unrecognized/unsupported reloc message
[deliverable/binutils-gdb.git] / bfd / elf32-ppc.c
1 /* PowerPC-specific support for 32-bit ELF
2 Copyright (C) 1994-2018 Free Software Foundation, Inc.
3 Written by Ian Lance Taylor, Cygnus Support.
4
5 This file is part of BFD, the Binary File Descriptor library.
6
7 This program is free software; you can redistribute it and/or modify
8 it under the terms of the GNU General Public License as published by
9 the Free Software Foundation; either version 3 of the License, or
10 (at your option) any later version.
11
12 This program is distributed in the hope that it will be useful,
13 but WITHOUT ANY WARRANTY; without even the implied warranty of
14 MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
15 GNU General Public License for more details.
16
17 You should have received a copy of the GNU General Public License
18 along with this program; if not, write to the
19 Free Software Foundation, Inc., 51 Franklin Street - Fifth Floor,
20 Boston, MA 02110-1301, USA. */
21
22
23 /* This file is based on a preliminary PowerPC ELF ABI. The
24 information may not match the final PowerPC ELF ABI. It includes
25 suggestions from the in-progress Embedded PowerPC ABI, and that
26 information may also not match. */
27
28 #include "sysdep.h"
29 #include <stdarg.h>
30 #include "bfd.h"
31 #include "bfdlink.h"
32 #include "libbfd.h"
33 #include "elf-bfd.h"
34 #include "elf/ppc.h"
35 #include "elf32-ppc.h"
36 #include "elf-vxworks.h"
37 #include "dwarf2.h"
38 #include "opcode/ppc.h"
39
40 typedef enum split16_format_type
41 {
42 split16a_type = 0,
43 split16d_type
44 }
45 split16_format_type;
46
47 /* RELA relocations are used here. */
48
49 static bfd_reloc_status_type ppc_elf_addr16_ha_reloc
50 (bfd *, arelent *, asymbol *, void *, asection *, bfd *, char **);
51 static bfd_reloc_status_type ppc_elf_unhandled_reloc
52 (bfd *, arelent *, asymbol *, void *, asection *, bfd *, char **);
53
54 /* Branch prediction bit for branch taken relocs. */
55 #define BRANCH_PREDICT_BIT 0x200000
56 /* Mask to set RA in memory instructions. */
57 #define RA_REGISTER_MASK 0x001f0000
58 /* Value to shift register by to insert RA. */
59 #define RA_REGISTER_SHIFT 16
60
61 /* The name of the dynamic interpreter. This is put in the .interp
62 section. */
63 #define ELF_DYNAMIC_INTERPRETER "/usr/lib/ld.so.1"
64
65 /* For old-style PLT. */
66 /* The number of single-slot PLT entries (the rest use two slots). */
67 #define PLT_NUM_SINGLE_ENTRIES 8192
68
69 /* For new-style .glink and .plt. */
70 #define GLINK_PLTRESOLVE 16*4
71 #define GLINK_ENTRY_SIZE(htab, h) \
72 ((4*4 \
73 + (h != NULL \
74 && h == htab->tls_get_addr \
75 && !htab->params->no_tls_get_addr_opt ? 8*4 : 0) \
76 + (1u << htab->params->plt_stub_align) - 1) \
77 & -(1u << htab->params->plt_stub_align))
78
79 /* VxWorks uses its own plt layout, filled in by the static linker. */
80
81 /* The standard VxWorks PLT entry. */
82 #define VXWORKS_PLT_ENTRY_SIZE 32
83 static const bfd_vma ppc_elf_vxworks_plt_entry
84 [VXWORKS_PLT_ENTRY_SIZE / 4] =
85 {
86 0x3d800000, /* lis r12,0 */
87 0x818c0000, /* lwz r12,0(r12) */
88 0x7d8903a6, /* mtctr r12 */
89 0x4e800420, /* bctr */
90 0x39600000, /* li r11,0 */
91 0x48000000, /* b 14 <.PLT0resolve+0x4> */
92 0x60000000, /* nop */
93 0x60000000, /* nop */
94 };
95 static const bfd_vma ppc_elf_vxworks_pic_plt_entry
96 [VXWORKS_PLT_ENTRY_SIZE / 4] =
97 {
98 0x3d9e0000, /* addis r12,r30,0 */
99 0x818c0000, /* lwz r12,0(r12) */
100 0x7d8903a6, /* mtctr r12 */
101 0x4e800420, /* bctr */
102 0x39600000, /* li r11,0 */
103 0x48000000, /* b 14 <.PLT0resolve+0x4> 14: R_PPC_REL24 .PLTresolve */
104 0x60000000, /* nop */
105 0x60000000, /* nop */
106 };
107
108 /* The initial VxWorks PLT entry. */
109 #define VXWORKS_PLT_INITIAL_ENTRY_SIZE 32
110 static const bfd_vma ppc_elf_vxworks_plt0_entry
111 [VXWORKS_PLT_INITIAL_ENTRY_SIZE / 4] =
112 {
113 0x3d800000, /* lis r12,0 */
114 0x398c0000, /* addi r12,r12,0 */
115 0x800c0008, /* lwz r0,8(r12) */
116 0x7c0903a6, /* mtctr r0 */
117 0x818c0004, /* lwz r12,4(r12) */
118 0x4e800420, /* bctr */
119 0x60000000, /* nop */
120 0x60000000, /* nop */
121 };
122 static const bfd_vma ppc_elf_vxworks_pic_plt0_entry
123 [VXWORKS_PLT_INITIAL_ENTRY_SIZE / 4] =
124 {
125 0x819e0008, /* lwz r12,8(r30) */
126 0x7d8903a6, /* mtctr r12 */
127 0x819e0004, /* lwz r12,4(r30) */
128 0x4e800420, /* bctr */
129 0x60000000, /* nop */
130 0x60000000, /* nop */
131 0x60000000, /* nop */
132 0x60000000, /* nop */
133 };
134
135 /* For executables, we have some additional relocations in
136 .rela.plt.unloaded, for the kernel loader. */
137
138 /* The number of non-JMP_SLOT relocations per PLT0 slot. */
139 #define VXWORKS_PLT_NON_JMP_SLOT_RELOCS 3
140 /* The number of relocations in the PLTResolve slot. */
141 #define VXWORKS_PLTRESOLVE_RELOCS 2
142 /* The number of relocations in the PLTResolve slot when creating
143 a shared library. */
144 #define VXWORKS_PLTRESOLVE_RELOCS_SHLIB 0
145
146 /* Some instructions. */
147 #define ADDIS_11_11 0x3d6b0000
148 #define ADDIS_11_30 0x3d7e0000
149 #define ADDIS_12_12 0x3d8c0000
150 #define ADDI_11_11 0x396b0000
151 #define ADD_0_11_11 0x7c0b5a14
152 #define ADD_3_12_2 0x7c6c1214
153 #define ADD_11_0_11 0x7d605a14
154 #define B 0x48000000
155 #define BA 0x48000002
156 #define BCL_20_31 0x429f0005
157 #define BCTR 0x4e800420
158 #define BEQLR 0x4d820020
159 #define CMPWI_11_0 0x2c0b0000
160 #define LIS_11 0x3d600000
161 #define LIS_12 0x3d800000
162 #define LWZU_0_12 0x840c0000
163 #define LWZ_0_12 0x800c0000
164 #define LWZ_11_3 0x81630000
165 #define LWZ_11_11 0x816b0000
166 #define LWZ_11_30 0x817e0000
167 #define LWZ_12_3 0x81830000
168 #define LWZ_12_12 0x818c0000
169 #define MR_0_3 0x7c601b78
170 #define MR_3_0 0x7c030378
171 #define MFLR_0 0x7c0802a6
172 #define MFLR_12 0x7d8802a6
173 #define MTCTR_0 0x7c0903a6
174 #define MTCTR_11 0x7d6903a6
175 #define MTLR_0 0x7c0803a6
176 #define NOP 0x60000000
177 #define SUB_11_11_12 0x7d6c5850
178
179 /* Offset of tp and dtp pointers from start of TLS block. */
180 #define TP_OFFSET 0x7000
181 #define DTP_OFFSET 0x8000
182
183 /* The value of a defined global symbol. */
184 #define SYM_VAL(SYM) \
185 ((SYM)->root.u.def.section->output_section->vma \
186 + (SYM)->root.u.def.section->output_offset \
187 + (SYM)->root.u.def.value)
188 \f
189 static reloc_howto_type *ppc_elf_howto_table[R_PPC_max];
190
191 static reloc_howto_type ppc_elf_howto_raw[] = {
192 /* This reloc does nothing. */
193 HOWTO (R_PPC_NONE, /* type */
194 0, /* rightshift */
195 3, /* size (0 = byte, 1 = short, 2 = long) */
196 0, /* bitsize */
197 FALSE, /* pc_relative */
198 0, /* bitpos */
199 complain_overflow_dont, /* complain_on_overflow */
200 bfd_elf_generic_reloc, /* special_function */
201 "R_PPC_NONE", /* name */
202 FALSE, /* partial_inplace */
203 0, /* src_mask */
204 0, /* dst_mask */
205 FALSE), /* pcrel_offset */
206
207 /* A standard 32 bit relocation. */
208 HOWTO (R_PPC_ADDR32, /* type */
209 0, /* rightshift */
210 2, /* size (0 = byte, 1 = short, 2 = long) */
211 32, /* bitsize */
212 FALSE, /* pc_relative */
213 0, /* bitpos */
214 complain_overflow_dont, /* complain_on_overflow */
215 bfd_elf_generic_reloc, /* special_function */
216 "R_PPC_ADDR32", /* name */
217 FALSE, /* partial_inplace */
218 0, /* src_mask */
219 0xffffffff, /* dst_mask */
220 FALSE), /* pcrel_offset */
221
222 /* An absolute 26 bit branch; the lower two bits must be zero.
223 FIXME: we don't check that, we just clear them. */
224 HOWTO (R_PPC_ADDR24, /* type */
225 0, /* rightshift */
226 2, /* size (0 = byte, 1 = short, 2 = long) */
227 26, /* bitsize */
228 FALSE, /* pc_relative */
229 0, /* bitpos */
230 complain_overflow_signed, /* complain_on_overflow */
231 bfd_elf_generic_reloc, /* special_function */
232 "R_PPC_ADDR24", /* name */
233 FALSE, /* partial_inplace */
234 0, /* src_mask */
235 0x3fffffc, /* dst_mask */
236 FALSE), /* pcrel_offset */
237
238 /* A standard 16 bit relocation. */
239 HOWTO (R_PPC_ADDR16, /* type */
240 0, /* rightshift */
241 1, /* size (0 = byte, 1 = short, 2 = long) */
242 16, /* bitsize */
243 FALSE, /* pc_relative */
244 0, /* bitpos */
245 complain_overflow_bitfield, /* complain_on_overflow */
246 bfd_elf_generic_reloc, /* special_function */
247 "R_PPC_ADDR16", /* name */
248 FALSE, /* partial_inplace */
249 0, /* src_mask */
250 0xffff, /* dst_mask */
251 FALSE), /* pcrel_offset */
252
253 /* A 16 bit relocation without overflow. */
254 HOWTO (R_PPC_ADDR16_LO, /* type */
255 0, /* rightshift */
256 1, /* size (0 = byte, 1 = short, 2 = long) */
257 16, /* bitsize */
258 FALSE, /* pc_relative */
259 0, /* bitpos */
260 complain_overflow_dont,/* complain_on_overflow */
261 bfd_elf_generic_reloc, /* special_function */
262 "R_PPC_ADDR16_LO", /* name */
263 FALSE, /* partial_inplace */
264 0, /* src_mask */
265 0xffff, /* dst_mask */
266 FALSE), /* pcrel_offset */
267
268 /* The high order 16 bits of an address. */
269 HOWTO (R_PPC_ADDR16_HI, /* type */
270 16, /* rightshift */
271 1, /* size (0 = byte, 1 = short, 2 = long) */
272 16, /* bitsize */
273 FALSE, /* pc_relative */
274 0, /* bitpos */
275 complain_overflow_dont, /* complain_on_overflow */
276 bfd_elf_generic_reloc, /* special_function */
277 "R_PPC_ADDR16_HI", /* name */
278 FALSE, /* partial_inplace */
279 0, /* src_mask */
280 0xffff, /* dst_mask */
281 FALSE), /* pcrel_offset */
282
283 /* The high order 16 bits of an address, plus 1 if the contents of
284 the low 16 bits, treated as a signed number, is negative. */
285 HOWTO (R_PPC_ADDR16_HA, /* type */
286 16, /* rightshift */
287 1, /* size (0 = byte, 1 = short, 2 = long) */
288 16, /* bitsize */
289 FALSE, /* pc_relative */
290 0, /* bitpos */
291 complain_overflow_dont, /* complain_on_overflow */
292 ppc_elf_addr16_ha_reloc, /* special_function */
293 "R_PPC_ADDR16_HA", /* name */
294 FALSE, /* partial_inplace */
295 0, /* src_mask */
296 0xffff, /* dst_mask */
297 FALSE), /* pcrel_offset */
298
299 /* An absolute 16 bit branch; the lower two bits must be zero.
300 FIXME: we don't check that, we just clear them. */
301 HOWTO (R_PPC_ADDR14, /* type */
302 0, /* rightshift */
303 2, /* size (0 = byte, 1 = short, 2 = long) */
304 16, /* bitsize */
305 FALSE, /* pc_relative */
306 0, /* bitpos */
307 complain_overflow_signed, /* complain_on_overflow */
308 bfd_elf_generic_reloc, /* special_function */
309 "R_PPC_ADDR14", /* name */
310 FALSE, /* partial_inplace */
311 0, /* src_mask */
312 0xfffc, /* dst_mask */
313 FALSE), /* pcrel_offset */
314
315 /* An absolute 16 bit branch, for which bit 10 should be set to
316 indicate that the branch is expected to be taken. The lower two
317 bits must be zero. */
318 HOWTO (R_PPC_ADDR14_BRTAKEN, /* type */
319 0, /* rightshift */
320 2, /* size (0 = byte, 1 = short, 2 = long) */
321 16, /* bitsize */
322 FALSE, /* pc_relative */
323 0, /* bitpos */
324 complain_overflow_signed, /* complain_on_overflow */
325 bfd_elf_generic_reloc, /* special_function */
326 "R_PPC_ADDR14_BRTAKEN",/* name */
327 FALSE, /* partial_inplace */
328 0, /* src_mask */
329 0xfffc, /* dst_mask */
330 FALSE), /* pcrel_offset */
331
332 /* An absolute 16 bit branch, for which bit 10 should be set to
333 indicate that the branch is not expected to be taken. The lower
334 two bits must be zero. */
335 HOWTO (R_PPC_ADDR14_BRNTAKEN, /* type */
336 0, /* rightshift */
337 2, /* size (0 = byte, 1 = short, 2 = long) */
338 16, /* bitsize */
339 FALSE, /* pc_relative */
340 0, /* bitpos */
341 complain_overflow_signed, /* complain_on_overflow */
342 bfd_elf_generic_reloc, /* special_function */
343 "R_PPC_ADDR14_BRNTAKEN",/* name */
344 FALSE, /* partial_inplace */
345 0, /* src_mask */
346 0xfffc, /* dst_mask */
347 FALSE), /* pcrel_offset */
348
349 /* A relative 26 bit branch; the lower two bits must be zero. */
350 HOWTO (R_PPC_REL24, /* type */
351 0, /* rightshift */
352 2, /* size (0 = byte, 1 = short, 2 = long) */
353 26, /* bitsize */
354 TRUE, /* pc_relative */
355 0, /* bitpos */
356 complain_overflow_signed, /* complain_on_overflow */
357 bfd_elf_generic_reloc, /* special_function */
358 "R_PPC_REL24", /* name */
359 FALSE, /* partial_inplace */
360 0, /* src_mask */
361 0x3fffffc, /* dst_mask */
362 TRUE), /* pcrel_offset */
363
364 /* A relative 16 bit branch; the lower two bits must be zero. */
365 HOWTO (R_PPC_REL14, /* type */
366 0, /* rightshift */
367 2, /* size (0 = byte, 1 = short, 2 = long) */
368 16, /* bitsize */
369 TRUE, /* pc_relative */
370 0, /* bitpos */
371 complain_overflow_signed, /* complain_on_overflow */
372 bfd_elf_generic_reloc, /* special_function */
373 "R_PPC_REL14", /* name */
374 FALSE, /* partial_inplace */
375 0, /* src_mask */
376 0xfffc, /* dst_mask */
377 TRUE), /* pcrel_offset */
378
379 /* A relative 16 bit branch. Bit 10 should be set to indicate that
380 the branch is expected to be taken. The lower two bits must be
381 zero. */
382 HOWTO (R_PPC_REL14_BRTAKEN, /* type */
383 0, /* rightshift */
384 2, /* size (0 = byte, 1 = short, 2 = long) */
385 16, /* bitsize */
386 TRUE, /* pc_relative */
387 0, /* bitpos */
388 complain_overflow_signed, /* complain_on_overflow */
389 bfd_elf_generic_reloc, /* special_function */
390 "R_PPC_REL14_BRTAKEN", /* name */
391 FALSE, /* partial_inplace */
392 0, /* src_mask */
393 0xfffc, /* dst_mask */
394 TRUE), /* pcrel_offset */
395
396 /* A relative 16 bit branch. Bit 10 should be set to indicate that
397 the branch is not expected to be taken. The lower two bits must
398 be zero. */
399 HOWTO (R_PPC_REL14_BRNTAKEN, /* type */
400 0, /* rightshift */
401 2, /* size (0 = byte, 1 = short, 2 = long) */
402 16, /* bitsize */
403 TRUE, /* pc_relative */
404 0, /* bitpos */
405 complain_overflow_signed, /* complain_on_overflow */
406 bfd_elf_generic_reloc, /* special_function */
407 "R_PPC_REL14_BRNTAKEN",/* name */
408 FALSE, /* partial_inplace */
409 0, /* src_mask */
410 0xfffc, /* dst_mask */
411 TRUE), /* pcrel_offset */
412
413 /* Like R_PPC_ADDR16, but referring to the GOT table entry for the
414 symbol. */
415 HOWTO (R_PPC_GOT16, /* type */
416 0, /* rightshift */
417 1, /* size (0 = byte, 1 = short, 2 = long) */
418 16, /* bitsize */
419 FALSE, /* pc_relative */
420 0, /* bitpos */
421 complain_overflow_signed, /* complain_on_overflow */
422 ppc_elf_unhandled_reloc, /* special_function */
423 "R_PPC_GOT16", /* name */
424 FALSE, /* partial_inplace */
425 0, /* src_mask */
426 0xffff, /* dst_mask */
427 FALSE), /* pcrel_offset */
428
429 /* Like R_PPC_ADDR16_LO, but referring to the GOT table entry for
430 the symbol. */
431 HOWTO (R_PPC_GOT16_LO, /* type */
432 0, /* rightshift */
433 1, /* size (0 = byte, 1 = short, 2 = long) */
434 16, /* bitsize */
435 FALSE, /* pc_relative */
436 0, /* bitpos */
437 complain_overflow_dont, /* complain_on_overflow */
438 ppc_elf_unhandled_reloc, /* special_function */
439 "R_PPC_GOT16_LO", /* name */
440 FALSE, /* partial_inplace */
441 0, /* src_mask */
442 0xffff, /* dst_mask */
443 FALSE), /* pcrel_offset */
444
445 /* Like R_PPC_ADDR16_HI, but referring to the GOT table entry for
446 the symbol. */
447 HOWTO (R_PPC_GOT16_HI, /* type */
448 16, /* rightshift */
449 1, /* size (0 = byte, 1 = short, 2 = long) */
450 16, /* bitsize */
451 FALSE, /* pc_relative */
452 0, /* bitpos */
453 complain_overflow_dont, /* complain_on_overflow */
454 ppc_elf_unhandled_reloc, /* special_function */
455 "R_PPC_GOT16_HI", /* name */
456 FALSE, /* partial_inplace */
457 0, /* src_mask */
458 0xffff, /* dst_mask */
459 FALSE), /* pcrel_offset */
460
461 /* Like R_PPC_ADDR16_HA, but referring to the GOT table entry for
462 the symbol. */
463 HOWTO (R_PPC_GOT16_HA, /* type */
464 16, /* rightshift */
465 1, /* size (0 = byte, 1 = short, 2 = long) */
466 16, /* bitsize */
467 FALSE, /* pc_relative */
468 0, /* bitpos */
469 complain_overflow_dont, /* complain_on_overflow */
470 ppc_elf_unhandled_reloc, /* special_function */
471 "R_PPC_GOT16_HA", /* name */
472 FALSE, /* partial_inplace */
473 0, /* src_mask */
474 0xffff, /* dst_mask */
475 FALSE), /* pcrel_offset */
476
477 /* Like R_PPC_REL24, but referring to the procedure linkage table
478 entry for the symbol. */
479 HOWTO (R_PPC_PLTREL24, /* type */
480 0, /* rightshift */
481 2, /* size (0 = byte, 1 = short, 2 = long) */
482 26, /* bitsize */
483 TRUE, /* pc_relative */
484 0, /* bitpos */
485 complain_overflow_signed, /* complain_on_overflow */
486 ppc_elf_unhandled_reloc, /* special_function */
487 "R_PPC_PLTREL24", /* name */
488 FALSE, /* partial_inplace */
489 0, /* src_mask */
490 0x3fffffc, /* dst_mask */
491 TRUE), /* pcrel_offset */
492
493 /* This is used only by the dynamic linker. The symbol should exist
494 both in the object being run and in some shared library. The
495 dynamic linker copies the data addressed by the symbol from the
496 shared library into the object, because the object being
497 run has to have the data at some particular address. */
498 HOWTO (R_PPC_COPY, /* type */
499 0, /* rightshift */
500 2, /* size (0 = byte, 1 = short, 2 = long) */
501 32, /* bitsize */
502 FALSE, /* pc_relative */
503 0, /* bitpos */
504 complain_overflow_dont, /* complain_on_overflow */
505 ppc_elf_unhandled_reloc, /* special_function */
506 "R_PPC_COPY", /* name */
507 FALSE, /* partial_inplace */
508 0, /* src_mask */
509 0, /* dst_mask */
510 FALSE), /* pcrel_offset */
511
512 /* Like R_PPC_ADDR32, but used when setting global offset table
513 entries. */
514 HOWTO (R_PPC_GLOB_DAT, /* type */
515 0, /* rightshift */
516 2, /* size (0 = byte, 1 = short, 2 = long) */
517 32, /* bitsize */
518 FALSE, /* pc_relative */
519 0, /* bitpos */
520 complain_overflow_dont, /* complain_on_overflow */
521 ppc_elf_unhandled_reloc, /* special_function */
522 "R_PPC_GLOB_DAT", /* name */
523 FALSE, /* partial_inplace */
524 0, /* src_mask */
525 0xffffffff, /* dst_mask */
526 FALSE), /* pcrel_offset */
527
528 /* Marks a procedure linkage table entry for a symbol. */
529 HOWTO (R_PPC_JMP_SLOT, /* type */
530 0, /* rightshift */
531 2, /* size (0 = byte, 1 = short, 2 = long) */
532 32, /* bitsize */
533 FALSE, /* pc_relative */
534 0, /* bitpos */
535 complain_overflow_dont, /* complain_on_overflow */
536 ppc_elf_unhandled_reloc, /* special_function */
537 "R_PPC_JMP_SLOT", /* name */
538 FALSE, /* partial_inplace */
539 0, /* src_mask */
540 0, /* dst_mask */
541 FALSE), /* pcrel_offset */
542
543 /* Used only by the dynamic linker. When the object is run, this
544 longword is set to the load address of the object, plus the
545 addend. */
546 HOWTO (R_PPC_RELATIVE, /* type */
547 0, /* rightshift */
548 2, /* size (0 = byte, 1 = short, 2 = long) */
549 32, /* bitsize */
550 FALSE, /* pc_relative */
551 0, /* bitpos */
552 complain_overflow_dont, /* complain_on_overflow */
553 bfd_elf_generic_reloc, /* special_function */
554 "R_PPC_RELATIVE", /* name */
555 FALSE, /* partial_inplace */
556 0, /* src_mask */
557 0xffffffff, /* dst_mask */
558 FALSE), /* pcrel_offset */
559
560 /* Like R_PPC_REL24, but uses the value of the symbol within the
561 object rather than the final value. Normally used for
562 _GLOBAL_OFFSET_TABLE_. */
563 HOWTO (R_PPC_LOCAL24PC, /* type */
564 0, /* rightshift */
565 2, /* size (0 = byte, 1 = short, 2 = long) */
566 26, /* bitsize */
567 TRUE, /* pc_relative */
568 0, /* bitpos */
569 complain_overflow_signed, /* complain_on_overflow */
570 bfd_elf_generic_reloc, /* special_function */
571 "R_PPC_LOCAL24PC", /* name */
572 FALSE, /* partial_inplace */
573 0, /* src_mask */
574 0x3fffffc, /* dst_mask */
575 TRUE), /* pcrel_offset */
576
577 /* Like R_PPC_ADDR32, but may be unaligned. */
578 HOWTO (R_PPC_UADDR32, /* type */
579 0, /* rightshift */
580 2, /* size (0 = byte, 1 = short, 2 = long) */
581 32, /* bitsize */
582 FALSE, /* pc_relative */
583 0, /* bitpos */
584 complain_overflow_dont, /* complain_on_overflow */
585 bfd_elf_generic_reloc, /* special_function */
586 "R_PPC_UADDR32", /* name */
587 FALSE, /* partial_inplace */
588 0, /* src_mask */
589 0xffffffff, /* dst_mask */
590 FALSE), /* pcrel_offset */
591
592 /* Like R_PPC_ADDR16, but may be unaligned. */
593 HOWTO (R_PPC_UADDR16, /* type */
594 0, /* rightshift */
595 1, /* size (0 = byte, 1 = short, 2 = long) */
596 16, /* bitsize */
597 FALSE, /* pc_relative */
598 0, /* bitpos */
599 complain_overflow_bitfield, /* complain_on_overflow */
600 bfd_elf_generic_reloc, /* special_function */
601 "R_PPC_UADDR16", /* name */
602 FALSE, /* partial_inplace */
603 0, /* src_mask */
604 0xffff, /* dst_mask */
605 FALSE), /* pcrel_offset */
606
607 /* 32-bit PC relative */
608 HOWTO (R_PPC_REL32, /* type */
609 0, /* rightshift */
610 2, /* size (0 = byte, 1 = short, 2 = long) */
611 32, /* bitsize */
612 TRUE, /* pc_relative */
613 0, /* bitpos */
614 complain_overflow_dont, /* complain_on_overflow */
615 bfd_elf_generic_reloc, /* special_function */
616 "R_PPC_REL32", /* name */
617 FALSE, /* partial_inplace */
618 0, /* src_mask */
619 0xffffffff, /* dst_mask */
620 TRUE), /* pcrel_offset */
621
622 /* 32-bit relocation to the symbol's procedure linkage table.
623 FIXME: not supported. */
624 HOWTO (R_PPC_PLT32, /* type */
625 0, /* rightshift */
626 2, /* size (0 = byte, 1 = short, 2 = long) */
627 32, /* bitsize */
628 FALSE, /* pc_relative */
629 0, /* bitpos */
630 complain_overflow_dont, /* complain_on_overflow */
631 ppc_elf_unhandled_reloc, /* special_function */
632 "R_PPC_PLT32", /* name */
633 FALSE, /* partial_inplace */
634 0, /* src_mask */
635 0, /* dst_mask */
636 FALSE), /* pcrel_offset */
637
638 /* 32-bit PC relative relocation to the symbol's procedure linkage table.
639 FIXME: not supported. */
640 HOWTO (R_PPC_PLTREL32, /* type */
641 0, /* rightshift */
642 2, /* size (0 = byte, 1 = short, 2 = long) */
643 32, /* bitsize */
644 TRUE, /* pc_relative */
645 0, /* bitpos */
646 complain_overflow_dont, /* complain_on_overflow */
647 ppc_elf_unhandled_reloc, /* special_function */
648 "R_PPC_PLTREL32", /* name */
649 FALSE, /* partial_inplace */
650 0, /* src_mask */
651 0, /* dst_mask */
652 TRUE), /* pcrel_offset */
653
654 /* Like R_PPC_ADDR16_LO, but referring to the PLT table entry for
655 the symbol. */
656 HOWTO (R_PPC_PLT16_LO, /* type */
657 0, /* rightshift */
658 1, /* size (0 = byte, 1 = short, 2 = long) */
659 16, /* bitsize */
660 FALSE, /* pc_relative */
661 0, /* bitpos */
662 complain_overflow_dont, /* complain_on_overflow */
663 ppc_elf_unhandled_reloc, /* special_function */
664 "R_PPC_PLT16_LO", /* name */
665 FALSE, /* partial_inplace */
666 0, /* src_mask */
667 0xffff, /* dst_mask */
668 FALSE), /* pcrel_offset */
669
670 /* Like R_PPC_ADDR16_HI, but referring to the PLT table entry for
671 the symbol. */
672 HOWTO (R_PPC_PLT16_HI, /* type */
673 16, /* rightshift */
674 1, /* size (0 = byte, 1 = short, 2 = long) */
675 16, /* bitsize */
676 FALSE, /* pc_relative */
677 0, /* bitpos */
678 complain_overflow_dont, /* complain_on_overflow */
679 ppc_elf_unhandled_reloc, /* special_function */
680 "R_PPC_PLT16_HI", /* name */
681 FALSE, /* partial_inplace */
682 0, /* src_mask */
683 0xffff, /* dst_mask */
684 FALSE), /* pcrel_offset */
685
686 /* Like R_PPC_ADDR16_HA, but referring to the PLT table entry for
687 the symbol. */
688 HOWTO (R_PPC_PLT16_HA, /* type */
689 16, /* rightshift */
690 1, /* size (0 = byte, 1 = short, 2 = long) */
691 16, /* bitsize */
692 FALSE, /* pc_relative */
693 0, /* bitpos */
694 complain_overflow_dont, /* complain_on_overflow */
695 ppc_elf_unhandled_reloc, /* special_function */
696 "R_PPC_PLT16_HA", /* name */
697 FALSE, /* partial_inplace */
698 0, /* src_mask */
699 0xffff, /* dst_mask */
700 FALSE), /* pcrel_offset */
701
702 /* A sign-extended 16 bit value relative to _SDA_BASE_, for use with
703 small data items. */
704 HOWTO (R_PPC_SDAREL16, /* type */
705 0, /* rightshift */
706 1, /* size (0 = byte, 1 = short, 2 = long) */
707 16, /* bitsize */
708 FALSE, /* pc_relative */
709 0, /* bitpos */
710 complain_overflow_signed, /* complain_on_overflow */
711 ppc_elf_unhandled_reloc, /* special_function */
712 "R_PPC_SDAREL16", /* name */
713 FALSE, /* partial_inplace */
714 0, /* src_mask */
715 0xffff, /* dst_mask */
716 FALSE), /* pcrel_offset */
717
718 /* 16-bit section relative relocation. */
719 HOWTO (R_PPC_SECTOFF, /* type */
720 0, /* rightshift */
721 1, /* size (0 = byte, 1 = short, 2 = long) */
722 16, /* bitsize */
723 FALSE, /* pc_relative */
724 0, /* bitpos */
725 complain_overflow_signed, /* complain_on_overflow */
726 ppc_elf_unhandled_reloc, /* special_function */
727 "R_PPC_SECTOFF", /* name */
728 FALSE, /* partial_inplace */
729 0, /* src_mask */
730 0xffff, /* dst_mask */
731 FALSE), /* pcrel_offset */
732
733 /* 16-bit lower half section relative relocation. */
734 HOWTO (R_PPC_SECTOFF_LO, /* type */
735 0, /* rightshift */
736 1, /* size (0 = byte, 1 = short, 2 = long) */
737 16, /* bitsize */
738 FALSE, /* pc_relative */
739 0, /* bitpos */
740 complain_overflow_dont, /* complain_on_overflow */
741 ppc_elf_unhandled_reloc, /* special_function */
742 "R_PPC_SECTOFF_LO", /* name */
743 FALSE, /* partial_inplace */
744 0, /* src_mask */
745 0xffff, /* dst_mask */
746 FALSE), /* pcrel_offset */
747
748 /* 16-bit upper half section relative relocation. */
749 HOWTO (R_PPC_SECTOFF_HI, /* type */
750 16, /* rightshift */
751 1, /* size (0 = byte, 1 = short, 2 = long) */
752 16, /* bitsize */
753 FALSE, /* pc_relative */
754 0, /* bitpos */
755 complain_overflow_dont, /* complain_on_overflow */
756 ppc_elf_unhandled_reloc, /* special_function */
757 "R_PPC_SECTOFF_HI", /* name */
758 FALSE, /* partial_inplace */
759 0, /* src_mask */
760 0xffff, /* dst_mask */
761 FALSE), /* pcrel_offset */
762
763 /* 16-bit upper half adjusted section relative relocation. */
764 HOWTO (R_PPC_SECTOFF_HA, /* type */
765 16, /* rightshift */
766 1, /* size (0 = byte, 1 = short, 2 = long) */
767 16, /* bitsize */
768 FALSE, /* pc_relative */
769 0, /* bitpos */
770 complain_overflow_dont, /* complain_on_overflow */
771 ppc_elf_unhandled_reloc, /* special_function */
772 "R_PPC_SECTOFF_HA", /* name */
773 FALSE, /* partial_inplace */
774 0, /* src_mask */
775 0xffff, /* dst_mask */
776 FALSE), /* pcrel_offset */
777
778 /* Marker relocs for TLS. */
779 HOWTO (R_PPC_TLS,
780 0, /* rightshift */
781 2, /* size (0 = byte, 1 = short, 2 = long) */
782 32, /* bitsize */
783 FALSE, /* pc_relative */
784 0, /* bitpos */
785 complain_overflow_dont, /* complain_on_overflow */
786 bfd_elf_generic_reloc, /* special_function */
787 "R_PPC_TLS", /* name */
788 FALSE, /* partial_inplace */
789 0, /* src_mask */
790 0, /* dst_mask */
791 FALSE), /* pcrel_offset */
792
793 HOWTO (R_PPC_TLSGD,
794 0, /* rightshift */
795 2, /* size (0 = byte, 1 = short, 2 = long) */
796 32, /* bitsize */
797 FALSE, /* pc_relative */
798 0, /* bitpos */
799 complain_overflow_dont, /* complain_on_overflow */
800 bfd_elf_generic_reloc, /* special_function */
801 "R_PPC_TLSGD", /* name */
802 FALSE, /* partial_inplace */
803 0, /* src_mask */
804 0, /* dst_mask */
805 FALSE), /* pcrel_offset */
806
807 HOWTO (R_PPC_TLSLD,
808 0, /* rightshift */
809 2, /* size (0 = byte, 1 = short, 2 = long) */
810 32, /* bitsize */
811 FALSE, /* pc_relative */
812 0, /* bitpos */
813 complain_overflow_dont, /* complain_on_overflow */
814 bfd_elf_generic_reloc, /* special_function */
815 "R_PPC_TLSLD", /* name */
816 FALSE, /* partial_inplace */
817 0, /* src_mask */
818 0, /* dst_mask */
819 FALSE), /* pcrel_offset */
820
821 /* Computes the load module index of the load module that contains the
822 definition of its TLS sym. */
823 HOWTO (R_PPC_DTPMOD32,
824 0, /* rightshift */
825 2, /* size (0 = byte, 1 = short, 2 = long) */
826 32, /* bitsize */
827 FALSE, /* pc_relative */
828 0, /* bitpos */
829 complain_overflow_dont, /* complain_on_overflow */
830 ppc_elf_unhandled_reloc, /* special_function */
831 "R_PPC_DTPMOD32", /* name */
832 FALSE, /* partial_inplace */
833 0, /* src_mask */
834 0xffffffff, /* dst_mask */
835 FALSE), /* pcrel_offset */
836
837 /* Computes a dtv-relative displacement, the difference between the value
838 of sym+add and the base address of the thread-local storage block that
839 contains the definition of sym, minus 0x8000. */
840 HOWTO (R_PPC_DTPREL32,
841 0, /* rightshift */
842 2, /* size (0 = byte, 1 = short, 2 = long) */
843 32, /* bitsize */
844 FALSE, /* pc_relative */
845 0, /* bitpos */
846 complain_overflow_dont, /* complain_on_overflow */
847 ppc_elf_unhandled_reloc, /* special_function */
848 "R_PPC_DTPREL32", /* name */
849 FALSE, /* partial_inplace */
850 0, /* src_mask */
851 0xffffffff, /* dst_mask */
852 FALSE), /* pcrel_offset */
853
854 /* A 16 bit dtprel reloc. */
855 HOWTO (R_PPC_DTPREL16,
856 0, /* rightshift */
857 1, /* size (0 = byte, 1 = short, 2 = long) */
858 16, /* bitsize */
859 FALSE, /* pc_relative */
860 0, /* bitpos */
861 complain_overflow_signed, /* complain_on_overflow */
862 ppc_elf_unhandled_reloc, /* special_function */
863 "R_PPC_DTPREL16", /* name */
864 FALSE, /* partial_inplace */
865 0, /* src_mask */
866 0xffff, /* dst_mask */
867 FALSE), /* pcrel_offset */
868
869 /* Like DTPREL16, but no overflow. */
870 HOWTO (R_PPC_DTPREL16_LO,
871 0, /* rightshift */
872 1, /* size (0 = byte, 1 = short, 2 = long) */
873 16, /* bitsize */
874 FALSE, /* pc_relative */
875 0, /* bitpos */
876 complain_overflow_dont, /* complain_on_overflow */
877 ppc_elf_unhandled_reloc, /* special_function */
878 "R_PPC_DTPREL16_LO", /* name */
879 FALSE, /* partial_inplace */
880 0, /* src_mask */
881 0xffff, /* dst_mask */
882 FALSE), /* pcrel_offset */
883
884 /* Like DTPREL16_LO, but next higher group of 16 bits. */
885 HOWTO (R_PPC_DTPREL16_HI,
886 16, /* rightshift */
887 1, /* size (0 = byte, 1 = short, 2 = long) */
888 16, /* bitsize */
889 FALSE, /* pc_relative */
890 0, /* bitpos */
891 complain_overflow_dont, /* complain_on_overflow */
892 ppc_elf_unhandled_reloc, /* special_function */
893 "R_PPC_DTPREL16_HI", /* name */
894 FALSE, /* partial_inplace */
895 0, /* src_mask */
896 0xffff, /* dst_mask */
897 FALSE), /* pcrel_offset */
898
899 /* Like DTPREL16_HI, but adjust for low 16 bits. */
900 HOWTO (R_PPC_DTPREL16_HA,
901 16, /* rightshift */
902 1, /* size (0 = byte, 1 = short, 2 = long) */
903 16, /* bitsize */
904 FALSE, /* pc_relative */
905 0, /* bitpos */
906 complain_overflow_dont, /* complain_on_overflow */
907 ppc_elf_unhandled_reloc, /* special_function */
908 "R_PPC_DTPREL16_HA", /* name */
909 FALSE, /* partial_inplace */
910 0, /* src_mask */
911 0xffff, /* dst_mask */
912 FALSE), /* pcrel_offset */
913
914 /* Computes a tp-relative displacement, the difference between the value of
915 sym+add and the value of the thread pointer (r13). */
916 HOWTO (R_PPC_TPREL32,
917 0, /* rightshift */
918 2, /* size (0 = byte, 1 = short, 2 = long) */
919 32, /* bitsize */
920 FALSE, /* pc_relative */
921 0, /* bitpos */
922 complain_overflow_dont, /* complain_on_overflow */
923 ppc_elf_unhandled_reloc, /* special_function */
924 "R_PPC_TPREL32", /* name */
925 FALSE, /* partial_inplace */
926 0, /* src_mask */
927 0xffffffff, /* dst_mask */
928 FALSE), /* pcrel_offset */
929
930 /* A 16 bit tprel reloc. */
931 HOWTO (R_PPC_TPREL16,
932 0, /* rightshift */
933 1, /* size (0 = byte, 1 = short, 2 = long) */
934 16, /* bitsize */
935 FALSE, /* pc_relative */
936 0, /* bitpos */
937 complain_overflow_signed, /* complain_on_overflow */
938 ppc_elf_unhandled_reloc, /* special_function */
939 "R_PPC_TPREL16", /* name */
940 FALSE, /* partial_inplace */
941 0, /* src_mask */
942 0xffff, /* dst_mask */
943 FALSE), /* pcrel_offset */
944
945 /* Like TPREL16, but no overflow. */
946 HOWTO (R_PPC_TPREL16_LO,
947 0, /* rightshift */
948 1, /* size (0 = byte, 1 = short, 2 = long) */
949 16, /* bitsize */
950 FALSE, /* pc_relative */
951 0, /* bitpos */
952 complain_overflow_dont, /* complain_on_overflow */
953 ppc_elf_unhandled_reloc, /* special_function */
954 "R_PPC_TPREL16_LO", /* name */
955 FALSE, /* partial_inplace */
956 0, /* src_mask */
957 0xffff, /* dst_mask */
958 FALSE), /* pcrel_offset */
959
960 /* Like TPREL16_LO, but next higher group of 16 bits. */
961 HOWTO (R_PPC_TPREL16_HI,
962 16, /* rightshift */
963 1, /* size (0 = byte, 1 = short, 2 = long) */
964 16, /* bitsize */
965 FALSE, /* pc_relative */
966 0, /* bitpos */
967 complain_overflow_dont, /* complain_on_overflow */
968 ppc_elf_unhandled_reloc, /* special_function */
969 "R_PPC_TPREL16_HI", /* name */
970 FALSE, /* partial_inplace */
971 0, /* src_mask */
972 0xffff, /* dst_mask */
973 FALSE), /* pcrel_offset */
974
975 /* Like TPREL16_HI, but adjust for low 16 bits. */
976 HOWTO (R_PPC_TPREL16_HA,
977 16, /* rightshift */
978 1, /* size (0 = byte, 1 = short, 2 = long) */
979 16, /* bitsize */
980 FALSE, /* pc_relative */
981 0, /* bitpos */
982 complain_overflow_dont, /* complain_on_overflow */
983 ppc_elf_unhandled_reloc, /* special_function */
984 "R_PPC_TPREL16_HA", /* name */
985 FALSE, /* partial_inplace */
986 0, /* src_mask */
987 0xffff, /* dst_mask */
988 FALSE), /* pcrel_offset */
989
990 /* Allocates two contiguous entries in the GOT to hold a tls_index structure,
991 with values (sym+add)@dtpmod and (sym+add)@dtprel, and computes the offset
992 to the first entry. */
993 HOWTO (R_PPC_GOT_TLSGD16,
994 0, /* rightshift */
995 1, /* size (0 = byte, 1 = short, 2 = long) */
996 16, /* bitsize */
997 FALSE, /* pc_relative */
998 0, /* bitpos */
999 complain_overflow_signed, /* complain_on_overflow */
1000 ppc_elf_unhandled_reloc, /* special_function */
1001 "R_PPC_GOT_TLSGD16", /* name */
1002 FALSE, /* partial_inplace */
1003 0, /* src_mask */
1004 0xffff, /* dst_mask */
1005 FALSE), /* pcrel_offset */
1006
1007 /* Like GOT_TLSGD16, but no overflow. */
1008 HOWTO (R_PPC_GOT_TLSGD16_LO,
1009 0, /* rightshift */
1010 1, /* size (0 = byte, 1 = short, 2 = long) */
1011 16, /* bitsize */
1012 FALSE, /* pc_relative */
1013 0, /* bitpos */
1014 complain_overflow_dont, /* complain_on_overflow */
1015 ppc_elf_unhandled_reloc, /* special_function */
1016 "R_PPC_GOT_TLSGD16_LO", /* name */
1017 FALSE, /* partial_inplace */
1018 0, /* src_mask */
1019 0xffff, /* dst_mask */
1020 FALSE), /* pcrel_offset */
1021
1022 /* Like GOT_TLSGD16_LO, but next higher group of 16 bits. */
1023 HOWTO (R_PPC_GOT_TLSGD16_HI,
1024 16, /* rightshift */
1025 1, /* size (0 = byte, 1 = short, 2 = long) */
1026 16, /* bitsize */
1027 FALSE, /* pc_relative */
1028 0, /* bitpos */
1029 complain_overflow_dont, /* complain_on_overflow */
1030 ppc_elf_unhandled_reloc, /* special_function */
1031 "R_PPC_GOT_TLSGD16_HI", /* name */
1032 FALSE, /* partial_inplace */
1033 0, /* src_mask */
1034 0xffff, /* dst_mask */
1035 FALSE), /* pcrel_offset */
1036
1037 /* Like GOT_TLSGD16_HI, but adjust for low 16 bits. */
1038 HOWTO (R_PPC_GOT_TLSGD16_HA,
1039 16, /* rightshift */
1040 1, /* size (0 = byte, 1 = short, 2 = long) */
1041 16, /* bitsize */
1042 FALSE, /* pc_relative */
1043 0, /* bitpos */
1044 complain_overflow_dont, /* complain_on_overflow */
1045 ppc_elf_unhandled_reloc, /* special_function */
1046 "R_PPC_GOT_TLSGD16_HA", /* name */
1047 FALSE, /* partial_inplace */
1048 0, /* src_mask */
1049 0xffff, /* dst_mask */
1050 FALSE), /* pcrel_offset */
1051
1052 /* Allocates two contiguous entries in the GOT to hold a tls_index structure,
1053 with values (sym+add)@dtpmod and zero, and computes the offset to the
1054 first entry. */
1055 HOWTO (R_PPC_GOT_TLSLD16,
1056 0, /* rightshift */
1057 1, /* size (0 = byte, 1 = short, 2 = long) */
1058 16, /* bitsize */
1059 FALSE, /* pc_relative */
1060 0, /* bitpos */
1061 complain_overflow_signed, /* complain_on_overflow */
1062 ppc_elf_unhandled_reloc, /* special_function */
1063 "R_PPC_GOT_TLSLD16", /* name */
1064 FALSE, /* partial_inplace */
1065 0, /* src_mask */
1066 0xffff, /* dst_mask */
1067 FALSE), /* pcrel_offset */
1068
1069 /* Like GOT_TLSLD16, but no overflow. */
1070 HOWTO (R_PPC_GOT_TLSLD16_LO,
1071 0, /* rightshift */
1072 1, /* size (0 = byte, 1 = short, 2 = long) */
1073 16, /* bitsize */
1074 FALSE, /* pc_relative */
1075 0, /* bitpos */
1076 complain_overflow_dont, /* complain_on_overflow */
1077 ppc_elf_unhandled_reloc, /* special_function */
1078 "R_PPC_GOT_TLSLD16_LO", /* name */
1079 FALSE, /* partial_inplace */
1080 0, /* src_mask */
1081 0xffff, /* dst_mask */
1082 FALSE), /* pcrel_offset */
1083
1084 /* Like GOT_TLSLD16_LO, but next higher group of 16 bits. */
1085 HOWTO (R_PPC_GOT_TLSLD16_HI,
1086 16, /* rightshift */
1087 1, /* size (0 = byte, 1 = short, 2 = long) */
1088 16, /* bitsize */
1089 FALSE, /* pc_relative */
1090 0, /* bitpos */
1091 complain_overflow_dont, /* complain_on_overflow */
1092 ppc_elf_unhandled_reloc, /* special_function */
1093 "R_PPC_GOT_TLSLD16_HI", /* name */
1094 FALSE, /* partial_inplace */
1095 0, /* src_mask */
1096 0xffff, /* dst_mask */
1097 FALSE), /* pcrel_offset */
1098
1099 /* Like GOT_TLSLD16_HI, but adjust for low 16 bits. */
1100 HOWTO (R_PPC_GOT_TLSLD16_HA,
1101 16, /* rightshift */
1102 1, /* size (0 = byte, 1 = short, 2 = long) */
1103 16, /* bitsize */
1104 FALSE, /* pc_relative */
1105 0, /* bitpos */
1106 complain_overflow_dont, /* complain_on_overflow */
1107 ppc_elf_unhandled_reloc, /* special_function */
1108 "R_PPC_GOT_TLSLD16_HA", /* name */
1109 FALSE, /* partial_inplace */
1110 0, /* src_mask */
1111 0xffff, /* dst_mask */
1112 FALSE), /* pcrel_offset */
1113
1114 /* Allocates an entry in the GOT with value (sym+add)@dtprel, and computes
1115 the offset to the entry. */
1116 HOWTO (R_PPC_GOT_DTPREL16,
1117 0, /* rightshift */
1118 1, /* size (0 = byte, 1 = short, 2 = long) */
1119 16, /* bitsize */
1120 FALSE, /* pc_relative */
1121 0, /* bitpos */
1122 complain_overflow_signed, /* complain_on_overflow */
1123 ppc_elf_unhandled_reloc, /* special_function */
1124 "R_PPC_GOT_DTPREL16", /* name */
1125 FALSE, /* partial_inplace */
1126 0, /* src_mask */
1127 0xffff, /* dst_mask */
1128 FALSE), /* pcrel_offset */
1129
1130 /* Like GOT_DTPREL16, but no overflow. */
1131 HOWTO (R_PPC_GOT_DTPREL16_LO,
1132 0, /* rightshift */
1133 1, /* size (0 = byte, 1 = short, 2 = long) */
1134 16, /* bitsize */
1135 FALSE, /* pc_relative */
1136 0, /* bitpos */
1137 complain_overflow_dont, /* complain_on_overflow */
1138 ppc_elf_unhandled_reloc, /* special_function */
1139 "R_PPC_GOT_DTPREL16_LO", /* name */
1140 FALSE, /* partial_inplace */
1141 0, /* src_mask */
1142 0xffff, /* dst_mask */
1143 FALSE), /* pcrel_offset */
1144
1145 /* Like GOT_DTPREL16_LO, but next higher group of 16 bits. */
1146 HOWTO (R_PPC_GOT_DTPREL16_HI,
1147 16, /* rightshift */
1148 1, /* size (0 = byte, 1 = short, 2 = long) */
1149 16, /* bitsize */
1150 FALSE, /* pc_relative */
1151 0, /* bitpos */
1152 complain_overflow_dont, /* complain_on_overflow */
1153 ppc_elf_unhandled_reloc, /* special_function */
1154 "R_PPC_GOT_DTPREL16_HI", /* name */
1155 FALSE, /* partial_inplace */
1156 0, /* src_mask */
1157 0xffff, /* dst_mask */
1158 FALSE), /* pcrel_offset */
1159
1160 /* Like GOT_DTPREL16_HI, but adjust for low 16 bits. */
1161 HOWTO (R_PPC_GOT_DTPREL16_HA,
1162 16, /* rightshift */
1163 1, /* size (0 = byte, 1 = short, 2 = long) */
1164 16, /* bitsize */
1165 FALSE, /* pc_relative */
1166 0, /* bitpos */
1167 complain_overflow_dont, /* complain_on_overflow */
1168 ppc_elf_unhandled_reloc, /* special_function */
1169 "R_PPC_GOT_DTPREL16_HA", /* name */
1170 FALSE, /* partial_inplace */
1171 0, /* src_mask */
1172 0xffff, /* dst_mask */
1173 FALSE), /* pcrel_offset */
1174
1175 /* Allocates an entry in the GOT with value (sym+add)@tprel, and computes the
1176 offset to the entry. */
1177 HOWTO (R_PPC_GOT_TPREL16,
1178 0, /* rightshift */
1179 1, /* size (0 = byte, 1 = short, 2 = long) */
1180 16, /* bitsize */
1181 FALSE, /* pc_relative */
1182 0, /* bitpos */
1183 complain_overflow_signed, /* complain_on_overflow */
1184 ppc_elf_unhandled_reloc, /* special_function */
1185 "R_PPC_GOT_TPREL16", /* name */
1186 FALSE, /* partial_inplace */
1187 0, /* src_mask */
1188 0xffff, /* dst_mask */
1189 FALSE), /* pcrel_offset */
1190
1191 /* Like GOT_TPREL16, but no overflow. */
1192 HOWTO (R_PPC_GOT_TPREL16_LO,
1193 0, /* rightshift */
1194 1, /* size (0 = byte, 1 = short, 2 = long) */
1195 16, /* bitsize */
1196 FALSE, /* pc_relative */
1197 0, /* bitpos */
1198 complain_overflow_dont, /* complain_on_overflow */
1199 ppc_elf_unhandled_reloc, /* special_function */
1200 "R_PPC_GOT_TPREL16_LO", /* name */
1201 FALSE, /* partial_inplace */
1202 0, /* src_mask */
1203 0xffff, /* dst_mask */
1204 FALSE), /* pcrel_offset */
1205
1206 /* Like GOT_TPREL16_LO, but next higher group of 16 bits. */
1207 HOWTO (R_PPC_GOT_TPREL16_HI,
1208 16, /* rightshift */
1209 1, /* size (0 = byte, 1 = short, 2 = long) */
1210 16, /* bitsize */
1211 FALSE, /* pc_relative */
1212 0, /* bitpos */
1213 complain_overflow_dont, /* complain_on_overflow */
1214 ppc_elf_unhandled_reloc, /* special_function */
1215 "R_PPC_GOT_TPREL16_HI", /* name */
1216 FALSE, /* partial_inplace */
1217 0, /* src_mask */
1218 0xffff, /* dst_mask */
1219 FALSE), /* pcrel_offset */
1220
1221 /* Like GOT_TPREL16_HI, but adjust for low 16 bits. */
1222 HOWTO (R_PPC_GOT_TPREL16_HA,
1223 16, /* rightshift */
1224 1, /* size (0 = byte, 1 = short, 2 = long) */
1225 16, /* bitsize */
1226 FALSE, /* pc_relative */
1227 0, /* bitpos */
1228 complain_overflow_dont, /* complain_on_overflow */
1229 ppc_elf_unhandled_reloc, /* special_function */
1230 "R_PPC_GOT_TPREL16_HA", /* name */
1231 FALSE, /* partial_inplace */
1232 0, /* src_mask */
1233 0xffff, /* dst_mask */
1234 FALSE), /* pcrel_offset */
1235
1236 /* The remaining relocs are from the Embedded ELF ABI, and are not
1237 in the SVR4 ELF ABI. */
1238
1239 /* 32 bit value resulting from the addend minus the symbol. */
1240 HOWTO (R_PPC_EMB_NADDR32, /* type */
1241 0, /* rightshift */
1242 2, /* size (0 = byte, 1 = short, 2 = long) */
1243 32, /* bitsize */
1244 FALSE, /* pc_relative */
1245 0, /* bitpos */
1246 complain_overflow_dont, /* complain_on_overflow */
1247 ppc_elf_unhandled_reloc, /* special_function */
1248 "R_PPC_EMB_NADDR32", /* name */
1249 FALSE, /* partial_inplace */
1250 0, /* src_mask */
1251 0xffffffff, /* dst_mask */
1252 FALSE), /* pcrel_offset */
1253
