Use ELF_SECTION_IN_SEGMENT to map segments
[deliverable/binutils-gdb.git] / bfd / elf32-ppc.c
CommitLineData
252b5132 1/* PowerPC-specific support for 32-bit ELF
219d1afa 2 Copyright (C) 1994-2018 Free Software Foundation, Inc.
252b5132
RH
3 Written by Ian Lance Taylor, Cygnus Support.
4
ae9a127f 5 This file is part of BFD, the Binary File Descriptor library.
252b5132 6
ae9a127f
NC
7 This program is free software; you can redistribute it and/or modify
8 it under the terms of the GNU General Public License as published by
cd123cb7 9 the Free Software Foundation; either version 3 of the License, or
ae9a127f 10 (at your option) any later version.
252b5132 11
ae9a127f
NC
12 This program is distributed in the hope that it will be useful,
13 but WITHOUT ANY WARRANTY; without even the implied warranty of
14 MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
15 GNU General Public License for more details.
252b5132 16
ae9a127f 17 You should have received a copy of the GNU General Public License
fc0bffd6 18 along with this program; if not, write to the
3e110533 19 Free Software Foundation, Inc., 51 Franklin Street - Fifth Floor,
53e09e0a 20 Boston, MA 02110-1301, USA. */
252b5132 21
cd123cb7 22
252b5132
RH
23/* This file is based on a preliminary PowerPC ELF ABI. The
24 information may not match the final PowerPC ELF ABI. It includes
25 suggestions from the in-progress Embedded PowerPC ABI, and that
26 information may also not match. */
27
3db64b00 28#include "sysdep.h"
183e98be 29#include <stdarg.h>
252b5132 30#include "bfd.h"
252b5132
RH
31#include "bfdlink.h"
32#include "libbfd.h"
33#include "elf-bfd.h"
34#include "elf/ppc.h"
7619e7c7 35#include "elf32-ppc.h"
9d8504b1 36#include "elf-vxworks.h"
6177242a 37#include "dwarf2.h"
08dc996f 38#include "opcode/ppc.h"
252b5132 39
b9c361e0
JL
40typedef enum split16_format_type
41{
42 split16a_type = 0,
43 split16d_type
44}
45split16_format_type;
46
f0fe0e16 47/* RELA relocations are used here. */
252b5132 48
252b5132 49static bfd_reloc_status_type ppc_elf_addr16_ha_reloc
55fd94b0 50 (bfd *, arelent *, asymbol *, void *, asection *, bfd *, char **);
7619e7c7 51static bfd_reloc_status_type ppc_elf_unhandled_reloc
55fd94b0 52 (bfd *, arelent *, asymbol *, void *, asection *, bfd *, char **);
252b5132 53
70bccea4
AM
54/* Branch prediction bit for branch taken relocs. */
55#define BRANCH_PREDICT_BIT 0x200000
56/* Mask to set RA in memory instructions. */
57#define RA_REGISTER_MASK 0x001f0000
58/* Value to shift register by to insert RA. */
59#define RA_REGISTER_SHIFT 16
252b5132
RH
60
61/* The name of the dynamic interpreter. This is put in the .interp
62 section. */
252b5132
RH
63#define ELF_DYNAMIC_INTERPRETER "/usr/lib/ld.so.1"
64
d7128ce4 65/* For old-style PLT. */
252b5132
RH
66/* The number of single-slot PLT entries (the rest use two slots). */
67#define PLT_NUM_SINGLE_ENTRIES 8192
68
d7128ce4 69/* For new-style .glink and .plt. */
a6aa5195 70#define GLINK_PLTRESOLVE 16*4
9e390558 71#define GLINK_ENTRY_SIZE(htab, h) \
407aa07c 72 ((4*4 \
9e390558
AM
73 + (h != NULL \
74 && h == htab->tls_get_addr \
75 && !htab->params->no_tls_get_addr_opt ? 8*4 : 0) \
76 + (1u << htab->params->plt_stub_align) - 1) \
77 & -(1u << htab->params->plt_stub_align))
d7128ce4 78
9d8504b1
PB
79/* VxWorks uses its own plt layout, filled in by the static linker. */
80
81/* The standard VxWorks PLT entry. */
82#define VXWORKS_PLT_ENTRY_SIZE 32
83static const bfd_vma ppc_elf_vxworks_plt_entry
84 [VXWORKS_PLT_ENTRY_SIZE / 4] =
85 {
07d6d2b8
AM
86 0x3d800000, /* lis r12,0 */
87 0x818c0000, /* lwz r12,0(r12) */
88 0x7d8903a6, /* mtctr r12 */
89 0x4e800420, /* bctr */
90 0x39600000, /* li r11,0 */
91 0x48000000, /* b 14 <.PLT0resolve+0x4> */
92 0x60000000, /* nop */
93 0x60000000, /* nop */
9d8504b1
PB
94 };
95static const bfd_vma ppc_elf_vxworks_pic_plt_entry
96 [VXWORKS_PLT_ENTRY_SIZE / 4] =
97 {
98 0x3d9e0000, /* addis r12,r30,0 */
99 0x818c0000, /* lwz r12,0(r12) */
100 0x7d8903a6, /* mtctr r12 */
101 0x4e800420, /* bctr */
102 0x39600000, /* li r11,0 */
103 0x48000000, /* b 14 <.PLT0resolve+0x4> 14: R_PPC_REL24 .PLTresolve */
104 0x60000000, /* nop */
105 0x60000000, /* nop */
106 };
107
108/* The initial VxWorks PLT entry. */
109#define VXWORKS_PLT_INITIAL_ENTRY_SIZE 32
110static const bfd_vma ppc_elf_vxworks_plt0_entry
111 [VXWORKS_PLT_INITIAL_ENTRY_SIZE / 4] =
112 {
07d6d2b8
AM
113 0x3d800000, /* lis r12,0 */
114 0x398c0000, /* addi r12,r12,0 */
115 0x800c0008, /* lwz r0,8(r12) */
116 0x7c0903a6, /* mtctr r0 */
117 0x818c0004, /* lwz r12,4(r12) */
118 0x4e800420, /* bctr */
119 0x60000000, /* nop */
120 0x60000000, /* nop */
9d8504b1
PB
121 };
122static const bfd_vma ppc_elf_vxworks_pic_plt0_entry
123 [VXWORKS_PLT_INITIAL_ENTRY_SIZE / 4] =
124 {
125 0x819e0008, /* lwz r12,8(r30) */
07d6d2b8 126 0x7d8903a6, /* mtctr r12 */
9d8504b1 127 0x819e0004, /* lwz r12,4(r30) */
07d6d2b8
AM
128 0x4e800420, /* bctr */
129 0x60000000, /* nop */
130 0x60000000, /* nop */
131 0x60000000, /* nop */
132 0x60000000, /* nop */
9d8504b1
PB
133 };
134
135/* For executables, we have some additional relocations in
136 .rela.plt.unloaded, for the kernel loader. */
137
138/* The number of non-JMP_SLOT relocations per PLT0 slot. */
139#define VXWORKS_PLT_NON_JMP_SLOT_RELOCS 3
140/* The number of relocations in the PLTResolve slot. */
141#define VXWORKS_PLTRESOLVE_RELOCS 2
de194d85 142/* The number of relocations in the PLTResolve slot when creating
9d8504b1
PB
143 a shared library. */
144#define VXWORKS_PLTRESOLVE_RELOCS_SHLIB 0
145
d7128ce4 146/* Some instructions. */
d7128ce4 147#define ADDIS_11_11 0x3d6b0000
a6aa5195
AM
148#define ADDIS_11_30 0x3d7e0000
149#define ADDIS_12_12 0x3d8c0000
d7128ce4 150#define ADDI_11_11 0x396b0000
d7128ce4 151#define ADD_0_11_11 0x7c0b5a14
a7f2871e 152#define ADD_3_12_2 0x7c6c1214
d7128ce4 153#define ADD_11_0_11 0x7d605a14
a6aa5195 154#define B 0x48000000
da3a2088 155#define BA 0x48000002
a6aa5195 156#define BCL_20_31 0x429f0005
d7128ce4 157#define BCTR 0x4e800420
a7f2871e
AM
158#define BEQLR 0x4d820020
159#define CMPWI_11_0 0x2c0b0000
7e8aeb9a
AM
160#define LIS_11 0x3d600000
161#define LIS_12 0x3d800000
a6aa5195
AM
162#define LWZU_0_12 0x840c0000
163#define LWZ_0_12 0x800c0000
a7f2871e 164#define LWZ_11_3 0x81630000
a6aa5195
AM
165#define LWZ_11_11 0x816b0000
166#define LWZ_11_30 0x817e0000
a7f2871e 167#define LWZ_12_3 0x81830000
a6aa5195 168#define LWZ_12_12 0x818c0000
a7f2871e
AM
169#define MR_0_3 0x7c601b78
170#define MR_3_0 0x7c030378
a6aa5195
AM
171#define MFLR_0 0x7c0802a6
172#define MFLR_12 0x7d8802a6
173#define MTCTR_0 0x7c0903a6
174#define MTCTR_11 0x7d6903a6
175#define MTLR_0 0x7c0803a6
176#define NOP 0x60000000
177#define SUB_11_11_12 0x7d6c5850
7619e7c7
AM
178
179/* Offset of tp and dtp pointers from start of TLS block. */
180#define TP_OFFSET 0x7000
181#define DTP_OFFSET 0x8000
e87d4038
AM
182
183/* The value of a defined global symbol. */
184#define SYM_VAL(SYM) \
185 ((SYM)->root.u.def.section->output_section->vma \
186 + (SYM)->root.u.def.section->output_offset \
187 + (SYM)->root.u.def.value)
7fce784e 188\f
e47cd125 189static reloc_howto_type *ppc_elf_howto_table[R_PPC_max];
252b5132 190
8da6118f 191static reloc_howto_type ppc_elf_howto_raw[] = {
252b5132
RH
192 /* This reloc does nothing. */
193 HOWTO (R_PPC_NONE, /* type */
194 0, /* rightshift */
6346d5ca
AM
195 3, /* size (0 = byte, 1 = short, 2 = long) */
196 0, /* bitsize */
b34976b6 197 FALSE, /* pc_relative */
252b5132 198 0, /* bitpos */
86c95733 199 complain_overflow_dont, /* complain_on_overflow */
252b5132
RH
200 bfd_elf_generic_reloc, /* special_function */
201 "R_PPC_NONE", /* name */
b34976b6 202 FALSE, /* partial_inplace */
252b5132
RH
203 0, /* src_mask */
204 0, /* dst_mask */
b34976b6 205 FALSE), /* pcrel_offset */
252b5132
RH
206
207 /* A standard 32 bit relocation. */
208 HOWTO (R_PPC_ADDR32, /* type */
209 0, /* rightshift */
210 2, /* size (0 = byte, 1 = short, 2 = long) */
211 32, /* bitsize */
b34976b6 212 FALSE, /* pc_relative */
252b5132 213 0, /* bitpos */
86c95733 214 complain_overflow_dont, /* complain_on_overflow */
252b5132
RH
215 bfd_elf_generic_reloc, /* special_function */
216 "R_PPC_ADDR32", /* name */
b34976b6 217 FALSE, /* partial_inplace */
252b5132
RH
218 0, /* src_mask */
219 0xffffffff, /* dst_mask */
b34976b6 220 FALSE), /* pcrel_offset */
252b5132
RH
221
222 /* An absolute 26 bit branch; the lower two bits must be zero.
223 FIXME: we don't check that, we just clear them. */
224 HOWTO (R_PPC_ADDR24, /* type */
225 0, /* rightshift */
226 2, /* size (0 = byte, 1 = short, 2 = long) */
227 26, /* bitsize */
b34976b6 228 FALSE, /* pc_relative */
252b5132 229 0, /* bitpos */
86c95733 230 complain_overflow_signed, /* complain_on_overflow */
252b5132
RH
231 bfd_elf_generic_reloc, /* special_function */
232 "R_PPC_ADDR24", /* name */
b34976b6 233 FALSE, /* partial_inplace */
252b5132
RH
234 0, /* src_mask */
235 0x3fffffc, /* dst_mask */
b34976b6 236 FALSE), /* pcrel_offset */
252b5132
RH
237
238 /* A standard 16 bit relocation. */
239 HOWTO (R_PPC_ADDR16, /* type */
240 0, /* rightshift */
241 1, /* size (0 = byte, 1 = short, 2 = long) */
242 16, /* bitsize */
b34976b6 243 FALSE, /* pc_relative */
252b5132
RH
244 0, /* bitpos */
245 complain_overflow_bitfield, /* complain_on_overflow */
246 bfd_elf_generic_reloc, /* special_function */
247 "R_PPC_ADDR16", /* name */
b34976b6 248 FALSE, /* partial_inplace */
252b5132
RH
249 0, /* src_mask */
250 0xffff, /* dst_mask */
b34976b6 251 FALSE), /* pcrel_offset */
252b5132
RH
252
253 /* A 16 bit relocation without overflow. */
254 HOWTO (R_PPC_ADDR16_LO, /* type */
255 0, /* rightshift */
256 1, /* size (0 = byte, 1 = short, 2 = long) */
257 16, /* bitsize */
b34976b6 258 FALSE, /* pc_relative */
252b5132
RH
259 0, /* bitpos */
260 complain_overflow_dont,/* complain_on_overflow */
261 bfd_elf_generic_reloc, /* special_function */
262 "R_PPC_ADDR16_LO", /* name */
b34976b6 263 FALSE, /* partial_inplace */
252b5132
RH
264 0, /* src_mask */
265 0xffff, /* dst_mask */
b34976b6 266 FALSE), /* pcrel_offset */
252b5132
RH
267
268 /* The high order 16 bits of an address. */
269 HOWTO (R_PPC_ADDR16_HI, /* type */
270 16, /* rightshift */
271 1, /* size (0 = byte, 1 = short, 2 = long) */
272 16, /* bitsize */
b34976b6 273 FALSE, /* pc_relative */
252b5132
RH
274 0, /* bitpos */
275 complain_overflow_dont, /* complain_on_overflow */
276 bfd_elf_generic_reloc, /* special_function */
277 "R_PPC_ADDR16_HI", /* name */
b34976b6 278 FALSE, /* partial_inplace */
252b5132
RH
279 0, /* src_mask */
280 0xffff, /* dst_mask */
b34976b6 281 FALSE), /* pcrel_offset */
252b5132
RH
282
283 /* The high order 16 bits of an address, plus 1 if the contents of
8da6118f 284 the low 16 bits, treated as a signed number, is negative. */
252b5132
RH
285 HOWTO (R_PPC_ADDR16_HA, /* type */
286 16, /* rightshift */
287 1, /* size (0 = byte, 1 = short, 2 = long) */
288 16, /* bitsize */
b34976b6 289 FALSE, /* pc_relative */
252b5132
RH
290 0, /* bitpos */
291 complain_overflow_dont, /* complain_on_overflow */
292 ppc_elf_addr16_ha_reloc, /* special_function */
293 "R_PPC_ADDR16_HA", /* name */
b34976b6 294 FALSE, /* partial_inplace */
252b5132
RH
295 0, /* src_mask */
296 0xffff, /* dst_mask */
b34976b6 297 FALSE), /* pcrel_offset */
252b5132
RH
298
299 /* An absolute 16 bit branch; the lower two bits must be zero.
