Automatic date update in version.in
[deliverable/binutils-gdb.git] / bfd / elf32-ppc.c
CommitLineData
252b5132 1/* PowerPC-specific support for 32-bit ELF
b3adc24a 2 Copyright (C) 1994-2020 Free Software Foundation, Inc.
252b5132
RH
3 Written by Ian Lance Taylor, Cygnus Support.
4
ae9a127f 5 This file is part of BFD, the Binary File Descriptor library.
252b5132 6
ae9a127f
NC
7 This program is free software; you can redistribute it and/or modify
8 it under the terms of the GNU General Public License as published by
cd123cb7 9 the Free Software Foundation; either version 3 of the License, or
ae9a127f 10 (at your option) any later version.
252b5132 11
ae9a127f
NC
12 This program is distributed in the hope that it will be useful,
13 but WITHOUT ANY WARRANTY; without even the implied warranty of
14 MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
15 GNU General Public License for more details.
252b5132 16
ae9a127f 17 You should have received a copy of the GNU General Public License
fc0bffd6 18 along with this program; if not, write to the
3e110533 19 Free Software Foundation, Inc., 51 Franklin Street - Fifth Floor,
53e09e0a 20 Boston, MA 02110-1301, USA. */
252b5132 21
cd123cb7 22
252b5132
RH
23/* This file is based on a preliminary PowerPC ELF ABI. The
24 information may not match the final PowerPC ELF ABI. It includes
25 suggestions from the in-progress Embedded PowerPC ABI, and that
26 information may also not match. */
27
3db64b00 28#include "sysdep.h"
183e98be 29#include <stdarg.h>
252b5132 30#include "bfd.h"
252b5132
RH
31#include "bfdlink.h"
32#include "libbfd.h"
33#include "elf-bfd.h"
34#include "elf/ppc.h"
7619e7c7 35#include "elf32-ppc.h"
9d8504b1 36#include "elf-vxworks.h"
6177242a 37#include "dwarf2.h"
08dc996f 38#include "opcode/ppc.h"
252b5132 39
bb294208
AM
40/* All users of this file have bfd_octets_per_byte (abfd, sec) == 1. */
41#define OCTETS_PER_BYTE(ABFD, SEC) 1
42
b9c361e0
JL
43typedef enum split16_format_type
44{
45 split16a_type = 0,
46 split16d_type
47}
48split16_format_type;
49
f0fe0e16 50/* RELA relocations are used here. */
252b5132 51
252b5132 52static bfd_reloc_status_type ppc_elf_addr16_ha_reloc
55fd94b0 53 (bfd *, arelent *, asymbol *, void *, asection *, bfd *, char **);
7619e7c7 54static bfd_reloc_status_type ppc_elf_unhandled_reloc
55fd94b0 55 (bfd *, arelent *, asymbol *, void *, asection *, bfd *, char **);
252b5132 56
70bccea4
AM
57/* Branch prediction bit for branch taken relocs. */
58#define BRANCH_PREDICT_BIT 0x200000
59/* Mask to set RA in memory instructions. */
60#define RA_REGISTER_MASK 0x001f0000
61/* Value to shift register by to insert RA. */
62#define RA_REGISTER_SHIFT 16
252b5132
RH
63
64/* The name of the dynamic interpreter. This is put in the .interp
65 section. */
252b5132
RH
66#define ELF_DYNAMIC_INTERPRETER "/usr/lib/ld.so.1"
67
d7128ce4 68/* For old-style PLT. */
252b5132
RH
69/* The number of single-slot PLT entries (the rest use two slots). */
70#define PLT_NUM_SINGLE_ENTRIES 8192
71
d7128ce4 72/* For new-style .glink and .plt. */
a6aa5195 73#define GLINK_PLTRESOLVE 16*4
9e390558 74#define GLINK_ENTRY_SIZE(htab, h) \
407aa07c 75 ((4*4 \
9e390558
AM
76 + (h != NULL \
77 && h == htab->tls_get_addr \
78 && !htab->params->no_tls_get_addr_opt ? 8*4 : 0) \
79 + (1u << htab->params->plt_stub_align) - 1) \
80 & -(1u << htab->params->plt_stub_align))
d7128ce4 81
9d8504b1
PB
82/* VxWorks uses its own plt layout, filled in by the static linker. */
83
84/* The standard VxWorks PLT entry. */
85#define VXWORKS_PLT_ENTRY_SIZE 32
86static const bfd_vma ppc_elf_vxworks_plt_entry
87 [VXWORKS_PLT_ENTRY_SIZE / 4] =
88 {
07d6d2b8
AM
89 0x3d800000, /* lis r12,0 */
90 0x818c0000, /* lwz r12,0(r12) */
91 0x7d8903a6, /* mtctr r12 */
92 0x4e800420, /* bctr */
93 0x39600000, /* li r11,0 */
94 0x48000000, /* b 14 <.PLT0resolve+0x4> */
95 0x60000000, /* nop */
96 0x60000000, /* nop */
9d8504b1
PB
97 };
98static const bfd_vma ppc_elf_vxworks_pic_plt_entry
99 [VXWORKS_PLT_ENTRY_SIZE / 4] =
100 {
101 0x3d9e0000, /* addis r12,r30,0 */
102 0x818c0000, /* lwz r12,0(r12) */
103 0x7d8903a6, /* mtctr r12 */
104 0x4e800420, /* bctr */
105 0x39600000, /* li r11,0 */
106 0x48000000, /* b 14 <.PLT0resolve+0x4> 14: R_PPC_REL24 .PLTresolve */
107 0x60000000, /* nop */
108 0x60000000, /* nop */
109 };
110
111/* The initial VxWorks PLT entry. */
112#define VXWORKS_PLT_INITIAL_ENTRY_SIZE 32
113static const bfd_vma ppc_elf_vxworks_plt0_entry
114 [VXWORKS_PLT_INITIAL_ENTRY_SIZE / 4] =
115 {
07d6d2b8
AM
116 0x3d800000, /* lis r12,0 */
117 0x398c0000, /* addi r12,r12,0 */
118 0x800c0008, /* lwz r0,8(r12) */
119 0x7c0903a6, /* mtctr r0 */
120 0x818c0004, /* lwz r12,4(r12) */
121 0x4e800420, /* bctr */
122 0x60000000, /* nop */
123 0x60000000, /* nop */
9d8504b1
PB
124 };
125static const bfd_vma ppc_elf_vxworks_pic_plt0_entry
126 [VXWORKS_PLT_INITIAL_ENTRY_SIZE / 4] =
127 {
128 0x819e0008, /* lwz r12,8(r30) */
07d6d2b8 129 0x7d8903a6, /* mtctr r12 */
9d8504b1 130 0x819e0004, /* lwz r12,4(r30) */
07d6d2b8
AM
131 0x4e800420, /* bctr */
132 0x60000000, /* nop */
133 0x60000000, /* nop */
134 0x60000000, /* nop */
135 0x60000000, /* nop */
9d8504b1
PB
136 };
137
138/* For executables, we have some additional relocations in
139 .rela.plt.unloaded, for the kernel loader. */
140
141/* The number of non-JMP_SLOT relocations per PLT0 slot. */
142#define VXWORKS_PLT_NON_JMP_SLOT_RELOCS 3
143/* The number of relocations in the PLTResolve slot. */
144#define VXWORKS_PLTRESOLVE_RELOCS 2
de194d85 145/* The number of relocations in the PLTResolve slot when creating
9d8504b1
PB
146 a shared library. */
147#define VXWORKS_PLTRESOLVE_RELOCS_SHLIB 0
148
d7128ce4 149/* Some instructions. */
d7128ce4 150#define ADDIS_11_11 0x3d6b0000
a6aa5195
AM
151#define ADDIS_11_30 0x3d7e0000
152#define ADDIS_12_12 0x3d8c0000
d7128ce4 153#define ADDI_11_11 0x396b0000
d7128ce4 154#define ADD_0_11_11 0x7c0b5a14
a7f2871e 155#define ADD_3_12_2 0x7c6c1214
d7128ce4 156#define ADD_11_0_11 0x7d605a14
a6aa5195 157#define B 0x48000000
da3a2088 158#define BA 0x48000002
a6aa5195 159#define BCL_20_31 0x429f0005
d7128ce4 160#define BCTR 0x4e800420
a7f2871e
AM
161#define BEQLR 0x4d820020
162#define CMPWI_11_0 0x2c0b0000
7e8aeb9a
AM
163#define LIS_11 0x3d600000
164#define LIS_12 0x3d800000
a6aa5195
AM
165#define LWZU_0_12 0x840c0000
166#define LWZ_0_12 0x800c0000
a7f2871e 167#define LWZ_11_3 0x81630000
a6aa5195
AM
168#define LWZ_11_11 0x816b0000
169#define LWZ_11_30 0x817e0000
a7f2871e 170#define LWZ_12_3 0x81830000
a6aa5195 171#define LWZ_12_12 0x818c0000
a7f2871e
AM
172#define MR_0_3 0x7c601b78
173#define MR_3_0 0x7c030378
a6aa5195
AM
174#define MFLR_0 0x7c0802a6
175#define MFLR_12 0x7d8802a6
176#define MTCTR_0 0x7c0903a6
177#define MTCTR_11 0x7d6903a6
178#define MTLR_0 0x7c0803a6
179#define NOP 0x60000000
180#define SUB_11_11_12 0x7d6c5850
7619e7c7
AM
181
182/* Offset of tp and dtp pointers from start of TLS block. */
183#define TP_OFFSET 0x7000
184#define DTP_OFFSET 0x8000
e87d4038
AM
185
186/* The value of a defined global symbol. */
187#define SYM_VAL(SYM) \
188 ((SYM)->root.u.def.section->output_section->vma \
189 + (SYM)->root.u.def.section->output_offset \
190 + (SYM)->root.u.def.value)
7fce784e 191\f
46807bf4
AM
192/* Relocation HOWTO's. */
193/* Like other ELF RELA targets that don't apply multiple
194 field-altering relocations to the same localation, src_mask is
195 always zero and pcrel_offset is the same as pc_relative.
196 PowerPC can always use a zero bitpos, even when the field is not at
197 the LSB. For example, a REL24 could use rightshift=2, bisize=24
198 and bitpos=2 which matches the ABI description, or as we do here,
199 rightshift=0, bitsize=26 and bitpos=0. */
200#define HOW(type, size, bitsize, mask, rightshift, pc_relative, \
201 complain, special_func) \
202 HOWTO (type, rightshift, size, bitsize, pc_relative, 0, \
203 complain_overflow_ ## complain, special_func, \
204 #type, FALSE, 0, mask, pc_relative)
205
e47cd125 206static reloc_howto_type *ppc_elf_howto_table[R_PPC_max];
252b5132 207
8da6118f 208static reloc_howto_type ppc_elf_howto_raw[] = {
252b5132 209 /* This reloc does nothing. */
46807bf4
AM
210 HOW (R_PPC_NONE, 3, 0, 0, 0, FALSE, dont,
211 bfd_elf_generic_reloc),
252b5132
RH
212
213 /* A standard 32 bit relocation. */
46807bf4
AM
214 HOW (R_PPC_ADDR32, 2, 32, 0xffffffff, 0, FALSE, dont,
215 bfd_elf_generic_reloc),
252b5132
RH
216
217 /* An absolute 26 bit branch; the lower two bits must be zero.
218 FIXME: we don't check that, we just clear them. */
46807bf4
AM
219 HOW (R_PPC_ADDR24, 2, 26, 0x3fffffc, 0, FALSE, signed,
220 bfd_elf_generic_reloc),
252b5132
RH
221
222 /* A standard 16 bit relocation. */
46807bf4
AM
223 HOW (R_PPC_ADDR16, 1, 16, 0xffff, 0, FALSE, bitfield,
224 bfd_elf_generic_reloc),
252b5132
RH
225
226 /* A 16 bit relocation without overflow. */
46807bf4
AM
227 HOW (R_PPC_ADDR16_LO, 1, 16, 0xffff, 0, FALSE, dont,
228 bfd_elf_generic_reloc),
252b5132
RH
229
230 /* The high order 16 bits of an address. */
46807bf4
AM
231 HOW (R_PPC_ADDR16_HI, 1, 16, 0xffff, 16, FALSE, dont,
232 bfd_elf_generic_reloc),
252b5132
RH
233
234 /* The high order 16 bits of an address, plus 1 if the contents of
8da6118f 235 the low 16 bits, treated as a signed number, is negative. */
46807bf4
AM
236 HOW (R_PPC_ADDR16_HA, 1, 16, 0xffff, 16, FALSE, dont,
237 ppc_elf_addr16_ha_reloc),
252b5132
RH
238
239 /* An absolute 16 bit branch; the lower two bits must be zero.
240 FIXME: we don't check that, we just clear them. */
46807bf4
AM
241 HOW (R_PPC_ADDR14, 2, 16, 0xfffc, 0, FALSE, signed,
242 bfd_elf_generic_reloc),
252b5132
RH
243
244 /* An absolute 16 bit branch, for which bit 10 should be set to
245 indicate that the branch is expected to be taken. The lower two
8da6118f 246 bits must be zero. */
46807bf4
AM
247 HOW (R_PPC_ADDR14_BRTAKEN, 2, 16, 0xfffc, 0, FALSE, signed,
248 bfd_elf_generic_reloc),
252b5132
RH
249
250 /* An absolute 16 bit branch, for which bit 10 should be set to
251 indicate that the branch is not expected to be taken. The lower
252 two bits must be zero. */
46807bf4
AM
253 HOW (R_PPC_ADDR14_BRNTAKEN, 2, 16, 0xfffc, 0, FALSE, signed,
254 bfd_elf_generic_reloc),
252b5132 255
8da6118f 256 /* A relative 26 bit branch; the lower two bits must be zero. */
46807bf4
AM
257 HOW (R_PPC_REL24, 2, 26, 0x3fffffc, 0, TRUE, signed,
258 bfd_elf_generic_reloc),
252b5132 259
8da6118f 260 /* A relative 16 bit branch; the lower two bits must be zero. */
46807bf4
AM
261 HOW (R_PPC_REL14, 2, 16, 0xfffc, 0, TRUE, signed,
262 bfd_elf_generic_reloc),
252b5132 263
8da6118f 264 /* A relative 16 bit branch. Bit 10 should be set to indicate that
252b5132
RH
265 the branch is expected to be taken. The lower two bits must be
266 zero. */
46807bf4
AM
267 HOW (R_PPC_REL14_BRTAKEN, 2, 16, 0xfffc, 0, TRUE, signed,
268 bfd_elf_generic_reloc),
252b5132 269
8da6118f 270 /* A relative 16 bit branch. Bit 10 should be set to indicate that
252b5132
RH
271 the branch is not expected to be taken. The lower two bits must
272 be zero. */
46807bf4
AM
273 HOW (R_PPC_REL14_BRNTAKEN, 2, 16, 0xfffc, 0, TRUE, signed,
274 bfd_elf_generic_reloc),
252b5132
RH
275
276 /* Like R_PPC_ADDR16, but referring to the GOT table entry for the
277 symbol. */
46807bf4
AM
278 HOW (R_PPC_GOT16, 1, 16, 0xffff, 0, FALSE, signed,
279 ppc_elf_unhandled_reloc),
252b5132
RH
280
281 /* Like R_PPC_ADDR16_LO, but referring to the GOT table entry for
282 the symbol. */
46807bf4
AM
283 HOW (R_PPC_GOT16_LO, 1, 16, 0xffff, 0, FALSE, dont,
284 ppc_elf_unhandled_reloc),
252b5132
RH
285
286 /* Like R_PPC_ADDR16_HI, but referring to the GOT table entry for
287 the symbol. */
46807bf4
AM
288 HOW (R_PPC_GOT16_HI, 1, 16, 0xffff, 16, FALSE, dont,
289 ppc_elf_unhandled_reloc),
252b5132
RH
290
291 /* Like R_PPC_ADDR16_HA, but referring to the GOT table entry for
292 the symbol. */
46807bf4
AM
293 HOW (R_PPC_GOT16_HA, 1, 16, 0xffff, 16, FALSE, dont,
294 ppc_elf_unhandled_reloc),
252b5132
RH
295
296 /* Like R_PPC_REL24, but referring to the procedure linkage table
297 entry for the symbol. */
46807bf4
AM
298 HOW (R_PPC_PLTREL24, 2, 26, 0x3fffffc, 0, TRUE, signed,
299 ppc_elf_unhandled_reloc),
252b5132
RH
300
301 /* This is used only by the dynamic linker. The symbol should exist
302 both in the object being run and in some shared library. The
303 dynamic linker copies the data addressed by the symbol from the
304 shared library into the object, because the object being
305 run has to have the data at some particular address. */
46807bf4
AM
306 HOW (R_PPC_COPY, 2, 32, 0, 0, FALSE, dont,
307 ppc_elf_unhandled_reloc),
252b5132
RH
308
309 /* Like R_PPC_ADDR32, but used when setting global offset table
310 entries. */
46807bf4
AM
311 HOW (R_PPC_GLOB_DAT, 2, 32, 0xffffffff, 0, FALSE, dont,
312 ppc_elf_unhandled_reloc),
252b5132
RH
313
314 /* Marks a procedure linkage table entry for a symbol. */
46807bf4
AM
315 HOW (R_PPC_JMP_SLOT, 2, 32, 0, 0, FALSE, dont,
316 ppc_elf_unhandled_reloc),
252b5132
RH
317
318 /* Used only by the dynamic linker. When the object is run, this
319 longword is set to the load address of the object, plus the
320 addend. */
46807bf4
AM
321 HOW (R_PPC_RELATIVE, 2, 32, 0xffffffff, 0, FALSE, dont,
322 bfd_elf_generic_reloc),
252b5132
RH
323
324 /* Like R_PPC_REL24, but uses the value of the symbol within the
325 object rather than the final value. Normally used for
326 _GLOBAL_OFFSET_TABLE_. */
46807bf4
AM
327 HOW (R_PPC_LOCAL24PC, 2, 26, 0x3fffffc, 0, TRUE, signed,
328 bfd_elf_generic_reloc),
252b5132
RH
329
330 /* Like R_PPC_ADDR32, but may be unaligned. */
46807bf4
AM
331 HOW (R_PPC_UADDR32, 2, 32, 0xffffffff, 0, FALSE, dont,
332 bfd_elf_generic_reloc),
252b5132
RH
333
334 /* Like R_PPC_ADDR16, but may be unaligned. */
46807bf4
AM
335 HOW (R_PPC_UADDR16, 1, 16, 0xffff, 0, FALSE, bitfield,
336 bfd_elf_generic_reloc),
252b5132
RH
337
338 /* 32-bit PC relative */
46807bf4
AM
339 HOW (R_PPC_REL32, 2, 32, 0xffffffff, 0, TRUE, dont,
340 bfd_elf_generic_reloc),
252b5132
RH
341
342 /* 32-bit relocation to the symbol's procedure linkage table.
c3668558 343 FIXME: not supported. */
46807bf4
AM
344 HOW (R_PPC_PLT32, 2, 32, 0, 0, FALSE, dont,
345 ppc_elf_unhandled_reloc),
252b5132
RH
346
347 /* 32-bit PC relative relocation to the symbol's procedure linkage table.
c3668558 348 FIXME: not supported. */
46807bf4
AM
349 HOW (R_PPC_PLTREL32, 2, 32, 0, 0, TRUE, dont,
350 ppc_elf_unhandled_reloc),
252b5132
RH
351
352 /* Like R_PPC_ADDR16_LO, but referring to the PLT table entry for
353 the symbol. */
46807bf4
AM
354 HOW (R_PPC_PLT16_LO, 1, 16, 0xffff, 0, FALSE, dont,
355 ppc_elf_unhandled_reloc),
252b5132
RH
356
357 /* Like R_PPC_ADDR16_HI, but referring to the PLT table entry for
358 the symbol. */
46807bf4
AM
359 HOW (R_PPC_PLT16_HI, 1, 16, 0xffff, 16, FALSE, dont,
360 ppc_elf_unhandled_reloc),
252b5132
RH
361
362 /* Like R_PPC_ADDR16_HA, but referring to the PLT table entry for
363 the symbol. */
46807bf4
AM
364 HOW (R_PPC_PLT16_HA, 1, 16, 0xffff, 16, FALSE, dont,
365 ppc_elf_unhandled_reloc),
252b5132
RH
366
367 /* A sign-extended 16 bit value relative to _SDA_BASE_, for use with
368 small data items. */
46807bf4
AM
369 HOW (R_PPC_SDAREL16, 1, 16, 0xffff, 0, FALSE, signed,
370 ppc_elf_unhandled_reloc),
252b5132 371
c061c2d8 372 /* 16-bit section relative relocation. */
46807bf4
AM
373 HOW (R_PPC_SECTOFF, 1, 16, 0xffff, 0, FALSE, signed,
374 ppc_elf_unhandled_reloc),
252b5132 375
c3668558 376 /* 16-bit lower half section relative relocation. */
46807bf4
AM
377 HOW (R_PPC_SECTOFF_LO, 1, 16, 0xffff, 0, FALSE, dont,
378 ppc_elf_unhandled_reloc),
252b5132 379
c3668558 380 /* 16-bit upper half section relative relocation. */
46807bf4
AM
381 HOW (R_PPC_SECTOFF_HI, 1, 16, 0xffff, 16, FALSE, dont,
382 ppc_elf_unhandled_reloc),
252b5132 383
c3668558 384 /* 16-bit upper half adjusted section relative relocation. */
46807bf4
AM
385 HOW (R_PPC_SECTOFF_HA, 1, 16, 0xffff, 16, FALSE, dont,
386 ppc_elf_unhandled_reloc),
252b5132 387
727fc41e 388 /* Marker relocs for TLS. */
46807bf4
AM
389 HOW (R_PPC_TLS, 2, 32, 0, 0, FALSE, dont,
390 bfd_elf_generic_reloc),
391
392 HOW (R_PPC_TLSGD, 2, 32, 0, 0, FALSE, dont,
393 bfd_elf_generic_reloc),
394
395 HOW (R_PPC_TLSLD, 2, 32, 0, 0, FALSE, dont,
396 bfd_elf_generic_reloc),
727fc41e 397
23cedd1d 398 /* Marker relocs on inline plt call instructions. */
46807bf4
AM
399 HOW (R_PPC_PLTSEQ, 2, 32, 0, 0, FALSE, dont,
400 bfd_elf_generic_reloc),
401
402 HOW (R_PPC_PLTCALL, 2, 32, 0, 0, FALSE, dont,
403 bfd_elf_generic_reloc),
23cedd1d 404
7619e7c7
AM
405 /* Computes the load module index of the load module that contains the
406 definition of its TLS sym. */
46807bf4
AM
407 HOW (R_PPC_DTPMOD32, 2, 32, 0xffffffff, 0, FALSE, dont,
408 ppc_elf_unhandled_reloc),
252b5132 409
7619e7c7
AM
410 /* Computes a dtv-relative displacement, the difference between the value
411 of sym+add and the base address of the thread-local storage block that
412 contains the definition of sym, minus 0x8000. */
46807bf4
AM
413 HOW (R_PPC_DTPREL32, 2, 32, 0xffffffff, 0, FALSE, dont,
414 ppc_elf_unhandled_reloc),
7619e7c7
AM
415
416 /* A 16 bit dtprel reloc. */
46807bf4
AM
417 HOW (R_PPC_DTPREL16, 1, 16, 0xffff, 0, FALSE, signed,
418 ppc_elf_unhandled_reloc),
252b5132 419
7619e7c7 420 /* Like DTPREL16, but no overflow. */
46807bf4
AM
421 HOW (R_PPC_DTPREL16_LO, 1, 16, 0xffff, 0, FALSE, dont,
422 ppc_elf_unhandled_reloc),
252b5132 423
7619e7c7 424 /* Like DTPREL16_LO, but next higher group of 16 bits. */
46807bf4
AM
425 HOW (R_PPC_DTPREL16_HI, 1, 16, 0xffff, 16, FALSE, dont,
426 ppc_elf_unhandled_reloc),
252b5132 427
7619e7c7 428 /* Like DTPREL16_HI, but adjust for low 16 bits. */
46807bf4
AM
429 HOW (R_PPC_DTPREL16_HA, 1, 16, 0xffff, 16, FALSE, dont,
430 ppc_elf_unhandled_reloc),
252b5132 431
7619e7c7
AM
432 /* Computes a tp-relative displacement, the difference between the value of
433 sym+add and the value of the thread pointer (r13). */
46807bf4
AM
434 HOW (R_PPC_TPREL32, 2, 32, 0xffffffff, 0, FALSE, dont,
435 ppc_elf_unhandled_reloc),
7619e7c7
AM
436
437 /* A 16 bit tprel reloc. */
46807bf4
AM
438 HOW (R_PPC_TPREL16, 1, 16, 0xffff, 0, FALSE, signed,
439 ppc_elf_unhandled_reloc),
252b5132 440
7619e7c7 441 /* Like TPREL16, but no overflow. */
46807bf4
AM
442 HOW (R_PPC_TPREL16_LO, 1, 16, 0xffff, 0, FALSE, dont,
443 ppc_elf_unhandled_reloc),
252b5132 444
7619e7c7 445 /* Like TPREL16_LO, but next higher group of 16 bits. */
46807bf4
AM
446 HOW (R_PPC_TPREL16_HI, 1, 16, 0xffff, 16, FALSE, dont,
447 ppc_elf_unhandled_reloc),
7619e7c7
AM
448
449 /* Like TPREL16_HI, but adjust for low 16 bits. */
46807bf4
AM
450 HOW (R_PPC_TPREL16_HA, 1, 16, 0xffff, 16, FALSE, dont,
451 ppc_elf_unhandled_reloc),
7619e7c7
AM
452
453 /* Allocates two contiguous entries in the GOT to hold a tls_index structure,
454 with values (sym+add)@dtpmod and (sym+add)@dtprel, and computes the offset
455 to the first entry. */
46807bf4
AM
456 HOW (R_PPC_GOT_TLSGD16, 1, 16, 0xffff, 0, FALSE, signed,
457 ppc_elf_unhandled_reloc),
252b5132 458
7619e7c7 459 /* Like GOT_TLSGD16, but no overflow. */
46807bf4
AM
460 HOW (R_PPC_GOT_TLSGD16_LO, 1, 16, 0xffff, 0, FALSE, dont,
461 ppc_elf_unhandled_reloc),
252b5132 462
7619e7c7 463 /* Like GOT_TLSGD16_LO, but next higher group of 16 bits. */
46807bf4
AM
464 HOW (R_PPC_GOT_TLSGD16_HI, 1, 16, 0xffff, 16, FALSE, dont,
465 ppc_elf_unhandled_reloc),
252b5132 466
7619e7c7 467 /* Like GOT_TLSGD16_HI, but adjust for low 16 bits. */
46807bf4
AM
468 HOW (R_PPC_GOT_TLSGD16_HA, 1, 16, 0xffff, 16, FALSE, dont,
469 ppc_elf_unhandled_reloc),
7619e7c7
AM
470
471 /* Allocates two contiguous entries in the GOT to hold a tls_index structure,
472 with values (sym+add)@dtpmod and zero, and computes the offset to the
473 first entry. */
46807bf4
AM
474 HOW (R_PPC_GOT_TLSLD16, 1, 16, 0xffff, 0, FALSE, signed,
475 ppc_elf_unhandled_reloc),
252b5132 476
7619e7c7 477 /* Like GOT_TLSLD16, but no overflow. */
46807bf4
AM
478 HOW (R_PPC_GOT_TLSLD16_LO, 1, 16, 0xffff, 0, FALSE, dont,
479 ppc_elf_unhandled_reloc),
252b5132 480
7619e7c7 481 /* Like GOT_TLSLD16_LO, but next higher group of 16 bits. */
46807bf4
AM
482 HOW (R_PPC_GOT_TLSLD16_HI, 1, 16, 0xffff, 16, FALSE, dont,
483 ppc_elf_unhandled_reloc),
252b5132 484
7619e7c7 485 /* Like GOT_TLSLD16_HI, but adjust for low 16 bits. */
46807bf4
AM
486 HOW (R_PPC_GOT_TLSLD16_HA, 1, 16, 0xffff, 16, FALSE, dont,
487 ppc_elf_unhandled_reloc),
7619e7c7
AM
488
489 /* Allocates an entry in the GOT with value (sym+add)@dtprel, and computes
490 the offset to the entry. */
46807bf4
AM
491 HOW (R_PPC_GOT_DTPREL16, 1, 16, 0xffff, 0, FALSE, signed,
492 ppc_elf_unhandled_reloc),
252b5132 493
7619e7c7 494 /* Like GOT_DTPREL16, but no overflow. */
46807bf4
AM
495 HOW (R_PPC_GOT_DTPREL16_LO, 1, 16, 0xffff, 0, FALSE, dont,
496 ppc_elf_unhandled_reloc),
252b5132 497
7619e7c7 498 /* Like GOT_DTPREL16_LO, but next higher group of 16 bits. */
46807bf4
AM
499 HOW (R_PPC_GOT_DTPREL16_HI, 1, 16, 0xffff, 16, FALSE, dont,
500 ppc_elf_unhandled_reloc),
252b5132 501
7619e7c7 502 /* Like GOT_DTPREL16_HI, but adjust for low 16 bits. */
46807bf4
AM
503 HOW (R_PPC_GOT_DTPREL16_HA, 1, 16, 0xffff, 16, FALSE, dont,
504 ppc_elf_unhandled_reloc),
c3668558 505
7619e7c7
AM
506 /* Allocates an entry in the GOT with value (sym+add)@tprel, and computes the
507 offset to the entry. */
46807bf4
AM
508 HOW (R_PPC_GOT_TPREL16, 1, 16, 0xffff, 0, FALSE, signed,
509 ppc_elf_unhandled_reloc),
7619e7c7
AM
510
511 /* Like GOT_TPREL16, but no overflow. */
46807bf4
AM
512 HOW (R_PPC_GOT_TPREL16_LO, 1, 16, 0xffff, 0, FALSE, dont,
513 ppc_elf_unhandled_reloc),
7619e7c7
AM
514
515 /* Like GOT_TPREL16_LO, but next higher group of 16 bits. */
46807bf4
AM
516 HOW (R_PPC_GOT_TPREL16_HI, 1, 16, 0xffff, 16, FALSE, dont,
517 ppc_elf_unhandled_reloc),
7619e7c7
AM
518
519 /* Like GOT_TPREL16_HI, but adjust for low 16 bits. */
46807bf4
AM
520 HOW (R_PPC_GOT_TPREL16_HA, 1, 16, 0xffff, 16, FALSE, dont,
521 ppc_elf_unhandled_reloc),
7619e7c7
AM
522
523 /* The remaining relocs are from the Embedded ELF ABI, and are not
524 in the SVR4 ELF ABI. */
525
526 /* 32 bit value resulting from the addend minus the symbol. */
46807bf4
AM
527 HOW (R_PPC_EMB_NADDR32, 2, 32, 0xffffffff, 0, FALSE, dont,
528 ppc_elf_unhandled_reloc),
7619e7c7
AM
529
530 /* 16 bit value resulting from the addend minus the symbol. */
46807bf4
AM
531 HOW (R_PPC_EMB_NADDR16, 1, 16, 0xffff, 0, FALSE, signed,
532 ppc_elf_unhandled_reloc),
7619e7c7
AM
533
534 /* 16 bit value resulting from the addend minus the symbol. */
46807bf4
AM
535 HOW (R_PPC_EMB_NADDR16_LO, 1, 16, 0xffff, 0, FALSE, dont,
536 ppc_elf_unhandled_reloc),
7619e7c7
AM
537
538 /* The high order 16 bits of the addend minus the symbol. */
46807bf4
AM
539 HOW (R_PPC_EMB_NADDR16_HI, 1, 16, 0xffff, 16, FALSE, dont,
540 ppc_elf_unhandled_reloc),
7619e7c7
AM
541
542 /* The high order 16 bits of the result of the addend minus the address,
543 plus 1 if the contents of the low 16 bits, treated as a signed number,
544 is negative. */
46807bf4
AM
545 HOW (R_PPC_EMB_NADDR16_HA, 1, 16, 0xffff, 16, FALSE, dont,
546 ppc_elf_unhandled_reloc),
25dbc73a
AM
547
548 /* 16 bit value resulting from allocating a 4 byte word to hold an
549 address in the .sdata section, and returning the offset from
550 _SDA_BASE_ for that relocation. */
46807bf4
AM
551 HOW (R_PPC_EMB_SDAI16, 1, 16, 0xffff, 0, FALSE, signed,
552 ppc_elf_unhandled_reloc),
25dbc73a
AM
553
554 /* 16 bit value resulting from allocating a 4 byte word to hold an
555 address in the .sdata2 section, and returning the offset from
556 _SDA2_BASE_ for that relocation. */
46807bf4
AM
557 HOW (R_PPC_EMB_SDA2I16, 1, 16, 0xffff, 0, FALSE, signed,
558 ppc_elf_unhandled_reloc),
25dbc73a
AM
559
560 /* A sign-extended 16 bit value relative to _SDA2_BASE_, for use with
561 small data items. */
46807bf4
AM
562 HOW (R_PPC_EMB_SDA2REL, 1, 16, 0xffff, 0, FALSE, signed,
563 ppc_elf_unhandled_reloc),
25dbc73a
AM
564
565 /* Relocate against either _SDA_BASE_ or _SDA2_BASE_, filling in the 16 bit
566 signed offset from the appropriate base, and filling in the register
567 field with the appropriate register (0, 2, or 13). */
46807bf4
AM
568 HOW (R_PPC_EMB_SDA21, 2, 16, 0xffff, 0, FALSE, signed,
569 ppc_elf_unhandled_reloc),
25dbc73a
AM
570
571 /* Relocation not handled: R_PPC_EMB_MRKREF */
572 /* Relocation not handled: R_PPC_EMB_RELSEC16 */
573 /* Relocation not handled: R_PPC_EMB_RELST_LO */
574 /* Relocation not handled: R_PPC_EMB_RELST_HI */
575 /* Relocation not handled: R_PPC_EMB_RELST_HA */
576 /* Relocation not handled: R_PPC_EMB_BIT_FLD */
577
578 /* PC relative relocation against either _SDA_BASE_ or _SDA2_BASE_, filling
579 in the 16 bit signed offset from the appropriate base, and filling in the
580 register field with the appropriate register (0, 2, or 13). */
46807bf4
AM
581 HOW (R_PPC_EMB_RELSDA, 1, 16, 0xffff, 0, FALSE, signed,
582 ppc_elf_unhandled_reloc),
25dbc73a 583
b9c361e0 584 /* A relative 8 bit branch. */
46807bf4
AM
585 HOW (R_PPC_VLE_REL8, 1, 8, 0xff, 1, TRUE, signed,
586 bfd_elf_generic_reloc),
68ffbac6 587
b9c361e0 588 /* A relative 15 bit branch. */
46807bf4
AM
589 HOW (R_PPC_VLE_REL15, 2, 16, 0xfffe, 0, TRUE, signed,
590 bfd_elf_generic_reloc),
b9c361e0 591
68ffbac6 592 /* A relative 24 bit branch. */
46807bf4
AM
593 HOW (R_PPC_VLE_REL24, 2, 25, 0x1fffffe, 0, TRUE, signed,
594 bfd_elf_generic_reloc),
b9c361e0
JL
595
596 /* The 16 LSBS in split16a format. */
46807bf4
AM
597 HOW (R_PPC_VLE_LO16A, 2, 16, 0x1f07ff, 0, FALSE, dont,
598 ppc_elf_unhandled_reloc),
b9c361e0
JL
599
600 /* The 16 LSBS in split16d format. */
46807bf4
AM
601 HOW (R_PPC_VLE_LO16D, 2, 16, 0x3e007ff, 0, FALSE, dont,
602 ppc_elf_unhandled_reloc),
b9c361e0
JL
603
604 /* Bits 16-31 split16a format. */
46807bf4
AM
605 HOW (R_PPC_VLE_HI16A, 2, 16, 0x1f07ff, 16, FALSE, dont,
606 ppc_elf_unhandled_reloc),
b9c361e0
JL
607
608 /* Bits 16-31 split16d format. */
46807bf4
AM
609 HOW (R_PPC_VLE_HI16D, 2, 16, 0x3e007ff, 16, FALSE, dont,
610 ppc_elf_unhandled_reloc),
b9c361e0
JL
611
612 /* Bits 16-31 (High Adjusted) in split16a format. */
46807bf4
AM
613 HOW (R_PPC_VLE_HA16A, 2, 16, 0x1f07ff, 16, FALSE, dont,
614 ppc_elf_unhandled_reloc),
b9c361e0
JL
615
616 /* Bits 16-31 (High Adjusted) in split16d format. */
46807bf4
AM
617 HOW (R_PPC_VLE_HA16D, 2, 16, 0x3e007ff, 16, FALSE, dont,
618 ppc_elf_unhandled_reloc),
b9c361e0 619
86c95733
AM
620 /* This reloc is like R_PPC_EMB_SDA21 but only applies to e_add16i
621 instructions. If the register base is 0 then the linker changes
622 the e_add16i to an e_li instruction. */
46807bf4
AM
623 HOW (R_PPC_VLE_SDA21, 2, 16, 0xffff, 0, FALSE, signed,
624 ppc_elf_unhandled_reloc),
b9c361e0 625
86c95733 626 /* Like R_PPC_VLE_SDA21 but ignore overflow. */
46807bf4
AM
627 HOW (R_PPC_VLE_SDA21_LO, 2, 16, 0xffff, 0, FALSE, dont,
628 ppc_elf_unhandled_reloc),
b9c361e0
JL
629
630 /* The 16 LSBS relative to _SDA_BASE_ in split16a format. */
46807bf4
AM
631 HOW (R_PPC_VLE_SDAREL_LO16A, 2, 16, 0x1f07ff, 0, FALSE, dont,
632 ppc_elf_unhandled_reloc),
b9c361e0
JL
633
634 /* The 16 LSBS relative to _SDA_BASE_ in split16d format. */
46807bf4
AM
635 HOW (R_PPC_VLE_SDAREL_LO16D, 2, 16, 0x3e007ff, 0, FALSE, dont,
636 ppc_elf_unhandled_reloc),
b9c361e0
JL
637
638 /* Bits 16-31 relative to _SDA_BASE_ in split16a format. */
46807bf4
AM
639 HOW (R_PPC_VLE_SDAREL_HI16A, 2, 16, 0x1f07ff, 16, FALSE, dont,
640 ppc_elf_unhandled_reloc),
b9c361e0
JL
641
642 /* Bits 16-31 relative to _SDA_BASE_ in split16d format. */
46807bf4
AM
643 HOW (R_PPC_VLE_SDAREL_HI16D, 2, 16, 0x3e007ff, 16, FALSE, dont,
644 ppc_elf_unhandled_reloc),
b9c361e0
JL
645
646 /* Bits 16-31 (HA) relative to _SDA_BASE split16a format. */
46807bf4
AM
647 HOW (R_PPC_VLE_SDAREL_HA16A, 2, 16, 0x1f07ff, 16, FALSE, dont,
648 ppc_elf_unhandled_reloc),
b9c361e0
JL
649
650 /* Bits 16-31 (HA) relative to _SDA_BASE split16d format. */
46807bf4
AM
651 HOW (R_PPC_VLE_SDAREL_HA16D, 2, 16, 0x3e007ff, 16, FALSE, dont,
652 ppc_elf_unhandled_reloc),
b9c361e0 653
83eef883 654 /* e_li split20 format. */
bb6bf75e
AM
655 HOW (R_PPC_VLE_ADDR20, 2, 20, 0x1f7fff, 0, FALSE, dont,
656 ppc_elf_unhandled_reloc),
46807bf4
AM
657
658 HOW (R_PPC_IRELATIVE, 2, 32, 0xffffffff, 0, FALSE, dont,
659 ppc_elf_unhandled_reloc),
e054468f 660
d7128ce4 661 /* A 16 bit relative relocation. */
46807bf4
AM
662 HOW (R_PPC_REL16, 1, 16, 0xffff, 0, TRUE, signed,
663 bfd_elf_generic_reloc),
d7128ce4
AM
664
665 /* A 16 bit relative relocation without overflow. */
46807bf4
AM
666 HOW (R_PPC_REL16_LO, 1, 16, 0xffff, 0, TRUE, dont,
667 bfd_elf_generic_reloc),
d7128ce4
AM
668
669 /* The high order 16 bits of a relative address. */
46807bf4
AM
670 HOW (R_PPC_REL16_HI, 1, 16, 0xffff, 16, TRUE, dont,
671 bfd_elf_generic_reloc),
d7128ce4
AM
672
673 /* The high order 16 bits of a relative address, plus 1 if the contents of
674 the low 16 bits, treated as a signed number, is negative. */
46807bf4
AM
675 HOW (R_PPC_REL16_HA, 1, 16, 0xffff, 16, TRUE, dont,
676 ppc_elf_addr16_ha_reloc),
d7128ce4 677
a680de9a 678 /* Like R_PPC_REL16_HA but for split field in addpcis. */
46807bf4
AM
679 HOW (R_PPC_REL16DX_HA, 2, 16, 0x1fffc1, 16, TRUE, signed,
680 ppc_elf_addr16_ha_reloc),
a680de9a 681
7ba71655 682 /* A split-field reloc for addpcis, non-relative (gas internal use only). */
46807bf4
AM
683 HOW (R_PPC_16DX_HA, 2, 16, 0x1fffc1, 16, FALSE, signed,
684 ppc_elf_addr16_ha_reloc),
7ba71655 685
25dbc73a 686 /* GNU extension to record C++ vtable hierarchy. */
46807bf4
AM
687 HOW (R_PPC_GNU_VTINHERIT, 0, 0, 0, 0, FALSE, dont,
688 NULL),
25dbc73a
AM
689
690 /* GNU extension to record C++ vtable member usage. */
46807bf4
AM
691 HOW (R_PPC_GNU_VTENTRY, 0, 0, 0, 0, FALSE, dont,
692 NULL),
7619e7c7 693
25dbc73a 694 /* Phony reloc to handle AIX style TOC entries. */
46807bf4
AM
695 HOW (R_PPC_TOC16, 1, 16, 0xffff, 0, FALSE, signed,
696 ppc_elf_unhandled_reloc),
25dbc73a
AM
697};
698\f
699/* Initialize the ppc_elf_howto_table, so that linear accesses can be done. */
700
701static void
702ppc_elf_howto_init (void)
703{
704 unsigned int i, type;
705
706 for (i = 0;
707 i < sizeof (ppc_elf_howto_raw) / sizeof (ppc_elf_howto_raw[0]);
708 i++)
709 {
710 type = ppc_elf_howto_raw[i].type;
711 if (type >= (sizeof (ppc_elf_howto_table)
712 / sizeof (ppc_elf_howto_table[0])))
713 abort ();
714 ppc_elf_howto_table[type] = &ppc_elf_howto_raw[i];
715 }
716}
717
718static reloc_howto_type *
719ppc_elf_reloc_type_lookup (bfd *abfd ATTRIBUTE_UNUSED,
720 bfd_reloc_code_real_type code)
721{
722 enum elf_ppc_reloc_type r;
723
724 /* Initialize howto table if not already done. */
725 if (!ppc_elf_howto_table[R_PPC_ADDR32])
726 ppc_elf_howto_init ();
727
728 switch (code)
729 {
730 default:
731 return NULL;
732
733 case BFD_RELOC_NONE: r = R_PPC_NONE; break;
734 case BFD_RELOC_32: r = R_PPC_ADDR32; break;
735 case BFD_RELOC_PPC_BA26: r = R_PPC_ADDR24; break;
1fe532cf 736 case BFD_RELOC_PPC64_ADDR16_DS:
25dbc73a 737 case BFD_RELOC_16: r = R_PPC_ADDR16; break;
1fe532cf 738 case BFD_RELOC_PPC64_ADDR16_LO_DS:
25dbc73a
AM
739 case BFD_RELOC_LO16: r = R_PPC_ADDR16_LO; break;
740 case BFD_RELOC_HI16: r = R_PPC_ADDR16_HI; break;
741 case BFD_RELOC_HI16_S: r = R_PPC_ADDR16_HA; break;
742 case BFD_RELOC_PPC_BA16: r = R_PPC_ADDR14; break;
743 case BFD_RELOC_PPC_BA16_BRTAKEN: r = R_PPC_ADDR14_BRTAKEN; break;
744 case BFD_RELOC_PPC_BA16_BRNTAKEN: r = R_PPC_ADDR14_BRNTAKEN; break;
745 case BFD_RELOC_PPC_B26: r = R_PPC_REL24; break;
746 case BFD_RELOC_PPC_B16: r = R_PPC_REL14; break;
747 case BFD_RELOC_PPC_B16_BRTAKEN: r = R_PPC_REL14_BRTAKEN; break;
748 case BFD_RELOC_PPC_B16_BRNTAKEN: r = R_PPC_REL14_BRNTAKEN; break;
1fe532cf 749 case BFD_RELOC_PPC64_GOT16_DS:
25dbc73a 750 case BFD_RELOC_16_GOTOFF: r = R_PPC_GOT16; break;
1fe532cf 751 case BFD_RELOC_PPC64_GOT16_LO_DS:
25dbc73a
AM
752 case BFD_RELOC_LO16_GOTOFF: r = R_PPC_GOT16_LO; break;
753 case BFD_RELOC_HI16_GOTOFF: r = R_PPC_GOT16_HI; break;
754 case BFD_RELOC_HI16_S_GOTOFF: r = R_PPC_GOT16_HA; break;
755 case BFD_RELOC_24_PLT_PCREL: r = R_PPC_PLTREL24; break;
756 case BFD_RELOC_PPC_COPY: r = R_PPC_COPY; break;
757 case BFD_RELOC_PPC_GLOB_DAT: r = R_PPC_GLOB_DAT; break;
758 case BFD_RELOC_PPC_LOCAL24PC: r = R_PPC_LOCAL24PC; break;
759 case BFD_RELOC_32_PCREL: r = R_PPC_REL32; break;
760 case BFD_RELOC_32_PLTOFF: r = R_PPC_PLT32; break;
761 case BFD_RELOC_32_PLT_PCREL: r = R_PPC_PLTREL32; break;
1fe532cf 762 case BFD_RELOC_PPC64_PLT16_LO_DS:
25dbc73a
AM
763 case BFD_RELOC_LO16_PLTOFF: r = R_PPC_PLT16_LO; break;
764 case BFD_RELOC_HI16_PLTOFF: r = R_PPC_PLT16_HI; break;
765 case BFD_RELOC_HI16_S_PLTOFF: r = R_PPC_PLT16_HA; break;
766 case BFD_RELOC_GPREL16: r = R_PPC_SDAREL16; break;
1fe532cf 767 case BFD_RELOC_PPC64_SECTOFF_DS:
25dbc73a 768 case BFD_RELOC_16_BASEREL: r = R_PPC_SECTOFF; break;
1fe532cf 769 case BFD_RELOC_PPC64_SECTOFF_LO_DS:
25dbc73a
AM
770 case BFD_RELOC_LO16_BASEREL: r = R_PPC_SECTOFF_LO; break;
771 case BFD_RELOC_HI16_BASEREL: r = R_PPC_SECTOFF_HI; break;
772 case BFD_RELOC_HI16_S_BASEREL: r = R_PPC_SECTOFF_HA; break;
773 case BFD_RELOC_CTOR: r = R_PPC_ADDR32; break;
1fe532cf 774 case BFD_RELOC_PPC64_TOC16_DS:
25dbc73a
AM
775 case BFD_RELOC_PPC_TOC16: r = R_PPC_TOC16; break;
776 case BFD_RELOC_PPC_TLS: r = R_PPC_TLS; break;
727fc41e
AM
777 case BFD_RELOC_PPC_TLSGD: r = R_PPC_TLSGD; break;
778 case BFD_RELOC_PPC_TLSLD: r = R_PPC_TLSLD; break;
25dbc73a 779 case BFD_RELOC_PPC_DTPMOD: r = R_PPC_DTPMOD32; break;
1fe532cf 780 case BFD_RELOC_PPC64_TPREL16_DS:
25dbc73a 781 case BFD_RELOC_PPC_TPREL16: r = R_PPC_TPREL16; break;
1fe532cf 782 case BFD_RELOC_PPC64_TPREL16_LO_DS:
25dbc73a
AM
783 case BFD_RELOC_PPC_TPREL16_LO: r = R_PPC_TPREL16_LO; break;
784 case BFD_RELOC_PPC_TPREL16_HI: r = R_PPC_TPREL16_HI; break;
785 case BFD_RELOC_PPC_TPREL16_HA: r = R_PPC_TPREL16_HA; break;
786 case BFD_RELOC_PPC_TPREL: r = R_PPC_TPREL32; break;
1fe532cf 787 case BFD_RELOC_PPC64_DTPREL16_DS:
25dbc73a 788 case BFD_RELOC_PPC_DTPREL16: r = R_PPC_DTPREL16; break;
1fe532cf 789 case BFD_RELOC_PPC64_DTPREL16_LO_DS:
25dbc73a
AM
790 case BFD_RELOC_PPC_DTPREL16_LO: r = R_PPC_DTPREL16_LO; break;
791 case BFD_RELOC_PPC_DTPREL16_HI: r = R_PPC_DTPREL16_HI; break;
792 case BFD_RELOC_PPC_DTPREL16_HA: r = R_PPC_DTPREL16_HA; break;
793 case BFD_RELOC_PPC_DTPREL: r = R_PPC_DTPREL32; break;
794 case BFD_RELOC_PPC_GOT_TLSGD16: r = R_PPC_GOT_TLSGD16; break;
795 case BFD_RELOC_PPC_GOT_TLSGD16_LO: r = R_PPC_GOT_TLSGD16_LO; break;
796 case BFD_RELOC_PPC_GOT_TLSGD16_HI: r = R_PPC_GOT_TLSGD16_HI; break;
797 case BFD_RELOC_PPC_GOT_TLSGD16_HA: r = R_PPC_GOT_TLSGD16_HA; break;
798 case BFD_RELOC_PPC_GOT_TLSLD16: r = R_PPC_GOT_TLSLD16; break;
799 case BFD_RELOC_PPC_GOT_TLSLD16_LO: r = R_PPC_GOT_TLSLD16_LO; break;
800 case BFD_RELOC_PPC_GOT_TLSLD16_HI: r = R_PPC_GOT_TLSLD16_HI; break;
801 case BFD_RELOC_PPC_GOT_TLSLD16_HA: r = R_PPC_GOT_TLSLD16_HA; break;
802 case BFD_RELOC_PPC_GOT_TPREL16: r = R_PPC_GOT_TPREL16; break;
803 case BFD_RELOC_PPC_GOT_TPREL16_LO: r = R_PPC_GOT_TPREL16_LO; break;
804 case BFD_RELOC_PPC_GOT_TPREL16_HI: r = R_PPC_GOT_TPREL16_HI; break;
805 case BFD_RELOC_PPC_GOT_TPREL16_HA: r = R_PPC_GOT_TPREL16_HA; break;
806 case BFD_RELOC_PPC_GOT_DTPREL16: r = R_PPC_GOT_DTPREL16; break;
807 case BFD_RELOC_PPC_GOT_DTPREL16_LO: r = R_PPC_GOT_DTPREL16_LO; break;
808 case BFD_RELOC_PPC_GOT_DTPREL16_HI: r = R_PPC_GOT_DTPREL16_HI; break;
809 case BFD_RELOC_PPC_GOT_DTPREL16_HA: r = R_PPC_GOT_DTPREL16_HA; break;
810 case BFD_RELOC_PPC_EMB_NADDR32: r = R_PPC_EMB_NADDR32; break;
811 case BFD_RELOC_PPC_EMB_NADDR16: r = R_PPC_EMB_NADDR16; break;
812 case BFD_RELOC_PPC_EMB_NADDR16_LO: r = R_PPC_EMB_NADDR16_LO; break;
813 case BFD_RELOC_PPC_EMB_NADDR16_HI: r = R_PPC_EMB_NADDR16_HI; break;
814 case BFD_RELOC_PPC_EMB_NADDR16_HA: r = R_PPC_EMB_NADDR16_HA; break;
815 case BFD_RELOC_PPC_EMB_SDAI16: r = R_PPC_EMB_SDAI16; break;
816 case BFD_RELOC_PPC_EMB_SDA2I16: r = R_PPC_EMB_SDA2I16; break;
817 case BFD_RELOC_PPC_EMB_SDA2REL: r = R_PPC_EMB_SDA2REL; break;
818 case BFD_RELOC_PPC_EMB_SDA21: r = R_PPC_EMB_SDA21; break;
819 case BFD_RELOC_PPC_EMB_MRKREF: r = R_PPC_EMB_MRKREF; break;
820 case BFD_RELOC_PPC_EMB_RELSEC16: r = R_PPC_EMB_RELSEC16; break;
821 case BFD_RELOC_PPC_EMB_RELST_LO: r = R_PPC_EMB_RELST_LO; break;
822 case BFD_RELOC_PPC_EMB_RELST_HI: r = R_PPC_EMB_RELST_HI; break;
823 case BFD_RELOC_PPC_EMB_RELST_HA: r = R_PPC_EMB_RELST_HA; break;
824 case BFD_RELOC_PPC_EMB_BIT_FLD: r = R_PPC_EMB_BIT_FLD; break;
825 case BFD_RELOC_PPC_EMB_RELSDA: r = R_PPC_EMB_RELSDA; break;
b9c361e0
JL
826 case BFD_RELOC_PPC_VLE_REL8: r = R_PPC_VLE_REL8; break;
827 case BFD_RELOC_PPC_VLE_REL15: r = R_PPC_VLE_REL15; break;
828 case BFD_RELOC_PPC_VLE_REL24: r = R_PPC_VLE_REL24; break;
829 case BFD_RELOC_PPC_VLE_LO16A: r = R_PPC_VLE_LO16A; break;
830 case BFD_RELOC_PPC_VLE_LO16D: r = R_PPC_VLE_LO16D; break;
831 case BFD_RELOC_PPC_VLE_HI16A: r = R_PPC_VLE_HI16A; break;
832 case BFD_RELOC_PPC_VLE_HI16D: r = R_PPC_VLE_HI16D; break;
833 case BFD_RELOC_PPC_VLE_HA16A: r = R_PPC_VLE_HA16A; break;
834 case BFD_RELOC_PPC_VLE_HA16D: r = R_PPC_VLE_HA16D; break;
835 case BFD_RELOC_PPC_VLE_SDA21: r = R_PPC_VLE_SDA21; break;
836 case BFD_RELOC_PPC_VLE_SDA21_LO: r = R_PPC_VLE_SDA21_LO; break;
837 case BFD_RELOC_PPC_VLE_SDAREL_LO16A:
838 r = R_PPC_VLE_SDAREL_LO16A;
839 break;
840 case BFD_RELOC_PPC_VLE_SDAREL_LO16D:
841 r = R_PPC_VLE_SDAREL_LO16D;
842 break;
843 case BFD_RELOC_PPC_VLE_SDAREL_HI16A:
844 r = R_PPC_VLE_SDAREL_HI16A;
845 break;
846 case BFD_RELOC_PPC_VLE_SDAREL_HI16D:
847 r = R_PPC_VLE_SDAREL_HI16D;
848 break;
849 case BFD_RELOC_PPC_VLE_SDAREL_HA16A:
850 r = R_PPC_VLE_SDAREL_HA16A;
851 break;
852 case BFD_RELOC_PPC_VLE_SDAREL_HA16D:
853 r = R_PPC_VLE_SDAREL_HA16D;
854 break;
d7128ce4
AM
855 case BFD_RELOC_16_PCREL: r = R_PPC_REL16; break;
856 case BFD_RELOC_LO16_PCREL: r = R_PPC_REL16_LO; break;
857 case BFD_RELOC_HI16_PCREL: r = R_PPC_REL16_HI; break;
858 case BFD_RELOC_HI16_S_PCREL: r = R_PPC_REL16_HA; break;
7ba71655 859 case BFD_RELOC_PPC_16DX_HA: r = R_PPC_16DX_HA; break;
a680de9a 860 case BFD_RELOC_PPC_REL16DX_HA: r = R_PPC_REL16DX_HA; break;
25dbc73a
AM
861 case BFD_RELOC_VTABLE_INHERIT: r = R_PPC_GNU_VTINHERIT; break;
862 case BFD_RELOC_VTABLE_ENTRY: r = R_PPC_GNU_VTENTRY; break;
863 }
864
865 return ppc_elf_howto_table[r];
866};
867
157090f7
AM
868static reloc_howto_type *
869ppc_elf_reloc_name_lookup (bfd *abfd ATTRIBUTE_UNUSED,
870 const char *r_name)
871{
872 unsigned int i;
873
874 for (i = 0;
875 i < sizeof (ppc_elf_howto_raw) / sizeof (ppc_elf_howto_raw[0]);
876 i++)
877 if (ppc_elf_howto_raw[i].name != NULL
878 && strcasecmp (ppc_elf_howto_raw[i].name, r_name) == 0)
879 return &ppc_elf_howto_raw[i];
880
881 return NULL;
882}
883
25dbc73a
AM
884/* Set the howto pointer for a PowerPC ELF reloc. */
885
f3185997 886static bfd_boolean
4aef7643 887ppc_elf_info_to_howto (bfd *abfd,
25dbc73a
AM
888 arelent *cache_ptr,
889 Elf_Internal_Rela *dst)
890{
cd21f5da
NC
891 unsigned int r_type;
892
25dbc73a
AM
893 /* Initialize howto table if not already done. */
894 if (!ppc_elf_howto_table[R_PPC_ADDR32])
895 ppc_elf_howto_init ();
896
cd21f5da
NC
897 r_type = ELF32_R_TYPE (dst->r_info);
898 if (r_type >= R_PPC_max)
899 {
695344c0 900 /* xgettext:c-format */
0aa13fee 901 _bfd_error_handler (_("%pB: unsupported relocation type %#x"),
4eca0228 902 abfd, r_type);
cd21f5da 903 bfd_set_error (bfd_error_bad_value);
f3185997 904 return FALSE;
cd21f5da 905 }
f3185997 906
cd21f5da 907 cache_ptr->howto = ppc_elf_howto_table[r_type];
375de94a
AM
908
909 /* Just because the above assert didn't trigger doesn't mean that
910 ELF32_R_TYPE (dst->r_info) is necessarily a valid relocation. */
f3185997 911 if (cache_ptr->howto == NULL)
375de94a 912 {
695344c0 913 /* xgettext:c-format */
0aa13fee 914 _bfd_error_handler (_("%pB: unsupported relocation type %#x"),
4eca0228 915 abfd, r_type);
375de94a
AM
916 bfd_set_error (bfd_error_bad_value);
917
f3185997 918 return FALSE;
375de94a 919 }
f3185997
NC
920
921 return TRUE;
25dbc73a
AM
922}
923
d7128ce4 924/* Handle the R_PPC_ADDR16_HA and R_PPC_REL16_HA relocs. */
25dbc73a
AM
925
926static bfd_reloc_status_type
4aef7643 927ppc_elf_addr16_ha_reloc (bfd *abfd,
25dbc73a
AM
928 arelent *reloc_entry,
929 asymbol *symbol,
4aef7643 930 void *data,
25dbc73a
AM
931 asection *input_section,
932 bfd *output_bfd,
933 char **error_message ATTRIBUTE_UNUSED)
934{
a680de9a
PB
935 enum elf_ppc_reloc_type r_type;
936 long insn;
937 bfd_size_type octets;
938 bfd_vma value;
25dbc73a
AM
939
940 if (output_bfd != NULL)
941 {
942 reloc_entry->address += input_section->output_offset;
943 return bfd_reloc_ok;
944 }
945
a680de9a
PB
946 reloc_entry->addend += 0x8000;
947 r_type = reloc_entry->howto->type;
948 if (r_type != R_PPC_REL16DX_HA)
949 return bfd_reloc_continue;
950
951 value = 0;
952 if (!bfd_is_com_section (symbol->section))
953 value = symbol->value;
954 value += (reloc_entry->addend
955 + symbol->section->output_offset
956 + symbol->section->output_section->vma);
957 value -= (reloc_entry->address
958 + input_section->output_offset
959 + input_section->output_section->vma);
960 value >>= 16;
961
bb294208 962 octets = reloc_entry->address * OCTETS_PER_BYTE (abfd, input_section);
a680de9a
PB
963 insn = bfd_get_32 (abfd, (bfd_byte *) data + octets);
964 insn &= ~0x1fffc1;
965 insn |= (value & 0xffc1) | ((value & 0x3e) << 15);
966 bfd_put_32 (abfd, insn, (bfd_byte *) data + octets);
967 return bfd_reloc_ok;
25dbc73a
AM
968}
969
970static bfd_reloc_status_type
971ppc_elf_unhandled_reloc (bfd *abfd,
972 arelent *reloc_entry,
973 asymbol *symbol,
974 void *data,
975 asection *input_section,
976 bfd *output_bfd,
977 char **error_message)
978{
979 /* If this is a relocatable link (output_bfd test tells us), just
980 call the generic function. Any adjustment will be done at final
981 link time. */
982 if (output_bfd != NULL)
983 return bfd_elf_generic_reloc (abfd, reloc_entry, symbol, data,
984 input_section, output_bfd, error_message);
985
986 if (error_message != NULL)
987 {
988 static char buf[60];
989 sprintf (buf, _("generic linker can't handle %s"),
990 reloc_entry->howto->name);
991 *error_message = buf;
992 }
993 return bfd_reloc_dangerous;
994}
995\f
996/* Sections created by the linker. */
997
998typedef struct elf_linker_section
999{
c9a2f333 1000 /* Pointer to the bfd section. */
25dbc73a 1001 asection *section;
c9a2f333
AM
1002 /* Section name. */
1003 const char *name;
1004 /* Associated bss section name. */
1005 const char *bss_name;
1006 /* Associated symbol name. */
1007 const char *sym_name;
046183de
AM
1008 /* Associated symbol. */
1009 struct elf_link_hash_entry *sym;
25dbc73a
AM
1010} elf_linker_section_t;
1011
1012/* Linked list of allocated pointer entries. This hangs off of the
1013 symbol lists, and provides allows us to return different pointers,
1014 based on different addend's. */
1015
1016typedef struct elf_linker_section_pointers
1017{
1018 /* next allocated pointer for this symbol */
1019 struct elf_linker_section_pointers *next;
1020 /* offset of pointer from beginning of section */
1021 bfd_vma offset;
1022 /* addend used */
1023 bfd_vma addend;
1024 /* which linker section this is */
1025 elf_linker_section_t *lsect;
25dbc73a
AM
1026} elf_linker_section_pointers_t;
1027
1028struct ppc_elf_obj_tdata
1029{
1030 struct elf_obj_tdata elf;
1031
1032 /* A mapping from local symbols to offsets into the various linker
1033 sections added. This is index by the symbol index. */
1034 elf_linker_section_pointers_t **linker_section_pointers;
016687f8
AM
1035
1036 /* Flags used to auto-detect plt type. */
1037 unsigned int makes_plt_call : 1;
1038 unsigned int has_rel16 : 1;
25dbc73a
AM
1039};
1040
1041#define ppc_elf_tdata(bfd) \
1042 ((struct ppc_elf_obj_tdata *) (bfd)->tdata.any)
7619e7c7 1043
25dbc73a
AM
1044#define elf_local_ptr_offsets(bfd) \
1045 (ppc_elf_tdata (bfd)->linker_section_pointers)
7619e7c7 1046
0c8d6e5c
AM
1047#define is_ppc_elf(bfd) \
1048 (bfd_get_flavour (bfd) == bfd_target_elf_flavour \
4dfe6ac6 1049 && elf_object_id (bfd) == PPC32_ELF_DATA)
0c8d6e5c 1050
25dbc73a 1051/* Override the generic function because we store some extras. */
7619e7c7 1052
25dbc73a
AM
1053static bfd_boolean
1054ppc_elf_mkobject (bfd *abfd)
1055{
0ffa91dd 1056 return bfd_elf_allocate_object (abfd, sizeof (struct ppc_elf_obj_tdata),
4dfe6ac6 1057 PPC32_ELF_DATA);
25dbc73a 1058}
7619e7c7 1059
14b57c7c
AM
1060/* When defaulting arch/mach, decode apuinfo to find a better match. */
1061
1062bfd_boolean
1063_bfd_elf_ppc_set_arch (bfd *abfd)
1064{
1065 unsigned long mach = 0;
1066 asection *s;
1067 unsigned char *contents;
1068
1069 if (abfd->arch_info->bits_per_word == 32
1070 && bfd_big_endian (abfd))
1071 {
1072
1073 for (s = abfd->sections; s != NULL; s = s->next)
1074 if ((elf_section_data (s)->this_hdr.sh_flags & SHF_PPC_VLE) != 0)
1075 break;
1076 if (s != NULL)
1077 mach = bfd_mach_ppc_vle;
1078 }
1079
1080 if (mach == 0)
1081 {
1082 s = bfd_get_section_by_name (abfd, APUINFO_SECTION_NAME);
62a47958
AM
1083 if (s != NULL
1084 && s->size >= 24
1085 && bfd_malloc_and_get_section (abfd, s, &contents))
14b57c7c
AM
1086 {
1087 unsigned int apuinfo_size = bfd_get_32 (abfd, contents + 4);
1088 unsigned int i;
1089
1090 for (i = 20; i < apuinfo_size + 20 && i + 4 <= s->size; i += 4)
1091 {
1092 unsigned int val = bfd_get_32 (abfd, contents + i);
1093 switch (val >> 16)
1094 {
1095 case PPC_APUINFO_PMR:
1096 case PPC_APUINFO_RFMCI:
1097 if (mach == 0)
1098 mach = bfd_mach_ppc_titan;
1099 break;
1100
1101 case PPC_APUINFO_ISEL:
1102 case PPC_APUINFO_CACHELCK:
1103 if (mach == bfd_mach_ppc_titan)
1104 mach = bfd_mach_ppc_e500mc;
1105 break;
1106
1107 case PPC_APUINFO_SPE:
1108 case PPC_APUINFO_EFS:
1109 case PPC_APUINFO_BRLOCK:
1110 if (mach != bfd_mach_ppc_vle)
1111 mach = bfd_mach_ppc_e500;
8941017b 1112 break;
14b57c7c
AM
1113
1114 case PPC_APUINFO_VLE:
1115 mach = bfd_mach_ppc_vle;
1116 break;
1117
1118 default:
1119 mach = -1ul;
1120 }
1121 }
1122 free (contents);
1123 }
1124 }
1125
1126 if (mach != 0 && mach != -1ul)
1127 {
1128 const bfd_arch_info_type *arch;
1129
1130 for (arch = abfd->arch_info->next; arch; arch = arch->next)
1131 if (arch->mach == mach)
1132 {
1133 abfd->arch_info = arch;
1134 break;
1135 }
1136 }
1137 return TRUE;
1138}
1139
25dbc73a 1140/* Fix bad default arch selected for a 32 bit input bfd when the
14b57c7c 1141 default is 64 bit. Also select arch based on apuinfo. */
7619e7c7 1142
25dbc73a
AM
1143static bfd_boolean
1144ppc_elf_object_p (bfd *abfd)
1145{
14b57c7c
AM
1146 if (!abfd->arch_info->the_default)
1147 return TRUE;
1148
1149 if (abfd->arch_info->bits_per_word == 64)
25dbc73a
AM
1150 {
1151 Elf_Internal_Ehdr *i_ehdr = elf_elfheader (abfd);
7619e7c7 1152
25dbc73a
AM
1153 if (i_ehdr->e_ident[EI_CLASS] == ELFCLASS32)
1154 {
1155 /* Relies on arch after 64 bit default being 32 bit default. */
1156 abfd->arch_info = abfd->arch_info->next;
1157 BFD_ASSERT (abfd->arch_info->bits_per_word == 32);
1158 }
1159 }
14b57c7c 1160 return _bfd_elf_ppc_set_arch (abfd);
25dbc73a 1161}
7619e7c7 1162
25dbc73a 1163/* Function to set whether a module needs the -mrelocatable bit set. */
7619e7c7 1164
25dbc73a
AM
1165static bfd_boolean
1166ppc_elf_set_private_flags (bfd *abfd, flagword flags)
1167{
1168 BFD_ASSERT (!elf_flags_init (abfd)
1169 || elf_elfheader (abfd)->e_flags == flags);
7619e7c7 1170
25dbc73a
AM
1171 elf_elfheader (abfd)->e_flags = flags;
1172 elf_flags_init (abfd) = TRUE;
1173 return TRUE;
1174}
1175
25dbc73a 1176/* Support for core dump NOTE sections. */
deaaf2f3 1177
b34976b6 1178static bfd_boolean
25dbc73a 1179ppc_elf_grok_prstatus (bfd *abfd, Elf_Internal_Note *note)
252b5132 1180{
25dbc73a
AM
1181 int offset;
1182 unsigned int size;
252b5132 1183
25dbc73a
AM
1184 switch (note->descsz)
1185 {
1186 default:
1187 return FALSE;
252b5132 1188
25dbc73a
AM
1189 case 268: /* Linux/PPC. */
1190 /* pr_cursig */
228e534f 1191 elf_tdata (abfd)->core->signal = bfd_get_16 (abfd, note->descdata + 12);
deaaf2f3 1192
25dbc73a 1193 /* pr_pid */
228e534f 1194 elf_tdata (abfd)->core->lwpid = bfd_get_32 (abfd, note->descdata + 24);
9abc968f 1195
25dbc73a
AM
1196 /* pr_reg */
1197 offset = 72;
1198 size = 192;
deaaf2f3 1199
25dbc73a
AM
1200 break;
1201 }
deaaf2f3 1202
25dbc73a
AM
1203 /* Make a ".reg/999" section. */
1204 return _bfd_elfcore_make_pseudosection (abfd, ".reg",
1205 size, note->descpos + offset);
1206}
252b5132 1207
25dbc73a
AM
1208static bfd_boolean
1209ppc_elf_grok_psinfo (bfd *abfd, Elf_Internal_Note *note)
1210{
1211 switch (note->descsz)
deaaf2f3 1212 {
25dbc73a
AM
1213 default:
1214 return FALSE;
deaaf2f3 1215
25dbc73a 1216 case 128: /* Linux/PPC elf_prpsinfo. */
228e534f 1217 elf_tdata (abfd)->core->pid
bc989cdc 1218 = bfd_get_32 (abfd, note->descdata + 16);
228e534f 1219 elf_tdata (abfd)->core->program
25dbc73a 1220 = _bfd_elfcore_strndup (abfd, note->descdata + 32, 16);
228e534f 1221 elf_tdata (abfd)->core->command
25dbc73a
AM
1222 = _bfd_elfcore_strndup (abfd, note->descdata + 48, 80);
1223 }
9abc968f 1224
25dbc73a
AM
1225 /* Note that for some reason, a spurious space is tacked
1226 onto the end of the args in some (at least one anyway)
1227 implementations, so strip it off if it exists. */
70bccea4 1228
25dbc73a 1229 {
228e534f 1230 char *command = elf_tdata (abfd)->core->command;
25dbc73a 1231 int n = strlen (command);
70bccea4 1232
25dbc73a
AM
1233 if (0 < n && command[n - 1] == ' ')
1234 command[n - 1] = '\0';
1235 }
deaaf2f3 1236
25dbc73a
AM
1237 return TRUE;
1238}
deaaf2f3 1239
183e98be
AM
1240static char *
1241ppc_elf_write_core_note (bfd *abfd, char *buf, int *bufsiz, int note_type, ...)