1254 /* 16 bit value resulting from the addend minus the symbol. */
1255 HOWTO (R_PPC_EMB_NADDR16, /* type */
1256 0, /* rightshift */
1257 1, /* size (0 = byte, 1 = short, 2 = long) */
1258 16, /* bitsize */
1259 FALSE, /* pc_relative */
1260 0, /* bitpos */
1261 complain_overflow_signed, /* complain_on_overflow */
1262 ppc_elf_unhandled_reloc, /* special_function */
1263 "R_PPC_EMB_NADDR16", /* name */
1264 FALSE, /* partial_inplace */
1265 0, /* src_mask */
1266 0xffff, /* dst_mask */
1267 FALSE), /* pcrel_offset */
1268
1269 /* 16 bit value resulting from the addend minus the symbol. */
1270 HOWTO (R_PPC_EMB_NADDR16_LO, /* type */
1271 0, /* rightshift */
1272 1, /* size (0 = byte, 1 = short, 2 = long) */
1273 16, /* bitsize */
1274 FALSE, /* pc_relative */
1275 0, /* bitpos */
1276 complain_overflow_dont,/* complain_on_overflow */
1277 ppc_elf_unhandled_reloc, /* special_function */
1278 "R_PPC_EMB_ADDR16_LO", /* name */
1279 FALSE, /* partial_inplace */
1280 0, /* src_mask */
1281 0xffff, /* dst_mask */
1282 FALSE), /* pcrel_offset */
1283
1284 /* The high order 16 bits of the addend minus the symbol. */
1285 HOWTO (R_PPC_EMB_NADDR16_HI, /* type */
1286 16, /* rightshift */
1287 1, /* size (0 = byte, 1 = short, 2 = long) */
1288 16, /* bitsize */
1289 FALSE, /* pc_relative */
1290 0, /* bitpos */
1291 complain_overflow_dont, /* complain_on_overflow */
1292 ppc_elf_unhandled_reloc, /* special_function */
1293 "R_PPC_EMB_NADDR16_HI", /* name */
1294 FALSE, /* partial_inplace */
1295 0, /* src_mask */
1296 0xffff, /* dst_mask */
1297 FALSE), /* pcrel_offset */
1298
1299 /* The high order 16 bits of the result of the addend minus the address,
1300 plus 1 if the contents of the low 16 bits, treated as a signed number,
1301 is negative. */
1302 HOWTO (R_PPC_EMB_NADDR16_HA, /* type */
1303 16, /* rightshift */
1304 1, /* size (0 = byte, 1 = short, 2 = long) */
1305 16, /* bitsize */
1306 FALSE, /* pc_relative */
1307 0, /* bitpos */
1308 complain_overflow_dont, /* complain_on_overflow */
1309 ppc_elf_unhandled_reloc, /* special_function */
1310 "R_PPC_EMB_NADDR16_HA", /* name */
1311 FALSE, /* partial_inplace */
1312 0, /* src_mask */
1313 0xffff, /* dst_mask */
1314 FALSE), /* pcrel_offset */
1315
1316 /* 16 bit value resulting from allocating a 4 byte word to hold an
1317 address in the .sdata section, and returning the offset from
1318 _SDA_BASE_ for that relocation. */
1319 HOWTO (R_PPC_EMB_SDAI16, /* type */
1320 0, /* rightshift */
1321 1, /* size (0 = byte, 1 = short, 2 = long) */
1322 16, /* bitsize */
1323 FALSE, /* pc_relative */
1324 0, /* bitpos */
1325 complain_overflow_signed, /* complain_on_overflow */
1326 ppc_elf_unhandled_reloc, /* special_function */
1327 "R_PPC_EMB_SDAI16", /* name */
1328 FALSE, /* partial_inplace */
1329 0, /* src_mask */
1330 0xffff, /* dst_mask */
1331 FALSE), /* pcrel_offset */
1332
1333 /* 16 bit value resulting from allocating a 4 byte word to hold an
1334 address in the .sdata2 section, and returning the offset from
1335 _SDA2_BASE_ for that relocation. */
1336 HOWTO (R_PPC_EMB_SDA2I16, /* type */
1337 0, /* rightshift */
1338 1, /* size (0 = byte, 1 = short, 2 = long) */
1339 16, /* bitsize */
1340 FALSE, /* pc_relative */
1341 0, /* bitpos */
1342 complain_overflow_signed, /* complain_on_overflow */
1343 ppc_elf_unhandled_reloc, /* special_function */
1344 "R_PPC_EMB_SDA2I16", /* name */
1345 FALSE, /* partial_inplace */
1346 0, /* src_mask */
1347 0xffff, /* dst_mask */
1348 FALSE), /* pcrel_offset */
1349
1350 /* A sign-extended 16 bit value relative to _SDA2_BASE_, for use with
1351 small data items. */
1352 HOWTO (R_PPC_EMB_SDA2REL, /* type */
1353 0, /* rightshift */
1354 1, /* size (0 = byte, 1 = short, 2 = long) */
1355 16, /* bitsize */
1356 FALSE, /* pc_relative */
1357 0, /* bitpos */
1358 complain_overflow_signed, /* complain_on_overflow */
1359 ppc_elf_unhandled_reloc, /* special_function */
1360 "R_PPC_EMB_SDA2REL", /* name */
1361 FALSE, /* partial_inplace */
1362 0, /* src_mask */
1363 0xffff, /* dst_mask */
1364 FALSE), /* pcrel_offset */
1365
1366 /* Relocate against either _SDA_BASE_ or _SDA2_BASE_, filling in the 16 bit
1367 signed offset from the appropriate base, and filling in the register
1368 field with the appropriate register (0, 2, or 13). */
1369 HOWTO (R_PPC_EMB_SDA21, /* type */
1370 0, /* rightshift */
1371 2, /* size (0 = byte, 1 = short, 2 = long) */
1372 16, /* bitsize */
1373 FALSE, /* pc_relative */
1374 0, /* bitpos */
1375 complain_overflow_signed, /* complain_on_overflow */
1376 ppc_elf_unhandled_reloc, /* special_function */
1377 "R_PPC_EMB_SDA21", /* name */
1378 FALSE, /* partial_inplace */
1379 0, /* src_mask */
1380 0xffff, /* dst_mask */
1381 FALSE), /* pcrel_offset */
1382
1383 /* Relocation not handled: R_PPC_EMB_MRKREF */
1384 /* Relocation not handled: R_PPC_EMB_RELSEC16 */
1385 /* Relocation not handled: R_PPC_EMB_RELST_LO */
1386 /* Relocation not handled: R_PPC_EMB_RELST_HI */
1387 /* Relocation not handled: R_PPC_EMB_RELST_HA */
1388 /* Relocation not handled: R_PPC_EMB_BIT_FLD */
1389
1390 /* PC relative relocation against either _SDA_BASE_ or _SDA2_BASE_, filling
1391 in the 16 bit signed offset from the appropriate base, and filling in the
1392 register field with the appropriate register (0, 2, or 13). */
1393 HOWTO (R_PPC_EMB_RELSDA, /* type */
1394 0, /* rightshift */
1395 1, /* size (0 = byte, 1 = short, 2 = long) */
1396 16, /* bitsize */
1397 FALSE, /* pc_relative */
1398 0, /* bitpos */
1399 complain_overflow_signed, /* complain_on_overflow */
1400 ppc_elf_unhandled_reloc, /* special_function */
1401 "R_PPC_EMB_RELSDA", /* name */
1402 FALSE, /* partial_inplace */
1403 0, /* src_mask */
1404 0xffff, /* dst_mask */
1405 FALSE), /* pcrel_offset */
1406
1407 /* A relative 8 bit branch. */
1408 HOWTO (R_PPC_VLE_REL8, /* type */
1409 1, /* rightshift */
1410 1, /* size (0 = byte, 1 = short, 2 = long) */
1411 8, /* bitsize */
1412 TRUE, /* pc_relative */
1413 0, /* bitpos */
1414 complain_overflow_signed, /* complain_on_overflow */
1415 bfd_elf_generic_reloc, /* special_function */
1416 "R_PPC_VLE_REL8", /* name */
1417 FALSE, /* partial_inplace */
1418 0, /* src_mask */
1419 0xff, /* dst_mask */
1420 TRUE), /* pcrel_offset */
1421
1422 /* A relative 15 bit branch. */
1423 HOWTO (R_PPC_VLE_REL15, /* type */
1424 1, /* rightshift */
1425 2, /* size (0 = byte, 1 = short, 2 = long) */
1426 15, /* bitsize */
1427 TRUE, /* pc_relative */
1428 1, /* bitpos */
1429 complain_overflow_signed, /* complain_on_overflow */
1430 bfd_elf_generic_reloc, /* special_function */
1431 "R_PPC_VLE_REL15", /* name */
1432 FALSE, /* partial_inplace */
1433 0, /* src_mask */
1434 0xfffe, /* dst_mask */
1435 TRUE), /* pcrel_offset */
1436
1437 /* A relative 24 bit branch. */
1438 HOWTO (R_PPC_VLE_REL24, /* type */
1439 1, /* rightshift */
1440 2, /* size (0 = byte, 1 = short, 2 = long) */
1441 24, /* bitsize */
1442 TRUE, /* pc_relative */
1443 1, /* bitpos */
1444 complain_overflow_signed, /* complain_on_overflow */
1445 bfd_elf_generic_reloc, /* special_function */
1446 "R_PPC_VLE_REL24", /* name */
1447 FALSE, /* partial_inplace */
1448 0, /* src_mask */
1449 0x1fffffe, /* dst_mask */
1450 TRUE), /* pcrel_offset */
1451
1452 /* The 16 LSBS in split16a format. */
1453 HOWTO (R_PPC_VLE_LO16A, /* type */
1454 0, /* rightshift */
1455 2, /* size (0 = byte, 1 = short, 2 = long) */
1456 16, /* bitsize */
1457 FALSE, /* pc_relative */
1458 0, /* bitpos */
1459 complain_overflow_dont, /* complain_on_overflow */
1460 ppc_elf_unhandled_reloc, /* special_function */
1461 "R_PPC_VLE_LO16A", /* name */
1462 FALSE, /* partial_inplace */
1463 0, /* src_mask */
1464 0x1f07ff, /* dst_mask */
1465 FALSE), /* pcrel_offset */
1466
1467 /* The 16 LSBS in split16d format. */
1468 HOWTO (R_PPC_VLE_LO16D, /* type */
1469 0, /* rightshift */
1470 2, /* size (0 = byte, 1 = short, 2 = long) */
1471 16, /* bitsize */
1472 FALSE, /* pc_relative */
1473 0, /* bitpos */
1474 complain_overflow_dont, /* complain_on_overflow */
1475 ppc_elf_unhandled_reloc, /* special_function */
1476 "R_PPC_VLE_LO16D", /* name */
1477 FALSE, /* partial_inplace */
1478 0, /* src_mask */
1479 0x3e007ff, /* dst_mask */
1480 FALSE), /* pcrel_offset */
1481
1482 /* Bits 16-31 split16a format. */
1483 HOWTO (R_PPC_VLE_HI16A, /* type */
1484 16, /* rightshift */
1485 2, /* size (0 = byte, 1 = short, 2 = long) */
1486 16, /* bitsize */
1487 FALSE, /* pc_relative */
1488 0, /* bitpos */
1489 complain_overflow_dont, /* complain_on_overflow */
1490 ppc_elf_unhandled_reloc, /* special_function */
1491 "R_PPC_VLE_HI16A", /* name */
1492 FALSE, /* partial_inplace */
1493 0, /* src_mask */
1494 0x1f07ff, /* dst_mask */
1495 FALSE), /* pcrel_offset */
1496
1497 /* Bits 16-31 split16d format. */
1498 HOWTO (R_PPC_VLE_HI16D, /* type */
1499 16, /* rightshift */
1500 2, /* size (0 = byte, 1 = short, 2 = long) */
1501 16, /* bitsize */
1502 FALSE, /* pc_relative */
1503 0, /* bitpos */
1504 complain_overflow_dont, /* complain_on_overflow */
1505 ppc_elf_unhandled_reloc, /* special_function */
1506 "R_PPC_VLE_HI16D", /* name */
1507 FALSE, /* partial_inplace */
1508 0, /* src_mask */
1509 0x3e007ff, /* dst_mask */
1510 FALSE), /* pcrel_offset */
1511
1512 /* Bits 16-31 (High Adjusted) in split16a format. */
1513 HOWTO (R_PPC_VLE_HA16A, /* type */
1514 16, /* rightshift */
1515 2, /* size (0 = byte, 1 = short, 2 = long) */
1516 16, /* bitsize */
1517 FALSE, /* pc_relative */
1518 0, /* bitpos */
1519 complain_overflow_dont, /* complain_on_overflow */
1520 ppc_elf_unhandled_reloc, /* special_function */
1521 "R_PPC_VLE_HA16A", /* name */
1522 FALSE, /* partial_inplace */
1523 0, /* src_mask */
1524 0x1f07ff, /* dst_mask */
1525 FALSE), /* pcrel_offset */
1526
1527 /* Bits 16-31 (High Adjusted) in split16d format. */
1528 HOWTO (R_PPC_VLE_HA16D, /* type */
1529 16, /* rightshift */
1530 2, /* size (0 = byte, 1 = short, 2 = long) */
1531 16, /* bitsize */
1532 FALSE, /* pc_relative */
1533 0, /* bitpos */
1534 complain_overflow_dont, /* complain_on_overflow */
1535 ppc_elf_unhandled_reloc, /* special_function */
1536 "R_PPC_VLE_HA16D", /* name */
1537 FALSE, /* partial_inplace */
1538 0, /* src_mask */
1539 0x3e007ff, /* dst_mask */
1540 FALSE), /* pcrel_offset */
1541
1542 /* This reloc is like R_PPC_EMB_SDA21 but only applies to e_add16i
1543 instructions. If the register base is 0 then the linker changes
1544 the e_add16i to an e_li instruction. */
1545 HOWTO (R_PPC_VLE_SDA21, /* type */
1546 0, /* rightshift */
1547 2, /* size (0 = byte, 1 = short, 2 = long) */
1548 16, /* bitsize */
1549 FALSE, /* pc_relative */
1550 0, /* bitpos */
1551 complain_overflow_signed, /* complain_on_overflow */
1552 ppc_elf_unhandled_reloc, /* special_function */
1553 "R_PPC_VLE_SDA21", /* name */
1554 FALSE, /* partial_inplace */
1555 0, /* src_mask */
1556 0xffff, /* dst_mask */
1557 FALSE), /* pcrel_offset */
1558
1559 /* Like R_PPC_VLE_SDA21 but ignore overflow. */
1560 HOWTO (R_PPC_VLE_SDA21_LO, /* type */
1561 0, /* rightshift */
1562 2, /* size (0 = byte, 1 = short, 2 = long) */
1563 16, /* bitsize */
1564 FALSE, /* pc_relative */
1565 0, /* bitpos */
1566 complain_overflow_dont, /* complain_on_overflow */
1567 ppc_elf_unhandled_reloc, /* special_function */
1568 "R_PPC_VLE_SDA21_LO", /* name */
1569 FALSE, /* partial_inplace */
1570 0, /* src_mask */
1571 0xffff, /* dst_mask */
1572 FALSE), /* pcrel_offset */
1573
1574 /* The 16 LSBS relative to _SDA_BASE_ in split16a format. */
1575 HOWTO (R_PPC_VLE_SDAREL_LO16A,/* type */
1576 0, /* rightshift */
1577 2, /* size (0 = byte, 1 = short, 2 = long) */
1578 16, /* bitsize */
1579 FALSE, /* pc_relative */
1580 0, /* bitpos */
1581 complain_overflow_dont, /* complain_on_overflow */
1582 ppc_elf_unhandled_reloc, /* special_function */
1583 "R_PPC_VLE_SDAREL_LO16A", /* name */
1584 FALSE, /* partial_inplace */
1585 0, /* src_mask */
1586 0x1f07ff, /* dst_mask */
1587 FALSE), /* pcrel_offset */
1588
1589 /* The 16 LSBS relative to _SDA_BASE_ in split16d format. */
1590 HOWTO (R_PPC_VLE_SDAREL_LO16D, /* type */
1591 0, /* rightshift */
1592 2, /* size (0 = byte, 1 = short, 2 = long) */
1593 16, /* bitsize */
1594 FALSE, /* pc_relative */
1595 0, /* bitpos */
1596 complain_overflow_dont, /* complain_on_overflow */
1597 ppc_elf_unhandled_reloc, /* special_function */
1598 "R_PPC_VLE_SDAREL_LO16D", /* name */
1599 FALSE, /* partial_inplace */
1600 0, /* src_mask */
1601 0x3e007ff, /* dst_mask */
1602 FALSE), /* pcrel_offset */
1603
1604 /* Bits 16-31 relative to _SDA_BASE_ in split16a format. */
1605 HOWTO (R_PPC_VLE_SDAREL_HI16A, /* type */
1606 16, /* rightshift */
1607 2, /* size (0 = byte, 1 = short, 2 = long) */
1608 16, /* bitsize */
1609 FALSE, /* pc_relative */
1610 0, /* bitpos */
1611 complain_overflow_dont, /* complain_on_overflow */
1612 ppc_elf_unhandled_reloc, /* special_function */
1613 "R_PPC_VLE_SDAREL_HI16A", /* name */
1614 FALSE, /* partial_inplace */
1615 0, /* src_mask */
1616 0x1f07ff, /* dst_mask */
1617 FALSE), /* pcrel_offset */
1618
1619 /* Bits 16-31 relative to _SDA_BASE_ in split16d format. */
1620 HOWTO (R_PPC_VLE_SDAREL_HI16D, /* type */
1621 16, /* rightshift */
1622 2, /* size (0 = byte, 1 = short, 2 = long) */
1623 16, /* bitsize */
1624 FALSE, /* pc_relative */
1625 0, /* bitpos */
1626 complain_overflow_dont, /* complain_on_overflow */
1627 ppc_elf_unhandled_reloc, /* special_function */
1628 "R_PPC_VLE_SDAREL_HI16D", /* name */
1629 FALSE, /* partial_inplace */
1630 0, /* src_mask */
1631 0x3e007ff, /* dst_mask */
1632 FALSE), /* pcrel_offset */
1633
1634 /* Bits 16-31 (HA) relative to _SDA_BASE split16a format. */
1635 HOWTO (R_PPC_VLE_SDAREL_HA16A, /* type */
1636 16, /* rightshift */
1637 2, /* size (0 = byte, 1 = short, 2 = long) */
1638 16, /* bitsize */
1639 FALSE, /* pc_relative */
1640 0, /* bitpos */
1641 complain_overflow_dont, /* complain_on_overflow */
1642 ppc_elf_unhandled_reloc, /* special_function */
1643 "R_PPC_VLE_SDAREL_HA16A", /* name */
1644 FALSE, /* partial_inplace */
1645 0, /* src_mask */
1646 0x1f07ff, /* dst_mask */
1647 FALSE), /* pcrel_offset */
1648
1649 /* Bits 16-31 (HA) relative to _SDA_BASE split16d format. */
1650 HOWTO (R_PPC_VLE_SDAREL_HA16D, /* type */
1651 16, /* rightshift */
1652 2, /* size (0 = byte, 1 = short, 2 = long) */
1653 16, /* bitsize */
1654 FALSE, /* pc_relative */
1655 0, /* bitpos */
1656 complain_overflow_dont, /* complain_on_overflow */
1657 ppc_elf_unhandled_reloc, /* special_function */
1658 "R_PPC_VLE_SDAREL_HA16D", /* name */
1659 FALSE, /* partial_inplace */
1660 0, /* src_mask */
1661 0x3e007ff, /* dst_mask */
1662 FALSE), /* pcrel_offset */
1663
1664 /* e_li split20 format. */
1665 HOWTO (R_PPC_VLE_ADDR20, /* type */
1666 16, /* rightshift */
1667 2, /* size (0 = byte, 1 = short, 2 = long) */
1668 20, /* bitsize */
1669 FALSE, /* pc_relative */
1670 0, /* bitpos */
1671 complain_overflow_dont, /* complain_on_overflow */
1672 bfd_elf_generic_reloc, /* special_function */
1673 "R_PPC_VLE_ADDR20", /* name */
1674 FALSE, /* partial_inplace */
1675 0, /* src_mask */
1676 0x1f07ff, /* dst_mask */
1677 FALSE), /* pcrel_offset */
1678
1679 HOWTO (R_PPC_IRELATIVE, /* type */
1680 0, /* rightshift */
1681 2, /* size (0 = byte, 1 = short, 2 = long) */
1682 32, /* bitsize */
1683 FALSE, /* pc_relative */
1684 0, /* bitpos */
1685 complain_overflow_dont, /* complain_on_overflow */
1686 ppc_elf_unhandled_reloc, /* special_function */
1687 "R_PPC_IRELATIVE", /* name */
1688 FALSE, /* partial_inplace */
1689 0, /* src_mask */
1690 0xffffffff, /* dst_mask */
1691 FALSE), /* pcrel_offset */
1692
1693 /* A 16 bit relative relocation. */
1694 HOWTO (R_PPC_REL16, /* type */
1695 0, /* rightshift */
1696 1, /* size (0 = byte, 1 = short, 2 = long) */
1697 16, /* bitsize */
1698 TRUE, /* pc_relative */
1699 0, /* bitpos */
1700 complain_overflow_signed, /* complain_on_overflow */
1701 bfd_elf_generic_reloc, /* special_function */
1702 "R_PPC_REL16", /* name */
1703 FALSE, /* partial_inplace */
1704 0, /* src_mask */
1705 0xffff, /* dst_mask */
1706 TRUE), /* pcrel_offset */
1707
1708 /* A 16 bit relative relocation without overflow. */
1709 HOWTO (R_PPC_REL16_LO, /* type */
1710 0, /* rightshift */
1711 1, /* size (0 = byte, 1 = short, 2 = long) */
1712 16, /* bitsize */
1713 TRUE, /* pc_relative */
1714 0, /* bitpos */
1715 complain_overflow_dont,/* complain_on_overflow */
1716 bfd_elf_generic_reloc, /* special_function */
1717 "R_PPC_REL16_LO", /* name */
1718 FALSE, /* partial_inplace */
1719 0, /* src_mask */
1720 0xffff, /* dst_mask */
1721 TRUE), /* pcrel_offset */
1722
1723 /* The high order 16 bits of a relative address. */
1724 HOWTO (R_PPC_REL16_HI, /* type */
1725 16, /* rightshift */
1726 1, /* size (0 = byte, 1 = short, 2 = long) */
1727 16, /* bitsize */
1728 TRUE, /* pc_relative */
1729 0, /* bitpos */
1730 complain_overflow_dont, /* complain_on_overflow */
1731 bfd_elf_generic_reloc, /* special_function */
1732 "R_PPC_REL16_HI", /* name */
1733 FALSE, /* partial_inplace */
1734 0, /* src_mask */
1735 0xffff, /* dst_mask */
1736 TRUE), /* pcrel_offset */
1737
1738 /* The high order 16 bits of a relative address, plus 1 if the contents of
1739 the low 16 bits, treated as a signed number, is negative. */
1740 HOWTO (R_PPC_REL16_HA, /* type */
1741 16, /* rightshift */
1742 1, /* size (0 = byte, 1 = short, 2 = long) */
1743 16, /* bitsize */
1744 TRUE, /* pc_relative */
1745 0, /* bitpos */
1746 complain_overflow_dont, /* complain_on_overflow */
1747 ppc_elf_addr16_ha_reloc, /* special_function */
1748 "R_PPC_REL16_HA", /* name */
1749 FALSE, /* partial_inplace */
1750 0, /* src_mask */
1751 0xffff, /* dst_mask */
1752 TRUE), /* pcrel_offset */
1753
1754 /* Like R_PPC_REL16_HA but for split field in addpcis. */
1755 HOWTO (R_PPC_REL16DX_HA, /* type */
1756 16, /* rightshift */
1757 2, /* size (0 = byte, 1 = short, 2 = long) */
1758 16, /* bitsize */
1759 TRUE, /* pc_relative */
1760 0, /* bitpos */
1761 complain_overflow_signed, /* complain_on_overflow */
1762 ppc_elf_addr16_ha_reloc, /* special_function */
1763 "R_PPC_REL16DX_HA", /* name */
1764 FALSE, /* partial_inplace */
1765 0, /* src_mask */
1766 0x1fffc1, /* dst_mask */
1767 TRUE), /* pcrel_offset */
1768
1769 /* A split-field reloc for addpcis, non-relative (gas internal use only). */
1770 HOWTO (R_PPC_16DX_HA, /* type */
1771 16, /* rightshift */
1772 2, /* size (0 = byte, 1 = short, 2 = long) */
1773 16, /* bitsize */
1774 FALSE, /* pc_relative */
1775 0, /* bitpos */
1776 complain_overflow_signed, /* complain_on_overflow */
1777 ppc_elf_addr16_ha_reloc, /* special_function */
1778 "R_PPC_16DX_HA", /* name */
1779 FALSE, /* partial_inplace */
1780 0, /* src_mask */
1781 0x1fffc1, /* dst_mask */
1782 FALSE), /* pcrel_offset */
1783
1784 /* GNU extension to record C++ vtable hierarchy. */
1785 HOWTO (R_PPC_GNU_VTINHERIT, /* type */
1786 0, /* rightshift */
1787 0, /* size (0 = byte, 1 = short, 2 = long) */
1788 0, /* bitsize */
1789 FALSE, /* pc_relative */
1790 0, /* bitpos */
1791 complain_overflow_dont, /* complain_on_overflow */
1792 NULL, /* special_function */
1793 "R_PPC_GNU_VTINHERIT", /* name */
1794 FALSE, /* partial_inplace */
1795 0, /* src_mask */
1796 0, /* dst_mask */
1797 FALSE), /* pcrel_offset */
1798
1799 /* GNU extension to record C++ vtable member usage. */
1800 HOWTO (R_PPC_GNU_VTENTRY, /* type */
1801 0, /* rightshift */
1802 0, /* size (0 = byte, 1 = short, 2 = long) */
1803 0, /* bitsize */
1804 FALSE, /* pc_relative */
1805 0, /* bitpos */
1806 complain_overflow_dont, /* complain_on_overflow */
1807 NULL, /* special_function */
1808 "R_PPC_GNU_VTENTRY", /* name */
1809 FALSE, /* partial_inplace */
1810 0, /* src_mask */
1811 0, /* dst_mask */
1812 FALSE), /* pcrel_offset */
1813
1814 /* Phony reloc to handle AIX style TOC entries. */
1815 HOWTO (R_PPC_TOC16, /* type */
1816 0, /* rightshift */
1817 1, /* size (0 = byte, 1 = short, 2 = long) */
1818 16, /* bitsize */
1819 FALSE, /* pc_relative */
1820 0, /* bitpos */
1821 complain_overflow_signed, /* complain_on_overflow */
1822 ppc_elf_unhandled_reloc, /* special_function */
1823 "R_PPC_TOC16", /* name */
1824 FALSE, /* partial_inplace */
1825 0, /* src_mask */
1826 0xffff, /* dst_mask */
1827 FALSE), /* pcrel_offset */
1828 };
1829 \f
1830 /* Initialize the ppc_elf_howto_table, so that linear accesses can be done. */
1831
1832 static void
1833 ppc_elf_howto_init (void)
1834 {
1835 unsigned int i, type;
1836
1837 for (i = 0;
1838 i < sizeof (ppc_elf_howto_raw) / sizeof (ppc_elf_howto_raw[0]);
1839 i++)
1840 {
1841 type = ppc_elf_howto_raw[i].type;
1842 if (type >= (sizeof (ppc_elf_howto_table)
1843 / sizeof (ppc_elf_howto_table[0])))
1844 abort ();
1845 ppc_elf_howto_table[type] = &ppc_elf_howto_raw[i];
1846 }
1847 }
1848
1849 static reloc_howto_type *
1850 ppc_elf_reloc_type_lookup (bfd *abfd ATTRIBUTE_UNUSED,
1851 bfd_reloc_code_real_type code)
1852 {
1853 enum elf_ppc_reloc_type r;
1854
1855 /* Initialize howto table if not already done. */
1856 if (!ppc_elf_howto_table[R_PPC_ADDR32])
1857 ppc_elf_howto_init ();
1858
1859 switch (code)
1860 {
1861 default:
1862 return NULL;
1863
1864 case BFD_RELOC_NONE: r = R_PPC_NONE; break;
1865 case BFD_RELOC_32: r = R_PPC_ADDR32; break;
1866 case BFD_RELOC_PPC_BA26: r = R_PPC_ADDR24; break;
1867 case BFD_RELOC_PPC64_ADDR16_DS:
1868 case BFD_RELOC_16: r = R_PPC_ADDR16; break;
1869 case BFD_RELOC_PPC64_ADDR16_LO_DS:
1870 case BFD_RELOC_LO16: r = R_PPC_ADDR16_LO; break;
1871 case BFD_RELOC_HI16: r = R_PPC_ADDR16_HI; break;
1872 case BFD_RELOC_HI16_S: r = R_PPC_ADDR16_HA; break;
1873 case BFD_RELOC_PPC_BA16: r = R_PPC_ADDR14; break;
1874 case BFD_RELOC_PPC_BA16_BRTAKEN: r = R_PPC_ADDR14_BRTAKEN; break;
1875 case BFD_RELOC_PPC_BA16_BRNTAKEN: r = R_PPC_ADDR14_BRNTAKEN; break;
1876 case BFD_RELOC_PPC_B26: r = R_PPC_REL24; break;
1877 case BFD_RELOC_PPC_B16: r = R_PPC_REL14; break;
1878 case BFD_RELOC_PPC_B16_BRTAKEN: r = R_PPC_REL14_BRTAKEN; break;
1879 case BFD_RELOC_PPC_B16_BRNTAKEN: r = R_PPC_REL14_BRNTAKEN; break;
1880 case BFD_RELOC_PPC64_GOT16_DS:
1881 case BFD_RELOC_16_GOTOFF: r = R_PPC_GOT16; break;
1882 case BFD_RELOC_PPC64_GOT16_LO_DS:
1883 case BFD_RELOC_LO16_GOTOFF: r = R_PPC_GOT16_LO; break;
1884 case BFD_RELOC_HI16_GOTOFF: r = R_PPC_GOT16_HI; break;
1885 case BFD_RELOC_HI16_S_GOTOFF: r = R_PPC_GOT16_HA; break;
1886 case BFD_RELOC_24_PLT_PCREL: r = R_PPC_PLTREL24; break;
1887 case BFD_RELOC_PPC_COPY: r = R_PPC_COPY; break;
1888 case BFD_RELOC_PPC_GLOB_DAT: r = R_PPC_GLOB_DAT; break;
1889 case BFD_RELOC_PPC_LOCAL24PC: r = R_PPC_LOCAL24PC; break;
1890 case BFD_RELOC_32_PCREL: r = R_PPC_REL32; break;
1891 case BFD_RELOC_32_PLTOFF: r = R_PPC_PLT32; break;
1892 case BFD_RELOC_32_PLT_PCREL: r = R_PPC_PLTREL32; break;
1893 case BFD_RELOC_PPC64_PLT16_LO_DS:
1894 case BFD_RELOC_LO16_PLTOFF: r = R_PPC_PLT16_LO; break;
1895 case BFD_RELOC_HI16_PLTOFF: r = R_PPC_PLT16_HI; break;
1896 case BFD_RELOC_HI16_S_PLTOFF: r = R_PPC_PLT16_HA; break;
1897 case BFD_RELOC_GPREL16: r = R_PPC_SDAREL16; break;
1898 case BFD_RELOC_PPC64_SECTOFF_DS:
1899 case BFD_RELOC_16_BASEREL: r = R_PPC_SECTOFF; break;
1900 case BFD_RELOC_PPC64_SECTOFF_LO_DS:
1901 case BFD_RELOC_LO16_BASEREL: r = R_PPC_SECTOFF_LO; break;
1902 case BFD_RELOC_HI16_BASEREL: r = R_PPC_SECTOFF_HI; break;
1903 case BFD_RELOC_HI16_S_BASEREL: r = R_PPC_SECTOFF_HA; break;
1904 case BFD_RELOC_CTOR: r = R_PPC_ADDR32; break;
1905 case BFD_RELOC_PPC64_TOC16_DS:
1906 case BFD_RELOC_PPC_TOC16: r = R_PPC_TOC16; break;
1907 case BFD_RELOC_PPC_TLS: r = R_PPC_TLS; break;
1908 case BFD_RELOC_PPC_TLSGD: r = R_PPC_TLSGD; break;
1909 case BFD_RELOC_PPC_TLSLD: r = R_PPC_TLSLD; break;
1910 case BFD_RELOC_PPC_DTPMOD: r = R_PPC_DTPMOD32; break;
1911 case BFD_RELOC_PPC64_TPREL16_DS:
1912 case BFD_RELOC_PPC_TPREL16: r = R_PPC_TPREL16; break;
1913 case BFD_RELOC_PPC64_TPREL16_LO_DS:
1914 case BFD_RELOC_PPC_TPREL16_LO: r = R_PPC_TPREL16_LO; break;
1915 case BFD_RELOC_PPC_TPREL16_HI: r = R_PPC_TPREL16_HI; break;
1916 case BFD_RELOC_PPC_TPREL16_HA: r = R_PPC_TPREL16_HA; break;
1917 case BFD_RELOC_PPC_TPREL: r = R_PPC_TPREL32; break;
1918 case BFD_RELOC_PPC64_DTPREL16_DS:
1919 case BFD_RELOC_PPC_DTPREL16: r = R_PPC_DTPREL16; break;
1920 case BFD_RELOC_PPC64_DTPREL16_LO_DS:
1921 case BFD_RELOC_PPC_DTPREL16_LO: r = R_PPC_DTPREL16_LO; break;
1922 case BFD_RELOC_PPC_DTPREL16_HI: r = R_PPC_DTPREL16_HI; break;
1923 case BFD_RELOC_PPC_DTPREL16_HA: r = R_PPC_DTPREL16_HA; break;
1924 case BFD_RELOC_PPC_DTPREL: r = R_PPC_DTPREL32; break;
1925 case BFD_RELOC_PPC_GOT_TLSGD16: r = R_PPC_GOT_TLSGD16; break;
1926 case BFD_RELOC_PPC_GOT_TLSGD16_LO: r = R_PPC_GOT_TLSGD16_LO; break;
1927 case BFD_RELOC_PPC_GOT_TLSGD16_HI: r = R_PPC_GOT_TLSGD16_HI; break;
1928 case BFD_RELOC_PPC_GOT_TLSGD16_HA: r = R_PPC_GOT_TLSGD16_HA; break;
1929 case BFD_RELOC_PPC_GOT_TLSLD16: r = R_PPC_GOT_TLSLD16; break;
1930 case BFD_RELOC_PPC_GOT_TLSLD16_LO: r = R_PPC_GOT_TLSLD16_LO; break;
1931 case BFD_RELOC_PPC_GOT_TLSLD16_HI: r = R_PPC_GOT_TLSLD16_HI; break;
1932 case BFD_RELOC_PPC_GOT_TLSLD16_HA: r = R_PPC_GOT_TLSLD16_HA; break;
1933 case BFD_RELOC_PPC_GOT_TPREL16: r = R_PPC_GOT_TPREL16; break;
1934 case BFD_RELOC_PPC_GOT_TPREL16_LO: r = R_PPC_GOT_TPREL16_LO; break;
1935 case BFD_RELOC_PPC_GOT_TPREL16_HI: r = R_PPC_GOT_TPREL16_HI; break;
1936 case BFD_RELOC_PPC_GOT_TPREL16_HA: r = R_PPC_GOT_TPREL16_HA; break;
1937 case BFD_RELOC_PPC_GOT_DTPREL16: r = R_PPC_GOT_DTPREL16; break;
1938 case BFD_RELOC_PPC_GOT_DTPREL16_LO: r = R_PPC_GOT_DTPREL16_LO; break;
1939 case BFD_RELOC_PPC_GOT_DTPREL16_HI: r = R_PPC_GOT_DTPREL16_HI; break;
1940 case BFD_RELOC_PPC_GOT_DTPREL16_HA: r = R_PPC_GOT_DTPREL16_HA; break;
1941 case BFD_RELOC_PPC_EMB_NADDR32: r = R_PPC_EMB_NADDR32; break;
1942 case BFD_RELOC_PPC_EMB_NADDR16: r = R_PPC_EMB_NADDR16; break;
1943 case BFD_RELOC_PPC_EMB_NADDR16_LO: r = R_PPC_EMB_NADDR16_LO; break;
1944 case BFD_RELOC_PPC_EMB_NADDR16_HI: r = R_PPC_EMB_NADDR16_HI; break;
1945 case BFD_RELOC_PPC_EMB_NADDR16_HA: r = R_PPC_EMB_NADDR16_HA; break;
1946 case BFD_RELOC_PPC_EMB_SDAI16: r = R_PPC_EMB_SDAI16; break;
1947 case BFD_RELOC_PPC_EMB_SDA2I16: r = R_PPC_EMB_SDA2I16; break;
1948 case BFD_RELOC_PPC_EMB_SDA2REL: r = R_PPC_EMB_SDA2REL; break;
1949 case BFD_RELOC_PPC_EMB_SDA21: r = R_PPC_EMB_SDA21; break;
1950 case BFD_RELOC_PPC_EMB_MRKREF: r = R_PPC_EMB_MRKREF; break;
1951 case BFD_RELOC_PPC_EMB_RELSEC16: r = R_PPC_EMB_RELSEC16; break;
1952 case BFD_RELOC_PPC_EMB_RELST_LO: r = R_PPC_EMB_RELST_LO; break;
1953 case BFD_RELOC_PPC_EMB_RELST_HI: r = R_PPC_EMB_RELST_HI; break;
1954 case BFD_RELOC_PPC_EMB_RELST_HA: r = R_PPC_EMB_RELST_HA; break;
1955 case BFD_RELOC_PPC_EMB_BIT_FLD: r = R_PPC_EMB_BIT_FLD; break;
1956 case BFD_RELOC_PPC_EMB_RELSDA: r = R_PPC_EMB_RELSDA; break;
1957 case BFD_RELOC_PPC_VLE_REL8: r = R_PPC_VLE_REL8; break;
1958 case BFD_RELOC_PPC_VLE_REL15: r = R_PPC_VLE_REL15; break;
1959 case BFD_RELOC_PPC_VLE_REL24: r = R_PPC_VLE_REL24; break;
1960 case BFD_RELOC_PPC_VLE_LO16A: r = R_PPC_VLE_LO16A; break;
1961 case BFD_RELOC_PPC_VLE_LO16D: r = R_PPC_VLE_LO16D; break;
1962 case BFD_RELOC_PPC_VLE_HI16A: r = R_PPC_VLE_HI16A; break;
1963 case BFD_RELOC_PPC_VLE_HI16D: r = R_PPC_VLE_HI16D; break;
1964 case BFD_RELOC_PPC_VLE_HA16A: r = R_PPC_VLE_HA16A; break;
1965 case BFD_RELOC_PPC_VLE_HA16D: r = R_PPC_VLE_HA16D; break;
1966 case BFD_RELOC_PPC_VLE_SDA21: r = R_PPC_VLE_SDA21; break;
1967 case BFD_RELOC_PPC_VLE_SDA21_LO: r = R_PPC_VLE_SDA21_LO; break;
1968 case BFD_RELOC_PPC_VLE_SDAREL_LO16A:
1969 r = R_PPC_VLE_SDAREL_LO16A;
1970 break;
1971 case BFD_RELOC_PPC_VLE_SDAREL_LO16D:
1972 r = R_PPC_VLE_SDAREL_LO16D;
1973 break;
1974 case BFD_RELOC_PPC_VLE_SDAREL_HI16A:
1975 r = R_PPC_VLE_SDAREL_HI16A;
1976 break;
1977 case BFD_RELOC_PPC_VLE_SDAREL_HI16D:
1978 r = R_PPC_VLE_SDAREL_HI16D;
1979 break;
1980 case BFD_RELOC_PPC_VLE_SDAREL_HA16A:
1981 r = R_PPC_VLE_SDAREL_HA16A;
1982 break;
1983 case BFD_RELOC_PPC_VLE_SDAREL_HA16D:
1984 r = R_PPC_VLE_SDAREL_HA16D;
1985 break;
1986 case BFD_RELOC_16_PCREL: r = R_PPC_REL16; break;
1987 case BFD_RELOC_LO16_PCREL: r = R_PPC_REL16_LO; break;
1988 case BFD_RELOC_HI16_PCREL: r = R_PPC_REL16_HI; break;
1989 case BFD_RELOC_HI16_S_PCREL: r = R_PPC_REL16_HA; break;
1990 case BFD_RELOC_PPC_16DX_HA: r = R_PPC_16DX_HA; break;
1991 case BFD_RELOC_PPC_REL16DX_HA: r = R_PPC_REL16DX_HA; break;
1992 case BFD_RELOC_VTABLE_INHERIT: r = R_PPC_GNU_VTINHERIT; break;
1993 case BFD_RELOC_VTABLE_ENTRY: r = R_PPC_GNU_VTENTRY; break;
1994 }
1995
1996 return ppc_elf_howto_table[r];
1997 };
1998
1999 static reloc_howto_type *
2000 ppc_elf_reloc_name_lookup (bfd *abfd ATTRIBUTE_UNUSED,
2001 const char *r_name)
2002 {
2003 unsigned int i;
2004
2005 for (i = 0;
2006 i < sizeof (ppc_elf_howto_raw) / sizeof (ppc_elf_howto_raw[0]);
2007 i++)
2008 if (ppc_elf_howto_raw[i].name != NULL
2009 && strcasecmp (ppc_elf_howto_raw[i].name, r_name) == 0)
2010 return &ppc_elf_howto_raw[i];
2011
2012 return NULL;
2013 }
2014
2015 /* Set the howto pointer for a PowerPC ELF reloc. */
2016
2017 static void
2018 ppc_elf_info_to_howto (bfd *abfd,
2019 arelent *cache_ptr,
2020 Elf_Internal_Rela *dst)
2021 {
2022 unsigned int r_type;
2023
2024 /* Initialize howto table if not already done. */
2025 if (!ppc_elf_howto_table[R_PPC_ADDR32])
2026 ppc_elf_howto_init ();
2027
2028 r_type = ELF32_R_TYPE (dst->r_info);
2029 if (r_type >= R_PPC_max)
2030 {
2031 /* xgettext:c-format */
2032 _bfd_error_handler (_("%pB: unsupported relocation type %#x"),
2033 abfd, r_type);
2034 bfd_set_error (bfd_error_bad_value);
2035 r_type = R_PPC_NONE;
2036 }
2037 cache_ptr->howto = ppc_elf_howto_table[r_type];
2038
2039 /* Just because the above assert didn't trigger doesn't mean that
2040 ELF32_R_TYPE (dst->r_info) is necessarily a valid relocation. */
2041 if (!cache_ptr->howto)
2042 {
2043 /* xgettext:c-format */
2044 _bfd_error_handler (_("%pB: unsupported relocation type %#x"),
2045 abfd, r_type);
2046 bfd_set_error (bfd_error_bad_value);
2047
2048 cache_ptr->howto = ppc_elf_howto_table[R_PPC_NONE];
2049 }
2050 }
2051
2052 /* Handle the R_PPC_ADDR16_HA and R_PPC_REL16_HA relocs. */
2053
2054 static bfd_reloc_status_type
2055 ppc_elf_addr16_ha_reloc (bfd *abfd,
2056 arelent *reloc_entry,
2057 asymbol *symbol,
2058 void *data,
2059 asection *input_section,
2060 bfd *output_bfd,
2061 char **error_message ATTRIBUTE_UNUSED)
2062 {
2063 enum elf_ppc_reloc_type r_type;
2064 long insn;
2065 bfd_size_type octets;
2066 bfd_vma value;
2067
2068 if (output_bfd != NULL)
2069 {
2070 reloc_entry->address += input_section->output_offset;
2071 return bfd_reloc_ok;
2072 }
2073
2074 reloc_entry->addend += 0x8000;
2075 r_type = reloc_entry->howto->type;
2076 if (r_type != R_PPC_REL16DX_HA)
2077 return bfd_reloc_continue;
2078
2079 value = 0;
2080 if (!bfd_is_com_section (symbol->section))
2081 value = symbol->value;
2082 value += (reloc_entry->addend
2083 + symbol->section->output_offset
2084 + symbol->section->output_section->vma);
2085 value -= (reloc_entry->address
2086 + input_section->output_offset
2087 + input_section->output_section->vma);
2088 value >>= 16;
2089
2090 octets = reloc_entry->address * bfd_octets_per_byte (abfd);
2091 insn = bfd_get_32 (abfd, (bfd_byte *) data + octets);
2092 insn &= ~0x1fffc1;
2093 insn |= (value & 0xffc1) | ((value & 0x3e) << 15);
2094 bfd_put_32 (abfd, insn, (bfd_byte *) data + octets);
2095 return bfd_reloc_ok;
2096 }
2097
2098 static bfd_reloc_status_type
2099 ppc_elf_unhandled_reloc (bfd *abfd,
2100 arelent *reloc_entry,
2101 asymbol *symbol,
2102 void *data,
2103 asection *input_section,
2104 bfd *output_bfd,
2105 char **error_message)
2106 {
2107 /* If this is a relocatable link (output_bfd test tells us), just
2108 call the generic function. Any adjustment will be done at final
2109 link time. */
2110 if (output_bfd != NULL)
2111 return bfd_elf_generic_reloc (abfd, reloc_entry, symbol, data,
2112 input_section, output_bfd, error_message);
2113
2114 if (error_message != NULL)
2115 {
2116 static char buf[60];
2117 sprintf (buf, _("generic linker can't handle %s"),
2118 reloc_entry->howto->name);
2119 *error_message = buf;
2120 }
2121 return bfd_reloc_dangerous;
2122 }
2123 \f
2124 /* Sections created by the linker. */
2125
2126 typedef struct elf_linker_section
2127 {
2128 /* Pointer to the bfd section. */
2129 asection *section;
2130 /* Section name. */
2131 const char *name;
2132 /* Associated bss section name. */
2133 const char *bss_name;
2134 /* Associated symbol name. */
2135 const char *sym_name;
2136 /* Associated symbol. */
2137 struct elf_link_hash_entry *sym;
2138 } elf_linker_section_t;
2139
2140 /* Linked list of allocated pointer entries. This hangs off of the
2141 symbol lists, and provides allows us to return different pointers,
2142 based on different addend's. */
2143
2144 typedef struct elf_linker_section_pointers
2145 {
2146 /* next allocated pointer for this symbol */
2147 struct elf_linker_section_pointers *next;
2148 /* offset of pointer from beginning of section */
2149 bfd_vma offset;
2150 /* addend used */
2151 bfd_vma addend;
2152 /* which linker section this is */
2153 elf_linker_section_t *lsect;
2154 } elf_linker_section_pointers_t;
2155
2156 struct ppc_elf_obj_tdata
2157 {
2158 struct elf_obj_tdata elf;
2159
2160 /* A mapping from local symbols to offsets into the various linker
2161 sections added. This is index by the symbol index. */
2162 elf_linker_section_pointers_t **linker_section_pointers;
2163
2164 /* Flags used to auto-detect plt type. */
2165 unsigned int makes_plt_call : 1;
2166 unsigned int has_rel16 : 1;
2167 };
2168
2169 #define ppc_elf_tdata(bfd) \
2170 ((struct ppc_elf_obj_tdata *) (bfd)->tdata.any)
2171
2172 #define elf_local_ptr_offsets(bfd) \
2173 (ppc_elf_tdata (bfd)->linker_section_pointers)
2174
2175 #define is_ppc_elf(bfd) \
2176 (bfd_get_flavour (bfd) == bfd_target_elf_flavour \
2177 && elf_object_id (bfd) == PPC32_ELF_DATA)
2178
2179 /* Override the generic function because we store some extras. */
2180
2181 static bfd_boolean
2182 ppc_elf_mkobject (bfd *abfd)
2183 {
2184 return bfd_elf_allocate_object (abfd, sizeof (struct ppc_elf_obj_tdata),
2185 PPC32_ELF_DATA);
2186 }
2187
2188 /* When defaulting arch/mach, decode apuinfo to find a better match. */
2189
2190 bfd_boolean
2191 _bfd_elf_ppc_set_arch (bfd *abfd)
2192 {
2193 unsigned long mach = 0;
2194 asection *s;
2195 unsigned char *contents;
2196
2197 if (abfd->arch_info->bits_per_word == 32
2198 && bfd_big_endian (abfd))
2199 {
2200
2201 for (s = abfd->sections; s != NULL; s = s->next)
2202 if ((elf_section_data (s)->this_hdr.sh_flags & SHF_PPC_VLE) != 0)
2203 break;
2204 if (s != NULL)
2205 mach = bfd_mach_ppc_vle;
2206 }
2207
2208 if (mach == 0)
2209 {
2210 s = bfd_get_section_by_name (abfd, APUINFO_SECTION_NAME);
2211 if (s != NULL && bfd_malloc_and_get_section (abfd, s, &contents))
2212 {
2213 unsigned int apuinfo_size = bfd_get_32 (abfd, contents + 4);
2214 unsigned int i;
2215
2216 for (i = 20; i < apuinfo_size + 20 && i + 4 <= s->size; i += 4)
2217 {
2218 unsigned int val = bfd_get_32 (abfd, contents + i);
2219 switch (val >> 16)
2220 {
2221 case PPC_APUINFO_PMR:
2222 case PPC_APUINFO_RFMCI:
2223 if (mach == 0)
2224 mach = bfd_mach_ppc_titan;
2225 break;
2226
2227 case PPC_APUINFO_ISEL:
2228 case PPC_APUINFO_CACHELCK:
2229 if (mach == bfd_mach_ppc_titan)
2230 mach = bfd_mach_ppc_e500mc;
2231 break;
2232
2233 case PPC_APUINFO_SPE:
2234 case PPC_APUINFO_EFS:
2235 case PPC_APUINFO_BRLOCK:
2236 if (mach != bfd_mach_ppc_vle)
2237 mach = bfd_mach_ppc_e500;
2238 break;
2239
2240 case PPC_APUINFO_VLE:
2241 mach = bfd_mach_ppc_vle;
2242 break;
2243
2244 default:
2245 mach = -1ul;
2246 }
2247 }
2248 free (contents);
2249 }
2250 }
2251
2252 if (mach != 0 && mach != -1ul)
2253 {
2254 const bfd_arch_info_type *arch;
2255
2256 for (arch = abfd->arch_info->next; arch; arch = arch->next)
2257 if (arch->mach == mach)
2258 {
2259 abfd->arch_info = arch;
2260 break;
2261 }
2262 }
2263 return TRUE;
2264 }
2265
2266 /* Fix bad default arch selected for a 32 bit input bfd when the
2267 default is 64 bit. Also select arch based on apuinfo. */
2268
2269 static bfd_boolean
2270 ppc_elf_object_p (bfd *abfd)
2271 {
2272 if (!abfd->arch_info->the_default)
2273 return TRUE;
2274
2275 if (abfd->arch_info->bits_per_word == 64)
2276 {
2277 Elf_Internal_Ehdr *i_ehdr = elf_elfheader (abfd);
2278
2279 if (i_ehdr->e_ident[EI_CLASS] == ELFCLASS32)
2280 {
2281 /* Relies on arch after 64 bit default being 32 bit default. */
2282 abfd->arch_info = abfd->arch_info->next;
2283 BFD_ASSERT (abfd->arch_info->bits_per_word == 32);
2284 }
2285 }
2286 return _bfd_elf_ppc_set_arch (abfd);
2287 }
2288
2289 /* Function to set whether a module needs the -mrelocatable bit set. */
2290
2291 static bfd_boolean
2292 ppc_elf_set_private_flags (bfd *abfd, flagword flags)
2293 {
2294 BFD_ASSERT (!elf_flags_init (abfd)
2295 || elf_elfheader (abfd)->e_flags == flags);
2296
2297 elf_elfheader (abfd)->e_flags = flags;
2298 elf_flags_init (abfd) = TRUE;
2299 return TRUE;
2300 }
2301
2302 /* Support for core dump NOTE sections. */
2303
2304 static bfd_boolean
2305 ppc_elf_grok_prstatus (bfd *abfd, Elf_Internal_Note *note)
2306 {
2307 int offset;
2308 unsigned int size;
2309
2310 switch (note->descsz)
2311 {
2312 default:
2313 return FALSE;
2314
2315 case 268: /* Linux/PPC. */
2316 /* pr_cursig */
2317 elf_tdata (abfd)->core->signal = bfd_get_16 (abfd, note->descdata + 12);
2318
2319 /* pr_pid */
2320 elf_tdata (abfd)->core->lwpid = bfd_get_32 (abfd, note->descdata + 24);
2321
2322 /* pr_reg */
2323 offset = 72;
2324 size = 192;
2325
2326 break;
2327 }
2328
2329 /* Make a ".reg/999" section. */
2330 return _bfd_elfcore_make_pseudosection (abfd, ".reg",
2331 size, note->descpos + offset);
2332 }
2333
2334 static bfd_boolean
2335 ppc_elf_grok_psinfo (bfd *abfd, Elf_Internal_Note *note)
2336 {
2337 switch (note->descsz)
2338 {
2339 default:
2340 return FALSE;
2341
2342 case 128: /* Linux/PPC elf_prpsinfo. */
2343 elf_tdata (abfd)->core->pid
2344 = bfd_get_32 (abfd, note->descdata + 16);
2345 elf_tdata (abfd)->core->program
2346 = _bfd_elfcore_strndup (abfd, note->descdata + 32, 16);
2347 elf_tdata (abfd)->core->command
2348 = _bfd_elfcore_strndup (abfd, note->descdata + 48, 80);
2349 }
2350
2351 /* Note that for some reason, a spurious space is tacked
2352 onto the end of the args in some (at least one anyway)
2353 implementations, so strip it off if it exists. */
2354
2355 {
2356 char *command = elf_tdata (abfd)->core->command;
2357 int n = strlen (command);
2358
2359 if (0 < n && command[n - 1] == ' ')
2360 command[n - 1] = '\0';
2361 }
2362
2363 return TRUE;
2364 }
2365
2366 static char *
2367 ppc_elf_write_core_note (bfd *abfd, char *buf, int *bufsiz, int note_type, ...)
2368 {
2369 switch (note_type)
2370 {
2371 default:
2372 return NULL;
2373
2374 case NT_PRPSINFO:
2375 {
2376 char data[128];
2377 va_list ap;
2378
2379 va_start (ap, note_type);
2380 memset (data, 0, sizeof (data));
2381 strncpy (data + 32, va_arg (ap, const char *), 16);
2382 strncpy (data + 48, va_arg (ap, const char *), 80);
2383 va_end (ap);
2384 return elfcore_write_note (abfd, buf, bufsiz,
2385 "CORE", note_type, data, sizeof (data));
2386 }
2387
2388 case NT_PRSTATUS:
2389 {
2390 char data[268];
2391 va_list ap;
2392 long pid;
2393 int cursig;
2394 const void *greg;
2395
2396 va_start (ap, note_type);
2397 memset (data, 0, 72);
2398 pid = va_arg (ap, long);
2399 bfd_put_32 (abfd, pid, data + 24);
2400 cursig = va_arg (ap, int);
2401 bfd_put_16 (abfd, cursig, data + 12);
2402 greg = va_arg (ap, const void *);
2403 memcpy (data + 72, greg, 192);
2404 memset (data + 264, 0, 4);
2405 va_end (ap);
2406 return elfcore_write_note (abfd, buf, bufsiz,
2407 "CORE", note_type, data, sizeof (data));
2408 }
2409 }
2410 }
2411
2412 static flagword
2413 ppc_elf_lookup_section_flags (char *flag_name)
2414 {
2415
2416 if (!strcmp (flag_name, "SHF_PPC_VLE"))
2417 return SHF_PPC_VLE;
2418
2419 return 0;
2420 }
2421
2422 /* Return address for Ith PLT stub in section PLT, for relocation REL
2423 or (bfd_vma) -1 if it should not be included. */
2424
2425 static bfd_vma
2426 ppc_elf_plt_sym_val (bfd_vma i ATTRIBUTE_UNUSED,
2427 const asection *plt ATTRIBUTE_UNUSED,
2428 const arelent *rel)
2429 {
2430 return rel->address;
2431 }
2432
2433 /* Handle a PowerPC specific section when reading an object file. This
2434 is called when bfd_section_from_shdr finds a section with an unknown
2435 type. */
2436
2437 static bfd_boolean
2438 ppc_elf_section_from_shdr (bfd *abfd,
2439 Elf_Internal_Shdr *hdr,
2440 const char *name,
2441 int shindex)
2442 {
2443 asection *newsect;
2444 flagword flags;
2445
2446 if (! _bfd_elf_make_section_from_shdr (abfd, hdr, name, shindex))
2447 return FALSE;
2448
2449 newsect = hdr->bfd_section;
2450 flags = bfd_get_section_flags (abfd, newsect);
2451 if (hdr->sh_flags & SHF_EXCLUDE)
2452 flags |= SEC_EXCLUDE;
2453
2454 if (hdr->sh_type == SHT_ORDERED)
2455 flags |= SEC_SORT_ENTRIES;
2456
2457 bfd_set_section_flags (abfd, newsect, flags);
2458 return TRUE;
2459 }
2460
2461 /* Set up any other section flags and such that may be necessary. */
2462
2463 static bfd_boolean
2464 ppc_elf_fake_sections (bfd *abfd ATTRIBUTE_UNUSED,
2465 Elf_Internal_Shdr *shdr,
2466 asection *asect)
2467 {
2468 if ((asect->flags & SEC_SORT_ENTRIES) != 0)
2469 shdr->sh_type = SHT_ORDERED;
2470
2471 return TRUE;
2472 }
2473
2474 /* If we have .sbss2 or .PPC.EMB.sbss0 output sections, we
2475 need to bump up the number of section headers. */
2476
2477 static int
2478 ppc_elf_additional_program_headers (bfd *abfd,
2479 struct bfd_link_info *info ATTRIBUTE_UNUSED)
2480 {
2481 asection *s;
2482 int ret = 0;
2483
2484 s = bfd_get_section_by_name (abfd, ".sbss2");
2485 if (s != NULL && (s->flags & SEC_ALLOC) != 0)
2486 ++ret;
2487
2488 s = bfd_get_section_by_name (abfd, ".PPC.EMB.sbss0");
2489 if (s != NULL && (s->flags & SEC_ALLOC) != 0)
2490 ++ret;
2491
2492 return ret;
2493 }
2494
2495 /* Modify the segment map for VLE executables. */
2496
2497 bfd_boolean
2498 ppc_elf_modify_segment_map (bfd *abfd,
2499 struct bfd_link_info *info ATTRIBUTE_UNUSED)
2500 {
2501 struct elf_segment_map *m;
2502
2503 /* At this point in the link, output sections have already been sorted by
2504 LMA and assigned to segments. All that is left to do is to ensure
2505 there is no mixing of VLE & non-VLE sections in a text segment.
