Use unsuspend_all_lwps
[deliverable/binutils-gdb.git] / bfd / elf32-ppc.c
CommitLineData
252b5132 1/* PowerPC-specific support for 32-bit ELF
6f2750fe 2 Copyright (C) 1994-2016 Free Software Foundation, Inc.
252b5132
RH
3 Written by Ian Lance Taylor, Cygnus Support.
4
ae9a127f 5 This file is part of BFD, the Binary File Descriptor library.
252b5132 6
ae9a127f
NC
7 This program is free software; you can redistribute it and/or modify
8 it under the terms of the GNU General Public License as published by
cd123cb7 9 the Free Software Foundation; either version 3 of the License, or
ae9a127f 10 (at your option) any later version.
252b5132 11
ae9a127f
NC
12 This program is distributed in the hope that it will be useful,
13 but WITHOUT ANY WARRANTY; without even the implied warranty of
14 MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
15 GNU General Public License for more details.
252b5132 16
ae9a127f 17 You should have received a copy of the GNU General Public License
fc0bffd6 18 along with this program; if not, write to the
3e110533 19 Free Software Foundation, Inc., 51 Franklin Street - Fifth Floor,
53e09e0a 20 Boston, MA 02110-1301, USA. */
252b5132 21
cd123cb7 22
252b5132
RH
23/* This file is based on a preliminary PowerPC ELF ABI. The
24 information may not match the final PowerPC ELF ABI. It includes
25 suggestions from the in-progress Embedded PowerPC ABI, and that
26 information may also not match. */
27
3db64b00 28#include "sysdep.h"
183e98be 29#include <stdarg.h>
252b5132 30#include "bfd.h"
252b5132
RH
31#include "bfdlink.h"
32#include "libbfd.h"
33#include "elf-bfd.h"
34#include "elf/ppc.h"
7619e7c7 35#include "elf32-ppc.h"
9d8504b1 36#include "elf-vxworks.h"
6177242a 37#include "dwarf2.h"
252b5132 38
b9c361e0
JL
39typedef enum split16_format_type
40{
41 split16a_type = 0,
42 split16d_type
43}
44split16_format_type;
45
f0fe0e16 46/* RELA relocations are used here. */
252b5132 47
252b5132 48static bfd_reloc_status_type ppc_elf_addr16_ha_reloc
55fd94b0 49 (bfd *, arelent *, asymbol *, void *, asection *, bfd *, char **);
7619e7c7 50static bfd_reloc_status_type ppc_elf_unhandled_reloc
55fd94b0 51 (bfd *, arelent *, asymbol *, void *, asection *, bfd *, char **);
252b5132 52
70bccea4
AM
53/* Branch prediction bit for branch taken relocs. */
54#define BRANCH_PREDICT_BIT 0x200000
55/* Mask to set RA in memory instructions. */
56#define RA_REGISTER_MASK 0x001f0000
57/* Value to shift register by to insert RA. */
58#define RA_REGISTER_SHIFT 16
252b5132
RH
59
60/* The name of the dynamic interpreter. This is put in the .interp
61 section. */
252b5132
RH
62#define ELF_DYNAMIC_INTERPRETER "/usr/lib/ld.so.1"
63
d7128ce4 64/* For old-style PLT. */
252b5132
RH
65/* The number of single-slot PLT entries (the rest use two slots). */
66#define PLT_NUM_SINGLE_ENTRIES 8192
67
d7128ce4 68/* For new-style .glink and .plt. */
a6aa5195 69#define GLINK_PLTRESOLVE 16*4
d7128ce4 70#define GLINK_ENTRY_SIZE 4*4
a7f2871e 71#define TLS_GET_ADDR_GLINK_SIZE 12*4
d7128ce4 72
9d8504b1
PB
73/* VxWorks uses its own plt layout, filled in by the static linker. */
74
75/* The standard VxWorks PLT entry. */
76#define VXWORKS_PLT_ENTRY_SIZE 32
77static const bfd_vma ppc_elf_vxworks_plt_entry
78 [VXWORKS_PLT_ENTRY_SIZE / 4] =
79 {
80 0x3d800000, /* lis r12,0 */
81 0x818c0000, /* lwz r12,0(r12) */
82 0x7d8903a6, /* mtctr r12 */
83 0x4e800420, /* bctr */
84 0x39600000, /* li r11,0 */
85 0x48000000, /* b 14 <.PLT0resolve+0x4> */
86 0x60000000, /* nop */
87 0x60000000, /* nop */
88 };
89static const bfd_vma ppc_elf_vxworks_pic_plt_entry
90 [VXWORKS_PLT_ENTRY_SIZE / 4] =
91 {
92 0x3d9e0000, /* addis r12,r30,0 */
93 0x818c0000, /* lwz r12,0(r12) */
94 0x7d8903a6, /* mtctr r12 */
95 0x4e800420, /* bctr */
96 0x39600000, /* li r11,0 */
97 0x48000000, /* b 14 <.PLT0resolve+0x4> 14: R_PPC_REL24 .PLTresolve */
98 0x60000000, /* nop */
99 0x60000000, /* nop */
100 };
101
102/* The initial VxWorks PLT entry. */
103#define VXWORKS_PLT_INITIAL_ENTRY_SIZE 32
104static const bfd_vma ppc_elf_vxworks_plt0_entry
105 [VXWORKS_PLT_INITIAL_ENTRY_SIZE / 4] =
106 {
107 0x3d800000, /* lis r12,0 */
108 0x398c0000, /* addi r12,r12,0 */
109 0x800c0008, /* lwz r0,8(r12) */
110 0x7c0903a6, /* mtctr r0 */
111 0x818c0004, /* lwz r12,4(r12) */
112 0x4e800420, /* bctr */
113 0x60000000, /* nop */
114 0x60000000, /* nop */
115 };
116static const bfd_vma ppc_elf_vxworks_pic_plt0_entry
117 [VXWORKS_PLT_INITIAL_ENTRY_SIZE / 4] =
118 {
119 0x819e0008, /* lwz r12,8(r30) */
120 0x7d8903a6, /* mtctr r12 */
121 0x819e0004, /* lwz r12,4(r30) */
122 0x4e800420, /* bctr */
123 0x60000000, /* nop */
124 0x60000000, /* nop */
125 0x60000000, /* nop */
126 0x60000000, /* nop */
127 };
128
129/* For executables, we have some additional relocations in
130 .rela.plt.unloaded, for the kernel loader. */
131
132/* The number of non-JMP_SLOT relocations per PLT0 slot. */
133#define VXWORKS_PLT_NON_JMP_SLOT_RELOCS 3
134/* The number of relocations in the PLTResolve slot. */
135#define VXWORKS_PLTRESOLVE_RELOCS 2
136/* The number of relocations in the PLTResolve slot when when creating
137 a shared library. */
138#define VXWORKS_PLTRESOLVE_RELOCS_SHLIB 0
139
d7128ce4 140/* Some instructions. */
d7128ce4 141#define ADDIS_11_11 0x3d6b0000
a6aa5195
AM
142#define ADDIS_11_30 0x3d7e0000
143#define ADDIS_12_12 0x3d8c0000
d7128ce4 144#define ADDI_11_11 0x396b0000
d7128ce4 145#define ADD_0_11_11 0x7c0b5a14
a7f2871e 146#define ADD_3_12_2 0x7c6c1214
d7128ce4 147#define ADD_11_0_11 0x7d605a14
a6aa5195 148#define B 0x48000000
da3a2088 149#define BA 0x48000002
a6aa5195 150#define BCL_20_31 0x429f0005
d7128ce4 151#define BCTR 0x4e800420
a7f2871e
AM
152#define BEQLR 0x4d820020
153#define CMPWI_11_0 0x2c0b0000
7e8aeb9a
AM
154#define LIS_11 0x3d600000
155#define LIS_12 0x3d800000
a6aa5195
AM
156#define LWZU_0_12 0x840c0000
157#define LWZ_0_12 0x800c0000
a7f2871e 158#define LWZ_11_3 0x81630000
a6aa5195
AM
159#define LWZ_11_11 0x816b0000
160#define LWZ_11_30 0x817e0000
a7f2871e 161#define LWZ_12_3 0x81830000
a6aa5195 162#define LWZ_12_12 0x818c0000
a7f2871e
AM
163#define MR_0_3 0x7c601b78
164#define MR_3_0 0x7c030378
a6aa5195
AM
165#define MFLR_0 0x7c0802a6
166#define MFLR_12 0x7d8802a6
167#define MTCTR_0 0x7c0903a6
168#define MTCTR_11 0x7d6903a6
169#define MTLR_0 0x7c0803a6
170#define NOP 0x60000000
171#define SUB_11_11_12 0x7d6c5850
7619e7c7
AM
172
173/* Offset of tp and dtp pointers from start of TLS block. */
174#define TP_OFFSET 0x7000
175#define DTP_OFFSET 0x8000
e87d4038
AM
176
177/* The value of a defined global symbol. */
178#define SYM_VAL(SYM) \
179 ((SYM)->root.u.def.section->output_section->vma \
180 + (SYM)->root.u.def.section->output_offset \
181 + (SYM)->root.u.def.value)
7fce784e 182\f
e47cd125 183static reloc_howto_type *ppc_elf_howto_table[R_PPC_max];
252b5132 184
8da6118f 185static reloc_howto_type ppc_elf_howto_raw[] = {
252b5132
RH
186 /* This reloc does nothing. */
187 HOWTO (R_PPC_NONE, /* type */
188 0, /* rightshift */
6346d5ca
AM
189 3, /* size (0 = byte, 1 = short, 2 = long) */
190 0, /* bitsize */
b34976b6 191 FALSE, /* pc_relative */
252b5132 192 0, /* bitpos */
86c95733 193 complain_overflow_dont, /* complain_on_overflow */
252b5132
RH
194 bfd_elf_generic_reloc, /* special_function */
195 "R_PPC_NONE", /* name */
b34976b6 196 FALSE, /* partial_inplace */
252b5132
RH
197 0, /* src_mask */
198 0, /* dst_mask */
b34976b6 199 FALSE), /* pcrel_offset */
252b5132
RH
200
201 /* A standard 32 bit relocation. */
202 HOWTO (R_PPC_ADDR32, /* type */
203 0, /* rightshift */
204 2, /* size (0 = byte, 1 = short, 2 = long) */
205 32, /* bitsize */
b34976b6 206 FALSE, /* pc_relative */
252b5132 207 0, /* bitpos */
86c95733 208 complain_overflow_dont, /* complain_on_overflow */
252b5132
RH
209 bfd_elf_generic_reloc, /* special_function */
210 "R_PPC_ADDR32", /* name */
b34976b6 211 FALSE, /* partial_inplace */
252b5132
RH
212 0, /* src_mask */
213 0xffffffff, /* dst_mask */
b34976b6 214 FALSE), /* pcrel_offset */
252b5132
RH
215
216 /* An absolute 26 bit branch; the lower two bits must be zero.
217 FIXME: we don't check that, we just clear them. */
218 HOWTO (R_PPC_ADDR24, /* type */
219 0, /* rightshift */
220 2, /* size (0 = byte, 1 = short, 2 = long) */
221 26, /* bitsize */
b34976b6 222 FALSE, /* pc_relative */
252b5132 223 0, /* bitpos */
86c95733 224 complain_overflow_signed, /* complain_on_overflow */
252b5132
RH
225 bfd_elf_generic_reloc, /* special_function */
226 "R_PPC_ADDR24", /* name */
b34976b6 227 FALSE, /* partial_inplace */
252b5132
RH
228 0, /* src_mask */
229 0x3fffffc, /* dst_mask */
b34976b6 230 FALSE), /* pcrel_offset */
252b5132
RH
231
232 /* A standard 16 bit relocation. */
233 HOWTO (R_PPC_ADDR16, /* type */
234 0, /* rightshift */
235 1, /* size (0 = byte, 1 = short, 2 = long) */
236 16, /* bitsize */
b34976b6 237 FALSE, /* pc_relative */
252b5132
RH
238 0, /* bitpos */
239 complain_overflow_bitfield, /* complain_on_overflow */
240 bfd_elf_generic_reloc, /* special_function */
241 "R_PPC_ADDR16", /* name */
b34976b6 242 FALSE, /* partial_inplace */
252b5132
RH
243 0, /* src_mask */
244 0xffff, /* dst_mask */
b34976b6 245 FALSE), /* pcrel_offset */
252b5132
RH
246
247 /* A 16 bit relocation without overflow. */
248 HOWTO (R_PPC_ADDR16_LO, /* type */
249 0, /* rightshift */
250 1, /* size (0 = byte, 1 = short, 2 = long) */
251 16, /* bitsize */
b34976b6 252 FALSE, /* pc_relative */
252b5132
RH
253 0, /* bitpos */
254 complain_overflow_dont,/* complain_on_overflow */
255 bfd_elf_generic_reloc, /* special_function */
256 "R_PPC_ADDR16_LO", /* name */
b34976b6 257 FALSE, /* partial_inplace */
252b5132
RH
258 0, /* src_mask */
259 0xffff, /* dst_mask */
b34976b6 260 FALSE), /* pcrel_offset */
252b5132
RH
261
262 /* The high order 16 bits of an address. */
263 HOWTO (R_PPC_ADDR16_HI, /* type */
264 16, /* rightshift */
265 1, /* size (0 = byte, 1 = short, 2 = long) */
266 16, /* bitsize */
b34976b6 267 FALSE, /* pc_relative */
252b5132
RH
268 0, /* bitpos */
269 complain_overflow_dont, /* complain_on_overflow */
270 bfd_elf_generic_reloc, /* special_function */
271 "R_PPC_ADDR16_HI", /* name */
b34976b6 272 FALSE, /* partial_inplace */
252b5132
RH
273 0, /* src_mask */
274 0xffff, /* dst_mask */
b34976b6 275 FALSE), /* pcrel_offset */
252b5132
RH
276
277 /* The high order 16 bits of an address, plus 1 if the contents of
8da6118f 278 the low 16 bits, treated as a signed number, is negative. */
252b5132
RH
279 HOWTO (R_PPC_ADDR16_HA, /* type */
280 16, /* rightshift */
281 1, /* size (0 = byte, 1 = short, 2 = long) */
282 16, /* bitsize */
b34976b6 283 FALSE, /* pc_relative */
252b5132
RH
284 0, /* bitpos */
285 complain_overflow_dont, /* complain_on_overflow */
286 ppc_elf_addr16_ha_reloc, /* special_function */
287 "R_PPC_ADDR16_HA", /* name */
b34976b6 288 FALSE, /* partial_inplace */
252b5132
RH
289 0, /* src_mask */
290 0xffff, /* dst_mask */
b34976b6 291 FALSE), /* pcrel_offset */
252b5132
RH
292
293 /* An absolute 16 bit branch; the lower two bits must be zero.
294 FIXME: we don't check that, we just clear them. */
295 HOWTO (R_PPC_ADDR14, /* type */
296 0, /* rightshift */
297 2, /* size (0 = byte, 1 = short, 2 = long) */
298 16, /* bitsize */
b34976b6 299 FALSE, /* pc_relative */
252b5132 300 0, /* bitpos */
86c95733 301 complain_overflow_signed, /* complain_on_overflow */
252b5132
RH
302 bfd_elf_generic_reloc, /* special_function */
303 "R_PPC_ADDR14", /* name */
b34976b6 304 FALSE, /* partial_inplace */
252b5132
RH
305 0, /* src_mask */
306 0xfffc, /* dst_mask */
b34976b6 307 FALSE), /* pcrel_offset */
252b5132
RH
308
309 /* An absolute 16 bit branch, for which bit 10 should be set to
310 indicate that the branch is expected to be taken. The lower two
8da6118f 311 bits must be zero. */
252b5132
RH
312 HOWTO (R_PPC_ADDR14_BRTAKEN, /* type */
313 0, /* rightshift */
314 2, /* size (0 = byte, 1 = short, 2 = long) */
315 16, /* bitsize */
b34976b6 316 FALSE, /* pc_relative */
252b5132 317 0, /* bitpos */
86c95733 318 complain_overflow_signed, /* complain_on_overflow */
252b5132
RH
319 bfd_elf_generic_reloc, /* special_function */
320 "R_PPC_ADDR14_BRTAKEN",/* name */
b34976b6 321 FALSE, /* partial_inplace */
252b5132
RH
322 0, /* src_mask */
323 0xfffc, /* dst_mask */
b34976b6 324 FALSE), /* pcrel_offset */
252b5132
RH
325
326 /* An absolute 16 bit branch, for which bit 10 should be set to
327 indicate that the branch is not expected to be taken. The lower
328 two bits must be zero. */
329 HOWTO (R_PPC_ADDR14_BRNTAKEN, /* type */
330 0, /* rightshift */
331 2, /* size (0 = byte, 1 = short, 2 = long) */
332 16, /* bitsize */
b34976b6 333 FALSE, /* pc_relative */
252b5132 334 0, /* bitpos */
86c95733 335 complain_overflow_signed, /* complain_on_overflow */
252b5132
RH
336 bfd_elf_generic_reloc, /* special_function */
337 "R_PPC_ADDR14_BRNTAKEN",/* name */
b34976b6 338 FALSE, /* partial_inplace */
252b5132
RH
339 0, /* src_mask */
340 0xfffc, /* dst_mask */
b34976b6 341 FALSE), /* pcrel_offset */
252b5132 342
8da6118f 343 /* A relative 26 bit branch; the lower two bits must be zero. */
252b5132
RH
344 HOWTO (R_PPC_REL24, /* type */
345 0, /* rightshift */
346 2, /* size (0 = byte, 1 = short, 2 = long) */
347 26, /* bitsize */
b34976b6 348 TRUE, /* pc_relative */
252b5132
RH
349 0, /* bitpos */
350 complain_overflow_signed, /* complain_on_overflow */
351 bfd_elf_generic_reloc, /* special_function */
352 "R_PPC_REL24", /* name */
b34976b6 353 FALSE, /* partial_inplace */
252b5132
RH
354 0, /* src_mask */
355 0x3fffffc, /* dst_mask */
b34976b6 356 TRUE), /* pcrel_offset */
252b5132 357
8da6118f 358 /* A relative 16 bit branch; the lower two bits must be zero. */
252b5132
RH
359 HOWTO (R_PPC_REL14, /* type */
360 0, /* rightshift */
361 2, /* size (0 = byte, 1 = short, 2 = long) */
362 16, /* bitsize */
b34976b6 363 TRUE, /* pc_relative */
252b5132
RH
364 0, /* bitpos */
365 complain_overflow_signed, /* complain_on_overflow */
366 bfd_elf_generic_reloc, /* special_function */
367 "R_PPC_REL14", /* name */
b34976b6 368 FALSE, /* partial_inplace */
252b5132
RH
369 0, /* src_mask */
370 0xfffc, /* dst_mask */
b34976b6 371 TRUE), /* pcrel_offset */
252b5132 372
8da6118f 373 /* A relative 16 bit branch. Bit 10 should be set to indicate that
252b5132
RH
374 the branch is expected to be taken. The lower two bits must be
375 zero. */
376 HOWTO (R_PPC_REL14_BRTAKEN, /* type */
377 0, /* rightshift */
378 2, /* size (0 = byte, 1 = short, 2 = long) */
379 16, /* bitsize */
b34976b6 380 TRUE, /* pc_relative */
252b5132
RH
381 0, /* bitpos */
382 complain_overflow_signed, /* complain_on_overflow */
383 bfd_elf_generic_reloc, /* special_function */
384 "R_PPC_REL14_BRTAKEN", /* name */
b34976b6 385 FALSE, /* partial_inplace */
252b5132
RH
386 0, /* src_mask */
387 0xfffc, /* dst_mask */
b34976b6 388 TRUE), /* pcrel_offset */
252b5132 389
8da6118f 390 /* A relative 16 bit branch. Bit 10 should be set to indicate that
252b5132
RH
391 the branch is not expected to be taken. The lower two bits must
392 be zero. */
393 HOWTO (R_PPC_REL14_BRNTAKEN, /* type */
394 0, /* rightshift */
395 2, /* size (0 = byte, 1 = short, 2 = long) */
396 16, /* bitsize */
b34976b6 397 TRUE, /* pc_relative */
252b5132
RH
398 0, /* bitpos */
399 complain_overflow_signed, /* complain_on_overflow */
400 bfd_elf_generic_reloc, /* special_function */
401 "R_PPC_REL14_BRNTAKEN",/* name */
b34976b6 402 FALSE, /* partial_inplace */
252b5132
RH
403 0, /* src_mask */
404 0xfffc, /* dst_mask */
b34976b6 405 TRUE), /* pcrel_offset */
252b5132
RH
406
407 /* Like R_PPC_ADDR16, but referring to the GOT table entry for the
408 symbol. */
409 HOWTO (R_PPC_GOT16, /* type */
410 0, /* rightshift */
411 1, /* size (0 = byte, 1 = short, 2 = long) */
412 16, /* bitsize */
b34976b6 413 FALSE, /* pc_relative */
252b5132
RH
414 0, /* bitpos */
415 complain_overflow_signed, /* complain_on_overflow */
416 bfd_elf_generic_reloc, /* special_function */
417 "R_PPC_GOT16", /* name */
b34976b6 418 FALSE, /* partial_inplace */
252b5132
RH
419 0, /* src_mask */
420 0xffff, /* dst_mask */
b34976b6 421 FALSE), /* pcrel_offset */
252b5132
RH
422
423 /* Like R_PPC_ADDR16_LO, but referring to the GOT table entry for
424 the symbol. */
425 HOWTO (R_PPC_GOT16_LO, /* type */
426 0, /* rightshift */
427 1, /* size (0 = byte, 1 = short, 2 = long) */
428 16, /* bitsize */
b34976b6 429 FALSE, /* pc_relative */
252b5132
RH
430 0, /* bitpos */
431 complain_overflow_dont, /* complain_on_overflow */
432 bfd_elf_generic_reloc, /* special_function */
433 "R_PPC_GOT16_LO", /* name */
b34976b6 434 FALSE, /* partial_inplace */
252b5132
RH
435 0, /* src_mask */
436 0xffff, /* dst_mask */
b34976b6 437 FALSE), /* pcrel_offset */
252b5132
RH
438
439 /* Like R_PPC_ADDR16_HI, but referring to the GOT table entry for
440 the symbol. */
441 HOWTO (R_PPC_GOT16_HI, /* type */
442 16, /* rightshift */
443 1, /* size (0 = byte, 1 = short, 2 = long) */
444 16, /* bitsize */
b34976b6 445 FALSE, /* pc_relative */
252b5132 446 0, /* bitpos */
86c95733 447 complain_overflow_dont, /* complain_on_overflow */
252b5132
RH
448 bfd_elf_generic_reloc, /* special_function */
449 "R_PPC_GOT16_HI", /* name */
b34976b6 450 FALSE, /* partial_inplace */
252b5132
RH
451 0, /* src_mask */
452 0xffff, /* dst_mask */
b34976b6 453 FALSE), /* pcrel_offset */
252b5132
RH
454
455 /* Like R_PPC_ADDR16_HA, but referring to the GOT table entry for
456 the symbol. */
457 HOWTO (R_PPC_GOT16_HA, /* type */
458 16, /* rightshift */
459 1, /* size (0 = byte, 1 = short, 2 = long) */
460 16, /* bitsize */
b34976b6 461 FALSE, /* pc_relative */
252b5132 462 0, /* bitpos */
86c95733 463 complain_overflow_dont, /* complain_on_overflow */
252b5132
RH
464 ppc_elf_addr16_ha_reloc, /* special_function */
465 "R_PPC_GOT16_HA", /* name */
b34976b6 466 FALSE, /* partial_inplace */
252b5132
RH
467 0, /* src_mask */
468 0xffff, /* dst_mask */
b34976b6 469 FALSE), /* pcrel_offset */
252b5132
RH
470
471 /* Like R_PPC_REL24, but referring to the procedure linkage table
472 entry for the symbol. */
473 HOWTO (R_PPC_PLTREL24, /* type */
474 0, /* rightshift */
475 2, /* size (0 = byte, 1 = short, 2 = long) */
476 26, /* bitsize */
b34976b6 477 TRUE, /* pc_relative */
252b5132
RH
478 0, /* bitpos */
479 complain_overflow_signed, /* complain_on_overflow */
480 bfd_elf_generic_reloc, /* special_function */
481 "R_PPC_PLTREL24", /* name */
b34976b6 482 FALSE, /* partial_inplace */
252b5132
RH
483 0, /* src_mask */
484 0x3fffffc, /* dst_mask */
b34976b6 485 TRUE), /* pcrel_offset */
252b5132
RH
486
487 /* This is used only by the dynamic linker. The symbol should exist
488 both in the object being run and in some shared library. The
489 dynamic linker copies the data addressed by the symbol from the
490 shared library into the object, because the object being
491 run has to have the data at some particular address. */
492 HOWTO (R_PPC_COPY, /* type */
493 0, /* rightshift */
494 2, /* size (0 = byte, 1 = short, 2 = long) */
495 32, /* bitsize */
b34976b6 496 FALSE, /* pc_relative */
252b5132 497 0, /* bitpos */
86c95733 498 complain_overflow_dont, /* complain_on_overflow */
252b5132
RH
499 bfd_elf_generic_reloc, /* special_function */
500 "R_PPC_COPY", /* name */
b34976b6 501 FALSE, /* partial_inplace */
252b5132
RH
502 0, /* src_mask */
503 0, /* dst_mask */
b34976b6 504 FALSE), /* pcrel_offset */
252b5132
RH
505
506 /* Like R_PPC_ADDR32, but used when setting global offset table
507 entries. */
508 HOWTO (R_PPC_GLOB_DAT, /* type */
509 0, /* rightshift */
510 2, /* size (0 = byte, 1 = short, 2 = long) */
511 32, /* bitsize */
b34976b6 512 FALSE, /* pc_relative */
252b5132 513 0, /* bitpos */
86c95733 514 complain_overflow_dont, /* complain_on_overflow */
252b5132
RH
515 bfd_elf_generic_reloc, /* special_function */
516 "R_PPC_GLOB_DAT", /* name */
b34976b6 517 FALSE, /* partial_inplace */
252b5132
RH
518 0, /* src_mask */
519 0xffffffff, /* dst_mask */
b34976b6 520 FALSE), /* pcrel_offset */
252b5132
RH
521
522 /* Marks a procedure linkage table entry for a symbol. */
523 HOWTO (R_PPC_JMP_SLOT, /* type */
524 0, /* rightshift */
525 2, /* size (0 = byte, 1 = short, 2 = long) */
526 32, /* bitsize */
b34976b6 527 FALSE, /* pc_relative */
252b5132 528 0, /* bitpos */
86c95733 529 complain_overflow_dont, /* complain_on_overflow */
252b5132
RH
530 bfd_elf_generic_reloc, /* special_function */
531 "R_PPC_JMP_SLOT", /* name */
b34976b6 532 FALSE, /* partial_inplace */
252b5132
RH
533 0, /* src_mask */
534 0, /* dst_mask */
b34976b6 535 FALSE), /* pcrel_offset */
252b5132
RH
536
537 /* Used only by the dynamic linker. When the object is run, this
538 longword is set to the load address of the object, plus the
539 addend. */
540 HOWTO (R_PPC_RELATIVE, /* type */
541 0, /* rightshift */
542 2, /* size (0 = byte, 1 = short, 2 = long) */
543 32, /* bitsize */
b34976b6 544 FALSE, /* pc_relative */
252b5132 545 0, /* bitpos */
86c95733 546 complain_overflow_dont, /* complain_on_overflow */
252b5132
RH
547 bfd_elf_generic_reloc, /* special_function */
548 "R_PPC_RELATIVE", /* name */
b34976b6 549 FALSE, /* partial_inplace */
252b5132
RH
550 0, /* src_mask */
551 0xffffffff, /* dst_mask */
b34976b6 552 FALSE), /* pcrel_offset */
252b5132
RH
553
554 /* Like R_PPC_REL24, but uses the value of the symbol within the
555 object rather than the final value. Normally used for
556 _GLOBAL_OFFSET_TABLE_. */
557 HOWTO (R_PPC_LOCAL24PC, /* type */
558 0, /* rightshift */
559 2, /* size (0 = byte, 1 = short, 2 = long) */
560 26, /* bitsize */
b34976b6 561 TRUE, /* pc_relative */
252b5132
RH
562 0, /* bitpos */
563 complain_overflow_signed, /* complain_on_overflow */
564 bfd_elf_generic_reloc, /* special_function */
565 "R_PPC_LOCAL24PC", /* name */
b34976b6 566 FALSE, /* partial_inplace */
252b5132
RH
567 0, /* src_mask */
568 0x3fffffc, /* dst_mask */
b34976b6 569 TRUE), /* pcrel_offset */
252b5132
RH
570
571 /* Like R_PPC_ADDR32, but may be unaligned. */
572 HOWTO (R_PPC_UADDR32, /* type */
573 0, /* rightshift */
574 2, /* size (0 = byte, 1 = short, 2 = long) */
575 32, /* bitsize */
b34976b6 576 FALSE, /* pc_relative */
252b5132 577 0, /* bitpos */
86c95733 578 complain_overflow_dont, /* complain_on_overflow */
252b5132
RH
579 bfd_elf_generic_reloc, /* special_function */
580 "R_PPC_UADDR32", /* name */
b34976b6 581 FALSE, /* partial_inplace */
252b5132
RH
582 0, /* src_mask */
583 0xffffffff, /* dst_mask */
b34976b6 584 FALSE), /* pcrel_offset */
252b5132
RH
585
586 /* Like R_PPC_ADDR16, but may be unaligned. */
587 HOWTO (R_PPC_UADDR16, /* type */
588 0, /* rightshift */
589 1, /* size (0 = byte, 1 = short, 2 = long) */
590 16, /* bitsize */
b34976b6 591 FALSE, /* pc_relative */
252b5132
RH
592 0, /* bitpos */
593 complain_overflow_bitfield, /* complain_on_overflow */
594 bfd_elf_generic_reloc, /* special_function */
595 "R_PPC_UADDR16", /* name */
b34976b6 596 FALSE, /* partial_inplace */
252b5132
RH
597 0, /* src_mask */
598 0xffff, /* dst_mask */
b34976b6 599 FALSE), /* pcrel_offset */
252b5132
RH
600
601 /* 32-bit PC relative */
602 HOWTO (R_PPC_REL32, /* type */
603 0, /* rightshift */
604 2, /* size (0 = byte, 1 = short, 2 = long) */
605 32, /* bitsize */
b34976b6 606 TRUE, /* pc_relative */
252b5132 607 0, /* bitpos */
86c95733 608 complain_overflow_dont, /* complain_on_overflow */
252b5132
RH
609 bfd_elf_generic_reloc, /* special_function */
610 "R_PPC_REL32", /* name */
b34976b6 611 FALSE, /* partial_inplace */
252b5132
RH
612 0, /* src_mask */
613 0xffffffff, /* dst_mask */
b34976b6 614 TRUE), /* pcrel_offset */
252b5132
RH
615
616 /* 32-bit relocation to the symbol's procedure linkage table.
c3668558 617 FIXME: not supported. */
252b5132
RH
618 HOWTO (R_PPC_PLT32, /* type */
619 0, /* rightshift */
620 2, /* size (0 = byte, 1 = short, 2 = long) */
621 32, /* bitsize */
b34976b6 622 FALSE, /* pc_relative */
252b5132 623 0, /* bitpos */
86c95733 624 complain_overflow_dont, /* complain_on_overflow */
252b5132
RH
625 bfd_elf_generic_reloc, /* special_function */
626 "R_PPC_PLT32", /* name */
b34976b6 627 FALSE, /* partial_inplace */
252b5132
RH
628 0, /* src_mask */
629 0, /* dst_mask */
b34976b6 630 FALSE), /* pcrel_offset */
252b5132
RH
631
632 /* 32-bit PC relative relocation to the symbol's procedure linkage table.
c3668558 633 FIXME: not supported. */
252b5132
RH
634 HOWTO (R_PPC_PLTREL32, /* type */
635 0, /* rightshift */
636 2, /* size (0 = byte, 1 = short, 2 = long) */
637 32, /* bitsize */
b34976b6 638 TRUE, /* pc_relative */
252b5132 639 0, /* bitpos */
86c95733 640 complain_overflow_dont, /* complain_on_overflow */
252b5132
RH
641 bfd_elf_generic_reloc, /* special_function */
642 "R_PPC_PLTREL32", /* name */
b34976b6 643 FALSE, /* partial_inplace */
252b5132
RH
644 0, /* src_mask */
645 0, /* dst_mask */
b34976b6 646 TRUE), /* pcrel_offset */
252b5132
RH
647
648 /* Like R_PPC_ADDR16_LO, but referring to the PLT table entry for
649 the symbol. */
650 HOWTO (R_PPC_PLT16_LO, /* type */
651 0, /* rightshift */
652 1, /* size (0 = byte, 1 = short, 2 = long) */
653 16, /* bitsize */
b34976b6 654 FALSE, /* pc_relative */
252b5132
RH
655 0, /* bitpos */
656 complain_overflow_dont, /* complain_on_overflow */
657 bfd_elf_generic_reloc, /* special_function */
658 "R_PPC_PLT16_LO", /* name */
b34976b6 659 FALSE, /* partial_inplace */
252b5132
RH
660 0, /* src_mask */
661 0xffff, /* dst_mask */
b34976b6 662 FALSE), /* pcrel_offset */
252b5132
RH
663
664 /* Like R_PPC_ADDR16_HI, but referring to the PLT table entry for
665 the symbol. */
666 HOWTO (R_PPC_PLT16_HI, /* type */
667 16, /* rightshift */
668 1, /* size (0 = byte, 1 = short, 2 = long) */
669 16, /* bitsize */
b34976b6 670 FALSE, /* pc_relative */
252b5132 671 0, /* bitpos */
86c95733 672 complain_overflow_dont, /* complain_on_overflow */
252b5132
RH
673 bfd_elf_generic_reloc, /* special_function */
674 "R_PPC_PLT16_HI", /* name */
b34976b6 675 FALSE, /* partial_inplace */
252b5132
RH
676 0, /* src_mask */
677 0xffff, /* dst_mask */
b34976b6 678 FALSE), /* pcrel_offset */
252b5132
RH
679
680 /* Like R_PPC_ADDR16_HA, but referring to the PLT table entry for
681 the symbol. */
682 HOWTO (R_PPC_PLT16_HA, /* type */
683 16, /* rightshift */
684 1, /* size (0 = byte, 1 = short, 2 = long) */
685 16, /* bitsize */
b34976b6 686 FALSE, /* pc_relative */
252b5132 687 0, /* bitpos */
86c95733 688 complain_overflow_dont, /* complain_on_overflow */
252b5132
RH
689 ppc_elf_addr16_ha_reloc, /* special_function */
690 "R_PPC_PLT16_HA", /* name */
b34976b6 691 FALSE, /* partial_inplace */
252b5132
RH
692 0, /* src_mask */
693 0xffff, /* dst_mask */
b34976b6 694 FALSE), /* pcrel_offset */
252b5132
RH
695
696 /* A sign-extended 16 bit value relative to _SDA_BASE_, for use with
697 small data items. */
698 HOWTO (R_PPC_SDAREL16, /* type */
699 0, /* rightshift */
700 1, /* size (0 = byte, 1 = short, 2 = long) */
701 16, /* bitsize */
b34976b6 702 FALSE, /* pc_relative */
252b5132
RH
703 0, /* bitpos */
704 complain_overflow_signed, /* complain_on_overflow */
705 bfd_elf_generic_reloc, /* special_function */
706 "R_PPC_SDAREL16", /* name */
b34976b6 707 FALSE, /* partial_inplace */
252b5132
RH
708 0, /* src_mask */
709 0xffff, /* dst_mask */
b34976b6 710 FALSE), /* pcrel_offset */
252b5132 711
c061c2d8 712 /* 16-bit section relative relocation. */
252b5132
RH
713 HOWTO (R_PPC_SECTOFF, /* type */
714 0, /* rightshift */
c061c2d8
AM
715 1, /* size (0 = byte, 1 = short, 2 = long) */
716 16, /* bitsize */
b34976b6 717 FALSE, /* pc_relative */
252b5132 718 0, /* bitpos */
86c95733 719 complain_overflow_signed, /* complain_on_overflow */
252b5132
RH
720 bfd_elf_generic_reloc, /* special_function */
721 "R_PPC_SECTOFF", /* name */
b34976b6 722 FALSE, /* partial_inplace */
252b5132 723 0, /* src_mask */
c061c2d8 724 0xffff, /* dst_mask */
b34976b6 725 FALSE), /* pcrel_offset */
252b5132 726
c3668558 727 /* 16-bit lower half section relative relocation. */
252b5132
RH
728 HOWTO (R_PPC_SECTOFF_LO, /* type */
729 0, /* rightshift */
730 1, /* size (0 = byte, 1 = short, 2 = long) */
731 16, /* bitsize */
b34976b6 732 FALSE, /* pc_relative */
252b5132
RH
733 0, /* bitpos */
734 complain_overflow_dont, /* complain_on_overflow */
735 bfd_elf_generic_reloc, /* special_function */
736 "R_PPC_SECTOFF_LO", /* name */
b34976b6 737 FALSE, /* partial_inplace */
252b5132
RH
738 0, /* src_mask */
739 0xffff, /* dst_mask */
b34976b6 740 FALSE), /* pcrel_offset */
252b5132 741
c3668558 742 /* 16-bit upper half section relative relocation. */
252b5132
RH
743 HOWTO (R_PPC_SECTOFF_HI, /* type */
744 16, /* rightshift */
745 1, /* size (0 = byte, 1 = short, 2 = long) */
746 16, /* bitsize */
b34976b6 747 FALSE, /* pc_relative */
252b5132 748 0, /* bitpos */
86c95733 749 complain_overflow_dont, /* complain_on_overflow */
252b5132
RH
750 bfd_elf_generic_reloc, /* special_function */
751 "R_PPC_SECTOFF_HI", /* name */
b34976b6 752 FALSE, /* partial_inplace */
252b5132
RH
753 0, /* src_mask */
754 0xffff, /* dst_mask */
b34976b6 755 FALSE), /* pcrel_offset */
252b5132 756
c3668558 757 /* 16-bit upper half adjusted section relative relocation. */
252b5132
RH
758 HOWTO (R_PPC_SECTOFF_HA, /* type */
759 16, /* rightshift */
760 1, /* size (0 = byte, 1 = short, 2 = long) */
761 16, /* bitsize */
b34976b6 762 FALSE, /* pc_relative */
252b5132 763 0, /* bitpos */
86c95733 764 complain_overflow_dont, /* complain_on_overflow */
252b5132
RH
765 ppc_elf_addr16_ha_reloc, /* special_function */
766 "R_PPC_SECTOFF_HA", /* name */
b34976b6 767 FALSE, /* partial_inplace */
252b5132
RH
768 0, /* src_mask */
769 0xffff, /* dst_mask */
b34976b6 770 FALSE), /* pcrel_offset */
252b5132 771
727fc41e 772 /* Marker relocs for TLS. */
7619e7c7 773 HOWTO (R_PPC_TLS,
252b5132
RH
774 0, /* rightshift */
775 2, /* size (0 = byte, 1 = short, 2 = long) */
776 32, /* bitsize */
b34976b6 777 FALSE, /* pc_relative */
252b5132 778 0, /* bitpos */
7619e7c7 779 complain_overflow_dont, /* complain_on_overflow */
252b5132 780 bfd_elf_generic_reloc, /* special_function */
7619e7c7
AM
781 "R_PPC_TLS", /* name */
782 FALSE, /* partial_inplace */
783 0, /* src_mask */
784 0, /* dst_mask */
785 FALSE), /* pcrel_offset */
786
727fc41e
AM
787 HOWTO (R_PPC_TLSGD,
788 0, /* rightshift */
789 2, /* size (0 = byte, 1 = short, 2 = long) */
790 32, /* bitsize */
791 FALSE, /* pc_relative */
792 0, /* bitpos */
793 complain_overflow_dont, /* complain_on_overflow */
794 bfd_elf_generic_reloc, /* special_function */
795 "R_PPC_TLSGD", /* name */
796 FALSE, /* partial_inplace */
797 0, /* src_mask */
798 0, /* dst_mask */
799 FALSE), /* pcrel_offset */
800
801 HOWTO (R_PPC_TLSLD,
802 0, /* rightshift */
803 2, /* size (0 = byte, 1 = short, 2 = long) */
804 32, /* bitsize */
805 FALSE, /* pc_relative */
806 0, /* bitpos */
807 complain_overflow_dont, /* complain_on_overflow */
808 bfd_elf_generic_reloc, /* special_function */
809 "R_PPC_TLSLD", /* name */
810 FALSE, /* partial_inplace */
811 0, /* src_mask */
812 0, /* dst_mask */
813 FALSE), /* pcrel_offset */
814
7619e7c7
AM
815 /* Computes the load module index of the load module that contains the
816 definition of its TLS sym. */
817 HOWTO (R_PPC_DTPMOD32,
818 0, /* rightshift */
819 2, /* size (0 = byte, 1 = short, 2 = long) */
820 32, /* bitsize */
821 FALSE, /* pc_relative */
822 0, /* bitpos */
823 complain_overflow_dont, /* complain_on_overflow */
824 ppc_elf_unhandled_reloc, /* special_function */
825 "R_PPC_DTPMOD32", /* name */
b34976b6 826 FALSE, /* partial_inplace */
252b5132
RH
827 0, /* src_mask */
828 0xffffffff, /* dst_mask */
b34976b6 829 FALSE), /* pcrel_offset */
252b5132 830
7619e7c7
AM
831 /* Computes a dtv-relative displacement, the difference between the value
832 of sym+add and the base address of the thread-local storage block that
833 contains the definition of sym, minus 0x8000. */
834 HOWTO (R_PPC_DTPREL32,
835 0, /* rightshift */
836 2, /* size (0 = byte, 1 = short, 2 = long) */
837 32, /* bitsize */
838 FALSE, /* pc_relative */
839 0, /* bitpos */
840 complain_overflow_dont, /* complain_on_overflow */
841 ppc_elf_unhandled_reloc, /* special_function */
842 "R_PPC_DTPREL32", /* name */
843 FALSE, /* partial_inplace */
844 0, /* src_mask */
845 0xffffffff, /* dst_mask */
846 FALSE), /* pcrel_offset */
847
848 /* A 16 bit dtprel reloc. */
849 HOWTO (R_PPC_DTPREL16,
252b5132
RH
850 0, /* rightshift */
851 1, /* size (0 = byte, 1 = short, 2 = long) */
852 16, /* bitsize */
b34976b6 853 FALSE, /* pc_relative */
252b5132 854 0, /* bitpos */
7619e7c7
AM
855 complain_overflow_signed, /* complain_on_overflow */
856 ppc_elf_unhandled_reloc, /* special_function */
857 "R_PPC_DTPREL16", /* name */
b34976b6 858 FALSE, /* partial_inplace */
252b5132
RH
859 0, /* src_mask */
860 0xffff, /* dst_mask */
b34976b6 861 FALSE), /* pcrel_offset */
252b5132 862
7619e7c7
AM
863 /* Like DTPREL16, but no overflow. */
864 HOWTO (R_PPC_DTPREL16_LO,
252b5132
RH
865 0, /* rightshift */
866 1, /* size (0 = byte, 1 = short, 2 = long) */
867 16, /* bitsize */
b34976b6 868 FALSE, /* pc_relative */
252b5132 869 0, /* bitpos */
7619e7c7
AM
870 complain_overflow_dont, /* complain_on_overflow */
871 ppc_elf_unhandled_reloc, /* special_function */
872 "R_PPC_DTPREL16_LO", /* name */
b34976b6 873 FALSE, /* partial_inplace */
252b5132
RH
874 0, /* src_mask */
875 0xffff, /* dst_mask */
b34976b6 876 FALSE), /* pcrel_offset */
252b5132 877
7619e7c7
AM
878 /* Like DTPREL16_LO, but next higher group of 16 bits. */
879 HOWTO (R_PPC_DTPREL16_HI,
252b5132
RH
880 16, /* rightshift */
881 1, /* size (0 = byte, 1 = short, 2 = long) */
882 16, /* bitsize */
b34976b6 883 FALSE, /* pc_relative */
252b5132
RH
884 0, /* bitpos */
885 complain_overflow_dont, /* complain_on_overflow */
7619e7c7
AM
886 ppc_elf_unhandled_reloc, /* special_function */
887 "R_PPC_DTPREL16_HI", /* name */
b34976b6 888 FALSE, /* partial_inplace */
252b5132
RH
889 0, /* src_mask */
890 0xffff, /* dst_mask */
b34976b6 891 FALSE), /* pcrel_offset */
252b5132 892
7619e7c7
AM
893 /* Like DTPREL16_HI, but adjust for low 16 bits. */
894 HOWTO (R_PPC_DTPREL16_HA,
252b5132
RH
895 16, /* rightshift */
896 1, /* size (0 = byte, 1 = short, 2 = long) */
897 16, /* bitsize */
b34976b6 898 FALSE, /* pc_relative */
252b5132
RH
899 0, /* bitpos */
900 complain_overflow_dont, /* complain_on_overflow */
7619e7c7
AM
901 ppc_elf_unhandled_reloc, /* special_function */
902 "R_PPC_DTPREL16_HA", /* name */
b34976b6 903 FALSE, /* partial_inplace */
252b5132
RH
904 0, /* src_mask */
905 0xffff, /* dst_mask */
b34976b6 906 FALSE), /* pcrel_offset */
252b5132 907
7619e7c7
AM
908 /* Computes a tp-relative displacement, the difference between the value of
909 sym+add and the value of the thread pointer (r13). */
910 HOWTO (R_PPC_TPREL32,
911 0, /* rightshift */
912 2, /* size (0 = byte, 1 = short, 2 = long) */
913 32, /* bitsize */
914 FALSE, /* pc_relative */
915 0, /* bitpos */
916 complain_overflow_dont, /* complain_on_overflow */
917 ppc_elf_unhandled_reloc, /* special_function */
918 "R_PPC_TPREL32", /* name */
919 FALSE, /* partial_inplace */
920 0, /* src_mask */
921 0xffffffff, /* dst_mask */
922 FALSE), /* pcrel_offset */
923
924 /* A 16 bit tprel reloc. */
925 HOWTO (R_PPC_TPREL16,
252b5132
RH
926 0, /* rightshift */
927 1, /* size (0 = byte, 1 = short, 2 = long) */
928 16, /* bitsize */
b34976b6 929 FALSE, /* pc_relative */
252b5132 930 0, /* bitpos */
7619e7c7
AM
931 complain_overflow_signed, /* complain_on_overflow */
932 ppc_elf_unhandled_reloc, /* special_function */
933 "R_PPC_TPREL16", /* name */
b34976b6 934 FALSE, /* partial_inplace */
252b5132
RH
935 0, /* src_mask */
936 0xffff, /* dst_mask */
b34976b6 937 FALSE), /* pcrel_offset */
252b5132 938
7619e7c7
AM
939 /* Like TPREL16, but no overflow. */
940 HOWTO (R_PPC_TPREL16_LO,
252b5132
RH
941 0, /* rightshift */
942 1, /* size (0 = byte, 1 = short, 2 = long) */
943 16, /* bitsize */
b34976b6 944 FALSE, /* pc_relative */
252b5132 945 0, /* bitpos */
7619e7c7
AM
946 complain_overflow_dont, /* complain_on_overflow */
947 ppc_elf_unhandled_reloc, /* special_function */
948 "R_PPC_TPREL16_LO", /* name */
b34976b6 949 FALSE, /* partial_inplace */
252b5132
RH
950 0, /* src_mask */
951 0xffff, /* dst_mask */
b34976b6 952 FALSE), /* pcrel_offset */
252b5132 953
7619e7c7
AM
954 /* Like TPREL16_LO, but next higher group of 16 bits. */
955 HOWTO (R_PPC_TPREL16_HI,
956 16, /* rightshift */
957 1, /* size (0 = byte, 1 = short, 2 = long) */
958 16, /* bitsize */
959 FALSE, /* pc_relative */
960 0, /* bitpos */
961 complain_overflow_dont, /* complain_on_overflow */
962 ppc_elf_unhandled_reloc, /* special_function */
963 "R_PPC_TPREL16_HI", /* name */
964 FALSE, /* partial_inplace */
965 0, /* src_mask */
966 0xffff, /* dst_mask */
967 FALSE), /* pcrel_offset */
968
969 /* Like TPREL16_HI, but adjust for low 16 bits. */
970 HOWTO (R_PPC_TPREL16_HA,
971 16, /* rightshift */
972 1, /* size (0 = byte, 1 = short, 2 = long) */
973 16, /* bitsize */
974 FALSE, /* pc_relative */
975 0, /* bitpos */
976 complain_overflow_dont, /* complain_on_overflow */
977 ppc_elf_unhandled_reloc, /* special_function */
978 "R_PPC_TPREL16_HA", /* name */
979 FALSE, /* partial_inplace */
980 0, /* src_mask */
981 0xffff, /* dst_mask */
982 FALSE), /* pcrel_offset */
983
984 /* Allocates two contiguous entries in the GOT to hold a tls_index structure,
985 with values (sym+add)@dtpmod and (sym+add)@dtprel, and computes the offset
986 to the first entry. */
987 HOWTO (R_PPC_GOT_TLSGD16,
252b5132
RH
988 0, /* rightshift */
989 1, /* size (0 = byte, 1 = short, 2 = long) */
990 16, /* bitsize */
b34976b6 991 FALSE, /* pc_relative */
252b5132
RH
992 0, /* bitpos */
993 complain_overflow_signed, /* complain_on_overflow */
7619e7c7
AM
994 ppc_elf_unhandled_reloc, /* special_function */
995 "R_PPC_GOT_TLSGD16", /* name */
b34976b6 996 FALSE, /* partial_inplace */
252b5132
RH
997 0, /* src_mask */
998 0xffff, /* dst_mask */
b34976b6 999 FALSE), /* pcrel_offset */
252b5132 1000
7619e7c7
AM
1001 /* Like GOT_TLSGD16, but no overflow. */
1002 HOWTO (R_PPC_GOT_TLSGD16_LO,
252b5132 1003 0, /* rightshift */
7619e7c7 1004 1, /* size (0 = byte, 1 = short, 2 = long) */
252b5132 1005 16, /* bitsize */
b34976b6 1006 FALSE, /* pc_relative */
252b5132 1007 0, /* bitpos */
7619e7c7
AM
1008 complain_overflow_dont, /* complain_on_overflow */
1009 ppc_elf_unhandled_reloc, /* special_function */
1010 "R_PPC_GOT_TLSGD16_LO", /* name */
b34976b6 1011 FALSE, /* partial_inplace */
252b5132
RH
1012 0, /* src_mask */
1013 0xffff, /* dst_mask */
b34976b6 1014 FALSE), /* pcrel_offset */
252b5132 1015
7619e7c7
AM
1016 /* Like GOT_TLSGD16_LO, but next higher group of 16 bits. */
1017 HOWTO (R_PPC_GOT_TLSGD16_HI,
1018 16, /* rightshift */
1019 1, /* size (0 = byte, 1 = short, 2 = long) */
1020 16, /* bitsize */
1021 FALSE, /* pc_relative */
1022 0, /* bitpos */
1023 complain_overflow_dont, /* complain_on_overflow */
1024 ppc_elf_unhandled_reloc, /* special_function */
1025 "R_PPC_GOT_TLSGD16_HI", /* name */
1026 FALSE, /* partial_inplace */
1027 0, /* src_mask */
1028 0xffff, /* dst_mask */
1029 FALSE), /* pcrel_offset */
252b5132 1030
7619e7c7
AM
1031 /* Like GOT_TLSGD16_HI, but adjust for low 16 bits. */
1032 HOWTO (R_PPC_GOT_TLSGD16_HA,
1033 16, /* rightshift */
1034 1, /* size (0 = byte, 1 = short, 2 = long) */
1035 16, /* bitsize */
1036 FALSE, /* pc_relative */
1037 0, /* bitpos */
1038 complain_overflow_dont, /* complain_on_overflow */
1039 ppc_elf_unhandled_reloc, /* special_function */
1040 "R_PPC_GOT_TLSGD16_HA", /* name */
1041 FALSE, /* partial_inplace */
1042 0, /* src_mask */
1043 0xffff, /* dst_mask */
1044 FALSE), /* pcrel_offset */
1045
1046 /* Allocates two contiguous entries in the GOT to hold a tls_index structure,
1047 with values (sym+add)@dtpmod and zero, and computes the offset to the
1048 first entry. */
1049 HOWTO (R_PPC_GOT_TLSLD16,
252b5132
RH
1050 0, /* rightshift */
1051 1, /* size (0 = byte, 1 = short, 2 = long) */
1052 16, /* bitsize */
7619e7c7 1053 FALSE, /* pc_relative */
252b5132
RH
1054 0, /* bitpos */
1055 complain_overflow_signed, /* complain_on_overflow */
7619e7c7
AM
1056 ppc_elf_unhandled_reloc, /* special_function */
1057 "R_PPC_GOT_TLSLD16", /* name */
b34976b6 1058 FALSE, /* partial_inplace */
252b5132
RH
1059 0, /* src_mask */
1060 0xffff, /* dst_mask */
b34976b6 1061 FALSE), /* pcrel_offset */
252b5132 1062
7619e7c7
AM
1063 /* Like GOT_TLSLD16, but no overflow. */
1064 HOWTO (R_PPC_GOT_TLSLD16_LO,
252b5132 1065 0, /* rightshift */
7619e7c7
AM
1066 1, /* size (0 = byte, 1 = short, 2 = long) */
1067 16, /* bitsize */
b34976b6 1068 FALSE, /* pc_relative */
252b5132
RH
1069 0, /* bitpos */
1070 complain_overflow_dont, /* complain_on_overflow */
7619e7c7
AM
1071 ppc_elf_unhandled_reloc, /* special_function */
1072 "R_PPC_GOT_TLSLD16_LO", /* name */
b34976b6 1073 FALSE, /* partial_inplace */
252b5132 1074 0, /* src_mask */
7619e7c7 1075 0xffff, /* dst_mask */
b34976b6 1076 FALSE), /* pcrel_offset */
252b5132 1077
7619e7c7
AM
1078 /* Like GOT_TLSLD16_LO, but next higher group of 16 bits. */
1079 HOWTO (R_PPC_GOT_TLSLD16_HI,
1080 16, /* rightshift */
1081 1, /* size (0 = byte, 1 = short, 2 = long) */
1082 16, /* bitsize */
b34976b6 1083 FALSE, /* pc_relative */
252b5132
RH
1084 0, /* bitpos */
1085 complain_overflow_dont, /* complain_on_overflow */
7619e7c7
AM
1086 ppc_elf_unhandled_reloc, /* special_function */
1087 "R_PPC_GOT_TLSLD16_HI", /* name */
b34976b6 1088 FALSE, /* partial_inplace */
252b5132 1089 0, /* src_mask */
7619e7c7 1090 0xffff, /* dst_mask */
b34976b6 1091 FALSE), /* pcrel_offset */
252b5132 1092
7619e7c7
AM
1093 /* Like GOT_TLSLD16_HI, but adjust for low 16 bits. */
1094 HOWTO (R_PPC_GOT_TLSLD16_HA,
1095 16, /* rightshift */
1096 1, /* size (0 = byte, 1 = short, 2 = long) */
1097 16, /* bitsize */
1098 FALSE, /* pc_relative */
1099 0, /* bitpos */
1100 complain_overflow_dont, /* complain_on_overflow */
1101 ppc_elf_unhandled_reloc, /* special_function */
1102 "R_PPC_GOT_TLSLD16_HA", /* name */
1103 FALSE, /* partial_inplace */
1104 0, /* src_mask */
1105 0xffff, /* dst_mask */
1106 FALSE), /* pcrel_offset */
1107
1108 /* Allocates an entry in the GOT with value (sym+add)@dtprel, and computes
1109 the offset to the entry. */
1110 HOWTO (R_PPC_GOT_DTPREL16,
252b5132
RH
1111 0, /* rightshift */
1112 1, /* size (0 = byte, 1 = short, 2 = long) */
1113 16, /* bitsize */
b34976b6 1114 FALSE, /* pc_relative */
252b5132
RH
1115 0, /* bitpos */
1116 complain_overflow_signed, /* complain_on_overflow */
7619e7c7
AM
1117 ppc_elf_unhandled_reloc, /* special_function */
1118 "R_PPC_GOT_DTPREL16", /* name */
b34976b6 1119 FALSE, /* partial_inplace */
252b5132
RH
1120 0, /* src_mask */
1121 0xffff, /* dst_mask */
b34976b6 1122 FALSE), /* pcrel_offset */
252b5132 1123
7619e7c7
AM
1124 /* Like GOT_DTPREL16, but no overflow. */
1125 HOWTO (R_PPC_GOT_DTPREL16_LO,
1126 0, /* rightshift */
1127 1, /* size (0 = byte, 1 = short, 2 = long) */
1128 16, /* bitsize */
1129 FALSE, /* pc_relative */
1130 0, /* bitpos */
1131 complain_overflow_dont, /* complain_on_overflow */
1132 ppc_elf_unhandled_reloc, /* special_function */
1133 "R_PPC_GOT_DTPREL16_LO", /* name */
1134 FALSE, /* partial_inplace */
1135 0, /* src_mask */
1136 0xffff, /* dst_mask */
1137 FALSE), /* pcrel_offset */
252b5132 1138
7619e7c7
AM
1139 /* Like GOT_DTPREL16_LO, but next higher group of 16 bits. */
1140 HOWTO (R_PPC_GOT_DTPREL16_HI,
1141 16, /* rightshift */
1142 1, /* size (0 = byte, 1 = short, 2 = long) */
1143 16, /* bitsize */
1144 FALSE, /* pc_relative */
1145 0, /* bitpos */
1146 complain_overflow_dont, /* complain_on_overflow */
1147 ppc_elf_unhandled_reloc, /* special_function */
1148 "R_PPC_GOT_DTPREL16_HI", /* name */
1149 FALSE, /* partial_inplace */
1150 0, /* src_mask */
1151 0xffff, /* dst_mask */
1152 FALSE), /* pcrel_offset */
252b5132 1153
7619e7c7
AM
1154 /* Like GOT_DTPREL16_HI, but adjust for low 16 bits. */
1155 HOWTO (R_PPC_GOT_DTPREL16_HA,
1156 16, /* rightshift */
1157 1, /* size (0 = byte, 1 = short, 2 = long) */
1158 16, /* bitsize */
1159 FALSE, /* pc_relative */
1160 0, /* bitpos */
1161 complain_overflow_dont, /* complain_on_overflow */
1162 ppc_elf_unhandled_reloc, /* special_function */
1163 "R_PPC_GOT_DTPREL16_HA", /* name */
1164 FALSE, /* partial_inplace */
1165 0, /* src_mask */
1166 0xffff, /* dst_mask */
1167 FALSE), /* pcrel_offset */
c3668558 1168
7619e7c7
AM
1169 /* Allocates an entry in the GOT with value (sym+add)@tprel, and computes the
1170 offset to the entry. */
1171 HOWTO (R_PPC_GOT_TPREL16,
1172 0, /* rightshift */
1173 1, /* size (0 = byte, 1 = short, 2 = long) */
1174 16, /* bitsize */
1175 FALSE, /* pc_relative */
1176 0, /* bitpos */
1177 complain_overflow_signed, /* complain_on_overflow */
1178 ppc_elf_unhandled_reloc, /* special_function */
1179 "R_PPC_GOT_TPREL16", /* name */
1180 FALSE, /* partial_inplace */
1181 0, /* src_mask */
1182 0xffff, /* dst_mask */
1183 FALSE), /* pcrel_offset */
1184
1185 /* Like GOT_TPREL16, but no overflow. */
1186 HOWTO (R_PPC_GOT_TPREL16_LO,
1187 0, /* rightshift */
1188 1, /* size (0 = byte, 1 = short, 2 = long) */
1189 16, /* bitsize */
1190 FALSE, /* pc_relative */
1191 0, /* bitpos */
1192 complain_overflow_dont, /* complain_on_overflow */
1193 ppc_elf_unhandled_reloc, /* special_function */
1194 "R_PPC_GOT_TPREL16_LO", /* name */
1195 FALSE, /* partial_inplace */
1196 0, /* src_mask */
1197 0xffff, /* dst_mask */
1198 FALSE), /* pcrel_offset */
1199
1200 /* Like GOT_TPREL16_LO, but next higher group of 16 bits. */
1201 HOWTO (R_PPC_GOT_TPREL16_HI,
1202 16, /* rightshift */
1203 1, /* size (0 = byte, 1 = short, 2 = long) */
1204 16, /* bitsize */
1205 FALSE, /* pc_relative */
1206 0, /* bitpos */
1207 complain_overflow_dont, /* complain_on_overflow */
1208 ppc_elf_unhandled_reloc, /* special_function */
1209 "R_PPC_GOT_TPREL16_HI", /* name */
1210 FALSE, /* partial_inplace */
1211 0, /* src_mask */
1212 0xffff, /* dst_mask */
1213 FALSE), /* pcrel_offset */
1214
1215 /* Like GOT_TPREL16_HI, but adjust for low 16 bits. */
1216 HOWTO (R_PPC_GOT_TPREL16_HA,
1217 16, /* rightshift */
1218 1, /* size (0 = byte, 1 = short, 2 = long) */
1219 16, /* bitsize */
1220 FALSE, /* pc_relative */
1221 0, /* bitpos */
1222 complain_overflow_dont, /* complain_on_overflow */
1223 ppc_elf_unhandled_reloc, /* special_function */
1224 "R_PPC_GOT_TPREL16_HA", /* name */
1225 FALSE, /* partial_inplace */
1226 0, /* src_mask */
1227 0xffff, /* dst_mask */
1228 FALSE), /* pcrel_offset */
