PowerPC, use size_t rather than long for indices
[deliverable/binutils-gdb.git] / bfd / elf32-ppc.c
CommitLineData
252b5132 1/* PowerPC-specific support for 32-bit ELF
82704155 2 Copyright (C) 1994-2019 Free Software Foundation, Inc.
252b5132
RH
3 Written by Ian Lance Taylor, Cygnus Support.
4
ae9a127f 5 This file is part of BFD, the Binary File Descriptor library.
252b5132 6
ae9a127f
NC
7 This program is free software; you can redistribute it and/or modify
8 it under the terms of the GNU General Public License as published by
cd123cb7 9 the Free Software Foundation; either version 3 of the License, or
ae9a127f 10 (at your option) any later version.
252b5132 11
ae9a127f
NC
12 This program is distributed in the hope that it will be useful,
13 but WITHOUT ANY WARRANTY; without even the implied warranty of
14 MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
15 GNU General Public License for more details.
252b5132 16
ae9a127f 17 You should have received a copy of the GNU General Public License
fc0bffd6 18 along with this program; if not, write to the
3e110533 19 Free Software Foundation, Inc., 51 Franklin Street - Fifth Floor,
53e09e0a 20 Boston, MA 02110-1301, USA. */
252b5132 21
cd123cb7 22
252b5132
RH
23/* This file is based on a preliminary PowerPC ELF ABI. The
24 information may not match the final PowerPC ELF ABI. It includes
25 suggestions from the in-progress Embedded PowerPC ABI, and that
26 information may also not match. */
27
3db64b00 28#include "sysdep.h"
183e98be 29#include <stdarg.h>
252b5132 30#include "bfd.h"
252b5132
RH
31#include "bfdlink.h"
32#include "libbfd.h"
33#include "elf-bfd.h"
34#include "elf/ppc.h"
7619e7c7 35#include "elf32-ppc.h"
9d8504b1 36#include "elf-vxworks.h"
6177242a 37#include "dwarf2.h"
08dc996f 38#include "opcode/ppc.h"
252b5132 39
bb294208
AM
40/* All users of this file have bfd_octets_per_byte (abfd, sec) == 1. */
41#define OCTETS_PER_BYTE(ABFD, SEC) 1
42
b9c361e0
JL
43typedef enum split16_format_type
44{
45 split16a_type = 0,
46 split16d_type
47}
48split16_format_type;
49
f0fe0e16 50/* RELA relocations are used here. */
252b5132 51
252b5132 52static bfd_reloc_status_type ppc_elf_addr16_ha_reloc
55fd94b0 53 (bfd *, arelent *, asymbol *, void *, asection *, bfd *, char **);
7619e7c7 54static bfd_reloc_status_type ppc_elf_unhandled_reloc
55fd94b0 55 (bfd *, arelent *, asymbol *, void *, asection *, bfd *, char **);
252b5132 56
70bccea4
AM
57/* Branch prediction bit for branch taken relocs. */
58#define BRANCH_PREDICT_BIT 0x200000
59/* Mask to set RA in memory instructions. */
60#define RA_REGISTER_MASK 0x001f0000
61/* Value to shift register by to insert RA. */
62#define RA_REGISTER_SHIFT 16
252b5132
RH
63
64/* The name of the dynamic interpreter. This is put in the .interp
65 section. */
252b5132
RH
66#define ELF_DYNAMIC_INTERPRETER "/usr/lib/ld.so.1"
67
d7128ce4 68/* For old-style PLT. */
252b5132
RH
69/* The number of single-slot PLT entries (the rest use two slots). */
70#define PLT_NUM_SINGLE_ENTRIES 8192
71
d7128ce4 72/* For new-style .glink and .plt. */
a6aa5195 73#define GLINK_PLTRESOLVE 16*4
9e390558 74#define GLINK_ENTRY_SIZE(htab, h) \
407aa07c 75 ((4*4 \
9e390558
AM
76 + (h != NULL \
77 && h == htab->tls_get_addr \
78 && !htab->params->no_tls_get_addr_opt ? 8*4 : 0) \
79 + (1u << htab->params->plt_stub_align) - 1) \
80 & -(1u << htab->params->plt_stub_align))
d7128ce4 81
9d8504b1
PB
82/* VxWorks uses its own plt layout, filled in by the static linker. */
83
84/* The standard VxWorks PLT entry. */
85#define VXWORKS_PLT_ENTRY_SIZE 32
86static const bfd_vma ppc_elf_vxworks_plt_entry
87 [VXWORKS_PLT_ENTRY_SIZE / 4] =
88 {
07d6d2b8
AM
89 0x3d800000, /* lis r12,0 */
90 0x818c0000, /* lwz r12,0(r12) */
91 0x7d8903a6, /* mtctr r12 */
92 0x4e800420, /* bctr */
93 0x39600000, /* li r11,0 */
94 0x48000000, /* b 14 <.PLT0resolve+0x4> */
95 0x60000000, /* nop */
96 0x60000000, /* nop */
9d8504b1
PB
97 };
98static const bfd_vma ppc_elf_vxworks_pic_plt_entry
99 [VXWORKS_PLT_ENTRY_SIZE / 4] =
100 {
101 0x3d9e0000, /* addis r12,r30,0 */
102 0x818c0000, /* lwz r12,0(r12) */
103 0x7d8903a6, /* mtctr r12 */
104 0x4e800420, /* bctr */
105 0x39600000, /* li r11,0 */
106 0x48000000, /* b 14 <.PLT0resolve+0x4> 14: R_PPC_REL24 .PLTresolve */
107 0x60000000, /* nop */
108 0x60000000, /* nop */
109 };
110
111/* The initial VxWorks PLT entry. */
112#define VXWORKS_PLT_INITIAL_ENTRY_SIZE 32
113static const bfd_vma ppc_elf_vxworks_plt0_entry
114 [VXWORKS_PLT_INITIAL_ENTRY_SIZE / 4] =
115 {
07d6d2b8
AM
116 0x3d800000, /* lis r12,0 */
117 0x398c0000, /* addi r12,r12,0 */
118 0x800c0008, /* lwz r0,8(r12) */
119 0x7c0903a6, /* mtctr r0 */
120 0x818c0004, /* lwz r12,4(r12) */
121 0x4e800420, /* bctr */
122 0x60000000, /* nop */
123 0x60000000, /* nop */
9d8504b1
PB
124 };
125static const bfd_vma ppc_elf_vxworks_pic_plt0_entry
126 [VXWORKS_PLT_INITIAL_ENTRY_SIZE / 4] =
127 {
128 0x819e0008, /* lwz r12,8(r30) */
07d6d2b8 129 0x7d8903a6, /* mtctr r12 */
9d8504b1 130 0x819e0004, /* lwz r12,4(r30) */
07d6d2b8
AM
131 0x4e800420, /* bctr */
132 0x60000000, /* nop */
133 0x60000000, /* nop */
134 0x60000000, /* nop */
135 0x60000000, /* nop */
9d8504b1
PB
136 };
137
138/* For executables, we have some additional relocations in
139 .rela.plt.unloaded, for the kernel loader. */
140
141/* The number of non-JMP_SLOT relocations per PLT0 slot. */
142#define VXWORKS_PLT_NON_JMP_SLOT_RELOCS 3
143/* The number of relocations in the PLTResolve slot. */
144#define VXWORKS_PLTRESOLVE_RELOCS 2
de194d85 145/* The number of relocations in the PLTResolve slot when creating
9d8504b1
PB
146 a shared library. */
147#define VXWORKS_PLTRESOLVE_RELOCS_SHLIB 0
148
d7128ce4 149/* Some instructions. */
d7128ce4 150#define ADDIS_11_11 0x3d6b0000
a6aa5195
AM
151#define ADDIS_11_30 0x3d7e0000
152#define ADDIS_12_12 0x3d8c0000
d7128ce4 153#define ADDI_11_11 0x396b0000
d7128ce4 154#define ADD_0_11_11 0x7c0b5a14
a7f2871e 155#define ADD_3_12_2 0x7c6c1214
d7128ce4 156#define ADD_11_0_11 0x7d605a14
a6aa5195 157#define B 0x48000000
da3a2088 158#define BA 0x48000002
a6aa5195 159#define BCL_20_31 0x429f0005
d7128ce4 160#define BCTR 0x4e800420
a7f2871e
AM
161#define BEQLR 0x4d820020
162#define CMPWI_11_0 0x2c0b0000
7e8aeb9a
AM
163#define LIS_11 0x3d600000
164#define LIS_12 0x3d800000
a6aa5195
AM
165#define LWZU_0_12 0x840c0000
166#define LWZ_0_12 0x800c0000
a7f2871e 167#define LWZ_11_3 0x81630000
a6aa5195
AM
168#define LWZ_11_11 0x816b0000
169#define LWZ_11_30 0x817e0000
a7f2871e 170#define LWZ_12_3 0x81830000
a6aa5195 171#define LWZ_12_12 0x818c0000
a7f2871e
AM
172#define MR_0_3 0x7c601b78
173#define MR_3_0 0x7c030378
a6aa5195
AM
174#define MFLR_0 0x7c0802a6
175#define MFLR_12 0x7d8802a6
176#define MTCTR_0 0x7c0903a6
177#define MTCTR_11 0x7d6903a6
178#define MTLR_0 0x7c0803a6
179#define NOP 0x60000000
180#define SUB_11_11_12 0x7d6c5850
7619e7c7
AM
181
182/* Offset of tp and dtp pointers from start of TLS block. */
183#define TP_OFFSET 0x7000
184#define DTP_OFFSET 0x8000
e87d4038
AM
185
186/* The value of a defined global symbol. */
187#define SYM_VAL(SYM) \
188 ((SYM)->root.u.def.section->output_section->vma \
189 + (SYM)->root.u.def.section->output_offset \
190 + (SYM)->root.u.def.value)
7fce784e 191\f
46807bf4
AM
192/* Relocation HOWTO's. */
193/* Like other ELF RELA targets that don't apply multiple
194 field-altering relocations to the same localation, src_mask is
195 always zero and pcrel_offset is the same as pc_relative.
196 PowerPC can always use a zero bitpos, even when the field is not at
197 the LSB. For example, a REL24 could use rightshift=2, bisize=24
198 and bitpos=2 which matches the ABI description, or as we do here,
199 rightshift=0, bitsize=26 and bitpos=0. */
200#define HOW(type, size, bitsize, mask, rightshift, pc_relative, \
201 complain, special_func) \
202 HOWTO (type, rightshift, size, bitsize, pc_relative, 0, \
203 complain_overflow_ ## complain, special_func, \
204 #type, FALSE, 0, mask, pc_relative)
205
e47cd125 206static reloc_howto_type *ppc_elf_howto_table[R_PPC_max];
252b5132 207
8da6118f 208static reloc_howto_type ppc_elf_howto_raw[] = {
252b5132 209 /* This reloc does nothing. */
46807bf4
AM
210 HOW (R_PPC_NONE, 3, 0, 0, 0, FALSE, dont,
211 bfd_elf_generic_reloc),
252b5132
RH
212
213 /* A standard 32 bit relocation. */
46807bf4
AM
214 HOW (R_PPC_ADDR32, 2, 32, 0xffffffff, 0, FALSE, dont,
215 bfd_elf_generic_reloc),
252b5132
RH
216
217 /* An absolute 26 bit branch; the lower two bits must be zero.
218 FIXME: we don't check that, we just clear them. */
46807bf4
AM
219 HOW (R_PPC_ADDR24, 2, 26, 0x3fffffc, 0, FALSE, signed,
220 bfd_elf_generic_reloc),
252b5132
RH
221
222 /* A standard 16 bit relocation. */
46807bf4
AM
223 HOW (R_PPC_ADDR16, 1, 16, 0xffff, 0, FALSE, bitfield,
224 bfd_elf_generic_reloc),
252b5132
RH
225
226 /* A 16 bit relocation without overflow. */
46807bf4
AM
227 HOW (R_PPC_ADDR16_LO, 1, 16, 0xffff, 0, FALSE, dont,
228 bfd_elf_generic_reloc),
252b5132
RH
229
230 /* The high order 16 bits of an address. */
46807bf4
AM
231 HOW (R_PPC_ADDR16_HI, 1, 16, 0xffff, 16, FALSE, dont,
232 bfd_elf_generic_reloc),
252b5132
RH
233
234 /* The high order 16 bits of an address, plus 1 if the contents of
8da6118f 235 the low 16 bits, treated as a signed number, is negative. */
46807bf4
AM
236 HOW (R_PPC_ADDR16_HA, 1, 16, 0xffff, 16, FALSE, dont,
237 ppc_elf_addr16_ha_reloc),
252b5132
RH
238
239 /* An absolute 16 bit branch; the lower two bits must be zero.
240 FIXME: we don't check that, we just clear them. */
46807bf4
AM
241 HOW (R_PPC_ADDR14, 2, 16, 0xfffc, 0, FALSE, signed,
242 bfd_elf_generic_reloc),
252b5132
RH
243
244 /* An absolute 16 bit branch, for which bit 10 should be set to
245 indicate that the branch is expected to be taken. The lower two
8da6118f 246 bits must be zero. */
46807bf4
AM
247 HOW (R_PPC_ADDR14_BRTAKEN, 2, 16, 0xfffc, 0, FALSE, signed,
248 bfd_elf_generic_reloc),
252b5132
RH
249
250 /* An absolute 16 bit branch, for which bit 10 should be set to
251 indicate that the branch is not expected to be taken. The lower
252 two bits must be zero. */
46807bf4
AM
253 HOW (R_PPC_ADDR14_BRNTAKEN, 2, 16, 0xfffc, 0, FALSE, signed,
254 bfd_elf_generic_reloc),
252b5132 255
8da6118f 256 /* A relative 26 bit branch; the lower two bits must be zero. */
46807bf4
AM
257 HOW (R_PPC_REL24, 2, 26, 0x3fffffc, 0, TRUE, signed,
258 bfd_elf_generic_reloc),
252b5132 259
8da6118f 260 /* A relative 16 bit branch; the lower two bits must be zero. */
46807bf4
AM
261 HOW (R_PPC_REL14, 2, 16, 0xfffc, 0, TRUE, signed,
262 bfd_elf_generic_reloc),
252b5132 263
8da6118f 264 /* A relative 16 bit branch. Bit 10 should be set to indicate that
252b5132
RH
265 the branch is expected to be taken. The lower two bits must be
266 zero. */
46807bf4
AM
267 HOW (R_PPC_REL14_BRTAKEN, 2, 16, 0xfffc, 0, TRUE, signed,
268 bfd_elf_generic_reloc),
252b5132 269
8da6118f 270 /* A relative 16 bit branch. Bit 10 should be set to indicate that
252b5132
RH
271 the branch is not expected to be taken. The lower two bits must
272 be zero. */
46807bf4
AM
273 HOW (R_PPC_REL14_BRNTAKEN, 2, 16, 0xfffc, 0, TRUE, signed,
274 bfd_elf_generic_reloc),
252b5132
RH
275
276 /* Like R_PPC_ADDR16, but referring to the GOT table entry for the
277 symbol. */
46807bf4
AM
278 HOW (R_PPC_GOT16, 1, 16, 0xffff, 0, FALSE, signed,
279 ppc_elf_unhandled_reloc),
252b5132
RH
280
281 /* Like R_PPC_ADDR16_LO, but referring to the GOT table entry for
282 the symbol. */
46807bf4
AM
283 HOW (R_PPC_GOT16_LO, 1, 16, 0xffff, 0, FALSE, dont,
284 ppc_elf_unhandled_reloc),
252b5132
RH
285
286 /* Like R_PPC_ADDR16_HI, but referring to the GOT table entry for
287 the symbol. */
46807bf4
AM
288 HOW (R_PPC_GOT16_HI, 1, 16, 0xffff, 16, FALSE, dont,
289 ppc_elf_unhandled_reloc),
252b5132
RH
290
291 /* Like R_PPC_ADDR16_HA, but referring to the GOT table entry for
292 the symbol. */
46807bf4
AM
293 HOW (R_PPC_GOT16_HA, 1, 16, 0xffff, 16, FALSE, dont,
294 ppc_elf_unhandled_reloc),
252b5132
RH
295
296 /* Like R_PPC_REL24, but referring to the procedure linkage table
297 entry for the symbol. */
46807bf4
AM
298 HOW (R_PPC_PLTREL24, 2, 26, 0x3fffffc, 0, TRUE, signed,
299 ppc_elf_unhandled_reloc),
252b5132
RH
300
301 /* This is used only by the dynamic linker. The symbol should exist
302 both in the object being run and in some shared library. The
303 dynamic linker copies the data addressed by the symbol from the
304 shared library into the object, because the object being
305 run has to have the data at some particular address. */
46807bf4
AM
306 HOW (R_PPC_COPY, 2, 32, 0, 0, FALSE, dont,
307 ppc_elf_unhandled_reloc),
252b5132
RH
308
309 /* Like R_PPC_ADDR32, but used when setting global offset table
310 entries. */
46807bf4
AM
311 HOW (R_PPC_GLOB_DAT, 2, 32, 0xffffffff, 0, FALSE, dont,
312 ppc_elf_unhandled_reloc),
252b5132
RH
313
314 /* Marks a procedure linkage table entry for a symbol. */
46807bf4
AM
315 HOW (R_PPC_JMP_SLOT, 2, 32, 0, 0, FALSE, dont,
316 ppc_elf_unhandled_reloc),
252b5132
RH
317
318 /* Used only by the dynamic linker. When the object is run, this
319 longword is set to the load address of the object, plus the
320 addend. */
46807bf4
AM
321 HOW (R_PPC_RELATIVE, 2, 32, 0xffffffff, 0, FALSE, dont,
322 bfd_elf_generic_reloc),
252b5132
RH
323
324 /* Like R_PPC_REL24, but uses the value of the symbol within the
325 object rather than the final value. Normally used for
326 _GLOBAL_OFFSET_TABLE_. */
46807bf4
AM
327 HOW (R_PPC_LOCAL24PC, 2, 26, 0x3fffffc, 0, TRUE, signed,
328 bfd_elf_generic_reloc),
252b5132
RH
329
330 /* Like R_PPC_ADDR32, but may be unaligned. */
46807bf4
AM
331 HOW (R_PPC_UADDR32, 2, 32, 0xffffffff, 0, FALSE, dont,
332 bfd_elf_generic_reloc),
252b5132
RH
333
334 /* Like R_PPC_ADDR16, but may be unaligned. */
46807bf4
AM
335 HOW (R_PPC_UADDR16, 1, 16, 0xffff, 0, FALSE, bitfield,
336 bfd_elf_generic_reloc),
252b5132
RH
337
338 /* 32-bit PC relative */
46807bf4
AM
339 HOW (R_PPC_REL32, 2, 32, 0xffffffff, 0, TRUE, dont,
340 bfd_elf_generic_reloc),
252b5132
RH
341
342 /* 32-bit relocation to the symbol's procedure linkage table.
c3668558 343 FIXME: not supported. */
46807bf4
AM
344 HOW (R_PPC_PLT32, 2, 32, 0, 0, FALSE, dont,
345 ppc_elf_unhandled_reloc),
252b5132
RH
346
347 /* 32-bit PC relative relocation to the symbol's procedure linkage table.
c3668558 348 FIXME: not supported. */
46807bf4
AM
349 HOW (R_PPC_PLTREL32, 2, 32, 0, 0, TRUE, dont,
350 ppc_elf_unhandled_reloc),
252b5132
RH
351
352 /* Like R_PPC_ADDR16_LO, but referring to the PLT table entry for
353 the symbol. */
46807bf4
AM
354 HOW (R_PPC_PLT16_LO, 1, 16, 0xffff, 0, FALSE, dont,
355 ppc_elf_unhandled_reloc),
252b5132
RH
356
357 /* Like R_PPC_ADDR16_HI, but referring to the PLT table entry for
358 the symbol. */
46807bf4
AM
359 HOW (R_PPC_PLT16_HI, 1, 16, 0xffff, 16, FALSE, dont,
360 ppc_elf_unhandled_reloc),
252b5132
RH
361
362 /* Like R_PPC_ADDR16_HA, but referring to the PLT table entry for
363 the symbol. */
46807bf4
AM
364 HOW (R_PPC_PLT16_HA, 1, 16, 0xffff, 16, FALSE, dont,
365 ppc_elf_unhandled_reloc),
252b5132
RH
366
367 /* A sign-extended 16 bit value relative to _SDA_BASE_, for use with
368 small data items. */
46807bf4
AM
369 HOW (R_PPC_SDAREL16, 1, 16, 0xffff, 0, FALSE, signed,
370 ppc_elf_unhandled_reloc),
252b5132 371
c061c2d8 372 /* 16-bit section relative relocation. */
46807bf4
AM
373 HOW (R_PPC_SECTOFF, 1, 16, 0xffff, 0, FALSE, signed,
374 ppc_elf_unhandled_reloc),
252b5132 375
c3668558 376 /* 16-bit lower half section relative relocation. */
46807bf4
AM
377 HOW (R_PPC_SECTOFF_LO, 1, 16, 0xffff, 0, FALSE, dont,
378 ppc_elf_unhandled_reloc),
252b5132 379
c3668558 380 /* 16-bit upper half section relative relocation. */
46807bf4
AM
381 HOW (R_PPC_SECTOFF_HI, 1, 16, 0xffff, 16, FALSE, dont,
382 ppc_elf_unhandled_reloc),
252b5132 383
c3668558 384 /* 16-bit upper half adjusted section relative relocation. */
46807bf4
AM
385 HOW (R_PPC_SECTOFF_HA, 1, 16, 0xffff, 16, FALSE, dont,
386 ppc_elf_unhandled_reloc),
252b5132 387
727fc41e 388 /* Marker relocs for TLS. */
46807bf4
AM
389 HOW (R_PPC_TLS, 2, 32, 0, 0, FALSE, dont,
390 bfd_elf_generic_reloc),
391
392 HOW (R_PPC_TLSGD, 2, 32, 0, 0, FALSE, dont,
393 bfd_elf_generic_reloc),
394
395 HOW (R_PPC_TLSLD, 2, 32, 0, 0, FALSE, dont,
396 bfd_elf_generic_reloc),
727fc41e 397
23cedd1d 398 /* Marker relocs on inline plt call instructions. */
46807bf4
AM
399 HOW (R_PPC_PLTSEQ, 2, 32, 0, 0, FALSE, dont,
400 bfd_elf_generic_reloc),
401
402 HOW (R_PPC_PLTCALL, 2, 32, 0, 0, FALSE, dont,
403 bfd_elf_generic_reloc),
23cedd1d 404
7619e7c7
AM
405 /* Computes the load module index of the load module that contains the
406 definition of its TLS sym. */
46807bf4
AM
407 HOW (R_PPC_DTPMOD32, 2, 32, 0xffffffff, 0, FALSE, dont,
408 ppc_elf_unhandled_reloc),
252b5132 409
7619e7c7
AM
410 /* Computes a dtv-relative displacement, the difference between the value
411 of sym+add and the base address of the thread-local storage block that
412 contains the definition of sym, minus 0x8000. */
46807bf4
AM
413 HOW (R_PPC_DTPREL32, 2, 32, 0xffffffff, 0, FALSE, dont,
414 ppc_elf_unhandled_reloc),
7619e7c7
AM
415
416 /* A 16 bit dtprel reloc. */
46807bf4
AM
417 HOW (R_PPC_DTPREL16, 1, 16, 0xffff, 0, FALSE, signed,
418 ppc_elf_unhandled_reloc),
252b5132 419
7619e7c7 420 /* Like DTPREL16, but no overflow. */
46807bf4
AM
421 HOW (R_PPC_DTPREL16_LO, 1, 16, 0xffff, 0, FALSE, dont,
422 ppc_elf_unhandled_reloc),
252b5132 423
7619e7c7 424 /* Like DTPREL16_LO, but next higher group of 16 bits. */
46807bf4
AM
425 HOW (R_PPC_DTPREL16_HI, 1, 16, 0xffff, 16, FALSE, dont,
426 ppc_elf_unhandled_reloc),
252b5132 427
7619e7c7 428 /* Like DTPREL16_HI, but adjust for low 16 bits. */
46807bf4
AM
429 HOW (R_PPC_DTPREL16_HA, 1, 16, 0xffff, 16, FALSE, dont,
430 ppc_elf_unhandled_reloc),
252b5132 431
7619e7c7
AM
432 /* Computes a tp-relative displacement, the difference between the value of
433 sym+add and the value of the thread pointer (r13). */
46807bf4
AM
434 HOW (R_PPC_TPREL32, 2, 32, 0xffffffff, 0, FALSE, dont,
435 ppc_elf_unhandled_reloc),
7619e7c7
AM
436
437 /* A 16 bit tprel reloc. */
46807bf4
AM
438 HOW (R_PPC_TPREL16, 1, 16, 0xffff, 0, FALSE, signed,
439 ppc_elf_unhandled_reloc),
252b5132 440
7619e7c7 441 /* Like TPREL16, but no overflow. */
46807bf4
AM
442 HOW (R_PPC_TPREL16_LO, 1, 16, 0xffff, 0, FALSE, dont,
443 ppc_elf_unhandled_reloc),
252b5132 444
7619e7c7 445 /* Like TPREL16_LO, but next higher group of 16 bits. */
46807bf4
AM
446 HOW (R_PPC_TPREL16_HI, 1, 16, 0xffff, 16, FALSE, dont,
447 ppc_elf_unhandled_reloc),
7619e7c7
AM
448
449 /* Like TPREL16_HI, but adjust for low 16 bits. */
46807bf4
AM
450 HOW (R_PPC_TPREL16_HA, 1, 16, 0xffff, 16, FALSE, dont,
451 ppc_elf_unhandled_reloc),
7619e7c7
AM
452
453 /* Allocates two contiguous entries in the GOT to hold a tls_index structure,
454 with values (sym+add)@dtpmod and (sym+add)@dtprel, and computes the offset
455 to the first entry. */
46807bf4
AM
456 HOW (R_PPC_GOT_TLSGD16, 1, 16, 0xffff, 0, FALSE, signed,
457 ppc_elf_unhandled_reloc),
252b5132 458
7619e7c7 459 /* Like GOT_TLSGD16, but no overflow. */
46807bf4
AM
460 HOW (R_PPC_GOT_TLSGD16_LO, 1, 16, 0xffff, 0, FALSE, dont,
461 ppc_elf_unhandled_reloc),
252b5132 462
7619e7c7 463 /* Like GOT_TLSGD16_LO, but next higher group of 16 bits. */
46807bf4
AM
464 HOW (R_PPC_GOT_TLSGD16_HI, 1, 16, 0xffff, 16, FALSE, dont,
465 ppc_elf_unhandled_reloc),
252b5132 466
7619e7c7 467 /* Like GOT_TLSGD16_HI, but adjust for low 16 bits. */
46807bf4
AM
468 HOW (R_PPC_GOT_TLSGD16_HA, 1, 16, 0xffff, 16, FALSE, dont,
469 ppc_elf_unhandled_reloc),
7619e7c7
AM
470
471 /* Allocates two contiguous entries in the GOT to hold a tls_index structure,
472 with values (sym+add)@dtpmod and zero, and computes the offset to the
473 first entry. */
46807bf4
AM
474 HOW (R_PPC_GOT_TLSLD16, 1, 16, 0xffff, 0, FALSE, signed,
475 ppc_elf_unhandled_reloc),
252b5132 476
7619e7c7 477 /* Like GOT_TLSLD16, but no overflow. */
46807bf4
AM
478 HOW (R_PPC_GOT_TLSLD16_LO, 1, 16, 0xffff, 0, FALSE, dont,
479 ppc_elf_unhandled_reloc),
252b5132 480
7619e7c7 481 /* Like GOT_TLSLD16_LO, but next higher group of 16 bits. */
46807bf4
AM
482 HOW (R_PPC_GOT_TLSLD16_HI, 1, 16, 0xffff, 16, FALSE, dont,
483 ppc_elf_unhandled_reloc),
252b5132 484
7619e7c7 485 /* Like GOT_TLSLD16_HI, but adjust for low 16 bits. */
46807bf4
AM
486 HOW (R_PPC_GOT_TLSLD16_HA, 1, 16, 0xffff, 16, FALSE, dont,
487 ppc_elf_unhandled_reloc),
7619e7c7
AM
488
489 /* Allocates an entry in the GOT with value (sym+add)@dtprel, and computes
490 the offset to the entry. */
46807bf4
AM
491 HOW (R_PPC_GOT_DTPREL16, 1, 16, 0xffff, 0, FALSE, signed,
492 ppc_elf_unhandled_reloc),
252b5132 493
7619e7c7 494 /* Like GOT_DTPREL16, but no overflow. */
46807bf4
AM
495 HOW (R_PPC_GOT_DTPREL16_LO, 1, 16, 0xffff, 0, FALSE, dont,
496 ppc_elf_unhandled_reloc),
252b5132 497
7619e7c7 498 /* Like GOT_DTPREL16_LO, but next higher group of 16 bits. */
46807bf4
AM
499 HOW (R_PPC_GOT_DTPREL16_HI, 1, 16, 0xffff, 16, FALSE, dont,
500 ppc_elf_unhandled_reloc),
252b5132 501
7619e7c7 502 /* Like GOT_DTPREL16_HI, but adjust for low 16 bits. */
46807bf4
AM
503 HOW (R_PPC_GOT_DTPREL16_HA, 1, 16, 0xffff, 16, FALSE, dont,
504 ppc_elf_unhandled_reloc),
c3668558 505
7619e7c7
AM
506 /* Allocates an entry in the GOT with value (sym+add)@tprel, and computes the
507 offset to the entry. */
46807bf4
AM
508 HOW (R_PPC_GOT_TPREL16, 1, 16, 0xffff, 0, FALSE, signed,
509 ppc_elf_unhandled_reloc),
7619e7c7
AM
510
511 /* Like GOT_TPREL16, but no overflow. */
46807bf4
AM
512 HOW (R_PPC_GOT_TPREL16_LO, 1, 16, 0xffff, 0, FALSE, dont,
513 ppc_elf_unhandled_reloc),
7619e7c7
AM
514
515 /* Like GOT_TPREL16_LO, but next higher group of 16 bits. */
46807bf4
AM
516 HOW (R_PPC_GOT_TPREL16_HI, 1, 16, 0xffff, 16, FALSE, dont,
517 ppc_elf_unhandled_reloc),
7619e7c7
AM
518
519 /* Like GOT_TPREL16_HI, but adjust for low 16 bits. */
46807bf4
AM
520 HOW (R_PPC_GOT_TPREL16_HA, 1, 16, 0xffff, 16, FALSE, dont,
521 ppc_elf_unhandled_reloc),
7619e7c7
AM
522
523 /* The remaining relocs are from the Embedded ELF ABI, and are not
524 in the SVR4 ELF ABI. */
525
526 /* 32 bit value resulting from the addend minus the symbol. */
46807bf4
AM
527 HOW (R_PPC_EMB_NADDR32, 2, 32, 0xffffffff, 0, FALSE, dont,
528 ppc_elf_unhandled_reloc),
7619e7c7
AM
529
530 /* 16 bit value resulting from the addend minus the symbol. */
46807bf4
AM
531 HOW (R_PPC_EMB_NADDR16, 1, 16, 0xffff, 0, FALSE, signed,
532 ppc_elf_unhandled_reloc),
7619e7c7
AM
533
534 /* 16 bit value resulting from the addend minus the symbol. */
46807bf4
AM
535 HOW (R_PPC_EMB_NADDR16_LO, 1, 16, 0xffff, 0, FALSE, dont,
536 ppc_elf_unhandled_reloc),
7619e7c7
AM
537
538 /* The high order 16 bits of the addend minus the symbol. */
46807bf4
AM
539 HOW (R_PPC_EMB_NADDR16_HI, 1, 16, 0xffff, 16, FALSE, dont,
540 ppc_elf_unhandled_reloc),
7619e7c7
AM
541
542 /* The high order 16 bits of the result of the addend minus the address,
543 plus 1 if the contents of the low 16 bits, treated as a signed number,
544 is negative. */
46807bf4
AM
545 HOW (R_PPC_EMB_NADDR16_HA, 1, 16, 0xffff, 16, FALSE, dont,
546 ppc_elf_unhandled_reloc),
25dbc73a
AM
547
548 /* 16 bit value resulting from allocating a 4 byte word to hold an
549 address in the .sdata section, and returning the offset from
550 _SDA_BASE_ for that relocation. */
46807bf4
AM
551 HOW (R_PPC_EMB_SDAI16, 1, 16, 0xffff, 0, FALSE, signed,
552 ppc_elf_unhandled_reloc),
25dbc73a
AM
553
554 /* 16 bit value resulting from allocating a 4 byte word to hold an
555 address in the .sdata2 section, and returning the offset from
556 _SDA2_BASE_ for that relocation. */
46807bf4
AM
557 HOW (R_PPC_EMB_SDA2I16, 1, 16, 0xffff, 0, FALSE, signed,
558 ppc_elf_unhandled_reloc),
25dbc73a
AM
559
560 /* A sign-extended 16 bit value relative to _SDA2_BASE_, for use with
561 small data items. */
46807bf4
AM
562 HOW (R_PPC_EMB_SDA2REL, 1, 16, 0xffff, 0, FALSE, signed,
563 ppc_elf_unhandled_reloc),
25dbc73a
AM
564
565 /* Relocate against either _SDA_BASE_ or _SDA2_BASE_, filling in the 16 bit
566 signed offset from the appropriate base, and filling in the register
567 field with the appropriate register (0, 2, or 13). */
46807bf4
AM
568 HOW (R_PPC_EMB_SDA21, 2, 16, 0xffff, 0, FALSE, signed,
569 ppc_elf_unhandled_reloc),
25dbc73a
AM
570
571 /* Relocation not handled: R_PPC_EMB_MRKREF */
572 /* Relocation not handled: R_PPC_EMB_RELSEC16 */
573 /* Relocation not handled: R_PPC_EMB_RELST_LO */
574 /* Relocation not handled: R_PPC_EMB_RELST_HI */
575 /* Relocation not handled: R_PPC_EMB_RELST_HA */
576 /* Relocation not handled: R_PPC_EMB_BIT_FLD */
577
578 /* PC relative relocation against either _SDA_BASE_ or _SDA2_BASE_, filling
579 in the 16 bit signed offset from the appropriate base, and filling in the
580 register field with the appropriate register (0, 2, or 13). */
46807bf4
AM
581 HOW (R_PPC_EMB_RELSDA, 1, 16, 0xffff, 0, FALSE, signed,
582 ppc_elf_unhandled_reloc),
25dbc73a 583
b9c361e0 584 /* A relative 8 bit branch. */
46807bf4
AM
585 HOW (R_PPC_VLE_REL8, 1, 8, 0xff, 1, TRUE, signed,
586 bfd_elf_generic_reloc),
68ffbac6 587
b9c361e0 588 /* A relative 15 bit branch. */
46807bf4
AM
589 HOW (R_PPC_VLE_REL15, 2, 16, 0xfffe, 0, TRUE, signed,
590 bfd_elf_generic_reloc),
b9c361e0 591
68ffbac6 592 /* A relative 24 bit branch. */
46807bf4
AM
593 HOW (R_PPC_VLE_REL24, 2, 25, 0x1fffffe, 0, TRUE, signed,
594 bfd_elf_generic_reloc),
b9c361e0
JL
595
596 /* The 16 LSBS in split16a format. */
46807bf4
AM
597 HOW (R_PPC_VLE_LO16A, 2, 16, 0x1f07ff, 0, FALSE, dont,
598 ppc_elf_unhandled_reloc),
b9c361e0
JL
599
600 /* The 16 LSBS in split16d format. */
46807bf4
AM
601 HOW (R_PPC_VLE_LO16D, 2, 16, 0x3e007ff, 0, FALSE, dont,
602 ppc_elf_unhandled_reloc),
b9c361e0
JL
603
604 /* Bits 16-31 split16a format. */
46807bf4
AM
605 HOW (R_PPC_VLE_HI16A, 2, 16, 0x1f07ff, 16, FALSE, dont,
606 ppc_elf_unhandled_reloc),
b9c361e0
JL
607
608 /* Bits 16-31 split16d format. */
46807bf4
AM
609 HOW (R_PPC_VLE_HI16D, 2, 16, 0x3e007ff, 16, FALSE, dont,
610 ppc_elf_unhandled_reloc),
b9c361e0
JL
611
612 /* Bits 16-31 (High Adjusted) in split16a format. */
46807bf4
AM
613 HOW (R_PPC_VLE_HA16A, 2, 16, 0x1f07ff, 16, FALSE, dont,
614 ppc_elf_unhandled_reloc),
b9c361e0
JL
615
616 /* Bits 16-31 (High Adjusted) in split16d format. */
46807bf4
AM
617 HOW (R_PPC_VLE_HA16D, 2, 16, 0x3e007ff, 16, FALSE, dont,
618 ppc_elf_unhandled_reloc),
b9c361e0 619
86c95733
AM
620 /* This reloc is like R_PPC_EMB_SDA21 but only applies to e_add16i
621 instructions. If the register base is 0 then the linker changes
622 the e_add16i to an e_li instruction. */
46807bf4
AM
623 HOW (R_PPC_VLE_SDA21, 2, 16, 0xffff, 0, FALSE, signed,
624 ppc_elf_unhandled_reloc),
b9c361e0 625
86c95733 626 /* Like R_PPC_VLE_SDA21 but ignore overflow. */
46807bf4
AM
627 HOW (R_PPC_VLE_SDA21_LO, 2, 16, 0xffff, 0, FALSE, dont,
628 ppc_elf_unhandled_reloc),
b9c361e0
JL
629
630 /* The 16 LSBS relative to _SDA_BASE_ in split16a format. */
46807bf4
AM
631 HOW (R_PPC_VLE_SDAREL_LO16A, 2, 16, 0x1f07ff, 0, FALSE, dont,
632 ppc_elf_unhandled_reloc),
b9c361e0
JL
633
634 /* The 16 LSBS relative to _SDA_BASE_ in split16d format. */
46807bf4
AM
635 HOW (R_PPC_VLE_SDAREL_LO16D, 2, 16, 0x3e007ff, 0, FALSE, dont,
636 ppc_elf_unhandled_reloc),
b9c361e0
JL
637
638 /* Bits 16-31 relative to _SDA_BASE_ in split16a format. */
46807bf4
AM
639 HOW (R_PPC_VLE_SDAREL_HI16A, 2, 16, 0x1f07ff, 16, FALSE, dont,
640 ppc_elf_unhandled_reloc),
b9c361e0
JL
641
642 /* Bits 16-31 relative to _SDA_BASE_ in split16d format. */
46807bf4
AM
643 HOW (R_PPC_VLE_SDAREL_HI16D, 2, 16, 0x3e007ff, 16, FALSE, dont,
644 ppc_elf_unhandled_reloc),
b9c361e0
JL
645
646 /* Bits 16-31 (HA) relative to _SDA_BASE split16a format. */
46807bf4
AM
647 HOW (R_PPC_VLE_SDAREL_HA16A, 2, 16, 0x1f07ff, 16, FALSE, dont,
648 ppc_elf_unhandled_reloc),
b9c361e0
JL
649
650 /* Bits 16-31 (HA) relative to _SDA_BASE split16d format. */
46807bf4
AM
651 HOW (R_PPC_VLE_SDAREL_HA16D, 2, 16, 0x3e007ff, 16, FALSE, dont,
652 ppc_elf_unhandled_reloc),
b9c361e0 653
83eef883 654 /* e_li split20 format. */
bb6bf75e
AM
655 HOW (R_PPC_VLE_ADDR20, 2, 20, 0x1f7fff, 0, FALSE, dont,
656 ppc_elf_unhandled_reloc),
46807bf4
AM
657
658 HOW (R_PPC_IRELATIVE, 2, 32, 0xffffffff, 0, FALSE, dont,
659 ppc_elf_unhandled_reloc),
e054468f 660
d7128ce4 661 /* A 16 bit relative relocation. */
46807bf4
AM
662 HOW (R_PPC_REL16, 1, 16, 0xffff, 0, TRUE, signed,
663 bfd_elf_generic_reloc),
d7128ce4
AM
664
665 /* A 16 bit relative relocation without overflow. */
46807bf4
AM
666 HOW (R_PPC_REL16_LO, 1, 16, 0xffff, 0, TRUE, dont,
667 bfd_elf_generic_reloc),
d7128ce4
AM
668
669 /* The high order 16 bits of a relative address. */
46807bf4
AM
670 HOW (R_PPC_REL16_HI, 1, 16, 0xffff, 16, TRUE, dont,
671 bfd_elf_generic_reloc),
d7128ce4
AM
672
673 /* The high order 16 bits of a relative address, plus 1 if the contents of
674 the low 16 bits, treated as a signed number, is negative. */
46807bf4
AM
675 HOW (R_PPC_REL16_HA, 1, 16, 0xffff, 16, TRUE, dont,
676 ppc_elf_addr16_ha_reloc),
d7128ce4 677
a680de9a 678 /* Like R_PPC_REL16_HA but for split field in addpcis. */
46807bf4
AM
679 HOW (R_PPC_REL16DX_HA, 2, 16, 0x1fffc1, 16, TRUE, signed,
680 ppc_elf_addr16_ha_reloc),
a680de9a 681
7ba71655 682 /* A split-field reloc for addpcis, non-relative (gas internal use only). */
46807bf4
AM
683 HOW (R_PPC_16DX_HA, 2, 16, 0x1fffc1, 16, FALSE, signed,
684 ppc_elf_addr16_ha_reloc),
7ba71655 685
25dbc73a 686 /* GNU extension to record C++ vtable hierarchy. */
46807bf4
AM
687 HOW (R_PPC_GNU_VTINHERIT, 0, 0, 0, 0, FALSE, dont,
688 NULL),
25dbc73a
AM
689
690 /* GNU extension to record C++ vtable member usage. */
46807bf4
AM
691 HOW (R_PPC_GNU_VTENTRY, 0, 0, 0, 0, FALSE, dont,
692 NULL),
7619e7c7 693
25dbc73a 694 /* Phony reloc to handle AIX style TOC entries. */
46807bf4
AM
695 HOW (R_PPC_TOC16, 1, 16, 0xffff, 0, FALSE, signed,
696 ppc_elf_unhandled_reloc),
25dbc73a
AM
697};
698\f
699/* Initialize the ppc_elf_howto_table, so that linear accesses can be done. */
700
701static void
702ppc_elf_howto_init (void)
703{
704 unsigned int i, type;
705
706 for (i = 0;
707 i < sizeof (ppc_elf_howto_raw) / sizeof (ppc_elf_howto_raw[0]);
708 i++)
709 {
710 type = ppc_elf_howto_raw[i].type;
711 if (type >= (sizeof (ppc_elf_howto_table)
712 / sizeof (ppc_elf_howto_table[0])))
713 abort ();
714 ppc_elf_howto_table[type] = &ppc_elf_howto_raw[i];
715 }
716}
717
718static reloc_howto_type *
719ppc_elf_reloc_type_lookup (bfd *abfd ATTRIBUTE_UNUSED,
720 bfd_reloc_code_real_type code)
721{
722 enum elf_ppc_reloc_type r;
723
724 /* Initialize howto table if not already done. */
725 if (!ppc_elf_howto_table[R_PPC_ADDR32])
726 ppc_elf_howto_init ();
727
728 switch (code)
729 {
730 default:
731 return NULL;
732
733 case BFD_RELOC_NONE: r = R_PPC_NONE; break;
734 case BFD_RELOC_32: r = R_PPC_ADDR32; break;
735 case BFD_RELOC_PPC_BA26: r = R_PPC_ADDR24; break;
1fe532cf 736 case BFD_RELOC_PPC64_ADDR16_DS:
25dbc73a 737 case BFD_RELOC_16: r = R_PPC_ADDR16; break;
1fe532cf 738 case BFD_RELOC_PPC64_ADDR16_LO_DS:
25dbc73a
AM
739 case BFD_RELOC_LO16: r = R_PPC_ADDR16_LO; break;
740 case BFD_RELOC_HI16: r = R_PPC_ADDR16_HI; break;
741 case BFD_RELOC_HI16_S: r = R_PPC_ADDR16_HA; break;
742 case BFD_RELOC_PPC_BA16: r = R_PPC_ADDR14; break;
743 case BFD_RELOC_PPC_BA16_BRTAKEN: r = R_PPC_ADDR14_BRTAKEN; break;
744 case BFD_RELOC_PPC_BA16_BRNTAKEN: r = R_PPC_ADDR14_BRNTAKEN; break;
745 case BFD_RELOC_PPC_B26: r = R_PPC_REL24; break;
746 case BFD_RELOC_PPC_B16: r = R_PPC_REL14; break;
747 case BFD_RELOC_PPC_B16_BRTAKEN: r = R_PPC_REL14_BRTAKEN; break;
748 case BFD_RELOC_PPC_B16_BRNTAKEN: r = R_PPC_REL14_BRNTAKEN; break;
1fe532cf 749 case BFD_RELOC_PPC64_GOT16_DS:
25dbc73a 750 case BFD_RELOC_16_GOTOFF: r = R_PPC_GOT16; break;
1fe532cf 751 case BFD_RELOC_PPC64_GOT16_LO_DS:
25dbc73a
AM
752 case BFD_RELOC_LO16_GOTOFF: r = R_PPC_GOT16_LO; break;
753 case BFD_RELOC_HI16_GOTOFF: r = R_PPC_GOT16_HI; break;
754 case BFD_RELOC_HI16_S_GOTOFF: r = R_PPC_GOT16_HA; break;
755 case BFD_RELOC_24_PLT_PCREL: r = R_PPC_PLTREL24; break;
756 case BFD_RELOC_PPC_COPY: r = R_PPC_COPY; break;
757 case BFD_RELOC_PPC_GLOB_DAT: r = R_PPC_GLOB_DAT; break;
758 case BFD_RELOC_PPC_LOCAL24PC: r = R_PPC_LOCAL24PC; break;
759 case BFD_RELOC_32_PCREL: r = R_PPC_REL32; break;
760 case BFD_RELOC_32_PLTOFF: r = R_PPC_PLT32; break;
761 case BFD_RELOC_32_PLT_PCREL: r = R_PPC_PLTREL32; break;
1fe532cf 762 case BFD_RELOC_PPC64_PLT16_LO_DS:
25dbc73a
AM
763 case BFD_RELOC_LO16_PLTOFF: r = R_PPC_PLT16_LO; break;
764 case BFD_RELOC_HI16_PLTOFF: r = R_PPC_PLT16_HI; break;
765 case BFD_RELOC_HI16_S_PLTOFF: r = R_PPC_PLT16_HA; break;
766 case BFD_RELOC_GPREL16: r = R_PPC_SDAREL16; break;
1fe532cf 767 case BFD_RELOC_PPC64_SECTOFF_DS:
25dbc73a 768 case BFD_RELOC_16_BASEREL: r = R_PPC_SECTOFF; break;
1fe532cf 769 case BFD_RELOC_PPC64_SECTOFF_LO_DS:
25dbc73a
AM
770 case BFD_RELOC_LO16_BASEREL: r = R_PPC_SECTOFF_LO; break;
771 case BFD_RELOC_HI16_BASEREL: r = R_PPC_SECTOFF_HI; break;
772 case BFD_RELOC_HI16_S_BASEREL: r = R_PPC_SECTOFF_HA; break;
773 case BFD_RELOC_CTOR: r = R_PPC_ADDR32; break;
1fe532cf 774 case BFD_RELOC_PPC64_TOC16_DS:
25dbc73a
AM
775 case BFD_RELOC_PPC_TOC16: r = R_PPC_TOC16; break;
776 case BFD_RELOC_PPC_TLS: r = R_PPC_TLS; break;
727fc41e
AM
777 case BFD_RELOC_PPC_TLSGD: r = R_PPC_TLSGD; break;
778 case BFD_RELOC_PPC_TLSLD: r = R_PPC_TLSLD; break;
25dbc73a 779 case BFD_RELOC_PPC_DTPMOD: r = R_PPC_DTPMOD32; break;
1fe532cf 780 case BFD_RELOC_PPC64_TPREL16_DS:
25dbc73a 781 case BFD_RELOC_PPC_TPREL16: r = R_PPC_TPREL16; break;
1fe532cf 782 case BFD_RELOC_PPC64_TPREL16_LO_DS:
25dbc73a
AM
783 case BFD_RELOC_PPC_TPREL16_LO: r = R_PPC_TPREL16_LO; break;
784 case BFD_RELOC_PPC_TPREL16_HI: r = R_PPC_TPREL16_HI; break;
785 case BFD_RELOC_PPC_TPREL16_HA: r = R_PPC_TPREL16_HA; break;
786 case BFD_RELOC_PPC_TPREL: r = R_PPC_TPREL32; break;
1fe532cf 787 case BFD_RELOC_PPC64_DTPREL16_DS:
25dbc73a 788 case BFD_RELOC_PPC_DTPREL16: r = R_PPC_DTPREL16; break;
1fe532cf 789 case BFD_RELOC_PPC64_DTPREL16_LO_DS:
25dbc73a
AM
790 case BFD_RELOC_PPC_DTPREL16_LO: r = R_PPC_DTPREL16_LO; break;
791 case BFD_RELOC_PPC_DTPREL16_HI: r = R_PPC_DTPREL16_HI; break;
792 case BFD_RELOC_PPC_DTPREL16_HA: r = R_PPC_DTPREL16_HA; break;
793 case BFD_RELOC_PPC_DTPREL: r = R_PPC_DTPREL32; break;
794 case BFD_RELOC_PPC_GOT_TLSGD16: r = R_PPC_GOT_TLSGD16; break;
795 case BFD_RELOC_PPC_GOT_TLSGD16_LO: r = R_PPC_GOT_TLSGD16_LO; break;
796 case BFD_RELOC_PPC_GOT_TLSGD16_HI: r = R_PPC_GOT_TLSGD16_HI; break;
797 case BFD_RELOC_PPC_GOT_TLSGD16_HA: r = R_PPC_GOT_TLSGD16_HA; break;
798 case BFD_RELOC_PPC_GOT_TLSLD16: r = R_PPC_GOT_TLSLD16; break;
799 case BFD_RELOC_PPC_GOT_TLSLD16_LO: r = R_PPC_GOT_TLSLD16_LO; break;
800 case BFD_RELOC_PPC_GOT_TLSLD16_HI: r = R_PPC_GOT_TLSLD16_HI; break;
801 case BFD_RELOC_PPC_GOT_TLSLD16_HA: r = R_PPC_GOT_TLSLD16_HA; break;
802 case BFD_RELOC_PPC_GOT_TPREL16: r = R_PPC_GOT_TPREL16; break;
803 case BFD_RELOC_PPC_GOT_TPREL16_LO: r = R_PPC_GOT_TPREL16_LO; break;
804 case BFD_RELOC_PPC_GOT_TPREL16_HI: r = R_PPC_GOT_TPREL16_HI; break;
805 case BFD_RELOC_PPC_GOT_TPREL16_HA: r = R_PPC_GOT_TPREL16_HA; break;
806 case BFD_RELOC_PPC_GOT_DTPREL16: r = R_PPC_GOT_DTPREL16; break;
807 case BFD_RELOC_PPC_GOT_DTPREL16_LO: r = R_PPC_GOT_DTPREL16_LO; break;
808 case BFD_RELOC_PPC_GOT_DTPREL16_HI: r = R_PPC_GOT_DTPREL16_HI; break;
809 case BFD_RELOC_PPC_GOT_DTPREL16_HA: r = R_PPC_GOT_DTPREL16_HA; break;
810 case BFD_RELOC_PPC_EMB_NADDR32: r = R_PPC_EMB_NADDR32; break;
811 case BFD_RELOC_PPC_EMB_NADDR16: r = R_PPC_EMB_NADDR16; break;
812 case BFD_RELOC_PPC_EMB_NADDR16_LO: r = R_PPC_EMB_NADDR16_LO; break;
813 case BFD_RELOC_PPC_EMB_NADDR16_HI: r = R_PPC_EMB_NADDR16_HI; break;
814 case BFD_RELOC_PPC_EMB_NADDR16_HA: r = R_PPC_EMB_NADDR16_HA; break;
815 case BFD_RELOC_PPC_EMB_SDAI16: r = R_PPC_EMB_SDAI16; break;
816 case BFD_RELOC_PPC_EMB_SDA2I16: r = R_PPC_EMB_SDA2I16; break;
817 case BFD_RELOC_PPC_EMB_SDA2REL: r = R_PPC_EMB_SDA2REL; break;
818 case BFD_RELOC_PPC_EMB_SDA21: r = R_PPC_EMB_SDA21; break;
819 case BFD_RELOC_PPC_EMB_MRKREF: r = R_PPC_EMB_MRKREF; break;
820 case BFD_RELOC_PPC_EMB_RELSEC16: r = R_PPC_EMB_RELSEC16; break;
821 case BFD_RELOC_PPC_EMB_RELST_LO: r = R_PPC_EMB_RELST_LO; break;
822 case BFD_RELOC_PPC_EMB_RELST_HI: r = R_PPC_EMB_RELST_HI; break;
823 case BFD_RELOC_PPC_EMB_RELST_HA: r = R_PPC_EMB_RELST_HA; break;
824 case BFD_RELOC_PPC_EMB_BIT_FLD: r = R_PPC_EMB_BIT_FLD; break;
825 case BFD_RELOC_PPC_EMB_RELSDA: r = R_PPC_EMB_RELSDA; break;
b9c361e0
JL
826 case BFD_RELOC_PPC_VLE_REL8: r = R_PPC_VLE_REL8; break;
827 case BFD_RELOC_PPC_VLE_REL15: r = R_PPC_VLE_REL15; break;
828 case BFD_RELOC_PPC_VLE_REL24: r = R_PPC_VLE_REL24; break;
829 case BFD_RELOC_PPC_VLE_LO16A: r = R_PPC_VLE_LO16A; break;
830 case BFD_RELOC_PPC_VLE_LO16D: r = R_PPC_VLE_LO16D; break;
831 case BFD_RELOC_PPC_VLE_HI16A: r = R_PPC_VLE_HI16A; break;
832 case BFD_RELOC_PPC_VLE_HI16D: r = R_PPC_VLE_HI16D; break;
833 case BFD_RELOC_PPC_VLE_HA16A: r = R_PPC_VLE_HA16A; break;
834 case BFD_RELOC_PPC_VLE_HA16D: r = R_PPC_VLE_HA16D; break;
835 case BFD_RELOC_PPC_VLE_SDA21: r = R_PPC_VLE_SDA21; break;
836 case BFD_RELOC_PPC_VLE_SDA21_LO: r = R_PPC_VLE_SDA21_LO; break;
837 case BFD_RELOC_PPC_VLE_SDAREL_LO16A:
838 r = R_PPC_VLE_SDAREL_LO16A;
839 break;
840 case BFD_RELOC_PPC_VLE_SDAREL_LO16D:
841 r = R_PPC_VLE_SDAREL_LO16D;
842 break;
843 case BFD_RELOC_PPC_VLE_SDAREL_HI16A:
844 r = R_PPC_VLE_SDAREL_HI16A;
845 break;
846 case BFD_RELOC_PPC_VLE_SDAREL_HI16D:
847 r = R_PPC_VLE_SDAREL_HI16D;
848 break;
849 case BFD_RELOC_PPC_VLE_SDAREL_HA16A:
850 r = R_PPC_VLE_SDAREL_HA16A;
851 break;
852 case BFD_RELOC_PPC_VLE_SDAREL_HA16D:
853 r = R_PPC_VLE_SDAREL_HA16D;
854 break;
d7128ce4
AM
855 case BFD_RELOC_16_PCREL: r = R_PPC_REL16; break;
856 case BFD_RELOC_LO16_PCREL: r = R_PPC_REL16_LO; break;
857 case BFD_RELOC_HI16_PCREL: r = R_PPC_REL16_HI; break;
858 case BFD_RELOC_HI16_S_PCREL: r = R_PPC_REL16_HA; break;
7ba71655 859 case BFD_RELOC_PPC_16DX_HA: r = R_PPC_16DX_HA; break;
a680de9a 860 case BFD_RELOC_PPC_REL16DX_HA: r = R_PPC_REL16DX_HA; break;
25dbc73a
AM
861 case BFD_RELOC_VTABLE_INHERIT: r = R_PPC_GNU_VTINHERIT; break;
862 case BFD_RELOC_VTABLE_ENTRY: r = R_PPC_GNU_VTENTRY; break;
863 }
864
865 return ppc_elf_howto_table[r];
866};
867
157090f7
AM
868static reloc_howto_type *
869ppc_elf_reloc_name_lookup (bfd *abfd ATTRIBUTE_UNUSED,
870 const char *r_name)
871{
872 unsigned int i;
873
874 for (i = 0;
875 i < sizeof (ppc_elf_howto_raw) / sizeof (ppc_elf_howto_raw[0]);
876 i++)
877 if (ppc_elf_howto_raw[i].name != NULL
878 && strcasecmp (ppc_elf_howto_raw[i].name, r_name) == 0)
879 return &ppc_elf_howto_raw[i];
880
881 return NULL;
882}
883
25dbc73a
AM
884/* Set the howto pointer for a PowerPC ELF reloc. */
885
f3185997 886static bfd_boolean
4aef7643 887ppc_elf_info_to_howto (bfd *abfd,
25dbc73a
AM
888 arelent *cache_ptr,
889 Elf_Internal_Rela *dst)
890{
cd21f5da
NC
891 unsigned int r_type;
892
25dbc73a
AM
893 /* Initialize howto table if not already done. */
894 if (!ppc_elf_howto_table[R_PPC_ADDR32])
895 ppc_elf_howto_init ();
896
cd21f5da
NC
897 r_type = ELF32_R_TYPE (dst->r_info);
898 if (r_type >= R_PPC_max)
899 {
695344c0 900 /* xgettext:c-format */
0aa13fee 901 _bfd_error_handler (_("%pB: unsupported relocation type %#x"),
4eca0228 902 abfd, r_type);
cd21f5da 903 bfd_set_error (bfd_error_bad_value);
f3185997 904 return FALSE;
cd21f5da 905 }
f3185997 906
cd21f5da 907 cache_ptr->howto = ppc_elf_howto_table[r_type];
375de94a
AM
908
909 /* Just because the above assert didn't trigger doesn't mean that
910 ELF32_R_TYPE (dst->r_info) is necessarily a valid relocation. */
f3185997 911 if (cache_ptr->howto == NULL)
375de94a 912 {
695344c0 913 /* xgettext:c-format */
0aa13fee 914 _bfd_error_handler (_("%pB: unsupported relocation type %#x"),
4eca0228 915 abfd, r_type);
375de94a
AM
916 bfd_set_error (bfd_error_bad_value);
917
f3185997 918 return FALSE;
375de94a 919 }
f3185997
NC
920
921 return TRUE;
25dbc73a
AM
922}
923
d7128ce4 924/* Handle the R_PPC_ADDR16_HA and R_PPC_REL16_HA relocs. */
25dbc73a
AM
925
926static bfd_reloc_status_type
4aef7643 927ppc_elf_addr16_ha_reloc (bfd *abfd,
25dbc73a
AM
928 arelent *reloc_entry,
929 asymbol *symbol,
4aef7643 930 void *data,
25dbc73a
AM
931 asection *input_section,
932 bfd *output_bfd,
933 char **error_message ATTRIBUTE_UNUSED)
934{
a680de9a
PB
935 enum elf_ppc_reloc_type r_type;
936 long insn;
937 bfd_size_type octets;
938 bfd_vma value;
25dbc73a
AM
939
940 if (output_bfd != NULL)
941 {
942 reloc_entry->address += input_section->output_offset;
943 return bfd_reloc_ok;
944 }
945
a680de9a
PB
946 reloc_entry->addend += 0x8000;
947 r_type = reloc_entry->howto->type;
948 if (r_type != R_PPC_REL16DX_HA)
949 return bfd_reloc_continue;
950
951 value = 0;
952 if (!bfd_is_com_section (symbol->section))
953 value = symbol->value;
954 value += (reloc_entry->addend
955 + symbol->section->output_offset
956 + symbol->section->output_section->vma);
957 value -= (reloc_entry->address
958 + input_section->output_offset
959 + input_section->output_section->vma);
960 value >>= 16;
961
bb294208 962 octets = reloc_entry->address * OCTETS_PER_BYTE (abfd, input_section);
a680de9a
PB
963 insn = bfd_get_32 (abfd, (bfd_byte *) data + octets);
964 insn &= ~0x1fffc1;
965 insn |= (value & 0xffc1) | ((value & 0x3e) << 15);
966 bfd_put_32 (abfd, insn, (bfd_byte *) data + octets);
967 return bfd_reloc_ok;
25dbc73a
AM
968}
969
970static bfd_reloc_status_type
971ppc_elf_unhandled_reloc (bfd *abfd,
972 arelent *reloc_entry,
973 asymbol *symbol,
974 void *data,
975 asection *input_section,
976 bfd *output_bfd,
977 char **error_message)
978{
979 /* If this is a relocatable link (output_bfd test tells us), just
980 call the generic function. Any adjustment will be done at final
981 link time. */
982 if (output_bfd != NULL)
983 return bfd_elf_generic_reloc (abfd, reloc_entry, symbol, data,
984 input_section, output_bfd, error_message);
985
986 if (error_message != NULL)
987 {
988 static char buf[60];
989 sprintf (buf, _("generic linker can't handle %s"),
990 reloc_entry->howto->name);
991 *error_message = buf;
992 }
993 return bfd_reloc_dangerous;
994}
995\f
996/* Sections created by the linker. */
997
998typedef struct elf_linker_section
999{
c9a2f333 1000 /* Pointer to the bfd section. */
25dbc73a 1001 asection *section;
c9a2f333
AM
1002 /* Section name. */
1003 const char *name;
1004 /* Associated bss section name. */
1005 const char *bss_name;
1006 /* Associated symbol name. */
1007 const char *sym_name;
046183de
AM
1008 /* Associated symbol. */
1009 struct elf_link_hash_entry *sym;
25dbc73a
AM
1010} elf_linker_section_t;
1011
1012/* Linked list of allocated pointer entries. This hangs off of the
1013 symbol lists, and provides allows us to return different pointers,
1014 based on different addend's. */
1015
1016typedef struct elf_linker_section_pointers
1017{
1018 /* next allocated pointer for this symbol */
1019 struct elf_linker_section_pointers *next;
1020 /* offset of pointer from beginning of section */
1021 bfd_vma offset;
1022 /* addend used */
1023 bfd_vma addend;
1024 /* which linker section this is */
1025 elf_linker_section_t *lsect;
25dbc73a
AM
1026} elf_linker_section_pointers_t;
1027
1028struct ppc_elf_obj_tdata
1029{
1030 struct elf_obj_tdata elf;
1031
1032 /* A mapping from local symbols to offsets into the various linker
1033 sections added. This is index by the symbol index. */
1034 elf_linker_section_pointers_t **linker_section_pointers;
016687f8
AM
1035
1036 /* Flags used to auto-detect plt type. */
1037 unsigned int makes_plt_call : 1;
1038 unsigned int has_rel16 : 1;
25dbc73a
AM
1039};
1040
1041#define ppc_elf_tdata(bfd) \
1042 ((struct ppc_elf_obj_tdata *) (bfd)->tdata.any)
7619e7c7 1043
25dbc73a
AM
1044#define elf_local_ptr_offsets(bfd) \
1045 (ppc_elf_tdata (bfd)->linker_section_pointers)
7619e7c7 1046
0c8d6e5c
AM
1047#define is_ppc_elf(bfd) \
1048 (bfd_get_flavour (bfd) == bfd_target_elf_flavour \
4dfe6ac6 1049 && elf_object_id (bfd) == PPC32_ELF_DATA)
0c8d6e5c 1050
25dbc73a 1051/* Override the generic function because we store some extras. */
7619e7c7 1052
25dbc73a
AM
1053static bfd_boolean
1054ppc_elf_mkobject (bfd *abfd)
1055{
0ffa91dd 1056 return bfd_elf_allocate_object (abfd, sizeof (struct ppc_elf_obj_tdata),
4dfe6ac6 1057 PPC32_ELF_DATA);
25dbc73a 1058}
7619e7c7 1059
14b57c7c
AM
1060/* When defaulting arch/mach, decode apuinfo to find a better match. */
1061
1062bfd_boolean
1063_bfd_elf_ppc_set_arch (bfd *abfd)
1064{
1065 unsigned long mach = 0;
1066 asection *s;
1067 unsigned char *contents;
1068
1069 if (abfd->arch_info->bits_per_word == 32
1070 && bfd_big_endian (abfd))
1071 {
1072
1073 for (s = abfd->sections; s != NULL; s = s->next)
1074 if ((elf_section_data (s)->this_hdr.sh_flags & SHF_PPC_VLE) != 0)
1075 break;
1076 if (s != NULL)
1077 mach = bfd_mach_ppc_vle;
1078 }
1079
1080 if (mach == 0)
1081 {
1082 s = bfd_get_section_by_name (abfd, APUINFO_SECTION_NAME);
62a47958
AM
1083 if (s != NULL
1084 && s->size >= 24
1085 && bfd_malloc_and_get_section (abfd, s, &contents))
14b57c7c
AM
1086 {
1087 unsigned int apuinfo_size = bfd_get_32 (abfd, contents + 4);
1088 unsigned int i;
1089
1090 for (i = 20; i < apuinfo_size + 20 && i + 4 <= s->size; i += 4)
1091 {
1092 unsigned int val = bfd_get_32 (abfd, contents + i);
1093 switch (val >> 16)
1094 {
1095 case PPC_APUINFO_PMR:
1096 case PPC_APUINFO_RFMCI:
1097 if (mach == 0)
1098 mach = bfd_mach_ppc_titan;
1099 break;
1100
1101 case PPC_APUINFO_ISEL:
1102 case PPC_APUINFO_CACHELCK:
1103 if (mach == bfd_mach_ppc_titan)
1104 mach = bfd_mach_ppc_e500mc;
1105 break;
1106
1107 case PPC_APUINFO_SPE:
1108 case PPC_APUINFO_EFS:
1109 case PPC_APUINFO_BRLOCK:
1110 if (mach != bfd_mach_ppc_vle)
1111 mach = bfd_mach_ppc_e500;
8941017b 1112 break;
14b57c7c
AM
1113
1114 case PPC_APUINFO_VLE:
1115 mach = bfd_mach_ppc_vle;
1116 break;
1117
1118 default:
1119 mach = -1ul;
1120 }
1121 }
1122 free (contents);
1123 }
1124 }
1125
1126 if (mach != 0 && mach != -1ul)
1127 {
1128 const bfd_arch_info_type *arch;
1129
1130 for (arch = abfd->arch_info->next; arch; arch = arch->next)
1131 if (arch->mach == mach)
1132 {
1133 abfd->arch_info = arch;
1134 break;
1135 }
1136 }
1137 return TRUE;
1138}
1139
25dbc73a 1140/* Fix bad default arch selected for a 32 bit input bfd when the
14b57c7c 1141 default is 64 bit. Also select arch based on apuinfo. */
7619e7c7 1142
25dbc73a
AM
1143static bfd_boolean
1144ppc_elf_object_p (bfd *abfd)
1145{
14b57c7c
AM
1146 if (!abfd->arch_info->the_default)
1147 return TRUE;
1148
1149 if (abfd->arch_info->bits_per_word == 64)
25dbc73a
AM
1150 {
1151 Elf_Internal_Ehdr *i_ehdr = elf_elfheader (abfd);
7619e7c7 1152
25dbc73a
AM
1153 if (i_ehdr->e_ident[EI_CLASS] == ELFCLASS32)
1154 {
1155 /* Relies on arch after 64 bit default being 32 bit default. */
1156 abfd->arch_info = abfd->arch_info->next;
1157 BFD_ASSERT (abfd->arch_info->bits_per_word == 32);
1158 }
1159 }
14b57c7c 1160 return _bfd_elf_ppc_set_arch (abfd);
25dbc73a 1161}
7619e7c7 1162
25dbc73a 1163/* Function to set whether a module needs the -mrelocatable bit set. */
7619e7c7 1164
25dbc73a
AM
1165static bfd_boolean
1166ppc_elf_set_private_flags (bfd *abfd, flagword flags)
1167{
1168 BFD_ASSERT (!elf_flags_init (abfd)
1169 || elf_elfheader (abfd)->e_flags == flags);
7619e7c7 1170
25dbc73a
AM
1171 elf_elfheader (abfd)->e_flags = flags;
1172 elf_flags_init (abfd) = TRUE;
1173 return TRUE;
1174}
1175
25dbc73a 1176/* Support for core dump NOTE sections. */
deaaf2f3 1177
b34976b6 1178static bfd_boolean
25dbc73a 1179ppc_elf_grok_prstatus (bfd *abfd, Elf_Internal_Note *note)
252b5132 1180{
25dbc73a
AM
1181 int offset;
1182 unsigned int size;
252b5132 1183
25dbc73a
AM
1184 switch (note->descsz)
1185 {
1186 default:
1187 return FALSE;
252b5132 1188
25dbc73a
AM
1189 case 268: /* Linux/PPC. */
1190 /* pr_cursig */
228e534f 1191 elf_tdata (abfd)->core->signal = bfd_get_16 (abfd, note->descdata + 12);
deaaf2f3 1192
25dbc73a 1193 /* pr_pid */
228e534f 1194 elf_tdata (abfd)->core->lwpid = bfd_get_32 (abfd, note->descdata + 24);
9abc968f 1195
25dbc73a
AM
1196 /* pr_reg */
1197 offset = 72;
1198 size = 192;
deaaf2f3 1199
25dbc73a
AM
1200 break;
1201 }
deaaf2f3 1202
25dbc73a
AM
1203 /* Make a ".reg/999" section. */
1204 return _bfd_elfcore_make_pseudosection (abfd, ".reg",
1205 size, note->descpos + offset);
1206}
252b5132 1207
25dbc73a
AM
1208static bfd_boolean
1209ppc_elf_grok_psinfo (bfd *abfd, Elf_Internal_Note *note)
1210{
1211 switch (note->descsz)
deaaf2f3 1212 {
25dbc73a
AM
1213 default:
1214 return FALSE;
deaaf2f3 1215
25dbc73a 1216 case 128: /* Linux/PPC elf_prpsinfo. */
228e534f 1217 elf_tdata (abfd)->core->pid
bc989cdc 1218 = bfd_get_32 (abfd, note->descdata + 16);
228e534f 1219 elf_tdata (abfd)->core->program
25dbc73a 1220 = _bfd_elfcore_strndup (abfd, note->descdata + 32, 16);
228e534f 1221 elf_tdata (abfd)->core->command
25dbc73a
AM
1222 = _bfd_elfcore_strndup (abfd, note->descdata + 48, 80);
1223 }
9abc968f 1224
25dbc73a
AM
1225 /* Note that for some reason, a spurious space is tacked
1226 onto the end of the args in some (at least one anyway)
1227 implementations, so strip it off if it exists. */
70bccea4 1228
25dbc73a 1229 {
228e534f 1230 char *command = elf_tdata (abfd)->core->command;
25dbc73a 1231 int n = strlen (command);
70bccea4 1232
25dbc73a
AM
1233 if (0 < n && command[n - 1] == ' ')
1234 command[n - 1] = '\0';
1235 }
deaaf2f3 1236
25dbc73a
AM
1237 return TRUE;
1238}
deaaf2f3 1239
183e98be
AM
1240static char *
1241ppc_elf_write_core_note (bfd *abfd, char *buf, int *bufsiz, int note_type, ...)
