Automatic date update in version.in
[deliverable/binutils-gdb.git] / bfd / elf32-ppc.c
CommitLineData
252b5132 1/* PowerPC-specific support for 32-bit ELF
219d1afa 2 Copyright (C) 1994-2018 Free Software Foundation, Inc.
252b5132
RH
3 Written by Ian Lance Taylor, Cygnus Support.
4
ae9a127f 5 This file is part of BFD, the Binary File Descriptor library.
252b5132 6
ae9a127f
NC
7 This program is free software; you can redistribute it and/or modify
8 it under the terms of the GNU General Public License as published by
cd123cb7 9 the Free Software Foundation; either version 3 of the License, or
ae9a127f 10 (at your option) any later version.
252b5132 11
ae9a127f
NC
12 This program is distributed in the hope that it will be useful,
13 but WITHOUT ANY WARRANTY; without even the implied warranty of
14 MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
15 GNU General Public License for more details.
252b5132 16
ae9a127f 17 You should have received a copy of the GNU General Public License
fc0bffd6 18 along with this program; if not, write to the
3e110533 19 Free Software Foundation, Inc., 51 Franklin Street - Fifth Floor,
53e09e0a 20 Boston, MA 02110-1301, USA. */
252b5132 21
cd123cb7 22
252b5132
RH
23/* This file is based on a preliminary PowerPC ELF ABI. The
24 information may not match the final PowerPC ELF ABI. It includes
25 suggestions from the in-progress Embedded PowerPC ABI, and that
26 information may also not match. */
27
3db64b00 28#include "sysdep.h"
183e98be 29#include <stdarg.h>
252b5132 30#include "bfd.h"
252b5132
RH
31#include "bfdlink.h"
32#include "libbfd.h"
33#include "elf-bfd.h"
34#include "elf/ppc.h"
7619e7c7 35#include "elf32-ppc.h"
9d8504b1 36#include "elf-vxworks.h"
6177242a 37#include "dwarf2.h"
08dc996f 38#include "opcode/ppc.h"
252b5132 39
b9c361e0
JL
40typedef enum split16_format_type
41{
42 split16a_type = 0,
43 split16d_type
44}
45split16_format_type;
46
f0fe0e16 47/* RELA relocations are used here. */
252b5132 48
252b5132 49static bfd_reloc_status_type ppc_elf_addr16_ha_reloc
55fd94b0 50 (bfd *, arelent *, asymbol *, void *, asection *, bfd *, char **);
7619e7c7 51static bfd_reloc_status_type ppc_elf_unhandled_reloc
55fd94b0 52 (bfd *, arelent *, asymbol *, void *, asection *, bfd *, char **);
252b5132 53
70bccea4
AM
54/* Branch prediction bit for branch taken relocs. */
55#define BRANCH_PREDICT_BIT 0x200000
56/* Mask to set RA in memory instructions. */
57#define RA_REGISTER_MASK 0x001f0000
58/* Value to shift register by to insert RA. */
59#define RA_REGISTER_SHIFT 16
252b5132
RH
60
61/* The name of the dynamic interpreter. This is put in the .interp
62 section. */
252b5132
RH
63#define ELF_DYNAMIC_INTERPRETER "/usr/lib/ld.so.1"
64
d7128ce4 65/* For old-style PLT. */
252b5132
RH
66/* The number of single-slot PLT entries (the rest use two slots). */
67#define PLT_NUM_SINGLE_ENTRIES 8192
68
d7128ce4 69/* For new-style .glink and .plt. */
a6aa5195 70#define GLINK_PLTRESOLVE 16*4
9e390558 71#define GLINK_ENTRY_SIZE(htab, h) \
407aa07c 72 ((4*4 \
9e390558
AM
73 + (h != NULL \
74 && h == htab->tls_get_addr \
75 && !htab->params->no_tls_get_addr_opt ? 8*4 : 0) \
76 + (1u << htab->params->plt_stub_align) - 1) \
77 & -(1u << htab->params->plt_stub_align))
d7128ce4 78
9d8504b1
PB
79/* VxWorks uses its own plt layout, filled in by the static linker. */
80
81/* The standard VxWorks PLT entry. */
82#define VXWORKS_PLT_ENTRY_SIZE 32
83static const bfd_vma ppc_elf_vxworks_plt_entry
84 [VXWORKS_PLT_ENTRY_SIZE / 4] =
85 {
07d6d2b8
AM
86 0x3d800000, /* lis r12,0 */
87 0x818c0000, /* lwz r12,0(r12) */
88 0x7d8903a6, /* mtctr r12 */
89 0x4e800420, /* bctr */
90 0x39600000, /* li r11,0 */
91 0x48000000, /* b 14 <.PLT0resolve+0x4> */
92 0x60000000, /* nop */
93 0x60000000, /* nop */
9d8504b1
PB
94 };
95static const bfd_vma ppc_elf_vxworks_pic_plt_entry
96 [VXWORKS_PLT_ENTRY_SIZE / 4] =
97 {
98 0x3d9e0000, /* addis r12,r30,0 */
99 0x818c0000, /* lwz r12,0(r12) */
100 0x7d8903a6, /* mtctr r12 */
101 0x4e800420, /* bctr */
102 0x39600000, /* li r11,0 */
103 0x48000000, /* b 14 <.PLT0resolve+0x4> 14: R_PPC_REL24 .PLTresolve */
104 0x60000000, /* nop */
105 0x60000000, /* nop */
106 };
107
108/* The initial VxWorks PLT entry. */
109#define VXWORKS_PLT_INITIAL_ENTRY_SIZE 32
110static const bfd_vma ppc_elf_vxworks_plt0_entry
111 [VXWORKS_PLT_INITIAL_ENTRY_SIZE / 4] =
112 {
07d6d2b8
AM
113 0x3d800000, /* lis r12,0 */
114 0x398c0000, /* addi r12,r12,0 */
115 0x800c0008, /* lwz r0,8(r12) */
116 0x7c0903a6, /* mtctr r0 */
117 0x818c0004, /* lwz r12,4(r12) */
118 0x4e800420, /* bctr */
119 0x60000000, /* nop */
120 0x60000000, /* nop */
9d8504b1
PB
121 };
122static const bfd_vma ppc_elf_vxworks_pic_plt0_entry
123 [VXWORKS_PLT_INITIAL_ENTRY_SIZE / 4] =
124 {
125 0x819e0008, /* lwz r12,8(r30) */
07d6d2b8 126 0x7d8903a6, /* mtctr r12 */
9d8504b1 127 0x819e0004, /* lwz r12,4(r30) */
07d6d2b8
AM
128 0x4e800420, /* bctr */
129 0x60000000, /* nop */
130 0x60000000, /* nop */
131 0x60000000, /* nop */
132 0x60000000, /* nop */
9d8504b1
PB
133 };
134
135/* For executables, we have some additional relocations in
136 .rela.plt.unloaded, for the kernel loader. */
137
138/* The number of non-JMP_SLOT relocations per PLT0 slot. */
139#define VXWORKS_PLT_NON_JMP_SLOT_RELOCS 3
140/* The number of relocations in the PLTResolve slot. */
141#define VXWORKS_PLTRESOLVE_RELOCS 2
de194d85 142/* The number of relocations in the PLTResolve slot when creating
9d8504b1
PB
143 a shared library. */
144#define VXWORKS_PLTRESOLVE_RELOCS_SHLIB 0
145
d7128ce4 146/* Some instructions. */
d7128ce4 147#define ADDIS_11_11 0x3d6b0000
a6aa5195
AM
148#define ADDIS_11_30 0x3d7e0000
149#define ADDIS_12_12 0x3d8c0000
d7128ce4 150#define ADDI_11_11 0x396b0000
d7128ce4 151#define ADD_0_11_11 0x7c0b5a14
a7f2871e 152#define ADD_3_12_2 0x7c6c1214
d7128ce4 153#define ADD_11_0_11 0x7d605a14
a6aa5195 154#define B 0x48000000
da3a2088 155#define BA 0x48000002
a6aa5195 156#define BCL_20_31 0x429f0005
d7128ce4 157#define BCTR 0x4e800420
a7f2871e
AM
158#define BEQLR 0x4d820020
159#define CMPWI_11_0 0x2c0b0000
7e8aeb9a
AM
160#define LIS_11 0x3d600000
161#define LIS_12 0x3d800000
a6aa5195
AM
162#define LWZU_0_12 0x840c0000
163#define LWZ_0_12 0x800c0000
a7f2871e 164#define LWZ_11_3 0x81630000
a6aa5195
AM
165#define LWZ_11_11 0x816b0000
166#define LWZ_11_30 0x817e0000
a7f2871e 167#define LWZ_12_3 0x81830000
a6aa5195 168#define LWZ_12_12 0x818c0000
a7f2871e
AM
169#define MR_0_3 0x7c601b78
170#define MR_3_0 0x7c030378
a6aa5195
AM
171#define MFLR_0 0x7c0802a6
172#define MFLR_12 0x7d8802a6
173#define MTCTR_0 0x7c0903a6
174#define MTCTR_11 0x7d6903a6
175#define MTLR_0 0x7c0803a6
176#define NOP 0x60000000
177#define SUB_11_11_12 0x7d6c5850
7619e7c7
AM
178
179/* Offset of tp and dtp pointers from start of TLS block. */
180#define TP_OFFSET 0x7000
181#define DTP_OFFSET 0x8000
e87d4038
AM
182
183/* The value of a defined global symbol. */
184#define SYM_VAL(SYM) \
185 ((SYM)->root.u.def.section->output_section->vma \
186 + (SYM)->root.u.def.section->output_offset \
187 + (SYM)->root.u.def.value)
7fce784e 188\f
e47cd125 189static reloc_howto_type *ppc_elf_howto_table[R_PPC_max];
252b5132 190
8da6118f 191static reloc_howto_type ppc_elf_howto_raw[] = {
252b5132
RH
192 /* This reloc does nothing. */
193 HOWTO (R_PPC_NONE, /* type */
194 0, /* rightshift */
6346d5ca
AM
195 3, /* size (0 = byte, 1 = short, 2 = long) */
196 0, /* bitsize */
b34976b6 197 FALSE, /* pc_relative */
252b5132 198 0, /* bitpos */
86c95733 199 complain_overflow_dont, /* complain_on_overflow */
252b5132
RH
200 bfd_elf_generic_reloc, /* special_function */
201 "R_PPC_NONE", /* name */
b34976b6 202 FALSE, /* partial_inplace */
252b5132
RH
203 0, /* src_mask */
204 0, /* dst_mask */
b34976b6 205 FALSE), /* pcrel_offset */
252b5132
RH
206
207 /* A standard 32 bit relocation. */
208 HOWTO (R_PPC_ADDR32, /* type */
209 0, /* rightshift */
210 2, /* size (0 = byte, 1 = short, 2 = long) */
211 32, /* bitsize */
b34976b6 212 FALSE, /* pc_relative */
252b5132 213 0, /* bitpos */
86c95733 214 complain_overflow_dont, /* complain_on_overflow */
252b5132
RH
215 bfd_elf_generic_reloc, /* special_function */
216 "R_PPC_ADDR32", /* name */
b34976b6 217 FALSE, /* partial_inplace */
252b5132
RH
218 0, /* src_mask */
219 0xffffffff, /* dst_mask */
b34976b6 220 FALSE), /* pcrel_offset */
252b5132
RH
221
222 /* An absolute 26 bit branch; the lower two bits must be zero.
223 FIXME: we don't check that, we just clear them. */
224 HOWTO (R_PPC_ADDR24, /* type */
225 0, /* rightshift */
226 2, /* size (0 = byte, 1 = short, 2 = long) */
227 26, /* bitsize */
b34976b6 228 FALSE, /* pc_relative */
252b5132 229 0, /* bitpos */
86c95733 230 complain_overflow_signed, /* complain_on_overflow */
252b5132
RH
231 bfd_elf_generic_reloc, /* special_function */
232 "R_PPC_ADDR24", /* name */
b34976b6 233 FALSE, /* partial_inplace */
252b5132
RH
234 0, /* src_mask */
235 0x3fffffc, /* dst_mask */
b34976b6 236 FALSE), /* pcrel_offset */
252b5132
RH
237
238 /* A standard 16 bit relocation. */
239 HOWTO (R_PPC_ADDR16, /* type */
240 0, /* rightshift */
241 1, /* size (0 = byte, 1 = short, 2 = long) */
242 16, /* bitsize */
b34976b6 243 FALSE, /* pc_relative */
252b5132
RH
244 0, /* bitpos */
245 complain_overflow_bitfield, /* complain_on_overflow */
246 bfd_elf_generic_reloc, /* special_function */
247 "R_PPC_ADDR16", /* name */
b34976b6 248 FALSE, /* partial_inplace */
252b5132
RH
249 0, /* src_mask */
250 0xffff, /* dst_mask */
b34976b6 251 FALSE), /* pcrel_offset */
252b5132
RH
252
253 /* A 16 bit relocation without overflow. */
254 HOWTO (R_PPC_ADDR16_LO, /* type */
255 0, /* rightshift */
256 1, /* size (0 = byte, 1 = short, 2 = long) */
257 16, /* bitsize */
b34976b6 258 FALSE, /* pc_relative */
252b5132
RH
259 0, /* bitpos */
260 complain_overflow_dont,/* complain_on_overflow */
261 bfd_elf_generic_reloc, /* special_function */
262 "R_PPC_ADDR16_LO", /* name */
b34976b6 263 FALSE, /* partial_inplace */
252b5132
RH
264 0, /* src_mask */
265 0xffff, /* dst_mask */
b34976b6 266 FALSE), /* pcrel_offset */
252b5132
RH
267
268 /* The high order 16 bits of an address. */
269 HOWTO (R_PPC_ADDR16_HI, /* type */
270 16, /* rightshift */
271 1, /* size (0 = byte, 1 = short, 2 = long) */
272 16, /* bitsize */
b34976b6 273 FALSE, /* pc_relative */
252b5132
RH
274 0, /* bitpos */
275 complain_overflow_dont, /* complain_on_overflow */
276 bfd_elf_generic_reloc, /* special_function */
277 "R_PPC_ADDR16_HI", /* name */
b34976b6 278 FALSE, /* partial_inplace */
252b5132
RH
279 0, /* src_mask */
280 0xffff, /* dst_mask */
b34976b6 281 FALSE), /* pcrel_offset */
252b5132
RH
282
283 /* The high order 16 bits of an address, plus 1 if the contents of
8da6118f 284 the low 16 bits, treated as a signed number, is negative. */
252b5132
RH
285 HOWTO (R_PPC_ADDR16_HA, /* type */
286 16, /* rightshift */
287 1, /* size (0 = byte, 1 = short, 2 = long) */
288 16, /* bitsize */
b34976b6 289 FALSE, /* pc_relative */
252b5132
RH
290 0, /* bitpos */
291 complain_overflow_dont, /* complain_on_overflow */
292 ppc_elf_addr16_ha_reloc, /* special_function */
293 "R_PPC_ADDR16_HA", /* name */
b34976b6 294 FALSE, /* partial_inplace */
252b5132
RH
295 0, /* src_mask */
296 0xffff, /* dst_mask */
b34976b6 297 FALSE), /* pcrel_offset */
252b5132
RH
298
299 /* An absolute 16 bit branch; the lower two bits must be zero.
300 FIXME: we don't check that, we just clear them. */
301 HOWTO (R_PPC_ADDR14, /* type */
302 0, /* rightshift */
303 2, /* size (0 = byte, 1 = short, 2 = long) */
304 16, /* bitsize */
b34976b6 305 FALSE, /* pc_relative */
252b5132 306 0, /* bitpos */
86c95733 307 complain_overflow_signed, /* complain_on_overflow */
252b5132
RH
308 bfd_elf_generic_reloc, /* special_function */
309 "R_PPC_ADDR14", /* name */
b34976b6 310 FALSE, /* partial_inplace */
252b5132
RH
311 0, /* src_mask */
312 0xfffc, /* dst_mask */
b34976b6 313 FALSE), /* pcrel_offset */
252b5132
RH
314
315 /* An absolute 16 bit branch, for which bit 10 should be set to
316 indicate that the branch is expected to be taken. The lower two
8da6118f 317 bits must be zero. */
252b5132
RH
318 HOWTO (R_PPC_ADDR14_BRTAKEN, /* type */
319 0, /* rightshift */
320 2, /* size (0 = byte, 1 = short, 2 = long) */
321 16, /* bitsize */
b34976b6 322 FALSE, /* pc_relative */
252b5132 323 0, /* bitpos */
86c95733 324 complain_overflow_signed, /* complain_on_overflow */
252b5132
RH
325 bfd_elf_generic_reloc, /* special_function */
326 "R_PPC_ADDR14_BRTAKEN",/* name */
b34976b6 327 FALSE, /* partial_inplace */
252b5132
RH
328 0, /* src_mask */
329 0xfffc, /* dst_mask */
b34976b6 330 FALSE), /* pcrel_offset */
252b5132
RH
331
332 /* An absolute 16 bit branch, for which bit 10 should be set to
333 indicate that the branch is not expected to be taken. The lower
334 two bits must be zero. */
335 HOWTO (R_PPC_ADDR14_BRNTAKEN, /* type */
336 0, /* rightshift */
337 2, /* size (0 = byte, 1 = short, 2 = long) */
338 16, /* bitsize */
b34976b6 339 FALSE, /* pc_relative */
252b5132 340 0, /* bitpos */
86c95733 341 complain_overflow_signed, /* complain_on_overflow */
252b5132
RH
342 bfd_elf_generic_reloc, /* special_function */
343 "R_PPC_ADDR14_BRNTAKEN",/* name */
b34976b6 344 FALSE, /* partial_inplace */
252b5132
RH
345 0, /* src_mask */
346 0xfffc, /* dst_mask */
b34976b6 347 FALSE), /* pcrel_offset */
252b5132 348
8da6118f 349 /* A relative 26 bit branch; the lower two bits must be zero. */
252b5132
RH
350 HOWTO (R_PPC_REL24, /* type */
351 0, /* rightshift */
352 2, /* size (0 = byte, 1 = short, 2 = long) */
353 26, /* bitsize */
b34976b6 354 TRUE, /* pc_relative */
252b5132
RH
355 0, /* bitpos */
356 complain_overflow_signed, /* complain_on_overflow */
357 bfd_elf_generic_reloc, /* special_function */
358 "R_PPC_REL24", /* name */
b34976b6 359 FALSE, /* partial_inplace */
252b5132
RH
360 0, /* src_mask */
361 0x3fffffc, /* dst_mask */
b34976b6 362 TRUE), /* pcrel_offset */
252b5132 363
8da6118f 364 /* A relative 16 bit branch; the lower two bits must be zero. */
252b5132
RH
365 HOWTO (R_PPC_REL14, /* type */
366 0, /* rightshift */
367 2, /* size (0 = byte, 1 = short, 2 = long) */
368 16, /* bitsize */
b34976b6 369 TRUE, /* pc_relative */
252b5132
RH
370 0, /* bitpos */
371 complain_overflow_signed, /* complain_on_overflow */
372 bfd_elf_generic_reloc, /* special_function */
373 "R_PPC_REL14", /* name */
b34976b6 374 FALSE, /* partial_inplace */
252b5132
RH
375 0, /* src_mask */
376 0xfffc, /* dst_mask */
b34976b6 377 TRUE), /* pcrel_offset */
252b5132 378
8da6118f 379 /* A relative 16 bit branch. Bit 10 should be set to indicate that
252b5132
RH
380 the branch is expected to be taken. The lower two bits must be
381 zero. */
382 HOWTO (R_PPC_REL14_BRTAKEN, /* type */
383 0, /* rightshift */
384 2, /* size (0 = byte, 1 = short, 2 = long) */
385 16, /* bitsize */
b34976b6 386 TRUE, /* pc_relative */
252b5132
RH
387 0, /* bitpos */
388 complain_overflow_signed, /* complain_on_overflow */
389 bfd_elf_generic_reloc, /* special_function */
390 "R_PPC_REL14_BRTAKEN", /* name */
b34976b6 391 FALSE, /* partial_inplace */
252b5132
RH
392 0, /* src_mask */
393 0xfffc, /* dst_mask */
b34976b6 394 TRUE), /* pcrel_offset */
252b5132 395
8da6118f 396 /* A relative 16 bit branch. Bit 10 should be set to indicate that
252b5132
RH
397 the branch is not expected to be taken. The lower two bits must
398 be zero. */
399 HOWTO (R_PPC_REL14_BRNTAKEN, /* type */
400 0, /* rightshift */
401 2, /* size (0 = byte, 1 = short, 2 = long) */
402 16, /* bitsize */
b34976b6 403 TRUE, /* pc_relative */
252b5132
RH
404 0, /* bitpos */
405 complain_overflow_signed, /* complain_on_overflow */
406 bfd_elf_generic_reloc, /* special_function */
407 "R_PPC_REL14_BRNTAKEN",/* name */
b34976b6 408 FALSE, /* partial_inplace */
252b5132
RH
409 0, /* src_mask */
410 0xfffc, /* dst_mask */
b34976b6 411 TRUE), /* pcrel_offset */
252b5132
RH
412
413 /* Like R_PPC_ADDR16, but referring to the GOT table entry for the
414 symbol. */
415 HOWTO (R_PPC_GOT16, /* type */
416 0, /* rightshift */
417 1, /* size (0 = byte, 1 = short, 2 = long) */
418 16, /* bitsize */
b34976b6 419 FALSE, /* pc_relative */
252b5132
RH
420 0, /* bitpos */
421 complain_overflow_signed, /* complain_on_overflow */
3ce51288 422 ppc_elf_unhandled_reloc, /* special_function */
252b5132 423 "R_PPC_GOT16", /* name */
b34976b6 424 FALSE, /* partial_inplace */
252b5132
RH
425 0, /* src_mask */
426 0xffff, /* dst_mask */
b34976b6 427 FALSE), /* pcrel_offset */
252b5132
RH
428
429 /* Like R_PPC_ADDR16_LO, but referring to the GOT table entry for
430 the symbol. */
431 HOWTO (R_PPC_GOT16_LO, /* type */
432 0, /* rightshift */
433 1, /* size (0 = byte, 1 = short, 2 = long) */
434 16, /* bitsize */
b34976b6 435 FALSE, /* pc_relative */
252b5132
RH
436 0, /* bitpos */
437 complain_overflow_dont, /* complain_on_overflow */
3ce51288 438 ppc_elf_unhandled_reloc, /* special_function */
252b5132 439 "R_PPC_GOT16_LO", /* name */
b34976b6 440 FALSE, /* partial_inplace */
252b5132
RH
441 0, /* src_mask */
442 0xffff, /* dst_mask */
b34976b6 443 FALSE), /* pcrel_offset */
252b5132
RH
444
445 /* Like R_PPC_ADDR16_HI, but referring to the GOT table entry for
446 the symbol. */
447 HOWTO (R_PPC_GOT16_HI, /* type */
448 16, /* rightshift */
449 1, /* size (0 = byte, 1 = short, 2 = long) */
450 16, /* bitsize */
b34976b6 451 FALSE, /* pc_relative */
252b5132 452 0, /* bitpos */
86c95733 453 complain_overflow_dont, /* complain_on_overflow */
3ce51288 454 ppc_elf_unhandled_reloc, /* special_function */
252b5132 455 "R_PPC_GOT16_HI", /* name */
b34976b6 456 FALSE, /* partial_inplace */
252b5132
RH
457 0, /* src_mask */
458 0xffff, /* dst_mask */
b34976b6 459 FALSE), /* pcrel_offset */
252b5132
RH
460
461 /* Like R_PPC_ADDR16_HA, but referring to the GOT table entry for
462 the symbol. */
463 HOWTO (R_PPC_GOT16_HA, /* type */
464 16, /* rightshift */
465 1, /* size (0 = byte, 1 = short, 2 = long) */
466 16, /* bitsize */
b34976b6 467 FALSE, /* pc_relative */
252b5132 468 0, /* bitpos */
86c95733 469 complain_overflow_dont, /* complain_on_overflow */
3ce51288 470 ppc_elf_unhandled_reloc, /* special_function */
252b5132 471 "R_PPC_GOT16_HA", /* name */
b34976b6 472 FALSE, /* partial_inplace */
252b5132
RH
473 0, /* src_mask */
474 0xffff, /* dst_mask */
b34976b6 475 FALSE), /* pcrel_offset */
252b5132
RH
476
477 /* Like R_PPC_REL24, but referring to the procedure linkage table
478 entry for the symbol. */
479 HOWTO (R_PPC_PLTREL24, /* type */
480 0, /* rightshift */
481 2, /* size (0 = byte, 1 = short, 2 = long) */
482 26, /* bitsize */
b34976b6 483 TRUE, /* pc_relative */
252b5132 484 0, /* bitpos */
3ce51288
AM
485 complain_overflow_signed, /* complain_on_overflow */
486 ppc_elf_unhandled_reloc, /* special_function */
252b5132 487 "R_PPC_PLTREL24", /* name */
b34976b6 488 FALSE, /* partial_inplace */
252b5132
RH
489 0, /* src_mask */
490 0x3fffffc, /* dst_mask */
b34976b6 491 TRUE), /* pcrel_offset */
252b5132
RH
492
493 /* This is used only by the dynamic linker. The symbol should exist
494 both in the object being run and in some shared library. The
495 dynamic linker copies the data addressed by the symbol from the
496 shared library into the object, because the object being
497 run has to have the data at some particular address. */
498 HOWTO (R_PPC_COPY, /* type */
499 0, /* rightshift */
500 2, /* size (0 = byte, 1 = short, 2 = long) */
501 32, /* bitsize */
b34976b6 502 FALSE, /* pc_relative */
252b5132 503 0, /* bitpos */
86c95733 504 complain_overflow_dont, /* complain_on_overflow */
3ce51288 505 ppc_elf_unhandled_reloc, /* special_function */
252b5132 506 "R_PPC_COPY", /* name */
b34976b6 507 FALSE, /* partial_inplace */
252b5132
RH
508 0, /* src_mask */
509 0, /* dst_mask */
b34976b6 510 FALSE), /* pcrel_offset */
252b5132
RH
511
512 /* Like R_PPC_ADDR32, but used when setting global offset table
513 entries. */
514 HOWTO (R_PPC_GLOB_DAT, /* type */
515 0, /* rightshift */
516 2, /* size (0 = byte, 1 = short, 2 = long) */
517 32, /* bitsize */
b34976b6 518 FALSE, /* pc_relative */
252b5132 519 0, /* bitpos */
86c95733 520 complain_overflow_dont, /* complain_on_overflow */
3ce51288 521 ppc_elf_unhandled_reloc, /* special_function */
252b5132 522 "R_PPC_GLOB_DAT", /* name */
b34976b6 523 FALSE, /* partial_inplace */
252b5132
RH
524 0, /* src_mask */
525 0xffffffff, /* dst_mask */
b34976b6 526 FALSE), /* pcrel_offset */
252b5132
RH
527
528 /* Marks a procedure linkage table entry for a symbol. */
529 HOWTO (R_PPC_JMP_SLOT, /* type */
530 0, /* rightshift */
531 2, /* size (0 = byte, 1 = short, 2 = long) */
532 32, /* bitsize */
b34976b6 533 FALSE, /* pc_relative */
252b5132 534 0, /* bitpos */
86c95733 535 complain_overflow_dont, /* complain_on_overflow */
3ce51288 536 ppc_elf_unhandled_reloc, /* special_function */
252b5132 537 "R_PPC_JMP_SLOT", /* name */
b34976b6 538 FALSE, /* partial_inplace */
252b5132
RH
539 0, /* src_mask */
540 0, /* dst_mask */
b34976b6 541 FALSE), /* pcrel_offset */
252b5132
RH
542
543 /* Used only by the dynamic linker. When the object is run, this
544 longword is set to the load address of the object, plus the
545 addend. */
546 HOWTO (R_PPC_RELATIVE, /* type */
547 0, /* rightshift */
548 2, /* size (0 = byte, 1 = short, 2 = long) */
549 32, /* bitsize */
b34976b6 550 FALSE, /* pc_relative */
252b5132 551 0, /* bitpos */
86c95733 552 complain_overflow_dont, /* complain_on_overflow */
252b5132
RH
553 bfd_elf_generic_reloc, /* special_function */
554 "R_PPC_RELATIVE", /* name */
b34976b6 555 FALSE, /* partial_inplace */
252b5132
RH
556 0, /* src_mask */
557 0xffffffff, /* dst_mask */
b34976b6 558 FALSE), /* pcrel_offset */
252b5132
RH
559
560 /* Like R_PPC_REL24, but uses the value of the symbol within the
561 object rather than the final value. Normally used for
562 _GLOBAL_OFFSET_TABLE_. */
563 HOWTO (R_PPC_LOCAL24PC, /* type */
564 0, /* rightshift */
565 2, /* size (0 = byte, 1 = short, 2 = long) */
566 26, /* bitsize */
b34976b6 567 TRUE, /* pc_relative */
252b5132
RH
568 0, /* bitpos */
569 complain_overflow_signed, /* complain_on_overflow */
570 bfd_elf_generic_reloc, /* special_function */
571 "R_PPC_LOCAL24PC", /* name */
b34976b6 572 FALSE, /* partial_inplace */
252b5132
RH
573 0, /* src_mask */
574 0x3fffffc, /* dst_mask */
b34976b6 575 TRUE), /* pcrel_offset */
252b5132
RH
576
577 /* Like R_PPC_ADDR32, but may be unaligned. */
578 HOWTO (R_PPC_UADDR32, /* type */
579 0, /* rightshift */
580 2, /* size (0 = byte, 1 = short, 2 = long) */
581 32, /* bitsize */
b34976b6 582 FALSE, /* pc_relative */
252b5132 583 0, /* bitpos */
86c95733 584 complain_overflow_dont, /* complain_on_overflow */
252b5132
RH
585 bfd_elf_generic_reloc, /* special_function */
586 "R_PPC_UADDR32", /* name */
b34976b6 587 FALSE, /* partial_inplace */
252b5132
RH
588 0, /* src_mask */
589 0xffffffff, /* dst_mask */
b34976b6 590 FALSE), /* pcrel_offset */
252b5132
RH
591
592 /* Like R_PPC_ADDR16, but may be unaligned. */
593 HOWTO (R_PPC_UADDR16, /* type */
594 0, /* rightshift */
595 1, /* size (0 = byte, 1 = short, 2 = long) */
596 16, /* bitsize */
b34976b6 597 FALSE, /* pc_relative */
252b5132
RH
598 0, /* bitpos */
599 complain_overflow_bitfield, /* complain_on_overflow */
600 bfd_elf_generic_reloc, /* special_function */
601 "R_PPC_UADDR16", /* name */
b34976b6 602 FALSE, /* partial_inplace */
252b5132
RH
603 0, /* src_mask */
604 0xffff, /* dst_mask */
b34976b6 605 FALSE), /* pcrel_offset */
252b5132
RH
606
607 /* 32-bit PC relative */
608 HOWTO (R_PPC_REL32, /* type */
609 0, /* rightshift */
610 2, /* size (0 = byte, 1 = short, 2 = long) */
611 32, /* bitsize */
b34976b6 612 TRUE, /* pc_relative */
252b5132 613 0, /* bitpos */
86c95733 614 complain_overflow_dont, /* complain_on_overflow */
252b5132
RH
615 bfd_elf_generic_reloc, /* special_function */
616 "R_PPC_REL32", /* name */
b34976b6 617 FALSE, /* partial_inplace */
252b5132
RH
618 0, /* src_mask */
619 0xffffffff, /* dst_mask */
b34976b6 620 TRUE), /* pcrel_offset */
252b5132
RH
621
622 /* 32-bit relocation to the symbol's procedure linkage table.
c3668558 623 FIXME: not supported. */
252b5132
RH
624 HOWTO (R_PPC_PLT32, /* type */
625 0, /* rightshift */
626 2, /* size (0 = byte, 1 = short, 2 = long) */
627 32, /* bitsize */
b34976b6 628 FALSE, /* pc_relative */
252b5132 629 0, /* bitpos */
86c95733 630 complain_overflow_dont, /* complain_on_overflow */
3ce51288 631 ppc_elf_unhandled_reloc, /* special_function */
252b5132 632 "R_PPC_PLT32", /* name */
b34976b6 633 FALSE, /* partial_inplace */
252b5132
RH
634 0, /* src_mask */
635 0, /* dst_mask */
b34976b6 636 FALSE), /* pcrel_offset */
252b5132
RH
637
638 /* 32-bit PC relative relocation to the symbol's procedure linkage table.
c3668558 639 FIXME: not supported. */
252b5132
RH
640 HOWTO (R_PPC_PLTREL32, /* type */
641 0, /* rightshift */
642 2, /* size (0 = byte, 1 = short, 2 = long) */
643 32, /* bitsize */
b34976b6 644 TRUE, /* pc_relative */
252b5132 645 0, /* bitpos */
86c95733 646 complain_overflow_dont, /* complain_on_overflow */
3ce51288 647 ppc_elf_unhandled_reloc, /* special_function */
252b5132 648 "R_PPC_PLTREL32", /* name */
b34976b6 649 FALSE, /* partial_inplace */
252b5132
RH
650 0, /* src_mask */
651 0, /* dst_mask */
b34976b6 652 TRUE), /* pcrel_offset */
252b5132
RH
653
654 /* Like R_PPC_ADDR16_LO, but referring to the PLT table entry for
655 the symbol. */
656 HOWTO (R_PPC_PLT16_LO, /* type */
657 0, /* rightshift */
658 1, /* size (0 = byte, 1 = short, 2 = long) */
659 16, /* bitsize */
b34976b6 660 FALSE, /* pc_relative */
252b5132
RH
661 0, /* bitpos */
662 complain_overflow_dont, /* complain_on_overflow */
3ce51288 663 ppc_elf_unhandled_reloc, /* special_function */
252b5132 664 "R_PPC_PLT16_LO", /* name */
b34976b6 665 FALSE, /* partial_inplace */
252b5132
RH
666 0, /* src_mask */
667 0xffff, /* dst_mask */
b34976b6 668 FALSE), /* pcrel_offset */
252b5132
RH
669
670 /* Like R_PPC_ADDR16_HI, but referring to the PLT table entry for
671 the symbol. */
672 HOWTO (R_PPC_PLT16_HI, /* type */
673 16, /* rightshift */
674 1, /* size (0 = byte, 1 = short, 2 = long) */
675 16, /* bitsize */
b34976b6 676 FALSE, /* pc_relative */
252b5132 677 0, /* bitpos */
86c95733 678 complain_overflow_dont, /* complain_on_overflow */
3ce51288 679 ppc_elf_unhandled_reloc, /* special_function */
252b5132 680 "R_PPC_PLT16_HI", /* name */
b34976b6 681 FALSE, /* partial_inplace */
252b5132
RH
682 0, /* src_mask */
683 0xffff, /* dst_mask */
b34976b6 684 FALSE), /* pcrel_offset */
252b5132
RH
685
686 /* Like R_PPC_ADDR16_HA, but referring to the PLT table entry for
687 the symbol. */
688 HOWTO (R_PPC_PLT16_HA, /* type */
689 16, /* rightshift */
690 1, /* size (0 = byte, 1 = short, 2 = long) */
691 16, /* bitsize */
b34976b6 692 FALSE, /* pc_relative */
252b5132 693 0, /* bitpos */
86c95733 694 complain_overflow_dont, /* complain_on_overflow */
3ce51288 695 ppc_elf_unhandled_reloc, /* special_function */
252b5132 696 "R_PPC_PLT16_HA", /* name */
b34976b6 697 FALSE, /* partial_inplace */
252b5132
RH
698 0, /* src_mask */
699 0xffff, /* dst_mask */
b34976b6 700 FALSE), /* pcrel_offset */
252b5132
RH
701
702 /* A sign-extended 16 bit value relative to _SDA_BASE_, for use with
703 small data items. */
704 HOWTO (R_PPC_SDAREL16, /* type */
705 0, /* rightshift */
706 1, /* size (0 = byte, 1 = short, 2 = long) */
707 16, /* bitsize */
b34976b6 708 FALSE, /* pc_relative */
252b5132
RH
709 0, /* bitpos */
710 complain_overflow_signed, /* complain_on_overflow */
3ce51288 711 ppc_elf_unhandled_reloc, /* special_function */
252b5132 712 "R_PPC_SDAREL16", /* name */
b34976b6 713 FALSE, /* partial_inplace */
252b5132
RH
714 0, /* src_mask */
715 0xffff, /* dst_mask */
b34976b6 716 FALSE), /* pcrel_offset */
252b5132 717
c061c2d8 718 /* 16-bit section relative relocation. */
252b5132
RH
719 HOWTO (R_PPC_SECTOFF, /* type */
720 0, /* rightshift */
c061c2d8
AM
721 1, /* size (0 = byte, 1 = short, 2 = long) */
722 16, /* bitsize */
b34976b6 723 FALSE, /* pc_relative */
252b5132 724 0, /* bitpos */
86c95733 725 complain_overflow_signed, /* complain_on_overflow */
3ce51288 726 ppc_elf_unhandled_reloc, /* special_function */
252b5132 727 "R_PPC_SECTOFF", /* name */
b34976b6 728 FALSE, /* partial_inplace */
252b5132 729 0, /* src_mask */
c061c2d8 730 0xffff, /* dst_mask */
b34976b6 731 FALSE), /* pcrel_offset */
252b5132 732
c3668558 733 /* 16-bit lower half section relative relocation. */
252b5132
RH
734 HOWTO (R_PPC_SECTOFF_LO, /* type */
735 0, /* rightshift */
736 1, /* size (0 = byte, 1 = short, 2 = long) */
737 16, /* bitsize */
b34976b6 738 FALSE, /* pc_relative */
252b5132
RH
739 0, /* bitpos */
740 complain_overflow_dont, /* complain_on_overflow */
3ce51288 741 ppc_elf_unhandled_reloc, /* special_function */
252b5132 742 "R_PPC_SECTOFF_LO", /* name */
b34976b6 743 FALSE, /* partial_inplace */
252b5132
RH
744 0, /* src_mask */
745 0xffff, /* dst_mask */
b34976b6 746 FALSE), /* pcrel_offset */
252b5132 747
c3668558 748 /* 16-bit upper half section relative relocation. */
252b5132
RH
749 HOWTO (R_PPC_SECTOFF_HI, /* type */
750 16, /* rightshift */
751 1, /* size (0 = byte, 1 = short, 2 = long) */
752 16, /* bitsize */
b34976b6 753 FALSE, /* pc_relative */
252b5132 754 0, /* bitpos */
86c95733 755 complain_overflow_dont, /* complain_on_overflow */
3ce51288 756 ppc_elf_unhandled_reloc, /* special_function */
252b5132 757 "R_PPC_SECTOFF_HI", /* name */
b34976b6 758 FALSE, /* partial_inplace */
252b5132
RH
759 0, /* src_mask */
760 0xffff, /* dst_mask */
b34976b6 761 FALSE), /* pcrel_offset */
252b5132 762
c3668558 763 /* 16-bit upper half adjusted section relative relocation. */
252b5132
RH
764 HOWTO (R_PPC_SECTOFF_HA, /* type */
765 16, /* rightshift */
766 1, /* size (0 = byte, 1 = short, 2 = long) */
767 16, /* bitsize */
b34976b6 768 FALSE, /* pc_relative */
252b5132 769 0, /* bitpos */
86c95733 770 complain_overflow_dont, /* complain_on_overflow */
3ce51288 771 ppc_elf_unhandled_reloc, /* special_function */
252b5132 772 "R_PPC_SECTOFF_HA", /* name */
b34976b6 773 FALSE, /* partial_inplace */
252b5132
RH
774 0, /* src_mask */
775 0xffff, /* dst_mask */
b34976b6 776 FALSE), /* pcrel_offset */
252b5132 777
727fc41e 778 /* Marker relocs for TLS. */
7619e7c7 779 HOWTO (R_PPC_TLS,
252b5132
RH
780 0, /* rightshift */
781 2, /* size (0 = byte, 1 = short, 2 = long) */
782 32, /* bitsize */
b34976b6 783 FALSE, /* pc_relative */
252b5132 784 0, /* bitpos */
7619e7c7 785 complain_overflow_dont, /* complain_on_overflow */
252b5132 786 bfd_elf_generic_reloc, /* special_function */
7619e7c7
AM
787 "R_PPC_TLS", /* name */
788 FALSE, /* partial_inplace */
789 0, /* src_mask */
790 0, /* dst_mask */
791 FALSE), /* pcrel_offset */
792
727fc41e
AM
793 HOWTO (R_PPC_TLSGD,
794 0, /* rightshift */
795 2, /* size (0 = byte, 1 = short, 2 = long) */
796 32, /* bitsize */
797 FALSE, /* pc_relative */
798 0, /* bitpos */
799 complain_overflow_dont, /* complain_on_overflow */
800 bfd_elf_generic_reloc, /* special_function */
801 "R_PPC_TLSGD", /* name */
802 FALSE, /* partial_inplace */
803 0, /* src_mask */
804 0, /* dst_mask */
805 FALSE), /* pcrel_offset */
806
807 HOWTO (R_PPC_TLSLD,
808 0, /* rightshift */
809 2, /* size (0 = byte, 1 = short, 2 = long) */
810 32, /* bitsize */
811 FALSE, /* pc_relative */
812 0, /* bitpos */
813 complain_overflow_dont, /* complain_on_overflow */
814 bfd_elf_generic_reloc, /* special_function */
815 "R_PPC_TLSLD", /* name */
816 FALSE, /* partial_inplace */
817 0, /* src_mask */
818 0, /* dst_mask */
819 FALSE), /* pcrel_offset */
820
7619e7c7
AM
821 /* Computes the load module index of the load module that contains the
822 definition of its TLS sym. */
823 HOWTO (R_PPC_DTPMOD32,
824 0, /* rightshift */
825 2, /* size (0 = byte, 1 = short, 2 = long) */
826 32, /* bitsize */
827 FALSE, /* pc_relative */
828 0, /* bitpos */
829 complain_overflow_dont, /* complain_on_overflow */
830 ppc_elf_unhandled_reloc, /* special_function */
831 "R_PPC_DTPMOD32", /* name */
b34976b6 832 FALSE, /* partial_inplace */
252b5132
RH
833 0, /* src_mask */
834 0xffffffff, /* dst_mask */
b34976b6 835 FALSE), /* pcrel_offset */
252b5132 836
7619e7c7
AM
837 /* Computes a dtv-relative displacement, the difference between the value
838 of sym+add and the base address of the thread-local storage block that
839 contains the definition of sym, minus 0x8000. */
840 HOWTO (R_PPC_DTPREL32,
841 0, /* rightshift */
842 2, /* size (0 = byte, 1 = short, 2 = long) */
843 32, /* bitsize */
844 FALSE, /* pc_relative */
845 0, /* bitpos */
846 complain_overflow_dont, /* complain_on_overflow */
847 ppc_elf_unhandled_reloc, /* special_function */
848 "R_PPC_DTPREL32", /* name */
849 FALSE, /* partial_inplace */
850 0, /* src_mask */
851 0xffffffff, /* dst_mask */
852 FALSE), /* pcrel_offset */
853
854 /* A 16 bit dtprel reloc. */
855 HOWTO (R_PPC_DTPREL16,
252b5132
RH
856 0, /* rightshift */
857 1, /* size (0 = byte, 1 = short, 2 = long) */
858 16, /* bitsize */
b34976b6 859 FALSE, /* pc_relative */
252b5132 860 0, /* bitpos */
7619e7c7
AM
861 complain_overflow_signed, /* complain_on_overflow */
862 ppc_elf_unhandled_reloc, /* special_function */
863 "R_PPC_DTPREL16", /* name */
b34976b6 864 FALSE, /* partial_inplace */
252b5132
RH
865 0, /* src_mask */
866 0xffff, /* dst_mask */
b34976b6 867 FALSE), /* pcrel_offset */
252b5132 868
7619e7c7
AM
869 /* Like DTPREL16, but no overflow. */
870 HOWTO (R_PPC_DTPREL16_LO,
252b5132
RH
871 0, /* rightshift */
872 1, /* size (0 = byte, 1 = short, 2 = long) */
873 16, /* bitsize */
b34976b6 874 FALSE, /* pc_relative */
252b5132 875 0, /* bitpos */
7619e7c7
AM
876 complain_overflow_dont, /* complain_on_overflow */
877 ppc_elf_unhandled_reloc, /* special_function */
878 "R_PPC_DTPREL16_LO", /* name */
b34976b6 879 FALSE, /* partial_inplace */
252b5132
RH
880 0, /* src_mask */
881 0xffff, /* dst_mask */
b34976b6 882 FALSE), /* pcrel_offset */
252b5132 883
7619e7c7
AM
884 /* Like DTPREL16_LO, but next higher group of 16 bits. */
885 HOWTO (R_PPC_DTPREL16_HI,
252b5132
RH
886 16, /* rightshift */
887 1, /* size (0 = byte, 1 = short, 2 = long) */
888 16, /* bitsize */
b34976b6 889 FALSE, /* pc_relative */
252b5132
RH
890 0, /* bitpos */
891 complain_overflow_dont, /* complain_on_overflow */
7619e7c7
AM
892 ppc_elf_unhandled_reloc, /* special_function */
893 "R_PPC_DTPREL16_HI", /* name */
b34976b6 894 FALSE, /* partial_inplace */
252b5132
RH
895 0, /* src_mask */
896 0xffff, /* dst_mask */
b34976b6 897 FALSE), /* pcrel_offset */
252b5132 898
7619e7c7
AM
899 /* Like DTPREL16_HI, but adjust for low 16 bits. */
900 HOWTO (R_PPC_DTPREL16_HA,
252b5132
RH
901 16, /* rightshift */
902 1, /* size (0 = byte, 1 = short, 2 = long) */
903 16, /* bitsize */
b34976b6 904 FALSE, /* pc_relative */
252b5132
RH
905 0, /* bitpos */
906 complain_overflow_dont, /* complain_on_overflow */
7619e7c7
AM
907 ppc_elf_unhandled_reloc, /* special_function */
908 "R_PPC_DTPREL16_HA", /* name */
b34976b6 909 FALSE, /* partial_inplace */
252b5132
RH
910 0, /* src_mask */
911 0xffff, /* dst_mask */
b34976b6 912 FALSE), /* pcrel_offset */
252b5132 913
7619e7c7
AM
914 /* Computes a tp-relative displacement, the difference between the value of
915 sym+add and the value of the thread pointer (r13). */
916 HOWTO (R_PPC_TPREL32,
917 0, /* rightshift */
918 2, /* size (0 = byte, 1 = short, 2 = long) */
919 32, /* bitsize */
920 FALSE, /* pc_relative */
921 0, /* bitpos */
922 complain_overflow_dont, /* complain_on_overflow */
923 ppc_elf_unhandled_reloc, /* special_function */
924 "R_PPC_TPREL32", /* name */
925 FALSE, /* partial_inplace */
926 0, /* src_mask */
927 0xffffffff, /* dst_mask */
928 FALSE), /* pcrel_offset */
929
930 /* A 16 bit tprel reloc. */
931 HOWTO (R_PPC_TPREL16,
252b5132
RH
932 0, /* rightshift */
933 1, /* size (0 = byte, 1 = short, 2 = long) */
934 16, /* bitsize */
b34976b6 935 FALSE, /* pc_relative */
252b5132 936 0, /* bitpos */
7619e7c7
AM
937 complain_overflow_signed, /* complain_on_overflow */
938 ppc_elf_unhandled_reloc, /* special_function */
939 "R_PPC_TPREL16", /* name */
b34976b6 940 FALSE, /* partial_inplace */
252b5132
RH
941 0, /* src_mask */
942 0xffff, /* dst_mask */
b34976b6 943 FALSE), /* pcrel_offset */
252b5132 944
7619e7c7
AM
945 /* Like TPREL16, but no overflow. */
946 HOWTO (R_PPC_TPREL16_LO,
252b5132
RH
947 0, /* rightshift */
948 1, /* size (0 = byte, 1 = short, 2 = long) */
949 16, /* bitsize */
b34976b6 950 FALSE, /* pc_relative */
252b5132 951 0, /* bitpos */
7619e7c7
AM
952 complain_overflow_dont, /* complain_on_overflow */
953 ppc_elf_unhandled_reloc, /* special_function */
954 "R_PPC_TPREL16_LO", /* name */
b34976b6 955 FALSE, /* partial_inplace */
252b5132
RH
956 0, /* src_mask */
957 0xffff, /* dst_mask */
b34976b6 958 FALSE), /* pcrel_offset */
252b5132 959
7619e7c7
AM
960 /* Like TPREL16_LO, but next higher group of 16 bits. */
961 HOWTO (R_PPC_TPREL16_HI,
962 16, /* rightshift */
963 1, /* size (0 = byte, 1 = short, 2 = long) */
964 16, /* bitsize */
965 FALSE, /* pc_relative */
966 0, /* bitpos */
967 complain_overflow_dont, /* complain_on_overflow */
968 ppc_elf_unhandled_reloc, /* special_function */
969 "R_PPC_TPREL16_HI", /* name */
970 FALSE, /* partial_inplace */
971 0, /* src_mask */
972 0xffff, /* dst_mask */
973 FALSE), /* pcrel_offset */
974
975 /* Like TPREL16_HI, but adjust for low 16 bits. */
976 HOWTO (R_PPC_TPREL16_HA,
977 16, /* rightshift */
978 1, /* size (0 = byte, 1 = short, 2 = long) */
979 16, /* bitsize */
980 FALSE, /* pc_relative */
981 0, /* bitpos */
982 complain_overflow_dont, /* complain_on_overflow */
983 ppc_elf_unhandled_reloc, /* special_function */
984 "R_PPC_TPREL16_HA", /* name */
985 FALSE, /* partial_inplace */
986 0, /* src_mask */
987 0xffff, /* dst_mask */
988 FALSE), /* pcrel_offset */
989
990 /* Allocates two contiguous entries in the GOT to hold a tls_index structure,
991 with values (sym+add)@dtpmod and (sym+add)@dtprel, and computes the offset
992 to the first entry. */
993 HOWTO (R_PPC_GOT_TLSGD16,
252b5132
RH
994 0, /* rightshift */
995 1, /* size (0 = byte, 1 = short, 2 = long) */
996 16, /* bitsize */
b34976b6 997 FALSE, /* pc_relative */
252b5132
RH
998 0, /* bitpos */
999 complain_overflow_signed, /* complain_on_overflow */
7619e7c7
AM
1000 ppc_elf_unhandled_reloc, /* special_function */
1001 "R_PPC_GOT_TLSGD16", /* name */
b34976b6 1002 FALSE, /* partial_inplace */
252b5132
RH
1003 0, /* src_mask */
1004 0xffff, /* dst_mask */
b34976b6 1005 FALSE), /* pcrel_offset */
252b5132 1006
7619e7c7
AM
1007 /* Like GOT_TLSGD16, but no overflow. */
1008 HOWTO (R_PPC_GOT_TLSGD16_LO,
252b5132 1009 0, /* rightshift */
7619e7c7 1010 1, /* size (0 = byte, 1 = short, 2 = long) */
252b5132 1011 16, /* bitsize */
b34976b6 1012 FALSE, /* pc_relative */
252b5132 1013 0, /* bitpos */
7619e7c7
AM
1014 complain_overflow_dont, /* complain_on_overflow */
1015 ppc_elf_unhandled_reloc, /* special_function */
1016 "R_PPC_GOT_TLSGD16_LO", /* name */
b34976b6 1017 FALSE, /* partial_inplace */
252b5132
RH
1018 0, /* src_mask */
1019 0xffff, /* dst_mask */
b34976b6 1020 FALSE), /* pcrel_offset */
252b5132 1021
7619e7c7
AM
1022 /* Like GOT_TLSGD16_LO, but next higher group of 16 bits. */
1023 HOWTO (R_PPC_GOT_TLSGD16_HI,
1024 16, /* rightshift */
1025 1, /* size (0 = byte, 1 = short, 2 = long) */
1026 16, /* bitsize */
1027 FALSE, /* pc_relative */
1028 0, /* bitpos */
1029 complain_overflow_dont, /* complain_on_overflow */
1030 ppc_elf_unhandled_reloc, /* special_function */
1031 "R_PPC_GOT_TLSGD16_HI", /* name */
1032 FALSE, /* partial_inplace */
1033 0, /* src_mask */
1034 0xffff, /* dst_mask */
1035 FALSE), /* pcrel_offset */
252b5132 1036
7619e7c7
AM
1037 /* Like GOT_TLSGD16_HI, but adjust for low 16 bits. */
1038 HOWTO (R_PPC_GOT_TLSGD16_HA,
1039 16, /* rightshift */
1040 1, /* size (0 = byte, 1 = short, 2 = long) */
1041 16, /* bitsize */
1042 FALSE, /* pc_relative */
1043 0, /* bitpos */
1044 complain_overflow_dont, /* complain_on_overflow */
1045 ppc_elf_unhandled_reloc, /* special_function */
1046 "R_PPC_GOT_TLSGD16_HA", /* name */
1047 FALSE, /* partial_inplace */
1048 0, /* src_mask */
1049 0xffff, /* dst_mask */
1050 FALSE), /* pcrel_offset */
1051
1052 /* Allocates two contiguous entries in the GOT to hold a tls_index structure,
1053 with values (sym+add)@dtpmod and zero, and computes the offset to the
1054 first entry. */
1055 HOWTO (R_PPC_GOT_TLSLD16,
252b5132
RH
1056 0, /* rightshift */
1057 1, /* size (0 = byte, 1 = short, 2 = long) */
1058 16, /* bitsize */
7619e7c7 1059 FALSE, /* pc_relative */
252b5132
RH
1060 0, /* bitpos */
1061 complain_overflow_signed, /* complain_on_overflow */
7619e7c7
AM
1062 ppc_elf_unhandled_reloc, /* special_function */
1063 "R_PPC_GOT_TLSLD16", /* name */
b34976b6 1064 FALSE, /* partial_inplace */
252b5132
RH
1065 0, /* src_mask */
1066 0xffff, /* dst_mask */
b34976b6 1067 FALSE), /* pcrel_offset */
252b5132 1068
7619e7c7
AM
1069 /* Like GOT_TLSLD16, but no overflow. */
1070 HOWTO (R_PPC_GOT_TLSLD16_LO,
252b5132 1071 0, /* rightshift */
7619e7c7
AM
1072 1, /* size (0 = byte, 1 = short, 2 = long) */
1073 16, /* bitsize */
b34976b6 1074 FALSE, /* pc_relative */
252b5132
RH
1075 0, /* bitpos */
1076 complain_overflow_dont, /* complain_on_overflow */
7619e7c7
AM
1077 ppc_elf_unhandled_reloc, /* special_function */
1078 "R_PPC_GOT_TLSLD16_LO", /* name */
b34976b6 1079 FALSE, /* partial_inplace */
252b5132 1080 0, /* src_mask */
7619e7c7 1081 0xffff, /* dst_mask */
b34976b6 1082 FALSE), /* pcrel_offset */
252b5132 1083
7619e7c7
AM
1084 /* Like GOT_TLSLD16_LO, but next higher group of 16 bits. */
1085 HOWTO (R_PPC_GOT_TLSLD16_HI,
1086 16, /* rightshift */
1087 1, /* size (0 = byte, 1 = short, 2 = long) */
1088 16, /* bitsize */
b34976b6 1089 FALSE, /* pc_relative */
252b5132
RH
1090 0, /* bitpos */
1091 complain_overflow_dont, /* complain_on_overflow */
7619e7c7
AM
1092 ppc_elf_unhandled_reloc, /* special_function */
1093 "R_PPC_GOT_TLSLD16_HI", /* name */
b34976b6 1094 FALSE, /* partial_inplace */
252b5132 1095 0, /* src_mask */
7619e7c7 1096 0xffff, /* dst_mask */
b34976b6 1097 FALSE), /* pcrel_offset */
252b5132 1098
7619e7c7
AM
1099 /* Like GOT_TLSLD16_HI, but adjust for low 16 bits. */
1100 HOWTO (R_PPC_GOT_TLSLD16_HA,
1101 16, /* rightshift */
1102 1, /* size (0 = byte, 1 = short, 2 = long) */
1103 16, /* bitsize */
1104 FALSE, /* pc_relative */
1105 0, /* bitpos */
1106 complain_overflow_dont, /* complain_on_overflow */
1107 ppc_elf_unhandled_reloc, /* special_function */
1108 "R_PPC_GOT_TLSLD16_HA", /* name */
1109 FALSE, /* partial_inplace */
1110 0, /* src_mask */
1111 0xffff, /* dst_mask */
1112 FALSE), /* pcrel_offset */
1113
1114 /* Allocates an entry in the GOT with value (sym+add)@dtprel, and computes
1115 the offset to the entry. */
1116 HOWTO (R_PPC_GOT_DTPREL16,
252b5132
RH
1117 0, /* rightshift */
1118 1, /* size (0 = byte, 1 = short, 2 = long) */
1119 16, /* bitsize */
b34976b6 1120 FALSE, /* pc_relative */
252b5132
RH
1121 0, /* bitpos */
1122 complain_overflow_signed, /* complain_on_overflow */
7619e7c7
AM
1123 ppc_elf_unhandled_reloc, /* special_function */
1124 "R_PPC_GOT_DTPREL16", /* name */
b34976b6 1125 FALSE, /* partial_inplace */
252b5132
RH
1126 0, /* src_mask */
1127 0xffff, /* dst_mask */
b34976b6 1128 FALSE), /* pcrel_offset */
252b5132 1129
7619e7c7
AM
1130 /* Like GOT_DTPREL16, but no overflow. */
1131 HOWTO (R_PPC_GOT_DTPREL16_LO,
1132 0, /* rightshift */
1133 1, /* size (0 = byte, 1 = short, 2 = long) */
1134 16, /* bitsize */
1135 FALSE, /* pc_relative */
1136 0, /* bitpos */
1137 complain_overflow_dont, /* complain_on_overflow */
1138 ppc_elf_unhandled_reloc, /* special_function */
1139 "R_PPC_GOT_DTPREL16_LO", /* name */
1140 FALSE, /* partial_inplace */
1141 0, /* src_mask */
1142 0xffff, /* dst_mask */
1143 FALSE), /* pcrel_offset */
252b5132 1144
7619e7c7
AM
1145 /* Like GOT_DTPREL16_LO, but next higher group of 16 bits. */
1146 HOWTO (R_PPC_GOT_DTPREL16_HI,
1147 16, /* rightshift */
1148 1, /* size (0 = byte, 1 = short, 2 = long) */
1149 16, /* bitsize */
1150 FALSE, /* pc_relative */
1151 0, /* bitpos */
1152 complain_overflow_dont, /* complain_on_overflow */
1153 ppc_elf_unhandled_reloc, /* special_function */
1154 "R_PPC_GOT_DTPREL16_HI", /* name */
1155 FALSE, /* partial_inplace */
1156 0, /* src_mask */
1157 0xffff, /* dst_mask */
1158 FALSE), /* pcrel_offset */
252b5132 1159
7619e7c7
AM
1160 /* Like GOT_DTPREL16_HI, but adjust for low 16 bits. */
1161 HOWTO (R_PPC_GOT_DTPREL16_HA,
1162 16, /* rightshift */
1163 1, /* size (0 = byte, 1 = short, 2 = long) */
1164 16, /* bitsize */
1165 FALSE, /* pc_relative */
1166 0, /* bitpos */
1167 complain_overflow_dont, /* complain_on_overflow */
1168 ppc_elf_unhandled_reloc, /* special_function */
1169 "R_PPC_GOT_DTPREL16_HA", /* name */
1170 FALSE, /* partial_inplace */
1171 0, /* src_mask */
1172 0xffff, /* dst_mask */
1173 FALSE), /* pcrel_offset */
c3668558 1174
7619e7c7
AM
1175 /* Allocates an entry in the GOT with value (sym+add)@tprel, and computes the
1176 offset to the entry. */
1177 HOWTO (R_PPC_GOT_TPREL16,
1178 0, /* rightshift */
1179 1, /* size (0 = byte, 1 = short, 2 = long) */
1180 16, /* bitsize */
1181 FALSE, /* pc_relative */
1182 0, /* bitpos */
1183 complain_overflow_signed, /* complain_on_overflow */
1184 ppc_elf_unhandled_reloc, /* special_function */
1185 "R_PPC_GOT_TPREL16", /* name */
1186 FALSE, /* partial_inplace */
1187 0, /* src_mask */
1188 0xffff, /* dst_mask */
1189 FALSE), /* pcrel_offset */
1190
1191 /* Like GOT_TPREL16, but no overflow. */
1192 HOWTO (R_PPC_GOT_TPREL16_LO,
1193 0, /* rightshift */
1194 1, /* size (0 = byte, 1 = short, 2 = long) */
1195 16, /* bitsize */
1196 FALSE, /* pc_relative */
1197 0, /* bitpos */
1198 complain_overflow_dont, /* complain_on_overflow */
1199 ppc_elf_unhandled_reloc, /* special_function */
1200 "R_PPC_GOT_TPREL16_LO", /* name */
1201 FALSE, /* partial_inplace */
1202 0, /* src_mask */
1203 0xffff, /* dst_mask */
1204 FALSE), /* pcrel_offset */
1205
1206 /* Like GOT_TPREL16_LO, but next higher group of 16 bits. */
1207 HOWTO (R_PPC_GOT_TPREL16_HI,
1208 16, /* rightshift */
1209 1, /* size (0 = byte, 1 = short, 2 = long) */
1210 16, /* bitsize */
1211 FALSE, /* pc_relative */
1212 0, /* bitpos */
1213 complain_overflow_dont, /* complain_on_overflow */
1214 ppc_elf_unhandled_reloc, /* special_function */
1215 "R_PPC_GOT_TPREL16_HI", /* name */
1216 FALSE, /* partial_inplace */
1217 0, /* src_mask */
1218 0xffff, /* dst_mask */
1219 FALSE), /* pcrel_offset */
1220
1221 /* Like GOT_TPREL16_HI, but adjust for low 16 bits. */
1222 HOWTO (R_PPC_GOT_TPREL16_HA,
1223 16, /* rightshift */
1224 1, /* size (0 = byte, 1 = short, 2 = long) */
1225 16, /* bitsize */
1226 FALSE, /* pc_relative */
1227 0, /* bitpos */
1228 complain_overflow_dont, /* complain_on_overflow */
