 addend = 0;
3215 if (bfd_link_pic (info)
3216 && (r_type == R_PPC_PLTREL24
3217 || r_type == R_PPC_PLT16_LO
3218 || r_type == R_PPC_PLT16_HI
3219 || r_type == R_PPC_PLT16_HA))
3220 addend = rel->r_addend;
3221 if (!update_plt_info (abfd, pltent, got2, addend))
0a1b45a2 3222 return false;
25dbc73a 3223 break;
ee05f2fe 3224
25dbc73a
AM
3225 /* The following relocations don't need to propagate the
3226 relocation if linking a shared object since they are
3227 section relative. */
3228 case R_PPC_SECTOFF:
3229 case R_PPC_SECTOFF_LO:
3230 case R_PPC_SECTOFF_HI:
3231 case R_PPC_SECTOFF_HA:
3232 case R_PPC_DTPREL16:
3233 case R_PPC_DTPREL16_LO:
3234 case R_PPC_DTPREL16_HI:
3235 case R_PPC_DTPREL16_HA:
3236 case R_PPC_TOC16:
3237 break;
252b5132 3238
d7128ce4
AM
3239 case R_PPC_REL16:
3240 case R_PPC_REL16_LO:
3241 case R_PPC_REL16_HI:
3242 case R_PPC_REL16_HA:
a680de9a 3243 case R_PPC_REL16DX_HA:
016687f8 3244 ppc_elf_tdata (abfd)->has_rel16 = 1;
d7128ce4
AM
3245 break;
3246
a6aa5195 3247 /* These are just markers. */
25dbc73a
AM
3248 case R_PPC_TLS:
3249 case R_PPC_EMB_MRKREF:
3250 case R_PPC_NONE:
3251 case R_PPC_max:
32af9f6e
AM
3252 case R_PPC_RELAX:
3253 case R_PPC_RELAX_PLT:
3254 case R_PPC_RELAX_PLTREL24:
7ba71655 3255 case R_PPC_16DX_HA:
25dbc73a 3256 break;
252b5132 3257
25dbc73a
AM
3258 /* These should only appear in dynamic objects. */
3259 case R_PPC_COPY:
3260 case R_PPC_GLOB_DAT:
3261 case R_PPC_JMP_SLOT:
3262 case R_PPC_RELATIVE:
e054468f 3263 case R_PPC_IRELATIVE:
25dbc73a 3264 break;
252b5132 3265
25dbc73a
AM
3266 /* These aren't handled yet. We'll report an error later. */
3267 case R_PPC_ADDR30:
3268 case R_PPC_EMB_RELSEC16:
3269 case R_PPC_EMB_RELST_LO:
3270 case R_PPC_EMB_RELST_HI:
3271 case R_PPC_EMB_RELST_HA:
3272 case R_PPC_EMB_BIT_FLD:
3273 break;
252b5132 3274
25dbc73a
AM
3275 /* This refers only to functions defined in the shared library. */
3276 case R_PPC_LOCAL24PC:
727fc41e 3277 if (h != NULL && h == htab->elf.hgot && htab->plt_type == PLT_UNSET)
016687f8
AM
3278 {
3279 htab->plt_type = PLT_OLD;
3280 htab->old_bfd = abfd;
3281 }
c7e17e05
AM
3282 if (h != NULL && h->type == STT_GNU_IFUNC)
3283 {
c7e17e05
AM
3284 h->needs_plt = 1;
3285 if (!update_plt_info (abfd, &h->plt.plist, NULL, 0))
0a1b45a2 3286 return false;
c7e17e05 3287 }
25dbc73a 3288 break;
252b5132 3289
25dbc73a
AM
3290 /* This relocation describes the C++ object vtable hierarchy.
3291 Reconstruct it for later use during GC. */
3292 case R_PPC_GNU_VTINHERIT:
3293 if (!bfd_elf_gc_record_vtinherit (abfd, sec, h, rel->r_offset))
0a1b45a2 3294 return false;
25dbc73a 3295 break;
252b5132 3296
25dbc73a
AM
3297 /* This relocation describes which C++ vtable entries are actually
3298 used. Record for later use during GC. */
3299 case R_PPC_GNU_VTENTRY:
a0ea3a14 3300 if (!bfd_elf_gc_record_vtentry (abfd, sec, h, rel->r_addend))
0a1b45a2 3301 return false;
25dbc73a 3302 break;
252b5132 3303
252dcdf4
AM
3304 case R_PPC_TPREL16_HI:
3305 case R_PPC_TPREL16_HA:
3306 sec->has_tls_reloc = 1;
3307 /* Fall through. */
7c8bbca5 3308 /* We shouldn't really be seeing TPREL32. */
25dbc73a 3309 case R_PPC_TPREL32:
1d483afe
AM
3310 case R_PPC_TPREL16:
3311 case R_PPC_TPREL16_LO:
7c8bbca5 3312 if (bfd_link_dll (info))
25dbc73a
AM
3313 info->flags |= DF_STATIC_TLS;
3314 goto dodyn;
252b5132 3315
25dbc73a
AM
3316 /* Nor these. */
3317 case R_PPC_DTPMOD32:
3318 case R_PPC_DTPREL32:
3319 goto dodyn;
252b5132 3320
9edfd1af
AM
3321 case R_PPC_REL32:
3322 if (h == NULL
3323 && got2 != NULL
3324 && (sec->flags & SEC_CODE) != 0
0e1862bb 3325 && bfd_link_pic (info)
4a3dc543 3326 && htab->plt_type == PLT_UNSET)
9edfd1af
AM
3327 {
3328 /* Old -fPIC gcc code has .long LCTOC1-LCFx just before
3329 the start of a function, which assembles to a REL32
3330 reference to .got2. If we detect one of these, then
3331 force the old PLT layout because the linker cannot
3332 reliably deduce the GOT pointer value needed for
3333 PLT call stubs. */
3334 asection *s;
87d72d41 3335 Elf_Internal_Sym *isym;
9edfd1af 3336
f1dfbfdb 3337 isym = bfd_sym_from_r_symndx (&htab->elf.sym_cache,
87d72d41
AM
3338 abfd, r_symndx);
3339 if (isym == NULL)
0a1b45a2 3340 return false;
87d72d41
AM
3341
3342 s = bfd_section_from_elf_index (abfd, isym->st_shndx);
9edfd1af 3343 if (s == got2)
016687f8
AM
3344 {
3345 htab->plt_type = PLT_OLD;
3346 htab->old_bfd = abfd;
3347 }
9edfd1af 3348 }
7123df0e 3349 if (h == NULL || h == htab->elf.hgot)
fd38b44c 3350 break;
625af618
AM
3351 /* fall through */
3352
3353 case R_PPC_ADDR32:
3354 case R_PPC_ADDR16:
3355 case R_PPC_ADDR16_LO:
3356 case R_PPC_ADDR16_HI:
3357 case R_PPC_ADDR16_HA:
3358 case R_PPC_UADDR32:
3359 case R_PPC_UADDR16:
0e1862bb 3360 if (h != NULL && !bfd_link_pic (info))
625af618
AM
3361 {
3362 /* We may need a plt entry if the symbol turns out to be
3363 a function defined in a dynamic object. */
3ec01793 3364 if (!update_plt_info (abfd, &h->plt.plist, NULL, 0))
0a1b45a2 3365 return false;
625af618
AM
3366
3367 /* We may need a copy reloc too. */
3368 h->non_got_ref = 1;
3369 h->pointer_equality_needed = 1;
d3e454b9
AM
3370 if (r_type == R_PPC_ADDR16_HA)
3371 ppc_elf_hash_entry (h)->has_addr16_ha = 1;
3372 if (r_type == R_PPC_ADDR16_LO)
3373 ppc_elf_hash_entry (h)->has_addr16_lo = 1;
625af618
AM
3374 }
3375 goto dodyn;
9edfd1af 3376
25dbc73a
AM
3377 case R_PPC_REL24:
3378 case R_PPC_REL14:
3379 case R_PPC_REL14_BRTAKEN:
3380 case R_PPC_REL14_BRNTAKEN:
d7128ce4 3381 if (h == NULL)
25dbc73a 3382 break;
7123df0e 3383 if (h == htab->elf.hgot)
d7128ce4 3384 {
7123df0e 3385 if (htab->plt_type == PLT_UNSET)
016687f8
AM
3386 {
3387 htab->plt_type = PLT_OLD;
3388 htab->old_bfd = abfd;
3389 }
d7128ce4
AM
3390 break;
3391 }
25dbc73a 3392 /* fall through */
ee05f2fe 3393
25dbc73a 3394 case R_PPC_ADDR24:
25dbc73a
AM
3395 case R_PPC_ADDR14:
3396 case R_PPC_ADDR14_BRTAKEN:
3397 case R_PPC_ADDR14_BRNTAKEN:
0e1862bb 3398 if (h != NULL && !bfd_link_pic (info))
25dbc73a
AM
3399 {
3400 /* We may need a plt entry if the symbol turns out to be
3401 a function defined in a dynamic object. */
e054468f 3402 h->needs_plt = 1;
de972ffa 3403 if (!update_plt_info (abfd, &h->plt.plist, NULL, 0))
0a1b45a2 3404 return false;
625af618 3405 break;
25dbc73a 3406 }
7619e7c7 3407
25dbc73a
AM
3408 dodyn:
3409 /* If we are creating a shared library, and this is a reloc
3410 against a global symbol, or a non PC relative reloc
3411 against a local symbol, then we need to copy the reloc
3412 into the shared library. However, if we are linking with
3413 -Bsymbolic, we do not need to copy a reloc against a
3414 global symbol which is defined in an object we are
3415 including in the link (i.e., DEF_REGULAR is set). At
3416 this point we have not seen all the input files, so it is
3417 possible that DEF_REGULAR is not set now but will be set
3418 later (it is never cleared). In case of a weak definition,
3419 DEF_REGULAR may be cleared later by a strong definition in
3420 a shared library. We account for that possibility below by
3421 storing information in the dyn_relocs field of the hash
3422 table entry. A similar situation occurs when creating
3423 shared libraries and symbol visibility changes render the
3424 symbol local.
7619e7c7 3425
25dbc73a
AM
3426 If on the other hand, we are creating an executable, we
3427 may need to keep relocations for symbols satisfied by a
3428 dynamic library if we manage to avoid copy relocs for the
3429 symbol. */
0e1862bb 3430 if ((bfd_link_pic (info)
1d483afe 3431 && (must_be_dyn_reloc (info, r_type)
25dbc73a 3432 || (h != NULL
198f1157 3433 && (!SYMBOLIC_BIND (info, h)
25dbc73a
AM
3434 || h->root.type == bfd_link_hash_defweak
3435 || !h->def_regular))))
3436 || (ELIMINATE_COPY_RELOCS
0e1862bb 3437 && !bfd_link_pic (info)
25dbc73a
AM
3438 && h != NULL
3439 && (h->root.type == bfd_link_hash_defweak
de972ffa 3440 || !h->def_regular)))
25dbc73a 3441 {
25dbc73a
AM
3442#ifdef DEBUG
3443 fprintf (stderr,
3444 "ppc_elf_check_relocs needs to "
3445 "create relocation for %s\n",
3446 (h && h->root.root.string
3447 ? h->root.root.string : "<unknown>"));
3448#endif
3449 if (sreloc == NULL)
3450 {
c9a2f333
AM
3451 if (htab->elf.dynobj == NULL)
3452 htab->elf.dynobj = abfd;
83bac4b0
NC
3453
3454 sreloc = _bfd_elf_make_dynamic_reloc_section
0a1b45a2 3455 (sec, htab->elf.dynobj, 2, abfd, /*rela?*/ true);
83bac4b0 3456
25dbc73a 3457 if (sreloc == NULL)
0a1b45a2 3458 return false;
25dbc73a 3459 }
7619e7c7 3460
25dbc73a
AM
3461 /* If this is a global symbol, we count the number of
3462 relocations we need for this symbol. */
3463 if (h != NULL)
3464 {
f95f8542
AM
3465 struct elf_dyn_relocs *p;
3466 struct elf_dyn_relocs **rel_head;
3467
190eb1dd 3468 rel_head = &h->dyn_relocs;
f95f8542
AM
3469 p = *rel_head;
3470 if (p == NULL || p->sec != sec)
3471 {
3472 p = bfd_alloc (htab->elf.dynobj, sizeof *p);
3473 if (p == NULL)
0a1b45a2 3474 return false;
f95f8542
AM
3475 p->next = *rel_head;
3476 *rel_head = p;
3477 p->sec = sec;
3478 p->count = 0;
3479 p->pc_count = 0;
3480 }
3481 p->count += 1;
3482 if (!must_be_dyn_reloc (info, r_type))
3483 p->pc_count += 1;
25dbc73a
AM
3484 }
3485 else
3486 {
3487 /* Track dynamic relocs needed for local syms too.
3488 We really need local syms available to do this
3489 easily. Oh well. */
f95f8542
AM
3490 struct ppc_dyn_relocs *p;
3491 struct ppc_dyn_relocs **rel_head;
0a1b45a2 3492 bool is_ifunc;
25dbc73a 3493 asection *s;
6edfbbad 3494 void *vpp;
87d72d41 3495 Elf_Internal_Sym *isym;
6edfbbad 3496
f1dfbfdb 3497 isym = bfd_sym_from_r_symndx (&htab->elf.sym_cache,
87d72d41
AM
3498 abfd, r_symndx);
3499 if (isym == NULL)
0a1b45a2 3500 return false;
7fce784e 3501
87d72d41
AM
3502 s = bfd_section_from_elf_index (abfd, isym->st_shndx);
3503 if (s == NULL)
3504 s = sec;
3505
6edfbbad 3506 vpp = &elf_section_data (s)->local_dynrel;
f95f8542
AM
3507 rel_head = (struct ppc_dyn_relocs **) vpp;
3508 is_ifunc = ELF_ST_TYPE (isym->st_info) == STT_GNU_IFUNC;
3509 p = *rel_head;
3510 if (p != NULL && p->sec == sec && p->ifunc != is_ifunc)
3511 p = p->next;
3512 if (p == NULL || p->sec != sec || p->ifunc != is_ifunc)
3513 {
3514 p = bfd_alloc (htab->elf.dynobj, sizeof *p);
3515 if (p == NULL)
0a1b45a2 3516 return false;
f95f8542
AM
3517 p->next = *rel_head;
3518 *rel_head = p;
3519 p->sec = sec;
3520 p->ifunc = is_ifunc;
3521 p->count = 0;
3522 }
3523 p->count += 1;
25dbc73a 3524 }
7619e7c7 3525 }
25dbc73a
AM
3526
3527 break;
7619e7c7
AM
3528 }
3529 }
ee05f2fe 3530
0a1b45a2 3531 return true;
25dbc73a
AM
3532}
3533\f
005d79fd
AM
3534/* Warn for conflicting Tag_GNU_Power_ABI_FP attributes between IBFD
3535 and OBFD, and merge non-conflicting ones. */
0a1b45a2 3536bool
50e03d47 3537_bfd_elf_ppc_merge_fp_attributes (bfd *ibfd, struct bfd_link_info *info)
34c8bcba 3538{
50e03d47 3539 bfd *obfd = info->output_bfd;
c6e65352
DJ
3540 obj_attribute *in_attr, *in_attrs;
3541 obj_attribute *out_attr, *out_attrs;
0a1b45a2
AM
3542 bool ret = true;
3543 bool warn_only;
6f3fe02b
AM
3544
3545 /* We only warn about shared library mismatches, because common
3546 libraries advertise support for a particular long double variant
3547 but actually support more than one variant. For example, glibc
3548 typically supports 128-bit IBM long double in the shared library
3549 but has a compatibility static archive for 64-bit long double.
3550 The linker doesn't have the smarts to see that an app using
3551 object files marked as 64-bit long double call the compatibility
3552 layer objects and only from there call into the shared library. */
3553 warn_only = (ibfd->flags & DYNAMIC) != 0;
34c8bcba 3554
c6e65352
DJ
3555 in_attrs = elf_known_obj_attributes (ibfd)[OBJ_ATTR_GNU];
3556 out_attrs = elf_known_obj_attributes (obfd)[OBJ_ATTR_GNU];
3557
c6e65352
DJ
3558 in_attr = &in_attrs[Tag_GNU_Power_ABI_FP];
3559 out_attr = &out_attrs[Tag_GNU_Power_ABI_FP];
005d79fd 3560
c6e65352 3561 if (in_attr->i != out_attr->i)
34c8bcba 3562 {
005d79fd
AM
3563 int in_fp = in_attr->i & 3;
3564 int out_fp = out_attr->i & 3;
4a91d0ba 3565 static bfd *last_fp, *last_ld;
005d79fd
AM
3566
3567 if (in_fp == 0)
34c8bcba 3568 ;
005d79fd
AM
3569 else if (out_fp == 0)
3570 {
6f3fe02b
AM
3571 if (!warn_only)
3572 {
3573 out_attr->type = ATTR_TYPE_FLAG_INT_VAL;
3574 out_attr->i ^= in_fp;
3575 last_fp = ibfd;
3576 }
005d79fd
AM
3577 }
3578 else if (out_fp != 2 && in_fp == 2)
8d2c8c3d
AM
3579 {
3580 _bfd_error_handler
3581 /* xgettext:c-format */
4a91d0ba
AM
3582 (_("%pB uses hard float, %pB uses soft float"),
3583 last_fp, ibfd);
6f3fe02b 3584 ret = warn_only;
8d2c8c3d 3585 }
005d79fd 3586 else if (out_fp == 2 && in_fp != 2)
8d2c8c3d
AM
3587 {
3588 _bfd_error_handler
3589 /* xgettext:c-format */
4a91d0ba
AM
3590 (_("%pB uses hard float, %pB uses soft float"),
3591 ibfd, last_fp);
6f3fe02b 3592 ret = warn_only;
8d2c8c3d 3593 }
005d79fd 3594 else if (out_fp == 1 && in_fp == 3)
8d2c8c3d
AM
3595 {
3596 _bfd_error_handler
3597 /* xgettext:c-format */
4a91d0ba
AM
3598 (_("%pB uses double-precision hard float, "
3599 "%pB uses single-precision hard float"), last_fp, ibfd);
6f3fe02b 3600 ret = warn_only;
8d2c8c3d 3601 }
005d79fd 3602 else if (out_fp == 3 && in_fp == 1)
8d2c8c3d
AM
3603 {
3604 _bfd_error_handler
3605 /* xgettext:c-format */
4a91d0ba
AM
3606 (_("%pB uses double-precision hard float, "
3607 "%pB uses single-precision hard float"), ibfd, last_fp);
6f3fe02b 3608 ret = warn_only;
8d2c8c3d 3609 }
005d79fd
AM
3610
3611 in_fp = in_attr->i & 0xc;
3612 out_fp = out_attr->i & 0xc;
3613 if (in_fp == 0)
3614 ;
3615 else if (out_fp == 0)
3616 {
6f3fe02b
AM
3617 if (!warn_only)
3618 {
3619 out_attr->type = ATTR_TYPE_FLAG_INT_VAL;
3620 out_attr->i ^= in_fp;
3621 last_ld = ibfd;
3622 }
005d79fd
AM
3623 }
3624 else if (out_fp != 2 * 4 && in_fp == 2 * 4)
8d2c8c3d
AM
3625 {
3626 _bfd_error_handler
3627 /* xgettext:c-format */
4a91d0ba
AM
3628 (_("%pB uses 64-bit long double, "
3629 "%pB uses 128-bit long double"), ibfd, last_ld);
6f3fe02b 3630 ret = warn_only;
8d2c8c3d 3631 }
005d79fd 3632 else if (in_fp != 2 * 4 && out_fp == 2 * 4)
8d2c8c3d
AM
3633 {
3634 _bfd_error_handler
3635 /* xgettext:c-format */
4a91d0ba
AM
3636 (_("%pB uses 64-bit long double, "
3637 "%pB uses 128-bit long double"), last_ld, ibfd);
6f3fe02b 3638 ret = warn_only;
8d2c8c3d 3639 }
005d79fd 3640 else if (out_fp == 1 * 4 && in_fp == 3 * 4)
8d2c8c3d
AM
3641 {
3642 _bfd_error_handler
3643 /* xgettext:c-format */
4a91d0ba
AM
3644 (_("%pB uses IBM long double, "
3645 "%pB uses IEEE long double"), last_ld, ibfd);
6f3fe02b 3646 ret = warn_only;
8d2c8c3d 3647 }
005d79fd 3648 else if (out_fp == 3 * 4 && in_fp == 1 * 4)
8d2c8c3d
AM
3649 {
3650 _bfd_error_handler
3651 /* xgettext:c-format */
4a91d0ba
AM
3652 (_("%pB uses IBM long double, "
3653 "%pB uses IEEE long double"), ibfd, last_ld);
6f3fe02b 3654 ret = warn_only;
8d2c8c3d 3655 }
c6e65352 3656 }
4a91d0ba
AM
3657
3658 if (!ret)
3659 {
3660 out_attr->type = ATTR_TYPE_FLAG_INT_VAL | ATTR_TYPE_FLAG_ERROR;
3661 bfd_set_error (bfd_error_bad_value);
3662 }
3663 return ret;
005d79fd
AM
3664}
3665
3666/* Merge object attributes from IBFD into OBFD. Warn if
3667 there are conflicting attributes. */
0a1b45a2 3668static bool
50e03d47 3669ppc_elf_merge_obj_attributes (bfd *ibfd, struct bfd_link_info *info)
005d79fd 3670{
50e03d47 3671 bfd *obfd;
005d79fd
AM
3672 obj_attribute *in_attr, *in_attrs;
3673 obj_attribute *out_attr, *out_attrs;
0a1b45a2 3674 bool ret;
005d79fd 3675
4a91d0ba 3676 if (!_bfd_elf_ppc_merge_fp_attributes (ibfd, info))
0a1b45a2 3677 return false;
005d79fd 3678
50e03d47 3679 obfd = info->output_bfd;
005d79fd
AM
3680 in_attrs = elf_known_obj_attributes (ibfd)[OBJ_ATTR_GNU];
3681 out_attrs = elf_known_obj_attributes (obfd)[OBJ_ATTR_GNU];
c6e65352
DJ
3682
3683 /* Check for conflicting Tag_GNU_Power_ABI_Vector attributes and
3684 merge non-conflicting ones. */
3685 in_attr = &in_attrs[Tag_GNU_Power_ABI_Vector];
3686 out_attr = &out_attrs[Tag_GNU_Power_ABI_Vector];
0a1b45a2 3687 ret = true;
c6e65352
DJ
3688 if (in_attr->i != out_attr->i)
3689 {
005d79fd
AM
3690 int in_vec = in_attr->i & 3;
3691 int out_vec = out_attr->i & 3;
4a91d0ba 3692 static bfd *last_vec;
c6e65352 3693
005d79fd
AM
3694 if (in_vec == 0)
3695 ;
3696 else if (out_vec == 0)
c6e65352 3697 {
8d2c8c3d 3698 out_attr->type = ATTR_TYPE_FLAG_INT_VAL;
005d79fd 3699 out_attr->i = in_vec;
4a91d0ba 3700 last_vec = ibfd;
c6e65352 3701 }
c6e65352
DJ
3702 /* For now, allow generic to transition to AltiVec or SPE
3703 without a warning. If GCC marked files with their stack
3704 alignment and used don't-care markings for files which are
3705 not affected by the vector ABI, we could warn about this
3706 case too. */
005d79fd 3707 else if (in_vec == 1)
c6e65352 3708 ;
005d79fd
AM
3709 else if (out_vec == 1)
3710 {
8d2c8c3d 3711 out_attr->type = ATTR_TYPE_FLAG_INT_VAL;
005d79fd 3712 out_attr->i = in_vec;
4a91d0ba 3713 last_vec = ibfd;
005d79fd
AM
3714 }
3715 else if (out_vec < in_vec)
8d2c8c3d
AM
3716 {
3717 _bfd_error_handler
3718 /* xgettext:c-format */
4a91d0ba
AM
3719 (_("%pB uses AltiVec vector ABI, %pB uses SPE vector ABI"),
3720 last_vec, ibfd);
8d2c8c3d 3721 out_attr->type = ATTR_TYPE_FLAG_INT_VAL | ATTR_TYPE_FLAG_ERROR;
0a1b45a2 3722 ret = false;
8d2c8c3d 3723 }
005d79fd 3724 else if (out_vec > in_vec)
8d2c8c3d
AM
3725 {
3726 _bfd_error_handler
3727 /* xgettext:c-format */
4a91d0ba
AM
3728 (_("%pB uses AltiVec vector ABI, %pB uses SPE vector ABI"),
3729 ibfd, last_vec);
8d2c8c3d 3730 out_attr->type = ATTR_TYPE_FLAG_INT_VAL | ATTR_TYPE_FLAG_ERROR;
0a1b45a2 3731 ret = false;
8d2c8c3d 3732 }
34c8bcba
JM
3733 }
3734
f82e0623
NF
3735 /* Check for conflicting Tag_GNU_Power_ABI_Struct_Return attributes
3736 and merge non-conflicting ones. */
3737 in_attr = &in_attrs[Tag_GNU_Power_ABI_Struct_Return];
3738 out_attr = &out_attrs[Tag_GNU_Power_ABI_Struct_Return];
3739 if (in_attr->i != out_attr->i)
3740 {
005d79fd
AM
3741 int in_struct = in_attr->i & 3;
3742 int out_struct = out_attr->i & 3;
4a91d0ba 3743 static bfd *last_struct;
005d79fd
AM
3744
3745 if (in_struct == 0 || in_struct == 3)
f82e0623 3746 ;
005d79fd
AM
3747 else if (out_struct == 0)
3748 {
8d2c8c3d 3749 out_attr->type = ATTR_TYPE_FLAG_INT_VAL;
005d79fd 3750 out_attr->i = in_struct;
4a91d0ba 3751 last_struct = ibfd;
005d79fd
AM
3752 }
3753 else if (out_struct < in_struct)
8d2c8c3d
AM
3754 {
3755 _bfd_error_handler
3756 /* xgettext:c-format */
4a91d0ba
AM
3757 (_("%pB uses r3/r4 for small structure returns, "
3758 "%pB uses memory"), last_struct, ibfd);
8d2c8c3d 3759 out_attr->type = ATTR_TYPE_FLAG_INT_VAL | ATTR_TYPE_FLAG_ERROR;
0a1b45a2 3760 ret = false;
8d2c8c3d 3761 }
005d79fd 3762 else if (out_struct > in_struct)
8d2c8c3d
AM
3763 {
3764 _bfd_error_handler
3765 /* xgettext:c-format */
4a91d0ba
AM
3766 (_("%pB uses r3/r4 for small structure returns, "
3767 "%pB uses memory"), ibfd, last_struct);
8d2c8c3d 3768 out_attr->type = ATTR_TYPE_FLAG_INT_VAL | ATTR_TYPE_FLAG_ERROR;
0a1b45a2 3769 ret = false;
8d2c8c3d 3770 }
f82e0623 3771 }
4a91d0ba
AM
3772 if (!ret)
3773 {
3774 bfd_set_error (bfd_error_bad_value);
0a1b45a2 3775 return false;
4a91d0ba 3776 }
f82e0623 3777
34c8bcba 3778 /* Merge Tag_compatibility attributes and any common GNU ones. */
8d2c8c3d 3779 return _bfd_elf_merge_object_attributes (ibfd, info);
34c8bcba
JM
3780}
3781
8853c3d3
AM
3782/* Merge backend specific data from an object file to the output
3783 object file when linking. */
3784
0a1b45a2 3785static bool
50e03d47 3786ppc_elf_merge_private_bfd_data (bfd *ibfd, struct bfd_link_info *info)
8853c3d3 3787{
50e03d47 3788 bfd *obfd = info->output_bfd;
8853c3d3
AM
3789 flagword old_flags;
3790 flagword new_flags;
0a1b45a2 3791 bool error;
8853c3d3 3792
0c8d6e5c 3793 if (!is_ppc_elf (ibfd) || !is_ppc_elf (obfd))
0a1b45a2 3794 return true;
8853c3d3 3795
cc643b88 3796 /* Check if we have the same endianness. */
50e03d47 3797 if (! _bfd_generic_verify_endian_match (ibfd, info))
0a1b45a2 3798 return false;
8853c3d3 3799
50e03d47 3800 if (!ppc_elf_merge_obj_attributes (ibfd, info))
0a1b45a2 3801 return false;
34c8bcba 3802
91ed9b71 3803 if ((ibfd->flags & DYNAMIC) != 0)
0a1b45a2 3804 return true;
91ed9b71 3805
8853c3d3
AM
3806 new_flags = elf_elfheader (ibfd)->e_flags;
3807 old_flags = elf_elfheader (obfd)->e_flags;
3808 if (!elf_flags_init (obfd))
3809 {
3810 /* First call, no flags set. */
0a1b45a2 3811 elf_flags_init (obfd) = true;
8853c3d3
AM
3812 elf_elfheader (obfd)->e_flags = new_flags;
3813 }
3814
3815 /* Compatible flags are ok. */
3816 else if (new_flags == old_flags)
3817 ;
3818
3819 /* Incompatible flags. */
3820 else
3821 {
3822 /* Warn about -mrelocatable mismatch. Allow -mrelocatable-lib
3823 to be linked with either. */
0a1b45a2 3824 error = false;
8853c3d3
AM
3825 if ((new_flags & EF_PPC_RELOCATABLE) != 0
3826 && (old_flags & (EF_PPC_RELOCATABLE | EF_PPC_RELOCATABLE_LIB)) == 0)
3827 {
0a1b45a2 3828 error = true;
4eca0228 3829 _bfd_error_handler
871b3ab2 3830 (_("%pB: compiled with -mrelocatable and linked with "
8853c3d3
AM
3831 "modules compiled normally"), ibfd);
3832 }
3833 else if ((new_flags & (EF_PPC_RELOCATABLE | EF_PPC_RELOCATABLE_LIB)) == 0
3834 && (old_flags & EF_PPC_RELOCATABLE) != 0)
3835 {
0a1b45a2 3836 error = true;
4eca0228 3837 _bfd_error_handler
871b3ab2 3838 (_("%pB: compiled normally and linked with "
8853c3d3
AM
3839 "modules compiled with -mrelocatable"), ibfd);
3840 }
3841
3842 /* The output is -mrelocatable-lib iff both the input files are. */
3843 if (! (new_flags & EF_PPC_RELOCATABLE_LIB))
3844 elf_elfheader (obfd)->e_flags &= ~EF_PPC_RELOCATABLE_LIB;
3845
3846 /* The output is -mrelocatable iff it can't be -mrelocatable-lib,
3847 but each input file is either -mrelocatable or -mrelocatable-lib. */
3848 if (! (elf_elfheader (obfd)->e_flags & EF_PPC_RELOCATABLE_LIB)
3849 && (new_flags & (EF_PPC_RELOCATABLE_LIB | EF_PPC_RELOCATABLE))
3850 && (old_flags & (EF_PPC_RELOCATABLE_LIB | EF_PPC_RELOCATABLE)))
3851 elf_elfheader (obfd)->e_flags |= EF_PPC_RELOCATABLE;
3852
3853 /* Do not warn about eabi vs. V.4 mismatch, just or in the bit if
3854 any module uses it. */
3855 elf_elfheader (obfd)->e_flags |= (new_flags & EF_PPC_EMB);
3856
3857 new_flags &= ~(EF_PPC_RELOCATABLE | EF_PPC_RELOCATABLE_LIB | EF_PPC_EMB);
3858 old_flags &= ~(EF_PPC_RELOCATABLE | EF_PPC_RELOCATABLE_LIB | EF_PPC_EMB);
3859
3860 /* Warn about any other mismatches. */
3861 if (new_flags != old_flags)
3862 {
0a1b45a2 3863 error = true;
4eca0228 3864 _bfd_error_handler
695344c0 3865 /* xgettext:c-format */
871b3ab2 3866 (_("%pB: uses different e_flags (%#x) fields "
cd9af601
AM
3867 "than previous modules (%#x)"),
3868 ibfd, new_flags, old_flags);
8853c3d3
AM
3869 }
3870
3871 if (error)
3872 {
3873 bfd_set_error (bfd_error_bad_value);
0a1b45a2 3874 return false;
8853c3d3
AM
3875 }
3876 }
3877
0a1b45a2 3878 return true;
8853c3d3 3879}
b9c361e0
JL
3880
3881static void
95f0d0d2 3882ppc_elf_vle_split16 (bfd *input_bfd,
08dc996f
AM
3883 asection *input_section,
3884 unsigned long offset,
95f0d0d2 3885 bfd_byte *loc,
86c95733 3886 bfd_vma value,
08dc996f 3887 split16_format_type split16_format,
0a1b45a2 3888 bool fixup)
b9c361e0 3889{
bb6bf75e 3890 unsigned int insn, opcode;
b9c361e0 3891
95f0d0d2 3892 insn = bfd_get_32 (input_bfd, loc);
bb6bf75e 3893 opcode = insn & E_OPCODE_MASK;
08dc996f
AM
3894 if (opcode == E_OR2I_INSN
3895 || opcode == E_AND2I_DOT_INSN
3896 || opcode == E_OR2IS_INSN
3897 || opcode == E_LIS_INSN
3898 || opcode == E_AND2IS_DOT_INSN)
3899 {
3900 if (split16_format != split16a_type)
3901 {
3902 if (fixup)
3903 split16_format = split16a_type;
3904 else
3905 _bfd_error_handler
3906 /* xgettext:c-format */
871b3ab2 3907 (_("%pB(%pA+0x%lx): expected 16A style relocation on 0x%08x insn"),
08dc996f
AM
3908 input_bfd, input_section, offset, opcode);
3909 }
3910 }
3911 else if (opcode == E_ADD2I_DOT_INSN
3912 || opcode == E_ADD2IS_INSN
3913 || opcode == E_CMP16I_INSN
3914 || opcode == E_MULL2I_INSN
3915 || opcode == E_CMPL16I_INSN
3916 || opcode == E_CMPH16I_INSN
3917 || opcode == E_CMPHL16I_INSN)
3918 {
3919 if (split16_format != split16d_type)
3920 {
3921 if (fixup)
3922 split16_format = split16d_type;
3923 else
3924 _bfd_error_handler
3925 /* xgettext:c-format */
871b3ab2 3926 (_("%pB(%pA+0x%lx): expected 16D style relocation on 0x%08x insn"),
08dc996f
AM
3927 input_bfd, input_section, offset, opcode);
3928 }
3929 }
bb6bf75e
AM
3930 if (split16_format == split16a_type)
3931 {
3932 insn &= ~((0xf800 << 5) | 0x7ff);
3933 insn |= (value & 0xf800) << 5;
3934 if ((insn & E_LI_MASK) == E_LI_INSN)
3935 {
3936 /* Hack for e_li. Extend sign. */
3937 insn &= ~(0xf0000 >> 5);
3938 insn |= (-(value & 0x8000) & 0xf0000) >> 5;
3939 }
3940 }
3941 else
3942 {
3943 insn &= ~((0xf800 << 10) | 0x7ff);
3944 insn |= (value & 0xf800) << 10;
3945 }
86c95733 3946 insn |= value & 0x7ff;
95f0d0d2 3947 bfd_put_32 (input_bfd, insn, loc);
b9c361e0 3948}
83eef883
AFB
3949
3950static void
3951ppc_elf_vle_split20 (bfd *output_bfd, bfd_byte *loc, bfd_vma value)
3952{
3953 unsigned int insn;
3954
3955 insn = bfd_get_32 (output_bfd, loc);
3956 /* We have an li20 field, bits 17..20, 11..15, 21..31. */
3957 /* Top 4 bits of value to 17..20. */
3958 insn |= (value & 0xf0000) >> 5;
3959 /* Next 5 bits of the value to 11..15. */
3960 insn |= (value & 0xf800) << 5;
3961 /* And the final 11 bits of the value to bits 21 to 31. */
3962 insn |= value & 0x7ff;
3963 bfd_put_32 (output_bfd, insn, loc);
3964}
3965
8853c3d3 3966\f
d7128ce4
AM
3967/* Choose which PLT scheme to use, and set .plt flags appropriately.
3968 Returns -1 on error, 0 for old PLT, 1 for new PLT. */
3969int
3970ppc_elf_select_plt_layout (bfd *output_bfd ATTRIBUTE_UNUSED,
5446cbdf 3971 struct bfd_link_info *info)
d7128ce4
AM
3972{
3973 struct ppc_elf_link_hash_table *htab;
9d8504b1 3974 flagword flags;
d7128ce4
AM
3975
3976 htab = ppc_elf_hash_table (info);
4a3dc543
RS
3977
3978 if (htab->plt_type == PLT_UNSET)
016687f8 3979 {
b3874e1a
AM
3980 struct elf_link_hash_entry *h;
3981
5446cbdf 3982 if (htab->params->plt_style == PLT_OLD)
016687f8 3983 htab->plt_type = PLT_OLD;
0e1862bb 3984 else if (bfd_link_pic (info)
b3874e1a
AM
3985 && htab->elf.dynamic_sections_created
3986 && (h = elf_link_hash_lookup (&htab->elf, "_mcount",
0a1b45a2 3987 false, false, true)) != NULL
b3874e1a
AM
3988 && (h->type == STT_FUNC
3989 || h->needs_plt)
3990 && h->ref_regular
3991 && !(SYMBOL_CALLS_LOCAL (info, h)
21d68fcd 3992 || UNDEFWEAK_NO_DYNAMIC_RELOC (info, h)))
b3874e1a
AM
3993 {
3994 /* Profiling of shared libs (and pies) is not supported with
3995 secure plt, because ppc32 does profiling before a
3996 function prologue and a secure plt pic call stubs needs
3997 r30 to be set up. */
3998 htab->plt_type = PLT_OLD;
3999 }
016687f8
AM
4000 else
4001 {
4002 bfd *ibfd;
5446cbdf 4003 enum ppc_elf_plt_type plt_type = htab->params->plt_style;
016687f8
AM
4004
4005 /* Look through the reloc flags left by ppc_elf_check_relocs.