2506 If we find that case, we split the segment.
2507 We maintain the original output section order. */
2508
2509 for (m = elf_seg_map (abfd); m != NULL; m = m->next)
2510 {
2511 struct elf_segment_map *n;
2512 bfd_size_type amt;
2513 unsigned int j, k;
2514 unsigned int p_flags;
2515
2516 if (m->p_type != PT_LOAD || m->count == 0)
2517 continue;
2518
2519 for (p_flags = PF_R, j = 0; j != m->count; ++j)
2520 {
2521 if ((m->sections[j]->flags & SEC_READONLY) == 0)
2522 p_flags |= PF_W;
2523 if ((m->sections[j]->flags & SEC_CODE) != 0)
2524 {
2525 p_flags |= PF_X;
2526 if ((elf_section_flags (m->sections[j]) & SHF_PPC_VLE) != 0)
2527 p_flags |= PF_PPC_VLE;
2528 break;
2529 }
2530 }
2531 if (j != m->count)
2532 while (++j != m->count)
2533 {
2534 unsigned int p_flags1 = PF_R;
2535
2536 if ((m->sections[j]->flags & SEC_READONLY) == 0)
2537 p_flags1 |= PF_W;
2538 if ((m->sections[j]->flags & SEC_CODE) != 0)
2539 {
2540 p_flags1 |= PF_X;
2541 if ((elf_section_flags (m->sections[j]) & SHF_PPC_VLE) != 0)
2542 p_flags1 |= PF_PPC_VLE;
2543 if (((p_flags1 ^ p_flags) & PF_PPC_VLE) != 0)
2544 break;
2545 }
2546 p_flags |= p_flags1;
2547 }
2548 /* If we're splitting a segment which originally contained rw
2549 sections then those sections might now only be in one of the
2550 two parts. So always set p_flags if splitting, even if we
2551 are being called for objcopy with p_flags_valid set. */
2552 if (j != m->count || !m->p_flags_valid)
2553 {
2554 m->p_flags_valid = 1;
2555 m->p_flags = p_flags;
2556 }
2557 if (j == m->count)
2558 continue;
2559
2560 /* Sections 0..j-1 stay in this (current) segment,
2561 the remainder are put in a new segment.
2562 The scan resumes with the new segment. */
2563
2564 amt = sizeof (struct elf_segment_map);
2565 amt += (m->count - j - 1) * sizeof (asection *);
2566 n = (struct elf_segment_map *) bfd_zalloc (abfd, amt);
2567 if (n == NULL)
2568 return FALSE;
2569
2570 n->p_type = PT_LOAD;
2571 n->count = m->count - j;
2572 for (k = 0; k < n->count; ++k)
2573 n->sections[k] = m->sections[j + k];
2574 m->count = j;
2575 m->p_size_valid = 0;
2576 n->next = m->next;
2577 m->next = n;
2578 }
2579
2580 return TRUE;
2581 }
2582
2583 /* Add extra PPC sections -- Note, for now, make .sbss2 and
2584 .PPC.EMB.sbss0 a normal section, and not a bss section so
2585 that the linker doesn't crater when trying to make more than
2586 2 sections. */
2587
2588 static const struct bfd_elf_special_section ppc_elf_special_sections[] =
2589 {
2590 { STRING_COMMA_LEN (".plt"), 0, SHT_NOBITS, SHF_ALLOC + SHF_EXECINSTR },
2591 { STRING_COMMA_LEN (".sbss"), -2, SHT_NOBITS, SHF_ALLOC + SHF_WRITE },
2592 { STRING_COMMA_LEN (".sbss2"), -2, SHT_PROGBITS, SHF_ALLOC },
2593 { STRING_COMMA_LEN (".sdata"), -2, SHT_PROGBITS, SHF_ALLOC + SHF_WRITE },
2594 { STRING_COMMA_LEN (".sdata2"), -2, SHT_PROGBITS, SHF_ALLOC },
2595 { STRING_COMMA_LEN (".tags"), 0, SHT_ORDERED, SHF_ALLOC },
2596 { STRING_COMMA_LEN (APUINFO_SECTION_NAME), 0, SHT_NOTE, 0 },
2597 { STRING_COMMA_LEN (".PPC.EMB.sbss0"), 0, SHT_PROGBITS, SHF_ALLOC },
2598 { STRING_COMMA_LEN (".PPC.EMB.sdata0"), 0, SHT_PROGBITS, SHF_ALLOC },
2599 { NULL, 0, 0, 0, 0 }
2600 };
2601
2602 /* This is what we want for new plt/got. */
2603 static struct bfd_elf_special_section ppc_alt_plt =
2604 { STRING_COMMA_LEN (".plt"), 0, SHT_PROGBITS, SHF_ALLOC };
2605
2606 static const struct bfd_elf_special_section *
2607 ppc_elf_get_sec_type_attr (bfd *abfd, asection *sec)
2608 {
2609 const struct bfd_elf_special_section *ssect;
2610
2611 /* See if this is one of the special sections. */
2612 if (sec->name == NULL)
2613 return NULL;
2614
2615 ssect = _bfd_elf_get_special_section (sec->name, ppc_elf_special_sections,
2616 sec->use_rela_p);
2617 if (ssect != NULL)
2618 {
2619 if (ssect == ppc_elf_special_sections && (sec->flags & SEC_LOAD) != 0)
2620 ssect = &ppc_alt_plt;
2621 return ssect;
2622 }
2623
2624 return _bfd_elf_get_sec_type_attr (abfd, sec);
2625 }
2626 \f
2627 /* Very simple linked list structure for recording apuinfo values. */
2628 typedef struct apuinfo_list
2629 {
2630 struct apuinfo_list *next;
2631 unsigned long value;
2632 }
2633 apuinfo_list;
2634
2635 static apuinfo_list *head;
2636 static bfd_boolean apuinfo_set;
2637
2638 static void
2639 apuinfo_list_init (void)
2640 {
2641 head = NULL;
2642 apuinfo_set = FALSE;
2643 }
2644
2645 static void
2646 apuinfo_list_add (unsigned long value)
2647 {
2648 apuinfo_list *entry = head;
2649
2650 while (entry != NULL)
2651 {
2652 if (entry->value == value)
2653 return;
2654 entry = entry->next;
2655 }
2656
2657 entry = bfd_malloc (sizeof (* entry));
2658 if (entry == NULL)
2659 return;
2660
2661 entry->value = value;
2662 entry->next = head;
2663 head = entry;
2664 }
2665
2666 static unsigned
2667 apuinfo_list_length (void)
2668 {
2669 apuinfo_list *entry;
2670 unsigned long count;
2671
2672 for (entry = head, count = 0;
2673 entry;
2674 entry = entry->next)
2675 ++ count;
2676
2677 return count;
2678 }
2679
2680 static inline unsigned long
2681 apuinfo_list_element (unsigned long number)
2682 {
2683 apuinfo_list * entry;
2684
2685 for (entry = head;
2686 entry && number --;
2687 entry = entry->next)
2688 ;
2689
2690 return entry ? entry->value : 0;
2691 }
2692
2693 static void
2694 apuinfo_list_finish (void)
2695 {
2696 apuinfo_list *entry;
2697
2698 for (entry = head; entry;)
2699 {
2700 apuinfo_list *next = entry->next;
2701 free (entry);
2702 entry = next;
2703 }
2704
2705 head = NULL;
2706 }
2707
2708 /* Scan the input BFDs and create a linked list of
2709 the APUinfo values that will need to be emitted. */
2710
2711 static void
2712 ppc_elf_begin_write_processing (bfd *abfd, struct bfd_link_info *link_info)
2713 {
2714 bfd *ibfd;
2715 asection *asec;
2716 char *buffer = NULL;
2717 bfd_size_type largest_input_size = 0;
2718 unsigned i;
2719 unsigned long length;
2720 const char *error_message = NULL;
2721
2722 if (link_info == NULL)
2723 return;
2724
2725 apuinfo_list_init ();
2726
2727 /* Read in the input sections contents. */
2728 for (ibfd = link_info->input_bfds; ibfd; ibfd = ibfd->link.next)
2729 {
2730 unsigned long datum;
2731
2732 asec = bfd_get_section_by_name (ibfd, APUINFO_SECTION_NAME);
2733 if (asec == NULL)
2734 continue;
2735
2736 /* xgettext:c-format */
2737 error_message = _("corrupt %s section in %pB");
2738 length = asec->size;
2739 if (length < 20)
2740 goto fail;
2741
2742 apuinfo_set = TRUE;
2743 if (largest_input_size < asec->size)
2744 {
2745 if (buffer)
2746 free (buffer);
2747 largest_input_size = asec->size;
2748 buffer = bfd_malloc (largest_input_size);
2749 if (!buffer)
2750 return;
2751 }
2752
2753 if (bfd_seek (ibfd, asec->filepos, SEEK_SET) != 0
2754 || (bfd_bread (buffer, length, ibfd) != length))
2755 {
2756 /* xgettext:c-format */
2757 error_message = _("unable to read in %s section from %pB");
2758 goto fail;
2759 }
2760
2761 /* Verify the contents of the header. Note - we have to
2762 extract the values this way in order to allow for a
2763 host whose endian-ness is different from the target. */
2764 datum = bfd_get_32 (ibfd, buffer);
2765 if (datum != sizeof APUINFO_LABEL)
2766 goto fail;
2767
2768 datum = bfd_get_32 (ibfd, buffer + 8);
2769 if (datum != 0x2)
2770 goto fail;
2771
2772 if (strcmp (buffer + 12, APUINFO_LABEL) != 0)
2773 goto fail;
2774
2775 /* Get the number of bytes used for apuinfo entries. */
2776 datum = bfd_get_32 (ibfd, buffer + 4);
2777 if (datum + 20 != length)
2778 goto fail;
2779
2780 /* Scan the apuinfo section, building a list of apuinfo numbers. */
2781 for (i = 0; i < datum; i += 4)
2782 apuinfo_list_add (bfd_get_32 (ibfd, buffer + 20 + i));
2783 }
2784
2785 error_message = NULL;
2786
2787 if (apuinfo_set)
2788 {
2789 /* Compute the size of the output section. */
2790 unsigned num_entries = apuinfo_list_length ();
2791
2792 /* Set the output section size, if it exists. */
2793 asec = bfd_get_section_by_name (abfd, APUINFO_SECTION_NAME);
2794
2795 if (asec && ! bfd_set_section_size (abfd, asec, 20 + num_entries * 4))
2796 {
2797 ibfd = abfd;
2798 /* xgettext:c-format */
2799 error_message = _("warning: unable to set size of %s section in %pB");
2800 }
2801 }
2802
2803 fail:
2804 if (buffer)
2805 free (buffer);
2806
2807 if (error_message)
2808 _bfd_error_handler (error_message, APUINFO_SECTION_NAME, ibfd);
2809 }
2810
2811 /* Prevent the output section from accumulating the input sections'
2812 contents. We have already stored this in our linked list structure. */
2813
2814 static bfd_boolean
2815 ppc_elf_write_section (bfd *abfd ATTRIBUTE_UNUSED,
2816 struct bfd_link_info *link_info ATTRIBUTE_UNUSED,
2817 asection *asec,
2818 bfd_byte *contents ATTRIBUTE_UNUSED)
2819 {
2820 return apuinfo_set && strcmp (asec->name, APUINFO_SECTION_NAME) == 0;
2821 }
2822
2823 /* Finally we can generate the output section. */
2824
2825 static void
2826 ppc_elf_final_write_processing (bfd *abfd, bfd_boolean linker ATTRIBUTE_UNUSED)
2827 {
2828 bfd_byte *buffer;
2829 asection *asec;
2830 unsigned i;
2831 unsigned num_entries;
2832 bfd_size_type length;
2833
2834 asec = bfd_get_section_by_name (abfd, APUINFO_SECTION_NAME);
2835 if (asec == NULL)
2836 return;
2837
2838 if (!apuinfo_set)
2839 return;
2840
2841 length = asec->size;
2842 if (length < 20)
2843 return;
2844
2845 buffer = bfd_malloc (length);
2846 if (buffer == NULL)
2847 {
2848 _bfd_error_handler
2849 (_("failed to allocate space for new APUinfo section"));
2850 return;
2851 }
2852
2853 /* Create the apuinfo header. */
2854 num_entries = apuinfo_list_length ();
2855 bfd_put_32 (abfd, sizeof APUINFO_LABEL, buffer);
2856 bfd_put_32 (abfd, num_entries * 4, buffer + 4);
2857 bfd_put_32 (abfd, 0x2, buffer + 8);
2858 strcpy ((char *) buffer + 12, APUINFO_LABEL);
2859
2860 length = 20;
2861 for (i = 0; i < num_entries; i++)
2862 {
2863 bfd_put_32 (abfd, apuinfo_list_element (i), buffer + length);
2864 length += 4;
2865 }
2866
2867 if (length != asec->size)
2868 _bfd_error_handler (_("failed to compute new APUinfo section"));
2869
2870 if (! bfd_set_section_contents (abfd, asec, buffer, (file_ptr) 0, length))
2871 _bfd_error_handler (_("failed to install new APUinfo section"));
2872
2873 free (buffer);
2874
2875 apuinfo_list_finish ();
2876 }
2877 \f
2878 static bfd_boolean
2879 is_nonpic_glink_stub (bfd *abfd, asection *glink, bfd_vma off)
2880 {
2881 bfd_byte buf[4 * 4];
2882
2883 if (!bfd_get_section_contents (abfd, glink, buf, off, sizeof buf))
2884 return FALSE;
2885
2886 return ((bfd_get_32 (abfd, buf + 0) & 0xffff0000) == LIS_11
2887 && (bfd_get_32 (abfd, buf + 4) & 0xffff0000) == LWZ_11_11
2888 && bfd_get_32 (abfd, buf + 8) == MTCTR_11
2889 && bfd_get_32 (abfd, buf + 12) == BCTR);
2890 }
2891
2892 static bfd_boolean
2893 section_covers_vma (bfd *abfd ATTRIBUTE_UNUSED, asection *section, void *ptr)
2894 {
2895 bfd_vma vma = *(bfd_vma *) ptr;
2896 return ((section->flags & SEC_ALLOC) != 0
2897 && section->vma <= vma
2898 && vma < section->vma + section->size);
2899 }
2900
2901 static long
2902 ppc_elf_get_synthetic_symtab (bfd *abfd, long symcount, asymbol **syms,
2903 long dynsymcount, asymbol **dynsyms,
2904 asymbol **ret)
2905 {
2906 bfd_boolean (*slurp_relocs) (bfd *, asection *, asymbol **, bfd_boolean);
2907 asection *plt, *relplt, *dynamic, *glink;
2908 bfd_vma glink_vma = 0;
2909 bfd_vma resolv_vma = 0;
2910 bfd_vma stub_off;
2911 asymbol *s;
2912 arelent *p;
2913 long count, i, stub_delta;
2914 size_t size;
2915 char *names;
2916 bfd_byte buf[4];
2917
2918 *ret = NULL;
2919
2920 if ((abfd->flags & (DYNAMIC | EXEC_P)) == 0)
2921 return 0;
2922
2923 if (dynsymcount <= 0)
2924 return 0;
2925
2926 relplt = bfd_get_section_by_name (abfd, ".rela.plt");
2927 if (relplt == NULL)
2928 return 0;
2929
2930 plt = bfd_get_section_by_name (abfd, ".plt");
2931 if (plt == NULL)
2932 return 0;
2933
2934 /* Call common code to handle old-style executable PLTs. */
2935 if (elf_section_flags (plt) & SHF_EXECINSTR)
2936 return _bfd_elf_get_synthetic_symtab (abfd, symcount, syms,
2937 dynsymcount, dynsyms, ret);
2938
2939 /* If this object was prelinked, the prelinker stored the address
2940 of .glink at got[1]. If it wasn't prelinked, got[1] will be zero. */
2941 dynamic = bfd_get_section_by_name (abfd, ".dynamic");
2942 if (dynamic != NULL)
2943 {
2944 bfd_byte *dynbuf, *extdyn, *extdynend;
2945 size_t extdynsize;
2946 void (*swap_dyn_in) (bfd *, const void *, Elf_Internal_Dyn *);
2947
2948 if (!bfd_malloc_and_get_section (abfd, dynamic, &dynbuf))
2949 return -1;
2950
2951 extdynsize = get_elf_backend_data (abfd)->s->sizeof_dyn;
2952 swap_dyn_in = get_elf_backend_data (abfd)->s->swap_dyn_in;
2953
2954 extdyn = dynbuf;
2955 extdynend = extdyn + dynamic->size;
2956 for (; extdyn < extdynend; extdyn += extdynsize)
2957 {
2958 Elf_Internal_Dyn dyn;
2959 (*swap_dyn_in) (abfd, extdyn, &dyn);
2960
2961 if (dyn.d_tag == DT_NULL)
2962 break;
2963
2964 if (dyn.d_tag == DT_PPC_GOT)
2965 {
2966 unsigned int g_o_t = dyn.d_un.d_val;
2967 asection *got = bfd_get_section_by_name (abfd, ".got");
2968 if (got != NULL
2969 && bfd_get_section_contents (abfd, got, buf,
2970 g_o_t - got->vma + 4, 4))
2971 glink_vma = bfd_get_32 (abfd, buf);
2972 break;
2973 }
2974 }
2975 free (dynbuf);
2976 }
2977
2978 /* Otherwise we read the first plt entry. */
2979 if (glink_vma == 0)
2980 {
2981 if (bfd_get_section_contents (abfd, plt, buf, 0, 4))
2982 glink_vma = bfd_get_32 (abfd, buf);
2983 }
2984
2985 if (glink_vma == 0)
2986 return 0;
2987
2988 /* The .glink section usually does not survive the final
2989 link; search for the section (usually .text) where the
2990 glink stubs now reside. */
2991 glink = bfd_sections_find_if (abfd, section_covers_vma, &glink_vma);
2992 if (glink == NULL)
2993 return 0;
2994
2995 /* Determine glink PLT resolver by reading the relative branch
2996 from the first glink stub. */
2997 if (bfd_get_section_contents (abfd, glink, buf,
2998 glink_vma - glink->vma, 4))
2999 {
3000 unsigned int insn = bfd_get_32 (abfd, buf);
3001
3002 /* The first glink stub may either branch to the resolver ... */
3003 insn ^= B;
3004 if ((insn & ~0x3fffffc) == 0)
3005 resolv_vma = glink_vma + (insn ^ 0x2000000) - 0x2000000;
3006
3007 /* ... or fall through a bunch of NOPs. */
3008 else if ((insn ^ B ^ NOP) == 0)
3009 for (i = 4;
3010 bfd_get_section_contents (abfd, glink, buf,
3011 glink_vma - glink->vma + i, 4);
3012 i += 4)
3013 if (bfd_get_32 (abfd, buf) != NOP)
3014 {
3015 resolv_vma = glink_vma + i;
3016 break;
3017 }
3018 }
3019
3020 count = relplt->size / sizeof (Elf32_External_Rela);
3021 /* If the stubs are those for -shared/-pie then we might have
3022 multiple stubs for each plt entry. If that is the case then
3023 there is no way to associate stubs with their plt entries short
3024 of figuring out the GOT pointer value used in the stub.
3025 The offsets tested here need to cover all possible values of
3026 GLINK_ENTRY_SIZE for other than __tls_get_addr_opt. */
3027 stub_off = glink_vma - glink->vma;
3028 for (stub_delta = 16; stub_delta <= 32; stub_delta += 8)
3029 if (is_nonpic_glink_stub (abfd, glink, stub_off - stub_delta))
3030 break;
3031 if (stub_delta > 32)
3032 return 0;
3033
3034 slurp_relocs = get_elf_backend_data (abfd)->s->slurp_reloc_table;
3035 if (! (*slurp_relocs) (abfd, relplt, dynsyms, TRUE))
3036 return -1;
3037
3038 size = count * sizeof (asymbol);
3039 p = relplt->relocation;
3040 for (i = 0; i < count; i++, p++)
3041 {
3042 size += strlen ((*p->sym_ptr_ptr)->name) + sizeof ("@plt");
3043 if (p->addend != 0)
3044 size += sizeof ("+0x") - 1 + 8;
3045 }
3046
3047 size += sizeof (asymbol) + sizeof ("__glink");
3048
3049 if (resolv_vma)
3050 size += sizeof (asymbol) + sizeof ("__glink_PLTresolve");
3051
3052 s = *ret = bfd_malloc (size);
3053 if (s == NULL)
3054 return -1;
3055
3056 stub_off = glink_vma - glink->vma;
3057 names = (char *) (s + count + 1 + (resolv_vma != 0));
3058 p = relplt->relocation + count - 1;
3059 for (i = 0; i < count; i++)
3060 {
3061 size_t len;
3062
3063 stub_off -= stub_delta;
3064 if (strcmp ((*p->sym_ptr_ptr)->name, "__tls_get_addr_opt") == 0)
3065 stub_off -= 32;
3066 *s = **p->sym_ptr_ptr;
3067 /* Undefined syms won't have BSF_LOCAL or BSF_GLOBAL set. Since
3068 we are defining a symbol, ensure one of them is set. */
3069 if ((s->flags & BSF_LOCAL) == 0)
3070 s->flags |= BSF_GLOBAL;
3071 s->flags |= BSF_SYNTHETIC;
3072 s->section = glink;
3073 s->value = stub_off;
3074 s->name = names;
3075 s->udata.p = NULL;
3076 len = strlen ((*p->sym_ptr_ptr)->name);
3077 memcpy (names, (*p->sym_ptr_ptr)->name, len);
3078 names += len;
3079 if (p->addend != 0)
3080 {
3081 memcpy (names, "+0x", sizeof ("+0x") - 1);
3082 names += sizeof ("+0x") - 1;
3083 bfd_sprintf_vma (abfd, names, p->addend);
3084 names += strlen (names);
3085 }
3086 memcpy (names, "@plt", sizeof ("@plt"));
3087 names += sizeof ("@plt");
3088 ++s;
3089 --p;
3090 }
3091
3092 /* Add a symbol at the start of the glink branch table. */
3093 memset (s, 0, sizeof *s);
3094 s->the_bfd = abfd;
3095 s->flags = BSF_GLOBAL | BSF_SYNTHETIC;
3096 s->section = glink;
3097 s->value = glink_vma - glink->vma;
3098 s->name = names;
3099 memcpy (names, "__glink", sizeof ("__glink"));
3100 names += sizeof ("__glink");
3101 s++;
3102 count++;
3103
3104 if (resolv_vma)
3105 {
3106 /* Add a symbol for the glink PLT resolver. */
3107 memset (s, 0, sizeof *s);
3108 s->the_bfd = abfd;
3109 s->flags = BSF_GLOBAL | BSF_SYNTHETIC;
3110 s->section = glink;
3111 s->value = resolv_vma - glink->vma;
3112 s->name = names;
3113 memcpy (names, "__glink_PLTresolve", sizeof ("__glink_PLTresolve"));
3114 names += sizeof ("__glink_PLTresolve");
3115 s++;
3116 count++;
3117 }
3118
3119 return count;
3120 }
3121 \f
3122 /* The following functions are specific to the ELF linker, while
3123 functions above are used generally. They appear in this file more
3124 or less in the order in which they are called. eg.
3125 ppc_elf_check_relocs is called early in the link process,
3126 ppc_elf_finish_dynamic_sections is one of the last functions
3127 called. */
3128
3129 /* Track PLT entries needed for a given symbol. We might need more
3130 than one glink entry per symbol when generating a pic binary. */
3131 struct plt_entry
3132 {
3133 struct plt_entry *next;
3134
3135 /* -fPIC uses multiple GOT sections, one per file, called ".got2".
3136 This field stores the offset into .got2 used to initialise the
3137 GOT pointer reg. It will always be at least 32768. (Current
3138 gcc always uses an offset of 32768, but ld -r will pack .got2
3139 sections together resulting in larger offsets). */
3140 bfd_vma addend;
3141
3142 /* The .got2 section. */
3143 asection *sec;
3144
3145 /* PLT refcount or offset. */
3146 union
3147 {
3148 bfd_signed_vma refcount;
3149 bfd_vma offset;
3150 } plt;
3151
3152 /* .glink stub offset. */
3153 bfd_vma glink_offset;
3154 };
3155
3156 /* Of those relocs that might be copied as dynamic relocs, this
3157 function selects those that must be copied when linking a shared
3158 library or PIE, even when the symbol is local. */
3159
3160 static int
3161 must_be_dyn_reloc (struct bfd_link_info *info,
3162 enum elf_ppc_reloc_type r_type)
3163 {
3164 switch (r_type)
3165 {
3166 default:
3167 /* Only relative relocs can be resolved when the object load
3168 address isn't fixed. DTPREL32 is excluded because the
3169 dynamic linker needs to differentiate global dynamic from
3170 local dynamic __tls_index pairs when PPC_OPT_TLS is set. */
3171 return 1;
3172
3173 case R_PPC_REL24:
3174 case R_PPC_REL14:
3175 case R_PPC_REL14_BRTAKEN:
3176 case R_PPC_REL14_BRNTAKEN:
3177 case R_PPC_REL32:
3178 return 0;
3179
3180 case R_PPC_TPREL32:
3181 case R_PPC_TPREL16:
3182 case R_PPC_TPREL16_LO:
3183 case R_PPC_TPREL16_HI:
3184 case R_PPC_TPREL16_HA:
3185 /* These relocations are relative but in a shared library the
3186 linker doesn't know the thread pointer base. */
3187 return bfd_link_dll (info);
3188 }
3189 }
3190
3191 /* If ELIMINATE_COPY_RELOCS is non-zero, the linker will try to avoid
3192 copying dynamic variables from a shared lib into an app's dynbss
3193 section, and instead use a dynamic relocation to point into the
3194 shared lib. */
3195 #define ELIMINATE_COPY_RELOCS 1
3196
3197 /* Used to track dynamic relocations for local symbols. */
3198 struct ppc_dyn_relocs
3199 {
3200 struct ppc_dyn_relocs *next;
3201
3202 /* The input section of the reloc. */
3203 asection *sec;
3204
3205 /* Total number of relocs copied for the input section. */
3206 unsigned int count : 31;
3207
3208 /* Whether this entry is for STT_GNU_IFUNC symbols. */
3209 unsigned int ifunc : 1;
3210 };
3211
3212 /* PPC ELF linker hash entry. */
3213
3214 struct ppc_elf_link_hash_entry
3215 {
3216 struct elf_link_hash_entry elf;
3217
3218 /* If this symbol is used in the linker created sections, the processor
3219 specific backend uses this field to map the field into the offset
3220 from the beginning of the section. */
3221 elf_linker_section_pointers_t *linker_section_pointer;
3222
3223 /* Track dynamic relocs copied for this symbol. */
3224 struct elf_dyn_relocs *dyn_relocs;
3225
3226 /* Contexts in which symbol is used in the GOT (or TOC).
3227 TLS_GD .. TLS_TLS bits are or'd into the mask as the
3228 corresponding relocs are encountered during check_relocs.
3229 tls_optimize clears TLS_GD .. TLS_TPREL when optimizing to
3230 indicate the corresponding GOT entry type is not needed. */
3231 #define TLS_GD 1 /* GD reloc. */
3232 #define TLS_LD 2 /* LD reloc. */
3233 #define TLS_TPREL 4 /* TPREL reloc, => IE. */
3234 #define TLS_DTPREL 8 /* DTPREL reloc, => LD. */
3235 #define TLS_TLS 16 /* Any TLS reloc. */
3236 #define TLS_TPRELGD 32 /* TPREL reloc resulting from GD->IE. */
3237 #define PLT_IFUNC 64 /* STT_GNU_IFUNC. */
3238 char tls_mask;
3239
3240 /* Nonzero if we have seen a small data relocation referring to this
3241 symbol. */
3242 unsigned char has_sda_refs : 1;
3243
3244 /* Flag use of given relocations. */
3245 unsigned char has_addr16_ha : 1;
3246 unsigned char has_addr16_lo : 1;
3247 };
3248
3249 #define ppc_elf_hash_entry(ent) ((struct ppc_elf_link_hash_entry *) (ent))
3250
3251 /* PPC ELF linker hash table. */
3252
3253 struct ppc_elf_link_hash_table
3254 {
3255 struct elf_link_hash_table elf;
3256
3257 /* Various options passed from the linker. */
3258 struct ppc_elf_params *params;
3259
3260 /* Short-cuts to get to dynamic linker sections. */
3261 asection *glink;
3262 asection *dynsbss;
3263 asection *relsbss;
3264 elf_linker_section_t sdata[2];
3265 asection *sbss;
3266 asection *glink_eh_frame;
3267
3268 /* The (unloaded but important) .rela.plt.unloaded on VxWorks. */
3269 asection *srelplt2;
3270
3271 /* Shortcut to __tls_get_addr. */
3272 struct elf_link_hash_entry *tls_get_addr;
3273
3274 /* The bfd that forced an old-style PLT. */
3275 bfd *old_bfd;
3276
3277 /* TLS local dynamic got entry handling. */
3278 union {
3279 bfd_signed_vma refcount;
3280 bfd_vma offset;
3281 } tlsld_got;
3282
3283 /* Offset of branch table to PltResolve function in glink. */
3284 bfd_vma glink_pltresolve;
3285
3286 /* Size of reserved GOT entries. */
3287 unsigned int got_header_size;
3288 /* Non-zero if allocating the header left a gap. */
3289 unsigned int got_gap;
3290
3291 /* The type of PLT we have chosen to use. */
3292 enum ppc_elf_plt_type plt_type;
3293
3294 /* True if the target system is VxWorks. */
3295 unsigned int is_vxworks:1;
3296
3297 /* Whether there exist local gnu indirect function resolvers,
3298 referenced by dynamic relocations. */
3299 unsigned int local_ifunc_resolver:1;
3300 unsigned int maybe_local_ifunc_resolver:1;
3301
3302 /* Set if tls optimization is enabled. */
3303 unsigned int do_tls_opt:1;
3304
3305 /* The size of PLT entries. */
3306 int plt_entry_size;
3307 /* The distance between adjacent PLT slots. */
3308 int plt_slot_size;
3309 /* The size of the first PLT entry. */
3310 int plt_initial_entry_size;
3311
3312 /* Small local sym cache. */
3313 struct sym_cache sym_cache;
3314 };
3315
3316 /* Rename some of the generic section flags to better document how they
3317 are used for ppc32. The flags are only valid for ppc32 elf objects. */
3318
3319 /* Nonzero if this section has TLS related relocations. */
3320 #define has_tls_reloc sec_flg0
3321
3322 /* Nonzero if this section has a call to __tls_get_addr. */
3323 #define has_tls_get_addr_call sec_flg1
3324
3325 /* Get the PPC ELF linker hash table from a link_info structure. */
3326
3327 #define ppc_elf_hash_table(p) \
3328 (elf_hash_table_id ((struct elf_link_hash_table *) ((p)->hash)) \
3329 == PPC32_ELF_DATA ? ((struct ppc_elf_link_hash_table *) ((p)->hash)) : NULL)
3330
3331 /* Create an entry in a PPC ELF linker hash table. */
3332
3333 static struct bfd_hash_entry *
3334 ppc_elf_link_hash_newfunc (struct bfd_hash_entry *entry,
3335 struct bfd_hash_table *table,
3336 const char *string)
3337 {
3338 /* Allocate the structure if it has not already been allocated by a
3339 subclass. */
3340 if (entry == NULL)
3341 {
3342 entry = bfd_hash_allocate (table,
3343 sizeof (struct ppc_elf_link_hash_entry));
3344 if (entry == NULL)
3345 return entry;
3346 }
3347
3348 /* Call the allocation method of the superclass. */
3349 entry = _bfd_elf_link_hash_newfunc (entry, table, string);
3350 if (entry != NULL)
3351 {
3352 ppc_elf_hash_entry (entry)->linker_section_pointer = NULL;
3353 ppc_elf_hash_entry (entry)->dyn_relocs = NULL;
3354 ppc_elf_hash_entry (entry)->tls_mask = 0;
3355 ppc_elf_hash_entry (entry)->has_sda_refs = 0;
3356 }
3357
3358 return entry;
3359 }
3360
3361 /* Create a PPC ELF linker hash table. */
3362
3363 static struct bfd_link_hash_table *
3364 ppc_elf_link_hash_table_create (bfd *abfd)
3365 {
3366 struct ppc_elf_link_hash_table *ret;
3367 static struct ppc_elf_params default_params
3368 = { PLT_OLD, 0, 0, 1, 0, 0, 12, 0, 0, 0 };
3369
3370 ret = bfd_zmalloc (sizeof (struct ppc_elf_link_hash_table));
3371 if (ret == NULL)
3372 return NULL;
3373
3374 if (!_bfd_elf_link_hash_table_init (&ret->elf, abfd,
3375 ppc_elf_link_hash_newfunc,
3376 sizeof (struct ppc_elf_link_hash_entry),
3377 PPC32_ELF_DATA))
3378 {
3379 free (ret);
3380 return NULL;
3381 }
3382
3383 ret->elf.init_plt_refcount.refcount = 0;
3384 ret->elf.init_plt_refcount.glist = NULL;
3385 ret->elf.init_plt_offset.offset = 0;
3386 ret->elf.init_plt_offset.glist = NULL;
3387
3388 ret->params = &default_params;
3389
3390 ret->sdata[0].name = ".sdata";
3391 ret->sdata[0].sym_name = "_SDA_BASE_";
3392 ret->sdata[0].bss_name = ".sbss";
3393
3394 ret->sdata[1].name = ".sdata2";
3395 ret->sdata[1].sym_name = "_SDA2_BASE_";
3396 ret->sdata[1].bss_name = ".sbss2";
3397
3398 ret->plt_entry_size = 12;
3399 ret->plt_slot_size = 8;
3400 ret->plt_initial_entry_size = 72;
3401
3402 return &ret->elf.root;
3403 }
3404
3405 /* Hook linker params into hash table. */
3406
3407 void
3408 ppc_elf_link_params (struct bfd_link_info *info, struct ppc_elf_params *params)
3409 {
3410 struct ppc_elf_link_hash_table *htab = ppc_elf_hash_table (info);
3411
3412 if (htab)
3413 htab->params = params;
3414 params->pagesize_p2 = bfd_log2 (params->pagesize);
3415 }
3416
3417 /* Create .got and the related sections. */
3418
3419 static bfd_boolean
3420 ppc_elf_create_got (bfd *abfd, struct bfd_link_info *info)
3421 {
3422 struct ppc_elf_link_hash_table *htab;
3423
3424 if (!_bfd_elf_create_got_section (abfd, info))
3425 return FALSE;
3426
3427 htab = ppc_elf_hash_table (info);
3428 if (!htab->is_vxworks)
3429 {
3430 /* The powerpc .got has a blrl instruction in it. Mark it
3431 executable. */
3432 flagword flags = (SEC_ALLOC | SEC_LOAD | SEC_CODE | SEC_HAS_CONTENTS
3433 | SEC_IN_MEMORY | SEC_LINKER_CREATED);
3434 if (!bfd_set_section_flags (abfd, htab->elf.sgot, flags))
3435 return FALSE;
3436 }
3437
3438 return TRUE;
3439 }
3440
3441 /* Create a special linker section, used for R_PPC_EMB_SDAI16 and
3442 R_PPC_EMB_SDA2I16 pointers. These sections become part of .sdata
3443 and .sdata2. Create _SDA_BASE_ and _SDA2_BASE too. */
3444
3445 static bfd_boolean
3446 ppc_elf_create_linker_section (bfd *abfd,
3447 struct bfd_link_info *info,
3448 flagword flags,
3449 elf_linker_section_t *lsect)
3450 {
3451 asection *s;
3452
3453 flags |= (SEC_ALLOC | SEC_LOAD | SEC_HAS_CONTENTS | SEC_IN_MEMORY
3454 | SEC_LINKER_CREATED);
3455
3456 s = bfd_make_section_anyway_with_flags (abfd, lsect->name, flags);
3457 if (s == NULL)
3458 return FALSE;
3459 lsect->section = s;
3460
3461 /* Define the sym on the first section of this name. */
3462 s = bfd_get_section_by_name (abfd, lsect->name);
3463
3464 lsect->sym = _bfd_elf_define_linkage_sym (abfd, info, s, lsect->sym_name);
3465 if (lsect->sym == NULL)
3466 return FALSE;
3467 lsect->sym->root.u.def.value = 0x8000;
3468 return TRUE;
3469 }
3470
3471 static bfd_boolean
3472 ppc_elf_create_glink (bfd *abfd, struct bfd_link_info *info)
3473 {
3474 struct ppc_elf_link_hash_table *htab = ppc_elf_hash_table (info);
3475 asection *s;
3476 flagword flags;
3477 int p2align;
3478
3479 flags = (SEC_ALLOC | SEC_LOAD | SEC_CODE | SEC_READONLY | SEC_HAS_CONTENTS
3480 | SEC_IN_MEMORY | SEC_LINKER_CREATED);
3481 s = bfd_make_section_anyway_with_flags (abfd, ".glink", flags);
3482 htab->glink = s;
3483 p2align = htab->params->ppc476_workaround ? 6 : 4;
3484 if (p2align < htab->params->plt_stub_align)
3485 p2align = htab->params->plt_stub_align;
3486 if (s == NULL
3487 || !bfd_set_section_alignment (abfd, s, p2align))
3488 return FALSE;
3489
3490 if (!info->no_ld_generated_unwind_info)
3491 {
3492 flags = (SEC_ALLOC | SEC_LOAD | SEC_READONLY | SEC_HAS_CONTENTS
3493 | SEC_IN_MEMORY | SEC_LINKER_CREATED);
3494 s = bfd_make_section_anyway_with_flags (abfd, ".eh_frame", flags);
3495 htab->glink_eh_frame = s;
3496 if (s == NULL
3497 || !bfd_set_section_alignment (abfd, s, 2))
3498 return FALSE;
3499 }
3500
3501 flags = SEC_ALLOC | SEC_LINKER_CREATED;
3502 s = bfd_make_section_anyway_with_flags (abfd, ".iplt", flags);
3503 htab->elf.iplt = s;
3504 if (s == NULL
3505 || !bfd_set_section_alignment (abfd, s, 4))
3506 return FALSE;
3507
3508 flags = (SEC_ALLOC | SEC_LOAD | SEC_READONLY | SEC_HAS_CONTENTS
3509 | SEC_IN_MEMORY | SEC_LINKER_CREATED);
3510 s = bfd_make_section_anyway_with_flags (abfd, ".rela.iplt", flags);
3511 htab->elf.irelplt = s;
3512 if (s == NULL
3513 || ! bfd_set_section_alignment (abfd, s, 2))
3514 return FALSE;
3515
3516 if (!ppc_elf_create_linker_section (abfd, info, 0,
3517 &htab->sdata[0]))
3518 return FALSE;
3519
3520 if (!ppc_elf_create_linker_section (abfd, info, SEC_READONLY,
3521 &htab->sdata[1]))
3522 return FALSE;
3523
3524 return TRUE;
3525 }
3526
3527 /* We have to create .dynsbss and .rela.sbss here so that they get mapped
3528 to output sections (just like _bfd_elf_create_dynamic_sections has
3529 to create .dynbss and .rela.bss). */
3530
3531 static bfd_boolean
3532 ppc_elf_create_dynamic_sections (bfd *abfd, struct bfd_link_info *info)
3533 {
3534 struct ppc_elf_link_hash_table *htab;
3535 asection *s;
3536 flagword flags;
3537
3538 htab = ppc_elf_hash_table (info);
3539
3540 if (htab->elf.sgot == NULL
3541 && !ppc_elf_create_got (abfd, info))
3542 return FALSE;
3543
3544 if (!_bfd_elf_create_dynamic_sections (abfd, info))
3545 return FALSE;
3546
3547 if (htab->glink == NULL
3548 && !ppc_elf_create_glink (abfd, info))
3549 return FALSE;
3550
3551 s = bfd_make_section_anyway_with_flags (abfd, ".dynsbss",
3552 SEC_ALLOC | SEC_LINKER_CREATED);
3553 htab->dynsbss = s;
3554 if (s == NULL)
3555 return FALSE;
3556
3557 if (! bfd_link_pic (info))
3558 {
3559 flags = (SEC_ALLOC | SEC_LOAD | SEC_READONLY | SEC_HAS_CONTENTS
3560 | SEC_IN_MEMORY | SEC_LINKER_CREATED);
3561 s = bfd_make_section_anyway_with_flags (abfd, ".rela.sbss", flags);
3562 htab->relsbss = s;
3563 if (s == NULL
3564 || ! bfd_set_section_alignment (abfd, s, 2))
3565 return FALSE;
3566 }
3567
3568 if (htab->is_vxworks
3569 && !elf_vxworks_create_dynamic_sections (abfd, info, &htab->srelplt2))
3570 return FALSE;
3571
3572 s = htab->elf.splt;
3573 flags = SEC_ALLOC | SEC_CODE | SEC_LINKER_CREATED;
3574 if (htab->plt_type == PLT_VXWORKS)
3575 /* The VxWorks PLT is a loaded section with contents. */
3576 flags |= SEC_HAS_CONTENTS | SEC_LOAD | SEC_READONLY;
3577 return bfd_set_section_flags (abfd, s, flags);
3578 }
3579
3580 /* Copy the extra info we tack onto an elf_link_hash_entry. */
3581
3582 static void
3583 ppc_elf_copy_indirect_symbol (struct bfd_link_info *info,
3584 struct elf_link_hash_entry *dir,
3585 struct elf_link_hash_entry *ind)
3586 {
3587 struct ppc_elf_link_hash_entry *edir, *eind;
3588
3589 edir = (struct ppc_elf_link_hash_entry *) dir;
3590 eind = (struct ppc_elf_link_hash_entry *) ind;
3591
3592 edir->tls_mask |= eind->tls_mask;
3593 edir->has_sda_refs |= eind->has_sda_refs;
3594
3595 if (edir->elf.versioned != versioned_hidden)
3596 edir->elf.ref_dynamic |= eind->elf.ref_dynamic;
3597 edir->elf.ref_regular |= eind->elf.ref_regular;
3598 edir->elf.ref_regular_nonweak |= eind->elf.ref_regular_nonweak;
3599 edir->elf.non_got_ref |= eind->elf.non_got_ref;
3600 edir->elf.needs_plt |= eind->elf.needs_plt;
3601 edir->elf.pointer_equality_needed |= eind->elf.pointer_equality_needed;
3602
3603 /* If we were called to copy over info for a weak sym, that's all. */
3604 if (eind->elf.root.type != bfd_link_hash_indirect)
3605 return;
3606
3607 if (eind->dyn_relocs != NULL)
3608 {
3609 if (edir->dyn_relocs != NULL)
3610 {
3611 struct elf_dyn_relocs **pp;
3612 struct elf_dyn_relocs *p;
3613
3614 /* Add reloc counts against the indirect sym to the direct sym
3615 list. Merge any entries against the same section. */
3616 for (pp = &eind->dyn_relocs; (p = *pp) != NULL; )
3617 {
3618 struct elf_dyn_relocs *q;
3619
3620 for (q = edir->dyn_relocs; q != NULL; q = q->next)
3621 if (q->sec == p->sec)
3622 {
3623 q->pc_count += p->pc_count;
3624 q->count += p->count;
3625 *pp = p->next;
3626 break;
3627 }
3628 if (q == NULL)
3629 pp = &p->next;
3630 }
3631 *pp = edir->dyn_relocs;
3632 }
3633
3634 edir->dyn_relocs = eind->dyn_relocs;
3635 eind->dyn_relocs = NULL;
3636 }
3637
3638 /* Copy over the GOT refcount entries that we may have already seen to
3639 the symbol which just became indirect. */
3640 edir->elf.got.refcount += eind->elf.got.refcount;
3641 eind->elf.got.refcount = 0;
3642
3643 /* And plt entries. */
3644 if (eind->elf.plt.plist != NULL)
3645 {
3646 if (edir->elf.plt.plist != NULL)
3647 {
3648 struct plt_entry **entp;
3649 struct plt_entry *ent;
3650
3651 for (entp = &eind->elf.plt.plist; (ent = *entp) != NULL; )
3652 {
3653 struct plt_entry *dent;
3654
3655 for (dent = edir->elf.plt.plist; dent != NULL; dent = dent->next)
3656 if (dent->sec == ent->sec && dent->addend == ent->addend)
3657 {
3658 dent->plt.refcount += ent->plt.refcount;
3659 *entp = ent->next;
3660 break;
3661 }
3662 if (dent == NULL)
3663 entp = &ent->next;
3664 }
3665 *entp = edir->elf.plt.plist;
3666 }
3667
3668 edir->elf.plt.plist = eind->elf.plt.plist;
3669 eind->elf.plt.plist = NULL;
3670 }
3671
3672 if (eind->elf.dynindx != -1)
3673 {
3674 if (edir->elf.dynindx != -1)
3675 _bfd_elf_strtab_delref (elf_hash_table (info)->dynstr,
3676 edir->elf.dynstr_index);
3677 edir->elf.dynindx = eind->elf.dynindx;
3678 edir->elf.dynstr_index = eind->elf.dynstr_index;
3679 eind->elf.dynindx = -1;
3680 eind->elf.dynstr_index = 0;
3681 }
3682 }
3683
3684 /* Hook called by the linker routine which adds symbols from an object
3685 file. We use it to put .comm items in .sbss, and not .bss. */
3686
3687 static bfd_boolean
3688 ppc_elf_add_symbol_hook (bfd *abfd,
3689 struct bfd_link_info *info,
3690 Elf_Internal_Sym *sym,
3691 const char **namep ATTRIBUTE_UNUSED,
3692 flagword *flagsp ATTRIBUTE_UNUSED,
3693 asection **secp,
3694 bfd_vma *valp)
3695 {
3696 if (sym->st_shndx == SHN_COMMON
3697 && !bfd_link_relocatable (info)
3698 && is_ppc_elf (info->output_bfd)
3699 && sym->st_size <= elf_gp_size (abfd))
3700 {
3701 /* Common symbols less than or equal to -G nn bytes are automatically
3702 put into .sbss. */
3703 struct ppc_elf_link_hash_table *htab;
3704
3705 htab = ppc_elf_hash_table (info);
3706 if (htab->sbss == NULL)
3707 {
3708 flagword flags = SEC_IS_COMMON | SEC_LINKER_CREATED;
3709
3710 if (!htab->elf.dynobj)
3711 htab->elf.dynobj = abfd;
3712
3713 htab->sbss = bfd_make_section_anyway_with_flags (htab->elf.dynobj,
3714 ".sbss",
3715 flags);
3716 if (htab->sbss == NULL)
3717 return FALSE;
3718 }
3719
3720 *secp = htab->sbss;
3721 *valp = sym->st_size;
3722 }
3723
3724 if (ELF_ST_TYPE (sym->st_info) == STT_GNU_IFUNC
3725 && (abfd->flags & DYNAMIC) == 0
3726 && bfd_get_flavour (info->output_bfd) == bfd_target_elf_flavour)
3727 elf_tdata (info->output_bfd)->has_gnu_symbols |= elf_gnu_symbol_ifunc;
3728
3729 return TRUE;
3730 }
3731 \f
3732 /* Find a linker generated pointer with a given addend and type. */
3733
3734 static elf_linker_section_pointers_t *
3735 elf_find_pointer_linker_section
3736 (elf_linker_section_pointers_t *linker_pointers,
3737 bfd_vma addend,
3738 elf_linker_section_t *lsect)
3739 {
3740 for ( ; linker_pointers != NULL; linker_pointers = linker_pointers->next)
3741 if (lsect == linker_pointers->lsect && addend == linker_pointers->addend)
3742 return linker_pointers;
3743
3744 return NULL;
3745 }
3746
3747 /* Allocate a pointer to live in a linker created section. */
3748
3749 static bfd_boolean
3750 elf_allocate_pointer_linker_section (bfd *abfd,
3751 elf_linker_section_t *lsect,
3752 struct elf_link_hash_entry *h,
3753 const Elf_Internal_Rela *rel)
3754 {
3755 elf_linker_section_pointers_t **ptr_linker_section_ptr = NULL;
3756 elf_linker_section_pointers_t *linker_section_ptr;
3757 unsigned long r_symndx = ELF32_R_SYM (rel->r_info);
3758 bfd_size_type amt;
3759
3760 BFD_ASSERT (lsect != NULL);
3761
3762 /* Is this a global symbol? */
3763 if (h != NULL)
3764 {
3765 struct ppc_elf_link_hash_entry *eh;
3766
3767 /* Has this symbol already been allocated? If so, our work is done. */
3768 eh = (struct ppc_elf_link_hash_entry *) h;
3769 if (elf_find_pointer_linker_section (eh->linker_section_pointer,
3770 rel->r_addend,
3771 lsect))
3772 return TRUE;
3773
3774 ptr_linker_section_ptr = &eh->linker_section_pointer;
3775 }
3776 else
3777 {
3778 BFD_ASSERT (is_ppc_elf (abfd));
3779
3780 /* Allocation of a pointer to a local symbol. */
3781 elf_linker_section_pointers_t **ptr = elf_local_ptr_offsets (abfd);
3782
3783 /* Allocate a table to hold the local symbols if first time. */
3784 if (!ptr)
3785 {
3786 unsigned int num_symbols = elf_symtab_hdr (abfd).sh_info;
3787
3788 amt = num_symbols;
3789 amt *= sizeof (elf_linker_section_pointers_t *);
3790 ptr = bfd_zalloc (abfd, amt);
3791
3792 if (!ptr)
3793 return FALSE;
3794
3795 elf_local_ptr_offsets (abfd) = ptr;
3796 }
3797
3798 /* Has this symbol already been allocated? If so, our work is done. */
3799 if (elf_find_pointer_linker_section (ptr[r_symndx],
3800 rel->r_addend,
3801 lsect))
3802 return TRUE;
3803
3804 ptr_linker_section_ptr = &ptr[r_symndx];
3805 }
3806
3807 /* Allocate space for a pointer in the linker section, and allocate
3808 a new pointer record from internal memory. */
3809 BFD_ASSERT (ptr_linker_section_ptr != NULL);
3810 amt = sizeof (elf_linker_section_pointers_t);
3811 linker_section_ptr = bfd_alloc (abfd, amt);
3812
3813 if (!linker_section_ptr)
3814 return FALSE;
3815
3816 linker_section_ptr->next = *ptr_linker_section_ptr;
3817 linker_section_ptr->addend = rel->r_addend;
3818 linker_section_ptr->lsect = lsect;
3819 *ptr_linker_section_ptr = linker_section_ptr;
3820
3821 if (!bfd_set_section_alignment (lsect->section->owner, lsect->section, 2))
3822 return FALSE;
3823 linker_section_ptr->offset = lsect->section->size;
3824 lsect->section->size += 4;
3825
3826 #ifdef DEBUG
3827 fprintf (stderr,
3828 "Create pointer in linker section %s, offset = %ld, section size = %ld\n",
3829 lsect->name, (long) linker_section_ptr->offset,
3830 (long) lsect->section->size);
3831 #endif
3832
3833 return TRUE;
3834 }
3835
3836 static struct plt_entry **
3837 update_local_sym_info (bfd *abfd,
3838 Elf_Internal_Shdr *symtab_hdr,
3839 unsigned long r_symndx,
3840 int tls_type)
3841 {
3842 bfd_signed_vma *local_got_refcounts = elf_local_got_refcounts (abfd);
3843 struct plt_entry **local_plt;
3844 char *local_got_tls_masks;
3845
3846 if (local_got_refcounts == NULL)
3847 {
3848 bfd_size_type size = symtab_hdr->sh_info;
3849
3850 size *= (sizeof (*local_got_refcounts)
3851 + sizeof (*local_plt)
3852 + sizeof (*local_got_tls_masks));
3853 local_got_refcounts = bfd_zalloc (abfd, size);
3854 if (local_got_refcounts == NULL)
3855 return NULL;
3856 elf_local_got_refcounts (abfd) = local_got_refcounts;
3857 }
3858
3859 local_plt = (struct plt_entry **) (local_got_refcounts + symtab_hdr->sh_info);
3860 local_got_tls_masks = (char *) (local_plt + symtab_hdr->sh_info);
3861 local_got_tls_masks[r_symndx] |= tls_type;
3862 if (tls_type != PLT_IFUNC)
3863 local_got_refcounts[r_symndx] += 1;
3864 return local_plt + r_symndx;
3865 }
3866
3867 static bfd_boolean
3868 update_plt_info (bfd *abfd, struct plt_entry **plist,
3869 asection *sec, bfd_vma addend)
3870 {
3871 struct plt_entry *ent;
3872
3873 if (addend < 32768)
3874 sec = NULL;
3875 for (ent = *plist; ent != NULL; ent = ent->next)
3876 if (ent->sec == sec && ent->addend == addend)
3877 break;
3878 if (ent == NULL)
3879 {
3880 bfd_size_type amt = sizeof (*ent);
3881 ent = bfd_alloc (abfd, amt);
3882 if (ent == NULL)
3883 return FALSE;
3884 ent->next = *plist;
3885 ent->sec = sec;
3886 ent->addend = addend;
3887 ent->plt.refcount = 0;
3888 *plist = ent;
3889 }
3890 ent->plt.refcount += 1;
3891 return TRUE;
3892 }
3893
3894 static struct plt_entry *
3895 find_plt_ent (struct plt_entry **plist, asection *sec, bfd_vma addend)
3896 {
3897 struct plt_entry *ent;
3898
3899 if (addend < 32768)
3900 sec = NULL;
3901 for (ent = *plist; ent != NULL; ent = ent->next)
3902 if (ent->sec == sec && ent->addend == addend)
3903 break;
3904 return ent;
3905 }
3906
3907 static bfd_boolean
3908 is_branch_reloc (enum elf_ppc_reloc_type r_type)
3909 {
3910 return (r_type == R_PPC_PLTREL24
3911 || r_type == R_PPC_LOCAL24PC
3912 || r_type == R_PPC_REL24
3913 || r_type == R_PPC_REL14
3914 || r_type == R_PPC_REL14_BRTAKEN
3915 || r_type == R_PPC_REL14_BRNTAKEN
3916 || r_type == R_PPC_ADDR24
3917 || r_type == R_PPC_ADDR14
3918 || r_type == R_PPC_ADDR14_BRTAKEN
3919 || r_type == R_PPC_ADDR14_BRNTAKEN
3920 || r_type == R_PPC_VLE_REL24);
3921 }
3922
3923 static void
3924 bad_shared_reloc (bfd *abfd, enum elf_ppc_reloc_type r_type)
3925 {
3926 _bfd_error_handler
3927 /* xgettext:c-format */
3928 (_("%pB: relocation %s cannot be used when making a shared object"),
3929 abfd,
3930 ppc_elf_howto_table[r_type]->name);
3931 bfd_set_error (bfd_error_bad_value);
3932 }
3933
3934 /* Look through the relocs for a section during the first phase, and
3935 allocate space in the global offset table or procedure linkage
3936 table. */
3937
3938 static bfd_boolean
3939 ppc_elf_check_relocs (bfd *abfd,
3940 struct bfd_link_info *info,
3941 asection *sec,
3942 const Elf_Internal_Rela *relocs)
3943 {
3944 struct ppc_elf_link_hash_table *htab;
3945 Elf_Internal_Shdr *symtab_hdr;
3946 struct elf_link_hash_entry **sym_hashes;
3947 const Elf_Internal_Rela *rel;
3948 const Elf_Internal_Rela *rel_end;
3949 asection *got2, *sreloc;
3950 struct elf_link_hash_entry *tga;
3951
3952 if (bfd_link_relocatable (info))
3953 return TRUE;
3954
3955 /* Don't do anything special with non-loaded, non-alloced sections.