1229
1230 /* The remaining relocs are from the Embedded ELF ABI, and are not
1231 in the SVR4 ELF ABI. */
1232
1233 /* 32 bit value resulting from the addend minus the symbol. */
1234 HOWTO (R_PPC_EMB_NADDR32, /* type */
1235 0, /* rightshift */
1236 2, /* size (0 = byte, 1 = short, 2 = long) */
1237 32, /* bitsize */
1238 FALSE, /* pc_relative */
1239 0, /* bitpos */
86c95733 1240 complain_overflow_dont, /* complain_on_overflow */
7619e7c7
AM
1241 bfd_elf_generic_reloc, /* special_function */
1242 "R_PPC_EMB_NADDR32", /* name */
1243 FALSE, /* partial_inplace */
1244 0, /* src_mask */
1245 0xffffffff, /* dst_mask */
1246 FALSE), /* pcrel_offset */
1247
1248 /* 16 bit value resulting from the addend minus the symbol. */
1249 HOWTO (R_PPC_EMB_NADDR16, /* type */
1250 0, /* rightshift */
1251 1, /* size (0 = byte, 1 = short, 2 = long) */
1252 16, /* bitsize */
1253 FALSE, /* pc_relative */
1254 0, /* bitpos */
86c95733 1255 complain_overflow_signed, /* complain_on_overflow */
7619e7c7
AM
1256 bfd_elf_generic_reloc, /* special_function */
1257 "R_PPC_EMB_NADDR16", /* name */
1258 FALSE, /* partial_inplace */
1259 0, /* src_mask */
1260 0xffff, /* dst_mask */
1261 FALSE), /* pcrel_offset */
1262
1263 /* 16 bit value resulting from the addend minus the symbol. */
1264 HOWTO (R_PPC_EMB_NADDR16_LO, /* type */
1265 0, /* rightshift */
1266 1, /* size (0 = byte, 1 = short, 2 = long) */
1267 16, /* bitsize */
1268 FALSE, /* pc_relative */
1269 0, /* bitpos */
1270 complain_overflow_dont,/* complain_on_overflow */
1271 bfd_elf_generic_reloc, /* special_function */
1272 "R_PPC_EMB_ADDR16_LO", /* name */
1273 FALSE, /* partial_inplace */
1274 0, /* src_mask */
1275 0xffff, /* dst_mask */
1276 FALSE), /* pcrel_offset */
1277
1278 /* The high order 16 bits of the addend minus the symbol. */
1279 HOWTO (R_PPC_EMB_NADDR16_HI, /* type */
1280 16, /* rightshift */
1281 1, /* size (0 = byte, 1 = short, 2 = long) */
1282 16, /* bitsize */
1283 FALSE, /* pc_relative */
1284 0, /* bitpos */
1285 complain_overflow_dont, /* complain_on_overflow */
1286 bfd_elf_generic_reloc, /* special_function */
1287 "R_PPC_EMB_NADDR16_HI", /* name */
1288 FALSE, /* partial_inplace */
1289 0, /* src_mask */
1290 0xffff, /* dst_mask */
1291 FALSE), /* pcrel_offset */
1292
1293 /* The high order 16 bits of the result of the addend minus the address,
1294 plus 1 if the contents of the low 16 bits, treated as a signed number,
1295 is negative. */
1296 HOWTO (R_PPC_EMB_NADDR16_HA, /* type */
1297 16, /* rightshift */
1298 1, /* size (0 = byte, 1 = short, 2 = long) */
1299 16, /* bitsize */
1300 FALSE, /* pc_relative */
1301 0, /* bitpos */
1302 complain_overflow_dont, /* complain_on_overflow */
25dbc73a
AM
1303 ppc_elf_addr16_ha_reloc, /* special_function */
1304 "R_PPC_EMB_NADDR16_HA", /* name */
1305 FALSE, /* partial_inplace */
1306 0, /* src_mask */
1307 0xffff, /* dst_mask */
1308 FALSE), /* pcrel_offset */
1309
1310 /* 16 bit value resulting from allocating a 4 byte word to hold an
1311 address in the .sdata section, and returning the offset from
1312 _SDA_BASE_ for that relocation. */
1313 HOWTO (R_PPC_EMB_SDAI16, /* type */
1314 0, /* rightshift */
1315 1, /* size (0 = byte, 1 = short, 2 = long) */
1316 16, /* bitsize */
1317 FALSE, /* pc_relative */
1318 0, /* bitpos */
bd6c6e2b 1319 complain_overflow_signed, /* complain_on_overflow */
25dbc73a
AM
1320 bfd_elf_generic_reloc, /* special_function */
1321 "R_PPC_EMB_SDAI16", /* name */
1322 FALSE, /* partial_inplace */
1323 0, /* src_mask */
1324 0xffff, /* dst_mask */
1325 FALSE), /* pcrel_offset */
1326
1327 /* 16 bit value resulting from allocating a 4 byte word to hold an
1328 address in the .sdata2 section, and returning the offset from
1329 _SDA2_BASE_ for that relocation. */
1330 HOWTO (R_PPC_EMB_SDA2I16, /* type */
1331 0, /* rightshift */
1332 1, /* size (0 = byte, 1 = short, 2 = long) */
1333 16, /* bitsize */
1334 FALSE, /* pc_relative */
1335 0, /* bitpos */
bd6c6e2b 1336 complain_overflow_signed, /* complain_on_overflow */
25dbc73a
AM
1337 bfd_elf_generic_reloc, /* special_function */
1338 "R_PPC_EMB_SDA2I16", /* name */
1339 FALSE, /* partial_inplace */
1340 0, /* src_mask */
1341 0xffff, /* dst_mask */
1342 FALSE), /* pcrel_offset */
1343
1344 /* A sign-extended 16 bit value relative to _SDA2_BASE_, for use with
1345 small data items. */
1346 HOWTO (R_PPC_EMB_SDA2REL, /* type */
1347 0, /* rightshift */
1348 1, /* size (0 = byte, 1 = short, 2 = long) */
1349 16, /* bitsize */
1350 FALSE, /* pc_relative */
1351 0, /* bitpos */
1352 complain_overflow_signed, /* complain_on_overflow */
1353 bfd_elf_generic_reloc, /* special_function */
1354 "R_PPC_EMB_SDA2REL", /* name */
1355 FALSE, /* partial_inplace */
1356 0, /* src_mask */
1357 0xffff, /* dst_mask */
1358 FALSE), /* pcrel_offset */
1359
1360 /* Relocate against either _SDA_BASE_ or _SDA2_BASE_, filling in the 16 bit
1361 signed offset from the appropriate base, and filling in the register
1362 field with the appropriate register (0, 2, or 13). */
1363 HOWTO (R_PPC_EMB_SDA21, /* type */
1364 0, /* rightshift */
1365 2, /* size (0 = byte, 1 = short, 2 = long) */
1366 16, /* bitsize */
1367 FALSE, /* pc_relative */
1368 0, /* bitpos */
1369 complain_overflow_signed, /* complain_on_overflow */
1370 bfd_elf_generic_reloc, /* special_function */
1371 "R_PPC_EMB_SDA21", /* name */
1372 FALSE, /* partial_inplace */
1373 0, /* src_mask */
1374 0xffff, /* dst_mask */
1375 FALSE), /* pcrel_offset */
1376
1377 /* Relocation not handled: R_PPC_EMB_MRKREF */
1378 /* Relocation not handled: R_PPC_EMB_RELSEC16 */
1379 /* Relocation not handled: R_PPC_EMB_RELST_LO */
1380 /* Relocation not handled: R_PPC_EMB_RELST_HI */
1381 /* Relocation not handled: R_PPC_EMB_RELST_HA */
1382 /* Relocation not handled: R_PPC_EMB_BIT_FLD */
1383
1384 /* PC relative relocation against either _SDA_BASE_ or _SDA2_BASE_, filling
1385 in the 16 bit signed offset from the appropriate base, and filling in the
1386 register field with the appropriate register (0, 2, or 13). */
1387 HOWTO (R_PPC_EMB_RELSDA, /* type */
1388 0, /* rightshift */
1389 1, /* size (0 = byte, 1 = short, 2 = long) */
1390 16, /* bitsize */
ddfd6795 1391 FALSE, /* pc_relative */
25dbc73a
AM
1392 0, /* bitpos */
1393 complain_overflow_signed, /* complain_on_overflow */
1394 bfd_elf_generic_reloc, /* special_function */
1395 "R_PPC_EMB_RELSDA", /* name */
1396 FALSE, /* partial_inplace */
1397 0, /* src_mask */
1398 0xffff, /* dst_mask */
1399 FALSE), /* pcrel_offset */
1400
b9c361e0
JL
1401 /* A relative 8 bit branch. */
1402 HOWTO (R_PPC_VLE_REL8, /* type */
1403 1, /* rightshift */
1404 1, /* size (0 = byte, 1 = short, 2 = long) */
1405 8, /* bitsize */
1406 TRUE, /* pc_relative */
1407 0, /* bitpos */
1408 complain_overflow_signed, /* complain_on_overflow */
1409 bfd_elf_generic_reloc, /* special_function */
1410 "R_PPC_VLE_REL8", /* name */
1411 FALSE, /* partial_inplace */
1412 0, /* src_mask */
1413 0xff, /* dst_mask */
1414 TRUE), /* pcrel_offset */
68ffbac6 1415
b9c361e0
JL
1416 /* A relative 15 bit branch. */
1417 HOWTO (R_PPC_VLE_REL15, /* type */
1418 1, /* rightshift */
1419 2, /* size (0 = byte, 1 = short, 2 = long) */
1420 15, /* bitsize */
1421 TRUE, /* pc_relative */
1422 1, /* bitpos */
1423 complain_overflow_signed, /* complain_on_overflow */
1424 bfd_elf_generic_reloc, /* special_function */
1425 "R_PPC_VLE_REL15", /* name */
1426 FALSE, /* partial_inplace */
1427 0, /* src_mask */
1428 0xfe, /* dst_mask */
1429 TRUE), /* pcrel_offset */
1430
68ffbac6 1431 /* A relative 24 bit branch. */
b9c361e0
JL
1432 HOWTO (R_PPC_VLE_REL24, /* type */
1433 1, /* rightshift */
1434 2, /* size (0 = byte, 1 = short, 2 = long) */
1435 24, /* bitsize */
1436 TRUE, /* pc_relative */
1437 1, /* bitpos */
1438 complain_overflow_signed, /* complain_on_overflow */
1439 bfd_elf_generic_reloc, /* special_function */
1440 "R_PPC_VLE_REL24", /* name */
1441 FALSE, /* partial_inplace */
1442 0, /* src_mask */
1443 0x1fffffe, /* dst_mask */
1444 TRUE), /* pcrel_offset */
1445
1446 /* The 16 LSBS in split16a format. */
1447 HOWTO (R_PPC_VLE_LO16A, /* type */
1448 0, /* rightshift */
1449 2, /* size (0 = byte, 1 = short, 2 = long) */
86c95733 1450 16, /* bitsize */
bdaacd3a 1451 FALSE, /* pc_relative */
b9c361e0 1452 0, /* bitpos */
86c95733 1453 complain_overflow_dont, /* complain_on_overflow */
b9c361e0
JL
1454 bfd_elf_generic_reloc, /* special_function */
1455 "R_PPC_VLE_LO16A", /* name */
1456 FALSE, /* partial_inplace */
1457 0, /* src_mask */
bdaacd3a 1458 0x1f007ff, /* dst_mask */
b9c361e0
JL
1459 FALSE), /* pcrel_offset */
1460
1461 /* The 16 LSBS in split16d format. */
1462 HOWTO (R_PPC_VLE_LO16D, /* type */
1463 0, /* rightshift */
1464 2, /* size (0 = byte, 1 = short, 2 = long) */
86c95733 1465 16, /* bitsize */
b9c361e0
JL
1466 FALSE, /* pc_relative */
1467 0, /* bitpos */
86c95733 1468 complain_overflow_dont, /* complain_on_overflow */
b9c361e0
JL
1469 bfd_elf_generic_reloc, /* special_function */
1470 "R_PPC_VLE_LO16D", /* name */
1471 FALSE, /* partial_inplace */
1472 0, /* src_mask */
1473 0x1f07ff, /* dst_mask */
1474 FALSE), /* pcrel_offset */
1475
1476 /* Bits 16-31 split16a format. */
1477 HOWTO (R_PPC_VLE_HI16A, /* type */
86c95733 1478 16, /* rightshift */
b9c361e0 1479 2, /* size (0 = byte, 1 = short, 2 = long) */
86c95733 1480 16, /* bitsize */
b9c361e0
JL
1481 FALSE, /* pc_relative */
1482 0, /* bitpos */
86c95733 1483 complain_overflow_dont, /* complain_on_overflow */
b9c361e0
JL
1484 bfd_elf_generic_reloc, /* special_function */
1485 "R_PPC_VLE_HI16A", /* name */
1486 FALSE, /* partial_inplace */
1487 0, /* src_mask */
bdaacd3a 1488 0x1f007ff, /* dst_mask */
b9c361e0
JL
1489 FALSE), /* pcrel_offset */
1490
1491 /* Bits 16-31 split16d format. */
1492 HOWTO (R_PPC_VLE_HI16D, /* type */
86c95733 1493 16, /* rightshift */
b9c361e0 1494 2, /* size (0 = byte, 1 = short, 2 = long) */
86c95733 1495 16, /* bitsize */
b9c361e0
JL
1496 FALSE, /* pc_relative */
1497 0, /* bitpos */
86c95733 1498 complain_overflow_dont, /* complain_on_overflow */
b9c361e0
JL
1499 bfd_elf_generic_reloc, /* special_function */
1500 "R_PPC_VLE_HI16D", /* name */
1501 FALSE, /* partial_inplace */
1502 0, /* src_mask */
1503 0x1f07ff, /* dst_mask */
1504 FALSE), /* pcrel_offset */
1505
1506 /* Bits 16-31 (High Adjusted) in split16a format. */
1507 HOWTO (R_PPC_VLE_HA16A, /* type */
86c95733 1508 16, /* rightshift */
b9c361e0 1509 2, /* size (0 = byte, 1 = short, 2 = long) */
86c95733 1510 16, /* bitsize */
b9c361e0
JL
1511 FALSE, /* pc_relative */
1512 0, /* bitpos */
86c95733 1513 complain_overflow_dont, /* complain_on_overflow */
b9c361e0
JL
1514 bfd_elf_generic_reloc, /* special_function */
1515 "R_PPC_VLE_HA16A", /* name */
1516 FALSE, /* partial_inplace */
1517 0, /* src_mask */
bdaacd3a 1518 0x1f007ff, /* dst_mask */
b9c361e0
JL
1519 FALSE), /* pcrel_offset */
1520
1521 /* Bits 16-31 (High Adjusted) in split16d format. */
1522 HOWTO (R_PPC_VLE_HA16D, /* type */
86c95733 1523 16, /* rightshift */
b9c361e0 1524 2, /* size (0 = byte, 1 = short, 2 = long) */
86c95733 1525 16, /* bitsize */
b9c361e0
JL
1526 FALSE, /* pc_relative */
1527 0, /* bitpos */
86c95733 1528 complain_overflow_dont, /* complain_on_overflow */
b9c361e0
JL
1529 bfd_elf_generic_reloc, /* special_function */
1530 "R_PPC_VLE_HA16D", /* name */
1531 FALSE, /* partial_inplace */
1532 0, /* src_mask */
1533 0x1f07ff, /* dst_mask */
1534 FALSE), /* pcrel_offset */
1535
86c95733
AM
1536 /* This reloc is like R_PPC_EMB_SDA21 but only applies to e_add16i
1537 instructions. If the register base is 0 then the linker changes
1538 the e_add16i to an e_li instruction. */
1539 HOWTO (R_PPC_VLE_SDA21, /* type */
b9c361e0
JL
1540 0, /* rightshift */
1541 2, /* size (0 = byte, 1 = short, 2 = long) */
86c95733 1542 16, /* bitsize */
b9c361e0
JL
1543 FALSE, /* pc_relative */
1544 0, /* bitpos */
86c95733 1545 complain_overflow_signed, /* complain_on_overflow */
b9c361e0
JL
1546 bfd_elf_generic_reloc, /* special_function */
1547 "R_PPC_VLE_SDA21", /* name */
1548 FALSE, /* partial_inplace */
1549 0, /* src_mask */
1550 0xffff, /* dst_mask */
1551 FALSE), /* pcrel_offset */
1552
86c95733 1553 /* Like R_PPC_VLE_SDA21 but ignore overflow. */
b9c361e0
JL
1554 HOWTO (R_PPC_VLE_SDA21_LO, /* type */
1555 0, /* rightshift */
1556 2, /* size (0 = byte, 1 = short, 2 = long) */
86c95733 1557 16, /* bitsize */
b9c361e0
JL
1558 FALSE, /* pc_relative */
1559 0, /* bitpos */
86c95733 1560 complain_overflow_dont, /* complain_on_overflow */
b9c361e0
JL
1561 bfd_elf_generic_reloc, /* special_function */
1562 "R_PPC_VLE_SDA21_LO", /* name */
1563 FALSE, /* partial_inplace */
1564 0, /* src_mask */
86c95733 1565 0xffff, /* dst_mask */
b9c361e0
JL
1566 FALSE), /* pcrel_offset */
1567
1568 /* The 16 LSBS relative to _SDA_BASE_ in split16a format. */
1569 HOWTO (R_PPC_VLE_SDAREL_LO16A,/* type */
1570 0, /* rightshift */
1571 2, /* size (0 = byte, 1 = short, 2 = long) */
86c95733 1572 16, /* bitsize */
b9c361e0
JL
1573 FALSE, /* pc_relative */
1574 0, /* bitpos */
86c95733 1575 complain_overflow_dont, /* complain_on_overflow */
b9c361e0
JL
1576 bfd_elf_generic_reloc, /* special_function */
1577 "R_PPC_VLE_SDAREL_LO16A", /* name */
1578 FALSE, /* partial_inplace */
1579 0, /* src_mask */
bdaacd3a 1580 0x1f007ff, /* dst_mask */
b9c361e0
JL
1581 FALSE), /* pcrel_offset */
1582
1583 /* The 16 LSBS relative to _SDA_BASE_ in split16d format. */
b9c361e0
JL
1584 HOWTO (R_PPC_VLE_SDAREL_LO16D, /* type */
1585 0, /* rightshift */
1586 2, /* size (0 = byte, 1 = short, 2 = long) */
86c95733 1587 16, /* bitsize */
b9c361e0
JL
1588 FALSE, /* pc_relative */
1589 0, /* bitpos */
86c95733 1590 complain_overflow_dont, /* complain_on_overflow */
b9c361e0
JL
1591 bfd_elf_generic_reloc, /* special_function */
1592 "R_PPC_VLE_SDAREL_LO16D", /* name */
1593 FALSE, /* partial_inplace */
1594 0, /* src_mask */
1595 0x1f07ff, /* dst_mask */
1596 FALSE), /* pcrel_offset */
1597
1598 /* Bits 16-31 relative to _SDA_BASE_ in split16a format. */
1599 HOWTO (R_PPC_VLE_SDAREL_HI16A, /* type */
86c95733 1600 16, /* rightshift */
b9c361e0 1601 2, /* size (0 = byte, 1 = short, 2 = long) */
86c95733 1602 16, /* bitsize */
b9c361e0
JL
1603 FALSE, /* pc_relative */
1604 0, /* bitpos */
86c95733 1605 complain_overflow_dont, /* complain_on_overflow */
b9c361e0
JL
1606 bfd_elf_generic_reloc, /* special_function */
1607 "R_PPC_VLE_SDAREL_HI16A", /* name */
1608 FALSE, /* partial_inplace */
1609 0, /* src_mask */
bdaacd3a 1610 0x1f007ff, /* dst_mask */
b9c361e0
JL
1611 FALSE), /* pcrel_offset */
1612
1613 /* Bits 16-31 relative to _SDA_BASE_ in split16d format. */
1614 HOWTO (R_PPC_VLE_SDAREL_HI16D, /* type */
86c95733 1615 16, /* rightshift */
b9c361e0 1616 2, /* size (0 = byte, 1 = short, 2 = long) */
86c95733 1617 16, /* bitsize */
b9c361e0
JL
1618 FALSE, /* pc_relative */
1619 0, /* bitpos */
86c95733 1620 complain_overflow_dont, /* complain_on_overflow */
b9c361e0
JL
1621 bfd_elf_generic_reloc, /* special_function */
1622 "R_PPC_VLE_SDAREL_HI16D", /* name */
1623 FALSE, /* partial_inplace */
1624 0, /* src_mask */
1625 0x1f07ff, /* dst_mask */
1626 FALSE), /* pcrel_offset */
1627
1628 /* Bits 16-31 (HA) relative to _SDA_BASE split16a format. */
1629 HOWTO (R_PPC_VLE_SDAREL_HA16A, /* type */
86c95733 1630 16, /* rightshift */
b9c361e0 1631 2, /* size (0 = byte, 1 = short, 2 = long) */
86c95733 1632 16, /* bitsize */
b9c361e0
JL
1633 FALSE, /* pc_relative */
1634 0, /* bitpos */
86c95733 1635 complain_overflow_dont, /* complain_on_overflow */
b9c361e0
JL
1636 bfd_elf_generic_reloc, /* special_function */
1637 "R_PPC_VLE_SDAREL_HA16A", /* name */
1638 FALSE, /* partial_inplace */
1639 0, /* src_mask */
bdaacd3a 1640 0x1f007ff, /* dst_mask */
b9c361e0
JL
1641 FALSE), /* pcrel_offset */
1642
1643 /* Bits 16-31 (HA) relative to _SDA_BASE split16d format. */
1644 HOWTO (R_PPC_VLE_SDAREL_HA16D, /* type */
86c95733 1645 16, /* rightshift */
b9c361e0 1646 2, /* size (0 = byte, 1 = short, 2 = long) */
86c95733 1647 16, /* bitsize */
b9c361e0
JL
1648 FALSE, /* pc_relative */
1649 0, /* bitpos */
86c95733 1650 complain_overflow_dont, /* complain_on_overflow */
b9c361e0
JL
1651 bfd_elf_generic_reloc, /* special_function */
1652 "R_PPC_VLE_SDAREL_HA16D", /* name */
1653 FALSE, /* partial_inplace */
1654 0, /* src_mask */
1655 0x1f07ff, /* dst_mask */
1656 FALSE), /* pcrel_offset */
1657
e054468f
AM
1658 HOWTO (R_PPC_IRELATIVE, /* type */
1659 0, /* rightshift */
1660 2, /* size (0 = byte, 1 = short, 2 = long) */
1661 32, /* bitsize */
1662 FALSE, /* pc_relative */
1663 0, /* bitpos */
86c95733 1664 complain_overflow_dont, /* complain_on_overflow */
e054468f
AM
1665 bfd_elf_generic_reloc, /* special_function */
1666 "R_PPC_IRELATIVE", /* name */
1667 FALSE, /* partial_inplace */
1668 0, /* src_mask */
1669 0xffffffff, /* dst_mask */
1670 FALSE), /* pcrel_offset */
1671
d7128ce4
AM
1672 /* A 16 bit relative relocation. */
1673 HOWTO (R_PPC_REL16, /* type */
1674 0, /* rightshift */
1675 1, /* size (0 = byte, 1 = short, 2 = long) */
1676 16, /* bitsize */
1677 TRUE, /* pc_relative */
1678 0, /* bitpos */
86c95733 1679 complain_overflow_signed, /* complain_on_overflow */
d7128ce4
AM
1680 bfd_elf_generic_reloc, /* special_function */
1681 "R_PPC_REL16", /* name */
1682 FALSE, /* partial_inplace */
1683 0, /* src_mask */
1684 0xffff, /* dst_mask */
1685 TRUE), /* pcrel_offset */
1686
1687 /* A 16 bit relative relocation without overflow. */
1688 HOWTO (R_PPC_REL16_LO, /* type */
1689 0, /* rightshift */
1690 1, /* size (0 = byte, 1 = short, 2 = long) */
1691 16, /* bitsize */
1692 TRUE, /* pc_relative */
1693 0, /* bitpos */
1694 complain_overflow_dont,/* complain_on_overflow */
1695 bfd_elf_generic_reloc, /* special_function */
1696 "R_PPC_REL16_LO", /* name */
1697 FALSE, /* partial_inplace */
1698 0, /* src_mask */
1699 0xffff, /* dst_mask */
1700 TRUE), /* pcrel_offset */
1701
1702 /* The high order 16 bits of a relative address. */
1703 HOWTO (R_PPC_REL16_HI, /* type */
1704 16, /* rightshift */
1705 1, /* size (0 = byte, 1 = short, 2 = long) */
1706 16, /* bitsize */
1707 TRUE, /* pc_relative */
1708 0, /* bitpos */
1709 complain_overflow_dont, /* complain_on_overflow */
1710 bfd_elf_generic_reloc, /* special_function */
1711 "R_PPC_REL16_HI", /* name */
1712 FALSE, /* partial_inplace */
1713 0, /* src_mask */
1714 0xffff, /* dst_mask */
1715 TRUE), /* pcrel_offset */
1716
1717 /* The high order 16 bits of a relative address, plus 1 if the contents of
1718 the low 16 bits, treated as a signed number, is negative. */
1719 HOWTO (R_PPC_REL16_HA, /* type */
1720 16, /* rightshift */
1721 1, /* size (0 = byte, 1 = short, 2 = long) */
1722 16, /* bitsize */
1723 TRUE, /* pc_relative */
1724 0, /* bitpos */
1725 complain_overflow_dont, /* complain_on_overflow */
1726 ppc_elf_addr16_ha_reloc, /* special_function */
1727 "R_PPC_REL16_HA", /* name */
1728 FALSE, /* partial_inplace */
1729 0, /* src_mask */
1730 0xffff, /* dst_mask */
1731 TRUE), /* pcrel_offset */
1732
a680de9a
PB
1733 /* Like R_PPC_REL16_HA but for split field in addpcis. */
1734 HOWTO (R_PPC_REL16DX_HA, /* type */
1735 16, /* rightshift */
1736 2, /* size (0 = byte, 1 = short, 2 = long) */
1737 16, /* bitsize */
1738 TRUE, /* pc_relative */
1739 0, /* bitpos */
1740 complain_overflow_signed, /* complain_on_overflow */
1741 ppc_elf_addr16_ha_reloc, /* special_function */
1742 "R_PPC_REL16DX_HA", /* name */
1743 FALSE, /* partial_inplace */
1744 0, /* src_mask */
1745 0x1fffc1, /* dst_mask */
1746 TRUE), /* pcrel_offset */
1747
25dbc73a
AM
1748 /* GNU extension to record C++ vtable hierarchy. */
1749 HOWTO (R_PPC_GNU_VTINHERIT, /* type */
1750 0, /* rightshift */
1751 0, /* size (0 = byte, 1 = short, 2 = long) */
1752 0, /* bitsize */
1753 FALSE, /* pc_relative */
1754 0, /* bitpos */
1755 complain_overflow_dont, /* complain_on_overflow */
1756 NULL, /* special_function */
1757 "R_PPC_GNU_VTINHERIT", /* name */
1758 FALSE, /* partial_inplace */
1759 0, /* src_mask */
1760 0, /* dst_mask */
1761 FALSE), /* pcrel_offset */
1762
1763 /* GNU extension to record C++ vtable member usage. */
1764 HOWTO (R_PPC_GNU_VTENTRY, /* type */
1765 0, /* rightshift */
1766 0, /* size (0 = byte, 1 = short, 2 = long) */
1767 0, /* bitsize */
1768 FALSE, /* pc_relative */
1769 0, /* bitpos */
1770 complain_overflow_dont, /* complain_on_overflow */
1771 NULL, /* special_function */
1772 "R_PPC_GNU_VTENTRY", /* name */
7619e7c7
AM
1773 FALSE, /* partial_inplace */
1774 0, /* src_mask */
25dbc73a 1775 0, /* dst_mask */
7619e7c7
AM
1776 FALSE), /* pcrel_offset */
1777
25dbc73a
AM
1778 /* Phony reloc to handle AIX style TOC entries. */
1779 HOWTO (R_PPC_TOC16, /* type */
7619e7c7
AM
1780 0, /* rightshift */
1781 1, /* size (0 = byte, 1 = short, 2 = long) */
1782 16, /* bitsize */
1783 FALSE, /* pc_relative */
1784 0, /* bitpos */
25dbc73a 1785 complain_overflow_signed, /* complain_on_overflow */
7619e7c7 1786 bfd_elf_generic_reloc, /* special_function */
25dbc73a 1787 "R_PPC_TOC16", /* name */
7619e7c7
AM
1788 FALSE, /* partial_inplace */
1789 0, /* src_mask */
1790 0xffff, /* dst_mask */
1791 FALSE), /* pcrel_offset */
25dbc73a 1792};
70a38d42
SDJ
1793
1794/* External 32-bit PPC structure for PRPSINFO. This structure is
1795 ABI-defined, thus we choose to use char arrays here in order to
1796 avoid dealing with different types in different architectures.
1797
1798 The PPC 32-bit structure uses int for `pr_uid' and `pr_gid' while
1799 most non-PPC architectures use `short int'.
1800
1801 This structure will ultimately be written in the corefile's note
1802 section, as the PRPSINFO. */
1803
1804struct elf_external_ppc_linux_prpsinfo32
1805 {
1806 char pr_state; /* Numeric process state. */
1807 char pr_sname; /* Char for pr_state. */
1808 char pr_zomb; /* Zombie. */
1809 char pr_nice; /* Nice val. */
1810 char pr_flag[4]; /* Flags. */
1811 char pr_uid[4];
1812 char pr_gid[4];
1813 char pr_pid[4];
1814 char pr_ppid[4];
1815 char pr_pgrp[4];
1816 char pr_sid[4];
1817 char pr_fname[16]; /* Filename of executable. */
1818 char pr_psargs[80]; /* Initial part of arg list. */
1819 };
1820
aeb70569
AM
1821/* Helper function to copy an elf_internal_linux_prpsinfo in host
1822 endian to an elf_external_ppc_linux_prpsinfo32 in target endian. */
70a38d42 1823
aeb70569
AM
1824static inline void
1825swap_ppc_linux_prpsinfo32_out (bfd *obfd,
1826 const struct elf_internal_linux_prpsinfo *from,
1827 struct elf_external_ppc_linux_prpsinfo32 *to)
1828{
1829 bfd_put_8 (obfd, from->pr_state, &to->pr_state);
1830 bfd_put_8 (obfd, from->pr_sname, &to->pr_sname);
1831 bfd_put_8 (obfd, from->pr_zomb, &to->pr_zomb);
1832 bfd_put_8 (obfd, from->pr_nice, &to->pr_nice);
1833 bfd_put_32 (obfd, from->pr_flag, to->pr_flag);
1834 bfd_put_32 (obfd, from->pr_uid, to->pr_uid);
1835 bfd_put_32 (obfd, from->pr_gid, to->pr_gid);
1836 bfd_put_32 (obfd, from->pr_pid, to->pr_pid);
1837 bfd_put_32 (obfd, from->pr_ppid, to->pr_ppid);
1838 bfd_put_32 (obfd, from->pr_pgrp, to->pr_pgrp);
1839 bfd_put_32 (obfd, from->pr_sid, to->pr_sid);
1840 strncpy (to->pr_fname, from->pr_fname, sizeof (to->pr_fname));
1841 strncpy (to->pr_psargs, from->pr_psargs, sizeof (to->pr_psargs));
1842}
25dbc73a
AM
1843\f
1844/* Initialize the ppc_elf_howto_table, so that linear accesses can be done. */
1845
1846static void
1847ppc_elf_howto_init (void)
1848{
1849 unsigned int i, type;
1850
1851 for (i = 0;
1852 i < sizeof (ppc_elf_howto_raw) / sizeof (ppc_elf_howto_raw[0]);
1853 i++)
1854 {
1855 type = ppc_elf_howto_raw[i].type;
1856 if (type >= (sizeof (ppc_elf_howto_table)
1857 / sizeof (ppc_elf_howto_table[0])))
1858 abort ();
1859 ppc_elf_howto_table[type] = &ppc_elf_howto_raw[i];
1860 }
1861}
1862
1863static reloc_howto_type *
1864ppc_elf_reloc_type_lookup (bfd *abfd ATTRIBUTE_UNUSED,
1865 bfd_reloc_code_real_type code)
1866{
1867 enum elf_ppc_reloc_type r;
1868
1869 /* Initialize howto table if not already done. */
1870 if (!ppc_elf_howto_table[R_PPC_ADDR32])
1871 ppc_elf_howto_init ();
1872
1873 switch (code)
1874 {
1875 default:
1876 return NULL;
1877
1878 case BFD_RELOC_NONE: r = R_PPC_NONE; break;
1879 case BFD_RELOC_32: r = R_PPC_ADDR32; break;
1880 case BFD_RELOC_PPC_BA26: r = R_PPC_ADDR24; break;
1fe532cf 1881 case BFD_RELOC_PPC64_ADDR16_DS:
25dbc73a 1882 case BFD_RELOC_16: r = R_PPC_ADDR16; break;
1fe532cf 1883 case BFD_RELOC_PPC64_ADDR16_LO_DS:
25dbc73a
AM
1884 case BFD_RELOC_LO16: r = R_PPC_ADDR16_LO; break;
1885 case BFD_RELOC_HI16: r = R_PPC_ADDR16_HI; break;
1886 case BFD_RELOC_HI16_S: r = R_PPC_ADDR16_HA; break;
1887 case BFD_RELOC_PPC_BA16: r = R_PPC_ADDR14; break;
1888 case BFD_RELOC_PPC_BA16_BRTAKEN: r = R_PPC_ADDR14_BRTAKEN; break;
1889 case BFD_RELOC_PPC_BA16_BRNTAKEN: r = R_PPC_ADDR14_BRNTAKEN; break;
1890 case BFD_RELOC_PPC_B26: r = R_PPC_REL24; break;
1891 case BFD_RELOC_PPC_B16: r = R_PPC_REL14; break;
1892 case BFD_RELOC_PPC_B16_BRTAKEN: r = R_PPC_REL14_BRTAKEN; break;
1893 case BFD_RELOC_PPC_B16_BRNTAKEN: r = R_PPC_REL14_BRNTAKEN; break;
1fe532cf 1894 case BFD_RELOC_PPC64_GOT16_DS:
25dbc73a 1895 case BFD_RELOC_16_GOTOFF: r = R_PPC_GOT16; break;
1fe532cf 1896 case BFD_RELOC_PPC64_GOT16_LO_DS:
25dbc73a
AM
1897 case BFD_RELOC_LO16_GOTOFF: r = R_PPC_GOT16_LO; break;
1898 case BFD_RELOC_HI16_GOTOFF: r = R_PPC_GOT16_HI; break;
1899 case BFD_RELOC_HI16_S_GOTOFF: r = R_PPC_GOT16_HA; break;
1900 case BFD_RELOC_24_PLT_PCREL: r = R_PPC_PLTREL24; break;
1901 case BFD_RELOC_PPC_COPY: r = R_PPC_COPY; break;
1902 case BFD_RELOC_PPC_GLOB_DAT: r = R_PPC_GLOB_DAT; break;
1903 case BFD_RELOC_PPC_LOCAL24PC: r = R_PPC_LOCAL24PC; break;
1904 case BFD_RELOC_32_PCREL: r = R_PPC_REL32; break;
1905 case BFD_RELOC_32_PLTOFF: r = R_PPC_PLT32; break;
1906 case BFD_RELOC_32_PLT_PCREL: r = R_PPC_PLTREL32; break;
1fe532cf 1907 case BFD_RELOC_PPC64_PLT16_LO_DS:
25dbc73a
AM
1908 case BFD_RELOC_LO16_PLTOFF: r = R_PPC_PLT16_LO; break;
1909 case BFD_RELOC_HI16_PLTOFF: r = R_PPC_PLT16_HI; break;
1910 case BFD_RELOC_HI16_S_PLTOFF: r = R_PPC_PLT16_HA; break;
1911 case BFD_RELOC_GPREL16: r = R_PPC_SDAREL16; break;
1fe532cf 1912 case BFD_RELOC_PPC64_SECTOFF_DS:
25dbc73a 1913 case BFD_RELOC_16_BASEREL: r = R_PPC_SECTOFF; break;
1fe532cf 1914 case BFD_RELOC_PPC64_SECTOFF_LO_DS:
25dbc73a
AM
1915 case BFD_RELOC_LO16_BASEREL: r = R_PPC_SECTOFF_LO; break;
1916 case BFD_RELOC_HI16_BASEREL: r = R_PPC_SECTOFF_HI; break;
1917 case BFD_RELOC_HI16_S_BASEREL: r = R_PPC_SECTOFF_HA; break;
1918 case BFD_RELOC_CTOR: r = R_PPC_ADDR32; break;
1fe532cf 1919 case BFD_RELOC_PPC64_TOC16_DS:
25dbc73a
AM
1920 case BFD_RELOC_PPC_TOC16: r = R_PPC_TOC16; break;
1921 case BFD_RELOC_PPC_TLS: r = R_PPC_TLS; break;
727fc41e
AM
1922 case BFD_RELOC_PPC_TLSGD: r = R_PPC_TLSGD; break;
1923 case BFD_RELOC_PPC_TLSLD: r = R_PPC_TLSLD; break;
25dbc73a 1924 case BFD_RELOC_PPC_DTPMOD: r = R_PPC_DTPMOD32; break;
1fe532cf 1925 case BFD_RELOC_PPC64_TPREL16_DS:
25dbc73a 1926 case BFD_RELOC_PPC_TPREL16: r = R_PPC_TPREL16; break;
1fe532cf 1927 case BFD_RELOC_PPC64_TPREL16_LO_DS:
25dbc73a
AM
1928 case BFD_RELOC_PPC_TPREL16_LO: r = R_PPC_TPREL16_LO; break;
1929 case BFD_RELOC_PPC_TPREL16_HI: r = R_PPC_TPREL16_HI; break;
1930 case BFD_RELOC_PPC_TPREL16_HA: r = R_PPC_TPREL16_HA; break;
1931 case BFD_RELOC_PPC_TPREL: r = R_PPC_TPREL32; break;
1fe532cf 1932 case BFD_RELOC_PPC64_DTPREL16_DS:
25dbc73a 1933 case BFD_RELOC_PPC_DTPREL16: r = R_PPC_DTPREL16; break;
1fe532cf 1934 case BFD_RELOC_PPC64_DTPREL16_LO_DS:
25dbc73a
AM
1935 case BFD_RELOC_PPC_DTPREL16_LO: r = R_PPC_DTPREL16_LO; break;
1936 case BFD_RELOC_PPC_DTPREL16_HI: r = R_PPC_DTPREL16_HI; break;
1937 case BFD_RELOC_PPC_DTPREL16_HA: r = R_PPC_DTPREL16_HA; break;
1938 case BFD_RELOC_PPC_DTPREL: r = R_PPC_DTPREL32; break;
1939 case BFD_RELOC_PPC_GOT_TLSGD16: r = R_PPC_GOT_TLSGD16; break;
1940 case BFD_RELOC_PPC_GOT_TLSGD16_LO: r = R_PPC_GOT_TLSGD16_LO; break;
1941 case BFD_RELOC_PPC_GOT_TLSGD16_HI: r = R_PPC_GOT_TLSGD16_HI; break;
1942 case BFD_RELOC_PPC_GOT_TLSGD16_HA: r = R_PPC_GOT_TLSGD16_HA; break;
1943 case BFD_RELOC_PPC_GOT_TLSLD16: r = R_PPC_GOT_TLSLD16; break;
1944 case BFD_RELOC_PPC_GOT_TLSLD16_LO: r = R_PPC_GOT_TLSLD16_LO; break;
1945 case BFD_RELOC_PPC_GOT_TLSLD16_HI: r = R_PPC_GOT_TLSLD16_HI; break;
1946 case BFD_RELOC_PPC_GOT_TLSLD16_HA: r = R_PPC_GOT_TLSLD16_HA; break;
1947 case BFD_RELOC_PPC_GOT_TPREL16: r = R_PPC_GOT_TPREL16; break;
1948 case BFD_RELOC_PPC_GOT_TPREL16_LO: r = R_PPC_GOT_TPREL16_LO; break;
1949 case BFD_RELOC_PPC_GOT_TPREL16_HI: r = R_PPC_GOT_TPREL16_HI; break;
1950 case BFD_RELOC_PPC_GOT_TPREL16_HA: r = R_PPC_GOT_TPREL16_HA; break;
1951 case BFD_RELOC_PPC_GOT_DTPREL16: r = R_PPC_GOT_DTPREL16; break;
1952 case BFD_RELOC_PPC_GOT_DTPREL16_LO: r = R_PPC_GOT_DTPREL16_LO; break;
1953 case BFD_RELOC_PPC_GOT_DTPREL16_HI: r = R_PPC_GOT_DTPREL16_HI; break;
1954 case BFD_RELOC_PPC_GOT_DTPREL16_HA: r = R_PPC_GOT_DTPREL16_HA; break;
1955 case BFD_RELOC_PPC_EMB_NADDR32: r = R_PPC_EMB_NADDR32; break;
1956 case BFD_RELOC_PPC_EMB_NADDR16: r = R_PPC_EMB_NADDR16; break;
1957 case BFD_RELOC_PPC_EMB_NADDR16_LO: r = R_PPC_EMB_NADDR16_LO; break;
1958 case BFD_RELOC_PPC_EMB_NADDR16_HI: r = R_PPC_EMB_NADDR16_HI; break;
1959 case BFD_RELOC_PPC_EMB_NADDR16_HA: r = R_PPC_EMB_NADDR16_HA; break;
1960 case BFD_RELOC_PPC_EMB_SDAI16: r = R_PPC_EMB_SDAI16; break;
1961 case BFD_RELOC_PPC_EMB_SDA2I16: r = R_PPC_EMB_SDA2I16; break;
1962 case BFD_RELOC_PPC_EMB_SDA2REL: r = R_PPC_EMB_SDA2REL; break;
1963 case BFD_RELOC_PPC_EMB_SDA21: r = R_PPC_EMB_SDA21; break;
1964 case BFD_RELOC_PPC_EMB_MRKREF: r = R_PPC_EMB_MRKREF; break;
1965 case BFD_RELOC_PPC_EMB_RELSEC16: r = R_PPC_EMB_RELSEC16; break;
1966 case BFD_RELOC_PPC_EMB_RELST_LO: r = R_PPC_EMB_RELST_LO; break;
1967 case BFD_RELOC_PPC_EMB_RELST_HI: r = R_PPC_EMB_RELST_HI; break;
1968 case BFD_RELOC_PPC_EMB_RELST_HA: r = R_PPC_EMB_RELST_HA; break;
1969 case BFD_RELOC_PPC_EMB_BIT_FLD: r = R_PPC_EMB_BIT_FLD; break;
1970 case BFD_RELOC_PPC_EMB_RELSDA: r = R_PPC_EMB_RELSDA; break;
b9c361e0
JL
1971 case BFD_RELOC_PPC_VLE_REL8: r = R_PPC_VLE_REL8; break;
1972 case BFD_RELOC_PPC_VLE_REL15: r = R_PPC_VLE_REL15; break;
1973 case BFD_RELOC_PPC_VLE_REL24: r = R_PPC_VLE_REL24; break;
1974 case BFD_RELOC_PPC_VLE_LO16A: r = R_PPC_VLE_LO16A; break;
1975 case BFD_RELOC_PPC_VLE_LO16D: r = R_PPC_VLE_LO16D; break;
1976 case BFD_RELOC_PPC_VLE_HI16A: r = R_PPC_VLE_HI16A; break;
1977 case BFD_RELOC_PPC_VLE_HI16D: r = R_PPC_VLE_HI16D; break;
1978 case BFD_RELOC_PPC_VLE_HA16A: r = R_PPC_VLE_HA16A; break;
1979 case BFD_RELOC_PPC_VLE_HA16D: r = R_PPC_VLE_HA16D; break;
1980 case BFD_RELOC_PPC_VLE_SDA21: r = R_PPC_VLE_SDA21; break;
1981 case BFD_RELOC_PPC_VLE_SDA21_LO: r = R_PPC_VLE_SDA21_LO; break;
1982 case BFD_RELOC_PPC_VLE_SDAREL_LO16A:
1983 r = R_PPC_VLE_SDAREL_LO16A;
1984 break;
1985 case BFD_RELOC_PPC_VLE_SDAREL_LO16D:
1986 r = R_PPC_VLE_SDAREL_LO16D;
1987 break;
1988 case BFD_RELOC_PPC_VLE_SDAREL_HI16A:
1989 r = R_PPC_VLE_SDAREL_HI16A;
1990 break;
1991 case BFD_RELOC_PPC_VLE_SDAREL_HI16D:
1992 r = R_PPC_VLE_SDAREL_HI16D;
1993 break;
1994 case BFD_RELOC_PPC_VLE_SDAREL_HA16A:
1995 r = R_PPC_VLE_SDAREL_HA16A;
1996 break;
1997 case BFD_RELOC_PPC_VLE_SDAREL_HA16D:
1998 r = R_PPC_VLE_SDAREL_HA16D;
1999 break;
d7128ce4
AM
2000 case BFD_RELOC_16_PCREL: r = R_PPC_REL16; break;
2001 case BFD_RELOC_LO16_PCREL: r = R_PPC_REL16_LO; break;
2002 case BFD_RELOC_HI16_PCREL: r = R_PPC_REL16_HI; break;
2003 case BFD_RELOC_HI16_S_PCREL: r = R_PPC_REL16_HA; break;
a680de9a 2004 case BFD_RELOC_PPC_REL16DX_HA: r = R_PPC_REL16DX_HA; break;
25dbc73a
AM
2005 case BFD_RELOC_VTABLE_INHERIT: r = R_PPC_GNU_VTINHERIT; break;
2006 case BFD_RELOC_VTABLE_ENTRY: r = R_PPC_GNU_VTENTRY; break;
2007 }
2008
2009 return ppc_elf_howto_table[r];
2010};
2011
157090f7
AM
2012static reloc_howto_type *
2013ppc_elf_reloc_name_lookup (bfd *abfd ATTRIBUTE_UNUSED,
2014 const char *r_name)
2015{
2016 unsigned int i;
2017
2018 for (i = 0;
2019 i < sizeof (ppc_elf_howto_raw) / sizeof (ppc_elf_howto_raw[0]);
2020 i++)
2021 if (ppc_elf_howto_raw[i].name != NULL
2022 && strcasecmp (ppc_elf_howto_raw[i].name, r_name) == 0)
2023 return &ppc_elf_howto_raw[i];
2024
2025 return NULL;
2026}
2027
25dbc73a
AM
2028/* Set the howto pointer for a PowerPC ELF reloc. */
2029
2030static void
2031ppc_elf_info_to_howto (bfd *abfd ATTRIBUTE_UNUSED,
2032 arelent *cache_ptr,
2033 Elf_Internal_Rela *dst)
2034{
cd21f5da
NC
2035 unsigned int r_type;
2036
25dbc73a
AM
2037 /* Initialize howto table if not already done. */
2038 if (!ppc_elf_howto_table[R_PPC_ADDR32])
2039 ppc_elf_howto_init ();
2040
cd21f5da
NC
2041 r_type = ELF32_R_TYPE (dst->r_info);
2042 if (r_type >= R_PPC_max)
2043 {
64d29018 2044 (*_bfd_error_handler) (_("%B: unrecognised PPC reloc number: %d"),
cd21f5da
NC
2045 abfd, r_type);
2046 bfd_set_error (bfd_error_bad_value);
2047 r_type = R_PPC_NONE;
2048 }
2049 cache_ptr->howto = ppc_elf_howto_table[r_type];
375de94a
AM
2050
2051 /* Just because the above assert didn't trigger doesn't mean that
2052 ELF32_R_TYPE (dst->r_info) is necessarily a valid relocation. */
2053 if (!cache_ptr->howto)
2054 {
2055 (*_bfd_error_handler) (_("%B: invalid relocation type %d"),
cd21f5da 2056 abfd, r_type);
375de94a
AM
2057 bfd_set_error (bfd_error_bad_value);
2058
2059 cache_ptr->howto = ppc_elf_howto_table[R_PPC_NONE];
2060 }
25dbc73a
AM
2061}
2062
d7128ce4 2063/* Handle the R_PPC_ADDR16_HA and R_PPC_REL16_HA relocs. */
25dbc73a
AM
2064
2065static bfd_reloc_status_type
2066ppc_elf_addr16_ha_reloc (bfd *abfd ATTRIBUTE_UNUSED,
2067 arelent *reloc_entry,
2068 asymbol *symbol,
2069 void *data ATTRIBUTE_UNUSED,
2070 asection *input_section,
2071 bfd *output_bfd,
2072 char **error_message ATTRIBUTE_UNUSED)
2073{
a680de9a
PB
2074 enum elf_ppc_reloc_type r_type;
2075 long insn;
2076 bfd_size_type octets;
2077 bfd_vma value;
25dbc73a
AM
2078
2079 if (output_bfd != NULL)
2080 {
2081 reloc_entry->address += input_section->output_offset;
2082 return bfd_reloc_ok;
2083 }
2084
a680de9a
PB
2085 reloc_entry->addend += 0x8000;
2086 r_type = reloc_entry->howto->type;
2087 if (r_type != R_PPC_REL16DX_HA)
2088 return bfd_reloc_continue;
2089
2090 value = 0;
2091 if (!bfd_is_com_section (symbol->section))
2092 value = symbol->value;
2093 value += (reloc_entry->addend
2094 + symbol->section->output_offset
2095 + symbol->section->output_section->vma);
2096 value -= (reloc_entry->address
2097 + input_section->output_offset
2098 + input_section->output_section->vma);
2099 value >>= 16;
2100
2101 octets = reloc_entry->address * bfd_octets_per_byte (abfd);
2102 insn = bfd_get_32 (abfd, (bfd_byte *) data + octets);
2103 insn &= ~0x1fffc1;
2104 insn |= (value & 0xffc1) | ((value & 0x3e) << 15);
2105 bfd_put_32 (abfd, insn, (bfd_byte *) data + octets);
2106 return bfd_reloc_ok;
25dbc73a
AM
2107}
2108
2109static bfd_reloc_status_type
2110ppc_elf_unhandled_reloc (bfd *abfd,
2111 arelent *reloc_entry,
2112 asymbol *symbol,
2113 void *data,
2114 asection *input_section,
2115 bfd *output_bfd,
2116 char **error_message)
2117{
2118 /* If this is a relocatable link (output_bfd test tells us), just
2119 call the generic function. Any adjustment will be done at final
2120 link time. */
2121 if (output_bfd != NULL)
2122 return bfd_elf_generic_reloc (abfd, reloc_entry, symbol, data,
2123 input_section, output_bfd, error_message);
2124
2125 if (error_message != NULL)
2126 {
2127 static char buf[60];
2128 sprintf (buf, _("generic linker can't handle %s"),
2129 reloc_entry->howto->name);
2130 *error_message = buf;
2131 }
2132 return bfd_reloc_dangerous;
2133}
2134\f
2135/* Sections created by the linker. */
2136
2137typedef struct elf_linker_section
2138{
c9a2f333 2139 /* Pointer to the bfd section. */
25dbc73a 2140 asection *section;
c9a2f333
AM
2141 /* Section name. */
2142 const char *name;
2143 /* Associated bss section name. */
2144 const char *bss_name;
2145 /* Associated symbol name. */
2146 const char *sym_name;
046183de
AM
2147 /* Associated symbol. */
2148 struct elf_link_hash_entry *sym;
25dbc73a
AM
2149} elf_linker_section_t;
2150
2151/* Linked list of allocated pointer entries. This hangs off of the
2152 symbol lists, and provides allows us to return different pointers,
2153 based on different addend's. */
2154
2155typedef struct elf_linker_section_pointers
2156{
2157 /* next allocated pointer for this symbol */
2158 struct elf_linker_section_pointers *next;
2159 /* offset of pointer from beginning of section */
2160 bfd_vma offset;
2161 /* addend used */
2162 bfd_vma addend;
2163 /* which linker section this is */
2164 elf_linker_section_t *lsect;
25dbc73a
AM
2165} elf_linker_section_pointers_t;
2166
2167struct ppc_elf_obj_tdata
2168{
2169 struct elf_obj_tdata elf;
2170
2171 /* A mapping from local symbols to offsets into the various linker
2172 sections added. This is index by the symbol index. */
2173 elf_linker_section_pointers_t **linker_section_pointers;
016687f8
AM
2174
2175 /* Flags used to auto-detect plt type. */
2176 unsigned int makes_plt_call : 1;
2177 unsigned int has_rel16 : 1;
25dbc73a
AM
2178};
2179
2180#define ppc_elf_tdata(bfd) \
2181 ((struct ppc_elf_obj_tdata *) (bfd)->tdata.any)
7619e7c7 2182
25dbc73a
AM
2183#define elf_local_ptr_offsets(bfd) \
2184 (ppc_elf_tdata (bfd)->linker_section_pointers)
7619e7c7 2185
0c8d6e5c
AM
2186#define is_ppc_elf(bfd) \
2187 (bfd_get_flavour (bfd) == bfd_target_elf_flavour \
4dfe6ac6 2188 && elf_object_id (bfd) == PPC32_ELF_DATA)
0c8d6e5c 2189
25dbc73a 2190/* Override the generic function because we store some extras. */
7619e7c7 2191
25dbc73a
AM
2192static bfd_boolean
2193ppc_elf_mkobject (bfd *abfd)
2194{
0ffa91dd 2195 return bfd_elf_allocate_object (abfd, sizeof (struct ppc_elf_obj_tdata),
4dfe6ac6 2196 PPC32_ELF_DATA);
25dbc73a 2197}
7619e7c7 2198
25dbc73a
AM
2199/* Fix bad default arch selected for a 32 bit input bfd when the
2200 default is 64 bit. */
7619e7c7 2201
25dbc73a
AM
2202static bfd_boolean
2203ppc_elf_object_p (bfd *abfd)
2204{
2205 if (abfd->arch_info->the_default && abfd->arch_info->bits_per_word == 64)
2206 {
2207 Elf_Internal_Ehdr *i_ehdr = elf_elfheader (abfd);
7619e7c7 2208
25dbc73a
AM
2209 if (i_ehdr->e_ident[EI_CLASS] == ELFCLASS32)
2210 {
2211 /* Relies on arch after 64 bit default being 32 bit default. */
2212 abfd->arch_info = abfd->arch_info->next;
2213 BFD_ASSERT (abfd->arch_info->bits_per_word == 32);
2214 }
2215 }
2216 return TRUE;
2217}
7619e7c7 2218
25dbc73a 2219/* Function to set whether a module needs the -mrelocatable bit set. */
7619e7c7 2220
25dbc73a
AM
2221static bfd_boolean
2222ppc_elf_set_private_flags (bfd *abfd, flagword flags)
2223{
2224 BFD_ASSERT (!elf_flags_init (abfd)
2225 || elf_elfheader (abfd)->e_flags == flags);
7619e7c7 2226
25dbc73a
AM
2227 elf_elfheader (abfd)->e_flags = flags;
2228 elf_flags_init (abfd) = TRUE;
2229 return TRUE;
2230}
2231
25dbc73a 2232/* Support for core dump NOTE sections. */
deaaf2f3 2233
b34976b6 2234static bfd_boolean
25dbc73a 2235ppc_elf_grok_prstatus (bfd *abfd, Elf_Internal_Note *note)
252b5132 2236{
25dbc73a
AM
2237 int offset;
2238 unsigned int size;
252b5132 2239
25dbc73a
AM
2240 switch (note->descsz)
2241 {
2242 default:
2243 return FALSE;
252b5132 2244
25dbc73a
AM
2245 case 268: /* Linux/PPC. */
2246 /* pr_cursig */
228e534f 2247 elf_tdata (abfd)->core->signal = bfd_get_16 (abfd, note->descdata + 12);
deaaf2f3 2248
25dbc73a 2249 /* pr_pid */
228e534f 2250 elf_tdata (abfd)->core->lwpid = bfd_get_32 (abfd, note->descdata + 24);
9abc968f 2251
25dbc73a
AM
2252 /* pr_reg */
2253 offset = 72;
2254 size = 192;
deaaf2f3 2255
25dbc73a
AM
2256 break;
2257 }
deaaf2f3 2258
25dbc73a
AM
2259 /* Make a ".reg/999" section. */
2260 return _bfd_elfcore_make_pseudosection (abfd, ".reg",
2261 size, note->descpos + offset);
2262}
252b5132 2263
25dbc73a
AM
2264static bfd_boolean
2265ppc_elf_grok_psinfo (bfd *abfd, Elf_Internal_Note *note)
2266{
2267 switch (note->descsz)
deaaf2f3 2268 {
25dbc73a
AM
2269 default:
2270 return FALSE;
deaaf2f3 2271
25dbc73a 2272 case 128: /* Linux/PPC elf_prpsinfo. */
228e534f 2273 elf_tdata (abfd)->core->pid
bc989cdc 2274 = bfd_get_32 (abfd, note->descdata + 16);
228e534f 2275 elf_tdata (abfd)->core->program
25dbc73a 2276 = _bfd_elfcore_strndup (abfd, note->descdata + 32, 16);
228e534f 2277 elf_tdata (abfd)->core->command
25dbc73a
AM
2278 = _bfd_elfcore_strndup (abfd, note->descdata + 48, 80);
2279 }
9abc968f 2280
25dbc73a
AM
2281 /* Note that for some reason, a spurious space is tacked
2282 onto the end of the args in some (at least one anyway)
2283 implementations, so strip it off if it exists. */
70bccea4 2284
25dbc73a 2285 {
228e534f 2286 char *command = elf_tdata (abfd)->core->command;
25dbc73a 2287 int n = strlen (command);
70bccea4 2288
25dbc73a
AM
2289 if (0 < n && command[n - 1] == ' ')
2290 command[n - 1] = '\0';
2291 }
deaaf2f3 2292
25dbc73a
AM
2293 return TRUE;
2294}
deaaf2f3 2295
70a38d42 2296char *
aeb70569
AM
2297elfcore_write_ppc_linux_prpsinfo32
2298 (bfd *abfd,
2299 char *buf,
2300 int *bufsiz,
2301 const struct elf_internal_linux_prpsinfo *prpsinfo)
70a38d42
SDJ
2302{
2303 struct elf_external_ppc_linux_prpsinfo32 data;
2304
aeb70569 2305 swap_ppc_linux_prpsinfo32_out (abfd, prpsinfo, &data);
70a38d42
SDJ
2306 return elfcore_write_note (abfd, buf, bufsiz,
2307 "CORE", NT_PRPSINFO, &data, sizeof (data));
2308}
2309
183e98be
AM
2310static char *
2311ppc_elf_write_core_note (bfd *abfd, char *buf, int *bufsiz, int note_type, ...)
2312{
2313 switch (note_type)
2314 {
2315 default:
2316 return NULL;
2317
2318 case NT_PRPSINFO:
2319 {
2320 char data[128];
2321 va_list ap;
2322
2323 va_start (ap, note_type);
75cd47ed 2324 memset (data, 0, sizeof (data));
183e98be
AM
2325 strncpy (data + 32, va_arg (ap, const char *), 16);
2326 strncpy (data + 48, va_arg (ap, const char *), 80);
2327 va_end (ap);
2328 return elfcore_write_note (abfd, buf, bufsiz,
2329 "CORE", note_type, data, sizeof (data));
2330 }
2331
2332 case NT_PRSTATUS:
2333 {
2334 char data[268];
2335 va_list ap;
2336 long pid;
2337 int cursig;
2338 const void *greg;
2339
2340 va_start (ap, note_type);
2341 memset (data, 0, 72);
2342 pid = va_arg (ap, long);
2343 bfd_put_32 (abfd, pid, data + 24);
2344 cursig = va_arg (ap, int);
2345 bfd_put_16 (abfd, cursig, data + 12);
2346 greg = va_arg (ap, const void *);
2347 memcpy (data + 72, greg, 192);
2348 memset (data + 264, 0, 4);
2349 va_end (ap);
2350 return elfcore_write_note (abfd, buf, bufsiz,
2351 "CORE", note_type, data, sizeof (data));
2352 }
2353 }
2354}
2355
b9c361e0 2356static flagword
68ffbac6 2357ppc_elf_lookup_section_flags (char *flag_name)
b9c361e0
JL
2358{
2359
2360 if (!strcmp (flag_name, "SHF_PPC_VLE"))
2361 return SHF_PPC_VLE;
2362
2363 return 0;
2364}
2365
2366/* Add the VLE flag if required. */
2367
2368bfd_boolean
2369ppc_elf_section_processing (bfd *abfd, Elf_Internal_Shdr *shdr)
2370{
2371 if (bfd_get_mach (abfd) == bfd_mach_ppc_vle
2372 && (shdr->sh_flags & SHF_EXECINSTR) != 0)
2373 shdr->sh_flags |= SHF_PPC_VLE;
2374
2375 return TRUE;
2376}
2377
25dbc73a
AM
2378/* Return address for Ith PLT stub in section PLT, for relocation REL
2379 or (bfd_vma) -1 if it should not be included. */
deaaf2f3 2380
25dbc73a
AM
2381static bfd_vma
2382ppc_elf_plt_sym_val (bfd_vma i ATTRIBUTE_UNUSED,
2383 const asection *plt ATTRIBUTE_UNUSED,
2384 const arelent *rel)
2385{
2386 return rel->address;
2387}
deaaf2f3 2388
25dbc73a 2389/* Handle a PowerPC specific section when reading an object file. This
6dc132d9
L
2390 is called when bfd_section_from_shdr finds a section with an unknown
2391 type. */
deaaf2f3 2392
25dbc73a 2393static bfd_boolean
6dc132d9
L
2394ppc_elf_section_from_shdr (bfd *abfd,
2395 Elf_Internal_Shdr *hdr,
2396 const char *name,
2397 int shindex)
25dbc73a
AM
2398{
2399 asection *newsect;
2400 flagword flags;
d1c6de6f 2401
6dc132d9 2402 if (! _bfd_elf_make_section_from_shdr (abfd, hdr, name, shindex))
25dbc73a 2403 return FALSE;
deaaf2f3 2404
25dbc73a
AM
2405 newsect = hdr->bfd_section;
2406 flags = bfd_get_section_flags (abfd, newsect);
2407 if (hdr->sh_flags & SHF_EXCLUDE)
2408 flags |= SEC_EXCLUDE;
9abc968f 2409
25dbc73a
AM
2410 if (hdr->sh_type == SHT_ORDERED)
2411 flags |= SEC_SORT_ENTRIES;
d1c6de6f 2412
25dbc73a
AM
2413 bfd_set_section_flags (abfd, newsect, flags);
2414 return TRUE;
2415}
2416
2417/* Set up any other section flags and such that may be necessary. */
2418
2419static bfd_boolean
2420ppc_elf_fake_sections (bfd *abfd ATTRIBUTE_UNUSED,
2421 Elf_Internal_Shdr *shdr,
2422 asection *asect)
2423{
25dbc73a
AM
2424 if ((asect->flags & SEC_SORT_ENTRIES) != 0)
2425 shdr->sh_type = SHT_ORDERED;
2426
2427 return TRUE;
2428}
2429
2430/* If we have .sbss2 or .PPC.EMB.sbss0 output sections, we
2431 need to bump up the number of section headers. */
2432
2433static int
a6b96beb
AM
2434ppc_elf_additional_program_headers (bfd *abfd,
2435 struct bfd_link_info *info ATTRIBUTE_UNUSED)
25dbc73a
AM
2436{
2437 asection *s;
2438 int ret = 0;
d1c6de6f 2439
25dbc73a
AM
2440 s = bfd_get_section_by_name (abfd, ".sbss2");
2441 if (s != NULL && (s->flags & SEC_ALLOC) != 0)
2442 ++ret;
d1c6de6f 2443
25dbc73a
AM
2444 s = bfd_get_section_by_name (abfd, ".PPC.EMB.sbss0");
2445 if (s != NULL && (s->flags & SEC_ALLOC) != 0)
2446 ++ret;
deaaf2f3 2447
25dbc73a
AM
2448 return ret;
2449}
deaaf2f3 2450
68ffbac6 2451/* Modify the segment map for VLE executables. */
b9c361e0
JL
2452
2453bfd_boolean
2454ppc_elf_modify_segment_map (bfd *abfd,
2455 struct bfd_link_info *info ATTRIBUTE_UNUSED)
2456{
2457 struct elf_segment_map *m, *n;
2458 bfd_size_type amt;
2459 unsigned int j, k;
2460 bfd_boolean sect0_vle, sectj_vle;
2461
2462 /* At this point in the link, output sections have already been sorted by
2463 LMA and assigned to segments. All that is left to do is to ensure
2464 there is no mixing of VLE & non-VLE sections in a text segment.
2465 If we find that case, we split the segment.
2466 We maintain the original output section order. */
2467
12bd6957 2468 for (m = elf_seg_map (abfd); m != NULL; m = m->next)
b9c361e0
JL
2469 {
2470 if (m->count == 0)
2471 continue;
2472
94caa966 2473 sect0_vle = (elf_section_flags (m->sections[0]) & SHF_PPC_VLE) != 0;
b9c361e0
JL
2474 for (j = 1; j < m->count; ++j)
2475 {
94caa966
AM
2476 sectj_vle = (elf_section_flags (m->sections[j]) & SHF_PPC_VLE) != 0;
2477
2478 if (sectj_vle != sect0_vle)
b9c361e0
JL
2479 break;
2480 }
2481 if (j >= m->count)
2482 continue;
2483
b9c361e0
JL
2484 /* sections 0..j-1 stay in this (current) segment,
2485 the remainder are put in a new segment.