4006 Use the old style bss plt if a file makes plt calls
4007 without using the new relocs, and if ld isn't given
4008 --secure-plt and we never see REL16 relocs. */
4009 if (plt_type == PLT_UNSET)
4010 plt_type = PLT_OLD;
c72f2fb2 4011 for (ibfd = info->input_bfds; ibfd; ibfd = ibfd->link.next)
0c8d6e5c 4012 if (is_ppc_elf (ibfd))
016687f8
AM
4013 {
4014 if (ppc_elf_tdata (ibfd)->has_rel16)
4015 plt_type = PLT_NEW;
4016 else if (ppc_elf_tdata (ibfd)->makes_plt_call)
4017 {
4018 plt_type = PLT_OLD;
4019 htab->old_bfd = ibfd;
4020 break;
4021 }
4022 }
4023 htab->plt_type = plt_type;
4024 }
4025 }
5446cbdf 4026 if (htab->plt_type == PLT_OLD && htab->params->plt_style == PLT_NEW)
b3874e1a
AM
4027 {
4028 if (htab->old_bfd != NULL)
cf97bcb0 4029 _bfd_error_handler (_("bss-plt forced due to %pB"), htab->old_bfd);
b3874e1a 4030 else
cf97bcb0 4031 _bfd_error_handler (_("bss-plt forced by profiling"));
b3874e1a 4032 }
d7128ce4 4033
4a3dc543 4034 BFD_ASSERT (htab->plt_type != PLT_VXWORKS);
9d8504b1 4035
4a3dc543 4036 if (htab->plt_type == PLT_NEW)
9d8504b1
PB
4037 {
4038 flags = (SEC_ALLOC | SEC_LOAD | SEC_HAS_CONTENTS
4039 | SEC_IN_MEMORY | SEC_LINKER_CREATED);
86b9da88
AM
4040
4041 /* The new PLT is a loaded section. */
ce558b89 4042 if (htab->elf.splt != NULL
fd361982 4043 && !bfd_set_section_flags (htab->elf.splt, flags))
86b9da88
AM
4044 return -1;
4045
4046 /* The new GOT is not executable. */
ce558b89 4047 if (htab->elf.sgot != NULL
fd361982 4048 && !bfd_set_section_flags (htab->elf.sgot, flags))
86b9da88 4049 return -1;
d7128ce4
AM
4050 }
4051 else
4052 {
4053 /* Stop an unused .glink section from affecting .text alignment. */
86b9da88 4054 if (htab->glink != NULL
fd361982 4055 && !bfd_set_section_alignment (htab->glink, 0))
86b9da88 4056 return -1;
d7128ce4 4057 }
4a3dc543 4058 return htab->plt_type == PLT_NEW;
d7128ce4
AM
4059}
4060\f
25dbc73a
AM
4061/* Return the section that should be marked against GC for a given
4062 relocation. */
586119b3 4063
25dbc73a
AM
4064static asection *
4065ppc_elf_gc_mark_hook (asection *sec,
07adf181 4066 struct bfd_link_info *info,
25dbc73a
AM
4067 Elf_Internal_Rela *rel,
4068 struct elf_link_hash_entry *h,
4069 Elf_Internal_Sym *sym)
4070{
4071 if (h != NULL)
07adf181
AM
4072 switch (ELF32_R_TYPE (rel->r_info))
4073 {
4074 case R_PPC_GNU_VTINHERIT:
4075 case R_PPC_GNU_VTENTRY:
4076 return NULL;
4077 }
4078
4079 return _bfd_elf_gc_mark_hook (sec, info, rel, h, sym);
25dbc73a 4080}
49c09209 4081
0a1b45a2 4082static bool
49c09209
AM
4083get_sym_h (struct elf_link_hash_entry **hp,
4084 Elf_Internal_Sym **symp,
4085 asection **symsecp,
4086 unsigned char **tls_maskp,
4087 Elf_Internal_Sym **locsymsp,
4088 unsigned long r_symndx,
4089 bfd *ibfd)
4090{
4091 Elf_Internal_Shdr *symtab_hdr = &elf_symtab_hdr (ibfd);
4092
4093 if (r_symndx >= symtab_hdr->sh_info)
4094 {
4095 struct elf_link_hash_entry **sym_hashes = elf_sym_hashes (ibfd);
4096 struct elf_link_hash_entry *h;
4097
4098 h = sym_hashes[r_symndx - symtab_hdr->sh_info];
4099 while (h->root.type == bfd_link_hash_indirect
4100 || h->root.type == bfd_link_hash_warning)
4101 h = (struct elf_link_hash_entry *) h->root.u.i.link;
4102
4103 if (hp != NULL)
4104 *hp = h;
4105
4106 if (symp != NULL)
4107 *symp = NULL;
4108
4109 if (symsecp != NULL)
4110 {
4111 asection *symsec = NULL;
4112 if (h->root.type == bfd_link_hash_defined
4113 || h->root.type == bfd_link_hash_defweak)
4114 symsec = h->root.u.def.section;
4115 *symsecp = symsec;
4116 }
4117
4118 if (tls_maskp != NULL)
4119 *tls_maskp = &ppc_elf_hash_entry (h)->tls_mask;
4120 }
4121 else
4122 {
4123 Elf_Internal_Sym *sym;
4124 Elf_Internal_Sym *locsyms = *locsymsp;
4125
4126 if (locsyms == NULL)
4127 {
4128 locsyms = (Elf_Internal_Sym *) symtab_hdr->contents;
4129 if (locsyms == NULL)
4130 locsyms = bfd_elf_get_elf_syms (ibfd, symtab_hdr,
4131 symtab_hdr->sh_info,
4132 0, NULL, NULL, NULL);
4133 if (locsyms == NULL)
0a1b45a2 4134 return false;
49c09209
AM
4135 *locsymsp = locsyms;
4136 }
4137 sym = locsyms + r_symndx;
4138
4139 if (hp != NULL)
4140 *hp = NULL;
4141
4142 if (symp != NULL)
4143 *symp = sym;
4144
4145 if (symsecp != NULL)
4146 *symsecp = bfd_section_from_elf_index (ibfd, sym->st_shndx);
4147
4148 if (tls_maskp != NULL)
4149 {
4150 bfd_signed_vma *local_got;
4151 unsigned char *tls_mask;
4152
4153 tls_mask = NULL;
4154 local_got = elf_local_got_refcounts (ibfd);
4155 if (local_got != NULL)
4156 {
4157 struct plt_entry **local_plt = (struct plt_entry **)
4158 (local_got + symtab_hdr->sh_info);
4159 unsigned char *lgot_masks = (unsigned char *)
4160 (local_plt + symtab_hdr->sh_info);
4161 tls_mask = &lgot_masks[r_symndx];
4162 }
4163 *tls_maskp = tls_mask;
4164 }
4165 }
0a1b45a2 4166 return true;
49c09209 4167}
25dbc73a 4168\f
3e04d765
AM
4169/* Analyze inline PLT call relocations to see whether calls to locally
4170 defined functions can be converted to direct calls. */
4171
0a1b45a2 4172bool
3e04d765
AM
4173ppc_elf_inline_plt (struct bfd_link_info *info)
4174{
4175 struct ppc_elf_link_hash_table *htab;
4176 bfd *ibfd;
4177 asection *sec;
4178 bfd_vma low_vma, high_vma, limit;
4179
4180 htab = ppc_elf_hash_table (info);
4181 if (htab == NULL)
0a1b45a2 4182 return false;
3e04d765
AM
4183
4184 /* A bl insn can reach -0x2000000 to 0x1fffffc. The limit is
4185 reduced somewhat to cater for possible stubs that might be added
4186 between the call and its destination. */
4187 limit = 0x1e00000;
4188 low_vma = -1;
4189 high_vma = 0;
4190 for (sec = info->output_bfd->sections; sec != NULL; sec = sec->next)
4191 if ((sec->flags & (SEC_ALLOC | SEC_CODE)) == (SEC_ALLOC | SEC_CODE))
4192 {
4193 if (low_vma > sec->vma)
4194 low_vma = sec->vma;
4195 if (high_vma < sec->vma + sec->size)
4196 high_vma = sec->vma + sec->size;
4197 }
4198
4199 /* If a "bl" can reach anywhere in local code sections, then we can
4200 convert all inline PLT sequences to direct calls when the symbol
4201 is local. */
4202 if (high_vma - low_vma < limit)
4203 {
4204 htab->can_convert_all_inline_plt = 1;
0a1b45a2 4205 return true;
3e04d765
AM
4206 }
4207
4208 /* Otherwise, go looking through relocs for cases where a direct
4209 call won't reach. Mark the symbol on any such reloc to disable
4210 the optimization and keep the PLT entry as it seems likely that
4211 this will be better than creating trampolines. Note that this
4212 will disable the optimization for all inline PLT calls to a
4213 particular symbol, not just those that won't reach. The
4214 difficulty in doing a more precise optimization is that the
4215 linker needs to make a decision depending on whether a
4216 particular R_PPC_PLTCALL insn can be turned into a direct
4217 call, for each of the R_PPC_PLTSEQ and R_PPC_PLT16* insns in
4218 the sequence, and there is nothing that ties those relocs
4219 together except their symbol. */
4220
4221 for (ibfd = info->input_bfds; ibfd != NULL; ibfd = ibfd->link.next)
4222 {
4223 Elf_Internal_Shdr *symtab_hdr;
4224 Elf_Internal_Sym *local_syms;
4225
4226 if (!is_ppc_elf (ibfd))
4227 continue;
4228
4229 local_syms = NULL;
4230 symtab_hdr = &elf_symtab_hdr (ibfd);
4231
4232 for (sec = ibfd->sections; sec != NULL; sec = sec->next)
4233 if (sec->has_pltcall
4234 && !bfd_is_abs_section (sec->output_section))
4235 {
4236 Elf_Internal_Rela *relstart, *rel, *relend;
4237
4238 /* Read the relocations. */
4239 relstart = _bfd_elf_link_read_relocs (ibfd, sec, NULL, NULL,
4240 info->keep_memory);
4241 if (relstart == NULL)
0a1b45a2 4242 return false;
3e04d765
AM
4243
4244 relend = relstart + sec->reloc_count;
337d0bf8 4245 for (rel = relstart; rel < relend; rel++)
3e04d765
AM
4246 {
4247 enum elf_ppc_reloc_type r_type;
4248 unsigned long r_symndx;
4249 asection *sym_sec;
4250 struct elf_link_hash_entry *h;
4251 Elf_Internal_Sym *sym;
4252 unsigned char *tls_maskp;
4253
4254 r_type = ELF32_R_TYPE (rel->r_info);
4255 if (r_type != R_PPC_PLTCALL)
4256 continue;
4257
4258 r_symndx = ELF32_R_SYM (rel->r_info);
4259 if (!get_sym_h (&h, &sym, &sym_sec, &tls_maskp, &local_syms,
4260 r_symndx, ibfd))
4261 {
4262 if (elf_section_data (sec)->relocs != relstart)
4263 free (relstart);
c9594989 4264 if (symtab_hdr->contents != (unsigned char *) local_syms)
3e04d765 4265 free (local_syms);
0a1b45a2 4266 return false;
3e04d765
AM
4267 }
4268
4269 if (sym_sec != NULL && sym_sec->output_section != NULL)
4270 {
4271 bfd_vma from, to;
4272 if (h != NULL)
4273 to = h->root.u.def.value;
4274 else
4275 to = sym->st_value;
4276 to += (rel->r_addend
4277 + sym_sec->output_offset
4278 + sym_sec->output_section->vma);
4279 from = (rel->r_offset
4280 + sec->output_offset
4281 + sec->output_section->vma);
4282 if (to - from + limit < 2 * limit)
4283 *tls_maskp &= ~PLT_KEEP;
4284 }
4285 }
4286 if (elf_section_data (sec)->relocs != relstart)
4287 free (relstart);
4288 }
4289
4290 if (local_syms != NULL
4291 && symtab_hdr->contents != (unsigned char *) local_syms)
4292 {
4293 if (!info->keep_memory)
4294 free (local_syms);
4295 else
4296 symtab_hdr->contents = (unsigned char *) local_syms;
4297 }
4298 }
4299
0a1b45a2 4300 return true;
3e04d765
AM
4301}
4302
3a71aa26
AM
4303/* Set plt output section type, htab->tls_get_addr, and call the
4304 generic ELF tls_setup function. */
7fce784e 4305
25dbc73a 4306asection *
5446cbdf 4307ppc_elf_tls_setup (bfd *obfd, struct bfd_link_info *info)
7fce784e 4308{
25dbc73a 4309 struct ppc_elf_link_hash_table *htab;
7fce784e 4310
25dbc73a 4311 htab = ppc_elf_hash_table (info);
a7f2871e 4312 htab->tls_get_addr = elf_link_hash_lookup (&htab->elf, "__tls_get_addr",
0a1b45a2 4313 false, false, true);
f01f1741 4314 if (htab->plt_type != PLT_NEW)
0a1b45a2 4315 htab->params->no_tls_get_addr_opt = true;
f01f1741 4316
5446cbdf 4317 if (!htab->params->no_tls_get_addr_opt)
a7f2871e
AM
4318 {
4319 struct elf_link_hash_entry *opt, *tga;
4320 opt = elf_link_hash_lookup (&htab->elf, "__tls_get_addr_opt",
0a1b45a2 4321 false, false, true);
a7f2871e
AM
4322 if (opt != NULL
4323 && (opt->root.type == bfd_link_hash_defined
4324 || opt->root.type == bfd_link_hash_defweak))
4325 {
4326 /* If glibc supports an optimized __tls_get_addr call stub,
4327 signalled by the presence of __tls_get_addr_opt, and we'll
4328 be calling __tls_get_addr via a plt call stub, then
4329 make __tls_get_addr point to __tls_get_addr_opt. */
4330 tga = htab->tls_get_addr;
4331 if (htab->elf.dynamic_sections_created
4332 && tga != NULL
4333 && (tga->type == STT_FUNC
4334 || tga->needs_plt)
4335 && !(SYMBOL_CALLS_LOCAL (info, tga)
21d68fcd 4336 || UNDEFWEAK_NO_DYNAMIC_RELOC (info, tga)))
a7f2871e
AM
4337 {
4338 struct plt_entry *ent;
32af9f6e
AM
4339 for (ent = tga->plt.plist; ent != NULL; ent = ent->next)
4340 if (ent->plt.refcount > 0)
4341 break;
4342 if (ent != NULL)
a7f2871e
AM
4343 {
4344 tga->root.type = bfd_link_hash_indirect;
4345 tga->root.u.i.link = &opt->root;
4346 ppc_elf_copy_indirect_symbol (info, opt, tga);
b531344c 4347 opt->mark = 1;
a7f2871e
AM
4348 if (opt->dynindx != -1)
4349 {
4350 /* Use __tls_get_addr_opt in dynamic relocations. */
4351 opt->dynindx = -1;
4352 _bfd_elf_strtab_delref (elf_hash_table (info)->dynstr,
4353 opt->dynstr_index);
4354 if (!bfd_elf_link_record_dynamic_symbol (info, opt))
0a1b45a2 4355 return false;
a7f2871e
AM
4356 }
4357 htab->tls_get_addr = opt;
4358 }
4359 }
4360 }
4361 else
0a1b45a2 4362 htab->params->no_tls_get_addr_opt = true;
a7f2871e 4363 }
4a3dc543 4364 if (htab->plt_type == PLT_NEW
ce558b89
AM
4365 && htab->elf.splt != NULL
4366 && htab->elf.splt->output_section != NULL)
d7128ce4 4367 {
ce558b89
AM
4368 elf_section_type (htab->elf.splt->output_section) = SHT_PROGBITS;
4369 elf_section_flags (htab->elf.splt->output_section) = SHF_ALLOC + SHF_WRITE;
d7128ce4
AM
4370 }
4371
25dbc73a 4372 return _bfd_elf_tls_setup (obfd, info);
7fce784e
AS
4373}
4374
3a71aa26
AM
4375/* Return TRUE iff REL is a branch reloc with a global symbol matching
4376 HASH. */
4377
0a1b45a2 4378static bool
3a71aa26
AM
4379branch_reloc_hash_match (const bfd *ibfd,
4380 const Elf_Internal_Rela *rel,
4381 const struct elf_link_hash_entry *hash)
4382{
4383 Elf_Internal_Shdr *symtab_hdr = &elf_symtab_hdr (ibfd);
4384 enum elf_ppc_reloc_type r_type = ELF32_R_TYPE (rel->r_info);
4385 unsigned int r_symndx = ELF32_R_SYM (rel->r_info);
4386
e054468f 4387 if (r_symndx >= symtab_hdr->sh_info && is_branch_reloc (r_type))
3a71aa26
AM
4388 {
4389 struct elf_link_hash_entry **sym_hashes = elf_sym_hashes (ibfd);
4390 struct elf_link_hash_entry *h;
4391
4392 h = sym_hashes[r_symndx - symtab_hdr->sh_info];
4393 while (h->root.type == bfd_link_hash_indirect
4394 || h->root.type == bfd_link_hash_warning)
4395 h = (struct elf_link_hash_entry *) h->root.u.i.link;
4396 if (h == hash)
0a1b45a2 4397 return true;
3a71aa26 4398 }
0a1b45a2 4399 return false;
3a71aa26
AM
4400}
4401
25dbc73a
AM
4402/* Run through all the TLS relocs looking for optimization
4403 opportunities. */
252b5132 4404
0a1b45a2 4405bool
25dbc73a
AM
4406ppc_elf_tls_optimize (bfd *obfd ATTRIBUTE_UNUSED,
4407 struct bfd_link_info *info)
252b5132 4408{
7fce784e 4409 bfd *ibfd;
25dbc73a
AM
4410 asection *sec;
4411 struct ppc_elf_link_hash_table *htab;
b7fcf6f6 4412 int pass;
252b5132 4413
3cbc1e5e 4414 if (!bfd_link_executable (info))
0a1b45a2 4415 return true;
252b5132 4416
7619e7c7 4417 htab = ppc_elf_hash_table (info);
663a1470 4418 if (htab == NULL)
0a1b45a2 4419 return false;
663a1470 4420
252dcdf4
AM
4421 htab->do_tls_opt = 1;
4422
b7fcf6f6
AM
4423 /* Make two passes through the relocs. First time check that tls
4424 relocs involved in setting up a tls_get_addr call are indeed
663a1470
AM
4425 followed by such a call. If they are not, don't do any tls
4426 optimization. On the second pass twiddle tls_mask flags to
4427 notify relocate_section that optimization can be done, and
4428 adjust got and plt refcounts. */
b7fcf6f6 4429 for (pass = 0; pass < 2; ++pass)
c72f2fb2 4430 for (ibfd = info->input_bfds; ibfd != NULL; ibfd = ibfd->link.next)
b7fcf6f6 4431 {
0ffa91dd 4432 Elf_Internal_Shdr *symtab_hdr = &elf_symtab_hdr (ibfd);
32af9f6e 4433 asection *got2 = bfd_get_section_by_name (ibfd, ".got2");
7619e7c7 4434
b7fcf6f6
AM
4435 for (sec = ibfd->sections; sec != NULL; sec = sec->next)
4436 if (sec->has_tls_reloc && !bfd_is_abs_section (sec->output_section))
4437 {
4438 Elf_Internal_Rela *relstart, *rel, *relend;
663a1470 4439 int expecting_tls_get_addr = 0;
252b5132 4440
b7fcf6f6
AM
4441 /* Read the relocations. */
4442 relstart = _bfd_elf_link_read_relocs (ibfd, sec, NULL, NULL,
4443 info->keep_memory);
4444 if (relstart == NULL)
0a1b45a2 4445 return false;
7619e7c7 4446
b7fcf6f6
AM
4447 relend = relstart + sec->reloc_count;
4448 for (rel = relstart; rel < relend; rel++)
4449 {
4450 enum elf_ppc_reloc_type r_type;
4451 unsigned long r_symndx;
4452 struct elf_link_hash_entry *h = NULL;
bac3c8c5 4453 unsigned char *tls_mask;
37da22e5 4454 unsigned char tls_set, tls_clear;
0a1b45a2 4455 bool is_local;
b7fcf6f6
AM
4456 bfd_signed_vma *got_count;
4457
4458 r_symndx = ELF32_R_SYM (rel->r_info);
4459 if (r_symndx >= symtab_hdr->sh_info)
4460 {
4461 struct elf_link_hash_entry **sym_hashes;
7fce784e 4462
b7fcf6f6
AM
4463 sym_hashes = elf_sym_hashes (ibfd);
4464 h = sym_hashes[r_symndx - symtab_hdr->sh_info];
4465 while (h->root.type == bfd_link_hash_indirect
4466 || h->root.type == bfd_link_hash_warning)
4467 h = (struct elf_link_hash_entry *) h->root.u.i.link;
4468 }
7619e7c7 4469
f749f26e 4470 is_local = SYMBOL_REFERENCES_LOCAL (info, h);
b7fcf6f6 4471 r_type = ELF32_R_TYPE (rel->r_info);
663a1470
AM
4472 /* If this section has old-style __tls_get_addr calls
4473 without marker relocs, then check that each
4474 __tls_get_addr call reloc is preceded by a reloc
4475 that conceivably belongs to the __tls_get_addr arg
4476 setup insn. If we don't find matching arg setup
4477 relocs, don't do any tls optimization. */
4478 if (pass == 0
9737e8af 4479 && sec->nomark_tls_get_addr
663a1470
AM
4480 && h != NULL
4481 && h == htab->tls_get_addr
4482 && !expecting_tls_get_addr
4483 && is_branch_reloc (r_type))
4484 {
25f53a85 4485 info->callbacks->minfo ("%H __tls_get_addr lost arg, "
663a1470
AM
4486 "TLS optimization disabled\n",
4487 ibfd, sec, rel->r_offset);
4488 if (elf_section_data (sec)->relocs != relstart)
4489 free (relstart);
0a1b45a2 4490 return true;
663a1470
AM
4491 }
4492
4493 expecting_tls_get_addr = 0;
b7fcf6f6
AM
4494 switch (r_type)
4495 {
4496 case R_PPC_GOT_TLSLD16:
4497 case R_PPC_GOT_TLSLD16_LO:
4498 expecting_tls_get_addr = 1;
1a0670f3 4499 /* Fall through. */
b7fcf6f6
AM
4500
4501 case R_PPC_GOT_TLSLD16_HI:
4502 case R_PPC_GOT_TLSLD16_HA:
4503 /* These relocs should never be against a symbol
4504 defined in a shared lib. Leave them alone if
4505 that turns out to be the case. */
4506 if (!is_local)
4507 continue;
4508
4509 /* LD -> LE */
4510 tls_set = 0;
4511 tls_clear = TLS_LD;
4512 break;
4513
4514 case R_PPC_GOT_TLSGD16:
4515 case R_PPC_GOT_TLSGD16_LO:
4516 expecting_tls_get_addr = 1;
1a0670f3 4517 /* Fall through. */
b7fcf6f6
AM
4518
4519 case R_PPC_GOT_TLSGD16_HI:
4520 case R_PPC_GOT_TLSGD16_HA:
4521 if (is_local)
4522 /* GD -> LE */
4523 tls_set = 0;
4524 else
4525 /* GD -> IE */
b00a0a86 4526 tls_set = TLS_TLS | TLS_GDIE;
b7fcf6f6
AM
4527 tls_clear = TLS_GD;
4528 break;
4529
4530 case R_PPC_GOT_TPREL16:
4531 case R_PPC_GOT_TPREL16_LO:
4532 case R_PPC_GOT_TPREL16_HI:
4533 case R_PPC_GOT_TPREL16_HA:
4534 if (is_local)
4535 {
4536 /* IE -> LE */
4537 tls_set = 0;
4538 tls_clear = TLS_TPREL;
4539 break;
4540 }
4541 else
4542 continue;
4543
32af9f6e 4544 case R_PPC_TLSLD:
7d04a20a
AM
4545 if (!is_local)
4546 continue;
4547 /* Fall through. */
4548 case R_PPC_TLSGD:
23cedd1d
AM
4549 if (rel + 1 < relend
4550 && is_plt_seq_reloc (ELF32_R_TYPE (rel[1].r_info)))
4551 {
4552 if (pass != 0
4553 && ELF32_R_TYPE (rel[1].r_info) != R_PPC_PLTSEQ)
4554 {
4555 r_type = ELF32_R_TYPE (rel[1].r_info);
4556 r_symndx = ELF32_R_SYM (rel[1].r_info);
4557 if (r_symndx >= symtab_hdr->sh_info)
4558 {
4559 struct elf_link_hash_entry **sym_hashes;
4560
4561 sym_hashes = elf_sym_hashes (ibfd);
4562 h = sym_hashes[r_symndx - symtab_hdr->sh_info];
4563 while (h->root.type == bfd_link_hash_indirect
4564 || h->root.type == bfd_link_hash_warning)
4565 h = (struct elf_link_hash_entry *) h->root.u.i.link;
4566 if (h != NULL)
4567 {
4568 struct plt_entry *ent = NULL;
4569 bfd_vma addend = 0;
4570
4571 if (bfd_link_pic (info))
4572 addend = rel->r_addend;
4573 ent = find_plt_ent (&h->plt.plist,
4574 got2, addend);
4575 if (ent != NULL
4576 && ent->plt.refcount > 0)
4577 ent->plt.refcount -= 1;
4578 }
4579 }
4580 }
4581 continue;
4582 }
32af9f6e
AM
4583 expecting_tls_get_addr = 2;
4584 tls_set = 0;
4585 tls_clear = 0;
4586 break;
4587
252dcdf4
AM
4588 case R_PPC_TPREL16_HA:
4589 if (pass == 0)
4590 {
4591 unsigned char buf[4];
4592 unsigned int insn;
4593 bfd_vma off = rel->r_offset & ~3;
4594 if (!bfd_get_section_contents (ibfd, sec, buf,
4595 off, 4))
4596 {
4597 if (elf_section_data (sec)->relocs != relstart)
4598 free (relstart);
0a1b45a2 4599 return false;
252dcdf4
AM
4600 }
4601 insn = bfd_get_32 (ibfd, buf);
4602 /* addis rt,2,imm */
4603 if ((insn & ((0x3fu << 26) | 0x1f << 16))
4604 != ((15u << 26) | (2 << 16)))
4605 {
4606 /* xgettext:c-format */
4607 info->callbacks->minfo
4608 (_("%H: warning: %s unexpected insn %#x.\n"),
4609 ibfd, sec, off, "R_PPC_TPREL16_HA", insn);
4610 htab->do_tls_opt = 0;
4611 }
4612 }
4613 continue;
4614
4615 case R_PPC_TPREL16_HI:
4616 htab->do_tls_opt = 0;
4617 continue;
4618
b7fcf6f6 4619 default:
25dbc73a 4620 continue;
b7fcf6f6 4621 }
25dbc73a 4622
b7fcf6f6
AM
4623 if (pass == 0)
4624 {
727fc41e 4625 if (!expecting_tls_get_addr
9737e8af 4626 || !sec->nomark_tls_get_addr)
b7fcf6f6 4627 continue;
25dbc73a 4628
3a71aa26
AM
4629 if (rel + 1 < relend
4630 && branch_reloc_hash_match (ibfd, rel + 1,
4631 htab->tls_get_addr))
4632 continue;
25dbc73a 4633
b7fcf6f6
AM
4634 /* Uh oh, we didn't find the expected call. We
4635 could just mark this symbol to exclude it
4636 from tls optimization but it's safer to skip
663a1470 4637 the entire optimization. */
25f53a85 4638 info->callbacks->minfo (_("%H arg lost __tls_get_addr, "
663a1470
AM
4639 "TLS optimization disabled\n"),
4640 ibfd, sec, rel->r_offset);
4641 if (elf_section_data (sec)->relocs != relstart)
4642 free (relstart);
0a1b45a2 4643 return true;
b7fcf6f6 4644 }
25dbc73a 4645
b7fcf6f6
AM
4646 if (h != NULL)
4647 {
4648 tls_mask = &ppc_elf_hash_entry (h)->tls_mask;
4649 got_count = &h->got.refcount;
4650 }
4651 else
4652 {
b7fcf6f6 4653 bfd_signed_vma *lgot_refs;
e054468f 4654 struct plt_entry **local_plt;
bac3c8c5 4655 unsigned char *lgot_masks;
25dbc73a 4656
b7fcf6f6
AM
4657 lgot_refs = elf_local_got_refcounts (ibfd);
4658 if (lgot_refs == NULL)
4659 abort ();
e054468f
AM
4660 local_plt = (struct plt_entry **)
4661 (lgot_refs + symtab_hdr->sh_info);
bac3c8c5
AM
4662 lgot_masks = (unsigned char *)
4663 (local_plt + symtab_hdr->sh_info);
b7fcf6f6
AM
4664 tls_mask = &lgot_masks[r_symndx];
4665 got_count = &lgot_refs[r_symndx];
4666 }
25dbc73a 4667
37da22e5
AM
4668 /* If we don't have old-style __tls_get_addr calls
4669 without TLSGD/TLSLD marker relocs, and we haven't
4670 found a new-style __tls_get_addr call with a
4671 marker for this symbol, then we either have a
4672 broken object file or an -mlongcall style
4673 indirect call to __tls_get_addr without a marker.
4674 Disable optimization in this case. */
4675 if ((tls_clear & (TLS_GD | TLS_LD)) != 0
9737e8af 4676 && !sec->nomark_tls_get_addr
37da22e5
AM
4677 && ((*tls_mask & (TLS_TLS | TLS_MARK))
4678 != (TLS_TLS | TLS_MARK)))
4679 continue;
4680
7d04a20a 4681 if (expecting_tls_get_addr == 1 + !sec->nomark_tls_get_addr)
37da22e5
AM
4682 {
4683 struct plt_entry *ent;
4684 bfd_vma addend = 0;
4685
4686 if (bfd_link_pic (info)
23cedd1d
AM
4687 && (ELF32_R_TYPE (rel[1].r_info) == R_PPC_PLTREL24
4688 || ELF32_R_TYPE (rel[1].r_info) == R_PPC_PLTCALL))
37da22e5
AM
4689 addend = rel[1].r_addend;
4690 ent = find_plt_ent (&htab->tls_get_addr->plt.plist,
4691 got2, addend);
4692 if (ent != NULL && ent->plt.refcount > 0)
4693 ent->plt.refcount -= 1;
37da22e5 4694 }
7d04a20a
AM
4695 if (tls_clear == 0)
4696 continue;
37da22e5 4697
b7fcf6f6
AM
4698 if (tls_set == 0)
4699 {
4700 /* We managed to get rid of a got entry. */
4701 if (*got_count > 0)
4702 *got_count -= 1;
4703 }
25dbc73a 4704
b7fcf6f6
AM
4705 *tls_mask |= tls_set;
4706 *tls_mask &= ~tls_clear;
4707 }
25dbc73a 4708
b7fcf6f6
AM
4709 if (elf_section_data (sec)->relocs != relstart)
4710 free (relstart);
4711 }
b7fcf6f6 4712 }
0a1b45a2 4713 return true;
25dbc73a
AM
4714}
4715\f
287c7eaf
AM
4716/* Return true if we have dynamic relocs against H or any of its weak
4717 aliases, that apply to read-only sections. Cannot be used after
4718 size_dynamic_sections. */
4719
0a1b45a2 4720static bool
287c7eaf
AM
4721alias_readonly_dynrelocs (struct elf_link_hash_entry *h)
4722{
4723 struct ppc_elf_link_hash_entry *eh = ppc_elf_hash_entry (h);
4724 do
4725 {
5dbc8b37 4726 if (_bfd_elf_readonly_dynrelocs (&eh->elf))
0a1b45a2 4727 return true;
287c7eaf
AM
4728 eh = ppc_elf_hash_entry (eh->elf.u.alias);
4729 } while (eh != NULL && &eh->elf != h);
4730
0a1b45a2 4731 return false;
287c7eaf
AM
4732}
4733
4734/* Return whether H has pc-relative dynamic relocs. */
4735
0a1b45a2 4736static bool
287c7eaf
AM
4737pc_dynrelocs (struct elf_link_hash_entry *h)
4738{
4739 struct elf_dyn_relocs *p;
4740
190eb1dd 4741 for (p = h->dyn_relocs; p != NULL; p = p->next)
287c7eaf 4742 if (p->pc_count != 0)
0a1b45a2
AM
4743 return true;
4744 return false;
287c7eaf
AM
4745}
4746
25dbc73a
AM
4747/* Adjust a symbol defined by a dynamic object and referenced by a
4748 regular object. The current definition is in some section of the
4749 dynamic object, but we're not including those sections. We have to
4750 change the definition to something the rest of the link can
4751 understand. */
7fce784e 4752
0a1b45a2 4753static bool
25dbc73a
AM
4754ppc_elf_adjust_dynamic_symbol (struct bfd_link_info *info,
4755 struct elf_link_hash_entry *h)
4756{
4757 struct ppc_elf_link_hash_table *htab;
4758 asection *s;
7fce784e 4759
25dbc73a
AM
4760#ifdef DEBUG
4761 fprintf (stderr, "ppc_elf_adjust_dynamic_symbol called for %s\n",
4762 h->root.root.string);
4763#endif
252b5132 4764
25dbc73a
AM
4765 /* Make sure we know what is going on here. */
4766 htab = ppc_elf_hash_table (info);
4767 BFD_ASSERT (htab->elf.dynobj != NULL
4768 && (h->needs_plt
91e21fb7 4769 || h->type == STT_GNU_IFUNC
60d67dc8 4770 || h->is_weakalias
25dbc73a
AM
4771 || (h->def_dynamic
4772 && h->ref_regular
4773 && !h->def_regular)));
252b5132 4774
25dbc73a
AM
4775 /* Deal with function syms. */
4776 if (h->type == STT_FUNC
e054468f 4777 || h->type == STT_GNU_IFUNC
25dbc73a
AM
4778 || h->needs_plt)
4779 {
0a1b45a2 4780 bool local = (SYMBOL_CALLS_LOCAL (info, h)
529fe20e 4781 || UNDEFWEAK_NO_DYNAMIC_RELOC (info, h));
287c7eaf
AM
4782 /* Discard dyn_relocs when non-pic if we've decided that a
4783 function symbol is local. */
4784 if (!bfd_link_pic (info) && local)
190eb1dd 4785 h->dyn_relocs = NULL;
529fe20e 4786
25dbc73a
AM
4787 /* Clear procedure linkage table information for any symbol that
4788 won't need a .plt entry. */
a6aa5195
AM
4789 struct plt_entry *ent;
4790 for (ent = h->plt.plist; ent != NULL; ent = ent->next)
4791 if (ent->plt.refcount > 0)
4792 break;
4793 if (ent == NULL
2d7ad24e
AM
4794 || (h->type != STT_GNU_IFUNC
4795 && local
3e04d765
AM
4796 && (htab->can_convert_all_inline_plt
4797 || (ppc_elf_hash_entry (h)->tls_mask
4798 & (TLS_TLS | PLT_KEEP)) != PLT_KEEP)))
252b5132 4799 {
25dbc73a 4800 /* A PLT entry is not required/allowed when:
252b5132 4801
25dbc73a
AM
4802 1. We are not using ld.so; because then the PLT entry
4803 can't be set up, so we can't use one. In this case,
4804 ppc_elf_adjust_dynamic_symbol won't even be called.
252b5132 4805
25dbc73a
AM
4806 2. GC has rendered the entry unused.
4807
4808 3. We know for certain that a call to this symbol
4809 will go to this object, or will remain undefined. */
a6aa5195 4810 h->plt.plist = NULL;
25dbc73a 4811 h->needs_plt = 0;
d1eca1e4 4812 h->pointer_equality_needed = 0;
25dbc73a 4813 }
625af618
AM
4814 else
4815 {
d1eca1e4
AM
4816 /* Taking a function's address in a read/write section
4817 doesn't require us to define the function symbol in the
1009ef28 4818 executable on a plt call stub. A dynamic reloc can
f0158f44
AM
4819 be used instead, giving better runtime performance.
4820 (Calls via that function pointer don't need to bounce
4821 through the plt call stub.) Similarly, use a dynamic
4822 reloc for a weak reference when possible, allowing the
4823 resolution of the symbol to be set at load time rather
4824 than link time. */
4825 if ((h->pointer_equality_needed
3988aed5
AM
4826 || (h->non_got_ref
4827 && !h->ref_regular_nonweak
4828 && !UNDEFWEAK_NO_DYNAMIC_RELOC (info, h)))
90c14f0c 4829 && htab->elf.target_os != is_vxworks
1009ef28 4830 && !ppc_elf_hash_entry (h)->has_sda_refs
5dbc8b37 4831 && !_bfd_elf_readonly_dynrelocs (h))
d1eca1e4
AM
4832 {
4833 h->pointer_equality_needed = 0;
04383fd1
AM
4834 /* If we haven't seen a branch reloc and the symbol
4835 isn't an ifunc then we don't need a plt entry. */
4836 if (!h->needs_plt && h->type != STT_GNU_IFUNC)
3988aed5 4837 h->plt.plist = NULL;
d1eca1e4 4838 }
287c7eaf 4839 else if (!bfd_link_pic (info))
529fe20e
AM
4840 /* We are going to be defining the function symbol on the
4841 plt stub, so no dyn_relocs needed when non-pic. */
190eb1dd 4842 h->dyn_relocs = NULL;
625af618 4843 }
d3e454b9 4844 h->protected_def = 0;
3988aed5 4845 /* Function symbols can't have copy relocs. */
0a1b45a2 4846 return true;
252b5132 4847 }
25dbc73a 4848 else
a6aa5195 4849 h->plt.plist = NULL;
252b5132 4850
25dbc73a
AM
4851 /* If this is a weak symbol, and there is a real definition, the
4852 processor independent code will have arranged for us to see the
4853 real definition first, and we can just use the same value. */
60d67dc8 4854 if (h->is_weakalias)
252b5132 4855 {
60d67dc8
AM
4856 struct elf_link_hash_entry *def = weakdef (h);
4857 BFD_ASSERT (def->root.type == bfd_link_hash_defined);
4858 h->root.u.def.section = def->root.u.def.section;
4859 h->root.u.def.value = def->root.u.def.value;
4a7e5234
AM
4860 if (def->root.u.def.section == htab->elf.sdynbss
4861 || def->root.u.def.section == htab->elf.sdynrelro
4862 || def->root.u.def.section == htab->dynsbss)
190eb1dd 4863 h->dyn_relocs = NULL;
0a1b45a2 4864 return true;
25dbc73a 4865 }
dc810e39 4866
25dbc73a
AM
4867 /* This is a reference to a symbol defined by a dynamic object which
4868 is not a function. */
252b5132 4869
25dbc73a
AM
4870 /* If we are creating a shared library, we must presume that the
4871 only references to the symbol are via the global offset table.
4872 For such cases we need not do anything here; the relocations will
4873 be handled correctly by relocate_section. */
0e1862bb 4874 if (bfd_link_pic (info))
d3e454b9
AM
4875 {
4876 h->protected_def = 0;
0a1b45a2 4877 return true;
d3e454b9 4878 }
252b5132 4879
25dbc73a
AM
4880 /* If there are no references to this symbol that do not use the
4881 GOT, we don't need to generate a copy reloc. */
4882 if (!h->non_got_ref)
d3e454b9
AM
4883 {
4884 h->protected_def = 0;
0a1b45a2 4885 return true;
d3e454b9
AM
4886 }
4887
4888 /* Protected variables do not work with .dynbss. The copy in
4889 .dynbss won't be used by the shared library with the protected
4890 definition for the variable. Editing to PIC, or text relocations
4891 are preferable to an incorrect program. */
4892 if (h->protected_def)
4893 {
4894 if (ELIMINATE_COPY_RELOCS
4895 && ppc_elf_hash_entry (h)->has_addr16_ha
4896 && ppc_elf_hash_entry (h)->has_addr16_lo
4897 && htab->params->pic_fixup == 0
4898 && info->disable_target_specific_optimizations <= 1)
4899 htab->params->pic_fixup = 1;
0a1b45a2 4900 return true;
d3e454b9 4901 }
25dbc73a 4902
a127494f
AM
4903 /* If -z nocopyreloc was given, we won't generate them either. */
4904 if (info->nocopyreloc)
0a1b45a2 4905 return true;
a127494f 4906
dce2246a 4907 /* If we don't find any dynamic relocs in read-only sections, then
cfd2c773
NS
4908 we'll be keeping the dynamic relocs and avoiding the copy reloc.
4909 We can't do this if there are any small data relocations. This
4910 doesn't work on VxWorks, where we can not have dynamic
4911 relocations (other than copy and jump slot relocations) in an
4912 executable. */
4dc4a9a5 4913 if (ELIMINATE_COPY_RELOCS
cfd2c773 4914 && !ppc_elf_hash_entry (h)->has_sda_refs
90c14f0c 4915 && htab->elf.target_os != is_vxworks
625af618 4916 && !h->def_regular
287c7eaf 4917 && !alias_readonly_dynrelocs (h))
0a1b45a2 4918 return true;
252b5132 4919
25dbc73a
AM
4920 /* We must allocate the symbol in our .dynbss section, which will
4921 become part of the .bss section of the executable. There will be
4922 an entry for this symbol in the .dynsym section. The dynamic
4923 object will contain position independent code, so all references
4924 from the dynamic object to this symbol will go through the global
4925 offset table. The dynamic linker will use the .dynsym entry to
4926 determine the address it must put in the global offset table, so
4927 both the dynamic object and the regular object will refer to the
4928 same memory location for the variable.
4929
4dc4a9a5
DJ
4930 Of course, if the symbol is referenced using SDAREL relocs, we
4931 must instead allocate it in .sbss. */
4dc4a9a5 4932 if (ppc_elf_hash_entry (h)->has_sda_refs)
25dbc73a 4933 s = htab->dynsbss;
5474d94f
AM
4934 else if ((h->root.u.def.section->flags & SEC_READONLY) != 0)
4935 s = htab->elf.sdynrelro;
25dbc73a 4936 else
9d19e4fd 4937 s = htab->elf.sdynbss;
25dbc73a
AM
4938 BFD_ASSERT (s != NULL);
4939
1d7e9d18 4940 if ((h->root.u.def.section->flags & SEC_ALLOC) != 0 && h->size != 0)
25dbc73a
AM
4941 {
4942 asection *srel;
4943
4a7e5234
AM
4944 /* We must generate a R_PPC_COPY reloc to tell the dynamic
4945 linker to copy the initial value out of the dynamic object
4946 and into the runtime process image. */
4dc4a9a5 4947 if (ppc_elf_hash_entry (h)->has_sda_refs)
25dbc73a 4948 srel = htab->relsbss;
5474d94f
AM
4949 else if ((h->root.u.def.section->flags & SEC_READONLY) != 0)
4950 srel = htab->elf.sreldynrelro;
25dbc73a 4951 else
9d19e4fd 4952 srel = htab->elf.srelbss;
25dbc73a
AM
4953 BFD_ASSERT (srel != NULL);
4954 srel->size += sizeof (Elf32_External_Rela);
4955 h->needs_copy = 1;
4956 }
7619e7c7 4957
529fe20e 4958 /* We no longer want dyn_relocs. */
190eb1dd 4959 h->dyn_relocs = NULL;
6cabe1ea 4960 return _bfd_elf_adjust_dynamic_copy (info, h, s);
25dbc73a
AM
4961}
4962\f
ac39eb42
AM
4963/* Generate a symbol to mark plt call stubs. For non-PIC code the sym is
4964 xxxxxxxx.plt_call32.<callee> where xxxxxxxx is a hex number, usually 0,
4965 specifying the addend on the plt relocation. For -fpic code, the sym
4966 is xxxxxxxx.plt_pic32.<callee>, and for -fPIC
4967 xxxxxxxx.got2.plt_pic32.<callee>. */
0ba07910 4968
0a1b45a2 4969static bool
0ba07910
AM
4970add_stub_sym (struct plt_entry *ent,
4971 struct elf_link_hash_entry *h,
ac39eb42 4972 struct bfd_link_info *info)
0ba07910
AM
4973{
4974 struct elf_link_hash_entry *sh;
4975 size_t len1, len2, len3;
4976 char *name;
ac39eb42
AM
4977 const char *stub;
4978 struct ppc_elf_link_hash_table *htab = ppc_elf_hash_table (info);
4979
0e1862bb 4980 if (bfd_link_pic (info))
ac39eb42
AM
4981 stub = ".plt_pic32.";
4982 else
4983 stub = ".plt_call32.";
0ba07910
AM
4984
4985 len1 = strlen (h->root.root.string);
ac39eb42 4986 len2 = strlen (stub);
0ba07910
AM
4987 len3 = 0;
4988 if (ent->sec)
4989 len3 = strlen (ent->sec->name);
ac39eb42 4990 name = bfd_malloc (len1 + len2 + len3 + 9);
0ba07910 4991 if (name == NULL)
0a1b45a2 4992 return false;
0ba07910
AM
4993 sprintf (name, "%08x", (unsigned) ent->addend & 0xffffffff);
4994 if (ent->sec)
4995 memcpy (name + 8, ent->sec->name, len3);
ac39eb42
AM
4996 memcpy (name + 8 + len3, stub, len2);
4997 memcpy (name + 8 + len3 + len2, h->root.root.string, len1 + 1);
0a1b45a2 4998 sh = elf_link_hash_lookup (&htab->elf, name, true, false, false);
0ba07910 4999 if (sh == NULL)
0a1b45a2 5000 return false;
0ba07910
AM
5001 if (sh->root.type == bfd_link_hash_new)
5002 {
5003 sh->root.type = bfd_link_hash_defined;
5004 sh->root.u.def.section = htab->glink;
5005 sh->root.u.def.value = ent->glink_offset;
5006 sh->ref_regular = 1;
5007 sh->def_regular = 1;
5008 sh->ref_regular_nonweak = 1;
5009 sh->forced_local = 1;
5010 sh->non_elf = 0;
2ec55de3 5011 sh->root.linker_def = 1;
0ba07910 5012 }
0a1b45a2 5013 return true;
0ba07910
AM
5014}
5015
3b36f7e6
AM
5016/* Allocate NEED contiguous space in .got, and return the offset.