1242{
1243 switch (note_type)
1244 {
1245 default:
1246 return NULL;
1247
1248 case NT_PRPSINFO:
1249 {
602f1657 1250 char data[128] ATTRIBUTE_NONSTRING;
183e98be
AM
1251 va_list ap;
1252
1253 va_start (ap, note_type);
75cd47ed 1254 memset (data, 0, sizeof (data));
183e98be 1255 strncpy (data + 32, va_arg (ap, const char *), 16);
be3e27bb 1256#if GCC_VERSION == 8000 || GCC_VERSION == 8001
95da9854 1257 DIAGNOSTIC_PUSH;
be3e27bb 1258 /* GCC 8.0 and 8.1 warn about 80 equals destination size with
95da9854
L
1259 -Wstringop-truncation:
1260 https://gcc.gnu.org/bugzilla/show_bug.cgi?id=85643
1261 */
95da9854
L
1262 DIAGNOSTIC_IGNORE_STRINGOP_TRUNCATION;
1263#endif
183e98be 1264 strncpy (data + 48, va_arg (ap, const char *), 80);
be3e27bb 1265#if GCC_VERSION == 8000 || GCC_VERSION == 8001
95da9854 1266 DIAGNOSTIC_POP;
fe75810f 1267#endif
183e98be
AM
1268 va_end (ap);
1269 return elfcore_write_note (abfd, buf, bufsiz,
1270 "CORE", note_type, data, sizeof (data));
1271 }
1272
1273 case NT_PRSTATUS:
1274 {
1275 char data[268];
1276 va_list ap;
1277 long pid;
1278 int cursig;
1279 const void *greg;
1280
1281 va_start (ap, note_type);
1282 memset (data, 0, 72);
1283 pid = va_arg (ap, long);
1284 bfd_put_32 (abfd, pid, data + 24);
1285 cursig = va_arg (ap, int);
1286 bfd_put_16 (abfd, cursig, data + 12);
1287 greg = va_arg (ap, const void *);
1288 memcpy (data + 72, greg, 192);
1289 memset (data + 264, 0, 4);
1290 va_end (ap);
1291 return elfcore_write_note (abfd, buf, bufsiz,
1292 "CORE", note_type, data, sizeof (data));
1293 }
1294 }
1295}
1296
b9c361e0 1297static flagword
68ffbac6 1298ppc_elf_lookup_section_flags (char *flag_name)
b9c361e0
JL
1299{
1300
1301 if (!strcmp (flag_name, "SHF_PPC_VLE"))
1302 return SHF_PPC_VLE;
1303
1304 return 0;
1305}
1306
25dbc73a
AM
1307/* Return address for Ith PLT stub in section PLT, for relocation REL
1308 or (bfd_vma) -1 if it should not be included. */
deaaf2f3 1309
25dbc73a
AM
1310static bfd_vma
1311ppc_elf_plt_sym_val (bfd_vma i ATTRIBUTE_UNUSED,
1312 const asection *plt ATTRIBUTE_UNUSED,
1313 const arelent *rel)
1314{
1315 return rel->address;
1316}
deaaf2f3 1317
25dbc73a 1318/* Handle a PowerPC specific section when reading an object file. This
6dc132d9
L
1319 is called when bfd_section_from_shdr finds a section with an unknown
1320 type. */
deaaf2f3 1321
25dbc73a 1322static bfd_boolean
6dc132d9
L
1323ppc_elf_section_from_shdr (bfd *abfd,
1324 Elf_Internal_Shdr *hdr,
1325 const char *name,
1326 int shindex)
25dbc73a
AM
1327{
1328 asection *newsect;
1329 flagword flags;
d1c6de6f 1330
6dc132d9 1331 if (! _bfd_elf_make_section_from_shdr (abfd, hdr, name, shindex))
25dbc73a 1332 return FALSE;
deaaf2f3 1333
25dbc73a 1334 newsect = hdr->bfd_section;
bf577467 1335 flags = 0;
25dbc73a
AM
1336 if (hdr->sh_flags & SHF_EXCLUDE)
1337 flags |= SEC_EXCLUDE;
9abc968f 1338
25dbc73a
AM
1339 if (hdr->sh_type == SHT_ORDERED)
1340 flags |= SEC_SORT_ENTRIES;
d1c6de6f 1341
bf577467
AM
1342 if (strncmp (name, ".PPC.EMB", 8) == 0)
1343 name += 8;
1344 if (strncmp (name, ".sbss", 5) == 0
1345 || strncmp (name, ".sdata", 6) == 0)
1346 flags |= SEC_SMALL_DATA;
1347
1348 return (flags == 0
1349 || bfd_set_section_flags (newsect, newsect->flags | flags));
25dbc73a
AM
1350}
1351
1352/* Set up any other section flags and such that may be necessary. */
1353
1354static bfd_boolean
1355ppc_elf_fake_sections (bfd *abfd ATTRIBUTE_UNUSED,
1356 Elf_Internal_Shdr *shdr,
1357 asection *asect)
1358{
25dbc73a
AM
1359 if ((asect->flags & SEC_SORT_ENTRIES) != 0)
1360 shdr->sh_type = SHT_ORDERED;
1361
1362 return TRUE;
1363}
1364
1365/* If we have .sbss2 or .PPC.EMB.sbss0 output sections, we
1366 need to bump up the number of section headers. */
1367
1368static int
a6b96beb
AM
1369ppc_elf_additional_program_headers (bfd *abfd,
1370 struct bfd_link_info *info ATTRIBUTE_UNUSED)
25dbc73a
AM
1371{
1372 asection *s;
1373 int ret = 0;
d1c6de6f 1374
25dbc73a
AM
1375 s = bfd_get_section_by_name (abfd, ".sbss2");
1376 if (s != NULL && (s->flags & SEC_ALLOC) != 0)
1377 ++ret;
d1c6de6f 1378
25dbc73a
AM
1379 s = bfd_get_section_by_name (abfd, ".PPC.EMB.sbss0");
1380 if (s != NULL && (s->flags & SEC_ALLOC) != 0)
1381 ++ret;
deaaf2f3 1382
25dbc73a
AM
1383 return ret;
1384}
deaaf2f3 1385
68ffbac6 1386/* Modify the segment map for VLE executables. */
b9c361e0
JL
1387
1388bfd_boolean
1389ppc_elf_modify_segment_map (bfd *abfd,
1390 struct bfd_link_info *info ATTRIBUTE_UNUSED)
1391{
f7d69005 1392 struct elf_segment_map *m;
b9c361e0
JL
1393
1394 /* At this point in the link, output sections have already been sorted by
1395 LMA and assigned to segments. All that is left to do is to ensure
1396 there is no mixing of VLE & non-VLE sections in a text segment.
1397 If we find that case, we split the segment.
1398 We maintain the original output section order. */
1399
12bd6957 1400 for (m = elf_seg_map (abfd); m != NULL; m = m->next)
b9c361e0 1401 {
f7d69005 1402 struct elf_segment_map *n;
986f0783 1403 size_t amt;
f7d69005
AM
1404 unsigned int j, k;
1405 unsigned int p_flags;
1406
1407 if (m->p_type != PT_LOAD || m->count == 0)
b9c361e0
JL
1408 continue;
1409
f7d69005 1410 for (p_flags = PF_R, j = 0; j != m->count; ++j)
b9c361e0 1411 {
f7d69005
AM
1412 if ((m->sections[j]->flags & SEC_READONLY) == 0)
1413 p_flags |= PF_W;
1414 if ((m->sections[j]->flags & SEC_CODE) != 0)
1415 {
1416 p_flags |= PF_X;
1417 if ((elf_section_flags (m->sections[j]) & SHF_PPC_VLE) != 0)
1418 p_flags |= PF_PPC_VLE;
1419 break;
1420 }
1421 }
1422 if (j != m->count)
1423 while (++j != m->count)
1424 {
1425 unsigned int p_flags1 = PF_R;
94caa966 1426
f7d69005
AM
1427 if ((m->sections[j]->flags & SEC_READONLY) == 0)
1428 p_flags1 |= PF_W;
1429 if ((m->sections[j]->flags & SEC_CODE) != 0)
1430 {
1431 p_flags1 |= PF_X;
1432 if ((elf_section_flags (m->sections[j]) & SHF_PPC_VLE) != 0)
1433 p_flags1 |= PF_PPC_VLE;
1434 if (((p_flags1 ^ p_flags) & PF_PPC_VLE) != 0)
1435 break;
1436 }
1437 p_flags |= p_flags1;
1438 }
1439 /* If we're splitting a segment which originally contained rw
1440 sections then those sections might now only be in one of the
1441 two parts. So always set p_flags if splitting, even if we
1442 are being called for objcopy with p_flags_valid set. */
1443 if (j != m->count || !m->p_flags_valid)
1444 {
1445 m->p_flags_valid = 1;
1446 m->p_flags = p_flags;
1447 }
1448 if (j == m->count)
b9c361e0
JL
1449 continue;
1450
f7d69005 1451 /* Sections 0..j-1 stay in this (current) segment,
b9c361e0
JL
1452 the remainder are put in a new segment.
1453 The scan resumes with the new segment. */
1454
b9c361e0
JL
1455 amt = sizeof (struct elf_segment_map);
1456 amt += (m->count - j - 1) * sizeof (asection *);
1457 n = (struct elf_segment_map *) bfd_zalloc (abfd, amt);
1458 if (n == NULL)
954b63d4 1459 return FALSE;
b9c361e0
JL
1460
1461 n->p_type = PT_LOAD;
b9c361e0
JL
1462 n->count = m->count - j;
1463 for (k = 0; k < n->count; ++k)
f7d69005
AM
1464 n->sections[k] = m->sections[j + k];
1465 m->count = j;
1466 m->p_size_valid = 0;
b9c361e0
JL
1467 n->next = m->next;
1468 m->next = n;
b9c361e0
JL
1469 }
1470
1471 return TRUE;
1472}
1473
25dbc73a
AM
1474/* Add extra PPC sections -- Note, for now, make .sbss2 and
1475 .PPC.EMB.sbss0 a normal section, and not a bss section so
1476 that the linker doesn't crater when trying to make more than
1477 2 sections. */
e656e369 1478
b35d266b 1479static const struct bfd_elf_special_section ppc_elf_special_sections[] =
7f4d3958 1480{
14b57c7c
AM
1481 { STRING_COMMA_LEN (".plt"), 0, SHT_NOBITS, SHF_ALLOC + SHF_EXECINSTR },
1482 { STRING_COMMA_LEN (".sbss"), -2, SHT_NOBITS, SHF_ALLOC + SHF_WRITE },
1483 { STRING_COMMA_LEN (".sbss2"), -2, SHT_PROGBITS, SHF_ALLOC },
1484 { STRING_COMMA_LEN (".sdata"), -2, SHT_PROGBITS, SHF_ALLOC + SHF_WRITE },
1485 { STRING_COMMA_LEN (".sdata2"), -2, SHT_PROGBITS, SHF_ALLOC },
1486 { STRING_COMMA_LEN (".tags"), 0, SHT_ORDERED, SHF_ALLOC },
1487 { STRING_COMMA_LEN (APUINFO_SECTION_NAME), 0, SHT_NOTE, 0 },
1488 { STRING_COMMA_LEN (".PPC.EMB.sbss0"), 0, SHT_PROGBITS, SHF_ALLOC },
1489 { STRING_COMMA_LEN (".PPC.EMB.sdata0"), 0, SHT_PROGBITS, SHF_ALLOC },
1490 { NULL, 0, 0, 0, 0 }
7f4d3958
L
1491};
1492
551b43fd
AM
1493/* This is what we want for new plt/got. */
1494static struct bfd_elf_special_section ppc_alt_plt =
07d6d2b8 1495 { STRING_COMMA_LEN (".plt"), 0, SHT_PROGBITS, SHF_ALLOC };
551b43fd
AM
1496
1497static const struct bfd_elf_special_section *
4aef7643 1498ppc_elf_get_sec_type_attr (bfd *abfd, asection *sec)
7f4d3958 1499{
b35d266b 1500 const struct bfd_elf_special_section *ssect;
551b43fd
AM
1501
1502 /* See if this is one of the special sections. */
1503 if (sec->name == NULL)
1504 return NULL;
1505
1506 ssect = _bfd_elf_get_special_section (sec->name, ppc_elf_special_sections,
1507 sec->use_rela_p);
1508 if (ssect != NULL)
1509 {
1510 if (ssect == ppc_elf_special_sections && (sec->flags & SEC_LOAD) != 0)
1511 ssect = &ppc_alt_plt;
1512 return ssect;
1513 }
1514
1515 return _bfd_elf_get_sec_type_attr (abfd, sec);
1516}
25dbc73a
AM
1517\f
1518/* Very simple linked list structure for recording apuinfo values. */
1519typedef struct apuinfo_list
1520{
1521 struct apuinfo_list *next;
1522 unsigned long value;
1523}
1524apuinfo_list;
e656e369 1525
25dbc73a 1526static apuinfo_list *head;
f2faa800 1527static bfd_boolean apuinfo_set;
deaaf2f3 1528
25dbc73a
AM
1529static void
1530apuinfo_list_init (void)
1531{
1532 head = NULL;
f2faa800 1533 apuinfo_set = FALSE;
25dbc73a 1534}
9abc968f 1535
25dbc73a
AM
1536static void
1537apuinfo_list_add (unsigned long value)
1538{
1539 apuinfo_list *entry = head;
deaaf2f3 1540
25dbc73a
AM
1541 while (entry != NULL)
1542 {
1543 if (entry->value == value)
1544 return;
1545 entry = entry->next;
1546 }
b4a38de6 1547
25dbc73a
AM
1548 entry = bfd_malloc (sizeof (* entry));
1549 if (entry == NULL)
1550 return;
e656e369 1551
25dbc73a
AM
1552 entry->value = value;
1553 entry->next = head;
1554 head = entry;
1555}
9abc968f 1556
25dbc73a
AM
1557static unsigned
1558apuinfo_list_length (void)
1559{
1560 apuinfo_list *entry;
1561 unsigned long count;
9abc968f 1562
25dbc73a
AM
1563 for (entry = head, count = 0;
1564 entry;
1565 entry = entry->next)
1566 ++ count;
e656e369 1567
25dbc73a
AM
1568 return count;
1569}
eea6121a 1570
25dbc73a
AM
1571static inline unsigned long
1572apuinfo_list_element (unsigned long number)
1573{
1574 apuinfo_list * entry;
e656e369 1575
25dbc73a
AM
1576 for (entry = head;
1577 entry && number --;
1578 entry = entry->next)
1579 ;
252b5132 1580
25dbc73a
AM
1581 return entry ? entry->value : 0;
1582}
1583
1584static void
1585apuinfo_list_finish (void)
1586{
1587 apuinfo_list *entry;
1588
1589 for (entry = head; entry;)
252b5132 1590 {
25dbc73a
AM
1591 apuinfo_list *next = entry->next;
1592 free (entry);
1593 entry = next;
1594 }
9abc968f 1595
25dbc73a
AM
1596 head = NULL;
1597}
9abc968f 1598
25dbc73a
AM
1599/* Scan the input BFDs and create a linked list of
1600 the APUinfo values that will need to be emitted. */
9abc968f 1601
25dbc73a
AM
1602static void
1603ppc_elf_begin_write_processing (bfd *abfd, struct bfd_link_info *link_info)
1604{
1605 bfd *ibfd;
1606 asection *asec;
deddc40b
NS
1607 char *buffer = NULL;
1608 bfd_size_type largest_input_size = 0;
25dbc73a 1609 unsigned i;
25dbc73a
AM
1610 unsigned long length;
1611 const char *error_message = NULL;
9abc968f 1612
25dbc73a
AM
1613 if (link_info == NULL)
1614 return;
9abc968f 1615
25dbc73a 1616 apuinfo_list_init ();
252b5132 1617
25dbc73a 1618 /* Read in the input sections contents. */
c72f2fb2 1619 for (ibfd = link_info->input_bfds; ibfd; ibfd = ibfd->link.next)
252b5132 1620 {
25dbc73a 1621 unsigned long datum;
252b5132 1622
25dbc73a
AM
1623 asec = bfd_get_section_by_name (ibfd, APUINFO_SECTION_NAME);
1624 if (asec == NULL)
1625 continue;
252b5132 1626
695344c0 1627 /* xgettext:c-format */
871b3ab2 1628 error_message = _("corrupt %s section in %pB");
25dbc73a 1629 length = asec->size;
deddc40b
NS
1630 if (length < 20)
1631 goto fail;
1632
f2faa800 1633 apuinfo_set = TRUE;
deddc40b 1634 if (largest_input_size < asec->size)
25dbc73a 1635 {
deddc40b
NS
1636 if (buffer)
1637 free (buffer);
1638 largest_input_size = asec->size;
1639 buffer = bfd_malloc (largest_input_size);
1640 if (!buffer)
1641 return;
25dbc73a 1642 }
5b914448 1643
25dbc73a 1644 if (bfd_seek (ibfd, asec->filepos, SEEK_SET) != 0
deddc40b 1645 || (bfd_bread (buffer, length, ibfd) != length))
25dbc73a 1646 {
695344c0 1647 /* xgettext:c-format */
871b3ab2 1648 error_message = _("unable to read in %s section from %pB");
25dbc73a
AM
1649 goto fail;
1650 }
252b5132 1651
25dbc73a
AM
1652 /* Verify the contents of the header. Note - we have to
1653 extract the values this way in order to allow for a
1654 host whose endian-ness is different from the target. */
deddc40b 1655 datum = bfd_get_32 (ibfd, buffer);
25dbc73a
AM
1656 if (datum != sizeof APUINFO_LABEL)
1657 goto fail;
252b5132 1658
deddc40b 1659 datum = bfd_get_32 (ibfd, buffer + 8);
25dbc73a
AM
1660 if (datum != 0x2)
1661 goto fail;
252b5132 1662
deddc40b 1663 if (strcmp (buffer + 12, APUINFO_LABEL) != 0)
25dbc73a 1664 goto fail;
252b5132 1665
25dbc73a 1666 /* Get the number of bytes used for apuinfo entries. */
deddc40b 1667 datum = bfd_get_32 (ibfd, buffer + 4);
25dbc73a
AM
1668 if (datum + 20 != length)
1669 goto fail;
1670
25dbc73a
AM
1671 /* Scan the apuinfo section, building a list of apuinfo numbers. */
1672 for (i = 0; i < datum; i += 4)
deddc40b 1673 apuinfo_list_add (bfd_get_32 (ibfd, buffer + 20 + i));
252b5132
RH
1674 }
1675
25dbc73a 1676 error_message = NULL;
252b5132 1677
f2faa800 1678 if (apuinfo_set)
deddc40b 1679 {
f2faa800
NS
1680 /* Compute the size of the output section. */
1681 unsigned num_entries = apuinfo_list_length ();
5b914448 1682
deddc40b
NS
1683 /* Set the output section size, if it exists. */
1684 asec = bfd_get_section_by_name (abfd, APUINFO_SECTION_NAME);
f2faa800 1685
fd361982 1686 if (asec && !bfd_set_section_size (asec, 20 + num_entries * 4))
deddc40b
NS
1687 {
1688 ibfd = abfd;
695344c0 1689 /* xgettext:c-format */
871b3ab2 1690 error_message = _("warning: unable to set size of %s section in %pB");
deddc40b
NS
1691 }
1692 }
25dbc73a
AM
1693
1694 fail:
deddc40b
NS
1695 if (buffer)
1696 free (buffer);
25dbc73a
AM
1697
1698 if (error_message)
cd9af601 1699 _bfd_error_handler (error_message, APUINFO_SECTION_NAME, ibfd);
25dbc73a 1700}
252b5132 1701
25dbc73a
AM
1702/* Prevent the output section from accumulating the input sections'
1703 contents. We have already stored this in our linked list structure. */
252b5132 1704
25dbc73a
AM
1705static bfd_boolean
1706ppc_elf_write_section (bfd *abfd ATTRIBUTE_UNUSED,
c7b8f16e 1707 struct bfd_link_info *link_info ATTRIBUTE_UNUSED,
25dbc73a
AM
1708 asection *asec,
1709 bfd_byte *contents ATTRIBUTE_UNUSED)
1710{
f2faa800 1711 return apuinfo_set && strcmp (asec->name, APUINFO_SECTION_NAME) == 0;
252b5132
RH
1712}
1713
25dbc73a
AM
1714/* Finally we can generate the output section. */
1715
1716static void
cc364be6 1717ppc_final_write_processing (bfd *abfd)
7619e7c7 1718{
25dbc73a
AM
1719 bfd_byte *buffer;
1720 asection *asec;
1721 unsigned i;
1722 unsigned num_entries;
1723 bfd_size_type length;
7619e7c7 1724
25dbc73a
AM
1725 asec = bfd_get_section_by_name (abfd, APUINFO_SECTION_NAME);
1726 if (asec == NULL)
1727 return;
1728
f2faa800 1729 if (!apuinfo_set)
25dbc73a
AM
1730 return;
1731
1732 length = asec->size;
1733 if (length < 20)
1734 return;
1735
1736 buffer = bfd_malloc (length);
1737 if (buffer == NULL)
7619e7c7 1738 {
4eca0228 1739 _bfd_error_handler
cf97bcb0 1740 (_("failed to allocate space for new APUinfo section"));
25dbc73a 1741 return;
7619e7c7 1742 }
7619e7c7 1743
25dbc73a
AM
1744 /* Create the apuinfo header. */
1745 num_entries = apuinfo_list_length ();
1746 bfd_put_32 (abfd, sizeof APUINFO_LABEL, buffer);
1747 bfd_put_32 (abfd, num_entries * 4, buffer + 4);
1748 bfd_put_32 (abfd, 0x2, buffer + 8);
1749 strcpy ((char *) buffer + 12, APUINFO_LABEL);
feee612b 1750
25dbc73a
AM
1751 length = 20;
1752 for (i = 0; i < num_entries; i++)
feee612b 1753 {
25dbc73a
AM
1754 bfd_put_32 (abfd, apuinfo_list_element (i), buffer + length);
1755 length += 4;
feee612b 1756 }
feee612b 1757
25dbc73a 1758 if (length != asec->size)
cf97bcb0 1759 _bfd_error_handler (_("failed to compute new APUinfo section"));
252b5132 1760
25dbc73a 1761 if (! bfd_set_section_contents (abfd, asec, buffer, (file_ptr) 0, length))
cf97bcb0 1762 _bfd_error_handler (_("failed to install new APUinfo section"));
252b5132 1763
25dbc73a
AM
1764 free (buffer);
1765
1766 apuinfo_list_finish ();
252b5132 1767}
06f44071 1768
cc364be6
AM
1769static bfd_boolean
1770ppc_elf_final_write_processing (bfd *abfd)
06f44071 1771{
cc364be6
AM
1772 ppc_final_write_processing (abfd);
1773 return _bfd_elf_final_write_processing (abfd);
06f44071 1774}
25dbc73a 1775\f
7382d32a 1776static bfd_boolean
c6dd29ce 1777is_nonpic_glink_stub (bfd *abfd, asection *glink, bfd_vma off)
7382d32a 1778{
407aa07c 1779 bfd_byte buf[4 * 4];
7382d32a 1780
9e390558 1781 if (!bfd_get_section_contents (abfd, glink, buf, off, sizeof buf))
7382d32a
AM
1782 return FALSE;
1783
c6dd29ce
AM
1784 return ((bfd_get_32 (abfd, buf + 0) & 0xffff0000) == LIS_11
1785 && (bfd_get_32 (abfd, buf + 4) & 0xffff0000) == LWZ_11_11
407aa07c
AM
1786 && bfd_get_32 (abfd, buf + 8) == MTCTR_11
1787 && bfd_get_32 (abfd, buf + 12) == BCTR);
7382d32a
AM
1788}
1789
468392fb
AM
1790static bfd_boolean
1791section_covers_vma (bfd *abfd ATTRIBUTE_UNUSED, asection *section, void *ptr)
1792{
1793 bfd_vma vma = *(bfd_vma *) ptr;
1794 return ((section->flags & SEC_ALLOC) != 0
1795 && section->vma <= vma
1796 && vma < section->vma + section->size);
1797}
1798
1799static long
1800ppc_elf_get_synthetic_symtab (bfd *abfd, long symcount, asymbol **syms,
1801 long dynsymcount, asymbol **dynsyms,
1802 asymbol **ret)
1803{
1804 bfd_boolean (*slurp_relocs) (bfd *, asection *, asymbol **, bfd_boolean);
1805 asection *plt, *relplt, *dynamic, *glink;
1806 bfd_vma glink_vma = 0;
1807 bfd_vma resolv_vma = 0;
9e390558 1808 bfd_vma stub_off;
468392fb
AM
1809 asymbol *s;
1810 arelent *p;
9ad9b810 1811 size_t count, i, stub_delta;
468392fb
AM
1812 size_t size;
1813 char *names;
1814 bfd_byte buf[4];
1815
1816 *ret = NULL;
1817
1818 if ((abfd->flags & (DYNAMIC | EXEC_P)) == 0)
1819 return 0;
1820
1821 if (dynsymcount <= 0)
1822 return 0;
1823
1824 relplt = bfd_get_section_by_name (abfd, ".rela.plt");
1825 if (relplt == NULL)
1826 return 0;
1827
1828 plt = bfd_get_section_by_name (abfd, ".plt");
1829 if (plt == NULL)
1830 return 0;
1831
1832 /* Call common code to handle old-style executable PLTs. */
1833 if (elf_section_flags (plt) & SHF_EXECINSTR)
1834 return _bfd_elf_get_synthetic_symtab (abfd, symcount, syms,
1835 dynsymcount, dynsyms, ret);
1836
1837 /* If this object was prelinked, the prelinker stored the address
1838 of .glink at got[1]. If it wasn't prelinked, got[1] will be zero. */
1839 dynamic = bfd_get_section_by_name (abfd, ".dynamic");
1840 if (dynamic != NULL)
1841 {
1842 bfd_byte *dynbuf, *extdyn, *extdynend;
1843 size_t extdynsize;
1844 void (*swap_dyn_in) (bfd *, const void *, Elf_Internal_Dyn *);
1845
1846 if (!bfd_malloc_and_get_section (abfd, dynamic, &dynbuf))
1847 return -1;
1848
1849 extdynsize = get_elf_backend_data (abfd)->s->sizeof_dyn;
1850 swap_dyn_in = get_elf_backend_data (abfd)->s->swap_dyn_in;
1851
1852 extdyn = dynbuf;
1853 extdynend = extdyn + dynamic->size;
1854 for (; extdyn < extdynend; extdyn += extdynsize)
1855 {
1856 Elf_Internal_Dyn dyn;
1857 (*swap_dyn_in) (abfd, extdyn, &dyn);
1858
1859 if (dyn.d_tag == DT_NULL)
1860 break;
1861
1862 if (dyn.d_tag == DT_PPC_GOT)
1863 {
1864 unsigned int g_o_t = dyn.d_un.d_val;
1865 asection *got = bfd_get_section_by_name (abfd, ".got");
1866 if (got != NULL
1867 && bfd_get_section_contents (abfd, got, buf,
1868 g_o_t - got->vma + 4, 4))
1869 glink_vma = bfd_get_32 (abfd, buf);
1870 break;
1871 }
1872 }
1873 free (dynbuf);
1874 }
1875
1876 /* Otherwise we read the first plt entry. */
1877 if (glink_vma == 0)
1878 {
1879 if (bfd_get_section_contents (abfd, plt, buf, 0, 4))
1880 glink_vma = bfd_get_32 (abfd, buf);
1881 }
1882
1883 if (glink_vma == 0)
1884 return 0;
1885
1886 /* The .glink section usually does not survive the final
1887 link; search for the section (usually .text) where the
1888 glink stubs now reside. */
1889 glink = bfd_sections_find_if (abfd, section_covers_vma, &glink_vma);
1890 if (glink == NULL)
1891 return 0;
1892
1893 /* Determine glink PLT resolver by reading the relative branch
1894 from the first glink stub. */
1895 if (bfd_get_section_contents (abfd, glink, buf,
1896 glink_vma - glink->vma, 4))
1897 {
1898 unsigned int insn = bfd_get_32 (abfd, buf);
1899
1900 /* The first glink stub may either branch to the resolver ... */
1901 insn ^= B;
1902 if ((insn & ~0x3fffffc) == 0)
1903 resolv_vma = glink_vma + (insn ^ 0x2000000) - 0x2000000;
1904
1905 /* ... or fall through a bunch of NOPs. */
1906 else if ((insn ^ B ^ NOP) == 0)
1907 for (i = 4;
1908 bfd_get_section_contents (abfd, glink, buf,
1909 glink_vma - glink->vma + i, 4);
1910 i += 4)
1911 if (bfd_get_32 (abfd, buf) != NOP)
1912 {
1913 resolv_vma = glink_vma + i;
1914 break;
1915 }
1916 }
1917
7382d32a 1918 count = relplt->size / sizeof (Elf32_External_Rela);
7382d32a
AM
1919 /* If the stubs are those for -shared/-pie then we might have
1920 multiple stubs for each plt entry. If that is the case then
1921 there is no way to associate stubs with their plt entries short
9e390558
AM
1922 of figuring out the GOT pointer value used in the stub.
1923 The offsets tested here need to cover all possible values of
1924 GLINK_ENTRY_SIZE for other than __tls_get_addr_opt. */
1925 stub_off = glink_vma - glink->vma;
1926 for (stub_delta = 16; stub_delta <= 32; stub_delta += 8)
1927 if (is_nonpic_glink_stub (abfd, glink, stub_off - stub_delta))
1928 break;
1929 if (stub_delta > 32)
7382d32a
AM
1930 return 0;
1931
468392fb
AM
1932 slurp_relocs = get_elf_backend_data (abfd)->s->slurp_reloc_table;
1933 if (! (*slurp_relocs) (abfd, relplt, dynsyms, TRUE))
1934 return -1;
1935
468392fb
AM
1936 size = count * sizeof (asymbol);
1937 p = relplt->relocation;
1938 for (i = 0; i < count; i++, p++)
e054468f
AM
1939 {
1940 size += strlen ((*p->sym_ptr_ptr)->name) + sizeof ("@plt");
1941 if (p->addend != 0)
1942 size += sizeof ("+0x") - 1 + 8;
1943 }
468392fb
AM
1944
1945 size += sizeof (asymbol) + sizeof ("__glink");
1946
1947 if (resolv_vma)
1948 size += sizeof (asymbol) + sizeof ("__glink_PLTresolve");
1949
1950 s = *ret = bfd_malloc (size);
1951 if (s == NULL)
1952 return -1;
1953
9e390558 1954 stub_off = glink_vma - glink->vma;
468392fb 1955 names = (char *) (s + count + 1 + (resolv_vma != 0));
1079403c
AM
1956 p = relplt->relocation + count - 1;
1957 for (i = 0; i < count; i++)
468392fb
AM
1958 {
1959 size_t len;
1960
9e390558
AM
1961 stub_off -= stub_delta;
1962 if (strcmp ((*p->sym_ptr_ptr)->name, "__tls_get_addr_opt") == 0)
1963 stub_off -= 32;
468392fb
AM
1964 *s = **p->sym_ptr_ptr;
1965 /* Undefined syms won't have BSF_LOCAL or BSF_GLOBAL set. Since
1966 we are defining a symbol, ensure one of them is set. */
1967 if ((s->flags & BSF_LOCAL) == 0)
1968 s->flags |= BSF_GLOBAL;
6ba2a415 1969 s->flags |= BSF_SYNTHETIC;
468392fb 1970 s->section = glink;
9e390558 1971 s->value = stub_off;
468392fb
AM
1972 s->name = names;
1973 s->udata.p = NULL;
1974 len = strlen ((*p->sym_ptr_ptr)->name);
1975 memcpy (names, (*p->sym_ptr_ptr)->name, len);
1976 names += len;
e054468f
AM
1977 if (p->addend != 0)
1978 {
1979 memcpy (names, "+0x", sizeof ("+0x") - 1);
1980 names += sizeof ("+0x") - 1;
1981 bfd_sprintf_vma (abfd, names, p->addend);
1982 names += strlen (names);
1983 }
468392fb
AM
1984 memcpy (names, "@plt", sizeof ("@plt"));
1985 names += sizeof ("@plt");
1986 ++s;
1079403c 1987 --p;
468392fb
AM
1988 }
1989
1990 /* Add a symbol at the start of the glink branch table. */
86a4952b 1991 memset (s, 0, sizeof *s);
468392fb 1992 s->the_bfd = abfd;
6ba2a415 1993 s->flags = BSF_GLOBAL | BSF_SYNTHETIC;
468392fb
AM
1994 s->section = glink;
1995 s->value = glink_vma - glink->vma;
1996 s->name = names;
1997 memcpy (names, "__glink", sizeof ("__glink"));
1998 names += sizeof ("__glink");
1999 s++;
2000 count++;
2001
2002 if (resolv_vma)
2003 {
2004 /* Add a symbol for the glink PLT resolver. */
86a4952b 2005 memset (s, 0, sizeof *s);
468392fb 2006 s->the_bfd = abfd;
6ba2a415 2007 s->flags = BSF_GLOBAL | BSF_SYNTHETIC;
468392fb
AM
2008 s->section = glink;
2009 s->value = resolv_vma - glink->vma;
2010 s->name = names;
2011 memcpy (names, "__glink_PLTresolve", sizeof ("__glink_PLTresolve"));
2012 names += sizeof ("__glink_PLTresolve");
2013 s++;
2014 count++;
2015 }
2016
2017 return count;
2018}
2019\f
25dbc73a
AM
2020/* The following functions are specific to the ELF linker, while
2021 functions above are used generally. They appear in this file more
2022 or less in the order in which they are called. eg.
2023 ppc_elf_check_relocs is called early in the link process,
2024 ppc_elf_finish_dynamic_sections is one of the last functions
2025 called. */
252b5132 2026
a6aa5195 2027/* Track PLT entries needed for a given symbol. We might need more
a877a2b6 2028 than one glink entry per symbol when generating a pic binary. */
a6aa5195
AM
2029struct plt_entry
2030{
2031 struct plt_entry *next;
2032
2033 /* -fPIC uses multiple GOT sections, one per file, called ".got2".
2034 This field stores the offset into .got2 used to initialise the
a877a2b6
AM
2035 GOT pointer reg. It will always be at least 32768. (Current
2036 gcc always uses an offset of 32768, but ld -r will pack .got2
2037 sections together resulting in larger offsets). */
a6aa5195
AM
2038 bfd_vma addend;
2039
2040 /* The .got2 section. */
2041 asection *sec;
2042
2043 /* PLT refcount or offset. */
2044 union
2045 {
2046 bfd_signed_vma refcount;
2047 bfd_vma offset;
2048 } plt;
2049
2050 /* .glink stub offset. */
2051 bfd_vma glink_offset;
2052};
2053
7c8bbca5
AM
2054/* Of those relocs that might be copied as dynamic relocs, this
2055 function selects those that must be copied when linking a shared
2056 library or PIE, even when the symbol is local. */
252b5132 2057
1d483afe
AM
2058static int
2059must_be_dyn_reloc (struct bfd_link_info *info,
2060 enum elf_ppc_reloc_type r_type)
2061{
2062 switch (r_type)
2063 {
2064 default:
7c8bbca5
AM
2065 /* Only relative relocs can be resolved when the object load
2066 address isn't fixed. DTPREL32 is excluded because the
2067 dynamic linker needs to differentiate global dynamic from
2068 local dynamic __tls_index pairs when PPC_OPT_TLS is set. */
1d483afe
AM
2069 return 1;
2070
2071 case R_PPC_REL24:
2072 case R_PPC_REL14:
2073 case R_PPC_REL14_BRTAKEN:
2074 case R_PPC_REL14_BRNTAKEN:
2075 case R_PPC_REL32:
2076 return 0;
2077
2078 case R_PPC_TPREL32:
2079 case R_PPC_TPREL16:
2080 case R_PPC_TPREL16_LO:
2081 case R_PPC_TPREL16_HI:
2082 case R_PPC_TPREL16_HA:
7c8bbca5
AM
2083 /* These relocations are relative but in a shared library the
2084 linker doesn't know the thread pointer base. */
2085 return bfd_link_dll (info);
1d483afe
AM
2086 }
2087}
252b5132 2088
25dbc73a
AM
2089/* If ELIMINATE_COPY_RELOCS is non-zero, the linker will try to avoid
2090 copying dynamic variables from a shared lib into an app's dynbss
2091 section, and instead use a dynamic relocation to point into the
2092 shared lib. */
2093#define ELIMINATE_COPY_RELOCS 1
252b5132 2094
f95f8542
AM
2095/* Used to track dynamic relocations for local symbols. */
2096struct ppc_dyn_relocs
2097{
2098 struct ppc_dyn_relocs *next;
2099
2100 /* The input section of the reloc. */
2101 asection *sec;
2102
2103 /* Total number of relocs copied for the input section. */
2104 unsigned int count : 31;
2105
2106 /* Whether this entry is for STT_GNU_IFUNC symbols. */
2107 unsigned int ifunc : 1;
2108};
2109
25dbc73a 2110/* PPC ELF linker hash entry. */
252b5132 2111
25dbc73a
AM
2112struct ppc_elf_link_hash_entry
2113{
2114 struct elf_link_hash_entry elf;
252b5132 2115
25dbc73a
AM
2116 /* If this symbol is used in the linker created sections, the processor
2117 specific backend uses this field to map the field into the offset
2118 from the beginning of the section. */
2119 elf_linker_section_pointers_t *linker_section_pointer;
252b5132 2120
25dbc73a 2121 /* Track dynamic relocs copied for this symbol. */
6061a67d 2122 struct elf_dyn_relocs *dyn_relocs;
252b5132 2123
37da22e5
AM
2124 /* Contexts in which symbol is used in the GOT.
2125 Bits are or'd into the mask as the corresponding relocs are
2126 encountered during check_relocs, with TLS_TLS being set when any
2127 of the other TLS bits are set. tls_optimize clears bits when
2128 optimizing to indicate the corresponding GOT entry type is not
2129 needed. If set, TLS_TLS is never cleared. tls_optimize may also
b00a0a86 2130 set TLS_GDIE when a GD reloc turns into an IE one.