2486 The scan resumes with the new segment. */
2487
2488 /* Fix the new segment. */
2489 amt = sizeof (struct elf_segment_map);
2490 amt += (m->count - j - 1) * sizeof (asection *);
2491 n = (struct elf_segment_map *) bfd_zalloc (abfd, amt);
2492 if (n == NULL)
2493 return FALSE;
2494
2495 n->p_type = PT_LOAD;
2496 n->p_flags = PF_X | PF_R;
2497 if (sectj_vle)
2498 n->p_flags |= PF_PPC_VLE;
2499 n->count = m->count - j;
2500 for (k = 0; k < n->count; ++k)
2501 {
2502 n->sections[k] = m->sections[j+k];
2503 m->sections[j+k] = NULL;
2504 }
2505 n->next = m->next;
2506 m->next = n;
2507
2508 /* Fix the current segment */
2509 m->count = j;
2510 }
2511
2512 return TRUE;
2513}
2514
25dbc73a
AM
2515/* Add extra PPC sections -- Note, for now, make .sbss2 and
2516 .PPC.EMB.sbss0 a normal section, and not a bss section so
2517 that the linker doesn't crater when trying to make more than
2518 2 sections. */
e656e369 2519
b35d266b 2520static const struct bfd_elf_special_section ppc_elf_special_sections[] =
7f4d3958 2521{
0112cd26
NC
2522 { STRING_COMMA_LEN (".plt"), 0, SHT_NOBITS, SHF_ALLOC + SHF_EXECINSTR },
2523 { STRING_COMMA_LEN (".sbss"), -2, SHT_NOBITS, SHF_ALLOC + SHF_WRITE },
2524 { STRING_COMMA_LEN (".sbss2"), -2, SHT_PROGBITS, SHF_ALLOC },
2525 { STRING_COMMA_LEN (".sdata"), -2, SHT_PROGBITS, SHF_ALLOC + SHF_WRITE },
2526 { STRING_COMMA_LEN (".sdata2"), -2, SHT_PROGBITS, SHF_ALLOC },
2527 { STRING_COMMA_LEN (".tags"), 0, SHT_ORDERED, SHF_ALLOC },
2528 { STRING_COMMA_LEN (".PPC.EMB.apuinfo"), 0, SHT_NOTE, 0 },
2529 { STRING_COMMA_LEN (".PPC.EMB.sbss0"), 0, SHT_PROGBITS, SHF_ALLOC },
2530 { STRING_COMMA_LEN (".PPC.EMB.sdata0"), 0, SHT_PROGBITS, SHF_ALLOC },
2531 { NULL, 0, 0, 0, 0 }
7f4d3958
L
2532};
2533
551b43fd
AM
2534/* This is what we want for new plt/got. */
2535static struct bfd_elf_special_section ppc_alt_plt =
0112cd26 2536 { STRING_COMMA_LEN (".plt"), 0, SHT_PROGBITS, SHF_ALLOC };
551b43fd
AM
2537
2538static const struct bfd_elf_special_section *
2539ppc_elf_get_sec_type_attr (bfd *abfd ATTRIBUTE_UNUSED, asection *sec)
7f4d3958 2540{
b35d266b 2541 const struct bfd_elf_special_section *ssect;
551b43fd
AM
2542
2543 /* See if this is one of the special sections. */
2544 if (sec->name == NULL)
2545 return NULL;
2546
2547 ssect = _bfd_elf_get_special_section (sec->name, ppc_elf_special_sections,
2548 sec->use_rela_p);
2549 if (ssect != NULL)
2550 {
2551 if (ssect == ppc_elf_special_sections && (sec->flags & SEC_LOAD) != 0)
2552 ssect = &ppc_alt_plt;
2553 return ssect;
2554 }
2555
2556 return _bfd_elf_get_sec_type_attr (abfd, sec);
2557}
25dbc73a
AM
2558\f
2559/* Very simple linked list structure for recording apuinfo values. */
2560typedef struct apuinfo_list
2561{
2562 struct apuinfo_list *next;
2563 unsigned long value;
2564}
2565apuinfo_list;
e656e369 2566
25dbc73a 2567static apuinfo_list *head;
f2faa800 2568static bfd_boolean apuinfo_set;
deaaf2f3 2569
25dbc73a
AM
2570static void
2571apuinfo_list_init (void)
2572{
2573 head = NULL;
f2faa800 2574 apuinfo_set = FALSE;
25dbc73a 2575}
9abc968f 2576
25dbc73a
AM
2577static void
2578apuinfo_list_add (unsigned long value)
2579{
2580 apuinfo_list *entry = head;
deaaf2f3 2581
25dbc73a
AM
2582 while (entry != NULL)
2583 {
2584 if (entry->value == value)
2585 return;
2586 entry = entry->next;
2587 }
b4a38de6 2588
25dbc73a
AM
2589 entry = bfd_malloc (sizeof (* entry));
2590 if (entry == NULL)
2591 return;
e656e369 2592
25dbc73a
AM
2593 entry->value = value;
2594 entry->next = head;
2595 head = entry;
2596}
9abc968f 2597
25dbc73a
AM
2598static unsigned
2599apuinfo_list_length (void)
2600{
2601 apuinfo_list *entry;
2602 unsigned long count;
9abc968f 2603
25dbc73a
AM
2604 for (entry = head, count = 0;
2605 entry;
2606 entry = entry->next)
2607 ++ count;
e656e369 2608
25dbc73a
AM
2609 return count;
2610}
eea6121a 2611
25dbc73a
AM
2612static inline unsigned long
2613apuinfo_list_element (unsigned long number)
2614{
2615 apuinfo_list * entry;
e656e369 2616
25dbc73a
AM
2617 for (entry = head;
2618 entry && number --;
2619 entry = entry->next)
2620 ;
252b5132 2621
25dbc73a
AM
2622 return entry ? entry->value : 0;
2623}
2624
2625static void
2626apuinfo_list_finish (void)
2627{
2628 apuinfo_list *entry;
2629
2630 for (entry = head; entry;)
252b5132 2631 {
25dbc73a
AM
2632 apuinfo_list *next = entry->next;
2633 free (entry);
2634 entry = next;
2635 }
9abc968f 2636
25dbc73a
AM
2637 head = NULL;
2638}
9abc968f 2639
25dbc73a
AM
2640#define APUINFO_SECTION_NAME ".PPC.EMB.apuinfo"
2641#define APUINFO_LABEL "APUinfo"
9abc968f 2642
25dbc73a
AM
2643/* Scan the input BFDs and create a linked list of
2644 the APUinfo values that will need to be emitted. */
9abc968f 2645
25dbc73a
AM
2646static void
2647ppc_elf_begin_write_processing (bfd *abfd, struct bfd_link_info *link_info)
2648{
2649 bfd *ibfd;
2650 asection *asec;
deddc40b
NS
2651 char *buffer = NULL;
2652 bfd_size_type largest_input_size = 0;
25dbc73a 2653 unsigned i;
25dbc73a
AM
2654 unsigned long length;
2655 const char *error_message = NULL;
9abc968f 2656
25dbc73a
AM
2657 if (link_info == NULL)
2658 return;
9abc968f 2659
25dbc73a 2660 apuinfo_list_init ();
252b5132 2661
25dbc73a 2662 /* Read in the input sections contents. */
c72f2fb2 2663 for (ibfd = link_info->input_bfds; ibfd; ibfd = ibfd->link.next)
252b5132 2664 {
25dbc73a 2665 unsigned long datum;
252b5132 2666
25dbc73a
AM
2667 asec = bfd_get_section_by_name (ibfd, APUINFO_SECTION_NAME);
2668 if (asec == NULL)
2669 continue;
252b5132 2670
deddc40b 2671 error_message = _("corrupt %s section in %B");
25dbc73a 2672 length = asec->size;
deddc40b
NS
2673 if (length < 20)
2674 goto fail;
2675
f2faa800 2676 apuinfo_set = TRUE;
deddc40b 2677 if (largest_input_size < asec->size)
25dbc73a 2678 {
deddc40b
NS
2679 if (buffer)
2680 free (buffer);
2681 largest_input_size = asec->size;
2682 buffer = bfd_malloc (largest_input_size);
2683 if (!buffer)
2684 return;
25dbc73a 2685 }
5b914448 2686
25dbc73a 2687 if (bfd_seek (ibfd, asec->filepos, SEEK_SET) != 0
deddc40b 2688 || (bfd_bread (buffer, length, ibfd) != length))
25dbc73a
AM
2689 {
2690 error_message = _("unable to read in %s section from %B");
2691 goto fail;
2692 }
252b5132 2693
25dbc73a
AM
2694 /* Verify the contents of the header. Note - we have to
2695 extract the values this way in order to allow for a
2696 host whose endian-ness is different from the target. */
deddc40b 2697 datum = bfd_get_32 (ibfd, buffer);
25dbc73a
AM
2698 if (datum != sizeof APUINFO_LABEL)
2699 goto fail;
252b5132 2700
deddc40b 2701 datum = bfd_get_32 (ibfd, buffer + 8);
25dbc73a
AM
2702 if (datum != 0x2)
2703 goto fail;
252b5132 2704
deddc40b 2705 if (strcmp (buffer + 12, APUINFO_LABEL) != 0)
25dbc73a 2706 goto fail;
252b5132 2707
25dbc73a 2708 /* Get the number of bytes used for apuinfo entries. */
deddc40b 2709 datum = bfd_get_32 (ibfd, buffer + 4);
25dbc73a
AM
2710 if (datum + 20 != length)
2711 goto fail;
2712
25dbc73a
AM
2713 /* Scan the apuinfo section, building a list of apuinfo numbers. */
2714 for (i = 0; i < datum; i += 4)
deddc40b 2715 apuinfo_list_add (bfd_get_32 (ibfd, buffer + 20 + i));
252b5132
RH
2716 }
2717
25dbc73a 2718 error_message = NULL;
252b5132 2719
f2faa800 2720 if (apuinfo_set)
deddc40b 2721 {
f2faa800
NS
2722 /* Compute the size of the output section. */
2723 unsigned num_entries = apuinfo_list_length ();
5b914448 2724
deddc40b
NS
2725 /* Set the output section size, if it exists. */
2726 asec = bfd_get_section_by_name (abfd, APUINFO_SECTION_NAME);
f2faa800 2727
deddc40b
NS
2728 if (asec && ! bfd_set_section_size (abfd, asec, 20 + num_entries * 4))
2729 {
2730 ibfd = abfd;
2731 error_message = _("warning: unable to set size of %s section in %B");
2732 }
2733 }
25dbc73a
AM
2734
2735 fail:
deddc40b
NS
2736 if (buffer)
2737 free (buffer);
25dbc73a
AM
2738
2739 if (error_message)
2740 (*_bfd_error_handler) (error_message, ibfd, APUINFO_SECTION_NAME);
2741}
252b5132 2742
25dbc73a
AM
2743/* Prevent the output section from accumulating the input sections'
2744 contents. We have already stored this in our linked list structure. */
252b5132 2745
25dbc73a
AM
2746static bfd_boolean
2747ppc_elf_write_section (bfd *abfd ATTRIBUTE_UNUSED,
c7b8f16e 2748 struct bfd_link_info *link_info ATTRIBUTE_UNUSED,
25dbc73a
AM
2749 asection *asec,
2750 bfd_byte *contents ATTRIBUTE_UNUSED)
2751{
f2faa800 2752 return apuinfo_set && strcmp (asec->name, APUINFO_SECTION_NAME) == 0;
252b5132
RH
2753}
2754
25dbc73a
AM
2755/* Finally we can generate the output section. */
2756
2757static void
2758ppc_elf_final_write_processing (bfd *abfd, bfd_boolean linker ATTRIBUTE_UNUSED)
7619e7c7 2759{
25dbc73a
AM
2760 bfd_byte *buffer;
2761 asection *asec;
2762 unsigned i;
2763 unsigned num_entries;
2764 bfd_size_type length;
7619e7c7 2765
25dbc73a
AM
2766 asec = bfd_get_section_by_name (abfd, APUINFO_SECTION_NAME);
2767 if (asec == NULL)
2768 return;
2769
f2faa800 2770 if (!apuinfo_set)
25dbc73a
AM
2771 return;
2772
2773 length = asec->size;
2774 if (length < 20)
2775 return;
2776
2777 buffer = bfd_malloc (length);
2778 if (buffer == NULL)
7619e7c7 2779 {
25dbc73a
AM
2780 (*_bfd_error_handler)
2781 (_("failed to allocate space for new APUinfo section."));
2782 return;
7619e7c7 2783 }
7619e7c7 2784
25dbc73a
AM
2785 /* Create the apuinfo header. */
2786 num_entries = apuinfo_list_length ();
2787 bfd_put_32 (abfd, sizeof APUINFO_LABEL, buffer);
2788 bfd_put_32 (abfd, num_entries * 4, buffer + 4);
2789 bfd_put_32 (abfd, 0x2, buffer + 8);
2790 strcpy ((char *) buffer + 12, APUINFO_LABEL);
feee612b 2791
25dbc73a
AM
2792 length = 20;
2793 for (i = 0; i < num_entries; i++)
feee612b 2794 {
25dbc73a
AM
2795 bfd_put_32 (abfd, apuinfo_list_element (i), buffer + length);
2796 length += 4;
feee612b 2797 }
feee612b 2798
25dbc73a
AM
2799 if (length != asec->size)
2800 (*_bfd_error_handler) (_("failed to compute new APUinfo section."));
252b5132 2801
25dbc73a
AM
2802 if (! bfd_set_section_contents (abfd, asec, buffer, (file_ptr) 0, length))
2803 (*_bfd_error_handler) (_("failed to install new APUinfo section."));
252b5132 2804
25dbc73a
AM
2805 free (buffer);
2806
2807 apuinfo_list_finish ();
252b5132 2808}
25dbc73a 2809\f
7382d32a 2810static bfd_boolean
c6dd29ce 2811is_nonpic_glink_stub (bfd *abfd, asection *glink, bfd_vma off)
7382d32a 2812{
c6dd29ce 2813 bfd_byte buf[GLINK_ENTRY_SIZE];
7382d32a 2814
c6dd29ce 2815 if (!bfd_get_section_contents (abfd, glink, buf, off, GLINK_ENTRY_SIZE))
7382d32a
AM
2816 return FALSE;
2817
c6dd29ce
AM
2818 return ((bfd_get_32 (abfd, buf + 0) & 0xffff0000) == LIS_11
2819 && (bfd_get_32 (abfd, buf + 4) & 0xffff0000) == LWZ_11_11
2820 && bfd_get_32 (abfd, buf + 8) == MTCTR_11
2821 && bfd_get_32 (abfd, buf + 12) == BCTR);
7382d32a
AM
2822}
2823
468392fb
AM
2824static bfd_boolean
2825section_covers_vma (bfd *abfd ATTRIBUTE_UNUSED, asection *section, void *ptr)
2826{
2827 bfd_vma vma = *(bfd_vma *) ptr;
2828 return ((section->flags & SEC_ALLOC) != 0
2829 && section->vma <= vma
2830 && vma < section->vma + section->size);
2831}
2832
2833static long
2834ppc_elf_get_synthetic_symtab (bfd *abfd, long symcount, asymbol **syms,
2835 long dynsymcount, asymbol **dynsyms,
2836 asymbol **ret)
2837{
2838 bfd_boolean (*slurp_relocs) (bfd *, asection *, asymbol **, bfd_boolean);
2839 asection *plt, *relplt, *dynamic, *glink;
2840 bfd_vma glink_vma = 0;
2841 bfd_vma resolv_vma = 0;
2842 bfd_vma stub_vma;
2843 asymbol *s;
2844 arelent *p;
2845 long count, i;
2846 size_t size;
2847 char *names;
2848 bfd_byte buf[4];
2849
2850 *ret = NULL;
2851
2852 if ((abfd->flags & (DYNAMIC | EXEC_P)) == 0)
2853 return 0;
2854
2855 if (dynsymcount <= 0)
2856 return 0;
2857
2858 relplt = bfd_get_section_by_name (abfd, ".rela.plt");
2859 if (relplt == NULL)
2860 return 0;
2861
2862 plt = bfd_get_section_by_name (abfd, ".plt");
2863 if (plt == NULL)
2864 return 0;
2865
2866 /* Call common code to handle old-style executable PLTs. */
2867 if (elf_section_flags (plt) & SHF_EXECINSTR)
2868 return _bfd_elf_get_synthetic_symtab (abfd, symcount, syms,
2869 dynsymcount, dynsyms, ret);
2870
2871 /* If this object was prelinked, the prelinker stored the address
2872 of .glink at got[1]. If it wasn't prelinked, got[1] will be zero. */
2873 dynamic = bfd_get_section_by_name (abfd, ".dynamic");
2874 if (dynamic != NULL)
2875 {
2876 bfd_byte *dynbuf, *extdyn, *extdynend;
2877 size_t extdynsize;
2878 void (*swap_dyn_in) (bfd *, const void *, Elf_Internal_Dyn *);
2879
2880 if (!bfd_malloc_and_get_section (abfd, dynamic, &dynbuf))
2881 return -1;
2882
2883 extdynsize = get_elf_backend_data (abfd)->s->sizeof_dyn;
2884 swap_dyn_in = get_elf_backend_data (abfd)->s->swap_dyn_in;
2885
2886 extdyn = dynbuf;
2887 extdynend = extdyn + dynamic->size;
2888 for (; extdyn < extdynend; extdyn += extdynsize)
2889 {
2890 Elf_Internal_Dyn dyn;
2891 (*swap_dyn_in) (abfd, extdyn, &dyn);
2892
2893 if (dyn.d_tag == DT_NULL)
2894 break;
2895
2896 if (dyn.d_tag == DT_PPC_GOT)
2897 {
2898 unsigned int g_o_t = dyn.d_un.d_val;
2899 asection *got = bfd_get_section_by_name (abfd, ".got");
2900 if (got != NULL
2901 && bfd_get_section_contents (abfd, got, buf,
2902 g_o_t - got->vma + 4, 4))
2903 glink_vma = bfd_get_32 (abfd, buf);
2904 break;
2905 }
2906 }
2907 free (dynbuf);
2908 }
2909
2910 /* Otherwise we read the first plt entry. */
2911 if (glink_vma == 0)
2912 {
2913 if (bfd_get_section_contents (abfd, plt, buf, 0, 4))
2914 glink_vma = bfd_get_32 (abfd, buf);
2915 }
2916
2917 if (glink_vma == 0)
2918 return 0;
2919
2920 /* The .glink section usually does not survive the final
2921 link; search for the section (usually .text) where the
2922 glink stubs now reside. */
2923 glink = bfd_sections_find_if (abfd, section_covers_vma, &glink_vma);
2924 if (glink == NULL)
2925 return 0;
2926
2927 /* Determine glink PLT resolver by reading the relative branch
2928 from the first glink stub. */
2929 if (bfd_get_section_contents (abfd, glink, buf,
2930 glink_vma - glink->vma, 4))
2931 {
2932 unsigned int insn = bfd_get_32 (abfd, buf);
2933
2934 /* The first glink stub may either branch to the resolver ... */
2935 insn ^= B;
2936 if ((insn & ~0x3fffffc) == 0)
2937 resolv_vma = glink_vma + (insn ^ 0x2000000) - 0x2000000;
2938
2939 /* ... or fall through a bunch of NOPs. */
2940 else if ((insn ^ B ^ NOP) == 0)
2941 for (i = 4;
2942 bfd_get_section_contents (abfd, glink, buf,
2943 glink_vma - glink->vma + i, 4);
2944 i += 4)
2945 if (bfd_get_32 (abfd, buf) != NOP)
2946 {
2947 resolv_vma = glink_vma + i;
2948 break;
2949 }
2950 }
2951
7382d32a 2952 count = relplt->size / sizeof (Elf32_External_Rela);
7382d32a
AM
2953 /* If the stubs are those for -shared/-pie then we might have
2954 multiple stubs for each plt entry. If that is the case then
2955 there is no way to associate stubs with their plt entries short
2956 of figuring out the GOT pointer value used in the stub. */
c6dd29ce
AM
2957 if (!is_nonpic_glink_stub (abfd, glink,
2958 glink_vma - GLINK_ENTRY_SIZE - glink->vma))
7382d32a
AM
2959 return 0;
2960
468392fb
AM
2961 slurp_relocs = get_elf_backend_data (abfd)->s->slurp_reloc_table;
2962 if (! (*slurp_relocs) (abfd, relplt, dynsyms, TRUE))
2963 return -1;
2964
468392fb
AM
2965 size = count * sizeof (asymbol);
2966 p = relplt->relocation;
2967 for (i = 0; i < count; i++, p++)
e054468f
AM
2968 {
2969 size += strlen ((*p->sym_ptr_ptr)->name) + sizeof ("@plt");
2970 if (p->addend != 0)
2971 size += sizeof ("+0x") - 1 + 8;
2972 }
468392fb
AM
2973
2974 size += sizeof (asymbol) + sizeof ("__glink");
2975
2976 if (resolv_vma)
2977 size += sizeof (asymbol) + sizeof ("__glink_PLTresolve");
2978
2979 s = *ret = bfd_malloc (size);
2980 if (s == NULL)
2981 return -1;
2982
1079403c 2983 stub_vma = glink_vma;
468392fb 2984 names = (char *) (s + count + 1 + (resolv_vma != 0));
1079403c
AM
2985 p = relplt->relocation + count - 1;
2986 for (i = 0; i < count; i++)
468392fb
AM
2987 {
2988 size_t len;
2989
2990 *s = **p->sym_ptr_ptr;
2991 /* Undefined syms won't have BSF_LOCAL or BSF_GLOBAL set. Since
2992 we are defining a symbol, ensure one of them is set. */
2993 if ((s->flags & BSF_LOCAL) == 0)
2994 s->flags |= BSF_GLOBAL;
6ba2a415 2995 s->flags |= BSF_SYNTHETIC;
468392fb 2996 s->section = glink;
1079403c
AM
2997 stub_vma -= 16;
2998 if (strcmp ((*p->sym_ptr_ptr)->name, "__tls_get_addr_opt") == 0)
2999 stub_vma -= 32;
468392fb
AM
3000 s->value = stub_vma - glink->vma;
3001 s->name = names;
3002 s->udata.p = NULL;
3003 len = strlen ((*p->sym_ptr_ptr)->name);
3004 memcpy (names, (*p->sym_ptr_ptr)->name, len);
3005 names += len;
e054468f
AM
3006 if (p->addend != 0)
3007 {
3008 memcpy (names, "+0x", sizeof ("+0x") - 1);
3009 names += sizeof ("+0x") - 1;
3010 bfd_sprintf_vma (abfd, names, p->addend);
3011 names += strlen (names);
3012 }
468392fb
AM
3013 memcpy (names, "@plt", sizeof ("@plt"));
3014 names += sizeof ("@plt");
3015 ++s;
1079403c 3016 --p;
468392fb
AM
3017 }
3018
3019 /* Add a symbol at the start of the glink branch table. */
86a4952b 3020 memset (s, 0, sizeof *s);
468392fb 3021 s->the_bfd = abfd;
6ba2a415 3022 s->flags = BSF_GLOBAL | BSF_SYNTHETIC;
468392fb
AM
3023 s->section = glink;
3024 s->value = glink_vma - glink->vma;
3025 s->name = names;
3026 memcpy (names, "__glink", sizeof ("__glink"));
3027 names += sizeof ("__glink");
3028 s++;
3029 count++;
3030
3031 if (resolv_vma)
3032 {
3033 /* Add a symbol for the glink PLT resolver. */
86a4952b 3034 memset (s, 0, sizeof *s);
468392fb 3035 s->the_bfd = abfd;
6ba2a415 3036 s->flags = BSF_GLOBAL | BSF_SYNTHETIC;
468392fb
AM
3037 s->section = glink;
3038 s->value = resolv_vma - glink->vma;
3039 s->name = names;
3040 memcpy (names, "__glink_PLTresolve", sizeof ("__glink_PLTresolve"));
3041 names += sizeof ("__glink_PLTresolve");
3042 s++;
3043 count++;
3044 }
3045
3046 return count;
3047}
3048\f
25dbc73a
AM
3049/* The following functions are specific to the ELF linker, while
3050 functions above are used generally. They appear in this file more
3051 or less in the order in which they are called. eg.
3052 ppc_elf_check_relocs is called early in the link process,
3053 ppc_elf_finish_dynamic_sections is one of the last functions
3054 called. */
252b5132 3055
a6aa5195 3056/* Track PLT entries needed for a given symbol. We might need more
a877a2b6 3057 than one glink entry per symbol when generating a pic binary. */
a6aa5195
AM
3058struct plt_entry
3059{
3060 struct plt_entry *next;
3061
3062 /* -fPIC uses multiple GOT sections, one per file, called ".got2".
3063 This field stores the offset into .got2 used to initialise the
a877a2b6
AM
3064 GOT pointer reg. It will always be at least 32768. (Current
3065 gcc always uses an offset of 32768, but ld -r will pack .got2
3066 sections together resulting in larger offsets). */
a6aa5195
AM
3067 bfd_vma addend;
3068
3069 /* The .got2 section. */
3070 asection *sec;
3071
3072 /* PLT refcount or offset. */
3073 union
3074 {
3075 bfd_signed_vma refcount;
3076 bfd_vma offset;
3077 } plt;
3078
3079 /* .glink stub offset. */
3080 bfd_vma glink_offset;
3081};
3082
1d483afe 3083/* Of those relocs that might be copied as dynamic relocs, this function
25dbc73a
AM
3084 selects those that must be copied when linking a shared library,
3085 even when the symbol is local. */
252b5132 3086
1d483afe
AM
3087static int
3088must_be_dyn_reloc (struct bfd_link_info *info,
3089 enum elf_ppc_reloc_type r_type)
3090{
3091 switch (r_type)
3092 {
3093 default:
3094 return 1;
3095
3096 case R_PPC_REL24:
3097 case R_PPC_REL14:
3098 case R_PPC_REL14_BRTAKEN:
3099 case R_PPC_REL14_BRNTAKEN:
3100 case R_PPC_REL32:
3101 return 0;
3102
3103 case R_PPC_TPREL32:
3104 case R_PPC_TPREL16:
3105 case R_PPC_TPREL16_LO:
3106 case R_PPC_TPREL16_HI:
3107 case R_PPC_TPREL16_HA:
0e1862bb 3108 return !bfd_link_executable (info);
1d483afe
AM
3109 }
3110}
252b5132 3111
25dbc73a
AM
3112/* If ELIMINATE_COPY_RELOCS is non-zero, the linker will try to avoid
3113 copying dynamic variables from a shared lib into an app's dynbss
3114 section, and instead use a dynamic relocation to point into the
3115 shared lib. */
3116#define ELIMINATE_COPY_RELOCS 1
252b5132 3117
f95f8542
AM
3118/* Used to track dynamic relocations for local symbols. */
3119struct ppc_dyn_relocs
3120{
3121 struct ppc_dyn_relocs *next;
3122
3123 /* The input section of the reloc. */
3124 asection *sec;
3125
3126 /* Total number of relocs copied for the input section. */
3127 unsigned int count : 31;
3128
3129 /* Whether this entry is for STT_GNU_IFUNC symbols. */
3130 unsigned int ifunc : 1;
3131};
3132
25dbc73a 3133/* PPC ELF linker hash entry. */
252b5132 3134
25dbc73a
AM
3135struct ppc_elf_link_hash_entry
3136{
3137 struct elf_link_hash_entry elf;
252b5132 3138
25dbc73a
AM
3139 /* If this symbol is used in the linker created sections, the processor
3140 specific backend uses this field to map the field into the offset
3141 from the beginning of the section. */
3142 elf_linker_section_pointers_t *linker_section_pointer;
252b5132 3143
25dbc73a 3144 /* Track dynamic relocs copied for this symbol. */
6061a67d 3145 struct elf_dyn_relocs *dyn_relocs;
252b5132 3146
25dbc73a
AM
3147 /* Contexts in which symbol is used in the GOT (or TOC).
3148 TLS_GD .. TLS_TLS bits are or'd into the mask as the
3149 corresponding relocs are encountered during check_relocs.
3150 tls_optimize clears TLS_GD .. TLS_TPREL when optimizing to
3151 indicate the corresponding GOT entry type is not needed. */
3152#define TLS_GD 1 /* GD reloc. */
3153#define TLS_LD 2 /* LD reloc. */
3154#define TLS_TPREL 4 /* TPREL reloc, => IE. */
3155#define TLS_DTPREL 8 /* DTPREL reloc, => LD. */
3156#define TLS_TLS 16 /* Any TLS reloc. */
3157#define TLS_TPRELGD 32 /* TPREL reloc resulting from GD->IE. */
e054468f 3158#define PLT_IFUNC 64 /* STT_GNU_IFUNC. */
25dbc73a 3159 char tls_mask;
4dc4a9a5
DJ
3160
3161 /* Nonzero if we have seen a small data relocation referring to this
3162 symbol. */
d3e454b9
AM
3163 unsigned char has_sda_refs : 1;
3164
3165 /* Flag use of given relocations. */
3166 unsigned char has_addr16_ha : 1;
3167 unsigned char has_addr16_lo : 1;
25dbc73a 3168};
252b5132 3169
25dbc73a
AM
3170#define ppc_elf_hash_entry(ent) ((struct ppc_elf_link_hash_entry *) (ent))
3171
3172/* PPC ELF linker hash table. */
3173
3174struct ppc_elf_link_hash_table
3175{
3176 struct elf_link_hash_table elf;
3177
5446cbdf
AM
3178 /* Various options passed from the linker. */
3179 struct ppc_elf_params *params;
3180
25dbc73a
AM
3181 /* Short-cuts to get to dynamic linker sections. */
3182 asection *got;
3183 asection *relgot;
d7128ce4 3184 asection *glink;
25dbc73a
AM
3185 asection *plt;
3186 asection *relplt;
e054468f
AM
3187 asection *iplt;
3188 asection *reliplt;
25dbc73a
AM
3189 asection *dynbss;
3190 asection *relbss;
3191 asection *dynsbss;
3192 asection *relsbss;
c9a2f333 3193 elf_linker_section_t sdata[2];
25dbc73a 3194 asection *sbss;
6177242a 3195 asection *glink_eh_frame;
25dbc73a 3196
016687f8
AM
3197 /* The (unloaded but important) .rela.plt.unloaded on VxWorks. */
3198 asection *srelplt2;
3199
3200 /* The .got.plt section (VxWorks only)*/
3201 asection *sgotplt;
3202
1d483afe 3203 /* Shortcut to __tls_get_addr. */
25dbc73a 3204 struct elf_link_hash_entry *tls_get_addr;
252b5132 3205
016687f8
AM
3206 /* The bfd that forced an old-style PLT. */
3207 bfd *old_bfd;
5b914448 3208
25dbc73a
AM
3209 /* TLS local dynamic got entry handling. */
3210 union {
3211 bfd_signed_vma refcount;
3212 bfd_vma offset;
3213 } tlsld_got;
252b5132 3214
c6dd29ce 3215 /* Offset of branch table to PltResolve function in glink. */
d7128ce4
AM
3216 bfd_vma glink_pltresolve;
3217
3b36f7e6
AM
3218 /* Size of reserved GOT entries. */
3219 unsigned int got_header_size;
3220 /* Non-zero if allocating the header left a gap. */
3221 unsigned int got_gap;
3222
4a3dc543
RS
3223 /* The type of PLT we have chosen to use. */
3224 enum ppc_elf_plt_type plt_type;
3225
9d8504b1 3226 /* True if the target system is VxWorks. */
016687f8 3227 unsigned int is_vxworks:1;
9d8504b1
PB
3228
3229 /* The size of PLT entries. */
3230 int plt_entry_size;
3231 /* The distance between adjacent PLT slots. */
3232 int plt_slot_size;
3233 /* The size of the first PLT entry. */
3234 int plt_initial_entry_size;
016687f8 3235
87d72d41
AM
3236 /* Small local sym cache. */
3237 struct sym_cache sym_cache;
25dbc73a 3238};
252b5132 3239
94caa966
AM
3240/* Rename some of the generic section flags to better document how they
3241 are used for ppc32. The flags are only valid for ppc32 elf objects. */
3242
3243/* Nonzero if this section has TLS related relocations. */
3244#define has_tls_reloc sec_flg0
3245
3246/* Nonzero if this section has a call to __tls_get_addr. */
3247#define has_tls_get_addr_call sec_flg1
3248
25dbc73a 3249/* Get the PPC ELF linker hash table from a link_info structure. */
252b5132 3250
25dbc73a 3251#define ppc_elf_hash_table(p) \
4dfe6ac6
NC
3252 (elf_hash_table_id ((struct elf_link_hash_table *) ((p)->hash)) \
3253 == PPC32_ELF_DATA ? ((struct ppc_elf_link_hash_table *) ((p)->hash)) : NULL)
252b5132 3254
25dbc73a 3255/* Create an entry in a PPC ELF linker hash table. */
252b5132 3256
25dbc73a
AM
3257static struct bfd_hash_entry *
3258ppc_elf_link_hash_newfunc (struct bfd_hash_entry *entry,
3259 struct bfd_hash_table *table,
3260 const char *string)
252b5132 3261{
25dbc73a
AM
3262 /* Allocate the structure if it has not already been allocated by a
3263 subclass. */
3264 if (entry == NULL)
3265 {
3266 entry = bfd_hash_allocate (table,
3267 sizeof (struct ppc_elf_link_hash_entry));
3268 if (entry == NULL)
3269 return entry;
3270 }
252b5132 3271
25dbc73a
AM
3272 /* Call the allocation method of the superclass. */
3273 entry = _bfd_elf_link_hash_newfunc (entry, table, string);
3274 if (entry != NULL)
3275 {
3276 ppc_elf_hash_entry (entry)->linker_section_pointer = NULL;
3277 ppc_elf_hash_entry (entry)->dyn_relocs = NULL;
3278 ppc_elf_hash_entry (entry)->tls_mask = 0;
5240d94d 3279 ppc_elf_hash_entry (entry)->has_sda_refs = 0;
25dbc73a 3280 }
252b5132 3281
25dbc73a 3282 return entry;
252b5132 3283}
3dab13f6 3284
25dbc73a 3285/* Create a PPC ELF linker hash table. */
3dab13f6 3286
25dbc73a
AM
3287static struct bfd_link_hash_table *
3288ppc_elf_link_hash_table_create (bfd *abfd)
3dab13f6 3289{
25dbc73a 3290 struct ppc_elf_link_hash_table *ret;
d3e454b9 3291 static struct ppc_elf_params default_params = { PLT_OLD, 0, 1, 0, 0, 12, 0 };
3dab13f6 3292
25dbc73a
AM
3293 ret = bfd_zmalloc (sizeof (struct ppc_elf_link_hash_table));
3294 if (ret == NULL)
3295 return NULL;
3dab13f6 3296
66eb6687
AM
3297 if (!_bfd_elf_link_hash_table_init (&ret->elf, abfd,
3298 ppc_elf_link_hash_newfunc,
4dfe6ac6
NC
3299 sizeof (struct ppc_elf_link_hash_entry),
3300 PPC32_ELF_DATA))
3dab13f6 3301 {
25dbc73a
AM
3302 free (ret);
3303 return NULL;
3304 }
58111eb7 3305
a6aa5195
AM
3306 ret->elf.init_plt_refcount.refcount = 0;
3307 ret->elf.init_plt_refcount.glist = NULL;
3308 ret->elf.init_plt_offset.offset = 0;
3309 ret->elf.init_plt_offset.glist = NULL;
3310
db434ba0
AM
3311 ret->params = &default_params;
3312
c9a2f333
AM
3313 ret->sdata[0].name = ".sdata";
3314 ret->sdata[0].sym_name = "_SDA_BASE_";
3315 ret->sdata[0].bss_name = ".sbss";
3316
3317 ret->sdata[1].name = ".sdata2";
3318 ret->sdata[1].sym_name = "_SDA2_BASE_";
3319 ret->sdata[1].bss_name = ".sbss2";
3320
9d8504b1
PB
3321 ret->plt_entry_size = 12;
3322 ret->plt_slot_size = 8;
3323 ret->plt_initial_entry_size = 72;
9d8504b1 3324
25dbc73a
AM
3325 return &ret->elf.root;
3326}
3dab13f6 3327
5446cbdf
AM
3328/* Hook linker params into hash table. */
3329
3330void
3331ppc_elf_link_params (struct bfd_link_info *info, struct ppc_elf_params *params)
3332{
3333 struct ppc_elf_link_hash_table *htab = ppc_elf_hash_table (info);
3334
3335 if (htab)
3336 htab->params = params;
3337}
3338
9d8504b1 3339/* Create .got and the related sections. */
3dab13f6 3340
25dbc73a
AM
3341static bfd_boolean
3342ppc_elf_create_got (bfd *abfd, struct bfd_link_info *info)
3343{
3344 struct ppc_elf_link_hash_table *htab;
3345 asection *s;
3346 flagword flags;
3dab13f6 3347
25dbc73a
AM
3348 if (!_bfd_elf_create_got_section (abfd, info))
3349 return FALSE;
3dab13f6 3350
25dbc73a 3351 htab = ppc_elf_hash_table (info);
3d4d4302 3352 htab->got = s = bfd_get_linker_section (abfd, ".got");
25dbc73a
AM
3353 if (s == NULL)
3354 abort ();
3dab13f6 3355
9d8504b1
PB
3356 if (htab->is_vxworks)
3357 {
3d4d4302 3358 htab->sgotplt = bfd_get_linker_section (abfd, ".got.plt");
9d8504b1
PB
3359 if (!htab->sgotplt)
3360 abort ();
3361 }
3362 else
3363 {
3364 /* The powerpc .got has a blrl instruction in it. Mark it
3365 executable. */
3366 flags = (SEC_ALLOC | SEC_LOAD | SEC_CODE | SEC_HAS_CONTENTS
3367 | SEC_IN_MEMORY | SEC_LINKER_CREATED);
3368 if (!bfd_set_section_flags (abfd, s, flags))
3369 return FALSE;
3370 }
3dab13f6 3371
3d4d4302 3372 htab->relgot = bfd_get_linker_section (abfd, ".rela.got");
64e77c6d
L
3373 if (!htab->relgot)
3374 abort ();
3dab13f6 3375
25dbc73a
AM
3376 return TRUE;
3377}
3dab13f6 3378
93d1b056
AM
3379/* Create a special linker section, used for R_PPC_EMB_SDAI16 and
3380 R_PPC_EMB_SDA2I16 pointers. These sections become part of .sdata
3381 and .sdata2. Create _SDA_BASE_ and _SDA2_BASE too. */
3382
3383static bfd_boolean
3384ppc_elf_create_linker_section (bfd *abfd,
3385 struct bfd_link_info *info,
3386 flagword flags,
3387 elf_linker_section_t *lsect)
3388{
3389 asection *s;
3390
3391 flags |= (SEC_ALLOC | SEC_LOAD | SEC_HAS_CONTENTS | SEC_IN_MEMORY
3392 | SEC_LINKER_CREATED);
3393
3394 s = bfd_make_section_anyway_with_flags (abfd, lsect->name, flags);
3395 if (s == NULL)
3396 return FALSE;
3397 lsect->section = s;
3398
3399 /* Define the sym on the first section of this name. */
3400 s = bfd_get_section_by_name (abfd, lsect->name);
3401
3402 lsect->sym = _bfd_elf_define_linkage_sym (abfd, info, s, lsect->sym_name);
3403 if (lsect->sym == NULL)
3404 return FALSE;
3405 lsect->sym->root.u.def.value = 0x8000;
3406 return TRUE;
3407}
3408
e054468f
AM
3409static bfd_boolean
3410ppc_elf_create_glink (bfd *abfd, struct bfd_link_info *info)
3411{
3412 struct ppc_elf_link_hash_table *htab = ppc_elf_hash_table (info);
3413 asection *s;
3414 flagword flags;
3415
3416 flags = (SEC_ALLOC | SEC_LOAD | SEC_CODE | SEC_READONLY | SEC_HAS_CONTENTS
3417 | SEC_IN_MEMORY | SEC_LINKER_CREATED);
3418 s = bfd_make_section_anyway_with_flags (abfd, ".glink", flags);
3419 htab->glink = s;
3420 if (s == NULL
5446cbdf
AM
3421 || !bfd_set_section_alignment (abfd, s,
3422 htab->params->ppc476_workaround ? 6 : 4))
e054468f
AM
3423 return FALSE;
3424
6177242a
AM
3425 if (!info->no_ld_generated_unwind_info)
3426 {
3427 flags = (SEC_ALLOC | SEC_LOAD | SEC_READONLY | SEC_HAS_CONTENTS
3428 | SEC_IN_MEMORY | SEC_LINKER_CREATED);
3429 s = bfd_make_section_anyway_with_flags (abfd, ".eh_frame", flags);
3430 htab->glink_eh_frame = s;
3431 if (s == NULL
3432 || !bfd_set_section_alignment (abfd, s, 2))
3433 return FALSE;
3434 }
3435
e054468f
AM
3436 flags = SEC_ALLOC | SEC_LINKER_CREATED;
3437 s = bfd_make_section_anyway_with_flags (abfd, ".iplt", flags);
3438 htab->iplt = s;
3439 if (s == NULL
3440 || !bfd_set_section_alignment (abfd, s, 4))
3441 return FALSE;
3442
3443 flags = (SEC_ALLOC | SEC_LOAD | SEC_READONLY | SEC_HAS_CONTENTS
3444 | SEC_IN_MEMORY | SEC_LINKER_CREATED);
14b2f831 3445 s = bfd_make_section_anyway_with_flags (abfd, ".rela.iplt", flags);
e054468f
AM
3446 htab->reliplt = s;
3447 if (s == NULL
3448 || ! bfd_set_section_alignment (abfd, s, 2))
3449 return FALSE;
93d1b056
AM
3450
3451 if (!ppc_elf_create_linker_section (abfd, info, 0,
3452 &htab->sdata[0]))
3453 return FALSE;
3454
3455 if (!ppc_elf_create_linker_section (abfd, info, SEC_READONLY,
3456 &htab->sdata[1]))
3457 return FALSE;
3458
e054468f
AM
3459 return TRUE;
3460}
3461
25dbc73a
AM
3462/* We have to create .dynsbss and .rela.sbss here so that they get mapped
3463 to output sections (just like _bfd_elf_create_dynamic_sections has
3464 to create .dynbss and .rela.bss). */
3dab13f6 3465
25dbc73a
AM
3466static bfd_boolean
3467ppc_elf_create_dynamic_sections (bfd *abfd, struct bfd_link_info *info)
3468{
3469 struct ppc_elf_link_hash_table *htab;
3470 asection *s;
3471 flagword flags;
3dab13f6 3472
25dbc73a 3473 htab = ppc_elf_hash_table (info);
3dab13f6 3474
25dbc73a
AM
3475 if (htab->got == NULL
3476 && !ppc_elf_create_got (abfd, info))
3dab13f6
AM
3477 return FALSE;
3478
25dbc73a
AM
3479 if (!_bfd_elf_create_dynamic_sections (abfd, info))
3480 return FALSE;
3dab13f6 3481
e054468f
AM
3482 if (htab->glink == NULL
3483 && !ppc_elf_create_glink (abfd, info))
d7128ce4 3484 return FALSE;
3dab13f6 3485
3d4d4302 3486 htab->dynbss = bfd_get_linker_section (abfd, ".dynbss");
14b2f831
AM
3487 s = bfd_make_section_anyway_with_flags (abfd, ".dynsbss",
3488 SEC_ALLOC | SEC_LINKER_CREATED);
3b36f7e6 3489 htab->dynsbss = s;
3496cb2a 3490 if (s == NULL)
25dbc73a 3491 return FALSE;
3dab13f6 3492
0e1862bb 3493 if (! bfd_link_pic (info))
25dbc73a 3494 {
3d4d4302 3495 htab->relbss = bfd_get_linker_section (abfd, ".rela.bss");
e054468f
AM
3496 flags = (SEC_ALLOC | SEC_LOAD | SEC_READONLY | SEC_HAS_CONTENTS
3497 | SEC_IN_MEMORY | SEC_LINKER_CREATED);
14b2f831 3498 s = bfd_make_section_anyway_with_flags (abfd, ".rela.sbss", flags);
3b36f7e6 3499 htab->relsbss = s;
25dbc73a 3500 if (s == NULL
25dbc73a
AM
3501 || ! bfd_set_section_alignment (abfd, s, 2))
3502 return FALSE;
3503 }
3dab13f6 3504
711de32c
RS
3505 if (htab->is_vxworks
3506 && !elf_vxworks_create_dynamic_sections (abfd, info, &htab->srelplt2))
3507 return FALSE;
9d8504b1 3508
3d4d4302
AM
3509 htab->relplt = bfd_get_linker_section (abfd, ".rela.plt");
3510 htab->plt = s = bfd_get_linker_section (abfd, ".plt");
25dbc73a
AM
3511 if (s == NULL)
3512 abort ();
3dab13f6 3513
3b36f7e6 3514 flags = SEC_ALLOC | SEC_CODE | SEC_LINKER_CREATED;
4a3dc543
RS
3515 if (htab->plt_type == PLT_VXWORKS)
3516 /* The VxWorks PLT is a loaded section with contents. */
3517 flags |= SEC_HAS_CONTENTS | SEC_LOAD | SEC_READONLY;
25dbc73a
AM
3518 return bfd_set_section_flags (abfd, s, flags);
3519}
3dab13f6 3520
25dbc73a 3521/* Copy the extra info we tack onto an elf_link_hash_entry. */
58111eb7 3522
25dbc73a 3523static void
fcfa13d2 3524ppc_elf_copy_indirect_symbol (struct bfd_link_info *info,
25dbc73a
AM
3525 struct elf_link_hash_entry *dir,
3526 struct elf_link_hash_entry *ind)
3527{
3528 struct ppc_elf_link_hash_entry *edir, *eind;
3dab13f6 3529
25dbc73a
AM
3530 edir = (struct ppc_elf_link_hash_entry *) dir;
3531 eind = (struct ppc_elf_link_hash_entry *) ind;
3dab13f6 3532
c79d6685
AM
3533 edir->tls_mask |= eind->tls_mask;
3534 edir->has_sda_refs |= eind->has_sda_refs;
3535
3536 /* If called to transfer flags for a weakdef during processing
3537 of elf_adjust_dynamic_symbol, don't copy non_got_ref.
3538 We clear it ourselves for ELIMINATE_COPY_RELOCS. */
3539 if (!(ELIMINATE_COPY_RELOCS
3540 && eind->elf.root.type != bfd_link_hash_indirect
3541 && edir->elf.dynamic_adjusted))
3542 edir->elf.non_got_ref |= eind->elf.non_got_ref;
3543
3544 edir->elf.ref_dynamic |= eind->elf.ref_dynamic;
3545 edir->elf.ref_regular |= eind->elf.ref_regular;
3546 edir->elf.ref_regular_nonweak |= eind->elf.ref_regular_nonweak;
3547 edir->elf.needs_plt |= eind->elf.needs_plt;
3548 edir->elf.pointer_equality_needed |= eind->elf.pointer_equality_needed;
3549
25dbc73a
AM
3550 if (eind->dyn_relocs != NULL)
3551 {
3552 if (edir->dyn_relocs != NULL)
3dab13f6 3553 {
6061a67d
AM
3554 struct elf_dyn_relocs **pp;
3555 struct elf_dyn_relocs *p;
3dab13f6 3556
fcfa13d2 3557 /* Add reloc counts against the indirect sym to the direct sym
25dbc73a
AM
3558 list. Merge any entries against the same section. */
3559 for (pp = &eind->dyn_relocs; (p = *pp) != NULL; )
3dab13f6 3560 {
6061a67d 3561 struct elf_dyn_relocs *q;
25dbc73a
AM
3562
3563 for (q = edir->dyn_relocs; q != NULL; q = q->next)
3564 if (q->sec == p->sec)
3565 {
3566 q->pc_count += p->pc_count;
3567 q->count += p->count;
3568 *pp = p->next;
3569 break;
3570 }
3571 if (q == NULL)
3572 pp = &p->next;
3dab13f6 3573 }
25dbc73a 3574 *pp = edir->dyn_relocs;
3dab13f6 3575 }
25dbc73a
AM
3576
3577 edir->dyn_relocs = eind->dyn_relocs;
3578 eind->dyn_relocs = NULL;
3dab13f6 3579 }
3dab13f6 3580
68ba6d40
AM
3581 /* If we were called to copy over info for a weak sym, that's all.
3582 You might think dyn_relocs need not be copied over; After all,
3583 both syms will be dynamic or both non-dynamic so we're just
68ffbac6 3584 moving reloc accounting around. However, ELIMINATE_COPY_RELOCS
68ba6d40
AM
3585 code in ppc_elf_adjust_dynamic_symbol needs to check for
3586 dyn_relocs in read-only sections, and it does so on what is the
3587 DIR sym here. */
3588 if (eind->elf.root.type != bfd_link_hash_indirect)
3589 return;
3590
a6aa5195
AM
3591 /* Copy over the GOT refcount entries that we may have already seen to
3592 the symbol which just became indirect. */
fcfa13d2
AM
3593 edir->elf.got.refcount += eind->elf.got.refcount;
3594 eind->elf.got.refcount = 0;
a6aa5195
AM
3595
3596 /* And plt entries. */
3597 if (eind->elf.plt.plist != NULL)
3598 {
3599 if (edir->elf.plt.plist != NULL)
3600 {
3601 struct plt_entry **entp;
3602 struct plt_entry *ent;
3603
3604 for (entp = &eind->elf.plt.plist; (ent = *entp) != NULL; )
3605 {
3606 struct plt_entry *dent;
3607
3608 for (dent = edir->elf.plt.plist; dent != NULL; dent = dent->next)
3609 if (dent->sec == ent->sec && dent->addend == ent->addend)
3610 {
3611 dent->plt.refcount += ent->plt.refcount;
3612 *entp = ent->next;
3613 break;
3614 }
3615 if (dent == NULL)
3616 entp = &ent->next;
3617 }
3618 *entp = edir->elf.plt.plist;
3619 }
3620
3621 edir->elf.plt.plist = eind->elf.plt.plist;
3622 eind->elf.plt.plist = NULL;
3623 }
3624
fcfa13d2 3625 if (eind->elf.dynindx != -1)
25dbc73a 3626 {
fcfa13d2
AM
3627 if (edir->elf.dynindx != -1)
3628 _bfd_elf_strtab_delref (elf_hash_table (info)->dynstr,
3629 edir->elf.dynstr_index);
a6aa5195
AM
3630 edir->elf.dynindx = eind->elf.dynindx;
3631 edir->elf.dynstr_index = eind->elf.dynstr_index;
3632 eind->elf.dynindx = -1;
3633 eind->elf.dynstr_index = 0;
25dbc73a 3634 }
25dbc73a 3635}
3dab13f6 3636
25dbc73a
AM
3637/* Hook called by the linker routine which adds symbols from an object
3638 file. We use it to put .comm items in .sbss, and not .bss. */
58111eb7 3639
25dbc73a
AM
3640static bfd_boolean
3641ppc_elf_add_symbol_hook (bfd *abfd,
3642 struct bfd_link_info *info,
3643 Elf_Internal_Sym *sym,
3644 const char **namep ATTRIBUTE_UNUSED,
3645 flagword *flagsp ATTRIBUTE_UNUSED,
3646 asection **secp,
3647 bfd_vma *valp)
3648{
3649 if (sym->st_shndx == SHN_COMMON
0e1862bb 3650 && !bfd_link_relocatable (info)
0c8d6e5c
AM
3651 && is_ppc_elf (info->output_bfd)
3652 && sym->st_size <= elf_gp_size (abfd))
25dbc73a
AM
3653 {
3654 /* Common symbols less than or equal to -G nn bytes are automatically
3655 put into .sbss. */
3656 struct ppc_elf_link_hash_table *htab;
3dab13f6 3657
25dbc73a
AM
3658 htab = ppc_elf_hash_table (info);
3659 if (htab->sbss == NULL)
3660 {
644285ef 3661 flagword flags = SEC_IS_COMMON | SEC_LINKER_CREATED;
3dab13f6 3662
644285ef
AM
3663 if (!htab->elf.dynobj)
3664 htab->elf.dynobj = abfd;
3665
3496cb2a
L
3666 htab->sbss = bfd_make_section_anyway_with_flags (htab->elf.dynobj,
3667 ".sbss",
3668 flags);
3669 if (htab->sbss == NULL)
25dbc73a 3670 return FALSE;
3dab13f6 3671 }
3dab13f6 3672
25dbc73a
AM
3673 *secp = htab->sbss;
3674 *valp = sym->st_size;
3675 }
3dab13f6 3676
f1885d1e
AM
3677 if ((ELF_ST_TYPE (sym->st_info) == STT_GNU_IFUNC
3678 || ELF_ST_BIND (sym->st_info) == STB_GNU_UNIQUE)
3679 && (abfd->flags & DYNAMIC) == 0
3680 && bfd_get_flavour (info->output_bfd) == bfd_target_elf_flavour)
13a2df29 3681 elf_tdata (info->output_bfd)->has_gnu_symbols = elf_gnu_symbol_any;
e054468f 3682
25dbc73a 3683 return TRUE;
3dab13f6
AM
3684}
3685\f
25dbc73a
AM
3686/* Find a linker generated pointer with a given addend and type. */
3687
3688static elf_linker_section_pointers_t *
3689elf_find_pointer_linker_section
3690 (elf_linker_section_pointers_t *linker_pointers,
3691 bfd_vma addend,
3692 elf_linker_section_t *lsect)
252b5132 3693{
25dbc73a
AM
3694 for ( ; linker_pointers != NULL; linker_pointers = linker_pointers->next)
3695 if (lsect == linker_pointers->lsect && addend == linker_pointers->addend)
3696 return linker_pointers;
252b5132 3697
25dbc73a
AM
3698 return NULL;
3699}
3700
3701/* Allocate a pointer to live in a linker created section. */
3702
3703static bfd_boolean
93d1b056
AM
3704elf_allocate_pointer_linker_section (bfd *abfd,
3705 elf_linker_section_t *lsect,
3706 struct elf_link_hash_entry *h,
3707 const Elf_Internal_Rela *rel)
25dbc73a
AM
3708{
3709 elf_linker_section_pointers_t **ptr_linker_section_ptr = NULL;
3710 elf_linker_section_pointers_t *linker_section_ptr;
3711 unsigned long r_symndx = ELF32_R_SYM (rel->r_info);
3712 bfd_size_type amt;
3713
3714 BFD_ASSERT (lsect != NULL);
3715
3716 /* Is this a global symbol? */
3717 if (h != NULL)
3718 {
3719 struct ppc_elf_link_hash_entry *eh;
3720
3721 /* Has this symbol already been allocated? If so, our work is done. */
3722 eh = (struct ppc_elf_link_hash_entry *) h;
3723 if (elf_find_pointer_linker_section (eh->linker_section_pointer,
3724 rel->r_addend,
3725 lsect))
3726 return TRUE;
3727
3728 ptr_linker_section_ptr = &eh->linker_section_pointer;
25dbc73a
AM
3729 }
3730 else
3731 {
0c8d6e5c 3732 BFD_ASSERT (is_ppc_elf (abfd));
0ffa91dd 3733
25dbc73a
AM
3734 /* Allocation of a pointer to a local symbol. */
3735 elf_linker_section_pointers_t **ptr = elf_local_ptr_offsets (abfd);
3736
3737 /* Allocate a table to hold the local symbols if first time. */
3738 if (!ptr)
3739 {
0ffa91dd 3740 unsigned int num_symbols = elf_symtab_hdr (abfd).sh_info;
25dbc73a
AM
3741
3742 amt = num_symbols;
3743 amt *= sizeof (elf_linker_section_pointers_t *);
3744 ptr = bfd_zalloc (abfd, amt);
3745
3746 if (!ptr)
3747 return FALSE;
3748
3749 elf_local_ptr_offsets (abfd) = ptr;
3750 }
3751
3752 /* Has this symbol already been allocated? If so, our work is done. */
3753 if (elf_find_pointer_linker_section (ptr[r_symndx],
3754 rel->r_addend,
3755 lsect))
3756 return TRUE;
252b5132 3757
25dbc73a 3758 ptr_linker_section_ptr = &ptr[r_symndx];
25dbc73a 3759 }
41fcb14e 3760
25dbc73a
AM
3761 /* Allocate space for a pointer in the linker section, and allocate
3762 a new pointer record from internal memory. */
3763 BFD_ASSERT (ptr_linker_section_ptr != NULL);
3764 amt = sizeof (elf_linker_section_pointers_t);
3765 linker_section_ptr = bfd_alloc (abfd, amt);
41fcb14e 3766
25dbc73a 3767 if (!linker_section_ptr)
7619e7c7 3768 return FALSE;
41fcb14e 3769
25dbc73a
AM
3770 linker_section_ptr->next = *ptr_linker_section_ptr;
3771 linker_section_ptr->addend = rel->r_addend;
3772 linker_section_ptr->lsect = lsect;
25dbc73a 3773 *ptr_linker_section_ptr = linker_section_ptr;
41fcb14e 3774
93d1b056
AM
3775 if (!bfd_set_section_alignment (lsect->section->owner, lsect->section, 2))
3776 return FALSE;
25dbc73a
AM
3777 linker_section_ptr->offset = lsect->section->size;
3778 lsect->section->size += 4;
7619e7c7 3779
25dbc73a
AM
3780#ifdef DEBUG
3781 fprintf (stderr,
3782 "Create pointer in linker section %s, offset = %ld, section size = %ld\n",
3783 lsect->name, (long) linker_section_ptr->offset,
3784 (long) lsect->section->size);
3785#endif
7619e7c7
AM
3786
3787 return TRUE;
41fcb14e
AM
3788}
3789
e054468f 3790static struct plt_entry **
25dbc73a
AM
3791update_local_sym_info (bfd *abfd,
3792 Elf_Internal_Shdr *symtab_hdr,
3793 unsigned long r_symndx,
3794 int tls_type)
252b5132 3795{
25dbc73a 3796 bfd_signed_vma *local_got_refcounts = elf_local_got_refcounts (abfd);
e054468f 3797 struct plt_entry **local_plt;
25dbc73a 3798 char *local_got_tls_masks;
252b5132 3799
25dbc73a 3800 if (local_got_refcounts == NULL)
252b5132 3801 {
25dbc73a
AM
3802 bfd_size_type size = symtab_hdr->sh_info;
3803
e054468f
AM
3804 size *= (sizeof (*local_got_refcounts)
3805 + sizeof (*local_plt)
3806 + sizeof (*local_got_tls_masks));
25dbc73a
AM
3807 local_got_refcounts = bfd_zalloc (abfd, size);
3808 if (local_got_refcounts == NULL)
e054468f 3809 return NULL;
25dbc73a 3810 elf_local_got_refcounts (abfd) = local_got_refcounts;
252b5132 3811 }
41fcb14e 3812
e054468f
AM
3813 local_plt = (struct plt_entry **) (local_got_refcounts + symtab_hdr->sh_info);
3814 local_got_tls_masks = (char *) (local_plt + symtab_hdr->sh_info);
25dbc73a 3815 local_got_tls_masks[r_symndx] |= tls_type;
e054468f
AM
3816 if (tls_type != PLT_IFUNC)
3817 local_got_refcounts[r_symndx] += 1;
3818 return local_plt + r_symndx;
25dbc73a 3819}
41fcb14e 3820
a6aa5195 3821static bfd_boolean
3ec01793 3822update_plt_info (bfd *abfd, struct plt_entry **plist,
a6aa5195
AM
3823 asection *sec, bfd_vma addend)
3824{
3825 struct plt_entry *ent;
3826
32af9f6e
AM
3827 if (addend < 32768)
3828 sec = NULL;
3ec01793 3829 for (ent = *plist; ent != NULL; ent = ent->next)
a6aa5195
AM
3830 if (ent->sec == sec && ent->addend == addend)
3831 break;
3832 if (ent == NULL)
3833 {
3834 bfd_size_type amt = sizeof (*ent);
3835 ent = bfd_alloc (abfd, amt);
3836 if (ent == NULL)
3837 return FALSE;
3ec01793 3838 ent->next = *plist;
a6aa5195
AM
3839 ent->sec = sec;
3840 ent->addend = addend;
3841 ent->plt.refcount = 0;
3ec01793 3842 *plist = ent;
a6aa5195
AM
3843 }
3844 ent->plt.refcount += 1;
3845 return TRUE;
3846}
3847
3848static struct plt_entry *
3ec01793 3849find_plt_ent (struct plt_entry **plist, asection *sec, bfd_vma addend)
a6aa5195
AM
3850{
3851 struct plt_entry *ent;
3852
3853 if (addend < 32768)
3854 sec = NULL;
3ec01793 3855 for (ent = *plist; ent != NULL; ent = ent->next)
a6aa5195
AM
3856 if (ent->sec == sec && ent->addend == addend)
3857 break;
3858 return ent;
3859}
3860
e054468f
AM
3861static bfd_boolean
3862is_branch_reloc (enum elf_ppc_reloc_type r_type)
3863{
3864 return (r_type == R_PPC_PLTREL24
3865 || r_type == R_PPC_LOCAL24PC
3866 || r_type == R_PPC_REL24
3867 || r_type == R_PPC_REL14
3868 || r_type == R_PPC_REL14_BRTAKEN
3869 || r_type == R_PPC_REL14_BRNTAKEN
3870 || r_type == R_PPC_ADDR24
3871 || r_type == R_PPC_ADDR14
3872 || r_type == R_PPC_ADDR14_BRTAKEN
3873 || r_type == R_PPC_ADDR14_BRNTAKEN);
3874}
3875
25dbc73a
AM
3876static void
3877bad_shared_reloc (bfd *abfd, enum elf_ppc_reloc_type r_type)
3878{
3879 (*_bfd_error_handler)
3880 (_("%B: relocation %s cannot be used when making a shared object"),
3881 abfd,
3882 ppc_elf_howto_table[r_type]->name);
3883 bfd_set_error (bfd_error_bad_value);
252b5132
RH
3884}
3885
25dbc73a
AM
3886/* Look through the relocs for a section during the first phase, and
3887 allocate space in the global offset table or procedure linkage
3888 table. */
252b5132 3889
b34976b6 3890static bfd_boolean
25dbc73a
AM
3891ppc_elf_check_relocs (bfd *abfd,
3892 struct bfd_link_info *info,
3893 asection *sec,
3894 const Elf_Internal_Rela *relocs)
252b5132 3895{
7619e7c7 3896 struct ppc_elf_link_hash_table *htab;
25dbc73a
AM
3897 Elf_Internal_Shdr *symtab_hdr;
3898 struct elf_link_hash_entry **sym_hashes;
3899 const Elf_Internal_Rela *rel;
3900 const Elf_Internal_Rela *rel_end;
a6aa5195 3901 asection *got2, *sreloc;
727fc41e 3902 struct elf_link_hash_entry *tga;
25dbc73a 3903
0e1862bb 3904 if (bfd_link_relocatable (info))
25dbc73a 3905 return TRUE;
252b5132 3906
c87b5a93
AM
3907 /* Don't do anything special with non-loaded, non-alloced sections.