5017 Handles allocation of the got header when crossing 32k. */
5018
5019static bfd_vma
5020allocate_got (struct ppc_elf_link_hash_table *htab, unsigned int need)
5021{
5022 bfd_vma where;
4a3dc543 5023 unsigned int max_before_header;
3b36f7e6 5024
4a3dc543 5025 if (htab->plt_type == PLT_VXWORKS)
9d8504b1 5026 {
ce558b89
AM
5027 where = htab->elf.sgot->size;
5028 htab->elf.sgot->size += need;
9d8504b1 5029 }
3b36f7e6
AM
5030 else
5031 {
4a3dc543
RS
5032 max_before_header = htab->plt_type == PLT_NEW ? 32768 : 32764;
5033 if (need <= htab->got_gap)
3b36f7e6 5034 {
4a3dc543
RS
5035 where = max_before_header - htab->got_gap;
5036 htab->got_gap -= need;
5037 }
5038 else
5039 {
ce558b89
AM
5040 if (htab->elf.sgot->size + need > max_before_header
5041 && htab->elf.sgot->size <= max_before_header)
4a3dc543 5042 {
ce558b89
AM
5043 htab->got_gap = max_before_header - htab->elf.sgot->size;
5044 htab->elf.sgot->size = max_before_header + htab->got_header_size;
4a3dc543 5045 }
ce558b89
AM
5046 where = htab->elf.sgot->size;
5047 htab->elf.sgot->size += need;
3b36f7e6 5048 }
3b36f7e6
AM
5049 }
5050 return where;
5051}
5052
f15d0b54
AM
5053/* Calculate size of GOT entries for symbol given its TLS_MASK.
5054 TLS_LD is excluded because those go in a special GOT slot. */
5055
5056static inline unsigned int
5057got_entries_needed (int tls_mask)
5058{
5059 unsigned int need;
5060 if ((tls_mask & TLS_TLS) == 0)
5061 need = 4;
5062 else
5063 {
5064 need = 0;
5065 if ((tls_mask & TLS_GD) != 0)
5066 need += 8;
b00a0a86 5067 if ((tls_mask & (TLS_TPREL | TLS_GDIE)) != 0)
f15d0b54
AM
5068 need += 4;
5069 if ((tls_mask & TLS_DTPREL) != 0)
5070 need += 4;
5071 }
5072 return need;
5073}
5074
46434633 5075/* If H is undefined, make it dynamic if that makes sense. */
f0158f44 5076
0a1b45a2 5077static bool
46434633
AM
5078ensure_undef_dynamic (struct bfd_link_info *info,
5079 struct elf_link_hash_entry *h)
f0158f44
AM
5080{
5081 struct elf_link_hash_table *htab = elf_hash_table (info);
5082
5083 if (htab->dynamic_sections_created
46434633
AM
5084 && ((info->dynamic_undefined_weak != 0
5085 && h->root.type == bfd_link_hash_undefweak)
5086 || h->root.type == bfd_link_hash_undefined)
f0158f44
AM
5087 && h->dynindx == -1
5088 && !h->forced_local
5089 && ELF_ST_VISIBILITY (h->other) == STV_DEFAULT)
5090 return bfd_elf_link_record_dynamic_symbol (info, h);
0a1b45a2 5091 return true;
f0158f44
AM
5092}
5093
30845f11
AM
5094/* Choose whether to use htab->iplt or htab->pltlocal rather than the
5095 usual htab->elf.splt section for a PLT entry. */
5096
5097static inline
0a1b45a2 5098bool use_local_plt (struct bfd_link_info *info,
30845f11
AM
5099 struct elf_link_hash_entry *h)
5100{
5101 return (h == NULL
5102 || h->dynindx == -1
5103 || !elf_hash_table (info)->dynamic_sections_created);
5104}
5105
25dbc73a 5106/* Allocate space in associated reloc sections for dynamic relocs. */
252b5132 5107
0a1b45a2 5108static bool
25dbc73a 5109allocate_dynrelocs (struct elf_link_hash_entry *h, void *inf)
252b5132 5110{
25dbc73a
AM
5111 struct bfd_link_info *info = inf;
5112 struct ppc_elf_link_hash_entry *eh;
7619e7c7 5113 struct ppc_elf_link_hash_table *htab;
6061a67d 5114 struct elf_dyn_relocs *p;
252b5132 5115
25dbc73a 5116 if (h->root.type == bfd_link_hash_indirect)
0a1b45a2 5117 return true;
252b5132 5118
7619e7c7 5119 htab = ppc_elf_hash_table (info);
25dbc73a 5120 eh = (struct ppc_elf_link_hash_entry *) h;
d3e454b9
AM
5121 if (eh->elf.got.refcount > 0
5122 || (ELIMINATE_COPY_RELOCS
5123 && !eh->elf.def_regular
5124 && eh->elf.protected_def
5125 && eh->has_addr16_ha
5126 && eh->has_addr16_lo
5127 && htab->params->pic_fixup > 0))
25dbc73a 5128 {
d6e14abc
AM
5129 unsigned int need;
5130
46434633
AM
5131 /* Make sure this symbol is output as a dynamic symbol. */
5132 if (!ensure_undef_dynamic (info, &eh->elf))
0a1b45a2 5133 return false;
252b5132 5134
d6e14abc 5135 need = 0;
37da22e5 5136 if ((eh->tls_mask & (TLS_TLS | TLS_LD)) == (TLS_TLS | TLS_LD))
25dbc73a 5137 {
f749f26e 5138 if (SYMBOL_REFERENCES_LOCAL (info, &eh->elf))
f15d0b54
AM
5139 /* We'll just use htab->tlsld_got.offset. This should
5140 always be the case. It's a little odd if we have
5141 a local dynamic reloc against a non-local symbol. */
5142 htab->tlsld_got.refcount += 1;
5143 else
d6e14abc 5144 need += 8;
d6e14abc 5145 }
f15d0b54 5146 need += got_entries_needed (eh->tls_mask);
d6e14abc
AM
5147 if (need == 0)
5148 eh->elf.got.offset = (bfd_vma) -1;
5149 else
5150 {
3b36f7e6 5151 eh->elf.got.offset = allocate_got (htab, need);
f749f26e
AM
5152 if (((bfd_link_pic (info)
5153 && !((eh->tls_mask & TLS_TLS) != 0
5154 && bfd_link_executable (info)
5155 && SYMBOL_REFERENCES_LOCAL (info, &eh->elf)))
f0158f44
AM
5156 || (htab->elf.dynamic_sections_created
5157 && eh->elf.dynindx != -1
5158 && !SYMBOL_REFERENCES_LOCAL (info, &eh->elf)))
21d68fcd 5159 && !UNDEFWEAK_NO_DYNAMIC_RELOC (info, &eh->elf))
252b5132 5160 {
f15d0b54 5161 asection *rsec;
f15d0b54 5162
f749f26e
AM
5163 need *= sizeof (Elf32_External_Rela) / 4;
5164 if ((eh->tls_mask & (TLS_TLS | TLS_LD)) == (TLS_TLS | TLS_LD))
f15d0b54
AM
5165 need -= sizeof (Elf32_External_Rela);
5166 rsec = htab->elf.srelgot;
0bed072f 5167 if (eh->elf.type == STT_GNU_IFUNC)
ce558b89 5168 rsec = htab->elf.irelplt;
f15d0b54 5169 rsec->size += need;
252b5132 5170 }
25dbc73a
AM
5171 }
5172 }
5173 else
5174 eh->elf.got.offset = (bfd_vma) -1;
252b5132 5175
954b63d4
AM
5176 /* If no dynamic sections we can't have dynamic relocs, except for
5177 IFUNCs which are handled even in static executables. */
f0158f44
AM
5178 if (!htab->elf.dynamic_sections_created
5179 && h->type != STT_GNU_IFUNC)
190eb1dd 5180 h->dyn_relocs = NULL;
f0158f44 5181
529fe20e
AM
5182 /* Discard relocs on undefined symbols that must be local. */
5183 else if (h->root.type == bfd_link_hash_undefined
5184 && ELF_ST_VISIBILITY (h->other) != STV_DEFAULT)
190eb1dd 5185 h->dyn_relocs = NULL;
529fe20e
AM
5186
5187 /* Also discard relocs on undefined weak syms with non-default
5188 visibility, or when dynamic_undefined_weak says so. */
5189 else if (UNDEFWEAK_NO_DYNAMIC_RELOC (info, h))
190eb1dd 5190 h->dyn_relocs = NULL;
529fe20e 5191
190eb1dd 5192 if (h->dyn_relocs == NULL)
287c7eaf 5193 ;
252b5132 5194
25dbc73a
AM
5195 /* In the shared -Bsymbolic case, discard space allocated for
5196 dynamic pc-relative relocs against symbols which turn out to be
5197 defined in regular objects. For the normal shared case, discard
5198 space for relocs that have become local due to symbol visibility
5199 changes. */
f0158f44 5200 else if (bfd_link_pic (info))
25dbc73a
AM
5201 {
5202 /* Relocs that use pc_count are those that appear on a call insn,
1d483afe 5203 or certain REL relocs (see must_be_dyn_reloc) that can be
25dbc73a
AM
5204 generated via assembly. We want calls to protected symbols to
5205 resolve directly to the function rather than going via the plt.
5206 If people want function pointer comparisons to work as expected
5207 then they should avoid writing weird assembly. */
529fe20e 5208 if (SYMBOL_CALLS_LOCAL (info, h))
25dbc73a 5209 {
6061a67d 5210 struct elf_dyn_relocs **pp;
25dbc73a 5211
190eb1dd 5212 for (pp = &h->dyn_relocs; (p = *pp) != NULL; )
252b5132 5213 {
25dbc73a
AM
5214 p->count -= p->pc_count;
5215 p->pc_count = 0;
5216 if (p->count == 0)
5217 *pp = p->next;
5218 else
5219 pp = &p->next;
252b5132 5220 }
25dbc73a 5221 }
252b5132 5222
90c14f0c 5223 if (htab->elf.target_os == is_vxworks)
3348747a 5224 {
6061a67d 5225 struct elf_dyn_relocs **pp;
3348747a 5226
190eb1dd 5227 for (pp = &h->dyn_relocs; (p = *pp) != NULL; )
3348747a
NS
5228 {
5229 if (strcmp (p->sec->output_section->name, ".tls_vars") == 0)
5230 *pp = p->next;
5231 else
5232 pp = &p->next;
5233 }
5234 }
5235
190eb1dd 5236 if (h->dyn_relocs != NULL)
25dbc73a 5237 {
46434633
AM
5238 /* Make sure this symbol is output as a dynamic symbol. */
5239 if (!ensure_undef_dynamic (info, h))
0a1b45a2 5240 return false;
25dbc73a
AM
5241 }
5242 }
5243 else if (ELIMINATE_COPY_RELOCS)
5244 {
f0158f44 5245 /* For the non-pic case, discard space for relocs against
25dbc73a
AM
5246 symbols which turn out to need copy relocs or are not
5247 dynamic. */
49160308
AM
5248 if ((h->dynamic_adjusted
5249 || (h->ref_regular
5250 && h->root.type == bfd_link_hash_undefweak
5251 && (info->dynamic_undefined_weak > 0
5252 || !_bfd_elf_readonly_dynrelocs (h))))
d3e454b9 5253 && !h->def_regular
529fe20e 5254 && !ELF_COMMON_DEF_P (h)
d3e454b9
AM
5255 && !(h->protected_def
5256 && eh->has_addr16_ha
5257 && eh->has_addr16_lo
5258 && htab->params->pic_fixup > 0))
25dbc73a 5259 {
46434633
AM
5260 /* Make sure this symbol is output as a dynamic symbol. */
5261 if (!ensure_undef_dynamic (info, h))
0a1b45a2 5262 return false;
7619e7c7 5263
f0158f44 5264 if (h->dynindx == -1)
190eb1dd 5265 h->dyn_relocs = NULL;
25dbc73a 5266 }
f0158f44 5267 else
190eb1dd 5268 h->dyn_relocs = NULL;
25dbc73a 5269 }
252b5132 5270
f0158f44 5271 /* Allocate space. */
190eb1dd 5272 for (p = h->dyn_relocs; p != NULL; p = p->next)
25dbc73a
AM
5273 {
5274 asection *sreloc = elf_section_data (p->sec)->sreloc;
f95f8542 5275 if (eh->elf.type == STT_GNU_IFUNC)
ce558b89 5276 sreloc = htab->elf.irelplt;
25dbc73a
AM
5277 sreloc->size += p->count * sizeof (Elf32_External_Rela);
5278 }
252b5132 5279
2d7ad24e
AM
5280 /* Handle PLT relocs. Done last, after dynindx has settled.
5281 We might need a PLT entry when the symbol
5282 a) is dynamic, or
5283 b) is an ifunc, or
5284 c) has plt16 relocs and has been processed by adjust_dynamic_symbol, or
5285 d) has plt16 relocs and we are linking statically. */
30845f11 5286 if ((htab->elf.dynamic_sections_created && h->dynindx != -1)
2d7ad24e
AM
5287 || h->type == STT_GNU_IFUNC
5288 || (h->needs_plt && h->dynamic_adjusted)
5289 || (h->needs_plt
5290 && h->def_regular
5291 && !htab->elf.dynamic_sections_created
3e04d765 5292 && !htab->can_convert_all_inline_plt
2d7ad24e
AM
5293 && (ppc_elf_hash_entry (h)->tls_mask
5294 & (TLS_TLS | PLT_KEEP)) == PLT_KEEP))
f0158f44
AM
5295 {
5296 struct plt_entry *ent;
0a1b45a2 5297 bool doneone = false;
2d7ad24e 5298 bfd_vma plt_offset = 0, glink_offset = (bfd_vma) -1;
f0158f44
AM
5299
5300 for (ent = h->plt.plist; ent != NULL; ent = ent->next)
5301 if (ent->plt.refcount > 0)
5302 {
b2936612
AM
5303 asection *s;
5304 bool dyn;
f0158f44 5305
b2936612
AM
5306 if (!ensure_undef_dynamic (info, h))
5307 return false;
5308
5309 dyn = !use_local_plt (info, h);
5310 s = htab->elf.splt;
f0158f44 5311 if (!dyn)
2d7ad24e
AM
5312 {
5313 if (h->type == STT_GNU_IFUNC)
5314 s = htab->elf.iplt;
5315 else
5316 s = htab->pltlocal;
5317 }
f0158f44
AM
5318
5319 if (htab->plt_type == PLT_NEW || !dyn)
5320 {
5321 if (!doneone)
5322 {
5323 plt_offset = s->size;
5324 s->size += 4;
5325 }
5326 ent->plt.offset = plt_offset;
5327
2d7ad24e
AM
5328 if (s == htab->pltlocal)
5329 ent->glink_offset = glink_offset;
5330 else
f0158f44 5331 {
2d7ad24e
AM
5332 s = htab->glink;
5333 if (!doneone || bfd_link_pic (info))
5334 {
5335 glink_offset = s->size;
5336 s->size += GLINK_ENTRY_SIZE (htab, h);
5337 }
5338 if (!doneone
5339 && !bfd_link_pic (info)
5340 && h->def_dynamic
5341 && !h->def_regular)
5342 {
5343 h->root.u.def.section = s;
5344 h->root.u.def.value = glink_offset;
5345 }
5346 ent->glink_offset = glink_offset;
f0158f44 5347
2d7ad24e
AM
5348 if (htab->params->emit_stub_syms
5349 && !add_stub_sym (ent, h, info))
0a1b45a2 5350 return false;
2d7ad24e 5351 }
f0158f44
AM
5352 }
5353 else
5354 {
5355 if (!doneone)
5356 {
5357 /* If this is the first .plt entry, make room
5358 for the special first entry. */
5359 if (s->size == 0)
5360 s->size += htab->plt_initial_entry_size;
5361
5362 /* The PowerPC PLT is actually composed of two
5363 parts, the first part is 2 words (for a load
5364 and a jump), and then there is a remaining
5365 word available at the end. */
5366 plt_offset = (htab->plt_initial_entry_size
5367 + (htab->plt_slot_size
5368 * ((s->size
5369 - htab->plt_initial_entry_size)
5370 / htab->plt_entry_size)));
5371
5372 /* If this symbol is not defined in a regular
5373 file, and we are not generating a shared
5374 library, then set the symbol to this location
5375 in the .plt. This is to avoid text
5376 relocations, and is required to make
5377 function pointers compare as equal between
5378 the normal executable and the shared library. */
5379 if (! bfd_link_pic (info)
5380 && h->def_dynamic
5381 && !h->def_regular)
5382 {
5383 h->root.u.def.section = s;
5384 h->root.u.def.value = plt_offset;
5385 }
5386
5387 /* Make room for this entry. */
5388 s->size += htab->plt_entry_size;
5389 /* After the 8192nd entry, room for two entries
5390 is allocated. */
5391 if (htab->plt_type == PLT_OLD
5392 && (s->size - htab->plt_initial_entry_size)
5393 / htab->plt_entry_size
5394 > PLT_NUM_SINGLE_ENTRIES)
5395 s->size += htab->plt_entry_size;
5396 }
5397 ent->plt.offset = plt_offset;
5398 }
5399
5400 /* We also need to make an entry in the .rela.plt section. */
5401 if (!doneone)
5402 {
5403 if (!dyn)
2d7ad24e
AM
5404 {
5405 if (h->type == STT_GNU_IFUNC)
5406 {
5407 s = htab->elf.irelplt;
5408 s->size += sizeof (Elf32_External_Rela);
5409 }
5410 else if (bfd_link_pic (info))
5411 {
5412 s = htab->relpltlocal;
5413 s->size += sizeof (Elf32_External_Rela);
5414 }
5415 }
f0158f44
AM
5416 else
5417 {
5418 htab->elf.srelplt->size += sizeof (Elf32_External_Rela);
5419
5420 if (htab->plt_type == PLT_VXWORKS)
5421 {
5422 /* Allocate space for the unloaded relocations. */
5423 if (!bfd_link_pic (info)
5424 && htab->elf.dynamic_sections_created)
5425 {
5426 if (ent->plt.offset
5427 == (bfd_vma) htab->plt_initial_entry_size)
5428 {
5429 htab->srelplt2->size
5430 += (sizeof (Elf32_External_Rela)
5431 * VXWORKS_PLTRESOLVE_RELOCS);
5432 }
5433
5434 htab->srelplt2->size
5435 += (sizeof (Elf32_External_Rela)
5436 * VXWORKS_PLT_NON_JMP_SLOT_RELOCS);
5437 }
5438
5439 /* Every PLT entry has an associated GOT entry in
5440 .got.plt. */
5441 htab->elf.sgotplt->size += 4;
5442 }
5443 }
0a1b45a2 5444 doneone = true;
f0158f44
AM
5445 }
5446 }
5447 else
5448 ent->plt.offset = (bfd_vma) -1;
5449
5450 if (!doneone)
5451 {
5452 h->plt.plist = NULL;
5453 h->needs_plt = 0;
5454 }
5455 }
5456 else
5457 {
5458 h->plt.plist = NULL;
5459 h->needs_plt = 0;
5460 }
5461
0a1b45a2 5462 return true;
25dbc73a 5463}
7619e7c7 5464
6177242a
AM
5465static const unsigned char glink_eh_frame_cie[] =
5466{
5467 0, 0, 0, 16, /* length. */
5468 0, 0, 0, 0, /* id. */
5469 1, /* CIE version. */
5470 'z', 'R', 0, /* Augmentation string. */
5471 4, /* Code alignment. */
5472 0x7c, /* Data alignment. */
5473 65, /* RA reg. */
5474 1, /* Augmentation size. */
5475 DW_EH_PE_pcrel | DW_EH_PE_sdata4, /* FDE encoding. */
5476 DW_CFA_def_cfa, 1, 0 /* def_cfa: r1 offset 0. */
5477};
5478
25dbc73a
AM
5479/* Set the sizes of the dynamic sections. */
5480
0a1b45a2 5481static bool
93d1b056 5482ppc_elf_size_dynamic_sections (bfd *output_bfd,
25dbc73a
AM
5483 struct bfd_link_info *info)
5484{
5485 struct ppc_elf_link_hash_table *htab;
5486 asection *s;
0a1b45a2 5487 bool relocs;
25dbc73a 5488 bfd *ibfd;
7fce784e 5489
252b5132 5490#ifdef DEBUG
25dbc73a 5491 fprintf (stderr, "ppc_elf_size_dynamic_sections called\n");
252b5132 5492#endif
252b5132 5493
25dbc73a
AM
5494 htab = ppc_elf_hash_table (info);
5495 BFD_ASSERT (htab->elf.dynobj != NULL);
252b5132 5496
25dbc73a
AM
5497 if (elf_hash_table (info)->dynamic_sections_created)
5498 {
5499 /* Set the contents of the .interp section to the interpreter. */
9b8b325a 5500 if (bfd_link_executable (info) && !info->nointerp)
25dbc73a 5501 {
3d4d4302 5502 s = bfd_get_linker_section (htab->elf.dynobj, ".interp");
25dbc73a
AM
5503 BFD_ASSERT (s != NULL);
5504 s->size = sizeof ELF_DYNAMIC_INTERPRETER;
5505 s->contents = (unsigned char *) ELF_DYNAMIC_INTERPRETER;
5506 }
5507 }
252b5132 5508
4a3dc543 5509 if (htab->plt_type == PLT_OLD)
d7128ce4 5510 htab->got_header_size = 16;
4a3dc543 5511 else if (htab->plt_type == PLT_NEW)
d7128ce4 5512 htab->got_header_size = 12;
252b5132 5513
25dbc73a
AM
5514 /* Set up .got offsets for local syms, and space for local dynamic
5515 relocs. */
c72f2fb2 5516 for (ibfd = info->input_bfds; ibfd != NULL; ibfd = ibfd->link.next)
25dbc73a
AM
5517 {
5518 bfd_signed_vma *local_got;
5519 bfd_signed_vma *end_local_got;
e054468f
AM
5520 struct plt_entry **local_plt;
5521 struct plt_entry **end_local_plt;
25dbc73a
AM
5522 char *lgot_masks;
5523 bfd_size_type locsymcount;
5524 Elf_Internal_Shdr *symtab_hdr;
7fce784e 5525
0c8d6e5c 5526 if (!is_ppc_elf (ibfd))
25dbc73a 5527 continue;
7fce784e 5528
25dbc73a
AM
5529 for (s = ibfd->sections; s != NULL; s = s->next)
5530 {
f95f8542 5531 struct ppc_dyn_relocs *p;
252b5132 5532
f95f8542 5533 for (p = ((struct ppc_dyn_relocs *)
25dbc73a
AM
5534 elf_section_data (s)->local_dynrel);
5535 p != NULL;
5536 p = p->next)
5537 {
5538 if (!bfd_is_abs_section (p->sec)
5539 && bfd_is_abs_section (p->sec->output_section))
5540 {
5541 /* Input section has been discarded, either because
5542 it is a copy of a linkonce section or due to
5543 linker script /DISCARD/, so we'll be discarding
5544 the relocs too. */
7fce784e 5545 }
90c14f0c 5546 else if (htab->elf.target_os == is_vxworks
3348747a
NS
5547 && strcmp (p->sec->output_section->name,
5548 ".tls_vars") == 0)
5549 {
5550 /* Relocations in vxworks .tls_vars sections are
5551 handled specially by the loader. */
5552 }
25dbc73a 5553 else if (p->count != 0)
7fce784e 5554 {
25f23106 5555 asection *sreloc = elf_section_data (p->sec)->sreloc;
f95f8542 5556 if (p->ifunc)
ce558b89 5557 sreloc = htab->elf.irelplt;
25f23106 5558 sreloc->size += p->count * sizeof (Elf32_External_Rela);
25dbc73a
AM
5559 if ((p->sec->output_section->flags
5560 & (SEC_READONLY | SEC_ALLOC))
5561 == (SEC_READONLY | SEC_ALLOC))
0caf6c82
L
5562 {
5563 info->flags |= DF_TEXTREL;
871b3ab2 5564 info->callbacks->minfo (_("%pB: dynamic relocation in read-only section `%pA'\n"),
0caf6c82
L
5565 p->sec->owner, p->sec);
5566 }
7fce784e 5567 }
252b5132 5568 }
252b5132 5569 }
252b5132 5570
25dbc73a
AM
5571 local_got = elf_local_got_refcounts (ibfd);
5572 if (!local_got)
5573 continue;
252b5132 5574
0ffa91dd 5575 symtab_hdr = &elf_symtab_hdr (ibfd);
25dbc73a
AM
5576 locsymcount = symtab_hdr->sh_info;
5577 end_local_got = local_got + locsymcount;
e054468f
AM
5578 local_plt = (struct plt_entry **) end_local_got;
5579 end_local_plt = local_plt + locsymcount;
5580 lgot_masks = (char *) end_local_plt;
91d6fa6a 5581
25dbc73a
AM
5582 for (; local_got < end_local_got; ++local_got, ++lgot_masks)
5583 if (*local_got > 0)
5584 {
f15d0b54 5585 unsigned int need;
37da22e5 5586 if ((*lgot_masks & (TLS_TLS | TLS_LD)) == (TLS_TLS | TLS_LD))
f15d0b54
AM
5587 htab->tlsld_got.refcount += 1;
5588 need = got_entries_needed (*lgot_masks);
d6e14abc
AM
5589 if (need == 0)
5590 *local_got = (bfd_vma) -1;
25dbc73a
AM
5591 else
5592 {
3b36f7e6 5593 *local_got = allocate_got (htab, need);
f749f26e
AM
5594 if (bfd_link_pic (info)
5595 && !((*lgot_masks & TLS_TLS) != 0
5596 && bfd_link_executable (info)))
0bed072f 5597 {
f15d0b54 5598 asection *srel;
f15d0b54 5599
f749f26e 5600 need *= sizeof (Elf32_External_Rela) / 4;
f15d0b54 5601 srel = htab->elf.srelgot;
37da22e5 5602 if ((*lgot_masks & (TLS_TLS | PLT_IFUNC)) == PLT_IFUNC)
ce558b89 5603 srel = htab->elf.irelplt;
f15d0b54 5604 srel->size += need;
0bed072f 5605 }
25dbc73a
AM
5606 }
5607 }
5608 else
5609 *local_got = (bfd_vma) -1;
e054468f 5610
90c14f0c 5611 if (htab->elf.target_os == is_vxworks)
e054468f
AM
5612 continue;
5613
5614 /* Allocate space for calls to local STT_GNU_IFUNC syms in .iplt. */
2d7ad24e
AM
5615 lgot_masks = (char *) end_local_plt;
5616 for (; local_plt < end_local_plt; ++local_plt, ++lgot_masks)
e054468f
AM
5617 {
5618 struct plt_entry *ent;
0a1b45a2 5619 bool doneone = false;
2d7ad24e 5620 bfd_vma plt_offset = 0, glink_offset = (bfd_vma) -1;
e054468f
AM
5621
5622 for (ent = *local_plt; ent != NULL; ent = ent->next)
5623 if (ent->plt.refcount > 0)
5624 {
2d7ad24e
AM
5625 if ((*lgot_masks & (TLS_TLS | PLT_IFUNC)) == PLT_IFUNC)
5626 s = htab->elf.iplt;
3e04d765
AM
5627 else if (htab->can_convert_all_inline_plt
5628 || (*lgot_masks & (TLS_TLS | PLT_KEEP)) != PLT_KEEP)
2d7ad24e
AM
5629 {
5630 ent->plt.offset = (bfd_vma) -1;
5631 continue;
5632 }
5633 else
5634 s = htab->pltlocal;
e054468f
AM
5635
5636 if (!doneone)
5637 {
5638 plt_offset = s->size;
5639 s->size += 4;
5640 }
5641 ent->plt.offset = plt_offset;
5642
2d7ad24e 5643 if (s != htab->pltlocal && (!doneone || bfd_link_pic (info)))
e054468f 5644 {
2d7ad24e 5645 s = htab->glink;
e054468f 5646 glink_offset = s->size;
9e390558 5647 s->size += GLINK_ENTRY_SIZE (htab, NULL);
e054468f
AM
5648 }
5649 ent->glink_offset = glink_offset;
5650
5651 if (!doneone)
5652 {
2d7ad24e
AM
5653 if ((*lgot_masks & (TLS_TLS | PLT_IFUNC)) == PLT_IFUNC)
5654 {
5655 s = htab->elf.irelplt;
5656 s->size += sizeof (Elf32_External_Rela);
5657 }
5658 else if (bfd_link_pic (info))
5659 {
5660 s = htab->relpltlocal;
5661 s->size += sizeof (Elf32_External_Rela);
5662 }
0a1b45a2 5663 doneone = true;
e054468f
AM
5664 }
5665 }
5666 else
5667 ent->plt.offset = (bfd_vma) -1;
5668 }
25dbc73a 5669 }
252b5132 5670
b7fcf6f6
AM
5671 /* Allocate space for global sym dynamic relocs. */
5672 elf_link_hash_traverse (elf_hash_table (info), allocate_dynrelocs, info);
5673
3b36f7e6
AM
5674 if (htab->tlsld_got.refcount > 0)
5675 {
5676 htab->tlsld_got.offset = allocate_got (htab, 8);
f749f26e 5677 if (bfd_link_dll (info))
ce558b89 5678 htab->elf.srelgot->size += sizeof (Elf32_External_Rela);
3b36f7e6
AM
5679 }
5680 else
5681 htab->tlsld_got.offset = (bfd_vma) -1;
5682
ce558b89 5683 if (htab->elf.sgot != NULL && htab->plt_type != PLT_VXWORKS)
3b36f7e6
AM
5684 {
5685 unsigned int g_o_t = 32768;
5686
4d962050
AM
5687 /* If we haven't allocated the header, do so now. When we get here,
5688 for old plt/got the got size will be 0 to 32764 (not allocated),
5689 or 32780 to 65536 (header allocated). For new plt/got, the
5690 corresponding ranges are 0 to 32768 and 32780 to 65536. */
ce558b89 5691 if (htab->elf.sgot->size <= 32768)
3b36f7e6 5692 {
ce558b89 5693 g_o_t = htab->elf.sgot->size;
4a3dc543 5694 if (htab->plt_type == PLT_OLD)
4d962050 5695 g_o_t += 4;
ce558b89 5696 htab->elf.sgot->size += htab->got_header_size;
3b36f7e6 5697 }
3b36f7e6
AM
5698
5699 htab->elf.hgot->root.u.def.value = g_o_t;
5700 }
0e1862bb 5701 if (bfd_link_pic (info))
bd6c6e2b
AM
5702 {
5703 struct elf_link_hash_entry *sda = htab->sdata[0].sym;
93d1b056
AM
5704
5705 sda->root.u.def.section = htab->elf.hgot->root.u.def.section;
5706 sda->root.u.def.value = htab->elf.hgot->root.u.def.value;
bd6c6e2b 5707 }
15bfcc77
AM
5708 if (info->emitrelocations)
5709 {
5710 struct elf_link_hash_entry *sda = htab->sdata[0].sym;
5711
5712 if (sda != NULL && sda->ref_regular)
5713 sda->root.u.def.section->flags |= SEC_KEEP;
5714 sda = htab->sdata[1].sym;
5715 if (sda != NULL && sda->ref_regular)
5716 sda->root.u.def.section->flags |= SEC_KEEP;
5717 }
3b36f7e6 5718
e054468f
AM
5719 if (htab->glink != NULL
5720 && htab->glink->size != 0
5721 && htab->elf.dynamic_sections_created)
d7128ce4
AM
5722 {
5723 htab->glink_pltresolve = htab->glink->size;
9e390558
AM
5724 /* Space for the branch table. */
5725 htab->glink->size
5726 += htab->elf.srelplt->size / (sizeof (Elf32_External_Rela) / 4) - 4;
86b9da88 5727 /* Pad out to align the start of PLTresolve. */
5446cbdf
AM
5728 htab->glink->size += -htab->glink->size & (htab->params->ppc476_workaround
5729 ? 63 : 15);
d7128ce4 5730 htab->glink->size += GLINK_PLTRESOLVE;
0ba07910 5731
5446cbdf 5732 if (htab->params->emit_stub_syms)
0ba07910
AM
5733 {
5734 struct elf_link_hash_entry *sh;
5735 sh = elf_link_hash_lookup (&htab->elf, "__glink",
0a1b45a2 5736 true, false, false);
0ba07910 5737 if (sh == NULL)
0a1b45a2 5738 return false;
0ba07910
AM
5739 if (sh->root.type == bfd_link_hash_new)
5740 {
5741 sh->root.type = bfd_link_hash_defined;
5742 sh->root.u.def.section = htab->glink;
5743 sh->root.u.def.value = htab->glink_pltresolve;
5744 sh->ref_regular = 1;
5745 sh->def_regular = 1;
5746 sh->ref_regular_nonweak = 1;
5747 sh->forced_local = 1;
5748 sh->non_elf = 0;
2ec55de3 5749 sh->root.linker_def = 1;
0ba07910
AM
5750 }
5751 sh = elf_link_hash_lookup (&htab->elf, "__glink_PLTresolve",
0a1b45a2 5752 true, false, false);
0ba07910 5753 if (sh == NULL)
0a1b45a2 5754 return false;
0ba07910
AM
5755 if (sh->root.type == bfd_link_hash_new)
5756 {
5757 sh->root.type = bfd_link_hash_defined;
5758 sh->root.u.def.section = htab->glink;
5759 sh->root.u.def.value = htab->glink->size - GLINK_PLTRESOLVE;
5760 sh->ref_regular = 1;
5761 sh->def_regular = 1;
5762 sh->ref_regular_nonweak = 1;
5763 sh->forced_local = 1;
5764 sh->non_elf = 0;
2ec55de3 5765 sh->root.linker_def = 1;
0ba07910
AM
5766 }
5767 }
d7128ce4
AM
5768 }
5769
6177242a
AM
5770 if (htab->glink != NULL
5771 && htab->glink->size != 0
5772 && htab->glink_eh_frame != NULL
9a2a56cc
AM
5773 && !bfd_is_abs_section (htab->glink_eh_frame->output_section)
5774 && _bfd_elf_eh_frame_present (info))
6177242a
AM
5775 {
5776 s = htab->glink_eh_frame;
5777 s->size = sizeof (glink_eh_frame_cie) + 20;
0e1862bb 5778 if (bfd_link_pic (info))
6177242a
AM
5779 {
5780 s->size += 4;
5781 if (htab->glink->size - GLINK_PLTRESOLVE + 8 >= 256)
5782 s->size += 4;
5783 }
5784 }
5785
25dbc73a
AM
5786 /* We've now determined the sizes of the various dynamic sections.
5787 Allocate memory for them. */
0a1b45a2 5788 relocs = false;
25dbc73a 5789 for (s = htab->elf.dynobj->sections; s != NULL; s = s->next)
252b5132 5790 {
0a1b45a2 5791 bool strip_section = true;
9d8504b1 5792
25dbc73a
AM
5793 if ((s->flags & SEC_LINKER_CREATED) == 0)
5794 continue;
252b5132 5795
ce558b89
AM
5796 if (s == htab->elf.splt
5797 || s == htab->elf.sgot)
25dbc73a 5798 {
9d8504b1
PB
5799 /* We'd like to strip these sections if they aren't needed, but if
5800 we've exported dynamic symbols from them we must leave them.