300 FIXME: we don't check that, we just clear them. */
301 HOWTO (R_PPC_ADDR14, /* type */
302 0, /* rightshift */
303 2, /* size (0 = byte, 1 = short, 2 = long) */
304 16, /* bitsize */
b34976b6 305 FALSE, /* pc_relative */
252b5132 306 0, /* bitpos */
86c95733 307 complain_overflow_signed, /* complain_on_overflow */
252b5132
RH
308 bfd_elf_generic_reloc, /* special_function */
309 "R_PPC_ADDR14", /* name */
b34976b6 310 FALSE, /* partial_inplace */
252b5132
RH
311 0, /* src_mask */
312 0xfffc, /* dst_mask */
b34976b6 313 FALSE), /* pcrel_offset */
252b5132
RH
314
315 /* An absolute 16 bit branch, for which bit 10 should be set to
316 indicate that the branch is expected to be taken. The lower two
8da6118f 317 bits must be zero. */
252b5132
RH
318 HOWTO (R_PPC_ADDR14_BRTAKEN, /* type */
319 0, /* rightshift */
320 2, /* size (0 = byte, 1 = short, 2 = long) */
321 16, /* bitsize */
b34976b6 322 FALSE, /* pc_relative */
252b5132 323 0, /* bitpos */
86c95733 324 complain_overflow_signed, /* complain_on_overflow */
252b5132
RH
325 bfd_elf_generic_reloc, /* special_function */
326 "R_PPC_ADDR14_BRTAKEN",/* name */
b34976b6 327 FALSE, /* partial_inplace */
252b5132
RH
328 0, /* src_mask */
329 0xfffc, /* dst_mask */
b34976b6 330 FALSE), /* pcrel_offset */
252b5132
RH
331
332 /* An absolute 16 bit branch, for which bit 10 should be set to
333 indicate that the branch is not expected to be taken. The lower
334 two bits must be zero. */
335 HOWTO (R_PPC_ADDR14_BRNTAKEN, /* type */
336 0, /* rightshift */
337 2, /* size (0 = byte, 1 = short, 2 = long) */
338 16, /* bitsize */
b34976b6 339 FALSE, /* pc_relative */
252b5132 340 0, /* bitpos */
86c95733 341 complain_overflow_signed, /* complain_on_overflow */
252b5132
RH
342 bfd_elf_generic_reloc, /* special_function */
343 "R_PPC_ADDR14_BRNTAKEN",/* name */
b34976b6 344 FALSE, /* partial_inplace */
252b5132
RH
345 0, /* src_mask */
346 0xfffc, /* dst_mask */
b34976b6 347 FALSE), /* pcrel_offset */
252b5132 348
8da6118f 349 /* A relative 26 bit branch; the lower two bits must be zero. */
252b5132
RH
350 HOWTO (R_PPC_REL24, /* type */
351 0, /* rightshift */
352 2, /* size (0 = byte, 1 = short, 2 = long) */
353 26, /* bitsize */
b34976b6 354 TRUE, /* pc_relative */
252b5132
RH
355 0, /* bitpos */
356 complain_overflow_signed, /* complain_on_overflow */
357 bfd_elf_generic_reloc, /* special_function */
358 "R_PPC_REL24", /* name */
b34976b6 359 FALSE, /* partial_inplace */
252b5132
RH
360 0, /* src_mask */
361 0x3fffffc, /* dst_mask */
b34976b6 362 TRUE), /* pcrel_offset */
252b5132 363
8da6118f 364 /* A relative 16 bit branch; the lower two bits must be zero. */
252b5132
RH
365 HOWTO (R_PPC_REL14, /* type */
366 0, /* rightshift */
367 2, /* size (0 = byte, 1 = short, 2 = long) */
368 16, /* bitsize */
b34976b6 369 TRUE, /* pc_relative */
252b5132
RH
370 0, /* bitpos */
371 complain_overflow_signed, /* complain_on_overflow */
372 bfd_elf_generic_reloc, /* special_function */
373 "R_PPC_REL14", /* name */
b34976b6 374 FALSE, /* partial_inplace */
252b5132
RH
375 0, /* src_mask */
376 0xfffc, /* dst_mask */
b34976b6 377 TRUE), /* pcrel_offset */
252b5132 378
8da6118f 379 /* A relative 16 bit branch. Bit 10 should be set to indicate that
252b5132
RH
380 the branch is expected to be taken. The lower two bits must be
381 zero. */
382 HOWTO (R_PPC_REL14_BRTAKEN, /* type */
383 0, /* rightshift */
384 2, /* size (0 = byte, 1 = short, 2 = long) */
385 16, /* bitsize */
b34976b6 386 TRUE, /* pc_relative */
252b5132
RH
387 0, /* bitpos */
388 complain_overflow_signed, /* complain_on_overflow */
389 bfd_elf_generic_reloc, /* special_function */
390 "R_PPC_REL14_BRTAKEN", /* name */
b34976b6 391 FALSE, /* partial_inplace */
252b5132
RH
392 0, /* src_mask */
393 0xfffc, /* dst_mask */
b34976b6 394 TRUE), /* pcrel_offset */
252b5132 395
8da6118f 396 /* A relative 16 bit branch. Bit 10 should be set to indicate that
252b5132
RH
397 the branch is not expected to be taken. The lower two bits must
398 be zero. */
399 HOWTO (R_PPC_REL14_BRNTAKEN, /* type */
400 0, /* rightshift */
401 2, /* size (0 = byte, 1 = short, 2 = long) */
402 16, /* bitsize */
b34976b6 403 TRUE, /* pc_relative */
252b5132
RH
404 0, /* bitpos */
405 complain_overflow_signed, /* complain_on_overflow */
406 bfd_elf_generic_reloc, /* special_function */
407 "R_PPC_REL14_BRNTAKEN",/* name */
b34976b6 408 FALSE, /* partial_inplace */
252b5132
RH
409 0, /* src_mask */
410 0xfffc, /* dst_mask */
b34976b6 411 TRUE), /* pcrel_offset */
252b5132
RH
412
413 /* Like R_PPC_ADDR16, but referring to the GOT table entry for the
414 symbol. */
415 HOWTO (R_PPC_GOT16, /* type */
416 0, /* rightshift */
417 1, /* size (0 = byte, 1 = short, 2 = long) */
418 16, /* bitsize */
b34976b6 419 FALSE, /* pc_relative */
252b5132
RH
420 0, /* bitpos */
421 complain_overflow_signed, /* complain_on_overflow */
3ce51288 422 ppc_elf_unhandled_reloc, /* special_function */
252b5132 423 "R_PPC_GOT16", /* name */
b34976b6 424 FALSE, /* partial_inplace */
252b5132
RH
425 0, /* src_mask */
426 0xffff, /* dst_mask */
b34976b6 427 FALSE), /* pcrel_offset */
252b5132
RH
428
429 /* Like R_PPC_ADDR16_LO, but referring to the GOT table entry for
430 the symbol. */
431 HOWTO (R_PPC_GOT16_LO, /* type */
432 0, /* rightshift */
433 1, /* size (0 = byte, 1 = short, 2 = long) */
434 16, /* bitsize */
b34976b6 435 FALSE, /* pc_relative */
252b5132
RH
436 0, /* bitpos */
437 complain_overflow_dont, /* complain_on_overflow */
3ce51288 438 ppc_elf_unhandled_reloc, /* special_function */
252b5132 439 "R_PPC_GOT16_LO", /* name */
b34976b6 440 FALSE, /* partial_inplace */
252b5132
RH
441 0, /* src_mask */
442 0xffff, /* dst_mask */
b34976b6 443 FALSE), /* pcrel_offset */
252b5132
RH
444
445 /* Like R_PPC_ADDR16_HI, but referring to the GOT table entry for
446 the symbol. */
447 HOWTO (R_PPC_GOT16_HI, /* type */
448 16, /* rightshift */
449 1, /* size (0 = byte, 1 = short, 2 = long) */
450 16, /* bitsize */
b34976b6 451 FALSE, /* pc_relative */
252b5132 452 0, /* bitpos */
86c95733 453 complain_overflow_dont, /* complain_on_overflow */
3ce51288 454 ppc_elf_unhandled_reloc, /* special_function */
252b5132 455 "R_PPC_GOT16_HI", /* name */
b34976b6 456 FALSE, /* partial_inplace */
252b5132
RH
457 0, /* src_mask */
458 0xffff, /* dst_mask */
b34976b6 459 FALSE), /* pcrel_offset */
252b5132
RH
460
461 /* Like R_PPC_ADDR16_HA, but referring to the GOT table entry for
462 the symbol. */
463 HOWTO (R_PPC_GOT16_HA, /* type */
464 16, /* rightshift */
465 1, /* size (0 = byte, 1 = short, 2 = long) */
466 16, /* bitsize */
b34976b6 467 FALSE, /* pc_relative */
252b5132 468 0, /* bitpos */
86c95733 469 complain_overflow_dont, /* complain_on_overflow */
3ce51288 470 ppc_elf_unhandled_reloc, /* special_function */
252b5132 471 "R_PPC_GOT16_HA", /* name */
b34976b6 472 FALSE, /* partial_inplace */
252b5132
RH
473 0, /* src_mask */
474 0xffff, /* dst_mask */
b34976b6 475 FALSE), /* pcrel_offset */
252b5132
RH
476
477 /* Like R_PPC_REL24, but referring to the procedure linkage table
478 entry for the symbol. */
479 HOWTO (R_PPC_PLTREL24, /* type */
480 0, /* rightshift */
481 2, /* size (0 = byte, 1 = short, 2 = long) */
482 26, /* bitsize */
b34976b6 483 TRUE, /* pc_relative */
252b5132 484 0, /* bitpos */
3ce51288
AM
485 complain_overflow_signed, /* complain_on_overflow */
486 ppc_elf_unhandled_reloc, /* special_function */
252b5132 487 "R_PPC_PLTREL24", /* name */
b34976b6 488 FALSE, /* partial_inplace */
252b5132
RH
489 0, /* src_mask */
490 0x3fffffc, /* dst_mask */
b34976b6 491 TRUE), /* pcrel_offset */
252b5132
RH
492
493 /* This is used only by the dynamic linker. The symbol should exist
494 both in the object being run and in some shared library. The
495 dynamic linker copies the data addressed by the symbol from the
496 shared library into the object, because the object being
497 run has to have the data at some particular address. */
498 HOWTO (R_PPC_COPY, /* type */
499 0, /* rightshift */
500 2, /* size (0 = byte, 1 = short, 2 = long) */
501 32, /* bitsize */
b34976b6 502 FALSE, /* pc_relative */
252b5132 503 0, /* bitpos */
86c95733 504 complain_overflow_dont, /* complain_on_overflow */
3ce51288 505 ppc_elf_unhandled_reloc, /* special_function */
252b5132 506 "R_PPC_COPY", /* name */
b34976b6 507 FALSE, /* partial_inplace */
252b5132
RH
508 0, /* src_mask */
509 0, /* dst_mask */
b34976b6 510 FALSE), /* pcrel_offset */
252b5132
RH
511
512 /* Like R_PPC_ADDR32, but used when setting global offset table
513 entries. */
514 HOWTO (R_PPC_GLOB_DAT, /* type */
515 0, /* rightshift */
516 2, /* size (0 = byte, 1 = short, 2 = long) */
517 32, /* bitsize */
b34976b6 518 FALSE, /* pc_relative */
252b5132 519 0, /* bitpos */
86c95733 520 complain_overflow_dont, /* complain_on_overflow */
3ce51288 521 ppc_elf_unhandled_reloc, /* special_function */
252b5132 522 "R_PPC_GLOB_DAT", /* name */
b34976b6 523 FALSE, /* partial_inplace */
252b5132
RH
524 0, /* src_mask */
525 0xffffffff, /* dst_mask */
b34976b6 526 FALSE), /* pcrel_offset */
252b5132
RH
527
528 /* Marks a procedure linkage table entry for a symbol. */
529 HOWTO (R_PPC_JMP_SLOT, /* type */
530 0, /* rightshift */
531 2, /* size (0 = byte, 1 = short, 2 = long) */
532 32, /* bitsize */
b34976b6 533 FALSE, /* pc_relative */
252b5132 534 0, /* bitpos */
86c95733 535 complain_overflow_dont, /* complain_on_overflow */
3ce51288 536 ppc_elf_unhandled_reloc, /* special_function */
252b5132 537 "R_PPC_JMP_SLOT", /* name */
b34976b6 538 FALSE, /* partial_inplace */
252b5132
RH
539 0, /* src_mask */
540 0, /* dst_mask */
b34976b6 541 FALSE), /* pcrel_offset */
252b5132
RH
542
543 /* Used only by the dynamic linker. When the object is run, this
544 longword is set to the load address of the object, plus the
545 addend. */
546 HOWTO (R_PPC_RELATIVE, /* type */
547 0, /* rightshift */
548 2, /* size (0 = byte, 1 = short, 2 = long) */
549 32, /* bitsize */
b34976b6 550 FALSE, /* pc_relative */
252b5132 551 0, /* bitpos */
86c95733 552 complain_overflow_dont, /* complain_on_overflow */
252b5132
RH
553 bfd_elf_generic_reloc, /* special_function */
554 "R_PPC_RELATIVE", /* name */
b34976b6 555 FALSE, /* partial_inplace */
252b5132
RH
556 0, /* src_mask */
557 0xffffffff, /* dst_mask */
b34976b6 558 FALSE), /* pcrel_offset */
252b5132
RH
559
560 /* Like R_PPC_REL24, but uses the value of the symbol within the
561 object rather than the final value. Normally used for
562 _GLOBAL_OFFSET_TABLE_. */
563 HOWTO (R_PPC_LOCAL24PC, /* type */
564 0, /* rightshift */
565 2, /* size (0 = byte, 1 = short, 2 = long) */
566 26, /* bitsize */
b34976b6 567 TRUE, /* pc_relative */
252b5132
RH
568 0, /* bitpos */
569 complain_overflow_signed, /* complain_on_overflow */
570 bfd_elf_generic_reloc, /* special_function */
571 "R_PPC_LOCAL24PC", /* name */
b34976b6 572 FALSE, /* partial_inplace */
252b5132
RH
573 0, /* src_mask */
574 0x3fffffc, /* dst_mask */
b34976b6 575 TRUE), /* pcrel_offset */
252b5132
RH
576
577 /* Like R_PPC_ADDR32, but may be unaligned. */
578 HOWTO (R_PPC_UADDR32, /* type */
579 0, /* rightshift */
580 2, /* size (0 = byte, 1 = short, 2 = long) */
581 32, /* bitsize */
b34976b6 582 FALSE, /* pc_relative */
252b5132 583 0, /* bitpos */
86c95733 584 complain_overflow_dont, /* complain_on_overflow */
252b5132
RH
585 bfd_elf_generic_reloc, /* special_function */
586 "R_PPC_UADDR32", /* name */
b34976b6 587 FALSE, /* partial_inplace */
252b5132
RH
588 0, /* src_mask */
589 0xffffffff, /* dst_mask */
b34976b6 590 FALSE), /* pcrel_offset */
252b5132
RH
591
592 /* Like R_PPC_ADDR16, but may be unaligned. */
593 HOWTO (R_PPC_UADDR16, /* type */
594 0, /* rightshift */
595 1, /* size (0 = byte, 1 = short, 2 = long) */
596 16, /* bitsize */
b34976b6 597 FALSE, /* pc_relative */
252b5132
RH
598 0, /* bitpos */
599 complain_overflow_bitfield, /* complain_on_overflow */
600 bfd_elf_generic_reloc, /* special_function */
601 "R_PPC_UADDR16", /* name */
b34976b6 602 FALSE, /* partial_inplace */
252b5132
RH
603 0, /* src_mask */
604 0xffff, /* dst_mask */
b34976b6 605 FALSE), /* pcrel_offset */
252b5132
RH
606
607 /* 32-bit PC relative */
608 HOWTO (R_PPC_REL32, /* type */
609 0, /* rightshift */
610 2, /* size (0 = byte, 1 = short, 2 = long) */
611 32, /* bitsize */
b34976b6 612 TRUE, /* pc_relative */
252b5132 613 0, /* bitpos */
86c95733 614 complain_overflow_dont, /* complain_on_overflow */
252b5132
RH
615 bfd_elf_generic_reloc, /* special_function */
616 "R_PPC_REL32", /* name */
b34976b6 617 FALSE, /* partial_inplace */
252b5132
RH
618 0, /* src_mask */
619 0xffffffff, /* dst_mask */
b34976b6 620 TRUE), /* pcrel_offset */
252b5132
RH
621
622 /* 32-bit relocation to the symbol's procedure linkage table.
c3668558 623 FIXME: not supported. */
252b5132
RH
624 HOWTO (R_PPC_PLT32, /* type */
625 0, /* rightshift */
626 2, /* size (0 = byte, 1 = short, 2 = long) */
627 32, /* bitsize */
b34976b6 628 FALSE, /* pc_relative */
252b5132 629 0, /* bitpos */
86c95733 630 complain_overflow_dont, /* complain_on_overflow */
3ce51288 631 ppc_elf_unhandled_reloc, /* special_function */
252b5132 632 "R_PPC_PLT32", /* name */
b34976b6 633 FALSE, /* partial_inplace */
252b5132
RH
634 0, /* src_mask */
635 0, /* dst_mask */
b34976b6 636 FALSE), /* pcrel_offset */
252b5132
RH
637
638 /* 32-bit PC relative relocation to the symbol's procedure linkage table.