37da22e5
AM
2131 These flags are also kept for local symbols. */
2132#define TLS_TLS 1 /* Any TLS reloc. */
2133#define TLS_GD 2 /* GD reloc. */
2134#define TLS_LD 4 /* LD reloc. */
2135#define TLS_TPREL 8 /* TPREL reloc, => IE. */
2136#define TLS_DTPREL 16 /* DTPREL reloc, => LD. */
2137#define TLS_MARK 32 /* __tls_get_addr call marked. */
b00a0a86 2138#define TLS_GDIE 64 /* GOT TPREL reloc resulting from GD->IE. */
bac3c8c5 2139 unsigned char tls_mask;
4dc4a9a5 2140
37da22e5
AM
2141 /* The above field is also used to mark function symbols. In which
2142 case TLS_TLS will be 0. */
2143#define PLT_IFUNC 2 /* STT_GNU_IFUNC. */
2d7ad24e 2144#define PLT_KEEP 4 /* inline plt call requires plt entry. */
37da22e5
AM
2145#define NON_GOT 256 /* local symbol plt, not stored. */
2146
4dc4a9a5
DJ
2147 /* Nonzero if we have seen a small data relocation referring to this
2148 symbol. */
d3e454b9
AM
2149 unsigned char has_sda_refs : 1;
2150
2151 /* Flag use of given relocations. */
2152 unsigned char has_addr16_ha : 1;
2153 unsigned char has_addr16_lo : 1;
25dbc73a 2154};
252b5132 2155
25dbc73a
AM
2156#define ppc_elf_hash_entry(ent) ((struct ppc_elf_link_hash_entry *) (ent))
2157
2158/* PPC ELF linker hash table. */
2159
2160struct ppc_elf_link_hash_table
2161{
2162 struct elf_link_hash_table elf;
2163
5446cbdf
AM
2164 /* Various options passed from the linker. */
2165 struct ppc_elf_params *params;
2166
25dbc73a 2167 /* Short-cuts to get to dynamic linker sections. */
d7128ce4 2168 asection *glink;
25dbc73a
AM
2169 asection *dynsbss;
2170 asection *relsbss;
c9a2f333 2171 elf_linker_section_t sdata[2];
25dbc73a 2172 asection *sbss;
6177242a 2173 asection *glink_eh_frame;
2d7ad24e
AM
2174 asection *pltlocal;
2175 asection *relpltlocal;
25dbc73a 2176
016687f8
AM
2177 /* The (unloaded but important) .rela.plt.unloaded on VxWorks. */
2178 asection *srelplt2;
2179
1d483afe 2180 /* Shortcut to __tls_get_addr. */
25dbc73a 2181 struct elf_link_hash_entry *tls_get_addr;
252b5132 2182
016687f8
AM
2183 /* The bfd that forced an old-style PLT. */
2184 bfd *old_bfd;
5b914448 2185
25dbc73a
AM
2186 /* TLS local dynamic got entry handling. */
2187 union {
2188 bfd_signed_vma refcount;
2189 bfd_vma offset;
2190 } tlsld_got;
252b5132 2191
c6dd29ce 2192 /* Offset of branch table to PltResolve function in glink. */
d7128ce4
AM
2193 bfd_vma glink_pltresolve;
2194
3b36f7e6
AM
2195 /* Size of reserved GOT entries. */
2196 unsigned int got_header_size;
2197 /* Non-zero if allocating the header left a gap. */
2198 unsigned int got_gap;
2199
4a3dc543
RS
2200 /* The type of PLT we have chosen to use. */
2201 enum ppc_elf_plt_type plt_type;
2202
9d8504b1 2203 /* True if the target system is VxWorks. */
016687f8 2204 unsigned int is_vxworks:1;
9d8504b1 2205
82e66161
AM
2206 /* Whether there exist local gnu indirect function resolvers,
2207 referenced by dynamic relocations. */
2208 unsigned int local_ifunc_resolver:1;
2209 unsigned int maybe_local_ifunc_resolver:1;
2210
9a23f96e
AM
2211 /* Set if tls optimization is enabled. */
2212 unsigned int do_tls_opt:1;
2213
3e04d765
AM
2214 /* Set if inline plt calls should be converted to direct calls. */
2215 unsigned int can_convert_all_inline_plt:1;
2216
9d8504b1
PB
2217 /* The size of PLT entries. */
2218 int plt_entry_size;
2219 /* The distance between adjacent PLT slots. */
2220 int plt_slot_size;
2221 /* The size of the first PLT entry. */
2222 int plt_initial_entry_size;
016687f8 2223
87d72d41
AM
2224 /* Small local sym cache. */
2225 struct sym_cache sym_cache;
25dbc73a 2226};
252b5132 2227
94caa966
AM
2228/* Rename some of the generic section flags to better document how they
2229 are used for ppc32. The flags are only valid for ppc32 elf objects. */
2230
2231/* Nonzero if this section has TLS related relocations. */
2232#define has_tls_reloc sec_flg0
2233
9737e8af
AM
2234/* Nonzero if this section has a call to __tls_get_addr lacking marker
2235 relocs. */
2236#define nomark_tls_get_addr sec_flg1
94caa966 2237
3e04d765
AM
2238 /* Flag set when PLTCALL relocs are detected. */
2239#define has_pltcall sec_flg2
2240
25dbc73a 2241/* Get the PPC ELF linker hash table from a link_info structure. */
252b5132 2242
25dbc73a 2243#define ppc_elf_hash_table(p) \
4dfe6ac6
NC
2244 (elf_hash_table_id ((struct elf_link_hash_table *) ((p)->hash)) \
2245 == PPC32_ELF_DATA ? ((struct ppc_elf_link_hash_table *) ((p)->hash)) : NULL)
252b5132 2246
25dbc73a 2247/* Create an entry in a PPC ELF linker hash table. */
252b5132 2248
25dbc73a
AM
2249static struct bfd_hash_entry *
2250ppc_elf_link_hash_newfunc (struct bfd_hash_entry *entry,
2251 struct bfd_hash_table *table,
2252 const char *string)
252b5132 2253{
25dbc73a
AM
2254 /* Allocate the structure if it has not already been allocated by a
2255 subclass. */
2256 if (entry == NULL)
2257 {
2258 entry = bfd_hash_allocate (table,
2259 sizeof (struct ppc_elf_link_hash_entry));
2260 if (entry == NULL)
2261 return entry;
2262 }
252b5132 2263
25dbc73a
AM
2264 /* Call the allocation method of the superclass. */
2265 entry = _bfd_elf_link_hash_newfunc (entry, table, string);
2266 if (entry != NULL)
2267 {
2268 ppc_elf_hash_entry (entry)->linker_section_pointer = NULL;
2269 ppc_elf_hash_entry (entry)->dyn_relocs = NULL;
2270 ppc_elf_hash_entry (entry)->tls_mask = 0;
5240d94d 2271 ppc_elf_hash_entry (entry)->has_sda_refs = 0;
25dbc73a 2272 }
252b5132 2273
25dbc73a 2274 return entry;
252b5132 2275}
3dab13f6 2276
25dbc73a 2277/* Create a PPC ELF linker hash table. */
3dab13f6 2278
25dbc73a
AM
2279static struct bfd_link_hash_table *
2280ppc_elf_link_hash_table_create (bfd *abfd)
3dab13f6 2281{
25dbc73a 2282 struct ppc_elf_link_hash_table *ret;
76e7a751 2283 static struct ppc_elf_params default_params
407aa07c 2284 = { PLT_OLD, 0, 0, 1, 0, 0, 12, 0, 0, 0 };
3dab13f6 2285
25dbc73a
AM
2286 ret = bfd_zmalloc (sizeof (struct ppc_elf_link_hash_table));
2287 if (ret == NULL)
2288 return NULL;
3dab13f6 2289
66eb6687
AM
2290 if (!_bfd_elf_link_hash_table_init (&ret->elf, abfd,
2291 ppc_elf_link_hash_newfunc,
4dfe6ac6
NC
2292 sizeof (struct ppc_elf_link_hash_entry),
2293 PPC32_ELF_DATA))
3dab13f6 2294 {
25dbc73a
AM
2295 free (ret);
2296 return NULL;
2297 }
58111eb7 2298
a6aa5195
AM
2299 ret->elf.init_plt_refcount.refcount = 0;
2300 ret->elf.init_plt_refcount.glist = NULL;
2301 ret->elf.init_plt_offset.offset = 0;
2302 ret->elf.init_plt_offset.glist = NULL;
2303
db434ba0
AM
2304 ret->params = &default_params;
2305
c9a2f333
AM
2306 ret->sdata[0].name = ".sdata";
2307 ret->sdata[0].sym_name = "_SDA_BASE_";
2308 ret->sdata[0].bss_name = ".sbss";
2309
2310 ret->sdata[1].name = ".sdata2";
2311 ret->sdata[1].sym_name = "_SDA2_BASE_";
2312 ret->sdata[1].bss_name = ".sbss2";
2313
9d8504b1
PB
2314 ret->plt_entry_size = 12;
2315 ret->plt_slot_size = 8;
2316 ret->plt_initial_entry_size = 72;
9d8504b1 2317
25dbc73a
AM
2318 return &ret->elf.root;
2319}
3dab13f6 2320
5446cbdf
AM
2321/* Hook linker params into hash table. */
2322
2323void
2324ppc_elf_link_params (struct bfd_link_info *info, struct ppc_elf_params *params)
2325{
2326 struct ppc_elf_link_hash_table *htab = ppc_elf_hash_table (info);
2327
2328 if (htab)
2329 htab->params = params;
76e7a751 2330 params->pagesize_p2 = bfd_log2 (params->pagesize);
5446cbdf
AM
2331}
2332
9d8504b1 2333/* Create .got and the related sections. */
3dab13f6 2334
25dbc73a
AM
2335static bfd_boolean
2336ppc_elf_create_got (bfd *abfd, struct bfd_link_info *info)
2337{
2338 struct ppc_elf_link_hash_table *htab;
3dab13f6 2339
25dbc73a
AM
2340 if (!_bfd_elf_create_got_section (abfd, info))
2341 return FALSE;
3dab13f6 2342
25dbc73a 2343 htab = ppc_elf_hash_table (info);
ce558b89 2344 if (!htab->is_vxworks)
9d8504b1
PB
2345 {
2346 /* The powerpc .got has a blrl instruction in it. Mark it
2347 executable. */
ce558b89
AM
2348 flagword flags = (SEC_ALLOC | SEC_LOAD | SEC_CODE | SEC_HAS_CONTENTS
2349 | SEC_IN_MEMORY | SEC_LINKER_CREATED);
fd361982 2350 if (!bfd_set_section_flags (htab->elf.sgot, flags))
9d8504b1
PB
2351 return FALSE;
2352 }
3dab13f6 2353
25dbc73a
AM
2354 return TRUE;
2355}
3dab13f6 2356
93d1b056
AM
2357/* Create a special linker section, used for R_PPC_EMB_SDAI16 and
2358 R_PPC_EMB_SDA2I16 pointers. These sections become part of .sdata
2359 and .sdata2. Create _SDA_BASE_ and _SDA2_BASE too. */
2360
2361static bfd_boolean
2362ppc_elf_create_linker_section (bfd *abfd,
2363 struct bfd_link_info *info,
2364 flagword flags,
2365 elf_linker_section_t *lsect)
2366{
2367 asection *s;
2368
2369 flags |= (SEC_ALLOC | SEC_LOAD | SEC_HAS_CONTENTS | SEC_IN_MEMORY
2370 | SEC_LINKER_CREATED);
2371
2372 s = bfd_make_section_anyway_with_flags (abfd, lsect->name, flags);
2373 if (s == NULL)
2374 return FALSE;
2375 lsect->section = s;
2376
2377 /* Define the sym on the first section of this name. */
2378 s = bfd_get_section_by_name (abfd, lsect->name);
2379
2380 lsect->sym = _bfd_elf_define_linkage_sym (abfd, info, s, lsect->sym_name);
2381 if (lsect->sym == NULL)
2382 return FALSE;
2383 lsect->sym->root.u.def.value = 0x8000;
2384 return TRUE;
2385}
2386
e054468f
AM
2387static bfd_boolean
2388ppc_elf_create_glink (bfd *abfd, struct bfd_link_info *info)
2389{
2390 struct ppc_elf_link_hash_table *htab = ppc_elf_hash_table (info);
2391 asection *s;
2392 flagword flags;
691d2e9a 2393 int p2align;
e054468f
AM
2394
2395 flags = (SEC_ALLOC | SEC_LOAD | SEC_CODE | SEC_READONLY | SEC_HAS_CONTENTS
2396 | SEC_IN_MEMORY | SEC_LINKER_CREATED);
2397 s = bfd_make_section_anyway_with_flags (abfd, ".glink", flags);
2398 htab->glink = s;
691d2e9a
AM
2399 p2align = htab->params->ppc476_workaround ? 6 : 4;
2400 if (p2align < htab->params->plt_stub_align)
2401 p2align = htab->params->plt_stub_align;
e054468f 2402 if (s == NULL
fd361982 2403 || !bfd_set_section_alignment (s, p2align))
e054468f
AM
2404 return FALSE;
2405
6177242a
AM
2406 if (!info->no_ld_generated_unwind_info)
2407 {
2408 flags = (SEC_ALLOC | SEC_LOAD | SEC_READONLY | SEC_HAS_CONTENTS
2409 | SEC_IN_MEMORY | SEC_LINKER_CREATED);
2410 s = bfd_make_section_anyway_with_flags (abfd, ".eh_frame", flags);
2411 htab->glink_eh_frame = s;
2412 if (s == NULL
fd361982 2413 || !bfd_set_section_alignment (s, 2))
6177242a
AM
2414 return FALSE;
2415 }
2416
e054468f
AM
2417 flags = SEC_ALLOC | SEC_LINKER_CREATED;
2418 s = bfd_make_section_anyway_with_flags (abfd, ".iplt", flags);
ce558b89 2419 htab->elf.iplt = s;
e054468f 2420 if (s == NULL
fd361982 2421 || !bfd_set_section_alignment (s, 4))
e054468f
AM
2422 return FALSE;
2423
2424 flags = (SEC_ALLOC | SEC_LOAD | SEC_READONLY | SEC_HAS_CONTENTS
2425 | SEC_IN_MEMORY | SEC_LINKER_CREATED);
14b2f831 2426 s = bfd_make_section_anyway_with_flags (abfd, ".rela.iplt", flags);
ce558b89 2427 htab->elf.irelplt = s;
e054468f 2428 if (s == NULL
fd361982 2429 || ! bfd_set_section_alignment (s, 2))
e054468f 2430 return FALSE;
93d1b056 2431
2d7ad24e
AM
2432 /* Local plt entries. */
2433 flags = (SEC_ALLOC | SEC_LOAD
2434 | SEC_HAS_CONTENTS | SEC_IN_MEMORY | SEC_LINKER_CREATED);
2435 htab->pltlocal = bfd_make_section_anyway_with_flags (abfd, ".branch_lt",
2436 flags);
2437 if (htab->pltlocal == NULL
fd361982 2438 || !bfd_set_section_alignment (htab->pltlocal, 2))
2d7ad24e
AM
2439 return FALSE;
2440
2441 if (bfd_link_pic (info))
2442 {
2443 flags = (SEC_ALLOC | SEC_LOAD | SEC_READONLY
2444 | SEC_HAS_CONTENTS | SEC_IN_MEMORY | SEC_LINKER_CREATED);
2445 htab->relpltlocal
2446 = bfd_make_section_anyway_with_flags (abfd, ".rela.branch_lt", flags);
2447 if (htab->relpltlocal == NULL
fd361982 2448 || !bfd_set_section_alignment (htab->relpltlocal, 2))
2d7ad24e
AM
2449 return FALSE;
2450 }
2451
93d1b056
AM
2452 if (!ppc_elf_create_linker_section (abfd, info, 0,
2453 &htab->sdata[0]))
2454 return FALSE;
2455
2456 if (!ppc_elf_create_linker_section (abfd, info, SEC_READONLY,
2457 &htab->sdata[1]))
2458 return FALSE;
2459
e054468f
AM
2460 return TRUE;
2461}
2462
25dbc73a
AM
2463/* We have to create .dynsbss and .rela.sbss here so that they get mapped
2464 to output sections (just like _bfd_elf_create_dynamic_sections has
2465 to create .dynbss and .rela.bss). */
3dab13f6 2466
25dbc73a
AM
2467static bfd_boolean
2468ppc_elf_create_dynamic_sections (bfd *abfd, struct bfd_link_info *info)
2469{
2470 struct ppc_elf_link_hash_table *htab;
2471 asection *s;
2472 flagword flags;
3dab13f6 2473
25dbc73a 2474 htab = ppc_elf_hash_table (info);
3dab13f6 2475
ce558b89 2476 if (htab->elf.sgot == NULL
25dbc73a 2477 && !ppc_elf_create_got (abfd, info))
3dab13f6
AM
2478 return FALSE;
2479
25dbc73a
AM
2480 if (!_bfd_elf_create_dynamic_sections (abfd, info))
2481 return FALSE;
3dab13f6 2482
e054468f
AM
2483 if (htab->glink == NULL
2484 && !ppc_elf_create_glink (abfd, info))
d7128ce4 2485 return FALSE;
3dab13f6 2486
14b2f831
AM
2487 s = bfd_make_section_anyway_with_flags (abfd, ".dynsbss",
2488 SEC_ALLOC | SEC_LINKER_CREATED);
3b36f7e6 2489 htab->dynsbss = s;
3496cb2a 2490 if (s == NULL)
25dbc73a 2491 return FALSE;
3dab13f6 2492
0e1862bb 2493 if (! bfd_link_pic (info))
25dbc73a 2494 {
e054468f
AM
2495 flags = (SEC_ALLOC | SEC_LOAD | SEC_READONLY | SEC_HAS_CONTENTS
2496 | SEC_IN_MEMORY | SEC_LINKER_CREATED);
14b2f831 2497 s = bfd_make_section_anyway_with_flags (abfd, ".rela.sbss", flags);
3b36f7e6 2498 htab->relsbss = s;
25dbc73a 2499 if (s == NULL
fd361982 2500 || !bfd_set_section_alignment (s, 2))
25dbc73a
AM
2501 return FALSE;
2502 }
3dab13f6 2503
711de32c
RS
2504 if (htab->is_vxworks
2505 && !elf_vxworks_create_dynamic_sections (abfd, info, &htab->srelplt2))
2506 return FALSE;
9d8504b1 2507
ce558b89 2508 s = htab->elf.splt;
3b36f7e6 2509 flags = SEC_ALLOC | SEC_CODE | SEC_LINKER_CREATED;
4a3dc543
RS
2510 if (htab->plt_type == PLT_VXWORKS)
2511 /* The VxWorks PLT is a loaded section with contents. */
2512 flags |= SEC_HAS_CONTENTS | SEC_LOAD | SEC_READONLY;
fd361982 2513 return bfd_set_section_flags (s, flags);
25dbc73a 2514}
3dab13f6 2515
25dbc73a 2516/* Copy the extra info we tack onto an elf_link_hash_entry. */
58111eb7 2517
25dbc73a 2518static void
fcfa13d2 2519ppc_elf_copy_indirect_symbol (struct bfd_link_info *info,
25dbc73a
AM
2520 struct elf_link_hash_entry *dir,
2521 struct elf_link_hash_entry *ind)
2522{
2523 struct ppc_elf_link_hash_entry *edir, *eind;
3dab13f6 2524
25dbc73a
AM
2525 edir = (struct ppc_elf_link_hash_entry *) dir;
2526 eind = (struct ppc_elf_link_hash_entry *) ind;
3dab13f6 2527
c79d6685
AM
2528 edir->tls_mask |= eind->tls_mask;
2529 edir->has_sda_refs |= eind->has_sda_refs;
2530
e81830c5
AM
2531 if (edir->elf.versioned != versioned_hidden)
2532 edir->elf.ref_dynamic |= eind->elf.ref_dynamic;
c79d6685
AM
2533 edir->elf.ref_regular |= eind->elf.ref_regular;
2534 edir->elf.ref_regular_nonweak |= eind->elf.ref_regular_nonweak;
4a7e5234 2535 edir->elf.non_got_ref |= eind->elf.non_got_ref;
c79d6685
AM
2536 edir->elf.needs_plt |= eind->elf.needs_plt;
2537 edir->elf.pointer_equality_needed |= eind->elf.pointer_equality_needed;
2538
287c7eaf
AM
2539 /* If we were called to copy over info for a weak sym, that's all. */
2540 if (eind->elf.root.type != bfd_link_hash_indirect)
2541 return;
2542
25dbc73a
AM
2543 if (eind->dyn_relocs != NULL)
2544 {
2545 if (edir->dyn_relocs != NULL)
3dab13f6 2546 {
6061a67d
AM
2547 struct elf_dyn_relocs **pp;
2548 struct elf_dyn_relocs *p;
3dab13f6 2549
fcfa13d2 2550 /* Add reloc counts against the indirect sym to the direct sym
25dbc73a
AM
2551 list. Merge any entries against the same section. */
2552 for (pp = &eind->dyn_relocs; (p = *pp) != NULL; )
3dab13f6 2553 {
6061a67d 2554 struct elf_dyn_relocs *q;
25dbc73a
AM
2555
2556 for (q = edir->dyn_relocs; q != NULL; q = q->next)
2557 if (q->sec == p->sec)
2558 {
2559 q->pc_count += p->pc_count;
2560 q->count += p->count;
2561 *pp = p->next;
2562 break;
2563 }
2564 if (q == NULL)
2565 pp = &p->next;
3dab13f6 2566 }
25dbc73a 2567 *pp = edir->dyn_relocs;
3dab13f6 2568 }
25dbc73a
AM
2569
2570 edir->dyn_relocs = eind->dyn_relocs;
2571 eind->dyn_relocs = NULL;
3dab13f6 2572 }
3dab13f6 2573
a6aa5195
AM
2574 /* Copy over the GOT refcount entries that we may have already seen to
2575 the symbol which just became indirect. */
fcfa13d2
AM
2576 edir->elf.got.refcount += eind->elf.got.refcount;
2577 eind->elf.got.refcount = 0;
a6aa5195
AM
2578
2579 /* And plt entries. */
2580 if (eind->elf.plt.plist != NULL)
2581 {
2582 if (edir->elf.plt.plist != NULL)
2583 {
2584 struct plt_entry **entp;
2585 struct plt_entry *ent;
2586
2587 for (entp = &eind->elf.plt.plist; (ent = *entp) != NULL; )
2588 {
2589 struct plt_entry *dent;
2590
2591 for (dent = edir->elf.plt.plist; dent != NULL; dent = dent->next)
2592 if (dent->sec == ent->sec && dent->addend == ent->addend)
2593 {
2594 dent->plt.refcount += ent->plt.refcount;
2595 *entp = ent->next;
2596 break;
2597 }
2598 if (dent == NULL)
2599 entp = &ent->next;
2600 }
2601 *entp = edir->elf.plt.plist;
2602 }
2603
2604 edir->elf.plt.plist = eind->elf.plt.plist;
2605 eind->elf.plt.plist = NULL;
2606 }
2607
fcfa13d2 2608 if (eind->elf.dynindx != -1)
25dbc73a 2609 {
fcfa13d2
AM
2610 if (edir->elf.dynindx != -1)
2611 _bfd_elf_strtab_delref (elf_hash_table (info)->dynstr,
2612 edir->elf.dynstr_index);
a6aa5195
AM
2613 edir->elf.dynindx = eind->elf.dynindx;
2614 edir->elf.dynstr_index = eind->elf.dynstr_index;
2615 eind->elf.dynindx = -1;
2616 eind->elf.dynstr_index = 0;
25dbc73a 2617 }
25dbc73a 2618}
3dab13f6 2619
25dbc73a
AM
2620/* Hook called by the linker routine which adds symbols from an object
2621 file. We use it to put .comm items in .sbss, and not .bss. */
58111eb7 2622
25dbc73a
AM
2623static bfd_boolean
2624ppc_elf_add_symbol_hook (bfd *abfd,
2625 struct bfd_link_info *info,
2626 Elf_Internal_Sym *sym,
2627 const char **namep ATTRIBUTE_UNUSED,
2628 flagword *flagsp ATTRIBUTE_UNUSED,
2629 asection **secp,
2630 bfd_vma *valp)
2631{
2632 if (sym->st_shndx == SHN_COMMON
0e1862bb 2633 && !bfd_link_relocatable (info)
0c8d6e5c
AM
2634 && is_ppc_elf (info->output_bfd)
2635 && sym->st_size <= elf_gp_size (abfd))
25dbc73a
AM
2636 {
2637 /* Common symbols less than or equal to -G nn bytes are automatically
2638 put into .sbss. */
2639 struct ppc_elf_link_hash_table *htab;
3dab13f6 2640
25dbc73a
AM
2641 htab = ppc_elf_hash_table (info);
2642 if (htab->sbss == NULL)
2643 {
644285ef 2644 flagword flags = SEC_IS_COMMON | SEC_LINKER_CREATED;
3dab13f6 2645
644285ef
AM
2646 if (!htab->elf.dynobj)
2647 htab->elf.dynobj = abfd;
2648
3496cb2a
L
2649 htab->sbss = bfd_make_section_anyway_with_flags (htab->elf.dynobj,
2650 ".sbss",
2651 flags);
2652 if (htab->sbss == NULL)
25dbc73a 2653 return FALSE;
3dab13f6 2654 }
3dab13f6 2655
25dbc73a
AM
2656 *secp = htab->sbss;
2657 *valp = sym->st_size;
2658 }
3dab13f6 2659
25dbc73a 2660 return TRUE;
3dab13f6
AM
2661}
2662\f
25dbc73a
AM
2663/* Find a linker generated pointer with a given addend and type. */
2664
2665static elf_linker_section_pointers_t *
2666elf_find_pointer_linker_section
2667 (elf_linker_section_pointers_t *linker_pointers,
2668 bfd_vma addend,
2669 elf_linker_section_t *lsect)
252b5132 2670{
25dbc73a
AM
2671 for ( ; linker_pointers != NULL; linker_pointers = linker_pointers->next)
2672 if (lsect == linker_pointers->lsect && addend == linker_pointers->addend)
2673 return linker_pointers;
252b5132 2674
25dbc73a
AM
2675 return NULL;
2676}
2677
2678/* Allocate a pointer to live in a linker created section. */
2679
2680static bfd_boolean
93d1b056
AM
2681elf_allocate_pointer_linker_section (bfd *abfd,
2682 elf_linker_section_t *lsect,
2683 struct elf_link_hash_entry *h,
2684 const Elf_Internal_Rela *rel)
25dbc73a
AM
2685{
2686 elf_linker_section_pointers_t **ptr_linker_section_ptr = NULL;
2687 elf_linker_section_pointers_t *linker_section_ptr;
2688 unsigned long r_symndx = ELF32_R_SYM (rel->r_info);
2689 bfd_size_type amt;
2690
2691 BFD_ASSERT (lsect != NULL);
2692
2693 /* Is this a global symbol? */
2694 if (h != NULL)
2695 {
2696 struct ppc_elf_link_hash_entry *eh;
2697
2698 /* Has this symbol already been allocated? If so, our work is done. */
2699 eh = (struct ppc_elf_link_hash_entry *) h;
2700 if (elf_find_pointer_linker_section (eh->linker_section_pointer,
2701 rel->r_addend,
2702 lsect))
2703 return TRUE;
2704
2705 ptr_linker_section_ptr = &eh->linker_section_pointer;
25dbc73a
AM
2706 }
2707 else
2708 {
0c8d6e5c 2709 BFD_ASSERT (is_ppc_elf (abfd));
0ffa91dd 2710
25dbc73a
AM
2711 /* Allocation of a pointer to a local symbol. */
2712 elf_linker_section_pointers_t **ptr = elf_local_ptr_offsets (abfd);
2713
2714 /* Allocate a table to hold the local symbols if first time. */
2715 if (!ptr)
2716 {
0ffa91dd 2717 unsigned int num_symbols = elf_symtab_hdr (abfd).sh_info;
25dbc73a
AM
2718
2719 amt = num_symbols;
2720 amt *= sizeof (elf_linker_section_pointers_t *);
2721 ptr = bfd_zalloc (abfd, amt);
2722
2723 if (!ptr)
2724 return FALSE;
2725
2726 elf_local_ptr_offsets (abfd) = ptr;
2727 }
2728
2729 /* Has this symbol already been allocated? If so, our work is done. */
2730 if (elf_find_pointer_linker_section (ptr[r_symndx],
2731 rel->r_addend,
2732 lsect))
2733 return TRUE;
252b5132 2734
25dbc73a 2735 ptr_linker_section_ptr = &ptr[r_symndx];
25dbc73a 2736 }
41fcb14e 2737
25dbc73a
AM
2738 /* Allocate space for a pointer in the linker section, and allocate
2739 a new pointer record from internal memory. */
2740 BFD_ASSERT (ptr_linker_section_ptr != NULL);
2741 amt = sizeof (elf_linker_section_pointers_t);
2742 linker_section_ptr = bfd_alloc (abfd, amt);
41fcb14e 2743
25dbc73a 2744 if (!linker_section_ptr)
7619e7c7 2745 return FALSE;
41fcb14e 2746
25dbc73a
AM
2747 linker_section_ptr->next = *ptr_linker_section_ptr;
2748 linker_section_ptr->addend = rel->r_addend;
2749 linker_section_ptr->lsect = lsect;
25dbc73a 2750 *ptr_linker_section_ptr = linker_section_ptr;
41fcb14e 2751
fd361982 2752 if (!bfd_set_section_alignment (lsect->section, 2))
93d1b056 2753 return FALSE;
25dbc73a
AM
2754 linker_section_ptr->offset = lsect->section->size;
2755 lsect->section->size += 4;
7619e7c7 2756
25dbc73a
AM
2757#ifdef DEBUG
2758 fprintf (stderr,
2759 "Create pointer in linker section %s, offset = %ld, section size = %ld\n",
2760 lsect->name, (long) linker_section_ptr->offset,
2761 (long) lsect->section->size);
2762#endif
7619e7c7
AM
2763
2764 return TRUE;
41fcb14e
AM
2765}
2766
e054468f 2767static struct plt_entry **
25dbc73a
AM
2768update_local_sym_info (bfd *abfd,
2769 Elf_Internal_Shdr *symtab_hdr,
2770 unsigned long r_symndx,
2771 int tls_type)
252b5132 2772{
25dbc73a 2773 bfd_signed_vma *local_got_refcounts = elf_local_got_refcounts (abfd);
e054468f 2774 struct plt_entry **local_plt;
bac3c8c5 2775 unsigned char *local_got_tls_masks;
252b5132 2776
25dbc73a 2777 if (local_got_refcounts == NULL)
252b5132 2778 {
25dbc73a
AM
2779 bfd_size_type size = symtab_hdr->sh_info;
2780
e054468f
AM
2781 size *= (sizeof (*local_got_refcounts)
2782 + sizeof (*local_plt)
2783 + sizeof (*local_got_tls_masks));
25dbc73a
AM
2784 local_got_refcounts = bfd_zalloc (abfd, size);
2785 if (local_got_refcounts == NULL)
e054468f 2786 return NULL;
25dbc73a 2787 elf_local_got_refcounts (abfd) = local_got_refcounts;
252b5132 2788 }
41fcb14e 2789
e054468f 2790 local_plt = (struct plt_entry **) (local_got_refcounts + symtab_hdr->sh_info);
bac3c8c5 2791 local_got_tls_masks = (unsigned char *) (local_plt + symtab_hdr->sh_info);
37da22e5
AM
2792 local_got_tls_masks[r_symndx] |= tls_type & 0xff;
2793 if ((tls_type & NON_GOT) == 0)
e054468f
AM
2794 local_got_refcounts[r_symndx] += 1;
2795 return local_plt + r_symndx;
25dbc73a 2796}
41fcb14e 2797
a6aa5195 2798static bfd_boolean
3ec01793 2799update_plt_info (bfd *abfd, struct plt_entry **plist,
a6aa5195
AM
2800 asection *sec, bfd_vma addend)
2801{
2802 struct plt_entry *ent;
2803
32af9f6e
AM
2804 if (addend < 32768)
2805 sec = NULL;
3ec01793 2806 for (ent = *plist; ent != NULL; ent = ent->next)
a6aa5195
AM
2807 if (ent->sec == sec && ent->addend == addend)
2808 break;
2809 if (ent == NULL)
2810 {
986f0783 2811 size_t amt = sizeof (*ent);
a6aa5195
AM
2812 ent = bfd_alloc (abfd, amt);
2813 if (ent == NULL)
2814 return FALSE;
3ec01793 2815 ent->next = *plist;
a6aa5195
AM
2816 ent->sec = sec;
2817 ent->addend = addend;
2818 ent->plt.refcount = 0;
3ec01793 2819 *plist = ent;
a6aa5195
AM
2820 }
2821 ent->plt.refcount += 1;
2822 return TRUE;
2823}
2824
2825static struct plt_entry *
3ec01793 2826find_plt_ent (struct plt_entry **plist, asection *sec, bfd_vma addend)
a6aa5195
AM
2827{
2828 struct plt_entry *ent;
2829
2830 if (addend < 32768)
2831 sec = NULL;
3ec01793 2832 for (ent = *plist; ent != NULL; ent = ent->next)
a6aa5195
AM
2833 if (ent->sec == sec && ent->addend == addend)
2834 break;
2835 return ent;
2836}
2837
e054468f
AM
2838static bfd_boolean
2839is_branch_reloc (enum elf_ppc_reloc_type r_type)
2840{
2841 return (r_type == R_PPC_PLTREL24
2842 || r_type == R_PPC_LOCAL24PC
2843 || r_type == R_PPC_REL24
2844 || r_type == R_PPC_REL14
2845 || r_type == R_PPC_REL14_BRTAKEN
2846 || r_type == R_PPC_REL14_BRNTAKEN
2847 || r_type == R_PPC_ADDR24
2848 || r_type == R_PPC_ADDR14
2849 || r_type == R_PPC_ADDR14_BRTAKEN
dfdaec14
AJ
2850 || r_type == R_PPC_ADDR14_BRNTAKEN
2851 || r_type == R_PPC_VLE_REL24);
e054468f
AM
2852}
2853
23cedd1d
AM
2854/* Relocs on inline plt call sequence insns prior to the call. */
2855
2856static bfd_boolean
2857is_plt_seq_reloc (enum elf_ppc_reloc_type r_type)
2858{
2859 return (r_type == R_PPC_PLT16_HA
2860 || r_type == R_PPC_PLT16_HI
2861 || r_type == R_PPC_PLT16_LO
2862 || r_type == R_PPC_PLTSEQ);
2863}
2864
25dbc73a
AM
2865static void
2866bad_shared_reloc (bfd *abfd, enum elf_ppc_reloc_type r_type)
2867{
4eca0228 2868 _bfd_error_handler
695344c0 2869 /* xgettext:c-format */
871b3ab2 2870 (_("%pB: relocation %s cannot be used when making a shared object"),
25dbc73a
AM
2871 abfd,
2872 ppc_elf_howto_table[r_type]->name);
2873 bfd_set_error (bfd_error_bad_value);
252b5132
RH
2874}
2875
25dbc73a
AM
2876/* Look through the relocs for a section during the first phase, and
2877 allocate space in the global offset table or procedure linkage
2878 table. */
252b5132 2879
b34976b6 2880static bfd_boolean
25dbc73a
AM
2881ppc_elf_check_relocs (bfd *abfd,
2882 struct bfd_link_info *info,
2883 asection *sec,
2884 const Elf_Internal_Rela *relocs)
252b5132 2885{
7619e7c7 2886 struct ppc_elf_link_hash_table *htab;
25dbc73a
AM
2887 Elf_Internal_Shdr *symtab_hdr;
2888 struct elf_link_hash_entry **sym_hashes;
2889 const Elf_Internal_Rela *rel;
2890 const Elf_Internal_Rela *rel_end;
a6aa5195 2891 asection *got2, *sreloc;
727fc41e 2892 struct elf_link_hash_entry *tga;
25dbc73a 2893
0e1862bb 2894 if (bfd_link_relocatable (info))
25dbc73a 2895 return TRUE;
252b5132 2896
c87b5a93
AM
2897 /* Don't do anything special with non-loaded, non-alloced sections.
2898 In particular, any relocs in such sections should not affect GOT
2899 and PLT reference counting (ie. we don't allow them to create GOT
2900 or PLT entries), there's no possibility or desire to optimize TLS
2901 relocs, and there's not much point in propagating relocs to shared
2902 libs that the dynamic linker won't relocate. */
2903 if ((sec->flags & SEC_ALLOC) == 0)
2904 return TRUE;
2905
252b5132 2906#ifdef DEBUG
871b3ab2 2907 _bfd_error_handler ("ppc_elf_check_relocs called for section %pA in %pB",
25dbc73a 2908 sec, abfd);
252b5132
RH
2909#endif
2910
0c8d6e5c 2911 BFD_ASSERT (is_ppc_elf (abfd));
0ffa91dd 2912
25dbc73a
AM
2913 /* Initialize howto table if not already done. */
2914 if (!ppc_elf_howto_table[R_PPC_ADDR32])
2915 ppc_elf_howto_init ();
2916
7619e7c7 2917 htab = ppc_elf_hash_table (info);
25f23106
AM
2918 if (htab->glink == NULL)
2919 {
2920 if (htab->elf.dynobj == NULL)
2921 htab->elf.dynobj = abfd;
2922 if (!ppc_elf_create_glink (htab->elf.dynobj, info))
2923 return FALSE;
2924 }
727fc41e
AM
2925 tga = elf_link_hash_lookup (&htab->elf, "__tls_get_addr",
2926 FALSE, FALSE, TRUE);
0ffa91dd 2927 symtab_hdr = &elf_symtab_hdr (abfd);
25dbc73a 2928 sym_hashes = elf_sym_hashes (abfd);
a6aa5195 2929 got2 = bfd_get_section_by_name (abfd, ".got2");
25dbc73a
AM
2930 sreloc = NULL;
2931
2932 rel_end = relocs + sec->reloc_count;
2933 for (rel = relocs; rel < rel_end; rel++)
2934 {
2935 unsigned long r_symndx;
2936 enum elf_ppc_reloc_type r_type;
2937 struct elf_link_hash_entry *h;
727fc41e 2938 int tls_type;
cbf95972 2939 struct plt_entry **ifunc;
2d7ad24e
AM
2940 struct plt_entry **pltent;
2941 bfd_vma addend;
25dbc73a
AM
2942
2943 r_symndx = ELF32_R_SYM (rel->r_info);
2944 if (r_symndx < symtab_hdr->sh_info)
2945 h = NULL;
2946 else
973a3492
L
2947 {
2948 h = sym_hashes[r_symndx - symtab_hdr->sh_info];
2949 while (h->root.type == bfd_link_hash_indirect
2950 || h->root.type == bfd_link_hash_warning)
2951 h = (struct elf_link_hash_entry *) h->root.u.i.link;
2952 }
25dbc73a
AM
2953
2954 /* If a relocation refers to _GLOBAL_OFFSET_TABLE_, create the .got.
2955 This shows up in particular in an R_PPC_ADDR32 in the eabi
2956 startup code. */
3b36f7e6 2957 if (h != NULL
ce558b89 2958 && htab->elf.sgot == NULL
3b36f7e6 2959 && strcmp (h->root.root.string, "_GLOBAL_OFFSET_TABLE_") == 0)
252b5132 2960 {
3b36f7e6
AM
2961 if (htab->elf.dynobj == NULL)
2962 htab->elf.dynobj = abfd;
2963 if (!ppc_elf_create_got (htab->elf.dynobj, info))
2964 return FALSE;
2965 BFD_ASSERT (h == htab->elf.hgot);
25dbc73a 2966 }
252b5132 2967
727fc41e 2968 tls_type = 0;
de972ffa 2969 r_type = ELF32_R_TYPE (rel->r_info);
cbf95972 2970 ifunc = NULL;
06a162cf 2971 if (h == NULL && !htab->is_vxworks)
e054468f 2972 {
06a162cf
AM
2973 Elf_Internal_Sym *isym = bfd_sym_from_r_symndx (&htab->sym_cache,
2974 abfd, r_symndx);
2975 if (isym == NULL)
2976 return FALSE;
2977
0bed072f 2978 if (ELF_ST_TYPE (isym->st_info) == STT_GNU_IFUNC)
e054468f 2979 {
0bed072f 2980 /* Set PLT_IFUNC flag for this sym, no GOT entry yet. */
06a162cf 2981 ifunc = update_local_sym_info (abfd, symtab_hdr, r_symndx,
37da22e5 2982 NON_GOT | PLT_IFUNC);
06a162cf 2983 if (ifunc == NULL)
e054468f
AM
2984 return FALSE;
2985
06a162cf
AM
2986 /* STT_GNU_IFUNC symbols must have a PLT entry;
2987 In a non-pie executable even when there are
2988 no plt calls. */
0e1862bb 2989 if (!bfd_link_pic (info)
08be3224
AM
2990 || is_branch_reloc (r_type)
2991 || r_type == R_PPC_PLT16_LO
2992 || r_type == R_PPC_PLT16_HI
2993 || r_type == R_PPC_PLT16_HA)
e054468f 2994 {
2d7ad24e 2995 addend = 0;
0bed072f 2996 if (r_type == R_PPC_PLTREL24)
08be3224
AM
2997 ppc_elf_tdata (abfd)->makes_plt_call = 1;
2998 if (bfd_link_pic (info)
2999 && (r_type == R_PPC_PLTREL24
3000 || r_type == R_PPC_PLT16_LO
3001 || r_type == R_PPC_PLT16_HI
3002 || r_type == R_PPC_PLT16_HA))
3003 addend = rel->r_addend;
0bed072f
AM
3004 if (!update_plt_info (abfd, ifunc, got2, addend))
3005 return FALSE;
e054468f
AM
3006 }
3007 }
25f23106
AM
3008 }
3009
de972ffa
AM
3010 if (!htab->is_vxworks
3011 && is_branch_reloc (r_type)
3012 && h != NULL
3013 && h == tga)
25f23106 3014 {
de972ffa
AM
3015 if (rel != relocs
3016 && (ELF32_R_TYPE (rel[-1].r_info) == R_PPC_TLSGD
3017 || ELF32_R_TYPE (rel[-1].r_info) == R_PPC_TLSLD))
3018 /* We have a new-style __tls_get_addr call with a marker
3019 reloc. */
3020 ;
3021 else
3022 /* Mark this section as having an old-style call. */
9737e8af 3023 sec->nomark_tls_get_addr = 1;
e054468f 3024 }
727fc41e 3025
25dbc73a
AM
3026 switch (r_type)
3027 {
727fc41e
AM
3028 case R_PPC_TLSGD:
3029 case R_PPC_TLSLD:
3030 /* These special tls relocs tie a call to __tls_get_addr with
3031 its parameter symbol. */
37da22e5
AM
3032 if (h != NULL)
3033 ppc_elf_hash_entry (h)->tls_mask |= TLS_TLS | TLS_MARK;
3034 else
3035 if (!update_local_sym_info (abfd, symtab_hdr, r_symndx,
3036 NON_GOT | TLS_TLS | TLS_MARK))
3037 return FALSE;
727fc41e
AM
3038 break;
3039
23cedd1d
AM
3040 case R_PPC_PLTSEQ:
3041 break;
3042
25dbc73a
AM
3043 case R_PPC_GOT_TLSLD16:
3044 case R_PPC_GOT_TLSLD16_LO:
3045 case R_PPC_GOT_TLSLD16_HI:
3046 case R_PPC_GOT_TLSLD16_HA:
25dbc73a
AM
3047 tls_type = TLS_TLS | TLS_LD;
3048 goto dogottls;
252b5132 3049
25dbc73a
AM
3050 case R_PPC_GOT_TLSGD16:
3051 case R_PPC_GOT_TLSGD16_LO:
3052 case R_PPC_GOT_TLSGD16_HI:
3053 case R_PPC_GOT_TLSGD16_HA:
3054 tls_type = TLS_TLS | TLS_GD;
3055 goto dogottls;
3056
3057 case R_PPC_GOT_TPREL16:
3058 case R_PPC_GOT_TPREL16_LO:
3059 case R_PPC_GOT_TPREL16_HI:
3060 case R_PPC_GOT_TPREL16_HA:
7c8bbca5 3061 if (bfd_link_dll (info))
25dbc73a
AM
3062 info->flags |= DF_STATIC_TLS;
3063 tls_type = TLS_TLS | TLS_TPREL;
3064 goto dogottls;
3065
3066 case R_PPC_GOT_DTPREL16:
3067 case R_PPC_GOT_DTPREL16_LO:
3068 case R_PPC_GOT_DTPREL16_HI:
3069 case R_PPC_GOT_DTPREL16_HA:
3070 tls_type = TLS_TLS | TLS_DTPREL;
3071 dogottls:
3072 sec->has_tls_reloc = 1;
1a0670f3 3073 /* Fall through. */
252b5132 3074
25dbc73a
AM
3075 /* GOT16 relocations */
3076 case R_PPC_GOT16:
3077 case R_PPC_GOT16_LO:
3078 case R_PPC_GOT16_HI:
3079 case R_PPC_GOT16_HA:
3080 /* This symbol requires a global offset table entry. */
ce558b89 3081 if (htab->elf.sgot == NULL)
25dbc73a
AM
3082 {
3083 if (htab->elf.dynobj == NULL)
3084 htab->elf.dynobj = abfd;
3085 if (!ppc_elf_create_got (htab->elf.dynobj, info))
3086 return FALSE;
3087 }
3088 if (h != NULL)
3089 {
3090 h->got.refcount += 1;
3091 ppc_elf_hash_entry (h)->tls_mask |= tls_type;
3092 }
3093 else
3094 /* This is a global offset table entry for a local symbol. */
3095 if (!update_local_sym_info (abfd, symtab_hdr, r_symndx, tls_type))
3096 return FALSE;
91e21fb7
AM
3097
3098 /* We may also need a plt entry if the symbol turns out to be
3099 an ifunc. */
0e1862bb 3100 if (h != NULL && !bfd_link_pic (info))
91e21fb7
AM
3101 {
3102 if (!update_plt_info (abfd, &h->plt.plist, NULL, 0))
3103 return FALSE;
3104 }
25dbc73a 3105 break;
252b5132 3106
25dbc73a
AM
3107 /* Indirect .sdata relocation. */
3108 case R_PPC_EMB_SDAI16:
93d1b056
AM
3109 htab->sdata[0].sym->ref_regular = 1;
3110 if (!elf_allocate_pointer_linker_section (abfd, &htab->sdata[0],
3111 h, rel))
25dbc73a 3112 return FALSE;
046183de
AM
3113 if (h != NULL)
3114 {
3115 ppc_elf_hash_entry (h)->has_sda_refs = TRUE;
3116 h->non_got_ref = TRUE;
3117 }
25dbc73a 3118 break;
252b5132 3119
25dbc73a
AM
3120 /* Indirect .sdata2 relocation. */
3121 case R_PPC_EMB_SDA2I16:
c0d9f31d 3122 if (!bfd_link_executable (info))
25dbc73a
AM
3123 {
3124 bad_shared_reloc (abfd, r_type);
3125 return FALSE;
3126 }
93d1b056
AM
3127 htab->sdata[1].sym->ref_regular = 1;
3128 if (!elf_allocate_pointer_linker_section (abfd, &htab->sdata[1],
3129 h, rel))
25dbc73a 3130 return FALSE;
046183de
AM
3131 if (h != NULL)
3132 {
3133 ppc_elf_hash_entry (h)->has_sda_refs = TRUE;
3134 h->non_got_ref = TRUE;
3135 }
25dbc73a 3136 break;
252b5132 3137
93d1b056
AM
3138 case R_PPC_SDAREL16:
3139 htab->sdata[0].sym->ref_regular = 1;
1a0670f3 3140 /* Fall through. */
93d1b056 3141
b9c361e0
JL
3142 case R_PPC_VLE_SDAREL_LO16A:
3143 case R_PPC_VLE_SDAREL_LO16D:
3144 case R_PPC_VLE_SDAREL_HI16A:
3145 case R_PPC_VLE_SDAREL_HI16D:
3146 case R_PPC_VLE_SDAREL_HA16A:
3147 case R_PPC_VLE_SDAREL_HA16D:
046183de
AM
3148 if (h != NULL)
3149 {
3150 ppc_elf_hash_entry (h)->has_sda_refs = TRUE;
3151 h->non_got_ref = TRUE;
3152 }
3153 break;
3154
b9c361e0
JL
3155 case R_PPC_VLE_REL8:
3156 case R_PPC_VLE_REL15:
3157 case R_PPC_VLE_REL24:
3158 case R_PPC_VLE_LO16A:
3159 case R_PPC_VLE_LO16D:
3160 case R_PPC_VLE_HI16A:
3161 case R_PPC_VLE_HI16D:
3162 case R_PPC_VLE_HA16A:
3163 case R_PPC_VLE_HA16D:
83eef883 3164 case R_PPC_VLE_ADDR20:
b9c361e0
JL
3165 break;
3166
25dbc73a 3167 case R_PPC_EMB_SDA2REL:
c0d9f31d 3168 if (!bfd_link_executable (info))
046183de
AM
3169 {
3170 bad_shared_reloc (abfd, r_type);
3171 return FALSE;
3172 }
93d1b056 3173 htab->sdata[1].sym->ref_regular = 1;
046183de
AM
3174 if (h != NULL)
3175 {
3176 ppc_elf_hash_entry (h)->has_sda_refs = TRUE;
3177 h->non_got_ref = TRUE;
3178 }
3179 break;
3180
b9c361e0
JL
3181 case R_PPC_VLE_SDA21_LO:
3182 case R_PPC_VLE_SDA21:
25dbc73a
AM
3183 case R_PPC_EMB_SDA21:
3184 case R_PPC_EMB_RELSDA:
046183de
AM
3185 if (h != NULL)
3186 {
3187 ppc_elf_hash_entry (h)->has_sda_refs = TRUE;
3188 h->non_got_ref = TRUE;
3189 }
3190 break;
3191
25dbc73a
AM
3192 case R_PPC_EMB_NADDR32:
3193 case R_PPC_EMB_NADDR16:
3194 case R_PPC_EMB_NADDR16_LO:
3195 case R_PPC_EMB_NADDR16_HI:
3196 case R_PPC_EMB_NADDR16_HA:
4dc4a9a5 3197 if (h != NULL)
046183de 3198 h->non_got_ref = TRUE;
25dbc73a 3199 break;
252b5132 3200
25dbc73a 3201 case R_PPC_PLTREL24:
de972ffa 3202 if (h == NULL)
6d78d0b9 3203 break;
08be3224 3204 ppc_elf_tdata (abfd)->makes_plt_call = 1;
3e04d765 3205 goto pltentry;
08be3224 3206
23cedd1d 3207 case R_PPC_PLTCALL:
3e04d765
AM
3208 sec->has_pltcall = 1;
3209 /* Fall through. */
3210
6d78d0b9 3211 case R_PPC_PLT32:
25dbc73a
AM
3212 case R_PPC_PLTREL32:
3213 case R_PPC_PLT16_LO:
3214 case R_PPC_PLT16_HI:
3215 case R_PPC_PLT16_HA:
3e04d765 3216 pltentry:
25dbc73a
AM
3217#ifdef DEBUG
3218 fprintf (stderr, "Reloc requires a PLT entry\n");
3219#endif
cbf95972 3220 /* This symbol requires a procedure linkage table entry. */
25dbc73a
AM
3221 if (h == NULL)
3222 {
2d7ad24e
AM
3223 pltent = update_local_sym_info (abfd, symtab_hdr, r_symndx,
3224 NON_GOT | PLT_KEEP);
3225 if (pltent == NULL)
3226 return FALSE;
25dbc73a 3227 }
a6aa5195
AM
3228 else
3229 {
2d7ad24e
AM
3230 if (r_type != R_PPC_PLTREL24)
3231 ppc_elf_hash_entry (h)->tls_mask |= PLT_KEEP;
a6aa5195 3232 h->needs_plt = 1;
2d7ad24e 3233 pltent = &h->plt.plist;
a6aa5195 3234 }
2d7ad24e
AM
3235 addend = 0;
3236 if (bfd_link_pic (info)
3237 && (r_type == R_PPC_PLTREL24
3238 || r_type == R_PPC_PLT16_LO
3239 || r_type == R_PPC_PLT16_HI
3240 || r_type == R_PPC_PLT16_HA))
3241 addend = rel->r_addend;
3242 if (!update_plt_info (abfd, pltent, got2, addend))
3243 return FALSE;
25dbc73a 3244 break;
ee05f2fe 3245
25dbc73a
AM
3246 /* The following relocations don't need to propagate the
3247 relocation if linking a shared object since they are
3248 section relative. */
3249 case R_PPC_SECTOFF:
3250 case R_PPC_SECTOFF_LO:
3251 case R_PPC_SECTOFF_HI:
3252 case R_PPC_SECTOFF_HA:
3253 case R_PPC_DTPREL16:
3254 case R_PPC_DTPREL16_LO:
3255 case R_PPC_DTPREL16_HI:
3256 case R_PPC_DTPREL16_HA:
3257 case R_PPC_TOC16:
3258 break;
252b5132 3259
d7128ce4
AM
3260 case R_PPC_REL16:
3261 case R_PPC_REL16_LO:
3262 case R_PPC_REL16_HI:
3263 case R_PPC_REL16_HA:
a680de9a 3264 case R_PPC_REL16DX_HA:
016687f8 3265 ppc_elf_tdata (abfd)->has_rel16 = 1;
d7128ce4
AM
3266 break;
3267
a6aa5195 3268 /* These are just markers. */
25dbc73a
AM
3269 case R_PPC_TLS:
3270 case R_PPC_EMB_MRKREF:
3271 case R_PPC_NONE:
3272 case R_PPC_max:
32af9f6e
AM
3273 case R_PPC_RELAX:
3274 case R_PPC_RELAX_PLT:
3275 case R_PPC_RELAX_PLTREL24:
7ba71655 3276 case R_PPC_16DX_HA:
25dbc73a 3277 break;
252b5132 3278
25dbc73a
AM
3279 /* These should only appear in dynamic objects. */
3280 case R_PPC_COPY:
3281 case R_PPC_GLOB_DAT:
3282 case R_PPC_JMP_SLOT:
3283 case R_PPC_RELATIVE:
e054468f 3284 case R_PPC_IRELATIVE:
25dbc73a 3285 break;
252b5132 3286
25dbc73a
AM
3287 /* These aren't handled yet. We'll report an error later. */
3288 case R_PPC_ADDR30:
3289 case R_PPC_EMB_RELSEC16:
3290 case R_PPC_EMB_RELST_LO:
3291 case R_PPC_EMB_RELST_HI:
3292 case R_PPC_EMB_RELST_HA:
3293 case R_PPC_EMB_BIT_FLD:
3294 break;
252b5132 3295
25dbc73a
AM
3296 /* This refers only to functions defined in the shared library. */
3297 case R_PPC_LOCAL24PC:
727fc41e 3298 if (h != NULL && h == htab->elf.hgot && htab->plt_type == PLT_UNSET)
016687f8
AM
3299 {
3300 htab->plt_type = PLT_OLD;
3301 htab->old_bfd = abfd;
3302 }
c7e17e05
AM
3303 if (h != NULL && h->type == STT_GNU_IFUNC)
3304 {
c7e17e05
AM
3305 h->needs_plt = 1;
3306 if (!update_plt_info (abfd, &h->plt.plist, NULL, 0))
3307 return FALSE;
3308 }
25dbc73a 3309 break;
252b5132 3310
25dbc73a
AM
3311 /* This relocation describes the C++ object vtable hierarchy.
3312 Reconstruct it for later use during GC. */
3313 case R_PPC_GNU_VTINHERIT:
3314 if (!bfd_elf_gc_record_vtinherit (abfd, sec, h, rel->r_offset))
3315 return FALSE;
3316 break;
252b5132 3317
25dbc73a
AM
3318 /* This relocation describes which C++ vtable entries are actually
3319 used. Record for later use during GC. */
3320 case R_PPC_GNU_VTENTRY:
a0ea3a14 3321 if (!bfd_elf_gc_record_vtentry (abfd, sec, h, rel->r_addend))
25dbc73a
AM
3322 return FALSE;
3323 break;
252b5132 3324
7c8bbca5 3325 /* We shouldn't really be seeing TPREL32. */
25dbc73a 3326 case R_PPC_TPREL32:
1d483afe
AM
3327 case R_PPC_TPREL16:
3328 case R_PPC_TPREL16_LO:
3329 case R_PPC_TPREL16_HI:
3330 case R_PPC_TPREL16_HA:
7c8bbca5 3331 if (bfd_link_dll (info))
25dbc73a
AM
3332 info->flags |= DF_STATIC_TLS;
3333 goto dodyn;
252b5132 3334
25dbc73a
AM
3335 /* Nor these. */
3336 case R_PPC_DTPMOD32:
3337 case R_PPC_DTPREL32:
3338 goto dodyn;
252b5132 3339
9edfd1af
AM
3340 case R_PPC_REL32:
3341 if (h == NULL
3342 && got2 != NULL
3343 && (sec->flags & SEC_CODE) != 0
0e1862bb 3344 && bfd_link_pic (info)
4a3dc543 3345 && htab->plt_type == PLT_UNSET)
9edfd1af
AM
3346 {
3347 /* Old -fPIC gcc code has .long LCTOC1-LCFx just before
3348 the start of a function, which assembles to a REL32
3349 reference to .got2. If we detect one of these, then
3350 force the old PLT layout because the linker cannot
3351 reliably deduce the GOT pointer value needed for
3352 PLT call stubs. */
3353 asection *s;
87d72d41 3354 Elf_Internal_Sym *isym;
9edfd1af 3355
87d72d41
AM
3356 isym = bfd_sym_from_r_symndx (&htab->sym_cache,
3357 abfd, r_symndx);
3358 if (isym == NULL)
3359 return FALSE;
3360
3361 s = bfd_section_from_elf_index (abfd, isym->st_shndx);
9edfd1af 3362 if (s == got2)
016687f8
AM
3363 {
3364 htab->plt_type = PLT_OLD;
3365 htab->old_bfd = abfd;
3366 }
9edfd1af 3367 }
7123df0e 3368 if (h == NULL || h == htab->elf.hgot)
fd38b44c 3369 break;
625af618
AM
3370 /* fall through */
3371
3372 case R_PPC_ADDR32:
3373 case R_PPC_ADDR16:
3374 case R_PPC_ADDR16_LO:
3375 case R_PPC_ADDR16_HI:
3376 case R_PPC_ADDR16_HA:
3377 case R_PPC_UADDR32:
3378 case R_PPC_UADDR16:
0e1862bb 3379 if (h != NULL && !bfd_link_pic (info))
625af618
AM
3380 {
3381 /* We may need a plt entry if the symbol turns out to be
3382 a function defined in a dynamic object. */
3ec01793 3383 if (!update_plt_info (abfd, &h->plt.plist, NULL, 0))
625af618
AM
3384 return FALSE;
3385
3386 /* We may need a copy reloc too. */
3387 h->non_got_ref = 1;
3388 h->pointer_equality_needed = 1;
d3e454b9
AM
3389 if (r_type == R_PPC_ADDR16_HA)
3390 ppc_elf_hash_entry (h)->has_addr16_ha = 1;
3391 if (r_type == R_PPC_ADDR16_LO)
3392 ppc_elf_hash_entry (h)->has_addr16_lo = 1;
625af618
AM
3393 }
3394 goto dodyn;
9edfd1af 3395
25dbc73a
AM
3396 case R_PPC_REL24:
3397 case R_PPC_REL14:
3398 case R_PPC_REL14_BRTAKEN:
3399 case R_PPC_REL14_BRNTAKEN:
d7128ce4 3400 if (h == NULL)
25dbc73a 3401 break;
7123df0e 3402 if (h == htab->elf.hgot)
d7128ce4 3403 {
7123df0e 3404 if (htab->plt_type == PLT_UNSET)
016687f8
AM
3405 {
3406 htab->plt_type = PLT_OLD;
3407 htab->old_bfd = abfd;
3408 }
d7128ce4
AM
3409 break;
3410 }
25dbc73a 3411 /* fall through */
ee05f2fe 3412
25dbc73a 3413 case R_PPC_ADDR24:
25dbc73a
AM
3414 case R_PPC_ADDR14:
3415 case R_PPC_ADDR14_BRTAKEN:
3416 case R_PPC_ADDR14_BRNTAKEN:
0e1862bb 3417 if (h != NULL && !bfd_link_pic (info))
25dbc73a
AM
3418 {
3419 /* We may need a plt entry if the symbol turns out to be
3420 a function defined in a dynamic object. */
e054468f 3421 h->needs_plt = 1;
de972ffa 3422 if (!update_plt_info (abfd, &h->plt.plist, NULL, 0))
a6aa5195 3423 return FALSE;
625af618 3424 break;
25dbc73a 3425 }
7619e7c7 3426
25dbc73a
AM
3427 dodyn:
3428 /* If we are creating a shared library, and this is a reloc
3429 against a global symbol, or a non PC relative reloc
3430 against a local symbol, then we need to copy the reloc
3431 into the shared library. However, if we are linking with
3432 -Bsymbolic, we do not need to copy a reloc against a
3433 global symbol which is defined in an object we are
3434 including in the link (i.e., DEF_REGULAR is set). At
3435 this point we have not seen all the input files, so it is
3436 possible that DEF_REGULAR is not set now but will be set
3437 later (it is never cleared). In case of a weak definition,
3438 DEF_REGULAR may be cleared later by a strong definition in
3439 a shared library. We account for that possibility below by
3440 storing information in the dyn_relocs field of the hash
3441 table entry. A similar situation occurs when creating
3442 shared libraries and symbol visibility changes render the
3443 symbol local.
7619e7c7 3444
25dbc73a
AM
3445 If on the other hand, we are creating an executable, we
3446 may need to keep relocations for symbols satisfied by a
3447 dynamic library if we manage to avoid copy relocs for the
3448 symbol. */
0e1862bb 3449 if ((bfd_link_pic (info)
1d483afe 3450 && (must_be_dyn_reloc (info, r_type)
25dbc73a 3451 || (h != NULL
198f1157 3452 && (!SYMBOLIC_BIND (info, h)
25dbc73a
AM
3453 || h->root.type == bfd_link_hash_defweak
3454 || !h->def_regular))))
3455 || (ELIMINATE_COPY_RELOCS
0e1862bb 3456 && !bfd_link_pic (info)
25dbc73a
AM
3457 && h != NULL
3458 && (h->root.type == bfd_link_hash_defweak
de972ffa 3459 || !h->def_regular)))
25dbc73a 3460 {
25dbc73a
AM
3461#ifdef DEBUG
3462 fprintf (stderr,
3463 "ppc_elf_check_relocs needs to "
3464 "create relocation for %s\n",
3465 (h && h->root.root.string
3466 ? h->root.root.string : "<unknown>"));
3467#endif
3468 if (sreloc == NULL)
3469 {
c9a2f333
AM
3470 if (htab->elf.dynobj == NULL)
3471 htab->elf.dynobj = abfd;
83bac4b0
NC
3472
3473 sreloc = _bfd_elf_make_dynamic_reloc_section
3474 (sec, htab->elf.dynobj, 2, abfd, /*rela?*/ TRUE);
3475
25dbc73a 3476 if (sreloc == NULL)
83bac4b0 3477 return FALSE;
25dbc73a 3478 }
7619e7c7 3479
25dbc73a
AM
3480 /* If this is a global symbol, we count the number of
3481 relocations we need for this symbol. */
3482 if (h != NULL)
3483 {
f95f8542
AM
3484 struct elf_dyn_relocs *p;
3485 struct elf_dyn_relocs **rel_head;
3486
91d6fa6a 3487 rel_head = &ppc_elf_hash_entry (h)->dyn_relocs;
f95f8542
AM
3488 p = *rel_head;
3489 if (p == NULL || p->sec != sec)
3490 {
3491 p = bfd_alloc (htab->elf.dynobj, sizeof *p);
3492 if (p == NULL)
3493 return FALSE;
3494 p->next = *rel_head;
3495 *rel_head = p;
3496 p->sec = sec;
3497 p->count = 0;
3498 p->pc_count = 0;
3499 }
3500 p->count += 1;
3501 if (!must_be_dyn_reloc (info, r_type))
3502 p->pc_count += 1;
25dbc73a
AM
3503 }
3504 else
3505 {
3506 /* Track dynamic relocs needed for local syms too.
3507 We really need local syms available to do this
3508 easily. Oh well. */
f95f8542
AM
3509 struct ppc_dyn_relocs *p;
3510 struct ppc_dyn_relocs **rel_head;
3511 bfd_boolean is_ifunc;
25dbc73a 3512 asection *s;
6edfbbad 3513 void *vpp;
87d72d41 3514 Elf_Internal_Sym *isym;
6edfbbad 3515
87d72d41
AM
3516 isym = bfd_sym_from_r_symndx (&htab->sym_cache,
3517 abfd, r_symndx);
3518 if (isym == NULL)
25dbc73a 3519 return FALSE;
7fce784e 3520
87d72d41
AM
3521 s = bfd_section_from_elf_index (abfd, isym->st_shndx);
3522 if (s == NULL)
3523 s = sec;
3524
6edfbbad 3525 vpp = &elf_section_data (s)->local_dynrel;
f95f8542
AM
3526 rel_head = (struct ppc_dyn_relocs **) vpp;
3527 is_ifunc = ELF_ST_TYPE (isym->st_info) == STT_GNU_IFUNC;
3528 p = *rel_head;
3529 if (p != NULL && p->sec == sec && p->ifunc != is_ifunc)
3530 p = p->next;
3531 if (p == NULL || p->sec != sec || p->ifunc != is_ifunc)
3532 {
3533 p = bfd_alloc (htab->elf.dynobj, sizeof *p);
3534 if (p == NULL)
3535 return FALSE;
3536 p->next = *rel_head;
3537 *rel_head = p;
3538 p->sec = sec;
3539 p->ifunc = is_ifunc;
3540 p->count = 0;
3541 }
3542 p->count += 1;
25dbc73a 3543 }
7619e7c7 3544 }
25dbc73a
AM
3545
3546 break;
7619e7c7
AM
3547 }
3548 }
ee05f2fe 3549
25dbc73a
AM
3550 return TRUE;
3551}
3552\f
005d79fd
AM
3553/* Warn for conflicting Tag_GNU_Power_ABI_FP attributes between IBFD
3554 and OBFD, and merge non-conflicting ones. */
4a91d0ba 3555bfd_boolean
50e03d47 3556_bfd_elf_ppc_merge_fp_attributes (bfd *ibfd, struct bfd_link_info *info)
34c8bcba 3557{
50e03d47 3558 bfd *obfd = info->output_bfd;
c6e65352
DJ
3559 obj_attribute *in_attr, *in_attrs;
3560 obj_attribute *out_attr, *out_attrs;
4a91d0ba 3561 bfd_boolean ret = TRUE;
34c8bcba 3562
c6e65352
DJ
3563 in_attrs = elf_known_obj_attributes (ibfd)[OBJ_ATTR_GNU];
3564 out_attrs = elf_known_obj_attributes (obfd)[OBJ_ATTR_GNU];
3565
c6e65352
DJ
3566 in_attr = &in_attrs[Tag_GNU_Power_ABI_FP];
3567 out_attr = &out_attrs[Tag_GNU_Power_ABI_FP];
005d79fd 3568
c6e65352 3569 if (in_attr->i != out_attr->i)
34c8bcba 3570 {
005d79fd
AM
3571 int in_fp = in_attr->i & 3;
3572 int out_fp = out_attr->i & 3;
4a91d0ba 3573 static bfd *last_fp, *last_ld;
005d79fd
AM
3574
3575 if (in_fp == 0)
34c8bcba 3576 ;
005d79fd
AM
3577 else if (out_fp == 0)
3578 {
8d2c8c3d 3579 out_attr->type = ATTR_TYPE_FLAG_INT_VAL;
005d79fd 3580 out_attr->i ^= in_fp;
4a91d0ba 3581 last_fp = ibfd;
005d79fd
AM
3582 }
3583 else if (out_fp != 2 && in_fp == 2)
8d2c8c3d
AM
3584 {
3585 _bfd_error_handler
3586 /* xgettext:c-format */
4a91d0ba
AM
3587 (_("%pB uses hard float, %pB uses soft float"),
3588 last_fp, ibfd);
3589 ret = FALSE;
8d2c8c3d 3590 }
005d79fd 3591 else if (out_fp == 2 && in_fp != 2)
8d2c8c3d
AM
3592 {
3593 _bfd_error_handler
3594 /* xgettext:c-format */
4a91d0ba
AM
3595 (_("%pB uses hard float, %pB uses soft float"),
3596 ibfd, last_fp);
3597 ret = FALSE;
8d2c8c3d 3598 }
005d79fd 3599 else if (out_fp == 1 && in_fp == 3)
8d2c8c3d
AM
3600 {
3601 _bfd_error_handler
3602 /* xgettext:c-format */
4a91d0ba
AM
3603 (_("%pB uses double-precision hard float, "
3604 "%pB uses single-precision hard float"), last_fp, ibfd);
3605 ret = FALSE;
8d2c8c3d 3606 }
005d79fd 3607 else if (out_fp == 3 && in_fp == 1)
8d2c8c3d
AM
3608 {
3609 _bfd_error_handler
3610 /* xgettext:c-format */
4a91d0ba
AM
3611 (_("%pB uses double-precision hard float, "
3612 "%pB uses single-precision hard float"), ibfd, last_fp);
3613 ret = FALSE;
8d2c8c3d 3614 }
005d79fd
AM
3615
3616 in_fp = in_attr->i & 0xc;
3617 out_fp = out_attr->i & 0xc;
3618 if (in_fp == 0)
3619 ;
3620 else if (out_fp == 0)
3621 {
8d2c8c3d 3622 out_attr->type = ATTR_TYPE_FLAG_INT_VAL;
005d79fd 3623 out_attr->i ^= in_fp;
4a91d0ba 3624 last_ld = ibfd;
005d79fd
AM
3625 }
3626 else if (out_fp != 2 * 4 && in_fp == 2 * 4)
8d2c8c3d
AM
3627 {
3628 _bfd_error_handler
3629 /* xgettext:c-format */
4a91d0ba
AM
3630 (_("%pB uses 64-bit long double, "
3631 "%pB uses 128-bit long double"), ibfd, last_ld);
3632 ret = FALSE;
8d2c8c3d 3633 }
005d79fd 3634 else if (in_fp != 2 * 4 && out_fp == 2 * 4)
8d2c8c3d
AM
3635 {
3636 _bfd_error_handler
3637 /* xgettext:c-format */
4a91d0ba
AM
3638 (_("%pB uses 64-bit long double, "
3639 "%pB uses 128-bit long double"), last_ld, ibfd);
3640 ret = FALSE;
8d2c8c3d 3641 }
005d79fd 3642 else if (out_fp == 1 * 4 && in_fp == 3 * 4)
8d2c8c3d
AM
3643 {
3644 _bfd_error_handler
3645 /* xgettext:c-format */
4a91d0ba
AM
3646 (_("%pB uses IBM long double, "
3647 "%pB uses IEEE long double"), last_ld, ibfd);
3648 ret = FALSE;
8d2c8c3d 3649 }
005d79fd 3650 else if (out_fp == 3 * 4 && in_fp == 1 * 4)
8d2c8c3d
AM
3651 {
3652 _bfd_error_handler
3653 /* xgettext:c-format */
4a91d0ba
AM
3654 (_("%pB uses IBM long double, "
3655 "%pB uses IEEE long double"), ibfd, last_ld);
3656 ret = FALSE;
8d2c8c3d 3657 }
c6e65352 3658 }
4a91d0ba
AM
3659
3660 if (!ret)
3661 {
3662 out_attr->type = ATTR_TYPE_FLAG_INT_VAL | ATTR_TYPE_FLAG_ERROR;
3663 bfd_set_error (bfd_error_bad_value);
3664 }
3665 return ret;
005d79fd
AM
3666}
3667
3668/* Merge object attributes from IBFD into OBFD. Warn if
3669 there are conflicting attributes. */
3670static bfd_boolean
50e03d47 3671ppc_elf_merge_obj_attributes (bfd *ibfd, struct bfd_link_info *info)
005d79fd 3672{
50e03d47 3673 bfd *obfd;
005d79fd
AM
3674 obj_attribute *in_attr, *in_attrs;
3675 obj_attribute *out_attr, *out_attrs;
4a91d0ba 3676 bfd_boolean ret;
005d79fd 3677
4a91d0ba
AM
3678 if (!_bfd_elf_ppc_merge_fp_attributes (ibfd, info))
3679 return FALSE;
005d79fd 3680
50e03d47 3681 obfd = info->output_bfd;
005d79fd
AM
3682 in_attrs = elf_known_obj_attributes (ibfd)[OBJ_ATTR_GNU];
3683 out_attrs = elf_known_obj_attributes (obfd)[OBJ_ATTR_GNU];
c6e65352
DJ
3684
3685 /* Check for conflicting Tag_GNU_Power_ABI_Vector attributes and
3686 merge non-conflicting ones. */
3687 in_attr = &in_attrs[Tag_GNU_Power_ABI_Vector];
3688 out_attr = &out_attrs[Tag_GNU_Power_ABI_Vector];
4a91d0ba 3689 ret = TRUE;
c6e65352
DJ
3690 if (in_attr->i != out_attr->i)
3691 {
005d79fd
AM
3692 int in_vec = in_attr->i & 3;
3693 int out_vec = out_attr->i & 3;
4a91d0ba 3694 static bfd *last_vec;
c6e65352 3695
005d79fd
AM
3696 if (in_vec == 0)
3697 ;
3698 else if (out_vec == 0)
c6e65352 3699 {
8d2c8c3d 3700 out_attr->type = ATTR_TYPE_FLAG_INT_VAL;
005d79fd 3701 out_attr->i = in_vec;
4a91d0ba 3702 last_vec = ibfd;
c6e65352 3703 }
c6e65352
DJ
3704 /* For now, allow generic to transition to AltiVec or SPE
3705 without a warning. If GCC marked files with their stack
3706 alignment and used don't-care markings for files which are
3707 not affected by the vector ABI, we could warn about this
3708 case too. */
005d79fd 3709 else if (in_vec == 1)
c6e65352 3710 ;
005d79fd
AM
3711 else if (out_vec == 1)
3712 {
8d2c8c3d 3713 out_attr->type = ATTR_TYPE_FLAG_INT_VAL;
005d79fd 3714 out_attr->i = in_vec;
4a91d0ba 3715 last_vec = ibfd;
005d79fd
AM
3716 }
3717 else if (out_vec < in_vec)
8d2c8c3d
AM
3718 {
3719 _bfd_error_handler
3720 /* xgettext:c-format */
4a91d0ba
AM
3721 (_("%pB uses AltiVec vector ABI, %pB uses SPE vector ABI"),
3722 last_vec, ibfd);
8d2c8c3d 3723 out_attr->type = ATTR_TYPE_FLAG_INT_VAL | ATTR_TYPE_FLAG_ERROR;
4a91d0ba 3724 ret = FALSE;
8d2c8c3d 3725 }
005d79fd 3726 else if (out_vec > in_vec)
8d2c8c3d
AM
3727 {
3728 _bfd_error_handler
3729 /* xgettext:c-format */
4a91d0ba
AM
3730 (_("%pB uses AltiVec vector ABI, %pB uses SPE vector ABI"),
3731 ibfd, last_vec);
8d2c8c3d 3732 out_attr->type = ATTR_TYPE_FLAG_INT_VAL | ATTR_TYPE_FLAG_ERROR;
4a91d0ba 3733 ret = FALSE;
8d2c8c3d 3734 }
34c8bcba
JM
3735 }
3736
f82e0623
NF
3737 /* Check for conflicting Tag_GNU_Power_ABI_Struct_Return attributes
3738 and merge non-conflicting ones. */
3739 in_attr = &in_attrs[Tag_GNU_Power_ABI_Struct_Return];
3740 out_attr = &out_attrs[Tag_GNU_Power_ABI_Struct_Return];
3741 if (in_attr->i != out_attr->i)
3742 {
005d79fd
AM
3743 int in_struct = in_attr->i & 3;
3744 int out_struct = out_attr->i & 3;
4a91d0ba 3745 static bfd *last_struct;
005d79fd
AM
3746
3747 if (in_struct == 0 || in_struct == 3)
f82e0623 3748 ;
005d79fd
AM
3749 else if (out_struct == 0)
3750 {
8d2c8c3d 3751 out_attr->type = ATTR_TYPE_FLAG_INT_VAL;
005d79fd 3752 out_attr->i = in_struct;
4a91d0ba 3753 last_struct = ibfd;
005d79fd
AM
3754 }
3755 else if (out_struct < in_struct)
8d2c8c3d
AM
3756 {
3757 _bfd_error_handler
3758 /* xgettext:c-format */
4a91d0ba
AM
3759 (_("%pB uses r3/r4 for small structure returns, "
3760 "%pB uses memory"), last_struct, ibfd);
8d2c8c3d 3761 out_attr->type = ATTR_TYPE_FLAG_INT_VAL | ATTR_TYPE_FLAG_ERROR;
4a91d0ba 3762 ret = FALSE;
8d2c8c3d 3763 }
005d79fd 3764 else if (out_struct > in_struct)
8d2c8c3d
AM
3765 {
3766 _bfd_error_handler
3767 /* xgettext:c-format */
4a91d0ba
AM
3768 (_("%pB uses r3/r4 for small structure returns, "
3769 "%pB uses memory"), ibfd, last_struct);
8d2c8c3d 3770 out_attr->type = ATTR_TYPE_FLAG_INT_VAL | ATTR_TYPE_FLAG_ERROR;
4a91d0ba 3771 ret = FALSE;
8d2c8c3d 3772 }
f82e0623 3773 }
4a91d0ba
AM
3774 if (!ret)
3775 {
3776 bfd_set_error (bfd_error_bad_value);
3777 return FALSE;
3778 }
f82e0623 3779
34c8bcba 3780 /* Merge Tag_compatibility attributes and any common GNU ones. */
8d2c8c3d 3781 return _bfd_elf_merge_object_attributes (ibfd, info);
34c8bcba
JM
3782}
3783
8853c3d3
AM
3784/* Merge backend specific data from an object file to the output
3785 object file when linking. */
3786
3787static bfd_boolean
50e03d47 3788ppc_elf_merge_private_bfd_data (bfd *ibfd, struct bfd_link_info *info)
8853c3d3 3789{
50e03d47 3790 bfd *obfd = info->output_bfd;
8853c3d3
AM
3791 flagword old_flags;
3792 flagword new_flags;
3793 bfd_boolean error;
3794
0c8d6e5c 3795 if (!is_ppc_elf (ibfd) || !is_ppc_elf (obfd))
8853c3d3
AM
3796 return TRUE;
3797
cc643b88 3798 /* Check if we have the same endianness. */
50e03d47 3799 if (! _bfd_generic_verify_endian_match (ibfd, info))
8853c3d3
AM
3800 return FALSE;
3801
50e03d47 3802 if (!ppc_elf_merge_obj_attributes (ibfd, info))
34c8bcba
JM
3803 return FALSE;
3804
8853c3d3
AM
3805 new_flags = elf_elfheader (ibfd)->e_flags;
3806 old_flags = elf_elfheader (obfd)->e_flags;
3807 if (!elf_flags_init (obfd))
3808 {
3809 /* First call, no flags set. */
3810 elf_flags_init (obfd) = TRUE;
3811 elf_elfheader (obfd)->e_flags = new_flags;
3812 }
3813
3814 /* Compatible flags are ok. */
3815 else if (new_flags == old_flags)
3816 ;
3817
3818 /* Incompatible flags. */
3819 else
3820 {
3821 /* Warn about -mrelocatable mismatch. Allow -mrelocatable-lib
3822 to be linked with either. */
3823 error = FALSE;
3824 if ((new_flags & EF_PPC_RELOCATABLE) != 0
3825 && (old_flags & (EF_PPC_RELOCATABLE | EF_PPC_RELOCATABLE_LIB)) == 0)
3826 {
3827 error = TRUE;
4eca0228 3828 _bfd_error_handler
871b3ab2 3829 (_("%pB: compiled with -mrelocatable and linked with "
8853c3d3
AM
3830 "modules compiled normally"), ibfd);
3831 }
3832 else if ((new_flags & (EF_PPC_RELOCATABLE | EF_PPC_RELOCATABLE_LIB)) == 0
3833 && (old_flags & EF_PPC_RELOCATABLE) != 0)
3834 {
3835 error = TRUE;
4eca0228 3836 _bfd_error_handler
871b3ab2 3837 (_("%pB: compiled normally and linked with "
8853c3d3
AM
3838 "modules compiled with -mrelocatable"), ibfd);
3839 }
3840
3841 /* The output is -mrelocatable-lib iff both the input files are. */
3842 if (! (new_flags & EF_PPC_RELOCATABLE_LIB))
3843 elf_elfheader (obfd)->e_flags &= ~EF_PPC_RELOCATABLE_LIB;
3844
3845 /* The output is -mrelocatable iff it can't be -mrelocatable-lib,
3846 but each input file is either -mrelocatable or -mrelocatable-lib. */
3847 if (! (elf_elfheader (obfd)->e_flags & EF_PPC_RELOCATABLE_LIB)
3848 && (new_flags & (EF_PPC_RELOCATABLE_LIB | EF_PPC_RELOCATABLE))
3849 && (old_flags & (EF_PPC_RELOCATABLE_LIB | EF_PPC_RELOCATABLE)))
3850 elf_elfheader (obfd)->e_flags |= EF_PPC_RELOCATABLE;
3851
3852 /* Do not warn about eabi vs. V.4 mismatch, just or in the bit if
3853 any module uses it. */
3854 elf_elfheader (obfd)->e_flags |= (new_flags & EF_PPC_EMB);
3855
3856 new_flags &= ~(EF_PPC_RELOCATABLE | EF_PPC_RELOCATABLE_LIB | EF_PPC_EMB);
3857 old_flags &= ~(EF_PPC_RELOCATABLE | EF_PPC_RELOCATABLE_LIB | EF_PPC_EMB);
3858
3859 /* Warn about any other mismatches. */
3860 if (new_flags != old_flags)
3861 {
3862 error = TRUE;
4eca0228 3863 _bfd_error_handler
695344c0 3864 /* xgettext:c-format */
871b3ab2 3865 (_("%pB: uses different e_flags (%#x) fields "
cd9af601
AM
3866 "than previous modules (%#x)"),
3867 ibfd, new_flags, old_flags);
8853c3d3
AM
3868 }
3869
3870 if (error)
3871 {
3872 bfd_set_error (bfd_error_bad_value);
3873 return FALSE;
3874 }
3875 }
3876
3877 return TRUE;
3878}
b9c361e0
JL
3879
3880static void
95f0d0d2 3881ppc_elf_vle_split16 (bfd *input_bfd,
08dc996f
AM
3882 asection *input_section,
3883 unsigned long offset,
95f0d0d2 3884 bfd_byte *loc,
86c95733 3885 bfd_vma value,
08dc996f
AM
3886 split16_format_type split16_format,
3887 bfd_boolean fixup)
b9c361e0 3888{
bb6bf75e 3889 unsigned int insn, opcode;
b9c361e0 3890
95f0d0d2 3891 insn = bfd_get_32 (input_bfd, loc);
bb6bf75e 3892 opcode = insn & E_OPCODE_MASK;
08dc996f
AM
3893 if (opcode == E_OR2I_INSN
3894 || opcode == E_AND2I_DOT_INSN
3895 || opcode == E_OR2IS_INSN
3896 || opcode == E_LIS_INSN
3897 || opcode == E_AND2IS_DOT_INSN)
3898 {
3899 if (split16_format != split16a_type)
3900 {
3901 if (fixup)
3902 split16_format = split16a_type;
3903 else
3904 _bfd_error_handler
3905 /* xgettext:c-format */
871b3ab2 3906 (_("%pB(%pA+0x%lx): expected 16A style relocation on 0x%08x insn"),
08dc996f
AM
3907 input_bfd, input_section, offset, opcode);
3908 }
3909 }
3910 else if (opcode == E_ADD2I_DOT_INSN
3911 || opcode == E_ADD2IS_INSN
3912 || opcode == E_CMP16I_INSN
3913 || opcode == E_MULL2I_INSN
3914 || opcode == E_CMPL16I_INSN
3915 || opcode == E_CMPH16I_INSN
3916 || opcode == E_CMPHL16I_INSN)
3917 {
3918 if (split16_format != split16d_type)
3919 {
3920 if (fixup)
3921 split16_format = split16d_type;
3922 else
3923 _bfd_error_handler
3924 /* xgettext:c-format */
871b3ab2 3925 (_("%pB(%pA+0x%lx): expected 16D style relocation on 0x%08x insn"),
08dc996f
AM
3926 input_bfd, input_section, offset, opcode);
3927 }
3928 }
bb6bf75e
AM
3929 if (split16_format == split16a_type)
3930 {
3931 insn &= ~((0xf800 << 5) | 0x7ff);
3932 insn |= (value & 0xf800) << 5;
3933 if ((insn & E_LI_MASK) == E_LI_INSN)
3934 {
3935 /* Hack for e_li. Extend sign. */
3936 insn &= ~(0xf0000 >> 5);
3937 insn |= (-(value & 0x8000) & 0xf0000) >> 5;
3938 }
3939 }
3940 else
3941 {
3942 insn &= ~((0xf800 << 10) | 0x7ff);
3943 insn |= (value & 0xf800) << 10;
3944 }
86c95733 3945 insn |= value & 0x7ff;
95f0d0d2 3946 bfd_put_32 (input_bfd, insn, loc);
b9c361e0 3947}
83eef883
AFB
3948
3949static void
3950ppc_elf_vle_split20 (bfd *output_bfd, bfd_byte *loc, bfd_vma value)
3951{
3952 unsigned int insn;
3953
3954 insn = bfd_get_32 (output_bfd, loc);
3955 /* We have an li20 field, bits 17..20, 11..15, 21..31. */
3956 /* Top 4 bits of value to 17..20. */
3957 insn |= (value & 0xf0000) >> 5;
3958 /* Next 5 bits of the value to 11..15. */
3959 insn |= (value & 0xf800) << 5;
3960 /* And the final 11 bits of the value to bits 21 to 31. */
3961 insn |= value & 0x7ff;
3962 bfd_put_32 (output_bfd, insn, loc);
3963}
3964
8853c3d3 3965\f
d7128ce4
AM
3966/* Choose which PLT scheme to use, and set .plt flags appropriately.