1242{
1243 switch (note_type)
1244 {
1245 default:
1246 return NULL;
1247
1248 case NT_PRPSINFO:
1249 {
602f1657 1250 char data[128] ATTRIBUTE_NONSTRING;
183e98be
AM
1251 va_list ap;
1252
1253 va_start (ap, note_type);
75cd47ed 1254 memset (data, 0, sizeof (data));
183e98be 1255 strncpy (data + 32, va_arg (ap, const char *), 16);
be3e27bb 1256#if GCC_VERSION == 8000 || GCC_VERSION == 8001
95da9854 1257 DIAGNOSTIC_PUSH;
be3e27bb 1258 /* GCC 8.0 and 8.1 warn about 80 equals destination size with
95da9854
L
1259 -Wstringop-truncation:
1260 https://gcc.gnu.org/bugzilla/show_bug.cgi?id=85643
1261 */
95da9854
L
1262 DIAGNOSTIC_IGNORE_STRINGOP_TRUNCATION;
1263#endif
183e98be 1264 strncpy (data + 48, va_arg (ap, const char *), 80);
be3e27bb 1265#if GCC_VERSION == 8000 || GCC_VERSION == 8001
95da9854 1266 DIAGNOSTIC_POP;
fe75810f 1267#endif
183e98be
AM
1268 va_end (ap);
1269 return elfcore_write_note (abfd, buf, bufsiz,
1270 "CORE", note_type, data, sizeof (data));
1271 }
1272
1273 case NT_PRSTATUS:
1274 {
1275 char data[268];
1276 va_list ap;
1277 long pid;
1278 int cursig;
1279 const void *greg;
1280
1281 va_start (ap, note_type);
1282 memset (data, 0, 72);
1283 pid = va_arg (ap, long);
1284 bfd_put_32 (abfd, pid, data + 24);
1285 cursig = va_arg (ap, int);
1286 bfd_put_16 (abfd, cursig, data + 12);
1287 greg = va_arg (ap, const void *);
1288 memcpy (data + 72, greg, 192);
1289 memset (data + 264, 0, 4);
1290 va_end (ap);
1291 return elfcore_write_note (abfd, buf, bufsiz,
1292 "CORE", note_type, data, sizeof (data));
1293 }
1294 }
1295}
1296
b9c361e0 1297static flagword
68ffbac6 1298ppc_elf_lookup_section_flags (char *flag_name)
b9c361e0
JL
1299{
1300
1301 if (!strcmp (flag_name, "SHF_PPC_VLE"))
1302 return SHF_PPC_VLE;
1303
1304 return 0;
1305}
1306
25dbc73a
AM
1307/* Return address for Ith PLT stub in section PLT, for relocation REL
1308 or (bfd_vma) -1 if it should not be included. */
deaaf2f3 1309
25dbc73a
AM
1310static bfd_vma
1311ppc_elf_plt_sym_val (bfd_vma i ATTRIBUTE_UNUSED,
1312 const asection *plt ATTRIBUTE_UNUSED,
1313 const arelent *rel)
1314{
1315 return rel->address;
1316}
deaaf2f3 1317
25dbc73a 1318/* Handle a PowerPC specific section when reading an object file. This
6dc132d9
L
1319 is called when bfd_section_from_shdr finds a section with an unknown
1320 type. */
deaaf2f3 1321
25dbc73a 1322static bfd_boolean
6dc132d9
L
1323ppc_elf_section_from_shdr (bfd *abfd,
1324 Elf_Internal_Shdr *hdr,
1325 const char *name,
1326 int shindex)
25dbc73a
AM
1327{
1328 asection *newsect;
1329 flagword flags;
d1c6de6f 1330
6dc132d9 1331 if (! _bfd_elf_make_section_from_shdr (abfd, hdr, name, shindex))
25dbc73a 1332 return FALSE;
deaaf2f3 1333
25dbc73a 1334 newsect = hdr->bfd_section;
fd361982 1335 flags = bfd_section_flags (newsect);
25dbc73a
AM
1336 if (hdr->sh_flags & SHF_EXCLUDE)
1337 flags |= SEC_EXCLUDE;
9abc968f 1338
25dbc73a
AM
1339 if (hdr->sh_type == SHT_ORDERED)
1340 flags |= SEC_SORT_ENTRIES;
d1c6de6f 1341
fd361982 1342 bfd_set_section_flags (newsect, flags);
25dbc73a
AM
1343 return TRUE;
1344}
1345
1346/* Set up any other section flags and such that may be necessary. */
1347
1348static bfd_boolean
1349ppc_elf_fake_sections (bfd *abfd ATTRIBUTE_UNUSED,
1350 Elf_Internal_Shdr *shdr,
1351 asection *asect)
1352{
25dbc73a
AM
1353 if ((asect->flags & SEC_SORT_ENTRIES) != 0)
1354 shdr->sh_type = SHT_ORDERED;
1355
1356 return TRUE;
1357}
1358
1359/* If we have .sbss2 or .PPC.EMB.sbss0 output sections, we
1360 need to bump up the number of section headers. */
1361
1362static int
a6b96beb
AM
1363ppc_elf_additional_program_headers (bfd *abfd,
1364 struct bfd_link_info *info ATTRIBUTE_UNUSED)
25dbc73a
AM
1365{
1366 asection *s;
1367 int ret = 0;
d1c6de6f 1368
25dbc73a
AM
1369 s = bfd_get_section_by_name (abfd, ".sbss2");
1370 if (s != NULL && (s->flags & SEC_ALLOC) != 0)
1371 ++ret;
d1c6de6f 1372
25dbc73a
AM
1373 s = bfd_get_section_by_name (abfd, ".PPC.EMB.sbss0");
1374 if (s != NULL && (s->flags & SEC_ALLOC) != 0)
1375 ++ret;
deaaf2f3 1376
25dbc73a
AM
1377 return ret;
1378}
deaaf2f3 1379
68ffbac6 1380/* Modify the segment map for VLE executables. */
b9c361e0
JL
1381
1382bfd_boolean
1383ppc_elf_modify_segment_map (bfd *abfd,
1384 struct bfd_link_info *info ATTRIBUTE_UNUSED)
1385{
f7d69005 1386 struct elf_segment_map *m;
b9c361e0
JL
1387
1388 /* At this point in the link, output sections have already been sorted by
1389 LMA and assigned to segments. All that is left to do is to ensure
1390 there is no mixing of VLE & non-VLE sections in a text segment.
1391 If we find that case, we split the segment.
1392 We maintain the original output section order. */
1393
12bd6957 1394 for (m = elf_seg_map (abfd); m != NULL; m = m->next)
b9c361e0 1395 {
f7d69005
AM
1396 struct elf_segment_map *n;
1397 bfd_size_type amt;
1398 unsigned int j, k;
1399 unsigned int p_flags;
1400
1401 if (m->p_type != PT_LOAD || m->count == 0)
b9c361e0
JL
1402 continue;
1403
f7d69005 1404 for (p_flags = PF_R, j = 0; j != m->count; ++j)
b9c361e0 1405 {
f7d69005
AM
1406 if ((m->sections[j]->flags & SEC_READONLY) == 0)
1407 p_flags |= PF_W;
1408 if ((m->sections[j]->flags & SEC_CODE) != 0)
1409 {
1410 p_flags |= PF_X;
1411 if ((elf_section_flags (m->sections[j]) & SHF_PPC_VLE) != 0)
1412 p_flags |= PF_PPC_VLE;
1413 break;
1414 }
1415 }
1416 if (j != m->count)
1417 while (++j != m->count)
1418 {
1419 unsigned int p_flags1 = PF_R;
94caa966 1420
f7d69005
AM
1421 if ((m->sections[j]->flags & SEC_READONLY) == 0)
1422 p_flags1 |= PF_W;
1423 if ((m->sections[j]->flags & SEC_CODE) != 0)
1424 {
1425 p_flags1 |= PF_X;
1426 if ((elf_section_flags (m->sections[j]) & SHF_PPC_VLE) != 0)
1427 p_flags1 |= PF_PPC_VLE;
1428 if (((p_flags1 ^ p_flags) & PF_PPC_VLE) != 0)
1429 break;
1430 }
1431 p_flags |= p_flags1;
1432 }
1433 /* If we're splitting a segment which originally contained rw
1434 sections then those sections might now only be in one of the
1435 two parts. So always set p_flags if splitting, even if we
1436 are being called for objcopy with p_flags_valid set. */
1437 if (j != m->count || !m->p_flags_valid)
1438 {
1439 m->p_flags_valid = 1;
1440 m->p_flags = p_flags;
1441 }
1442 if (j == m->count)
b9c361e0
JL
1443 continue;
1444
f7d69005 1445 /* Sections 0..j-1 stay in this (current) segment,
b9c361e0
JL
1446 the remainder are put in a new segment.
1447 The scan resumes with the new segment. */
1448
b9c361e0
JL
1449 amt = sizeof (struct elf_segment_map);
1450 amt += (m->count - j - 1) * sizeof (asection *);
1451 n = (struct elf_segment_map *) bfd_zalloc (abfd, amt);
1452 if (n == NULL)
954b63d4 1453 return FALSE;
b9c361e0
JL
1454
1455 n->p_type = PT_LOAD;
b9c361e0
JL
1456 n->count = m->count - j;
1457 for (k = 0; k < n->count; ++k)
f7d69005
AM
1458 n->sections[k] = m->sections[j + k];
1459 m->count = j;
1460 m->p_size_valid = 0;
b9c361e0
JL
1461 n->next = m->next;
1462 m->next = n;
b9c361e0
JL
1463 }
1464
1465 return TRUE;
1466}
1467
25dbc73a
AM
1468/* Add extra PPC sections -- Note, for now, make .sbss2 and
1469 .PPC.EMB.sbss0 a normal section, and not a bss section so
1470 that the linker doesn't crater when trying to make more than
1471 2 sections. */
e656e369 1472
b35d266b 1473static const struct bfd_elf_special_section ppc_elf_special_sections[] =
7f4d3958 1474{
14b57c7c
AM
1475 { STRING_COMMA_LEN (".plt"), 0, SHT_NOBITS, SHF_ALLOC + SHF_EXECINSTR },
1476 { STRING_COMMA_LEN (".sbss"), -2, SHT_NOBITS, SHF_ALLOC + SHF_WRITE },
1477 { STRING_COMMA_LEN (".sbss2"), -2, SHT_PROGBITS, SHF_ALLOC },
1478 { STRING_COMMA_LEN (".sdata"), -2, SHT_PROGBITS, SHF_ALLOC + SHF_WRITE },
1479 { STRING_COMMA_LEN (".sdata2"), -2, SHT_PROGBITS, SHF_ALLOC },
1480 { STRING_COMMA_LEN (".tags"), 0, SHT_ORDERED, SHF_ALLOC },
1481 { STRING_COMMA_LEN (APUINFO_SECTION_NAME), 0, SHT_NOTE, 0 },
1482 { STRING_COMMA_LEN (".PPC.EMB.sbss0"), 0, SHT_PROGBITS, SHF_ALLOC },
1483 { STRING_COMMA_LEN (".PPC.EMB.sdata0"), 0, SHT_PROGBITS, SHF_ALLOC },
1484 { NULL, 0, 0, 0, 0 }
7f4d3958
L
1485};
1486
551b43fd
AM
1487/* This is what we want for new plt/got. */
1488static struct bfd_elf_special_section ppc_alt_plt =
07d6d2b8 1489 { STRING_COMMA_LEN (".plt"), 0, SHT_PROGBITS, SHF_ALLOC };
551b43fd
AM
1490
1491static const struct bfd_elf_special_section *
4aef7643 1492ppc_elf_get_sec_type_attr (bfd *abfd, asection *sec)
7f4d3958 1493{
b35d266b 1494 const struct bfd_elf_special_section *ssect;
551b43fd
AM
1495
1496 /* See if this is one of the special sections. */
1497 if (sec->name == NULL)
1498 return NULL;
1499
1500 ssect = _bfd_elf_get_special_section (sec->name, ppc_elf_special_sections,
1501 sec->use_rela_p);
1502 if (ssect != NULL)
1503 {
1504 if (ssect == ppc_elf_special_sections && (sec->flags & SEC_LOAD) != 0)
1505 ssect = &ppc_alt_plt;
1506 return ssect;
1507 }
1508
1509 return _bfd_elf_get_sec_type_attr (abfd, sec);
1510}
25dbc73a
AM
1511\f
1512/* Very simple linked list structure for recording apuinfo values. */
1513typedef struct apuinfo_list
1514{
1515 struct apuinfo_list *next;
1516 unsigned long value;
1517}
1518apuinfo_list;
e656e369 1519
25dbc73a 1520static apuinfo_list *head;
f2faa800 1521static bfd_boolean apuinfo_set;
deaaf2f3 1522
25dbc73a
AM
1523static void
1524apuinfo_list_init (void)
1525{
1526 head = NULL;
f2faa800 1527 apuinfo_set = FALSE;
25dbc73a 1528}
9abc968f 1529
25dbc73a
AM
1530static void
1531apuinfo_list_add (unsigned long value)
1532{
1533 apuinfo_list *entry = head;
deaaf2f3 1534
25dbc73a
AM
1535 while (entry != NULL)
1536 {
1537 if (entry->value == value)
1538 return;
1539 entry = entry->next;
1540 }
b4a38de6 1541
25dbc73a
AM
1542 entry = bfd_malloc (sizeof (* entry));
1543 if (entry == NULL)
1544 return;
e656e369 1545
25dbc73a
AM
1546 entry->value = value;
1547 entry->next = head;
1548 head = entry;
1549}
9abc968f 1550
25dbc73a
AM
1551static unsigned
1552apuinfo_list_length (void)
1553{
1554 apuinfo_list *entry;
1555 unsigned long count;
9abc968f 1556
25dbc73a
AM
1557 for (entry = head, count = 0;
1558 entry;
1559 entry = entry->next)
1560 ++ count;
e656e369 1561
25dbc73a
AM
1562 return count;
1563}
eea6121a 1564
25dbc73a
AM
1565static inline unsigned long
1566apuinfo_list_element (unsigned long number)
1567{
1568 apuinfo_list * entry;
e656e369 1569
25dbc73a
AM
1570 for (entry = head;
1571 entry && number --;
1572 entry = entry->next)
1573 ;
252b5132 1574
25dbc73a
AM
1575 return entry ? entry->value : 0;
1576}
1577
1578static void
1579apuinfo_list_finish (void)
1580{
1581 apuinfo_list *entry;
1582
1583 for (entry = head; entry;)
252b5132 1584 {
25dbc73a
AM
1585 apuinfo_list *next = entry->next;
1586 free (entry);
1587 entry = next;
1588 }
9abc968f 1589
25dbc73a
AM
1590 head = NULL;
1591}
9abc968f 1592
25dbc73a
AM
1593/* Scan the input BFDs and create a linked list of
1594 the APUinfo values that will need to be emitted. */
9abc968f 1595
25dbc73a
AM
1596static void
1597ppc_elf_begin_write_processing (bfd *abfd, struct bfd_link_info *link_info)
1598{
1599 bfd *ibfd;
1600 asection *asec;
deddc40b
NS
1601 char *buffer = NULL;
1602 bfd_size_type largest_input_size = 0;
25dbc73a 1603 unsigned i;
25dbc73a
AM
1604 unsigned long length;
1605 const char *error_message = NULL;
9abc968f 1606
25dbc73a
AM
1607 if (link_info == NULL)
1608 return;
9abc968f 1609
25dbc73a 1610 apuinfo_list_init ();
252b5132 1611
25dbc73a 1612 /* Read in the input sections contents. */
c72f2fb2 1613 for (ibfd = link_info->input_bfds; ibfd; ibfd = ibfd->link.next)
252b5132 1614 {
25dbc73a 1615 unsigned long datum;
252b5132 1616
25dbc73a
AM
1617 asec = bfd_get_section_by_name (ibfd, APUINFO_SECTION_NAME);
1618 if (asec == NULL)
1619 continue;
252b5132 1620
695344c0 1621 /* xgettext:c-format */
871b3ab2 1622 error_message = _("corrupt %s section in %pB");
25dbc73a 1623 length = asec->size;
deddc40b
NS
1624 if (length < 20)
1625 goto fail;
1626
f2faa800 1627 apuinfo_set = TRUE;
deddc40b 1628 if (largest_input_size < asec->size)
25dbc73a 1629 {
deddc40b
NS
1630 if (buffer)
1631 free (buffer);
1632 largest_input_size = asec->size;
1633 buffer = bfd_malloc (largest_input_size);
1634 if (!buffer)
1635 return;
25dbc73a 1636 }
5b914448 1637
25dbc73a 1638 if (bfd_seek (ibfd, asec->filepos, SEEK_SET) != 0
deddc40b 1639 || (bfd_bread (buffer, length, ibfd) != length))
25dbc73a 1640 {
695344c0 1641 /* xgettext:c-format */
871b3ab2 1642 error_message = _("unable to read in %s section from %pB");
25dbc73a
AM
1643 goto fail;
1644 }
252b5132 1645
25dbc73a
AM
1646 /* Verify the contents of the header. Note - we have to
1647 extract the values this way in order to allow for a
1648 host whose endian-ness is different from the target. */
deddc40b 1649 datum = bfd_get_32 (ibfd, buffer);
25dbc73a
AM
1650 if (datum != sizeof APUINFO_LABEL)
1651 goto fail;
252b5132 1652
deddc40b 1653 datum = bfd_get_32 (ibfd, buffer + 8);
25dbc73a
AM
1654 if (datum != 0x2)
1655 goto fail;
252b5132 1656
deddc40b 1657 if (strcmp (buffer + 12, APUINFO_LABEL) != 0)
25dbc73a 1658 goto fail;
252b5132 1659
25dbc73a 1660 /* Get the number of bytes used for apuinfo entries. */
deddc40b 1661 datum = bfd_get_32 (ibfd, buffer + 4);
25dbc73a
AM
1662 if (datum + 20 != length)
1663 goto fail;
1664
25dbc73a
AM
1665 /* Scan the apuinfo section, building a list of apuinfo numbers. */
1666 for (i = 0; i < datum; i += 4)
deddc40b 1667 apuinfo_list_add (bfd_get_32 (ibfd, buffer + 20 + i));
252b5132
RH
1668 }
1669
25dbc73a 1670 error_message = NULL;
252b5132 1671
f2faa800 1672 if (apuinfo_set)
deddc40b 1673 {
f2faa800
NS
1674 /* Compute the size of the output section. */
1675 unsigned num_entries = apuinfo_list_length ();
5b914448 1676
deddc40b
NS
1677 /* Set the output section size, if it exists. */
1678 asec = bfd_get_section_by_name (abfd, APUINFO_SECTION_NAME);
f2faa800 1679
fd361982 1680 if (asec && !bfd_set_section_size (asec, 20 + num_entries * 4))
deddc40b
NS
1681 {
1682 ibfd = abfd;
695344c0 1683 /* xgettext:c-format */
871b3ab2 1684 error_message = _("warning: unable to set size of %s section in %pB");
deddc40b
NS
1685 }
1686 }
25dbc73a
AM
1687
1688 fail:
deddc40b
NS
1689 if (buffer)
1690 free (buffer);
25dbc73a
AM
1691
1692 if (error_message)
cd9af601 1693 _bfd_error_handler (error_message, APUINFO_SECTION_NAME, ibfd);
25dbc73a 1694}
252b5132 1695
25dbc73a
AM
1696/* Prevent the output section from accumulating the input sections'
1697 contents. We have already stored this in our linked list structure. */
252b5132 1698
25dbc73a
AM
1699static bfd_boolean
1700ppc_elf_write_section (bfd *abfd ATTRIBUTE_UNUSED,
c7b8f16e 1701 struct bfd_link_info *link_info ATTRIBUTE_UNUSED,
25dbc73a
AM
1702 asection *asec,
1703 bfd_byte *contents ATTRIBUTE_UNUSED)
1704{
f2faa800 1705 return apuinfo_set && strcmp (asec->name, APUINFO_SECTION_NAME) == 0;
252b5132
RH
1706}
1707
25dbc73a
AM
1708/* Finally we can generate the output section. */
1709
1710static void
cc364be6 1711ppc_final_write_processing (bfd *abfd)
7619e7c7 1712{
25dbc73a
AM
1713 bfd_byte *buffer;
1714 asection *asec;
1715 unsigned i;
1716 unsigned num_entries;
1717 bfd_size_type length;
7619e7c7 1718
25dbc73a
AM
1719 asec = bfd_get_section_by_name (abfd, APUINFO_SECTION_NAME);
1720 if (asec == NULL)
1721 return;
1722
f2faa800 1723 if (!apuinfo_set)
25dbc73a
AM
1724 return;
1725
1726 length = asec->size;
1727 if (length < 20)
1728 return;
1729
1730 buffer = bfd_malloc (length);
1731 if (buffer == NULL)
7619e7c7 1732 {
4eca0228 1733 _bfd_error_handler
cf97bcb0 1734 (_("failed to allocate space for new APUinfo section"));
25dbc73a 1735 return;
7619e7c7 1736 }
7619e7c7 1737
25dbc73a
AM
1738 /* Create the apuinfo header. */
1739 num_entries = apuinfo_list_length ();
1740 bfd_put_32 (abfd, sizeof APUINFO_LABEL, buffer);
1741 bfd_put_32 (abfd, num_entries * 4, buffer + 4);
1742 bfd_put_32 (abfd, 0x2, buffer + 8);
1743 strcpy ((char *) buffer + 12, APUINFO_LABEL);
feee612b 1744
25dbc73a
AM
1745 length = 20;
1746 for (i = 0; i < num_entries; i++)
feee612b 1747 {
25dbc73a
AM
1748 bfd_put_32 (abfd, apuinfo_list_element (i), buffer + length);
1749 length += 4;
feee612b 1750 }
feee612b 1751
25dbc73a 1752 if (length != asec->size)
cf97bcb0 1753 _bfd_error_handler (_("failed to compute new APUinfo section"));
252b5132 1754
25dbc73a 1755 if (! bfd_set_section_contents (abfd, asec, buffer, (file_ptr) 0, length))
cf97bcb0 1756 _bfd_error_handler (_("failed to install new APUinfo section"));
252b5132 1757
25dbc73a
AM
1758 free (buffer);
1759
1760 apuinfo_list_finish ();
252b5132 1761}
06f44071 1762
cc364be6
AM
1763static bfd_boolean
1764ppc_elf_final_write_processing (bfd *abfd)
06f44071 1765{
cc364be6
AM
1766 ppc_final_write_processing (abfd);
1767 return _bfd_elf_final_write_processing (abfd);
06f44071 1768}
25dbc73a 1769\f
7382d32a 1770static bfd_boolean
c6dd29ce 1771is_nonpic_glink_stub (bfd *abfd, asection *glink, bfd_vma off)
7382d32a 1772{
407aa07c 1773 bfd_byte buf[4 * 4];
7382d32a 1774
9e390558 1775 if (!bfd_get_section_contents (abfd, glink, buf, off, sizeof buf))
7382d32a
AM
1776 return FALSE;
1777
c6dd29ce
AM
1778 return ((bfd_get_32 (abfd, buf + 0) & 0xffff0000) == LIS_11
1779 && (bfd_get_32 (abfd, buf + 4) & 0xffff0000) == LWZ_11_11
407aa07c
AM
1780 && bfd_get_32 (abfd, buf + 8) == MTCTR_11
1781 && bfd_get_32 (abfd, buf + 12) == BCTR);
7382d32a
AM
1782}
1783
468392fb
AM
1784static bfd_boolean
1785section_covers_vma (bfd *abfd ATTRIBUTE_UNUSED, asection *section, void *ptr)
1786{
1787 bfd_vma vma = *(bfd_vma *) ptr;
1788 return ((section->flags & SEC_ALLOC) != 0
1789 && section->vma <= vma
1790 && vma < section->vma + section->size);
1791}
1792
1793static long
1794ppc_elf_get_synthetic_symtab (bfd *abfd, long symcount, asymbol **syms,
1795 long dynsymcount, asymbol **dynsyms,
1796 asymbol **ret)
1797{
1798 bfd_boolean (*slurp_relocs) (bfd *, asection *, asymbol **, bfd_boolean);
1799 asection *plt, *relplt, *dynamic, *glink;
1800 bfd_vma glink_vma = 0;
1801 bfd_vma resolv_vma = 0;
9e390558 1802 bfd_vma stub_off;
468392fb
AM
1803 asymbol *s;
1804 arelent *p;
9ad9b810 1805 size_t count, i, stub_delta;
468392fb
AM
1806 size_t size;
1807 char *names;
1808 bfd_byte buf[4];
1809
1810 *ret = NULL;
1811
1812 if ((abfd->flags & (DYNAMIC | EXEC_P)) == 0)
1813 return 0;
1814
1815 if (dynsymcount <= 0)
1816 return 0;
1817
1818 relplt = bfd_get_section_by_name (abfd, ".rela.plt");
1819 if (relplt == NULL)
1820 return 0;
1821
1822 plt = bfd_get_section_by_name (abfd, ".plt");
1823 if (plt == NULL)
1824 return 0;
1825
1826 /* Call common code to handle old-style executable PLTs. */
1827 if (elf_section_flags (plt) & SHF_EXECINSTR)
1828 return _bfd_elf_get_synthetic_symtab (abfd, symcount, syms,
1829 dynsymcount, dynsyms, ret);
1830
1831 /* If this object was prelinked, the prelinker stored the address
1832 of .glink at got[1]. If it wasn't prelinked, got[1] will be zero. */
1833 dynamic = bfd_get_section_by_name (abfd, ".dynamic");
1834 if (dynamic != NULL)
1835 {
1836 bfd_byte *dynbuf, *extdyn, *extdynend;
1837 size_t extdynsize;
1838 void (*swap_dyn_in) (bfd *, const void *, Elf_Internal_Dyn *);
1839
1840 if (!bfd_malloc_and_get_section (abfd, dynamic, &dynbuf))
1841 return -1;
1842
1843 extdynsize = get_elf_backend_data (abfd)->s->sizeof_dyn;
1844 swap_dyn_in = get_elf_backend_data (abfd)->s->swap_dyn_in;
1845
1846 extdyn = dynbuf;
1847 extdynend = extdyn + dynamic->size;
1848 for (; extdyn < extdynend; extdyn += extdynsize)
1849 {
1850 Elf_Internal_Dyn dyn;
1851 (*swap_dyn_in) (abfd, extdyn, &dyn);
1852
1853 if (dyn.d_tag == DT_NULL)
1854 break;
1855
1856 if (dyn.d_tag == DT_PPC_GOT)
1857 {
1858 unsigned int g_o_t = dyn.d_un.d_val;
1859 asection *got = bfd_get_section_by_name (abfd, ".got");
1860 if (got != NULL
1861 && bfd_get_section_contents (abfd, got, buf,
1862 g_o_t - got->vma + 4, 4))
1863 glink_vma = bfd_get_32 (abfd, buf);
1864 break;
1865 }
1866 }
1867 free (dynbuf);
1868 }
1869
1870 /* Otherwise we read the first plt entry. */
1871 if (glink_vma == 0)
1872 {
1873 if (bfd_get_section_contents (abfd, plt, buf, 0, 4))
1874 glink_vma = bfd_get_32 (abfd, buf);
1875 }
1876
1877 if (glink_vma == 0)
1878 return 0;
1879
1880 /* The .glink section usually does not survive the final
1881 link; search for the section (usually .text) where the
1882 glink stubs now reside. */
1883 glink = bfd_sections_find_if (abfd, section_covers_vma, &glink_vma);
1884 if (glink == NULL)
1885 return 0;
1886
1887 /* Determine glink PLT resolver by reading the relative branch
1888 from the first glink stub. */
1889 if (bfd_get_section_contents (abfd, glink, buf,
1890 glink_vma - glink->vma, 4))
1891 {
1892 unsigned int insn = bfd_get_32 (abfd, buf);
1893
1894 /* The first glink stub may either branch to the resolver ... */
1895 insn ^= B;
1896 if ((insn & ~0x3fffffc) == 0)
1897 resolv_vma = glink_vma + (insn ^ 0x2000000) - 0x2000000;
1898
1899 /* ... or fall through a bunch of NOPs. */
1900 else if ((insn ^ B ^ NOP) == 0)
1901 for (i = 4;
1902 bfd_get_section_contents (abfd, glink, buf,
1903 glink_vma - glink->vma + i, 4);
1904 i += 4)
1905 if (bfd_get_32 (abfd, buf) != NOP)
1906 {
1907 resolv_vma = glink_vma + i;
1908 break;
1909 }
1910 }
1911
7382d32a 1912 count = relplt->size / sizeof (Elf32_External_Rela);
7382d32a
AM
1913 /* If the stubs are those for -shared/-pie then we might have
1914 multiple stubs for each plt entry. If that is the case then
1915 there is no way to associate stubs with their plt entries short
9e390558
AM
1916 of figuring out the GOT pointer value used in the stub.
1917 The offsets tested here need to cover all possible values of
1918 GLINK_ENTRY_SIZE for other than __tls_get_addr_opt. */
1919 stub_off = glink_vma - glink->vma;
1920 for (stub_delta = 16; stub_delta <= 32; stub_delta += 8)
1921 if (is_nonpic_glink_stub (abfd, glink, stub_off - stub_delta))
1922 break;
1923 if (stub_delta > 32)
7382d32a
AM
1924 return 0;
1925
468392fb
AM
1926 slurp_relocs = get_elf_backend_data (abfd)->s->slurp_reloc_table;
1927 if (! (*slurp_relocs) (abfd, relplt, dynsyms, TRUE))
1928 return -1;
1929
468392fb
AM
1930 size = count * sizeof (asymbol);
1931 p = relplt->relocation;
1932 for (i = 0; i < count; i++, p++)
e054468f
AM
1933 {
1934 size += strlen ((*p->sym_ptr_ptr)->name) + sizeof ("@plt");
1935 if (p->addend != 0)
1936 size += sizeof ("+0x") - 1 + 8;
1937 }
468392fb
AM
1938
1939 size += sizeof (asymbol) + sizeof ("__glink");
1940
1941 if (resolv_vma)
1942 size += sizeof (asymbol) + sizeof ("__glink_PLTresolve");
1943
1944 s = *ret = bfd_malloc (size);
1945 if (s == NULL)
1946 return -1;
1947
9e390558 1948 stub_off = glink_vma - glink->vma;
468392fb 1949 names = (char *) (s + count + 1 + (resolv_vma != 0));
1079403c
AM
1950 p = relplt->relocation + count - 1;
1951 for (i = 0; i < count; i++)
468392fb
AM
1952 {
1953 size_t len;
1954
9e390558
AM
1955 stub_off -= stub_delta;
1956 if (strcmp ((*p->sym_ptr_ptr)->name, "__tls_get_addr_opt") == 0)
1957 stub_off -= 32;
468392fb
AM
1958 *s = **p->sym_ptr_ptr;
1959 /* Undefined syms won't have BSF_LOCAL or BSF_GLOBAL set. Since
1960 we are defining a symbol, ensure one of them is set. */
1961 if ((s->flags & BSF_LOCAL) == 0)
1962 s->flags |= BSF_GLOBAL;
6ba2a415 1963 s->flags |= BSF_SYNTHETIC;
468392fb 1964 s->section = glink;
9e390558 1965 s->value = stub_off;
468392fb
AM
1966 s->name = names;
1967 s->udata.p = NULL;
1968 len = strlen ((*p->sym_ptr_ptr)->name);
1969 memcpy (names, (*p->sym_ptr_ptr)->name, len);
1970 names += len;
e054468f
AM
1971 if (p->addend != 0)
1972 {
1973 memcpy (names, "+0x", sizeof ("+0x") - 1);
1974 names += sizeof ("+0x") - 1;
1975 bfd_sprintf_vma (abfd, names, p->addend);
1976 names += strlen (names);
1977 }
468392fb
AM
1978 memcpy (names, "@plt", sizeof ("@plt"));
1979 names += sizeof ("@plt");
1980 ++s;
1079403c 1981 --p;
468392fb
AM
1982 }
1983
1984 /* Add a symbol at the start of the glink branch table. */
86a4952b 1985 memset (s, 0, sizeof *s);
468392fb 1986 s->the_bfd = abfd;
6ba2a415 1987 s->flags = BSF_GLOBAL | BSF_SYNTHETIC;
468392fb
AM
1988 s->section = glink;
1989 s->value = glink_vma - glink->vma;
1990 s->name = names;
1991 memcpy (names, "__glink", sizeof ("__glink"));
1992 names += sizeof ("__glink");
1993 s++;
1994 count++;
1995
1996 if (resolv_vma)
1997 {
1998 /* Add a symbol for the glink PLT resolver. */
86a4952b 1999 memset (s, 0, sizeof *s);
468392fb 2000 s->the_bfd = abfd;
6ba2a415 2001 s->flags = BSF_GLOBAL | BSF_SYNTHETIC;
468392fb
AM
2002 s->section = glink;
2003 s->value = resolv_vma - glink->vma;
2004 s->name = names;
2005 memcpy (names, "__glink_PLTresolve", sizeof ("__glink_PLTresolve"));
2006 names += sizeof ("__glink_PLTresolve");
2007 s++;
2008 count++;
2009 }
2010
2011 return count;
2012}
2013\f
25dbc73a
AM
2014/* The following functions are specific to the ELF linker, while
2015 functions above are used generally. They appear in this file more
2016 or less in the order in which they are called. eg.
2017 ppc_elf_check_relocs is called early in the link process,
2018 ppc_elf_finish_dynamic_sections is one of the last functions
2019 called. */
252b5132 2020
a6aa5195 2021/* Track PLT entries needed for a given symbol. We might need more
a877a2b6 2022 than one glink entry per symbol when generating a pic binary. */
a6aa5195
AM
2023struct plt_entry
2024{
2025 struct plt_entry *next;
2026
2027 /* -fPIC uses multiple GOT sections, one per file, called ".got2".
2028 This field stores the offset into .got2 used to initialise the
a877a2b6
AM
2029 GOT pointer reg. It will always be at least 32768. (Current
2030 gcc always uses an offset of 32768, but ld -r will pack .got2
2031 sections together resulting in larger offsets). */
a6aa5195
AM
2032 bfd_vma addend;
2033
2034 /* The .got2 section. */
2035 asection *sec;
2036
2037 /* PLT refcount or offset. */
2038 union
2039 {
2040 bfd_signed_vma refcount;
2041 bfd_vma offset;
2042 } plt;
2043
2044 /* .glink stub offset. */
2045 bfd_vma glink_offset;
2046};
2047
7c8bbca5
AM
2048/* Of those relocs that might be copied as dynamic relocs, this
2049 function selects those that must be copied when linking a shared
2050 library or PIE, even when the symbol is local. */
252b5132 2051
1d483afe
AM
2052static int
2053must_be_dyn_reloc (struct bfd_link_info *info,
2054 enum elf_ppc_reloc_type r_type)
2055{
2056 switch (r_type)
2057 {
2058 default:
7c8bbca5
AM
2059 /* Only relative relocs can be resolved when the object load
2060 address isn't fixed. DTPREL32 is excluded because the
2061 dynamic linker needs to differentiate global dynamic from
2062 local dynamic __tls_index pairs when PPC_OPT_TLS is set. */
1d483afe
AM
2063 return 1;
2064
2065 case R_PPC_REL24:
2066 case R_PPC_REL14:
2067 case R_PPC_REL14_BRTAKEN:
2068 case R_PPC_REL14_BRNTAKEN:
2069 case R_PPC_REL32:
2070 return 0;
2071
2072 case R_PPC_TPREL32:
2073 case R_PPC_TPREL16:
2074 case R_PPC_TPREL16_LO:
2075 case R_PPC_TPREL16_HI:
2076 case R_PPC_TPREL16_HA:
7c8bbca5
AM
2077 /* These relocations are relative but in a shared library the
2078 linker doesn't know the thread pointer base. */
2079 return bfd_link_dll (info);
1d483afe
AM
2080 }
2081}
252b5132 2082
25dbc73a
AM
2083/* If ELIMINATE_COPY_RELOCS is non-zero, the linker will try to avoid
2084 copying dynamic variables from a shared lib into an app's dynbss
2085 section, and instead use a dynamic relocation to point into the
2086 shared lib. */
2087#define ELIMINATE_COPY_RELOCS 1
252b5132 2088
f95f8542
AM
2089/* Used to track dynamic relocations for local symbols. */
2090struct ppc_dyn_relocs
2091{
2092 struct ppc_dyn_relocs *next;
2093
2094 /* The input section of the reloc. */
2095 asection *sec;
2096
2097 /* Total number of relocs copied for the input section. */
2098 unsigned int count : 31;
2099
2100 /* Whether this entry is for STT_GNU_IFUNC symbols. */
2101 unsigned int ifunc : 1;
2102};
2103
25dbc73a 2104/* PPC ELF linker hash entry. */
252b5132 2105
25dbc73a
AM
2106struct ppc_elf_link_hash_entry
2107{
2108 struct elf_link_hash_entry elf;
252b5132 2109
25dbc73a
AM
2110 /* If this symbol is used in the linker created sections, the processor
2111 specific backend uses this field to map the field into the offset
2112 from the beginning of the section. */
2113 elf_linker_section_pointers_t *linker_section_pointer;
252b5132 2114
25dbc73a 2115 /* Track dynamic relocs copied for this symbol. */
6061a67d 2116 struct elf_dyn_relocs *dyn_relocs;
252b5132 2117
37da22e5
AM
2118 /* Contexts in which symbol is used in the GOT.
2119 Bits are or'd into the mask as the corresponding relocs are
2120 encountered during check_relocs, with TLS_TLS being set when any
2121 of the other TLS bits are set. tls_optimize clears bits when
2122 optimizing to indicate the corresponding GOT entry type is not
2123 needed. If set, TLS_TLS is never cleared. tls_optimize may also
b00a0a86 2124 set TLS_GDIE when a GD reloc turns into an IE one.