3956 In particular, any relocs in such sections should not affect GOT
3957 and PLT reference counting (ie. we don't allow them to create GOT
3958 or PLT entries), there's no possibility or desire to optimize TLS
3959 relocs, and there's not much point in propagating relocs to shared
3960 libs that the dynamic linker won't relocate. */
3961 if ((sec->flags & SEC_ALLOC) == 0)
3962 return TRUE;
3963
3964 #ifdef DEBUG
3965 _bfd_error_handler ("ppc_elf_check_relocs called for section %pA in %pB",
3966 sec, abfd);
3967 #endif
3968
3969 BFD_ASSERT (is_ppc_elf (abfd));
3970
3971 /* Initialize howto table if not already done. */
3972 if (!ppc_elf_howto_table[R_PPC_ADDR32])
3973 ppc_elf_howto_init ();
3974
3975 htab = ppc_elf_hash_table (info);
3976 if (htab->glink == NULL)
3977 {
3978 if (htab->elf.dynobj == NULL)
3979 htab->elf.dynobj = abfd;
3980 if (!ppc_elf_create_glink (htab->elf.dynobj, info))
3981 return FALSE;
3982 }
3983 tga = elf_link_hash_lookup (&htab->elf, "__tls_get_addr",
3984 FALSE, FALSE, TRUE);
3985 symtab_hdr = &elf_symtab_hdr (abfd);
3986 sym_hashes = elf_sym_hashes (abfd);
3987 got2 = bfd_get_section_by_name (abfd, ".got2");
3988 sreloc = NULL;
3989
3990 rel_end = relocs + sec->reloc_count;
3991 for (rel = relocs; rel < rel_end; rel++)
3992 {
3993 unsigned long r_symndx;
3994 enum elf_ppc_reloc_type r_type;
3995 struct elf_link_hash_entry *h;
3996 int tls_type;
3997 struct plt_entry **ifunc;
3998
3999 r_symndx = ELF32_R_SYM (rel->r_info);
4000 if (r_symndx < symtab_hdr->sh_info)
4001 h = NULL;
4002 else
4003 {
4004 h = sym_hashes[r_symndx - symtab_hdr->sh_info];
4005 while (h->root.type == bfd_link_hash_indirect
4006 || h->root.type == bfd_link_hash_warning)
4007 h = (struct elf_link_hash_entry *) h->root.u.i.link;
4008 }
4009
4010 /* If a relocation refers to _GLOBAL_OFFSET_TABLE_, create the .got.
4011 This shows up in particular in an R_PPC_ADDR32 in the eabi
4012 startup code. */
4013 if (h != NULL
4014 && htab->elf.sgot == NULL
4015 && strcmp (h->root.root.string, "_GLOBAL_OFFSET_TABLE_") == 0)
4016 {
4017 if (htab->elf.dynobj == NULL)
4018 htab->elf.dynobj = abfd;
4019 if (!ppc_elf_create_got (htab->elf.dynobj, info))
4020 return FALSE;
4021 BFD_ASSERT (h == htab->elf.hgot);
4022 }
4023
4024 tls_type = 0;
4025 r_type = ELF32_R_TYPE (rel->r_info);
4026 ifunc = NULL;
4027 if (h == NULL && !htab->is_vxworks)
4028 {
4029 Elf_Internal_Sym *isym = bfd_sym_from_r_symndx (&htab->sym_cache,
4030 abfd, r_symndx);
4031 if (isym == NULL)
4032 return FALSE;
4033
4034 if (ELF_ST_TYPE (isym->st_info) == STT_GNU_IFUNC)
4035 {
4036 /* Set PLT_IFUNC flag for this sym, no GOT entry yet. */
4037 ifunc = update_local_sym_info (abfd, symtab_hdr, r_symndx,
4038 PLT_IFUNC);
4039 if (ifunc == NULL)
4040 return FALSE;
4041
4042 /* STT_GNU_IFUNC symbols must have a PLT entry;
4043 In a non-pie executable even when there are
4044 no plt calls. */
4045 if (!bfd_link_pic (info)
4046 || is_branch_reloc (r_type))
4047 {
4048 bfd_vma addend = 0;
4049 if (r_type == R_PPC_PLTREL24)
4050 {
4051 ppc_elf_tdata (abfd)->makes_plt_call = 1;
4052 if (bfd_link_pic (info))
4053 addend = rel->r_addend;
4054 }
4055 if (!update_plt_info (abfd, ifunc, got2, addend))
4056 return FALSE;
4057 }
4058 }
4059 }
4060
4061 if (!htab->is_vxworks
4062 && is_branch_reloc (r_type)
4063 && h != NULL
4064 && h == tga)
4065 {
4066 if (rel != relocs
4067 && (ELF32_R_TYPE (rel[-1].r_info) == R_PPC_TLSGD
4068 || ELF32_R_TYPE (rel[-1].r_info) == R_PPC_TLSLD))
4069 /* We have a new-style __tls_get_addr call with a marker
4070 reloc. */
4071 ;
4072 else
4073 /* Mark this section as having an old-style call. */
4074 sec->has_tls_get_addr_call = 1;
4075 }
4076
4077 switch (r_type)
4078 {
4079 case R_PPC_TLSGD:
4080 case R_PPC_TLSLD:
4081 /* These special tls relocs tie a call to __tls_get_addr with
4082 its parameter symbol. */
4083 break;
4084
4085 case R_PPC_GOT_TLSLD16:
4086 case R_PPC_GOT_TLSLD16_LO:
4087 case R_PPC_GOT_TLSLD16_HI:
4088 case R_PPC_GOT_TLSLD16_HA:
4089 tls_type = TLS_TLS | TLS_LD;
4090 goto dogottls;
4091
4092 case R_PPC_GOT_TLSGD16:
4093 case R_PPC_GOT_TLSGD16_LO:
4094 case R_PPC_GOT_TLSGD16_HI:
4095 case R_PPC_GOT_TLSGD16_HA:
4096 tls_type = TLS_TLS | TLS_GD;
4097 goto dogottls;
4098
4099 case R_PPC_GOT_TPREL16:
4100 case R_PPC_GOT_TPREL16_LO:
4101 case R_PPC_GOT_TPREL16_HI:
4102 case R_PPC_GOT_TPREL16_HA:
4103 if (bfd_link_dll (info))
4104 info->flags |= DF_STATIC_TLS;
4105 tls_type = TLS_TLS | TLS_TPREL;
4106 goto dogottls;
4107
4108 case R_PPC_GOT_DTPREL16:
4109 case R_PPC_GOT_DTPREL16_LO:
4110 case R_PPC_GOT_DTPREL16_HI:
4111 case R_PPC_GOT_DTPREL16_HA:
4112 tls_type = TLS_TLS | TLS_DTPREL;
4113 dogottls:
4114 sec->has_tls_reloc = 1;
4115 /* Fall through. */
4116
4117 /* GOT16 relocations */
4118 case R_PPC_GOT16:
4119 case R_PPC_GOT16_LO:
4120 case R_PPC_GOT16_HI:
4121 case R_PPC_GOT16_HA:
4122 /* This symbol requires a global offset table entry. */
4123 if (htab->elf.sgot == NULL)
4124 {
4125 if (htab->elf.dynobj == NULL)
4126 htab->elf.dynobj = abfd;
4127 if (!ppc_elf_create_got (htab->elf.dynobj, info))
4128 return FALSE;
4129 }
4130 if (h != NULL)
4131 {
4132 h->got.refcount += 1;
4133 ppc_elf_hash_entry (h)->tls_mask |= tls_type;
4134 }
4135 else
4136 /* This is a global offset table entry for a local symbol. */
4137 if (!update_local_sym_info (abfd, symtab_hdr, r_symndx, tls_type))
4138 return FALSE;
4139
4140 /* We may also need a plt entry if the symbol turns out to be
4141 an ifunc. */
4142 if (h != NULL && !bfd_link_pic (info))
4143 {
4144 if (!update_plt_info (abfd, &h->plt.plist, NULL, 0))
4145 return FALSE;
4146 }
4147 break;
4148
4149 /* Indirect .sdata relocation. */
4150 case R_PPC_EMB_SDAI16:
4151 if (bfd_link_pic (info))
4152 {
4153 bad_shared_reloc (abfd, r_type);
4154 return FALSE;
4155 }
4156 htab->sdata[0].sym->ref_regular = 1;
4157 if (!elf_allocate_pointer_linker_section (abfd, &htab->sdata[0],
4158 h, rel))
4159 return FALSE;
4160 if (h != NULL)
4161 {
4162 ppc_elf_hash_entry (h)->has_sda_refs = TRUE;
4163 h->non_got_ref = TRUE;
4164 }
4165 break;
4166
4167 /* Indirect .sdata2 relocation. */
4168 case R_PPC_EMB_SDA2I16:
4169 if (bfd_link_pic (info))
4170 {
4171 bad_shared_reloc (abfd, r_type);
4172 return FALSE;
4173 }
4174 htab->sdata[1].sym->ref_regular = 1;
4175 if (!elf_allocate_pointer_linker_section (abfd, &htab->sdata[1],
4176 h, rel))
4177 return FALSE;
4178 if (h != NULL)
4179 {
4180 ppc_elf_hash_entry (h)->has_sda_refs = TRUE;
4181 h->non_got_ref = TRUE;
4182 }
4183 break;
4184
4185 case R_PPC_SDAREL16:
4186 htab->sdata[0].sym->ref_regular = 1;
4187 /* Fall through. */
4188
4189 case R_PPC_VLE_SDAREL_LO16A:
4190 case R_PPC_VLE_SDAREL_LO16D:
4191 case R_PPC_VLE_SDAREL_HI16A:
4192 case R_PPC_VLE_SDAREL_HI16D:
4193 case R_PPC_VLE_SDAREL_HA16A:
4194 case R_PPC_VLE_SDAREL_HA16D:
4195 if (h != NULL)
4196 {
4197 ppc_elf_hash_entry (h)->has_sda_refs = TRUE;
4198 h->non_got_ref = TRUE;
4199 }
4200 break;
4201
4202 case R_PPC_VLE_REL8:
4203 case R_PPC_VLE_REL15:
4204 case R_PPC_VLE_REL24:
4205 case R_PPC_VLE_LO16A:
4206 case R_PPC_VLE_LO16D:
4207 case R_PPC_VLE_HI16A:
4208 case R_PPC_VLE_HI16D:
4209 case R_PPC_VLE_HA16A:
4210 case R_PPC_VLE_HA16D:
4211 case R_PPC_VLE_ADDR20:
4212 break;
4213
4214 case R_PPC_EMB_SDA2REL:
4215 if (bfd_link_pic (info))
4216 {
4217 bad_shared_reloc (abfd, r_type);
4218 return FALSE;
4219 }
4220 htab->sdata[1].sym->ref_regular = 1;
4221 if (h != NULL)
4222 {
4223 ppc_elf_hash_entry (h)->has_sda_refs = TRUE;
4224 h->non_got_ref = TRUE;
4225 }
4226 break;
4227
4228 case R_PPC_VLE_SDA21_LO:
4229 case R_PPC_VLE_SDA21:
4230 case R_PPC_EMB_SDA21:
4231 case R_PPC_EMB_RELSDA:
4232 if (bfd_link_pic (info))
4233 {
4234 bad_shared_reloc (abfd, r_type);
4235 return FALSE;
4236 }
4237 if (h != NULL)
4238 {
4239 ppc_elf_hash_entry (h)->has_sda_refs = TRUE;
4240 h->non_got_ref = TRUE;
4241 }
4242 break;
4243
4244 case R_PPC_EMB_NADDR32:
4245 case R_PPC_EMB_NADDR16:
4246 case R_PPC_EMB_NADDR16_LO:
4247 case R_PPC_EMB_NADDR16_HI:
4248 case R_PPC_EMB_NADDR16_HA:
4249 if (bfd_link_pic (info))
4250 {
4251 bad_shared_reloc (abfd, r_type);
4252 return FALSE;
4253 }
4254 if (h != NULL)
4255 h->non_got_ref = TRUE;
4256 break;
4257
4258 case R_PPC_PLTREL24:
4259 if (h == NULL)
4260 break;
4261 /* Fall through */
4262 case R_PPC_PLT32:
4263 case R_PPC_PLTREL32:
4264 case R_PPC_PLT16_LO:
4265 case R_PPC_PLT16_HI:
4266 case R_PPC_PLT16_HA:
4267 #ifdef DEBUG
4268 fprintf (stderr, "Reloc requires a PLT entry\n");
4269 #endif
4270 /* This symbol requires a procedure linkage table entry. */
4271 if (h == NULL)
4272 {
4273 if (ifunc == NULL)
4274 {
4275 /* It does not make sense to have a procedure linkage
4276 table entry for a non-ifunc local symbol. */
4277 info->callbacks->einfo
4278 /* xgettext:c-format */
4279 (_("%H: %s reloc against local symbol\n"),
4280 abfd, sec, rel->r_offset,
4281 ppc_elf_howto_table[r_type]->name);
4282 bfd_set_error (bfd_error_bad_value);
4283 return FALSE;
4284 }
4285 }
4286 else
4287 {
4288 bfd_vma addend = 0;
4289
4290 if (r_type == R_PPC_PLTREL24)
4291 {
4292 ppc_elf_tdata (abfd)->makes_plt_call = 1;
4293 if (bfd_link_pic (info))
4294 addend = rel->r_addend;
4295 }
4296 h->needs_plt = 1;
4297 if (!update_plt_info (abfd, &h->plt.plist, got2, addend))
4298 return FALSE;
4299 }
4300 break;
4301
4302 /* The following relocations don't need to propagate the
4303 relocation if linking a shared object since they are
4304 section relative. */
4305 case R_PPC_SECTOFF:
4306 case R_PPC_SECTOFF_LO:
4307 case R_PPC_SECTOFF_HI:
4308 case R_PPC_SECTOFF_HA:
4309 case R_PPC_DTPREL16:
4310 case R_PPC_DTPREL16_LO:
4311 case R_PPC_DTPREL16_HI:
4312 case R_PPC_DTPREL16_HA:
4313 case R_PPC_TOC16:
4314 break;
4315
4316 case R_PPC_REL16:
4317 case R_PPC_REL16_LO:
4318 case R_PPC_REL16_HI:
4319 case R_PPC_REL16_HA:
4320 case R_PPC_REL16DX_HA:
4321 ppc_elf_tdata (abfd)->has_rel16 = 1;
4322 break;
4323
4324 /* These are just markers. */
4325 case R_PPC_TLS:
4326 case R_PPC_EMB_MRKREF:
4327 case R_PPC_NONE:
4328 case R_PPC_max:
4329 case R_PPC_RELAX:
4330 case R_PPC_RELAX_PLT:
4331 case R_PPC_RELAX_PLTREL24:
4332 case R_PPC_16DX_HA:
4333 break;
4334
4335 /* These should only appear in dynamic objects. */
4336 case R_PPC_COPY:
4337 case R_PPC_GLOB_DAT:
4338 case R_PPC_JMP_SLOT:
4339 case R_PPC_RELATIVE:
4340 case R_PPC_IRELATIVE:
4341 break;
4342
4343 /* These aren't handled yet. We'll report an error later. */
4344 case R_PPC_ADDR30:
4345 case R_PPC_EMB_RELSEC16:
4346 case R_PPC_EMB_RELST_LO:
4347 case R_PPC_EMB_RELST_HI:
4348 case R_PPC_EMB_RELST_HA:
4349 case R_PPC_EMB_BIT_FLD:
4350 break;
4351
4352 /* This refers only to functions defined in the shared library. */
4353 case R_PPC_LOCAL24PC:
4354 if (h != NULL && h == htab->elf.hgot && htab->plt_type == PLT_UNSET)
4355 {
4356 htab->plt_type = PLT_OLD;
4357 htab->old_bfd = abfd;
4358 }
4359 if (h != NULL && h->type == STT_GNU_IFUNC)
4360 {
4361 h->needs_plt = 1;
4362 if (!update_plt_info (abfd, &h->plt.plist, NULL, 0))
4363 return FALSE;
4364 }
4365 break;
4366
4367 /* This relocation describes the C++ object vtable hierarchy.
4368 Reconstruct it for later use during GC. */
4369 case R_PPC_GNU_VTINHERIT:
4370 if (!bfd_elf_gc_record_vtinherit (abfd, sec, h, rel->r_offset))
4371 return FALSE;
4372 break;
4373
4374 /* This relocation describes which C++ vtable entries are actually
4375 used. Record for later use during GC. */
4376 case R_PPC_GNU_VTENTRY:
4377 BFD_ASSERT (h != NULL);
4378 if (h != NULL
4379 && !bfd_elf_gc_record_vtentry (abfd, sec, h, rel->r_addend))
4380 return FALSE;
4381 break;
4382
4383 /* We shouldn't really be seeing TPREL32. */
4384 case R_PPC_TPREL32:
4385 case R_PPC_TPREL16:
4386 case R_PPC_TPREL16_LO:
4387 case R_PPC_TPREL16_HI:
4388 case R_PPC_TPREL16_HA:
4389 if (bfd_link_dll (info))
4390 info->flags |= DF_STATIC_TLS;
4391 goto dodyn;
4392
4393 /* Nor these. */
4394 case R_PPC_DTPMOD32:
4395 case R_PPC_DTPREL32:
4396 goto dodyn;
4397
4398 case R_PPC_REL32:
4399 if (h == NULL
4400 && got2 != NULL
4401 && (sec->flags & SEC_CODE) != 0
4402 && bfd_link_pic (info)
4403 && htab->plt_type == PLT_UNSET)
4404 {
4405 /* Old -fPIC gcc code has .long LCTOC1-LCFx just before
4406 the start of a function, which assembles to a REL32
4407 reference to .got2. If we detect one of these, then
4408 force the old PLT layout because the linker cannot
4409 reliably deduce the GOT pointer value needed for
4410 PLT call stubs. */
4411 asection *s;
4412 Elf_Internal_Sym *isym;
4413
4414 isym = bfd_sym_from_r_symndx (&htab->sym_cache,
4415 abfd, r_symndx);
4416 if (isym == NULL)
4417 return FALSE;
4418
4419 s = bfd_section_from_elf_index (abfd, isym->st_shndx);
4420 if (s == got2)
4421 {
4422 htab->plt_type = PLT_OLD;
4423 htab->old_bfd = abfd;
4424 }
4425 }
4426 if (h == NULL || h == htab->elf.hgot)
4427 break;
4428 /* fall through */
4429
4430 case R_PPC_ADDR32:
4431 case R_PPC_ADDR16:
4432 case R_PPC_ADDR16_LO:
4433 case R_PPC_ADDR16_HI:
4434 case R_PPC_ADDR16_HA:
4435 case R_PPC_UADDR32:
4436 case R_PPC_UADDR16:
4437 if (h != NULL && !bfd_link_pic (info))
4438 {
4439 /* We may need a plt entry if the symbol turns out to be
4440 a function defined in a dynamic object. */
4441 if (!update_plt_info (abfd, &h->plt.plist, NULL, 0))
4442 return FALSE;
4443
4444 /* We may need a copy reloc too. */
4445 h->non_got_ref = 1;
4446 h->pointer_equality_needed = 1;
4447 if (r_type == R_PPC_ADDR16_HA)
4448 ppc_elf_hash_entry (h)->has_addr16_ha = 1;
4449 if (r_type == R_PPC_ADDR16_LO)
4450 ppc_elf_hash_entry (h)->has_addr16_lo = 1;
4451 }
4452 goto dodyn;
4453
4454 case R_PPC_REL24:
4455 case R_PPC_REL14:
4456 case R_PPC_REL14_BRTAKEN:
4457 case R_PPC_REL14_BRNTAKEN:
4458 if (h == NULL)
4459 break;
4460 if (h == htab->elf.hgot)
4461 {
4462 if (htab->plt_type == PLT_UNSET)
4463 {
4464 htab->plt_type = PLT_OLD;
4465 htab->old_bfd = abfd;
4466 }
4467 break;
4468 }
4469 /* fall through */
4470
4471 case R_PPC_ADDR24:
4472 case R_PPC_ADDR14:
4473 case R_PPC_ADDR14_BRTAKEN:
4474 case R_PPC_ADDR14_BRNTAKEN:
4475 if (h != NULL && !bfd_link_pic (info))
4476 {
4477 /* We may need a plt entry if the symbol turns out to be
4478 a function defined in a dynamic object. */
4479 h->needs_plt = 1;
4480 if (!update_plt_info (abfd, &h->plt.plist, NULL, 0))
4481 return FALSE;
4482 break;
4483 }
4484
4485 dodyn:
4486 /* If we are creating a shared library, and this is a reloc
4487 against a global symbol, or a non PC relative reloc
4488 against a local symbol, then we need to copy the reloc
4489 into the shared library. However, if we are linking with
4490 -Bsymbolic, we do not need to copy a reloc against a
4491 global symbol which is defined in an object we are
4492 including in the link (i.e., DEF_REGULAR is set). At
4493 this point we have not seen all the input files, so it is
4494 possible that DEF_REGULAR is not set now but will be set
4495 later (it is never cleared). In case of a weak definition,
4496 DEF_REGULAR may be cleared later by a strong definition in
4497 a shared library. We account for that possibility below by
4498 storing information in the dyn_relocs field of the hash
4499 table entry. A similar situation occurs when creating
4500 shared libraries and symbol visibility changes render the
4501 symbol local.
4502
4503 If on the other hand, we are creating an executable, we
4504 may need to keep relocations for symbols satisfied by a
4505 dynamic library if we manage to avoid copy relocs for the
4506 symbol. */
4507 if ((bfd_link_pic (info)
4508 && (must_be_dyn_reloc (info, r_type)
4509 || (h != NULL
4510 && (!SYMBOLIC_BIND (info, h)
4511 || h->root.type == bfd_link_hash_defweak
4512 || !h->def_regular))))
4513 || (ELIMINATE_COPY_RELOCS
4514 && !bfd_link_pic (info)
4515 && h != NULL
4516 && (h->root.type == bfd_link_hash_defweak
4517 || !h->def_regular)))
4518 {
4519 #ifdef DEBUG
4520 fprintf (stderr,
4521 "ppc_elf_check_relocs needs to "
4522 "create relocation for %s\n",
4523 (h && h->root.root.string
4524 ? h->root.root.string : "<unknown>"));
4525 #endif
4526 if (sreloc == NULL)
4527 {
4528 if (htab->elf.dynobj == NULL)
4529 htab->elf.dynobj = abfd;
4530
4531 sreloc = _bfd_elf_make_dynamic_reloc_section
4532 (sec, htab->elf.dynobj, 2, abfd, /*rela?*/ TRUE);
4533
4534 if (sreloc == NULL)
4535 return FALSE;
4536 }
4537
4538 /* If this is a global symbol, we count the number of
4539 relocations we need for this symbol. */
4540 if (h != NULL)
4541 {
4542 struct elf_dyn_relocs *p;
4543 struct elf_dyn_relocs **rel_head;
4544
4545 rel_head = &ppc_elf_hash_entry (h)->dyn_relocs;
4546 p = *rel_head;
4547 if (p == NULL || p->sec != sec)
4548 {
4549 p = bfd_alloc (htab->elf.dynobj, sizeof *p);
4550 if (p == NULL)
4551 return FALSE;
4552 p->next = *rel_head;
4553 *rel_head = p;
4554 p->sec = sec;
4555 p->count = 0;
4556 p->pc_count = 0;
4557 }
4558 p->count += 1;
4559 if (!must_be_dyn_reloc (info, r_type))
4560 p->pc_count += 1;
4561 }
4562 else
4563 {
4564 /* Track dynamic relocs needed for local syms too.
4565 We really need local syms available to do this
4566 easily. Oh well. */
4567 struct ppc_dyn_relocs *p;
4568 struct ppc_dyn_relocs **rel_head;
4569 bfd_boolean is_ifunc;
4570 asection *s;
4571 void *vpp;
4572 Elf_Internal_Sym *isym;
4573
4574 isym = bfd_sym_from_r_symndx (&htab->sym_cache,
4575 abfd, r_symndx);
4576 if (isym == NULL)
4577 return FALSE;
4578
4579 s = bfd_section_from_elf_index (abfd, isym->st_shndx);
4580 if (s == NULL)
4581 s = sec;
4582
4583 vpp = &elf_section_data (s)->local_dynrel;
4584 rel_head = (struct ppc_dyn_relocs **) vpp;
4585 is_ifunc = ELF_ST_TYPE (isym->st_info) == STT_GNU_IFUNC;
4586 p = *rel_head;
4587 if (p != NULL && p->sec == sec && p->ifunc != is_ifunc)
4588 p = p->next;
4589 if (p == NULL || p->sec != sec || p->ifunc != is_ifunc)
4590 {
4591 p = bfd_alloc (htab->elf.dynobj, sizeof *p);
4592 if (p == NULL)
4593 return FALSE;
4594 p->next = *rel_head;
4595 *rel_head = p;
4596 p->sec = sec;
4597 p->ifunc = is_ifunc;
4598 p->count = 0;
4599 }
4600 p->count += 1;
4601 }
4602 }
4603
4604 break;
4605 }
4606 }
4607
4608 return TRUE;
4609 }
4610 \f
4611 /* Warn for conflicting Tag_GNU_Power_ABI_FP attributes between IBFD
4612 and OBFD, and merge non-conflicting ones. */
4613 void
4614 _bfd_elf_ppc_merge_fp_attributes (bfd *ibfd, struct bfd_link_info *info)
4615 {
4616 bfd *obfd = info->output_bfd;
4617 obj_attribute *in_attr, *in_attrs;
4618 obj_attribute *out_attr, *out_attrs;
4619
4620 in_attrs = elf_known_obj_attributes (ibfd)[OBJ_ATTR_GNU];
4621 out_attrs = elf_known_obj_attributes (obfd)[OBJ_ATTR_GNU];
4622
4623 in_attr = &in_attrs[Tag_GNU_Power_ABI_FP];
4624 out_attr = &out_attrs[Tag_GNU_Power_ABI_FP];
4625
4626 if (in_attr->i != out_attr->i)
4627 {
4628 int in_fp = in_attr->i & 3;
4629 int out_fp = out_attr->i & 3;
4630
4631 if (in_fp == 0)
4632 ;
4633 else if (out_fp == 0)
4634 {
4635 out_attr->type = 1;
4636 out_attr->i ^= in_fp;
4637 }
4638 else if (out_fp != 2 && in_fp == 2)
4639 _bfd_error_handler
4640 /* xgettext:c-format */
4641 (_("warning: %pB uses hard float, %pB uses soft float"), obfd, ibfd);
4642 else if (out_fp == 2 && in_fp != 2)
4643 _bfd_error_handler
4644 /* xgettext:c-format */
4645 (_("warning: %pB uses hard float, %pB uses soft float"), ibfd, obfd);
4646 else if (out_fp == 1 && in_fp == 3)
4647 _bfd_error_handler
4648 /* xgettext:c-format */
4649 (_("warning: %pB uses double-precision hard float, "
4650 "%pB uses single-precision hard float"), obfd, ibfd);
4651 else if (out_fp == 3 && in_fp == 1)
4652 _bfd_error_handler
4653 /* xgettext:c-format */
4654 (_("warning: %pB uses double-precision hard float, "
4655 "%pB uses single-precision hard float"), ibfd, obfd);
4656
4657 in_fp = in_attr->i & 0xc;
4658 out_fp = out_attr->i & 0xc;
4659 if (in_fp == 0)
4660 ;
4661 else if (out_fp == 0)
4662 {
4663 out_attr->type = 1;
4664 out_attr->i ^= in_fp;
4665 }
4666 else if (out_fp != 2 * 4 && in_fp == 2 * 4)
4667 _bfd_error_handler
4668 /* xgettext:c-format */
4669 (_("warning: %pB uses 64-bit long double, "
4670 "%pB uses 128-bit long double"), ibfd, obfd);
4671 else if (in_fp != 2 * 4 && out_fp == 2 * 4)
4672 _bfd_error_handler
4673 /* xgettext:c-format */
4674 (_("warning: %pB uses 64-bit long double, "
4675 "%pB uses 128-bit long double"), obfd, ibfd);
4676 else if (out_fp == 1 * 4 && in_fp == 3 * 4)
4677 _bfd_error_handler
4678 /* xgettext:c-format */
4679 (_("warning: %pB uses IBM long double, "
4680 "%pB uses IEEE long double"), ibfd, obfd);
4681 else if (out_fp == 3 * 4 && in_fp == 1 * 4)
4682 _bfd_error_handler
4683 /* xgettext:c-format */
4684 (_("warning: %pB uses IBM long double, "
4685 "%pB uses IEEE long double"), obfd, ibfd);
4686 }
4687 }
4688
4689 /* Merge object attributes from IBFD into OBFD. Warn if
4690 there are conflicting attributes. */
4691 static bfd_boolean
4692 ppc_elf_merge_obj_attributes (bfd *ibfd, struct bfd_link_info *info)
4693 {
4694 bfd *obfd;
4695 obj_attribute *in_attr, *in_attrs;
4696 obj_attribute *out_attr, *out_attrs;
4697
4698 _bfd_elf_ppc_merge_fp_attributes (ibfd, info);
4699
4700 obfd = info->output_bfd;
4701 in_attrs = elf_known_obj_attributes (ibfd)[OBJ_ATTR_GNU];
4702 out_attrs = elf_known_obj_attributes (obfd)[OBJ_ATTR_GNU];
4703
4704 /* Check for conflicting Tag_GNU_Power_ABI_Vector attributes and
4705 merge non-conflicting ones. */
4706 in_attr = &in_attrs[Tag_GNU_Power_ABI_Vector];
4707 out_attr = &out_attrs[Tag_GNU_Power_ABI_Vector];
4708 if (in_attr->i != out_attr->i)
4709 {
4710 int in_vec = in_attr->i & 3;
4711 int out_vec = out_attr->i & 3;
4712
4713 if (in_vec == 0)
4714 ;
4715 else if (out_vec == 0)
4716 {
4717 out_attr->type = 1;
4718 out_attr->i = in_vec;
4719 }
4720 /* For now, allow generic to transition to AltiVec or SPE
4721 without a warning. If GCC marked files with their stack
4722 alignment and used don't-care markings for files which are
4723 not affected by the vector ABI, we could warn about this
4724 case too. */
4725 else if (in_vec == 1)
4726 ;
4727 else if (out_vec == 1)
4728 {
4729 out_attr->type = 1;
4730 out_attr->i = in_vec;
4731 }
4732 else if (out_vec < in_vec)
4733 _bfd_error_handler
4734 /* xgettext:c-format */
4735 (_("warning: %pB uses AltiVec vector ABI, %pB uses SPE vector ABI"),
4736 obfd, ibfd);
4737 else if (out_vec > in_vec)
4738 _bfd_error_handler
4739 /* xgettext:c-format */
4740 (_("warning: %pB uses AltiVec vector ABI, %pB uses SPE vector ABI"),
4741 ibfd, obfd);
4742 }
4743
4744 /* Check for conflicting Tag_GNU_Power_ABI_Struct_Return attributes
4745 and merge non-conflicting ones. */
4746 in_attr = &in_attrs[Tag_GNU_Power_ABI_Struct_Return];
4747 out_attr = &out_attrs[Tag_GNU_Power_ABI_Struct_Return];
4748 if (in_attr->i != out_attr->i)
4749 {
4750 int in_struct = in_attr->i & 3;
4751 int out_struct = out_attr->i & 3;
4752
4753 if (in_struct == 0 || in_struct == 3)
4754 ;
4755 else if (out_struct == 0)
4756 {
4757 out_attr->type = 1;
4758 out_attr->i = in_struct;
4759 }
4760 else if (out_struct < in_struct)
4761 _bfd_error_handler
4762 /* xgettext:c-format */
4763 (_("warning: %pB uses r3/r4 for small structure returns, "
4764 "%pB uses memory"), obfd, ibfd);
4765 else if (out_struct > in_struct)
4766 _bfd_error_handler
4767 /* xgettext:c-format */
4768 (_("warning: %pB uses r3/r4 for small structure returns, "
4769 "%pB uses memory"), ibfd, obfd);
4770 }
4771
4772 /* Merge Tag_compatibility attributes and any common GNU ones. */
4773 _bfd_elf_merge_object_attributes (ibfd, info);
4774
4775 return TRUE;
4776 }
4777
4778 /* Merge backend specific data from an object file to the output
4779 object file when linking. */
4780
4781 static bfd_boolean
4782 ppc_elf_merge_private_bfd_data (bfd *ibfd, struct bfd_link_info *info)
4783 {
4784 bfd *obfd = info->output_bfd;
4785 flagword old_flags;
4786 flagword new_flags;
4787 bfd_boolean error;
4788
4789 if (!is_ppc_elf (ibfd) || !is_ppc_elf (obfd))
4790 return TRUE;
4791
4792 /* Check if we have the same endianness. */
4793 if (! _bfd_generic_verify_endian_match (ibfd, info))
4794 return FALSE;
4795
4796 if (!ppc_elf_merge_obj_attributes (ibfd, info))
4797 return FALSE;
4798
4799 new_flags = elf_elfheader (ibfd)->e_flags;
4800 old_flags = elf_elfheader (obfd)->e_flags;
4801 if (!elf_flags_init (obfd))
4802 {
4803 /* First call, no flags set. */
4804 elf_flags_init (obfd) = TRUE;
4805 elf_elfheader (obfd)->e_flags = new_flags;
4806 }
4807
4808 /* Compatible flags are ok. */
4809 else if (new_flags == old_flags)
4810 ;
4811
4812 /* Incompatible flags. */
4813 else
4814 {
4815 /* Warn about -mrelocatable mismatch. Allow -mrelocatable-lib
4816 to be linked with either. */
4817 error = FALSE;
4818 if ((new_flags & EF_PPC_RELOCATABLE) != 0
4819 && (old_flags & (EF_PPC_RELOCATABLE | EF_PPC_RELOCATABLE_LIB)) == 0)
4820 {
4821 error = TRUE;
4822 _bfd_error_handler
4823 (_("%pB: compiled with -mrelocatable and linked with "
4824 "modules compiled normally"), ibfd);
4825 }
4826 else if ((new_flags & (EF_PPC_RELOCATABLE | EF_PPC_RELOCATABLE_LIB)) == 0
4827 && (old_flags & EF_PPC_RELOCATABLE) != 0)
4828 {
4829 error = TRUE;
4830 _bfd_error_handler
4831 (_("%pB: compiled normally and linked with "
4832 "modules compiled with -mrelocatable"), ibfd);
4833 }
4834
4835 /* The output is -mrelocatable-lib iff both the input files are. */
4836 if (! (new_flags & EF_PPC_RELOCATABLE_LIB))
4837 elf_elfheader (obfd)->e_flags &= ~EF_PPC_RELOCATABLE_LIB;
4838
4839 /* The output is -mrelocatable iff it can't be -mrelocatable-lib,
4840 but each input file is either -mrelocatable or -mrelocatable-lib. */
4841 if (! (elf_elfheader (obfd)->e_flags & EF_PPC_RELOCATABLE_LIB)
4842 && (new_flags & (EF_PPC_RELOCATABLE_LIB | EF_PPC_RELOCATABLE))
4843 && (old_flags & (EF_PPC_RELOCATABLE_LIB | EF_PPC_RELOCATABLE)))
4844 elf_elfheader (obfd)->e_flags |= EF_PPC_RELOCATABLE;
4845
4846 /* Do not warn about eabi vs. V.4 mismatch, just or in the bit if
4847 any module uses it. */
4848 elf_elfheader (obfd)->e_flags |= (new_flags & EF_PPC_EMB);
4849
4850 new_flags &= ~(EF_PPC_RELOCATABLE | EF_PPC_RELOCATABLE_LIB | EF_PPC_EMB);
4851 old_flags &= ~(EF_PPC_RELOCATABLE | EF_PPC_RELOCATABLE_LIB | EF_PPC_EMB);
4852
4853 /* Warn about any other mismatches. */
4854 if (new_flags != old_flags)
4855 {
4856 error = TRUE;
4857 _bfd_error_handler
4858 /* xgettext:c-format */
4859 (_("%pB: uses different e_flags (%#x) fields "
4860 "than previous modules (%#x)"),
4861 ibfd, new_flags, old_flags);
4862 }
4863
4864 if (error)
4865 {
4866 bfd_set_error (bfd_error_bad_value);
4867 return FALSE;
4868 }
4869 }
4870
4871 return TRUE;
4872 }
4873
4874 static void
4875 ppc_elf_vle_split16 (bfd *input_bfd,
4876 asection *input_section,
4877 unsigned long offset,
4878 bfd_byte *loc,
4879 bfd_vma value,
4880 split16_format_type split16_format,
4881 bfd_boolean fixup)
4882 {
4883 unsigned int insn, opcode, top5;
4884
4885 insn = bfd_get_32 (input_bfd, loc);
4886 opcode = insn & 0xfc00f800;
4887 if (opcode == E_OR2I_INSN
4888 || opcode == E_AND2I_DOT_INSN
4889 || opcode == E_OR2IS_INSN
4890 || opcode == E_LIS_INSN
4891 || opcode == E_AND2IS_DOT_INSN)
4892 {
4893 if (split16_format != split16a_type)
4894 {
4895 if (fixup)
4896 split16_format = split16a_type;
4897 else
4898 _bfd_error_handler
4899 /* xgettext:c-format */
4900 (_("%pB(%pA+0x%lx): expected 16A style relocation on 0x%08x insn"),
4901 input_bfd, input_section, offset, opcode);
4902 }
4903 }
4904 else if (opcode == E_ADD2I_DOT_INSN
4905 || opcode == E_ADD2IS_INSN
4906 || opcode == E_CMP16I_INSN
4907 || opcode == E_MULL2I_INSN
4908 || opcode == E_CMPL16I_INSN
4909 || opcode == E_CMPH16I_INSN
4910 || opcode == E_CMPHL16I_INSN)
4911 {
4912 if (split16_format != split16d_type)
4913 {
4914 if (fixup)
4915 split16_format = split16d_type;
4916 else
4917 _bfd_error_handler
4918 /* xgettext:c-format */
4919 (_("%pB(%pA+0x%lx): expected 16D style relocation on 0x%08x insn"),
4920 input_bfd, input_section, offset, opcode);
4921 }
4922 }
4923 top5 = value & 0xf800;
4924 top5 = top5 << (split16_format == split16a_type ? 5 : 10);
4925 insn &= (split16_format == split16a_type ? ~0x1f07ff : ~0x3e007ff);
4926 insn |= top5;
4927 insn |= value & 0x7ff;
4928 bfd_put_32 (input_bfd, insn, loc);
4929 }
4930
4931 static void
4932 ppc_elf_vle_split20 (bfd *output_bfd, bfd_byte *loc, bfd_vma value)
4933 {
4934 unsigned int insn;
4935
4936 insn = bfd_get_32 (output_bfd, loc);
4937 /* We have an li20 field, bits 17..20, 11..15, 21..31. */
4938 /* Top 4 bits of value to 17..20. */
4939 insn |= (value & 0xf0000) >> 5;
4940 /* Next 5 bits of the value to 11..15. */
4941 insn |= (value & 0xf800) << 5;
4942 /* And the final 11 bits of the value to bits 21 to 31. */
4943 insn |= value & 0x7ff;
4944 bfd_put_32 (output_bfd, insn, loc);
4945 }
4946
4947 \f
4948 /* Choose which PLT scheme to use, and set .plt flags appropriately.
4949 Returns -1 on error, 0 for old PLT, 1 for new PLT. */
4950 int
4951 ppc_elf_select_plt_layout (bfd *output_bfd ATTRIBUTE_UNUSED,
4952 struct bfd_link_info *info)
4953 {
4954 struct ppc_elf_link_hash_table *htab;
4955 flagword flags;
4956
4957 htab = ppc_elf_hash_table (info);
4958
4959 if (htab->plt_type == PLT_UNSET)
4960 {
4961 struct elf_link_hash_entry *h;
4962
4963 if (htab->params->plt_style == PLT_OLD)
4964 htab->plt_type = PLT_OLD;
4965 else if (bfd_link_pic (info)
4966 && htab->elf.dynamic_sections_created
4967 && (h = elf_link_hash_lookup (&htab->elf, "_mcount",
4968 FALSE, FALSE, TRUE)) != NULL
4969 && (h->type == STT_FUNC
4970 || h->needs_plt)
4971 && h->ref_regular
4972 && !(SYMBOL_CALLS_LOCAL (info, h)
4973 || UNDEFWEAK_NO_DYNAMIC_RELOC (info, h)))
4974 {
4975 /* Profiling of shared libs (and pies) is not supported with
4976 secure plt, because ppc32 does profiling before a
4977 function prologue and a secure plt pic call stubs needs
4978 r30 to be set up. */
4979 htab->plt_type = PLT_OLD;
4980 }
4981 else
4982 {
4983 bfd *ibfd;
4984 enum ppc_elf_plt_type plt_type = htab->params->plt_style;
4985
4986 /* Look through the reloc flags left by ppc_elf_check_relocs.
4987 Use the old style bss plt if a file makes plt calls
4988 without using the new relocs, and if ld isn't given
4989 --secure-plt and we never see REL16 relocs. */
4990 if (plt_type == PLT_UNSET)
4991 plt_type = PLT_OLD;
4992 for (ibfd = info->input_bfds; ibfd; ibfd = ibfd->link.next)
4993 if (is_ppc_elf (ibfd))
4994 {
4995 if (ppc_elf_tdata (ibfd)->has_rel16)
4996 plt_type = PLT_NEW;
4997 else if (ppc_elf_tdata (ibfd)->makes_plt_call)
4998 {
4999 plt_type = PLT_OLD;
5000 htab->old_bfd = ibfd;
5001 break;
5002 }
5003 }
5004 htab->plt_type = plt_type;
5005 }
5006 }
5007 if (htab->plt_type == PLT_OLD && htab->params->plt_style == PLT_NEW)
5008 {
5009 if (htab->old_bfd != NULL)
5010 _bfd_error_handler (_("bss-plt forced due to %pB"), htab->old_bfd);
5011 else
5012 _bfd_error_handler (_("bss-plt forced by profiling"));
5013 }
5014
5015 BFD_ASSERT (htab->plt_type != PLT_VXWORKS);
5016
5017 if (htab->plt_type == PLT_NEW)
5018 {
5019 flags = (SEC_ALLOC | SEC_LOAD | SEC_HAS_CONTENTS
5020 | SEC_IN_MEMORY | SEC_LINKER_CREATED);
5021
5022 /* The new PLT is a loaded section. */
5023 if (htab->elf.splt != NULL
5024 && !bfd_set_section_flags (htab->elf.dynobj, htab->elf.splt, flags))
5025 return -1;
5026
5027 /* The new GOT is not executable. */
5028 if (htab->elf.sgot != NULL
5029 && !bfd_set_section_flags (htab->elf.dynobj, htab->elf.sgot, flags))
5030 return -1;
5031 }
5032 else
5033 {
5034 /* Stop an unused .glink section from affecting .text alignment. */
5035 if (htab->glink != NULL
5036 && !bfd_set_section_alignment (htab->elf.dynobj, htab->glink, 0))
5037 return -1;
5038 }
5039 return htab->plt_type == PLT_NEW;
5040 }
5041 \f
5042 /* Return the section that should be marked against GC for a given
5043 relocation. */
5044
5045 static asection *
5046 ppc_elf_gc_mark_hook (asection *sec,
5047 struct bfd_link_info *info,
5048 Elf_Internal_Rela *rel,
5049 struct elf_link_hash_entry *h,
5050 Elf_Internal_Sym *sym)
5051 {
5052 if (h != NULL)
5053 switch (ELF32_R_TYPE (rel->r_info))
5054 {
5055 case R_PPC_GNU_VTINHERIT:
5056 case R_PPC_GNU_VTENTRY:
5057 return NULL;
5058 }
5059
5060 return _bfd_elf_gc_mark_hook (sec, info, rel, h, sym);
5061 }
5062 \f
5063 /* Set plt output section type, htab->tls_get_addr, and call the
5064 generic ELF tls_setup function. */
5065
5066 asection *
5067 ppc_elf_tls_setup (bfd *obfd, struct bfd_link_info *info)
5068 {
5069 struct ppc_elf_link_hash_table *htab;
5070
5071 htab = ppc_elf_hash_table (info);
5072 htab->tls_get_addr = elf_link_hash_lookup (&htab->elf, "__tls_get_addr",
5073 FALSE, FALSE, TRUE);
5074 if (htab->plt_type != PLT_NEW)
5075 htab->params->no_tls_get_addr_opt = TRUE;
5076
5077 if (!htab->params->no_tls_get_addr_opt)
5078 {
5079 struct elf_link_hash_entry *opt, *tga;
5080 opt = elf_link_hash_lookup (&htab->elf, "__tls_get_addr_opt",
5081 FALSE, FALSE, TRUE);
5082 if (opt != NULL
5083 && (opt->root.type == bfd_link_hash_defined
5084 || opt->root.type == bfd_link_hash_defweak))
5085 {
5086 /* If glibc supports an optimized __tls_get_addr call stub,
5087 signalled by the presence of __tls_get_addr_opt, and we'll
5088 be calling __tls_get_addr via a plt call stub, then
5089 make __tls_get_addr point to __tls_get_addr_opt. */
5090 tga = htab->tls_get_addr;
5091 if (htab->elf.dynamic_sections_created
5092 && tga != NULL
5093 && (tga->type == STT_FUNC
5094 || tga->needs_plt)
5095 && !(SYMBOL_CALLS_LOCAL (info, tga)
5096 || UNDEFWEAK_NO_DYNAMIC_RELOC (info, tga)))
5097 {
5098 struct plt_entry *ent;
5099 for (ent = tga->plt.plist; ent != NULL; ent = ent->next)
5100 if (ent->plt.refcount > 0)
5101 break;
5102 if (ent != NULL)
5103 {
5104 tga->root.type = bfd_link_hash_indirect;
5105 tga->root.u.i.link = &opt->root;
5106 ppc_elf_copy_indirect_symbol (info, opt, tga);
5107 opt->mark = 1;
5108 if (opt->dynindx != -1)
5109 {
5110 /* Use __tls_get_addr_opt in dynamic relocations. */
5111 opt->dynindx = -1;
5112 _bfd_elf_strtab_delref (elf_hash_table (info)->dynstr,
5113 opt->dynstr_index);
5114 if (!bfd_elf_link_record_dynamic_symbol (info, opt))
5115 return FALSE;
5116 }
5117 htab->tls_get_addr = opt;
5118 }
5119 }
5120 }
5121 else
5122 htab->params->no_tls_get_addr_opt = TRUE;
5123 }
5124 if (htab->plt_type == PLT_NEW
5125 && htab->elf.splt != NULL
5126 && htab->elf.splt->output_section != NULL)
5127 {
5128 elf_section_type (htab->elf.splt->output_section) = SHT_PROGBITS;
5129 elf_section_flags (htab->elf.splt->output_section) = SHF_ALLOC + SHF_WRITE;
5130 }
5131
5132 return _bfd_elf_tls_setup (obfd, info);
5133 }
5134
5135 /* Return TRUE iff REL is a branch reloc with a global symbol matching
5136 HASH. */
5137
5138 static bfd_boolean
5139 branch_reloc_hash_match (const bfd *ibfd,
5140 const Elf_Internal_Rela *rel,
5141 const struct elf_link_hash_entry *hash)
5142 {
5143 Elf_Internal_Shdr *symtab_hdr = &elf_symtab_hdr (ibfd);
5144 enum elf_ppc_reloc_type r_type = ELF32_R_TYPE (rel->r_info);
5145 unsigned int r_symndx = ELF32_R_SYM (rel->r_info);
5146
5147 if (r_symndx >= symtab_hdr->sh_info && is_branch_reloc (r_type))
5148 {
5149 struct elf_link_hash_entry **sym_hashes = elf_sym_hashes (ibfd);
5150 struct elf_link_hash_entry *h;
5151
5152 h = sym_hashes[r_symndx - symtab_hdr->sh_info];
5153 while (h->root.type == bfd_link_hash_indirect
5154 || h->root.type == bfd_link_hash_warning)
5155 h = (struct elf_link_hash_entry *) h->root.u.i.link;
5156 if (h == hash)
5157 return TRUE;
5158 }
5159 return FALSE;
5160 }
5161
5162 /* Run through all the TLS relocs looking for optimization
5163 opportunities. */
5164
5165 bfd_boolean
5166 ppc_elf_tls_optimize (bfd *obfd ATTRIBUTE_UNUSED,
5167 struct bfd_link_info *info)
5168 {
5169 bfd *ibfd;
5170 asection *sec;
5171 struct ppc_elf_link_hash_table *htab;
5172 int pass;
5173
5174 if (!bfd_link_executable (info))
5175 return TRUE;
5176
5177 htab = ppc_elf_hash_table (info);
5178 if (htab == NULL)
5179 return FALSE;
5180
5181 /* Make two passes through the relocs. First time check that tls
5182 relocs involved in setting up a tls_get_addr call are indeed
5183 followed by such a call. If they are not, don't do any tls
5184 optimization. On the second pass twiddle tls_mask flags to
5185 notify relocate_section that optimization can be done, and
5186 adjust got and plt refcounts. */
5187 for (pass = 0; pass < 2; ++pass)
5188 for (ibfd = info->input_bfds; ibfd != NULL; ibfd = ibfd->link.next)
5189 {
5190 Elf_Internal_Sym *locsyms = NULL;
5191 Elf_Internal_Shdr *symtab_hdr = &elf_symtab_hdr (ibfd);
5192 asection *got2 = bfd_get_section_by_name (ibfd, ".got2");
5193
5194 for (sec = ibfd->sections; sec != NULL; sec = sec->next)
5195 if (sec->has_tls_reloc && !bfd_is_abs_section (sec->output_section))
5196 {
5197 Elf_Internal_Rela *relstart, *rel, *relend;
5198 int expecting_tls_get_addr = 0;
5199
5200 /* Read the relocations. */
5201 relstart = _bfd_elf_link_read_relocs (ibfd, sec, NULL, NULL,
5202 info->keep_memory);
5203 if (relstart == NULL)
5204 return FALSE;
5205
5206 relend = relstart + sec->reloc_count;
5207 for (rel = relstart; rel < relend; rel++)
5208 {
5209 enum elf_ppc_reloc_type r_type;
5210 unsigned long r_symndx;
5211 struct elf_link_hash_entry *h = NULL;
5212 char *tls_mask;
5213 char tls_set, tls_clear;
5214 bfd_boolean is_local;
5215 bfd_signed_vma *got_count;
5216
5217 r_symndx = ELF32_R_SYM (rel->r_info);
5218 if (r_symndx >= symtab_hdr->sh_info)
5219 {
5220 struct elf_link_hash_entry **sym_hashes;
5221
5222 sym_hashes = elf_sym_hashes (ibfd);
5223 h = sym_hashes[r_symndx - symtab_hdr->sh_info];
5224 while (h->root.type == bfd_link_hash_indirect
5225 || h->root.type == bfd_link_hash_warning)
5226 h = (struct elf_link_hash_entry *) h->root.u.i.link;
5227 }
5228
5229 is_local = FALSE;
5230 if (h == NULL
5231 || !h->def_dynamic)
5232 is_local = TRUE;
5233
5234 r_type = ELF32_R_TYPE (rel->r_info);
5235 /* If this section has old-style __tls_get_addr calls
5236 without marker relocs, then check that each
5237 __tls_get_addr call reloc is preceded by a reloc
5238 that conceivably belongs to the __tls_get_addr arg
5239 setup insn. If we don't find matching arg setup
5240 relocs, don't do any tls optimization. */
5241 if (pass == 0
5242 && sec->has_tls_get_addr_call
5243 && h != NULL
5244 && h == htab->tls_get_addr
5245 && !expecting_tls_get_addr
5246 && is_branch_reloc (r_type))
5247 {
5248 info->callbacks->minfo ("%H __tls_get_addr lost arg, "
5249 "TLS optimization disabled\n",
5250 ibfd, sec, rel->r_offset);
5251 if (elf_section_data (sec)->relocs != relstart)
5252 free (relstart);
5253 return TRUE;
5254 }
5255
5256 expecting_tls_get_addr = 0;
5257 switch (r_type)
5258 {
5259 case R_PPC_GOT_TLSLD16:
5260 case R_PPC_GOT_TLSLD16_LO:
5261 expecting_tls_get_addr = 1;
5262 /* Fall through. */
5263
5264 case R_PPC_GOT_TLSLD16_HI:
5265 case R_PPC_GOT_TLSLD16_HA:
5266 /* These relocs should never be against a symbol
5267 defined in a shared lib. Leave them alone if
5268 that turns out to be the case. */
5269 if (!is_local)
5270 continue;
5271
5272 /* LD -> LE */
5273 tls_set = 0;
5274 tls_clear = TLS_LD;
5275 break;
5276
5277 case R_PPC_GOT_TLSGD16:
5278 case R_PPC_GOT_TLSGD16_LO:
5279 expecting_tls_get_addr = 1;
5280 /* Fall through. */
5281
5282 case R_PPC_GOT_TLSGD16_HI:
5283 case R_PPC_GOT_TLSGD16_HA:
5284 if (is_local)
5285 /* GD -> LE */
5286 tls_set = 0;
5287 else
5288 /* GD -> IE */
5289 tls_set = TLS_TLS | TLS_TPRELGD;
5290 tls_clear = TLS_GD;
5291 break;
5292
5293 case R_PPC_GOT_TPREL16:
5294 case R_PPC_GOT_TPREL16_LO:
5295 case R_PPC_GOT_TPREL16_HI:
5296 case R_PPC_GOT_TPREL16_HA:
5297 if (is_local)
5298 {
5299 /* IE -> LE */
5300 tls_set = 0;
5301 tls_clear = TLS_TPREL;
5302 break;
5303 }
5304 else
5305 continue;
5306
5307 case R_PPC_TLSGD:
5308 case R_PPC_TLSLD:
5309 expecting_tls_get_addr = 2;
5310 tls_set = 0;
5311 tls_clear = 0;
5312 break;
5313
5314 default:
5315 continue;
5316 }
5317
5318 if (pass == 0)
5319 {
5320 if (!expecting_tls_get_addr
5321 || (expecting_tls_get_addr == 1
5322 && !sec->has_tls_get_addr_call))
5323 continue;
5324
5325 if (rel + 1 < relend
5326 && branch_reloc_hash_match (ibfd, rel + 1,
5327 htab->tls_get_addr))
5328 continue;
5329
5330 /* Uh oh, we didn't find the expected call. We
5331 could just mark this symbol to exclude it
5332 from tls optimization but it's safer to skip
5333 the entire optimization. */
5334 info->callbacks->minfo (_("%H arg lost __tls_get_addr, "
5335 "TLS optimization disabled\n"),
5336 ibfd, sec, rel->r_offset);
5337 if (elf_section_data (sec)->relocs != relstart)
5338 free (relstart);
5339 return TRUE;
5340 }
5341
5342 if (expecting_tls_get_addr)
5343 {
5344 struct plt_entry *ent;
5345 bfd_vma addend = 0;
5346
5347 if (bfd_link_pic (info)
5348 && ELF32_R_TYPE (rel[1].r_info) == R_PPC_PLTREL24)
5349 addend = rel[1].r_addend;
5350 ent = find_plt_ent (&htab->tls_get_addr->plt.plist,
5351 got2, addend);
5352 if (ent != NULL && ent->plt.refcount > 0)
5353 ent->plt.refcount -= 1;
5354
5355 if (expecting_tls_get_addr == 2)
5356 continue;
5357 }
5358
5359 if (h != NULL)
5360 {
5361 tls_mask = &ppc_elf_hash_entry (h)->tls_mask;
5362 got_count = &h->got.refcount;
5363 }
5364 else
5365 {
5366 bfd_signed_vma *lgot_refs;
5367 struct plt_entry **local_plt;
5368 char *lgot_masks;
5369
5370 if (locsyms == NULL)
5371 {
5372 locsyms = (Elf_Internal_Sym *) symtab_hdr->contents;
5373 if (locsyms == NULL)
5374 locsyms = bfd_elf_get_elf_syms (ibfd, symtab_hdr,
5375 symtab_hdr->sh_info,
5376 0, NULL, NULL, NULL);
5377 if (locsyms == NULL)
5378 {
5379 if (elf_section_data (sec)->relocs != relstart)
5380 free (relstart);
5381 return FALSE;
5382 }
5383 }
5384 lgot_refs = elf_local_got_refcounts (ibfd);
5385 if (lgot_refs == NULL)
5386 abort ();
5387 local_plt = (struct plt_entry **)
5388 (lgot_refs + symtab_hdr->sh_info);
5389 lgot_masks = (char *) (local_plt + symtab_hdr->sh_info);
5390 tls_mask = &lgot_masks[r_symndx];
5391 got_count = &lgot_refs[r_symndx];
5392 }
5393
5394 if (tls_set == 0)
5395 {
5396 /* We managed to get rid of a got entry. */
5397 if (*got_count > 0)
5398 *got_count -= 1;
5399 }
5400
5401 *tls_mask |= tls_set;
5402 *tls_mask &= ~tls_clear;
5403 }
5404
5405 if (elf_section_data (sec)->relocs != relstart)
5406 free (relstart);
5407 }
5408
5409 if (locsyms != NULL
5410 && (symtab_hdr->contents != (unsigned char *) locsyms))
5411 {
5412 if (!info->keep_memory)
5413 free (locsyms);
5414 else
5415 symtab_hdr->contents = (unsigned char *) locsyms;
5416 }
5417 }
5418 htab->do_tls_opt = 1;
5419 return TRUE;
5420 }
5421 \f
5422 /* Find dynamic relocs for H that apply to read-only sections. */
5423
5424 static asection *
5425 readonly_dynrelocs (struct elf_link_hash_entry *h)
5426 {
5427 struct elf_dyn_relocs *p;
5428
5429 for (p = ppc_elf_hash_entry (h)->dyn_relocs; p != NULL; p = p->next)
5430 {
5431 asection *s = p->sec->output_section;
5432
5433 if (s != NULL && (s->flags & SEC_READONLY) != 0)
5434 return p->sec;
5435 }
5436 return NULL;
5437 }
5438
5439 /* Return true if we have dynamic relocs against H or any of its weak
5440 aliases, that apply to read-only sections. Cannot be used after
5441 size_dynamic_sections. */
5442
5443 static bfd_boolean
5444 alias_readonly_dynrelocs (struct elf_link_hash_entry *h)
5445 {
5446 struct ppc_elf_link_hash_entry *eh = ppc_elf_hash_entry (h);
5447 do
5448 {
5449 if (readonly_dynrelocs (&eh->elf))
5450 return TRUE;
5451 eh = ppc_elf_hash_entry (eh->elf.u.alias);
5452 } while (eh != NULL && &eh->elf != h);
5453
5454 return FALSE;
5455 }
5456
5457 /* Return whether H has pc-relative dynamic relocs. */
5458
5459 static bfd_boolean
5460 pc_dynrelocs (struct elf_link_hash_entry *h)
5461 {
5462 struct elf_dyn_relocs *p;
5463
5464 for (p = ppc_elf_hash_entry (h)->dyn_relocs; p != NULL; p = p->next)
5465 if (p->pc_count != 0)
5466 return TRUE;
5467 return FALSE;
5468 }
5469
5470 /* Adjust a symbol defined by a dynamic object and referenced by a
5471 regular object. The current definition is in some section of the
5472 dynamic object, but we're not including those sections. We have to
5473 change the definition to something the rest of the link can
5474 understand. */
5475
5476 static bfd_boolean
5477 ppc_elf_adjust_dynamic_symbol (struct bfd_link_info *info,
5478 struct elf_link_hash_entry *h)
5479 {
5480 struct ppc_elf_link_hash_table *htab;
5481 asection *s;
5482
5483 #ifdef DEBUG
5484 fprintf (stderr, "ppc_elf_adjust_dynamic_symbol called for %s\n",
5485 h->root.root.string);
5486 #endif
5487
5488 /* Make sure we know what is going on here. */
5489 htab = ppc_elf_hash_table (info);
5490 BFD_ASSERT (htab->elf.dynobj != NULL
5491 && (h->needs_plt
5492 || h->type == STT_GNU_IFUNC
5493 || h->is_weakalias
5494 || (h->def_dynamic
5495 && h->ref_regular
5496 && !h->def_regular)));
5497
5498 /* Deal with function syms. */
5499 if (h->type == STT_FUNC
5500 || h->type == STT_GNU_IFUNC
5501 || h->needs_plt)
5502 {
5503 bfd_boolean local = (SYMBOL_CALLS_LOCAL (info, h)
5504 || UNDEFWEAK_NO_DYNAMIC_RELOC (info, h));
5505 /* Discard dyn_relocs when non-pic if we've decided that a
5506 function symbol is local. */
5507 if (!bfd_link_pic (info) && local)
5508 ppc_elf_hash_entry (h)->dyn_relocs = NULL;
5509
5510 /* Clear procedure linkage table information for any symbol that
5511 won't need a .plt entry. */
5512 struct plt_entry *ent;
5513 for (ent = h->plt.plist; ent != NULL; ent = ent->next)
5514 if (ent->plt.refcount > 0)
5515 break;
5516 if (ent == NULL
5517 || (h->type != STT_GNU_IFUNC && local))
5518 {
5519 /* A PLT entry is not required/allowed when:
5520
5521 1. We are not using ld.so; because then the PLT entry
5522 can't be set up, so we can't use one. In this case,
5523 ppc_elf_adjust_dynamic_symbol won't even be called.