3967 Returns -1 on error, 0 for old PLT, 1 for new PLT. */
3968int
3969ppc_elf_select_plt_layout (bfd *output_bfd ATTRIBUTE_UNUSED,
5446cbdf 3970 struct bfd_link_info *info)
d7128ce4
AM
3971{
3972 struct ppc_elf_link_hash_table *htab;
9d8504b1 3973 flagword flags;
d7128ce4
AM
3974
3975 htab = ppc_elf_hash_table (info);
4a3dc543
RS
3976
3977 if (htab->plt_type == PLT_UNSET)
016687f8 3978 {
b3874e1a
AM
3979 struct elf_link_hash_entry *h;
3980
5446cbdf 3981 if (htab->params->plt_style == PLT_OLD)
016687f8 3982 htab->plt_type = PLT_OLD;
0e1862bb 3983 else if (bfd_link_pic (info)
b3874e1a
AM
3984 && htab->elf.dynamic_sections_created
3985 && (h = elf_link_hash_lookup (&htab->elf, "_mcount",
3986 FALSE, FALSE, TRUE)) != NULL
3987 && (h->type == STT_FUNC
3988 || h->needs_plt)
3989 && h->ref_regular
3990 && !(SYMBOL_CALLS_LOCAL (info, h)
21d68fcd 3991 || UNDEFWEAK_NO_DYNAMIC_RELOC (info, h)))
b3874e1a
AM
3992 {
3993 /* Profiling of shared libs (and pies) is not supported with
3994 secure plt, because ppc32 does profiling before a
3995 function prologue and a secure plt pic call stubs needs
3996 r30 to be set up. */
3997 htab->plt_type = PLT_OLD;
3998 }
016687f8
AM
3999 else
4000 {
4001 bfd *ibfd;
5446cbdf 4002 enum ppc_elf_plt_type plt_type = htab->params->plt_style;
016687f8
AM
4003
4004 /* Look through the reloc flags left by ppc_elf_check_relocs.
4005 Use the old style bss plt if a file makes plt calls
4006 without using the new relocs, and if ld isn't given
4007 --secure-plt and we never see REL16 relocs. */
4008 if (plt_type == PLT_UNSET)
4009 plt_type = PLT_OLD;
c72f2fb2 4010 for (ibfd = info->input_bfds; ibfd; ibfd = ibfd->link.next)
0c8d6e5c 4011 if (is_ppc_elf (ibfd))
016687f8
AM
4012 {
4013 if (ppc_elf_tdata (ibfd)->has_rel16)
4014 plt_type = PLT_NEW;
4015 else if (ppc_elf_tdata (ibfd)->makes_plt_call)
4016 {
4017 plt_type = PLT_OLD;
4018 htab->old_bfd = ibfd;
4019 break;
4020 }
4021 }
4022 htab->plt_type = plt_type;
4023 }
4024 }
5446cbdf 4025 if (htab->plt_type == PLT_OLD && htab->params->plt_style == PLT_NEW)
b3874e1a
AM
4026 {
4027 if (htab->old_bfd != NULL)
cf97bcb0 4028 _bfd_error_handler (_("bss-plt forced due to %pB"), htab->old_bfd);
b3874e1a 4029 else
cf97bcb0 4030 _bfd_error_handler (_("bss-plt forced by profiling"));
b3874e1a 4031 }
d7128ce4 4032
4a3dc543 4033 BFD_ASSERT (htab->plt_type != PLT_VXWORKS);
9d8504b1 4034
4a3dc543 4035 if (htab->plt_type == PLT_NEW)
9d8504b1
PB
4036 {
4037 flags = (SEC_ALLOC | SEC_LOAD | SEC_HAS_CONTENTS
4038 | SEC_IN_MEMORY | SEC_LINKER_CREATED);
86b9da88
AM
4039
4040 /* The new PLT is a loaded section. */
ce558b89 4041 if (htab->elf.splt != NULL
fd361982 4042 && !bfd_set_section_flags (htab->elf.splt, flags))
86b9da88
AM
4043 return -1;
4044
4045 /* The new GOT is not executable. */
ce558b89 4046 if (htab->elf.sgot != NULL
fd361982 4047 && !bfd_set_section_flags (htab->elf.sgot, flags))
86b9da88 4048 return -1;
d7128ce4
AM
4049 }
4050 else
4051 {
4052 /* Stop an unused .glink section from affecting .text alignment. */
86b9da88 4053 if (htab->glink != NULL
fd361982 4054 && !bfd_set_section_alignment (htab->glink, 0))
86b9da88 4055 return -1;
d7128ce4 4056 }
4a3dc543 4057 return htab->plt_type == PLT_NEW;
d7128ce4
AM
4058}
4059\f
25dbc73a
AM
4060/* Return the section that should be marked against GC for a given
4061 relocation. */
586119b3 4062
25dbc73a
AM
4063static asection *
4064ppc_elf_gc_mark_hook (asection *sec,
07adf181 4065 struct bfd_link_info *info,
25dbc73a
AM
4066 Elf_Internal_Rela *rel,
4067 struct elf_link_hash_entry *h,
4068 Elf_Internal_Sym *sym)
4069{
4070 if (h != NULL)
07adf181
AM
4071 switch (ELF32_R_TYPE (rel->r_info))
4072 {
4073 case R_PPC_GNU_VTINHERIT:
4074 case R_PPC_GNU_VTENTRY:
4075 return NULL;
4076 }
4077
4078 return _bfd_elf_gc_mark_hook (sec, info, rel, h, sym);
25dbc73a 4079}
49c09209
AM
4080
4081static bfd_boolean
4082get_sym_h (struct elf_link_hash_entry **hp,
4083 Elf_Internal_Sym **symp,
4084 asection **symsecp,
4085 unsigned char **tls_maskp,
4086 Elf_Internal_Sym **locsymsp,
4087 unsigned long r_symndx,
4088 bfd *ibfd)
4089{
4090 Elf_Internal_Shdr *symtab_hdr = &elf_symtab_hdr (ibfd);
4091
4092 if (r_symndx >= symtab_hdr->sh_info)
4093 {
4094 struct elf_link_hash_entry **sym_hashes = elf_sym_hashes (ibfd);
4095 struct elf_link_hash_entry *h;
4096
4097 h = sym_hashes[r_symndx - symtab_hdr->sh_info];
4098 while (h->root.type == bfd_link_hash_indirect
4099 || h->root.type == bfd_link_hash_warning)
4100 h = (struct elf_link_hash_entry *) h->root.u.i.link;
4101
4102 if (hp != NULL)
4103 *hp = h;
4104
4105 if (symp != NULL)
4106 *symp = NULL;
4107
4108 if (symsecp != NULL)
4109 {
4110 asection *symsec = NULL;
4111 if (h->root.type == bfd_link_hash_defined
4112 || h->root.type == bfd_link_hash_defweak)
4113 symsec = h->root.u.def.section;
4114 *symsecp = symsec;
4115 }
4116
4117 if (tls_maskp != NULL)
4118 *tls_maskp = &ppc_elf_hash_entry (h)->tls_mask;
4119 }
4120 else
4121 {
4122 Elf_Internal_Sym *sym;
4123 Elf_Internal_Sym *locsyms = *locsymsp;
4124
4125 if (locsyms == NULL)
4126 {
4127 locsyms = (Elf_Internal_Sym *) symtab_hdr->contents;
4128 if (locsyms == NULL)
4129 locsyms = bfd_elf_get_elf_syms (ibfd, symtab_hdr,
4130 symtab_hdr->sh_info,
4131 0, NULL, NULL, NULL);
4132 if (locsyms == NULL)
4133 return FALSE;
4134 *locsymsp = locsyms;
4135 }
4136 sym = locsyms + r_symndx;
4137
4138 if (hp != NULL)
4139 *hp = NULL;
4140
4141 if (symp != NULL)
4142 *symp = sym;
4143
4144 if (symsecp != NULL)
4145 *symsecp = bfd_section_from_elf_index (ibfd, sym->st_shndx);
4146
4147 if (tls_maskp != NULL)
4148 {
4149 bfd_signed_vma *local_got;
4150 unsigned char *tls_mask;
4151
4152 tls_mask = NULL;
4153 local_got = elf_local_got_refcounts (ibfd);
4154 if (local_got != NULL)
4155 {
4156 struct plt_entry **local_plt = (struct plt_entry **)
4157 (local_got + symtab_hdr->sh_info);
4158 unsigned char *lgot_masks = (unsigned char *)
4159 (local_plt + symtab_hdr->sh_info);
4160 tls_mask = &lgot_masks[r_symndx];
4161 }
4162 *tls_maskp = tls_mask;
4163 }
4164 }
4165 return TRUE;
4166}
25dbc73a 4167\f
3e04d765
AM
4168/* Analyze inline PLT call relocations to see whether calls to locally
4169 defined functions can be converted to direct calls. */
4170
4171bfd_boolean
4172ppc_elf_inline_plt (struct bfd_link_info *info)
4173{
4174 struct ppc_elf_link_hash_table *htab;
4175 bfd *ibfd;
4176 asection *sec;
4177 bfd_vma low_vma, high_vma, limit;
4178
4179 htab = ppc_elf_hash_table (info);
4180 if (htab == NULL)
4181 return FALSE;
4182
4183 /* A bl insn can reach -0x2000000 to 0x1fffffc. The limit is
4184 reduced somewhat to cater for possible stubs that might be added
4185 between the call and its destination. */
4186 limit = 0x1e00000;
4187 low_vma = -1;
4188 high_vma = 0;
4189 for (sec = info->output_bfd->sections; sec != NULL; sec = sec->next)
4190 if ((sec->flags & (SEC_ALLOC | SEC_CODE)) == (SEC_ALLOC | SEC_CODE))
4191 {
4192 if (low_vma > sec->vma)
4193 low_vma = sec->vma;
4194 if (high_vma < sec->vma + sec->size)
4195 high_vma = sec->vma + sec->size;
4196 }
4197
4198 /* If a "bl" can reach anywhere in local code sections, then we can
4199 convert all inline PLT sequences to direct calls when the symbol
4200 is local. */
4201 if (high_vma - low_vma < limit)
4202 {
4203 htab->can_convert_all_inline_plt = 1;
4204 return TRUE;
4205 }
4206
4207 /* Otherwise, go looking through relocs for cases where a direct
4208 call won't reach. Mark the symbol on any such reloc to disable
4209 the optimization and keep the PLT entry as it seems likely that
4210 this will be better than creating trampolines. Note that this
4211 will disable the optimization for all inline PLT calls to a
4212 particular symbol, not just those that won't reach. The
4213 difficulty in doing a more precise optimization is that the
4214 linker needs to make a decision depending on whether a
4215 particular R_PPC_PLTCALL insn can be turned into a direct
4216 call, for each of the R_PPC_PLTSEQ and R_PPC_PLT16* insns in
4217 the sequence, and there is nothing that ties those relocs
4218 together except their symbol. */
4219
4220 for (ibfd = info->input_bfds; ibfd != NULL; ibfd = ibfd->link.next)
4221 {
4222 Elf_Internal_Shdr *symtab_hdr;
4223 Elf_Internal_Sym *local_syms;
4224
4225 if (!is_ppc_elf (ibfd))
4226 continue;
4227
4228 local_syms = NULL;
4229 symtab_hdr = &elf_symtab_hdr (ibfd);
4230
4231 for (sec = ibfd->sections; sec != NULL; sec = sec->next)
4232 if (sec->has_pltcall
4233 && !bfd_is_abs_section (sec->output_section))
4234 {
4235 Elf_Internal_Rela *relstart, *rel, *relend;
4236
4237 /* Read the relocations. */
4238 relstart = _bfd_elf_link_read_relocs (ibfd, sec, NULL, NULL,
4239 info->keep_memory);
4240 if (relstart == NULL)
4241 return FALSE;
4242
4243 relend = relstart + sec->reloc_count;
4244 for (rel = relstart; rel < relend; )
4245 {
4246 enum elf_ppc_reloc_type r_type;
4247 unsigned long r_symndx;
4248 asection *sym_sec;
4249 struct elf_link_hash_entry *h;
4250 Elf_Internal_Sym *sym;
4251 unsigned char *tls_maskp;
4252
4253 r_type = ELF32_R_TYPE (rel->r_info);
4254 if (r_type != R_PPC_PLTCALL)
4255 continue;
4256
4257 r_symndx = ELF32_R_SYM (rel->r_info);
4258 if (!get_sym_h (&h, &sym, &sym_sec, &tls_maskp, &local_syms,
4259 r_symndx, ibfd))
4260 {
4261 if (elf_section_data (sec)->relocs != relstart)
4262 free (relstart);
4263 if (local_syms != NULL
4264 && symtab_hdr->contents != (unsigned char *) local_syms)
4265 free (local_syms);
4266 return FALSE;
4267 }
4268
4269 if (sym_sec != NULL && sym_sec->output_section != NULL)
4270 {
4271 bfd_vma from, to;
4272 if (h != NULL)
4273 to = h->root.u.def.value;
4274 else
4275 to = sym->st_value;
4276 to += (rel->r_addend
4277 + sym_sec->output_offset
4278 + sym_sec->output_section->vma);
4279 from = (rel->r_offset
4280 + sec->output_offset
4281 + sec->output_section->vma);
4282 if (to - from + limit < 2 * limit)
4283 *tls_maskp &= ~PLT_KEEP;
4284 }
4285 }
4286 if (elf_section_data (sec)->relocs != relstart)
4287 free (relstart);
4288 }
4289
4290 if (local_syms != NULL
4291 && symtab_hdr->contents != (unsigned char *) local_syms)
4292 {
4293 if (!info->keep_memory)
4294 free (local_syms);
4295 else
4296 symtab_hdr->contents = (unsigned char *) local_syms;
4297 }
4298 }
4299
4300 return TRUE;
4301}
4302
3a71aa26
AM
4303/* Set plt output section type, htab->tls_get_addr, and call the
4304 generic ELF tls_setup function. */
7fce784e 4305
25dbc73a 4306asection *
5446cbdf 4307ppc_elf_tls_setup (bfd *obfd, struct bfd_link_info *info)
7fce784e 4308{
25dbc73a 4309 struct ppc_elf_link_hash_table *htab;
7fce784e 4310
25dbc73a 4311 htab = ppc_elf_hash_table (info);
a7f2871e
AM
4312 htab->tls_get_addr = elf_link_hash_lookup (&htab->elf, "__tls_get_addr",
4313 FALSE, FALSE, TRUE);
f01f1741
AM
4314 if (htab->plt_type != PLT_NEW)
4315 htab->params->no_tls_get_addr_opt = TRUE;
4316
5446cbdf 4317 if (!htab->params->no_tls_get_addr_opt)
a7f2871e
AM
4318 {
4319 struct elf_link_hash_entry *opt, *tga;
4320 opt = elf_link_hash_lookup (&htab->elf, "__tls_get_addr_opt",
4321 FALSE, FALSE, TRUE);
4322 if (opt != NULL
4323 && (opt->root.type == bfd_link_hash_defined
4324 || opt->root.type == bfd_link_hash_defweak))
4325 {
4326 /* If glibc supports an optimized __tls_get_addr call stub,
4327 signalled by the presence of __tls_get_addr_opt, and we'll
4328 be calling __tls_get_addr via a plt call stub, then
4329 make __tls_get_addr point to __tls_get_addr_opt. */
4330 tga = htab->tls_get_addr;
4331 if (htab->elf.dynamic_sections_created
4332 && tga != NULL
4333 && (tga->type == STT_FUNC
4334 || tga->needs_plt)
4335 && !(SYMBOL_CALLS_LOCAL (info, tga)
21d68fcd 4336 || UNDEFWEAK_NO_DYNAMIC_RELOC (info, tga)))
a7f2871e
AM
4337 {
4338 struct plt_entry *ent;
32af9f6e
AM
4339 for (ent = tga->plt.plist; ent != NULL; ent = ent->next)
4340 if (ent->plt.refcount > 0)
4341 break;
4342 if (ent != NULL)
a7f2871e
AM
4343 {
4344 tga->root.type = bfd_link_hash_indirect;
4345 tga->root.u.i.link = &opt->root;
4346 ppc_elf_copy_indirect_symbol (info, opt, tga);
b531344c 4347 opt->mark = 1;
a7f2871e
AM
4348 if (opt->dynindx != -1)
4349 {
4350 /* Use __tls_get_addr_opt in dynamic relocations. */
4351 opt->dynindx = -1;
4352 _bfd_elf_strtab_delref (elf_hash_table (info)->dynstr,
4353 opt->dynstr_index);
4354 if (!bfd_elf_link_record_dynamic_symbol (info, opt))
4355 return FALSE;
4356 }
4357 htab->tls_get_addr = opt;
4358 }
4359 }
4360 }
4361 else
5446cbdf 4362 htab->params->no_tls_get_addr_opt = TRUE;
a7f2871e 4363 }
4a3dc543 4364 if (htab->plt_type == PLT_NEW
ce558b89
AM
4365 && htab->elf.splt != NULL
4366 && htab->elf.splt->output_section != NULL)
d7128ce4 4367 {
ce558b89
AM
4368 elf_section_type (htab->elf.splt->output_section) = SHT_PROGBITS;
4369 elf_section_flags (htab->elf.splt->output_section) = SHF_ALLOC + SHF_WRITE;
d7128ce4
AM
4370 }
4371
25dbc73a 4372 return _bfd_elf_tls_setup (obfd, info);
7fce784e
AS
4373}
4374
3a71aa26
AM
4375/* Return TRUE iff REL is a branch reloc with a global symbol matching
4376 HASH. */
4377
4378static bfd_boolean
4379branch_reloc_hash_match (const bfd *ibfd,
4380 const Elf_Internal_Rela *rel,
4381 const struct elf_link_hash_entry *hash)
4382{
4383 Elf_Internal_Shdr *symtab_hdr = &elf_symtab_hdr (ibfd);
4384 enum elf_ppc_reloc_type r_type = ELF32_R_TYPE (rel->r_info);
4385 unsigned int r_symndx = ELF32_R_SYM (rel->r_info);
4386
e054468f 4387 if (r_symndx >= symtab_hdr->sh_info && is_branch_reloc (r_type))
3a71aa26
AM
4388 {
4389 struct elf_link_hash_entry **sym_hashes = elf_sym_hashes (ibfd);
4390 struct elf_link_hash_entry *h;
4391
4392 h = sym_hashes[r_symndx - symtab_hdr->sh_info];
4393 while (h->root.type == bfd_link_hash_indirect
4394 || h->root.type == bfd_link_hash_warning)
4395 h = (struct elf_link_hash_entry *) h->root.u.i.link;
4396 if (h == hash)
4397 return TRUE;
4398 }
4399 return FALSE;
4400}
4401
25dbc73a
AM
4402/* Run through all the TLS relocs looking for optimization
4403 opportunities. */
252b5132 4404
25dbc73a
AM
4405bfd_boolean
4406ppc_elf_tls_optimize (bfd *obfd ATTRIBUTE_UNUSED,
4407 struct bfd_link_info *info)
252b5132 4408{
7fce784e 4409 bfd *ibfd;
25dbc73a
AM
4410 asection *sec;
4411 struct ppc_elf_link_hash_table *htab;
b7fcf6f6 4412 int pass;
252b5132 4413
3cbc1e5e 4414 if (!bfd_link_executable (info))
25dbc73a 4415 return TRUE;
252b5132 4416
7619e7c7 4417 htab = ppc_elf_hash_table (info);
663a1470
AM
4418 if (htab == NULL)
4419 return FALSE;
4420
b7fcf6f6
AM
4421 /* Make two passes through the relocs. First time check that tls
4422 relocs involved in setting up a tls_get_addr call are indeed
663a1470
AM
4423 followed by such a call. If they are not, don't do any tls
4424 optimization. On the second pass twiddle tls_mask flags to
4425 notify relocate_section that optimization can be done, and
4426 adjust got and plt refcounts. */
b7fcf6f6 4427 for (pass = 0; pass < 2; ++pass)
c72f2fb2 4428 for (ibfd = info->input_bfds; ibfd != NULL; ibfd = ibfd->link.next)
b7fcf6f6 4429 {
0ffa91dd 4430 Elf_Internal_Shdr *symtab_hdr = &elf_symtab_hdr (ibfd);
32af9f6e 4431 asection *got2 = bfd_get_section_by_name (ibfd, ".got2");
7619e7c7 4432
b7fcf6f6
AM
4433 for (sec = ibfd->sections; sec != NULL; sec = sec->next)
4434 if (sec->has_tls_reloc && !bfd_is_abs_section (sec->output_section))
4435 {
4436 Elf_Internal_Rela *relstart, *rel, *relend;
663a1470 4437 int expecting_tls_get_addr = 0;
252b5132 4438
b7fcf6f6
AM
4439 /* Read the relocations. */
4440 relstart = _bfd_elf_link_read_relocs (ibfd, sec, NULL, NULL,
4441 info->keep_memory);
4442 if (relstart == NULL)
4443 return FALSE;
7619e7c7 4444
b7fcf6f6
AM
4445 relend = relstart + sec->reloc_count;
4446 for (rel = relstart; rel < relend; rel++)
4447 {
4448 enum elf_ppc_reloc_type r_type;
4449 unsigned long r_symndx;
4450 struct elf_link_hash_entry *h = NULL;
bac3c8c5 4451 unsigned char *tls_mask;
37da22e5 4452 unsigned char tls_set, tls_clear;
b7fcf6f6 4453 bfd_boolean is_local;
b7fcf6f6
AM
4454 bfd_signed_vma *got_count;
4455
4456 r_symndx = ELF32_R_SYM (rel->r_info);
4457 if (r_symndx >= symtab_hdr->sh_info)
4458 {
4459 struct elf_link_hash_entry **sym_hashes;
7fce784e 4460
b7fcf6f6
AM
4461 sym_hashes = elf_sym_hashes (ibfd);
4462 h = sym_hashes[r_symndx - symtab_hdr->sh_info];
4463 while (h->root.type == bfd_link_hash_indirect
4464 || h->root.type == bfd_link_hash_warning)
4465 h = (struct elf_link_hash_entry *) h->root.u.i.link;
4466 }
7619e7c7 4467
f749f26e 4468 is_local = SYMBOL_REFERENCES_LOCAL (info, h);
b7fcf6f6 4469 r_type = ELF32_R_TYPE (rel->r_info);
663a1470
AM
4470 /* If this section has old-style __tls_get_addr calls
4471 without marker relocs, then check that each
4472 __tls_get_addr call reloc is preceded by a reloc
4473 that conceivably belongs to the __tls_get_addr arg
4474 setup insn. If we don't find matching arg setup
4475 relocs, don't do any tls optimization. */
4476 if (pass == 0
9737e8af 4477 && sec->nomark_tls_get_addr
663a1470
AM
4478 && h != NULL
4479 && h == htab->tls_get_addr
4480 && !expecting_tls_get_addr
4481 && is_branch_reloc (r_type))
4482 {
25f53a85 4483 info->callbacks->minfo ("%H __tls_get_addr lost arg, "
663a1470
AM
4484 "TLS optimization disabled\n",
4485 ibfd, sec, rel->r_offset);
4486 if (elf_section_data (sec)->relocs != relstart)
4487 free (relstart);
4488 return TRUE;
4489 }
4490
4491 expecting_tls_get_addr = 0;
b7fcf6f6
AM
4492 switch (r_type)
4493 {
4494 case R_PPC_GOT_TLSLD16:
4495 case R_PPC_GOT_TLSLD16_LO:
4496 expecting_tls_get_addr = 1;
1a0670f3 4497 /* Fall through. */
b7fcf6f6
AM
4498
4499 case R_PPC_GOT_TLSLD16_HI:
4500 case R_PPC_GOT_TLSLD16_HA:
4501 /* These relocs should never be against a symbol
4502 defined in a shared lib. Leave them alone if
4503 that turns out to be the case. */
4504 if (!is_local)
4505 continue;
4506
4507 /* LD -> LE */
4508 tls_set = 0;
4509 tls_clear = TLS_LD;
4510 break;
4511
4512 case R_PPC_GOT_TLSGD16:
4513 case R_PPC_GOT_TLSGD16_LO:
4514 expecting_tls_get_addr = 1;
1a0670f3 4515 /* Fall through. */
b7fcf6f6
AM
4516
4517 case R_PPC_GOT_TLSGD16_HI:
4518 case R_PPC_GOT_TLSGD16_HA:
4519 if (is_local)
4520 /* GD -> LE */
4521 tls_set = 0;
4522 else
4523 /* GD -> IE */
b00a0a86 4524 tls_set = TLS_TLS | TLS_GDIE;
b7fcf6f6
AM
4525 tls_clear = TLS_GD;
4526 break;
4527
4528 case R_PPC_GOT_TPREL16:
4529 case R_PPC_GOT_TPREL16_LO:
4530 case R_PPC_GOT_TPREL16_HI:
4531 case R_PPC_GOT_TPREL16_HA:
4532 if (is_local)
4533 {
4534 /* IE -> LE */
4535 tls_set = 0;
4536 tls_clear = TLS_TPREL;
4537 break;
4538 }
4539 else
4540 continue;
4541
32af9f6e 4542 case R_PPC_TLSLD:
7d04a20a
AM
4543 if (!is_local)
4544 continue;
4545 /* Fall through. */
4546 case R_PPC_TLSGD:
23cedd1d
AM
4547 if (rel + 1 < relend
4548 && is_plt_seq_reloc (ELF32_R_TYPE (rel[1].r_info)))
4549 {
4550 if (pass != 0
4551 && ELF32_R_TYPE (rel[1].r_info) != R_PPC_PLTSEQ)
4552 {
4553 r_type = ELF32_R_TYPE (rel[1].r_info);
4554 r_symndx = ELF32_R_SYM (rel[1].r_info);
4555 if (r_symndx >= symtab_hdr->sh_info)
4556 {
4557 struct elf_link_hash_entry **sym_hashes;
4558
4559 sym_hashes = elf_sym_hashes (ibfd);
4560 h = sym_hashes[r_symndx - symtab_hdr->sh_info];
4561 while (h->root.type == bfd_link_hash_indirect
4562 || h->root.type == bfd_link_hash_warning)
4563 h = (struct elf_link_hash_entry *) h->root.u.i.link;
4564 if (h != NULL)
4565 {
4566 struct plt_entry *ent = NULL;
4567 bfd_vma addend = 0;
4568
4569 if (bfd_link_pic (info))
4570 addend = rel->r_addend;
4571 ent = find_plt_ent (&h->plt.plist,
4572 got2, addend);
4573 if (ent != NULL
4574 && ent->plt.refcount > 0)
4575 ent->plt.refcount -= 1;
4576 }
4577 }
4578 }
4579 continue;
4580 }
32af9f6e
AM
4581 expecting_tls_get_addr = 2;
4582 tls_set = 0;
4583 tls_clear = 0;
4584 break;
4585
b7fcf6f6 4586 default:
25dbc73a 4587 continue;
b7fcf6f6 4588 }
25dbc73a 4589
b7fcf6f6
AM
4590 if (pass == 0)
4591 {
727fc41e 4592 if (!expecting_tls_get_addr
9737e8af 4593 || !sec->nomark_tls_get_addr)
b7fcf6f6 4594 continue;
25dbc73a 4595
3a71aa26
AM
4596 if (rel + 1 < relend
4597 && branch_reloc_hash_match (ibfd, rel + 1,
4598 htab->tls_get_addr))
4599 continue;
25dbc73a 4600
b7fcf6f6
AM
4601 /* Uh oh, we didn't find the expected call. We
4602 could just mark this symbol to exclude it
4603 from tls optimization but it's safer to skip
663a1470 4604 the entire optimization. */
25f53a85 4605 info->callbacks->minfo (_("%H arg lost __tls_get_addr, "
663a1470
AM
4606 "TLS optimization disabled\n"),
4607 ibfd, sec, rel->r_offset);
4608 if (elf_section_data (sec)->relocs != relstart)
4609 free (relstart);
4610 return TRUE;
b7fcf6f6 4611 }
25dbc73a 4612
b7fcf6f6
AM
4613 if (h != NULL)
4614 {
4615 tls_mask = &ppc_elf_hash_entry (h)->tls_mask;
4616 got_count = &h->got.refcount;
4617 }
4618 else
4619 {
b7fcf6f6 4620 bfd_signed_vma *lgot_refs;
e054468f 4621 struct plt_entry **local_plt;
bac3c8c5 4622 unsigned char *lgot_masks;
25dbc73a 4623
b7fcf6f6
AM
4624 lgot_refs = elf_local_got_refcounts (ibfd);
4625 if (lgot_refs == NULL)
4626 abort ();
e054468f
AM
4627 local_plt = (struct plt_entry **)
4628 (lgot_refs + symtab_hdr->sh_info);
bac3c8c5
AM
4629 lgot_masks = (unsigned char *)
4630 (local_plt + symtab_hdr->sh_info);
b7fcf6f6
AM
4631 tls_mask = &lgot_masks[r_symndx];
4632 got_count = &lgot_refs[r_symndx];
4633 }
25dbc73a 4634
37da22e5
AM
4635 /* If we don't have old-style __tls_get_addr calls
4636 without TLSGD/TLSLD marker relocs, and we haven't
4637 found a new-style __tls_get_addr call with a
4638 marker for this symbol, then we either have a
4639 broken object file or an -mlongcall style
4640 indirect call to __tls_get_addr without a marker.
4641 Disable optimization in this case. */
4642 if ((tls_clear & (TLS_GD | TLS_LD)) != 0
9737e8af 4643 && !sec->nomark_tls_get_addr
37da22e5
AM
4644 && ((*tls_mask & (TLS_TLS | TLS_MARK))
4645 != (TLS_TLS | TLS_MARK)))
4646 continue;
4647
7d04a20a 4648 if (expecting_tls_get_addr == 1 + !sec->nomark_tls_get_addr)
37da22e5
AM
4649 {
4650 struct plt_entry *ent;
4651 bfd_vma addend = 0;
4652
4653 if (bfd_link_pic (info)
23cedd1d
AM
4654 && (ELF32_R_TYPE (rel[1].r_info) == R_PPC_PLTREL24
4655 || ELF32_R_TYPE (rel[1].r_info) == R_PPC_PLTCALL))
37da22e5
AM
4656 addend = rel[1].r_addend;
4657 ent = find_plt_ent (&htab->tls_get_addr->plt.plist,
4658 got2, addend);
4659 if (ent != NULL && ent->plt.refcount > 0)
4660 ent->plt.refcount -= 1;
37da22e5 4661 }
7d04a20a
AM
4662 if (tls_clear == 0)
4663 continue;
37da22e5 4664
b7fcf6f6
AM
4665 if (tls_set == 0)
4666 {
4667 /* We managed to get rid of a got entry. */
4668 if (*got_count > 0)
4669 *got_count -= 1;
4670 }
25dbc73a 4671
b7fcf6f6
AM
4672 *tls_mask |= tls_set;
4673 *tls_mask &= ~tls_clear;
4674 }
25dbc73a 4675
b7fcf6f6
AM
4676 if (elf_section_data (sec)->relocs != relstart)
4677 free (relstart);
4678 }
b7fcf6f6 4679 }
9a23f96e 4680 htab->do_tls_opt = 1;
25dbc73a
AM
4681 return TRUE;
4682}
4683\f
98bbb1b8 4684/* Find dynamic relocs for H that apply to read-only sections. */
625af618 4685
98bbb1b8
AM
4686static asection *
4687readonly_dynrelocs (struct elf_link_hash_entry *h)
625af618 4688{
6061a67d 4689 struct elf_dyn_relocs *p;
625af618
AM
4690
4691 for (p = ppc_elf_hash_entry (h)->dyn_relocs; p != NULL; p = p->next)
4692 {
4693 asection *s = p->sec->output_section;
4694
98bbb1b8
AM
4695 if (s != NULL && (s->flags & SEC_READONLY) != 0)
4696 return p->sec;
625af618 4697 }
98bbb1b8 4698 return NULL;
625af618
AM
4699}
4700
287c7eaf
AM
4701/* Return true if we have dynamic relocs against H or any of its weak
4702 aliases, that apply to read-only sections. Cannot be used after
4703 size_dynamic_sections. */
4704
4705static bfd_boolean
4706alias_readonly_dynrelocs (struct elf_link_hash_entry *h)
4707{
4708 struct ppc_elf_link_hash_entry *eh = ppc_elf_hash_entry (h);
4709 do
4710 {
4711 if (readonly_dynrelocs (&eh->elf))
4712 return TRUE;
4713 eh = ppc_elf_hash_entry (eh->elf.u.alias);
4714 } while (eh != NULL && &eh->elf != h);
4715
4716 return FALSE;
4717}
4718
4719/* Return whether H has pc-relative dynamic relocs. */
4720
4721static bfd_boolean
4722pc_dynrelocs (struct elf_link_hash_entry *h)
4723{
4724 struct elf_dyn_relocs *p;
4725
4726 for (p = ppc_elf_hash_entry (h)->dyn_relocs; p != NULL; p = p->next)
4727 if (p->pc_count != 0)
4728 return TRUE;
4729 return FALSE;
4730}
4731
25dbc73a
AM
4732/* Adjust a symbol defined by a dynamic object and referenced by a
4733 regular object. The current definition is in some section of the
4734 dynamic object, but we're not including those sections. We have to
4735 change the definition to something the rest of the link can
4736 understand. */
7fce784e 4737
25dbc73a
AM
4738static bfd_boolean
4739ppc_elf_adjust_dynamic_symbol (struct bfd_link_info *info,
4740 struct elf_link_hash_entry *h)
4741{
4742 struct ppc_elf_link_hash_table *htab;
4743 asection *s;
7fce784e 4744
25dbc73a
AM
4745#ifdef DEBUG
4746 fprintf (stderr, "ppc_elf_adjust_dynamic_symbol called for %s\n",
4747 h->root.root.string);
4748#endif
252b5132 4749
25dbc73a
AM
4750 /* Make sure we know what is going on here. */
4751 htab = ppc_elf_hash_table (info);
4752 BFD_ASSERT (htab->elf.dynobj != NULL
4753 && (h->needs_plt
91e21fb7 4754 || h->type == STT_GNU_IFUNC
60d67dc8 4755 || h->is_weakalias
25dbc73a
AM
4756 || (h->def_dynamic
4757 && h->ref_regular
4758 && !h->def_regular)));
252b5132 4759
25dbc73a
AM
4760 /* Deal with function syms. */
4761 if (h->type == STT_FUNC
e054468f 4762 || h->type == STT_GNU_IFUNC
25dbc73a
AM
4763 || h->needs_plt)
4764 {
529fe20e
AM
4765 bfd_boolean local = (SYMBOL_CALLS_LOCAL (info, h)
4766 || UNDEFWEAK_NO_DYNAMIC_RELOC (info, h));
287c7eaf
AM
4767 /* Discard dyn_relocs when non-pic if we've decided that a
4768 function symbol is local. */
4769 if (!bfd_link_pic (info) && local)
4770 ppc_elf_hash_entry (h)->dyn_relocs = NULL;
529fe20e 4771
25dbc73a
AM
4772 /* Clear procedure linkage table information for any symbol that
4773 won't need a .plt entry. */
a6aa5195
AM
4774 struct plt_entry *ent;
4775 for (ent = h->plt.plist; ent != NULL; ent = ent->next)
4776 if (ent->plt.refcount > 0)
4777 break;
4778 if (ent == NULL
2d7ad24e
AM
4779 || (h->type != STT_GNU_IFUNC
4780 && local
3e04d765
AM
4781 && (htab->can_convert_all_inline_plt
4782 || (ppc_elf_hash_entry (h)->tls_mask
4783 & (TLS_TLS | PLT_KEEP)) != PLT_KEEP)))
252b5132 4784 {
25dbc73a 4785 /* A PLT entry is not required/allowed when:
252b5132 4786
25dbc73a
AM
4787 1. We are not using ld.so; because then the PLT entry
4788 can't be set up, so we can't use one. In this case,
4789 ppc_elf_adjust_dynamic_symbol won't even be called.
252b5132 4790
25dbc73a
AM
4791 2. GC has rendered the entry unused.
4792
4793 3. We know for certain that a call to this symbol
4794 will go to this object, or will remain undefined. */
a6aa5195 4795 h->plt.plist = NULL;
25dbc73a 4796 h->needs_plt = 0;
d1eca1e4 4797 h->pointer_equality_needed = 0;
25dbc73a 4798 }
625af618
AM
4799 else
4800 {
d1eca1e4
AM
4801 /* Taking a function's address in a read/write section
4802 doesn't require us to define the function symbol in the
1009ef28 4803 executable on a plt call stub. A dynamic reloc can
f0158f44
AM
4804 be used instead, giving better runtime performance.
4805 (Calls via that function pointer don't need to bounce
4806 through the plt call stub.) Similarly, use a dynamic
4807 reloc for a weak reference when possible, allowing the
4808 resolution of the symbol to be set at load time rather
4809 than link time. */
4810 if ((h->pointer_equality_needed
3988aed5
AM
4811 || (h->non_got_ref
4812 && !h->ref_regular_nonweak
4813 && !UNDEFWEAK_NO_DYNAMIC_RELOC (info, h)))
1009ef28
AM
4814 && !htab->is_vxworks
4815 && !ppc_elf_hash_entry (h)->has_sda_refs
98bbb1b8 4816 && !readonly_dynrelocs (h))
d1eca1e4
AM
4817 {
4818 h->pointer_equality_needed = 0;
04383fd1
AM
4819 /* If we haven't seen a branch reloc and the symbol
4820 isn't an ifunc then we don't need a plt entry. */
4821 if (!h->needs_plt && h->type != STT_GNU_IFUNC)
3988aed5 4822 h->plt.plist = NULL;
d1eca1e4 4823 }
287c7eaf 4824 else if (!bfd_link_pic (info))
529fe20e
AM
4825 /* We are going to be defining the function symbol on the
4826 plt stub, so no dyn_relocs needed when non-pic. */
287c7eaf 4827 ppc_elf_hash_entry (h)->dyn_relocs = NULL;
625af618 4828 }
d3e454b9 4829 h->protected_def = 0;
3988aed5 4830 /* Function symbols can't have copy relocs. */
25dbc73a 4831 return TRUE;
252b5132 4832 }
25dbc73a 4833 else
a6aa5195 4834 h->plt.plist = NULL;
252b5132 4835
25dbc73a
AM
4836 /* If this is a weak symbol, and there is a real definition, the
4837 processor independent code will have arranged for us to see the
4838 real definition first, and we can just use the same value. */
60d67dc8 4839 if (h->is_weakalias)
252b5132 4840 {
60d67dc8
AM
4841 struct elf_link_hash_entry *def = weakdef (h);
4842 BFD_ASSERT (def->root.type == bfd_link_hash_defined);
4843 h->root.u.def.section = def->root.u.def.section;
4844 h->root.u.def.value = def->root.u.def.value;
4a7e5234
AM
4845 if (def->root.u.def.section == htab->elf.sdynbss
4846 || def->root.u.def.section == htab->elf.sdynrelro
4847 || def->root.u.def.section == htab->dynsbss)
4848 ppc_elf_hash_entry (h)->dyn_relocs = NULL;
25dbc73a
AM
4849 return TRUE;
4850 }
dc810e39 4851
25dbc73a
AM
4852 /* This is a reference to a symbol defined by a dynamic object which
4853 is not a function. */
252b5132 4854
25dbc73a
AM
4855 /* If we are creating a shared library, we must presume that the
4856 only references to the symbol are via the global offset table.
4857 For such cases we need not do anything here; the relocations will
4858 be handled correctly by relocate_section. */
0e1862bb 4859 if (bfd_link_pic (info))
d3e454b9
AM
4860 {
4861 h->protected_def = 0;
4862 return TRUE;
4863 }
252b5132 4864
25dbc73a
AM
4865 /* If there are no references to this symbol that do not use the
4866 GOT, we don't need to generate a copy reloc. */
4867 if (!h->non_got_ref)
d3e454b9
AM
4868 {
4869 h->protected_def = 0;
4870 return TRUE;
4871 }
4872
4873 /* Protected variables do not work with .dynbss. The copy in
4874 .dynbss won't be used by the shared library with the protected
4875 definition for the variable. Editing to PIC, or text relocations
4876 are preferable to an incorrect program. */
4877 if (h->protected_def)
4878 {
4879 if (ELIMINATE_COPY_RELOCS
4880 && ppc_elf_hash_entry (h)->has_addr16_ha
4881 && ppc_elf_hash_entry (h)->has_addr16_lo
4882 && htab->params->pic_fixup == 0
4883 && info->disable_target_specific_optimizations <= 1)
4884 htab->params->pic_fixup = 1;
d3e454b9
AM
4885 return TRUE;
4886 }
25dbc73a 4887
a127494f
AM
4888 /* If -z nocopyreloc was given, we won't generate them either. */
4889 if (info->nocopyreloc)
529fe20e 4890 return TRUE;
a127494f 4891
dce2246a 4892 /* If we don't find any dynamic relocs in read-only sections, then
cfd2c773
NS
4893 we'll be keeping the dynamic relocs and avoiding the copy reloc.
4894 We can't do this if there are any small data relocations. This
4895 doesn't work on VxWorks, where we can not have dynamic
4896 relocations (other than copy and jump slot relocations) in an
4897 executable. */
4dc4a9a5 4898 if (ELIMINATE_COPY_RELOCS
cfd2c773 4899 && !ppc_elf_hash_entry (h)->has_sda_refs
625af618
AM
4900 && !htab->is_vxworks
4901 && !h->def_regular
287c7eaf 4902 && !alias_readonly_dynrelocs (h))
529fe20e 4903 return TRUE;
252b5132 4904
25dbc73a
AM
4905 /* We must allocate the symbol in our .dynbss section, which will
4906 become part of the .bss section of the executable. There will be
4907 an entry for this symbol in the .dynsym section. The dynamic
4908 object will contain position independent code, so all references
4909 from the dynamic object to this symbol will go through the global
4910 offset table. The dynamic linker will use the .dynsym entry to
4911 determine the address it must put in the global offset table, so
4912 both the dynamic object and the regular object will refer to the
4913 same memory location for the variable.
4914
4dc4a9a5
DJ
4915 Of course, if the symbol is referenced using SDAREL relocs, we
4916 must instead allocate it in .sbss. */
4dc4a9a5 4917 if (ppc_elf_hash_entry (h)->has_sda_refs)
25dbc73a 4918 s = htab->dynsbss;
5474d94f
AM
4919 else if ((h->root.u.def.section->flags & SEC_READONLY) != 0)
4920 s = htab->elf.sdynrelro;
25dbc73a 4921 else
9d19e4fd 4922 s = htab->elf.sdynbss;
25dbc73a
AM
4923 BFD_ASSERT (s != NULL);
4924
1d7e9d18 4925 if ((h->root.u.def.section->flags & SEC_ALLOC) != 0 && h->size != 0)
25dbc73a
AM
4926 {
4927 asection *srel;
4928
4a7e5234
AM
4929 /* We must generate a R_PPC_COPY reloc to tell the dynamic
4930 linker to copy the initial value out of the dynamic object
4931 and into the runtime process image. */
4dc4a9a5 4932 if (ppc_elf_hash_entry (h)->has_sda_refs)
25dbc73a 4933 srel = htab->relsbss;
5474d94f
AM
4934 else if ((h->root.u.def.section->flags & SEC_READONLY) != 0)
4935 srel = htab->elf.sreldynrelro;
25dbc73a 4936 else
9d19e4fd 4937 srel = htab->elf.srelbss;
25dbc73a
AM
4938 BFD_ASSERT (srel != NULL);
4939 srel->size += sizeof (Elf32_External_Rela);
4940 h->needs_copy = 1;
4941 }
7619e7c7 4942
529fe20e 4943 /* We no longer want dyn_relocs. */
287c7eaf 4944 ppc_elf_hash_entry (h)->dyn_relocs = NULL;
6cabe1ea 4945 return _bfd_elf_adjust_dynamic_copy (info, h, s);
25dbc73a
AM
4946}
4947\f
ac39eb42
AM
4948/* Generate a symbol to mark plt call stubs. For non-PIC code the sym is
4949 xxxxxxxx.plt_call32.<callee> where xxxxxxxx is a hex number, usually 0,
4950 specifying the addend on the plt relocation. For -fpic code, the sym
4951 is xxxxxxxx.plt_pic32.<callee>, and for -fPIC
4952 xxxxxxxx.got2.plt_pic32.<callee>. */
0ba07910
AM
4953
4954static bfd_boolean
4955add_stub_sym (struct plt_entry *ent,
4956 struct elf_link_hash_entry *h,
ac39eb42 4957 struct bfd_link_info *info)
0ba07910
AM
4958{
4959 struct elf_link_hash_entry *sh;
4960 size_t len1, len2, len3;
4961 char *name;
ac39eb42
AM
4962 const char *stub;
4963 struct ppc_elf_link_hash_table *htab = ppc_elf_hash_table (info);
4964
0e1862bb 4965 if (bfd_link_pic (info))
ac39eb42
AM
4966 stub = ".plt_pic32.";
4967 else
4968 stub = ".plt_call32.";
0ba07910
AM
4969
4970 len1 = strlen (h->root.root.string);
ac39eb42 4971 len2 = strlen (stub);
0ba07910
AM
4972 len3 = 0;
4973 if (ent->sec)
4974 len3 = strlen (ent->sec->name);
ac39eb42 4975 name = bfd_malloc (len1 + len2 + len3 + 9);
0ba07910
AM
4976 if (name == NULL)
4977 return FALSE;
4978 sprintf (name, "%08x", (unsigned) ent->addend & 0xffffffff);
4979 if (ent->sec)
4980 memcpy (name + 8, ent->sec->name, len3);
ac39eb42
AM
4981 memcpy (name + 8 + len3, stub, len2);
4982 memcpy (name + 8 + len3 + len2, h->root.root.string, len1 + 1);
0ba07910
AM
4983 sh = elf_link_hash_lookup (&htab->elf, name, TRUE, FALSE, FALSE);
4984 if (sh == NULL)
4985 return FALSE;
4986 if (sh->root.type == bfd_link_hash_new)
4987 {
4988 sh->root.type = bfd_link_hash_defined;
4989 sh->root.u.def.section = htab->glink;
4990 sh->root.u.def.value = ent->glink_offset;
4991 sh->ref_regular = 1;
4992 sh->def_regular = 1;
4993 sh->ref_regular_nonweak = 1;
4994 sh->forced_local = 1;
4995 sh->non_elf = 0;
2ec55de3 4996 sh->root.linker_def = 1;
0ba07910
AM
4997 }
4998 return TRUE;
4999}
5000
3b36f7e6
AM
5001/* Allocate NEED contiguous space in .got, and return the offset.
5002 Handles allocation of the got header when crossing 32k. */
5003
5004static bfd_vma
5005allocate_got (struct ppc_elf_link_hash_table *htab, unsigned int need)
5006{
5007 bfd_vma where;
4a3dc543 5008 unsigned int max_before_header;
3b36f7e6 5009
4a3dc543 5010 if (htab->plt_type == PLT_VXWORKS)
9d8504b1 5011 {
ce558b89
AM
5012 where = htab->elf.sgot->size;
5013 htab->elf.sgot->size += need;
9d8504b1 5014 }
3b36f7e6
AM
5015 else
5016 {
4a3dc543
RS
5017 max_before_header = htab->plt_type == PLT_NEW ? 32768 : 32764;
5018 if (need <= htab->got_gap)
3b36f7e6 5019 {
4a3dc543
RS
5020 where = max_before_header - htab->got_gap;
5021 htab->got_gap -= need;
5022 }
5023 else
5024 {
ce558b89
AM
5025 if (htab->elf.sgot->size + need > max_before_header
5026 && htab->elf.sgot->size <= max_before_header)
4a3dc543 5027 {
ce558b89
AM
5028 htab->got_gap = max_before_header - htab->elf.sgot->size;
5029 htab->elf.sgot->size = max_before_header + htab->got_header_size;
4a3dc543 5030 }
ce558b89
AM
5031 where = htab->elf.sgot->size;
5032 htab->elf.sgot->size += need;
3b36f7e6 5033 }
3b36f7e6
AM
5034 }
5035 return where;
5036}
5037
f15d0b54
AM
5038/* Calculate size of GOT entries for symbol given its TLS_MASK.
5039 TLS_LD is excluded because those go in a special GOT slot. */
5040
5041static inline unsigned int
5042got_entries_needed (int tls_mask)
5043{
5044 unsigned int need;
5045 if ((tls_mask & TLS_TLS) == 0)
5046 need = 4;
5047 else
5048 {
5049 need = 0;
5050 if ((tls_mask & TLS_GD) != 0)
5051 need += 8;
b00a0a86 5052 if ((tls_mask & (TLS_TPREL | TLS_GDIE)) != 0)
f15d0b54
AM
5053 need += 4;
5054 if ((tls_mask & TLS_DTPREL) != 0)
5055 need += 4;
5056 }
5057 return need;
5058}
5059
46434633 5060/* If H is undefined, make it dynamic if that makes sense. */
f0158f44
AM
5061
5062static bfd_boolean
46434633
AM
5063ensure_undef_dynamic (struct bfd_link_info *info,
5064 struct elf_link_hash_entry *h)
f0158f44
AM
5065{
5066 struct elf_link_hash_table *htab = elf_hash_table (info);
5067
5068 if (htab->dynamic_sections_created
46434633
AM
5069 && ((info->dynamic_undefined_weak != 0
5070 && h->root.type == bfd_link_hash_undefweak)
5071 || h->root.type == bfd_link_hash_undefined)
f0158f44
AM
5072 && h->dynindx == -1
5073 && !h->forced_local
5074 && ELF_ST_VISIBILITY (h->other) == STV_DEFAULT)
5075 return bfd_elf_link_record_dynamic_symbol (info, h);
5076 return TRUE;
5077}
5078
25dbc73a 5079/* Allocate space in associated reloc sections for dynamic relocs. */
252b5132 5080
b34976b6 5081static bfd_boolean
25dbc73a 5082allocate_dynrelocs (struct elf_link_hash_entry *h, void *inf)
252b5132 5083{
25dbc73a
AM
5084 struct bfd_link_info *info = inf;
5085 struct ppc_elf_link_hash_entry *eh;
7619e7c7 5086 struct ppc_elf_link_hash_table *htab;
6061a67d 5087 struct elf_dyn_relocs *p;
f0158f44 5088 bfd_boolean dyn;
252b5132 5089
25dbc73a 5090 if (h->root.type == bfd_link_hash_indirect)
b34976b6 5091 return TRUE;
252b5132 5092
7619e7c7 5093 htab = ppc_elf_hash_table (info);
25dbc73a 5094 eh = (struct ppc_elf_link_hash_entry *) h;
d3e454b9
AM
5095 if (eh->elf.got.refcount > 0
5096 || (ELIMINATE_COPY_RELOCS
5097 && !eh->elf.def_regular
5098 && eh->elf.protected_def
5099 && eh->has_addr16_ha
5100 && eh->has_addr16_lo
5101 && htab->params->pic_fixup > 0))
25dbc73a 5102 {
d6e14abc
AM
5103 unsigned int need;
5104
46434633
AM
5105 /* Make sure this symbol is output as a dynamic symbol. */
5106 if (!ensure_undef_dynamic (info, &eh->elf))
f0158f44 5107 return FALSE;
252b5132 5108
d6e14abc 5109 need = 0;
37da22e5 5110 if ((eh->tls_mask & (TLS_TLS | TLS_LD)) == (TLS_TLS | TLS_LD))
25dbc73a 5111 {
f749f26e 5112 if (SYMBOL_REFERENCES_LOCAL (info, &eh->elf))
f15d0b54
AM
5113 /* We'll just use htab->tlsld_got.offset. This should
5114 always be the case. It's a little odd if we have
5115 a local dynamic reloc against a non-local symbol. */
5116 htab->tlsld_got.refcount += 1;
5117 else
d6e14abc 5118 need += 8;
d6e14abc 5119 }
f15d0b54 5120 need += got_entries_needed (eh->tls_mask);
d6e14abc
AM
5121 if (need == 0)
5122 eh->elf.got.offset = (bfd_vma) -1;
5123 else
5124 {
3b36f7e6 5125 eh->elf.got.offset = allocate_got (htab, need);
f749f26e
AM
5126 if (((bfd_link_pic (info)
5127 && !((eh->tls_mask & TLS_TLS) != 0
5128 && bfd_link_executable (info)
5129 && SYMBOL_REFERENCES_LOCAL (info, &eh->elf)))
f0158f44
AM
5130 || (htab->elf.dynamic_sections_created
5131 && eh->elf.dynindx != -1
5132 && !SYMBOL_REFERENCES_LOCAL (info, &eh->elf)))
21d68fcd 5133 && !UNDEFWEAK_NO_DYNAMIC_RELOC (info, &eh->elf))
252b5132 5134 {
f15d0b54 5135 asection *rsec;
f15d0b54 5136
f749f26e
AM
5137 need *= sizeof (Elf32_External_Rela) / 4;
5138 if ((eh->tls_mask & (TLS_TLS | TLS_LD)) == (TLS_TLS | TLS_LD))
f15d0b54
AM
5139 need -= sizeof (Elf32_External_Rela);
5140 rsec = htab->elf.srelgot;
0bed072f 5141 if (eh->elf.type == STT_GNU_IFUNC)
ce558b89 5142 rsec = htab->elf.irelplt;
f15d0b54 5143 rsec->size += need;
252b5132 5144 }
25dbc73a
AM
5145 }
5146 }
5147 else
5148 eh->elf.got.offset = (bfd_vma) -1;
252b5132 5149
954b63d4
AM
5150 /* If no dynamic sections we can't have dynamic relocs, except for
5151 IFUNCs which are handled even in static executables. */
f0158f44
AM
5152 if (!htab->elf.dynamic_sections_created
5153 && h->type != STT_GNU_IFUNC)
5154 eh->dyn_relocs = NULL;
5155
529fe20e
AM
5156 /* Discard relocs on undefined symbols that must be local. */
5157 else if (h->root.type == bfd_link_hash_undefined
5158 && ELF_ST_VISIBILITY (h->other) != STV_DEFAULT)
5159 eh->dyn_relocs = NULL;
5160
5161 /* Also discard relocs on undefined weak syms with non-default
5162 visibility, or when dynamic_undefined_weak says so. */
5163 else if (UNDEFWEAK_NO_DYNAMIC_RELOC (info, h))
5164 eh->dyn_relocs = NULL;
5165
f0158f44 5166 if (eh->dyn_relocs == NULL)
287c7eaf 5167 ;
252b5132 5168
25dbc73a
AM
5169 /* In the shared -Bsymbolic case, discard space allocated for
5170 dynamic pc-relative relocs against symbols which turn out to be
5171 defined in regular objects. For the normal shared case, discard
5172 space for relocs that have become local due to symbol visibility
5173 changes. */
f0158f44 5174 else if (bfd_link_pic (info))
25dbc73a
AM
5175 {
5176 /* Relocs that use pc_count are those that appear on a call insn,
1d483afe 5177 or certain REL relocs (see must_be_dyn_reloc) that can be
25dbc73a
AM
5178 generated via assembly. We want calls to protected symbols to
5179 resolve directly to the function rather than going via the plt.