3908 In particular, any relocs in such sections should not affect GOT
3909 and PLT reference counting (ie. we don't allow them to create GOT
3910 or PLT entries), there's no possibility or desire to optimize TLS
3911 relocs, and there's not much point in propagating relocs to shared
3912 libs that the dynamic linker won't relocate. */
3913 if ((sec->flags & SEC_ALLOC) == 0)
3914 return TRUE;
3915
252b5132 3916#ifdef DEBUG
25dbc73a
AM
3917 _bfd_error_handler ("ppc_elf_check_relocs called for section %A in %B",
3918 sec, abfd);
252b5132
RH
3919#endif
3920
0c8d6e5c 3921 BFD_ASSERT (is_ppc_elf (abfd));
0ffa91dd 3922
25dbc73a
AM
3923 /* Initialize howto table if not already done. */
3924 if (!ppc_elf_howto_table[R_PPC_ADDR32])
3925 ppc_elf_howto_init ();
3926
7619e7c7 3927 htab = ppc_elf_hash_table (info);
25f23106
AM
3928 if (htab->glink == NULL)
3929 {
3930 if (htab->elf.dynobj == NULL)
3931 htab->elf.dynobj = abfd;
3932 if (!ppc_elf_create_glink (htab->elf.dynobj, info))
3933 return FALSE;
3934 }
727fc41e
AM
3935 tga = elf_link_hash_lookup (&htab->elf, "__tls_get_addr",
3936 FALSE, FALSE, TRUE);
0ffa91dd 3937 symtab_hdr = &elf_symtab_hdr (abfd);
25dbc73a 3938 sym_hashes = elf_sym_hashes (abfd);
a6aa5195 3939 got2 = bfd_get_section_by_name (abfd, ".got2");
25dbc73a
AM
3940 sreloc = NULL;
3941
3942 rel_end = relocs + sec->reloc_count;
3943 for (rel = relocs; rel < rel_end; rel++)
3944 {
3945 unsigned long r_symndx;
3946 enum elf_ppc_reloc_type r_type;
3947 struct elf_link_hash_entry *h;
727fc41e 3948 int tls_type;
cbf95972 3949 struct plt_entry **ifunc;
25dbc73a
AM
3950
3951 r_symndx = ELF32_R_SYM (rel->r_info);
3952 if (r_symndx < symtab_hdr->sh_info)
3953 h = NULL;
3954 else
973a3492
L
3955 {
3956 h = sym_hashes[r_symndx - symtab_hdr->sh_info];
3957 while (h->root.type == bfd_link_hash_indirect
3958 || h->root.type == bfd_link_hash_warning)
3959 h = (struct elf_link_hash_entry *) h->root.u.i.link;
81fbe831
AM
3960
3961 /* PR15323, ref flags aren't set for references in the same
3962 object. */
3963 h->root.non_ir_ref = 1;
973a3492 3964 }
25dbc73a
AM
3965
3966 /* If a relocation refers to _GLOBAL_OFFSET_TABLE_, create the .got.
3967 This shows up in particular in an R_PPC_ADDR32 in the eabi
3968 startup code. */
3b36f7e6
AM
3969 if (h != NULL
3970 && htab->got == NULL
3971 && strcmp (h->root.root.string, "_GLOBAL_OFFSET_TABLE_") == 0)
252b5132 3972 {
3b36f7e6
AM
3973 if (htab->elf.dynobj == NULL)
3974 htab->elf.dynobj = abfd;
3975 if (!ppc_elf_create_got (htab->elf.dynobj, info))
3976 return FALSE;
3977 BFD_ASSERT (h == htab->elf.hgot);
25dbc73a 3978 }
252b5132 3979
727fc41e 3980 tls_type = 0;
de972ffa 3981 r_type = ELF32_R_TYPE (rel->r_info);
cbf95972 3982 ifunc = NULL;
06a162cf 3983 if (h == NULL && !htab->is_vxworks)
e054468f 3984 {
06a162cf
AM
3985 Elf_Internal_Sym *isym = bfd_sym_from_r_symndx (&htab->sym_cache,
3986 abfd, r_symndx);
3987 if (isym == NULL)
3988 return FALSE;
3989
0bed072f 3990 if (ELF_ST_TYPE (isym->st_info) == STT_GNU_IFUNC)
e054468f 3991 {
0bed072f 3992 /* Set PLT_IFUNC flag for this sym, no GOT entry yet. */
06a162cf
AM
3993 ifunc = update_local_sym_info (abfd, symtab_hdr, r_symndx,
3994 PLT_IFUNC);
3995 if (ifunc == NULL)
e054468f
AM
3996 return FALSE;
3997
06a162cf
AM
3998 /* STT_GNU_IFUNC symbols must have a PLT entry;
3999 In a non-pie executable even when there are
4000 no plt calls. */
0e1862bb 4001 if (!bfd_link_pic (info)
0bed072f 4002 || is_branch_reloc (r_type))
e054468f 4003 {
0bed072f
AM
4004 bfd_vma addend = 0;
4005 if (r_type == R_PPC_PLTREL24)
4006 {
4007 ppc_elf_tdata (abfd)->makes_plt_call = 1;
0e1862bb 4008 if (bfd_link_pic (info))
0bed072f
AM
4009 addend = rel->r_addend;
4010 }
4011 if (!update_plt_info (abfd, ifunc, got2, addend))
4012 return FALSE;
e054468f
AM
4013 }
4014 }
25f23106
AM
4015 }
4016
de972ffa
AM
4017 if (!htab->is_vxworks
4018 && is_branch_reloc (r_type)
4019 && h != NULL
4020 && h == tga)
25f23106 4021 {
de972ffa
AM
4022 if (rel != relocs
4023 && (ELF32_R_TYPE (rel[-1].r_info) == R_PPC_TLSGD
4024 || ELF32_R_TYPE (rel[-1].r_info) == R_PPC_TLSLD))
4025 /* We have a new-style __tls_get_addr call with a marker
4026 reloc. */
4027 ;
4028 else
4029 /* Mark this section as having an old-style call. */
4030 sec->has_tls_get_addr_call = 1;
e054468f 4031 }
727fc41e 4032
25dbc73a
AM
4033 switch (r_type)
4034 {
727fc41e
AM
4035 case R_PPC_TLSGD:
4036 case R_PPC_TLSLD:
4037 /* These special tls relocs tie a call to __tls_get_addr with
4038 its parameter symbol. */
4039 break;
4040
25dbc73a
AM
4041 case R_PPC_GOT_TLSLD16:
4042 case R_PPC_GOT_TLSLD16_LO:
4043 case R_PPC_GOT_TLSLD16_HI:
4044 case R_PPC_GOT_TLSLD16_HA:
25dbc73a
AM
4045 tls_type = TLS_TLS | TLS_LD;
4046 goto dogottls;
252b5132 4047
25dbc73a
AM
4048 case R_PPC_GOT_TLSGD16:
4049 case R_PPC_GOT_TLSGD16_LO:
4050 case R_PPC_GOT_TLSGD16_HI:
4051 case R_PPC_GOT_TLSGD16_HA:
4052 tls_type = TLS_TLS | TLS_GD;
4053 goto dogottls;
4054
4055 case R_PPC_GOT_TPREL16:
4056 case R_PPC_GOT_TPREL16_LO:
4057 case R_PPC_GOT_TPREL16_HI:
4058 case R_PPC_GOT_TPREL16_HA:
0e1862bb 4059 if (bfd_link_pic (info))
25dbc73a
AM
4060 info->flags |= DF_STATIC_TLS;
4061 tls_type = TLS_TLS | TLS_TPREL;
4062 goto dogottls;
4063
4064 case R_PPC_GOT_DTPREL16:
4065 case R_PPC_GOT_DTPREL16_LO:
4066 case R_PPC_GOT_DTPREL16_HI:
4067 case R_PPC_GOT_DTPREL16_HA:
4068 tls_type = TLS_TLS | TLS_DTPREL;
4069 dogottls:
4070 sec->has_tls_reloc = 1;
4071 /* Fall thru */
252b5132 4072
25dbc73a
AM
4073 /* GOT16 relocations */
4074 case R_PPC_GOT16:
4075 case R_PPC_GOT16_LO:
4076 case R_PPC_GOT16_HI:
4077 case R_PPC_GOT16_HA:
4078 /* This symbol requires a global offset table entry. */
4079 if (htab->got == NULL)
4080 {
4081 if (htab->elf.dynobj == NULL)
4082 htab->elf.dynobj = abfd;
4083 if (!ppc_elf_create_got (htab->elf.dynobj, info))
4084 return FALSE;
4085 }
4086 if (h != NULL)
4087 {
4088 h->got.refcount += 1;
4089 ppc_elf_hash_entry (h)->tls_mask |= tls_type;
4090 }
4091 else
4092 /* This is a global offset table entry for a local symbol. */
4093 if (!update_local_sym_info (abfd, symtab_hdr, r_symndx, tls_type))
4094 return FALSE;
91e21fb7
AM
4095
4096 /* We may also need a plt entry if the symbol turns out to be
4097 an ifunc. */
0e1862bb 4098 if (h != NULL && !bfd_link_pic (info))
91e21fb7
AM
4099 {
4100 if (!update_plt_info (abfd, &h->plt.plist, NULL, 0))
4101 return FALSE;
4102 }
25dbc73a 4103 break;
252b5132 4104
25dbc73a
AM
4105 /* Indirect .sdata relocation. */
4106 case R_PPC_EMB_SDAI16:
0e1862bb 4107 if (bfd_link_pic (info))
25dbc73a
AM
4108 {
4109 bad_shared_reloc (abfd, r_type);
4110 return FALSE;
4111 }
93d1b056
AM
4112 htab->sdata[0].sym->ref_regular = 1;
4113 if (!elf_allocate_pointer_linker_section (abfd, &htab->sdata[0],
4114 h, rel))
25dbc73a 4115 return FALSE;
046183de
AM
4116 if (h != NULL)
4117 {
4118 ppc_elf_hash_entry (h)->has_sda_refs = TRUE;
4119 h->non_got_ref = TRUE;
4120 }
25dbc73a 4121 break;
252b5132 4122
25dbc73a
AM
4123 /* Indirect .sdata2 relocation. */
4124 case R_PPC_EMB_SDA2I16:
0e1862bb 4125 if (bfd_link_pic (info))
25dbc73a
AM
4126 {
4127 bad_shared_reloc (abfd, r_type);
4128 return FALSE;
4129 }
93d1b056
AM
4130 htab->sdata[1].sym->ref_regular = 1;
4131 if (!elf_allocate_pointer_linker_section (abfd, &htab->sdata[1],
4132 h, rel))
25dbc73a 4133 return FALSE;
046183de
AM
4134 if (h != NULL)
4135 {
4136 ppc_elf_hash_entry (h)->has_sda_refs = TRUE;
4137 h->non_got_ref = TRUE;
4138 }
25dbc73a 4139 break;
252b5132 4140
93d1b056
AM
4141 case R_PPC_SDAREL16:
4142 htab->sdata[0].sym->ref_regular = 1;
4143 /* Fall thru */
4144
b9c361e0
JL
4145 case R_PPC_VLE_SDAREL_LO16A:
4146 case R_PPC_VLE_SDAREL_LO16D:
4147 case R_PPC_VLE_SDAREL_HI16A:
4148 case R_PPC_VLE_SDAREL_HI16D:
4149 case R_PPC_VLE_SDAREL_HA16A:
4150 case R_PPC_VLE_SDAREL_HA16D:
046183de
AM
4151 if (h != NULL)
4152 {
4153 ppc_elf_hash_entry (h)->has_sda_refs = TRUE;
4154 h->non_got_ref = TRUE;
4155 }
4156 break;
4157
b9c361e0
JL
4158 case R_PPC_VLE_REL8:
4159 case R_PPC_VLE_REL15:
4160 case R_PPC_VLE_REL24:
4161 case R_PPC_VLE_LO16A:
4162 case R_PPC_VLE_LO16D:
4163 case R_PPC_VLE_HI16A:
4164 case R_PPC_VLE_HI16D:
4165 case R_PPC_VLE_HA16A:
4166 case R_PPC_VLE_HA16D:
4167 break;
4168
25dbc73a 4169 case R_PPC_EMB_SDA2REL:
0e1862bb 4170 if (bfd_link_pic (info))
046183de
AM
4171 {
4172 bad_shared_reloc (abfd, r_type);
4173 return FALSE;
4174 }
93d1b056 4175 htab->sdata[1].sym->ref_regular = 1;
046183de
AM
4176 if (h != NULL)
4177 {
4178 ppc_elf_hash_entry (h)->has_sda_refs = TRUE;
4179 h->non_got_ref = TRUE;
4180 }
4181 break;
4182
b9c361e0
JL
4183 case R_PPC_VLE_SDA21_LO:
4184 case R_PPC_VLE_SDA21:
25dbc73a
AM
4185 case R_PPC_EMB_SDA21:
4186 case R_PPC_EMB_RELSDA:
0e1862bb 4187 if (bfd_link_pic (info))
046183de
AM
4188 {
4189 bad_shared_reloc (abfd, r_type);
4190 return FALSE;
4191 }
046183de
AM
4192 if (h != NULL)
4193 {
4194 ppc_elf_hash_entry (h)->has_sda_refs = TRUE;
4195 h->non_got_ref = TRUE;
4196 }
4197 break;
4198
25dbc73a
AM
4199 case R_PPC_EMB_NADDR32:
4200 case R_PPC_EMB_NADDR16:
4201 case R_PPC_EMB_NADDR16_LO:
4202 case R_PPC_EMB_NADDR16_HI:
4203 case R_PPC_EMB_NADDR16_HA:
0e1862bb 4204 if (bfd_link_pic (info))
25dbc73a
AM
4205 {
4206 bad_shared_reloc (abfd, r_type);
4207 return FALSE;
4208 }
4dc4a9a5 4209 if (h != NULL)
046183de 4210 h->non_got_ref = TRUE;
25dbc73a 4211 break;
252b5132 4212
25dbc73a 4213 case R_PPC_PLTREL24:
de972ffa 4214 if (h == NULL)
6d78d0b9
AM
4215 break;
4216 /* Fall through */
4217 case R_PPC_PLT32:
25dbc73a
AM
4218 case R_PPC_PLTREL32:
4219 case R_PPC_PLT16_LO:
4220 case R_PPC_PLT16_HI:
4221 case R_PPC_PLT16_HA:
4222#ifdef DEBUG
4223 fprintf (stderr, "Reloc requires a PLT entry\n");
4224#endif
cbf95972 4225 /* This symbol requires a procedure linkage table entry. */
25dbc73a
AM
4226 if (h == NULL)
4227 {
cbf95972
AM
4228 if (ifunc == NULL)
4229 {
4230 /* It does not make sense to have a procedure linkage
4231 table entry for a non-ifunc local symbol. */
4232 info->callbacks->einfo
4233 (_("%P: %H: %s reloc against local symbol\n"),
4234 abfd, sec, rel->r_offset,
4235 ppc_elf_howto_table[r_type]->name);
4236 bfd_set_error (bfd_error_bad_value);
4237 return FALSE;
4238 }
25dbc73a 4239 }
a6aa5195
AM
4240 else
4241 {
016687f8 4242 bfd_vma addend = 0;
ee05f2fe 4243
016687f8
AM
4244 if (r_type == R_PPC_PLTREL24)
4245 {
4246 ppc_elf_tdata (abfd)->makes_plt_call = 1;
0e1862bb 4247 if (bfd_link_pic (info))
a877a2b6 4248 addend = rel->r_addend;
016687f8 4249 }
a6aa5195 4250 h->needs_plt = 1;
32af9f6e 4251 if (!update_plt_info (abfd, &h->plt.plist, got2, addend))
a6aa5195
AM
4252 return FALSE;
4253 }
25dbc73a 4254 break;
ee05f2fe 4255
25dbc73a
AM
4256 /* The following relocations don't need to propagate the
4257 relocation if linking a shared object since they are
4258 section relative. */
4259 case R_PPC_SECTOFF:
4260 case R_PPC_SECTOFF_LO:
4261 case R_PPC_SECTOFF_HI:
4262 case R_PPC_SECTOFF_HA:
4263 case R_PPC_DTPREL16:
4264 case R_PPC_DTPREL16_LO:
4265 case R_PPC_DTPREL16_HI:
4266 case R_PPC_DTPREL16_HA:
4267 case R_PPC_TOC16:
4268 break;
252b5132 4269
d7128ce4
AM
4270 case R_PPC_REL16:
4271 case R_PPC_REL16_LO:
4272 case R_PPC_REL16_HI:
4273 case R_PPC_REL16_HA:
a680de9a 4274 case R_PPC_REL16DX_HA:
016687f8 4275 ppc_elf_tdata (abfd)->has_rel16 = 1;
d7128ce4
AM
4276 break;
4277
a6aa5195 4278 /* These are just markers. */
25dbc73a
AM
4279 case R_PPC_TLS:
4280 case R_PPC_EMB_MRKREF:
4281 case R_PPC_NONE:
4282 case R_PPC_max:
32af9f6e
AM
4283 case R_PPC_RELAX:
4284 case R_PPC_RELAX_PLT:
4285 case R_PPC_RELAX_PLTREL24:
25dbc73a 4286 break;
252b5132 4287
25dbc73a
AM
4288 /* These should only appear in dynamic objects. */
4289 case R_PPC_COPY:
4290 case R_PPC_GLOB_DAT:
4291 case R_PPC_JMP_SLOT:
4292 case R_PPC_RELATIVE:
e054468f 4293 case R_PPC_IRELATIVE:
25dbc73a 4294 break;
252b5132 4295
25dbc73a
AM
4296 /* These aren't handled yet. We'll report an error later. */
4297 case R_PPC_ADDR30:
4298 case R_PPC_EMB_RELSEC16:
4299 case R_PPC_EMB_RELST_LO:
4300 case R_PPC_EMB_RELST_HI:
4301 case R_PPC_EMB_RELST_HA:
4302 case R_PPC_EMB_BIT_FLD:
4303 break;
252b5132 4304
25dbc73a
AM
4305 /* This refers only to functions defined in the shared library. */
4306 case R_PPC_LOCAL24PC:
727fc41e 4307 if (h != NULL && h == htab->elf.hgot && htab->plt_type == PLT_UNSET)
016687f8
AM
4308 {
4309 htab->plt_type = PLT_OLD;
4310 htab->old_bfd = abfd;
4311 }
c7e17e05
AM
4312 if (h != NULL && h->type == STT_GNU_IFUNC)
4313 {
0e1862bb 4314 if (bfd_link_pic (info))
c7e17e05 4315 {
cbf95972
AM
4316 info->callbacks->einfo
4317 (_("%P: %H: @local call to ifunc %s\n"),
4318 abfd, sec, rel->r_offset,
4319 h->root.root.string);
c7e17e05
AM
4320 bfd_set_error (bfd_error_bad_value);
4321 return FALSE;
4322 }
4323 h->needs_plt = 1;
4324 if (!update_plt_info (abfd, &h->plt.plist, NULL, 0))
4325 return FALSE;
4326 }
25dbc73a 4327 break;
252b5132 4328
25dbc73a
AM
4329 /* This relocation describes the C++ object vtable hierarchy.
4330 Reconstruct it for later use during GC. */
4331 case R_PPC_GNU_VTINHERIT:
4332 if (!bfd_elf_gc_record_vtinherit (abfd, sec, h, rel->r_offset))
4333 return FALSE;
4334 break;
252b5132 4335
25dbc73a
AM
4336 /* This relocation describes which C++ vtable entries are actually
4337 used. Record for later use during GC. */
4338 case R_PPC_GNU_VTENTRY:
d17e0c6e
JB
4339 BFD_ASSERT (h != NULL);
4340 if (h != NULL
4341 && !bfd_elf_gc_record_vtentry (abfd, sec, h, rel->r_addend))
25dbc73a
AM
4342 return FALSE;
4343 break;
252b5132 4344
25dbc73a
AM
4345 /* We shouldn't really be seeing these. */
4346 case R_PPC_TPREL32:
1d483afe
AM
4347 case R_PPC_TPREL16:
4348 case R_PPC_TPREL16_LO:
4349 case R_PPC_TPREL16_HI:
4350 case R_PPC_TPREL16_HA:
0e1862bb 4351 if (bfd_link_pic (info))
25dbc73a
AM
4352 info->flags |= DF_STATIC_TLS;
4353 goto dodyn;
252b5132 4354
25dbc73a
AM
4355 /* Nor these. */
4356 case R_PPC_DTPMOD32:
4357 case R_PPC_DTPREL32:
4358 goto dodyn;
252b5132 4359
9edfd1af
AM
4360 case R_PPC_REL32:
4361 if (h == NULL
4362 && got2 != NULL
4363 && (sec->flags & SEC_CODE) != 0
0e1862bb 4364 && bfd_link_pic (info)
4a3dc543 4365 && htab->plt_type == PLT_UNSET)
9edfd1af
AM
4366 {
4367 /* Old -fPIC gcc code has .long LCTOC1-LCFx just before
4368 the start of a function, which assembles to a REL32
4369 reference to .got2. If we detect one of these, then
4370 force the old PLT layout because the linker cannot
4371 reliably deduce the GOT pointer value needed for
4372 PLT call stubs. */
4373 asection *s;
87d72d41 4374 Elf_Internal_Sym *isym;
9edfd1af 4375
87d72d41
AM
4376 isym = bfd_sym_from_r_symndx (&htab->sym_cache,
4377 abfd, r_symndx);
4378 if (isym == NULL)
4379 return FALSE;
4380
4381 s = bfd_section_from_elf_index (abfd, isym->st_shndx);
9edfd1af 4382 if (s == got2)
016687f8
AM
4383 {
4384 htab->plt_type = PLT_OLD;
4385 htab->old_bfd = abfd;
4386 }
9edfd1af 4387 }
7123df0e 4388 if (h == NULL || h == htab->elf.hgot)
fd38b44c 4389 break;
625af618
AM
4390 /* fall through */
4391
4392 case R_PPC_ADDR32:
4393 case R_PPC_ADDR16:
4394 case R_PPC_ADDR16_LO:
4395 case R_PPC_ADDR16_HI:
4396 case R_PPC_ADDR16_HA:
4397 case R_PPC_UADDR32:
4398 case R_PPC_UADDR16:
0e1862bb 4399 if (h != NULL && !bfd_link_pic (info))
625af618
AM
4400 {
4401 /* We may need a plt entry if the symbol turns out to be
4402 a function defined in a dynamic object. */
3ec01793 4403 if (!update_plt_info (abfd, &h->plt.plist, NULL, 0))
625af618
AM
4404 return FALSE;
4405
4406 /* We may need a copy reloc too. */
4407 h->non_got_ref = 1;
4408 h->pointer_equality_needed = 1;
d3e454b9
AM
4409 if (r_type == R_PPC_ADDR16_HA)
4410 ppc_elf_hash_entry (h)->has_addr16_ha = 1;
4411 if (r_type == R_PPC_ADDR16_LO)
4412 ppc_elf_hash_entry (h)->has_addr16_lo = 1;
625af618
AM
4413 }
4414 goto dodyn;
9edfd1af 4415
25dbc73a
AM
4416 case R_PPC_REL24:
4417 case R_PPC_REL14:
4418 case R_PPC_REL14_BRTAKEN:
4419 case R_PPC_REL14_BRNTAKEN:
d7128ce4 4420 if (h == NULL)
25dbc73a 4421 break;
7123df0e 4422 if (h == htab->elf.hgot)
d7128ce4 4423 {
7123df0e 4424 if (htab->plt_type == PLT_UNSET)
016687f8
AM
4425 {
4426 htab->plt_type = PLT_OLD;
4427 htab->old_bfd = abfd;
4428 }
d7128ce4
AM
4429 break;
4430 }
25dbc73a 4431 /* fall through */
ee05f2fe 4432
25dbc73a 4433 case R_PPC_ADDR24:
25dbc73a
AM
4434 case R_PPC_ADDR14:
4435 case R_PPC_ADDR14_BRTAKEN:
4436 case R_PPC_ADDR14_BRNTAKEN:
0e1862bb 4437 if (h != NULL && !bfd_link_pic (info))
25dbc73a
AM
4438 {
4439 /* We may need a plt entry if the symbol turns out to be
4440 a function defined in a dynamic object. */
e054468f 4441 h->needs_plt = 1;
de972ffa 4442 if (!update_plt_info (abfd, &h->plt.plist, NULL, 0))
a6aa5195 4443 return FALSE;
625af618 4444 break;
25dbc73a 4445 }
7619e7c7 4446
25dbc73a
AM
4447 dodyn:
4448 /* If we are creating a shared library, and this is a reloc
4449 against a global symbol, or a non PC relative reloc
4450 against a local symbol, then we need to copy the reloc
4451 into the shared library. However, if we are linking with
4452 -Bsymbolic, we do not need to copy a reloc against a
4453 global symbol which is defined in an object we are
4454 including in the link (i.e., DEF_REGULAR is set). At
4455 this point we have not seen all the input files, so it is
4456 possible that DEF_REGULAR is not set now but will be set
4457 later (it is never cleared). In case of a weak definition,
4458 DEF_REGULAR may be cleared later by a strong definition in
4459 a shared library. We account for that possibility below by
4460 storing information in the dyn_relocs field of the hash
4461 table entry. A similar situation occurs when creating
4462 shared libraries and symbol visibility changes render the
4463 symbol local.
7619e7c7 4464
25dbc73a
AM
4465 If on the other hand, we are creating an executable, we
4466 may need to keep relocations for symbols satisfied by a
4467 dynamic library if we manage to avoid copy relocs for the
4468 symbol. */
0e1862bb 4469 if ((bfd_link_pic (info)
1d483afe 4470 && (must_be_dyn_reloc (info, r_type)
25dbc73a 4471 || (h != NULL
198f1157 4472 && (!SYMBOLIC_BIND (info, h)
25dbc73a
AM
4473 || h->root.type == bfd_link_hash_defweak
4474 || !h->def_regular))))
4475 || (ELIMINATE_COPY_RELOCS
0e1862bb 4476 && !bfd_link_pic (info)
25dbc73a
AM
4477 && h != NULL
4478 && (h->root.type == bfd_link_hash_defweak
de972ffa 4479 || !h->def_regular)))
25dbc73a 4480 {
25dbc73a
AM
4481#ifdef DEBUG
4482 fprintf (stderr,
4483 "ppc_elf_check_relocs needs to "
4484 "create relocation for %s\n",
4485 (h && h->root.root.string
4486 ? h->root.root.string : "<unknown>"));
4487#endif
4488 if (sreloc == NULL)
4489 {
c9a2f333
AM
4490 if (htab->elf.dynobj == NULL)
4491 htab->elf.dynobj = abfd;
83bac4b0
NC
4492
4493 sreloc = _bfd_elf_make_dynamic_reloc_section
4494 (sec, htab->elf.dynobj, 2, abfd, /*rela?*/ TRUE);
4495
25dbc73a 4496 if (sreloc == NULL)
83bac4b0 4497 return FALSE;
25dbc73a 4498 }
7619e7c7 4499
25dbc73a
AM
4500 /* If this is a global symbol, we count the number of
4501 relocations we need for this symbol. */
4502 if (h != NULL)
4503 {
f95f8542
AM
4504 struct elf_dyn_relocs *p;
4505 struct elf_dyn_relocs **rel_head;
4506
91d6fa6a 4507 rel_head = &ppc_elf_hash_entry (h)->dyn_relocs;
f95f8542
AM
4508 p = *rel_head;
4509 if (p == NULL || p->sec != sec)
4510 {
4511 p = bfd_alloc (htab->elf.dynobj, sizeof *p);
4512 if (p == NULL)
4513 return FALSE;
4514 p->next = *rel_head;
4515 *rel_head = p;
4516 p->sec = sec;
4517 p->count = 0;
4518 p->pc_count = 0;
4519 }
4520 p->count += 1;
4521 if (!must_be_dyn_reloc (info, r_type))
4522 p->pc_count += 1;
25dbc73a
AM
4523 }
4524 else
4525 {
4526 /* Track dynamic relocs needed for local syms too.
4527 We really need local syms available to do this
4528 easily. Oh well. */
f95f8542
AM
4529 struct ppc_dyn_relocs *p;
4530 struct ppc_dyn_relocs **rel_head;
4531 bfd_boolean is_ifunc;
25dbc73a 4532 asection *s;
6edfbbad 4533 void *vpp;
87d72d41 4534 Elf_Internal_Sym *isym;
6edfbbad 4535
87d72d41
AM
4536 isym = bfd_sym_from_r_symndx (&htab->sym_cache,
4537 abfd, r_symndx);
4538 if (isym == NULL)
25dbc73a 4539 return FALSE;
7fce784e 4540
87d72d41
AM
4541 s = bfd_section_from_elf_index (abfd, isym->st_shndx);
4542 if (s == NULL)
4543 s = sec;
4544
6edfbbad 4545 vpp = &elf_section_data (s)->local_dynrel;
f95f8542
AM
4546 rel_head = (struct ppc_dyn_relocs **) vpp;
4547 is_ifunc = ELF_ST_TYPE (isym->st_info) == STT_GNU_IFUNC;
4548 p = *rel_head;
4549 if (p != NULL && p->sec == sec && p->ifunc != is_ifunc)
4550 p = p->next;
4551 if (p == NULL || p->sec != sec || p->ifunc != is_ifunc)
4552 {
4553 p = bfd_alloc (htab->elf.dynobj, sizeof *p);
4554 if (p == NULL)
4555 return FALSE;
4556 p->next = *rel_head;
4557 *rel_head = p;
4558 p->sec = sec;
4559 p->ifunc = is_ifunc;
4560 p->count = 0;
4561 }
4562 p->count += 1;
25dbc73a 4563 }
7619e7c7 4564 }
25dbc73a
AM
4565
4566 break;
7619e7c7
AM
4567 }
4568 }
ee05f2fe 4569
25dbc73a
AM
4570 return TRUE;
4571}
4572\f
34c8bcba
JM
4573
4574/* Merge object attributes from IBFD into OBFD. Raise an error if
4575 there are conflicting attributes. */
4576static bfd_boolean
4577ppc_elf_merge_obj_attributes (bfd *ibfd, bfd *obfd)
4578{
c6e65352
DJ
4579 obj_attribute *in_attr, *in_attrs;
4580 obj_attribute *out_attr, *out_attrs;
34c8bcba
JM
4581
4582 if (!elf_known_obj_attributes_proc (obfd)[0].i)
4583 {
4584 /* This is the first object. Copy the attributes. */
4585 _bfd_elf_copy_obj_attributes (ibfd, obfd);
4586
4587 /* Use the Tag_null value to indicate the attributes have been
4588 initialized. */
4589 elf_known_obj_attributes_proc (obfd)[0].i = 1;
4590
4591 return TRUE;
4592 }
4593
c6e65352
DJ
4594 in_attrs = elf_known_obj_attributes (ibfd)[OBJ_ATTR_GNU];
4595 out_attrs = elf_known_obj_attributes (obfd)[OBJ_ATTR_GNU];
4596
34c8bcba
JM
4597 /* Check for conflicting Tag_GNU_Power_ABI_FP attributes and merge
4598 non-conflicting ones. */
c6e65352
DJ
4599 in_attr = &in_attrs[Tag_GNU_Power_ABI_FP];
4600 out_attr = &out_attrs[Tag_GNU_Power_ABI_FP];
4601 if (in_attr->i != out_attr->i)
34c8bcba 4602 {
c6e65352
DJ
4603 out_attr->type = 1;
4604 if (out_attr->i == 0)
4605 out_attr->i = in_attr->i;
4606 else if (in_attr->i == 0)
34c8bcba 4607 ;
c6e65352 4608 else if (out_attr->i == 1 && in_attr->i == 2)
34c8bcba
JM
4609 _bfd_error_handler
4610 (_("Warning: %B uses hard float, %B uses soft float"), obfd, ibfd);
3c7b9897
AM
4611 else if (out_attr->i == 1 && in_attr->i == 3)
4612 _bfd_error_handler
5b914448 4613 (_("Warning: %B uses double-precision hard float, %B uses single-precision hard float"),
3c7b9897
AM
4614 obfd, ibfd);
4615 else if (out_attr->i == 3 && in_attr->i == 1)
4616 _bfd_error_handler
5b914448 4617 (_("Warning: %B uses double-precision hard float, %B uses single-precision hard float"),
3c7b9897
AM
4618 ibfd, obfd);
4619 else if (out_attr->i == 3 && in_attr->i == 2)
4620 _bfd_error_handler
5b914448 4621 (_("Warning: %B uses soft float, %B uses single-precision hard float"),
3c7b9897
AM
4622 ibfd, obfd);
4623 else if (out_attr->i == 2 && (in_attr->i == 1 || in_attr->i == 3))
34c8bcba
JM
4624 _bfd_error_handler
4625 (_("Warning: %B uses hard float, %B uses soft float"), ibfd, obfd);
3c7b9897 4626 else if (in_attr->i > 3)
34c8bcba
JM
4627 _bfd_error_handler
4628 (_("Warning: %B uses unknown floating point ABI %d"), ibfd,
c6e65352 4629 in_attr->i);
34c8bcba
JM
4630 else
4631 _bfd_error_handler
4632 (_("Warning: %B uses unknown floating point ABI %d"), obfd,
c6e65352
DJ
4633 out_attr->i);
4634 }
4635
4636 /* Check for conflicting Tag_GNU_Power_ABI_Vector attributes and
4637 merge non-conflicting ones. */
4638 in_attr = &in_attrs[Tag_GNU_Power_ABI_Vector];
4639 out_attr = &out_attrs[Tag_GNU_Power_ABI_Vector];
4640 if (in_attr->i != out_attr->i)
4641 {
4642 const char *in_abi = NULL, *out_abi = NULL;
4643
4644 switch (in_attr->i)
4645 {
4646 case 1: in_abi = "generic"; break;
4647 case 2: in_abi = "AltiVec"; break;
4648 case 3: in_abi = "SPE"; break;
4649 }
4650
4651 switch (out_attr->i)
4652 {
4653 case 1: out_abi = "generic"; break;
4654 case 2: out_abi = "AltiVec"; break;
4655 case 3: out_abi = "SPE"; break;
4656 }
4657
4658 out_attr->type = 1;
4659 if (out_attr->i == 0)
4660 out_attr->i = in_attr->i;
4661 else if (in_attr->i == 0)
4662 ;
4663 /* For now, allow generic to transition to AltiVec or SPE
4664 without a warning. If GCC marked files with their stack
4665 alignment and used don't-care markings for files which are
4666 not affected by the vector ABI, we could warn about this
4667 case too. */
4668 else if (out_attr->i == 1)
4669 out_attr->i = in_attr->i;
4670 else if (in_attr->i == 1)
4671 ;
4672 else if (in_abi == NULL)
4673 _bfd_error_handler
4674 (_("Warning: %B uses unknown vector ABI %d"), ibfd,
4675 in_attr->i);
4676 else if (out_abi == NULL)
4677 _bfd_error_handler
4678 (_("Warning: %B uses unknown vector ABI %d"), obfd,
4679 in_attr->i);
4680 else
4681 _bfd_error_handler
4682 (_("Warning: %B uses vector ABI \"%s\", %B uses \"%s\""),
4683 ibfd, obfd, in_abi, out_abi);
34c8bcba
JM
4684 }
4685
f82e0623
NF
4686 /* Check for conflicting Tag_GNU_Power_ABI_Struct_Return attributes
4687 and merge non-conflicting ones. */
4688 in_attr = &in_attrs[Tag_GNU_Power_ABI_Struct_Return];
4689 out_attr = &out_attrs[Tag_GNU_Power_ABI_Struct_Return];
4690 if (in_attr->i != out_attr->i)
4691 {
4692 out_attr->type = 1;
4693 if (out_attr->i == 0)
4694 out_attr->i = in_attr->i;
4695 else if (in_attr->i == 0)
4696 ;
4697 else if (out_attr->i == 1 && in_attr->i == 2)
4698 _bfd_error_handler
4699 (_("Warning: %B uses r3/r4 for small structure returns, %B uses memory"), obfd, ibfd);
4700 else if (out_attr->i == 2 && in_attr->i == 1)
4701 _bfd_error_handler
4702 (_("Warning: %B uses r3/r4 for small structure returns, %B uses memory"), ibfd, obfd);
4703 else if (in_attr->i > 2)
4704 _bfd_error_handler
4705 (_("Warning: %B uses unknown small structure return convention %d"), ibfd,
4706 in_attr->i);
4707 else
4708 _bfd_error_handler
4709 (_("Warning: %B uses unknown small structure return convention %d"), obfd,
4710 out_attr->i);
4711 }
4712
34c8bcba
JM
4713 /* Merge Tag_compatibility attributes and any common GNU ones. */
4714 _bfd_elf_merge_object_attributes (ibfd, obfd);
4715
4716 return TRUE;
4717}
4718
8853c3d3
AM
4719/* Merge backend specific data from an object file to the output
4720 object file when linking. */
4721
4722static bfd_boolean
4723ppc_elf_merge_private_bfd_data (bfd *ibfd, bfd *obfd)
4724{
4725 flagword old_flags;
4726 flagword new_flags;
4727 bfd_boolean error;
4728
0c8d6e5c 4729 if (!is_ppc_elf (ibfd) || !is_ppc_elf (obfd))
8853c3d3
AM
4730 return TRUE;
4731
cc643b88 4732 /* Check if we have the same endianness. */
8853c3d3
AM
4733 if (! _bfd_generic_verify_endian_match (ibfd, obfd))
4734 return FALSE;
4735
34c8bcba
JM
4736 if (!ppc_elf_merge_obj_attributes (ibfd, obfd))
4737 return FALSE;
4738
8853c3d3
AM
4739 new_flags = elf_elfheader (ibfd)->e_flags;
4740 old_flags = elf_elfheader (obfd)->e_flags;
4741 if (!elf_flags_init (obfd))
4742 {
4743 /* First call, no flags set. */
4744 elf_flags_init (obfd) = TRUE;
4745 elf_elfheader (obfd)->e_flags = new_flags;
4746 }
4747
4748 /* Compatible flags are ok. */
4749 else if (new_flags == old_flags)
4750 ;
4751
4752 /* Incompatible flags. */
4753 else
4754 {
4755 /* Warn about -mrelocatable mismatch. Allow -mrelocatable-lib
4756 to be linked with either. */
4757 error = FALSE;
4758 if ((new_flags & EF_PPC_RELOCATABLE) != 0
4759 && (old_flags & (EF_PPC_RELOCATABLE | EF_PPC_RELOCATABLE_LIB)) == 0)
4760 {
4761 error = TRUE;
4762 (*_bfd_error_handler)
4763 (_("%B: compiled with -mrelocatable and linked with "
4764 "modules compiled normally"), ibfd);
4765 }
4766 else if ((new_flags & (EF_PPC_RELOCATABLE | EF_PPC_RELOCATABLE_LIB)) == 0
4767 && (old_flags & EF_PPC_RELOCATABLE) != 0)
4768 {
4769 error = TRUE;
4770 (*_bfd_error_handler)
4771 (_("%B: compiled normally and linked with "
4772 "modules compiled with -mrelocatable"), ibfd);
4773 }
4774
4775 /* The output is -mrelocatable-lib iff both the input files are. */
4776 if (! (new_flags & EF_PPC_RELOCATABLE_LIB))
4777 elf_elfheader (obfd)->e_flags &= ~EF_PPC_RELOCATABLE_LIB;
4778
4779 /* The output is -mrelocatable iff it can't be -mrelocatable-lib,
4780 but each input file is either -mrelocatable or -mrelocatable-lib. */
4781 if (! (elf_elfheader (obfd)->e_flags & EF_PPC_RELOCATABLE_LIB)
4782 && (new_flags & (EF_PPC_RELOCATABLE_LIB | EF_PPC_RELOCATABLE))
4783 && (old_flags & (EF_PPC_RELOCATABLE_LIB | EF_PPC_RELOCATABLE)))
4784 elf_elfheader (obfd)->e_flags |= EF_PPC_RELOCATABLE;
4785
4786 /* Do not warn about eabi vs. V.4 mismatch, just or in the bit if
4787 any module uses it. */
4788 elf_elfheader (obfd)->e_flags |= (new_flags & EF_PPC_EMB);
4789
4790 new_flags &= ~(EF_PPC_RELOCATABLE | EF_PPC_RELOCATABLE_LIB | EF_PPC_EMB);
4791 old_flags &= ~(EF_PPC_RELOCATABLE | EF_PPC_RELOCATABLE_LIB | EF_PPC_EMB);
4792
4793 /* Warn about any other mismatches. */
4794 if (new_flags != old_flags)
4795 {
4796 error = TRUE;
4797 (*_bfd_error_handler)
4798 (_("%B: uses different e_flags (0x%lx) fields "
4799 "than previous modules (0x%lx)"),
4800 ibfd, (long) new_flags, (long) old_flags);
4801 }
4802
4803 if (error)
4804 {
4805 bfd_set_error (bfd_error_bad_value);
4806 return FALSE;
4807 }
4808 }
4809
4810 return TRUE;
4811}
b9c361e0
JL
4812
4813static void
86c95733
AM
4814ppc_elf_vle_split16 (bfd *output_bfd, bfd_byte *loc,
4815 bfd_vma value,
4816 split16_format_type split16_format)
b9c361e0
JL
4817
4818{
86c95733 4819 unsigned int insn, top5;
b9c361e0 4820
86c95733
AM
4821 insn = bfd_get_32 (output_bfd, loc);
4822 top5 = value & 0xf800;
4823 top5 = top5 << (split16_format == split16a_type ? 9 : 5);
b9c361e0 4824 insn |= top5;
86c95733
AM
4825 insn |= value & 0x7ff;
4826 bfd_put_32 (output_bfd, insn, loc);
b9c361e0
JL
4827}
4828
8853c3d3 4829\f
d7128ce4
AM
4830/* Choose which PLT scheme to use, and set .plt flags appropriately.
4831 Returns -1 on error, 0 for old PLT, 1 for new PLT. */
4832int
4833ppc_elf_select_plt_layout (bfd *output_bfd ATTRIBUTE_UNUSED,
5446cbdf 4834 struct bfd_link_info *info)
d7128ce4
AM
4835{
4836 struct ppc_elf_link_hash_table *htab;
9d8504b1 4837 flagword flags;
d7128ce4
AM
4838
4839 htab = ppc_elf_hash_table (info);
4a3dc543
RS
4840
4841 if (htab->plt_type == PLT_UNSET)
016687f8 4842 {
b3874e1a
AM
4843 struct elf_link_hash_entry *h;
4844
5446cbdf 4845 if (htab->params->plt_style == PLT_OLD)
016687f8 4846 htab->plt_type = PLT_OLD;
0e1862bb 4847 else if (bfd_link_pic (info)
b3874e1a
AM
4848 && htab->elf.dynamic_sections_created
4849 && (h = elf_link_hash_lookup (&htab->elf, "_mcount",
4850 FALSE, FALSE, TRUE)) != NULL
4851 && (h->type == STT_FUNC
4852 || h->needs_plt)
4853 && h->ref_regular
4854 && !(SYMBOL_CALLS_LOCAL (info, h)
4855 || (ELF_ST_VISIBILITY (h->other) != STV_DEFAULT
4856 && h->root.type == bfd_link_hash_undefweak)))
4857 {
4858 /* Profiling of shared libs (and pies) is not supported with
4859 secure plt, because ppc32 does profiling before a
4860 function prologue and a secure plt pic call stubs needs
4861 r30 to be set up. */
4862 htab->plt_type = PLT_OLD;
4863 }
016687f8
AM
4864 else
4865 {
4866 bfd *ibfd;
5446cbdf 4867 enum ppc_elf_plt_type plt_type = htab->params->plt_style;
016687f8
AM
4868
4869 /* Look through the reloc flags left by ppc_elf_check_relocs.
4870 Use the old style bss plt if a file makes plt calls
4871 without using the new relocs, and if ld isn't given
4872 --secure-plt and we never see REL16 relocs. */
4873 if (plt_type == PLT_UNSET)
4874 plt_type = PLT_OLD;
c72f2fb2 4875 for (ibfd = info->input_bfds; ibfd; ibfd = ibfd->link.next)
0c8d6e5c 4876 if (is_ppc_elf (ibfd))
016687f8
AM
4877 {
4878 if (ppc_elf_tdata (ibfd)->has_rel16)
4879 plt_type = PLT_NEW;
4880 else if (ppc_elf_tdata (ibfd)->makes_plt_call)
4881 {
4882 plt_type = PLT_OLD;
4883 htab->old_bfd = ibfd;
4884 break;
4885 }
4886 }
4887 htab->plt_type = plt_type;
4888 }
4889 }
5446cbdf 4890 if (htab->plt_type == PLT_OLD && htab->params->plt_style == PLT_NEW)
b3874e1a
AM
4891 {
4892 if (htab->old_bfd != NULL)
4893 info->callbacks->einfo (_("%P: bss-plt forced due to %B\n"),
4894 htab->old_bfd);
4895 else
4896 info->callbacks->einfo (_("%P: bss-plt forced by profiling\n"));
4897 }
d7128ce4 4898
4a3dc543 4899 BFD_ASSERT (htab->plt_type != PLT_VXWORKS);
9d8504b1 4900
4a3dc543 4901 if (htab->plt_type == PLT_NEW)
9d8504b1
PB
4902 {
4903 flags = (SEC_ALLOC | SEC_LOAD | SEC_HAS_CONTENTS
4904 | SEC_IN_MEMORY | SEC_LINKER_CREATED);
86b9da88
AM
4905
4906 /* The new PLT is a loaded section. */
4907 if (htab->plt != NULL
4908 && !bfd_set_section_flags (htab->elf.dynobj, htab->plt, flags))
4909 return -1;
4910
4911 /* The new GOT is not executable. */
4912 if (htab->got != NULL
4913 && !bfd_set_section_flags (htab->elf.dynobj, htab->got, flags))
4914 return -1;
d7128ce4
AM
4915 }
4916 else
4917 {
4918 /* Stop an unused .glink section from affecting .text alignment. */
86b9da88
AM
4919 if (htab->glink != NULL
4920 && !bfd_set_section_alignment (htab->elf.dynobj, htab->glink, 0))
4921 return -1;
d7128ce4 4922 }
4a3dc543 4923 return htab->plt_type == PLT_NEW;
d7128ce4
AM
4924}
4925\f
25dbc73a
AM
4926/* Return the section that should be marked against GC for a given
4927 relocation. */
586119b3 4928
25dbc73a
AM
4929static asection *
4930ppc_elf_gc_mark_hook (asection *sec,
07adf181 4931 struct bfd_link_info *info,
25dbc73a
AM
4932 Elf_Internal_Rela *rel,
4933 struct elf_link_hash_entry *h,
4934 Elf_Internal_Sym *sym)
4935{
4936 if (h != NULL)
07adf181
AM
4937 switch (ELF32_R_TYPE (rel->r_info))
4938 {
4939 case R_PPC_GNU_VTINHERIT:
4940 case R_PPC_GNU_VTENTRY:
4941 return NULL;
4942 }
4943
4944 return _bfd_elf_gc_mark_hook (sec, info, rel, h, sym);
25dbc73a 4945}
a876ecf9 4946
25dbc73a
AM
4947/* Update the got, plt and dynamic reloc reference counts for the
4948 section being removed. */
4949
4950static bfd_boolean
4951ppc_elf_gc_sweep_hook (bfd *abfd,
4952 struct bfd_link_info *info,
4953 asection *sec,
4954 const Elf_Internal_Rela *relocs)
4955{
4956 struct ppc_elf_link_hash_table *htab;
4957 Elf_Internal_Shdr *symtab_hdr;
4958 struct elf_link_hash_entry **sym_hashes;
4959 bfd_signed_vma *local_got_refcounts;
4960 const Elf_Internal_Rela *rel, *relend;
a6aa5195 4961 asection *got2;
25dbc73a 4962
0e1862bb 4963 if (bfd_link_relocatable (info))
7dda2462
TG
4964 return TRUE;
4965
c87b5a93
AM
4966 if ((sec->flags & SEC_ALLOC) == 0)
4967 return TRUE;
4968
25dbc73a
AM
4969 elf_section_data (sec)->local_dynrel = NULL;
4970
4971 htab = ppc_elf_hash_table (info);
0ffa91dd 4972 symtab_hdr = &elf_symtab_hdr (abfd);
25dbc73a
AM
4973 sym_hashes = elf_sym_hashes (abfd);
4974 local_got_refcounts = elf_local_got_refcounts (abfd);
a6aa5195 4975 got2 = bfd_get_section_by_name (abfd, ".got2");
25dbc73a
AM
4976
4977 relend = relocs + sec->reloc_count;
4978 for (rel = relocs; rel < relend; rel++)
4979 {
4980 unsigned long r_symndx;
4981 enum elf_ppc_reloc_type r_type;
4982 struct elf_link_hash_entry *h = NULL;
4983
4984 r_symndx = ELF32_R_SYM (rel->r_info);
4985 if (r_symndx >= symtab_hdr->sh_info)
a876ecf9 4986 {
6061a67d 4987 struct elf_dyn_relocs **pp, *p;
25dbc73a
AM
4988 struct ppc_elf_link_hash_entry *eh;
4989
4990 h = sym_hashes[r_symndx - symtab_hdr->sh_info];
4991 while (h->root.type == bfd_link_hash_indirect
4992 || h->root.type == bfd_link_hash_warning)
4993 h = (struct elf_link_hash_entry *) h->root.u.i.link;
4994 eh = (struct ppc_elf_link_hash_entry *) h;
4995
4996 for (pp = &eh->dyn_relocs; (p = *pp) != NULL; pp = &p->next)
4997 if (p->sec == sec)
4998 {
4999 /* Everything must go for SEC. */
5000 *pp = p->next;
5001 break;
5002 }
a876ecf9 5003 }
ee05f2fe 5004
25dbc73a 5005 r_type = ELF32_R_TYPE (rel->r_info);
de972ffa
AM
5006 if (!htab->is_vxworks
5007 && h == NULL
5008 && local_got_refcounts != NULL
0e1862bb 5009 && (!bfd_link_pic (info)
de972ffa 5010 || is_branch_reloc (r_type)))
e054468f 5011 {
de972ffa
AM
5012 struct plt_entry **local_plt = (struct plt_entry **)
5013 (local_got_refcounts + symtab_hdr->sh_info);
5014 char *local_got_tls_masks = (char *)
5015 (local_plt + symtab_hdr->sh_info);
5016 if ((local_got_tls_masks[r_symndx] & PLT_IFUNC) != 0)
e054468f 5017 {
de972ffa 5018 struct plt_entry **ifunc = local_plt + r_symndx;
a877a2b6
AM
5019 bfd_vma addend = 0;
5020 struct plt_entry *ent;
5021
0e1862bb 5022 if (r_type == R_PPC_PLTREL24 && bfd_link_pic (info))
a877a2b6
AM
5023 addend = rel->r_addend;
5024 ent = find_plt_ent (ifunc, got2, addend);
e054468f
AM
5025 if (ent->plt.refcount > 0)
5026 ent->plt.refcount -= 1;
5027 continue;
5028 }
5029 }
5030
25dbc73a 5031 switch (r_type)
ee05f2fe 5032 {
25dbc73a
AM
5033 case R_PPC_GOT_TLSLD16:
5034 case R_PPC_GOT_TLSLD16_LO:
5035 case R_PPC_GOT_TLSLD16_HI:
5036 case R_PPC_GOT_TLSLD16_HA:
25dbc73a
AM
5037 case R_PPC_GOT_TLSGD16:
5038 case R_PPC_GOT_TLSGD16_LO:
5039 case R_PPC_GOT_TLSGD16_HI:
5040 case R_PPC_GOT_TLSGD16_HA:
5041 case R_PPC_GOT_TPREL16:
5042 case R_PPC_GOT_TPREL16_LO:
5043 case R_PPC_GOT_TPREL16_HI:
5044 case R_PPC_GOT_TPREL16_HA:
5045 case R_PPC_GOT_DTPREL16:
5046 case R_PPC_GOT_DTPREL16_LO:
5047 case R_PPC_GOT_DTPREL16_HI:
5048 case R_PPC_GOT_DTPREL16_HA:
5049 case R_PPC_GOT16:
5050 case R_PPC_GOT16_LO:
5051 case R_PPC_GOT16_HI:
5052 case R_PPC_GOT16_HA:
5053 if (h != NULL)
ee05f2fe 5054 {
25dbc73a
AM
5055 if (h->got.refcount > 0)
5056 h->got.refcount--;
0e1862bb 5057 if (!bfd_link_pic (info))
91e21fb7
AM
5058 {
5059 struct plt_entry *ent;
5060
5061 ent = find_plt_ent (&h->plt.plist, NULL, 0);
32af9f6e 5062 if (ent != NULL && ent->plt.refcount > 0)
91e21fb7
AM
5063 ent->plt.refcount -= 1;
5064 }
ee05f2fe 5065 }
25dbc73a
AM
5066 else if (local_got_refcounts != NULL)
5067 {
5068 if (local_got_refcounts[r_symndx] > 0)
5069 local_got_refcounts[r_symndx]--;
5070 }
5071 break;
ee05f2fe 5072
25dbc73a
AM
5073 case R_PPC_REL24:
5074 case R_PPC_REL14:
5075 case R_PPC_REL14_BRTAKEN:
5076 case R_PPC_REL14_BRNTAKEN:
5077 case R_PPC_REL32:
3b36f7e6 5078 if (h == NULL || h == htab->elf.hgot)
25dbc73a
AM
5079 break;
5080 /* Fall thru */
ee05f2fe 5081
25dbc73a
AM
5082 case R_PPC_ADDR32:
5083 case R_PPC_ADDR24:
5084 case R_PPC_ADDR16:
5085 case R_PPC_ADDR16_LO:
5086 case R_PPC_ADDR16_HI:
5087 case R_PPC_ADDR16_HA:
5088 case R_PPC_ADDR14:
5089 case R_PPC_ADDR14_BRTAKEN:
5090 case R_PPC_ADDR14_BRNTAKEN:
5091 case R_PPC_UADDR32:
5092 case R_PPC_UADDR16:
0e1862bb 5093 if (bfd_link_pic (info))
87538722
AM
5094 break;
5095
25dbc73a
AM
5096 case R_PPC_PLT32:
5097 case R_PPC_PLTREL24:
87538722 5098 case R_PPC_PLTREL32:
25dbc73a
AM
5099 case R_PPC_PLT16_LO:
5100 case R_PPC_PLT16_HI:
5101 case R_PPC_PLT16_HA:
5102 if (h != NULL)
5103 {
a877a2b6
AM
5104 bfd_vma addend = 0;
5105 struct plt_entry *ent;
5106
0e1862bb 5107 if (r_type == R_PPC_PLTREL24 && bfd_link_pic (info))
a877a2b6
AM
5108 addend = rel->r_addend;
5109 ent = find_plt_ent (&h->plt.plist, got2, addend);
32af9f6e 5110 if (ent != NULL && ent->plt.refcount > 0)
a6aa5195 5111 ent->plt.refcount -= 1;
25dbc73a
AM
5112 }
5113 break;
ee05f2fe 5114
25dbc73a
AM
5115 default:
5116 break;
5117 }
7fce784e 5118 }
7fce784e
AS
5119 return TRUE;
5120}
25dbc73a 5121\f
3a71aa26
AM
5122/* Set plt output section type, htab->tls_get_addr, and call the
5123 generic ELF tls_setup function. */
7fce784e 5124
25dbc73a 5125asection *
5446cbdf 5126ppc_elf_tls_setup (bfd *obfd, struct bfd_link_info *info)
7fce784e 5127{
25dbc73a 5128 struct ppc_elf_link_hash_table *htab;
7fce784e 5129
25dbc73a 5130 htab = ppc_elf_hash_table (info);
a7f2871e
AM
5131 htab->tls_get_addr = elf_link_hash_lookup (&htab->elf, "__tls_get_addr",
5132 FALSE, FALSE, TRUE);
f01f1741
AM
5133 if (htab->plt_type != PLT_NEW)
5134 htab->params->no_tls_get_addr_opt = TRUE;
5135
5446cbdf 5136 if (!htab->params->no_tls_get_addr_opt)
a7f2871e
AM
5137 {
5138 struct elf_link_hash_entry *opt, *tga;
5139 opt = elf_link_hash_lookup (&htab->elf, "__tls_get_addr_opt",
5140 FALSE, FALSE, TRUE);
5141 if (opt != NULL
5142 && (opt->root.type == bfd_link_hash_defined
5143 || opt->root.type == bfd_link_hash_defweak))
5144 {
5145 /* If glibc supports an optimized __tls_get_addr call stub,
5146 signalled by the presence of __tls_get_addr_opt, and we'll
5147 be calling __tls_get_addr via a plt call stub, then
5148 make __tls_get_addr point to __tls_get_addr_opt. */
5149 tga = htab->tls_get_addr;
5150 if (htab->elf.dynamic_sections_created
5151 && tga != NULL
5152 && (tga->type == STT_FUNC
5153 || tga->needs_plt)
5154 && !(SYMBOL_CALLS_LOCAL (info, tga)
5155 || (ELF_ST_VISIBILITY (tga->other) != STV_DEFAULT
5156 && tga->root.type == bfd_link_hash_undefweak)))
5157 {
5158 struct plt_entry *ent;
32af9f6e
AM
5159 for (ent = tga->plt.plist; ent != NULL; ent = ent->next)
5160 if (ent->plt.refcount > 0)
5161 break;
5162 if (ent != NULL)
a7f2871e
AM
5163 {
5164 tga->root.type = bfd_link_hash_indirect;
5165 tga->root.u.i.link = &opt->root;
5166 ppc_elf_copy_indirect_symbol (info, opt, tga);
3bd43ebc 5167 opt->forced_local = 0;
a7f2871e
AM
5168 if (opt->dynindx != -1)
5169 {
5170 /* Use __tls_get_addr_opt in dynamic relocations. */
5171 opt->dynindx = -1;
5172 _bfd_elf_strtab_delref (elf_hash_table (info)->dynstr,
5173 opt->dynstr_index);
5174 if (!bfd_elf_link_record_dynamic_symbol (info, opt))
5175 return FALSE;
5176 }
5177 htab->tls_get_addr = opt;
5178 }
5179 }
5180 }
5181 else
5446cbdf 5182 htab->params->no_tls_get_addr_opt = TRUE;
a7f2871e 5183 }
4a3dc543 5184 if (htab->plt_type == PLT_NEW
d7128ce4
AM
5185 && htab->plt != NULL
5186 && htab->plt->output_section != NULL)
5187 {
5188 elf_section_type (htab->plt->output_section) = SHT_PROGBITS;
5189 elf_section_flags (htab->plt->output_section) = SHF_ALLOC + SHF_WRITE;
5190 }
5191
25dbc73a 5192 return _bfd_elf_tls_setup (obfd, info);
7fce784e
AS
5193}
5194
3a71aa26
AM
5195/* Return TRUE iff REL is a branch reloc with a global symbol matching
5196 HASH. */
5197
5198static bfd_boolean
5199branch_reloc_hash_match (const bfd *ibfd,
5200 const Elf_Internal_Rela *rel,
5201 const struct elf_link_hash_entry *hash)
5202{
5203 Elf_Internal_Shdr *symtab_hdr = &elf_symtab_hdr (ibfd);
5204 enum elf_ppc_reloc_type r_type = ELF32_R_TYPE (rel->r_info);
5205 unsigned int r_symndx = ELF32_R_SYM (rel->r_info);
5206
e054468f 5207 if (r_symndx >= symtab_hdr->sh_info && is_branch_reloc (r_type))
3a71aa26
AM
5208 {
5209 struct elf_link_hash_entry **sym_hashes = elf_sym_hashes (ibfd);
5210 struct elf_link_hash_entry *h;
5211
5212 h = sym_hashes[r_symndx - symtab_hdr->sh_info];
5213 while (h->root.type == bfd_link_hash_indirect
5214 || h->root.type == bfd_link_hash_warning)
5215 h = (struct elf_link_hash_entry *) h->root.u.i.link;
5216 if (h == hash)
5217 return TRUE;
5218 }
5219 return FALSE;
5220}
5221
25dbc73a
AM
5222/* Run through all the TLS relocs looking for optimization
5223 opportunities. */
252b5132 5224
25dbc73a
AM
5225bfd_boolean
5226ppc_elf_tls_optimize (bfd *obfd ATTRIBUTE_UNUSED,
5227 struct bfd_link_info *info)
252b5132 5228{
7fce784e 5229 bfd *ibfd;
25dbc73a
AM
5230 asection *sec;
5231 struct ppc_elf_link_hash_table *htab;
b7fcf6f6 5232 int pass;
252b5132 5233
3cbc1e5e 5234 if (!bfd_link_executable (info))
25dbc73a 5235 return TRUE;
252b5132 5236
7619e7c7 5237 htab = ppc_elf_hash_table (info);
663a1470
AM
5238 if (htab == NULL)
5239 return FALSE;
5240
b7fcf6f6
AM
5241 /* Make two passes through the relocs. First time check that tls
5242 relocs involved in setting up a tls_get_addr call are indeed
663a1470
AM
5243 followed by such a call. If they are not, don't do any tls
5244 optimization. On the second pass twiddle tls_mask flags to
5245 notify relocate_section that optimization can be done, and
5246 adjust got and plt refcounts. */
b7fcf6f6 5247 for (pass = 0; pass < 2; ++pass)
c72f2fb2 5248 for (ibfd = info->input_bfds; ibfd != NULL; ibfd = ibfd->link.next)
b7fcf6f6
AM
5249 {
5250 Elf_Internal_Sym *locsyms = NULL;
0ffa91dd 5251 Elf_Internal_Shdr *symtab_hdr = &elf_symtab_hdr (ibfd);
32af9f6e 5252 asection *got2 = bfd_get_section_by_name (ibfd, ".got2");
7619e7c7 5253
b7fcf6f6
AM
5254 for (sec = ibfd->sections; sec != NULL; sec = sec->next)
5255 if (sec->has_tls_reloc && !bfd_is_abs_section (sec->output_section))
5256 {
5257 Elf_Internal_Rela *relstart, *rel, *relend;
663a1470 5258 int expecting_tls_get_addr = 0;
252b5132 5259
b7fcf6f6
AM
5260 /* Read the relocations. */
5261 relstart = _bfd_elf_link_read_relocs (ibfd, sec, NULL, NULL,
5262 info->keep_memory);
5263 if (relstart == NULL)
5264 return FALSE;
7619e7c7 5265
b7fcf6f6
AM
5266 relend = relstart + sec->reloc_count;
5267 for (rel = relstart; rel < relend; rel++)
5268 {
5269 enum elf_ppc_reloc_type r_type;
5270 unsigned long r_symndx;
5271 struct elf_link_hash_entry *h = NULL;
5272 char *tls_mask;
5273 char tls_set, tls_clear;
5274 bfd_boolean is_local;
b7fcf6f6
AM
5275 bfd_signed_vma *got_count;
5276
5277 r_symndx = ELF32_R_SYM (rel->r_info);
5278 if (r_symndx >= symtab_hdr->sh_info)
5279 {
5280 struct elf_link_hash_entry **sym_hashes;
7fce784e 5281
b7fcf6f6
AM
5282 sym_hashes = elf_sym_hashes (ibfd);
5283 h = sym_hashes[r_symndx - symtab_hdr->sh_info];
5284 while (h->root.type == bfd_link_hash_indirect
5285 || h->root.type == bfd_link_hash_warning)
5286 h = (struct elf_link_hash_entry *) h->root.u.i.link;
5287 }
7619e7c7 5288
b7fcf6f6
AM
5289 is_local = FALSE;
5290 if (h == NULL
5291 || !h->def_dynamic)
5292 is_local = TRUE;
7619e7c7 5293
b7fcf6f6 5294 r_type = ELF32_R_TYPE (rel->r_info);
663a1470
AM
5295 /* If this section has old-style __tls_get_addr calls
5296 without marker relocs, then check that each
5297 __tls_get_addr call reloc is preceded by a reloc
5298 that conceivably belongs to the __tls_get_addr arg
5299 setup insn. If we don't find matching arg setup
5300 relocs, don't do any tls optimization. */
5301 if (pass == 0
5302 && sec->has_tls_get_addr_call
5303 && h != NULL
5304 && h == htab->tls_get_addr
5305 && !expecting_tls_get_addr
5306 && is_branch_reloc (r_type))
5307 {
25f53a85 5308 info->callbacks->minfo ("%H __tls_get_addr lost arg, "
663a1470
AM
5309 "TLS optimization disabled\n",
5310 ibfd, sec, rel->r_offset);
5311 if (elf_section_data (sec)->relocs != relstart)
5312 free (relstart);
5313 return TRUE;
5314 }
5315
5316 expecting_tls_get_addr = 0;
b7fcf6f6
AM
5317 switch (r_type)
5318 {
5319 case R_PPC_GOT_TLSLD16:
5320 case R_PPC_GOT_TLSLD16_LO:
5321 expecting_tls_get_addr = 1;
5322 /* Fall thru */
5323
5324 case R_PPC_GOT_TLSLD16_HI:
5325 case R_PPC_GOT_TLSLD16_HA:
5326 /* These relocs should never be against a symbol
5327 defined in a shared lib. Leave them alone if
5328 that turns out to be the case. */
5329 if (!is_local)
5330 continue;
5331
5332 /* LD -> LE */
5333 tls_set = 0;
5334 tls_clear = TLS_LD;
5335 break;
5336
5337 case R_PPC_GOT_TLSGD16:
5338 case R_PPC_GOT_TLSGD16_LO:
5339 expecting_tls_get_addr = 1;
5340 /* Fall thru */
5341
5342 case R_PPC_GOT_TLSGD16_HI:
5343 case R_PPC_GOT_TLSGD16_HA:
5344 if (is_local)
5345 /* GD -> LE */
5346 tls_set = 0;
5347 else
5348 /* GD -> IE */
5349 tls_set = TLS_TLS | TLS_TPRELGD;
5350 tls_clear = TLS_GD;
5351 break;
5352
5353 case R_PPC_GOT_TPREL16:
5354 case R_PPC_GOT_TPREL16_LO:
5355 case R_PPC_GOT_TPREL16_HI:
5356 case R_PPC_GOT_TPREL16_HA:
5357 if (is_local)
5358 {
5359 /* IE -> LE */
5360 tls_set = 0;
5361 tls_clear = TLS_TPREL;
5362 break;
5363 }
5364 else
5365 continue;
5366
32af9f6e
AM
5367 case R_PPC_TLSGD:
5368 case R_PPC_TLSLD:
5369 expecting_tls_get_addr = 2;
5370 tls_set = 0;
5371 tls_clear = 0;
5372 break;
5373
b7fcf6f6 5374 default:
25dbc73a 5375 continue;
b7fcf6f6 5376 }
25dbc73a 5377
b7fcf6f6
AM
5378 if (pass == 0)
5379 {
727fc41e 5380 if (!expecting_tls_get_addr
32af9f6e
AM
5381 || (expecting_tls_get_addr == 1
5382 && !sec->has_tls_get_addr_call))
b7fcf6f6 5383 continue;
25dbc73a 5384
3a71aa26
AM
5385 if (rel + 1 < relend
5386 && branch_reloc_hash_match (ibfd, rel + 1,
5387 htab->tls_get_addr))
5388 continue;
25dbc73a 5389
b7fcf6f6
AM
5390 /* Uh oh, we didn't find the expected call. We
5391 could just mark this symbol to exclude it
5392 from tls optimization but it's safer to skip
663a1470 5393 the entire optimization. */
25f53a85 5394 info->callbacks->minfo (_("%H arg lost __tls_get_addr, "
663a1470
AM
5395 "TLS optimization disabled\n"),
5396 ibfd, sec, rel->r_offset);
5397 if (elf_section_data (sec)->relocs != relstart)
5398 free (relstart);
5399 return TRUE;
b7fcf6f6 5400 }
25dbc73a 5401
32af9f6e
AM
5402 if (expecting_tls_get_addr)
5403 {
5404 struct plt_entry *ent;
5405 bfd_vma addend = 0;
5406
0e1862bb 5407 if (bfd_link_pic (info)
32af9f6e
AM
5408 && ELF32_R_TYPE (rel[1].r_info) == R_PPC_PLTREL24)
5409 addend = rel[1].r_addend;
5410 ent = find_plt_ent (&htab->tls_get_addr->plt.plist,
5411 got2, addend);
5412 if (ent != NULL && ent->plt.refcount > 0)
5413 ent->plt.refcount -= 1;
5414
5415 if (expecting_tls_get_addr == 2)
5416 continue;
5417 }
5418
b7fcf6f6
AM
5419 if (h != NULL)
5420 {
5421 tls_mask = &ppc_elf_hash_entry (h)->tls_mask;
5422 got_count = &h->got.refcount;
5423 }
5424 else
5425 {
b7fcf6f6 5426 bfd_signed_vma *lgot_refs;
e054468f 5427 struct plt_entry **local_plt;
b7fcf6f6 5428 char *lgot_masks;
25dbc73a 5429
b7fcf6f6
AM
5430 if (locsyms == NULL)
5431 {
5432 locsyms = (Elf_Internal_Sym *) symtab_hdr->contents;
5433 if (locsyms == NULL)
5434 locsyms = bfd_elf_get_elf_syms (ibfd, symtab_hdr,
5435 symtab_hdr->sh_info,
5436 0, NULL, NULL, NULL);
5437 if (locsyms == NULL)
5438 {
5439 if (elf_section_data (sec)->relocs != relstart)
5440 free (relstart);
5441 return FALSE;
5442 }
5443 }
b7fcf6f6
AM
5444 lgot_refs = elf_local_got_refcounts (ibfd);
5445 if (lgot_refs == NULL)
5446 abort ();
e054468f
AM
5447 local_plt = (struct plt_entry **)
5448 (lgot_refs + symtab_hdr->sh_info);
5449 lgot_masks = (char *) (local_plt + symtab_hdr->sh_info);
b7fcf6f6
AM
5450 tls_mask = &lgot_masks[r_symndx];
5451 got_count = &lgot_refs[r_symndx];
5452 }
25dbc73a 5453
b7fcf6f6
AM
5454 if (tls_set == 0)
5455 {
5456 /* We managed to get rid of a got entry. */
5457 if (*got_count > 0)
5458 *got_count -= 1;
5459 }
25dbc73a 5460
b7fcf6f6
AM
5461 *tls_mask |= tls_set;
5462 *tls_mask &= ~tls_clear;
5463 }
25dbc73a 5464
b7fcf6f6
AM
5465 if (elf_section_data (sec)->relocs != relstart)
5466 free (relstart);
5467 }
5468
5469 if (locsyms != NULL
5470 && (symtab_hdr->contents != (unsigned char *) locsyms))
5471 {
5472 if (!info->keep_memory)
5473 free (locsyms);
5474 else
5475 symtab_hdr->contents = (unsigned char *) locsyms;
5476 }
5477 }
25dbc73a
AM
5478 return TRUE;
5479}
5480\f
625af618
AM
5481/* Return true if we have dynamic relocs that apply to read-only sections. */
5482
5483static bfd_boolean
5484readonly_dynrelocs (struct elf_link_hash_entry *h)
5485{
6061a67d 5486 struct elf_dyn_relocs *p;
625af618
AM
5487
5488 for (p = ppc_elf_hash_entry (h)->dyn_relocs; p != NULL; p = p->next)
5489 {
5490 asection *s = p->sec->output_section;
5491
5492 if (s != NULL
5493 && ((s->flags & (SEC_READONLY | SEC_ALLOC))
5494 == (SEC_READONLY | SEC_ALLOC)))
5495 return TRUE;
5496 }
5497 return FALSE;
5498}
5499
25dbc73a
AM
5500/* Adjust a symbol defined by a dynamic object and referenced by a
5501 regular object. The current definition is in some section of the
5502 dynamic object, but we're not including those sections. We have to
5503 change the definition to something the rest of the link can
5504 understand. */
7fce784e 5505
25dbc73a
AM
5506static bfd_boolean
5507ppc_elf_adjust_dynamic_symbol (struct bfd_link_info *info,
5508 struct elf_link_hash_entry *h)
5509{
5510 struct ppc_elf_link_hash_table *htab;
5511 asection *s;
7fce784e 5512
25dbc73a
AM
5513#ifdef DEBUG
5514 fprintf (stderr, "ppc_elf_adjust_dynamic_symbol called for %s\n",
5515 h->root.root.string);
5516#endif
252b5132 5517
25dbc73a
AM
5518 /* Make sure we know what is going on here. */
5519 htab = ppc_elf_hash_table (info);
5520 BFD_ASSERT (htab->elf.dynobj != NULL
5521 && (h->needs_plt
91e21fb7 5522 || h->type == STT_GNU_IFUNC
25dbc73a
AM
5523 || h->u.weakdef != NULL
5524 || (h->def_dynamic
5525 && h->ref_regular
5526 && !h->def_regular)));
252b5132 5527
25dbc73a
AM
5528 /* Deal with function syms. */
5529 if (h->type == STT_FUNC
e054468f 5530 || h->type == STT_GNU_IFUNC
25dbc73a
AM
5531 || h->needs_plt)
5532 {
5533 /* Clear procedure linkage table information for any symbol that
5534 won't need a .plt entry. */
a6aa5195
AM
5535 struct plt_entry *ent;
5536 for (ent = h->plt.plist; ent != NULL; ent = ent->next)
5537 if (ent->plt.refcount > 0)
5538 break;
5539 if (ent == NULL
e054468f
AM
5540 || (h->type != STT_GNU_IFUNC
5541 && (SYMBOL_CALLS_LOCAL (info, h)
5542 || (ELF_ST_VISIBILITY (h->other) != STV_DEFAULT
5543 && h->root.type == bfd_link_hash_undefweak))))
252b5132 5544 {
25dbc73a 5545 /* A PLT entry is not required/allowed when:
252b5132 5546
25dbc73a
AM
5547 1. We are not using ld.so; because then the PLT entry
5548 can't be set up, so we can't use one. In this case,
5549 ppc_elf_adjust_dynamic_symbol won't even be called.