37da22e5
AM
2125 These flags are also kept for local symbols. */
2126#define TLS_TLS 1 /* Any TLS reloc. */
2127#define TLS_GD 2 /* GD reloc. */
2128#define TLS_LD 4 /* LD reloc. */
2129#define TLS_TPREL 8 /* TPREL reloc, => IE. */
2130#define TLS_DTPREL 16 /* DTPREL reloc, => LD. */
2131#define TLS_MARK 32 /* __tls_get_addr call marked. */
b00a0a86 2132#define TLS_GDIE 64 /* GOT TPREL reloc resulting from GD->IE. */
bac3c8c5 2133 unsigned char tls_mask;
4dc4a9a5 2134
37da22e5
AM
2135 /* The above field is also used to mark function symbols. In which
2136 case TLS_TLS will be 0. */
2137#define PLT_IFUNC 2 /* STT_GNU_IFUNC. */
2d7ad24e 2138#define PLT_KEEP 4 /* inline plt call requires plt entry. */
37da22e5
AM
2139#define NON_GOT 256 /* local symbol plt, not stored. */
2140
4dc4a9a5
DJ
2141 /* Nonzero if we have seen a small data relocation referring to this
2142 symbol. */
d3e454b9
AM
2143 unsigned char has_sda_refs : 1;
2144
2145 /* Flag use of given relocations. */
2146 unsigned char has_addr16_ha : 1;
2147 unsigned char has_addr16_lo : 1;
25dbc73a 2148};
252b5132 2149
25dbc73a
AM
2150#define ppc_elf_hash_entry(ent) ((struct ppc_elf_link_hash_entry *) (ent))
2151
2152/* PPC ELF linker hash table. */
2153
2154struct ppc_elf_link_hash_table
2155{
2156 struct elf_link_hash_table elf;
2157
5446cbdf
AM
2158 /* Various options passed from the linker. */
2159 struct ppc_elf_params *params;
2160
25dbc73a 2161 /* Short-cuts to get to dynamic linker sections. */
d7128ce4 2162 asection *glink;
25dbc73a
AM
2163 asection *dynsbss;
2164 asection *relsbss;
c9a2f333 2165 elf_linker_section_t sdata[2];
25dbc73a 2166 asection *sbss;
6177242a 2167 asection *glink_eh_frame;
2d7ad24e
AM
2168 asection *pltlocal;
2169 asection *relpltlocal;
25dbc73a 2170
016687f8
AM
2171 /* The (unloaded but important) .rela.plt.unloaded on VxWorks. */
2172 asection *srelplt2;
2173
1d483afe 2174 /* Shortcut to __tls_get_addr. */
25dbc73a 2175 struct elf_link_hash_entry *tls_get_addr;
252b5132 2176
016687f8
AM
2177 /* The bfd that forced an old-style PLT. */
2178 bfd *old_bfd;
5b914448 2179
25dbc73a
AM
2180 /* TLS local dynamic got entry handling. */
2181 union {
2182 bfd_signed_vma refcount;
2183 bfd_vma offset;
2184 } tlsld_got;
252b5132 2185
c6dd29ce 2186 /* Offset of branch table to PltResolve function in glink. */
d7128ce4
AM
2187 bfd_vma glink_pltresolve;
2188
3b36f7e6
AM
2189 /* Size of reserved GOT entries. */
2190 unsigned int got_header_size;
2191 /* Non-zero if allocating the header left a gap. */
2192 unsigned int got_gap;
2193
4a3dc543
RS
2194 /* The type of PLT we have chosen to use. */
2195 enum ppc_elf_plt_type plt_type;
2196
9d8504b1 2197 /* True if the target system is VxWorks. */
016687f8 2198 unsigned int is_vxworks:1;
9d8504b1 2199
82e66161
AM
2200 /* Whether there exist local gnu indirect function resolvers,
2201 referenced by dynamic relocations. */
2202 unsigned int local_ifunc_resolver:1;
2203 unsigned int maybe_local_ifunc_resolver:1;
2204
9a23f96e
AM
2205 /* Set if tls optimization is enabled. */
2206 unsigned int do_tls_opt:1;
2207
3e04d765
AM
2208 /* Set if inline plt calls should be converted to direct calls. */
2209 unsigned int can_convert_all_inline_plt:1;
2210
9d8504b1
PB
2211 /* The size of PLT entries. */
2212 int plt_entry_size;
2213 /* The distance between adjacent PLT slots. */
2214 int plt_slot_size;
2215 /* The size of the first PLT entry. */
2216 int plt_initial_entry_size;
016687f8 2217
87d72d41
AM
2218 /* Small local sym cache. */
2219 struct sym_cache sym_cache;
25dbc73a 2220};
252b5132 2221
94caa966
AM
2222/* Rename some of the generic section flags to better document how they
2223 are used for ppc32. The flags are only valid for ppc32 elf objects. */
2224
2225/* Nonzero if this section has TLS related relocations. */
2226#define has_tls_reloc sec_flg0
2227
9737e8af
AM
2228/* Nonzero if this section has a call to __tls_get_addr lacking marker
2229 relocs. */
2230#define nomark_tls_get_addr sec_flg1
94caa966 2231
3e04d765
AM
2232 /* Flag set when PLTCALL relocs are detected. */
2233#define has_pltcall sec_flg2
2234
25dbc73a 2235/* Get the PPC ELF linker hash table from a link_info structure. */
252b5132 2236
25dbc73a 2237#define ppc_elf_hash_table(p) \
4dfe6ac6
NC
2238 (elf_hash_table_id ((struct elf_link_hash_table *) ((p)->hash)) \
2239 == PPC32_ELF_DATA ? ((struct ppc_elf_link_hash_table *) ((p)->hash)) : NULL)
252b5132 2240
25dbc73a 2241/* Create an entry in a PPC ELF linker hash table. */
252b5132 2242
25dbc73a
AM
2243static struct bfd_hash_entry *
2244ppc_elf_link_hash_newfunc (struct bfd_hash_entry *entry,
2245 struct bfd_hash_table *table,
2246 const char *string)
252b5132 2247{
25dbc73a
AM
2248 /* Allocate the structure if it has not already been allocated by a
2249 subclass. */
2250 if (entry == NULL)
2251 {
2252 entry = bfd_hash_allocate (table,
2253 sizeof (struct ppc_elf_link_hash_entry));
2254 if (entry == NULL)
2255 return entry;
2256 }
252b5132 2257
25dbc73a
AM
2258 /* Call the allocation method of the superclass. */
2259 entry = _bfd_elf_link_hash_newfunc (entry, table, string);
2260 if (entry != NULL)
2261 {
2262 ppc_elf_hash_entry (entry)->linker_section_pointer = NULL;
2263 ppc_elf_hash_entry (entry)->dyn_relocs = NULL;
2264 ppc_elf_hash_entry (entry)->tls_mask = 0;
5240d94d 2265 ppc_elf_hash_entry (entry)->has_sda_refs = 0;
25dbc73a 2266 }
252b5132 2267
25dbc73a 2268 return entry;
252b5132 2269}
3dab13f6 2270
25dbc73a 2271/* Create a PPC ELF linker hash table. */
3dab13f6 2272
25dbc73a
AM
2273static struct bfd_link_hash_table *
2274ppc_elf_link_hash_table_create (bfd *abfd)
3dab13f6 2275{
25dbc73a 2276 struct ppc_elf_link_hash_table *ret;
76e7a751 2277 static struct ppc_elf_params default_params
407aa07c 2278 = { PLT_OLD, 0, 0, 1, 0, 0, 12, 0, 0, 0 };
3dab13f6 2279
25dbc73a
AM
2280 ret = bfd_zmalloc (sizeof (struct ppc_elf_link_hash_table));
2281 if (ret == NULL)
2282 return NULL;
3dab13f6 2283
66eb6687
AM
2284 if (!_bfd_elf_link_hash_table_init (&ret->elf, abfd,
2285 ppc_elf_link_hash_newfunc,
4dfe6ac6
NC
2286 sizeof (struct ppc_elf_link_hash_entry),
2287 PPC32_ELF_DATA))
3dab13f6 2288 {
25dbc73a
AM
2289 free (ret);
2290 return NULL;
2291 }
58111eb7 2292
a6aa5195
AM
2293 ret->elf.init_plt_refcount.refcount = 0;
2294 ret->elf.init_plt_refcount.glist = NULL;
2295 ret->elf.init_plt_offset.offset = 0;
2296 ret->elf.init_plt_offset.glist = NULL;
2297
db434ba0
AM
2298 ret->params = &default_params;
2299
c9a2f333
AM
2300 ret->sdata[0].name = ".sdata";
2301 ret->sdata[0].sym_name = "_SDA_BASE_";
2302 ret->sdata[0].bss_name = ".sbss";
2303
2304 ret->sdata[1].name = ".sdata2";
2305 ret->sdata[1].sym_name = "_SDA2_BASE_";
2306 ret->sdata[1].bss_name = ".sbss2";
2307
9d8504b1
PB
2308 ret->plt_entry_size = 12;
2309 ret->plt_slot_size = 8;
2310 ret->plt_initial_entry_size = 72;
9d8504b1 2311
25dbc73a
AM
2312 return &ret->elf.root;
2313}
3dab13f6 2314
5446cbdf
AM
2315/* Hook linker params into hash table. */
2316
2317void
2318ppc_elf_link_params (struct bfd_link_info *info, struct ppc_elf_params *params)
2319{
2320 struct ppc_elf_link_hash_table *htab = ppc_elf_hash_table (info);
2321
2322 if (htab)
2323 htab->params = params;
76e7a751 2324 params->pagesize_p2 = bfd_log2 (params->pagesize);
5446cbdf
AM
2325}
2326
9d8504b1 2327/* Create .got and the related sections. */
3dab13f6 2328
25dbc73a
AM
2329static bfd_boolean
2330ppc_elf_create_got (bfd *abfd, struct bfd_link_info *info)
2331{
2332 struct ppc_elf_link_hash_table *htab;
3dab13f6 2333
25dbc73a
AM
2334 if (!_bfd_elf_create_got_section (abfd, info))
2335 return FALSE;
3dab13f6 2336
25dbc73a 2337 htab = ppc_elf_hash_table (info);
ce558b89 2338 if (!htab->is_vxworks)
9d8504b1
PB
2339 {
2340 /* The powerpc .got has a blrl instruction in it. Mark it
2341 executable. */
ce558b89
AM
2342 flagword flags = (SEC_ALLOC | SEC_LOAD | SEC_CODE | SEC_HAS_CONTENTS
2343 | SEC_IN_MEMORY | SEC_LINKER_CREATED);
fd361982 2344 if (!bfd_set_section_flags (htab->elf.sgot, flags))
9d8504b1
PB
2345 return FALSE;
2346 }
3dab13f6 2347
25dbc73a
AM
2348 return TRUE;
2349}
3dab13f6 2350
93d1b056
AM
2351/* Create a special linker section, used for R_PPC_EMB_SDAI16 and
2352 R_PPC_EMB_SDA2I16 pointers. These sections become part of .sdata
2353 and .sdata2. Create _SDA_BASE_ and _SDA2_BASE too. */
2354
2355static bfd_boolean
2356ppc_elf_create_linker_section (bfd *abfd,
2357 struct bfd_link_info *info,
2358 flagword flags,
2359 elf_linker_section_t *lsect)
2360{
2361 asection *s;
2362
2363 flags |= (SEC_ALLOC | SEC_LOAD | SEC_HAS_CONTENTS | SEC_IN_MEMORY
2364 | SEC_LINKER_CREATED);
2365
2366 s = bfd_make_section_anyway_with_flags (abfd, lsect->name, flags);
2367 if (s == NULL)
2368 return FALSE;
2369 lsect->section = s;
2370
2371 /* Define the sym on the first section of this name. */
2372 s = bfd_get_section_by_name (abfd, lsect->name);
2373
2374 lsect->sym = _bfd_elf_define_linkage_sym (abfd, info, s, lsect->sym_name);
2375 if (lsect->sym == NULL)
2376 return FALSE;
2377 lsect->sym->root.u.def.value = 0x8000;
2378 return TRUE;
2379}
2380
e054468f
AM
2381static bfd_boolean
2382ppc_elf_create_glink (bfd *abfd, struct bfd_link_info *info)
2383{
2384 struct ppc_elf_link_hash_table *htab = ppc_elf_hash_table (info);
2385 asection *s;
2386 flagword flags;
691d2e9a 2387 int p2align;
e054468f
AM
2388
2389 flags = (SEC_ALLOC | SEC_LOAD | SEC_CODE | SEC_READONLY | SEC_HAS_CONTENTS
2390 | SEC_IN_MEMORY | SEC_LINKER_CREATED);
2391 s = bfd_make_section_anyway_with_flags (abfd, ".glink", flags);
2392 htab->glink = s;
691d2e9a
AM
2393 p2align = htab->params->ppc476_workaround ? 6 : 4;
2394 if (p2align < htab->params->plt_stub_align)
2395 p2align = htab->params->plt_stub_align;
e054468f 2396 if (s == NULL
fd361982 2397 || !bfd_set_section_alignment (s, p2align))
e054468f
AM
2398 return FALSE;
2399
6177242a
AM
2400 if (!info->no_ld_generated_unwind_info)
2401 {
2402 flags = (SEC_ALLOC | SEC_LOAD | SEC_READONLY | SEC_HAS_CONTENTS
2403 | SEC_IN_MEMORY | SEC_LINKER_CREATED);
2404 s = bfd_make_section_anyway_with_flags (abfd, ".eh_frame", flags);
2405 htab->glink_eh_frame = s;
2406 if (s == NULL
fd361982 2407 || !bfd_set_section_alignment (s, 2))
6177242a
AM
2408 return FALSE;
2409 }
2410
e054468f
AM
2411 flags = SEC_ALLOC | SEC_LINKER_CREATED;
2412 s = bfd_make_section_anyway_with_flags (abfd, ".iplt", flags);
ce558b89 2413 htab->elf.iplt = s;
e054468f 2414 if (s == NULL
fd361982 2415 || !bfd_set_section_alignment (s, 4))
e054468f
AM
2416 return FALSE;
2417
2418 flags = (SEC_ALLOC | SEC_LOAD | SEC_READONLY | SEC_HAS_CONTENTS
2419 | SEC_IN_MEMORY | SEC_LINKER_CREATED);
14b2f831 2420 s = bfd_make_section_anyway_with_flags (abfd, ".rela.iplt", flags);
ce558b89 2421 htab->elf.irelplt = s;
e054468f 2422 if (s == NULL
fd361982 2423 || ! bfd_set_section_alignment (s, 2))
e054468f 2424 return FALSE;
93d1b056 2425
2d7ad24e
AM
2426 /* Local plt entries. */
2427 flags = (SEC_ALLOC | SEC_LOAD
2428 | SEC_HAS_CONTENTS | SEC_IN_MEMORY | SEC_LINKER_CREATED);
2429 htab->pltlocal = bfd_make_section_anyway_with_flags (abfd, ".branch_lt",
2430 flags);
2431 if (htab->pltlocal == NULL
fd361982 2432 || !bfd_set_section_alignment (htab->pltlocal, 2))
2d7ad24e
AM
2433 return FALSE;
2434
2435 if (bfd_link_pic (info))
2436 {
2437 flags = (SEC_ALLOC | SEC_LOAD | SEC_READONLY
2438 | SEC_HAS_CONTENTS | SEC_IN_MEMORY | SEC_LINKER_CREATED);
2439 htab->relpltlocal
2440 = bfd_make_section_anyway_with_flags (abfd, ".rela.branch_lt", flags);
2441 if (htab->relpltlocal == NULL
fd361982 2442 || !bfd_set_section_alignment (htab->relpltlocal, 2))
2d7ad24e
AM
2443 return FALSE;
2444 }
2445
93d1b056
AM
2446 if (!ppc_elf_create_linker_section (abfd, info, 0,
2447 &htab->sdata[0]))
2448 return FALSE;
2449
2450 if (!ppc_elf_create_linker_section (abfd, info, SEC_READONLY,
2451 &htab->sdata[1]))
2452 return FALSE;
2453
e054468f
AM
2454 return TRUE;
2455}
2456
25dbc73a
AM
2457/* We have to create .dynsbss and .rela.sbss here so that they get mapped
2458 to output sections (just like _bfd_elf_create_dynamic_sections has
2459 to create .dynbss and .rela.bss). */
3dab13f6 2460
25dbc73a
AM
2461static bfd_boolean
2462ppc_elf_create_dynamic_sections (bfd *abfd, struct bfd_link_info *info)
2463{
2464 struct ppc_elf_link_hash_table *htab;
2465 asection *s;
2466 flagword flags;
3dab13f6 2467
25dbc73a 2468 htab = ppc_elf_hash_table (info);
3dab13f6 2469
ce558b89 2470 if (htab->elf.sgot == NULL
25dbc73a 2471 && !ppc_elf_create_got (abfd, info))
3dab13f6
AM
2472 return FALSE;
2473
25dbc73a
AM
2474 if (!_bfd_elf_create_dynamic_sections (abfd, info))
2475 return FALSE;
3dab13f6 2476
e054468f
AM
2477 if (htab->glink == NULL
2478 && !ppc_elf_create_glink (abfd, info))
d7128ce4 2479 return FALSE;
3dab13f6 2480
14b2f831
AM
2481 s = bfd_make_section_anyway_with_flags (abfd, ".dynsbss",
2482 SEC_ALLOC | SEC_LINKER_CREATED);
3b36f7e6 2483 htab->dynsbss = s;
3496cb2a 2484 if (s == NULL)
25dbc73a 2485 return FALSE;
3dab13f6 2486
0e1862bb 2487 if (! bfd_link_pic (info))
25dbc73a 2488 {
e054468f
AM
2489 flags = (SEC_ALLOC | SEC_LOAD | SEC_READONLY | SEC_HAS_CONTENTS
2490 | SEC_IN_MEMORY | SEC_LINKER_CREATED);
14b2f831 2491 s = bfd_make_section_anyway_with_flags (abfd, ".rela.sbss", flags);
3b36f7e6 2492 htab->relsbss = s;
25dbc73a 2493 if (s == NULL
fd361982 2494 || !bfd_set_section_alignment (s, 2))
25dbc73a
AM
2495 return FALSE;
2496 }
3dab13f6 2497
711de32c
RS
2498 if (htab->is_vxworks
2499 && !elf_vxworks_create_dynamic_sections (abfd, info, &htab->srelplt2))
2500 return FALSE;
9d8504b1 2501
ce558b89 2502 s = htab->elf.splt;
3b36f7e6 2503 flags = SEC_ALLOC | SEC_CODE | SEC_LINKER_CREATED;
4a3dc543
RS
2504 if (htab->plt_type == PLT_VXWORKS)
2505 /* The VxWorks PLT is a loaded section with contents. */
2506 flags |= SEC_HAS_CONTENTS | SEC_LOAD | SEC_READONLY;
fd361982 2507 return bfd_set_section_flags (s, flags);
25dbc73a 2508}
3dab13f6 2509
25dbc73a 2510/* Copy the extra info we tack onto an elf_link_hash_entry. */
58111eb7 2511
25dbc73a 2512static void
fcfa13d2 2513ppc_elf_copy_indirect_symbol (struct bfd_link_info *info,
25dbc73a
AM
2514 struct elf_link_hash_entry *dir,
2515 struct elf_link_hash_entry *ind)
2516{
2517 struct ppc_elf_link_hash_entry *edir, *eind;
3dab13f6 2518
25dbc73a
AM
2519 edir = (struct ppc_elf_link_hash_entry *) dir;
2520 eind = (struct ppc_elf_link_hash_entry *) ind;
3dab13f6 2521
c79d6685
AM
2522 edir->tls_mask |= eind->tls_mask;
2523 edir->has_sda_refs |= eind->has_sda_refs;
2524
e81830c5
AM
2525 if (edir->elf.versioned != versioned_hidden)
2526 edir->elf.ref_dynamic |= eind->elf.ref_dynamic;
c79d6685
AM
2527 edir->elf.ref_regular |= eind->elf.ref_regular;
2528 edir->elf.ref_regular_nonweak |= eind->elf.ref_regular_nonweak;
4a7e5234 2529 edir->elf.non_got_ref |= eind->elf.non_got_ref;
c79d6685
AM
2530 edir->elf.needs_plt |= eind->elf.needs_plt;
2531 edir->elf.pointer_equality_needed |= eind->elf.pointer_equality_needed;
2532
287c7eaf
AM
2533 /* If we were called to copy over info for a weak sym, that's all. */
2534 if (eind->elf.root.type != bfd_link_hash_indirect)
2535 return;
2536
25dbc73a
AM
2537 if (eind->dyn_relocs != NULL)
2538 {
2539 if (edir->dyn_relocs != NULL)
3dab13f6 2540 {
6061a67d
AM
2541 struct elf_dyn_relocs **pp;
2542 struct elf_dyn_relocs *p;
3dab13f6 2543
fcfa13d2 2544 /* Add reloc counts against the indirect sym to the direct sym
25dbc73a
AM
2545 list. Merge any entries against the same section. */
2546 for (pp = &eind->dyn_relocs; (p = *pp) != NULL; )
3dab13f6 2547 {
6061a67d 2548 struct elf_dyn_relocs *q;
25dbc73a
AM
2549
2550 for (q = edir->dyn_relocs; q != NULL; q = q->next)
2551 if (q->sec == p->sec)
2552 {
2553 q->pc_count += p->pc_count;
2554 q->count += p->count;
2555 *pp = p->next;
2556 break;
2557 }
2558 if (q == NULL)
2559 pp = &p->next;
3dab13f6 2560 }
25dbc73a 2561 *pp = edir->dyn_relocs;
3dab13f6 2562 }
25dbc73a
AM
2563
2564 edir->dyn_relocs = eind->dyn_relocs;
2565 eind->dyn_relocs = NULL;
3dab13f6 2566 }
3dab13f6 2567
a6aa5195
AM
2568 /* Copy over the GOT refcount entries that we may have already seen to
2569 the symbol which just became indirect. */
fcfa13d2
AM
2570 edir->elf.got.refcount += eind->elf.got.refcount;
2571 eind->elf.got.refcount = 0;
a6aa5195
AM
2572
2573 /* And plt entries. */
2574 if (eind->elf.plt.plist != NULL)
2575 {
2576 if (edir->elf.plt.plist != NULL)
2577 {
2578 struct plt_entry **entp;
2579 struct plt_entry *ent;
2580
2581 for (entp = &eind->elf.plt.plist; (ent = *entp) != NULL; )
2582 {
2583 struct plt_entry *dent;
2584
2585 for (dent = edir->elf.plt.plist; dent != NULL; dent = dent->next)
2586 if (dent->sec == ent->sec && dent->addend == ent->addend)
2587 {
2588 dent->plt.refcount += ent->plt.refcount;
2589 *entp = ent->next;
2590 break;
2591 }
2592 if (dent == NULL)
2593 entp = &ent->next;
2594 }
2595 *entp = edir->elf.plt.plist;
2596 }
2597
2598 edir->elf.plt.plist = eind->elf.plt.plist;
2599 eind->elf.plt.plist = NULL;
2600 }
2601
fcfa13d2 2602 if (eind->elf.dynindx != -1)
25dbc73a 2603 {
fcfa13d2
AM
2604 if (edir->elf.dynindx != -1)
2605 _bfd_elf_strtab_delref (elf_hash_table (info)->dynstr,
2606 edir->elf.dynstr_index);
a6aa5195
AM
2607 edir->elf.dynindx = eind->elf.dynindx;
2608 edir->elf.dynstr_index = eind->elf.dynstr_index;
2609 eind->elf.dynindx = -1;
2610 eind->elf.dynstr_index = 0;
25dbc73a 2611 }
25dbc73a 2612}
3dab13f6 2613
25dbc73a
AM
2614/* Hook called by the linker routine which adds symbols from an object
2615 file. We use it to put .comm items in .sbss, and not .bss. */
58111eb7 2616
25dbc73a
AM
2617static bfd_boolean
2618ppc_elf_add_symbol_hook (bfd *abfd,
2619 struct bfd_link_info *info,
2620 Elf_Internal_Sym *sym,
2621 const char **namep ATTRIBUTE_UNUSED,
2622 flagword *flagsp ATTRIBUTE_UNUSED,
2623 asection **secp,
2624 bfd_vma *valp)
2625{
2626 if (sym->st_shndx == SHN_COMMON
0e1862bb 2627 && !bfd_link_relocatable (info)
0c8d6e5c
AM
2628 && is_ppc_elf (info->output_bfd)
2629 && sym->st_size <= elf_gp_size (abfd))
25dbc73a
AM
2630 {
2631 /* Common symbols less than or equal to -G nn bytes are automatically
2632 put into .sbss. */
2633 struct ppc_elf_link_hash_table *htab;
3dab13f6 2634
25dbc73a
AM
2635 htab = ppc_elf_hash_table (info);
2636 if (htab->sbss == NULL)
2637 {
644285ef 2638 flagword flags = SEC_IS_COMMON | SEC_LINKER_CREATED;
3dab13f6 2639
644285ef
AM
2640 if (!htab->elf.dynobj)
2641 htab->elf.dynobj = abfd;
2642
3496cb2a
L
2643 htab->sbss = bfd_make_section_anyway_with_flags (htab->elf.dynobj,
2644 ".sbss",
2645 flags);
2646 if (htab->sbss == NULL)
25dbc73a 2647 return FALSE;
3dab13f6 2648 }
3dab13f6 2649
25dbc73a
AM
2650 *secp = htab->sbss;
2651 *valp = sym->st_size;
2652 }
3dab13f6 2653
25dbc73a 2654 return TRUE;
3dab13f6
AM
2655}
2656\f
25dbc73a
AM
2657/* Find a linker generated pointer with a given addend and type. */
2658
2659static elf_linker_section_pointers_t *
2660elf_find_pointer_linker_section
2661 (elf_linker_section_pointers_t *linker_pointers,
2662 bfd_vma addend,
2663 elf_linker_section_t *lsect)
252b5132 2664{
25dbc73a
AM
2665 for ( ; linker_pointers != NULL; linker_pointers = linker_pointers->next)
2666 if (lsect == linker_pointers->lsect && addend == linker_pointers->addend)
2667 return linker_pointers;
252b5132 2668
25dbc73a
AM
2669 return NULL;
2670}
2671
2672/* Allocate a pointer to live in a linker created section. */
2673
2674static bfd_boolean
93d1b056
AM
2675elf_allocate_pointer_linker_section (bfd *abfd,
2676 elf_linker_section_t *lsect,
2677 struct elf_link_hash_entry *h,
2678 const Elf_Internal_Rela *rel)
25dbc73a
AM
2679{
2680 elf_linker_section_pointers_t **ptr_linker_section_ptr = NULL;
2681 elf_linker_section_pointers_t *linker_section_ptr;
2682 unsigned long r_symndx = ELF32_R_SYM (rel->r_info);
2683 bfd_size_type amt;
2684
2685 BFD_ASSERT (lsect != NULL);
2686
2687 /* Is this a global symbol? */
2688 if (h != NULL)
2689 {
2690 struct ppc_elf_link_hash_entry *eh;
2691
2692 /* Has this symbol already been allocated? If so, our work is done. */
2693 eh = (struct ppc_elf_link_hash_entry *) h;
2694 if (elf_find_pointer_linker_section (eh->linker_section_pointer,
2695 rel->r_addend,
2696 lsect))
2697 return TRUE;
2698
2699 ptr_linker_section_ptr = &eh->linker_section_pointer;
25dbc73a
AM
2700 }
2701 else
2702 {
0c8d6e5c 2703 BFD_ASSERT (is_ppc_elf (abfd));
0ffa91dd 2704
25dbc73a
AM
2705 /* Allocation of a pointer to a local symbol. */
2706 elf_linker_section_pointers_t **ptr = elf_local_ptr_offsets (abfd);
2707
2708 /* Allocate a table to hold the local symbols if first time. */
2709 if (!ptr)
2710 {
0ffa91dd 2711 unsigned int num_symbols = elf_symtab_hdr (abfd).sh_info;
25dbc73a
AM
2712
2713 amt = num_symbols;
2714 amt *= sizeof (elf_linker_section_pointers_t *);
2715 ptr = bfd_zalloc (abfd, amt);
2716
2717 if (!ptr)
2718 return FALSE;
2719
2720 elf_local_ptr_offsets (abfd) = ptr;
2721 }
2722
2723 /* Has this symbol already been allocated? If so, our work is done. */
2724 if (elf_find_pointer_linker_section (ptr[r_symndx],
2725 rel->r_addend,
2726 lsect))
2727 return TRUE;
252b5132 2728
25dbc73a 2729 ptr_linker_section_ptr = &ptr[r_symndx];
25dbc73a 2730 }
41fcb14e 2731
25dbc73a
AM
2732 /* Allocate space for a pointer in the linker section, and allocate
2733 a new pointer record from internal memory. */
2734 BFD_ASSERT (ptr_linker_section_ptr != NULL);
2735 amt = sizeof (elf_linker_section_pointers_t);
2736 linker_section_ptr = bfd_alloc (abfd, amt);
41fcb14e 2737
25dbc73a 2738 if (!linker_section_ptr)
7619e7c7 2739 return FALSE;
41fcb14e 2740
25dbc73a
AM
2741 linker_section_ptr->next = *ptr_linker_section_ptr;
2742 linker_section_ptr->addend = rel->r_addend;
2743 linker_section_ptr->lsect = lsect;
25dbc73a 2744 *ptr_linker_section_ptr = linker_section_ptr;
41fcb14e 2745
fd361982 2746 if (!bfd_set_section_alignment (lsect->section, 2))
93d1b056 2747 return FALSE;
25dbc73a
AM
2748 linker_section_ptr->offset = lsect->section->size;
2749 lsect->section->size += 4;
7619e7c7 2750
25dbc73a
AM
2751#ifdef DEBUG
2752 fprintf (stderr,
2753 "Create pointer in linker section %s, offset = %ld, section size = %ld\n",
2754 lsect->name, (long) linker_section_ptr->offset,
2755 (long) lsect->section->size);
2756#endif
7619e7c7
AM
2757
2758 return TRUE;
41fcb14e
AM
2759}
2760
e054468f 2761static struct plt_entry **
25dbc73a
AM
2762update_local_sym_info (bfd *abfd,
2763 Elf_Internal_Shdr *symtab_hdr,
2764 unsigned long r_symndx,
2765 int tls_type)
252b5132 2766{
25dbc73a 2767 bfd_signed_vma *local_got_refcounts = elf_local_got_refcounts (abfd);
e054468f 2768 struct plt_entry **local_plt;
bac3c8c5 2769 unsigned char *local_got_tls_masks;
252b5132 2770
25dbc73a 2771 if (local_got_refcounts == NULL)
252b5132 2772 {
25dbc73a
AM
2773 bfd_size_type size = symtab_hdr->sh_info;
2774
e054468f
AM
2775 size *= (sizeof (*local_got_refcounts)
2776 + sizeof (*local_plt)
2777 + sizeof (*local_got_tls_masks));
25dbc73a
AM
2778 local_got_refcounts = bfd_zalloc (abfd, size);
2779 if (local_got_refcounts == NULL)
e054468f 2780 return NULL;
25dbc73a 2781 elf_local_got_refcounts (abfd) = local_got_refcounts;
252b5132 2782 }
41fcb14e 2783
e054468f 2784 local_plt = (struct plt_entry **) (local_got_refcounts + symtab_hdr->sh_info);
bac3c8c5 2785 local_got_tls_masks = (unsigned char *) (local_plt + symtab_hdr->sh_info);
37da22e5
AM
2786 local_got_tls_masks[r_symndx] |= tls_type & 0xff;
2787 if ((tls_type & NON_GOT) == 0)
e054468f
AM
2788 local_got_refcounts[r_symndx] += 1;
2789 return local_plt + r_symndx;
25dbc73a 2790}
41fcb14e 2791
a6aa5195 2792static bfd_boolean
3ec01793 2793update_plt_info (bfd *abfd, struct plt_entry **plist,
a6aa5195
AM
2794 asection *sec, bfd_vma addend)
2795{
2796 struct plt_entry *ent;
2797
32af9f6e
AM
2798 if (addend < 32768)
2799 sec = NULL;
3ec01793 2800 for (ent = *plist; ent != NULL; ent = ent->next)
a6aa5195
AM
2801 if (ent->sec == sec && ent->addend == addend)
2802 break;
2803 if (ent == NULL)
2804 {
2805 bfd_size_type amt = sizeof (*ent);
2806 ent = bfd_alloc (abfd, amt);
2807 if (ent == NULL)
2808 return FALSE;
3ec01793 2809 ent->next = *plist;
a6aa5195
AM
2810 ent->sec = sec;
2811 ent->addend = addend;
2812 ent->plt.refcount = 0;
3ec01793 2813 *plist = ent;
a6aa5195
AM
2814 }
2815 ent->plt.refcount += 1;
2816 return TRUE;
2817}
2818
2819static struct plt_entry *
3ec01793 2820find_plt_ent (struct plt_entry **plist, asection *sec, bfd_vma addend)
a6aa5195
AM
2821{
2822 struct plt_entry *ent;
2823
2824 if (addend < 32768)
2825 sec = NULL;
3ec01793 2826 for (ent = *plist; ent != NULL; ent = ent->next)
a6aa5195
AM
2827 if (ent->sec == sec && ent->addend == addend)
2828 break;
2829 return ent;
2830}
2831
e054468f
AM
2832static bfd_boolean
2833is_branch_reloc (enum elf_ppc_reloc_type r_type)
2834{
2835 return (r_type == R_PPC_PLTREL24
2836 || r_type == R_PPC_LOCAL24PC
2837 || r_type == R_PPC_REL24
2838 || r_type == R_PPC_REL14
2839 || r_type == R_PPC_REL14_BRTAKEN
2840 || r_type == R_PPC_REL14_BRNTAKEN
2841 || r_type == R_PPC_ADDR24
2842 || r_type == R_PPC_ADDR14
2843 || r_type == R_PPC_ADDR14_BRTAKEN
dfdaec14
AJ
2844 || r_type == R_PPC_ADDR14_BRNTAKEN
2845 || r_type == R_PPC_VLE_REL24);
e054468f
AM
2846}
2847
23cedd1d
AM
2848/* Relocs on inline plt call sequence insns prior to the call. */
2849
2850static bfd_boolean
2851is_plt_seq_reloc (enum elf_ppc_reloc_type r_type)
2852{
2853 return (r_type == R_PPC_PLT16_HA
2854 || r_type == R_PPC_PLT16_HI
2855 || r_type == R_PPC_PLT16_LO
2856 || r_type == R_PPC_PLTSEQ);
2857}
2858
25dbc73a
AM
2859static void
2860bad_shared_reloc (bfd *abfd, enum elf_ppc_reloc_type r_type)
2861{
4eca0228 2862 _bfd_error_handler
695344c0 2863 /* xgettext:c-format */
871b3ab2 2864 (_("%pB: relocation %s cannot be used when making a shared object"),
25dbc73a
AM
2865 abfd,
2866 ppc_elf_howto_table[r_type]->name);
2867 bfd_set_error (bfd_error_bad_value);
252b5132
RH
2868}
2869
25dbc73a
AM
2870/* Look through the relocs for a section during the first phase, and
2871 allocate space in the global offset table or procedure linkage
2872 table. */
252b5132 2873
b34976b6 2874static bfd_boolean
25dbc73a
AM
2875ppc_elf_check_relocs (bfd *abfd,
2876 struct bfd_link_info *info,
2877 asection *sec,
2878 const Elf_Internal_Rela *relocs)
252b5132 2879{
7619e7c7 2880 struct ppc_elf_link_hash_table *htab;
25dbc73a
AM
2881 Elf_Internal_Shdr *symtab_hdr;
2882 struct elf_link_hash_entry **sym_hashes;
2883 const Elf_Internal_Rela *rel;
2884 const Elf_Internal_Rela *rel_end;
a6aa5195 2885 asection *got2, *sreloc;
727fc41e 2886 struct elf_link_hash_entry *tga;
25dbc73a 2887
0e1862bb 2888 if (bfd_link_relocatable (info))
25dbc73a 2889 return TRUE;
252b5132 2890
c87b5a93
AM
2891 /* Don't do anything special with non-loaded, non-alloced sections.
2892 In particular, any relocs in such sections should not affect GOT
2893 and PLT reference counting (ie. we don't allow them to create GOT
2894 or PLT entries), there's no possibility or desire to optimize TLS
2895 relocs, and there's not much point in propagating relocs to shared
2896 libs that the dynamic linker won't relocate. */
2897 if ((sec->flags & SEC_ALLOC) == 0)
2898 return TRUE;
2899
252b5132 2900#ifdef DEBUG
871b3ab2 2901 _bfd_error_handler ("ppc_elf_check_relocs called for section %pA in %pB",
25dbc73a 2902 sec, abfd);
252b5132
RH
2903#endif
2904
0c8d6e5c 2905 BFD_ASSERT (is_ppc_elf (abfd));
0ffa91dd 2906
25dbc73a
AM
2907 /* Initialize howto table if not already done. */
2908 if (!ppc_elf_howto_table[R_PPC_ADDR32])
2909 ppc_elf_howto_init ();
2910
7619e7c7 2911 htab = ppc_elf_hash_table (info);
25f23106
AM
2912 if (htab->glink == NULL)
2913 {
2914 if (htab->elf.dynobj == NULL)
2915 htab->elf.dynobj = abfd;
2916 if (!ppc_elf_create_glink (htab->elf.dynobj, info))
2917 return FALSE;
2918 }
727fc41e
AM
2919 tga = elf_link_hash_lookup (&htab->elf, "__tls_get_addr",
2920 FALSE, FALSE, TRUE);
0ffa91dd 2921 symtab_hdr = &elf_symtab_hdr (abfd);
25dbc73a 2922 sym_hashes = elf_sym_hashes (abfd);
a6aa5195 2923 got2 = bfd_get_section_by_name (abfd, ".got2");
25dbc73a
AM
2924 sreloc = NULL;
2925
2926 rel_end = relocs + sec->reloc_count;
2927 for (rel = relocs; rel < rel_end; rel++)
2928 {
2929 unsigned long r_symndx;
2930 enum elf_ppc_reloc_type r_type;
2931 struct elf_link_hash_entry *h;
727fc41e 2932 int tls_type;
cbf95972 2933 struct plt_entry **ifunc;
2d7ad24e
AM
2934 struct plt_entry **pltent;
2935 bfd_vma addend;
25dbc73a
AM
2936
2937 r_symndx = ELF32_R_SYM (rel->r_info);
2938 if (r_symndx < symtab_hdr->sh_info)
2939 h = NULL;
2940 else
973a3492
L
2941 {
2942 h = sym_hashes[r_symndx - symtab_hdr->sh_info];
2943 while (h->root.type == bfd_link_hash_indirect
2944 || h->root.type == bfd_link_hash_warning)
2945 h = (struct elf_link_hash_entry *) h->root.u.i.link;
2946 }
25dbc73a
AM
2947
2948 /* If a relocation refers to _GLOBAL_OFFSET_TABLE_, create the .got.
2949 This shows up in particular in an R_PPC_ADDR32 in the eabi
2950 startup code. */
3b36f7e6 2951 if (h != NULL
ce558b89 2952 && htab->elf.sgot == NULL
3b36f7e6 2953 && strcmp (h->root.root.string, "_GLOBAL_OFFSET_TABLE_") == 0)
252b5132 2954 {
3b36f7e6
AM
2955 if (htab->elf.dynobj == NULL)
2956 htab->elf.dynobj = abfd;
2957 if (!ppc_elf_create_got (htab->elf.dynobj, info))
2958 return FALSE;
2959 BFD_ASSERT (h == htab->elf.hgot);
25dbc73a 2960 }
252b5132 2961
727fc41e 2962 tls_type = 0;
de972ffa 2963 r_type = ELF32_R_TYPE (rel->r_info);
cbf95972 2964 ifunc = NULL;
06a162cf 2965 if (h == NULL && !htab->is_vxworks)
e054468f 2966 {
06a162cf
AM
2967 Elf_Internal_Sym *isym = bfd_sym_from_r_symndx (&htab->sym_cache,
2968 abfd, r_symndx);
2969 if (isym == NULL)
2970 return FALSE;
2971
0bed072f 2972 if (ELF_ST_TYPE (isym->st_info) == STT_GNU_IFUNC)
e054468f 2973 {
0bed072f 2974 /* Set PLT_IFUNC flag for this sym, no GOT entry yet. */
06a162cf 2975 ifunc = update_local_sym_info (abfd, symtab_hdr, r_symndx,
37da22e5 2976 NON_GOT | PLT_IFUNC);
06a162cf 2977 if (ifunc == NULL)
e054468f
AM
2978 return FALSE;
2979
06a162cf
AM
2980 /* STT_GNU_IFUNC symbols must have a PLT entry;
2981 In a non-pie executable even when there are
2982 no plt calls. */
0e1862bb 2983 if (!bfd_link_pic (info)
08be3224
AM
2984 || is_branch_reloc (r_type)
2985 || r_type == R_PPC_PLT16_LO
2986 || r_type == R_PPC_PLT16_HI
2987 || r_type == R_PPC_PLT16_HA)
e054468f 2988 {
2d7ad24e 2989 addend = 0;
0bed072f 2990 if (r_type == R_PPC_PLTREL24)
08be3224
AM
2991 ppc_elf_tdata (abfd)->makes_plt_call = 1;
2992 if (bfd_link_pic (info)
2993 && (r_type == R_PPC_PLTREL24
2994 || r_type == R_PPC_PLT16_LO
2995 || r_type == R_PPC_PLT16_HI
2996 || r_type == R_PPC_PLT16_HA))
2997 addend = rel->r_addend;
0bed072f
AM
2998 if (!update_plt_info (abfd, ifunc, got2, addend))
2999 return FALSE;
e054468f
AM
3000 }
3001 }
25f23106
AM
3002 }
3003
de972ffa
AM
3004 if (!htab->is_vxworks
3005 && is_branch_reloc (r_type)
3006 && h != NULL
3007 && h == tga)
25f23106 3008 {
de972ffa
AM
3009 if (rel != relocs
3010 && (ELF32_R_TYPE (rel[-1].r_info) == R_PPC_TLSGD
3011 || ELF32_R_TYPE (rel[-1].r_info) == R_PPC_TLSLD))
3012 /* We have a new-style __tls_get_addr call with a marker
3013 reloc. */
3014 ;
3015 else
3016 /* Mark this section as having an old-style call. */
9737e8af 3017 sec->nomark_tls_get_addr = 1;
e054468f 3018 }
727fc41e 3019
25dbc73a
AM
3020 switch (r_type)
3021 {
727fc41e
AM
3022 case R_PPC_TLSGD:
3023 case R_PPC_TLSLD:
3024 /* These special tls relocs tie a call to __tls_get_addr with
3025 its parameter symbol. */
37da22e5
AM
3026 if (h != NULL)
3027 ppc_elf_hash_entry (h)->tls_mask |= TLS_TLS | TLS_MARK;
3028 else
3029 if (!update_local_sym_info (abfd, symtab_hdr, r_symndx,
3030 NON_GOT | TLS_TLS | TLS_MARK))
3031 return FALSE;
727fc41e
AM
3032 break;
3033
23cedd1d
AM
3034 case R_PPC_PLTSEQ:
3035 break;
3036
25dbc73a
AM
3037 case R_PPC_GOT_TLSLD16:
3038 case R_PPC_GOT_TLSLD16_LO:
3039 case R_PPC_GOT_TLSLD16_HI:
3040 case R_PPC_GOT_TLSLD16_HA:
25dbc73a
AM
3041 tls_type = TLS_TLS | TLS_LD;
3042 goto dogottls;
252b5132 3043
25dbc73a
AM
3044 case R_PPC_GOT_TLSGD16:
3045 case R_PPC_GOT_TLSGD16_LO:
3046 case R_PPC_GOT_TLSGD16_HI:
3047 case R_PPC_GOT_TLSGD16_HA:
3048 tls_type = TLS_TLS | TLS_GD;
3049 goto dogottls;
3050
3051 case R_PPC_GOT_TPREL16:
3052 case R_PPC_GOT_TPREL16_LO:
3053 case R_PPC_GOT_TPREL16_HI:
3054 case R_PPC_GOT_TPREL16_HA:
7c8bbca5 3055 if (bfd_link_dll (info))
25dbc73a
AM
3056 info->flags |= DF_STATIC_TLS;
3057 tls_type = TLS_TLS | TLS_TPREL;
3058 goto dogottls;
3059
3060 case R_PPC_GOT_DTPREL16:
3061 case R_PPC_GOT_DTPREL16_LO:
3062 case R_PPC_GOT_DTPREL16_HI:
3063 case R_PPC_GOT_DTPREL16_HA:
3064 tls_type = TLS_TLS | TLS_DTPREL;
3065 dogottls:
3066 sec->has_tls_reloc = 1;
1a0670f3 3067 /* Fall through. */
252b5132 3068
25dbc73a
AM
3069 /* GOT16 relocations */
3070 case R_PPC_GOT16:
3071 case R_PPC_GOT16_LO:
3072 case R_PPC_GOT16_HI:
3073 case R_PPC_GOT16_HA:
3074 /* This symbol requires a global offset table entry. */
ce558b89 3075 if (htab->elf.sgot == NULL)
25dbc73a
AM
3076 {
3077 if (htab->elf.dynobj == NULL)
3078 htab->elf.dynobj = abfd;
3079 if (!ppc_elf_create_got (htab->elf.dynobj, info))
3080 return FALSE;
3081 }
3082 if (h != NULL)
3083 {
3084 h->got.refcount += 1;
3085 ppc_elf_hash_entry (h)->tls_mask |= tls_type;
3086 }
3087 else
3088 /* This is a global offset table entry for a local symbol. */
3089 if (!update_local_sym_info (abfd, symtab_hdr, r_symndx, tls_type))
3090 return FALSE;
91e21fb7
AM
3091
3092 /* We may also need a plt entry if the symbol turns out to be
3093 an ifunc. */
0e1862bb 3094 if (h != NULL && !bfd_link_pic (info))
91e21fb7
AM
3095 {
3096 if (!update_plt_info (abfd, &h->plt.plist, NULL, 0))
3097 return FALSE;
3098 }
25dbc73a 3099 break;
252b5132 3100
25dbc73a
AM
3101 /* Indirect .sdata relocation. */
3102 case R_PPC_EMB_SDAI16:
93d1b056
AM
3103 htab->sdata[0].sym->ref_regular = 1;
3104 if (!elf_allocate_pointer_linker_section (abfd, &htab->sdata[0],
3105 h, rel))
25dbc73a 3106 return FALSE;
046183de
AM
3107 if (h != NULL)
3108 {
3109 ppc_elf_hash_entry (h)->has_sda_refs = TRUE;
3110 h->non_got_ref = TRUE;
3111 }
25dbc73a 3112 break;
252b5132 3113
25dbc73a
AM
3114 /* Indirect .sdata2 relocation. */
3115 case R_PPC_EMB_SDA2I16:
c0d9f31d 3116 if (!bfd_link_executable (info))
25dbc73a
AM
3117 {
3118 bad_shared_reloc (abfd, r_type);
3119 return FALSE;
3120 }
93d1b056
AM
3121 htab->sdata[1].sym->ref_regular = 1;
3122 if (!elf_allocate_pointer_linker_section (abfd, &htab->sdata[1],
3123 h, rel))
25dbc73a 3124 return FALSE;
046183de
AM
3125 if (h != NULL)
3126 {
3127 ppc_elf_hash_entry (h)->has_sda_refs = TRUE;
3128 h->non_got_ref = TRUE;
3129 }
25dbc73a 3130 break;
252b5132 3131
93d1b056
AM
3132 case R_PPC_SDAREL16:
3133 htab->sdata[0].sym->ref_regular = 1;
1a0670f3 3134 /* Fall through. */
93d1b056 3135
b9c361e0
JL
3136 case R_PPC_VLE_SDAREL_LO16A:
3137 case R_PPC_VLE_SDAREL_LO16D:
3138 case R_PPC_VLE_SDAREL_HI16A:
3139 case R_PPC_VLE_SDAREL_HI16D:
3140 case R_PPC_VLE_SDAREL_HA16A:
3141 case R_PPC_VLE_SDAREL_HA16D:
046183de
AM
3142 if (h != NULL)
3143 {
3144 ppc_elf_hash_entry (h)->has_sda_refs = TRUE;
3145 h->non_got_ref = TRUE;
3146 }
3147 break;
3148
b9c361e0
JL
3149 case R_PPC_VLE_REL8:
3150 case R_PPC_VLE_REL15:
3151 case R_PPC_VLE_REL24:
3152 case R_PPC_VLE_LO16A:
3153 case R_PPC_VLE_LO16D:
3154 case R_PPC_VLE_HI16A:
3155 case R_PPC_VLE_HI16D:
3156 case R_PPC_VLE_HA16A:
3157 case R_PPC_VLE_HA16D:
83eef883 3158 case R_PPC_VLE_ADDR20:
b9c361e0
JL
3159 break;
3160
25dbc73a 3161 case R_PPC_EMB_SDA2REL:
c0d9f31d 3162 if (!bfd_link_executable (info))
046183de
AM
3163 {
3164 bad_shared_reloc (abfd, r_type);
3165 return FALSE;
3166 }
93d1b056 3167 htab->sdata[1].sym->ref_regular = 1;
046183de
AM
3168 if (h != NULL)
3169 {
3170 ppc_elf_hash_entry (h)->has_sda_refs = TRUE;
3171 h->non_got_ref = TRUE;
3172 }
3173 break;
3174
b9c361e0
JL
3175 case R_PPC_VLE_SDA21_LO:
3176 case R_PPC_VLE_SDA21:
25dbc73a
AM
3177 case R_PPC_EMB_SDA21:
3178 case R_PPC_EMB_RELSDA:
046183de
AM
3179 if (h != NULL)
3180 {
3181 ppc_elf_hash_entry (h)->has_sda_refs = TRUE;
3182 h->non_got_ref = TRUE;
3183 }
3184 break;
3185
25dbc73a
AM
3186 case R_PPC_EMB_NADDR32:
3187 case R_PPC_EMB_NADDR16:
3188 case R_PPC_EMB_NADDR16_LO:
3189 case R_PPC_EMB_NADDR16_HI:
3190 case R_PPC_EMB_NADDR16_HA:
4dc4a9a5 3191 if (h != NULL)
046183de 3192 h->non_got_ref = TRUE;
25dbc73a 3193 break;
252b5132 3194
25dbc73a 3195 case R_PPC_PLTREL24:
de972ffa 3196 if (h == NULL)
6d78d0b9 3197 break;
08be3224 3198 ppc_elf_tdata (abfd)->makes_plt_call = 1;
3e04d765 3199 goto pltentry;
08be3224 3200
23cedd1d 3201 case R_PPC_PLTCALL:
3e04d765
AM
3202 sec->has_pltcall = 1;
3203 /* Fall through. */
3204
6d78d0b9 3205 case R_PPC_PLT32:
25dbc73a
AM
3206 case R_PPC_PLTREL32:
3207 case R_PPC_PLT16_LO:
3208 case R_PPC_PLT16_HI:
3209 case R_PPC_PLT16_HA:
3e04d765 3210 pltentry:
25dbc73a
AM
3211#ifdef DEBUG
3212 fprintf (stderr, "Reloc requires a PLT entry\n");
3213#endif
cbf95972 3214 /* This symbol requires a procedure linkage table entry. */
25dbc73a
AM
3215 if (h == NULL)
3216 {
2d7ad24e
AM
3217 pltent = update_local_sym_info (abfd, symtab_hdr, r_symndx,
3218 NON_GOT | PLT_KEEP);
3219 if (pltent == NULL)
3220 return FALSE;
25dbc73a 3221 }
a6aa5195
AM
3222 else
3223 {
2d7ad24e
AM
3224 if (r_type != R_PPC_PLTREL24)
3225 ppc_elf_hash_entry (h)->tls_mask |= PLT_KEEP;
a6aa5195 3226 h->needs_plt = 1;
2d7ad24e 3227 pltent = &h->plt.plist;
a6aa5195 3228 }
2d7ad24e
AM
3229 addend = 0;
3230 if (bfd_link_pic (info)
3231 && (r_type == R_PPC_PLTREL24
3232 || r_type == R_PPC_PLT16_LO
3233 || r_type == R_PPC_PLT16_HI
3234 || r_type == R_PPC_PLT16_HA))
3235 addend = rel->r_addend;
3236 if (!update_plt_info (abfd, pltent, got2, addend))
3237 return FALSE;
25dbc73a 3238 break;
ee05f2fe 3239
25dbc73a
AM
3240 /* The following relocations don't need to propagate the
3241 relocation if linking a shared object since they are
3242 section relative. */
3243 case R_PPC_SECTOFF:
3244 case R_PPC_SECTOFF_LO:
3245 case R_PPC_SECTOFF_HI:
3246 case R_PPC_SECTOFF_HA:
3247 case R_PPC_DTPREL16:
3248 case R_PPC_DTPREL16_LO:
3249 case R_PPC_DTPREL16_HI:
3250 case R_PPC_DTPREL16_HA:
3251 case R_PPC_TOC16:
3252 break;
252b5132 3253
d7128ce4
AM
3254 case R_PPC_REL16:
3255 case R_PPC_REL16_LO:
3256 case R_PPC_REL16_HI:
3257 case R_PPC_REL16_HA:
a680de9a 3258 case R_PPC_REL16DX_HA:
016687f8 3259 ppc_elf_tdata (abfd)->has_rel16 = 1;
d7128ce4
AM
3260 break;
3261
a6aa5195 3262 /* These are just markers. */
25dbc73a
AM
3263 case R_PPC_TLS:
3264 case R_PPC_EMB_MRKREF:
3265 case R_PPC_NONE:
3266 case R_PPC_max:
32af9f6e
AM
3267 case R_PPC_RELAX:
3268 case R_PPC_RELAX_PLT:
3269 case R_PPC_RELAX_PLTREL24:
7ba71655 3270 case R_PPC_16DX_HA:
25dbc73a 3271 break;
252b5132 3272
25dbc73a
AM
3273 /* These should only appear in dynamic objects. */
3274 case R_PPC_COPY:
3275 case R_PPC_GLOB_DAT:
3276 case R_PPC_JMP_SLOT:
3277 case R_PPC_RELATIVE:
e054468f 3278 case R_PPC_IRELATIVE:
25dbc73a 3279 break;
252b5132 3280
25dbc73a
AM
3281 /* These aren't handled yet. We'll report an error later. */
3282 case R_PPC_ADDR30:
3283 case R_PPC_EMB_RELSEC16:
3284 case R_PPC_EMB_RELST_LO:
3285 case R_PPC_EMB_RELST_HI:
3286 case R_PPC_EMB_RELST_HA:
3287 case R_PPC_EMB_BIT_FLD:
3288 break;
252b5132 3289
25dbc73a
AM
3290 /* This refers only to functions defined in the shared library. */
3291 case R_PPC_LOCAL24PC:
727fc41e 3292 if (h != NULL && h == htab->elf.hgot && htab->plt_type == PLT_UNSET)
016687f8
AM
3293 {
3294 htab->plt_type = PLT_OLD;
3295 htab->old_bfd = abfd;
3296 }
c7e17e05
AM
3297 if (h != NULL && h->type == STT_GNU_IFUNC)
3298 {
c7e17e05
AM
3299 h->needs_plt = 1;
3300 if (!update_plt_info (abfd, &h->plt.plist, NULL, 0))
3301 return FALSE;
3302 }
25dbc73a 3303 break;
252b5132 3304
25dbc73a
AM
3305 /* This relocation describes the C++ object vtable hierarchy.
3306 Reconstruct it for later use during GC. */
3307 case R_PPC_GNU_VTINHERIT:
3308 if (!bfd_elf_gc_record_vtinherit (abfd, sec, h, rel->r_offset))
3309 return FALSE;
3310 break;
252b5132 3311
25dbc73a
AM
3312 /* This relocation describes which C++ vtable entries are actually
3313 used. Record for later use during GC. */
3314 case R_PPC_GNU_VTENTRY:
a0ea3a14 3315 if (!bfd_elf_gc_record_vtentry (abfd, sec, h, rel->r_addend))
25dbc73a
AM
3316 return FALSE;
3317 break;
252b5132 3318
7c8bbca5 3319 /* We shouldn't really be seeing TPREL32. */
25dbc73a 3320 case R_PPC_TPREL32:
1d483afe
AM
3321 case R_PPC_TPREL16:
3322 case R_PPC_TPREL16_LO:
3323 case R_PPC_TPREL16_HI:
3324 case R_PPC_TPREL16_HA:
7c8bbca5 3325 if (bfd_link_dll (info))
25dbc73a
AM
3326 info->flags |= DF_STATIC_TLS;
3327 goto dodyn;
252b5132 3328
25dbc73a
AM
3329 /* Nor these. */
3330 case R_PPC_DTPMOD32:
3331 case R_PPC_DTPREL32:
3332 goto dodyn;
252b5132 3333
9edfd1af
AM
3334 case R_PPC_REL32:
3335 if (h == NULL
3336 && got2 != NULL
3337 && (sec->flags & SEC_CODE) != 0
0e1862bb 3338 && bfd_link_pic (info)
4a3dc543 3339 && htab->plt_type == PLT_UNSET)
9edfd1af
AM
3340 {
3341 /* Old -fPIC gcc code has .long LCTOC1-LCFx just before
3342 the start of a function, which assembles to a REL32
3343 reference to .got2. If we detect one of these, then
3344 force the old PLT layout because the linker cannot
3345 reliably deduce the GOT pointer value needed for
3346 PLT call stubs. */
3347 asection *s;
87d72d41 3348 Elf_Internal_Sym *isym;
9edfd1af 3349
87d72d41
AM
3350 isym = bfd_sym_from_r_symndx (&htab->sym_cache,
3351 abfd, r_symndx);
3352 if (isym == NULL)
3353 return FALSE;
3354
3355 s = bfd_section_from_elf_index (abfd, isym->st_shndx);
9edfd1af 3356 if (s == got2)
016687f8
AM
3357 {
3358 htab->plt_type = PLT_OLD;
3359 htab->old_bfd = abfd;
3360 }
9edfd1af 3361 }
7123df0e 3362 if (h == NULL || h == htab->elf.hgot)
fd38b44c 3363 break;
625af618
AM
3364 /* fall through */
3365
3366 case R_PPC_ADDR32:
3367 case R_PPC_ADDR16:
3368 case R_PPC_ADDR16_LO:
3369 case R_PPC_ADDR16_HI:
3370 case R_PPC_ADDR16_HA:
3371 case R_PPC_UADDR32:
3372 case R_PPC_UADDR16:
0e1862bb 3373 if (h != NULL && !bfd_link_pic (info))
625af618
AM
3374 {
3375 /* We may need a plt entry if the symbol turns out to be
3376 a function defined in a dynamic object. */
3ec01793 3377 if (!update_plt_info (abfd, &h->plt.plist, NULL, 0))
625af618
AM
3378 return FALSE;
3379
3380 /* We may need a copy reloc too. */
3381 h->non_got_ref = 1;
3382 h->pointer_equality_needed = 1;
d3e454b9
AM
3383 if (r_type == R_PPC_ADDR16_HA)
3384 ppc_elf_hash_entry (h)->has_addr16_ha = 1;
3385 if (r_type == R_PPC_ADDR16_LO)
3386 ppc_elf_hash_entry (h)->has_addr16_lo = 1;
625af618
AM
3387 }
3388 goto dodyn;
9edfd1af 3389
25dbc73a
AM
3390 case R_PPC_REL24:
3391 case R_PPC_REL14:
3392 case R_PPC_REL14_BRTAKEN:
3393 case R_PPC_REL14_BRNTAKEN:
d7128ce4 3394 if (h == NULL)
25dbc73a 3395 break;
7123df0e 3396 if (h == htab->elf.hgot)
d7128ce4 3397 {
7123df0e 3398 if (htab->plt_type == PLT_UNSET)
016687f8
AM
3399 {
3400 htab->plt_type = PLT_OLD;
3401 htab->old_bfd = abfd;
3402 }
d7128ce4
AM
3403 break;
3404 }
25dbc73a 3405 /* fall through */
ee05f2fe 3406
25dbc73a 3407 case R_PPC_ADDR24:
25dbc73a
AM
3408 case R_PPC_ADDR14:
3409 case R_PPC_ADDR14_BRTAKEN:
3410 case R_PPC_ADDR14_BRNTAKEN:
0e1862bb 3411 if (h != NULL && !bfd_link_pic (info))
25dbc73a
AM
3412 {
3413 /* We may need a plt entry if the symbol turns out to be
3414 a function defined in a dynamic object. */
e054468f 3415 h->needs_plt = 1;
de972ffa 3416 if (!update_plt_info (abfd, &h->plt.plist, NULL, 0))
a6aa5195 3417 return FALSE;
625af618 3418 break;
25dbc73a 3419 }
7619e7c7 3420
25dbc73a
AM
3421 dodyn:
3422 /* If we are creating a shared library, and this is a reloc
3423 against a global symbol, or a non PC relative reloc
3424 against a local symbol, then we need to copy the reloc
3425 into the shared library. However, if we are linking with
3426 -Bsymbolic, we do not need to copy a reloc against a
3427 global symbol which is defined in an object we are
3428 including in the link (i.e., DEF_REGULAR is set). At
3429 this point we have not seen all the input files, so it is
3430 possible that DEF_REGULAR is not set now but will be set
3431 later (it is never cleared). In case of a weak definition,
3432 DEF_REGULAR may be cleared later by a strong definition in
3433 a shared library. We account for that possibility below by
3434 storing information in the dyn_relocs field of the hash
3435 table entry. A similar situation occurs when creating
3436 shared libraries and symbol visibility changes render the
3437 symbol local.
7619e7c7 3438
25dbc73a
AM
3439 If on the other hand, we are creating an executable, we
3440 may need to keep relocations for symbols satisfied by a
3441 dynamic library if we manage to avoid copy relocs for the
3442 symbol. */
0e1862bb 3443 if ((bfd_link_pic (info)
1d483afe 3444 && (must_be_dyn_reloc (info, r_type)
25dbc73a 3445 || (h != NULL
198f1157 3446 && (!SYMBOLIC_BIND (info, h)
25dbc73a
AM
3447 || h->root.type == bfd_link_hash_defweak
3448 || !h->def_regular))))
3449 || (ELIMINATE_COPY_RELOCS
0e1862bb 3450 && !bfd_link_pic (info)
25dbc73a
AM
3451 && h != NULL
3452 && (h->root.type == bfd_link_hash_defweak
de972ffa 3453 || !h->def_regular)))
25dbc73a 3454 {
25dbc73a
AM
3455#ifdef DEBUG
3456 fprintf (stderr,
3457 "ppc_elf_check_relocs needs to "
3458 "create relocation for %s\n",
3459 (h && h->root.root.string
3460 ? h->root.root.string : "<unknown>"));
3461#endif
3462 if (sreloc == NULL)
3463 {
c9a2f333
AM
3464 if (htab->elf.dynobj == NULL)
3465 htab->elf.dynobj = abfd;
83bac4b0
NC
3466
3467 sreloc = _bfd_elf_make_dynamic_reloc_section
3468 (sec, htab->elf.dynobj, 2, abfd, /*rela?*/ TRUE);
3469
25dbc73a 3470 if (sreloc == NULL)
83bac4b0 3471 return FALSE;
25dbc73a 3472 }
7619e7c7 3473
25dbc73a
AM
3474 /* If this is a global symbol, we count the number of
3475 relocations we need for this symbol. */
3476 if (h != NULL)
3477 {
f95f8542
AM
3478 struct elf_dyn_relocs *p;
3479 struct elf_dyn_relocs **rel_head;
3480
91d6fa6a 3481 rel_head = &ppc_elf_hash_entry (h)->dyn_relocs;
f95f8542
AM
3482 p = *rel_head;
3483 if (p == NULL || p->sec != sec)
3484 {
3485 p = bfd_alloc (htab->elf.dynobj, sizeof *p);
3486 if (p == NULL)
3487 return FALSE;
3488 p->next = *rel_head;
3489 *rel_head = p;
3490 p->sec = sec;
3491 p->count = 0;
3492 p->pc_count = 0;
3493 }
3494 p->count += 1;
3495 if (!must_be_dyn_reloc (info, r_type))
3496 p->pc_count += 1;
25dbc73a
AM
3497 }
3498 else
3499 {
3500 /* Track dynamic relocs needed for local syms too.
3501 We really need local syms available to do this
3502 easily. Oh well. */
f95f8542
AM
3503 struct ppc_dyn_relocs *p;
3504 struct ppc_dyn_relocs **rel_head;
3505 bfd_boolean is_ifunc;
25dbc73a 3506 asection *s;
6edfbbad 3507 void *vpp;
87d72d41 3508 Elf_Internal_Sym *isym;
6edfbbad 3509
87d72d41
AM
3510 isym = bfd_sym_from_r_symndx (&htab->sym_cache,
3511 abfd, r_symndx);
3512 if (isym == NULL)
25dbc73a 3513 return FALSE;
7fce784e 3514
87d72d41
AM
3515 s = bfd_section_from_elf_index (abfd, isym->st_shndx);
3516 if (s == NULL)
3517 s = sec;
3518
6edfbbad 3519 vpp = &elf_section_data (s)->local_dynrel;
f95f8542
AM
3520 rel_head = (struct ppc_dyn_relocs **) vpp;
3521 is_ifunc = ELF_ST_TYPE (isym->st_info) == STT_GNU_IFUNC;
3522 p = *rel_head;
3523 if (p != NULL && p->sec == sec && p->ifunc != is_ifunc)
3524 p = p->next;
3525 if (p == NULL || p->sec != sec || p->ifunc != is_ifunc)
3526 {
3527 p = bfd_alloc (htab->elf.dynobj, sizeof *p);
3528 if (p == NULL)
3529 return FALSE;
3530 p->next = *rel_head;
3531 *rel_head = p;
3532 p->sec = sec;
3533 p->ifunc = is_ifunc;
3534 p->count = 0;
3535 }
3536 p->count += 1;
25dbc73a 3537 }
7619e7c7 3538 }
25dbc73a
AM
3539
3540 break;
7619e7c7
AM
3541 }
3542 }
ee05f2fe 3543
25dbc73a
AM
3544 return TRUE;
3545}
3546\f
005d79fd
AM
3547/* Warn for conflicting Tag_GNU_Power_ABI_FP attributes between IBFD
3548 and OBFD, and merge non-conflicting ones. */
4a91d0ba 3549bfd_boolean
50e03d47 3550_bfd_elf_ppc_merge_fp_attributes (bfd *ibfd, struct bfd_link_info *info)
34c8bcba 3551{
50e03d47 3552 bfd *obfd = info->output_bfd;
c6e65352
DJ
3553 obj_attribute *in_attr, *in_attrs;
3554 obj_attribute *out_attr, *out_attrs;
4a91d0ba 3555 bfd_boolean ret = TRUE;
34c8bcba 3556
c6e65352
DJ
3557 in_attrs = elf_known_obj_attributes (ibfd)[OBJ_ATTR_GNU];
3558 out_attrs = elf_known_obj_attributes (obfd)[OBJ_ATTR_GNU];
3559
c6e65352
DJ
3560 in_attr = &in_attrs[Tag_GNU_Power_ABI_FP];
3561 out_attr = &out_attrs[Tag_GNU_Power_ABI_FP];
005d79fd 3562
c6e65352 3563 if (in_attr->i != out_attr->i)
34c8bcba 3564 {
005d79fd
AM
3565 int in_fp = in_attr->i & 3;
3566 int out_fp = out_attr->i & 3;
4a91d0ba 3567 static bfd *last_fp, *last_ld;
005d79fd
AM
3568
3569 if (in_fp == 0)
34c8bcba 3570 ;
005d79fd
AM
3571 else if (out_fp == 0)
3572 {
8d2c8c3d 3573 out_attr->type = ATTR_TYPE_FLAG_INT_VAL;
005d79fd 3574 out_attr->i ^= in_fp;
4a91d0ba 3575 last_fp = ibfd;
005d79fd
AM
3576 }
3577 else if (out_fp != 2 && in_fp == 2)
8d2c8c3d
AM
3578 {
3579 _bfd_error_handler
3580 /* xgettext:c-format */
4a91d0ba
AM
3581 (_("%pB uses hard float, %pB uses soft float"),
3582 last_fp, ibfd);
3583 ret = FALSE;
8d2c8c3d 3584 }
005d79fd 3585 else if (out_fp == 2 && in_fp != 2)
8d2c8c3d
AM
3586 {
3587 _bfd_error_handler
3588 /* xgettext:c-format */
4a91d0ba
AM
3589 (_("%pB uses hard float, %pB uses soft float"),
3590 ibfd, last_fp);
3591 ret = FALSE;
8d2c8c3d 3592 }
005d79fd 3593 else if (out_fp == 1 && in_fp == 3)
8d2c8c3d
AM
3594 {
3595 _bfd_error_handler
3596 /* xgettext:c-format */
4a91d0ba
AM
3597 (_("%pB uses double-precision hard float, "
3598 "%pB uses single-precision hard float"), last_fp, ibfd);
3599 ret = FALSE;
8d2c8c3d 3600 }
005d79fd 3601 else if (out_fp == 3 && in_fp == 1)
8d2c8c3d
AM
3602 {
3603 _bfd_error_handler
3604 /* xgettext:c-format */
4a91d0ba
AM
3605 (_("%pB uses double-precision hard float, "
3606 "%pB uses single-precision hard float"), ibfd, last_fp);
3607 ret = FALSE;
8d2c8c3d 3608 }
005d79fd
AM
3609
3610 in_fp = in_attr->i & 0xc;
3611 out_fp = out_attr->i & 0xc;
3612 if (in_fp == 0)
3613 ;
3614 else if (out_fp == 0)
3615 {
8d2c8c3d 3616 out_attr->type = ATTR_TYPE_FLAG_INT_VAL;
005d79fd 3617 out_attr->i ^= in_fp;
4a91d0ba 3618 last_ld = ibfd;
005d79fd
AM
3619 }
3620 else if (out_fp != 2 * 4 && in_fp == 2 * 4)
8d2c8c3d
AM
3621 {
3622 _bfd_error_handler
3623 /* xgettext:c-format */
4a91d0ba
AM
3624 (_("%pB uses 64-bit long double, "
3625 "%pB uses 128-bit long double"), ibfd, last_ld);
3626 ret = FALSE;
8d2c8c3d 3627 }
005d79fd 3628 else if (in_fp != 2 * 4 && out_fp == 2 * 4)
8d2c8c3d
AM
3629 {
3630 _bfd_error_handler
3631 /* xgettext:c-format */
4a91d0ba
AM
3632 (_("%pB uses 64-bit long double, "
3633 "%pB uses 128-bit long double"), last_ld, ibfd);
3634 ret = FALSE;
8d2c8c3d 3635 }
005d79fd 3636 else if (out_fp == 1 * 4 && in_fp == 3 * 4)
8d2c8c3d
AM
3637 {
3638 _bfd_error_handler
3639 /* xgettext:c-format */
4a91d0ba
AM
3640 (_("%pB uses IBM long double, "
3641 "%pB uses IEEE long double"), last_ld, ibfd);
3642 ret = FALSE;
8d2c8c3d 3643 }
005d79fd 3644 else if (out_fp == 3 * 4 && in_fp == 1 * 4)
8d2c8c3d
AM
3645 {
3646 _bfd_error_handler
3647 /* xgettext:c-format */
4a91d0ba
AM
3648 (_("%pB uses IBM long double, "
3649 "%pB uses IEEE long double"), ibfd, last_ld);
3650 ret = FALSE;
8d2c8c3d 3651 }
c6e65352 3652 }
4a91d0ba
AM
3653
3654 if (!ret)
3655 {
3656 out_attr->type = ATTR_TYPE_FLAG_INT_VAL | ATTR_TYPE_FLAG_ERROR;
3657 bfd_set_error (bfd_error_bad_value);
3658 }
3659 return ret;
005d79fd
AM
3660}
3661
3662/* Merge object attributes from IBFD into OBFD. Warn if
3663 there are conflicting attributes. */
3664static bfd_boolean
50e03d47 3665ppc_elf_merge_obj_attributes (bfd *ibfd, struct bfd_link_info *info)
005d79fd 3666{
50e03d47 3667 bfd *obfd;
005d79fd
AM
3668 obj_attribute *in_attr, *in_attrs;
3669 obj_attribute *out_attr, *out_attrs;
4a91d0ba 3670 bfd_boolean ret;
005d79fd 3671
4a91d0ba
AM
3672 if (!_bfd_elf_ppc_merge_fp_attributes (ibfd, info))
3673 return FALSE;
005d79fd 3674
50e03d47 3675 obfd = info->output_bfd;
005d79fd
AM
3676 in_attrs = elf_known_obj_attributes (ibfd)[OBJ_ATTR_GNU];
3677 out_attrs = elf_known_obj_attributes (obfd)[OBJ_ATTR_GNU];
c6e65352
DJ
3678
3679 /* Check for conflicting Tag_GNU_Power_ABI_Vector attributes and
3680 merge non-conflicting ones. */
3681 in_attr = &in_attrs[Tag_GNU_Power_ABI_Vector];
3682 out_attr = &out_attrs[Tag_GNU_Power_ABI_Vector];
4a91d0ba 3683 ret = TRUE;
c6e65352
DJ
3684 if (in_attr->i != out_attr->i)
3685 {
005d79fd
AM
3686 int in_vec = in_attr->i & 3;
3687 int out_vec = out_attr->i & 3;
4a91d0ba 3688 static bfd *last_vec;
c6e65352 3689
005d79fd
AM
3690 if (in_vec == 0)
3691 ;
3692 else if (out_vec == 0)
c6e65352 3693 {
8d2c8c3d 3694 out_attr->type = ATTR_TYPE_FLAG_INT_VAL;
005d79fd 3695 out_attr->i = in_vec;
4a91d0ba 3696 last_vec = ibfd;
c6e65352 3697 }
c6e65352
DJ
3698 /* For now, allow generic to transition to AltiVec or SPE
3699 without a warning. If GCC marked files with their stack
3700 alignment and used don't-care markings for files which are
3701 not affected by the vector ABI, we could warn about this
3702 case too. */
005d79fd 3703 else if (in_vec == 1)
c6e65352 3704 ;
005d79fd
AM
3705 else if (out_vec == 1)
3706 {
8d2c8c3d 3707 out_attr->type = ATTR_TYPE_FLAG_INT_VAL;
005d79fd 3708 out_attr->i = in_vec;
4a91d0ba 3709 last_vec = ibfd;
005d79fd
AM
3710 }
3711 else if (out_vec < in_vec)
8d2c8c3d
AM
3712 {
3713 _bfd_error_handler
3714 /* xgettext:c-format */
4a91d0ba
AM
3715 (_("%pB uses AltiVec vector ABI, %pB uses SPE vector ABI"),
3716 last_vec, ibfd);
8d2c8c3d 3717 out_attr->type = ATTR_TYPE_FLAG_INT_VAL | ATTR_TYPE_FLAG_ERROR;
4a91d0ba 3718 ret = FALSE;
8d2c8c3d 3719 }
005d79fd 3720 else if (out_vec > in_vec)
8d2c8c3d
AM
3721 {
3722 _bfd_error_handler
3723 /* xgettext:c-format */
4a91d0ba
AM
3724 (_("%pB uses AltiVec vector ABI, %pB uses SPE vector ABI"),
3725 ibfd, last_vec);
8d2c8c3d 3726 out_attr->type = ATTR_TYPE_FLAG_INT_VAL | ATTR_TYPE_FLAG_ERROR;
4a91d0ba 3727 ret = FALSE;
8d2c8c3d 3728 }
34c8bcba
JM
3729 }
3730
f82e0623
NF
3731 /* Check for conflicting Tag_GNU_Power_ABI_Struct_Return attributes
3732 and merge non-conflicting ones. */
3733 in_attr = &in_attrs[Tag_GNU_Power_ABI_Struct_Return];
3734 out_attr = &out_attrs[Tag_GNU_Power_ABI_Struct_Return];
3735 if (in_attr->i != out_attr->i)
3736 {
005d79fd
AM
3737 int in_struct = in_attr->i & 3;
3738 int out_struct = out_attr->i & 3;
4a91d0ba 3739 static bfd *last_struct;
005d79fd
AM
3740
3741 if (in_struct == 0 || in_struct == 3)
f82e0623 3742 ;
005d79fd
AM
3743 else if (out_struct == 0)
3744 {
8d2c8c3d 3745 out_attr->type = ATTR_TYPE_FLAG_INT_VAL;
005d79fd 3746 out_attr->i = in_struct;
4a91d0ba 3747 last_struct = ibfd;
005d79fd
AM
3748 }
3749 else if (out_struct < in_struct)
8d2c8c3d
AM
3750 {
3751 _bfd_error_handler
3752 /* xgettext:c-format */
4a91d0ba
AM
3753 (_("%pB uses r3/r4 for small structure returns, "
3754 "%pB uses memory"), last_struct, ibfd);
8d2c8c3d 3755 out_attr->type = ATTR_TYPE_FLAG_INT_VAL | ATTR_TYPE_FLAG_ERROR;
4a91d0ba 3756 ret = FALSE;
8d2c8c3d 3757 }
005d79fd 3758 else if (out_struct > in_struct)
8d2c8c3d
AM
3759 {
3760 _bfd_error_handler
3761 /* xgettext:c-format */
4a91d0ba
AM
3762 (_("%pB uses r3/r4 for small structure returns, "
3763 "%pB uses memory"), ibfd, last_struct);
8d2c8c3d 3764 out_attr->type = ATTR_TYPE_FLAG_INT_VAL | ATTR_TYPE_FLAG_ERROR;
4a91d0ba 3765 ret = FALSE;
8d2c8c3d 3766 }
f82e0623 3767 }
4a91d0ba
AM
3768 if (!ret)
3769 {
3770 bfd_set_error (bfd_error_bad_value);
3771 return FALSE;
3772 }
f82e0623 3773
34c8bcba 3774 /* Merge Tag_compatibility attributes and any common GNU ones. */
8d2c8c3d 3775 return _bfd_elf_merge_object_attributes (ibfd, info);
34c8bcba
JM
3776}
3777
8853c3d3
AM
3778/* Merge backend specific data from an object file to the output
3779 object file when linking. */
3780
3781static bfd_boolean
50e03d47 3782ppc_elf_merge_private_bfd_data (bfd *ibfd, struct bfd_link_info *info)
8853c3d3 3783{
50e03d47 3784 bfd *obfd = info->output_bfd;
8853c3d3
AM
3785 flagword old_flags;
3786 flagword new_flags;
3787 bfd_boolean error;
3788
0c8d6e5c 3789 if (!is_ppc_elf (ibfd) || !is_ppc_elf (obfd))
8853c3d3
AM
3790 return TRUE;
3791
cc643b88 3792 /* Check if we have the same endianness. */
50e03d47 3793 if (! _bfd_generic_verify_endian_match (ibfd, info))
8853c3d3
AM
3794 return FALSE;
3795
50e03d47 3796 if (!ppc_elf_merge_obj_attributes (ibfd, info))
34c8bcba
JM
3797 return FALSE;
3798
8853c3d3
AM
3799 new_flags = elf_elfheader (ibfd)->e_flags;
3800 old_flags = elf_elfheader (obfd)->e_flags;
3801 if (!elf_flags_init (obfd))
3802 {
3803 /* First call, no flags set. */
3804 elf_flags_init (obfd) = TRUE;
3805 elf_elfheader (obfd)->e_flags = new_flags;
3806 }
3807
3808 /* Compatible flags are ok. */
3809 else if (new_flags == old_flags)
3810 ;
3811
3812 /* Incompatible flags. */
3813 else
3814 {
3815 /* Warn about -mrelocatable mismatch. Allow -mrelocatable-lib
3816 to be linked with either. */
3817 error = FALSE;
3818 if ((new_flags & EF_PPC_RELOCATABLE) != 0
3819 && (old_flags & (EF_PPC_RELOCATABLE | EF_PPC_RELOCATABLE_LIB)) == 0)
3820 {
3821 error = TRUE;
4eca0228 3822 _bfd_error_handler
871b3ab2 3823 (_("%pB: compiled with -mrelocatable and linked with "
8853c3d3
AM
3824 "modules compiled normally"), ibfd);
3825 }
3826 else if ((new_flags & (EF_PPC_RELOCATABLE | EF_PPC_RELOCATABLE_LIB)) == 0
3827 && (old_flags & EF_PPC_RELOCATABLE) != 0)
3828 {
3829 error = TRUE;
4eca0228 3830 _bfd_error_handler
871b3ab2 3831 (_("%pB: compiled normally and linked with "
8853c3d3
AM
3832 "modules compiled with -mrelocatable"), ibfd);
3833 }
3834
3835 /* The output is -mrelocatable-lib iff both the input files are. */
3836 if (! (new_flags & EF_PPC_RELOCATABLE_LIB))
3837 elf_elfheader (obfd)->e_flags &= ~EF_PPC_RELOCATABLE_LIB;
3838
3839 /* The output is -mrelocatable iff it can't be -mrelocatable-lib,
3840 but each input file is either -mrelocatable or -mrelocatable-lib. */
3841 if (! (elf_elfheader (obfd)->e_flags & EF_PPC_RELOCATABLE_LIB)
3842 && (new_flags & (EF_PPC_RELOCATABLE_LIB | EF_PPC_RELOCATABLE))
3843 && (old_flags & (EF_PPC_RELOCATABLE_LIB | EF_PPC_RELOCATABLE)))
3844 elf_elfheader (obfd)->e_flags |= EF_PPC_RELOCATABLE;
3845
3846 /* Do not warn about eabi vs. V.4 mismatch, just or in the bit if
3847 any module uses it. */
3848 elf_elfheader (obfd)->e_flags |= (new_flags & EF_PPC_EMB);
3849
3850 new_flags &= ~(EF_PPC_RELOCATABLE | EF_PPC_RELOCATABLE_LIB | EF_PPC_EMB);
3851 old_flags &= ~(EF_PPC_RELOCATABLE | EF_PPC_RELOCATABLE_LIB | EF_PPC_EMB);
3852
3853 /* Warn about any other mismatches. */
3854 if (new_flags != old_flags)
3855 {
3856 error = TRUE;
4eca0228 3857 _bfd_error_handler
695344c0 3858 /* xgettext:c-format */
871b3ab2 3859 (_("%pB: uses different e_flags (%#x) fields "
cd9af601
AM
3860 "than previous modules (%#x)"),
3861 ibfd, new_flags, old_flags);
8853c3d3
AM
3862 }
3863
3864 if (error)
3865 {
3866 bfd_set_error (bfd_error_bad_value);
3867 return FALSE;
3868 }
3869 }
3870
3871 return TRUE;
3872}
b9c361e0
JL
3873
3874static void
95f0d0d2 3875ppc_elf_vle_split16 (bfd *input_bfd,
08dc996f
AM
3876 asection *input_section,
3877 unsigned long offset,
95f0d0d2 3878 bfd_byte *loc,
86c95733 3879 bfd_vma value,
08dc996f
AM
3880 split16_format_type split16_format,
3881 bfd_boolean fixup)
b9c361e0 3882{
bb6bf75e 3883 unsigned int insn, opcode;
b9c361e0 3884
95f0d0d2 3885 insn = bfd_get_32 (input_bfd, loc);
bb6bf75e 3886 opcode = insn & E_OPCODE_MASK;
08dc996f
AM
3887 if (opcode == E_OR2I_INSN
3888 || opcode == E_AND2I_DOT_INSN
3889 || opcode == E_OR2IS_INSN
3890 || opcode == E_LIS_INSN
3891 || opcode == E_AND2IS_DOT_INSN)
3892 {
3893 if (split16_format != split16a_type)
3894 {
3895 if (fixup)
3896 split16_format = split16a_type;
3897 else
3898 _bfd_error_handler
3899 /* xgettext:c-format */
871b3ab2 3900 (_("%pB(%pA+0x%lx): expected 16A style relocation on 0x%08x insn"),
08dc996f
AM
3901 input_bfd, input_section, offset, opcode);
3902 }
3903 }
3904 else if (opcode == E_ADD2I_DOT_INSN
3905 || opcode == E_ADD2IS_INSN
3906 || opcode == E_CMP16I_INSN
3907 || opcode == E_MULL2I_INSN
3908 || opcode == E_CMPL16I_INSN
3909 || opcode == E_CMPH16I_INSN
3910 || opcode == E_CMPHL16I_INSN)
3911 {
3912 if (split16_format != split16d_type)
3913 {
3914 if (fixup)
3915 split16_format = split16d_type;
3916 else
3917 _bfd_error_handler
3918 /* xgettext:c-format */
871b3ab2 3919 (_("%pB(%pA+0x%lx): expected 16D style relocation on 0x%08x insn"),
08dc996f
AM
3920 input_bfd, input_section, offset, opcode);
3921 }
3922 }
bb6bf75e
AM
3923 if (split16_format == split16a_type)
3924 {
3925 insn &= ~((0xf800 << 5) | 0x7ff);
3926 insn |= (value & 0xf800) << 5;
3927 if ((insn & E_LI_MASK) == E_LI_INSN)
3928 {
3929 /* Hack for e_li. Extend sign. */
3930 insn &= ~(0xf0000 >> 5);
3931 insn |= (-(value & 0x8000) & 0xf0000) >> 5;
3932 }
3933 }
3934 else
3935 {
3936 insn &= ~((0xf800 << 10) | 0x7ff);
3937 insn |= (value & 0xf800) << 10;
3938 }
86c95733 3939 insn |= value & 0x7ff;
95f0d0d2 3940 bfd_put_32 (input_bfd, insn, loc);
b9c361e0 3941}
83eef883
AFB
3942
3943static void
3944ppc_elf_vle_split20 (bfd *output_bfd, bfd_byte *loc, bfd_vma value)
3945{
3946 unsigned int insn;
3947
3948 insn = bfd_get_32 (output_bfd, loc);
3949 /* We have an li20 field, bits 17..20, 11..15, 21..31. */
3950 /* Top 4 bits of value to 17..20. */
3951 insn |= (value & 0xf0000) >> 5;
3952 /* Next 5 bits of the value to 11..15. */
3953 insn |= (value & 0xf800) << 5;
3954 /* And the final 11 bits of the value to bits 21 to 31. */
3955 insn |= value & 0x7ff;
3956 bfd_put_32 (output_bfd, insn, loc);
3957}
3958
8853c3d3 3959\f
d7128ce4
AM
3960/* Choose which PLT scheme to use, and set .plt flags appropriately.