5524
5525 2. GC has rendered the entry unused.
5526
5527 3. We know for certain that a call to this symbol
5528 will go to this object, or will remain undefined. */
5529 h->plt.plist = NULL;
5530 h->needs_plt = 0;
5531 h->pointer_equality_needed = 0;
5532 }
5533 else
5534 {
5535 /* Taking a function's address in a read/write section
5536 doesn't require us to define the function symbol in the
5537 executable on a plt call stub. A dynamic reloc can
5538 be used instead, giving better runtime performance.
5539 (Calls via that function pointer don't need to bounce
5540 through the plt call stub.) Similarly, use a dynamic
5541 reloc for a weak reference when possible, allowing the
5542 resolution of the symbol to be set at load time rather
5543 than link time. */
5544 if ((h->pointer_equality_needed
5545 || (h->non_got_ref
5546 && !h->ref_regular_nonweak
5547 && !UNDEFWEAK_NO_DYNAMIC_RELOC (info, h)))
5548 && !htab->is_vxworks
5549 && !ppc_elf_hash_entry (h)->has_sda_refs
5550 && !readonly_dynrelocs (h))
5551 {
5552 h->pointer_equality_needed = 0;
5553 /* If we haven't seen a branch reloc then we don't need
5554 a plt entry. */
5555 if (!h->needs_plt)
5556 h->plt.plist = NULL;
5557 }
5558 else if (!bfd_link_pic (info))
5559 /* We are going to be defining the function symbol on the
5560 plt stub, so no dyn_relocs needed when non-pic. */
5561 ppc_elf_hash_entry (h)->dyn_relocs = NULL;
5562 }
5563 h->protected_def = 0;
5564 /* Function symbols can't have copy relocs. */
5565 return TRUE;
5566 }
5567 else
5568 h->plt.plist = NULL;
5569
5570 /* If this is a weak symbol, and there is a real definition, the
5571 processor independent code will have arranged for us to see the
5572 real definition first, and we can just use the same value. */
5573 if (h->is_weakalias)
5574 {
5575 struct elf_link_hash_entry *def = weakdef (h);
5576 BFD_ASSERT (def->root.type == bfd_link_hash_defined);
5577 h->root.u.def.section = def->root.u.def.section;
5578 h->root.u.def.value = def->root.u.def.value;
5579 if (def->root.u.def.section == htab->elf.sdynbss
5580 || def->root.u.def.section == htab->elf.sdynrelro
5581 || def->root.u.def.section == htab->dynsbss)
5582 ppc_elf_hash_entry (h)->dyn_relocs = NULL;
5583 return TRUE;
5584 }
5585
5586 /* This is a reference to a symbol defined by a dynamic object which
5587 is not a function. */
5588
5589 /* If we are creating a shared library, we must presume that the
5590 only references to the symbol are via the global offset table.
5591 For such cases we need not do anything here; the relocations will
5592 be handled correctly by relocate_section. */
5593 if (bfd_link_pic (info))
5594 {
5595 h->protected_def = 0;
5596 return TRUE;
5597 }
5598
5599 /* If there are no references to this symbol that do not use the
5600 GOT, we don't need to generate a copy reloc. */
5601 if (!h->non_got_ref)
5602 {
5603 h->protected_def = 0;
5604 return TRUE;
5605 }
5606
5607 /* Protected variables do not work with .dynbss. The copy in
5608 .dynbss won't be used by the shared library with the protected
5609 definition for the variable. Editing to PIC, or text relocations
5610 are preferable to an incorrect program. */
5611 if (h->protected_def)
5612 {
5613 if (ELIMINATE_COPY_RELOCS
5614 && ppc_elf_hash_entry (h)->has_addr16_ha
5615 && ppc_elf_hash_entry (h)->has_addr16_lo
5616 && htab->params->pic_fixup == 0
5617 && info->disable_target_specific_optimizations <= 1)
5618 htab->params->pic_fixup = 1;
5619 return TRUE;
5620 }
5621
5622 /* If -z nocopyreloc was given, we won't generate them either. */
5623 if (info->nocopyreloc)
5624 return TRUE;
5625
5626 /* If we don't find any dynamic relocs in read-only sections, then
5627 we'll be keeping the dynamic relocs and avoiding the copy reloc.
5628 We can't do this if there are any small data relocations. This
5629 doesn't work on VxWorks, where we can not have dynamic
5630 relocations (other than copy and jump slot relocations) in an
5631 executable. */
5632 if (ELIMINATE_COPY_RELOCS
5633 && !ppc_elf_hash_entry (h)->has_sda_refs
5634 && !htab->is_vxworks
5635 && !h->def_regular
5636 && !alias_readonly_dynrelocs (h))
5637 return TRUE;
5638
5639 /* We must allocate the symbol in our .dynbss section, which will
5640 become part of the .bss section of the executable. There will be
5641 an entry for this symbol in the .dynsym section. The dynamic
5642 object will contain position independent code, so all references
5643 from the dynamic object to this symbol will go through the global
5644 offset table. The dynamic linker will use the .dynsym entry to
5645 determine the address it must put in the global offset table, so
5646 both the dynamic object and the regular object will refer to the
5647 same memory location for the variable.
5648
5649 Of course, if the symbol is referenced using SDAREL relocs, we
5650 must instead allocate it in .sbss. */
5651 if (ppc_elf_hash_entry (h)->has_sda_refs)
5652 s = htab->dynsbss;
5653 else if ((h->root.u.def.section->flags & SEC_READONLY) != 0)
5654 s = htab->elf.sdynrelro;
5655 else
5656 s = htab->elf.sdynbss;
5657 BFD_ASSERT (s != NULL);
5658
5659 if ((h->root.u.def.section->flags & SEC_ALLOC) != 0 && h->size != 0)
5660 {
5661 asection *srel;
5662
5663 /* We must generate a R_PPC_COPY reloc to tell the dynamic
5664 linker to copy the initial value out of the dynamic object
5665 and into the runtime process image. */
5666 if (ppc_elf_hash_entry (h)->has_sda_refs)
5667 srel = htab->relsbss;
5668 else if ((h->root.u.def.section->flags & SEC_READONLY) != 0)
5669 srel = htab->elf.sreldynrelro;
5670 else
5671 srel = htab->elf.srelbss;
5672 BFD_ASSERT (srel != NULL);
5673 srel->size += sizeof (Elf32_External_Rela);
5674 h->needs_copy = 1;
5675 }
5676
5677 /* We no longer want dyn_relocs. */
5678 ppc_elf_hash_entry (h)->dyn_relocs = NULL;
5679 return _bfd_elf_adjust_dynamic_copy (info, h, s);
5680 }
5681 \f
5682 /* Generate a symbol to mark plt call stubs. For non-PIC code the sym is
5683 xxxxxxxx.plt_call32.<callee> where xxxxxxxx is a hex number, usually 0,
5684 specifying the addend on the plt relocation. For -fpic code, the sym
5685 is xxxxxxxx.plt_pic32.<callee>, and for -fPIC
5686 xxxxxxxx.got2.plt_pic32.<callee>. */
5687
5688 static bfd_boolean
5689 add_stub_sym (struct plt_entry *ent,
5690 struct elf_link_hash_entry *h,
5691 struct bfd_link_info *info)
5692 {
5693 struct elf_link_hash_entry *sh;
5694 size_t len1, len2, len3;
5695 char *name;
5696 const char *stub;
5697 struct ppc_elf_link_hash_table *htab = ppc_elf_hash_table (info);
5698
5699 if (bfd_link_pic (info))
5700 stub = ".plt_pic32.";
5701 else
5702 stub = ".plt_call32.";
5703
5704 len1 = strlen (h->root.root.string);
5705 len2 = strlen (stub);
5706 len3 = 0;
5707 if (ent->sec)
5708 len3 = strlen (ent->sec->name);
5709 name = bfd_malloc (len1 + len2 + len3 + 9);
5710 if (name == NULL)
5711 return FALSE;
5712 sprintf (name, "%08x", (unsigned) ent->addend & 0xffffffff);
5713 if (ent->sec)
5714 memcpy (name + 8, ent->sec->name, len3);
5715 memcpy (name + 8 + len3, stub, len2);
5716 memcpy (name + 8 + len3 + len2, h->root.root.string, len1 + 1);
5717 sh = elf_link_hash_lookup (&htab->elf, name, TRUE, FALSE, FALSE);
5718 if (sh == NULL)
5719 return FALSE;
5720 if (sh->root.type == bfd_link_hash_new)
5721 {
5722 sh->root.type = bfd_link_hash_defined;
5723 sh->root.u.def.section = htab->glink;
5724 sh->root.u.def.value = ent->glink_offset;
5725 sh->ref_regular = 1;
5726 sh->def_regular = 1;
5727 sh->ref_regular_nonweak = 1;
5728 sh->forced_local = 1;
5729 sh->non_elf = 0;
5730 sh->root.linker_def = 1;
5731 }
5732 return TRUE;
5733 }
5734
5735 /* Allocate NEED contiguous space in .got, and return the offset.
5736 Handles allocation of the got header when crossing 32k. */
5737
5738 static bfd_vma
5739 allocate_got (struct ppc_elf_link_hash_table *htab, unsigned int need)
5740 {
5741 bfd_vma where;
5742 unsigned int max_before_header;
5743
5744 if (htab->plt_type == PLT_VXWORKS)
5745 {
5746 where = htab->elf.sgot->size;
5747 htab->elf.sgot->size += need;
5748 }
5749 else
5750 {
5751 max_before_header = htab->plt_type == PLT_NEW ? 32768 : 32764;
5752 if (need <= htab->got_gap)
5753 {
5754 where = max_before_header - htab->got_gap;
5755 htab->got_gap -= need;
5756 }
5757 else
5758 {
5759 if (htab->elf.sgot->size + need > max_before_header
5760 && htab->elf.sgot->size <= max_before_header)
5761 {
5762 htab->got_gap = max_before_header - htab->elf.sgot->size;
5763 htab->elf.sgot->size = max_before_header + htab->got_header_size;
5764 }
5765 where = htab->elf.sgot->size;
5766 htab->elf.sgot->size += need;
5767 }
5768 }
5769 return where;
5770 }
5771
5772 /* Calculate size of GOT entries for symbol given its TLS_MASK.
5773 TLS_LD is excluded because those go in a special GOT slot. */
5774
5775 static inline unsigned int
5776 got_entries_needed (int tls_mask)
5777 {
5778 unsigned int need;
5779 if ((tls_mask & TLS_TLS) == 0)
5780 need = 4;
5781 else
5782 {
5783 need = 0;
5784 if ((tls_mask & TLS_GD) != 0)
5785 need += 8;
5786 if ((tls_mask & (TLS_TPREL | TLS_TPRELGD)) != 0)
5787 need += 4;
5788 if ((tls_mask & TLS_DTPREL) != 0)
5789 need += 4;
5790 }
5791 return need;
5792 }
5793
5794 /* Calculate size of relocs needed for symbol given its TLS_MASK and
5795 NEEDed GOT entries. KNOWN says a TPREL offset can be calculated at
5796 link time. */
5797
5798 static inline unsigned int
5799 got_relocs_needed (int tls_mask, unsigned int need, bfd_boolean known)
5800 {
5801 /* All the entries we allocated need relocs.
5802 Except IE in executable with a local symbol. We could also omit
5803 the DTPREL reloc on the second word of a GD entry under the same
5804 condition as that for IE, but ld.so needs to differentiate
5805 LD and GD entries. */
5806 if ((tls_mask & (TLS_TPREL | TLS_TPRELGD)) != 0 && known)
5807 need -= 4;
5808 return need * sizeof (Elf32_External_Rela) / 4;
5809 }
5810
5811 /* If H is undefined, make it dynamic if that makes sense. */
5812
5813 static bfd_boolean
5814 ensure_undef_dynamic (struct bfd_link_info *info,
5815 struct elf_link_hash_entry *h)
5816 {
5817 struct elf_link_hash_table *htab = elf_hash_table (info);
5818
5819 if (htab->dynamic_sections_created
5820 && ((info->dynamic_undefined_weak != 0
5821 && h->root.type == bfd_link_hash_undefweak)
5822 || h->root.type == bfd_link_hash_undefined)
5823 && h->dynindx == -1
5824 && !h->forced_local
5825 && ELF_ST_VISIBILITY (h->other) == STV_DEFAULT)
5826 return bfd_elf_link_record_dynamic_symbol (info, h);
5827 return TRUE;
5828 }
5829
5830 /* Allocate space in associated reloc sections for dynamic relocs. */
5831
5832 static bfd_boolean
5833 allocate_dynrelocs (struct elf_link_hash_entry *h, void *inf)
5834 {
5835 struct bfd_link_info *info = inf;
5836 struct ppc_elf_link_hash_entry *eh;
5837 struct ppc_elf_link_hash_table *htab;
5838 struct elf_dyn_relocs *p;
5839 bfd_boolean dyn;
5840
5841 if (h->root.type == bfd_link_hash_indirect)
5842 return TRUE;
5843
5844 htab = ppc_elf_hash_table (info);
5845 eh = (struct ppc_elf_link_hash_entry *) h;
5846 if (eh->elf.got.refcount > 0
5847 || (ELIMINATE_COPY_RELOCS
5848 && !eh->elf.def_regular
5849 && eh->elf.protected_def
5850 && eh->has_addr16_ha
5851 && eh->has_addr16_lo
5852 && htab->params->pic_fixup > 0))
5853 {
5854 unsigned int need;
5855
5856 /* Make sure this symbol is output as a dynamic symbol. */
5857 if (!ensure_undef_dynamic (info, &eh->elf))
5858 return FALSE;
5859
5860 need = 0;
5861 if ((eh->tls_mask & TLS_LD) != 0)
5862 {
5863 if (!eh->elf.def_dynamic)
5864 /* We'll just use htab->tlsld_got.offset. This should
5865 always be the case. It's a little odd if we have
5866 a local dynamic reloc against a non-local symbol. */
5867 htab->tlsld_got.refcount += 1;
5868 else
5869 need += 8;
5870 }
5871 need += got_entries_needed (eh->tls_mask);
5872 if (need == 0)
5873 eh->elf.got.offset = (bfd_vma) -1;
5874 else
5875 {
5876 eh->elf.got.offset = allocate_got (htab, need);
5877 if ((bfd_link_pic (info)
5878 || (htab->elf.dynamic_sections_created
5879 && eh->elf.dynindx != -1
5880 && !SYMBOL_REFERENCES_LOCAL (info, &eh->elf)))
5881 && !UNDEFWEAK_NO_DYNAMIC_RELOC (info, &eh->elf))
5882 {
5883 asection *rsec;
5884 bfd_boolean tprel_known = (bfd_link_executable (info)
5885 && SYMBOL_REFERENCES_LOCAL (info,
5886 &eh->elf));
5887
5888 need = got_relocs_needed (eh->tls_mask, need, tprel_known);
5889 if ((eh->tls_mask & TLS_LD) != 0 && eh->elf.def_dynamic)
5890 need -= sizeof (Elf32_External_Rela);
5891 rsec = htab->elf.srelgot;
5892 if (eh->elf.type == STT_GNU_IFUNC)
5893 rsec = htab->elf.irelplt;
5894 rsec->size += need;
5895 }
5896 }
5897 }
5898 else
5899 eh->elf.got.offset = (bfd_vma) -1;
5900
5901 /* If no dynamic sections we can't have dynamic relocs, except for
5902 IFUNCs which are handled even in static executables. */
5903 if (!htab->elf.dynamic_sections_created
5904 && h->type != STT_GNU_IFUNC)
5905 eh->dyn_relocs = NULL;
5906
5907 /* Discard relocs on undefined symbols that must be local. */
5908 else if (h->root.type == bfd_link_hash_undefined
5909 && ELF_ST_VISIBILITY (h->other) != STV_DEFAULT)
5910 eh->dyn_relocs = NULL;
5911
5912 /* Also discard relocs on undefined weak syms with non-default
5913 visibility, or when dynamic_undefined_weak says so. */
5914 else if (UNDEFWEAK_NO_DYNAMIC_RELOC (info, h))
5915 eh->dyn_relocs = NULL;
5916
5917 if (eh->dyn_relocs == NULL)
5918 ;
5919
5920 /* In the shared -Bsymbolic case, discard space allocated for
5921 dynamic pc-relative relocs against symbols which turn out to be
5922 defined in regular objects. For the normal shared case, discard
5923 space for relocs that have become local due to symbol visibility
5924 changes. */
5925 else if (bfd_link_pic (info))
5926 {
5927 /* Relocs that use pc_count are those that appear on a call insn,
5928 or certain REL relocs (see must_be_dyn_reloc) that can be
5929 generated via assembly. We want calls to protected symbols to
5930 resolve directly to the function rather than going via the plt.
5931 If people want function pointer comparisons to work as expected
5932 then they should avoid writing weird assembly. */
5933 if (SYMBOL_CALLS_LOCAL (info, h))
5934 {
5935 struct elf_dyn_relocs **pp;
5936
5937 for (pp = &eh->dyn_relocs; (p = *pp) != NULL; )
5938 {
5939 p->count -= p->pc_count;
5940 p->pc_count = 0;
5941 if (p->count == 0)
5942 *pp = p->next;
5943 else
5944 pp = &p->next;
5945 }
5946 }
5947
5948 if (htab->is_vxworks)
5949 {
5950 struct elf_dyn_relocs **pp;
5951
5952 for (pp = &eh->dyn_relocs; (p = *pp) != NULL; )
5953 {
5954 if (strcmp (p->sec->output_section->name, ".tls_vars") == 0)
5955 *pp = p->next;
5956 else
5957 pp = &p->next;
5958 }
5959 }
5960
5961 if (eh->dyn_relocs != NULL)
5962 {
5963 /* Make sure this symbol is output as a dynamic symbol. */
5964 if (!ensure_undef_dynamic (info, h))
5965 return FALSE;
5966 }
5967 }
5968 else if (ELIMINATE_COPY_RELOCS)
5969 {
5970 /* For the non-pic case, discard space for relocs against
5971 symbols which turn out to need copy relocs or are not
5972 dynamic. */
5973 if (h->dynamic_adjusted
5974 && !h->def_regular
5975 && !ELF_COMMON_DEF_P (h)
5976 && !(h->protected_def
5977 && eh->has_addr16_ha
5978 && eh->has_addr16_lo
5979 && htab->params->pic_fixup > 0))
5980 {
5981 /* Make sure this symbol is output as a dynamic symbol. */
5982 if (!ensure_undef_dynamic (info, h))
5983 return FALSE;
5984
5985 if (h->dynindx == -1)
5986 eh->dyn_relocs = NULL;
5987 }
5988 else
5989 eh->dyn_relocs = NULL;
5990 }
5991
5992 /* Allocate space. */
5993 for (p = eh->dyn_relocs; p != NULL; p = p->next)
5994 {
5995 asection *sreloc = elf_section_data (p->sec)->sreloc;
5996 if (eh->elf.type == STT_GNU_IFUNC)
5997 sreloc = htab->elf.irelplt;
5998 sreloc->size += p->count * sizeof (Elf32_External_Rela);
5999 }
6000
6001 /* Handle PLT relocs. Done last, after dynindx has settled. */
6002 dyn = htab->elf.dynamic_sections_created && h->dynindx != -1;
6003 if (dyn || h->type == STT_GNU_IFUNC)
6004 {
6005 struct plt_entry *ent;
6006 bfd_boolean doneone = FALSE;
6007 bfd_vma plt_offset = 0, glink_offset = 0;
6008
6009 for (ent = h->plt.plist; ent != NULL; ent = ent->next)
6010 if (ent->plt.refcount > 0)
6011 {
6012 asection *s = htab->elf.splt;
6013
6014 if (!dyn)
6015 s = htab->elf.iplt;
6016
6017 if (htab->plt_type == PLT_NEW || !dyn)
6018 {
6019 if (!doneone)
6020 {
6021 plt_offset = s->size;
6022 s->size += 4;
6023 }
6024 ent->plt.offset = plt_offset;
6025
6026 s = htab->glink;
6027 if (!doneone || bfd_link_pic (info))
6028 {
6029 glink_offset = s->size;
6030 s->size += GLINK_ENTRY_SIZE (htab, h);
6031 }
6032 if (!doneone
6033 && !bfd_link_pic (info)
6034 && h->def_dynamic
6035 && !h->def_regular)
6036 {
6037 h->root.u.def.section = s;
6038 h->root.u.def.value = glink_offset;
6039 }
6040 ent->glink_offset = glink_offset;
6041
6042 if (htab->params->emit_stub_syms
6043 && !add_stub_sym (ent, h, info))
6044 return FALSE;
6045 }
6046 else
6047 {
6048 if (!doneone)
6049 {
6050 /* If this is the first .plt entry, make room
6051 for the special first entry. */
6052 if (s->size == 0)
6053 s->size += htab->plt_initial_entry_size;
6054
6055 /* The PowerPC PLT is actually composed of two
6056 parts, the first part is 2 words (for a load
6057 and a jump), and then there is a remaining
6058 word available at the end. */
6059 plt_offset = (htab->plt_initial_entry_size
6060 + (htab->plt_slot_size
6061 * ((s->size
6062 - htab->plt_initial_entry_size)
6063 / htab->plt_entry_size)));
6064
6065 /* If this symbol is not defined in a regular
6066 file, and we are not generating a shared
6067 library, then set the symbol to this location
6068 in the .plt. This is to avoid text
6069 relocations, and is required to make
6070 function pointers compare as equal between
6071 the normal executable and the shared library. */
6072 if (! bfd_link_pic (info)
6073 && h->def_dynamic
6074 && !h->def_regular)
6075 {
6076 h->root.u.def.section = s;
6077 h->root.u.def.value = plt_offset;
6078 }
6079
6080 /* Make room for this entry. */
6081 s->size += htab->plt_entry_size;
6082 /* After the 8192nd entry, room for two entries
6083 is allocated. */
6084 if (htab->plt_type == PLT_OLD
6085 && (s->size - htab->plt_initial_entry_size)
6086 / htab->plt_entry_size
6087 > PLT_NUM_SINGLE_ENTRIES)
6088 s->size += htab->plt_entry_size;
6089 }
6090 ent->plt.offset = plt_offset;
6091 }
6092
6093 /* We also need to make an entry in the .rela.plt section. */
6094 if (!doneone)
6095 {
6096 if (!dyn)
6097 htab->elf.irelplt->size += sizeof (Elf32_External_Rela);
6098 else
6099 {
6100 htab->elf.srelplt->size += sizeof (Elf32_External_Rela);
6101
6102 if (htab->plt_type == PLT_VXWORKS)
6103 {
6104 /* Allocate space for the unloaded relocations. */
6105 if (!bfd_link_pic (info)
6106 && htab->elf.dynamic_sections_created)
6107 {
6108 if (ent->plt.offset
6109 == (bfd_vma) htab->plt_initial_entry_size)
6110 {
6111 htab->srelplt2->size
6112 += (sizeof (Elf32_External_Rela)
6113 * VXWORKS_PLTRESOLVE_RELOCS);
6114 }
6115
6116 htab->srelplt2->size
6117 += (sizeof (Elf32_External_Rela)
6118 * VXWORKS_PLT_NON_JMP_SLOT_RELOCS);
6119 }
6120
6121 /* Every PLT entry has an associated GOT entry in
6122 .got.plt. */
6123 htab->elf.sgotplt->size += 4;
6124 }
6125 }
6126 doneone = TRUE;
6127 }
6128 }
6129 else
6130 ent->plt.offset = (bfd_vma) -1;
6131
6132 if (!doneone)
6133 {
6134 h->plt.plist = NULL;
6135 h->needs_plt = 0;
6136 }
6137 }
6138 else
6139 {
6140 h->plt.plist = NULL;
6141 h->needs_plt = 0;
6142 }
6143
6144 return TRUE;
6145 }
6146
6147 /* Set DF_TEXTREL if we find any dynamic relocs that apply to
6148 read-only sections. */
6149
6150 static bfd_boolean
6151 maybe_set_textrel (struct elf_link_hash_entry *h, void *info_p)
6152 {
6153 asection *sec;
6154
6155 if (h->root.type == bfd_link_hash_indirect)
6156 return TRUE;
6157
6158 sec = readonly_dynrelocs (h);
6159 if (sec != NULL)
6160 {
6161 struct bfd_link_info *info = (struct bfd_link_info *) info_p;
6162
6163 info->flags |= DF_TEXTREL;
6164 info->callbacks->minfo
6165 (_("%pB: dynamic relocation against `%pT' in read-only section `%pA'\n"),
6166 sec->owner, h->root.root.string, sec);
6167
6168 /* Not an error, just cut short the traversal. */
6169 return FALSE;
6170 }
6171 return TRUE;
6172 }
6173
6174 static const unsigned char glink_eh_frame_cie[] =
6175 {
6176 0, 0, 0, 16, /* length. */
6177 0, 0, 0, 0, /* id. */
6178 1, /* CIE version. */
6179 'z', 'R', 0, /* Augmentation string. */
6180 4, /* Code alignment. */
6181 0x7c, /* Data alignment. */
6182 65, /* RA reg. */
6183 1, /* Augmentation size. */
6184 DW_EH_PE_pcrel | DW_EH_PE_sdata4, /* FDE encoding. */
6185 DW_CFA_def_cfa, 1, 0 /* def_cfa: r1 offset 0. */
6186 };
6187
6188 /* Set the sizes of the dynamic sections. */
6189
6190 static bfd_boolean
6191 ppc_elf_size_dynamic_sections (bfd *output_bfd,
6192 struct bfd_link_info *info)
6193 {
6194 struct ppc_elf_link_hash_table *htab;
6195 asection *s;
6196 bfd_boolean relocs;
6197 bfd *ibfd;
6198
6199 #ifdef DEBUG
6200 fprintf (stderr, "ppc_elf_size_dynamic_sections called\n");
6201 #endif
6202
6203 htab = ppc_elf_hash_table (info);
6204 BFD_ASSERT (htab->elf.dynobj != NULL);
6205
6206 if (elf_hash_table (info)->dynamic_sections_created)
6207 {
6208 /* Set the contents of the .interp section to the interpreter. */
6209 if (bfd_link_executable (info) && !info->nointerp)
6210 {
6211 s = bfd_get_linker_section (htab->elf.dynobj, ".interp");
6212 BFD_ASSERT (s != NULL);
6213 s->size = sizeof ELF_DYNAMIC_INTERPRETER;
6214 s->contents = (unsigned char *) ELF_DYNAMIC_INTERPRETER;
6215 }
6216 }
6217
6218 if (htab->plt_type == PLT_OLD)
6219 htab->got_header_size = 16;
6220 else if (htab->plt_type == PLT_NEW)
6221 htab->got_header_size = 12;
6222
6223 /* Set up .got offsets for local syms, and space for local dynamic
6224 relocs. */
6225 for (ibfd = info->input_bfds; ibfd != NULL; ibfd = ibfd->link.next)
6226 {
6227 bfd_signed_vma *local_got;
6228 bfd_signed_vma *end_local_got;
6229 struct plt_entry **local_plt;
6230 struct plt_entry **end_local_plt;
6231 char *lgot_masks;
6232 bfd_size_type locsymcount;
6233 Elf_Internal_Shdr *symtab_hdr;
6234
6235 if (!is_ppc_elf (ibfd))
6236 continue;
6237
6238 for (s = ibfd->sections; s != NULL; s = s->next)
6239 {
6240 struct ppc_dyn_relocs *p;
6241
6242 for (p = ((struct ppc_dyn_relocs *)
6243 elf_section_data (s)->local_dynrel);
6244 p != NULL;
6245 p = p->next)
6246 {
6247 if (!bfd_is_abs_section (p->sec)
6248 && bfd_is_abs_section (p->sec->output_section))
6249 {
6250 /* Input section has been discarded, either because
6251 it is a copy of a linkonce section or due to
6252 linker script /DISCARD/, so we'll be discarding
6253 the relocs too. */
6254 }
6255 else if (htab->is_vxworks
6256 && strcmp (p->sec->output_section->name,
6257 ".tls_vars") == 0)
6258 {
6259 /* Relocations in vxworks .tls_vars sections are
6260 handled specially by the loader. */
6261 }
6262 else if (p->count != 0)
6263 {
6264 asection *sreloc = elf_section_data (p->sec)->sreloc;
6265 if (p->ifunc)
6266 sreloc = htab->elf.irelplt;
6267 sreloc->size += p->count * sizeof (Elf32_External_Rela);
6268 if ((p->sec->output_section->flags
6269 & (SEC_READONLY | SEC_ALLOC))
6270 == (SEC_READONLY | SEC_ALLOC))
6271 {
6272 info->flags |= DF_TEXTREL;
6273 info->callbacks->minfo (_("%pB: dynamic relocation in read-only section `%pA'\n"),
6274 p->sec->owner, p->sec);
6275 }
6276 }
6277 }
6278 }
6279
6280 local_got = elf_local_got_refcounts (ibfd);
6281 if (!local_got)
6282 continue;
6283
6284 symtab_hdr = &elf_symtab_hdr (ibfd);
6285 locsymcount = symtab_hdr->sh_info;
6286 end_local_got = local_got + locsymcount;
6287 local_plt = (struct plt_entry **) end_local_got;
6288 end_local_plt = local_plt + locsymcount;
6289 lgot_masks = (char *) end_local_plt;
6290
6291 for (; local_got < end_local_got; ++local_got, ++lgot_masks)
6292 if (*local_got > 0)
6293 {
6294 unsigned int need;
6295 if ((*lgot_masks & TLS_LD) != 0)
6296 htab->tlsld_got.refcount += 1;
6297 need = got_entries_needed (*lgot_masks);
6298 if (need == 0)
6299 *local_got = (bfd_vma) -1;
6300 else
6301 {
6302 *local_got = allocate_got (htab, need);
6303 if (bfd_link_pic (info))
6304 {
6305 asection *srel;
6306 bfd_boolean tprel_known = bfd_link_executable (info);
6307
6308 need = got_relocs_needed (*lgot_masks, need, tprel_known);
6309 srel = htab->elf.srelgot;
6310 if ((*lgot_masks & PLT_IFUNC) != 0)
6311 srel = htab->elf.irelplt;
6312 srel->size += need;
6313 }
6314 }
6315 }
6316 else
6317 *local_got = (bfd_vma) -1;
6318
6319 if (htab->is_vxworks)
6320 continue;
6321
6322 /* Allocate space for calls to local STT_GNU_IFUNC syms in .iplt. */
6323 for (; local_plt < end_local_plt; ++local_plt)
6324 {
6325 struct plt_entry *ent;
6326 bfd_boolean doneone = FALSE;
6327 bfd_vma plt_offset = 0, glink_offset = 0;
6328
6329 for (ent = *local_plt; ent != NULL; ent = ent->next)
6330 if (ent->plt.refcount > 0)
6331 {
6332 s = htab->elf.iplt;
6333
6334 if (!doneone)
6335 {
6336 plt_offset = s->size;
6337 s->size += 4;
6338 }
6339 ent->plt.offset = plt_offset;
6340
6341 s = htab->glink;
6342 if (!doneone || bfd_link_pic (info))
6343 {
6344 glink_offset = s->size;
6345 s->size += GLINK_ENTRY_SIZE (htab, NULL);
6346 }
6347 ent->glink_offset = glink_offset;
6348
6349 if (!doneone)
6350 {
6351 htab->elf.irelplt->size += sizeof (Elf32_External_Rela);
6352 doneone = TRUE;
6353 }
6354 }
6355 else
6356 ent->plt.offset = (bfd_vma) -1;
6357 }
6358 }
6359
6360 /* Allocate space for global sym dynamic relocs. */
6361 elf_link_hash_traverse (elf_hash_table (info), allocate_dynrelocs, info);
6362
6363 if (htab->tlsld_got.refcount > 0)
6364 {
6365 htab->tlsld_got.offset = allocate_got (htab, 8);
6366 if (bfd_link_pic (info))
6367 htab->elf.srelgot->size += sizeof (Elf32_External_Rela);
6368 }
6369 else
6370 htab->tlsld_got.offset = (bfd_vma) -1;
6371
6372 if (htab->elf.sgot != NULL && htab->plt_type != PLT_VXWORKS)
6373 {
6374 unsigned int g_o_t = 32768;
6375
6376 /* If we haven't allocated the header, do so now. When we get here,
6377 for old plt/got the got size will be 0 to 32764 (not allocated),
6378 or 32780 to 65536 (header allocated). For new plt/got, the
6379 corresponding ranges are 0 to 32768 and 32780 to 65536. */
6380 if (htab->elf.sgot->size <= 32768)
6381 {
6382 g_o_t = htab->elf.sgot->size;
6383 if (htab->plt_type == PLT_OLD)
6384 g_o_t += 4;
6385 htab->elf.sgot->size += htab->got_header_size;
6386 }
6387
6388 htab->elf.hgot->root.u.def.value = g_o_t;
6389 }
6390 if (bfd_link_pic (info))
6391 {
6392 struct elf_link_hash_entry *sda = htab->sdata[0].sym;
6393
6394 sda->root.u.def.section = htab->elf.hgot->root.u.def.section;
6395 sda->root.u.def.value = htab->elf.hgot->root.u.def.value;
6396 }
6397 if (info->emitrelocations)
6398 {
6399 struct elf_link_hash_entry *sda = htab->sdata[0].sym;
6400
6401 if (sda != NULL && sda->ref_regular)
6402 sda->root.u.def.section->flags |= SEC_KEEP;
6403 sda = htab->sdata[1].sym;
6404 if (sda != NULL && sda->ref_regular)
6405 sda->root.u.def.section->flags |= SEC_KEEP;
6406 }
6407
6408 if (htab->glink != NULL
6409 && htab->glink->size != 0
6410 && htab->elf.dynamic_sections_created)
6411 {
6412 htab->glink_pltresolve = htab->glink->size;
6413 /* Space for the branch table. */
6414 htab->glink->size
6415 += htab->elf.srelplt->size / (sizeof (Elf32_External_Rela) / 4) - 4;
6416 /* Pad out to align the start of PLTresolve. */
6417 htab->glink->size += -htab->glink->size & (htab->params->ppc476_workaround
6418 ? 63 : 15);
6419 htab->glink->size += GLINK_PLTRESOLVE;
6420
6421 if (htab->params->emit_stub_syms)
6422 {
6423 struct elf_link_hash_entry *sh;
6424 sh = elf_link_hash_lookup (&htab->elf, "__glink",
6425 TRUE, FALSE, FALSE);
6426 if (sh == NULL)
6427 return FALSE;
6428 if (sh->root.type == bfd_link_hash_new)
6429 {
6430 sh->root.type = bfd_link_hash_defined;
6431 sh->root.u.def.section = htab->glink;
6432 sh->root.u.def.value = htab->glink_pltresolve;
6433 sh->ref_regular = 1;
6434 sh->def_regular = 1;
6435 sh->ref_regular_nonweak = 1;
6436 sh->forced_local = 1;
6437 sh->non_elf = 0;
6438 sh->root.linker_def = 1;
6439 }
6440 sh = elf_link_hash_lookup (&htab->elf, "__glink_PLTresolve",
6441 TRUE, FALSE, FALSE);
6442 if (sh == NULL)
6443 return FALSE;
6444 if (sh->root.type == bfd_link_hash_new)
6445 {
6446 sh->root.type = bfd_link_hash_defined;
6447 sh->root.u.def.section = htab->glink;
6448 sh->root.u.def.value = htab->glink->size - GLINK_PLTRESOLVE;
6449 sh->ref_regular = 1;
6450 sh->def_regular = 1;
6451 sh->ref_regular_nonweak = 1;
6452 sh->forced_local = 1;
6453 sh->non_elf = 0;
6454 sh->root.linker_def = 1;
6455 }
6456 }
6457 }
6458
6459 if (htab->glink != NULL
6460 && htab->glink->size != 0
6461 && htab->glink_eh_frame != NULL
6462 && !bfd_is_abs_section (htab->glink_eh_frame->output_section)
6463 && _bfd_elf_eh_frame_present (info))
6464 {
6465 s = htab->glink_eh_frame;
6466 s->size = sizeof (glink_eh_frame_cie) + 20;
6467 if (bfd_link_pic (info))
6468 {
6469 s->size += 4;
6470 if (htab->glink->size - GLINK_PLTRESOLVE + 8 >= 256)
6471 s->size += 4;
6472 }
6473 }
6474
6475 /* We've now determined the sizes of the various dynamic sections.
6476 Allocate memory for them. */
6477 relocs = FALSE;
6478 for (s = htab->elf.dynobj->sections; s != NULL; s = s->next)
6479 {
6480 bfd_boolean strip_section = TRUE;
6481
6482 if ((s->flags & SEC_LINKER_CREATED) == 0)
6483 continue;
6484
6485 if (s == htab->elf.splt
6486 || s == htab->elf.sgot)
6487 {
6488 /* We'd like to strip these sections if they aren't needed, but if
6489 we've exported dynamic symbols from them we must leave them.
6490 It's too late to tell BFD to get rid of the symbols. */
6491 if (htab->elf.hplt != NULL)
6492 strip_section = FALSE;
6493 /* Strip this section if we don't need it; see the
6494 comment below. */
6495 }
6496 else if (s == htab->elf.iplt
6497 || s == htab->glink
6498 || s == htab->glink_eh_frame
6499 || s == htab->elf.sgotplt
6500 || s == htab->sbss
6501 || s == htab->elf.sdynbss
6502 || s == htab->elf.sdynrelro
6503 || s == htab->dynsbss)
6504 {
6505 /* Strip these too. */
6506 }
6507 else if (s == htab->sdata[0].section
6508 || s == htab->sdata[1].section)
6509 {
6510 strip_section = (s->flags & SEC_KEEP) == 0;
6511 }
6512 else if (CONST_STRNEQ (bfd_get_section_name (htab->elf.dynobj, s),
6513 ".rela"))
6514 {
6515 if (s->size != 0)
6516 {
6517 /* Remember whether there are any relocation sections. */
6518 relocs = TRUE;
6519
6520 /* We use the reloc_count field as a counter if we need
6521 to copy relocs into the output file. */
6522 s->reloc_count = 0;
6523 }
6524 }
6525 else
6526 {
6527 /* It's not one of our sections, so don't allocate space. */
6528 continue;
6529 }
6530
6531 if (s->size == 0 && strip_section)
6532 {
6533 /* If we don't need this section, strip it from the
6534 output file. This is mostly to handle .rela.bss and
6535 .rela.plt. We must create both sections in
6536 create_dynamic_sections, because they must be created
6537 before the linker maps input sections to output
6538 sections. The linker does that before
6539 adjust_dynamic_symbol is called, and it is that
6540 function which decides whether anything needs to go
6541 into these sections. */
6542 s->flags |= SEC_EXCLUDE;
6543 continue;
6544 }
6545
6546 if ((s->flags & SEC_HAS_CONTENTS) == 0)
6547 continue;
6548
6549 /* Allocate memory for the section contents. */
6550 s->contents = bfd_zalloc (htab->elf.dynobj, s->size);
6551 if (s->contents == NULL)
6552 return FALSE;
6553 }
6554
6555 if (htab->elf.dynamic_sections_created)
6556 {
6557 /* Add some entries to the .dynamic section. We fill in the
6558 values later, in ppc_elf_finish_dynamic_sections, but we
6559 must add the entries now so that we get the correct size for
6560 the .dynamic section. The DT_DEBUG entry is filled in by the
6561 dynamic linker and used by the debugger. */
6562 #define add_dynamic_entry(TAG, VAL) \
6563 _bfd_elf_add_dynamic_entry (info, TAG, VAL)
6564
6565 if (bfd_link_executable (info))
6566 {
6567 if (!add_dynamic_entry (DT_DEBUG, 0))
6568 return FALSE;
6569 }
6570
6571 if (htab->elf.splt != NULL && htab->elf.splt->size != 0)
6572 {
6573 if (!add_dynamic_entry (DT_PLTGOT, 0)
6574 || !add_dynamic_entry (DT_PLTRELSZ, 0)
6575 || !add_dynamic_entry (DT_PLTREL, DT_RELA)
6576 || !add_dynamic_entry (DT_JMPREL, 0))
6577 return FALSE;
6578 }
6579
6580 if (htab->plt_type == PLT_NEW
6581 && htab->glink != NULL
6582 && htab->glink->size != 0)
6583 {
6584 if (!add_dynamic_entry (DT_PPC_GOT, 0))
6585 return FALSE;
6586 if (!htab->params->no_tls_get_addr_opt
6587 && htab->tls_get_addr != NULL
6588 && htab->tls_get_addr->plt.plist != NULL
6589 && !add_dynamic_entry (DT_PPC_OPT, PPC_OPT_TLS))
6590 return FALSE;
6591 }
6592
6593 if (relocs)
6594 {
6595 if (!add_dynamic_entry (DT_RELA, 0)
6596 || !add_dynamic_entry (DT_RELASZ, 0)
6597 || !add_dynamic_entry (DT_RELAENT, sizeof (Elf32_External_Rela)))
6598 return FALSE;
6599 }
6600
6601 /* If any dynamic relocs apply to a read-only section, then we
6602 need a DT_TEXTREL entry. */
6603 if ((info->flags & DF_TEXTREL) == 0)
6604 elf_link_hash_traverse (elf_hash_table (info), maybe_set_textrel,
6605 info);
6606
6607 if ((info->flags & DF_TEXTREL) != 0)
6608 {
6609 if (!add_dynamic_entry (DT_TEXTREL, 0))
6610 return FALSE;
6611 }
6612 if (htab->is_vxworks
6613 && !elf_vxworks_add_dynamic_entries (output_bfd, info))
6614 return FALSE;
6615 }
6616 #undef add_dynamic_entry
6617
6618 if (htab->glink_eh_frame != NULL
6619 && htab->glink_eh_frame->contents != NULL)
6620 {
6621 unsigned char *p = htab->glink_eh_frame->contents;
6622 bfd_vma val;
6623
6624 memcpy (p, glink_eh_frame_cie, sizeof (glink_eh_frame_cie));
6625 /* CIE length (rewrite in case little-endian). */
6626 bfd_put_32 (htab->elf.dynobj, sizeof (glink_eh_frame_cie) - 4, p);
6627 p += sizeof (glink_eh_frame_cie);
6628 /* FDE length. */
6629 val = htab->glink_eh_frame->size - 4 - sizeof (glink_eh_frame_cie);
6630 bfd_put_32 (htab->elf.dynobj, val, p);
6631 p += 4;
6632 /* CIE pointer. */
6633 val = p - htab->glink_eh_frame->contents;
6634 bfd_put_32 (htab->elf.dynobj, val, p);
6635 p += 4;
6636 /* Offset to .glink. Set later. */
6637 p += 4;
6638 /* .glink size. */
6639 bfd_put_32 (htab->elf.dynobj, htab->glink->size, p);
6640 p += 4;
6641 /* Augmentation. */
6642 p += 1;
6643
6644 if (bfd_link_pic (info)
6645 && htab->elf.dynamic_sections_created)
6646 {
6647 bfd_vma adv = (htab->glink->size - GLINK_PLTRESOLVE + 8) >> 2;
6648 if (adv < 64)
6649 *p++ = DW_CFA_advance_loc + adv;
6650 else if (adv < 256)
6651 {
6652 *p++ = DW_CFA_advance_loc1;
6653 *p++ = adv;
6654 }
6655 else if (adv < 65536)
6656 {
6657 *p++ = DW_CFA_advance_loc2;
6658 bfd_put_16 (htab->elf.dynobj, adv, p);
6659 p += 2;
6660 }
6661 else
6662 {
6663 *p++ = DW_CFA_advance_loc4;
6664 bfd_put_32 (htab->elf.dynobj, adv, p);
6665 p += 4;
6666 }
6667 *p++ = DW_CFA_register;
6668 *p++ = 65;
6669 p++;
6670 *p++ = DW_CFA_advance_loc + 4;
6671 *p++ = DW_CFA_restore_extended;
6672 *p++ = 65;
6673 }
6674 BFD_ASSERT ((bfd_vma) ((p + 3 - htab->glink_eh_frame->contents) & -4)
6675 == htab->glink_eh_frame->size);
6676 }
6677
6678 return TRUE;
6679 }
6680
6681 /* Arrange to have _SDA_BASE_ or _SDA2_BASE_ stripped from the output
6682 if it looks like nothing is using them. */
6683
6684 static void
6685 maybe_strip_sdasym (bfd *output_bfd, elf_linker_section_t *lsect)
6686 {
6687 struct elf_link_hash_entry *sda = lsect->sym;
6688
6689 if (sda != NULL && !sda->ref_regular && sda->dynindx == -1)
6690 {
6691 asection *s;
6692
6693 s = bfd_get_section_by_name (output_bfd, lsect->name);
6694 if (s == NULL || bfd_section_removed_from_list (output_bfd, s))
6695 {
6696 s = bfd_get_section_by_name (output_bfd, lsect->bss_name);
6697 if (s == NULL || bfd_section_removed_from_list (output_bfd, s))
6698 {
6699 sda->def_regular = 0;
6700 /* This is somewhat magic. See elf_link_output_extsym. */
6701 sda->ref_dynamic = 1;
6702 sda->forced_local = 0;
6703 }
6704 }
6705 }
6706 }
6707
6708 void
6709 ppc_elf_maybe_strip_sdata_syms (struct bfd_link_info *info)
6710 {
6711 struct ppc_elf_link_hash_table *htab = ppc_elf_hash_table (info);
6712
6713 if (htab != NULL)
6714 {
6715 maybe_strip_sdasym (info->output_bfd, &htab->sdata[0]);
6716 maybe_strip_sdasym (info->output_bfd, &htab->sdata[1]);
6717 }
6718 }
6719
6720
6721 /* Return TRUE if symbol should be hashed in the `.gnu.hash' section. */
6722
6723 static bfd_boolean
6724 ppc_elf_hash_symbol (struct elf_link_hash_entry *h)
6725 {
6726 if (h->plt.plist != NULL
6727 && !h->def_regular
6728 && (!h->pointer_equality_needed
6729 || !h->ref_regular_nonweak))
6730 return FALSE;
6731
6732 return _bfd_elf_hash_symbol (h);
6733 }
6734 \f
6735 #define ARRAY_SIZE(a) (sizeof (a) / sizeof ((a)[0]))
6736
6737 /* Relaxation trampolines. r12 is available for clobbering (r11, is
6738 used for some functions that are allowed to break the ABI). */
6739 static const int shared_stub_entry[] =
6740 {
6741 0x7c0802a6, /* mflr 0 */
6742 0x429f0005, /* bcl 20, 31, .Lxxx */
6743 0x7d8802a6, /* mflr 12 */
6744 0x3d8c0000, /* addis 12, 12, (xxx-.Lxxx)@ha */
6745 0x398c0000, /* addi 12, 12, (xxx-.Lxxx)@l */
6746 0x7c0803a6, /* mtlr 0 */
6747 0x7d8903a6, /* mtctr 12 */
6748 0x4e800420, /* bctr */
6749 };
6750
6751 static const int stub_entry[] =
6752 {
6753 0x3d800000, /* lis 12,xxx@ha */
6754 0x398c0000, /* addi 12,12,xxx@l */
6755 0x7d8903a6, /* mtctr 12 */
6756 0x4e800420, /* bctr */
6757 };
6758
6759 struct ppc_elf_relax_info
6760 {
6761 unsigned int workaround_size;
6762 unsigned int picfixup_size;
6763 };
6764
6765 /* This function implements long branch trampolines, and the ppc476
6766 icache bug workaround. Any section needing trampolines or patch
6767 space for the workaround has its size extended so that we can
6768 add trampolines at the end of the section. */
6769
6770 static bfd_boolean
6771 ppc_elf_relax_section (bfd *abfd,
6772 asection *isec,
6773 struct bfd_link_info *link_info,
6774 bfd_boolean *again)
6775 {
6776 struct one_branch_fixup
6777 {
6778 struct one_branch_fixup *next;
6779 asection *tsec;
6780 /* Final link, can use the symbol offset. For a
6781 relocatable link we use the symbol's index. */
6782 bfd_vma toff;
6783 bfd_vma trampoff;
6784 };
6785
6786 Elf_Internal_Shdr *symtab_hdr;
6787 bfd_byte *contents = NULL;
6788 Elf_Internal_Sym *isymbuf = NULL;
6789 Elf_Internal_Rela *internal_relocs = NULL;
6790 Elf_Internal_Rela *irel, *irelend = NULL;
6791 struct one_branch_fixup *branch_fixups = NULL;
6792 struct ppc_elf_relax_info *relax_info = NULL;
6793 unsigned changes = 0;
6794 bfd_boolean workaround_change;
6795 struct ppc_elf_link_hash_table *htab;
6796 bfd_size_type trampbase, trampoff, newsize, picfixup_size;
6797 asection *got2;
6798 bfd_boolean maybe_pasted;
6799
6800 *again = FALSE;
6801
6802 /* No need to do anything with non-alloc or non-code sections. */
6803 if ((isec->flags & SEC_ALLOC) == 0
6804 || (isec->flags & SEC_CODE) == 0
6805 || (isec->flags & SEC_LINKER_CREATED) != 0
6806 || isec->size < 4)
6807 return TRUE;
6808
6809 /* We cannot represent the required PIC relocs in the output, so don't
6810 do anything. The linker doesn't support mixing -shared and -r
6811 anyway. */
6812 if (bfd_link_relocatable (link_info) && bfd_link_pic (link_info))
6813 return TRUE;
6814
6815 htab = ppc_elf_hash_table (link_info);
6816 if (htab == NULL)
6817 return TRUE;
6818
6819 isec->size = (isec->size + 3) & -4;
6820 if (isec->rawsize == 0)
6821 isec->rawsize = isec->size;
6822 trampbase = isec->size;
6823
6824 BFD_ASSERT (isec->sec_info_type == SEC_INFO_TYPE_NONE
6825 || isec->sec_info_type == SEC_INFO_TYPE_TARGET);
6826 isec->sec_info_type = SEC_INFO_TYPE_TARGET;
6827
6828 if (htab->params->ppc476_workaround
6829 || htab->params->pic_fixup > 0)
6830 {
6831 if (elf_section_data (isec)->sec_info == NULL)
6832 {
6833 elf_section_data (isec)->sec_info
6834 = bfd_zalloc (abfd, sizeof (struct ppc_elf_relax_info));
6835 if (elf_section_data (isec)->sec_info == NULL)
6836 return FALSE;
6837 }
6838 relax_info = elf_section_data (isec)->sec_info;
6839 trampbase -= relax_info->workaround_size;
6840 }
6841
6842 maybe_pasted = (strcmp (isec->output_section->name, ".init") == 0
6843 || strcmp (isec->output_section->name, ".fini") == 0);
6844 /* Space for a branch around any trampolines. */
6845 trampoff = trampbase;
6846 if (maybe_pasted && trampbase == isec->rawsize)
6847 trampoff += 4;
6848
6849 symtab_hdr = &elf_symtab_hdr (abfd);
6850 picfixup_size = 0;
6851 if (htab->params->branch_trampolines
6852 || htab->params->pic_fixup > 0)
6853 {
6854 /* Get a copy of the native relocations. */
6855 if (isec->reloc_count != 0)
6856 {
6857 internal_relocs = _bfd_elf_link_read_relocs (abfd, isec, NULL, NULL,
6858 link_info->keep_memory);
6859 if (internal_relocs == NULL)
6860 goto error_return;
6861 }
6862
6863 got2 = bfd_get_section_by_name (abfd, ".got2");
6864
6865 irelend = internal_relocs + isec->reloc_count;
6866 for (irel = internal_relocs; irel < irelend; irel++)
6867 {
6868 unsigned long r_type = ELF32_R_TYPE (irel->r_info);
6869 bfd_vma toff, roff;
6870 asection *tsec;
6871 struct one_branch_fixup *f;
6872 size_t insn_offset = 0;
6873 bfd_vma max_branch_offset = 0, val;
6874 bfd_byte *hit_addr;
6875 unsigned long t0;
6876 struct elf_link_hash_entry *h;
6877 struct plt_entry **plist;
6878 unsigned char sym_type;
6879
6880 switch (r_type)
6881 {
6882 case R_PPC_REL24:
6883 case R_PPC_LOCAL24PC:
6884 case R_PPC_PLTREL24:
6885 max_branch_offset = 1 << 25;
6886 break;
6887
6888 case R_PPC_REL14:
6889 case R_PPC_REL14_BRTAKEN:
6890 case R_PPC_REL14_BRNTAKEN:
6891 max_branch_offset = 1 << 15;
6892 break;
6893
6894 case R_PPC_ADDR16_HA:
6895 if (htab->params->pic_fixup > 0)
6896 break;
6897 continue;
6898
6899 default:
6900 continue;
6901 }
6902
6903 /* Get the value of the symbol referred to by the reloc. */
6904 h = NULL;
6905 if (ELF32_R_SYM (irel->r_info) < symtab_hdr->sh_info)
6906 {
6907 /* A local symbol. */
6908 Elf_Internal_Sym *isym;
6909
6910 /* Read this BFD's local symbols. */
6911 if (isymbuf == NULL)
6912 {
6913 isymbuf = (Elf_Internal_Sym *) symtab_hdr->contents;
6914 if (isymbuf == NULL)
6915 isymbuf = bfd_elf_get_elf_syms (abfd, symtab_hdr,
6916 symtab_hdr->sh_info, 0,
6917 NULL, NULL, NULL);
6918 if (isymbuf == 0)
6919 goto error_return;
6920 }
6921 isym = isymbuf + ELF32_R_SYM (irel->r_info);
6922 if (isym->st_shndx == SHN_UNDEF)
6923 tsec = bfd_und_section_ptr;
6924 else if (isym->st_shndx == SHN_ABS)
6925 tsec = bfd_abs_section_ptr;
6926 else if (isym->st_shndx == SHN_COMMON)
6927 tsec = bfd_com_section_ptr;
6928 else
6929 tsec = bfd_section_from_elf_index (abfd, isym->st_shndx);
6930
6931 toff = isym->st_value;
6932 sym_type = ELF_ST_TYPE (isym->st_info);
6933 }
6934 else
6935 {
6936 /* Global symbol handling. */
6937 unsigned long indx;
6938
6939 indx = ELF32_R_SYM (irel->r_info) - symtab_hdr->sh_info;
6940 h = elf_sym_hashes (abfd)[indx];
6941
6942 while (h->root.type == bfd_link_hash_indirect
6943 || h->root.type == bfd_link_hash_warning)
6944 h = (struct elf_link_hash_entry *) h->root.u.i.link;
6945
6946 if (h->root.type == bfd_link_hash_defined
6947 || h->root.type == bfd_link_hash_defweak)
6948 {
6949 tsec = h->root.u.def.section;
6950 toff = h->root.u.def.value;
6951 }
6952 else if (h->root.type == bfd_link_hash_undefined
6953 || h->root.type == bfd_link_hash_undefweak)
6954 {
6955 tsec = bfd_und_section_ptr;
6956 toff = bfd_link_relocatable (link_info) ? indx : 0;
6957 }
6958 else
6959 continue;
6960
6961 /* If this branch is to __tls_get_addr then we may later
6962 optimise away the call. We won't be needing a long-
6963 branch stub in that case. */
6964 if (bfd_link_executable (link_info)
6965 && h == htab->tls_get_addr
6966 && irel != internal_relocs)
6967 {
6968 unsigned long t_symndx = ELF32_R_SYM (irel[-1].r_info);
6969 unsigned long t_rtype = ELF32_R_TYPE (irel[-1].r_info);
6970 unsigned int tls_mask = 0;
6971
6972 /* The previous reloc should be one of R_PPC_TLSGD or
6973 R_PPC_TLSLD, or for older object files, a reloc
6974 on the __tls_get_addr arg setup insn. Get tls
6975 mask bits from the symbol on that reloc. */
6976 if (t_symndx < symtab_hdr->sh_info)
6977 {
6978 bfd_vma *local_got_offsets = elf_local_got_offsets (abfd);
6979
6980 if (local_got_offsets != NULL)
6981 {
6982 struct plt_entry **local_plt = (struct plt_entry **)
6983 (local_got_offsets + symtab_hdr->sh_info);
6984 char *lgot_masks = (char *)
6985 (local_plt + symtab_hdr->sh_info);
6986 tls_mask = lgot_masks[t_symndx];
6987 }
6988 }
6989 else
6990 {
6991 struct elf_link_hash_entry *th
6992 = elf_sym_hashes (abfd)[t_symndx - symtab_hdr->sh_info];
6993
6994 while (th->root.type == bfd_link_hash_indirect
6995 || th->root.type == bfd_link_hash_warning)
6996 th = (struct elf_link_hash_entry *) th->root.u.i.link;
6997
6998 tls_mask
6999 = ((struct ppc_elf_link_hash_entry *) th)->tls_mask;
7000 }
7001
7002 /* The mask bits tell us if the call will be
7003 optimised away. */
7004 if ((tls_mask & TLS_TLS) != 0 && (tls_mask & TLS_GD) == 0
7005 && (t_rtype == R_PPC_TLSGD
7006 || t_rtype == R_PPC_GOT_TLSGD16
7007 || t_rtype == R_PPC_GOT_TLSGD16_LO))
7008 continue;
7009 if ((tls_mask & TLS_TLS) != 0 && (tls_mask & TLS_LD) == 0
7010 && (t_rtype == R_PPC_TLSLD
7011 || t_rtype == R_PPC_GOT_TLSLD16
7012 || t_rtype == R_PPC_GOT_TLSLD16_LO))
7013 continue;
7014 }
7015
7016 sym_type = h->type;
7017 }
7018
7019 if (r_type == R_PPC_ADDR16_HA)
7020 {
7021 if (h != NULL
7022 && !h->def_regular
7023 && h->protected_def
7024 && ppc_elf_hash_entry (h)->has_addr16_ha
7025 && ppc_elf_hash_entry (h)->has_addr16_lo)
7026 picfixup_size += 12;
7027 continue;
7028 }
7029
7030 /* The condition here under which we call find_plt_ent must
7031 match that in relocate_section. If we call find_plt_ent here
7032 but not in relocate_section, or vice versa, then the branch
7033 destination used here may be incorrect. */
7034 plist = NULL;
7035 if (h != NULL)
7036 {
7037 /* We know is_branch_reloc (r_type) is true. */
7038 if (h->type == STT_GNU_IFUNC
7039 || r_type == R_PPC_PLTREL24)
7040 plist = &h->plt.plist;
7041 }
7042 else if (sym_type == STT_GNU_IFUNC
7043 && elf_local_got_offsets (abfd) != NULL)
7044 {
7045 bfd_vma *local_got_offsets = elf_local_got_offsets (abfd);
7046 struct plt_entry **local_plt = (struct plt_entry **)
7047 (local_got_offsets + symtab_hdr->sh_info);
7048 plist = local_plt + ELF32_R_SYM (irel->r_info);
7049 }
7050 if (plist != NULL)
7051 {
7052 bfd_vma addend = 0;
7053 struct plt_entry *ent;
7054
7055 if (r_type == R_PPC_PLTREL24 && bfd_link_pic (link_info))
7056 addend = irel->r_addend;
7057 ent = find_plt_ent (plist, got2, addend);
7058 if (ent != NULL)
7059 {
7060 if (htab->plt_type == PLT_NEW
7061 || h == NULL
7062 || !htab->elf.dynamic_sections_created
7063 || h->dynindx == -1)
7064 {
7065 tsec = htab->glink;
7066 toff = ent->glink_offset;
7067 }
7068 else
7069 {
7070 tsec = htab->elf.splt;
7071 toff = ent->plt.offset;
7072 }
7073 }
7074 }
7075
7076 /* If the branch and target are in the same section, you have
7077 no hope of adding stubs. We'll error out later should the
7078 branch overflow. */
7079 if (tsec == isec)
7080 continue;
7081
7082 /* There probably isn't any reason to handle symbols in
7083 SEC_MERGE sections; SEC_MERGE doesn't seem a likely
7084 attribute for a code section, and we are only looking at
7085 branches. However, implement it correctly here as a
7086 reference for other target relax_section functions. */
7087 if (0 && tsec->sec_info_type == SEC_INFO_TYPE_MERGE)
7088 {
7089 /* At this stage in linking, no SEC_MERGE symbol has been
7090 adjusted, so all references to such symbols need to be
7091 passed through _bfd_merged_section_offset. (Later, in
7092 relocate_section, all SEC_MERGE symbols *except* for
7093 section symbols have been adjusted.)