1229 ppc_elf_unhandled_reloc, /* special_function */
1230 "R_PPC_GOT_TPREL16_HA", /* name */
1231 FALSE, /* partial_inplace */
1232 0, /* src_mask */
1233 0xffff, /* dst_mask */
1234 FALSE), /* pcrel_offset */
1235
1236 /* The remaining relocs are from the Embedded ELF ABI, and are not
1237 in the SVR4 ELF ABI. */
1238
1239 /* 32 bit value resulting from the addend minus the symbol. */
1240 HOWTO (R_PPC_EMB_NADDR32, /* type */
1241 0, /* rightshift */
1242 2, /* size (0 = byte, 1 = short, 2 = long) */
1243 32, /* bitsize */
1244 FALSE, /* pc_relative */
1245 0, /* bitpos */
86c95733 1246 complain_overflow_dont, /* complain_on_overflow */
3ce51288 1247 ppc_elf_unhandled_reloc, /* special_function */
7619e7c7
AM
1248 "R_PPC_EMB_NADDR32", /* name */
1249 FALSE, /* partial_inplace */
1250 0, /* src_mask */
1251 0xffffffff, /* dst_mask */
1252 FALSE), /* pcrel_offset */
1253
1254 /* 16 bit value resulting from the addend minus the symbol. */
1255 HOWTO (R_PPC_EMB_NADDR16, /* type */
1256 0, /* rightshift */
1257 1, /* size (0 = byte, 1 = short, 2 = long) */
1258 16, /* bitsize */
1259 FALSE, /* pc_relative */
1260 0, /* bitpos */
86c95733 1261 complain_overflow_signed, /* complain_on_overflow */
3ce51288 1262 ppc_elf_unhandled_reloc, /* special_function */
7619e7c7
AM
1263 "R_PPC_EMB_NADDR16", /* name */
1264 FALSE, /* partial_inplace */
1265 0, /* src_mask */
1266 0xffff, /* dst_mask */
1267 FALSE), /* pcrel_offset */
1268
1269 /* 16 bit value resulting from the addend minus the symbol. */
1270 HOWTO (R_PPC_EMB_NADDR16_LO, /* type */
1271 0, /* rightshift */
1272 1, /* size (0 = byte, 1 = short, 2 = long) */
1273 16, /* bitsize */
1274 FALSE, /* pc_relative */
1275 0, /* bitpos */
1276 complain_overflow_dont,/* complain_on_overflow */
3ce51288 1277 ppc_elf_unhandled_reloc, /* special_function */
7619e7c7
AM
1278 "R_PPC_EMB_ADDR16_LO", /* name */
1279 FALSE, /* partial_inplace */
1280 0, /* src_mask */
1281 0xffff, /* dst_mask */
1282 FALSE), /* pcrel_offset */
1283
1284 /* The high order 16 bits of the addend minus the symbol. */
1285 HOWTO (R_PPC_EMB_NADDR16_HI, /* type */
1286 16, /* rightshift */
1287 1, /* size (0 = byte, 1 = short, 2 = long) */
1288 16, /* bitsize */
1289 FALSE, /* pc_relative */
1290 0, /* bitpos */
1291 complain_overflow_dont, /* complain_on_overflow */
3ce51288 1292 ppc_elf_unhandled_reloc, /* special_function */
7619e7c7
AM
1293 "R_PPC_EMB_NADDR16_HI", /* name */
1294 FALSE, /* partial_inplace */
1295 0, /* src_mask */
1296 0xffff, /* dst_mask */
1297 FALSE), /* pcrel_offset */
1298
1299 /* The high order 16 bits of the result of the addend minus the address,
1300 plus 1 if the contents of the low 16 bits, treated as a signed number,
1301 is negative. */
1302 HOWTO (R_PPC_EMB_NADDR16_HA, /* type */
1303 16, /* rightshift */
1304 1, /* size (0 = byte, 1 = short, 2 = long) */
1305 16, /* bitsize */
1306 FALSE, /* pc_relative */
1307 0, /* bitpos */
1308 complain_overflow_dont, /* complain_on_overflow */
3ce51288 1309 ppc_elf_unhandled_reloc, /* special_function */
25dbc73a
AM
1310 "R_PPC_EMB_NADDR16_HA", /* name */
1311 FALSE, /* partial_inplace */
1312 0, /* src_mask */
1313 0xffff, /* dst_mask */
1314 FALSE), /* pcrel_offset */
1315
1316 /* 16 bit value resulting from allocating a 4 byte word to hold an
1317 address in the .sdata section, and returning the offset from
1318 _SDA_BASE_ for that relocation. */
1319 HOWTO (R_PPC_EMB_SDAI16, /* type */
1320 0, /* rightshift */
1321 1, /* size (0 = byte, 1 = short, 2 = long) */
1322 16, /* bitsize */
1323 FALSE, /* pc_relative */
1324 0, /* bitpos */
bd6c6e2b 1325 complain_overflow_signed, /* complain_on_overflow */
3ce51288 1326 ppc_elf_unhandled_reloc, /* special_function */
25dbc73a
AM
1327 "R_PPC_EMB_SDAI16", /* name */
1328 FALSE, /* partial_inplace */
1329 0, /* src_mask */
1330 0xffff, /* dst_mask */
1331 FALSE), /* pcrel_offset */
1332
1333 /* 16 bit value resulting from allocating a 4 byte word to hold an
1334 address in the .sdata2 section, and returning the offset from
1335 _SDA2_BASE_ for that relocation. */
1336 HOWTO (R_PPC_EMB_SDA2I16, /* type */
1337 0, /* rightshift */
1338 1, /* size (0 = byte, 1 = short, 2 = long) */
1339 16, /* bitsize */
1340 FALSE, /* pc_relative */
1341 0, /* bitpos */
bd6c6e2b 1342 complain_overflow_signed, /* complain_on_overflow */
3ce51288 1343 ppc_elf_unhandled_reloc, /* special_function */
25dbc73a
AM
1344 "R_PPC_EMB_SDA2I16", /* name */
1345 FALSE, /* partial_inplace */
1346 0, /* src_mask */
1347 0xffff, /* dst_mask */
1348 FALSE), /* pcrel_offset */
1349
1350 /* A sign-extended 16 bit value relative to _SDA2_BASE_, for use with
1351 small data items. */
1352 HOWTO (R_PPC_EMB_SDA2REL, /* type */
1353 0, /* rightshift */
1354 1, /* size (0 = byte, 1 = short, 2 = long) */
1355 16, /* bitsize */
1356 FALSE, /* pc_relative */
1357 0, /* bitpos */
1358 complain_overflow_signed, /* complain_on_overflow */
3ce51288 1359 ppc_elf_unhandled_reloc, /* special_function */
25dbc73a
AM
1360 "R_PPC_EMB_SDA2REL", /* name */
1361 FALSE, /* partial_inplace */
1362 0, /* src_mask */
1363 0xffff, /* dst_mask */
1364 FALSE), /* pcrel_offset */
1365
1366 /* Relocate against either _SDA_BASE_ or _SDA2_BASE_, filling in the 16 bit
1367 signed offset from the appropriate base, and filling in the register
1368 field with the appropriate register (0, 2, or 13). */
1369 HOWTO (R_PPC_EMB_SDA21, /* type */
1370 0, /* rightshift */
1371 2, /* size (0 = byte, 1 = short, 2 = long) */
1372 16, /* bitsize */
1373 FALSE, /* pc_relative */
1374 0, /* bitpos */
1375 complain_overflow_signed, /* complain_on_overflow */
3ce51288 1376 ppc_elf_unhandled_reloc, /* special_function */
25dbc73a
AM
1377 "R_PPC_EMB_SDA21", /* name */
1378 FALSE, /* partial_inplace */
1379 0, /* src_mask */
1380 0xffff, /* dst_mask */
1381 FALSE), /* pcrel_offset */
1382
1383 /* Relocation not handled: R_PPC_EMB_MRKREF */
1384 /* Relocation not handled: R_PPC_EMB_RELSEC16 */
1385 /* Relocation not handled: R_PPC_EMB_RELST_LO */
1386 /* Relocation not handled: R_PPC_EMB_RELST_HI */
1387 /* Relocation not handled: R_PPC_EMB_RELST_HA */
1388 /* Relocation not handled: R_PPC_EMB_BIT_FLD */
1389
1390 /* PC relative relocation against either _SDA_BASE_ or _SDA2_BASE_, filling
1391 in the 16 bit signed offset from the appropriate base, and filling in the
1392 register field with the appropriate register (0, 2, or 13). */
1393 HOWTO (R_PPC_EMB_RELSDA, /* type */
1394 0, /* rightshift */
1395 1, /* size (0 = byte, 1 = short, 2 = long) */
1396 16, /* bitsize */
ddfd6795 1397 FALSE, /* pc_relative */
25dbc73a
AM
1398 0, /* bitpos */
1399 complain_overflow_signed, /* complain_on_overflow */
3ce51288 1400 ppc_elf_unhandled_reloc, /* special_function */
25dbc73a
AM
1401 "R_PPC_EMB_RELSDA", /* name */
1402 FALSE, /* partial_inplace */
1403 0, /* src_mask */
1404 0xffff, /* dst_mask */
1405 FALSE), /* pcrel_offset */
1406
b9c361e0
JL
1407 /* A relative 8 bit branch. */
1408 HOWTO (R_PPC_VLE_REL8, /* type */
1409 1, /* rightshift */
1410 1, /* size (0 = byte, 1 = short, 2 = long) */
1411 8, /* bitsize */
1412 TRUE, /* pc_relative */
1413 0, /* bitpos */
1414 complain_overflow_signed, /* complain_on_overflow */
1415 bfd_elf_generic_reloc, /* special_function */
1416 "R_PPC_VLE_REL8", /* name */
1417 FALSE, /* partial_inplace */
1418 0, /* src_mask */
1419 0xff, /* dst_mask */
1420 TRUE), /* pcrel_offset */
68ffbac6 1421
b9c361e0
JL
1422 /* A relative 15 bit branch. */
1423 HOWTO (R_PPC_VLE_REL15, /* type */
1424 1, /* rightshift */
1425 2, /* size (0 = byte, 1 = short, 2 = long) */
1426 15, /* bitsize */
1427 TRUE, /* pc_relative */
1428 1, /* bitpos */
1429 complain_overflow_signed, /* complain_on_overflow */
1430 bfd_elf_generic_reloc, /* special_function */
1431 "R_PPC_VLE_REL15", /* name */
1432 FALSE, /* partial_inplace */
1433 0, /* src_mask */
dfdaec14 1434 0xfffe, /* dst_mask */
b9c361e0
JL
1435 TRUE), /* pcrel_offset */
1436
68ffbac6 1437 /* A relative 24 bit branch. */
b9c361e0
JL
1438 HOWTO (R_PPC_VLE_REL24, /* type */
1439 1, /* rightshift */
1440 2, /* size (0 = byte, 1 = short, 2 = long) */
1441 24, /* bitsize */
1442 TRUE, /* pc_relative */
1443 1, /* bitpos */
1444 complain_overflow_signed, /* complain_on_overflow */
1445 bfd_elf_generic_reloc, /* special_function */
1446 "R_PPC_VLE_REL24", /* name */
1447 FALSE, /* partial_inplace */
1448 0, /* src_mask */
1449 0x1fffffe, /* dst_mask */
1450 TRUE), /* pcrel_offset */
1451
1452 /* The 16 LSBS in split16a format. */
1453 HOWTO (R_PPC_VLE_LO16A, /* type */
1454 0, /* rightshift */
1455 2, /* size (0 = byte, 1 = short, 2 = long) */
86c95733 1456 16, /* bitsize */
bdaacd3a 1457 FALSE, /* pc_relative */
b9c361e0 1458 0, /* bitpos */
86c95733 1459 complain_overflow_dont, /* complain_on_overflow */
3ce51288 1460 ppc_elf_unhandled_reloc, /* special_function */
b9c361e0
JL
1461 "R_PPC_VLE_LO16A", /* name */
1462 FALSE, /* partial_inplace */
1463 0, /* src_mask */
08dc996f 1464 0x1f07ff, /* dst_mask */
b9c361e0
JL
1465 FALSE), /* pcrel_offset */
1466
1467 /* The 16 LSBS in split16d format. */
1468 HOWTO (R_PPC_VLE_LO16D, /* type */
1469 0, /* rightshift */
1470 2, /* size (0 = byte, 1 = short, 2 = long) */
86c95733 1471 16, /* bitsize */
b9c361e0
JL
1472 FALSE, /* pc_relative */
1473 0, /* bitpos */
86c95733 1474 complain_overflow_dont, /* complain_on_overflow */
3ce51288
AM
1475 ppc_elf_unhandled_reloc, /* special_function */
1476 "R_PPC_VLE_LO16D", /* name */
b9c361e0
JL
1477 FALSE, /* partial_inplace */
1478 0, /* src_mask */
5499c7c7 1479 0x3e007ff, /* dst_mask */
b9c361e0
JL
1480 FALSE), /* pcrel_offset */
1481
1482 /* Bits 16-31 split16a format. */
1483 HOWTO (R_PPC_VLE_HI16A, /* type */
86c95733 1484 16, /* rightshift */
b9c361e0 1485 2, /* size (0 = byte, 1 = short, 2 = long) */
86c95733 1486 16, /* bitsize */
b9c361e0
JL
1487 FALSE, /* pc_relative */
1488 0, /* bitpos */
86c95733 1489 complain_overflow_dont, /* complain_on_overflow */
3ce51288
AM
1490 ppc_elf_unhandled_reloc, /* special_function */
1491 "R_PPC_VLE_HI16A", /* name */
b9c361e0
JL
1492 FALSE, /* partial_inplace */
1493 0, /* src_mask */
08dc996f 1494 0x1f07ff, /* dst_mask */
b9c361e0
JL
1495 FALSE), /* pcrel_offset */
1496
1497 /* Bits 16-31 split16d format. */
1498 HOWTO (R_PPC_VLE_HI16D, /* type */
86c95733 1499 16, /* rightshift */
b9c361e0 1500 2, /* size (0 = byte, 1 = short, 2 = long) */
86c95733 1501 16, /* bitsize */
b9c361e0
JL
1502 FALSE, /* pc_relative */
1503 0, /* bitpos */
86c95733 1504 complain_overflow_dont, /* complain_on_overflow */
3ce51288
AM
1505 ppc_elf_unhandled_reloc, /* special_function */
1506 "R_PPC_VLE_HI16D", /* name */
b9c361e0
JL
1507 FALSE, /* partial_inplace */
1508 0, /* src_mask */
5499c7c7 1509 0x3e007ff, /* dst_mask */
b9c361e0
JL
1510 FALSE), /* pcrel_offset */
1511
1512 /* Bits 16-31 (High Adjusted) in split16a format. */
1513 HOWTO (R_PPC_VLE_HA16A, /* type */
86c95733 1514 16, /* rightshift */
b9c361e0 1515 2, /* size (0 = byte, 1 = short, 2 = long) */
86c95733 1516 16, /* bitsize */
b9c361e0
JL
1517 FALSE, /* pc_relative */
1518 0, /* bitpos */
86c95733 1519 complain_overflow_dont, /* complain_on_overflow */
3ce51288
AM
1520 ppc_elf_unhandled_reloc, /* special_function */
1521 "R_PPC_VLE_HA16A", /* name */
b9c361e0
JL
1522 FALSE, /* partial_inplace */
1523 0, /* src_mask */
08dc996f 1524 0x1f07ff, /* dst_mask */
b9c361e0
JL
1525 FALSE), /* pcrel_offset */
1526
1527 /* Bits 16-31 (High Adjusted) in split16d format. */
1528 HOWTO (R_PPC_VLE_HA16D, /* type */
86c95733 1529 16, /* rightshift */
b9c361e0 1530 2, /* size (0 = byte, 1 = short, 2 = long) */
86c95733 1531 16, /* bitsize */
b9c361e0
JL
1532 FALSE, /* pc_relative */
1533 0, /* bitpos */
86c95733 1534 complain_overflow_dont, /* complain_on_overflow */
3ce51288
AM
1535 ppc_elf_unhandled_reloc, /* special_function */
1536 "R_PPC_VLE_HA16D", /* name */
b9c361e0
JL
1537 FALSE, /* partial_inplace */
1538 0, /* src_mask */
5499c7c7 1539 0x3e007ff, /* dst_mask */
b9c361e0
JL
1540 FALSE), /* pcrel_offset */
1541
86c95733
AM
1542 /* This reloc is like R_PPC_EMB_SDA21 but only applies to e_add16i
1543 instructions. If the register base is 0 then the linker changes
1544 the e_add16i to an e_li instruction. */
1545 HOWTO (R_PPC_VLE_SDA21, /* type */
b9c361e0
JL
1546 0, /* rightshift */
1547 2, /* size (0 = byte, 1 = short, 2 = long) */
86c95733 1548 16, /* bitsize */
b9c361e0
JL
1549 FALSE, /* pc_relative */
1550 0, /* bitpos */
86c95733 1551 complain_overflow_signed, /* complain_on_overflow */
3ce51288
AM
1552 ppc_elf_unhandled_reloc, /* special_function */
1553 "R_PPC_VLE_SDA21", /* name */
b9c361e0
JL
1554 FALSE, /* partial_inplace */
1555 0, /* src_mask */
1556 0xffff, /* dst_mask */
1557 FALSE), /* pcrel_offset */
1558
86c95733 1559 /* Like R_PPC_VLE_SDA21 but ignore overflow. */
b9c361e0
JL
1560 HOWTO (R_PPC_VLE_SDA21_LO, /* type */
1561 0, /* rightshift */
1562 2, /* size (0 = byte, 1 = short, 2 = long) */
86c95733 1563 16, /* bitsize */
b9c361e0
JL
1564 FALSE, /* pc_relative */
1565 0, /* bitpos */
86c95733 1566 complain_overflow_dont, /* complain_on_overflow */
3ce51288 1567 ppc_elf_unhandled_reloc, /* special_function */
b9c361e0
JL
1568 "R_PPC_VLE_SDA21_LO", /* name */
1569 FALSE, /* partial_inplace */
1570 0, /* src_mask */
86c95733 1571 0xffff, /* dst_mask */
b9c361e0
JL
1572 FALSE), /* pcrel_offset */
1573
1574 /* The 16 LSBS relative to _SDA_BASE_ in split16a format. */
1575 HOWTO (R_PPC_VLE_SDAREL_LO16A,/* type */
1576 0, /* rightshift */
1577 2, /* size (0 = byte, 1 = short, 2 = long) */
86c95733 1578 16, /* bitsize */
b9c361e0
JL
1579 FALSE, /* pc_relative */
1580 0, /* bitpos */
3ce51288
AM
1581 complain_overflow_dont, /* complain_on_overflow */
1582 ppc_elf_unhandled_reloc, /* special_function */
1583 "R_PPC_VLE_SDAREL_LO16A", /* name */
b9c361e0
JL
1584 FALSE, /* partial_inplace */
1585 0, /* src_mask */
08dc996f 1586 0x1f07ff, /* dst_mask */
b9c361e0
JL
1587 FALSE), /* pcrel_offset */
1588
1589 /* The 16 LSBS relative to _SDA_BASE_ in split16d format. */
b9c361e0
JL
1590 HOWTO (R_PPC_VLE_SDAREL_LO16D, /* type */
1591 0, /* rightshift */
1592 2, /* size (0 = byte, 1 = short, 2 = long) */
86c95733 1593 16, /* bitsize */
b9c361e0
JL
1594 FALSE, /* pc_relative */
1595 0, /* bitpos */
3ce51288
AM
1596 complain_overflow_dont, /* complain_on_overflow */
1597 ppc_elf_unhandled_reloc, /* special_function */
1598 "R_PPC_VLE_SDAREL_LO16D", /* name */
b9c361e0
JL
1599 FALSE, /* partial_inplace */
1600 0, /* src_mask */
5499c7c7 1601 0x3e007ff, /* dst_mask */
b9c361e0
JL
1602 FALSE), /* pcrel_offset */
1603
1604 /* Bits 16-31 relative to _SDA_BASE_ in split16a format. */
3ce51288 1605 HOWTO (R_PPC_VLE_SDAREL_HI16A, /* type */
86c95733 1606 16, /* rightshift */
b9c361e0 1607 2, /* size (0 = byte, 1 = short, 2 = long) */
86c95733 1608 16, /* bitsize */
b9c361e0
JL
1609 FALSE, /* pc_relative */
1610 0, /* bitpos */
3ce51288
AM
1611 complain_overflow_dont, /* complain_on_overflow */
1612 ppc_elf_unhandled_reloc, /* special_function */
1613 "R_PPC_VLE_SDAREL_HI16A", /* name */
b9c361e0
JL
1614 FALSE, /* partial_inplace */
1615 0, /* src_mask */
08dc996f 1616 0x1f07ff, /* dst_mask */
b9c361e0
JL
1617 FALSE), /* pcrel_offset */
1618
1619 /* Bits 16-31 relative to _SDA_BASE_ in split16d format. */
3ce51288 1620 HOWTO (R_PPC_VLE_SDAREL_HI16D, /* type */
86c95733 1621 16, /* rightshift */
b9c361e0 1622 2, /* size (0 = byte, 1 = short, 2 = long) */
86c95733 1623 16, /* bitsize */
b9c361e0
JL
1624 FALSE, /* pc_relative */
1625 0, /* bitpos */
3ce51288
AM
1626 complain_overflow_dont, /* complain_on_overflow */
1627 ppc_elf_unhandled_reloc, /* special_function */
1628 "R_PPC_VLE_SDAREL_HI16D", /* name */
b9c361e0
JL
1629 FALSE, /* partial_inplace */
1630 0, /* src_mask */
5499c7c7 1631 0x3e007ff, /* dst_mask */
b9c361e0
JL
1632 FALSE), /* pcrel_offset */
1633
1634 /* Bits 16-31 (HA) relative to _SDA_BASE split16a format. */
3ce51288 1635 HOWTO (R_PPC_VLE_SDAREL_HA16A, /* type */
86c95733 1636 16, /* rightshift */
b9c361e0 1637 2, /* size (0 = byte, 1 = short, 2 = long) */
86c95733 1638 16, /* bitsize */
b9c361e0
JL
1639 FALSE, /* pc_relative */
1640 0, /* bitpos */
3ce51288
AM
1641 complain_overflow_dont, /* complain_on_overflow */
1642 ppc_elf_unhandled_reloc, /* special_function */
1643 "R_PPC_VLE_SDAREL_HA16A", /* name */
b9c361e0
JL
1644 FALSE, /* partial_inplace */
1645 0, /* src_mask */
08dc996f 1646 0x1f07ff, /* dst_mask */
b9c361e0
JL
1647 FALSE), /* pcrel_offset */
1648
1649 /* Bits 16-31 (HA) relative to _SDA_BASE split16d format. */
3ce51288 1650 HOWTO (R_PPC_VLE_SDAREL_HA16D, /* type */
86c95733 1651 16, /* rightshift */
b9c361e0 1652 2, /* size (0 = byte, 1 = short, 2 = long) */
86c95733 1653 16, /* bitsize */
b9c361e0
JL
1654 FALSE, /* pc_relative */
1655 0, /* bitpos */
3ce51288
AM
1656 complain_overflow_dont, /* complain_on_overflow */
1657 ppc_elf_unhandled_reloc, /* special_function */
1658 "R_PPC_VLE_SDAREL_HA16D", /* name */
b9c361e0
JL
1659 FALSE, /* partial_inplace */
1660 0, /* src_mask */
5499c7c7 1661 0x3e007ff, /* dst_mask */
b9c361e0
JL
1662 FALSE), /* pcrel_offset */
1663
83eef883
AFB
1664 /* e_li split20 format. */
1665 HOWTO (R_PPC_VLE_ADDR20, /* type */
1666 16, /* rightshift */
1667 2, /* size (0 = byte, 1 = short, 2 = long) */
1668 20, /* bitsize */
1669 FALSE, /* pc_relative */
1670 0, /* bitpos */
1671 complain_overflow_dont, /* complain_on_overflow */
1672 bfd_elf_generic_reloc, /* special_function */
1673 "R_PPC_VLE_ADDR20", /* name */
1674 FALSE, /* partial_inplace */
1675 0, /* src_mask */
1676 0x1f07ff, /* dst_mask */
1677 FALSE), /* pcrel_offset */
1678
e054468f
AM
1679 HOWTO (R_PPC_IRELATIVE, /* type */
1680 0, /* rightshift */
1681 2, /* size (0 = byte, 1 = short, 2 = long) */
1682 32, /* bitsize */
1683 FALSE, /* pc_relative */
1684 0, /* bitpos */
86c95733 1685 complain_overflow_dont, /* complain_on_overflow */
3ce51288 1686 ppc_elf_unhandled_reloc, /* special_function */
e054468f
AM
1687 "R_PPC_IRELATIVE", /* name */
1688 FALSE, /* partial_inplace */
1689 0, /* src_mask */
1690 0xffffffff, /* dst_mask */
1691 FALSE), /* pcrel_offset */
1692
d7128ce4
AM
1693 /* A 16 bit relative relocation. */
1694 HOWTO (R_PPC_REL16, /* type */
1695 0, /* rightshift */
1696 1, /* size (0 = byte, 1 = short, 2 = long) */
1697 16, /* bitsize */
1698 TRUE, /* pc_relative */
1699 0, /* bitpos */
86c95733 1700 complain_overflow_signed, /* complain_on_overflow */
d7128ce4
AM
1701 bfd_elf_generic_reloc, /* special_function */
1702 "R_PPC_REL16", /* name */
1703 FALSE, /* partial_inplace */
1704 0, /* src_mask */
1705 0xffff, /* dst_mask */
1706 TRUE), /* pcrel_offset */
1707
1708 /* A 16 bit relative relocation without overflow. */
1709 HOWTO (R_PPC_REL16_LO, /* type */
1710 0, /* rightshift */
1711 1, /* size (0 = byte, 1 = short, 2 = long) */
1712 16, /* bitsize */
1713 TRUE, /* pc_relative */
1714 0, /* bitpos */
1715 complain_overflow_dont,/* complain_on_overflow */
1716 bfd_elf_generic_reloc, /* special_function */
1717 "R_PPC_REL16_LO", /* name */
1718 FALSE, /* partial_inplace */
1719 0, /* src_mask */
1720 0xffff, /* dst_mask */
1721 TRUE), /* pcrel_offset */
1722
1723 /* The high order 16 bits of a relative address. */
1724 HOWTO (R_PPC_REL16_HI, /* type */
1725 16, /* rightshift */
1726 1, /* size (0 = byte, 1 = short, 2 = long) */
1727 16, /* bitsize */
1728 TRUE, /* pc_relative */
1729 0, /* bitpos */
1730 complain_overflow_dont, /* complain_on_overflow */
1731 bfd_elf_generic_reloc, /* special_function */
1732 "R_PPC_REL16_HI", /* name */
1733 FALSE, /* partial_inplace */
1734 0, /* src_mask */
1735 0xffff, /* dst_mask */
1736 TRUE), /* pcrel_offset */
1737
1738 /* The high order 16 bits of a relative address, plus 1 if the contents of
1739 the low 16 bits, treated as a signed number, is negative. */
1740 HOWTO (R_PPC_REL16_HA, /* type */
1741 16, /* rightshift */
1742 1, /* size (0 = byte, 1 = short, 2 = long) */
1743 16, /* bitsize */
1744 TRUE, /* pc_relative */
1745 0, /* bitpos */
1746 complain_overflow_dont, /* complain_on_overflow */
1747 ppc_elf_addr16_ha_reloc, /* special_function */
1748 "R_PPC_REL16_HA", /* name */
1749 FALSE, /* partial_inplace */
1750 0, /* src_mask */
1751 0xffff, /* dst_mask */
1752 TRUE), /* pcrel_offset */
1753
a680de9a
PB
1754 /* Like R_PPC_REL16_HA but for split field in addpcis. */
1755 HOWTO (R_PPC_REL16DX_HA, /* type */
1756 16, /* rightshift */
1757 2, /* size (0 = byte, 1 = short, 2 = long) */
1758 16, /* bitsize */
1759 TRUE, /* pc_relative */
1760 0, /* bitpos */
1761 complain_overflow_signed, /* complain_on_overflow */
1762 ppc_elf_addr16_ha_reloc, /* special_function */
1763 "R_PPC_REL16DX_HA", /* name */
1764 FALSE, /* partial_inplace */
1765 0, /* src_mask */
1766 0x1fffc1, /* dst_mask */
1767 TRUE), /* pcrel_offset */
1768
7ba71655
AM
1769 /* A split-field reloc for addpcis, non-relative (gas internal use only). */
1770 HOWTO (R_PPC_16DX_HA, /* type */
1771 16, /* rightshift */
1772 2, /* size (0 = byte, 1 = short, 2 = long) */
1773 16, /* bitsize */
1774 FALSE, /* pc_relative */
1775 0, /* bitpos */
1776 complain_overflow_signed, /* complain_on_overflow */
1777 ppc_elf_addr16_ha_reloc, /* special_function */
1778 "R_PPC_16DX_HA", /* name */
1779 FALSE, /* partial_inplace */
1780 0, /* src_mask */
1781 0x1fffc1, /* dst_mask */
1782 FALSE), /* pcrel_offset */
1783
25dbc73a
AM
1784 /* GNU extension to record C++ vtable hierarchy. */
1785 HOWTO (R_PPC_GNU_VTINHERIT, /* type */
1786 0, /* rightshift */
1787 0, /* size (0 = byte, 1 = short, 2 = long) */
1788 0, /* bitsize */
1789 FALSE, /* pc_relative */
1790 0, /* bitpos */
1791 complain_overflow_dont, /* complain_on_overflow */
1792 NULL, /* special_function */
1793 "R_PPC_GNU_VTINHERIT", /* name */
1794 FALSE, /* partial_inplace */
1795 0, /* src_mask */
1796 0, /* dst_mask */
1797 FALSE), /* pcrel_offset */
1798
1799 /* GNU extension to record C++ vtable member usage. */
1800 HOWTO (R_PPC_GNU_VTENTRY, /* type */
1801 0, /* rightshift */
1802 0, /* size (0 = byte, 1 = short, 2 = long) */
1803 0, /* bitsize */
1804 FALSE, /* pc_relative */
1805 0, /* bitpos */
1806 complain_overflow_dont, /* complain_on_overflow */
1807 NULL, /* special_function */
1808 "R_PPC_GNU_VTENTRY", /* name */
7619e7c7
AM
1809 FALSE, /* partial_inplace */
1810 0, /* src_mask */
25dbc73a 1811 0, /* dst_mask */
7619e7c7
AM
1812 FALSE), /* pcrel_offset */
1813
25dbc73a
AM
1814 /* Phony reloc to handle AIX style TOC entries. */
1815 HOWTO (R_PPC_TOC16, /* type */
7619e7c7
AM
1816 0, /* rightshift */
1817 1, /* size (0 = byte, 1 = short, 2 = long) */
1818 16, /* bitsize */
1819 FALSE, /* pc_relative */
1820 0, /* bitpos */
25dbc73a 1821 complain_overflow_signed, /* complain_on_overflow */
3ce51288 1822 ppc_elf_unhandled_reloc, /* special_function */
25dbc73a 1823 "R_PPC_TOC16", /* name */
7619e7c7
AM
1824 FALSE, /* partial_inplace */
1825 0, /* src_mask */
1826 0xffff, /* dst_mask */
1827 FALSE), /* pcrel_offset */
25dbc73a
AM
1828};
1829\f
1830/* Initialize the ppc_elf_howto_table, so that linear accesses can be done. */
1831
1832static void
1833ppc_elf_howto_init (void)
1834{
1835 unsigned int i, type;
1836
1837 for (i = 0;
1838 i < sizeof (ppc_elf_howto_raw) / sizeof (ppc_elf_howto_raw[0]);
1839 i++)
1840 {
1841 type = ppc_elf_howto_raw[i].type;
1842 if (type >= (sizeof (ppc_elf_howto_table)
1843 / sizeof (ppc_elf_howto_table[0])))
1844 abort ();
1845 ppc_elf_howto_table[type] = &ppc_elf_howto_raw[i];
1846 }
1847}
1848
1849static reloc_howto_type *
1850ppc_elf_reloc_type_lookup (bfd *abfd ATTRIBUTE_UNUSED,
1851 bfd_reloc_code_real_type code)
1852{
1853 enum elf_ppc_reloc_type r;
1854
1855 /* Initialize howto table if not already done. */
1856 if (!ppc_elf_howto_table[R_PPC_ADDR32])
1857 ppc_elf_howto_init ();
1858
1859 switch (code)
1860 {
1861 default:
1862 return NULL;
1863
1864 case BFD_RELOC_NONE: r = R_PPC_NONE; break;
1865 case BFD_RELOC_32: r = R_PPC_ADDR32; break;
1866 case BFD_RELOC_PPC_BA26: r = R_PPC_ADDR24; break;
1fe532cf 1867 case BFD_RELOC_PPC64_ADDR16_DS:
25dbc73a 1868 case BFD_RELOC_16: r = R_PPC_ADDR16; break;
1fe532cf 1869 case BFD_RELOC_PPC64_ADDR16_LO_DS:
25dbc73a
AM
1870 case BFD_RELOC_LO16: r = R_PPC_ADDR16_LO; break;
1871 case BFD_RELOC_HI16: r = R_PPC_ADDR16_HI; break;
1872 case BFD_RELOC_HI16_S: r = R_PPC_ADDR16_HA; break;
1873 case BFD_RELOC_PPC_BA16: r = R_PPC_ADDR14; break;
1874 case BFD_RELOC_PPC_BA16_BRTAKEN: r = R_PPC_ADDR14_BRTAKEN; break;
1875 case BFD_RELOC_PPC_BA16_BRNTAKEN: r = R_PPC_ADDR14_BRNTAKEN; break;
1876 case BFD_RELOC_PPC_B26: r = R_PPC_REL24; break;
1877 case BFD_RELOC_PPC_B16: r = R_PPC_REL14; break;
1878 case BFD_RELOC_PPC_B16_BRTAKEN: r = R_PPC_REL14_BRTAKEN; break;
1879 case BFD_RELOC_PPC_B16_BRNTAKEN: r = R_PPC_REL14_BRNTAKEN; break;
1fe532cf 1880 case BFD_RELOC_PPC64_GOT16_DS:
25dbc73a 1881 case BFD_RELOC_16_GOTOFF: r = R_PPC_GOT16; break;
1fe532cf 1882 case BFD_RELOC_PPC64_GOT16_LO_DS:
25dbc73a
AM
1883 case BFD_RELOC_LO16_GOTOFF: r = R_PPC_GOT16_LO; break;
1884 case BFD_RELOC_HI16_GOTOFF: r = R_PPC_GOT16_HI; break;
1885 case BFD_RELOC_HI16_S_GOTOFF: r = R_PPC_GOT16_HA; break;
1886 case BFD_RELOC_24_PLT_PCREL: r = R_PPC_PLTREL24; break;
1887 case BFD_RELOC_PPC_COPY: r = R_PPC_COPY; break;
1888 case BFD_RELOC_PPC_GLOB_DAT: r = R_PPC_GLOB_DAT; break;
1889 case BFD_RELOC_PPC_LOCAL24PC: r = R_PPC_LOCAL24PC; break;
1890 case BFD_RELOC_32_PCREL: r = R_PPC_REL32; break;
1891 case BFD_RELOC_32_PLTOFF: r = R_PPC_PLT32; break;
1892 case BFD_RELOC_32_PLT_PCREL: r = R_PPC_PLTREL32; break;
1fe532cf 1893 case BFD_RELOC_PPC64_PLT16_LO_DS:
25dbc73a
AM
1894 case BFD_RELOC_LO16_PLTOFF: r = R_PPC_PLT16_LO; break;
1895 case BFD_RELOC_HI16_PLTOFF: r = R_PPC_PLT16_HI; break;
1896 case BFD_RELOC_HI16_S_PLTOFF: r = R_PPC_PLT16_HA; break;
1897 case BFD_RELOC_GPREL16: r = R_PPC_SDAREL16; break;
1fe532cf 1898 case BFD_RELOC_PPC64_SECTOFF_DS:
25dbc73a 1899 case BFD_RELOC_16_BASEREL: r = R_PPC_SECTOFF; break;
1fe532cf 1900 case BFD_RELOC_PPC64_SECTOFF_LO_DS:
25dbc73a
AM
1901 case BFD_RELOC_LO16_BASEREL: r = R_PPC_SECTOFF_LO; break;
1902 case BFD_RELOC_HI16_BASEREL: r = R_PPC_SECTOFF_HI; break;
1903 case BFD_RELOC_HI16_S_BASEREL: r = R_PPC_SECTOFF_HA; break;
1904 case BFD_RELOC_CTOR: r = R_PPC_ADDR32; break;
1fe532cf 1905 case BFD_RELOC_PPC64_TOC16_DS:
25dbc73a
AM
1906 case BFD_RELOC_PPC_TOC16: r = R_PPC_TOC16; break;
1907 case BFD_RELOC_PPC_TLS: r = R_PPC_TLS; break;
727fc41e
AM
1908 case BFD_RELOC_PPC_TLSGD: r = R_PPC_TLSGD; break;
1909 case BFD_RELOC_PPC_TLSLD: r = R_PPC_TLSLD; break;
25dbc73a 1910 case BFD_RELOC_PPC_DTPMOD: r = R_PPC_DTPMOD32; break;
1fe532cf 1911 case BFD_RELOC_PPC64_TPREL16_DS:
25dbc73a 1912 case BFD_RELOC_PPC_TPREL16: r = R_PPC_TPREL16; break;
1fe532cf 1913 case BFD_RELOC_PPC64_TPREL16_LO_DS:
25dbc73a
AM
1914 case BFD_RELOC_PPC_TPREL16_LO: r = R_PPC_TPREL16_LO; break;
1915 case BFD_RELOC_PPC_TPREL16_HI: r = R_PPC_TPREL16_HI; break;
1916 case BFD_RELOC_PPC_TPREL16_HA: r = R_PPC_TPREL16_HA; break;
1917 case BFD_RELOC_PPC_TPREL: r = R_PPC_TPREL32; break;
1fe532cf 1918 case BFD_RELOC_PPC64_DTPREL16_DS:
25dbc73a 1919 case BFD_RELOC_PPC_DTPREL16: r = R_PPC_DTPREL16; break;
1fe532cf 1920 case BFD_RELOC_PPC64_DTPREL16_LO_DS:
25dbc73a
AM
1921 case BFD_RELOC_PPC_DTPREL16_LO: r = R_PPC_DTPREL16_LO; break;
1922 case BFD_RELOC_PPC_DTPREL16_HI: r = R_PPC_DTPREL16_HI; break;
1923 case BFD_RELOC_PPC_DTPREL16_HA: r = R_PPC_DTPREL16_HA; break;
1924 case BFD_RELOC_PPC_DTPREL: r = R_PPC_DTPREL32; break;
1925 case BFD_RELOC_PPC_GOT_TLSGD16: r = R_PPC_GOT_TLSGD16; break;
1926 case BFD_RELOC_PPC_GOT_TLSGD16_LO: r = R_PPC_GOT_TLSGD16_LO; break;
1927 case BFD_RELOC_PPC_GOT_TLSGD16_HI: r = R_PPC_GOT_TLSGD16_HI; break;
1928 case BFD_RELOC_PPC_GOT_TLSGD16_HA: r = R_PPC_GOT_TLSGD16_HA; break;
1929 case BFD_RELOC_PPC_GOT_TLSLD16: r = R_PPC_GOT_TLSLD16; break;
1930 case BFD_RELOC_PPC_GOT_TLSLD16_LO: r = R_PPC_GOT_TLSLD16_LO; break;
1931 case BFD_RELOC_PPC_GOT_TLSLD16_HI: r = R_PPC_GOT_TLSLD16_HI; break;
1932 case BFD_RELOC_PPC_GOT_TLSLD16_HA: r = R_PPC_GOT_TLSLD16_HA; break;
1933 case BFD_RELOC_PPC_GOT_TPREL16: r = R_PPC_GOT_TPREL16; break;
1934 case BFD_RELOC_PPC_GOT_TPREL16_LO: r = R_PPC_GOT_TPREL16_LO; break;
1935 case BFD_RELOC_PPC_GOT_TPREL16_HI: r = R_PPC_GOT_TPREL16_HI; break;
1936 case BFD_RELOC_PPC_GOT_TPREL16_HA: r = R_PPC_GOT_TPREL16_HA; break;
1937 case BFD_RELOC_PPC_GOT_DTPREL16: r = R_PPC_GOT_DTPREL16; break;
1938 case BFD_RELOC_PPC_GOT_DTPREL16_LO: r = R_PPC_GOT_DTPREL16_LO; break;
1939 case BFD_RELOC_PPC_GOT_DTPREL16_HI: r = R_PPC_GOT_DTPREL16_HI; break;
1940 case BFD_RELOC_PPC_GOT_DTPREL16_HA: r = R_PPC_GOT_DTPREL16_HA; break;
1941 case BFD_RELOC_PPC_EMB_NADDR32: r = R_PPC_EMB_NADDR32; break;
1942 case BFD_RELOC_PPC_EMB_NADDR16: r = R_PPC_EMB_NADDR16; break;
1943 case BFD_RELOC_PPC_EMB_NADDR16_LO: r = R_PPC_EMB_NADDR16_LO; break;
1944 case BFD_RELOC_PPC_EMB_NADDR16_HI: r = R_PPC_EMB_NADDR16_HI; break;
1945 case BFD_RELOC_PPC_EMB_NADDR16_HA: r = R_PPC_EMB_NADDR16_HA; break;
1946 case BFD_RELOC_PPC_EMB_SDAI16: r = R_PPC_EMB_SDAI16; break;
1947 case BFD_RELOC_PPC_EMB_SDA2I16: r = R_PPC_EMB_SDA2I16; break;
1948 case BFD_RELOC_PPC_EMB_SDA2REL: r = R_PPC_EMB_SDA2REL; break;
1949 case BFD_RELOC_PPC_EMB_SDA21: r = R_PPC_EMB_SDA21; break;
1950 case BFD_RELOC_PPC_EMB_MRKREF: r = R_PPC_EMB_MRKREF; break;
1951 case BFD_RELOC_PPC_EMB_RELSEC16: r = R_PPC_EMB_RELSEC16; break;
1952 case BFD_RELOC_PPC_EMB_RELST_LO: r = R_PPC_EMB_RELST_LO; break;
1953 case BFD_RELOC_PPC_EMB_RELST_HI: r = R_PPC_EMB_RELST_HI; break;
1954 case BFD_RELOC_PPC_EMB_RELST_HA: r = R_PPC_EMB_RELST_HA; break;
1955 case BFD_RELOC_PPC_EMB_BIT_FLD: r = R_PPC_EMB_BIT_FLD; break;
1956 case BFD_RELOC_PPC_EMB_RELSDA: r = R_PPC_EMB_RELSDA; break;
b9c361e0
JL
1957 case BFD_RELOC_PPC_VLE_REL8: r = R_PPC_VLE_REL8; break;
1958 case BFD_RELOC_PPC_VLE_REL15: r = R_PPC_VLE_REL15; break;
1959 case BFD_RELOC_PPC_VLE_REL24: r = R_PPC_VLE_REL24; break;
1960 case BFD_RELOC_PPC_VLE_LO16A: r = R_PPC_VLE_LO16A; break;
1961 case BFD_RELOC_PPC_VLE_LO16D: r = R_PPC_VLE_LO16D; break;
1962 case BFD_RELOC_PPC_VLE_HI16A: r = R_PPC_VLE_HI16A; break;
1963 case BFD_RELOC_PPC_VLE_HI16D: r = R_PPC_VLE_HI16D; break;
1964 case BFD_RELOC_PPC_VLE_HA16A: r = R_PPC_VLE_HA16A; break;
1965 case BFD_RELOC_PPC_VLE_HA16D: r = R_PPC_VLE_HA16D; break;
1966 case BFD_RELOC_PPC_VLE_SDA21: r = R_PPC_VLE_SDA21; break;
1967 case BFD_RELOC_PPC_VLE_SDA21_LO: r = R_PPC_VLE_SDA21_LO; break;
1968 case BFD_RELOC_PPC_VLE_SDAREL_LO16A:
1969 r = R_PPC_VLE_SDAREL_LO16A;
1970 break;
1971 case BFD_RELOC_PPC_VLE_SDAREL_LO16D:
1972 r = R_PPC_VLE_SDAREL_LO16D;
1973 break;
1974 case BFD_RELOC_PPC_VLE_SDAREL_HI16A:
1975 r = R_PPC_VLE_SDAREL_HI16A;
1976 break;
1977 case BFD_RELOC_PPC_VLE_SDAREL_HI16D:
1978 r = R_PPC_VLE_SDAREL_HI16D;
1979 break;
1980 case BFD_RELOC_PPC_VLE_SDAREL_HA16A:
1981 r = R_PPC_VLE_SDAREL_HA16A;
1982 break;
1983 case BFD_RELOC_PPC_VLE_SDAREL_HA16D:
1984 r = R_PPC_VLE_SDAREL_HA16D;
1985 break;
d7128ce4
AM
1986 case BFD_RELOC_16_PCREL: r = R_PPC_REL16; break;
1987 case BFD_RELOC_LO16_PCREL: r = R_PPC_REL16_LO; break;
1988 case BFD_RELOC_HI16_PCREL: r = R_PPC_REL16_HI; break;
1989 case BFD_RELOC_HI16_S_PCREL: r = R_PPC_REL16_HA; break;
7ba71655 1990 case BFD_RELOC_PPC_16DX_HA: r = R_PPC_16DX_HA; break;
a680de9a 1991 case BFD_RELOC_PPC_REL16DX_HA: r = R_PPC_REL16DX_HA; break;
25dbc73a
AM
1992 case BFD_RELOC_VTABLE_INHERIT: r = R_PPC_GNU_VTINHERIT; break;
1993 case BFD_RELOC_VTABLE_ENTRY: r = R_PPC_GNU_VTENTRY; break;
1994 }
1995
1996 return ppc_elf_howto_table[r];
1997};
1998
157090f7
AM
1999static reloc_howto_type *
2000ppc_elf_reloc_name_lookup (bfd *abfd ATTRIBUTE_UNUSED,
2001 const char *r_name)
2002{
2003 unsigned int i;
2004
2005 for (i = 0;
2006 i < sizeof (ppc_elf_howto_raw) / sizeof (ppc_elf_howto_raw[0]);
2007 i++)
2008 if (ppc_elf_howto_raw[i].name != NULL
2009 && strcasecmp (ppc_elf_howto_raw[i].name, r_name) == 0)
2010 return &ppc_elf_howto_raw[i];
2011
2012 return NULL;
2013}
2014
25dbc73a
AM
2015/* Set the howto pointer for a PowerPC ELF reloc. */
2016
2017static void
4aef7643 2018ppc_elf_info_to_howto (bfd *abfd,
25dbc73a
AM
2019 arelent *cache_ptr,
2020 Elf_Internal_Rela *dst)
2021{
cd21f5da
NC
2022 unsigned int r_type;
2023
25dbc73a
AM
2024 /* Initialize howto table if not already done. */
2025 if (!ppc_elf_howto_table[R_PPC_ADDR32])
2026 ppc_elf_howto_init ();
2027
cd21f5da
NC
2028 r_type = ELF32_R_TYPE (dst->r_info);
2029 if (r_type >= R_PPC_max)
2030 {
695344c0 2031 /* xgettext:c-format */
871b3ab2 2032 _bfd_error_handler (_("%pB: unrecognised PPC reloc number: %d"),
4eca0228 2033 abfd, r_type);
cd21f5da
NC
2034 bfd_set_error (bfd_error_bad_value);
2035 r_type = R_PPC_NONE;
2036 }
2037 cache_ptr->howto = ppc_elf_howto_table[r_type];
375de94a
AM
2038
2039 /* Just because the above assert didn't trigger doesn't mean that
2040 ELF32_R_TYPE (dst->r_info) is necessarily a valid relocation. */
2041 if (!cache_ptr->howto)
2042 {
695344c0 2043 /* xgettext:c-format */
871b3ab2 2044 _bfd_error_handler (_("%pB: invalid relocation type %d"),
4eca0228 2045 abfd, r_type);
375de94a
AM
2046 bfd_set_error (bfd_error_bad_value);
2047
2048 cache_ptr->howto = ppc_elf_howto_table[R_PPC_NONE];
2049 }
25dbc73a
AM
2050}
2051
d7128ce4 2052/* Handle the R_PPC_ADDR16_HA and R_PPC_REL16_HA relocs. */
25dbc73a
AM
2053
2054static bfd_reloc_status_type
4aef7643 2055ppc_elf_addr16_ha_reloc (bfd *abfd,
25dbc73a
AM
2056 arelent *reloc_entry,
2057 asymbol *symbol,
4aef7643 2058 void *data,
25dbc73a
AM
2059 asection *input_section,
2060 bfd *output_bfd,
2061 char **error_message ATTRIBUTE_UNUSED)
2062{
a680de9a
PB
2063 enum elf_ppc_reloc_type r_type;
2064 long insn;
2065 bfd_size_type octets;
2066 bfd_vma value;
25dbc73a
AM
2067
2068 if (output_bfd != NULL)
2069 {
2070 reloc_entry->address += input_section->output_offset;
2071 return bfd_reloc_ok;
2072 }
2073
a680de9a
PB
2074 reloc_entry->addend += 0x8000;
2075 r_type = reloc_entry->howto->type;
2076 if (r_type != R_PPC_REL16DX_HA)
2077 return bfd_reloc_continue;
2078
2079 value = 0;
2080 if (!bfd_is_com_section (symbol->section))
2081 value = symbol->value;
2082 value += (reloc_entry->addend
2083 + symbol->section->output_offset
2084 + symbol->section->output_section->vma);
2085 value -= (reloc_entry->address
2086 + input_section->output_offset
2087 + input_section->output_section->vma);
2088 value >>= 16;
2089
2090 octets = reloc_entry->address * bfd_octets_per_byte (abfd);
2091 insn = bfd_get_32 (abfd, (bfd_byte *) data + octets);
2092 insn &= ~0x1fffc1;
2093 insn |= (value & 0xffc1) | ((value & 0x3e) << 15);
2094 bfd_put_32 (abfd, insn, (bfd_byte *) data + octets);
2095 return bfd_reloc_ok;
25dbc73a
AM
2096}
2097
2098static bfd_reloc_status_type
2099ppc_elf_unhandled_reloc (bfd *abfd,
2100 arelent *reloc_entry,
2101 asymbol *symbol,
2102 void *data,
2103 asection *input_section,
2104 bfd *output_bfd,
2105 char **error_message)
2106{
2107 /* If this is a relocatable link (output_bfd test tells us), just
2108 call the generic function. Any adjustment will be done at final
2109 link time. */
2110 if (output_bfd != NULL)
2111 return bfd_elf_generic_reloc (abfd, reloc_entry, symbol, data,
2112 input_section, output_bfd, error_message);
2113
2114 if (error_message != NULL)
2115 {
2116 static char buf[60];
2117 sprintf (buf, _("generic linker can't handle %s"),
2118 reloc_entry->howto->name);
2119 *error_message = buf;
2120 }
2121 return bfd_reloc_dangerous;
2122}
2123\f
2124/* Sections created by the linker. */
2125
2126typedef struct elf_linker_section
2127{
c9a2f333 2128 /* Pointer to the bfd section. */
25dbc73a 2129 asection *section;
c9a2f333
AM
2130 /* Section name. */
2131 const char *name;
2132 /* Associated bss section name. */
2133 const char *bss_name;
2134 /* Associated symbol name. */
2135 const char *sym_name;
046183de
AM
2136 /* Associated symbol. */
2137 struct elf_link_hash_entry *sym;
25dbc73a
AM
2138} elf_linker_section_t;
2139
2140/* Linked list of allocated pointer entries. This hangs off of the
2141 symbol lists, and provides allows us to return different pointers,
2142 based on different addend's. */
2143
2144typedef struct elf_linker_section_pointers
2145{
2146 /* next allocated pointer for this symbol */
2147 struct elf_linker_section_pointers *next;
2148 /* offset of pointer from beginning of section */
2149 bfd_vma offset;
2150 /* addend used */
2151 bfd_vma addend;
2152 /* which linker section this is */
2153 elf_linker_section_t *lsect;
25dbc73a
AM
2154} elf_linker_section_pointers_t;
2155
2156struct ppc_elf_obj_tdata
2157{
2158 struct elf_obj_tdata elf;
2159
2160 /* A mapping from local symbols to offsets into the various linker
2161 sections added. This is index by the symbol index. */
2162 elf_linker_section_pointers_t **linker_section_pointers;
016687f8
AM
2163
2164 /* Flags used to auto-detect plt type. */
2165 unsigned int makes_plt_call : 1;
2166 unsigned int has_rel16 : 1;
25dbc73a
AM
2167};
2168
2169#define ppc_elf_tdata(bfd) \
2170 ((struct ppc_elf_obj_tdata *) (bfd)->tdata.any)
7619e7c7 2171
25dbc73a
AM
2172#define elf_local_ptr_offsets(bfd) \
2173 (ppc_elf_tdata (bfd)->linker_section_pointers)
7619e7c7 2174
0c8d6e5c
AM
2175#define is_ppc_elf(bfd) \
2176 (bfd_get_flavour (bfd) == bfd_target_elf_flavour \
4dfe6ac6 2177 && elf_object_id (bfd) == PPC32_ELF_DATA)
0c8d6e5c 2178
25dbc73a 2179/* Override the generic function because we store some extras. */
7619e7c7 2180
25dbc73a
AM
2181static bfd_boolean
2182ppc_elf_mkobject (bfd *abfd)
2183{
0ffa91dd 2184 return bfd_elf_allocate_object (abfd, sizeof (struct ppc_elf_obj_tdata),
4dfe6ac6 2185 PPC32_ELF_DATA);
25dbc73a 2186}
7619e7c7 2187
14b57c7c
AM
2188/* When defaulting arch/mach, decode apuinfo to find a better match. */
2189
2190bfd_boolean
2191_bfd_elf_ppc_set_arch (bfd *abfd)
2192{
2193 unsigned long mach = 0;
2194 asection *s;
2195 unsigned char *contents;
2196
2197 if (abfd->arch_info->bits_per_word == 32
2198 && bfd_big_endian (abfd))
2199 {
2200
2201 for (s = abfd->sections; s != NULL; s = s->next)
2202 if ((elf_section_data (s)->this_hdr.sh_flags & SHF_PPC_VLE) != 0)
2203 break;
2204 if (s != NULL)
2205 mach = bfd_mach_ppc_vle;
2206 }
2207
2208 if (mach == 0)
2209 {
2210 s = bfd_get_section_by_name (abfd, APUINFO_SECTION_NAME);
2211 if (s != NULL && bfd_malloc_and_get_section (abfd, s, &contents))
2212 {
2213 unsigned int apuinfo_size = bfd_get_32 (abfd, contents + 4);
2214 unsigned int i;
2215
2216 for (i = 20; i < apuinfo_size + 20 && i + 4 <= s->size; i += 4)
2217 {
2218 unsigned int val = bfd_get_32 (abfd, contents + i);
2219 switch (val >> 16)
2220 {
2221 case PPC_APUINFO_PMR:
2222 case PPC_APUINFO_RFMCI:
2223 if (mach == 0)
2224 mach = bfd_mach_ppc_titan;
2225 break;
2226
2227 case PPC_APUINFO_ISEL:
2228 case PPC_APUINFO_CACHELCK:
2229 if (mach == bfd_mach_ppc_titan)
2230 mach = bfd_mach_ppc_e500mc;
2231 break;
2232
2233 case PPC_APUINFO_SPE:
2234 case PPC_APUINFO_EFS:
2235 case PPC_APUINFO_BRLOCK:
2236 if (mach != bfd_mach_ppc_vle)
2237 mach = bfd_mach_ppc_e500;
8941017b 2238 break;
14b57c7c
AM
2239
2240 case PPC_APUINFO_VLE:
2241 mach = bfd_mach_ppc_vle;
2242 break;
2243
2244 default:
2245 mach = -1ul;
2246 }
2247 }
2248 free (contents);
2249 }
2250 }
2251
2252 if (mach != 0 && mach != -1ul)
2253 {
2254 const bfd_arch_info_type *arch;
2255
2256 for (arch = abfd->arch_info->next; arch; arch = arch->next)
2257 if (arch->mach == mach)
2258 {
2259 abfd->arch_info = arch;
2260 break;
2261 }
2262 }
2263 return TRUE;
2264}
2265
25dbc73a 2266/* Fix bad default arch selected for a 32 bit input bfd when the
14b57c7c 2267 default is 64 bit. Also select arch based on apuinfo. */
7619e7c7 2268
25dbc73a
AM
2269static bfd_boolean
2270ppc_elf_object_p (bfd *abfd)
2271{
14b57c7c
AM
2272 if (!abfd->arch_info->the_default)
2273 return TRUE;
2274
2275 if (abfd->arch_info->bits_per_word == 64)
25dbc73a
AM
2276 {
2277 Elf_Internal_Ehdr *i_ehdr = elf_elfheader (abfd);
7619e7c7 2278
25dbc73a
AM
2279 if (i_ehdr->e_ident[EI_CLASS] == ELFCLASS32)
2280 {
2281 /* Relies on arch after 64 bit default being 32 bit default. */
2282 abfd->arch_info = abfd->arch_info->next;
2283 BFD_ASSERT (abfd->arch_info->bits_per_word == 32);
2284 }
2285 }
14b57c7c 2286 return _bfd_elf_ppc_set_arch (abfd);
25dbc73a 2287}
7619e7c7 2288
25dbc73a 2289/* Function to set whether a module needs the -mrelocatable bit set. */
7619e7c7 2290
25dbc73a
AM
2291static bfd_boolean
2292ppc_elf_set_private_flags (bfd *abfd, flagword flags)
2293{
2294 BFD_ASSERT (!elf_flags_init (abfd)
2295 || elf_elfheader (abfd)->e_flags == flags);
7619e7c7 2296
25dbc73a
AM
2297 elf_elfheader (abfd)->e_flags = flags;
2298 elf_flags_init (abfd) = TRUE;
2299 return TRUE;
2300}
2301
25dbc73a 2302/* Support for core dump NOTE sections. */
deaaf2f3 2303
b34976b6 2304static bfd_boolean
25dbc73a 2305ppc_elf_grok_prstatus (bfd *abfd, Elf_Internal_Note *note)
252b5132 2306{
25dbc73a
AM
2307 int offset;
2308 unsigned int size;
252b5132 2309
25dbc73a
AM
2310 switch (note->descsz)
2311 {
2312 default:
2313 return FALSE;
252b5132 2314
25dbc73a
AM
2315 case 268: /* Linux/PPC. */
2316 /* pr_cursig */
228e534f 2317 elf_tdata (abfd)->core->signal = bfd_get_16 (abfd, note->descdata + 12);
deaaf2f3 2318
25dbc73a 2319 /* pr_pid */
228e534f 2320 elf_tdata (abfd)->core->lwpid = bfd_get_32 (abfd, note->descdata + 24);
9abc968f 2321
25dbc73a
AM
2322 /* pr_reg */
2323 offset = 72;
2324 size = 192;
deaaf2f3 2325
25dbc73a
AM
2326 break;
2327 }
deaaf2f3 2328
25dbc73a
AM
2329 /* Make a ".reg/999" section. */
2330 return _bfd_elfcore_make_pseudosection (abfd, ".reg",
2331 size, note->descpos + offset);
2332}
252b5132 2333
25dbc73a
AM
2334static bfd_boolean
2335ppc_elf_grok_psinfo (bfd *abfd, Elf_Internal_Note *note)
2336{
2337 switch (note->descsz)
deaaf2f3 2338 {
25dbc73a
AM
2339 default:
2340 return FALSE;
deaaf2f3 2341
25dbc73a 2342 case 128: /* Linux/PPC elf_prpsinfo. */
228e534f 2343 elf_tdata (abfd)->core->pid
bc989cdc 2344 = bfd_get_32 (abfd, note->descdata + 16);
228e534f 2345 elf_tdata (abfd)->core->program
25dbc73a 2346 = _bfd_elfcore_strndup (abfd, note->descdata + 32, 16);
228e534f 2347 elf_tdata (abfd)->core->command
25dbc73a
AM
2348 = _bfd_elfcore_strndup (abfd, note->descdata + 48, 80);
2349 }
9abc968f 2350
25dbc73a
AM
2351 /* Note that for some reason, a spurious space is tacked
2352 onto the end of the args in some (at least one anyway)
2353 implementations, so strip it off if it exists. */
70bccea4 2354
25dbc73a 2355 {
228e534f 2356 char *command = elf_tdata (abfd)->core->command;
25dbc73a 2357 int n = strlen (command);
70bccea4 2358
25dbc73a
AM
2359 if (0 < n && command[n - 1] == ' ')
2360 command[n - 1] = '\0';
2361 }
deaaf2f3 2362
25dbc73a
AM
2363 return TRUE;
2364}
deaaf2f3 2365
183e98be
AM
2366static char *
2367ppc_elf_write_core_note (bfd *abfd, char *buf, int *bufsiz, int note_type, ...)
2368{
2369 switch (note_type)
2370 {
2371 default:
2372 return NULL;
2373
2374 case NT_PRPSINFO:
2375 {
2376 char data[128];
2377 va_list ap;
2378
2379 va_start (ap, note_type);
75cd47ed 2380 memset (data, 0, sizeof (data));
183e98be
AM
2381 strncpy (data + 32, va_arg (ap, const char *), 16);
2382 strncpy (data + 48, va_arg (ap, const char *), 80);
2383 va_end (ap);
2384 return elfcore_write_note (abfd, buf, bufsiz,
2385 "CORE", note_type, data, sizeof (data));
2386 }
2387
2388 case NT_PRSTATUS:
2389 {
2390 char data[268];
2391 va_list ap;
2392 long pid;
2393 int cursig;
2394 const void *greg;
2395
2396 va_start (ap, note_type);
2397 memset (data, 0, 72);
2398 pid = va_arg (ap, long);
2399 bfd_put_32 (abfd, pid, data + 24);
2400 cursig = va_arg (ap, int);
2401 bfd_put_16 (abfd, cursig, data + 12);
2402 greg = va_arg (ap, const void *);
2403 memcpy (data + 72, greg, 192);
2404 memset (data + 264, 0, 4);
2405 va_end (ap);
2406 return elfcore_write_note (abfd, buf, bufsiz,
2407 "CORE", note_type, data, sizeof (data));
2408 }
2409 }
2410}
2411
b9c361e0 2412static flagword
68ffbac6 2413ppc_elf_lookup_section_flags (char *flag_name)
b9c361e0
JL
2414{
2415
2416 if (!strcmp (flag_name, "SHF_PPC_VLE"))
2417 return SHF_PPC_VLE;
2418
2419 return 0;
2420}
2421
25dbc73a
AM
2422/* Return address for Ith PLT stub in section PLT, for relocation REL
2423 or (bfd_vma) -1 if it should not be included. */
deaaf2f3 2424
25dbc73a
AM
2425static bfd_vma
2426ppc_elf_plt_sym_val (bfd_vma i ATTRIBUTE_UNUSED,
2427 const asection *plt ATTRIBUTE_UNUSED,
2428 const arelent *rel)
2429{
2430 return rel->address;
2431}
deaaf2f3 2432
25dbc73a 2433/* Handle a PowerPC specific section when reading an object file. This
6dc132d9
L
2434 is called when bfd_section_from_shdr finds a section with an unknown
2435 type. */
deaaf2f3 2436
25dbc73a 2437static bfd_boolean
6dc132d9
L
2438ppc_elf_section_from_shdr (bfd *abfd,
2439 Elf_Internal_Shdr *hdr,
2440 const char *name,
2441 int shindex)
25dbc73a
AM
2442{
2443 asection *newsect;
2444 flagword flags;
d1c6de6f 2445
6dc132d9 2446 if (! _bfd_elf_make_section_from_shdr (abfd, hdr, name, shindex))
25dbc73a 2447 return FALSE;
deaaf2f3 2448
25dbc73a
AM
2449 newsect = hdr->bfd_section;
2450 flags = bfd_get_section_flags (abfd, newsect);
2451 if (hdr->sh_flags & SHF_EXCLUDE)
2452 flags |= SEC_EXCLUDE;
9abc968f 2453
25dbc73a
AM
2454 if (hdr->sh_type == SHT_ORDERED)
2455 flags |= SEC_SORT_ENTRIES;
d1c6de6f 2456
25dbc73a
AM
2457 bfd_set_section_flags (abfd, newsect, flags);
2458 return TRUE;
2459}
2460
2461/* Set up any other section flags and such that may be necessary. */
2462
2463static bfd_boolean
2464ppc_elf_fake_sections (bfd *abfd ATTRIBUTE_UNUSED,
2465 Elf_Internal_Shdr *shdr,
2466 asection *asect)
2467{
25dbc73a
AM
2468 if ((asect->flags & SEC_SORT_ENTRIES) != 0)
2469 shdr->sh_type = SHT_ORDERED;
2470
2471 return TRUE;
2472}
2473
2474/* If we have .sbss2 or .PPC.EMB.sbss0 output sections, we
2475 need to bump up the number of section headers. */
2476
2477static int
a6b96beb
AM
2478ppc_elf_additional_program_headers (bfd *abfd,
2479 struct bfd_link_info *info ATTRIBUTE_UNUSED)
25dbc73a
AM
2480{
2481 asection *s;
2482 int ret = 0;
d1c6de6f 2483
25dbc73a
AM
2484 s = bfd_get_section_by_name (abfd, ".sbss2");
2485 if (s != NULL && (s->flags & SEC_ALLOC) != 0)
2486 ++ret;
d1c6de6f 2487
25dbc73a
AM
2488 s = bfd_get_section_by_name (abfd, ".PPC.EMB.sbss0");
2489 if (s != NULL && (s->flags & SEC_ALLOC) != 0)
2490 ++ret;
deaaf2f3 2491
25dbc73a
AM
2492 return ret;
2493}
deaaf2f3 2494
68ffbac6 2495/* Modify the segment map for VLE executables. */
b9c361e0
JL
2496
2497bfd_boolean
2498ppc_elf_modify_segment_map (bfd *abfd,
2499 struct bfd_link_info *info ATTRIBUTE_UNUSED)
2500{
f7d69005 2501 struct elf_segment_map *m;
b9c361e0
JL
2502
2503 /* At this point in the link, output sections have already been sorted by
2504 LMA and assigned to segments. All that is left to do is to ensure
2505 there is no mixing of VLE & non-VLE sections in a text segment.