5801 It's too late to tell BFD to get rid of the symbols. */
e054468f 5802 if (htab->elf.hplt != NULL)
0a1b45a2 5803 strip_section = false;
25dbc73a
AM
5804 /* Strip this section if we don't need it; see the
5805 comment below. */
5806 }
ce558b89 5807 else if (s == htab->elf.iplt
2d7ad24e 5808 || s == htab->pltlocal
e054468f 5809 || s == htab->glink
6177242a 5810 || s == htab->glink_eh_frame
ce558b89 5811 || s == htab->elf.sgotplt
e054468f 5812 || s == htab->sbss
9d19e4fd 5813 || s == htab->elf.sdynbss
5474d94f 5814 || s == htab->elf.sdynrelro
15bfcc77 5815 || s == htab->dynsbss)
25dbc73a 5816 {
c9a2f333 5817 /* Strip these too. */
25dbc73a 5818 }
15bfcc77
AM
5819 else if (s == htab->sdata[0].section
5820 || s == htab->sdata[1].section)
5821 {
5822 strip_section = (s->flags & SEC_KEEP) == 0;
5823 }
08dedd66 5824 else if (startswith (bfd_section_name (s), ".rela"))
25dbc73a 5825 {
c456f082 5826 if (s->size != 0)
25dbc73a
AM
5827 {
5828 /* Remember whether there are any relocation sections. */
0a1b45a2 5829 relocs = true;
252b5132 5830
25dbc73a
AM
5831 /* We use the reloc_count field as a counter if we need
5832 to copy relocs into the output file. */
5833 s->reloc_count = 0;
252b5132
RH
5834 }
5835 }
25dbc73a
AM
5836 else
5837 {
5838 /* It's not one of our sections, so don't allocate space. */
5839 continue;
5840 }
252b5132 5841
9d8504b1 5842 if (s->size == 0 && strip_section)
25dbc73a 5843 {
c456f082
AM
5844 /* If we don't need this section, strip it from the
5845 output file. This is mostly to handle .rela.bss and
5846 .rela.plt. We must create both sections in
5847 create_dynamic_sections, because they must be created
5848 before the linker maps input sections to output
5849 sections. The linker does that before
5850 adjust_dynamic_symbol is called, and it is that
5851 function which decides whether anything needs to go
5852 into these sections. */
8423293d 5853 s->flags |= SEC_EXCLUDE;
25dbc73a
AM
5854 continue;
5855 }
7fce784e 5856
d7128ce4 5857 if ((s->flags & SEC_HAS_CONTENTS) == 0)
644285ef
AM
5858 continue;
5859
25dbc73a
AM
5860 /* Allocate memory for the section contents. */
5861 s->contents = bfd_zalloc (htab->elf.dynobj, s->size);
5862 if (s->contents == NULL)
0a1b45a2 5863 return false;
25dbc73a 5864 }
252b5132 5865
25dbc73a 5866 if (htab->elf.dynamic_sections_created)
7619e7c7 5867 {
25dbc73a
AM
5868 /* Add some entries to the .dynamic section. We fill in the
5869 values later, in ppc_elf_finish_dynamic_sections, but we
5870 must add the entries now so that we get the correct size for
5871 the .dynamic section. The DT_DEBUG entry is filled in by the
5872 dynamic linker and used by the debugger. */
5873#define add_dynamic_entry(TAG, VAL) \
5874 _bfd_elf_add_dynamic_entry (info, TAG, VAL)
252b5132 5875
3084d7a2
L
5876 if (!_bfd_elf_maybe_vxworks_add_dynamic_tags (output_bfd, info,
5877 relocs))
0a1b45a2 5878 return false;
7619e7c7 5879
c7e17e05
AM
5880 if (htab->plt_type == PLT_NEW
5881 && htab->glink != NULL
5882 && htab->glink->size != 0)
d7128ce4 5883 {
1fe44d79 5884 if (!add_dynamic_entry (DT_PPC_GOT, 0))
0a1b45a2 5885 return false;
5446cbdf 5886 if (!htab->params->no_tls_get_addr_opt
a7f2871e
AM
5887 && htab->tls_get_addr != NULL
5888 && htab->tls_get_addr->plt.plist != NULL
e8910a83 5889 && !add_dynamic_entry (DT_PPC_OPT, PPC_OPT_TLS))
0a1b45a2 5890 return false;
d7128ce4 5891 }
7a2b07ff 5892 }
25dbc73a
AM
5893#undef add_dynamic_entry
5894
7e01508c
AM
5895 if (htab->glink_eh_frame != NULL
5896 && htab->glink_eh_frame->contents != NULL)
5897 {
5898 unsigned char *p = htab->glink_eh_frame->contents;
5899 bfd_vma val;
5900
5901 memcpy (p, glink_eh_frame_cie, sizeof (glink_eh_frame_cie));
5902 /* CIE length (rewrite in case little-endian). */
5903 bfd_put_32 (htab->elf.dynobj, sizeof (glink_eh_frame_cie) - 4, p);
5904 p += sizeof (glink_eh_frame_cie);
5905 /* FDE length. */
5906 val = htab->glink_eh_frame->size - 4 - sizeof (glink_eh_frame_cie);
5907 bfd_put_32 (htab->elf.dynobj, val, p);
5908 p += 4;
5909 /* CIE pointer. */
5910 val = p - htab->glink_eh_frame->contents;
5911 bfd_put_32 (htab->elf.dynobj, val, p);
5912 p += 4;
5913 /* Offset to .glink. Set later. */
5914 p += 4;
5915 /* .glink size. */
5916 bfd_put_32 (htab->elf.dynobj, htab->glink->size, p);
5917 p += 4;
5918 /* Augmentation. */
5919 p += 1;
5920
0e1862bb 5921 if (bfd_link_pic (info)
7e01508c
AM
5922 && htab->elf.dynamic_sections_created)
5923 {
5924 bfd_vma adv = (htab->glink->size - GLINK_PLTRESOLVE + 8) >> 2;
5925 if (adv < 64)
5926 *p++ = DW_CFA_advance_loc + adv;
5927 else if (adv < 256)
5928 {
5929 *p++ = DW_CFA_advance_loc1;
5930 *p++ = adv;
5931 }
5932 else if (adv < 65536)
5933 {
5934 *p++ = DW_CFA_advance_loc2;
5935 bfd_put_16 (htab->elf.dynobj, adv, p);
5936 p += 2;
5937 }
5938 else
5939 {
5940 *p++ = DW_CFA_advance_loc4;
5941 bfd_put_32 (htab->elf.dynobj, adv, p);
5942 p += 4;
5943 }
5944 *p++ = DW_CFA_register;
5945 *p++ = 65;
5946 p++;
5947 *p++ = DW_CFA_advance_loc + 4;
5948 *p++ = DW_CFA_restore_extended;
5949 *p++ = 65;
5950 }
5951 BFD_ASSERT ((bfd_vma) ((p + 3 - htab->glink_eh_frame->contents) & -4)
5952 == htab->glink_eh_frame->size);
5953 }
5954
0a1b45a2 5955 return true;
7619e7c7 5956}
0eb4a168 5957
93d1b056
AM
5958/* Arrange to have _SDA_BASE_ or _SDA2_BASE_ stripped from the output
5959 if it looks like nothing is using them. */
5960
5961static void
5962maybe_strip_sdasym (bfd *output_bfd, elf_linker_section_t *lsect)
5963{
5964 struct elf_link_hash_entry *sda = lsect->sym;
5965
5966 if (sda != NULL && !sda->ref_regular && sda->dynindx == -1)
5967 {
5968 asection *s;
5969
5970 s = bfd_get_section_by_name (output_bfd, lsect->name);
5971 if (s == NULL || bfd_section_removed_from_list (output_bfd, s))
5972 {
5973 s = bfd_get_section_by_name (output_bfd, lsect->bss_name);
5974 if (s == NULL || bfd_section_removed_from_list (output_bfd, s))
5975 {
5976 sda->def_regular = 0;
5977 /* This is somewhat magic. See elf_link_output_extsym. */
5978 sda->ref_dynamic = 1;
5979 sda->forced_local = 0;
5980 }
5981 }
5982 }
5983}
5984
5985void
5986ppc_elf_maybe_strip_sdata_syms (struct bfd_link_info *info)
5987{
5988 struct ppc_elf_link_hash_table *htab = ppc_elf_hash_table (info);
5989
5990 if (htab != NULL)
5991 {
5992 maybe_strip_sdasym (info->output_bfd, &htab->sdata[0]);
5993 maybe_strip_sdasym (info->output_bfd, &htab->sdata[1]);
5994 }
5995}
5996
5997
0eb4a168
AM
5998/* Return TRUE if symbol should be hashed in the `.gnu.hash' section. */
5999
0a1b45a2 6000static bool
0eb4a168
AM
6001ppc_elf_hash_symbol (struct elf_link_hash_entry *h)
6002{
6003 if (h->plt.plist != NULL
6004 && !h->def_regular
6005 && (!h->pointer_equality_needed
6006 || !h->ref_regular_nonweak))
0a1b45a2 6007 return false;
0eb4a168
AM
6008
6009 return _bfd_elf_hash_symbol (h);
6010}
25dbc73a
AM
6011\f
6012#define ARRAY_SIZE(a) (sizeof (a) / sizeof ((a)[0]))
6013
01017ef8
NS
6014/* Relaxation trampolines. r12 is available for clobbering (r11, is
6015 used for some functions that are allowed to break the ABI). */
25dbc73a
AM
6016static const int shared_stub_entry[] =
6017 {
6018 0x7c0802a6, /* mflr 0 */
6019 0x429f0005, /* bcl 20, 31, .Lxxx */
01017ef8
NS
6020 0x7d8802a6, /* mflr 12 */
6021 0x3d8c0000, /* addis 12, 12, (xxx-.Lxxx)@ha */
53291d1f 6022 0x398c0000, /* addi 12, 12, (xxx-.Lxxx)@l */
25dbc73a 6023 0x7c0803a6, /* mtlr 0 */
01017ef8 6024 0x7d8903a6, /* mtctr 12 */
25dbc73a
AM
6025 0x4e800420, /* bctr */
6026 };
6027
6028static const int stub_entry[] =
6029 {
01017ef8
NS
6030 0x3d800000, /* lis 12,xxx@ha */
6031 0x398c0000, /* addi 12,12,xxx@l */
6032 0x7d8903a6, /* mtctr 12 */
25dbc73a
AM
6033 0x4e800420, /* bctr */
6034 };
6035
5446cbdf
AM
6036struct ppc_elf_relax_info
6037{
6038 unsigned int workaround_size;
d3e454b9 6039 unsigned int picfixup_size;
5446cbdf
AM
6040};
6041
6042/* This function implements long branch trampolines, and the ppc476
6043 icache bug workaround. Any section needing trampolines or patch
6044 space for the workaround has its size extended so that we can
53291d1f 6045 add trampolines at the end of the section. */
5446cbdf 6046
0a1b45a2 6047static bool
25dbc73a
AM
6048ppc_elf_relax_section (bfd *abfd,
6049 asection *isec,
6050 struct bfd_link_info *link_info,
0a1b45a2 6051 bool *again)
25dbc73a 6052{
d3e454b9 6053 struct one_branch_fixup
25dbc73a 6054 {
d3e454b9 6055 struct one_branch_fixup *next;
25dbc73a 6056 asection *tsec;
01017ef8
NS
6057 /* Final link, can use the symbol offset. For a
6058 relocatable link we use the symbol's index. */
25dbc73a
AM
6059 bfd_vma toff;
6060 bfd_vma trampoff;
6061 };
7619e7c7 6062
25dbc73a
AM
6063 Elf_Internal_Shdr *symtab_hdr;
6064 bfd_byte *contents = NULL;
6065 Elf_Internal_Sym *isymbuf = NULL;
6066 Elf_Internal_Rela *internal_relocs = NULL;
5446cbdf 6067 Elf_Internal_Rela *irel, *irelend = NULL;
d3e454b9 6068 struct one_branch_fixup *branch_fixups = NULL;
5446cbdf 6069 struct ppc_elf_relax_info *relax_info = NULL;
9bc4e62b 6070 unsigned changes = 0;
0a1b45a2 6071 bool workaround_change;
d7128ce4 6072 struct ppc_elf_link_hash_table *htab;
d3e454b9 6073 bfd_size_type trampbase, trampoff, newsize, picfixup_size;
a6aa5195 6074 asection *got2;
0a1b45a2 6075 bool maybe_pasted;
7619e7c7 6076
0a1b45a2 6077 *again = false;
7619e7c7 6078
5446cbdf 6079 /* No need to do anything with non-alloc or non-code sections. */
c87b5a93 6080 if ((isec->flags & SEC_ALLOC) == 0
a8ad78a7 6081 || (isec->flags & SEC_CODE) == 0
5446cbdf
AM
6082 || (isec->flags & SEC_LINKER_CREATED) != 0
6083 || isec->size < 4)
0a1b45a2 6084 return true;
7619e7c7 6085
c8a1f254
NS
6086 /* We cannot represent the required PIC relocs in the output, so don't
6087 do anything. The linker doesn't support mixing -shared and -r
6088 anyway. */
0e1862bb 6089 if (bfd_link_relocatable (link_info) && bfd_link_pic (link_info))
0a1b45a2 6090 return true;
5b914448 6091
5446cbdf
AM
6092 htab = ppc_elf_hash_table (link_info);
6093 if (htab == NULL)
0a1b45a2 6094 return true;
5446cbdf
AM
6095
6096 isec->size = (isec->size + 3) & -4;
6097 if (isec->rawsize == 0)
6098 isec->rawsize = isec->size;
6099 trampbase = isec->size;
6100
53291d1f
AM
6101 BFD_ASSERT (isec->sec_info_type == SEC_INFO_TYPE_NONE
6102 || isec->sec_info_type == SEC_INFO_TYPE_TARGET);
6103 isec->sec_info_type = SEC_INFO_TYPE_TARGET;
6104
d3e454b9
AM
6105 if (htab->params->ppc476_workaround
6106 || htab->params->pic_fixup > 0)
5446cbdf
AM
6107 {
6108 if (elf_section_data (isec)->sec_info == NULL)
6109 {
5446cbdf
AM
6110 elf_section_data (isec)->sec_info
6111 = bfd_zalloc (abfd, sizeof (struct ppc_elf_relax_info));
6112 if (elf_section_data (isec)->sec_info == NULL)
0a1b45a2 6113 return false;
5446cbdf
AM
6114 }
6115 relax_info = elf_section_data (isec)->sec_info;
6116 trampbase -= relax_info->workaround_size;
6117 }
6118
50248c89
AM
6119 maybe_pasted = (strcmp (isec->output_section->name, ".init") == 0
6120 || strcmp (isec->output_section->name, ".fini") == 0);
25dbc73a 6121 /* Space for a branch around any trampolines. */
5446cbdf
AM
6122 trampoff = trampbase;
6123 if (maybe_pasted && trampbase == isec->rawsize)
50248c89 6124 trampoff += 4;
7619e7c7 6125
0ffa91dd 6126 symtab_hdr = &elf_symtab_hdr (abfd);
d3e454b9
AM
6127 picfixup_size = 0;
6128 if (htab->params->branch_trampolines
6129 || htab->params->pic_fixup > 0)
7619e7c7 6130 {
5446cbdf
AM
6131 /* Get a copy of the native relocations. */
6132 if (isec->reloc_count != 0)
25dbc73a 6133 {
5446cbdf
AM
6134 internal_relocs = _bfd_elf_link_read_relocs (abfd, isec, NULL, NULL,
6135 link_info->keep_memory);
6136 if (internal_relocs == NULL)
6137 goto error_return;
25dbc73a 6138 }
7619e7c7 6139
5446cbdf
AM
6140 got2 = bfd_get_section_by_name (abfd, ".got2");
6141
6142 irelend = internal_relocs + isec->reloc_count;
6143 for (irel = internal_relocs; irel < irelend; irel++)
25dbc73a 6144 {
5446cbdf
AM
6145 unsigned long r_type = ELF32_R_TYPE (irel->r_info);
6146 bfd_vma toff, roff;
6147 asection *tsec;
d3e454b9 6148 struct one_branch_fixup *f;
5446cbdf 6149 size_t insn_offset = 0;
d3e454b9 6150 bfd_vma max_branch_offset = 0, val;
5446cbdf
AM
6151 bfd_byte *hit_addr;
6152 unsigned long t0;
6153 struct elf_link_hash_entry *h;
49c09209 6154 Elf_Internal_Sym *isym;
5446cbdf
AM
6155 struct plt_entry **plist;
6156 unsigned char sym_type;
6157
6158 switch (r_type)
6159 {
6160 case R_PPC_REL24:
6161 case R_PPC_LOCAL24PC:
6162 case R_PPC_PLTREL24:
23cedd1d 6163 case R_PPC_PLTCALL:
5446cbdf
AM
6164 max_branch_offset = 1 << 25;
6165 break;
6166
6167 case R_PPC_REL14:
6168 case R_PPC_REL14_BRTAKEN:
6169 case R_PPC_REL14_BRNTAKEN:
6170 max_branch_offset = 1 << 15;
6171 break;
7fce784e 6172
d3e454b9
AM
6173 case R_PPC_ADDR16_HA:
6174 if (htab->params->pic_fixup > 0)
6175 break;
6176 continue;
6177
5446cbdf
AM
6178 default:
6179 continue;
6180 }
6181
6182 /* Get the value of the symbol referred to by the reloc. */
49c09209
AM
6183 if (!get_sym_h (&h, &isym, &tsec, NULL, &isymbuf,
6184 ELF32_R_SYM (irel->r_info), abfd))
6185 goto error_return;
5446cbdf 6186
49c09209
AM
6187 if (isym != NULL)
6188 {
6189 if (tsec != NULL)
6190 ;
5446cbdf
AM
6191 else if (isym->st_shndx == SHN_ABS)
6192 tsec = bfd_abs_section_ptr;
49199304
AM
6193 else
6194 continue;
5446cbdf
AM
6195
6196 toff = isym->st_value;
6197 sym_type = ELF_ST_TYPE (isym->st_info);
25dbc73a 6198 }
25dbc73a 6199 else
5446cbdf 6200 {
49c09209
AM
6201 if (tsec != NULL)
6202 toff = h->root.u.def.value;
5446cbdf
AM
6203 else if (h->root.type == bfd_link_hash_undefined
6204 || h->root.type == bfd_link_hash_undefweak)
6205 {
49c09209
AM
6206 unsigned long indx;
6207
6208 indx = ELF32_R_SYM (irel->r_info) - symtab_hdr->sh_info;
5446cbdf 6209 tsec = bfd_und_section_ptr;
0e1862bb 6210 toff = bfd_link_relocatable (link_info) ? indx : 0;
5446cbdf
AM
6211 }
6212 else
6213 continue;
6214
9f7552cf
AM
6215 /* If this branch is to __tls_get_addr then we may later
6216 optimise away the call. We won't be needing a long-
6217 branch stub in that case. */
0e1862bb 6218 if (bfd_link_executable (link_info)
9f7552cf
AM
6219 && h == htab->tls_get_addr
6220 && irel != internal_relocs)
6221 {
6222 unsigned long t_symndx = ELF32_R_SYM (irel[-1].r_info);
6223 unsigned long t_rtype = ELF32_R_TYPE (irel[-1].r_info);
6224 unsigned int tls_mask = 0;
6225
6226 /* The previous reloc should be one of R_PPC_TLSGD or
6227 R_PPC_TLSLD, or for older object files, a reloc
6228 on the __tls_get_addr arg setup insn. Get tls
6229 mask bits from the symbol on that reloc. */
6230 if (t_symndx < symtab_hdr->sh_info)
6231 {
6232 bfd_vma *local_got_offsets = elf_local_got_offsets (abfd);
6233
6234 if (local_got_offsets != NULL)
6235 {
6236 struct plt_entry **local_plt = (struct plt_entry **)
6237 (local_got_offsets + symtab_hdr->sh_info);
6238 char *lgot_masks = (char *)
6239 (local_plt + symtab_hdr->sh_info);
6240 tls_mask = lgot_masks[t_symndx];
6241 }
6242 }
6243 else
6244 {
6245 struct elf_link_hash_entry *th
6246 = elf_sym_hashes (abfd)[t_symndx - symtab_hdr->sh_info];
6247
6248 while (th->root.type == bfd_link_hash_indirect
6249 || th->root.type == bfd_link_hash_warning)
6250 th = (struct elf_link_hash_entry *) th->root.u.i.link;
6251
6252 tls_mask
6253 = ((struct ppc_elf_link_hash_entry *) th)->tls_mask;
6254 }
6255
6256 /* The mask bits tell us if the call will be
6257 optimised away. */
6258 if ((tls_mask & TLS_TLS) != 0 && (tls_mask & TLS_GD) == 0
6259 && (t_rtype == R_PPC_TLSGD
6260 || t_rtype == R_PPC_GOT_TLSGD16
6261 || t_rtype == R_PPC_GOT_TLSGD16_LO))
6262 continue;
6263 if ((tls_mask & TLS_TLS) != 0 && (tls_mask & TLS_LD) == 0
6264 && (t_rtype == R_PPC_TLSLD
6265 || t_rtype == R_PPC_GOT_TLSLD16
6266 || t_rtype == R_PPC_GOT_TLSLD16_LO))
6267 continue;
6268 }
6269
5446cbdf
AM
6270 sym_type = h->type;
6271 }
7619e7c7 6272
d3e454b9
AM
6273 if (r_type == R_PPC_ADDR16_HA)
6274 {
6275 if (h != NULL
6276 && !h->def_regular
6277 && h->protected_def
6278 && ppc_elf_hash_entry (h)->has_addr16_ha
6279 && ppc_elf_hash_entry (h)->has_addr16_lo)
6280 picfixup_size += 12;
6281 continue;
6282 }
6283
5446cbdf
AM
6284 /* The condition here under which we call find_plt_ent must
6285 match that in relocate_section. If we call find_plt_ent here
6286 but not in relocate_section, or vice versa, then the branch
6287 destination used here may be incorrect. */
6288 plist = NULL;
6289 if (h != NULL)
25dbc73a 6290 {
5446cbdf
AM
6291 /* We know is_branch_reloc (r_type) is true. */
6292 if (h->type == STT_GNU_IFUNC
6293 || r_type == R_PPC_PLTREL24)
6294 plist = &h->plt.plist;
25dbc73a 6295 }
5446cbdf
AM
6296 else if (sym_type == STT_GNU_IFUNC
6297 && elf_local_got_offsets (abfd) != NULL)
c8a1f254 6298 {
5446cbdf
AM
6299 bfd_vma *local_got_offsets = elf_local_got_offsets (abfd);
6300 struct plt_entry **local_plt = (struct plt_entry **)
6301 (local_got_offsets + symtab_hdr->sh_info);
6302 plist = local_plt + ELF32_R_SYM (irel->r_info);
c8a1f254 6303 }
5446cbdf 6304 if (plist != NULL)
a9585d22 6305 {
5446cbdf
AM
6306 bfd_vma addend = 0;
6307 struct plt_entry *ent;
6308
0e1862bb 6309 if (r_type == R_PPC_PLTREL24 && bfd_link_pic (link_info))
5446cbdf
AM
6310 addend = irel->r_addend;
6311 ent = find_plt_ent (plist, got2, addend);
6312 if (ent != NULL)
a9585d22 6313 {
5446cbdf
AM
6314 if (htab->plt_type == PLT_NEW
6315 || h == NULL
6316 || !htab->elf.dynamic_sections_created
6317 || h->dynindx == -1)
6318 {
6319 tsec = htab->glink;
6320 toff = ent->glink_offset;
6321 }
6322 else
6323 {
ce558b89 6324 tsec = htab->elf.splt;
5446cbdf
AM
6325 toff = ent->plt.offset;
6326 }
de972ffa
AM
6327 }
6328 }
de972ffa 6329
5446cbdf
AM
6330 /* If the branch and target are in the same section, you have
6331 no hope of adding stubs. We'll error out later should the
6332 branch overflow. */
6333 if (tsec == isec)
6334 continue;
25dbc73a 6335
49199304
AM
6336 /* toff is used for the symbol index when the symbol is
6337 undefined and we're doing a relocatable link, so we can't
6338 support addends. It would be possible to do so by
6339 putting the addend in one_branch_fixup but addends on
6340 branches are rare so it hardly seems worth supporting. */
6341 if (bfd_link_relocatable (link_info)
6342 && tsec == bfd_und_section_ptr
6343 && r_type != R_PPC_PLTREL24
6344 && irel->r_addend != 0)
6345 continue;
6346
5446cbdf
AM
6347 /* There probably isn't any reason to handle symbols in
6348 SEC_MERGE sections; SEC_MERGE doesn't seem a likely
6349 attribute for a code section, and we are only looking at
6350 branches. However, implement it correctly here as a
6351 reference for other target relax_section functions. */
6352 if (0 && tsec->sec_info_type == SEC_INFO_TYPE_MERGE)
6353 {
6354 /* At this stage in linking, no SEC_MERGE symbol has been
6355 adjusted, so all references to such symbols need to be
6356 passed through _bfd_merged_section_offset. (Later, in
6357 relocate_section, all SEC_MERGE symbols *except* for
6358 section symbols have been adjusted.)
6359
6360 gas may reduce relocations against symbols in SEC_MERGE
6361 sections to a relocation against the section symbol when
6362 the original addend was zero. When the reloc is against
6363 a section symbol we should include the addend in the
6364 offset passed to _bfd_merged_section_offset, since the
6365 location of interest is the original symbol. On the
6366 other hand, an access to "sym+addend" where "sym" is not
6367 a section symbol should not include the addend; Such an
6368 access is presumed to be an offset from "sym"; The
6369 location of interest is just "sym". */
49199304
AM
6370 if (sym_type == STT_SECTION
6371 && r_type != R_PPC_PLTREL24)
5446cbdf
AM
6372 toff += irel->r_addend;
6373
6374 toff
6375 = _bfd_merged_section_offset (abfd, &tsec,
6376 elf_section_data (tsec)->sec_info,
6377 toff);
6378
49199304
AM
6379 if (sym_type != STT_SECTION
6380 && r_type != R_PPC_PLTREL24)
5446cbdf
AM
6381 toff += irel->r_addend;
6382 }
6383 /* PLTREL24 addends are special. */
6384 else if (r_type != R_PPC_PLTREL24)
25dbc73a 6385 toff += irel->r_addend;
7619e7c7 6386
5446cbdf 6387 /* Attempted -shared link of non-pic code loses. */
0e1862bb 6388 if ((!bfd_link_relocatable (link_info)
5446cbdf
AM
6389 && tsec == bfd_und_section_ptr)
6390 || tsec->output_section == NULL
6391 || (tsec->owner != NULL
6392 && (tsec->owner->flags & BFD_PLUGIN) != 0))
6393 continue;
7619e7c7 6394
5446cbdf 6395 roff = irel->r_offset;
7de713b9 6396
49199304
AM
6397 /* Avoid creating a lot of unnecessary fixups when
6398 relocatable if the output section size is such that a
6399 fixup can be created at final link.
6400 The max_branch_offset adjustment allows for some number
6401 of other fixups being needed at final link. */
6402 if (bfd_link_relocatable (link_info)
6403 && (isec->output_section->rawsize - (isec->output_offset + roff)
6404 < max_branch_offset - (max_branch_offset >> 4)))
6405 continue;
6406
5446cbdf
AM
6407 /* If the branch is in range, no need to do anything. */
6408 if (tsec != bfd_und_section_ptr
0e1862bb 6409 && (!bfd_link_relocatable (link_info)
5446cbdf
AM
6410 /* A relocatable link may have sections moved during
6411 final link, so do not presume they remain in range. */
6412 || tsec->output_section == isec->output_section))
6413 {
6414 bfd_vma symaddr, reladdr;
7619e7c7 6415
5446cbdf
AM
6416 symaddr = tsec->output_section->vma + tsec->output_offset + toff;
6417 reladdr = isec->output_section->vma + isec->output_offset + roff;
6418 if (symaddr - reladdr + max_branch_offset
6419 < 2 * max_branch_offset)
6420 continue;
6421 }
01017ef8 6422
5446cbdf 6423 /* Look for an existing fixup to this address. */
d3e454b9 6424 for (f = branch_fixups; f ; f = f->next)
5446cbdf
AM
6425 if (f->tsec == tsec && f->toff == toff)
6426 break;
252b5132 6427
5446cbdf
AM
6428 if (f == NULL)
6429 {
6430 size_t size;
6431 unsigned long stub_rtype;
25dbc73a 6432
5446cbdf
AM
6433 val = trampoff - roff;
6434 if (val >= max_branch_offset)
6435 /* Oh dear, we can't reach a trampoline. Don't try to add
6436 one. We'll report an error later. */
6437 continue;
252b5132 6438
0e1862bb 6439 if (bfd_link_pic (link_info))
5446cbdf
AM
6440 {
6441 size = 4 * ARRAY_SIZE (shared_stub_entry);
6442 insn_offset = 12;
6443 }
6444 else
6445 {
6446 size = 4 * ARRAY_SIZE (stub_entry);
6447 insn_offset = 0;
6448 }
6449 stub_rtype = R_PPC_RELAX;
ce558b89 6450 if (tsec == htab->elf.splt
5446cbdf
AM
6451 || tsec == htab->glink)
6452 {
6453 stub_rtype = R_PPC_RELAX_PLT;
6454 if (r_type == R_PPC_PLTREL24)
6455 stub_rtype = R_PPC_RELAX_PLTREL24;
6456 }
252b5132 6457
5446cbdf
AM
6458 /* Hijack the old relocation. Since we need two
6459 relocations for this use a "composite" reloc. */
6460 irel->r_info = ELF32_R_INFO (ELF32_R_SYM (irel->r_info),
6461 stub_rtype);
6462 irel->r_offset = trampoff + insn_offset;
6463 if (r_type == R_PPC_PLTREL24
6464 && stub_rtype != R_PPC_RELAX_PLTREL24)
6465 irel->r_addend = 0;
6466
6467 /* Record the fixup so we don't do it again this section. */
6468 f = bfd_malloc (sizeof (*f));
d3e454b9 6469 f->next = branch_fixups;
5446cbdf
AM
6470 f->tsec = tsec;
6471 f->toff = toff;
6472 f->trampoff = trampoff;
d3e454b9 6473 branch_fixups = f;
5446cbdf
AM
6474
6475 trampoff += size;
6476 changes++;
25dbc73a
AM
6477 }
6478 else
6479 {
5446cbdf
AM
6480 val = f->trampoff - roff;
6481 if (val >= max_branch_offset)
6482 continue;
252b5132 6483
5446cbdf
AM
6484 /* Nop out the reloc, since we're finalizing things here. */
6485 irel->r_info = ELF32_R_INFO (0, R_PPC_NONE);
6486 }
252b5132 6487
5446cbdf
AM
6488 /* Get the section contents. */
6489 if (contents == NULL)
25dbc73a 6490 {
5446cbdf
AM
6491 /* Get cached copy if it exists. */
6492 if (elf_section_data (isec)->this_hdr.contents != NULL)
6493 contents = elf_section_data (isec)->this_hdr.contents;
25dbc73a 6494 /* Go get them off disk. */
5446cbdf 6495 else if (!bfd_malloc_and_get_section (abfd, isec, &contents))
25dbc73a
AM
6496 goto error_return;
6497 }
252b5132 6498
5446cbdf
AM
6499 /* Fix up the existing branch to hit the trampoline. */
6500 hit_addr = contents + roff;
6501 switch (r_type)
6502 {
6503 case R_PPC_REL24:
6504 case R_PPC_LOCAL24PC:
6505 case R_PPC_PLTREL24:
6506 t0 = bfd_get_32 (abfd, hit_addr);
6507 t0 &= ~0x3fffffc;
6508 t0 |= val & 0x3fffffc;
6509 bfd_put_32 (abfd, t0, hit_addr);
6510 break;
252b5132 6511
5446cbdf
AM
6512 case R_PPC_REL14:
6513 case R_PPC_REL14_BRTAKEN:
6514 case R_PPC_REL14_BRNTAKEN:
6515 t0 = bfd_get_32 (abfd, hit_addr);
6516 t0 &= ~0xfffc;
6517 t0 |= val & 0xfffc;
6518 bfd_put_32 (abfd, t0, hit_addr);
6519 break;
6520 }
25dbc73a 6521 }
252b5132 6522
d3e454b9 6523 while (branch_fixups != NULL)
25dbc73a 6524 {
d3e454b9
AM
6525 struct one_branch_fixup *f = branch_fixups;
6526 branch_fixups = branch_fixups->next;
25dbc73a
AM
6527 free (f);
6528 }
5446cbdf 6529 }
252b5132 6530
0a1b45a2 6531 workaround_change = false;
5446cbdf 6532 newsize = trampoff;
795bc6b3 6533 if (htab->params->ppc476_workaround
0e1862bb 6534 && (!bfd_link_relocatable (link_info)
795bc6b3 6535 || isec->output_section->alignment_power >= htab->params->pagesize_p2))
5446cbdf
AM
6536 {
6537 bfd_vma addr, end_addr;
6538 unsigned int crossings;
795bc6b3 6539 bfd_vma pagesize = (bfd_vma) 1 << htab->params->pagesize_p2;
5446cbdf
AM
6540
6541 addr = isec->output_section->vma + isec->output_offset;
6128f9cf 6542 end_addr = addr + trampoff;
5446cbdf 6543 addr &= -pagesize;
795bc6b3 6544 crossings = ((end_addr & -pagesize) - addr) >> htab->params->pagesize_p2;
5446cbdf
AM
6545 if (crossings != 0)
6546 {
6547 /* Keep space aligned, to ensure the patch code itself does
6548 not cross a page. Don't decrease size calculated on a
6549 previous pass as otherwise we might never settle on a layout. */
1e269e9b 6550 newsize = 15 - ((end_addr - 1) & 15);
5446cbdf
AM
6551 newsize += crossings * 16;
6552 if (relax_info->workaround_size < newsize)
6553 {
6554 relax_info->workaround_size = newsize;
0a1b45a2 6555 workaround_change = true;
5446cbdf
AM
6556 }
6557 /* Ensure relocate_section is called. */
6558 isec->flags |= SEC_RELOC;
6559 }
6560 newsize = trampoff + relax_info->workaround_size;
6561 }
6562
d3e454b9
AM
6563 if (htab->params->pic_fixup > 0)
6564 {
6565 picfixup_size -= relax_info->picfixup_size;
6566 if (picfixup_size != 0)
6567 relax_info->picfixup_size += picfixup_size;
6568 newsize += relax_info->picfixup_size;
6569 }
6570
6571 if (changes != 0 || picfixup_size != 0 || workaround_change)
5446cbdf
AM
6572 isec->size = newsize;
6573
25dbc73a
AM
6574 if (isymbuf != NULL
6575 && symtab_hdr->contents != (unsigned char *) isymbuf)
252b5132 6576 {
25dbc73a
AM
6577 if (! link_info->keep_memory)
6578 free (isymbuf);
252b5132 6579 else
25dbc73a
AM
6580 {
6581 /* Cache the symbols for elf_link_input_bfd. */
6582 symtab_hdr->contents = (unsigned char *) isymbuf;
6583 }
252b5132
RH
6584 }
6585
25dbc73a
AM
6586 if (contents != NULL
6587 && elf_section_data (isec)->this_hdr.contents != contents)
6588 {
53291d1f 6589 if (!changes && !link_info->keep_memory)
25dbc73a
AM
6590 free (contents);
6591 else
6592 {
6593 /* Cache the section contents for elf_link_input_bfd. */
6594 elf_section_data (isec)->this_hdr.contents = contents;
6595 }
6596 }
252b5132 6597
d3e454b9 6598 changes += picfixup_size;
9bc4e62b 6599 if (changes != 0)
25dbc73a 6600 {
9bc4e62b
NS
6601 /* Append sufficient NOP relocs so we can write out relocation
6602 information for the trampolines. */
d4730f92 6603 Elf_Internal_Shdr *rel_hdr;
9bc4e62b
NS
6604 Elf_Internal_Rela *new_relocs = bfd_malloc ((changes + isec->reloc_count)
6605 * sizeof (*new_relocs));
6606 unsigned ix;
5b914448 6607
9bc4e62b
NS
6608 if (!new_relocs)
6609 goto error_return;
6610 memcpy (new_relocs, internal_relocs,
6611 isec->reloc_count * sizeof (*new_relocs));
6612 for (ix = changes; ix--;)
6613 {
6614 irel = new_relocs + ix + isec->reloc_count;
6615
6616 irel->r_info = ELF32_R_INFO (0, R_PPC_NONE);
6617 }
6618 if (internal_relocs != elf_section_data (isec)->relocs)
25dbc73a 6619 free (internal_relocs);
9bc4e62b
NS
6620 elf_section_data (isec)->relocs = new_relocs;
6621 isec->reloc_count += changes;
d4730f92
BS
6622 rel_hdr = _bfd_elf_single_rel_hdr (isec);
6623 rel_hdr->sh_size += changes * rel_hdr->sh_entsize;
25dbc73a 6624 }
c9594989 6625 else if (elf_section_data (isec)->relocs != internal_relocs)
9bc4e62b 6626 free (internal_relocs);
252b5132 6627
5446cbdf 6628 *again = changes != 0 || workaround_change;
0a1b45a2 6629 return true;
25dbc73a
AM
6630
6631 error_return:
d3e454b9 6632 while (branch_fixups != NULL)
5446cbdf 6633 {
d3e454b9
AM
6634 struct one_branch_fixup *f = branch_fixups;
6635 branch_fixups = branch_fixups->next;
5446cbdf
AM
6636 free (f);
6637 }
c9594989 6638 if ((unsigned char *) isymbuf != symtab_hdr->contents)
25dbc73a 6639 free (isymbuf);
c9594989 6640 if (elf_section_data (isec)->this_hdr.contents != contents)
25dbc73a 6641 free (contents);
c9594989 6642 if (elf_section_data (isec)->relocs != internal_relocs)
25dbc73a 6643 free (internal_relocs);
0a1b45a2 6644 return false;
252b5132 6645}
252b5132 6646\f
8a696751
AM
6647/* What to do when ld finds relocations against symbols defined in
6648 discarded sections. */
6649
6650static unsigned int
6651ppc_elf_action_discarded (asection *sec)
6652{
6653 if (strcmp (".fixup", sec->name) == 0)
6654 return 0;
6655
6656 if (strcmp (".got2", sec->name) == 0)
6657 return 0;
6658
6659 return _bfd_elf_default_action_discarded (sec);
6660}
c9a2f333 6661\f
25dbc73a 6662/* Fill in the address for a pointer generated in a linker section. */
252b5132 6663
25dbc73a 6664static bfd_vma
76750a2f 6665elf_finish_pointer_linker_section (bfd *input_bfd,
25dbc73a
AM
6666 elf_linker_section_t *lsect,
6667 struct elf_link_hash_entry *h,
6668 bfd_vma relocation,
2bb04cf2 6669 const Elf_Internal_Rela *rel)
25dbc73a
AM
6670{
6671 elf_linker_section_pointers_t *linker_section_ptr;
252b5132 6672
25dbc73a 6673 BFD_ASSERT (lsect != NULL);
252b5132 6674
25dbc73a 6675 if (h != NULL)
252b5132 6676 {
25dbc73a
AM
6677 /* Handle global symbol. */
6678 struct ppc_elf_link_hash_entry *eh;
252b5132 6679
25dbc73a 6680 eh = (struct ppc_elf_link_hash_entry *) h;
76750a2f
AM
6681 BFD_ASSERT (eh->elf.def_regular);
6682 linker_section_ptr = eh->linker_section_pointer;
25dbc73a
AM
6683 }
6684 else
6685 {
6686 /* Handle local symbol. */
6687 unsigned long r_symndx = ELF32_R_SYM (rel->r_info);
76750a2f 6688
0c8d6e5c 6689 BFD_ASSERT (is_ppc_elf (input_bfd));
25dbc73a 6690 BFD_ASSERT (elf_local_ptr_offsets (input_bfd) != NULL);
76750a2f
AM
6691 linker_section_ptr = elf_local_ptr_offsets (input_bfd)[r_symndx];
6692 }
252b5132 6693
76750a2f
AM
6694 linker_section_ptr = elf_find_pointer_linker_section (linker_section_ptr,
6695 rel->r_addend,
6696 lsect);
6697 BFD_ASSERT (linker_section_ptr != NULL);
25dbc73a 6698
76750a2f
AM
6699 /* Offset will always be a multiple of four, so use the bottom bit
6700 as a "written" flag. */
6701 if ((linker_section_ptr->offset & 1) == 0)
6702 {
6703 bfd_put_32 (lsect->section->owner,
6704 relocation + linker_section_ptr->addend,
6705 lsect->section->contents + linker_section_ptr->offset);
6706 linker_section_ptr->offset += 1;
252b5132
RH
6707 }
6708
bd6c6e2b
AM
6709 relocation = (lsect->section->output_section->vma
6710 + lsect->section->output_offset
76750a2f 6711 + linker_section_ptr->offset - 1
bd6c6e2b 6712 - SYM_VAL (lsect->sym));
252b5132 6713
25dbc73a
AM
6714#ifdef DEBUG
6715 fprintf (stderr,
6716 "Finish pointer in linker section %s, offset = %ld (0x%lx)\n",
6717 lsect->name, (long) relocation, (long) relocation);
6718#endif
252b5132 6719
bd6c6e2b 6720 return relocation;
252b5132 6721}
25dbc73a 6722
e054468f
AM
6723#define PPC_LO(v) ((v) & 0xffff)
6724#define PPC_HI(v) (((v) >> 16) & 0xffff)
6725#define PPC_HA(v) PPC_HI ((v) + 0x8000)
6726
6727static void
9e390558
AM
6728write_glink_stub (struct elf_link_hash_entry *h, struct plt_entry *ent,
6729 asection *plt_sec, unsigned char *p,
e054468f
AM
6730 struct bfd_link_info *info)
6731{
6732 struct ppc_elf_link_hash_table *htab = ppc_elf_hash_table (info);
6733 bfd *output_bfd = info->output_bfd;
6734 bfd_vma plt;
9e390558
AM
6735 unsigned char *end = p + GLINK_ENTRY_SIZE (htab, h);
6736
6737 if (h != NULL
6738 && h == htab->tls_get_addr
6739 && !htab->params->no_tls_get_addr_opt)
6740 {
6741 bfd_put_32 (output_bfd, LWZ_11_3, p);
6742 p += 4;
6743 bfd_put_32 (output_bfd, LWZ_12_3 + 4, p);
6744 p += 4;
6745 bfd_put_32 (output_bfd, MR_0_3, p);
6746 p += 4;
6747 bfd_put_32 (output_bfd, CMPWI_11_0, p);
6748 p += 4;
6749 bfd_put_32 (output_bfd, ADD_3_12_2, p);
6750 p += 4;
6751 bfd_put_32 (output_bfd, BEQLR, p);
6752 p += 4;
6753 bfd_put_32 (output_bfd, MR_3_0, p);
6754 p += 4;
6755 bfd_put_32 (output_bfd, NOP, p);
6756 p += 4;
6757 }
e054468f
AM
6758
6759 plt = ((ent->plt.offset & ~1)
6760 + plt_sec->output_section->vma
6761 + plt_sec->output_offset);
e054468f 6762
0e1862bb 6763 if (bfd_link_pic (info))
e054468f
AM
6764 {
6765 bfd_vma got = 0;
6766
6767 if (ent->addend >= 32768)
6768 got = (ent->addend
6769 + ent->sec->output_section->vma
6770 + ent->sec->output_offset);
6771 else if (htab->elf.hgot != NULL)
6772 got = SYM_VAL (htab->elf.hgot);
6773
6774 plt -= got;
6775
6776 if (plt + 0x8000 < 0x10000)
9e390558 6777 bfd_put_32 (output_bfd, LWZ_11_30 + PPC_LO (plt), p);
e054468f
AM
6778 else
6779 {
6780 bfd_put_32 (output_bfd, ADDIS_11_30 + PPC_HA (plt), p);
6781 p += 4;
6782 bfd_put_32 (output_bfd, LWZ_11_11 + PPC_LO (plt), p);
e054468f
AM
6783 }
6784 }
6785 else
6786 {
6787 bfd_put_32 (output_bfd, LIS_11 + PPC_HA (plt), p);
6788 p += 4;
6789 bfd_put_32 (output_bfd, LWZ_11_11 + PPC_LO (plt), p);
9e390558
AM
6790 }
6791 p += 4;
6792 bfd_put_32 (output_bfd, MTCTR_11, p);
6793 p += 4;
407aa07c
AM
6794 bfd_put_32 (output_bfd, BCTR, p);
6795 p += 4;
9e390558
AM
6796 while (p < end)
6797 {
6798 bfd_put_32 (output_bfd, htab->params->ppc476_workaround ? BA : NOP, p);
e054468f
AM
6799 p += 4;
6800 }
6801}
6802
bd6c6e2b
AM
6803/* Return true if symbol is defined statically. */
6804
0a1b45a2 6805static bool
bd6c6e2b
AM
6806is_static_defined (struct elf_link_hash_entry *h)
6807{
6808 return ((h->root.type == bfd_link_hash_defined
6809 || h->root.type == bfd_link_hash_defweak)
6810 && h->root.u.def.section != NULL
6811 && h->root.u.def.section->output_section != NULL);
6812}
6813
2d0f3896
AM
6814/* If INSN is an opcode that may be used with an @tls operand, return
6815 the transformed insn for TLS optimisation, otherwise return 0. If
6816 REG is non-zero only match an insn with RB or RA equal to REG. */
6817
6818unsigned int
6819_bfd_elf_ppc_at_tls_transform (unsigned int insn, unsigned int reg)
6820{
6821 unsigned int rtra;
6822
2365f8d7 6823 if ((insn & (0x3fu << 26)) != 31 << 26)
2d0f3896
AM
6824 return 0;
6825
6826 if (reg == 0 || ((insn >> 11) & 0x1f) == reg)
6827 rtra = insn & ((1 << 26) - (1 << 16));
6828 else if (((insn >> 16) & 0x1f) == reg)
6829 rtra = (insn & (0x1f << 21)) | ((insn & (0x1f << 11)) << 5);
6830 else
6831 return 0;
6832
6833 if ((insn & (0x3ff << 1)) == 266 << 1)
6834 /* add -> addi. */
6835 insn = 14 << 26;
6836 else if ((insn & (0x1f << 1)) == 23 << 1
6837 && ((insn & (0x1f << 6)) < 14 << 6
6838 || ((insn & (0x1f << 6)) >= 16 << 6
6839 && (insn & (0x1f << 6)) < 24 << 6)))
6840 /* load and store indexed -> dform. */
2365f8d7 6841 insn = (32u | ((insn >> 6) & 0x1f)) << 26;
2d0f3896
AM
6842 else if ((insn & (((0x1a << 5) | 0x1f) << 1)) == 21 << 1)
6843 /* ldx, ldux, stdx, stdux -> ld, ldu, std, stdu. */
2365f8d7 6844 insn = ((58u | ((insn >> 6) & 4)) << 26) | ((insn >> 6) & 1);
2d0f3896
AM
6845 else if ((insn & (((0x1f << 5) | 0x1f) << 1)) == 341 << 1)
6846 /* lwax -> lwa. */
2365f8d7 6847 insn = (58u << 26) | 2;
2d0f3896
AM
6848 else
6849 return 0;
6850 insn |= rtra;
6851 return insn;
6852}
6853
766bc656
AM
6854/* If INSN is an opcode that may be used with an @tprel operand, return
6855 the transformed insn for an undefined weak symbol, ie. with the
6856 thread pointer REG operand removed. Otherwise return 0. */
6857
6858unsigned int
6859_bfd_elf_ppc_at_tprel_transform (unsigned int insn, unsigned int reg)
6860{
6861 if ((insn & (0x1f << 16)) == reg << 16
2365f8d7
AM
6862 && ((insn & (0x3fu << 26)) == 14u << 26 /* addi */
6863 || (insn & (0x3fu << 26)) == 15u << 26 /* addis */
6864 || (insn & (0x3fu << 26)) == 32u << 26 /* lwz */
6865 || (insn & (0x3fu << 26)) == 34u << 26 /* lbz */
6866 || (insn & (0x3fu << 26)) == 36u << 26 /* stw */
6867 || (insn & (0x3fu << 26)) == 38u << 26 /* stb */
6868 || (insn & (0x3fu << 26)) == 40u << 26 /* lhz */
6869 || (insn & (0x3fu << 26)) == 42u << 26 /* lha */
6870 || (insn & (0x3fu << 26)) == 44u << 26 /* sth */
6871 || (insn & (0x3fu << 26)) == 46u << 26 /* lmw */
6872 || (insn & (0x3fu << 26)) == 47u << 26 /* stmw */
6873 || (insn & (0x3fu << 26)) == 48u << 26 /* lfs */
6874 || (insn & (0x3fu << 26)) == 50u << 26 /* lfd */
6875 || (insn & (0x3fu << 26)) == 52u << 26 /* stfs */
6876 || (insn & (0x3fu << 26)) == 54u << 26 /* stfd */
6877 || ((insn & (0x3fu << 26)) == 58u << 26 /* lwa,ld,lmd */
766bc656 6878 && (insn & 3) != 1)
2365f8d7 6879 || ((insn & (0x3fu << 26)) == 62u << 26 /* std, stmd */
766bc656
AM
6880 && ((insn & 3) == 0 || (insn & 3) == 3))))
6881 {
6882 insn &= ~(0x1f << 16);
6883 }
6884 else if ((insn & (0x1f << 21)) == reg << 21
2365f8d7
AM
6885 && ((insn & (0x3eu << 26)) == 24u << 26 /* ori, oris */
6886 || (insn & (0x3eu << 26)) == 26u << 26 /* xori,xoris */
6887 || (insn & (0x3eu << 26)) == 28u << 26 /* andi,andis */))
766bc656
AM
6888 {
6889 insn &= ~(0x1f << 21);
6890 insn |= (insn & (0x1f << 16)) << 5;
2365f8d7 6891 if ((insn & (0x3eu << 26)) == 26u << 26 /* xori,xoris */)
766bc656
AM
6892 insn -= 2 >> 26; /* convert to ori,oris */
6893 }
6894 else
6895 insn = 0;
6896 return insn;
6897}
6898
0a1b45a2 6899static bool
1fe532cf
AM
6900is_insn_ds_form (unsigned int insn)
6901{
2365f8d7
AM
6902 return ((insn & (0x3fu << 26)) == 58u << 26 /* ld,ldu,lwa */
6903 || (insn & (0x3fu << 26)) == 62u << 26 /* std,stdu,stq */
6904 || (insn & (0x3fu << 26)) == 57u << 26 /* lfdp */
6905 || (insn & (0x3fu << 26)) == 61u << 26 /* stfdp */);
1fe532cf
AM
6906}
6907
0a1b45a2 6908static bool
1fe532cf
AM
6909is_insn_dq_form (unsigned int insn)
6910{
2365f8d7
AM
6911 return ((insn & (0x3fu << 26)) == 56u << 26 /* lq */
6912 || ((insn & (0x3fu << 26)) == (61u << 26) /* lxv, stxv */
a680de9a 6913 && (insn & 3) == 1));
1fe532cf
AM
6914}
6915
252b5132
RH
6916/* The RELOCATE_SECTION function is called by the ELF backend linker
6917 to handle the relocations for a section.