7094
7095 gas may reduce relocations against symbols in SEC_MERGE
7096 sections to a relocation against the section symbol when
7097 the original addend was zero. When the reloc is against
7098 a section symbol we should include the addend in the
7099 offset passed to _bfd_merged_section_offset, since the
7100 location of interest is the original symbol. On the
7101 other hand, an access to "sym+addend" where "sym" is not
7102 a section symbol should not include the addend; Such an
7103 access is presumed to be an offset from "sym"; The
7104 location of interest is just "sym". */
7105 if (sym_type == STT_SECTION)
7106 toff += irel->r_addend;
7107
7108 toff
7109 = _bfd_merged_section_offset (abfd, &tsec,
7110 elf_section_data (tsec)->sec_info,
7111 toff);
7112
7113 if (sym_type != STT_SECTION)
7114 toff += irel->r_addend;
7115 }
7116 /* PLTREL24 addends are special. */
7117 else if (r_type != R_PPC_PLTREL24)
7118 toff += irel->r_addend;
7119
7120 /* Attempted -shared link of non-pic code loses. */
7121 if ((!bfd_link_relocatable (link_info)
7122 && tsec == bfd_und_section_ptr)
7123 || tsec->output_section == NULL
7124 || (tsec->owner != NULL
7125 && (tsec->owner->flags & BFD_PLUGIN) != 0))
7126 continue;
7127
7128 roff = irel->r_offset;
7129
7130 /* If the branch is in range, no need to do anything. */
7131 if (tsec != bfd_und_section_ptr
7132 && (!bfd_link_relocatable (link_info)
7133 /* A relocatable link may have sections moved during
7134 final link, so do not presume they remain in range. */
7135 || tsec->output_section == isec->output_section))
7136 {
7137 bfd_vma symaddr, reladdr;
7138
7139 symaddr = tsec->output_section->vma + tsec->output_offset + toff;
7140 reladdr = isec->output_section->vma + isec->output_offset + roff;
7141 if (symaddr - reladdr + max_branch_offset
7142 < 2 * max_branch_offset)
7143 continue;
7144 }
7145
7146 /* Look for an existing fixup to this address. */
7147 for (f = branch_fixups; f ; f = f->next)
7148 if (f->tsec == tsec && f->toff == toff)
7149 break;
7150
7151 if (f == NULL)
7152 {
7153 size_t size;
7154 unsigned long stub_rtype;
7155
7156 val = trampoff - roff;
7157 if (val >= max_branch_offset)
7158 /* Oh dear, we can't reach a trampoline. Don't try to add
7159 one. We'll report an error later. */
7160 continue;
7161
7162 if (bfd_link_pic (link_info))
7163 {
7164 size = 4 * ARRAY_SIZE (shared_stub_entry);
7165 insn_offset = 12;
7166 }
7167 else
7168 {
7169 size = 4 * ARRAY_SIZE (stub_entry);
7170 insn_offset = 0;
7171 }
7172 stub_rtype = R_PPC_RELAX;
7173 if (tsec == htab->elf.splt
7174 || tsec == htab->glink)
7175 {
7176 stub_rtype = R_PPC_RELAX_PLT;
7177 if (r_type == R_PPC_PLTREL24)
7178 stub_rtype = R_PPC_RELAX_PLTREL24;
7179 }
7180
7181 /* Hijack the old relocation. Since we need two
7182 relocations for this use a "composite" reloc. */
7183 irel->r_info = ELF32_R_INFO (ELF32_R_SYM (irel->r_info),
7184 stub_rtype);
7185 irel->r_offset = trampoff + insn_offset;
7186 if (r_type == R_PPC_PLTREL24
7187 && stub_rtype != R_PPC_RELAX_PLTREL24)
7188 irel->r_addend = 0;
7189
7190 /* Record the fixup so we don't do it again this section. */
7191 f = bfd_malloc (sizeof (*f));
7192 f->next = branch_fixups;
7193 f->tsec = tsec;
7194 f->toff = toff;
7195 f->trampoff = trampoff;
7196 branch_fixups = f;
7197
7198 trampoff += size;
7199 changes++;
7200 }
7201 else
7202 {
7203 val = f->trampoff - roff;
7204 if (val >= max_branch_offset)
7205 continue;
7206
7207 /* Nop out the reloc, since we're finalizing things here. */
7208 irel->r_info = ELF32_R_INFO (0, R_PPC_NONE);
7209 }
7210
7211 /* Get the section contents. */
7212 if (contents == NULL)
7213 {
7214 /* Get cached copy if it exists. */
7215 if (elf_section_data (isec)->this_hdr.contents != NULL)
7216 contents = elf_section_data (isec)->this_hdr.contents;
7217 /* Go get them off disk. */
7218 else if (!bfd_malloc_and_get_section (abfd, isec, &contents))
7219 goto error_return;
7220 }
7221
7222 /* Fix up the existing branch to hit the trampoline. */
7223 hit_addr = contents + roff;
7224 switch (r_type)
7225 {
7226 case R_PPC_REL24:
7227 case R_PPC_LOCAL24PC:
7228 case R_PPC_PLTREL24:
7229 t0 = bfd_get_32 (abfd, hit_addr);
7230 t0 &= ~0x3fffffc;
7231 t0 |= val & 0x3fffffc;
7232 bfd_put_32 (abfd, t0, hit_addr);
7233 break;
7234
7235 case R_PPC_REL14:
7236 case R_PPC_REL14_BRTAKEN:
7237 case R_PPC_REL14_BRNTAKEN:
7238 t0 = bfd_get_32 (abfd, hit_addr);
7239 t0 &= ~0xfffc;
7240 t0 |= val & 0xfffc;
7241 bfd_put_32 (abfd, t0, hit_addr);
7242 break;
7243 }
7244 }
7245
7246 while (branch_fixups != NULL)
7247 {
7248 struct one_branch_fixup *f = branch_fixups;
7249 branch_fixups = branch_fixups->next;
7250 free (f);
7251 }
7252 }
7253
7254 workaround_change = FALSE;
7255 newsize = trampoff;
7256 if (htab->params->ppc476_workaround
7257 && (!bfd_link_relocatable (link_info)
7258 || isec->output_section->alignment_power >= htab->params->pagesize_p2))
7259 {
7260 bfd_vma addr, end_addr;
7261 unsigned int crossings;
7262 bfd_vma pagesize = (bfd_vma) 1 << htab->params->pagesize_p2;
7263
7264 addr = isec->output_section->vma + isec->output_offset;
7265 end_addr = addr + trampoff;
7266 addr &= -pagesize;
7267 crossings = ((end_addr & -pagesize) - addr) >> htab->params->pagesize_p2;
7268 if (crossings != 0)
7269 {
7270 /* Keep space aligned, to ensure the patch code itself does
7271 not cross a page. Don't decrease size calculated on a
7272 previous pass as otherwise we might never settle on a layout. */
7273 newsize = 15 - ((end_addr - 1) & 15);
7274 newsize += crossings * 16;
7275 if (relax_info->workaround_size < newsize)
7276 {
7277 relax_info->workaround_size = newsize;
7278 workaround_change = TRUE;
7279 }
7280 /* Ensure relocate_section is called. */
7281 isec->flags |= SEC_RELOC;
7282 }
7283 newsize = trampoff + relax_info->workaround_size;
7284 }
7285
7286 if (htab->params->pic_fixup > 0)
7287 {
7288 picfixup_size -= relax_info->picfixup_size;
7289 if (picfixup_size != 0)
7290 relax_info->picfixup_size += picfixup_size;
7291 newsize += relax_info->picfixup_size;
7292 }
7293
7294 if (changes != 0 || picfixup_size != 0 || workaround_change)
7295 isec->size = newsize;
7296
7297 if (isymbuf != NULL
7298 && symtab_hdr->contents != (unsigned char *) isymbuf)
7299 {
7300 if (! link_info->keep_memory)
7301 free (isymbuf);
7302 else
7303 {
7304 /* Cache the symbols for elf_link_input_bfd. */
7305 symtab_hdr->contents = (unsigned char *) isymbuf;
7306 }
7307 }
7308
7309 if (contents != NULL
7310 && elf_section_data (isec)->this_hdr.contents != contents)
7311 {
7312 if (!changes && !link_info->keep_memory)
7313 free (contents);
7314 else
7315 {
7316 /* Cache the section contents for elf_link_input_bfd. */
7317 elf_section_data (isec)->this_hdr.contents = contents;
7318 }
7319 }
7320
7321 changes += picfixup_size;
7322 if (changes != 0)
7323 {
7324 /* Append sufficient NOP relocs so we can write out relocation
7325 information for the trampolines. */
7326 Elf_Internal_Shdr *rel_hdr;
7327 Elf_Internal_Rela *new_relocs = bfd_malloc ((changes + isec->reloc_count)
7328 * sizeof (*new_relocs));
7329 unsigned ix;
7330
7331 if (!new_relocs)
7332 goto error_return;
7333 memcpy (new_relocs, internal_relocs,
7334 isec->reloc_count * sizeof (*new_relocs));
7335 for (ix = changes; ix--;)
7336 {
7337 irel = new_relocs + ix + isec->reloc_count;
7338
7339 irel->r_info = ELF32_R_INFO (0, R_PPC_NONE);
7340 }
7341 if (internal_relocs != elf_section_data (isec)->relocs)
7342 free (internal_relocs);
7343 elf_section_data (isec)->relocs = new_relocs;
7344 isec->reloc_count += changes;
7345 rel_hdr = _bfd_elf_single_rel_hdr (isec);
7346 rel_hdr->sh_size += changes * rel_hdr->sh_entsize;
7347 }
7348 else if (internal_relocs != NULL
7349 && elf_section_data (isec)->relocs != internal_relocs)
7350 free (internal_relocs);
7351
7352 *again = changes != 0 || workaround_change;
7353 return TRUE;
7354
7355 error_return:
7356 while (branch_fixups != NULL)
7357 {
7358 struct one_branch_fixup *f = branch_fixups;
7359 branch_fixups = branch_fixups->next;
7360 free (f);
7361 }
7362 if (isymbuf != NULL && (unsigned char *) isymbuf != symtab_hdr->contents)
7363 free (isymbuf);
7364 if (contents != NULL
7365 && elf_section_data (isec)->this_hdr.contents != contents)
7366 free (contents);
7367 if (internal_relocs != NULL
7368 && elf_section_data (isec)->relocs != internal_relocs)
7369 free (internal_relocs);
7370 return FALSE;
7371 }
7372 \f
7373 /* What to do when ld finds relocations against symbols defined in
7374 discarded sections. */
7375
7376 static unsigned int
7377 ppc_elf_action_discarded (asection *sec)
7378 {
7379 if (strcmp (".fixup", sec->name) == 0)
7380 return 0;
7381
7382 if (strcmp (".got2", sec->name) == 0)
7383 return 0;
7384
7385 return _bfd_elf_default_action_discarded (sec);
7386 }
7387 \f
7388 /* Fill in the address for a pointer generated in a linker section. */
7389
7390 static bfd_vma
7391 elf_finish_pointer_linker_section (bfd *input_bfd,
7392 elf_linker_section_t *lsect,
7393 struct elf_link_hash_entry *h,
7394 bfd_vma relocation,
7395 const Elf_Internal_Rela *rel)
7396 {
7397 elf_linker_section_pointers_t *linker_section_ptr;
7398
7399 BFD_ASSERT (lsect != NULL);
7400
7401 if (h != NULL)
7402 {
7403 /* Handle global symbol. */
7404 struct ppc_elf_link_hash_entry *eh;
7405
7406 eh = (struct ppc_elf_link_hash_entry *) h;
7407 BFD_ASSERT (eh->elf.def_regular);
7408 linker_section_ptr = eh->linker_section_pointer;
7409 }
7410 else
7411 {
7412 /* Handle local symbol. */
7413 unsigned long r_symndx = ELF32_R_SYM (rel->r_info);
7414
7415 BFD_ASSERT (is_ppc_elf (input_bfd));
7416 BFD_ASSERT (elf_local_ptr_offsets (input_bfd) != NULL);
7417 linker_section_ptr = elf_local_ptr_offsets (input_bfd)[r_symndx];
7418 }
7419
7420 linker_section_ptr = elf_find_pointer_linker_section (linker_section_ptr,
7421 rel->r_addend,
7422 lsect);
7423 BFD_ASSERT (linker_section_ptr != NULL);
7424
7425 /* Offset will always be a multiple of four, so use the bottom bit
7426 as a "written" flag. */
7427 if ((linker_section_ptr->offset & 1) == 0)
7428 {
7429 bfd_put_32 (lsect->section->owner,
7430 relocation + linker_section_ptr->addend,
7431 lsect->section->contents + linker_section_ptr->offset);
7432 linker_section_ptr->offset += 1;
7433 }
7434
7435 relocation = (lsect->section->output_section->vma
7436 + lsect->section->output_offset
7437 + linker_section_ptr->offset - 1
7438 - SYM_VAL (lsect->sym));
7439
7440 #ifdef DEBUG
7441 fprintf (stderr,
7442 "Finish pointer in linker section %s, offset = %ld (0x%lx)\n",
7443 lsect->name, (long) relocation, (long) relocation);
7444 #endif
7445
7446 return relocation;
7447 }
7448
7449 #define PPC_LO(v) ((v) & 0xffff)
7450 #define PPC_HI(v) (((v) >> 16) & 0xffff)
7451 #define PPC_HA(v) PPC_HI ((v) + 0x8000)
7452
7453 static void
7454 write_glink_stub (struct elf_link_hash_entry *h, struct plt_entry *ent,
7455 asection *plt_sec, unsigned char *p,
7456 struct bfd_link_info *info)
7457 {
7458 struct ppc_elf_link_hash_table *htab = ppc_elf_hash_table (info);
7459 bfd *output_bfd = info->output_bfd;
7460 bfd_vma plt;
7461 unsigned char *end = p + GLINK_ENTRY_SIZE (htab, h);
7462
7463 if (h != NULL
7464 && h == htab->tls_get_addr
7465 && !htab->params->no_tls_get_addr_opt)
7466 {
7467 bfd_put_32 (output_bfd, LWZ_11_3, p);
7468 p += 4;
7469 bfd_put_32 (output_bfd, LWZ_12_3 + 4, p);
7470 p += 4;
7471 bfd_put_32 (output_bfd, MR_0_3, p);
7472 p += 4;
7473 bfd_put_32 (output_bfd, CMPWI_11_0, p);
7474 p += 4;
7475 bfd_put_32 (output_bfd, ADD_3_12_2, p);
7476 p += 4;
7477 bfd_put_32 (output_bfd, BEQLR, p);
7478 p += 4;
7479 bfd_put_32 (output_bfd, MR_3_0, p);
7480 p += 4;
7481 bfd_put_32 (output_bfd, NOP, p);
7482 p += 4;
7483 }
7484
7485 plt = ((ent->plt.offset & ~1)
7486 + plt_sec->output_section->vma
7487 + plt_sec->output_offset);
7488
7489 if (bfd_link_pic (info))
7490 {
7491 bfd_vma got = 0;
7492
7493 if (ent->addend >= 32768)
7494 got = (ent->addend
7495 + ent->sec->output_section->vma
7496 + ent->sec->output_offset);
7497 else if (htab->elf.hgot != NULL)
7498 got = SYM_VAL (htab->elf.hgot);
7499
7500 plt -= got;
7501
7502 if (plt + 0x8000 < 0x10000)
7503 bfd_put_32 (output_bfd, LWZ_11_30 + PPC_LO (plt), p);
7504 else
7505 {
7506 bfd_put_32 (output_bfd, ADDIS_11_30 + PPC_HA (plt), p);
7507 p += 4;
7508 bfd_put_32 (output_bfd, LWZ_11_11 + PPC_LO (plt), p);
7509 }
7510 }
7511 else
7512 {
7513 bfd_put_32 (output_bfd, LIS_11 + PPC_HA (plt), p);
7514 p += 4;
7515 bfd_put_32 (output_bfd, LWZ_11_11 + PPC_LO (plt), p);
7516 }
7517 p += 4;
7518 bfd_put_32 (output_bfd, MTCTR_11, p);
7519 p += 4;
7520 bfd_put_32 (output_bfd, BCTR, p);
7521 p += 4;
7522 while (p < end)
7523 {
7524 bfd_put_32 (output_bfd, htab->params->ppc476_workaround ? BA : NOP, p);
7525 p += 4;
7526 }
7527 }
7528
7529 /* Return true if symbol is defined statically. */
7530
7531 static bfd_boolean
7532 is_static_defined (struct elf_link_hash_entry *h)
7533 {
7534 return ((h->root.type == bfd_link_hash_defined
7535 || h->root.type == bfd_link_hash_defweak)
7536 && h->root.u.def.section != NULL
7537 && h->root.u.def.section->output_section != NULL);
7538 }
7539
7540 /* If INSN is an opcode that may be used with an @tls operand, return
7541 the transformed insn for TLS optimisation, otherwise return 0. If
7542 REG is non-zero only match an insn with RB or RA equal to REG. */
7543
7544 unsigned int
7545 _bfd_elf_ppc_at_tls_transform (unsigned int insn, unsigned int reg)
7546 {
7547 unsigned int rtra;
7548
7549 if ((insn & (0x3f << 26)) != 31 << 26)
7550 return 0;
7551
7552 if (reg == 0 || ((insn >> 11) & 0x1f) == reg)
7553 rtra = insn & ((1 << 26) - (1 << 16));
7554 else if (((insn >> 16) & 0x1f) == reg)
7555 rtra = (insn & (0x1f << 21)) | ((insn & (0x1f << 11)) << 5);
7556 else
7557 return 0;
7558
7559 if ((insn & (0x3ff << 1)) == 266 << 1)
7560 /* add -> addi. */
7561 insn = 14 << 26;
7562 else if ((insn & (0x1f << 1)) == 23 << 1
7563 && ((insn & (0x1f << 6)) < 14 << 6
7564 || ((insn & (0x1f << 6)) >= 16 << 6
7565 && (insn & (0x1f << 6)) < 24 << 6)))
7566 /* load and store indexed -> dform. */
7567 insn = (32 | ((insn >> 6) & 0x1f)) << 26;
7568 else if ((insn & (((0x1a << 5) | 0x1f) << 1)) == 21 << 1)
7569 /* ldx, ldux, stdx, stdux -> ld, ldu, std, stdu. */
7570 insn = ((58 | ((insn >> 6) & 4)) << 26) | ((insn >> 6) & 1);
7571 else if ((insn & (((0x1f << 5) | 0x1f) << 1)) == 341 << 1)
7572 /* lwax -> lwa. */
7573 insn = (58 << 26) | 2;
7574 else
7575 return 0;
7576 insn |= rtra;
7577 return insn;
7578 }
7579
7580 /* If INSN is an opcode that may be used with an @tprel operand, return
7581 the transformed insn for an undefined weak symbol, ie. with the
7582 thread pointer REG operand removed. Otherwise return 0. */
7583
7584 unsigned int
7585 _bfd_elf_ppc_at_tprel_transform (unsigned int insn, unsigned int reg)
7586 {
7587 if ((insn & (0x1f << 16)) == reg << 16
7588 && ((insn & (0x3f << 26)) == 14u << 26 /* addi */
7589 || (insn & (0x3f << 26)) == 15u << 26 /* addis */
7590 || (insn & (0x3f << 26)) == 32u << 26 /* lwz */
7591 || (insn & (0x3f << 26)) == 34u << 26 /* lbz */
7592 || (insn & (0x3f << 26)) == 36u << 26 /* stw */
7593 || (insn & (0x3f << 26)) == 38u << 26 /* stb */
7594 || (insn & (0x3f << 26)) == 40u << 26 /* lhz */
7595 || (insn & (0x3f << 26)) == 42u << 26 /* lha */
7596 || (insn & (0x3f << 26)) == 44u << 26 /* sth */
7597 || (insn & (0x3f << 26)) == 46u << 26 /* lmw */
7598 || (insn & (0x3f << 26)) == 47u << 26 /* stmw */
7599 || (insn & (0x3f << 26)) == 48u << 26 /* lfs */
7600 || (insn & (0x3f << 26)) == 50u << 26 /* lfd */
7601 || (insn & (0x3f << 26)) == 52u << 26 /* stfs */
7602 || (insn & (0x3f << 26)) == 54u << 26 /* stfd */
7603 || ((insn & (0x3f << 26)) == 58u << 26 /* lwa,ld,lmd */
7604 && (insn & 3) != 1)
7605 || ((insn & (0x3f << 26)) == 62u << 26 /* std, stmd */
7606 && ((insn & 3) == 0 || (insn & 3) == 3))))
7607 {
7608 insn &= ~(0x1f << 16);
7609 }
7610 else if ((insn & (0x1f << 21)) == reg << 21
7611 && ((insn & (0x3e << 26)) == 24u << 26 /* ori, oris */
7612 || (insn & (0x3e << 26)) == 26u << 26 /* xori,xoris */
7613 || (insn & (0x3e << 26)) == 28u << 26 /* andi,andis */))
7614 {
7615 insn &= ~(0x1f << 21);
7616 insn |= (insn & (0x1f << 16)) << 5;
7617 if ((insn & (0x3e << 26)) == 26 << 26 /* xori,xoris */)
7618 insn -= 2 >> 26; /* convert to ori,oris */
7619 }
7620 else
7621 insn = 0;
7622 return insn;
7623 }
7624
7625 static bfd_boolean
7626 is_insn_ds_form (unsigned int insn)
7627 {
7628 return ((insn & (0x3f << 26)) == 58u << 26 /* ld,ldu,lwa */
7629 || (insn & (0x3f << 26)) == 62u << 26 /* std,stdu,stq */
7630 || (insn & (0x3f << 26)) == 57u << 26 /* lfdp */
7631 || (insn & (0x3f << 26)) == 61u << 26 /* stfdp */);
7632 }
7633
7634 static bfd_boolean
7635 is_insn_dq_form (unsigned int insn)
7636 {
7637 return ((insn & (0x3f << 26)) == 56u << 26 /* lq */
7638 || ((insn & (0x3f << 26)) == (61u << 26) /* lxv, stxv */
7639 && (insn & 3) == 1));
7640 }
7641
7642 /* The RELOCATE_SECTION function is called by the ELF backend linker
7643 to handle the relocations for a section.
7644
7645 The relocs are always passed as Rela structures; if the section
7646 actually uses Rel structures, the r_addend field will always be
7647 zero.
7648
7649 This function is responsible for adjust the section contents as
7650 necessary, and (if using Rela relocs and generating a
7651 relocatable output file) adjusting the reloc addend as
7652 necessary.
7653
7654 This function does not have to worry about setting the reloc
7655 address or the reloc symbol index.
7656
7657 LOCAL_SYMS is a pointer to the swapped in local symbols.
7658
7659 LOCAL_SECTIONS is an array giving the section in the input file
7660 corresponding to the st_shndx field of each local symbol.
7661
7662 The global hash table entry for the global symbols can be found
7663 via elf_sym_hashes (input_bfd).
7664
7665 When generating relocatable output, this function must handle
7666 STB_LOCAL/STT_SECTION symbols specially. The output symbol is
7667 going to be the section symbol corresponding to the output
7668 section, which means that the addend must be adjusted
7669 accordingly. */
7670
7671 static bfd_boolean
7672 ppc_elf_relocate_section (bfd *output_bfd,
7673 struct bfd_link_info *info,
7674 bfd *input_bfd,
7675 asection *input_section,
7676 bfd_byte *contents,
7677 Elf_Internal_Rela *relocs,
7678 Elf_Internal_Sym *local_syms,
7679 asection **local_sections)
7680 {
7681 Elf_Internal_Shdr *symtab_hdr;
7682 struct elf_link_hash_entry **sym_hashes;
7683 struct ppc_elf_link_hash_table *htab;
7684 Elf_Internal_Rela *rel;
7685 Elf_Internal_Rela *wrel;
7686 Elf_Internal_Rela *relend;
7687 Elf_Internal_Rela outrel;
7688 asection *got2;
7689 bfd_vma *local_got_offsets;
7690 bfd_boolean ret = TRUE;
7691 bfd_vma d_offset = (bfd_big_endian (input_bfd) ? 2 : 0);
7692 bfd_boolean is_vxworks_tls;
7693 unsigned int picfixup_size = 0;
7694 struct ppc_elf_relax_info *relax_info = NULL;
7695
7696 #ifdef DEBUG
7697 _bfd_error_handler ("ppc_elf_relocate_section called for %pB section %pA, "
7698 "%ld relocations%s",
7699 input_bfd, input_section,
7700 (long) input_section->reloc_count,
7701 (bfd_link_relocatable (info)) ? " (relocatable)" : "");
7702 #endif
7703
7704 got2 = bfd_get_section_by_name (input_bfd, ".got2");
7705
7706 /* Initialize howto table if not already done. */
7707 if (!ppc_elf_howto_table[R_PPC_ADDR32])
7708 ppc_elf_howto_init ();
7709
7710 htab = ppc_elf_hash_table (info);
7711 local_got_offsets = elf_local_got_offsets (input_bfd);
7712 symtab_hdr = &elf_symtab_hdr (input_bfd);
7713 sym_hashes = elf_sym_hashes (input_bfd);
7714 /* We have to handle relocations in vxworks .tls_vars sections
7715 specially, because the dynamic loader is 'weird'. */
7716 is_vxworks_tls = (htab->is_vxworks && bfd_link_pic (info)
7717 && !strcmp (input_section->output_section->name,
7718 ".tls_vars"));
7719 if (input_section->sec_info_type == SEC_INFO_TYPE_TARGET)
7720 relax_info = elf_section_data (input_section)->sec_info;
7721 rel = wrel = relocs;
7722 relend = relocs + input_section->reloc_count;
7723 for (; rel < relend; wrel++, rel++)
7724 {
7725 enum elf_ppc_reloc_type r_type;
7726 bfd_vma addend;
7727 bfd_reloc_status_type r;
7728 Elf_Internal_Sym *sym;
7729 asection *sec;
7730 struct elf_link_hash_entry *h;
7731 const char *sym_name;
7732 reloc_howto_type *howto;
7733 unsigned long r_symndx;
7734 bfd_vma relocation;
7735 bfd_vma branch_bit, from;
7736 bfd_boolean unresolved_reloc;
7737 bfd_boolean warned;
7738 unsigned int tls_type, tls_mask, tls_gd;
7739 struct plt_entry **ifunc;
7740 struct reloc_howto_struct alt_howto;
7741
7742 again:
7743 r_type = ELF32_R_TYPE (rel->r_info);
7744 sym = NULL;
7745 sec = NULL;
7746 h = NULL;
7747 unresolved_reloc = FALSE;
7748 warned = FALSE;
7749 r_symndx = ELF32_R_SYM (rel->r_info);
7750
7751 if (r_symndx < symtab_hdr->sh_info)
7752 {
7753 sym = local_syms + r_symndx;
7754 sec = local_sections[r_symndx];
7755 sym_name = bfd_elf_sym_name (input_bfd, symtab_hdr, sym, sec);
7756
7757 relocation = _bfd_elf_rela_local_sym (output_bfd, sym, &sec, rel);
7758 }
7759 else
7760 {
7761 bfd_boolean ignored;
7762
7763 RELOC_FOR_GLOBAL_SYMBOL (info, input_bfd, input_section, rel,
7764 r_symndx, symtab_hdr, sym_hashes,
7765 h, sec, relocation,
7766 unresolved_reloc, warned, ignored);
7767
7768 sym_name = h->root.root.string;
7769 }
7770
7771 if (sec != NULL && discarded_section (sec))
7772 {
7773 /* For relocs against symbols from removed linkonce sections,
7774 or sections discarded by a linker script, we just want the
7775 section contents zeroed. Avoid any special processing. */
7776 howto = NULL;
7777 if (r_type < R_PPC_max)
7778 howto = ppc_elf_howto_table[r_type];
7779
7780 _bfd_clear_contents (howto, input_bfd, input_section,
7781 contents + rel->r_offset);
7782 wrel->r_offset = rel->r_offset;
7783 wrel->r_info = 0;
7784 wrel->r_addend = 0;
7785
7786 /* For ld -r, remove relocations in debug sections against
7787 symbols defined in discarded sections. Not done for
7788 non-debug to preserve relocs in .eh_frame which the
7789 eh_frame editing code expects to be present. */
7790 if (bfd_link_relocatable (info)
7791 && (input_section->flags & SEC_DEBUGGING))
7792 wrel--;
7793
7794 continue;
7795 }
7796
7797 if (bfd_link_relocatable (info))
7798 {
7799 if (got2 != NULL
7800 && r_type == R_PPC_PLTREL24
7801 && rel->r_addend != 0)
7802 {
7803 /* R_PPC_PLTREL24 is rather special. If non-zero, the
7804 addend specifies the GOT pointer offset within .got2. */
7805 rel->r_addend += got2->output_offset;
7806 }
7807 if (r_type != R_PPC_RELAX_PLT
7808 && r_type != R_PPC_RELAX_PLTREL24
7809 && r_type != R_PPC_RELAX)
7810 goto copy_reloc;
7811 }
7812
7813 /* TLS optimizations. Replace instruction sequences and relocs
7814 based on information we collected in tls_optimize. We edit
7815 RELOCS so that --emit-relocs will output something sensible
7816 for the final instruction stream. */
7817 tls_mask = 0;
7818 tls_gd = 0;
7819 if (h != NULL)
7820 tls_mask = ((struct ppc_elf_link_hash_entry *) h)->tls_mask;
7821 else if (local_got_offsets != NULL)
7822 {
7823 struct plt_entry **local_plt;
7824 char *lgot_masks;
7825 local_plt
7826 = (struct plt_entry **) (local_got_offsets + symtab_hdr->sh_info);
7827 lgot_masks = (char *) (local_plt + symtab_hdr->sh_info);
7828 tls_mask = lgot_masks[r_symndx];
7829 }
7830
7831 /* Ensure reloc mapping code below stays sane. */
7832 if ((R_PPC_GOT_TLSLD16 & 3) != (R_PPC_GOT_TLSGD16 & 3)
7833 || (R_PPC_GOT_TLSLD16_LO & 3) != (R_PPC_GOT_TLSGD16_LO & 3)
7834 || (R_PPC_GOT_TLSLD16_HI & 3) != (R_PPC_GOT_TLSGD16_HI & 3)
7835 || (R_PPC_GOT_TLSLD16_HA & 3) != (R_PPC_GOT_TLSGD16_HA & 3)
7836 || (R_PPC_GOT_TLSLD16 & 3) != (R_PPC_GOT_TPREL16 & 3)
7837 || (R_PPC_GOT_TLSLD16_LO & 3) != (R_PPC_GOT_TPREL16_LO & 3)
7838 || (R_PPC_GOT_TLSLD16_HI & 3) != (R_PPC_GOT_TPREL16_HI & 3)
7839 || (R_PPC_GOT_TLSLD16_HA & 3) != (R_PPC_GOT_TPREL16_HA & 3))
7840 abort ();
7841 switch (r_type)
7842 {
7843 default:
7844 break;
7845
7846 case R_PPC_GOT_TPREL16:
7847 case R_PPC_GOT_TPREL16_LO:
7848 if ((tls_mask & TLS_TLS) != 0
7849 && (tls_mask & TLS_TPREL) == 0)
7850 {
7851 bfd_vma insn;
7852
7853 insn = bfd_get_32 (input_bfd,
7854 contents + rel->r_offset - d_offset);
7855 insn &= 31 << 21;
7856 insn |= 0x3c020000; /* addis 0,2,0 */
7857 bfd_put_32 (input_bfd, insn,
7858 contents + rel->r_offset - d_offset);
7859 r_type = R_PPC_TPREL16_HA;
7860 rel->r_info = ELF32_R_INFO (r_symndx, r_type);
7861 }
7862 break;
7863
7864 case R_PPC_TLS:
7865 if ((tls_mask & TLS_TLS) != 0
7866 && (tls_mask & TLS_TPREL) == 0)
7867 {
7868 bfd_vma insn;
7869
7870 insn = bfd_get_32 (input_bfd, contents + rel->r_offset);
7871 insn = _bfd_elf_ppc_at_tls_transform (insn, 2);
7872 if (insn == 0)
7873 abort ();
7874 bfd_put_32 (input_bfd, insn, contents + rel->r_offset);
7875 r_type = R_PPC_TPREL16_LO;
7876 rel->r_info = ELF32_R_INFO (r_symndx, r_type);
7877
7878 /* Was PPC_TLS which sits on insn boundary, now
7879 PPC_TPREL16_LO which is at low-order half-word. */
7880 rel->r_offset += d_offset;
7881 }
7882 break;
7883
7884 case R_PPC_GOT_TLSGD16_HI:
7885 case R_PPC_GOT_TLSGD16_HA:
7886 tls_gd = TLS_TPRELGD;
7887 if ((tls_mask & TLS_TLS) != 0 && (tls_mask & TLS_GD) == 0)
7888 goto tls_gdld_hi;
7889 break;
7890
7891 case R_PPC_GOT_TLSLD16_HI:
7892 case R_PPC_GOT_TLSLD16_HA:
7893 if ((tls_mask & TLS_TLS) != 0 && (tls_mask & TLS_LD) == 0)
7894 {
7895 tls_gdld_hi:
7896 if ((tls_mask & tls_gd) != 0)
7897 r_type = (((r_type - (R_PPC_GOT_TLSGD16 & 3)) & 3)
7898 + R_PPC_GOT_TPREL16);
7899 else
7900 {
7901 rel->r_offset -= d_offset;
7902 bfd_put_32 (input_bfd, NOP, contents + rel->r_offset);
7903 r_type = R_PPC_NONE;
7904 }
7905 rel->r_info = ELF32_R_INFO (r_symndx, r_type);
7906 }
7907 break;
7908
7909 case R_PPC_GOT_TLSGD16:
7910 case R_PPC_GOT_TLSGD16_LO:
7911 tls_gd = TLS_TPRELGD;
7912 if ((tls_mask & TLS_TLS) != 0 && (tls_mask & TLS_GD) == 0)
7913 goto tls_ldgd_opt;
7914 break;
7915
7916 case R_PPC_GOT_TLSLD16:
7917 case R_PPC_GOT_TLSLD16_LO:
7918 if ((tls_mask & TLS_TLS) != 0 && (tls_mask & TLS_LD) == 0)
7919 {
7920 unsigned int insn1, insn2;
7921 bfd_vma offset;
7922
7923 tls_ldgd_opt:
7924 offset = (bfd_vma) -1;
7925 /* If not using the newer R_PPC_TLSGD/LD to mark
7926 __tls_get_addr calls, we must trust that the call
7927 stays with its arg setup insns, ie. that the next
7928 reloc is the __tls_get_addr call associated with
7929 the current reloc. Edit both insns. */
7930 if (input_section->has_tls_get_addr_call
7931 && rel + 1 < relend
7932 && branch_reloc_hash_match (input_bfd, rel + 1,
7933 htab->tls_get_addr))
7934 offset = rel[1].r_offset;
7935 /* We read the low GOT_TLS insn because we need to keep
7936 the destination reg. It may be something other than
7937 the usual r3, and moved to r3 before the call by
7938 intervening code. */
7939 insn1 = bfd_get_32 (input_bfd,
7940 contents + rel->r_offset - d_offset);
7941 if ((tls_mask & tls_gd) != 0)
7942 {
7943 /* IE */
7944 insn1 &= (0x1f << 21) | (0x1f << 16);
7945 insn1 |= 32 << 26; /* lwz */
7946 if (offset != (bfd_vma) -1)
7947 {
7948 rel[1].r_info = ELF32_R_INFO (STN_UNDEF, R_PPC_NONE);
7949 insn2 = 0x7c631214; /* add 3,3,2 */
7950 bfd_put_32 (input_bfd, insn2, contents + offset);
7951 }
7952 r_type = (((r_type - (R_PPC_GOT_TLSGD16 & 3)) & 3)
7953 + R_PPC_GOT_TPREL16);
7954 rel->r_info = ELF32_R_INFO (r_symndx, r_type);
7955 }
7956 else
7957 {
7958 /* LE */
7959 insn1 &= 0x1f << 21;
7960 insn1 |= 0x3c020000; /* addis r,2,0 */
7961 if (tls_gd == 0)
7962 {
7963 /* Was an LD reloc. */
7964 for (r_symndx = 0;
7965 r_symndx < symtab_hdr->sh_info;
7966 r_symndx++)
7967 if (local_sections[r_symndx] == sec)
7968 break;
7969 if (r_symndx >= symtab_hdr->sh_info)
7970 r_symndx = STN_UNDEF;
7971 rel->r_addend = htab->elf.tls_sec->vma + DTP_OFFSET;
7972 if (r_symndx != STN_UNDEF)
7973 rel->r_addend -= (local_syms[r_symndx].st_value
7974 + sec->output_offset
7975 + sec->output_section->vma);
7976 }
7977 r_type = R_PPC_TPREL16_HA;
7978 rel->r_info = ELF32_R_INFO (r_symndx, r_type);
7979 if (offset != (bfd_vma) -1)
7980 {
7981 rel[1].r_info = ELF32_R_INFO (r_symndx, R_PPC_TPREL16_LO);
7982 rel[1].r_offset = offset + d_offset;
7983 rel[1].r_addend = rel->r_addend;
7984 insn2 = 0x38630000; /* addi 3,3,0 */
7985 bfd_put_32 (input_bfd, insn2, contents + offset);
7986 }
7987 }
7988 bfd_put_32 (input_bfd, insn1,
7989 contents + rel->r_offset - d_offset);
7990 if (tls_gd == 0)
7991 {
7992 /* We changed the symbol on an LD reloc. Start over
7993 in order to get h, sym, sec etc. right. */
7994 goto again;
7995 }
7996 }
7997 break;
7998
7999 case R_PPC_TLSGD:
8000 if ((tls_mask & TLS_TLS) != 0 && (tls_mask & TLS_GD) == 0)
8001 {
8002 unsigned int insn2;
8003 bfd_vma offset = rel->r_offset;
8004
8005 if ((tls_mask & TLS_TPRELGD) != 0)
8006 {
8007 /* IE */
8008 r_type = R_PPC_NONE;
8009 insn2 = 0x7c631214; /* add 3,3,2 */
8010 }
8011 else
8012 {
8013 /* LE */
8014 r_type = R_PPC_TPREL16_LO;
8015 rel->r_offset += d_offset;
8016 insn2 = 0x38630000; /* addi 3,3,0 */
8017 }
8018 rel->r_info = ELF32_R_INFO (r_symndx, r_type);
8019 bfd_put_32 (input_bfd, insn2, contents + offset);
8020 /* Zap the reloc on the _tls_get_addr call too. */
8021 BFD_ASSERT (offset == rel[1].r_offset);
8022 rel[1].r_info = ELF32_R_INFO (STN_UNDEF, R_PPC_NONE);
8023 }
8024 break;
8025
8026 case R_PPC_TLSLD:
8027 if ((tls_mask & TLS_TLS) != 0 && (tls_mask & TLS_LD) == 0)
8028 {
8029 unsigned int insn2;
8030
8031 for (r_symndx = 0;
8032 r_symndx < symtab_hdr->sh_info;
8033 r_symndx++)
8034 if (local_sections[r_symndx] == sec)
8035 break;
8036 if (r_symndx >= symtab_hdr->sh_info)
8037 r_symndx = STN_UNDEF;
8038 rel->r_addend = htab->elf.tls_sec->vma + DTP_OFFSET;
8039 if (r_symndx != STN_UNDEF)
8040 rel->r_addend -= (local_syms[r_symndx].st_value
8041 + sec->output_offset
8042 + sec->output_section->vma);
8043
8044 rel->r_info = ELF32_R_INFO (r_symndx, R_PPC_TPREL16_LO);
8045 rel->r_offset += d_offset;
8046 insn2 = 0x38630000; /* addi 3,3,0 */
8047 bfd_put_32 (input_bfd, insn2,
8048 contents + rel->r_offset - d_offset);
8049 /* Zap the reloc on the _tls_get_addr call too. */
8050 BFD_ASSERT (rel->r_offset - d_offset == rel[1].r_offset);
8051 rel[1].r_info = ELF32_R_INFO (STN_UNDEF, R_PPC_NONE);
8052 goto again;
8053 }
8054 break;
8055 }
8056
8057 /* Handle other relocations that tweak non-addend part of insn. */
8058 branch_bit = 0;
8059 switch (r_type)
8060 {
8061 default:
8062 break;
8063
8064 /* Branch taken prediction relocations. */
8065 case R_PPC_ADDR14_BRTAKEN:
8066 case R_PPC_REL14_BRTAKEN:
8067 branch_bit = BRANCH_PREDICT_BIT;
8068 /* Fall through. */
8069
8070 /* Branch not taken prediction relocations. */
8071 case R_PPC_ADDR14_BRNTAKEN:
8072 case R_PPC_REL14_BRNTAKEN:
8073 {
8074 bfd_vma insn;
8075
8076 insn = bfd_get_32 (input_bfd, contents + rel->r_offset);
8077 insn &= ~BRANCH_PREDICT_BIT;
8078 insn |= branch_bit;
8079
8080 from = (rel->r_offset
8081 + input_section->output_offset
8082 + input_section->output_section->vma);
8083
8084 /* Invert 'y' bit if not the default. */
8085 if ((bfd_signed_vma) (relocation + rel->r_addend - from) < 0)
8086 insn ^= BRANCH_PREDICT_BIT;
8087
8088 bfd_put_32 (input_bfd, insn, contents + rel->r_offset);
8089 break;
8090 }
8091 }
8092
8093 if (ELIMINATE_COPY_RELOCS
8094 && h != NULL
8095 && !h->def_regular
8096 && h->protected_def
8097 && ppc_elf_hash_entry (h)->has_addr16_ha
8098 && ppc_elf_hash_entry (h)->has_addr16_lo
8099 && htab->params->pic_fixup > 0)
8100 {
8101 /* Convert lis;addi or lis;load/store accessing a protected
8102 variable defined in a shared library to PIC. */
8103 unsigned int insn;
8104
8105 if (r_type == R_PPC_ADDR16_HA)
8106 {
8107 insn = bfd_get_32 (input_bfd,
8108 contents + rel->r_offset - d_offset);
8109 if ((insn & (0x3f << 26)) == (15u << 26)
8110 && (insn & (0x1f << 16)) == 0 /* lis */)
8111 {
8112 bfd_byte *p;
8113 bfd_vma off;
8114 bfd_vma got_addr;
8115
8116 p = (contents + input_section->size
8117 - relax_info->workaround_size
8118 - relax_info->picfixup_size
8119 + picfixup_size);
8120 off = (p - contents) - (rel->r_offset - d_offset);
8121 if (off > 0x1fffffc || (off & 3) != 0)
8122 info->callbacks->einfo
8123 (_("%H: fixup branch overflow\n"),
8124 input_bfd, input_section, rel->r_offset);
8125
8126 bfd_put_32 (input_bfd, B | off,
8127 contents + rel->r_offset - d_offset);
8128 got_addr = (htab->elf.sgot->output_section->vma
8129 + htab->elf.sgot->output_offset
8130 + (h->got.offset & ~1));
8131 wrel->r_offset = (p - contents) + d_offset;
8132 wrel->r_info = ELF32_R_INFO (0, R_PPC_ADDR16_HA);
8133 wrel->r_addend = got_addr;
8134 insn &= ~0xffff;
8135 insn |= ((unsigned int) (got_addr + 0x8000) >> 16) & 0xffff;
8136 bfd_put_32 (input_bfd, insn, p);
8137
8138 /* Convert lis to lwz, loading address from GOT. */
8139 insn &= ~0xffff;
8140 insn ^= (32u ^ 15u) << 26;
8141 insn |= (insn & (0x1f << 21)) >> 5;
8142 insn |= got_addr & 0xffff;
8143 bfd_put_32 (input_bfd, insn, p + 4);
8144
8145 bfd_put_32 (input_bfd, B | ((-4 - off) & 0x3ffffff), p + 8);
8146 picfixup_size += 12;
8147
8148 /* Use one of the spare relocs, so --emit-relocs
8149 output is reasonable. */
8150 memmove (rel + 1, rel, (relend - rel - 1) * sizeof (*rel));
8151 wrel++, rel++;
8152 rel->r_offset = wrel[-1].r_offset + 4;
8153 rel->r_info = ELF32_R_INFO (0, R_PPC_ADDR16_LO);
8154 rel->r_addend = wrel[-1].r_addend;
8155
8156 /* Continue on as if we had a got reloc, to output
8157 dynamic reloc. */
8158 r_type = R_PPC_GOT16_LO;
8159 }
8160 else
8161 _bfd_error_handler
8162 /* xgettext:c-format */
8163 (_("%pB(%pA+%#" PRIx64 "): error: "
8164 "%s with unexpected instruction %#x"),
8165 input_bfd, input_section, (uint64_t) rel->r_offset,
8166 "R_PPC_ADDR16_HA", insn);
8167 }
8168 else if (r_type == R_PPC_ADDR16_LO)
8169 {
8170 insn = bfd_get_32 (input_bfd,
8171 contents + rel->r_offset - d_offset);
8172 if ((insn & (0x3f << 26)) == 14u << 26 /* addi */
8173 || (insn & (0x3f << 26)) == 32u << 26 /* lwz */
8174 || (insn & (0x3f << 26)) == 34u << 26 /* lbz */
8175 || (insn & (0x3f << 26)) == 36u << 26 /* stw */
8176 || (insn & (0x3f << 26)) == 38u << 26 /* stb */
8177 || (insn & (0x3f << 26)) == 40u << 26 /* lhz */
8178 || (insn & (0x3f << 26)) == 42u << 26 /* lha */
8179 || (insn & (0x3f << 26)) == 44u << 26 /* sth */
8180 || (insn & (0x3f << 26)) == 46u << 26 /* lmw */
8181 || (insn & (0x3f << 26)) == 47u << 26 /* stmw */
8182 || (insn & (0x3f << 26)) == 48u << 26 /* lfs */
8183 || (insn & (0x3f << 26)) == 50u << 26 /* lfd */
8184 || (insn & (0x3f << 26)) == 52u << 26 /* stfs */
8185 || (insn & (0x3f << 26)) == 54u << 26 /* stfd */
8186 || ((insn & (0x3f << 26)) == 58u << 26 /* lwa,ld,lmd */
8187 && (insn & 3) != 1)
8188 || ((insn & (0x3f << 26)) == 62u << 26 /* std, stmd */
8189 && ((insn & 3) == 0 || (insn & 3) == 3)))
8190 {
8191 /* Arrange to apply the reloc addend, if any. */
8192 relocation = 0;
8193 unresolved_reloc = FALSE;
8194 rel->r_info = ELF32_R_INFO (0, r_type);
8195 }
8196 else
8197 _bfd_error_handler
8198 /* xgettext:c-format */
8199 (_("%pB(%pA+%#" PRIx64 "): error: "
8200 "%s with unexpected instruction %#x"),
8201 input_bfd, input_section, (uint64_t) rel->r_offset,
8202 "R_PPC_ADDR16_LO", insn);
8203 }
8204 }
8205
8206 ifunc = NULL;
8207 if (!htab->is_vxworks)
8208 {
8209 struct plt_entry *ent;
8210
8211 if (h != NULL)
8212 {
8213 if (h->type == STT_GNU_IFUNC)
8214 ifunc = &h->plt.plist;
8215 }
8216 else if (local_got_offsets != NULL
8217 && ELF_ST_TYPE (sym->st_info) == STT_GNU_IFUNC)
8218 {
8219 struct plt_entry **local_plt;
8220
8221 local_plt = (struct plt_entry **) (local_got_offsets
8222 + symtab_hdr->sh_info);
8223 ifunc = local_plt + r_symndx;
8224 }
8225
8226 ent = NULL;
8227 if (ifunc != NULL
8228 && (!bfd_link_pic (info)
8229 || is_branch_reloc (r_type)))
8230 {
8231 addend = 0;
8232 if (r_type == R_PPC_PLTREL24 && bfd_link_pic (info))
8233 addend = rel->r_addend;
8234 ent = find_plt_ent (ifunc, got2, addend);
8235 }
8236 if (ent != NULL)
8237 {
8238 if (bfd_link_pic (info)
8239 && ent->sec != got2
8240 && htab->plt_type != PLT_NEW
8241 && (!htab->elf.dynamic_sections_created
8242 || h == NULL
8243 || h->dynindx == -1))
8244 {
8245 /* Uh oh, we are going to create a pic glink stub
8246 for an ifunc (here for h == NULL and later in
8247 finish_dynamic_symbol for h != NULL), and
8248 apparently are using code compiled with
8249 -mbss-plt. The difficulty is that -mbss-plt code
8250 gives no indication via a magic PLTREL24 addend
8251 whether r30 is equal to _GLOBAL_OFFSET_TABLE_ or
8252 is pointing into a .got2 section (and how far
8253 into .got2). */
8254 info->callbacks->einfo
8255 /* xgettext:c-format */
8256 (_("%X%H: unsupported bss-plt -fPIC ifunc %s\n"),
8257 input_bfd, input_section, rel->r_offset, sym_name);
8258 }
8259 if (h == NULL && (ent->plt.offset & 1) == 0)
8260 {
8261 Elf_Internal_Rela rela;
8262 bfd_byte *loc;
8263
8264 rela.r_offset = (htab->elf.iplt->output_section->vma
8265 + htab->elf.iplt->output_offset
8266 + ent->plt.offset);
8267 rela.r_info = ELF32_R_INFO (0, R_PPC_IRELATIVE);
8268 rela.r_addend = relocation;
8269 loc = htab->elf.irelplt->contents;
8270 loc += (htab->elf.irelplt->reloc_count++
8271 * sizeof (Elf32_External_Rela));
8272 bfd_elf32_swap_reloca_out (output_bfd, &rela, loc);
8273 htab->local_ifunc_resolver = 1;
8274
8275 ent->plt.offset |= 1;
8276 }
8277 if (h == NULL && (ent->glink_offset & 1) == 0)
8278 {
8279 unsigned char *p = ((unsigned char *) htab->glink->contents
8280 + ent->glink_offset);
8281
8282 write_glink_stub (NULL, ent, htab->elf.iplt, p, info);
8283 ent->glink_offset |= 1;
8284 }
8285
8286 unresolved_reloc = FALSE;
8287 if (htab->plt_type == PLT_NEW
8288 || !htab->elf.dynamic_sections_created
8289 || h == NULL
8290 || h->dynindx == -1)
8291 relocation = (htab->glink->output_section->vma
8292 + htab->glink->output_offset
8293 + (ent->glink_offset & ~1));
8294 else
8295 relocation = (htab->elf.splt->output_section->vma
8296 + htab->elf.splt->output_offset
8297 + ent->plt.offset);
8298 }
8299 }
8300
8301 addend = rel->r_addend;
8302 howto = NULL;
8303 if (r_type < R_PPC_max)
8304 howto = ppc_elf_howto_table[r_type];
8305
8306 switch (r_type)
8307 {
8308 default:
8309 break;
8310
8311 case R_PPC_TPREL16_HA:
8312 if (htab->do_tls_opt && relocation + addend + 0x8000 < 0x10000)
8313 {
8314 bfd_byte *p = contents + (rel->r_offset & ~3);
8315 unsigned int insn = bfd_get_32 (input_bfd, p);
8316 if ((insn & ((0x3f << 26) | 0x1f << 16))
8317 != ((15u << 26) | (2 << 16)) /* addis rt,2,imm */)
8318 /* xgettext:c-format */
8319 info->callbacks->minfo
8320 (_("%H: warning: %s unexpected insn %#x.\n"),
8321 input_bfd, input_section, rel->r_offset, howto->name, insn);
8322 else
8323 bfd_put_32 (input_bfd, NOP, p);
8324 }
8325 break;
8326
8327 case R_PPC_TPREL16_LO:
8328 if (htab->do_tls_opt && relocation + addend + 0x8000 < 0x10000)
8329 {
8330 bfd_byte *p = contents + (rel->r_offset & ~3);
8331 unsigned int insn = bfd_get_32 (input_bfd, p);
8332 insn &= ~(0x1f << 16);
8333 insn |= 2 << 16;
8334 bfd_put_32 (input_bfd, insn, p);
8335 }
8336 break;
8337 }
8338
8339 tls_type = 0;
8340 switch (r_type)
8341 {
8342 default:
8343 /* xgettext:c-format */
8344 _bfd_error_handler (_("%pB: %s unsupported"),
8345 input_bfd, howto->name);
8346
8347 bfd_set_error (bfd_error_bad_value);
8348 ret = FALSE;
8349 goto copy_reloc;
8350
8351 case R_PPC_NONE:
8352 case R_PPC_TLS:
8353 case R_PPC_TLSGD:
8354 case R_PPC_TLSLD:
8355 case R_PPC_EMB_MRKREF:
8356 case R_PPC_GNU_VTINHERIT:
8357 case R_PPC_GNU_VTENTRY:
8358 goto copy_reloc;
8359
8360 /* GOT16 relocations. Like an ADDR16 using the symbol's
8361 address in the GOT as relocation value instead of the
8362 symbol's value itself. Also, create a GOT entry for the
8363 symbol and put the symbol value there. */
8364 case R_PPC_GOT_TLSGD16:
8365 case R_PPC_GOT_TLSGD16_LO:
8366 case R_PPC_GOT_TLSGD16_HI:
8367 case R_PPC_GOT_TLSGD16_HA:
8368 tls_type = TLS_TLS | TLS_GD;
8369 goto dogot;
8370
8371 case R_PPC_GOT_TLSLD16:
8372 case R_PPC_GOT_TLSLD16_LO:
8373 case R_PPC_GOT_TLSLD16_HI:
8374 case R_PPC_GOT_TLSLD16_HA:
8375 tls_type = TLS_TLS | TLS_LD;
8376 goto dogot;
8377
8378 case R_PPC_GOT_TPREL16:
8379 case R_PPC_GOT_TPREL16_LO:
8380 case R_PPC_GOT_TPREL16_HI:
8381 case R_PPC_GOT_TPREL16_HA:
8382 tls_type = TLS_TLS | TLS_TPREL;
8383 goto dogot;
8384
8385 case R_PPC_GOT_DTPREL16:
8386 case R_PPC_GOT_DTPREL16_LO:
8387 case R_PPC_GOT_DTPREL16_HI:
8388 case R_PPC_GOT_DTPREL16_HA:
8389 tls_type = TLS_TLS | TLS_DTPREL;
8390 goto dogot;
8391
8392 case R_PPC_GOT16:
8393 case R_PPC_GOT16_LO:
8394 case R_PPC_GOT16_HI:
8395 case R_PPC_GOT16_HA:
8396 tls_mask = 0;
8397 dogot:
8398 {
8399 /* Relocation is to the entry for this symbol in the global
8400 offset table. */
8401 bfd_vma off;
8402 bfd_vma *offp;
8403 unsigned long indx;
8404
8405 if (htab->elf.sgot == NULL)
8406 abort ();
8407
8408 indx = 0;
8409 if (tls_type == (TLS_TLS | TLS_LD)
8410 && (h == NULL
8411 || !h->def_dynamic))
8412 offp = &htab->tlsld_got.offset;
8413 else if (h != NULL)
8414 {
8415 if (!htab->elf.dynamic_sections_created
8416 || h->dynindx == -1
8417 || SYMBOL_REFERENCES_LOCAL (info, h)
8418 || UNDEFWEAK_NO_DYNAMIC_RELOC (info, h))
8419 /* This is actually a static link, or it is a
8420 -Bsymbolic link and the symbol is defined
8421 locally, or the symbol was forced to be local
8422 because of a version file. */
8423 ;
8424 else
8425 {
8426 indx = h->dynindx;
8427 unresolved_reloc = FALSE;
8428 }
8429 offp = &h->got.offset;
8430 }
8431 else
8432 {
8433 if (local_got_offsets == NULL)
8434 abort ();
8435 offp = &local_got_offsets[r_symndx];
8436 }
8437
8438 /* The offset must always be a multiple of 4. We use the
8439 least significant bit to record whether we have already
8440 processed this entry. */
8441 off = *offp;
8442 if ((off & 1) != 0)
8443 off &= ~1;
8444 else
8445 {
8446 unsigned int tls_m = (tls_mask
8447 & (TLS_LD | TLS_GD | TLS_DTPREL
8448 | TLS_TPREL | TLS_TPRELGD));
8449
8450 if (offp == &htab->tlsld_got.offset)
8451 tls_m = TLS_LD;
8452 else if (h == NULL
8453 || !h->def_dynamic)
8454 tls_m &= ~TLS_LD;
8455
8456 /* We might have multiple got entries for this sym.