252b5132 5550
25dbc73a
AM
5551 2. GC has rendered the entry unused.
5552
5553 3. We know for certain that a call to this symbol
5554 will go to this object, or will remain undefined. */
a6aa5195 5555 h->plt.plist = NULL;
25dbc73a 5556 h->needs_plt = 0;
d1eca1e4 5557 h->pointer_equality_needed = 0;
25dbc73a 5558 }
625af618
AM
5559 else
5560 {
d1eca1e4
AM
5561 /* Taking a function's address in a read/write section
5562 doesn't require us to define the function symbol in the
1009ef28 5563 executable on a plt call stub. A dynamic reloc can
d1eca1e4
AM
5564 be used instead. */
5565 if (h->pointer_equality_needed
1009ef28
AM
5566 && h->type != STT_GNU_IFUNC
5567 && !htab->is_vxworks
5568 && !ppc_elf_hash_entry (h)->has_sda_refs
d1eca1e4
AM
5569 && !readonly_dynrelocs (h))
5570 {
5571 h->pointer_equality_needed = 0;
5572 h->non_got_ref = 0;
5573 }
5574
25f23106
AM
5575 /* After adjust_dynamic_symbol, non_got_ref set in the
5576 non-shared case means that we have allocated space in
5577 .dynbss for the symbol and thus dyn_relocs for this
5578 symbol should be discarded.
625af618
AM
5579 If we get here we know we are making a PLT entry for this
5580 symbol, and in an executable we'd normally resolve
5581 relocations against this symbol to the PLT entry. Allow
5582 dynamic relocs if the reference is weak, and the dynamic
5583 relocs will not cause text relocation. */
d1eca1e4
AM
5584 else if (!h->ref_regular_nonweak
5585 && h->non_got_ref
5586 && h->type != STT_GNU_IFUNC
5587 && !htab->is_vxworks
5588 && !ppc_elf_hash_entry (h)->has_sda_refs
5589 && !readonly_dynrelocs (h))
625af618
AM
5590 h->non_got_ref = 0;
5591 }
d3e454b9 5592 h->protected_def = 0;
25dbc73a 5593 return TRUE;
252b5132 5594 }
25dbc73a 5595 else
a6aa5195 5596 h->plt.plist = NULL;
252b5132 5597
25dbc73a
AM
5598 /* If this is a weak symbol, and there is a real definition, the
5599 processor independent code will have arranged for us to see the
5600 real definition first, and we can just use the same value. */
5601 if (h->u.weakdef != NULL)
252b5132 5602 {
25dbc73a
AM
5603 BFD_ASSERT (h->u.weakdef->root.type == bfd_link_hash_defined
5604 || h->u.weakdef->root.type == bfd_link_hash_defweak);
5605 h->root.u.def.section = h->u.weakdef->root.u.def.section;
5606 h->root.u.def.value = h->u.weakdef->root.u.def.value;
5607 if (ELIMINATE_COPY_RELOCS)
5608 h->non_got_ref = h->u.weakdef->non_got_ref;
5609 return TRUE;
5610 }
dc810e39 5611
25dbc73a
AM
5612 /* This is a reference to a symbol defined by a dynamic object which
5613 is not a function. */
252b5132 5614
25dbc73a
AM
5615 /* If we are creating a shared library, we must presume that the
5616 only references to the symbol are via the global offset table.
5617 For such cases we need not do anything here; the relocations will
5618 be handled correctly by relocate_section. */
0e1862bb 5619 if (bfd_link_pic (info))
d3e454b9
AM
5620 {
5621 h->protected_def = 0;
5622 return TRUE;
5623 }
252b5132 5624
25dbc73a
AM
5625 /* If there are no references to this symbol that do not use the
5626 GOT, we don't need to generate a copy reloc. */
5627 if (!h->non_got_ref)
d3e454b9
AM
5628 {
5629 h->protected_def = 0;
5630 return TRUE;
5631 }
5632
5633 /* Protected variables do not work with .dynbss. The copy in
5634 .dynbss won't be used by the shared library with the protected
5635 definition for the variable. Editing to PIC, or text relocations
5636 are preferable to an incorrect program. */
5637 if (h->protected_def)
5638 {
5639 if (ELIMINATE_COPY_RELOCS
5640 && ppc_elf_hash_entry (h)->has_addr16_ha
5641 && ppc_elf_hash_entry (h)->has_addr16_lo
5642 && htab->params->pic_fixup == 0
5643 && info->disable_target_specific_optimizations <= 1)
5644 htab->params->pic_fixup = 1;
5645 h->non_got_ref = 0;
5646 return TRUE;
5647 }
25dbc73a 5648
a127494f
AM
5649 /* If -z nocopyreloc was given, we won't generate them either. */
5650 if (info->nocopyreloc)
5651 {
5652 h->non_got_ref = 0;
5653 return TRUE;
5654 }
5655
cfd2c773
NS
5656 /* If we didn't find any dynamic relocs in read-only sections, then
5657 we'll be keeping the dynamic relocs and avoiding the copy reloc.
5658 We can't do this if there are any small data relocations. This
5659 doesn't work on VxWorks, where we can not have dynamic
5660 relocations (other than copy and jump slot relocations) in an
5661 executable. */
4dc4a9a5 5662 if (ELIMINATE_COPY_RELOCS
cfd2c773 5663 && !ppc_elf_hash_entry (h)->has_sda_refs
625af618
AM
5664 && !htab->is_vxworks
5665 && !h->def_regular
5666 && !readonly_dynrelocs (h))
25dbc73a 5667 {
625af618
AM
5668 h->non_got_ref = 0;
5669 return TRUE;
252b5132
RH
5670 }
5671
25dbc73a
AM
5672 /* We must allocate the symbol in our .dynbss section, which will
5673 become part of the .bss section of the executable. There will be
5674 an entry for this symbol in the .dynsym section. The dynamic
5675 object will contain position independent code, so all references
5676 from the dynamic object to this symbol will go through the global
5677 offset table. The dynamic linker will use the .dynsym entry to
5678 determine the address it must put in the global offset table, so
5679 both the dynamic object and the regular object will refer to the
5680 same memory location for the variable.
5681
4dc4a9a5
DJ
5682 Of course, if the symbol is referenced using SDAREL relocs, we
5683 must instead allocate it in .sbss. */
25dbc73a 5684
4dc4a9a5 5685 if (ppc_elf_hash_entry (h)->has_sda_refs)
25dbc73a
AM
5686 s = htab->dynsbss;
5687 else
5688 s = htab->dynbss;
5689 BFD_ASSERT (s != NULL);
5690
5691 /* We must generate a R_PPC_COPY reloc to tell the dynamic linker to
5692 copy the initial value out of the dynamic object and into the
5693 runtime process image. We need to remember the offset into the
5694 .rela.bss section we are going to use. */
1d7e9d18 5695 if ((h->root.u.def.section->flags & SEC_ALLOC) != 0 && h->size != 0)
25dbc73a
AM
5696 {
5697 asection *srel;
5698
4dc4a9a5 5699 if (ppc_elf_hash_entry (h)->has_sda_refs)
25dbc73a
AM
5700 srel = htab->relsbss;
5701 else
5702 srel = htab->relbss;
5703 BFD_ASSERT (srel != NULL);
5704 srel->size += sizeof (Elf32_External_Rela);
5705 h->needs_copy = 1;
5706 }
7619e7c7 5707
6cabe1ea 5708 return _bfd_elf_adjust_dynamic_copy (info, h, s);
25dbc73a
AM
5709}
5710\f
ac39eb42
AM
5711/* Generate a symbol to mark plt call stubs. For non-PIC code the sym is
5712 xxxxxxxx.plt_call32.<callee> where xxxxxxxx is a hex number, usually 0,
5713 specifying the addend on the plt relocation. For -fpic code, the sym
5714 is xxxxxxxx.plt_pic32.<callee>, and for -fPIC
5715 xxxxxxxx.got2.plt_pic32.<callee>. */
0ba07910
AM
5716
5717static bfd_boolean
5718add_stub_sym (struct plt_entry *ent,
5719 struct elf_link_hash_entry *h,
ac39eb42 5720 struct bfd_link_info *info)
0ba07910
AM
5721{
5722 struct elf_link_hash_entry *sh;
5723 size_t len1, len2, len3;
5724 char *name;
ac39eb42
AM
5725 const char *stub;
5726 struct ppc_elf_link_hash_table *htab = ppc_elf_hash_table (info);
5727
0e1862bb 5728 if (bfd_link_pic (info))
ac39eb42
AM
5729 stub = ".plt_pic32.";
5730 else
5731 stub = ".plt_call32.";
0ba07910
AM
5732
5733 len1 = strlen (h->root.root.string);
ac39eb42 5734 len2 = strlen (stub);
0ba07910
AM
5735 len3 = 0;
5736 if (ent->sec)
5737 len3 = strlen (ent->sec->name);
ac39eb42 5738 name = bfd_malloc (len1 + len2 + len3 + 9);
0ba07910
AM
5739 if (name == NULL)
5740 return FALSE;
5741 sprintf (name, "%08x", (unsigned) ent->addend & 0xffffffff);
5742 if (ent->sec)
5743 memcpy (name + 8, ent->sec->name, len3);
ac39eb42
AM
5744 memcpy (name + 8 + len3, stub, len2);
5745 memcpy (name + 8 + len3 + len2, h->root.root.string, len1 + 1);
0ba07910
AM
5746 sh = elf_link_hash_lookup (&htab->elf, name, TRUE, FALSE, FALSE);
5747 if (sh == NULL)
5748 return FALSE;
5749 if (sh->root.type == bfd_link_hash_new)
5750 {
5751 sh->root.type = bfd_link_hash_defined;
5752 sh->root.u.def.section = htab->glink;
5753 sh->root.u.def.value = ent->glink_offset;
5754 sh->ref_regular = 1;
5755 sh->def_regular = 1;
5756 sh->ref_regular_nonweak = 1;
5757 sh->forced_local = 1;
5758 sh->non_elf = 0;
2ec55de3 5759 sh->root.linker_def = 1;
0ba07910
AM
5760 }
5761 return TRUE;
5762}
5763
3b36f7e6
AM
5764/* Allocate NEED contiguous space in .got, and return the offset.
5765 Handles allocation of the got header when crossing 32k. */
5766
5767static bfd_vma
5768allocate_got (struct ppc_elf_link_hash_table *htab, unsigned int need)
5769{
5770 bfd_vma where;
4a3dc543 5771 unsigned int max_before_header;
3b36f7e6 5772
4a3dc543 5773 if (htab->plt_type == PLT_VXWORKS)
9d8504b1
PB
5774 {
5775 where = htab->got->size;
5776 htab->got->size += need;
5777 }
3b36f7e6
AM
5778 else
5779 {
4a3dc543
RS
5780 max_before_header = htab->plt_type == PLT_NEW ? 32768 : 32764;
5781 if (need <= htab->got_gap)
3b36f7e6 5782 {
4a3dc543
RS
5783 where = max_before_header - htab->got_gap;
5784 htab->got_gap -= need;
5785 }
5786 else
5787 {
5788 if (htab->got->size + need > max_before_header
5789 && htab->got->size <= max_before_header)
5790 {
5791 htab->got_gap = max_before_header - htab->got->size;
5792 htab->got->size = max_before_header + htab->got_header_size;
5793 }
5794 where = htab->got->size;
5795 htab->got->size += need;
3b36f7e6 5796 }
3b36f7e6
AM
5797 }
5798 return where;
5799}
5800
25dbc73a 5801/* Allocate space in associated reloc sections for dynamic relocs. */
252b5132 5802
b34976b6 5803static bfd_boolean
25dbc73a 5804allocate_dynrelocs (struct elf_link_hash_entry *h, void *inf)
252b5132 5805{
25dbc73a
AM
5806 struct bfd_link_info *info = inf;
5807 struct ppc_elf_link_hash_entry *eh;
7619e7c7 5808 struct ppc_elf_link_hash_table *htab;
6061a67d 5809 struct elf_dyn_relocs *p;
252b5132 5810
25dbc73a 5811 if (h->root.type == bfd_link_hash_indirect)
b34976b6 5812 return TRUE;
252b5132 5813
7619e7c7 5814 htab = ppc_elf_hash_table (info);
e054468f
AM
5815 if (htab->elf.dynamic_sections_created
5816 || h->type == STT_GNU_IFUNC)
252b5132 5817 {
a6aa5195
AM
5818 struct plt_entry *ent;
5819 bfd_boolean doneone = FALSE;
28e99bb6 5820 bfd_vma plt_offset = 0, glink_offset = 0;
e054468f 5821 bfd_boolean dyn;
28e99bb6 5822
a6aa5195
AM
5823 for (ent = h->plt.plist; ent != NULL; ent = ent->next)
5824 if (ent->plt.refcount > 0)
5825 {
5826 /* Make sure this symbol is output as a dynamic symbol. */
5827 if (h->dynindx == -1
e054468f
AM
5828 && !h->forced_local
5829 && !h->def_regular
5830 && htab->elf.dynamic_sections_created)
a6aa5195
AM
5831 {
5832 if (! bfd_elf_link_record_dynamic_symbol (info, h))
5833 return FALSE;
5834 }
252b5132 5835
e054468f 5836 dyn = htab->elf.dynamic_sections_created;
0e1862bb 5837 if (bfd_link_pic (info)
e054468f
AM
5838 || h->type == STT_GNU_IFUNC
5839 || WILL_CALL_FINISH_DYNAMIC_SYMBOL (dyn, 0, h))
a6aa5195
AM
5840 {
5841 asection *s = htab->plt;
25f23106 5842 if (!dyn || h->dynindx == -1)
e054468f 5843 s = htab->iplt;
7619e7c7 5844
25f23106 5845 if (htab->plt_type == PLT_NEW || !dyn || h->dynindx == -1)
a6aa5195 5846 {
a6aa5195 5847 if (!doneone)
28e99bb6
AM
5848 {
5849 plt_offset = s->size;
5850 s->size += 4;
5851 }
5852 ent->plt.offset = plt_offset;
d7128ce4 5853
a6aa5195 5854 s = htab->glink;
0e1862bb 5855 if (!doneone || bfd_link_pic (info))
28e99bb6
AM
5856 {
5857 glink_offset = s->size;
5858 s->size += GLINK_ENTRY_SIZE;
a7f2871e 5859 if (h == htab->tls_get_addr
5446cbdf 5860 && !htab->params->no_tls_get_addr_opt)
a7f2871e 5861 s->size += TLS_GET_ADDR_GLINK_SIZE - GLINK_ENTRY_SIZE;
28e99bb6
AM
5862 }
5863 if (!doneone
0e1862bb 5864 && !bfd_link_pic (info)
625af618 5865 && h->def_dynamic
a6aa5195
AM
5866 && !h->def_regular)
5867 {
5868 h->root.u.def.section = s;
28e99bb6 5869 h->root.u.def.value = glink_offset;
a6aa5195 5870 }
28e99bb6 5871 ent->glink_offset = glink_offset;
0ba07910 5872
5446cbdf 5873 if (htab->params->emit_stub_syms
ac39eb42 5874 && !add_stub_sym (ent, h, info))
0ba07910 5875 return FALSE;
a6aa5195
AM
5876 }
5877 else
5878 {
a6aa5195
AM
5879 if (!doneone)
5880 {
28e99bb6
AM
5881 /* If this is the first .plt entry, make room
5882 for the special first entry. */
5883 if (s->size == 0)
9d8504b1 5884 s->size += htab->plt_initial_entry_size;
28e99bb6
AM
5885
5886 /* The PowerPC PLT is actually composed of two
5887 parts, the first part is 2 words (for a load
5888 and a jump), and then there is a remaining
5889 word available at the end. */
9d8504b1
PB
5890 plt_offset = (htab->plt_initial_entry_size
5891 + (htab->plt_slot_size
5892 * ((s->size
5893 - htab->plt_initial_entry_size)
5894 / htab->plt_entry_size)));
28e99bb6
AM
5895
5896 /* If this symbol is not defined in a regular
5897 file, and we are not generating a shared
5b914448 5898 library, then set the symbol to this location
de972ffa
AM
5899 in the .plt. This is to avoid text
5900 relocations, and is required to make
28e99bb6
AM
5901 function pointers compare as equal between
5902 the normal executable and the shared library. */
0e1862bb 5903 if (! bfd_link_pic (info)
625af618 5904 && h->def_dynamic
28e99bb6
AM
5905 && !h->def_regular)
5906 {
5907 h->root.u.def.section = s;
5908 h->root.u.def.value = plt_offset;
5909 }
5910
9d8504b1
PB
5911 /* Make room for this entry. */
5912 s->size += htab->plt_entry_size;
5913 /* After the 8192nd entry, room for two entries
5914 is allocated. */
4a3dc543 5915 if (htab->plt_type == PLT_OLD
9d8504b1
PB
5916 && (s->size - htab->plt_initial_entry_size)
5917 / htab->plt_entry_size
5918 > PLT_NUM_SINGLE_ENTRIES)
5919 s->size += htab->plt_entry_size;
a6aa5195 5920 }
28e99bb6 5921 ent->plt.offset = plt_offset;
a6aa5195 5922 }
25dbc73a 5923
a6aa5195
AM
5924 /* We also need to make an entry in the .rela.plt section. */
5925 if (!doneone)
5926 {
25f23106
AM
5927 if (!htab->elf.dynamic_sections_created
5928 || h->dynindx == -1)
e054468f
AM
5929 htab->reliplt->size += sizeof (Elf32_External_Rela);
5930 else
9d8504b1 5931 {
e054468f
AM
5932 htab->relplt->size += sizeof (Elf32_External_Rela);
5933
5934 if (htab->plt_type == PLT_VXWORKS)
9d8504b1 5935 {
e054468f 5936 /* Allocate space for the unloaded relocations. */
0e1862bb 5937 if (!bfd_link_pic (info)
e054468f 5938 && htab->elf.dynamic_sections_created)
9d8504b1 5939 {
e054468f
AM
5940 if (ent->plt.offset
5941 == (bfd_vma) htab->plt_initial_entry_size)
5942 {
5943 htab->srelplt2->size
5944 += (sizeof (Elf32_External_Rela)
5945 * VXWORKS_PLTRESOLVE_RELOCS);
5946 }
5947
9d8504b1 5948 htab->srelplt2->size
e054468f
AM
5949 += (sizeof (Elf32_External_Rela)
5950 * VXWORKS_PLT_NON_JMP_SLOT_RELOCS);
9d8504b1
PB
5951 }
5952
e054468f
AM
5953 /* Every PLT entry has an associated GOT entry in
5954 .got.plt. */
5955 htab->sgotplt->size += 4;
9d8504b1 5956 }
9d8504b1 5957 }
a6aa5195
AM
5958 doneone = TRUE;
5959 }
5960 }
5961 else
5962 ent->plt.offset = (bfd_vma) -1;
a6aa5195 5963 }
2ce859a1
AM
5964 else
5965 ent->plt.offset = (bfd_vma) -1;
5966
5967 if (!doneone)
5968 {
5969 h->plt.plist = NULL;
5970 h->needs_plt = 0;
5971 }
25dbc73a
AM
5972 }
5973 else
5974 {
a6aa5195 5975 h->plt.plist = NULL;
25dbc73a
AM
5976 h->needs_plt = 0;
5977 }
5978
5979 eh = (struct ppc_elf_link_hash_entry *) h;
d3e454b9
AM
5980 if (eh->elf.got.refcount > 0
5981 || (ELIMINATE_COPY_RELOCS
5982 && !eh->elf.def_regular
5983 && eh->elf.protected_def
5984 && eh->has_addr16_ha
5985 && eh->has_addr16_lo
5986 && htab->params->pic_fixup > 0))
25dbc73a 5987 {
d6e14abc
AM
5988 bfd_boolean dyn;
5989 unsigned int need;
5990
25dbc73a
AM
5991 /* Make sure this symbol is output as a dynamic symbol. */
5992 if (eh->elf.dynindx == -1
b099ab9f 5993 && !eh->elf.forced_local
25f23106 5994 && eh->elf.type != STT_GNU_IFUNC
b099ab9f 5995 && htab->elf.dynamic_sections_created)
25dbc73a
AM
5996 {
5997 if (!bfd_elf_link_record_dynamic_symbol (info, &eh->elf))
b34976b6 5998 return FALSE;
25dbc73a 5999 }
252b5132 6000
d6e14abc
AM
6001 need = 0;
6002 if ((eh->tls_mask & TLS_TLS) != 0)
25dbc73a 6003 {
d6e14abc 6004 if ((eh->tls_mask & TLS_LD) != 0)
252b5132 6005 {
d6e14abc
AM
6006 if (!eh->elf.def_dynamic)
6007 /* We'll just use htab->tlsld_got.offset. This should
6008 always be the case. It's a little odd if we have
6009 a local dynamic reloc against a non-local symbol. */
6010 htab->tlsld_got.refcount += 1;
6011 else
3b36f7e6 6012 need += 8;
252b5132 6013 }
d6e14abc
AM
6014 if ((eh->tls_mask & TLS_GD) != 0)
6015 need += 8;
6016 if ((eh->tls_mask & (TLS_TPREL | TLS_TPRELGD)) != 0)
6017 need += 4;
6018 if ((eh->tls_mask & TLS_DTPREL) != 0)
3b36f7e6 6019 need += 4;
d6e14abc
AM
6020 }
6021 else
6022 need += 4;
6023 if (need == 0)
6024 eh->elf.got.offset = (bfd_vma) -1;
6025 else
6026 {
3b36f7e6 6027 eh->elf.got.offset = allocate_got (htab, need);
25dbc73a 6028 dyn = htab->elf.dynamic_sections_created;
0e1862bb 6029 if ((bfd_link_pic (info)
25dbc73a
AM
6030 || WILL_CALL_FINISH_DYNAMIC_SYMBOL (dyn, 0, &eh->elf))
6031 && (ELF_ST_VISIBILITY (eh->elf.other) == STV_DEFAULT
6032 || eh->elf.root.type != bfd_link_hash_undefweak))
252b5132 6033 {
91e21fb7 6034 asection *rsec = htab->relgot;
0bed072f
AM
6035
6036 if (eh->elf.type == STT_GNU_IFUNC)
6037 rsec = htab->reliplt;
3b36f7e6
AM
6038 /* All the entries we allocated need relocs.
6039 Except LD only needs one. */
d6e14abc
AM
6040 if ((eh->tls_mask & TLS_LD) != 0
6041 && eh->elf.def_dynamic)
3b36f7e6 6042 need -= 4;
25f23106 6043 rsec->size += need * (sizeof (Elf32_External_Rela) / 4);
252b5132 6044 }
25dbc73a
AM
6045 }
6046 }
6047 else
6048 eh->elf.got.offset = (bfd_vma) -1;
252b5132 6049
b099ab9f 6050 if (eh->dyn_relocs == NULL
de972ffa 6051 || !htab->elf.dynamic_sections_created)
25dbc73a 6052 return TRUE;
252b5132 6053
25dbc73a
AM
6054 /* In the shared -Bsymbolic case, discard space allocated for
6055 dynamic pc-relative relocs against symbols which turn out to be
6056 defined in regular objects. For the normal shared case, discard
6057 space for relocs that have become local due to symbol visibility
6058 changes. */
6059
0e1862bb 6060 if (bfd_link_pic (info))
25dbc73a
AM
6061 {
6062 /* Relocs that use pc_count are those that appear on a call insn,
1d483afe 6063 or certain REL relocs (see must_be_dyn_reloc) that can be
25dbc73a
AM
6064 generated via assembly. We want calls to protected symbols to
6065 resolve directly to the function rather than going via the plt.
6066 If people want function pointer comparisons to work as expected
6067 then they should avoid writing weird assembly. */
6068 if (SYMBOL_CALLS_LOCAL (info, h))
6069 {
6061a67d 6070 struct elf_dyn_relocs **pp;
25dbc73a
AM
6071
6072 for (pp = &eh->dyn_relocs; (p = *pp) != NULL; )
252b5132 6073 {
25dbc73a
AM
6074 p->count -= p->pc_count;
6075 p->pc_count = 0;
6076 if (p->count == 0)
6077 *pp = p->next;
6078 else
6079 pp = &p->next;
252b5132 6080 }
25dbc73a 6081 }
252b5132 6082
3348747a
NS
6083 if (htab->is_vxworks)
6084 {
6061a67d 6085 struct elf_dyn_relocs **pp;
3348747a
NS
6086
6087 for (pp = &eh->dyn_relocs; (p = *pp) != NULL; )
6088 {
6089 if (strcmp (p->sec->output_section->name, ".tls_vars") == 0)
6090 *pp = p->next;
6091 else
6092 pp = &p->next;
6093 }
6094 }
6095
89200bf8
AM
6096 /* Discard relocs on undefined symbols that must be local. */
6097 if (eh->dyn_relocs != NULL
6098 && h->root.type == bfd_link_hash_undefined
6099 && (ELF_ST_VISIBILITY (h->other) == STV_HIDDEN
6100 || ELF_ST_VISIBILITY (h->other) == STV_INTERNAL))
6101 eh->dyn_relocs = NULL;
6102
25dbc73a
AM
6103 /* Also discard relocs on undefined weak syms with non-default
6104 visibility. */
cab87ef9
AM
6105 if (eh->dyn_relocs != NULL
6106 && h->root.type == bfd_link_hash_undefweak)
25dbc73a 6107 {
dfbb6ac9
AM
6108 if (ELF_ST_VISIBILITY (h->other) != STV_DEFAULT)
6109 eh->dyn_relocs = NULL;
6110
6111 /* Make sure undefined weak symbols are output as a dynamic
6112 symbol in PIEs. */
6113 else if (h->dynindx == -1
e054468f
AM
6114 && !h->forced_local
6115 && !h->def_regular)
dfbb6ac9
AM
6116 {
6117 if (! bfd_elf_link_record_dynamic_symbol (info, h))
6118 return FALSE;
6119 }
25dbc73a
AM
6120 }
6121 }
6122 else if (ELIMINATE_COPY_RELOCS)
6123 {
6124 /* For the non-shared case, discard space for relocs against
6125 symbols which turn out to need copy relocs or are not
6126 dynamic. */
7619e7c7 6127
25dbc73a 6128 if (!h->non_got_ref
d3e454b9
AM
6129 && !h->def_regular
6130 && !(h->protected_def
6131 && eh->has_addr16_ha
6132 && eh->has_addr16_lo
6133 && htab->params->pic_fixup > 0))
25dbc73a
AM
6134 {
6135 /* Make sure this symbol is output as a dynamic symbol.
6136 Undefined weak syms won't yet be marked as dynamic. */
6137 if (h->dynindx == -1
25f23106 6138 && !h->forced_local)
25dbc73a
AM
6139 {
6140 if (! bfd_elf_link_record_dynamic_symbol (info, h))
6141 return FALSE;
6142 }
7619e7c7 6143
25dbc73a
AM
6144 /* If that succeeded, we know we'll be keeping all the
6145 relocs. */
6146 if (h->dynindx != -1)
6147 goto keep;
6148 }
252b5132 6149
25dbc73a 6150 eh->dyn_relocs = NULL;
252b5132 6151
25dbc73a
AM
6152 keep: ;
6153 }
252b5132 6154
25dbc73a
AM
6155 /* Finally, allocate space. */
6156 for (p = eh->dyn_relocs; p != NULL; p = p->next)
6157 {
6158 asection *sreloc = elf_section_data (p->sec)->sreloc;
f95f8542 6159 if (eh->elf.type == STT_GNU_IFUNC)
25f23106 6160 sreloc = htab->reliplt;
25dbc73a
AM
6161 sreloc->size += p->count * sizeof (Elf32_External_Rela);
6162 }
252b5132 6163
25dbc73a
AM
6164 return TRUE;
6165}
7619e7c7 6166
625af618
AM
6167/* Set DF_TEXTREL if we find any dynamic relocs that apply to
6168 read-only sections. */
7619e7c7 6169
25dbc73a 6170static bfd_boolean
625af618 6171maybe_set_textrel (struct elf_link_hash_entry *h, void *info)
25dbc73a 6172{
25dbc73a
AM
6173 if (h->root.type == bfd_link_hash_indirect)
6174 return TRUE;
252b5132 6175
625af618 6176 if (readonly_dynrelocs (h))
25dbc73a 6177 {
625af618 6178 ((struct bfd_link_info *) info)->flags |= DF_TEXTREL;
ee05f2fe 6179
625af618
AM
6180 /* Not an error, just cut short the traversal. */
6181 return FALSE;
25dbc73a
AM
6182 }
6183 return TRUE;
6184}
6185
6177242a
AM
6186static const unsigned char glink_eh_frame_cie[] =
6187{
6188 0, 0, 0, 16, /* length. */
6189 0, 0, 0, 0, /* id. */
6190 1, /* CIE version. */
6191 'z', 'R', 0, /* Augmentation string. */
6192 4, /* Code alignment. */
6193 0x7c, /* Data alignment. */
6194 65, /* RA reg. */
6195 1, /* Augmentation size. */
6196 DW_EH_PE_pcrel | DW_EH_PE_sdata4, /* FDE encoding. */
6197 DW_CFA_def_cfa, 1, 0 /* def_cfa: r1 offset 0. */
6198};
6199
25dbc73a
AM
6200/* Set the sizes of the dynamic sections. */
6201
6202static bfd_boolean
93d1b056 6203ppc_elf_size_dynamic_sections (bfd *output_bfd,
25dbc73a
AM
6204 struct bfd_link_info *info)
6205{
6206 struct ppc_elf_link_hash_table *htab;
6207 asection *s;
6208 bfd_boolean relocs;
6209 bfd *ibfd;
7fce784e 6210
252b5132 6211#ifdef DEBUG
25dbc73a 6212 fprintf (stderr, "ppc_elf_size_dynamic_sections called\n");
252b5132 6213#endif
252b5132 6214
25dbc73a
AM
6215 htab = ppc_elf_hash_table (info);
6216 BFD_ASSERT (htab->elf.dynobj != NULL);
252b5132 6217
25dbc73a
AM
6218 if (elf_hash_table (info)->dynamic_sections_created)
6219 {
6220 /* Set the contents of the .interp section to the interpreter. */
9b8b325a 6221 if (bfd_link_executable (info) && !info->nointerp)
25dbc73a 6222 {
3d4d4302 6223 s = bfd_get_linker_section (htab->elf.dynobj, ".interp");
25dbc73a
AM
6224 BFD_ASSERT (s != NULL);
6225 s->size = sizeof ELF_DYNAMIC_INTERPRETER;
6226 s->contents = (unsigned char *) ELF_DYNAMIC_INTERPRETER;
6227 }
6228 }
252b5132 6229
4a3dc543 6230 if (htab->plt_type == PLT_OLD)
d7128ce4 6231 htab->got_header_size = 16;
4a3dc543 6232 else if (htab->plt_type == PLT_NEW)
d7128ce4 6233 htab->got_header_size = 12;
252b5132 6234
25dbc73a
AM
6235 /* Set up .got offsets for local syms, and space for local dynamic
6236 relocs. */
c72f2fb2 6237 for (ibfd = info->input_bfds; ibfd != NULL; ibfd = ibfd->link.next)
25dbc73a
AM
6238 {
6239 bfd_signed_vma *local_got;
6240 bfd_signed_vma *end_local_got;
e054468f
AM
6241 struct plt_entry **local_plt;
6242 struct plt_entry **end_local_plt;
25dbc73a
AM
6243 char *lgot_masks;
6244 bfd_size_type locsymcount;
6245 Elf_Internal_Shdr *symtab_hdr;
7fce784e 6246
0c8d6e5c 6247 if (!is_ppc_elf (ibfd))
25dbc73a 6248 continue;
7fce784e 6249
25dbc73a
AM
6250 for (s = ibfd->sections; s != NULL; s = s->next)
6251 {
f95f8542 6252 struct ppc_dyn_relocs *p;
252b5132 6253
f95f8542 6254 for (p = ((struct ppc_dyn_relocs *)
25dbc73a
AM
6255 elf_section_data (s)->local_dynrel);
6256 p != NULL;
6257 p = p->next)
6258 {
6259 if (!bfd_is_abs_section (p->sec)
6260 && bfd_is_abs_section (p->sec->output_section))
6261 {
6262 /* Input section has been discarded, either because
6263 it is a copy of a linkonce section or due to
6264 linker script /DISCARD/, so we'll be discarding
6265 the relocs too. */
7fce784e 6266 }
3348747a
NS
6267 else if (htab->is_vxworks
6268 && strcmp (p->sec->output_section->name,
6269 ".tls_vars") == 0)
6270 {
6271 /* Relocations in vxworks .tls_vars sections are
6272 handled specially by the loader. */
6273 }
25dbc73a 6274 else if (p->count != 0)
7fce784e 6275 {
25f23106 6276 asection *sreloc = elf_section_data (p->sec)->sreloc;
f95f8542 6277 if (p->ifunc)
25f23106
AM
6278 sreloc = htab->reliplt;
6279 sreloc->size += p->count * sizeof (Elf32_External_Rela);
25dbc73a
AM
6280 if ((p->sec->output_section->flags
6281 & (SEC_READONLY | SEC_ALLOC))
6282 == (SEC_READONLY | SEC_ALLOC))
6283 info->flags |= DF_TEXTREL;
7fce784e 6284 }
252b5132 6285 }
252b5132 6286 }
252b5132 6287
25dbc73a
AM
6288 local_got = elf_local_got_refcounts (ibfd);
6289 if (!local_got)
6290 continue;
252b5132 6291
0ffa91dd 6292 symtab_hdr = &elf_symtab_hdr (ibfd);
25dbc73a
AM
6293 locsymcount = symtab_hdr->sh_info;
6294 end_local_got = local_got + locsymcount;
e054468f
AM
6295 local_plt = (struct plt_entry **) end_local_got;
6296 end_local_plt = local_plt + locsymcount;
6297 lgot_masks = (char *) end_local_plt;
91d6fa6a 6298
25dbc73a
AM
6299 for (; local_got < end_local_got; ++local_got, ++lgot_masks)
6300 if (*local_got > 0)
6301 {
d6e14abc
AM
6302 unsigned int need = 0;
6303 if ((*lgot_masks & TLS_TLS) != 0)
25dbc73a 6304 {
d6e14abc
AM
6305 if ((*lgot_masks & TLS_GD) != 0)
6306 need += 8;
6307 if ((*lgot_masks & TLS_LD) != 0)
6308 htab->tlsld_got.refcount += 1;
6309 if ((*lgot_masks & (TLS_TPREL | TLS_TPRELGD)) != 0)
6310 need += 4;
6311 if ((*lgot_masks & TLS_DTPREL) != 0)
6312 need += 4;
25dbc73a 6313 }
d6e14abc
AM
6314 else
6315 need += 4;
6316 if (need == 0)
6317 *local_got = (bfd_vma) -1;
25dbc73a
AM
6318 else
6319 {
3b36f7e6 6320 *local_got = allocate_got (htab, need);
0e1862bb 6321 if (bfd_link_pic (info))
0bed072f
AM
6322 {
6323 asection *srel = htab->relgot;
6324 if ((*lgot_masks & PLT_IFUNC) != 0)
6325 srel = htab->reliplt;
6326 srel->size += need * (sizeof (Elf32_External_Rela) / 4);
6327 }
25dbc73a
AM
6328 }
6329 }
6330 else
6331 *local_got = (bfd_vma) -1;
e054468f
AM
6332
6333 if (htab->is_vxworks)
6334 continue;
6335
6336 /* Allocate space for calls to local STT_GNU_IFUNC syms in .iplt. */
6337 for (; local_plt < end_local_plt; ++local_plt)
6338 {
6339 struct plt_entry *ent;
6340 bfd_boolean doneone = FALSE;
6341 bfd_vma plt_offset = 0, glink_offset = 0;
6342
6343 for (ent = *local_plt; ent != NULL; ent = ent->next)
6344 if (ent->plt.refcount > 0)
6345 {
91d6fa6a 6346 s = htab->iplt;
e054468f
AM
6347
6348 if (!doneone)
6349 {
6350 plt_offset = s->size;
6351 s->size += 4;
6352 }
6353 ent->plt.offset = plt_offset;
6354
6355 s = htab->glink;
0e1862bb 6356 if (!doneone || bfd_link_pic (info))
e054468f
AM
6357 {
6358 glink_offset = s->size;
6359 s->size += GLINK_ENTRY_SIZE;
6360 }
6361 ent->glink_offset = glink_offset;
6362
6363 if (!doneone)
6364 {
25f23106 6365 htab->reliplt->size += sizeof (Elf32_External_Rela);
e054468f
AM
6366 doneone = TRUE;
6367 }
6368 }
6369 else
6370 ent->plt.offset = (bfd_vma) -1;
6371 }
25dbc73a 6372 }
252b5132 6373
b7fcf6f6
AM
6374 /* Allocate space for global sym dynamic relocs. */
6375 elf_link_hash_traverse (elf_hash_table (info), allocate_dynrelocs, info);
6376
3b36f7e6
AM
6377 if (htab->tlsld_got.refcount > 0)
6378 {
6379 htab->tlsld_got.offset = allocate_got (htab, 8);
0e1862bb 6380 if (bfd_link_pic (info))
3b36f7e6
AM
6381 htab->relgot->size += sizeof (Elf32_External_Rela);
6382 }
6383 else
6384 htab->tlsld_got.offset = (bfd_vma) -1;
6385
4a3dc543 6386 if (htab->got != NULL && htab->plt_type != PLT_VXWORKS)
3b36f7e6
AM
6387 {
6388 unsigned int g_o_t = 32768;
6389
4d962050
AM
6390 /* If we haven't allocated the header, do so now. When we get here,
6391 for old plt/got the got size will be 0 to 32764 (not allocated),
6392 or 32780 to 65536 (header allocated). For new plt/got, the
6393 corresponding ranges are 0 to 32768 and 32780 to 65536. */
3b36f7e6
AM
6394 if (htab->got->size <= 32768)
6395 {
6396 g_o_t = htab->got->size;
4a3dc543 6397 if (htab->plt_type == PLT_OLD)
4d962050 6398 g_o_t += 4;
3b36f7e6
AM
6399 htab->got->size += htab->got_header_size;
6400 }
3b36f7e6
AM
6401
6402 htab->elf.hgot->root.u.def.value = g_o_t;
6403 }
0e1862bb 6404 if (bfd_link_pic (info))
bd6c6e2b
AM
6405 {
6406 struct elf_link_hash_entry *sda = htab->sdata[0].sym;
93d1b056
AM
6407
6408 sda->root.u.def.section = htab->elf.hgot->root.u.def.section;
6409 sda->root.u.def.value = htab->elf.hgot->root.u.def.value;
bd6c6e2b 6410 }
15bfcc77
AM
6411 if (info->emitrelocations)
6412 {
6413 struct elf_link_hash_entry *sda = htab->sdata[0].sym;
6414
6415 if (sda != NULL && sda->ref_regular)
6416 sda->root.u.def.section->flags |= SEC_KEEP;
6417 sda = htab->sdata[1].sym;
6418 if (sda != NULL && sda->ref_regular)
6419 sda->root.u.def.section->flags |= SEC_KEEP;
6420 }
3b36f7e6 6421
e054468f
AM
6422 if (htab->glink != NULL
6423 && htab->glink->size != 0
6424 && htab->elf.dynamic_sections_created)
d7128ce4
AM
6425 {
6426 htab->glink_pltresolve = htab->glink->size;
86b9da88
AM
6427 /* Space for the branch table. */
6428 htab->glink->size += htab->glink->size / (GLINK_ENTRY_SIZE / 4) - 4;
6429 /* Pad out to align the start of PLTresolve. */
5446cbdf
AM
6430 htab->glink->size += -htab->glink->size & (htab->params->ppc476_workaround
6431 ? 63 : 15);
d7128ce4 6432 htab->glink->size += GLINK_PLTRESOLVE;
0ba07910 6433
5446cbdf 6434 if (htab->params->emit_stub_syms)
0ba07910
AM
6435 {
6436 struct elf_link_hash_entry *sh;
6437 sh = elf_link_hash_lookup (&htab->elf, "__glink",
6438 TRUE, FALSE, FALSE);
6439 if (sh == NULL)
6440 return FALSE;
6441 if (sh->root.type == bfd_link_hash_new)
6442 {
6443 sh->root.type = bfd_link_hash_defined;
6444 sh->root.u.def.section = htab->glink;
6445 sh->root.u.def.value = htab->glink_pltresolve;
6446 sh->ref_regular = 1;
6447 sh->def_regular = 1;
6448 sh->ref_regular_nonweak = 1;
6449 sh->forced_local = 1;
6450 sh->non_elf = 0;
2ec55de3 6451 sh->root.linker_def = 1;
0ba07910
AM
6452 }
6453 sh = elf_link_hash_lookup (&htab->elf, "__glink_PLTresolve",
6454 TRUE, FALSE, FALSE);
6455 if (sh == NULL)
6456 return FALSE;
6457 if (sh->root.type == bfd_link_hash_new)
6458 {
6459 sh->root.type = bfd_link_hash_defined;
6460 sh->root.u.def.section = htab->glink;
6461 sh->root.u.def.value = htab->glink->size - GLINK_PLTRESOLVE;
6462 sh->ref_regular = 1;
6463 sh->def_regular = 1;
6464 sh->ref_regular_nonweak = 1;
6465 sh->forced_local = 1;
6466 sh->non_elf = 0;
2ec55de3 6467 sh->root.linker_def = 1;
0ba07910
AM
6468 }
6469 }
d7128ce4
AM
6470 }
6471
6177242a
AM
6472 if (htab->glink != NULL
6473 && htab->glink->size != 0
6474 && htab->glink_eh_frame != NULL
9a2a56cc
AM
6475 && !bfd_is_abs_section (htab->glink_eh_frame->output_section)
6476 && _bfd_elf_eh_frame_present (info))
6177242a
AM
6477 {
6478 s = htab->glink_eh_frame;
6479 s->size = sizeof (glink_eh_frame_cie) + 20;
0e1862bb 6480 if (bfd_link_pic (info))
6177242a
AM
6481 {
6482 s->size += 4;
6483 if (htab->glink->size - GLINK_PLTRESOLVE + 8 >= 256)
6484 s->size += 4;
6485 }
6486 }
6487
25dbc73a
AM
6488 /* We've now determined the sizes of the various dynamic sections.
6489 Allocate memory for them. */
6490 relocs = FALSE;
6491 for (s = htab->elf.dynobj->sections; s != NULL; s = s->next)
252b5132 6492 {
9d8504b1
PB
6493 bfd_boolean strip_section = TRUE;
6494
25dbc73a
AM
6495 if ((s->flags & SEC_LINKER_CREATED) == 0)
6496 continue;
252b5132 6497
25dbc73a 6498 if (s == htab->plt
e054468f 6499 || s == htab->got)
25dbc73a 6500 {
9d8504b1
PB
6501 /* We'd like to strip these sections if they aren't needed, but if
6502 we've exported dynamic symbols from them we must leave them.