2506 If we find that case, we split the segment.
2507 We maintain the original output section order. */
2508
12bd6957 2509 for (m = elf_seg_map (abfd); m != NULL; m = m->next)
b9c361e0 2510 {
f7d69005
AM
2511 struct elf_segment_map *n;
2512 bfd_size_type amt;
2513 unsigned int j, k;
2514 unsigned int p_flags;
2515
2516 if (m->p_type != PT_LOAD || m->count == 0)
b9c361e0
JL
2517 continue;
2518
f7d69005 2519 for (p_flags = PF_R, j = 0; j != m->count; ++j)
b9c361e0 2520 {
f7d69005
AM
2521 if ((m->sections[j]->flags & SEC_READONLY) == 0)
2522 p_flags |= PF_W;
2523 if ((m->sections[j]->flags & SEC_CODE) != 0)
2524 {
2525 p_flags |= PF_X;
2526 if ((elf_section_flags (m->sections[j]) & SHF_PPC_VLE) != 0)
2527 p_flags |= PF_PPC_VLE;
2528 break;
2529 }
2530 }
2531 if (j != m->count)
2532 while (++j != m->count)
2533 {
2534 unsigned int p_flags1 = PF_R;
94caa966 2535
f7d69005
AM
2536 if ((m->sections[j]->flags & SEC_READONLY) == 0)
2537 p_flags1 |= PF_W;
2538 if ((m->sections[j]->flags & SEC_CODE) != 0)
2539 {
2540 p_flags1 |= PF_X;
2541 if ((elf_section_flags (m->sections[j]) & SHF_PPC_VLE) != 0)
2542 p_flags1 |= PF_PPC_VLE;
2543 if (((p_flags1 ^ p_flags) & PF_PPC_VLE) != 0)
2544 break;
2545 }
2546 p_flags |= p_flags1;
2547 }
2548 /* If we're splitting a segment which originally contained rw
2549 sections then those sections might now only be in one of the
2550 two parts. So always set p_flags if splitting, even if we
2551 are being called for objcopy with p_flags_valid set. */
2552 if (j != m->count || !m->p_flags_valid)
2553 {
2554 m->p_flags_valid = 1;
2555 m->p_flags = p_flags;
2556 }
2557 if (j == m->count)
b9c361e0
JL
2558 continue;
2559
f7d69005 2560 /* Sections 0..j-1 stay in this (current) segment,
b9c361e0
JL
2561 the remainder are put in a new segment.
2562 The scan resumes with the new segment. */
2563
b9c361e0
JL
2564 amt = sizeof (struct elf_segment_map);
2565 amt += (m->count - j - 1) * sizeof (asection *);
2566 n = (struct elf_segment_map *) bfd_zalloc (abfd, amt);
2567 if (n == NULL)
954b63d4 2568 return FALSE;
b9c361e0
JL
2569
2570 n->p_type = PT_LOAD;
b9c361e0
JL
2571 n->count = m->count - j;
2572 for (k = 0; k < n->count; ++k)
f7d69005
AM
2573 n->sections[k] = m->sections[j + k];
2574 m->count = j;
2575 m->p_size_valid = 0;
b9c361e0
JL
2576 n->next = m->next;
2577 m->next = n;
b9c361e0
JL
2578 }
2579
2580 return TRUE;
2581}
2582
25dbc73a
AM
2583/* Add extra PPC sections -- Note, for now, make .sbss2 and
2584 .PPC.EMB.sbss0 a normal section, and not a bss section so
2585 that the linker doesn't crater when trying to make more than
2586 2 sections. */
e656e369 2587
b35d266b 2588static const struct bfd_elf_special_section ppc_elf_special_sections[] =
7f4d3958 2589{
14b57c7c
AM
2590 { STRING_COMMA_LEN (".plt"), 0, SHT_NOBITS, SHF_ALLOC + SHF_EXECINSTR },
2591 { STRING_COMMA_LEN (".sbss"), -2, SHT_NOBITS, SHF_ALLOC + SHF_WRITE },
2592 { STRING_COMMA_LEN (".sbss2"), -2, SHT_PROGBITS, SHF_ALLOC },
2593 { STRING_COMMA_LEN (".sdata"), -2, SHT_PROGBITS, SHF_ALLOC + SHF_WRITE },
2594 { STRING_COMMA_LEN (".sdata2"), -2, SHT_PROGBITS, SHF_ALLOC },
2595 { STRING_COMMA_LEN (".tags"), 0, SHT_ORDERED, SHF_ALLOC },
2596 { STRING_COMMA_LEN (APUINFO_SECTION_NAME), 0, SHT_NOTE, 0 },
2597 { STRING_COMMA_LEN (".PPC.EMB.sbss0"), 0, SHT_PROGBITS, SHF_ALLOC },
2598 { STRING_COMMA_LEN (".PPC.EMB.sdata0"), 0, SHT_PROGBITS, SHF_ALLOC },
2599 { NULL, 0, 0, 0, 0 }
7f4d3958
L
2600};
2601
551b43fd
AM
2602/* This is what we want for new plt/got. */
2603static struct bfd_elf_special_section ppc_alt_plt =
07d6d2b8 2604 { STRING_COMMA_LEN (".plt"), 0, SHT_PROGBITS, SHF_ALLOC };
551b43fd
AM
2605
2606static const struct bfd_elf_special_section *
4aef7643 2607ppc_elf_get_sec_type_attr (bfd *abfd, asection *sec)
7f4d3958 2608{
b35d266b 2609 const struct bfd_elf_special_section *ssect;
551b43fd
AM
2610
2611 /* See if this is one of the special sections. */
2612 if (sec->name == NULL)
2613 return NULL;
2614
2615 ssect = _bfd_elf_get_special_section (sec->name, ppc_elf_special_sections,
2616 sec->use_rela_p);
2617 if (ssect != NULL)
2618 {
2619 if (ssect == ppc_elf_special_sections && (sec->flags & SEC_LOAD) != 0)
2620 ssect = &ppc_alt_plt;
2621 return ssect;
2622 }
2623
2624 return _bfd_elf_get_sec_type_attr (abfd, sec);
2625}
25dbc73a
AM
2626\f
2627/* Very simple linked list structure for recording apuinfo values. */
2628typedef struct apuinfo_list
2629{
2630 struct apuinfo_list *next;
2631 unsigned long value;
2632}
2633apuinfo_list;
e656e369 2634
25dbc73a 2635static apuinfo_list *head;
f2faa800 2636static bfd_boolean apuinfo_set;
deaaf2f3 2637
25dbc73a
AM
2638static void
2639apuinfo_list_init (void)
2640{
2641 head = NULL;
f2faa800 2642 apuinfo_set = FALSE;
25dbc73a 2643}
9abc968f 2644
25dbc73a
AM
2645static void
2646apuinfo_list_add (unsigned long value)
2647{
2648 apuinfo_list *entry = head;
deaaf2f3 2649
25dbc73a
AM
2650 while (entry != NULL)
2651 {
2652 if (entry->value == value)
2653 return;
2654 entry = entry->next;
2655 }
b4a38de6 2656
25dbc73a
AM
2657 entry = bfd_malloc (sizeof (* entry));
2658 if (entry == NULL)
2659 return;
e656e369 2660
25dbc73a
AM
2661 entry->value = value;
2662 entry->next = head;
2663 head = entry;
2664}
9abc968f 2665
25dbc73a
AM
2666static unsigned
2667apuinfo_list_length (void)
2668{
2669 apuinfo_list *entry;
2670 unsigned long count;
9abc968f 2671
25dbc73a
AM
2672 for (entry = head, count = 0;
2673 entry;
2674 entry = entry->next)
2675 ++ count;
e656e369 2676
25dbc73a
AM
2677 return count;
2678}
eea6121a 2679
25dbc73a
AM
2680static inline unsigned long
2681apuinfo_list_element (unsigned long number)
2682{
2683 apuinfo_list * entry;
e656e369 2684
25dbc73a
AM
2685 for (entry = head;
2686 entry && number --;
2687 entry = entry->next)
2688 ;
252b5132 2689
25dbc73a
AM
2690 return entry ? entry->value : 0;
2691}
2692
2693static void
2694apuinfo_list_finish (void)
2695{
2696 apuinfo_list *entry;
2697
2698 for (entry = head; entry;)
252b5132 2699 {
25dbc73a
AM
2700 apuinfo_list *next = entry->next;
2701 free (entry);
2702 entry = next;
2703 }
9abc968f 2704
25dbc73a
AM
2705 head = NULL;
2706}
9abc968f 2707
25dbc73a
AM
2708/* Scan the input BFDs and create a linked list of
2709 the APUinfo values that will need to be emitted. */
9abc968f 2710
25dbc73a
AM
2711static void
2712ppc_elf_begin_write_processing (bfd *abfd, struct bfd_link_info *link_info)
2713{
2714 bfd *ibfd;
2715 asection *asec;
deddc40b
NS
2716 char *buffer = NULL;
2717 bfd_size_type largest_input_size = 0;
25dbc73a 2718 unsigned i;
25dbc73a
AM
2719 unsigned long length;
2720 const char *error_message = NULL;
9abc968f 2721
25dbc73a
AM
2722 if (link_info == NULL)
2723 return;
9abc968f 2724
25dbc73a 2725 apuinfo_list_init ();
252b5132 2726
25dbc73a 2727 /* Read in the input sections contents. */
c72f2fb2 2728 for (ibfd = link_info->input_bfds; ibfd; ibfd = ibfd->link.next)
252b5132 2729 {
25dbc73a 2730 unsigned long datum;
252b5132 2731
25dbc73a
AM
2732 asec = bfd_get_section_by_name (ibfd, APUINFO_SECTION_NAME);
2733 if (asec == NULL)
2734 continue;
252b5132 2735
695344c0 2736 /* xgettext:c-format */
871b3ab2 2737 error_message = _("corrupt %s section in %pB");
25dbc73a 2738 length = asec->size;
deddc40b
NS
2739 if (length < 20)
2740 goto fail;
2741
f2faa800 2742 apuinfo_set = TRUE;
deddc40b 2743 if (largest_input_size < asec->size)
25dbc73a 2744 {
deddc40b
NS
2745 if (buffer)
2746 free (buffer);
2747 largest_input_size = asec->size;
2748 buffer = bfd_malloc (largest_input_size);
2749 if (!buffer)
2750 return;
25dbc73a 2751 }
5b914448 2752
25dbc73a 2753 if (bfd_seek (ibfd, asec->filepos, SEEK_SET) != 0
deddc40b 2754 || (bfd_bread (buffer, length, ibfd) != length))
25dbc73a 2755 {
695344c0 2756 /* xgettext:c-format */
871b3ab2 2757 error_message = _("unable to read in %s section from %pB");
25dbc73a
AM
2758 goto fail;
2759 }
252b5132 2760
25dbc73a
AM
2761 /* Verify the contents of the header. Note - we have to
2762 extract the values this way in order to allow for a
2763 host whose endian-ness is different from the target. */
deddc40b 2764 datum = bfd_get_32 (ibfd, buffer);
25dbc73a
AM
2765 if (datum != sizeof APUINFO_LABEL)
2766 goto fail;
252b5132 2767
deddc40b 2768 datum = bfd_get_32 (ibfd, buffer + 8);
25dbc73a
AM
2769 if (datum != 0x2)
2770 goto fail;
252b5132 2771
deddc40b 2772 if (strcmp (buffer + 12, APUINFO_LABEL) != 0)
25dbc73a 2773 goto fail;
252b5132 2774
25dbc73a 2775 /* Get the number of bytes used for apuinfo entries. */
deddc40b 2776 datum = bfd_get_32 (ibfd, buffer + 4);
25dbc73a
AM
2777 if (datum + 20 != length)
2778 goto fail;
2779
25dbc73a
AM
2780 /* Scan the apuinfo section, building a list of apuinfo numbers. */
2781 for (i = 0; i < datum; i += 4)
deddc40b 2782 apuinfo_list_add (bfd_get_32 (ibfd, buffer + 20 + i));
252b5132
RH
2783 }
2784
25dbc73a 2785 error_message = NULL;
252b5132 2786
f2faa800 2787 if (apuinfo_set)
deddc40b 2788 {
f2faa800
NS
2789 /* Compute the size of the output section. */
2790 unsigned num_entries = apuinfo_list_length ();
5b914448 2791
deddc40b
NS
2792 /* Set the output section size, if it exists. */
2793 asec = bfd_get_section_by_name (abfd, APUINFO_SECTION_NAME);
f2faa800 2794
deddc40b
NS
2795 if (asec && ! bfd_set_section_size (abfd, asec, 20 + num_entries * 4))
2796 {
2797 ibfd = abfd;
695344c0 2798 /* xgettext:c-format */
871b3ab2 2799 error_message = _("warning: unable to set size of %s section in %pB");
deddc40b
NS
2800 }
2801 }
25dbc73a
AM
2802
2803 fail:
deddc40b
NS
2804 if (buffer)
2805 free (buffer);
25dbc73a
AM
2806
2807 if (error_message)
cd9af601 2808 _bfd_error_handler (error_message, APUINFO_SECTION_NAME, ibfd);
25dbc73a 2809}
252b5132 2810
25dbc73a
AM
2811/* Prevent the output section from accumulating the input sections'
2812 contents. We have already stored this in our linked list structure. */
252b5132 2813
25dbc73a
AM
2814static bfd_boolean
2815ppc_elf_write_section (bfd *abfd ATTRIBUTE_UNUSED,
c7b8f16e 2816 struct bfd_link_info *link_info ATTRIBUTE_UNUSED,
25dbc73a
AM
2817 asection *asec,
2818 bfd_byte *contents ATTRIBUTE_UNUSED)
2819{
f2faa800 2820 return apuinfo_set && strcmp (asec->name, APUINFO_SECTION_NAME) == 0;
252b5132
RH
2821}
2822
25dbc73a
AM
2823/* Finally we can generate the output section. */
2824
2825static void
2826ppc_elf_final_write_processing (bfd *abfd, bfd_boolean linker ATTRIBUTE_UNUSED)
7619e7c7 2827{
25dbc73a
AM
2828 bfd_byte *buffer;
2829 asection *asec;
2830 unsigned i;
2831 unsigned num_entries;
2832 bfd_size_type length;
7619e7c7 2833
25dbc73a
AM
2834 asec = bfd_get_section_by_name (abfd, APUINFO_SECTION_NAME);
2835 if (asec == NULL)
2836 return;
2837
f2faa800 2838 if (!apuinfo_set)
25dbc73a
AM
2839 return;
2840
2841 length = asec->size;
2842 if (length < 20)
2843 return;
2844
2845 buffer = bfd_malloc (length);
2846 if (buffer == NULL)
7619e7c7 2847 {
4eca0228 2848 _bfd_error_handler
25dbc73a
AM
2849 (_("failed to allocate space for new APUinfo section."));
2850 return;
7619e7c7 2851 }
7619e7c7 2852
25dbc73a
AM
2853 /* Create the apuinfo header. */
2854 num_entries = apuinfo_list_length ();
2855 bfd_put_32 (abfd, sizeof APUINFO_LABEL, buffer);
2856 bfd_put_32 (abfd, num_entries * 4, buffer + 4);
2857 bfd_put_32 (abfd, 0x2, buffer + 8);
2858 strcpy ((char *) buffer + 12, APUINFO_LABEL);
feee612b 2859
25dbc73a
AM
2860 length = 20;
2861 for (i = 0; i < num_entries; i++)
feee612b 2862 {
25dbc73a
AM
2863 bfd_put_32 (abfd, apuinfo_list_element (i), buffer + length);
2864 length += 4;
feee612b 2865 }
feee612b 2866
25dbc73a 2867 if (length != asec->size)
4eca0228 2868 _bfd_error_handler (_("failed to compute new APUinfo section."));
252b5132 2869
25dbc73a 2870 if (! bfd_set_section_contents (abfd, asec, buffer, (file_ptr) 0, length))
4eca0228 2871 _bfd_error_handler (_("failed to install new APUinfo section."));
252b5132 2872
25dbc73a
AM
2873 free (buffer);
2874
2875 apuinfo_list_finish ();
252b5132 2876}
25dbc73a 2877\f
7382d32a 2878static bfd_boolean
c6dd29ce 2879is_nonpic_glink_stub (bfd *abfd, asection *glink, bfd_vma off)
7382d32a 2880{
407aa07c 2881 bfd_byte buf[4 * 4];
7382d32a 2882
9e390558 2883 if (!bfd_get_section_contents (abfd, glink, buf, off, sizeof buf))
7382d32a
AM
2884 return FALSE;
2885
c6dd29ce
AM
2886 return ((bfd_get_32 (abfd, buf + 0) & 0xffff0000) == LIS_11
2887 && (bfd_get_32 (abfd, buf + 4) & 0xffff0000) == LWZ_11_11
407aa07c
AM
2888 && bfd_get_32 (abfd, buf + 8) == MTCTR_11
2889 && bfd_get_32 (abfd, buf + 12) == BCTR);
7382d32a
AM
2890}
2891
468392fb
AM
2892static bfd_boolean
2893section_covers_vma (bfd *abfd ATTRIBUTE_UNUSED, asection *section, void *ptr)
2894{
2895 bfd_vma vma = *(bfd_vma *) ptr;
2896 return ((section->flags & SEC_ALLOC) != 0
2897 && section->vma <= vma
2898 && vma < section->vma + section->size);
2899}
2900
2901static long
2902ppc_elf_get_synthetic_symtab (bfd *abfd, long symcount, asymbol **syms,
2903 long dynsymcount, asymbol **dynsyms,
2904 asymbol **ret)
2905{
2906 bfd_boolean (*slurp_relocs) (bfd *, asection *, asymbol **, bfd_boolean);
2907 asection *plt, *relplt, *dynamic, *glink;
2908 bfd_vma glink_vma = 0;
2909 bfd_vma resolv_vma = 0;
9e390558 2910 bfd_vma stub_off;
468392fb
AM
2911 asymbol *s;
2912 arelent *p;
9e390558 2913 long count, i, stub_delta;
468392fb
AM
2914 size_t size;
2915 char *names;
2916 bfd_byte buf[4];
2917
2918 *ret = NULL;
2919
2920 if ((abfd->flags & (DYNAMIC | EXEC_P)) == 0)
2921 return 0;
2922
2923 if (dynsymcount <= 0)
2924 return 0;
2925
2926 relplt = bfd_get_section_by_name (abfd, ".rela.plt");
2927 if (relplt == NULL)
2928 return 0;
2929
2930 plt = bfd_get_section_by_name (abfd, ".plt");
2931 if (plt == NULL)
2932 return 0;
2933
2934 /* Call common code to handle old-style executable PLTs. */
2935 if (elf_section_flags (plt) & SHF_EXECINSTR)
2936 return _bfd_elf_get_synthetic_symtab (abfd, symcount, syms,
2937 dynsymcount, dynsyms, ret);
2938
2939 /* If this object was prelinked, the prelinker stored the address
2940 of .glink at got[1]. If it wasn't prelinked, got[1] will be zero. */
2941 dynamic = bfd_get_section_by_name (abfd, ".dynamic");
2942 if (dynamic != NULL)
2943 {
2944 bfd_byte *dynbuf, *extdyn, *extdynend;
2945 size_t extdynsize;
2946 void (*swap_dyn_in) (bfd *, const void *, Elf_Internal_Dyn *);
2947
2948 if (!bfd_malloc_and_get_section (abfd, dynamic, &dynbuf))
2949 return -1;
2950
2951 extdynsize = get_elf_backend_data (abfd)->s->sizeof_dyn;
2952 swap_dyn_in = get_elf_backend_data (abfd)->s->swap_dyn_in;
2953
2954 extdyn = dynbuf;
2955 extdynend = extdyn + dynamic->size;
2956 for (; extdyn < extdynend; extdyn += extdynsize)
2957 {
2958 Elf_Internal_Dyn dyn;
2959 (*swap_dyn_in) (abfd, extdyn, &dyn);
2960
2961 if (dyn.d_tag == DT_NULL)
2962 break;
2963
2964 if (dyn.d_tag == DT_PPC_GOT)
2965 {
2966 unsigned int g_o_t = dyn.d_un.d_val;
2967 asection *got = bfd_get_section_by_name (abfd, ".got");
2968 if (got != NULL
2969 && bfd_get_section_contents (abfd, got, buf,
2970 g_o_t - got->vma + 4, 4))
2971 glink_vma = bfd_get_32 (abfd, buf);
2972 break;
2973 }
2974 }
2975 free (dynbuf);
2976 }
2977
2978 /* Otherwise we read the first plt entry. */
2979 if (glink_vma == 0)
2980 {
2981 if (bfd_get_section_contents (abfd, plt, buf, 0, 4))
2982 glink_vma = bfd_get_32 (abfd, buf);
2983 }
2984
2985 if (glink_vma == 0)
2986 return 0;
2987
2988 /* The .glink section usually does not survive the final
2989 link; search for the section (usually .text) where the
2990 glink stubs now reside. */
2991 glink = bfd_sections_find_if (abfd, section_covers_vma, &glink_vma);
2992 if (glink == NULL)
2993 return 0;
2994
2995 /* Determine glink PLT resolver by reading the relative branch
2996 from the first glink stub. */
2997 if (bfd_get_section_contents (abfd, glink, buf,
2998 glink_vma - glink->vma, 4))
2999 {
3000 unsigned int insn = bfd_get_32 (abfd, buf);
3001
3002 /* The first glink stub may either branch to the resolver ... */
3003 insn ^= B;
3004 if ((insn & ~0x3fffffc) == 0)
3005 resolv_vma = glink_vma + (insn ^ 0x2000000) - 0x2000000;
3006
3007 /* ... or fall through a bunch of NOPs. */
3008 else if ((insn ^ B ^ NOP) == 0)
3009 for (i = 4;
3010 bfd_get_section_contents (abfd, glink, buf,
3011 glink_vma - glink->vma + i, 4);
3012 i += 4)
3013 if (bfd_get_32 (abfd, buf) != NOP)
3014 {
3015 resolv_vma = glink_vma + i;
3016 break;
3017 }
3018 }
3019
7382d32a 3020 count = relplt->size / sizeof (Elf32_External_Rela);
7382d32a
AM
3021 /* If the stubs are those for -shared/-pie then we might have
3022 multiple stubs for each plt entry. If that is the case then
3023 there is no way to associate stubs with their plt entries short
9e390558
AM
3024 of figuring out the GOT pointer value used in the stub.
3025 The offsets tested here need to cover all possible values of
3026 GLINK_ENTRY_SIZE for other than __tls_get_addr_opt. */
3027 stub_off = glink_vma - glink->vma;
3028 for (stub_delta = 16; stub_delta <= 32; stub_delta += 8)
3029 if (is_nonpic_glink_stub (abfd, glink, stub_off - stub_delta))
3030 break;
3031 if (stub_delta > 32)
7382d32a
AM
3032 return 0;
3033
468392fb
AM
3034 slurp_relocs = get_elf_backend_data (abfd)->s->slurp_reloc_table;
3035 if (! (*slurp_relocs) (abfd, relplt, dynsyms, TRUE))
3036 return -1;
3037
468392fb
AM
3038 size = count * sizeof (asymbol);
3039 p = relplt->relocation;
3040 for (i = 0; i < count; i++, p++)
e054468f
AM
3041 {
3042 size += strlen ((*p->sym_ptr_ptr)->name) + sizeof ("@plt");
3043 if (p->addend != 0)
3044 size += sizeof ("+0x") - 1 + 8;
3045 }
468392fb
AM
3046
3047 size += sizeof (asymbol) + sizeof ("__glink");
3048
3049 if (resolv_vma)
3050 size += sizeof (asymbol) + sizeof ("__glink_PLTresolve");
3051
3052 s = *ret = bfd_malloc (size);
3053 if (s == NULL)
3054 return -1;
3055
9e390558 3056 stub_off = glink_vma - glink->vma;
468392fb 3057 names = (char *) (s + count + 1 + (resolv_vma != 0));
1079403c
AM
3058 p = relplt->relocation + count - 1;
3059 for (i = 0; i < count; i++)
468392fb
AM
3060 {
3061 size_t len;
3062
9e390558
AM
3063 stub_off -= stub_delta;
3064 if (strcmp ((*p->sym_ptr_ptr)->name, "__tls_get_addr_opt") == 0)
3065 stub_off -= 32;
468392fb
AM
3066 *s = **p->sym_ptr_ptr;
3067 /* Undefined syms won't have BSF_LOCAL or BSF_GLOBAL set. Since
3068 we are defining a symbol, ensure one of them is set. */
3069 if ((s->flags & BSF_LOCAL) == 0)
3070 s->flags |= BSF_GLOBAL;
6ba2a415 3071 s->flags |= BSF_SYNTHETIC;
468392fb 3072 s->section = glink;
9e390558 3073 s->value = stub_off;
468392fb
AM
3074 s->name = names;
3075 s->udata.p = NULL;
3076 len = strlen ((*p->sym_ptr_ptr)->name);
3077 memcpy (names, (*p->sym_ptr_ptr)->name, len);
3078 names += len;
e054468f
AM
3079 if (p->addend != 0)
3080 {
3081 memcpy (names, "+0x", sizeof ("+0x") - 1);
3082 names += sizeof ("+0x") - 1;
3083 bfd_sprintf_vma (abfd, names, p->addend);
3084 names += strlen (names);
3085 }
468392fb
AM
3086 memcpy (names, "@plt", sizeof ("@plt"));
3087 names += sizeof ("@plt");
3088 ++s;
1079403c 3089 --p;
468392fb
AM
3090 }
3091
3092 /* Add a symbol at the start of the glink branch table. */
86a4952b 3093 memset (s, 0, sizeof *s);
468392fb 3094 s->the_bfd = abfd;
6ba2a415 3095 s->flags = BSF_GLOBAL | BSF_SYNTHETIC;
468392fb
AM
3096 s->section = glink;
3097 s->value = glink_vma - glink->vma;
3098 s->name = names;
3099 memcpy (names, "__glink", sizeof ("__glink"));
3100 names += sizeof ("__glink");
3101 s++;
3102 count++;
3103
3104 if (resolv_vma)
3105 {
3106 /* Add a symbol for the glink PLT resolver. */
86a4952b 3107 memset (s, 0, sizeof *s);
468392fb 3108 s->the_bfd = abfd;
6ba2a415 3109 s->flags = BSF_GLOBAL | BSF_SYNTHETIC;
468392fb
AM
3110 s->section = glink;
3111 s->value = resolv_vma - glink->vma;
3112 s->name = names;
3113 memcpy (names, "__glink_PLTresolve", sizeof ("__glink_PLTresolve"));
3114 names += sizeof ("__glink_PLTresolve");
3115 s++;
3116 count++;
3117 }
3118
3119 return count;
3120}
3121\f
25dbc73a
AM
3122/* The following functions are specific to the ELF linker, while
3123 functions above are used generally. They appear in this file more
3124 or less in the order in which they are called. eg.
3125 ppc_elf_check_relocs is called early in the link process,
3126 ppc_elf_finish_dynamic_sections is one of the last functions
3127 called. */
252b5132 3128
a6aa5195 3129/* Track PLT entries needed for a given symbol. We might need more
a877a2b6 3130 than one glink entry per symbol when generating a pic binary. */
a6aa5195
AM
3131struct plt_entry
3132{
3133 struct plt_entry *next;
3134
3135 /* -fPIC uses multiple GOT sections, one per file, called ".got2".
3136 This field stores the offset into .got2 used to initialise the
a877a2b6
AM
3137 GOT pointer reg. It will always be at least 32768. (Current
3138 gcc always uses an offset of 32768, but ld -r will pack .got2
3139 sections together resulting in larger offsets). */
a6aa5195
AM
3140 bfd_vma addend;
3141
3142 /* The .got2 section. */
3143 asection *sec;
3144
3145 /* PLT refcount or offset. */
3146 union
3147 {
3148 bfd_signed_vma refcount;
3149 bfd_vma offset;
3150 } plt;
3151
3152 /* .glink stub offset. */
3153 bfd_vma glink_offset;
3154};
3155
7c8bbca5
AM
3156/* Of those relocs that might be copied as dynamic relocs, this
3157 function selects those that must be copied when linking a shared
3158 library or PIE, even when the symbol is local. */
252b5132 3159
1d483afe
AM
3160static int
3161must_be_dyn_reloc (struct bfd_link_info *info,
3162 enum elf_ppc_reloc_type r_type)
3163{
3164 switch (r_type)
3165 {
3166 default:
7c8bbca5
AM
3167 /* Only relative relocs can be resolved when the object load
3168 address isn't fixed. DTPREL32 is excluded because the
3169 dynamic linker needs to differentiate global dynamic from
3170 local dynamic __tls_index pairs when PPC_OPT_TLS is set. */
1d483afe
AM
3171 return 1;
3172
3173 case R_PPC_REL24:
3174 case R_PPC_REL14:
3175 case R_PPC_REL14_BRTAKEN:
3176 case R_PPC_REL14_BRNTAKEN:
3177 case R_PPC_REL32:
3178 return 0;
3179
3180 case R_PPC_TPREL32:
3181 case R_PPC_TPREL16:
3182 case R_PPC_TPREL16_LO:
3183 case R_PPC_TPREL16_HI:
3184 case R_PPC_TPREL16_HA:
7c8bbca5
AM
3185 /* These relocations are relative but in a shared library the
3186 linker doesn't know the thread pointer base. */
3187 return bfd_link_dll (info);
1d483afe
AM
3188 }
3189}
252b5132 3190
25dbc73a
AM
3191/* If ELIMINATE_COPY_RELOCS is non-zero, the linker will try to avoid
3192 copying dynamic variables from a shared lib into an app's dynbss
3193 section, and instead use a dynamic relocation to point into the
3194 shared lib. */
3195#define ELIMINATE_COPY_RELOCS 1
252b5132 3196
f95f8542
AM
3197/* Used to track dynamic relocations for local symbols. */
3198struct ppc_dyn_relocs
3199{
3200 struct ppc_dyn_relocs *next;
3201
3202 /* The input section of the reloc. */
3203 asection *sec;
3204
3205 /* Total number of relocs copied for the input section. */
3206 unsigned int count : 31;
3207
3208 /* Whether this entry is for STT_GNU_IFUNC symbols. */
3209 unsigned int ifunc : 1;
3210};
3211
25dbc73a 3212/* PPC ELF linker hash entry. */
252b5132 3213
25dbc73a
AM
3214struct ppc_elf_link_hash_entry
3215{
3216 struct elf_link_hash_entry elf;
252b5132 3217
25dbc73a
AM
3218 /* If this symbol is used in the linker created sections, the processor
3219 specific backend uses this field to map the field into the offset
3220 from the beginning of the section. */
3221 elf_linker_section_pointers_t *linker_section_pointer;
252b5132 3222
25dbc73a 3223 /* Track dynamic relocs copied for this symbol. */
6061a67d 3224 struct elf_dyn_relocs *dyn_relocs;
252b5132 3225
25dbc73a
AM
3226 /* Contexts in which symbol is used in the GOT (or TOC).
3227 TLS_GD .. TLS_TLS bits are or'd into the mask as the
3228 corresponding relocs are encountered during check_relocs.
3229 tls_optimize clears TLS_GD .. TLS_TPREL when optimizing to
3230 indicate the corresponding GOT entry type is not needed. */
3231#define TLS_GD 1 /* GD reloc. */
3232#define TLS_LD 2 /* LD reloc. */
3233#define TLS_TPREL 4 /* TPREL reloc, => IE. */
3234#define TLS_DTPREL 8 /* DTPREL reloc, => LD. */
3235#define TLS_TLS 16 /* Any TLS reloc. */
3236#define TLS_TPRELGD 32 /* TPREL reloc resulting from GD->IE. */
e054468f 3237#define PLT_IFUNC 64 /* STT_GNU_IFUNC. */
25dbc73a 3238 char tls_mask;
4dc4a9a5
DJ
3239
3240 /* Nonzero if we have seen a small data relocation referring to this
3241 symbol. */
d3e454b9
AM
3242 unsigned char has_sda_refs : 1;
3243
3244 /* Flag use of given relocations. */
3245 unsigned char has_addr16_ha : 1;
3246 unsigned char has_addr16_lo : 1;
25dbc73a 3247};
252b5132 3248
25dbc73a
AM
3249#define ppc_elf_hash_entry(ent) ((struct ppc_elf_link_hash_entry *) (ent))
3250
3251/* PPC ELF linker hash table. */
3252
3253struct ppc_elf_link_hash_table
3254{
3255 struct elf_link_hash_table elf;
3256
5446cbdf
AM
3257 /* Various options passed from the linker. */
3258 struct ppc_elf_params *params;
3259
25dbc73a 3260 /* Short-cuts to get to dynamic linker sections. */
d7128ce4 3261 asection *glink;
25dbc73a
AM
3262 asection *dynsbss;
3263 asection *relsbss;
c9a2f333 3264 elf_linker_section_t sdata[2];
25dbc73a 3265 asection *sbss;
6177242a 3266 asection *glink_eh_frame;
25dbc73a 3267
016687f8
AM
3268 /* The (unloaded but important) .rela.plt.unloaded on VxWorks. */
3269 asection *srelplt2;
3270
1d483afe 3271 /* Shortcut to __tls_get_addr. */
25dbc73a 3272 struct elf_link_hash_entry *tls_get_addr;
252b5132 3273
016687f8
AM
3274 /* The bfd that forced an old-style PLT. */
3275 bfd *old_bfd;
5b914448 3276
25dbc73a
AM
3277 /* TLS local dynamic got entry handling. */
3278 union {
3279 bfd_signed_vma refcount;
3280 bfd_vma offset;
3281 } tlsld_got;
252b5132 3282
c6dd29ce 3283 /* Offset of branch table to PltResolve function in glink. */
d7128ce4
AM
3284 bfd_vma glink_pltresolve;
3285
3b36f7e6
AM
3286 /* Size of reserved GOT entries. */
3287 unsigned int got_header_size;
3288 /* Non-zero if allocating the header left a gap. */
3289 unsigned int got_gap;
3290
4a3dc543
RS
3291 /* The type of PLT we have chosen to use. */
3292 enum ppc_elf_plt_type plt_type;
3293
9d8504b1 3294 /* True if the target system is VxWorks. */
016687f8 3295 unsigned int is_vxworks:1;
9d8504b1 3296
82e66161
AM
3297 /* Whether there exist local gnu indirect function resolvers,
3298 referenced by dynamic relocations. */
3299 unsigned int local_ifunc_resolver:1;
3300 unsigned int maybe_local_ifunc_resolver:1;
3301
9a23f96e
AM
3302 /* Set if tls optimization is enabled. */
3303 unsigned int do_tls_opt:1;
3304
9d8504b1
PB
3305 /* The size of PLT entries. */
3306 int plt_entry_size;
3307 /* The distance between adjacent PLT slots. */
3308 int plt_slot_size;
3309 /* The size of the first PLT entry. */
3310 int plt_initial_entry_size;
016687f8 3311
87d72d41
AM
3312 /* Small local sym cache. */
3313 struct sym_cache sym_cache;
25dbc73a 3314};
252b5132 3315
94caa966
AM
3316/* Rename some of the generic section flags to better document how they
3317 are used for ppc32. The flags are only valid for ppc32 elf objects. */
3318
3319/* Nonzero if this section has TLS related relocations. */
3320#define has_tls_reloc sec_flg0
3321
3322/* Nonzero if this section has a call to __tls_get_addr. */
3323#define has_tls_get_addr_call sec_flg1
3324
25dbc73a 3325/* Get the PPC ELF linker hash table from a link_info structure. */
252b5132 3326
25dbc73a 3327#define ppc_elf_hash_table(p) \
4dfe6ac6
NC
3328 (elf_hash_table_id ((struct elf_link_hash_table *) ((p)->hash)) \
3329 == PPC32_ELF_DATA ? ((struct ppc_elf_link_hash_table *) ((p)->hash)) : NULL)
252b5132 3330
25dbc73a 3331/* Create an entry in a PPC ELF linker hash table. */
252b5132 3332
25dbc73a
AM
3333static struct bfd_hash_entry *
3334ppc_elf_link_hash_newfunc (struct bfd_hash_entry *entry,
3335 struct bfd_hash_table *table,
3336 const char *string)
252b5132 3337{
25dbc73a
AM
3338 /* Allocate the structure if it has not already been allocated by a
3339 subclass. */
3340 if (entry == NULL)
3341 {
3342 entry = bfd_hash_allocate (table,
3343 sizeof (struct ppc_elf_link_hash_entry));
3344 if (entry == NULL)
3345 return entry;
3346 }
252b5132 3347
25dbc73a
AM
3348 /* Call the allocation method of the superclass. */
3349 entry = _bfd_elf_link_hash_newfunc (entry, table, string);
3350 if (entry != NULL)
3351 {
3352 ppc_elf_hash_entry (entry)->linker_section_pointer = NULL;
3353 ppc_elf_hash_entry (entry)->dyn_relocs = NULL;
3354 ppc_elf_hash_entry (entry)->tls_mask = 0;
5240d94d 3355 ppc_elf_hash_entry (entry)->has_sda_refs = 0;
25dbc73a 3356 }
252b5132 3357
25dbc73a 3358 return entry;
252b5132 3359}
3dab13f6 3360
25dbc73a 3361/* Create a PPC ELF linker hash table. */
3dab13f6 3362
25dbc73a
AM
3363static struct bfd_link_hash_table *
3364ppc_elf_link_hash_table_create (bfd *abfd)
3dab13f6 3365{
25dbc73a 3366 struct ppc_elf_link_hash_table *ret;
76e7a751 3367 static struct ppc_elf_params default_params
407aa07c 3368 = { PLT_OLD, 0, 0, 1, 0, 0, 12, 0, 0, 0 };
3dab13f6 3369
25dbc73a
AM
3370 ret = bfd_zmalloc (sizeof (struct ppc_elf_link_hash_table));
3371 if (ret == NULL)
3372 return NULL;
3dab13f6 3373
66eb6687
AM
3374 if (!_bfd_elf_link_hash_table_init (&ret->elf, abfd,
3375 ppc_elf_link_hash_newfunc,
4dfe6ac6
NC
3376 sizeof (struct ppc_elf_link_hash_entry),
3377 PPC32_ELF_DATA))
3dab13f6 3378 {
25dbc73a
AM
3379 free (ret);
3380 return NULL;
3381 }
58111eb7 3382
a6aa5195
AM
3383 ret->elf.init_plt_refcount.refcount = 0;
3384 ret->elf.init_plt_refcount.glist = NULL;
3385 ret->elf.init_plt_offset.offset = 0;
3386 ret->elf.init_plt_offset.glist = NULL;
3387
db434ba0
AM
3388 ret->params = &default_params;
3389
c9a2f333
AM
3390 ret->sdata[0].name = ".sdata";
3391 ret->sdata[0].sym_name = "_SDA_BASE_";
3392 ret->sdata[0].bss_name = ".sbss";
3393
3394 ret->sdata[1].name = ".sdata2";
3395 ret->sdata[1].sym_name = "_SDA2_BASE_";
3396 ret->sdata[1].bss_name = ".sbss2";
3397
9d8504b1
PB
3398 ret->plt_entry_size = 12;
3399 ret->plt_slot_size = 8;
3400 ret->plt_initial_entry_size = 72;
9d8504b1 3401
25dbc73a
AM
3402 return &ret->elf.root;
3403}
3dab13f6 3404
5446cbdf
AM
3405/* Hook linker params into hash table. */
3406
3407void
3408ppc_elf_link_params (struct bfd_link_info *info, struct ppc_elf_params *params)
3409{
3410 struct ppc_elf_link_hash_table *htab = ppc_elf_hash_table (info);
3411
3412 if (htab)
3413 htab->params = params;
76e7a751 3414 params->pagesize_p2 = bfd_log2 (params->pagesize);
5446cbdf
AM
3415}
3416
9d8504b1 3417/* Create .got and the related sections. */
3dab13f6 3418
25dbc73a
AM
3419static bfd_boolean
3420ppc_elf_create_got (bfd *abfd, struct bfd_link_info *info)
3421{
3422 struct ppc_elf_link_hash_table *htab;
3dab13f6 3423
25dbc73a
AM
3424 if (!_bfd_elf_create_got_section (abfd, info))
3425 return FALSE;
3dab13f6 3426
25dbc73a 3427 htab = ppc_elf_hash_table (info);
ce558b89 3428 if (!htab->is_vxworks)
9d8504b1
PB
3429 {
3430 /* The powerpc .got has a blrl instruction in it. Mark it
3431 executable. */
ce558b89
AM
3432 flagword flags = (SEC_ALLOC | SEC_LOAD | SEC_CODE | SEC_HAS_CONTENTS
3433 | SEC_IN_MEMORY | SEC_LINKER_CREATED);
3434 if (!bfd_set_section_flags (abfd, htab->elf.sgot, flags))
9d8504b1
PB
3435 return FALSE;
3436 }
3dab13f6 3437
25dbc73a
AM
3438 return TRUE;
3439}
3dab13f6 3440
93d1b056
AM
3441/* Create a special linker section, used for R_PPC_EMB_SDAI16 and
3442 R_PPC_EMB_SDA2I16 pointers. These sections become part of .sdata
3443 and .sdata2. Create _SDA_BASE_ and _SDA2_BASE too. */
3444
3445static bfd_boolean
3446ppc_elf_create_linker_section (bfd *abfd,
3447 struct bfd_link_info *info,
3448 flagword flags,
3449 elf_linker_section_t *lsect)
3450{
3451 asection *s;
3452
3453 flags |= (SEC_ALLOC | SEC_LOAD | SEC_HAS_CONTENTS | SEC_IN_MEMORY
3454 | SEC_LINKER_CREATED);
3455
3456 s = bfd_make_section_anyway_with_flags (abfd, lsect->name, flags);
3457 if (s == NULL)
3458 return FALSE;
3459 lsect->section = s;
3460
3461 /* Define the sym on the first section of this name. */
3462 s = bfd_get_section_by_name (abfd, lsect->name);
3463
3464 lsect->sym = _bfd_elf_define_linkage_sym (abfd, info, s, lsect->sym_name);
3465 if (lsect->sym == NULL)
3466 return FALSE;
3467 lsect->sym->root.u.def.value = 0x8000;
3468 return TRUE;
3469}
3470
e054468f
AM
3471static bfd_boolean
3472ppc_elf_create_glink (bfd *abfd, struct bfd_link_info *info)
3473{
3474 struct ppc_elf_link_hash_table *htab = ppc_elf_hash_table (info);
3475 asection *s;
3476 flagword flags;
691d2e9a 3477 int p2align;
e054468f
AM
3478
3479 flags = (SEC_ALLOC | SEC_LOAD | SEC_CODE | SEC_READONLY | SEC_HAS_CONTENTS
3480 | SEC_IN_MEMORY | SEC_LINKER_CREATED);
3481 s = bfd_make_section_anyway_with_flags (abfd, ".glink", flags);
3482 htab->glink = s;
691d2e9a
AM
3483 p2align = htab->params->ppc476_workaround ? 6 : 4;
3484 if (p2align < htab->params->plt_stub_align)
3485 p2align = htab->params->plt_stub_align;
e054468f 3486 if (s == NULL
691d2e9a 3487 || !bfd_set_section_alignment (abfd, s, p2align))
e054468f
AM
3488 return FALSE;
3489
6177242a
AM
3490 if (!info->no_ld_generated_unwind_info)
3491 {
3492 flags = (SEC_ALLOC | SEC_LOAD | SEC_READONLY | SEC_HAS_CONTENTS
3493 | SEC_IN_MEMORY | SEC_LINKER_CREATED);
3494 s = bfd_make_section_anyway_with_flags (abfd, ".eh_frame", flags);
3495 htab->glink_eh_frame = s;
3496 if (s == NULL
3497 || !bfd_set_section_alignment (abfd, s, 2))
3498 return FALSE;
3499 }
3500
e054468f
AM
3501 flags = SEC_ALLOC | SEC_LINKER_CREATED;
3502 s = bfd_make_section_anyway_with_flags (abfd, ".iplt", flags);
ce558b89 3503 htab->elf.iplt = s;
e054468f
AM
3504 if (s == NULL
3505 || !bfd_set_section_alignment (abfd, s, 4))
3506 return FALSE;
3507
3508 flags = (SEC_ALLOC | SEC_LOAD | SEC_READONLY | SEC_HAS_CONTENTS
3509 | SEC_IN_MEMORY | SEC_LINKER_CREATED);
14b2f831 3510 s = bfd_make_section_anyway_with_flags (abfd, ".rela.iplt", flags);
ce558b89 3511 htab->elf.irelplt = s;
e054468f
AM
3512 if (s == NULL
3513 || ! bfd_set_section_alignment (abfd, s, 2))
3514 return FALSE;
93d1b056
AM
3515
3516 if (!ppc_elf_create_linker_section (abfd, info, 0,
3517 &htab->sdata[0]))
3518 return FALSE;
3519
3520 if (!ppc_elf_create_linker_section (abfd, info, SEC_READONLY,
3521 &htab->sdata[1]))
3522 return FALSE;
3523
e054468f
AM
3524 return TRUE;
3525}
3526
25dbc73a
AM
3527/* We have to create .dynsbss and .rela.sbss here so that they get mapped
3528 to output sections (just like _bfd_elf_create_dynamic_sections has
3529 to create .dynbss and .rela.bss). */
3dab13f6 3530
25dbc73a
AM
3531static bfd_boolean
3532ppc_elf_create_dynamic_sections (bfd *abfd, struct bfd_link_info *info)
3533{
3534 struct ppc_elf_link_hash_table *htab;
3535 asection *s;
3536 flagword flags;
3dab13f6 3537
25dbc73a 3538 htab = ppc_elf_hash_table (info);
3dab13f6 3539
ce558b89 3540 if (htab->elf.sgot == NULL
25dbc73a 3541 && !ppc_elf_create_got (abfd, info))
3dab13f6
AM
3542 return FALSE;
3543
25dbc73a
AM
3544 if (!_bfd_elf_create_dynamic_sections (abfd, info))
3545 return FALSE;
3dab13f6 3546
e054468f
AM
3547 if (htab->glink == NULL
3548 && !ppc_elf_create_glink (abfd, info))
d7128ce4 3549 return FALSE;
3dab13f6 3550
14b2f831
AM
3551 s = bfd_make_section_anyway_with_flags (abfd, ".dynsbss",
3552 SEC_ALLOC | SEC_LINKER_CREATED);
3b36f7e6 3553 htab->dynsbss = s;
3496cb2a 3554 if (s == NULL)
25dbc73a 3555 return FALSE;
3dab13f6 3556
0e1862bb 3557 if (! bfd_link_pic (info))
25dbc73a 3558 {
e054468f
AM
3559 flags = (SEC_ALLOC | SEC_LOAD | SEC_READONLY | SEC_HAS_CONTENTS
3560 | SEC_IN_MEMORY | SEC_LINKER_CREATED);
14b2f831 3561 s = bfd_make_section_anyway_with_flags (abfd, ".rela.sbss", flags);
3b36f7e6 3562 htab->relsbss = s;
25dbc73a 3563 if (s == NULL
25dbc73a
AM
3564 || ! bfd_set_section_alignment (abfd, s, 2))
3565 return FALSE;
3566 }
3dab13f6 3567
711de32c
RS
3568 if (htab->is_vxworks
3569 && !elf_vxworks_create_dynamic_sections (abfd, info, &htab->srelplt2))
3570 return FALSE;
9d8504b1 3571
ce558b89 3572 s = htab->elf.splt;
3b36f7e6 3573 flags = SEC_ALLOC | SEC_CODE | SEC_LINKER_CREATED;
4a3dc543
RS
3574 if (htab->plt_type == PLT_VXWORKS)
3575 /* The VxWorks PLT is a loaded section with contents. */
3576 flags |= SEC_HAS_CONTENTS | SEC_LOAD | SEC_READONLY;
25dbc73a
AM
3577 return bfd_set_section_flags (abfd, s, flags);
3578}
3dab13f6 3579
25dbc73a 3580/* Copy the extra info we tack onto an elf_link_hash_entry. */
58111eb7 3581
25dbc73a 3582static void
fcfa13d2 3583ppc_elf_copy_indirect_symbol (struct bfd_link_info *info,
25dbc73a
AM
3584 struct elf_link_hash_entry *dir,
3585 struct elf_link_hash_entry *ind)
3586{
3587 struct ppc_elf_link_hash_entry *edir, *eind;
3dab13f6 3588
25dbc73a
AM
3589 edir = (struct ppc_elf_link_hash_entry *) dir;
3590 eind = (struct ppc_elf_link_hash_entry *) ind;
3dab13f6 3591
c79d6685
AM
3592 edir->tls_mask |= eind->tls_mask;
3593 edir->has_sda_refs |= eind->has_sda_refs;
3594
e81830c5
AM
3595 if (edir->elf.versioned != versioned_hidden)
3596 edir->elf.ref_dynamic |= eind->elf.ref_dynamic;
c79d6685
AM
3597 edir->elf.ref_regular |= eind->elf.ref_regular;
3598 edir->elf.ref_regular_nonweak |= eind->elf.ref_regular_nonweak;
4a7e5234 3599 edir->elf.non_got_ref |= eind->elf.non_got_ref;
c79d6685
AM
3600 edir->elf.needs_plt |= eind->elf.needs_plt;
3601 edir->elf.pointer_equality_needed |= eind->elf.pointer_equality_needed;
3602
287c7eaf
AM
3603 /* If we were called to copy over info for a weak sym, that's all. */
3604 if (eind->elf.root.type != bfd_link_hash_indirect)
3605 return;
3606
25dbc73a
AM
3607 if (eind->dyn_relocs != NULL)
3608 {
3609 if (edir->dyn_relocs != NULL)
3dab13f6 3610 {
6061a67d
AM
3611 struct elf_dyn_relocs **pp;
3612 struct elf_dyn_relocs *p;
3dab13f6 3613
fcfa13d2 3614 /* Add reloc counts against the indirect sym to the direct sym
25dbc73a
AM
3615 list. Merge any entries against the same section. */
3616 for (pp = &eind->dyn_relocs; (p = *pp) != NULL; )
3dab13f6 3617 {
6061a67d 3618 struct elf_dyn_relocs *q;
25dbc73a
AM
3619
3620 for (q = edir->dyn_relocs; q != NULL; q = q->next)
3621 if (q->sec == p->sec)
3622 {
3623 q->pc_count += p->pc_count;
3624 q->count += p->count;
3625 *pp = p->next;
3626 break;
3627 }
3628 if (q == NULL)
3629 pp = &p->next;
3dab13f6 3630 }
25dbc73a 3631 *pp = edir->dyn_relocs;
3dab13f6 3632 }
25dbc73a
AM
3633
3634 edir->dyn_relocs = eind->dyn_relocs;
3635 eind->dyn_relocs = NULL;
3dab13f6 3636 }
3dab13f6 3637
a6aa5195
AM
3638 /* Copy over the GOT refcount entries that we may have already seen to
3639 the symbol which just became indirect. */
fcfa13d2
AM
3640 edir->elf.got.refcount += eind->elf.got.refcount;
3641 eind->elf.got.refcount = 0;
a6aa5195
AM
3642
3643 /* And plt entries. */
3644 if (eind->elf.plt.plist != NULL)
3645 {
3646 if (edir->elf.plt.plist != NULL)
3647 {
3648 struct plt_entry **entp;
3649 struct plt_entry *ent;
3650
3651 for (entp = &eind->elf.plt.plist; (ent = *entp) != NULL; )
3652 {
3653 struct plt_entry *dent;
3654
3655 for (dent = edir->elf.plt.plist; dent != NULL; dent = dent->next)
3656 if (dent->sec == ent->sec && dent->addend == ent->addend)
3657 {
3658 dent->plt.refcount += ent->plt.refcount;
3659 *entp = ent->next;
3660 break;
3661 }
3662 if (dent == NULL)
3663 entp = &ent->next;
3664 }
3665 *entp = edir->elf.plt.plist;
3666 }
3667
3668 edir->elf.plt.plist = eind->elf.plt.plist;
3669 eind->elf.plt.plist = NULL;
3670 }
3671
fcfa13d2 3672 if (eind->elf.dynindx != -1)
25dbc73a 3673 {
fcfa13d2
AM
3674 if (edir->elf.dynindx != -1)
3675 _bfd_elf_strtab_delref (elf_hash_table (info)->dynstr,
3676 edir->elf.dynstr_index);
a6aa5195
AM
3677 edir->elf.dynindx = eind->elf.dynindx;
3678 edir->elf.dynstr_index = eind->elf.dynstr_index;
3679 eind->elf.dynindx = -1;
3680 eind->elf.dynstr_index = 0;
25dbc73a 3681 }
25dbc73a 3682}
3dab13f6 3683
25dbc73a
AM
3684/* Hook called by the linker routine which adds symbols from an object
3685 file. We use it to put .comm items in .sbss, and not .bss. */
58111eb7 3686
25dbc73a
AM
3687static bfd_boolean
3688ppc_elf_add_symbol_hook (bfd *abfd,
3689 struct bfd_link_info *info,
3690 Elf_Internal_Sym *sym,
3691 const char **namep ATTRIBUTE_UNUSED,
3692 flagword *flagsp ATTRIBUTE_UNUSED,
3693 asection **secp,
3694 bfd_vma *valp)
3695{
3696 if (sym->st_shndx == SHN_COMMON
0e1862bb 3697 && !bfd_link_relocatable (info)
0c8d6e5c
AM
3698 && is_ppc_elf (info->output_bfd)
3699 && sym->st_size <= elf_gp_size (abfd))
25dbc73a
AM
3700 {
3701 /* Common symbols less than or equal to -G nn bytes are automatically
3702 put into .sbss. */
3703 struct ppc_elf_link_hash_table *htab;
3dab13f6 3704
25dbc73a
AM
3705 htab = ppc_elf_hash_table (info);
3706 if (htab->sbss == NULL)
3707 {
644285ef 3708 flagword flags = SEC_IS_COMMON | SEC_LINKER_CREATED;
3dab13f6 3709
644285ef
AM
3710 if (!htab->elf.dynobj)
3711 htab->elf.dynobj = abfd;
3712
3496cb2a
L
3713 htab->sbss = bfd_make_section_anyway_with_flags (htab->elf.dynobj,
3714 ".sbss",
3715 flags);
3716 if (htab->sbss == NULL)
25dbc73a 3717 return FALSE;
3dab13f6 3718 }
3dab13f6 3719
25dbc73a
AM
3720 *secp = htab->sbss;
3721 *valp = sym->st_size;
3722 }
3dab13f6 3723
a43942db 3724 if (ELF_ST_TYPE (sym->st_info) == STT_GNU_IFUNC
f1885d1e
AM
3725 && (abfd->flags & DYNAMIC) == 0
3726 && bfd_get_flavour (info->output_bfd) == bfd_target_elf_flavour)
a43942db 3727 elf_tdata (info->output_bfd)->has_gnu_symbols |= elf_gnu_symbol_ifunc;
e054468f 3728
25dbc73a 3729 return TRUE;
3dab13f6
AM
3730}
3731\f
25dbc73a
AM
3732/* Find a linker generated pointer with a given addend and type. */
3733
3734static elf_linker_section_pointers_t *
3735elf_find_pointer_linker_section
3736 (elf_linker_section_pointers_t *linker_pointers,
3737 bfd_vma addend,
3738 elf_linker_section_t *lsect)
252b5132 3739{
25dbc73a
AM
3740 for ( ; linker_pointers != NULL; linker_pointers = linker_pointers->next)
3741 if (lsect == linker_pointers->lsect && addend == linker_pointers->addend)
3742 return linker_pointers;
252b5132 3743
25dbc73a
AM
3744 return NULL;
3745}
3746
3747/* Allocate a pointer to live in a linker created section. */
3748
3749static bfd_boolean
93d1b056
AM
3750elf_allocate_pointer_linker_section (bfd *abfd,
3751 elf_linker_section_t *lsect,
3752 struct elf_link_hash_entry *h,
3753 const Elf_Internal_Rela *rel)
25dbc73a
AM
3754{
3755 elf_linker_section_pointers_t **ptr_linker_section_ptr = NULL;
3756 elf_linker_section_pointers_t *linker_section_ptr;
3757 unsigned long r_symndx = ELF32_R_SYM (rel->r_info);
3758 bfd_size_type amt;
3759
3760 BFD_ASSERT (lsect != NULL);
3761
3762 /* Is this a global symbol? */
3763 if (h != NULL)
3764 {
3765 struct ppc_elf_link_hash_entry *eh;
3766
3767 /* Has this symbol already been allocated? If so, our work is done. */
3768 eh = (struct ppc_elf_link_hash_entry *) h;
3769 if (elf_find_pointer_linker_section (eh->linker_section_pointer,
3770 rel->r_addend,
3771 lsect))
3772 return TRUE;
3773
3774 ptr_linker_section_ptr = &eh->linker_section_pointer;
25dbc73a
AM
3775 }
3776 else
3777 {
0c8d6e5c 3778 BFD_ASSERT (is_ppc_elf (abfd));
0ffa91dd 3779
25dbc73a
AM
3780 /* Allocation of a pointer to a local symbol. */
3781 elf_linker_section_pointers_t **ptr = elf_local_ptr_offsets (abfd);
3782
3783 /* Allocate a table to hold the local symbols if first time. */
3784 if (!ptr)
3785 {
0ffa91dd 3786 unsigned int num_symbols = elf_symtab_hdr (abfd).sh_info;
25dbc73a
AM
3787
3788 amt = num_symbols;
3789 amt *= sizeof (elf_linker_section_pointers_t *);
3790 ptr = bfd_zalloc (abfd, amt);
3791
3792 if (!ptr)
3793 return FALSE;
3794
3795 elf_local_ptr_offsets (abfd) = ptr;
3796 }
3797
3798 /* Has this symbol already been allocated? If so, our work is done. */
3799 if (elf_find_pointer_linker_section (ptr[r_symndx],
3800 rel->r_addend,
3801 lsect))
3802 return TRUE;
252b5132 3803
25dbc73a 3804 ptr_linker_section_ptr = &ptr[r_symndx];
25dbc73a 3805 }
41fcb14e 3806
25dbc73a
AM
3807 /* Allocate space for a pointer in the linker section, and allocate
3808 a new pointer record from internal memory. */
3809 BFD_ASSERT (ptr_linker_section_ptr != NULL);
3810 amt = sizeof (elf_linker_section_pointers_t);
3811 linker_section_ptr = bfd_alloc (abfd, amt);
41fcb14e 3812
25dbc73a 3813 if (!linker_section_ptr)
7619e7c7 3814 return FALSE;
41fcb14e 3815
25dbc73a
AM
3816 linker_section_ptr->next = *ptr_linker_section_ptr;
3817 linker_section_ptr->addend = rel->r_addend;
3818 linker_section_ptr->lsect = lsect;
25dbc73a 3819 *ptr_linker_section_ptr = linker_section_ptr;
41fcb14e 3820
93d1b056
AM
3821 if (!bfd_set_section_alignment (lsect->section->owner, lsect->section, 2))
3822 return FALSE;
25dbc73a
AM
3823 linker_section_ptr->offset = lsect->section->size;
3824 lsect->section->size += 4;
7619e7c7 3825
25dbc73a
AM
3826#ifdef DEBUG
3827 fprintf (stderr,
3828 "Create pointer in linker section %s, offset = %ld, section size = %ld\n",
3829 lsect->name, (long) linker_section_ptr->offset,
3830 (long) lsect->section->size);
3831#endif
7619e7c7
AM
3832
3833 return TRUE;
41fcb14e
AM
3834}
3835
e054468f 3836static struct plt_entry **
25dbc73a
AM
3837update_local_sym_info (bfd *abfd,
3838 Elf_Internal_Shdr *symtab_hdr,
3839 unsigned long r_symndx,
3840 int tls_type)
252b5132 3841{
25dbc73a 3842 bfd_signed_vma *local_got_refcounts = elf_local_got_refcounts (abfd);
e054468f 3843 struct plt_entry **local_plt;
25dbc73a 3844 char *local_got_tls_masks;
252b5132 3845
25dbc73a 3846 if (local_got_refcounts == NULL)
252b5132 3847 {
25dbc73a
AM
3848 bfd_size_type size = symtab_hdr->sh_info;
3849
e054468f
AM
3850 size *= (sizeof (*local_got_refcounts)
3851 + sizeof (*local_plt)
3852 + sizeof (*local_got_tls_masks));
25dbc73a
AM
3853 local_got_refcounts = bfd_zalloc (abfd, size);
3854 if (local_got_refcounts == NULL)
e054468f 3855 return NULL;
25dbc73a 3856 elf_local_got_refcounts (abfd) = local_got_refcounts;
252b5132 3857 }
41fcb14e 3858
e054468f
AM
3859 local_plt = (struct plt_entry **) (local_got_refcounts + symtab_hdr->sh_info);
3860 local_got_tls_masks = (char *) (local_plt + symtab_hdr->sh_info);
25dbc73a 3861 local_got_tls_masks[r_symndx] |= tls_type;
e054468f
AM
3862 if (tls_type != PLT_IFUNC)
3863 local_got_refcounts[r_symndx] += 1;
3864 return local_plt + r_symndx;
25dbc73a 3865}
41fcb14e 3866
a6aa5195 3867static bfd_boolean
3ec01793 3868update_plt_info (bfd *abfd, struct plt_entry **plist,
a6aa5195
AM
3869 asection *sec, bfd_vma addend)
3870{
3871 struct plt_entry *ent;
3872
32af9f6e
AM
3873 if (addend < 32768)
3874 sec = NULL;
3ec01793 3875 for (ent = *plist; ent != NULL; ent = ent->next)
a6aa5195
AM
3876 if (ent->sec == sec && ent->addend == addend)
3877 break;
3878 if (ent == NULL)
3879 {
3880 bfd_size_type amt = sizeof (*ent);
3881 ent = bfd_alloc (abfd, amt);
3882 if (ent == NULL)
3883 return FALSE;
3ec01793 3884 ent->next = *plist;
a6aa5195
AM
3885 ent->sec = sec;
3886 ent->addend = addend;
3887 ent->plt.refcount = 0;
3ec01793 3888 *plist = ent;
a6aa5195
AM
3889 }
3890 ent->plt.refcount += 1;
3891 return TRUE;
3892}
3893
3894static struct plt_entry *
3ec01793 3895find_plt_ent (struct plt_entry **plist, asection *sec, bfd_vma addend)
a6aa5195
AM
3896{
3897 struct plt_entry *ent;
3898
3899 if (addend < 32768)
3900 sec = NULL;
3ec01793 3901 for (ent = *plist; ent != NULL; ent = ent->next)
a6aa5195
AM
3902 if (ent->sec == sec && ent->addend == addend)
3903 break;
3904 return ent;
3905}
3906
e054468f
AM
3907static bfd_boolean
3908is_branch_reloc (enum elf_ppc_reloc_type r_type)
3909{
3910 return (r_type == R_PPC_PLTREL24
3911 || r_type == R_PPC_LOCAL24PC
3912 || r_type == R_PPC_REL24
3913 || r_type == R_PPC_REL14
3914 || r_type == R_PPC_REL14_BRTAKEN
3915 || r_type == R_PPC_REL14_BRNTAKEN
3916 || r_type == R_PPC_ADDR24
3917 || r_type == R_PPC_ADDR14
3918 || r_type == R_PPC_ADDR14_BRTAKEN
dfdaec14
AJ
3919 || r_type == R_PPC_ADDR14_BRNTAKEN
3920 || r_type == R_PPC_VLE_REL24);
e054468f
AM
3921}
3922
25dbc73a
AM
3923static void
3924bad_shared_reloc (bfd *abfd, enum elf_ppc_reloc_type r_type)
3925{
4eca0228 3926 _bfd_error_handler
695344c0 3927 /* xgettext:c-format */
871b3ab2 3928 (_("%pB: relocation %s cannot be used when making a shared object"),
25dbc73a
AM
3929 abfd,
3930 ppc_elf_howto_table[r_type]->name);
3931 bfd_set_error (bfd_error_bad_value);
252b5132
RH
3932}
3933
25dbc73a
AM
3934/* Look through the relocs for a section during the first phase, and
3935 allocate space in the global offset table or procedure linkage
3936 table. */
252b5132 3937
b34976b6 3938static bfd_boolean
25dbc73a
AM
3939ppc_elf_check_relocs (bfd *abfd,
3940 struct bfd_link_info *info,
3941 asection *sec,
3942 const Elf_Internal_Rela *relocs)
252b5132 3943{
7619e7c7 3944 struct ppc_elf_link_hash_table *htab;
25dbc73a
AM
3945 Elf_Internal_Shdr *symtab_hdr;
3946 struct elf_link_hash_entry **sym_hashes;
3947 const Elf_Internal_Rela *rel;
3948 const Elf_Internal_Rela *rel_end;
a6aa5195 3949 asection *got2, *sreloc;
727fc41e 3950 struct elf_link_hash_entry *tga;
25dbc73a 3951
0e1862bb 3952 if (bfd_link_relocatable (info))
25dbc73a 3953 return TRUE;
252b5132 3954
c87b5a93
AM
3955 /* Don't do anything special with non-loaded, non-alloced sections.