3961 Returns -1 on error, 0 for old PLT, 1 for new PLT. */
3962int
3963ppc_elf_select_plt_layout (bfd *output_bfd ATTRIBUTE_UNUSED,
5446cbdf 3964 struct bfd_link_info *info)
d7128ce4
AM
3965{
3966 struct ppc_elf_link_hash_table *htab;
9d8504b1 3967 flagword flags;
d7128ce4
AM
3968
3969 htab = ppc_elf_hash_table (info);
4a3dc543
RS
3970
3971 if (htab->plt_type == PLT_UNSET)
016687f8 3972 {
b3874e1a
AM
3973 struct elf_link_hash_entry *h;
3974
5446cbdf 3975 if (htab->params->plt_style == PLT_OLD)
016687f8 3976 htab->plt_type = PLT_OLD;
0e1862bb 3977 else if (bfd_link_pic (info)
b3874e1a
AM
3978 && htab->elf.dynamic_sections_created
3979 && (h = elf_link_hash_lookup (&htab->elf, "_mcount",
3980 FALSE, FALSE, TRUE)) != NULL
3981 && (h->type == STT_FUNC
3982 || h->needs_plt)
3983 && h->ref_regular
3984 && !(SYMBOL_CALLS_LOCAL (info, h)
21d68fcd 3985 || UNDEFWEAK_NO_DYNAMIC_RELOC (info, h)))
b3874e1a
AM
3986 {
3987 /* Profiling of shared libs (and pies) is not supported with
3988 secure plt, because ppc32 does profiling before a
3989 function prologue and a secure plt pic call stubs needs
3990 r30 to be set up. */
3991 htab->plt_type = PLT_OLD;
3992 }
016687f8
AM
3993 else
3994 {
3995 bfd *ibfd;
5446cbdf 3996 enum ppc_elf_plt_type plt_type = htab->params->plt_style;
016687f8
AM
3997
3998 /* Look through the reloc flags left by ppc_elf_check_relocs.
3999 Use the old style bss plt if a file makes plt calls
4000 without using the new relocs, and if ld isn't given
4001 --secure-plt and we never see REL16 relocs. */
4002 if (plt_type == PLT_UNSET)
4003 plt_type = PLT_OLD;
c72f2fb2 4004 for (ibfd = info->input_bfds; ibfd; ibfd = ibfd->link.next)
0c8d6e5c 4005 if (is_ppc_elf (ibfd))
016687f8
AM
4006 {
4007 if (ppc_elf_tdata (ibfd)->has_rel16)
4008 plt_type = PLT_NEW;
4009 else if (ppc_elf_tdata (ibfd)->makes_plt_call)
4010 {
4011 plt_type = PLT_OLD;
4012 htab->old_bfd = ibfd;
4013 break;
4014 }
4015 }
4016 htab->plt_type = plt_type;
4017 }
4018 }
5446cbdf 4019 if (htab->plt_type == PLT_OLD && htab->params->plt_style == PLT_NEW)
b3874e1a
AM
4020 {
4021 if (htab->old_bfd != NULL)
cf97bcb0 4022 _bfd_error_handler (_("bss-plt forced due to %pB"), htab->old_bfd);
b3874e1a 4023 else
cf97bcb0 4024 _bfd_error_handler (_("bss-plt forced by profiling"));
b3874e1a 4025 }
d7128ce4 4026
4a3dc543 4027 BFD_ASSERT (htab->plt_type != PLT_VXWORKS);
9d8504b1 4028
4a3dc543 4029 if (htab->plt_type == PLT_NEW)
9d8504b1
PB
4030 {
4031 flags = (SEC_ALLOC | SEC_LOAD | SEC_HAS_CONTENTS
4032 | SEC_IN_MEMORY | SEC_LINKER_CREATED);
86b9da88
AM
4033
4034 /* The new PLT is a loaded section. */
ce558b89 4035 if (htab->elf.splt != NULL
fd361982 4036 && !bfd_set_section_flags (htab->elf.splt, flags))
86b9da88
AM
4037 return -1;
4038
4039 /* The new GOT is not executable. */
ce558b89 4040 if (htab->elf.sgot != NULL
fd361982 4041 && !bfd_set_section_flags (htab->elf.sgot, flags))
86b9da88 4042 return -1;
d7128ce4
AM
4043 }
4044 else
4045 {
4046 /* Stop an unused .glink section from affecting .text alignment. */
86b9da88 4047 if (htab->glink != NULL
fd361982 4048 && !bfd_set_section_alignment (htab->glink, 0))
86b9da88 4049 return -1;
d7128ce4 4050 }
4a3dc543 4051 return htab->plt_type == PLT_NEW;
d7128ce4
AM
4052}
4053\f
25dbc73a
AM
4054/* Return the section that should be marked against GC for a given
4055 relocation. */
586119b3 4056
25dbc73a
AM
4057static asection *
4058ppc_elf_gc_mark_hook (asection *sec,
07adf181 4059 struct bfd_link_info *info,
25dbc73a
AM
4060 Elf_Internal_Rela *rel,
4061 struct elf_link_hash_entry *h,
4062 Elf_Internal_Sym *sym)
4063{
4064 if (h != NULL)
07adf181
AM
4065 switch (ELF32_R_TYPE (rel->r_info))
4066 {
4067 case R_PPC_GNU_VTINHERIT:
4068 case R_PPC_GNU_VTENTRY:
4069 return NULL;
4070 }
4071
4072 return _bfd_elf_gc_mark_hook (sec, info, rel, h, sym);
25dbc73a 4073}
49c09209
AM
4074
4075static bfd_boolean
4076get_sym_h (struct elf_link_hash_entry **hp,
4077 Elf_Internal_Sym **symp,
4078 asection **symsecp,
4079 unsigned char **tls_maskp,
4080 Elf_Internal_Sym **locsymsp,
4081 unsigned long r_symndx,
4082 bfd *ibfd)
4083{
4084 Elf_Internal_Shdr *symtab_hdr = &elf_symtab_hdr (ibfd);
4085
4086 if (r_symndx >= symtab_hdr->sh_info)
4087 {
4088 struct elf_link_hash_entry **sym_hashes = elf_sym_hashes (ibfd);
4089 struct elf_link_hash_entry *h;
4090
4091 h = sym_hashes[r_symndx - symtab_hdr->sh_info];
4092 while (h->root.type == bfd_link_hash_indirect
4093 || h->root.type == bfd_link_hash_warning)
4094 h = (struct elf_link_hash_entry *) h->root.u.i.link;
4095
4096 if (hp != NULL)
4097 *hp = h;
4098
4099 if (symp != NULL)
4100 *symp = NULL;
4101
4102 if (symsecp != NULL)
4103 {
4104 asection *symsec = NULL;
4105 if (h->root.type == bfd_link_hash_defined
4106 || h->root.type == bfd_link_hash_defweak)
4107 symsec = h->root.u.def.section;
4108 *symsecp = symsec;
4109 }
4110
4111 if (tls_maskp != NULL)
4112 *tls_maskp = &ppc_elf_hash_entry (h)->tls_mask;
4113 }
4114 else
4115 {
4116 Elf_Internal_Sym *sym;
4117 Elf_Internal_Sym *locsyms = *locsymsp;
4118
4119 if (locsyms == NULL)
4120 {
4121 locsyms = (Elf_Internal_Sym *) symtab_hdr->contents;
4122 if (locsyms == NULL)
4123 locsyms = bfd_elf_get_elf_syms (ibfd, symtab_hdr,
4124 symtab_hdr->sh_info,
4125 0, NULL, NULL, NULL);
4126 if (locsyms == NULL)
4127 return FALSE;
4128 *locsymsp = locsyms;
4129 }
4130 sym = locsyms + r_symndx;
4131
4132 if (hp != NULL)
4133 *hp = NULL;
4134
4135 if (symp != NULL)
4136 *symp = sym;
4137
4138 if (symsecp != NULL)
4139 *symsecp = bfd_section_from_elf_index (ibfd, sym->st_shndx);
4140
4141 if (tls_maskp != NULL)
4142 {
4143 bfd_signed_vma *local_got;
4144 unsigned char *tls_mask;
4145
4146 tls_mask = NULL;
4147 local_got = elf_local_got_refcounts (ibfd);
4148 if (local_got != NULL)
4149 {
4150 struct plt_entry **local_plt = (struct plt_entry **)
4151 (local_got + symtab_hdr->sh_info);
4152 unsigned char *lgot_masks = (unsigned char *)
4153 (local_plt + symtab_hdr->sh_info);
4154 tls_mask = &lgot_masks[r_symndx];
4155 }
4156 *tls_maskp = tls_mask;
4157 }
4158 }
4159 return TRUE;
4160}
25dbc73a 4161\f
3e04d765
AM
4162/* Analyze inline PLT call relocations to see whether calls to locally
4163 defined functions can be converted to direct calls. */
4164
4165bfd_boolean
4166ppc_elf_inline_plt (struct bfd_link_info *info)
4167{
4168 struct ppc_elf_link_hash_table *htab;
4169 bfd *ibfd;
4170 asection *sec;
4171 bfd_vma low_vma, high_vma, limit;
4172
4173 htab = ppc_elf_hash_table (info);
4174 if (htab == NULL)
4175 return FALSE;
4176
4177 /* A bl insn can reach -0x2000000 to 0x1fffffc. The limit is
4178 reduced somewhat to cater for possible stubs that might be added
4179 between the call and its destination. */
4180 limit = 0x1e00000;
4181 low_vma = -1;
4182 high_vma = 0;
4183 for (sec = info->output_bfd->sections; sec != NULL; sec = sec->next)
4184 if ((sec->flags & (SEC_ALLOC | SEC_CODE)) == (SEC_ALLOC | SEC_CODE))
4185 {
4186 if (low_vma > sec->vma)
4187 low_vma = sec->vma;
4188 if (high_vma < sec->vma + sec->size)
4189 high_vma = sec->vma + sec->size;
4190 }
4191
4192 /* If a "bl" can reach anywhere in local code sections, then we can
4193 convert all inline PLT sequences to direct calls when the symbol
4194 is local. */
4195 if (high_vma - low_vma < limit)
4196 {
4197 htab->can_convert_all_inline_plt = 1;
4198 return TRUE;
4199 }
4200
4201 /* Otherwise, go looking through relocs for cases where a direct
4202 call won't reach. Mark the symbol on any such reloc to disable
4203 the optimization and keep the PLT entry as it seems likely that
4204 this will be better than creating trampolines. Note that this
4205 will disable the optimization for all inline PLT calls to a
4206 particular symbol, not just those that won't reach. The
4207 difficulty in doing a more precise optimization is that the
4208 linker needs to make a decision depending on whether a
4209 particular R_PPC_PLTCALL insn can be turned into a direct
4210 call, for each of the R_PPC_PLTSEQ and R_PPC_PLT16* insns in
4211 the sequence, and there is nothing that ties those relocs
4212 together except their symbol. */
4213
4214 for (ibfd = info->input_bfds; ibfd != NULL; ibfd = ibfd->link.next)
4215 {
4216 Elf_Internal_Shdr *symtab_hdr;
4217 Elf_Internal_Sym *local_syms;
4218
4219 if (!is_ppc_elf (ibfd))
4220 continue;
4221
4222 local_syms = NULL;
4223 symtab_hdr = &elf_symtab_hdr (ibfd);
4224
4225 for (sec = ibfd->sections; sec != NULL; sec = sec->next)
4226 if (sec->has_pltcall
4227 && !bfd_is_abs_section (sec->output_section))
4228 {
4229 Elf_Internal_Rela *relstart, *rel, *relend;
4230
4231 /* Read the relocations. */
4232 relstart = _bfd_elf_link_read_relocs (ibfd, sec, NULL, NULL,
4233 info->keep_memory);
4234 if (relstart == NULL)
4235 return FALSE;
4236
4237 relend = relstart + sec->reloc_count;
4238 for (rel = relstart; rel < relend; )
4239 {
4240 enum elf_ppc_reloc_type r_type;
4241 unsigned long r_symndx;
4242 asection *sym_sec;
4243 struct elf_link_hash_entry *h;
4244 Elf_Internal_Sym *sym;
4245 unsigned char *tls_maskp;
4246
4247 r_type = ELF32_R_TYPE (rel->r_info);
4248 if (r_type != R_PPC_PLTCALL)
4249 continue;
4250
4251 r_symndx = ELF32_R_SYM (rel->r_info);
4252 if (!get_sym_h (&h, &sym, &sym_sec, &tls_maskp, &local_syms,
4253 r_symndx, ibfd))
4254 {
4255 if (elf_section_data (sec)->relocs != relstart)
4256 free (relstart);
4257 if (local_syms != NULL
4258 && symtab_hdr->contents != (unsigned char *) local_syms)
4259 free (local_syms);
4260 return FALSE;
4261 }
4262
4263 if (sym_sec != NULL && sym_sec->output_section != NULL)
4264 {
4265 bfd_vma from, to;
4266 if (h != NULL)
4267 to = h->root.u.def.value;
4268 else
4269 to = sym->st_value;
4270 to += (rel->r_addend
4271 + sym_sec->output_offset
4272 + sym_sec->output_section->vma);
4273 from = (rel->r_offset
4274 + sec->output_offset
4275 + sec->output_section->vma);
4276 if (to - from + limit < 2 * limit)
4277 *tls_maskp &= ~PLT_KEEP;
4278 }
4279 }
4280 if (elf_section_data (sec)->relocs != relstart)
4281 free (relstart);
4282 }
4283
4284 if (local_syms != NULL
4285 && symtab_hdr->contents != (unsigned char *) local_syms)
4286 {
4287 if (!info->keep_memory)
4288 free (local_syms);
4289 else
4290 symtab_hdr->contents = (unsigned char *) local_syms;
4291 }
4292 }
4293
4294 return TRUE;
4295}
4296
3a71aa26
AM
4297/* Set plt output section type, htab->tls_get_addr, and call the
4298 generic ELF tls_setup function. */
7fce784e 4299
25dbc73a 4300asection *
5446cbdf 4301ppc_elf_tls_setup (bfd *obfd, struct bfd_link_info *info)
7fce784e 4302{
25dbc73a 4303 struct ppc_elf_link_hash_table *htab;
7fce784e 4304
25dbc73a 4305 htab = ppc_elf_hash_table (info);
a7f2871e
AM
4306 htab->tls_get_addr = elf_link_hash_lookup (&htab->elf, "__tls_get_addr",
4307 FALSE, FALSE, TRUE);
f01f1741
AM
4308 if (htab->plt_type != PLT_NEW)
4309 htab->params->no_tls_get_addr_opt = TRUE;
4310
5446cbdf 4311 if (!htab->params->no_tls_get_addr_opt)
a7f2871e
AM
4312 {
4313 struct elf_link_hash_entry *opt, *tga;
4314 opt = elf_link_hash_lookup (&htab->elf, "__tls_get_addr_opt",
4315 FALSE, FALSE, TRUE);
4316 if (opt != NULL
4317 && (opt->root.type == bfd_link_hash_defined
4318 || opt->root.type == bfd_link_hash_defweak))
4319 {
4320 /* If glibc supports an optimized __tls_get_addr call stub,
4321 signalled by the presence of __tls_get_addr_opt, and we'll
4322 be calling __tls_get_addr via a plt call stub, then
4323 make __tls_get_addr point to __tls_get_addr_opt. */
4324 tga = htab->tls_get_addr;
4325 if (htab->elf.dynamic_sections_created
4326 && tga != NULL
4327 && (tga->type == STT_FUNC
4328 || tga->needs_plt)
4329 && !(SYMBOL_CALLS_LOCAL (info, tga)
21d68fcd 4330 || UNDEFWEAK_NO_DYNAMIC_RELOC (info, tga)))
a7f2871e
AM
4331 {
4332 struct plt_entry *ent;
32af9f6e
AM
4333 for (ent = tga->plt.plist; ent != NULL; ent = ent->next)
4334 if (ent->plt.refcount > 0)
4335 break;
4336 if (ent != NULL)
a7f2871e
AM
4337 {
4338 tga->root.type = bfd_link_hash_indirect;
4339 tga->root.u.i.link = &opt->root;
4340 ppc_elf_copy_indirect_symbol (info, opt, tga);
b531344c 4341 opt->mark = 1;
a7f2871e
AM
4342 if (opt->dynindx != -1)
4343 {
4344 /* Use __tls_get_addr_opt in dynamic relocations. */
4345 opt->dynindx = -1;
4346 _bfd_elf_strtab_delref (elf_hash_table (info)->dynstr,
4347 opt->dynstr_index);
4348 if (!bfd_elf_link_record_dynamic_symbol (info, opt))
4349 return FALSE;
4350 }
4351 htab->tls_get_addr = opt;
4352 }
4353 }
4354 }
4355 else
5446cbdf 4356 htab->params->no_tls_get_addr_opt = TRUE;
a7f2871e 4357 }
4a3dc543 4358 if (htab->plt_type == PLT_NEW
ce558b89
AM
4359 && htab->elf.splt != NULL
4360 && htab->elf.splt->output_section != NULL)
d7128ce4 4361 {
ce558b89
AM
4362 elf_section_type (htab->elf.splt->output_section) = SHT_PROGBITS;
4363 elf_section_flags (htab->elf.splt->output_section) = SHF_ALLOC + SHF_WRITE;
d7128ce4
AM
4364 }
4365
25dbc73a 4366 return _bfd_elf_tls_setup (obfd, info);
7fce784e
AS
4367}
4368
3a71aa26
AM
4369/* Return TRUE iff REL is a branch reloc with a global symbol matching
4370 HASH. */
4371
4372static bfd_boolean
4373branch_reloc_hash_match (const bfd *ibfd,
4374 const Elf_Internal_Rela *rel,
4375 const struct elf_link_hash_entry *hash)
4376{
4377 Elf_Internal_Shdr *symtab_hdr = &elf_symtab_hdr (ibfd);
4378 enum elf_ppc_reloc_type r_type = ELF32_R_TYPE (rel->r_info);
4379 unsigned int r_symndx = ELF32_R_SYM (rel->r_info);
4380
e054468f 4381 if (r_symndx >= symtab_hdr->sh_info && is_branch_reloc (r_type))
3a71aa26
AM
4382 {
4383 struct elf_link_hash_entry **sym_hashes = elf_sym_hashes (ibfd);
4384 struct elf_link_hash_entry *h;
4385
4386 h = sym_hashes[r_symndx - symtab_hdr->sh_info];
4387 while (h->root.type == bfd_link_hash_indirect
4388 || h->root.type == bfd_link_hash_warning)
4389 h = (struct elf_link_hash_entry *) h->root.u.i.link;
4390 if (h == hash)
4391 return TRUE;
4392 }
4393 return FALSE;
4394}
4395
25dbc73a
AM
4396/* Run through all the TLS relocs looking for optimization
4397 opportunities. */
252b5132 4398
25dbc73a
AM
4399bfd_boolean
4400ppc_elf_tls_optimize (bfd *obfd ATTRIBUTE_UNUSED,
4401 struct bfd_link_info *info)
252b5132 4402{
7fce784e 4403 bfd *ibfd;
25dbc73a
AM
4404 asection *sec;
4405 struct ppc_elf_link_hash_table *htab;
b7fcf6f6 4406 int pass;
252b5132 4407
3cbc1e5e 4408 if (!bfd_link_executable (info))
25dbc73a 4409 return TRUE;
252b5132 4410
7619e7c7 4411 htab = ppc_elf_hash_table (info);
663a1470
AM
4412 if (htab == NULL)
4413 return FALSE;
4414
b7fcf6f6
AM
4415 /* Make two passes through the relocs. First time check that tls
4416 relocs involved in setting up a tls_get_addr call are indeed
663a1470
AM
4417 followed by such a call. If they are not, don't do any tls
4418 optimization. On the second pass twiddle tls_mask flags to
4419 notify relocate_section that optimization can be done, and
4420 adjust got and plt refcounts. */
b7fcf6f6 4421 for (pass = 0; pass < 2; ++pass)
c72f2fb2 4422 for (ibfd = info->input_bfds; ibfd != NULL; ibfd = ibfd->link.next)
b7fcf6f6 4423 {
0ffa91dd 4424 Elf_Internal_Shdr *symtab_hdr = &elf_symtab_hdr (ibfd);
32af9f6e 4425 asection *got2 = bfd_get_section_by_name (ibfd, ".got2");
7619e7c7 4426
b7fcf6f6
AM
4427 for (sec = ibfd->sections; sec != NULL; sec = sec->next)
4428 if (sec->has_tls_reloc && !bfd_is_abs_section (sec->output_section))
4429 {
4430 Elf_Internal_Rela *relstart, *rel, *relend;
663a1470 4431 int expecting_tls_get_addr = 0;
252b5132 4432
b7fcf6f6
AM
4433 /* Read the relocations. */
4434 relstart = _bfd_elf_link_read_relocs (ibfd, sec, NULL, NULL,
4435 info->keep_memory);
4436 if (relstart == NULL)
4437 return FALSE;
7619e7c7 4438
b7fcf6f6
AM
4439 relend = relstart + sec->reloc_count;
4440 for (rel = relstart; rel < relend; rel++)
4441 {
4442 enum elf_ppc_reloc_type r_type;
4443 unsigned long r_symndx;
4444 struct elf_link_hash_entry *h = NULL;
bac3c8c5 4445 unsigned char *tls_mask;
37da22e5 4446 unsigned char tls_set, tls_clear;
b7fcf6f6 4447 bfd_boolean is_local;
b7fcf6f6
AM
4448 bfd_signed_vma *got_count;
4449
4450 r_symndx = ELF32_R_SYM (rel->r_info);
4451 if (r_symndx >= symtab_hdr->sh_info)
4452 {
4453 struct elf_link_hash_entry **sym_hashes;
7fce784e 4454
b7fcf6f6
AM
4455 sym_hashes = elf_sym_hashes (ibfd);
4456 h = sym_hashes[r_symndx - symtab_hdr->sh_info];
4457 while (h->root.type == bfd_link_hash_indirect
4458 || h->root.type == bfd_link_hash_warning)
4459 h = (struct elf_link_hash_entry *) h->root.u.i.link;
4460 }
7619e7c7 4461
f749f26e 4462 is_local = SYMBOL_REFERENCES_LOCAL (info, h);
b7fcf6f6 4463 r_type = ELF32_R_TYPE (rel->r_info);
663a1470
AM
4464 /* If this section has old-style __tls_get_addr calls
4465 without marker relocs, then check that each
4466 __tls_get_addr call reloc is preceded by a reloc
4467 that conceivably belongs to the __tls_get_addr arg
4468 setup insn. If we don't find matching arg setup
4469 relocs, don't do any tls optimization. */
4470 if (pass == 0
9737e8af 4471 && sec->nomark_tls_get_addr
663a1470
AM
4472 && h != NULL
4473 && h == htab->tls_get_addr
4474 && !expecting_tls_get_addr
4475 && is_branch_reloc (r_type))
4476 {
25f53a85 4477 info->callbacks->minfo ("%H __tls_get_addr lost arg, "
663a1470
AM
4478 "TLS optimization disabled\n",
4479 ibfd, sec, rel->r_offset);
4480 if (elf_section_data (sec)->relocs != relstart)
4481 free (relstart);
4482 return TRUE;
4483 }
4484
4485 expecting_tls_get_addr = 0;
b7fcf6f6
AM
4486 switch (r_type)
4487 {
4488 case R_PPC_GOT_TLSLD16:
4489 case R_PPC_GOT_TLSLD16_LO:
4490 expecting_tls_get_addr = 1;
1a0670f3 4491 /* Fall through. */
b7fcf6f6
AM
4492
4493 case R_PPC_GOT_TLSLD16_HI:
4494 case R_PPC_GOT_TLSLD16_HA:
4495 /* These relocs should never be against a symbol
4496 defined in a shared lib. Leave them alone if
4497 that turns out to be the case. */
4498 if (!is_local)
4499 continue;
4500
4501 /* LD -> LE */
4502 tls_set = 0;
4503 tls_clear = TLS_LD;
4504 break;
4505
4506 case R_PPC_GOT_TLSGD16:
4507 case R_PPC_GOT_TLSGD16_LO:
4508 expecting_tls_get_addr = 1;
1a0670f3 4509 /* Fall through. */
b7fcf6f6
AM
4510
4511 case R_PPC_GOT_TLSGD16_HI:
4512 case R_PPC_GOT_TLSGD16_HA:
4513 if (is_local)
4514 /* GD -> LE */
4515 tls_set = 0;
4516 else
4517 /* GD -> IE */
b00a0a86 4518 tls_set = TLS_TLS | TLS_GDIE;
b7fcf6f6
AM
4519 tls_clear = TLS_GD;
4520 break;
4521
4522 case R_PPC_GOT_TPREL16:
4523 case R_PPC_GOT_TPREL16_LO:
4524 case R_PPC_GOT_TPREL16_HI:
4525 case R_PPC_GOT_TPREL16_HA:
4526 if (is_local)
4527 {
4528 /* IE -> LE */
4529 tls_set = 0;
4530 tls_clear = TLS_TPREL;
4531 break;
4532 }
4533 else
4534 continue;
4535
32af9f6e 4536 case R_PPC_TLSLD:
7d04a20a
AM
4537 if (!is_local)
4538 continue;
4539 /* Fall through. */
4540 case R_PPC_TLSGD:
23cedd1d
AM
4541 if (rel + 1 < relend
4542 && is_plt_seq_reloc (ELF32_R_TYPE (rel[1].r_info)))
4543 {
4544 if (pass != 0
4545 && ELF32_R_TYPE (rel[1].r_info) != R_PPC_PLTSEQ)
4546 {
4547 r_type = ELF32_R_TYPE (rel[1].r_info);
4548 r_symndx = ELF32_R_SYM (rel[1].r_info);
4549 if (r_symndx >= symtab_hdr->sh_info)
4550 {
4551 struct elf_link_hash_entry **sym_hashes;
4552
4553 sym_hashes = elf_sym_hashes (ibfd);
4554 h = sym_hashes[r_symndx - symtab_hdr->sh_info];
4555 while (h->root.type == bfd_link_hash_indirect
4556 || h->root.type == bfd_link_hash_warning)
4557 h = (struct elf_link_hash_entry *) h->root.u.i.link;
4558 if (h != NULL)
4559 {
4560 struct plt_entry *ent = NULL;
4561 bfd_vma addend = 0;
4562
4563 if (bfd_link_pic (info))
4564 addend = rel->r_addend;
4565 ent = find_plt_ent (&h->plt.plist,
4566 got2, addend);
4567 if (ent != NULL
4568 && ent->plt.refcount > 0)
4569 ent->plt.refcount -= 1;
4570 }
4571 }
4572 }
4573 continue;
4574 }
32af9f6e
AM
4575 expecting_tls_get_addr = 2;
4576 tls_set = 0;
4577 tls_clear = 0;
4578 break;
4579
b7fcf6f6 4580 default:
25dbc73a 4581 continue;
b7fcf6f6 4582 }
25dbc73a 4583
b7fcf6f6
AM
4584 if (pass == 0)
4585 {
727fc41e 4586 if (!expecting_tls_get_addr
9737e8af 4587 || !sec->nomark_tls_get_addr)
b7fcf6f6 4588 continue;
25dbc73a 4589
3a71aa26
AM
4590 if (rel + 1 < relend
4591 && branch_reloc_hash_match (ibfd, rel + 1,
4592 htab->tls_get_addr))
4593 continue;
25dbc73a 4594
b7fcf6f6
AM
4595 /* Uh oh, we didn't find the expected call. We
4596 could just mark this symbol to exclude it
4597 from tls optimization but it's safer to skip
663a1470 4598 the entire optimization. */
25f53a85 4599 info->callbacks->minfo (_("%H arg lost __tls_get_addr, "
663a1470
AM
4600 "TLS optimization disabled\n"),
4601 ibfd, sec, rel->r_offset);
4602 if (elf_section_data (sec)->relocs != relstart)
4603 free (relstart);
4604 return TRUE;
b7fcf6f6 4605 }
25dbc73a 4606
b7fcf6f6
AM
4607 if (h != NULL)
4608 {
4609 tls_mask = &ppc_elf_hash_entry (h)->tls_mask;
4610 got_count = &h->got.refcount;
4611 }
4612 else
4613 {
b7fcf6f6 4614 bfd_signed_vma *lgot_refs;
e054468f 4615 struct plt_entry **local_plt;
bac3c8c5 4616 unsigned char *lgot_masks;
25dbc73a 4617
b7fcf6f6
AM
4618 lgot_refs = elf_local_got_refcounts (ibfd);
4619 if (lgot_refs == NULL)
4620 abort ();
e054468f
AM
4621 local_plt = (struct plt_entry **)
4622 (lgot_refs + symtab_hdr->sh_info);
bac3c8c5
AM
4623 lgot_masks = (unsigned char *)
4624 (local_plt + symtab_hdr->sh_info);
b7fcf6f6
AM
4625 tls_mask = &lgot_masks[r_symndx];
4626 got_count = &lgot_refs[r_symndx];
4627 }
25dbc73a 4628
37da22e5
AM
4629 /* If we don't have old-style __tls_get_addr calls
4630 without TLSGD/TLSLD marker relocs, and we haven't
4631 found a new-style __tls_get_addr call with a
4632 marker for this symbol, then we either have a
4633 broken object file or an -mlongcall style
4634 indirect call to __tls_get_addr without a marker.
4635 Disable optimization in this case. */
4636 if ((tls_clear & (TLS_GD | TLS_LD)) != 0
9737e8af 4637 && !sec->nomark_tls_get_addr
37da22e5
AM
4638 && ((*tls_mask & (TLS_TLS | TLS_MARK))
4639 != (TLS_TLS | TLS_MARK)))
4640 continue;
4641
7d04a20a 4642 if (expecting_tls_get_addr == 1 + !sec->nomark_tls_get_addr)
37da22e5
AM
4643 {
4644 struct plt_entry *ent;
4645 bfd_vma addend = 0;
4646
4647 if (bfd_link_pic (info)
23cedd1d
AM
4648 && (ELF32_R_TYPE (rel[1].r_info) == R_PPC_PLTREL24
4649 || ELF32_R_TYPE (rel[1].r_info) == R_PPC_PLTCALL))
37da22e5
AM
4650 addend = rel[1].r_addend;
4651 ent = find_plt_ent (&htab->tls_get_addr->plt.plist,
4652 got2, addend);
4653 if (ent != NULL && ent->plt.refcount > 0)
4654 ent->plt.refcount -= 1;
37da22e5 4655 }
7d04a20a
AM
4656 if (tls_clear == 0)
4657 continue;
37da22e5 4658
b7fcf6f6
AM
4659 if (tls_set == 0)
4660 {
4661 /* We managed to get rid of a got entry. */
4662 if (*got_count > 0)
4663 *got_count -= 1;
4664 }
25dbc73a 4665
b7fcf6f6
AM
4666 *tls_mask |= tls_set;
4667 *tls_mask &= ~tls_clear;
4668 }
25dbc73a 4669
b7fcf6f6
AM
4670 if (elf_section_data (sec)->relocs != relstart)
4671 free (relstart);
4672 }
b7fcf6f6 4673 }
9a23f96e 4674 htab->do_tls_opt = 1;
25dbc73a
AM
4675 return TRUE;
4676}
4677\f
98bbb1b8 4678/* Find dynamic relocs for H that apply to read-only sections. */
625af618 4679
98bbb1b8
AM
4680static asection *
4681readonly_dynrelocs (struct elf_link_hash_entry *h)
625af618 4682{
6061a67d 4683 struct elf_dyn_relocs *p;
625af618
AM
4684
4685 for (p = ppc_elf_hash_entry (h)->dyn_relocs; p != NULL; p = p->next)
4686 {
4687 asection *s = p->sec->output_section;
4688
98bbb1b8
AM
4689 if (s != NULL && (s->flags & SEC_READONLY) != 0)
4690 return p->sec;
625af618 4691 }
98bbb1b8 4692 return NULL;
625af618
AM
4693}
4694
287c7eaf
AM
4695/* Return true if we have dynamic relocs against H or any of its weak
4696 aliases, that apply to read-only sections. Cannot be used after
4697 size_dynamic_sections. */
4698
4699static bfd_boolean
4700alias_readonly_dynrelocs (struct elf_link_hash_entry *h)
4701{
4702 struct ppc_elf_link_hash_entry *eh = ppc_elf_hash_entry (h);
4703 do
4704 {
4705 if (readonly_dynrelocs (&eh->elf))
4706 return TRUE;
4707 eh = ppc_elf_hash_entry (eh->elf.u.alias);
4708 } while (eh != NULL && &eh->elf != h);
4709
4710 return FALSE;
4711}
4712
4713/* Return whether H has pc-relative dynamic relocs. */
4714
4715static bfd_boolean
4716pc_dynrelocs (struct elf_link_hash_entry *h)
4717{
4718 struct elf_dyn_relocs *p;
4719
4720 for (p = ppc_elf_hash_entry (h)->dyn_relocs; p != NULL; p = p->next)
4721 if (p->pc_count != 0)
4722 return TRUE;
4723 return FALSE;
4724}
4725
25dbc73a
AM
4726/* Adjust a symbol defined by a dynamic object and referenced by a
4727 regular object. The current definition is in some section of the
4728 dynamic object, but we're not including those sections. We have to
4729 change the definition to something the rest of the link can
4730 understand. */
7fce784e 4731
25dbc73a
AM
4732static bfd_boolean
4733ppc_elf_adjust_dynamic_symbol (struct bfd_link_info *info,
4734 struct elf_link_hash_entry *h)
4735{
4736 struct ppc_elf_link_hash_table *htab;
4737 asection *s;
7fce784e 4738
25dbc73a
AM
4739#ifdef DEBUG
4740 fprintf (stderr, "ppc_elf_adjust_dynamic_symbol called for %s\n",
4741 h->root.root.string);
4742#endif
252b5132 4743
25dbc73a
AM
4744 /* Make sure we know what is going on here. */
4745 htab = ppc_elf_hash_table (info);
4746 BFD_ASSERT (htab->elf.dynobj != NULL
4747 && (h->needs_plt
91e21fb7 4748 || h->type == STT_GNU_IFUNC
60d67dc8 4749 || h->is_weakalias
25dbc73a
AM
4750 || (h->def_dynamic
4751 && h->ref_regular
4752 && !h->def_regular)));
252b5132 4753
25dbc73a
AM
4754 /* Deal with function syms. */
4755 if (h->type == STT_FUNC
e054468f 4756 || h->type == STT_GNU_IFUNC
25dbc73a
AM
4757 || h->needs_plt)
4758 {
529fe20e
AM
4759 bfd_boolean local = (SYMBOL_CALLS_LOCAL (info, h)
4760 || UNDEFWEAK_NO_DYNAMIC_RELOC (info, h));
287c7eaf
AM
4761 /* Discard dyn_relocs when non-pic if we've decided that a
4762 function symbol is local. */
4763 if (!bfd_link_pic (info) && local)
4764 ppc_elf_hash_entry (h)->dyn_relocs = NULL;
529fe20e 4765
25dbc73a
AM
4766 /* Clear procedure linkage table information for any symbol that
4767 won't need a .plt entry. */
a6aa5195
AM
4768 struct plt_entry *ent;
4769 for (ent = h->plt.plist; ent != NULL; ent = ent->next)
4770 if (ent->plt.refcount > 0)
4771 break;
4772 if (ent == NULL
2d7ad24e
AM
4773 || (h->type != STT_GNU_IFUNC
4774 && local
3e04d765
AM
4775 && (htab->can_convert_all_inline_plt
4776 || (ppc_elf_hash_entry (h)->tls_mask
4777 & (TLS_TLS | PLT_KEEP)) != PLT_KEEP)))
252b5132 4778 {
25dbc73a 4779 /* A PLT entry is not required/allowed when:
252b5132 4780
25dbc73a
AM
4781 1. We are not using ld.so; because then the PLT entry
4782 can't be set up, so we can't use one. In this case,
4783 ppc_elf_adjust_dynamic_symbol won't even be called.
252b5132 4784
25dbc73a
AM
4785 2. GC has rendered the entry unused.
4786
4787 3. We know for certain that a call to this symbol
4788 will go to this object, or will remain undefined. */
a6aa5195 4789 h->plt.plist = NULL;
25dbc73a 4790 h->needs_plt = 0;
d1eca1e4 4791 h->pointer_equality_needed = 0;
25dbc73a 4792 }
625af618
AM
4793 else
4794 {
d1eca1e4
AM
4795 /* Taking a function's address in a read/write section
4796 doesn't require us to define the function symbol in the
1009ef28 4797 executable on a plt call stub. A dynamic reloc can
f0158f44
AM
4798 be used instead, giving better runtime performance.
4799 (Calls via that function pointer don't need to bounce
4800 through the plt call stub.) Similarly, use a dynamic
4801 reloc for a weak reference when possible, allowing the
4802 resolution of the symbol to be set at load time rather
4803 than link time. */
4804 if ((h->pointer_equality_needed
3988aed5
AM
4805 || (h->non_got_ref
4806 && !h->ref_regular_nonweak
4807 && !UNDEFWEAK_NO_DYNAMIC_RELOC (info, h)))
1009ef28
AM
4808 && !htab->is_vxworks
4809 && !ppc_elf_hash_entry (h)->has_sda_refs
98bbb1b8 4810 && !readonly_dynrelocs (h))
d1eca1e4
AM
4811 {
4812 h->pointer_equality_needed = 0;
04383fd1
AM
4813 /* If we haven't seen a branch reloc and the symbol
4814 isn't an ifunc then we don't need a plt entry. */
4815 if (!h->needs_plt && h->type != STT_GNU_IFUNC)
3988aed5 4816 h->plt.plist = NULL;
d1eca1e4 4817 }
287c7eaf 4818 else if (!bfd_link_pic (info))
529fe20e
AM
4819 /* We are going to be defining the function symbol on the
4820 plt stub, so no dyn_relocs needed when non-pic. */
287c7eaf 4821 ppc_elf_hash_entry (h)->dyn_relocs = NULL;
625af618 4822 }
d3e454b9 4823 h->protected_def = 0;
3988aed5 4824 /* Function symbols can't have copy relocs. */
25dbc73a 4825 return TRUE;
252b5132 4826 }
25dbc73a 4827 else
a6aa5195 4828 h->plt.plist = NULL;
252b5132 4829
25dbc73a
AM
4830 /* If this is a weak symbol, and there is a real definition, the
4831 processor independent code will have arranged for us to see the
4832 real definition first, and we can just use the same value. */
60d67dc8 4833 if (h->is_weakalias)
252b5132 4834 {
60d67dc8
AM
4835 struct elf_link_hash_entry *def = weakdef (h);
4836 BFD_ASSERT (def->root.type == bfd_link_hash_defined);
4837 h->root.u.def.section = def->root.u.def.section;
4838 h->root.u.def.value = def->root.u.def.value;
4a7e5234
AM
4839 if (def->root.u.def.section == htab->elf.sdynbss
4840 || def->root.u.def.section == htab->elf.sdynrelro
4841 || def->root.u.def.section == htab->dynsbss)
4842 ppc_elf_hash_entry (h)->dyn_relocs = NULL;
25dbc73a
AM
4843 return TRUE;
4844 }
dc810e39 4845
25dbc73a
AM
4846 /* This is a reference to a symbol defined by a dynamic object which
4847 is not a function. */
252b5132 4848
25dbc73a
AM
4849 /* If we are creating a shared library, we must presume that the
4850 only references to the symbol are via the global offset table.
4851 For such cases we need not do anything here; the relocations will
4852 be handled correctly by relocate_section. */
0e1862bb 4853 if (bfd_link_pic (info))
d3e454b9
AM
4854 {
4855 h->protected_def = 0;
4856 return TRUE;
4857 }
252b5132 4858
25dbc73a
AM
4859 /* If there are no references to this symbol that do not use the
4860 GOT, we don't need to generate a copy reloc. */
4861 if (!h->non_got_ref)
d3e454b9
AM
4862 {
4863 h->protected_def = 0;
4864 return TRUE;
4865 }
4866
4867 /* Protected variables do not work with .dynbss. The copy in
4868 .dynbss won't be used by the shared library with the protected
4869 definition for the variable. Editing to PIC, or text relocations
4870 are preferable to an incorrect program. */
4871 if (h->protected_def)
4872 {
4873 if (ELIMINATE_COPY_RELOCS
4874 && ppc_elf_hash_entry (h)->has_addr16_ha
4875 && ppc_elf_hash_entry (h)->has_addr16_lo
4876 && htab->params->pic_fixup == 0
4877 && info->disable_target_specific_optimizations <= 1)
4878 htab->params->pic_fixup = 1;
d3e454b9
AM
4879 return TRUE;
4880 }
25dbc73a 4881
a127494f
AM
4882 /* If -z nocopyreloc was given, we won't generate them either. */
4883 if (info->nocopyreloc)
529fe20e 4884 return TRUE;
a127494f 4885
dce2246a 4886 /* If we don't find any dynamic relocs in read-only sections, then
cfd2c773
NS
4887 we'll be keeping the dynamic relocs and avoiding the copy reloc.
4888 We can't do this if there are any small data relocations. This
4889 doesn't work on VxWorks, where we can not have dynamic
4890 relocations (other than copy and jump slot relocations) in an
4891 executable. */
4dc4a9a5 4892 if (ELIMINATE_COPY_RELOCS
cfd2c773 4893 && !ppc_elf_hash_entry (h)->has_sda_refs
625af618
AM
4894 && !htab->is_vxworks
4895 && !h->def_regular
287c7eaf 4896 && !alias_readonly_dynrelocs (h))
529fe20e 4897 return TRUE;
252b5132 4898
25dbc73a
AM
4899 /* We must allocate the symbol in our .dynbss section, which will
4900 become part of the .bss section of the executable. There will be
4901 an entry for this symbol in the .dynsym section. The dynamic
4902 object will contain position independent code, so all references
4903 from the dynamic object to this symbol will go through the global
4904 offset table. The dynamic linker will use the .dynsym entry to
4905 determine the address it must put in the global offset table, so
4906 both the dynamic object and the regular object will refer to the
4907 same memory location for the variable.
4908
4dc4a9a5
DJ
4909 Of course, if the symbol is referenced using SDAREL relocs, we
4910 must instead allocate it in .sbss. */
4dc4a9a5 4911 if (ppc_elf_hash_entry (h)->has_sda_refs)
25dbc73a 4912 s = htab->dynsbss;
5474d94f
AM
4913 else if ((h->root.u.def.section->flags & SEC_READONLY) != 0)
4914 s = htab->elf.sdynrelro;
25dbc73a 4915 else
9d19e4fd 4916 s = htab->elf.sdynbss;
25dbc73a
AM
4917 BFD_ASSERT (s != NULL);
4918
1d7e9d18 4919 if ((h->root.u.def.section->flags & SEC_ALLOC) != 0 && h->size != 0)
25dbc73a
AM
4920 {
4921 asection *srel;
4922
4a7e5234
AM
4923 /* We must generate a R_PPC_COPY reloc to tell the dynamic
4924 linker to copy the initial value out of the dynamic object
4925 and into the runtime process image. */
4dc4a9a5 4926 if (ppc_elf_hash_entry (h)->has_sda_refs)
25dbc73a 4927 srel = htab->relsbss;
5474d94f
AM
4928 else if ((h->root.u.def.section->flags & SEC_READONLY) != 0)
4929 srel = htab->elf.sreldynrelro;
25dbc73a 4930 else
9d19e4fd 4931 srel = htab->elf.srelbss;
25dbc73a
AM
4932 BFD_ASSERT (srel != NULL);
4933 srel->size += sizeof (Elf32_External_Rela);
4934 h->needs_copy = 1;
4935 }
7619e7c7 4936
529fe20e 4937 /* We no longer want dyn_relocs. */
287c7eaf 4938 ppc_elf_hash_entry (h)->dyn_relocs = NULL;
6cabe1ea 4939 return _bfd_elf_adjust_dynamic_copy (info, h, s);
25dbc73a
AM
4940}
4941\f
ac39eb42
AM
4942/* Generate a symbol to mark plt call stubs. For non-PIC code the sym is
4943 xxxxxxxx.plt_call32.<callee> where xxxxxxxx is a hex number, usually 0,
4944 specifying the addend on the plt relocation. For -fpic code, the sym
4945 is xxxxxxxx.plt_pic32.<callee>, and for -fPIC
4946 xxxxxxxx.got2.plt_pic32.<callee>. */
0ba07910
AM
4947
4948static bfd_boolean
4949add_stub_sym (struct plt_entry *ent,
4950 struct elf_link_hash_entry *h,
ac39eb42 4951 struct bfd_link_info *info)
0ba07910
AM
4952{
4953 struct elf_link_hash_entry *sh;
4954 size_t len1, len2, len3;
4955 char *name;
ac39eb42
AM
4956 const char *stub;
4957 struct ppc_elf_link_hash_table *htab = ppc_elf_hash_table (info);
4958
0e1862bb 4959 if (bfd_link_pic (info))
ac39eb42
AM
4960 stub = ".plt_pic32.";
4961 else
4962 stub = ".plt_call32.";
0ba07910
AM
4963
4964 len1 = strlen (h->root.root.string);
ac39eb42 4965 len2 = strlen (stub);
0ba07910
AM
4966 len3 = 0;
4967 if (ent->sec)
4968 len3 = strlen (ent->sec->name);
ac39eb42 4969 name = bfd_malloc (len1 + len2 + len3 + 9);
0ba07910
AM
4970 if (name == NULL)
4971 return FALSE;
4972 sprintf (name, "%08x", (unsigned) ent->addend & 0xffffffff);
4973 if (ent->sec)
4974 memcpy (name + 8, ent->sec->name, len3);
ac39eb42
AM
4975 memcpy (name + 8 + len3, stub, len2);
4976 memcpy (name + 8 + len3 + len2, h->root.root.string, len1 + 1);
0ba07910
AM
4977 sh = elf_link_hash_lookup (&htab->elf, name, TRUE, FALSE, FALSE);
4978 if (sh == NULL)
4979 return FALSE;
4980 if (sh->root.type == bfd_link_hash_new)
4981 {
4982 sh->root.type = bfd_link_hash_defined;
4983 sh->root.u.def.section = htab->glink;
4984 sh->root.u.def.value = ent->glink_offset;
4985 sh->ref_regular = 1;
4986 sh->def_regular = 1;
4987 sh->ref_regular_nonweak = 1;
4988 sh->forced_local = 1;
4989 sh->non_elf = 0;
2ec55de3 4990 sh->root.linker_def = 1;
0ba07910
AM
4991 }
4992 return TRUE;
4993}
4994
3b36f7e6
AM
4995/* Allocate NEED contiguous space in .got, and return the offset.
4996 Handles allocation of the got header when crossing 32k. */
4997
4998static bfd_vma
4999allocate_got (struct ppc_elf_link_hash_table *htab, unsigned int need)
5000{
5001 bfd_vma where;
4a3dc543 5002 unsigned int max_before_header;
3b36f7e6 5003
4a3dc543 5004 if (htab->plt_type == PLT_VXWORKS)
9d8504b1 5005 {
ce558b89
AM
5006 where = htab->elf.sgot->size;
5007 htab->elf.sgot->size += need;
9d8504b1 5008 }
3b36f7e6
AM
5009 else
5010 {
4a3dc543
RS
5011 max_before_header = htab->plt_type == PLT_NEW ? 32768 : 32764;
5012 if (need <= htab->got_gap)
3b36f7e6 5013 {
4a3dc543
RS
5014 where = max_before_header - htab->got_gap;
5015 htab->got_gap -= need;
5016 }
5017 else
5018 {
ce558b89
AM
5019 if (htab->elf.sgot->size + need > max_before_header
5020 && htab->elf.sgot->size <= max_before_header)
4a3dc543 5021 {
ce558b89
AM
5022 htab->got_gap = max_before_header - htab->elf.sgot->size;
5023 htab->elf.sgot->size = max_before_header + htab->got_header_size;
4a3dc543 5024 }
ce558b89
AM
5025 where = htab->elf.sgot->size;
5026 htab->elf.sgot->size += need;
3b36f7e6 5027 }
3b36f7e6
AM
5028 }
5029 return where;
5030}
5031
f15d0b54
AM
5032/* Calculate size of GOT entries for symbol given its TLS_MASK.
5033 TLS_LD is excluded because those go in a special GOT slot. */
5034
5035static inline unsigned int
5036got_entries_needed (int tls_mask)
5037{
5038 unsigned int need;
5039 if ((tls_mask & TLS_TLS) == 0)
5040 need = 4;
5041 else
5042 {
5043 need = 0;
5044 if ((tls_mask & TLS_GD) != 0)
5045 need += 8;
b00a0a86 5046 if ((tls_mask & (TLS_TPREL | TLS_GDIE)) != 0)
f15d0b54
AM
5047 need += 4;
5048 if ((tls_mask & TLS_DTPREL) != 0)
5049 need += 4;
5050 }
5051 return need;
5052}
5053
46434633 5054/* If H is undefined, make it dynamic if that makes sense. */
f0158f44
AM
5055
5056static bfd_boolean
46434633
AM
5057ensure_undef_dynamic (struct bfd_link_info *info,
5058 struct elf_link_hash_entry *h)
f0158f44
AM
5059{
5060 struct elf_link_hash_table *htab = elf_hash_table (info);
5061
5062 if (htab->dynamic_sections_created
46434633
AM
5063 && ((info->dynamic_undefined_weak != 0
5064 && h->root.type == bfd_link_hash_undefweak)
5065 || h->root.type == bfd_link_hash_undefined)
f0158f44
AM
5066 && h->dynindx == -1
5067 && !h->forced_local
5068 && ELF_ST_VISIBILITY (h->other) == STV_DEFAULT)
5069 return bfd_elf_link_record_dynamic_symbol (info, h);
5070 return TRUE;
5071}
5072
25dbc73a 5073/* Allocate space in associated reloc sections for dynamic relocs. */
252b5132 5074
b34976b6 5075static bfd_boolean
25dbc73a 5076allocate_dynrelocs (struct elf_link_hash_entry *h, void *inf)
252b5132 5077{
25dbc73a
AM
5078 struct bfd_link_info *info = inf;
5079 struct ppc_elf_link_hash_entry *eh;
7619e7c7 5080 struct ppc_elf_link_hash_table *htab;
6061a67d 5081 struct elf_dyn_relocs *p;
f0158f44 5082 bfd_boolean dyn;
252b5132 5083
25dbc73a 5084 if (h->root.type == bfd_link_hash_indirect)
b34976b6 5085 return TRUE;
252b5132 5086
7619e7c7 5087 htab = ppc_elf_hash_table (info);
25dbc73a 5088 eh = (struct ppc_elf_link_hash_entry *) h;
d3e454b9
AM
5089 if (eh->elf.got.refcount > 0
5090 || (ELIMINATE_COPY_RELOCS
5091 && !eh->elf.def_regular
5092 && eh->elf.protected_def
5093 && eh->has_addr16_ha
5094 && eh->has_addr16_lo
5095 && htab->params->pic_fixup > 0))
25dbc73a 5096 {
d6e14abc
AM
5097 unsigned int need;
5098
46434633
AM
5099 /* Make sure this symbol is output as a dynamic symbol. */
5100 if (!ensure_undef_dynamic (info, &eh->elf))
f0158f44 5101 return FALSE;
252b5132 5102
d6e14abc 5103 need = 0;
37da22e5 5104 if ((eh->tls_mask & (TLS_TLS | TLS_LD)) == (TLS_TLS | TLS_LD))
25dbc73a 5105 {
f749f26e 5106 if (SYMBOL_REFERENCES_LOCAL (info, &eh->elf))
f15d0b54
AM
5107 /* We'll just use htab->tlsld_got.offset. This should
5108 always be the case. It's a little odd if we have
5109 a local dynamic reloc against a non-local symbol. */
5110 htab->tlsld_got.refcount += 1;
5111 else
d6e14abc 5112 need += 8;
d6e14abc 5113 }
f15d0b54 5114 need += got_entries_needed (eh->tls_mask);
d6e14abc
AM
5115 if (need == 0)
5116 eh->elf.got.offset = (bfd_vma) -1;
5117 else
5118 {
3b36f7e6 5119 eh->elf.got.offset = allocate_got (htab, need);
f749f26e
AM
5120 if (((bfd_link_pic (info)
5121 && !((eh->tls_mask & TLS_TLS) != 0
5122 && bfd_link_executable (info)
5123 && SYMBOL_REFERENCES_LOCAL (info, &eh->elf)))
f0158f44
AM
5124 || (htab->elf.dynamic_sections_created
5125 && eh->elf.dynindx != -1
5126 && !SYMBOL_REFERENCES_LOCAL (info, &eh->elf)))
21d68fcd 5127 && !UNDEFWEAK_NO_DYNAMIC_RELOC (info, &eh->elf))
252b5132 5128 {
f15d0b54 5129 asection *rsec;
f15d0b54 5130
f749f26e
AM
5131 need *= sizeof (Elf32_External_Rela) / 4;
5132 if ((eh->tls_mask & (TLS_TLS | TLS_LD)) == (TLS_TLS | TLS_LD))
f15d0b54
AM
5133 need -= sizeof (Elf32_External_Rela);
5134 rsec = htab->elf.srelgot;
0bed072f 5135 if (eh->elf.type == STT_GNU_IFUNC)
ce558b89 5136 rsec = htab->elf.irelplt;
f15d0b54 5137 rsec->size += need;
252b5132 5138 }
25dbc73a
AM
5139 }
5140 }
5141 else
5142 eh->elf.got.offset = (bfd_vma) -1;
252b5132 5143
954b63d4
AM
5144 /* If no dynamic sections we can't have dynamic relocs, except for
5145 IFUNCs which are handled even in static executables. */
f0158f44
AM
5146 if (!htab->elf.dynamic_sections_created
5147 && h->type != STT_GNU_IFUNC)
5148 eh->dyn_relocs = NULL;
5149
529fe20e
AM
5150 /* Discard relocs on undefined symbols that must be local. */
5151 else if (h->root.type == bfd_link_hash_undefined
5152 && ELF_ST_VISIBILITY (h->other) != STV_DEFAULT)
5153 eh->dyn_relocs = NULL;
5154
5155 /* Also discard relocs on undefined weak syms with non-default
5156 visibility, or when dynamic_undefined_weak says so. */
5157 else if (UNDEFWEAK_NO_DYNAMIC_RELOC (info, h))
5158 eh->dyn_relocs = NULL;
5159
f0158f44 5160 if (eh->dyn_relocs == NULL)
287c7eaf 5161 ;
252b5132 5162
25dbc73a
AM
5163 /* In the shared -Bsymbolic case, discard space allocated for
5164 dynamic pc-relative relocs against symbols which turn out to be
5165 defined in regular objects. For the normal shared case, discard
5166 space for relocs that have become local due to symbol visibility
5167 changes. */
f0158f44 5168 else if (bfd_link_pic (info))
25dbc73a
AM
5169 {
5170 /* Relocs that use pc_count are those that appear on a call insn,
1d483afe 5171 or certain REL relocs (see must_be_dyn_reloc) that can be
25dbc73a
AM
5172 generated via assembly. We want calls to protected symbols to
5173 resolve directly to the function rather than going via the plt.