5180 If people want function pointer comparisons to work as expected
5181 then they should avoid writing weird assembly. */
529fe20e 5182 if (SYMBOL_CALLS_LOCAL (info, h))
25dbc73a 5183 {
6061a67d 5184 struct elf_dyn_relocs **pp;
25dbc73a
AM
5185
5186 for (pp = &eh->dyn_relocs; (p = *pp) != NULL; )
252b5132 5187 {
25dbc73a
AM
5188 p->count -= p->pc_count;
5189 p->pc_count = 0;
5190 if (p->count == 0)
5191 *pp = p->next;
5192 else
5193 pp = &p->next;
252b5132 5194 }
25dbc73a 5195 }
252b5132 5196
3348747a
NS
5197 if (htab->is_vxworks)
5198 {
6061a67d 5199 struct elf_dyn_relocs **pp;
3348747a
NS
5200
5201 for (pp = &eh->dyn_relocs; (p = *pp) != NULL; )
5202 {
5203 if (strcmp (p->sec->output_section->name, ".tls_vars") == 0)
5204 *pp = p->next;
5205 else
5206 pp = &p->next;
5207 }
5208 }
5209
954b63d4 5210 if (eh->dyn_relocs != NULL)
25dbc73a 5211 {
46434633
AM
5212 /* Make sure this symbol is output as a dynamic symbol. */
5213 if (!ensure_undef_dynamic (info, h))
f0158f44 5214 return FALSE;
25dbc73a
AM
5215 }
5216 }
5217 else if (ELIMINATE_COPY_RELOCS)
5218 {
f0158f44 5219 /* For the non-pic case, discard space for relocs against
25dbc73a
AM
5220 symbols which turn out to need copy relocs or are not
5221 dynamic. */
529fe20e 5222 if (h->dynamic_adjusted
d3e454b9 5223 && !h->def_regular
529fe20e 5224 && !ELF_COMMON_DEF_P (h)
d3e454b9
AM
5225 && !(h->protected_def
5226 && eh->has_addr16_ha
5227 && eh->has_addr16_lo
5228 && htab->params->pic_fixup > 0))
25dbc73a 5229 {
46434633
AM
5230 /* Make sure this symbol is output as a dynamic symbol. */
5231 if (!ensure_undef_dynamic (info, h))
f0158f44 5232 return FALSE;
7619e7c7 5233
f0158f44 5234 if (h->dynindx == -1)
287c7eaf 5235 eh->dyn_relocs = NULL;
25dbc73a 5236 }
f0158f44 5237 else
287c7eaf 5238 eh->dyn_relocs = NULL;
25dbc73a 5239 }
252b5132 5240
f0158f44 5241 /* Allocate space. */
25dbc73a
AM
5242 for (p = eh->dyn_relocs; p != NULL; p = p->next)
5243 {
5244 asection *sreloc = elf_section_data (p->sec)->sreloc;
f95f8542 5245 if (eh->elf.type == STT_GNU_IFUNC)
ce558b89 5246 sreloc = htab->elf.irelplt;
25dbc73a
AM
5247 sreloc->size += p->count * sizeof (Elf32_External_Rela);
5248 }
252b5132 5249
2d7ad24e
AM
5250 /* Handle PLT relocs. Done last, after dynindx has settled.
5251 We might need a PLT entry when the symbol
5252 a) is dynamic, or
5253 b) is an ifunc, or
5254 c) has plt16 relocs and has been processed by adjust_dynamic_symbol, or
5255 d) has plt16 relocs and we are linking statically. */
f0158f44 5256 dyn = htab->elf.dynamic_sections_created && h->dynindx != -1;
2d7ad24e
AM
5257 if (dyn
5258 || h->type == STT_GNU_IFUNC
5259 || (h->needs_plt && h->dynamic_adjusted)
5260 || (h->needs_plt
5261 && h->def_regular
5262 && !htab->elf.dynamic_sections_created
3e04d765 5263 && !htab->can_convert_all_inline_plt
2d7ad24e
AM
5264 && (ppc_elf_hash_entry (h)->tls_mask
5265 & (TLS_TLS | PLT_KEEP)) == PLT_KEEP))
f0158f44
AM
5266 {
5267 struct plt_entry *ent;
5268 bfd_boolean doneone = FALSE;
2d7ad24e 5269 bfd_vma plt_offset = 0, glink_offset = (bfd_vma) -1;
f0158f44
AM
5270
5271 for (ent = h->plt.plist; ent != NULL; ent = ent->next)
5272 if (ent->plt.refcount > 0)
5273 {
5274 asection *s = htab->elf.splt;
5275
5276 if (!dyn)
2d7ad24e
AM
5277 {
5278 if (h->type == STT_GNU_IFUNC)
5279 s = htab->elf.iplt;
5280 else
5281 s = htab->pltlocal;
5282 }
f0158f44
AM
5283
5284 if (htab->plt_type == PLT_NEW || !dyn)
5285 {
5286 if (!doneone)
5287 {
5288 plt_offset = s->size;
5289 s->size += 4;
5290 }
5291 ent->plt.offset = plt_offset;
5292
2d7ad24e
AM
5293 if (s == htab->pltlocal)
5294 ent->glink_offset = glink_offset;
5295 else
f0158f44 5296 {
2d7ad24e
AM
5297 s = htab->glink;
5298 if (!doneone || bfd_link_pic (info))
5299 {
5300 glink_offset = s->size;
5301 s->size += GLINK_ENTRY_SIZE (htab, h);
5302 }
5303 if (!doneone
5304 && !bfd_link_pic (info)
5305 && h->def_dynamic
5306 && !h->def_regular)
5307 {
5308 h->root.u.def.section = s;
5309 h->root.u.def.value = glink_offset;
5310 }
5311 ent->glink_offset = glink_offset;
f0158f44 5312
2d7ad24e
AM
5313 if (htab->params->emit_stub_syms
5314 && !add_stub_sym (ent, h, info))
5315 return FALSE;
5316 }
f0158f44
AM
5317 }
5318 else
5319 {
5320 if (!doneone)
5321 {
5322 /* If this is the first .plt entry, make room
5323 for the special first entry. */
5324 if (s->size == 0)
5325 s->size += htab->plt_initial_entry_size;
5326
5327 /* The PowerPC PLT is actually composed of two
5328 parts, the first part is 2 words (for a load
5329 and a jump), and then there is a remaining
5330 word available at the end. */
5331 plt_offset = (htab->plt_initial_entry_size
5332 + (htab->plt_slot_size
5333 * ((s->size
5334 - htab->plt_initial_entry_size)
5335 / htab->plt_entry_size)));
5336
5337 /* If this symbol is not defined in a regular
5338 file, and we are not generating a shared
5339 library, then set the symbol to this location
5340 in the .plt. This is to avoid text
5341 relocations, and is required to make
5342 function pointers compare as equal between
5343 the normal executable and the shared library. */
5344 if (! bfd_link_pic (info)
5345 && h->def_dynamic
5346 && !h->def_regular)
5347 {
5348 h->root.u.def.section = s;
5349 h->root.u.def.value = plt_offset;
5350 }
5351
5352 /* Make room for this entry. */
5353 s->size += htab->plt_entry_size;
5354 /* After the 8192nd entry, room for two entries
5355 is allocated. */
5356 if (htab->plt_type == PLT_OLD
5357 && (s->size - htab->plt_initial_entry_size)
5358 / htab->plt_entry_size
5359 > PLT_NUM_SINGLE_ENTRIES)
5360 s->size += htab->plt_entry_size;
5361 }
5362 ent->plt.offset = plt_offset;
5363 }
5364
5365 /* We also need to make an entry in the .rela.plt section. */
5366 if (!doneone)
5367 {
5368 if (!dyn)
2d7ad24e
AM
5369 {
5370 if (h->type == STT_GNU_IFUNC)
5371 {
5372 s = htab->elf.irelplt;
5373 s->size += sizeof (Elf32_External_Rela);
5374 }
5375 else if (bfd_link_pic (info))
5376 {
5377 s = htab->relpltlocal;
5378 s->size += sizeof (Elf32_External_Rela);
5379 }
5380 }
f0158f44
AM
5381 else
5382 {
5383 htab->elf.srelplt->size += sizeof (Elf32_External_Rela);
5384
5385 if (htab->plt_type == PLT_VXWORKS)
5386 {
5387 /* Allocate space for the unloaded relocations. */
5388 if (!bfd_link_pic (info)
5389 && htab->elf.dynamic_sections_created)
5390 {
5391 if (ent->plt.offset
5392 == (bfd_vma) htab->plt_initial_entry_size)
5393 {
5394 htab->srelplt2->size
5395 += (sizeof (Elf32_External_Rela)
5396 * VXWORKS_PLTRESOLVE_RELOCS);
5397 }
5398
5399 htab->srelplt2->size
5400 += (sizeof (Elf32_External_Rela)
5401 * VXWORKS_PLT_NON_JMP_SLOT_RELOCS);
5402 }
5403
5404 /* Every PLT entry has an associated GOT entry in
5405 .got.plt. */
5406 htab->elf.sgotplt->size += 4;
5407 }
5408 }
5409 doneone = TRUE;
5410 }
5411 }
5412 else
5413 ent->plt.offset = (bfd_vma) -1;
5414
5415 if (!doneone)
5416 {
5417 h->plt.plist = NULL;
5418 h->needs_plt = 0;
5419 }
5420 }
5421 else
5422 {
5423 h->plt.plist = NULL;
5424 h->needs_plt = 0;
5425 }
5426
25dbc73a
AM
5427 return TRUE;
5428}
7619e7c7 5429
625af618
AM
5430/* Set DF_TEXTREL if we find any dynamic relocs that apply to
5431 read-only sections. */
7619e7c7 5432
25dbc73a 5433static bfd_boolean
0caf6c82 5434maybe_set_textrel (struct elf_link_hash_entry *h, void *info_p)
25dbc73a 5435{
98bbb1b8 5436 asection *sec;
0caf6c82 5437
25dbc73a
AM
5438 if (h->root.type == bfd_link_hash_indirect)
5439 return TRUE;
252b5132 5440
98bbb1b8
AM
5441 sec = readonly_dynrelocs (h);
5442 if (sec != NULL)
25dbc73a 5443 {
98bbb1b8
AM
5444 struct bfd_link_info *info = (struct bfd_link_info *) info_p;
5445
0caf6c82 5446 info->flags |= DF_TEXTREL;
98bbb1b8 5447 info->callbacks->minfo
c1c8c1ef 5448 (_("%pB: dynamic relocation against `%pT' in read-only section `%pA'\n"),
63c1f59d 5449 sec->owner, h->root.root.string, sec);
ee05f2fe 5450
625af618
AM
5451 /* Not an error, just cut short the traversal. */
5452 return FALSE;
25dbc73a
AM
5453 }
5454 return TRUE;
5455}
5456
6177242a
AM
5457static const unsigned char glink_eh_frame_cie[] =
5458{
5459 0, 0, 0, 16, /* length. */
5460 0, 0, 0, 0, /* id. */
5461 1, /* CIE version. */
5462 'z', 'R', 0, /* Augmentation string. */
5463 4, /* Code alignment. */
5464 0x7c, /* Data alignment. */
5465 65, /* RA reg. */
5466 1, /* Augmentation size. */
5467 DW_EH_PE_pcrel | DW_EH_PE_sdata4, /* FDE encoding. */
5468 DW_CFA_def_cfa, 1, 0 /* def_cfa: r1 offset 0. */
5469};
5470
25dbc73a
AM
5471/* Set the sizes of the dynamic sections. */
5472
5473static bfd_boolean
93d1b056 5474ppc_elf_size_dynamic_sections (bfd *output_bfd,
25dbc73a
AM
5475 struct bfd_link_info *info)
5476{
5477 struct ppc_elf_link_hash_table *htab;
5478 asection *s;
5479 bfd_boolean relocs;
5480 bfd *ibfd;
7fce784e 5481
252b5132 5482#ifdef DEBUG
25dbc73a 5483 fprintf (stderr, "ppc_elf_size_dynamic_sections called\n");
252b5132 5484#endif
252b5132 5485
25dbc73a
AM
5486 htab = ppc_elf_hash_table (info);
5487 BFD_ASSERT (htab->elf.dynobj != NULL);
252b5132 5488
25dbc73a
AM
5489 if (elf_hash_table (info)->dynamic_sections_created)
5490 {
5491 /* Set the contents of the .interp section to the interpreter. */
9b8b325a 5492 if (bfd_link_executable (info) && !info->nointerp)
25dbc73a 5493 {
3d4d4302 5494 s = bfd_get_linker_section (htab->elf.dynobj, ".interp");
25dbc73a
AM
5495 BFD_ASSERT (s != NULL);
5496 s->size = sizeof ELF_DYNAMIC_INTERPRETER;
5497 s->contents = (unsigned char *) ELF_DYNAMIC_INTERPRETER;
5498 }
5499 }
252b5132 5500
4a3dc543 5501 if (htab->plt_type == PLT_OLD)
d7128ce4 5502 htab->got_header_size = 16;
4a3dc543 5503 else if (htab->plt_type == PLT_NEW)
d7128ce4 5504 htab->got_header_size = 12;
252b5132 5505
25dbc73a
AM
5506 /* Set up .got offsets for local syms, and space for local dynamic
5507 relocs. */
c72f2fb2 5508 for (ibfd = info->input_bfds; ibfd != NULL; ibfd = ibfd->link.next)
25dbc73a
AM
5509 {
5510 bfd_signed_vma *local_got;
5511 bfd_signed_vma *end_local_got;
e054468f
AM
5512 struct plt_entry **local_plt;
5513 struct plt_entry **end_local_plt;
25dbc73a
AM
5514 char *lgot_masks;
5515 bfd_size_type locsymcount;
5516 Elf_Internal_Shdr *symtab_hdr;
7fce784e 5517
0c8d6e5c 5518 if (!is_ppc_elf (ibfd))
25dbc73a 5519 continue;
7fce784e 5520
25dbc73a
AM
5521 for (s = ibfd->sections; s != NULL; s = s->next)
5522 {
f95f8542 5523 struct ppc_dyn_relocs *p;
252b5132 5524
f95f8542 5525 for (p = ((struct ppc_dyn_relocs *)
25dbc73a
AM
5526 elf_section_data (s)->local_dynrel);
5527 p != NULL;
5528 p = p->next)
5529 {
5530 if (!bfd_is_abs_section (p->sec)
5531 && bfd_is_abs_section (p->sec->output_section))
5532 {
5533 /* Input section has been discarded, either because
5534 it is a copy of a linkonce section or due to
5535 linker script /DISCARD/, so we'll be discarding
5536 the relocs too. */
7fce784e 5537 }
3348747a
NS
5538 else if (htab->is_vxworks
5539 && strcmp (p->sec->output_section->name,
5540 ".tls_vars") == 0)
5541 {
5542 /* Relocations in vxworks .tls_vars sections are
5543 handled specially by the loader. */
5544 }
25dbc73a 5545 else if (p->count != 0)
7fce784e 5546 {
25f23106 5547 asection *sreloc = elf_section_data (p->sec)->sreloc;
f95f8542 5548 if (p->ifunc)
ce558b89 5549 sreloc = htab->elf.irelplt;
25f23106 5550 sreloc->size += p->count * sizeof (Elf32_External_Rela);
25dbc73a
AM
5551 if ((p->sec->output_section->flags
5552 & (SEC_READONLY | SEC_ALLOC))
5553 == (SEC_READONLY | SEC_ALLOC))
0caf6c82
L
5554 {
5555 info->flags |= DF_TEXTREL;
871b3ab2 5556 info->callbacks->minfo (_("%pB: dynamic relocation in read-only section `%pA'\n"),
0caf6c82
L
5557 p->sec->owner, p->sec);
5558 }
7fce784e 5559 }
252b5132 5560 }
252b5132 5561 }
252b5132 5562
25dbc73a
AM
5563 local_got = elf_local_got_refcounts (ibfd);
5564 if (!local_got)
5565 continue;
252b5132 5566
0ffa91dd 5567 symtab_hdr = &elf_symtab_hdr (ibfd);
25dbc73a
AM
5568 locsymcount = symtab_hdr->sh_info;
5569 end_local_got = local_got + locsymcount;
e054468f
AM
5570 local_plt = (struct plt_entry **) end_local_got;
5571 end_local_plt = local_plt + locsymcount;
5572 lgot_masks = (char *) end_local_plt;
91d6fa6a 5573
25dbc73a
AM
5574 for (; local_got < end_local_got; ++local_got, ++lgot_masks)
5575 if (*local_got > 0)
5576 {
f15d0b54 5577 unsigned int need;
37da22e5 5578 if ((*lgot_masks & (TLS_TLS | TLS_LD)) == (TLS_TLS | TLS_LD))
f15d0b54
AM
5579 htab->tlsld_got.refcount += 1;
5580 need = got_entries_needed (*lgot_masks);
d6e14abc
AM
5581 if (need == 0)
5582 *local_got = (bfd_vma) -1;
25dbc73a
AM
5583 else
5584 {
3b36f7e6 5585 *local_got = allocate_got (htab, need);
f749f26e
AM
5586 if (bfd_link_pic (info)
5587 && !((*lgot_masks & TLS_TLS) != 0
5588 && bfd_link_executable (info)))
0bed072f 5589 {
f15d0b54 5590 asection *srel;
f15d0b54 5591
f749f26e 5592 need *= sizeof (Elf32_External_Rela) / 4;
f15d0b54 5593 srel = htab->elf.srelgot;
37da22e5 5594 if ((*lgot_masks & (TLS_TLS | PLT_IFUNC)) == PLT_IFUNC)
ce558b89 5595 srel = htab->elf.irelplt;
f15d0b54 5596 srel->size += need;
0bed072f 5597 }
25dbc73a
AM
5598 }
5599 }
5600 else
5601 *local_got = (bfd_vma) -1;
e054468f
AM
5602
5603 if (htab->is_vxworks)
5604 continue;
5605
5606 /* Allocate space for calls to local STT_GNU_IFUNC syms in .iplt. */
2d7ad24e
AM
5607 lgot_masks = (char *) end_local_plt;
5608 for (; local_plt < end_local_plt; ++local_plt, ++lgot_masks)
e054468f
AM
5609 {
5610 struct plt_entry *ent;
5611 bfd_boolean doneone = FALSE;
2d7ad24e 5612 bfd_vma plt_offset = 0, glink_offset = (bfd_vma) -1;
e054468f
AM
5613
5614 for (ent = *local_plt; ent != NULL; ent = ent->next)
5615 if (ent->plt.refcount > 0)
5616 {
2d7ad24e
AM
5617 if ((*lgot_masks & (TLS_TLS | PLT_IFUNC)) == PLT_IFUNC)
5618 s = htab->elf.iplt;
3e04d765
AM
5619 else if (htab->can_convert_all_inline_plt
5620 || (*lgot_masks & (TLS_TLS | PLT_KEEP)) != PLT_KEEP)
2d7ad24e
AM
5621 {
5622 ent->plt.offset = (bfd_vma) -1;
5623 continue;
5624 }
5625 else
5626 s = htab->pltlocal;
e054468f
AM
5627
5628 if (!doneone)
5629 {
5630 plt_offset = s->size;
5631 s->size += 4;
5632 }
5633 ent->plt.offset = plt_offset;
5634
2d7ad24e 5635 if (s != htab->pltlocal && (!doneone || bfd_link_pic (info)))
e054468f 5636 {
2d7ad24e 5637 s = htab->glink;
e054468f 5638 glink_offset = s->size;
9e390558 5639 s->size += GLINK_ENTRY_SIZE (htab, NULL);
e054468f
AM
5640 }
5641 ent->glink_offset = glink_offset;
5642
5643 if (!doneone)
5644 {
2d7ad24e
AM
5645 if ((*lgot_masks & (TLS_TLS | PLT_IFUNC)) == PLT_IFUNC)
5646 {
5647 s = htab->elf.irelplt;
5648 s->size += sizeof (Elf32_External_Rela);
5649 }
5650 else if (bfd_link_pic (info))
5651 {
5652 s = htab->relpltlocal;
5653 s->size += sizeof (Elf32_External_Rela);
5654 }
e054468f
AM
5655 doneone = TRUE;
5656 }
5657 }
5658 else
5659 ent->plt.offset = (bfd_vma) -1;
5660 }
25dbc73a 5661 }
252b5132 5662
b7fcf6f6
AM
5663 /* Allocate space for global sym dynamic relocs. */
5664 elf_link_hash_traverse (elf_hash_table (info), allocate_dynrelocs, info);
5665
3b36f7e6
AM
5666 if (htab->tlsld_got.refcount > 0)
5667 {
5668 htab->tlsld_got.offset = allocate_got (htab, 8);
f749f26e 5669 if (bfd_link_dll (info))
ce558b89 5670 htab->elf.srelgot->size += sizeof (Elf32_External_Rela);
3b36f7e6
AM
5671 }
5672 else
5673 htab->tlsld_got.offset = (bfd_vma) -1;
5674
ce558b89 5675 if (htab->elf.sgot != NULL && htab->plt_type != PLT_VXWORKS)
3b36f7e6
AM
5676 {
5677 unsigned int g_o_t = 32768;
5678
4d962050
AM
5679 /* If we haven't allocated the header, do so now. When we get here,
5680 for old plt/got the got size will be 0 to 32764 (not allocated),
5681 or 32780 to 65536 (header allocated). For new plt/got, the
5682 corresponding ranges are 0 to 32768 and 32780 to 65536. */
ce558b89 5683 if (htab->elf.sgot->size <= 32768)
3b36f7e6 5684 {
ce558b89 5685 g_o_t = htab->elf.sgot->size;
4a3dc543 5686 if (htab->plt_type == PLT_OLD)
4d962050 5687 g_o_t += 4;
ce558b89 5688 htab->elf.sgot->size += htab->got_header_size;
3b36f7e6 5689 }
3b36f7e6
AM
5690
5691 htab->elf.hgot->root.u.def.value = g_o_t;
5692 }
0e1862bb 5693 if (bfd_link_pic (info))
bd6c6e2b
AM
5694 {
5695 struct elf_link_hash_entry *sda = htab->sdata[0].sym;
93d1b056
AM
5696
5697 sda->root.u.def.section = htab->elf.hgot->root.u.def.section;
5698 sda->root.u.def.value = htab->elf.hgot->root.u.def.value;
bd6c6e2b 5699 }
15bfcc77
AM
5700 if (info->emitrelocations)
5701 {
5702 struct elf_link_hash_entry *sda = htab->sdata[0].sym;
5703
5704 if (sda != NULL && sda->ref_regular)
5705 sda->root.u.def.section->flags |= SEC_KEEP;
5706 sda = htab->sdata[1].sym;
5707 if (sda != NULL && sda->ref_regular)
5708 sda->root.u.def.section->flags |= SEC_KEEP;
5709 }
3b36f7e6 5710
e054468f
AM
5711 if (htab->glink != NULL
5712 && htab->glink->size != 0
5713 && htab->elf.dynamic_sections_created)
d7128ce4
AM
5714 {
5715 htab->glink_pltresolve = htab->glink->size;
9e390558
AM
5716 /* Space for the branch table. */
5717 htab->glink->size
5718 += htab->elf.srelplt->size / (sizeof (Elf32_External_Rela) / 4) - 4;
86b9da88 5719 /* Pad out to align the start of PLTresolve. */
5446cbdf
AM
5720 htab->glink->size += -htab->glink->size & (htab->params->ppc476_workaround
5721 ? 63 : 15);
d7128ce4 5722 htab->glink->size += GLINK_PLTRESOLVE;
0ba07910 5723
5446cbdf 5724 if (htab->params->emit_stub_syms)
0ba07910
AM
5725 {
5726 struct elf_link_hash_entry *sh;
5727 sh = elf_link_hash_lookup (&htab->elf, "__glink",
5728 TRUE, FALSE, FALSE);
5729 if (sh == NULL)
5730 return FALSE;
5731 if (sh->root.type == bfd_link_hash_new)
5732 {
5733 sh->root.type = bfd_link_hash_defined;
5734 sh->root.u.def.section = htab->glink;
5735 sh->root.u.def.value = htab->glink_pltresolve;
5736 sh->ref_regular = 1;
5737 sh->def_regular = 1;
5738 sh->ref_regular_nonweak = 1;
5739 sh->forced_local = 1;
5740 sh->non_elf = 0;
2ec55de3 5741 sh->root.linker_def = 1;
0ba07910
AM
5742 }
5743 sh = elf_link_hash_lookup (&htab->elf, "__glink_PLTresolve",
5744 TRUE, FALSE, FALSE);
5745 if (sh == NULL)
5746 return FALSE;
5747 if (sh->root.type == bfd_link_hash_new)
5748 {
5749 sh->root.type = bfd_link_hash_defined;
5750 sh->root.u.def.section = htab->glink;
5751 sh->root.u.def.value = htab->glink->size - GLINK_PLTRESOLVE;
5752 sh->ref_regular = 1;
5753 sh->def_regular = 1;
5754 sh->ref_regular_nonweak = 1;
5755 sh->forced_local = 1;
5756 sh->non_elf = 0;
2ec55de3 5757 sh->root.linker_def = 1;
0ba07910
AM
5758 }
5759 }
d7128ce4
AM
5760 }
5761
6177242a
AM
5762 if (htab->glink != NULL
5763 && htab->glink->size != 0
5764 && htab->glink_eh_frame != NULL
9a2a56cc
AM
5765 && !bfd_is_abs_section (htab->glink_eh_frame->output_section)
5766 && _bfd_elf_eh_frame_present (info))
6177242a
AM
5767 {
5768 s = htab->glink_eh_frame;
5769 s->size = sizeof (glink_eh_frame_cie) + 20;
0e1862bb 5770 if (bfd_link_pic (info))
6177242a
AM
5771 {
5772 s->size += 4;
5773 if (htab->glink->size - GLINK_PLTRESOLVE + 8 >= 256)
5774 s->size += 4;
5775 }
5776 }
5777
25dbc73a
AM
5778 /* We've now determined the sizes of the various dynamic sections.
5779 Allocate memory for them. */
5780 relocs = FALSE;
5781 for (s = htab->elf.dynobj->sections; s != NULL; s = s->next)
252b5132 5782 {
9d8504b1
PB
5783 bfd_boolean strip_section = TRUE;
5784
25dbc73a
AM
5785 if ((s->flags & SEC_LINKER_CREATED) == 0)
5786 continue;
252b5132 5787
ce558b89
AM
5788 if (s == htab->elf.splt
5789 || s == htab->elf.sgot)
25dbc73a 5790 {
9d8504b1
PB
5791 /* We'd like to strip these sections if they aren't needed, but if
5792 we've exported dynamic symbols from them we must leave them.
5793 It's too late to tell BFD to get rid of the symbols. */
e054468f 5794 if (htab->elf.hplt != NULL)
9d8504b1 5795 strip_section = FALSE;
25dbc73a
AM
5796 /* Strip this section if we don't need it; see the
5797 comment below. */
5798 }
ce558b89 5799 else if (s == htab->elf.iplt
2d7ad24e 5800 || s == htab->pltlocal
e054468f 5801 || s == htab->glink
6177242a 5802 || s == htab->glink_eh_frame
ce558b89 5803 || s == htab->elf.sgotplt
e054468f 5804 || s == htab->sbss
9d19e4fd 5805 || s == htab->elf.sdynbss
5474d94f 5806 || s == htab->elf.sdynrelro
15bfcc77 5807 || s == htab->dynsbss)
25dbc73a 5808 {
c9a2f333 5809 /* Strip these too. */
25dbc73a 5810 }
15bfcc77
AM
5811 else if (s == htab->sdata[0].section
5812 || s == htab->sdata[1].section)
5813 {
5814 strip_section = (s->flags & SEC_KEEP) == 0;
5815 }
fd361982 5816 else if (CONST_STRNEQ (bfd_section_name (s), ".rela"))
25dbc73a 5817 {
c456f082 5818 if (s->size != 0)
25dbc73a
AM
5819 {
5820 /* Remember whether there are any relocation sections. */
5821 relocs = TRUE;
252b5132 5822
25dbc73a
AM
5823 /* We use the reloc_count field as a counter if we need
5824 to copy relocs into the output file. */
5825 s->reloc_count = 0;
252b5132
RH
5826 }
5827 }
25dbc73a
AM
5828 else
5829 {
5830 /* It's not one of our sections, so don't allocate space. */
5831 continue;
5832 }
252b5132 5833
9d8504b1 5834 if (s->size == 0 && strip_section)
25dbc73a 5835 {
c456f082
AM
5836 /* If we don't need this section, strip it from the
5837 output file. This is mostly to handle .rela.bss and
5838 .rela.plt. We must create both sections in
5839 create_dynamic_sections, because they must be created
5840 before the linker maps input sections to output
5841 sections. The linker does that before
5842 adjust_dynamic_symbol is called, and it is that
5843 function which decides whether anything needs to go
5844 into these sections. */
8423293d 5845 s->flags |= SEC_EXCLUDE;
25dbc73a
AM
5846 continue;
5847 }
7fce784e 5848
d7128ce4 5849 if ((s->flags & SEC_HAS_CONTENTS) == 0)
644285ef
AM
5850 continue;
5851
25dbc73a
AM
5852 /* Allocate memory for the section contents. */
5853 s->contents = bfd_zalloc (htab->elf.dynobj, s->size);
5854 if (s->contents == NULL)
5855 return FALSE;
5856 }
252b5132 5857
25dbc73a 5858 if (htab->elf.dynamic_sections_created)
7619e7c7 5859 {
25dbc73a
AM
5860 /* Add some entries to the .dynamic section. We fill in the
5861 values later, in ppc_elf_finish_dynamic_sections, but we
5862 must add the entries now so that we get the correct size for
5863 the .dynamic section. The DT_DEBUG entry is filled in by the
5864 dynamic linker and used by the debugger. */
5865#define add_dynamic_entry(TAG, VAL) \
5866 _bfd_elf_add_dynamic_entry (info, TAG, VAL)
252b5132 5867
0e1862bb 5868 if (bfd_link_executable (info))
7619e7c7 5869 {
25dbc73a
AM
5870 if (!add_dynamic_entry (DT_DEBUG, 0))
5871 return FALSE;
7619e7c7
AM
5872 }
5873
ce558b89 5874 if (htab->elf.splt != NULL && htab->elf.splt->size != 0)
7619e7c7 5875 {
25dbc73a
AM
5876 if (!add_dynamic_entry (DT_PLTGOT, 0)
5877 || !add_dynamic_entry (DT_PLTRELSZ, 0)
5878 || !add_dynamic_entry (DT_PLTREL, DT_RELA)
5879 || !add_dynamic_entry (DT_JMPREL, 0))
5880 return FALSE;
5881 }
7619e7c7 5882
c7e17e05
AM
5883 if (htab->plt_type == PLT_NEW
5884 && htab->glink != NULL
5885 && htab->glink->size != 0)
d7128ce4 5886 {
1fe44d79 5887 if (!add_dynamic_entry (DT_PPC_GOT, 0))
d7128ce4 5888 return FALSE;
5446cbdf 5889 if (!htab->params->no_tls_get_addr_opt
a7f2871e
AM
5890 && htab->tls_get_addr != NULL
5891 && htab->tls_get_addr->plt.plist != NULL
e8910a83 5892 && !add_dynamic_entry (DT_PPC_OPT, PPC_OPT_TLS))
a7f2871e 5893 return FALSE;
d7128ce4
AM
5894 }
5895
25dbc73a
AM
5896 if (relocs)
5897 {
5898 if (!add_dynamic_entry (DT_RELA, 0)
5899 || !add_dynamic_entry (DT_RELASZ, 0)
5900 || !add_dynamic_entry (DT_RELAENT, sizeof (Elf32_External_Rela)))
5901 return FALSE;
5902 }
7619e7c7 5903
25dbc73a
AM
5904 /* If any dynamic relocs apply to a read-only section, then we
5905 need a DT_TEXTREL entry. */
5906 if ((info->flags & DF_TEXTREL) == 0)
625af618 5907 elf_link_hash_traverse (elf_hash_table (info), maybe_set_textrel,
25dbc73a 5908 info);
7619e7c7 5909
25dbc73a
AM
5910 if ((info->flags & DF_TEXTREL) != 0)
5911 {
5912 if (!add_dynamic_entry (DT_TEXTREL, 0))
5913 return FALSE;
7619e7c7 5914 }
7a2b07ff
NS
5915 if (htab->is_vxworks
5916 && !elf_vxworks_add_dynamic_entries (output_bfd, info))
5917 return FALSE;
5918 }
25dbc73a
AM
5919#undef add_dynamic_entry
5920
7e01508c
AM
5921 if (htab->glink_eh_frame != NULL
5922 && htab->glink_eh_frame->contents != NULL)
5923 {
5924 unsigned char *p = htab->glink_eh_frame->contents;
5925 bfd_vma val;
5926
5927 memcpy (p, glink_eh_frame_cie, sizeof (glink_eh_frame_cie));
5928 /* CIE length (rewrite in case little-endian). */
5929 bfd_put_32 (htab->elf.dynobj, sizeof (glink_eh_frame_cie) - 4, p);
5930 p += sizeof (glink_eh_frame_cie);
5931 /* FDE length. */
5932 val = htab->glink_eh_frame->size - 4 - sizeof (glink_eh_frame_cie);
5933 bfd_put_32 (htab->elf.dynobj, val, p);
5934 p += 4;
5935 /* CIE pointer. */
5936 val = p - htab->glink_eh_frame->contents;
5937 bfd_put_32 (htab->elf.dynobj, val, p);
5938 p += 4;
5939 /* Offset to .glink. Set later. */
5940 p += 4;
5941 /* .glink size. */
5942 bfd_put_32 (htab->elf.dynobj, htab->glink->size, p);
5943 p += 4;
5944 /* Augmentation. */
5945 p += 1;
5946
0e1862bb 5947 if (bfd_link_pic (info)
7e01508c
AM
5948 && htab->elf.dynamic_sections_created)
5949 {
5950 bfd_vma adv = (htab->glink->size - GLINK_PLTRESOLVE + 8) >> 2;
5951 if (adv < 64)
5952 *p++ = DW_CFA_advance_loc + adv;
5953 else if (adv < 256)
5954 {
5955 *p++ = DW_CFA_advance_loc1;
5956 *p++ = adv;
5957 }
5958 else if (adv < 65536)
5959 {
5960 *p++ = DW_CFA_advance_loc2;
5961 bfd_put_16 (htab->elf.dynobj, adv, p);
5962 p += 2;
5963 }
5964 else
5965 {
5966 *p++ = DW_CFA_advance_loc4;
5967 bfd_put_32 (htab->elf.dynobj, adv, p);
5968 p += 4;
5969 }
5970 *p++ = DW_CFA_register;
5971 *p++ = 65;
5972 p++;
5973 *p++ = DW_CFA_advance_loc + 4;
5974 *p++ = DW_CFA_restore_extended;
5975 *p++ = 65;
5976 }
5977 BFD_ASSERT ((bfd_vma) ((p + 3 - htab->glink_eh_frame->contents) & -4)
5978 == htab->glink_eh_frame->size);
5979 }
5980
7619e7c7
AM
5981 return TRUE;
5982}
0eb4a168 5983
93d1b056
AM
5984/* Arrange to have _SDA_BASE_ or _SDA2_BASE_ stripped from the output
5985 if it looks like nothing is using them. */
5986
5987static void
5988maybe_strip_sdasym (bfd *output_bfd, elf_linker_section_t *lsect)
5989{
5990 struct elf_link_hash_entry *sda = lsect->sym;
5991
5992 if (sda != NULL && !sda->ref_regular && sda->dynindx == -1)
5993 {
5994 asection *s;
5995
5996 s = bfd_get_section_by_name (output_bfd, lsect->name);
5997 if (s == NULL || bfd_section_removed_from_list (output_bfd, s))
5998 {
5999 s = bfd_get_section_by_name (output_bfd, lsect->bss_name);
6000 if (s == NULL || bfd_section_removed_from_list (output_bfd, s))
6001 {
6002 sda->def_regular = 0;
6003 /* This is somewhat magic. See elf_link_output_extsym. */
6004 sda->ref_dynamic = 1;
6005 sda->forced_local = 0;
6006 }
6007 }
6008 }
6009}
6010
6011void
6012ppc_elf_maybe_strip_sdata_syms (struct bfd_link_info *info)
6013{
6014 struct ppc_elf_link_hash_table *htab = ppc_elf_hash_table (info);
6015
6016 if (htab != NULL)
6017 {
6018 maybe_strip_sdasym (info->output_bfd, &htab->sdata[0]);
6019 maybe_strip_sdasym (info->output_bfd, &htab->sdata[1]);
6020 }
6021}
6022
6023
0eb4a168
AM
6024/* Return TRUE if symbol should be hashed in the `.gnu.hash' section. */
6025
6026static bfd_boolean
6027ppc_elf_hash_symbol (struct elf_link_hash_entry *h)
6028{
6029 if (h->plt.plist != NULL
6030 && !h->def_regular
6031 && (!h->pointer_equality_needed
6032 || !h->ref_regular_nonweak))
6033 return FALSE;
6034
6035 return _bfd_elf_hash_symbol (h);
6036}
25dbc73a
AM
6037\f
6038#define ARRAY_SIZE(a) (sizeof (a) / sizeof ((a)[0]))
6039
01017ef8
NS
6040/* Relaxation trampolines. r12 is available for clobbering (r11, is
6041 used for some functions that are allowed to break the ABI). */
25dbc73a
AM
6042static const int shared_stub_entry[] =
6043 {
6044 0x7c0802a6, /* mflr 0 */
6045 0x429f0005, /* bcl 20, 31, .Lxxx */
01017ef8
NS
6046 0x7d8802a6, /* mflr 12 */
6047 0x3d8c0000, /* addis 12, 12, (xxx-.Lxxx)@ha */
53291d1f 6048 0x398c0000, /* addi 12, 12, (xxx-.Lxxx)@l */
25dbc73a 6049 0x7c0803a6, /* mtlr 0 */
01017ef8 6050 0x7d8903a6, /* mtctr 12 */
25dbc73a
AM
6051 0x4e800420, /* bctr */
6052 };
6053
6054static const int stub_entry[] =
6055 {
01017ef8
NS
6056 0x3d800000, /* lis 12,xxx@ha */
6057 0x398c0000, /* addi 12,12,xxx@l */
6058 0x7d8903a6, /* mtctr 12 */
25dbc73a
AM
6059 0x4e800420, /* bctr */
6060 };
6061
5446cbdf
AM
6062struct ppc_elf_relax_info
6063{
6064 unsigned int workaround_size;
d3e454b9 6065 unsigned int picfixup_size;
5446cbdf
AM
6066};
6067
6068/* This function implements long branch trampolines, and the ppc476
6069 icache bug workaround. Any section needing trampolines or patch
6070 space for the workaround has its size extended so that we can
53291d1f 6071 add trampolines at the end of the section. */
5446cbdf 6072
25dbc73a
AM
6073static bfd_boolean
6074ppc_elf_relax_section (bfd *abfd,
6075 asection *isec,
6076 struct bfd_link_info *link_info,
6077 bfd_boolean *again)
6078{
d3e454b9 6079 struct one_branch_fixup
25dbc73a 6080 {
d3e454b9 6081 struct one_branch_fixup *next;
25dbc73a 6082 asection *tsec;
01017ef8
NS
6083 /* Final link, can use the symbol offset. For a
6084 relocatable link we use the symbol's index. */
25dbc73a
AM
6085 bfd_vma toff;
6086 bfd_vma trampoff;
6087 };
7619e7c7 6088
25dbc73a
AM
6089 Elf_Internal_Shdr *symtab_hdr;
6090 bfd_byte *contents = NULL;
6091 Elf_Internal_Sym *isymbuf = NULL;
6092 Elf_Internal_Rela *internal_relocs = NULL;
5446cbdf 6093 Elf_Internal_Rela *irel, *irelend = NULL;
d3e454b9 6094 struct one_branch_fixup *branch_fixups = NULL;
5446cbdf 6095 struct ppc_elf_relax_info *relax_info = NULL;
9bc4e62b 6096 unsigned changes = 0;
5446cbdf 6097 bfd_boolean workaround_change;
d7128ce4 6098 struct ppc_elf_link_hash_table *htab;
d3e454b9 6099 bfd_size_type trampbase, trampoff, newsize, picfixup_size;
a6aa5195 6100 asection *got2;
50248c89 6101 bfd_boolean maybe_pasted;
7619e7c7 6102
25dbc73a 6103 *again = FALSE;
7619e7c7 6104
5446cbdf 6105 /* No need to do anything with non-alloc or non-code sections. */
c87b5a93 6106 if ((isec->flags & SEC_ALLOC) == 0
a8ad78a7 6107 || (isec->flags & SEC_CODE) == 0
5446cbdf
AM
6108 || (isec->flags & SEC_LINKER_CREATED) != 0
6109 || isec->size < 4)
25dbc73a 6110 return TRUE;
7619e7c7 6111
c8a1f254
NS
6112 /* We cannot represent the required PIC relocs in the output, so don't
6113 do anything. The linker doesn't support mixing -shared and -r
6114 anyway. */
0e1862bb 6115 if (bfd_link_relocatable (link_info) && bfd_link_pic (link_info))
795bc6b3 6116 return TRUE;
5b914448 6117
5446cbdf
AM
6118 htab = ppc_elf_hash_table (link_info);
6119 if (htab == NULL)
6120 return TRUE;
6121
6122 isec->size = (isec->size + 3) & -4;
6123 if (isec->rawsize == 0)
6124 isec->rawsize = isec->size;
6125 trampbase = isec->size;
6126
53291d1f
AM
6127 BFD_ASSERT (isec->sec_info_type == SEC_INFO_TYPE_NONE
6128 || isec->sec_info_type == SEC_INFO_TYPE_TARGET);
6129 isec->sec_info_type = SEC_INFO_TYPE_TARGET;
6130
d3e454b9
AM
6131 if (htab->params->ppc476_workaround
6132 || htab->params->pic_fixup > 0)
5446cbdf
AM
6133 {
6134 if (elf_section_data (isec)->sec_info == NULL)
6135 {
5446cbdf
AM
6136 elf_section_data (isec)->sec_info
6137 = bfd_zalloc (abfd, sizeof (struct ppc_elf_relax_info));
6138 if (elf_section_data (isec)->sec_info == NULL)
6139 return FALSE;
6140 }
6141 relax_info = elf_section_data (isec)->sec_info;
6142 trampbase -= relax_info->workaround_size;
6143 }
6144
50248c89
AM
6145 maybe_pasted = (strcmp (isec->output_section->name, ".init") == 0
6146 || strcmp (isec->output_section->name, ".fini") == 0);
25dbc73a 6147 /* Space for a branch around any trampolines. */
5446cbdf
AM
6148 trampoff = trampbase;
6149 if (maybe_pasted && trampbase == isec->rawsize)
50248c89 6150 trampoff += 4;
7619e7c7 6151
0ffa91dd 6152 symtab_hdr = &elf_symtab_hdr (abfd);
d3e454b9
AM
6153 picfixup_size = 0;
6154 if (htab->params->branch_trampolines
6155 || htab->params->pic_fixup > 0)
7619e7c7 6156 {
5446cbdf
AM
6157 /* Get a copy of the native relocations. */
6158 if (isec->reloc_count != 0)
25dbc73a 6159 {
5446cbdf
AM
6160 internal_relocs = _bfd_elf_link_read_relocs (abfd, isec, NULL, NULL,
6161 link_info->keep_memory);
6162 if (internal_relocs == NULL)
6163 goto error_return;
25dbc73a 6164 }
7619e7c7 6165
5446cbdf
AM
6166 got2 = bfd_get_section_by_name (abfd, ".got2");
6167
6168 irelend = internal_relocs + isec->reloc_count;
6169 for (irel = internal_relocs; irel < irelend; irel++)
25dbc73a 6170 {
5446cbdf
AM
6171 unsigned long r_type = ELF32_R_TYPE (irel->r_info);
6172 bfd_vma toff, roff;
6173 asection *tsec;
d3e454b9 6174 struct one_branch_fixup *f;
5446cbdf 6175 size_t insn_offset = 0;
d3e454b9 6176 bfd_vma max_branch_offset = 0, val;
5446cbdf
AM
6177 bfd_byte *hit_addr;
6178 unsigned long t0;
6179 struct elf_link_hash_entry *h;
49c09209 6180 Elf_Internal_Sym *isym;
5446cbdf
AM
6181 struct plt_entry **plist;
6182 unsigned char sym_type;
6183
6184 switch (r_type)
6185 {
6186 case R_PPC_REL24:
6187 case R_PPC_LOCAL24PC:
6188 case R_PPC_PLTREL24:
23cedd1d 6189 case R_PPC_PLTCALL:
5446cbdf
AM
6190 max_branch_offset = 1 << 25;
6191 break;
6192
6193 case R_PPC_REL14:
6194 case R_PPC_REL14_BRTAKEN:
6195 case R_PPC_REL14_BRNTAKEN:
6196 max_branch_offset = 1 << 15;
6197 break;
7fce784e 6198
d3e454b9
AM
6199 case R_PPC_ADDR16_HA:
6200 if (htab->params->pic_fixup > 0)
6201 break;
6202 continue;
6203
5446cbdf
AM
6204 default:
6205 continue;
6206 }
6207
6208 /* Get the value of the symbol referred to by the reloc. */
49c09209
AM
6209 if (!get_sym_h (&h, &isym, &tsec, NULL, &isymbuf,
6210 ELF32_R_SYM (irel->r_info), abfd))
6211 goto error_return;
5446cbdf 6212
49c09209
AM
6213 if (isym != NULL)
6214 {
6215 if (tsec != NULL)
6216 ;
5446cbdf
AM
6217 else if (isym->st_shndx == SHN_ABS)
6218 tsec = bfd_abs_section_ptr;
49199304
AM
6219 else
6220 continue;
5446cbdf
AM
6221
6222 toff = isym->st_value;
6223 sym_type = ELF_ST_TYPE (isym->st_info);
25dbc73a 6224 }
25dbc73a 6225 else
5446cbdf 6226 {
49c09209
AM
6227 if (tsec != NULL)
6228 toff = h->root.u.def.value;
5446cbdf
AM
6229 else if (h->root.type == bfd_link_hash_undefined
6230 || h->root.type == bfd_link_hash_undefweak)
6231 {
49c09209
AM
6232 unsigned long indx;
6233
6234 indx = ELF32_R_SYM (irel->r_info) - symtab_hdr->sh_info;
5446cbdf 6235 tsec = bfd_und_section_ptr;
0e1862bb 6236 toff = bfd_link_relocatable (link_info) ? indx : 0;
5446cbdf
AM
6237 }
6238 else
6239 continue;
6240
9f7552cf
AM
6241 /* If this branch is to __tls_get_addr then we may later
6242 optimise away the call. We won't be needing a long-
6243 branch stub in that case. */
0e1862bb 6244 if (bfd_link_executable (link_info)
9f7552cf
AM
6245 && h == htab->tls_get_addr
6246 && irel != internal_relocs)
6247 {
6248 unsigned long t_symndx = ELF32_R_SYM (irel[-1].r_info);
6249 unsigned long t_rtype = ELF32_R_TYPE (irel[-1].r_info);
6250 unsigned int tls_mask = 0;
6251
6252 /* The previous reloc should be one of R_PPC_TLSGD or
6253 R_PPC_TLSLD, or for older object files, a reloc
6254 on the __tls_get_addr arg setup insn. Get tls
6255 mask bits from the symbol on that reloc. */
6256 if (t_symndx < symtab_hdr->sh_info)
6257 {
6258 bfd_vma *local_got_offsets = elf_local_got_offsets (abfd);
6259
6260 if (local_got_offsets != NULL)
6261 {
6262 struct plt_entry **local_plt = (struct plt_entry **)
6263 (local_got_offsets + symtab_hdr->sh_info);
6264 char *lgot_masks = (char *)
6265 (local_plt + symtab_hdr->sh_info);
6266 tls_mask = lgot_masks[t_symndx];
6267 }
6268 }
6269 else
6270 {
6271 struct elf_link_hash_entry *th
6272 = elf_sym_hashes (abfd)[t_symndx - symtab_hdr->sh_info];
6273
6274 while (th->root.type == bfd_link_hash_indirect
6275 || th->root.type == bfd_link_hash_warning)
6276 th = (struct elf_link_hash_entry *) th->root.u.i.link;
6277
6278 tls_mask
6279 = ((struct ppc_elf_link_hash_entry *) th)->tls_mask;
6280 }
6281
6282 /* The mask bits tell us if the call will be
6283 optimised away. */
6284 if ((tls_mask & TLS_TLS) != 0 && (tls_mask & TLS_GD) == 0
6285 && (t_rtype == R_PPC_TLSGD
6286 || t_rtype == R_PPC_GOT_TLSGD16
6287 || t_rtype == R_PPC_GOT_TLSGD16_LO))
6288 continue;
6289 if ((tls_mask & TLS_TLS) != 0 && (tls_mask & TLS_LD) == 0
6290 && (t_rtype == R_PPC_TLSLD
6291 || t_rtype == R_PPC_GOT_TLSLD16
6292 || t_rtype == R_PPC_GOT_TLSLD16_LO))
6293 continue;
6294 }
6295
5446cbdf
AM
6296 sym_type = h->type;
6297 }
7619e7c7 6298
d3e454b9
AM
6299 if (r_type == R_PPC_ADDR16_HA)
6300 {
6301 if (h != NULL
6302 && !h->def_regular
6303 && h->protected_def
6304 && ppc_elf_hash_entry (h)->has_addr16_ha
6305 && ppc_elf_hash_entry (h)->has_addr16_lo)
6306 picfixup_size += 12;
6307 continue;
6308 }
6309
5446cbdf
AM
6310 /* The condition here under which we call find_plt_ent must
6311 match that in relocate_section. If we call find_plt_ent here
6312 but not in relocate_section, or vice versa, then the branch
6313 destination used here may be incorrect. */
6314 plist = NULL;
6315 if (h != NULL)
25dbc73a 6316 {
5446cbdf
AM
6317 /* We know is_branch_reloc (r_type) is true. */
6318 if (h->type == STT_GNU_IFUNC
6319 || r_type == R_PPC_PLTREL24)
6320 plist = &h->plt.plist;
25dbc73a 6321 }
5446cbdf
AM
6322 else if (sym_type == STT_GNU_IFUNC
6323 && elf_local_got_offsets (abfd) != NULL)
c8a1f254 6324 {
5446cbdf
AM
6325 bfd_vma *local_got_offsets = elf_local_got_offsets (abfd);
6326 struct plt_entry **local_plt = (struct plt_entry **)
6327 (local_got_offsets + symtab_hdr->sh_info);
6328 plist = local_plt + ELF32_R_SYM (irel->r_info);
c8a1f254 6329 }
5446cbdf 6330 if (plist != NULL)
a9585d22 6331 {
5446cbdf
AM
6332 bfd_vma addend = 0;
6333 struct plt_entry *ent;
6334
0e1862bb 6335 if (r_type == R_PPC_PLTREL24 && bfd_link_pic (link_info))
5446cbdf
AM
6336 addend = irel->r_addend;
6337 ent = find_plt_ent (plist, got2, addend);
6338 if (ent != NULL)
a9585d22 6339 {
5446cbdf
AM
6340 if (htab->plt_type == PLT_NEW
6341 || h == NULL
6342 || !htab->elf.dynamic_sections_created
6343 || h->dynindx == -1)
6344 {
6345 tsec = htab->glink;
6346 toff = ent->glink_offset;
6347 }
6348 else
6349 {
ce558b89 6350 tsec = htab->elf.splt;
5446cbdf
AM
6351 toff = ent->plt.offset;
6352 }
de972ffa
AM
6353 }
6354 }
de972ffa 6355
5446cbdf
AM
6356 /* If the branch and target are in the same section, you have
6357 no hope of adding stubs. We'll error out later should the
6358 branch overflow. */
6359 if (tsec == isec)
6360 continue;
25dbc73a 6361
49199304
AM
6362 /* toff is used for the symbol index when the symbol is
6363 undefined and we're doing a relocatable link, so we can't
6364 support addends. It would be possible to do so by
6365 putting the addend in one_branch_fixup but addends on
6366 branches are rare so it hardly seems worth supporting. */
6367 if (bfd_link_relocatable (link_info)
6368 && tsec == bfd_und_section_ptr
6369 && r_type != R_PPC_PLTREL24
6370 && irel->r_addend != 0)
6371 continue;
6372
5446cbdf
AM
6373 /* There probably isn't any reason to handle symbols in
6374 SEC_MERGE sections; SEC_MERGE doesn't seem a likely
6375 attribute for a code section, and we are only looking at
6376 branches. However, implement it correctly here as a
6377 reference for other target relax_section functions. */
6378 if (0 && tsec->sec_info_type == SEC_INFO_TYPE_MERGE)
6379 {
6380 /* At this stage in linking, no SEC_MERGE symbol has been
6381 adjusted, so all references to such symbols need to be
6382 passed through _bfd_merged_section_offset. (Later, in
6383 relocate_section, all SEC_MERGE symbols *except* for
6384 section symbols have been adjusted.)
6385
6386 gas may reduce relocations against symbols in SEC_MERGE
6387 sections to a relocation against the section symbol when
6388 the original addend was zero. When the reloc is against
6389 a section symbol we should include the addend in the
6390 offset passed to _bfd_merged_section_offset, since the
6391 location of interest is the original symbol. On the
6392 other hand, an access to "sym+addend" where "sym" is not
6393 a section symbol should not include the addend; Such an
6394 access is presumed to be an offset from "sym"; The
6395 location of interest is just "sym". */
49199304
AM
6396 if (sym_type == STT_SECTION
6397 && r_type != R_PPC_PLTREL24)
5446cbdf
AM
6398 toff += irel->r_addend;
6399
6400 toff
6401 = _bfd_merged_section_offset (abfd, &tsec,
6402 elf_section_data (tsec)->sec_info,
6403 toff);
6404
49199304
AM
6405 if (sym_type != STT_SECTION
6406 && r_type != R_PPC_PLTREL24)
5446cbdf
AM
6407 toff += irel->r_addend;
6408 }
6409 /* PLTREL24 addends are special. */
6410 else if (r_type != R_PPC_PLTREL24)
25dbc73a 6411 toff += irel->r_addend;
7619e7c7 6412
5446cbdf 6413 /* Attempted -shared link of non-pic code loses. */
0e1862bb 6414 if ((!bfd_link_relocatable (link_info)
5446cbdf
AM
6415 && tsec == bfd_und_section_ptr)
6416 || tsec->output_section == NULL
6417 || (tsec->owner != NULL
6418 && (tsec->owner->flags & BFD_PLUGIN) != 0))
6419 continue;
7619e7c7 6420
5446cbdf 6421 roff = irel->r_offset;
7de713b9 6422
49199304
AM
6423 /* Avoid creating a lot of unnecessary fixups when
6424 relocatable if the output section size is such that a
6425 fixup can be created at final link.