3956 In particular, any relocs in such sections should not affect GOT
3957 and PLT reference counting (ie. we don't allow them to create GOT
3958 or PLT entries), there's no possibility or desire to optimize TLS
3959 relocs, and there's not much point in propagating relocs to shared
3960 libs that the dynamic linker won't relocate. */
3961 if ((sec->flags & SEC_ALLOC) == 0)
3962 return TRUE;
3963
252b5132 3964#ifdef DEBUG
871b3ab2 3965 _bfd_error_handler ("ppc_elf_check_relocs called for section %pA in %pB",
25dbc73a 3966 sec, abfd);
252b5132
RH
3967#endif
3968
0c8d6e5c 3969 BFD_ASSERT (is_ppc_elf (abfd));
0ffa91dd 3970
25dbc73a
AM
3971 /* Initialize howto table if not already done. */
3972 if (!ppc_elf_howto_table[R_PPC_ADDR32])
3973 ppc_elf_howto_init ();
3974
7619e7c7 3975 htab = ppc_elf_hash_table (info);
25f23106
AM
3976 if (htab->glink == NULL)
3977 {
3978 if (htab->elf.dynobj == NULL)
3979 htab->elf.dynobj = abfd;
3980 if (!ppc_elf_create_glink (htab->elf.dynobj, info))
3981 return FALSE;
3982 }
727fc41e
AM
3983 tga = elf_link_hash_lookup (&htab->elf, "__tls_get_addr",
3984 FALSE, FALSE, TRUE);
0ffa91dd 3985 symtab_hdr = &elf_symtab_hdr (abfd);
25dbc73a 3986 sym_hashes = elf_sym_hashes (abfd);
a6aa5195 3987 got2 = bfd_get_section_by_name (abfd, ".got2");
25dbc73a
AM
3988 sreloc = NULL;
3989
3990 rel_end = relocs + sec->reloc_count;
3991 for (rel = relocs; rel < rel_end; rel++)
3992 {
3993 unsigned long r_symndx;
3994 enum elf_ppc_reloc_type r_type;
3995 struct elf_link_hash_entry *h;
727fc41e 3996 int tls_type;
cbf95972 3997 struct plt_entry **ifunc;
25dbc73a
AM
3998
3999 r_symndx = ELF32_R_SYM (rel->r_info);
4000 if (r_symndx < symtab_hdr->sh_info)
4001 h = NULL;
4002 else
973a3492
L
4003 {
4004 h = sym_hashes[r_symndx - symtab_hdr->sh_info];
4005 while (h->root.type == bfd_link_hash_indirect
4006 || h->root.type == bfd_link_hash_warning)
4007 h = (struct elf_link_hash_entry *) h->root.u.i.link;
4008 }
25dbc73a
AM
4009
4010 /* If a relocation refers to _GLOBAL_OFFSET_TABLE_, create the .got.
4011 This shows up in particular in an R_PPC_ADDR32 in the eabi
4012 startup code. */
3b36f7e6 4013 if (h != NULL
ce558b89 4014 && htab->elf.sgot == NULL
3b36f7e6 4015 && strcmp (h->root.root.string, "_GLOBAL_OFFSET_TABLE_") == 0)
252b5132 4016 {
3b36f7e6
AM
4017 if (htab->elf.dynobj == NULL)
4018 htab->elf.dynobj = abfd;
4019 if (!ppc_elf_create_got (htab->elf.dynobj, info))
4020 return FALSE;
4021 BFD_ASSERT (h == htab->elf.hgot);
25dbc73a 4022 }
252b5132 4023
727fc41e 4024 tls_type = 0;
de972ffa 4025 r_type = ELF32_R_TYPE (rel->r_info);
cbf95972 4026 ifunc = NULL;
06a162cf 4027 if (h == NULL && !htab->is_vxworks)
e054468f 4028 {
06a162cf
AM
4029 Elf_Internal_Sym *isym = bfd_sym_from_r_symndx (&htab->sym_cache,
4030 abfd, r_symndx);
4031 if (isym == NULL)
4032 return FALSE;
4033
0bed072f 4034 if (ELF_ST_TYPE (isym->st_info) == STT_GNU_IFUNC)
e054468f 4035 {
0bed072f 4036 /* Set PLT_IFUNC flag for this sym, no GOT entry yet. */
06a162cf
AM
4037 ifunc = update_local_sym_info (abfd, symtab_hdr, r_symndx,
4038 PLT_IFUNC);
4039 if (ifunc == NULL)
e054468f
AM
4040 return FALSE;
4041
06a162cf
AM
4042 /* STT_GNU_IFUNC symbols must have a PLT entry;
4043 In a non-pie executable even when there are
4044 no plt calls. */
0e1862bb 4045 if (!bfd_link_pic (info)
0bed072f 4046 || is_branch_reloc (r_type))
e054468f 4047 {
0bed072f
AM
4048 bfd_vma addend = 0;
4049 if (r_type == R_PPC_PLTREL24)
4050 {
4051 ppc_elf_tdata (abfd)->makes_plt_call = 1;
0e1862bb 4052 if (bfd_link_pic (info))
0bed072f
AM
4053 addend = rel->r_addend;
4054 }
4055 if (!update_plt_info (abfd, ifunc, got2, addend))
4056 return FALSE;
e054468f
AM
4057 }
4058 }
25f23106
AM
4059 }
4060
de972ffa
AM
4061 if (!htab->is_vxworks
4062 && is_branch_reloc (r_type)
4063 && h != NULL
4064 && h == tga)
25f23106 4065 {
de972ffa
AM
4066 if (rel != relocs
4067 && (ELF32_R_TYPE (rel[-1].r_info) == R_PPC_TLSGD
4068 || ELF32_R_TYPE (rel[-1].r_info) == R_PPC_TLSLD))
4069 /* We have a new-style __tls_get_addr call with a marker
4070 reloc. */
4071 ;
4072 else
4073 /* Mark this section as having an old-style call. */
4074 sec->has_tls_get_addr_call = 1;
e054468f 4075 }
727fc41e 4076
25dbc73a
AM
4077 switch (r_type)
4078 {
727fc41e
AM
4079 case R_PPC_TLSGD:
4080 case R_PPC_TLSLD:
4081 /* These special tls relocs tie a call to __tls_get_addr with
4082 its parameter symbol. */
4083 break;
4084
25dbc73a
AM
4085 case R_PPC_GOT_TLSLD16:
4086 case R_PPC_GOT_TLSLD16_LO:
4087 case R_PPC_GOT_TLSLD16_HI:
4088 case R_PPC_GOT_TLSLD16_HA:
25dbc73a
AM
4089 tls_type = TLS_TLS | TLS_LD;
4090 goto dogottls;
252b5132 4091
25dbc73a
AM
4092 case R_PPC_GOT_TLSGD16:
4093 case R_PPC_GOT_TLSGD16_LO:
4094 case R_PPC_GOT_TLSGD16_HI:
4095 case R_PPC_GOT_TLSGD16_HA:
4096 tls_type = TLS_TLS | TLS_GD;
4097 goto dogottls;
4098
4099 case R_PPC_GOT_TPREL16:
4100 case R_PPC_GOT_TPREL16_LO:
4101 case R_PPC_GOT_TPREL16_HI:
4102 case R_PPC_GOT_TPREL16_HA:
7c8bbca5 4103 if (bfd_link_dll (info))
25dbc73a
AM
4104 info->flags |= DF_STATIC_TLS;
4105 tls_type = TLS_TLS | TLS_TPREL;
4106 goto dogottls;
4107
4108 case R_PPC_GOT_DTPREL16:
4109 case R_PPC_GOT_DTPREL16_LO:
4110 case R_PPC_GOT_DTPREL16_HI:
4111 case R_PPC_GOT_DTPREL16_HA:
4112 tls_type = TLS_TLS | TLS_DTPREL;
4113 dogottls:
4114 sec->has_tls_reloc = 1;
1a0670f3 4115 /* Fall through. */
252b5132 4116
25dbc73a
AM
4117 /* GOT16 relocations */
4118 case R_PPC_GOT16:
4119 case R_PPC_GOT16_LO:
4120 case R_PPC_GOT16_HI:
4121 case R_PPC_GOT16_HA:
4122 /* This symbol requires a global offset table entry. */
ce558b89 4123 if (htab->elf.sgot == NULL)
25dbc73a
AM
4124 {
4125 if (htab->elf.dynobj == NULL)
4126 htab->elf.dynobj = abfd;
4127 if (!ppc_elf_create_got (htab->elf.dynobj, info))
4128 return FALSE;
4129 }
4130 if (h != NULL)
4131 {
4132 h->got.refcount += 1;
4133 ppc_elf_hash_entry (h)->tls_mask |= tls_type;
4134 }
4135 else
4136 /* This is a global offset table entry for a local symbol. */
4137 if (!update_local_sym_info (abfd, symtab_hdr, r_symndx, tls_type))
4138 return FALSE;
91e21fb7
AM
4139
4140 /* We may also need a plt entry if the symbol turns out to be
4141 an ifunc. */
0e1862bb 4142 if (h != NULL && !bfd_link_pic (info))
91e21fb7
AM
4143 {
4144 if (!update_plt_info (abfd, &h->plt.plist, NULL, 0))
4145 return FALSE;
4146 }
25dbc73a 4147 break;
252b5132 4148
25dbc73a
AM
4149 /* Indirect .sdata relocation. */
4150 case R_PPC_EMB_SDAI16:
0e1862bb 4151 if (bfd_link_pic (info))
25dbc73a
AM
4152 {
4153 bad_shared_reloc (abfd, r_type);
4154 return FALSE;
4155 }
93d1b056
AM
4156 htab->sdata[0].sym->ref_regular = 1;
4157 if (!elf_allocate_pointer_linker_section (abfd, &htab->sdata[0],
4158 h, rel))
25dbc73a 4159 return FALSE;
046183de
AM
4160 if (h != NULL)
4161 {
4162 ppc_elf_hash_entry (h)->has_sda_refs = TRUE;
4163 h->non_got_ref = TRUE;
4164 }
25dbc73a 4165 break;
252b5132 4166
25dbc73a
AM
4167 /* Indirect .sdata2 relocation. */
4168 case R_PPC_EMB_SDA2I16:
0e1862bb 4169 if (bfd_link_pic (info))
25dbc73a
AM
4170 {
4171 bad_shared_reloc (abfd, r_type);
4172 return FALSE;
4173 }
93d1b056
AM
4174 htab->sdata[1].sym->ref_regular = 1;
4175 if (!elf_allocate_pointer_linker_section (abfd, &htab->sdata[1],
4176 h, rel))
25dbc73a 4177 return FALSE;
046183de
AM
4178 if (h != NULL)
4179 {
4180 ppc_elf_hash_entry (h)->has_sda_refs = TRUE;
4181 h->non_got_ref = TRUE;
4182 }
25dbc73a 4183 break;
252b5132 4184
93d1b056
AM
4185 case R_PPC_SDAREL16:
4186 htab->sdata[0].sym->ref_regular = 1;
1a0670f3 4187 /* Fall through. */
93d1b056 4188
b9c361e0
JL
4189 case R_PPC_VLE_SDAREL_LO16A:
4190 case R_PPC_VLE_SDAREL_LO16D:
4191 case R_PPC_VLE_SDAREL_HI16A:
4192 case R_PPC_VLE_SDAREL_HI16D:
4193 case R_PPC_VLE_SDAREL_HA16A:
4194 case R_PPC_VLE_SDAREL_HA16D:
046183de
AM
4195 if (h != NULL)
4196 {
4197 ppc_elf_hash_entry (h)->has_sda_refs = TRUE;
4198 h->non_got_ref = TRUE;
4199 }
4200 break;
4201
b9c361e0
JL
4202 case R_PPC_VLE_REL8:
4203 case R_PPC_VLE_REL15:
4204 case R_PPC_VLE_REL24:
4205 case R_PPC_VLE_LO16A:
4206 case R_PPC_VLE_LO16D:
4207 case R_PPC_VLE_HI16A:
4208 case R_PPC_VLE_HI16D:
4209 case R_PPC_VLE_HA16A:
4210 case R_PPC_VLE_HA16D:
83eef883 4211 case R_PPC_VLE_ADDR20:
b9c361e0
JL
4212 break;
4213
25dbc73a 4214 case R_PPC_EMB_SDA2REL:
0e1862bb 4215 if (bfd_link_pic (info))
046183de
AM
4216 {
4217 bad_shared_reloc (abfd, r_type);
4218 return FALSE;
4219 }
93d1b056 4220 htab->sdata[1].sym->ref_regular = 1;
046183de
AM
4221 if (h != NULL)
4222 {
4223 ppc_elf_hash_entry (h)->has_sda_refs = TRUE;
4224 h->non_got_ref = TRUE;
4225 }
4226 break;
4227
b9c361e0
JL
4228 case R_PPC_VLE_SDA21_LO:
4229 case R_PPC_VLE_SDA21:
25dbc73a
AM
4230 case R_PPC_EMB_SDA21:
4231 case R_PPC_EMB_RELSDA:
0e1862bb 4232 if (bfd_link_pic (info))
046183de
AM
4233 {
4234 bad_shared_reloc (abfd, r_type);
4235 return FALSE;
4236 }
046183de
AM
4237 if (h != NULL)
4238 {
4239 ppc_elf_hash_entry (h)->has_sda_refs = TRUE;
4240 h->non_got_ref = TRUE;
4241 }
4242 break;
4243
25dbc73a
AM
4244 case R_PPC_EMB_NADDR32:
4245 case R_PPC_EMB_NADDR16:
4246 case R_PPC_EMB_NADDR16_LO:
4247 case R_PPC_EMB_NADDR16_HI:
4248 case R_PPC_EMB_NADDR16_HA:
0e1862bb 4249 if (bfd_link_pic (info))
25dbc73a
AM
4250 {
4251 bad_shared_reloc (abfd, r_type);
4252 return FALSE;
4253 }
4dc4a9a5 4254 if (h != NULL)
046183de 4255 h->non_got_ref = TRUE;
25dbc73a 4256 break;
252b5132 4257
25dbc73a 4258 case R_PPC_PLTREL24:
de972ffa 4259 if (h == NULL)
6d78d0b9
AM
4260 break;
4261 /* Fall through */
4262 case R_PPC_PLT32:
25dbc73a
AM
4263 case R_PPC_PLTREL32:
4264 case R_PPC_PLT16_LO:
4265 case R_PPC_PLT16_HI:
4266 case R_PPC_PLT16_HA:
4267#ifdef DEBUG
4268 fprintf (stderr, "Reloc requires a PLT entry\n");
4269#endif
cbf95972 4270 /* This symbol requires a procedure linkage table entry. */
25dbc73a
AM
4271 if (h == NULL)
4272 {
cbf95972
AM
4273 if (ifunc == NULL)
4274 {
4275 /* It does not make sense to have a procedure linkage
4276 table entry for a non-ifunc local symbol. */
4277 info->callbacks->einfo
695344c0 4278 /* xgettext:c-format */
174d0a74 4279 (_("%H: %s reloc against local symbol\n"),
cbf95972
AM
4280 abfd, sec, rel->r_offset,
4281 ppc_elf_howto_table[r_type]->name);
4282 bfd_set_error (bfd_error_bad_value);
4283 return FALSE;
4284 }
25dbc73a 4285 }
a6aa5195
AM
4286 else
4287 {
016687f8 4288 bfd_vma addend = 0;
ee05f2fe 4289
016687f8
AM
4290 if (r_type == R_PPC_PLTREL24)
4291 {
4292 ppc_elf_tdata (abfd)->makes_plt_call = 1;
0e1862bb 4293 if (bfd_link_pic (info))
a877a2b6 4294 addend = rel->r_addend;
016687f8 4295 }
a6aa5195 4296 h->needs_plt = 1;
32af9f6e 4297 if (!update_plt_info (abfd, &h->plt.plist, got2, addend))
a6aa5195
AM
4298 return FALSE;
4299 }
25dbc73a 4300 break;
ee05f2fe 4301
25dbc73a
AM
4302 /* The following relocations don't need to propagate the
4303 relocation if linking a shared object since they are
4304 section relative. */
4305 case R_PPC_SECTOFF:
4306 case R_PPC_SECTOFF_LO:
4307 case R_PPC_SECTOFF_HI:
4308 case R_PPC_SECTOFF_HA:
4309 case R_PPC_DTPREL16:
4310 case R_PPC_DTPREL16_LO:
4311 case R_PPC_DTPREL16_HI:
4312 case R_PPC_DTPREL16_HA:
4313 case R_PPC_TOC16:
4314 break;
252b5132 4315
d7128ce4
AM
4316 case R_PPC_REL16:
4317 case R_PPC_REL16_LO:
4318 case R_PPC_REL16_HI:
4319 case R_PPC_REL16_HA:
a680de9a 4320 case R_PPC_REL16DX_HA:
016687f8 4321 ppc_elf_tdata (abfd)->has_rel16 = 1;
d7128ce4
AM
4322 break;
4323
a6aa5195 4324 /* These are just markers. */
25dbc73a
AM
4325 case R_PPC_TLS:
4326 case R_PPC_EMB_MRKREF:
4327 case R_PPC_NONE:
4328 case R_PPC_max:
32af9f6e
AM
4329 case R_PPC_RELAX:
4330 case R_PPC_RELAX_PLT:
4331 case R_PPC_RELAX_PLTREL24:
7ba71655 4332 case R_PPC_16DX_HA:
25dbc73a 4333 break;
252b5132 4334
25dbc73a
AM
4335 /* These should only appear in dynamic objects. */
4336 case R_PPC_COPY:
4337 case R_PPC_GLOB_DAT:
4338 case R_PPC_JMP_SLOT:
4339 case R_PPC_RELATIVE:
e054468f 4340 case R_PPC_IRELATIVE:
25dbc73a 4341 break;
252b5132 4342
25dbc73a
AM
4343 /* These aren't handled yet. We'll report an error later. */
4344 case R_PPC_ADDR30:
4345 case R_PPC_EMB_RELSEC16:
4346 case R_PPC_EMB_RELST_LO:
4347 case R_PPC_EMB_RELST_HI:
4348 case R_PPC_EMB_RELST_HA:
4349 case R_PPC_EMB_BIT_FLD:
4350 break;
252b5132 4351
25dbc73a
AM
4352 /* This refers only to functions defined in the shared library. */
4353 case R_PPC_LOCAL24PC:
727fc41e 4354 if (h != NULL && h == htab->elf.hgot && htab->plt_type == PLT_UNSET)
016687f8
AM
4355 {
4356 htab->plt_type = PLT_OLD;
4357 htab->old_bfd = abfd;
4358 }
c7e17e05
AM
4359 if (h != NULL && h->type == STT_GNU_IFUNC)
4360 {
c7e17e05
AM
4361 h->needs_plt = 1;
4362 if (!update_plt_info (abfd, &h->plt.plist, NULL, 0))
4363 return FALSE;
4364 }
25dbc73a 4365 break;
252b5132 4366
25dbc73a
AM
4367 /* This relocation describes the C++ object vtable hierarchy.
4368 Reconstruct it for later use during GC. */
4369 case R_PPC_GNU_VTINHERIT:
4370 if (!bfd_elf_gc_record_vtinherit (abfd, sec, h, rel->r_offset))
4371 return FALSE;
4372 break;
252b5132 4373
25dbc73a
AM
4374 /* This relocation describes which C++ vtable entries are actually
4375 used. Record for later use during GC. */
4376 case R_PPC_GNU_VTENTRY:
d17e0c6e
JB
4377 BFD_ASSERT (h != NULL);
4378 if (h != NULL
4379 && !bfd_elf_gc_record_vtentry (abfd, sec, h, rel->r_addend))
25dbc73a
AM
4380 return FALSE;
4381 break;
252b5132 4382
7c8bbca5 4383 /* We shouldn't really be seeing TPREL32. */
25dbc73a 4384 case R_PPC_TPREL32:
1d483afe
AM
4385 case R_PPC_TPREL16:
4386 case R_PPC_TPREL16_LO:
4387 case R_PPC_TPREL16_HI:
4388 case R_PPC_TPREL16_HA:
7c8bbca5 4389 if (bfd_link_dll (info))
25dbc73a
AM
4390 info->flags |= DF_STATIC_TLS;
4391 goto dodyn;
252b5132 4392
25dbc73a
AM
4393 /* Nor these. */
4394 case R_PPC_DTPMOD32:
4395 case R_PPC_DTPREL32:
4396 goto dodyn;
252b5132 4397
9edfd1af
AM
4398 case R_PPC_REL32:
4399 if (h == NULL
4400 && got2 != NULL
4401 && (sec->flags & SEC_CODE) != 0
0e1862bb 4402 && bfd_link_pic (info)
4a3dc543 4403 && htab->plt_type == PLT_UNSET)
9edfd1af
AM
4404 {
4405 /* Old -fPIC gcc code has .long LCTOC1-LCFx just before
4406 the start of a function, which assembles to a REL32
4407 reference to .got2. If we detect one of these, then
4408 force the old PLT layout because the linker cannot
4409 reliably deduce the GOT pointer value needed for
4410 PLT call stubs. */
4411 asection *s;
87d72d41 4412 Elf_Internal_Sym *isym;
9edfd1af 4413
87d72d41
AM
4414 isym = bfd_sym_from_r_symndx (&htab->sym_cache,
4415 abfd, r_symndx);
4416 if (isym == NULL)
4417 return FALSE;
4418
4419 s = bfd_section_from_elf_index (abfd, isym->st_shndx);
9edfd1af 4420 if (s == got2)
016687f8
AM
4421 {
4422 htab->plt_type = PLT_OLD;
4423 htab->old_bfd = abfd;
4424 }
9edfd1af 4425 }
7123df0e 4426 if (h == NULL || h == htab->elf.hgot)
fd38b44c 4427 break;
625af618
AM
4428 /* fall through */
4429
4430 case R_PPC_ADDR32:
4431 case R_PPC_ADDR16:
4432 case R_PPC_ADDR16_LO:
4433 case R_PPC_ADDR16_HI:
4434 case R_PPC_ADDR16_HA:
4435 case R_PPC_UADDR32:
4436 case R_PPC_UADDR16:
0e1862bb 4437 if (h != NULL && !bfd_link_pic (info))
625af618
AM
4438 {
4439 /* We may need a plt entry if the symbol turns out to be
4440 a function defined in a dynamic object. */
3ec01793 4441 if (!update_plt_info (abfd, &h->plt.plist, NULL, 0))
625af618
AM
4442 return FALSE;
4443
4444 /* We may need a copy reloc too. */
4445 h->non_got_ref = 1;
4446 h->pointer_equality_needed = 1;
d3e454b9
AM
4447 if (r_type == R_PPC_ADDR16_HA)
4448 ppc_elf_hash_entry (h)->has_addr16_ha = 1;
4449 if (r_type == R_PPC_ADDR16_LO)
4450 ppc_elf_hash_entry (h)->has_addr16_lo = 1;
625af618
AM
4451 }
4452 goto dodyn;
9edfd1af 4453
25dbc73a
AM
4454 case R_PPC_REL24:
4455 case R_PPC_REL14:
4456 case R_PPC_REL14_BRTAKEN:
4457 case R_PPC_REL14_BRNTAKEN:
d7128ce4 4458 if (h == NULL)
25dbc73a 4459 break;
7123df0e 4460 if (h == htab->elf.hgot)
d7128ce4 4461 {
7123df0e 4462 if (htab->plt_type == PLT_UNSET)
016687f8
AM
4463 {
4464 htab->plt_type = PLT_OLD;
4465 htab->old_bfd = abfd;
4466 }
d7128ce4
AM
4467 break;
4468 }
25dbc73a 4469 /* fall through */
ee05f2fe 4470
25dbc73a 4471 case R_PPC_ADDR24:
25dbc73a
AM
4472 case R_PPC_ADDR14:
4473 case R_PPC_ADDR14_BRTAKEN:
4474 case R_PPC_ADDR14_BRNTAKEN:
0e1862bb 4475 if (h != NULL && !bfd_link_pic (info))
25dbc73a
AM
4476 {
4477 /* We may need a plt entry if the symbol turns out to be
4478 a function defined in a dynamic object. */
e054468f 4479 h->needs_plt = 1;
de972ffa 4480 if (!update_plt_info (abfd, &h->plt.plist, NULL, 0))
a6aa5195 4481 return FALSE;
625af618 4482 break;
25dbc73a 4483 }
7619e7c7 4484
25dbc73a
AM
4485 dodyn:
4486 /* If we are creating a shared library, and this is a reloc
4487 against a global symbol, or a non PC relative reloc
4488 against a local symbol, then we need to copy the reloc
4489 into the shared library. However, if we are linking with
4490 -Bsymbolic, we do not need to copy a reloc against a
4491 global symbol which is defined in an object we are
4492 including in the link (i.e., DEF_REGULAR is set). At
4493 this point we have not seen all the input files, so it is
4494 possible that DEF_REGULAR is not set now but will be set
4495 later (it is never cleared). In case of a weak definition,
4496 DEF_REGULAR may be cleared later by a strong definition in
4497 a shared library. We account for that possibility below by
4498 storing information in the dyn_relocs field of the hash
4499 table entry. A similar situation occurs when creating
4500 shared libraries and symbol visibility changes render the
4501 symbol local.
7619e7c7 4502
25dbc73a
AM
4503 If on the other hand, we are creating an executable, we
4504 may need to keep relocations for symbols satisfied by a
4505 dynamic library if we manage to avoid copy relocs for the
4506 symbol. */
0e1862bb 4507 if ((bfd_link_pic (info)
1d483afe 4508 && (must_be_dyn_reloc (info, r_type)
25dbc73a 4509 || (h != NULL
198f1157 4510 && (!SYMBOLIC_BIND (info, h)
25dbc73a
AM
4511 || h->root.type == bfd_link_hash_defweak
4512 || !h->def_regular))))
4513 || (ELIMINATE_COPY_RELOCS
0e1862bb 4514 && !bfd_link_pic (info)
25dbc73a
AM
4515 && h != NULL
4516 && (h->root.type == bfd_link_hash_defweak
de972ffa 4517 || !h->def_regular)))
25dbc73a 4518 {
25dbc73a
AM
4519#ifdef DEBUG
4520 fprintf (stderr,
4521 "ppc_elf_check_relocs needs to "
4522 "create relocation for %s\n",
4523 (h && h->root.root.string
4524 ? h->root.root.string : "<unknown>"));
4525#endif
4526 if (sreloc == NULL)
4527 {
c9a2f333
AM
4528 if (htab->elf.dynobj == NULL)
4529 htab->elf.dynobj = abfd;
83bac4b0
NC
4530
4531 sreloc = _bfd_elf_make_dynamic_reloc_section
4532 (sec, htab->elf.dynobj, 2, abfd, /*rela?*/ TRUE);
4533
25dbc73a 4534 if (sreloc == NULL)
83bac4b0 4535 return FALSE;
25dbc73a 4536 }
7619e7c7 4537
25dbc73a
AM
4538 /* If this is a global symbol, we count the number of
4539 relocations we need for this symbol. */
4540 if (h != NULL)
4541 {
f95f8542
AM
4542 struct elf_dyn_relocs *p;
4543 struct elf_dyn_relocs **rel_head;
4544
91d6fa6a 4545 rel_head = &ppc_elf_hash_entry (h)->dyn_relocs;
f95f8542
AM
4546 p = *rel_head;
4547 if (p == NULL || p->sec != sec)
4548 {
4549 p = bfd_alloc (htab->elf.dynobj, sizeof *p);
4550 if (p == NULL)
4551 return FALSE;
4552 p->next = *rel_head;
4553 *rel_head = p;
4554 p->sec = sec;
4555 p->count = 0;
4556 p->pc_count = 0;
4557 }
4558 p->count += 1;
4559 if (!must_be_dyn_reloc (info, r_type))
4560 p->pc_count += 1;
25dbc73a
AM
4561 }
4562 else
4563 {
4564 /* Track dynamic relocs needed for local syms too.
4565 We really need local syms available to do this
4566 easily. Oh well. */
f95f8542
AM
4567 struct ppc_dyn_relocs *p;
4568 struct ppc_dyn_relocs **rel_head;
4569 bfd_boolean is_ifunc;
25dbc73a 4570 asection *s;
6edfbbad 4571 void *vpp;
87d72d41 4572 Elf_Internal_Sym *isym;
6edfbbad 4573
87d72d41
AM
4574 isym = bfd_sym_from_r_symndx (&htab->sym_cache,
4575 abfd, r_symndx);
4576 if (isym == NULL)
25dbc73a 4577 return FALSE;
7fce784e 4578
87d72d41
AM
4579 s = bfd_section_from_elf_index (abfd, isym->st_shndx);
4580 if (s == NULL)
4581 s = sec;
4582
6edfbbad 4583 vpp = &elf_section_data (s)->local_dynrel;
f95f8542
AM
4584 rel_head = (struct ppc_dyn_relocs **) vpp;
4585 is_ifunc = ELF_ST_TYPE (isym->st_info) == STT_GNU_IFUNC;
4586 p = *rel_head;
4587 if (p != NULL && p->sec == sec && p->ifunc != is_ifunc)
4588 p = p->next;
4589 if (p == NULL || p->sec != sec || p->ifunc != is_ifunc)
4590 {
4591 p = bfd_alloc (htab->elf.dynobj, sizeof *p);
4592 if (p == NULL)
4593 return FALSE;
4594 p->next = *rel_head;
4595 *rel_head = p;
4596 p->sec = sec;
4597 p->ifunc = is_ifunc;
4598 p->count = 0;
4599 }
4600 p->count += 1;
25dbc73a 4601 }
7619e7c7 4602 }
25dbc73a
AM
4603
4604 break;
7619e7c7
AM
4605 }
4606 }
ee05f2fe 4607
25dbc73a
AM
4608 return TRUE;
4609}
4610\f
005d79fd
AM
4611/* Warn for conflicting Tag_GNU_Power_ABI_FP attributes between IBFD
4612 and OBFD, and merge non-conflicting ones. */
4613void
50e03d47 4614_bfd_elf_ppc_merge_fp_attributes (bfd *ibfd, struct bfd_link_info *info)
34c8bcba 4615{
50e03d47 4616 bfd *obfd = info->output_bfd;
c6e65352
DJ
4617 obj_attribute *in_attr, *in_attrs;
4618 obj_attribute *out_attr, *out_attrs;
34c8bcba 4619
c6e65352
DJ
4620 in_attrs = elf_known_obj_attributes (ibfd)[OBJ_ATTR_GNU];
4621 out_attrs = elf_known_obj_attributes (obfd)[OBJ_ATTR_GNU];
4622
c6e65352
DJ
4623 in_attr = &in_attrs[Tag_GNU_Power_ABI_FP];
4624 out_attr = &out_attrs[Tag_GNU_Power_ABI_FP];
005d79fd 4625
c6e65352 4626 if (in_attr->i != out_attr->i)
34c8bcba 4627 {
005d79fd
AM
4628 int in_fp = in_attr->i & 3;
4629 int out_fp = out_attr->i & 3;
4630
4631 if (in_fp == 0)
34c8bcba 4632 ;
005d79fd
AM
4633 else if (out_fp == 0)
4634 {
4635 out_attr->type = 1;
4636 out_attr->i ^= in_fp;
4637 }
4638 else if (out_fp != 2 && in_fp == 2)
34c8bcba 4639 _bfd_error_handler
695344c0 4640 /* xgettext:c-format */
871b3ab2 4641 (_("Warning: %pB uses hard float, %pB uses soft float"), obfd, ibfd);
005d79fd
AM
4642 else if (out_fp == 2 && in_fp != 2)
4643 _bfd_error_handler
695344c0 4644 /* xgettext:c-format */
871b3ab2 4645 (_("Warning: %pB uses hard float, %pB uses soft float"), ibfd, obfd);
005d79fd 4646 else if (out_fp == 1 && in_fp == 3)
3c7b9897 4647 _bfd_error_handler
695344c0 4648 /* xgettext:c-format */
871b3ab2
AM
4649 (_("Warning: %pB uses double-precision hard float, "
4650 "%pB uses single-precision hard float"), obfd, ibfd);
005d79fd 4651 else if (out_fp == 3 && in_fp == 1)
3c7b9897 4652 _bfd_error_handler
695344c0 4653 /* xgettext:c-format */
871b3ab2
AM
4654 (_("Warning: %pB uses double-precision hard float, "
4655 "%pB uses single-precision hard float"), ibfd, obfd);
005d79fd
AM
4656
4657 in_fp = in_attr->i & 0xc;
4658 out_fp = out_attr->i & 0xc;
4659 if (in_fp == 0)
4660 ;
4661 else if (out_fp == 0)
4662 {
4663 out_attr->type = 1;
4664 out_attr->i ^= in_fp;
4665 }
4666 else if (out_fp != 2 * 4 && in_fp == 2 * 4)
3c7b9897 4667 _bfd_error_handler
695344c0 4668 /* xgettext:c-format */
871b3ab2
AM
4669 (_("Warning: %pB uses 64-bit long double, "
4670 "%pB uses 128-bit long double"), ibfd, obfd);
005d79fd 4671 else if (in_fp != 2 * 4 && out_fp == 2 * 4)
34c8bcba 4672 _bfd_error_handler
695344c0 4673 /* xgettext:c-format */
871b3ab2
AM
4674 (_("Warning: %pB uses 64-bit long double, "
4675 "%pB uses 128-bit long double"), obfd, ibfd);
005d79fd 4676 else if (out_fp == 1 * 4 && in_fp == 3 * 4)
34c8bcba 4677 _bfd_error_handler
695344c0 4678 /* xgettext:c-format */
871b3ab2
AM
4679 (_("Warning: %pB uses IBM long double, "
4680 "%pB uses IEEE long double"), ibfd, obfd);
005d79fd 4681 else if (out_fp == 3 * 4 && in_fp == 1 * 4)
34c8bcba 4682 _bfd_error_handler
695344c0 4683 /* xgettext:c-format */
871b3ab2
AM
4684 (_("Warning: %pB uses IBM long double, "
4685 "%pB uses IEEE long double"), obfd, ibfd);
c6e65352 4686 }
005d79fd
AM
4687}
4688
4689/* Merge object attributes from IBFD into OBFD. Warn if
4690 there are conflicting attributes. */
4691static bfd_boolean
50e03d47 4692ppc_elf_merge_obj_attributes (bfd *ibfd, struct bfd_link_info *info)
005d79fd 4693{
50e03d47 4694 bfd *obfd;
005d79fd
AM
4695 obj_attribute *in_attr, *in_attrs;
4696 obj_attribute *out_attr, *out_attrs;
4697
50e03d47 4698 _bfd_elf_ppc_merge_fp_attributes (ibfd, info);
005d79fd 4699
50e03d47 4700 obfd = info->output_bfd;
005d79fd
AM
4701 in_attrs = elf_known_obj_attributes (ibfd)[OBJ_ATTR_GNU];
4702 out_attrs = elf_known_obj_attributes (obfd)[OBJ_ATTR_GNU];
c6e65352
DJ
4703
4704 /* Check for conflicting Tag_GNU_Power_ABI_Vector attributes and
4705 merge non-conflicting ones. */
4706 in_attr = &in_attrs[Tag_GNU_Power_ABI_Vector];
4707 out_attr = &out_attrs[Tag_GNU_Power_ABI_Vector];
4708 if (in_attr->i != out_attr->i)
4709 {
005d79fd
AM
4710 int in_vec = in_attr->i & 3;
4711 int out_vec = out_attr->i & 3;
c6e65352 4712
005d79fd
AM
4713 if (in_vec == 0)
4714 ;
4715 else if (out_vec == 0)
c6e65352 4716 {
005d79fd
AM
4717 out_attr->type = 1;
4718 out_attr->i = in_vec;
c6e65352 4719 }
c6e65352
DJ
4720 /* For now, allow generic to transition to AltiVec or SPE
4721 without a warning. If GCC marked files with their stack
4722 alignment and used don't-care markings for files which are
4723 not affected by the vector ABI, we could warn about this
4724 case too. */
005d79fd 4725 else if (in_vec == 1)
c6e65352 4726 ;
005d79fd
AM
4727 else if (out_vec == 1)
4728 {
4729 out_attr->type = 1;
4730 out_attr->i = in_vec;
4731 }
4732 else if (out_vec < in_vec)
c6e65352 4733 _bfd_error_handler
695344c0 4734 /* xgettext:c-format */
871b3ab2 4735 (_("Warning: %pB uses AltiVec vector ABI, %pB uses SPE vector ABI"),
005d79fd
AM
4736 obfd, ibfd);
4737 else if (out_vec > in_vec)
c6e65352 4738 _bfd_error_handler
695344c0 4739 /* xgettext:c-format */
871b3ab2 4740 (_("Warning: %pB uses AltiVec vector ABI, %pB uses SPE vector ABI"),
005d79fd 4741 ibfd, obfd);
34c8bcba
JM
4742 }
4743
f82e0623
NF
4744 /* Check for conflicting Tag_GNU_Power_ABI_Struct_Return attributes
4745 and merge non-conflicting ones. */
4746 in_attr = &in_attrs[Tag_GNU_Power_ABI_Struct_Return];
4747 out_attr = &out_attrs[Tag_GNU_Power_ABI_Struct_Return];
4748 if (in_attr->i != out_attr->i)
4749 {
005d79fd
AM
4750 int in_struct = in_attr->i & 3;
4751 int out_struct = out_attr->i & 3;
4752
4753 if (in_struct == 0 || in_struct == 3)
f82e0623 4754 ;
005d79fd
AM
4755 else if (out_struct == 0)
4756 {
4757 out_attr->type = 1;
4758 out_attr->i = in_struct;
4759 }
4760 else if (out_struct < in_struct)
4761 _bfd_error_handler
695344c0 4762 /* xgettext:c-format */
871b3ab2
AM
4763 (_("Warning: %pB uses r3/r4 for small structure returns, "
4764 "%pB uses memory"), obfd, ibfd);
005d79fd
AM
4765 else if (out_struct > in_struct)
4766 _bfd_error_handler
695344c0 4767 /* xgettext:c-format */
871b3ab2
AM
4768 (_("Warning: %pB uses r3/r4 for small structure returns, "
4769 "%pB uses memory"), ibfd, obfd);
f82e0623
NF
4770 }
4771
34c8bcba 4772 /* Merge Tag_compatibility attributes and any common GNU ones. */
50e03d47 4773 _bfd_elf_merge_object_attributes (ibfd, info);
34c8bcba
JM
4774
4775 return TRUE;
4776}
4777
8853c3d3
AM
4778/* Merge backend specific data from an object file to the output
4779 object file when linking. */
4780
4781static bfd_boolean
50e03d47 4782ppc_elf_merge_private_bfd_data (bfd *ibfd, struct bfd_link_info *info)
8853c3d3 4783{
50e03d47 4784 bfd *obfd = info->output_bfd;
8853c3d3
AM
4785 flagword old_flags;
4786 flagword new_flags;
4787 bfd_boolean error;
4788
0c8d6e5c 4789 if (!is_ppc_elf (ibfd) || !is_ppc_elf (obfd))
8853c3d3
AM
4790 return TRUE;
4791
cc643b88 4792 /* Check if we have the same endianness. */
50e03d47 4793 if (! _bfd_generic_verify_endian_match (ibfd, info))
8853c3d3
AM
4794 return FALSE;
4795
50e03d47 4796 if (!ppc_elf_merge_obj_attributes (ibfd, info))
34c8bcba
JM
4797 return FALSE;
4798
8853c3d3
AM
4799 new_flags = elf_elfheader (ibfd)->e_flags;
4800 old_flags = elf_elfheader (obfd)->e_flags;
4801 if (!elf_flags_init (obfd))
4802 {
4803 /* First call, no flags set. */
4804 elf_flags_init (obfd) = TRUE;
4805 elf_elfheader (obfd)->e_flags = new_flags;
4806 }
4807
4808 /* Compatible flags are ok. */
4809 else if (new_flags == old_flags)
4810 ;
4811
4812 /* Incompatible flags. */
4813 else
4814 {
4815 /* Warn about -mrelocatable mismatch. Allow -mrelocatable-lib
4816 to be linked with either. */
4817 error = FALSE;
4818 if ((new_flags & EF_PPC_RELOCATABLE) != 0
4819 && (old_flags & (EF_PPC_RELOCATABLE | EF_PPC_RELOCATABLE_LIB)) == 0)
4820 {
4821 error = TRUE;
4eca0228 4822 _bfd_error_handler
871b3ab2 4823 (_("%pB: compiled with -mrelocatable and linked with "
8853c3d3
AM
4824 "modules compiled normally"), ibfd);
4825 }
4826 else if ((new_flags & (EF_PPC_RELOCATABLE | EF_PPC_RELOCATABLE_LIB)) == 0
4827 && (old_flags & EF_PPC_RELOCATABLE) != 0)
4828 {
4829 error = TRUE;
4eca0228 4830 _bfd_error_handler
871b3ab2 4831 (_("%pB: compiled normally and linked with "
8853c3d3
AM
4832 "modules compiled with -mrelocatable"), ibfd);
4833 }
4834
4835 /* The output is -mrelocatable-lib iff both the input files are. */
4836 if (! (new_flags & EF_PPC_RELOCATABLE_LIB))
4837 elf_elfheader (obfd)->e_flags &= ~EF_PPC_RELOCATABLE_LIB;
4838
4839 /* The output is -mrelocatable iff it can't be -mrelocatable-lib,
4840 but each input file is either -mrelocatable or -mrelocatable-lib. */
4841 if (! (elf_elfheader (obfd)->e_flags & EF_PPC_RELOCATABLE_LIB)
4842 && (new_flags & (EF_PPC_RELOCATABLE_LIB | EF_PPC_RELOCATABLE))
4843 && (old_flags & (EF_PPC_RELOCATABLE_LIB | EF_PPC_RELOCATABLE)))
4844 elf_elfheader (obfd)->e_flags |= EF_PPC_RELOCATABLE;
4845
4846 /* Do not warn about eabi vs. V.4 mismatch, just or in the bit if
4847 any module uses it. */
4848 elf_elfheader (obfd)->e_flags |= (new_flags & EF_PPC_EMB);
4849
4850 new_flags &= ~(EF_PPC_RELOCATABLE | EF_PPC_RELOCATABLE_LIB | EF_PPC_EMB);
4851 old_flags &= ~(EF_PPC_RELOCATABLE | EF_PPC_RELOCATABLE_LIB | EF_PPC_EMB);
4852
4853 /* Warn about any other mismatches. */
4854 if (new_flags != old_flags)
4855 {
4856 error = TRUE;
4eca0228 4857 _bfd_error_handler
695344c0 4858 /* xgettext:c-format */
871b3ab2 4859 (_("%pB: uses different e_flags (%#x) fields "
cd9af601
AM
4860 "than previous modules (%#x)"),
4861 ibfd, new_flags, old_flags);
8853c3d3
AM
4862 }
4863
4864 if (error)
4865 {
4866 bfd_set_error (bfd_error_bad_value);
4867 return FALSE;
4868 }
4869 }
4870
4871 return TRUE;
4872}
b9c361e0
JL
4873
4874static void
95f0d0d2 4875ppc_elf_vle_split16 (bfd *input_bfd,
08dc996f
AM
4876 asection *input_section,
4877 unsigned long offset,
95f0d0d2 4878 bfd_byte *loc,
86c95733 4879 bfd_vma value,
08dc996f
AM
4880 split16_format_type split16_format,
4881 bfd_boolean fixup)
b9c361e0 4882{
08dc996f 4883 unsigned int insn, opcode, top5;
b9c361e0 4884
95f0d0d2 4885 insn = bfd_get_32 (input_bfd, loc);
673cff9b 4886 opcode = insn & 0xfc00f800;
08dc996f
AM
4887 if (opcode == E_OR2I_INSN
4888 || opcode == E_AND2I_DOT_INSN
4889 || opcode == E_OR2IS_INSN
4890 || opcode == E_LIS_INSN
4891 || opcode == E_AND2IS_DOT_INSN)
4892 {
4893 if (split16_format != split16a_type)
4894 {
4895 if (fixup)
4896 split16_format = split16a_type;
4897 else
4898 _bfd_error_handler
4899 /* xgettext:c-format */
871b3ab2 4900 (_("%pB(%pA+0x%lx): expected 16A style relocation on 0x%08x insn"),
08dc996f
AM
4901 input_bfd, input_section, offset, opcode);
4902 }
4903 }
4904 else if (opcode == E_ADD2I_DOT_INSN
4905 || opcode == E_ADD2IS_INSN
4906 || opcode == E_CMP16I_INSN
4907 || opcode == E_MULL2I_INSN
4908 || opcode == E_CMPL16I_INSN
4909 || opcode == E_CMPH16I_INSN
4910 || opcode == E_CMPHL16I_INSN)
4911 {
4912 if (split16_format != split16d_type)
4913 {
4914 if (fixup)
4915 split16_format = split16d_type;
4916 else
4917 _bfd_error_handler
4918 /* xgettext:c-format */
871b3ab2 4919 (_("%pB(%pA+0x%lx): expected 16D style relocation on 0x%08x insn"),
08dc996f
AM
4920 input_bfd, input_section, offset, opcode);
4921 }
4922 }
86c95733 4923 top5 = value & 0xf800;
5499c7c7
AM
4924 top5 = top5 << (split16_format == split16a_type ? 5 : 10);
4925 insn &= (split16_format == split16a_type ? ~0x1f07ff : ~0x3e007ff);
b9c361e0 4926 insn |= top5;
86c95733 4927 insn |= value & 0x7ff;
95f0d0d2 4928 bfd_put_32 (input_bfd, insn, loc);
b9c361e0 4929}
83eef883
AFB
4930
4931static void
4932ppc_elf_vle_split20 (bfd *output_bfd, bfd_byte *loc, bfd_vma value)
4933{
4934 unsigned int insn;
4935
4936 insn = bfd_get_32 (output_bfd, loc);
4937 /* We have an li20 field, bits 17..20, 11..15, 21..31. */
4938 /* Top 4 bits of value to 17..20. */
4939 insn |= (value & 0xf0000) >> 5;
4940 /* Next 5 bits of the value to 11..15. */
4941 insn |= (value & 0xf800) << 5;
4942 /* And the final 11 bits of the value to bits 21 to 31. */
4943 insn |= value & 0x7ff;
4944 bfd_put_32 (output_bfd, insn, loc);
4945}
4946
8853c3d3 4947\f
d7128ce4
AM
4948/* Choose which PLT scheme to use, and set .plt flags appropriately.
4949 Returns -1 on error, 0 for old PLT, 1 for new PLT. */
4950int
4951ppc_elf_select_plt_layout (bfd *output_bfd ATTRIBUTE_UNUSED,
5446cbdf 4952 struct bfd_link_info *info)
d7128ce4
AM
4953{
4954 struct ppc_elf_link_hash_table *htab;
9d8504b1 4955 flagword flags;
d7128ce4
AM
4956
4957 htab = ppc_elf_hash_table (info);
4a3dc543
RS
4958
4959 if (htab->plt_type == PLT_UNSET)
016687f8 4960 {
b3874e1a
AM
4961 struct elf_link_hash_entry *h;
4962
5446cbdf 4963 if (htab->params->plt_style == PLT_OLD)
016687f8 4964 htab->plt_type = PLT_OLD;
0e1862bb 4965 else if (bfd_link_pic (info)
b3874e1a
AM
4966 && htab->elf.dynamic_sections_created
4967 && (h = elf_link_hash_lookup (&htab->elf, "_mcount",
4968 FALSE, FALSE, TRUE)) != NULL
4969 && (h->type == STT_FUNC
4970 || h->needs_plt)
4971 && h->ref_regular
4972 && !(SYMBOL_CALLS_LOCAL (info, h)
21d68fcd 4973 || UNDEFWEAK_NO_DYNAMIC_RELOC (info, h)))
b3874e1a
AM
4974 {
4975 /* Profiling of shared libs (and pies) is not supported with
4976 secure plt, because ppc32 does profiling before a
4977 function prologue and a secure plt pic call stubs needs
4978 r30 to be set up. */
4979 htab->plt_type = PLT_OLD;
4980 }
016687f8
AM
4981 else
4982 {
4983 bfd *ibfd;
5446cbdf 4984 enum ppc_elf_plt_type plt_type = htab->params->plt_style;
016687f8
AM
4985
4986 /* Look through the reloc flags left by ppc_elf_check_relocs.
4987 Use the old style bss plt if a file makes plt calls
4988 without using the new relocs, and if ld isn't given
4989 --secure-plt and we never see REL16 relocs. */
4990 if (plt_type == PLT_UNSET)
4991 plt_type = PLT_OLD;
c72f2fb2 4992 for (ibfd = info->input_bfds; ibfd; ibfd = ibfd->link.next)
0c8d6e5c 4993 if (is_ppc_elf (ibfd))
016687f8
AM
4994 {
4995 if (ppc_elf_tdata (ibfd)->has_rel16)
4996 plt_type = PLT_NEW;
4997 else if (ppc_elf_tdata (ibfd)->makes_plt_call)
4998 {
4999 plt_type = PLT_OLD;
5000 htab->old_bfd = ibfd;
5001 break;
5002 }
5003 }
5004 htab->plt_type = plt_type;
5005 }
5006 }
5446cbdf 5007 if (htab->plt_type == PLT_OLD && htab->params->plt_style == PLT_NEW)
b3874e1a
AM
5008 {
5009 if (htab->old_bfd != NULL)
871b3ab2 5010 info->callbacks->einfo (_("%P: bss-plt forced due to %pB\n"),
b3874e1a
AM
5011 htab->old_bfd);
5012 else
5013 info->callbacks->einfo (_("%P: bss-plt forced by profiling\n"));
5014 }
d7128ce4 5015
4a3dc543 5016 BFD_ASSERT (htab->plt_type != PLT_VXWORKS);
9d8504b1 5017
4a3dc543 5018 if (htab->plt_type == PLT_NEW)
9d8504b1
PB
5019 {
5020 flags = (SEC_ALLOC | SEC_LOAD | SEC_HAS_CONTENTS
5021 | SEC_IN_MEMORY | SEC_LINKER_CREATED);
86b9da88
AM
5022
5023 /* The new PLT is a loaded section. */
ce558b89
AM
5024 if (htab->elf.splt != NULL
5025 && !bfd_set_section_flags (htab->elf.dynobj, htab->elf.splt, flags))
86b9da88
AM
5026 return -1;
5027
5028 /* The new GOT is not executable. */
ce558b89
AM
5029 if (htab->elf.sgot != NULL
5030 && !bfd_set_section_flags (htab->elf.dynobj, htab->elf.sgot, flags))
86b9da88 5031 return -1;
d7128ce4
AM
5032 }
5033 else
5034 {
5035 /* Stop an unused .glink section from affecting .text alignment. */
86b9da88
AM
5036 if (htab->glink != NULL
5037 && !bfd_set_section_alignment (htab->elf.dynobj, htab->glink, 0))
5038 return -1;
d7128ce4 5039 }
4a3dc543 5040 return htab->plt_type == PLT_NEW;
d7128ce4
AM
5041}
5042\f
25dbc73a
AM
5043/* Return the section that should be marked against GC for a given
5044 relocation. */
586119b3 5045
25dbc73a
AM
5046static asection *
5047ppc_elf_gc_mark_hook (asection *sec,
07adf181 5048 struct bfd_link_info *info,
25dbc73a
AM
5049 Elf_Internal_Rela *rel,
5050 struct elf_link_hash_entry *h,
5051 Elf_Internal_Sym *sym)
5052{
5053 if (h != NULL)
07adf181
AM
5054 switch (ELF32_R_TYPE (rel->r_info))
5055 {
5056 case R_PPC_GNU_VTINHERIT:
5057 case R_PPC_GNU_VTENTRY:
5058 return NULL;
5059 }
5060
5061 return _bfd_elf_gc_mark_hook (sec, info, rel, h, sym);
25dbc73a 5062}
25dbc73a 5063\f
3a71aa26
AM
5064/* Set plt output section type, htab->tls_get_addr, and call the
5065 generic ELF tls_setup function. */
7fce784e 5066
25dbc73a 5067asection *
5446cbdf 5068ppc_elf_tls_setup (bfd *obfd, struct bfd_link_info *info)
7fce784e 5069{
25dbc73a 5070 struct ppc_elf_link_hash_table *htab;
7fce784e 5071
25dbc73a 5072 htab = ppc_elf_hash_table (info);
a7f2871e
AM
5073 htab->tls_get_addr = elf_link_hash_lookup (&htab->elf, "__tls_get_addr",
5074 FALSE, FALSE, TRUE);
f01f1741
AM
5075 if (htab->plt_type != PLT_NEW)
5076 htab->params->no_tls_get_addr_opt = TRUE;
5077
5446cbdf 5078 if (!htab->params->no_tls_get_addr_opt)
a7f2871e
AM
5079 {
5080 struct elf_link_hash_entry *opt, *tga;
5081 opt = elf_link_hash_lookup (&htab->elf, "__tls_get_addr_opt",
5082 FALSE, FALSE, TRUE);
5083 if (opt != NULL
5084 && (opt->root.type == bfd_link_hash_defined
5085 || opt->root.type == bfd_link_hash_defweak))
5086 {
5087 /* If glibc supports an optimized __tls_get_addr call stub,
5088 signalled by the presence of __tls_get_addr_opt, and we'll
5089 be calling __tls_get_addr via a plt call stub, then
5090 make __tls_get_addr point to __tls_get_addr_opt. */
5091 tga = htab->tls_get_addr;
5092 if (htab->elf.dynamic_sections_created
5093 && tga != NULL
5094 && (tga->type == STT_FUNC
5095 || tga->needs_plt)
5096 && !(SYMBOL_CALLS_LOCAL (info, tga)
21d68fcd 5097 || UNDEFWEAK_NO_DYNAMIC_RELOC (info, tga)))
a7f2871e
AM
5098 {
5099 struct plt_entry *ent;
32af9f6e
AM
5100 for (ent = tga->plt.plist; ent != NULL; ent = ent->next)
5101 if (ent->plt.refcount > 0)
5102 break;
5103 if (ent != NULL)
a7f2871e
AM
5104 {
5105 tga->root.type = bfd_link_hash_indirect;
5106 tga->root.u.i.link = &opt->root;
5107 ppc_elf_copy_indirect_symbol (info, opt, tga);
b531344c 5108 opt->mark = 1;
a7f2871e
AM
5109 if (opt->dynindx != -1)
5110 {
5111 /* Use __tls_get_addr_opt in dynamic relocations. */
5112 opt->dynindx = -1;
5113 _bfd_elf_strtab_delref (elf_hash_table (info)->dynstr,
5114 opt->dynstr_index);
5115 if (!bfd_elf_link_record_dynamic_symbol (info, opt))
5116 return FALSE;
5117 }
5118 htab->tls_get_addr = opt;
5119 }
5120 }
5121 }
5122 else
5446cbdf 5123 htab->params->no_tls_get_addr_opt = TRUE;
a7f2871e 5124 }
4a3dc543 5125 if (htab->plt_type == PLT_NEW
ce558b89
AM
5126 && htab->elf.splt != NULL
5127 && htab->elf.splt->output_section != NULL)
d7128ce4 5128 {
ce558b89
AM
5129 elf_section_type (htab->elf.splt->output_section) = SHT_PROGBITS;
5130 elf_section_flags (htab->elf.splt->output_section) = SHF_ALLOC + SHF_WRITE;
d7128ce4
AM
5131 }
5132
25dbc73a 5133 return _bfd_elf_tls_setup (obfd, info);
7fce784e
AS
5134}
5135
3a71aa26
AM
5136/* Return TRUE iff REL is a branch reloc with a global symbol matching
5137 HASH. */
5138
5139static bfd_boolean
5140branch_reloc_hash_match (const bfd *ibfd,
5141 const Elf_Internal_Rela *rel,
5142 const struct elf_link_hash_entry *hash)
5143{
5144 Elf_Internal_Shdr *symtab_hdr = &elf_symtab_hdr (ibfd);
5145 enum elf_ppc_reloc_type r_type = ELF32_R_TYPE (rel->r_info);
5146 unsigned int r_symndx = ELF32_R_SYM (rel->r_info);
5147
e054468f 5148 if (r_symndx >= symtab_hdr->sh_info && is_branch_reloc (r_type))
3a71aa26
AM
5149 {
5150 struct elf_link_hash_entry **sym_hashes = elf_sym_hashes (ibfd);
5151 struct elf_link_hash_entry *h;
5152
5153 h = sym_hashes[r_symndx - symtab_hdr->sh_info];
5154 while (h->root.type == bfd_link_hash_indirect
5155 || h->root.type == bfd_link_hash_warning)
5156 h = (struct elf_link_hash_entry *) h->root.u.i.link;
5157 if (h == hash)
5158 return TRUE;
5159 }
5160 return FALSE;
5161}
5162
25dbc73a
AM
5163/* Run through all the TLS relocs looking for optimization
5164 opportunities. */
252b5132 5165
25dbc73a
AM
5166bfd_boolean
5167ppc_elf_tls_optimize (bfd *obfd ATTRIBUTE_UNUSED,
5168 struct bfd_link_info *info)
252b5132 5169{
7fce784e 5170 bfd *ibfd;
25dbc73a
AM
5171 asection *sec;
5172 struct ppc_elf_link_hash_table *htab;
b7fcf6f6 5173 int pass;
252b5132 5174
3cbc1e5e 5175 if (!bfd_link_executable (info))
25dbc73a 5176 return TRUE;
252b5132 5177
7619e7c7 5178 htab = ppc_elf_hash_table (info);
663a1470
AM
5179 if (htab == NULL)
5180 return FALSE;
5181
b7fcf6f6
AM
5182 /* Make two passes through the relocs. First time check that tls
5183 relocs involved in setting up a tls_get_addr call are indeed
663a1470
AM
5184 followed by such a call. If they are not, don't do any tls
5185 optimization. On the second pass twiddle tls_mask flags to
5186 notify relocate_section that optimization can be done, and
5187 adjust got and plt refcounts. */
b7fcf6f6 5188 for (pass = 0; pass < 2; ++pass)
c72f2fb2 5189 for (ibfd = info->input_bfds; ibfd != NULL; ibfd = ibfd->link.next)
b7fcf6f6
AM
5190 {
5191 Elf_Internal_Sym *locsyms = NULL;
0ffa91dd 5192 Elf_Internal_Shdr *symtab_hdr = &elf_symtab_hdr (ibfd);
32af9f6e 5193 asection *got2 = bfd_get_section_by_name (ibfd, ".got2");
7619e7c7 5194
b7fcf6f6
AM
5195 for (sec = ibfd->sections; sec != NULL; sec = sec->next)
5196 if (sec->has_tls_reloc && !bfd_is_abs_section (sec->output_section))
5197 {
5198 Elf_Internal_Rela *relstart, *rel, *relend;
663a1470 5199 int expecting_tls_get_addr = 0;
252b5132 5200
b7fcf6f6
AM
5201 /* Read the relocations. */
5202 relstart = _bfd_elf_link_read_relocs (ibfd, sec, NULL, NULL,
5203 info->keep_memory);
5204 if (relstart == NULL)
5205 return FALSE;
7619e7c7 5206
b7fcf6f6
AM
5207 relend = relstart + sec->reloc_count;
5208 for (rel = relstart; rel < relend; rel++)
5209 {
5210 enum elf_ppc_reloc_type r_type;
5211 unsigned long r_symndx;
5212 struct elf_link_hash_entry *h = NULL;
5213 char *tls_mask;
5214 char tls_set, tls_clear;
5215 bfd_boolean is_local;
b7fcf6f6
AM
5216 bfd_signed_vma *got_count;
5217
5218 r_symndx = ELF32_R_SYM (rel->r_info);
5219 if (r_symndx >= symtab_hdr->sh_info)
5220 {
5221 struct elf_link_hash_entry **sym_hashes;
7fce784e 5222
b7fcf6f6
AM
5223 sym_hashes = elf_sym_hashes (ibfd);
5224 h = sym_hashes[r_symndx - symtab_hdr->sh_info];
5225 while (h->root.type == bfd_link_hash_indirect
5226 || h->root.type == bfd_link_hash_warning)
5227 h = (struct elf_link_hash_entry *) h->root.u.i.link;
5228 }
7619e7c7 5229
b7fcf6f6
AM
5230 is_local = FALSE;
5231 if (h == NULL
5232 || !h->def_dynamic)
5233 is_local = TRUE;
7619e7c7 5234
b7fcf6f6 5235 r_type = ELF32_R_TYPE (rel->r_info);
663a1470
AM
5236 /* If this section has old-style __tls_get_addr calls
5237 without marker relocs, then check that each
5238 __tls_get_addr call reloc is preceded by a reloc
5239 that conceivably belongs to the __tls_get_addr arg
5240 setup insn. If we don't find matching arg setup
5241 relocs, don't do any tls optimization. */
5242 if (pass == 0
5243 && sec->has_tls_get_addr_call
5244 && h != NULL
5245 && h == htab->tls_get_addr
5246 && !expecting_tls_get_addr
5247 && is_branch_reloc (r_type))
5248 {
25f53a85 5249 info->callbacks->minfo ("%H __tls_get_addr lost arg, "
663a1470
AM
5250 "TLS optimization disabled\n",
5251 ibfd, sec, rel->r_offset);
5252 if (elf_section_data (sec)->relocs != relstart)
5253 free (relstart);
5254 return TRUE;
5255 }
5256
5257 expecting_tls_get_addr = 0;
b7fcf6f6
AM
5258 switch (r_type)
5259 {
5260 case R_PPC_GOT_TLSLD16:
5261 case R_PPC_GOT_TLSLD16_LO:
5262 expecting_tls_get_addr = 1;
1a0670f3 5263 /* Fall through. */
b7fcf6f6
AM
5264
5265 case R_PPC_GOT_TLSLD16_HI:
5266 case R_PPC_GOT_TLSLD16_HA:
5267 /* These relocs should never be against a symbol
5268 defined in a shared lib. Leave them alone if
5269 that turns out to be the case. */
5270 if (!is_local)
5271 continue;
5272
5273 /* LD -> LE */
5274 tls_set = 0;
5275 tls_clear = TLS_LD;
5276 break;
5277
5278 case R_PPC_GOT_TLSGD16:
5279 case R_PPC_GOT_TLSGD16_LO:
5280 expecting_tls_get_addr = 1;
1a0670f3 5281 /* Fall through. */
b7fcf6f6
AM
5282
5283 case R_PPC_GOT_TLSGD16_HI:
5284 case R_PPC_GOT_TLSGD16_HA:
5285 if (is_local)
5286 /* GD -> LE */
5287 tls_set = 0;
5288 else
5289 /* GD -> IE */
5290 tls_set = TLS_TLS | TLS_TPRELGD;
5291 tls_clear = TLS_GD;
5292 break;
5293
5294 case R_PPC_GOT_TPREL16:
5295 case R_PPC_GOT_TPREL16_LO:
5296 case R_PPC_GOT_TPREL16_HI:
5297 case R_PPC_GOT_TPREL16_HA:
5298 if (is_local)
5299 {
5300 /* IE -> LE */
5301 tls_set = 0;
5302 tls_clear = TLS_TPREL;
5303 break;
5304 }
5305 else
5306 continue;
5307
32af9f6e
AM
5308 case R_PPC_TLSGD:
5309 case R_PPC_TLSLD:
5310 expecting_tls_get_addr = 2;
5311 tls_set = 0;
5312 tls_clear = 0;
5313 break;
5314
b7fcf6f6 5315 default:
25dbc73a 5316 continue;
b7fcf6f6 5317 }
25dbc73a 5318
b7fcf6f6
AM
5319 if (pass == 0)
5320 {
727fc41e 5321 if (!expecting_tls_get_addr
32af9f6e
AM
5322 || (expecting_tls_get_addr == 1
5323 && !sec->has_tls_get_addr_call))
b7fcf6f6 5324 continue;
25dbc73a 5325
3a71aa26
AM
5326 if (rel + 1 < relend
5327 && branch_reloc_hash_match (ibfd, rel + 1,
5328 htab->tls_get_addr))
5329 continue;
25dbc73a 5330
b7fcf6f6
AM
5331 /* Uh oh, we didn't find the expected call. We
5332 could just mark this symbol to exclude it
5333 from tls optimization but it's safer to skip
663a1470 5334 the entire optimization. */
25f53a85 5335 info->callbacks->minfo (_("%H arg lost __tls_get_addr, "
663a1470
AM
5336 "TLS optimization disabled\n"),
5337 ibfd, sec, rel->r_offset);
5338 if (elf_section_data (sec)->relocs != relstart)
5339 free (relstart);
5340 return TRUE;
b7fcf6f6 5341 }
25dbc73a 5342
32af9f6e
AM
5343 if (expecting_tls_get_addr)
5344 {
5345 struct plt_entry *ent;
5346 bfd_vma addend = 0;
5347
0e1862bb 5348 if (bfd_link_pic (info)
32af9f6e
AM
5349 && ELF32_R_TYPE (rel[1].r_info) == R_PPC_PLTREL24)
5350 addend = rel[1].r_addend;
5351 ent = find_plt_ent (&htab->tls_get_addr->plt.plist,
5352 got2, addend);
5353 if (ent != NULL && ent->plt.refcount > 0)
5354 ent->plt.refcount -= 1;
5355
5356 if (expecting_tls_get_addr == 2)
5357 continue;
5358 }
5359
b7fcf6f6
AM
5360 if (h != NULL)
5361 {
5362 tls_mask = &ppc_elf_hash_entry (h)->tls_mask;
5363 got_count = &h->got.refcount;
5364 }
5365 else
5366 {
b7fcf6f6 5367 bfd_signed_vma *lgot_refs;
e054468f 5368 struct plt_entry **local_plt;
b7fcf6f6 5369 char *lgot_masks;
25dbc73a 5370
b7fcf6f6
AM
5371 if (locsyms == NULL)
5372 {
5373 locsyms = (Elf_Internal_Sym *) symtab_hdr->contents;
5374 if (locsyms == NULL)
5375 locsyms = bfd_elf_get_elf_syms (ibfd, symtab_hdr,
5376 symtab_hdr->sh_info,
5377 0, NULL, NULL, NULL);
5378 if (locsyms == NULL)
5379 {
5380 if (elf_section_data (sec)->relocs != relstart)
5381 free (relstart);
5382 return FALSE;
5383 }
5384 }
b7fcf6f6
AM
5385 lgot_refs = elf_local_got_refcounts (ibfd);
5386 if (lgot_refs == NULL)
5387 abort ();
e054468f
AM
5388 local_plt = (struct plt_entry **)
5389 (lgot_refs + symtab_hdr->sh_info);
5390 lgot_masks = (char *) (local_plt + symtab_hdr->sh_info);
b7fcf6f6
AM
5391 tls_mask = &lgot_masks[r_symndx];
5392 got_count = &lgot_refs[r_symndx];
5393 }
25dbc73a 5394
b7fcf6f6
AM
5395 if (tls_set == 0)
5396 {
5397 /* We managed to get rid of a got entry. */
5398 if (*got_count > 0)
5399 *got_count -= 1;
5400 }
25dbc73a 5401
b7fcf6f6
AM
5402 *tls_mask |= tls_set;
5403 *tls_mask &= ~tls_clear;
5404 }
25dbc73a 5405
b7fcf6f6
AM
5406 if (elf_section_data (sec)->relocs != relstart)
5407 free (relstart);
5408 }
5409
5410 if (locsyms != NULL
5411 && (symtab_hdr->contents != (unsigned char *) locsyms))
5412 {
5413 if (!info->keep_memory)
5414 free (locsyms);
5415 else
5416 symtab_hdr->contents = (unsigned char *) locsyms;
5417 }
5418 }
9a23f96e 5419 htab->do_tls_opt = 1;
25dbc73a
AM
5420 return TRUE;
5421}
5422\f
98bbb1b8 5423/* Find dynamic relocs for H that apply to read-only sections. */
625af618 5424
98bbb1b8
AM
5425static asection *
5426readonly_dynrelocs (struct elf_link_hash_entry *h)
625af618 5427{
6061a67d 5428 struct elf_dyn_relocs *p;
625af618
AM
5429
5430 for (p = ppc_elf_hash_entry (h)->dyn_relocs; p != NULL; p = p->next)
5431 {
5432 asection *s = p->sec->output_section;
5433
98bbb1b8
AM
5434 if (s != NULL && (s->flags & SEC_READONLY) != 0)
5435 return p->sec;
625af618 5436 }
98bbb1b8 5437 return NULL;
625af618
AM
5438}
5439
287c7eaf
AM
5440/* Return true if we have dynamic relocs against H or any of its weak
5441 aliases, that apply to read-only sections. Cannot be used after
5442 size_dynamic_sections. */
5443
5444static bfd_boolean
5445alias_readonly_dynrelocs (struct elf_link_hash_entry *h)
5446{
5447 struct ppc_elf_link_hash_entry *eh = ppc_elf_hash_entry (h);
5448 do
5449 {
5450 if (readonly_dynrelocs (&eh->elf))
5451 return TRUE;
5452 eh = ppc_elf_hash_entry (eh->elf.u.alias);
5453 } while (eh != NULL && &eh->elf != h);
5454
5455 return FALSE;
5456}
5457
5458/* Return whether H has pc-relative dynamic relocs. */
5459
5460static bfd_boolean
5461pc_dynrelocs (struct elf_link_hash_entry *h)
5462{
5463 struct elf_dyn_relocs *p;
5464
5465 for (p = ppc_elf_hash_entry (h)->dyn_relocs; p != NULL; p = p->next)
5466 if (p->pc_count != 0)
5467 return TRUE;
5468 return FALSE;
5469}
5470
25dbc73a
AM
5471/* Adjust a symbol defined by a dynamic object and referenced by a
5472 regular object. The current definition is in some section of the
5473 dynamic object, but we're not including those sections. We have to
5474 change the definition to something the rest of the link can
5475 understand. */
7fce784e 5476
25dbc73a
AM
5477static bfd_boolean
5478ppc_elf_adjust_dynamic_symbol (struct bfd_link_info *info,
5479 struct elf_link_hash_entry *h)
5480{
5481 struct ppc_elf_link_hash_table *htab;
5482 asection *s;
7fce784e 5483
25dbc73a
AM
5484#ifdef DEBUG
5485 fprintf (stderr, "ppc_elf_adjust_dynamic_symbol called for %s\n",
5486 h->root.root.string);
5487#endif
252b5132 5488
25dbc73a
AM
5489 /* Make sure we know what is going on here. */
5490 htab = ppc_elf_hash_table (info);
5491 BFD_ASSERT (htab->elf.dynobj != NULL
5492 && (h->needs_plt
91e21fb7 5493 || h->type == STT_GNU_IFUNC
60d67dc8 5494 || h->is_weakalias
25dbc73a
AM
5495 || (h->def_dynamic
5496 && h->ref_regular
5497 && !h->def_regular)));
252b5132 5498
25dbc73a
AM
5499 /* Deal with function syms. */
5500 if (h->type == STT_FUNC
e054468f 5501 || h->type == STT_GNU_IFUNC
25dbc73a
AM
5502 || h->needs_plt)
5503 {
529fe20e
AM
5504 bfd_boolean local = (SYMBOL_CALLS_LOCAL (info, h)
5505 || UNDEFWEAK_NO_DYNAMIC_RELOC (info, h));
287c7eaf
AM
5506 /* Discard dyn_relocs when non-pic if we've decided that a
5507 function symbol is local. */
5508 if (!bfd_link_pic (info) && local)
5509 ppc_elf_hash_entry (h)->dyn_relocs = NULL;
529fe20e 5510
25dbc73a
AM
5511 /* Clear procedure linkage table information for any symbol that
5512 won't need a .plt entry. */
a6aa5195
AM
5513 struct plt_entry *ent;
5514 for (ent = h->plt.plist; ent != NULL; ent = ent->next)
5515 if (ent->plt.refcount > 0)
5516 break;
5517 if (ent == NULL
529fe20e 5518 || (h->type != STT_GNU_IFUNC && local))
252b5132 5519 {
25dbc73a 5520 /* A PLT entry is not required/allowed when:
252b5132 5521
25dbc73a
AM
5522 1. We are not using ld.so; because then the PLT entry
5523 can't be set up, so we can't use one. In this case,
5524 ppc_elf_adjust_dynamic_symbol won't even be called.