5174 If people want function pointer comparisons to work as expected
5175 then they should avoid writing weird assembly. */
529fe20e 5176 if (SYMBOL_CALLS_LOCAL (info, h))
25dbc73a 5177 {
6061a67d 5178 struct elf_dyn_relocs **pp;
25dbc73a
AM
5179
5180 for (pp = &eh->dyn_relocs; (p = *pp) != NULL; )
252b5132 5181 {
25dbc73a
AM
5182 p->count -= p->pc_count;
5183 p->pc_count = 0;
5184 if (p->count == 0)
5185 *pp = p->next;
5186 else
5187 pp = &p->next;
252b5132 5188 }
25dbc73a 5189 }
252b5132 5190
3348747a
NS
5191 if (htab->is_vxworks)
5192 {
6061a67d 5193 struct elf_dyn_relocs **pp;
3348747a
NS
5194
5195 for (pp = &eh->dyn_relocs; (p = *pp) != NULL; )
5196 {
5197 if (strcmp (p->sec->output_section->name, ".tls_vars") == 0)
5198 *pp = p->next;
5199 else
5200 pp = &p->next;
5201 }
5202 }
5203
954b63d4 5204 if (eh->dyn_relocs != NULL)
25dbc73a 5205 {
46434633
AM
5206 /* Make sure this symbol is output as a dynamic symbol. */
5207 if (!ensure_undef_dynamic (info, h))
f0158f44 5208 return FALSE;
25dbc73a
AM
5209 }
5210 }
5211 else if (ELIMINATE_COPY_RELOCS)
5212 {
f0158f44 5213 /* For the non-pic case, discard space for relocs against
25dbc73a
AM
5214 symbols which turn out to need copy relocs or are not
5215 dynamic. */
529fe20e 5216 if (h->dynamic_adjusted
d3e454b9 5217 && !h->def_regular
529fe20e 5218 && !ELF_COMMON_DEF_P (h)
d3e454b9
AM
5219 && !(h->protected_def
5220 && eh->has_addr16_ha
5221 && eh->has_addr16_lo
5222 && htab->params->pic_fixup > 0))
25dbc73a 5223 {
46434633
AM
5224 /* Make sure this symbol is output as a dynamic symbol. */
5225 if (!ensure_undef_dynamic (info, h))
f0158f44 5226 return FALSE;
7619e7c7 5227
f0158f44 5228 if (h->dynindx == -1)
287c7eaf 5229 eh->dyn_relocs = NULL;
25dbc73a 5230 }
f0158f44 5231 else
287c7eaf 5232 eh->dyn_relocs = NULL;
25dbc73a 5233 }
252b5132 5234
f0158f44 5235 /* Allocate space. */
25dbc73a
AM
5236 for (p = eh->dyn_relocs; p != NULL; p = p->next)
5237 {
5238 asection *sreloc = elf_section_data (p->sec)->sreloc;
f95f8542 5239 if (eh->elf.type == STT_GNU_IFUNC)
ce558b89 5240 sreloc = htab->elf.irelplt;
25dbc73a
AM
5241 sreloc->size += p->count * sizeof (Elf32_External_Rela);
5242 }
252b5132 5243
2d7ad24e
AM
5244 /* Handle PLT relocs. Done last, after dynindx has settled.
5245 We might need a PLT entry when the symbol
5246 a) is dynamic, or
5247 b) is an ifunc, or
5248 c) has plt16 relocs and has been processed by adjust_dynamic_symbol, or
5249 d) has plt16 relocs and we are linking statically. */
f0158f44 5250 dyn = htab->elf.dynamic_sections_created && h->dynindx != -1;
2d7ad24e
AM
5251 if (dyn
5252 || h->type == STT_GNU_IFUNC
5253 || (h->needs_plt && h->dynamic_adjusted)
5254 || (h->needs_plt
5255 && h->def_regular
5256 && !htab->elf.dynamic_sections_created
3e04d765 5257 && !htab->can_convert_all_inline_plt
2d7ad24e
AM
5258 && (ppc_elf_hash_entry (h)->tls_mask
5259 & (TLS_TLS | PLT_KEEP)) == PLT_KEEP))
f0158f44
AM
5260 {
5261 struct plt_entry *ent;
5262 bfd_boolean doneone = FALSE;
2d7ad24e 5263 bfd_vma plt_offset = 0, glink_offset = (bfd_vma) -1;
f0158f44
AM
5264
5265 for (ent = h->plt.plist; ent != NULL; ent = ent->next)
5266 if (ent->plt.refcount > 0)
5267 {
5268 asection *s = htab->elf.splt;
5269
5270 if (!dyn)
2d7ad24e
AM
5271 {
5272 if (h->type == STT_GNU_IFUNC)
5273 s = htab->elf.iplt;
5274 else
5275 s = htab->pltlocal;
5276 }
f0158f44
AM
5277
5278 if (htab->plt_type == PLT_NEW || !dyn)
5279 {
5280 if (!doneone)
5281 {
5282 plt_offset = s->size;
5283 s->size += 4;
5284 }
5285 ent->plt.offset = plt_offset;
5286
2d7ad24e
AM
5287 if (s == htab->pltlocal)
5288 ent->glink_offset = glink_offset;
5289 else
f0158f44 5290 {
2d7ad24e
AM
5291 s = htab->glink;
5292 if (!doneone || bfd_link_pic (info))
5293 {
5294 glink_offset = s->size;
5295 s->size += GLINK_ENTRY_SIZE (htab, h);
5296 }
5297 if (!doneone
5298 && !bfd_link_pic (info)
5299 && h->def_dynamic
5300 && !h->def_regular)
5301 {
5302 h->root.u.def.section = s;
5303 h->root.u.def.value = glink_offset;
5304 }
5305 ent->glink_offset = glink_offset;
f0158f44 5306
2d7ad24e
AM
5307 if (htab->params->emit_stub_syms
5308 && !add_stub_sym (ent, h, info))
5309 return FALSE;
5310 }
f0158f44
AM
5311 }
5312 else
5313 {
5314 if (!doneone)
5315 {
5316 /* If this is the first .plt entry, make room
5317 for the special first entry. */
5318 if (s->size == 0)
5319 s->size += htab->plt_initial_entry_size;
5320
5321 /* The PowerPC PLT is actually composed of two
5322 parts, the first part is 2 words (for a load
5323 and a jump), and then there is a remaining
5324 word available at the end. */
5325 plt_offset = (htab->plt_initial_entry_size
5326 + (htab->plt_slot_size
5327 * ((s->size
5328 - htab->plt_initial_entry_size)
5329 / htab->plt_entry_size)));
5330
5331 /* If this symbol is not defined in a regular
5332 file, and we are not generating a shared
5333 library, then set the symbol to this location
5334 in the .plt. This is to avoid text
5335 relocations, and is required to make
5336 function pointers compare as equal between
5337 the normal executable and the shared library. */
5338 if (! bfd_link_pic (info)
5339 && h->def_dynamic
5340 && !h->def_regular)
5341 {
5342 h->root.u.def.section = s;
5343 h->root.u.def.value = plt_offset;
5344 }
5345
5346 /* Make room for this entry. */
5347 s->size += htab->plt_entry_size;
5348 /* After the 8192nd entry, room for two entries
5349 is allocated. */
5350 if (htab->plt_type == PLT_OLD
5351 && (s->size - htab->plt_initial_entry_size)
5352 / htab->plt_entry_size
5353 > PLT_NUM_SINGLE_ENTRIES)
5354 s->size += htab->plt_entry_size;
5355 }
5356 ent->plt.offset = plt_offset;
5357 }
5358
5359 /* We also need to make an entry in the .rela.plt section. */
5360 if (!doneone)
5361 {
5362 if (!dyn)
2d7ad24e
AM
5363 {
5364 if (h->type == STT_GNU_IFUNC)
5365 {
5366 s = htab->elf.irelplt;
5367 s->size += sizeof (Elf32_External_Rela);
5368 }
5369 else if (bfd_link_pic (info))
5370 {
5371 s = htab->relpltlocal;
5372 s->size += sizeof (Elf32_External_Rela);
5373 }
5374 }
f0158f44
AM
5375 else
5376 {
5377 htab->elf.srelplt->size += sizeof (Elf32_External_Rela);
5378
5379 if (htab->plt_type == PLT_VXWORKS)
5380 {
5381 /* Allocate space for the unloaded relocations. */
5382 if (!bfd_link_pic (info)
5383 && htab->elf.dynamic_sections_created)
5384 {
5385 if (ent->plt.offset
5386 == (bfd_vma) htab->plt_initial_entry_size)
5387 {
5388 htab->srelplt2->size
5389 += (sizeof (Elf32_External_Rela)
5390 * VXWORKS_PLTRESOLVE_RELOCS);
5391 }
5392
5393 htab->srelplt2->size
5394 += (sizeof (Elf32_External_Rela)
5395 * VXWORKS_PLT_NON_JMP_SLOT_RELOCS);
5396 }
5397
5398 /* Every PLT entry has an associated GOT entry in
5399 .got.plt. */
5400 htab->elf.sgotplt->size += 4;
5401 }
5402 }
5403 doneone = TRUE;
5404 }
5405 }
5406 else
5407 ent->plt.offset = (bfd_vma) -1;
5408
5409 if (!doneone)
5410 {
5411 h->plt.plist = NULL;
5412 h->needs_plt = 0;
5413 }
5414 }
5415 else
5416 {
5417 h->plt.plist = NULL;
5418 h->needs_plt = 0;
5419 }
5420
25dbc73a
AM
5421 return TRUE;
5422}
7619e7c7 5423
625af618
AM
5424/* Set DF_TEXTREL if we find any dynamic relocs that apply to
5425 read-only sections. */
7619e7c7 5426
25dbc73a 5427static bfd_boolean
0caf6c82 5428maybe_set_textrel (struct elf_link_hash_entry *h, void *info_p)
25dbc73a 5429{
98bbb1b8 5430 asection *sec;
0caf6c82 5431
25dbc73a
AM
5432 if (h->root.type == bfd_link_hash_indirect)
5433 return TRUE;
252b5132 5434
98bbb1b8
AM
5435 sec = readonly_dynrelocs (h);
5436 if (sec != NULL)
25dbc73a 5437 {
98bbb1b8
AM
5438 struct bfd_link_info *info = (struct bfd_link_info *) info_p;
5439
0caf6c82 5440 info->flags |= DF_TEXTREL;
98bbb1b8 5441 info->callbacks->minfo
c1c8c1ef 5442 (_("%pB: dynamic relocation against `%pT' in read-only section `%pA'\n"),
63c1f59d 5443 sec->owner, h->root.root.string, sec);
ee05f2fe 5444
625af618
AM
5445 /* Not an error, just cut short the traversal. */
5446 return FALSE;
25dbc73a
AM
5447 }
5448 return TRUE;
5449}
5450
6177242a
AM
5451static const unsigned char glink_eh_frame_cie[] =
5452{
5453 0, 0, 0, 16, /* length. */
5454 0, 0, 0, 0, /* id. */
5455 1, /* CIE version. */
5456 'z', 'R', 0, /* Augmentation string. */
5457 4, /* Code alignment. */
5458 0x7c, /* Data alignment. */
5459 65, /* RA reg. */
5460 1, /* Augmentation size. */
5461 DW_EH_PE_pcrel | DW_EH_PE_sdata4, /* FDE encoding. */
5462 DW_CFA_def_cfa, 1, 0 /* def_cfa: r1 offset 0. */
5463};
5464
25dbc73a
AM
5465/* Set the sizes of the dynamic sections. */
5466
5467static bfd_boolean
93d1b056 5468ppc_elf_size_dynamic_sections (bfd *output_bfd,
25dbc73a
AM
5469 struct bfd_link_info *info)
5470{
5471 struct ppc_elf_link_hash_table *htab;
5472 asection *s;
5473 bfd_boolean relocs;
5474 bfd *ibfd;
7fce784e 5475
252b5132 5476#ifdef DEBUG
25dbc73a 5477 fprintf (stderr, "ppc_elf_size_dynamic_sections called\n");
252b5132 5478#endif
252b5132 5479
25dbc73a
AM
5480 htab = ppc_elf_hash_table (info);
5481 BFD_ASSERT (htab->elf.dynobj != NULL);
252b5132 5482
25dbc73a
AM
5483 if (elf_hash_table (info)->dynamic_sections_created)
5484 {
5485 /* Set the contents of the .interp section to the interpreter. */
9b8b325a 5486 if (bfd_link_executable (info) && !info->nointerp)
25dbc73a 5487 {
3d4d4302 5488 s = bfd_get_linker_section (htab->elf.dynobj, ".interp");
25dbc73a
AM
5489 BFD_ASSERT (s != NULL);
5490 s->size = sizeof ELF_DYNAMIC_INTERPRETER;
5491 s->contents = (unsigned char *) ELF_DYNAMIC_INTERPRETER;
5492 }
5493 }
252b5132 5494
4a3dc543 5495 if (htab->plt_type == PLT_OLD)
d7128ce4 5496 htab->got_header_size = 16;
4a3dc543 5497 else if (htab->plt_type == PLT_NEW)
d7128ce4 5498 htab->got_header_size = 12;
252b5132 5499
25dbc73a
AM
5500 /* Set up .got offsets for local syms, and space for local dynamic
5501 relocs. */
c72f2fb2 5502 for (ibfd = info->input_bfds; ibfd != NULL; ibfd = ibfd->link.next)
25dbc73a
AM
5503 {
5504 bfd_signed_vma *local_got;
5505 bfd_signed_vma *end_local_got;
e054468f
AM
5506 struct plt_entry **local_plt;
5507 struct plt_entry **end_local_plt;
25dbc73a
AM
5508 char *lgot_masks;
5509 bfd_size_type locsymcount;
5510 Elf_Internal_Shdr *symtab_hdr;
7fce784e 5511
0c8d6e5c 5512 if (!is_ppc_elf (ibfd))
25dbc73a 5513 continue;
7fce784e 5514
25dbc73a
AM
5515 for (s = ibfd->sections; s != NULL; s = s->next)
5516 {
f95f8542 5517 struct ppc_dyn_relocs *p;
252b5132 5518
f95f8542 5519 for (p = ((struct ppc_dyn_relocs *)
25dbc73a
AM
5520 elf_section_data (s)->local_dynrel);
5521 p != NULL;
5522 p = p->next)
5523 {
5524 if (!bfd_is_abs_section (p->sec)
5525 && bfd_is_abs_section (p->sec->output_section))
5526 {
5527 /* Input section has been discarded, either because
5528 it is a copy of a linkonce section or due to
5529 linker script /DISCARD/, so we'll be discarding
5530 the relocs too. */
7fce784e 5531 }
3348747a
NS
5532 else if (htab->is_vxworks
5533 && strcmp (p->sec->output_section->name,
5534 ".tls_vars") == 0)
5535 {
5536 /* Relocations in vxworks .tls_vars sections are
5537 handled specially by the loader. */
5538 }
25dbc73a 5539 else if (p->count != 0)
7fce784e 5540 {
25f23106 5541 asection *sreloc = elf_section_data (p->sec)->sreloc;
f95f8542 5542 if (p->ifunc)
ce558b89 5543 sreloc = htab->elf.irelplt;
25f23106 5544 sreloc->size += p->count * sizeof (Elf32_External_Rela);
25dbc73a
AM
5545 if ((p->sec->output_section->flags
5546 & (SEC_READONLY | SEC_ALLOC))
5547 == (SEC_READONLY | SEC_ALLOC))
0caf6c82
L
5548 {
5549 info->flags |= DF_TEXTREL;
871b3ab2 5550 info->callbacks->minfo (_("%pB: dynamic relocation in read-only section `%pA'\n"),
0caf6c82
L
5551 p->sec->owner, p->sec);
5552 }
7fce784e 5553 }
252b5132 5554 }
252b5132 5555 }
252b5132 5556
25dbc73a
AM
5557 local_got = elf_local_got_refcounts (ibfd);
5558 if (!local_got)
5559 continue;
252b5132 5560
0ffa91dd 5561 symtab_hdr = &elf_symtab_hdr (ibfd);
25dbc73a
AM
5562 locsymcount = symtab_hdr->sh_info;
5563 end_local_got = local_got + locsymcount;
e054468f
AM
5564 local_plt = (struct plt_entry **) end_local_got;
5565 end_local_plt = local_plt + locsymcount;
5566 lgot_masks = (char *) end_local_plt;
91d6fa6a 5567
25dbc73a
AM
5568 for (; local_got < end_local_got; ++local_got, ++lgot_masks)
5569 if (*local_got > 0)
5570 {
f15d0b54 5571 unsigned int need;
37da22e5 5572 if ((*lgot_masks & (TLS_TLS | TLS_LD)) == (TLS_TLS | TLS_LD))
f15d0b54
AM
5573 htab->tlsld_got.refcount += 1;
5574 need = got_entries_needed (*lgot_masks);
d6e14abc
AM
5575 if (need == 0)
5576 *local_got = (bfd_vma) -1;
25dbc73a
AM
5577 else
5578 {
3b36f7e6 5579 *local_got = allocate_got (htab, need);
f749f26e
AM
5580 if (bfd_link_pic (info)
5581 && !((*lgot_masks & TLS_TLS) != 0
5582 && bfd_link_executable (info)))
0bed072f 5583 {
f15d0b54 5584 asection *srel;
f15d0b54 5585
f749f26e 5586 need *= sizeof (Elf32_External_Rela) / 4;
f15d0b54 5587 srel = htab->elf.srelgot;
37da22e5 5588 if ((*lgot_masks & (TLS_TLS | PLT_IFUNC)) == PLT_IFUNC)
ce558b89 5589 srel = htab->elf.irelplt;
f15d0b54 5590 srel->size += need;
0bed072f 5591 }
25dbc73a
AM
5592 }
5593 }
5594 else
5595 *local_got = (bfd_vma) -1;
e054468f
AM
5596
5597 if (htab->is_vxworks)
5598 continue;
5599
5600 /* Allocate space for calls to local STT_GNU_IFUNC syms in .iplt. */
2d7ad24e
AM
5601 lgot_masks = (char *) end_local_plt;
5602 for (; local_plt < end_local_plt; ++local_plt, ++lgot_masks)
e054468f
AM
5603 {
5604 struct plt_entry *ent;
5605 bfd_boolean doneone = FALSE;
2d7ad24e 5606 bfd_vma plt_offset = 0, glink_offset = (bfd_vma) -1;
e054468f
AM
5607
5608 for (ent = *local_plt; ent != NULL; ent = ent->next)
5609 if (ent->plt.refcount > 0)
5610 {
2d7ad24e
AM
5611 if ((*lgot_masks & (TLS_TLS | PLT_IFUNC)) == PLT_IFUNC)
5612 s = htab->elf.iplt;
3e04d765
AM
5613 else if (htab->can_convert_all_inline_plt
5614 || (*lgot_masks & (TLS_TLS | PLT_KEEP)) != PLT_KEEP)
2d7ad24e
AM
5615 {
5616 ent->plt.offset = (bfd_vma) -1;
5617 continue;
5618 }
5619 else
5620 s = htab->pltlocal;
e054468f
AM
5621
5622 if (!doneone)
5623 {
5624 plt_offset = s->size;
5625 s->size += 4;
5626 }
5627 ent->plt.offset = plt_offset;
5628
2d7ad24e 5629 if (s != htab->pltlocal && (!doneone || bfd_link_pic (info)))
e054468f 5630 {
2d7ad24e 5631 s = htab->glink;
e054468f 5632 glink_offset = s->size;
9e390558 5633 s->size += GLINK_ENTRY_SIZE (htab, NULL);
e054468f
AM
5634 }
5635 ent->glink_offset = glink_offset;
5636
5637 if (!doneone)
5638 {
2d7ad24e
AM
5639 if ((*lgot_masks & (TLS_TLS | PLT_IFUNC)) == PLT_IFUNC)
5640 {
5641 s = htab->elf.irelplt;
5642 s->size += sizeof (Elf32_External_Rela);
5643 }
5644 else if (bfd_link_pic (info))
5645 {
5646 s = htab->relpltlocal;
5647 s->size += sizeof (Elf32_External_Rela);
5648 }
e054468f
AM
5649 doneone = TRUE;
5650 }
5651 }
5652 else
5653 ent->plt.offset = (bfd_vma) -1;
5654 }
25dbc73a 5655 }
252b5132 5656
b7fcf6f6
AM
5657 /* Allocate space for global sym dynamic relocs. */
5658 elf_link_hash_traverse (elf_hash_table (info), allocate_dynrelocs, info);
5659
3b36f7e6
AM
5660 if (htab->tlsld_got.refcount > 0)
5661 {
5662 htab->tlsld_got.offset = allocate_got (htab, 8);
f749f26e 5663 if (bfd_link_dll (info))
ce558b89 5664 htab->elf.srelgot->size += sizeof (Elf32_External_Rela);
3b36f7e6
AM
5665 }
5666 else
5667 htab->tlsld_got.offset = (bfd_vma) -1;
5668
ce558b89 5669 if (htab->elf.sgot != NULL && htab->plt_type != PLT_VXWORKS)
3b36f7e6
AM
5670 {
5671 unsigned int g_o_t = 32768;
5672
4d962050
AM
5673 /* If we haven't allocated the header, do so now. When we get here,
5674 for old plt/got the got size will be 0 to 32764 (not allocated),
5675 or 32780 to 65536 (header allocated). For new plt/got, the
5676 corresponding ranges are 0 to 32768 and 32780 to 65536. */
ce558b89 5677 if (htab->elf.sgot->size <= 32768)
3b36f7e6 5678 {
ce558b89 5679 g_o_t = htab->elf.sgot->size;
4a3dc543 5680 if (htab->plt_type == PLT_OLD)
4d962050 5681 g_o_t += 4;
ce558b89 5682 htab->elf.sgot->size += htab->got_header_size;
3b36f7e6 5683 }
3b36f7e6
AM
5684
5685 htab->elf.hgot->root.u.def.value = g_o_t;
5686 }
0e1862bb 5687 if (bfd_link_pic (info))
bd6c6e2b
AM
5688 {
5689 struct elf_link_hash_entry *sda = htab->sdata[0].sym;
93d1b056
AM
5690
5691 sda->root.u.def.section = htab->elf.hgot->root.u.def.section;
5692 sda->root.u.def.value = htab->elf.hgot->root.u.def.value;
bd6c6e2b 5693 }
15bfcc77
AM
5694 if (info->emitrelocations)
5695 {
5696 struct elf_link_hash_entry *sda = htab->sdata[0].sym;
5697
5698 if (sda != NULL && sda->ref_regular)
5699 sda->root.u.def.section->flags |= SEC_KEEP;
5700 sda = htab->sdata[1].sym;
5701 if (sda != NULL && sda->ref_regular)
5702 sda->root.u.def.section->flags |= SEC_KEEP;
5703 }
3b36f7e6 5704
e054468f
AM
5705 if (htab->glink != NULL
5706 && htab->glink->size != 0
5707 && htab->elf.dynamic_sections_created)
d7128ce4
AM
5708 {
5709 htab->glink_pltresolve = htab->glink->size;
9e390558
AM
5710 /* Space for the branch table. */
5711 htab->glink->size
5712 += htab->elf.srelplt->size / (sizeof (Elf32_External_Rela) / 4) - 4;
86b9da88 5713 /* Pad out to align the start of PLTresolve. */
5446cbdf
AM
5714 htab->glink->size += -htab->glink->size & (htab->params->ppc476_workaround
5715 ? 63 : 15);
d7128ce4 5716 htab->glink->size += GLINK_PLTRESOLVE;
0ba07910 5717
5446cbdf 5718 if (htab->params->emit_stub_syms)
0ba07910
AM
5719 {
5720 struct elf_link_hash_entry *sh;
5721 sh = elf_link_hash_lookup (&htab->elf, "__glink",
5722 TRUE, FALSE, FALSE);
5723 if (sh == NULL)
5724 return FALSE;
5725 if (sh->root.type == bfd_link_hash_new)
5726 {
5727 sh->root.type = bfd_link_hash_defined;
5728 sh->root.u.def.section = htab->glink;
5729 sh->root.u.def.value = htab->glink_pltresolve;
5730 sh->ref_regular = 1;
5731 sh->def_regular = 1;
5732 sh->ref_regular_nonweak = 1;
5733 sh->forced_local = 1;
5734 sh->non_elf = 0;
2ec55de3 5735 sh->root.linker_def = 1;
0ba07910
AM
5736 }
5737 sh = elf_link_hash_lookup (&htab->elf, "__glink_PLTresolve",
5738 TRUE, FALSE, FALSE);
5739 if (sh == NULL)
5740 return FALSE;
5741 if (sh->root.type == bfd_link_hash_new)
5742 {
5743 sh->root.type = bfd_link_hash_defined;
5744 sh->root.u.def.section = htab->glink;
5745 sh->root.u.def.value = htab->glink->size - GLINK_PLTRESOLVE;
5746 sh->ref_regular = 1;
5747 sh->def_regular = 1;
5748 sh->ref_regular_nonweak = 1;
5749 sh->forced_local = 1;
5750 sh->non_elf = 0;
2ec55de3 5751 sh->root.linker_def = 1;
0ba07910
AM
5752 }
5753 }
d7128ce4
AM
5754 }
5755
6177242a
AM
5756 if (htab->glink != NULL
5757 && htab->glink->size != 0
5758 && htab->glink_eh_frame != NULL
9a2a56cc
AM
5759 && !bfd_is_abs_section (htab->glink_eh_frame->output_section)
5760 && _bfd_elf_eh_frame_present (info))
6177242a
AM
5761 {
5762 s = htab->glink_eh_frame;
5763 s->size = sizeof (glink_eh_frame_cie) + 20;
0e1862bb 5764 if (bfd_link_pic (info))
6177242a
AM
5765 {
5766 s->size += 4;
5767 if (htab->glink->size - GLINK_PLTRESOLVE + 8 >= 256)
5768 s->size += 4;
5769 }
5770 }
5771
25dbc73a
AM
5772 /* We've now determined the sizes of the various dynamic sections.
5773 Allocate memory for them. */
5774 relocs = FALSE;
5775 for (s = htab->elf.dynobj->sections; s != NULL; s = s->next)
252b5132 5776 {
9d8504b1
PB
5777 bfd_boolean strip_section = TRUE;
5778
25dbc73a
AM
5779 if ((s->flags & SEC_LINKER_CREATED) == 0)
5780 continue;
252b5132 5781
ce558b89
AM
5782 if (s == htab->elf.splt
5783 || s == htab->elf.sgot)
25dbc73a 5784 {
9d8504b1
PB
5785 /* We'd like to strip these sections if they aren't needed, but if
5786 we've exported dynamic symbols from them we must leave them.
5787 It's too late to tell BFD to get rid of the symbols. */
e054468f 5788 if (htab->elf.hplt != NULL)
9d8504b1 5789 strip_section = FALSE;
25dbc73a
AM
5790 /* Strip this section if we don't need it; see the
5791 comment below. */
5792 }
ce558b89 5793 else if (s == htab->elf.iplt
2d7ad24e 5794 || s == htab->pltlocal
e054468f 5795 || s == htab->glink
6177242a 5796 || s == htab->glink_eh_frame
ce558b89 5797 || s == htab->elf.sgotplt
e054468f 5798 || s == htab->sbss
9d19e4fd 5799 || s == htab->elf.sdynbss
5474d94f 5800 || s == htab->elf.sdynrelro
15bfcc77 5801 || s == htab->dynsbss)
25dbc73a 5802 {
c9a2f333 5803 /* Strip these too. */
25dbc73a 5804 }
15bfcc77
AM
5805 else if (s == htab->sdata[0].section
5806 || s == htab->sdata[1].section)
5807 {
5808 strip_section = (s->flags & SEC_KEEP) == 0;
5809 }
fd361982 5810 else if (CONST_STRNEQ (bfd_section_name (s), ".rela"))
25dbc73a 5811 {
c456f082 5812 if (s->size != 0)
25dbc73a
AM
5813 {
5814 /* Remember whether there are any relocation sections. */
5815 relocs = TRUE;
252b5132 5816
25dbc73a
AM
5817 /* We use the reloc_count field as a counter if we need
5818 to copy relocs into the output file. */
5819 s->reloc_count = 0;
252b5132
RH
5820 }
5821 }
25dbc73a
AM
5822 else
5823 {
5824 /* It's not one of our sections, so don't allocate space. */
5825 continue;
5826 }
252b5132 5827
9d8504b1 5828 if (s->size == 0 && strip_section)
25dbc73a 5829 {
c456f082
AM
5830 /* If we don't need this section, strip it from the
5831 output file. This is mostly to handle .rela.bss and
5832 .rela.plt. We must create both sections in
5833 create_dynamic_sections, because they must be created
5834 before the linker maps input sections to output
5835 sections. The linker does that before
5836 adjust_dynamic_symbol is called, and it is that
5837 function which decides whether anything needs to go
5838 into these sections. */
8423293d 5839 s->flags |= SEC_EXCLUDE;
25dbc73a
AM
5840 continue;
5841 }
7fce784e 5842
d7128ce4 5843 if ((s->flags & SEC_HAS_CONTENTS) == 0)
644285ef
AM
5844 continue;
5845
25dbc73a
AM
5846 /* Allocate memory for the section contents. */
5847 s->contents = bfd_zalloc (htab->elf.dynobj, s->size);
5848 if (s->contents == NULL)
5849 return FALSE;
5850 }
252b5132 5851
25dbc73a 5852 if (htab->elf.dynamic_sections_created)
7619e7c7 5853 {
25dbc73a
AM
5854 /* Add some entries to the .dynamic section. We fill in the
5855 values later, in ppc_elf_finish_dynamic_sections, but we
5856 must add the entries now so that we get the correct size for
5857 the .dynamic section. The DT_DEBUG entry is filled in by the
5858 dynamic linker and used by the debugger. */
5859#define add_dynamic_entry(TAG, VAL) \
5860 _bfd_elf_add_dynamic_entry (info, TAG, VAL)
252b5132 5861
0e1862bb 5862 if (bfd_link_executable (info))
7619e7c7 5863 {
25dbc73a
AM
5864 if (!add_dynamic_entry (DT_DEBUG, 0))
5865 return FALSE;
7619e7c7
AM
5866 }
5867
ce558b89 5868 if (htab->elf.splt != NULL && htab->elf.splt->size != 0)
7619e7c7 5869 {
25dbc73a
AM
5870 if (!add_dynamic_entry (DT_PLTGOT, 0)
5871 || !add_dynamic_entry (DT_PLTRELSZ, 0)
5872 || !add_dynamic_entry (DT_PLTREL, DT_RELA)
5873 || !add_dynamic_entry (DT_JMPREL, 0))
5874 return FALSE;
5875 }
7619e7c7 5876
c7e17e05
AM
5877 if (htab->plt_type == PLT_NEW
5878 && htab->glink != NULL
5879 && htab->glink->size != 0)
d7128ce4 5880 {
1fe44d79 5881 if (!add_dynamic_entry (DT_PPC_GOT, 0))
d7128ce4 5882 return FALSE;
5446cbdf 5883 if (!htab->params->no_tls_get_addr_opt
a7f2871e
AM
5884 && htab->tls_get_addr != NULL
5885 && htab->tls_get_addr->plt.plist != NULL
e8910a83 5886 && !add_dynamic_entry (DT_PPC_OPT, PPC_OPT_TLS))
a7f2871e 5887 return FALSE;
d7128ce4
AM
5888 }
5889
25dbc73a
AM
5890 if (relocs)
5891 {
5892 if (!add_dynamic_entry (DT_RELA, 0)
5893 || !add_dynamic_entry (DT_RELASZ, 0)
5894 || !add_dynamic_entry (DT_RELAENT, sizeof (Elf32_External_Rela)))
5895 return FALSE;
5896 }
7619e7c7 5897
25dbc73a
AM
5898 /* If any dynamic relocs apply to a read-only section, then we
5899 need a DT_TEXTREL entry. */
5900 if ((info->flags & DF_TEXTREL) == 0)
625af618 5901 elf_link_hash_traverse (elf_hash_table (info), maybe_set_textrel,
25dbc73a 5902 info);
7619e7c7 5903
25dbc73a
AM
5904 if ((info->flags & DF_TEXTREL) != 0)
5905 {
5906 if (!add_dynamic_entry (DT_TEXTREL, 0))
5907 return FALSE;
7619e7c7 5908 }
7a2b07ff
NS
5909 if (htab->is_vxworks
5910 && !elf_vxworks_add_dynamic_entries (output_bfd, info))
5911 return FALSE;
5912 }
25dbc73a
AM
5913#undef add_dynamic_entry
5914
7e01508c
AM
5915 if (htab->glink_eh_frame != NULL
5916 && htab->glink_eh_frame->contents != NULL)
5917 {
5918 unsigned char *p = htab->glink_eh_frame->contents;
5919 bfd_vma val;
5920
5921 memcpy (p, glink_eh_frame_cie, sizeof (glink_eh_frame_cie));
5922 /* CIE length (rewrite in case little-endian). */
5923 bfd_put_32 (htab->elf.dynobj, sizeof (glink_eh_frame_cie) - 4, p);
5924 p += sizeof (glink_eh_frame_cie);
5925 /* FDE length. */
5926 val = htab->glink_eh_frame->size - 4 - sizeof (glink_eh_frame_cie);
5927 bfd_put_32 (htab->elf.dynobj, val, p);
5928 p += 4;
5929 /* CIE pointer. */
5930 val = p - htab->glink_eh_frame->contents;
5931 bfd_put_32 (htab->elf.dynobj, val, p);
5932 p += 4;
5933 /* Offset to .glink. Set later. */
5934 p += 4;
5935 /* .glink size. */
5936 bfd_put_32 (htab->elf.dynobj, htab->glink->size, p);
5937 p += 4;
5938 /* Augmentation. */
5939 p += 1;
5940
0e1862bb 5941 if (bfd_link_pic (info)
7e01508c
AM
5942 && htab->elf.dynamic_sections_created)
5943 {
5944 bfd_vma adv = (htab->glink->size - GLINK_PLTRESOLVE + 8) >> 2;
5945 if (adv < 64)
5946 *p++ = DW_CFA_advance_loc + adv;
5947 else if (adv < 256)
5948 {
5949 *p++ = DW_CFA_advance_loc1;
5950 *p++ = adv;
5951 }
5952 else if (adv < 65536)
5953 {
5954 *p++ = DW_CFA_advance_loc2;
5955 bfd_put_16 (htab->elf.dynobj, adv, p);
5956 p += 2;
5957 }
5958 else
5959 {
5960 *p++ = DW_CFA_advance_loc4;
5961 bfd_put_32 (htab->elf.dynobj, adv, p);
5962 p += 4;
5963 }
5964 *p++ = DW_CFA_register;
5965 *p++ = 65;
5966 p++;
5967 *p++ = DW_CFA_advance_loc + 4;
5968 *p++ = DW_CFA_restore_extended;
5969 *p++ = 65;
5970 }
5971 BFD_ASSERT ((bfd_vma) ((p + 3 - htab->glink_eh_frame->contents) & -4)
5972 == htab->glink_eh_frame->size);
5973 }
5974
7619e7c7
AM
5975 return TRUE;
5976}
0eb4a168 5977
93d1b056
AM
5978/* Arrange to have _SDA_BASE_ or _SDA2_BASE_ stripped from the output
5979 if it looks like nothing is using them. */
5980
5981static void
5982maybe_strip_sdasym (bfd *output_bfd, elf_linker_section_t *lsect)
5983{
5984 struct elf_link_hash_entry *sda = lsect->sym;
5985
5986 if (sda != NULL && !sda->ref_regular && sda->dynindx == -1)
5987 {
5988 asection *s;
5989
5990 s = bfd_get_section_by_name (output_bfd, lsect->name);
5991 if (s == NULL || bfd_section_removed_from_list (output_bfd, s))
5992 {
5993 s = bfd_get_section_by_name (output_bfd, lsect->bss_name);
5994 if (s == NULL || bfd_section_removed_from_list (output_bfd, s))
5995 {
5996 sda->def_regular = 0;
5997 /* This is somewhat magic. See elf_link_output_extsym. */
5998 sda->ref_dynamic = 1;
5999 sda->forced_local = 0;
6000 }
6001 }
6002 }
6003}
6004
6005void
6006ppc_elf_maybe_strip_sdata_syms (struct bfd_link_info *info)
6007{
6008 struct ppc_elf_link_hash_table *htab = ppc_elf_hash_table (info);
6009
6010 if (htab != NULL)
6011 {
6012 maybe_strip_sdasym (info->output_bfd, &htab->sdata[0]);
6013 maybe_strip_sdasym (info->output_bfd, &htab->sdata[1]);
6014 }
6015}
6016
6017
0eb4a168
AM
6018/* Return TRUE if symbol should be hashed in the `.gnu.hash' section. */
6019
6020static bfd_boolean
6021ppc_elf_hash_symbol (struct elf_link_hash_entry *h)
6022{
6023 if (h->plt.plist != NULL
6024 && !h->def_regular
6025 && (!h->pointer_equality_needed
6026 || !h->ref_regular_nonweak))
6027 return FALSE;
6028
6029 return _bfd_elf_hash_symbol (h);
6030}
25dbc73a
AM
6031\f
6032#define ARRAY_SIZE(a) (sizeof (a) / sizeof ((a)[0]))
6033
01017ef8
NS
6034/* Relaxation trampolines. r12 is available for clobbering (r11, is
6035 used for some functions that are allowed to break the ABI). */
25dbc73a
AM
6036static const int shared_stub_entry[] =
6037 {
6038 0x7c0802a6, /* mflr 0 */
6039 0x429f0005, /* bcl 20, 31, .Lxxx */
01017ef8
NS
6040 0x7d8802a6, /* mflr 12 */
6041 0x3d8c0000, /* addis 12, 12, (xxx-.Lxxx)@ha */
53291d1f 6042 0x398c0000, /* addi 12, 12, (xxx-.Lxxx)@l */
25dbc73a 6043 0x7c0803a6, /* mtlr 0 */
01017ef8 6044 0x7d8903a6, /* mtctr 12 */
25dbc73a
AM
6045 0x4e800420, /* bctr */
6046 };
6047
6048static const int stub_entry[] =
6049 {
01017ef8
NS
6050 0x3d800000, /* lis 12,xxx@ha */
6051 0x398c0000, /* addi 12,12,xxx@l */
6052 0x7d8903a6, /* mtctr 12 */
25dbc73a
AM
6053 0x4e800420, /* bctr */
6054 };
6055
5446cbdf
AM
6056struct ppc_elf_relax_info
6057{
6058 unsigned int workaround_size;
d3e454b9 6059 unsigned int picfixup_size;
5446cbdf
AM
6060};
6061
6062/* This function implements long branch trampolines, and the ppc476
6063 icache bug workaround. Any section needing trampolines or patch
6064 space for the workaround has its size extended so that we can
53291d1f 6065 add trampolines at the end of the section. */
5446cbdf 6066
25dbc73a
AM
6067static bfd_boolean
6068ppc_elf_relax_section (bfd *abfd,
6069 asection *isec,
6070 struct bfd_link_info *link_info,
6071 bfd_boolean *again)
6072{
d3e454b9 6073 struct one_branch_fixup
25dbc73a 6074 {
d3e454b9 6075 struct one_branch_fixup *next;
25dbc73a 6076 asection *tsec;
01017ef8
NS
6077 /* Final link, can use the symbol offset. For a
6078 relocatable link we use the symbol's index. */
25dbc73a
AM
6079 bfd_vma toff;
6080 bfd_vma trampoff;
6081 };
7619e7c7 6082
25dbc73a
AM
6083 Elf_Internal_Shdr *symtab_hdr;
6084 bfd_byte *contents = NULL;
6085 Elf_Internal_Sym *isymbuf = NULL;
6086 Elf_Internal_Rela *internal_relocs = NULL;
5446cbdf 6087 Elf_Internal_Rela *irel, *irelend = NULL;
d3e454b9 6088 struct one_branch_fixup *branch_fixups = NULL;
5446cbdf 6089 struct ppc_elf_relax_info *relax_info = NULL;
9bc4e62b 6090 unsigned changes = 0;
5446cbdf 6091 bfd_boolean workaround_change;
d7128ce4 6092 struct ppc_elf_link_hash_table *htab;
d3e454b9 6093 bfd_size_type trampbase, trampoff, newsize, picfixup_size;
a6aa5195 6094 asection *got2;
50248c89 6095 bfd_boolean maybe_pasted;
7619e7c7 6096
25dbc73a 6097 *again = FALSE;
7619e7c7 6098
5446cbdf 6099 /* No need to do anything with non-alloc or non-code sections. */
c87b5a93 6100 if ((isec->flags & SEC_ALLOC) == 0
a8ad78a7 6101 || (isec->flags & SEC_CODE) == 0
5446cbdf
AM
6102 || (isec->flags & SEC_LINKER_CREATED) != 0
6103 || isec->size < 4)
25dbc73a 6104 return TRUE;
7619e7c7 6105
c8a1f254
NS
6106 /* We cannot represent the required PIC relocs in the output, so don't
6107 do anything. The linker doesn't support mixing -shared and -r
6108 anyway. */
0e1862bb 6109 if (bfd_link_relocatable (link_info) && bfd_link_pic (link_info))
795bc6b3 6110 return TRUE;
5b914448 6111
5446cbdf
AM
6112 htab = ppc_elf_hash_table (link_info);
6113 if (htab == NULL)
6114 return TRUE;
6115
6116 isec->size = (isec->size + 3) & -4;
6117 if (isec->rawsize == 0)
6118 isec->rawsize = isec->size;
6119 trampbase = isec->size;
6120
53291d1f
AM
6121 BFD_ASSERT (isec->sec_info_type == SEC_INFO_TYPE_NONE
6122 || isec->sec_info_type == SEC_INFO_TYPE_TARGET);
6123 isec->sec_info_type = SEC_INFO_TYPE_TARGET;
6124
d3e454b9
AM
6125 if (htab->params->ppc476_workaround
6126 || htab->params->pic_fixup > 0)
5446cbdf
AM
6127 {
6128 if (elf_section_data (isec)->sec_info == NULL)
6129 {
5446cbdf
AM
6130 elf_section_data (isec)->sec_info
6131 = bfd_zalloc (abfd, sizeof (struct ppc_elf_relax_info));
6132 if (elf_section_data (isec)->sec_info == NULL)
6133 return FALSE;
6134 }
6135 relax_info = elf_section_data (isec)->sec_info;
6136 trampbase -= relax_info->workaround_size;
6137 }
6138
50248c89
AM
6139 maybe_pasted = (strcmp (isec->output_section->name, ".init") == 0
6140 || strcmp (isec->output_section->name, ".fini") == 0);
25dbc73a 6141 /* Space for a branch around any trampolines. */
5446cbdf
AM
6142 trampoff = trampbase;
6143 if (maybe_pasted && trampbase == isec->rawsize)
50248c89 6144 trampoff += 4;
7619e7c7 6145
0ffa91dd 6146 symtab_hdr = &elf_symtab_hdr (abfd);
d3e454b9
AM
6147 picfixup_size = 0;
6148 if (htab->params->branch_trampolines
6149 || htab->params->pic_fixup > 0)
7619e7c7 6150 {
5446cbdf
AM
6151 /* Get a copy of the native relocations. */
6152 if (isec->reloc_count != 0)
25dbc73a 6153 {
5446cbdf
AM
6154 internal_relocs = _bfd_elf_link_read_relocs (abfd, isec, NULL, NULL,
6155 link_info->keep_memory);
6156 if (internal_relocs == NULL)
6157 goto error_return;
25dbc73a 6158 }
7619e7c7 6159
5446cbdf
AM
6160 got2 = bfd_get_section_by_name (abfd, ".got2");
6161
6162 irelend = internal_relocs + isec->reloc_count;
6163 for (irel = internal_relocs; irel < irelend; irel++)
25dbc73a 6164 {
5446cbdf
AM
6165 unsigned long r_type = ELF32_R_TYPE (irel->r_info);
6166 bfd_vma toff, roff;
6167 asection *tsec;
d3e454b9 6168 struct one_branch_fixup *f;
5446cbdf 6169 size_t insn_offset = 0;
d3e454b9 6170 bfd_vma max_branch_offset = 0, val;
5446cbdf
AM
6171 bfd_byte *hit_addr;
6172 unsigned long t0;
6173 struct elf_link_hash_entry *h;
49c09209 6174 Elf_Internal_Sym *isym;
5446cbdf
AM
6175 struct plt_entry **plist;
6176 unsigned char sym_type;
6177
6178 switch (r_type)
6179 {
6180 case R_PPC_REL24:
6181 case R_PPC_LOCAL24PC:
6182 case R_PPC_PLTREL24:
23cedd1d 6183 case R_PPC_PLTCALL:
5446cbdf
AM
6184 max_branch_offset = 1 << 25;
6185 break;
6186
6187 case R_PPC_REL14:
6188 case R_PPC_REL14_BRTAKEN:
6189 case R_PPC_REL14_BRNTAKEN:
6190 max_branch_offset = 1 << 15;
6191 break;
7fce784e 6192
d3e454b9
AM
6193 case R_PPC_ADDR16_HA:
6194 if (htab->params->pic_fixup > 0)
6195 break;
6196 continue;
6197
5446cbdf
AM
6198 default:
6199 continue;
6200 }
6201
6202 /* Get the value of the symbol referred to by the reloc. */
49c09209
AM
6203 if (!get_sym_h (&h, &isym, &tsec, NULL, &isymbuf,
6204 ELF32_R_SYM (irel->r_info), abfd))
6205 goto error_return;
5446cbdf 6206
49c09209
AM
6207 if (isym != NULL)
6208 {
6209 if (tsec != NULL)
6210 ;
5446cbdf
AM
6211 else if (isym->st_shndx == SHN_ABS)
6212 tsec = bfd_abs_section_ptr;
49199304
AM
6213 else
6214 continue;
5446cbdf
AM
6215
6216 toff = isym->st_value;
6217 sym_type = ELF_ST_TYPE (isym->st_info);
25dbc73a 6218 }
25dbc73a 6219 else
5446cbdf 6220 {
49c09209
AM
6221 if (tsec != NULL)
6222 toff = h->root.u.def.value;
5446cbdf
AM
6223 else if (h->root.type == bfd_link_hash_undefined
6224 || h->root.type == bfd_link_hash_undefweak)
6225 {
49c09209
AM
6226 unsigned long indx;
6227
6228 indx = ELF32_R_SYM (irel->r_info) - symtab_hdr->sh_info;
5446cbdf 6229 tsec = bfd_und_section_ptr;
0e1862bb 6230 toff = bfd_link_relocatable (link_info) ? indx : 0;
5446cbdf
AM
6231 }
6232 else
6233 continue;
6234
9f7552cf
AM
6235 /* If this branch is to __tls_get_addr then we may later
6236 optimise away the call. We won't be needing a long-
6237 branch stub in that case. */
0e1862bb 6238 if (bfd_link_executable (link_info)
9f7552cf
AM
6239 && h == htab->tls_get_addr
6240 && irel != internal_relocs)
6241 {
6242 unsigned long t_symndx = ELF32_R_SYM (irel[-1].r_info);
6243 unsigned long t_rtype = ELF32_R_TYPE (irel[-1].r_info);
6244 unsigned int tls_mask = 0;
6245
6246 /* The previous reloc should be one of R_PPC_TLSGD or
6247 R_PPC_TLSLD, or for older object files, a reloc
6248 on the __tls_get_addr arg setup insn. Get tls
6249 mask bits from the symbol on that reloc. */
6250 if (t_symndx < symtab_hdr->sh_info)
6251 {
6252 bfd_vma *local_got_offsets = elf_local_got_offsets (abfd);
6253
6254 if (local_got_offsets != NULL)
6255 {
6256 struct plt_entry **local_plt = (struct plt_entry **)
6257 (local_got_offsets + symtab_hdr->sh_info);
6258 char *lgot_masks = (char *)
6259 (local_plt + symtab_hdr->sh_info);
6260 tls_mask = lgot_masks[t_symndx];
6261 }
6262 }
6263 else
6264 {
6265 struct elf_link_hash_entry *th
6266 = elf_sym_hashes (abfd)[t_symndx - symtab_hdr->sh_info];
6267
6268 while (th->root.type == bfd_link_hash_indirect
6269 || th->root.type == bfd_link_hash_warning)
6270 th = (struct elf_link_hash_entry *) th->root.u.i.link;
6271
6272 tls_mask
6273 = ((struct ppc_elf_link_hash_entry *) th)->tls_mask;
6274 }
6275
6276 /* The mask bits tell us if the call will be
6277 optimised away. */
6278 if ((tls_mask & TLS_TLS) != 0 && (tls_mask & TLS_GD) == 0
6279 && (t_rtype == R_PPC_TLSGD
6280 || t_rtype == R_PPC_GOT_TLSGD16
6281 || t_rtype == R_PPC_GOT_TLSGD16_LO))
6282 continue;
6283 if ((tls_mask & TLS_TLS) != 0 && (tls_mask & TLS_LD) == 0
6284 && (t_rtype == R_PPC_TLSLD
6285 || t_rtype == R_PPC_GOT_TLSLD16
6286 || t_rtype == R_PPC_GOT_TLSLD16_LO))
6287 continue;
6288 }
6289
5446cbdf
AM
6290 sym_type = h->type;
6291 }
7619e7c7 6292
d3e454b9
AM
6293 if (r_type == R_PPC_ADDR16_HA)
6294 {
6295 if (h != NULL
6296 && !h->def_regular
6297 && h->protected_def
6298 && ppc_elf_hash_entry (h)->has_addr16_ha
6299 && ppc_elf_hash_entry (h)->has_addr16_lo)
6300 picfixup_size += 12;
6301 continue;
6302 }
6303
5446cbdf
AM
6304 /* The condition here under which we call find_plt_ent must
6305 match that in relocate_section. If we call find_plt_ent here
6306 but not in relocate_section, or vice versa, then the branch
6307 destination used here may be incorrect. */
6308 plist = NULL;
6309 if (h != NULL)
25dbc73a 6310 {
5446cbdf
AM
6311 /* We know is_branch_reloc (r_type) is true. */
6312 if (h->type == STT_GNU_IFUNC
6313 || r_type == R_PPC_PLTREL24)
6314 plist = &h->plt.plist;
25dbc73a 6315 }
5446cbdf
AM
6316 else if (sym_type == STT_GNU_IFUNC
6317 && elf_local_got_offsets (abfd) != NULL)
c8a1f254 6318 {
5446cbdf
AM
6319 bfd_vma *local_got_offsets = elf_local_got_offsets (abfd);
6320 struct plt_entry **local_plt = (struct plt_entry **)
6321 (local_got_offsets + symtab_hdr->sh_info);
6322 plist = local_plt + ELF32_R_SYM (irel->r_info);
c8a1f254 6323 }
5446cbdf 6324 if (plist != NULL)
a9585d22 6325 {
5446cbdf
AM
6326 bfd_vma addend = 0;
6327 struct plt_entry *ent;
6328
0e1862bb 6329 if (r_type == R_PPC_PLTREL24 && bfd_link_pic (link_info))
5446cbdf
AM
6330 addend = irel->r_addend;
6331 ent = find_plt_ent (plist, got2, addend);
6332 if (ent != NULL)
a9585d22 6333 {
5446cbdf
AM
6334 if (htab->plt_type == PLT_NEW
6335 || h == NULL
6336 || !htab->elf.dynamic_sections_created
6337 || h->dynindx == -1)
6338 {
6339 tsec = htab->glink;
6340 toff = ent->glink_offset;
6341 }
6342 else
6343 {
ce558b89 6344 tsec = htab->elf.splt;
5446cbdf
AM
6345 toff = ent->plt.offset;
6346 }
de972ffa
AM
6347 }
6348 }
de972ffa 6349
5446cbdf
AM
6350 /* If the branch and target are in the same section, you have
6351 no hope of adding stubs. We'll error out later should the
6352 branch overflow. */
6353 if (tsec == isec)
6354 continue;
25dbc73a 6355
49199304
AM
6356 /* toff is used for the symbol index when the symbol is
6357 undefined and we're doing a relocatable link, so we can't
6358 support addends. It would be possible to do so by
6359 putting the addend in one_branch_fixup but addends on
6360 branches are rare so it hardly seems worth supporting. */
6361 if (bfd_link_relocatable (link_info)
6362 && tsec == bfd_und_section_ptr
6363 && r_type != R_PPC_PLTREL24
6364 && irel->r_addend != 0)
6365 continue;
6366
5446cbdf
AM
6367 /* There probably isn't any reason to handle symbols in
6368 SEC_MERGE sections; SEC_MERGE doesn't seem a likely
6369 attribute for a code section, and we are only looking at
6370 branches. However, implement it correctly here as a
6371 reference for other target relax_section functions. */
6372 if (0 && tsec->sec_info_type == SEC_INFO_TYPE_MERGE)
6373 {
6374 /* At this stage in linking, no SEC_MERGE symbol has been
6375 adjusted, so all references to such symbols need to be
6376 passed through _bfd_merged_section_offset. (Later, in
6377 relocate_section, all SEC_MERGE symbols *except* for
6378 section symbols have been adjusted.)
6379
6380 gas may reduce relocations against symbols in SEC_MERGE
6381 sections to a relocation against the section symbol when
6382 the original addend was zero. When the reloc is against
6383 a section symbol we should include the addend in the
6384 offset passed to _bfd_merged_section_offset, since the
6385 location of interest is the original symbol. On the
6386 other hand, an access to "sym+addend" where "sym" is not
6387 a section symbol should not include the addend; Such an
6388 access is presumed to be an offset from "sym"; The
6389 location of interest is just "sym". */
49199304
AM
6390 if (sym_type == STT_SECTION
6391 && r_type != R_PPC_PLTREL24)
5446cbdf
AM
6392 toff += irel->r_addend;
6393
6394 toff
6395 = _bfd_merged_section_offset (abfd, &tsec,
6396 elf_section_data (tsec)->sec_info,
6397 toff);
6398
49199304
AM
6399 if (sym_type != STT_SECTION
6400 && r_type != R_PPC_PLTREL24)
5446cbdf
AM
6401 toff += irel->r_addend;
6402 }
6403 /* PLTREL24 addends are special. */
6404 else if (r_type != R_PPC_PLTREL24)
25dbc73a 6405 toff += irel->r_addend;
7619e7c7 6406
5446cbdf 6407 /* Attempted -shared link of non-pic code loses. */
0e1862bb 6408 if ((!bfd_link_relocatable (link_info)
5446cbdf
AM
6409 && tsec == bfd_und_section_ptr)
6410 || tsec->output_section == NULL
6411 || (tsec->owner != NULL
6412 && (tsec->owner->flags & BFD_PLUGIN) != 0))
6413 continue;
7619e7c7 6414
5446cbdf 6415 roff = irel->r_offset;
7de713b9 6416
49199304
AM
6417 /* Avoid creating a lot of unnecessary fixups when
6418 relocatable if the output section size is such that a
6419 fixup can be created at final link.