6918
6919 The relocs are always passed as Rela structures; if the section
6920 actually uses Rel structures, the r_addend field will always be
6921 zero.
6922
6923 This function is responsible for adjust the section contents as
6924 necessary, and (if using Rela relocs and generating a
1049f94e 6925 relocatable output file) adjusting the reloc addend as
252b5132
RH
6926 necessary.
6927
6928 This function does not have to worry about setting the reloc
6929 address or the reloc symbol index.
6930
6931 LOCAL_SYMS is a pointer to the swapped in local symbols.
6932
6933 LOCAL_SECTIONS is an array giving the section in the input file
6934 corresponding to the st_shndx field of each local symbol.
6935
6936 The global hash table entry for the global symbols can be found
6937 via elf_sym_hashes (input_bfd).
6938
1049f94e 6939 When generating relocatable output, this function must handle
252b5132
RH
6940 STB_LOCAL/STT_SECTION symbols specially. The output symbol is
6941 going to be the section symbol corresponding to the output
6942 section, which means that the addend must be adjusted
6943 accordingly. */
6944
0f684201 6945static int
55fd94b0
AM
6946ppc_elf_relocate_section (bfd *output_bfd,
6947 struct bfd_link_info *info,
6948 bfd *input_bfd,
6949 asection *input_section,
6950 bfd_byte *contents,
6951 Elf_Internal_Rela *relocs,
6952 Elf_Internal_Sym *local_syms,
6953 asection **local_sections)
252b5132 6954{
7619e7c7
AM
6955 Elf_Internal_Shdr *symtab_hdr;
6956 struct elf_link_hash_entry **sym_hashes;
6957 struct ppc_elf_link_hash_table *htab;
6958 Elf_Internal_Rela *rel;
c316a17c 6959 Elf_Internal_Rela *wrel;
7619e7c7
AM
6960 Elf_Internal_Rela *relend;
6961 Elf_Internal_Rela outrel;
f95f8542 6962 asection *got2;
252b5132 6963 bfd_vma *local_got_offsets;
0a1b45a2 6964 bool ret = true;
95f0d0d2 6965 bfd_vma d_offset = (bfd_big_endian (input_bfd) ? 2 : 0);
0a1b45a2 6966 bool is_vxworks_tls;
d3e454b9
AM
6967 unsigned int picfixup_size = 0;
6968 struct ppc_elf_relax_info *relax_info = NULL;
b34976b6 6969
252b5132 6970#ifdef DEBUG
871b3ab2 6971 _bfd_error_handler ("ppc_elf_relocate_section called for %pB section %pA, "
d003868e
AM
6972 "%ld relocations%s",
6973 input_bfd, input_section,
6974 (long) input_section->reloc_count,
0e1862bb 6975 (bfd_link_relocatable (info)) ? " (relocatable)" : "");
252b5132
RH
6976#endif
6977
7af5d5c4
AM
6978 if (!is_ppc_elf (input_bfd))
6979 {
6980 bfd_set_error (bfd_error_wrong_format);
0a1b45a2 6981 return false;
7af5d5c4
AM
6982 }
6983
a6aa5195
AM
6984 got2 = bfd_get_section_by_name (input_bfd, ".got2");
6985
e47cd125 6986 /* Initialize howto table if not already done. */
8da6118f 6987 if (!ppc_elf_howto_table[R_PPC_ADDR32])
252b5132
RH
6988 ppc_elf_howto_init ();
6989
7619e7c7 6990 htab = ppc_elf_hash_table (info);
252b5132 6991 local_got_offsets = elf_local_got_offsets (input_bfd);
0ffa91dd 6992 symtab_hdr = &elf_symtab_hdr (input_bfd);
7619e7c7 6993 sym_hashes = elf_sym_hashes (input_bfd);
3348747a
NS
6994 /* We have to handle relocations in vxworks .tls_vars sections
6995 specially, because the dynamic loader is 'weird'. */
90c14f0c 6996 is_vxworks_tls = (htab->elf.target_os == is_vxworks && bfd_link_pic (info)
3348747a
NS
6997 && !strcmp (input_section->output_section->name,
6998 ".tls_vars"));
d3e454b9
AM
6999 if (input_section->sec_info_type == SEC_INFO_TYPE_TARGET)
7000 relax_info = elf_section_data (input_section)->sec_info;
c316a17c 7001 rel = wrel = relocs;
7619e7c7 7002 relend = relocs + input_section->reloc_count;
c316a17c 7003 for (; rel < relend; wrel++, rel++)
252b5132 7004 {
7619e7c7
AM
7005 enum elf_ppc_reloc_type r_type;
7006 bfd_vma addend;
7007 bfd_reloc_status_type r;
7008 Elf_Internal_Sym *sym;
7009 asection *sec;
7010 struct elf_link_hash_entry *h;
7011 const char *sym_name;
252b5132
RH
7012 reloc_howto_type *howto;
7013 unsigned long r_symndx;
7014 bfd_vma relocation;
91d6fa6a 7015 bfd_vma branch_bit, from;
0a1b45a2
AM
7016 bool unresolved_reloc, save_unresolved_reloc;
7017 bool warned;
7619e7c7 7018 unsigned int tls_type, tls_mask, tls_gd;
08be3224 7019 struct plt_entry **ifunc, **plt_list;
86c95733 7020 struct reloc_howto_struct alt_howto;
7619e7c7 7021
c316a17c 7022 again:
55fd94b0
AM
7023 r_type = ELF32_R_TYPE (rel->r_info);
7024 sym = NULL;
7025 sec = NULL;
7026 h = NULL;
0a1b45a2
AM
7027 unresolved_reloc = false;
7028 warned = false;
252b5132 7029 r_symndx = ELF32_R_SYM (rel->r_info);
560e09e9 7030
252b5132
RH
7031 if (r_symndx < symtab_hdr->sh_info)
7032 {
7033 sym = local_syms + r_symndx;
7034 sec = local_sections[r_symndx];
26c61ae5 7035 sym_name = bfd_elf_sym_name (input_bfd, symtab_hdr, sym, sec);
252b5132 7036
8517fae7 7037 relocation = _bfd_elf_rela_local_sym (output_bfd, sym, &sec, rel);
252b5132
RH
7038 }
7039 else
7040 {
0a1b45a2 7041 bool ignored;
62d887d4 7042
b2a8e766
AM
7043 RELOC_FOR_GLOBAL_SYMBOL (info, input_bfd, input_section, rel,
7044 r_symndx, symtab_hdr, sym_hashes,
7045 h, sec, relocation,
62d887d4 7046 unresolved_reloc, warned, ignored);
9abc968f 7047
252b5132 7048 sym_name = h->root.root.string;
7619e7c7
AM
7049 }
7050
dbaa2011 7051 if (sec != NULL && discarded_section (sec))
ab96bf03
AM
7052 {
7053 /* For relocs against symbols from removed linkonce sections,
7054 or sections discarded by a linker script, we just want the
7055 section contents zeroed. Avoid any special processing. */
7056 howto = NULL;
7057 if (r_type < R_PPC_max)
7058 howto = ppc_elf_howto_table[r_type];
c316a17c
AM
7059
7060 _bfd_clear_contents (howto, input_bfd, input_section,
0930cb30 7061 contents, rel->r_offset);
c316a17c
AM
7062 wrel->r_offset = rel->r_offset;
7063 wrel->r_info = 0;
7064 wrel->r_addend = 0;
7065
7066 /* For ld -r, remove relocations in debug sections against
dcd2b8a0 7067 symbols defined in discarded sections. Not done for
c316a17c
AM
7068 non-debug to preserve relocs in .eh_frame which the
7069 eh_frame editing code expects to be present. */
7070 if (bfd_link_relocatable (info)
7071 && (input_section->flags & SEC_DEBUGGING))
7072 wrel--;
7073
7074 continue;
ab96bf03
AM
7075 }
7076
0e1862bb 7077 if (bfd_link_relocatable (info))
ab96bf03
AM
7078 {
7079 if (got2 != NULL
7080 && r_type == R_PPC_PLTREL24
f75e0e33 7081 && rel->r_addend != 0)
ab96bf03
AM
7082 {
7083 /* R_PPC_PLTREL24 is rather special. If non-zero, the
7084 addend specifies the GOT pointer offset within .got2. */
7085 rel->r_addend += got2->output_offset;
7086 }
53291d1f
AM
7087 if (r_type != R_PPC_RELAX_PLT
7088 && r_type != R_PPC_RELAX_PLTREL24
7089 && r_type != R_PPC_RELAX)
c316a17c 7090 goto copy_reloc;
ab96bf03
AM
7091 }
7092
7619e7c7
AM
7093 /* TLS optimizations. Replace instruction sequences and relocs
7094 based on information we collected in tls_optimize. We edit
7095 RELOCS so that --emit-relocs will output something sensible
7096 for the final instruction stream. */
7097 tls_mask = 0;
7098 tls_gd = 0;
727fc41e
AM
7099 if (h != NULL)
7100 tls_mask = ((struct ppc_elf_link_hash_entry *) h)->tls_mask;
7101 else if (local_got_offsets != NULL)
7619e7c7 7102 {
e054468f 7103 struct plt_entry **local_plt;
727fc41e 7104 char *lgot_masks;
e054468f
AM
7105 local_plt
7106 = (struct plt_entry **) (local_got_offsets + symtab_hdr->sh_info);
7107 lgot_masks = (char *) (local_plt + symtab_hdr->sh_info);
727fc41e 7108 tls_mask = lgot_masks[r_symndx];
7619e7c7
AM
7109 }
7110
7111 /* Ensure reloc mapping code below stays sane. */
7112 if ((R_PPC_GOT_TLSLD16 & 3) != (R_PPC_GOT_TLSGD16 & 3)
7113 || (R_PPC_GOT_TLSLD16_LO & 3) != (R_PPC_GOT_TLSGD16_LO & 3)
7114 || (R_PPC_GOT_TLSLD16_HI & 3) != (R_PPC_GOT_TLSGD16_HI & 3)
7115 || (R_PPC_GOT_TLSLD16_HA & 3) != (R_PPC_GOT_TLSGD16_HA & 3)
7116 || (R_PPC_GOT_TLSLD16 & 3) != (R_PPC_GOT_TPREL16 & 3)
7117 || (R_PPC_GOT_TLSLD16_LO & 3) != (R_PPC_GOT_TPREL16_LO & 3)
7118 || (R_PPC_GOT_TLSLD16_HI & 3) != (R_PPC_GOT_TPREL16_HI & 3)
7119 || (R_PPC_GOT_TLSLD16_HA & 3) != (R_PPC_GOT_TPREL16_HA & 3))
7120 abort ();
7121 switch (r_type)
7122 {
7123 default:
7124 break;
7125
7126 case R_PPC_GOT_TPREL16:
7127 case R_PPC_GOT_TPREL16_LO:
e054468f 7128 if ((tls_mask & TLS_TLS) != 0
7619e7c7
AM
7129 && (tls_mask & TLS_TPREL) == 0)
7130 {
7131 bfd_vma insn;
91d6fa6a 7132
95f0d0d2 7133 insn = bfd_get_32 (input_bfd,
c316a17c 7134 contents + rel->r_offset - d_offset);
7619e7c7
AM
7135 insn &= 31 << 21;
7136 insn |= 0x3c020000; /* addis 0,2,0 */
95f0d0d2 7137 bfd_put_32 (input_bfd, insn,
c316a17c 7138 contents + rel->r_offset - d_offset);
7619e7c7
AM
7139 r_type = R_PPC_TPREL16_HA;
7140 rel->r_info = ELF32_R_INFO (r_symndx, r_type);
7141 }
7142 break;
7143
7144 case R_PPC_TLS:
e054468f 7145 if ((tls_mask & TLS_TLS) != 0
7619e7c7
AM
7146 && (tls_mask & TLS_TPREL) == 0)
7147 {
2d0f3896
AM
7148 bfd_vma insn;
7149
95f0d0d2 7150 insn = bfd_get_32 (input_bfd, contents + rel->r_offset);
2d0f3896
AM
7151 insn = _bfd_elf_ppc_at_tls_transform (insn, 2);
7152 if (insn == 0)
7619e7c7 7153 abort ();
95f0d0d2 7154 bfd_put_32 (input_bfd, insn, contents + rel->r_offset);
7619e7c7
AM
7155 r_type = R_PPC_TPREL16_LO;
7156 rel->r_info = ELF32_R_INFO (r_symndx, r_type);
4fe5ca5b 7157
7619e7c7 7158 /* Was PPC_TLS which sits on insn boundary, now
4fe5ca5b
GM
7159 PPC_TPREL16_LO which is at low-order half-word. */
7160 rel->r_offset += d_offset;
7619e7c7
AM
7161 }
7162 break;
7163
7164 case R_PPC_GOT_TLSGD16_HI:
7165 case R_PPC_GOT_TLSGD16_HA:
b00a0a86 7166 tls_gd = TLS_GDIE;
e054468f 7167 if ((tls_mask & TLS_TLS) != 0 && (tls_mask & TLS_GD) == 0)
7619e7c7
AM
7168 goto tls_gdld_hi;
7169 break;
7170
7171 case R_PPC_GOT_TLSLD16_HI:
7172 case R_PPC_GOT_TLSLD16_HA:
e054468f 7173 if ((tls_mask & TLS_TLS) != 0 && (tls_mask & TLS_LD) == 0)
7619e7c7
AM
7174 {
7175 tls_gdld_hi:
7176 if ((tls_mask & tls_gd) != 0)
7177 r_type = (((r_type - (R_PPC_GOT_TLSGD16 & 3)) & 3)
7178 + R_PPC_GOT_TPREL16);
7179 else
7180 {
4fe5ca5b 7181 rel->r_offset -= d_offset;
95f0d0d2 7182 bfd_put_32 (input_bfd, NOP, contents + rel->r_offset);
7619e7c7
AM
7183 r_type = R_PPC_NONE;
7184 }
7185 rel->r_info = ELF32_R_INFO (r_symndx, r_type);
7186 }
7187 break;
7188
7189 case R_PPC_GOT_TLSGD16:
7190 case R_PPC_GOT_TLSGD16_LO:
b00a0a86 7191 tls_gd = TLS_GDIE;
e054468f 7192 if ((tls_mask & TLS_TLS) != 0 && (tls_mask & TLS_GD) == 0)
b7fcf6f6 7193 goto tls_ldgd_opt;
7619e7c7
AM
7194 break;
7195
7196 case R_PPC_GOT_TLSLD16:
7197 case R_PPC_GOT_TLSLD16_LO:
e054468f 7198 if ((tls_mask & TLS_TLS) != 0 && (tls_mask & TLS_LD) == 0)
7619e7c7 7199 {
3a71aa26 7200 unsigned int insn1, insn2;
b7fcf6f6 7201 bfd_vma offset;
7619e7c7 7202
b7fcf6f6 7203 tls_ldgd_opt:
727fc41e
AM
7204 offset = (bfd_vma) -1;
7205 /* If not using the newer R_PPC_TLSGD/LD to mark
7206 __tls_get_addr calls, we must trust that the call
7207 stays with its arg setup insns, ie. that the next
7208 reloc is the __tls_get_addr call associated with
7209 the current reloc. Edit both insns. */
9737e8af 7210 if (input_section->nomark_tls_get_addr
727fc41e
AM
7211 && rel + 1 < relend
7212 && branch_reloc_hash_match (input_bfd, rel + 1,
7213 htab->tls_get_addr))
7214 offset = rel[1].r_offset;
b86ac8e3
AM
7215 /* We read the low GOT_TLS insn because we need to keep
7216 the destination reg. It may be something other than
7217 the usual r3, and moved to r3 before the call by
7218 intervening code. */
95f0d0d2 7219 insn1 = bfd_get_32 (input_bfd,
b86ac8e3 7220 contents + rel->r_offset - d_offset);
b7fcf6f6
AM
7221 if ((tls_mask & tls_gd) != 0)
7222 {
7223 /* IE */
b86ac8e3 7224 insn1 &= (0x1f << 21) | (0x1f << 16);
2365f8d7 7225 insn1 |= 32u << 26; /* lwz */
727fc41e
AM
7226 if (offset != (bfd_vma) -1)
7227 {
f58d5a2d 7228 rel[1].r_info = ELF32_R_INFO (STN_UNDEF, R_PPC_NONE);
727fc41e 7229 insn2 = 0x7c631214; /* add 3,3,2 */
95f0d0d2 7230 bfd_put_32 (input_bfd, insn2, contents + offset);
727fc41e 7231 }
b7fcf6f6
AM
7232 r_type = (((r_type - (R_PPC_GOT_TLSGD16 & 3)) & 3)
7233 + R_PPC_GOT_TPREL16);
7234 rel->r_info = ELF32_R_INFO (r_symndx, r_type);
7235 }
7236 else
7237 {
7238 /* LE */
b86ac8e3
AM
7239 insn1 &= 0x1f << 21;
7240 insn1 |= 0x3c020000; /* addis r,2,0 */
7619e7c7
AM
7241 if (tls_gd == 0)
7242 {
b7fcf6f6 7243 /* Was an LD reloc. */
1d483afe
AM
7244 for (r_symndx = 0;
7245 r_symndx < symtab_hdr->sh_info;
7246 r_symndx++)
7247 if (local_sections[r_symndx] == sec)
7248 break;
7249 if (r_symndx >= symtab_hdr->sh_info)
cf35638d 7250 r_symndx = STN_UNDEF;
b7fcf6f6 7251 rel->r_addend = htab->elf.tls_sec->vma + DTP_OFFSET;
cf35638d 7252 if (r_symndx != STN_UNDEF)
1d483afe
AM
7253 rel->r_addend -= (local_syms[r_symndx].st_value
7254 + sec->output_offset
7255 + sec->output_section->vma);
7619e7c7 7256 }
b7fcf6f6
AM
7257 r_type = R_PPC_TPREL16_HA;
7258 rel->r_info = ELF32_R_INFO (r_symndx, r_type);
727fc41e
AM
7259 if (offset != (bfd_vma) -1)
7260 {
7261 rel[1].r_info = ELF32_R_INFO (r_symndx, R_PPC_TPREL16_LO);
7262 rel[1].r_offset = offset + d_offset;
7263 rel[1].r_addend = rel->r_addend;
7264 insn2 = 0x38630000; /* addi 3,3,0 */
95f0d0d2 7265 bfd_put_32 (input_bfd, insn2, contents + offset);
727fc41e 7266 }
b7fcf6f6 7267 }
95f0d0d2 7268 bfd_put_32 (input_bfd, insn1,
b7fcf6f6 7269 contents + rel->r_offset - d_offset);
b7fcf6f6
AM
7270 if (tls_gd == 0)
7271 {
7272 /* We changed the symbol on an LD reloc. Start over
7273 in order to get h, sym, sec etc. right. */
c316a17c 7274 goto again;
7619e7c7 7275 }
252b5132 7276 }
7619e7c7 7277 break;
727fc41e
AM
7278
7279 case R_PPC_TLSGD:
675e2809
AM
7280 if ((tls_mask & TLS_TLS) != 0 && (tls_mask & TLS_GD) == 0
7281 && rel + 1 < relend)
727fc41e
AM
7282 {
7283 unsigned int insn2;
7284 bfd_vma offset = rel->r_offset;
7285
23cedd1d
AM
7286 if (is_plt_seq_reloc (ELF32_R_TYPE (rel[1].r_info)))
7287 {
7288 bfd_put_32 (input_bfd, NOP, contents + offset);
7289 rel[1].r_info = ELF32_R_INFO (STN_UNDEF, R_PPC_NONE);
7290 break;
7291 }
7292
b00a0a86 7293 if ((tls_mask & TLS_GDIE) != 0)
727fc41e
AM
7294 {
7295 /* IE */
7296 r_type = R_PPC_NONE;
7297 insn2 = 0x7c631214; /* add 3,3,2 */
7298 }
7299 else
7300 {
7301 /* LE */
7302 r_type = R_PPC_TPREL16_LO;
7303 rel->r_offset += d_offset;
7304 insn2 = 0x38630000; /* addi 3,3,0 */
7305 }
7306 rel->r_info = ELF32_R_INFO (r_symndx, r_type);
95f0d0d2 7307 bfd_put_32 (input_bfd, insn2, contents + offset);
727fc41e
AM
7308 /* Zap the reloc on the _tls_get_addr call too. */
7309 BFD_ASSERT (offset == rel[1].r_offset);
f58d5a2d 7310 rel[1].r_info = ELF32_R_INFO (STN_UNDEF, R_PPC_NONE);
727fc41e
AM
7311 }
7312 break;
7313
7314 case R_PPC_TLSLD:
675e2809
AM
7315 if ((tls_mask & TLS_TLS) != 0 && (tls_mask & TLS_LD) == 0
7316 && rel + 1 < relend)
727fc41e
AM
7317 {
7318 unsigned int insn2;
7319
23cedd1d
AM
7320 if (is_plt_seq_reloc (ELF32_R_TYPE (rel[1].r_info)))
7321 {
7322 bfd_put_32 (input_bfd, NOP, contents + rel->r_offset);
7323 rel[1].r_info = ELF32_R_INFO (STN_UNDEF, R_PPC_NONE);
7324 break;
7325 }
7326
727fc41e
AM
7327 for (r_symndx = 0;
7328 r_symndx < symtab_hdr->sh_info;
7329 r_symndx++)
7330 if (local_sections[r_symndx] == sec)
7331 break;
7332 if (r_symndx >= symtab_hdr->sh_info)
cf35638d 7333 r_symndx = STN_UNDEF;
727fc41e 7334 rel->r_addend = htab->elf.tls_sec->vma + DTP_OFFSET;
cf35638d 7335 if (r_symndx != STN_UNDEF)
727fc41e
AM
7336 rel->r_addend -= (local_syms[r_symndx].st_value
7337 + sec->output_offset
7338 + sec->output_section->vma);
7339
7340 rel->r_info = ELF32_R_INFO (r_symndx, R_PPC_TPREL16_LO);
7341 rel->r_offset += d_offset;
7342 insn2 = 0x38630000; /* addi 3,3,0 */
95f0d0d2 7343 bfd_put_32 (input_bfd, insn2,
727fc41e
AM
7344 contents + rel->r_offset - d_offset);
7345 /* Zap the reloc on the _tls_get_addr call too. */
7346 BFD_ASSERT (rel->r_offset - d_offset == rel[1].r_offset);
f58d5a2d 7347 rel[1].r_info = ELF32_R_INFO (STN_UNDEF, R_PPC_NONE);
c316a17c 7348 goto again;
727fc41e
AM
7349 }
7350 break;
7619e7c7
AM
7351 }
7352
7353 /* Handle other relocations that tweak non-addend part of insn. */
7354 branch_bit = 0;
7355 switch (r_type)
7356 {
7357 default:
7358 break;
7359
7360 /* Branch taken prediction relocations. */
7361 case R_PPC_ADDR14_BRTAKEN:
7362 case R_PPC_REL14_BRTAKEN:
7363 branch_bit = BRANCH_PREDICT_BIT;
1a0670f3 7364 /* Fall through. */
7619e7c7 7365
4cc11e76 7366 /* Branch not taken prediction relocations. */
7619e7c7
AM
7367 case R_PPC_ADDR14_BRNTAKEN:
7368 case R_PPC_REL14_BRNTAKEN:
91d6fa6a 7369 {
23cedd1d 7370 unsigned int insn;
7619e7c7 7371
95f0d0d2 7372 insn = bfd_get_32 (input_bfd, contents + rel->r_offset);
91d6fa6a
NC
7373 insn &= ~BRANCH_PREDICT_BIT;
7374 insn |= branch_bit;
7619e7c7 7375
91d6fa6a
NC
7376 from = (rel->r_offset
7377 + input_section->output_offset
7378 + input_section->output_section->vma);
7619e7c7 7379
91d6fa6a
NC
7380 /* Invert 'y' bit if not the default. */
7381 if ((bfd_signed_vma) (relocation + rel->r_addend - from) < 0)
7382 insn ^= BRANCH_PREDICT_BIT;
7383
95f0d0d2 7384 bfd_put_32 (input_bfd, insn, contents + rel->r_offset);
91d6fa6a 7385 }
08be3224
AM
7386 break;
7387
7388 case R_PPC_PLT16_HA:
7389 {
7390 unsigned int insn;
7391
7392 insn = bfd_get_32 (input_bfd,
7393 contents + rel->r_offset - d_offset);
2365f8d7 7394 if ((insn & (0x3fu << 26)) == 15u << 26
08be3224
AM
7395 && (insn & (0x1f << 16)) != 0)
7396 {
7397 if (!bfd_link_pic (info))
7398 {
7399 /* Convert addis to lis. */
7400 insn &= ~(0x1f << 16);
7401 bfd_put_32 (input_bfd, insn,
7402 contents + rel->r_offset - d_offset);
7403 }
7404 }
7405 else if (bfd_link_pic (info))
7406 info->callbacks->einfo
7407 (_("%P: %H: error: %s with unexpected instruction %x\n"),
7408 input_bfd, input_section, rel->r_offset,
7409 "R_PPC_PLT16_HA", insn);
7410 }
7411 break;
252b5132
RH
7412 }
7413
d3e454b9
AM
7414 if (ELIMINATE_COPY_RELOCS
7415 && h != NULL
7416 && !h->def_regular
7417 && h->protected_def
7418 && ppc_elf_hash_entry (h)->has_addr16_ha
7419 && ppc_elf_hash_entry (h)->has_addr16_lo
7420 && htab->params->pic_fixup > 0)
7421 {
7422 /* Convert lis;addi or lis;load/store accessing a protected
7423 variable defined in a shared library to PIC. */
7424 unsigned int insn;
7425
7426 if (r_type == R_PPC_ADDR16_HA)
7427 {
95f0d0d2 7428 insn = bfd_get_32 (input_bfd,
d3e454b9 7429 contents + rel->r_offset - d_offset);
2365f8d7 7430 if ((insn & (0x3fu << 26)) == (15u << 26)
d3e454b9
AM
7431 && (insn & (0x1f << 16)) == 0 /* lis */)
7432 {
7433 bfd_byte *p;
7434 bfd_vma off;
7435 bfd_vma got_addr;
7436
7437 p = (contents + input_section->size
7438 - relax_info->workaround_size
7439 - relax_info->picfixup_size
7440 + picfixup_size);
7441 off = (p - contents) - (rel->r_offset - d_offset);
7442 if (off > 0x1fffffc || (off & 3) != 0)
7443 info->callbacks->einfo
174d0a74 7444 (_("%H: fixup branch overflow\n"),
d3e454b9
AM
7445 input_bfd, input_section, rel->r_offset);
7446
95f0d0d2 7447 bfd_put_32 (input_bfd, B | off,
d3e454b9 7448 contents + rel->r_offset - d_offset);
ce558b89
AM
7449 got_addr = (htab->elf.sgot->output_section->vma
7450 + htab->elf.sgot->output_offset
d3e454b9 7451 + (h->got.offset & ~1));
c316a17c
AM
7452 wrel->r_offset = (p - contents) + d_offset;
7453 wrel->r_info = ELF32_R_INFO (0, R_PPC_ADDR16_HA);
7454 wrel->r_addend = got_addr;
d3e454b9 7455 insn &= ~0xffff;
4aef7643 7456 insn |= ((unsigned int) (got_addr + 0x8000) >> 16) & 0xffff;
95f0d0d2 7457 bfd_put_32 (input_bfd, insn, p);
d3e454b9
AM
7458
7459 /* Convert lis to lwz, loading address from GOT. */
7460 insn &= ~0xffff;
7461 insn ^= (32u ^ 15u) << 26;
7462 insn |= (insn & (0x1f << 21)) >> 5;
7463 insn |= got_addr & 0xffff;
95f0d0d2 7464 bfd_put_32 (input_bfd, insn, p + 4);
d3e454b9 7465
95f0d0d2 7466 bfd_put_32 (input_bfd, B | ((-4 - off) & 0x3ffffff), p + 8);
d3e454b9
AM
7467 picfixup_size += 12;
7468
7469 /* Use one of the spare relocs, so --emit-relocs
7470 output is reasonable. */
7471 memmove (rel + 1, rel, (relend - rel - 1) * sizeof (*rel));
c316a17c
AM
7472 wrel++, rel++;
7473 rel->r_offset = wrel[-1].r_offset + 4;
d3e454b9 7474 rel->r_info = ELF32_R_INFO (0, R_PPC_ADDR16_LO);
c316a17c 7475 rel->r_addend = wrel[-1].r_addend;
d3e454b9
AM
7476
7477 /* Continue on as if we had a got reloc, to output
7478 dynamic reloc. */
7479 r_type = R_PPC_GOT16_LO;
7480 }
7481 else
2c4d9cbe 7482 _bfd_error_handler
695344c0 7483 /* xgettext:c-format */
2dcf00ce
AM
7484 (_("%pB(%pA+%#" PRIx64 "): error: "
7485 "%s with unexpected instruction %#x"),
7486 input_bfd, input_section, (uint64_t) rel->r_offset,
d3e454b9
AM
7487 "R_PPC_ADDR16_HA", insn);
7488 }
7489 else if (r_type == R_PPC_ADDR16_LO)
7490 {
95f0d0d2 7491 insn = bfd_get_32 (input_bfd,
d3e454b9 7492 contents + rel->r_offset - d_offset);
2365f8d7
AM
7493 if ((insn & (0x3fu << 26)) == 14u << 26 /* addi */
7494 || (insn & (0x3fu << 26)) == 32u << 26 /* lwz */
7495 || (insn & (0x3fu << 26)) == 34u << 26 /* lbz */
7496 || (insn & (0x3fu << 26)) == 36u << 26 /* stw */
7497 || (insn & (0x3fu << 26)) == 38u << 26 /* stb */
7498 || (insn & (0x3fu << 26)) == 40u << 26 /* lhz */
7499 || (insn & (0x3fu << 26)) == 42u << 26 /* lha */
7500 || (insn & (0x3fu << 26)) == 44u << 26 /* sth */
7501 || (insn & (0x3fu << 26)) == 46u << 26 /* lmw */
7502 || (insn & (0x3fu << 26)) == 47u << 26 /* stmw */
7503 || (insn & (0x3fu << 26)) == 48u << 26 /* lfs */
7504 || (insn & (0x3fu << 26)) == 50u << 26 /* lfd */
7505 || (insn & (0x3fu << 26)) == 52u << 26 /* stfs */
7506 || (insn & (0x3fu << 26)) == 54u << 26 /* stfd */
7507 || ((insn & (0x3fu << 26)) == 58u << 26 /* lwa,ld,lmd */
d3e454b9 7508 && (insn & 3) != 1)
2365f8d7 7509 || ((insn & (0x3fu << 26)) == 62u << 26 /* std, stmd */
d3e454b9
AM
7510 && ((insn & 3) == 0 || (insn & 3) == 3)))
7511 {
7512 /* Arrange to apply the reloc addend, if any. */
7513 relocation = 0;
0a1b45a2 7514 unresolved_reloc = false;
d3e454b9
AM
7515 rel->r_info = ELF32_R_INFO (0, r_type);
7516 }
7517 else
2c4d9cbe 7518 _bfd_error_handler
695344c0 7519 /* xgettext:c-format */
2dcf00ce
AM
7520 (_("%pB(%pA+%#" PRIx64 "): error: "
7521 "%s with unexpected instruction %#x"),
7522 input_bfd, input_section, (uint64_t) rel->r_offset,
d3e454b9
AM
7523 "R_PPC_ADDR16_LO", insn);
7524 }
7525 }
7526
e054468f 7527 ifunc = NULL;
90c14f0c 7528 if (htab->elf.target_os != is_vxworks)
e054468f 7529 {
de972ffa
AM
7530 struct plt_entry *ent;
7531
e054468f
AM
7532 if (h != NULL)
7533 {
7534 if (h->type == STT_GNU_IFUNC)
7535 ifunc = &h->plt.plist;
7536 }
de972ffa
AM
7537 else if (local_got_offsets != NULL
7538 && ELF_ST_TYPE (sym->st_info) == STT_GNU_IFUNC)
e054468f 7539 {
de972ffa 7540 struct plt_entry **local_plt;
e054468f 7541
de972ffa
AM
7542 local_plt = (struct plt_entry **) (local_got_offsets
7543 + symtab_hdr->sh_info);
7544 ifunc = local_plt + r_symndx;
e054468f 7545 }
e054468f 7546
de972ffa
AM
7547 ent = NULL;
7548 if (ifunc != NULL
0e1862bb 7549 && (!bfd_link_pic (info)
08be3224
AM
7550 || is_branch_reloc (r_type)
7551 || r_type == R_PPC_PLT16_LO
7552 || r_type == R_PPC_PLT16_HI
7553 || r_type == R_PPC_PLT16_HA))
de972ffa
AM
7554 {
7555 addend = 0;
08be3224
AM
7556 if (bfd_link_pic (info)
7557 && (r_type == R_PPC_PLTREL24
7558 || r_type == R_PPC_PLT16_LO
7559 || r_type == R_PPC_PLT16_HI
7560 || r_type == R_PPC_PLT16_HA))
de972ffa
AM
7561 addend = rel->r_addend;
7562 ent = find_plt_ent (ifunc, got2, addend);
7563 }
7564 if (ent != NULL)
7565 {
888a7fc3
AM
7566 if (bfd_link_pic (info)
7567 && ent->sec != got2
7568 && htab->plt_type != PLT_NEW
7569 && (!htab->elf.dynamic_sections_created
7570 || h == NULL
7571 || h->dynindx == -1))
7572 {
7573 /* Uh oh, we are going to create a pic glink stub
7574 for an ifunc (here for h == NULL and later in
7575 finish_dynamic_symbol for h != NULL), and
7576 apparently are using code compiled with
7577 -mbss-plt. The difficulty is that -mbss-plt code
7578 gives no indication via a magic PLTREL24 addend
7579 whether r30 is equal to _GLOBAL_OFFSET_TABLE_ or
7580 is pointing into a .got2 section (and how far
7581 into .got2). */
7582 info->callbacks->einfo
695344c0 7583 /* xgettext:c-format */
174d0a74 7584 (_("%X%H: unsupported bss-plt -fPIC ifunc %s\n"),
888a7fc3
AM
7585 input_bfd, input_section, rel->r_offset, sym_name);
7586 }
e054468f 7587
0a1b45a2 7588 unresolved_reloc = false;
e054468f
AM
7589 if (htab->plt_type == PLT_NEW
7590 || !htab->elf.dynamic_sections_created
c7e17e05
AM
7591 || h == NULL
7592 || h->dynindx == -1)
e054468f
AM
7593 relocation = (htab->glink->output_section->vma
7594 + htab->glink->output_offset
7595 + (ent->glink_offset & ~1));
7596 else
ce558b89
AM
7597 relocation = (htab->elf.splt->output_section->vma
7598 + htab->elf.splt->output_offset
e054468f
AM
7599 + ent->plt.offset);
7600 }
7601 }
7602
7619e7c7 7603 addend = rel->r_addend;
23cedd1d 7604 save_unresolved_reloc = unresolved_reloc;
7619e7c7 7605 howto = NULL;
55fd94b0
AM
7606 if (r_type < R_PPC_max)
7607 howto = ppc_elf_howto_table[r_type];
9a23f96e 7608
9a23f96e 7609 tls_type = 0;
7619e7c7 7610 switch (r_type)
252b5132
RH
7611 {
7612 default:
cf97bcb0
AM
7613 /* xgettext:c-format */
7614 _bfd_error_handler (_("%pB: %s unsupported"),
7615 input_bfd, howto->name);
252b5132
RH
7616
7617 bfd_set_error (bfd_error_bad_value);
0a1b45a2 7618 ret = false;
c316a17c 7619 goto copy_reloc;
252b5132 7620
7619e7c7
AM
7621 case R_PPC_NONE:
7622 case R_PPC_TLS:
727fc41e
AM
7623 case R_PPC_TLSGD:
7624 case R_PPC_TLSLD:
7619e7c7
AM
7625 case R_PPC_EMB_MRKREF:
7626 case R_PPC_GNU_VTINHERIT:
7627 case R_PPC_GNU_VTENTRY:
c316a17c 7628 goto copy_reloc;
7595d193 7629
7619e7c7
AM
7630 /* GOT16 relocations. Like an ADDR16 using the symbol's
7631 address in the GOT as relocation value instead of the
7632 symbol's value itself. Also, create a GOT entry for the
7633 symbol and put the symbol value there. */
7634 case R_PPC_GOT_TLSGD16:
7635 case R_PPC_GOT_TLSGD16_LO:
7636 case R_PPC_GOT_TLSGD16_HI:
7637 case R_PPC_GOT_TLSGD16_HA:
7638 tls_type = TLS_TLS | TLS_GD;
7639 goto dogot;
7640
7641 case R_PPC_GOT_TLSLD16:
7642 case R_PPC_GOT_TLSLD16_LO:
7643 case R_PPC_GOT_TLSLD16_HI:
7644 case R_PPC_GOT_TLSLD16_HA:
7645 tls_type = TLS_TLS | TLS_LD;
7646 goto dogot;
7647
7648 case R_PPC_GOT_TPREL16:
7649 case R_PPC_GOT_TPREL16_LO:
7650 case R_PPC_GOT_TPREL16_HI:
7651 case R_PPC_GOT_TPREL16_HA:
7652 tls_type = TLS_TLS | TLS_TPREL;
7653 goto dogot;
7654
7655 case R_PPC_GOT_DTPREL16:
7656 case R_PPC_GOT_DTPREL16_LO:
7657 case R_PPC_GOT_DTPREL16_HI:
7658 case R_PPC_GOT_DTPREL16_HA:
7659 tls_type = TLS_TLS | TLS_DTPREL;
7660 goto dogot;
7661
7662 case R_PPC_GOT16:
7663 case R_PPC_GOT16_LO:
7664 case R_PPC_GOT16_HI:
7665 case R_PPC_GOT16_HA:
727fc41e 7666 tls_mask = 0;
7619e7c7
AM
7667 dogot:
7668 {
7669 /* Relocation is to the entry for this symbol in the global
7670 offset table. */
7671 bfd_vma off;
7672 bfd_vma *offp;
7673 unsigned long indx;
7674
ce558b89 7675 if (htab->elf.sgot == NULL)
7619e7c7
AM
7676 abort ();
7677
7678 indx = 0;
7679 if (tls_type == (TLS_TLS | TLS_LD)
f749f26e 7680 && SYMBOL_REFERENCES_LOCAL (info, h))
7619e7c7
AM
7681 offp = &htab->tlsld_got.offset;
7682 else if (h != NULL)
7683 {
f0158f44
AM
7684 if (!htab->elf.dynamic_sections_created
7685 || h->dynindx == -1
7686 || SYMBOL_REFERENCES_LOCAL (info, h)
21d68fcd 7687 || UNDEFWEAK_NO_DYNAMIC_RELOC (info, h))
7619e7c7
AM
7688 /* This is actually a static link, or it is a
7689 -Bsymbolic link and the symbol is defined
7690 locally, or the symbol was forced to be local
7691 because of a version file. */
7692 ;
7693 else
7694 {
7695 indx = h->dynindx;
0a1b45a2 7696 unresolved_reloc = false;
7619e7c7
AM
7697 }
7698 offp = &h->got.offset;
7699 }
7700 else
7701 {
7702 if (local_got_offsets == NULL)
7703 abort ();
7704 offp = &local_got_offsets[r_symndx];
7705 }
7706
7707 /* The offset must always be a multiple of 4. We use the
7708 least significant bit to record whether we have already
7709 processed this entry. */
7710 off = *offp;
7711 if ((off & 1) != 0)
7712 off &= ~1;
7713 else
7714 {
37da22e5
AM
7715 unsigned int tls_m = ((tls_mask & TLS_TLS) != 0
7716 ? tls_mask & (TLS_LD | TLS_GD | TLS_DTPREL
b00a0a86 7717 | TLS_TPREL | TLS_GDIE)
37da22e5 7718 : 0);
70bccea4
AM
7719
7720 if (offp == &htab->tlsld_got.offset)
7721 tls_m = TLS_LD;
f749f26e
AM
7722 else if ((tls_m & TLS_LD) != 0
7723 && SYMBOL_REFERENCES_LOCAL (info, h))
70bccea4
AM
7724 tls_m &= ~TLS_LD;
7725
7726 /* We might have multiple got entries for this sym.