c3668558 639 FIXME: not supported. */
252b5132
RH
640 HOWTO (R_PPC_PLTREL32, /* type */
641 0, /* rightshift */
642 2, /* size (0 = byte, 1 = short, 2 = long) */
643 32, /* bitsize */
b34976b6 644 TRUE, /* pc_relative */
252b5132 645 0, /* bitpos */
86c95733 646 complain_overflow_dont, /* complain_on_overflow */
3ce51288 647 ppc_elf_unhandled_reloc, /* special_function */
252b5132 648 "R_PPC_PLTREL32", /* name */
b34976b6 649 FALSE, /* partial_inplace */
252b5132
RH
650 0, /* src_mask */
651 0, /* dst_mask */
b34976b6 652 TRUE), /* pcrel_offset */
252b5132
RH
653
654 /* Like R_PPC_ADDR16_LO, but referring to the PLT table entry for
655 the symbol. */
656 HOWTO (R_PPC_PLT16_LO, /* type */
657 0, /* rightshift */
658 1, /* size (0 = byte, 1 = short, 2 = long) */
659 16, /* bitsize */
b34976b6 660 FALSE, /* pc_relative */
252b5132
RH
661 0, /* bitpos */
662 complain_overflow_dont, /* complain_on_overflow */
3ce51288 663 ppc_elf_unhandled_reloc, /* special_function */
252b5132 664 "R_PPC_PLT16_LO", /* name */
b34976b6 665 FALSE, /* partial_inplace */
252b5132
RH
666 0, /* src_mask */
667 0xffff, /* dst_mask */
b34976b6 668 FALSE), /* pcrel_offset */
252b5132
RH
669
670 /* Like R_PPC_ADDR16_HI, but referring to the PLT table entry for
671 the symbol. */
672 HOWTO (R_PPC_PLT16_HI, /* type */
673 16, /* rightshift */
674 1, /* size (0 = byte, 1 = short, 2 = long) */
675 16, /* bitsize */
b34976b6 676 FALSE, /* pc_relative */
252b5132 677 0, /* bitpos */
86c95733 678 complain_overflow_dont, /* complain_on_overflow */
3ce51288 679 ppc_elf_unhandled_reloc, /* special_function */
252b5132 680 "R_PPC_PLT16_HI", /* name */
b34976b6 681 FALSE, /* partial_inplace */
252b5132
RH
682 0, /* src_mask */
683 0xffff, /* dst_mask */
b34976b6 684 FALSE), /* pcrel_offset */
252b5132
RH
685
686 /* Like R_PPC_ADDR16_HA, but referring to the PLT table entry for
687 the symbol. */
688 HOWTO (R_PPC_PLT16_HA, /* type */
689 16, /* rightshift */
690 1, /* size (0 = byte, 1 = short, 2 = long) */
691 16, /* bitsize */
b34976b6 692 FALSE, /* pc_relative */
252b5132 693 0, /* bitpos */
86c95733 694 complain_overflow_dont, /* complain_on_overflow */
3ce51288 695 ppc_elf_unhandled_reloc, /* special_function */
252b5132 696 "R_PPC_PLT16_HA", /* name */
b34976b6 697 FALSE, /* partial_inplace */
252b5132
RH
698 0, /* src_mask */
699 0xffff, /* dst_mask */
b34976b6 700 FALSE), /* pcrel_offset */
252b5132
RH
701
702 /* A sign-extended 16 bit value relative to _SDA_BASE_, for use with
703 small data items. */
704 HOWTO (R_PPC_SDAREL16, /* type */
705 0, /* rightshift */
706 1, /* size (0 = byte, 1 = short, 2 = long) */
707 16, /* bitsize */
b34976b6 708 FALSE, /* pc_relative */
252b5132
RH
709 0, /* bitpos */
710 complain_overflow_signed, /* complain_on_overflow */
3ce51288 711 ppc_elf_unhandled_reloc, /* special_function */
252b5132 712 "R_PPC_SDAREL16", /* name */
b34976b6 713 FALSE, /* partial_inplace */
252b5132
RH
714 0, /* src_mask */
715 0xffff, /* dst_mask */
b34976b6 716 FALSE), /* pcrel_offset */
252b5132 717
c061c2d8 718 /* 16-bit section relative relocation. */
252b5132
RH
719 HOWTO (R_PPC_SECTOFF, /* type */
720 0, /* rightshift */
c061c2d8
AM
721 1, /* size (0 = byte, 1 = short, 2 = long) */
722 16, /* bitsize */
b34976b6 723 FALSE, /* pc_relative */
252b5132 724 0, /* bitpos */
86c95733 725 complain_overflow_signed, /* complain_on_overflow */
3ce51288 726 ppc_elf_unhandled_reloc, /* special_function */
252b5132 727 "R_PPC_SECTOFF", /* name */
b34976b6 728 FALSE, /* partial_inplace */
252b5132 729 0, /* src_mask */
c061c2d8 730 0xffff, /* dst_mask */
b34976b6 731 FALSE), /* pcrel_offset */
252b5132 732
c3668558 733 /* 16-bit lower half section relative relocation. */
252b5132
RH
734 HOWTO (R_PPC_SECTOFF_LO, /* type */
735 0, /* rightshift */
736 1, /* size (0 = byte, 1 = short, 2 = long) */
737 16, /* bitsize */
b34976b6 738 FALSE, /* pc_relative */
252b5132
RH
739 0, /* bitpos */
740 complain_overflow_dont, /* complain_on_overflow */
3ce51288 741 ppc_elf_unhandled_reloc, /* special_function */
252b5132 742 "R_PPC_SECTOFF_LO", /* name */
b34976b6 743 FALSE, /* partial_inplace */
252b5132
RH
744 0, /* src_mask */
745 0xffff, /* dst_mask */
b34976b6 746 FALSE), /* pcrel_offset */
252b5132 747
c3668558 748 /* 16-bit upper half section relative relocation. */
252b5132
RH
749 HOWTO (R_PPC_SECTOFF_HI, /* type */
750 16, /* rightshift */
751 1, /* size (0 = byte, 1 = short, 2 = long) */
752 16, /* bitsize */
b34976b6 753 FALSE, /* pc_relative */
252b5132 754 0, /* bitpos */
86c95733 755 complain_overflow_dont, /* complain_on_overflow */
3ce51288 756 ppc_elf_unhandled_reloc, /* special_function */
252b5132 757 "R_PPC_SECTOFF_HI", /* name */
b34976b6 758 FALSE, /* partial_inplace */
252b5132
RH
759 0, /* src_mask */
760 0xffff, /* dst_mask */
b34976b6 761 FALSE), /* pcrel_offset */
252b5132 762
c3668558 763 /* 16-bit upper half adjusted section relative relocation. */
252b5132
RH
764 HOWTO (R_PPC_SECTOFF_HA, /* type */
765 16, /* rightshift */
766 1, /* size (0 = byte, 1 = short, 2 = long) */
767 16, /* bitsize */
b34976b6 768 FALSE, /* pc_relative */
252b5132 769 0, /* bitpos */
86c95733 770 complain_overflow_dont, /* complain_on_overflow */
3ce51288 771 ppc_elf_unhandled_reloc, /* special_function */
252b5132 772 "R_PPC_SECTOFF_HA", /* name */
b34976b6 773 FALSE, /* partial_inplace */
252b5132
RH
774 0, /* src_mask */
775 0xffff, /* dst_mask */
b34976b6 776 FALSE), /* pcrel_offset */
252b5132 777
727fc41e 778 /* Marker relocs for TLS. */
7619e7c7 779 HOWTO (R_PPC_TLS,
252b5132
RH
780 0, /* rightshift */
781 2, /* size (0 = byte, 1 = short, 2 = long) */
782 32, /* bitsize */
b34976b6 783 FALSE, /* pc_relative */
252b5132 784 0, /* bitpos */
7619e7c7 785 complain_overflow_dont, /* complain_on_overflow */
252b5132 786 bfd_elf_generic_reloc, /* special_function */
7619e7c7
AM
787 "R_PPC_TLS", /* name */
788 FALSE, /* partial_inplace */
789 0, /* src_mask */
790 0, /* dst_mask */
791 FALSE), /* pcrel_offset */
792
727fc41e
AM
793 HOWTO (R_PPC_TLSGD,
794 0, /* rightshift */
795 2, /* size (0 = byte, 1 = short, 2 = long) */
796 32, /* bitsize */
797 FALSE, /* pc_relative */
798 0, /* bitpos */
799 complain_overflow_dont, /* complain_on_overflow */
800 bfd_elf_generic_reloc, /* special_function */
801 "R_PPC_TLSGD", /* name */
802 FALSE, /* partial_inplace */
803 0, /* src_mask */
804 0, /* dst_mask */
805 FALSE), /* pcrel_offset */
806
807 HOWTO (R_PPC_TLSLD,
808 0, /* rightshift */
809 2, /* size (0 = byte, 1 = short, 2 = long) */
810 32, /* bitsize */
811 FALSE, /* pc_relative */
812 0, /* bitpos */
813 complain_overflow_dont, /* complain_on_overflow */
814 bfd_elf_generic_reloc, /* special_function */
815 "R_PPC_TLSLD", /* name */
816 FALSE, /* partial_inplace */
817 0, /* src_mask */
818 0, /* dst_mask */
819 FALSE), /* pcrel_offset */
820
23cedd1d
AM
821 /* Marker relocs on inline plt call instructions. */
822 HOWTO (R_PPC_PLTSEQ,
823 0, /* rightshift */
824 2, /* size (0 = byte, 1 = short, 2 = long) */
825 32, /* bitsize */
826 FALSE, /* pc_relative */
827 0, /* bitpos */
828 complain_overflow_dont, /* complain_on_overflow */
829 bfd_elf_generic_reloc, /* special_function */
830 "R_PPC_PLTSEQ", /* name */
831 FALSE, /* partial_inplace */
832 0, /* src_mask */
833 0, /* dst_mask */
834 FALSE), /* pcrel_offset */
835
836 HOWTO (R_PPC_PLTCALL,
837 0, /* rightshift */
838 2, /* size (0 = byte, 1 = short, 2 = long) */
839 32, /* bitsize */
840 FALSE, /* pc_relative */
841 0, /* bitpos */
842 complain_overflow_dont, /* complain_on_overflow */
843 bfd_elf_generic_reloc, /* special_function */
844 "R_PPC_PLTCALL", /* name */
845 FALSE, /* partial_inplace */
846 0, /* src_mask */
847 0, /* dst_mask */
848 FALSE), /* pcrel_offset */
849
7619e7c7
AM
850 /* Computes the load module index of the load module that contains the
851 definition of its TLS sym. */
852 HOWTO (R_PPC_DTPMOD32,
853 0, /* rightshift */
854 2, /* size (0 = byte, 1 = short, 2 = long) */
855 32, /* bitsize */
856 FALSE, /* pc_relative */
857 0, /* bitpos */
858 complain_overflow_dont, /* complain_on_overflow */
859 ppc_elf_unhandled_reloc, /* special_function */
860 "R_PPC_DTPMOD32", /* name */
b34976b6 861 FALSE, /* partial_inplace */
252b5132
RH
862 0, /* src_mask */
863 0xffffffff, /* dst_mask */
b34976b6 864 FALSE), /* pcrel_offset */
252b5132 865
7619e7c7
AM
866 /* Computes a dtv-relative displacement, the difference between the value
867 of sym+add and the base address of the thread-local storage block that
868 contains the definition of sym, minus 0x8000. */
869 HOWTO (R_PPC_DTPREL32,
870 0, /* rightshift */
871 2, /* size (0 = byte, 1 = short, 2 = long) */
872 32, /* bitsize */
873 FALSE, /* pc_relative */
874 0, /* bitpos */
875 complain_overflow_dont, /* complain_on_overflow */
876 ppc_elf_unhandled_reloc, /* special_function */
877 "R_PPC_DTPREL32", /* name */
878 FALSE, /* partial_inplace */
879 0, /* src_mask */
880 0xffffffff, /* dst_mask */
881 FALSE), /* pcrel_offset */
882
883 /* A 16 bit dtprel reloc. */
884 HOWTO (R_PPC_DTPREL16,
252b5132
RH
885 0, /* rightshift */
886 1, /* size (0 = byte, 1 = short, 2 = long) */
887 16, /* bitsize */
b34976b6 888 FALSE, /* pc_relative */
252b5132 889 0, /* bitpos */
7619e7c7
AM
890 complain_overflow_signed, /* complain_on_overflow */
891 ppc_elf_unhandled_reloc, /* special_function */
892 "R_PPC_DTPREL16", /* name */
b34976b6 893 FALSE, /* partial_inplace */
252b5132
RH
894 0, /* src_mask */
895 0xffff, /* dst_mask */
b34976b6 896 FALSE), /* pcrel_offset */
252b5132 897
7619e7c7
AM
898 /* Like DTPREL16, but no overflow. */
899 HOWTO (R_PPC_DTPREL16_LO,
252b5132
RH
900 0, /* rightshift */
901 1, /* size (0 = byte, 1 = short, 2 = long) */
902 16, /* bitsize */
b34976b6 903 FALSE, /* pc_relative */
252b5132 904 0, /* bitpos */
7619e7c7
AM
905 complain_overflow_dont, /* complain_on_overflow */
906 ppc_elf_unhandled_reloc, /* special_function */
907 "R_PPC_DTPREL16_LO", /* name */
b34976b6 908 FALSE, /* partial_inplace */
252b5132
RH
909 0, /* src_mask */
910 0xffff, /* dst_mask */
b34976b6 911 FALSE), /* pcrel_offset */
252b5132 912
7619e7c7
AM
913 /* Like DTPREL16_LO, but next higher group of 16 bits. */
914 HOWTO (R_PPC_DTPREL16_HI,
252b5132
RH
915 16, /* rightshift */
916 1, /* size (0 = byte, 1 = short, 2 = long) */
917 16, /* bitsize */
b34976b6 918 FALSE, /* pc_relative */
252b5132
RH
919 0, /* bitpos */
920 complain_overflow_dont, /* complain_on_overflow */
7619e7c7
AM
921 ppc_elf_unhandled_reloc, /* special_function */
922 "R_PPC_DTPREL16_HI", /* name */
b34976b6 923 FALSE, /* partial_inplace */
252b5132
RH
924 0, /* src_mask */
925 0xffff, /* dst_mask */
b34976b6 926 FALSE), /* pcrel_offset */
252b5132 927
7619e7c7
AM
928 /* Like DTPREL16_HI, but adjust for low 16 bits. */
929 HOWTO (R_PPC_DTPREL16_HA,
252b5132
RH
930 16, /* rightshift */
931 1, /* size (0 = byte, 1 = short, 2 = long) */
932 16, /* bitsize */
b34976b6 933 FALSE, /* pc_relative */
252b5132
RH
934 0, /* bitpos */
935 complain_overflow_dont, /* complain_on_overflow */
7619e7c7
AM
936 ppc_elf_unhandled_reloc, /* special_function */
937 "R_PPC_DTPREL16_HA", /* name */
b34976b6 938 FALSE, /* partial_inplace */
252b5132
RH
939 0, /* src_mask */
940 0xffff, /* dst_mask */
b34976b6 941 FALSE), /* pcrel_offset */
252b5132 942
7619e7c7
AM
943 /* Computes a tp-relative displacement, the difference between the value of
944 sym+add and the value of the thread pointer (r13). */
945 HOWTO (R_PPC_TPREL32,
946 0, /* rightshift */
947 2, /* size (0 = byte, 1 = short, 2 = long) */
948 32, /* bitsize */
949 FALSE, /* pc_relative */
950 0, /* bitpos */
951 complain_overflow_dont, /* complain_on_overflow */
952 ppc_elf_unhandled_reloc, /* special_function */
953 "R_PPC_TPREL32", /* name */
954 FALSE, /* partial_inplace */
955 0, /* src_mask */
956 0xffffffff, /* dst_mask */
957 FALSE), /* pcrel_offset */
958
959 /* A 16 bit tprel reloc. */
960 HOWTO (R_PPC_TPREL16,
252b5132
RH
961 0, /* rightshift */
962 1, /* size (0 = byte, 1 = short, 2 = long) */
963 16, /* bitsize */
b34976b6 964 FALSE, /* pc_relative */
252b5132 965 0, /* bitpos */
7619e7c7
AM
966 complain_overflow_signed, /* complain_on_overflow */
967 ppc_elf_unhandled_reloc, /* special_function */
968 "R_PPC_TPREL16", /* name */
b34976b6 969 FALSE, /* partial_inplace */
252b5132
RH
970 0, /* src_mask */
971 0xffff, /* dst_mask */
b34976b6 972 FALSE), /* pcrel_offset */
252b5132 973
7619e7c7
AM
974 /* Like TPREL16, but no overflow. */
975 HOWTO (R_PPC_TPREL16_LO,
252b5132
RH
976 0, /* rightshift */
977 1, /* size (0 = byte, 1 = short, 2 = long) */
978 16, /* bitsize */
b34976b6 979 FALSE, /* pc_relative */
252b5132 980 0, /* bitpos */
7619e7c7
AM
981 complain_overflow_dont, /* complain_on_overflow */
982 ppc_elf_unhandled_reloc, /* special_function */
983 "R_PPC_TPREL16_LO", /* name */
b34976b6 984 FALSE, /* partial_inplace */
252b5132
RH
985 0, /* src_mask */
986 0xffff, /* dst_mask */
b34976b6 987 FALSE), /* pcrel_offset */
252b5132 988
7619e7c7
AM
989 /* Like TPREL16_LO, but next higher group of 16 bits. */
990 HOWTO (R_PPC_TPREL16_HI,
991 16, /* rightshift */
992 1, /* size (0 = byte, 1 = short, 2 = long) */
993 16, /* bitsize */
994 FALSE, /* pc_relative */
995 0, /* bitpos */
996 complain_overflow_dont, /* complain_on_overflow */
997 ppc_elf_unhandled_reloc, /* special_function */
998 "R_PPC_TPREL16_HI", /* name */
999 FALSE, /* partial_inplace */
1000 0, /* src_mask */
1001 0xffff, /* dst_mask */
1002 FALSE), /* pcrel_offset */
1003
1004 /* Like TPREL16_HI, but adjust for low 16 bits. */
1005 HOWTO (R_PPC_TPREL16_HA,
1006 16, /* rightshift */
1007 1, /* size (0 = byte, 1 = short, 2 = long) */
1008 16, /* bitsize */
1009 FALSE, /* pc_relative */
1010 0, /* bitpos */
1011 complain_overflow_dont, /* complain_on_overflow */
1012 ppc_elf_unhandled_reloc, /* special_function */
1013 "R_PPC_TPREL16_HA", /* name */
1014 FALSE, /* partial_inplace */
1015 0, /* src_mask */
1016 0xffff, /* dst_mask */
1017 FALSE), /* pcrel_offset */