252b5132 5525
25dbc73a
AM
5526 2. GC has rendered the entry unused.
5527
5528 3. We know for certain that a call to this symbol
5529 will go to this object, or will remain undefined. */
a6aa5195 5530 h->plt.plist = NULL;
25dbc73a 5531 h->needs_plt = 0;
d1eca1e4 5532 h->pointer_equality_needed = 0;
25dbc73a 5533 }
625af618
AM
5534 else
5535 {
d1eca1e4
AM
5536 /* Taking a function's address in a read/write section
5537 doesn't require us to define the function symbol in the
1009ef28 5538 executable on a plt call stub. A dynamic reloc can
f0158f44
AM
5539 be used instead, giving better runtime performance.
5540 (Calls via that function pointer don't need to bounce
5541 through the plt call stub.) Similarly, use a dynamic
5542 reloc for a weak reference when possible, allowing the
5543 resolution of the symbol to be set at load time rather
5544 than link time. */
5545 if ((h->pointer_equality_needed
3988aed5
AM
5546 || (h->non_got_ref
5547 && !h->ref_regular_nonweak
5548 && !UNDEFWEAK_NO_DYNAMIC_RELOC (info, h)))
1009ef28
AM
5549 && !htab->is_vxworks
5550 && !ppc_elf_hash_entry (h)->has_sda_refs
98bbb1b8 5551 && !readonly_dynrelocs (h))
d1eca1e4
AM
5552 {
5553 h->pointer_equality_needed = 0;
3988aed5
AM
5554 /* If we haven't seen a branch reloc then we don't need
5555 a plt entry. */
5556 if (!h->needs_plt)
5557 h->plt.plist = NULL;
d1eca1e4 5558 }
287c7eaf 5559 else if (!bfd_link_pic (info))
529fe20e
AM
5560 /* We are going to be defining the function symbol on the
5561 plt stub, so no dyn_relocs needed when non-pic. */
287c7eaf 5562 ppc_elf_hash_entry (h)->dyn_relocs = NULL;
625af618 5563 }
d3e454b9 5564 h->protected_def = 0;
3988aed5 5565 /* Function symbols can't have copy relocs. */
25dbc73a 5566 return TRUE;
252b5132 5567 }
25dbc73a 5568 else
a6aa5195 5569 h->plt.plist = NULL;
252b5132 5570
25dbc73a
AM
5571 /* If this is a weak symbol, and there is a real definition, the
5572 processor independent code will have arranged for us to see the
5573 real definition first, and we can just use the same value. */
60d67dc8 5574 if (h->is_weakalias)
252b5132 5575 {
60d67dc8
AM
5576 struct elf_link_hash_entry *def = weakdef (h);
5577 BFD_ASSERT (def->root.type == bfd_link_hash_defined);
5578 h->root.u.def.section = def->root.u.def.section;
5579 h->root.u.def.value = def->root.u.def.value;
4a7e5234
AM
5580 if (def->root.u.def.section == htab->elf.sdynbss
5581 || def->root.u.def.section == htab->elf.sdynrelro
5582 || def->root.u.def.section == htab->dynsbss)
5583 ppc_elf_hash_entry (h)->dyn_relocs = NULL;
25dbc73a
AM
5584 return TRUE;
5585 }
dc810e39 5586
25dbc73a
AM
5587 /* This is a reference to a symbol defined by a dynamic object which
5588 is not a function. */
252b5132 5589
25dbc73a
AM
5590 /* If we are creating a shared library, we must presume that the
5591 only references to the symbol are via the global offset table.
5592 For such cases we need not do anything here; the relocations will
5593 be handled correctly by relocate_section. */
0e1862bb 5594 if (bfd_link_pic (info))
d3e454b9
AM
5595 {
5596 h->protected_def = 0;
5597 return TRUE;
5598 }
252b5132 5599
25dbc73a
AM
5600 /* If there are no references to this symbol that do not use the
5601 GOT, we don't need to generate a copy reloc. */
5602 if (!h->non_got_ref)
d3e454b9
AM
5603 {
5604 h->protected_def = 0;
5605 return TRUE;
5606 }
5607
5608 /* Protected variables do not work with .dynbss. The copy in
5609 .dynbss won't be used by the shared library with the protected
5610 definition for the variable. Editing to PIC, or text relocations
5611 are preferable to an incorrect program. */
5612 if (h->protected_def)
5613 {
5614 if (ELIMINATE_COPY_RELOCS
5615 && ppc_elf_hash_entry (h)->has_addr16_ha
5616 && ppc_elf_hash_entry (h)->has_addr16_lo
5617 && htab->params->pic_fixup == 0
5618 && info->disable_target_specific_optimizations <= 1)
5619 htab->params->pic_fixup = 1;
d3e454b9
AM
5620 return TRUE;
5621 }
25dbc73a 5622
a127494f
AM
5623 /* If -z nocopyreloc was given, we won't generate them either. */
5624 if (info->nocopyreloc)
529fe20e 5625 return TRUE;
a127494f 5626
dce2246a 5627 /* If we don't find any dynamic relocs in read-only sections, then
cfd2c773
NS
5628 we'll be keeping the dynamic relocs and avoiding the copy reloc.
5629 We can't do this if there are any small data relocations. This
5630 doesn't work on VxWorks, where we can not have dynamic
5631 relocations (other than copy and jump slot relocations) in an
5632 executable. */
4dc4a9a5 5633 if (ELIMINATE_COPY_RELOCS
cfd2c773 5634 && !ppc_elf_hash_entry (h)->has_sda_refs
625af618
AM
5635 && !htab->is_vxworks
5636 && !h->def_regular
287c7eaf 5637 && !alias_readonly_dynrelocs (h))
529fe20e 5638 return TRUE;
252b5132 5639
25dbc73a
AM
5640 /* We must allocate the symbol in our .dynbss section, which will
5641 become part of the .bss section of the executable. There will be
5642 an entry for this symbol in the .dynsym section. The dynamic
5643 object will contain position independent code, so all references
5644 from the dynamic object to this symbol will go through the global
5645 offset table. The dynamic linker will use the .dynsym entry to
5646 determine the address it must put in the global offset table, so
5647 both the dynamic object and the regular object will refer to the
5648 same memory location for the variable.
5649
4dc4a9a5
DJ
5650 Of course, if the symbol is referenced using SDAREL relocs, we
5651 must instead allocate it in .sbss. */
4dc4a9a5 5652 if (ppc_elf_hash_entry (h)->has_sda_refs)
25dbc73a 5653 s = htab->dynsbss;
5474d94f
AM
5654 else if ((h->root.u.def.section->flags & SEC_READONLY) != 0)
5655 s = htab->elf.sdynrelro;
25dbc73a 5656 else
9d19e4fd 5657 s = htab->elf.sdynbss;
25dbc73a
AM
5658 BFD_ASSERT (s != NULL);
5659
1d7e9d18 5660 if ((h->root.u.def.section->flags & SEC_ALLOC) != 0 && h->size != 0)
25dbc73a
AM
5661 {
5662 asection *srel;
5663
4a7e5234
AM
5664 /* We must generate a R_PPC_COPY reloc to tell the dynamic
5665 linker to copy the initial value out of the dynamic object
5666 and into the runtime process image. */
4dc4a9a5 5667 if (ppc_elf_hash_entry (h)->has_sda_refs)
25dbc73a 5668 srel = htab->relsbss;
5474d94f
AM
5669 else if ((h->root.u.def.section->flags & SEC_READONLY) != 0)
5670 srel = htab->elf.sreldynrelro;
25dbc73a 5671 else
9d19e4fd 5672 srel = htab->elf.srelbss;
25dbc73a
AM
5673 BFD_ASSERT (srel != NULL);
5674 srel->size += sizeof (Elf32_External_Rela);
5675 h->needs_copy = 1;
5676 }
7619e7c7 5677
529fe20e 5678 /* We no longer want dyn_relocs. */
287c7eaf 5679 ppc_elf_hash_entry (h)->dyn_relocs = NULL;
6cabe1ea 5680 return _bfd_elf_adjust_dynamic_copy (info, h, s);
25dbc73a
AM
5681}
5682\f
ac39eb42
AM
5683/* Generate a symbol to mark plt call stubs. For non-PIC code the sym is
5684 xxxxxxxx.plt_call32.<callee> where xxxxxxxx is a hex number, usually 0,
5685 specifying the addend on the plt relocation. For -fpic code, the sym
5686 is xxxxxxxx.plt_pic32.<callee>, and for -fPIC
5687 xxxxxxxx.got2.plt_pic32.<callee>. */
0ba07910
AM
5688
5689static bfd_boolean
5690add_stub_sym (struct plt_entry *ent,
5691 struct elf_link_hash_entry *h,
ac39eb42 5692 struct bfd_link_info *info)
0ba07910
AM
5693{
5694 struct elf_link_hash_entry *sh;
5695 size_t len1, len2, len3;
5696 char *name;
ac39eb42
AM
5697 const char *stub;
5698 struct ppc_elf_link_hash_table *htab = ppc_elf_hash_table (info);
5699
0e1862bb 5700 if (bfd_link_pic (info))
ac39eb42
AM
5701 stub = ".plt_pic32.";
5702 else
5703 stub = ".plt_call32.";
0ba07910
AM
5704
5705 len1 = strlen (h->root.root.string);
ac39eb42 5706 len2 = strlen (stub);
0ba07910
AM
5707 len3 = 0;
5708 if (ent->sec)
5709 len3 = strlen (ent->sec->name);
ac39eb42 5710 name = bfd_malloc (len1 + len2 + len3 + 9);
0ba07910
AM
5711 if (name == NULL)
5712 return FALSE;
5713 sprintf (name, "%08x", (unsigned) ent->addend & 0xffffffff);
5714 if (ent->sec)
5715 memcpy (name + 8, ent->sec->name, len3);
ac39eb42
AM
5716 memcpy (name + 8 + len3, stub, len2);
5717 memcpy (name + 8 + len3 + len2, h->root.root.string, len1 + 1);
0ba07910
AM
5718 sh = elf_link_hash_lookup (&htab->elf, name, TRUE, FALSE, FALSE);
5719 if (sh == NULL)
5720 return FALSE;
5721 if (sh->root.type == bfd_link_hash_new)
5722 {
5723 sh->root.type = bfd_link_hash_defined;
5724 sh->root.u.def.section = htab->glink;
5725 sh->root.u.def.value = ent->glink_offset;
5726 sh->ref_regular = 1;
5727 sh->def_regular = 1;
5728 sh->ref_regular_nonweak = 1;
5729 sh->forced_local = 1;
5730 sh->non_elf = 0;
2ec55de3 5731 sh->root.linker_def = 1;
0ba07910
AM
5732 }
5733 return TRUE;
5734}
5735
3b36f7e6
AM
5736/* Allocate NEED contiguous space in .got, and return the offset.
5737 Handles allocation of the got header when crossing 32k. */
5738
5739static bfd_vma
5740allocate_got (struct ppc_elf_link_hash_table *htab, unsigned int need)
5741{
5742 bfd_vma where;
4a3dc543 5743 unsigned int max_before_header;
3b36f7e6 5744
4a3dc543 5745 if (htab->plt_type == PLT_VXWORKS)
9d8504b1 5746 {
ce558b89
AM
5747 where = htab->elf.sgot->size;
5748 htab->elf.sgot->size += need;
9d8504b1 5749 }
3b36f7e6
AM
5750 else
5751 {
4a3dc543
RS
5752 max_before_header = htab->plt_type == PLT_NEW ? 32768 : 32764;
5753 if (need <= htab->got_gap)
3b36f7e6 5754 {
4a3dc543
RS
5755 where = max_before_header - htab->got_gap;
5756 htab->got_gap -= need;
5757 }
5758 else
5759 {
ce558b89
AM
5760 if (htab->elf.sgot->size + need > max_before_header
5761 && htab->elf.sgot->size <= max_before_header)
4a3dc543 5762 {
ce558b89
AM
5763 htab->got_gap = max_before_header - htab->elf.sgot->size;
5764 htab->elf.sgot->size = max_before_header + htab->got_header_size;
4a3dc543 5765 }
ce558b89
AM
5766 where = htab->elf.sgot->size;
5767 htab->elf.sgot->size += need;
3b36f7e6 5768 }
3b36f7e6
AM
5769 }
5770 return where;
5771}
5772
f15d0b54
AM
5773/* Calculate size of GOT entries for symbol given its TLS_MASK.
5774 TLS_LD is excluded because those go in a special GOT slot. */
5775
5776static inline unsigned int
5777got_entries_needed (int tls_mask)
5778{
5779 unsigned int need;
5780 if ((tls_mask & TLS_TLS) == 0)
5781 need = 4;
5782 else
5783 {
5784 need = 0;
5785 if ((tls_mask & TLS_GD) != 0)
5786 need += 8;
5787 if ((tls_mask & (TLS_TPREL | TLS_TPRELGD)) != 0)
5788 need += 4;
5789 if ((tls_mask & TLS_DTPREL) != 0)
5790 need += 4;
5791 }
5792 return need;
5793}
5794
5795/* Calculate size of relocs needed for symbol given its TLS_MASK and
5796 NEEDed GOT entries. KNOWN says a TPREL offset can be calculated at
5797 link time. */
5798
5799static inline unsigned int
5800got_relocs_needed (int tls_mask, unsigned int need, bfd_boolean known)
5801{
5802 /* All the entries we allocated need relocs.
5803 Except IE in executable with a local symbol. We could also omit
5804 the DTPREL reloc on the second word of a GD entry under the same
5805 condition as that for IE, but ld.so needs to differentiate
5806 LD and GD entries. */
5807 if ((tls_mask & (TLS_TPREL | TLS_TPRELGD)) != 0 && known)
5808 need -= 4;
5809 return need * sizeof (Elf32_External_Rela) / 4;
5810}
5811
46434633 5812/* If H is undefined, make it dynamic if that makes sense. */
f0158f44
AM
5813
5814static bfd_boolean
46434633
AM
5815ensure_undef_dynamic (struct bfd_link_info *info,
5816 struct elf_link_hash_entry *h)
f0158f44
AM
5817{
5818 struct elf_link_hash_table *htab = elf_hash_table (info);
5819
5820 if (htab->dynamic_sections_created
46434633
AM
5821 && ((info->dynamic_undefined_weak != 0
5822 && h->root.type == bfd_link_hash_undefweak)
5823 || h->root.type == bfd_link_hash_undefined)
f0158f44
AM
5824 && h->dynindx == -1
5825 && !h->forced_local
5826 && ELF_ST_VISIBILITY (h->other) == STV_DEFAULT)
5827 return bfd_elf_link_record_dynamic_symbol (info, h);
5828 return TRUE;
5829}
5830
25dbc73a 5831/* Allocate space in associated reloc sections for dynamic relocs. */
252b5132 5832
b34976b6 5833static bfd_boolean
25dbc73a 5834allocate_dynrelocs (struct elf_link_hash_entry *h, void *inf)
252b5132 5835{
25dbc73a
AM
5836 struct bfd_link_info *info = inf;
5837 struct ppc_elf_link_hash_entry *eh;
7619e7c7 5838 struct ppc_elf_link_hash_table *htab;
6061a67d 5839 struct elf_dyn_relocs *p;
f0158f44 5840 bfd_boolean dyn;
252b5132 5841
25dbc73a 5842 if (h->root.type == bfd_link_hash_indirect)
b34976b6 5843 return TRUE;
252b5132 5844
7619e7c7 5845 htab = ppc_elf_hash_table (info);
25dbc73a 5846 eh = (struct ppc_elf_link_hash_entry *) h;
d3e454b9
AM
5847 if (eh->elf.got.refcount > 0
5848 || (ELIMINATE_COPY_RELOCS
5849 && !eh->elf.def_regular
5850 && eh->elf.protected_def
5851 && eh->has_addr16_ha
5852 && eh->has_addr16_lo
5853 && htab->params->pic_fixup > 0))
25dbc73a 5854 {
d6e14abc
AM
5855 unsigned int need;
5856
46434633
AM
5857 /* Make sure this symbol is output as a dynamic symbol. */
5858 if (!ensure_undef_dynamic (info, &eh->elf))
f0158f44 5859 return FALSE;
252b5132 5860
d6e14abc 5861 need = 0;
f15d0b54 5862 if ((eh->tls_mask & TLS_LD) != 0)
25dbc73a 5863 {
f15d0b54
AM
5864 if (!eh->elf.def_dynamic)
5865 /* We'll just use htab->tlsld_got.offset. This should
5866 always be the case. It's a little odd if we have
5867 a local dynamic reloc against a non-local symbol. */
5868 htab->tlsld_got.refcount += 1;
5869 else
d6e14abc 5870 need += 8;
d6e14abc 5871 }
f15d0b54 5872 need += got_entries_needed (eh->tls_mask);
d6e14abc
AM
5873 if (need == 0)
5874 eh->elf.got.offset = (bfd_vma) -1;
5875 else
5876 {
3b36f7e6 5877 eh->elf.got.offset = allocate_got (htab, need);
0e1862bb 5878 if ((bfd_link_pic (info)
f0158f44
AM
5879 || (htab->elf.dynamic_sections_created
5880 && eh->elf.dynindx != -1
5881 && !SYMBOL_REFERENCES_LOCAL (info, &eh->elf)))
21d68fcd 5882 && !UNDEFWEAK_NO_DYNAMIC_RELOC (info, &eh->elf))
252b5132 5883 {
f15d0b54
AM
5884 asection *rsec;
5885 bfd_boolean tprel_known = (bfd_link_executable (info)
5886 && SYMBOL_REFERENCES_LOCAL (info,
5887 &eh->elf));
5888
5889 need = got_relocs_needed (eh->tls_mask, need, tprel_known);
5890 if ((eh->tls_mask & TLS_LD) != 0 && eh->elf.def_dynamic)
5891 need -= sizeof (Elf32_External_Rela);
5892 rsec = htab->elf.srelgot;
0bed072f 5893 if (eh->elf.type == STT_GNU_IFUNC)
ce558b89 5894 rsec = htab->elf.irelplt;
f15d0b54 5895 rsec->size += need;
252b5132 5896 }
25dbc73a
AM
5897 }
5898 }
5899 else
5900 eh->elf.got.offset = (bfd_vma) -1;
252b5132 5901
954b63d4
AM
5902 /* If no dynamic sections we can't have dynamic relocs, except for
5903 IFUNCs which are handled even in static executables. */
f0158f44
AM
5904 if (!htab->elf.dynamic_sections_created
5905 && h->type != STT_GNU_IFUNC)
5906 eh->dyn_relocs = NULL;
5907
529fe20e
AM
5908 /* Discard relocs on undefined symbols that must be local. */
5909 else if (h->root.type == bfd_link_hash_undefined
5910 && ELF_ST_VISIBILITY (h->other) != STV_DEFAULT)
5911 eh->dyn_relocs = NULL;
5912
5913 /* Also discard relocs on undefined weak syms with non-default
5914 visibility, or when dynamic_undefined_weak says so. */
5915 else if (UNDEFWEAK_NO_DYNAMIC_RELOC (info, h))
5916 eh->dyn_relocs = NULL;
5917
f0158f44 5918 if (eh->dyn_relocs == NULL)
287c7eaf 5919 ;
252b5132 5920
25dbc73a
AM
5921 /* In the shared -Bsymbolic case, discard space allocated for
5922 dynamic pc-relative relocs against symbols which turn out to be
5923 defined in regular objects. For the normal shared case, discard
5924 space for relocs that have become local due to symbol visibility
5925 changes. */
f0158f44 5926 else if (bfd_link_pic (info))
25dbc73a
AM
5927 {
5928 /* Relocs that use pc_count are those that appear on a call insn,
1d483afe 5929 or certain REL relocs (see must_be_dyn_reloc) that can be
25dbc73a
AM
5930 generated via assembly. We want calls to protected symbols to
5931 resolve directly to the function rather than going via the plt.
5932 If people want function pointer comparisons to work as expected
5933 then they should avoid writing weird assembly. */
529fe20e 5934 if (SYMBOL_CALLS_LOCAL (info, h))
25dbc73a 5935 {
6061a67d 5936 struct elf_dyn_relocs **pp;
25dbc73a
AM
5937
5938 for (pp = &eh->dyn_relocs; (p = *pp) != NULL; )
252b5132 5939 {
25dbc73a
AM
5940 p->count -= p->pc_count;
5941 p->pc_count = 0;
5942 if (p->count == 0)
5943 *pp = p->next;
5944 else
5945 pp = &p->next;
252b5132 5946 }
25dbc73a 5947 }
252b5132 5948
3348747a
NS
5949 if (htab->is_vxworks)
5950 {
6061a67d 5951 struct elf_dyn_relocs **pp;
3348747a
NS
5952
5953 for (pp = &eh->dyn_relocs; (p = *pp) != NULL; )
5954 {
5955 if (strcmp (p->sec->output_section->name, ".tls_vars") == 0)
5956 *pp = p->next;
5957 else
5958 pp = &p->next;
5959 }
5960 }
5961
954b63d4 5962 if (eh->dyn_relocs != NULL)
25dbc73a 5963 {
46434633
AM
5964 /* Make sure this symbol is output as a dynamic symbol. */
5965 if (!ensure_undef_dynamic (info, h))
f0158f44 5966 return FALSE;
25dbc73a
AM
5967 }
5968 }
5969 else if (ELIMINATE_COPY_RELOCS)
5970 {
f0158f44 5971 /* For the non-pic case, discard space for relocs against
25dbc73a
AM
5972 symbols which turn out to need copy relocs or are not
5973 dynamic. */
529fe20e 5974 if (h->dynamic_adjusted
d3e454b9 5975 && !h->def_regular
529fe20e 5976 && !ELF_COMMON_DEF_P (h)
d3e454b9
AM
5977 && !(h->protected_def
5978 && eh->has_addr16_ha
5979 && eh->has_addr16_lo
5980 && htab->params->pic_fixup > 0))
25dbc73a 5981 {
46434633
AM
5982 /* Make sure this symbol is output as a dynamic symbol. */
5983 if (!ensure_undef_dynamic (info, h))
f0158f44 5984 return FALSE;
7619e7c7 5985
f0158f44 5986 if (h->dynindx == -1)
287c7eaf 5987 eh->dyn_relocs = NULL;
25dbc73a 5988 }
f0158f44 5989 else
287c7eaf 5990 eh->dyn_relocs = NULL;
25dbc73a 5991 }
252b5132 5992
f0158f44 5993 /* Allocate space. */
25dbc73a
AM
5994 for (p = eh->dyn_relocs; p != NULL; p = p->next)
5995 {
5996 asection *sreloc = elf_section_data (p->sec)->sreloc;
f95f8542 5997 if (eh->elf.type == STT_GNU_IFUNC)
ce558b89 5998 sreloc = htab->elf.irelplt;
25dbc73a
AM
5999 sreloc->size += p->count * sizeof (Elf32_External_Rela);
6000 }
252b5132 6001
f0158f44
AM
6002 /* Handle PLT relocs. Done last, after dynindx has settled. */
6003 dyn = htab->elf.dynamic_sections_created && h->dynindx != -1;
6004 if (dyn || h->type == STT_GNU_IFUNC)
6005 {
6006 struct plt_entry *ent;
6007 bfd_boolean doneone = FALSE;
6008 bfd_vma plt_offset = 0, glink_offset = 0;
6009
6010 for (ent = h->plt.plist; ent != NULL; ent = ent->next)
6011 if (ent->plt.refcount > 0)
6012 {
6013 asection *s = htab->elf.splt;
6014
6015 if (!dyn)
6016 s = htab->elf.iplt;
6017
6018 if (htab->plt_type == PLT_NEW || !dyn)
6019 {
6020 if (!doneone)
6021 {
6022 plt_offset = s->size;
6023 s->size += 4;
6024 }
6025 ent->plt.offset = plt_offset;
6026
6027 s = htab->glink;
6028 if (!doneone || bfd_link_pic (info))
6029 {
6030 glink_offset = s->size;
9e390558 6031 s->size += GLINK_ENTRY_SIZE (htab, h);
f0158f44
AM
6032 }
6033 if (!doneone
6034 && !bfd_link_pic (info)
6035 && h->def_dynamic
6036 && !h->def_regular)
6037 {
6038 h->root.u.def.section = s;
6039 h->root.u.def.value = glink_offset;
6040 }
6041 ent->glink_offset = glink_offset;
6042
6043 if (htab->params->emit_stub_syms
6044 && !add_stub_sym (ent, h, info))
6045 return FALSE;
6046 }
6047 else
6048 {
6049 if (!doneone)
6050 {
6051 /* If this is the first .plt entry, make room
6052 for the special first entry. */
6053 if (s->size == 0)
6054 s->size += htab->plt_initial_entry_size;
6055
6056 /* The PowerPC PLT is actually composed of two
6057 parts, the first part is 2 words (for a load
6058 and a jump), and then there is a remaining
6059 word available at the end. */
6060 plt_offset = (htab->plt_initial_entry_size
6061 + (htab->plt_slot_size
6062 * ((s->size
6063 - htab->plt_initial_entry_size)
6064 / htab->plt_entry_size)));
6065
6066 /* If this symbol is not defined in a regular
6067 file, and we are not generating a shared
6068 library, then set the symbol to this location
6069 in the .plt. This is to avoid text
6070 relocations, and is required to make
6071 function pointers compare as equal between
6072 the normal executable and the shared library. */
6073 if (! bfd_link_pic (info)
6074 && h->def_dynamic
6075 && !h->def_regular)
6076 {
6077 h->root.u.def.section = s;
6078 h->root.u.def.value = plt_offset;
6079 }
6080
6081 /* Make room for this entry. */
6082 s->size += htab->plt_entry_size;
6083 /* After the 8192nd entry, room for two entries
6084 is allocated. */
6085 if (htab->plt_type == PLT_OLD
6086 && (s->size - htab->plt_initial_entry_size)
6087 / htab->plt_entry_size
6088 > PLT_NUM_SINGLE_ENTRIES)
6089 s->size += htab->plt_entry_size;
6090 }
6091 ent->plt.offset = plt_offset;
6092 }
6093
6094 /* We also need to make an entry in the .rela.plt section. */
6095 if (!doneone)
6096 {
6097 if (!dyn)
6098 htab->elf.irelplt->size += sizeof (Elf32_External_Rela);
6099 else
6100 {
6101 htab->elf.srelplt->size += sizeof (Elf32_External_Rela);
6102
6103 if (htab->plt_type == PLT_VXWORKS)
6104 {
6105 /* Allocate space for the unloaded relocations. */
6106 if (!bfd_link_pic (info)
6107 && htab->elf.dynamic_sections_created)
6108 {
6109 if (ent->plt.offset
6110 == (bfd_vma) htab->plt_initial_entry_size)
6111 {
6112 htab->srelplt2->size
6113 += (sizeof (Elf32_External_Rela)
6114 * VXWORKS_PLTRESOLVE_RELOCS);
6115 }
6116
6117 htab->srelplt2->size
6118 += (sizeof (Elf32_External_Rela)
6119 * VXWORKS_PLT_NON_JMP_SLOT_RELOCS);
6120 }
6121
6122 /* Every PLT entry has an associated GOT entry in
6123 .got.plt. */
6124 htab->elf.sgotplt->size += 4;
6125 }
6126 }
6127 doneone = TRUE;
6128 }
6129 }
6130 else
6131 ent->plt.offset = (bfd_vma) -1;
6132
6133 if (!doneone)
6134 {
6135 h->plt.plist = NULL;
6136 h->needs_plt = 0;
6137 }
6138 }
6139 else
6140 {
6141 h->plt.plist = NULL;
6142 h->needs_plt = 0;
6143 }
6144
25dbc73a
AM
6145 return TRUE;
6146}
7619e7c7 6147
625af618
AM
6148/* Set DF_TEXTREL if we find any dynamic relocs that apply to
6149 read-only sections. */
7619e7c7 6150
25dbc73a 6151static bfd_boolean
0caf6c82 6152maybe_set_textrel (struct elf_link_hash_entry *h, void *info_p)
25dbc73a 6153{
98bbb1b8 6154 asection *sec;
0caf6c82 6155
25dbc73a
AM
6156 if (h->root.type == bfd_link_hash_indirect)
6157 return TRUE;
252b5132 6158
98bbb1b8
AM
6159 sec = readonly_dynrelocs (h);
6160 if (sec != NULL)
25dbc73a 6161 {
98bbb1b8
AM
6162 struct bfd_link_info *info = (struct bfd_link_info *) info_p;
6163
0caf6c82 6164 info->flags |= DF_TEXTREL;
98bbb1b8 6165 info->callbacks->minfo
c1c8c1ef 6166 (_("%pB: dynamic relocation against `%pT' in read-only section `%pA'\n"),
63c1f59d 6167 sec->owner, h->root.root.string, sec);
ee05f2fe 6168
625af618
AM
6169 /* Not an error, just cut short the traversal. */
6170 return FALSE;
25dbc73a
AM
6171 }
6172 return TRUE;
6173}
6174
6177242a
AM
6175static const unsigned char glink_eh_frame_cie[] =
6176{
6177 0, 0, 0, 16, /* length. */
6178 0, 0, 0, 0, /* id. */
6179 1, /* CIE version. */
6180 'z', 'R', 0, /* Augmentation string. */
6181 4, /* Code alignment. */
6182 0x7c, /* Data alignment. */
6183 65, /* RA reg. */
6184 1, /* Augmentation size. */
6185 DW_EH_PE_pcrel | DW_EH_PE_sdata4, /* FDE encoding. */
6186 DW_CFA_def_cfa, 1, 0 /* def_cfa: r1 offset 0. */
6187};
6188
25dbc73a
AM
6189/* Set the sizes of the dynamic sections. */
6190
6191static bfd_boolean
93d1b056 6192ppc_elf_size_dynamic_sections (bfd *output_bfd,
25dbc73a
AM
6193 struct bfd_link_info *info)
6194{
6195 struct ppc_elf_link_hash_table *htab;
6196 asection *s;
6197 bfd_boolean relocs;
6198 bfd *ibfd;
7fce784e 6199
252b5132 6200#ifdef DEBUG
25dbc73a 6201 fprintf (stderr, "ppc_elf_size_dynamic_sections called\n");
252b5132 6202#endif
252b5132 6203
25dbc73a
AM
6204 htab = ppc_elf_hash_table (info);
6205 BFD_ASSERT (htab->elf.dynobj != NULL);
252b5132 6206
25dbc73a
AM
6207 if (elf_hash_table (info)->dynamic_sections_created)
6208 {
6209 /* Set the contents of the .interp section to the interpreter. */
9b8b325a 6210 if (bfd_link_executable (info) && !info->nointerp)
25dbc73a 6211 {
3d4d4302 6212 s = bfd_get_linker_section (htab->elf.dynobj, ".interp");
25dbc73a
AM
6213 BFD_ASSERT (s != NULL);
6214 s->size = sizeof ELF_DYNAMIC_INTERPRETER;
6215 s->contents = (unsigned char *) ELF_DYNAMIC_INTERPRETER;
6216 }
6217 }
252b5132 6218
4a3dc543 6219 if (htab->plt_type == PLT_OLD)
d7128ce4 6220 htab->got_header_size = 16;
4a3dc543 6221 else if (htab->plt_type == PLT_NEW)
d7128ce4 6222 htab->got_header_size = 12;
252b5132 6223
25dbc73a
AM
6224 /* Set up .got offsets for local syms, and space for local dynamic
6225 relocs. */
c72f2fb2 6226 for (ibfd = info->input_bfds; ibfd != NULL; ibfd = ibfd->link.next)
25dbc73a
AM
6227 {
6228 bfd_signed_vma *local_got;
6229 bfd_signed_vma *end_local_got;
e054468f
AM
6230 struct plt_entry **local_plt;
6231 struct plt_entry **end_local_plt;
25dbc73a
AM
6232 char *lgot_masks;
6233 bfd_size_type locsymcount;
6234 Elf_Internal_Shdr *symtab_hdr;
7fce784e 6235
0c8d6e5c 6236 if (!is_ppc_elf (ibfd))
25dbc73a 6237 continue;
7fce784e 6238
25dbc73a
AM
6239 for (s = ibfd->sections; s != NULL; s = s->next)
6240 {
f95f8542 6241 struct ppc_dyn_relocs *p;
252b5132 6242
f95f8542 6243 for (p = ((struct ppc_dyn_relocs *)
25dbc73a
AM
6244 elf_section_data (s)->local_dynrel);
6245 p != NULL;
6246 p = p->next)
6247 {
6248 if (!bfd_is_abs_section (p->sec)
6249 && bfd_is_abs_section (p->sec->output_section))
6250 {
6251 /* Input section has been discarded, either because
6252 it is a copy of a linkonce section or due to
6253 linker script /DISCARD/, so we'll be discarding
6254 the relocs too. */
7fce784e 6255 }
3348747a
NS
6256 else if (htab->is_vxworks
6257 && strcmp (p->sec->output_section->name,
6258 ".tls_vars") == 0)
6259 {
6260 /* Relocations in vxworks .tls_vars sections are
6261 handled specially by the loader. */
6262 }
25dbc73a 6263 else if (p->count != 0)
7fce784e 6264 {
25f23106 6265 asection *sreloc = elf_section_data (p->sec)->sreloc;
f95f8542 6266 if (p->ifunc)
ce558b89 6267 sreloc = htab->elf.irelplt;
25f23106 6268 sreloc->size += p->count * sizeof (Elf32_External_Rela);
25dbc73a
AM
6269 if ((p->sec->output_section->flags
6270 & (SEC_READONLY | SEC_ALLOC))
6271 == (SEC_READONLY | SEC_ALLOC))
0caf6c82
L
6272 {
6273 info->flags |= DF_TEXTREL;
871b3ab2 6274 info->callbacks->minfo (_("%pB: dynamic relocation in read-only section `%pA'\n"),
0caf6c82
L
6275 p->sec->owner, p->sec);
6276 }
7fce784e 6277 }
252b5132 6278 }
252b5132 6279 }
252b5132 6280
25dbc73a
AM
6281 local_got = elf_local_got_refcounts (ibfd);
6282 if (!local_got)
6283 continue;
252b5132 6284
0ffa91dd 6285 symtab_hdr = &elf_symtab_hdr (ibfd);
25dbc73a
AM
6286 locsymcount = symtab_hdr->sh_info;
6287 end_local_got = local_got + locsymcount;
e054468f
AM
6288 local_plt = (struct plt_entry **) end_local_got;
6289 end_local_plt = local_plt + locsymcount;
6290 lgot_masks = (char *) end_local_plt;
91d6fa6a 6291
25dbc73a
AM
6292 for (; local_got < end_local_got; ++local_got, ++lgot_masks)
6293 if (*local_got > 0)
6294 {
f15d0b54
AM
6295 unsigned int need;
6296 if ((*lgot_masks & TLS_LD) != 0)
6297 htab->tlsld_got.refcount += 1;
6298 need = got_entries_needed (*lgot_masks);
d6e14abc
AM
6299 if (need == 0)
6300 *local_got = (bfd_vma) -1;
25dbc73a
AM
6301 else
6302 {
3b36f7e6 6303 *local_got = allocate_got (htab, need);
0e1862bb 6304 if (bfd_link_pic (info))
0bed072f 6305 {
f15d0b54
AM
6306 asection *srel;
6307 bfd_boolean tprel_known = bfd_link_executable (info);
6308
6309 need = got_relocs_needed (*lgot_masks, need, tprel_known);
6310 srel = htab->elf.srelgot;
0bed072f 6311 if ((*lgot_masks & PLT_IFUNC) != 0)
ce558b89 6312 srel = htab->elf.irelplt;
f15d0b54 6313 srel->size += need;
0bed072f 6314 }
25dbc73a
AM
6315 }
6316 }
6317 else
6318 *local_got = (bfd_vma) -1;
e054468f
AM
6319
6320 if (htab->is_vxworks)
6321 continue;
6322
6323 /* Allocate space for calls to local STT_GNU_IFUNC syms in .iplt. */
6324 for (; local_plt < end_local_plt; ++local_plt)
6325 {
6326 struct plt_entry *ent;
6327 bfd_boolean doneone = FALSE;
6328 bfd_vma plt_offset = 0, glink_offset = 0;
6329
6330 for (ent = *local_plt; ent != NULL; ent = ent->next)
6331 if (ent->plt.refcount > 0)
6332 {
ce558b89 6333 s = htab->elf.iplt;
e054468f
AM
6334
6335 if (!doneone)
6336 {
6337 plt_offset = s->size;
6338 s->size += 4;
6339 }
6340 ent->plt.offset = plt_offset;
6341
6342 s = htab->glink;
0e1862bb 6343 if (!doneone || bfd_link_pic (info))
e054468f
AM
6344 {
6345 glink_offset = s->size;
9e390558 6346 s->size += GLINK_ENTRY_SIZE (htab, NULL);
e054468f
AM
6347 }
6348 ent->glink_offset = glink_offset;
6349
6350 if (!doneone)
6351 {
ce558b89 6352 htab->elf.irelplt->size += sizeof (Elf32_External_Rela);
e054468f
AM
6353 doneone = TRUE;
6354 }
6355 }
6356 else
6357 ent->plt.offset = (bfd_vma) -1;
6358 }
25dbc73a 6359 }
252b5132 6360
b7fcf6f6
AM
6361 /* Allocate space for global sym dynamic relocs. */
6362 elf_link_hash_traverse (elf_hash_table (info), allocate_dynrelocs, info);
6363
3b36f7e6
AM
6364 if (htab->tlsld_got.refcount > 0)
6365 {
6366 htab->tlsld_got.offset = allocate_got (htab, 8);
0e1862bb 6367 if (bfd_link_pic (info))
ce558b89 6368 htab->elf.srelgot->size += sizeof (Elf32_External_Rela);
3b36f7e6
AM
6369 }
6370 else
6371 htab->tlsld_got.offset = (bfd_vma) -1;
6372
ce558b89 6373 if (htab->elf.sgot != NULL && htab->plt_type != PLT_VXWORKS)
3b36f7e6
AM
6374 {
6375 unsigned int g_o_t = 32768;
6376
4d962050
AM
6377 /* If we haven't allocated the header, do so now. When we get here,
6378 for old plt/got the got size will be 0 to 32764 (not allocated),
6379 or 32780 to 65536 (header allocated). For new plt/got, the
6380 corresponding ranges are 0 to 32768 and 32780 to 65536. */
ce558b89 6381 if (htab->elf.sgot->size <= 32768)
3b36f7e6 6382 {
ce558b89 6383 g_o_t = htab->elf.sgot->size;
4a3dc543 6384 if (htab->plt_type == PLT_OLD)
4d962050 6385 g_o_t += 4;
ce558b89 6386 htab->elf.sgot->size += htab->got_header_size;
3b36f7e6 6387 }
3b36f7e6
AM
6388
6389 htab->elf.hgot->root.u.def.value = g_o_t;
6390 }
0e1862bb 6391 if (bfd_link_pic (info))
bd6c6e2b
AM
6392 {
6393 struct elf_link_hash_entry *sda = htab->sdata[0].sym;
93d1b056
AM
6394
6395 sda->root.u.def.section = htab->elf.hgot->root.u.def.section;
6396 sda->root.u.def.value = htab->elf.hgot->root.u.def.value;
bd6c6e2b 6397 }
15bfcc77
AM
6398 if (info->emitrelocations)
6399 {
6400 struct elf_link_hash_entry *sda = htab->sdata[0].sym;
6401
6402 if (sda != NULL && sda->ref_regular)
6403 sda->root.u.def.section->flags |= SEC_KEEP;
6404 sda = htab->sdata[1].sym;
6405 if (sda != NULL && sda->ref_regular)
6406 sda->root.u.def.section->flags |= SEC_KEEP;
6407 }
3b36f7e6 6408
e054468f
AM
6409 if (htab->glink != NULL
6410 && htab->glink->size != 0
6411 && htab->elf.dynamic_sections_created)
d7128ce4
AM
6412 {
6413 htab->glink_pltresolve = htab->glink->size;
9e390558
AM
6414 /* Space for the branch table. */
6415 htab->glink->size
6416 += htab->elf.srelplt->size / (sizeof (Elf32_External_Rela) / 4) - 4;
86b9da88 6417 /* Pad out to align the start of PLTresolve. */
5446cbdf
AM
6418 htab->glink->size += -htab->glink->size & (htab->params->ppc476_workaround
6419 ? 63 : 15);
d7128ce4 6420 htab->glink->size += GLINK_PLTRESOLVE;
0ba07910 6421
5446cbdf 6422 if (htab->params->emit_stub_syms)
0ba07910
AM
6423 {
6424 struct elf_link_hash_entry *sh;
6425 sh = elf_link_hash_lookup (&htab->elf, "__glink",
6426 TRUE, FALSE, FALSE);
6427 if (sh == NULL)
6428 return FALSE;
6429 if (sh->root.type == bfd_link_hash_new)
6430 {
6431 sh->root.type = bfd_link_hash_defined;
6432 sh->root.u.def.section = htab->glink;
6433 sh->root.u.def.value = htab->glink_pltresolve;
6434 sh->ref_regular = 1;
6435 sh->def_regular = 1;
6436 sh->ref_regular_nonweak = 1;
6437 sh->forced_local = 1;
6438 sh->non_elf = 0;
2ec55de3 6439 sh->root.linker_def = 1;
0ba07910
AM
6440 }
6441 sh = elf_link_hash_lookup (&htab->elf, "__glink_PLTresolve",
6442 TRUE, FALSE, FALSE);
6443 if (sh == NULL)
6444 return FALSE;
6445 if (sh->root.type == bfd_link_hash_new)
6446 {
6447 sh->root.type = bfd_link_hash_defined;
6448 sh->root.u.def.section = htab->glink;
6449 sh->root.u.def.value = htab->glink->size - GLINK_PLTRESOLVE;
6450 sh->ref_regular = 1;
6451 sh->def_regular = 1;
6452 sh->ref_regular_nonweak = 1;
6453 sh->forced_local = 1;
6454 sh->non_elf = 0;
2ec55de3 6455 sh->root.linker_def = 1;
0ba07910
AM
6456 }
6457 }
d7128ce4
AM
6458 }
6459
6177242a
AM
6460 if (htab->glink != NULL
6461 && htab->glink->size != 0
6462 && htab->glink_eh_frame != NULL
9a2a56cc
AM
6463 && !bfd_is_abs_section (htab->glink_eh_frame->output_section)
6464 && _bfd_elf_eh_frame_present (info))
6177242a
AM
6465 {
6466 s = htab->glink_eh_frame;
6467 s->size = sizeof (glink_eh_frame_cie) + 20;
0e1862bb 6468 if (bfd_link_pic (info))
6177242a
AM
6469 {
6470 s->size += 4;
6471 if (htab->glink->size - GLINK_PLTRESOLVE + 8 >= 256)
6472 s->size += 4;
6473 }
6474 }
6475
25dbc73a
AM
6476 /* We've now determined the sizes of the various dynamic sections.
6477 Allocate memory for them. */
6478 relocs = FALSE;
6479 for (s = htab->elf.dynobj->sections; s != NULL; s = s->next)
252b5132 6480 {
9d8504b1
PB
6481 bfd_boolean strip_section = TRUE;
6482
25dbc73a
AM
6483 if ((s->flags & SEC_LINKER_CREATED) == 0)
6484 continue;
252b5132 6485
ce558b89
AM
6486 if (s == htab->elf.splt
6487 || s == htab->elf.sgot)
25dbc73a 6488 {
9d8504b1
PB
6489 /* We'd like to strip these sections if they aren't needed, but if
6490 we've exported dynamic symbols from them we must leave them.
6491 It's too late to tell BFD to get rid of the symbols. */
e054468f 6492 if (htab->elf.hplt != NULL)
9d8504b1 6493 strip_section = FALSE;
25dbc73a
AM
6494 /* Strip this section if we don't need it; see the
6495 comment below. */
6496 }
ce558b89 6497 else if (s == htab->elf.iplt
e054468f 6498 || s == htab->glink
6177242a 6499 || s == htab->glink_eh_frame
ce558b89 6500 || s == htab->elf.sgotplt
e054468f 6501 || s == htab->sbss
9d19e4fd 6502 || s == htab->elf.sdynbss
5474d94f 6503 || s == htab->elf.sdynrelro
15bfcc77 6504 || s == htab->dynsbss)
25dbc73a 6505 {
c9a2f333 6506 /* Strip these too. */
25dbc73a 6507 }
15bfcc77
AM
6508 else if (s == htab->sdata[0].section
6509 || s == htab->sdata[1].section)
6510 {
6511 strip_section = (s->flags & SEC_KEEP) == 0;
6512 }
a0f49396
NC
6513 else if (CONST_STRNEQ (bfd_get_section_name (htab->elf.dynobj, s),
6514 ".rela"))
25dbc73a 6515 {
c456f082 6516 if (s->size != 0)
25dbc73a
AM
6517 {
6518 /* Remember whether there are any relocation sections. */
6519 relocs = TRUE;
252b5132 6520
25dbc73a
AM
6521 /* We use the reloc_count field as a counter if we need
6522 to copy relocs into the output file. */
6523 s->reloc_count = 0;
252b5132
RH
6524 }
6525 }
25dbc73a
AM
6526 else
6527 {
6528 /* It's not one of our sections, so don't allocate space. */
6529 continue;
6530 }
252b5132 6531
9d8504b1 6532 if (s->size == 0 && strip_section)
25dbc73a 6533 {
c456f082
AM
6534 /* If we don't need this section, strip it from the
6535 output file. This is mostly to handle .rela.bss and
6536 .rela.plt. We must create both sections in
6537 create_dynamic_sections, because they must be created
6538 before the linker maps input sections to output
6539 sections. The linker does that before
6540 adjust_dynamic_symbol is called, and it is that
6541 function which decides whether anything needs to go
6542 into these sections. */
8423293d 6543 s->flags |= SEC_EXCLUDE;
25dbc73a
AM
6544 continue;
6545 }
7fce784e 6546
d7128ce4 6547 if ((s->flags & SEC_HAS_CONTENTS) == 0)
644285ef
AM
6548 continue;
6549
25dbc73a
AM
6550 /* Allocate memory for the section contents. */
6551 s->contents = bfd_zalloc (htab->elf.dynobj, s->size);
6552 if (s->contents == NULL)
6553 return FALSE;
6554 }
252b5132 6555
25dbc73a 6556 if (htab->elf.dynamic_sections_created)
7619e7c7 6557 {
25dbc73a
AM
6558 /* Add some entries to the .dynamic section. We fill in the
6559 values later, in ppc_elf_finish_dynamic_sections, but we
6560 must add the entries now so that we get the correct size for
6561 the .dynamic section. The DT_DEBUG entry is filled in by the
6562 dynamic linker and used by the debugger. */
6563#define add_dynamic_entry(TAG, VAL) \
6564 _bfd_elf_add_dynamic_entry (info, TAG, VAL)
252b5132 6565
0e1862bb 6566 if (bfd_link_executable (info))
7619e7c7 6567 {
25dbc73a
AM
6568 if (!add_dynamic_entry (DT_DEBUG, 0))
6569 return FALSE;
7619e7c7
AM
6570 }
6571
ce558b89 6572 if (htab->elf.splt != NULL && htab->elf.splt->size != 0)
7619e7c7 6573 {
25dbc73a
AM
6574 if (!add_dynamic_entry (DT_PLTGOT, 0)
6575 || !add_dynamic_entry (DT_PLTRELSZ, 0)
6576 || !add_dynamic_entry (DT_PLTREL, DT_RELA)
6577 || !add_dynamic_entry (DT_JMPREL, 0))
6578 return FALSE;
6579 }
7619e7c7 6580
c7e17e05
AM
6581 if (htab->plt_type == PLT_NEW
6582 && htab->glink != NULL
6583 && htab->glink->size != 0)
d7128ce4 6584 {
1fe44d79 6585 if (!add_dynamic_entry (DT_PPC_GOT, 0))
d7128ce4 6586 return FALSE;
5446cbdf 6587 if (!htab->params->no_tls_get_addr_opt
a7f2871e
AM
6588 && htab->tls_get_addr != NULL
6589 && htab->tls_get_addr->plt.plist != NULL
e8910a83 6590 && !add_dynamic_entry (DT_PPC_OPT, PPC_OPT_TLS))
a7f2871e 6591 return FALSE;
d7128ce4
AM
6592 }
6593
25dbc73a
AM
6594 if (relocs)
6595 {
6596 if (!add_dynamic_entry (DT_RELA, 0)
6597 || !add_dynamic_entry (DT_RELASZ, 0)
6598 || !add_dynamic_entry (DT_RELAENT, sizeof (Elf32_External_Rela)))
6599 return FALSE;
6600 }
7619e7c7 6601
25dbc73a
AM
6602 /* If any dynamic relocs apply to a read-only section, then we
6603 need a DT_TEXTREL entry. */
6604 if ((info->flags & DF_TEXTREL) == 0)
625af618 6605 elf_link_hash_traverse (elf_hash_table (info), maybe_set_textrel,
25dbc73a 6606 info);
7619e7c7 6607
25dbc73a
AM
6608 if ((info->flags & DF_TEXTREL) != 0)
6609 {
6610 if (!add_dynamic_entry (DT_TEXTREL, 0))
6611 return FALSE;
7619e7c7 6612 }
7a2b07ff
NS
6613 if (htab->is_vxworks
6614 && !elf_vxworks_add_dynamic_entries (output_bfd, info))
6615 return FALSE;
6616 }
25dbc73a
AM
6617#undef add_dynamic_entry
6618
7e01508c
AM
6619 if (htab->glink_eh_frame != NULL
6620 && htab->glink_eh_frame->contents != NULL)
6621 {
6622 unsigned char *p = htab->glink_eh_frame->contents;
6623 bfd_vma val;
6624
6625 memcpy (p, glink_eh_frame_cie, sizeof (glink_eh_frame_cie));
6626 /* CIE length (rewrite in case little-endian). */
6627 bfd_put_32 (htab->elf.dynobj, sizeof (glink_eh_frame_cie) - 4, p);
6628 p += sizeof (glink_eh_frame_cie);
6629 /* FDE length. */
6630 val = htab->glink_eh_frame->size - 4 - sizeof (glink_eh_frame_cie);
6631 bfd_put_32 (htab->elf.dynobj, val, p);
6632 p += 4;
6633 /* CIE pointer. */
6634 val = p - htab->glink_eh_frame->contents;
6635 bfd_put_32 (htab->elf.dynobj, val, p);
6636 p += 4;
6637 /* Offset to .glink. Set later. */
6638 p += 4;
6639 /* .glink size. */
6640 bfd_put_32 (htab->elf.dynobj, htab->glink->size, p);
6641 p += 4;
6642 /* Augmentation. */
6643 p += 1;
6644
0e1862bb 6645 if (bfd_link_pic (info)
7e01508c
AM
6646 && htab->elf.dynamic_sections_created)
6647 {
6648 bfd_vma adv = (htab->glink->size - GLINK_PLTRESOLVE + 8) >> 2;
6649 if (adv < 64)
6650 *p++ = DW_CFA_advance_loc + adv;
6651 else if (adv < 256)
6652 {
6653 *p++ = DW_CFA_advance_loc1;
6654 *p++ = adv;
6655 }
6656 else if (adv < 65536)
6657 {
6658 *p++ = DW_CFA_advance_loc2;
6659 bfd_put_16 (htab->elf.dynobj, adv, p);
6660 p += 2;
6661 }
6662 else
6663 {
6664 *p++ = DW_CFA_advance_loc4;
6665 bfd_put_32 (htab->elf.dynobj, adv, p);
6666 p += 4;
6667 }
6668 *p++ = DW_CFA_register;
6669 *p++ = 65;
6670 p++;
6671 *p++ = DW_CFA_advance_loc + 4;
6672 *p++ = DW_CFA_restore_extended;
6673 *p++ = 65;
6674 }
6675 BFD_ASSERT ((bfd_vma) ((p + 3 - htab->glink_eh_frame->contents) & -4)
6676 == htab->glink_eh_frame->size);
6677 }
6678
7619e7c7
AM
6679 return TRUE;
6680}
0eb4a168 6681
93d1b056
AM
6682/* Arrange to have _SDA_BASE_ or _SDA2_BASE_ stripped from the output
6683 if it looks like nothing is using them. */
6684
6685static void
6686maybe_strip_sdasym (bfd *output_bfd, elf_linker_section_t *lsect)
6687{
6688 struct elf_link_hash_entry *sda = lsect->sym;
6689
6690 if (sda != NULL && !sda->ref_regular && sda->dynindx == -1)
6691 {
6692 asection *s;
6693
6694 s = bfd_get_section_by_name (output_bfd, lsect->name);
6695 if (s == NULL || bfd_section_removed_from_list (output_bfd, s))
6696 {
6697 s = bfd_get_section_by_name (output_bfd, lsect->bss_name);
6698 if (s == NULL || bfd_section_removed_from_list (output_bfd, s))
6699 {
6700 sda->def_regular = 0;
6701 /* This is somewhat magic. See elf_link_output_extsym. */
6702 sda->ref_dynamic = 1;
6703 sda->forced_local = 0;
6704 }
6705 }
6706 }
6707}
6708
6709void
6710ppc_elf_maybe_strip_sdata_syms (struct bfd_link_info *info)
6711{
6712 struct ppc_elf_link_hash_table *htab = ppc_elf_hash_table (info);
6713
6714 if (htab != NULL)
6715 {
6716 maybe_strip_sdasym (info->output_bfd, &htab->sdata[0]);
6717 maybe_strip_sdasym (info->output_bfd, &htab->sdata[1]);
6718 }
6719}
6720
6721
0eb4a168
AM
6722/* Return TRUE if symbol should be hashed in the `.gnu.hash' section. */
6723
6724static bfd_boolean
6725ppc_elf_hash_symbol (struct elf_link_hash_entry *h)
6726{
6727 if (h->plt.plist != NULL
6728 && !h->def_regular
6729 && (!h->pointer_equality_needed
6730 || !h->ref_regular_nonweak))
6731 return FALSE;
6732
6733 return _bfd_elf_hash_symbol (h);
6734}
25dbc73a
AM
6735\f
6736#define ARRAY_SIZE(a) (sizeof (a) / sizeof ((a)[0]))
6737
01017ef8
NS
6738/* Relaxation trampolines. r12 is available for clobbering (r11, is
6739 used for some functions that are allowed to break the ABI). */
25dbc73a
AM
6740static const int shared_stub_entry[] =
6741 {
6742 0x7c0802a6, /* mflr 0 */
6743 0x429f0005, /* bcl 20, 31, .Lxxx */
01017ef8
NS
6744 0x7d8802a6, /* mflr 12 */
6745 0x3d8c0000, /* addis 12, 12, (xxx-.Lxxx)@ha */
53291d1f 6746 0x398c0000, /* addi 12, 12, (xxx-.Lxxx)@l */
25dbc73a 6747 0x7c0803a6, /* mtlr 0 */
01017ef8 6748 0x7d8903a6, /* mtctr 12 */
25dbc73a
AM
6749 0x4e800420, /* bctr */
6750 };
6751
6752static const int stub_entry[] =
6753 {
01017ef8
NS
6754 0x3d800000, /* lis 12,xxx@ha */
6755 0x398c0000, /* addi 12,12,xxx@l */
6756 0x7d8903a6, /* mtctr 12 */
25dbc73a
AM
6757 0x4e800420, /* bctr */
6758 };
6759
5446cbdf
AM
6760struct ppc_elf_relax_info
6761{
6762 unsigned int workaround_size;
d3e454b9 6763 unsigned int picfixup_size;
5446cbdf
AM
6764};
6765
6766/* This function implements long branch trampolines, and the ppc476
6767 icache bug workaround. Any section needing trampolines or patch
6768 space for the workaround has its size extended so that we can
53291d1f 6769 add trampolines at the end of the section. */
5446cbdf 6770
25dbc73a
AM
6771static bfd_boolean
6772ppc_elf_relax_section (bfd *abfd,
6773 asection *isec,
6774 struct bfd_link_info *link_info,
6775 bfd_boolean *again)
6776{
d3e454b9 6777 struct one_branch_fixup
25dbc73a 6778 {
d3e454b9 6779 struct one_branch_fixup *next;
25dbc73a 6780 asection *tsec;
01017ef8
NS
6781 /* Final link, can use the symbol offset. For a
6782 relocatable link we use the symbol's index. */
25dbc73a
AM
6783 bfd_vma toff;
6784 bfd_vma trampoff;
6785 };
7619e7c7 6786
25dbc73a
AM
6787 Elf_Internal_Shdr *symtab_hdr;
6788 bfd_byte *contents = NULL;
6789 Elf_Internal_Sym *isymbuf = NULL;
6790 Elf_Internal_Rela *internal_relocs = NULL;
5446cbdf 6791 Elf_Internal_Rela *irel, *irelend = NULL;
d3e454b9 6792 struct one_branch_fixup *branch_fixups = NULL;
5446cbdf 6793 struct ppc_elf_relax_info *relax_info = NULL;
9bc4e62b 6794 unsigned changes = 0;
5446cbdf 6795 bfd_boolean workaround_change;
d7128ce4 6796 struct ppc_elf_link_hash_table *htab;
d3e454b9 6797 bfd_size_type trampbase, trampoff, newsize, picfixup_size;
a6aa5195 6798 asection *got2;
50248c89 6799 bfd_boolean maybe_pasted;
7619e7c7 6800
25dbc73a 6801 *again = FALSE;
7619e7c7 6802
5446cbdf 6803 /* No need to do anything with non-alloc or non-code sections. */
c87b5a93 6804 if ((isec->flags & SEC_ALLOC) == 0
a8ad78a7 6805 || (isec->flags & SEC_CODE) == 0
5446cbdf
AM
6806 || (isec->flags & SEC_LINKER_CREATED) != 0
6807 || isec->size < 4)
25dbc73a 6808 return TRUE;
7619e7c7 6809
c8a1f254
NS
6810 /* We cannot represent the required PIC relocs in the output, so don't
6811 do anything. The linker doesn't support mixing -shared and -r
6812 anyway. */
0e1862bb 6813 if (bfd_link_relocatable (link_info) && bfd_link_pic (link_info))
795bc6b3 6814 return TRUE;
5b914448 6815
5446cbdf
AM
6816 htab = ppc_elf_hash_table (link_info);
6817 if (htab == NULL)
6818 return TRUE;
6819
6820 isec->size = (isec->size + 3) & -4;
6821 if (isec->rawsize == 0)
6822 isec->rawsize = isec->size;
6823 trampbase = isec->size;
6824
53291d1f
AM
6825 BFD_ASSERT (isec->sec_info_type == SEC_INFO_TYPE_NONE
6826 || isec->sec_info_type == SEC_INFO_TYPE_TARGET);
6827 isec->sec_info_type = SEC_INFO_TYPE_TARGET;
6828
d3e454b9
AM
6829 if (htab->params->ppc476_workaround
6830 || htab->params->pic_fixup > 0)
5446cbdf
AM
6831 {
6832 if (elf_section_data (isec)->sec_info == NULL)
6833 {
5446cbdf
AM
6834 elf_section_data (isec)->sec_info
6835 = bfd_zalloc (abfd, sizeof (struct ppc_elf_relax_info));
6836 if (elf_section_data (isec)->sec_info == NULL)
6837 return FALSE;
6838 }
6839 relax_info = elf_section_data (isec)->sec_info;
6840 trampbase -= relax_info->workaround_size;
6841 }
6842
50248c89
AM
6843 maybe_pasted = (strcmp (isec->output_section->name, ".init") == 0
6844 || strcmp (isec->output_section->name, ".fini") == 0);
25dbc73a 6845 /* Space for a branch around any trampolines. */
5446cbdf
AM
6846 trampoff = trampbase;
6847 if (maybe_pasted && trampbase == isec->rawsize)
50248c89 6848 trampoff += 4;
7619e7c7 6849
0ffa91dd 6850 symtab_hdr = &elf_symtab_hdr (abfd);
d3e454b9
AM
6851 picfixup_size = 0;
6852 if (htab->params->branch_trampolines
6853 || htab->params->pic_fixup > 0)
7619e7c7 6854 {
5446cbdf
AM
6855 /* Get a copy of the native relocations. */
6856 if (isec->reloc_count != 0)
25dbc73a 6857 {
5446cbdf
AM
6858 internal_relocs = _bfd_elf_link_read_relocs (abfd, isec, NULL, NULL,
6859 link_info->keep_memory);
6860 if (internal_relocs == NULL)
6861 goto error_return;
25dbc73a 6862 }
7619e7c7 6863
5446cbdf
AM
6864 got2 = bfd_get_section_by_name (abfd, ".got2");
6865
6866 irelend = internal_relocs + isec->reloc_count;
6867 for (irel = internal_relocs; irel < irelend; irel++)
25dbc73a 6868 {
5446cbdf
AM
6869 unsigned long r_type = ELF32_R_TYPE (irel->r_info);
6870 bfd_vma toff, roff;
6871 asection *tsec;
d3e454b9 6872 struct one_branch_fixup *f;
5446cbdf 6873 size_t insn_offset = 0;
d3e454b9 6874 bfd_vma max_branch_offset = 0, val;
5446cbdf
AM
6875 bfd_byte *hit_addr;
6876 unsigned long t0;
6877 struct elf_link_hash_entry *h;
6878 struct plt_entry **plist;
6879 unsigned char sym_type;
6880
6881 switch (r_type)
6882 {
6883 case R_PPC_REL24:
6884 case R_PPC_LOCAL24PC:
6885 case R_PPC_PLTREL24:
6886 max_branch_offset = 1 << 25;
6887 break;
6888
6889 case R_PPC_REL14:
6890 case R_PPC_REL14_BRTAKEN:
6891 case R_PPC_REL14_BRNTAKEN:
6892 max_branch_offset = 1 << 15;
6893 break;
7fce784e 6894
d3e454b9
AM
6895 case R_PPC_ADDR16_HA:
6896 if (htab->params->pic_fixup > 0)
6897 break;
6898 continue;
6899
5446cbdf
AM
6900 default:
6901 continue;
6902 }
6903
6904 /* Get the value of the symbol referred to by the reloc. */
6905 h = NULL;
6906 if (ELF32_R_SYM (irel->r_info) < symtab_hdr->sh_info)
25dbc73a 6907 {
5446cbdf
AM
6908 /* A local symbol. */
6909 Elf_Internal_Sym *isym;
6910
6911 /* Read this BFD's local symbols. */
25dbc73a 6912 if (isymbuf == NULL)
5446cbdf
AM
6913 {
6914 isymbuf = (Elf_Internal_Sym *) symtab_hdr->contents;
6915 if (isymbuf == NULL)
6916 isymbuf = bfd_elf_get_elf_syms (abfd, symtab_hdr,
6917 symtab_hdr->sh_info, 0,
6918 NULL, NULL, NULL);
6919 if (isymbuf == 0)
6920 goto error_return;
6921 }
6922 isym = isymbuf + ELF32_R_SYM (irel->r_info);
6923 if (isym->st_shndx == SHN_UNDEF)
6924 tsec = bfd_und_section_ptr;
6925 else if (isym->st_shndx == SHN_ABS)
6926 tsec = bfd_abs_section_ptr;
6927 else if (isym->st_shndx == SHN_COMMON)
6928 tsec = bfd_com_section_ptr;
6929 else
6930 tsec = bfd_section_from_elf_index (abfd, isym->st_shndx);
6931
6932 toff = isym->st_value;
6933 sym_type = ELF_ST_TYPE (isym->st_info);
25dbc73a 6934 }
25dbc73a 6935 else
5446cbdf
AM
6936 {
6937 /* Global symbol handling. */
6938 unsigned long indx;
7fce784e 6939
5446cbdf
AM
6940 indx = ELF32_R_SYM (irel->r_info) - symtab_hdr->sh_info;
6941 h = elf_sym_hashes (abfd)[indx];
7619e7c7 6942
5446cbdf
AM
6943 while (h->root.type == bfd_link_hash_indirect
6944 || h->root.type == bfd_link_hash_warning)
6945 h = (struct elf_link_hash_entry *) h->root.u.i.link;
7619e7c7 6946
5446cbdf
AM
6947 if (h->root.type == bfd_link_hash_defined
6948 || h->root.type == bfd_link_hash_defweak)
6949 {
6950 tsec = h->root.u.def.section;
6951 toff = h->root.u.def.value;
6952 }
6953 else if (h->root.type == bfd_link_hash_undefined
6954 || h->root.type == bfd_link_hash_undefweak)
6955 {
6956 tsec = bfd_und_section_ptr;
0e1862bb 6957 toff = bfd_link_relocatable (link_info) ? indx : 0;
5446cbdf
AM
6958 }
6959 else
6960 continue;
6961
9f7552cf
AM
6962 /* If this branch is to __tls_get_addr then we may later
6963 optimise away the call. We won't be needing a long-
6964 branch stub in that case. */
0e1862bb 6965 if (bfd_link_executable (link_info)
9f7552cf
AM
6966 && h == htab->tls_get_addr
6967 && irel != internal_relocs)
6968 {
6969 unsigned long t_symndx = ELF32_R_SYM (irel[-1].r_info);
6970 unsigned long t_rtype = ELF32_R_TYPE (irel[-1].r_info);
6971 unsigned int tls_mask = 0;
6972
6973 /* The previous reloc should be one of R_PPC_TLSGD or
6974 R_PPC_TLSLD, or for older object files, a reloc
6975 on the __tls_get_addr arg setup insn. Get tls
6976 mask bits from the symbol on that reloc. */
6977 if (t_symndx < symtab_hdr->sh_info)
6978 {
6979 bfd_vma *local_got_offsets = elf_local_got_offsets (abfd);
6980
6981 if (local_got_offsets != NULL)
6982 {
6983 struct plt_entry **local_plt = (struct plt_entry **)
6984 (local_got_offsets + symtab_hdr->sh_info);
6985 char *lgot_masks = (char *)
6986 (local_plt + symtab_hdr->sh_info);
6987 tls_mask = lgot_masks[t_symndx];
6988 }
6989 }
6990 else
6991 {
6992 struct elf_link_hash_entry *th
6993 = elf_sym_hashes (abfd)[t_symndx - symtab_hdr->sh_info];
6994
6995 while (th->root.type == bfd_link_hash_indirect
6996 || th->root.type == bfd_link_hash_warning)
6997 th = (struct elf_link_hash_entry *) th->root.u.i.link;
6998
6999 tls_mask
7000 = ((struct ppc_elf_link_hash_entry *) th)->tls_mask;
7001 }
7002
7003 /* The mask bits tell us if the call will be
7004 optimised away. */
7005 if ((tls_mask & TLS_TLS) != 0 && (tls_mask & TLS_GD) == 0
7006 && (t_rtype == R_PPC_TLSGD
7007 || t_rtype == R_PPC_GOT_TLSGD16
7008 || t_rtype == R_PPC_GOT_TLSGD16_LO))
7009 continue;
7010 if ((tls_mask & TLS_TLS) != 0 && (tls_mask & TLS_LD) == 0
7011 && (t_rtype == R_PPC_TLSLD
7012 || t_rtype == R_PPC_GOT_TLSLD16
7013 || t_rtype == R_PPC_GOT_TLSLD16_LO))
7014 continue;
7015 }
7016
5446cbdf
AM
7017 sym_type = h->type;
7018 }
7619e7c7 7019
d3e454b9
AM
7020 if (r_type == R_PPC_ADDR16_HA)
7021 {
7022 if (h != NULL
7023 && !h->def_regular
7024 && h->protected_def
7025 && ppc_elf_hash_entry (h)->has_addr16_ha
7026 && ppc_elf_hash_entry (h)->has_addr16_lo)
7027 picfixup_size += 12;
7028 continue;
7029 }
7030
5446cbdf
AM
7031 /* The condition here under which we call find_plt_ent must
7032 match that in relocate_section. If we call find_plt_ent here
7033 but not in relocate_section, or vice versa, then the branch
7034 destination used here may be incorrect. */
7035 plist = NULL;
7036 if (h != NULL)
25dbc73a 7037 {
5446cbdf
AM
7038 /* We know is_branch_reloc (r_type) is true. */
7039 if (h->type == STT_GNU_IFUNC
7040 || r_type == R_PPC_PLTREL24)
7041 plist = &h->plt.plist;
25dbc73a 7042 }
5446cbdf
AM
7043 else if (sym_type == STT_GNU_IFUNC
7044 && elf_local_got_offsets (abfd) != NULL)
c8a1f254 7045 {
5446cbdf
AM
7046 bfd_vma *local_got_offsets = elf_local_got_offsets (abfd);
7047 struct plt_entry **local_plt = (struct plt_entry **)
7048 (local_got_offsets + symtab_hdr->sh_info);
7049 plist = local_plt + ELF32_R_SYM (irel->r_info);
c8a1f254 7050 }
5446cbdf 7051 if (plist != NULL)
a9585d22 7052 {
5446cbdf
AM
7053 bfd_vma addend = 0;
7054 struct plt_entry *ent;
7055
0e1862bb 7056 if (r_type == R_PPC_PLTREL24 && bfd_link_pic (link_info))
5446cbdf
AM
7057 addend = irel->r_addend;
7058 ent = find_plt_ent (plist, got2, addend);
7059 if (ent != NULL)
a9585d22 7060 {
5446cbdf
AM
7061 if (htab->plt_type == PLT_NEW
7062 || h == NULL
7063 || !htab->elf.dynamic_sections_created
7064 || h->dynindx == -1)
7065 {
7066 tsec = htab->glink;
7067 toff = ent->glink_offset;
7068 }
7069 else
7070 {
ce558b89 7071 tsec = htab->elf.splt;
5446cbdf
AM
7072 toff = ent->plt.offset;
7073 }
de972ffa
AM
7074 }
7075 }
de972ffa 7076
5446cbdf
AM
7077 /* If the branch and target are in the same section, you have
7078 no hope of adding stubs. We'll error out later should the
7079 branch overflow. */
7080 if (tsec == isec)
7081 continue;
25dbc73a 7082
5446cbdf
AM
7083 /* There probably isn't any reason to handle symbols in
7084 SEC_MERGE sections; SEC_MERGE doesn't seem a likely
7085 attribute for a code section, and we are only looking at
7086 branches. However, implement it correctly here as a
7087 reference for other target relax_section functions. */
7088 if (0 && tsec->sec_info_type == SEC_INFO_TYPE_MERGE)
7089 {
7090 /* At this stage in linking, no SEC_MERGE symbol has been
7091 adjusted, so all references to such symbols need to be
7092 passed through _bfd_merged_section_offset. (Later, in
7093 relocate_section, all SEC_MERGE symbols *except* for
7094 section symbols have been adjusted.)