7727 Initialize them all. */
7728 do
7619e7c7 7729 {
70bccea4
AM
7730 int tls_ty = 0;
7731
7732 if ((tls_m & TLS_LD) != 0)
7619e7c7 7733 {
70bccea4
AM
7734 tls_ty = TLS_TLS | TLS_LD;
7735 tls_m &= ~TLS_LD;
7736 }
7737 else if ((tls_m & TLS_GD) != 0)
7738 {
7739 tls_ty = TLS_TLS | TLS_GD;
7740 tls_m &= ~TLS_GD;
7741 }
7742 else if ((tls_m & TLS_DTPREL) != 0)
7743 {
7744 tls_ty = TLS_TLS | TLS_DTPREL;
7745 tls_m &= ~TLS_DTPREL;
7746 }
b00a0a86 7747 else if ((tls_m & (TLS_TPREL | TLS_GDIE)) != 0)
70bccea4
AM
7748 {
7749 tls_ty = TLS_TLS | TLS_TPREL;
7750 tls_m = 0;
7619e7c7 7751 }
7619e7c7 7752
70bccea4 7753 /* Generate relocs for the dynamic linker. */
f0158f44
AM
7754 if (indx != 0
7755 || (bfd_link_pic (info)
7756 && (h == NULL
f749f26e
AM
7757 || !UNDEFWEAK_NO_DYNAMIC_RELOC (info, h))
7758 && !(tls_ty != 0
f15d0b54
AM
7759 && bfd_link_executable (info)
7760 && SYMBOL_REFERENCES_LOCAL (info, h))))
7619e7c7 7761 {
ce558b89 7762 asection *rsec = htab->elf.srelgot;
91d6fa6a 7763 bfd_byte * loc;
91e21fb7 7764
0bed072f 7765 if (ifunc != NULL)
82e66161
AM
7766 {
7767 rsec = htab->elf.irelplt;
7768 if (indx == 0)
7769 htab->local_ifunc_resolver = 1;
7770 else if (is_static_defined (h))
7771 htab->maybe_local_ifunc_resolver = 1;
7772 }
ce558b89
AM
7773 outrel.r_offset = (htab->elf.sgot->output_section->vma
7774 + htab->elf.sgot->output_offset
70bccea4 7775 + off);
e515b051 7776 outrel.r_addend = 0;
70bccea4
AM
7777 if (tls_ty & (TLS_LD | TLS_GD))
7778 {
7779 outrel.r_info = ELF32_R_INFO (indx, R_PPC_DTPMOD32);
70bccea4
AM
7780 if (tls_ty == (TLS_TLS | TLS_GD))
7781 {
25f23106
AM
7782 loc = rsec->contents;
7783 loc += (rsec->reloc_count++
70bccea4
AM
7784 * sizeof (Elf32_External_Rela));
7785 bfd_elf32_swap_reloca_out (output_bfd,
7786 &outrel, loc);
e515b051 7787 outrel.r_offset += 4;
70bccea4
AM
7788 outrel.r_info
7789 = ELF32_R_INFO (indx, R_PPC_DTPREL32);
70bccea4
AM
7790 }
7791 }
7792 else if (tls_ty == (TLS_TLS | TLS_DTPREL))
7793 outrel.r_info = ELF32_R_INFO (indx, R_PPC_DTPREL32);
7794 else if (tls_ty == (TLS_TLS | TLS_TPREL))
7795 outrel.r_info = ELF32_R_INFO (indx, R_PPC_TPREL32);
25f23106 7796 else if (indx != 0)
70bccea4 7797 outrel.r_info = ELF32_R_INFO (indx, R_PPC_GLOB_DAT);
25f23106
AM
7798 else if (ifunc != NULL)
7799 outrel.r_info = ELF32_R_INFO (0, R_PPC_IRELATIVE);
7800 else
7801 outrel.r_info = ELF32_R_INFO (0, R_PPC_RELATIVE);
d6e14abc 7802 if (indx == 0 && tls_ty != (TLS_TLS | TLS_LD))
e515b051
AM
7803 {
7804 outrel.r_addend += relocation;
7805 if (tls_ty & (TLS_GD | TLS_DTPREL | TLS_TPREL))
989f9879
AM
7806 {
7807 if (htab->elf.tls_sec == NULL)
7808 outrel.r_addend = 0;
7809 else
7810 outrel.r_addend -= htab->elf.tls_sec->vma;
7811 }
e515b051 7812 }
25f23106
AM
7813 loc = rsec->contents;
7814 loc += (rsec->reloc_count++
70bccea4
AM
7815 * sizeof (Elf32_External_Rela));
7816 bfd_elf32_swap_reloca_out (output_bfd, &outrel, loc);
7619e7c7
AM
7817 }
7818
70bccea4
AM
7819 /* Init the .got section contents if we're not
7820 emitting a reloc. */
7821 else
7619e7c7 7822 {
70bccea4
AM
7823 bfd_vma value = relocation;
7824
f0158f44 7825 if (tls_ty != 0)
70bccea4 7826 {
989f9879
AM
7827 if (htab->elf.tls_sec == NULL)
7828 value = 0;
7829 else
7830 {
f0158f44
AM
7831 if (tls_ty & TLS_LD)
7832 value = 0;
7833 else
7834 value -= htab->elf.tls_sec->vma + DTP_OFFSET;
676ee2b5 7835 if (tls_ty & TLS_TPREL)
989f9879
AM
7836 value += DTP_OFFSET - TP_OFFSET;
7837 }
70bccea4 7838
f0158f44 7839 if (tls_ty & (TLS_LD | TLS_GD))
7b609f53 7840 {
95f0d0d2 7841 bfd_put_32 (input_bfd, value,
ce558b89 7842 htab->elf.sgot->contents + off + 4);
676ee2b5 7843 value = 1;
7b609f53 7844 }
70bccea4 7845 }
95f0d0d2 7846 bfd_put_32 (input_bfd, value,
ce558b89 7847 htab->elf.sgot->contents + off);
7619e7c7 7848 }
70bccea4
AM
7849
7850 off += 4;
7851 if (tls_ty & (TLS_LD | TLS_GD))
7852 off += 4;
7619e7c7 7853 }
70bccea4
AM
7854 while (tls_m != 0);
7855
7856 off = *offp;
7857 *offp = off | 1;
7619e7c7
AM
7858 }
7859
7860 if (off >= (bfd_vma) -2)
7861 abort ();
7862
70bccea4
AM
7863 if ((tls_type & TLS_TLS) != 0)
7864 {
7865 if (tls_type != (TLS_TLS | TLS_LD))
7866 {
7867 if ((tls_mask & TLS_LD) != 0
f749f26e 7868 && !SYMBOL_REFERENCES_LOCAL (info, h))
70bccea4
AM
7869 off += 8;
7870 if (tls_type != (TLS_TLS | TLS_GD))
7871 {
7872 if ((tls_mask & TLS_GD) != 0)
7873 off += 8;
7874 if (tls_type != (TLS_TLS | TLS_DTPREL))
7875 {
7876 if ((tls_mask & TLS_DTPREL) != 0)
7877 off += 4;
7878 }
7879 }
7880 }
7881 }
7882
d3e454b9
AM
7883 /* If here for a picfixup, we're done. */
7884 if (r_type != ELF32_R_TYPE (rel->r_info))
c316a17c 7885 goto copy_reloc;
d3e454b9 7886
ce558b89
AM
7887 relocation = (htab->elf.sgot->output_section->vma
7888 + htab->elf.sgot->output_offset
e87d4038
AM
7889 + off
7890 - SYM_VAL (htab->elf.hgot));
7619e7c7
AM
7891
7892 /* Addends on got relocations don't make much sense.
7893 x+off@got is actually x@got+off, and since the got is
7894 generated by a hash table traversal, the value in the
7895 got at entry m+n bears little relation to the entry m. */
7896 if (addend != 0)
25f53a85 7897 info->callbacks->einfo
695344c0 7898 /* xgettext:c-format */
174d0a74 7899 (_("%H: non-zero addend on %s reloc against `%s'\n"),
25f53a85 7900 input_bfd, input_section, rel->r_offset,
7b609f53 7901 howto->name,
7619e7c7
AM
7902 sym_name);
7903 }
86c95733 7904 break;
7619e7c7 7905
86c95733 7906 /* Relocations that need no special processing. */
7619e7c7 7907 case R_PPC_LOCAL24PC:
252b5132
RH
7908 /* It makes no sense to point a local relocation
7909 at a symbol not in this object. */
7b609f53 7910 if (unresolved_reloc)
252b5132 7911 {
1a72702b
AM
7912 (*info->callbacks->undefined_symbol) (info,
7913 h->root.root.string,
7914 input_bfd,
7915 input_section,
7916 rel->r_offset,
0a1b45a2 7917 true);
c316a17c 7918 goto copy_reloc;
252b5132 7919 }
888a7fc3
AM
7920 if (h != NULL && h->type == STT_GNU_IFUNC && bfd_link_pic (info))
7921 {
7922 /* @local on an ifunc does not really make sense since
7923 the ifunc resolver can take you anywhere. More
7924 seriously, calls to ifuncs must go through a plt call
7925 stub, and for pic the plt call stubs uses r30 to
7926 access the PLT. The problem is that a call that is
7927 local won't have the +32k reloc addend trick marking
7928 -fPIC code, so the linker won't know whether r30 is
7929 _GLOBAL_OFFSET_TABLE_ or pointing into a .got2 section. */
695344c0 7930 /* xgettext:c-format */
174d0a74 7931 info->callbacks->einfo (_("%X%H: @local call to ifunc %s\n"),
888a7fc3
AM
7932 input_bfd, input_section, rel->r_offset,
7933 h->root.root.string);
7934 }
252b5132
RH
7935 break;
7936
7619e7c7
AM
7937 case R_PPC_DTPREL16:
7938 case R_PPC_DTPREL16_LO:
7939 case R_PPC_DTPREL16_HI:
7940 case R_PPC_DTPREL16_HA:
989f9879
AM
7941 if (htab->elf.tls_sec != NULL)
7942 addend -= htab->elf.tls_sec->vma + DTP_OFFSET;
7619e7c7
AM
7943 break;
7944
70bccea4
AM
7945 /* Relocations that may need to be propagated if this is a shared
7946 object. */
7619e7c7
AM
7947 case R_PPC_TPREL16:
7948 case R_PPC_TPREL16_LO:
7949 case R_PPC_TPREL16_HI:
7950 case R_PPC_TPREL16_HA:
766bc656
AM
7951 if (h != NULL
7952 && h->root.type == bfd_link_hash_undefweak
7953 && h->dynindx == -1)
7954 {
7955 /* Make this relocation against an undefined weak symbol
7956 resolve to zero. This is really just a tweak, since
7957 code using weak externs ought to check that they are
7958 defined before using them. */
7959 bfd_byte *p = contents + rel->r_offset - d_offset;
95f0d0d2 7960 unsigned int insn = bfd_get_32 (input_bfd, p);
766bc656
AM
7961 insn = _bfd_elf_ppc_at_tprel_transform (insn, 2);
7962 if (insn != 0)
95f0d0d2 7963 bfd_put_32 (input_bfd, insn, p);
766bc656
AM
7964 break;
7965 }
989f9879
AM
7966 if (htab->elf.tls_sec != NULL)
7967 addend -= htab->elf.tls_sec->vma + TP_OFFSET;
7619e7c7 7968 /* The TPREL16 relocs shouldn't really be used in shared
7c8bbca5
AM
7969 libs or with non-local symbols as that will result in
7970 DT_TEXTREL being set, but support them anyway. */
7619e7c7
AM
7971 goto dodyn;
7972
7973 case R_PPC_TPREL32:
989f9879
AM
7974 if (htab->elf.tls_sec != NULL)
7975 addend -= htab->elf.tls_sec->vma + TP_OFFSET;
7619e7c7
AM
7976 goto dodyn;
7977
7978 case R_PPC_DTPREL32:
989f9879
AM
7979 if (htab->elf.tls_sec != NULL)
7980 addend -= htab->elf.tls_sec->vma + DTP_OFFSET;
7619e7c7
AM
7981 goto dodyn;
7982
e515b051
AM
7983 case R_PPC_DTPMOD32:
7984 relocation = 1;
7985 addend = 0;
7986 goto dodyn;
7987
d7128ce4
AM
7988 case R_PPC_REL16:
7989 case R_PPC_REL16_LO:
7990 case R_PPC_REL16_HI:
7991 case R_PPC_REL16_HA:
a680de9a 7992 case R_PPC_REL16DX_HA:
d7128ce4
AM
7993 break;
7994
7619e7c7 7995 case R_PPC_REL32:
625af618
AM
7996 if (h == NULL || h == htab->elf.hgot)
7997 break;
7998 /* fall through */
7999
8000 case R_PPC_ADDR32:
8001 case R_PPC_ADDR16:
8002 case R_PPC_ADDR16_LO:
8003 case R_PPC_ADDR16_HI:
8004 case R_PPC_ADDR16_HA:
8005 case R_PPC_UADDR32:
8006 case R_PPC_UADDR16:
8007 goto dodyn;
8008
b9c361e0
JL
8009 case R_PPC_VLE_REL8:
8010 case R_PPC_VLE_REL15:
8011 case R_PPC_VLE_REL24:
625af618 8012 case R_PPC_REL24:
7619e7c7
AM
8013 case R_PPC_REL14:
8014 case R_PPC_REL14_BRTAKEN:
8015 case R_PPC_REL14_BRNTAKEN:
252b5132
RH
8016 /* If these relocations are not to a named symbol, they can be
8017 handled right here, no need to bother the dynamic linker. */
89200bf8 8018 if (SYMBOL_CALLS_LOCAL (info, h)
3b36f7e6 8019 || h == htab->elf.hgot)
252b5132 8020 break;
70bccea4 8021 /* fall through */
252b5132 8022
7619e7c7 8023 case R_PPC_ADDR24:
7619e7c7
AM
8024 case R_PPC_ADDR14:
8025 case R_PPC_ADDR14_BRTAKEN:
8026 case R_PPC_ADDR14_BRNTAKEN:
0e1862bb 8027 if (h != NULL && !bfd_link_pic (info))
625af618
AM
8028 break;
8029 /* fall through */
8030
7619e7c7 8031 dodyn:
3348747a
NS
8032 if ((input_section->flags & SEC_ALLOC) == 0
8033 || is_vxworks_tls)
c87b5a93 8034 break;
c87b5a93 8035
287c7eaf
AM
8036 if (bfd_link_pic (info)
8037 ? ((h == NULL
190eb1dd 8038 || h->dyn_relocs != NULL)
287c7eaf
AM
8039 && ((h != NULL && pc_dynrelocs (h))
8040 || must_be_dyn_reloc (info, r_type)))
8041 : (h != NULL
190eb1dd 8042 && h->dyn_relocs != NULL))
252b5132 8043 {
0bb2d96a 8044 int skip;
f95f8542
AM
8045 bfd_byte *loc;
8046 asection *sreloc;
82e66161
AM
8047 long indx = 0;
8048
252b5132 8049#ifdef DEBUG
55fd94b0
AM
8050 fprintf (stderr, "ppc_elf_relocate_section needs to "
8051 "create relocation for %s\n",
70bccea4
AM
8052 (h && h->root.root.string
8053 ? h->root.root.string : "<unknown>"));
252b5132
RH
8054#endif
8055
8056 /* When generating a shared object, these relocations
70bccea4
AM
8057 are copied into the output file to be resolved at run
8058 time. */
0bb2d96a 8059 skip = 0;
5b914448
AM
8060 outrel.r_offset = _bfd_elf_section_offset (output_bfd, info,
8061 input_section,
8062 rel->r_offset);
0bb2d96a
JJ
8063 if (outrel.r_offset == (bfd_vma) -1
8064 || outrel.r_offset == (bfd_vma) -2)
8065 skip = (int) outrel.r_offset;
252b5132
RH
8066 outrel.r_offset += (input_section->output_section->vma
8067 + input_section->output_offset);
8068
63f6e94f
AM
8069 /* Optimize unaligned reloc use. */
8070 if ((r_type == R_PPC_ADDR32 && (outrel.r_offset & 3) != 0)
8071 || (r_type == R_PPC_UADDR32 && (outrel.r_offset & 3) == 0))
8072 r_type ^= R_PPC_ADDR32 ^ R_PPC_UADDR32;
8073 if ((r_type == R_PPC_ADDR16 && (outrel.r_offset & 1) != 0)
8074 || (r_type == R_PPC_UADDR16 && (outrel.r_offset & 1) == 0))
8075 r_type ^= R_PPC_ADDR16 ^ R_PPC_UADDR16;
8076
252b5132
RH
8077 if (skip)
8078 memset (&outrel, 0, sizeof outrel);
21d68fcd 8079 else if (!SYMBOL_REFERENCES_LOCAL (info, h))
252b5132 8080 {
82e66161
AM
8081 indx = h->dynindx;
8082 BFD_ASSERT (indx != -1);
0a1b45a2 8083 unresolved_reloc = false;
82e66161 8084 outrel.r_info = ELF32_R_INFO (indx, r_type);
252b5132
RH
8085 outrel.r_addend = rel->r_addend;
8086 }
8087 else
8088 {
47388f4c
AM
8089 outrel.r_addend = relocation + rel->r_addend;
8090
25f23106 8091 if (r_type != R_PPC_ADDR32)
252b5132 8092 {
25f23106
AM
8093 if (ifunc != NULL)
8094 {
8095 /* If we get here when building a static
8096 executable, then the libc startup function
8097 responsible for applying indirect function
8098 relocations is going to complain about
8099 the reloc type.
8100 If we get here when building a dynamic
8101 executable, it will be because we have
8102 a text relocation. The dynamic loader
8103 will set the text segment writable and
8104 non-executable to apply text relocations.
8105 So we'll segfault when trying to run the
8106 indirection function to resolve the reloc. */
25f53a85 8107 info->callbacks->einfo
695344c0 8108 /* xgettext:c-format */
174d0a74 8109 (_("%H: relocation %s for indirect "
25f53a85
AM
8110 "function %s unsupported\n"),
8111 input_bfd, input_section, rel->r_offset,
25f23106
AM
8112 howto->name,
8113 sym_name);
0a1b45a2 8114 ret = false;
25f23106 8115 }
cf35638d 8116 else if (r_symndx == STN_UNDEF || bfd_is_abs_section (sec))
89200bf8 8117 ;
252b5132
RH
8118 else if (sec == NULL || sec->owner == NULL)
8119 {
8120 bfd_set_error (bfd_error_bad_value);
0a1b45a2 8121 ret = false;
252b5132
RH
8122 }
8123 else
8124 {
8125 asection *osec;
8126
47388f4c
AM
8127 /* We are turning this relocation into one
8128 against a section symbol. It would be
8129 proper to subtract the symbol's value,
8130 osec->vma, from the emitted reloc addend,
25f23106
AM
8131 but ld.so expects buggy relocs.
8132 FIXME: Why not always use a zero index? */
252b5132 8133 osec = sec->output_section;
f26a3287
AM
8134 if ((osec->flags & SEC_THREAD_LOCAL) != 0)
8135 {
8136 osec = htab->elf.tls_sec;
8137 indx = 0;
8138 }
8139 else
74541ad4 8140 {
74541ad4 8141 indx = elf_section_data (osec)->dynindx;
f26a3287
AM
8142 if (indx == 0)
8143 {
8144 osec = htab->elf.text_index_section;
8145 indx = elf_section_data (osec)->dynindx;
8146 }
8147 BFD_ASSERT (indx != 0);
74541ad4 8148 }
f26a3287
AM
8149
8150 /* ld.so doesn't expect buggy TLS relocs.
8151 Don't leave the symbol value in the
8152 addend for them. */
8153 if (IS_PPC_TLS_RELOC (r_type))
8154 outrel.r_addend -= osec->vma;
252b5132
RH
8155 }
8156
8157 outrel.r_info = ELF32_R_INFO (indx, r_type);
252b5132 8158 }
25f23106
AM
8159 else if (ifunc != NULL)
8160 outrel.r_info = ELF32_R_INFO (0, R_PPC_IRELATIVE);
8161 else
8162 outrel.r_info = ELF32_R_INFO (0, R_PPC_RELATIVE);
252b5132
RH
8163 }
8164
82e66161
AM
8165 sreloc = elf_section_data (input_section)->sreloc;
8166 if (ifunc)
8167 {
8168 sreloc = htab->elf.irelplt;
8169 if (indx == 0)
8170 htab->local_ifunc_resolver = 1;
8171 else if (is_static_defined (h))
8172 htab->maybe_local_ifunc_resolver = 1;
8173 }
8174 if (sreloc == NULL)
0a1b45a2 8175 return false;
82e66161 8176
947216bf
AM
8177 loc = sreloc->contents;
8178 loc += sreloc->reloc_count++ * sizeof (Elf32_External_Rela);
8179 bfd_elf32_swap_reloca_out (output_bfd, &outrel, loc);
252b5132 8180
2243deae 8181 if (skip == -1)
c316a17c 8182 goto copy_reloc;
2243deae 8183
f0158f44
AM
8184 /* This reloc will be computed at runtime. Clear the memory
8185 so that it contains a predictable value for prelink. */
8186 if (!skip)
2243deae
L
8187 {
8188 relocation = howto->pc_relative ? outrel.r_offset : 0;
8189 addend = 0;
8190 break;
8191 }
252b5132 8192 }
252b5132
RH
8193 break;
8194
32af9f6e
AM
8195 case R_PPC_RELAX_PLT:
8196 case R_PPC_RELAX_PLTREL24:
de972ffa
AM
8197 if (h != NULL)
8198 {
32af9f6e
AM
8199 struct plt_entry *ent;
8200 bfd_vma got2_addend = 0;
8201
8202 if (r_type == R_PPC_RELAX_PLTREL24)
8203 {
0e1862bb 8204 if (bfd_link_pic (info))
32af9f6e
AM
8205 got2_addend = addend;
8206 addend = 0;
8207 }
8208 ent = find_plt_ent (&h->plt.plist, got2, got2_addend);
de972ffa
AM
8209 if (htab->plt_type == PLT_NEW)
8210 relocation = (htab->glink->output_section->vma
8211 + htab->glink->output_offset
8212 + ent->glink_offset);
8213 else
ce558b89
AM
8214 relocation = (htab->elf.splt->output_section->vma
8215 + htab->elf.splt->output_offset
de972ffa
AM
8216 + ent->plt.offset);
8217 }
1a0670f3 8218 /* Fall through. */
b4a38de6 8219
32af9f6e 8220 case R_PPC_RELAX:
9abc968f 8221 {
53291d1f
AM
8222 const int *stub;
8223 size_t size;
8224 size_t insn_offset = rel->r_offset;
8225 unsigned int insn;
9abc968f 8226
0e1862bb 8227 if (bfd_link_pic (info))
53291d1f
AM
8228 {
8229 relocation -= (input_section->output_section->vma
8230 + input_section->output_offset
8231 + rel->r_offset - 4);
8232 stub = shared_stub_entry;
95f0d0d2
AM
8233 bfd_put_32 (input_bfd, stub[0], contents + insn_offset - 12);
8234 bfd_put_32 (input_bfd, stub[1], contents + insn_offset - 8);
8235 bfd_put_32 (input_bfd, stub[2], contents + insn_offset - 4);
53291d1f
AM
8236 stub += 3;
8237 size = ARRAY_SIZE (shared_stub_entry) - 3;
8238 }
8239 else
8240 {
8241 stub = stub_entry;
8242 size = ARRAY_SIZE (stub_entry);
8243 }
9abc968f 8244
9abc968f 8245 relocation += addend;
0e1862bb 8246 if (bfd_link_relocatable (info))
53291d1f
AM
8247 relocation = 0;
8248
8249 /* First insn is HA, second is LO. */
8250 insn = *stub++;
8251 insn |= ((relocation + 0x8000) >> 16) & 0xffff;
95f0d0d2 8252 bfd_put_32 (input_bfd, insn, contents + insn_offset);
53291d1f
AM
8253 insn_offset += 4;
8254
8255 insn = *stub++;
8256 insn |= relocation & 0xffff;
95f0d0d2 8257 bfd_put_32 (input_bfd, insn, contents + insn_offset);
53291d1f
AM
8258 insn_offset += 4;
8259 size -= 2;
8260
8261 while (size != 0)
8262 {
8263 insn = *stub++;
8264 --size;
95f0d0d2 8265 bfd_put_32 (input_bfd, insn, contents + insn_offset);
53291d1f
AM
8266 insn_offset += 4;
8267 }
9bc4e62b
NS
8268
8269 /* Rewrite the reloc and convert one of the trailing nop
8270 relocs to describe this relocation. */
8271 BFD_ASSERT (ELF32_R_TYPE (relend[-1].r_info) == R_PPC_NONE);
8272 /* The relocs are at the bottom 2 bytes */
c316a17c
AM
8273 wrel->r_offset = rel->r_offset + d_offset;
8274 wrel->r_info = ELF32_R_INFO (r_symndx, R_PPC_ADDR16_HA);
8275 wrel->r_addend = rel->r_addend;
8276 memmove (wrel + 1, wrel, (relend - wrel - 1) * sizeof (*wrel));
8277 wrel++, rel++;
8278 wrel->r_offset += 4;
8279 wrel->r_info = ELF32_R_INFO (r_symndx, R_PPC_ADDR16_LO);
9abc968f 8280 }
8517fae7 8281 continue;
deaaf2f3 8282
70bccea4 8283 /* Indirect .sdata relocation. */
7619e7c7 8284 case R_PPC_EMB_SDAI16:
c9a2f333 8285 BFD_ASSERT (htab->sdata[0].section != NULL);
bd6c6e2b
AM
8286 if (!is_static_defined (htab->sdata[0].sym))
8287 {
0a1b45a2 8288 unresolved_reloc = true;
bd6c6e2b
AM
8289 break;
8290 }
7619e7c7 8291 relocation
76750a2f
AM
8292 = elf_finish_pointer_linker_section (input_bfd, &htab->sdata[0],
8293 h, relocation, rel);
bd6c6e2b 8294 addend = 0;
252b5132
RH
8295 break;
8296
70bccea4 8297 /* Indirect .sdata2 relocation. */
7619e7c7 8298 case R_PPC_EMB_SDA2I16:
c9a2f333 8299 BFD_ASSERT (htab->sdata[1].section != NULL);
bd6c6e2b
AM
8300 if (!is_static_defined (htab->sdata[1].sym))
8301 {
0a1b45a2 8302 unresolved_reloc = true;
bd6c6e2b
AM
8303 break;
8304 }
7619e7c7 8305 relocation
76750a2f
AM
8306 = elf_finish_pointer_linker_section (input_bfd, &htab->sdata[1],
8307 h, relocation, rel);
bd6c6e2b 8308 addend = 0;
252b5132
RH
8309 break;
8310
70bccea4
AM
8311 /* Handle the TOC16 reloc. We want to use the offset within the .got
8312 section, not the actual VMA. This is appropriate when generating
8313 an embedded ELF object, for which the .got section acts like the
8314 AIX .toc section. */
7619e7c7 8315 case R_PPC_TOC16: /* phony GOT16 relocations */
3b4f3a11
AM
8316 if (sec == NULL || sec->output_section == NULL)
8317 {
0a1b45a2 8318 unresolved_reloc = true;
3b4f3a11
AM
8319 break;
8320 }
fd361982
AM
8321 BFD_ASSERT (strcmp (bfd_section_name (sec), ".got") == 0
8322 || strcmp (bfd_section_name (sec), ".cgot") == 0);
252b5132 8323
3b4f3a11 8324 addend -= sec->output_section->vma + sec->output_offset + 0x8000;
252b5132
RH
8325 break;
8326
7619e7c7 8327 case R_PPC_PLTREL24:
f75e0e33
AM
8328 if (h != NULL && ifunc == NULL)
8329 {
cbf95972
AM
8330 struct plt_entry *ent;
8331
8332 ent = find_plt_ent (&h->plt.plist, got2,
8333 bfd_link_pic (info) ? addend : 0);
f75e0e33 8334 if (ent == NULL
ce558b89 8335 || htab->elf.splt == NULL)
f75e0e33
AM
8336 {
8337 /* We didn't make a PLT entry for this symbol. This
8338 happens when statically linking PIC code, or when
8339 using -Bsymbolic. */
8340 }
8341 else
8342 {
8343 /* Relocation is to the entry for this symbol in the
8344 procedure linkage table. */
0a1b45a2 8345 unresolved_reloc = false;
f75e0e33
AM
8346 if (htab->plt_type == PLT_NEW)
8347 relocation = (htab->glink->output_section->vma
8348 + htab->glink->output_offset
8349 + ent->glink_offset);
8350 else
ce558b89
AM
8351 relocation = (htab->elf.splt->output_section->vma
8352 + htab->elf.splt->output_offset
f75e0e33
AM
8353 + ent->plt.offset);
8354 }
8355 }
252b5132 8356
f75e0e33
AM
8357 /* R_PPC_PLTREL24 is rather special. If non-zero, the
8358 addend specifies the GOT pointer offset within .got2.
8359 Don't apply it to the relocation field. */
8360 addend = 0;
8da6118f 8361 break;
252b5132 8362
23cedd1d
AM
8363 case R_PPC_PLTSEQ:
8364 case R_PPC_PLTCALL:
08be3224
AM
8365 case R_PPC_PLT16_LO:
8366 case R_PPC_PLT16_HI:
8367 case R_PPC_PLT16_HA:
2d7ad24e 8368 plt_list = NULL;
08be3224
AM
8369 if (h != NULL)
8370 plt_list = &h->plt.plist;
2d7ad24e
AM
8371 else if (ifunc != NULL)
8372 plt_list = ifunc;
8373 else if (local_got_offsets != NULL)
8374 {
8375 struct plt_entry **local_plt;
8376 local_plt = (struct plt_entry **) (local_got_offsets
8377 + symtab_hdr->sh_info);
8378 plt_list = local_plt + r_symndx;
8379 }
0a1b45a2 8380 unresolved_reloc = true;
08be3224
AM
8381 if (plt_list != NULL)
8382 {
8383 struct plt_entry *ent;
8384
8385 ent = find_plt_ent (plt_list, got2,
8386 bfd_link_pic (info) ? addend : 0);
2d7ad24e 8387 if (ent != NULL && ent->plt.offset != (bfd_vma) -1)
08be3224 8388 {
2d7ad24e
AM
8389 asection *plt;
8390
0a1b45a2 8391 unresolved_reloc = false;
2d7ad24e 8392 plt = htab->elf.splt;
30845f11 8393 if (use_local_plt (info, h))
2d7ad24e
AM
8394 {
8395 if (ifunc != NULL)
8396 plt = htab->elf.iplt;
8397 else
8398 plt = htab->pltlocal;
8399 }
8400 relocation = (plt->output_section->vma
8401 + plt->output_offset
08be3224
AM
8402 + ent->plt.offset);
8403 if (bfd_link_pic (info))
8404 {
8405 bfd_vma got = 0;
8406
8407 if (ent->addend >= 32768)
8408 got = (ent->addend
8409 + ent->sec->output_section->vma
8410 + ent->sec->output_offset);
8411 else
8412 got = SYM_VAL (htab->elf.hgot);
8413 relocation -= got;
8414 }
8415 }
8416 }
8417 addend = 0;
8418 break;
8419
70bccea4 8420 /* Relocate against _SDA_BASE_. */
7619e7c7 8421 case R_PPC_SDAREL16:
252b5132
RH
8422 {
8423 const char *name;
bd6c6e2b 8424 struct elf_link_hash_entry *sda = htab->sdata[0].sym;
252b5132 8425
bd6c6e2b
AM
8426 if (sec == NULL
8427 || sec->output_section == NULL
8428 || !is_static_defined (sda))
3b4f3a11 8429 {
0a1b45a2 8430 unresolved_reloc = true;
3b4f3a11
AM
8431 break;
8432 }
bd6c6e2b 8433 addend -= SYM_VAL (sda);
3b4f3a11 8434
fd361982 8435 name = bfd_section_name (sec->output_section);
93d1b056
AM
8436 if (!(strcmp (name, ".sdata") == 0
8437 || strcmp (name, ".sbss") == 0))
252b5132 8438 {
cf97bcb0 8439 _bfd_error_handler
695344c0 8440 /* xgettext:c-format */
cf97bcb0
AM
8441 (_("%pB: the target (%s) of a %s relocation is "
8442 "in the wrong output section (%s)"),
d003868e 8443 input_bfd,
55fd94b0
AM
8444 sym_name,
8445 howto->name,
8446 name);
252b5132 8447 }
252b5132
RH
8448 }
8449 break;
8450
70bccea4 8451 /* Relocate against _SDA2_BASE_. */
7619e7c7 8452 case R_PPC_EMB_SDA2REL:
252b5132
RH
8453 {
8454 const char *name;
bd6c6e2b 8455 struct elf_link_hash_entry *sda = htab->sdata[1].sym;
252b5132 8456
bd6c6e2b
AM
8457 if (sec == NULL
8458 || sec->output_section == NULL
8459 || !is_static_defined (sda))
3b4f3a11 8460 {
0a1b45a2 8461 unresolved_reloc = true;
3b4f3a11
AM
8462 break;
8463 }
bd6c6e2b 8464 addend -= SYM_VAL (sda);
3b4f3a11 8465
fd361982 8466 name = bfd_section_name (sec->output_section);
93d1b056
AM
8467 if (!(strcmp (name, ".sdata2") == 0
8468 || strcmp (name, ".sbss2") == 0))
252b5132 8469 {
cf97bcb0 8470 _bfd_error_handler
695344c0 8471 /* xgettext:c-format */
cf97bcb0
AM
8472 (_("%pB: the target (%s) of a %s relocation is "
8473 "in the wrong output section (%s)"),
d003868e 8474 input_bfd,
55fd94b0
AM
8475 sym_name,
8476 howto->name,
8477 name);
252b5132 8478 }
252b5132
RH
8479 }
8480 break;
8481
b9c361e0 8482 case R_PPC_VLE_LO16A:
86c95733 8483 relocation = relocation + addend;
08dc996f
AM
8484 ppc_elf_vle_split16 (input_bfd, input_section, rel->r_offset,
8485 contents + rel->r_offset, relocation,
8486 split16a_type, htab->params->vle_reloc_fixup);
c316a17c 8487 goto copy_reloc;
b9c361e0
JL
8488
8489 case R_PPC_VLE_LO16D:
86c95733 8490 relocation = relocation + addend;
08dc996f
AM
8491 ppc_elf_vle_split16 (input_bfd, input_section, rel->r_offset,
8492 contents + rel->r_offset, relocation,
8493 split16d_type, htab->params->vle_reloc_fixup);
c316a17c 8494 goto copy_reloc;
b9c361e0
JL
8495
8496 case R_PPC_VLE_HI16A:
86c95733 8497 relocation = (relocation + addend) >> 16;
08dc996f
AM
8498 ppc_elf_vle_split16 (input_bfd, input_section, rel->r_offset,
8499 contents + rel->r_offset, relocation,
8500 split16a_type, htab->params->vle_reloc_fixup);
c316a17c 8501 goto copy_reloc;
b9c361e0
JL
8502
8503 case R_PPC_VLE_HI16D:
86c95733 8504 relocation = (relocation + addend) >> 16;
08dc996f
AM
8505 ppc_elf_vle_split16 (input_bfd, input_section, rel->r_offset,
8506 contents + rel->r_offset, relocation,
8507 split16d_type, htab->params->vle_reloc_fixup);
c316a17c 8508 goto copy_reloc;
b9c361e0
JL
8509
8510 case R_PPC_VLE_HA16A:
86c95733 8511 relocation = (relocation + addend + 0x8000) >> 16;
08dc996f
AM
8512 ppc_elf_vle_split16 (input_bfd, input_section, rel->r_offset,
8513 contents + rel->r_offset, relocation,
8514 split16a_type, htab->params->vle_reloc_fixup);
c316a17c 8515 goto copy_reloc;
b9c361e0
JL
8516
8517 case R_PPC_VLE_HA16D:
86c95733 8518 relocation = (relocation + addend + 0x8000) >> 16;
08dc996f
AM
8519 ppc_elf_vle_split16 (input_bfd, input_section, rel->r_offset,
8520 contents + rel->r_offset, relocation,
8521 split16d_type, htab->params->vle_reloc_fixup);
c316a17c 8522 goto copy_reloc;
b9c361e0 8523
70bccea4 8524 /* Relocate against either _SDA_BASE_, _SDA2_BASE_, or 0. */
7619e7c7 8525 case R_PPC_EMB_SDA21:
b9c361e0 8526 case R_PPC_VLE_SDA21:
7619e7c7 8527 case R_PPC_EMB_RELSDA:
b9c361e0 8528 case R_PPC_VLE_SDA21_LO:
252b5132
RH
8529 {
8530 const char *name;
8531 int reg;
86c95733 8532 unsigned int insn;
bd6c6e2b 8533 struct elf_link_hash_entry *sda = NULL;
252b5132 8534
3b4f3a11
AM
8535 if (sec == NULL || sec->output_section == NULL)
8536 {
0a1b45a2 8537 unresolved_reloc = true;
3b4f3a11
AM
8538 break;
8539 }
8540
fd361982 8541 name = bfd_section_name (sec->output_section);
93d1b056
AM
8542 if (strcmp (name, ".sdata") == 0
8543 || strcmp (name, ".sbss") == 0)
252b5132
RH
8544 {
8545 reg = 13;
bd6c6e2b 8546 sda = htab->sdata[0].sym;
252b5132 8547 }
93d1b056
AM
8548 else if (strcmp (name, ".sdata2") == 0
8549 || strcmp (name, ".sbss2") == 0)
252b5132
RH
8550 {
8551 reg = 2;
bd6c6e2b 8552 sda = htab->sdata[1].sym;
252b5132 8553 }
8da6118f
KH
8554 else if (strcmp (name, ".PPC.EMB.sdata0") == 0
8555 || strcmp (name, ".PPC.EMB.sbss0") == 0)
252b5132
RH
8556 {
8557 reg = 0;
8558 }
252b5132
RH
8559 else
8560 {
cf97bcb0 8561 _bfd_error_handler
695344c0 8562 /* xgettext:c-format */
cf97bcb0
AM
8563 (_("%pB: the target (%s) of a %s relocation is "
8564 "in the wrong output section (%s)"),
d003868e 8565 input_bfd,
55fd94b0
AM
8566 sym_name,
8567 howto->name,
8568 name);
252b5132
RH
8569
8570 bfd_set_error (bfd_error_bad_value);
0a1b45a2 8571 ret = false;
c316a17c 8572 goto copy_reloc;
252b5132
RH
8573 }
8574
bd6c6e2b
AM
8575 if (sda != NULL)
8576 {
8577 if (!is_static_defined (sda))
8578 {
0a1b45a2 8579 unresolved_reloc = true;
bd6c6e2b
AM
8580 break;
8581 }
8582 addend -= SYM_VAL (sda);
8583 }
8584
6f5601c4
AM
8585 if (r_type == R_PPC_EMB_RELSDA)
8586 break;
8587
8588 /* The PowerPC Embedded Application Binary Interface
8589 version 1.0 insanely chose to specify R_PPC_EMB_SDA21
8590 operating on a 24-bit field at r_offset. GNU as and
8591 GNU ld have always assumed R_PPC_EMB_SDA21 operates on
8592 a 32-bit bit insn at r_offset. Cope with object file
8593 producers that possibly comply with the EABI in
8594 generating an odd r_offset for big-endian objects. */
8595 if (r_type == R_PPC_EMB_SDA21)
8596 rel->r_offset &= ~1;
8597
95f0d0d2 8598 insn = bfd_get_32 (input_bfd, contents + rel->r_offset);
b9c361e0
JL
8599 if (reg == 0
8600 && (r_type == R_PPC_VLE_SDA21
8601 || r_type == R_PPC_VLE_SDA21_LO))
8602 {
86c95733
AM
8603 relocation = relocation + addend;
8604 addend = 0;
8605
8606 /* Force e_li insn, keeping RT from original insn. */
8607 insn &= 0x1f << 21;
8608 insn |= 28u << 26;
8609
8610 /* We have an li20 field, bits 17..20, 11..15, 21..31. */
8611 /* Top 4 bits of value to 17..20. */
8612 insn |= (relocation & 0xf0000) >> 5;
8613 /* Next 5 bits of the value to 11..15. */
8614 insn |= (relocation & 0xf800) << 5;
8615 /* And the final 11 bits of the value to bits 21 to 31. */
8616 insn |= relocation & 0x7ff;
8617
95f0d0d2 8618 bfd_put_32 (input_bfd, insn, contents + rel->r_offset);
c3301df1
AM
8619
8620 if (r_type == R_PPC_VLE_SDA21
8621 && ((relocation + 0x80000) & 0xffffffff) > 0x100000)
8622 goto overflow;
c316a17c 8623 goto copy_reloc;
b9c361e0 8624 }
6f5601c4
AM
8625 /* Fill in register field. */
8626 insn = (insn & ~RA_REGISTER_MASK) | (reg << RA_REGISTER_SHIFT);
95f0d0d2 8627 bfd_put_32 (input_bfd, insn, contents + rel->r_offset);
252b5132
RH
8628 }
8629 break;
8630
b9c361e0
JL
8631 case R_PPC_VLE_SDAREL_LO16A:
8632 case R_PPC_VLE_SDAREL_LO16D:
8633 case R_PPC_VLE_SDAREL_HI16A:
8634 case R_PPC_VLE_SDAREL_HI16D:
8635 case R_PPC_VLE_SDAREL_HA16A:
8636 case R_PPC_VLE_SDAREL_HA16D:
8637 {
8638 bfd_vma value;
8639 const char *name;
b9c361e0
JL
8640 struct elf_link_hash_entry *sda = NULL;
8641
8642 if (sec == NULL || sec->output_section == NULL)
8643 {
0a1b45a2 8644 unresolved_reloc = true;
b9c361e0
JL
8645 break;
8646 }
8647
fd361982 8648 name = bfd_section_name (sec->output_section);
93d1b056
AM
8649 if (strcmp (name, ".sdata") == 0
8650 || strcmp (name, ".sbss") == 0)
5499c7c7 8651 sda = htab->sdata[0].sym;
93d1b056
AM
8652 else if (strcmp (name, ".sdata2") == 0
8653 || strcmp (name, ".sbss2") == 0)
5499c7c7 8654 sda = htab->sdata[1].sym;
b9c361e0
JL
8655 else
8656 {
4eca0228 8657 _bfd_error_handler
695344c0 8658 /* xgettext:c-format */
871b3ab2 8659 (_("%pB: the target (%s) of a %s relocation is "
b9c361e0
JL
8660 "in the wrong output section (%s)"),
8661 input_bfd,
8662 sym_name,
8663 howto->name,
8664 name);
8665
8666 bfd_set_error (bfd_error_bad_value);
0a1b45a2 8667 ret = false;
c316a17c 8668 goto copy_reloc;
b9c361e0
JL
8669 }
8670
5499c7c7 8671 if (sda == NULL || !is_static_defined (sda))
b9c361e0 8672 {
0a1b45a2 8673 unresolved_reloc = true;
5499c7c7 8674 break;
b9c361e0 8675 }
5499c7c7 8676 value = relocation + addend - SYM_VAL (sda);
86c95733
AM
8677
8678 if (r_type == R_PPC_VLE_SDAREL_LO16A)
08dc996f
AM
8679 ppc_elf_vle_split16 (input_bfd, input_section, rel->r_offset,
8680 contents + rel->r_offset, value,
8681 split16a_type,
8682 htab->params->vle_reloc_fixup);
86c95733 8683 else if (r_type == R_PPC_VLE_SDAREL_LO16D)
08dc996f
AM
8684 ppc_elf_vle_split16 (input_bfd, input_section, rel->r_offset,
8685 contents + rel->r_offset, value,
8686 split16d_type,
8687 htab->params->vle_reloc_fixup);
86c95733 8688 else if (r_type == R_PPC_VLE_SDAREL_HI16A)
b9c361e0 8689 {
86c95733 8690 value = value >> 16;
08dc996f
AM
8691 ppc_elf_vle_split16 (input_bfd, input_section, rel->r_offset,
8692 contents + rel->r_offset, value,
8693 split16a_type,
8694 htab->params->vle_reloc_fixup);
b9c361e0 8695 }
86c95733 8696 else if (r_type == R_PPC_VLE_SDAREL_HI16D)
b9c361e0 8697 {
86c95733 8698 value = value >> 16;
08dc996f
AM
8699 ppc_elf_vle_split16 (input_bfd, input_section, rel->r_offset,
8700 contents + rel->r_offset, value,
8701 split16d_type,
8702 htab->params->vle_reloc_fixup);
b9c361e0 8703 }
86c95733 8704 else if (r_type == R_PPC_VLE_SDAREL_HA16A)
b9c361e0 8705 {
86c95733 8706 value = (value + 0x8000) >> 16;
08dc996f
AM
8707 ppc_elf_vle_split16 (input_bfd, input_section, rel->r_offset,
8708 contents + rel->r_offset, value,
8709 split16a_type,
8710 htab->params->vle_reloc_fixup);
b9c361e0 8711 }
86c95733 8712 else if (r_type == R_PPC_VLE_SDAREL_HA16D)
b9c361e0 8713 {
86c95733 8714 value = (value + 0x8000) >> 16;
08dc996f
AM
8715 ppc_elf_vle_split16 (input_bfd, input_section, rel->r_offset,
8716 contents + rel->r_offset, value,
8717 split16d_type,
8718 htab->params->vle_reloc_fixup);
b9c361e0
JL
8719 }
8720 }
c316a17c 8721 goto copy_reloc;
b9c361e0 8722
83eef883
AFB
8723 case R_PPC_VLE_ADDR20:
8724 ppc_elf_vle_split20 (output_bfd, contents + rel->r_offset, relocation);
24872cb3 8725 goto copy_reloc;
83eef883 8726
70bccea4 8727 /* Relocate against the beginning of the section. */
7619e7c7
AM
8728 case R_PPC_SECTOFF:
8729 case R_PPC_SECTOFF_LO:
8730 case R_PPC_SECTOFF_HI:
8731 case R_PPC_SECTOFF_HA:
3b4f3a11
AM
8732 if (sec == NULL || sec->output_section == NULL)
8733 {
0a1b45a2 8734 unresolved_reloc = true;
3b4f3a11
AM
8735 break;
8736 }
252b5132 8737 addend -= sec->output_section->vma;
252b5132
RH
8738 break;
8739
70bccea4 8740 /* Negative relocations. */
7619e7c7
AM
8741 case R_PPC_EMB_NADDR32:
8742 case R_PPC_EMB_NADDR16:
8743 case R_PPC_EMB_NADDR16_LO:
8744 case R_PPC_EMB_NADDR16_HI:
8745 case R_PPC_EMB_NADDR16_HA:
8da6118f 8746 addend -= 2 * relocation;
252b5132
RH
8747 break;
8748
7619e7c7
AM
8749 case R_PPC_COPY:
8750 case R_PPC_GLOB_DAT:
8751 case R_PPC_JMP_SLOT:
8752 case R_PPC_RELATIVE:
e054468f 8753 case R_PPC_IRELATIVE:
7619e7c7
AM
8754 case R_PPC_PLT32:
8755 case R_PPC_PLTREL32:
7619e7c7
AM
8756 case R_PPC_ADDR30:
8757 case R_PPC_EMB_RELSEC16:
8758 case R_PPC_EMB_RELST_LO:
8759 case R_PPC_EMB_RELST_HI:
8760 case R_PPC_EMB_RELST_HA:
8761 case R_PPC_EMB_BIT_FLD:
cf97bcb0
AM
8762 /* xgettext:c-format */
8763 _bfd_error_handler (_("%pB: %s unsupported"),
8764 input_bfd, howto->name);
252b5132
RH
8765
8766 bfd_set_error (bfd_error_invalid_operation);
0a1b45a2 8767 ret = false;
c316a17c 8768 goto copy_reloc;
7619e7c7 8769 }
252b5132 8770
252dcdf4
AM
8771 switch (r_type)
8772 {
8773 default:
8774 break;
8775
8776 case R_PPC_TPREL16_HA:
8777 if (htab->do_tls_opt && relocation + addend + 0x8000 < 0x10000)
8778 {
8779 bfd_byte *p = contents + (rel->r_offset & ~3);
8780 bfd_put_32 (input_bfd, NOP, p);
8781 }
8782 break;
8783
8784 case R_PPC_TPREL16_LO:
8785 if (htab->do_tls_opt && relocation + addend + 0x8000 < 0x10000)
8786 {
8787 bfd_byte *p = contents + (rel->r_offset & ~3);
8788 unsigned int insn = bfd_get_32 (input_bfd, p);
8789 insn &= ~(0x1f << 16);
8790 insn |= 2 << 16;
8791 bfd_put_32 (input_bfd, insn, p);
8792 }
8793 break;
8794 }
8795
23cedd1d
AM
8796 switch (r_type)
8797 {
8798 default:
8799 break;
8800
8801 case R_PPC_PLTCALL:
8802 if (unresolved_reloc)
8803 {
8804 bfd_byte *p = contents + rel->r_offset;
8805 unsigned int insn = bfd_get_32 (input_bfd, p);
8806 insn &= 1;
8807 bfd_put_32 (input_bfd, B | insn, p);
8808 unresolved_reloc = save_unresolved_reloc;
8809 r_type = R_PPC_REL24;
8810 howto = ppc_elf_howto_table[r_type];
8811 }
8812 else if (htab->plt_type != PLT_NEW)
8813 info->callbacks->einfo
482f3505 8814 (_("%X%P: %H: %s relocation unsupported for bss-plt\n"),
23cedd1d
AM
8815 input_bfd, input_section, rel->r_offset,
8816 howto->name);
8817 break;
8818
8819 case R_PPC_PLTSEQ:
8820 case R_PPC_PLT16_HA:
8821 case R_PPC_PLT16_LO:
8822 if (unresolved_reloc)
8823 {
8824 bfd_byte *p = contents + (rel->r_offset & ~3);
8825 bfd_put_32 (input_bfd, NOP, p);
0a1b45a2 8826 unresolved_reloc = false;
23cedd1d
AM
8827 r_type = R_PPC_NONE;
8828 howto = ppc_elf_howto_table[r_type];
8829 }
8830 else if (htab->plt_type != PLT_NEW)
8831 info->callbacks->einfo
482f3505 8832 (_("%X%P: %H: %s relocation unsupported for bss-plt\n"),
23cedd1d
AM
8833 input_bfd, input_section, rel->r_offset,
8834 howto->name);
8835 break;
8836 }
8837
7619e7c7
AM
8838 /* Do any further special processing. */
8839 switch (r_type)
8840 {
8841 default:
8842 break;
8843
8844 case R_PPC_ADDR16_HA:
d7128ce4 8845 case R_PPC_REL16_HA:
a680de9a 8846 case R_PPC_REL16DX_HA:
7619e7c7
AM
8847 case R_PPC_SECTOFF_HA:
8848 case R_PPC_TPREL16_HA:
8849 case R_PPC_DTPREL16_HA:
7619e7c7
AM
8850 case R_PPC_EMB_NADDR16_HA:
8851 case R_PPC_EMB_RELST_HA:
8852 /* It's just possible that this symbol is a weak symbol
7b609f53 8853 that's not actually defined anywhere. In that case,
7619e7c7
AM
8854 'sec' would be NULL, and we should leave the symbol
8855 alone (it will be set to zero elsewhere in the link). */
5c5f6e17
AM
8856 if (sec == NULL)
8857 break;
1a0670f3 8858 /* Fall through. */
5c5f6e17
AM
8859
8860 case R_PPC_PLT16_HA:
8861 case R_PPC_GOT16_HA:
8862 case R_PPC_GOT_TLSGD16_HA:
8863 case R_PPC_GOT_TLSLD16_HA:
8864 case R_PPC_GOT_TPREL16_HA:
8865 case R_PPC_GOT_DTPREL16_HA:
8866 /* Add 0x10000 if sign bit in 0:15 is set.