1018
1019 /* Allocates two contiguous entries in the GOT to hold a tls_index structure,
1020 with values (sym+add)@dtpmod and (sym+add)@dtprel, and computes the offset
1021 to the first entry. */
1022 HOWTO (R_PPC_GOT_TLSGD16,
252b5132
RH
1023 0, /* rightshift */
1024 1, /* size (0 = byte, 1 = short, 2 = long) */
1025 16, /* bitsize */
b34976b6 1026 FALSE, /* pc_relative */
252b5132
RH
1027 0, /* bitpos */
1028 complain_overflow_signed, /* complain_on_overflow */
7619e7c7
AM
1029 ppc_elf_unhandled_reloc, /* special_function */
1030 "R_PPC_GOT_TLSGD16", /* name */
b34976b6 1031 FALSE, /* partial_inplace */
252b5132
RH
1032 0, /* src_mask */
1033 0xffff, /* dst_mask */
b34976b6 1034 FALSE), /* pcrel_offset */
252b5132 1035
7619e7c7
AM
1036 /* Like GOT_TLSGD16, but no overflow. */
1037 HOWTO (R_PPC_GOT_TLSGD16_LO,
252b5132 1038 0, /* rightshift */
7619e7c7 1039 1, /* size (0 = byte, 1 = short, 2 = long) */
252b5132 1040 16, /* bitsize */
b34976b6 1041 FALSE, /* pc_relative */
252b5132 1042 0, /* bitpos */
7619e7c7
AM
1043 complain_overflow_dont, /* complain_on_overflow */
1044 ppc_elf_unhandled_reloc, /* special_function */
1045 "R_PPC_GOT_TLSGD16_LO", /* name */
b34976b6 1046 FALSE, /* partial_inplace */
252b5132
RH
1047 0, /* src_mask */
1048 0xffff, /* dst_mask */
b34976b6 1049 FALSE), /* pcrel_offset */
252b5132 1050
7619e7c7
AM
1051 /* Like GOT_TLSGD16_LO, but next higher group of 16 bits. */
1052 HOWTO (R_PPC_GOT_TLSGD16_HI,
1053 16, /* rightshift */
1054 1, /* size (0 = byte, 1 = short, 2 = long) */
1055 16, /* bitsize */
1056 FALSE, /* pc_relative */
1057 0, /* bitpos */
1058 complain_overflow_dont, /* complain_on_overflow */
1059 ppc_elf_unhandled_reloc, /* special_function */
1060 "R_PPC_GOT_TLSGD16_HI", /* name */
1061 FALSE, /* partial_inplace */
1062 0, /* src_mask */
1063 0xffff, /* dst_mask */
1064 FALSE), /* pcrel_offset */
252b5132 1065
7619e7c7
AM
1066 /* Like GOT_TLSGD16_HI, but adjust for low 16 bits. */
1067 HOWTO (R_PPC_GOT_TLSGD16_HA,
1068 16, /* rightshift */
1069 1, /* size (0 = byte, 1 = short, 2 = long) */
1070 16, /* bitsize */
1071 FALSE, /* pc_relative */
1072 0, /* bitpos */
1073 complain_overflow_dont, /* complain_on_overflow */
1074 ppc_elf_unhandled_reloc, /* special_function */
1075 "R_PPC_GOT_TLSGD16_HA", /* name */
1076 FALSE, /* partial_inplace */
1077 0, /* src_mask */
1078 0xffff, /* dst_mask */
1079 FALSE), /* pcrel_offset */
1080
1081 /* Allocates two contiguous entries in the GOT to hold a tls_index structure,
1082 with values (sym+add)@dtpmod and zero, and computes the offset to the
1083 first entry. */
1084 HOWTO (R_PPC_GOT_TLSLD16,
252b5132
RH
1085 0, /* rightshift */
1086 1, /* size (0 = byte, 1 = short, 2 = long) */
1087 16, /* bitsize */
7619e7c7 1088 FALSE, /* pc_relative */
252b5132
RH
1089 0, /* bitpos */
1090 complain_overflow_signed, /* complain_on_overflow */
7619e7c7
AM
1091 ppc_elf_unhandled_reloc, /* special_function */
1092 "R_PPC_GOT_TLSLD16", /* name */
b34976b6 1093 FALSE, /* partial_inplace */
252b5132
RH
1094 0, /* src_mask */
1095 0xffff, /* dst_mask */
b34976b6 1096 FALSE), /* pcrel_offset */
252b5132 1097
7619e7c7
AM
1098 /* Like GOT_TLSLD16, but no overflow. */
1099 HOWTO (R_PPC_GOT_TLSLD16_LO,
252b5132 1100 0, /* rightshift */
7619e7c7
AM
1101 1, /* size (0 = byte, 1 = short, 2 = long) */
1102 16, /* bitsize */
b34976b6 1103 FALSE, /* pc_relative */
252b5132
RH
1104 0, /* bitpos */
1105 complain_overflow_dont, /* complain_on_overflow */
7619e7c7
AM
1106 ppc_elf_unhandled_reloc, /* special_function */
1107 "R_PPC_GOT_TLSLD16_LO", /* name */
b34976b6 1108 FALSE, /* partial_inplace */
252b5132 1109 0, /* src_mask */
7619e7c7 1110 0xffff, /* dst_mask */
b34976b6 1111 FALSE), /* pcrel_offset */
252b5132 1112
7619e7c7
AM
1113 /* Like GOT_TLSLD16_LO, but next higher group of 16 bits. */
1114 HOWTO (R_PPC_GOT_TLSLD16_HI,
1115 16, /* rightshift */
1116 1, /* size (0 = byte, 1 = short, 2 = long) */
1117 16, /* bitsize */
b34976b6 1118 FALSE, /* pc_relative */
252b5132
RH
1119 0, /* bitpos */
1120 complain_overflow_dont, /* complain_on_overflow */
7619e7c7
AM
1121 ppc_elf_unhandled_reloc, /* special_function */
1122 "R_PPC_GOT_TLSLD16_HI", /* name */
b34976b6 1123 FALSE, /* partial_inplace */
252b5132 1124 0, /* src_mask */
7619e7c7 1125 0xffff, /* dst_mask */
b34976b6 1126 FALSE), /* pcrel_offset */
252b5132 1127
7619e7c7
AM
1128 /* Like GOT_TLSLD16_HI, but adjust for low 16 bits. */
1129 HOWTO (R_PPC_GOT_TLSLD16_HA,
1130 16, /* rightshift */
1131 1, /* size (0 = byte, 1 = short, 2 = long) */
1132 16, /* bitsize */
1133 FALSE, /* pc_relative */
1134 0, /* bitpos */
1135 complain_overflow_dont, /* complain_on_overflow */
1136 ppc_elf_unhandled_reloc, /* special_function */
1137 "R_PPC_GOT_TLSLD16_HA", /* name */
1138 FALSE, /* partial_inplace */
1139 0, /* src_mask */
1140 0xffff, /* dst_mask */
1141 FALSE), /* pcrel_offset */
1142
1143 /* Allocates an entry in the GOT with value (sym+add)@dtprel, and computes
1144 the offset to the entry. */
1145 HOWTO (R_PPC_GOT_DTPREL16,
252b5132
RH
1146 0, /* rightshift */
1147 1, /* size (0 = byte, 1 = short, 2 = long) */
1148 16, /* bitsize */
b34976b6 1149 FALSE, /* pc_relative */
252b5132
RH
1150 0, /* bitpos */
1151 complain_overflow_signed, /* complain_on_overflow */
7619e7c7
AM
1152 ppc_elf_unhandled_reloc, /* special_function */
1153 "R_PPC_GOT_DTPREL16", /* name */
b34976b6 1154 FALSE, /* partial_inplace */
252b5132
RH
1155 0, /* src_mask */
1156 0xffff, /* dst_mask */
b34976b6 1157 FALSE), /* pcrel_offset */
252b5132 1158
7619e7c7
AM
1159 /* Like GOT_DTPREL16, but no overflow. */
1160 HOWTO (R_PPC_GOT_DTPREL16_LO,
1161 0, /* rightshift */
1162 1, /* size (0 = byte, 1 = short, 2 = long) */
1163 16, /* bitsize */
1164 FALSE, /* pc_relative */
1165 0, /* bitpos */
1166 complain_overflow_dont, /* complain_on_overflow */
1167 ppc_elf_unhandled_reloc, /* special_function */
1168 "R_PPC_GOT_DTPREL16_LO", /* name */
1169 FALSE, /* partial_inplace */
1170 0, /* src_mask */
1171 0xffff, /* dst_mask */
1172 FALSE), /* pcrel_offset */
252b5132 1173
7619e7c7
AM
1174 /* Like GOT_DTPREL16_LO, but next higher group of 16 bits. */
1175 HOWTO (R_PPC_GOT_DTPREL16_HI,
1176 16, /* rightshift */
1177 1, /* size (0 = byte, 1 = short, 2 = long) */
1178 16, /* bitsize */
1179 FALSE, /* pc_relative */
1180 0, /* bitpos */
1181 complain_overflow_dont, /* complain_on_overflow */
1182 ppc_elf_unhandled_reloc, /* special_function */
1183 "R_PPC_GOT_DTPREL16_HI", /* name */
1184 FALSE, /* partial_inplace */
1185 0, /* src_mask */
1186 0xffff, /* dst_mask */
1187 FALSE), /* pcrel_offset */
252b5132 1188
7619e7c7
AM
1189 /* Like GOT_DTPREL16_HI, but adjust for low 16 bits. */
1190 HOWTO (R_PPC_GOT_DTPREL16_HA,
1191 16, /* rightshift */
1192 1, /* size (0 = byte, 1 = short, 2 = long) */
1193 16, /* bitsize */
1194 FALSE, /* pc_relative */
1195 0, /* bitpos */
1196 complain_overflow_dont, /* complain_on_overflow */
1197 ppc_elf_unhandled_reloc, /* special_function */
1198 "R_PPC_GOT_DTPREL16_HA", /* name */
1199 FALSE, /* partial_inplace */
1200 0, /* src_mask */
1201 0xffff, /* dst_mask */
1202 FALSE), /* pcrel_offset */
c3668558 1203
7619e7c7
AM
1204 /* Allocates an entry in the GOT with value (sym+add)@tprel, and computes the
1205 offset to the entry. */
1206 HOWTO (R_PPC_GOT_TPREL16,
1207 0, /* rightshift */
1208 1, /* size (0 = byte, 1 = short, 2 = long) */
1209 16, /* bitsize */
1210 FALSE, /* pc_relative */
1211 0, /* bitpos */
1212 complain_overflow_signed, /* complain_on_overflow */
1213 ppc_elf_unhandled_reloc, /* special_function */
1214 "R_PPC_GOT_TPREL16", /* name */
1215 FALSE, /* partial_inplace */
1216 0, /* src_mask */
1217 0xffff, /* dst_mask */
1218 FALSE), /* pcrel_offset */
1219
1220 /* Like GOT_TPREL16, but no overflow. */
1221 HOWTO (R_PPC_GOT_TPREL16_LO,
1222 0, /* rightshift */
1223 1, /* size (0 = byte, 1 = short, 2 = long) */
1224 16, /* bitsize */
1225 FALSE, /* pc_relative */
1226 0, /* bitpos */
1227 complain_overflow_dont, /* complain_on_overflow */
1228 ppc_elf_unhandled_reloc, /* special_function */
1229 "R_PPC_GOT_TPREL16_LO", /* name */
1230 FALSE, /* partial_inplace */
1231 0, /* src_mask */
1232 0xffff, /* dst_mask */
1233 FALSE), /* pcrel_offset */
1234
1235 /* Like GOT_TPREL16_LO, but next higher group of 16 bits. */
1236 HOWTO (R_PPC_GOT_TPREL16_HI,
1237 16, /* rightshift */
1238 1, /* size (0 = byte, 1 = short, 2 = long) */
1239 16, /* bitsize */
1240 FALSE, /* pc_relative */
1241 0, /* bitpos */
1242 complain_overflow_dont, /* complain_on_overflow */
1243 ppc_elf_unhandled_reloc, /* special_function */
1244 "R_PPC_GOT_TPREL16_HI", /* name */
1245 FALSE, /* partial_inplace */
1246 0, /* src_mask */
1247 0xffff, /* dst_mask */
1248 FALSE), /* pcrel_offset */
1249
1250 /* Like GOT_TPREL16_HI, but adjust for low 16 bits. */
1251 HOWTO (R_PPC_GOT_TPREL16_HA,
1252 16, /* rightshift */
1253 1, /* size (0 = byte, 1 = short, 2 = long) */
1254 16, /* bitsize */
1255 FALSE, /* pc_relative */
1256 0, /* bitpos */
1257 complain_overflow_dont, /* complain_on_overflow */
1258 ppc_elf_unhandled_reloc, /* special_function */
1259 "R_PPC_GOT_TPREL16_HA", /* name */
1260 FALSE, /* partial_inplace */
1261 0, /* src_mask */
1262 0xffff, /* dst_mask */
1263 FALSE), /* pcrel_offset */
1264
1265 /* The remaining relocs are from the Embedded ELF ABI, and are not
1266 in the SVR4 ELF ABI. */
1267
1268 /* 32 bit value resulting from the addend minus the symbol. */
1269 HOWTO (R_PPC_EMB_NADDR32, /* type */
1270 0, /* rightshift */
1271 2, /* size (0 = byte, 1 = short, 2 = long) */
1272 32, /* bitsize */
1273 FALSE, /* pc_relative */
1274 0, /* bitpos */
86c95733 1275 complain_overflow_dont, /* complain_on_overflow */
3ce51288 1276 ppc_elf_unhandled_reloc, /* special_function */
7619e7c7
AM
1277 "R_PPC_EMB_NADDR32", /* name */
1278 FALSE, /* partial_inplace */
1279 0, /* src_mask */
1280 0xffffffff, /* dst_mask */
1281 FALSE), /* pcrel_offset */
1282
1283 /* 16 bit value resulting from the addend minus the symbol. */
1284 HOWTO (R_PPC_EMB_NADDR16, /* type */
1285 0, /* rightshift */
1286 1, /* size (0 = byte, 1 = short, 2 = long) */
1287 16, /* bitsize */
1288 FALSE, /* pc_relative */
1289 0, /* bitpos */
86c95733 1290 complain_overflow_signed, /* complain_on_overflow */
3ce51288 1291 ppc_elf_unhandled_reloc, /* special_function */
7619e7c7
AM
1292 "R_PPC_EMB_NADDR16", /* name */
1293 FALSE, /* partial_inplace */
1294 0, /* src_mask */
1295 0xffff, /* dst_mask */
1296 FALSE), /* pcrel_offset */
1297
1298 /* 16 bit value resulting from the addend minus the symbol. */
1299 HOWTO (R_PPC_EMB_NADDR16_LO, /* type */
1300 0, /* rightshift */
1301 1, /* size (0 = byte, 1 = short, 2 = long) */
1302 16, /* bitsize */
1303 FALSE, /* pc_relative */
1304 0, /* bitpos */
1305 complain_overflow_dont,/* complain_on_overflow */
3ce51288 1306 ppc_elf_unhandled_reloc, /* special_function */
7619e7c7
AM
1307 "R_PPC_EMB_ADDR16_LO", /* name */
1308 FALSE, /* partial_inplace */
1309 0, /* src_mask */
1310 0xffff, /* dst_mask */
1311 FALSE), /* pcrel_offset */
1312
1313 /* The high order 16 bits of the addend minus the symbol. */
1314 HOWTO (R_PPC_EMB_NADDR16_HI, /* type */
1315 16, /* rightshift */
1316 1, /* size (0 = byte, 1 = short, 2 = long) */
1317 16, /* bitsize */
1318 FALSE, /* pc_relative */
1319 0, /* bitpos */
1320 complain_overflow_dont, /* complain_on_overflow */
3ce51288 1321 ppc_elf_unhandled_reloc, /* special_function */
7619e7c7
AM
1322 "R_PPC_EMB_NADDR16_HI", /* name */
1323 FALSE, /* partial_inplace */
1324 0, /* src_mask */
1325 0xffff, /* dst_mask */
1326 FALSE), /* pcrel_offset */
1327
1328 /* The high order 16 bits of the result of the addend minus the address,
1329 plus 1 if the contents of the low 16 bits, treated as a signed number,
1330 is negative. */
1331 HOWTO (R_PPC_EMB_NADDR16_HA, /* type */
1332 16, /* rightshift */
1333 1, /* size (0 = byte, 1 = short, 2 = long) */
1334 16, /* bitsize */
1335 FALSE, /* pc_relative */
1336 0, /* bitpos */
1337 complain_overflow_dont, /* complain_on_overflow */
3ce51288 1338 ppc_elf_unhandled_reloc, /* special_function */
25dbc73a
AM
1339 "R_PPC_EMB_NADDR16_HA", /* name */
1340 FALSE, /* partial_inplace */
1341 0, /* src_mask */
1342 0xffff, /* dst_mask */
1343 FALSE), /* pcrel_offset */
1344
1345 /* 16 bit value resulting from allocating a 4 byte word to hold an
1346 address in the .sdata section, and returning the offset from
1347 _SDA_BASE_ for that relocation. */
1348 HOWTO (R_PPC_EMB_SDAI16, /* type */
1349 0, /* rightshift */
1350 1, /* size (0 = byte, 1 = short, 2 = long) */
1351 16, /* bitsize */
1352 FALSE, /* pc_relative */
1353 0, /* bitpos */
bd6c6e2b 1354 complain_overflow_signed, /* complain_on_overflow */
3ce51288 1355 ppc_elf_unhandled_reloc, /* special_function */
25dbc73a
AM
1356 "R_PPC_EMB_SDAI16", /* name */
1357 FALSE, /* partial_inplace */
1358 0, /* src_mask */
1359 0xffff, /* dst_mask */
1360 FALSE), /* pcrel_offset */
1361
1362 /* 16 bit value resulting from allocating a 4 byte word to hold an
1363 address in the .sdata2 section, and returning the offset from
1364 _SDA2_BASE_ for that relocation. */
1365 HOWTO (R_PPC_EMB_SDA2I16, /* type */
1366 0, /* rightshift */
1367 1, /* size (0 = byte, 1 = short, 2 = long) */
1368 16, /* bitsize */
1369 FALSE, /* pc_relative */
1370 0, /* bitpos */
bd6c6e2b 1371 complain_overflow_signed, /* complain_on_overflow */
3ce51288 1372 ppc_elf_unhandled_reloc, /* special_function */
25dbc73a
AM
1373 "R_PPC_EMB_SDA2I16", /* name */
1374 FALSE, /* partial_inplace */
1375 0, /* src_mask */
1376 0xffff, /* dst_mask */
1377 FALSE), /* pcrel_offset */
1378
1379 /* A sign-extended 16 bit value relative to _SDA2_BASE_, for use with
1380 small data items. */
1381 HOWTO (R_PPC_EMB_SDA2REL, /* type */
1382 0, /* rightshift */
1383 1, /* size (0 = byte, 1 = short, 2 = long) */
1384 16, /* bitsize */
1385 FALSE, /* pc_relative */
1386 0, /* bitpos */
1387 complain_overflow_signed, /* complain_on_overflow */
3ce51288 1388 ppc_elf_unhandled_reloc, /* special_function */