7095
7096 gas may reduce relocations against symbols in SEC_MERGE
7097 sections to a relocation against the section symbol when
7098 the original addend was zero. When the reloc is against
7099 a section symbol we should include the addend in the
7100 offset passed to _bfd_merged_section_offset, since the
7101 location of interest is the original symbol. On the
7102 other hand, an access to "sym+addend" where "sym" is not
7103 a section symbol should not include the addend; Such an
7104 access is presumed to be an offset from "sym"; The
7105 location of interest is just "sym". */
7106 if (sym_type == STT_SECTION)
7107 toff += irel->r_addend;
7108
7109 toff
7110 = _bfd_merged_section_offset (abfd, &tsec,
7111 elf_section_data (tsec)->sec_info,
7112 toff);
7113
7114 if (sym_type != STT_SECTION)
7115 toff += irel->r_addend;
7116 }
7117 /* PLTREL24 addends are special. */
7118 else if (r_type != R_PPC_PLTREL24)
25dbc73a 7119 toff += irel->r_addend;
7619e7c7 7120
5446cbdf 7121 /* Attempted -shared link of non-pic code loses. */
0e1862bb 7122 if ((!bfd_link_relocatable (link_info)
5446cbdf
AM
7123 && tsec == bfd_und_section_ptr)
7124 || tsec->output_section == NULL
7125 || (tsec->owner != NULL
7126 && (tsec->owner->flags & BFD_PLUGIN) != 0))
7127 continue;
7619e7c7 7128
5446cbdf 7129 roff = irel->r_offset;
7de713b9 7130
5446cbdf
AM
7131 /* If the branch is in range, no need to do anything. */
7132 if (tsec != bfd_und_section_ptr
0e1862bb 7133 && (!bfd_link_relocatable (link_info)
5446cbdf
AM
7134 /* A relocatable link may have sections moved during
7135 final link, so do not presume they remain in range. */
7136 || tsec->output_section == isec->output_section))
7137 {
7138 bfd_vma symaddr, reladdr;
7619e7c7 7139
5446cbdf
AM
7140 symaddr = tsec->output_section->vma + tsec->output_offset + toff;
7141 reladdr = isec->output_section->vma + isec->output_offset + roff;
7142 if (symaddr - reladdr + max_branch_offset
7143 < 2 * max_branch_offset)
7144 continue;
7145 }
01017ef8 7146
5446cbdf 7147 /* Look for an existing fixup to this address. */
d3e454b9 7148 for (f = branch_fixups; f ; f = f->next)
5446cbdf
AM
7149 if (f->tsec == tsec && f->toff == toff)
7150 break;
252b5132 7151
5446cbdf
AM
7152 if (f == NULL)
7153 {
7154 size_t size;
7155 unsigned long stub_rtype;
25dbc73a 7156
5446cbdf
AM
7157 val = trampoff - roff;
7158 if (val >= max_branch_offset)
7159 /* Oh dear, we can't reach a trampoline. Don't try to add
7160 one. We'll report an error later. */
7161 continue;
252b5132 7162
0e1862bb 7163 if (bfd_link_pic (link_info))
5446cbdf
AM
7164 {
7165 size = 4 * ARRAY_SIZE (shared_stub_entry);
7166 insn_offset = 12;
7167 }
7168 else
7169 {
7170 size = 4 * ARRAY_SIZE (stub_entry);
7171 insn_offset = 0;
7172 }
7173 stub_rtype = R_PPC_RELAX;
ce558b89 7174 if (tsec == htab->elf.splt
5446cbdf
AM
7175 || tsec == htab->glink)
7176 {
7177 stub_rtype = R_PPC_RELAX_PLT;
7178 if (r_type == R_PPC_PLTREL24)
7179 stub_rtype = R_PPC_RELAX_PLTREL24;
7180 }
252b5132 7181
5446cbdf
AM
7182 /* Hijack the old relocation. Since we need two
7183 relocations for this use a "composite" reloc. */
7184 irel->r_info = ELF32_R_INFO (ELF32_R_SYM (irel->r_info),
7185 stub_rtype);
7186 irel->r_offset = trampoff + insn_offset;
7187 if (r_type == R_PPC_PLTREL24
7188 && stub_rtype != R_PPC_RELAX_PLTREL24)
7189 irel->r_addend = 0;
7190
7191 /* Record the fixup so we don't do it again this section. */
7192 f = bfd_malloc (sizeof (*f));
d3e454b9 7193 f->next = branch_fixups;
5446cbdf
AM
7194 f->tsec = tsec;
7195 f->toff = toff;
7196 f->trampoff = trampoff;
d3e454b9 7197 branch_fixups = f;
5446cbdf
AM
7198
7199 trampoff += size;
7200 changes++;
25dbc73a
AM
7201 }
7202 else
7203 {
5446cbdf
AM
7204 val = f->trampoff - roff;
7205 if (val >= max_branch_offset)
7206 continue;
252b5132 7207
5446cbdf
AM
7208 /* Nop out the reloc, since we're finalizing things here. */
7209 irel->r_info = ELF32_R_INFO (0, R_PPC_NONE);
7210 }
252b5132 7211
5446cbdf
AM
7212 /* Get the section contents. */
7213 if (contents == NULL)
25dbc73a 7214 {
5446cbdf
AM
7215 /* Get cached copy if it exists. */
7216 if (elf_section_data (isec)->this_hdr.contents != NULL)
7217 contents = elf_section_data (isec)->this_hdr.contents;
25dbc73a 7218 /* Go get them off disk. */
5446cbdf 7219 else if (!bfd_malloc_and_get_section (abfd, isec, &contents))
25dbc73a
AM
7220 goto error_return;
7221 }
252b5132 7222
5446cbdf
AM
7223 /* Fix up the existing branch to hit the trampoline. */
7224 hit_addr = contents + roff;
7225 switch (r_type)
7226 {
7227 case R_PPC_REL24:
7228 case R_PPC_LOCAL24PC:
7229 case R_PPC_PLTREL24:
7230 t0 = bfd_get_32 (abfd, hit_addr);
7231 t0 &= ~0x3fffffc;
7232 t0 |= val & 0x3fffffc;
7233 bfd_put_32 (abfd, t0, hit_addr);
7234 break;
252b5132 7235
5446cbdf
AM
7236 case R_PPC_REL14:
7237 case R_PPC_REL14_BRTAKEN:
7238 case R_PPC_REL14_BRNTAKEN:
7239 t0 = bfd_get_32 (abfd, hit_addr);
7240 t0 &= ~0xfffc;
7241 t0 |= val & 0xfffc;
7242 bfd_put_32 (abfd, t0, hit_addr);
7243 break;
7244 }
25dbc73a 7245 }
252b5132 7246
d3e454b9 7247 while (branch_fixups != NULL)
25dbc73a 7248 {
d3e454b9
AM
7249 struct one_branch_fixup *f = branch_fixups;
7250 branch_fixups = branch_fixups->next;
25dbc73a
AM
7251 free (f);
7252 }
5446cbdf 7253 }
252b5132 7254
5446cbdf
AM
7255 workaround_change = FALSE;
7256 newsize = trampoff;
795bc6b3 7257 if (htab->params->ppc476_workaround
0e1862bb 7258 && (!bfd_link_relocatable (link_info)
795bc6b3 7259 || isec->output_section->alignment_power >= htab->params->pagesize_p2))
5446cbdf
AM
7260 {
7261 bfd_vma addr, end_addr;
7262 unsigned int crossings;
795bc6b3 7263 bfd_vma pagesize = (bfd_vma) 1 << htab->params->pagesize_p2;
5446cbdf
AM
7264
7265 addr = isec->output_section->vma + isec->output_offset;
6128f9cf 7266 end_addr = addr + trampoff;
5446cbdf 7267 addr &= -pagesize;
795bc6b3 7268 crossings = ((end_addr & -pagesize) - addr) >> htab->params->pagesize_p2;
5446cbdf
AM
7269 if (crossings != 0)
7270 {
7271 /* Keep space aligned, to ensure the patch code itself does
7272 not cross a page. Don't decrease size calculated on a
7273 previous pass as otherwise we might never settle on a layout. */
1e269e9b 7274 newsize = 15 - ((end_addr - 1) & 15);
5446cbdf
AM
7275 newsize += crossings * 16;
7276 if (relax_info->workaround_size < newsize)
7277 {
7278 relax_info->workaround_size = newsize;
7279 workaround_change = TRUE;
5446cbdf
AM
7280 }
7281 /* Ensure relocate_section is called. */
7282 isec->flags |= SEC_RELOC;
7283 }
7284 newsize = trampoff + relax_info->workaround_size;
7285 }
7286
d3e454b9
AM
7287 if (htab->params->pic_fixup > 0)
7288 {
7289 picfixup_size -= relax_info->picfixup_size;
7290 if (picfixup_size != 0)
7291 relax_info->picfixup_size += picfixup_size;
7292 newsize += relax_info->picfixup_size;
7293 }
7294
7295 if (changes != 0 || picfixup_size != 0 || workaround_change)
5446cbdf
AM
7296 isec->size = newsize;
7297
25dbc73a
AM
7298 if (isymbuf != NULL
7299 && symtab_hdr->contents != (unsigned char *) isymbuf)
252b5132 7300 {
25dbc73a
AM
7301 if (! link_info->keep_memory)
7302 free (isymbuf);
252b5132 7303 else
25dbc73a
AM
7304 {
7305 /* Cache the symbols for elf_link_input_bfd. */
7306 symtab_hdr->contents = (unsigned char *) isymbuf;
7307 }
252b5132
RH
7308 }
7309
25dbc73a
AM
7310 if (contents != NULL
7311 && elf_section_data (isec)->this_hdr.contents != contents)
7312 {
53291d1f 7313 if (!changes && !link_info->keep_memory)
25dbc73a
AM
7314 free (contents);
7315 else
7316 {
7317 /* Cache the section contents for elf_link_input_bfd. */
7318 elf_section_data (isec)->this_hdr.contents = contents;
7319 }
7320 }
252b5132 7321
d3e454b9 7322 changes += picfixup_size;
9bc4e62b 7323 if (changes != 0)
25dbc73a 7324 {
9bc4e62b
NS
7325 /* Append sufficient NOP relocs so we can write out relocation
7326 information for the trampolines. */
d4730f92 7327 Elf_Internal_Shdr *rel_hdr;
9bc4e62b
NS
7328 Elf_Internal_Rela *new_relocs = bfd_malloc ((changes + isec->reloc_count)
7329 * sizeof (*new_relocs));
7330 unsigned ix;
5b914448 7331
9bc4e62b
NS
7332 if (!new_relocs)
7333 goto error_return;
7334 memcpy (new_relocs, internal_relocs,
7335 isec->reloc_count * sizeof (*new_relocs));
7336 for (ix = changes; ix--;)
7337 {
7338 irel = new_relocs + ix + isec->reloc_count;
7339
7340 irel->r_info = ELF32_R_INFO (0, R_PPC_NONE);
7341 }
7342 if (internal_relocs != elf_section_data (isec)->relocs)
25dbc73a 7343 free (internal_relocs);
9bc4e62b
NS
7344 elf_section_data (isec)->relocs = new_relocs;
7345 isec->reloc_count += changes;
d4730f92
BS
7346 rel_hdr = _bfd_elf_single_rel_hdr (isec);
7347 rel_hdr->sh_size += changes * rel_hdr->sh_entsize;
25dbc73a 7348 }
5446cbdf
AM
7349 else if (internal_relocs != NULL
7350 && elf_section_data (isec)->relocs != internal_relocs)
9bc4e62b 7351 free (internal_relocs);
252b5132 7352
5446cbdf 7353 *again = changes != 0 || workaround_change;
b34976b6 7354 return TRUE;
25dbc73a
AM
7355
7356 error_return:
d3e454b9 7357 while (branch_fixups != NULL)
5446cbdf 7358 {
d3e454b9
AM
7359 struct one_branch_fixup *f = branch_fixups;
7360 branch_fixups = branch_fixups->next;
5446cbdf
AM
7361 free (f);
7362 }
25dbc73a
AM
7363 if (isymbuf != NULL && (unsigned char *) isymbuf != symtab_hdr->contents)
7364 free (isymbuf);
7365 if (contents != NULL
7366 && elf_section_data (isec)->this_hdr.contents != contents)
7367 free (contents);
7368 if (internal_relocs != NULL
7369 && elf_section_data (isec)->relocs != internal_relocs)
7370 free (internal_relocs);
7371 return FALSE;
252b5132 7372}
252b5132 7373\f
8a696751
AM
7374/* What to do when ld finds relocations against symbols defined in
7375 discarded sections. */
7376
7377static unsigned int
7378ppc_elf_action_discarded (asection *sec)
7379{
7380 if (strcmp (".fixup", sec->name) == 0)
7381 return 0;
7382
7383 if (strcmp (".got2", sec->name) == 0)
7384 return 0;
7385
7386 return _bfd_elf_default_action_discarded (sec);
7387}
c9a2f333 7388\f
25dbc73a 7389/* Fill in the address for a pointer generated in a linker section. */
252b5132 7390
25dbc73a 7391static bfd_vma
76750a2f 7392elf_finish_pointer_linker_section (bfd *input_bfd,
25dbc73a
AM
7393 elf_linker_section_t *lsect,
7394 struct elf_link_hash_entry *h,
7395 bfd_vma relocation,
2bb04cf2 7396 const Elf_Internal_Rela *rel)
25dbc73a
AM
7397{
7398 elf_linker_section_pointers_t *linker_section_ptr;
252b5132 7399
25dbc73a 7400 BFD_ASSERT (lsect != NULL);
252b5132 7401
25dbc73a 7402 if (h != NULL)
252b5132 7403 {
25dbc73a
AM
7404 /* Handle global symbol. */
7405 struct ppc_elf_link_hash_entry *eh;
252b5132 7406
25dbc73a 7407 eh = (struct ppc_elf_link_hash_entry *) h;
76750a2f
AM
7408 BFD_ASSERT (eh->elf.def_regular);
7409 linker_section_ptr = eh->linker_section_pointer;
25dbc73a
AM
7410 }
7411 else
7412 {
7413 /* Handle local symbol. */
7414 unsigned long r_symndx = ELF32_R_SYM (rel->r_info);
76750a2f 7415
0c8d6e5c 7416 BFD_ASSERT (is_ppc_elf (input_bfd));
25dbc73a 7417 BFD_ASSERT (elf_local_ptr_offsets (input_bfd) != NULL);
76750a2f
AM
7418 linker_section_ptr = elf_local_ptr_offsets (input_bfd)[r_symndx];
7419 }
252b5132 7420
76750a2f
AM
7421 linker_section_ptr = elf_find_pointer_linker_section (linker_section_ptr,
7422 rel->r_addend,
7423 lsect);
7424 BFD_ASSERT (linker_section_ptr != NULL);
25dbc73a 7425
76750a2f
AM
7426 /* Offset will always be a multiple of four, so use the bottom bit
7427 as a "written" flag. */
7428 if ((linker_section_ptr->offset & 1) == 0)
7429 {
7430 bfd_put_32 (lsect->section->owner,
7431 relocation + linker_section_ptr->addend,
7432 lsect->section->contents + linker_section_ptr->offset);
7433 linker_section_ptr->offset += 1;
252b5132
RH
7434 }
7435
bd6c6e2b
AM
7436 relocation = (lsect->section->output_section->vma
7437 + lsect->section->output_offset
76750a2f 7438 + linker_section_ptr->offset - 1
bd6c6e2b 7439 - SYM_VAL (lsect->sym));
252b5132 7440
25dbc73a
AM
7441#ifdef DEBUG
7442 fprintf (stderr,
7443 "Finish pointer in linker section %s, offset = %ld (0x%lx)\n",
7444 lsect->name, (long) relocation, (long) relocation);
7445#endif
252b5132 7446
bd6c6e2b 7447 return relocation;
252b5132 7448}
25dbc73a 7449
e054468f
AM
7450#define PPC_LO(v) ((v) & 0xffff)
7451#define PPC_HI(v) (((v) >> 16) & 0xffff)
7452#define PPC_HA(v) PPC_HI ((v) + 0x8000)
7453
7454static void
9e390558
AM
7455write_glink_stub (struct elf_link_hash_entry *h, struct plt_entry *ent,
7456 asection *plt_sec, unsigned char *p,
e054468f
AM
7457 struct bfd_link_info *info)
7458{
7459 struct ppc_elf_link_hash_table *htab = ppc_elf_hash_table (info);
7460 bfd *output_bfd = info->output_bfd;
7461 bfd_vma plt;
9e390558
AM
7462 unsigned char *end = p + GLINK_ENTRY_SIZE (htab, h);
7463
7464 if (h != NULL
7465 && h == htab->tls_get_addr
7466 && !htab->params->no_tls_get_addr_opt)
7467 {
7468 bfd_put_32 (output_bfd, LWZ_11_3, p);
7469 p += 4;
7470 bfd_put_32 (output_bfd, LWZ_12_3 + 4, p);
7471 p += 4;
7472 bfd_put_32 (output_bfd, MR_0_3, p);
7473 p += 4;
7474 bfd_put_32 (output_bfd, CMPWI_11_0, p);
7475 p += 4;
7476 bfd_put_32 (output_bfd, ADD_3_12_2, p);
7477 p += 4;
7478 bfd_put_32 (output_bfd, BEQLR, p);
7479 p += 4;
7480 bfd_put_32 (output_bfd, MR_3_0, p);
7481 p += 4;
7482 bfd_put_32 (output_bfd, NOP, p);
7483 p += 4;
7484 }
e054468f
AM
7485
7486 plt = ((ent->plt.offset & ~1)
7487 + plt_sec->output_section->vma
7488 + plt_sec->output_offset);
e054468f 7489
0e1862bb 7490 if (bfd_link_pic (info))
e054468f
AM
7491 {
7492 bfd_vma got = 0;
7493
7494 if (ent->addend >= 32768)
7495 got = (ent->addend
7496 + ent->sec->output_section->vma
7497 + ent->sec->output_offset);
7498 else if (htab->elf.hgot != NULL)
7499 got = SYM_VAL (htab->elf.hgot);
7500
7501 plt -= got;
7502
7503 if (plt + 0x8000 < 0x10000)
9e390558 7504 bfd_put_32 (output_bfd, LWZ_11_30 + PPC_LO (plt), p);
e054468f
AM
7505 else
7506 {
7507 bfd_put_32 (output_bfd, ADDIS_11_30 + PPC_HA (plt), p);
7508 p += 4;
7509 bfd_put_32 (output_bfd, LWZ_11_11 + PPC_LO (plt), p);
e054468f
AM
7510 }
7511 }
7512 else
7513 {
7514 bfd_put_32 (output_bfd, LIS_11 + PPC_HA (plt), p);
7515 p += 4;
7516 bfd_put_32 (output_bfd, LWZ_11_11 + PPC_LO (plt), p);
9e390558
AM
7517 }
7518 p += 4;
7519 bfd_put_32 (output_bfd, MTCTR_11, p);
7520 p += 4;
407aa07c
AM
7521 bfd_put_32 (output_bfd, BCTR, p);
7522 p += 4;
9e390558
AM
7523 while (p < end)
7524 {
7525 bfd_put_32 (output_bfd, htab->params->ppc476_workaround ? BA : NOP, p);
e054468f
AM
7526 p += 4;
7527 }
7528}
7529
bd6c6e2b
AM
7530/* Return true if symbol is defined statically. */
7531
7532static bfd_boolean
7533is_static_defined (struct elf_link_hash_entry *h)
7534{
7535 return ((h->root.type == bfd_link_hash_defined
7536 || h->root.type == bfd_link_hash_defweak)
7537 && h->root.u.def.section != NULL
7538 && h->root.u.def.section->output_section != NULL);
7539}
7540
2d0f3896
AM
7541/* If INSN is an opcode that may be used with an @tls operand, return
7542 the transformed insn for TLS optimisation, otherwise return 0. If
7543 REG is non-zero only match an insn with RB or RA equal to REG. */
7544
7545unsigned int
7546_bfd_elf_ppc_at_tls_transform (unsigned int insn, unsigned int reg)
7547{
7548 unsigned int rtra;
7549
7550 if ((insn & (0x3f << 26)) != 31 << 26)
7551 return 0;
7552
7553 if (reg == 0 || ((insn >> 11) & 0x1f) == reg)
7554 rtra = insn & ((1 << 26) - (1 << 16));
7555 else if (((insn >> 16) & 0x1f) == reg)
7556 rtra = (insn & (0x1f << 21)) | ((insn & (0x1f << 11)) << 5);
7557 else
7558 return 0;
7559
7560 if ((insn & (0x3ff << 1)) == 266 << 1)
7561 /* add -> addi. */
7562 insn = 14 << 26;
7563 else if ((insn & (0x1f << 1)) == 23 << 1
7564 && ((insn & (0x1f << 6)) < 14 << 6
7565 || ((insn & (0x1f << 6)) >= 16 << 6
7566 && (insn & (0x1f << 6)) < 24 << 6)))
7567 /* load and store indexed -> dform. */
7568 insn = (32 | ((insn >> 6) & 0x1f)) << 26;
7569 else if ((insn & (((0x1a << 5) | 0x1f) << 1)) == 21 << 1)
7570 /* ldx, ldux, stdx, stdux -> ld, ldu, std, stdu. */
7571 insn = ((58 | ((insn >> 6) & 4)) << 26) | ((insn >> 6) & 1);
7572 else if ((insn & (((0x1f << 5) | 0x1f) << 1)) == 341 << 1)
7573 /* lwax -> lwa. */
7574 insn = (58 << 26) | 2;
7575 else
7576 return 0;
7577 insn |= rtra;
7578 return insn;
7579}
7580
766bc656
AM
7581/* If INSN is an opcode that may be used with an @tprel operand, return
7582 the transformed insn for an undefined weak symbol, ie. with the
7583 thread pointer REG operand removed. Otherwise return 0. */
7584
7585unsigned int
7586_bfd_elf_ppc_at_tprel_transform (unsigned int insn, unsigned int reg)
7587{
7588 if ((insn & (0x1f << 16)) == reg << 16
7589 && ((insn & (0x3f << 26)) == 14u << 26 /* addi */
7590 || (insn & (0x3f << 26)) == 15u << 26 /* addis */
7591 || (insn & (0x3f << 26)) == 32u << 26 /* lwz */
7592 || (insn & (0x3f << 26)) == 34u << 26 /* lbz */
7593 || (insn & (0x3f << 26)) == 36u << 26 /* stw */
7594 || (insn & (0x3f << 26)) == 38u << 26 /* stb */
7595 || (insn & (0x3f << 26)) == 40u << 26 /* lhz */
7596 || (insn & (0x3f << 26)) == 42u << 26 /* lha */
7597 || (insn & (0x3f << 26)) == 44u << 26 /* sth */
7598 || (insn & (0x3f << 26)) == 46u << 26 /* lmw */
7599 || (insn & (0x3f << 26)) == 47u << 26 /* stmw */
7600 || (insn & (0x3f << 26)) == 48u << 26 /* lfs */
7601 || (insn & (0x3f << 26)) == 50u << 26 /* lfd */
7602 || (insn & (0x3f << 26)) == 52u << 26 /* stfs */
7603 || (insn & (0x3f << 26)) == 54u << 26 /* stfd */
7604 || ((insn & (0x3f << 26)) == 58u << 26 /* lwa,ld,lmd */
7605 && (insn & 3) != 1)
7606 || ((insn & (0x3f << 26)) == 62u << 26 /* std, stmd */
7607 && ((insn & 3) == 0 || (insn & 3) == 3))))
7608 {
7609 insn &= ~(0x1f << 16);
7610 }
7611 else if ((insn & (0x1f << 21)) == reg << 21
7612 && ((insn & (0x3e << 26)) == 24u << 26 /* ori, oris */
7613 || (insn & (0x3e << 26)) == 26u << 26 /* xori,xoris */
7614 || (insn & (0x3e << 26)) == 28u << 26 /* andi,andis */))
7615 {
7616 insn &= ~(0x1f << 21);
7617 insn |= (insn & (0x1f << 16)) << 5;
7618 if ((insn & (0x3e << 26)) == 26 << 26 /* xori,xoris */)
7619 insn -= 2 >> 26; /* convert to ori,oris */
7620 }
7621 else
7622 insn = 0;
7623 return insn;
7624}
7625
1fe532cf
AM
7626static bfd_boolean
7627is_insn_ds_form (unsigned int insn)
7628{
7629 return ((insn & (0x3f << 26)) == 58u << 26 /* ld,ldu,lwa */
7630 || (insn & (0x3f << 26)) == 62u << 26 /* std,stdu,stq */
7631 || (insn & (0x3f << 26)) == 57u << 26 /* lfdp */
7632 || (insn & (0x3f << 26)) == 61u << 26 /* stfdp */);
7633}
7634
7635static bfd_boolean
7636is_insn_dq_form (unsigned int insn)
7637{
a680de9a
PB
7638 return ((insn & (0x3f << 26)) == 56u << 26 /* lq */
7639 || ((insn & (0x3f << 26)) == (61u << 26) /* lxv, stxv */
7640 && (insn & 3) == 1));
1fe532cf
AM
7641}
7642
252b5132
RH
7643/* The RELOCATE_SECTION function is called by the ELF backend linker
7644 to handle the relocations for a section.
7645
7646 The relocs are always passed as Rela structures; if the section
7647 actually uses Rel structures, the r_addend field will always be
7648 zero.
7649
7650 This function is responsible for adjust the section contents as
7651 necessary, and (if using Rela relocs and generating a
1049f94e 7652 relocatable output file) adjusting the reloc addend as
252b5132
RH
7653 necessary.
7654
7655 This function does not have to worry about setting the reloc
7656 address or the reloc symbol index.
7657
7658 LOCAL_SYMS is a pointer to the swapped in local symbols.
7659
7660 LOCAL_SECTIONS is an array giving the section in the input file
7661 corresponding to the st_shndx field of each local symbol.
7662
7663 The global hash table entry for the global symbols can be found
7664 via elf_sym_hashes (input_bfd).
7665
1049f94e 7666 When generating relocatable output, this function must handle
252b5132
RH
7667 STB_LOCAL/STT_SECTION symbols specially. The output symbol is
7668 going to be the section symbol corresponding to the output
7669 section, which means that the addend must be adjusted
7670 accordingly. */
7671
b34976b6 7672static bfd_boolean
55fd94b0
AM
7673ppc_elf_relocate_section (bfd *output_bfd,
7674 struct bfd_link_info *info,
7675 bfd *input_bfd,
7676 asection *input_section,
7677 bfd_byte *contents,
7678 Elf_Internal_Rela *relocs,
7679 Elf_Internal_Sym *local_syms,
7680 asection **local_sections)
252b5132 7681{
7619e7c7
AM
7682 Elf_Internal_Shdr *symtab_hdr;
7683 struct elf_link_hash_entry **sym_hashes;
7684 struct ppc_elf_link_hash_table *htab;
7685 Elf_Internal_Rela *rel;
c316a17c 7686 Elf_Internal_Rela *wrel;
7619e7c7
AM
7687 Elf_Internal_Rela *relend;
7688 Elf_Internal_Rela outrel;
f95f8542 7689 asection *got2;
252b5132 7690 bfd_vma *local_got_offsets;
b34976b6 7691 bfd_boolean ret = TRUE;
95f0d0d2 7692 bfd_vma d_offset = (bfd_big_endian (input_bfd) ? 2 : 0);
3348747a 7693 bfd_boolean is_vxworks_tls;
d3e454b9
AM
7694 unsigned int picfixup_size = 0;
7695 struct ppc_elf_relax_info *relax_info = NULL;
b34976b6 7696
252b5132 7697#ifdef DEBUG
871b3ab2 7698 _bfd_error_handler ("ppc_elf_relocate_section called for %pB section %pA, "
d003868e
AM
7699 "%ld relocations%s",
7700 input_bfd, input_section,
7701 (long) input_section->reloc_count,
0e1862bb 7702 (bfd_link_relocatable (info)) ? " (relocatable)" : "");
252b5132
RH
7703#endif
7704
a6aa5195
AM
7705 got2 = bfd_get_section_by_name (input_bfd, ".got2");
7706
e47cd125 7707 /* Initialize howto table if not already done. */
8da6118f 7708 if (!ppc_elf_howto_table[R_PPC_ADDR32])
252b5132
RH
7709 ppc_elf_howto_init ();
7710
7619e7c7 7711 htab = ppc_elf_hash_table (info);
252b5132 7712 local_got_offsets = elf_local_got_offsets (input_bfd);
0ffa91dd 7713 symtab_hdr = &elf_symtab_hdr (input_bfd);
7619e7c7 7714 sym_hashes = elf_sym_hashes (input_bfd);
3348747a
NS
7715 /* We have to handle relocations in vxworks .tls_vars sections
7716 specially, because the dynamic loader is 'weird'. */
0e1862bb 7717 is_vxworks_tls = (htab->is_vxworks && bfd_link_pic (info)
3348747a
NS
7718 && !strcmp (input_section->output_section->name,
7719 ".tls_vars"));
d3e454b9
AM
7720 if (input_section->sec_info_type == SEC_INFO_TYPE_TARGET)
7721 relax_info = elf_section_data (input_section)->sec_info;
c316a17c 7722 rel = wrel = relocs;
7619e7c7 7723 relend = relocs + input_section->reloc_count;
c316a17c 7724 for (; rel < relend; wrel++, rel++)
252b5132 7725 {
7619e7c7
AM
7726 enum elf_ppc_reloc_type r_type;
7727 bfd_vma addend;
7728 bfd_reloc_status_type r;
7729 Elf_Internal_Sym *sym;
7730 asection *sec;
7731 struct elf_link_hash_entry *h;
7732 const char *sym_name;
252b5132
RH
7733 reloc_howto_type *howto;
7734 unsigned long r_symndx;
7735 bfd_vma relocation;
91d6fa6a 7736 bfd_vma branch_bit, from;
7619e7c7
AM
7737 bfd_boolean unresolved_reloc;
7738 bfd_boolean warned;
7739 unsigned int tls_type, tls_mask, tls_gd;
e054468f 7740 struct plt_entry **ifunc;
86c95733 7741 struct reloc_howto_struct alt_howto;
7619e7c7 7742
c316a17c 7743 again:
55fd94b0
AM
7744 r_type = ELF32_R_TYPE (rel->r_info);
7745 sym = NULL;
7746 sec = NULL;
7747 h = NULL;
7619e7c7
AM
7748 unresolved_reloc = FALSE;
7749 warned = FALSE;
252b5132 7750 r_symndx = ELF32_R_SYM (rel->r_info);
560e09e9 7751
252b5132
RH
7752 if (r_symndx < symtab_hdr->sh_info)
7753 {
7754 sym = local_syms + r_symndx;
7755 sec = local_sections[r_symndx];
26c61ae5 7756 sym_name = bfd_elf_sym_name (input_bfd, symtab_hdr, sym, sec);
252b5132 7757
8517fae7 7758 relocation = _bfd_elf_rela_local_sym (output_bfd, sym, &sec, rel);
252b5132
RH
7759 }
7760 else
7761 {
62d887d4
L
7762 bfd_boolean ignored;
7763
b2a8e766
AM
7764 RELOC_FOR_GLOBAL_SYMBOL (info, input_bfd, input_section, rel,
7765 r_symndx, symtab_hdr, sym_hashes,
7766 h, sec, relocation,
62d887d4 7767 unresolved_reloc, warned, ignored);
9abc968f 7768
252b5132 7769 sym_name = h->root.root.string;
7619e7c7
AM
7770 }
7771
dbaa2011 7772 if (sec != NULL && discarded_section (sec))
ab96bf03
AM
7773 {
7774 /* For relocs against symbols from removed linkonce sections,
7775 or sections discarded by a linker script, we just want the
7776 section contents zeroed. Avoid any special processing. */
7777 howto = NULL;
7778 if (r_type < R_PPC_max)
7779 howto = ppc_elf_howto_table[r_type];
c316a17c
AM
7780
7781 _bfd_clear_contents (howto, input_bfd, input_section,
7782 contents + rel->r_offset);
7783 wrel->r_offset = rel->r_offset;
7784 wrel->r_info = 0;
7785 wrel->r_addend = 0;
7786
7787 /* For ld -r, remove relocations in debug sections against
dcd2b8a0 7788 symbols defined in discarded sections. Not done for
c316a17c
AM
7789 non-debug to preserve relocs in .eh_frame which the
7790 eh_frame editing code expects to be present. */
7791 if (bfd_link_relocatable (info)
7792 && (input_section->flags & SEC_DEBUGGING))
7793 wrel--;
7794
7795 continue;
ab96bf03
AM
7796 }
7797
0e1862bb 7798 if (bfd_link_relocatable (info))
ab96bf03
AM
7799 {
7800 if (got2 != NULL
7801 && r_type == R_PPC_PLTREL24
f75e0e33 7802 && rel->r_addend != 0)
ab96bf03
AM
7803 {
7804 /* R_PPC_PLTREL24 is rather special. If non-zero, the
7805 addend specifies the GOT pointer offset within .got2. */
7806 rel->r_addend += got2->output_offset;
7807 }
53291d1f
AM
7808 if (r_type != R_PPC_RELAX_PLT
7809 && r_type != R_PPC_RELAX_PLTREL24
7810 && r_type != R_PPC_RELAX)
c316a17c 7811 goto copy_reloc;
ab96bf03
AM
7812 }
7813
7619e7c7
AM
7814 /* TLS optimizations. Replace instruction sequences and relocs
7815 based on information we collected in tls_optimize. We edit
7816 RELOCS so that --emit-relocs will output something sensible
7817 for the final instruction stream. */
7818 tls_mask = 0;
7819 tls_gd = 0;
727fc41e
AM
7820 if (h != NULL)
7821 tls_mask = ((struct ppc_elf_link_hash_entry *) h)->tls_mask;
7822 else if (local_got_offsets != NULL)
7619e7c7 7823 {
e054468f 7824 struct plt_entry **local_plt;
727fc41e 7825 char *lgot_masks;
e054468f
AM
7826 local_plt
7827 = (struct plt_entry **) (local_got_offsets + symtab_hdr->sh_info);
7828 lgot_masks = (char *) (local_plt + symtab_hdr->sh_info);
727fc41e 7829 tls_mask = lgot_masks[r_symndx];
7619e7c7
AM
7830 }
7831
7832 /* Ensure reloc mapping code below stays sane. */
7833 if ((R_PPC_GOT_TLSLD16 & 3) != (R_PPC_GOT_TLSGD16 & 3)
7834 || (R_PPC_GOT_TLSLD16_LO & 3) != (R_PPC_GOT_TLSGD16_LO & 3)
7835 || (R_PPC_GOT_TLSLD16_HI & 3) != (R_PPC_GOT_TLSGD16_HI & 3)
7836 || (R_PPC_GOT_TLSLD16_HA & 3) != (R_PPC_GOT_TLSGD16_HA & 3)
7837 || (R_PPC_GOT_TLSLD16 & 3) != (R_PPC_GOT_TPREL16 & 3)
7838 || (R_PPC_GOT_TLSLD16_LO & 3) != (R_PPC_GOT_TPREL16_LO & 3)
7839 || (R_PPC_GOT_TLSLD16_HI & 3) != (R_PPC_GOT_TPREL16_HI & 3)
7840 || (R_PPC_GOT_TLSLD16_HA & 3) != (R_PPC_GOT_TPREL16_HA & 3))
7841 abort ();
7842 switch (r_type)
7843 {
7844 default:
7845 break;
7846
7847 case R_PPC_GOT_TPREL16:
7848 case R_PPC_GOT_TPREL16_LO:
e054468f 7849 if ((tls_mask & TLS_TLS) != 0
7619e7c7
AM
7850 && (tls_mask & TLS_TPREL) == 0)
7851 {
7852 bfd_vma insn;
91d6fa6a 7853
95f0d0d2 7854 insn = bfd_get_32 (input_bfd,
c316a17c 7855 contents + rel->r_offset - d_offset);
7619e7c7
AM
7856 insn &= 31 << 21;
7857 insn |= 0x3c020000; /* addis 0,2,0 */
95f0d0d2 7858 bfd_put_32 (input_bfd, insn,
c316a17c 7859 contents + rel->r_offset - d_offset);
7619e7c7
AM
7860 r_type = R_PPC_TPREL16_HA;
7861 rel->r_info = ELF32_R_INFO (r_symndx, r_type);
7862 }
7863 break;
7864
7865 case R_PPC_TLS:
e054468f 7866 if ((tls_mask & TLS_TLS) != 0
7619e7c7
AM
7867 && (tls_mask & TLS_TPREL) == 0)
7868 {
2d0f3896
AM
7869 bfd_vma insn;
7870
95f0d0d2 7871 insn = bfd_get_32 (input_bfd, contents + rel->r_offset);
2d0f3896
AM
7872 insn = _bfd_elf_ppc_at_tls_transform (insn, 2);
7873 if (insn == 0)
7619e7c7 7874 abort ();
95f0d0d2 7875 bfd_put_32 (input_bfd, insn, contents + rel->r_offset);
7619e7c7
AM
7876 r_type = R_PPC_TPREL16_LO;
7877 rel->r_info = ELF32_R_INFO (r_symndx, r_type);
4fe5ca5b 7878
7619e7c7 7879 /* Was PPC_TLS which sits on insn boundary, now
4fe5ca5b
GM
7880 PPC_TPREL16_LO which is at low-order half-word. */
7881 rel->r_offset += d_offset;
7619e7c7
AM
7882 }
7883 break;
7884
7885 case R_PPC_GOT_TLSGD16_HI:
7886 case R_PPC_GOT_TLSGD16_HA:
7887 tls_gd = TLS_TPRELGD;
e054468f 7888 if ((tls_mask & TLS_TLS) != 0 && (tls_mask & TLS_GD) == 0)
7619e7c7
AM
7889 goto tls_gdld_hi;
7890 break;
7891
7892 case R_PPC_GOT_TLSLD16_HI:
7893 case R_PPC_GOT_TLSLD16_HA:
e054468f 7894 if ((tls_mask & TLS_TLS) != 0 && (tls_mask & TLS_LD) == 0)
7619e7c7
AM
7895 {
7896 tls_gdld_hi:
7897 if ((tls_mask & tls_gd) != 0)
7898 r_type = (((r_type - (R_PPC_GOT_TLSGD16 & 3)) & 3)
7899 + R_PPC_GOT_TPREL16);
7900 else
7901 {
4fe5ca5b 7902 rel->r_offset -= d_offset;
95f0d0d2 7903 bfd_put_32 (input_bfd, NOP, contents + rel->r_offset);
7619e7c7
AM
7904 r_type = R_PPC_NONE;
7905 }
7906 rel->r_info = ELF32_R_INFO (r_symndx, r_type);
7907 }
7908 break;
7909
7910 case R_PPC_GOT_TLSGD16:
7911 case R_PPC_GOT_TLSGD16_LO:
7912 tls_gd = TLS_TPRELGD;
e054468f 7913 if ((tls_mask & TLS_TLS) != 0 && (tls_mask & TLS_GD) == 0)
b7fcf6f6 7914 goto tls_ldgd_opt;
7619e7c7
AM
7915 break;
7916
7917 case R_PPC_GOT_TLSLD16:
7918 case R_PPC_GOT_TLSLD16_LO:
e054468f 7919 if ((tls_mask & TLS_TLS) != 0 && (tls_mask & TLS_LD) == 0)
7619e7c7 7920 {
3a71aa26 7921 unsigned int insn1, insn2;
b7fcf6f6 7922 bfd_vma offset;
7619e7c7 7923
b7fcf6f6 7924 tls_ldgd_opt:
727fc41e
AM
7925 offset = (bfd_vma) -1;
7926 /* If not using the newer R_PPC_TLSGD/LD to mark
7927 __tls_get_addr calls, we must trust that the call
7928 stays with its arg setup insns, ie. that the next
7929 reloc is the __tls_get_addr call associated with
7930 the current reloc. Edit both insns. */
7931 if (input_section->has_tls_get_addr_call
7932 && rel + 1 < relend
7933 && branch_reloc_hash_match (input_bfd, rel + 1,
7934 htab->tls_get_addr))
7935 offset = rel[1].r_offset;
b86ac8e3
AM
7936 /* We read the low GOT_TLS insn because we need to keep
7937 the destination reg. It may be something other than
7938 the usual r3, and moved to r3 before the call by
7939 intervening code. */
95f0d0d2 7940 insn1 = bfd_get_32 (input_bfd,
b86ac8e3 7941 contents + rel->r_offset - d_offset);
b7fcf6f6
AM
7942 if ((tls_mask & tls_gd) != 0)
7943 {
7944 /* IE */
b86ac8e3 7945 insn1 &= (0x1f << 21) | (0x1f << 16);
b7fcf6f6 7946 insn1 |= 32 << 26; /* lwz */
727fc41e
AM
7947 if (offset != (bfd_vma) -1)
7948 {
f58d5a2d 7949 rel[1].r_info = ELF32_R_INFO (STN_UNDEF, R_PPC_NONE);
727fc41e 7950 insn2 = 0x7c631214; /* add 3,3,2 */
95f0d0d2 7951 bfd_put_32 (input_bfd, insn2, contents + offset);
727fc41e 7952 }
b7fcf6f6
AM
7953 r_type = (((r_type - (R_PPC_GOT_TLSGD16 & 3)) & 3)
7954 + R_PPC_GOT_TPREL16);
7955 rel->r_info = ELF32_R_INFO (r_symndx, r_type);
7956 }
7957 else
7958 {
7959 /* LE */
b86ac8e3
AM
7960 insn1 &= 0x1f << 21;
7961 insn1 |= 0x3c020000; /* addis r,2,0 */
7619e7c7
AM
7962 if (tls_gd == 0)
7963 {
b7fcf6f6 7964 /* Was an LD reloc. */
1d483afe
AM
7965 for (r_symndx = 0;
7966 r_symndx < symtab_hdr->sh_info;
7967 r_symndx++)
7968 if (local_sections[r_symndx] == sec)
7969 break;
7970 if (r_symndx >= symtab_hdr->sh_info)
cf35638d 7971 r_symndx = STN_UNDEF;
b7fcf6f6 7972 rel->r_addend = htab->elf.tls_sec->vma + DTP_OFFSET;
cf35638d 7973 if (r_symndx != STN_UNDEF)
1d483afe
AM
7974 rel->r_addend -= (local_syms[r_symndx].st_value
7975 + sec->output_offset
7976 + sec->output_section->vma);
7619e7c7 7977 }
b7fcf6f6
AM
7978 r_type = R_PPC_TPREL16_HA;
7979 rel->r_info = ELF32_R_INFO (r_symndx, r_type);
727fc41e
AM
7980 if (offset != (bfd_vma) -1)
7981 {
7982 rel[1].r_info = ELF32_R_INFO (r_symndx, R_PPC_TPREL16_LO);
7983 rel[1].r_offset = offset + d_offset;
7984 rel[1].r_addend = rel->r_addend;
7985 insn2 = 0x38630000; /* addi 3,3,0 */
95f0d0d2 7986 bfd_put_32 (input_bfd, insn2, contents + offset);
727fc41e 7987 }
b7fcf6f6 7988 }
95f0d0d2 7989 bfd_put_32 (input_bfd, insn1,
b7fcf6f6 7990 contents + rel->r_offset - d_offset);
b7fcf6f6
AM
7991 if (tls_gd == 0)
7992 {
7993 /* We changed the symbol on an LD reloc. Start over
7994 in order to get h, sym, sec etc. right. */
c316a17c 7995 goto again;
7619e7c7 7996 }
252b5132 7997 }
7619e7c7 7998 break;
727fc41e
AM
7999
8000 case R_PPC_TLSGD:
e054468f 8001 if ((tls_mask & TLS_TLS) != 0 && (tls_mask & TLS_GD) == 0)
727fc41e
AM
8002 {
8003 unsigned int insn2;
8004 bfd_vma offset = rel->r_offset;
8005
8006 if ((tls_mask & TLS_TPRELGD) != 0)
8007 {
8008 /* IE */
8009 r_type = R_PPC_NONE;
8010 insn2 = 0x7c631214; /* add 3,3,2 */
8011 }
8012 else
8013 {
8014 /* LE */
8015 r_type = R_PPC_TPREL16_LO;
8016 rel->r_offset += d_offset;
8017 insn2 = 0x38630000; /* addi 3,3,0 */
8018 }
8019 rel->r_info = ELF32_R_INFO (r_symndx, r_type);
95f0d0d2 8020 bfd_put_32 (input_bfd, insn2, contents + offset);
727fc41e
AM
8021 /* Zap the reloc on the _tls_get_addr call too. */
8022 BFD_ASSERT (offset == rel[1].r_offset);
f58d5a2d 8023 rel[1].r_info = ELF32_R_INFO (STN_UNDEF, R_PPC_NONE);
727fc41e
AM
8024 }
8025 break;
8026
8027 case R_PPC_TLSLD:
e054468f 8028 if ((tls_mask & TLS_TLS) != 0 && (tls_mask & TLS_LD) == 0)
727fc41e
AM
8029 {
8030 unsigned int insn2;
8031
8032 for (r_symndx = 0;
8033 r_symndx < symtab_hdr->sh_info;
8034 r_symndx++)
8035 if (local_sections[r_symndx] == sec)
8036 break;
8037 if (r_symndx >= symtab_hdr->sh_info)
cf35638d 8038 r_symndx = STN_UNDEF;
727fc41e 8039 rel->r_addend = htab->elf.tls_sec->vma + DTP_OFFSET;
cf35638d 8040 if (r_symndx != STN_UNDEF)
727fc41e
AM
8041 rel->r_addend -= (local_syms[r_symndx].st_value
8042 + sec->output_offset
8043 + sec->output_section->vma);
8044
8045 rel->r_info = ELF32_R_INFO (r_symndx, R_PPC_TPREL16_LO);
8046 rel->r_offset += d_offset;
8047 insn2 = 0x38630000; /* addi 3,3,0 */
95f0d0d2 8048 bfd_put_32 (input_bfd, insn2,
727fc41e
AM
8049 contents + rel->r_offset - d_offset);
8050 /* Zap the reloc on the _tls_get_addr call too. */
8051 BFD_ASSERT (rel->r_offset - d_offset == rel[1].r_offset);
f58d5a2d 8052 rel[1].r_info = ELF32_R_INFO (STN_UNDEF, R_PPC_NONE);
c316a17c 8053 goto again;
727fc41e
AM
8054 }
8055 break;
7619e7c7
AM
8056 }
8057
8058 /* Handle other relocations that tweak non-addend part of insn. */
8059 branch_bit = 0;
8060 switch (r_type)
8061 {
8062 default:
8063 break;
8064
8065 /* Branch taken prediction relocations. */
8066 case R_PPC_ADDR14_BRTAKEN:
8067 case R_PPC_REL14_BRTAKEN:
8068 branch_bit = BRANCH_PREDICT_BIT;
1a0670f3 8069 /* Fall through. */
7619e7c7 8070
4cc11e76 8071 /* Branch not taken prediction relocations. */
7619e7c7
AM
8072 case R_PPC_ADDR14_BRNTAKEN:
8073 case R_PPC_REL14_BRNTAKEN:
91d6fa6a
NC
8074 {
8075 bfd_vma insn;
7619e7c7 8076
95f0d0d2 8077 insn = bfd_get_32 (input_bfd, contents + rel->r_offset);
91d6fa6a
NC
8078 insn &= ~BRANCH_PREDICT_BIT;
8079 insn |= branch_bit;
7619e7c7 8080
91d6fa6a
NC
8081 from = (rel->r_offset
8082 + input_section->output_offset
8083 + input_section->output_section->vma);
7619e7c7 8084
91d6fa6a
NC
8085 /* Invert 'y' bit if not the default. */
8086 if ((bfd_signed_vma) (relocation + rel->r_addend - from) < 0)
8087 insn ^= BRANCH_PREDICT_BIT;
8088
95f0d0d2 8089 bfd_put_32 (input_bfd, insn, contents + rel->r_offset);
91d6fa6a
NC
8090 break;
8091 }
252b5132
RH
8092 }
8093
d3e454b9
AM
8094 if (ELIMINATE_COPY_RELOCS
8095 && h != NULL
8096 && !h->def_regular
8097 && h->protected_def
8098 && ppc_elf_hash_entry (h)->has_addr16_ha
8099 && ppc_elf_hash_entry (h)->has_addr16_lo
8100 && htab->params->pic_fixup > 0)
8101 {
8102 /* Convert lis;addi or lis;load/store accessing a protected
8103 variable defined in a shared library to PIC. */
8104 unsigned int insn;
8105
8106 if (r_type == R_PPC_ADDR16_HA)
8107 {
95f0d0d2 8108 insn = bfd_get_32 (input_bfd,
d3e454b9
AM
8109 contents + rel->r_offset - d_offset);
8110 if ((insn & (0x3f << 26)) == (15u << 26)
8111 && (insn & (0x1f << 16)) == 0 /* lis */)
8112 {
8113 bfd_byte *p;
8114 bfd_vma off;
8115 bfd_vma got_addr;
8116
8117 p = (contents + input_section->size
8118 - relax_info->workaround_size
8119 - relax_info->picfixup_size
8120 + picfixup_size);
8121 off = (p - contents) - (rel->r_offset - d_offset);
8122 if (off > 0x1fffffc || (off & 3) != 0)
8123 info->callbacks->einfo
174d0a74 8124 (_("%H: fixup branch overflow\n"),
d3e454b9
AM
8125 input_bfd, input_section, rel->r_offset);
8126
95f0d0d2 8127 bfd_put_32 (input_bfd, B | off,
d3e454b9 8128 contents + rel->r_offset - d_offset);
ce558b89
AM
8129 got_addr = (htab->elf.sgot->output_section->vma
8130 + htab->elf.sgot->output_offset
d3e454b9 8131 + (h->got.offset & ~1));
c316a17c
AM
8132 wrel->r_offset = (p - contents) + d_offset;
8133 wrel->r_info = ELF32_R_INFO (0, R_PPC_ADDR16_HA);
8134 wrel->r_addend = got_addr;
d3e454b9 8135 insn &= ~0xffff;
4aef7643 8136 insn |= ((unsigned int) (got_addr + 0x8000) >> 16) & 0xffff;
95f0d0d2 8137 bfd_put_32 (input_bfd, insn, p);
d3e454b9
AM
8138
8139 /* Convert lis to lwz, loading address from GOT. */
8140 insn &= ~0xffff;
8141 insn ^= (32u ^ 15u) << 26;
8142 insn |= (insn & (0x1f << 21)) >> 5;
8143 insn |= got_addr & 0xffff;
95f0d0d2 8144 bfd_put_32 (input_bfd, insn, p + 4);
d3e454b9 8145
95f0d0d2 8146 bfd_put_32 (input_bfd, B | ((-4 - off) & 0x3ffffff), p + 8);
d3e454b9
AM
8147 picfixup_size += 12;
8148
8149 /* Use one of the spare relocs, so --emit-relocs
8150 output is reasonable. */
8151 memmove (rel + 1, rel, (relend - rel - 1) * sizeof (*rel));
c316a17c
AM
8152 wrel++, rel++;
8153 rel->r_offset = wrel[-1].r_offset + 4;
d3e454b9 8154 rel->r_info = ELF32_R_INFO (0, R_PPC_ADDR16_LO);
c316a17c 8155 rel->r_addend = wrel[-1].r_addend;
d3e454b9
AM
8156
8157 /* Continue on as if we had a got reloc, to output
8158 dynamic reloc. */
8159 r_type = R_PPC_GOT16_LO;
8160 }
8161 else
2c4d9cbe 8162 _bfd_error_handler
695344c0 8163 /* xgettext:c-format */
2dcf00ce
AM
8164 (_("%pB(%pA+%#" PRIx64 "): error: "
8165 "%s with unexpected instruction %#x"),
8166 input_bfd, input_section, (uint64_t) rel->r_offset,
d3e454b9
AM
8167 "R_PPC_ADDR16_HA", insn);
8168 }
8169 else if (r_type == R_PPC_ADDR16_LO)
8170 {
95f0d0d2 8171 insn = bfd_get_32 (input_bfd,
d3e454b9
AM
8172 contents + rel->r_offset - d_offset);
8173 if ((insn & (0x3f << 26)) == 14u << 26 /* addi */
8174 || (insn & (0x3f << 26)) == 32u << 26 /* lwz */
8175 || (insn & (0x3f << 26)) == 34u << 26 /* lbz */
8176 || (insn & (0x3f << 26)) == 36u << 26 /* stw */
8177 || (insn & (0x3f << 26)) == 38u << 26 /* stb */
8178 || (insn & (0x3f << 26)) == 40u << 26 /* lhz */
8179 || (insn & (0x3f << 26)) == 42u << 26 /* lha */
8180 || (insn & (0x3f << 26)) == 44u << 26 /* sth */
8181 || (insn & (0x3f << 26)) == 46u << 26 /* lmw */
8182 || (insn & (0x3f << 26)) == 47u << 26 /* stmw */
8183 || (insn & (0x3f << 26)) == 48u << 26 /* lfs */
8184 || (insn & (0x3f << 26)) == 50u << 26 /* lfd */
8185 || (insn & (0x3f << 26)) == 52u << 26 /* stfs */
8186 || (insn & (0x3f << 26)) == 54u << 26 /* stfd */
8187 || ((insn & (0x3f << 26)) == 58u << 26 /* lwa,ld,lmd */
8188 && (insn & 3) != 1)
8189 || ((insn & (0x3f << 26)) == 62u << 26 /* std, stmd */
8190 && ((insn & 3) == 0 || (insn & 3) == 3)))
8191 {
8192 /* Arrange to apply the reloc addend, if any. */
8193 relocation = 0;
8194 unresolved_reloc = FALSE;
8195 rel->r_info = ELF32_R_INFO (0, r_type);
8196 }
8197 else
2c4d9cbe 8198 _bfd_error_handler
695344c0 8199 /* xgettext:c-format */
2dcf00ce
AM
8200 (_("%pB(%pA+%#" PRIx64 "): error: "
8201 "%s with unexpected instruction %#x"),
8202 input_bfd, input_section, (uint64_t) rel->r_offset,
d3e454b9
AM
8203 "R_PPC_ADDR16_LO", insn);
8204 }
8205 }
8206
e054468f 8207 ifunc = NULL;
25f23106 8208 if (!htab->is_vxworks)
e054468f 8209 {
de972ffa
AM
8210 struct plt_entry *ent;
8211
e054468f
AM
8212 if (h != NULL)
8213 {
8214 if (h->type == STT_GNU_IFUNC)
8215 ifunc = &h->plt.plist;
8216 }
de972ffa
AM
8217 else if (local_got_offsets != NULL
8218 && ELF_ST_TYPE (sym->st_info) == STT_GNU_IFUNC)
e054468f 8219 {
de972ffa 8220 struct plt_entry **local_plt;
e054468f 8221
de972ffa
AM
8222 local_plt = (struct plt_entry **) (local_got_offsets
8223 + symtab_hdr->sh_info);
8224 ifunc = local_plt + r_symndx;
e054468f 8225 }
e054468f 8226
de972ffa
AM
8227 ent = NULL;
8228 if (ifunc != NULL
0e1862bb 8229 && (!bfd_link_pic (info)
de972ffa
AM
8230 || is_branch_reloc (r_type)))
8231 {
8232 addend = 0;
0e1862bb 8233 if (r_type == R_PPC_PLTREL24 && bfd_link_pic (info))
de972ffa
AM
8234 addend = rel->r_addend;
8235 ent = find_plt_ent (ifunc, got2, addend);
8236 }
8237 if (ent != NULL)
8238 {
888a7fc3
AM
8239 if (bfd_link_pic (info)
8240 && ent->sec != got2
8241 && htab->plt_type != PLT_NEW
8242 && (!htab->elf.dynamic_sections_created
8243 || h == NULL
8244 || h->dynindx == -1))
8245 {
8246 /* Uh oh, we are going to create a pic glink stub
8247 for an ifunc (here for h == NULL and later in
8248 finish_dynamic_symbol for h != NULL), and
8249 apparently are using code compiled with
8250 -mbss-plt. The difficulty is that -mbss-plt code
8251 gives no indication via a magic PLTREL24 addend
8252 whether r30 is equal to _GLOBAL_OFFSET_TABLE_ or
8253 is pointing into a .got2 section (and how far
8254 into .got2). */
8255 info->callbacks->einfo
695344c0 8256 /* xgettext:c-format */
174d0a74 8257 (_("%X%H: unsupported bss-plt -fPIC ifunc %s\n"),
888a7fc3
AM
8258 input_bfd, input_section, rel->r_offset, sym_name);
8259 }
e054468f
AM
8260 if (h == NULL && (ent->plt.offset & 1) == 0)
8261 {
8262 Elf_Internal_Rela rela;
8263 bfd_byte *loc;
8264
ce558b89
AM
8265 rela.r_offset = (htab->elf.iplt->output_section->vma
8266 + htab->elf.iplt->output_offset
e054468f
AM
8267 + ent->plt.offset);
8268 rela.r_info = ELF32_R_INFO (0, R_PPC_IRELATIVE);
8269 rela.r_addend = relocation;
ce558b89
AM
8270 loc = htab->elf.irelplt->contents;
8271 loc += (htab->elf.irelplt->reloc_count++
25f23106 8272 * sizeof (Elf32_External_Rela));
e054468f 8273 bfd_elf32_swap_reloca_out (output_bfd, &rela, loc);
82e66161 8274 htab->local_ifunc_resolver = 1;
e054468f
AM
8275
8276 ent->plt.offset |= 1;
8277 }
8278 if (h == NULL && (ent->glink_offset & 1) == 0)
8279 {
a7f2871e
AM
8280 unsigned char *p = ((unsigned char *) htab->glink->contents
8281 + ent->glink_offset);
9e390558
AM
8282
8283 write_glink_stub (NULL, ent, htab->elf.iplt, p, info);
e054468f
AM
8284 ent->glink_offset |= 1;
8285 }
8286
8287 unresolved_reloc = FALSE;
8288 if (htab->plt_type == PLT_NEW
8289 || !htab->elf.dynamic_sections_created
c7e17e05
AM
8290 || h == NULL
8291 || h->dynindx == -1)
e054468f
AM
8292 relocation = (htab->glink->output_section->vma
8293 + htab->glink->output_offset
8294 + (ent->glink_offset & ~1));
8295 else
ce558b89
AM
8296 relocation = (htab->elf.splt->output_section->vma
8297 + htab->elf.splt->output_offset
e054468f
AM
8298 + ent->plt.offset);
8299 }
8300 }
8301
7619e7c7 8302 addend = rel->r_addend;
7619e7c7 8303 howto = NULL;
55fd94b0
AM
8304 if (r_type < R_PPC_max)
8305 howto = ppc_elf_howto_table[r_type];
9a23f96e
AM
8306
8307 switch (r_type)
8308 {
8309 default:
8310 break;
8311
8312 case R_PPC_TPREL16_HA:
8313 if (htab->do_tls_opt && relocation + addend + 0x8000 < 0x10000)
8314 {
8315 bfd_byte *p = contents + (rel->r_offset & ~3);
8316 unsigned int insn = bfd_get_32 (input_bfd, p);
8317 if ((insn & ((0x3f << 26) | 0x1f << 16))
8318 != ((15u << 26) | (2 << 16)) /* addis rt,2,imm */)
8319 /* xgettext:c-format */
8320 info->callbacks->minfo
8321 (_("%H: warning: %s unexpected insn %#x.\n"),
8322 input_bfd, input_section, rel->r_offset, howto->name, insn);
8323 else
8324 bfd_put_32 (input_bfd, NOP, p);
8325 }
8326 break;
8327
8328 case R_PPC_TPREL16_LO:
8329 if (htab->do_tls_opt && relocation + addend + 0x8000 < 0x10000)
8330 {
8331 bfd_byte *p = contents + (rel->r_offset & ~3);
8332 unsigned int insn = bfd_get_32 (input_bfd, p);
8333 insn &= ~(0x1f << 16);
8334 insn |= 2 << 16;
8335 bfd_put_32 (input_bfd, insn, p);
8336 }
8337 break;
8338 }
8339
8340 tls_type = 0;
7619e7c7 8341 switch (r_type)
252b5132
RH
8342 {
8343 default:
25f53a85 8344 info->callbacks->einfo
695344c0 8345 /* xgettext:c-format */
871b3ab2 8346 (_("%P: %pB: unknown relocation type %d for symbol %s\n"),
d003868e 8347 input_bfd, (int) r_type, sym_name);
252b5132
RH
8348
8349 bfd_set_error (bfd_error_bad_value);
b34976b6 8350 ret = FALSE;
c316a17c 8351 goto copy_reloc;
252b5132 8352
7619e7c7
AM
8353 case R_PPC_NONE:
8354 case R_PPC_TLS:
727fc41e
AM
8355 case R_PPC_TLSGD:
8356 case R_PPC_TLSLD:
7619e7c7
AM
8357 case R_PPC_EMB_MRKREF:
8358 case R_PPC_GNU_VTINHERIT:
8359 case R_PPC_GNU_VTENTRY:
c316a17c 8360 goto copy_reloc;
7595d193 8361
7619e7c7
AM
8362 /* GOT16 relocations. Like an ADDR16 using the symbol's
8363 address in the GOT as relocation value instead of the
8364 symbol's value itself. Also, create a GOT entry for the
8365 symbol and put the symbol value there. */
8366 case R_PPC_GOT_TLSGD16:
8367 case R_PPC_GOT_TLSGD16_LO:
8368 case R_PPC_GOT_TLSGD16_HI:
8369 case R_PPC_GOT_TLSGD16_HA:
8370 tls_type = TLS_TLS | TLS_GD;
8371 goto dogot;
8372
8373 case R_PPC_GOT_TLSLD16:
8374 case R_PPC_GOT_TLSLD16_LO:
8375 case R_PPC_GOT_TLSLD16_HI:
8376 case R_PPC_GOT_TLSLD16_HA:
8377 tls_type = TLS_TLS | TLS_LD;
8378 goto dogot;
8379
8380 case R_PPC_GOT_TPREL16:
8381 case R_PPC_GOT_TPREL16_LO:
8382 case R_PPC_GOT_TPREL16_HI:
8383 case R_PPC_GOT_TPREL16_HA:
8384 tls_type = TLS_TLS | TLS_TPREL;
8385 goto dogot;
8386
8387 case R_PPC_GOT_DTPREL16:
8388 case R_PPC_GOT_DTPREL16_LO:
8389 case R_PPC_GOT_DTPREL16_HI:
8390 case R_PPC_GOT_DTPREL16_HA:
8391 tls_type = TLS_TLS | TLS_DTPREL;
8392 goto dogot;
8393
8394 case R_PPC_GOT16:
8395 case R_PPC_GOT16_LO:
8396 case R_PPC_GOT16_HI:
8397 case R_PPC_GOT16_HA:
727fc41e 8398 tls_mask = 0;
7619e7c7
AM
8399 dogot:
8400 {
8401 /* Relocation is to the entry for this symbol in the global
8402 offset table. */
8403 bfd_vma off;
8404 bfd_vma *offp;
8405 unsigned long indx;
8406
ce558b89 8407 if (htab->elf.sgot == NULL)
7619e7c7
AM
8408 abort ();
8409
8410 indx = 0;
8411 if (tls_type == (TLS_TLS | TLS_LD)
d881513a 8412 && (h == NULL
f5385ebf 8413 || !h->def_dynamic))
7619e7c7
AM
8414 offp = &htab->tlsld_got.offset;
8415 else if (h != NULL)
8416 {
f0158f44
AM
8417 if (!htab->elf.dynamic_sections_created
8418 || h->dynindx == -1
8419 || SYMBOL_REFERENCES_LOCAL (info, h)
21d68fcd 8420 || UNDEFWEAK_NO_DYNAMIC_RELOC (info, h))
7619e7c7
AM
8421 /* This is actually a static link, or it is a
8422 -Bsymbolic link and the symbol is defined
8423 locally, or the symbol was forced to be local
8424 because of a version file. */
8425 ;
8426 else
8427 {
8428 indx = h->dynindx;
8429 unresolved_reloc = FALSE;
8430 }
8431 offp = &h->got.offset;
8432 }
8433 else
8434 {
8435 if (local_got_offsets == NULL)
8436 abort ();
8437 offp = &local_got_offsets[r_symndx];
8438 }
8439
8440 /* The offset must always be a multiple of 4. We use the
8441 least significant bit to record whether we have already
8442 processed this entry. */
8443 off = *offp;
8444 if ((off & 1) != 0)
8445 off &= ~1;
8446 else
8447 {
70bccea4
AM
8448 unsigned int tls_m = (tls_mask
8449 & (TLS_LD | TLS_GD | TLS_DTPREL
8450 | TLS_TPREL | TLS_TPRELGD));
8451
8452 if (offp == &htab->tlsld_got.offset)
8453 tls_m = TLS_LD;
8454 else if (h == NULL
f5385ebf 8455 || !h->def_dynamic)
70bccea4
AM
8456 tls_m &= ~TLS_LD;
8457
8458 /* We might have multiple got entries for this sym.