6426 The max_branch_offset adjustment allows for some number
6427 of other fixups being needed at final link. */
6428 if (bfd_link_relocatable (link_info)
6429 && (isec->output_section->rawsize - (isec->output_offset + roff)
6430 < max_branch_offset - (max_branch_offset >> 4)))
6431 continue;
6432
5446cbdf
AM
6433 /* If the branch is in range, no need to do anything. */
6434 if (tsec != bfd_und_section_ptr
0e1862bb 6435 && (!bfd_link_relocatable (link_info)
5446cbdf
AM
6436 /* A relocatable link may have sections moved during
6437 final link, so do not presume they remain in range. */
6438 || tsec->output_section == isec->output_section))
6439 {
6440 bfd_vma symaddr, reladdr;
7619e7c7 6441
5446cbdf
AM
6442 symaddr = tsec->output_section->vma + tsec->output_offset + toff;
6443 reladdr = isec->output_section->vma + isec->output_offset + roff;
6444 if (symaddr - reladdr + max_branch_offset
6445 < 2 * max_branch_offset)
6446 continue;
6447 }
01017ef8 6448
5446cbdf 6449 /* Look for an existing fixup to this address. */
d3e454b9 6450 for (f = branch_fixups; f ; f = f->next)
5446cbdf
AM
6451 if (f->tsec == tsec && f->toff == toff)
6452 break;
252b5132 6453
5446cbdf
AM
6454 if (f == NULL)
6455 {
6456 size_t size;
6457 unsigned long stub_rtype;
25dbc73a 6458
5446cbdf
AM
6459 val = trampoff - roff;
6460 if (val >= max_branch_offset)
6461 /* Oh dear, we can't reach a trampoline. Don't try to add
6462 one. We'll report an error later. */
6463 continue;
252b5132 6464
0e1862bb 6465 if (bfd_link_pic (link_info))
5446cbdf
AM
6466 {
6467 size = 4 * ARRAY_SIZE (shared_stub_entry);
6468 insn_offset = 12;
6469 }
6470 else
6471 {
6472 size = 4 * ARRAY_SIZE (stub_entry);
6473 insn_offset = 0;
6474 }
6475 stub_rtype = R_PPC_RELAX;
ce558b89 6476 if (tsec == htab->elf.splt
5446cbdf
AM
6477 || tsec == htab->glink)
6478 {
6479 stub_rtype = R_PPC_RELAX_PLT;
6480 if (r_type == R_PPC_PLTREL24)
6481 stub_rtype = R_PPC_RELAX_PLTREL24;
6482 }
252b5132 6483
5446cbdf
AM
6484 /* Hijack the old relocation. Since we need two
6485 relocations for this use a "composite" reloc. */
6486 irel->r_info = ELF32_R_INFO (ELF32_R_SYM (irel->r_info),
6487 stub_rtype);
6488 irel->r_offset = trampoff + insn_offset;
6489 if (r_type == R_PPC_PLTREL24
6490 && stub_rtype != R_PPC_RELAX_PLTREL24)
6491 irel->r_addend = 0;
6492
6493 /* Record the fixup so we don't do it again this section. */
6494 f = bfd_malloc (sizeof (*f));
d3e454b9 6495 f->next = branch_fixups;
5446cbdf
AM
6496 f->tsec = tsec;
6497 f->toff = toff;
6498 f->trampoff = trampoff;
d3e454b9 6499 branch_fixups = f;
5446cbdf
AM
6500
6501 trampoff += size;
6502 changes++;
25dbc73a
AM
6503 }
6504 else
6505 {
5446cbdf
AM
6506 val = f->trampoff - roff;
6507 if (val >= max_branch_offset)
6508 continue;
252b5132 6509
5446cbdf
AM
6510 /* Nop out the reloc, since we're finalizing things here. */
6511 irel->r_info = ELF32_R_INFO (0, R_PPC_NONE);
6512 }
252b5132 6513
5446cbdf
AM
6514 /* Get the section contents. */
6515 if (contents == NULL)
25dbc73a 6516 {
5446cbdf
AM
6517 /* Get cached copy if it exists. */
6518 if (elf_section_data (isec)->this_hdr.contents != NULL)
6519 contents = elf_section_data (isec)->this_hdr.contents;
25dbc73a 6520 /* Go get them off disk. */
5446cbdf 6521 else if (!bfd_malloc_and_get_section (abfd, isec, &contents))
25dbc73a
AM
6522 goto error_return;
6523 }
252b5132 6524
5446cbdf
AM
6525 /* Fix up the existing branch to hit the trampoline. */
6526 hit_addr = contents + roff;
6527 switch (r_type)
6528 {
6529 case R_PPC_REL24:
6530 case R_PPC_LOCAL24PC:
6531 case R_PPC_PLTREL24:
6532 t0 = bfd_get_32 (abfd, hit_addr);
6533 t0 &= ~0x3fffffc;
6534 t0 |= val & 0x3fffffc;
6535 bfd_put_32 (abfd, t0, hit_addr);
6536 break;
252b5132 6537
5446cbdf
AM
6538 case R_PPC_REL14:
6539 case R_PPC_REL14_BRTAKEN:
6540 case R_PPC_REL14_BRNTAKEN:
6541 t0 = bfd_get_32 (abfd, hit_addr);
6542 t0 &= ~0xfffc;
6543 t0 |= val & 0xfffc;
6544 bfd_put_32 (abfd, t0, hit_addr);
6545 break;
6546 }
25dbc73a 6547 }
252b5132 6548
d3e454b9 6549 while (branch_fixups != NULL)
25dbc73a 6550 {
d3e454b9
AM
6551 struct one_branch_fixup *f = branch_fixups;
6552 branch_fixups = branch_fixups->next;
25dbc73a
AM
6553 free (f);
6554 }
5446cbdf 6555 }
252b5132 6556
5446cbdf
AM
6557 workaround_change = FALSE;
6558 newsize = trampoff;
795bc6b3 6559 if (htab->params->ppc476_workaround
0e1862bb 6560 && (!bfd_link_relocatable (link_info)
795bc6b3 6561 || isec->output_section->alignment_power >= htab->params->pagesize_p2))
5446cbdf
AM
6562 {
6563 bfd_vma addr, end_addr;
6564 unsigned int crossings;
795bc6b3 6565 bfd_vma pagesize = (bfd_vma) 1 << htab->params->pagesize_p2;
5446cbdf
AM
6566
6567 addr = isec->output_section->vma + isec->output_offset;
6128f9cf 6568 end_addr = addr + trampoff;
5446cbdf 6569 addr &= -pagesize;
795bc6b3 6570 crossings = ((end_addr & -pagesize) - addr) >> htab->params->pagesize_p2;
5446cbdf
AM
6571 if (crossings != 0)
6572 {
6573 /* Keep space aligned, to ensure the patch code itself does
6574 not cross a page. Don't decrease size calculated on a
6575 previous pass as otherwise we might never settle on a layout. */
1e269e9b 6576 newsize = 15 - ((end_addr - 1) & 15);
5446cbdf
AM
6577 newsize += crossings * 16;
6578 if (relax_info->workaround_size < newsize)
6579 {
6580 relax_info->workaround_size = newsize;
6581 workaround_change = TRUE;
5446cbdf
AM
6582 }
6583 /* Ensure relocate_section is called. */
6584 isec->flags |= SEC_RELOC;
6585 }
6586 newsize = trampoff + relax_info->workaround_size;
6587 }
6588
d3e454b9
AM
6589 if (htab->params->pic_fixup > 0)
6590 {
6591 picfixup_size -= relax_info->picfixup_size;
6592 if (picfixup_size != 0)
6593 relax_info->picfixup_size += picfixup_size;
6594 newsize += relax_info->picfixup_size;
6595 }
6596
6597 if (changes != 0 || picfixup_size != 0 || workaround_change)
5446cbdf
AM
6598 isec->size = newsize;
6599
25dbc73a
AM
6600 if (isymbuf != NULL
6601 && symtab_hdr->contents != (unsigned char *) isymbuf)
252b5132 6602 {
25dbc73a
AM
6603 if (! link_info->keep_memory)
6604 free (isymbuf);
252b5132 6605 else
25dbc73a
AM
6606 {
6607 /* Cache the symbols for elf_link_input_bfd. */
6608 symtab_hdr->contents = (unsigned char *) isymbuf;
6609 }
252b5132
RH
6610 }
6611
25dbc73a
AM
6612 if (contents != NULL
6613 && elf_section_data (isec)->this_hdr.contents != contents)
6614 {
53291d1f 6615 if (!changes && !link_info->keep_memory)
25dbc73a
AM
6616 free (contents);
6617 else
6618 {
6619 /* Cache the section contents for elf_link_input_bfd. */
6620 elf_section_data (isec)->this_hdr.contents = contents;
6621 }
6622 }
252b5132 6623
d3e454b9 6624 changes += picfixup_size;
9bc4e62b 6625 if (changes != 0)
25dbc73a 6626 {
9bc4e62b
NS
6627 /* Append sufficient NOP relocs so we can write out relocation
6628 information for the trampolines. */
d4730f92 6629 Elf_Internal_Shdr *rel_hdr;
9bc4e62b
NS
6630 Elf_Internal_Rela *new_relocs = bfd_malloc ((changes + isec->reloc_count)
6631 * sizeof (*new_relocs));
6632 unsigned ix;
5b914448 6633
9bc4e62b
NS
6634 if (!new_relocs)
6635 goto error_return;
6636 memcpy (new_relocs, internal_relocs,
6637 isec->reloc_count * sizeof (*new_relocs));
6638 for (ix = changes; ix--;)
6639 {
6640 irel = new_relocs + ix + isec->reloc_count;
6641
6642 irel->r_info = ELF32_R_INFO (0, R_PPC_NONE);
6643 }
6644 if (internal_relocs != elf_section_data (isec)->relocs)
25dbc73a 6645 free (internal_relocs);
9bc4e62b
NS
6646 elf_section_data (isec)->relocs = new_relocs;
6647 isec->reloc_count += changes;
d4730f92
BS
6648 rel_hdr = _bfd_elf_single_rel_hdr (isec);
6649 rel_hdr->sh_size += changes * rel_hdr->sh_entsize;
25dbc73a 6650 }
5446cbdf
AM
6651 else if (internal_relocs != NULL
6652 && elf_section_data (isec)->relocs != internal_relocs)
9bc4e62b 6653 free (internal_relocs);
252b5132 6654
5446cbdf 6655 *again = changes != 0 || workaround_change;
b34976b6 6656 return TRUE;
25dbc73a
AM
6657
6658 error_return:
d3e454b9 6659 while (branch_fixups != NULL)
5446cbdf 6660 {
d3e454b9
AM
6661 struct one_branch_fixup *f = branch_fixups;
6662 branch_fixups = branch_fixups->next;
5446cbdf
AM
6663 free (f);
6664 }
25dbc73a
AM
6665 if (isymbuf != NULL && (unsigned char *) isymbuf != symtab_hdr->contents)
6666 free (isymbuf);
6667 if (contents != NULL
6668 && elf_section_data (isec)->this_hdr.contents != contents)
6669 free (contents);
6670 if (internal_relocs != NULL
6671 && elf_section_data (isec)->relocs != internal_relocs)
6672 free (internal_relocs);
6673 return FALSE;
252b5132 6674}
252b5132 6675\f
8a696751
AM
6676/* What to do when ld finds relocations against symbols defined in
6677 discarded sections. */
6678
6679static unsigned int
6680ppc_elf_action_discarded (asection *sec)
6681{
6682 if (strcmp (".fixup", sec->name) == 0)
6683 return 0;
6684
6685 if (strcmp (".got2", sec->name) == 0)
6686 return 0;
6687
6688 return _bfd_elf_default_action_discarded (sec);
6689}
c9a2f333 6690\f
25dbc73a 6691/* Fill in the address for a pointer generated in a linker section. */
252b5132 6692
25dbc73a 6693static bfd_vma
76750a2f 6694elf_finish_pointer_linker_section (bfd *input_bfd,
25dbc73a
AM
6695 elf_linker_section_t *lsect,
6696 struct elf_link_hash_entry *h,
6697 bfd_vma relocation,
2bb04cf2 6698 const Elf_Internal_Rela *rel)
25dbc73a
AM
6699{
6700 elf_linker_section_pointers_t *linker_section_ptr;
252b5132 6701
25dbc73a 6702 BFD_ASSERT (lsect != NULL);
252b5132 6703
25dbc73a 6704 if (h != NULL)
252b5132 6705 {
25dbc73a
AM
6706 /* Handle global symbol. */
6707 struct ppc_elf_link_hash_entry *eh;
252b5132 6708
25dbc73a 6709 eh = (struct ppc_elf_link_hash_entry *) h;
76750a2f
AM
6710 BFD_ASSERT (eh->elf.def_regular);
6711 linker_section_ptr = eh->linker_section_pointer;
25dbc73a
AM
6712 }
6713 else
6714 {
6715 /* Handle local symbol. */
6716 unsigned long r_symndx = ELF32_R_SYM (rel->r_info);
76750a2f 6717
0c8d6e5c 6718 BFD_ASSERT (is_ppc_elf (input_bfd));
25dbc73a 6719 BFD_ASSERT (elf_local_ptr_offsets (input_bfd) != NULL);
76750a2f
AM
6720 linker_section_ptr = elf_local_ptr_offsets (input_bfd)[r_symndx];
6721 }
252b5132 6722
76750a2f
AM
6723 linker_section_ptr = elf_find_pointer_linker_section (linker_section_ptr,
6724 rel->r_addend,
6725 lsect);
6726 BFD_ASSERT (linker_section_ptr != NULL);
25dbc73a 6727
76750a2f
AM
6728 /* Offset will always be a multiple of four, so use the bottom bit
6729 as a "written" flag. */
6730 if ((linker_section_ptr->offset & 1) == 0)
6731 {
6732 bfd_put_32 (lsect->section->owner,
6733 relocation + linker_section_ptr->addend,
6734 lsect->section->contents + linker_section_ptr->offset);
6735 linker_section_ptr->offset += 1;
252b5132
RH
6736 }
6737
bd6c6e2b
AM
6738 relocation = (lsect->section->output_section->vma
6739 + lsect->section->output_offset
76750a2f 6740 + linker_section_ptr->offset - 1
bd6c6e2b 6741 - SYM_VAL (lsect->sym));
252b5132 6742
25dbc73a
AM
6743#ifdef DEBUG
6744 fprintf (stderr,
6745 "Finish pointer in linker section %s, offset = %ld (0x%lx)\n",
6746 lsect->name, (long) relocation, (long) relocation);
6747#endif
252b5132 6748
bd6c6e2b 6749 return relocation;
252b5132 6750}
25dbc73a 6751
e054468f
AM
6752#define PPC_LO(v) ((v) & 0xffff)
6753#define PPC_HI(v) (((v) >> 16) & 0xffff)
6754#define PPC_HA(v) PPC_HI ((v) + 0x8000)
6755
6756static void
9e390558
AM
6757write_glink_stub (struct elf_link_hash_entry *h, struct plt_entry *ent,
6758 asection *plt_sec, unsigned char *p,
e054468f
AM
6759 struct bfd_link_info *info)
6760{
6761 struct ppc_elf_link_hash_table *htab = ppc_elf_hash_table (info);
6762 bfd *output_bfd = info->output_bfd;
6763 bfd_vma plt;
9e390558
AM
6764 unsigned char *end = p + GLINK_ENTRY_SIZE (htab, h);
6765
6766 if (h != NULL
6767 && h == htab->tls_get_addr
6768 && !htab->params->no_tls_get_addr_opt)
6769 {
6770 bfd_put_32 (output_bfd, LWZ_11_3, p);
6771 p += 4;
6772 bfd_put_32 (output_bfd, LWZ_12_3 + 4, p);
6773 p += 4;
6774 bfd_put_32 (output_bfd, MR_0_3, p);
6775 p += 4;
6776 bfd_put_32 (output_bfd, CMPWI_11_0, p);
6777 p += 4;
6778 bfd_put_32 (output_bfd, ADD_3_12_2, p);
6779 p += 4;
6780 bfd_put_32 (output_bfd, BEQLR, p);
6781 p += 4;
6782 bfd_put_32 (output_bfd, MR_3_0, p);
6783 p += 4;
6784 bfd_put_32 (output_bfd, NOP, p);
6785 p += 4;
6786 }
e054468f
AM
6787
6788 plt = ((ent->plt.offset & ~1)
6789 + plt_sec->output_section->vma
6790 + plt_sec->output_offset);
e054468f 6791
0e1862bb 6792 if (bfd_link_pic (info))
e054468f
AM
6793 {
6794 bfd_vma got = 0;
6795
6796 if (ent->addend >= 32768)
6797 got = (ent->addend
6798 + ent->sec->output_section->vma
6799 + ent->sec->output_offset);
6800 else if (htab->elf.hgot != NULL)
6801 got = SYM_VAL (htab->elf.hgot);
6802
6803 plt -= got;
6804
6805 if (plt + 0x8000 < 0x10000)
9e390558 6806 bfd_put_32 (output_bfd, LWZ_11_30 + PPC_LO (plt), p);
e054468f
AM
6807 else
6808 {
6809 bfd_put_32 (output_bfd, ADDIS_11_30 + PPC_HA (plt), p);
6810 p += 4;
6811 bfd_put_32 (output_bfd, LWZ_11_11 + PPC_LO (plt), p);
e054468f
AM
6812 }
6813 }
6814 else
6815 {
6816 bfd_put_32 (output_bfd, LIS_11 + PPC_HA (plt), p);
6817 p += 4;
6818 bfd_put_32 (output_bfd, LWZ_11_11 + PPC_LO (plt), p);
9e390558
AM
6819 }
6820 p += 4;
6821 bfd_put_32 (output_bfd, MTCTR_11, p);
6822 p += 4;
407aa07c
AM
6823 bfd_put_32 (output_bfd, BCTR, p);
6824 p += 4;
9e390558
AM
6825 while (p < end)
6826 {
6827 bfd_put_32 (output_bfd, htab->params->ppc476_workaround ? BA : NOP, p);
e054468f
AM
6828 p += 4;
6829 }
6830}
6831
bd6c6e2b
AM
6832/* Return true if symbol is defined statically. */
6833
6834static bfd_boolean
6835is_static_defined (struct elf_link_hash_entry *h)
6836{
6837 return ((h->root.type == bfd_link_hash_defined
6838 || h->root.type == bfd_link_hash_defweak)
6839 && h->root.u.def.section != NULL
6840 && h->root.u.def.section->output_section != NULL);
6841}
6842
2d0f3896
AM
6843/* If INSN is an opcode that may be used with an @tls operand, return
6844 the transformed insn for TLS optimisation, otherwise return 0. If
6845 REG is non-zero only match an insn with RB or RA equal to REG. */
6846
6847unsigned int
6848_bfd_elf_ppc_at_tls_transform (unsigned int insn, unsigned int reg)
6849{
6850 unsigned int rtra;
6851
2365f8d7 6852 if ((insn & (0x3fu << 26)) != 31 << 26)
2d0f3896
AM
6853 return 0;
6854
6855 if (reg == 0 || ((insn >> 11) & 0x1f) == reg)
6856 rtra = insn & ((1 << 26) - (1 << 16));
6857 else if (((insn >> 16) & 0x1f) == reg)
6858 rtra = (insn & (0x1f << 21)) | ((insn & (0x1f << 11)) << 5);
6859 else
6860 return 0;
6861
6862 if ((insn & (0x3ff << 1)) == 266 << 1)
6863 /* add -> addi. */
6864 insn = 14 << 26;
6865 else if ((insn & (0x1f << 1)) == 23 << 1
6866 && ((insn & (0x1f << 6)) < 14 << 6
6867 || ((insn & (0x1f << 6)) >= 16 << 6
6868 && (insn & (0x1f << 6)) < 24 << 6)))
6869 /* load and store indexed -> dform. */
2365f8d7 6870 insn = (32u | ((insn >> 6) & 0x1f)) << 26;
2d0f3896
AM
6871 else if ((insn & (((0x1a << 5) | 0x1f) << 1)) == 21 << 1)
6872 /* ldx, ldux, stdx, stdux -> ld, ldu, std, stdu. */
2365f8d7 6873 insn = ((58u | ((insn >> 6) & 4)) << 26) | ((insn >> 6) & 1);
2d0f3896
AM
6874 else if ((insn & (((0x1f << 5) | 0x1f) << 1)) == 341 << 1)
6875 /* lwax -> lwa. */
2365f8d7 6876 insn = (58u << 26) | 2;
2d0f3896
AM
6877 else
6878 return 0;
6879 insn |= rtra;
6880 return insn;
6881}
6882
766bc656
AM
6883/* If INSN is an opcode that may be used with an @tprel operand, return
6884 the transformed insn for an undefined weak symbol, ie. with the
6885 thread pointer REG operand removed. Otherwise return 0. */
6886
6887unsigned int
6888_bfd_elf_ppc_at_tprel_transform (unsigned int insn, unsigned int reg)
6889{
6890 if ((insn & (0x1f << 16)) == reg << 16
2365f8d7
AM
6891 && ((insn & (0x3fu << 26)) == 14u << 26 /* addi */
6892 || (insn & (0x3fu << 26)) == 15u << 26 /* addis */
6893 || (insn & (0x3fu << 26)) == 32u << 26 /* lwz */
6894 || (insn & (0x3fu << 26)) == 34u << 26 /* lbz */
6895 || (insn & (0x3fu << 26)) == 36u << 26 /* stw */
6896 || (insn & (0x3fu << 26)) == 38u << 26 /* stb */
6897 || (insn & (0x3fu << 26)) == 40u << 26 /* lhz */
6898 || (insn & (0x3fu << 26)) == 42u << 26 /* lha */
6899 || (insn & (0x3fu << 26)) == 44u << 26 /* sth */
6900 || (insn & (0x3fu << 26)) == 46u << 26 /* lmw */
6901 || (insn & (0x3fu << 26)) == 47u << 26 /* stmw */
6902 || (insn & (0x3fu << 26)) == 48u << 26 /* lfs */
6903 || (insn & (0x3fu << 26)) == 50u << 26 /* lfd */
6904 || (insn & (0x3fu << 26)) == 52u << 26 /* stfs */
6905 || (insn & (0x3fu << 26)) == 54u << 26 /* stfd */
6906 || ((insn & (0x3fu << 26)) == 58u << 26 /* lwa,ld,lmd */
766bc656 6907 && (insn & 3) != 1)
2365f8d7 6908 || ((insn & (0x3fu << 26)) == 62u << 26 /* std, stmd */
766bc656
AM
6909 && ((insn & 3) == 0 || (insn & 3) == 3))))
6910 {
6911 insn &= ~(0x1f << 16);
6912 }
6913 else if ((insn & (0x1f << 21)) == reg << 21
2365f8d7
AM
6914 && ((insn & (0x3eu << 26)) == 24u << 26 /* ori, oris */
6915 || (insn & (0x3eu << 26)) == 26u << 26 /* xori,xoris */
6916 || (insn & (0x3eu << 26)) == 28u << 26 /* andi,andis */))
766bc656
AM
6917 {
6918 insn &= ~(0x1f << 21);
6919 insn |= (insn & (0x1f << 16)) << 5;
2365f8d7 6920 if ((insn & (0x3eu << 26)) == 26u << 26 /* xori,xoris */)
766bc656
AM
6921 insn -= 2 >> 26; /* convert to ori,oris */
6922 }
6923 else
6924 insn = 0;
6925 return insn;
6926}
6927
1fe532cf
AM
6928static bfd_boolean
6929is_insn_ds_form (unsigned int insn)
6930{
2365f8d7
AM
6931 return ((insn & (0x3fu << 26)) == 58u << 26 /* ld,ldu,lwa */
6932 || (insn & (0x3fu << 26)) == 62u << 26 /* std,stdu,stq */
6933 || (insn & (0x3fu << 26)) == 57u << 26 /* lfdp */
6934 || (insn & (0x3fu << 26)) == 61u << 26 /* stfdp */);
1fe532cf
AM
6935}
6936
6937static bfd_boolean
6938is_insn_dq_form (unsigned int insn)
6939{
2365f8d7
AM
6940 return ((insn & (0x3fu << 26)) == 56u << 26 /* lq */
6941 || ((insn & (0x3fu << 26)) == (61u << 26) /* lxv, stxv */
a680de9a 6942 && (insn & 3) == 1));
1fe532cf
AM
6943}
6944
252b5132
RH
6945/* The RELOCATE_SECTION function is called by the ELF backend linker
6946 to handle the relocations for a section.
6947
6948 The relocs are always passed as Rela structures; if the section
6949 actually uses Rel structures, the r_addend field will always be
6950 zero.
6951
6952 This function is responsible for adjust the section contents as
6953 necessary, and (if using Rela relocs and generating a
1049f94e 6954 relocatable output file) adjusting the reloc addend as
252b5132
RH
6955 necessary.
6956
6957 This function does not have to worry about setting the reloc
6958 address or the reloc symbol index.
6959
6960 LOCAL_SYMS is a pointer to the swapped in local symbols.
6961
6962 LOCAL_SECTIONS is an array giving the section in the input file
6963 corresponding to the st_shndx field of each local symbol.
6964
6965 The global hash table entry for the global symbols can be found
6966 via elf_sym_hashes (input_bfd).
6967
1049f94e 6968 When generating relocatable output, this function must handle
252b5132
RH
6969 STB_LOCAL/STT_SECTION symbols specially. The output symbol is
6970 going to be the section symbol corresponding to the output
6971 section, which means that the addend must be adjusted
6972 accordingly. */
6973
b34976b6 6974static bfd_boolean
55fd94b0
AM
6975ppc_elf_relocate_section (bfd *output_bfd,
6976 struct bfd_link_info *info,
6977 bfd *input_bfd,
6978 asection *input_section,
6979 bfd_byte *contents,
6980 Elf_Internal_Rela *relocs,
6981 Elf_Internal_Sym *local_syms,
6982 asection **local_sections)
252b5132 6983{
7619e7c7
AM
6984 Elf_Internal_Shdr *symtab_hdr;
6985 struct elf_link_hash_entry **sym_hashes;
6986 struct ppc_elf_link_hash_table *htab;
6987 Elf_Internal_Rela *rel;
c316a17c 6988 Elf_Internal_Rela *wrel;
7619e7c7
AM
6989 Elf_Internal_Rela *relend;
6990 Elf_Internal_Rela outrel;
f95f8542 6991 asection *got2;
252b5132 6992 bfd_vma *local_got_offsets;
b34976b6 6993 bfd_boolean ret = TRUE;
95f0d0d2 6994 bfd_vma d_offset = (bfd_big_endian (input_bfd) ? 2 : 0);
3348747a 6995 bfd_boolean is_vxworks_tls;
d3e454b9
AM
6996 unsigned int picfixup_size = 0;
6997 struct ppc_elf_relax_info *relax_info = NULL;
b34976b6 6998
252b5132 6999#ifdef DEBUG
871b3ab2 7000 _bfd_error_handler ("ppc_elf_relocate_section called for %pB section %pA, "
d003868e
AM
7001 "%ld relocations%s",
7002 input_bfd, input_section,
7003 (long) input_section->reloc_count,
0e1862bb 7004 (bfd_link_relocatable (info)) ? " (relocatable)" : "");
252b5132
RH
7005#endif
7006
7af5d5c4
AM
7007 if (!is_ppc_elf (input_bfd))
7008 {
7009 bfd_set_error (bfd_error_wrong_format);
7010 return FALSE;
7011 }
7012
a6aa5195
AM
7013 got2 = bfd_get_section_by_name (input_bfd, ".got2");
7014
e47cd125 7015 /* Initialize howto table if not already done. */
8da6118f 7016 if (!ppc_elf_howto_table[R_PPC_ADDR32])
252b5132
RH
7017 ppc_elf_howto_init ();
7018
7619e7c7 7019 htab = ppc_elf_hash_table (info);
252b5132 7020 local_got_offsets = elf_local_got_offsets (input_bfd);
0ffa91dd 7021 symtab_hdr = &elf_symtab_hdr (input_bfd);
7619e7c7 7022 sym_hashes = elf_sym_hashes (input_bfd);
3348747a
NS
7023 /* We have to handle relocations in vxworks .tls_vars sections
7024 specially, because the dynamic loader is 'weird'. */
0e1862bb 7025 is_vxworks_tls = (htab->is_vxworks && bfd_link_pic (info)
3348747a
NS
7026 && !strcmp (input_section->output_section->name,
7027 ".tls_vars"));
d3e454b9
AM
7028 if (input_section->sec_info_type == SEC_INFO_TYPE_TARGET)
7029 relax_info = elf_section_data (input_section)->sec_info;
c316a17c 7030 rel = wrel = relocs;
7619e7c7 7031 relend = relocs + input_section->reloc_count;
c316a17c 7032 for (; rel < relend; wrel++, rel++)
252b5132 7033 {
7619e7c7
AM
7034 enum elf_ppc_reloc_type r_type;
7035 bfd_vma addend;
7036 bfd_reloc_status_type r;
7037 Elf_Internal_Sym *sym;
7038 asection *sec;
7039 struct elf_link_hash_entry *h;
7040 const char *sym_name;
252b5132
RH
7041 reloc_howto_type *howto;
7042 unsigned long r_symndx;
7043 bfd_vma relocation;
91d6fa6a 7044 bfd_vma branch_bit, from;
23cedd1d 7045 bfd_boolean unresolved_reloc, save_unresolved_reloc;
7619e7c7
AM
7046 bfd_boolean warned;
7047 unsigned int tls_type, tls_mask, tls_gd;
08be3224 7048 struct plt_entry **ifunc, **plt_list;
86c95733 7049 struct reloc_howto_struct alt_howto;
7619e7c7 7050
c316a17c 7051 again:
55fd94b0
AM
7052 r_type = ELF32_R_TYPE (rel->r_info);
7053 sym = NULL;
7054 sec = NULL;
7055 h = NULL;
7619e7c7
AM
7056 unresolved_reloc = FALSE;
7057 warned = FALSE;
252b5132 7058 r_symndx = ELF32_R_SYM (rel->r_info);
560e09e9 7059
252b5132
RH
7060 if (r_symndx < symtab_hdr->sh_info)
7061 {
7062 sym = local_syms + r_symndx;
7063 sec = local_sections[r_symndx];
26c61ae5 7064 sym_name = bfd_elf_sym_name (input_bfd, symtab_hdr, sym, sec);
252b5132 7065
8517fae7 7066 relocation = _bfd_elf_rela_local_sym (output_bfd, sym, &sec, rel);
252b5132
RH
7067 }
7068 else
7069 {
62d887d4
L
7070 bfd_boolean ignored;
7071
b2a8e766
AM
7072 RELOC_FOR_GLOBAL_SYMBOL (info, input_bfd, input_section, rel,
7073 r_symndx, symtab_hdr, sym_hashes,
7074 h, sec, relocation,
62d887d4 7075 unresolved_reloc, warned, ignored);
9abc968f 7076
252b5132 7077 sym_name = h->root.root.string;
7619e7c7
AM
7078 }
7079
dbaa2011 7080 if (sec != NULL && discarded_section (sec))
ab96bf03
AM
7081 {
7082 /* For relocs against symbols from removed linkonce sections,
7083 or sections discarded by a linker script, we just want the
7084 section contents zeroed. Avoid any special processing. */
7085 howto = NULL;
7086 if (r_type < R_PPC_max)
7087 howto = ppc_elf_howto_table[r_type];
c316a17c
AM
7088
7089 _bfd_clear_contents (howto, input_bfd, input_section,
0930cb30 7090 contents, rel->r_offset);
c316a17c
AM
7091 wrel->r_offset = rel->r_offset;
7092 wrel->r_info = 0;
7093 wrel->r_addend = 0;
7094
7095 /* For ld -r, remove relocations in debug sections against
dcd2b8a0 7096 symbols defined in discarded sections. Not done for
c316a17c
AM
7097 non-debug to preserve relocs in .eh_frame which the
7098 eh_frame editing code expects to be present. */
7099 if (bfd_link_relocatable (info)
7100 && (input_section->flags & SEC_DEBUGGING))
7101 wrel--;
7102
7103 continue;
ab96bf03
AM
7104 }
7105
0e1862bb 7106 if (bfd_link_relocatable (info))
ab96bf03
AM
7107 {
7108 if (got2 != NULL
7109 && r_type == R_PPC_PLTREL24
f75e0e33 7110 && rel->r_addend != 0)
ab96bf03
AM
7111 {
7112 /* R_PPC_PLTREL24 is rather special. If non-zero, the
7113 addend specifies the GOT pointer offset within .got2. */
7114 rel->r_addend += got2->output_offset;
7115 }
53291d1f
AM
7116 if (r_type != R_PPC_RELAX_PLT
7117 && r_type != R_PPC_RELAX_PLTREL24
7118 && r_type != R_PPC_RELAX)
c316a17c 7119 goto copy_reloc;
ab96bf03
AM
7120 }
7121
7619e7c7
AM
7122 /* TLS optimizations. Replace instruction sequences and relocs
7123 based on information we collected in tls_optimize. We edit
7124 RELOCS so that --emit-relocs will output something sensible
7125 for the final instruction stream. */
7126 tls_mask = 0;
7127 tls_gd = 0;
727fc41e
AM
7128 if (h != NULL)
7129 tls_mask = ((struct ppc_elf_link_hash_entry *) h)->tls_mask;
7130 else if (local_got_offsets != NULL)
7619e7c7 7131 {
e054468f 7132 struct plt_entry **local_plt;
727fc41e 7133 char *lgot_masks;
e054468f
AM
7134 local_plt
7135 = (struct plt_entry **) (local_got_offsets + symtab_hdr->sh_info);
7136 lgot_masks = (char *) (local_plt + symtab_hdr->sh_info);
727fc41e 7137 tls_mask = lgot_masks[r_symndx];
7619e7c7
AM
7138 }
7139
7140 /* Ensure reloc mapping code below stays sane. */
7141 if ((R_PPC_GOT_TLSLD16 & 3) != (R_PPC_GOT_TLSGD16 & 3)
7142 || (R_PPC_GOT_TLSLD16_LO & 3) != (R_PPC_GOT_TLSGD16_LO & 3)
7143 || (R_PPC_GOT_TLSLD16_HI & 3) != (R_PPC_GOT_TLSGD16_HI & 3)
7144 || (R_PPC_GOT_TLSLD16_HA & 3) != (R_PPC_GOT_TLSGD16_HA & 3)
7145 || (R_PPC_GOT_TLSLD16 & 3) != (R_PPC_GOT_TPREL16 & 3)
7146 || (R_PPC_GOT_TLSLD16_LO & 3) != (R_PPC_GOT_TPREL16_LO & 3)
7147 || (R_PPC_GOT_TLSLD16_HI & 3) != (R_PPC_GOT_TPREL16_HI & 3)
7148 || (R_PPC_GOT_TLSLD16_HA & 3) != (R_PPC_GOT_TPREL16_HA & 3))
7149 abort ();
7150 switch (r_type)
7151 {
7152 default:
7153 break;
7154
7155 case R_PPC_GOT_TPREL16:
7156 case R_PPC_GOT_TPREL16_LO:
e054468f 7157 if ((tls_mask & TLS_TLS) != 0
7619e7c7
AM
7158 && (tls_mask & TLS_TPREL) == 0)
7159 {
7160 bfd_vma insn;
91d6fa6a 7161
95f0d0d2 7162 insn = bfd_get_32 (input_bfd,
c316a17c 7163 contents + rel->r_offset - d_offset);
7619e7c7
AM
7164 insn &= 31 << 21;
7165 insn |= 0x3c020000; /* addis 0,2,0 */
95f0d0d2 7166 bfd_put_32 (input_bfd, insn,
c316a17c 7167 contents + rel->r_offset - d_offset);
7619e7c7
AM
7168 r_type = R_PPC_TPREL16_HA;
7169 rel->r_info = ELF32_R_INFO (r_symndx, r_type);
7170 }
7171 break;
7172
7173 case R_PPC_TLS:
e054468f 7174 if ((tls_mask & TLS_TLS) != 0
7619e7c7
AM
7175 && (tls_mask & TLS_TPREL) == 0)
7176 {
2d0f3896
AM
7177 bfd_vma insn;
7178
95f0d0d2 7179 insn = bfd_get_32 (input_bfd, contents + rel->r_offset);
2d0f3896
AM
7180 insn = _bfd_elf_ppc_at_tls_transform (insn, 2);
7181 if (insn == 0)
7619e7c7 7182 abort ();
95f0d0d2 7183 bfd_put_32 (input_bfd, insn, contents + rel->r_offset);
7619e7c7
AM
7184 r_type = R_PPC_TPREL16_LO;
7185 rel->r_info = ELF32_R_INFO (r_symndx, r_type);
4fe5ca5b 7186
7619e7c7 7187 /* Was PPC_TLS which sits on insn boundary, now
4fe5ca5b
GM
7188 PPC_TPREL16_LO which is at low-order half-word. */
7189 rel->r_offset += d_offset;
7619e7c7
AM
7190 }
7191 break;
7192
7193 case R_PPC_GOT_TLSGD16_HI:
7194 case R_PPC_GOT_TLSGD16_HA:
b00a0a86 7195 tls_gd = TLS_GDIE;
e054468f 7196 if ((tls_mask & TLS_TLS) != 0 && (tls_mask & TLS_GD) == 0)
7619e7c7
AM
7197 goto tls_gdld_hi;
7198 break;
7199
7200 case R_PPC_GOT_TLSLD16_HI:
7201 case R_PPC_GOT_TLSLD16_HA:
e054468f 7202 if ((tls_mask & TLS_TLS) != 0 && (tls_mask & TLS_LD) == 0)
7619e7c7
AM
7203 {
7204 tls_gdld_hi:
7205 if ((tls_mask & tls_gd) != 0)
7206 r_type = (((r_type - (R_PPC_GOT_TLSGD16 & 3)) & 3)
7207 + R_PPC_GOT_TPREL16);
7208 else
7209 {
4fe5ca5b 7210 rel->r_offset -= d_offset;
95f0d0d2 7211 bfd_put_32 (input_bfd, NOP, contents + rel->r_offset);
7619e7c7
AM
7212 r_type = R_PPC_NONE;
7213 }
7214 rel->r_info = ELF32_R_INFO (r_symndx, r_type);
7215 }
7216 break;
7217
7218 case R_PPC_GOT_TLSGD16:
7219 case R_PPC_GOT_TLSGD16_LO:
b00a0a86 7220 tls_gd = TLS_GDIE;
e054468f 7221 if ((tls_mask & TLS_TLS) != 0 && (tls_mask & TLS_GD) == 0)
b7fcf6f6 7222 goto tls_ldgd_opt;
7619e7c7
AM
7223 break;
7224
7225 case R_PPC_GOT_TLSLD16:
7226 case R_PPC_GOT_TLSLD16_LO:
e054468f 7227 if ((tls_mask & TLS_TLS) != 0 && (tls_mask & TLS_LD) == 0)
7619e7c7 7228 {
3a71aa26 7229 unsigned int insn1, insn2;
b7fcf6f6 7230 bfd_vma offset;
7619e7c7 7231
b7fcf6f6 7232 tls_ldgd_opt:
727fc41e
AM
7233 offset = (bfd_vma) -1;
7234 /* If not using the newer R_PPC_TLSGD/LD to mark
7235 __tls_get_addr calls, we must trust that the call
7236 stays with its arg setup insns, ie. that the next
7237 reloc is the __tls_get_addr call associated with
7238 the current reloc. Edit both insns. */
9737e8af 7239 if (input_section->nomark_tls_get_addr
727fc41e
AM
7240 && rel + 1 < relend
7241 && branch_reloc_hash_match (input_bfd, rel + 1,
7242 htab->tls_get_addr))
7243 offset = rel[1].r_offset;
b86ac8e3
AM
7244 /* We read the low GOT_TLS insn because we need to keep
7245 the destination reg. It may be something other than
7246 the usual r3, and moved to r3 before the call by
7247 intervening code. */
95f0d0d2 7248 insn1 = bfd_get_32 (input_bfd,
b86ac8e3 7249 contents + rel->r_offset - d_offset);
b7fcf6f6
AM
7250 if ((tls_mask & tls_gd) != 0)
7251 {
7252 /* IE */
b86ac8e3 7253 insn1 &= (0x1f << 21) | (0x1f << 16);
2365f8d7 7254 insn1 |= 32u << 26; /* lwz */
727fc41e
AM
7255 if (offset != (bfd_vma) -1)
7256 {
f58d5a2d 7257 rel[1].r_info = ELF32_R_INFO (STN_UNDEF, R_PPC_NONE);
727fc41e 7258 insn2 = 0x7c631214; /* add 3,3,2 */
95f0d0d2 7259 bfd_put_32 (input_bfd, insn2, contents + offset);
727fc41e 7260 }
b7fcf6f6
AM
7261 r_type = (((r_type - (R_PPC_GOT_TLSGD16 & 3)) & 3)
7262 + R_PPC_GOT_TPREL16);
7263 rel->r_info = ELF32_R_INFO (r_symndx, r_type);
7264 }
7265 else
7266 {
7267 /* LE */
b86ac8e3
AM
7268 insn1 &= 0x1f << 21;
7269 insn1 |= 0x3c020000; /* addis r,2,0 */
7619e7c7
AM
7270 if (tls_gd == 0)
7271 {
b7fcf6f6 7272 /* Was an LD reloc. */
1d483afe
AM
7273 for (r_symndx = 0;
7274 r_symndx < symtab_hdr->sh_info;
7275 r_symndx++)
7276 if (local_sections[r_symndx] == sec)
7277 break;
7278 if (r_symndx >= symtab_hdr->sh_info)
cf35638d 7279 r_symndx = STN_UNDEF;
b7fcf6f6 7280 rel->r_addend = htab->elf.tls_sec->vma + DTP_OFFSET;
cf35638d 7281 if (r_symndx != STN_UNDEF)
1d483afe
AM
7282 rel->r_addend -= (local_syms[r_symndx].st_value
7283 + sec->output_offset
7284 + sec->output_section->vma);
7619e7c7 7285 }
b7fcf6f6
AM
7286 r_type = R_PPC_TPREL16_HA;
7287 rel->r_info = ELF32_R_INFO (r_symndx, r_type);
727fc41e
AM
7288 if (offset != (bfd_vma) -1)
7289 {
7290 rel[1].r_info = ELF32_R_INFO (r_symndx, R_PPC_TPREL16_LO);
7291 rel[1].r_offset = offset + d_offset;
7292 rel[1].r_addend = rel->r_addend;
7293 insn2 = 0x38630000; /* addi 3,3,0 */
95f0d0d2 7294 bfd_put_32 (input_bfd, insn2, contents + offset);
727fc41e 7295 }
b7fcf6f6 7296 }
95f0d0d2 7297 bfd_put_32 (input_bfd, insn1,
b7fcf6f6 7298 contents + rel->r_offset - d_offset);
b7fcf6f6
AM
7299 if (tls_gd == 0)
7300 {
7301 /* We changed the symbol on an LD reloc. Start over
7302 in order to get h, sym, sec etc. right. */
c316a17c 7303 goto again;
7619e7c7 7304 }
252b5132 7305 }
7619e7c7 7306 break;
727fc41e
AM
7307
7308 case R_PPC_TLSGD:
675e2809
AM
7309 if ((tls_mask & TLS_TLS) != 0 && (tls_mask & TLS_GD) == 0
7310 && rel + 1 < relend)
727fc41e
AM
7311 {
7312 unsigned int insn2;
7313 bfd_vma offset = rel->r_offset;
7314
23cedd1d
AM
7315 if (is_plt_seq_reloc (ELF32_R_TYPE (rel[1].r_info)))
7316 {
7317 bfd_put_32 (input_bfd, NOP, contents + offset);
7318 rel[1].r_info = ELF32_R_INFO (STN_UNDEF, R_PPC_NONE);
7319 break;
7320 }
7321
b00a0a86 7322 if ((tls_mask & TLS_GDIE) != 0)
727fc41e
AM
7323 {
7324 /* IE */
7325 r_type = R_PPC_NONE;
7326 insn2 = 0x7c631214; /* add 3,3,2 */
7327 }
7328 else
7329 {
7330 /* LE */
7331 r_type = R_PPC_TPREL16_LO;
7332 rel->r_offset += d_offset;
7333 insn2 = 0x38630000; /* addi 3,3,0 */
7334 }
7335 rel->r_info = ELF32_R_INFO (r_symndx, r_type);
95f0d0d2 7336 bfd_put_32 (input_bfd, insn2, contents + offset);
727fc41e
AM
7337 /* Zap the reloc on the _tls_get_addr call too. */
7338 BFD_ASSERT (offset == rel[1].r_offset);
f58d5a2d 7339 rel[1].r_info = ELF32_R_INFO (STN_UNDEF, R_PPC_NONE);
727fc41e
AM
7340 }
7341 break;
7342
7343 case R_PPC_TLSLD:
675e2809
AM
7344 if ((tls_mask & TLS_TLS) != 0 && (tls_mask & TLS_LD) == 0
7345 && rel + 1 < relend)
727fc41e
AM
7346 {
7347 unsigned int insn2;
7348
23cedd1d
AM
7349 if (is_plt_seq_reloc (ELF32_R_TYPE (rel[1].r_info)))
7350 {
7351 bfd_put_32 (input_bfd, NOP, contents + rel->r_offset);
7352 rel[1].r_info = ELF32_R_INFO (STN_UNDEF, R_PPC_NONE);
7353 break;
7354 }
7355
727fc41e
AM
7356 for (r_symndx = 0;
7357 r_symndx < symtab_hdr->sh_info;
7358 r_symndx++)
7359 if (local_sections[r_symndx] == sec)
7360 break;
7361 if (r_symndx >= symtab_hdr->sh_info)
cf35638d 7362 r_symndx = STN_UNDEF;
727fc41e 7363 rel->r_addend = htab->elf.tls_sec->vma + DTP_OFFSET;
cf35638d 7364 if (r_symndx != STN_UNDEF)
727fc41e
AM
7365 rel->r_addend -= (local_syms[r_symndx].st_value
7366 + sec->output_offset
7367 + sec->output_section->vma);
7368
7369 rel->r_info = ELF32_R_INFO (r_symndx, R_PPC_TPREL16_LO);
7370 rel->r_offset += d_offset;
7371 insn2 = 0x38630000; /* addi 3,3,0 */
95f0d0d2 7372 bfd_put_32 (input_bfd, insn2,
727fc41e
AM
7373 contents + rel->r_offset - d_offset);
7374 /* Zap the reloc on the _tls_get_addr call too. */
7375 BFD_ASSERT (rel->r_offset - d_offset == rel[1].r_offset);
f58d5a2d 7376 rel[1].r_info = ELF32_R_INFO (STN_UNDEF, R_PPC_NONE);
c316a17c 7377 goto again;
727fc41e
AM
7378 }
7379 break;
7619e7c7
AM
7380 }
7381
7382 /* Handle other relocations that tweak non-addend part of insn. */
7383 branch_bit = 0;
7384 switch (r_type)
7385 {
7386 default:
7387 break;
7388
7389 /* Branch taken prediction relocations. */
7390 case R_PPC_ADDR14_BRTAKEN:
7391 case R_PPC_REL14_BRTAKEN:
7392 branch_bit = BRANCH_PREDICT_BIT;
1a0670f3 7393 /* Fall through. */
7619e7c7 7394
4cc11e76 7395 /* Branch not taken prediction relocations. */
7619e7c7
AM
7396 case R_PPC_ADDR14_BRNTAKEN:
7397 case R_PPC_REL14_BRNTAKEN:
91d6fa6a 7398 {
23cedd1d 7399 unsigned int insn;
7619e7c7 7400
95f0d0d2 7401 insn = bfd_get_32 (input_bfd, contents + rel->r_offset);
91d6fa6a
NC
7402 insn &= ~BRANCH_PREDICT_BIT;
7403 insn |= branch_bit;
7619e7c7 7404
91d6fa6a
NC
7405 from = (rel->r_offset
7406 + input_section->output_offset
7407 + input_section->output_section->vma);
7619e7c7 7408
91d6fa6a
NC
7409 /* Invert 'y' bit if not the default. */
7410 if ((bfd_signed_vma) (relocation + rel->r_addend - from) < 0)
7411 insn ^= BRANCH_PREDICT_BIT;
7412
95f0d0d2 7413 bfd_put_32 (input_bfd, insn, contents + rel->r_offset);
91d6fa6a 7414 }
08be3224
AM
7415 break;
7416
7417 case R_PPC_PLT16_HA:
7418 {
7419 unsigned int insn;
7420
7421 insn = bfd_get_32 (input_bfd,
7422 contents + rel->r_offset - d_offset);
2365f8d7 7423 if ((insn & (0x3fu << 26)) == 15u << 26
08be3224
AM
7424 && (insn & (0x1f << 16)) != 0)
7425 {
7426 if (!bfd_link_pic (info))
7427 {
7428 /* Convert addis to lis. */
7429 insn &= ~(0x1f << 16);
7430 bfd_put_32 (input_bfd, insn,
7431 contents + rel->r_offset - d_offset);
7432 }
7433 }
7434 else if (bfd_link_pic (info))
7435 info->callbacks->einfo
7436 (_("%P: %H: error: %s with unexpected instruction %x\n"),
7437 input_bfd, input_section, rel->r_offset,
7438 "R_PPC_PLT16_HA", insn);
7439 }
7440 break;
252b5132
RH
7441 }
7442
d3e454b9
AM
7443 if (ELIMINATE_COPY_RELOCS
7444 && h != NULL
7445 && !h->def_regular
7446 && h->protected_def
7447 && ppc_elf_hash_entry (h)->has_addr16_ha
7448 && ppc_elf_hash_entry (h)->has_addr16_lo
7449 && htab->params->pic_fixup > 0)
7450 {
7451 /* Convert lis;addi or lis;load/store accessing a protected
7452 variable defined in a shared library to PIC. */
7453 unsigned int insn;
7454
7455 if (r_type == R_PPC_ADDR16_HA)
7456 {
95f0d0d2 7457 insn = bfd_get_32 (input_bfd,
d3e454b9 7458 contents + rel->r_offset - d_offset);
2365f8d7 7459 if ((insn & (0x3fu << 26)) == (15u << 26)
d3e454b9
AM
7460 && (insn & (0x1f << 16)) == 0 /* lis */)
7461 {
7462 bfd_byte *p;
7463 bfd_vma off;
7464 bfd_vma got_addr;
7465
7466 p = (contents + input_section->size
7467 - relax_info->workaround_size
7468 - relax_info->picfixup_size
7469 + picfixup_size);
7470 off = (p - contents) - (rel->r_offset - d_offset);
7471 if (off > 0x1fffffc || (off & 3) != 0)
7472 info->callbacks->einfo
174d0a74 7473 (_("%H: fixup branch overflow\n"),
d3e454b9
AM
7474 input_bfd, input_section, rel->r_offset);
7475
95f0d0d2 7476 bfd_put_32 (input_bfd, B | off,
d3e454b9 7477 contents + rel->r_offset - d_offset);
ce558b89
AM
7478 got_addr = (htab->elf.sgot->output_section->vma
7479 + htab->elf.sgot->output_offset
d3e454b9 7480 + (h->got.offset & ~1));
c316a17c
AM
7481 wrel->r_offset = (p - contents) + d_offset;
7482 wrel->r_info = ELF32_R_INFO (0, R_PPC_ADDR16_HA);
7483 wrel->r_addend = got_addr;
d3e454b9 7484 insn &= ~0xffff;
4aef7643 7485 insn |= ((unsigned int) (got_addr + 0x8000) >> 16) & 0xffff;
95f0d0d2 7486 bfd_put_32 (input_bfd, insn, p);
d3e454b9
AM
7487
7488 /* Convert lis to lwz, loading address from GOT. */
7489 insn &= ~0xffff;
7490 insn ^= (32u ^ 15u) << 26;
7491 insn |= (insn & (0x1f << 21)) >> 5;
7492 insn |= got_addr & 0xffff;
95f0d0d2 7493 bfd_put_32 (input_bfd, insn, p + 4);
d3e454b9 7494
95f0d0d2 7495 bfd_put_32 (input_bfd, B | ((-4 - off) & 0x3ffffff), p + 8);
d3e454b9
AM
7496 picfixup_size += 12;
7497
7498 /* Use one of the spare relocs, so --emit-relocs
7499 output is reasonable. */
7500 memmove (rel + 1, rel, (relend - rel - 1) * sizeof (*rel));
c316a17c
AM
7501 wrel++, rel++;
7502 rel->r_offset = wrel[-1].r_offset + 4;
d3e454b9 7503 rel->r_info = ELF32_R_INFO (0, R_PPC_ADDR16_LO);
c316a17c 7504 rel->r_addend = wrel[-1].r_addend;
d3e454b9
AM
7505
7506 /* Continue on as if we had a got reloc, to output
7507 dynamic reloc. */
7508 r_type = R_PPC_GOT16_LO;
7509 }
7510 else
2c4d9cbe 7511 _bfd_error_handler
695344c0 7512 /* xgettext:c-format */
2dcf00ce
AM
7513 (_("%pB(%pA+%#" PRIx64 "): error: "
7514 "%s with unexpected instruction %#x"),
7515 input_bfd, input_section, (uint64_t) rel->r_offset,
d3e454b9
AM
7516 "R_PPC_ADDR16_HA", insn);
7517 }
7518 else if (r_type == R_PPC_ADDR16_LO)
7519 {
95f0d0d2 7520 insn = bfd_get_32 (input_bfd,
d3e454b9 7521 contents + rel->r_offset - d_offset);
2365f8d7
AM
7522 if ((insn & (0x3fu << 26)) == 14u << 26 /* addi */
7523 || (insn & (0x3fu << 26)) == 32u << 26 /* lwz */
7524 || (insn & (0x3fu << 26)) == 34u << 26 /* lbz */
7525 || (insn & (0x3fu << 26)) == 36u << 26 /* stw */
7526 || (insn & (0x3fu << 26)) == 38u << 26 /* stb */
7527 || (insn & (0x3fu << 26)) == 40u << 26 /* lhz */
7528 || (insn & (0x3fu << 26)) == 42u << 26 /* lha */
7529 || (insn & (0x3fu << 26)) == 44u << 26 /* sth */
7530 || (insn & (0x3fu << 26)) == 46u << 26 /* lmw */
7531 || (insn & (0x3fu << 26)) == 47u << 26 /* stmw */
7532 || (insn & (0x3fu << 26)) == 48u << 26 /* lfs */
7533 || (insn & (0x3fu << 26)) == 50u << 26 /* lfd */
7534 || (insn & (0x3fu << 26)) == 52u << 26 /* stfs */
7535 || (insn & (0x3fu << 26)) == 54u << 26 /* stfd */
7536 || ((insn & (0x3fu << 26)) == 58u << 26 /* lwa,ld,lmd */
d3e454b9 7537 && (insn & 3) != 1)
2365f8d7 7538 || ((insn & (0x3fu << 26)) == 62u << 26 /* std, stmd */
d3e454b9
AM
7539 && ((insn & 3) == 0 || (insn & 3) == 3)))
7540 {
7541 /* Arrange to apply the reloc addend, if any. */
7542 relocation = 0;
7543 unresolved_reloc = FALSE;
7544 rel->r_info = ELF32_R_INFO (0, r_type);
7545 }
7546 else
2c4d9cbe 7547 _bfd_error_handler
695344c0 7548 /* xgettext:c-format */
2dcf00ce
AM
7549 (_("%pB(%pA+%#" PRIx64 "): error: "
7550 "%s with unexpected instruction %#x"),
7551 input_bfd, input_section, (uint64_t) rel->r_offset,
d3e454b9
AM
7552 "R_PPC_ADDR16_LO", insn);
7553 }
7554 }
7555
e054468f 7556 ifunc = NULL;
25f23106 7557 if (!htab->is_vxworks)
e054468f 7558 {
de972ffa
AM
7559 struct plt_entry *ent;
7560
e054468f
AM
7561 if (h != NULL)
7562 {
7563 if (h->type == STT_GNU_IFUNC)
7564 ifunc = &h->plt.plist;
7565 }
de972ffa
AM
7566 else if (local_got_offsets != NULL
7567 && ELF_ST_TYPE (sym->st_info) == STT_GNU_IFUNC)
e054468f 7568 {
de972ffa 7569 struct plt_entry **local_plt;
e054468f 7570
de972ffa
AM
7571 local_plt = (struct plt_entry **) (local_got_offsets
7572 + symtab_hdr->sh_info);
7573 ifunc = local_plt + r_symndx;
e054468f 7574 }
e054468f 7575
de972ffa
AM
7576 ent = NULL;
7577 if (ifunc != NULL
0e1862bb 7578 && (!bfd_link_pic (info)
08be3224
AM
7579 || is_branch_reloc (r_type)
7580 || r_type == R_PPC_PLT16_LO
7581 || r_type == R_PPC_PLT16_HI
7582 || r_type == R_PPC_PLT16_HA))
de972ffa
AM
7583 {
7584 addend = 0;
08be3224
AM
7585 if (bfd_link_pic (info)
7586 && (r_type == R_PPC_PLTREL24
7587 || r_type == R_PPC_PLT16_LO
7588 || r_type == R_PPC_PLT16_HI
7589 || r_type == R_PPC_PLT16_HA))
de972ffa
AM
7590 addend = rel->r_addend;
7591 ent = find_plt_ent (ifunc, got2, addend);
7592 }
7593 if (ent != NULL)
7594 {
888a7fc3
AM
7595 if (bfd_link_pic (info)
7596 && ent->sec != got2
7597 && htab->plt_type != PLT_NEW
7598 && (!htab->elf.dynamic_sections_created
7599 || h == NULL
7600 || h->dynindx == -1))
7601 {
7602 /* Uh oh, we are going to create a pic glink stub
7603 for an ifunc (here for h == NULL and later in
7604 finish_dynamic_symbol for h != NULL), and
7605 apparently are using code compiled with
7606 -mbss-plt. The difficulty is that -mbss-plt code
7607 gives no indication via a magic PLTREL24 addend
7608 whether r30 is equal to _GLOBAL_OFFSET_TABLE_ or
7609 is pointing into a .got2 section (and how far
7610 into .got2). */
7611 info->callbacks->einfo
695344c0 7612 /* xgettext:c-format */
174d0a74 7613 (_("%X%H: unsupported bss-plt -fPIC ifunc %s\n"),
888a7fc3
AM
7614 input_bfd, input_section, rel->r_offset, sym_name);
7615 }
e054468f
AM
7616
7617 unresolved_reloc = FALSE;
7618 if (htab->plt_type == PLT_NEW
7619 || !htab->elf.dynamic_sections_created
c7e17e05
AM
7620 || h == NULL
7621 || h->dynindx == -1)
e054468f
AM
7622 relocation = (htab->glink->output_section->vma
7623 + htab->glink->output_offset
7624 + (ent->glink_offset & ~1));
7625 else
ce558b89
AM
7626 relocation = (htab->elf.splt->output_section->vma
7627 + htab->elf.splt->output_offset
e054468f
AM
7628 + ent->plt.offset);
7629 }
7630 }
7631
7619e7c7 7632 addend = rel->r_addend;
23cedd1d 7633 save_unresolved_reloc = unresolved_reloc;
7619e7c7 7634 howto = NULL;
55fd94b0
AM
7635 if (r_type < R_PPC_max)
7636 howto = ppc_elf_howto_table[r_type];
9a23f96e
AM
7637
7638 switch (r_type)
7639 {
7640 default:
7641 break;
7642
7643 case R_PPC_TPREL16_HA:
7644 if (htab->do_tls_opt && relocation + addend + 0x8000 < 0x10000)
7645 {
7646 bfd_byte *p = contents + (rel->r_offset & ~3);
7647 unsigned int insn = bfd_get_32 (input_bfd, p);
2365f8d7 7648 if ((insn & ((0x3fu << 26) | 0x1f << 16))
9a23f96e
AM
7649 != ((15u << 26) | (2 << 16)) /* addis rt,2,imm */)
7650 /* xgettext:c-format */
7651 info->callbacks->minfo
7652 (_("%H: warning: %s unexpected insn %#x.\n"),
7653 input_bfd, input_section, rel->r_offset, howto->name, insn);
7654 else
7655 bfd_put_32 (input_bfd, NOP, p);
7656 }
7657 break;
7658
7659 case R_PPC_TPREL16_LO:
7660 if (htab->do_tls_opt && relocation + addend + 0x8000 < 0x10000)
7661 {
7662 bfd_byte *p = contents + (rel->r_offset & ~3);
7663 unsigned int insn = bfd_get_32 (input_bfd, p);
7664 insn &= ~(0x1f << 16);
7665 insn |= 2 << 16;
7666 bfd_put_32 (input_bfd, insn, p);
7667 }
7668 break;
7669 }
7670
7671 tls_type = 0;
7619e7c7 7672 switch (r_type)
252b5132
RH
7673 {
7674 default:
cf97bcb0
AM
7675 /* xgettext:c-format */
7676 _bfd_error_handler (_("%pB: %s unsupported"),
7677 input_bfd, howto->name);
252b5132
RH
7678
7679 bfd_set_error (bfd_error_bad_value);
b34976b6 7680 ret = FALSE;
c316a17c 7681 goto copy_reloc;
252b5132 7682
7619e7c7
AM
7683 case R_PPC_NONE:
7684 case R_PPC_TLS:
727fc41e
AM
7685 case R_PPC_TLSGD:
7686 case R_PPC_TLSLD:
7619e7c7
AM
7687 case R_PPC_EMB_MRKREF:
7688 case R_PPC_GNU_VTINHERIT:
7689 case R_PPC_GNU_VTENTRY:
c316a17c 7690 goto copy_reloc;
7595d193 7691
7619e7c7
AM
7692 /* GOT16 relocations. Like an ADDR16 using the symbol's
7693 address in the GOT as relocation value instead of the
7694 symbol's value itself. Also, create a GOT entry for the
7695 symbol and put the symbol value there. */
7696 case R_PPC_GOT_TLSGD16:
7697 case R_PPC_GOT_TLSGD16_LO:
7698 case R_PPC_GOT_TLSGD16_HI:
7699 case R_PPC_GOT_TLSGD16_HA:
7700 tls_type = TLS_TLS | TLS_GD;
7701 goto dogot;
7702
7703 case R_PPC_GOT_TLSLD16:
7704 case R_PPC_GOT_TLSLD16_LO:
7705 case R_PPC_GOT_TLSLD16_HI:
7706 case R_PPC_GOT_TLSLD16_HA:
7707 tls_type = TLS_TLS | TLS_LD;
7708 goto dogot;
7709
7710 case R_PPC_GOT_TPREL16:
7711 case R_PPC_GOT_TPREL16_LO:
7712 case R_PPC_GOT_TPREL16_HI:
7713 case R_PPC_GOT_TPREL16_HA:
7714 tls_type = TLS_TLS | TLS_TPREL;
7715 goto dogot;
7716
7717 case R_PPC_GOT_DTPREL16:
7718 case R_PPC_GOT_DTPREL16_LO:
7719 case R_PPC_GOT_DTPREL16_HI:
7720 case R_PPC_GOT_DTPREL16_HA:
7721 tls_type = TLS_TLS | TLS_DTPREL;
7722 goto dogot;
7723
7724 case R_PPC_GOT16:
7725 case R_PPC_GOT16_LO:
7726 case R_PPC_GOT16_HI:
7727 case R_PPC_GOT16_HA:
727fc41e 7728 tls_mask = 0;
7619e7c7
AM
7729 dogot:
7730 {
7731 /* Relocation is to the entry for this symbol in the global
7732 offset table. */
7733 bfd_vma off;
7734 bfd_vma *offp;
7735 unsigned long indx;
7736
ce558b89 7737 if (htab->elf.sgot == NULL)
7619e7c7
AM
7738 abort ();
7739
7740 indx = 0;
7741 if (tls_type == (TLS_TLS | TLS_LD)
f749f26e 7742 && SYMBOL_REFERENCES_LOCAL (info, h))
7619e7c7
AM
7743 offp = &htab->tlsld_got.offset;
7744 else if (h != NULL)
7745 {
f0158f44
AM
7746 if (!htab->elf.dynamic_sections_created
7747 || h->dynindx == -1
7748 || SYMBOL_REFERENCES_LOCAL (info, h)
21d68fcd 7749 || UNDEFWEAK_NO_DYNAMIC_RELOC (info, h))
7619e7c7
AM
7750 /* This is actually a static link, or it is a
7751 -Bsymbolic link and the symbol is defined
7752 locally, or the symbol was forced to be local
7753 because of a version file. */
7754 ;
7755 else
7756 {
7757 indx = h->dynindx;
7758 unresolved_reloc = FALSE;
7759 }
7760 offp = &h->got.offset;
7761 }
7762 else
7763 {
7764 if (local_got_offsets == NULL)
7765 abort ();
7766 offp = &local_got_offsets[r_symndx];
7767 }
7768
7769 /* The offset must always be a multiple of 4. We use the
7770 least significant bit to record whether we have already
7771 processed this entry. */
7772 off = *offp;
7773 if ((off & 1) != 0)
7774 off &= ~1;
7775 else
7776 {
37da22e5
AM
7777 unsigned int tls_m = ((tls_mask & TLS_TLS) != 0
7778 ? tls_mask & (TLS_LD | TLS_GD | TLS_DTPREL
b00a0a86 7779 | TLS_TPREL | TLS_GDIE)
37da22e5 7780 : 0);
70bccea4
AM
7781
7782 if (offp == &htab->tlsld_got.offset)
7783 tls_m = TLS_LD;
f749f26e
AM
7784 else if ((tls_m & TLS_LD) != 0
7785 && SYMBOL_REFERENCES_LOCAL (info, h))
70bccea4
AM
7786 tls_m &= ~TLS_LD;
7787
7788 /* We might have multiple got entries for this sym.