8457 Initialize them all. */
8458 do
8459 {
8460 int tls_ty = 0;
8461
8462 if ((tls_m & TLS_LD) != 0)
8463 {
8464 tls_ty = TLS_TLS | TLS_LD;
8465 tls_m &= ~TLS_LD;
8466 }
8467 else if ((tls_m & TLS_GD) != 0)
8468 {
8469 tls_ty = TLS_TLS | TLS_GD;
8470 tls_m &= ~TLS_GD;
8471 }
8472 else if ((tls_m & TLS_DTPREL) != 0)
8473 {
8474 tls_ty = TLS_TLS | TLS_DTPREL;
8475 tls_m &= ~TLS_DTPREL;
8476 }
8477 else if ((tls_m & (TLS_TPREL | TLS_TPRELGD)) != 0)
8478 {
8479 tls_ty = TLS_TLS | TLS_TPREL;
8480 tls_m = 0;
8481 }
8482
8483 /* Generate relocs for the dynamic linker. */
8484 if (indx != 0
8485 || (bfd_link_pic (info)
8486 && (h == NULL
8487 || !UNDEFWEAK_NO_DYNAMIC_RELOC (info, h)
8488 || offp == &htab->tlsld_got.offset)
8489 && !(tls_ty == (TLS_TLS | TLS_TPREL)
8490 && bfd_link_executable (info)
8491 && SYMBOL_REFERENCES_LOCAL (info, h))))
8492 {
8493 asection *rsec = htab->elf.srelgot;
8494 bfd_byte * loc;
8495
8496 if (ifunc != NULL)
8497 {
8498 rsec = htab->elf.irelplt;
8499 if (indx == 0)
8500 htab->local_ifunc_resolver = 1;
8501 else if (is_static_defined (h))
8502 htab->maybe_local_ifunc_resolver = 1;
8503 }
8504 outrel.r_offset = (htab->elf.sgot->output_section->vma
8505 + htab->elf.sgot->output_offset
8506 + off);
8507 outrel.r_addend = 0;
8508 if (tls_ty & (TLS_LD | TLS_GD))
8509 {
8510 outrel.r_info = ELF32_R_INFO (indx, R_PPC_DTPMOD32);
8511 if (tls_ty == (TLS_TLS | TLS_GD))
8512 {
8513 loc = rsec->contents;
8514 loc += (rsec->reloc_count++
8515 * sizeof (Elf32_External_Rela));
8516 bfd_elf32_swap_reloca_out (output_bfd,
8517 &outrel, loc);
8518 outrel.r_offset += 4;
8519 outrel.r_info
8520 = ELF32_R_INFO (indx, R_PPC_DTPREL32);
8521 }
8522 }
8523 else if (tls_ty == (TLS_TLS | TLS_DTPREL))
8524 outrel.r_info = ELF32_R_INFO (indx, R_PPC_DTPREL32);
8525 else if (tls_ty == (TLS_TLS | TLS_TPREL))
8526 outrel.r_info = ELF32_R_INFO (indx, R_PPC_TPREL32);
8527 else if (indx != 0)
8528 outrel.r_info = ELF32_R_INFO (indx, R_PPC_GLOB_DAT);
8529 else if (ifunc != NULL)
8530 outrel.r_info = ELF32_R_INFO (0, R_PPC_IRELATIVE);
8531 else
8532 outrel.r_info = ELF32_R_INFO (0, R_PPC_RELATIVE);
8533 if (indx == 0 && tls_ty != (TLS_TLS | TLS_LD))
8534 {
8535 outrel.r_addend += relocation;
8536 if (tls_ty & (TLS_GD | TLS_DTPREL | TLS_TPREL))
8537 {
8538 if (htab->elf.tls_sec == NULL)
8539 outrel.r_addend = 0;
8540 else
8541 outrel.r_addend -= htab->elf.tls_sec->vma;
8542 }
8543 }
8544 loc = rsec->contents;
8545 loc += (rsec->reloc_count++
8546 * sizeof (Elf32_External_Rela));
8547 bfd_elf32_swap_reloca_out (output_bfd, &outrel, loc);
8548 }
8549
8550 /* Init the .got section contents if we're not
8551 emitting a reloc. */
8552 else
8553 {
8554 bfd_vma value = relocation;
8555
8556 if (tls_ty != 0)
8557 {
8558 if (htab->elf.tls_sec == NULL)
8559 value = 0;
8560 else
8561 {
8562 if (tls_ty & TLS_LD)
8563 value = 0;
8564 else
8565 value -= htab->elf.tls_sec->vma + DTP_OFFSET;
8566 if (tls_ty & TLS_TPREL)
8567 value += DTP_OFFSET - TP_OFFSET;
8568 }
8569
8570 if (tls_ty & (TLS_LD | TLS_GD))
8571 {
8572 bfd_put_32 (input_bfd, value,
8573 htab->elf.sgot->contents + off + 4);
8574 value = 1;
8575 }
8576 }
8577 bfd_put_32 (input_bfd, value,
8578 htab->elf.sgot->contents + off);
8579 }
8580
8581 off += 4;
8582 if (tls_ty & (TLS_LD | TLS_GD))
8583 off += 4;
8584 }
8585 while (tls_m != 0);
8586
8587 off = *offp;
8588 *offp = off | 1;
8589 }
8590
8591 if (off >= (bfd_vma) -2)
8592 abort ();
8593
8594 if ((tls_type & TLS_TLS) != 0)
8595 {
8596 if (tls_type != (TLS_TLS | TLS_LD))
8597 {
8598 if ((tls_mask & TLS_LD) != 0
8599 && !(h == NULL
8600 || !h->def_dynamic))
8601 off += 8;
8602 if (tls_type != (TLS_TLS | TLS_GD))
8603 {
8604 if ((tls_mask & TLS_GD) != 0)
8605 off += 8;
8606 if (tls_type != (TLS_TLS | TLS_DTPREL))
8607 {
8608 if ((tls_mask & TLS_DTPREL) != 0)
8609 off += 4;
8610 }
8611 }
8612 }
8613 }
8614
8615 /* If here for a picfixup, we're done. */
8616 if (r_type != ELF32_R_TYPE (rel->r_info))
8617 goto copy_reloc;
8618
8619 relocation = (htab->elf.sgot->output_section->vma
8620 + htab->elf.sgot->output_offset
8621 + off
8622 - SYM_VAL (htab->elf.hgot));
8623
8624 /* Addends on got relocations don't make much sense.
8625 x+off@got is actually x@got+off, and since the got is
8626 generated by a hash table traversal, the value in the
8627 got at entry m+n bears little relation to the entry m. */
8628 if (addend != 0)
8629 info->callbacks->einfo
8630 /* xgettext:c-format */
8631 (_("%H: non-zero addend on %s reloc against `%s'\n"),
8632 input_bfd, input_section, rel->r_offset,
8633 howto->name,
8634 sym_name);
8635 }
8636 break;
8637
8638 /* Relocations that need no special processing. */
8639 case R_PPC_LOCAL24PC:
8640 /* It makes no sense to point a local relocation
8641 at a symbol not in this object. */
8642 if (unresolved_reloc)
8643 {
8644 (*info->callbacks->undefined_symbol) (info,
8645 h->root.root.string,
8646 input_bfd,
8647 input_section,
8648 rel->r_offset,
8649 TRUE);
8650 goto copy_reloc;
8651 }
8652 if (h != NULL && h->type == STT_GNU_IFUNC && bfd_link_pic (info))
8653 {
8654 /* @local on an ifunc does not really make sense since
8655 the ifunc resolver can take you anywhere. More
8656 seriously, calls to ifuncs must go through a plt call
8657 stub, and for pic the plt call stubs uses r30 to
8658 access the PLT. The problem is that a call that is
8659 local won't have the +32k reloc addend trick marking
8660 -fPIC code, so the linker won't know whether r30 is
8661 _GLOBAL_OFFSET_TABLE_ or pointing into a .got2 section. */
8662 /* xgettext:c-format */
8663 info->callbacks->einfo (_("%X%H: @local call to ifunc %s\n"),
8664 input_bfd, input_section, rel->r_offset,
8665 h->root.root.string);
8666 }
8667 break;
8668
8669 case R_PPC_DTPREL16:
8670 case R_PPC_DTPREL16_LO:
8671 case R_PPC_DTPREL16_HI:
8672 case R_PPC_DTPREL16_HA:
8673 if (htab->elf.tls_sec != NULL)
8674 addend -= htab->elf.tls_sec->vma + DTP_OFFSET;
8675 break;
8676
8677 /* Relocations that may need to be propagated if this is a shared
8678 object. */
8679 case R_PPC_TPREL16:
8680 case R_PPC_TPREL16_LO:
8681 case R_PPC_TPREL16_HI:
8682 case R_PPC_TPREL16_HA:
8683 if (h != NULL
8684 && h->root.type == bfd_link_hash_undefweak
8685 && h->dynindx == -1)
8686 {
8687 /* Make this relocation against an undefined weak symbol
8688 resolve to zero. This is really just a tweak, since
8689 code using weak externs ought to check that they are
8690 defined before using them. */
8691 bfd_byte *p = contents + rel->r_offset - d_offset;
8692 unsigned int insn = bfd_get_32 (input_bfd, p);
8693 insn = _bfd_elf_ppc_at_tprel_transform (insn, 2);
8694 if (insn != 0)
8695 bfd_put_32 (input_bfd, insn, p);
8696 break;
8697 }
8698 if (htab->elf.tls_sec != NULL)
8699 addend -= htab->elf.tls_sec->vma + TP_OFFSET;
8700 /* The TPREL16 relocs shouldn't really be used in shared
8701 libs or with non-local symbols as that will result in
8702 DT_TEXTREL being set, but support them anyway. */
8703 goto dodyn;
8704
8705 case R_PPC_TPREL32:
8706 if (htab->elf.tls_sec != NULL)
8707 addend -= htab->elf.tls_sec->vma + TP_OFFSET;
8708 goto dodyn;
8709
8710 case R_PPC_DTPREL32:
8711 if (htab->elf.tls_sec != NULL)
8712 addend -= htab->elf.tls_sec->vma + DTP_OFFSET;
8713 goto dodyn;
8714
8715 case R_PPC_DTPMOD32:
8716 relocation = 1;
8717 addend = 0;
8718 goto dodyn;
8719
8720 case R_PPC_REL16:
8721 case R_PPC_REL16_LO:
8722 case R_PPC_REL16_HI:
8723 case R_PPC_REL16_HA:
8724 case R_PPC_REL16DX_HA:
8725 break;
8726
8727 case R_PPC_REL32:
8728 if (h == NULL || h == htab->elf.hgot)
8729 break;
8730 /* fall through */
8731
8732 case R_PPC_ADDR32:
8733 case R_PPC_ADDR16:
8734 case R_PPC_ADDR16_LO:
8735 case R_PPC_ADDR16_HI:
8736 case R_PPC_ADDR16_HA:
8737 case R_PPC_UADDR32:
8738 case R_PPC_UADDR16:
8739 goto dodyn;
8740
8741 case R_PPC_VLE_REL8:
8742 case R_PPC_VLE_REL15:
8743 case R_PPC_VLE_REL24:
8744 case R_PPC_REL24:
8745 case R_PPC_REL14:
8746 case R_PPC_REL14_BRTAKEN:
8747 case R_PPC_REL14_BRNTAKEN:
8748 /* If these relocations are not to a named symbol, they can be
8749 handled right here, no need to bother the dynamic linker. */
8750 if (SYMBOL_CALLS_LOCAL (info, h)
8751 || h == htab->elf.hgot)
8752 break;
8753 /* fall through */
8754
8755 case R_PPC_ADDR24:
8756 case R_PPC_ADDR14:
8757 case R_PPC_ADDR14_BRTAKEN:
8758 case R_PPC_ADDR14_BRNTAKEN:
8759 if (h != NULL && !bfd_link_pic (info))
8760 break;
8761 /* fall through */
8762
8763 dodyn:
8764 if ((input_section->flags & SEC_ALLOC) == 0
8765 || is_vxworks_tls)
8766 break;
8767
8768 if (bfd_link_pic (info)
8769 ? ((h == NULL
8770 || ppc_elf_hash_entry (h)->dyn_relocs != NULL)
8771 && ((h != NULL && pc_dynrelocs (h))
8772 || must_be_dyn_reloc (info, r_type)))
8773 : (h != NULL
8774 && ppc_elf_hash_entry (h)->dyn_relocs != NULL))
8775 {
8776 int skip;
8777 bfd_byte *loc;
8778 asection *sreloc;
8779 long indx = 0;
8780
8781 #ifdef DEBUG
8782 fprintf (stderr, "ppc_elf_relocate_section needs to "
8783 "create relocation for %s\n",
8784 (h && h->root.root.string
8785 ? h->root.root.string : "<unknown>"));
8786 #endif
8787
8788 /* When generating a shared object, these relocations
8789 are copied into the output file to be resolved at run
8790 time. */
8791 skip = 0;
8792 outrel.r_offset = _bfd_elf_section_offset (output_bfd, info,
8793 input_section,
8794 rel->r_offset);
8795 if (outrel.r_offset == (bfd_vma) -1
8796 || outrel.r_offset == (bfd_vma) -2)
8797 skip = (int) outrel.r_offset;
8798 outrel.r_offset += (input_section->output_section->vma
8799 + input_section->output_offset);
8800
8801 if (skip)
8802 memset (&outrel, 0, sizeof outrel);
8803 else if (!SYMBOL_REFERENCES_LOCAL (info, h))
8804 {
8805 indx = h->dynindx;
8806 BFD_ASSERT (indx != -1);
8807 unresolved_reloc = FALSE;
8808 outrel.r_info = ELF32_R_INFO (indx, r_type);
8809 outrel.r_addend = rel->r_addend;
8810 }
8811 else
8812 {
8813 outrel.r_addend = relocation + rel->r_addend;
8814
8815 if (r_type != R_PPC_ADDR32)
8816 {
8817 if (ifunc != NULL)
8818 {
8819 /* If we get here when building a static
8820 executable, then the libc startup function
8821 responsible for applying indirect function
8822 relocations is going to complain about
8823 the reloc type.
8824 If we get here when building a dynamic
8825 executable, it will be because we have
8826 a text relocation. The dynamic loader
8827 will set the text segment writable and
8828 non-executable to apply text relocations.
8829 So we'll segfault when trying to run the
8830 indirection function to resolve the reloc. */
8831 info->callbacks->einfo
8832 /* xgettext:c-format */
8833 (_("%H: relocation %s for indirect "
8834 "function %s unsupported\n"),
8835 input_bfd, input_section, rel->r_offset,
8836 howto->name,
8837 sym_name);
8838 ret = FALSE;
8839 }
8840 else if (r_symndx == STN_UNDEF || bfd_is_abs_section (sec))
8841 ;
8842 else if (sec == NULL || sec->owner == NULL)
8843 {
8844 bfd_set_error (bfd_error_bad_value);
8845 ret = FALSE;
8846 }
8847 else
8848 {
8849 asection *osec;
8850
8851 /* We are turning this relocation into one
8852 against a section symbol. It would be
8853 proper to subtract the symbol's value,
8854 osec->vma, from the emitted reloc addend,
8855 but ld.so expects buggy relocs.
8856 FIXME: Why not always use a zero index? */
8857 osec = sec->output_section;
8858 indx = elf_section_data (osec)->dynindx;
8859 if (indx == 0)
8860 {
8861 osec = htab->elf.text_index_section;
8862 indx = elf_section_data (osec)->dynindx;
8863 }
8864 BFD_ASSERT (indx != 0);
8865 #ifdef DEBUG
8866 if (indx == 0)
8867 printf ("indx=%ld section=%s flags=%08x name=%s\n",
8868 indx, osec->name, osec->flags,
8869 h->root.root.string);
8870 #endif
8871 }
8872
8873 outrel.r_info = ELF32_R_INFO (indx, r_type);
8874 }
8875 else if (ifunc != NULL)
8876 outrel.r_info = ELF32_R_INFO (0, R_PPC_IRELATIVE);
8877 else
8878 outrel.r_info = ELF32_R_INFO (0, R_PPC_RELATIVE);
8879 }
8880
8881 sreloc = elf_section_data (input_section)->sreloc;
8882 if (ifunc)
8883 {
8884 sreloc = htab->elf.irelplt;
8885 if (indx == 0)
8886 htab->local_ifunc_resolver = 1;
8887 else if (is_static_defined (h))
8888 htab->maybe_local_ifunc_resolver = 1;
8889 }
8890 if (sreloc == NULL)
8891 return FALSE;
8892
8893 loc = sreloc->contents;
8894 loc += sreloc->reloc_count++ * sizeof (Elf32_External_Rela);
8895 bfd_elf32_swap_reloca_out (output_bfd, &outrel, loc);
8896
8897 if (skip == -1)
8898 goto copy_reloc;
8899
8900 /* This reloc will be computed at runtime. Clear the memory
8901 so that it contains a predictable value for prelink. */
8902 if (!skip)
8903 {
8904 relocation = howto->pc_relative ? outrel.r_offset : 0;
8905 addend = 0;
8906 break;
8907 }
8908 }
8909 break;
8910
8911 case R_PPC_RELAX_PLT:
8912 case R_PPC_RELAX_PLTREL24:
8913 if (h != NULL)
8914 {
8915 struct plt_entry *ent;
8916 bfd_vma got2_addend = 0;
8917
8918 if (r_type == R_PPC_RELAX_PLTREL24)
8919 {
8920 if (bfd_link_pic (info))
8921 got2_addend = addend;
8922 addend = 0;
8923 }
8924 ent = find_plt_ent (&h->plt.plist, got2, got2_addend);
8925 if (htab->plt_type == PLT_NEW)
8926 relocation = (htab->glink->output_section->vma
8927 + htab->glink->output_offset
8928 + ent->glink_offset);
8929 else
8930 relocation = (htab->elf.splt->output_section->vma
8931 + htab->elf.splt->output_offset
8932 + ent->plt.offset);
8933 }
8934 /* Fall through. */
8935
8936 case R_PPC_RELAX:
8937 {
8938 const int *stub;
8939 size_t size;
8940 size_t insn_offset = rel->r_offset;
8941 unsigned int insn;
8942
8943 if (bfd_link_pic (info))
8944 {
8945 relocation -= (input_section->output_section->vma
8946 + input_section->output_offset
8947 + rel->r_offset - 4);
8948 stub = shared_stub_entry;
8949 bfd_put_32 (input_bfd, stub[0], contents + insn_offset - 12);
8950 bfd_put_32 (input_bfd, stub[1], contents + insn_offset - 8);
8951 bfd_put_32 (input_bfd, stub[2], contents + insn_offset - 4);
8952 stub += 3;
8953 size = ARRAY_SIZE (shared_stub_entry) - 3;
8954 }
8955 else
8956 {
8957 stub = stub_entry;
8958 size = ARRAY_SIZE (stub_entry);
8959 }
8960
8961 relocation += addend;
8962 if (bfd_link_relocatable (info))
8963 relocation = 0;
8964
8965 /* First insn is HA, second is LO. */
8966 insn = *stub++;
8967 insn |= ((relocation + 0x8000) >> 16) & 0xffff;
8968 bfd_put_32 (input_bfd, insn, contents + insn_offset);
8969 insn_offset += 4;
8970
8971 insn = *stub++;
8972 insn |= relocation & 0xffff;
8973 bfd_put_32 (input_bfd, insn, contents + insn_offset);
8974 insn_offset += 4;
8975 size -= 2;
8976
8977 while (size != 0)
8978 {
8979 insn = *stub++;
8980 --size;
8981 bfd_put_32 (input_bfd, insn, contents + insn_offset);
8982 insn_offset += 4;
8983 }
8984
8985 /* Rewrite the reloc and convert one of the trailing nop
8986 relocs to describe this relocation. */
8987 BFD_ASSERT (ELF32_R_TYPE (relend[-1].r_info) == R_PPC_NONE);
8988 /* The relocs are at the bottom 2 bytes */
8989 wrel->r_offset = rel->r_offset + d_offset;
8990 wrel->r_info = ELF32_R_INFO (r_symndx, R_PPC_ADDR16_HA);
8991 wrel->r_addend = rel->r_addend;
8992 memmove (wrel + 1, wrel, (relend - wrel - 1) * sizeof (*wrel));
8993 wrel++, rel++;
8994 wrel->r_offset += 4;
8995 wrel->r_info = ELF32_R_INFO (r_symndx, R_PPC_ADDR16_LO);
8996 }
8997 continue;
8998
8999 /* Indirect .sdata relocation. */
9000 case R_PPC_EMB_SDAI16:
9001 BFD_ASSERT (htab->sdata[0].section != NULL);
9002 if (!is_static_defined (htab->sdata[0].sym))
9003 {
9004 unresolved_reloc = TRUE;
9005 break;
9006 }
9007 relocation
9008 = elf_finish_pointer_linker_section (input_bfd, &htab->sdata[0],
9009 h, relocation, rel);
9010 addend = 0;
9011 break;
9012
9013 /* Indirect .sdata2 relocation. */
9014 case R_PPC_EMB_SDA2I16:
9015 BFD_ASSERT (htab->sdata[1].section != NULL);
9016 if (!is_static_defined (htab->sdata[1].sym))
9017 {
9018 unresolved_reloc = TRUE;
9019 break;
9020 }
9021 relocation
9022 = elf_finish_pointer_linker_section (input_bfd, &htab->sdata[1],
9023 h, relocation, rel);
9024 addend = 0;
9025 break;
9026
9027 /* Handle the TOC16 reloc. We want to use the offset within the .got
9028 section, not the actual VMA. This is appropriate when generating
9029 an embedded ELF object, for which the .got section acts like the
9030 AIX .toc section. */
9031 case R_PPC_TOC16: /* phony GOT16 relocations */
9032 if (sec == NULL || sec->output_section == NULL)
9033 {
9034 unresolved_reloc = TRUE;
9035 break;
9036 }
9037 BFD_ASSERT (strcmp (bfd_get_section_name (sec->owner, sec),
9038 ".got") == 0
9039 || strcmp (bfd_get_section_name (sec->owner, sec),
9040 ".cgot") == 0);
9041
9042 addend -= sec->output_section->vma + sec->output_offset + 0x8000;
9043 break;
9044
9045 case R_PPC_PLTREL24:
9046 if (h != NULL && ifunc == NULL)
9047 {
9048 struct plt_entry *ent;
9049
9050 ent = find_plt_ent (&h->plt.plist, got2,
9051 bfd_link_pic (info) ? addend : 0);
9052 if (ent == NULL
9053 || htab->elf.splt == NULL)
9054 {
9055 /* We didn't make a PLT entry for this symbol. This
9056 happens when statically linking PIC code, or when
9057 using -Bsymbolic. */
9058 }
9059 else
9060 {
9061 /* Relocation is to the entry for this symbol in the
9062 procedure linkage table. */
9063 unresolved_reloc = FALSE;
9064 if (htab->plt_type == PLT_NEW)
9065 relocation = (htab->glink->output_section->vma
9066 + htab->glink->output_offset
9067 + ent->glink_offset);
9068 else
9069 relocation = (htab->elf.splt->output_section->vma
9070 + htab->elf.splt->output_offset
9071 + ent->plt.offset);
9072 }
9073 }
9074
9075 /* R_PPC_PLTREL24 is rather special. If non-zero, the
9076 addend specifies the GOT pointer offset within .got2.
9077 Don't apply it to the relocation field. */
9078 addend = 0;
9079 break;
9080
9081 /* Relocate against _SDA_BASE_. */
9082 case R_PPC_SDAREL16:
9083 {
9084 const char *name;
9085 struct elf_link_hash_entry *sda = htab->sdata[0].sym;
9086
9087 if (sec == NULL
9088 || sec->output_section == NULL
9089 || !is_static_defined (sda))
9090 {
9091 unresolved_reloc = TRUE;
9092 break;
9093 }
9094 addend -= SYM_VAL (sda);
9095
9096 name = bfd_get_section_name (output_bfd, sec->output_section);
9097 if (!(strcmp (name, ".sdata") == 0
9098 || strcmp (name, ".sbss") == 0))
9099 {
9100 _bfd_error_handler
9101 /* xgettext:c-format */
9102 (_("%pB: the target (%s) of a %s relocation is "
9103 "in the wrong output section (%s)"),
9104 input_bfd,
9105 sym_name,
9106 howto->name,
9107 name);
9108 }
9109 }
9110 break;
9111
9112 /* Relocate against _SDA2_BASE_. */
9113 case R_PPC_EMB_SDA2REL:
9114 {
9115 const char *name;
9116 struct elf_link_hash_entry *sda = htab->sdata[1].sym;
9117
9118 if (sec == NULL
9119 || sec->output_section == NULL
9120 || !is_static_defined (sda))
9121 {
9122 unresolved_reloc = TRUE;
9123 break;
9124 }
9125 addend -= SYM_VAL (sda);
9126
9127 name = bfd_get_section_name (output_bfd, sec->output_section);
9128 if (!(strcmp (name, ".sdata2") == 0
9129 || strcmp (name, ".sbss2") == 0))
9130 {
9131 _bfd_error_handler
9132 /* xgettext:c-format */
9133 (_("%pB: the target (%s) of a %s relocation is "
9134 "in the wrong output section (%s)"),
9135 input_bfd,
9136 sym_name,
9137 howto->name,
9138 name);
9139 }
9140 }
9141 break;
9142
9143 case R_PPC_VLE_LO16A:
9144 relocation = relocation + addend;
9145 ppc_elf_vle_split16 (input_bfd, input_section, rel->r_offset,
9146 contents + rel->r_offset, relocation,
9147 split16a_type, htab->params->vle_reloc_fixup);
9148 goto copy_reloc;
9149
9150 case R_PPC_VLE_LO16D:
9151 relocation = relocation + addend;
9152 ppc_elf_vle_split16 (input_bfd, input_section, rel->r_offset,
9153 contents + rel->r_offset, relocation,
9154 split16d_type, htab->params->vle_reloc_fixup);
9155 goto copy_reloc;
9156
9157 case R_PPC_VLE_HI16A:
9158 relocation = (relocation + addend) >> 16;
9159 ppc_elf_vle_split16 (input_bfd, input_section, rel->r_offset,
9160 contents + rel->r_offset, relocation,
9161 split16a_type, htab->params->vle_reloc_fixup);
9162 goto copy_reloc;
9163
9164 case R_PPC_VLE_HI16D:
9165 relocation = (relocation + addend) >> 16;
9166 ppc_elf_vle_split16 (input_bfd, input_section, rel->r_offset,
9167 contents + rel->r_offset, relocation,
9168 split16d_type, htab->params->vle_reloc_fixup);
9169 goto copy_reloc;
9170
9171 case R_PPC_VLE_HA16A:
9172 relocation = (relocation + addend + 0x8000) >> 16;
9173 ppc_elf_vle_split16 (input_bfd, input_section, rel->r_offset,
9174 contents + rel->r_offset, relocation,
9175 split16a_type, htab->params->vle_reloc_fixup);
9176 goto copy_reloc;
9177
9178 case R_PPC_VLE_HA16D:
9179 relocation = (relocation + addend + 0x8000) >> 16;
9180 ppc_elf_vle_split16 (input_bfd, input_section, rel->r_offset,
9181 contents + rel->r_offset, relocation,
9182 split16d_type, htab->params->vle_reloc_fixup);
9183 goto copy_reloc;
9184
9185 /* Relocate against either _SDA_BASE_, _SDA2_BASE_, or 0. */
9186 case R_PPC_EMB_SDA21:
9187 case R_PPC_VLE_SDA21:
9188 case R_PPC_EMB_RELSDA:
9189 case R_PPC_VLE_SDA21_LO:
9190 {
9191 const char *name;
9192 int reg;
9193 unsigned int insn;
9194 struct elf_link_hash_entry *sda = NULL;
9195
9196 if (sec == NULL || sec->output_section == NULL)
9197 {
9198 unresolved_reloc = TRUE;
9199 break;
9200 }
9201
9202 name = bfd_get_section_name (output_bfd, sec->output_section);
9203 if (strcmp (name, ".sdata") == 0
9204 || strcmp (name, ".sbss") == 0)
9205 {
9206 reg = 13;
9207 sda = htab->sdata[0].sym;
9208 }
9209 else if (strcmp (name, ".sdata2") == 0
9210 || strcmp (name, ".sbss2") == 0)
9211 {
9212 reg = 2;
9213 sda = htab->sdata[1].sym;
9214 }
9215 else if (strcmp (name, ".PPC.EMB.sdata0") == 0
9216 || strcmp (name, ".PPC.EMB.sbss0") == 0)
9217 {
9218 reg = 0;
9219 }
9220 else
9221 {
9222 _bfd_error_handler
9223 /* xgettext:c-format */
9224 (_("%pB: the target (%s) of a %s relocation is "
9225 "in the wrong output section (%s)"),
9226 input_bfd,
9227 sym_name,
9228 howto->name,
9229 name);
9230
9231 bfd_set_error (bfd_error_bad_value);
9232 ret = FALSE;
9233 goto copy_reloc;
9234 }
9235
9236 if (sda != NULL)
9237 {
9238 if (!is_static_defined (sda))
9239 {
9240 unresolved_reloc = TRUE;
9241 break;
9242 }
9243 addend -= SYM_VAL (sda);
9244 }
9245
9246 insn = bfd_get_32 (input_bfd, contents + rel->r_offset);
9247 if (reg == 0
9248 && (r_type == R_PPC_VLE_SDA21
9249 || r_type == R_PPC_VLE_SDA21_LO))
9250 {
9251 relocation = relocation + addend;
9252 addend = 0;
9253
9254 /* Force e_li insn, keeping RT from original insn. */
9255 insn &= 0x1f << 21;
9256 insn |= 28u << 26;
9257
9258 /* We have an li20 field, bits 17..20, 11..15, 21..31. */
9259 /* Top 4 bits of value to 17..20. */
9260 insn |= (relocation & 0xf0000) >> 5;
9261 /* Next 5 bits of the value to 11..15. */
9262 insn |= (relocation & 0xf800) << 5;
9263 /* And the final 11 bits of the value to bits 21 to 31. */
9264 insn |= relocation & 0x7ff;
9265
9266 bfd_put_32 (input_bfd, insn, contents + rel->r_offset);
9267
9268 if (r_type == R_PPC_VLE_SDA21
9269 && ((relocation + 0x80000) & 0xffffffff) > 0x100000)
9270 goto overflow;
9271 goto copy_reloc;
9272 }
9273 else if (r_type == R_PPC_EMB_SDA21
9274 || r_type == R_PPC_VLE_SDA21
9275 || r_type == R_PPC_VLE_SDA21_LO)
9276 {
9277 /* Fill in register field. */
9278 insn = (insn & ~RA_REGISTER_MASK) | (reg << RA_REGISTER_SHIFT);
9279 }
9280 bfd_put_32 (input_bfd, insn, contents + rel->r_offset);
9281 }
9282 break;
9283
9284 case R_PPC_VLE_SDAREL_LO16A:
9285 case R_PPC_VLE_SDAREL_LO16D:
9286 case R_PPC_VLE_SDAREL_HI16A:
9287 case R_PPC_VLE_SDAREL_HI16D:
9288 case R_PPC_VLE_SDAREL_HA16A:
9289 case R_PPC_VLE_SDAREL_HA16D:
9290 {
9291 bfd_vma value;
9292 const char *name;
9293 struct elf_link_hash_entry *sda = NULL;
9294
9295 if (sec == NULL || sec->output_section == NULL)
9296 {
9297 unresolved_reloc = TRUE;
9298 break;
9299 }
9300
9301 name = bfd_get_section_name (output_bfd, sec->output_section);
9302 if (strcmp (name, ".sdata") == 0
9303 || strcmp (name, ".sbss") == 0)
9304 sda = htab->sdata[0].sym;
9305 else if (strcmp (name, ".sdata2") == 0
9306 || strcmp (name, ".sbss2") == 0)
9307 sda = htab->sdata[1].sym;
9308 else
9309 {
9310 _bfd_error_handler
9311 /* xgettext:c-format */
9312 (_("%pB: the target (%s) of a %s relocation is "
9313 "in the wrong output section (%s)"),
9314 input_bfd,
9315 sym_name,
9316 howto->name,
9317 name);
9318
9319 bfd_set_error (bfd_error_bad_value);
9320 ret = FALSE;
9321 goto copy_reloc;
9322 }
9323
9324 if (sda == NULL || !is_static_defined (sda))
9325 {
9326 unresolved_reloc = TRUE;
9327 break;
9328 }
9329 value = relocation + addend - SYM_VAL (sda);
9330
9331 if (r_type == R_PPC_VLE_SDAREL_LO16A)
9332 ppc_elf_vle_split16 (input_bfd, input_section, rel->r_offset,
9333 contents + rel->r_offset, value,
9334 split16a_type,
9335 htab->params->vle_reloc_fixup);
9336 else if (r_type == R_PPC_VLE_SDAREL_LO16D)
9337 ppc_elf_vle_split16 (input_bfd, input_section, rel->r_offset,
9338 contents + rel->r_offset, value,
9339 split16d_type,
9340 htab->params->vle_reloc_fixup);
9341 else if (r_type == R_PPC_VLE_SDAREL_HI16A)
9342 {
9343 value = value >> 16;
9344 ppc_elf_vle_split16 (input_bfd, input_section, rel->r_offset,
9345 contents + rel->r_offset, value,
9346 split16a_type,
9347 htab->params->vle_reloc_fixup);
9348 }
9349 else if (r_type == R_PPC_VLE_SDAREL_HI16D)
9350 {
9351 value = value >> 16;
9352 ppc_elf_vle_split16 (input_bfd, input_section, rel->r_offset,
9353 contents + rel->r_offset, value,
9354 split16d_type,
9355 htab->params->vle_reloc_fixup);
9356 }
9357 else if (r_type == R_PPC_VLE_SDAREL_HA16A)
9358 {
9359 value = (value + 0x8000) >> 16;
9360 ppc_elf_vle_split16 (input_bfd, input_section, rel->r_offset,
9361 contents + rel->r_offset, value,
9362 split16a_type,
9363 htab->params->vle_reloc_fixup);
9364 }
9365 else if (r_type == R_PPC_VLE_SDAREL_HA16D)
9366 {
9367 value = (value + 0x8000) >> 16;
9368 ppc_elf_vle_split16 (input_bfd, input_section, rel->r_offset,
9369 contents + rel->r_offset, value,
9370 split16d_type,
9371 htab->params->vle_reloc_fixup);
9372 }
9373 }
9374 goto copy_reloc;
9375
9376 case R_PPC_VLE_ADDR20:
9377 ppc_elf_vle_split20 (output_bfd, contents + rel->r_offset, relocation);
9378 continue;
9379
9380 /* Relocate against the beginning of the section. */
9381 case R_PPC_SECTOFF:
9382 case R_PPC_SECTOFF_LO:
9383 case R_PPC_SECTOFF_HI:
9384 case R_PPC_SECTOFF_HA:
9385 if (sec == NULL || sec->output_section == NULL)
9386 {
9387 unresolved_reloc = TRUE;
9388 break;
9389 }
9390 addend -= sec->output_section->vma;
9391 break;
9392
9393 /* Negative relocations. */
9394 case R_PPC_EMB_NADDR32:
9395 case R_PPC_EMB_NADDR16:
9396 case R_PPC_EMB_NADDR16_LO:
9397 case R_PPC_EMB_NADDR16_HI:
9398 case R_PPC_EMB_NADDR16_HA:
9399 addend -= 2 * relocation;
9400 break;
9401
9402 case R_PPC_COPY:
9403 case R_PPC_GLOB_DAT:
9404 case R_PPC_JMP_SLOT:
9405 case R_PPC_RELATIVE:
9406 case R_PPC_IRELATIVE:
9407 case R_PPC_PLT32:
9408 case R_PPC_PLTREL32:
9409 case R_PPC_PLT16_LO:
9410 case R_PPC_PLT16_HI:
9411 case R_PPC_PLT16_HA:
9412 case R_PPC_ADDR30:
9413 case R_PPC_EMB_RELSEC16:
9414 case R_PPC_EMB_RELST_LO:
9415 case R_PPC_EMB_RELST_HI:
9416 case R_PPC_EMB_RELST_HA:
9417 case R_PPC_EMB_BIT_FLD:
9418 /* xgettext:c-format */
9419 _bfd_error_handler (_("%pB: %s unsupported"),
9420 input_bfd, howto->name);
9421
9422 bfd_set_error (bfd_error_invalid_operation);
9423 ret = FALSE;
9424 goto copy_reloc;
9425 }
9426
9427 /* Do any further special processing. */
9428 switch (r_type)
9429 {
9430 default:
9431 break;
9432
9433 case R_PPC_ADDR16_HA:
9434 case R_PPC_REL16_HA:
9435 case R_PPC_REL16DX_HA:
9436 case R_PPC_SECTOFF_HA:
9437 case R_PPC_TPREL16_HA:
9438 case R_PPC_DTPREL16_HA:
9439 case R_PPC_EMB_NADDR16_HA:
9440 case R_PPC_EMB_RELST_HA:
9441 /* It's just possible that this symbol is a weak symbol
9442 that's not actually defined anywhere. In that case,
9443 'sec' would be NULL, and we should leave the symbol
9444 alone (it will be set to zero elsewhere in the link). */
9445 if (sec == NULL)
9446 break;
9447 /* Fall through. */
9448
9449 case R_PPC_PLT16_HA:
9450 case R_PPC_GOT16_HA:
9451 case R_PPC_GOT_TLSGD16_HA:
9452 case R_PPC_GOT_TLSLD16_HA:
9453 case R_PPC_GOT_TPREL16_HA:
9454 case R_PPC_GOT_DTPREL16_HA:
9455 /* Add 0x10000 if sign bit in 0:15 is set.
9456 Bits 0:15 are not used. */
9457 addend += 0x8000;
9458 break;
9459
9460 case R_PPC_ADDR16:
9461 case R_PPC_ADDR16_LO:
9462 case R_PPC_GOT16:
9463 case R_PPC_GOT16_LO:
9464 case R_PPC_SDAREL16:
9465 case R_PPC_SECTOFF:
9466 case R_PPC_SECTOFF_LO:
9467 case R_PPC_DTPREL16:
9468 case R_PPC_DTPREL16_LO:
9469 case R_PPC_TPREL16:
9470 case R_PPC_TPREL16_LO:
9471 case R_PPC_GOT_TLSGD16:
9472 case R_PPC_GOT_TLSGD16_LO:
9473 case R_PPC_GOT_TLSLD16:
9474 case R_PPC_GOT_TLSLD16_LO:
9475 case R_PPC_GOT_DTPREL16:
9476 case R_PPC_GOT_DTPREL16_LO:
9477 case R_PPC_GOT_TPREL16:
9478 case R_PPC_GOT_TPREL16_LO:
9479 {
9480 /* The 32-bit ABI lacks proper relocations to deal with
9481 certain 64-bit instructions. Prevent damage to bits
9482 that make up part of the insn opcode. */
9483 unsigned int insn, mask, lobit;
9484
9485 insn = bfd_get_32 (input_bfd,
9486 contents + rel->r_offset - d_offset);
9487 mask = 0;
9488 if (is_insn_ds_form (insn))
9489 mask = 3;
9490 else if (is_insn_dq_form (insn))
9491 mask = 15;
9492 else
9493 break;
9494 relocation += addend;
9495 addend = insn & mask;
9496 lobit = mask & relocation;
9497 if (lobit != 0)
9498 {
9499 relocation ^= lobit;
9500 info->callbacks->einfo
9501 /* xgettext:c-format */
9502 (_("%H: error: %s against `%s' not a multiple of %u\n"),
9503 input_bfd, input_section, rel->r_offset,
9504 howto->name, sym_name, mask + 1);
9505 bfd_set_error (bfd_error_bad_value);
9506 ret = FALSE;
9507 }
9508 }
9509 break;
9510 }
9511
9512 #ifdef DEBUG
9513 fprintf (stderr, "\ttype = %s (%d), name = %s, symbol index = %ld, "
9514 "offset = %ld, addend = %ld\n",
9515 howto->name,
9516 (int) r_type,
9517 sym_name,
9518 r_symndx,
9519 (long) rel->r_offset,
9520 (long) addend);
9521 #endif
9522
9523 if (unresolved_reloc
9524 && !((input_section->flags & SEC_DEBUGGING) != 0
9525 && h->def_dynamic)
9526 && _bfd_elf_section_offset (output_bfd, info, input_section,
9527 rel->r_offset) != (bfd_vma) -1)
9528 {
9529 info->callbacks->einfo
9530 /* xgettext:c-format */
9531 (_("%H: unresolvable %s relocation against symbol `%s'\n"),
9532 input_bfd, input_section, rel->r_offset,
9533 howto->name,
9534 sym_name);
9535 ret = FALSE;
9536 }
9537
9538 /* 16-bit fields in insns mostly have signed values, but a
9539 few insns have 16-bit unsigned values. Really, we should
9540 have different reloc types. */
9541 if (howto->complain_on_overflow != complain_overflow_dont
9542 && howto->dst_mask == 0xffff
9543 && (input_section->flags & SEC_CODE) != 0)
9544 {
9545 enum complain_overflow complain = complain_overflow_signed;
9546
9547 if ((elf_section_flags (input_section) & SHF_PPC_VLE) == 0)
9548 {
9549 unsigned int insn;
9550
9551 insn = bfd_get_32 (input_bfd, contents + (rel->r_offset & ~3));
9552 if ((insn & (0x3f << 26)) == 10u << 26 /* cmpli */)
9553 complain = complain_overflow_bitfield;
9554 else if ((insn & (0x3f << 26)) == 28u << 26 /* andi */
9555 || (insn & (0x3f << 26)) == 24u << 26 /* ori */
9556 || (insn & (0x3f << 26)) == 26u << 26 /* xori */)
9557 complain = complain_overflow_unsigned;
9558 }
9559 if (howto->complain_on_overflow != complain)
9560 {
9561 alt_howto = *howto;
9562 alt_howto.complain_on_overflow = complain;
9563 howto = &alt_howto;
9564 }
9565 }
9566
9567 if (r_type == R_PPC_REL16DX_HA)
9568 {
9569 /* Split field reloc isn't handled by _bfd_final_link_relocate. */
9570 if (rel->r_offset + 4 > input_section->size)
9571 r = bfd_reloc_outofrange;
9572 else
9573 {
9574 unsigned int insn;
9575
9576 relocation += addend;
9577 relocation -= (rel->r_offset
9578 + input_section->output_offset
9579 + input_section->output_section->vma);
9580 relocation >>= 16;
9581 insn = bfd_get_32 (input_bfd, contents + rel->r_offset);
9582 insn &= ~0x1fffc1;
9583 insn |= (relocation & 0xffc1) | ((relocation & 0x3e) << 15);
9584 bfd_put_32 (input_bfd, insn, contents + rel->r_offset);
9585 r = bfd_reloc_ok;
9586 }
9587 }
9588 else
9589 r = _bfd_final_link_relocate (howto, input_bfd, input_section, contents,
9590 rel->r_offset, relocation, addend);
9591
9592 if (r != bfd_reloc_ok)
9593 {
9594 if (r == bfd_reloc_overflow)
9595 {
9596 overflow:
9597 /* On code like "if (foo) foo();" don't report overflow
9598 on a branch to zero when foo is undefined. */
9599 if (!warned
9600 && !(h != NULL
9601 && (h->root.type == bfd_link_hash_undefweak
9602 || h->root.type == bfd_link_hash_undefined)
9603 && is_branch_reloc (r_type)))
9604 info->callbacks->reloc_overflow
9605 (info, (h ? &h->root : NULL), sym_name, howto->name,
9606 rel->r_addend, input_bfd, input_section, rel->r_offset);
9607 }
9608 else
9609 {
9610 info->callbacks->einfo
9611 /* xgettext:c-format */
9612 (_("%H: %s reloc against `%s': error %d\n"),
9613 input_bfd, input_section, rel->r_offset,
9614 howto->name, sym_name, (int) r);
9615 ret = FALSE;
9616 }
9617 }
9618 copy_reloc:
9619 if (wrel != rel)
9620 *wrel = *rel;
9621 }
9622
9623 if (wrel != rel)
9624 {
9625 Elf_Internal_Shdr *rel_hdr;
9626 size_t deleted = rel - wrel;
9627
9628 rel_hdr = _bfd_elf_single_rel_hdr (input_section->output_section);
9629 rel_hdr->sh_size -= rel_hdr->sh_entsize * deleted;
9630 if (rel_hdr->sh_size == 0)
9631 {
9632 /* It is too late to remove an empty reloc section. Leave
9633 one NONE reloc.