8459 Initialize them all. */
8460 do
7619e7c7 8461 {
70bccea4
AM
8462 int tls_ty = 0;
8463
8464 if ((tls_m & TLS_LD) != 0)
7619e7c7 8465 {
70bccea4
AM
8466 tls_ty = TLS_TLS | TLS_LD;
8467 tls_m &= ~TLS_LD;
8468 }
8469 else if ((tls_m & TLS_GD) != 0)
8470 {
8471 tls_ty = TLS_TLS | TLS_GD;
8472 tls_m &= ~TLS_GD;
8473 }
8474 else if ((tls_m & TLS_DTPREL) != 0)
8475 {
8476 tls_ty = TLS_TLS | TLS_DTPREL;
8477 tls_m &= ~TLS_DTPREL;
8478 }
8479 else if ((tls_m & (TLS_TPREL | TLS_TPRELGD)) != 0)
8480 {
8481 tls_ty = TLS_TLS | TLS_TPREL;
8482 tls_m = 0;
7619e7c7 8483 }
7619e7c7 8484
70bccea4 8485 /* Generate relocs for the dynamic linker. */
f0158f44
AM
8486 if (indx != 0
8487 || (bfd_link_pic (info)
8488 && (h == NULL
21d68fcd 8489 || !UNDEFWEAK_NO_DYNAMIC_RELOC (info, h)
f15d0b54
AM
8490 || offp == &htab->tlsld_got.offset)
8491 && !(tls_ty == (TLS_TLS | TLS_TPREL)
8492 && bfd_link_executable (info)
8493 && SYMBOL_REFERENCES_LOCAL (info, h))))
7619e7c7 8494 {
ce558b89 8495 asection *rsec = htab->elf.srelgot;
91d6fa6a 8496 bfd_byte * loc;
91e21fb7 8497
0bed072f 8498 if (ifunc != NULL)
82e66161
AM
8499 {
8500 rsec = htab->elf.irelplt;
8501 if (indx == 0)
8502 htab->local_ifunc_resolver = 1;
8503 else if (is_static_defined (h))
8504 htab->maybe_local_ifunc_resolver = 1;
8505 }
ce558b89
AM
8506 outrel.r_offset = (htab->elf.sgot->output_section->vma
8507 + htab->elf.sgot->output_offset
70bccea4 8508 + off);
e515b051 8509 outrel.r_addend = 0;
70bccea4
AM
8510 if (tls_ty & (TLS_LD | TLS_GD))
8511 {
8512 outrel.r_info = ELF32_R_INFO (indx, R_PPC_DTPMOD32);
70bccea4
AM
8513 if (tls_ty == (TLS_TLS | TLS_GD))
8514 {
25f23106
AM
8515 loc = rsec->contents;
8516 loc += (rsec->reloc_count++
70bccea4
AM
8517 * sizeof (Elf32_External_Rela));
8518 bfd_elf32_swap_reloca_out (output_bfd,
8519 &outrel, loc);
e515b051 8520 outrel.r_offset += 4;
70bccea4
AM
8521 outrel.r_info
8522 = ELF32_R_INFO (indx, R_PPC_DTPREL32);
70bccea4
AM
8523 }
8524 }
8525 else if (tls_ty == (TLS_TLS | TLS_DTPREL))
8526 outrel.r_info = ELF32_R_INFO (indx, R_PPC_DTPREL32);
8527 else if (tls_ty == (TLS_TLS | TLS_TPREL))
8528 outrel.r_info = ELF32_R_INFO (indx, R_PPC_TPREL32);
25f23106 8529 else if (indx != 0)
70bccea4 8530 outrel.r_info = ELF32_R_INFO (indx, R_PPC_GLOB_DAT);
25f23106
AM
8531 else if (ifunc != NULL)
8532 outrel.r_info = ELF32_R_INFO (0, R_PPC_IRELATIVE);
8533 else
8534 outrel.r_info = ELF32_R_INFO (0, R_PPC_RELATIVE);
d6e14abc 8535 if (indx == 0 && tls_ty != (TLS_TLS | TLS_LD))
e515b051
AM
8536 {
8537 outrel.r_addend += relocation;
8538 if (tls_ty & (TLS_GD | TLS_DTPREL | TLS_TPREL))
989f9879
AM
8539 {
8540 if (htab->elf.tls_sec == NULL)
8541 outrel.r_addend = 0;
8542 else
8543 outrel.r_addend -= htab->elf.tls_sec->vma;
8544 }
e515b051 8545 }
25f23106
AM
8546 loc = rsec->contents;
8547 loc += (rsec->reloc_count++
70bccea4
AM
8548 * sizeof (Elf32_External_Rela));
8549 bfd_elf32_swap_reloca_out (output_bfd, &outrel, loc);
7619e7c7
AM
8550 }
8551
70bccea4
AM
8552 /* Init the .got section contents if we're not
8553 emitting a reloc. */
8554 else
7619e7c7 8555 {
70bccea4
AM
8556 bfd_vma value = relocation;
8557
f0158f44 8558 if (tls_ty != 0)
70bccea4 8559 {
989f9879
AM
8560 if (htab->elf.tls_sec == NULL)
8561 value = 0;
8562 else
8563 {
f0158f44
AM
8564 if (tls_ty & TLS_LD)
8565 value = 0;
8566 else
8567 value -= htab->elf.tls_sec->vma + DTP_OFFSET;
676ee2b5 8568 if (tls_ty & TLS_TPREL)
989f9879
AM
8569 value += DTP_OFFSET - TP_OFFSET;
8570 }
70bccea4 8571
f0158f44 8572 if (tls_ty & (TLS_LD | TLS_GD))
7b609f53 8573 {
95f0d0d2 8574 bfd_put_32 (input_bfd, value,
ce558b89 8575 htab->elf.sgot->contents + off + 4);
676ee2b5 8576 value = 1;
7b609f53 8577 }
70bccea4 8578 }
95f0d0d2 8579 bfd_put_32 (input_bfd, value,
ce558b89 8580 htab->elf.sgot->contents + off);
7619e7c7 8581 }
70bccea4
AM
8582
8583 off += 4;
8584 if (tls_ty & (TLS_LD | TLS_GD))
8585 off += 4;
7619e7c7 8586 }
70bccea4
AM
8587 while (tls_m != 0);
8588
8589 off = *offp;
8590 *offp = off | 1;
7619e7c7
AM
8591 }
8592
8593 if (off >= (bfd_vma) -2)
8594 abort ();
8595
70bccea4
AM
8596 if ((tls_type & TLS_TLS) != 0)
8597 {
8598 if (tls_type != (TLS_TLS | TLS_LD))
8599 {
8600 if ((tls_mask & TLS_LD) != 0
8601 && !(h == NULL
f5385ebf 8602 || !h->def_dynamic))
70bccea4
AM
8603 off += 8;
8604 if (tls_type != (TLS_TLS | TLS_GD))
8605 {
8606 if ((tls_mask & TLS_GD) != 0)
8607 off += 8;
8608 if (tls_type != (TLS_TLS | TLS_DTPREL))
8609 {
8610 if ((tls_mask & TLS_DTPREL) != 0)
8611 off += 4;
8612 }
8613 }
8614 }
8615 }
8616
d3e454b9
AM
8617 /* If here for a picfixup, we're done. */
8618 if (r_type != ELF32_R_TYPE (rel->r_info))
c316a17c 8619 goto copy_reloc;
d3e454b9 8620
ce558b89
AM
8621 relocation = (htab->elf.sgot->output_section->vma
8622 + htab->elf.sgot->output_offset
e87d4038
AM
8623 + off
8624 - SYM_VAL (htab->elf.hgot));
7619e7c7
AM
8625
8626 /* Addends on got relocations don't make much sense.
8627 x+off@got is actually x@got+off, and since the got is
8628 generated by a hash table traversal, the value in the
8629 got at entry m+n bears little relation to the entry m. */
8630 if (addend != 0)
25f53a85 8631 info->callbacks->einfo
695344c0 8632 /* xgettext:c-format */
174d0a74 8633 (_("%H: non-zero addend on %s reloc against `%s'\n"),
25f53a85 8634 input_bfd, input_section, rel->r_offset,
7b609f53 8635 howto->name,
7619e7c7
AM
8636 sym_name);
8637 }
86c95733 8638 break;
7619e7c7 8639
86c95733 8640 /* Relocations that need no special processing. */
7619e7c7 8641 case R_PPC_LOCAL24PC:
252b5132
RH
8642 /* It makes no sense to point a local relocation
8643 at a symbol not in this object. */
7b609f53 8644 if (unresolved_reloc)
252b5132 8645 {
1a72702b
AM
8646 (*info->callbacks->undefined_symbol) (info,
8647 h->root.root.string,
8648 input_bfd,
8649 input_section,
8650 rel->r_offset,
8651 TRUE);
c316a17c 8652 goto copy_reloc;
252b5132 8653 }
888a7fc3
AM
8654 if (h != NULL && h->type == STT_GNU_IFUNC && bfd_link_pic (info))
8655 {
8656 /* @local on an ifunc does not really make sense since
8657 the ifunc resolver can take you anywhere. More
8658 seriously, calls to ifuncs must go through a plt call
8659 stub, and for pic the plt call stubs uses r30 to
8660 access the PLT. The problem is that a call that is
8661 local won't have the +32k reloc addend trick marking
8662 -fPIC code, so the linker won't know whether r30 is
8663 _GLOBAL_OFFSET_TABLE_ or pointing into a .got2 section. */
695344c0 8664 /* xgettext:c-format */
174d0a74 8665 info->callbacks->einfo (_("%X%H: @local call to ifunc %s\n"),
888a7fc3
AM
8666 input_bfd, input_section, rel->r_offset,
8667 h->root.root.string);
8668 }
252b5132
RH
8669 break;
8670
7619e7c7
AM
8671 case R_PPC_DTPREL16:
8672 case R_PPC_DTPREL16_LO:
8673 case R_PPC_DTPREL16_HI:
8674 case R_PPC_DTPREL16_HA:
989f9879
AM
8675 if (htab->elf.tls_sec != NULL)
8676 addend -= htab->elf.tls_sec->vma + DTP_OFFSET;
7619e7c7
AM
8677 break;
8678
70bccea4
AM
8679 /* Relocations that may need to be propagated if this is a shared
8680 object. */
7619e7c7
AM
8681 case R_PPC_TPREL16:
8682 case R_PPC_TPREL16_LO:
8683 case R_PPC_TPREL16_HI:
8684 case R_PPC_TPREL16_HA:
766bc656
AM
8685 if (h != NULL
8686 && h->root.type == bfd_link_hash_undefweak
8687 && h->dynindx == -1)
8688 {
8689 /* Make this relocation against an undefined weak symbol
8690 resolve to zero. This is really just a tweak, since
8691 code using weak externs ought to check that they are
8692 defined before using them. */
8693 bfd_byte *p = contents + rel->r_offset - d_offset;
95f0d0d2 8694 unsigned int insn = bfd_get_32 (input_bfd, p);
766bc656
AM
8695 insn = _bfd_elf_ppc_at_tprel_transform (insn, 2);
8696 if (insn != 0)
95f0d0d2 8697 bfd_put_32 (input_bfd, insn, p);
766bc656
AM
8698 break;
8699 }
989f9879
AM
8700 if (htab->elf.tls_sec != NULL)
8701 addend -= htab->elf.tls_sec->vma + TP_OFFSET;
7619e7c7 8702 /* The TPREL16 relocs shouldn't really be used in shared
7c8bbca5
AM
8703 libs or with non-local symbols as that will result in
8704 DT_TEXTREL being set, but support them anyway. */
7619e7c7
AM
8705 goto dodyn;
8706
8707 case R_PPC_TPREL32:
989f9879
AM
8708 if (htab->elf.tls_sec != NULL)
8709 addend -= htab->elf.tls_sec->vma + TP_OFFSET;
7619e7c7
AM
8710 goto dodyn;
8711
8712 case R_PPC_DTPREL32:
989f9879
AM
8713 if (htab->elf.tls_sec != NULL)
8714 addend -= htab->elf.tls_sec->vma + DTP_OFFSET;
7619e7c7
AM
8715 goto dodyn;
8716
e515b051
AM
8717 case R_PPC_DTPMOD32:
8718 relocation = 1;
8719 addend = 0;
8720 goto dodyn;
8721
d7128ce4
AM
8722 case R_PPC_REL16:
8723 case R_PPC_REL16_LO:
8724 case R_PPC_REL16_HI:
8725 case R_PPC_REL16_HA:
a680de9a 8726 case R_PPC_REL16DX_HA:
d7128ce4
AM
8727 break;
8728
7619e7c7 8729 case R_PPC_REL32:
625af618
AM
8730 if (h == NULL || h == htab->elf.hgot)
8731 break;
8732 /* fall through */
8733
8734 case R_PPC_ADDR32:
8735 case R_PPC_ADDR16:
8736 case R_PPC_ADDR16_LO:
8737 case R_PPC_ADDR16_HI:
8738 case R_PPC_ADDR16_HA:
8739 case R_PPC_UADDR32:
8740 case R_PPC_UADDR16:
8741 goto dodyn;
8742
b9c361e0
JL
8743 case R_PPC_VLE_REL8:
8744 case R_PPC_VLE_REL15:
8745 case R_PPC_VLE_REL24:
625af618 8746 case R_PPC_REL24:
7619e7c7
AM
8747 case R_PPC_REL14:
8748 case R_PPC_REL14_BRTAKEN:
8749 case R_PPC_REL14_BRNTAKEN:
252b5132
RH
8750 /* If these relocations are not to a named symbol, they can be
8751 handled right here, no need to bother the dynamic linker. */
89200bf8 8752 if (SYMBOL_CALLS_LOCAL (info, h)
3b36f7e6 8753 || h == htab->elf.hgot)
252b5132 8754 break;
70bccea4 8755 /* fall through */
252b5132 8756
7619e7c7 8757 case R_PPC_ADDR24:
7619e7c7
AM
8758 case R_PPC_ADDR14:
8759 case R_PPC_ADDR14_BRTAKEN:
8760 case R_PPC_ADDR14_BRNTAKEN:
0e1862bb 8761 if (h != NULL && !bfd_link_pic (info))
625af618
AM
8762 break;
8763 /* fall through */
8764
7619e7c7 8765 dodyn:
3348747a
NS
8766 if ((input_section->flags & SEC_ALLOC) == 0
8767 || is_vxworks_tls)
c87b5a93 8768 break;
c87b5a93 8769
287c7eaf
AM
8770 if (bfd_link_pic (info)
8771 ? ((h == NULL
8772 || ppc_elf_hash_entry (h)->dyn_relocs != NULL)
8773 && ((h != NULL && pc_dynrelocs (h))
8774 || must_be_dyn_reloc (info, r_type)))
8775 : (h != NULL
8776 && ppc_elf_hash_entry (h)->dyn_relocs != NULL))
252b5132 8777 {
0bb2d96a 8778 int skip;
f95f8542
AM
8779 bfd_byte *loc;
8780 asection *sreloc;
82e66161
AM
8781 long indx = 0;
8782
252b5132 8783#ifdef DEBUG
55fd94b0
AM
8784 fprintf (stderr, "ppc_elf_relocate_section needs to "
8785 "create relocation for %s\n",
70bccea4
AM
8786 (h && h->root.root.string
8787 ? h->root.root.string : "<unknown>"));
252b5132
RH
8788#endif
8789
8790 /* When generating a shared object, these relocations
70bccea4
AM
8791 are copied into the output file to be resolved at run
8792 time. */
0bb2d96a 8793 skip = 0;
5b914448
AM
8794 outrel.r_offset = _bfd_elf_section_offset (output_bfd, info,
8795 input_section,
8796 rel->r_offset);
0bb2d96a
JJ
8797 if (outrel.r_offset == (bfd_vma) -1
8798 || outrel.r_offset == (bfd_vma) -2)
8799 skip = (int) outrel.r_offset;
252b5132
RH
8800 outrel.r_offset += (input_section->output_section->vma
8801 + input_section->output_offset);
8802
8803 if (skip)
8804 memset (&outrel, 0, sizeof outrel);
21d68fcd 8805 else if (!SYMBOL_REFERENCES_LOCAL (info, h))
252b5132 8806 {
82e66161
AM
8807 indx = h->dynindx;
8808 BFD_ASSERT (indx != -1);
7619e7c7 8809 unresolved_reloc = FALSE;
82e66161 8810 outrel.r_info = ELF32_R_INFO (indx, r_type);
252b5132
RH
8811 outrel.r_addend = rel->r_addend;
8812 }
8813 else
8814 {
47388f4c
AM
8815 outrel.r_addend = relocation + rel->r_addend;
8816
25f23106 8817 if (r_type != R_PPC_ADDR32)
252b5132 8818 {
25f23106
AM
8819 if (ifunc != NULL)
8820 {
8821 /* If we get here when building a static
8822 executable, then the libc startup function
8823 responsible for applying indirect function
8824 relocations is going to complain about
8825 the reloc type.
8826 If we get here when building a dynamic
8827 executable, it will be because we have
8828 a text relocation. The dynamic loader
8829 will set the text segment writable and
8830 non-executable to apply text relocations.
8831 So we'll segfault when trying to run the
8832 indirection function to resolve the reloc. */
25f53a85 8833 info->callbacks->einfo
695344c0 8834 /* xgettext:c-format */
174d0a74 8835 (_("%H: relocation %s for indirect "
25f53a85
AM
8836 "function %s unsupported\n"),
8837 input_bfd, input_section, rel->r_offset,
25f23106
AM
8838 howto->name,
8839 sym_name);
8840 ret = FALSE;
8841 }
cf35638d 8842 else if (r_symndx == STN_UNDEF || bfd_is_abs_section (sec))
89200bf8 8843 ;
252b5132
RH
8844 else if (sec == NULL || sec->owner == NULL)
8845 {
8846 bfd_set_error (bfd_error_bad_value);
89200bf8 8847 ret = FALSE;
252b5132
RH
8848 }
8849 else
8850 {
8851 asection *osec;
8852
47388f4c
AM
8853 /* We are turning this relocation into one
8854 against a section symbol. It would be
8855 proper to subtract the symbol's value,
8856 osec->vma, from the emitted reloc addend,
25f23106
AM
8857 but ld.so expects buggy relocs.
8858 FIXME: Why not always use a zero index? */
252b5132
RH
8859 osec = sec->output_section;
8860 indx = elf_section_data (osec)->dynindx;
74541ad4
AM
8861 if (indx == 0)
8862 {
8863 osec = htab->elf.text_index_section;
8864 indx = elf_section_data (osec)->dynindx;
8865 }
8866 BFD_ASSERT (indx != 0);
252b5132 8867#ifdef DEBUG
74541ad4 8868 if (indx == 0)
e460dd0d 8869 printf ("indx=%ld section=%s flags=%08x name=%s\n",
55fd94b0
AM
8870 indx, osec->name, osec->flags,
8871 h->root.root.string);
252b5132
RH
8872#endif
8873 }
8874
8875 outrel.r_info = ELF32_R_INFO (indx, r_type);
252b5132 8876 }
25f23106
AM
8877 else if (ifunc != NULL)
8878 outrel.r_info = ELF32_R_INFO (0, R_PPC_IRELATIVE);
8879 else
8880 outrel.r_info = ELF32_R_INFO (0, R_PPC_RELATIVE);
252b5132
RH
8881 }
8882
82e66161
AM
8883 sreloc = elf_section_data (input_section)->sreloc;
8884 if (ifunc)
8885 {
8886 sreloc = htab->elf.irelplt;
8887 if (indx == 0)
8888 htab->local_ifunc_resolver = 1;
8889 else if (is_static_defined (h))
8890 htab->maybe_local_ifunc_resolver = 1;
8891 }
8892 if (sreloc == NULL)
8893 return FALSE;
8894
947216bf
AM
8895 loc = sreloc->contents;
8896 loc += sreloc->reloc_count++ * sizeof (Elf32_External_Rela);
8897 bfd_elf32_swap_reloca_out (output_bfd, &outrel, loc);
252b5132 8898
2243deae 8899 if (skip == -1)
c316a17c 8900 goto copy_reloc;
2243deae 8901
f0158f44
AM
8902 /* This reloc will be computed at runtime. Clear the memory
8903 so that it contains a predictable value for prelink. */
8904 if (!skip)
2243deae
L
8905 {
8906 relocation = howto->pc_relative ? outrel.r_offset : 0;
8907 addend = 0;
8908 break;
8909 }
252b5132 8910 }
252b5132
RH
8911 break;
8912
32af9f6e
AM
8913 case R_PPC_RELAX_PLT:
8914 case R_PPC_RELAX_PLTREL24:
de972ffa
AM
8915 if (h != NULL)
8916 {
32af9f6e
AM
8917 struct plt_entry *ent;
8918 bfd_vma got2_addend = 0;
8919
8920 if (r_type == R_PPC_RELAX_PLTREL24)
8921 {
0e1862bb 8922 if (bfd_link_pic (info))
32af9f6e
AM
8923 got2_addend = addend;
8924 addend = 0;
8925 }
8926 ent = find_plt_ent (&h->plt.plist, got2, got2_addend);
de972ffa
AM
8927 if (htab->plt_type == PLT_NEW)
8928 relocation = (htab->glink->output_section->vma
8929 + htab->glink->output_offset
8930 + ent->glink_offset);
8931 else
ce558b89
AM
8932 relocation = (htab->elf.splt->output_section->vma
8933 + htab->elf.splt->output_offset
de972ffa
AM
8934 + ent->plt.offset);
8935 }
1a0670f3 8936 /* Fall through. */
b4a38de6 8937
32af9f6e 8938 case R_PPC_RELAX:
9abc968f 8939 {
53291d1f
AM
8940 const int *stub;
8941 size_t size;
8942 size_t insn_offset = rel->r_offset;
8943 unsigned int insn;
9abc968f 8944
0e1862bb 8945 if (bfd_link_pic (info))
53291d1f
AM
8946 {
8947 relocation -= (input_section->output_section->vma
8948 + input_section->output_offset
8949 + rel->r_offset - 4);
8950 stub = shared_stub_entry;
95f0d0d2
AM
8951 bfd_put_32 (input_bfd, stub[0], contents + insn_offset - 12);
8952 bfd_put_32 (input_bfd, stub[1], contents + insn_offset - 8);
8953 bfd_put_32 (input_bfd, stub[2], contents + insn_offset - 4);
53291d1f
AM
8954 stub += 3;
8955 size = ARRAY_SIZE (shared_stub_entry) - 3;
8956 }
8957 else
8958 {
8959 stub = stub_entry;
8960 size = ARRAY_SIZE (stub_entry);
8961 }
9abc968f 8962
9abc968f 8963 relocation += addend;
0e1862bb 8964 if (bfd_link_relocatable (info))
53291d1f
AM
8965 relocation = 0;
8966
8967 /* First insn is HA, second is LO. */
8968 insn = *stub++;
8969 insn |= ((relocation + 0x8000) >> 16) & 0xffff;
95f0d0d2 8970 bfd_put_32 (input_bfd, insn, contents + insn_offset);
53291d1f
AM
8971 insn_offset += 4;
8972
8973 insn = *stub++;
8974 insn |= relocation & 0xffff;
95f0d0d2 8975 bfd_put_32 (input_bfd, insn, contents + insn_offset);
53291d1f
AM
8976 insn_offset += 4;
8977 size -= 2;
8978
8979 while (size != 0)
8980 {
8981 insn = *stub++;
8982 --size;
95f0d0d2 8983 bfd_put_32 (input_bfd, insn, contents + insn_offset);
53291d1f
AM
8984 insn_offset += 4;
8985 }
9bc4e62b
NS
8986
8987 /* Rewrite the reloc and convert one of the trailing nop
8988 relocs to describe this relocation. */
8989 BFD_ASSERT (ELF32_R_TYPE (relend[-1].r_info) == R_PPC_NONE);
8990 /* The relocs are at the bottom 2 bytes */
c316a17c
AM
8991 wrel->r_offset = rel->r_offset + d_offset;
8992 wrel->r_info = ELF32_R_INFO (r_symndx, R_PPC_ADDR16_HA);
8993 wrel->r_addend = rel->r_addend;
8994 memmove (wrel + 1, wrel, (relend - wrel - 1) * sizeof (*wrel));
8995 wrel++, rel++;
8996 wrel->r_offset += 4;
8997 wrel->r_info = ELF32_R_INFO (r_symndx, R_PPC_ADDR16_LO);
9abc968f 8998 }
8517fae7 8999 continue;
deaaf2f3 9000
70bccea4 9001 /* Indirect .sdata relocation. */
7619e7c7 9002 case R_PPC_EMB_SDAI16:
c9a2f333 9003 BFD_ASSERT (htab->sdata[0].section != NULL);
bd6c6e2b
AM
9004 if (!is_static_defined (htab->sdata[0].sym))
9005 {
9006 unresolved_reloc = TRUE;
9007 break;
9008 }
7619e7c7 9009 relocation
76750a2f
AM
9010 = elf_finish_pointer_linker_section (input_bfd, &htab->sdata[0],
9011 h, relocation, rel);
bd6c6e2b 9012 addend = 0;
252b5132
RH
9013 break;
9014
70bccea4 9015 /* Indirect .sdata2 relocation. */
7619e7c7 9016 case R_PPC_EMB_SDA2I16:
c9a2f333 9017 BFD_ASSERT (htab->sdata[1].section != NULL);
bd6c6e2b
AM
9018 if (!is_static_defined (htab->sdata[1].sym))
9019 {
9020 unresolved_reloc = TRUE;
9021 break;
9022 }
7619e7c7 9023 relocation
76750a2f
AM
9024 = elf_finish_pointer_linker_section (input_bfd, &htab->sdata[1],
9025 h, relocation, rel);
bd6c6e2b 9026 addend = 0;
252b5132
RH
9027 break;
9028
70bccea4
AM
9029 /* Handle the TOC16 reloc. We want to use the offset within the .got
9030 section, not the actual VMA. This is appropriate when generating
9031 an embedded ELF object, for which the .got section acts like the
9032 AIX .toc section. */
7619e7c7 9033 case R_PPC_TOC16: /* phony GOT16 relocations */
3b4f3a11
AM
9034 if (sec == NULL || sec->output_section == NULL)
9035 {
9036 unresolved_reloc = TRUE;
9037 break;
9038 }
a0f49396
NC
9039 BFD_ASSERT (strcmp (bfd_get_section_name (sec->owner, sec),
9040 ".got") == 0
9041 || strcmp (bfd_get_section_name (sec->owner, sec),
9042 ".cgot") == 0);
252b5132 9043
3b4f3a11 9044 addend -= sec->output_section->vma + sec->output_offset + 0x8000;
252b5132
RH
9045 break;
9046
7619e7c7 9047 case R_PPC_PLTREL24:
f75e0e33
AM
9048 if (h != NULL && ifunc == NULL)
9049 {
cbf95972
AM
9050 struct plt_entry *ent;
9051
9052 ent = find_plt_ent (&h->plt.plist, got2,
9053 bfd_link_pic (info) ? addend : 0);
f75e0e33 9054 if (ent == NULL
ce558b89 9055 || htab->elf.splt == NULL)
f75e0e33
AM
9056 {
9057 /* We didn't make a PLT entry for this symbol. This
9058 happens when statically linking PIC code, or when
9059 using -Bsymbolic. */
9060 }
9061 else
9062 {
9063 /* Relocation is to the entry for this symbol in the
9064 procedure linkage table. */
9065 unresolved_reloc = FALSE;
9066 if (htab->plt_type == PLT_NEW)
9067 relocation = (htab->glink->output_section->vma
9068 + htab->glink->output_offset
9069 + ent->glink_offset);
9070 else
ce558b89
AM
9071 relocation = (htab->elf.splt->output_section->vma
9072 + htab->elf.splt->output_offset
f75e0e33
AM
9073 + ent->plt.offset);
9074 }
9075 }
252b5132 9076
f75e0e33
AM
9077 /* R_PPC_PLTREL24 is rather special. If non-zero, the
9078 addend specifies the GOT pointer offset within .got2.
9079 Don't apply it to the relocation field. */
9080 addend = 0;
8da6118f 9081 break;
252b5132 9082
70bccea4 9083 /* Relocate against _SDA_BASE_. */
7619e7c7 9084 case R_PPC_SDAREL16:
252b5132
RH
9085 {
9086 const char *name;
bd6c6e2b 9087 struct elf_link_hash_entry *sda = htab->sdata[0].sym;
252b5132 9088
bd6c6e2b
AM
9089 if (sec == NULL
9090 || sec->output_section == NULL
9091 || !is_static_defined (sda))
3b4f3a11
AM
9092 {
9093 unresolved_reloc = TRUE;
9094 break;
9095 }
bd6c6e2b 9096 addend -= SYM_VAL (sda);
3b4f3a11 9097
a0f49396 9098 name = bfd_get_section_name (output_bfd, sec->output_section);
93d1b056
AM
9099 if (!(strcmp (name, ".sdata") == 0
9100 || strcmp (name, ".sbss") == 0))
252b5132 9101 {
25f53a85 9102 info->callbacks->einfo
695344c0 9103 /* xgettext:c-format */
871b3ab2 9104 (_("%P: %pB: the target (%s) of a %s relocation is "
25f53a85 9105 "in the wrong output section (%s)\n"),
d003868e 9106 input_bfd,
55fd94b0
AM
9107 sym_name,
9108 howto->name,
9109 name);
252b5132 9110 }
252b5132
RH
9111 }
9112 break;
9113
70bccea4 9114 /* Relocate against _SDA2_BASE_. */
7619e7c7 9115 case R_PPC_EMB_SDA2REL:
252b5132
RH
9116 {
9117 const char *name;
bd6c6e2b 9118 struct elf_link_hash_entry *sda = htab->sdata[1].sym;
252b5132 9119
bd6c6e2b
AM
9120 if (sec == NULL
9121 || sec->output_section == NULL
9122 || !is_static_defined (sda))
3b4f3a11
AM
9123 {
9124 unresolved_reloc = TRUE;
9125 break;
9126 }
bd6c6e2b 9127 addend -= SYM_VAL (sda);
3b4f3a11 9128
a0f49396 9129 name = bfd_get_section_name (output_bfd, sec->output_section);
93d1b056
AM
9130 if (!(strcmp (name, ".sdata2") == 0
9131 || strcmp (name, ".sbss2") == 0))
252b5132 9132 {
25f53a85 9133 info->callbacks->einfo
695344c0 9134 /* xgettext:c-format */
871b3ab2 9135 (_("%P: %pB: the target (%s) of a %s relocation is "
25f53a85 9136 "in the wrong output section (%s)\n"),
d003868e 9137 input_bfd,
55fd94b0
AM
9138 sym_name,
9139 howto->name,
9140 name);
252b5132 9141 }
252b5132
RH
9142 }
9143 break;
9144
b9c361e0 9145 case R_PPC_VLE_LO16A:
86c95733 9146 relocation = relocation + addend;
08dc996f
AM
9147 ppc_elf_vle_split16 (input_bfd, input_section, rel->r_offset,
9148 contents + rel->r_offset, relocation,
9149 split16a_type, htab->params->vle_reloc_fixup);
c316a17c 9150 goto copy_reloc;
b9c361e0
JL
9151
9152 case R_PPC_VLE_LO16D:
86c95733 9153 relocation = relocation + addend;
08dc996f
AM
9154 ppc_elf_vle_split16 (input_bfd, input_section, rel->r_offset,
9155 contents + rel->r_offset, relocation,
9156 split16d_type, htab->params->vle_reloc_fixup);
c316a17c 9157 goto copy_reloc;
b9c361e0
JL
9158
9159 case R_PPC_VLE_HI16A:
86c95733 9160 relocation = (relocation + addend) >> 16;
08dc996f
AM
9161 ppc_elf_vle_split16 (input_bfd, input_section, rel->r_offset,
9162 contents + rel->r_offset, relocation,
9163 split16a_type, htab->params->vle_reloc_fixup);
c316a17c 9164 goto copy_reloc;
b9c361e0
JL
9165
9166 case R_PPC_VLE_HI16D:
86c95733 9167 relocation = (relocation + addend) >> 16;
08dc996f
AM
9168 ppc_elf_vle_split16 (input_bfd, input_section, rel->r_offset,
9169 contents + rel->r_offset, relocation,
9170 split16d_type, htab->params->vle_reloc_fixup);
c316a17c 9171 goto copy_reloc;
b9c361e0
JL
9172
9173 case R_PPC_VLE_HA16A:
86c95733 9174 relocation = (relocation + addend + 0x8000) >> 16;
08dc996f
AM
9175 ppc_elf_vle_split16 (input_bfd, input_section, rel->r_offset,
9176 contents + rel->r_offset, relocation,
9177 split16a_type, htab->params->vle_reloc_fixup);
c316a17c 9178 goto copy_reloc;
b9c361e0
JL
9179
9180 case R_PPC_VLE_HA16D:
86c95733 9181 relocation = (relocation + addend + 0x8000) >> 16;
08dc996f
AM
9182 ppc_elf_vle_split16 (input_bfd, input_section, rel->r_offset,
9183 contents + rel->r_offset, relocation,
9184 split16d_type, htab->params->vle_reloc_fixup);
c316a17c 9185 goto copy_reloc;
b9c361e0 9186
70bccea4 9187 /* Relocate against either _SDA_BASE_, _SDA2_BASE_, or 0. */
7619e7c7 9188 case R_PPC_EMB_SDA21:
b9c361e0 9189 case R_PPC_VLE_SDA21:
7619e7c7 9190 case R_PPC_EMB_RELSDA:
b9c361e0 9191 case R_PPC_VLE_SDA21_LO:
252b5132
RH
9192 {
9193 const char *name;
9194 int reg;
86c95733 9195 unsigned int insn;
bd6c6e2b 9196 struct elf_link_hash_entry *sda = NULL;
252b5132 9197
3b4f3a11
AM
9198 if (sec == NULL || sec->output_section == NULL)
9199 {
9200 unresolved_reloc = TRUE;
9201 break;
9202 }
9203
a0f49396 9204 name = bfd_get_section_name (output_bfd, sec->output_section);
93d1b056
AM
9205 if (strcmp (name, ".sdata") == 0
9206 || strcmp (name, ".sbss") == 0)
252b5132
RH
9207 {
9208 reg = 13;
bd6c6e2b 9209 sda = htab->sdata[0].sym;
252b5132 9210 }
93d1b056
AM
9211 else if (strcmp (name, ".sdata2") == 0
9212 || strcmp (name, ".sbss2") == 0)
252b5132
RH
9213 {
9214 reg = 2;
bd6c6e2b 9215 sda = htab->sdata[1].sym;
252b5132 9216 }
8da6118f
KH
9217 else if (strcmp (name, ".PPC.EMB.sdata0") == 0
9218 || strcmp (name, ".PPC.EMB.sbss0") == 0)
252b5132
RH
9219 {
9220 reg = 0;
9221 }
252b5132
RH
9222 else
9223 {
25f53a85 9224 info->callbacks->einfo
695344c0 9225 /* xgettext:c-format */
871b3ab2 9226 (_("%P: %pB: the target (%s) of a %s relocation is "
25f53a85 9227 "in the wrong output section (%s)\n"),
d003868e 9228 input_bfd,
55fd94b0
AM
9229 sym_name,
9230 howto->name,
9231 name);
252b5132
RH
9232
9233 bfd_set_error (bfd_error_bad_value);
b34976b6 9234 ret = FALSE;
c316a17c 9235 goto copy_reloc;
252b5132
RH
9236 }
9237
bd6c6e2b
AM
9238 if (sda != NULL)
9239 {
9240 if (!is_static_defined (sda))
9241 {
9242 unresolved_reloc = TRUE;
9243 break;
9244 }
9245 addend -= SYM_VAL (sda);
9246 }
9247
95f0d0d2 9248 insn = bfd_get_32 (input_bfd, contents + rel->r_offset);
b9c361e0
JL
9249 if (reg == 0
9250 && (r_type == R_PPC_VLE_SDA21
9251 || r_type == R_PPC_VLE_SDA21_LO))
9252 {
86c95733
AM
9253 relocation = relocation + addend;
9254 addend = 0;
9255
9256 /* Force e_li insn, keeping RT from original insn. */
9257 insn &= 0x1f << 21;
9258 insn |= 28u << 26;
9259
9260 /* We have an li20 field, bits 17..20, 11..15, 21..31. */
9261 /* Top 4 bits of value to 17..20. */
9262 insn |= (relocation & 0xf0000) >> 5;
9263 /* Next 5 bits of the value to 11..15. */
9264 insn |= (relocation & 0xf800) << 5;
9265 /* And the final 11 bits of the value to bits 21 to 31. */
9266 insn |= relocation & 0x7ff;
9267
95f0d0d2 9268 bfd_put_32 (input_bfd, insn, contents + rel->r_offset);
c3301df1
AM
9269
9270 if (r_type == R_PPC_VLE_SDA21
9271 && ((relocation + 0x80000) & 0xffffffff) > 0x100000)
9272 goto overflow;
c316a17c 9273 goto copy_reloc;
b9c361e0
JL
9274 }
9275 else if (r_type == R_PPC_EMB_SDA21
9276 || r_type == R_PPC_VLE_SDA21
9277 || r_type == R_PPC_VLE_SDA21_LO)
91d6fa6a 9278 {
86c95733 9279 /* Fill in register field. */
252b5132 9280 insn = (insn & ~RA_REGISTER_MASK) | (reg << RA_REGISTER_SHIFT);
252b5132 9281 }
95f0d0d2 9282 bfd_put_32 (input_bfd, insn, contents + rel->r_offset);
252b5132
RH
9283 }
9284 break;
9285
b9c361e0
JL
9286 case R_PPC_VLE_SDAREL_LO16A:
9287 case R_PPC_VLE_SDAREL_LO16D:
9288 case R_PPC_VLE_SDAREL_HI16A:
9289 case R_PPC_VLE_SDAREL_HI16D:
9290 case R_PPC_VLE_SDAREL_HA16A:
9291 case R_PPC_VLE_SDAREL_HA16D:
9292 {
9293 bfd_vma value;
9294 const char *name;
b9c361e0
JL
9295 struct elf_link_hash_entry *sda = NULL;
9296
9297 if (sec == NULL || sec->output_section == NULL)
9298 {
9299 unresolved_reloc = TRUE;
9300 break;
9301 }
9302
a0f49396 9303 name = bfd_get_section_name (output_bfd, sec->output_section);
93d1b056
AM
9304 if (strcmp (name, ".sdata") == 0
9305 || strcmp (name, ".sbss") == 0)
5499c7c7 9306 sda = htab->sdata[0].sym;
93d1b056
AM
9307 else if (strcmp (name, ".sdata2") == 0
9308 || strcmp (name, ".sbss2") == 0)
5499c7c7 9309 sda = htab->sdata[1].sym;
b9c361e0
JL
9310 else
9311 {
4eca0228 9312 _bfd_error_handler
695344c0 9313 /* xgettext:c-format */
871b3ab2 9314 (_("%pB: the target (%s) of a %s relocation is "
b9c361e0
JL
9315 "in the wrong output section (%s)"),
9316 input_bfd,
9317 sym_name,
9318 howto->name,
9319 name);
9320
9321 bfd_set_error (bfd_error_bad_value);
9322 ret = FALSE;
c316a17c 9323 goto copy_reloc;
b9c361e0
JL
9324 }
9325
5499c7c7 9326 if (sda == NULL || !is_static_defined (sda))
b9c361e0 9327 {
5499c7c7
AM
9328 unresolved_reloc = TRUE;
9329 break;
b9c361e0 9330 }
5499c7c7 9331 value = relocation + addend - SYM_VAL (sda);
86c95733
AM
9332
9333 if (r_type == R_PPC_VLE_SDAREL_LO16A)
08dc996f
AM
9334 ppc_elf_vle_split16 (input_bfd, input_section, rel->r_offset,
9335 contents + rel->r_offset, value,
9336 split16a_type,
9337 htab->params->vle_reloc_fixup);
86c95733 9338 else if (r_type == R_PPC_VLE_SDAREL_LO16D)
08dc996f
AM
9339 ppc_elf_vle_split16 (input_bfd, input_section, rel->r_offset,
9340 contents + rel->r_offset, value,
9341 split16d_type,
9342 htab->params->vle_reloc_fixup);
86c95733 9343 else if (r_type == R_PPC_VLE_SDAREL_HI16A)
b9c361e0 9344 {
86c95733 9345 value = value >> 16;
08dc996f
AM
9346 ppc_elf_vle_split16 (input_bfd, input_section, rel->r_offset,
9347 contents + rel->r_offset, value,
9348 split16a_type,
9349 htab->params->vle_reloc_fixup);
b9c361e0 9350 }
86c95733 9351 else if (r_type == R_PPC_VLE_SDAREL_HI16D)
b9c361e0 9352 {
86c95733 9353 value = value >> 16;
08dc996f
AM
9354 ppc_elf_vle_split16 (input_bfd, input_section, rel->r_offset,
9355 contents + rel->r_offset, value,
9356 split16d_type,
9357 htab->params->vle_reloc_fixup);
b9c361e0 9358 }
86c95733 9359 else if (r_type == R_PPC_VLE_SDAREL_HA16A)
b9c361e0 9360 {
86c95733 9361 value = (value + 0x8000) >> 16;
08dc996f
AM
9362 ppc_elf_vle_split16 (input_bfd, input_section, rel->r_offset,
9363 contents + rel->r_offset, value,
9364 split16a_type,
9365 htab->params->vle_reloc_fixup);
b9c361e0 9366 }
86c95733 9367 else if (r_type == R_PPC_VLE_SDAREL_HA16D)
b9c361e0 9368 {
86c95733 9369 value = (value + 0x8000) >> 16;
08dc996f
AM
9370 ppc_elf_vle_split16 (input_bfd, input_section, rel->r_offset,
9371 contents + rel->r_offset, value,
9372 split16d_type,
9373 htab->params->vle_reloc_fixup);
b9c361e0
JL
9374 }
9375 }
c316a17c 9376 goto copy_reloc;
b9c361e0 9377
83eef883
AFB
9378 case R_PPC_VLE_ADDR20:
9379 ppc_elf_vle_split20 (output_bfd, contents + rel->r_offset, relocation);
9380 continue;
9381
70bccea4 9382 /* Relocate against the beginning of the section. */
7619e7c7
AM
9383 case R_PPC_SECTOFF:
9384 case R_PPC_SECTOFF_LO:
9385 case R_PPC_SECTOFF_HI:
9386 case R_PPC_SECTOFF_HA:
3b4f3a11
AM
9387 if (sec == NULL || sec->output_section == NULL)
9388 {
9389 unresolved_reloc = TRUE;
9390 break;
9391 }
252b5132 9392 addend -= sec->output_section->vma;
252b5132
RH
9393 break;
9394
70bccea4 9395 /* Negative relocations. */
7619e7c7
AM
9396 case R_PPC_EMB_NADDR32:
9397 case R_PPC_EMB_NADDR16:
9398 case R_PPC_EMB_NADDR16_LO:
9399 case R_PPC_EMB_NADDR16_HI:
9400 case R_PPC_EMB_NADDR16_HA:
8da6118f 9401 addend -= 2 * relocation;
252b5132
RH
9402 break;
9403
7619e7c7
AM
9404 case R_PPC_COPY:
9405 case R_PPC_GLOB_DAT:
9406 case R_PPC_JMP_SLOT:
9407 case R_PPC_RELATIVE:
e054468f 9408 case R_PPC_IRELATIVE:
7619e7c7
AM
9409 case R_PPC_PLT32:
9410 case R_PPC_PLTREL32:
9411 case R_PPC_PLT16_LO:
9412 case R_PPC_PLT16_HI:
9413 case R_PPC_PLT16_HA:
9414 case R_PPC_ADDR30:
9415 case R_PPC_EMB_RELSEC16:
9416 case R_PPC_EMB_RELST_LO:
9417 case R_PPC_EMB_RELST_HI:
9418 case R_PPC_EMB_RELST_HA:
9419 case R_PPC_EMB_BIT_FLD:
25f53a85 9420 info->callbacks->einfo
695344c0 9421 /* xgettext:c-format */
871b3ab2 9422 (_("%P: %pB: relocation %s is not yet supported for symbol %s\n"),
d003868e 9423 input_bfd,
7619e7c7
AM
9424 howto->name,
9425 sym_name);
252b5132
RH
9426
9427 bfd_set_error (bfd_error_invalid_operation);
b34976b6 9428 ret = FALSE;
c316a17c 9429 goto copy_reloc;
7619e7c7 9430 }
252b5132 9431
7619e7c7
AM
9432 /* Do any further special processing. */
9433 switch (r_type)
9434 {
9435 default:
9436 break;
9437
9438 case R_PPC_ADDR16_HA:
d7128ce4 9439 case R_PPC_REL16_HA:
a680de9a 9440 case R_PPC_REL16DX_HA:
7619e7c7
AM
9441 case R_PPC_SECTOFF_HA:
9442 case R_PPC_TPREL16_HA:
9443 case R_PPC_DTPREL16_HA:
7619e7c7
AM
9444 case R_PPC_EMB_NADDR16_HA:
9445 case R_PPC_EMB_RELST_HA:
9446 /* It's just possible that this symbol is a weak symbol
7b609f53 9447 that's not actually defined anywhere. In that case,
7619e7c7
AM
9448 'sec' would be NULL, and we should leave the symbol
9449 alone (it will be set to zero elsewhere in the link). */
5c5f6e17
AM
9450 if (sec == NULL)
9451 break;
1a0670f3 9452 /* Fall through. */
5c5f6e17
AM
9453
9454 case R_PPC_PLT16_HA:
9455 case R_PPC_GOT16_HA:
9456 case R_PPC_GOT_TLSGD16_HA:
9457 case R_PPC_GOT_TLSLD16_HA:
9458 case R_PPC_GOT_TPREL16_HA:
9459 case R_PPC_GOT_DTPREL16_HA:
9460 /* Add 0x10000 if sign bit in 0:15 is set.
9461 Bits 0:15 are not used. */
9462 addend += 0x8000;
7619e7c7 9463 break;
1fe532cf
AM
9464
9465 case R_PPC_ADDR16:
9466 case R_PPC_ADDR16_LO:
9467 case R_PPC_GOT16:
9468 case R_PPC_GOT16_LO:
9469 case R_PPC_SDAREL16:
9470 case R_PPC_SECTOFF:
9471 case R_PPC_SECTOFF_LO:
9472 case R_PPC_DTPREL16:
9473 case R_PPC_DTPREL16_LO:
9474 case R_PPC_TPREL16:
9475 case R_PPC_TPREL16_LO:
9476 case R_PPC_GOT_TLSGD16:
9477 case R_PPC_GOT_TLSGD16_LO:
9478 case R_PPC_GOT_TLSLD16:
9479 case R_PPC_GOT_TLSLD16_LO:
9480 case R_PPC_GOT_DTPREL16:
9481 case R_PPC_GOT_DTPREL16_LO:
9482 case R_PPC_GOT_TPREL16:
9483 case R_PPC_GOT_TPREL16_LO:
9484 {
9485 /* The 32-bit ABI lacks proper relocations to deal with
9486 certain 64-bit instructions. Prevent damage to bits
9487 that make up part of the insn opcode. */
9488 unsigned int insn, mask, lobit;
9489
95f0d0d2 9490 insn = bfd_get_32 (input_bfd,
c316a17c 9491 contents + rel->r_offset - d_offset);
1fe532cf
AM
9492 mask = 0;
9493 if (is_insn_ds_form (insn))
9494 mask = 3;
9495 else if (is_insn_dq_form (insn))
9496 mask = 15;
9497 else
9498 break;
a680de9a
PB
9499 relocation += addend;
9500 addend = insn & mask;
9501 lobit = mask & relocation;
1fe532cf
AM
9502 if (lobit != 0)
9503 {
a680de9a 9504 relocation ^= lobit;
1fe532cf 9505 info->callbacks->einfo
695344c0 9506 /* xgettext:c-format */
174d0a74 9507 (_("%H: error: %s against `%s' not a multiple of %u\n"),
1fe532cf
AM
9508 input_bfd, input_section, rel->r_offset,
9509 howto->name, sym_name, mask + 1);
9510 bfd_set_error (bfd_error_bad_value);
9511 ret = FALSE;
9512 }
1fe532cf
AM
9513 }
9514 break;
252b5132
RH
9515 }
9516
252b5132 9517#ifdef DEBUG
55fd94b0
AM
9518 fprintf (stderr, "\ttype = %s (%d), name = %s, symbol index = %ld, "
9519 "offset = %ld, addend = %ld\n",
252b5132 9520 howto->name,
8da6118f 9521 (int) r_type,
252b5132
RH
9522 sym_name,
9523 r_symndx,
7619e7c7 9524 (long) rel->r_offset,
8da6118f 9525 (long) addend);
252b5132
RH
9526#endif
9527
7619e7c7
AM
9528 if (unresolved_reloc
9529 && !((input_section->flags & SEC_DEBUGGING) != 0
1d5316ab
AM
9530 && h->def_dynamic)
9531 && _bfd_elf_section_offset (output_bfd, info, input_section,
9532 rel->r_offset) != (bfd_vma) -1)
7619e7c7 9533 {
25f53a85 9534 info->callbacks->einfo
695344c0 9535 /* xgettext:c-format */
174d0a74 9536 (_("%H: unresolvable %s relocation against symbol `%s'\n"),
25f53a85 9537 input_bfd, input_section, rel->r_offset,
7b609f53 9538 howto->name,
7619e7c7
AM
9539 sym_name);
9540 ret = FALSE;
9541 }
9542
86c95733
AM
9543 /* 16-bit fields in insns mostly have signed values, but a
9544 few insns have 16-bit unsigned values. Really, we should
9545 have different reloc types. */
9546 if (howto->complain_on_overflow != complain_overflow_dont
9547 && howto->dst_mask == 0xffff
9548 && (input_section->flags & SEC_CODE) != 0)
9549 {
9550 enum complain_overflow complain = complain_overflow_signed;
9551
9552 if ((elf_section_flags (input_section) & SHF_PPC_VLE) == 0)
9553 {
9554 unsigned int insn;
9555
9556 insn = bfd_get_32 (input_bfd, contents + (rel->r_offset & ~3));
a47622ac
AM
9557 if ((insn & (0x3f << 26)) == 10u << 26 /* cmpli */)
9558 complain = complain_overflow_bitfield;
9559 else if ((insn & (0x3f << 26)) == 28u << 26 /* andi */
9560 || (insn & (0x3f << 26)) == 24u << 26 /* ori */
9561 || (insn & (0x3f << 26)) == 26u << 26 /* xori */)
86c95733
AM
9562 complain = complain_overflow_unsigned;
9563 }
9564 if (howto->complain_on_overflow != complain)
9565 {
9566 alt_howto = *howto;
9567 alt_howto.complain_on_overflow = complain;
9568 howto = &alt_howto;
9569 }
9570 }
9571
a680de9a
PB
9572 if (r_type == R_PPC_REL16DX_HA)
9573 {
9574 /* Split field reloc isn't handled by _bfd_final_link_relocate. */
9575 if (rel->r_offset + 4 > input_section->size)
9576 r = bfd_reloc_outofrange;
9577 else
9578 {
9579 unsigned int insn;
9580
9581 relocation += addend;
9582 relocation -= (rel->r_offset
9583 + input_section->output_offset
9584 + input_section->output_section->vma);
9585 relocation >>= 16;
9586 insn = bfd_get_32 (input_bfd, contents + rel->r_offset);
9587 insn &= ~0x1fffc1;
9588 insn |= (relocation & 0xffc1) | ((relocation & 0x3e) << 15);
9589 bfd_put_32 (input_bfd, insn, contents + rel->r_offset);
9590 r = bfd_reloc_ok;
9591 }
9592 }
9593 else
9594 r = _bfd_final_link_relocate (howto, input_bfd, input_section, contents,
9595 rel->r_offset, relocation, addend);
252b5132 9596
7619e7c7 9597 if (r != bfd_reloc_ok)
252b5132 9598 {
7619e7c7 9599 if (r == bfd_reloc_overflow)
252b5132 9600 {
c3301df1 9601 overflow:
8131c122
AM
9602 /* On code like "if (foo) foo();" don't report overflow
9603 on a branch to zero when foo is undefined. */
9604 if (!warned
9605 && !(h != NULL
9606 && (h->root.type == bfd_link_hash_undefweak
9607 || h->root.type == bfd_link_hash_undefined)
9608 && is_branch_reloc (r_type)))
1a72702b
AM
9609 info->callbacks->reloc_overflow
9610 (info, (h ? &h->root : NULL), sym_name, howto->name,
9611 rel->r_addend, input_bfd, input_section, rel->r_offset);
dc1bc0c9
RH
9612 }
9613 else
9614 {
25f53a85 9615 info->callbacks->einfo
695344c0 9616 /* xgettext:c-format */
174d0a74 9617 (_("%H: %s reloc against `%s': error %d\n"),
25f53a85
AM
9618 input_bfd, input_section, rel->r_offset,
9619 howto->name, sym_name, (int) r);
7619e7c7 9620 ret = FALSE;
252b5132
RH
9621 }
9622 }
c316a17c
AM
9623 copy_reloc:
9624 if (wrel != rel)
9625 *wrel = *rel;
9626 }
9627
9628 if (wrel != rel)
9629 {
9630 Elf_Internal_Shdr *rel_hdr;
9631 size_t deleted = rel - wrel;
9632
9633 rel_hdr = _bfd_elf_single_rel_hdr (input_section->output_section);
9634 rel_hdr->sh_size -= rel_hdr->sh_entsize * deleted;
9635 if (rel_hdr->sh_size == 0)
9636 {
9637 /* It is too late to remove an empty reloc section. Leave
9638 one NONE reloc.