25dbc73a
AM
1389 "R_PPC_EMB_SDA2REL", /* name */
1390 FALSE, /* partial_inplace */
1391 0, /* src_mask */
1392 0xffff, /* dst_mask */
1393 FALSE), /* pcrel_offset */
1394
1395 /* Relocate against either _SDA_BASE_ or _SDA2_BASE_, filling in the 16 bit
1396 signed offset from the appropriate base, and filling in the register
1397 field with the appropriate register (0, 2, or 13). */
1398 HOWTO (R_PPC_EMB_SDA21, /* type */
1399 0, /* rightshift */
1400 2, /* size (0 = byte, 1 = short, 2 = long) */
1401 16, /* bitsize */
1402 FALSE, /* pc_relative */
1403 0, /* bitpos */
1404 complain_overflow_signed, /* complain_on_overflow */
3ce51288 1405 ppc_elf_unhandled_reloc, /* special_function */
25dbc73a
AM
1406 "R_PPC_EMB_SDA21", /* name */
1407 FALSE, /* partial_inplace */
1408 0, /* src_mask */
1409 0xffff, /* dst_mask */
1410 FALSE), /* pcrel_offset */
1411
1412 /* Relocation not handled: R_PPC_EMB_MRKREF */
1413 /* Relocation not handled: R_PPC_EMB_RELSEC16 */
1414 /* Relocation not handled: R_PPC_EMB_RELST_LO */
1415 /* Relocation not handled: R_PPC_EMB_RELST_HI */
1416 /* Relocation not handled: R_PPC_EMB_RELST_HA */
1417 /* Relocation not handled: R_PPC_EMB_BIT_FLD */
1418
1419 /* PC relative relocation against either _SDA_BASE_ or _SDA2_BASE_, filling
1420 in the 16 bit signed offset from the appropriate base, and filling in the
1421 register field with the appropriate register (0, 2, or 13). */
1422 HOWTO (R_PPC_EMB_RELSDA, /* type */
1423 0, /* rightshift */
1424 1, /* size (0 = byte, 1 = short, 2 = long) */
1425 16, /* bitsize */
ddfd6795 1426 FALSE, /* pc_relative */
25dbc73a
AM
1427 0, /* bitpos */
1428 complain_overflow_signed, /* complain_on_overflow */
3ce51288 1429 ppc_elf_unhandled_reloc, /* special_function */
25dbc73a
AM
1430 "R_PPC_EMB_RELSDA", /* name */
1431 FALSE, /* partial_inplace */
1432 0, /* src_mask */
1433 0xffff, /* dst_mask */
1434 FALSE), /* pcrel_offset */
1435
b9c361e0
JL
1436 /* A relative 8 bit branch. */
1437 HOWTO (R_PPC_VLE_REL8, /* type */
1438 1, /* rightshift */
1439 1, /* size (0 = byte, 1 = short, 2 = long) */
1440 8, /* bitsize */
1441 TRUE, /* pc_relative */
1442 0, /* bitpos */
1443 complain_overflow_signed, /* complain_on_overflow */
1444 bfd_elf_generic_reloc, /* special_function */
1445 "R_PPC_VLE_REL8", /* name */
1446 FALSE, /* partial_inplace */
1447 0, /* src_mask */
1448 0xff, /* dst_mask */
1449 TRUE), /* pcrel_offset */
68ffbac6 1450
b9c361e0
JL
1451 /* A relative 15 bit branch. */
1452 HOWTO (R_PPC_VLE_REL15, /* type */
1453 1, /* rightshift */
1454 2, /* size (0 = byte, 1 = short, 2 = long) */
1455 15, /* bitsize */
1456 TRUE, /* pc_relative */
1457 1, /* bitpos */
1458 complain_overflow_signed, /* complain_on_overflow */
1459 bfd_elf_generic_reloc, /* special_function */
1460 "R_PPC_VLE_REL15", /* name */
1461 FALSE, /* partial_inplace */
1462 0, /* src_mask */
dfdaec14 1463 0xfffe, /* dst_mask */
b9c361e0
JL
1464 TRUE), /* pcrel_offset */
1465
68ffbac6 1466 /* A relative 24 bit branch. */
b9c361e0
JL
1467 HOWTO (R_PPC_VLE_REL24, /* type */
1468 1, /* rightshift */
1469 2, /* size (0 = byte, 1 = short, 2 = long) */
1470 24, /* bitsize */
1471 TRUE, /* pc_relative */
1472 1, /* bitpos */
1473 complain_overflow_signed, /* complain_on_overflow */
1474 bfd_elf_generic_reloc, /* special_function */
1475 "R_PPC_VLE_REL24", /* name */
1476 FALSE, /* partial_inplace */
1477 0, /* src_mask */
1478 0x1fffffe, /* dst_mask */
1479 TRUE), /* pcrel_offset */
1480
1481 /* The 16 LSBS in split16a format. */
1482 HOWTO (R_PPC_VLE_LO16A, /* type */
1483 0, /* rightshift */
1484 2, /* size (0 = byte, 1 = short, 2 = long) */
86c95733 1485 16, /* bitsize */
bdaacd3a 1486 FALSE, /* pc_relative */
b9c361e0 1487 0, /* bitpos */
86c95733 1488 complain_overflow_dont, /* complain_on_overflow */
3ce51288 1489 ppc_elf_unhandled_reloc, /* special_function */
b9c361e0
JL
1490 "R_PPC_VLE_LO16A", /* name */
1491 FALSE, /* partial_inplace */
1492 0, /* src_mask */
08dc996f 1493 0x1f07ff, /* dst_mask */
b9c361e0
JL
1494 FALSE), /* pcrel_offset */
1495
1496 /* The 16 LSBS in split16d format. */
1497 HOWTO (R_PPC_VLE_LO16D, /* type */
1498 0, /* rightshift */
1499 2, /* size (0 = byte, 1 = short, 2 = long) */
86c95733 1500 16, /* bitsize */
b9c361e0
JL
1501 FALSE, /* pc_relative */
1502 0, /* bitpos */
86c95733 1503 complain_overflow_dont, /* complain_on_overflow */
3ce51288
AM
1504 ppc_elf_unhandled_reloc, /* special_function */
1505 "R_PPC_VLE_LO16D", /* name */
b9c361e0
JL
1506 FALSE, /* partial_inplace */
1507 0, /* src_mask */
5499c7c7 1508 0x3e007ff, /* dst_mask */
b9c361e0
JL
1509 FALSE), /* pcrel_offset */
1510
1511 /* Bits 16-31 split16a format. */
1512 HOWTO (R_PPC_VLE_HI16A, /* type */
86c95733 1513 16, /* rightshift */
b9c361e0 1514 2, /* size (0 = byte, 1 = short, 2 = long) */
86c95733 1515 16, /* bitsize */
b9c361e0
JL
1516 FALSE, /* pc_relative */
1517 0, /* bitpos */
86c95733 1518 complain_overflow_dont, /* complain_on_overflow */
3ce51288
AM
1519 ppc_elf_unhandled_reloc, /* special_function */
1520 "R_PPC_VLE_HI16A", /* name */
b9c361e0
JL
1521 FALSE, /* partial_inplace */
1522 0, /* src_mask */
08dc996f 1523 0x1f07ff, /* dst_mask */
b9c361e0
JL
1524 FALSE), /* pcrel_offset */
1525
1526 /* Bits 16-31 split16d format. */
1527 HOWTO (R_PPC_VLE_HI16D, /* type */
86c95733 1528 16, /* rightshift */
b9c361e0 1529 2, /* size (0 = byte, 1 = short, 2 = long) */
86c95733 1530 16, /* bitsize */
b9c361e0
JL
1531 FALSE, /* pc_relative */
1532 0, /* bitpos */
86c95733 1533 complain_overflow_dont, /* complain_on_overflow */
3ce51288
AM
1534 ppc_elf_unhandled_reloc, /* special_function */
1535 "R_PPC_VLE_HI16D", /* name */
b9c361e0
JL
1536 FALSE, /* partial_inplace */
1537 0, /* src_mask */
5499c7c7 1538 0x3e007ff, /* dst_mask */
b9c361e0
JL
1539 FALSE), /* pcrel_offset */
1540
1541 /* Bits 16-31 (High Adjusted) in split16a format. */
1542 HOWTO (R_PPC_VLE_HA16A, /* type */
86c95733 1543 16, /* rightshift */
b9c361e0 1544 2, /* size (0 = byte, 1 = short, 2 = long) */
86c95733 1545 16, /* bitsize */
b9c361e0
JL
1546 FALSE, /* pc_relative */
1547 0, /* bitpos */
86c95733 1548 complain_overflow_dont, /* complain_on_overflow */
3ce51288
AM
1549 ppc_elf_unhandled_reloc, /* special_function */
1550 "R_PPC_VLE_HA16A", /* name */
b9c361e0
JL
1551 FALSE, /* partial_inplace */
1552 0, /* src_mask */
08dc996f 1553 0x1f07ff, /* dst_mask */
b9c361e0
JL
1554 FALSE), /* pcrel_offset */
1555
1556 /* Bits 16-31 (High Adjusted) in split16d format. */
1557 HOWTO (R_PPC_VLE_HA16D, /* type */
86c95733 1558 16, /* rightshift */
b9c361e0 1559 2, /* size (0 = byte, 1 = short, 2 = long) */
86c95733 1560 16, /* bitsize */
b9c361e0
JL
1561 FALSE, /* pc_relative */
1562 0, /* bitpos */
86c95733 1563 complain_overflow_dont, /* complain_on_overflow */
3ce51288
AM
1564 ppc_elf_unhandled_reloc, /* special_function */
1565 "R_PPC_VLE_HA16D", /* name */
b9c361e0
JL
1566 FALSE, /* partial_inplace */
1567 0, /* src_mask */
5499c7c7 1568 0x3e007ff, /* dst_mask */
b9c361e0
JL
1569 FALSE), /* pcrel_offset */
1570
86c95733
AM
1571 /* This reloc is like R_PPC_EMB_SDA21 but only applies to e_add16i
1572 instructions. If the register base is 0 then the linker changes
1573 the e_add16i to an e_li instruction. */
1574 HOWTO (R_PPC_VLE_SDA21, /* type */
b9c361e0
JL
1575 0, /* rightshift */
1576 2, /* size (0 = byte, 1 = short, 2 = long) */
86c95733 1577 16, /* bitsize */
b9c361e0
JL
1578 FALSE, /* pc_relative */
1579 0, /* bitpos */
86c95733 1580 complain_overflow_signed, /* complain_on_overflow */
3ce51288
AM
1581 ppc_elf_unhandled_reloc, /* special_function */
1582 "R_PPC_VLE_SDA21", /* name */
b9c361e0
JL
1583 FALSE, /* partial_inplace */
1584 0, /* src_mask */
1585 0xffff, /* dst_mask */
1586 FALSE), /* pcrel_offset */
1587
86c95733 1588 /* Like R_PPC_VLE_SDA21 but ignore overflow. */
b9c361e0
JL
1589 HOWTO (R_PPC_VLE_SDA21_LO, /* type */
1590 0, /* rightshift */
1591 2, /* size (0 = byte, 1 = short, 2 = long) */
86c95733 1592 16, /* bitsize */
b9c361e0
JL
1593 FALSE, /* pc_relative */
1594 0, /* bitpos */
86c95733 1595 complain_overflow_dont, /* complain_on_overflow */
3ce51288 1596 ppc_elf_unhandled_reloc, /* special_function */
b9c361e0
JL
1597 "R_PPC_VLE_SDA21_LO", /* name */
1598 FALSE, /* partial_inplace */
1599 0, /* src_mask */
86c95733 1600 0xffff, /* dst_mask */
b9c361e0
JL
1601 FALSE), /* pcrel_offset */
1602
1603 /* The 16 LSBS relative to _SDA_BASE_ in split16a format. */
1604 HOWTO (R_PPC_VLE_SDAREL_LO16A,/* type */
1605 0, /* rightshift */
1606 2, /* size (0 = byte, 1 = short, 2 = long) */
86c95733 1607 16, /* bitsize */
b9c361e0
JL
1608 FALSE, /* pc_relative */
1609 0, /* bitpos */
3ce51288
AM
1610 complain_overflow_dont, /* complain_on_overflow */
1611 ppc_elf_unhandled_reloc, /* special_function */
1612 "R_PPC_VLE_SDAREL_LO16A", /* name */
b9c361e0
JL
1613 FALSE, /* partial_inplace */
1614 0, /* src_mask */
08dc996f 1615 0x1f07ff, /* dst_mask */
b9c361e0
JL
1616 FALSE), /* pcrel_offset */
1617
1618 /* The 16 LSBS relative to _SDA_BASE_ in split16d format. */
b9c361e0
JL
1619 HOWTO (R_PPC_VLE_SDAREL_LO16D, /* type */
1620 0, /* rightshift */
1621 2, /* size (0 = byte, 1 = short, 2 = long) */
86c95733 1622 16, /* bitsize */
b9c361e0
JL
1623 FALSE, /* pc_relative */
1624 0, /* bitpos */
3ce51288
AM
1625 complain_overflow_dont, /* complain_on_overflow */
1626 ppc_elf_unhandled_reloc, /* special_function */
1627 "R_PPC_VLE_SDAREL_LO16D", /* name */
b9c361e0
JL
1628 FALSE, /* partial_inplace */
1629 0, /* src_mask */
5499c7c7 1630 0x3e007ff, /* dst_mask */
b9c361e0
JL
1631 FALSE), /* pcrel_offset */
1632
1633 /* Bits 16-31 relative to _SDA_BASE_ in split16a format. */
3ce51288 1634 HOWTO (R_PPC_VLE_SDAREL_HI16A, /* type */
86c95733 1635 16, /* rightshift */
b9c361e0 1636 2, /* size (0 = byte, 1 = short, 2 = long) */
86c95733 1637 16, /* bitsize */
b9c361e0
JL
1638 FALSE, /* pc_relative */
1639 0, /* bitpos */
3ce51288
AM
1640 complain_overflow_dont, /* complain_on_overflow */
1641 ppc_elf_unhandled_reloc, /* special_function */
1642 "R_PPC_VLE_SDAREL_HI16A", /* name */
b9c361e0
JL
1643 FALSE, /* partial_inplace */
1644 0, /* src_mask */
08dc996f 1645 0x1f07ff, /* dst_mask */
b9c361e0
JL
1646 FALSE), /* pcrel_offset */
1647
1648 /* Bits 16-31 relative to _SDA_BASE_ in split16d format. */
3ce51288 1649 HOWTO (R_PPC_VLE_SDAREL_HI16D, /* type */
86c95733 1650 16, /* rightshift */
b9c361e0 1651 2, /* size (0 = byte, 1 = short, 2 = long) */
86c95733 1652 16, /* bitsize */
b9c361e0
JL
1653 FALSE, /* pc_relative */
1654 0, /* bitpos */
3ce51288
AM
1655 complain_overflow_dont, /* complain_on_overflow */
1656 ppc_elf_unhandled_reloc, /* special_function */
1657 "R_PPC_VLE_SDAREL_HI16D", /* name */
b9c361e0
JL
1658 FALSE, /* partial_inplace */
1659 0, /* src_mask */
5499c7c7 1660 0x3e007ff, /* dst_mask */
b9c361e0
JL
1661 FALSE), /* pcrel_offset */
1662
1663 /* Bits 16-31 (HA) relative to _SDA_BASE split16a format. */
3ce51288 1664 HOWTO (R_PPC_VLE_SDAREL_HA16A, /* type */
86c95733 1665 16, /* rightshift */
b9c361e0 1666 2, /* size (0 = byte, 1 = short, 2 = long) */
86c95733 1667 16, /* bitsize */
b9c361e0
JL
1668 FALSE, /* pc_relative */
1669 0, /* bitpos */
3ce51288
AM
1670 complain_overflow_dont, /* complain_on_overflow */
1671 ppc_elf_unhandled_reloc, /* special_function */
1672 "R_PPC_VLE_SDAREL_HA16A", /* name */
b9c361e0
JL
1673 FALSE, /* partial_inplace */
1674 0, /* src_mask */
08dc996f 1675 0x1f07ff, /* dst_mask */
b9c361e0
JL
1676 FALSE), /* pcrel_offset */
1677
1678 /* Bits 16-31 (HA) relative to _SDA_BASE split16d format. */
3ce51288 1679 HOWTO (R_PPC_VLE_SDAREL_HA16D, /* type */
86c95733 1680 16, /* rightshift */
b9c361e0 1681 2, /* size (0 = byte, 1 = short, 2 = long) */
86c95733 1682 16, /* bitsize */
b9c361e0
JL
1683 FALSE, /* pc_relative */
1684 0, /* bitpos */
3ce51288
AM
1685 complain_overflow_dont, /* complain_on_overflow */
1686 ppc_elf_unhandled_reloc, /* special_function */
1687 "R_PPC_VLE_SDAREL_HA16D", /* name */
b9c361e0
JL
1688 FALSE, /* partial_inplace */
1689 0, /* src_mask */
5499c7c7 1690 0x3e007ff, /* dst_mask */
b9c361e0
JL
1691 FALSE), /* pcrel_offset */
1692
83eef883
AFB
1693 /* e_li split20 format. */
1694 HOWTO (R_PPC_VLE_ADDR20, /* type */
1695 16, /* rightshift */
1696 2, /* size (0 = byte, 1 = short, 2 = long) */
1697 20, /* bitsize */
1698 FALSE, /* pc_relative */
1699 0, /* bitpos */
1700 complain_overflow_dont, /* complain_on_overflow */
1701 bfd_elf_generic_reloc, /* special_function */
1702 "R_PPC_VLE_ADDR20", /* name */
1703 FALSE, /* partial_inplace */
1704 0, /* src_mask */
1705 0x1f07ff, /* dst_mask */
1706 FALSE), /* pcrel_offset */
1707
e054468f
AM
1708 HOWTO (R_PPC_IRELATIVE, /* type */
1709 0, /* rightshift */
1710 2, /* size (0 = byte, 1 = short, 2 = long) */
1711 32, /* bitsize */
1712 FALSE, /* pc_relative */
1713 0, /* bitpos */
86c95733 1714 complain_overflow_dont, /* complain_on_overflow */
3ce51288 1715 ppc_elf_unhandled_reloc, /* special_function */
e054468f
AM
1716 "R_PPC_IRELATIVE", /* name */
1717 FALSE, /* partial_inplace */
1718 0, /* src_mask */
1719 0xffffffff, /* dst_mask */
1720 FALSE), /* pcrel_offset */
1721
d7128ce4
AM
1722 /* A 16 bit relative relocation. */
1723 HOWTO (R_PPC_REL16, /* type */
1724 0, /* rightshift */
1725 1, /* size (0 = byte, 1 = short, 2 = long) */
1726 16, /* bitsize */
1727 TRUE, /* pc_relative */
1728 0, /* bitpos */
86c95733 1729 complain_overflow_signed, /* complain_on_overflow */
d7128ce4
AM
1730 bfd_elf_generic_reloc, /* special_function */
1731 "R_PPC_REL16", /* name */
1732 FALSE, /* partial_inplace */
1733 0, /* src_mask */
1734 0xffff, /* dst_mask */
1735 TRUE), /* pcrel_offset */
1736
1737 /* A 16 bit relative relocation without overflow. */
1738 HOWTO (R_PPC_REL16_LO, /* type */
1739 0, /* rightshift */
1740 1, /* size (0 = byte, 1 = short, 2 = long) */
1741 16, /* bitsize */
1742 TRUE, /* pc_relative */
1743 0, /* bitpos */
1744 complain_overflow_dont,/* complain_on_overflow */
1745 bfd_elf_generic_reloc, /* special_function */