6503 It's too late to tell BFD to get rid of the symbols. */
e054468f 6504 if (htab->elf.hplt != NULL)
9d8504b1 6505 strip_section = FALSE;
25dbc73a
AM
6506 /* Strip this section if we don't need it; see the
6507 comment below. */
6508 }
e054468f
AM
6509 else if (s == htab->iplt
6510 || s == htab->glink
6177242a 6511 || s == htab->glink_eh_frame
e054468f
AM
6512 || s == htab->sgotplt
6513 || s == htab->sbss
6514 || s == htab->dynbss
15bfcc77 6515 || s == htab->dynsbss)
25dbc73a 6516 {
c9a2f333 6517 /* Strip these too. */
25dbc73a 6518 }
15bfcc77
AM
6519 else if (s == htab->sdata[0].section
6520 || s == htab->sdata[1].section)
6521 {
6522 strip_section = (s->flags & SEC_KEEP) == 0;
6523 }
a0f49396
NC
6524 else if (CONST_STRNEQ (bfd_get_section_name (htab->elf.dynobj, s),
6525 ".rela"))
25dbc73a 6526 {
c456f082 6527 if (s->size != 0)
25dbc73a
AM
6528 {
6529 /* Remember whether there are any relocation sections. */
6530 relocs = TRUE;
252b5132 6531
25dbc73a
AM
6532 /* We use the reloc_count field as a counter if we need
6533 to copy relocs into the output file. */
6534 s->reloc_count = 0;
252b5132
RH
6535 }
6536 }
25dbc73a
AM
6537 else
6538 {
6539 /* It's not one of our sections, so don't allocate space. */
6540 continue;
6541 }
252b5132 6542
9d8504b1 6543 if (s->size == 0 && strip_section)
25dbc73a 6544 {
c456f082
AM
6545 /* If we don't need this section, strip it from the
6546 output file. This is mostly to handle .rela.bss and
6547 .rela.plt. We must create both sections in
6548 create_dynamic_sections, because they must be created
6549 before the linker maps input sections to output
6550 sections. The linker does that before
6551 adjust_dynamic_symbol is called, and it is that
6552 function which decides whether anything needs to go
6553 into these sections. */
8423293d 6554 s->flags |= SEC_EXCLUDE;
25dbc73a
AM
6555 continue;
6556 }
7fce784e 6557
d7128ce4 6558 if ((s->flags & SEC_HAS_CONTENTS) == 0)
644285ef
AM
6559 continue;
6560
25dbc73a
AM
6561 /* Allocate memory for the section contents. */
6562 s->contents = bfd_zalloc (htab->elf.dynobj, s->size);
6563 if (s->contents == NULL)
6564 return FALSE;
6565 }
252b5132 6566
25dbc73a 6567 if (htab->elf.dynamic_sections_created)
7619e7c7 6568 {
25dbc73a
AM
6569 /* Add some entries to the .dynamic section. We fill in the
6570 values later, in ppc_elf_finish_dynamic_sections, but we
6571 must add the entries now so that we get the correct size for
6572 the .dynamic section. The DT_DEBUG entry is filled in by the
6573 dynamic linker and used by the debugger. */
6574#define add_dynamic_entry(TAG, VAL) \
6575 _bfd_elf_add_dynamic_entry (info, TAG, VAL)
252b5132 6576
0e1862bb 6577 if (bfd_link_executable (info))
7619e7c7 6578 {
25dbc73a
AM
6579 if (!add_dynamic_entry (DT_DEBUG, 0))
6580 return FALSE;
7619e7c7
AM
6581 }
6582
25dbc73a 6583 if (htab->plt != NULL && htab->plt->size != 0)
7619e7c7 6584 {
25dbc73a
AM
6585 if (!add_dynamic_entry (DT_PLTGOT, 0)
6586 || !add_dynamic_entry (DT_PLTRELSZ, 0)
6587 || !add_dynamic_entry (DT_PLTREL, DT_RELA)
6588 || !add_dynamic_entry (DT_JMPREL, 0))
6589 return FALSE;
6590 }
7619e7c7 6591
c7e17e05
AM
6592 if (htab->plt_type == PLT_NEW
6593 && htab->glink != NULL
6594 && htab->glink->size != 0)
d7128ce4 6595 {
1fe44d79 6596 if (!add_dynamic_entry (DT_PPC_GOT, 0))
d7128ce4 6597 return FALSE;
5446cbdf 6598 if (!htab->params->no_tls_get_addr_opt
a7f2871e
AM
6599 && htab->tls_get_addr != NULL
6600 && htab->tls_get_addr->plt.plist != NULL
e8910a83 6601 && !add_dynamic_entry (DT_PPC_OPT, PPC_OPT_TLS))
a7f2871e 6602 return FALSE;
d7128ce4
AM
6603 }
6604
25dbc73a
AM
6605 if (relocs)
6606 {
6607 if (!add_dynamic_entry (DT_RELA, 0)
6608 || !add_dynamic_entry (DT_RELASZ, 0)
6609 || !add_dynamic_entry (DT_RELAENT, sizeof (Elf32_External_Rela)))
6610 return FALSE;
6611 }
7619e7c7 6612
25dbc73a
AM
6613 /* If any dynamic relocs apply to a read-only section, then we
6614 need a DT_TEXTREL entry. */
6615 if ((info->flags & DF_TEXTREL) == 0)
625af618 6616 elf_link_hash_traverse (elf_hash_table (info), maybe_set_textrel,
25dbc73a 6617 info);
7619e7c7 6618
25dbc73a
AM
6619 if ((info->flags & DF_TEXTREL) != 0)
6620 {
6621 if (!add_dynamic_entry (DT_TEXTREL, 0))
6622 return FALSE;
7619e7c7 6623 }
7a2b07ff
NS
6624 if (htab->is_vxworks
6625 && !elf_vxworks_add_dynamic_entries (output_bfd, info))
6626 return FALSE;
6627 }
25dbc73a
AM
6628#undef add_dynamic_entry
6629
7e01508c
AM
6630 if (htab->glink_eh_frame != NULL
6631 && htab->glink_eh_frame->contents != NULL)
6632 {
6633 unsigned char *p = htab->glink_eh_frame->contents;
6634 bfd_vma val;
6635
6636 memcpy (p, glink_eh_frame_cie, sizeof (glink_eh_frame_cie));
6637 /* CIE length (rewrite in case little-endian). */
6638 bfd_put_32 (htab->elf.dynobj, sizeof (glink_eh_frame_cie) - 4, p);
6639 p += sizeof (glink_eh_frame_cie);
6640 /* FDE length. */
6641 val = htab->glink_eh_frame->size - 4 - sizeof (glink_eh_frame_cie);
6642 bfd_put_32 (htab->elf.dynobj, val, p);
6643 p += 4;
6644 /* CIE pointer. */
6645 val = p - htab->glink_eh_frame->contents;
6646 bfd_put_32 (htab->elf.dynobj, val, p);
6647 p += 4;
6648 /* Offset to .glink. Set later. */
6649 p += 4;
6650 /* .glink size. */
6651 bfd_put_32 (htab->elf.dynobj, htab->glink->size, p);
6652 p += 4;
6653 /* Augmentation. */
6654 p += 1;
6655
0e1862bb 6656 if (bfd_link_pic (info)
7e01508c
AM
6657 && htab->elf.dynamic_sections_created)
6658 {
6659 bfd_vma adv = (htab->glink->size - GLINK_PLTRESOLVE + 8) >> 2;
6660 if (adv < 64)
6661 *p++ = DW_CFA_advance_loc + adv;
6662 else if (adv < 256)
6663 {
6664 *p++ = DW_CFA_advance_loc1;
6665 *p++ = adv;
6666 }
6667 else if (adv < 65536)
6668 {
6669 *p++ = DW_CFA_advance_loc2;
6670 bfd_put_16 (htab->elf.dynobj, adv, p);
6671 p += 2;
6672 }
6673 else
6674 {
6675 *p++ = DW_CFA_advance_loc4;
6676 bfd_put_32 (htab->elf.dynobj, adv, p);
6677 p += 4;
6678 }
6679 *p++ = DW_CFA_register;
6680 *p++ = 65;
6681 p++;
6682 *p++ = DW_CFA_advance_loc + 4;
6683 *p++ = DW_CFA_restore_extended;
6684 *p++ = 65;
6685 }
6686 BFD_ASSERT ((bfd_vma) ((p + 3 - htab->glink_eh_frame->contents) & -4)
6687 == htab->glink_eh_frame->size);
6688 }
6689
7619e7c7
AM
6690 return TRUE;
6691}
0eb4a168 6692
93d1b056
AM
6693/* Arrange to have _SDA_BASE_ or _SDA2_BASE_ stripped from the output
6694 if it looks like nothing is using them. */
6695
6696static void
6697maybe_strip_sdasym (bfd *output_bfd, elf_linker_section_t *lsect)
6698{
6699 struct elf_link_hash_entry *sda = lsect->sym;
6700
6701 if (sda != NULL && !sda->ref_regular && sda->dynindx == -1)
6702 {
6703 asection *s;
6704
6705 s = bfd_get_section_by_name (output_bfd, lsect->name);
6706 if (s == NULL || bfd_section_removed_from_list (output_bfd, s))
6707 {
6708 s = bfd_get_section_by_name (output_bfd, lsect->bss_name);
6709 if (s == NULL || bfd_section_removed_from_list (output_bfd, s))
6710 {
6711 sda->def_regular = 0;
6712 /* This is somewhat magic. See elf_link_output_extsym. */
6713 sda->ref_dynamic = 1;
6714 sda->forced_local = 0;
6715 }
6716 }
6717 }
6718}
6719
6720void
6721ppc_elf_maybe_strip_sdata_syms (struct bfd_link_info *info)
6722{
6723 struct ppc_elf_link_hash_table *htab = ppc_elf_hash_table (info);
6724
6725 if (htab != NULL)
6726 {
6727 maybe_strip_sdasym (info->output_bfd, &htab->sdata[0]);
6728 maybe_strip_sdasym (info->output_bfd, &htab->sdata[1]);
6729 }
6730}
6731
6732
0eb4a168
AM
6733/* Return TRUE if symbol should be hashed in the `.gnu.hash' section. */
6734
6735static bfd_boolean
6736ppc_elf_hash_symbol (struct elf_link_hash_entry *h)
6737{
6738 if (h->plt.plist != NULL
6739 && !h->def_regular
6740 && (!h->pointer_equality_needed
6741 || !h->ref_regular_nonweak))
6742 return FALSE;
6743
6744 return _bfd_elf_hash_symbol (h);
6745}
25dbc73a
AM
6746\f
6747#define ARRAY_SIZE(a) (sizeof (a) / sizeof ((a)[0]))
6748
01017ef8
NS
6749/* Relaxation trampolines. r12 is available for clobbering (r11, is
6750 used for some functions that are allowed to break the ABI). */
25dbc73a
AM
6751static const int shared_stub_entry[] =
6752 {
6753 0x7c0802a6, /* mflr 0 */
6754 0x429f0005, /* bcl 20, 31, .Lxxx */
01017ef8
NS
6755 0x7d8802a6, /* mflr 12 */
6756 0x3d8c0000, /* addis 12, 12, (xxx-.Lxxx)@ha */
53291d1f 6757 0x398c0000, /* addi 12, 12, (xxx-.Lxxx)@l */
25dbc73a 6758 0x7c0803a6, /* mtlr 0 */
01017ef8 6759 0x7d8903a6, /* mtctr 12 */
25dbc73a
AM
6760 0x4e800420, /* bctr */
6761 };
6762
6763static const int stub_entry[] =
6764 {
01017ef8
NS
6765 0x3d800000, /* lis 12,xxx@ha */
6766 0x398c0000, /* addi 12,12,xxx@l */
6767 0x7d8903a6, /* mtctr 12 */
25dbc73a
AM
6768 0x4e800420, /* bctr */
6769 };
6770
5446cbdf
AM
6771struct ppc_elf_relax_info
6772{
6773 unsigned int workaround_size;
d3e454b9 6774 unsigned int picfixup_size;
5446cbdf
AM
6775};
6776
6777/* This function implements long branch trampolines, and the ppc476
6778 icache bug workaround. Any section needing trampolines or patch
6779 space for the workaround has its size extended so that we can
53291d1f 6780 add trampolines at the end of the section. */
5446cbdf 6781
25dbc73a
AM
6782static bfd_boolean
6783ppc_elf_relax_section (bfd *abfd,
6784 asection *isec,
6785 struct bfd_link_info *link_info,
6786 bfd_boolean *again)
6787{
d3e454b9 6788 struct one_branch_fixup
25dbc73a 6789 {
d3e454b9 6790 struct one_branch_fixup *next;
25dbc73a 6791 asection *tsec;
01017ef8
NS
6792 /* Final link, can use the symbol offset. For a
6793 relocatable link we use the symbol's index. */
25dbc73a
AM
6794 bfd_vma toff;
6795 bfd_vma trampoff;
6796 };
7619e7c7 6797
25dbc73a
AM
6798 Elf_Internal_Shdr *symtab_hdr;
6799 bfd_byte *contents = NULL;
6800 Elf_Internal_Sym *isymbuf = NULL;
6801 Elf_Internal_Rela *internal_relocs = NULL;
5446cbdf 6802 Elf_Internal_Rela *irel, *irelend = NULL;
d3e454b9 6803 struct one_branch_fixup *branch_fixups = NULL;
5446cbdf 6804 struct ppc_elf_relax_info *relax_info = NULL;
9bc4e62b 6805 unsigned changes = 0;
5446cbdf 6806 bfd_boolean workaround_change;
d7128ce4 6807 struct ppc_elf_link_hash_table *htab;
d3e454b9 6808 bfd_size_type trampbase, trampoff, newsize, picfixup_size;
a6aa5195 6809 asection *got2;
50248c89 6810 bfd_boolean maybe_pasted;
7619e7c7 6811
25dbc73a 6812 *again = FALSE;
7619e7c7 6813
5446cbdf 6814 /* No need to do anything with non-alloc or non-code sections. */
c87b5a93 6815 if ((isec->flags & SEC_ALLOC) == 0
a8ad78a7 6816 || (isec->flags & SEC_CODE) == 0
5446cbdf
AM
6817 || (isec->flags & SEC_LINKER_CREATED) != 0
6818 || isec->size < 4)
25dbc73a 6819 return TRUE;
7619e7c7 6820
c8a1f254
NS
6821 /* We cannot represent the required PIC relocs in the output, so don't
6822 do anything. The linker doesn't support mixing -shared and -r
6823 anyway. */
0e1862bb 6824 if (bfd_link_relocatable (link_info) && bfd_link_pic (link_info))
795bc6b3 6825 return TRUE;
5b914448 6826
5446cbdf
AM
6827 htab = ppc_elf_hash_table (link_info);
6828 if (htab == NULL)
6829 return TRUE;
6830
6831 isec->size = (isec->size + 3) & -4;
6832 if (isec->rawsize == 0)
6833 isec->rawsize = isec->size;
6834 trampbase = isec->size;
6835
53291d1f
AM
6836 BFD_ASSERT (isec->sec_info_type == SEC_INFO_TYPE_NONE
6837 || isec->sec_info_type == SEC_INFO_TYPE_TARGET);
6838 isec->sec_info_type = SEC_INFO_TYPE_TARGET;
6839
d3e454b9
AM
6840 if (htab->params->ppc476_workaround
6841 || htab->params->pic_fixup > 0)
5446cbdf
AM
6842 {
6843 if (elf_section_data (isec)->sec_info == NULL)
6844 {
5446cbdf
AM
6845 elf_section_data (isec)->sec_info
6846 = bfd_zalloc (abfd, sizeof (struct ppc_elf_relax_info));
6847 if (elf_section_data (isec)->sec_info == NULL)
6848 return FALSE;
6849 }
6850 relax_info = elf_section_data (isec)->sec_info;
6851 trampbase -= relax_info->workaround_size;
6852 }
6853
50248c89
AM
6854 maybe_pasted = (strcmp (isec->output_section->name, ".init") == 0
6855 || strcmp (isec->output_section->name, ".fini") == 0);
25dbc73a 6856 /* Space for a branch around any trampolines. */
5446cbdf
AM
6857 trampoff = trampbase;
6858 if (maybe_pasted && trampbase == isec->rawsize)
50248c89 6859 trampoff += 4;
7619e7c7 6860
0ffa91dd 6861 symtab_hdr = &elf_symtab_hdr (abfd);
d3e454b9
AM
6862 picfixup_size = 0;
6863 if (htab->params->branch_trampolines
6864 || htab->params->pic_fixup > 0)
7619e7c7 6865 {
5446cbdf
AM
6866 /* Get a copy of the native relocations. */
6867 if (isec->reloc_count != 0)
25dbc73a 6868 {
5446cbdf
AM
6869 internal_relocs = _bfd_elf_link_read_relocs (abfd, isec, NULL, NULL,
6870 link_info->keep_memory);
6871 if (internal_relocs == NULL)
6872 goto error_return;
25dbc73a 6873 }
7619e7c7 6874
5446cbdf
AM
6875 got2 = bfd_get_section_by_name (abfd, ".got2");
6876
6877 irelend = internal_relocs + isec->reloc_count;
6878 for (irel = internal_relocs; irel < irelend; irel++)
25dbc73a 6879 {
5446cbdf
AM
6880 unsigned long r_type = ELF32_R_TYPE (irel->r_info);
6881 bfd_vma toff, roff;
6882 asection *tsec;
d3e454b9 6883 struct one_branch_fixup *f;
5446cbdf 6884 size_t insn_offset = 0;
d3e454b9 6885 bfd_vma max_branch_offset = 0, val;
5446cbdf
AM
6886 bfd_byte *hit_addr;
6887 unsigned long t0;
6888 struct elf_link_hash_entry *h;
6889 struct plt_entry **plist;
6890 unsigned char sym_type;
6891
6892 switch (r_type)
6893 {
6894 case R_PPC_REL24:
6895 case R_PPC_LOCAL24PC:
6896 case R_PPC_PLTREL24:
6897 max_branch_offset = 1 << 25;
6898 break;
6899
6900 case R_PPC_REL14:
6901 case R_PPC_REL14_BRTAKEN:
6902 case R_PPC_REL14_BRNTAKEN:
6903 max_branch_offset = 1 << 15;
6904 break;
7fce784e 6905
d3e454b9
AM
6906 case R_PPC_ADDR16_HA:
6907 if (htab->params->pic_fixup > 0)
6908 break;
6909 continue;
6910
5446cbdf
AM
6911 default:
6912 continue;
6913 }
6914
6915 /* Get the value of the symbol referred to by the reloc. */
6916 h = NULL;
6917 if (ELF32_R_SYM (irel->r_info) < symtab_hdr->sh_info)
25dbc73a 6918 {
5446cbdf
AM
6919 /* A local symbol. */
6920 Elf_Internal_Sym *isym;
6921
6922 /* Read this BFD's local symbols. */
25dbc73a 6923 if (isymbuf == NULL)
5446cbdf
AM
6924 {
6925 isymbuf = (Elf_Internal_Sym *) symtab_hdr->contents;
6926 if (isymbuf == NULL)
6927 isymbuf = bfd_elf_get_elf_syms (abfd, symtab_hdr,
6928 symtab_hdr->sh_info, 0,
6929 NULL, NULL, NULL);
6930 if (isymbuf == 0)
6931 goto error_return;
6932 }
6933 isym = isymbuf + ELF32_R_SYM (irel->r_info);
6934 if (isym->st_shndx == SHN_UNDEF)
6935 tsec = bfd_und_section_ptr;
6936 else if (isym->st_shndx == SHN_ABS)
6937 tsec = bfd_abs_section_ptr;
6938 else if (isym->st_shndx == SHN_COMMON)
6939 tsec = bfd_com_section_ptr;
6940 else
6941 tsec = bfd_section_from_elf_index (abfd, isym->st_shndx);
6942
6943 toff = isym->st_value;
6944 sym_type = ELF_ST_TYPE (isym->st_info);
25dbc73a 6945 }
25dbc73a 6946 else
5446cbdf
AM
6947 {
6948 /* Global symbol handling. */
6949 unsigned long indx;
7fce784e 6950
5446cbdf
AM
6951 indx = ELF32_R_SYM (irel->r_info) - symtab_hdr->sh_info;
6952 h = elf_sym_hashes (abfd)[indx];
7619e7c7 6953
5446cbdf
AM
6954 while (h->root.type == bfd_link_hash_indirect
6955 || h->root.type == bfd_link_hash_warning)
6956 h = (struct elf_link_hash_entry *) h->root.u.i.link;
7619e7c7 6957
5446cbdf
AM
6958 if (h->root.type == bfd_link_hash_defined
6959 || h->root.type == bfd_link_hash_defweak)
6960 {
6961 tsec = h->root.u.def.section;
6962 toff = h->root.u.def.value;
6963 }
6964 else if (h->root.type == bfd_link_hash_undefined
6965 || h->root.type == bfd_link_hash_undefweak)
6966 {
6967 tsec = bfd_und_section_ptr;
0e1862bb 6968 toff = bfd_link_relocatable (link_info) ? indx : 0;
5446cbdf
AM
6969 }
6970 else
6971 continue;
6972
9f7552cf
AM
6973 /* If this branch is to __tls_get_addr then we may later
6974 optimise away the call. We won't be needing a long-
6975 branch stub in that case. */
0e1862bb 6976 if (bfd_link_executable (link_info)
9f7552cf
AM
6977 && h == htab->tls_get_addr
6978 && irel != internal_relocs)
6979 {
6980 unsigned long t_symndx = ELF32_R_SYM (irel[-1].r_info);
6981 unsigned long t_rtype = ELF32_R_TYPE (irel[-1].r_info);
6982 unsigned int tls_mask = 0;
6983
6984 /* The previous reloc should be one of R_PPC_TLSGD or
6985 R_PPC_TLSLD, or for older object files, a reloc
6986 on the __tls_get_addr arg setup insn. Get tls
6987 mask bits from the symbol on that reloc. */
6988 if (t_symndx < symtab_hdr->sh_info)
6989 {
6990 bfd_vma *local_got_offsets = elf_local_got_offsets (abfd);
6991
6992 if (local_got_offsets != NULL)
6993 {
6994 struct plt_entry **local_plt = (struct plt_entry **)
6995 (local_got_offsets + symtab_hdr->sh_info);
6996 char *lgot_masks = (char *)
6997 (local_plt + symtab_hdr->sh_info);
6998 tls_mask = lgot_masks[t_symndx];
6999 }
7000 }
7001 else
7002 {
7003 struct elf_link_hash_entry *th
7004 = elf_sym_hashes (abfd)[t_symndx - symtab_hdr->sh_info];
7005
7006 while (th->root.type == bfd_link_hash_indirect
7007 || th->root.type == bfd_link_hash_warning)
7008 th = (struct elf_link_hash_entry *) th->root.u.i.link;
7009
7010 tls_mask
7011 = ((struct ppc_elf_link_hash_entry *) th)->tls_mask;
7012 }
7013
7014 /* The mask bits tell us if the call will be
7015 optimised away. */
7016 if ((tls_mask & TLS_TLS) != 0 && (tls_mask & TLS_GD) == 0
7017 && (t_rtype == R_PPC_TLSGD
7018 || t_rtype == R_PPC_GOT_TLSGD16
7019 || t_rtype == R_PPC_GOT_TLSGD16_LO))
7020 continue;
7021 if ((tls_mask & TLS_TLS) != 0 && (tls_mask & TLS_LD) == 0
7022 && (t_rtype == R_PPC_TLSLD
7023 || t_rtype == R_PPC_GOT_TLSLD16
7024 || t_rtype == R_PPC_GOT_TLSLD16_LO))
7025 continue;
7026 }
7027
5446cbdf
AM
7028 sym_type = h->type;
7029 }
7619e7c7 7030
d3e454b9
AM
7031 if (r_type == R_PPC_ADDR16_HA)
7032 {
7033 if (h != NULL
7034 && !h->def_regular
7035 && h->protected_def
7036 && ppc_elf_hash_entry (h)->has_addr16_ha
7037 && ppc_elf_hash_entry (h)->has_addr16_lo)
7038 picfixup_size += 12;
7039 continue;
7040 }
7041
5446cbdf
AM
7042 /* The condition here under which we call find_plt_ent must
7043 match that in relocate_section. If we call find_plt_ent here
7044 but not in relocate_section, or vice versa, then the branch
7045 destination used here may be incorrect. */
7046 plist = NULL;
7047 if (h != NULL)
25dbc73a 7048 {
5446cbdf
AM
7049 /* We know is_branch_reloc (r_type) is true. */
7050 if (h->type == STT_GNU_IFUNC
7051 || r_type == R_PPC_PLTREL24)
7052 plist = &h->plt.plist;
25dbc73a 7053 }
5446cbdf
AM
7054 else if (sym_type == STT_GNU_IFUNC
7055 && elf_local_got_offsets (abfd) != NULL)
c8a1f254 7056 {
5446cbdf
AM
7057 bfd_vma *local_got_offsets = elf_local_got_offsets (abfd);
7058 struct plt_entry **local_plt = (struct plt_entry **)
7059 (local_got_offsets + symtab_hdr->sh_info);
7060 plist = local_plt + ELF32_R_SYM (irel->r_info);
c8a1f254 7061 }
5446cbdf 7062 if (plist != NULL)
a9585d22 7063 {
5446cbdf
AM
7064 bfd_vma addend = 0;
7065 struct plt_entry *ent;
7066
0e1862bb 7067 if (r_type == R_PPC_PLTREL24 && bfd_link_pic (link_info))
5446cbdf
AM
7068 addend = irel->r_addend;
7069 ent = find_plt_ent (plist, got2, addend);
7070 if (ent != NULL)
a9585d22 7071 {
5446cbdf
AM
7072 if (htab->plt_type == PLT_NEW
7073 || h == NULL
7074 || !htab->elf.dynamic_sections_created
7075 || h->dynindx == -1)
7076 {
7077 tsec = htab->glink;
7078 toff = ent->glink_offset;
7079 }
7080 else
7081 {
7082 tsec = htab->plt;
7083 toff = ent->plt.offset;
7084 }
de972ffa
AM
7085 }
7086 }
de972ffa 7087
5446cbdf
AM
7088 /* If the branch and target are in the same section, you have
7089 no hope of adding stubs. We'll error out later should the
7090 branch overflow. */
7091 if (tsec == isec)
7092 continue;
25dbc73a 7093
5446cbdf
AM
7094 /* There probably isn't any reason to handle symbols in
7095 SEC_MERGE sections; SEC_MERGE doesn't seem a likely
7096 attribute for a code section, and we are only looking at
7097 branches. However, implement it correctly here as a
7098 reference for other target relax_section functions. */
7099 if (0 && tsec->sec_info_type == SEC_INFO_TYPE_MERGE)
7100 {
7101 /* At this stage in linking, no SEC_MERGE symbol has been
7102 adjusted, so all references to such symbols need to be
7103 passed through _bfd_merged_section_offset. (Later, in
7104 relocate_section, all SEC_MERGE symbols *except* for
7105 section symbols have been adjusted.)
7106
7107 gas may reduce relocations against symbols in SEC_MERGE
7108 sections to a relocation against the section symbol when
7109 the original addend was zero. When the reloc is against
7110 a section symbol we should include the addend in the
7111 offset passed to _bfd_merged_section_offset, since the
7112 location of interest is the original symbol. On the
7113 other hand, an access to "sym+addend" where "sym" is not
7114 a section symbol should not include the addend; Such an
7115 access is presumed to be an offset from "sym"; The
7116 location of interest is just "sym". */
7117 if (sym_type == STT_SECTION)
7118 toff += irel->r_addend;
7119
7120 toff
7121 = _bfd_merged_section_offset (abfd, &tsec,
7122 elf_section_data (tsec)->sec_info,
7123 toff);
7124
7125 if (sym_type != STT_SECTION)
7126 toff += irel->r_addend;
7127 }
7128 /* PLTREL24 addends are special. */
7129 else if (r_type != R_PPC_PLTREL24)
25dbc73a 7130 toff += irel->r_addend;
7619e7c7 7131
5446cbdf 7132 /* Attempted -shared link of non-pic code loses. */
0e1862bb 7133 if ((!bfd_link_relocatable (link_info)
5446cbdf
AM
7134 && tsec == bfd_und_section_ptr)
7135 || tsec->output_section == NULL
7136 || (tsec->owner != NULL
7137 && (tsec->owner->flags & BFD_PLUGIN) != 0))
7138 continue;
7619e7c7 7139
5446cbdf 7140 roff = irel->r_offset;
7de713b9 7141
5446cbdf
AM
7142 /* If the branch is in range, no need to do anything. */
7143 if (tsec != bfd_und_section_ptr
0e1862bb 7144 && (!bfd_link_relocatable (link_info)
5446cbdf
AM
7145 /* A relocatable link may have sections moved during
7146 final link, so do not presume they remain in range. */
7147 || tsec->output_section == isec->output_section))
7148 {
7149 bfd_vma symaddr, reladdr;
7619e7c7 7150
5446cbdf
AM
7151 symaddr = tsec->output_section->vma + tsec->output_offset + toff;
7152 reladdr = isec->output_section->vma + isec->output_offset + roff;
7153 if (symaddr - reladdr + max_branch_offset
7154 < 2 * max_branch_offset)
7155 continue;
7156 }
01017ef8 7157
5446cbdf 7158 /* Look for an existing fixup to this address. */
d3e454b9 7159 for (f = branch_fixups; f ; f = f->next)
5446cbdf
AM
7160 if (f->tsec == tsec && f->toff == toff)
7161 break;
252b5132 7162
5446cbdf
AM
7163 if (f == NULL)
7164 {
7165 size_t size;
7166 unsigned long stub_rtype;
25dbc73a 7167
5446cbdf
AM
7168 val = trampoff - roff;
7169 if (val >= max_branch_offset)
7170 /* Oh dear, we can't reach a trampoline. Don't try to add
7171 one. We'll report an error later. */
7172 continue;
252b5132 7173
0e1862bb 7174 if (bfd_link_pic (link_info))
5446cbdf
AM
7175 {
7176 size = 4 * ARRAY_SIZE (shared_stub_entry);
7177 insn_offset = 12;
7178 }
7179 else
7180 {
7181 size = 4 * ARRAY_SIZE (stub_entry);
7182 insn_offset = 0;
7183 }
7184 stub_rtype = R_PPC_RELAX;
7185 if (tsec == htab->plt
7186 || tsec == htab->glink)
7187 {
7188 stub_rtype = R_PPC_RELAX_PLT;
7189 if (r_type == R_PPC_PLTREL24)
7190 stub_rtype = R_PPC_RELAX_PLTREL24;
7191 }
252b5132 7192
5446cbdf
AM
7193 /* Hijack the old relocation. Since we need two
7194 relocations for this use a "composite" reloc. */
7195 irel->r_info = ELF32_R_INFO (ELF32_R_SYM (irel->r_info),
7196 stub_rtype);
7197 irel->r_offset = trampoff + insn_offset;
7198 if (r_type == R_PPC_PLTREL24
7199 && stub_rtype != R_PPC_RELAX_PLTREL24)
7200 irel->r_addend = 0;
7201
7202 /* Record the fixup so we don't do it again this section. */
7203 f = bfd_malloc (sizeof (*f));
d3e454b9 7204 f->next = branch_fixups;
5446cbdf
AM
7205 f->tsec = tsec;
7206 f->toff = toff;
7207 f->trampoff = trampoff;
d3e454b9 7208 branch_fixups = f;
5446cbdf
AM
7209
7210 trampoff += size;
7211 changes++;
25dbc73a
AM
7212 }
7213 else
7214 {
5446cbdf
AM
7215 val = f->trampoff - roff;
7216 if (val >= max_branch_offset)
7217 continue;
252b5132 7218
5446cbdf
AM
7219 /* Nop out the reloc, since we're finalizing things here. */
7220 irel->r_info = ELF32_R_INFO (0, R_PPC_NONE);
7221 }
252b5132 7222
5446cbdf
AM
7223 /* Get the section contents. */
7224 if (contents == NULL)
25dbc73a 7225 {
5446cbdf
AM
7226 /* Get cached copy if it exists. */
7227 if (elf_section_data (isec)->this_hdr.contents != NULL)
7228 contents = elf_section_data (isec)->this_hdr.contents;
25dbc73a 7229 /* Go get them off disk. */
5446cbdf 7230 else if (!bfd_malloc_and_get_section (abfd, isec, &contents))
25dbc73a
AM
7231 goto error_return;
7232 }
252b5132 7233
5446cbdf
AM
7234 /* Fix up the existing branch to hit the trampoline. */
7235 hit_addr = contents + roff;
7236 switch (r_type)
7237 {
7238 case R_PPC_REL24:
7239 case R_PPC_LOCAL24PC:
7240 case R_PPC_PLTREL24:
7241 t0 = bfd_get_32 (abfd, hit_addr);
7242 t0 &= ~0x3fffffc;
7243 t0 |= val & 0x3fffffc;
7244 bfd_put_32 (abfd, t0, hit_addr);
7245 break;
252b5132 7246
5446cbdf
AM
7247 case R_PPC_REL14:
7248 case R_PPC_REL14_BRTAKEN:
7249 case R_PPC_REL14_BRNTAKEN:
7250 t0 = bfd_get_32 (abfd, hit_addr);
7251 t0 &= ~0xfffc;
7252 t0 |= val & 0xfffc;
7253 bfd_put_32 (abfd, t0, hit_addr);
7254 break;
7255 }
25dbc73a 7256 }
252b5132 7257
d3e454b9 7258 while (branch_fixups != NULL)
25dbc73a 7259 {
d3e454b9
AM
7260 struct one_branch_fixup *f = branch_fixups;
7261 branch_fixups = branch_fixups->next;
25dbc73a
AM
7262 free (f);
7263 }
5446cbdf 7264 }
252b5132 7265
5446cbdf
AM
7266 workaround_change = FALSE;
7267 newsize = trampoff;
795bc6b3 7268 if (htab->params->ppc476_workaround
0e1862bb 7269 && (!bfd_link_relocatable (link_info)
795bc6b3 7270 || isec->output_section->alignment_power >= htab->params->pagesize_p2))
5446cbdf
AM
7271 {
7272 bfd_vma addr, end_addr;
7273 unsigned int crossings;
795bc6b3 7274 bfd_vma pagesize = (bfd_vma) 1 << htab->params->pagesize_p2;
5446cbdf
AM
7275
7276 addr = isec->output_section->vma + isec->output_offset;
6128f9cf 7277 end_addr = addr + trampoff;
5446cbdf 7278 addr &= -pagesize;
795bc6b3 7279 crossings = ((end_addr & -pagesize) - addr) >> htab->params->pagesize_p2;
5446cbdf
AM
7280 if (crossings != 0)
7281 {
7282 /* Keep space aligned, to ensure the patch code itself does
7283 not cross a page. Don't decrease size calculated on a
7284 previous pass as otherwise we might never settle on a layout. */
1e269e9b 7285 newsize = 15 - ((end_addr - 1) & 15);
5446cbdf
AM
7286 newsize += crossings * 16;
7287 if (relax_info->workaround_size < newsize)
7288 {
7289 relax_info->workaround_size = newsize;
7290 workaround_change = TRUE;
5446cbdf
AM
7291 }
7292 /* Ensure relocate_section is called. */
7293 isec->flags |= SEC_RELOC;
7294 }
7295 newsize = trampoff + relax_info->workaround_size;
7296 }
7297
d3e454b9
AM
7298 if (htab->params->pic_fixup > 0)
7299 {
7300 picfixup_size -= relax_info->picfixup_size;
7301 if (picfixup_size != 0)
7302 relax_info->picfixup_size += picfixup_size;
7303 newsize += relax_info->picfixup_size;
7304 }
7305
7306 if (changes != 0 || picfixup_size != 0 || workaround_change)
5446cbdf
AM
7307 isec->size = newsize;
7308
25dbc73a
AM
7309 if (isymbuf != NULL
7310 && symtab_hdr->contents != (unsigned char *) isymbuf)
252b5132 7311 {
25dbc73a
AM
7312 if (! link_info->keep_memory)
7313 free (isymbuf);
252b5132 7314 else
25dbc73a
AM
7315 {
7316 /* Cache the symbols for elf_link_input_bfd. */
7317 symtab_hdr->contents = (unsigned char *) isymbuf;
7318 }
252b5132
RH
7319 }
7320
25dbc73a
AM
7321 if (contents != NULL
7322 && elf_section_data (isec)->this_hdr.contents != contents)
7323 {
53291d1f 7324 if (!changes && !link_info->keep_memory)
25dbc73a
AM
7325 free (contents);
7326 else
7327 {
7328 /* Cache the section contents for elf_link_input_bfd. */
7329 elf_section_data (isec)->this_hdr.contents = contents;
7330 }
7331 }
252b5132 7332
d3e454b9 7333 changes += picfixup_size;
9bc4e62b 7334 if (changes != 0)
25dbc73a 7335 {
9bc4e62b
NS
7336 /* Append sufficient NOP relocs so we can write out relocation
7337 information for the trampolines. */
d4730f92 7338 Elf_Internal_Shdr *rel_hdr;
9bc4e62b
NS
7339 Elf_Internal_Rela *new_relocs = bfd_malloc ((changes + isec->reloc_count)
7340 * sizeof (*new_relocs));
7341 unsigned ix;
5b914448 7342
9bc4e62b
NS
7343 if (!new_relocs)
7344 goto error_return;
7345 memcpy (new_relocs, internal_relocs,
7346 isec->reloc_count * sizeof (*new_relocs));
7347 for (ix = changes; ix--;)
7348 {
7349 irel = new_relocs + ix + isec->reloc_count;
7350
7351 irel->r_info = ELF32_R_INFO (0, R_PPC_NONE);
7352 }
7353 if (internal_relocs != elf_section_data (isec)->relocs)
25dbc73a 7354 free (internal_relocs);
9bc4e62b
NS
7355 elf_section_data (isec)->relocs = new_relocs;
7356 isec->reloc_count += changes;
d4730f92
BS
7357 rel_hdr = _bfd_elf_single_rel_hdr (isec);
7358 rel_hdr->sh_size += changes * rel_hdr->sh_entsize;
25dbc73a 7359 }
5446cbdf
AM
7360 else if (internal_relocs != NULL
7361 && elf_section_data (isec)->relocs != internal_relocs)
9bc4e62b 7362 free (internal_relocs);
252b5132 7363
5446cbdf 7364 *again = changes != 0 || workaround_change;
b34976b6 7365 return TRUE;
25dbc73a
AM
7366
7367 error_return:
d3e454b9 7368 while (branch_fixups != NULL)
5446cbdf 7369 {
d3e454b9
AM
7370 struct one_branch_fixup *f = branch_fixups;
7371 branch_fixups = branch_fixups->next;
5446cbdf
AM
7372 free (f);
7373 }
25dbc73a
AM
7374 if (isymbuf != NULL && (unsigned char *) isymbuf != symtab_hdr->contents)
7375 free (isymbuf);
7376 if (contents != NULL
7377 && elf_section_data (isec)->this_hdr.contents != contents)
7378 free (contents);
7379 if (internal_relocs != NULL
7380 && elf_section_data (isec)->relocs != internal_relocs)
7381 free (internal_relocs);
7382 return FALSE;
252b5132 7383}
252b5132 7384\f
8a696751
AM
7385/* What to do when ld finds relocations against symbols defined in
7386 discarded sections. */
7387
7388static unsigned int
7389ppc_elf_action_discarded (asection *sec)
7390{
7391 if (strcmp (".fixup", sec->name) == 0)
7392 return 0;
7393
7394 if (strcmp (".got2", sec->name) == 0)
7395 return 0;
7396
7397 return _bfd_elf_default_action_discarded (sec);
7398}
c9a2f333 7399\f
25dbc73a 7400/* Fill in the address for a pointer generated in a linker section. */
252b5132 7401
25dbc73a 7402static bfd_vma
76750a2f 7403elf_finish_pointer_linker_section (bfd *input_bfd,
25dbc73a
AM
7404 elf_linker_section_t *lsect,
7405 struct elf_link_hash_entry *h,
7406 bfd_vma relocation,
2bb04cf2 7407 const Elf_Internal_Rela *rel)
25dbc73a
AM
7408{
7409 elf_linker_section_pointers_t *linker_section_ptr;
252b5132 7410
25dbc73a 7411 BFD_ASSERT (lsect != NULL);
252b5132 7412
25dbc73a 7413 if (h != NULL)
252b5132 7414 {
25dbc73a
AM
7415 /* Handle global symbol. */
7416 struct ppc_elf_link_hash_entry *eh;
252b5132 7417
25dbc73a 7418 eh = (struct ppc_elf_link_hash_entry *) h;
76750a2f
AM
7419 BFD_ASSERT (eh->elf.def_regular);
7420 linker_section_ptr = eh->linker_section_pointer;
25dbc73a
AM
7421 }
7422 else
7423 {
7424 /* Handle local symbol. */
7425 unsigned long r_symndx = ELF32_R_SYM (rel->r_info);
76750a2f 7426
0c8d6e5c 7427 BFD_ASSERT (is_ppc_elf (input_bfd));
25dbc73a 7428 BFD_ASSERT (elf_local_ptr_offsets (input_bfd) != NULL);
76750a2f
AM
7429 linker_section_ptr = elf_local_ptr_offsets (input_bfd)[r_symndx];
7430 }
252b5132 7431
76750a2f
AM
7432 linker_section_ptr = elf_find_pointer_linker_section (linker_section_ptr,
7433 rel->r_addend,
7434 lsect);
7435 BFD_ASSERT (linker_section_ptr != NULL);
25dbc73a 7436
76750a2f
AM
7437 /* Offset will always be a multiple of four, so use the bottom bit
7438 as a "written" flag. */
7439 if ((linker_section_ptr->offset & 1) == 0)
7440 {
7441 bfd_put_32 (lsect->section->owner,
7442 relocation + linker_section_ptr->addend,
7443 lsect->section->contents + linker_section_ptr->offset);
7444 linker_section_ptr->offset += 1;
252b5132
RH
7445 }
7446
bd6c6e2b
AM
7447 relocation = (lsect->section->output_section->vma
7448 + lsect->section->output_offset
76750a2f 7449 + linker_section_ptr->offset - 1
bd6c6e2b 7450 - SYM_VAL (lsect->sym));
252b5132 7451
25dbc73a
AM
7452#ifdef DEBUG
7453 fprintf (stderr,
7454 "Finish pointer in linker section %s, offset = %ld (0x%lx)\n",
7455 lsect->name, (long) relocation, (long) relocation);
7456#endif
252b5132 7457
bd6c6e2b 7458 return relocation;
252b5132 7459}
25dbc73a 7460
e054468f
AM
7461#define PPC_LO(v) ((v) & 0xffff)
7462#define PPC_HI(v) (((v) >> 16) & 0xffff)
7463#define PPC_HA(v) PPC_HI ((v) + 0x8000)
7464
7465static void
a7f2871e 7466write_glink_stub (struct plt_entry *ent, asection *plt_sec, unsigned char *p,
e054468f
AM
7467 struct bfd_link_info *info)
7468{
7469 struct ppc_elf_link_hash_table *htab = ppc_elf_hash_table (info);
7470 bfd *output_bfd = info->output_bfd;
7471 bfd_vma plt;
e054468f
AM
7472
7473 plt = ((ent->plt.offset & ~1)
7474 + plt_sec->output_section->vma
7475 + plt_sec->output_offset);
e054468f 7476
0e1862bb 7477 if (bfd_link_pic (info))
e054468f
AM
7478 {
7479 bfd_vma got = 0;
7480
7481 if (ent->addend >= 32768)
7482 got = (ent->addend
7483 + ent->sec->output_section->vma
7484 + ent->sec->output_offset);
7485 else if (htab->elf.hgot != NULL)
7486 got = SYM_VAL (htab->elf.hgot);
7487
7488 plt -= got;
7489
7490 if (plt + 0x8000 < 0x10000)
7491 {
7492 bfd_put_32 (output_bfd, LWZ_11_30 + PPC_LO (plt), p);
7493 p += 4;
7494 bfd_put_32 (output_bfd, MTCTR_11, p);
7495 p += 4;
7496 bfd_put_32 (output_bfd, BCTR, p);
7497 p += 4;
da3a2088 7498 bfd_put_32 (output_bfd, htab->params->ppc476_workaround ? BA : NOP, p);
e054468f
AM
7499 p += 4;
7500 }
7501 else
7502 {
7503 bfd_put_32 (output_bfd, ADDIS_11_30 + PPC_HA (plt), p);
7504 p += 4;
7505 bfd_put_32 (output_bfd, LWZ_11_11 + PPC_LO (plt), p);
7506 p += 4;
7507 bfd_put_32 (output_bfd, MTCTR_11, p);
7508 p += 4;
7509 bfd_put_32 (output_bfd, BCTR, p);
7510 p += 4;
7511 }
7512 }
7513 else
7514 {
7515 bfd_put_32 (output_bfd, LIS_11 + PPC_HA (plt), p);
7516 p += 4;
7517 bfd_put_32 (output_bfd, LWZ_11_11 + PPC_LO (plt), p);
7518 p += 4;
7519 bfd_put_32 (output_bfd, MTCTR_11, p);
7520 p += 4;
7521 bfd_put_32 (output_bfd, BCTR, p);
7522 p += 4;
7523 }
7524}
7525
bd6c6e2b
AM
7526/* Return true if symbol is defined statically. */
7527
7528static bfd_boolean
7529is_static_defined (struct elf_link_hash_entry *h)
7530{
7531 return ((h->root.type == bfd_link_hash_defined
7532 || h->root.type == bfd_link_hash_defweak)
7533 && h->root.u.def.section != NULL
7534 && h->root.u.def.section->output_section != NULL);
7535}
7536
2d0f3896
AM
7537/* If INSN is an opcode that may be used with an @tls operand, return
7538 the transformed insn for TLS optimisation, otherwise return 0. If
7539 REG is non-zero only match an insn with RB or RA equal to REG. */
7540
7541unsigned int
7542_bfd_elf_ppc_at_tls_transform (unsigned int insn, unsigned int reg)
7543{
7544 unsigned int rtra;
7545
7546 if ((insn & (0x3f << 26)) != 31 << 26)
7547 return 0;
7548
7549 if (reg == 0 || ((insn >> 11) & 0x1f) == reg)
7550 rtra = insn & ((1 << 26) - (1 << 16));
7551 else if (((insn >> 16) & 0x1f) == reg)
7552 rtra = (insn & (0x1f << 21)) | ((insn & (0x1f << 11)) << 5);
7553 else
7554 return 0;
7555
7556 if ((insn & (0x3ff << 1)) == 266 << 1)
7557 /* add -> addi. */
7558 insn = 14 << 26;
7559 else if ((insn & (0x1f << 1)) == 23 << 1
7560 && ((insn & (0x1f << 6)) < 14 << 6
7561 || ((insn & (0x1f << 6)) >= 16 << 6
7562 && (insn & (0x1f << 6)) < 24 << 6)))
7563 /* load and store indexed -> dform. */
7564 insn = (32 | ((insn >> 6) & 0x1f)) << 26;
7565 else if ((insn & (((0x1a << 5) | 0x1f) << 1)) == 21 << 1)
7566 /* ldx, ldux, stdx, stdux -> ld, ldu, std, stdu. */
7567 insn = ((58 | ((insn >> 6) & 4)) << 26) | ((insn >> 6) & 1);
7568 else if ((insn & (((0x1f << 5) | 0x1f) << 1)) == 341 << 1)
7569 /* lwax -> lwa. */
7570 insn = (58 << 26) | 2;
7571 else
7572 return 0;
7573 insn |= rtra;
7574 return insn;
7575}
7576
766bc656
AM
7577/* If INSN is an opcode that may be used with an @tprel operand, return
7578 the transformed insn for an undefined weak symbol, ie. with the
7579 thread pointer REG operand removed. Otherwise return 0. */
7580
7581unsigned int
7582_bfd_elf_ppc_at_tprel_transform (unsigned int insn, unsigned int reg)
7583{
7584 if ((insn & (0x1f << 16)) == reg << 16
7585 && ((insn & (0x3f << 26)) == 14u << 26 /* addi */
7586 || (insn & (0x3f << 26)) == 15u << 26 /* addis */
7587 || (insn & (0x3f << 26)) == 32u << 26 /* lwz */
7588 || (insn & (0x3f << 26)) == 34u << 26 /* lbz */
7589 || (insn & (0x3f << 26)) == 36u << 26 /* stw */
7590 || (insn & (0x3f << 26)) == 38u << 26 /* stb */
7591 || (insn & (0x3f << 26)) == 40u << 26 /* lhz */
7592 || (insn & (0x3f << 26)) == 42u << 26 /* lha */
7593 || (insn & (0x3f << 26)) == 44u << 26 /* sth */
7594 || (insn & (0x3f << 26)) == 46u << 26 /* lmw */
7595 || (insn & (0x3f << 26)) == 47u << 26 /* stmw */
7596 || (insn & (0x3f << 26)) == 48u << 26 /* lfs */
7597 || (insn & (0x3f << 26)) == 50u << 26 /* lfd */
7598 || (insn & (0x3f << 26)) == 52u << 26 /* stfs */
7599 || (insn & (0x3f << 26)) == 54u << 26 /* stfd */
7600 || ((insn & (0x3f << 26)) == 58u << 26 /* lwa,ld,lmd */
7601 && (insn & 3) != 1)
7602 || ((insn & (0x3f << 26)) == 62u << 26 /* std, stmd */
7603 && ((insn & 3) == 0 || (insn & 3) == 3))))
7604 {
7605 insn &= ~(0x1f << 16);
7606 }
7607 else if ((insn & (0x1f << 21)) == reg << 21
7608 && ((insn & (0x3e << 26)) == 24u << 26 /* ori, oris */
7609 || (insn & (0x3e << 26)) == 26u << 26 /* xori,xoris */
7610 || (insn & (0x3e << 26)) == 28u << 26 /* andi,andis */))
7611 {
7612 insn &= ~(0x1f << 21);
7613 insn |= (insn & (0x1f << 16)) << 5;
7614 if ((insn & (0x3e << 26)) == 26 << 26 /* xori,xoris */)
7615 insn -= 2 >> 26; /* convert to ori,oris */
7616 }
7617 else
7618 insn = 0;
7619 return insn;
7620}
7621
1fe532cf
AM
7622static bfd_boolean
7623is_insn_ds_form (unsigned int insn)
7624{
7625 return ((insn & (0x3f << 26)) == 58u << 26 /* ld,ldu,lwa */
7626 || (insn & (0x3f << 26)) == 62u << 26 /* std,stdu,stq */
7627 || (insn & (0x3f << 26)) == 57u << 26 /* lfdp */
7628 || (insn & (0x3f << 26)) == 61u << 26 /* stfdp */);
7629}
7630
7631static bfd_boolean
7632is_insn_dq_form (unsigned int insn)
7633{
a680de9a
PB
7634 return ((insn & (0x3f << 26)) == 56u << 26 /* lq */
7635 || ((insn & (0x3f << 26)) == (61u << 26) /* lxv, stxv */
7636 && (insn & 3) == 1));
1fe532cf
AM
7637}
7638
252b5132
RH
7639/* The RELOCATE_SECTION function is called by the ELF backend linker
7640 to handle the relocations for a section.
7641
7642 The relocs are always passed as Rela structures; if the section
7643 actually uses Rel structures, the r_addend field will always be
7644 zero.
7645
7646 This function is responsible for adjust the section contents as
7647 necessary, and (if using Rela relocs and generating a
1049f94e 7648 relocatable output file) adjusting the reloc addend as
252b5132
RH
7649 necessary.
7650
7651 This function does not have to worry about setting the reloc
7652 address or the reloc symbol index.
7653
7654 LOCAL_SYMS is a pointer to the swapped in local symbols.
7655
7656 LOCAL_SECTIONS is an array giving the section in the input file
7657 corresponding to the st_shndx field of each local symbol.
7658
7659 The global hash table entry for the global symbols can be found
7660 via elf_sym_hashes (input_bfd).
7661
1049f94e 7662 When generating relocatable output, this function must handle
252b5132
RH
7663 STB_LOCAL/STT_SECTION symbols specially. The output symbol is
7664 going to be the section symbol corresponding to the output
7665 section, which means that the addend must be adjusted
7666 accordingly. */
7667
b34976b6 7668static bfd_boolean
55fd94b0
AM
7669ppc_elf_relocate_section (bfd *output_bfd,
7670 struct bfd_link_info *info,
7671 bfd *input_bfd,
7672 asection *input_section,
7673 bfd_byte *contents,
7674 Elf_Internal_Rela *relocs,
7675 Elf_Internal_Sym *local_syms,
7676 asection **local_sections)
252b5132 7677{
7619e7c7
AM
7678 Elf_Internal_Shdr *symtab_hdr;
7679 struct elf_link_hash_entry **sym_hashes;
7680 struct ppc_elf_link_hash_table *htab;
7681 Elf_Internal_Rela *rel;
c316a17c 7682 Elf_Internal_Rela *wrel;
7619e7c7
AM
7683 Elf_Internal_Rela *relend;
7684 Elf_Internal_Rela outrel;
f95f8542 7685 asection *got2;
252b5132 7686 bfd_vma *local_got_offsets;
b34976b6 7687 bfd_boolean ret = TRUE;
4fe5ca5b 7688 bfd_vma d_offset = (bfd_big_endian (output_bfd) ? 2 : 0);
3348747a 7689 bfd_boolean is_vxworks_tls;
d3e454b9
AM
7690 unsigned int picfixup_size = 0;
7691 struct ppc_elf_relax_info *relax_info = NULL;
b34976b6 7692
252b5132 7693#ifdef DEBUG
d003868e
AM
7694 _bfd_error_handler ("ppc_elf_relocate_section called for %B section %A, "
7695 "%ld relocations%s",
7696 input_bfd, input_section,
7697 (long) input_section->reloc_count,
0e1862bb 7698 (bfd_link_relocatable (info)) ? " (relocatable)" : "");
252b5132
RH
7699#endif
7700
a6aa5195
AM
7701 got2 = bfd_get_section_by_name (input_bfd, ".got2");
7702
e47cd125 7703 /* Initialize howto table if not already done. */
8da6118f 7704 if (!ppc_elf_howto_table[R_PPC_ADDR32])
252b5132
RH
7705 ppc_elf_howto_init ();
7706
7619e7c7 7707 htab = ppc_elf_hash_table (info);
252b5132 7708 local_got_offsets = elf_local_got_offsets (input_bfd);
0ffa91dd 7709 symtab_hdr = &elf_symtab_hdr (input_bfd);
7619e7c7 7710 sym_hashes = elf_sym_hashes (input_bfd);
3348747a
NS
7711 /* We have to handle relocations in vxworks .tls_vars sections
7712 specially, because the dynamic loader is 'weird'. */
0e1862bb 7713 is_vxworks_tls = (htab->is_vxworks && bfd_link_pic (info)
3348747a
NS
7714 && !strcmp (input_section->output_section->name,
7715 ".tls_vars"));
d3e454b9
AM
7716 if (input_section->sec_info_type == SEC_INFO_TYPE_TARGET)
7717 relax_info = elf_section_data (input_section)->sec_info;
c316a17c 7718 rel = wrel = relocs;
7619e7c7 7719 relend = relocs + input_section->reloc_count;
c316a17c 7720 for (; rel < relend; wrel++, rel++)
252b5132 7721 {
7619e7c7
AM
7722 enum elf_ppc_reloc_type r_type;
7723 bfd_vma addend;
7724 bfd_reloc_status_type r;
7725 Elf_Internal_Sym *sym;
7726 asection *sec;
7727 struct elf_link_hash_entry *h;
7728 const char *sym_name;
252b5132
RH
7729 reloc_howto_type *howto;
7730 unsigned long r_symndx;
7731 bfd_vma relocation;
91d6fa6a 7732 bfd_vma branch_bit, from;
7619e7c7
AM
7733 bfd_boolean unresolved_reloc;
7734 bfd_boolean warned;
7735 unsigned int tls_type, tls_mask, tls_gd;
e054468f 7736 struct plt_entry **ifunc;
86c95733 7737 struct reloc_howto_struct alt_howto;
7619e7c7 7738
c316a17c 7739 again:
55fd94b0
AM
7740 r_type = ELF32_R_TYPE (rel->r_info);
7741 sym = NULL;
7742 sec = NULL;
7743 h = NULL;
7619e7c7
AM
7744 unresolved_reloc = FALSE;
7745 warned = FALSE;
252b5132 7746 r_symndx = ELF32_R_SYM (rel->r_info);
560e09e9 7747
252b5132
RH
7748 if (r_symndx < symtab_hdr->sh_info)
7749 {
7750 sym = local_syms + r_symndx;
7751 sec = local_sections[r_symndx];
26c61ae5 7752 sym_name = bfd_elf_sym_name (input_bfd, symtab_hdr, sym, sec);
252b5132 7753
8517fae7 7754 relocation = _bfd_elf_rela_local_sym (output_bfd, sym, &sec, rel);
252b5132
RH
7755 }
7756 else
7757 {
62d887d4
L
7758 bfd_boolean ignored;
7759
b2a8e766
AM
7760 RELOC_FOR_GLOBAL_SYMBOL (info, input_bfd, input_section, rel,
7761 r_symndx, symtab_hdr, sym_hashes,
7762 h, sec, relocation,
62d887d4 7763 unresolved_reloc, warned, ignored);
9abc968f 7764
252b5132 7765 sym_name = h->root.root.string;
7619e7c7
AM
7766 }
7767
dbaa2011 7768 if (sec != NULL && discarded_section (sec))
ab96bf03
AM
7769 {
7770 /* For relocs against symbols from removed linkonce sections,
7771 or sections discarded by a linker script, we just want the
7772 section contents zeroed. Avoid any special processing. */
7773 howto = NULL;
7774 if (r_type < R_PPC_max)
7775 howto = ppc_elf_howto_table[r_type];
c316a17c
AM
7776
7777 _bfd_clear_contents (howto, input_bfd, input_section,
7778 contents + rel->r_offset);
7779 wrel->r_offset = rel->r_offset;
7780 wrel->r_info = 0;
7781 wrel->r_addend = 0;
7782
7783 /* For ld -r, remove relocations in debug sections against
7784 sections defined in discarded sections. Not done for
7785 non-debug to preserve relocs in .eh_frame which the
7786 eh_frame editing code expects to be present. */
7787 if (bfd_link_relocatable (info)
7788 && (input_section->flags & SEC_DEBUGGING))
7789 wrel--;
7790
7791 continue;
ab96bf03
AM
7792 }
7793
0e1862bb 7794 if (bfd_link_relocatable (info))
ab96bf03
AM
7795 {
7796 if (got2 != NULL
7797 && r_type == R_PPC_PLTREL24
f75e0e33 7798 && rel->r_addend != 0)
ab96bf03
AM
7799 {
7800 /* R_PPC_PLTREL24 is rather special. If non-zero, the
7801 addend specifies the GOT pointer offset within .got2. */
7802 rel->r_addend += got2->output_offset;
7803 }
53291d1f
AM
7804 if (r_type != R_PPC_RELAX_PLT
7805 && r_type != R_PPC_RELAX_PLTREL24
7806 && r_type != R_PPC_RELAX)
c316a17c 7807 goto copy_reloc;
ab96bf03
AM
7808 }
7809
7619e7c7
AM
7810 /* TLS optimizations. Replace instruction sequences and relocs
7811 based on information we collected in tls_optimize. We edit
7812 RELOCS so that --emit-relocs will output something sensible
7813 for the final instruction stream. */
7814 tls_mask = 0;
7815 tls_gd = 0;
727fc41e
AM
7816 if (h != NULL)
7817 tls_mask = ((struct ppc_elf_link_hash_entry *) h)->tls_mask;
7818 else if (local_got_offsets != NULL)
7619e7c7 7819 {
e054468f 7820 struct plt_entry **local_plt;
727fc41e 7821 char *lgot_masks;
e054468f
AM
7822 local_plt
7823 = (struct plt_entry **) (local_got_offsets + symtab_hdr->sh_info);
7824 lgot_masks = (char *) (local_plt + symtab_hdr->sh_info);
727fc41e 7825 tls_mask = lgot_masks[r_symndx];
7619e7c7
AM
7826 }
7827
7828 /* Ensure reloc mapping code below stays sane. */
7829 if ((R_PPC_GOT_TLSLD16 & 3) != (R_PPC_GOT_TLSGD16 & 3)
7830 || (R_PPC_GOT_TLSLD16_LO & 3) != (R_PPC_GOT_TLSGD16_LO & 3)
7831 || (R_PPC_GOT_TLSLD16_HI & 3) != (R_PPC_GOT_TLSGD16_HI & 3)
7832 || (R_PPC_GOT_TLSLD16_HA & 3) != (R_PPC_GOT_TLSGD16_HA & 3)
7833 || (R_PPC_GOT_TLSLD16 & 3) != (R_PPC_GOT_TPREL16 & 3)
7834 || (R_PPC_GOT_TLSLD16_LO & 3) != (R_PPC_GOT_TPREL16_LO & 3)
7835 || (R_PPC_GOT_TLSLD16_HI & 3) != (R_PPC_GOT_TPREL16_HI & 3)
7836 || (R_PPC_GOT_TLSLD16_HA & 3) != (R_PPC_GOT_TPREL16_HA & 3))
7837 abort ();
7838 switch (r_type)
7839 {
7840 default:
7841 break;
7842
7843 case R_PPC_GOT_TPREL16:
7844 case R_PPC_GOT_TPREL16_LO:
e054468f 7845 if ((tls_mask & TLS_TLS) != 0
7619e7c7
AM
7846 && (tls_mask & TLS_TPREL) == 0)
7847 {
7848 bfd_vma insn;
91d6fa6a 7849
c316a17c
AM
7850 insn = bfd_get_32 (output_bfd,
7851 contents + rel->r_offset - d_offset);
7619e7c7
AM
7852 insn &= 31 << 21;
7853 insn |= 0x3c020000; /* addis 0,2,0 */
c316a17c
AM
7854 bfd_put_32 (output_bfd, insn,
7855 contents + rel->r_offset - d_offset);
7619e7c7
AM
7856 r_type = R_PPC_TPREL16_HA;
7857 rel->r_info = ELF32_R_INFO (r_symndx, r_type);
7858 }
7859 break;
7860
7861 case R_PPC_TLS:
e054468f 7862 if ((tls_mask & TLS_TLS) != 0
7619e7c7
AM
7863 && (tls_mask & TLS_TPREL) == 0)
7864 {
2d0f3896
AM
7865 bfd_vma insn;
7866
7619e7c7 7867 insn = bfd_get_32 (output_bfd, contents + rel->r_offset);
2d0f3896
AM
7868 insn = _bfd_elf_ppc_at_tls_transform (insn, 2);
7869 if (insn == 0)
7619e7c7 7870 abort ();
7619e7c7
AM
7871 bfd_put_32 (output_bfd, insn, contents + rel->r_offset);
7872 r_type = R_PPC_TPREL16_LO;
7873 rel->r_info = ELF32_R_INFO (r_symndx, r_type);
4fe5ca5b 7874
7619e7c7 7875 /* Was PPC_TLS which sits on insn boundary, now
4fe5ca5b
GM
7876 PPC_TPREL16_LO which is at low-order half-word. */
7877 rel->r_offset += d_offset;
7619e7c7
AM
7878 }
7879 break;
7880
7881 case R_PPC_GOT_TLSGD16_HI:
7882 case R_PPC_GOT_TLSGD16_HA:
7883 tls_gd = TLS_TPRELGD;
e054468f 7884 if ((tls_mask & TLS_TLS) != 0 && (tls_mask & TLS_GD) == 0)
7619e7c7
AM
7885 goto tls_gdld_hi;
7886 break;
7887
7888 case R_PPC_GOT_TLSLD16_HI:
7889 case R_PPC_GOT_TLSLD16_HA:
e054468f 7890 if ((tls_mask & TLS_TLS) != 0 && (tls_mask & TLS_LD) == 0)
7619e7c7
AM
7891 {
7892 tls_gdld_hi:
7893 if ((tls_mask & tls_gd) != 0)
7894 r_type = (((r_type - (R_PPC_GOT_TLSGD16 & 3)) & 3)
7895 + R_PPC_GOT_TPREL16);
7896 else
7897 {
4fe5ca5b 7898 rel->r_offset -= d_offset;
b86ac8e3 7899 bfd_put_32 (output_bfd, NOP, contents + rel->r_offset);
7619e7c7
AM
7900 r_type = R_PPC_NONE;
7901 }
7902 rel->r_info = ELF32_R_INFO (r_symndx, r_type);
7903 }
7904 break;
7905
7906 case R_PPC_GOT_TLSGD16:
7907 case R_PPC_GOT_TLSGD16_LO:
7908 tls_gd = TLS_TPRELGD;
e054468f 7909 if ((tls_mask & TLS_TLS) != 0 && (tls_mask & TLS_GD) == 0)
b7fcf6f6 7910 goto tls_ldgd_opt;
7619e7c7
AM
7911 break;
7912
7913 case R_PPC_GOT_TLSLD16:
7914 case R_PPC_GOT_TLSLD16_LO:
e054468f 7915 if ((tls_mask & TLS_TLS) != 0 && (tls_mask & TLS_LD) == 0)
7619e7c7 7916 {
3a71aa26 7917 unsigned int insn1, insn2;
b7fcf6f6 7918 bfd_vma offset;
7619e7c7 7919
b7fcf6f6 7920 tls_ldgd_opt:
727fc41e
AM
7921 offset = (bfd_vma) -1;
7922 /* If not using the newer R_PPC_TLSGD/LD to mark
7923 __tls_get_addr calls, we must trust that the call
7924 stays with its arg setup insns, ie. that the next
7925 reloc is the __tls_get_addr call associated with
7926 the current reloc. Edit both insns. */
7927 if (input_section->has_tls_get_addr_call
7928 && rel + 1 < relend
7929 && branch_reloc_hash_match (input_bfd, rel + 1,
7930 htab->tls_get_addr))
7931 offset = rel[1].r_offset;
b86ac8e3
AM
7932 /* We read the low GOT_TLS insn because we need to keep
7933 the destination reg. It may be something other than
7934 the usual r3, and moved to r3 before the call by
7935 intervening code. */
7936 insn1 = bfd_get_32 (output_bfd,
7937 contents + rel->r_offset - d_offset);
b7fcf6f6
AM
7938 if ((tls_mask & tls_gd) != 0)
7939 {
7940 /* IE */
b86ac8e3 7941 insn1 &= (0x1f << 21) | (0x1f << 16);
b7fcf6f6 7942 insn1 |= 32 << 26; /* lwz */
727fc41e
AM
7943 if (offset != (bfd_vma) -1)
7944 {
f58d5a2d 7945 rel[1].r_info = ELF32_R_INFO (STN_UNDEF, R_PPC_NONE);
727fc41e
AM
7946 insn2 = 0x7c631214; /* add 3,3,2 */
7947 bfd_put_32 (output_bfd, insn2, contents + offset);
7948 }
b7fcf6f6
AM
7949 r_type = (((r_type - (R_PPC_GOT_TLSGD16 & 3)) & 3)
7950 + R_PPC_GOT_TPREL16);
7951 rel->r_info = ELF32_R_INFO (r_symndx, r_type);
7952 }
7953 else
7954 {
7955 /* LE */
b86ac8e3
AM
7956 insn1 &= 0x1f << 21;
7957 insn1 |= 0x3c020000; /* addis r,2,0 */
7619e7c7
AM
7958 if (tls_gd == 0)
7959 {
b7fcf6f6 7960 /* Was an LD reloc. */
1d483afe
AM
7961 for (r_symndx = 0;
7962 r_symndx < symtab_hdr->sh_info;
7963 r_symndx++)
7964 if (local_sections[r_symndx] == sec)
7965 break;
7966 if (r_symndx >= symtab_hdr->sh_info)
cf35638d 7967 r_symndx = STN_UNDEF;
b7fcf6f6 7968 rel->r_addend = htab->elf.tls_sec->vma + DTP_OFFSET;
cf35638d 7969 if (r_symndx != STN_UNDEF)
1d483afe
AM
7970 rel->r_addend -= (local_syms[r_symndx].st_value
7971 + sec->output_offset
7972 + sec->output_section->vma);
7619e7c7 7973 }
b7fcf6f6
AM
7974 r_type = R_PPC_TPREL16_HA;
7975 rel->r_info = ELF32_R_INFO (r_symndx, r_type);
727fc41e
AM
7976 if (offset != (bfd_vma) -1)
7977 {
7978 rel[1].r_info = ELF32_R_INFO (r_symndx, R_PPC_TPREL16_LO);
7979 rel[1].r_offset = offset + d_offset;
7980 rel[1].r_addend = rel->r_addend;
7981 insn2 = 0x38630000; /* addi 3,3,0 */
7982 bfd_put_32 (output_bfd, insn2, contents + offset);
7983 }
b7fcf6f6
AM
7984 }
7985 bfd_put_32 (output_bfd, insn1,
7986 contents + rel->r_offset - d_offset);
b7fcf6f6
AM
7987 if (tls_gd == 0)
7988 {
7989 /* We changed the symbol on an LD reloc. Start over
7990 in order to get h, sym, sec etc. right. */
c316a17c 7991 goto again;
7619e7c7 7992 }
252b5132 7993 }
7619e7c7 7994 break;
727fc41e
AM
7995
7996 case R_PPC_TLSGD:
e054468f 7997 if ((tls_mask & TLS_TLS) != 0 && (tls_mask & TLS_GD) == 0)
727fc41e
AM
7998 {
7999 unsigned int insn2;
8000 bfd_vma offset = rel->r_offset;
8001
8002 if ((tls_mask & TLS_TPRELGD) != 0)
8003 {
8004 /* IE */
8005 r_type = R_PPC_NONE;
8006 insn2 = 0x7c631214; /* add 3,3,2 */
8007 }
8008 else
8009 {
8010 /* LE */
8011 r_type = R_PPC_TPREL16_LO;
8012 rel->r_offset += d_offset;
8013 insn2 = 0x38630000; /* addi 3,3,0 */
8014 }
8015 rel->r_info = ELF32_R_INFO (r_symndx, r_type);
8016 bfd_put_32 (output_bfd, insn2, contents + offset);
8017 /* Zap the reloc on the _tls_get_addr call too. */
8018 BFD_ASSERT (offset == rel[1].r_offset);
f58d5a2d 8019 rel[1].r_info = ELF32_R_INFO (STN_UNDEF, R_PPC_NONE);
727fc41e
AM
8020 }
8021 break;
8022
8023 case R_PPC_TLSLD:
e054468f 8024 if ((tls_mask & TLS_TLS) != 0 && (tls_mask & TLS_LD) == 0)
727fc41e
AM
8025 {
8026 unsigned int insn2;
8027
8028 for (r_symndx = 0;
8029 r_symndx < symtab_hdr->sh_info;
8030 r_symndx++)
8031 if (local_sections[r_symndx] == sec)
8032 break;
8033 if (r_symndx >= symtab_hdr->sh_info)
cf35638d 8034 r_symndx = STN_UNDEF;
727fc41e 8035 rel->r_addend = htab->elf.tls_sec->vma + DTP_OFFSET;
cf35638d 8036 if (r_symndx != STN_UNDEF)
727fc41e
AM
8037 rel->r_addend -= (local_syms[r_symndx].st_value
8038 + sec->output_offset
8039 + sec->output_section->vma);
8040
8041 rel->r_info = ELF32_R_INFO (r_symndx, R_PPC_TPREL16_LO);
8042 rel->r_offset += d_offset;
8043 insn2 = 0x38630000; /* addi 3,3,0 */
8044 bfd_put_32 (output_bfd, insn2,
8045 contents + rel->r_offset - d_offset);
8046 /* Zap the reloc on the _tls_get_addr call too. */
8047 BFD_ASSERT (rel->r_offset - d_offset == rel[1].r_offset);
f58d5a2d 8048 rel[1].r_info = ELF32_R_INFO (STN_UNDEF, R_PPC_NONE);
c316a17c 8049 goto again;
727fc41e
AM
8050 }
8051 break;
7619e7c7
AM
8052 }
8053
8054 /* Handle other relocations that tweak non-addend part of insn. */
8055 branch_bit = 0;
8056 switch (r_type)
8057 {
8058 default:
8059 break;
8060
8061 /* Branch taken prediction relocations. */
8062 case R_PPC_ADDR14_BRTAKEN:
8063 case R_PPC_REL14_BRTAKEN:
8064 branch_bit = BRANCH_PREDICT_BIT;
8065 /* Fall thru */
8066
4cc11e76 8067 /* Branch not taken prediction relocations. */
7619e7c7
AM
8068 case R_PPC_ADDR14_BRNTAKEN:
8069 case R_PPC_REL14_BRNTAKEN:
91d6fa6a
NC
8070 {
8071 bfd_vma insn;
7619e7c7 8072
91d6fa6a
NC
8073 insn = bfd_get_32 (output_bfd, contents + rel->r_offset);
8074 insn &= ~BRANCH_PREDICT_BIT;
8075 insn |= branch_bit;
7619e7c7 8076
91d6fa6a
NC
8077 from = (rel->r_offset
8078 + input_section->output_offset
8079 + input_section->output_section->vma);
7619e7c7 8080
91d6fa6a
NC
8081 /* Invert 'y' bit if not the default. */
8082 if ((bfd_signed_vma) (relocation + rel->r_addend - from) < 0)
8083 insn ^= BRANCH_PREDICT_BIT;
8084
8085 bfd_put_32 (output_bfd, insn, contents + rel->r_offset);
8086 break;
8087 }
252b5132
RH
8088 }
8089
d3e454b9
AM
8090 if (ELIMINATE_COPY_RELOCS
8091 && h != NULL
8092 && !h->def_regular
8093 && h->protected_def
8094 && ppc_elf_hash_entry (h)->has_addr16_ha
8095 && ppc_elf_hash_entry (h)->has_addr16_lo
8096 && htab->params->pic_fixup > 0)
8097 {
8098 /* Convert lis;addi or lis;load/store accessing a protected
8099 variable defined in a shared library to PIC. */
8100 unsigned int insn;
8101
8102 if (r_type == R_PPC_ADDR16_HA)
8103 {
8104 insn = bfd_get_32 (output_bfd,
8105 contents + rel->r_offset - d_offset);
8106 if ((insn & (0x3f << 26)) == (15u << 26)
8107 && (insn & (0x1f << 16)) == 0 /* lis */)
8108 {
8109 bfd_byte *p;
8110 bfd_vma off;
8111 bfd_vma got_addr;
8112
8113 p = (contents + input_section->size
8114 - relax_info->workaround_size
8115 - relax_info->picfixup_size
8116 + picfixup_size);
8117 off = (p - contents) - (rel->r_offset - d_offset);
8118 if (off > 0x1fffffc || (off & 3) != 0)
8119 info->callbacks->einfo
8120 (_("%P: %H: fixup branch overflow\n"),
8121 input_bfd, input_section, rel->r_offset);
8122
8123 bfd_put_32 (output_bfd, B | off,
8124 contents + rel->r_offset - d_offset);
8125 got_addr = (htab->got->output_section->vma
8126 + htab->got->output_offset
8127 + (h->got.offset & ~1));
c316a17c
AM
8128 wrel->r_offset = (p - contents) + d_offset;
8129 wrel->r_info = ELF32_R_INFO (0, R_PPC_ADDR16_HA);
8130 wrel->r_addend = got_addr;
d3e454b9
AM
8131 insn &= ~0xffff;
8132 insn |= ((unsigned int )(got_addr + 0x8000) >> 16) & 0xffff;
8133 bfd_put_32 (output_bfd, insn, p);
8134
8135 /* Convert lis to lwz, loading address from GOT. */
8136 insn &= ~0xffff;
8137 insn ^= (32u ^ 15u) << 26;
8138 insn |= (insn & (0x1f << 21)) >> 5;
8139 insn |= got_addr & 0xffff;
8140 bfd_put_32 (output_bfd, insn, p + 4);
8141
8142 bfd_put_32 (output_bfd, B | ((-4 - off) & 0x3ffffff), p + 8);
8143 picfixup_size += 12;
8144
8145 /* Use one of the spare relocs, so --emit-relocs
8146 output is reasonable. */
8147 memmove (rel + 1, rel, (relend - rel - 1) * sizeof (*rel));
c316a17c
AM
8148 wrel++, rel++;
8149 rel->r_offset = wrel[-1].r_offset + 4;
d3e454b9 8150 rel->r_info = ELF32_R_INFO (0, R_PPC_ADDR16_LO);
c316a17c 8151 rel->r_addend = wrel[-1].r_addend;
d3e454b9
AM
8152
8153 /* Continue on as if we had a got reloc, to output
8154 dynamic reloc. */
8155 r_type = R_PPC_GOT16_LO;
8156 }
8157 else
8158 info->callbacks->einfo
8159 (_("%P: %H: error: %s with unexpected instruction %x\n"),
8160 input_bfd, input_section, rel->r_offset,
8161 "R_PPC_ADDR16_HA", insn);
8162 }
8163 else if (r_type == R_PPC_ADDR16_LO)
8164 {
8165 insn = bfd_get_32 (output_bfd,
8166 contents + rel->r_offset - d_offset);
8167 if ((insn & (0x3f << 26)) == 14u << 26 /* addi */
8168 || (insn & (0x3f << 26)) == 32u << 26 /* lwz */
8169 || (insn & (0x3f << 26)) == 34u << 26 /* lbz */
8170 || (insn & (0x3f << 26)) == 36u << 26 /* stw */
8171 || (insn & (0x3f << 26)) == 38u << 26 /* stb */
8172 || (insn & (0x3f << 26)) == 40u << 26 /* lhz */
8173 || (insn & (0x3f << 26)) == 42u << 26 /* lha */
8174 || (insn & (0x3f << 26)) == 44u << 26 /* sth */
8175 || (insn & (0x3f << 26)) == 46u << 26 /* lmw */
8176 || (insn & (0x3f << 26)) == 47u << 26 /* stmw */
8177 || (insn & (0x3f << 26)) == 48u << 26 /* lfs */
8178 || (insn & (0x3f << 26)) == 50u << 26 /* lfd */
8179 || (insn & (0x3f << 26)) == 52u << 26 /* stfs */
8180 || (insn & (0x3f << 26)) == 54u << 26 /* stfd */
8181 || ((insn & (0x3f << 26)) == 58u << 26 /* lwa,ld,lmd */
8182 && (insn & 3) != 1)
8183 || ((insn & (0x3f << 26)) == 62u << 26 /* std, stmd */
8184 && ((insn & 3) == 0 || (insn & 3) == 3)))
8185 {
8186 /* Arrange to apply the reloc addend, if any. */
8187 relocation = 0;
8188 unresolved_reloc = FALSE;
8189 rel->r_info = ELF32_R_INFO (0, r_type);
8190 }
8191 else
8192 info->callbacks->einfo
8193 (_("%P: %H: error: %s with unexpected instruction %x\n"),
8194 input_bfd, input_section, rel->r_offset,
8195 "R_PPC_ADDR16_LO", insn);
8196 }
8197 }
8198
e054468f 8199 ifunc = NULL;
25f23106 8200 if (!htab->is_vxworks)
e054468f 8201 {
de972ffa
AM
8202 struct plt_entry *ent;
8203
e054468f
AM
8204 if (h != NULL)
8205 {
8206 if (h->type == STT_GNU_IFUNC)
8207 ifunc = &h->plt.plist;
8208 }
de972ffa
AM
8209 else if (local_got_offsets != NULL
8210 && ELF_ST_TYPE (sym->st_info) == STT_GNU_IFUNC)
e054468f 8211 {
de972ffa 8212 struct plt_entry **local_plt;
e054468f 8213
de972ffa
AM
8214 local_plt = (struct plt_entry **) (local_got_offsets
8215 + symtab_hdr->sh_info);
8216 ifunc = local_plt + r_symndx;
e054468f 8217 }
e054468f 8218
de972ffa
AM
8219 ent = NULL;
8220 if (ifunc != NULL
0e1862bb 8221 && (!bfd_link_pic (info)
de972ffa
AM
8222 || is_branch_reloc (r_type)))
8223 {
8224 addend = 0;
0e1862bb 8225 if (r_type == R_PPC_PLTREL24 && bfd_link_pic (info))
de972ffa
AM
8226 addend = rel->r_addend;
8227 ent = find_plt_ent (ifunc, got2, addend);
8228 }
8229 if (ent != NULL)
8230 {
e054468f
AM
8231 if (h == NULL && (ent->plt.offset & 1) == 0)
8232 {
8233 Elf_Internal_Rela rela;
8234 bfd_byte *loc;
8235
8236 rela.r_offset = (htab->iplt->output_section->vma
8237 + htab->iplt->output_offset
8238 + ent->plt.offset);
8239 rela.r_info = ELF32_R_INFO (0, R_PPC_IRELATIVE);
8240 rela.r_addend = relocation;
25f23106
AM
8241 loc = htab->reliplt->contents;
8242 loc += (htab->reliplt->reloc_count++
8243 * sizeof (Elf32_External_Rela));
e054468f
AM
8244 bfd_elf32_swap_reloca_out (output_bfd, &rela, loc);
8245
8246 ent->plt.offset |= 1;
8247 }
8248 if (h == NULL && (ent->glink_offset & 1) == 0)
8249 {
a7f2871e
AM
8250 unsigned char *p = ((unsigned char *) htab->glink->contents
8251 + ent->glink_offset);
8252 write_glink_stub (ent, htab->iplt, p, info);
e054468f
AM
8253 ent->glink_offset |= 1;
8254 }
8255
8256 unresolved_reloc = FALSE;
8257 if (htab->plt_type == PLT_NEW
8258 || !htab->elf.dynamic_sections_created
c7e17e05
AM
8259 || h == NULL
8260 || h->dynindx == -1)
e054468f
AM
8261 relocation = (htab->glink->output_section->vma
8262 + htab->glink->output_offset
8263 + (ent->glink_offset & ~1));
8264 else
8265 relocation = (htab->plt->output_section->vma
8266 + htab->plt->output_offset
8267 + ent->plt.offset);
8268 }
8269 }
8270
7619e7c7
AM
8271 addend = rel->r_addend;
8272 tls_type = 0;
8273 howto = NULL;
55fd94b0
AM
8274 if (r_type < R_PPC_max)
8275 howto = ppc_elf_howto_table[r_type];
7619e7c7 8276 switch (r_type)
252b5132
RH
8277 {
8278 default:
25f53a85 8279 info->callbacks->einfo
8de848d8 8280 (_("%P: %B: unknown relocation type %d for symbol %s\n"),
d003868e 8281 input_bfd, (int) r_type, sym_name);
252b5132
RH
8282
8283 bfd_set_error (bfd_error_bad_value);
b34976b6 8284 ret = FALSE;
c316a17c 8285 goto copy_reloc;
252b5132 8286
7619e7c7
AM
8287 case R_PPC_NONE:
8288 case R_PPC_TLS:
727fc41e
AM
8289 case R_PPC_TLSGD:
8290 case R_PPC_TLSLD:
7619e7c7
AM
8291 case R_PPC_EMB_MRKREF:
8292 case R_PPC_GNU_VTINHERIT:
8293 case R_PPC_GNU_VTENTRY:
c316a17c 8294 goto copy_reloc;
7595d193 8295
7619e7c7
AM
8296 /* GOT16 relocations. Like an ADDR16 using the symbol's
8297 address in the GOT as relocation value instead of the
8298 symbol's value itself. Also, create a GOT entry for the
8299 symbol and put the symbol value there. */
8300 case R_PPC_GOT_TLSGD16:
8301 case R_PPC_GOT_TLSGD16_LO:
8302 case R_PPC_GOT_TLSGD16_HI:
8303 case R_PPC_GOT_TLSGD16_HA:
8304 tls_type = TLS_TLS | TLS_GD;
8305 goto dogot;
8306
8307 case R_PPC_GOT_TLSLD16:
8308 case R_PPC_GOT_TLSLD16_LO:
8309 case R_PPC_GOT_TLSLD16_HI:
8310 case R_PPC_GOT_TLSLD16_HA:
8311 tls_type = TLS_TLS | TLS_LD;
8312 goto dogot;
8313
8314 case R_PPC_GOT_TPREL16:
8315 case R_PPC_GOT_TPREL16_LO:
8316 case R_PPC_GOT_TPREL16_HI:
8317 case R_PPC_GOT_TPREL16_HA:
8318 tls_type = TLS_TLS | TLS_TPREL;
8319 goto dogot;
8320
8321 case R_PPC_GOT_DTPREL16:
8322 case R_PPC_GOT_DTPREL16_LO:
8323 case R_PPC_GOT_DTPREL16_HI:
8324 case R_PPC_GOT_DTPREL16_HA:
8325 tls_type = TLS_TLS | TLS_DTPREL;
8326 goto dogot;
8327
8328 case R_PPC_GOT16:
8329 case R_PPC_GOT16_LO:
8330 case R_PPC_GOT16_HI:
8331 case R_PPC_GOT16_HA:
727fc41e 8332 tls_mask = 0;
7619e7c7
AM
8333 dogot:
8334 {
8335 /* Relocation is to the entry for this symbol in the global
8336 offset table. */
8337 bfd_vma off;
8338 bfd_vma *offp;
8339 unsigned long indx;
8340
8341 if (htab->got == NULL)
8342 abort ();
8343
8344 indx = 0;
8345 if (tls_type == (TLS_TLS | TLS_LD)
d881513a 8346 && (h == NULL
f5385ebf 8347 || !h->def_dynamic))
7619e7c7
AM
8348 offp = &htab->tlsld_got.offset;
8349 else if (h != NULL)
8350 {
8351 bfd_boolean dyn;
8352 dyn = htab->elf.dynamic_sections_created;
0e1862bb
L
8353 if (! WILL_CALL_FINISH_DYNAMIC_SYMBOL (dyn, bfd_link_pic (info), h)
8354 || (bfd_link_pic (info)
7619e7c7
AM
8355 && SYMBOL_REFERENCES_LOCAL (info, h)))
8356 /* This is actually a static link, or it is a
8357 -Bsymbolic link and the symbol is defined
8358 locally, or the symbol was forced to be local
8359 because of a version file. */
8360 ;
8361 else
8362 {
14acf4dc 8363 BFD_ASSERT (h->dynindx != -1);
7619e7c7
AM
8364 indx = h->dynindx;
8365 unresolved_reloc = FALSE;
8366 }
8367 offp = &h->got.offset;
8368 }
8369 else
8370 {
8371 if (local_got_offsets == NULL)
8372 abort ();
8373 offp = &local_got_offsets[r_symndx];
8374 }
8375
8376 /* The offset must always be a multiple of 4. We use the
8377 least significant bit to record whether we have already
8378 processed this entry. */
8379 off = *offp;
8380 if ((off & 1) != 0)
8381 off &= ~1;
8382 else
8383 {
70bccea4
AM
8384 unsigned int tls_m = (tls_mask
8385 & (TLS_LD | TLS_GD | TLS_DTPREL
8386 | TLS_TPREL | TLS_TPRELGD));
8387
8388 if (offp == &htab->tlsld_got.offset)
8389 tls_m = TLS_LD;
8390 else if (h == NULL
f5385ebf 8391 || !h->def_dynamic)
70bccea4
AM
8392 tls_m &= ~TLS_LD;
8393
8394 /* We might have multiple got entries for this sym.