7789 Initialize them all. */
7790 do
7619e7c7 7791 {
70bccea4
AM
7792 int tls_ty = 0;
7793
7794 if ((tls_m & TLS_LD) != 0)
7619e7c7 7795 {
70bccea4
AM
7796 tls_ty = TLS_TLS | TLS_LD;
7797 tls_m &= ~TLS_LD;
7798 }
7799 else if ((tls_m & TLS_GD) != 0)
7800 {
7801 tls_ty = TLS_TLS | TLS_GD;
7802 tls_m &= ~TLS_GD;
7803 }
7804 else if ((tls_m & TLS_DTPREL) != 0)
7805 {
7806 tls_ty = TLS_TLS | TLS_DTPREL;
7807 tls_m &= ~TLS_DTPREL;
7808 }
b00a0a86 7809 else if ((tls_m & (TLS_TPREL | TLS_GDIE)) != 0)
70bccea4
AM
7810 {
7811 tls_ty = TLS_TLS | TLS_TPREL;
7812 tls_m = 0;
7619e7c7 7813 }
7619e7c7 7814
70bccea4 7815 /* Generate relocs for the dynamic linker. */
f0158f44
AM
7816 if (indx != 0
7817 || (bfd_link_pic (info)
7818 && (h == NULL
f749f26e
AM
7819 || !UNDEFWEAK_NO_DYNAMIC_RELOC (info, h))
7820 && !(tls_ty != 0
f15d0b54
AM
7821 && bfd_link_executable (info)
7822 && SYMBOL_REFERENCES_LOCAL (info, h))))
7619e7c7 7823 {
ce558b89 7824 asection *rsec = htab->elf.srelgot;
91d6fa6a 7825 bfd_byte * loc;
91e21fb7 7826
0bed072f 7827 if (ifunc != NULL)
82e66161
AM
7828 {
7829 rsec = htab->elf.irelplt;
7830 if (indx == 0)
7831 htab->local_ifunc_resolver = 1;
7832 else if (is_static_defined (h))
7833 htab->maybe_local_ifunc_resolver = 1;
7834 }
ce558b89
AM
7835 outrel.r_offset = (htab->elf.sgot->output_section->vma
7836 + htab->elf.sgot->output_offset
70bccea4 7837 + off);
e515b051 7838 outrel.r_addend = 0;
70bccea4
AM
7839 if (tls_ty & (TLS_LD | TLS_GD))
7840 {
7841 outrel.r_info = ELF32_R_INFO (indx, R_PPC_DTPMOD32);
70bccea4
AM
7842 if (tls_ty == (TLS_TLS | TLS_GD))
7843 {
25f23106
AM
7844 loc = rsec->contents;
7845 loc += (rsec->reloc_count++
70bccea4
AM
7846 * sizeof (Elf32_External_Rela));
7847 bfd_elf32_swap_reloca_out (output_bfd,
7848 &outrel, loc);
e515b051 7849 outrel.r_offset += 4;
70bccea4
AM
7850 outrel.r_info
7851 = ELF32_R_INFO (indx, R_PPC_DTPREL32);
70bccea4
AM
7852 }
7853 }
7854 else if (tls_ty == (TLS_TLS | TLS_DTPREL))
7855 outrel.r_info = ELF32_R_INFO (indx, R_PPC_DTPREL32);
7856 else if (tls_ty == (TLS_TLS | TLS_TPREL))
7857 outrel.r_info = ELF32_R_INFO (indx, R_PPC_TPREL32);
25f23106 7858 else if (indx != 0)
70bccea4 7859 outrel.r_info = ELF32_R_INFO (indx, R_PPC_GLOB_DAT);
25f23106
AM
7860 else if (ifunc != NULL)
7861 outrel.r_info = ELF32_R_INFO (0, R_PPC_IRELATIVE);
7862 else
7863 outrel.r_info = ELF32_R_INFO (0, R_PPC_RELATIVE);
d6e14abc 7864 if (indx == 0 && tls_ty != (TLS_TLS | TLS_LD))
e515b051
AM
7865 {
7866 outrel.r_addend += relocation;
7867 if (tls_ty & (TLS_GD | TLS_DTPREL | TLS_TPREL))
989f9879
AM
7868 {
7869 if (htab->elf.tls_sec == NULL)
7870 outrel.r_addend = 0;
7871 else
7872 outrel.r_addend -= htab->elf.tls_sec->vma;
7873 }
e515b051 7874 }
25f23106
AM
7875 loc = rsec->contents;
7876 loc += (rsec->reloc_count++
70bccea4
AM
7877 * sizeof (Elf32_External_Rela));
7878 bfd_elf32_swap_reloca_out (output_bfd, &outrel, loc);
7619e7c7
AM
7879 }
7880
70bccea4
AM
7881 /* Init the .got section contents if we're not
7882 emitting a reloc. */
7883 else
7619e7c7 7884 {
70bccea4
AM
7885 bfd_vma value = relocation;
7886
f0158f44 7887 if (tls_ty != 0)
70bccea4 7888 {
989f9879
AM
7889 if (htab->elf.tls_sec == NULL)
7890 value = 0;
7891 else
7892 {
f0158f44
AM
7893 if (tls_ty & TLS_LD)
7894 value = 0;
7895 else
7896 value -= htab->elf.tls_sec->vma + DTP_OFFSET;
676ee2b5 7897 if (tls_ty & TLS_TPREL)
989f9879
AM
7898 value += DTP_OFFSET - TP_OFFSET;
7899 }
70bccea4 7900
f0158f44 7901 if (tls_ty & (TLS_LD | TLS_GD))
7b609f53 7902 {
95f0d0d2 7903 bfd_put_32 (input_bfd, value,
ce558b89 7904 htab->elf.sgot->contents + off + 4);
676ee2b5 7905 value = 1;
7b609f53 7906 }
70bccea4 7907 }
95f0d0d2 7908 bfd_put_32 (input_bfd, value,
ce558b89 7909 htab->elf.sgot->contents + off);
7619e7c7 7910 }
70bccea4
AM
7911
7912 off += 4;
7913 if (tls_ty & (TLS_LD | TLS_GD))
7914 off += 4;
7619e7c7 7915 }
70bccea4
AM
7916 while (tls_m != 0);
7917
7918 off = *offp;
7919 *offp = off | 1;
7619e7c7
AM
7920 }
7921
7922 if (off >= (bfd_vma) -2)
7923 abort ();
7924
70bccea4
AM
7925 if ((tls_type & TLS_TLS) != 0)
7926 {
7927 if (tls_type != (TLS_TLS | TLS_LD))
7928 {
7929 if ((tls_mask & TLS_LD) != 0
f749f26e 7930 && !SYMBOL_REFERENCES_LOCAL (info, h))
70bccea4
AM
7931 off += 8;
7932 if (tls_type != (TLS_TLS | TLS_GD))
7933 {
7934 if ((tls_mask & TLS_GD) != 0)
7935 off += 8;
7936 if (tls_type != (TLS_TLS | TLS_DTPREL))
7937 {
7938 if ((tls_mask & TLS_DTPREL) != 0)
7939 off += 4;
7940 }
7941 }
7942 }
7943 }
7944
d3e454b9
AM
7945 /* If here for a picfixup, we're done. */
7946 if (r_type != ELF32_R_TYPE (rel->r_info))
c316a17c 7947 goto copy_reloc;
d3e454b9 7948
ce558b89
AM
7949 relocation = (htab->elf.sgot->output_section->vma
7950 + htab->elf.sgot->output_offset
e87d4038
AM
7951 + off
7952 - SYM_VAL (htab->elf.hgot));
7619e7c7
AM
7953
7954 /* Addends on got relocations don't make much sense.
7955 x+off@got is actually x@got+off, and since the got is
7956 generated by a hash table traversal, the value in the
7957 got at entry m+n bears little relation to the entry m. */
7958 if (addend != 0)
25f53a85 7959 info->callbacks->einfo
695344c0 7960 /* xgettext:c-format */
174d0a74 7961 (_("%H: non-zero addend on %s reloc against `%s'\n"),
25f53a85 7962 input_bfd, input_section, rel->r_offset,
7b609f53 7963 howto->name,
7619e7c7
AM
7964 sym_name);
7965 }
86c95733 7966 break;
7619e7c7 7967
86c95733 7968 /* Relocations that need no special processing. */
7619e7c7 7969 case R_PPC_LOCAL24PC:
252b5132
RH
7970 /* It makes no sense to point a local relocation
7971 at a symbol not in this object. */
7b609f53 7972 if (unresolved_reloc)
252b5132 7973 {
1a72702b
AM
7974 (*info->callbacks->undefined_symbol) (info,
7975 h->root.root.string,
7976 input_bfd,
7977 input_section,
7978 rel->r_offset,
7979 TRUE);
c316a17c 7980 goto copy_reloc;
252b5132 7981 }
888a7fc3
AM
7982 if (h != NULL && h->type == STT_GNU_IFUNC && bfd_link_pic (info))
7983 {
7984 /* @local on an ifunc does not really make sense since
7985 the ifunc resolver can take you anywhere. More
7986 seriously, calls to ifuncs must go through a plt call
7987 stub, and for pic the plt call stubs uses r30 to
7988 access the PLT. The problem is that a call that is
7989 local won't have the +32k reloc addend trick marking
7990 -fPIC code, so the linker won't know whether r30 is
7991 _GLOBAL_OFFSET_TABLE_ or pointing into a .got2 section. */
695344c0 7992 /* xgettext:c-format */
174d0a74 7993 info->callbacks->einfo (_("%X%H: @local call to ifunc %s\n"),
888a7fc3
AM
7994 input_bfd, input_section, rel->r_offset,
7995 h->root.root.string);
7996 }
252b5132
RH
7997 break;
7998
7619e7c7
AM
7999 case R_PPC_DTPREL16:
8000 case R_PPC_DTPREL16_LO:
8001 case R_PPC_DTPREL16_HI:
8002 case R_PPC_DTPREL16_HA:
989f9879
AM
8003 if (htab->elf.tls_sec != NULL)
8004 addend -= htab->elf.tls_sec->vma + DTP_OFFSET;
7619e7c7
AM
8005 break;
8006
70bccea4
AM
8007 /* Relocations that may need to be propagated if this is a shared
8008 object. */
7619e7c7
AM
8009 case R_PPC_TPREL16:
8010 case R_PPC_TPREL16_LO:
8011 case R_PPC_TPREL16_HI:
8012 case R_PPC_TPREL16_HA:
766bc656
AM
8013 if (h != NULL
8014 && h->root.type == bfd_link_hash_undefweak
8015 && h->dynindx == -1)
8016 {
8017 /* Make this relocation against an undefined weak symbol
8018 resolve to zero. This is really just a tweak, since
8019 code using weak externs ought to check that they are
8020 defined before using them. */
8021 bfd_byte *p = contents + rel->r_offset - d_offset;
95f0d0d2 8022 unsigned int insn = bfd_get_32 (input_bfd, p);
766bc656
AM
8023 insn = _bfd_elf_ppc_at_tprel_transform (insn, 2);
8024 if (insn != 0)
95f0d0d2 8025 bfd_put_32 (input_bfd, insn, p);
766bc656
AM
8026 break;
8027 }
989f9879
AM
8028 if (htab->elf.tls_sec != NULL)
8029 addend -= htab->elf.tls_sec->vma + TP_OFFSET;
7619e7c7 8030 /* The TPREL16 relocs shouldn't really be used in shared
7c8bbca5
AM
8031 libs or with non-local symbols as that will result in
8032 DT_TEXTREL being set, but support them anyway. */
7619e7c7
AM
8033 goto dodyn;
8034
8035 case R_PPC_TPREL32:
989f9879
AM
8036 if (htab->elf.tls_sec != NULL)
8037 addend -= htab->elf.tls_sec->vma + TP_OFFSET;
7619e7c7
AM
8038 goto dodyn;
8039
8040 case R_PPC_DTPREL32:
989f9879
AM
8041 if (htab->elf.tls_sec != NULL)
8042 addend -= htab->elf.tls_sec->vma + DTP_OFFSET;
7619e7c7
AM
8043 goto dodyn;
8044
e515b051
AM
8045 case R_PPC_DTPMOD32:
8046 relocation = 1;
8047 addend = 0;
8048 goto dodyn;
8049
d7128ce4
AM
8050 case R_PPC_REL16:
8051 case R_PPC_REL16_LO:
8052 case R_PPC_REL16_HI:
8053 case R_PPC_REL16_HA:
a680de9a 8054 case R_PPC_REL16DX_HA:
d7128ce4
AM
8055 break;
8056
7619e7c7 8057 case R_PPC_REL32:
625af618
AM
8058 if (h == NULL || h == htab->elf.hgot)
8059 break;
8060 /* fall through */
8061
8062 case R_PPC_ADDR32:
8063 case R_PPC_ADDR16:
8064 case R_PPC_ADDR16_LO:
8065 case R_PPC_ADDR16_HI:
8066 case R_PPC_ADDR16_HA:
8067 case R_PPC_UADDR32:
8068 case R_PPC_UADDR16:
8069 goto dodyn;
8070
b9c361e0
JL
8071 case R_PPC_VLE_REL8:
8072 case R_PPC_VLE_REL15:
8073 case R_PPC_VLE_REL24:
625af618 8074 case R_PPC_REL24:
7619e7c7
AM
8075 case R_PPC_REL14:
8076 case R_PPC_REL14_BRTAKEN:
8077 case R_PPC_REL14_BRNTAKEN:
252b5132
RH
8078 /* If these relocations are not to a named symbol, they can be
8079 handled right here, no need to bother the dynamic linker. */
89200bf8 8080 if (SYMBOL_CALLS_LOCAL (info, h)
3b36f7e6 8081 || h == htab->elf.hgot)
252b5132 8082 break;
70bccea4 8083 /* fall through */
252b5132 8084
7619e7c7 8085 case R_PPC_ADDR24:
7619e7c7
AM
8086 case R_PPC_ADDR14:
8087 case R_PPC_ADDR14_BRTAKEN:
8088 case R_PPC_ADDR14_BRNTAKEN:
0e1862bb 8089 if (h != NULL && !bfd_link_pic (info))
625af618
AM
8090 break;
8091 /* fall through */
8092
7619e7c7 8093 dodyn:
3348747a
NS
8094 if ((input_section->flags & SEC_ALLOC) == 0
8095 || is_vxworks_tls)
c87b5a93 8096 break;
c87b5a93 8097
287c7eaf
AM
8098 if (bfd_link_pic (info)
8099 ? ((h == NULL
8100 || ppc_elf_hash_entry (h)->dyn_relocs != NULL)
8101 && ((h != NULL && pc_dynrelocs (h))
8102 || must_be_dyn_reloc (info, r_type)))
8103 : (h != NULL
8104 && ppc_elf_hash_entry (h)->dyn_relocs != NULL))
252b5132 8105 {
0bb2d96a 8106 int skip;
f95f8542
AM
8107 bfd_byte *loc;
8108 asection *sreloc;
82e66161
AM
8109 long indx = 0;
8110
252b5132 8111#ifdef DEBUG
55fd94b0
AM
8112 fprintf (stderr, "ppc_elf_relocate_section needs to "
8113 "create relocation for %s\n",
70bccea4
AM
8114 (h && h->root.root.string
8115 ? h->root.root.string : "<unknown>"));
252b5132
RH
8116#endif
8117
8118 /* When generating a shared object, these relocations
70bccea4
AM
8119 are copied into the output file to be resolved at run
8120 time. */
0bb2d96a 8121 skip = 0;
5b914448
AM
8122 outrel.r_offset = _bfd_elf_section_offset (output_bfd, info,
8123 input_section,
8124 rel->r_offset);
0bb2d96a
JJ
8125 if (outrel.r_offset == (bfd_vma) -1
8126 || outrel.r_offset == (bfd_vma) -2)
8127 skip = (int) outrel.r_offset;
252b5132
RH
8128 outrel.r_offset += (input_section->output_section->vma
8129 + input_section->output_offset);
8130
63f6e94f
AM
8131 /* Optimize unaligned reloc use. */
8132 if ((r_type == R_PPC_ADDR32 && (outrel.r_offset & 3) != 0)
8133 || (r_type == R_PPC_UADDR32 && (outrel.r_offset & 3) == 0))
8134 r_type ^= R_PPC_ADDR32 ^ R_PPC_UADDR32;
8135 if ((r_type == R_PPC_ADDR16 && (outrel.r_offset & 1) != 0)
8136 || (r_type == R_PPC_UADDR16 && (outrel.r_offset & 1) == 0))
8137 r_type ^= R_PPC_ADDR16 ^ R_PPC_UADDR16;
8138
252b5132
RH
8139 if (skip)
8140 memset (&outrel, 0, sizeof outrel);
21d68fcd 8141 else if (!SYMBOL_REFERENCES_LOCAL (info, h))
252b5132 8142 {
82e66161
AM
8143 indx = h->dynindx;
8144 BFD_ASSERT (indx != -1);
7619e7c7 8145 unresolved_reloc = FALSE;
82e66161 8146 outrel.r_info = ELF32_R_INFO (indx, r_type);
252b5132
RH
8147 outrel.r_addend = rel->r_addend;
8148 }
8149 else
8150 {
47388f4c
AM
8151 outrel.r_addend = relocation + rel->r_addend;
8152
25f23106 8153 if (r_type != R_PPC_ADDR32)
252b5132 8154 {
25f23106
AM
8155 if (ifunc != NULL)
8156 {
8157 /* If we get here when building a static
8158 executable, then the libc startup function
8159 responsible for applying indirect function
8160 relocations is going to complain about
8161 the reloc type.
8162 If we get here when building a dynamic
8163 executable, it will be because we have
8164 a text relocation. The dynamic loader
8165 will set the text segment writable and
8166 non-executable to apply text relocations.
8167 So we'll segfault when trying to run the
8168 indirection function to resolve the reloc. */
25f53a85 8169 info->callbacks->einfo
695344c0 8170 /* xgettext:c-format */
174d0a74 8171 (_("%H: relocation %s for indirect "
25f53a85
AM
8172 "function %s unsupported\n"),
8173 input_bfd, input_section, rel->r_offset,
25f23106
AM
8174 howto->name,
8175 sym_name);
8176 ret = FALSE;
8177 }
cf35638d 8178 else if (r_symndx == STN_UNDEF || bfd_is_abs_section (sec))
89200bf8 8179 ;
252b5132
RH
8180 else if (sec == NULL || sec->owner == NULL)
8181 {
8182 bfd_set_error (bfd_error_bad_value);
89200bf8 8183 ret = FALSE;
252b5132
RH
8184 }
8185 else
8186 {
8187 asection *osec;
8188
47388f4c
AM
8189 /* We are turning this relocation into one
8190 against a section symbol. It would be
8191 proper to subtract the symbol's value,
8192 osec->vma, from the emitted reloc addend,
25f23106
AM
8193 but ld.so expects buggy relocs.
8194 FIXME: Why not always use a zero index? */
252b5132 8195 osec = sec->output_section;
f26a3287
AM
8196 if ((osec->flags & SEC_THREAD_LOCAL) != 0)
8197 {
8198 osec = htab->elf.tls_sec;
8199 indx = 0;
8200 }
8201 else
74541ad4 8202 {
74541ad4 8203 indx = elf_section_data (osec)->dynindx;
f26a3287
AM
8204 if (indx == 0)
8205 {
8206 osec = htab->elf.text_index_section;
8207 indx = elf_section_data (osec)->dynindx;
8208 }
8209 BFD_ASSERT (indx != 0);
74541ad4 8210 }
f26a3287
AM
8211
8212 /* ld.so doesn't expect buggy TLS relocs.
8213 Don't leave the symbol value in the
8214 addend for them. */
8215 if (IS_PPC_TLS_RELOC (r_type))
8216 outrel.r_addend -= osec->vma;
252b5132
RH
8217 }
8218
8219 outrel.r_info = ELF32_R_INFO (indx, r_type);
252b5132 8220 }
25f23106
AM
8221 else if (ifunc != NULL)
8222 outrel.r_info = ELF32_R_INFO (0, R_PPC_IRELATIVE);
8223 else
8224 outrel.r_info = ELF32_R_INFO (0, R_PPC_RELATIVE);
252b5132
RH
8225 }
8226
82e66161
AM
8227 sreloc = elf_section_data (input_section)->sreloc;
8228 if (ifunc)
8229 {
8230 sreloc = htab->elf.irelplt;
8231 if (indx == 0)
8232 htab->local_ifunc_resolver = 1;
8233 else if (is_static_defined (h))
8234 htab->maybe_local_ifunc_resolver = 1;
8235 }
8236 if (sreloc == NULL)
8237 return FALSE;
8238
947216bf
AM
8239 loc = sreloc->contents;
8240 loc += sreloc->reloc_count++ * sizeof (Elf32_External_Rela);
8241 bfd_elf32_swap_reloca_out (output_bfd, &outrel, loc);
252b5132 8242
2243deae 8243 if (skip == -1)
c316a17c 8244 goto copy_reloc;
2243deae 8245
f0158f44
AM
8246 /* This reloc will be computed at runtime. Clear the memory
8247 so that it contains a predictable value for prelink. */
8248 if (!skip)
2243deae
L
8249 {
8250 relocation = howto->pc_relative ? outrel.r_offset : 0;
8251 addend = 0;
8252 break;
8253 }
252b5132 8254 }
252b5132
RH
8255 break;
8256
32af9f6e
AM
8257 case R_PPC_RELAX_PLT:
8258 case R_PPC_RELAX_PLTREL24:
de972ffa
AM
8259 if (h != NULL)
8260 {
32af9f6e
AM
8261 struct plt_entry *ent;
8262 bfd_vma got2_addend = 0;
8263
8264 if (r_type == R_PPC_RELAX_PLTREL24)
8265 {
0e1862bb 8266 if (bfd_link_pic (info))
32af9f6e
AM
8267 got2_addend = addend;
8268 addend = 0;
8269 }
8270 ent = find_plt_ent (&h->plt.plist, got2, got2_addend);
de972ffa
AM
8271 if (htab->plt_type == PLT_NEW)
8272 relocation = (htab->glink->output_section->vma
8273 + htab->glink->output_offset
8274 + ent->glink_offset);
8275 else
ce558b89
AM
8276 relocation = (htab->elf.splt->output_section->vma
8277 + htab->elf.splt->output_offset
de972ffa
AM
8278 + ent->plt.offset);
8279 }
1a0670f3 8280 /* Fall through. */
b4a38de6 8281
32af9f6e 8282 case R_PPC_RELAX:
9abc968f 8283 {
53291d1f
AM
8284 const int *stub;
8285 size_t size;
8286 size_t insn_offset = rel->r_offset;
8287 unsigned int insn;
9abc968f 8288
0e1862bb 8289 if (bfd_link_pic (info))
53291d1f
AM
8290 {
8291 relocation -= (input_section->output_section->vma
8292 + input_section->output_offset
8293 + rel->r_offset - 4);
8294 stub = shared_stub_entry;
95f0d0d2
AM
8295 bfd_put_32 (input_bfd, stub[0], contents + insn_offset - 12);
8296 bfd_put_32 (input_bfd, stub[1], contents + insn_offset - 8);
8297 bfd_put_32 (input_bfd, stub[2], contents + insn_offset - 4);
53291d1f
AM
8298 stub += 3;
8299 size = ARRAY_SIZE (shared_stub_entry) - 3;
8300 }
8301 else
8302 {
8303 stub = stub_entry;
8304 size = ARRAY_SIZE (stub_entry);
8305 }
9abc968f 8306
9abc968f 8307 relocation += addend;
0e1862bb 8308 if (bfd_link_relocatable (info))
53291d1f
AM
8309 relocation = 0;
8310
8311 /* First insn is HA, second is LO. */
8312 insn = *stub++;
8313 insn |= ((relocation + 0x8000) >> 16) & 0xffff;
95f0d0d2 8314 bfd_put_32 (input_bfd, insn, contents + insn_offset);
53291d1f
AM
8315 insn_offset += 4;
8316
8317 insn = *stub++;
8318 insn |= relocation & 0xffff;
95f0d0d2 8319 bfd_put_32 (input_bfd, insn, contents + insn_offset);
53291d1f
AM
8320 insn_offset += 4;
8321 size -= 2;
8322
8323 while (size != 0)
8324 {
8325 insn = *stub++;
8326 --size;
95f0d0d2 8327 bfd_put_32 (input_bfd, insn, contents + insn_offset);
53291d1f
AM
8328 insn_offset += 4;
8329 }
9bc4e62b
NS
8330
8331 /* Rewrite the reloc and convert one of the trailing nop
8332 relocs to describe this relocation. */
8333 BFD_ASSERT (ELF32_R_TYPE (relend[-1].r_info) == R_PPC_NONE);
8334 /* The relocs are at the bottom 2 bytes */
c316a17c
AM
8335 wrel->r_offset = rel->r_offset + d_offset;
8336 wrel->r_info = ELF32_R_INFO (r_symndx, R_PPC_ADDR16_HA);
8337 wrel->r_addend = rel->r_addend;
8338 memmove (wrel + 1, wrel, (relend - wrel - 1) * sizeof (*wrel));
8339 wrel++, rel++;
8340 wrel->r_offset += 4;
8341 wrel->r_info = ELF32_R_INFO (r_symndx, R_PPC_ADDR16_LO);
9abc968f 8342 }
8517fae7 8343 continue;
deaaf2f3 8344
70bccea4 8345 /* Indirect .sdata relocation. */
7619e7c7 8346 case R_PPC_EMB_SDAI16:
c9a2f333 8347 BFD_ASSERT (htab->sdata[0].section != NULL);
bd6c6e2b
AM
8348 if (!is_static_defined (htab->sdata[0].sym))
8349 {
8350 unresolved_reloc = TRUE;
8351 break;
8352 }
7619e7c7 8353 relocation
76750a2f
AM
8354 = elf_finish_pointer_linker_section (input_bfd, &htab->sdata[0],
8355 h, relocation, rel);
bd6c6e2b 8356 addend = 0;
252b5132
RH
8357 break;
8358
70bccea4 8359 /* Indirect .sdata2 relocation. */
7619e7c7 8360 case R_PPC_EMB_SDA2I16:
c9a2f333 8361 BFD_ASSERT (htab->sdata[1].section != NULL);
bd6c6e2b
AM
8362 if (!is_static_defined (htab->sdata[1].sym))
8363 {
8364 unresolved_reloc = TRUE;
8365 break;
8366 }
7619e7c7 8367 relocation
76750a2f
AM
8368 = elf_finish_pointer_linker_section (input_bfd, &htab->sdata[1],
8369 h, relocation, rel);
bd6c6e2b 8370 addend = 0;
252b5132
RH
8371 break;
8372
70bccea4
AM
8373 /* Handle the TOC16 reloc. We want to use the offset within the .got
8374 section, not the actual VMA. This is appropriate when generating
8375 an embedded ELF object, for which the .got section acts like the
8376 AIX .toc section. */
7619e7c7 8377 case R_PPC_TOC16: /* phony GOT16 relocations */
3b4f3a11
AM
8378 if (sec == NULL || sec->output_section == NULL)
8379 {
8380 unresolved_reloc = TRUE;
8381 break;
8382 }
fd361982
AM
8383 BFD_ASSERT (strcmp (bfd_section_name (sec), ".got") == 0
8384 || strcmp (bfd_section_name (sec), ".cgot") == 0);
252b5132 8385
3b4f3a11 8386 addend -= sec->output_section->vma + sec->output_offset + 0x8000;
252b5132
RH
8387 break;
8388
7619e7c7 8389 case R_PPC_PLTREL24:
f75e0e33
AM
8390 if (h != NULL && ifunc == NULL)
8391 {
cbf95972
AM
8392 struct plt_entry *ent;
8393
8394 ent = find_plt_ent (&h->plt.plist, got2,
8395 bfd_link_pic (info) ? addend : 0);
f75e0e33 8396 if (ent == NULL
ce558b89 8397 || htab->elf.splt == NULL)
f75e0e33
AM
8398 {
8399 /* We didn't make a PLT entry for this symbol. This
8400 happens when statically linking PIC code, or when
8401 using -Bsymbolic. */
8402 }
8403 else
8404 {
8405 /* Relocation is to the entry for this symbol in the
8406 procedure linkage table. */
8407 unresolved_reloc = FALSE;
8408 if (htab->plt_type == PLT_NEW)
8409 relocation = (htab->glink->output_section->vma
8410 + htab->glink->output_offset
8411 + ent->glink_offset);
8412 else
ce558b89
AM
8413 relocation = (htab->elf.splt->output_section->vma
8414 + htab->elf.splt->output_offset
f75e0e33
AM
8415 + ent->plt.offset);
8416 }
8417 }
252b5132 8418
f75e0e33
AM
8419 /* R_PPC_PLTREL24 is rather special. If non-zero, the
8420 addend specifies the GOT pointer offset within .got2.
8421 Don't apply it to the relocation field. */
8422 addend = 0;
8da6118f 8423 break;
252b5132 8424
23cedd1d
AM
8425 case R_PPC_PLTSEQ:
8426 case R_PPC_PLTCALL:
08be3224
AM
8427 case R_PPC_PLT16_LO:
8428 case R_PPC_PLT16_HI:
8429 case R_PPC_PLT16_HA:
2d7ad24e 8430 plt_list = NULL;
08be3224
AM
8431 if (h != NULL)
8432 plt_list = &h->plt.plist;
2d7ad24e
AM
8433 else if (ifunc != NULL)
8434 plt_list = ifunc;
8435 else if (local_got_offsets != NULL)
8436 {
8437 struct plt_entry **local_plt;
8438 local_plt = (struct plt_entry **) (local_got_offsets
8439 + symtab_hdr->sh_info);
8440 plt_list = local_plt + r_symndx;
8441 }
08be3224
AM
8442 unresolved_reloc = TRUE;
8443 if (plt_list != NULL)
8444 {
8445 struct plt_entry *ent;
8446
8447 ent = find_plt_ent (plt_list, got2,
8448 bfd_link_pic (info) ? addend : 0);
2d7ad24e 8449 if (ent != NULL && ent->plt.offset != (bfd_vma) -1)
08be3224 8450 {
2d7ad24e
AM
8451 asection *plt;
8452
08be3224 8453 unresolved_reloc = FALSE;
2d7ad24e
AM
8454 plt = htab->elf.splt;
8455 if (!htab->elf.dynamic_sections_created
8456 || h == NULL
8457 || h->dynindx == -1)
8458 {
8459 if (ifunc != NULL)
8460 plt = htab->elf.iplt;
8461 else
8462 plt = htab->pltlocal;
8463 }
8464 relocation = (plt->output_section->vma
8465 + plt->output_offset
08be3224
AM
8466 + ent->plt.offset);
8467 if (bfd_link_pic (info))
8468 {
8469 bfd_vma got = 0;
8470
8471 if (ent->addend >= 32768)
8472 got = (ent->addend
8473 + ent->sec->output_section->vma
8474 + ent->sec->output_offset);
8475 else
8476 got = SYM_VAL (htab->elf.hgot);
8477 relocation -= got;
8478 }
8479 }
8480 }
8481 addend = 0;
8482 break;
8483
70bccea4 8484 /* Relocate against _SDA_BASE_. */
7619e7c7 8485 case R_PPC_SDAREL16:
252b5132
RH
8486 {
8487 const char *name;
bd6c6e2b 8488 struct elf_link_hash_entry *sda = htab->sdata[0].sym;
252b5132 8489
bd6c6e2b
AM
8490 if (sec == NULL
8491 || sec->output_section == NULL
8492 || !is_static_defined (sda))
3b4f3a11
AM
8493 {
8494 unresolved_reloc = TRUE;
8495 break;
8496 }
bd6c6e2b 8497 addend -= SYM_VAL (sda);
3b4f3a11 8498
fd361982 8499 name = bfd_section_name (sec->output_section);
93d1b056
AM
8500 if (!(strcmp (name, ".sdata") == 0
8501 || strcmp (name, ".sbss") == 0))
252b5132 8502 {
cf97bcb0 8503 _bfd_error_handler
695344c0 8504 /* xgettext:c-format */
cf97bcb0
AM
8505 (_("%pB: the target (%s) of a %s relocation is "
8506 "in the wrong output section (%s)"),
d003868e 8507 input_bfd,
55fd94b0
AM
8508 sym_name,
8509 howto->name,
8510 name);
252b5132 8511 }
252b5132
RH
8512 }
8513 break;
8514
70bccea4 8515 /* Relocate against _SDA2_BASE_. */
7619e7c7 8516 case R_PPC_EMB_SDA2REL:
252b5132
RH
8517 {
8518 const char *name;
bd6c6e2b 8519 struct elf_link_hash_entry *sda = htab->sdata[1].sym;
252b5132 8520
bd6c6e2b
AM
8521 if (sec == NULL
8522 || sec->output_section == NULL
8523 || !is_static_defined (sda))
3b4f3a11
AM
8524 {
8525 unresolved_reloc = TRUE;
8526 break;
8527 }
bd6c6e2b 8528 addend -= SYM_VAL (sda);
3b4f3a11 8529
fd361982 8530 name = bfd_section_name (sec->output_section);
93d1b056
AM
8531 if (!(strcmp (name, ".sdata2") == 0
8532 || strcmp (name, ".sbss2") == 0))
252b5132 8533 {
cf97bcb0 8534 _bfd_error_handler
695344c0 8535 /* xgettext:c-format */
cf97bcb0
AM
8536 (_("%pB: the target (%s) of a %s relocation is "
8537 "in the wrong output section (%s)"),
d003868e 8538 input_bfd,
55fd94b0
AM
8539 sym_name,
8540 howto->name,
8541 name);
252b5132 8542 }
252b5132
RH
8543 }
8544 break;
8545
b9c361e0 8546 case R_PPC_VLE_LO16A:
86c95733 8547 relocation = relocation + addend;
08dc996f
AM
8548 ppc_elf_vle_split16 (input_bfd, input_section, rel->r_offset,
8549 contents + rel->r_offset, relocation,
8550 split16a_type, htab->params->vle_reloc_fixup);
c316a17c 8551 goto copy_reloc;
b9c361e0
JL
8552
8553 case R_PPC_VLE_LO16D:
86c95733 8554 relocation = relocation + addend;
08dc996f
AM
8555 ppc_elf_vle_split16 (input_bfd, input_section, rel->r_offset,
8556 contents + rel->r_offset, relocation,
8557 split16d_type, htab->params->vle_reloc_fixup);
c316a17c 8558 goto copy_reloc;
b9c361e0
JL
8559
8560 case R_PPC_VLE_HI16A:
86c95733 8561 relocation = (relocation + addend) >> 16;
08dc996f
AM
8562 ppc_elf_vle_split16 (input_bfd, input_section, rel->r_offset,
8563 contents + rel->r_offset, relocation,
8564 split16a_type, htab->params->vle_reloc_fixup);
c316a17c 8565 goto copy_reloc;
b9c361e0
JL
8566
8567 case R_PPC_VLE_HI16D:
86c95733 8568 relocation = (relocation + addend) >> 16;
08dc996f
AM
8569 ppc_elf_vle_split16 (input_bfd, input_section, rel->r_offset,
8570 contents + rel->r_offset, relocation,
8571 split16d_type, htab->params->vle_reloc_fixup);
c316a17c 8572 goto copy_reloc;
b9c361e0
JL
8573
8574 case R_PPC_VLE_HA16A:
86c95733 8575 relocation = (relocation + addend + 0x8000) >> 16;
08dc996f
AM
8576 ppc_elf_vle_split16 (input_bfd, input_section, rel->r_offset,
8577 contents + rel->r_offset, relocation,
8578 split16a_type, htab->params->vle_reloc_fixup);
c316a17c 8579 goto copy_reloc;
b9c361e0
JL
8580
8581 case R_PPC_VLE_HA16D:
86c95733 8582 relocation = (relocation + addend + 0x8000) >> 16;
08dc996f
AM
8583 ppc_elf_vle_split16 (input_bfd, input_section, rel->r_offset,
8584 contents + rel->r_offset, relocation,
8585 split16d_type, htab->params->vle_reloc_fixup);
c316a17c 8586 goto copy_reloc;
b9c361e0 8587
70bccea4 8588 /* Relocate against either _SDA_BASE_, _SDA2_BASE_, or 0. */
7619e7c7 8589 case R_PPC_EMB_SDA21:
b9c361e0 8590 case R_PPC_VLE_SDA21:
7619e7c7 8591 case R_PPC_EMB_RELSDA:
b9c361e0 8592 case R_PPC_VLE_SDA21_LO:
252b5132
RH
8593 {
8594 const char *name;
8595 int reg;
86c95733 8596 unsigned int insn;
bd6c6e2b 8597 struct elf_link_hash_entry *sda = NULL;
252b5132 8598
3b4f3a11
AM
8599 if (sec == NULL || sec->output_section == NULL)
8600 {
8601 unresolved_reloc = TRUE;
8602 break;
8603 }
8604
fd361982 8605 name = bfd_section_name (sec->output_section);
93d1b056
AM
8606 if (strcmp (name, ".sdata") == 0
8607 || strcmp (name, ".sbss") == 0)
252b5132
RH
8608 {
8609 reg = 13;
bd6c6e2b 8610 sda = htab->sdata[0].sym;
252b5132 8611 }
93d1b056
AM
8612 else if (strcmp (name, ".sdata2") == 0
8613 || strcmp (name, ".sbss2") == 0)
252b5132
RH
8614 {
8615 reg = 2;
bd6c6e2b 8616 sda = htab->sdata[1].sym;
252b5132 8617 }
8da6118f
KH
8618 else if (strcmp (name, ".PPC.EMB.sdata0") == 0
8619 || strcmp (name, ".PPC.EMB.sbss0") == 0)
252b5132
RH
8620 {
8621 reg = 0;
8622 }
252b5132
RH
8623 else
8624 {
cf97bcb0 8625 _bfd_error_handler
695344c0 8626 /* xgettext:c-format */
cf97bcb0
AM
8627 (_("%pB: the target (%s) of a %s relocation is "
8628 "in the wrong output section (%s)"),
d003868e 8629 input_bfd,
55fd94b0
AM
8630 sym_name,
8631 howto->name,
8632 name);
252b5132
RH
8633
8634 bfd_set_error (bfd_error_bad_value);
b34976b6 8635 ret = FALSE;
c316a17c 8636 goto copy_reloc;
252b5132
RH
8637 }
8638
bd6c6e2b
AM
8639 if (sda != NULL)
8640 {
8641 if (!is_static_defined (sda))
8642 {
8643 unresolved_reloc = TRUE;
8644 break;
8645 }
8646 addend -= SYM_VAL (sda);
8647 }
8648
6f5601c4
AM
8649 if (r_type == R_PPC_EMB_RELSDA)
8650 break;
8651
8652 /* The PowerPC Embedded Application Binary Interface
8653 version 1.0 insanely chose to specify R_PPC_EMB_SDA21
8654 operating on a 24-bit field at r_offset. GNU as and
8655 GNU ld have always assumed R_PPC_EMB_SDA21 operates on
8656 a 32-bit bit insn at r_offset. Cope with object file
8657 producers that possibly comply with the EABI in
8658 generating an odd r_offset for big-endian objects. */
8659 if (r_type == R_PPC_EMB_SDA21)
8660 rel->r_offset &= ~1;
8661
95f0d0d2 8662 insn = bfd_get_32 (input_bfd, contents + rel->r_offset);
b9c361e0
JL
8663 if (reg == 0
8664 && (r_type == R_PPC_VLE_SDA21
8665 || r_type == R_PPC_VLE_SDA21_LO))
8666 {
86c95733
AM
8667 relocation = relocation + addend;
8668 addend = 0;
8669
8670 /* Force e_li insn, keeping RT from original insn. */
8671 insn &= 0x1f << 21;
8672 insn |= 28u << 26;
8673
8674 /* We have an li20 field, bits 17..20, 11..15, 21..31. */
8675 /* Top 4 bits of value to 17..20. */
8676 insn |= (relocation & 0xf0000) >> 5;
8677 /* Next 5 bits of the value to 11..15. */
8678 insn |= (relocation & 0xf800) << 5;
8679 /* And the final 11 bits of the value to bits 21 to 31. */
8680 insn |= relocation & 0x7ff;
8681
95f0d0d2 8682 bfd_put_32 (input_bfd, insn, contents + rel->r_offset);
c3301df1
AM
8683
8684 if (r_type == R_PPC_VLE_SDA21
8685 && ((relocation + 0x80000) & 0xffffffff) > 0x100000)
8686 goto overflow;
c316a17c 8687 goto copy_reloc;
b9c361e0 8688 }
6f5601c4
AM
8689 /* Fill in register field. */
8690 insn = (insn & ~RA_REGISTER_MASK) | (reg << RA_REGISTER_SHIFT);
95f0d0d2 8691 bfd_put_32 (input_bfd, insn, contents + rel->r_offset);
252b5132
RH
8692 }
8693 break;
8694
b9c361e0
JL
8695 case R_PPC_VLE_SDAREL_LO16A:
8696 case R_PPC_VLE_SDAREL_LO16D:
8697 case R_PPC_VLE_SDAREL_HI16A:
8698 case R_PPC_VLE_SDAREL_HI16D:
8699 case R_PPC_VLE_SDAREL_HA16A:
8700 case R_PPC_VLE_SDAREL_HA16D:
8701 {
8702 bfd_vma value;
8703 const char *name;
b9c361e0
JL
8704 struct elf_link_hash_entry *sda = NULL;
8705
8706 if (sec == NULL || sec->output_section == NULL)
8707 {
8708 unresolved_reloc = TRUE;
8709 break;
8710 }
8711
fd361982 8712 name = bfd_section_name (sec->output_section);
93d1b056
AM
8713 if (strcmp (name, ".sdata") == 0
8714 || strcmp (name, ".sbss") == 0)
5499c7c7 8715 sda = htab->sdata[0].sym;
93d1b056
AM
8716 else if (strcmp (name, ".sdata2") == 0
8717 || strcmp (name, ".sbss2") == 0)
5499c7c7 8718 sda = htab->sdata[1].sym;
b9c361e0
JL
8719 else
8720 {
4eca0228 8721 _bfd_error_handler
695344c0 8722 /* xgettext:c-format */
871b3ab2 8723 (_("%pB: the target (%s) of a %s relocation is "
b9c361e0
JL
8724 "in the wrong output section (%s)"),
8725 input_bfd,
8726 sym_name,
8727 howto->name,
8728 name);
8729
8730 bfd_set_error (bfd_error_bad_value);
8731 ret = FALSE;
c316a17c 8732 goto copy_reloc;
b9c361e0
JL
8733 }
8734
5499c7c7 8735 if (sda == NULL || !is_static_defined (sda))
b9c361e0 8736 {
5499c7c7
AM
8737 unresolved_reloc = TRUE;
8738 break;
b9c361e0 8739 }
5499c7c7 8740 value = relocation + addend - SYM_VAL (sda);
86c95733
AM
8741
8742 if (r_type == R_PPC_VLE_SDAREL_LO16A)
08dc996f
AM
8743 ppc_elf_vle_split16 (input_bfd, input_section, rel->r_offset,
8744 contents + rel->r_offset, value,
8745 split16a_type,
8746 htab->params->vle_reloc_fixup);
86c95733 8747 else if (r_type == R_PPC_VLE_SDAREL_LO16D)
08dc996f
AM
8748 ppc_elf_vle_split16 (input_bfd, input_section, rel->r_offset,
8749 contents + rel->r_offset, value,
8750 split16d_type,
8751 htab->params->vle_reloc_fixup);
86c95733 8752 else if (r_type == R_PPC_VLE_SDAREL_HI16A)
b9c361e0 8753 {
86c95733 8754 value = value >> 16;
08dc996f
AM
8755 ppc_elf_vle_split16 (input_bfd, input_section, rel->r_offset,
8756 contents + rel->r_offset, value,
8757 split16a_type,
8758 htab->params->vle_reloc_fixup);
b9c361e0 8759 }
86c95733 8760 else if (r_type == R_PPC_VLE_SDAREL_HI16D)
b9c361e0 8761 {
86c95733 8762 value = value >> 16;
08dc996f
AM
8763 ppc_elf_vle_split16 (input_bfd, input_section, rel->r_offset,
8764 contents + rel->r_offset, value,
8765 split16d_type,
8766 htab->params->vle_reloc_fixup);
b9c361e0 8767 }
86c95733 8768 else if (r_type == R_PPC_VLE_SDAREL_HA16A)
b9c361e0 8769 {
86c95733 8770 value = (value + 0x8000) >> 16;
08dc996f
AM
8771 ppc_elf_vle_split16 (input_bfd, input_section, rel->r_offset,
8772 contents + rel->r_offset, value,
8773 split16a_type,
8774 htab->params->vle_reloc_fixup);
b9c361e0 8775 }
86c95733 8776 else if (r_type == R_PPC_VLE_SDAREL_HA16D)
b9c361e0 8777 {
86c95733 8778 value = (value + 0x8000) >> 16;
08dc996f
AM
8779 ppc_elf_vle_split16 (input_bfd, input_section, rel->r_offset,
8780 contents + rel->r_offset, value,
8781 split16d_type,
8782 htab->params->vle_reloc_fixup);
b9c361e0
JL
8783 }
8784 }
c316a17c 8785 goto copy_reloc;
b9c361e0 8786
83eef883
AFB
8787 case R_PPC_VLE_ADDR20:
8788 ppc_elf_vle_split20 (output_bfd, contents + rel->r_offset, relocation);
24872cb3 8789 goto copy_reloc;
83eef883 8790
70bccea4 8791 /* Relocate against the beginning of the section. */
7619e7c7
AM
8792 case R_PPC_SECTOFF:
8793 case R_PPC_SECTOFF_LO:
8794 case R_PPC_SECTOFF_HI:
8795 case R_PPC_SECTOFF_HA:
3b4f3a11
AM
8796 if (sec == NULL || sec->output_section == NULL)
8797 {
8798 unresolved_reloc = TRUE;
8799 break;
8800 }
252b5132 8801 addend -= sec->output_section->vma;
252b5132
RH
8802 break;
8803
70bccea4 8804 /* Negative relocations. */
7619e7c7
AM
8805 case R_PPC_EMB_NADDR32:
8806 case R_PPC_EMB_NADDR16:
8807 case R_PPC_EMB_NADDR16_LO:
8808 case R_PPC_EMB_NADDR16_HI:
8809 case R_PPC_EMB_NADDR16_HA:
8da6118f 8810 addend -= 2 * relocation;
252b5132
RH
8811 break;
8812
7619e7c7
AM
8813 case R_PPC_COPY:
8814 case R_PPC_GLOB_DAT:
8815 case R_PPC_JMP_SLOT:
8816 case R_PPC_RELATIVE:
e054468f 8817 case R_PPC_IRELATIVE:
7619e7c7
AM
8818 case R_PPC_PLT32:
8819 case R_PPC_PLTREL32:
7619e7c7
AM
8820 case R_PPC_ADDR30:
8821 case R_PPC_EMB_RELSEC16:
8822 case R_PPC_EMB_RELST_LO:
8823 case R_PPC_EMB_RELST_HI:
8824 case R_PPC_EMB_RELST_HA:
8825 case R_PPC_EMB_BIT_FLD:
cf97bcb0
AM
8826 /* xgettext:c-format */
8827 _bfd_error_handler (_("%pB: %s unsupported"),
8828 input_bfd, howto->name);
252b5132
RH
8829
8830 bfd_set_error (bfd_error_invalid_operation);
b34976b6 8831 ret = FALSE;
c316a17c 8832 goto copy_reloc;
7619e7c7 8833 }
252b5132 8834
23cedd1d
AM
8835 switch (r_type)
8836 {
8837 default:
8838 break;
8839
8840 case R_PPC_PLTCALL:
8841 if (unresolved_reloc)
8842 {
8843 bfd_byte *p = contents + rel->r_offset;
8844 unsigned int insn = bfd_get_32 (input_bfd, p);
8845 insn &= 1;
8846 bfd_put_32 (input_bfd, B | insn, p);
8847 unresolved_reloc = save_unresolved_reloc;
8848 r_type = R_PPC_REL24;
8849 howto = ppc_elf_howto_table[r_type];
8850 }
8851 else if (htab->plt_type != PLT_NEW)
8852 info->callbacks->einfo
482f3505 8853 (_("%X%P: %H: %s relocation unsupported for bss-plt\n"),
23cedd1d
AM
8854 input_bfd, input_section, rel->r_offset,
8855 howto->name);
8856 break;
8857
8858 case R_PPC_PLTSEQ:
8859 case R_PPC_PLT16_HA:
8860 case R_PPC_PLT16_LO:
8861 if (unresolved_reloc)
8862 {
8863 bfd_byte *p = contents + (rel->r_offset & ~3);
8864 bfd_put_32 (input_bfd, NOP, p);
8865 unresolved_reloc = FALSE;
8866 r_type = R_PPC_NONE;
8867 howto = ppc_elf_howto_table[r_type];
8868 }
8869 else if (htab->plt_type != PLT_NEW)
8870 info->callbacks->einfo
482f3505 8871 (_("%X%P: %H: %s relocation unsupported for bss-plt\n"),
23cedd1d
AM
8872 input_bfd, input_section, rel->r_offset,
8873 howto->name);
8874 break;
8875 }
8876
7619e7c7
AM
8877 /* Do any further special processing. */
8878 switch (r_type)
8879 {
8880 default:
8881 break;
8882
8883 case R_PPC_ADDR16_HA:
d7128ce4 8884 case R_PPC_REL16_HA:
a680de9a 8885 case R_PPC_REL16DX_HA:
7619e7c7
AM
8886 case R_PPC_SECTOFF_HA:
8887 case R_PPC_TPREL16_HA:
8888 case R_PPC_DTPREL16_HA:
7619e7c7
AM
8889 case R_PPC_EMB_NADDR16_HA:
8890 case R_PPC_EMB_RELST_HA:
8891 /* It's just possible that this symbol is a weak symbol
7b609f53 8892 that's not actually defined anywhere. In that case,
7619e7c7
AM
8893 'sec' would be NULL, and we should leave the symbol
8894 alone (it will be set to zero elsewhere in the link). */
5c5f6e17
AM
8895 if (sec == NULL)
8896 break;
1a0670f3 8897 /* Fall through. */
5c5f6e17
AM
8898
8899 case R_PPC_PLT16_HA:
8900 case R_PPC_GOT16_HA:
8901 case R_PPC_GOT_TLSGD16_HA:
8902 case R_PPC_GOT_TLSLD16_HA:
8903 case R_PPC_GOT_TPREL16_HA:
8904 case R_PPC_GOT_DTPREL16_HA:
8905 /* Add 0x10000 if sign bit in 0:15 is set.
8906 Bits 0:15 are not used. */
8907 addend += 0x8000;
7619e7c7 8908 break;
1fe532cf
AM
8909
8910 case R_PPC_ADDR16:
8911 case R_PPC_ADDR16_LO:
8912 case R_PPC_GOT16:
8913 case R_PPC_GOT16_LO:
8914 case R_PPC_SDAREL16:
8915 case R_PPC_SECTOFF:
8916 case R_PPC_SECTOFF_LO:
8917 case R_PPC_DTPREL16:
8918 case R_PPC_DTPREL16_LO:
8919 case R_PPC_TPREL16:
8920 case R_PPC_TPREL16_LO:
8921 case R_PPC_GOT_TLSGD16:
8922 case R_PPC_GOT_TLSGD16_LO:
8923 case R_PPC_GOT_TLSLD16:
8924 case R_PPC_GOT_TLSLD16_LO:
8925 case R_PPC_GOT_DTPREL16:
8926 case R_PPC_GOT_DTPREL16_LO:
8927 case R_PPC_GOT_TPREL16:
8928 case R_PPC_GOT_TPREL16_LO:
8929 {
8930 /* The 32-bit ABI lacks proper relocations to deal with
8931 certain 64-bit instructions. Prevent damage to bits
8932 that make up part of the insn opcode. */
8933 unsigned int insn, mask, lobit;
8934
95f0d0d2 8935 insn = bfd_get_32 (input_bfd,
c316a17c 8936 contents + rel->r_offset - d_offset);
1fe532cf
AM
8937 mask = 0;
8938 if (is_insn_ds_form (insn))
8939 mask = 3;
8940 else if (is_insn_dq_form (insn))
8941 mask = 15;
8942 else
8943 break;
a680de9a
PB
8944 relocation += addend;
8945 addend = insn & mask;
8946 lobit = mask & relocation;
1fe532cf
AM
8947 if (lobit != 0)
8948 {
a680de9a 8949 relocation ^= lobit;
1fe532cf 8950 info->callbacks->einfo
695344c0 8951 /* xgettext:c-format */
174d0a74 8952 (_("%H: error: %s against `%s' not a multiple of %u\n"),
1fe532cf
AM
8953 input_bfd, input_section, rel->r_offset,
8954 howto->name, sym_name, mask + 1);
8955 bfd_set_error (bfd_error_bad_value);
8956 ret = FALSE;
8957 }
1fe532cf
AM
8958 }
8959 break;
252b5132
RH
8960 }
8961
252b5132 8962#ifdef DEBUG
55fd94b0
AM
8963 fprintf (stderr, "\ttype = %s (%d), name = %s, symbol index = %ld, "
8964 "offset = %ld, addend = %ld\n",
252b5132 8965 howto->name,
8da6118f 8966 (int) r_type,
252b5132
RH
8967 sym_name,
8968 r_symndx,
7619e7c7 8969 (long) rel->r_offset,
8da6118f 8970 (long) addend);
252b5132
RH
8971#endif
8972
7619e7c7
AM
8973 if (unresolved_reloc
8974 && !((input_section->flags & SEC_DEBUGGING) != 0
1d5316ab
AM
8975 && h->def_dynamic)
8976 && _bfd_elf_section_offset (output_bfd, info, input_section,
8977 rel->r_offset) != (bfd_vma) -1)
7619e7c7 8978 {
25f53a85 8979 info->callbacks->einfo
695344c0 8980 /* xgettext:c-format */
174d0a74 8981 (_("%H: unresolvable %s relocation against symbol `%s'\n"),
25f53a85 8982 input_bfd, input_section, rel->r_offset,
7b609f53 8983 howto->name,
7619e7c7
AM
8984 sym_name);
8985 ret = FALSE;
8986 }
8987
86c95733
AM
8988 /* 16-bit fields in insns mostly have signed values, but a
8989 few insns have 16-bit unsigned values. Really, we should
8990 have different reloc types. */
8991 if (howto->complain_on_overflow != complain_overflow_dont
8992 && howto->dst_mask == 0xffff
8993 && (input_section->flags & SEC_CODE) != 0)
8994 {
8995 enum complain_overflow complain = complain_overflow_signed;
8996
8997 if ((elf_section_flags (input_section) & SHF_PPC_VLE) == 0)
8998 {
8999 unsigned int insn;
9000
9001 insn = bfd_get_32 (input_bfd, contents + (rel->r_offset & ~3));
2365f8d7 9002 if ((insn & (0x3fu << 26)) == 10u << 26 /* cmpli */)
a47622ac 9003 complain = complain_overflow_bitfield;
2365f8d7
AM
9004 else if ((insn & (0x3fu << 26)) == 28u << 26 /* andi */
9005 || (insn & (0x3fu << 26)) == 24u << 26 /* ori */
9006 || (insn & (0x3fu << 26)) == 26u << 26 /* xori */)
86c95733
AM
9007 complain = complain_overflow_unsigned;
9008 }
9009 if (howto->complain_on_overflow != complain)
9010 {
9011 alt_howto = *howto;
9012 alt_howto.complain_on_overflow = complain;
9013 howto = &alt_howto;
9014 }
9015 }
9016
a680de9a
PB
9017 if (r_type == R_PPC_REL16DX_HA)
9018 {
9019 /* Split field reloc isn't handled by _bfd_final_link_relocate. */
9020 if (rel->r_offset + 4 > input_section->size)
9021 r = bfd_reloc_outofrange;
9022 else
9023 {
9024 unsigned int insn;
9025
9026 relocation += addend;
9027 relocation -= (rel->r_offset
9028 + input_section->output_offset
9029 + input_section->output_section->vma);
9030 relocation >>= 16;
9031 insn = bfd_get_32 (input_bfd, contents + rel->r_offset);
9032 insn &= ~0x1fffc1;
9033 insn |= (relocation & 0xffc1) | ((relocation & 0x3e) << 15);
9034 bfd_put_32 (input_bfd, insn, contents + rel->r_offset);
9035 r = bfd_reloc_ok;
9036 }
9037 }
9038 else
9039 r = _bfd_final_link_relocate (howto, input_bfd, input_section, contents,
9040 rel->r_offset, relocation, addend);
252b5132 9041
7619e7c7 9042 if (r != bfd_reloc_ok)
252b5132 9043 {
7619e7c7 9044 if (r == bfd_reloc_overflow)
252b5132 9045 {
c3301df1 9046 overflow:
8131c122
AM
9047 /* On code like "if (foo) foo();" don't report overflow
9048 on a branch to zero when foo is undefined. */
9049 if (!warned
9050 && !(h != NULL
9051 && (h->root.type == bfd_link_hash_undefweak
9052 || h->root.type == bfd_link_hash_undefined)
9053 && is_branch_reloc (r_type)))
1a72702b
AM
9054 info->callbacks->reloc_overflow
9055 (info, (h ? &h->root : NULL), sym_name, howto->name,
9056 rel->r_addend, input_bfd, input_section, rel->r_offset);
dc1bc0c9
RH
9057 }
9058 else
9059 {
25f53a85 9060 info->callbacks->einfo
695344c0 9061 /* xgettext:c-format */
174d0a74 9062 (_("%H: %s reloc against `%s': error %d\n"),
25f53a85
AM
9063 input_bfd, input_section, rel->r_offset,
9064 howto->name, sym_name, (int) r);
7619e7c7 9065 ret = FALSE;
252b5132
RH
9066 }
9067 }
c316a17c
AM
9068 copy_reloc:
9069 if (wrel != rel)
9070 *wrel = *rel;
9071 }
9072
9073 if (wrel != rel)
9074 {
9075 Elf_Internal_Shdr *rel_hdr;
9076 size_t deleted = rel - wrel;
9077
9078 rel_hdr = _bfd_elf_single_rel_hdr (input_section->output_section);
9079 rel_hdr->sh_size -= rel_hdr->sh_entsize * deleted;
9080 if (rel_hdr->sh_size == 0)
9081 {
9082 /* It is too late to remove an empty reloc section. Leave
9083 one NONE reloc.
9084 ??? What is wrong with an empty section??? */
9085 rel_hdr->sh_size = rel_hdr->sh_entsize;
9086 deleted -= 1;
9087 wrel++;
9088 }
9089 relend = wrel;
9090 rel_hdr = _bfd_elf_single_rel_hdr (input_section);
9091 rel_hdr->sh_size -= rel_hdr->sh_entsize * deleted;
9092 input_section->reloc_count -= deleted;
252b5132
RH
9093 }
9094
252b5132
RH
9095#ifdef DEBUG
9096 fprintf (stderr, "\n");
9097#endif
9098
53291d1f
AM
9099 if (input_section->sec_info_type == SEC_INFO_TYPE_TARGET
9100 && input_section->size != input_section->rawsize
9101 && (strcmp (input_section->output_section->name, ".init") == 0
9102 || strcmp (input_section->output_section->name, ".fini") == 0))
9103 {
9104 /* Branch around the trampolines. */
9105 unsigned int insn = B + input_section->size - input_section->rawsize;
9106 bfd_put_32 (input_bfd, insn, contents + input_section->rawsize);
9107 }
9108
5446cbdf 9109 if (htab->params->ppc476_workaround
795bc6b3 9110 && input_section->sec_info_type == SEC_INFO_TYPE_TARGET
0e1862bb 9111 && (!bfd_link_relocatable (info)
795bc6b3
AM
9112 || (input_section->output_section->alignment_power
9113 >= htab->params->pagesize_p2)))
5446cbdf 9114 {
5446cbdf 9115 bfd_vma start_addr, end_addr, addr;
795bc6b3 9116 bfd_vma pagesize = (bfd_vma) 1 << htab->params->pagesize_p2;
5446cbdf 9117
5446cbdf 9118 if (relax_info->workaround_size != 0)
40fd06d1
AM
9119 {
9120 bfd_byte *p;
9121 unsigned int n;
9122 bfd_byte fill[4];
9123
9124 bfd_put_32 (input_bfd, BA, fill);
9125 p = contents + input_section->size - relax_info->workaround_size;
9126 n = relax_info->workaround_size >> 2;
9127 while (n--)
9128 {
9129 memcpy (p, fill, 4);
9130 p += 4;
9131 }
9132 }
5446cbdf
AM
9133
9134 /* The idea is: Replace the last instruction on a page with a
9135 branch to a patch area. Put the insn there followed by a
9136 branch back to the next page. Complicated a little by
9137 needing to handle moved conditional branches, and by not
9138 wanting to touch data-in-text. */
9139
9140 start_addr = (input_section->output_section->vma
9141 + input_section->output_offset);
9142 end_addr = (start_addr + input_section->size
9143 - relax_info->workaround_size);
9144 for (addr = ((start_addr & -pagesize) + pagesize - 4);
9145 addr < end_addr;
9146 addr += pagesize)
9147 {
9148 bfd_vma offset = addr - start_addr;
9149 Elf_Internal_Rela *lo, *hi;
9150 bfd_boolean is_data;
9151 bfd_vma patch_off, patch_addr;
9152 unsigned int insn;
9153
9154 /* Do we have a data reloc at this offset? If so, leave
9155 the word alone. */
9156 is_data = FALSE;
9157 lo = relocs;
668e22e5
AM
9158 hi = relend;
9159 rel = NULL;
5446cbdf
AM
9160 while (lo < hi)
9161 {
9162 rel = lo + (hi - lo) / 2;
9163 if (rel->r_offset < offset)
9164 lo = rel + 1;
668e22e5 9165 else if (rel->r_offset > offset + 3)
5446cbdf
AM
9166 hi = rel;
9167 else
9168 {
9169 switch (ELF32_R_TYPE (rel->r_info))
9170 {
9171 case R_PPC_ADDR32:
9172 case R_PPC_UADDR32:
9173 case R_PPC_REL32:
9174 case R_PPC_ADDR30:
9175 is_data = TRUE;
9176 break;
9177 default:
9178 break;
9179 }
9180 break;
9181 }
9182 }
9183 if (is_data)
9184 continue;
9185
b4ab4364
AM
9186 /* Some instructions can be left alone too. Unconditional
9187 branches, except for bcctr with BO=0x14 (bctr, bctrl),
9188 avoid the icache failure.
9189
9190 The problem occurs due to prefetch across a page boundary
9191 where stale instructions can be fetched from the next
9192 page, and the mechanism for flushing these bad
9193 instructions fails under certain circumstances. The
9194 unconditional branches:
9195 1) Branch: b, bl, ba, bla,
9196 2) Branch Conditional: bc, bca, bcl, bcla,
9197 3) Branch Conditional to Link Register: bclr, bclrl,
9198 where (2) and (3) have BO=0x14 making them unconditional,
9199 prevent the bad prefetch because the prefetch itself is
9200 affected by these instructions. This happens even if the
9201 instruction is not executed.
9202
9203 A bctr example:
9204 .
9205 . lis 9,new_page@ha
9206 . addi 9,9,new_page@l
9207 . mtctr 9
9208 . bctr
9209 . nop
9210 . nop
9211 . new_page:
9212 .
9213 The bctr is not predicted taken due to ctr not being
9214 ready, so prefetch continues on past the bctr into the
9215 new page which might have stale instructions. If they
9216 fail to be flushed, then they will be executed after the
9217 bctr executes. Either of the following modifications
9218 prevent the bad prefetch from happening in the first
9219 place:
9220 .