1746 "R_PPC_REL16_LO", /* name */
1747 FALSE, /* partial_inplace */
1748 0, /* src_mask */
1749 0xffff, /* dst_mask */
1750 TRUE), /* pcrel_offset */
1751
1752 /* The high order 16 bits of a relative address. */
1753 HOWTO (R_PPC_REL16_HI, /* type */
1754 16, /* rightshift */
1755 1, /* size (0 = byte, 1 = short, 2 = long) */
1756 16, /* bitsize */
1757 TRUE, /* pc_relative */
1758 0, /* bitpos */
1759 complain_overflow_dont, /* complain_on_overflow */
1760 bfd_elf_generic_reloc, /* special_function */
1761 "R_PPC_REL16_HI", /* name */
1762 FALSE, /* partial_inplace */
1763 0, /* src_mask */
1764 0xffff, /* dst_mask */
1765 TRUE), /* pcrel_offset */
1766
1767 /* The high order 16 bits of a relative address, plus 1 if the contents of
1768 the low 16 bits, treated as a signed number, is negative. */
1769 HOWTO (R_PPC_REL16_HA, /* type */
1770 16, /* rightshift */
1771 1, /* size (0 = byte, 1 = short, 2 = long) */
1772 16, /* bitsize */
1773 TRUE, /* pc_relative */
1774 0, /* bitpos */
1775 complain_overflow_dont, /* complain_on_overflow */
1776 ppc_elf_addr16_ha_reloc, /* special_function */
1777 "R_PPC_REL16_HA", /* name */
1778 FALSE, /* partial_inplace */
1779 0, /* src_mask */
1780 0xffff, /* dst_mask */
1781 TRUE), /* pcrel_offset */
1782
a680de9a
PB
1783 /* Like R_PPC_REL16_HA but for split field in addpcis. */
1784 HOWTO (R_PPC_REL16DX_HA, /* type */
1785 16, /* rightshift */
1786 2, /* size (0 = byte, 1 = short, 2 = long) */
1787 16, /* bitsize */
1788 TRUE, /* pc_relative */
1789 0, /* bitpos */
1790 complain_overflow_signed, /* complain_on_overflow */
1791 ppc_elf_addr16_ha_reloc, /* special_function */
1792 "R_PPC_REL16DX_HA", /* name */
1793 FALSE, /* partial_inplace */
1794 0, /* src_mask */
1795 0x1fffc1, /* dst_mask */
1796 TRUE), /* pcrel_offset */
1797
7ba71655
AM
1798 /* A split-field reloc for addpcis, non-relative (gas internal use only). */
1799 HOWTO (R_PPC_16DX_HA, /* type */
1800 16, /* rightshift */
1801 2, /* size (0 = byte, 1 = short, 2 = long) */
1802 16, /* bitsize */
1803 FALSE, /* pc_relative */
1804 0, /* bitpos */
1805 complain_overflow_signed, /* complain_on_overflow */
1806 ppc_elf_addr16_ha_reloc, /* special_function */
1807 "R_PPC_16DX_HA", /* name */
1808 FALSE, /* partial_inplace */
1809 0, /* src_mask */
1810 0x1fffc1, /* dst_mask */
1811 FALSE), /* pcrel_offset */
1812
25dbc73a
AM
1813 /* GNU extension to record C++ vtable hierarchy. */
1814 HOWTO (R_PPC_GNU_VTINHERIT, /* type */
1815 0, /* rightshift */
1816 0, /* size (0 = byte, 1 = short, 2 = long) */
1817 0, /* bitsize */
1818 FALSE, /* pc_relative */
1819 0, /* bitpos */
1820 complain_overflow_dont, /* complain_on_overflow */
1821 NULL, /* special_function */
1822 "R_PPC_GNU_VTINHERIT", /* name */
1823 FALSE, /* partial_inplace */
1824 0, /* src_mask */
1825 0, /* dst_mask */
1826 FALSE), /* pcrel_offset */
1827
1828 /* GNU extension to record C++ vtable member usage. */
1829 HOWTO (R_PPC_GNU_VTENTRY, /* type */
1830 0, /* rightshift */
1831 0, /* size (0 = byte, 1 = short, 2 = long) */
1832 0, /* bitsize */
1833 FALSE, /* pc_relative */
1834 0, /* bitpos */
1835 complain_overflow_dont, /* complain_on_overflow */
1836 NULL, /* special_function */
1837 "R_PPC_GNU_VTENTRY", /* name */
7619e7c7
AM
1838 FALSE, /* partial_inplace */
1839 0, /* src_mask */
25dbc73a 1840 0, /* dst_mask */
7619e7c7
AM
1841 FALSE), /* pcrel_offset */
1842
25dbc73a
AM
1843 /* Phony reloc to handle AIX style TOC entries. */
1844 HOWTO (R_PPC_TOC16, /* type */
7619e7c7
AM
1845 0, /* rightshift */
1846 1, /* size (0 = byte, 1 = short, 2 = long) */
1847 16, /* bitsize */
1848 FALSE, /* pc_relative */
1849 0, /* bitpos */
25dbc73a 1850 complain_overflow_signed, /* complain_on_overflow */
3ce51288 1851 ppc_elf_unhandled_reloc, /* special_function */
25dbc73a 1852 "R_PPC_TOC16", /* name */
7619e7c7
AM
1853 FALSE, /* partial_inplace */
1854 0, /* src_mask */
1855 0xffff, /* dst_mask */
1856 FALSE), /* pcrel_offset */
25dbc73a
AM
1857};
1858\f
1859/* Initialize the ppc_elf_howto_table, so that linear accesses can be done. */
1860
1861static void
1862ppc_elf_howto_init (void)
1863{
1864 unsigned int i, type;
1865
1866 for (i = 0;
1867 i < sizeof (ppc_elf_howto_raw) / sizeof (ppc_elf_howto_raw[0]);
1868 i++)
1869 {
1870 type = ppc_elf_howto_raw[i].type;
1871 if (type >= (sizeof (ppc_elf_howto_table)
1872 / sizeof (ppc_elf_howto_table[0])))
1873 abort ();
1874 ppc_elf_howto_table[type] = &ppc_elf_howto_raw[i];
1875 }
1876}
1877
1878static reloc_howto_type *
1879ppc_elf_reloc_type_lookup (bfd *abfd ATTRIBUTE_UNUSED,
1880 bfd_reloc_code_real_type code)
1881{
1882 enum elf_ppc_reloc_type r;
1883
1884 /* Initialize howto table if not already done. */
1885 if (!ppc_elf_howto_table[R_PPC_ADDR32])
1886 ppc_elf_howto_init ();
1887
1888 switch (code)
1889 {
1890 default:
1891 return NULL;
1892
1893 case BFD_RELOC_NONE: r = R_PPC_NONE; break;
1894 case BFD_RELOC_32: r = R_PPC_ADDR32; break;
1895 case BFD_RELOC_PPC_BA26: r = R_PPC_ADDR24; break;
1fe532cf 1896 case BFD_RELOC_PPC64_ADDR16_DS:
25dbc73a 1897 case BFD_RELOC_16: r = R_PPC_ADDR16; break;
1fe532cf 1898 case BFD_RELOC_PPC64_ADDR16_LO_DS:
25dbc73a
AM
1899 case BFD_RELOC_LO16: r = R_PPC_ADDR16_LO; break;
1900 case BFD_RELOC_HI16: r = R_PPC_ADDR16_HI; break;
1901 case BFD_RELOC_HI16_S: r = R_PPC_ADDR16_HA; break;
1902 case BFD_RELOC_PPC_BA16: r = R_PPC_ADDR14; break;
1903 case BFD_RELOC_PPC_BA16_BRTAKEN: r = R_PPC_ADDR14_BRTAKEN; break;
1904 case BFD_RELOC_PPC_BA16_BRNTAKEN: r = R_PPC_ADDR14_BRNTAKEN; break;
1905 case BFD_RELOC_PPC_B26: r = R_PPC_REL24; break;
1906 case BFD_RELOC_PPC_B16: r = R_PPC_REL14; break;
1907 case BFD_RELOC_PPC_B16_BRTAKEN: r = R_PPC_REL14_BRTAKEN; break;
1908 case BFD_RELOC_PPC_B16_BRNTAKEN: r = R_PPC_REL14_BRNTAKEN; break;
1fe532cf 1909 case BFD_RELOC_PPC64_GOT16_DS:
25dbc73a 1910 case BFD_RELOC_16_GOTOFF: r = R_PPC_GOT16; break;
1fe532cf 1911 case BFD_RELOC_PPC64_GOT16_LO_DS:
25dbc73a
AM
1912 case BFD_RELOC_LO16_GOTOFF: r = R_PPC_GOT16_LO; break;
1913 case BFD_RELOC_HI16_GOTOFF: r = R_PPC_GOT16_HI; break;
1914 case BFD_RELOC_HI16_S_GOTOFF: r = R_PPC_GOT16_HA; break;
1915 case BFD_RELOC_24_PLT_PCREL: r = R_PPC_PLTREL24; break;
1916 case BFD_RELOC_PPC_COPY: r = R_PPC_COPY; break;
1917 case BFD_RELOC_PPC_GLOB_DAT: r = R_PPC_GLOB_DAT; break;
1918 case BFD_RELOC_PPC_LOCAL24PC: r = R_PPC_LOCAL24PC; break;
1919 case BFD_RELOC_32_PCREL: r = R_PPC_REL32; break;
1920 case BFD_RELOC_32_PLTOFF: r = R_PPC_PLT32; break;
1921 case BFD_RELOC_32_PLT_PCREL: r = R_PPC_PLTREL32; break;
1fe532cf 1922 case BFD_RELOC_PPC64_PLT16_LO_DS:
25dbc73a
AM
1923 case BFD_RELOC_LO16_PLTOFF: r = R_PPC_PLT16_LO; break;
1924 case BFD_RELOC_HI16_PLTOFF: r = R_PPC_PLT16_HI; break;
1925 case BFD_RELOC_HI16_S_PLTOFF: r = R_PPC_PLT16_HA; break;
1926 case BFD_RELOC_GPREL16: r = R_PPC_SDAREL16; break;
1fe532cf 1927 case BFD_RELOC_PPC64_SECTOFF_DS:
25dbc73a 1928 case BFD_RELOC_16_BASEREL: r = R_PPC_SECTOFF; break;
1fe532cf 1929 case BFD_RELOC_PPC64_SECTOFF_LO_DS:
25dbc73a
AM
1930 case BFD_RELOC_LO16_BASEREL: r = R_PPC_SECTOFF_LO; break;
1931 case BFD_RELOC_HI16_BASEREL: r = R_PPC_SECTOFF_HI; break;
1932 case BFD_RELOC_HI16_S_BASEREL: r = R_PPC_SECTOFF_HA; break;
1933 case BFD_RELOC_CTOR: r = R_PPC_ADDR32; break;
1fe532cf 1934 case BFD_RELOC_PPC64_TOC16_DS:
25dbc73a
AM
1935 case BFD_RELOC_PPC_TOC16: r = R_PPC_TOC16; break;
1936 case BFD_RELOC_PPC_TLS: r = R_PPC_TLS; break;
727fc41e
AM
1937 case BFD_RELOC_PPC_TLSGD: r = R_PPC_TLSGD; break;
1938 case BFD_RELOC_PPC_TLSLD: r = R_PPC_TLSLD; break;
25dbc73a 1939 case BFD_RELOC_PPC_DTPMOD: r = R_PPC_DTPMOD32; break;
1fe532cf 1940 case BFD_RELOC_PPC64_TPREL16_DS:
25dbc73a 1941 case BFD_RELOC_PPC_TPREL16: r = R_PPC_TPREL16; break;
1fe532cf 1942 case BFD_RELOC_PPC64_TPREL16_LO_DS:
25dbc73a
AM
1943 case BFD_RELOC_PPC_TPREL16_LO: r = R_PPC_TPREL16_LO; break;
1944 case BFD_RELOC_PPC_TPREL16_HI: r = R_PPC_TPREL16_HI; break;
1945 case BFD_RELOC_PPC_TPREL16_HA: r = R_PPC_TPREL16_HA; break;
1946 case BFD_RELOC_PPC_TPREL: r = R_PPC_TPREL32; break;
1fe532cf 1947 case BFD_RELOC_PPC64_DTPREL16_DS:
25dbc73a 1948 case BFD_RELOC_PPC_DTPREL16: r = R_PPC_DTPREL16; break;
1fe532cf 1949 case BFD_RELOC_PPC64_DTPREL16_LO_DS:
25dbc73a
AM
1950 case BFD_RELOC_PPC_DTPREL16_LO: r = R_PPC_DTPREL16_LO; break;
1951 case BFD_RELOC_PPC_DTPREL16_HI: r = R_PPC_DTPREL16_HI; break;
1952 case BFD_RELOC_PPC_DTPREL16_HA: r = R_PPC_DTPREL16_HA; break;
1953 case BFD_RELOC_PPC_DTPREL: r = R_PPC_DTPREL32; break;
1954 case BFD_RELOC_PPC_GOT_TLSGD16: r = R_PPC_GOT_TLSGD16; break;
1955 case BFD_RELOC_PPC_GOT_TLSGD16_LO: r = R_PPC_GOT_TLSGD16_LO; break;
1956 case BFD_RELOC_PPC_GOT_TLSGD16_HI: r = R_PPC_GOT_TLSGD16_HI; break;
1957 case BFD_RELOC_PPC_GOT_TLSGD16_HA: r = R_PPC_GOT_TLSGD16_HA; break;
1958 case BFD_RELOC_PPC_GOT_TLSLD16: r = R_PPC_GOT_TLSLD16; break;
1959 case BFD_RELOC_PPC_GOT_TLSLD16_LO: r = R_PPC_GOT_TLSLD16_LO; break;
1960 case BFD_RELOC_PPC_GOT_TLSLD16_HI: r = R_PPC_GOT_TLSLD16_HI; break;
1961 case BFD_RELOC_PPC_GOT_TLSLD16_HA: r = R_PPC_GOT_TLSLD16_HA; break;
1962 case BFD_RELOC_PPC_GOT_TPREL16: r = R_PPC_GOT_TPREL16; break;
1963 case BFD_RELOC_PPC_GOT_TPREL16_LO: r = R_PPC_GOT_TPREL16_LO; break;
1964 case BFD_RELOC_PPC_GOT_TPREL16_HI: r = R_PPC_GOT_TPREL16_HI; break;
1965 case BFD_RELOC_PPC_GOT_TPREL16_HA: r = R_PPC_GOT_TPREL16_HA; break;
1966 case BFD_RELOC_PPC_GOT_DTPREL16: r = R_PPC_GOT_DTPREL16; break;
1967 case BFD_RELOC_PPC_GOT_DTPREL16_LO: r = R_PPC_GOT_DTPREL16_LO; break;
1968 case BFD_RELOC_PPC_GOT_DTPREL16_HI: r = R_PPC_GOT_DTPREL16_HI; break;
1969 case BFD_RELOC_PPC_GOT_DTPREL16_HA: r = R_PPC_GOT_DTPREL16_HA; break;
1970 case BFD_RELOC_PPC_EMB_NADDR32: r = R_PPC_EMB_NADDR32; break;
1971 case BFD_RELOC_PPC_EMB_NADDR16: r = R_PPC_EMB_NADDR16; break;
1972 case BFD_RELOC_PPC_EMB_NADDR16_LO: r = R_PPC_EMB_NADDR16_LO; break;
1973 case BFD_RELOC_PPC_EMB_NADDR16_HI: r = R_PPC_EMB_NADDR16_HI; break;
1974 case BFD_RELOC_PPC_EMB_NADDR16_HA: r = R_PPC_EMB_NADDR16_HA; break;
1975 case BFD_RELOC_PPC_EMB_SDAI16: r = R_PPC_EMB_SDAI16; break;
1976 case BFD_RELOC_PPC_EMB_SDA2I16: r = R_PPC_EMB_SDA2I16; break;
1977 case BFD_RELOC_PPC_EMB_SDA2REL: r = R_PPC_EMB_SDA2REL; break;
1978 case BFD_RELOC_PPC_EMB_SDA21: r = R_PPC_EMB_SDA21; break;
1979 case BFD_RELOC_PPC_EMB_MRKREF: r = R_PPC_EMB_MRKREF; break;
1980 case BFD_RELOC_PPC_EMB_RELSEC16: r = R_PPC_EMB_RELSEC16; break;
1981 case BFD_RELOC_PPC_EMB_RELST_LO: r = R_PPC_EMB_RELST_LO; break;
1982 case BFD_RELOC_PPC_EMB_RELST_HI: r = R_PPC_EMB_RELST_HI; break;
1983 case BFD_RELOC_PPC_EMB_RELST_HA: r = R_PPC_EMB_RELST_HA; break;
1984 case BFD_RELOC_PPC_EMB_BIT_FLD: r = R_PPC_EMB_BIT_FLD; break;
1985 case BFD_RELOC_PPC_EMB_RELSDA: r = R_PPC_EMB_RELSDA; break;
b9c361e0
JL
1986 case BFD_RELOC_PPC_VLE_REL8: r = R_PPC_VLE_REL8; break;
1987 case BFD_RELOC_PPC_VLE_REL15: r = R_PPC_VLE_REL15; break;
1988 case BFD_RELOC_PPC_VLE_REL24: r = R_PPC_VLE_REL24; break;
1989 case BFD_RELOC_PPC_VLE_LO16A: r = R_PPC_VLE_LO16A; break;
1990 case BFD_RELOC_PPC_VLE_LO16D: r = R_PPC_VLE_LO16D; break;
1991 case BFD_RELOC_PPC_VLE_HI16A: r = R_PPC_VLE_HI16A; break;
1992 case BFD_RELOC_PPC_VLE_HI16D: r = R_PPC_VLE_HI16D; break;
1993 case BFD_RELOC_PPC_VLE_HA16A: r = R_PPC_VLE_HA16A; break;
1994 case BFD_RELOC_PPC_VLE_HA16D: r = R_PPC_VLE_HA16D; break;
1995 case BFD_RELOC_PPC_VLE_SDA21: r = R_PPC_VLE_SDA21; break;
1996 case BFD_RELOC_PPC_VLE_SDA21_LO: r = R_PPC_VLE_SDA21_LO; break;
1997 case BFD_RELOC_PPC_VLE_SDAREL_LO16A:
1998 r = R_PPC_VLE_SDAREL_LO16A;
1999 break;
2000 case BFD_RELOC_PPC_VLE_SDAREL_LO16D:
2001 r = R_PPC_VLE_SDAREL_LO16D;
2002 break;
2003 case BFD_RELOC_PPC_VLE_SDAREL_HI16A:
2004 r = R_PPC_VLE_SDAREL_HI16A;
2005 break;
2006 case BFD_RELOC_PPC_VLE_SDAREL_HI16D:
2007 r = R_PPC_VLE_SDAREL_HI16D;
2008 break;
2009 case BFD_RELOC_PPC_VLE_SDAREL_HA16A:
2010 r = R_PPC_VLE_SDAREL_HA16A;
2011 break;
2012 case BFD_RELOC_PPC_VLE_SDAREL_HA16D:
2013 r = R_PPC_VLE_SDAREL_HA16D;
2014 break;
d7128ce4
AM
2015 case BFD_RELOC_16_PCREL: r = R_PPC_REL16; break;
2016 case BFD_RELOC_LO16_PCREL: r = R_PPC_REL16_LO; break;
2017 case BFD_RELOC_HI16_PCREL: r = R_PPC_REL16_HI; break;
2018 case BFD_RELOC_HI16_S_PCREL: r = R_PPC_REL16_HA; break;
7ba71655 2019 case BFD_RELOC_PPC_16DX_HA: r = R_PPC_16DX_HA; break;
a680de9a 2020 case BFD_RELOC_PPC_REL16DX_HA: r = R_PPC_REL16DX_HA; break;
25dbc73a
AM
2021 case BFD_RELOC_VTABLE_INHERIT: r = R_PPC_GNU_VTINHERIT; break;
2022 case BFD_RELOC_VTABLE_ENTRY: r = R_PPC_GNU_VTENTRY; break;
2023 }
2024
2025 return ppc_elf_howto_table[r];
2026};
2027
157090f7
AM
2028static reloc_howto_type *
2029ppc_elf_reloc_name_lookup (bfd *abfd ATTRIBUTE_UNUSED,
2030 const char *r_name)
2031{
2032 unsigned int i;
2033
2034 for (i = 0;
2035 i < sizeof (ppc_elf_howto_raw) / sizeof (ppc_elf_howto_raw[0]);
2036 i++)
2037 if (ppc_elf_howto_raw[i].name != NULL
2038 && strcasecmp (ppc_elf_howto_raw[i].name, r_name) == 0)
2039 return &ppc_elf_howto_raw[i];
2040
2041 return NULL;
2042}
2043
25dbc73a
AM
2044/* Set the howto pointer for a PowerPC ELF reloc. */
2045
f3185997 2046static bfd_boolean
4aef7643 2047ppc_elf_info_to_howto (bfd *abfd,
25dbc73a
AM
2048 arelent *cache_ptr,
2049 Elf_Internal_Rela *dst)
2050{
cd21f5da
NC
2051 unsigned int r_type;
2052
25dbc73a
AM
2053 /* Initialize howto table if not already done. */
2054 if (!ppc_elf_howto_table[R_PPC_ADDR32])
2055 ppc_elf_howto_init ();
2056
cd21f5da
NC
2057 r_type = ELF32_R_TYPE (dst->r_info);
2058 if (r_type >= R_PPC_max)
2059 {
695344c0 2060 /* xgettext:c-format */
0aa13fee 2061 _bfd_error_handler (_("%pB: unsupported relocation type %#x"),
4eca0228 2062 abfd, r_type);
cd21f5da 2063 bfd_set_error (bfd_error_bad_value);
f3185997 2064 return FALSE;
cd21f5da 2065 }
f3185997 2066
cd21f5da 2067 cache_ptr->howto = ppc_elf_howto_table[r_type];
375de94a
AM
2068
2069 /* Just because the above assert didn't trigger doesn't mean that
2070 ELF32_R_TYPE (dst->r_info) is necessarily a valid relocation. */
f3185997 2071 if (cache_ptr->howto == NULL)