8867 Bits 0:15 are not used. */
8868 addend += 0x8000;
7619e7c7 8869 break;
1fe532cf
AM
8870
8871 case R_PPC_ADDR16:
8872 case R_PPC_ADDR16_LO:
8873 case R_PPC_GOT16:
8874 case R_PPC_GOT16_LO:
8875 case R_PPC_SDAREL16:
8876 case R_PPC_SECTOFF:
8877 case R_PPC_SECTOFF_LO:
8878 case R_PPC_DTPREL16:
8879 case R_PPC_DTPREL16_LO:
8880 case R_PPC_TPREL16:
8881 case R_PPC_TPREL16_LO:
8882 case R_PPC_GOT_TLSGD16:
8883 case R_PPC_GOT_TLSGD16_LO:
8884 case R_PPC_GOT_TLSLD16:
8885 case R_PPC_GOT_TLSLD16_LO:
8886 case R_PPC_GOT_DTPREL16:
8887 case R_PPC_GOT_DTPREL16_LO:
8888 case R_PPC_GOT_TPREL16:
8889 case R_PPC_GOT_TPREL16_LO:
8890 {
8891 /* The 32-bit ABI lacks proper relocations to deal with
8892 certain 64-bit instructions. Prevent damage to bits
8893 that make up part of the insn opcode. */
8894 unsigned int insn, mask, lobit;
8895
95f0d0d2 8896 insn = bfd_get_32 (input_bfd,
c316a17c 8897 contents + rel->r_offset - d_offset);
1fe532cf
AM
8898 mask = 0;
8899 if (is_insn_ds_form (insn))
8900 mask = 3;
8901 else if (is_insn_dq_form (insn))
8902 mask = 15;
8903 else
8904 break;
a680de9a
PB
8905 relocation += addend;
8906 addend = insn & mask;
8907 lobit = mask & relocation;
1fe532cf
AM
8908 if (lobit != 0)
8909 {
a680de9a 8910 relocation ^= lobit;
1fe532cf 8911 info->callbacks->einfo
695344c0 8912 /* xgettext:c-format */
174d0a74 8913 (_("%H: error: %s against `%s' not a multiple of %u\n"),
1fe532cf
AM
8914 input_bfd, input_section, rel->r_offset,
8915 howto->name, sym_name, mask + 1);
8916 bfd_set_error (bfd_error_bad_value);
0a1b45a2 8917 ret = false;
1fe532cf 8918 }
1fe532cf
AM
8919 }
8920 break;
252b5132
RH
8921 }
8922
252b5132 8923#ifdef DEBUG
55fd94b0
AM
8924 fprintf (stderr, "\ttype = %s (%d), name = %s, symbol index = %ld, "
8925 "offset = %ld, addend = %ld\n",
252b5132 8926 howto->name,
8da6118f 8927 (int) r_type,
252b5132
RH
8928 sym_name,
8929 r_symndx,
7619e7c7 8930 (long) rel->r_offset,
8da6118f 8931 (long) addend);
252b5132
RH
8932#endif
8933
7619e7c7
AM
8934 if (unresolved_reloc
8935 && !((input_section->flags & SEC_DEBUGGING) != 0
1d5316ab
AM
8936 && h->def_dynamic)
8937 && _bfd_elf_section_offset (output_bfd, info, input_section,
8938 rel->r_offset) != (bfd_vma) -1)
7619e7c7 8939 {
25f53a85 8940 info->callbacks->einfo
695344c0 8941 /* xgettext:c-format */
174d0a74 8942 (_("%H: unresolvable %s relocation against symbol `%s'\n"),
25f53a85 8943 input_bfd, input_section, rel->r_offset,
7b609f53 8944 howto->name,
7619e7c7 8945 sym_name);
0a1b45a2 8946 ret = false;
7619e7c7
AM
8947 }
8948
86c95733
AM
8949 /* 16-bit fields in insns mostly have signed values, but a
8950 few insns have 16-bit unsigned values. Really, we should
8951 have different reloc types. */
8952 if (howto->complain_on_overflow != complain_overflow_dont
8953 && howto->dst_mask == 0xffff
8954 && (input_section->flags & SEC_CODE) != 0)
8955 {
8956 enum complain_overflow complain = complain_overflow_signed;
8957
8958 if ((elf_section_flags (input_section) & SHF_PPC_VLE) == 0)
8959 {
8960 unsigned int insn;
8961
8962 insn = bfd_get_32 (input_bfd, contents + (rel->r_offset & ~3));
2365f8d7 8963 if ((insn & (0x3fu << 26)) == 10u << 26 /* cmpli */)
a47622ac 8964 complain = complain_overflow_bitfield;
2365f8d7
AM
8965 else if ((insn & (0x3fu << 26)) == 28u << 26 /* andi */
8966 || (insn & (0x3fu << 26)) == 24u << 26 /* ori */
8967 || (insn & (0x3fu << 26)) == 26u << 26 /* xori */)
86c95733
AM
8968 complain = complain_overflow_unsigned;
8969 }
8970 if (howto->complain_on_overflow != complain)
8971 {
8972 alt_howto = *howto;
8973 alt_howto.complain_on_overflow = complain;
8974 howto = &alt_howto;
8975 }
8976 }
8977
a680de9a
PB
8978 if (r_type == R_PPC_REL16DX_HA)
8979 {
8980 /* Split field reloc isn't handled by _bfd_final_link_relocate. */
8981 if (rel->r_offset + 4 > input_section->size)
8982 r = bfd_reloc_outofrange;
8983 else
8984 {
8985 unsigned int insn;
8986
8987 relocation += addend;
8988 relocation -= (rel->r_offset
8989 + input_section->output_offset
8990 + input_section->output_section->vma);
8991 relocation >>= 16;
8992 insn = bfd_get_32 (input_bfd, contents + rel->r_offset);
8993 insn &= ~0x1fffc1;
8994 insn |= (relocation & 0xffc1) | ((relocation & 0x3e) << 15);
8995 bfd_put_32 (input_bfd, insn, contents + rel->r_offset);
8996 r = bfd_reloc_ok;
8997 }
8998 }
8999 else
9000 r = _bfd_final_link_relocate (howto, input_bfd, input_section, contents,
9001 rel->r_offset, relocation, addend);
252b5132 9002
7619e7c7 9003 if (r != bfd_reloc_ok)
252b5132 9004 {
7619e7c7 9005 if (r == bfd_reloc_overflow)
252b5132 9006 {
c3301df1 9007 overflow:
8131c122
AM
9008 /* On code like "if (foo) foo();" don't report overflow
9009 on a branch to zero when foo is undefined. */
9010 if (!warned
9011 && !(h != NULL
9012 && (h->root.type == bfd_link_hash_undefweak
9013 || h->root.type == bfd_link_hash_undefined)
9014 && is_branch_reloc (r_type)))
1a72702b
AM
9015 info->callbacks->reloc_overflow
9016 (info, (h ? &h->root : NULL), sym_name, howto->name,
9017 rel->r_addend, input_bfd, input_section, rel->r_offset);
dc1bc0c9
RH
9018 }
9019 else
9020 {
25f53a85 9021 info->callbacks->einfo
695344c0 9022 /* xgettext:c-format */
174d0a74 9023 (_("%H: %s reloc against `%s': error %d\n"),
25f53a85
AM
9024 input_bfd, input_section, rel->r_offset,
9025 howto->name, sym_name, (int) r);
0a1b45a2 9026 ret = false;
252b5132
RH
9027 }
9028 }
c316a17c
AM
9029 copy_reloc:
9030 if (wrel != rel)
9031 *wrel = *rel;
9032 }
9033
9034 if (wrel != rel)
9035 {
9036 Elf_Internal_Shdr *rel_hdr;
9037 size_t deleted = rel - wrel;
9038
9039 rel_hdr = _bfd_elf_single_rel_hdr (input_section->output_section);
9040 rel_hdr->sh_size -= rel_hdr->sh_entsize * deleted;
9041 if (rel_hdr->sh_size == 0)
9042 {
9043 /* It is too late to remove an empty reloc section. Leave
9044 one NONE reloc.
9045 ??? What is wrong with an empty section??? */
9046 rel_hdr->sh_size = rel_hdr->sh_entsize;
9047 deleted -= 1;
9048 wrel++;
9049 }
9050 relend = wrel;
9051 rel_hdr = _bfd_elf_single_rel_hdr (input_section);
9052 rel_hdr->sh_size -= rel_hdr->sh_entsize * deleted;
9053 input_section->reloc_count -= deleted;
252b5132
RH
9054 }
9055
252b5132
RH
9056#ifdef DEBUG
9057 fprintf (stderr, "\n");
9058#endif
9059
53291d1f
AM
9060 if (input_section->sec_info_type == SEC_INFO_TYPE_TARGET
9061 && input_section->size != input_section->rawsize
9062 && (strcmp (input_section->output_section->name, ".init") == 0
9063 || strcmp (input_section->output_section->name, ".fini") == 0))
9064 {
9065 /* Branch around the trampolines. */
9066 unsigned int insn = B + input_section->size - input_section->rawsize;
9067 bfd_put_32 (input_bfd, insn, contents + input_section->rawsize);
9068 }
9069
5446cbdf 9070 if (htab->params->ppc476_workaround
795bc6b3 9071 && input_section->sec_info_type == SEC_INFO_TYPE_TARGET
0e1862bb 9072 && (!bfd_link_relocatable (info)
795bc6b3
AM
9073 || (input_section->output_section->alignment_power
9074 >= htab->params->pagesize_p2)))
5446cbdf 9075 {
5446cbdf 9076 bfd_vma start_addr, end_addr, addr;
795bc6b3 9077 bfd_vma pagesize = (bfd_vma) 1 << htab->params->pagesize_p2;
5446cbdf 9078
5446cbdf 9079 if (relax_info->workaround_size != 0)
40fd06d1
AM
9080 {
9081 bfd_byte *p;
9082 unsigned int n;
9083 bfd_byte fill[4];
9084
9085 bfd_put_32 (input_bfd, BA, fill);
9086 p = contents + input_section->size - relax_info->workaround_size;
9087 n = relax_info->workaround_size >> 2;
9088 while (n--)
9089 {
9090 memcpy (p, fill, 4);
9091 p += 4;
9092 }
9093 }
5446cbdf
AM
9094
9095 /* The idea is: Replace the last instruction on a page with a
9096 branch to a patch area. Put the insn there followed by a
9097 branch back to the next page. Complicated a little by
9098 needing to handle moved conditional branches, and by not
9099 wanting to touch data-in-text. */
9100
9101 start_addr = (input_section->output_section->vma
9102 + input_section->output_offset);
9103 end_addr = (start_addr + input_section->size
9104 - relax_info->workaround_size);
9105 for (addr = ((start_addr & -pagesize) + pagesize - 4);
9106 addr < end_addr;
9107 addr += pagesize)
9108 {
9109 bfd_vma offset = addr - start_addr;
9110 Elf_Internal_Rela *lo, *hi;
0a1b45a2 9111 bool is_data;
5446cbdf
AM
9112 bfd_vma patch_off, patch_addr;
9113 unsigned int insn;
9114
9115 /* Do we have a data reloc at this offset? If so, leave
9116 the word alone. */
0a1b45a2 9117 is_data = false;
5446cbdf 9118 lo = relocs;
668e22e5
AM
9119 hi = relend;
9120 rel = NULL;
5446cbdf
AM
9121 while (lo < hi)
9122 {
9123 rel = lo + (hi - lo) / 2;
9124 if (rel->r_offset < offset)
9125 lo = rel + 1;
668e22e5 9126 else if (rel->r_offset > offset + 3)
5446cbdf
AM
9127 hi = rel;
9128 else
9129 {
9130 switch (ELF32_R_TYPE (rel->r_info))
9131 {
9132 case R_PPC_ADDR32:
9133 case R_PPC_UADDR32:
9134 case R_PPC_REL32:
9135 case R_PPC_ADDR30:
0a1b45a2 9136 is_data = true;
5446cbdf
AM
9137 break;
9138 default:
9139 break;
9140 }
9141 break;
9142 }
9143 }
9144 if (is_data)
9145 continue;
9146
b4ab4364
AM
9147 /* Some instructions can be left alone too. Unconditional
9148 branches, except for bcctr with BO=0x14 (bctr, bctrl),
9149 avoid the icache failure.
9150
9151 The problem occurs due to prefetch across a page boundary
9152 where stale instructions can be fetched from the next
9153 page, and the mechanism for flushing these bad
9154 instructions fails under certain circumstances. The
9155 unconditional branches:
9156 1) Branch: b, bl, ba, bla,
9157 2) Branch Conditional: bc, bca, bcl, bcla,
9158 3) Branch Conditional to Link Register: bclr, bclrl,
9159 where (2) and (3) have BO=0x14 making them unconditional,
9160 prevent the bad prefetch because the prefetch itself is
9161 affected by these instructions. This happens even if the
9162 instruction is not executed.
9163
9164 A bctr example:
9165 .
9166 . lis 9,new_page@ha
9167 . addi 9,9,new_page@l
9168 . mtctr 9
9169 . bctr
9170 . nop
9171 . nop
9172 . new_page:
9173 .
9174 The bctr is not predicted taken due to ctr not being
9175 ready, so prefetch continues on past the bctr into the
9176 new page which might have stale instructions. If they
9177 fail to be flushed, then they will be executed after the
9178 bctr executes. Either of the following modifications
9179 prevent the bad prefetch from happening in the first
9180 place:
9181 .
1b786873
L
9182 . lis 9,new_page@ha lis 9,new_page@ha
9183 . addi 9,9,new_page@l addi 9,9,new_page@l
9184 . mtctr 9 mtctr 9
9185 . bctr bctr
b4ab4364 9186 . nop b somewhere_else
1b786873
L
9187 . b somewhere_else nop
9188 . new_page: new_page:
b4ab4364 9189 . */
5446cbdf 9190 insn = bfd_get_32 (input_bfd, contents + offset);
2365f8d7
AM
9191 if ((insn & (0x3fu << 26)) == (18u << 26) /* b,bl,ba,bla */
9192 || ((insn & (0x3fu << 26)) == (16u << 26) /* bc,bcl,bca,bcla*/
07d6d2b8 9193 && (insn & (0x14 << 21)) == (0x14 << 21)) /* with BO=0x14 */
2365f8d7 9194 || ((insn & (0x3fu << 26)) == (19u << 26)
b4ab4364 9195 && (insn & (0x3ff << 1)) == (16u << 1) /* bclr,bclrl */
07d6d2b8 9196 && (insn & (0x14 << 21)) == (0x14 << 21)))/* with BO=0x14 */
5446cbdf
AM
9197 continue;
9198
9199 patch_addr = (start_addr + input_section->size
9200 - relax_info->workaround_size);
9201 patch_addr = (patch_addr + 15) & -16;
9202 patch_off = patch_addr - start_addr;
9203 bfd_put_32 (input_bfd, B + patch_off - offset, contents + offset);
668e22e5
AM
9204
9205 if (rel != NULL
9206 && rel->r_offset >= offset
9207 && rel->r_offset < offset + 4)
9208 {
f8b44781
AM
9209 asection *sreloc;
9210
668e22e5
AM
9211 /* If the insn we are patching had a reloc, adjust the
9212 reloc r_offset so that the reloc applies to the moved
9213 location. This matters for -r and --emit-relocs. */
9214 if (rel + 1 != relend)
9215 {
9216 Elf_Internal_Rela tmp = *rel;
9217
9218 /* Keep the relocs sorted by r_offset. */
9219 memmove (rel, rel + 1, (relend - (rel + 1)) * sizeof (*rel));
9220 relend[-1] = tmp;
9221 }
9222 relend[-1].r_offset += patch_off - offset;
f8b44781
AM
9223
9224 /* Adjust REL16 addends too. */
9225 switch (ELF32_R_TYPE (relend[-1].r_info))
9226 {
9227 case R_PPC_REL16:
9228 case R_PPC_REL16_LO:
9229 case R_PPC_REL16_HI:
9230 case R_PPC_REL16_HA:
9231 relend[-1].r_addend += patch_off - offset;
9232 break;
9233 default:
9234 break;
9235 }
9236
9237 /* If we are building a PIE or shared library with
9238 non-PIC objects, perhaps we had a dynamic reloc too?
9239 If so, the dynamic reloc must move with the insn. */
9240 sreloc = elf_section_data (input_section)->sreloc;
9241 if (sreloc != NULL)
9242 {
1d5c94cb 9243 Elf32_External_Rela *slo, *shi, *srelend;
f8b44781
AM
9244 bfd_vma soffset;
9245
1d5c94cb
AM
9246 slo = (Elf32_External_Rela *) sreloc->contents;
9247 shi = srelend = slo + sreloc->reloc_count;
f8b44781
AM
9248 soffset = (offset + input_section->output_section->vma
9249 + input_section->output_offset);
9250 while (slo < shi)
9251 {
1d5c94cb
AM
9252 Elf32_External_Rela *srel = slo + (shi - slo) / 2;
9253 bfd_elf32_swap_reloca_in (output_bfd, (bfd_byte *) srel,
9254 &outrel);
f8b44781
AM
9255 if (outrel.r_offset < soffset)
9256 slo = srel + 1;
9257 else if (outrel.r_offset > soffset + 3)
9258 shi = srel;
9259 else
9260 {
1d5c94cb 9261 if (srel + 1 != srelend)
f8b44781 9262 {
1d5c94cb
AM
9263 memmove (srel, srel + 1,
9264 (srelend - (srel + 1)) * sizeof (*srel));
9265 srel = srelend - 1;
f8b44781
AM
9266 }
9267 outrel.r_offset += patch_off - offset;
1d5c94cb
AM
9268 bfd_elf32_swap_reloca_out (output_bfd, &outrel,
9269 (bfd_byte *) srel);
f8b44781
AM
9270 break;
9271 }
9272 }
9273 }
668e22e5
AM
9274 }
9275 else
9276 rel = NULL;
9277
2365f8d7 9278 if ((insn & (0x3fu << 26)) == (16u << 26) /* bc */
5446cbdf
AM
9279 && (insn & 2) == 0 /* relative */)
9280 {
9281 bfd_vma delta = ((insn & 0xfffc) ^ 0x8000) - 0x8000;
9282
9283 delta += offset - patch_off;
0e1862bb 9284 if (bfd_link_relocatable (info) && rel != NULL)
668e22e5 9285 delta = 0;
0e1862bb 9286 if (!bfd_link_relocatable (info) && rel != NULL)
668e22e5
AM
9287 {
9288 enum elf_ppc_reloc_type r_type;
9289
9290 r_type = ELF32_R_TYPE (relend[-1].r_info);
9291 if (r_type == R_PPC_REL14_BRTAKEN)
9292 insn |= BRANCH_PREDICT_BIT;
9293 else if (r_type == R_PPC_REL14_BRNTAKEN)
9294 insn &= ~BRANCH_PREDICT_BIT;
9295 else
9296 BFD_ASSERT (r_type == R_PPC_REL14);
9297
9298 if ((r_type == R_PPC_REL14_BRTAKEN
9299 || r_type == R_PPC_REL14_BRNTAKEN)
9300 && delta + 0x8000 < 0x10000
9301 && (bfd_signed_vma) delta < 0)
9302 insn ^= BRANCH_PREDICT_BIT;
9303 }
5446cbdf
AM
9304 if (delta + 0x8000 < 0x10000)
9305 {
9306 bfd_put_32 (input_bfd,
9307 (insn & ~0xfffc) | (delta & 0xfffc),
9308 contents + patch_off);
9309 patch_off += 4;
9310 bfd_put_32 (input_bfd,
9311 B | ((offset + 4 - patch_off) & 0x3fffffc),
9312 contents + patch_off);
9313 patch_off += 4;
9314 }
9315 else
9316 {
668e22e5
AM
9317 if (rel != NULL)
9318 {
9319 unsigned int r_sym = ELF32_R_SYM (relend[-1].r_info);
9320
9321 relend[-1].r_offset += 8;
9322 relend[-1].r_info = ELF32_R_INFO (r_sym, R_PPC_REL24);
9323 }
5446cbdf
AM
9324 bfd_put_32 (input_bfd,
9325 (insn & ~0xfffc) | 8,
9326 contents + patch_off);
9327 patch_off += 4;
9328 bfd_put_32 (input_bfd,
9329 B | ((offset + 4 - patch_off) & 0x3fffffc),
9330 contents + patch_off);
9331 patch_off += 4;
9332 bfd_put_32 (input_bfd,
9333 B | ((delta - 8) & 0x3fffffc),
9334 contents + patch_off);
9335 patch_off += 4;
9336 }
9337 }
9338 else
9339 {
9340 bfd_put_32 (input_bfd, insn, contents + patch_off);
9341 patch_off += 4;
9342 bfd_put_32 (input_bfd,
9343 B | ((offset + 4 - patch_off) & 0x3fffffc),
9344 contents + patch_off);
9345 patch_off += 4;
9346 }
9347 BFD_ASSERT (patch_off <= input_section->size);
9348 relax_info->workaround_size = input_section->size - patch_off;
9349 }
9350 }
9351
252b5132
RH
9352 return ret;
9353}
252b5132 9354\f
49c09209 9355/* Write out the PLT relocs and entries for H. */
c5fccbec 9356
0a1b45a2 9357static bool
49c09209 9358write_global_sym_plt (struct elf_link_hash_entry *h, void *inf)
e1a9cb8e 9359{
49c09209
AM
9360 struct bfd_link_info *info = (struct bfd_link_info *) inf;
9361 struct ppc_elf_link_hash_table *htab = ppc_elf_hash_table (info);
a6aa5195 9362 struct plt_entry *ent;
0a1b45a2 9363 bool doneone;
e1a9cb8e 9364
0a1b45a2 9365 doneone = false;
a6aa5195
AM
9366 for (ent = h->plt.plist; ent != NULL; ent = ent->next)
9367 if (ent->plt.offset != (bfd_vma) -1)
9368 {
0a1b45a2 9369 bool dyn = !use_local_plt (info, h);
30845f11 9370
a6aa5195
AM
9371 if (!doneone)
9372 {
9373 Elf_Internal_Rela rela;
9374 bfd_byte *loc;
9375 bfd_vma reloc_index;
2d7ad24e
AM
9376 asection *plt = htab->elf.splt;
9377 asection *relplt = htab->elf.srelplt;
e1a9cb8e 9378
30845f11 9379 if (htab->plt_type == PLT_NEW || !dyn)
9d8504b1
PB
9380 reloc_index = ent->plt.offset / 4;
9381 else
9382 {
9383 reloc_index = ((ent->plt.offset - htab->plt_initial_entry_size)
9384 / htab->plt_slot_size);
9385 if (reloc_index > PLT_NUM_SINGLE_ENTRIES
4a3dc543 9386 && htab->plt_type == PLT_OLD)
9d8504b1
PB
9387 reloc_index -= (reloc_index - PLT_NUM_SINGLE_ENTRIES) / 2;
9388 }
9389
a6aa5195
AM
9390 /* This symbol has an entry in the procedure linkage table.
9391 Set it up. */
30845f11 9392 if (htab->plt_type == PLT_VXWORKS && dyn)
a6aa5195 9393 {
9d8504b1
PB
9394 bfd_vma got_offset;
9395 const bfd_vma *plt_entry;
5b914448 9396
9d8504b1
PB
9397 /* The first three entries in .got.plt are reserved. */
9398 got_offset = (reloc_index + 3) * 4;
9399
9400 /* Use the right PLT. */
0e1862bb 9401 plt_entry = bfd_link_pic (info) ? ppc_elf_vxworks_pic_plt_entry
9d8504b1
PB
9402 : ppc_elf_vxworks_plt_entry;
9403
9404 /* Fill in the .plt on VxWorks. */
0e1862bb 9405 if (bfd_link_pic (info))
9d8504b1 9406 {
49c09209 9407 bfd_put_32 (info->output_bfd,
e87d4038 9408 plt_entry[0] | PPC_HA (got_offset),
2d7ad24e 9409 plt->contents + ent->plt.offset + 0);
49c09209 9410 bfd_put_32 (info->output_bfd,
e87d4038 9411 plt_entry[1] | PPC_LO (got_offset),
2d7ad24e 9412 plt->contents + ent->plt.offset + 4);
9d8504b1
PB
9413 }
9414 else
9415 {
e87d4038 9416 bfd_vma got_loc = got_offset + SYM_VAL (htab->elf.hgot);
9d8504b1 9417
49c09209 9418 bfd_put_32 (info->output_bfd,
e87d4038 9419 plt_entry[0] | PPC_HA (got_loc),
2d7ad24e 9420 plt->contents + ent->plt.offset + 0);
49c09209 9421 bfd_put_32 (info->output_bfd,
e87d4038 9422 plt_entry[1] | PPC_LO (got_loc),
2d7ad24e 9423 plt->contents + ent->plt.offset + 4);
9d8504b1
PB
9424 }
9425
49c09209 9426 bfd_put_32 (info->output_bfd, plt_entry[2],
2d7ad24e 9427 plt->contents + ent->plt.offset + 8);
49c09209 9428 bfd_put_32 (info->output_bfd, plt_entry[3],
2d7ad24e 9429 plt->contents + ent->plt.offset + 12);
9d8504b1
PB
9430
9431 /* This instruction is an immediate load. The value loaded is
9432 the byte offset of the R_PPC_JMP_SLOT relocation from the
9433 start of the .rela.plt section. The value is stored in the
9434 low-order 16 bits of the load instruction. */
9435 /* NOTE: It appears that this is now an index rather than a
9436 prescaled offset. */
49c09209 9437 bfd_put_32 (info->output_bfd,
9d8504b1 9438 plt_entry[4] | reloc_index,
2d7ad24e 9439 plt->contents + ent->plt.offset + 16);
9d8504b1
PB
9440 /* This instruction is a PC-relative branch whose target is
9441 the start of the PLT section. The address of this branch
9442 instruction is 20 bytes beyond the start of this PLT entry.
9443 The address is encoded in bits 6-29, inclusive. The value
9444 stored is right-shifted by two bits, permitting a 26-bit
9445 offset. */
49c09209 9446 bfd_put_32 (info->output_bfd,
5b914448 9447 (plt_entry[5]
9d8504b1 9448 | (-(ent->plt.offset + 20) & 0x03fffffc)),
2d7ad24e 9449 plt->contents + ent->plt.offset + 20);
49c09209 9450 bfd_put_32 (info->output_bfd, plt_entry[6],
2d7ad24e 9451 plt->contents + ent->plt.offset + 24);
49c09209 9452 bfd_put_32 (info->output_bfd, plt_entry[7],
2d7ad24e 9453 plt->contents + ent->plt.offset + 28);
9d8504b1
PB
9454
9455 /* Fill in the GOT entry corresponding to this PLT slot with
a8685210 9456 the address immediately after the "bctr" instruction
9d8504b1 9457 in this PLT entry. */
2d7ad24e
AM
9458 bfd_put_32 (info->output_bfd, (plt->output_section->vma
9459 + plt->output_offset
9460 + ent->plt.offset + 16),
ce558b89 9461 htab->elf.sgotplt->contents + got_offset);
9d8504b1 9462
0e1862bb 9463 if (!bfd_link_pic (info))
9d8504b1
PB
9464 {
9465 /* Fill in a couple of entries in .rela.plt.unloaded. */
9466 loc = htab->srelplt2->contents
9467 + ((VXWORKS_PLTRESOLVE_RELOCS + reloc_index
9468 * VXWORKS_PLT_NON_JMP_SLOT_RELOCS)
9469 * sizeof (Elf32_External_Rela));
9470
9471 /* Provide the @ha relocation for the first instruction. */
2d7ad24e
AM
9472 rela.r_offset = (plt->output_section->vma
9473 + plt->output_offset
9d8504b1 9474 + ent->plt.offset + 2);
636ce3f5 9475 rela.r_info = ELF32_R_INFO (htab->elf.hgot->indx,
9d8504b1
PB
9476 R_PPC_ADDR16_HA);
9477 rela.r_addend = got_offset;
49c09209 9478 bfd_elf32_swap_reloca_out (info->output_bfd, &rela, loc);
9d8504b1
PB
9479 loc += sizeof (Elf32_External_Rela);
9480
9481 /* Provide the @l relocation for the second instruction. */
2d7ad24e
AM
9482 rela.r_offset = (plt->output_section->vma
9483 + plt->output_offset
9d8504b1 9484 + ent->plt.offset + 6);
636ce3f5 9485 rela.r_info = ELF32_R_INFO (htab->elf.hgot->indx,
9d8504b1
PB
9486 R_PPC_ADDR16_LO);
9487 rela.r_addend = got_offset;
49c09209 9488 bfd_elf32_swap_reloca_out (info->output_bfd, &rela, loc);
9d8504b1
PB
9489 loc += sizeof (Elf32_External_Rela);
9490
9491 /* Provide a relocation for the GOT entry corresponding to this
9492 PLT slot. Point it at the middle of the .plt entry. */
ce558b89
AM
9493 rela.r_offset = (htab->elf.sgotplt->output_section->vma
9494 + htab->elf.sgotplt->output_offset
9d8504b1 9495 + got_offset);
7325306f 9496 rela.r_info = ELF32_R_INFO (htab->elf.hplt->indx,
9d8504b1
PB
9497 R_PPC_ADDR32);
9498 rela.r_addend = ent->plt.offset + 16;
49c09209 9499 bfd_elf32_swap_reloca_out (info->output_bfd, &rela, loc);
9d8504b1
PB
9500 }
9501
9502 /* VxWorks uses non-standard semantics for R_PPC_JMP_SLOT.