9639 ??? What is wrong with an empty section??? */
9640 rel_hdr->sh_size = rel_hdr->sh_entsize;
9641 deleted -= 1;
9642 wrel++;
9643 }
9644 relend = wrel;
9645 rel_hdr = _bfd_elf_single_rel_hdr (input_section);
9646 rel_hdr->sh_size -= rel_hdr->sh_entsize * deleted;
9647 input_section->reloc_count -= deleted;
252b5132
RH
9648 }
9649
252b5132
RH
9650#ifdef DEBUG
9651 fprintf (stderr, "\n");
9652#endif
9653
53291d1f
AM
9654 if (input_section->sec_info_type == SEC_INFO_TYPE_TARGET
9655 && input_section->size != input_section->rawsize
9656 && (strcmp (input_section->output_section->name, ".init") == 0
9657 || strcmp (input_section->output_section->name, ".fini") == 0))
9658 {
9659 /* Branch around the trampolines. */
9660 unsigned int insn = B + input_section->size - input_section->rawsize;
9661 bfd_put_32 (input_bfd, insn, contents + input_section->rawsize);
9662 }
9663
5446cbdf 9664 if (htab->params->ppc476_workaround
795bc6b3 9665 && input_section->sec_info_type == SEC_INFO_TYPE_TARGET
0e1862bb 9666 && (!bfd_link_relocatable (info)
795bc6b3
AM
9667 || (input_section->output_section->alignment_power
9668 >= htab->params->pagesize_p2)))
5446cbdf 9669 {
5446cbdf 9670 bfd_vma start_addr, end_addr, addr;
795bc6b3 9671 bfd_vma pagesize = (bfd_vma) 1 << htab->params->pagesize_p2;
5446cbdf 9672
5446cbdf 9673 if (relax_info->workaround_size != 0)
40fd06d1
AM
9674 {
9675 bfd_byte *p;
9676 unsigned int n;
9677 bfd_byte fill[4];
9678
9679 bfd_put_32 (input_bfd, BA, fill);
9680 p = contents + input_section->size - relax_info->workaround_size;
9681 n = relax_info->workaround_size >> 2;
9682 while (n--)
9683 {
9684 memcpy (p, fill, 4);
9685 p += 4;
9686 }
9687 }
5446cbdf
AM
9688
9689 /* The idea is: Replace the last instruction on a page with a
9690 branch to a patch area. Put the insn there followed by a
9691 branch back to the next page. Complicated a little by
9692 needing to handle moved conditional branches, and by not
9693 wanting to touch data-in-text. */
9694
9695 start_addr = (input_section->output_section->vma
9696 + input_section->output_offset);
9697 end_addr = (start_addr + input_section->size
9698 - relax_info->workaround_size);
9699 for (addr = ((start_addr & -pagesize) + pagesize - 4);
9700 addr < end_addr;
9701 addr += pagesize)
9702 {
9703 bfd_vma offset = addr - start_addr;
9704 Elf_Internal_Rela *lo, *hi;
9705 bfd_boolean is_data;
9706 bfd_vma patch_off, patch_addr;
9707 unsigned int insn;
9708
9709 /* Do we have a data reloc at this offset? If so, leave
9710 the word alone. */
9711 is_data = FALSE;
9712 lo = relocs;
668e22e5
AM
9713 hi = relend;
9714 rel = NULL;
5446cbdf
AM
9715 while (lo < hi)
9716 {
9717 rel = lo + (hi - lo) / 2;
9718 if (rel->r_offset < offset)
9719 lo = rel + 1;
668e22e5 9720 else if (rel->r_offset > offset + 3)
5446cbdf
AM
9721 hi = rel;
9722 else
9723 {
9724 switch (ELF32_R_TYPE (rel->r_info))
9725 {
9726 case R_PPC_ADDR32:
9727 case R_PPC_UADDR32:
9728 case R_PPC_REL32:
9729 case R_PPC_ADDR30:
9730 is_data = TRUE;
9731 break;
9732 default:
9733 break;
9734 }
9735 break;
9736 }
9737 }
9738 if (is_data)
9739 continue;
9740
b4ab4364
AM
9741 /* Some instructions can be left alone too. Unconditional
9742 branches, except for bcctr with BO=0x14 (bctr, bctrl),
9743 avoid the icache failure.
9744
9745 The problem occurs due to prefetch across a page boundary
9746 where stale instructions can be fetched from the next
9747 page, and the mechanism for flushing these bad
9748 instructions fails under certain circumstances. The
9749 unconditional branches:
9750 1) Branch: b, bl, ba, bla,
9751 2) Branch Conditional: bc, bca, bcl, bcla,
9752 3) Branch Conditional to Link Register: bclr, bclrl,
9753 where (2) and (3) have BO=0x14 making them unconditional,
9754 prevent the bad prefetch because the prefetch itself is
9755 affected by these instructions. This happens even if the
9756 instruction is not executed.
9757
9758 A bctr example:
9759 .
9760 . lis 9,new_page@ha
9761 . addi 9,9,new_page@l
9762 . mtctr 9
9763 . bctr
9764 . nop
9765 . nop
9766 . new_page:
9767 .
9768 The bctr is not predicted taken due to ctr not being
9769 ready, so prefetch continues on past the bctr into the
9770 new page which might have stale instructions. If they
9771 fail to be flushed, then they will be executed after the
9772 bctr executes. Either of the following modifications
9773 prevent the bad prefetch from happening in the first
9774 place:
9775 .
1b786873
L
9776 . lis 9,new_page@ha lis 9,new_page@ha
9777 . addi 9,9,new_page@l addi 9,9,new_page@l
9778 . mtctr 9 mtctr 9
9779 . bctr bctr
b4ab4364 9780 . nop b somewhere_else
1b786873
L
9781 . b somewhere_else nop
9782 . new_page: new_page:
b4ab4364 9783 . */
5446cbdf 9784 insn = bfd_get_32 (input_bfd, contents + offset);
07d6d2b8
AM
9785 if ((insn & (0x3f << 26)) == (18u << 26) /* b,bl,ba,bla */
9786 || ((insn & (0x3f << 26)) == (16u << 26) /* bc,bcl,bca,bcla*/
9787 && (insn & (0x14 << 21)) == (0x14 << 21)) /* with BO=0x14 */
5446cbdf 9788 || ((insn & (0x3f << 26)) == (19u << 26)
b4ab4364 9789 && (insn & (0x3ff << 1)) == (16u << 1) /* bclr,bclrl */
07d6d2b8 9790 && (insn & (0x14 << 21)) == (0x14 << 21)))/* with BO=0x14 */
5446cbdf
AM
9791 continue;
9792
9793 patch_addr = (start_addr + input_section->size
9794 - relax_info->workaround_size);
9795 patch_addr = (patch_addr + 15) & -16;
9796 patch_off = patch_addr - start_addr;
9797 bfd_put_32 (input_bfd, B + patch_off - offset, contents + offset);
668e22e5
AM
9798
9799 if (rel != NULL
9800 && rel->r_offset >= offset
9801 && rel->r_offset < offset + 4)
9802 {
f8b44781
AM
9803 asection *sreloc;
9804
668e22e5
AM
9805 /* If the insn we are patching had a reloc, adjust the
9806 reloc r_offset so that the reloc applies to the moved
9807 location. This matters for -r and --emit-relocs. */
9808 if (rel + 1 != relend)
9809 {
9810 Elf_Internal_Rela tmp = *rel;
9811
9812 /* Keep the relocs sorted by r_offset. */
9813 memmove (rel, rel + 1, (relend - (rel + 1)) * sizeof (*rel));
9814 relend[-1] = tmp;
9815 }
9816 relend[-1].r_offset += patch_off - offset;
f8b44781
AM
9817
9818 /* Adjust REL16 addends too. */
9819 switch (ELF32_R_TYPE (relend[-1].r_info))
9820 {
9821 case R_PPC_REL16:
9822 case R_PPC_REL16_LO:
9823 case R_PPC_REL16_HI:
9824 case R_PPC_REL16_HA:
9825 relend[-1].r_addend += patch_off - offset;
9826 break;
9827 default:
9828 break;
9829 }
9830
9831 /* If we are building a PIE or shared library with
9832 non-PIC objects, perhaps we had a dynamic reloc too?
9833 If so, the dynamic reloc must move with the insn. */
9834 sreloc = elf_section_data (input_section)->sreloc;
9835 if (sreloc != NULL)
9836 {
1d5c94cb 9837 Elf32_External_Rela *slo, *shi, *srelend;
f8b44781
AM
9838 bfd_vma soffset;
9839
1d5c94cb
AM
9840 slo = (Elf32_External_Rela *) sreloc->contents;
9841 shi = srelend = slo + sreloc->reloc_count;
f8b44781
AM
9842 soffset = (offset + input_section->output_section->vma
9843 + input_section->output_offset);
9844 while (slo < shi)
9845 {
1d5c94cb
AM
9846 Elf32_External_Rela *srel = slo + (shi - slo) / 2;
9847 bfd_elf32_swap_reloca_in (output_bfd, (bfd_byte *) srel,
9848 &outrel);
f8b44781
AM
9849 if (outrel.r_offset < soffset)
9850 slo = srel + 1;
9851 else if (outrel.r_offset > soffset + 3)
9852 shi = srel;
9853 else
9854 {
1d5c94cb 9855 if (srel + 1 != srelend)
f8b44781 9856 {
1d5c94cb
AM
9857 memmove (srel, srel + 1,
9858 (srelend - (srel + 1)) * sizeof (*srel));
9859 srel = srelend - 1;
f8b44781
AM
9860 }
9861 outrel.r_offset += patch_off - offset;
1d5c94cb
AM
9862 bfd_elf32_swap_reloca_out (output_bfd, &outrel,
9863 (bfd_byte *) srel);
f8b44781
AM
9864 break;
9865 }
9866 }
9867 }
668e22e5
AM
9868 }
9869 else
9870 rel = NULL;
9871
5446cbdf
AM
9872 if ((insn & (0x3f << 26)) == (16u << 26) /* bc */
9873 && (insn & 2) == 0 /* relative */)
9874 {
9875 bfd_vma delta = ((insn & 0xfffc) ^ 0x8000) - 0x8000;
9876
9877 delta += offset - patch_off;
0e1862bb 9878 if (bfd_link_relocatable (info) && rel != NULL)
668e22e5 9879 delta = 0;
0e1862bb 9880 if (!bfd_link_relocatable (info) && rel != NULL)
668e22e5
AM
9881 {
9882 enum elf_ppc_reloc_type r_type;
9883
9884 r_type = ELF32_R_TYPE (relend[-1].r_info);
9885 if (r_type == R_PPC_REL14_BRTAKEN)
9886 insn |= BRANCH_PREDICT_BIT;
9887 else if (r_type == R_PPC_REL14_BRNTAKEN)
9888 insn &= ~BRANCH_PREDICT_BIT;
9889 else
9890 BFD_ASSERT (r_type == R_PPC_REL14);
9891
9892 if ((r_type == R_PPC_REL14_BRTAKEN
9893 || r_type == R_PPC_REL14_BRNTAKEN)
9894 && delta + 0x8000 < 0x10000
9895 && (bfd_signed_vma) delta < 0)
9896 insn ^= BRANCH_PREDICT_BIT;
9897 }
5446cbdf
AM
9898 if (delta + 0x8000 < 0x10000)
9899 {
9900 bfd_put_32 (input_bfd,
9901 (insn & ~0xfffc) | (delta & 0xfffc),
9902 contents + patch_off);
9903 patch_off += 4;
9904 bfd_put_32 (input_bfd,
9905 B | ((offset + 4 - patch_off) & 0x3fffffc),
9906 contents + patch_off);
9907 patch_off += 4;
9908 }
9909 else
9910 {
668e22e5
AM
9911 if (rel != NULL)
9912 {
9913 unsigned int r_sym = ELF32_R_SYM (relend[-1].r_info);
9914
9915 relend[-1].r_offset += 8;
9916 relend[-1].r_info = ELF32_R_INFO (r_sym, R_PPC_REL24);
9917 }
5446cbdf
AM
9918 bfd_put_32 (input_bfd,
9919 (insn & ~0xfffc) | 8,
9920 contents + patch_off);
9921 patch_off += 4;
9922 bfd_put_32 (input_bfd,
9923 B | ((offset + 4 - patch_off) & 0x3fffffc),
9924 contents + patch_off);
9925 patch_off += 4;
9926 bfd_put_32 (input_bfd,
9927 B | ((delta - 8) & 0x3fffffc),
9928 contents + patch_off);
9929 patch_off += 4;
9930 }
9931 }
9932 else
9933 {
9934 bfd_put_32 (input_bfd, insn, contents + patch_off);
9935 patch_off += 4;
9936 bfd_put_32 (input_bfd,
9937 B | ((offset + 4 - patch_off) & 0x3fffffc),
9938 contents + patch_off);
9939 patch_off += 4;
9940 }
9941 BFD_ASSERT (patch_off <= input_section->size);
9942 relax_info->workaround_size = input_section->size - patch_off;
9943 }
9944 }
9945
252b5132
RH
9946 return ret;
9947}
252b5132 9948\f
25dbc73a
AM
9949/* Finish up dynamic symbol handling. We set the contents of various
9950 dynamic sections here. */
c5fccbec 9951
b34976b6 9952static bfd_boolean
25dbc73a
AM
9953ppc_elf_finish_dynamic_symbol (bfd *output_bfd,
9954 struct bfd_link_info *info,
9955 struct elf_link_hash_entry *h,
9956 Elf_Internal_Sym *sym)
e1a9cb8e 9957{
25dbc73a 9958 struct ppc_elf_link_hash_table *htab;
a6aa5195
AM
9959 struct plt_entry *ent;
9960 bfd_boolean doneone;
e1a9cb8e 9961
25dbc73a
AM
9962#ifdef DEBUG
9963 fprintf (stderr, "ppc_elf_finish_dynamic_symbol called for %s",
9964 h->root.root.string);
9965#endif
e1a9cb8e 9966
25dbc73a
AM
9967 htab = ppc_elf_hash_table (info);
9968 BFD_ASSERT (htab->elf.dynobj != NULL);
e1a9cb8e 9969
a6aa5195
AM
9970 doneone = FALSE;
9971 for (ent = h->plt.plist; ent != NULL; ent = ent->next)
9972 if (ent->plt.offset != (bfd_vma) -1)
9973 {
9974 if (!doneone)
9975 {
9976 Elf_Internal_Rela rela;
9977 bfd_byte *loc;
9978 bfd_vma reloc_index;
e1a9cb8e 9979
e054468f 9980 if (htab->plt_type == PLT_NEW
25f23106
AM
9981 || !htab->elf.dynamic_sections_created
9982 || h->dynindx == -1)
9d8504b1
PB
9983 reloc_index = ent->plt.offset / 4;
9984 else
9985 {
9986 reloc_index = ((ent->plt.offset - htab->plt_initial_entry_size)
9987 / htab->plt_slot_size);
9988 if (reloc_index > PLT_NUM_SINGLE_ENTRIES
4a3dc543 9989 && htab->plt_type == PLT_OLD)
9d8504b1
PB
9990 reloc_index -= (reloc_index - PLT_NUM_SINGLE_ENTRIES) / 2;
9991 }
9992
a6aa5195
AM
9993 /* This symbol has an entry in the procedure linkage table.
9994 Set it up. */
e054468f 9995 if (htab->plt_type == PLT_VXWORKS
25f23106
AM
9996 && htab->elf.dynamic_sections_created
9997 && h->dynindx != -1)
a6aa5195 9998 {
9d8504b1
PB
9999 bfd_vma got_offset;
10000 const bfd_vma *plt_entry;
5b914448 10001
9d8504b1
PB
10002 /* The first three entries in .got.plt are reserved. */
10003 got_offset = (reloc_index + 3) * 4;
10004
10005 /* Use the right PLT. */
0e1862bb 10006 plt_entry = bfd_link_pic (info) ? ppc_elf_vxworks_pic_plt_entry
9d8504b1
PB
10007 : ppc_elf_vxworks_plt_entry;
10008
10009 /* Fill in the .plt on VxWorks. */
0e1862bb 10010 if (bfd_link_pic (info))
9d8504b1 10011 {
9d8504b1 10012 bfd_put_32 (output_bfd,
e87d4038 10013 plt_entry[0] | PPC_HA (got_offset),
ce558b89 10014 htab->elf.splt->contents + ent->plt.offset + 0);
9d8504b1 10015 bfd_put_32 (output_bfd,
e87d4038 10016 plt_entry[1] | PPC_LO (got_offset),
ce558b89 10017 htab->elf.splt->contents + ent->plt.offset + 4);
9d8504b1
PB
10018 }
10019 else
10020 {
e87d4038 10021 bfd_vma got_loc = got_offset + SYM_VAL (htab->elf.hgot);
9d8504b1
PB
10022
10023 bfd_put_32 (output_bfd,
e87d4038 10024 plt_entry[0] | PPC_HA (got_loc),
ce558b89 10025 htab->elf.splt->contents + ent->plt.offset + 0);
9d8504b1 10026 bfd_put_32 (output_bfd,
e87d4038 10027 plt_entry[1] | PPC_LO (got_loc),
ce558b89 10028 htab->elf.splt->contents + ent->plt.offset + 4);
9d8504b1
PB
10029 }
10030
10031 bfd_put_32 (output_bfd, plt_entry[2],
ce558b89 10032 htab->elf.splt->contents + ent->plt.offset + 8);
9d8504b1 10033 bfd_put_32 (output_bfd, plt_entry[3],
ce558b89 10034 htab->elf.splt->contents + ent->plt.offset + 12);
9d8504b1
PB
10035
10036 /* This instruction is an immediate load. The value loaded is
10037 the byte offset of the R_PPC_JMP_SLOT relocation from the
10038 start of the .rela.plt section. The value is stored in the
10039 low-order 16 bits of the load instruction. */
10040 /* NOTE: It appears that this is now an index rather than a
10041 prescaled offset. */
5b914448 10042 bfd_put_32 (output_bfd,
9d8504b1 10043 plt_entry[4] | reloc_index,
ce558b89 10044 htab->elf.splt->contents + ent->plt.offset + 16);
9d8504b1
PB
10045 /* This instruction is a PC-relative branch whose target is
10046 the start of the PLT section. The address of this branch
10047 instruction is 20 bytes beyond the start of this PLT entry.
10048 The address is encoded in bits 6-29, inclusive. The value
10049 stored is right-shifted by two bits, permitting a 26-bit
10050 offset. */
5b914448
AM
10051 bfd_put_32 (output_bfd,
10052 (plt_entry[5]
9d8504b1 10053 | (-(ent->plt.offset + 20) & 0x03fffffc)),
ce558b89 10054 htab->elf.splt->contents + ent->plt.offset + 20);
9d8504b1 10055 bfd_put_32 (output_bfd, plt_entry[6],
ce558b89 10056 htab->elf.splt->contents + ent->plt.offset + 24);
9d8504b1 10057 bfd_put_32 (output_bfd, plt_entry[7],
ce558b89 10058 htab->elf.splt->contents + ent->plt.offset + 28);
9d8504b1
PB
10059
10060 /* Fill in the GOT entry corresponding to this PLT slot with
a8685210 10061 the address immediately after the "bctr" instruction
9d8504b1 10062 in this PLT entry. */
ce558b89
AM
10063 bfd_put_32 (output_bfd, (htab->elf.splt->output_section->vma
10064 + htab->elf.splt->output_offset
9d8504b1 10065 + ent->plt.offset + 16),
ce558b89 10066 htab->elf.sgotplt->contents + got_offset);
9d8504b1 10067
0e1862bb 10068 if (!bfd_link_pic (info))
9d8504b1
PB
10069 {
10070 /* Fill in a couple of entries in .rela.plt.unloaded. */
10071 loc = htab->srelplt2->contents
10072 + ((VXWORKS_PLTRESOLVE_RELOCS + reloc_index
10073 * VXWORKS_PLT_NON_JMP_SLOT_RELOCS)
10074 * sizeof (Elf32_External_Rela));
10075
10076 /* Provide the @ha relocation for the first instruction. */
ce558b89
AM
10077 rela.r_offset = (htab->elf.splt->output_section->vma
10078 + htab->elf.splt->output_offset
9d8504b1 10079 + ent->plt.offset + 2);
636ce3f5 10080 rela.r_info = ELF32_R_INFO (htab->elf.hgot->indx,
9d8504b1
PB
10081 R_PPC_ADDR16_HA);
10082 rela.r_addend = got_offset;
10083 bfd_elf32_swap_reloca_out (output_bfd, &rela, loc);
10084 loc += sizeof (Elf32_External_Rela);
10085
10086 /* Provide the @l relocation for the second instruction. */
ce558b89
AM
10087 rela.r_offset = (htab->elf.splt->output_section->vma
10088 + htab->elf.splt->output_offset
9d8504b1 10089 + ent->plt.offset + 6);
636ce3f5 10090 rela.r_info = ELF32_R_INFO (htab->elf.hgot->indx,
9d8504b1
PB
10091 R_PPC_ADDR16_LO);
10092 rela.r_addend = got_offset;
10093 bfd_elf32_swap_reloca_out (output_bfd, &rela, loc);
10094 loc += sizeof (Elf32_External_Rela);
10095
10096 /* Provide a relocation for the GOT entry corresponding to this
10097 PLT slot. Point it at the middle of the .plt entry. */
ce558b89
AM
10098 rela.r_offset = (htab->elf.sgotplt->output_section->vma
10099 + htab->elf.sgotplt->output_offset
9d8504b1 10100 + got_offset);
7325306f 10101 rela.r_info = ELF32_R_INFO (htab->elf.hplt->indx,
9d8504b1
PB
10102 R_PPC_ADDR32);
10103 rela.r_addend = ent->plt.offset + 16;
10104 bfd_elf32_swap_reloca_out (output_bfd, &rela, loc);
10105 }
10106
10107 /* VxWorks uses non-standard semantics for R_PPC_JMP_SLOT.
10108 In particular, the offset for the relocation is not the
10109 address of the PLT entry for this function, as specified
10110 by the ABI. Instead, the offset is set to the address of
10111 the GOT slot for this function. See EABI 4.4.4.1. */
ce558b89
AM
10112 rela.r_offset = (htab->elf.sgotplt->output_section->vma
10113 + htab->elf.sgotplt->output_offset
9d8504b1
PB
10114 + got_offset);
10115
a6aa5195
AM
10116 }
10117 else
10118 {
ce558b89 10119 asection *splt = htab->elf.splt;
25f23106
AM
10120 if (!htab->elf.dynamic_sections_created
10121 || h->dynindx == -1)
ce558b89 10122 splt = htab->elf.iplt;
e054468f
AM
10123
10124 rela.r_offset = (splt->output_section->vma
10125 + splt->output_offset
9d8504b1 10126 + ent->plt.offset);
e054468f 10127 if (htab->plt_type == PLT_OLD
25f23106
AM
10128 || !htab->elf.dynamic_sections_created
10129 || h->dynindx == -1)
9d8504b1
PB
10130 {
10131 /* We don't need to fill in the .plt. The ppc dynamic
10132 linker will fill it in. */
10133 }
10134 else
10135 {
10136 bfd_vma val = (htab->glink_pltresolve + ent->plt.offset
10137 + htab->glink->output_section->vma
10138 + htab->glink->output_offset);
10139 bfd_put_32 (output_bfd, val,
e054468f 10140 splt->contents + ent->plt.offset);
9d8504b1 10141 }
a6aa5195 10142 }
e1a9cb8e 10143
a6aa5195 10144 /* Fill in the entry in the .rela.plt section. */
a6aa5195 10145 rela.r_addend = 0;
e054468f
AM
10146 if (!htab->elf.dynamic_sections_created
10147 || h->dynindx == -1)
10148 {
10149 BFD_ASSERT (h->type == STT_GNU_IFUNC
10150 && h->def_regular
10151 && (h->root.type == bfd_link_hash_defined
10152 || h->root.type == bfd_link_hash_defweak));
10153 rela.r_info = ELF32_R_INFO (0, R_PPC_IRELATIVE);
10154 rela.r_addend = SYM_VAL (h);
10155 }
10156 else
10157 rela.r_info = ELF32_R_INFO (h->dynindx, R_PPC_JMP_SLOT);
e1a9cb8e 10158
25f23106
AM
10159 if (!htab->elf.dynamic_sections_created
10160 || h->dynindx == -1)
82e66161
AM
10161 {
10162 loc = (htab->elf.irelplt->contents
10163 + (htab->elf.irelplt->reloc_count++
10164 * sizeof (Elf32_External_Rela)));
10165 htab->local_ifunc_resolver = 1;
10166 }
e054468f 10167 else
82e66161
AM
10168 {
10169 loc = (htab->elf.srelplt->contents
10170 + reloc_index * sizeof (Elf32_External_Rela));
10171 if (h->type == STT_GNU_IFUNC && is_static_defined (h))
10172 htab->maybe_local_ifunc_resolver = 1;
10173 }
a6aa5195 10174 bfd_elf32_swap_reloca_out (output_bfd, &rela, loc);
e1a9cb8e 10175
a6aa5195
AM
10176 if (!h->def_regular)
10177 {
0eb4a168
AM
10178 /* Mark the symbol as undefined, rather than as
10179 defined in the .plt section. Leave the value if
10180 there were any relocations where pointer equality
10181 matters (this is a clue for the dynamic linker, to
10182 make function pointer comparisons work between an
10183 application and shared library), otherwise set it
10184 to zero. */
a6aa5195 10185 sym->st_shndx = SHN_UNDEF;
0eb4a168 10186 if (!h->pointer_equality_needed)
a6aa5195 10187 sym->st_value = 0;
0eb4a168
AM
10188 else if (!h->ref_regular_nonweak)
10189 {
625af618
AM
10190 /* This breaks function pointer comparisons, but
10191 that is better than breaking tests for a NULL
0eb4a168 10192 function pointer. */
0eb4a168
AM
10193 sym->st_value = 0;
10194 }
a6aa5195 10195 }
de972ffa 10196 else if (h->type == STT_GNU_IFUNC
0e1862bb 10197 && !bfd_link_pic (info))
de972ffa
AM
10198 {
10199 /* Set the value of ifunc symbols in a non-pie
10200 executable to the glink entry. This is to avoid
10201 text relocations. We can't do this for ifunc in
10202 allocate_dynrelocs, as we do for normal dynamic
10203 function symbols with plt entries, because we need
10204 to keep the original value around for the ifunc
10205 relocation. */
10206 sym->st_shndx = (_bfd_elf_section_from_bfd_section
10207 (output_bfd, htab->glink->output_section));
5b914448
AM
10208 sym->st_value = (ent->glink_offset
10209 + htab->glink->output_offset
de972ffa
AM
10210 + htab->glink->output_section->vma);
10211 }
a6aa5195
AM
10212 doneone = TRUE;
10213 }
e1a9cb8e 10214
e054468f 10215 if (htab->plt_type == PLT_NEW
25f23106
AM
10216 || !htab->elf.dynamic_sections_created
10217 || h->dynindx == -1)
a6aa5195 10218 {
a7f2871e 10219 unsigned char *p;
ce558b89 10220 asection *splt = htab->elf.splt;
9e390558 10221
25f23106
AM
10222 if (!htab->elf.dynamic_sections_created
10223 || h->dynindx == -1)
ce558b89 10224 splt = htab->elf.iplt;
e1a9cb8e 10225
a7f2871e 10226 p = (unsigned char *) htab->glink->contents + ent->glink_offset;
9e390558 10227 write_glink_stub (h, ent, splt, p, info);
e1a9cb8e 10228
0e1862bb 10229 if (!bfd_link_pic (info))
e054468f
AM
10230 /* We only need one non-PIC glink stub. */
10231 break;
a6aa5195
AM
10232 }
10233 else
10234 break;
10235 }
e1a9cb8e 10236
25dbc73a
AM
10237 if (h->needs_copy)
10238 {
10239 asection *s;
10240 Elf_Internal_Rela rela;
10241 bfd_byte *loc;
e1a9cb8e 10242
25dbc73a 10243 /* This symbols needs a copy reloc. Set it up. */
e1a9cb8e 10244
25dbc73a
AM
10245#ifdef DEBUG
10246 fprintf (stderr, ", copy");
10247#endif
e1a9cb8e 10248
25dbc73a 10249 BFD_ASSERT (h->dynindx != -1);
86bbe32f 10250
4dc4a9a5 10251 if (ppc_elf_hash_entry (h)->has_sda_refs)
25dbc73a 10252 s = htab->relsbss;
afbf7e8e 10253 else if (h->root.u.def.section == htab->elf.sdynrelro)
5474d94f 10254 s = htab->elf.sreldynrelro;
25dbc73a 10255 else
9d19e4fd 10256 s = htab->elf.srelbss;
25dbc73a 10257 BFD_ASSERT (s != NULL);
e1a9cb8e 10258
e87d4038 10259 rela.r_offset = SYM_VAL (h);
25dbc73a
AM
10260 rela.r_info = ELF32_R_INFO (h->dynindx, R_PPC_COPY);
10261 rela.r_addend = 0;
10262 loc = s->contents + s->reloc_count++ * sizeof (Elf32_External_Rela);
10263 bfd_elf32_swap_reloca_out (output_bfd, &rela, loc);
10264 }
e1a9cb8e 10265
25dbc73a
AM
10266#ifdef DEBUG
10267 fprintf (stderr, "\n");
10268#endif
e1a9cb8e 10269
25dbc73a
AM
10270 return TRUE;
10271}
10272\f
10273static enum elf_reloc_type_class
7e612e98
AM
10274ppc_elf_reloc_type_class (const struct bfd_link_info *info,
10275 const asection *rel_sec,
10276 const Elf_Internal_Rela *rela)
e1a9cb8e 10277{
7e612e98
AM
10278 struct ppc_elf_link_hash_table *htab = ppc_elf_hash_table (info);
10279
ce558b89 10280 if (rel_sec == htab->elf.irelplt)
7e612e98
AM
10281 return reloc_class_ifunc;
10282
25dbc73a
AM
10283 switch (ELF32_R_TYPE (rela->r_info))
10284 {
10285 case R_PPC_RELATIVE:
10286 return reloc_class_relative;
25dbc73a
AM
10287 case R_PPC_JMP_SLOT:
10288 return reloc_class_plt;
10289 case R_PPC_COPY:
10290 return reloc_class_copy;
10291 default:
10292 return reloc_class_normal;
10293 }
e1a9cb8e 10294}
25dbc73a
AM
10295\f
10296/* Finish up the dynamic sections. */
e1a9cb8e 10297
25dbc73a
AM
10298static bfd_boolean
10299ppc_elf_finish_dynamic_sections (bfd *output_bfd,
10300 struct bfd_link_info *info)
e1a9cb8e 10301{
25dbc73a
AM
10302 asection *sdyn;
10303 struct ppc_elf_link_hash_table *htab;
1fe44d79 10304 bfd_vma got;
e87d4038
AM
10305 bfd *dynobj;
10306 bfd_boolean ret = TRUE;
e1a9cb8e 10307
25dbc73a
AM
10308#ifdef DEBUG
10309 fprintf (stderr, "ppc_elf_finish_dynamic_sections called\n");
10310#endif
6b0817e5 10311
25dbc73a 10312 htab = ppc_elf_hash_table (info);
ce558b89 10313 dynobj = htab->elf.dynobj;
3d4d4302 10314 sdyn = bfd_get_linker_section (dynobj, ".dynamic");
e1a9cb8e 10315
1fe44d79
AM
10316 got = 0;
10317 if (htab->elf.hgot != NULL)
e87d4038 10318 got = SYM_VAL (htab->elf.hgot);
1fe44d79 10319
25dbc73a 10320 if (htab->elf.dynamic_sections_created)
e1a9cb8e 10321 {
25dbc73a 10322 Elf32_External_Dyn *dyncon, *dynconend;
e1a9cb8e 10323
ce558b89 10324 BFD_ASSERT (htab->elf.splt != NULL && sdyn != NULL);
86bbe32f 10325
25dbc73a
AM
10326 dyncon = (Elf32_External_Dyn *) sdyn->contents;
10327 dynconend = (Elf32_External_Dyn *) (sdyn->contents + sdyn->size);
10328 for (; dyncon < dynconend; dyncon++)
10329 {
10330 Elf_Internal_Dyn dyn;
10331 asection *s;
e1a9cb8e 10332
9d8504b1 10333 bfd_elf32_swap_dyn_in (dynobj, dyncon, &dyn);
86bbe32f 10334
25dbc73a
AM
10335 switch (dyn.d_tag)
10336 {
10337 case DT_PLTGOT:
9d8504b1 10338 if (htab->is_vxworks)
ce558b89 10339 s = htab->elf.sgotplt;
9d8504b1 10340 else
ce558b89 10341 s = htab->elf.splt;
25dbc73a
AM
10342 dyn.d_un.d_ptr = s->output_section->vma + s->output_offset;
10343 break;
86bbe32f 10344
25dbc73a 10345 case DT_PLTRELSZ:
ce558b89 10346 dyn.d_un.d_val = htab->elf.srelplt->size;
25dbc73a 10347 break;
e1a9cb8e 10348
25dbc73a 10349 case DT_JMPREL:
ce558b89 10350 s = htab->elf.srelplt;
25dbc73a
AM
10351 dyn.d_un.d_ptr = s->output_section->vma + s->output_offset;
10352 break;
2f89ff8d 10353
1fe44d79
AM
10354 case DT_PPC_GOT:
10355 dyn.d_un.d_ptr = got;
d7128ce4
AM
10356 break;
10357
82e66161
AM
10358 case DT_TEXTREL:
10359 if (htab->local_ifunc_resolver)
10360 info->callbacks->einfo
10361 (_("%X%P: text relocations and GNU indirect "
10362 "functions will result in a segfault at runtime\n"));
10363 else if (htab->maybe_local_ifunc_resolver)
10364 info->callbacks->einfo
10365 (_("%P: warning: text relocations and GNU indirect "
10366 "functions may result in a segfault at runtime\n"));
10367 continue;
10368
25dbc73a 10369 default:
7a2b07ff
NS
10370 if (htab->is_vxworks
10371 && elf_vxworks_finish_dynamic_entry (output_bfd, &dyn))
10372 break;
25dbc73a
AM
10373 continue;
10374 }
4c45e5c9 10375
25dbc73a
AM
10376 bfd_elf32_swap_dyn_out (output_bfd, &dyn, dyncon);
10377 }
10378 }
4c45e5c9 10379
6528b6eb
AM
10380 if (htab->elf.sgot != NULL
10381 && htab->elf.sgot->output_section != bfd_abs_section_ptr)
25dbc73a 10382 {
ce558b89
AM
10383 if (htab->elf.hgot->root.u.def.section == htab->elf.sgot
10384 || htab->elf.hgot->root.u.def.section == htab->elf.sgotplt)
e87d4038 10385 {
e79f5955 10386 unsigned char *p = htab->elf.hgot->root.u.def.section->contents;
2f89ff8d 10387
e87d4038
AM
10388 p += htab->elf.hgot->root.u.def.value;
10389 if (htab->plt_type == PLT_OLD)
e79f5955
AM
10390 {
10391 /* Add a blrl instruction at _GLOBAL_OFFSET_TABLE_-4
10392 so that a function can easily find the address of
10393 _GLOBAL_OFFSET_TABLE_. */
10394 BFD_ASSERT (htab->elf.hgot->root.u.def.value - 4
10395 < htab->elf.hgot->root.u.def.section->size);
10396 bfd_put_32 (output_bfd, 0x4e800021, p - 4);
10397 }
3b36f7e6 10398
e87d4038 10399 if (sdyn != NULL)
e79f5955
AM
10400 {
10401 bfd_vma val = sdyn->output_section->vma + sdyn->output_offset;
10402 BFD_ASSERT (htab->elf.hgot->root.u.def.value
10403 < htab->elf.hgot->root.u.def.section->size);
10404 bfd_put_32 (output_bfd, val, p);
10405 }
e87d4038
AM
10406 }
10407 else
10408 {
695344c0 10409 /* xgettext:c-format */
8de848d8 10410 info->callbacks->einfo (_("%P: %s not defined in linker created %s\n"),
25f53a85 10411 htab->elf.hgot->root.root.string,
ce558b89
AM
10412 (htab->elf.sgotplt != NULL
10413 ? htab->elf.sgotplt->name
10414 : htab->elf.sgot->name));
e87d4038
AM
10415 bfd_set_error (bfd_error_bad_value);
10416 ret = FALSE;
10417 }
25dbc73a 10418
ce558b89 10419 elf_section_data (htab->elf.sgot->output_section)->this_hdr.sh_entsize = 4;
25dbc73a
AM
10420 }
10421
9d8504b1 10422 /* Fill in the first entry in the VxWorks procedure linkage table. */
6528b6eb
AM
10423 if (htab->is_vxworks
10424 && htab->elf.splt != NULL
10425 && htab->elf.splt->size != 0
10426 && htab->elf.splt->output_section != bfd_abs_section_ptr)
9d8504b1 10427 {
6528b6eb 10428 asection *splt = htab->elf.splt;
9d8504b1 10429 /* Use the right PLT. */
0e1862bb 10430 const bfd_vma *plt_entry = (bfd_link_pic (info)
5b914448
AM
10431 ? ppc_elf_vxworks_pic_plt0_entry
10432 : ppc_elf_vxworks_plt0_entry);
9d8504b1 10433
0e1862bb 10434 if (!bfd_link_pic (info))
9d8504b1 10435 {
e87d4038 10436 bfd_vma got_value = SYM_VAL (htab->elf.hgot);
9d8504b1 10437
e87d4038 10438 bfd_put_32 (output_bfd, plt_entry[0] | PPC_HA (got_value),
9d8504b1 10439 splt->contents + 0);
e87d4038 10440 bfd_put_32 (output_bfd, plt_entry[1] | PPC_LO (got_value),
9d8504b1
PB
10441 splt->contents + 4);
10442 }
10443 else
10444 {
10445 bfd_put_32 (output_bfd, plt_entry[0], splt->contents + 0);
10446 bfd_put_32 (output_bfd, plt_entry[1], splt->contents + 4);
10447 }
10448 bfd_put_32 (output_bfd, plt_entry[2], splt->contents + 8);
10449 bfd_put_32 (output_bfd, plt_entry[3], splt->contents + 12);
10450 bfd_put_32 (output_bfd, plt_entry[4], splt->contents + 16);
10451 bfd_put_32 (output_bfd, plt_entry[5], splt->contents + 20);
10452 bfd_put_32 (output_bfd, plt_entry[6], splt->contents + 24);
10453 bfd_put_32 (output_bfd, plt_entry[7], splt->contents + 28);
10454
0e1862bb 10455 if (! bfd_link_pic (info))
9d8504b1
PB
10456 {
10457 Elf_Internal_Rela rela;
10458 bfd_byte *loc;
10459
10460 loc = htab->srelplt2->contents;
10461
10462 /* Output the @ha relocation for the first instruction. */
ce558b89
AM
10463 rela.r_offset = (htab->elf.splt->output_section->vma
10464 + htab->elf.splt->output_offset
9d8504b1 10465 + 2);
636ce3f5 10466 rela.r_info = ELF32_R_INFO (htab->elf.hgot->indx, R_PPC_ADDR16_HA);
9d8504b1
PB
10467 rela.r_addend = 0;
10468 bfd_elf32_swap_reloca_out (output_bfd, &rela, loc);
10469 loc += sizeof (Elf32_External_Rela);
5b914448 10470
9d8504b1 10471 /* Output the @l relocation for the second instruction. */
ce558b89
AM
10472 rela.r_offset = (htab->elf.splt->output_section->vma
10473 + htab->elf.splt->output_offset
9d8504b1 10474 + 6);
636ce3f5 10475 rela.r_info = ELF32_R_INFO (htab->elf.hgot->indx, R_PPC_ADDR16_LO);
9d8504b1
PB
10476 rela.r_addend = 0;
10477 bfd_elf32_swap_reloca_out (output_bfd, &rela, loc);
10478 loc += sizeof (Elf32_External_Rela);
10479
10480 /* Fix up the remaining relocations. They may have the wrong
10481 symbol index for _G_O_T_ or _P_L_T_ depending on the order
10482 in which symbols were output. */
10483 while (loc < htab->srelplt2->contents + htab->srelplt2->size)
10484 {
10485 Elf_Internal_Rela rel;
10486
10487 bfd_elf32_swap_reloc_in (output_bfd, loc, &rel);
636ce3f5 10488 rel.r_info = ELF32_R_INFO (htab->elf.hgot->indx, R_PPC_ADDR16_HA);
9d8504b1
PB
10489 bfd_elf32_swap_reloc_out (output_bfd, &rel, loc);
10490 loc += sizeof (Elf32_External_Rela);
10491
10492 bfd_elf32_swap_reloc_in (output_bfd, loc, &rel);
636ce3f5 10493 rel.r_info = ELF32_R_INFO (htab->elf.hgot->indx, R_PPC_ADDR16_LO);
9d8504b1
PB
10494 bfd_elf32_swap_reloc_out (output_bfd, &rel, loc);
10495 loc += sizeof (Elf32_External_Rela);
10496
10497 bfd_elf32_swap_reloc_in (output_bfd, loc, &rel);
7325306f 10498 rel.r_info = ELF32_R_INFO (htab->elf.hplt->indx, R_PPC_ADDR32);
9d8504b1
PB
10499 bfd_elf32_swap_reloc_out (output_bfd, &rel, loc);
10500 loc += sizeof (Elf32_External_Rela);
10501 }
10502 }
10503 }
10504
e054468f
AM
10505 if (htab->glink != NULL
10506 && htab->glink->contents != NULL
10507 && htab->elf.dynamic_sections_created)
d7128ce4
AM
10508 {
10509 unsigned char *p;
10510 unsigned char *endp;
a6aa5195 10511 bfd_vma res0;
a6aa5195
AM
10512
10513 /*
10514 * PIC glink code is the following:
10515 *
10516 * # ith PLT code stub.
10517 * addis 11,30,(plt+(i-1)*4-got)@ha
10518 * lwz 11,(plt+(i-1)*4-got)@l(11)
10519 * mtctr 11
10520 * bctr
10521 *
10522 * # A table of branches, one for each plt entry.
176a0d42 10523 * # The idea is that the plt call stub loads ctr and r11 with these
a6aa5195
AM
10524 * # addresses, so (r11 - res_0) gives the plt index * 4.
10525 * res_0: b PLTresolve
10526 * res_1: b PLTresolve
10527 * .
10528 * # Some number of entries towards the end can be nops
10529 * res_n_m3: nop
10530 * res_n_m2: nop
10531 * res_n_m1:
10532 *
10533 * PLTresolve:
10534 * addis 11,11,(1f-res_0)@ha
10535 * mflr 0
10536 * bcl 20,31,1f
10537 * 1: addi 11,11,(1b-res_0)@l
10538 * mflr 12
10539 * mtlr 0
07d6d2b8 10540 * sub 11,11,12 # r11 = index * 4
a6aa5195 10541 * addis 12,12,(got+4-1b)@ha
07d6d2b8
AM
10542 * lwz 0,(got+4-1b)@l(12) # got[1] address of dl_runtime_resolve
10543 * lwz 12,(got+8-1b)@l(12) # got[2] contains the map address
a6aa5195
AM
10544 * mtctr 0
10545 * add 0,11,11
07d6d2b8 10546 * add 11,0,11 # r11 = index * 12 = reloc offset.
a6aa5195 10547 * bctr
9e390558 10548 *
176a0d42
AM
10549 * Non-PIC glink code is a little simpler.
10550 *
10551 * # ith PLT code stub.
10552 * lis 11,(plt+(i-1)*4)@ha
10553 * lwz 11,(plt+(i-1)*4)@l(11)
10554 * mtctr 11
10555 * bctr
10556 *
10557 * The branch table is the same, then comes
10558 *
10559 * PLTresolve:
10560 * lis 12,(got+4)@ha
10561 * addis 11,11,(-res_0)@ha
07d6d2b8
AM
10562 * lwz 0,(got+4)@l(12) # got[1] address of dl_runtime_resolve
10563 * addi 11,11,(-res_0)@l # r11 = index * 4
176a0d42
AM
10564 * mtctr 0
10565 * add 0,11,11
07d6d2b8
AM
10566 * lwz 12,(got+8)@l(12) # got[2] contains the map address
10567 * add 11,0,11 # r11 = index * 12 = reloc offset.
176a0d42
AM
10568 * bctr
10569 */
7e8aeb9a 10570
a6aa5195 10571 /* Build the branch table, one for each plt entry (less one),
86b9da88 10572 and perhaps some padding. */
a6aa5195
AM
10573 p = htab->glink->contents;
10574 p += htab->glink_pltresolve;
86b9da88
AM
10575 endp = htab->glink->contents;
10576 endp += htab->glink->size - GLINK_PLTRESOLVE;
da3a2088 10577 while (p < endp - (htab->params->ppc476_workaround ? 0 : 8 * 4))
86b9da88
AM
10578 {
10579 bfd_put_32 (output_bfd, B + endp - p, p);
10580 p += 4;
10581 }
10582 while (p < endp)
10583 {
10584 bfd_put_32 (output_bfd, NOP, p);
10585 p += 4;
10586 }
10587
7e8aeb9a 10588 res0 = (htab->glink_pltresolve
86b9da88
AM
10589 + htab->glink->output_section->vma
10590 + htab->glink->output_offset);
10591
da3a2088
AM
10592 if (htab->params->ppc476_workaround)
10593 {
10594 /* Ensure that a call stub at the end of a page doesn't
10595 result in prefetch over the end of the page into the
10596 glink branch table. */
10597 bfd_vma pagesize = (bfd_vma) 1 << htab->params->pagesize_p2;
10598 bfd_vma page_addr;
10599 bfd_vma glink_start = (htab->glink->output_section->vma
10600 + htab->glink->output_offset);
10601
10602 for (page_addr = res0 & -pagesize;
10603 page_addr > glink_start;
10604 page_addr -= pagesize)
10605 {
10606 /* We have a plt call stub that may need fixing. */
10607 bfd_byte *loc;
10608 unsigned int insn;
10609
10610 loc = htab->glink->contents + page_addr - 4 - glink_start;
10611 insn = bfd_get_32 (output_bfd, loc);
10612 if (insn == BCTR)
10613 {
10614 /* By alignment, we know that there must be at least
10615 one other call stub before this one. */
10616 insn = bfd_get_32 (output_bfd, loc - 16);
10617 if (insn == BCTR)
10618 bfd_put_32 (output_bfd, B | (-16 & 0x3fffffc), loc);
10619 else
10620 bfd_put_32 (output_bfd, B | (-20 & 0x3fffffc), loc);
10621 }
10622 }
10623 }
10624
86b9da88 10625 /* Last comes the PLTresolve stub. */
9e390558 10626 endp = p + GLINK_PLTRESOLVE;
0e1862bb 10627 if (bfd_link_pic (info))
7e8aeb9a 10628 {
a6aa5195 10629 bfd_vma bcl;
d7128ce4 10630
a6aa5195
AM
10631 bcl = (htab->glink->size - GLINK_PLTRESOLVE + 3*4
10632 + htab->glink->output_section->vma
10633 + htab->glink->output_offset);
10634
9e390558
AM
10635 bfd_put_32 (output_bfd, ADDIS_11_11 + PPC_HA (bcl - res0), p);
10636 p += 4;
10637 bfd_put_32 (output_bfd, MFLR_0, p);
10638 p += 4;
10639 bfd_put_32 (output_bfd, BCL_20_31, p);
10640 p += 4;
10641 bfd_put_32 (output_bfd, ADDI_11_11 + PPC_LO (bcl - res0), p);
10642 p += 4;
10643 bfd_put_32 (output_bfd, MFLR_12, p);
10644 p += 4;
10645 bfd_put_32 (output_bfd, MTLR_0, p);
10646 p += 4;
10647 bfd_put_32 (output_bfd, SUB_11_11_12, p);
10648 p += 4;
10649 bfd_put_32 (output_bfd, ADDIS_12_12 + PPC_HA (got + 4 - bcl), p);
10650 p += 4;
a6aa5195
AM
10651 if (PPC_HA (got + 4 - bcl) == PPC_HA (got + 8 - bcl))
10652 {
9e390558
AM
10653 bfd_put_32 (output_bfd, LWZ_0_12 + PPC_LO (got + 4 - bcl), p);
10654 p += 4;
10655 bfd_put_32 (output_bfd, LWZ_12_12 + PPC_LO (got + 8 - bcl), p);
10656 p += 4;
a6aa5195
AM
10657 }
10658 else
10659 {
9e390558
AM
10660 bfd_put_32 (output_bfd, LWZU_0_12 + PPC_LO (got + 4 - bcl), p);
10661 p += 4;
10662 bfd_put_32 (output_bfd, LWZ_12_12 + 4, p);
10663 p += 4;
a6aa5195 10664 }
9e390558
AM
10665 bfd_put_32 (output_bfd, MTCTR_0, p);
10666 p += 4;
10667 bfd_put_32 (output_bfd, ADD_0_11_11, p);
7e8aeb9a
AM
10668 }
10669 else
d7128ce4 10670 {
9e390558
AM
10671 bfd_put_32 (output_bfd, LIS_12 + PPC_HA (got + 4), p);
10672 p += 4;
10673 bfd_put_32 (output_bfd, ADDIS_11_11 + PPC_HA (-res0), p);
10674 p += 4;
a6aa5195 10675 if (PPC_HA (got + 4) == PPC_HA (got + 8))
9e390558 10676 bfd_put_32 (output_bfd, LWZ_0_12 + PPC_LO (got + 4), p);
a6aa5195 10677 else
9e390558
AM
10678 bfd_put_32 (output_bfd, LWZU_0_12 + PPC_LO (got + 4), p);
10679 p += 4;
10680 bfd_put_32 (output_bfd, ADDI_11_11 + PPC_LO (-res0), p);
10681 p += 4;
10682 bfd_put_32 (output_bfd, MTCTR_0, p);
10683 p += 4;
10684 bfd_put_32 (output_bfd, ADD_0_11_11, p);
10685 p += 4;
10686 if (PPC_HA (got + 4) == PPC_HA (got + 8))
10687 bfd_put_32 (output_bfd, LWZ_12_12 + PPC_LO (got + 8), p);
10688 else
10689 bfd_put_32 (output_bfd, LWZ_12_12 + 4, p);
10690 }
10691 p += 4;
10692 bfd_put_32 (output_bfd, ADD_11_0_11, p);
10693 p += 4;
407aa07c
AM
10694 bfd_put_32 (output_bfd, BCTR, p);
10695 p += 4;
9e390558
AM
10696 while (p < endp)
10697 {
10698 bfd_put_32 (output_bfd,
10699 htab->params->ppc476_workaround ? BA : NOP, p);
10700 p += 4;
d7128ce4 10701 }
9e390558 10702 BFD_ASSERT (p == endp);
d7128ce4
AM
10703 }
10704
6177242a
AM
10705 if (htab->glink_eh_frame != NULL
10706 && htab->glink_eh_frame->contents != NULL)
10707 {
10708 unsigned char *p = htab->glink_eh_frame->contents;
10709 bfd_vma val;
10710
6177242a
AM
10711 p += sizeof (glink_eh_frame_cie);
10712 /* FDE length. */
6177242a
AM
10713 p += 4;
10714 /* CIE pointer. */
6177242a
AM
10715 p += 4;
10716 /* Offset to .glink. */
10717 val = (htab->glink->output_section->vma
10718 + htab->glink->output_offset);
10719 val -= (htab->glink_eh_frame->output_section->vma
10720 + htab->glink_eh_frame->output_offset);
10721 val -= p - htab->glink_eh_frame->contents;
10722 bfd_put_32 (htab->elf.dynobj, val, p);
6177242a 10723
dbaa2011 10724 if (htab->glink_eh_frame->sec_info_type == SEC_INFO_TYPE_EH_FRAME
6177242a
AM
10725 && !_bfd_elf_write_section_eh_frame (output_bfd, info,
10726 htab->glink_eh_frame,
10727 htab->glink_eh_frame->contents))
10728 return FALSE;
10729 }
10730
e87d4038 10731 return ret;
25dbc73a 10732}
e1a9cb8e 10733\f
6d00b590 10734#define TARGET_LITTLE_SYM powerpc_elf32_le_vec
252b5132 10735#define TARGET_LITTLE_NAME "elf32-powerpcle"
6d00b590 10736#define TARGET_BIG_SYM powerpc_elf32_vec
252b5132
RH
10737#define TARGET_BIG_NAME "elf32-powerpc"
10738#define ELF_ARCH bfd_arch_powerpc
ae95ffa6 10739#define ELF_TARGET_ID PPC32_ELF_DATA
252b5132 10740#define ELF_MACHINE_CODE EM_PPC
d0facd1b
NC
10741#ifdef __QNXTARGET__
10742#define ELF_MAXPAGESIZE 0x1000
04c6a44c 10743#define ELF_COMMONPAGESIZE 0x1000
d0facd1b 10744#else
252b5132 10745#define ELF_MAXPAGESIZE 0x10000
04c6a44c 10746#define ELF_COMMONPAGESIZE 0x10000
d0facd1b 10747#endif
b1342370 10748#define ELF_MINPAGESIZE 0x1000
252b5132
RH
10749#define elf_info_to_howto ppc_elf_info_to_howto
10750
10751#ifdef EM_CYGNUS_POWERPC
10752#define ELF_MACHINE_ALT1 EM_CYGNUS_POWERPC
10753#endif
10754
10755#ifdef EM_PPC_OLD
10756#define ELF_MACHINE_ALT2 EM_PPC_OLD
10757#endif
10758
10759#define elf_backend_plt_not_loaded 1
5474d94f 10760#define elf_backend_want_dynrelro 1
252b5132 10761#define elf_backend_can_gc_sections 1
51b64d56 10762#define elf_backend_can_refcount 1
b491616a 10763#define elf_backend_rela_normal 1
53291d1f 10764#define elf_backend_caches_rawsize 1
252b5132 10765
43c40ab2 10766#define bfd_elf32_mkobject ppc_elf_mkobject
252b5132 10767#define bfd_elf32_bfd_merge_private_bfd_data ppc_elf_merge_private_bfd_data
70bccea4 10768#define bfd_elf32_bfd_relax_section ppc_elf_relax_section
252b5132 10769#define bfd_elf32_bfd_reloc_type_lookup ppc_elf_reloc_type_lookup
b9c361e0 10770#define bfd_elf32_bfd_reloc_name_lookup ppc_elf_reloc_name_lookup
252b5132 10771#define bfd_elf32_bfd_set_private_flags ppc_elf_set_private_flags
70bccea4 10772#define bfd_elf32_bfd_link_hash_table_create ppc_elf_link_hash_table_create
468392fb 10773#define bfd_elf32_get_synthetic_symtab ppc_elf_get_synthetic_symtab
252b5132 10774
feee612b 10775#define elf_backend_object_p ppc_elf_object_p
252b5132 10776#define elf_backend_gc_mark_hook ppc_elf_gc_mark_hook
252b5132
RH
10777#define elf_backend_section_from_shdr ppc_elf_section_from_shdr
10778#define elf_backend_relocate_section ppc_elf_relocate_section
10779#define elf_backend_create_dynamic_sections ppc_elf_create_dynamic_sections
10780#define elf_backend_check_relocs ppc_elf_check_relocs
c0e331c7 10781#define elf_backend_relocs_compatible _bfd_elf_relocs_compatible
7fce784e 10782#define elf_backend_copy_indirect_symbol ppc_elf_copy_indirect_symbol
252b5132
RH
10783#define elf_backend_adjust_dynamic_symbol ppc_elf_adjust_dynamic_symbol
10784#define elf_backend_add_symbol_hook ppc_elf_add_symbol_hook
10785#define elf_backend_size_dynamic_sections ppc_elf_size_dynamic_sections
0eb4a168 10786#define elf_backend_hash_symbol ppc_elf_hash_symbol
252b5132
RH
10787#define elf_backend_finish_dynamic_symbol ppc_elf_finish_dynamic_symbol
10788#define elf_backend_finish_dynamic_sections ppc_elf_finish_dynamic_sections
10789#define elf_backend_fake_sections ppc_elf_fake_sections
10790#define elf_backend_additional_program_headers ppc_elf_additional_program_headers
954b63d4 10791#define elf_backend_modify_segment_map ppc_elf_modify_segment_map
c5fccbec
DJ
10792#define elf_backend_grok_prstatus ppc_elf_grok_prstatus
10793#define elf_backend_grok_psinfo ppc_elf_grok_psinfo
183e98be 10794#define elf_backend_write_core_note ppc_elf_write_core_note
29c2fb7c 10795#define elf_backend_reloc_type_class ppc_elf_reloc_type_class
70bccea4
AM
10796#define elf_backend_begin_write_processing ppc_elf_begin_write_processing
10797#define elf_backend_final_write_processing ppc_elf_final_write_processing
10798#define elf_backend_write_section ppc_elf_write_section
551b43fd 10799#define elf_backend_get_sec_type_attr ppc_elf_get_sec_type_attr
4c45e5c9 10800#define elf_backend_plt_sym_val ppc_elf_plt_sym_val
8a696751 10801#define elf_backend_action_discarded ppc_elf_action_discarded
74541ad4 10802#define elf_backend_init_index_section _bfd_elf_init_1_index_section
b9c361e0 10803#define elf_backend_lookup_section_flags_hook ppc_elf_lookup_section_flags
252b5132
RH
10804
10805#include "elf32-target.h"
9d8504b1 10806
7b8e7dad
AM
10807/* FreeBSD Target */
10808
10809#undef TARGET_LITTLE_SYM
10810#undef TARGET_LITTLE_NAME
10811
10812#undef TARGET_BIG_SYM
6d00b590 10813#define TARGET_BIG_SYM powerpc_elf32_fbsd_vec
7b8e7dad
AM
10814#undef TARGET_BIG_NAME
10815#define TARGET_BIG_NAME "elf32-powerpc-freebsd"
10816
10817#undef ELF_OSABI
10818#define ELF_OSABI ELFOSABI_FREEBSD
10819
10820#undef elf32_bed
10821#define elf32_bed elf32_powerpc_fbsd_bed
10822
10823#include "elf32-target.h"
10824
9d8504b1
PB
10825/* VxWorks Target */
10826
10827#undef TARGET_LITTLE_SYM
10828#undef TARGET_LITTLE_NAME
10829
10830#undef TARGET_BIG_SYM
6d00b590 10831#define TARGET_BIG_SYM powerpc_elf32_vxworks_vec
9d8504b1
PB
10832#undef TARGET_BIG_NAME
10833#define TARGET_BIG_NAME "elf32-powerpc-vxworks"
10834
7b8e7dad
AM
10835#undef ELF_OSABI
10836
d5e3d971
PB
10837/* VxWorks uses the elf default section flags for .plt. */
10838static const struct bfd_elf_special_section *
4aef7643 10839ppc_elf_vxworks_get_sec_type_attr (bfd *abfd, asection *sec)
9d8504b1 10840{
d5e3d971
PB
10841 if (sec->name == NULL)
10842 return NULL;
10843
10844 if (strcmp (sec->name, ".plt") == 0)
10845 return _bfd_elf_get_sec_type_attr (abfd, sec);
10846
10847 return ppc_elf_get_sec_type_attr (abfd, sec);
10848}
9d8504b1
PB
10849
10850/* Like ppc_elf_link_hash_table_create, but overrides
10851 appropriately for VxWorks. */
10852static struct bfd_link_hash_table *
10853ppc_elf_vxworks_link_hash_table_create (bfd *abfd)
10854{
10855 struct bfd_link_hash_table *ret;
10856
10857 ret = ppc_elf_link_hash_table_create (abfd);
10858 if (ret)
10859 {
10860 struct ppc_elf_link_hash_table *htab
954b63d4 10861 = (struct ppc_elf_link_hash_table *)ret;
9d8504b1 10862 htab->is_vxworks = 1;
4a3dc543 10863 htab->plt_type = PLT_VXWORKS;
9d8504b1
PB
10864 htab->plt_entry_size = VXWORKS_PLT_ENTRY_SIZE;
10865 htab->plt_slot_size = VXWORKS_PLT_ENTRY_SIZE;
10866 htab->plt_initial_entry_size = VXWORKS_PLT_INITIAL_ENTRY_SIZE;
10867 }
10868 return ret;
10869}
10870
10871/* Tweak magic VxWorks symbols as they are loaded. */
10872static bfd_boolean
10873ppc_elf_vxworks_add_symbol_hook (bfd *abfd,
10874 struct bfd_link_info *info,
10875 Elf_Internal_Sym *sym,
4aef7643
AM
10876 const char **namep,
10877 flagword *flagsp,
9d8504b1
PB
10878 asection **secp,
10879 bfd_vma *valp)
10880{
4aef7643
AM
10881 if (!elf_vxworks_add_symbol_hook (abfd, info, sym, namep, flagsp, secp,
10882 valp))
9d8504b1
PB
10883 return FALSE;
10884
4aef7643 10885 return ppc_elf_add_symbol_hook (abfd, info, sym, namep, flagsp, secp, valp);
9d8504b1
PB
10886}
10887
9d8504b1
PB
10888static void
10889ppc_elf_vxworks_final_write_processing (bfd *abfd, bfd_boolean linker)
10890{
4aef7643
AM
10891 ppc_elf_final_write_processing (abfd, linker);
10892 elf_vxworks_final_write_processing (abfd, linker);
9d8504b1
PB
10893}
10894
10895/* On VxWorks, we emit relocations against _PROCEDURE_LINKAGE_TABLE_, so
10896 define it. */
10897#undef elf_backend_want_plt_sym
10898#define elf_backend_want_plt_sym 1
10899#undef elf_backend_want_got_plt
10900#define elf_backend_want_got_plt 1
10901#undef elf_backend_got_symbol_offset
10902#define elf_backend_got_symbol_offset 0
10903#undef elf_backend_plt_not_loaded
10904#define elf_backend_plt_not_loaded 0
10905#undef elf_backend_plt_readonly
10906#define elf_backend_plt_readonly 1
10907#undef elf_backend_got_header_size
10908#define elf_backend_got_header_size 12
64f52338
AM
10909#undef elf_backend_dtrel_excludes_plt
10910#define elf_backend_dtrel_excludes_plt 1
9d8504b1 10911
468392fb
AM
10912#undef bfd_elf32_get_synthetic_symtab
10913
9d8504b1
PB
10914#undef bfd_elf32_bfd_link_hash_table_create
10915#define bfd_elf32_bfd_link_hash_table_create \
10916 ppc_elf_vxworks_link_hash_table_create
9d8504b1
PB
10917#undef elf_backend_add_symbol_hook
10918#define elf_backend_add_symbol_hook \
10919 ppc_elf_vxworks_add_symbol_hook
10920#undef elf_backend_link_output_symbol_hook
10921#define elf_backend_link_output_symbol_hook \
9c72ff84 10922 elf_vxworks_link_output_symbol_hook
9d8504b1
PB
10923#undef elf_backend_final_write_processing
10924#define elf_backend_final_write_processing \
10925 ppc_elf_vxworks_final_write_processing
d5e3d971
PB
10926#undef elf_backend_get_sec_type_attr
10927#define elf_backend_get_sec_type_attr \
10928 ppc_elf_vxworks_get_sec_type_attr
9d8504b1
PB
10929#undef elf_backend_emit_relocs
10930#define elf_backend_emit_relocs \
10931 elf_vxworks_emit_relocs
10932
10933#undef elf32_bed
10934#define elf32_bed ppc_elf_vxworks_bed
e054468f 10935#undef elf_backend_post_process_headers
9d8504b1
PB
10936
10937#include "elf32-target.h"
This page took 1.963926 seconds and 4 git commands to generate.