375de94a 2072 {
695344c0 2073 /* xgettext:c-format */
0aa13fee 2074 _bfd_error_handler (_("%pB: unsupported relocation type %#x"),
4eca0228 2075 abfd, r_type);
375de94a
AM
2076 bfd_set_error (bfd_error_bad_value);
2077
f3185997 2078 return FALSE;
375de94a 2079 }
f3185997
NC
2080
2081 return TRUE;
25dbc73a
AM
2082}
2083
d7128ce4 2084/* Handle the R_PPC_ADDR16_HA and R_PPC_REL16_HA relocs. */
25dbc73a
AM
2085
2086static bfd_reloc_status_type
4aef7643 2087ppc_elf_addr16_ha_reloc (bfd *abfd,
25dbc73a
AM
2088 arelent *reloc_entry,
2089 asymbol *symbol,
4aef7643 2090 void *data,
25dbc73a
AM
2091 asection *input_section,
2092 bfd *output_bfd,
2093 char **error_message ATTRIBUTE_UNUSED)
2094{
a680de9a
PB
2095 enum elf_ppc_reloc_type r_type;
2096 long insn;
2097 bfd_size_type octets;
2098 bfd_vma value;
25dbc73a
AM
2099
2100 if (output_bfd != NULL)
2101 {
2102 reloc_entry->address += input_section->output_offset;
2103 return bfd_reloc_ok;
2104 }
2105
a680de9a
PB
2106 reloc_entry->addend += 0x8000;
2107 r_type = reloc_entry->howto->type;
2108 if (r_type != R_PPC_REL16DX_HA)
2109 return bfd_reloc_continue;
2110
2111 value = 0;
2112 if (!bfd_is_com_section (symbol->section))
2113 value = symbol->value;
2114 value += (reloc_entry->addend
2115 + symbol->section->output_offset
2116 + symbol->section->output_section->vma);
2117 value -= (reloc_entry->address
2118 + input_section->output_offset
2119 + input_section->output_section->vma);
2120 value >>= 16;
2121
2122 octets = reloc_entry->address * bfd_octets_per_byte (abfd);
2123 insn = bfd_get_32 (abfd, (bfd_byte *) data + octets);
2124 insn &= ~0x1fffc1;
2125 insn |= (value & 0xffc1) | ((value & 0x3e) << 15);
2126 bfd_put_32 (abfd, insn, (bfd_byte *) data + octets);
2127 return bfd_reloc_ok;
25dbc73a
AM
2128}
2129
2130static bfd_reloc_status_type
2131ppc_elf_unhandled_reloc (bfd *abfd,
2132 arelent *reloc_entry,
2133 asymbol *symbol,
2134 void *data,
2135 asection *input_section,
2136 bfd *output_bfd,
2137 char **error_message)
2138{
2139 /* If this is a relocatable link (output_bfd test tells us), just
2140 call the generic function. Any adjustment will be done at final
2141 link time. */
2142 if (output_bfd != NULL)
2143 return bfd_elf_generic_reloc (abfd, reloc_entry, symbol, data,
2144 input_section, output_bfd, error_message);
2145
2146 if (error_message != NULL)
2147 {
2148 static char buf[60];
2149 sprintf (buf, _("generic linker can't handle %s"),
2150 reloc_entry->howto->name);
2151 *error_message = buf;
2152 }
2153 return bfd_reloc_dangerous;
2154}
2155\f
2156/* Sections created by the linker. */
2157
2158typedef struct elf_linker_section
2159{
c9a2f333 2160 /* Pointer to the bfd section. */
25dbc73a 2161 asection *section;
c9a2f333
AM
2162 /* Section name. */
2163 const char *name;
2164 /* Associated bss section name. */
2165 const char *bss_name;
2166 /* Associated symbol name. */
2167 const char *sym_name;
046183de
AM
2168 /* Associated symbol. */
2169 struct elf_link_hash_entry *sym;
25dbc73a
AM
2170} elf_linker_section_t;
2171
2172/* Linked list of allocated pointer entries. This hangs off of the
2173 symbol lists, and provides allows us to return different pointers,
2174 based on different addend's. */
2175
2176typedef struct elf_linker_section_pointers
2177{
2178 /* next allocated pointer for this symbol */
2179 struct elf_linker_section_pointers *next;
2180 /* offset of pointer from beginning of section */
2181 bfd_vma offset;
2182 /* addend used */
2183 bfd_vma addend;
2184 /* which linker section this is */
2185 elf_linker_section_t *lsect;
25dbc73a
AM
2186} elf_linker_section_pointers_t;
2187
2188struct ppc_elf_obj_tdata
2189{
2190 struct elf_obj_tdata elf;
2191
2192 /* A mapping from local symbols to offsets into the various linker
2193 sections added. This is index by the symbol index. */
2194 elf_linker_section_pointers_t **linker_section_pointers;
016687f8
AM
2195
2196 /* Flags used to auto-detect plt type. */
2197 unsigned int makes_plt_call : 1;
2198 unsigned int has_rel16 : 1;
25dbc73a
AM
2199};
2200
2201#define ppc_elf_tdata(bfd) \
2202 ((struct ppc_elf_obj_tdata *) (bfd)->tdata.any)
7619e7c7 2203
25dbc73a
AM
2204#define elf_local_ptr_offsets(bfd) \
2205 (ppc_elf_tdata (bfd)->linker_section_pointers)
7619e7c7 2206
0c8d6e5c
AM
2207#define is_ppc_elf(bfd) \
2208 (bfd_get_flavour (bfd) == bfd_target_elf_flavour \
4dfe6ac6 2209 && elf_object_id (bfd) == PPC32_ELF_DATA)
0c8d6e5c 2210
25dbc73a 2211/* Override the generic function because we store some extras. */
7619e7c7 2212
25dbc73a
AM
2213static bfd_boolean
2214ppc_elf_mkobject (bfd *abfd)
2215{
0ffa91dd 2216 return bfd_elf_allocate_object (abfd, sizeof (struct ppc_elf_obj_tdata),
4dfe6ac6 2217 PPC32_ELF_DATA);
25dbc73a 2218}
7619e7c7 2219
14b57c7c
AM
2220/* When defaulting arch/mach, decode apuinfo to find a better match. */
2221
2222bfd_boolean
2223_bfd_elf_ppc_set_arch (bfd *abfd)
2224{
2225 unsigned long mach = 0;
2226 asection *s;
2227 unsigned char *contents;
2228
2229 if (abfd->arch_info->bits_per_word == 32
2230 && bfd_big_endian (abfd))
2231 {
2232
2233 for (s = abfd->sections; s != NULL; s = s->next)
2234 if ((elf_section_data (s)->this_hdr.sh_flags & SHF_PPC_VLE) != 0)
2235 break;
2236 if (s != NULL)
2237 mach = bfd_mach_ppc_vle;
2238 }
2239
2240 if (mach == 0)
2241 {
2242 s = bfd_get_section_by_name (abfd, APUINFO_SECTION_NAME);
2243 if (s != NULL && bfd_malloc_and_get_section (abfd, s, &contents))
2244 {
2245 unsigned int apuinfo_size = bfd_get_32 (abfd, contents + 4);
2246 unsigned int i;
2247
2248 for (i = 20; i < apuinfo_size + 20 && i + 4 <= s->size; i += 4)
2249 {
2250 unsigned int val = bfd_get_32 (abfd, contents + i);
2251 switch (val >> 16)
2252 {
2253 case PPC_APUINFO_PMR:
2254 case PPC_APUINFO_RFMCI:
2255 if (mach == 0)
2256 mach = bfd_mach_ppc_titan;
2257 break;
2258
2259 case PPC_APUINFO_ISEL:
2260 case PPC_APUINFO_CACHELCK:
2261 if (mach == bfd_mach_ppc_titan)
2262 mach = bfd_mach_ppc_e500mc;
2263 break;
2264
2265 case PPC_APUINFO_SPE:
2266 case PPC_APUINFO_EFS:
2267 case PPC_APUINFO_BRLOCK:
2268 if (mach != bfd_mach_ppc_vle)
2269 mach = bfd_mach_ppc_e500;
8941017b 2270 break;
14b57c7c
AM
2271
2272 case PPC_APUINFO_VLE:
2273 mach = bfd_mach_ppc_vle;
2274 break;
2275
2276 default:
2277 mach = -1ul;
2278 }
2279 }
2280 free (contents);
2281 }
2282 }
2283
2284 if (mach != 0 && mach != -1ul)
2285 {
2286 const bfd_arch_info_type *arch;
2287
2288 for (arch = abfd->arch_info->next; arch; arch = arch->next)
2289 if (arch->mach == mach)
2290 {
2291 abfd->arch_info = arch;
2292 break;
2293 }
2294 }
2295 return TRUE;
2296}
2297
25dbc73a 2298/* Fix bad default arch selected for a 32 bit input bfd when the
14b57c7c 2299 default is 64 bit. Also select arch based on apuinfo. */
7619e7c7 2300
25dbc73a
AM
2301static bfd_boolean
2302ppc_elf_object_p (bfd *abfd)
2303{
14b57c7c
AM
2304 if (!abfd->arch_info->the_default)
2305 return TRUE;
2306
2307 if (abfd->arch_info->bits_per_word == 64)
25dbc73a
AM
2308 {
2309 Elf_Internal_Ehdr *i_ehdr = elf_elfheader (abfd);
7619e7c7 2310
25dbc73a
AM
2311 if (i_ehdr->e_ident[EI_CLASS] == ELFCLASS32)
2312 {
2313 /* Relies on arch after 64 bit default being 32 bit default. */
2314 abfd->arch_info = abfd->arch_info->next;
2315 BFD_ASSERT (abfd->arch_info->bits_per_word == 32);
2316 }
2317 }
14b57c7c 2318 return _bfd_elf_ppc_set_arch (abfd);
25dbc73a 2319}
7619e7c7 2320
25dbc73a 2321/* Function to set whether a module needs the -mrelocatable bit set. */
7619e7c7 2322
25dbc73a
AM
2323static bfd_boolean
2324ppc_elf_set_private_flags (bfd *abfd, flagword flags)
2325{
2326 BFD_ASSERT (!elf_flags_init (abfd)
2327 || elf_elfheader (abfd)->e_flags == flags);
7619e7c7 2328
25dbc73a
AM
2329 elf_elfheader (abfd)->e_flags = flags;
2330 elf_flags_init (abfd) = TRUE;
2331 return TRUE;
2332}
2333
25dbc73a 2334/* Support for core dump NOTE sections. */
deaaf2f3 2335
b34976b6 2336static bfd_boolean
25dbc73a 2337ppc_elf_grok_prstatus (bfd *abfd, Elf_Internal_Note *note)
252b5132 2338{
25dbc73a
AM
2339 int offset;
2340 unsigned int size;
252b5132 2341
25dbc73a
AM
2342 switch (note->descsz)
2343 {
2344 default:
2345 return FALSE;
252b5132 2346
25dbc73a
AM
2347 case 268: /* Linux/PPC. */
2348 /* pr_cursig */
228e534f 2349 elf_tdata (abfd)->core->signal = bfd_get_16 (abfd, note->descdata + 12);
deaaf2f3 2350
25dbc73a 2351 /* pr_pid */
228e534f 2352 elf_tdata (abfd)->core->lwpid = bfd_get_32 (abfd, note->descdata + 24);
9abc968f 2353
25dbc73a
AM
2354 /* pr_reg */
2355 offset = 72;
2356 size = 192;
deaaf2f3 2357
25dbc73a
AM
2358 break;
2359 }
deaaf2f3 2360
25dbc73a
AM
2361 /* Make a ".reg/999" section. */
2362 return _bfd_elfcore_make_pseudosection (abfd, ".reg",
2363 size, note->descpos + offset);
2364}
252b5132 2365
25dbc73a
AM
2366static bfd_boolean
2367ppc_elf_grok_psinfo (bfd *abfd, Elf_Internal_Note *note)
2368{
2369 switch (note->descsz)
deaaf2f3 2370 {
25dbc73a
AM
2371 default:
2372 return FALSE;
deaaf2f3 2373
25dbc73a 2374 case 128: /* Linux/PPC elf_prpsinfo. */
228e534f 2375 elf_tdata (abfd)->core->pid
bc989cdc 2376 = bfd_get_32 (abfd, note->descdata + 16);
228e534f 2377 elf_tdata (abfd)->core->program
25dbc73a 2378 = _bfd_elfcore_strndup (abfd, note->descdata + 32, 16);
228e534f 2379 elf_tdata (abfd)->core->command
25dbc73a
AM
2380 = _bfd_elfcore_strndup (abfd, note->descdata + 48, 80);
2381 }
9abc968f 2382
25dbc73a
AM
2383 /* Note that for some reason, a spurious space is tacked
2384 onto the end of the args in some (at least one anyway)
2385 implementations, so strip it off if it exists. */
70bccea4 2386
25dbc73a 2387 {
228e534f 2388 char *command = elf_tdata (abfd)->core->command;
25dbc73a 2389 int n = strlen (command);
70bccea4 2390
25dbc73a
AM
2391 if (0 < n && command[n - 1] == ' ')
2392 command[n - 1] = '\0';
2393 }
deaaf2f3 2394
25dbc73a
AM
2395 return TRUE;
2396}
deaaf2f3 2397
183e98be
AM
2398static char *
2399ppc_elf_write_core_note (bfd *abfd, char *buf, int *bufsiz, int note_type, ...)
2400{
2401 switch (note_type)
2402 {
2403 default:
2404 return NULL;
2405
2406 case NT_PRPSINFO:
2407 {
602f1657 2408 char data[128] ATTRIBUTE_NONSTRING;
183e98be
AM
2409 va_list ap;
2410
2411 va_start (ap, note_type);
75cd47ed 2412 memset (data, 0, sizeof (data));
183e98be
AM
2413 strncpy (data + 32, va_arg (ap, const char *), 16);
2414 strncpy (data + 48, va_arg (ap, const char *), 80);
2415 va_end (ap);
2416 return elfcore_write_note (abfd, buf, bufsiz,
2417 "CORE", note_type, data, sizeof (data));
2418 }
2419
2420 case NT_PRSTATUS:
2421 {
2422 char data[268];
2423 va_list ap;
2424 long pid;
2425 int cursig;
2426 const void *greg;
2427
2428 va_start (ap, note_type);
2429 memset (data, 0, 72);
2430 pid = va_arg (ap, long);
2431 bfd_put_32 (abfd, pid, data + 24);
2432 cursig = va_arg (ap, int);
2433 bfd_put_16 (abfd, cursig, data + 12);
2434 greg = va_arg (ap, const void *);
2435 memcpy (data + 72, greg, 192);
2436 memset (data + 264, 0, 4);
2437 va_end (ap);
2438 return elfcore_write_note (abfd, buf, bufsiz,
2439 "CORE", note_type, data, sizeof (data));
2440 }
2441 }
2442}
2443
b9c361e0 2444static flagword
68ffbac6 2445ppc_elf_lookup_section_flags (char *flag_name)
b9c361e0
JL
2446{
2447
2448 if (!strcmp (flag_name, "SHF_PPC_VLE"))
2449 return SHF_PPC_VLE;
2450
2451 return 0;
2452}
2453
25dbc73a
AM
2454/* Return address for Ith PLT stub in section PLT, for relocation REL
2455 or (bfd_vma) -1 if it should not be included. */
deaaf2f3 2456
25dbc73a
AM
2457static bfd_vma
2458ppc_elf_plt_sym_val (bfd_vma i ATTRIBUTE_UNUSED,
2459 const asection *plt ATTRIBUTE_UNUSED,
2460 const arelent *rel)
2461{
2462 return rel->address;
2463}
deaaf2f3 2464
25dbc73a 2465/* Handle a PowerPC specific section when reading an object file. This
6dc132d9
L
2466 is called when bfd_section_from_shdr finds a section with an unknown
2467 type. */
deaaf2f3 2468
25dbc73a 2469static bfd_boolean
6dc132d9
L
2470ppc_elf_section_from_shdr (bfd *abfd,
2471 Elf_Internal_Shdr *hdr,
2472 const char *name,
2473 int shindex)
25dbc73a
AM
2474{
2475 asection *newsect;
2476 flagword flags;
d1c6de6f 2477
6dc132d9 2478 if (! _bfd_elf_make_section_from_shdr (abfd, hdr, name, shindex))
25dbc73a 2479 return FALSE;
deaaf2f3 2480
25dbc73a
AM
2481 newsect = hdr->bfd_section;
2482 flags = bfd_get_section_flags (abfd, newsect);
2483 if (hdr->sh_flags & SHF_EXCLUDE)
2484 flags |= SEC_EXCLUDE;
9abc968f 2485
25dbc73a
AM
2486 if (hdr->sh_type == SHT_ORDERED)
2487 flags |= SEC_SORT_ENTRIES;
d1c6de6f 2488
25dbc73a
AM
2489 bfd_set_section_flags (abfd, newsect, flags);
2490 return TRUE;
2491}
2492
2493/* Set up any other section flags and such that may be necessary. */
2494
2495static bfd_boolean
2496ppc_elf_fake_sections (bfd *abfd ATTRIBUTE_UNUSED,
2497 Elf_Internal_Shdr *shdr,
2498 asection *asect)
2499{
25dbc73a
AM
2500 if ((asect->flags & SEC_SORT_ENTRIES) != 0)
2501 shdr->sh_type = SHT_ORDERED;
2502
2503 return TRUE;
2504}
2505
2506/* If we have .sbss2 or .PPC.EMB.sbss0 output sections, we
2507 need to bump up the number of section headers. */
2508
2509static int
a6b96beb
AM
2510ppc_elf_additional_program_headers (bfd *abfd,
2511 struct bfd_link_info *info ATTRIBUTE_UNUSED)
25dbc73a
AM
2512{
2513 asection *s;
2514 int ret = 0;
d1c6de6f 2515
25dbc73a
AM
2516 s = bfd_get_section_by_name (abfd, ".sbss2");
2517 if (s != NULL && (s->flags & SEC_ALLOC) != 0)
2518 ++ret;
d1c6de6f 2519
25dbc73a
AM
2520 s = bfd_get_section_by_name (abfd, ".PPC.EMB.sbss0");
2521 if (s != NULL && (s->flags & SEC_ALLOC) != 0)
2522 ++ret;
deaaf2f3 2523
25dbc73a
AM
2524 return ret;
2525}
deaaf2f3 2526
68ffbac6 2527/* Modify the segment map for VLE executables. */
b9c361e0
JL
2528
2529bfd_boolean
2530ppc_elf_modify_segment_map (bfd *abfd,
2531 struct bfd_link_info *info ATTRIBUTE_UNUSED)
2532{
f7d69005 2533 struct elf_segment_map *m;
b9c361e0
JL
2534
2535 /* At this point in the link, output sections have already been sorted by
2536 LMA and assigned to segments. All that is left to do is to ensure
2537 there is no mixing of VLE & non-VLE sections in a text segment.