9634 ??? What is wrong with an empty section??? */
9635 rel_hdr->sh_size = rel_hdr->sh_entsize;
9636 deleted -= 1;
9637 wrel++;
9638 }
9639 relend = wrel;
9640 rel_hdr = _bfd_elf_single_rel_hdr (input_section);
9641 rel_hdr->sh_size -= rel_hdr->sh_entsize * deleted;
9642 input_section->reloc_count -= deleted;
9643 }
9644
9645 #ifdef DEBUG
9646 fprintf (stderr, "\n");
9647 #endif
9648
9649 if (input_section->sec_info_type == SEC_INFO_TYPE_TARGET
9650 && input_section->size != input_section->rawsize
9651 && (strcmp (input_section->output_section->name, ".init") == 0
9652 || strcmp (input_section->output_section->name, ".fini") == 0))
9653 {
9654 /* Branch around the trampolines. */
9655 unsigned int insn = B + input_section->size - input_section->rawsize;
9656 bfd_put_32 (input_bfd, insn, contents + input_section->rawsize);
9657 }
9658
9659 if (htab->params->ppc476_workaround
9660 && input_section->sec_info_type == SEC_INFO_TYPE_TARGET
9661 && (!bfd_link_relocatable (info)
9662 || (input_section->output_section->alignment_power
9663 >= htab->params->pagesize_p2)))
9664 {
9665 bfd_vma start_addr, end_addr, addr;
9666 bfd_vma pagesize = (bfd_vma) 1 << htab->params->pagesize_p2;
9667
9668 if (relax_info->workaround_size != 0)
9669 {
9670 bfd_byte *p;
9671 unsigned int n;
9672 bfd_byte fill[4];
9673
9674 bfd_put_32 (input_bfd, BA, fill);
9675 p = contents + input_section->size - relax_info->workaround_size;
9676 n = relax_info->workaround_size >> 2;
9677 while (n--)
9678 {
9679 memcpy (p, fill, 4);
9680 p += 4;
9681 }
9682 }
9683
9684 /* The idea is: Replace the last instruction on a page with a
9685 branch to a patch area. Put the insn there followed by a
9686 branch back to the next page. Complicated a little by
9687 needing to handle moved conditional branches, and by not
9688 wanting to touch data-in-text. */
9689
9690 start_addr = (input_section->output_section->vma
9691 + input_section->output_offset);
9692 end_addr = (start_addr + input_section->size
9693 - relax_info->workaround_size);
9694 for (addr = ((start_addr & -pagesize) + pagesize - 4);
9695 addr < end_addr;
9696 addr += pagesize)
9697 {
9698 bfd_vma offset = addr - start_addr;
9699 Elf_Internal_Rela *lo, *hi;
9700 bfd_boolean is_data;
9701 bfd_vma patch_off, patch_addr;
9702 unsigned int insn;
9703
9704 /* Do we have a data reloc at this offset? If so, leave
9705 the word alone. */
9706 is_data = FALSE;
9707 lo = relocs;
9708 hi = relend;
9709 rel = NULL;
9710 while (lo < hi)
9711 {
9712 rel = lo + (hi - lo) / 2;
9713 if (rel->r_offset < offset)
9714 lo = rel + 1;
9715 else if (rel->r_offset > offset + 3)
9716 hi = rel;
9717 else
9718 {
9719 switch (ELF32_R_TYPE (rel->r_info))
9720 {
9721 case R_PPC_ADDR32:
9722 case R_PPC_UADDR32:
9723 case R_PPC_REL32:
9724 case R_PPC_ADDR30:
9725 is_data = TRUE;
9726 break;
9727 default:
9728 break;
9729 }
9730 break;
9731 }
9732 }
9733 if (is_data)
9734 continue;
9735
9736 /* Some instructions can be left alone too. Unconditional
9737 branches, except for bcctr with BO=0x14 (bctr, bctrl),
9738 avoid the icache failure.
9739
9740 The problem occurs due to prefetch across a page boundary
9741 where stale instructions can be fetched from the next
9742 page, and the mechanism for flushing these bad
9743 instructions fails under certain circumstances. The
9744 unconditional branches:
9745 1) Branch: b, bl, ba, bla,
9746 2) Branch Conditional: bc, bca, bcl, bcla,
9747 3) Branch Conditional to Link Register: bclr, bclrl,
9748 where (2) and (3) have BO=0x14 making them unconditional,
9749 prevent the bad prefetch because the prefetch itself is
9750 affected by these instructions. This happens even if the
9751 instruction is not executed.
9752
9753 A bctr example:
9754 .
9755 . lis 9,new_page@ha
9756 . addi 9,9,new_page@l
9757 . mtctr 9
9758 . bctr
9759 . nop
9760 . nop
9761 . new_page:
9762 .
9763 The bctr is not predicted taken due to ctr not being
9764 ready, so prefetch continues on past the bctr into the
9765 new page which might have stale instructions. If they
9766 fail to be flushed, then they will be executed after the
9767 bctr executes. Either of the following modifications
9768 prevent the bad prefetch from happening in the first
9769 place:
9770 .
9771 . lis 9,new_page@ha lis 9,new_page@ha
9772 . addi 9,9,new_page@l addi 9,9,new_page@l
9773 . mtctr 9 mtctr 9
9774 . bctr bctr
9775 . nop b somewhere_else
9776 . b somewhere_else nop
9777 . new_page: new_page:
9778 . */
9779 insn = bfd_get_32 (input_bfd, contents + offset);
9780 if ((insn & (0x3f << 26)) == (18u << 26) /* b,bl,ba,bla */
9781 || ((insn & (0x3f << 26)) == (16u << 26) /* bc,bcl,bca,bcla*/
9782 && (insn & (0x14 << 21)) == (0x14 << 21)) /* with BO=0x14 */
9783 || ((insn & (0x3f << 26)) == (19u << 26)
9784 && (insn & (0x3ff << 1)) == (16u << 1) /* bclr,bclrl */
9785 && (insn & (0x14 << 21)) == (0x14 << 21)))/* with BO=0x14 */
9786 continue;
9787
9788 patch_addr = (start_addr + input_section->size
9789 - relax_info->workaround_size);
9790 patch_addr = (patch_addr + 15) & -16;
9791 patch_off = patch_addr - start_addr;
9792 bfd_put_32 (input_bfd, B + patch_off - offset, contents + offset);
9793
9794 if (rel != NULL
9795 && rel->r_offset >= offset
9796 && rel->r_offset < offset + 4)
9797 {
9798 asection *sreloc;
9799
9800 /* If the insn we are patching had a reloc, adjust the
9801 reloc r_offset so that the reloc applies to the moved
9802 location. This matters for -r and --emit-relocs. */
9803 if (rel + 1 != relend)
9804 {
9805 Elf_Internal_Rela tmp = *rel;
9806
9807 /* Keep the relocs sorted by r_offset. */
9808 memmove (rel, rel + 1, (relend - (rel + 1)) * sizeof (*rel));
9809 relend[-1] = tmp;
9810 }
9811 relend[-1].r_offset += patch_off - offset;
9812
9813 /* Adjust REL16 addends too. */
9814 switch (ELF32_R_TYPE (relend[-1].r_info))
9815 {
9816 case R_PPC_REL16:
9817 case R_PPC_REL16_LO:
9818 case R_PPC_REL16_HI:
9819 case R_PPC_REL16_HA:
9820 relend[-1].r_addend += patch_off - offset;
9821 break;
9822 default:
9823 break;
9824 }
9825
9826 /* If we are building a PIE or shared library with
9827 non-PIC objects, perhaps we had a dynamic reloc too?
9828 If so, the dynamic reloc must move with the insn. */
9829 sreloc = elf_section_data (input_section)->sreloc;
9830 if (sreloc != NULL)
9831 {
9832 Elf32_External_Rela *slo, *shi, *srelend;
9833 bfd_vma soffset;
9834
9835 slo = (Elf32_External_Rela *) sreloc->contents;
9836 shi = srelend = slo + sreloc->reloc_count;
9837 soffset = (offset + input_section->output_section->vma
9838 + input_section->output_offset);
9839 while (slo < shi)
9840 {
9841 Elf32_External_Rela *srel = slo + (shi - slo) / 2;
9842 bfd_elf32_swap_reloca_in (output_bfd, (bfd_byte *) srel,
9843 &outrel);
9844 if (outrel.r_offset < soffset)
9845 slo = srel + 1;
9846 else if (outrel.r_offset > soffset + 3)
9847 shi = srel;
9848 else
9849 {
9850 if (srel + 1 != srelend)
9851 {
9852 memmove (srel, srel + 1,
9853 (srelend - (srel + 1)) * sizeof (*srel));
9854 srel = srelend - 1;
9855 }
9856 outrel.r_offset += patch_off - offset;
9857 bfd_elf32_swap_reloca_out (output_bfd, &outrel,
9858 (bfd_byte *) srel);
9859 break;
9860 }
9861 }
9862 }
9863 }
9864 else
9865 rel = NULL;
9866
9867 if ((insn & (0x3f << 26)) == (16u << 26) /* bc */
9868 && (insn & 2) == 0 /* relative */)
9869 {
9870 bfd_vma delta = ((insn & 0xfffc) ^ 0x8000) - 0x8000;
9871
9872 delta += offset - patch_off;
9873 if (bfd_link_relocatable (info) && rel != NULL)
9874 delta = 0;
9875 if (!bfd_link_relocatable (info) && rel != NULL)
9876 {
9877 enum elf_ppc_reloc_type r_type;
9878
9879 r_type = ELF32_R_TYPE (relend[-1].r_info);
9880 if (r_type == R_PPC_REL14_BRTAKEN)
9881 insn |= BRANCH_PREDICT_BIT;
9882 else if (r_type == R_PPC_REL14_BRNTAKEN)
9883 insn &= ~BRANCH_PREDICT_BIT;
9884 else
9885 BFD_ASSERT (r_type == R_PPC_REL14);
9886
9887 if ((r_type == R_PPC_REL14_BRTAKEN
9888 || r_type == R_PPC_REL14_BRNTAKEN)
9889 && delta + 0x8000 < 0x10000
9890 && (bfd_signed_vma) delta < 0)
9891 insn ^= BRANCH_PREDICT_BIT;
9892 }
9893 if (delta + 0x8000 < 0x10000)
9894 {
9895 bfd_put_32 (input_bfd,
9896 (insn & ~0xfffc) | (delta & 0xfffc),
9897 contents + patch_off);
9898 patch_off += 4;
9899 bfd_put_32 (input_bfd,
9900 B | ((offset + 4 - patch_off) & 0x3fffffc),
9901 contents + patch_off);
9902 patch_off += 4;
9903 }
9904 else
9905 {
9906 if (rel != NULL)
9907 {
9908 unsigned int r_sym = ELF32_R_SYM (relend[-1].r_info);
9909
9910 relend[-1].r_offset += 8;
9911 relend[-1].r_info = ELF32_R_INFO (r_sym, R_PPC_REL24);
9912 }
9913 bfd_put_32 (input_bfd,
9914 (insn & ~0xfffc) | 8,
9915 contents + patch_off);
9916 patch_off += 4;
9917 bfd_put_32 (input_bfd,
9918 B | ((offset + 4 - patch_off) & 0x3fffffc),
9919 contents + patch_off);
9920 patch_off += 4;
9921 bfd_put_32 (input_bfd,
9922 B | ((delta - 8) & 0x3fffffc),
9923 contents + patch_off);
9924 patch_off += 4;
9925 }
9926 }
9927 else
9928 {
9929 bfd_put_32 (input_bfd, insn, contents + patch_off);
9930 patch_off += 4;
9931 bfd_put_32 (input_bfd,
9932 B | ((offset + 4 - patch_off) & 0x3fffffc),
9933 contents + patch_off);
9934 patch_off += 4;
9935 }
9936 BFD_ASSERT (patch_off <= input_section->size);
9937 relax_info->workaround_size = input_section->size - patch_off;
9938 }
9939 }
9940
9941 return ret;
9942 }
9943 \f
9944 /* Finish up dynamic symbol handling. We set the contents of various
9945 dynamic sections here. */
9946
9947 static bfd_boolean
9948 ppc_elf_finish_dynamic_symbol (bfd *output_bfd,
9949 struct bfd_link_info *info,
9950 struct elf_link_hash_entry *h,
9951 Elf_Internal_Sym *sym)
9952 {
9953 struct ppc_elf_link_hash_table *htab;
9954 struct plt_entry *ent;
9955 bfd_boolean doneone;
9956
9957 #ifdef DEBUG
9958 fprintf (stderr, "ppc_elf_finish_dynamic_symbol called for %s",
9959 h->root.root.string);
9960 #endif
9961
9962 htab = ppc_elf_hash_table (info);
9963 BFD_ASSERT (htab->elf.dynobj != NULL);
9964
9965 doneone = FALSE;
9966 for (ent = h->plt.plist; ent != NULL; ent = ent->next)
9967 if (ent->plt.offset != (bfd_vma) -1)
9968 {
9969 if (!doneone)
9970 {
9971 Elf_Internal_Rela rela;
9972 bfd_byte *loc;
9973 bfd_vma reloc_index;
9974
9975 if (htab->plt_type == PLT_NEW
9976 || !htab->elf.dynamic_sections_created
9977 || h->dynindx == -1)
9978 reloc_index = ent->plt.offset / 4;
9979 else
9980 {
9981 reloc_index = ((ent->plt.offset - htab->plt_initial_entry_size)
9982 / htab->plt_slot_size);
9983 if (reloc_index > PLT_NUM_SINGLE_ENTRIES
9984 && htab->plt_type == PLT_OLD)
9985 reloc_index -= (reloc_index - PLT_NUM_SINGLE_ENTRIES) / 2;
9986 }
9987
9988 /* This symbol has an entry in the procedure linkage table.
9989 Set it up. */
9990 if (htab->plt_type == PLT_VXWORKS
9991 && htab->elf.dynamic_sections_created
9992 && h->dynindx != -1)
9993 {
9994 bfd_vma got_offset;
9995 const bfd_vma *plt_entry;
9996
9997 /* The first three entries in .got.plt are reserved. */
9998 got_offset = (reloc_index + 3) * 4;
9999
10000 /* Use the right PLT. */
10001 plt_entry = bfd_link_pic (info) ? ppc_elf_vxworks_pic_plt_entry
10002 : ppc_elf_vxworks_plt_entry;
10003
10004 /* Fill in the .plt on VxWorks. */
10005 if (bfd_link_pic (info))
10006 {
10007 bfd_put_32 (output_bfd,
10008 plt_entry[0] | PPC_HA (got_offset),
10009 htab->elf.splt->contents + ent->plt.offset + 0);
10010 bfd_put_32 (output_bfd,
10011 plt_entry[1] | PPC_LO (got_offset),
10012 htab->elf.splt->contents + ent->plt.offset + 4);
10013 }
10014 else
10015 {
10016 bfd_vma got_loc = got_offset + SYM_VAL (htab->elf.hgot);
10017
10018 bfd_put_32 (output_bfd,
10019 plt_entry[0] | PPC_HA (got_loc),
10020 htab->elf.splt->contents + ent->plt.offset + 0);
10021 bfd_put_32 (output_bfd,
10022 plt_entry[1] | PPC_LO (got_loc),
10023 htab->elf.splt->contents + ent->plt.offset + 4);
10024 }
10025
10026 bfd_put_32 (output_bfd, plt_entry[2],
10027 htab->elf.splt->contents + ent->plt.offset + 8);
10028 bfd_put_32 (output_bfd, plt_entry[3],
10029 htab->elf.splt->contents + ent->plt.offset + 12);
10030
10031 /* This instruction is an immediate load. The value loaded is
10032 the byte offset of the R_PPC_JMP_SLOT relocation from the
10033 start of the .rela.plt section. The value is stored in the
10034 low-order 16 bits of the load instruction. */
10035 /* NOTE: It appears that this is now an index rather than a
10036 prescaled offset. */
10037 bfd_put_32 (output_bfd,
10038 plt_entry[4] | reloc_index,
10039 htab->elf.splt->contents + ent->plt.offset + 16);
10040 /* This instruction is a PC-relative branch whose target is
10041 the start of the PLT section. The address of this branch
10042 instruction is 20 bytes beyond the start of this PLT entry.
10043 The address is encoded in bits 6-29, inclusive. The value
10044 stored is right-shifted by two bits, permitting a 26-bit
10045 offset. */
10046 bfd_put_32 (output_bfd,
10047 (plt_entry[5]
10048 | (-(ent->plt.offset + 20) & 0x03fffffc)),
10049 htab->elf.splt->contents + ent->plt.offset + 20);
10050 bfd_put_32 (output_bfd, plt_entry[6],
10051 htab->elf.splt->contents + ent->plt.offset + 24);
10052 bfd_put_32 (output_bfd, plt_entry[7],
10053 htab->elf.splt->contents + ent->plt.offset + 28);
10054
10055 /* Fill in the GOT entry corresponding to this PLT slot with
10056 the address immediately after the "bctr" instruction
10057 in this PLT entry. */
10058 bfd_put_32 (output_bfd, (htab->elf.splt->output_section->vma
10059 + htab->elf.splt->output_offset
10060 + ent->plt.offset + 16),
10061 htab->elf.sgotplt->contents + got_offset);
10062
10063 if (!bfd_link_pic (info))
10064 {
10065 /* Fill in a couple of entries in .rela.plt.unloaded. */
10066 loc = htab->srelplt2->contents
10067 + ((VXWORKS_PLTRESOLVE_RELOCS + reloc_index
10068 * VXWORKS_PLT_NON_JMP_SLOT_RELOCS)
10069 * sizeof (Elf32_External_Rela));
10070
10071 /* Provide the @ha relocation for the first instruction. */
10072 rela.r_offset = (htab->elf.splt->output_section->vma
10073 + htab->elf.splt->output_offset
10074 + ent->plt.offset + 2);
10075 rela.r_info = ELF32_R_INFO (htab->elf.hgot->indx,
10076 R_PPC_ADDR16_HA);
10077 rela.r_addend = got_offset;
10078 bfd_elf32_swap_reloca_out (output_bfd, &rela, loc);
10079 loc += sizeof (Elf32_External_Rela);
10080
10081 /* Provide the @l relocation for the second instruction. */
10082 rela.r_offset = (htab->elf.splt->output_section->vma
10083 + htab->elf.splt->output_offset
10084 + ent->plt.offset + 6);
10085 rela.r_info = ELF32_R_INFO (htab->elf.hgot->indx,
10086 R_PPC_ADDR16_LO);
10087 rela.r_addend = got_offset;
10088 bfd_elf32_swap_reloca_out (output_bfd, &rela, loc);
10089 loc += sizeof (Elf32_External_Rela);
10090
10091 /* Provide a relocation for the GOT entry corresponding to this
10092 PLT slot. Point it at the middle of the .plt entry. */
10093 rela.r_offset = (htab->elf.sgotplt->output_section->vma
10094 + htab->elf.sgotplt->output_offset
10095 + got_offset);
10096 rela.r_info = ELF32_R_INFO (htab->elf.hplt->indx,
10097 R_PPC_ADDR32);
10098 rela.r_addend = ent->plt.offset + 16;
10099 bfd_elf32_swap_reloca_out (output_bfd, &rela, loc);
10100 }
10101
10102 /* VxWorks uses non-standard semantics for R_PPC_JMP_SLOT.
10103 In particular, the offset for the relocation is not the
10104 address of the PLT entry for this function, as specified
10105 by the ABI. Instead, the offset is set to the address of
10106 the GOT slot for this function. See EABI 4.4.4.1. */
10107 rela.r_offset = (htab->elf.sgotplt->output_section->vma
10108 + htab->elf.sgotplt->output_offset
10109 + got_offset);
10110
10111 }
10112 else
10113 {
10114 asection *splt = htab->elf.splt;
10115 if (!htab->elf.dynamic_sections_created
10116 || h->dynindx == -1)
10117 splt = htab->elf.iplt;
10118
10119 rela.r_offset = (splt->output_section->vma
10120 + splt->output_offset
10121 + ent->plt.offset);
10122 if (htab->plt_type == PLT_OLD
10123 || !htab->elf.dynamic_sections_created
10124 || h->dynindx == -1)
10125 {
10126 /* We don't need to fill in the .plt. The ppc dynamic
10127 linker will fill it in. */
10128 }
10129 else
10130 {
10131 bfd_vma val = (htab->glink_pltresolve + ent->plt.offset
10132 + htab->glink->output_section->vma
10133 + htab->glink->output_offset);
10134 bfd_put_32 (output_bfd, val,
10135 splt->contents + ent->plt.offset);
10136 }
10137 }
10138
10139 /* Fill in the entry in the .rela.plt section. */
10140 rela.r_addend = 0;
10141 if (!htab->elf.dynamic_sections_created
10142 || h->dynindx == -1)
10143 {
10144 BFD_ASSERT (h->type == STT_GNU_IFUNC
10145 && h->def_regular
10146 && (h->root.type == bfd_link_hash_defined
10147 || h->root.type == bfd_link_hash_defweak));
10148 rela.r_info = ELF32_R_INFO (0, R_PPC_IRELATIVE);
10149 rela.r_addend = SYM_VAL (h);
10150 }
10151 else
10152 rela.r_info = ELF32_R_INFO (h->dynindx, R_PPC_JMP_SLOT);
10153
10154 if (!htab->elf.dynamic_sections_created
10155 || h->dynindx == -1)
10156 {
10157 loc = (htab->elf.irelplt->contents
10158 + (htab->elf.irelplt->reloc_count++
10159 * sizeof (Elf32_External_Rela)));
10160 htab->local_ifunc_resolver = 1;
10161 }
10162 else
10163 {
10164 loc = (htab->elf.srelplt->contents
10165 + reloc_index * sizeof (Elf32_External_Rela));
10166 if (h->type == STT_GNU_IFUNC && is_static_defined (h))
10167 htab->maybe_local_ifunc_resolver = 1;
10168 }
10169 bfd_elf32_swap_reloca_out (output_bfd, &rela, loc);
10170
10171 if (!h->def_regular)
10172 {
10173 /* Mark the symbol as undefined, rather than as
10174 defined in the .plt section. Leave the value if
10175 there were any relocations where pointer equality
10176 matters (this is a clue for the dynamic linker, to
10177 make function pointer comparisons work between an
10178 application and shared library), otherwise set it
10179 to zero. */
10180 sym->st_shndx = SHN_UNDEF;
10181 if (!h->pointer_equality_needed)
10182 sym->st_value = 0;
10183 else if (!h->ref_regular_nonweak)
10184 {
10185 /* This breaks function pointer comparisons, but
10186 that is better than breaking tests for a NULL
10187 function pointer. */
10188 sym->st_value = 0;
10189 }
10190 }
10191 else if (h->type == STT_GNU_IFUNC
10192 && !bfd_link_pic (info))
10193 {
10194 /* Set the value of ifunc symbols in a non-pie
10195 executable to the glink entry. This is to avoid
10196 text relocations. We can't do this for ifunc in
10197 allocate_dynrelocs, as we do for normal dynamic
10198 function symbols with plt entries, because we need
10199 to keep the original value around for the ifunc
10200 relocation. */
10201 sym->st_shndx = (_bfd_elf_section_from_bfd_section
10202 (output_bfd, htab->glink->output_section));
10203 sym->st_value = (ent->glink_offset
10204 + htab->glink->output_offset
10205 + htab->glink->output_section->vma);
10206 }
10207 doneone = TRUE;
10208 }
10209
10210 if (htab->plt_type == PLT_NEW
10211 || !htab->elf.dynamic_sections_created
10212 || h->dynindx == -1)
10213 {
10214 unsigned char *p;
10215 asection *splt = htab->elf.splt;
10216
10217 if (!htab->elf.dynamic_sections_created
10218 || h->dynindx == -1)
10219 splt = htab->elf.iplt;
10220
10221 p = (unsigned char *) htab->glink->contents + ent->glink_offset;
10222 write_glink_stub (h, ent, splt, p, info);
10223
10224 if (!bfd_link_pic (info))
10225 /* We only need one non-PIC glink stub. */
10226 break;
10227 }
10228 else
10229 break;
10230 }
10231
10232 if (h->needs_copy)
10233 {
10234 asection *s;
10235 Elf_Internal_Rela rela;
10236 bfd_byte *loc;
10237
10238 /* This symbols needs a copy reloc. Set it up. */
10239
10240 #ifdef DEBUG
10241 fprintf (stderr, ", copy");
10242 #endif
10243
10244 BFD_ASSERT (h->dynindx != -1);
10245
10246 if (ppc_elf_hash_entry (h)->has_sda_refs)
10247 s = htab->relsbss;
10248 else if (h->root.u.def.section == htab->elf.sdynrelro)
10249 s = htab->elf.sreldynrelro;
10250 else
10251 s = htab->elf.srelbss;
10252 BFD_ASSERT (s != NULL);
10253
10254 rela.r_offset = SYM_VAL (h);
10255 rela.r_info = ELF32_R_INFO (h->dynindx, R_PPC_COPY);
10256 rela.r_addend = 0;
10257 loc = s->contents + s->reloc_count++ * sizeof (Elf32_External_Rela);
10258 bfd_elf32_swap_reloca_out (output_bfd, &rela, loc);
10259 }
10260
10261 #ifdef DEBUG
10262 fprintf (stderr, "\n");
10263 #endif
10264
10265 return TRUE;
10266 }
10267 \f
10268 static enum elf_reloc_type_class
10269 ppc_elf_reloc_type_class (const struct bfd_link_info *info,
10270 const asection *rel_sec,
10271 const Elf_Internal_Rela *rela)
10272 {
10273 struct ppc_elf_link_hash_table *htab = ppc_elf_hash_table (info);
10274
10275 if (rel_sec == htab->elf.irelplt)
10276 return reloc_class_ifunc;
10277
10278 switch (ELF32_R_TYPE (rela->r_info))
10279 {
10280 case R_PPC_RELATIVE:
10281 return reloc_class_relative;
10282 case R_PPC_JMP_SLOT:
10283 return reloc_class_plt;
10284 case R_PPC_COPY:
10285 return reloc_class_copy;
10286 default:
10287 return reloc_class_normal;
10288 }
10289 }
10290 \f
10291 /* Finish up the dynamic sections. */
10292
10293 static bfd_boolean
10294 ppc_elf_finish_dynamic_sections (bfd *output_bfd,
10295 struct bfd_link_info *info)
10296 {
10297 asection *sdyn;
10298 struct ppc_elf_link_hash_table *htab;
10299 bfd_vma got;
10300 bfd *dynobj;
10301 bfd_boolean ret = TRUE;
10302
10303 #ifdef DEBUG
10304 fprintf (stderr, "ppc_elf_finish_dynamic_sections called\n");
10305 #endif
10306
10307 htab = ppc_elf_hash_table (info);
10308 dynobj = htab->elf.dynobj;
10309 sdyn = bfd_get_linker_section (dynobj, ".dynamic");
10310
10311 got = 0;
10312 if (htab->elf.hgot != NULL)
10313 got = SYM_VAL (htab->elf.hgot);
10314
10315 if (htab->elf.dynamic_sections_created)
10316 {
10317 Elf32_External_Dyn *dyncon, *dynconend;
10318
10319 BFD_ASSERT (htab->elf.splt != NULL && sdyn != NULL);
10320
10321 dyncon = (Elf32_External_Dyn *) sdyn->contents;
10322 dynconend = (Elf32_External_Dyn *) (sdyn->contents + sdyn->size);
10323 for (; dyncon < dynconend; dyncon++)
10324 {
10325 Elf_Internal_Dyn dyn;
10326 asection *s;
10327
10328 bfd_elf32_swap_dyn_in (dynobj, dyncon, &dyn);
10329
10330 switch (dyn.d_tag)
10331 {
10332 case DT_PLTGOT:
10333 if (htab->is_vxworks)
10334 s = htab->elf.sgotplt;
10335 else
10336 s = htab->elf.splt;
10337 dyn.d_un.d_ptr = s->output_section->vma + s->output_offset;
10338 break;
10339
10340 case DT_PLTRELSZ:
10341 dyn.d_un.d_val = htab->elf.srelplt->size;
10342 break;
10343
10344 case DT_JMPREL:
10345 s = htab->elf.srelplt;
10346 dyn.d_un.d_ptr = s->output_section->vma + s->output_offset;
10347 break;
10348
10349 case DT_PPC_GOT:
10350 dyn.d_un.d_ptr = got;
10351 break;
10352
10353 case DT_TEXTREL:
10354 if (htab->local_ifunc_resolver)
10355 info->callbacks->einfo
10356 (_("%X%P: text relocations and GNU indirect "
10357 "functions will result in a segfault at runtime\n"));
10358 else if (htab->maybe_local_ifunc_resolver)
10359 info->callbacks->einfo
10360 (_("%P: warning: text relocations and GNU indirect "
10361 "functions may result in a segfault at runtime\n"));
10362 continue;
10363
10364 default:
10365 if (htab->is_vxworks
10366 && elf_vxworks_finish_dynamic_entry (output_bfd, &dyn))
10367 break;
10368 continue;
10369 }
10370
10371 bfd_elf32_swap_dyn_out (output_bfd, &dyn, dyncon);
10372 }
10373 }
10374
10375 if (htab->elf.sgot != NULL
10376 && htab->elf.sgot->output_section != bfd_abs_section_ptr)
10377 {
10378 if (htab->elf.hgot->root.u.def.section == htab->elf.sgot
10379 || htab->elf.hgot->root.u.def.section == htab->elf.sgotplt)
10380 {
10381 unsigned char *p = htab->elf.hgot->root.u.def.section->contents;
10382
10383 p += htab->elf.hgot->root.u.def.value;
10384 if (htab->plt_type == PLT_OLD)
10385 {
10386 /* Add a blrl instruction at _GLOBAL_OFFSET_TABLE_-4
10387 so that a function can easily find the address of
10388 _GLOBAL_OFFSET_TABLE_. */
10389 BFD_ASSERT (htab->elf.hgot->root.u.def.value - 4
10390 < htab->elf.hgot->root.u.def.section->size);
10391 bfd_put_32 (output_bfd, 0x4e800021, p - 4);
10392 }
10393
10394 if (sdyn != NULL)
10395 {
10396 bfd_vma val = sdyn->output_section->vma + sdyn->output_offset;
10397 BFD_ASSERT (htab->elf.hgot->root.u.def.value
10398 < htab->elf.hgot->root.u.def.section->size);
10399 bfd_put_32 (output_bfd, val, p);
10400 }
10401 }
10402 else
10403 {
10404 /* xgettext:c-format */
10405 _bfd_error_handler (_("%s not defined in linker created %pA"),
10406 htab->elf.hgot->root.root.string,
10407 (htab->elf.sgotplt != NULL
10408 ? htab->elf.sgotplt : htab->elf.sgot));
10409 bfd_set_error (bfd_error_bad_value);
10410 ret = FALSE;
10411 }
10412
10413 elf_section_data (htab->elf.sgot->output_section)->this_hdr.sh_entsize = 4;
10414 }
10415
10416 /* Fill in the first entry in the VxWorks procedure linkage table. */
10417 if (htab->is_vxworks
10418 && htab->elf.splt != NULL
10419 && htab->elf.splt->size != 0
10420 && htab->elf.splt->output_section != bfd_abs_section_ptr)
10421 {
10422 asection *splt = htab->elf.splt;
10423 /* Use the right PLT. */
10424 const bfd_vma *plt_entry = (bfd_link_pic (info)
10425 ? ppc_elf_vxworks_pic_plt0_entry
10426 : ppc_elf_vxworks_plt0_entry);
10427
10428 if (!bfd_link_pic (info))
10429 {
10430 bfd_vma got_value = SYM_VAL (htab->elf.hgot);
10431
10432 bfd_put_32 (output_bfd, plt_entry[0] | PPC_HA (got_value),
10433 splt->contents + 0);
10434 bfd_put_32 (output_bfd, plt_entry[1] | PPC_LO (got_value),
10435 splt->contents + 4);
10436 }
10437 else
10438 {
10439 bfd_put_32 (output_bfd, plt_entry[0], splt->contents + 0);
10440 bfd_put_32 (output_bfd, plt_entry[1], splt->contents + 4);
10441 }
10442 bfd_put_32 (output_bfd, plt_entry[2], splt->contents + 8);
10443 bfd_put_32 (output_bfd, plt_entry[3], splt->contents + 12);
10444 bfd_put_32 (output_bfd, plt_entry[4], splt->contents + 16);
10445 bfd_put_32 (output_bfd, plt_entry[5], splt->contents + 20);
10446 bfd_put_32 (output_bfd, plt_entry[6], splt->contents + 24);
10447 bfd_put_32 (output_bfd, plt_entry[7], splt->contents + 28);
10448
10449 if (! bfd_link_pic (info))
10450 {
10451 Elf_Internal_Rela rela;
10452 bfd_byte *loc;
10453
10454 loc = htab->srelplt2->contents;
10455
10456 /* Output the @ha relocation for the first instruction. */
10457 rela.r_offset = (htab->elf.splt->output_section->vma
10458 + htab->elf.splt->output_offset
10459 + 2);
10460 rela.r_info = ELF32_R_INFO (htab->elf.hgot->indx, R_PPC_ADDR16_HA);
10461 rela.r_addend = 0;
10462 bfd_elf32_swap_reloca_out (output_bfd, &rela, loc);
10463 loc += sizeof (Elf32_External_Rela);
10464
10465 /* Output the @l relocation for the second instruction. */
10466 rela.r_offset = (htab->elf.splt->output_section->vma
10467 + htab->elf.splt->output_offset
10468 + 6);
10469 rela.r_info = ELF32_R_INFO (htab->elf.hgot->indx, R_PPC_ADDR16_LO);
10470 rela.r_addend = 0;
10471 bfd_elf32_swap_reloca_out (output_bfd, &rela, loc);
10472 loc += sizeof (Elf32_External_Rela);
10473
10474 /* Fix up the remaining relocations. They may have the wrong
10475 symbol index for _G_O_T_ or _P_L_T_ depending on the order
10476 in which symbols were output. */
10477 while (loc < htab->srelplt2->contents + htab->srelplt2->size)
10478 {
10479 Elf_Internal_Rela rel;
10480
10481 bfd_elf32_swap_reloc_in (output_bfd, loc, &rel);
10482 rel.r_info = ELF32_R_INFO (htab->elf.hgot->indx, R_PPC_ADDR16_HA);
10483 bfd_elf32_swap_reloc_out (output_bfd, &rel, loc);
10484 loc += sizeof (Elf32_External_Rela);
10485
10486 bfd_elf32_swap_reloc_in (output_bfd, loc, &rel);
10487 rel.r_info = ELF32_R_INFO (htab->elf.hgot->indx, R_PPC_ADDR16_LO);
10488 bfd_elf32_swap_reloc_out (output_bfd, &rel, loc);
10489 loc += sizeof (Elf32_External_Rela);
10490
10491 bfd_elf32_swap_reloc_in (output_bfd, loc, &rel);
10492 rel.r_info = ELF32_R_INFO (htab->elf.hplt->indx, R_PPC_ADDR32);
10493 bfd_elf32_swap_reloc_out (output_bfd, &rel, loc);
10494 loc += sizeof (Elf32_External_Rela);
10495 }
10496 }
10497 }
10498
10499 if (htab->glink != NULL
10500 && htab->glink->contents != NULL
10501 && htab->elf.dynamic_sections_created)
10502 {
10503 unsigned char *p;
10504 unsigned char *endp;
10505 bfd_vma res0;
10506
10507 /*
10508 * PIC glink code is the following:
10509 *
10510 * # ith PLT code stub.
10511 * addis 11,30,(plt+(i-1)*4-got)@ha
10512 * lwz 11,(plt+(i-1)*4-got)@l(11)
10513 * mtctr 11
10514 * bctr
10515 *
10516 * # A table of branches, one for each plt entry.
10517 * # The idea is that the plt call stub loads ctr and r11 with these
10518 * # addresses, so (r11 - res_0) gives the plt index * 4.
10519 * res_0: b PLTresolve
10520 * res_1: b PLTresolve
10521 * .
10522 * # Some number of entries towards the end can be nops
10523 * res_n_m3: nop
10524 * res_n_m2: nop
10525 * res_n_m1:
10526 *
10527 * PLTresolve:
10528 * addis 11,11,(1f-res_0)@ha
10529 * mflr 0
10530 * bcl 20,31,1f
10531 * 1: addi 11,11,(1b-res_0)@l
10532 * mflr 12
10533 * mtlr 0
10534 * sub 11,11,12 # r11 = index * 4
10535 * addis 12,12,(got+4-1b)@ha
10536 * lwz 0,(got+4-1b)@l(12) # got[1] address of dl_runtime_resolve
10537 * lwz 12,(got+8-1b)@l(12) # got[2] contains the map address
10538 * mtctr 0
10539 * add 0,11,11
10540 * add 11,0,11 # r11 = index * 12 = reloc offset.
10541 * bctr
10542 *
10543 * Non-PIC glink code is a little simpler.
10544 *
10545 * # ith PLT code stub.
10546 * lis 11,(plt+(i-1)*4)@ha
10547 * lwz 11,(plt+(i-1)*4)@l(11)
10548 * mtctr 11
10549 * bctr
10550 *
10551 * The branch table is the same, then comes
10552 *
10553 * PLTresolve:
10554 * lis 12,(got+4)@ha
10555 * addis 11,11,(-res_0)@ha
10556 * lwz 0,(got+4)@l(12) # got[1] address of dl_runtime_resolve
10557 * addi 11,11,(-res_0)@l # r11 = index * 4
10558 * mtctr 0
10559 * add 0,11,11
10560 * lwz 12,(got+8)@l(12) # got[2] contains the map address
10561 * add 11,0,11 # r11 = index * 12 = reloc offset.
10562 * bctr
10563 */
10564
10565 /* Build the branch table, one for each plt entry (less one),
10566 and perhaps some padding. */
10567 p = htab->glink->contents;
10568 p += htab->glink_pltresolve;
10569 endp = htab->glink->contents;
10570 endp += htab->glink->size - GLINK_PLTRESOLVE;
10571 while (p < endp - (htab->params->ppc476_workaround ? 0 : 8 * 4))
10572 {
10573 bfd_put_32 (output_bfd, B + endp - p, p);
10574 p += 4;
10575 }
10576 while (p < endp)
10577 {
10578 bfd_put_32 (output_bfd, NOP, p);
10579 p += 4;
10580 }
10581
10582 res0 = (htab->glink_pltresolve
10583 + htab->glink->output_section->vma
10584 + htab->glink->output_offset);
10585
10586 if (htab->params->ppc476_workaround)
10587 {
10588 /* Ensure that a call stub at the end of a page doesn't
10589 result in prefetch over the end of the page into the
10590 glink branch table. */
10591 bfd_vma pagesize = (bfd_vma) 1 << htab->params->pagesize_p2;
10592 bfd_vma page_addr;
10593 bfd_vma glink_start = (htab->glink->output_section->vma
10594 + htab->glink->output_offset);
10595
10596 for (page_addr = res0 & -pagesize;
10597 page_addr > glink_start;
10598 page_addr -= pagesize)
10599 {
10600 /* We have a plt call stub that may need fixing. */
10601 bfd_byte *loc;
10602 unsigned int insn;
10603
10604 loc = htab->glink->contents + page_addr - 4 - glink_start;
10605 insn = bfd_get_32 (output_bfd, loc);
10606 if (insn == BCTR)
10607 {
10608 /* By alignment, we know that there must be at least
10609 one other call stub before this one. */
10610 insn = bfd_get_32 (output_bfd, loc - 16);
10611 if (insn == BCTR)
10612 bfd_put_32 (output_bfd, B | (-16 & 0x3fffffc), loc);
10613 else
10614 bfd_put_32 (output_bfd, B | (-20 & 0x3fffffc), loc);
10615 }
10616 }
10617 }
10618
10619 /* Last comes the PLTresolve stub. */
10620 endp = p + GLINK_PLTRESOLVE;
10621 if (bfd_link_pic (info))
10622 {
10623 bfd_vma bcl;
10624
10625 bcl = (htab->glink->size - GLINK_PLTRESOLVE + 3*4
10626 + htab->glink->output_section->vma
10627 + htab->glink->output_offset);
10628
10629 bfd_put_32 (output_bfd, ADDIS_11_11 + PPC_HA (bcl - res0), p);
10630 p += 4;
10631 bfd_put_32 (output_bfd, MFLR_0, p);
10632 p += 4;
10633 bfd_put_32 (output_bfd, BCL_20_31, p);
10634 p += 4;
10635 bfd_put_32 (output_bfd, ADDI_11_11 + PPC_LO (bcl - res0), p);
10636 p += 4;
10637 bfd_put_32 (output_bfd, MFLR_12, p);
10638 p += 4;
10639 bfd_put_32 (output_bfd, MTLR_0, p);
10640 p += 4;
10641 bfd_put_32 (output_bfd, SUB_11_11_12, p);
10642 p += 4;
10643 bfd_put_32 (output_bfd, ADDIS_12_12 + PPC_HA (got + 4 - bcl), p);
10644 p += 4;
10645 if (PPC_HA (got + 4 - bcl) == PPC_HA (got + 8 - bcl))
10646 {
10647 bfd_put_32 (output_bfd, LWZ_0_12 + PPC_LO (got + 4 - bcl), p);
10648 p += 4;
10649 bfd_put_32 (output_bfd, LWZ_12_12 + PPC_LO (got + 8 - bcl), p);
10650 p += 4;
10651 }
10652 else
10653 {
10654 bfd_put_32 (output_bfd, LWZU_0_12 + PPC_LO (got + 4 - bcl), p);
10655 p += 4;
10656 bfd_put_32 (output_bfd, LWZ_12_12 + 4, p);
10657 p += 4;
10658 }
10659 bfd_put_32 (output_bfd, MTCTR_0, p);
10660 p += 4;
10661 bfd_put_32 (output_bfd, ADD_0_11_11, p);
10662 }
10663 else
10664 {
10665 bfd_put_32 (output_bfd, LIS_12 + PPC_HA (got + 4), p);
10666 p += 4;
10667 bfd_put_32 (output_bfd, ADDIS_11_11 + PPC_HA (-res0), p);
10668 p += 4;
10669 if (PPC_HA (got + 4) == PPC_HA (got + 8))
10670 bfd_put_32 (output_bfd, LWZ_0_12 + PPC_LO (got + 4), p);
10671 else
10672 bfd_put_32 (output_bfd, LWZU_0_12 + PPC_LO (got + 4), p);
10673 p += 4;
10674 bfd_put_32 (output_bfd, ADDI_11_11 + PPC_LO (-res0), p);
10675 p += 4;
10676 bfd_put_32 (output_bfd, MTCTR_0, p);
10677 p += 4;
10678 bfd_put_32 (output_bfd, ADD_0_11_11, p);
10679 p += 4;
10680 if (PPC_HA (got + 4) == PPC_HA (got + 8))
10681 bfd_put_32 (output_bfd, LWZ_12_12 + PPC_LO (got + 8), p);
10682 else
10683 bfd_put_32 (output_bfd, LWZ_12_12 + 4, p);
10684 }
10685 p += 4;
10686 bfd_put_32 (output_bfd, ADD_11_0_11, p);
10687 p += 4;
10688 bfd_put_32 (output_bfd, BCTR, p);
10689 p += 4;
10690 while (p < endp)
10691 {
10692 bfd_put_32 (output_bfd,
10693 htab->params->ppc476_workaround ? BA : NOP, p);
10694 p += 4;
10695 }
10696 BFD_ASSERT (p == endp);
10697 }
10698
10699 if (htab->glink_eh_frame != NULL
10700 && htab->glink_eh_frame->contents != NULL)
10701 {
10702 unsigned char *p = htab->glink_eh_frame->contents;
10703 bfd_vma val;
10704
10705 p += sizeof (glink_eh_frame_cie);
10706 /* FDE length. */
10707 p += 4;
10708 /* CIE pointer. */
10709 p += 4;
10710 /* Offset to .glink. */
10711 val = (htab->glink->output_section->vma
10712 + htab->glink->output_offset);
10713 val -= (htab->glink_eh_frame->output_section->vma
10714 + htab->glink_eh_frame->output_offset);
10715 val -= p - htab->glink_eh_frame->contents;
10716 bfd_put_32 (htab->elf.dynobj, val, p);
10717
10718 if (htab->glink_eh_frame->sec_info_type == SEC_INFO_TYPE_EH_FRAME
10719 && !_bfd_elf_write_section_eh_frame (output_bfd, info,
10720 htab->glink_eh_frame,
10721 htab->glink_eh_frame->contents))
10722 return FALSE;
10723 }
10724
10725 return ret;
10726 }
10727 \f
10728 #define TARGET_LITTLE_SYM powerpc_elf32_le_vec
10729 #define TARGET_LITTLE_NAME "elf32-powerpcle"
10730 #define TARGET_BIG_SYM powerpc_elf32_vec
10731 #define TARGET_BIG_NAME "elf32-powerpc"
10732 #define ELF_ARCH bfd_arch_powerpc
10733 #define ELF_TARGET_ID PPC32_ELF_DATA
10734 #define ELF_MACHINE_CODE EM_PPC
10735 #ifdef __QNXTARGET__
10736 #define ELF_MAXPAGESIZE 0x1000
10737 #define ELF_COMMONPAGESIZE 0x1000
10738 #else
10739 #define ELF_MAXPAGESIZE 0x10000
10740 #define ELF_COMMONPAGESIZE 0x10000
10741 #endif
10742 #define ELF_MINPAGESIZE 0x1000
10743 #define elf_info_to_howto ppc_elf_info_to_howto
10744
10745 #ifdef EM_CYGNUS_POWERPC
10746 #define ELF_MACHINE_ALT1 EM_CYGNUS_POWERPC
10747 #endif
10748
10749 #ifdef EM_PPC_OLD
10750 #define ELF_MACHINE_ALT2 EM_PPC_OLD
10751 #endif
10752
10753 #define elf_backend_plt_not_loaded 1
10754 #define elf_backend_want_dynrelro 1
10755 #define elf_backend_can_gc_sections 1
10756 #define elf_backend_can_refcount 1
10757 #define elf_backend_rela_normal 1
10758 #define elf_backend_caches_rawsize 1
10759
10760 #define bfd_elf32_mkobject ppc_elf_mkobject
10761 #define bfd_elf32_bfd_merge_private_bfd_data ppc_elf_merge_private_bfd_data
10762 #define bfd_elf32_bfd_relax_section ppc_elf_relax_section
10763 #define bfd_elf32_bfd_reloc_type_lookup ppc_elf_reloc_type_lookup
10764 #define bfd_elf32_bfd_reloc_name_lookup ppc_elf_reloc_name_lookup
10765 #define bfd_elf32_bfd_set_private_flags ppc_elf_set_private_flags
10766 #define bfd_elf32_bfd_link_hash_table_create ppc_elf_link_hash_table_create
10767 #define bfd_elf32_get_synthetic_symtab ppc_elf_get_synthetic_symtab
10768
10769 #define elf_backend_object_p ppc_elf_object_p
10770 #define elf_backend_gc_mark_hook ppc_elf_gc_mark_hook
10771 #define elf_backend_section_from_shdr ppc_elf_section_from_shdr
10772 #define elf_backend_relocate_section ppc_elf_relocate_section
10773 #define elf_backend_create_dynamic_sections ppc_elf_create_dynamic_sections
10774 #define elf_backend_check_relocs ppc_elf_check_relocs
10775 #define elf_backend_relocs_compatible _bfd_elf_relocs_compatible
10776 #define elf_backend_copy_indirect_symbol ppc_elf_copy_indirect_symbol
10777 #define elf_backend_adjust_dynamic_symbol ppc_elf_adjust_dynamic_symbol
10778 #define elf_backend_add_symbol_hook ppc_elf_add_symbol_hook
10779 #define elf_backend_size_dynamic_sections ppc_elf_size_dynamic_sections
10780 #define elf_backend_hash_symbol ppc_elf_hash_symbol
10781 #define elf_backend_finish_dynamic_symbol ppc_elf_finish_dynamic_symbol
10782 #define elf_backend_finish_dynamic_sections ppc_elf_finish_dynamic_sections
10783 #define elf_backend_fake_sections ppc_elf_fake_sections
10784 #define elf_backend_additional_program_headers ppc_elf_additional_program_headers
10785 #define elf_backend_modify_segment_map ppc_elf_modify_segment_map
10786 #define elf_backend_grok_prstatus ppc_elf_grok_prstatus
10787 #define elf_backend_grok_psinfo ppc_elf_grok_psinfo
10788 #define elf_backend_write_core_note ppc_elf_write_core_note
10789 #define elf_backend_reloc_type_class ppc_elf_reloc_type_class
10790 #define elf_backend_begin_write_processing ppc_elf_begin_write_processing
10791 #define elf_backend_final_write_processing ppc_elf_final_write_processing
10792 #define elf_backend_write_section ppc_elf_write_section
10793 #define elf_backend_get_sec_type_attr ppc_elf_get_sec_type_attr
10794 #define elf_backend_plt_sym_val ppc_elf_plt_sym_val
10795 #define elf_backend_action_discarded ppc_elf_action_discarded
10796 #define elf_backend_init_index_section _bfd_elf_init_1_index_section
10797 #define elf_backend_lookup_section_flags_hook ppc_elf_lookup_section_flags
10798
10799 #include "elf32-target.h"
10800
10801 /* FreeBSD Target */
10802
10803 #undef TARGET_LITTLE_SYM
10804 #undef TARGET_LITTLE_NAME
10805
10806 #undef TARGET_BIG_SYM
10807 #define TARGET_BIG_SYM powerpc_elf32_fbsd_vec
10808 #undef TARGET_BIG_NAME
10809 #define TARGET_BIG_NAME "elf32-powerpc-freebsd"
10810
10811 #undef ELF_OSABI
10812 #define ELF_OSABI ELFOSABI_FREEBSD
10813
10814 #undef elf32_bed
10815 #define elf32_bed elf32_powerpc_fbsd_bed
10816
10817 #include "elf32-target.h"
10818
10819 /* VxWorks Target */
10820
10821 #undef TARGET_LITTLE_SYM
10822 #undef TARGET_LITTLE_NAME
10823
10824 #undef TARGET_BIG_SYM
10825 #define TARGET_BIG_SYM powerpc_elf32_vxworks_vec
10826 #undef TARGET_BIG_NAME
10827 #define TARGET_BIG_NAME "elf32-powerpc-vxworks"
10828
10829 #undef ELF_OSABI
10830
10831 /* VxWorks uses the elf default section flags for .plt. */
10832 static const struct bfd_elf_special_section *
10833 ppc_elf_vxworks_get_sec_type_attr (bfd *abfd, asection *sec)
10834 {
10835 if (sec->name == NULL)
10836 return NULL;
10837
10838 if (strcmp (sec->name, ".plt") == 0)
10839 return _bfd_elf_get_sec_type_attr (abfd, sec);
10840
10841 return ppc_elf_get_sec_type_attr (abfd, sec);
10842 }
10843
10844 /* Like ppc_elf_link_hash_table_create, but overrides
10845 appropriately for VxWorks. */
10846 static struct bfd_link_hash_table *
10847 ppc_elf_vxworks_link_hash_table_create (bfd *abfd)
10848 {
10849 struct bfd_link_hash_table *ret;
10850
10851 ret = ppc_elf_link_hash_table_create (abfd);
10852 if (ret)
10853 {
10854 struct ppc_elf_link_hash_table *htab
10855 = (struct ppc_elf_link_hash_table *)ret;
10856 htab->is_vxworks = 1;
10857 htab->plt_type = PLT_VXWORKS;
10858 htab->plt_entry_size = VXWORKS_PLT_ENTRY_SIZE;
10859 htab->plt_slot_size = VXWORKS_PLT_ENTRY_SIZE;
10860 htab->plt_initial_entry_size = VXWORKS_PLT_INITIAL_ENTRY_SIZE;
10861 }
10862 return ret;
10863 }
10864
10865 /* Tweak magic VxWorks symbols as they are loaded. */
10866 static bfd_boolean
10867 ppc_elf_vxworks_add_symbol_hook (bfd *abfd,
10868 struct bfd_link_info *info,
10869 Elf_Internal_Sym *sym,
10870 const char **namep,
10871 flagword *flagsp,
10872 asection **secp,
10873 bfd_vma *valp)
10874 {
10875 if (!elf_vxworks_add_symbol_hook (abfd, info, sym, namep, flagsp, secp,
10876 valp))
10877 return FALSE;
10878
10879 return ppc_elf_add_symbol_hook (abfd, info, sym, namep, flagsp, secp, valp);
10880 }
10881
10882 static void
10883 ppc_elf_vxworks_final_write_processing (bfd *abfd, bfd_boolean linker)
10884 {
10885 ppc_elf_final_write_processing (abfd, linker);
10886 elf_vxworks_final_write_processing (abfd, linker);
10887 }
10888
10889 /* On VxWorks, we emit relocations against _PROCEDURE_LINKAGE_TABLE_, so
10890 define it. */
10891 #undef elf_backend_want_plt_sym
10892 #define elf_backend_want_plt_sym 1
10893 #undef elf_backend_want_got_plt
10894 #define elf_backend_want_got_plt 1
10895 #undef elf_backend_got_symbol_offset
10896 #define elf_backend_got_symbol_offset 0
10897 #undef elf_backend_plt_not_loaded
10898 #define elf_backend_plt_not_loaded 0
10899 #undef elf_backend_plt_readonly
10900 #define elf_backend_plt_readonly 1
10901 #undef elf_backend_got_header_size
10902 #define elf_backend_got_header_size 12
10903 #undef elf_backend_dtrel_excludes_plt
10904 #define elf_backend_dtrel_excludes_plt 1
10905
10906 #undef bfd_elf32_get_synthetic_symtab
10907
10908 #undef bfd_elf32_bfd_link_hash_table_create
10909 #define bfd_elf32_bfd_link_hash_table_create \
10910 ppc_elf_vxworks_link_hash_table_create
10911 #undef elf_backend_add_symbol_hook
10912 #define elf_backend_add_symbol_hook \
10913 ppc_elf_vxworks_add_symbol_hook
10914 #undef elf_backend_link_output_symbol_hook
10915 #define elf_backend_link_output_symbol_hook \
10916 elf_vxworks_link_output_symbol_hook
10917 #undef elf_backend_final_write_processing
10918 #define elf_backend_final_write_processing \
10919 ppc_elf_vxworks_final_write_processing
10920 #undef elf_backend_get_sec_type_attr
10921 #define elf_backend_get_sec_type_attr \
10922 ppc_elf_vxworks_get_sec_type_attr
10923 #undef elf_backend_emit_relocs
10924 #define elf_backend_emit_relocs \
10925 elf_vxworks_emit_relocs
10926
10927 #undef elf32_bed
10928 #define elf32_bed ppc_elf_vxworks_bed
10929 #undef elf_backend_post_process_headers
10930
10931 #include "elf32-target.h"
This page took 0.25061 seconds and 5 git commands to generate.