9503 In particular, the offset for the relocation is not the
9504 address of the PLT entry for this function, as specified
9505 by the ABI. Instead, the offset is set to the address of
9506 the GOT slot for this function. See EABI 4.4.4.1. */
ce558b89
AM
9507 rela.r_offset = (htab->elf.sgotplt->output_section->vma
9508 + htab->elf.sgotplt->output_offset
9d8504b1 9509 + got_offset);
2d7ad24e 9510 rela.r_addend = 0;
a6aa5195
AM
9511 }
9512 else
9513 {
2d7ad24e 9514 rela.r_addend = 0;
30845f11 9515 if (!dyn)
2d7ad24e
AM
9516 {
9517 if (h->type == STT_GNU_IFUNC)
9518 {
9519 plt = htab->elf.iplt;
9520 relplt = htab->elf.irelplt;
9521 }
9522 else
9523 {
9524 plt = htab->pltlocal;
9525 relplt = bfd_link_pic (info) ? htab->relpltlocal : NULL;
9526 }
9527 if (h->def_regular
9528 && (h->root.type == bfd_link_hash_defined
9529 || h->root.type == bfd_link_hash_defweak))
9530 rela.r_addend = SYM_VAL (h);
9531 }
e054468f 9532
2d7ad24e 9533 if (relplt == NULL)
9d8504b1 9534 {
2d7ad24e
AM
9535 loc = plt->contents + ent->plt.offset;
9536 bfd_put_32 (info->output_bfd, rela.r_addend, loc);
9d8504b1
PB
9537 }
9538 else
9539 {
2d7ad24e
AM
9540 rela.r_offset = (plt->output_section->vma
9541 + plt->output_offset
9542 + ent->plt.offset);
9543
30845f11 9544 if (htab->plt_type == PLT_OLD || !dyn)
2d7ad24e
AM
9545 {
9546 /* We don't need to fill in the .plt. The ppc dynamic
9547 linker will fill it in. */
9548 }
9549 else
9550 {
9551 bfd_vma val = (htab->glink_pltresolve + ent->plt.offset
9552 + htab->glink->output_section->vma
9553 + htab->glink->output_offset);
9554 bfd_put_32 (info->output_bfd, val,
9555 plt->contents + ent->plt.offset);
9556 }
9d8504b1 9557 }
a6aa5195 9558 }
e1a9cb8e 9559
2d7ad24e 9560 if (relplt != NULL)
e054468f 9561 {
2d7ad24e 9562 /* Fill in the entry in the .rela.plt section. */
30845f11 9563 if (!dyn)
2d7ad24e
AM
9564 {
9565 if (h->type == STT_GNU_IFUNC)
9566 rela.r_info = ELF32_R_INFO (0, R_PPC_IRELATIVE);
9567 else
9568 rela.r_info = ELF32_R_INFO (0, R_PPC_RELATIVE);
9569 loc = relplt->contents + (relplt->reloc_count++
9570 * sizeof (Elf32_External_Rela));
9571 htab->local_ifunc_resolver = 1;
9572 }
9573 else
9574 {
9575 rela.r_info = ELF32_R_INFO (h->dynindx, R_PPC_JMP_SLOT);
9576 loc = relplt->contents + (reloc_index
9577 * sizeof (Elf32_External_Rela));
9578 if (h->type == STT_GNU_IFUNC && is_static_defined (h))
9579 htab->maybe_local_ifunc_resolver = 1;
9580 }
9581 bfd_elf32_swap_reloca_out (info->output_bfd, &rela, loc);
82e66161 9582 }
0a1b45a2 9583 doneone = true;
a6aa5195 9584 }
e1a9cb8e 9585
30845f11 9586 if (htab->plt_type == PLT_NEW || !dyn)
a6aa5195 9587 {
a7f2871e 9588 unsigned char *p;
49c09209 9589 asection *plt = htab->elf.splt;
9e390558 9590
30845f11 9591 if (!dyn)
2d7ad24e
AM
9592 {
9593 if (h->type == STT_GNU_IFUNC)
9594 plt = htab->elf.iplt;
9595 else
9596 break;
9597 }
e1a9cb8e 9598
a7f2871e 9599 p = (unsigned char *) htab->glink->contents + ent->glink_offset;
49c09209 9600 write_glink_stub (h, ent, plt, p, info);
e1a9cb8e 9601
0e1862bb 9602 if (!bfd_link_pic (info))
e054468f
AM
9603 /* We only need one non-PIC glink stub. */
9604 break;
a6aa5195
AM
9605 }
9606 else
9607 break;
9608 }
0a1b45a2 9609 return true;
49c09209
AM
9610}
9611
9612/* Finish up PLT handling. */
9613
0a1b45a2 9614bool
49c09209
AM
9615ppc_finish_symbols (struct bfd_link_info *info)
9616{
9617 struct ppc_elf_link_hash_table *htab = ppc_elf_hash_table (info);
9618 bfd *ibfd;
9619
9620 if (!htab)
0a1b45a2 9621 return true;
49c09209
AM
9622
9623 elf_link_hash_traverse (&htab->elf, write_global_sym_plt, info);
9624
9625 for (ibfd = info->input_bfds; ibfd != NULL; ibfd = ibfd->link.next)
9626 {
9627 bfd_vma *local_got, *end_local_got;
9628 struct plt_entry **local_plt, **lplt, **end_local_plt;
9629 Elf_Internal_Shdr *symtab_hdr;
9630 bfd_size_type locsymcount;
9631 Elf_Internal_Sym *local_syms = NULL;
9632 struct plt_entry *ent;
9633
9634 if (!is_ppc_elf (ibfd))
9635 continue;
9636
9637 local_got = elf_local_got_offsets (ibfd);
9638 if (!local_got)
9639 continue;
9640
9641 symtab_hdr = &elf_symtab_hdr (ibfd);
9642 locsymcount = symtab_hdr->sh_info;
9643 end_local_got = local_got + locsymcount;
9644 local_plt = (struct plt_entry **) end_local_got;
9645 end_local_plt = local_plt + locsymcount;
9646 for (lplt = local_plt; lplt < end_local_plt; ++lplt)
9647 for (ent = *lplt; ent != NULL; ent = ent->next)
9648 {
9649 if (ent->plt.offset != (bfd_vma) -1)
9650 {
9651 Elf_Internal_Sym *sym;
9652 asection *sym_sec;
9653 asection *plt, *relplt;
9654 bfd_byte *loc;
9655 bfd_vma val;
9656 Elf_Internal_Rela rela;
8cd1fe1b 9657 unsigned char *p;
49c09209
AM
9658
9659 if (!get_sym_h (NULL, &sym, &sym_sec, NULL, &local_syms,
9660 lplt - local_plt, ibfd))
9661 {
c9594989 9662 if (symtab_hdr->contents != (unsigned char *) local_syms)
49c09209 9663 free (local_syms);
0a1b45a2 9664 return false;
49c09209
AM
9665 }
9666
9667 val = sym->st_value;
9668 if (sym_sec != NULL && sym_sec->output_section != NULL)
9669 val += sym_sec->output_offset + sym_sec->output_section->vma;
9670
2d7ad24e
AM
9671 if (ELF_ST_TYPE (sym->st_info) == STT_GNU_IFUNC)
9672 {
9673 htab->local_ifunc_resolver = 1;
9674 plt = htab->elf.iplt;
9675 relplt = htab->elf.irelplt;
9676 rela.r_info = ELF32_R_INFO (0, R_PPC_IRELATIVE);
9677 }
9678 else
9679 {
9680 plt = htab->pltlocal;
9681 if (bfd_link_pic (info))
9682 {
9683 relplt = htab->relpltlocal;
9684 rela.r_info = ELF32_R_INFO (0, R_PPC_RELATIVE);
9685 }
9686 else
9687 {
9688 loc = plt->contents + ent->plt.offset;
9689 bfd_put_32 (info->output_bfd, val, loc);
9690 continue;
9691 }
9692 }
49c09209
AM
9693
9694 rela.r_offset = (ent->plt.offset
9695 + plt->output_offset
9696 + plt->output_section->vma);
49c09209
AM
9697 rela.r_addend = val;
9698 loc = relplt->contents + (relplt->reloc_count++
9699 * sizeof (Elf32_External_Rela));
9700 bfd_elf32_swap_reloca_out (info->output_bfd, &rela, loc);
49c09209 9701
8cd1fe1b 9702 p = (unsigned char *) htab->glink->contents + ent->glink_offset;
49c09209 9703 write_glink_stub (NULL, ent, htab->elf.iplt, p, info);
49c09209
AM
9704 }
9705 }
9706
9707 if (local_syms != NULL
9708 && symtab_hdr->contents != (unsigned char *) local_syms)
9709 {
9710 if (!info->keep_memory)
9711 free (local_syms);
9712 else
9713 symtab_hdr->contents = (unsigned char *) local_syms;
9714 }
9715 }
0a1b45a2 9716 return true;
49c09209
AM
9717}
9718
9719/* Finish up dynamic symbol handling. We set the contents of various
9720 dynamic sections here. */
9721
0a1b45a2 9722static bool
49c09209
AM
9723ppc_elf_finish_dynamic_symbol (bfd *output_bfd,
9724 struct bfd_link_info *info,
9725 struct elf_link_hash_entry *h,
9726 Elf_Internal_Sym *sym)
9727{
9728 struct ppc_elf_link_hash_table *htab = ppc_elf_hash_table (info);
9729 struct plt_entry *ent;
9730
9731#ifdef DEBUG
9732 fprintf (stderr, "ppc_elf_finish_dynamic_symbol called for %s",
9733 h->root.root.string);
9734#endif
9735
9736 if (!h->def_regular
9737 || (h->type == STT_GNU_IFUNC && !bfd_link_pic (info)))
9738 for (ent = h->plt.plist; ent != NULL; ent = ent->next)
9739 if (ent->plt.offset != (bfd_vma) -1)
9740 {
9741 if (!h->def_regular)
9742 {
9743 /* Mark the symbol as undefined, rather than as
9744 defined in the .plt section. Leave the value if
9745 there were any relocations where pointer equality
9746 matters (this is a clue for the dynamic linker, to
9747 make function pointer comparisons work between an
9748 application and shared library), otherwise set it
9749 to zero. */
9750 sym->st_shndx = SHN_UNDEF;
9751 if (!h->pointer_equality_needed)
9752 sym->st_value = 0;
9753 else if (!h->ref_regular_nonweak)
9754 {
9755 /* This breaks function pointer comparisons, but
9756 that is better than breaking tests for a NULL
9757 function pointer. */
9758 sym->st_value = 0;
9759 }
9760 }
9761 else
9762 {
9763 /* Set the value of ifunc symbols in a non-pie
9764 executable to the glink entry. This is to avoid
9765 text relocations. We can't do this for ifunc in
9766 allocate_dynrelocs, as we do for normal dynamic
9767 function symbols with plt entries, because we need
9768 to keep the original value around for the ifunc
9769 relocation. */
9770 sym->st_shndx
9771 = (_bfd_elf_section_from_bfd_section
9772 (info->output_bfd, htab->glink->output_section));
9773 sym->st_value = (ent->glink_offset
9774 + htab->glink->output_offset
9775 + htab->glink->output_section->vma);
9776 }
9777 break;
9778 }
e1a9cb8e 9779
25dbc73a
AM
9780 if (h->needs_copy)
9781 {
9782 asection *s;
9783 Elf_Internal_Rela rela;
9784 bfd_byte *loc;
e1a9cb8e 9785
25dbc73a 9786 /* This symbols needs a copy reloc. Set it up. */
e1a9cb8e 9787
25dbc73a
AM
9788#ifdef DEBUG
9789 fprintf (stderr, ", copy");
9790#endif
e1a9cb8e 9791
25dbc73a 9792 BFD_ASSERT (h->dynindx != -1);
86bbe32f 9793
4dc4a9a5 9794 if (ppc_elf_hash_entry (h)->has_sda_refs)
25dbc73a 9795 s = htab->relsbss;
afbf7e8e 9796 else if (h->root.u.def.section == htab->elf.sdynrelro)
5474d94f 9797 s = htab->elf.sreldynrelro;
25dbc73a 9798 else
9d19e4fd 9799 s = htab->elf.srelbss;
25dbc73a 9800 BFD_ASSERT (s != NULL);
e1a9cb8e 9801
e87d4038 9802 rela.r_offset = SYM_VAL (h);
25dbc73a
AM
9803 rela.r_info = ELF32_R_INFO (h->dynindx, R_PPC_COPY);
9804 rela.r_addend = 0;
9805 loc = s->contents + s->reloc_count++ * sizeof (Elf32_External_Rela);
9806 bfd_elf32_swap_reloca_out (output_bfd, &rela, loc);
9807 }
e1a9cb8e 9808
25dbc73a
AM
9809#ifdef DEBUG
9810 fprintf (stderr, "\n");
9811#endif
e1a9cb8e 9812
0a1b45a2 9813 return true;
25dbc73a
AM
9814}
9815\f
9816static enum elf_reloc_type_class
7e612e98
AM
9817ppc_elf_reloc_type_class (const struct bfd_link_info *info,
9818 const asection *rel_sec,
9819 const Elf_Internal_Rela *rela)
e1a9cb8e 9820{
7e612e98
AM
9821 struct ppc_elf_link_hash_table *htab = ppc_elf_hash_table (info);
9822
ce558b89 9823 if (rel_sec == htab->elf.irelplt)
7e612e98
AM
9824 return reloc_class_ifunc;
9825
25dbc73a
AM
9826 switch (ELF32_R_TYPE (rela->r_info))
9827 {
9828 case R_PPC_RELATIVE:
9829 return reloc_class_relative;
25dbc73a
AM
9830 case R_PPC_JMP_SLOT:
9831 return reloc_class_plt;
9832 case R_PPC_COPY:
9833 return reloc_class_copy;
9834 default:
9835 return reloc_class_normal;
9836 }
e1a9cb8e 9837}
25dbc73a
AM
9838\f
9839/* Finish up the dynamic sections. */
e1a9cb8e 9840
0a1b45a2 9841static bool
25dbc73a
AM
9842ppc_elf_finish_dynamic_sections (bfd *output_bfd,
9843 struct bfd_link_info *info)
e1a9cb8e 9844{
25dbc73a
AM
9845 asection *sdyn;
9846 struct ppc_elf_link_hash_table *htab;
1fe44d79 9847 bfd_vma got;
e87d4038 9848 bfd *dynobj;
0a1b45a2 9849 bool ret = true;
e1a9cb8e 9850
25dbc73a
AM
9851#ifdef DEBUG
9852 fprintf (stderr, "ppc_elf_finish_dynamic_sections called\n");
9853#endif
6b0817e5 9854
25dbc73a 9855 htab = ppc_elf_hash_table (info);
ce558b89 9856 dynobj = htab->elf.dynobj;
3d4d4302 9857 sdyn = bfd_get_linker_section (dynobj, ".dynamic");
e1a9cb8e 9858
1fe44d79
AM
9859 got = 0;
9860 if (htab->elf.hgot != NULL)
e87d4038 9861 got = SYM_VAL (htab->elf.hgot);
1fe44d79 9862
25dbc73a 9863 if (htab->elf.dynamic_sections_created)
e1a9cb8e 9864 {
25dbc73a 9865 Elf32_External_Dyn *dyncon, *dynconend;
e1a9cb8e 9866
ce558b89 9867 BFD_ASSERT (htab->elf.splt != NULL && sdyn != NULL);
86bbe32f 9868
25dbc73a
AM
9869 dyncon = (Elf32_External_Dyn *) sdyn->contents;
9870 dynconend = (Elf32_External_Dyn *) (sdyn->contents + sdyn->size);
9871 for (; dyncon < dynconend; dyncon++)
9872 {
9873 Elf_Internal_Dyn dyn;
9874 asection *s;
e1a9cb8e 9875
9d8504b1 9876 bfd_elf32_swap_dyn_in (dynobj, dyncon, &dyn);
86bbe32f 9877
25dbc73a
AM
9878 switch (dyn.d_tag)
9879 {
9880 case DT_PLTGOT:
90c14f0c 9881 if (htab->elf.target_os == is_vxworks)
ce558b89 9882 s = htab->elf.sgotplt;
9d8504b1 9883 else
ce558b89 9884 s = htab->elf.splt;
25dbc73a
AM
9885 dyn.d_un.d_ptr = s->output_section->vma + s->output_offset;
9886 break;
86bbe32f 9887
25dbc73a 9888 case DT_PLTRELSZ:
ce558b89 9889 dyn.d_un.d_val = htab->elf.srelplt->size;
25dbc73a 9890 break;
e1a9cb8e 9891
25dbc73a 9892 case DT_JMPREL:
ce558b89 9893 s = htab->elf.srelplt;
25dbc73a
AM
9894 dyn.d_un.d_ptr = s->output_section->vma + s->output_offset;
9895 break;
2f89ff8d 9896
1fe44d79
AM
9897 case DT_PPC_GOT:
9898 dyn.d_un.d_ptr = got;
d7128ce4
AM
9899 break;
9900
82e66161
AM
9901 case DT_TEXTREL:
9902 if (htab->local_ifunc_resolver)
9903 info->callbacks->einfo
9904 (_("%X%P: text relocations and GNU indirect "
9905 "functions will result in a segfault at runtime\n"));
9906 else if (htab->maybe_local_ifunc_resolver)
9907 info->callbacks->einfo
9908 (_("%P: warning: text relocations and GNU indirect "
9909 "functions may result in a segfault at runtime\n"));
9910 continue;
9911
25dbc73a 9912 default:
90c14f0c 9913 if (htab->elf.target_os == is_vxworks
7a2b07ff
NS
9914 && elf_vxworks_finish_dynamic_entry (output_bfd, &dyn))
9915 break;
25dbc73a
AM
9916 continue;
9917 }
4c45e5c9 9918
25dbc73a
AM
9919 bfd_elf32_swap_dyn_out (output_bfd, &dyn, dyncon);
9920 }
9921 }
4c45e5c9 9922
6528b6eb
AM
9923 if (htab->elf.sgot != NULL
9924 && htab->elf.sgot->output_section != bfd_abs_section_ptr)
25dbc73a 9925 {
ce558b89
AM
9926 if (htab->elf.hgot->root.u.def.section == htab->elf.sgot
9927 || htab->elf.hgot->root.u.def.section == htab->elf.sgotplt)
e87d4038 9928 {
e79f5955 9929 unsigned char *p = htab->elf.hgot->root.u.def.section->contents;
2f89ff8d 9930
e87d4038
AM
9931 p += htab->elf.hgot->root.u.def.value;
9932 if (htab->plt_type == PLT_OLD)
e79f5955
AM
9933 {
9934 /* Add a blrl instruction at _GLOBAL_OFFSET_TABLE_-4
9935 so that a function can easily find the address of
9936 _GLOBAL_OFFSET_TABLE_. */
9937 BFD_ASSERT (htab->elf.hgot->root.u.def.value - 4
9938 < htab->elf.hgot->root.u.def.section->size);
9939 bfd_put_32 (output_bfd, 0x4e800021, p - 4);
9940 }
3b36f7e6 9941
e87d4038 9942 if (sdyn != NULL)
e79f5955
AM
9943 {
9944 bfd_vma val = sdyn->output_section->vma + sdyn->output_offset;
9945 BFD_ASSERT (htab->elf.hgot->root.u.def.value
9946 < htab->elf.hgot->root.u.def.section->size);
9947 bfd_put_32 (output_bfd, val, p);
9948 }
e87d4038
AM
9949 }
9950 else
9951 {
695344c0 9952 /* xgettext:c-format */
cf97bcb0
AM
9953 _bfd_error_handler (_("%s not defined in linker created %pA"),
9954 htab->elf.hgot->root.root.string,
9955 (htab->elf.sgotplt != NULL
9956 ? htab->elf.sgotplt : htab->elf.sgot));
e87d4038 9957 bfd_set_error (bfd_error_bad_value);
0a1b45a2 9958 ret = false;
e87d4038 9959 }
25dbc73a 9960
ce558b89 9961 elf_section_data (htab->elf.sgot->output_section)->this_hdr.sh_entsize = 4;
25dbc73a
AM
9962 }
9963
9d8504b1 9964 /* Fill in the first entry in the VxWorks procedure linkage table. */
90c14f0c 9965 if (htab->elf.target_os == is_vxworks
6528b6eb
AM
9966 && htab->elf.splt != NULL
9967 && htab->elf.splt->size != 0
9968 && htab->elf.splt->output_section != bfd_abs_section_ptr)
9d8504b1 9969 {
6528b6eb 9970 asection *splt = htab->elf.splt;
9d8504b1 9971 /* Use the right PLT. */
0e1862bb 9972 const bfd_vma *plt_entry = (bfd_link_pic (info)
5b914448
AM
9973 ? ppc_elf_vxworks_pic_plt0_entry
9974 : ppc_elf_vxworks_plt0_entry);
9d8504b1 9975
0e1862bb 9976 if (!bfd_link_pic (info))
9d8504b1 9977 {
e87d4038 9978 bfd_vma got_value = SYM_VAL (htab->elf.hgot);
9d8504b1 9979
e87d4038 9980 bfd_put_32 (output_bfd, plt_entry[0] | PPC_HA (got_value),
9d8504b1 9981 splt->contents + 0);
e87d4038 9982 bfd_put_32 (output_bfd, plt_entry[1] | PPC_LO (got_value),
9d8504b1
PB
9983 splt->contents + 4);
9984 }
9985 else
9986 {
9987 bfd_put_32 (output_bfd, plt_entry[0], splt->contents + 0);
9988 bfd_put_32 (output_bfd, plt_entry[1], splt->contents + 4);
9989 }
9990 bfd_put_32 (output_bfd, plt_entry[2], splt->contents + 8);
9991 bfd_put_32 (output_bfd, plt_entry[3], splt->contents + 12);
9992 bfd_put_32 (output_bfd, plt_entry[4], splt->contents + 16);
9993 bfd_put_32 (output_bfd, plt_entry[5], splt->contents + 20);
9994 bfd_put_32 (output_bfd, plt_entry[6], splt->contents + 24);
9995 bfd_put_32 (output_bfd, plt_entry[7], splt->contents + 28);
9996
0e1862bb 9997 if (! bfd_link_pic (info))
9d8504b1
PB
9998 {
9999 Elf_Internal_Rela rela;
10000 bfd_byte *loc;
10001
10002 loc = htab->srelplt2->contents;
10003
10004 /* Output the @ha relocation for the first instruction. */
ce558b89
AM
10005 rela.r_offset = (htab->elf.splt->output_section->vma
10006 + htab->elf.splt->output_offset
9d8504b1 10007 + 2);
636ce3f5 10008 rela.r_info = ELF32_R_INFO (htab->elf.hgot->indx, R_PPC_ADDR16_HA);
9d8504b1
PB
10009 rela.r_addend = 0;
10010 bfd_elf32_swap_reloca_out (output_bfd, &rela, loc);
10011 loc += sizeof (Elf32_External_Rela);
5b914448 10012
9d8504b1 10013 /* Output the @l relocation for the second instruction. */
ce558b89
AM
10014 rela.r_offset = (htab->elf.splt->output_section->vma
10015 + htab->elf.splt->output_offset
9d8504b1 10016 + 6);
636ce3f5 10017 rela.r_info = ELF32_R_INFO (htab->elf.hgot->indx, R_PPC_ADDR16_LO);
9d8504b1
PB
10018 rela.r_addend = 0;
10019 bfd_elf32_swap_reloca_out (output_bfd, &rela, loc);
10020 loc += sizeof (Elf32_External_Rela);
10021
10022 /* Fix up the remaining relocations. They may have the wrong
10023 symbol index for _G_O_T_ or _P_L_T_ depending on the order
10024 in which symbols were output. */
10025 while (loc < htab->srelplt2->contents + htab->srelplt2->size)
10026 {
10027 Elf_Internal_Rela rel;
10028
10029 bfd_elf32_swap_reloc_in (output_bfd, loc, &rel);
636ce3f5 10030 rel.r_info = ELF32_R_INFO (htab->elf.hgot->indx, R_PPC_ADDR16_HA);
9d8504b1
PB
10031 bfd_elf32_swap_reloc_out (output_bfd, &rel, loc);
10032 loc += sizeof (Elf32_External_Rela);
10033
10034 bfd_elf32_swap_reloc_in (output_bfd, loc, &rel);
636ce3f5 10035 rel.r_info = ELF32_R_INFO (htab->elf.hgot->indx, R_PPC_ADDR16_LO);
9d8504b1
PB
10036 bfd_elf32_swap_reloc_out (output_bfd, &rel, loc);
10037 loc += sizeof (Elf32_External_Rela);
10038
10039 bfd_elf32_swap_reloc_in (output_bfd, loc, &rel);
7325306f 10040 rel.r_info = ELF32_R_INFO (htab->elf.hplt->indx, R_PPC_ADDR32);
9d8504b1
PB
10041 bfd_elf32_swap_reloc_out (output_bfd, &rel, loc);
10042 loc += sizeof (Elf32_External_Rela);
10043 }
10044 }
10045 }
10046
e054468f
AM
10047 if (htab->glink != NULL
10048 && htab->glink->contents != NULL
10049 && htab->elf.dynamic_sections_created)
d7128ce4
AM
10050 {
10051 unsigned char *p;
10052 unsigned char *endp;
a6aa5195 10053 bfd_vma res0;
a6aa5195
AM
10054
10055 /*
10056 * PIC glink code is the following:
10057 *
10058 * # ith PLT code stub.
10059 * addis 11,30,(plt+(i-1)*4-got)@ha
10060 * lwz 11,(plt+(i-1)*4-got)@l(11)
10061 * mtctr 11
10062 * bctr
10063 *
10064 * # A table of branches, one for each plt entry.
176a0d42 10065 * # The idea is that the plt call stub loads ctr and r11 with these
a6aa5195
AM
10066 * # addresses, so (r11 - res_0) gives the plt index * 4.
10067 * res_0: b PLTresolve
10068 * res_1: b PLTresolve
10069 * .
10070 * # Some number of entries towards the end can be nops
10071 * res_n_m3: nop
10072 * res_n_m2: nop
10073 * res_n_m1:
10074 *
10075 * PLTresolve:
10076 * addis 11,11,(1f-res_0)@ha
10077 * mflr 0
10078 * bcl 20,31,1f
10079 * 1: addi 11,11,(1b-res_0)@l
10080 * mflr 12
10081 * mtlr 0
07d6d2b8 10082 * sub 11,11,12 # r11 = index * 4
a6aa5195 10083 * addis 12,12,(got+4-1b)@ha
07d6d2b8
AM
10084 * lwz 0,(got+4-1b)@l(12) # got[1] address of dl_runtime_resolve
10085 * lwz 12,(got+8-1b)@l(12) # got[2] contains the map address
a6aa5195
AM
10086 * mtctr 0
10087 * add 0,11,11
07d6d2b8 10088 * add 11,0,11 # r11 = index * 12 = reloc offset.
a6aa5195 10089 * bctr
9e390558 10090 *
176a0d42
AM
10091 * Non-PIC glink code is a little simpler.
10092 *
10093 * # ith PLT code stub.
10094 * lis 11,(plt+(i-1)*4)@ha
10095 * lwz 11,(plt+(i-1)*4)@l(11)
10096 * mtctr 11
10097 * bctr
10098 *
10099 * The branch table is the same, then comes
10100 *
10101 * PLTresolve:
10102 * lis 12,(got+4)@ha
10103 * addis 11,11,(-res_0)@ha
07d6d2b8
AM
10104 * lwz 0,(got+4)@l(12) # got[1] address of dl_runtime_resolve
10105 * addi 11,11,(-res_0)@l # r11 = index * 4
176a0d42
AM
10106 * mtctr 0
10107 * add 0,11,11
07d6d2b8
AM
10108 * lwz 12,(got+8)@l(12) # got[2] contains the map address
10109 * add 11,0,11 # r11 = index * 12 = reloc offset.
176a0d42
AM
10110 * bctr
10111 */
7e8aeb9a 10112
a6aa5195 10113 /* Build the branch table, one for each plt entry (less one),
86b9da88 10114 and perhaps some padding. */
a6aa5195
AM
10115 p = htab->glink->contents;
10116 p += htab->glink_pltresolve;
86b9da88
AM
10117 endp = htab->glink->contents;
10118 endp += htab->glink->size - GLINK_PLTRESOLVE;
da3a2088 10119 while (p < endp - (htab->params->ppc476_workaround ? 0 : 8 * 4))
86b9da88
AM
10120 {
10121 bfd_put_32 (output_bfd, B + endp - p, p);
10122 p += 4;
10123 }
10124 while (p < endp)
10125 {
10126 bfd_put_32 (output_bfd, NOP, p);
10127 p += 4;
10128 }
10129
7e8aeb9a 10130 res0 = (htab->glink_pltresolve
86b9da88
AM
10131 + htab->glink->output_section->vma
10132 + htab->glink->output_offset);
10133
da3a2088
AM
10134 if (htab->params->ppc476_workaround)
10135 {
10136 /* Ensure that a call stub at the end of a page doesn't
10137 result in prefetch over the end of the page into the
10138 glink branch table. */
10139 bfd_vma pagesize = (bfd_vma) 1 << htab->params->pagesize_p2;
10140 bfd_vma page_addr;
10141 bfd_vma glink_start = (htab->glink->output_section->vma
10142 + htab->glink->output_offset);
10143
10144 for (page_addr = res0 & -pagesize;
10145 page_addr > glink_start;
10146 page_addr -= pagesize)
10147 {
10148 /* We have a plt call stub that may need fixing. */
10149 bfd_byte *loc;
10150 unsigned int insn;
10151
10152 loc = htab->glink->contents + page_addr - 4 - glink_start;
10153 insn = bfd_get_32 (output_bfd, loc);
10154 if (insn == BCTR)
10155 {
10156 /* By alignment, we know that there must be at least
10157 one other call stub before this one. */
10158 insn = bfd_get_32 (output_bfd, loc - 16);
10159 if (insn == BCTR)
10160 bfd_put_32 (output_bfd, B | (-16 & 0x3fffffc), loc);
10161 else
10162 bfd_put_32 (output_bfd, B | (-20 & 0x3fffffc), loc);
10163 }
10164 }
10165 }
10166
86b9da88 10167 /* Last comes the PLTresolve stub. */
9e390558 10168 endp = p + GLINK_PLTRESOLVE;
0e1862bb 10169 if (bfd_link_pic (info))
7e8aeb9a 10170 {
a6aa5195 10171 bfd_vma bcl;
d7128ce4 10172
a6aa5195
AM
10173 bcl = (htab->glink->size - GLINK_PLTRESOLVE + 3*4
10174 + htab->glink->output_section->vma
10175 + htab->glink->output_offset);
10176
9e390558
AM
10177 bfd_put_32 (output_bfd, ADDIS_11_11 + PPC_HA (bcl - res0), p);
10178 p += 4;
10179 bfd_put_32 (output_bfd, MFLR_0, p);
10180 p += 4;
10181 bfd_put_32 (output_bfd, BCL_20_31, p);
10182 p += 4;
10183 bfd_put_32 (output_bfd, ADDI_11_11 + PPC_LO (bcl - res0), p);
10184 p += 4;
10185 bfd_put_32 (output_bfd, MFLR_12, p);
10186 p += 4;
10187 bfd_put_32 (output_bfd, MTLR_0, p);
10188 p += 4;
10189 bfd_put_32 (output_bfd, SUB_11_11_12, p);
10190 p += 4;
10191 bfd_put_32 (output_bfd, ADDIS_12_12 + PPC_HA (got + 4 - bcl), p);
10192 p += 4;
a6aa5195
AM
10193 if (PPC_HA (got + 4 - bcl) == PPC_HA (got + 8 - bcl))
10194 {
9e390558
AM
10195 bfd_put_32 (output_bfd, LWZ_0_12 + PPC_LO (got + 4 - bcl), p);
10196 p += 4;
10197 bfd_put_32 (output_bfd, LWZ_12_12 + PPC_LO (got + 8 - bcl), p);
10198 p += 4;
a6aa5195
AM
10199 }
10200 else
10201 {
9e390558
AM
10202 bfd_put_32 (output_bfd, LWZU_0_12 + PPC_LO (got + 4 - bcl), p);
10203 p += 4;
10204 bfd_put_32 (output_bfd, LWZ_12_12 + 4, p);
10205 p += 4;
a6aa5195 10206 }
9e390558
AM
10207 bfd_put_32 (output_bfd, MTCTR_0, p);
10208 p += 4;
10209 bfd_put_32 (output_bfd, ADD_0_11_11, p);
7e8aeb9a
AM
10210 }
10211 else
d7128ce4 10212 {
9e390558
AM
10213 bfd_put_32 (output_bfd, LIS_12 + PPC_HA (got + 4), p);
10214 p += 4;
10215 bfd_put_32 (output_bfd, ADDIS_11_11 + PPC_HA (-res0), p);
10216 p += 4;
a6aa5195 10217 if (PPC_HA (got + 4) == PPC_HA (got + 8))
9e390558 10218 bfd_put_32 (output_bfd, LWZ_0_12 + PPC_LO (got + 4), p);
a6aa5195 10219 else
9e390558
AM
10220 bfd_put_32 (output_bfd, LWZU_0_12 + PPC_LO (got + 4), p);
10221 p += 4;
10222 bfd_put_32 (output_bfd, ADDI_11_11 + PPC_LO (-res0), p);
10223 p += 4;
10224 bfd_put_32 (output_bfd, MTCTR_0, p);
10225 p += 4;
10226 bfd_put_32 (output_bfd, ADD_0_11_11, p);
10227 p += 4;
10228 if (PPC_HA (got + 4) == PPC_HA (got + 8))
10229 bfd_put_32 (output_bfd, LWZ_12_12 + PPC_LO (got + 8), p);
10230 else
10231 bfd_put_32 (output_bfd, LWZ_12_12 + 4, p);
10232 }
10233 p += 4;
10234 bfd_put_32 (output_bfd, ADD_11_0_11, p);
10235 p += 4;
407aa07c
AM
10236 bfd_put_32 (output_bfd, BCTR, p);
10237 p += 4;
9e390558
AM
10238 while (p < endp)
10239 {
10240 bfd_put_32 (output_bfd,
10241 htab->params->ppc476_workaround ? BA : NOP, p);
10242 p += 4;
d7128ce4 10243 }
9e390558 10244 BFD_ASSERT (p == endp);
d7128ce4
AM
10245 }
10246
6177242a
AM
10247 if (htab->glink_eh_frame != NULL
10248 && htab->glink_eh_frame->contents != NULL)
10249 {
10250 unsigned char *p = htab->glink_eh_frame->contents;
10251 bfd_vma val;
10252
6177242a
AM
10253 p += sizeof (glink_eh_frame_cie);
10254 /* FDE length. */
6177242a
AM
10255 p += 4;
10256 /* CIE pointer. */
6177242a
AM
10257 p += 4;
10258 /* Offset to .glink. */
10259 val = (htab->glink->output_section->vma
10260 + htab->glink->output_offset);
10261 val -= (htab->glink_eh_frame->output_section->vma
10262 + htab->glink_eh_frame->output_offset);
10263 val -= p - htab->glink_eh_frame->contents;
10264 bfd_put_32 (htab->elf.dynobj, val, p);
6177242a 10265
dbaa2011 10266 if (htab->glink_eh_frame->sec_info_type == SEC_INFO_TYPE_EH_FRAME
6177242a
AM
10267 && !_bfd_elf_write_section_eh_frame (output_bfd, info,
10268 htab->glink_eh_frame,
10269 htab->glink_eh_frame->contents))
0a1b45a2 10270 return false;
6177242a
AM
10271 }
10272
e87d4038 10273 return ret;
25dbc73a 10274}
e1a9cb8e 10275\f
6d00b590 10276#define TARGET_LITTLE_SYM powerpc_elf32_le_vec
252b5132 10277#define TARGET_LITTLE_NAME "elf32-powerpcle"
6d00b590 10278#define TARGET_BIG_SYM powerpc_elf32_vec
252b5132
RH
10279#define TARGET_BIG_NAME "elf32-powerpc"
10280#define ELF_ARCH bfd_arch_powerpc
ae95ffa6 10281#define ELF_TARGET_ID PPC32_ELF_DATA
252b5132
RH
10282#define ELF_MACHINE_CODE EM_PPC
10283#define ELF_MAXPAGESIZE 0x10000
702d1671
AM
10284#define ELF_COMMONPAGESIZE 0x1000
10285#define ELF_RELROPAGESIZE ELF_MAXPAGESIZE
252b5132
RH
10286#define elf_info_to_howto ppc_elf_info_to_howto
10287
10288#ifdef EM_CYGNUS_POWERPC
10289#define ELF_MACHINE_ALT1 EM_CYGNUS_POWERPC
10290#endif
10291
10292#ifdef EM_PPC_OLD
10293#define ELF_MACHINE_ALT2 EM_PPC_OLD
10294#endif
10295
10296#define elf_backend_plt_not_loaded 1
5474d94f 10297#define elf_backend_want_dynrelro 1
252b5132 10298#define elf_backend_can_gc_sections 1
51b64d56 10299#define elf_backend_can_refcount 1
b491616a 10300#define elf_backend_rela_normal 1
53291d1f 10301#define elf_backend_caches_rawsize 1
252b5132 10302
43c40ab2 10303#define bfd_elf32_mkobject ppc_elf_mkobject
252b5132 10304#define bfd_elf32_bfd_merge_private_bfd_data ppc_elf_merge_private_bfd_data
70bccea4 10305#define bfd_elf32_bfd_relax_section ppc_elf_relax_section
252b5132 10306#define bfd_elf32_bfd_reloc_type_lookup ppc_elf_reloc_type_lookup
b9c361e0 10307#define bfd_elf32_bfd_reloc_name_lookup ppc_elf_reloc_name_lookup
252b5132 10308#define bfd_elf32_bfd_set_private_flags ppc_elf_set_private_flags
70bccea4 10309#define bfd_elf32_bfd_link_hash_table_create ppc_elf_link_hash_table_create
468392fb 10310#define bfd_elf32_get_synthetic_symtab ppc_elf_get_synthetic_symtab
252b5132 10311
feee612b 10312#define elf_backend_object_p ppc_elf_object_p
252b5132 10313#define elf_backend_gc_mark_hook ppc_elf_gc_mark_hook
252b5132
RH
10314#define elf_backend_section_from_shdr ppc_elf_section_from_shdr
10315#define elf_backend_relocate_section ppc_elf_relocate_section
10316#define elf_backend_create_dynamic_sections ppc_elf_create_dynamic_sections
10317#define elf_backend_check_relocs ppc_elf_check_relocs
c0e331c7 10318#define elf_backend_relocs_compatible _bfd_elf_relocs_compatible
7fce784e 10319#define elf_backend_copy_indirect_symbol ppc_elf_copy_indirect_symbol
252b5132
RH
10320#define elf_backend_adjust_dynamic_symbol ppc_elf_adjust_dynamic_symbol
10321#define elf_backend_add_symbol_hook ppc_elf_add_symbol_hook
10322#define elf_backend_size_dynamic_sections ppc_elf_size_dynamic_sections
0eb4a168 10323#define elf_backend_hash_symbol ppc_elf_hash_symbol
252b5132
RH
10324#define elf_backend_finish_dynamic_symbol ppc_elf_finish_dynamic_symbol
10325#define elf_backend_finish_dynamic_sections ppc_elf_finish_dynamic_sections
10326#define elf_backend_fake_sections ppc_elf_fake_sections
10327#define elf_backend_additional_program_headers ppc_elf_additional_program_headers
954b63d4 10328#define elf_backend_modify_segment_map ppc_elf_modify_segment_map
c5fccbec
DJ
10329#define elf_backend_grok_prstatus ppc_elf_grok_prstatus
10330#define elf_backend_grok_psinfo ppc_elf_grok_psinfo
183e98be 10331#define elf_backend_write_core_note ppc_elf_write_core_note
29c2fb7c 10332#define elf_backend_reloc_type_class ppc_elf_reloc_type_class
70bccea4
AM
10333#define elf_backend_begin_write_processing ppc_elf_begin_write_processing
10334#define elf_backend_final_write_processing ppc_elf_final_write_processing
10335#define elf_backend_write_section ppc_elf_write_section
551b43fd 10336#define elf_backend_get_sec_type_attr ppc_elf_get_sec_type_attr
4c45e5c9 10337#define elf_backend_plt_sym_val ppc_elf_plt_sym_val
8a696751 10338#define elf_backend_action_discarded ppc_elf_action_discarded
74541ad4 10339#define elf_backend_init_index_section _bfd_elf_init_1_index_section
b9c361e0 10340#define elf_backend_lookup_section_flags_hook ppc_elf_lookup_section_flags
252b5132
RH
10341
10342#include "elf32-target.h"
9d8504b1 10343
7b8e7dad
AM
10344/* FreeBSD Target */
10345
10346#undef TARGET_LITTLE_SYM
10347#undef TARGET_LITTLE_NAME
10348
10349#undef TARGET_BIG_SYM
6d00b590 10350#define TARGET_BIG_SYM powerpc_elf32_fbsd_vec
7b8e7dad
AM
10351#undef TARGET_BIG_NAME
10352#define TARGET_BIG_NAME "elf32-powerpc-freebsd"
10353
10354#undef ELF_OSABI
10355#define ELF_OSABI ELFOSABI_FREEBSD
10356
10357#undef elf32_bed
10358#define elf32_bed elf32_powerpc_fbsd_bed
10359
10360#include "elf32-target.h"
10361
9d8504b1
PB
10362/* VxWorks Target */
10363
10364#undef TARGET_LITTLE_SYM
10365#undef TARGET_LITTLE_NAME
10366
10367#undef TARGET_BIG_SYM
6d00b590 10368#define TARGET_BIG_SYM powerpc_elf32_vxworks_vec
9d8504b1
PB
10369#undef TARGET_BIG_NAME
10370#define TARGET_BIG_NAME "elf32-powerpc-vxworks"
10371
7b8e7dad
AM
10372#undef ELF_OSABI
10373
90c14f0c
L
10374#undef ELF_TARGET_OS
10375#define ELF_TARGET_OS is_vxworks
10376
d5e3d971
PB
10377/* VxWorks uses the elf default section flags for .plt. */
10378static const struct bfd_elf_special_section *
4aef7643 10379ppc_elf_vxworks_get_sec_type_attr (bfd *abfd, asection *sec)
9d8504b1 10380{
d5e3d971
PB
10381 if (sec->name == NULL)
10382 return NULL;
10383
10384 if (strcmp (sec->name, ".plt") == 0)
10385 return _bfd_elf_get_sec_type_attr (abfd, sec);
10386
10387 return ppc_elf_get_sec_type_attr (abfd, sec);
10388}
9d8504b1
PB
10389
10390/* Like ppc_elf_link_hash_table_create, but overrides
10391 appropriately for VxWorks. */
10392static struct bfd_link_hash_table *
10393ppc_elf_vxworks_link_hash_table_create (bfd *abfd)
10394{
10395 struct bfd_link_hash_table *ret;
10396
10397 ret = ppc_elf_link_hash_table_create (abfd);
10398 if (ret)
10399 {
10400 struct ppc_elf_link_hash_table *htab
954b63d4 10401 = (struct ppc_elf_link_hash_table *)ret;
4a3dc543 10402 htab->plt_type = PLT_VXWORKS;
9d8504b1
PB
10403 htab->plt_entry_size = VXWORKS_PLT_ENTRY_SIZE;
10404 htab->plt_slot_size = VXWORKS_PLT_ENTRY_SIZE;
10405 htab->plt_initial_entry_size = VXWORKS_PLT_INITIAL_ENTRY_SIZE;
10406 }
10407 return ret;
10408}
10409
10410/* Tweak magic VxWorks symbols as they are loaded. */
0a1b45a2 10411static bool
9d8504b1
PB
10412ppc_elf_vxworks_add_symbol_hook (bfd *abfd,
10413 struct bfd_link_info *info,
10414 Elf_Internal_Sym *sym,
4aef7643
AM
10415 const char **namep,
10416 flagword *flagsp,
9d8504b1
PB
10417 asection **secp,
10418 bfd_vma *valp)
10419{
4aef7643
AM
10420 if (!elf_vxworks_add_symbol_hook (abfd, info, sym, namep, flagsp, secp,
10421 valp))
0a1b45a2 10422 return false;
9d8504b1 10423
4aef7643 10424 return ppc_elf_add_symbol_hook (abfd, info, sym, namep, flagsp, secp, valp);
9d8504b1
PB
10425}
10426
0a1b45a2 10427static bool
cc364be6 10428ppc_elf_vxworks_final_write_processing (bfd *abfd)
9d8504b1 10429{
cc364be6
AM
10430 ppc_final_write_processing (abfd);
10431 return elf_vxworks_final_write_processing (abfd);
9d8504b1
PB
10432}
10433
10434/* On VxWorks, we emit relocations against _PROCEDURE_LINKAGE_TABLE_, so
10435 define it. */
10436#undef elf_backend_want_plt_sym
10437#define elf_backend_want_plt_sym 1
10438#undef elf_backend_want_got_plt
10439#define elf_backend_want_got_plt 1
10440#undef elf_backend_got_symbol_offset
10441#define elf_backend_got_symbol_offset 0
10442#undef elf_backend_plt_not_loaded
10443#define elf_backend_plt_not_loaded 0
10444#undef elf_backend_plt_readonly
10445#define elf_backend_plt_readonly 1
10446#undef elf_backend_got_header_size
10447#define elf_backend_got_header_size 12
64f52338
AM
10448#undef elf_backend_dtrel_excludes_plt
10449#define elf_backend_dtrel_excludes_plt 1
9d8504b1 10450
468392fb
AM
10451#undef bfd_elf32_get_synthetic_symtab
10452
9d8504b1
PB
10453#undef bfd_elf32_bfd_link_hash_table_create
10454#define bfd_elf32_bfd_link_hash_table_create \
10455 ppc_elf_vxworks_link_hash_table_create
9d8504b1
PB
10456#undef elf_backend_add_symbol_hook
10457#define elf_backend_add_symbol_hook \
10458 ppc_elf_vxworks_add_symbol_hook
10459#undef elf_backend_link_output_symbol_hook
10460#define elf_backend_link_output_symbol_hook \
9c72ff84 10461 elf_vxworks_link_output_symbol_hook
9d8504b1
PB
10462#undef elf_backend_final_write_processing
10463#define elf_backend_final_write_processing \
10464 ppc_elf_vxworks_final_write_processing
d5e3d971
PB
10465#undef elf_backend_get_sec_type_attr
10466#define elf_backend_get_sec_type_attr \
10467 ppc_elf_vxworks_get_sec_type_attr
9d8504b1
PB
10468#undef elf_backend_emit_relocs
10469#define elf_backend_emit_relocs \
10470 elf_vxworks_emit_relocs
10471
10472#undef elf32_bed
10473#define elf32_bed ppc_elf_vxworks_bed
10474
10475#include "elf32-target.h"
This page took 2.239382 seconds and 4 git commands to generate.