6420 The max_branch_offset adjustment allows for some number
6421 of other fixups being needed at final link. */
6422 if (bfd_link_relocatable (link_info)
6423 && (isec->output_section->rawsize - (isec->output_offset + roff)
6424 < max_branch_offset - (max_branch_offset >> 4)))
6425 continue;
6426
5446cbdf
AM
6427 /* If the branch is in range, no need to do anything. */
6428 if (tsec != bfd_und_section_ptr
0e1862bb 6429 && (!bfd_link_relocatable (link_info)
5446cbdf
AM
6430 /* A relocatable link may have sections moved during
6431 final link, so do not presume they remain in range. */
6432 || tsec->output_section == isec->output_section))
6433 {
6434 bfd_vma symaddr, reladdr;
7619e7c7 6435
5446cbdf
AM
6436 symaddr = tsec->output_section->vma + tsec->output_offset + toff;
6437 reladdr = isec->output_section->vma + isec->output_offset + roff;
6438 if (symaddr - reladdr + max_branch_offset
6439 < 2 * max_branch_offset)
6440 continue;
6441 }
01017ef8 6442
5446cbdf 6443 /* Look for an existing fixup to this address. */
d3e454b9 6444 for (f = branch_fixups; f ; f = f->next)
5446cbdf
AM
6445 if (f->tsec == tsec && f->toff == toff)
6446 break;
252b5132 6447
5446cbdf
AM
6448 if (f == NULL)
6449 {
6450 size_t size;
6451 unsigned long stub_rtype;
25dbc73a 6452
5446cbdf
AM
6453 val = trampoff - roff;
6454 if (val >= max_branch_offset)
6455 /* Oh dear, we can't reach a trampoline. Don't try to add
6456 one. We'll report an error later. */
6457 continue;
252b5132 6458
0e1862bb 6459 if (bfd_link_pic (link_info))
5446cbdf
AM
6460 {
6461 size = 4 * ARRAY_SIZE (shared_stub_entry);
6462 insn_offset = 12;
6463 }
6464 else
6465 {
6466 size = 4 * ARRAY_SIZE (stub_entry);
6467 insn_offset = 0;
6468 }
6469 stub_rtype = R_PPC_RELAX;
ce558b89 6470 if (tsec == htab->elf.splt
5446cbdf
AM
6471 || tsec == htab->glink)
6472 {
6473 stub_rtype = R_PPC_RELAX_PLT;
6474 if (r_type == R_PPC_PLTREL24)
6475 stub_rtype = R_PPC_RELAX_PLTREL24;
6476 }
252b5132 6477
5446cbdf
AM
6478 /* Hijack the old relocation. Since we need two
6479 relocations for this use a "composite" reloc. */
6480 irel->r_info = ELF32_R_INFO (ELF32_R_SYM (irel->r_info),
6481 stub_rtype);
6482 irel->r_offset = trampoff + insn_offset;
6483 if (r_type == R_PPC_PLTREL24
6484 && stub_rtype != R_PPC_RELAX_PLTREL24)
6485 irel->r_addend = 0;
6486
6487 /* Record the fixup so we don't do it again this section. */
6488 f = bfd_malloc (sizeof (*f));
d3e454b9 6489 f->next = branch_fixups;
5446cbdf
AM
6490 f->tsec = tsec;
6491 f->toff = toff;
6492 f->trampoff = trampoff;
d3e454b9 6493 branch_fixups = f;
5446cbdf
AM
6494
6495 trampoff += size;
6496 changes++;
25dbc73a
AM
6497 }
6498 else
6499 {
5446cbdf
AM
6500 val = f->trampoff - roff;
6501 if (val >= max_branch_offset)
6502 continue;
252b5132 6503
5446cbdf
AM
6504 /* Nop out the reloc, since we're finalizing things here. */
6505 irel->r_info = ELF32_R_INFO (0, R_PPC_NONE);
6506 }
252b5132 6507
5446cbdf
AM
6508 /* Get the section contents. */
6509 if (contents == NULL)
25dbc73a 6510 {
5446cbdf
AM
6511 /* Get cached copy if it exists. */
6512 if (elf_section_data (isec)->this_hdr.contents != NULL)
6513 contents = elf_section_data (isec)->this_hdr.contents;
25dbc73a 6514 /* Go get them off disk. */
5446cbdf 6515 else if (!bfd_malloc_and_get_section (abfd, isec, &contents))
25dbc73a
AM
6516 goto error_return;
6517 }
252b5132 6518
5446cbdf
AM
6519 /* Fix up the existing branch to hit the trampoline. */
6520 hit_addr = contents + roff;
6521 switch (r_type)
6522 {
6523 case R_PPC_REL24:
6524 case R_PPC_LOCAL24PC:
6525 case R_PPC_PLTREL24:
6526 t0 = bfd_get_32 (abfd, hit_addr);
6527 t0 &= ~0x3fffffc;
6528 t0 |= val & 0x3fffffc;
6529 bfd_put_32 (abfd, t0, hit_addr);
6530 break;
252b5132 6531
5446cbdf
AM
6532 case R_PPC_REL14:
6533 case R_PPC_REL14_BRTAKEN:
6534 case R_PPC_REL14_BRNTAKEN:
6535 t0 = bfd_get_32 (abfd, hit_addr);
6536 t0 &= ~0xfffc;
6537 t0 |= val & 0xfffc;
6538 bfd_put_32 (abfd, t0, hit_addr);
6539 break;
6540 }
25dbc73a 6541 }
252b5132 6542
d3e454b9 6543 while (branch_fixups != NULL)
25dbc73a 6544 {
d3e454b9
AM
6545 struct one_branch_fixup *f = branch_fixups;
6546 branch_fixups = branch_fixups->next;
25dbc73a
AM
6547 free (f);
6548 }
5446cbdf 6549 }
252b5132 6550
5446cbdf
AM
6551 workaround_change = FALSE;
6552 newsize = trampoff;
795bc6b3 6553 if (htab->params->ppc476_workaround
0e1862bb 6554 && (!bfd_link_relocatable (link_info)
795bc6b3 6555 || isec->output_section->alignment_power >= htab->params->pagesize_p2))
5446cbdf
AM
6556 {
6557 bfd_vma addr, end_addr;
6558 unsigned int crossings;
795bc6b3 6559 bfd_vma pagesize = (bfd_vma) 1 << htab->params->pagesize_p2;
5446cbdf
AM
6560
6561 addr = isec->output_section->vma + isec->output_offset;
6128f9cf 6562 end_addr = addr + trampoff;
5446cbdf 6563 addr &= -pagesize;
795bc6b3 6564 crossings = ((end_addr & -pagesize) - addr) >> htab->params->pagesize_p2;
5446cbdf
AM
6565 if (crossings != 0)
6566 {
6567 /* Keep space aligned, to ensure the patch code itself does
6568 not cross a page. Don't decrease size calculated on a
6569 previous pass as otherwise we might never settle on a layout. */
1e269e9b 6570 newsize = 15 - ((end_addr - 1) & 15);
5446cbdf
AM
6571 newsize += crossings * 16;
6572 if (relax_info->workaround_size < newsize)
6573 {
6574 relax_info->workaround_size = newsize;
6575 workaround_change = TRUE;
5446cbdf
AM
6576 }
6577 /* Ensure relocate_section is called. */
6578 isec->flags |= SEC_RELOC;
6579 }
6580 newsize = trampoff + relax_info->workaround_size;
6581 }
6582
d3e454b9
AM
6583 if (htab->params->pic_fixup > 0)
6584 {
6585 picfixup_size -= relax_info->picfixup_size;
6586 if (picfixup_size != 0)
6587 relax_info->picfixup_size += picfixup_size;
6588 newsize += relax_info->picfixup_size;
6589 }
6590
6591 if (changes != 0 || picfixup_size != 0 || workaround_change)
5446cbdf
AM
6592 isec->size = newsize;
6593
25dbc73a
AM
6594 if (isymbuf != NULL
6595 && symtab_hdr->contents != (unsigned char *) isymbuf)
252b5132 6596 {
25dbc73a
AM
6597 if (! link_info->keep_memory)
6598 free (isymbuf);
252b5132 6599 else
25dbc73a
AM
6600 {
6601 /* Cache the symbols for elf_link_input_bfd. */
6602 symtab_hdr->contents = (unsigned char *) isymbuf;
6603 }
252b5132
RH
6604 }
6605
25dbc73a
AM
6606 if (contents != NULL
6607 && elf_section_data (isec)->this_hdr.contents != contents)
6608 {
53291d1f 6609 if (!changes && !link_info->keep_memory)
25dbc73a
AM
6610 free (contents);
6611 else
6612 {
6613 /* Cache the section contents for elf_link_input_bfd. */
6614 elf_section_data (isec)->this_hdr.contents = contents;
6615 }
6616 }
252b5132 6617
d3e454b9 6618 changes += picfixup_size;
9bc4e62b 6619 if (changes != 0)
25dbc73a 6620 {
9bc4e62b
NS
6621 /* Append sufficient NOP relocs so we can write out relocation
6622 information for the trampolines. */
d4730f92 6623 Elf_Internal_Shdr *rel_hdr;
9bc4e62b
NS
6624 Elf_Internal_Rela *new_relocs = bfd_malloc ((changes + isec->reloc_count)
6625 * sizeof (*new_relocs));
6626 unsigned ix;
5b914448 6627
9bc4e62b
NS
6628 if (!new_relocs)
6629 goto error_return;
6630 memcpy (new_relocs, internal_relocs,
6631 isec->reloc_count * sizeof (*new_relocs));
6632 for (ix = changes; ix--;)
6633 {
6634 irel = new_relocs + ix + isec->reloc_count;
6635
6636 irel->r_info = ELF32_R_INFO (0, R_PPC_NONE);
6637 }
6638 if (internal_relocs != elf_section_data (isec)->relocs)
25dbc73a 6639 free (internal_relocs);
9bc4e62b
NS
6640 elf_section_data (isec)->relocs = new_relocs;
6641 isec->reloc_count += changes;
d4730f92
BS
6642 rel_hdr = _bfd_elf_single_rel_hdr (isec);
6643 rel_hdr->sh_size += changes * rel_hdr->sh_entsize;
25dbc73a 6644 }
5446cbdf
AM
6645 else if (internal_relocs != NULL
6646 && elf_section_data (isec)->relocs != internal_relocs)
9bc4e62b 6647 free (internal_relocs);
252b5132 6648
5446cbdf 6649 *again = changes != 0 || workaround_change;
b34976b6 6650 return TRUE;
25dbc73a
AM
6651
6652 error_return:
d3e454b9 6653 while (branch_fixups != NULL)
5446cbdf 6654 {
d3e454b9
AM
6655 struct one_branch_fixup *f = branch_fixups;
6656 branch_fixups = branch_fixups->next;
5446cbdf
AM
6657 free (f);
6658 }
25dbc73a
AM
6659 if (isymbuf != NULL && (unsigned char *) isymbuf != symtab_hdr->contents)
6660 free (isymbuf);
6661 if (contents != NULL
6662 && elf_section_data (isec)->this_hdr.contents != contents)
6663 free (contents);
6664 if (internal_relocs != NULL
6665 && elf_section_data (isec)->relocs != internal_relocs)
6666 free (internal_relocs);
6667 return FALSE;
252b5132 6668}
252b5132 6669\f
8a696751
AM
6670/* What to do when ld finds relocations against symbols defined in
6671 discarded sections. */
6672
6673static unsigned int
6674ppc_elf_action_discarded (asection *sec)
6675{
6676 if (strcmp (".fixup", sec->name) == 0)
6677 return 0;
6678
6679 if (strcmp (".got2", sec->name) == 0)
6680 return 0;
6681
6682 return _bfd_elf_default_action_discarded (sec);
6683}
c9a2f333 6684\f
25dbc73a 6685/* Fill in the address for a pointer generated in a linker section. */
252b5132 6686
25dbc73a 6687static bfd_vma
76750a2f 6688elf_finish_pointer_linker_section (bfd *input_bfd,
25dbc73a
AM
6689 elf_linker_section_t *lsect,
6690 struct elf_link_hash_entry *h,
6691 bfd_vma relocation,
2bb04cf2 6692 const Elf_Internal_Rela *rel)
25dbc73a
AM
6693{
6694 elf_linker_section_pointers_t *linker_section_ptr;
252b5132 6695
25dbc73a 6696 BFD_ASSERT (lsect != NULL);
252b5132 6697
25dbc73a 6698 if (h != NULL)
252b5132 6699 {
25dbc73a
AM
6700 /* Handle global symbol. */
6701 struct ppc_elf_link_hash_entry *eh;
252b5132 6702
25dbc73a 6703 eh = (struct ppc_elf_link_hash_entry *) h;
76750a2f
AM
6704 BFD_ASSERT (eh->elf.def_regular);
6705 linker_section_ptr = eh->linker_section_pointer;
25dbc73a
AM
6706 }
6707 else
6708 {
6709 /* Handle local symbol. */
6710 unsigned long r_symndx = ELF32_R_SYM (rel->r_info);
76750a2f 6711
0c8d6e5c 6712 BFD_ASSERT (is_ppc_elf (input_bfd));
25dbc73a 6713 BFD_ASSERT (elf_local_ptr_offsets (input_bfd) != NULL);
76750a2f
AM
6714 linker_section_ptr = elf_local_ptr_offsets (input_bfd)[r_symndx];
6715 }
252b5132 6716
76750a2f
AM
6717 linker_section_ptr = elf_find_pointer_linker_section (linker_section_ptr,
6718 rel->r_addend,
6719 lsect);
6720 BFD_ASSERT (linker_section_ptr != NULL);
25dbc73a 6721
76750a2f
AM
6722 /* Offset will always be a multiple of four, so use the bottom bit
6723 as a "written" flag. */
6724 if ((linker_section_ptr->offset & 1) == 0)
6725 {
6726 bfd_put_32 (lsect->section->owner,
6727 relocation + linker_section_ptr->addend,
6728 lsect->section->contents + linker_section_ptr->offset);
6729 linker_section_ptr->offset += 1;
252b5132
RH
6730 }
6731
bd6c6e2b
AM
6732 relocation = (lsect->section->output_section->vma
6733 + lsect->section->output_offset
76750a2f 6734 + linker_section_ptr->offset - 1
bd6c6e2b 6735 - SYM_VAL (lsect->sym));
252b5132 6736
25dbc73a
AM
6737#ifdef DEBUG
6738 fprintf (stderr,
6739 "Finish pointer in linker section %s, offset = %ld (0x%lx)\n",
6740 lsect->name, (long) relocation, (long) relocation);
6741#endif
252b5132 6742
bd6c6e2b 6743 return relocation;
252b5132 6744}
25dbc73a 6745
e054468f
AM
6746#define PPC_LO(v) ((v) & 0xffff)
6747#define PPC_HI(v) (((v) >> 16) & 0xffff)
6748#define PPC_HA(v) PPC_HI ((v) + 0x8000)
6749
6750static void
9e390558
AM
6751write_glink_stub (struct elf_link_hash_entry *h, struct plt_entry *ent,
6752 asection *plt_sec, unsigned char *p,
e054468f
AM
6753 struct bfd_link_info *info)
6754{
6755 struct ppc_elf_link_hash_table *htab = ppc_elf_hash_table (info);
6756 bfd *output_bfd = info->output_bfd;
6757 bfd_vma plt;
9e390558
AM
6758 unsigned char *end = p + GLINK_ENTRY_SIZE (htab, h);
6759
6760 if (h != NULL
6761 && h == htab->tls_get_addr
6762 && !htab->params->no_tls_get_addr_opt)
6763 {
6764 bfd_put_32 (output_bfd, LWZ_11_3, p);
6765 p += 4;
6766 bfd_put_32 (output_bfd, LWZ_12_3 + 4, p);
6767 p += 4;
6768 bfd_put_32 (output_bfd, MR_0_3, p);
6769 p += 4;
6770 bfd_put_32 (output_bfd, CMPWI_11_0, p);
6771 p += 4;
6772 bfd_put_32 (output_bfd, ADD_3_12_2, p);
6773 p += 4;
6774 bfd_put_32 (output_bfd, BEQLR, p);
6775 p += 4;
6776 bfd_put_32 (output_bfd, MR_3_0, p);
6777 p += 4;
6778 bfd_put_32 (output_bfd, NOP, p);
6779 p += 4;
6780 }
e054468f
AM
6781
6782 plt = ((ent->plt.offset & ~1)
6783 + plt_sec->output_section->vma
6784 + plt_sec->output_offset);
e054468f 6785
0e1862bb 6786 if (bfd_link_pic (info))
e054468f
AM
6787 {
6788 bfd_vma got = 0;
6789
6790 if (ent->addend >= 32768)
6791 got = (ent->addend
6792 + ent->sec->output_section->vma
6793 + ent->sec->output_offset);
6794 else if (htab->elf.hgot != NULL)
6795 got = SYM_VAL (htab->elf.hgot);
6796
6797 plt -= got;
6798
6799 if (plt + 0x8000 < 0x10000)
9e390558 6800 bfd_put_32 (output_bfd, LWZ_11_30 + PPC_LO (plt), p);
e054468f
AM
6801 else
6802 {
6803 bfd_put_32 (output_bfd, ADDIS_11_30 + PPC_HA (plt), p);
6804 p += 4;
6805 bfd_put_32 (output_bfd, LWZ_11_11 + PPC_LO (plt), p);
e054468f
AM
6806 }
6807 }
6808 else
6809 {
6810 bfd_put_32 (output_bfd, LIS_11 + PPC_HA (plt), p);
6811 p += 4;
6812 bfd_put_32 (output_bfd, LWZ_11_11 + PPC_LO (plt), p);
9e390558
AM
6813 }
6814 p += 4;
6815 bfd_put_32 (output_bfd, MTCTR_11, p);
6816 p += 4;
407aa07c
AM
6817 bfd_put_32 (output_bfd, BCTR, p);
6818 p += 4;
9e390558
AM
6819 while (p < end)
6820 {
6821 bfd_put_32 (output_bfd, htab->params->ppc476_workaround ? BA : NOP, p);
e054468f
AM
6822 p += 4;
6823 }
6824}
6825
bd6c6e2b
AM
6826/* Return true if symbol is defined statically. */
6827
6828static bfd_boolean
6829is_static_defined (struct elf_link_hash_entry *h)
6830{
6831 return ((h->root.type == bfd_link_hash_defined
6832 || h->root.type == bfd_link_hash_defweak)
6833 && h->root.u.def.section != NULL
6834 && h->root.u.def.section->output_section != NULL);
6835}
6836
2d0f3896
AM
6837/* If INSN is an opcode that may be used with an @tls operand, return
6838 the transformed insn for TLS optimisation, otherwise return 0. If
6839 REG is non-zero only match an insn with RB or RA equal to REG. */
6840
6841unsigned int
6842_bfd_elf_ppc_at_tls_transform (unsigned int insn, unsigned int reg)
6843{
6844 unsigned int rtra;
6845
2365f8d7 6846 if ((insn & (0x3fu << 26)) != 31 << 26)
2d0f3896
AM
6847 return 0;
6848
6849 if (reg == 0 || ((insn >> 11) & 0x1f) == reg)
6850 rtra = insn & ((1 << 26) - (1 << 16));
6851 else if (((insn >> 16) & 0x1f) == reg)
6852 rtra = (insn & (0x1f << 21)) | ((insn & (0x1f << 11)) << 5);
6853 else
6854 return 0;
6855
6856 if ((insn & (0x3ff << 1)) == 266 << 1)
6857 /* add -> addi. */
6858 insn = 14 << 26;
6859 else if ((insn & (0x1f << 1)) == 23 << 1
6860 && ((insn & (0x1f << 6)) < 14 << 6
6861 || ((insn & (0x1f << 6)) >= 16 << 6
6862 && (insn & (0x1f << 6)) < 24 << 6)))
6863 /* load and store indexed -> dform. */
2365f8d7 6864 insn = (32u | ((insn >> 6) & 0x1f)) << 26;
2d0f3896
AM
6865 else if ((insn & (((0x1a << 5) | 0x1f) << 1)) == 21 << 1)
6866 /* ldx, ldux, stdx, stdux -> ld, ldu, std, stdu. */
2365f8d7 6867 insn = ((58u | ((insn >> 6) & 4)) << 26) | ((insn >> 6) & 1);
2d0f3896
AM
6868 else if ((insn & (((0x1f << 5) | 0x1f) << 1)) == 341 << 1)
6869 /* lwax -> lwa. */
2365f8d7 6870 insn = (58u << 26) | 2;
2d0f3896
AM
6871 else
6872 return 0;
6873 insn |= rtra;
6874 return insn;
6875}
6876
766bc656
AM
6877/* If INSN is an opcode that may be used with an @tprel operand, return
6878 the transformed insn for an undefined weak symbol, ie. with the
6879 thread pointer REG operand removed. Otherwise return 0. */
6880
6881unsigned int
6882_bfd_elf_ppc_at_tprel_transform (unsigned int insn, unsigned int reg)
6883{
6884 if ((insn & (0x1f << 16)) == reg << 16
2365f8d7
AM
6885 && ((insn & (0x3fu << 26)) == 14u << 26 /* addi */
6886 || (insn & (0x3fu << 26)) == 15u << 26 /* addis */
6887 || (insn & (0x3fu << 26)) == 32u << 26 /* lwz */
6888 || (insn & (0x3fu << 26)) == 34u << 26 /* lbz */
6889 || (insn & (0x3fu << 26)) == 36u << 26 /* stw */
6890 || (insn & (0x3fu << 26)) == 38u << 26 /* stb */
6891 || (insn & (0x3fu << 26)) == 40u << 26 /* lhz */
6892 || (insn & (0x3fu << 26)) == 42u << 26 /* lha */
6893 || (insn & (0x3fu << 26)) == 44u << 26 /* sth */
6894 || (insn & (0x3fu << 26)) == 46u << 26 /* lmw */
6895 || (insn & (0x3fu << 26)) == 47u << 26 /* stmw */
6896 || (insn & (0x3fu << 26)) == 48u << 26 /* lfs */
6897 || (insn & (0x3fu << 26)) == 50u << 26 /* lfd */
6898 || (insn & (0x3fu << 26)) == 52u << 26 /* stfs */
6899 || (insn & (0x3fu << 26)) == 54u << 26 /* stfd */
6900 || ((insn & (0x3fu << 26)) == 58u << 26 /* lwa,ld,lmd */
766bc656 6901 && (insn & 3) != 1)
2365f8d7 6902 || ((insn & (0x3fu << 26)) == 62u << 26 /* std, stmd */
766bc656
AM
6903 && ((insn & 3) == 0 || (insn & 3) == 3))))
6904 {
6905 insn &= ~(0x1f << 16);
6906 }
6907 else if ((insn & (0x1f << 21)) == reg << 21
2365f8d7
AM
6908 && ((insn & (0x3eu << 26)) == 24u << 26 /* ori, oris */
6909 || (insn & (0x3eu << 26)) == 26u << 26 /* xori,xoris */
6910 || (insn & (0x3eu << 26)) == 28u << 26 /* andi,andis */))
766bc656
AM
6911 {
6912 insn &= ~(0x1f << 21);
6913 insn |= (insn & (0x1f << 16)) << 5;
2365f8d7 6914 if ((insn & (0x3eu << 26)) == 26u << 26 /* xori,xoris */)
766bc656
AM
6915 insn -= 2 >> 26; /* convert to ori,oris */
6916 }
6917 else
6918 insn = 0;
6919 return insn;
6920}
6921
1fe532cf
AM
6922static bfd_boolean
6923is_insn_ds_form (unsigned int insn)
6924{
2365f8d7
AM
6925 return ((insn & (0x3fu << 26)) == 58u << 26 /* ld,ldu,lwa */
6926 || (insn & (0x3fu << 26)) == 62u << 26 /* std,stdu,stq */
6927 || (insn & (0x3fu << 26)) == 57u << 26 /* lfdp */
6928 || (insn & (0x3fu << 26)) == 61u << 26 /* stfdp */);
1fe532cf
AM
6929}
6930
6931static bfd_boolean
6932is_insn_dq_form (unsigned int insn)
6933{
2365f8d7
AM
6934 return ((insn & (0x3fu << 26)) == 56u << 26 /* lq */
6935 || ((insn & (0x3fu << 26)) == (61u << 26) /* lxv, stxv */
a680de9a 6936 && (insn & 3) == 1));
1fe532cf
AM
6937}
6938
252b5132
RH
6939/* The RELOCATE_SECTION function is called by the ELF backend linker
6940 to handle the relocations for a section.
6941
6942 The relocs are always passed as Rela structures; if the section
6943 actually uses Rel structures, the r_addend field will always be
6944 zero.
6945
6946 This function is responsible for adjust the section contents as
6947 necessary, and (if using Rela relocs and generating a
1049f94e 6948 relocatable output file) adjusting the reloc addend as
252b5132
RH
6949 necessary.
6950
6951 This function does not have to worry about setting the reloc
6952 address or the reloc symbol index.
6953
6954 LOCAL_SYMS is a pointer to the swapped in local symbols.
6955
6956 LOCAL_SECTIONS is an array giving the section in the input file
6957 corresponding to the st_shndx field of each local symbol.
6958
6959 The global hash table entry for the global symbols can be found
6960 via elf_sym_hashes (input_bfd).
6961
1049f94e 6962 When generating relocatable output, this function must handle
252b5132
RH
6963 STB_LOCAL/STT_SECTION symbols specially. The output symbol is
6964 going to be the section symbol corresponding to the output
6965 section, which means that the addend must be adjusted
6966 accordingly. */
6967
b34976b6 6968static bfd_boolean
55fd94b0
AM
6969ppc_elf_relocate_section (bfd *output_bfd,
6970 struct bfd_link_info *info,
6971 bfd *input_bfd,
6972 asection *input_section,
6973 bfd_byte *contents,
6974 Elf_Internal_Rela *relocs,
6975 Elf_Internal_Sym *local_syms,
6976 asection **local_sections)
252b5132 6977{
7619e7c7
AM
6978 Elf_Internal_Shdr *symtab_hdr;
6979 struct elf_link_hash_entry **sym_hashes;
6980 struct ppc_elf_link_hash_table *htab;
6981 Elf_Internal_Rela *rel;
c316a17c 6982 Elf_Internal_Rela *wrel;
7619e7c7
AM
6983 Elf_Internal_Rela *relend;
6984 Elf_Internal_Rela outrel;
f95f8542 6985 asection *got2;
252b5132 6986 bfd_vma *local_got_offsets;
b34976b6 6987 bfd_boolean ret = TRUE;
95f0d0d2 6988 bfd_vma d_offset = (bfd_big_endian (input_bfd) ? 2 : 0);
3348747a 6989 bfd_boolean is_vxworks_tls;
d3e454b9
AM
6990 unsigned int picfixup_size = 0;
6991 struct ppc_elf_relax_info *relax_info = NULL;
b34976b6 6992
252b5132 6993#ifdef DEBUG
871b3ab2 6994 _bfd_error_handler ("ppc_elf_relocate_section called for %pB section %pA, "
d003868e
AM
6995 "%ld relocations%s",
6996 input_bfd, input_section,
6997 (long) input_section->reloc_count,
0e1862bb 6998 (bfd_link_relocatable (info)) ? " (relocatable)" : "");
252b5132
RH
6999#endif
7000
7af5d5c4
AM
7001 if (!is_ppc_elf (input_bfd))
7002 {
7003 bfd_set_error (bfd_error_wrong_format);
7004 return FALSE;
7005 }
7006
a6aa5195
AM
7007 got2 = bfd_get_section_by_name (input_bfd, ".got2");
7008
e47cd125 7009 /* Initialize howto table if not already done. */
8da6118f 7010 if (!ppc_elf_howto_table[R_PPC_ADDR32])
252b5132
RH
7011 ppc_elf_howto_init ();
7012
7619e7c7 7013 htab = ppc_elf_hash_table (info);
252b5132 7014 local_got_offsets = elf_local_got_offsets (input_bfd);
0ffa91dd 7015 symtab_hdr = &elf_symtab_hdr (input_bfd);
7619e7c7 7016 sym_hashes = elf_sym_hashes (input_bfd);
3348747a
NS
7017 /* We have to handle relocations in vxworks .tls_vars sections
7018 specially, because the dynamic loader is 'weird'. */
0e1862bb 7019 is_vxworks_tls = (htab->is_vxworks && bfd_link_pic (info)
3348747a
NS
7020 && !strcmp (input_section->output_section->name,
7021 ".tls_vars"));
d3e454b9
AM
7022 if (input_section->sec_info_type == SEC_INFO_TYPE_TARGET)
7023 relax_info = elf_section_data (input_section)->sec_info;
c316a17c 7024 rel = wrel = relocs;
7619e7c7 7025 relend = relocs + input_section->reloc_count;
c316a17c 7026 for (; rel < relend; wrel++, rel++)
252b5132 7027 {
7619e7c7
AM
7028 enum elf_ppc_reloc_type r_type;
7029 bfd_vma addend;
7030 bfd_reloc_status_type r;
7031 Elf_Internal_Sym *sym;
7032 asection *sec;
7033 struct elf_link_hash_entry *h;
7034 const char *sym_name;
252b5132
RH
7035 reloc_howto_type *howto;
7036 unsigned long r_symndx;
7037 bfd_vma relocation;
91d6fa6a 7038 bfd_vma branch_bit, from;
23cedd1d 7039 bfd_boolean unresolved_reloc, save_unresolved_reloc;
7619e7c7
AM
7040 bfd_boolean warned;
7041 unsigned int tls_type, tls_mask, tls_gd;
08be3224 7042 struct plt_entry **ifunc, **plt_list;
86c95733 7043 struct reloc_howto_struct alt_howto;
7619e7c7 7044
c316a17c 7045 again:
55fd94b0
AM
7046 r_type = ELF32_R_TYPE (rel->r_info);
7047 sym = NULL;
7048 sec = NULL;
7049 h = NULL;
7619e7c7
AM
7050 unresolved_reloc = FALSE;
7051 warned = FALSE;
252b5132 7052 r_symndx = ELF32_R_SYM (rel->r_info);
560e09e9 7053
252b5132
RH
7054 if (r_symndx < symtab_hdr->sh_info)
7055 {
7056 sym = local_syms + r_symndx;
7057 sec = local_sections[r_symndx];
26c61ae5 7058 sym_name = bfd_elf_sym_name (input_bfd, symtab_hdr, sym, sec);
252b5132 7059
8517fae7 7060 relocation = _bfd_elf_rela_local_sym (output_bfd, sym, &sec, rel);
252b5132
RH
7061 }
7062 else
7063 {
62d887d4
L
7064 bfd_boolean ignored;
7065
b2a8e766
AM
7066 RELOC_FOR_GLOBAL_SYMBOL (info, input_bfd, input_section, rel,
7067 r_symndx, symtab_hdr, sym_hashes,
7068 h, sec, relocation,
62d887d4 7069 unresolved_reloc, warned, ignored);
9abc968f 7070
252b5132 7071 sym_name = h->root.root.string;
7619e7c7
AM
7072 }
7073
dbaa2011 7074 if (sec != NULL && discarded_section (sec))
ab96bf03
AM
7075 {
7076 /* For relocs against symbols from removed linkonce sections,
7077 or sections discarded by a linker script, we just want the
7078 section contents zeroed. Avoid any special processing. */
7079 howto = NULL;
7080 if (r_type < R_PPC_max)
7081 howto = ppc_elf_howto_table[r_type];
c316a17c
AM
7082
7083 _bfd_clear_contents (howto, input_bfd, input_section,
0930cb30 7084 contents, rel->r_offset);
c316a17c
AM
7085 wrel->r_offset = rel->r_offset;
7086 wrel->r_info = 0;
7087 wrel->r_addend = 0;
7088
7089 /* For ld -r, remove relocations in debug sections against
dcd2b8a0 7090 symbols defined in discarded sections. Not done for
c316a17c
AM
7091 non-debug to preserve relocs in .eh_frame which the
7092 eh_frame editing code expects to be present. */
7093 if (bfd_link_relocatable (info)
7094 && (input_section->flags & SEC_DEBUGGING))
7095 wrel--;
7096
7097 continue;
ab96bf03
AM
7098 }
7099
0e1862bb 7100 if (bfd_link_relocatable (info))
ab96bf03
AM
7101 {
7102 if (got2 != NULL
7103 && r_type == R_PPC_PLTREL24
f75e0e33 7104 && rel->r_addend != 0)
ab96bf03
AM
7105 {
7106 /* R_PPC_PLTREL24 is rather special. If non-zero, the
7107 addend specifies the GOT pointer offset within .got2. */
7108 rel->r_addend += got2->output_offset;
7109 }
53291d1f
AM
7110 if (r_type != R_PPC_RELAX_PLT
7111 && r_type != R_PPC_RELAX_PLTREL24
7112 && r_type != R_PPC_RELAX)
c316a17c 7113 goto copy_reloc;
ab96bf03
AM
7114 }
7115
7619e7c7
AM
7116 /* TLS optimizations. Replace instruction sequences and relocs
7117 based on information we collected in tls_optimize. We edit
7118 RELOCS so that --emit-relocs will output something sensible
7119 for the final instruction stream. */
7120 tls_mask = 0;
7121 tls_gd = 0;
727fc41e
AM
7122 if (h != NULL)
7123 tls_mask = ((struct ppc_elf_link_hash_entry *) h)->tls_mask;
7124 else if (local_got_offsets != NULL)
7619e7c7 7125 {
e054468f 7126 struct plt_entry **local_plt;
727fc41e 7127 char *lgot_masks;
e054468f
AM
7128 local_plt
7129 = (struct plt_entry **) (local_got_offsets + symtab_hdr->sh_info);
7130 lgot_masks = (char *) (local_plt + symtab_hdr->sh_info);
727fc41e 7131 tls_mask = lgot_masks[r_symndx];
7619e7c7
AM
7132 }
7133
7134 /* Ensure reloc mapping code below stays sane. */
7135 if ((R_PPC_GOT_TLSLD16 & 3) != (R_PPC_GOT_TLSGD16 & 3)
7136 || (R_PPC_GOT_TLSLD16_LO & 3) != (R_PPC_GOT_TLSGD16_LO & 3)
7137 || (R_PPC_GOT_TLSLD16_HI & 3) != (R_PPC_GOT_TLSGD16_HI & 3)
7138 || (R_PPC_GOT_TLSLD16_HA & 3) != (R_PPC_GOT_TLSGD16_HA & 3)
7139 || (R_PPC_GOT_TLSLD16 & 3) != (R_PPC_GOT_TPREL16 & 3)
7140 || (R_PPC_GOT_TLSLD16_LO & 3) != (R_PPC_GOT_TPREL16_LO & 3)
7141 || (R_PPC_GOT_TLSLD16_HI & 3) != (R_PPC_GOT_TPREL16_HI & 3)
7142 || (R_PPC_GOT_TLSLD16_HA & 3) != (R_PPC_GOT_TPREL16_HA & 3))
7143 abort ();
7144 switch (r_type)
7145 {
7146 default:
7147 break;
7148
7149 case R_PPC_GOT_TPREL16:
7150 case R_PPC_GOT_TPREL16_LO:
e054468f 7151 if ((tls_mask & TLS_TLS) != 0
7619e7c7
AM
7152 && (tls_mask & TLS_TPREL) == 0)
7153 {
7154 bfd_vma insn;
91d6fa6a 7155
95f0d0d2 7156 insn = bfd_get_32 (input_bfd,
c316a17c 7157 contents + rel->r_offset - d_offset);
7619e7c7
AM
7158 insn &= 31 << 21;
7159 insn |= 0x3c020000; /* addis 0,2,0 */
95f0d0d2 7160 bfd_put_32 (input_bfd, insn,
c316a17c 7161 contents + rel->r_offset - d_offset);
7619e7c7
AM
7162 r_type = R_PPC_TPREL16_HA;
7163 rel->r_info = ELF32_R_INFO (r_symndx, r_type);
7164 }
7165 break;
7166
7167 case R_PPC_TLS:
e054468f 7168 if ((tls_mask & TLS_TLS) != 0
7619e7c7
AM
7169 && (tls_mask & TLS_TPREL) == 0)
7170 {
2d0f3896
AM
7171 bfd_vma insn;
7172
95f0d0d2 7173 insn = bfd_get_32 (input_bfd, contents + rel->r_offset);
2d0f3896
AM
7174 insn = _bfd_elf_ppc_at_tls_transform (insn, 2);
7175 if (insn == 0)
7619e7c7 7176 abort ();
95f0d0d2 7177 bfd_put_32 (input_bfd, insn, contents + rel->r_offset);
7619e7c7
AM
7178 r_type = R_PPC_TPREL16_LO;
7179 rel->r_info = ELF32_R_INFO (r_symndx, r_type);
4fe5ca5b 7180
7619e7c7 7181 /* Was PPC_TLS which sits on insn boundary, now
4fe5ca5b
GM
7182 PPC_TPREL16_LO which is at low-order half-word. */
7183 rel->r_offset += d_offset;
7619e7c7
AM
7184 }
7185 break;
7186
7187 case R_PPC_GOT_TLSGD16_HI:
7188 case R_PPC_GOT_TLSGD16_HA:
b00a0a86 7189 tls_gd = TLS_GDIE;
e054468f 7190 if ((tls_mask & TLS_TLS) != 0 && (tls_mask & TLS_GD) == 0)
7619e7c7
AM
7191 goto tls_gdld_hi;
7192 break;
7193
7194 case R_PPC_GOT_TLSLD16_HI:
7195 case R_PPC_GOT_TLSLD16_HA:
e054468f 7196 if ((tls_mask & TLS_TLS) != 0 && (tls_mask & TLS_LD) == 0)
7619e7c7
AM
7197 {
7198 tls_gdld_hi:
7199 if ((tls_mask & tls_gd) != 0)
7200 r_type = (((r_type - (R_PPC_GOT_TLSGD16 & 3)) & 3)
7201 + R_PPC_GOT_TPREL16);
7202 else
7203 {
4fe5ca5b 7204 rel->r_offset -= d_offset;
95f0d0d2 7205 bfd_put_32 (input_bfd, NOP, contents + rel->r_offset);
7619e7c7
AM
7206 r_type = R_PPC_NONE;
7207 }
7208 rel->r_info = ELF32_R_INFO (r_symndx, r_type);
7209 }
7210 break;
7211
7212 case R_PPC_GOT_TLSGD16:
7213 case R_PPC_GOT_TLSGD16_LO:
b00a0a86 7214 tls_gd = TLS_GDIE;
e054468f 7215 if ((tls_mask & TLS_TLS) != 0 && (tls_mask & TLS_GD) == 0)
b7fcf6f6 7216 goto tls_ldgd_opt;
7619e7c7
AM
7217 break;
7218
7219 case R_PPC_GOT_TLSLD16:
7220 case R_PPC_GOT_TLSLD16_LO:
e054468f 7221 if ((tls_mask & TLS_TLS) != 0 && (tls_mask & TLS_LD) == 0)
7619e7c7 7222 {
3a71aa26 7223 unsigned int insn1, insn2;
b7fcf6f6 7224 bfd_vma offset;
7619e7c7 7225
b7fcf6f6 7226 tls_ldgd_opt:
727fc41e
AM
7227 offset = (bfd_vma) -1;
7228 /* If not using the newer R_PPC_TLSGD/LD to mark
7229 __tls_get_addr calls, we must trust that the call
7230 stays with its arg setup insns, ie. that the next
7231 reloc is the __tls_get_addr call associated with
7232 the current reloc. Edit both insns. */
9737e8af 7233 if (input_section->nomark_tls_get_addr
727fc41e
AM
7234 && rel + 1 < relend
7235 && branch_reloc_hash_match (input_bfd, rel + 1,
7236 htab->tls_get_addr))
7237 offset = rel[1].r_offset;
b86ac8e3
AM
7238 /* We read the low GOT_TLS insn because we need to keep
7239 the destination reg. It may be something other than
7240 the usual r3, and moved to r3 before the call by
7241 intervening code. */
95f0d0d2 7242 insn1 = bfd_get_32 (input_bfd,
b86ac8e3 7243 contents + rel->r_offset - d_offset);
b7fcf6f6
AM
7244 if ((tls_mask & tls_gd) != 0)
7245 {
7246 /* IE */
b86ac8e3 7247 insn1 &= (0x1f << 21) | (0x1f << 16);
2365f8d7 7248 insn1 |= 32u << 26; /* lwz */
727fc41e
AM
7249 if (offset != (bfd_vma) -1)
7250 {
f58d5a2d 7251 rel[1].r_info = ELF32_R_INFO (STN_UNDEF, R_PPC_NONE);
727fc41e 7252 insn2 = 0x7c631214; /* add 3,3,2 */
95f0d0d2 7253 bfd_put_32 (input_bfd, insn2, contents + offset);
727fc41e 7254 }
b7fcf6f6
AM
7255 r_type = (((r_type - (R_PPC_GOT_TLSGD16 & 3)) & 3)
7256 + R_PPC_GOT_TPREL16);
7257 rel->r_info = ELF32_R_INFO (r_symndx, r_type);
7258 }
7259 else
7260 {
7261 /* LE */
b86ac8e3
AM
7262 insn1 &= 0x1f << 21;
7263 insn1 |= 0x3c020000; /* addis r,2,0 */
7619e7c7
AM
7264 if (tls_gd == 0)
7265 {
b7fcf6f6 7266 /* Was an LD reloc. */
1d483afe
AM
7267 for (r_symndx = 0;
7268 r_symndx < symtab_hdr->sh_info;
7269 r_symndx++)
7270 if (local_sections[r_symndx] == sec)
7271 break;
7272 if (r_symndx >= symtab_hdr->sh_info)
cf35638d 7273 r_symndx = STN_UNDEF;
b7fcf6f6 7274 rel->r_addend = htab->elf.tls_sec->vma + DTP_OFFSET;
cf35638d 7275 if (r_symndx != STN_UNDEF)
1d483afe
AM
7276 rel->r_addend -= (local_syms[r_symndx].st_value
7277 + sec->output_offset
7278 + sec->output_section->vma);
7619e7c7 7279 }
b7fcf6f6
AM
7280 r_type = R_PPC_TPREL16_HA;
7281 rel->r_info = ELF32_R_INFO (r_symndx, r_type);
727fc41e
AM
7282 if (offset != (bfd_vma) -1)
7283 {
7284 rel[1].r_info = ELF32_R_INFO (r_symndx, R_PPC_TPREL16_LO);
7285 rel[1].r_offset = offset + d_offset;
7286 rel[1].r_addend = rel->r_addend;
7287 insn2 = 0x38630000; /* addi 3,3,0 */
95f0d0d2 7288 bfd_put_32 (input_bfd, insn2, contents + offset);
727fc41e 7289 }
b7fcf6f6 7290 }
95f0d0d2 7291 bfd_put_32 (input_bfd, insn1,
b7fcf6f6 7292 contents + rel->r_offset - d_offset);
b7fcf6f6
AM
7293 if (tls_gd == 0)
7294 {
7295 /* We changed the symbol on an LD reloc. Start over
7296 in order to get h, sym, sec etc. right. */
c316a17c 7297 goto again;
7619e7c7 7298 }
252b5132 7299 }
7619e7c7 7300 break;
727fc41e
AM
7301
7302 case R_PPC_TLSGD:
675e2809
AM
7303 if ((tls_mask & TLS_TLS) != 0 && (tls_mask & TLS_GD) == 0
7304 && rel + 1 < relend)
727fc41e
AM
7305 {
7306 unsigned int insn2;
7307 bfd_vma offset = rel->r_offset;
7308
23cedd1d
AM
7309 if (is_plt_seq_reloc (ELF32_R_TYPE (rel[1].r_info)))
7310 {
7311 bfd_put_32 (input_bfd, NOP, contents + offset);
7312 rel[1].r_info = ELF32_R_INFO (STN_UNDEF, R_PPC_NONE);
7313 break;
7314 }
7315
b00a0a86 7316 if ((tls_mask & TLS_GDIE) != 0)
727fc41e
AM
7317 {
7318 /* IE */
7319 r_type = R_PPC_NONE;
7320 insn2 = 0x7c631214; /* add 3,3,2 */
7321 }
7322 else
7323 {
7324 /* LE */
7325 r_type = R_PPC_TPREL16_LO;
7326 rel->r_offset += d_offset;
7327 insn2 = 0x38630000; /* addi 3,3,0 */
7328 }
7329 rel->r_info = ELF32_R_INFO (r_symndx, r_type);
95f0d0d2 7330 bfd_put_32 (input_bfd, insn2, contents + offset);
727fc41e
AM
7331 /* Zap the reloc on the _tls_get_addr call too. */
7332 BFD_ASSERT (offset == rel[1].r_offset);
f58d5a2d 7333 rel[1].r_info = ELF32_R_INFO (STN_UNDEF, R_PPC_NONE);
727fc41e
AM
7334 }
7335 break;
7336
7337 case R_PPC_TLSLD:
675e2809
AM
7338 if ((tls_mask & TLS_TLS) != 0 && (tls_mask & TLS_LD) == 0
7339 && rel + 1 < relend)
727fc41e
AM
7340 {
7341 unsigned int insn2;
7342
23cedd1d
AM
7343 if (is_plt_seq_reloc (ELF32_R_TYPE (rel[1].r_info)))
7344 {
7345 bfd_put_32 (input_bfd, NOP, contents + rel->r_offset);
7346 rel[1].r_info = ELF32_R_INFO (STN_UNDEF, R_PPC_NONE);
7347 break;
7348 }
7349
727fc41e
AM
7350 for (r_symndx = 0;
7351 r_symndx < symtab_hdr->sh_info;
7352 r_symndx++)
7353 if (local_sections[r_symndx] == sec)
7354 break;
7355 if (r_symndx >= symtab_hdr->sh_info)
cf35638d 7356 r_symndx = STN_UNDEF;
727fc41e 7357 rel->r_addend = htab->elf.tls_sec->vma + DTP_OFFSET;
cf35638d 7358 if (r_symndx != STN_UNDEF)
727fc41e
AM
7359 rel->r_addend -= (local_syms[r_symndx].st_value
7360 + sec->output_offset
7361 + sec->output_section->vma);
7362
7363 rel->r_info = ELF32_R_INFO (r_symndx, R_PPC_TPREL16_LO);
7364 rel->r_offset += d_offset;
7365 insn2 = 0x38630000; /* addi 3,3,0 */
95f0d0d2 7366 bfd_put_32 (input_bfd, insn2,
727fc41e
AM
7367 contents + rel->r_offset - d_offset);
7368 /* Zap the reloc on the _tls_get_addr call too. */
7369 BFD_ASSERT (rel->r_offset - d_offset == rel[1].r_offset);
f58d5a2d 7370 rel[1].r_info = ELF32_R_INFO (STN_UNDEF, R_PPC_NONE);
c316a17c 7371 goto again;
727fc41e
AM
7372 }
7373 break;
7619e7c7
AM
7374 }
7375
7376 /* Handle other relocations that tweak non-addend part of insn. */
7377 branch_bit = 0;
7378 switch (r_type)
7379 {
7380 default:
7381 break;
7382
7383 /* Branch taken prediction relocations. */
7384 case R_PPC_ADDR14_BRTAKEN:
7385 case R_PPC_REL14_BRTAKEN:
7386 branch_bit = BRANCH_PREDICT_BIT;
1a0670f3 7387 /* Fall through. */
7619e7c7 7388
4cc11e76 7389 /* Branch not taken prediction relocations. */
7619e7c7
AM
7390 case R_PPC_ADDR14_BRNTAKEN:
7391 case R_PPC_REL14_BRNTAKEN:
91d6fa6a 7392 {
23cedd1d 7393 unsigned int insn;
7619e7c7 7394
95f0d0d2 7395 insn = bfd_get_32 (input_bfd, contents + rel->r_offset);
91d6fa6a
NC
7396 insn &= ~BRANCH_PREDICT_BIT;
7397 insn |= branch_bit;
7619e7c7 7398
91d6fa6a
NC
7399 from = (rel->r_offset
7400 + input_section->output_offset
7401 + input_section->output_section->vma);
7619e7c7 7402
91d6fa6a
NC
7403 /* Invert 'y' bit if not the default. */
7404 if ((bfd_signed_vma) (relocation + rel->r_addend - from) < 0)
7405 insn ^= BRANCH_PREDICT_BIT;
7406
95f0d0d2 7407 bfd_put_32 (input_bfd, insn, contents + rel->r_offset);
91d6fa6a 7408 }
08be3224
AM
7409 break;
7410
7411 case R_PPC_PLT16_HA:
7412 {
7413 unsigned int insn;
7414
7415 insn = bfd_get_32 (input_bfd,
7416 contents + rel->r_offset - d_offset);
2365f8d7 7417 if ((insn & (0x3fu << 26)) == 15u << 26
08be3224
AM
7418 && (insn & (0x1f << 16)) != 0)
7419 {
7420 if (!bfd_link_pic (info))
7421 {
7422 /* Convert addis to lis. */
7423 insn &= ~(0x1f << 16);
7424 bfd_put_32 (input_bfd, insn,
7425 contents + rel->r_offset - d_offset);
7426 }
7427 }
7428 else if (bfd_link_pic (info))
7429 info->callbacks->einfo
7430 (_("%P: %H: error: %s with unexpected instruction %x\n"),
7431 input_bfd, input_section, rel->r_offset,
7432 "R_PPC_PLT16_HA", insn);
7433 }
7434 break;
252b5132
RH
7435 }
7436
d3e454b9
AM
7437 if (ELIMINATE_COPY_RELOCS
7438 && h != NULL
7439 && !h->def_regular
7440 && h->protected_def
7441 && ppc_elf_hash_entry (h)->has_addr16_ha
7442 && ppc_elf_hash_entry (h)->has_addr16_lo
7443 && htab->params->pic_fixup > 0)
7444 {
7445 /* Convert lis;addi or lis;load/store accessing a protected
7446 variable defined in a shared library to PIC. */
7447 unsigned int insn;
7448
7449 if (r_type == R_PPC_ADDR16_HA)
7450 {
95f0d0d2 7451 insn = bfd_get_32 (input_bfd,
d3e454b9 7452 contents + rel->r_offset - d_offset);
2365f8d7 7453 if ((insn & (0x3fu << 26)) == (15u << 26)
d3e454b9
AM
7454 && (insn & (0x1f << 16)) == 0 /* lis */)
7455 {
7456 bfd_byte *p;
7457 bfd_vma off;
7458 bfd_vma got_addr;
7459
7460 p = (contents + input_section->size
7461 - relax_info->workaround_size
7462 - relax_info->picfixup_size
7463 + picfixup_size);
7464 off = (p - contents) - (rel->r_offset - d_offset);
7465 if (off > 0x1fffffc || (off & 3) != 0)
7466 info->callbacks->einfo
174d0a74 7467 (_("%H: fixup branch overflow\n"),
d3e454b9
AM
7468 input_bfd, input_section, rel->r_offset);
7469
95f0d0d2 7470 bfd_put_32 (input_bfd, B | off,
d3e454b9 7471 contents + rel->r_offset - d_offset);
ce558b89
AM
7472 got_addr = (htab->elf.sgot->output_section->vma
7473 + htab->elf.sgot->output_offset
d3e454b9 7474 + (h->got.offset & ~1));
c316a17c
AM
7475 wrel->r_offset = (p - contents) + d_offset;
7476 wrel->r_info = ELF32_R_INFO (0, R_PPC_ADDR16_HA);
7477 wrel->r_addend = got_addr;
d3e454b9 7478 insn &= ~0xffff;
4aef7643 7479 insn |= ((unsigned int) (got_addr + 0x8000) >> 16) & 0xffff;
95f0d0d2 7480 bfd_put_32 (input_bfd, insn, p);
d3e454b9
AM
7481
7482 /* Convert lis to lwz, loading address from GOT. */
7483 insn &= ~0xffff;
7484 insn ^= (32u ^ 15u) << 26;
7485 insn |= (insn & (0x1f << 21)) >> 5;
7486 insn |= got_addr & 0xffff;
95f0d0d2 7487 bfd_put_32 (input_bfd, insn, p + 4);
d3e454b9 7488
95f0d0d2 7489 bfd_put_32 (input_bfd, B | ((-4 - off) & 0x3ffffff), p + 8);
d3e454b9
AM
7490 picfixup_size += 12;
7491
7492 /* Use one of the spare relocs, so --emit-relocs
7493 output is reasonable. */
7494 memmove (rel + 1, rel, (relend - rel - 1) * sizeof (*rel));
c316a17c
AM
7495 wrel++, rel++;
7496 rel->r_offset = wrel[-1].r_offset + 4;
d3e454b9 7497 rel->r_info = ELF32_R_INFO (0, R_PPC_ADDR16_LO);
c316a17c 7498 rel->r_addend = wrel[-1].r_addend;
d3e454b9
AM
7499
7500 /* Continue on as if we had a got reloc, to output
7501 dynamic reloc. */
7502 r_type = R_PPC_GOT16_LO;
7503 }
7504 else
2c4d9cbe 7505 _bfd_error_handler
695344c0 7506 /* xgettext:c-format */
2dcf00ce
AM
7507 (_("%pB(%pA+%#" PRIx64 "): error: "
7508 "%s with unexpected instruction %#x"),
7509 input_bfd, input_section, (uint64_t) rel->r_offset,
d3e454b9
AM
7510 "R_PPC_ADDR16_HA", insn);
7511 }
7512 else if (r_type == R_PPC_ADDR16_LO)
7513 {
95f0d0d2 7514 insn = bfd_get_32 (input_bfd,
d3e454b9 7515 contents + rel->r_offset - d_offset);
2365f8d7
AM
7516 if ((insn & (0x3fu << 26)) == 14u << 26 /* addi */
7517 || (insn & (0x3fu << 26)) == 32u << 26 /* lwz */
7518 || (insn & (0x3fu << 26)) == 34u << 26 /* lbz */
7519 || (insn & (0x3fu << 26)) == 36u << 26 /* stw */
7520 || (insn & (0x3fu << 26)) == 38u << 26 /* stb */
7521 || (insn & (0x3fu << 26)) == 40u << 26 /* lhz */
7522 || (insn & (0x3fu << 26)) == 42u << 26 /* lha */
7523 || (insn & (0x3fu << 26)) == 44u << 26 /* sth */
7524 || (insn & (0x3fu << 26)) == 46u << 26 /* lmw */
7525 || (insn & (0x3fu << 26)) == 47u << 26 /* stmw */
7526 || (insn & (0x3fu << 26)) == 48u << 26 /* lfs */
7527 || (insn & (0x3fu << 26)) == 50u << 26 /* lfd */
7528 || (insn & (0x3fu << 26)) == 52u << 26 /* stfs */
7529 || (insn & (0x3fu << 26)) == 54u << 26 /* stfd */
7530 || ((insn & (0x3fu << 26)) == 58u << 26 /* lwa,ld,lmd */
d3e454b9 7531 && (insn & 3) != 1)
2365f8d7 7532 || ((insn & (0x3fu << 26)) == 62u << 26 /* std, stmd */
d3e454b9
AM
7533 && ((insn & 3) == 0 || (insn & 3) == 3)))
7534 {
7535 /* Arrange to apply the reloc addend, if any. */
7536 relocation = 0;
7537 unresolved_reloc = FALSE;
7538 rel->r_info = ELF32_R_INFO (0, r_type);
7539 }
7540 else
2c4d9cbe 7541 _bfd_error_handler
695344c0 7542 /* xgettext:c-format */
2dcf00ce
AM
7543 (_("%pB(%pA+%#" PRIx64 "): error: "
7544 "%s with unexpected instruction %#x"),
7545 input_bfd, input_section, (uint64_t) rel->r_offset,
d3e454b9
AM
7546 "R_PPC_ADDR16_LO", insn);
7547 }
7548 }
7549
e054468f 7550 ifunc = NULL;
25f23106 7551 if (!htab->is_vxworks)
e054468f 7552 {
de972ffa
AM
7553 struct plt_entry *ent;
7554
e054468f
AM
7555 if (h != NULL)
7556 {
7557 if (h->type == STT_GNU_IFUNC)
7558 ifunc = &h->plt.plist;
7559 }
de972ffa
AM
7560 else if (local_got_offsets != NULL
7561 && ELF_ST_TYPE (sym->st_info) == STT_GNU_IFUNC)
e054468f 7562 {
de972ffa 7563 struct plt_entry **local_plt;
e054468f 7564
de972ffa
AM
7565 local_plt = (struct plt_entry **) (local_got_offsets
7566 + symtab_hdr->sh_info);
7567 ifunc = local_plt + r_symndx;
e054468f 7568 }
e054468f 7569
de972ffa
AM
7570 ent = NULL;
7571 if (ifunc != NULL
0e1862bb 7572 && (!bfd_link_pic (info)
08be3224
AM
7573 || is_branch_reloc (r_type)
7574 || r_type == R_PPC_PLT16_LO
7575 || r_type == R_PPC_PLT16_HI
7576 || r_type == R_PPC_PLT16_HA))
de972ffa
AM
7577 {
7578 addend = 0;
08be3224
AM
7579 if (bfd_link_pic (info)
7580 && (r_type == R_PPC_PLTREL24
7581 || r_type == R_PPC_PLT16_LO
7582 || r_type == R_PPC_PLT16_HI
7583 || r_type == R_PPC_PLT16_HA))
de972ffa
AM
7584 addend = rel->r_addend;
7585 ent = find_plt_ent (ifunc, got2, addend);
7586 }
7587 if (ent != NULL)
7588 {
888a7fc3
AM
7589 if (bfd_link_pic (info)
7590 && ent->sec != got2
7591 && htab->plt_type != PLT_NEW
7592 && (!htab->elf.dynamic_sections_created
7593 || h == NULL
7594 || h->dynindx == -1))
7595 {
7596 /* Uh oh, we are going to create a pic glink stub
7597 for an ifunc (here for h == NULL and later in
7598 finish_dynamic_symbol for h != NULL), and
7599 apparently are using code compiled with
7600 -mbss-plt. The difficulty is that -mbss-plt code
7601 gives no indication via a magic PLTREL24 addend
7602 whether r30 is equal to _GLOBAL_OFFSET_TABLE_ or
7603 is pointing into a .got2 section (and how far
7604 into .got2). */
7605 info->callbacks->einfo
695344c0 7606 /* xgettext:c-format */
174d0a74 7607 (_("%X%H: unsupported bss-plt -fPIC ifunc %s\n"),
888a7fc3
AM
7608 input_bfd, input_section, rel->r_offset, sym_name);
7609 }
e054468f
AM
7610
7611 unresolved_reloc = FALSE;
7612 if (htab->plt_type == PLT_NEW
7613 || !htab->elf.dynamic_sections_created
c7e17e05
AM
7614 || h == NULL
7615 || h->dynindx == -1)
e054468f
AM
7616 relocation = (htab->glink->output_section->vma
7617 + htab->glink->output_offset
7618 + (ent->glink_offset & ~1));
7619 else
ce558b89
AM
7620 relocation = (htab->elf.splt->output_section->vma
7621 + htab->elf.splt->output_offset
e054468f
AM
7622 + ent->plt.offset);
7623 }
7624 }
7625
7619e7c7 7626 addend = rel->r_addend;
23cedd1d 7627 save_unresolved_reloc = unresolved_reloc;
7619e7c7 7628 howto = NULL;
55fd94b0
AM
7629 if (r_type < R_PPC_max)
7630 howto = ppc_elf_howto_table[r_type];
9a23f96e
AM
7631
7632 switch (r_type)
7633 {
7634 default:
7635 break;
7636
7637 case R_PPC_TPREL16_HA:
7638 if (htab->do_tls_opt && relocation + addend + 0x8000 < 0x10000)
7639 {
7640 bfd_byte *p = contents + (rel->r_offset & ~3);
7641 unsigned int insn = bfd_get_32 (input_bfd, p);
2365f8d7 7642 if ((insn & ((0x3fu << 26) | 0x1f << 16))
9a23f96e
AM
7643 != ((15u << 26) | (2 << 16)) /* addis rt,2,imm */)
7644 /* xgettext:c-format */
7645 info->callbacks->minfo
7646 (_("%H: warning: %s unexpected insn %#x.\n"),
7647 input_bfd, input_section, rel->r_offset, howto->name, insn);
7648 else
7649 bfd_put_32 (input_bfd, NOP, p);
7650 }
7651 break;
7652
7653 case R_PPC_TPREL16_LO:
7654 if (htab->do_tls_opt && relocation + addend + 0x8000 < 0x10000)
7655 {
7656 bfd_byte *p = contents + (rel->r_offset & ~3);
7657 unsigned int insn = bfd_get_32 (input_bfd, p);
7658 insn &= ~(0x1f << 16);
7659 insn |= 2 << 16;
7660 bfd_put_32 (input_bfd, insn, p);
7661 }
7662 break;
7663 }
7664
7665 tls_type = 0;
7619e7c7 7666 switch (r_type)
252b5132
RH
7667 {
7668 default:
cf97bcb0
AM
7669 /* xgettext:c-format */
7670 _bfd_error_handler (_("%pB: %s unsupported"),
7671 input_bfd, howto->name);
252b5132
RH
7672
7673 bfd_set_error (bfd_error_bad_value);
b34976b6 7674 ret = FALSE;
c316a17c 7675 goto copy_reloc;
252b5132 7676
7619e7c7
AM
7677 case R_PPC_NONE:
7678 case R_PPC_TLS:
727fc41e
AM
7679 case R_PPC_TLSGD:
7680 case R_PPC_TLSLD:
7619e7c7
AM
7681 case R_PPC_EMB_MRKREF:
7682 case R_PPC_GNU_VTINHERIT:
7683 case R_PPC_GNU_VTENTRY:
c316a17c 7684 goto copy_reloc;
7595d193 7685
7619e7c7
AM
7686 /* GOT16 relocations. Like an ADDR16 using the symbol's
7687 address in the GOT as relocation value instead of the
7688 symbol's value itself. Also, create a GOT entry for the
7689 symbol and put the symbol value there. */
7690 case R_PPC_GOT_TLSGD16:
7691 case R_PPC_GOT_TLSGD16_LO:
7692 case R_PPC_GOT_TLSGD16_HI:
7693 case R_PPC_GOT_TLSGD16_HA:
7694 tls_type = TLS_TLS | TLS_GD;
7695 goto dogot;
7696
7697 case R_PPC_GOT_TLSLD16:
7698 case R_PPC_GOT_TLSLD16_LO:
7699 case R_PPC_GOT_TLSLD16_HI:
7700 case R_PPC_GOT_TLSLD16_HA:
7701 tls_type = TLS_TLS | TLS_LD;
7702 goto dogot;
7703
7704 case R_PPC_GOT_TPREL16:
7705 case R_PPC_GOT_TPREL16_LO:
7706 case R_PPC_GOT_TPREL16_HI:
7707 case R_PPC_GOT_TPREL16_HA:
7708 tls_type = TLS_TLS | TLS_TPREL;
7709 goto dogot;
7710
7711 case R_PPC_GOT_DTPREL16:
7712 case R_PPC_GOT_DTPREL16_LO:
7713 case R_PPC_GOT_DTPREL16_HI:
7714 case R_PPC_GOT_DTPREL16_HA:
7715 tls_type = TLS_TLS | TLS_DTPREL;
7716 goto dogot;
7717
7718 case R_PPC_GOT16:
7719 case R_PPC_GOT16_LO:
7720 case R_PPC_GOT16_HI:
7721 case R_PPC_GOT16_HA:
727fc41e 7722 tls_mask = 0;
7619e7c7
AM
7723 dogot:
7724 {
7725 /* Relocation is to the entry for this symbol in the global
7726 offset table. */
7727 bfd_vma off;
7728 bfd_vma *offp;
7729 unsigned long indx;
7730
ce558b89 7731 if (htab->elf.sgot == NULL)
7619e7c7
AM
7732 abort ();
7733
7734 indx = 0;
7735 if (tls_type == (TLS_TLS | TLS_LD)
f749f26e 7736 && SYMBOL_REFERENCES_LOCAL (info, h))
7619e7c7
AM
7737 offp = &htab->tlsld_got.offset;
7738 else if (h != NULL)
7739 {
f0158f44
AM
7740 if (!htab->elf.dynamic_sections_created
7741 || h->dynindx == -1
7742 || SYMBOL_REFERENCES_LOCAL (info, h)
21d68fcd 7743 || UNDEFWEAK_NO_DYNAMIC_RELOC (info, h))
7619e7c7
AM
7744 /* This is actually a static link, or it is a
7745 -Bsymbolic link and the symbol is defined
7746 locally, or the symbol was forced to be local
7747 because of a version file. */
7748 ;
7749 else
7750 {
7751 indx = h->dynindx;
7752 unresolved_reloc = FALSE;
7753 }
7754 offp = &h->got.offset;
7755 }
7756 else
7757 {
7758 if (local_got_offsets == NULL)
7759 abort ();
7760 offp = &local_got_offsets[r_symndx];
7761 }
7762
7763 /* The offset must always be a multiple of 4. We use the
7764 least significant bit to record whether we have already
7765 processed this entry. */
7766 off = *offp;
7767 if ((off & 1) != 0)
7768 off &= ~1;
7769 else
7770 {
37da22e5
AM
7771 unsigned int tls_m = ((tls_mask & TLS_TLS) != 0
7772 ? tls_mask & (TLS_LD | TLS_GD | TLS_DTPREL
b00a0a86 7773 | TLS_TPREL | TLS_GDIE)
37da22e5 7774 : 0);
70bccea4
AM
7775
7776 if (offp == &htab->tlsld_got.offset)
7777 tls_m = TLS_LD;
f749f26e
AM
7778 else if ((tls_m & TLS_LD) != 0
7779 && SYMBOL_REFERENCES_LOCAL (info, h))
70bccea4
AM
7780 tls_m &= ~TLS_LD;
7781
7782 /* We might have multiple got entries for this sym.