1b786873
L
9221 . lis 9,new_page@ha lis 9,new_page@ha
9222 . addi 9,9,new_page@l addi 9,9,new_page@l
9223 . mtctr 9 mtctr 9
9224 . bctr bctr
b4ab4364 9225 . nop b somewhere_else
1b786873
L
9226 . b somewhere_else nop
9227 . new_page: new_page:
b4ab4364 9228 . */
5446cbdf 9229 insn = bfd_get_32 (input_bfd, contents + offset);
2365f8d7
AM
9230 if ((insn & (0x3fu << 26)) == (18u << 26) /* b,bl,ba,bla */
9231 || ((insn & (0x3fu << 26)) == (16u << 26) /* bc,bcl,bca,bcla*/
07d6d2b8 9232 && (insn & (0x14 << 21)) == (0x14 << 21)) /* with BO=0x14 */
2365f8d7 9233 || ((insn & (0x3fu << 26)) == (19u << 26)
b4ab4364 9234 && (insn & (0x3ff << 1)) == (16u << 1) /* bclr,bclrl */
07d6d2b8 9235 && (insn & (0x14 << 21)) == (0x14 << 21)))/* with BO=0x14 */
5446cbdf
AM
9236 continue;
9237
9238 patch_addr = (start_addr + input_section->size
9239 - relax_info->workaround_size);
9240 patch_addr = (patch_addr + 15) & -16;
9241 patch_off = patch_addr - start_addr;
9242 bfd_put_32 (input_bfd, B + patch_off - offset, contents + offset);
668e22e5
AM
9243
9244 if (rel != NULL
9245 && rel->r_offset >= offset
9246 && rel->r_offset < offset + 4)
9247 {
f8b44781
AM
9248 asection *sreloc;
9249
668e22e5
AM
9250 /* If the insn we are patching had a reloc, adjust the
9251 reloc r_offset so that the reloc applies to the moved
9252 location. This matters for -r and --emit-relocs. */
9253 if (rel + 1 != relend)
9254 {
9255 Elf_Internal_Rela tmp = *rel;
9256
9257 /* Keep the relocs sorted by r_offset. */
9258 memmove (rel, rel + 1, (relend - (rel + 1)) * sizeof (*rel));
9259 relend[-1] = tmp;
9260 }
9261 relend[-1].r_offset += patch_off - offset;
f8b44781
AM
9262
9263 /* Adjust REL16 addends too. */
9264 switch (ELF32_R_TYPE (relend[-1].r_info))
9265 {
9266 case R_PPC_REL16:
9267 case R_PPC_REL16_LO:
9268 case R_PPC_REL16_HI:
9269 case R_PPC_REL16_HA:
9270 relend[-1].r_addend += patch_off - offset;
9271 break;
9272 default:
9273 break;
9274 }
9275
9276 /* If we are building a PIE or shared library with
9277 non-PIC objects, perhaps we had a dynamic reloc too?
9278 If so, the dynamic reloc must move with the insn. */
9279 sreloc = elf_section_data (input_section)->sreloc;
9280 if (sreloc != NULL)
9281 {
1d5c94cb 9282 Elf32_External_Rela *slo, *shi, *srelend;
f8b44781
AM
9283 bfd_vma soffset;
9284
1d5c94cb
AM
9285 slo = (Elf32_External_Rela *) sreloc->contents;
9286 shi = srelend = slo + sreloc->reloc_count;
f8b44781
AM
9287 soffset = (offset + input_section->output_section->vma
9288 + input_section->output_offset);
9289 while (slo < shi)
9290 {
1d5c94cb
AM
9291 Elf32_External_Rela *srel = slo + (shi - slo) / 2;
9292 bfd_elf32_swap_reloca_in (output_bfd, (bfd_byte *) srel,
9293 &outrel);
f8b44781
AM
9294 if (outrel.r_offset < soffset)
9295 slo = srel + 1;
9296 else if (outrel.r_offset > soffset + 3)
9297 shi = srel;
9298 else
9299 {
1d5c94cb 9300 if (srel + 1 != srelend)
f8b44781 9301 {
1d5c94cb
AM
9302 memmove (srel, srel + 1,
9303 (srelend - (srel + 1)) * sizeof (*srel));
9304 srel = srelend - 1;
f8b44781
AM
9305 }
9306 outrel.r_offset += patch_off - offset;
1d5c94cb
AM
9307 bfd_elf32_swap_reloca_out (output_bfd, &outrel,
9308 (bfd_byte *) srel);
f8b44781
AM
9309 break;
9310 }
9311 }
9312 }
668e22e5
AM
9313 }
9314 else
9315 rel = NULL;
9316
2365f8d7 9317 if ((insn & (0x3fu << 26)) == (16u << 26) /* bc */
5446cbdf
AM
9318 && (insn & 2) == 0 /* relative */)
9319 {
9320 bfd_vma delta = ((insn & 0xfffc) ^ 0x8000) - 0x8000;
9321
9322 delta += offset - patch_off;
0e1862bb 9323 if (bfd_link_relocatable (info) && rel != NULL)
668e22e5 9324 delta = 0;
0e1862bb 9325 if (!bfd_link_relocatable (info) && rel != NULL)
668e22e5
AM
9326 {
9327 enum elf_ppc_reloc_type r_type;
9328
9329 r_type = ELF32_R_TYPE (relend[-1].r_info);
9330 if (r_type == R_PPC_REL14_BRTAKEN)
9331 insn |= BRANCH_PREDICT_BIT;
9332 else if (r_type == R_PPC_REL14_BRNTAKEN)
9333 insn &= ~BRANCH_PREDICT_BIT;
9334 else
9335 BFD_ASSERT (r_type == R_PPC_REL14);
9336
9337 if ((r_type == R_PPC_REL14_BRTAKEN
9338 || r_type == R_PPC_REL14_BRNTAKEN)
9339 && delta + 0x8000 < 0x10000
9340 && (bfd_signed_vma) delta < 0)
9341 insn ^= BRANCH_PREDICT_BIT;
9342 }
5446cbdf
AM
9343 if (delta + 0x8000 < 0x10000)
9344 {
9345 bfd_put_32 (input_bfd,
9346 (insn & ~0xfffc) | (delta & 0xfffc),
9347 contents + patch_off);
9348 patch_off += 4;
9349 bfd_put_32 (input_bfd,
9350 B | ((offset + 4 - patch_off) & 0x3fffffc),
9351 contents + patch_off);
9352 patch_off += 4;
9353 }
9354 else
9355 {
668e22e5
AM
9356 if (rel != NULL)
9357 {
9358 unsigned int r_sym = ELF32_R_SYM (relend[-1].r_info);
9359
9360 relend[-1].r_offset += 8;
9361 relend[-1].r_info = ELF32_R_INFO (r_sym, R_PPC_REL24);
9362 }
5446cbdf
AM
9363 bfd_put_32 (input_bfd,
9364 (insn & ~0xfffc) | 8,
9365 contents + patch_off);
9366 patch_off += 4;
9367 bfd_put_32 (input_bfd,
9368 B | ((offset + 4 - patch_off) & 0x3fffffc),
9369 contents + patch_off);
9370 patch_off += 4;
9371 bfd_put_32 (input_bfd,
9372 B | ((delta - 8) & 0x3fffffc),
9373 contents + patch_off);
9374 patch_off += 4;
9375 }
9376 }
9377 else
9378 {
9379 bfd_put_32 (input_bfd, insn, contents + patch_off);
9380 patch_off += 4;
9381 bfd_put_32 (input_bfd,
9382 B | ((offset + 4 - patch_off) & 0x3fffffc),
9383 contents + patch_off);
9384 patch_off += 4;
9385 }
9386 BFD_ASSERT (patch_off <= input_section->size);
9387 relax_info->workaround_size = input_section->size - patch_off;
9388 }
9389 }
9390
252b5132
RH
9391 return ret;
9392}
252b5132 9393\f
49c09209 9394/* Write out the PLT relocs and entries for H. */
c5fccbec 9395
b34976b6 9396static bfd_boolean
49c09209 9397write_global_sym_plt (struct elf_link_hash_entry *h, void *inf)
e1a9cb8e 9398{
49c09209
AM
9399 struct bfd_link_info *info = (struct bfd_link_info *) inf;
9400 struct ppc_elf_link_hash_table *htab = ppc_elf_hash_table (info);
a6aa5195
AM
9401 struct plt_entry *ent;
9402 bfd_boolean doneone;
e1a9cb8e 9403
a6aa5195
AM
9404 doneone = FALSE;
9405 for (ent = h->plt.plist; ent != NULL; ent = ent->next)
9406 if (ent->plt.offset != (bfd_vma) -1)
9407 {
9408 if (!doneone)
9409 {
9410 Elf_Internal_Rela rela;
9411 bfd_byte *loc;
9412 bfd_vma reloc_index;
2d7ad24e
AM
9413 asection *plt = htab->elf.splt;
9414 asection *relplt = htab->elf.srelplt;
e1a9cb8e 9415
e054468f 9416 if (htab->plt_type == PLT_NEW
25f23106
AM
9417 || !htab->elf.dynamic_sections_created
9418 || h->dynindx == -1)
9d8504b1
PB
9419 reloc_index = ent->plt.offset / 4;
9420 else
9421 {
9422 reloc_index = ((ent->plt.offset - htab->plt_initial_entry_size)
9423 / htab->plt_slot_size);
9424 if (reloc_index > PLT_NUM_SINGLE_ENTRIES
4a3dc543 9425 && htab->plt_type == PLT_OLD)
9d8504b1
PB
9426 reloc_index -= (reloc_index - PLT_NUM_SINGLE_ENTRIES) / 2;
9427 }
9428
a6aa5195
AM
9429 /* This symbol has an entry in the procedure linkage table.
9430 Set it up. */
e054468f 9431 if (htab->plt_type == PLT_VXWORKS
25f23106
AM
9432 && htab->elf.dynamic_sections_created
9433 && h->dynindx != -1)
a6aa5195 9434 {
9d8504b1
PB
9435 bfd_vma got_offset;
9436 const bfd_vma *plt_entry;
5b914448 9437
9d8504b1
PB
9438 /* The first three entries in .got.plt are reserved. */
9439 got_offset = (reloc_index + 3) * 4;
9440
9441 /* Use the right PLT. */
0e1862bb 9442 plt_entry = bfd_link_pic (info) ? ppc_elf_vxworks_pic_plt_entry
9d8504b1
PB
9443 : ppc_elf_vxworks_plt_entry;
9444
9445 /* Fill in the .plt on VxWorks. */
0e1862bb 9446 if (bfd_link_pic (info))
9d8504b1 9447 {
49c09209 9448 bfd_put_32 (info->output_bfd,
e87d4038 9449 plt_entry[0] | PPC_HA (got_offset),
2d7ad24e 9450 plt->contents + ent->plt.offset + 0);
49c09209 9451 bfd_put_32 (info->output_bfd,
e87d4038 9452 plt_entry[1] | PPC_LO (got_offset),
2d7ad24e 9453 plt->contents + ent->plt.offset + 4);
9d8504b1
PB
9454 }
9455 else
9456 {
e87d4038 9457 bfd_vma got_loc = got_offset + SYM_VAL (htab->elf.hgot);
9d8504b1 9458
49c09209 9459 bfd_put_32 (info->output_bfd,
e87d4038 9460 plt_entry[0] | PPC_HA (got_loc),
2d7ad24e 9461 plt->contents + ent->plt.offset + 0);
49c09209 9462 bfd_put_32 (info->output_bfd,
e87d4038 9463 plt_entry[1] | PPC_LO (got_loc),
2d7ad24e 9464 plt->contents + ent->plt.offset + 4);
9d8504b1
PB
9465 }
9466
49c09209 9467 bfd_put_32 (info->output_bfd, plt_entry[2],
2d7ad24e 9468 plt->contents + ent->plt.offset + 8);
49c09209 9469 bfd_put_32 (info->output_bfd, plt_entry[3],
2d7ad24e 9470 plt->contents + ent->plt.offset + 12);
9d8504b1
PB
9471
9472 /* This instruction is an immediate load. The value loaded is
9473 the byte offset of the R_PPC_JMP_SLOT relocation from the
9474 start of the .rela.plt section. The value is stored in the
9475 low-order 16 bits of the load instruction. */
9476 /* NOTE: It appears that this is now an index rather than a
9477 prescaled offset. */
49c09209 9478 bfd_put_32 (info->output_bfd,
9d8504b1 9479 plt_entry[4] | reloc_index,
2d7ad24e 9480 plt->contents + ent->plt.offset + 16);
9d8504b1
PB
9481 /* This instruction is a PC-relative branch whose target is
9482 the start of the PLT section. The address of this branch
9483 instruction is 20 bytes beyond the start of this PLT entry.
9484 The address is encoded in bits 6-29, inclusive. The value
9485 stored is right-shifted by two bits, permitting a 26-bit
9486 offset. */
49c09209 9487 bfd_put_32 (info->output_bfd,
5b914448 9488 (plt_entry[5]
9d8504b1 9489 | (-(ent->plt.offset + 20) & 0x03fffffc)),
2d7ad24e 9490 plt->contents + ent->plt.offset + 20);
49c09209 9491 bfd_put_32 (info->output_bfd, plt_entry[6],
2d7ad24e 9492 plt->contents + ent->plt.offset + 24);
49c09209 9493 bfd_put_32 (info->output_bfd, plt_entry[7],
2d7ad24e 9494 plt->contents + ent->plt.offset + 28);
9d8504b1
PB
9495
9496 /* Fill in the GOT entry corresponding to this PLT slot with
a8685210 9497 the address immediately after the "bctr" instruction
9d8504b1 9498 in this PLT entry. */
2d7ad24e
AM
9499 bfd_put_32 (info->output_bfd, (plt->output_section->vma
9500 + plt->output_offset
9501 + ent->plt.offset + 16),
ce558b89 9502 htab->elf.sgotplt->contents + got_offset);
9d8504b1 9503
0e1862bb 9504 if (!bfd_link_pic (info))
9d8504b1
PB
9505 {
9506 /* Fill in a couple of entries in .rela.plt.unloaded. */
9507 loc = htab->srelplt2->contents
9508 + ((VXWORKS_PLTRESOLVE_RELOCS + reloc_index
9509 * VXWORKS_PLT_NON_JMP_SLOT_RELOCS)
9510 * sizeof (Elf32_External_Rela));
9511
9512 /* Provide the @ha relocation for the first instruction. */
2d7ad24e
AM
9513 rela.r_offset = (plt->output_section->vma
9514 + plt->output_offset
9d8504b1 9515 + ent->plt.offset + 2);
636ce3f5 9516 rela.r_info = ELF32_R_INFO (htab->elf.hgot->indx,
9d8504b1
PB
9517 R_PPC_ADDR16_HA);
9518 rela.r_addend = got_offset;
49c09209 9519 bfd_elf32_swap_reloca_out (info->output_bfd, &rela, loc);
9d8504b1
PB
9520 loc += sizeof (Elf32_External_Rela);
9521
9522 /* Provide the @l relocation for the second instruction. */
2d7ad24e
AM
9523 rela.r_offset = (plt->output_section->vma
9524 + plt->output_offset
9d8504b1 9525 + ent->plt.offset + 6);
636ce3f5 9526 rela.r_info = ELF32_R_INFO (htab->elf.hgot->indx,
9d8504b1
PB
9527 R_PPC_ADDR16_LO);
9528 rela.r_addend = got_offset;
49c09209 9529 bfd_elf32_swap_reloca_out (info->output_bfd, &rela, loc);
9d8504b1
PB
9530 loc += sizeof (Elf32_External_Rela);
9531
9532 /* Provide a relocation for the GOT entry corresponding to this
9533 PLT slot. Point it at the middle of the .plt entry. */
ce558b89
AM
9534 rela.r_offset = (htab->elf.sgotplt->output_section->vma
9535 + htab->elf.sgotplt->output_offset
9d8504b1 9536 + got_offset);
7325306f 9537 rela.r_info = ELF32_R_INFO (htab->elf.hplt->indx,
9d8504b1
PB
9538 R_PPC_ADDR32);
9539 rela.r_addend = ent->plt.offset + 16;
49c09209 9540 bfd_elf32_swap_reloca_out (info->output_bfd, &rela, loc);
9d8504b1
PB
9541 }
9542
9543 /* VxWorks uses non-standard semantics for R_PPC_JMP_SLOT.
9544 In particular, the offset for the relocation is not the
9545 address of the PLT entry for this function, as specified
9546 by the ABI. Instead, the offset is set to the address of
9547 the GOT slot for this function. See EABI 4.4.4.1. */
ce558b89
AM
9548 rela.r_offset = (htab->elf.sgotplt->output_section->vma
9549 + htab->elf.sgotplt->output_offset
9d8504b1 9550 + got_offset);
2d7ad24e 9551 rela.r_addend = 0;
a6aa5195
AM
9552 }
9553 else
9554 {
2d7ad24e 9555 rela.r_addend = 0;
25f23106
AM
9556 if (!htab->elf.dynamic_sections_created
9557 || h->dynindx == -1)
2d7ad24e
AM
9558 {
9559 if (h->type == STT_GNU_IFUNC)
9560 {
9561 plt = htab->elf.iplt;
9562 relplt = htab->elf.irelplt;
9563 }
9564 else
9565 {
9566 plt = htab->pltlocal;
9567 relplt = bfd_link_pic (info) ? htab->relpltlocal : NULL;
9568 }
9569 if (h->def_regular
9570 && (h->root.type == bfd_link_hash_defined
9571 || h->root.type == bfd_link_hash_defweak))
9572 rela.r_addend = SYM_VAL (h);
9573 }
e054468f 9574
2d7ad24e 9575 if (relplt == NULL)
9d8504b1 9576 {
2d7ad24e
AM
9577 loc = plt->contents + ent->plt.offset;
9578 bfd_put_32 (info->output_bfd, rela.r_addend, loc);
9d8504b1
PB
9579 }
9580 else
9581 {
2d7ad24e
AM
9582 rela.r_offset = (plt->output_section->vma
9583 + plt->output_offset
9584 + ent->plt.offset);
9585
9586 if (htab->plt_type == PLT_OLD
9587 || !htab->elf.dynamic_sections_created
9588 || h->dynindx == -1)
9589 {
9590 /* We don't need to fill in the .plt. The ppc dynamic
9591 linker will fill it in. */
9592 }
9593 else
9594 {
9595 bfd_vma val = (htab->glink_pltresolve + ent->plt.offset
9596 + htab->glink->output_section->vma
9597 + htab->glink->output_offset);
9598 bfd_put_32 (info->output_bfd, val,
9599 plt->contents + ent->plt.offset);
9600 }
9d8504b1 9601 }
a6aa5195 9602 }
e1a9cb8e 9603
2d7ad24e 9604 if (relplt != NULL)
e054468f 9605 {
2d7ad24e
AM
9606 /* Fill in the entry in the .rela.plt section. */
9607 if (!htab->elf.dynamic_sections_created
9608 || h->dynindx == -1)
9609 {
9610 if (h->type == STT_GNU_IFUNC)
9611 rela.r_info = ELF32_R_INFO (0, R_PPC_IRELATIVE);
9612 else
9613 rela.r_info = ELF32_R_INFO (0, R_PPC_RELATIVE);
9614 loc = relplt->contents + (relplt->reloc_count++
9615 * sizeof (Elf32_External_Rela));
9616 htab->local_ifunc_resolver = 1;
9617 }
9618 else
9619 {
9620 rela.r_info = ELF32_R_INFO (h->dynindx, R_PPC_JMP_SLOT);
9621 loc = relplt->contents + (reloc_index
9622 * sizeof (Elf32_External_Rela));
9623 if (h->type == STT_GNU_IFUNC && is_static_defined (h))
9624 htab->maybe_local_ifunc_resolver = 1;
9625 }
9626 bfd_elf32_swap_reloca_out (info->output_bfd, &rela, loc);
82e66161 9627 }
a6aa5195
AM
9628 doneone = TRUE;
9629 }
e1a9cb8e 9630
e054468f 9631 if (htab->plt_type == PLT_NEW
25f23106
AM
9632 || !htab->elf.dynamic_sections_created
9633 || h->dynindx == -1)
a6aa5195 9634 {
a7f2871e 9635 unsigned char *p;
49c09209 9636 asection *plt = htab->elf.splt;
9e390558 9637
25f23106
AM
9638 if (!htab->elf.dynamic_sections_created
9639 || h->dynindx == -1)
2d7ad24e
AM
9640 {
9641 if (h->type == STT_GNU_IFUNC)
9642 plt = htab->elf.iplt;
9643 else
9644 break;
9645 }
e1a9cb8e 9646
a7f2871e 9647 p = (unsigned char *) htab->glink->contents + ent->glink_offset;
49c09209 9648 write_glink_stub (h, ent, plt, p, info);
e1a9cb8e 9649
0e1862bb 9650 if (!bfd_link_pic (info))
e054468f
AM
9651 /* We only need one non-PIC glink stub. */
9652 break;
a6aa5195
AM
9653 }
9654 else
9655 break;
9656 }
49c09209
AM
9657 return TRUE;
9658}
9659
9660/* Finish up PLT handling. */
9661
9662bfd_boolean
9663ppc_finish_symbols (struct bfd_link_info *info)
9664{
9665 struct ppc_elf_link_hash_table *htab = ppc_elf_hash_table (info);
9666 bfd *ibfd;
9667
9668 if (!htab)
9669 return TRUE;
9670
9671 elf_link_hash_traverse (&htab->elf, write_global_sym_plt, info);
9672
9673 for (ibfd = info->input_bfds; ibfd != NULL; ibfd = ibfd->link.next)
9674 {
9675 bfd_vma *local_got, *end_local_got;
9676 struct plt_entry **local_plt, **lplt, **end_local_plt;
9677 Elf_Internal_Shdr *symtab_hdr;
9678 bfd_size_type locsymcount;
9679 Elf_Internal_Sym *local_syms = NULL;
9680 struct plt_entry *ent;
9681
9682 if (!is_ppc_elf (ibfd))
9683 continue;
9684
9685 local_got = elf_local_got_offsets (ibfd);
9686 if (!local_got)
9687 continue;
9688
9689 symtab_hdr = &elf_symtab_hdr (ibfd);
9690 locsymcount = symtab_hdr->sh_info;
9691 end_local_got = local_got + locsymcount;
9692 local_plt = (struct plt_entry **) end_local_got;
9693 end_local_plt = local_plt + locsymcount;
9694 for (lplt = local_plt; lplt < end_local_plt; ++lplt)
9695 for (ent = *lplt; ent != NULL; ent = ent->next)
9696 {
9697 if (ent->plt.offset != (bfd_vma) -1)
9698 {
9699 Elf_Internal_Sym *sym;
9700 asection *sym_sec;
9701 asection *plt, *relplt;
9702 bfd_byte *loc;
9703 bfd_vma val;
9704 Elf_Internal_Rela rela;
8cd1fe1b 9705 unsigned char *p;
49c09209
AM
9706
9707 if (!get_sym_h (NULL, &sym, &sym_sec, NULL, &local_syms,
9708 lplt - local_plt, ibfd))
9709 {
9710 if (local_syms != NULL
9711 && symtab_hdr->contents != (unsigned char *) local_syms)
9712 free (local_syms);
9713 return FALSE;
9714 }
9715
9716 val = sym->st_value;
9717 if (sym_sec != NULL && sym_sec->output_section != NULL)
9718 val += sym_sec->output_offset + sym_sec->output_section->vma;
9719
2d7ad24e
AM
9720 if (ELF_ST_TYPE (sym->st_info) == STT_GNU_IFUNC)
9721 {
9722 htab->local_ifunc_resolver = 1;
9723 plt = htab->elf.iplt;
9724 relplt = htab->elf.irelplt;
9725 rela.r_info = ELF32_R_INFO (0, R_PPC_IRELATIVE);
9726 }
9727 else
9728 {
9729 plt = htab->pltlocal;
9730 if (bfd_link_pic (info))
9731 {
9732 relplt = htab->relpltlocal;
9733 rela.r_info = ELF32_R_INFO (0, R_PPC_RELATIVE);
9734 }
9735 else
9736 {
9737 loc = plt->contents + ent->plt.offset;
9738 bfd_put_32 (info->output_bfd, val, loc);
9739 continue;
9740 }
9741 }
49c09209
AM
9742
9743 rela.r_offset = (ent->plt.offset
9744 + plt->output_offset
9745 + plt->output_section->vma);
49c09209
AM
9746 rela.r_addend = val;
9747 loc = relplt->contents + (relplt->reloc_count++
9748 * sizeof (Elf32_External_Rela));
9749 bfd_elf32_swap_reloca_out (info->output_bfd, &rela, loc);
49c09209 9750
8cd1fe1b 9751 p = (unsigned char *) htab->glink->contents + ent->glink_offset;
49c09209 9752 write_glink_stub (NULL, ent, htab->elf.iplt, p, info);
49c09209
AM
9753 }
9754 }
9755
9756 if (local_syms != NULL
9757 && symtab_hdr->contents != (unsigned char *) local_syms)
9758 {
9759 if (!info->keep_memory)
9760 free (local_syms);
9761 else
9762 symtab_hdr->contents = (unsigned char *) local_syms;
9763 }
9764 }
9765 return TRUE;
9766}
9767
9768/* Finish up dynamic symbol handling. We set the contents of various
9769 dynamic sections here. */
9770
9771static bfd_boolean
9772ppc_elf_finish_dynamic_symbol (bfd *output_bfd,
9773 struct bfd_link_info *info,
9774 struct elf_link_hash_entry *h,
9775 Elf_Internal_Sym *sym)
9776{
9777 struct ppc_elf_link_hash_table *htab = ppc_elf_hash_table (info);
9778 struct plt_entry *ent;
9779
9780#ifdef DEBUG
9781 fprintf (stderr, "ppc_elf_finish_dynamic_symbol called for %s",
9782 h->root.root.string);
9783#endif
9784
9785 if (!h->def_regular
9786 || (h->type == STT_GNU_IFUNC && !bfd_link_pic (info)))
9787 for (ent = h->plt.plist; ent != NULL; ent = ent->next)
9788 if (ent->plt.offset != (bfd_vma) -1)
9789 {
9790 if (!h->def_regular)
9791 {
9792 /* Mark the symbol as undefined, rather than as
9793 defined in the .plt section. Leave the value if
9794 there were any relocations where pointer equality
9795 matters (this is a clue for the dynamic linker, to
9796 make function pointer comparisons work between an
9797 application and shared library), otherwise set it
9798 to zero. */
9799 sym->st_shndx = SHN_UNDEF;
9800 if (!h->pointer_equality_needed)
9801 sym->st_value = 0;
9802 else if (!h->ref_regular_nonweak)
9803 {
9804 /* This breaks function pointer comparisons, but
9805 that is better than breaking tests for a NULL
9806 function pointer. */
9807 sym->st_value = 0;
9808 }
9809 }
9810 else
9811 {
9812 /* Set the value of ifunc symbols in a non-pie
9813 executable to the glink entry. This is to avoid
9814 text relocations. We can't do this for ifunc in
9815 allocate_dynrelocs, as we do for normal dynamic
9816 function symbols with plt entries, because we need
9817 to keep the original value around for the ifunc
9818 relocation. */
9819 sym->st_shndx
9820 = (_bfd_elf_section_from_bfd_section
9821 (info->output_bfd, htab->glink->output_section));
9822 sym->st_value = (ent->glink_offset
9823 + htab->glink->output_offset
9824 + htab->glink->output_section->vma);
9825 }
9826 break;
9827 }
e1a9cb8e 9828
25dbc73a
AM
9829 if (h->needs_copy)
9830 {
9831 asection *s;
9832 Elf_Internal_Rela rela;
9833 bfd_byte *loc;
e1a9cb8e 9834
25dbc73a 9835 /* This symbols needs a copy reloc. Set it up. */
e1a9cb8e 9836
25dbc73a
AM
9837#ifdef DEBUG
9838 fprintf (stderr, ", copy");
9839#endif
e1a9cb8e 9840
25dbc73a 9841 BFD_ASSERT (h->dynindx != -1);
86bbe32f 9842
4dc4a9a5 9843 if (ppc_elf_hash_entry (h)->has_sda_refs)
25dbc73a 9844 s = htab->relsbss;
afbf7e8e 9845 else if (h->root.u.def.section == htab->elf.sdynrelro)
5474d94f 9846 s = htab->elf.sreldynrelro;
25dbc73a 9847 else
9d19e4fd 9848 s = htab->elf.srelbss;
25dbc73a 9849 BFD_ASSERT (s != NULL);
e1a9cb8e 9850
e87d4038 9851 rela.r_offset = SYM_VAL (h);
25dbc73a
AM
9852 rela.r_info = ELF32_R_INFO (h->dynindx, R_PPC_COPY);
9853 rela.r_addend = 0;
9854 loc = s->contents + s->reloc_count++ * sizeof (Elf32_External_Rela);
9855 bfd_elf32_swap_reloca_out (output_bfd, &rela, loc);
9856 }
e1a9cb8e 9857
25dbc73a
AM
9858#ifdef DEBUG
9859 fprintf (stderr, "\n");
9860#endif
e1a9cb8e 9861
25dbc73a
AM
9862 return TRUE;
9863}
9864\f
9865static enum elf_reloc_type_class
7e612e98
AM
9866ppc_elf_reloc_type_class (const struct bfd_link_info *info,
9867 const asection *rel_sec,
9868 const Elf_Internal_Rela *rela)
e1a9cb8e 9869{
7e612e98
AM
9870 struct ppc_elf_link_hash_table *htab = ppc_elf_hash_table (info);
9871
ce558b89 9872 if (rel_sec == htab->elf.irelplt)
7e612e98
AM
9873 return reloc_class_ifunc;
9874
25dbc73a
AM
9875 switch (ELF32_R_TYPE (rela->r_info))
9876 {
9877 case R_PPC_RELATIVE:
9878 return reloc_class_relative;
25dbc73a
AM
9879 case R_PPC_JMP_SLOT:
9880 return reloc_class_plt;
9881 case R_PPC_COPY:
9882 return reloc_class_copy;
9883 default:
9884 return reloc_class_normal;
9885 }
e1a9cb8e 9886}
25dbc73a
AM
9887\f
9888/* Finish up the dynamic sections. */
e1a9cb8e 9889
25dbc73a
AM
9890static bfd_boolean
9891ppc_elf_finish_dynamic_sections (bfd *output_bfd,
9892 struct bfd_link_info *info)
e1a9cb8e 9893{
25dbc73a
AM
9894 asection *sdyn;
9895 struct ppc_elf_link_hash_table *htab;
1fe44d79 9896 bfd_vma got;
e87d4038
AM
9897 bfd *dynobj;
9898 bfd_boolean ret = TRUE;
e1a9cb8e 9899
25dbc73a
AM
9900#ifdef DEBUG
9901 fprintf (stderr, "ppc_elf_finish_dynamic_sections called\n");
9902#endif
6b0817e5 9903
25dbc73a 9904 htab = ppc_elf_hash_table (info);
ce558b89 9905 dynobj = htab->elf.dynobj;
3d4d4302 9906 sdyn = bfd_get_linker_section (dynobj, ".dynamic");
e1a9cb8e 9907
1fe44d79
AM
9908 got = 0;
9909 if (htab->elf.hgot != NULL)
e87d4038 9910 got = SYM_VAL (htab->elf.hgot);
1fe44d79 9911
25dbc73a 9912 if (htab->elf.dynamic_sections_created)
e1a9cb8e 9913 {
25dbc73a 9914 Elf32_External_Dyn *dyncon, *dynconend;
e1a9cb8e 9915
ce558b89 9916 BFD_ASSERT (htab->elf.splt != NULL && sdyn != NULL);
86bbe32f 9917
25dbc73a
AM
9918 dyncon = (Elf32_External_Dyn *) sdyn->contents;
9919 dynconend = (Elf32_External_Dyn *) (sdyn->contents + sdyn->size);
9920 for (; dyncon < dynconend; dyncon++)
9921 {
9922 Elf_Internal_Dyn dyn;
9923 asection *s;
e1a9cb8e 9924
9d8504b1 9925 bfd_elf32_swap_dyn_in (dynobj, dyncon, &dyn);
86bbe32f 9926
25dbc73a
AM
9927 switch (dyn.d_tag)
9928 {
9929 case DT_PLTGOT:
9d8504b1 9930 if (htab->is_vxworks)
ce558b89 9931 s = htab->elf.sgotplt;
9d8504b1 9932 else
ce558b89 9933 s = htab->elf.splt;
25dbc73a
AM
9934 dyn.d_un.d_ptr = s->output_section->vma + s->output_offset;
9935 break;
86bbe32f 9936
25dbc73a 9937 case DT_PLTRELSZ:
ce558b89 9938 dyn.d_un.d_val = htab->elf.srelplt->size;
25dbc73a 9939 break;
e1a9cb8e 9940
25dbc73a 9941 case DT_JMPREL:
ce558b89 9942 s = htab->elf.srelplt;
25dbc73a
AM
9943 dyn.d_un.d_ptr = s->output_section->vma + s->output_offset;
9944 break;
2f89ff8d 9945
1fe44d79
AM
9946 case DT_PPC_GOT:
9947 dyn.d_un.d_ptr = got;
d7128ce4
AM
9948 break;
9949
82e66161
AM
9950 case DT_TEXTREL:
9951 if (htab->local_ifunc_resolver)
9952 info->callbacks->einfo
9953 (_("%X%P: text relocations and GNU indirect "
9954 "functions will result in a segfault at runtime\n"));
9955 else if (htab->maybe_local_ifunc_resolver)
9956 info->callbacks->einfo
9957 (_("%P: warning: text relocations and GNU indirect "
9958 "functions may result in a segfault at runtime\n"));
9959 continue;
9960
25dbc73a 9961 default:
7a2b07ff
NS
9962 if (htab->is_vxworks
9963 && elf_vxworks_finish_dynamic_entry (output_bfd, &dyn))
9964 break;
25dbc73a
AM
9965 continue;
9966 }
4c45e5c9 9967
25dbc73a
AM
9968 bfd_elf32_swap_dyn_out (output_bfd, &dyn, dyncon);
9969 }
9970 }
4c45e5c9 9971
6528b6eb
AM
9972 if (htab->elf.sgot != NULL
9973 && htab->elf.sgot->output_section != bfd_abs_section_ptr)
25dbc73a 9974 {
ce558b89
AM
9975 if (htab->elf.hgot->root.u.def.section == htab->elf.sgot
9976 || htab->elf.hgot->root.u.def.section == htab->elf.sgotplt)
e87d4038 9977 {
e79f5955 9978 unsigned char *p = htab->elf.hgot->root.u.def.section->contents;
2f89ff8d 9979
e87d4038
AM
9980 p += htab->elf.hgot->root.u.def.value;
9981 if (htab->plt_type == PLT_OLD)
e79f5955
AM
9982 {
9983 /* Add a blrl instruction at _GLOBAL_OFFSET_TABLE_-4
9984 so that a function can easily find the address of
9985 _GLOBAL_OFFSET_TABLE_. */
9986 BFD_ASSERT (htab->elf.hgot->root.u.def.value - 4
9987 < htab->elf.hgot->root.u.def.section->size);
9988 bfd_put_32 (output_bfd, 0x4e800021, p - 4);
9989 }
3b36f7e6 9990
e87d4038 9991 if (sdyn != NULL)
e79f5955
AM
9992 {
9993 bfd_vma val = sdyn->output_section->vma + sdyn->output_offset;
9994 BFD_ASSERT (htab->elf.hgot->root.u.def.value
9995 < htab->elf.hgot->root.u.def.section->size);
9996 bfd_put_32 (output_bfd, val, p);
9997 }
e87d4038
AM
9998 }
9999 else
10000 {
695344c0 10001 /* xgettext:c-format */
cf97bcb0
AM
10002 _bfd_error_handler (_("%s not defined in linker created %pA"),
10003 htab->elf.hgot->root.root.string,
10004 (htab->elf.sgotplt != NULL
10005 ? htab->elf.sgotplt : htab->elf.sgot));
e87d4038
AM
10006 bfd_set_error (bfd_error_bad_value);
10007 ret = FALSE;
10008 }
25dbc73a 10009
ce558b89 10010 elf_section_data (htab->elf.sgot->output_section)->this_hdr.sh_entsize = 4;
25dbc73a
AM
10011 }
10012
9d8504b1 10013 /* Fill in the first entry in the VxWorks procedure linkage table. */
6528b6eb
AM
10014 if (htab->is_vxworks
10015 && htab->elf.splt != NULL
10016 && htab->elf.splt->size != 0
10017 && htab->elf.splt->output_section != bfd_abs_section_ptr)
9d8504b1 10018 {
6528b6eb 10019 asection *splt = htab->elf.splt;
9d8504b1 10020 /* Use the right PLT. */
0e1862bb 10021 const bfd_vma *plt_entry = (bfd_link_pic (info)
5b914448
AM
10022 ? ppc_elf_vxworks_pic_plt0_entry
10023 : ppc_elf_vxworks_plt0_entry);
9d8504b1 10024
0e1862bb 10025 if (!bfd_link_pic (info))
9d8504b1 10026 {
e87d4038 10027 bfd_vma got_value = SYM_VAL (htab->elf.hgot);
9d8504b1 10028
e87d4038 10029 bfd_put_32 (output_bfd, plt_entry[0] | PPC_HA (got_value),
9d8504b1 10030 splt->contents + 0);
e87d4038 10031 bfd_put_32 (output_bfd, plt_entry[1] | PPC_LO (got_value),
9d8504b1
PB
10032 splt->contents + 4);
10033 }
10034 else
10035 {
10036 bfd_put_32 (output_bfd, plt_entry[0], splt->contents + 0);
10037 bfd_put_32 (output_bfd, plt_entry[1], splt->contents + 4);
10038 }
10039 bfd_put_32 (output_bfd, plt_entry[2], splt->contents + 8);
10040 bfd_put_32 (output_bfd, plt_entry[3], splt->contents + 12);
10041 bfd_put_32 (output_bfd, plt_entry[4], splt->contents + 16);
10042 bfd_put_32 (output_bfd, plt_entry[5], splt->contents + 20);
10043 bfd_put_32 (output_bfd, plt_entry[6], splt->contents + 24);
10044 bfd_put_32 (output_bfd, plt_entry[7], splt->contents + 28);
10045
0e1862bb 10046 if (! bfd_link_pic (info))
9d8504b1
PB
10047 {
10048 Elf_Internal_Rela rela;
10049 bfd_byte *loc;
10050
10051 loc = htab->srelplt2->contents;
10052
10053 /* Output the @ha relocation for the first instruction. */
ce558b89
AM
10054 rela.r_offset = (htab->elf.splt->output_section->vma
10055 + htab->elf.splt->output_offset
9d8504b1 10056 + 2);
636ce3f5 10057 rela.r_info = ELF32_R_INFO (htab->elf.hgot->indx, R_PPC_ADDR16_HA);
9d8504b1
PB
10058 rela.r_addend = 0;
10059 bfd_elf32_swap_reloca_out (output_bfd, &rela, loc);
10060 loc += sizeof (Elf32_External_Rela);
5b914448 10061
9d8504b1 10062 /* Output the @l relocation for the second instruction. */
ce558b89
AM
10063 rela.r_offset = (htab->elf.splt->output_section->vma
10064 + htab->elf.splt->output_offset
9d8504b1 10065 + 6);
636ce3f5 10066 rela.r_info = ELF32_R_INFO (htab->elf.hgot->indx, R_PPC_ADDR16_LO);
9d8504b1
PB
10067 rela.r_addend = 0;
10068 bfd_elf32_swap_reloca_out (output_bfd, &rela, loc);
10069 loc += sizeof (Elf32_External_Rela);
10070
10071 /* Fix up the remaining relocations. They may have the wrong
10072 symbol index for _G_O_T_ or _P_L_T_ depending on the order
10073 in which symbols were output. */
10074 while (loc < htab->srelplt2->contents + htab->srelplt2->size)
10075 {
10076 Elf_Internal_Rela rel;
10077
10078 bfd_elf32_swap_reloc_in (output_bfd, loc, &rel);
636ce3f5 10079 rel.r_info = ELF32_R_INFO (htab->elf.hgot->indx, R_PPC_ADDR16_HA);
9d8504b1
PB
10080 bfd_elf32_swap_reloc_out (output_bfd, &rel, loc);
10081 loc += sizeof (Elf32_External_Rela);
10082
10083 bfd_elf32_swap_reloc_in (output_bfd, loc, &rel);
636ce3f5 10084 rel.r_info = ELF32_R_INFO (htab->elf.hgot->indx, R_PPC_ADDR16_LO);
9d8504b1
PB
10085 bfd_elf32_swap_reloc_out (output_bfd, &rel, loc);
10086 loc += sizeof (Elf32_External_Rela);
10087
10088 bfd_elf32_swap_reloc_in (output_bfd, loc, &rel);
7325306f 10089 rel.r_info = ELF32_R_INFO (htab->elf.hplt->indx, R_PPC_ADDR32);
9d8504b1
PB
10090 bfd_elf32_swap_reloc_out (output_bfd, &rel, loc);
10091 loc += sizeof (Elf32_External_Rela);
10092 }
10093 }
10094 }
10095
e054468f
AM
10096 if (htab->glink != NULL
10097 && htab->glink->contents != NULL
10098 && htab->elf.dynamic_sections_created)
d7128ce4
AM
10099 {
10100 unsigned char *p;
10101 unsigned char *endp;
a6aa5195 10102 bfd_vma res0;
a6aa5195
AM
10103
10104 /*
10105 * PIC glink code is the following:
10106 *
10107 * # ith PLT code stub.
10108 * addis 11,30,(plt+(i-1)*4-got)@ha
10109 * lwz 11,(plt+(i-1)*4-got)@l(11)
10110 * mtctr 11
10111 * bctr
10112 *
10113 * # A table of branches, one for each plt entry.
176a0d42 10114 * # The idea is that the plt call stub loads ctr and r11 with these
a6aa5195
AM
10115 * # addresses, so (r11 - res_0) gives the plt index * 4.
10116 * res_0: b PLTresolve
10117 * res_1: b PLTresolve
10118 * .
10119 * # Some number of entries towards the end can be nops
10120 * res_n_m3: nop
10121 * res_n_m2: nop
10122 * res_n_m1:
10123 *
10124 * PLTresolve:
10125 * addis 11,11,(1f-res_0)@ha
10126 * mflr 0
10127 * bcl 20,31,1f
10128 * 1: addi 11,11,(1b-res_0)@l
10129 * mflr 12
10130 * mtlr 0
07d6d2b8 10131 * sub 11,11,12 # r11 = index * 4
a6aa5195 10132 * addis 12,12,(got+4-1b)@ha
07d6d2b8
AM
10133 * lwz 0,(got+4-1b)@l(12) # got[1] address of dl_runtime_resolve
10134 * lwz 12,(got+8-1b)@l(12) # got[2] contains the map address
a6aa5195
AM
10135 * mtctr 0
10136 * add 0,11,11
07d6d2b8 10137 * add 11,0,11 # r11 = index * 12 = reloc offset.
a6aa5195 10138 * bctr
9e390558 10139 *
176a0d42
AM
10140 * Non-PIC glink code is a little simpler.
10141 *
10142 * # ith PLT code stub.
10143 * lis 11,(plt+(i-1)*4)@ha
10144 * lwz 11,(plt+(i-1)*4)@l(11)
10145 * mtctr 11
10146 * bctr
10147 *
10148 * The branch table is the same, then comes
10149 *
10150 * PLTresolve:
10151 * lis 12,(got+4)@ha
10152 * addis 11,11,(-res_0)@ha
07d6d2b8
AM
10153 * lwz 0,(got+4)@l(12) # got[1] address of dl_runtime_resolve
10154 * addi 11,11,(-res_0)@l # r11 = index * 4
176a0d42
AM
10155 * mtctr 0
10156 * add 0,11,11
07d6d2b8
AM
10157 * lwz 12,(got+8)@l(12) # got[2] contains the map address
10158 * add 11,0,11 # r11 = index * 12 = reloc offset.
176a0d42
AM
10159 * bctr
10160 */
7e8aeb9a 10161
a6aa5195 10162 /* Build the branch table, one for each plt entry (less one),
86b9da88 10163 and perhaps some padding. */
a6aa5195
AM
10164 p = htab->glink->contents;
10165 p += htab->glink_pltresolve;
86b9da88
AM
10166 endp = htab->glink->contents;
10167 endp += htab->glink->size - GLINK_PLTRESOLVE;
da3a2088 10168 while (p < endp - (htab->params->ppc476_workaround ? 0 : 8 * 4))
86b9da88
AM
10169 {
10170 bfd_put_32 (output_bfd, B + endp - p, p);
10171 p += 4;
10172 }
10173 while (p < endp)
10174 {
10175 bfd_put_32 (output_bfd, NOP, p);
10176 p += 4;
10177 }
10178
7e8aeb9a 10179 res0 = (htab->glink_pltresolve
86b9da88
AM
10180 + htab->glink->output_section->vma
10181 + htab->glink->output_offset);
10182
da3a2088
AM
10183 if (htab->params->ppc476_workaround)
10184 {
10185 /* Ensure that a call stub at the end of a page doesn't
10186 result in prefetch over the end of the page into the
10187 glink branch table. */
10188 bfd_vma pagesize = (bfd_vma) 1 << htab->params->pagesize_p2;
10189 bfd_vma page_addr;
10190 bfd_vma glink_start = (htab->glink->output_section->vma
10191 + htab->glink->output_offset);
10192
10193 for (page_addr = res0 & -pagesize;
10194 page_addr > glink_start;
10195 page_addr -= pagesize)
10196 {
10197 /* We have a plt call stub that may need fixing. */
10198 bfd_byte *loc;
10199 unsigned int insn;
10200
10201 loc = htab->glink->contents + page_addr - 4 - glink_start;
10202 insn = bfd_get_32 (output_bfd, loc);
10203 if (insn == BCTR)
10204 {
10205 /* By alignment, we know that there must be at least
10206 one other call stub before this one. */
10207 insn = bfd_get_32 (output_bfd, loc - 16);
10208 if (insn == BCTR)
10209 bfd_put_32 (output_bfd, B | (-16 & 0x3fffffc), loc);
10210 else
10211 bfd_put_32 (output_bfd, B | (-20 & 0x3fffffc), loc);
10212 }
10213 }
10214 }
10215
86b9da88 10216 /* Last comes the PLTresolve stub. */
9e390558 10217 endp = p + GLINK_PLTRESOLVE;
0e1862bb 10218 if (bfd_link_pic (info))
7e8aeb9a 10219 {
a6aa5195 10220 bfd_vma bcl;
d7128ce4 10221
a6aa5195
AM
10222 bcl = (htab->glink->size - GLINK_PLTRESOLVE + 3*4
10223 + htab->glink->output_section->vma
10224 + htab->glink->output_offset);
10225
9e390558
AM
10226 bfd_put_32 (output_bfd, ADDIS_11_11 + PPC_HA (bcl - res0), p);
10227 p += 4;
10228 bfd_put_32 (output_bfd, MFLR_0, p);
10229 p += 4;
10230 bfd_put_32 (output_bfd, BCL_20_31, p);
10231 p += 4;
10232 bfd_put_32 (output_bfd, ADDI_11_11 + PPC_LO (bcl - res0), p);
10233 p += 4;
10234 bfd_put_32 (output_bfd, MFLR_12, p);
10235 p += 4;
10236 bfd_put_32 (output_bfd, MTLR_0, p);
10237 p += 4;
10238 bfd_put_32 (output_bfd, SUB_11_11_12, p);
10239 p += 4;
10240 bfd_put_32 (output_bfd, ADDIS_12_12 + PPC_HA (got + 4 - bcl), p);
10241 p += 4;
a6aa5195
AM
10242 if (PPC_HA (got + 4 - bcl) == PPC_HA (got + 8 - bcl))
10243 {
9e390558
AM
10244 bfd_put_32 (output_bfd, LWZ_0_12 + PPC_LO (got + 4 - bcl), p);
10245 p += 4;
10246 bfd_put_32 (output_bfd, LWZ_12_12 + PPC_LO (got + 8 - bcl), p);
10247 p += 4;
a6aa5195
AM
10248 }
10249 else
10250 {
9e390558
AM
10251 bfd_put_32 (output_bfd, LWZU_0_12 + PPC_LO (got + 4 - bcl), p);
10252 p += 4;
10253 bfd_put_32 (output_bfd, LWZ_12_12 + 4, p);
10254 p += 4;
a6aa5195 10255 }
9e390558
AM
10256 bfd_put_32 (output_bfd, MTCTR_0, p);
10257 p += 4;
10258 bfd_put_32 (output_bfd, ADD_0_11_11, p);
7e8aeb9a
AM
10259 }
10260 else
d7128ce4 10261 {
9e390558
AM
10262 bfd_put_32 (output_bfd, LIS_12 + PPC_HA (got + 4), p);
10263 p += 4;
10264 bfd_put_32 (output_bfd, ADDIS_11_11 + PPC_HA (-res0), p);
10265 p += 4;
a6aa5195 10266 if (PPC_HA (got + 4) == PPC_HA (got + 8))
9e390558 10267 bfd_put_32 (output_bfd, LWZ_0_12 + PPC_LO (got + 4), p);
a6aa5195 10268 else
9e390558
AM
10269 bfd_put_32 (output_bfd, LWZU_0_12 + PPC_LO (got + 4), p);
10270 p += 4;
10271 bfd_put_32 (output_bfd, ADDI_11_11 + PPC_LO (-res0), p);
10272 p += 4;
10273 bfd_put_32 (output_bfd, MTCTR_0, p);
10274 p += 4;
10275 bfd_put_32 (output_bfd, ADD_0_11_11, p);
10276 p += 4;
10277 if (PPC_HA (got + 4) == PPC_HA (got + 8))
10278 bfd_put_32 (output_bfd, LWZ_12_12 + PPC_LO (got + 8), p);
10279 else
10280 bfd_put_32 (output_bfd, LWZ_12_12 + 4, p);
10281 }
10282 p += 4;
10283 bfd_put_32 (output_bfd, ADD_11_0_11, p);
10284 p += 4;
407aa07c
AM
10285 bfd_put_32 (output_bfd, BCTR, p);
10286 p += 4;
9e390558
AM
10287 while (p < endp)
10288 {
10289 bfd_put_32 (output_bfd,
10290 htab->params->ppc476_workaround ? BA : NOP, p);
10291 p += 4;
d7128ce4 10292 }
9e390558 10293 BFD_ASSERT (p == endp);
d7128ce4
AM
10294 }
10295
6177242a
AM
10296 if (htab->glink_eh_frame != NULL
10297 && htab->glink_eh_frame->contents != NULL)
10298 {
10299 unsigned char *p = htab->glink_eh_frame->contents;
10300 bfd_vma val;
10301
6177242a
AM
10302 p += sizeof (glink_eh_frame_cie);
10303 /* FDE length. */
6177242a
AM
10304 p += 4;
10305 /* CIE pointer. */
6177242a
AM
10306 p += 4;
10307 /* Offset to .glink. */
10308 val = (htab->glink->output_section->vma
10309 + htab->glink->output_offset);
10310 val -= (htab->glink_eh_frame->output_section->vma
10311 + htab->glink_eh_frame->output_offset);
10312 val -= p - htab->glink_eh_frame->contents;
10313 bfd_put_32 (htab->elf.dynobj, val, p);
6177242a 10314
dbaa2011 10315 if (htab->glink_eh_frame->sec_info_type == SEC_INFO_TYPE_EH_FRAME
6177242a
AM
10316 && !_bfd_elf_write_section_eh_frame (output_bfd, info,
10317 htab->glink_eh_frame,
10318 htab->glink_eh_frame->contents))
10319 return FALSE;
10320 }
10321
e87d4038 10322 return ret;
25dbc73a 10323}
e1a9cb8e 10324\f
6d00b590 10325#define TARGET_LITTLE_SYM powerpc_elf32_le_vec
252b5132 10326#define TARGET_LITTLE_NAME "elf32-powerpcle"
6d00b590 10327#define TARGET_BIG_SYM powerpc_elf32_vec
252b5132
RH
10328#define TARGET_BIG_NAME "elf32-powerpc"
10329#define ELF_ARCH bfd_arch_powerpc
ae95ffa6 10330#define ELF_TARGET_ID PPC32_ELF_DATA
252b5132
RH
10331#define ELF_MACHINE_CODE EM_PPC
10332#define ELF_MAXPAGESIZE 0x10000
702d1671
AM
10333#define ELF_COMMONPAGESIZE 0x1000
10334#define ELF_RELROPAGESIZE ELF_MAXPAGESIZE
252b5132
RH
10335#define elf_info_to_howto ppc_elf_info_to_howto
10336
10337#ifdef EM_CYGNUS_POWERPC
10338#define ELF_MACHINE_ALT1 EM_CYGNUS_POWERPC
10339#endif
10340
10341#ifdef EM_PPC_OLD
10342#define ELF_MACHINE_ALT2 EM_PPC_OLD
10343#endif
10344
10345#define elf_backend_plt_not_loaded 1
5474d94f 10346#define elf_backend_want_dynrelro 1
252b5132 10347#define elf_backend_can_gc_sections 1
51b64d56 10348#define elf_backend_can_refcount 1
b491616a 10349#define elf_backend_rela_normal 1
53291d1f 10350#define elf_backend_caches_rawsize 1
252b5132 10351
43c40ab2 10352#define bfd_elf32_mkobject ppc_elf_mkobject
252b5132 10353#define bfd_elf32_bfd_merge_private_bfd_data ppc_elf_merge_private_bfd_data
70bccea4 10354#define bfd_elf32_bfd_relax_section ppc_elf_relax_section
252b5132 10355#define bfd_elf32_bfd_reloc_type_lookup ppc_elf_reloc_type_lookup
b9c361e0 10356#define bfd_elf32_bfd_reloc_name_lookup ppc_elf_reloc_name_lookup
252b5132 10357#define bfd_elf32_bfd_set_private_flags ppc_elf_set_private_flags
70bccea4 10358#define bfd_elf32_bfd_link_hash_table_create ppc_elf_link_hash_table_create
468392fb 10359#define bfd_elf32_get_synthetic_symtab ppc_elf_get_synthetic_symtab
252b5132 10360
feee612b 10361#define elf_backend_object_p ppc_elf_object_p
252b5132 10362#define elf_backend_gc_mark_hook ppc_elf_gc_mark_hook
252b5132
RH
10363#define elf_backend_section_from_shdr ppc_elf_section_from_shdr
10364#define elf_backend_relocate_section ppc_elf_relocate_section
10365#define elf_backend_create_dynamic_sections ppc_elf_create_dynamic_sections
10366#define elf_backend_check_relocs ppc_elf_check_relocs
c0e331c7 10367#define elf_backend_relocs_compatible _bfd_elf_relocs_compatible
7fce784e 10368#define elf_backend_copy_indirect_symbol ppc_elf_copy_indirect_symbol
252b5132
RH
10369#define elf_backend_adjust_dynamic_symbol ppc_elf_adjust_dynamic_symbol
10370#define elf_backend_add_symbol_hook ppc_elf_add_symbol_hook
10371#define elf_backend_size_dynamic_sections ppc_elf_size_dynamic_sections
0eb4a168 10372#define elf_backend_hash_symbol ppc_elf_hash_symbol
252b5132
RH
10373#define elf_backend_finish_dynamic_symbol ppc_elf_finish_dynamic_symbol
10374#define elf_backend_finish_dynamic_sections ppc_elf_finish_dynamic_sections
10375#define elf_backend_fake_sections ppc_elf_fake_sections
10376#define elf_backend_additional_program_headers ppc_elf_additional_program_headers
954b63d4 10377#define elf_backend_modify_segment_map ppc_elf_modify_segment_map
c5fccbec
DJ
10378#define elf_backend_grok_prstatus ppc_elf_grok_prstatus
10379#define elf_backend_grok_psinfo ppc_elf_grok_psinfo
183e98be 10380#define elf_backend_write_core_note ppc_elf_write_core_note
29c2fb7c 10381#define elf_backend_reloc_type_class ppc_elf_reloc_type_class
70bccea4
AM
10382#define elf_backend_begin_write_processing ppc_elf_begin_write_processing
10383#define elf_backend_final_write_processing ppc_elf_final_write_processing
10384#define elf_backend_write_section ppc_elf_write_section
551b43fd 10385#define elf_backend_get_sec_type_attr ppc_elf_get_sec_type_attr
4c45e5c9 10386#define elf_backend_plt_sym_val ppc_elf_plt_sym_val
8a696751 10387#define elf_backend_action_discarded ppc_elf_action_discarded
74541ad4 10388#define elf_backend_init_index_section _bfd_elf_init_1_index_section
b9c361e0 10389#define elf_backend_lookup_section_flags_hook ppc_elf_lookup_section_flags
252b5132
RH
10390
10391#include "elf32-target.h"
9d8504b1 10392
7b8e7dad
AM
10393/* FreeBSD Target */
10394
10395#undef TARGET_LITTLE_SYM
10396#undef TARGET_LITTLE_NAME
10397
10398#undef TARGET_BIG_SYM
6d00b590 10399#define TARGET_BIG_SYM powerpc_elf32_fbsd_vec
7b8e7dad
AM
10400#undef TARGET_BIG_NAME
10401#define TARGET_BIG_NAME "elf32-powerpc-freebsd"
10402
10403#undef ELF_OSABI
10404#define ELF_OSABI ELFOSABI_FREEBSD
10405
10406#undef elf32_bed
10407#define elf32_bed elf32_powerpc_fbsd_bed
10408
10409#include "elf32-target.h"
10410
9d8504b1
PB
10411/* VxWorks Target */
10412
10413#undef TARGET_LITTLE_SYM
10414#undef TARGET_LITTLE_NAME
10415
10416#undef TARGET_BIG_SYM
6d00b590 10417#define TARGET_BIG_SYM powerpc_elf32_vxworks_vec
9d8504b1
PB
10418#undef TARGET_BIG_NAME
10419#define TARGET_BIG_NAME "elf32-powerpc-vxworks"
10420
7b8e7dad
AM
10421#undef ELF_OSABI
10422
d5e3d971
PB
10423/* VxWorks uses the elf default section flags for .plt. */
10424static const struct bfd_elf_special_section *
4aef7643 10425ppc_elf_vxworks_get_sec_type_attr (bfd *abfd, asection *sec)
9d8504b1 10426{
d5e3d971
PB
10427 if (sec->name == NULL)
10428 return NULL;
10429
10430 if (strcmp (sec->name, ".plt") == 0)
10431 return _bfd_elf_get_sec_type_attr (abfd, sec);
10432
10433 return ppc_elf_get_sec_type_attr (abfd, sec);
10434}
9d8504b1
PB
10435
10436/* Like ppc_elf_link_hash_table_create, but overrides
10437 appropriately for VxWorks. */
10438static struct bfd_link_hash_table *
10439ppc_elf_vxworks_link_hash_table_create (bfd *abfd)
10440{
10441 struct bfd_link_hash_table *ret;
10442
10443 ret = ppc_elf_link_hash_table_create (abfd);
10444 if (ret)
10445 {
10446 struct ppc_elf_link_hash_table *htab
954b63d4 10447 = (struct ppc_elf_link_hash_table *)ret;
9d8504b1 10448 htab->is_vxworks = 1;
4a3dc543 10449 htab->plt_type = PLT_VXWORKS;
9d8504b1
PB
10450 htab->plt_entry_size = VXWORKS_PLT_ENTRY_SIZE;
10451 htab->plt_slot_size = VXWORKS_PLT_ENTRY_SIZE;
10452 htab->plt_initial_entry_size = VXWORKS_PLT_INITIAL_ENTRY_SIZE;
10453 }
10454 return ret;
10455}
10456
10457/* Tweak magic VxWorks symbols as they are loaded. */
10458static bfd_boolean
10459ppc_elf_vxworks_add_symbol_hook (bfd *abfd,
10460 struct bfd_link_info *info,
10461 Elf_Internal_Sym *sym,
4aef7643
AM
10462 const char **namep,
10463 flagword *flagsp,
9d8504b1
PB
10464 asection **secp,
10465 bfd_vma *valp)
10466{
4aef7643
AM
10467 if (!elf_vxworks_add_symbol_hook (abfd, info, sym, namep, flagsp, secp,
10468 valp))
9d8504b1
PB
10469 return FALSE;
10470
4aef7643 10471 return ppc_elf_add_symbol_hook (abfd, info, sym, namep, flagsp, secp, valp);
9d8504b1
PB
10472}
10473
cc364be6
AM
10474static bfd_boolean
10475ppc_elf_vxworks_final_write_processing (bfd *abfd)
9d8504b1 10476{
cc364be6
AM
10477 ppc_final_write_processing (abfd);
10478 return elf_vxworks_final_write_processing (abfd);
9d8504b1
PB
10479}
10480
10481/* On VxWorks, we emit relocations against _PROCEDURE_LINKAGE_TABLE_, so
10482 define it. */
10483#undef elf_backend_want_plt_sym
10484#define elf_backend_want_plt_sym 1
10485#undef elf_backend_want_got_plt
10486#define elf_backend_want_got_plt 1
10487#undef elf_backend_got_symbol_offset
10488#define elf_backend_got_symbol_offset 0
10489#undef elf_backend_plt_not_loaded
10490#define elf_backend_plt_not_loaded 0
10491#undef elf_backend_plt_readonly
10492#define elf_backend_plt_readonly 1
10493#undef elf_backend_got_header_size
10494#define elf_backend_got_header_size 12
64f52338
AM
10495#undef elf_backend_dtrel_excludes_plt
10496#define elf_backend_dtrel_excludes_plt 1
9d8504b1 10497
468392fb
AM
10498#undef bfd_elf32_get_synthetic_symtab
10499
9d8504b1
PB
10500#undef bfd_elf32_bfd_link_hash_table_create
10501#define bfd_elf32_bfd_link_hash_table_create \
10502 ppc_elf_vxworks_link_hash_table_create
9d8504b1
PB
10503#undef elf_backend_add_symbol_hook
10504#define elf_backend_add_symbol_hook \
10505 ppc_elf_vxworks_add_symbol_hook
10506#undef elf_backend_link_output_symbol_hook
10507#define elf_backend_link_output_symbol_hook \
9c72ff84 10508 elf_vxworks_link_output_symbol_hook
9d8504b1
PB
10509#undef elf_backend_final_write_processing
10510#define elf_backend_final_write_processing \
10511 ppc_elf_vxworks_final_write_processing
d5e3d971
PB
10512#undef elf_backend_get_sec_type_attr
10513#define elf_backend_get_sec_type_attr \
10514 ppc_elf_vxworks_get_sec_type_attr
9d8504b1
PB
10515#undef elf_backend_emit_relocs
10516#define elf_backend_emit_relocs \
10517 elf_vxworks_emit_relocs
10518
10519#undef elf32_bed
10520#define elf32_bed ppc_elf_vxworks_bed
10521
10522#include "elf32-target.h"
This page took 2.114941 seconds and 4 git commands to generate.