8395 Initialize them all. */
8396 do
7619e7c7 8397 {
70bccea4
AM
8398 int tls_ty = 0;
8399
8400 if ((tls_m & TLS_LD) != 0)
7619e7c7 8401 {
70bccea4
AM
8402 tls_ty = TLS_TLS | TLS_LD;
8403 tls_m &= ~TLS_LD;
8404 }
8405 else if ((tls_m & TLS_GD) != 0)
8406 {
8407 tls_ty = TLS_TLS | TLS_GD;
8408 tls_m &= ~TLS_GD;
8409 }
8410 else if ((tls_m & TLS_DTPREL) != 0)
8411 {
8412 tls_ty = TLS_TLS | TLS_DTPREL;
8413 tls_m &= ~TLS_DTPREL;
8414 }
8415 else if ((tls_m & (TLS_TPREL | TLS_TPRELGD)) != 0)
8416 {
8417 tls_ty = TLS_TLS | TLS_TPREL;
8418 tls_m = 0;
7619e7c7 8419 }
7619e7c7 8420
70bccea4 8421 /* Generate relocs for the dynamic linker. */
0e1862bb 8422 if ((bfd_link_pic (info) || indx != 0)
d6e14abc
AM
8423 && (offp == &htab->tlsld_got.offset
8424 || h == NULL
4e795f50
AM
8425 || ELF_ST_VISIBILITY (h->other) == STV_DEFAULT
8426 || h->root.type != bfd_link_hash_undefweak))
7619e7c7 8427 {
91e21fb7 8428 asection *rsec = htab->relgot;
91d6fa6a 8429 bfd_byte * loc;
91e21fb7 8430
0bed072f
AM
8431 if (ifunc != NULL)
8432 rsec = htab->reliplt;
70bccea4
AM
8433 outrel.r_offset = (htab->got->output_section->vma
8434 + htab->got->output_offset
8435 + off);
e515b051 8436 outrel.r_addend = 0;
70bccea4
AM
8437 if (tls_ty & (TLS_LD | TLS_GD))
8438 {
8439 outrel.r_info = ELF32_R_INFO (indx, R_PPC_DTPMOD32);
70bccea4
AM
8440 if (tls_ty == (TLS_TLS | TLS_GD))
8441 {
25f23106
AM
8442 loc = rsec->contents;
8443 loc += (rsec->reloc_count++
70bccea4
AM
8444 * sizeof (Elf32_External_Rela));
8445 bfd_elf32_swap_reloca_out (output_bfd,
8446 &outrel, loc);
e515b051 8447 outrel.r_offset += 4;
70bccea4
AM
8448 outrel.r_info
8449 = ELF32_R_INFO (indx, R_PPC_DTPREL32);
70bccea4
AM
8450 }
8451 }
8452 else if (tls_ty == (TLS_TLS | TLS_DTPREL))
8453 outrel.r_info = ELF32_R_INFO (indx, R_PPC_DTPREL32);
8454 else if (tls_ty == (TLS_TLS | TLS_TPREL))
8455 outrel.r_info = ELF32_R_INFO (indx, R_PPC_TPREL32);
25f23106 8456 else if (indx != 0)
70bccea4 8457 outrel.r_info = ELF32_R_INFO (indx, R_PPC_GLOB_DAT);
25f23106
AM
8458 else if (ifunc != NULL)
8459 outrel.r_info = ELF32_R_INFO (0, R_PPC_IRELATIVE);
8460 else
8461 outrel.r_info = ELF32_R_INFO (0, R_PPC_RELATIVE);
d6e14abc 8462 if (indx == 0 && tls_ty != (TLS_TLS | TLS_LD))
e515b051
AM
8463 {
8464 outrel.r_addend += relocation;
8465 if (tls_ty & (TLS_GD | TLS_DTPREL | TLS_TPREL))
989f9879
AM
8466 {
8467 if (htab->elf.tls_sec == NULL)
8468 outrel.r_addend = 0;
8469 else
8470 outrel.r_addend -= htab->elf.tls_sec->vma;
8471 }
e515b051 8472 }
25f23106
AM
8473 loc = rsec->contents;
8474 loc += (rsec->reloc_count++
70bccea4
AM
8475 * sizeof (Elf32_External_Rela));
8476 bfd_elf32_swap_reloca_out (output_bfd, &outrel, loc);
7619e7c7
AM
8477 }
8478
70bccea4
AM
8479 /* Init the .got section contents if we're not
8480 emitting a reloc. */
8481 else
7619e7c7 8482 {
70bccea4
AM
8483 bfd_vma value = relocation;
8484
7b609f53
AM
8485 if (tls_ty == (TLS_TLS | TLS_LD))
8486 value = 1;
8487 else if (tls_ty != 0)
70bccea4 8488 {
989f9879
AM
8489 if (htab->elf.tls_sec == NULL)
8490 value = 0;
8491 else
8492 {
8493 value -= htab->elf.tls_sec->vma + DTP_OFFSET;
8494 if (tls_ty == (TLS_TLS | TLS_TPREL))
8495 value += DTP_OFFSET - TP_OFFSET;
8496 }
70bccea4 8497
7b609f53
AM
8498 if (tls_ty == (TLS_TLS | TLS_GD))
8499 {
8500 bfd_put_32 (output_bfd, value,
8501 htab->got->contents + off + 4);
8502 value = 1;
8503 }
70bccea4 8504 }
70bccea4
AM
8505 bfd_put_32 (output_bfd, value,
8506 htab->got->contents + off);
7619e7c7 8507 }
70bccea4
AM
8508
8509 off += 4;
8510 if (tls_ty & (TLS_LD | TLS_GD))
8511 off += 4;
7619e7c7 8512 }
70bccea4
AM
8513 while (tls_m != 0);
8514
8515 off = *offp;
8516 *offp = off | 1;
7619e7c7
AM
8517 }
8518
8519 if (off >= (bfd_vma) -2)
8520 abort ();
8521
70bccea4
AM
8522 if ((tls_type & TLS_TLS) != 0)
8523 {
8524 if (tls_type != (TLS_TLS | TLS_LD))
8525 {
8526 if ((tls_mask & TLS_LD) != 0
8527 && !(h == NULL
f5385ebf 8528 || !h->def_dynamic))
70bccea4
AM
8529 off += 8;
8530 if (tls_type != (TLS_TLS | TLS_GD))
8531 {
8532 if ((tls_mask & TLS_GD) != 0)
8533 off += 8;
8534 if (tls_type != (TLS_TLS | TLS_DTPREL))
8535 {
8536 if ((tls_mask & TLS_DTPREL) != 0)
8537 off += 4;
8538 }
8539 }
8540 }
8541 }
8542
d3e454b9
AM
8543 /* If here for a picfixup, we're done. */
8544 if (r_type != ELF32_R_TYPE (rel->r_info))
c316a17c 8545 goto copy_reloc;
d3e454b9 8546
e87d4038
AM
8547 relocation = (htab->got->output_section->vma
8548 + htab->got->output_offset
8549 + off
8550 - SYM_VAL (htab->elf.hgot));
7619e7c7
AM
8551
8552 /* Addends on got relocations don't make much sense.
8553 x+off@got is actually x@got+off, and since the got is
8554 generated by a hash table traversal, the value in the
8555 got at entry m+n bears little relation to the entry m. */
8556 if (addend != 0)
25f53a85 8557 info->callbacks->einfo
8de848d8 8558 (_("%P: %H: non-zero addend on %s reloc against `%s'\n"),
25f53a85 8559 input_bfd, input_section, rel->r_offset,
7b609f53 8560 howto->name,
7619e7c7
AM
8561 sym_name);
8562 }
86c95733 8563 break;
7619e7c7 8564
86c95733 8565 /* Relocations that need no special processing. */
7619e7c7 8566 case R_PPC_LOCAL24PC:
252b5132
RH
8567 /* It makes no sense to point a local relocation
8568 at a symbol not in this object. */
7b609f53 8569 if (unresolved_reloc)
252b5132 8570 {
464e1740
ILT
8571 if (! (*info->callbacks->undefined_symbol) (info,
8572 h->root.root.string,
8573 input_bfd,
8574 input_section,
5cc7c785 8575 rel->r_offset,
b34976b6
AM
8576 TRUE))
8577 return FALSE;
c316a17c 8578 goto copy_reloc;
252b5132
RH
8579 }
8580 break;
8581
7619e7c7
AM
8582 case R_PPC_DTPREL16:
8583 case R_PPC_DTPREL16_LO:
8584 case R_PPC_DTPREL16_HI:
8585 case R_PPC_DTPREL16_HA:
989f9879
AM
8586 if (htab->elf.tls_sec != NULL)
8587 addend -= htab->elf.tls_sec->vma + DTP_OFFSET;
7619e7c7
AM
8588 break;
8589
70bccea4
AM
8590 /* Relocations that may need to be propagated if this is a shared
8591 object. */
7619e7c7
AM
8592 case R_PPC_TPREL16:
8593 case R_PPC_TPREL16_LO:
8594 case R_PPC_TPREL16_HI:
8595 case R_PPC_TPREL16_HA:
766bc656
AM
8596 if (h != NULL
8597 && h->root.type == bfd_link_hash_undefweak
8598 && h->dynindx == -1)
8599 {
8600 /* Make this relocation against an undefined weak symbol
8601 resolve to zero. This is really just a tweak, since
8602 code using weak externs ought to check that they are
8603 defined before using them. */
8604 bfd_byte *p = contents + rel->r_offset - d_offset;
8605 unsigned int insn = bfd_get_32 (output_bfd, p);
8606 insn = _bfd_elf_ppc_at_tprel_transform (insn, 2);
8607 if (insn != 0)
8608 bfd_put_32 (output_bfd, insn, p);
8609 break;
8610 }
989f9879
AM
8611 if (htab->elf.tls_sec != NULL)
8612 addend -= htab->elf.tls_sec->vma + TP_OFFSET;
7619e7c7
AM
8613 /* The TPREL16 relocs shouldn't really be used in shared
8614 libs as they will result in DT_TEXTREL being set, but
8615 support them anyway. */
8616 goto dodyn;
8617
8618 case R_PPC_TPREL32:
989f9879
AM
8619 if (htab->elf.tls_sec != NULL)
8620 addend -= htab->elf.tls_sec->vma + TP_OFFSET;
7619e7c7
AM
8621 goto dodyn;
8622
8623 case R_PPC_DTPREL32:
989f9879
AM
8624 if (htab->elf.tls_sec != NULL)
8625 addend -= htab->elf.tls_sec->vma + DTP_OFFSET;
7619e7c7
AM
8626 goto dodyn;
8627
e515b051
AM
8628 case R_PPC_DTPMOD32:
8629 relocation = 1;
8630 addend = 0;
8631 goto dodyn;
8632
d7128ce4
AM
8633 case R_PPC_REL16:
8634 case R_PPC_REL16_LO:
8635 case R_PPC_REL16_HI:
8636 case R_PPC_REL16_HA:
a680de9a 8637 case R_PPC_REL16DX_HA:
d7128ce4
AM
8638 break;
8639
7619e7c7 8640 case R_PPC_REL32:
625af618
AM
8641 if (h == NULL || h == htab->elf.hgot)
8642 break;
8643 /* fall through */
8644
8645 case R_PPC_ADDR32:
8646 case R_PPC_ADDR16:
8647 case R_PPC_ADDR16_LO:
8648 case R_PPC_ADDR16_HI:
8649 case R_PPC_ADDR16_HA:
8650 case R_PPC_UADDR32:
8651 case R_PPC_UADDR16:
8652 goto dodyn;
8653
b9c361e0
JL
8654 case R_PPC_VLE_REL8:
8655 case R_PPC_VLE_REL15:
8656 case R_PPC_VLE_REL24:
625af618 8657 case R_PPC_REL24:
7619e7c7
AM
8658 case R_PPC_REL14:
8659 case R_PPC_REL14_BRTAKEN:
8660 case R_PPC_REL14_BRNTAKEN:
252b5132
RH
8661 /* If these relocations are not to a named symbol, they can be
8662 handled right here, no need to bother the dynamic linker. */
89200bf8 8663 if (SYMBOL_CALLS_LOCAL (info, h)
3b36f7e6 8664 || h == htab->elf.hgot)
252b5132 8665 break;
70bccea4 8666 /* fall through */
252b5132 8667
7619e7c7 8668 case R_PPC_ADDR24:
7619e7c7
AM
8669 case R_PPC_ADDR14:
8670 case R_PPC_ADDR14_BRTAKEN:
8671 case R_PPC_ADDR14_BRNTAKEN:
0e1862bb 8672 if (h != NULL && !bfd_link_pic (info))
625af618
AM
8673 break;
8674 /* fall through */
8675
7619e7c7 8676 dodyn:
3348747a
NS
8677 if ((input_section->flags & SEC_ALLOC) == 0
8678 || is_vxworks_tls)
c87b5a93 8679 break;
c87b5a93 8680
0e1862bb 8681 if ((bfd_link_pic (info)
89200bf8
AM
8682 && !(h != NULL
8683 && ((h->root.type == bfd_link_hash_undefined
8684 && (ELF_ST_VISIBILITY (h->other) == STV_HIDDEN
8685 || ELF_ST_VISIBILITY (h->other) == STV_INTERNAL))
8686 || (h->root.type == bfd_link_hash_undefweak
8687 && ELF_ST_VISIBILITY (h->other) != STV_DEFAULT)))
1d483afe 8688 && (must_be_dyn_reloc (info, r_type)
f6c52c13 8689 || !SYMBOL_CALLS_LOCAL (info, h)))
ee05f2fe 8690 || (ELIMINATE_COPY_RELOCS
0e1862bb 8691 && !bfd_link_pic (info)
ee05f2fe
AM
8692 && h != NULL
8693 && h->dynindx != -1
f5385ebf 8694 && !h->non_got_ref
d3e454b9
AM
8695 && !h->def_regular
8696 && !(h->protected_def
8697 && ppc_elf_hash_entry (h)->has_addr16_ha
8698 && ppc_elf_hash_entry (h)->has_addr16_lo
8699 && htab->params->pic_fixup > 0)))
252b5132 8700 {
0bb2d96a 8701 int skip;
f95f8542
AM
8702 bfd_byte *loc;
8703 asection *sreloc;
252b5132 8704#ifdef DEBUG
55fd94b0
AM
8705 fprintf (stderr, "ppc_elf_relocate_section needs to "
8706 "create relocation for %s\n",
70bccea4
AM
8707 (h && h->root.root.string
8708 ? h->root.root.string : "<unknown>"));
252b5132
RH
8709#endif
8710
8711 /* When generating a shared object, these relocations
70bccea4
AM
8712 are copied into the output file to be resolved at run
8713 time. */
f95f8542
AM
8714 sreloc = elf_section_data (input_section)->sreloc;
8715 if (ifunc)
8716 sreloc = htab->reliplt;
252b5132 8717 if (sreloc == NULL)
f95f8542 8718 return FALSE;
252b5132 8719
0bb2d96a 8720 skip = 0;
5b914448
AM
8721 outrel.r_offset = _bfd_elf_section_offset (output_bfd, info,
8722 input_section,
8723 rel->r_offset);
0bb2d96a
JJ
8724 if (outrel.r_offset == (bfd_vma) -1
8725 || outrel.r_offset == (bfd_vma) -2)
8726 skip = (int) outrel.r_offset;
252b5132
RH
8727 outrel.r_offset += (input_section->output_section->vma
8728 + input_section->output_offset);
8729
8730 if (skip)
8731 memset (&outrel, 0, sizeof outrel);
89200bf8
AM
8732 else if ((h != NULL
8733 && (h->root.type == bfd_link_hash_undefined
8734 || h->root.type == bfd_link_hash_undefweak))
8735 || !SYMBOL_REFERENCES_LOCAL (info, h))
252b5132 8736 {
14acf4dc 8737 BFD_ASSERT (h->dynindx != -1);
7619e7c7 8738 unresolved_reloc = FALSE;
252b5132
RH
8739 outrel.r_info = ELF32_R_INFO (h->dynindx, r_type);
8740 outrel.r_addend = rel->r_addend;
8741 }
8742 else
8743 {
47388f4c
AM
8744 outrel.r_addend = relocation + rel->r_addend;
8745
25f23106 8746 if (r_type != R_PPC_ADDR32)
252b5132 8747 {
89200bf8 8748 long indx = 0;
252b5132 8749
25f23106
AM
8750 if (ifunc != NULL)
8751 {
8752 /* If we get here when building a static
8753 executable, then the libc startup function
8754 responsible for applying indirect function
8755 relocations is going to complain about
8756 the reloc type.
8757 If we get here when building a dynamic
8758 executable, it will be because we have
8759 a text relocation. The dynamic loader
8760 will set the text segment writable and
8761 non-executable to apply text relocations.
8762 So we'll segfault when trying to run the
8763 indirection function to resolve the reloc. */
25f53a85 8764 info->callbacks->einfo
8de848d8 8765 (_("%P: %H: relocation %s for indirect "
25f53a85
AM
8766 "function %s unsupported\n"),
8767 input_bfd, input_section, rel->r_offset,
25f23106
AM
8768 howto->name,
8769 sym_name);
8770 ret = FALSE;
8771 }
cf35638d 8772 else if (r_symndx == STN_UNDEF || bfd_is_abs_section (sec))
89200bf8 8773 ;
252b5132
RH
8774 else if (sec == NULL || sec->owner == NULL)
8775 {
8776 bfd_set_error (bfd_error_bad_value);
89200bf8 8777 ret = FALSE;
252b5132
RH
8778 }
8779 else
8780 {
8781 asection *osec;
8782
47388f4c
AM
8783 /* We are turning this relocation into one
8784 against a section symbol. It would be
8785 proper to subtract the symbol's value,
8786 osec->vma, from the emitted reloc addend,
25f23106
AM
8787 but ld.so expects buggy relocs.
8788 FIXME: Why not always use a zero index? */
252b5132
RH
8789 osec = sec->output_section;
8790 indx = elf_section_data (osec)->dynindx;
74541ad4
AM
8791 if (indx == 0)
8792 {
8793 osec = htab->elf.text_index_section;
8794 indx = elf_section_data (osec)->dynindx;
8795 }
8796 BFD_ASSERT (indx != 0);
252b5132 8797#ifdef DEBUG
74541ad4 8798 if (indx == 0)
e460dd0d 8799 printf ("indx=%ld section=%s flags=%08x name=%s\n",
55fd94b0
AM
8800 indx, osec->name, osec->flags,
8801 h->root.root.string);
252b5132
RH
8802#endif
8803 }
8804
8805 outrel.r_info = ELF32_R_INFO (indx, r_type);
252b5132 8806 }
25f23106
AM
8807 else if (ifunc != NULL)
8808 outrel.r_info = ELF32_R_INFO (0, R_PPC_IRELATIVE);
8809 else
8810 outrel.r_info = ELF32_R_INFO (0, R_PPC_RELATIVE);
252b5132
RH
8811 }
8812
947216bf
AM
8813 loc = sreloc->contents;
8814 loc += sreloc->reloc_count++ * sizeof (Elf32_External_Rela);
8815 bfd_elf32_swap_reloca_out (output_bfd, &outrel, loc);
252b5132 8816
2243deae 8817 if (skip == -1)
c316a17c 8818 goto copy_reloc;
2243deae
L
8819
8820 /* This reloc will be computed at runtime. We clear the memory
8821 so that it contains predictable value. */
8822 if (! skip
8823 && ((input_section->flags & SEC_ALLOC) != 0
8824 || ELF32_R_TYPE (outrel.r_info) != R_PPC_RELATIVE))
8825 {
8826 relocation = howto->pc_relative ? outrel.r_offset : 0;
8827 addend = 0;
8828 break;
8829 }
252b5132 8830 }
252b5132
RH
8831 break;
8832
32af9f6e
AM
8833 case R_PPC_RELAX_PLT:
8834 case R_PPC_RELAX_PLTREL24:
de972ffa
AM
8835 if (h != NULL)
8836 {
32af9f6e
AM
8837 struct plt_entry *ent;
8838 bfd_vma got2_addend = 0;
8839
8840 if (r_type == R_PPC_RELAX_PLTREL24)
8841 {
0e1862bb 8842 if (bfd_link_pic (info))
32af9f6e
AM
8843 got2_addend = addend;
8844 addend = 0;
8845 }
8846 ent = find_plt_ent (&h->plt.plist, got2, got2_addend);
de972ffa
AM
8847 if (htab->plt_type == PLT_NEW)
8848 relocation = (htab->glink->output_section->vma
8849 + htab->glink->output_offset
8850 + ent->glink_offset);
8851 else
8852 relocation = (htab->plt->output_section->vma
8853 + htab->plt->output_offset
8854 + ent->plt.offset);
8855 }
b4a38de6
AM
8856 /* Fall thru */
8857
32af9f6e 8858 case R_PPC_RELAX:
9abc968f 8859 {
53291d1f
AM
8860 const int *stub;
8861 size_t size;
8862 size_t insn_offset = rel->r_offset;
8863 unsigned int insn;
9abc968f 8864
0e1862bb 8865 if (bfd_link_pic (info))
53291d1f
AM
8866 {
8867 relocation -= (input_section->output_section->vma
8868 + input_section->output_offset
8869 + rel->r_offset - 4);
8870 stub = shared_stub_entry;
8871 bfd_put_32 (output_bfd, stub[0], contents + insn_offset - 12);
8872 bfd_put_32 (output_bfd, stub[1], contents + insn_offset - 8);
8873 bfd_put_32 (output_bfd, stub[2], contents + insn_offset - 4);
8874 stub += 3;
8875 size = ARRAY_SIZE (shared_stub_entry) - 3;
8876 }
8877 else
8878 {
8879 stub = stub_entry;
8880 size = ARRAY_SIZE (stub_entry);
8881 }
9abc968f 8882
9abc968f 8883 relocation += addend;
0e1862bb 8884 if (bfd_link_relocatable (info))
53291d1f
AM
8885 relocation = 0;
8886
8887 /* First insn is HA, second is LO. */
8888 insn = *stub++;
8889 insn |= ((relocation + 0x8000) >> 16) & 0xffff;
8890 bfd_put_32 (output_bfd, insn, contents + insn_offset);
8891 insn_offset += 4;
8892
8893 insn = *stub++;
8894 insn |= relocation & 0xffff;
8895 bfd_put_32 (output_bfd, insn, contents + insn_offset);
8896 insn_offset += 4;
8897 size -= 2;
8898
8899 while (size != 0)
8900 {
8901 insn = *stub++;
8902 --size;
8903 bfd_put_32 (output_bfd, insn, contents + insn_offset);
8904 insn_offset += 4;
8905 }
9bc4e62b
NS
8906
8907 /* Rewrite the reloc and convert one of the trailing nop
8908 relocs to describe this relocation. */
8909 BFD_ASSERT (ELF32_R_TYPE (relend[-1].r_info) == R_PPC_NONE);
8910 /* The relocs are at the bottom 2 bytes */
c316a17c
AM
8911 wrel->r_offset = rel->r_offset + d_offset;
8912 wrel->r_info = ELF32_R_INFO (r_symndx, R_PPC_ADDR16_HA);
8913 wrel->r_addend = rel->r_addend;
8914 memmove (wrel + 1, wrel, (relend - wrel - 1) * sizeof (*wrel));
8915 wrel++, rel++;
8916 wrel->r_offset += 4;
8917 wrel->r_info = ELF32_R_INFO (r_symndx, R_PPC_ADDR16_LO);
9abc968f 8918 }
8517fae7 8919 continue;
deaaf2f3 8920
70bccea4 8921 /* Indirect .sdata relocation. */
7619e7c7 8922 case R_PPC_EMB_SDAI16:
c9a2f333 8923 BFD_ASSERT (htab->sdata[0].section != NULL);
bd6c6e2b
AM
8924 if (!is_static_defined (htab->sdata[0].sym))
8925 {
8926 unresolved_reloc = TRUE;
8927 break;
8928 }
7619e7c7 8929 relocation
76750a2f
AM
8930 = elf_finish_pointer_linker_section (input_bfd, &htab->sdata[0],
8931 h, relocation, rel);
bd6c6e2b 8932 addend = 0;
252b5132
RH
8933 break;
8934
70bccea4 8935 /* Indirect .sdata2 relocation. */
7619e7c7 8936 case R_PPC_EMB_SDA2I16:
c9a2f333 8937 BFD_ASSERT (htab->sdata[1].section != NULL);
bd6c6e2b
AM
8938 if (!is_static_defined (htab->sdata[1].sym))
8939 {
8940 unresolved_reloc = TRUE;
8941 break;
8942 }
7619e7c7 8943 relocation
76750a2f
AM
8944 = elf_finish_pointer_linker_section (input_bfd, &htab->sdata[1],
8945 h, relocation, rel);
bd6c6e2b 8946 addend = 0;
252b5132
RH
8947 break;
8948
70bccea4
AM
8949 /* Handle the TOC16 reloc. We want to use the offset within the .got
8950 section, not the actual VMA. This is appropriate when generating
8951 an embedded ELF object, for which the .got section acts like the
8952 AIX .toc section. */
7619e7c7 8953 case R_PPC_TOC16: /* phony GOT16 relocations */
3b4f3a11
AM
8954 if (sec == NULL || sec->output_section == NULL)
8955 {
8956 unresolved_reloc = TRUE;
8957 break;
8958 }
a0f49396
NC
8959 BFD_ASSERT (strcmp (bfd_get_section_name (sec->owner, sec),
8960 ".got") == 0
8961 || strcmp (bfd_get_section_name (sec->owner, sec),
8962 ".cgot") == 0);
252b5132 8963
3b4f3a11 8964 addend -= sec->output_section->vma + sec->output_offset + 0x8000;
252b5132
RH
8965 break;
8966
7619e7c7 8967 case R_PPC_PLTREL24:
f75e0e33
AM
8968 if (h != NULL && ifunc == NULL)
8969 {
cbf95972
AM
8970 struct plt_entry *ent;
8971
8972 ent = find_plt_ent (&h->plt.plist, got2,
8973 bfd_link_pic (info) ? addend : 0);
f75e0e33
AM
8974 if (ent == NULL
8975 || htab->plt == NULL)
8976 {
8977 /* We didn't make a PLT entry for this symbol. This
8978 happens when statically linking PIC code, or when
8979 using -Bsymbolic. */
8980 }
8981 else
8982 {
8983 /* Relocation is to the entry for this symbol in the
8984 procedure linkage table. */
8985 unresolved_reloc = FALSE;
8986 if (htab->plt_type == PLT_NEW)
8987 relocation = (htab->glink->output_section->vma
8988 + htab->glink->output_offset
8989 + ent->glink_offset);
8990 else
8991 relocation = (htab->plt->output_section->vma
8992 + htab->plt->output_offset
8993 + ent->plt.offset);
8994 }
8995 }
252b5132 8996
f75e0e33
AM
8997 /* R_PPC_PLTREL24 is rather special. If non-zero, the
8998 addend specifies the GOT pointer offset within .got2.
8999 Don't apply it to the relocation field. */
9000 addend = 0;
8da6118f 9001 break;
252b5132 9002
70bccea4 9003 /* Relocate against _SDA_BASE_. */
7619e7c7 9004 case R_PPC_SDAREL16:
252b5132
RH
9005 {
9006 const char *name;
bd6c6e2b 9007 struct elf_link_hash_entry *sda = htab->sdata[0].sym;
252b5132 9008
bd6c6e2b
AM
9009 if (sec == NULL
9010 || sec->output_section == NULL
9011 || !is_static_defined (sda))
3b4f3a11
AM
9012 {
9013 unresolved_reloc = TRUE;
9014 break;
9015 }
bd6c6e2b 9016 addend -= SYM_VAL (sda);
3b4f3a11 9017
a0f49396 9018 name = bfd_get_section_name (output_bfd, sec->output_section);
93d1b056
AM
9019 if (!(strcmp (name, ".sdata") == 0
9020 || strcmp (name, ".sbss") == 0))
252b5132 9021 {
25f53a85 9022 info->callbacks->einfo
8de848d8 9023 (_("%P: %B: the target (%s) of a %s relocation is "
25f53a85 9024 "in the wrong output section (%s)\n"),
d003868e 9025 input_bfd,
55fd94b0
AM
9026 sym_name,
9027 howto->name,
9028 name);
252b5132 9029 }
252b5132
RH
9030 }
9031 break;
9032
70bccea4 9033 /* Relocate against _SDA2_BASE_. */
7619e7c7 9034 case R_PPC_EMB_SDA2REL:
252b5132
RH
9035 {
9036 const char *name;
bd6c6e2b 9037 struct elf_link_hash_entry *sda = htab->sdata[1].sym;
252b5132 9038
bd6c6e2b
AM
9039 if (sec == NULL
9040 || sec->output_section == NULL
9041 || !is_static_defined (sda))
3b4f3a11
AM
9042 {
9043 unresolved_reloc = TRUE;
9044 break;
9045 }
bd6c6e2b 9046 addend -= SYM_VAL (sda);
3b4f3a11 9047
a0f49396 9048 name = bfd_get_section_name (output_bfd, sec->output_section);
93d1b056
AM
9049 if (!(strcmp (name, ".sdata2") == 0
9050 || strcmp (name, ".sbss2") == 0))
252b5132 9051 {
25f53a85 9052 info->callbacks->einfo
8de848d8 9053 (_("%P: %B: the target (%s) of a %s relocation is "
25f53a85 9054 "in the wrong output section (%s)\n"),
d003868e 9055 input_bfd,
55fd94b0
AM
9056 sym_name,
9057 howto->name,
9058 name);
252b5132 9059 }
252b5132
RH
9060 }
9061 break;
9062
b9c361e0 9063 case R_PPC_VLE_LO16A:
86c95733
AM
9064 relocation = relocation + addend;
9065 ppc_elf_vle_split16 (output_bfd, contents + rel->r_offset,
9066 relocation, split16a_type);
c316a17c 9067 goto copy_reloc;
b9c361e0
JL
9068
9069 case R_PPC_VLE_LO16D:
86c95733
AM
9070 relocation = relocation + addend;
9071 ppc_elf_vle_split16 (output_bfd, contents + rel->r_offset,
9072 relocation, split16d_type);
c316a17c 9073 goto copy_reloc;
b9c361e0
JL
9074
9075 case R_PPC_VLE_HI16A:
86c95733
AM
9076 relocation = (relocation + addend) >> 16;
9077 ppc_elf_vle_split16 (output_bfd, contents + rel->r_offset,
9078 relocation, split16a_type);
c316a17c 9079 goto copy_reloc;
b9c361e0
JL
9080
9081 case R_PPC_VLE_HI16D:
86c95733
AM
9082 relocation = (relocation + addend) >> 16;
9083 ppc_elf_vle_split16 (output_bfd, contents + rel->r_offset,
9084 relocation, split16d_type);
c316a17c 9085 goto copy_reloc;
b9c361e0
JL
9086
9087 case R_PPC_VLE_HA16A:
86c95733
AM
9088 relocation = (relocation + addend + 0x8000) >> 16;
9089 ppc_elf_vle_split16 (output_bfd, contents + rel->r_offset,
9090 relocation, split16a_type);
c316a17c 9091 goto copy_reloc;
b9c361e0
JL
9092
9093 case R_PPC_VLE_HA16D:
86c95733
AM
9094 relocation = (relocation + addend + 0x8000) >> 16;
9095 ppc_elf_vle_split16 (output_bfd, contents + rel->r_offset,
9096 relocation, split16d_type);
c316a17c 9097 goto copy_reloc;
b9c361e0 9098
70bccea4 9099 /* Relocate against either _SDA_BASE_, _SDA2_BASE_, or 0. */
7619e7c7 9100 case R_PPC_EMB_SDA21:
b9c361e0 9101 case R_PPC_VLE_SDA21:
7619e7c7 9102 case R_PPC_EMB_RELSDA:
b9c361e0 9103 case R_PPC_VLE_SDA21_LO:
252b5132
RH
9104 {
9105 const char *name;
9106 int reg;
86c95733 9107 unsigned int insn;
bd6c6e2b 9108 struct elf_link_hash_entry *sda = NULL;
252b5132 9109
3b4f3a11
AM
9110 if (sec == NULL || sec->output_section == NULL)
9111 {
9112 unresolved_reloc = TRUE;
9113 break;
9114 }
9115
a0f49396 9116 name = bfd_get_section_name (output_bfd, sec->output_section);
93d1b056
AM
9117 if (strcmp (name, ".sdata") == 0
9118 || strcmp (name, ".sbss") == 0)
252b5132
RH
9119 {
9120 reg = 13;
bd6c6e2b 9121 sda = htab->sdata[0].sym;
252b5132 9122 }
93d1b056
AM
9123 else if (strcmp (name, ".sdata2") == 0
9124 || strcmp (name, ".sbss2") == 0)
252b5132
RH
9125 {
9126 reg = 2;
bd6c6e2b 9127 sda = htab->sdata[1].sym;
252b5132 9128 }
8da6118f
KH
9129 else if (strcmp (name, ".PPC.EMB.sdata0") == 0
9130 || strcmp (name, ".PPC.EMB.sbss0") == 0)
252b5132
RH
9131 {
9132 reg = 0;
9133 }
252b5132
RH
9134 else
9135 {
25f53a85 9136 info->callbacks->einfo
8de848d8 9137 (_("%P: %B: the target (%s) of a %s relocation is "
25f53a85 9138 "in the wrong output section (%s)\n"),
d003868e 9139 input_bfd,
55fd94b0
AM
9140 sym_name,
9141 howto->name,
9142 name);
252b5132
RH
9143
9144 bfd_set_error (bfd_error_bad_value);
b34976b6 9145 ret = FALSE;
c316a17c 9146 goto copy_reloc;
252b5132
RH
9147 }
9148
bd6c6e2b
AM
9149 if (sda != NULL)
9150 {
9151 if (!is_static_defined (sda))
9152 {
9153 unresolved_reloc = TRUE;
9154 break;
9155 }
9156 addend -= SYM_VAL (sda);
9157 }
9158
86c95733 9159 insn = bfd_get_32 (output_bfd, contents + rel->r_offset);
b9c361e0
JL
9160 if (reg == 0
9161 && (r_type == R_PPC_VLE_SDA21
9162 || r_type == R_PPC_VLE_SDA21_LO))
9163 {
86c95733
AM
9164 relocation = relocation + addend;
9165 addend = 0;
9166
9167 /* Force e_li insn, keeping RT from original insn. */
9168 insn &= 0x1f << 21;
9169 insn |= 28u << 26;
9170
9171 /* We have an li20 field, bits 17..20, 11..15, 21..31. */
9172 /* Top 4 bits of value to 17..20. */
9173 insn |= (relocation & 0xf0000) >> 5;
9174 /* Next 5 bits of the value to 11..15. */
9175 insn |= (relocation & 0xf800) << 5;
9176 /* And the final 11 bits of the value to bits 21 to 31. */
9177 insn |= relocation & 0x7ff;
9178
c3301df1
AM
9179 bfd_put_32 (output_bfd, insn, contents + rel->r_offset);
9180
9181 if (r_type == R_PPC_VLE_SDA21
9182 && ((relocation + 0x80000) & 0xffffffff) > 0x100000)
9183 goto overflow;
c316a17c 9184 goto copy_reloc;
b9c361e0
JL
9185 }
9186 else if (r_type == R_PPC_EMB_SDA21
9187 || r_type == R_PPC_VLE_SDA21
9188 || r_type == R_PPC_VLE_SDA21_LO)
91d6fa6a 9189 {
86c95733 9190 /* Fill in register field. */
252b5132 9191 insn = (insn & ~RA_REGISTER_MASK) | (reg << RA_REGISTER_SHIFT);
252b5132 9192 }
86c95733 9193 bfd_put_32 (output_bfd, insn, contents + rel->r_offset);
252b5132
RH
9194 }
9195 break;
9196
b9c361e0
JL
9197 case R_PPC_VLE_SDAREL_LO16A:
9198 case R_PPC_VLE_SDAREL_LO16D:
9199 case R_PPC_VLE_SDAREL_HI16A:
9200 case R_PPC_VLE_SDAREL_HI16D:
9201 case R_PPC_VLE_SDAREL_HA16A:
9202 case R_PPC_VLE_SDAREL_HA16D:
9203 {
9204 bfd_vma value;
9205 const char *name;
9206 //int reg;
9207 struct elf_link_hash_entry *sda = NULL;
9208
9209 if (sec == NULL || sec->output_section == NULL)
9210 {
9211 unresolved_reloc = TRUE;
9212 break;
9213 }
9214
a0f49396 9215 name = bfd_get_section_name (output_bfd, sec->output_section);
93d1b056
AM
9216 if (strcmp (name, ".sdata") == 0
9217 || strcmp (name, ".sbss") == 0)
b9c361e0
JL
9218 {
9219 //reg = 13;
9220 sda = htab->sdata[0].sym;
9221 }
93d1b056
AM
9222 else if (strcmp (name, ".sdata2") == 0
9223 || strcmp (name, ".sbss2") == 0)
b9c361e0
JL
9224 {
9225 //reg = 2;
9226 sda = htab->sdata[1].sym;
9227 }
9228 else
9229 {
9230 (*_bfd_error_handler)
9231 (_("%B: the target (%s) of a %s relocation is "
9232 "in the wrong output section (%s)"),
9233 input_bfd,
9234 sym_name,
9235 howto->name,
9236 name);
9237
9238 bfd_set_error (bfd_error_bad_value);
9239 ret = FALSE;
c316a17c 9240 goto copy_reloc;
b9c361e0
JL
9241 }
9242
9243 if (sda != NULL)
9244 {
9245 if (!is_static_defined (sda))
9246 {
9247 unresolved_reloc = TRUE;
9248 break;
9249 }
9250 }
9251
86c95733
AM
9252 value = (sda->root.u.def.section->output_section->vma
9253 + sda->root.u.def.section->output_offset
9254 + addend);
9255
9256 if (r_type == R_PPC_VLE_SDAREL_LO16A)
9257 ppc_elf_vle_split16 (output_bfd, contents + rel->r_offset,
9258 value, split16a_type);
9259 else if (r_type == R_PPC_VLE_SDAREL_LO16D)
9260 ppc_elf_vle_split16 (output_bfd, contents + rel->r_offset,
9261 value, split16d_type);
9262 else if (r_type == R_PPC_VLE_SDAREL_HI16A)
b9c361e0 9263 {
86c95733
AM
9264 value = value >> 16;
9265 ppc_elf_vle_split16 (output_bfd, contents + rel->r_offset,
9266 value, split16a_type);
b9c361e0 9267 }
86c95733 9268 else if (r_type == R_PPC_VLE_SDAREL_HI16D)
b9c361e0 9269 {
86c95733
AM
9270 value = value >> 16;
9271 ppc_elf_vle_split16 (output_bfd, contents + rel->r_offset,
9272 value, split16d_type);
b9c361e0 9273 }
86c95733 9274 else if (r_type == R_PPC_VLE_SDAREL_HA16A)
b9c361e0 9275 {
86c95733
AM
9276 value = (value + 0x8000) >> 16;
9277 ppc_elf_vle_split16 (output_bfd, contents + rel->r_offset,
9278 value, split16a_type);
b9c361e0 9279 }
86c95733 9280 else if (r_type == R_PPC_VLE_SDAREL_HA16D)
b9c361e0 9281 {
86c95733
AM
9282 value = (value + 0x8000) >> 16;
9283 ppc_elf_vle_split16 (output_bfd, contents + rel->r_offset,
9284 value, split16d_type);
b9c361e0
JL
9285 }
9286 }
c316a17c 9287 goto copy_reloc;
b9c361e0 9288
70bccea4 9289 /* Relocate against the beginning of the section. */
7619e7c7
AM
9290 case R_PPC_SECTOFF:
9291 case R_PPC_SECTOFF_LO:
9292 case R_PPC_SECTOFF_HI:
9293 case R_PPC_SECTOFF_HA:
3b4f3a11
AM
9294 if (sec == NULL || sec->output_section == NULL)
9295 {
9296 unresolved_reloc = TRUE;
9297 break;
9298 }
252b5132 9299 addend -= sec->output_section->vma;
252b5132
RH
9300 break;
9301
70bccea4 9302 /* Negative relocations. */
7619e7c7
AM
9303 case R_PPC_EMB_NADDR32:
9304 case R_PPC_EMB_NADDR16:
9305 case R_PPC_EMB_NADDR16_LO:
9306 case R_PPC_EMB_NADDR16_HI:
9307 case R_PPC_EMB_NADDR16_HA:
8da6118f 9308 addend -= 2 * relocation;
252b5132
RH
9309 break;
9310
7619e7c7
AM
9311 case R_PPC_COPY:
9312 case R_PPC_GLOB_DAT:
9313 case R_PPC_JMP_SLOT:
9314 case R_PPC_RELATIVE:
e054468f 9315 case R_PPC_IRELATIVE:
7619e7c7
AM
9316 case R_PPC_PLT32:
9317 case R_PPC_PLTREL32:
9318 case R_PPC_PLT16_LO:
9319 case R_PPC_PLT16_HI:
9320 case R_PPC_PLT16_HA:
9321 case R_PPC_ADDR30:
9322 case R_PPC_EMB_RELSEC16:
9323 case R_PPC_EMB_RELST_LO:
9324 case R_PPC_EMB_RELST_HI:
9325 case R_PPC_EMB_RELST_HA:
9326 case R_PPC_EMB_BIT_FLD:
25f53a85 9327 info->callbacks->einfo
8de848d8 9328 (_("%P: %B: relocation %s is not yet supported for symbol %s\n"),
d003868e 9329 input_bfd,
7619e7c7
AM
9330 howto->name,
9331 sym_name);
252b5132
RH
9332
9333 bfd_set_error (bfd_error_invalid_operation);
b34976b6 9334 ret = FALSE;
c316a17c 9335 goto copy_reloc;
7619e7c7 9336 }
252b5132 9337
7619e7c7
AM
9338 /* Do any further special processing. */
9339 switch (r_type)
9340 {
9341 default:
9342 break;
9343
9344 case R_PPC_ADDR16_HA:
d7128ce4 9345 case R_PPC_REL16_HA:
a680de9a 9346 case R_PPC_REL16DX_HA:
7619e7c7
AM
9347 case R_PPC_SECTOFF_HA:
9348 case R_PPC_TPREL16_HA:
9349 case R_PPC_DTPREL16_HA:
7619e7c7
AM
9350 case R_PPC_EMB_NADDR16_HA:
9351 case R_PPC_EMB_RELST_HA:
9352 /* It's just possible that this symbol is a weak symbol
7b609f53 9353 that's not actually defined anywhere. In that case,
7619e7c7
AM
9354 'sec' would be NULL, and we should leave the symbol
9355 alone (it will be set to zero elsewhere in the link). */
5c5f6e17
AM
9356 if (sec == NULL)
9357 break;
9358 /* Fall thru */
9359
9360 case R_PPC_PLT16_HA:
9361 case R_PPC_GOT16_HA:
9362 case R_PPC_GOT_TLSGD16_HA:
9363 case R_PPC_GOT_TLSLD16_HA:
9364 case R_PPC_GOT_TPREL16_HA:
9365 case R_PPC_GOT_DTPREL16_HA:
9366 /* Add 0x10000 if sign bit in 0:15 is set.
9367 Bits 0:15 are not used. */
9368 addend += 0x8000;
7619e7c7 9369 break;
1fe532cf
AM
9370
9371 case R_PPC_ADDR16:
9372 case R_PPC_ADDR16_LO:
9373 case R_PPC_GOT16:
9374 case R_PPC_GOT16_LO:
9375 case R_PPC_SDAREL16:
9376 case R_PPC_SECTOFF:
9377 case R_PPC_SECTOFF_LO:
9378 case R_PPC_DTPREL16:
9379 case R_PPC_DTPREL16_LO:
9380 case R_PPC_TPREL16:
9381 case R_PPC_TPREL16_LO:
9382 case R_PPC_GOT_TLSGD16:
9383 case R_PPC_GOT_TLSGD16_LO:
9384 case R_PPC_GOT_TLSLD16:
9385 case R_PPC_GOT_TLSLD16_LO:
9386 case R_PPC_GOT_DTPREL16:
9387 case R_PPC_GOT_DTPREL16_LO:
9388 case R_PPC_GOT_TPREL16:
9389 case R_PPC_GOT_TPREL16_LO:
9390 {
9391 /* The 32-bit ABI lacks proper relocations to deal with
9392 certain 64-bit instructions. Prevent damage to bits
9393 that make up part of the insn opcode. */
9394 unsigned int insn, mask, lobit;
9395
c316a17c
AM
9396 insn = bfd_get_32 (output_bfd,
9397 contents + rel->r_offset - d_offset);
1fe532cf
AM
9398 mask = 0;
9399 if (is_insn_ds_form (insn))
9400 mask = 3;
9401 else if (is_insn_dq_form (insn))
9402 mask = 15;
9403 else
9404 break;
a680de9a
PB
9405 relocation += addend;
9406 addend = insn & mask;
9407 lobit = mask & relocation;
1fe532cf
AM
9408 if (lobit != 0)
9409 {
a680de9a 9410 relocation ^= lobit;
1fe532cf
AM
9411 info->callbacks->einfo
9412 (_("%P: %H: error: %s against `%s' not a multiple of %u\n"),
9413 input_bfd, input_section, rel->r_offset,
9414 howto->name, sym_name, mask + 1);
9415 bfd_set_error (bfd_error_bad_value);
9416 ret = FALSE;
9417 }
1fe532cf
AM
9418 }
9419 break;
252b5132
RH
9420 }
9421
252b5132 9422#ifdef DEBUG
55fd94b0
AM
9423 fprintf (stderr, "\ttype = %s (%d), name = %s, symbol index = %ld, "
9424 "offset = %ld, addend = %ld\n",
252b5132 9425 howto->name,
8da6118f 9426 (int) r_type,
252b5132
RH
9427 sym_name,
9428 r_symndx,
7619e7c7 9429 (long) rel->r_offset,
8da6118f 9430 (long) addend);
252b5132
RH
9431#endif
9432
7619e7c7
AM
9433 if (unresolved_reloc
9434 && !((input_section->flags & SEC_DEBUGGING) != 0
1d5316ab
AM
9435 && h->def_dynamic)
9436 && _bfd_elf_section_offset (output_bfd, info, input_section,
9437 rel->r_offset) != (bfd_vma) -1)
7619e7c7 9438 {
25f53a85 9439 info->callbacks->einfo
8de848d8 9440 (_("%P: %H: unresolvable %s relocation against symbol `%s'\n"),
25f53a85 9441 input_bfd, input_section, rel->r_offset,
7b609f53 9442 howto->name,
7619e7c7
AM
9443 sym_name);
9444 ret = FALSE;
9445 }
9446
86c95733
AM
9447 /* 16-bit fields in insns mostly have signed values, but a
9448 few insns have 16-bit unsigned values. Really, we should
9449 have different reloc types. */
9450 if (howto->complain_on_overflow != complain_overflow_dont
9451 && howto->dst_mask == 0xffff
9452 && (input_section->flags & SEC_CODE) != 0)
9453 {
9454 enum complain_overflow complain = complain_overflow_signed;
9455
9456 if ((elf_section_flags (input_section) & SHF_PPC_VLE) == 0)
9457 {
9458 unsigned int insn;
9459
9460 insn = bfd_get_32 (input_bfd, contents + (rel->r_offset & ~3));
a47622ac
AM
9461 if ((insn & (0x3f << 26)) == 10u << 26 /* cmpli */)
9462 complain = complain_overflow_bitfield;
9463 else if ((insn & (0x3f << 26)) == 28u << 26 /* andi */
9464 || (insn & (0x3f << 26)) == 24u << 26 /* ori */
9465 || (insn & (0x3f << 26)) == 26u << 26 /* xori */)
86c95733
AM
9466 complain = complain_overflow_unsigned;
9467 }
9468 if (howto->complain_on_overflow != complain)
9469 {
9470 alt_howto = *howto;
9471 alt_howto.complain_on_overflow = complain;
9472 howto = &alt_howto;
9473 }
9474 }
9475
a680de9a
PB
9476 if (r_type == R_PPC_REL16DX_HA)
9477 {
9478 /* Split field reloc isn't handled by _bfd_final_link_relocate. */
9479 if (rel->r_offset + 4 > input_section->size)
9480 r = bfd_reloc_outofrange;
9481 else
9482 {
9483 unsigned int insn;
9484
9485 relocation += addend;
9486 relocation -= (rel->r_offset
9487 + input_section->output_offset
9488 + input_section->output_section->vma);
9489 relocation >>= 16;
9490 insn = bfd_get_32 (input_bfd, contents + rel->r_offset);
9491 insn &= ~0x1fffc1;
9492 insn |= (relocation & 0xffc1) | ((relocation & 0x3e) << 15);
9493 bfd_put_32 (input_bfd, insn, contents + rel->r_offset);
9494 r = bfd_reloc_ok;
9495 }
9496 }
9497 else
9498 r = _bfd_final_link_relocate (howto, input_bfd, input_section, contents,
9499 rel->r_offset, relocation, addend);
252b5132 9500
7619e7c7 9501 if (r != bfd_reloc_ok)
252b5132 9502 {
7619e7c7 9503 if (r == bfd_reloc_overflow)
252b5132 9504 {
c3301df1 9505 overflow:
8131c122
AM
9506 /* On code like "if (foo) foo();" don't report overflow
9507 on a branch to zero when foo is undefined. */
9508 if (!warned
9509 && !(h != NULL
9510 && (h->root.type == bfd_link_hash_undefweak
9511 || h->root.type == bfd_link_hash_undefined)
9512 && is_branch_reloc (r_type)))
dc1bc0c9 9513 {
8131c122
AM
9514 if (!((*info->callbacks->reloc_overflow)
9515 (info, (h ? &h->root : NULL), sym_name,
9516 howto->name, rel->r_addend,
9517 input_bfd, input_section, rel->r_offset)))
9518 return FALSE;
dc1bc0c9 9519 }
dc1bc0c9
RH
9520 }
9521 else
9522 {
25f53a85 9523 info->callbacks->einfo
8de848d8 9524 (_("%P: %H: %s reloc against `%s': error %d\n"),
25f53a85
AM
9525 input_bfd, input_section, rel->r_offset,
9526 howto->name, sym_name, (int) r);
7619e7c7 9527 ret = FALSE;
252b5132
RH
9528 }
9529 }
c316a17c
AM
9530 copy_reloc:
9531 if (wrel != rel)
9532 *wrel = *rel;
9533 }
9534
9535 if (wrel != rel)
9536 {
9537 Elf_Internal_Shdr *rel_hdr;
9538 size_t deleted = rel - wrel;
9539
9540 rel_hdr = _bfd_elf_single_rel_hdr (input_section->output_section);
9541 rel_hdr->sh_size -= rel_hdr->sh_entsize * deleted;
9542 if (rel_hdr->sh_size == 0)
9543 {
9544 /* It is too late to remove an empty reloc section. Leave
9545 one NONE reloc.