7783 Initialize them all. */
7784 do
7619e7c7 7785 {
70bccea4
AM
7786 int tls_ty = 0;
7787
7788 if ((tls_m & TLS_LD) != 0)
7619e7c7 7789 {
70bccea4
AM
7790 tls_ty = TLS_TLS | TLS_LD;
7791 tls_m &= ~TLS_LD;
7792 }
7793 else if ((tls_m & TLS_GD) != 0)
7794 {
7795 tls_ty = TLS_TLS | TLS_GD;
7796 tls_m &= ~TLS_GD;
7797 }
7798 else if ((tls_m & TLS_DTPREL) != 0)
7799 {
7800 tls_ty = TLS_TLS | TLS_DTPREL;
7801 tls_m &= ~TLS_DTPREL;
7802 }
b00a0a86 7803 else if ((tls_m & (TLS_TPREL | TLS_GDIE)) != 0)
70bccea4
AM
7804 {
7805 tls_ty = TLS_TLS | TLS_TPREL;
7806 tls_m = 0;
7619e7c7 7807 }
7619e7c7 7808
70bccea4 7809 /* Generate relocs for the dynamic linker. */
f0158f44
AM
7810 if (indx != 0
7811 || (bfd_link_pic (info)
7812 && (h == NULL
f749f26e
AM
7813 || !UNDEFWEAK_NO_DYNAMIC_RELOC (info, h))
7814 && !(tls_ty != 0
f15d0b54
AM
7815 && bfd_link_executable (info)
7816 && SYMBOL_REFERENCES_LOCAL (info, h))))
7619e7c7 7817 {
ce558b89 7818 asection *rsec = htab->elf.srelgot;
91d6fa6a 7819 bfd_byte * loc;
91e21fb7 7820
0bed072f 7821 if (ifunc != NULL)
82e66161
AM
7822 {
7823 rsec = htab->elf.irelplt;
7824 if (indx == 0)
7825 htab->local_ifunc_resolver = 1;
7826 else if (is_static_defined (h))
7827 htab->maybe_local_ifunc_resolver = 1;
7828 }
ce558b89
AM
7829 outrel.r_offset = (htab->elf.sgot->output_section->vma
7830 + htab->elf.sgot->output_offset
70bccea4 7831 + off);
e515b051 7832 outrel.r_addend = 0;
70bccea4
AM
7833 if (tls_ty & (TLS_LD | TLS_GD))
7834 {
7835 outrel.r_info = ELF32_R_INFO (indx, R_PPC_DTPMOD32);
70bccea4
AM
7836 if (tls_ty == (TLS_TLS | TLS_GD))
7837 {
25f23106
AM
7838 loc = rsec->contents;
7839 loc += (rsec->reloc_count++
70bccea4
AM
7840 * sizeof (Elf32_External_Rela));
7841 bfd_elf32_swap_reloca_out (output_bfd,
7842 &outrel, loc);
e515b051 7843 outrel.r_offset += 4;
70bccea4
AM
7844 outrel.r_info
7845 = ELF32_R_INFO (indx, R_PPC_DTPREL32);
70bccea4
AM
7846 }
7847 }
7848 else if (tls_ty == (TLS_TLS | TLS_DTPREL))
7849 outrel.r_info = ELF32_R_INFO (indx, R_PPC_DTPREL32);
7850 else if (tls_ty == (TLS_TLS | TLS_TPREL))
7851 outrel.r_info = ELF32_R_INFO (indx, R_PPC_TPREL32);
25f23106 7852 else if (indx != 0)
70bccea4 7853 outrel.r_info = ELF32_R_INFO (indx, R_PPC_GLOB_DAT);
25f23106
AM
7854 else if (ifunc != NULL)
7855 outrel.r_info = ELF32_R_INFO (0, R_PPC_IRELATIVE);
7856 else
7857 outrel.r_info = ELF32_R_INFO (0, R_PPC_RELATIVE);
d6e14abc 7858 if (indx == 0 && tls_ty != (TLS_TLS | TLS_LD))
e515b051
AM
7859 {
7860 outrel.r_addend += relocation;
7861 if (tls_ty & (TLS_GD | TLS_DTPREL | TLS_TPREL))
989f9879
AM
7862 {
7863 if (htab->elf.tls_sec == NULL)
7864 outrel.r_addend = 0;
7865 else
7866 outrel.r_addend -= htab->elf.tls_sec->vma;
7867 }
e515b051 7868 }
25f23106
AM
7869 loc = rsec->contents;
7870 loc += (rsec->reloc_count++
70bccea4
AM
7871 * sizeof (Elf32_External_Rela));
7872 bfd_elf32_swap_reloca_out (output_bfd, &outrel, loc);
7619e7c7
AM
7873 }
7874
70bccea4
AM
7875 /* Init the .got section contents if we're not
7876 emitting a reloc. */
7877 else
7619e7c7 7878 {
70bccea4
AM
7879 bfd_vma value = relocation;
7880
f0158f44 7881 if (tls_ty != 0)
70bccea4 7882 {
989f9879
AM
7883 if (htab->elf.tls_sec == NULL)
7884 value = 0;
7885 else
7886 {
f0158f44
AM
7887 if (tls_ty & TLS_LD)
7888 value = 0;
7889 else
7890 value -= htab->elf.tls_sec->vma + DTP_OFFSET;
676ee2b5 7891 if (tls_ty & TLS_TPREL)
989f9879
AM
7892 value += DTP_OFFSET - TP_OFFSET;
7893 }
70bccea4 7894
f0158f44 7895 if (tls_ty & (TLS_LD | TLS_GD))
7b609f53 7896 {
95f0d0d2 7897 bfd_put_32 (input_bfd, value,
ce558b89 7898 htab->elf.sgot->contents + off + 4);
676ee2b5 7899 value = 1;
7b609f53 7900 }
70bccea4 7901 }
95f0d0d2 7902 bfd_put_32 (input_bfd, value,
ce558b89 7903 htab->elf.sgot->contents + off);
7619e7c7 7904 }
70bccea4
AM
7905
7906 off += 4;
7907 if (tls_ty & (TLS_LD | TLS_GD))
7908 off += 4;
7619e7c7 7909 }
70bccea4
AM
7910 while (tls_m != 0);
7911
7912 off = *offp;
7913 *offp = off | 1;
7619e7c7
AM
7914 }
7915
7916 if (off >= (bfd_vma) -2)
7917 abort ();
7918
70bccea4
AM
7919 if ((tls_type & TLS_TLS) != 0)
7920 {
7921 if (tls_type != (TLS_TLS | TLS_LD))
7922 {
7923 if ((tls_mask & TLS_LD) != 0
f749f26e 7924 && !SYMBOL_REFERENCES_LOCAL (info, h))
70bccea4
AM
7925 off += 8;
7926 if (tls_type != (TLS_TLS | TLS_GD))
7927 {
7928 if ((tls_mask & TLS_GD) != 0)
7929 off += 8;
7930 if (tls_type != (TLS_TLS | TLS_DTPREL))
7931 {
7932 if ((tls_mask & TLS_DTPREL) != 0)
7933 off += 4;
7934 }
7935 }
7936 }
7937 }
7938
d3e454b9
AM
7939 /* If here for a picfixup, we're done. */
7940 if (r_type != ELF32_R_TYPE (rel->r_info))
c316a17c 7941 goto copy_reloc;
d3e454b9 7942
ce558b89
AM
7943 relocation = (htab->elf.sgot->output_section->vma
7944 + htab->elf.sgot->output_offset
e87d4038
AM
7945 + off
7946 - SYM_VAL (htab->elf.hgot));
7619e7c7
AM
7947
7948 /* Addends on got relocations don't make much sense.
7949 x+off@got is actually x@got+off, and since the got is
7950 generated by a hash table traversal, the value in the
7951 got at entry m+n bears little relation to the entry m. */
7952 if (addend != 0)
25f53a85 7953 info->callbacks->einfo
695344c0 7954 /* xgettext:c-format */
174d0a74 7955 (_("%H: non-zero addend on %s reloc against `%s'\n"),
25f53a85 7956 input_bfd, input_section, rel->r_offset,
7b609f53 7957 howto->name,
7619e7c7
AM
7958 sym_name);
7959 }
86c95733 7960 break;
7619e7c7 7961
86c95733 7962 /* Relocations that need no special processing. */
7619e7c7 7963 case R_PPC_LOCAL24PC:
252b5132
RH
7964 /* It makes no sense to point a local relocation
7965 at a symbol not in this object. */
7b609f53 7966 if (unresolved_reloc)
252b5132 7967 {
1a72702b
AM
7968 (*info->callbacks->undefined_symbol) (info,
7969 h->root.root.string,
7970 input_bfd,
7971 input_section,
7972 rel->r_offset,
7973 TRUE);
c316a17c 7974 goto copy_reloc;
252b5132 7975 }
888a7fc3
AM
7976 if (h != NULL && h->type == STT_GNU_IFUNC && bfd_link_pic (info))
7977 {
7978 /* @local on an ifunc does not really make sense since
7979 the ifunc resolver can take you anywhere. More
7980 seriously, calls to ifuncs must go through a plt call
7981 stub, and for pic the plt call stubs uses r30 to
7982 access the PLT. The problem is that a call that is
7983 local won't have the +32k reloc addend trick marking
7984 -fPIC code, so the linker won't know whether r30 is
7985 _GLOBAL_OFFSET_TABLE_ or pointing into a .got2 section. */
695344c0 7986 /* xgettext:c-format */
174d0a74 7987 info->callbacks->einfo (_("%X%H: @local call to ifunc %s\n"),
888a7fc3
AM
7988 input_bfd, input_section, rel->r_offset,
7989 h->root.root.string);
7990 }
252b5132
RH
7991 break;
7992
7619e7c7
AM
7993 case R_PPC_DTPREL16:
7994 case R_PPC_DTPREL16_LO:
7995 case R_PPC_DTPREL16_HI:
7996 case R_PPC_DTPREL16_HA:
989f9879
AM
7997 if (htab->elf.tls_sec != NULL)
7998 addend -= htab->elf.tls_sec->vma + DTP_OFFSET;
7619e7c7
AM
7999 break;
8000
70bccea4
AM
8001 /* Relocations that may need to be propagated if this is a shared
8002 object. */
7619e7c7
AM
8003 case R_PPC_TPREL16:
8004 case R_PPC_TPREL16_LO:
8005 case R_PPC_TPREL16_HI:
8006 case R_PPC_TPREL16_HA:
766bc656
AM
8007 if (h != NULL
8008 && h->root.type == bfd_link_hash_undefweak
8009 && h->dynindx == -1)
8010 {
8011 /* Make this relocation against an undefined weak symbol
8012 resolve to zero. This is really just a tweak, since
8013 code using weak externs ought to check that they are
8014 defined before using them. */
8015 bfd_byte *p = contents + rel->r_offset - d_offset;
95f0d0d2 8016 unsigned int insn = bfd_get_32 (input_bfd, p);
766bc656
AM
8017 insn = _bfd_elf_ppc_at_tprel_transform (insn, 2);
8018 if (insn != 0)
95f0d0d2 8019 bfd_put_32 (input_bfd, insn, p);
766bc656
AM
8020 break;
8021 }
989f9879
AM
8022 if (htab->elf.tls_sec != NULL)
8023 addend -= htab->elf.tls_sec->vma + TP_OFFSET;
7619e7c7 8024 /* The TPREL16 relocs shouldn't really be used in shared
7c8bbca5
AM
8025 libs or with non-local symbols as that will result in
8026 DT_TEXTREL being set, but support them anyway. */
7619e7c7
AM
8027 goto dodyn;
8028
8029 case R_PPC_TPREL32:
989f9879
AM
8030 if (htab->elf.tls_sec != NULL)
8031 addend -= htab->elf.tls_sec->vma + TP_OFFSET;
7619e7c7
AM
8032 goto dodyn;
8033
8034 case R_PPC_DTPREL32:
989f9879
AM
8035 if (htab->elf.tls_sec != NULL)
8036 addend -= htab->elf.tls_sec->vma + DTP_OFFSET;
7619e7c7
AM
8037 goto dodyn;
8038
e515b051
AM
8039 case R_PPC_DTPMOD32:
8040 relocation = 1;
8041 addend = 0;
8042 goto dodyn;
8043
d7128ce4
AM
8044 case R_PPC_REL16:
8045 case R_PPC_REL16_LO:
8046 case R_PPC_REL16_HI:
8047 case R_PPC_REL16_HA:
a680de9a 8048 case R_PPC_REL16DX_HA:
d7128ce4
AM
8049 break;
8050
7619e7c7 8051 case R_PPC_REL32:
625af618
AM
8052 if (h == NULL || h == htab->elf.hgot)
8053 break;
8054 /* fall through */
8055
8056 case R_PPC_ADDR32:
8057 case R_PPC_ADDR16:
8058 case R_PPC_ADDR16_LO:
8059 case R_PPC_ADDR16_HI:
8060 case R_PPC_ADDR16_HA:
8061 case R_PPC_UADDR32:
8062 case R_PPC_UADDR16:
8063 goto dodyn;
8064
b9c361e0
JL
8065 case R_PPC_VLE_REL8:
8066 case R_PPC_VLE_REL15:
8067 case R_PPC_VLE_REL24:
625af618 8068 case R_PPC_REL24:
7619e7c7
AM
8069 case R_PPC_REL14:
8070 case R_PPC_REL14_BRTAKEN:
8071 case R_PPC_REL14_BRNTAKEN:
252b5132
RH
8072 /* If these relocations are not to a named symbol, they can be
8073 handled right here, no need to bother the dynamic linker. */
89200bf8 8074 if (SYMBOL_CALLS_LOCAL (info, h)
3b36f7e6 8075 || h == htab->elf.hgot)
252b5132 8076 break;
70bccea4 8077 /* fall through */
252b5132 8078
7619e7c7 8079 case R_PPC_ADDR24:
7619e7c7
AM
8080 case R_PPC_ADDR14:
8081 case R_PPC_ADDR14_BRTAKEN:
8082 case R_PPC_ADDR14_BRNTAKEN:
0e1862bb 8083 if (h != NULL && !bfd_link_pic (info))
625af618
AM
8084 break;
8085 /* fall through */
8086
7619e7c7 8087 dodyn:
3348747a
NS
8088 if ((input_section->flags & SEC_ALLOC) == 0
8089 || is_vxworks_tls)
c87b5a93 8090 break;
c87b5a93 8091
287c7eaf
AM
8092 if (bfd_link_pic (info)
8093 ? ((h == NULL
8094 || ppc_elf_hash_entry (h)->dyn_relocs != NULL)
8095 && ((h != NULL && pc_dynrelocs (h))
8096 || must_be_dyn_reloc (info, r_type)))
8097 : (h != NULL
8098 && ppc_elf_hash_entry (h)->dyn_relocs != NULL))
252b5132 8099 {
0bb2d96a 8100 int skip;
f95f8542
AM
8101 bfd_byte *loc;
8102 asection *sreloc;
82e66161
AM
8103 long indx = 0;
8104
252b5132 8105#ifdef DEBUG
55fd94b0
AM
8106 fprintf (stderr, "ppc_elf_relocate_section needs to "
8107 "create relocation for %s\n",
70bccea4
AM
8108 (h && h->root.root.string
8109 ? h->root.root.string : "<unknown>"));
252b5132
RH
8110#endif
8111
8112 /* When generating a shared object, these relocations
70bccea4
AM
8113 are copied into the output file to be resolved at run
8114 time. */
0bb2d96a 8115 skip = 0;
5b914448
AM
8116 outrel.r_offset = _bfd_elf_section_offset (output_bfd, info,
8117 input_section,
8118 rel->r_offset);
0bb2d96a
JJ
8119 if (outrel.r_offset == (bfd_vma) -1
8120 || outrel.r_offset == (bfd_vma) -2)
8121 skip = (int) outrel.r_offset;
252b5132
RH
8122 outrel.r_offset += (input_section->output_section->vma
8123 + input_section->output_offset);
8124
63f6e94f
AM
8125 /* Optimize unaligned reloc use. */
8126 if ((r_type == R_PPC_ADDR32 && (outrel.r_offset & 3) != 0)
8127 || (r_type == R_PPC_UADDR32 && (outrel.r_offset & 3) == 0))
8128 r_type ^= R_PPC_ADDR32 ^ R_PPC_UADDR32;
8129 if ((r_type == R_PPC_ADDR16 && (outrel.r_offset & 1) != 0)
8130 || (r_type == R_PPC_UADDR16 && (outrel.r_offset & 1) == 0))
8131 r_type ^= R_PPC_ADDR16 ^ R_PPC_UADDR16;
8132
252b5132
RH
8133 if (skip)
8134 memset (&outrel, 0, sizeof outrel);
21d68fcd 8135 else if (!SYMBOL_REFERENCES_LOCAL (info, h))
252b5132 8136 {
82e66161
AM
8137 indx = h->dynindx;
8138 BFD_ASSERT (indx != -1);
7619e7c7 8139 unresolved_reloc = FALSE;
82e66161 8140 outrel.r_info = ELF32_R_INFO (indx, r_type);
252b5132
RH
8141 outrel.r_addend = rel->r_addend;
8142 }
8143 else
8144 {
47388f4c
AM
8145 outrel.r_addend = relocation + rel->r_addend;
8146
25f23106 8147 if (r_type != R_PPC_ADDR32)
252b5132 8148 {
25f23106
AM
8149 if (ifunc != NULL)
8150 {
8151 /* If we get here when building a static
8152 executable, then the libc startup function
8153 responsible for applying indirect function
8154 relocations is going to complain about
8155 the reloc type.
8156 If we get here when building a dynamic
8157 executable, it will be because we have
8158 a text relocation. The dynamic loader
8159 will set the text segment writable and
8160 non-executable to apply text relocations.
8161 So we'll segfault when trying to run the
8162 indirection function to resolve the reloc. */
25f53a85 8163 info->callbacks->einfo
695344c0 8164 /* xgettext:c-format */
174d0a74 8165 (_("%H: relocation %s for indirect "
25f53a85
AM
8166 "function %s unsupported\n"),
8167 input_bfd, input_section, rel->r_offset,
25f23106
AM
8168 howto->name,
8169 sym_name);
8170 ret = FALSE;
8171 }
cf35638d 8172 else if (r_symndx == STN_UNDEF || bfd_is_abs_section (sec))
89200bf8 8173 ;
252b5132
RH
8174 else if (sec == NULL || sec->owner == NULL)
8175 {
8176 bfd_set_error (bfd_error_bad_value);
89200bf8 8177 ret = FALSE;
252b5132
RH
8178 }
8179 else
8180 {
8181 asection *osec;
8182
47388f4c
AM
8183 /* We are turning this relocation into one
8184 against a section symbol. It would be
8185 proper to subtract the symbol's value,
8186 osec->vma, from the emitted reloc addend,
25f23106
AM
8187 but ld.so expects buggy relocs.
8188 FIXME: Why not always use a zero index? */
252b5132 8189 osec = sec->output_section;
f26a3287
AM
8190 if ((osec->flags & SEC_THREAD_LOCAL) != 0)
8191 {
8192 osec = htab->elf.tls_sec;
8193 indx = 0;
8194 }
8195 else
74541ad4 8196 {
74541ad4 8197 indx = elf_section_data (osec)->dynindx;
f26a3287
AM
8198 if (indx == 0)
8199 {
8200 osec = htab->elf.text_index_section;
8201 indx = elf_section_data (osec)->dynindx;
8202 }
8203 BFD_ASSERT (indx != 0);
74541ad4 8204 }
f26a3287
AM
8205
8206 /* ld.so doesn't expect buggy TLS relocs.
8207 Don't leave the symbol value in the
8208 addend for them. */
8209 if (IS_PPC_TLS_RELOC (r_type))
8210 outrel.r_addend -= osec->vma;
252b5132
RH
8211 }
8212
8213 outrel.r_info = ELF32_R_INFO (indx, r_type);
252b5132 8214 }
25f23106
AM
8215 else if (ifunc != NULL)
8216 outrel.r_info = ELF32_R_INFO (0, R_PPC_IRELATIVE);
8217 else
8218 outrel.r_info = ELF32_R_INFO (0, R_PPC_RELATIVE);
252b5132
RH
8219 }
8220
82e66161
AM
8221 sreloc = elf_section_data (input_section)->sreloc;
8222 if (ifunc)
8223 {
8224 sreloc = htab->elf.irelplt;
8225 if (indx == 0)
8226 htab->local_ifunc_resolver = 1;
8227 else if (is_static_defined (h))
8228 htab->maybe_local_ifunc_resolver = 1;
8229 }
8230 if (sreloc == NULL)
8231 return FALSE;
8232
947216bf
AM
8233 loc = sreloc->contents;
8234 loc += sreloc->reloc_count++ * sizeof (Elf32_External_Rela);
8235 bfd_elf32_swap_reloca_out (output_bfd, &outrel, loc);
252b5132 8236
2243deae 8237 if (skip == -1)
c316a17c 8238 goto copy_reloc;
2243deae 8239
f0158f44
AM
8240 /* This reloc will be computed at runtime. Clear the memory
8241 so that it contains a predictable value for prelink. */
8242 if (!skip)
2243deae
L
8243 {
8244 relocation = howto->pc_relative ? outrel.r_offset : 0;
8245 addend = 0;
8246 break;
8247 }
252b5132 8248 }
252b5132
RH
8249 break;
8250
32af9f6e
AM
8251 case R_PPC_RELAX_PLT:
8252 case R_PPC_RELAX_PLTREL24:
de972ffa
AM
8253 if (h != NULL)
8254 {
32af9f6e
AM
8255 struct plt_entry *ent;
8256 bfd_vma got2_addend = 0;
8257
8258 if (r_type == R_PPC_RELAX_PLTREL24)
8259 {
0e1862bb 8260 if (bfd_link_pic (info))
32af9f6e
AM
8261 got2_addend = addend;
8262 addend = 0;
8263 }
8264 ent = find_plt_ent (&h->plt.plist, got2, got2_addend);
de972ffa
AM
8265 if (htab->plt_type == PLT_NEW)
8266 relocation = (htab->glink->output_section->vma
8267 + htab->glink->output_offset
8268 + ent->glink_offset);
8269 else
ce558b89
AM
8270 relocation = (htab->elf.splt->output_section->vma
8271 + htab->elf.splt->output_offset
de972ffa
AM
8272 + ent->plt.offset);
8273 }
1a0670f3 8274 /* Fall through. */
b4a38de6 8275
32af9f6e 8276 case R_PPC_RELAX:
9abc968f 8277 {
53291d1f
AM
8278 const int *stub;
8279 size_t size;
8280 size_t insn_offset = rel->r_offset;
8281 unsigned int insn;
9abc968f 8282
0e1862bb 8283 if (bfd_link_pic (info))
53291d1f
AM
8284 {
8285 relocation -= (input_section->output_section->vma
8286 + input_section->output_offset
8287 + rel->r_offset - 4);
8288 stub = shared_stub_entry;
95f0d0d2
AM
8289 bfd_put_32 (input_bfd, stub[0], contents + insn_offset - 12);
8290 bfd_put_32 (input_bfd, stub[1], contents + insn_offset - 8);
8291 bfd_put_32 (input_bfd, stub[2], contents + insn_offset - 4);
53291d1f
AM
8292 stub += 3;
8293 size = ARRAY_SIZE (shared_stub_entry) - 3;
8294 }
8295 else
8296 {
8297 stub = stub_entry;
8298 size = ARRAY_SIZE (stub_entry);
8299 }
9abc968f 8300
9abc968f 8301 relocation += addend;
0e1862bb 8302 if (bfd_link_relocatable (info))
53291d1f
AM
8303 relocation = 0;
8304
8305 /* First insn is HA, second is LO. */
8306 insn = *stub++;
8307 insn |= ((relocation + 0x8000) >> 16) & 0xffff;
95f0d0d2 8308 bfd_put_32 (input_bfd, insn, contents + insn_offset);
53291d1f
AM
8309 insn_offset += 4;
8310
8311 insn = *stub++;
8312 insn |= relocation & 0xffff;
95f0d0d2 8313 bfd_put_32 (input_bfd, insn, contents + insn_offset);
53291d1f
AM
8314 insn_offset += 4;
8315 size -= 2;
8316
8317 while (size != 0)
8318 {
8319 insn = *stub++;
8320 --size;
95f0d0d2 8321 bfd_put_32 (input_bfd, insn, contents + insn_offset);
53291d1f
AM
8322 insn_offset += 4;
8323 }
9bc4e62b
NS
8324
8325 /* Rewrite the reloc and convert one of the trailing nop
8326 relocs to describe this relocation. */
8327 BFD_ASSERT (ELF32_R_TYPE (relend[-1].r_info) == R_PPC_NONE);
8328 /* The relocs are at the bottom 2 bytes */
c316a17c
AM
8329 wrel->r_offset = rel->r_offset + d_offset;
8330 wrel->r_info = ELF32_R_INFO (r_symndx, R_PPC_ADDR16_HA);
8331 wrel->r_addend = rel->r_addend;
8332 memmove (wrel + 1, wrel, (relend - wrel - 1) * sizeof (*wrel));
8333 wrel++, rel++;
8334 wrel->r_offset += 4;
8335 wrel->r_info = ELF32_R_INFO (r_symndx, R_PPC_ADDR16_LO);
9abc968f 8336 }
8517fae7 8337 continue;
deaaf2f3 8338
70bccea4 8339 /* Indirect .sdata relocation. */
7619e7c7 8340 case R_PPC_EMB_SDAI16:
c9a2f333 8341 BFD_ASSERT (htab->sdata[0].section != NULL);
bd6c6e2b
AM
8342 if (!is_static_defined (htab->sdata[0].sym))
8343 {
8344 unresolved_reloc = TRUE;
8345 break;
8346 }
7619e7c7 8347 relocation
76750a2f
AM
8348 = elf_finish_pointer_linker_section (input_bfd, &htab->sdata[0],
8349 h, relocation, rel);
bd6c6e2b 8350 addend = 0;
252b5132
RH
8351 break;
8352
70bccea4 8353 /* Indirect .sdata2 relocation. */
7619e7c7 8354 case R_PPC_EMB_SDA2I16:
c9a2f333 8355 BFD_ASSERT (htab->sdata[1].section != NULL);
bd6c6e2b
AM
8356 if (!is_static_defined (htab->sdata[1].sym))
8357 {
8358 unresolved_reloc = TRUE;
8359 break;
8360 }
7619e7c7 8361 relocation
76750a2f
AM
8362 = elf_finish_pointer_linker_section (input_bfd, &htab->sdata[1],
8363 h, relocation, rel);
bd6c6e2b 8364 addend = 0;
252b5132
RH
8365 break;
8366
70bccea4
AM
8367 /* Handle the TOC16 reloc. We want to use the offset within the .got
8368 section, not the actual VMA. This is appropriate when generating
8369 an embedded ELF object, for which the .got section acts like the
8370 AIX .toc section. */
7619e7c7 8371 case R_PPC_TOC16: /* phony GOT16 relocations */
3b4f3a11
AM
8372 if (sec == NULL || sec->output_section == NULL)
8373 {
8374 unresolved_reloc = TRUE;
8375 break;
8376 }
fd361982
AM
8377 BFD_ASSERT (strcmp (bfd_section_name (sec), ".got") == 0
8378 || strcmp (bfd_section_name (sec), ".cgot") == 0);
252b5132 8379
3b4f3a11 8380 addend -= sec->output_section->vma + sec->output_offset + 0x8000;
252b5132
RH
8381 break;
8382
7619e7c7 8383 case R_PPC_PLTREL24:
f75e0e33
AM
8384 if (h != NULL && ifunc == NULL)
8385 {
cbf95972
AM
8386 struct plt_entry *ent;
8387
8388 ent = find_plt_ent (&h->plt.plist, got2,
8389 bfd_link_pic (info) ? addend : 0);
f75e0e33 8390 if (ent == NULL
ce558b89 8391 || htab->elf.splt == NULL)
f75e0e33
AM
8392 {
8393 /* We didn't make a PLT entry for this symbol. This
8394 happens when statically linking PIC code, or when
8395 using -Bsymbolic. */
8396 }
8397 else
8398 {
8399 /* Relocation is to the entry for this symbol in the
8400 procedure linkage table. */
8401 unresolved_reloc = FALSE;
8402 if (htab->plt_type == PLT_NEW)
8403 relocation = (htab->glink->output_section->vma
8404 + htab->glink->output_offset
8405 + ent->glink_offset);
8406 else
ce558b89
AM
8407 relocation = (htab->elf.splt->output_section->vma
8408 + htab->elf.splt->output_offset
f75e0e33
AM
8409 + ent->plt.offset);
8410 }
8411 }
252b5132 8412
f75e0e33
AM
8413 /* R_PPC_PLTREL24 is rather special. If non-zero, the
8414 addend specifies the GOT pointer offset within .got2.
8415 Don't apply it to the relocation field. */
8416 addend = 0;
8da6118f 8417 break;
252b5132 8418
23cedd1d
AM
8419 case R_PPC_PLTSEQ:
8420 case R_PPC_PLTCALL:
08be3224
AM
8421 case R_PPC_PLT16_LO:
8422 case R_PPC_PLT16_HI:
8423 case R_PPC_PLT16_HA:
2d7ad24e 8424 plt_list = NULL;
08be3224
AM
8425 if (h != NULL)
8426 plt_list = &h->plt.plist;
2d7ad24e
AM
8427 else if (ifunc != NULL)
8428 plt_list = ifunc;
8429 else if (local_got_offsets != NULL)
8430 {
8431 struct plt_entry **local_plt;
8432 local_plt = (struct plt_entry **) (local_got_offsets
8433 + symtab_hdr->sh_info);
8434 plt_list = local_plt + r_symndx;
8435 }
08be3224
AM
8436 unresolved_reloc = TRUE;
8437 if (plt_list != NULL)
8438 {
8439 struct plt_entry *ent;
8440
8441 ent = find_plt_ent (plt_list, got2,
8442 bfd_link_pic (info) ? addend : 0);
2d7ad24e 8443 if (ent != NULL && ent->plt.offset != (bfd_vma) -1)
08be3224 8444 {
2d7ad24e
AM
8445 asection *plt;
8446
08be3224 8447 unresolved_reloc = FALSE;
2d7ad24e
AM
8448 plt = htab->elf.splt;
8449 if (!htab->elf.dynamic_sections_created
8450 || h == NULL
8451 || h->dynindx == -1)
8452 {
8453 if (ifunc != NULL)
8454 plt = htab->elf.iplt;
8455 else
8456 plt = htab->pltlocal;
8457 }
8458 relocation = (plt->output_section->vma
8459 + plt->output_offset
08be3224
AM
8460 + ent->plt.offset);
8461 if (bfd_link_pic (info))
8462 {
8463 bfd_vma got = 0;
8464
8465 if (ent->addend >= 32768)
8466 got = (ent->addend
8467 + ent->sec->output_section->vma
8468 + ent->sec->output_offset);
8469 else
8470 got = SYM_VAL (htab->elf.hgot);
8471 relocation -= got;
8472 }
8473 }
8474 }
8475 addend = 0;
8476 break;
8477
70bccea4 8478 /* Relocate against _SDA_BASE_. */
7619e7c7 8479 case R_PPC_SDAREL16:
252b5132
RH
8480 {
8481 const char *name;
bd6c6e2b 8482 struct elf_link_hash_entry *sda = htab->sdata[0].sym;
252b5132 8483
bd6c6e2b
AM
8484 if (sec == NULL
8485 || sec->output_section == NULL
8486 || !is_static_defined (sda))
3b4f3a11
AM
8487 {
8488 unresolved_reloc = TRUE;
8489 break;
8490 }
bd6c6e2b 8491 addend -= SYM_VAL (sda);
3b4f3a11 8492
fd361982 8493 name = bfd_section_name (sec->output_section);
93d1b056
AM
8494 if (!(strcmp (name, ".sdata") == 0
8495 || strcmp (name, ".sbss") == 0))
252b5132 8496 {
cf97bcb0 8497 _bfd_error_handler
695344c0 8498 /* xgettext:c-format */
cf97bcb0
AM
8499 (_("%pB: the target (%s) of a %s relocation is "
8500 "in the wrong output section (%s)"),
d003868e 8501 input_bfd,
55fd94b0
AM
8502 sym_name,
8503 howto->name,
8504 name);
252b5132 8505 }
252b5132
RH
8506 }
8507 break;
8508
70bccea4 8509 /* Relocate against _SDA2_BASE_. */
7619e7c7 8510 case R_PPC_EMB_SDA2REL:
252b5132
RH
8511 {
8512 const char *name;
bd6c6e2b 8513 struct elf_link_hash_entry *sda = htab->sdata[1].sym;
252b5132 8514
bd6c6e2b
AM
8515 if (sec == NULL
8516 || sec->output_section == NULL
8517 || !is_static_defined (sda))
3b4f3a11
AM
8518 {
8519 unresolved_reloc = TRUE;
8520 break;
8521 }
bd6c6e2b 8522 addend -= SYM_VAL (sda);
3b4f3a11 8523
fd361982 8524 name = bfd_section_name (sec->output_section);
93d1b056
AM
8525 if (!(strcmp (name, ".sdata2") == 0
8526 || strcmp (name, ".sbss2") == 0))
252b5132 8527 {
cf97bcb0 8528 _bfd_error_handler
695344c0 8529 /* xgettext:c-format */
cf97bcb0
AM
8530 (_("%pB: the target (%s) of a %s relocation is "
8531 "in the wrong output section (%s)"),
d003868e 8532 input_bfd,
55fd94b0
AM
8533 sym_name,
8534 howto->name,
8535 name);
252b5132 8536 }
252b5132
RH
8537 }
8538 break;
8539
b9c361e0 8540 case R_PPC_VLE_LO16A:
86c95733 8541 relocation = relocation + addend;
08dc996f
AM
8542 ppc_elf_vle_split16 (input_bfd, input_section, rel->r_offset,
8543 contents + rel->r_offset, relocation,
8544 split16a_type, htab->params->vle_reloc_fixup);
c316a17c 8545 goto copy_reloc;
b9c361e0
JL
8546
8547 case R_PPC_VLE_LO16D:
86c95733 8548 relocation = relocation + addend;
08dc996f
AM
8549 ppc_elf_vle_split16 (input_bfd, input_section, rel->r_offset,
8550 contents + rel->r_offset, relocation,
8551 split16d_type, htab->params->vle_reloc_fixup);
c316a17c 8552 goto copy_reloc;
b9c361e0
JL
8553
8554 case R_PPC_VLE_HI16A:
86c95733 8555 relocation = (relocation + addend) >> 16;
08dc996f
AM
8556 ppc_elf_vle_split16 (input_bfd, input_section, rel->r_offset,
8557 contents + rel->r_offset, relocation,
8558 split16a_type, htab->params->vle_reloc_fixup);
c316a17c 8559 goto copy_reloc;
b9c361e0
JL
8560
8561 case R_PPC_VLE_HI16D:
86c95733 8562 relocation = (relocation + addend) >> 16;
08dc996f
AM
8563 ppc_elf_vle_split16 (input_bfd, input_section, rel->r_offset,
8564 contents + rel->r_offset, relocation,
8565 split16d_type, htab->params->vle_reloc_fixup);
c316a17c 8566 goto copy_reloc;
b9c361e0
JL
8567
8568 case R_PPC_VLE_HA16A:
86c95733 8569 relocation = (relocation + addend + 0x8000) >> 16;
08dc996f
AM
8570 ppc_elf_vle_split16 (input_bfd, input_section, rel->r_offset,
8571 contents + rel->r_offset, relocation,
8572 split16a_type, htab->params->vle_reloc_fixup);
c316a17c 8573 goto copy_reloc;
b9c361e0
JL
8574
8575 case R_PPC_VLE_HA16D:
86c95733 8576 relocation = (relocation + addend + 0x8000) >> 16;
08dc996f
AM
8577 ppc_elf_vle_split16 (input_bfd, input_section, rel->r_offset,
8578 contents + rel->r_offset, relocation,
8579 split16d_type, htab->params->vle_reloc_fixup);
c316a17c 8580 goto copy_reloc;
b9c361e0 8581
70bccea4 8582 /* Relocate against either _SDA_BASE_, _SDA2_BASE_, or 0. */
7619e7c7 8583 case R_PPC_EMB_SDA21:
b9c361e0 8584 case R_PPC_VLE_SDA21:
7619e7c7 8585 case R_PPC_EMB_RELSDA:
b9c361e0 8586 case R_PPC_VLE_SDA21_LO:
252b5132
RH
8587 {
8588 const char *name;
8589 int reg;
86c95733 8590 unsigned int insn;
bd6c6e2b 8591 struct elf_link_hash_entry *sda = NULL;
252b5132 8592
3b4f3a11
AM
8593 if (sec == NULL || sec->output_section == NULL)
8594 {
8595 unresolved_reloc = TRUE;
8596 break;
8597 }
8598
fd361982 8599 name = bfd_section_name (sec->output_section);
93d1b056
AM
8600 if (strcmp (name, ".sdata") == 0
8601 || strcmp (name, ".sbss") == 0)
252b5132
RH
8602 {
8603 reg = 13;
bd6c6e2b 8604 sda = htab->sdata[0].sym;
252b5132 8605 }
93d1b056
AM
8606 else if (strcmp (name, ".sdata2") == 0
8607 || strcmp (name, ".sbss2") == 0)
252b5132
RH
8608 {
8609 reg = 2;
bd6c6e2b 8610 sda = htab->sdata[1].sym;
252b5132 8611 }
8da6118f
KH
8612 else if (strcmp (name, ".PPC.EMB.sdata0") == 0
8613 || strcmp (name, ".PPC.EMB.sbss0") == 0)
252b5132
RH
8614 {
8615 reg = 0;
8616 }
252b5132
RH
8617 else
8618 {
cf97bcb0 8619 _bfd_error_handler
695344c0 8620 /* xgettext:c-format */
cf97bcb0
AM
8621 (_("%pB: the target (%s) of a %s relocation is "
8622 "in the wrong output section (%s)"),
d003868e 8623 input_bfd,
55fd94b0
AM
8624 sym_name,
8625 howto->name,
8626 name);
252b5132
RH
8627
8628 bfd_set_error (bfd_error_bad_value);
b34976b6 8629 ret = FALSE;
c316a17c 8630 goto copy_reloc;
252b5132
RH
8631 }
8632
bd6c6e2b
AM
8633 if (sda != NULL)
8634 {
8635 if (!is_static_defined (sda))
8636 {
8637 unresolved_reloc = TRUE;
8638 break;
8639 }
8640 addend -= SYM_VAL (sda);
8641 }
8642
6f5601c4
AM
8643 if (r_type == R_PPC_EMB_RELSDA)
8644 break;
8645
8646 /* The PowerPC Embedded Application Binary Interface
8647 version 1.0 insanely chose to specify R_PPC_EMB_SDA21
8648 operating on a 24-bit field at r_offset. GNU as and
8649 GNU ld have always assumed R_PPC_EMB_SDA21 operates on
8650 a 32-bit bit insn at r_offset. Cope with object file
8651 producers that possibly comply with the EABI in
8652 generating an odd r_offset for big-endian objects. */
8653 if (r_type == R_PPC_EMB_SDA21)
8654 rel->r_offset &= ~1;
8655
95f0d0d2 8656 insn = bfd_get_32 (input_bfd, contents + rel->r_offset);
b9c361e0
JL
8657 if (reg == 0
8658 && (r_type == R_PPC_VLE_SDA21
8659 || r_type == R_PPC_VLE_SDA21_LO))
8660 {
86c95733
AM
8661 relocation = relocation + addend;
8662 addend = 0;
8663
8664 /* Force e_li insn, keeping RT from original insn. */
8665 insn &= 0x1f << 21;
8666 insn |= 28u << 26;
8667
8668 /* We have an li20 field, bits 17..20, 11..15, 21..31. */
8669 /* Top 4 bits of value to 17..20. */
8670 insn |= (relocation & 0xf0000) >> 5;
8671 /* Next 5 bits of the value to 11..15. */
8672 insn |= (relocation & 0xf800) << 5;
8673 /* And the final 11 bits of the value to bits 21 to 31. */
8674 insn |= relocation & 0x7ff;
8675
95f0d0d2 8676 bfd_put_32 (input_bfd, insn, contents + rel->r_offset);
c3301df1
AM
8677
8678 if (r_type == R_PPC_VLE_SDA21
8679 && ((relocation + 0x80000) & 0xffffffff) > 0x100000)
8680 goto overflow;
c316a17c 8681 goto copy_reloc;
b9c361e0 8682 }
6f5601c4
AM
8683 /* Fill in register field. */
8684 insn = (insn & ~RA_REGISTER_MASK) | (reg << RA_REGISTER_SHIFT);
95f0d0d2 8685 bfd_put_32 (input_bfd, insn, contents + rel->r_offset);
252b5132
RH
8686 }
8687 break;
8688
b9c361e0
JL
8689 case R_PPC_VLE_SDAREL_LO16A:
8690 case R_PPC_VLE_SDAREL_LO16D:
8691 case R_PPC_VLE_SDAREL_HI16A:
8692 case R_PPC_VLE_SDAREL_HI16D:
8693 case R_PPC_VLE_SDAREL_HA16A:
8694 case R_PPC_VLE_SDAREL_HA16D:
8695 {
8696 bfd_vma value;
8697 const char *name;
b9c361e0
JL
8698 struct elf_link_hash_entry *sda = NULL;
8699
8700 if (sec == NULL || sec->output_section == NULL)
8701 {
8702 unresolved_reloc = TRUE;
8703 break;
8704 }
8705
fd361982 8706 name = bfd_section_name (sec->output_section);
93d1b056
AM
8707 if (strcmp (name, ".sdata") == 0
8708 || strcmp (name, ".sbss") == 0)
5499c7c7 8709 sda = htab->sdata[0].sym;
93d1b056
AM
8710 else if (strcmp (name, ".sdata2") == 0
8711 || strcmp (name, ".sbss2") == 0)
5499c7c7 8712 sda = htab->sdata[1].sym;
b9c361e0
JL
8713 else
8714 {
4eca0228 8715 _bfd_error_handler
695344c0 8716 /* xgettext:c-format */
871b3ab2 8717 (_("%pB: the target (%s) of a %s relocation is "
b9c361e0
JL
8718 "in the wrong output section (%s)"),
8719 input_bfd,
8720 sym_name,
8721 howto->name,
8722 name);
8723
8724 bfd_set_error (bfd_error_bad_value);
8725 ret = FALSE;
c316a17c 8726 goto copy_reloc;
b9c361e0
JL
8727 }
8728
5499c7c7 8729 if (sda == NULL || !is_static_defined (sda))
b9c361e0 8730 {
5499c7c7
AM
8731 unresolved_reloc = TRUE;
8732 break;
b9c361e0 8733 }
5499c7c7 8734 value = relocation + addend - SYM_VAL (sda);
86c95733
AM
8735
8736 if (r_type == R_PPC_VLE_SDAREL_LO16A)
08dc996f
AM
8737 ppc_elf_vle_split16 (input_bfd, input_section, rel->r_offset,
8738 contents + rel->r_offset, value,
8739 split16a_type,
8740 htab->params->vle_reloc_fixup);
86c95733 8741 else if (r_type == R_PPC_VLE_SDAREL_LO16D)
08dc996f
AM
8742 ppc_elf_vle_split16 (input_bfd, input_section, rel->r_offset,
8743 contents + rel->r_offset, value,
8744 split16d_type,
8745 htab->params->vle_reloc_fixup);
86c95733 8746 else if (r_type == R_PPC_VLE_SDAREL_HI16A)
b9c361e0 8747 {
86c95733 8748 value = value >> 16;
08dc996f
AM
8749 ppc_elf_vle_split16 (input_bfd, input_section, rel->r_offset,
8750 contents + rel->r_offset, value,
8751 split16a_type,
8752 htab->params->vle_reloc_fixup);
b9c361e0 8753 }
86c95733 8754 else if (r_type == R_PPC_VLE_SDAREL_HI16D)
b9c361e0 8755 {
86c95733 8756 value = value >> 16;
08dc996f
AM
8757 ppc_elf_vle_split16 (input_bfd, input_section, rel->r_offset,
8758 contents + rel->r_offset, value,
8759 split16d_type,
8760 htab->params->vle_reloc_fixup);
b9c361e0 8761 }
86c95733 8762 else if (r_type == R_PPC_VLE_SDAREL_HA16A)
b9c361e0 8763 {
86c95733 8764 value = (value + 0x8000) >> 16;
08dc996f
AM
8765 ppc_elf_vle_split16 (input_bfd, input_section, rel->r_offset,
8766 contents + rel->r_offset, value,
8767 split16a_type,
8768 htab->params->vle_reloc_fixup);
b9c361e0 8769 }
86c95733 8770 else if (r_type == R_PPC_VLE_SDAREL_HA16D)
b9c361e0 8771 {
86c95733 8772 value = (value + 0x8000) >> 16;
08dc996f
AM
8773 ppc_elf_vle_split16 (input_bfd, input_section, rel->r_offset,
8774 contents + rel->r_offset, value,
8775 split16d_type,
8776 htab->params->vle_reloc_fixup);
b9c361e0
JL
8777 }
8778 }
c316a17c 8779 goto copy_reloc;
b9c361e0 8780
83eef883
AFB
8781 case R_PPC_VLE_ADDR20:
8782 ppc_elf_vle_split20 (output_bfd, contents + rel->r_offset, relocation);
8783 continue;
8784
70bccea4 8785 /* Relocate against the beginning of the section. */
7619e7c7
AM
8786 case R_PPC_SECTOFF:
8787 case R_PPC_SECTOFF_LO:
8788 case R_PPC_SECTOFF_HI:
8789 case R_PPC_SECTOFF_HA:
3b4f3a11
AM
8790 if (sec == NULL || sec->output_section == NULL)
8791 {
8792 unresolved_reloc = TRUE;
8793 break;
8794 }
252b5132 8795 addend -= sec->output_section->vma;
252b5132
RH
8796 break;
8797
70bccea4 8798 /* Negative relocations. */
7619e7c7
AM
8799 case R_PPC_EMB_NADDR32:
8800 case R_PPC_EMB_NADDR16:
8801 case R_PPC_EMB_NADDR16_LO:
8802 case R_PPC_EMB_NADDR16_HI:
8803 case R_PPC_EMB_NADDR16_HA:
8da6118f 8804 addend -= 2 * relocation;
252b5132
RH
8805 break;
8806
7619e7c7
AM
8807 case R_PPC_COPY:
8808 case R_PPC_GLOB_DAT:
8809 case R_PPC_JMP_SLOT:
8810 case R_PPC_RELATIVE:
e054468f 8811 case R_PPC_IRELATIVE:
7619e7c7
AM
8812 case R_PPC_PLT32:
8813 case R_PPC_PLTREL32:
7619e7c7
AM
8814 case R_PPC_ADDR30:
8815 case R_PPC_EMB_RELSEC16:
8816 case R_PPC_EMB_RELST_LO:
8817 case R_PPC_EMB_RELST_HI:
8818 case R_PPC_EMB_RELST_HA:
8819 case R_PPC_EMB_BIT_FLD:
cf97bcb0
AM
8820 /* xgettext:c-format */
8821 _bfd_error_handler (_("%pB: %s unsupported"),
8822 input_bfd, howto->name);
252b5132
RH
8823
8824 bfd_set_error (bfd_error_invalid_operation);
b34976b6 8825 ret = FALSE;
c316a17c 8826 goto copy_reloc;
7619e7c7 8827 }
252b5132 8828
23cedd1d
AM
8829 switch (r_type)
8830 {
8831 default:
8832 break;
8833
8834 case R_PPC_PLTCALL:
8835 if (unresolved_reloc)
8836 {
8837 bfd_byte *p = contents + rel->r_offset;
8838 unsigned int insn = bfd_get_32 (input_bfd, p);
8839 insn &= 1;
8840 bfd_put_32 (input_bfd, B | insn, p);
8841 unresolved_reloc = save_unresolved_reloc;
8842 r_type = R_PPC_REL24;
8843 howto = ppc_elf_howto_table[r_type];
8844 }
8845 else if (htab->plt_type != PLT_NEW)
8846 info->callbacks->einfo
482f3505 8847 (_("%X%P: %H: %s relocation unsupported for bss-plt\n"),
23cedd1d
AM
8848 input_bfd, input_section, rel->r_offset,
8849 howto->name);
8850 break;
8851
8852 case R_PPC_PLTSEQ:
8853 case R_PPC_PLT16_HA:
8854 case R_PPC_PLT16_LO:
8855 if (unresolved_reloc)
8856 {
8857 bfd_byte *p = contents + (rel->r_offset & ~3);
8858 bfd_put_32 (input_bfd, NOP, p);
8859 unresolved_reloc = FALSE;
8860 r_type = R_PPC_NONE;
8861 howto = ppc_elf_howto_table[r_type];
8862 }
8863 else if (htab->plt_type != PLT_NEW)
8864 info->callbacks->einfo
482f3505 8865 (_("%X%P: %H: %s relocation unsupported for bss-plt\n"),
23cedd1d
AM
8866 input_bfd, input_section, rel->r_offset,
8867 howto->name);
8868 break;
8869 }
8870
7619e7c7
AM
8871 /* Do any further special processing. */
8872 switch (r_type)
8873 {
8874 default:
8875 break;
8876
8877 case R_PPC_ADDR16_HA:
d7128ce4 8878 case R_PPC_REL16_HA:
a680de9a 8879 case R_PPC_REL16DX_HA:
7619e7c7
AM
8880 case R_PPC_SECTOFF_HA:
8881 case R_PPC_TPREL16_HA:
8882 case R_PPC_DTPREL16_HA:
7619e7c7
AM
8883 case R_PPC_EMB_NADDR16_HA:
8884 case R_PPC_EMB_RELST_HA:
8885 /* It's just possible that this symbol is a weak symbol
7b609f53 8886 that's not actually defined anywhere. In that case,
7619e7c7
AM
8887 'sec' would be NULL, and we should leave the symbol
8888 alone (it will be set to zero elsewhere in the link). */
5c5f6e17
AM
8889 if (sec == NULL)
8890 break;
1a0670f3 8891 /* Fall through. */
5c5f6e17
AM
8892
8893 case R_PPC_PLT16_HA:
8894 case R_PPC_GOT16_HA:
8895 case R_PPC_GOT_TLSGD16_HA:
8896 case R_PPC_GOT_TLSLD16_HA:
8897 case R_PPC_GOT_TPREL16_HA:
8898 case R_PPC_GOT_DTPREL16_HA:
8899 /* Add 0x10000 if sign bit in 0:15 is set.
8900 Bits 0:15 are not used. */
8901 addend += 0x8000;
7619e7c7 8902 break;
1fe532cf
AM
8903
8904 case R_PPC_ADDR16:
8905 case R_PPC_ADDR16_LO:
8906 case R_PPC_GOT16:
8907 case R_PPC_GOT16_LO:
8908 case R_PPC_SDAREL16:
8909 case R_PPC_SECTOFF:
8910 case R_PPC_SECTOFF_LO:
8911 case R_PPC_DTPREL16:
8912 case R_PPC_DTPREL16_LO:
8913 case R_PPC_TPREL16:
8914 case R_PPC_TPREL16_LO:
8915 case R_PPC_GOT_TLSGD16:
8916 case R_PPC_GOT_TLSGD16_LO:
8917 case R_PPC_GOT_TLSLD16:
8918 case R_PPC_GOT_TLSLD16_LO:
8919 case R_PPC_GOT_DTPREL16:
8920 case R_PPC_GOT_DTPREL16_LO:
8921 case R_PPC_GOT_TPREL16:
8922 case R_PPC_GOT_TPREL16_LO:
8923 {
8924 /* The 32-bit ABI lacks proper relocations to deal with
8925 certain 64-bit instructions. Prevent damage to bits
8926 that make up part of the insn opcode. */
8927 unsigned int insn, mask, lobit;
8928
95f0d0d2 8929 insn = bfd_get_32 (input_bfd,
c316a17c 8930 contents + rel->r_offset - d_offset);
1fe532cf
AM
8931 mask = 0;
8932 if (is_insn_ds_form (insn))
8933 mask = 3;
8934 else if (is_insn_dq_form (insn))
8935 mask = 15;
8936 else
8937 break;
a680de9a
PB
8938 relocation += addend;
8939 addend = insn & mask;
8940 lobit = mask & relocation;
1fe532cf
AM
8941 if (lobit != 0)
8942 {
a680de9a 8943 relocation ^= lobit;
1fe532cf 8944 info->callbacks->einfo
695344c0 8945 /* xgettext:c-format */
174d0a74 8946 (_("%H: error: %s against `%s' not a multiple of %u\n"),
1fe532cf
AM
8947 input_bfd, input_section, rel->r_offset,
8948 howto->name, sym_name, mask + 1);
8949 bfd_set_error (bfd_error_bad_value);
8950 ret = FALSE;
8951 }
1fe532cf
AM
8952 }
8953 break;
252b5132
RH
8954 }
8955
252b5132 8956#ifdef DEBUG
55fd94b0
AM
8957 fprintf (stderr, "\ttype = %s (%d), name = %s, symbol index = %ld, "
8958 "offset = %ld, addend = %ld\n",
252b5132 8959 howto->name,
8da6118f 8960 (int) r_type,
252b5132
RH
8961 sym_name,
8962 r_symndx,
7619e7c7 8963 (long) rel->r_offset,
8da6118f 8964 (long) addend);
252b5132
RH
8965#endif
8966
7619e7c7
AM
8967 if (unresolved_reloc
8968 && !((input_section->flags & SEC_DEBUGGING) != 0
1d5316ab
AM
8969 && h->def_dynamic)
8970 && _bfd_elf_section_offset (output_bfd, info, input_section,
8971 rel->r_offset) != (bfd_vma) -1)
7619e7c7 8972 {
25f53a85 8973 info->callbacks->einfo
695344c0 8974 /* xgettext:c-format */
174d0a74 8975 (_("%H: unresolvable %s relocation against symbol `%s'\n"),
25f53a85 8976 input_bfd, input_section, rel->r_offset,
7b609f53 8977 howto->name,
7619e7c7
AM
8978 sym_name);
8979 ret = FALSE;
8980 }
8981
86c95733
AM
8982 /* 16-bit fields in insns mostly have signed values, but a
8983 few insns have 16-bit unsigned values. Really, we should
8984 have different reloc types. */
8985 if (howto->complain_on_overflow != complain_overflow_dont
8986 && howto->dst_mask == 0xffff
8987 && (input_section->flags & SEC_CODE) != 0)
8988 {
8989 enum complain_overflow complain = complain_overflow_signed;
8990
8991 if ((elf_section_flags (input_section) & SHF_PPC_VLE) == 0)
8992 {
8993 unsigned int insn;
8994
8995 insn = bfd_get_32 (input_bfd, contents + (rel->r_offset & ~3));
2365f8d7 8996 if ((insn & (0x3fu << 26)) == 10u << 26 /* cmpli */)
a47622ac 8997 complain = complain_overflow_bitfield;
2365f8d7
AM
8998 else if ((insn & (0x3fu << 26)) == 28u << 26 /* andi */
8999 || (insn & (0x3fu << 26)) == 24u << 26 /* ori */
9000 || (insn & (0x3fu << 26)) == 26u << 26 /* xori */)
86c95733
AM
9001 complain = complain_overflow_unsigned;
9002 }
9003 if (howto->complain_on_overflow != complain)
9004 {
9005 alt_howto = *howto;
9006 alt_howto.complain_on_overflow = complain;
9007 howto = &alt_howto;
9008 }
9009 }
9010
a680de9a
PB
9011 if (r_type == R_PPC_REL16DX_HA)
9012 {
9013 /* Split field reloc isn't handled by _bfd_final_link_relocate. */
9014 if (rel->r_offset + 4 > input_section->size)
9015 r = bfd_reloc_outofrange;
9016 else
9017 {
9018 unsigned int insn;
9019
9020 relocation += addend;
9021 relocation -= (rel->r_offset
9022 + input_section->output_offset
9023 + input_section->output_section->vma);
9024 relocation >>= 16;
9025 insn = bfd_get_32 (input_bfd, contents + rel->r_offset);
9026 insn &= ~0x1fffc1;
9027 insn |= (relocation & 0xffc1) | ((relocation & 0x3e) << 15);
9028 bfd_put_32 (input_bfd, insn, contents + rel->r_offset);
9029 r = bfd_reloc_ok;
9030 }
9031 }
9032 else
9033 r = _bfd_final_link_relocate (howto, input_bfd, input_section, contents,
9034 rel->r_offset, relocation, addend);
252b5132 9035
7619e7c7 9036 if (r != bfd_reloc_ok)
252b5132 9037 {
7619e7c7 9038 if (r == bfd_reloc_overflow)
252b5132 9039 {
c3301df1 9040 overflow:
8131c122
AM
9041 /* On code like "if (foo) foo();" don't report overflow
9042 on a branch to zero when foo is undefined. */
9043 if (!warned
9044 && !(h != NULL
9045 && (h->root.type == bfd_link_hash_undefweak
9046 || h->root.type == bfd_link_hash_undefined)
9047 && is_branch_reloc (r_type)))
1a72702b
AM
9048 info->callbacks->reloc_overflow
9049 (info, (h ? &h->root : NULL), sym_name, howto->name,
9050 rel->r_addend, input_bfd, input_section, rel->r_offset);
dc1bc0c9
RH
9051 }
9052 else
9053 {
25f53a85 9054 info->callbacks->einfo
695344c0 9055 /* xgettext:c-format */
174d0a74 9056 (_("%H: %s reloc against `%s': error %d\n"),
25f53a85
AM
9057 input_bfd, input_section, rel->r_offset,
9058 howto->name, sym_name, (int) r);
7619e7c7 9059 ret = FALSE;
252b5132
RH
9060 }
9061 }
c316a17c
AM
9062 copy_reloc:
9063 if (wrel != rel)
9064 *wrel = *rel;
9065 }
9066
9067 if (wrel != rel)
9068 {
9069 Elf_Internal_Shdr *rel_hdr;
9070 size_t deleted = rel - wrel;
9071
9072 rel_hdr = _bfd_elf_single_rel_hdr (input_section->output_section);
9073 rel_hdr->sh_size -= rel_hdr->sh_entsize * deleted;
9074 if (rel_hdr->sh_size == 0)
9075 {
9076 /* It is too late to remove an empty reloc section. Leave
9077 one NONE reloc.
9078 ??? What is wrong with an empty section??? */
9079 rel_hdr->sh_size = rel_hdr->sh_entsize;
9080 deleted -= 1;
9081 wrel++;
9082 }
9083 relend = wrel;
9084 rel_hdr = _bfd_elf_single_rel_hdr (input_section);
9085 rel_hdr->sh_size -= rel_hdr->sh_entsize * deleted;
9086 input_section->reloc_count -= deleted;
252b5132
RH
9087 }
9088
252b5132
RH
9089#ifdef DEBUG
9090 fprintf (stderr, "\n");
9091#endif
9092
53291d1f
AM
9093 if (input_section->sec_info_type == SEC_INFO_TYPE_TARGET
9094 && input_section->size != input_section->rawsize
9095 && (strcmp (input_section->output_section->name, ".init") == 0
9096 || strcmp (input_section->output_section->name, ".fini") == 0))
9097 {
9098 /* Branch around the trampolines. */
9099 unsigned int insn = B + input_section->size - input_section->rawsize;
9100 bfd_put_32 (input_bfd, insn, contents + input_section->rawsize);
9101 }
9102
5446cbdf 9103 if (htab->params->ppc476_workaround
795bc6b3 9104 && input_section->sec_info_type == SEC_INFO_TYPE_TARGET
0e1862bb 9105 && (!bfd_link_relocatable (info)
795bc6b3
AM
9106 || (input_section->output_section->alignment_power
9107 >= htab->params->pagesize_p2)))
5446cbdf 9108 {
5446cbdf 9109 bfd_vma start_addr, end_addr, addr;
795bc6b3 9110 bfd_vma pagesize = (bfd_vma) 1 << htab->params->pagesize_p2;
5446cbdf 9111
5446cbdf 9112 if (relax_info->workaround_size != 0)
40fd06d1
AM
9113 {
9114 bfd_byte *p;
9115 unsigned int n;
9116 bfd_byte fill[4];
9117
9118 bfd_put_32 (input_bfd, BA, fill);
9119 p = contents + input_section->size - relax_info->workaround_size;
9120 n = relax_info->workaround_size >> 2;
9121 while (n--)
9122 {
9123 memcpy (p, fill, 4);
9124 p += 4;
9125 }
9126 }
5446cbdf
AM
9127
9128 /* The idea is: Replace the last instruction on a page with a
9129 branch to a patch area. Put the insn there followed by a
9130 branch back to the next page. Complicated a little by
9131 needing to handle moved conditional branches, and by not
9132 wanting to touch data-in-text. */
9133
9134 start_addr = (input_section->output_section->vma
9135 + input_section->output_offset);
9136 end_addr = (start_addr + input_section->size
9137 - relax_info->workaround_size);
9138 for (addr = ((start_addr & -pagesize) + pagesize - 4);
9139 addr < end_addr;
9140 addr += pagesize)
9141 {
9142 bfd_vma offset = addr - start_addr;
9143 Elf_Internal_Rela *lo, *hi;
9144 bfd_boolean is_data;
9145 bfd_vma patch_off, patch_addr;
9146 unsigned int insn;
9147
9148 /* Do we have a data reloc at this offset? If so, leave
9149 the word alone. */
9150 is_data = FALSE;
9151 lo = relocs;
668e22e5
AM
9152 hi = relend;
9153 rel = NULL;
5446cbdf
AM
9154 while (lo < hi)
9155 {
9156 rel = lo + (hi - lo) / 2;
9157 if (rel->r_offset < offset)
9158 lo = rel + 1;
668e22e5 9159 else if (rel->r_offset > offset + 3)
5446cbdf
AM
9160 hi = rel;
9161 else
9162 {
9163 switch (ELF32_R_TYPE (rel->r_info))
9164 {
9165 case R_PPC_ADDR32:
9166 case R_PPC_UADDR32:
9167 case R_PPC_REL32:
9168 case R_PPC_ADDR30:
9169 is_data = TRUE;
9170 break;
9171 default:
9172 break;
9173 }
9174 break;
9175 }
9176 }
9177 if (is_data)
9178 continue;
9179
b4ab4364
AM
9180 /* Some instructions can be left alone too. Unconditional
9181 branches, except for bcctr with BO=0x14 (bctr, bctrl),
9182 avoid the icache failure.
9183
9184 The problem occurs due to prefetch across a page boundary
9185 where stale instructions can be fetched from the next
9186 page, and the mechanism for flushing these bad
9187 instructions fails under certain circumstances. The
9188 unconditional branches:
9189 1) Branch: b, bl, ba, bla,
9190 2) Branch Conditional: bc, bca, bcl, bcla,
9191 3) Branch Conditional to Link Register: bclr, bclrl,
9192 where (2) and (3) have BO=0x14 making them unconditional,
9193 prevent the bad prefetch because the prefetch itself is
9194 affected by these instructions. This happens even if the
9195 instruction is not executed.
9196
9197 A bctr example:
9198 .
9199 . lis 9,new_page@ha
9200 . addi 9,9,new_page@l
9201 . mtctr 9
9202 . bctr
9203 . nop
9204 . nop
9205 . new_page:
9206 .
9207 The bctr is not predicted taken due to ctr not being
9208 ready, so prefetch continues on past the bctr into the
9209 new page which might have stale instructions. If they
9210 fail to be flushed, then they will be executed after the
9211 bctr executes. Either of the following modifications
9212 prevent the bad prefetch from happening in the first
9213 place:
9214 .