9546 ??? What is wrong with an empty section??? */
9547 rel_hdr->sh_size = rel_hdr->sh_entsize;
9548 deleted -= 1;
9549 wrel++;
9550 }
9551 relend = wrel;
9552 rel_hdr = _bfd_elf_single_rel_hdr (input_section);
9553 rel_hdr->sh_size -= rel_hdr->sh_entsize * deleted;
9554 input_section->reloc_count -= deleted;
252b5132
RH
9555 }
9556
252b5132
RH
9557#ifdef DEBUG
9558 fprintf (stderr, "\n");
9559#endif
9560
53291d1f
AM
9561 if (input_section->sec_info_type == SEC_INFO_TYPE_TARGET
9562 && input_section->size != input_section->rawsize
9563 && (strcmp (input_section->output_section->name, ".init") == 0
9564 || strcmp (input_section->output_section->name, ".fini") == 0))
9565 {
9566 /* Branch around the trampolines. */
9567 unsigned int insn = B + input_section->size - input_section->rawsize;
9568 bfd_put_32 (input_bfd, insn, contents + input_section->rawsize);
9569 }
9570
5446cbdf 9571 if (htab->params->ppc476_workaround
795bc6b3 9572 && input_section->sec_info_type == SEC_INFO_TYPE_TARGET
0e1862bb 9573 && (!bfd_link_relocatable (info)
795bc6b3
AM
9574 || (input_section->output_section->alignment_power
9575 >= htab->params->pagesize_p2)))
5446cbdf 9576 {
5446cbdf 9577 bfd_vma start_addr, end_addr, addr;
795bc6b3 9578 bfd_vma pagesize = (bfd_vma) 1 << htab->params->pagesize_p2;
5446cbdf 9579
5446cbdf 9580 if (relax_info->workaround_size != 0)
40fd06d1
AM
9581 {
9582 bfd_byte *p;
9583 unsigned int n;
9584 bfd_byte fill[4];
9585
9586 bfd_put_32 (input_bfd, BA, fill);
9587 p = contents + input_section->size - relax_info->workaround_size;
9588 n = relax_info->workaround_size >> 2;
9589 while (n--)
9590 {
9591 memcpy (p, fill, 4);
9592 p += 4;
9593 }
9594 }
5446cbdf
AM
9595
9596 /* The idea is: Replace the last instruction on a page with a
9597 branch to a patch area. Put the insn there followed by a
9598 branch back to the next page. Complicated a little by
9599 needing to handle moved conditional branches, and by not
9600 wanting to touch data-in-text. */
9601
9602 start_addr = (input_section->output_section->vma
9603 + input_section->output_offset);
9604 end_addr = (start_addr + input_section->size
9605 - relax_info->workaround_size);
9606 for (addr = ((start_addr & -pagesize) + pagesize - 4);
9607 addr < end_addr;
9608 addr += pagesize)
9609 {
9610 bfd_vma offset = addr - start_addr;
9611 Elf_Internal_Rela *lo, *hi;
9612 bfd_boolean is_data;
9613 bfd_vma patch_off, patch_addr;
9614 unsigned int insn;
9615
9616 /* Do we have a data reloc at this offset? If so, leave
9617 the word alone. */
9618 is_data = FALSE;
9619 lo = relocs;
668e22e5
AM
9620 hi = relend;
9621 rel = NULL;
5446cbdf
AM
9622 while (lo < hi)
9623 {
9624 rel = lo + (hi - lo) / 2;
9625 if (rel->r_offset < offset)
9626 lo = rel + 1;
668e22e5 9627 else if (rel->r_offset > offset + 3)
5446cbdf
AM
9628 hi = rel;
9629 else
9630 {
9631 switch (ELF32_R_TYPE (rel->r_info))
9632 {
9633 case R_PPC_ADDR32:
9634 case R_PPC_UADDR32:
9635 case R_PPC_REL32:
9636 case R_PPC_ADDR30:
9637 is_data = TRUE;
9638 break;
9639 default:
9640 break;
9641 }
9642 break;
9643 }
9644 }
9645 if (is_data)
9646 continue;
9647
b4ab4364
AM
9648 /* Some instructions can be left alone too. Unconditional
9649 branches, except for bcctr with BO=0x14 (bctr, bctrl),
9650 avoid the icache failure.
9651
9652 The problem occurs due to prefetch across a page boundary
9653 where stale instructions can be fetched from the next
9654 page, and the mechanism for flushing these bad
9655 instructions fails under certain circumstances. The
9656 unconditional branches:
9657 1) Branch: b, bl, ba, bla,
9658 2) Branch Conditional: bc, bca, bcl, bcla,
9659 3) Branch Conditional to Link Register: bclr, bclrl,
9660 where (2) and (3) have BO=0x14 making them unconditional,
9661 prevent the bad prefetch because the prefetch itself is
9662 affected by these instructions. This happens even if the
9663 instruction is not executed.
9664
9665 A bctr example:
9666 .
9667 . lis 9,new_page@ha
9668 . addi 9,9,new_page@l
9669 . mtctr 9
9670 . bctr
9671 . nop
9672 . nop
9673 . new_page:
9674 .
9675 The bctr is not predicted taken due to ctr not being
9676 ready, so prefetch continues on past the bctr into the
9677 new page which might have stale instructions. If they
9678 fail to be flushed, then they will be executed after the
9679 bctr executes. Either of the following modifications
9680 prevent the bad prefetch from happening in the first
9681 place:
9682 .
1b786873
L
9683 . lis 9,new_page@ha lis 9,new_page@ha
9684 . addi 9,9,new_page@l addi 9,9,new_page@l
9685 . mtctr 9 mtctr 9
9686 . bctr bctr
b4ab4364 9687 . nop b somewhere_else
1b786873
L
9688 . b somewhere_else nop
9689 . new_page: new_page:
b4ab4364 9690 . */
5446cbdf 9691 insn = bfd_get_32 (input_bfd, contents + offset);
b4ab4364
AM
9692 if ((insn & (0x3f << 26)) == (18u << 26) /* b,bl,ba,bla */
9693 || ((insn & (0x3f << 26)) == (16u << 26) /* bc,bcl,bca,bcla*/
9694 && (insn & (0x14 << 21)) == (0x14 << 21)) /* with BO=0x14 */
5446cbdf 9695 || ((insn & (0x3f << 26)) == (19u << 26)
b4ab4364
AM
9696 && (insn & (0x3ff << 1)) == (16u << 1) /* bclr,bclrl */
9697 && (insn & (0x14 << 21)) == (0x14 << 21)))/* with BO=0x14 */
5446cbdf
AM
9698 continue;
9699
9700 patch_addr = (start_addr + input_section->size
9701 - relax_info->workaround_size);
9702 patch_addr = (patch_addr + 15) & -16;
9703 patch_off = patch_addr - start_addr;
9704 bfd_put_32 (input_bfd, B + patch_off - offset, contents + offset);
668e22e5
AM
9705
9706 if (rel != NULL
9707 && rel->r_offset >= offset
9708 && rel->r_offset < offset + 4)
9709 {
f8b44781
AM
9710 asection *sreloc;
9711
668e22e5
AM
9712 /* If the insn we are patching had a reloc, adjust the
9713 reloc r_offset so that the reloc applies to the moved
9714 location. This matters for -r and --emit-relocs. */
9715 if (rel + 1 != relend)
9716 {
9717 Elf_Internal_Rela tmp = *rel;
9718
9719 /* Keep the relocs sorted by r_offset. */
9720 memmove (rel, rel + 1, (relend - (rel + 1)) * sizeof (*rel));
9721 relend[-1] = tmp;
9722 }
9723 relend[-1].r_offset += patch_off - offset;
f8b44781
AM
9724
9725 /* Adjust REL16 addends too. */
9726 switch (ELF32_R_TYPE (relend[-1].r_info))
9727 {
9728 case R_PPC_REL16:
9729 case R_PPC_REL16_LO:
9730 case R_PPC_REL16_HI:
9731 case R_PPC_REL16_HA:
9732 relend[-1].r_addend += patch_off - offset;
9733 break;
9734 default:
9735 break;
9736 }
9737
9738 /* If we are building a PIE or shared library with
9739 non-PIC objects, perhaps we had a dynamic reloc too?
9740 If so, the dynamic reloc must move with the insn. */
9741 sreloc = elf_section_data (input_section)->sreloc;
9742 if (sreloc != NULL)
9743 {
1d5c94cb 9744 Elf32_External_Rela *slo, *shi, *srelend;
f8b44781
AM
9745 bfd_vma soffset;
9746
1d5c94cb
AM
9747 slo = (Elf32_External_Rela *) sreloc->contents;
9748 shi = srelend = slo + sreloc->reloc_count;
f8b44781
AM
9749 soffset = (offset + input_section->output_section->vma
9750 + input_section->output_offset);
9751 while (slo < shi)
9752 {
1d5c94cb
AM
9753 Elf32_External_Rela *srel = slo + (shi - slo) / 2;
9754 bfd_elf32_swap_reloca_in (output_bfd, (bfd_byte *) srel,
9755 &outrel);
f8b44781
AM
9756 if (outrel.r_offset < soffset)
9757 slo = srel + 1;
9758 else if (outrel.r_offset > soffset + 3)
9759 shi = srel;
9760 else
9761 {
1d5c94cb 9762 if (srel + 1 != srelend)
f8b44781 9763 {
1d5c94cb
AM
9764 memmove (srel, srel + 1,
9765 (srelend - (srel + 1)) * sizeof (*srel));
9766 srel = srelend - 1;
f8b44781
AM
9767 }
9768 outrel.r_offset += patch_off - offset;
1d5c94cb
AM
9769 bfd_elf32_swap_reloca_out (output_bfd, &outrel,
9770 (bfd_byte *) srel);
f8b44781
AM
9771 break;
9772 }
9773 }
9774 }
668e22e5
AM
9775 }
9776 else
9777 rel = NULL;
9778
5446cbdf
AM
9779 if ((insn & (0x3f << 26)) == (16u << 26) /* bc */
9780 && (insn & 2) == 0 /* relative */)
9781 {
9782 bfd_vma delta = ((insn & 0xfffc) ^ 0x8000) - 0x8000;
9783
9784 delta += offset - patch_off;
0e1862bb 9785 if (bfd_link_relocatable (info) && rel != NULL)
668e22e5 9786 delta = 0;
0e1862bb 9787 if (!bfd_link_relocatable (info) && rel != NULL)
668e22e5
AM
9788 {
9789 enum elf_ppc_reloc_type r_type;
9790
9791 r_type = ELF32_R_TYPE (relend[-1].r_info);
9792 if (r_type == R_PPC_REL14_BRTAKEN)
9793 insn |= BRANCH_PREDICT_BIT;
9794 else if (r_type == R_PPC_REL14_BRNTAKEN)
9795 insn &= ~BRANCH_PREDICT_BIT;
9796 else
9797 BFD_ASSERT (r_type == R_PPC_REL14);
9798
9799 if ((r_type == R_PPC_REL14_BRTAKEN
9800 || r_type == R_PPC_REL14_BRNTAKEN)
9801 && delta + 0x8000 < 0x10000
9802 && (bfd_signed_vma) delta < 0)
9803 insn ^= BRANCH_PREDICT_BIT;
9804 }
5446cbdf
AM
9805 if (delta + 0x8000 < 0x10000)
9806 {
9807 bfd_put_32 (input_bfd,
9808 (insn & ~0xfffc) | (delta & 0xfffc),
9809 contents + patch_off);
9810 patch_off += 4;
9811 bfd_put_32 (input_bfd,
9812 B | ((offset + 4 - patch_off) & 0x3fffffc),
9813 contents + patch_off);
9814 patch_off += 4;
9815 }
9816 else
9817 {
668e22e5
AM
9818 if (rel != NULL)
9819 {
9820 unsigned int r_sym = ELF32_R_SYM (relend[-1].r_info);
9821
9822 relend[-1].r_offset += 8;
9823 relend[-1].r_info = ELF32_R_INFO (r_sym, R_PPC_REL24);
9824 }
5446cbdf
AM
9825 bfd_put_32 (input_bfd,
9826 (insn & ~0xfffc) | 8,
9827 contents + patch_off);
9828 patch_off += 4;
9829 bfd_put_32 (input_bfd,
9830 B | ((offset + 4 - patch_off) & 0x3fffffc),
9831 contents + patch_off);
9832 patch_off += 4;
9833 bfd_put_32 (input_bfd,
9834 B | ((delta - 8) & 0x3fffffc),
9835 contents + patch_off);
9836 patch_off += 4;
9837 }
9838 }
9839 else
9840 {
9841 bfd_put_32 (input_bfd, insn, contents + patch_off);
9842 patch_off += 4;
9843 bfd_put_32 (input_bfd,
9844 B | ((offset + 4 - patch_off) & 0x3fffffc),
9845 contents + patch_off);
9846 patch_off += 4;
9847 }
9848 BFD_ASSERT (patch_off <= input_section->size);
9849 relax_info->workaround_size = input_section->size - patch_off;
9850 }
9851 }
9852
252b5132
RH
9853 return ret;
9854}
252b5132 9855\f
25dbc73a
AM
9856/* Finish up dynamic symbol handling. We set the contents of various
9857 dynamic sections here. */
c5fccbec 9858
b34976b6 9859static bfd_boolean
25dbc73a
AM
9860ppc_elf_finish_dynamic_symbol (bfd *output_bfd,
9861 struct bfd_link_info *info,
9862 struct elf_link_hash_entry *h,
9863 Elf_Internal_Sym *sym)
e1a9cb8e 9864{
25dbc73a 9865 struct ppc_elf_link_hash_table *htab;
a6aa5195
AM
9866 struct plt_entry *ent;
9867 bfd_boolean doneone;
e1a9cb8e 9868
25dbc73a
AM
9869#ifdef DEBUG
9870 fprintf (stderr, "ppc_elf_finish_dynamic_symbol called for %s",
9871 h->root.root.string);
9872#endif
e1a9cb8e 9873
25dbc73a
AM
9874 htab = ppc_elf_hash_table (info);
9875 BFD_ASSERT (htab->elf.dynobj != NULL);
e1a9cb8e 9876
a6aa5195
AM
9877 doneone = FALSE;
9878 for (ent = h->plt.plist; ent != NULL; ent = ent->next)
9879 if (ent->plt.offset != (bfd_vma) -1)
9880 {
9881 if (!doneone)
9882 {
9883 Elf_Internal_Rela rela;
9884 bfd_byte *loc;
9885 bfd_vma reloc_index;
e1a9cb8e 9886
e054468f 9887 if (htab->plt_type == PLT_NEW
25f23106
AM
9888 || !htab->elf.dynamic_sections_created
9889 || h->dynindx == -1)
9d8504b1
PB
9890 reloc_index = ent->plt.offset / 4;
9891 else
9892 {
9893 reloc_index = ((ent->plt.offset - htab->plt_initial_entry_size)
9894 / htab->plt_slot_size);
9895 if (reloc_index > PLT_NUM_SINGLE_ENTRIES
4a3dc543 9896 && htab->plt_type == PLT_OLD)
9d8504b1
PB
9897 reloc_index -= (reloc_index - PLT_NUM_SINGLE_ENTRIES) / 2;
9898 }
9899
a6aa5195
AM
9900 /* This symbol has an entry in the procedure linkage table.
9901 Set it up. */
e054468f 9902 if (htab->plt_type == PLT_VXWORKS
25f23106
AM
9903 && htab->elf.dynamic_sections_created
9904 && h->dynindx != -1)
a6aa5195 9905 {
9d8504b1
PB
9906 bfd_vma got_offset;
9907 const bfd_vma *plt_entry;
5b914448 9908
9d8504b1
PB
9909 /* The first three entries in .got.plt are reserved. */
9910 got_offset = (reloc_index + 3) * 4;
9911
9912 /* Use the right PLT. */
0e1862bb 9913 plt_entry = bfd_link_pic (info) ? ppc_elf_vxworks_pic_plt_entry
9d8504b1
PB
9914 : ppc_elf_vxworks_plt_entry;
9915
9916 /* Fill in the .plt on VxWorks. */
0e1862bb 9917 if (bfd_link_pic (info))
9d8504b1 9918 {
9d8504b1 9919 bfd_put_32 (output_bfd,
e87d4038 9920 plt_entry[0] | PPC_HA (got_offset),
9d8504b1
PB
9921 htab->plt->contents + ent->plt.offset + 0);
9922 bfd_put_32 (output_bfd,
e87d4038 9923 plt_entry[1] | PPC_LO (got_offset),
9d8504b1
PB
9924 htab->plt->contents + ent->plt.offset + 4);
9925 }
9926 else
9927 {
e87d4038 9928 bfd_vma got_loc = got_offset + SYM_VAL (htab->elf.hgot);
9d8504b1
PB
9929
9930 bfd_put_32 (output_bfd,
e87d4038 9931 plt_entry[0] | PPC_HA (got_loc),
9d8504b1
PB
9932 htab->plt->contents + ent->plt.offset + 0);
9933 bfd_put_32 (output_bfd,
e87d4038 9934 plt_entry[1] | PPC_LO (got_loc),
9d8504b1
PB
9935 htab->plt->contents + ent->plt.offset + 4);
9936 }
9937
9938 bfd_put_32 (output_bfd, plt_entry[2],
9939 htab->plt->contents + ent->plt.offset + 8);
9940 bfd_put_32 (output_bfd, plt_entry[3],
9941 htab->plt->contents + ent->plt.offset + 12);
9942
9943 /* This instruction is an immediate load. The value loaded is
9944 the byte offset of the R_PPC_JMP_SLOT relocation from the
9945 start of the .rela.plt section. The value is stored in the
9946 low-order 16 bits of the load instruction. */
9947 /* NOTE: It appears that this is now an index rather than a
9948 prescaled offset. */
5b914448 9949 bfd_put_32 (output_bfd,
9d8504b1
PB
9950 plt_entry[4] | reloc_index,
9951 htab->plt->contents + ent->plt.offset + 16);
9952 /* This instruction is a PC-relative branch whose target is
9953 the start of the PLT section. The address of this branch
9954 instruction is 20 bytes beyond the start of this PLT entry.
9955 The address is encoded in bits 6-29, inclusive. The value
9956 stored is right-shifted by two bits, permitting a 26-bit
9957 offset. */
5b914448
AM
9958 bfd_put_32 (output_bfd,
9959 (plt_entry[5]
9d8504b1
PB
9960 | (-(ent->plt.offset + 20) & 0x03fffffc)),
9961 htab->plt->contents + ent->plt.offset + 20);
9962 bfd_put_32 (output_bfd, plt_entry[6],
9963 htab->plt->contents + ent->plt.offset + 24);
9964 bfd_put_32 (output_bfd, plt_entry[7],
9965 htab->plt->contents + ent->plt.offset + 28);
9966
9967 /* Fill in the GOT entry corresponding to this PLT slot with
a8685210 9968 the address immediately after the "bctr" instruction
9d8504b1
PB
9969 in this PLT entry. */
9970 bfd_put_32 (output_bfd, (htab->plt->output_section->vma
9971 + htab->plt->output_offset
9972 + ent->plt.offset + 16),
9973 htab->sgotplt->contents + got_offset);
9974
0e1862bb 9975 if (!bfd_link_pic (info))
9d8504b1
PB
9976 {
9977 /* Fill in a couple of entries in .rela.plt.unloaded. */
9978 loc = htab->srelplt2->contents
9979 + ((VXWORKS_PLTRESOLVE_RELOCS + reloc_index
9980 * VXWORKS_PLT_NON_JMP_SLOT_RELOCS)
9981 * sizeof (Elf32_External_Rela));
9982
9983 /* Provide the @ha relocation for the first instruction. */
9984 rela.r_offset = (htab->plt->output_section->vma
9985 + htab->plt->output_offset
9986 + ent->plt.offset + 2);
636ce3f5 9987 rela.r_info = ELF32_R_INFO (htab->elf.hgot->indx,
9d8504b1
PB
9988 R_PPC_ADDR16_HA);
9989 rela.r_addend = got_offset;
9990 bfd_elf32_swap_reloca_out (output_bfd, &rela, loc);
9991 loc += sizeof (Elf32_External_Rela);
9992
9993 /* Provide the @l relocation for the second instruction. */
9994 rela.r_offset = (htab->plt->output_section->vma
9995 + htab->plt->output_offset
9996 + ent->plt.offset + 6);
636ce3f5 9997 rela.r_info = ELF32_R_INFO (htab->elf.hgot->indx,
9d8504b1
PB
9998 R_PPC_ADDR16_LO);
9999 rela.r_addend = got_offset;
10000 bfd_elf32_swap_reloca_out (output_bfd, &rela, loc);
10001 loc += sizeof (Elf32_External_Rela);
10002
10003 /* Provide a relocation for the GOT entry corresponding to this
10004 PLT slot. Point it at the middle of the .plt entry. */
10005 rela.r_offset = (htab->sgotplt->output_section->vma
10006 + htab->sgotplt->output_offset
10007 + got_offset);
7325306f 10008 rela.r_info = ELF32_R_INFO (htab->elf.hplt->indx,
9d8504b1
PB
10009 R_PPC_ADDR32);
10010 rela.r_addend = ent->plt.offset + 16;
10011 bfd_elf32_swap_reloca_out (output_bfd, &rela, loc);
10012 }
10013
10014 /* VxWorks uses non-standard semantics for R_PPC_JMP_SLOT.
10015 In particular, the offset for the relocation is not the
10016 address of the PLT entry for this function, as specified
10017 by the ABI. Instead, the offset is set to the address of
10018 the GOT slot for this function. See EABI 4.4.4.1. */
10019 rela.r_offset = (htab->sgotplt->output_section->vma
10020 + htab->sgotplt->output_offset
10021 + got_offset);
10022
a6aa5195
AM
10023 }
10024 else
10025 {
e054468f 10026 asection *splt = htab->plt;
25f23106
AM
10027 if (!htab->elf.dynamic_sections_created
10028 || h->dynindx == -1)
e054468f
AM
10029 splt = htab->iplt;
10030
10031 rela.r_offset = (splt->output_section->vma
10032 + splt->output_offset
9d8504b1 10033 + ent->plt.offset);
e054468f 10034 if (htab->plt_type == PLT_OLD
25f23106
AM
10035 || !htab->elf.dynamic_sections_created
10036 || h->dynindx == -1)
9d8504b1
PB
10037 {
10038 /* We don't need to fill in the .plt. The ppc dynamic
10039 linker will fill it in. */
10040 }
10041 else
10042 {
10043 bfd_vma val = (htab->glink_pltresolve + ent->plt.offset
10044 + htab->glink->output_section->vma
10045 + htab->glink->output_offset);
10046 bfd_put_32 (output_bfd, val,
e054468f 10047 splt->contents + ent->plt.offset);
9d8504b1 10048 }
a6aa5195 10049 }
e1a9cb8e 10050
a6aa5195 10051 /* Fill in the entry in the .rela.plt section. */
a6aa5195 10052 rela.r_addend = 0;
e054468f
AM
10053 if (!htab->elf.dynamic_sections_created
10054 || h->dynindx == -1)
10055 {
10056 BFD_ASSERT (h->type == STT_GNU_IFUNC
10057 && h->def_regular
10058 && (h->root.type == bfd_link_hash_defined
10059 || h->root.type == bfd_link_hash_defweak));
10060 rela.r_info = ELF32_R_INFO (0, R_PPC_IRELATIVE);
10061 rela.r_addend = SYM_VAL (h);
10062 }
10063 else
10064 rela.r_info = ELF32_R_INFO (h->dynindx, R_PPC_JMP_SLOT);
e1a9cb8e 10065
25f23106
AM
10066 if (!htab->elf.dynamic_sections_created
10067 || h->dynindx == -1)
10068 loc = (htab->reliplt->contents
10069 + (htab->reliplt->reloc_count++
10070 * sizeof (Elf32_External_Rela)));
e054468f 10071 else
25f23106
AM
10072 loc = (htab->relplt->contents
10073 + reloc_index * sizeof (Elf32_External_Rela));
a6aa5195 10074 bfd_elf32_swap_reloca_out (output_bfd, &rela, loc);
e1a9cb8e 10075
a6aa5195
AM
10076 if (!h->def_regular)
10077 {
0eb4a168
AM
10078 /* Mark the symbol as undefined, rather than as
10079 defined in the .plt section. Leave the value if
10080 there were any relocations where pointer equality
10081 matters (this is a clue for the dynamic linker, to
10082 make function pointer comparisons work between an
10083 application and shared library), otherwise set it
10084 to zero. */
a6aa5195 10085 sym->st_shndx = SHN_UNDEF;
0eb4a168 10086 if (!h->pointer_equality_needed)
a6aa5195 10087 sym->st_value = 0;
0eb4a168
AM
10088 else if (!h->ref_regular_nonweak)
10089 {
625af618
AM
10090 /* This breaks function pointer comparisons, but
10091 that is better than breaking tests for a NULL
0eb4a168 10092 function pointer. */
0eb4a168
AM
10093 sym->st_value = 0;
10094 }
a6aa5195 10095 }
de972ffa 10096 else if (h->type == STT_GNU_IFUNC
0e1862bb 10097 && !bfd_link_pic (info))
de972ffa
AM
10098 {
10099 /* Set the value of ifunc symbols in a non-pie
10100 executable to the glink entry. This is to avoid
10101 text relocations. We can't do this for ifunc in
10102 allocate_dynrelocs, as we do for normal dynamic
10103 function symbols with plt entries, because we need
10104 to keep the original value around for the ifunc
10105 relocation. */
10106 sym->st_shndx = (_bfd_elf_section_from_bfd_section
10107 (output_bfd, htab->glink->output_section));
5b914448
AM
10108 sym->st_value = (ent->glink_offset
10109 + htab->glink->output_offset
de972ffa
AM
10110 + htab->glink->output_section->vma);
10111 }
a6aa5195
AM
10112 doneone = TRUE;
10113 }
e1a9cb8e 10114
e054468f 10115 if (htab->plt_type == PLT_NEW
25f23106
AM
10116 || !htab->elf.dynamic_sections_created
10117 || h->dynindx == -1)
a6aa5195 10118 {
a7f2871e 10119 unsigned char *p;
e054468f 10120 asection *splt = htab->plt;
25f23106
AM
10121 if (!htab->elf.dynamic_sections_created
10122 || h->dynindx == -1)
e054468f 10123 splt = htab->iplt;
e1a9cb8e 10124
a7f2871e
AM
10125 p = (unsigned char *) htab->glink->contents + ent->glink_offset;
10126
5446cbdf 10127 if (h == htab->tls_get_addr && !htab->params->no_tls_get_addr_opt)
a7f2871e
AM
10128 {
10129 bfd_put_32 (output_bfd, LWZ_11_3, p);
10130 p += 4;
10131 bfd_put_32 (output_bfd, LWZ_12_3 + 4, p);
10132 p += 4;
10133 bfd_put_32 (output_bfd, MR_0_3, p);
10134 p += 4;
10135 bfd_put_32 (output_bfd, CMPWI_11_0, p);
10136 p += 4;
10137 bfd_put_32 (output_bfd, ADD_3_12_2, p);
10138 p += 4;
10139 bfd_put_32 (output_bfd, BEQLR, p);
10140 p += 4;
10141 bfd_put_32 (output_bfd, MR_3_0, p);
10142 p += 4;
10143 bfd_put_32 (output_bfd, NOP, p);
10144 p += 4;
10145 }
10146
10147 write_glink_stub (ent, splt, p, info);
e1a9cb8e 10148
0e1862bb 10149 if (!bfd_link_pic (info))
e054468f
AM
10150 /* We only need one non-PIC glink stub. */
10151 break;
a6aa5195
AM
10152 }
10153 else
10154 break;
10155 }
e1a9cb8e 10156
25dbc73a
AM
10157 if (h->needs_copy)
10158 {
10159 asection *s;
10160 Elf_Internal_Rela rela;
10161 bfd_byte *loc;
e1a9cb8e 10162
25dbc73a 10163 /* This symbols needs a copy reloc. Set it up. */
e1a9cb8e 10164
25dbc73a
AM
10165#ifdef DEBUG
10166 fprintf (stderr, ", copy");
10167#endif
e1a9cb8e 10168
25dbc73a 10169 BFD_ASSERT (h->dynindx != -1);
86bbe32f 10170
4dc4a9a5 10171 if (ppc_elf_hash_entry (h)->has_sda_refs)
25dbc73a
AM
10172 s = htab->relsbss;
10173 else
10174 s = htab->relbss;
10175 BFD_ASSERT (s != NULL);
e1a9cb8e 10176
e87d4038 10177 rela.r_offset = SYM_VAL (h);
25dbc73a
AM
10178 rela.r_info = ELF32_R_INFO (h->dynindx, R_PPC_COPY);
10179 rela.r_addend = 0;
10180 loc = s->contents + s->reloc_count++ * sizeof (Elf32_External_Rela);
10181 bfd_elf32_swap_reloca_out (output_bfd, &rela, loc);
10182 }
e1a9cb8e 10183
25dbc73a
AM
10184#ifdef DEBUG
10185 fprintf (stderr, "\n");
10186#endif
e1a9cb8e 10187
25dbc73a
AM
10188 return TRUE;
10189}
10190\f
10191static enum elf_reloc_type_class
7e612e98
AM
10192ppc_elf_reloc_type_class (const struct bfd_link_info *info,
10193 const asection *rel_sec,
10194 const Elf_Internal_Rela *rela)
e1a9cb8e 10195{
7e612e98
AM
10196 struct ppc_elf_link_hash_table *htab = ppc_elf_hash_table (info);
10197
10198 if (rel_sec == htab->reliplt)
10199 return reloc_class_ifunc;
10200
25dbc73a
AM
10201 switch (ELF32_R_TYPE (rela->r_info))
10202 {
10203 case R_PPC_RELATIVE:
10204 return reloc_class_relative;
25dbc73a
AM
10205 case R_PPC_JMP_SLOT:
10206 return reloc_class_plt;
10207 case R_PPC_COPY:
10208 return reloc_class_copy;
10209 default:
10210 return reloc_class_normal;
10211 }
e1a9cb8e 10212}
25dbc73a
AM
10213\f
10214/* Finish up the dynamic sections. */
e1a9cb8e 10215
25dbc73a
AM
10216static bfd_boolean
10217ppc_elf_finish_dynamic_sections (bfd *output_bfd,
10218 struct bfd_link_info *info)
e1a9cb8e 10219{
25dbc73a 10220 asection *sdyn;
9d8504b1 10221 asection *splt;
25dbc73a 10222 struct ppc_elf_link_hash_table *htab;
1fe44d79 10223 bfd_vma got;
e87d4038
AM
10224 bfd *dynobj;
10225 bfd_boolean ret = TRUE;
e1a9cb8e 10226
25dbc73a
AM
10227#ifdef DEBUG
10228 fprintf (stderr, "ppc_elf_finish_dynamic_sections called\n");
10229#endif
6b0817e5 10230
25dbc73a 10231 htab = ppc_elf_hash_table (info);
9d8504b1 10232 dynobj = elf_hash_table (info)->dynobj;
3d4d4302 10233 sdyn = bfd_get_linker_section (dynobj, ".dynamic");
9d8504b1 10234 if (htab->is_vxworks)
3d4d4302 10235 splt = bfd_get_linker_section (dynobj, ".plt");
9d8504b1
PB
10236 else
10237 splt = NULL;
e1a9cb8e 10238
1fe44d79
AM
10239 got = 0;
10240 if (htab->elf.hgot != NULL)
e87d4038 10241 got = SYM_VAL (htab->elf.hgot);
1fe44d79 10242
25dbc73a 10243 if (htab->elf.dynamic_sections_created)
e1a9cb8e 10244 {
25dbc73a 10245 Elf32_External_Dyn *dyncon, *dynconend;
e1a9cb8e 10246
25dbc73a 10247 BFD_ASSERT (htab->plt != NULL && sdyn != NULL);
86bbe32f 10248
25dbc73a
AM
10249 dyncon = (Elf32_External_Dyn *) sdyn->contents;
10250 dynconend = (Elf32_External_Dyn *) (sdyn->contents + sdyn->size);
10251 for (; dyncon < dynconend; dyncon++)
10252 {
10253 Elf_Internal_Dyn dyn;
10254 asection *s;
e1a9cb8e 10255
9d8504b1 10256 bfd_elf32_swap_dyn_in (dynobj, dyncon, &dyn);
86bbe32f 10257
25dbc73a
AM
10258 switch (dyn.d_tag)
10259 {
10260 case DT_PLTGOT:
9d8504b1
PB
10261 if (htab->is_vxworks)
10262 s = htab->sgotplt;
10263 else
10264 s = htab->plt;
25dbc73a
AM
10265 dyn.d_un.d_ptr = s->output_section->vma + s->output_offset;
10266 break;
86bbe32f 10267
25dbc73a
AM
10268 case DT_PLTRELSZ:
10269 dyn.d_un.d_val = htab->relplt->size;
10270 break;
e1a9cb8e 10271
25dbc73a
AM
10272 case DT_JMPREL:
10273 s = htab->relplt;
10274 dyn.d_un.d_ptr = s->output_section->vma + s->output_offset;
10275 break;
2f89ff8d 10276
1fe44d79
AM
10277 case DT_PPC_GOT:
10278 dyn.d_un.d_ptr = got;
d7128ce4
AM
10279 break;
10280
9d8504b1
PB
10281 case DT_RELASZ:
10282 if (htab->is_vxworks)
10283 {
10284 if (htab->relplt)
10285 dyn.d_un.d_ptr -= htab->relplt->size;
10286 break;
10287 }
10288 continue;
10289
25dbc73a 10290 default:
7a2b07ff
NS
10291 if (htab->is_vxworks
10292 && elf_vxworks_finish_dynamic_entry (output_bfd, &dyn))
10293 break;
25dbc73a
AM
10294 continue;
10295 }
4c45e5c9 10296
25dbc73a
AM
10297 bfd_elf32_swap_dyn_out (output_bfd, &dyn, dyncon);
10298 }
10299 }
4c45e5c9 10300
3b36f7e6 10301 if (htab->got != NULL)
25dbc73a 10302 {
e79f5955
AM
10303 if (htab->elf.hgot->root.u.def.section == htab->got
10304 || htab->elf.hgot->root.u.def.section == htab->sgotplt)
e87d4038 10305 {
e79f5955 10306 unsigned char *p = htab->elf.hgot->root.u.def.section->contents;
2f89ff8d 10307
e87d4038
AM
10308 p += htab->elf.hgot->root.u.def.value;
10309 if (htab->plt_type == PLT_OLD)
e79f5955
AM
10310 {
10311 /* Add a blrl instruction at _GLOBAL_OFFSET_TABLE_-4
10312 so that a function can easily find the address of
10313 _GLOBAL_OFFSET_TABLE_. */
10314 BFD_ASSERT (htab->elf.hgot->root.u.def.value - 4
10315 < htab->elf.hgot->root.u.def.section->size);
10316 bfd_put_32 (output_bfd, 0x4e800021, p - 4);
10317 }
3b36f7e6 10318
e87d4038 10319 if (sdyn != NULL)
e79f5955
AM
10320 {
10321 bfd_vma val = sdyn->output_section->vma + sdyn->output_offset;
10322 BFD_ASSERT (htab->elf.hgot->root.u.def.value
10323 < htab->elf.hgot->root.u.def.section->size);
10324 bfd_put_32 (output_bfd, val, p);
10325 }
e87d4038
AM
10326 }
10327 else
10328 {
8de848d8 10329 info->callbacks->einfo (_("%P: %s not defined in linker created %s\n"),
25f53a85
AM
10330 htab->elf.hgot->root.root.string,
10331 (htab->sgotplt != NULL
10332 ? htab->sgotplt->name : htab->got->name));
e87d4038
AM
10333 bfd_set_error (bfd_error_bad_value);
10334 ret = FALSE;
10335 }
25dbc73a
AM
10336
10337 elf_section_data (htab->got->output_section)->this_hdr.sh_entsize = 4;
10338 }
10339
9d8504b1
PB
10340 /* Fill in the first entry in the VxWorks procedure linkage table. */
10341 if (splt && splt->size > 0)
10342 {
10343 /* Use the right PLT. */
0e1862bb 10344 const bfd_vma *plt_entry = (bfd_link_pic (info)
5b914448
AM
10345 ? ppc_elf_vxworks_pic_plt0_entry
10346 : ppc_elf_vxworks_plt0_entry);
9d8504b1 10347
0e1862bb 10348 if (!bfd_link_pic (info))
9d8504b1 10349 {
e87d4038 10350 bfd_vma got_value = SYM_VAL (htab->elf.hgot);
9d8504b1 10351
e87d4038 10352 bfd_put_32 (output_bfd, plt_entry[0] | PPC_HA (got_value),
9d8504b1 10353 splt->contents + 0);
e87d4038 10354 bfd_put_32 (output_bfd, plt_entry[1] | PPC_LO (got_value),
9d8504b1
PB
10355 splt->contents + 4);
10356 }
10357 else
10358 {
10359 bfd_put_32 (output_bfd, plt_entry[0], splt->contents + 0);
10360 bfd_put_32 (output_bfd, plt_entry[1], splt->contents + 4);
10361 }
10362 bfd_put_32 (output_bfd, plt_entry[2], splt->contents + 8);
10363 bfd_put_32 (output_bfd, plt_entry[3], splt->contents + 12);
10364 bfd_put_32 (output_bfd, plt_entry[4], splt->contents + 16);
10365 bfd_put_32 (output_bfd, plt_entry[5], splt->contents + 20);
10366 bfd_put_32 (output_bfd, plt_entry[6], splt->contents + 24);
10367 bfd_put_32 (output_bfd, plt_entry[7], splt->contents + 28);
10368
0e1862bb 10369 if (! bfd_link_pic (info))
9d8504b1
PB
10370 {
10371 Elf_Internal_Rela rela;
10372 bfd_byte *loc;
10373
10374 loc = htab->srelplt2->contents;
10375
10376 /* Output the @ha relocation for the first instruction. */
10377 rela.r_offset = (htab->plt->output_section->vma
10378 + htab->plt->output_offset
10379 + 2);
636ce3f5 10380 rela.r_info = ELF32_R_INFO (htab->elf.hgot->indx, R_PPC_ADDR16_HA);
9d8504b1
PB
10381 rela.r_addend = 0;
10382 bfd_elf32_swap_reloca_out (output_bfd, &rela, loc);
10383 loc += sizeof (Elf32_External_Rela);
5b914448 10384
9d8504b1
PB
10385 /* Output the @l relocation for the second instruction. */
10386 rela.r_offset = (htab->plt->output_section->vma
10387 + htab->plt->output_offset
10388 + 6);
636ce3f5 10389 rela.r_info = ELF32_R_INFO (htab->elf.hgot->indx, R_PPC_ADDR16_LO);
9d8504b1
PB
10390 rela.r_addend = 0;
10391 bfd_elf32_swap_reloca_out (output_bfd, &rela, loc);
10392 loc += sizeof (Elf32_External_Rela);
10393
10394 /* Fix up the remaining relocations. They may have the wrong
10395 symbol index for _G_O_T_ or _P_L_T_ depending on the order
10396 in which symbols were output. */
10397 while (loc < htab->srelplt2->contents + htab->srelplt2->size)
10398 {
10399 Elf_Internal_Rela rel;
10400
10401 bfd_elf32_swap_reloc_in (output_bfd, loc, &rel);
636ce3f5 10402 rel.r_info = ELF32_R_INFO (htab->elf.hgot->indx, R_PPC_ADDR16_HA);
9d8504b1
PB
10403 bfd_elf32_swap_reloc_out (output_bfd, &rel, loc);
10404 loc += sizeof (Elf32_External_Rela);
10405
10406 bfd_elf32_swap_reloc_in (output_bfd, loc, &rel);
636ce3f5 10407 rel.r_info = ELF32_R_INFO (htab->elf.hgot->indx, R_PPC_ADDR16_LO);
9d8504b1
PB
10408 bfd_elf32_swap_reloc_out (output_bfd, &rel, loc);
10409 loc += sizeof (Elf32_External_Rela);
10410
10411 bfd_elf32_swap_reloc_in (output_bfd, loc, &rel);
7325306f 10412 rel.r_info = ELF32_R_INFO (htab->elf.hplt->indx, R_PPC_ADDR32);
9d8504b1
PB
10413 bfd_elf32_swap_reloc_out (output_bfd, &rel, loc);
10414 loc += sizeof (Elf32_External_Rela);
10415 }
10416 }
10417 }
10418
e054468f
AM
10419 if (htab->glink != NULL
10420 && htab->glink->contents != NULL
10421 && htab->elf.dynamic_sections_created)
d7128ce4
AM
10422 {
10423 unsigned char *p;
10424 unsigned char *endp;
a6aa5195 10425 bfd_vma res0;
d7128ce4 10426 unsigned int i;
a6aa5195
AM
10427
10428 /*
10429 * PIC glink code is the following:
10430 *
10431 * # ith PLT code stub.
10432 * addis 11,30,(plt+(i-1)*4-got)@ha
10433 * lwz 11,(plt+(i-1)*4-got)@l(11)
10434 * mtctr 11
10435 * bctr
10436 *
10437 * # A table of branches, one for each plt entry.
176a0d42 10438 * # The idea is that the plt call stub loads ctr and r11 with these
a6aa5195
AM
10439 * # addresses, so (r11 - res_0) gives the plt index * 4.
10440 * res_0: b PLTresolve
10441 * res_1: b PLTresolve
10442 * .
10443 * # Some number of entries towards the end can be nops
10444 * res_n_m3: nop
10445 * res_n_m2: nop
10446 * res_n_m1:
10447 *
10448 * PLTresolve:
10449 * addis 11,11,(1f-res_0)@ha
10450 * mflr 0
10451 * bcl 20,31,1f
10452 * 1: addi 11,11,(1b-res_0)@l
10453 * mflr 12
10454 * mtlr 0
10455 * sub 11,11,12 # r11 = index * 4
10456 * addis 12,12,(got+4-1b)@ha
10457 * lwz 0,(got+4-1b)@l(12) # got[1] address of dl_runtime_resolve
10458 * lwz 12,(got+8-1b)@l(12) # got[2] contains the map address
10459 * mtctr 0
10460 * add 0,11,11
10461 * add 11,0,11 # r11 = index * 12 = reloc offset.
10462 * bctr
10463 */
10464 static const unsigned int pic_plt_resolve[] =
10465 {
10466 ADDIS_11_11,
10467 MFLR_0,
10468 BCL_20_31,
10469 ADDI_11_11,
10470 MFLR_12,
10471 MTLR_0,
10472 SUB_11_11_12,
10473 ADDIS_12_12,
10474 LWZ_0_12,
10475 LWZ_12_12,
10476 MTCTR_0,
10477 ADD_0_11_11,
10478 ADD_11_0_11,
10479 BCTR,
10480 NOP,
10481 NOP
10482 };
10483
176a0d42
AM
10484 /*
10485 * Non-PIC glink code is a little simpler.
10486 *
10487 * # ith PLT code stub.
10488 * lis 11,(plt+(i-1)*4)@ha
10489 * lwz 11,(plt+(i-1)*4)@l(11)
10490 * mtctr 11
10491 * bctr
10492 *
10493 * The branch table is the same, then comes
10494 *
10495 * PLTresolve:
10496 * lis 12,(got+4)@ha
10497 * addis 11,11,(-res_0)@ha
10498 * lwz 0,(got+4)@l(12) # got[1] address of dl_runtime_resolve
10499 * addi 11,11,(-res_0)@l # r11 = index * 4
10500 * mtctr 0
10501 * add 0,11,11
10502 * lwz 12,(got+8)@l(12) # got[2] contains the map address
10503 * add 11,0,11 # r11 = index * 12 = reloc offset.
10504 * bctr
10505 */
d7128ce4
AM
10506 static const unsigned int plt_resolve[] =
10507 {
a6aa5195
AM
10508 LIS_12,
10509 ADDIS_11_11,
10510 LWZ_0_12,
10511 ADDI_11_11,
d7128ce4 10512 MTCTR_0,
7e8aeb9a 10513 ADD_0_11_11,
a6aa5195 10514 LWZ_12_12,
7e8aeb9a 10515 ADD_11_0_11,
d7128ce4
AM
10516 BCTR,
10517 NOP,
10518 NOP,
a6aa5195
AM
10519 NOP,
10520 NOP,
10521 NOP,
10522 NOP,
d7128ce4
AM
10523 NOP
10524 };
10525
a6aa5195
AM
10526 if (ARRAY_SIZE (pic_plt_resolve) != GLINK_PLTRESOLVE / 4)
10527 abort ();
10528 if (ARRAY_SIZE (plt_resolve) != GLINK_PLTRESOLVE / 4)
7e8aeb9a
AM
10529 abort ();
10530
a6aa5195 10531 /* Build the branch table, one for each plt entry (less one),
86b9da88 10532 and perhaps some padding. */
a6aa5195
AM
10533 p = htab->glink->contents;
10534 p += htab->glink_pltresolve;
86b9da88
AM
10535 endp = htab->glink->contents;
10536 endp += htab->glink->size - GLINK_PLTRESOLVE;
da3a2088 10537 while (p < endp - (htab->params->ppc476_workaround ? 0 : 8 * 4))
86b9da88
AM
10538 {
10539 bfd_put_32 (output_bfd, B + endp - p, p);
10540 p += 4;
10541 }
10542 while (p < endp)
10543 {
10544 bfd_put_32 (output_bfd, NOP, p);
10545 p += 4;
10546 }
10547
7e8aeb9a 10548 res0 = (htab->glink_pltresolve
86b9da88
AM
10549 + htab->glink->output_section->vma
10550 + htab->glink->output_offset);
10551
da3a2088
AM
10552 if (htab->params->ppc476_workaround)
10553 {
10554 /* Ensure that a call stub at the end of a page doesn't
10555 result in prefetch over the end of the page into the
10556 glink branch table. */
10557 bfd_vma pagesize = (bfd_vma) 1 << htab->params->pagesize_p2;
10558 bfd_vma page_addr;
10559 bfd_vma glink_start = (htab->glink->output_section->vma
10560 + htab->glink->output_offset);
10561
10562 for (page_addr = res0 & -pagesize;
10563 page_addr > glink_start;
10564 page_addr -= pagesize)
10565 {
10566 /* We have a plt call stub that may need fixing. */
10567 bfd_byte *loc;
10568 unsigned int insn;
10569
10570 loc = htab->glink->contents + page_addr - 4 - glink_start;
10571 insn = bfd_get_32 (output_bfd, loc);
10572 if (insn == BCTR)
10573 {
10574 /* By alignment, we know that there must be at least
10575 one other call stub before this one. */
10576 insn = bfd_get_32 (output_bfd, loc - 16);
10577 if (insn == BCTR)
10578 bfd_put_32 (output_bfd, B | (-16 & 0x3fffffc), loc);
10579 else
10580 bfd_put_32 (output_bfd, B | (-20 & 0x3fffffc), loc);
10581 }
10582 }
10583 }
10584
86b9da88 10585 /* Last comes the PLTresolve stub. */
0e1862bb 10586 if (bfd_link_pic (info))
7e8aeb9a 10587 {
a6aa5195 10588 bfd_vma bcl;
d7128ce4 10589
a6aa5195 10590 for (i = 0; i < ARRAY_SIZE (pic_plt_resolve); i++)
7e8aeb9a 10591 {
da3a2088
AM
10592 unsigned int insn = pic_plt_resolve[i];
10593
10594 if (htab->params->ppc476_workaround && insn == NOP)
10595 insn = BA + 0;
10596 bfd_put_32 (output_bfd, insn, p);
7e8aeb9a
AM
10597 p += 4;
10598 }
a6aa5195
AM
10599 p -= 4 * ARRAY_SIZE (pic_plt_resolve);
10600
10601 bcl = (htab->glink->size - GLINK_PLTRESOLVE + 3*4
10602 + htab->glink->output_section->vma
10603 + htab->glink->output_offset);
10604
10605 bfd_put_32 (output_bfd,
10606 ADDIS_11_11 + PPC_HA (bcl - res0), p + 0*4);
10607 bfd_put_32 (output_bfd,
10608 ADDI_11_11 + PPC_LO (bcl - res0), p + 3*4);
10609 bfd_put_32 (output_bfd,
10610 ADDIS_12_12 + PPC_HA (got + 4 - bcl), p + 7*4);
10611 if (PPC_HA (got + 4 - bcl) == PPC_HA (got + 8 - bcl))
10612 {
10613 bfd_put_32 (output_bfd,
10614 LWZ_0_12 + PPC_LO (got + 4 - bcl), p + 8*4);
10615 bfd_put_32 (output_bfd,
10616 LWZ_12_12 + PPC_LO (got + 8 - bcl), p + 9*4);
10617 }
10618 else
10619 {
10620 bfd_put_32 (output_bfd,
10621 LWZU_0_12 + PPC_LO (got + 4 - bcl), p + 8*4);
10622 bfd_put_32 (output_bfd,
10623 LWZ_12_12 + 4, p + 9*4);
10624 }
7e8aeb9a
AM
10625 }
10626 else
d7128ce4 10627 {
a6aa5195 10628 for (i = 0; i < ARRAY_SIZE (plt_resolve); i++)
7e8aeb9a 10629 {
da3a2088
AM
10630 unsigned int insn = plt_resolve[i];
10631
10632 if (htab->params->ppc476_workaround && insn == NOP)
10633 insn = BA + 0;
10634 bfd_put_32 (output_bfd, insn, p);
7e8aeb9a
AM
10635 p += 4;
10636 }
a6aa5195
AM
10637 p -= 4 * ARRAY_SIZE (plt_resolve);
10638
10639 bfd_put_32 (output_bfd,
10640 LIS_12 + PPC_HA (got + 4), p + 0*4);
10641 bfd_put_32 (output_bfd,
10642 ADDIS_11_11 + PPC_HA (-res0), p + 1*4);
10643 bfd_put_32 (output_bfd,
10644 ADDI_11_11 + PPC_LO (-res0), p + 3*4);
10645 if (PPC_HA (got + 4) == PPC_HA (got + 8))
10646 {
10647 bfd_put_32 (output_bfd,
10648 LWZ_0_12 + PPC_LO (got + 4), p + 2*4);
10649 bfd_put_32 (output_bfd,
10650 LWZ_12_12 + PPC_LO (got + 8), p + 6*4);
10651 }
10652 else
10653 {
10654 bfd_put_32 (output_bfd,
10655 LWZU_0_12 + PPC_LO (got + 4), p + 2*4);
10656 bfd_put_32 (output_bfd,
10657 LWZ_12_12 + 4, p + 6*4);
10658 }
d7128ce4 10659 }
d7128ce4
AM
10660 }
10661
6177242a
AM
10662 if (htab->glink_eh_frame != NULL
10663 && htab->glink_eh_frame->contents != NULL)
10664 {
10665 unsigned char *p = htab->glink_eh_frame->contents;
10666 bfd_vma val;
10667
6177242a
AM
10668 p += sizeof (glink_eh_frame_cie);
10669 /* FDE length. */
6177242a
AM
10670 p += 4;
10671 /* CIE pointer. */
6177242a
AM
10672 p += 4;
10673 /* Offset to .glink. */
10674 val = (htab->glink->output_section->vma
10675 + htab->glink->output_offset);
10676 val -= (htab->glink_eh_frame->output_section->vma
10677 + htab->glink_eh_frame->output_offset);
10678 val -= p - htab->glink_eh_frame->contents;
10679 bfd_put_32 (htab->elf.dynobj, val, p);
6177242a 10680
dbaa2011 10681 if (htab->glink_eh_frame->sec_info_type == SEC_INFO_TYPE_EH_FRAME
6177242a
AM
10682 && !_bfd_elf_write_section_eh_frame (output_bfd, info,
10683 htab->glink_eh_frame,
10684 htab->glink_eh_frame->contents))
10685 return FALSE;
10686 }
10687
e87d4038 10688 return ret;
25dbc73a 10689}
e1a9cb8e 10690\f
6d00b590 10691#define TARGET_LITTLE_SYM powerpc_elf32_le_vec
252b5132 10692#define TARGET_LITTLE_NAME "elf32-powerpcle"
6d00b590 10693#define TARGET_BIG_SYM powerpc_elf32_vec
252b5132
RH
10694#define TARGET_BIG_NAME "elf32-powerpc"
10695#define ELF_ARCH bfd_arch_powerpc
ae95ffa6 10696#define ELF_TARGET_ID PPC32_ELF_DATA
252b5132 10697#define ELF_MACHINE_CODE EM_PPC
d0facd1b
NC
10698#ifdef __QNXTARGET__
10699#define ELF_MAXPAGESIZE 0x1000
04c6a44c 10700#define ELF_COMMONPAGESIZE 0x1000
d0facd1b 10701#else
252b5132 10702#define ELF_MAXPAGESIZE 0x10000
04c6a44c 10703#define ELF_COMMONPAGESIZE 0x10000
d0facd1b 10704#endif
b1342370 10705#define ELF_MINPAGESIZE 0x1000
252b5132
RH
10706#define elf_info_to_howto ppc_elf_info_to_howto
10707
10708#ifdef EM_CYGNUS_POWERPC
10709#define ELF_MACHINE_ALT1 EM_CYGNUS_POWERPC
10710#endif
10711
10712#ifdef EM_PPC_OLD
10713#define ELF_MACHINE_ALT2 EM_PPC_OLD
10714#endif
10715
10716#define elf_backend_plt_not_loaded 1
252b5132 10717#define elf_backend_can_gc_sections 1
51b64d56 10718#define elf_backend_can_refcount 1
b491616a 10719#define elf_backend_rela_normal 1
53291d1f 10720#define elf_backend_caches_rawsize 1
252b5132 10721
43c40ab2 10722#define bfd_elf32_mkobject ppc_elf_mkobject
252b5132 10723#define bfd_elf32_bfd_merge_private_bfd_data ppc_elf_merge_private_bfd_data
70bccea4 10724#define bfd_elf32_bfd_relax_section ppc_elf_relax_section
252b5132 10725#define bfd_elf32_bfd_reloc_type_lookup ppc_elf_reloc_type_lookup
b9c361e0 10726#define bfd_elf32_bfd_reloc_name_lookup ppc_elf_reloc_name_lookup
252b5132 10727#define bfd_elf32_bfd_set_private_flags ppc_elf_set_private_flags
70bccea4 10728#define bfd_elf32_bfd_link_hash_table_create ppc_elf_link_hash_table_create
468392fb 10729#define bfd_elf32_get_synthetic_symtab ppc_elf_get_synthetic_symtab
252b5132 10730
feee612b 10731#define elf_backend_object_p ppc_elf_object_p
252b5132
RH
10732#define elf_backend_gc_mark_hook ppc_elf_gc_mark_hook
10733#define elf_backend_gc_sweep_hook ppc_elf_gc_sweep_hook
10734#define elf_backend_section_from_shdr ppc_elf_section_from_shdr
10735#define elf_backend_relocate_section ppc_elf_relocate_section
10736#define elf_backend_create_dynamic_sections ppc_elf_create_dynamic_sections
10737#define elf_backend_check_relocs ppc_elf_check_relocs
7fce784e 10738#define elf_backend_copy_indirect_symbol ppc_elf_copy_indirect_symbol
252b5132
RH
10739#define elf_backend_adjust_dynamic_symbol ppc_elf_adjust_dynamic_symbol
10740#define elf_backend_add_symbol_hook ppc_elf_add_symbol_hook
10741#define elf_backend_size_dynamic_sections ppc_elf_size_dynamic_sections
0eb4a168 10742#define elf_backend_hash_symbol ppc_elf_hash_symbol
252b5132
RH
10743#define elf_backend_finish_dynamic_symbol ppc_elf_finish_dynamic_symbol
10744#define elf_backend_finish_dynamic_sections ppc_elf_finish_dynamic_sections
10745#define elf_backend_fake_sections ppc_elf_fake_sections
10746#define elf_backend_additional_program_headers ppc_elf_additional_program_headers
b9c361e0 10747#define elf_backend_modify_segment_map ppc_elf_modify_segment_map
c5fccbec
DJ
10748#define elf_backend_grok_prstatus ppc_elf_grok_prstatus
10749#define elf_backend_grok_psinfo ppc_elf_grok_psinfo
183e98be 10750#define elf_backend_write_core_note ppc_elf_write_core_note
29c2fb7c 10751#define elf_backend_reloc_type_class ppc_elf_reloc_type_class
70bccea4
AM
10752#define elf_backend_begin_write_processing ppc_elf_begin_write_processing
10753#define elf_backend_final_write_processing ppc_elf_final_write_processing
10754#define elf_backend_write_section ppc_elf_write_section
551b43fd 10755#define elf_backend_get_sec_type_attr ppc_elf_get_sec_type_attr
4c45e5c9 10756#define elf_backend_plt_sym_val ppc_elf_plt_sym_val
8a696751 10757#define elf_backend_action_discarded ppc_elf_action_discarded
74541ad4 10758#define elf_backend_init_index_section _bfd_elf_init_1_index_section
b9c361e0 10759#define elf_backend_lookup_section_flags_hook ppc_elf_lookup_section_flags
b9c361e0 10760#define elf_backend_section_processing ppc_elf_section_processing
252b5132
RH
10761
10762#include "elf32-target.h"
9d8504b1 10763
7b8e7dad
AM
10764/* FreeBSD Target */
10765
10766#undef TARGET_LITTLE_SYM
10767#undef TARGET_LITTLE_NAME
10768
10769#undef TARGET_BIG_SYM
6d00b590 10770#define TARGET_BIG_SYM powerpc_elf32_fbsd_vec
7b8e7dad
AM
10771#undef TARGET_BIG_NAME
10772#define TARGET_BIG_NAME "elf32-powerpc-freebsd"
10773
10774#undef ELF_OSABI
10775#define ELF_OSABI ELFOSABI_FREEBSD
10776
10777#undef elf32_bed
10778#define elf32_bed elf32_powerpc_fbsd_bed
10779
10780#include "elf32-target.h"
10781
9d8504b1
PB
10782/* VxWorks Target */
10783
10784#undef TARGET_LITTLE_SYM
10785#undef TARGET_LITTLE_NAME
10786
10787#undef TARGET_BIG_SYM
6d00b590 10788#define TARGET_BIG_SYM powerpc_elf32_vxworks_vec
9d8504b1
PB
10789#undef TARGET_BIG_NAME
10790#define TARGET_BIG_NAME "elf32-powerpc-vxworks"
10791
7b8e7dad
AM
10792#undef ELF_OSABI
10793
d5e3d971
PB
10794/* VxWorks uses the elf default section flags for .plt. */
10795static const struct bfd_elf_special_section *
10796ppc_elf_vxworks_get_sec_type_attr (bfd *abfd ATTRIBUTE_UNUSED, asection *sec)
9d8504b1 10797{
d5e3d971
PB
10798 if (sec->name == NULL)
10799 return NULL;
10800
10801 if (strcmp (sec->name, ".plt") == 0)
10802 return _bfd_elf_get_sec_type_attr (abfd, sec);
10803
10804 return ppc_elf_get_sec_type_attr (abfd, sec);
10805}
9d8504b1
PB
10806
10807/* Like ppc_elf_link_hash_table_create, but overrides
10808 appropriately for VxWorks. */
10809static struct bfd_link_hash_table *
10810ppc_elf_vxworks_link_hash_table_create (bfd *abfd)
10811{
10812 struct bfd_link_hash_table *ret;
10813
10814 ret = ppc_elf_link_hash_table_create (abfd);
10815 if (ret)
10816 {
10817 struct ppc_elf_link_hash_table *htab
10818 = (struct ppc_elf_link_hash_table *)ret;
10819 htab->is_vxworks = 1;
4a3dc543 10820 htab->plt_type = PLT_VXWORKS;
9d8504b1
PB
10821 htab->plt_entry_size = VXWORKS_PLT_ENTRY_SIZE;
10822 htab->plt_slot_size = VXWORKS_PLT_ENTRY_SIZE;
10823 htab->plt_initial_entry_size = VXWORKS_PLT_INITIAL_ENTRY_SIZE;
10824 }
10825 return ret;
10826}
10827
10828/* Tweak magic VxWorks symbols as they are loaded. */
10829static bfd_boolean
10830ppc_elf_vxworks_add_symbol_hook (bfd *abfd,
10831 struct bfd_link_info *info,
10832 Elf_Internal_Sym *sym,
10833 const char **namep ATTRIBUTE_UNUSED,
10834 flagword *flagsp ATTRIBUTE_UNUSED,
10835 asection **secp,
10836 bfd_vma *valp)
10837{
10838 if (!elf_vxworks_add_symbol_hook(abfd, info, sym,namep, flagsp, secp,
10839 valp))
10840 return FALSE;
10841
10842 return ppc_elf_add_symbol_hook(abfd, info, sym,namep, flagsp, secp, valp);
10843}
10844
9d8504b1
PB
10845static void
10846ppc_elf_vxworks_final_write_processing (bfd *abfd, bfd_boolean linker)
10847{
10848 ppc_elf_final_write_processing(abfd, linker);
10849 elf_vxworks_final_write_processing(abfd, linker);
10850}
10851
10852/* On VxWorks, we emit relocations against _PROCEDURE_LINKAGE_TABLE_, so
10853 define it. */
10854#undef elf_backend_want_plt_sym
10855#define elf_backend_want_plt_sym 1
10856#undef elf_backend_want_got_plt
10857#define elf_backend_want_got_plt 1
10858#undef elf_backend_got_symbol_offset
10859#define elf_backend_got_symbol_offset 0
10860#undef elf_backend_plt_not_loaded
10861#define elf_backend_plt_not_loaded 0
10862#undef elf_backend_plt_readonly
10863#define elf_backend_plt_readonly 1
10864#undef elf_backend_got_header_size
10865#define elf_backend_got_header_size 12
10866
468392fb
AM
10867#undef bfd_elf32_get_synthetic_symtab
10868
9d8504b1
PB
10869#undef bfd_elf32_bfd_link_hash_table_create
10870#define bfd_elf32_bfd_link_hash_table_create \
10871 ppc_elf_vxworks_link_hash_table_create
9d8504b1
PB
10872#undef elf_backend_add_symbol_hook
10873#define elf_backend_add_symbol_hook \
10874 ppc_elf_vxworks_add_symbol_hook
10875#undef elf_backend_link_output_symbol_hook
10876#define elf_backend_link_output_symbol_hook \
9c72ff84 10877 elf_vxworks_link_output_symbol_hook
9d8504b1
PB
10878#undef elf_backend_final_write_processing
10879#define elf_backend_final_write_processing \
10880 ppc_elf_vxworks_final_write_processing
d5e3d971
PB
10881#undef elf_backend_get_sec_type_attr
10882#define elf_backend_get_sec_type_attr \
10883 ppc_elf_vxworks_get_sec_type_attr
9d8504b1
PB
10884#undef elf_backend_emit_relocs
10885#define elf_backend_emit_relocs \
10886 elf_vxworks_emit_relocs
10887
10888#undef elf32_bed
10889#define elf32_bed ppc_elf_vxworks_bed
e054468f 10890#undef elf_backend_post_process_headers
9d8504b1
PB
10891
10892#include "elf32-target.h"
This page took 2.123874 seconds and 4 git commands to generate.