1b786873
L
9215 . lis 9,new_page@ha lis 9,new_page@ha
9216 . addi 9,9,new_page@l addi 9,9,new_page@l
9217 . mtctr 9 mtctr 9
9218 . bctr bctr
b4ab4364 9219 . nop b somewhere_else
1b786873
L
9220 . b somewhere_else nop
9221 . new_page: new_page:
b4ab4364 9222 . */
5446cbdf 9223 insn = bfd_get_32 (input_bfd, contents + offset);
2365f8d7
AM
9224 if ((insn & (0x3fu << 26)) == (18u << 26) /* b,bl,ba,bla */
9225 || ((insn & (0x3fu << 26)) == (16u << 26) /* bc,bcl,bca,bcla*/
07d6d2b8 9226 && (insn & (0x14 << 21)) == (0x14 << 21)) /* with BO=0x14 */
2365f8d7 9227 || ((insn & (0x3fu << 26)) == (19u << 26)
b4ab4364 9228 && (insn & (0x3ff << 1)) == (16u << 1) /* bclr,bclrl */
07d6d2b8 9229 && (insn & (0x14 << 21)) == (0x14 << 21)))/* with BO=0x14 */
5446cbdf
AM
9230 continue;
9231
9232 patch_addr = (start_addr + input_section->size
9233 - relax_info->workaround_size);
9234 patch_addr = (patch_addr + 15) & -16;
9235 patch_off = patch_addr - start_addr;
9236 bfd_put_32 (input_bfd, B + patch_off - offset, contents + offset);
668e22e5
AM
9237
9238 if (rel != NULL
9239 && rel->r_offset >= offset
9240 && rel->r_offset < offset + 4)
9241 {
f8b44781
AM
9242 asection *sreloc;
9243
668e22e5
AM
9244 /* If the insn we are patching had a reloc, adjust the
9245 reloc r_offset so that the reloc applies to the moved
9246 location. This matters for -r and --emit-relocs. */
9247 if (rel + 1 != relend)
9248 {
9249 Elf_Internal_Rela tmp = *rel;
9250
9251 /* Keep the relocs sorted by r_offset. */
9252 memmove (rel, rel + 1, (relend - (rel + 1)) * sizeof (*rel));
9253 relend[-1] = tmp;
9254 }
9255 relend[-1].r_offset += patch_off - offset;
f8b44781
AM
9256
9257 /* Adjust REL16 addends too. */
9258 switch (ELF32_R_TYPE (relend[-1].r_info))
9259 {
9260 case R_PPC_REL16:
9261 case R_PPC_REL16_LO:
9262 case R_PPC_REL16_HI:
9263 case R_PPC_REL16_HA:
9264 relend[-1].r_addend += patch_off - offset;
9265 break;
9266 default:
9267 break;
9268 }
9269
9270 /* If we are building a PIE or shared library with
9271 non-PIC objects, perhaps we had a dynamic reloc too?
9272 If so, the dynamic reloc must move with the insn. */
9273 sreloc = elf_section_data (input_section)->sreloc;
9274 if (sreloc != NULL)
9275 {
1d5c94cb 9276 Elf32_External_Rela *slo, *shi, *srelend;
f8b44781
AM
9277 bfd_vma soffset;
9278
1d5c94cb
AM
9279 slo = (Elf32_External_Rela *) sreloc->contents;
9280 shi = srelend = slo + sreloc->reloc_count;
f8b44781
AM
9281 soffset = (offset + input_section->output_section->vma
9282 + input_section->output_offset);
9283 while (slo < shi)
9284 {
1d5c94cb
AM
9285 Elf32_External_Rela *srel = slo + (shi - slo) / 2;
9286 bfd_elf32_swap_reloca_in (output_bfd, (bfd_byte *) srel,
9287 &outrel);
f8b44781
AM
9288 if (outrel.r_offset < soffset)
9289 slo = srel + 1;
9290 else if (outrel.r_offset > soffset + 3)
9291 shi = srel;
9292 else
9293 {
1d5c94cb 9294 if (srel + 1 != srelend)
f8b44781 9295 {
1d5c94cb
AM
9296 memmove (srel, srel + 1,
9297 (srelend - (srel + 1)) * sizeof (*srel));
9298 srel = srelend - 1;
f8b44781
AM
9299 }
9300 outrel.r_offset += patch_off - offset;
1d5c94cb
AM
9301 bfd_elf32_swap_reloca_out (output_bfd, &outrel,
9302 (bfd_byte *) srel);
f8b44781
AM
9303 break;
9304 }
9305 }
9306 }
668e22e5
AM
9307 }
9308 else
9309 rel = NULL;
9310
2365f8d7 9311 if ((insn & (0x3fu << 26)) == (16u << 26) /* bc */
5446cbdf
AM
9312 && (insn & 2) == 0 /* relative */)
9313 {
9314 bfd_vma delta = ((insn & 0xfffc) ^ 0x8000) - 0x8000;
9315
9316 delta += offset - patch_off;
0e1862bb 9317 if (bfd_link_relocatable (info) && rel != NULL)
668e22e5 9318 delta = 0;
0e1862bb 9319 if (!bfd_link_relocatable (info) && rel != NULL)
668e22e5
AM
9320 {
9321 enum elf_ppc_reloc_type r_type;
9322
9323 r_type = ELF32_R_TYPE (relend[-1].r_info);
9324 if (r_type == R_PPC_REL14_BRTAKEN)
9325 insn |= BRANCH_PREDICT_BIT;
9326 else if (r_type == R_PPC_REL14_BRNTAKEN)
9327 insn &= ~BRANCH_PREDICT_BIT;
9328 else
9329 BFD_ASSERT (r_type == R_PPC_REL14);
9330
9331 if ((r_type == R_PPC_REL14_BRTAKEN
9332 || r_type == R_PPC_REL14_BRNTAKEN)
9333 && delta + 0x8000 < 0x10000
9334 && (bfd_signed_vma) delta < 0)
9335 insn ^= BRANCH_PREDICT_BIT;
9336 }
5446cbdf
AM
9337 if (delta + 0x8000 < 0x10000)
9338 {
9339 bfd_put_32 (input_bfd,
9340 (insn & ~0xfffc) | (delta & 0xfffc),
9341 contents + patch_off);
9342 patch_off += 4;
9343 bfd_put_32 (input_bfd,
9344 B | ((offset + 4 - patch_off) & 0x3fffffc),
9345 contents + patch_off);
9346 patch_off += 4;
9347 }
9348 else
9349 {
668e22e5
AM
9350 if (rel != NULL)
9351 {
9352 unsigned int r_sym = ELF32_R_SYM (relend[-1].r_info);
9353
9354 relend[-1].r_offset += 8;
9355 relend[-1].r_info = ELF32_R_INFO (r_sym, R_PPC_REL24);
9356 }
5446cbdf
AM
9357 bfd_put_32 (input_bfd,
9358 (insn & ~0xfffc) | 8,
9359 contents + patch_off);
9360 patch_off += 4;
9361 bfd_put_32 (input_bfd,
9362 B | ((offset + 4 - patch_off) & 0x3fffffc),
9363 contents + patch_off);
9364 patch_off += 4;
9365 bfd_put_32 (input_bfd,
9366 B | ((delta - 8) & 0x3fffffc),
9367 contents + patch_off);
9368 patch_off += 4;
9369 }
9370 }
9371 else
9372 {
9373 bfd_put_32 (input_bfd, insn, contents + patch_off);
9374 patch_off += 4;
9375 bfd_put_32 (input_bfd,
9376 B | ((offset + 4 - patch_off) & 0x3fffffc),
9377 contents + patch_off);
9378 patch_off += 4;
9379 }
9380 BFD_ASSERT (patch_off <= input_section->size);
9381 relax_info->workaround_size = input_section->size - patch_off;
9382 }
9383 }
9384
252b5132
RH
9385 return ret;
9386}
252b5132 9387\f
49c09209 9388/* Write out the PLT relocs and entries for H. */
c5fccbec 9389
b34976b6 9390static bfd_boolean
49c09209 9391write_global_sym_plt (struct elf_link_hash_entry *h, void *inf)
e1a9cb8e 9392{
49c09209
AM
9393 struct bfd_link_info *info = (struct bfd_link_info *) inf;
9394 struct ppc_elf_link_hash_table *htab = ppc_elf_hash_table (info);
a6aa5195
AM
9395 struct plt_entry *ent;
9396 bfd_boolean doneone;
e1a9cb8e 9397
a6aa5195
AM
9398 doneone = FALSE;
9399 for (ent = h->plt.plist; ent != NULL; ent = ent->next)
9400 if (ent->plt.offset != (bfd_vma) -1)
9401 {
9402 if (!doneone)
9403 {
9404 Elf_Internal_Rela rela;
9405 bfd_byte *loc;
9406 bfd_vma reloc_index;
2d7ad24e
AM
9407 asection *plt = htab->elf.splt;
9408 asection *relplt = htab->elf.srelplt;
e1a9cb8e 9409
e054468f 9410 if (htab->plt_type == PLT_NEW
25f23106
AM
9411 || !htab->elf.dynamic_sections_created
9412 || h->dynindx == -1)
9d8504b1
PB
9413 reloc_index = ent->plt.offset / 4;
9414 else
9415 {
9416 reloc_index = ((ent->plt.offset - htab->plt_initial_entry_size)
9417 / htab->plt_slot_size);
9418 if (reloc_index > PLT_NUM_SINGLE_ENTRIES
4a3dc543 9419 && htab->plt_type == PLT_OLD)
9d8504b1
PB
9420 reloc_index -= (reloc_index - PLT_NUM_SINGLE_ENTRIES) / 2;
9421 }
9422
a6aa5195
AM
9423 /* This symbol has an entry in the procedure linkage table.
9424 Set it up. */
e054468f 9425 if (htab->plt_type == PLT_VXWORKS
25f23106
AM
9426 && htab->elf.dynamic_sections_created
9427 && h->dynindx != -1)
a6aa5195 9428 {
9d8504b1
PB
9429 bfd_vma got_offset;
9430 const bfd_vma *plt_entry;
5b914448 9431
9d8504b1
PB
9432 /* The first three entries in .got.plt are reserved. */
9433 got_offset = (reloc_index + 3) * 4;
9434
9435 /* Use the right PLT. */
0e1862bb 9436 plt_entry = bfd_link_pic (info) ? ppc_elf_vxworks_pic_plt_entry
9d8504b1
PB
9437 : ppc_elf_vxworks_plt_entry;
9438
9439 /* Fill in the .plt on VxWorks. */
0e1862bb 9440 if (bfd_link_pic (info))
9d8504b1 9441 {
49c09209 9442 bfd_put_32 (info->output_bfd,
e87d4038 9443 plt_entry[0] | PPC_HA (got_offset),
2d7ad24e 9444 plt->contents + ent->plt.offset + 0);
49c09209 9445 bfd_put_32 (info->output_bfd,
e87d4038 9446 plt_entry[1] | PPC_LO (got_offset),
2d7ad24e 9447 plt->contents + ent->plt.offset + 4);
9d8504b1
PB
9448 }
9449 else
9450 {
e87d4038 9451 bfd_vma got_loc = got_offset + SYM_VAL (htab->elf.hgot);
9d8504b1 9452
49c09209 9453 bfd_put_32 (info->output_bfd,
e87d4038 9454 plt_entry[0] | PPC_HA (got_loc),
2d7ad24e 9455 plt->contents + ent->plt.offset + 0);
49c09209 9456 bfd_put_32 (info->output_bfd,
e87d4038 9457 plt_entry[1] | PPC_LO (got_loc),
2d7ad24e 9458 plt->contents + ent->plt.offset + 4);
9d8504b1
PB
9459 }
9460
49c09209 9461 bfd_put_32 (info->output_bfd, plt_entry[2],
2d7ad24e 9462 plt->contents + ent->plt.offset + 8);
49c09209 9463 bfd_put_32 (info->output_bfd, plt_entry[3],
2d7ad24e 9464 plt->contents + ent->plt.offset + 12);
9d8504b1
PB
9465
9466 /* This instruction is an immediate load. The value loaded is
9467 the byte offset of the R_PPC_JMP_SLOT relocation from the
9468 start of the .rela.plt section. The value is stored in the
9469 low-order 16 bits of the load instruction. */
9470 /* NOTE: It appears that this is now an index rather than a
9471 prescaled offset. */
49c09209 9472 bfd_put_32 (info->output_bfd,
9d8504b1 9473 plt_entry[4] | reloc_index,
2d7ad24e 9474 plt->contents + ent->plt.offset + 16);
9d8504b1
PB
9475 /* This instruction is a PC-relative branch whose target is
9476 the start of the PLT section. The address of this branch
9477 instruction is 20 bytes beyond the start of this PLT entry.
9478 The address is encoded in bits 6-29, inclusive. The value
9479 stored is right-shifted by two bits, permitting a 26-bit
9480 offset. */
49c09209 9481 bfd_put_32 (info->output_bfd,
5b914448 9482 (plt_entry[5]
9d8504b1 9483 | (-(ent->plt.offset + 20) & 0x03fffffc)),
2d7ad24e 9484 plt->contents + ent->plt.offset + 20);
49c09209 9485 bfd_put_32 (info->output_bfd, plt_entry[6],
2d7ad24e 9486 plt->contents + ent->plt.offset + 24);
49c09209 9487 bfd_put_32 (info->output_bfd, plt_entry[7],
2d7ad24e 9488 plt->contents + ent->plt.offset + 28);
9d8504b1
PB
9489
9490 /* Fill in the GOT entry corresponding to this PLT slot with
a8685210 9491 the address immediately after the "bctr" instruction
9d8504b1 9492 in this PLT entry. */
2d7ad24e
AM
9493 bfd_put_32 (info->output_bfd, (plt->output_section->vma
9494 + plt->output_offset
9495 + ent->plt.offset + 16),
ce558b89 9496 htab->elf.sgotplt->contents + got_offset);
9d8504b1 9497
0e1862bb 9498 if (!bfd_link_pic (info))
9d8504b1
PB
9499 {
9500 /* Fill in a couple of entries in .rela.plt.unloaded. */
9501 loc = htab->srelplt2->contents
9502 + ((VXWORKS_PLTRESOLVE_RELOCS + reloc_index
9503 * VXWORKS_PLT_NON_JMP_SLOT_RELOCS)
9504 * sizeof (Elf32_External_Rela));
9505
9506 /* Provide the @ha relocation for the first instruction. */
2d7ad24e
AM
9507 rela.r_offset = (plt->output_section->vma
9508 + plt->output_offset
9d8504b1 9509 + ent->plt.offset + 2);
636ce3f5 9510 rela.r_info = ELF32_R_INFO (htab->elf.hgot->indx,
9d8504b1
PB
9511 R_PPC_ADDR16_HA);
9512 rela.r_addend = got_offset;
49c09209 9513 bfd_elf32_swap_reloca_out (info->output_bfd, &rela, loc);
9d8504b1
PB
9514 loc += sizeof (Elf32_External_Rela);
9515
9516 /* Provide the @l relocation for the second instruction. */
2d7ad24e
AM
9517 rela.r_offset = (plt->output_section->vma
9518 + plt->output_offset
9d8504b1 9519 + ent->plt.offset + 6);
636ce3f5 9520 rela.r_info = ELF32_R_INFO (htab->elf.hgot->indx,
9d8504b1
PB
9521 R_PPC_ADDR16_LO);
9522 rela.r_addend = got_offset;
49c09209 9523 bfd_elf32_swap_reloca_out (info->output_bfd, &rela, loc);
9d8504b1
PB
9524 loc += sizeof (Elf32_External_Rela);
9525
9526 /* Provide a relocation for the GOT entry corresponding to this
9527 PLT slot. Point it at the middle of the .plt entry. */
ce558b89
AM
9528 rela.r_offset = (htab->elf.sgotplt->output_section->vma
9529 + htab->elf.sgotplt->output_offset
9d8504b1 9530 + got_offset);
7325306f 9531 rela.r_info = ELF32_R_INFO (htab->elf.hplt->indx,
9d8504b1
PB
9532 R_PPC_ADDR32);
9533 rela.r_addend = ent->plt.offset + 16;
49c09209 9534 bfd_elf32_swap_reloca_out (info->output_bfd, &rela, loc);
9d8504b1
PB
9535 }
9536
9537 /* VxWorks uses non-standard semantics for R_PPC_JMP_SLOT.
9538 In particular, the offset for the relocation is not the
9539 address of the PLT entry for this function, as specified
9540 by the ABI. Instead, the offset is set to the address of
9541 the GOT slot for this function. See EABI 4.4.4.1. */
ce558b89
AM
9542 rela.r_offset = (htab->elf.sgotplt->output_section->vma
9543 + htab->elf.sgotplt->output_offset
9d8504b1 9544 + got_offset);
2d7ad24e 9545 rela.r_addend = 0;
a6aa5195
AM
9546 }
9547 else
9548 {
2d7ad24e 9549 rela.r_addend = 0;
25f23106
AM
9550 if (!htab->elf.dynamic_sections_created
9551 || h->dynindx == -1)
2d7ad24e
AM
9552 {
9553 if (h->type == STT_GNU_IFUNC)
9554 {
9555 plt = htab->elf.iplt;
9556 relplt = htab->elf.irelplt;
9557 }
9558 else
9559 {
9560 plt = htab->pltlocal;
9561 relplt = bfd_link_pic (info) ? htab->relpltlocal : NULL;
9562 }
9563 if (h->def_regular
9564 && (h->root.type == bfd_link_hash_defined
9565 || h->root.type == bfd_link_hash_defweak))
9566 rela.r_addend = SYM_VAL (h);
9567 }
e054468f 9568
2d7ad24e 9569 if (relplt == NULL)
9d8504b1 9570 {
2d7ad24e
AM
9571 loc = plt->contents + ent->plt.offset;
9572 bfd_put_32 (info->output_bfd, rela.r_addend, loc);
9d8504b1
PB
9573 }
9574 else
9575 {
2d7ad24e
AM
9576 rela.r_offset = (plt->output_section->vma
9577 + plt->output_offset
9578 + ent->plt.offset);
9579
9580 if (htab->plt_type == PLT_OLD
9581 || !htab->elf.dynamic_sections_created
9582 || h->dynindx == -1)
9583 {
9584 /* We don't need to fill in the .plt. The ppc dynamic
9585 linker will fill it in. */
9586 }
9587 else
9588 {
9589 bfd_vma val = (htab->glink_pltresolve + ent->plt.offset
9590 + htab->glink->output_section->vma
9591 + htab->glink->output_offset);
9592 bfd_put_32 (info->output_bfd, val,
9593 plt->contents + ent->plt.offset);
9594 }
9d8504b1 9595 }
a6aa5195 9596 }
e1a9cb8e 9597
2d7ad24e 9598 if (relplt != NULL)
e054468f 9599 {
2d7ad24e
AM
9600 /* Fill in the entry in the .rela.plt section. */
9601 if (!htab->elf.dynamic_sections_created
9602 || h->dynindx == -1)
9603 {
9604 if (h->type == STT_GNU_IFUNC)
9605 rela.r_info = ELF32_R_INFO (0, R_PPC_IRELATIVE);
9606 else
9607 rela.r_info = ELF32_R_INFO (0, R_PPC_RELATIVE);
9608 loc = relplt->contents + (relplt->reloc_count++
9609 * sizeof (Elf32_External_Rela));
9610 htab->local_ifunc_resolver = 1;
9611 }
9612 else
9613 {
9614 rela.r_info = ELF32_R_INFO (h->dynindx, R_PPC_JMP_SLOT);
9615 loc = relplt->contents + (reloc_index
9616 * sizeof (Elf32_External_Rela));
9617 if (h->type == STT_GNU_IFUNC && is_static_defined (h))
9618 htab->maybe_local_ifunc_resolver = 1;
9619 }
9620 bfd_elf32_swap_reloca_out (info->output_bfd, &rela, loc);
82e66161 9621 }
a6aa5195
AM
9622 doneone = TRUE;
9623 }
e1a9cb8e 9624
e054468f 9625 if (htab->plt_type == PLT_NEW
25f23106
AM
9626 || !htab->elf.dynamic_sections_created
9627 || h->dynindx == -1)
a6aa5195 9628 {
a7f2871e 9629 unsigned char *p;
49c09209 9630 asection *plt = htab->elf.splt;
9e390558 9631
25f23106
AM
9632 if (!htab->elf.dynamic_sections_created
9633 || h->dynindx == -1)
2d7ad24e
AM
9634 {
9635 if (h->type == STT_GNU_IFUNC)
9636 plt = htab->elf.iplt;
9637 else
9638 break;
9639 }
e1a9cb8e 9640
a7f2871e 9641 p = (unsigned char *) htab->glink->contents + ent->glink_offset;
49c09209 9642 write_glink_stub (h, ent, plt, p, info);
e1a9cb8e 9643
0e1862bb 9644 if (!bfd_link_pic (info))
e054468f
AM
9645 /* We only need one non-PIC glink stub. */
9646 break;
a6aa5195
AM
9647 }
9648 else
9649 break;
9650 }
49c09209
AM
9651 return TRUE;
9652}
9653
9654/* Finish up PLT handling. */
9655
9656bfd_boolean
9657ppc_finish_symbols (struct bfd_link_info *info)
9658{
9659 struct ppc_elf_link_hash_table *htab = ppc_elf_hash_table (info);
9660 bfd *ibfd;
9661
9662 if (!htab)
9663 return TRUE;
9664
9665 elf_link_hash_traverse (&htab->elf, write_global_sym_plt, info);
9666
9667 for (ibfd = info->input_bfds; ibfd != NULL; ibfd = ibfd->link.next)
9668 {
9669 bfd_vma *local_got, *end_local_got;
9670 struct plt_entry **local_plt, **lplt, **end_local_plt;
9671 Elf_Internal_Shdr *symtab_hdr;
9672 bfd_size_type locsymcount;
9673 Elf_Internal_Sym *local_syms = NULL;
9674 struct plt_entry *ent;
9675
9676 if (!is_ppc_elf (ibfd))
9677 continue;
9678
9679 local_got = elf_local_got_offsets (ibfd);
9680 if (!local_got)
9681 continue;
9682
9683 symtab_hdr = &elf_symtab_hdr (ibfd);
9684 locsymcount = symtab_hdr->sh_info;
9685 end_local_got = local_got + locsymcount;
9686 local_plt = (struct plt_entry **) end_local_got;
9687 end_local_plt = local_plt + locsymcount;
9688 for (lplt = local_plt; lplt < end_local_plt; ++lplt)
9689 for (ent = *lplt; ent != NULL; ent = ent->next)
9690 {
9691 if (ent->plt.offset != (bfd_vma) -1)
9692 {
9693 Elf_Internal_Sym *sym;
9694 asection *sym_sec;
9695 asection *plt, *relplt;
9696 bfd_byte *loc;
9697 bfd_vma val;
9698 Elf_Internal_Rela rela;
8cd1fe1b 9699 unsigned char *p;
49c09209
AM
9700
9701 if (!get_sym_h (NULL, &sym, &sym_sec, NULL, &local_syms,
9702 lplt - local_plt, ibfd))
9703 {
9704 if (local_syms != NULL
9705 && symtab_hdr->contents != (unsigned char *) local_syms)
9706 free (local_syms);
9707 return FALSE;
9708 }
9709
9710 val = sym->st_value;
9711 if (sym_sec != NULL && sym_sec->output_section != NULL)
9712 val += sym_sec->output_offset + sym_sec->output_section->vma;
9713
2d7ad24e
AM
9714 if (ELF_ST_TYPE (sym->st_info) == STT_GNU_IFUNC)
9715 {
9716 htab->local_ifunc_resolver = 1;
9717 plt = htab->elf.iplt;
9718 relplt = htab->elf.irelplt;
9719 rela.r_info = ELF32_R_INFO (0, R_PPC_IRELATIVE);
9720 }
9721 else
9722 {
9723 plt = htab->pltlocal;
9724 if (bfd_link_pic (info))
9725 {
9726 relplt = htab->relpltlocal;
9727 rela.r_info = ELF32_R_INFO (0, R_PPC_RELATIVE);
9728 }
9729 else
9730 {
9731 loc = plt->contents + ent->plt.offset;
9732 bfd_put_32 (info->output_bfd, val, loc);
9733 continue;
9734 }
9735 }
49c09209
AM
9736
9737 rela.r_offset = (ent->plt.offset
9738 + plt->output_offset
9739 + plt->output_section->vma);
49c09209
AM
9740 rela.r_addend = val;
9741 loc = relplt->contents + (relplt->reloc_count++
9742 * sizeof (Elf32_External_Rela));
9743 bfd_elf32_swap_reloca_out (info->output_bfd, &rela, loc);
49c09209 9744
8cd1fe1b 9745 p = (unsigned char *) htab->glink->contents + ent->glink_offset;
49c09209 9746 write_glink_stub (NULL, ent, htab->elf.iplt, p, info);
49c09209
AM
9747 }
9748 }
9749
9750 if (local_syms != NULL
9751 && symtab_hdr->contents != (unsigned char *) local_syms)
9752 {
9753 if (!info->keep_memory)
9754 free (local_syms);
9755 else
9756 symtab_hdr->contents = (unsigned char *) local_syms;
9757 }
9758 }
9759 return TRUE;
9760}
9761
9762/* Finish up dynamic symbol handling. We set the contents of various
9763 dynamic sections here. */
9764
9765static bfd_boolean
9766ppc_elf_finish_dynamic_symbol (bfd *output_bfd,
9767 struct bfd_link_info *info,
9768 struct elf_link_hash_entry *h,
9769 Elf_Internal_Sym *sym)
9770{
9771 struct ppc_elf_link_hash_table *htab = ppc_elf_hash_table (info);
9772 struct plt_entry *ent;
9773
9774#ifdef DEBUG
9775 fprintf (stderr, "ppc_elf_finish_dynamic_symbol called for %s",
9776 h->root.root.string);
9777#endif
9778
9779 if (!h->def_regular
9780 || (h->type == STT_GNU_IFUNC && !bfd_link_pic (info)))
9781 for (ent = h->plt.plist; ent != NULL; ent = ent->next)
9782 if (ent->plt.offset != (bfd_vma) -1)
9783 {
9784 if (!h->def_regular)
9785 {
9786 /* Mark the symbol as undefined, rather than as
9787 defined in the .plt section. Leave the value if
9788 there were any relocations where pointer equality
9789 matters (this is a clue for the dynamic linker, to
9790 make function pointer comparisons work between an
9791 application and shared library), otherwise set it
9792 to zero. */
9793 sym->st_shndx = SHN_UNDEF;
9794 if (!h->pointer_equality_needed)
9795 sym->st_value = 0;
9796 else if (!h->ref_regular_nonweak)
9797 {
9798 /* This breaks function pointer comparisons, but
9799 that is better than breaking tests for a NULL
9800 function pointer. */
9801 sym->st_value = 0;
9802 }
9803 }
9804 else
9805 {
9806 /* Set the value of ifunc symbols in a non-pie
9807 executable to the glink entry. This is to avoid
9808 text relocations. We can't do this for ifunc in
9809 allocate_dynrelocs, as we do for normal dynamic
9810 function symbols with plt entries, because we need
9811 to keep the original value around for the ifunc
9812 relocation. */
9813 sym->st_shndx
9814 = (_bfd_elf_section_from_bfd_section
9815 (info->output_bfd, htab->glink->output_section));
9816 sym->st_value = (ent->glink_offset
9817 + htab->glink->output_offset
9818 + htab->glink->output_section->vma);
9819 }
9820 break;
9821 }
e1a9cb8e 9822
25dbc73a
AM
9823 if (h->needs_copy)
9824 {
9825 asection *s;
9826 Elf_Internal_Rela rela;
9827 bfd_byte *loc;
e1a9cb8e 9828
25dbc73a 9829 /* This symbols needs a copy reloc. Set it up. */
e1a9cb8e 9830
25dbc73a
AM
9831#ifdef DEBUG
9832 fprintf (stderr, ", copy");
9833#endif
e1a9cb8e 9834
25dbc73a 9835 BFD_ASSERT (h->dynindx != -1);
86bbe32f 9836
4dc4a9a5 9837 if (ppc_elf_hash_entry (h)->has_sda_refs)
25dbc73a 9838 s = htab->relsbss;
afbf7e8e 9839 else if (h->root.u.def.section == htab->elf.sdynrelro)
5474d94f 9840 s = htab->elf.sreldynrelro;
25dbc73a 9841 else
9d19e4fd 9842 s = htab->elf.srelbss;
25dbc73a 9843 BFD_ASSERT (s != NULL);
e1a9cb8e 9844
e87d4038 9845 rela.r_offset = SYM_VAL (h);
25dbc73a
AM
9846 rela.r_info = ELF32_R_INFO (h->dynindx, R_PPC_COPY);
9847 rela.r_addend = 0;
9848 loc = s->contents + s->reloc_count++ * sizeof (Elf32_External_Rela);
9849 bfd_elf32_swap_reloca_out (output_bfd, &rela, loc);
9850 }
e1a9cb8e 9851
25dbc73a
AM
9852#ifdef DEBUG
9853 fprintf (stderr, "\n");
9854#endif
e1a9cb8e 9855
25dbc73a
AM
9856 return TRUE;
9857}
9858\f
9859static enum elf_reloc_type_class
7e612e98
AM
9860ppc_elf_reloc_type_class (const struct bfd_link_info *info,
9861 const asection *rel_sec,
9862 const Elf_Internal_Rela *rela)
e1a9cb8e 9863{
7e612e98
AM
9864 struct ppc_elf_link_hash_table *htab = ppc_elf_hash_table (info);
9865
ce558b89 9866 if (rel_sec == htab->elf.irelplt)
7e612e98
AM
9867 return reloc_class_ifunc;
9868
25dbc73a
AM
9869 switch (ELF32_R_TYPE (rela->r_info))
9870 {
9871 case R_PPC_RELATIVE:
9872 return reloc_class_relative;
25dbc73a
AM
9873 case R_PPC_JMP_SLOT:
9874 return reloc_class_plt;
9875 case R_PPC_COPY:
9876 return reloc_class_copy;
9877 default:
9878 return reloc_class_normal;
9879 }
e1a9cb8e 9880}
25dbc73a
AM
9881\f
9882/* Finish up the dynamic sections. */
e1a9cb8e 9883
25dbc73a
AM
9884static bfd_boolean
9885ppc_elf_finish_dynamic_sections (bfd *output_bfd,
9886 struct bfd_link_info *info)
e1a9cb8e 9887{
25dbc73a
AM
9888 asection *sdyn;
9889 struct ppc_elf_link_hash_table *htab;
1fe44d79 9890 bfd_vma got;
e87d4038
AM
9891 bfd *dynobj;
9892 bfd_boolean ret = TRUE;
e1a9cb8e 9893
25dbc73a
AM
9894#ifdef DEBUG
9895 fprintf (stderr, "ppc_elf_finish_dynamic_sections called\n");
9896#endif
6b0817e5 9897
25dbc73a 9898 htab = ppc_elf_hash_table (info);
ce558b89 9899 dynobj = htab->elf.dynobj;
3d4d4302 9900 sdyn = bfd_get_linker_section (dynobj, ".dynamic");
e1a9cb8e 9901
1fe44d79
AM
9902 got = 0;
9903 if (htab->elf.hgot != NULL)
e87d4038 9904 got = SYM_VAL (htab->elf.hgot);
1fe44d79 9905
25dbc73a 9906 if (htab->elf.dynamic_sections_created)
e1a9cb8e 9907 {
25dbc73a 9908 Elf32_External_Dyn *dyncon, *dynconend;
e1a9cb8e 9909
ce558b89 9910 BFD_ASSERT (htab->elf.splt != NULL && sdyn != NULL);
86bbe32f 9911
25dbc73a
AM
9912 dyncon = (Elf32_External_Dyn *) sdyn->contents;
9913 dynconend = (Elf32_External_Dyn *) (sdyn->contents + sdyn->size);
9914 for (; dyncon < dynconend; dyncon++)
9915 {
9916 Elf_Internal_Dyn dyn;
9917 asection *s;
e1a9cb8e 9918
9d8504b1 9919 bfd_elf32_swap_dyn_in (dynobj, dyncon, &dyn);
86bbe32f 9920
25dbc73a
AM
9921 switch (dyn.d_tag)
9922 {
9923 case DT_PLTGOT:
9d8504b1 9924 if (htab->is_vxworks)
ce558b89 9925 s = htab->elf.sgotplt;
9d8504b1 9926 else
ce558b89 9927 s = htab->elf.splt;
25dbc73a
AM
9928 dyn.d_un.d_ptr = s->output_section->vma + s->output_offset;
9929 break;
86bbe32f 9930
25dbc73a 9931 case DT_PLTRELSZ:
ce558b89 9932 dyn.d_un.d_val = htab->elf.srelplt->size;
25dbc73a 9933 break;
e1a9cb8e 9934
25dbc73a 9935 case DT_JMPREL:
ce558b89 9936 s = htab->elf.srelplt;
25dbc73a
AM
9937 dyn.d_un.d_ptr = s->output_section->vma + s->output_offset;
9938 break;
2f89ff8d 9939
1fe44d79
AM
9940 case DT_PPC_GOT:
9941 dyn.d_un.d_ptr = got;
d7128ce4
AM
9942 break;
9943
82e66161
AM
9944 case DT_TEXTREL:
9945 if (htab->local_ifunc_resolver)
9946 info->callbacks->einfo
9947 (_("%X%P: text relocations and GNU indirect "
9948 "functions will result in a segfault at runtime\n"));
9949 else if (htab->maybe_local_ifunc_resolver)
9950 info->callbacks->einfo
9951 (_("%P: warning: text relocations and GNU indirect "
9952 "functions may result in a segfault at runtime\n"));
9953 continue;
9954
25dbc73a 9955 default:
7a2b07ff
NS
9956 if (htab->is_vxworks
9957 && elf_vxworks_finish_dynamic_entry (output_bfd, &dyn))
9958 break;
25dbc73a
AM
9959 continue;
9960 }
4c45e5c9 9961
25dbc73a
AM
9962 bfd_elf32_swap_dyn_out (output_bfd, &dyn, dyncon);
9963 }
9964 }
4c45e5c9 9965
6528b6eb
AM
9966 if (htab->elf.sgot != NULL
9967 && htab->elf.sgot->output_section != bfd_abs_section_ptr)
25dbc73a 9968 {
ce558b89
AM
9969 if (htab->elf.hgot->root.u.def.section == htab->elf.sgot
9970 || htab->elf.hgot->root.u.def.section == htab->elf.sgotplt)
e87d4038 9971 {
e79f5955 9972 unsigned char *p = htab->elf.hgot->root.u.def.section->contents;
2f89ff8d 9973
e87d4038
AM
9974 p += htab->elf.hgot->root.u.def.value;
9975 if (htab->plt_type == PLT_OLD)
e79f5955
AM
9976 {
9977 /* Add a blrl instruction at _GLOBAL_OFFSET_TABLE_-4
9978 so that a function can easily find the address of
9979 _GLOBAL_OFFSET_TABLE_. */
9980 BFD_ASSERT (htab->elf.hgot->root.u.def.value - 4
9981 < htab->elf.hgot->root.u.def.section->size);
9982 bfd_put_32 (output_bfd, 0x4e800021, p - 4);
9983 }
3b36f7e6 9984
e87d4038 9985 if (sdyn != NULL)
e79f5955
AM
9986 {
9987 bfd_vma val = sdyn->output_section->vma + sdyn->output_offset;
9988 BFD_ASSERT (htab->elf.hgot->root.u.def.value
9989 < htab->elf.hgot->root.u.def.section->size);
9990 bfd_put_32 (output_bfd, val, p);
9991 }
e87d4038
AM
9992 }
9993 else
9994 {
695344c0 9995 /* xgettext:c-format */
cf97bcb0
AM
9996 _bfd_error_handler (_("%s not defined in linker created %pA"),
9997 htab->elf.hgot->root.root.string,
9998 (htab->elf.sgotplt != NULL
9999 ? htab->elf.sgotplt : htab->elf.sgot));
e87d4038
AM
10000 bfd_set_error (bfd_error_bad_value);
10001 ret = FALSE;
10002 }
25dbc73a 10003
ce558b89 10004 elf_section_data (htab->elf.sgot->output_section)->this_hdr.sh_entsize = 4;
25dbc73a
AM
10005 }
10006
9d8504b1 10007 /* Fill in the first entry in the VxWorks procedure linkage table. */
6528b6eb
AM
10008 if (htab->is_vxworks
10009 && htab->elf.splt != NULL
10010 && htab->elf.splt->size != 0
10011 && htab->elf.splt->output_section != bfd_abs_section_ptr)
9d8504b1 10012 {
6528b6eb 10013 asection *splt = htab->elf.splt;
9d8504b1 10014 /* Use the right PLT. */
0e1862bb 10015 const bfd_vma *plt_entry = (bfd_link_pic (info)
5b914448
AM
10016 ? ppc_elf_vxworks_pic_plt0_entry
10017 : ppc_elf_vxworks_plt0_entry);
9d8504b1 10018
0e1862bb 10019 if (!bfd_link_pic (info))
9d8504b1 10020 {
e87d4038 10021 bfd_vma got_value = SYM_VAL (htab->elf.hgot);
9d8504b1 10022
e87d4038 10023 bfd_put_32 (output_bfd, plt_entry[0] | PPC_HA (got_value),
9d8504b1 10024 splt->contents + 0);
e87d4038 10025 bfd_put_32 (output_bfd, plt_entry[1] | PPC_LO (got_value),
9d8504b1
PB
10026 splt->contents + 4);
10027 }
10028 else
10029 {
10030 bfd_put_32 (output_bfd, plt_entry[0], splt->contents + 0);
10031 bfd_put_32 (output_bfd, plt_entry[1], splt->contents + 4);
10032 }
10033 bfd_put_32 (output_bfd, plt_entry[2], splt->contents + 8);
10034 bfd_put_32 (output_bfd, plt_entry[3], splt->contents + 12);
10035 bfd_put_32 (output_bfd, plt_entry[4], splt->contents + 16);
10036 bfd_put_32 (output_bfd, plt_entry[5], splt->contents + 20);
10037 bfd_put_32 (output_bfd, plt_entry[6], splt->contents + 24);
10038 bfd_put_32 (output_bfd, plt_entry[7], splt->contents + 28);
10039
0e1862bb 10040 if (! bfd_link_pic (info))
9d8504b1
PB
10041 {
10042 Elf_Internal_Rela rela;
10043 bfd_byte *loc;
10044
10045 loc = htab->srelplt2->contents;
10046
10047 /* Output the @ha relocation for the first instruction. */
ce558b89
AM
10048 rela.r_offset = (htab->elf.splt->output_section->vma
10049 + htab->elf.splt->output_offset
9d8504b1 10050 + 2);
636ce3f5 10051 rela.r_info = ELF32_R_INFO (htab->elf.hgot->indx, R_PPC_ADDR16_HA);
9d8504b1
PB
10052 rela.r_addend = 0;
10053 bfd_elf32_swap_reloca_out (output_bfd, &rela, loc);
10054 loc += sizeof (Elf32_External_Rela);
5b914448 10055
9d8504b1 10056 /* Output the @l relocation for the second instruction. */
ce558b89
AM
10057 rela.r_offset = (htab->elf.splt->output_section->vma
10058 + htab->elf.splt->output_offset
9d8504b1 10059 + 6);
636ce3f5 10060 rela.r_info = ELF32_R_INFO (htab->elf.hgot->indx, R_PPC_ADDR16_LO);
9d8504b1
PB
10061 rela.r_addend = 0;
10062 bfd_elf32_swap_reloca_out (output_bfd, &rela, loc);
10063 loc += sizeof (Elf32_External_Rela);
10064
10065 /* Fix up the remaining relocations. They may have the wrong
10066 symbol index for _G_O_T_ or _P_L_T_ depending on the order
10067 in which symbols were output. */
10068 while (loc < htab->srelplt2->contents + htab->srelplt2->size)
10069 {
10070 Elf_Internal_Rela rel;
10071
10072 bfd_elf32_swap_reloc_in (output_bfd, loc, &rel);
636ce3f5 10073 rel.r_info = ELF32_R_INFO (htab->elf.hgot->indx, R_PPC_ADDR16_HA);
9d8504b1
PB
10074 bfd_elf32_swap_reloc_out (output_bfd, &rel, loc);
10075 loc += sizeof (Elf32_External_Rela);
10076
10077 bfd_elf32_swap_reloc_in (output_bfd, loc, &rel);
636ce3f5 10078 rel.r_info = ELF32_R_INFO (htab->elf.hgot->indx, R_PPC_ADDR16_LO);
9d8504b1
PB
10079 bfd_elf32_swap_reloc_out (output_bfd, &rel, loc);
10080 loc += sizeof (Elf32_External_Rela);
10081
10082 bfd_elf32_swap_reloc_in (output_bfd, loc, &rel);
7325306f 10083 rel.r_info = ELF32_R_INFO (htab->elf.hplt->indx, R_PPC_ADDR32);
9d8504b1
PB
10084 bfd_elf32_swap_reloc_out (output_bfd, &rel, loc);
10085 loc += sizeof (Elf32_External_Rela);
10086 }
10087 }
10088 }
10089
e054468f
AM
10090 if (htab->glink != NULL
10091 && htab->glink->contents != NULL
10092 && htab->elf.dynamic_sections_created)
d7128ce4
AM
10093 {
10094 unsigned char *p;
10095 unsigned char *endp;
a6aa5195 10096 bfd_vma res0;
a6aa5195
AM
10097
10098 /*
10099 * PIC glink code is the following:
10100 *
10101 * # ith PLT code stub.
10102 * addis 11,30,(plt+(i-1)*4-got)@ha
10103 * lwz 11,(plt+(i-1)*4-got)@l(11)
10104 * mtctr 11
10105 * bctr
10106 *
10107 * # A table of branches, one for each plt entry.
176a0d42 10108 * # The idea is that the plt call stub loads ctr and r11 with these
a6aa5195
AM
10109 * # addresses, so (r11 - res_0) gives the plt index * 4.
10110 * res_0: b PLTresolve
10111 * res_1: b PLTresolve
10112 * .
10113 * # Some number of entries towards the end can be nops
10114 * res_n_m3: nop
10115 * res_n_m2: nop
10116 * res_n_m1:
10117 *
10118 * PLTresolve:
10119 * addis 11,11,(1f-res_0)@ha
10120 * mflr 0
10121 * bcl 20,31,1f
10122 * 1: addi 11,11,(1b-res_0)@l
10123 * mflr 12
10124 * mtlr 0
07d6d2b8 10125 * sub 11,11,12 # r11 = index * 4
a6aa5195 10126 * addis 12,12,(got+4-1b)@ha
07d6d2b8
AM
10127 * lwz 0,(got+4-1b)@l(12) # got[1] address of dl_runtime_resolve
10128 * lwz 12,(got+8-1b)@l(12) # got[2] contains the map address
a6aa5195
AM
10129 * mtctr 0
10130 * add 0,11,11
07d6d2b8 10131 * add 11,0,11 # r11 = index * 12 = reloc offset.
a6aa5195 10132 * bctr
9e390558 10133 *
176a0d42
AM
10134 * Non-PIC glink code is a little simpler.
10135 *
10136 * # ith PLT code stub.
10137 * lis 11,(plt+(i-1)*4)@ha
10138 * lwz 11,(plt+(i-1)*4)@l(11)
10139 * mtctr 11
10140 * bctr
10141 *
10142 * The branch table is the same, then comes
10143 *
10144 * PLTresolve:
10145 * lis 12,(got+4)@ha
10146 * addis 11,11,(-res_0)@ha
07d6d2b8
AM
10147 * lwz 0,(got+4)@l(12) # got[1] address of dl_runtime_resolve
10148 * addi 11,11,(-res_0)@l # r11 = index * 4
176a0d42
AM
10149 * mtctr 0
10150 * add 0,11,11
07d6d2b8
AM
10151 * lwz 12,(got+8)@l(12) # got[2] contains the map address
10152 * add 11,0,11 # r11 = index * 12 = reloc offset.
176a0d42
AM
10153 * bctr
10154 */
7e8aeb9a 10155
a6aa5195 10156 /* Build the branch table, one for each plt entry (less one),
86b9da88 10157 and perhaps some padding. */
a6aa5195
AM
10158 p = htab->glink->contents;
10159 p += htab->glink_pltresolve;
86b9da88
AM
10160 endp = htab->glink->contents;
10161 endp += htab->glink->size - GLINK_PLTRESOLVE;
da3a2088 10162 while (p < endp - (htab->params->ppc476_workaround ? 0 : 8 * 4))
86b9da88
AM
10163 {
10164 bfd_put_32 (output_bfd, B + endp - p, p);
10165 p += 4;
10166 }
10167 while (p < endp)
10168 {
10169 bfd_put_32 (output_bfd, NOP, p);
10170 p += 4;
10171 }
10172
7e8aeb9a 10173 res0 = (htab->glink_pltresolve
86b9da88
AM
10174 + htab->glink->output_section->vma
10175 + htab->glink->output_offset);
10176
da3a2088
AM
10177 if (htab->params->ppc476_workaround)
10178 {
10179 /* Ensure that a call stub at the end of a page doesn't
10180 result in prefetch over the end of the page into the
10181 glink branch table. */
10182 bfd_vma pagesize = (bfd_vma) 1 << htab->params->pagesize_p2;
10183 bfd_vma page_addr;
10184 bfd_vma glink_start = (htab->glink->output_section->vma
10185 + htab->glink->output_offset);
10186
10187 for (page_addr = res0 & -pagesize;
10188 page_addr > glink_start;
10189 page_addr -= pagesize)
10190 {
10191 /* We have a plt call stub that may need fixing. */
10192 bfd_byte *loc;
10193 unsigned int insn;
10194
10195 loc = htab->glink->contents + page_addr - 4 - glink_start;
10196 insn = bfd_get_32 (output_bfd, loc);
10197 if (insn == BCTR)
10198 {
10199 /* By alignment, we know that there must be at least
10200 one other call stub before this one. */
10201 insn = bfd_get_32 (output_bfd, loc - 16);
10202 if (insn == BCTR)
10203 bfd_put_32 (output_bfd, B | (-16 & 0x3fffffc), loc);
10204 else
10205 bfd_put_32 (output_bfd, B | (-20 & 0x3fffffc), loc);
10206 }
10207 }
10208 }
10209
86b9da88 10210 /* Last comes the PLTresolve stub. */
9e390558 10211 endp = p + GLINK_PLTRESOLVE;
0e1862bb 10212 if (bfd_link_pic (info))
7e8aeb9a 10213 {
a6aa5195 10214 bfd_vma bcl;
d7128ce4 10215
a6aa5195
AM
10216 bcl = (htab->glink->size - GLINK_PLTRESOLVE + 3*4
10217 + htab->glink->output_section->vma
10218 + htab->glink->output_offset);
10219
9e390558
AM
10220 bfd_put_32 (output_bfd, ADDIS_11_11 + PPC_HA (bcl - res0), p);
10221 p += 4;
10222 bfd_put_32 (output_bfd, MFLR_0, p);
10223 p += 4;
10224 bfd_put_32 (output_bfd, BCL_20_31, p);
10225 p += 4;
10226 bfd_put_32 (output_bfd, ADDI_11_11 + PPC_LO (bcl - res0), p);
10227 p += 4;
10228 bfd_put_32 (output_bfd, MFLR_12, p);
10229 p += 4;
10230 bfd_put_32 (output_bfd, MTLR_0, p);
10231 p += 4;
10232 bfd_put_32 (output_bfd, SUB_11_11_12, p);
10233 p += 4;
10234 bfd_put_32 (output_bfd, ADDIS_12_12 + PPC_HA (got + 4 - bcl), p);
10235 p += 4;
a6aa5195
AM
10236 if (PPC_HA (got + 4 - bcl) == PPC_HA (got + 8 - bcl))
10237 {
9e390558
AM
10238 bfd_put_32 (output_bfd, LWZ_0_12 + PPC_LO (got + 4 - bcl), p);
10239 p += 4;
10240 bfd_put_32 (output_bfd, LWZ_12_12 + PPC_LO (got + 8 - bcl), p);
10241 p += 4;
a6aa5195
AM
10242 }
10243 else
10244 {
9e390558
AM
10245 bfd_put_32 (output_bfd, LWZU_0_12 + PPC_LO (got + 4 - bcl), p);
10246 p += 4;
10247 bfd_put_32 (output_bfd, LWZ_12_12 + 4, p);
10248 p += 4;
a6aa5195 10249 }
9e390558
AM
10250 bfd_put_32 (output_bfd, MTCTR_0, p);
10251 p += 4;
10252 bfd_put_32 (output_bfd, ADD_0_11_11, p);
7e8aeb9a
AM
10253 }
10254 else
d7128ce4 10255 {
9e390558
AM
10256 bfd_put_32 (output_bfd, LIS_12 + PPC_HA (got + 4), p);
10257 p += 4;
10258 bfd_put_32 (output_bfd, ADDIS_11_11 + PPC_HA (-res0), p);
10259 p += 4;
a6aa5195 10260 if (PPC_HA (got + 4) == PPC_HA (got + 8))
9e390558 10261 bfd_put_32 (output_bfd, LWZ_0_12 + PPC_LO (got + 4), p);
a6aa5195 10262 else
9e390558
AM
10263 bfd_put_32 (output_bfd, LWZU_0_12 + PPC_LO (got + 4), p);
10264 p += 4;
10265 bfd_put_32 (output_bfd, ADDI_11_11 + PPC_LO (-res0), p);
10266 p += 4;
10267 bfd_put_32 (output_bfd, MTCTR_0, p);
10268 p += 4;
10269 bfd_put_32 (output_bfd, ADD_0_11_11, p);
10270 p += 4;
10271 if (PPC_HA (got + 4) == PPC_HA (got + 8))
10272 bfd_put_32 (output_bfd, LWZ_12_12 + PPC_LO (got + 8), p);
10273 else
10274 bfd_put_32 (output_bfd, LWZ_12_12 + 4, p);
10275 }
10276 p += 4;
10277 bfd_put_32 (output_bfd, ADD_11_0_11, p);
10278 p += 4;
407aa07c
AM
10279 bfd_put_32 (output_bfd, BCTR, p);
10280 p += 4;
9e390558
AM
10281 while (p < endp)
10282 {
10283 bfd_put_32 (output_bfd,
10284 htab->params->ppc476_workaround ? BA : NOP, p);
10285 p += 4;
d7128ce4 10286 }
9e390558 10287 BFD_ASSERT (p == endp);
d7128ce4
AM
10288 }
10289
6177242a
AM
10290 if (htab->glink_eh_frame != NULL
10291 && htab->glink_eh_frame->contents != NULL)
10292 {
10293 unsigned char *p = htab->glink_eh_frame->contents;
10294 bfd_vma val;
10295
6177242a
AM
10296 p += sizeof (glink_eh_frame_cie);
10297 /* FDE length. */
6177242a
AM
10298 p += 4;
10299 /* CIE pointer. */
6177242a
AM
10300 p += 4;
10301 /* Offset to .glink. */
10302 val = (htab->glink->output_section->vma
10303 + htab->glink->output_offset);
10304 val -= (htab->glink_eh_frame->output_section->vma
10305 + htab->glink_eh_frame->output_offset);
10306 val -= p - htab->glink_eh_frame->contents;
10307 bfd_put_32 (htab->elf.dynobj, val, p);
6177242a 10308
dbaa2011 10309 if (htab->glink_eh_frame->sec_info_type == SEC_INFO_TYPE_EH_FRAME
6177242a
AM
10310 && !_bfd_elf_write_section_eh_frame (output_bfd, info,
10311 htab->glink_eh_frame,
10312 htab->glink_eh_frame->contents))
10313 return FALSE;
10314 }
10315
e87d4038 10316 return ret;
25dbc73a 10317}
e1a9cb8e 10318\f
6d00b590 10319#define TARGET_LITTLE_SYM powerpc_elf32_le_vec
252b5132 10320#define TARGET_LITTLE_NAME "elf32-powerpcle"
6d00b590 10321#define TARGET_BIG_SYM powerpc_elf32_vec
252b5132
RH
10322#define TARGET_BIG_NAME "elf32-powerpc"
10323#define ELF_ARCH bfd_arch_powerpc
ae95ffa6 10324#define ELF_TARGET_ID PPC32_ELF_DATA
252b5132
RH
10325#define ELF_MACHINE_CODE EM_PPC
10326#define ELF_MAXPAGESIZE 0x10000
702d1671
AM
10327#define ELF_COMMONPAGESIZE 0x1000
10328#define ELF_RELROPAGESIZE ELF_MAXPAGESIZE
252b5132
RH
10329#define elf_info_to_howto ppc_elf_info_to_howto
10330
10331#ifdef EM_CYGNUS_POWERPC
10332#define ELF_MACHINE_ALT1 EM_CYGNUS_POWERPC
10333#endif
10334
10335#ifdef EM_PPC_OLD
10336#define ELF_MACHINE_ALT2 EM_PPC_OLD
10337#endif
10338
10339#define elf_backend_plt_not_loaded 1
5474d94f 10340#define elf_backend_want_dynrelro 1
252b5132 10341#define elf_backend_can_gc_sections 1
51b64d56 10342#define elf_backend_can_refcount 1
b491616a 10343#define elf_backend_rela_normal 1
53291d1f 10344#define elf_backend_caches_rawsize 1
252b5132 10345
43c40ab2 10346#define bfd_elf32_mkobject ppc_elf_mkobject
252b5132 10347#define bfd_elf32_bfd_merge_private_bfd_data ppc_elf_merge_private_bfd_data
70bccea4 10348#define bfd_elf32_bfd_relax_section ppc_elf_relax_section
252b5132 10349#define bfd_elf32_bfd_reloc_type_lookup ppc_elf_reloc_type_lookup
b9c361e0 10350#define bfd_elf32_bfd_reloc_name_lookup ppc_elf_reloc_name_lookup
252b5132 10351#define bfd_elf32_bfd_set_private_flags ppc_elf_set_private_flags
70bccea4 10352#define bfd_elf32_bfd_link_hash_table_create ppc_elf_link_hash_table_create
468392fb 10353#define bfd_elf32_get_synthetic_symtab ppc_elf_get_synthetic_symtab
252b5132 10354
feee612b 10355#define elf_backend_object_p ppc_elf_object_p
252b5132 10356#define elf_backend_gc_mark_hook ppc_elf_gc_mark_hook
252b5132
RH
10357#define elf_backend_section_from_shdr ppc_elf_section_from_shdr
10358#define elf_backend_relocate_section ppc_elf_relocate_section
10359#define elf_backend_create_dynamic_sections ppc_elf_create_dynamic_sections
10360#define elf_backend_check_relocs ppc_elf_check_relocs
c0e331c7 10361#define elf_backend_relocs_compatible _bfd_elf_relocs_compatible
7fce784e 10362#define elf_backend_copy_indirect_symbol ppc_elf_copy_indirect_symbol
252b5132
RH
10363#define elf_backend_adjust_dynamic_symbol ppc_elf_adjust_dynamic_symbol
10364#define elf_backend_add_symbol_hook ppc_elf_add_symbol_hook
10365#define elf_backend_size_dynamic_sections ppc_elf_size_dynamic_sections
0eb4a168 10366#define elf_backend_hash_symbol ppc_elf_hash_symbol
252b5132
RH
10367#define elf_backend_finish_dynamic_symbol ppc_elf_finish_dynamic_symbol
10368#define elf_backend_finish_dynamic_sections ppc_elf_finish_dynamic_sections
10369#define elf_backend_fake_sections ppc_elf_fake_sections
10370#define elf_backend_additional_program_headers ppc_elf_additional_program_headers
954b63d4 10371#define elf_backend_modify_segment_map ppc_elf_modify_segment_map
c5fccbec
DJ
10372#define elf_backend_grok_prstatus ppc_elf_grok_prstatus
10373#define elf_backend_grok_psinfo ppc_elf_grok_psinfo
183e98be 10374#define elf_backend_write_core_note ppc_elf_write_core_note
29c2fb7c 10375#define elf_backend_reloc_type_class ppc_elf_reloc_type_class
70bccea4
AM
10376#define elf_backend_begin_write_processing ppc_elf_begin_write_processing
10377#define elf_backend_final_write_processing ppc_elf_final_write_processing
10378#define elf_backend_write_section ppc_elf_write_section
551b43fd 10379#define elf_backend_get_sec_type_attr ppc_elf_get_sec_type_attr
4c45e5c9 10380#define elf_backend_plt_sym_val ppc_elf_plt_sym_val
8a696751 10381#define elf_backend_action_discarded ppc_elf_action_discarded
74541ad4 10382#define elf_backend_init_index_section _bfd_elf_init_1_index_section
b9c361e0 10383#define elf_backend_lookup_section_flags_hook ppc_elf_lookup_section_flags
252b5132
RH
10384
10385#include "elf32-target.h"
9d8504b1 10386
7b8e7dad
AM
10387/* FreeBSD Target */
10388
10389#undef TARGET_LITTLE_SYM
10390#undef TARGET_LITTLE_NAME
10391
10392#undef TARGET_BIG_SYM
6d00b590 10393#define TARGET_BIG_SYM powerpc_elf32_fbsd_vec
7b8e7dad
AM
10394#undef TARGET_BIG_NAME
10395#define TARGET_BIG_NAME "elf32-powerpc-freebsd"
10396
10397#undef ELF_OSABI
10398#define ELF_OSABI ELFOSABI_FREEBSD
10399
10400#undef elf32_bed
10401#define elf32_bed elf32_powerpc_fbsd_bed
10402
10403#include "elf32-target.h"
10404
9d8504b1
PB
10405/* VxWorks Target */
10406
10407#undef TARGET_LITTLE_SYM
10408#undef TARGET_LITTLE_NAME
10409
10410#undef TARGET_BIG_SYM
6d00b590 10411#define TARGET_BIG_SYM powerpc_elf32_vxworks_vec
9d8504b1
PB
10412#undef TARGET_BIG_NAME
10413#define TARGET_BIG_NAME "elf32-powerpc-vxworks"
10414
7b8e7dad
AM
10415#undef ELF_OSABI
10416
d5e3d971
PB
10417/* VxWorks uses the elf default section flags for .plt. */
10418static const struct bfd_elf_special_section *
4aef7643 10419ppc_elf_vxworks_get_sec_type_attr (bfd *abfd, asection *sec)
9d8504b1 10420{
d5e3d971
PB
10421 if (sec->name == NULL)
10422 return NULL;
10423
10424 if (strcmp (sec->name, ".plt") == 0)
10425 return _bfd_elf_get_sec_type_attr (abfd, sec);
10426
10427 return ppc_elf_get_sec_type_attr (abfd, sec);
10428}
9d8504b1
PB
10429
10430/* Like ppc_elf_link_hash_table_create, but overrides
10431 appropriately for VxWorks. */
10432static struct bfd_link_hash_table *
10433ppc_elf_vxworks_link_hash_table_create (bfd *abfd)
10434{
10435 struct bfd_link_hash_table *ret;
10436
10437 ret = ppc_elf_link_hash_table_create (abfd);
10438 if (ret)
10439 {
10440 struct ppc_elf_link_hash_table *htab
954b63d4 10441 = (struct ppc_elf_link_hash_table *)ret;
9d8504b1 10442 htab->is_vxworks = 1;
4a3dc543 10443 htab->plt_type = PLT_VXWORKS;
9d8504b1
PB
10444 htab->plt_entry_size = VXWORKS_PLT_ENTRY_SIZE;
10445 htab->plt_slot_size = VXWORKS_PLT_ENTRY_SIZE;
10446 htab->plt_initial_entry_size = VXWORKS_PLT_INITIAL_ENTRY_SIZE;
10447 }
10448 return ret;
10449}
10450
10451/* Tweak magic VxWorks symbols as they are loaded. */
10452static bfd_boolean
10453ppc_elf_vxworks_add_symbol_hook (bfd *abfd,
10454 struct bfd_link_info *info,
10455 Elf_Internal_Sym *sym,
4aef7643
AM
10456 const char **namep,
10457 flagword *flagsp,
9d8504b1
PB
10458 asection **secp,
10459 bfd_vma *valp)
10460{
4aef7643
AM
10461 if (!elf_vxworks_add_symbol_hook (abfd, info, sym, namep, flagsp, secp,
10462 valp))
9d8504b1
PB
10463 return FALSE;
10464
4aef7643 10465 return ppc_elf_add_symbol_hook (abfd, info, sym, namep, flagsp, secp, valp);
9d8504b1
PB
10466}
10467
cc364be6
AM
10468static bfd_boolean
10469ppc_elf_vxworks_final_write_processing (bfd *abfd)
9d8504b1 10470{
cc364be6
AM
10471 ppc_final_write_processing (abfd);
10472 return elf_vxworks_final_write_processing (abfd);
9d8504b1
PB
10473}
10474
10475/* On VxWorks, we emit relocations against _PROCEDURE_LINKAGE_TABLE_, so
10476 define it. */
10477#undef elf_backend_want_plt_sym
10478#define elf_backend_want_plt_sym 1
10479#undef elf_backend_want_got_plt
10480#define elf_backend_want_got_plt 1
10481#undef elf_backend_got_symbol_offset
10482#define elf_backend_got_symbol_offset 0
10483#undef elf_backend_plt_not_loaded
10484#define elf_backend_plt_not_loaded 0
10485#undef elf_backend_plt_readonly
10486#define elf_backend_plt_readonly 1
10487#undef elf_backend_got_header_size
10488#define elf_backend_got_header_size 12
64f52338
AM
10489#undef elf_backend_dtrel_excludes_plt
10490#define elf_backend_dtrel_excludes_plt 1
9d8504b1 10491
468392fb
AM
10492#undef bfd_elf32_get_synthetic_symtab
10493
9d8504b1
PB
10494#undef bfd_elf32_bfd_link_hash_table_create
10495#define bfd_elf32_bfd_link_hash_table_create \
10496 ppc_elf_vxworks_link_hash_table_create
9d8504b1
PB
10497#undef elf_backend_add_symbol_hook
10498#define elf_backend_add_symbol_hook \
10499 ppc_elf_vxworks_add_symbol_hook
10500#undef elf_backend_link_output_symbol_hook
10501#define elf_backend_link_output_symbol_hook \
9c72ff84 10502 elf_vxworks_link_output_symbol_hook
9d8504b1
PB
10503#undef elf_backend_final_write_processing
10504#define elf_backend_final_write_processing \
10505 ppc_elf_vxworks_final_write_processing
d5e3d971
PB
10506#undef elf_backend_get_sec_type_attr
10507#define elf_backend_get_sec_type_attr \
10508 ppc_elf_vxworks_get_sec_type_attr
9d8504b1
PB
10509#undef elf_backend_emit_relocs
10510#define elf_backend_emit_relocs \
10511 elf_vxworks_emit_relocs
10512
10513#undef elf32_bed
10514#define elf32_bed ppc_elf_vxworks_bed
10515
10516#include "elf32-target.h"
This page took 2.219903 seconds and 4 git commands to generate.