2538 If we find that case, we split the segment.
2539 We maintain the original output section order. */
2540
12bd6957 2541 for (m = elf_seg_map (abfd); m != NULL; m = m->next)
b9c361e0 2542 {
f7d69005
AM
2543 struct elf_segment_map *n;
2544 bfd_size_type amt;
2545 unsigned int j, k;
2546 unsigned int p_flags;
2547
2548 if (m->p_type != PT_LOAD || m->count == 0)
b9c361e0
JL
2549 continue;
2550
f7d69005 2551 for (p_flags = PF_R, j = 0; j != m->count; ++j)
b9c361e0 2552 {
f7d69005
AM
2553 if ((m->sections[j]->flags & SEC_READONLY) == 0)
2554 p_flags |= PF_W;
2555 if ((m->sections[j]->flags & SEC_CODE) != 0)
2556 {
2557 p_flags |= PF_X;
2558 if ((elf_section_flags (m->sections[j]) & SHF_PPC_VLE) != 0)
2559 p_flags |= PF_PPC_VLE;
2560 break;
2561 }
2562 }
2563 if (j != m->count)
2564 while (++j != m->count)
2565 {
2566 unsigned int p_flags1 = PF_R;
94caa966 2567
f7d69005
AM
2568 if ((m->sections[j]->flags & SEC_READONLY) == 0)
2569 p_flags1 |= PF_W;
2570 if ((m->sections[j]->flags & SEC_CODE) != 0)
2571 {
2572 p_flags1 |= PF_X;
2573 if ((elf_section_flags (m->sections[j]) & SHF_PPC_VLE) != 0)
2574 p_flags1 |= PF_PPC_VLE;
2575 if (((p_flags1 ^ p_flags) & PF_PPC_VLE) != 0)
2576 break;
2577 }
2578 p_flags |= p_flags1;
2579 }
2580 /* If we're splitting a segment which originally contained rw
2581 sections then those sections might now only be in one of the
2582 two parts. So always set p_flags if splitting, even if we
2583 are being called for objcopy with p_flags_valid set. */
2584 if (j != m->count || !m->p_flags_valid)
2585 {
2586 m->p_flags_valid = 1;
2587 m->p_flags = p_flags;
2588 }
2589 if (j == m->count)
b9c361e0
JL
2590 continue;
2591
f7d69005 2592 /* Sections 0..j-1 stay in this (current) segment,
b9c361e0
JL
2593 the remainder are put in a new segment.
2594 The scan resumes with the new segment. */
2595
b9c361e0
JL
2596 amt = sizeof (struct elf_segment_map);
2597 amt += (m->count - j - 1) * sizeof (asection *);
2598 n = (struct elf_segment_map *) bfd_zalloc (abfd, amt);
2599 if (n == NULL)
954b63d4 2600 return FALSE;
b9c361e0
JL
2601
2602 n->p_type = PT_LOAD;
b9c361e0
JL
2603 n->count = m->count - j;
2604 for (k = 0; k < n->count; ++k)
f7d69005
AM
2605 n->sections[k] = m->sections[j + k];
2606 m->count = j;
2607 m->p_size_valid = 0;
b9c361e0
JL
2608 n->next = m->next;
2609 m->next = n;
b9c361e0
JL
2610 }
2611
2612 return TRUE;
2613}
2614
25dbc73a
AM
2615/* Add extra PPC sections -- Note, for now, make .sbss2 and
2616 .PPC.EMB.sbss0 a normal section, and not a bss section so
2617 that the linker doesn't crater when trying to make more than
2618 2 sections. */
e656e369 2619
b35d266b 2620static const struct bfd_elf_special_section ppc_elf_special_sections[] =
7f4d3958 2621{
14b57c7c
AM
2622 { STRING_COMMA_LEN (".plt"), 0, SHT_NOBITS, SHF_ALLOC + SHF_EXECINSTR },
2623 { STRING_COMMA_LEN (".sbss"), -2, SHT_NOBITS, SHF_ALLOC + SHF_WRITE },
2624 { STRING_COMMA_LEN (".sbss2"), -2, SHT_PROGBITS, SHF_ALLOC },
2625 { STRING_COMMA_LEN (".sdata"), -2, SHT_PROGBITS, SHF_ALLOC + SHF_WRITE },
2626 { STRING_COMMA_LEN (".sdata2"), -2, SHT_PROGBITS, SHF_ALLOC },
2627 { STRING_COMMA_LEN (".tags"), 0, SHT_ORDERED, SHF_ALLOC },
2628 { STRING_COMMA_LEN (APUINFO_SECTION_NAME), 0, SHT_NOTE, 0 },
2629 { STRING_COMMA_LEN (".PPC.EMB.sbss0"), 0, SHT_PROGBITS, SHF_ALLOC },
2630 { STRING_COMMA_LEN (".PPC.EMB.sdata0"), 0, SHT_PROGBITS, SHF_ALLOC },
2631 { NULL, 0, 0, 0, 0 }
7f4d3958
L
2632};
2633
551b43fd
AM
2634/* This is what we want for new plt/got. */
2635static struct bfd_elf_special_section ppc_alt_plt =
07d6d2b8 2636 { STRING_COMMA_LEN (".plt"), 0, SHT_PROGBITS, SHF_ALLOC };
551b43fd
AM
2637
2638static const struct bfd_elf_special_section *
4aef7643 2639ppc_elf_get_sec_type_attr (bfd *abfd, asection *sec)
7f4d3958 2640{
b35d266b 2641 const struct bfd_elf_special_section *ssect;
551b43fd
AM
2642
2643 /* See if this is one of the special sections. */
2644 if (sec->name == NULL)
2645 return NULL;
2646
2647 ssect = _bfd_elf_get_special_section (sec->name, ppc_elf_special_sections,
2648 sec->use_rela_p);
2649 if (ssect != NULL)
2650 {
2651 if (ssect == ppc_elf_special_sections && (sec->flags & SEC_LOAD) != 0)
2652 ssect = &ppc_alt_plt;
2653 return ssect;
2654 }
2655
2656 return _bfd_elf_get_sec_type_attr (abfd, sec);
2657}
25dbc73a
AM
2658\f
2659/* Very simple linked list structure for recording apuinfo values. */
2660typedef struct apuinfo_list
2661{
2662 struct apuinfo_list *next;
2663 unsigned long value;
2664}
2665apuinfo_list;
e656e369 2666
25dbc73a 2667static apuinfo_list *head;
f2faa800 2668static bfd_boolean apuinfo_set;
deaaf2f3 2669
25dbc73a
AM
2670static void
2671apuinfo_list_init (void)
2672{
2673 head = NULL;
f2faa800 2674 apuinfo_set = FALSE;
25dbc73a 2675}
9abc968f 2676
25dbc73a
AM
2677static void
2678apuinfo_list_add (unsigned long value)
2679{
2680 apuinfo_list *entry = head;
deaaf2f3 2681
25dbc73a
AM
2682 while (entry != NULL)
2683 {
2684 if (entry->value == value)
2685 return;
2686 entry = entry->next;
2687 }
b4a38de6 2688
25dbc73a
AM
2689 entry = bfd_malloc (sizeof (* entry));
2690 if (entry == NULL)
2691 return;
e656e369 2692
25dbc73a
AM
2693 entry->value = value;
2694 entry->next = head;
2695 head = entry;
2696}
9abc968f 2697
25dbc73a
AM
2698static unsigned
2699apuinfo_list_length (void)
2700{
2701 apuinfo_list *entry;
2702 unsigned long count;
9abc968f 2703
25dbc73a
AM
2704 for (entry = head, count = 0;
2705 entry;
2706 entry = entry->next)
2707 ++ count;
e656e369 2708
25dbc73a
AM
2709 return count;
2710}
eea6121a 2711
25dbc73a
AM
2712static inline unsigned long
2713apuinfo_list_element (unsigned long number)
2714{
2715 apuinfo_list * entry;
e656e369 2716
25dbc73a
AM
2717 for (entry = head;
2718 entry && number --;
2719 entry = entry->next)
2720 ;
252b5132 2721
25dbc73a
AM
2722 return entry ? entry->value : 0;
2723}
2724
2725static void
2726apuinfo_list_finish (void)
2727{
2728 apuinfo_list *entry;
2729
2730 for (entry = head; entry;)
252b5132 2731 {
25dbc73a
AM
2732 apuinfo_list *next = entry->next;
2733 free (entry);
2734 entry = next;
2735 }
9abc968f 2736
25dbc73a
AM
2737 head = NULL;
2738}
9abc968f 2739
25dbc73a
AM
2740/* Scan the input BFDs and create a linked list of
2741 the APUinfo values that will need to be emitted. */
9abc968f 2742
25dbc73a
AM
2743static void
2744ppc_elf_begin_write_processing (bfd *abfd, struct bfd_link_info *link_info)
2745{
2746 bfd *ibfd;
2747 asection *asec;
deddc40b
NS
2748 char *buffer = NULL;
2749 bfd_size_type largest_input_size = 0;
25dbc73a 2750 unsigned i;
25dbc73a
AM
2751 unsigned long length;
2752 const char *error_message = NULL;
9abc968f 2753
25dbc73a
AM
2754 if (link_info == NULL)
2755 return;
9abc968f 2756
25dbc73a 2757 apuinfo_list_init ();
252b5132 2758
25dbc73a 2759 /* Read in the input sections contents. */
c72f2fb2 2760 for (ibfd = link_info->input_bfds; ibfd; ibfd = ibfd->link.next)
252b5132 2761 {
25dbc73a 2762 unsigned long datum;
252b5132 2763
25dbc73a
AM
2764 asec = bfd_get_section_by_name (ibfd, APUINFO_SECTION_NAME);
2765 if (asec == NULL)
2766 continue;
252b5132 2767
695344c0 2768 /* xgettext:c-format */
871b3ab2 2769 error_message = _("corrupt %s section in %pB");
25dbc73a 2770 length = asec->size;
deddc40b
NS
2771 if (length < 20)
2772 goto fail;
2773
f2faa800 2774 apuinfo_set = TRUE;
deddc40b 2775 if (largest_input_size < asec->size)
25dbc73a 2776 {
deddc40b
NS
2777 if (buffer)
2778 free (buffer);
2779 largest_input_size = asec->size;
2780 buffer = bfd_malloc (largest_input_size);
2781 if (!buffer)
2782 return;
25dbc73a 2783 }
5b914448 2784
25dbc73a 2785 if (bfd_seek (ibfd, asec->filepos, SEEK_SET) != 0
deddc40b 2786 || (bfd_bread (buffer, length, ibfd) != length))
25dbc73a 2787 {
695344c0 2788 /* xgettext:c-format */
871b3ab2 2789 error_message = _("unable to read in %s section from %pB");
25dbc73a
AM
2790 goto fail;
2791 }
252b5132 2792
25dbc73a
AM
2793 /* Verify the contents of the header. Note - we have to
2794 extract the values this way in order to allow for a
2795 host whose endian-ness is different from the target. */
deddc40b 2796 datum = bfd_get_32 (ibfd, buffer);
25dbc73a
AM
2797 if (datum != sizeof APUINFO_LABEL)
2798 goto fail;
252b5132 2799
deddc40b 2800 datum = bfd_get_32 (ibfd, buffer + 8);
25dbc73a
AM
2801 if (datum != 0x2)
2802 goto fail;
252b5132 2803
deddc40b 2804 if (strcmp (buffer + 12, APUINFO_LABEL) != 0)
25dbc73a 2805 goto fail;
252b5132 2806
25dbc73a 2807 /* Get the number of bytes used for apuinfo entries. */
deddc40b 2808 datum = bfd_get_32 (ibfd, buffer + 4);
25dbc73a
AM
2809 if (datum + 20 != length)
2810 goto fail;
2811
25dbc73a
AM
2812 /* Scan the apuinfo section, building a list of apuinfo numbers. */
2813 for (i = 0; i < datum; i += 4)
deddc40b 2814 apuinfo_list_add (bfd_get_32 (ibfd, buffer + 20 + i));
252b5132
RH
2815 }
2816
25dbc73a 2817 error_message = NULL;
252b5132 2818
f2faa800 2819 if (apuinfo_set)
deddc40b 2820 {
f2faa800
NS
2821 /* Compute the size of the output section. */
2822 unsigned num_entries = apuinfo_list_length ();
5b914448 2823
deddc40b
NS
2824 /* Set the output section size, if it exists. */
2825 asec = bfd_get_section_by_name (abfd, APUINFO_SECTION_NAME);
f2faa800 2826
deddc40b
NS
2827 if (asec && ! bfd_set_section_size (abfd, asec, 20 + num_entries * 4))
2828 {
2829 ibfd = abfd;
695344c0 2830 /* xgettext:c-format */
871b3ab2 2831 error_message = _("warning: unable to set size of %s section in %pB");
deddc40b
NS
2832 }
2833 }
25dbc73a
AM
2834
2835 fail:
deddc40b
NS
2836 if (buffer)
2837 free (buffer);
25dbc73a
AM
2838
2839 if (error_message)
cd9af601 2840 _bfd_error_handler (error_message, APUINFO_SECTION_NAME, ibfd);
25dbc73a 2841}
252b5132 2842
25dbc73a
AM
2843/* Prevent the output section from accumulating the input sections'
2844 contents. We have already stored this in our linked list structure. */
252b5132 2845
25dbc73a
AM
2846static bfd_boolean
2847ppc_elf_write_section (bfd *abfd ATTRIBUTE_UNUSED,
c7b8f16e 2848 struct bfd_link_info *link_info ATTRIBUTE_UNUSED,
25dbc73a
AM
2849 asection *asec,
2850 bfd_byte *contents ATTRIBUTE_UNUSED)
2851{
f2faa800 2852 return apuinfo_set && strcmp (asec->name, APUINFO_SECTION_NAME) == 0;
252b5132
RH
2853}
2854
25dbc73a
AM
2855/* Finally we can generate the output section. */
2856
2857static void
2858ppc_elf_final_write_processing (bfd *abfd, bfd_boolean linker ATTRIBUTE_UNUSED)
7619e7c7 2859{
25dbc73a
AM
2860 bfd_byte *buffer;
2861 asection *asec;
2862 unsigned i;
2863 unsigned num_entries;
2864 bfd_size_type length;
7619e7c7 2865
25dbc73a
AM
2866 asec = bfd_get_section_by_name (abfd, APUINFO_SECTION_NAME);
2867 if (asec == NULL)
2868 return;
2869
f2faa800 2870 if (!apuinfo_set)
25dbc73a
AM
2871 return;
2872
2873 length = asec->size;
2874 if (length < 20)
2875 return;
2876
2877 buffer = bfd_malloc (length);
2878 if (buffer == NULL)
7619e7c7 2879 {
4eca0228 2880 _bfd_error_handler
cf97bcb0 2881 (_("failed to allocate space for new APUinfo section"));
25dbc73a 2882 return;
7619e7c7 2883 }
7619e7c7 2884
25dbc73a
AM
2885 /* Create the apuinfo header. */
2886 num_entries = apuinfo_list_length ();
2887 bfd_put_32 (abfd, sizeof APUINFO_LABEL, buffer);
2888 bfd_put_32 (abfd, num_entries * 4, buffer + 4);
2889 bfd_put_32 (abfd, 0x2, buffer + 8);
2890 strcpy ((char *) buffer + 12, APUINFO_LABEL);
feee612b 2891
25dbc73a
AM
2892 length = 20;
2893 for (i = 0; i < num_entries; i++)
feee612b 2894 {
25dbc73a
AM
2895 bfd_put_32 (abfd, apuinfo_list_element (i), buffer + length);
2896 length += 4;
feee612b 2897 }
feee612b 2898
25dbc73a 2899 if (length != asec->size)
cf97bcb0 2900 _bfd_error_handler (_("failed to compute new APUinfo section"));
252b5132 2901
25dbc73a 2902 if (! bfd_set_section_contents (abfd, asec, buffer, (file_ptr) 0, length))
cf97bcb0 2903 _bfd_error_handler (_("failed to install new APUinfo section"));
252b5132 2904
25dbc73a
AM
2905 free (buffer);
2906
2907 apuinfo_list_finish ();
252b5132 2908}
25dbc73a 2909\f
7382d32a 2910static bfd_boolean
c6dd29ce 2911is_nonpic_glink_stub (bfd *abfd, asection *glink, bfd_vma off)
7382d32a 2912{
407aa07c 2913 bfd_byte buf[4 * 4];
7382d32a 2914
9e390558 2915 if (!bfd_get_section_contents (abfd, glink, buf, off, sizeof buf))
7382d32a
AM
2916 return FALSE;
2917
c6dd29ce
AM
2918 return ((bfd_get_32 (abfd, buf + 0) & 0xffff0000) == LIS_11
2919 && (bfd_get_32 (abfd, buf + 4) & 0xffff0000) == LWZ_11_11
407aa07c
AM
2920 && bfd_get_32 (abfd, buf + 8) == MTCTR_11
2921 && bfd_get_32 (abfd, buf + 12) == BCTR);
7382d32a
AM
2922}
2923
468392fb
AM
2924static bfd_boolean
2925section_covers_vma (bfd *abfd ATTRIBUTE_UNUSED, asection *section, void *ptr)
2926{
2927 bfd_vma vma = *(bfd_vma *) ptr;
2928 return ((section->flags & SEC_ALLOC) != 0
2929 && section->vma <= vma
2930 && vma < section->vma + section->size);
2931}
2932
2933static long
2934ppc_elf_get_synthetic_symtab (bfd *abfd, long symcount, asymbol **syms,
2935 long dynsymcount, asymbol **dynsyms,
2936 asymbol **ret)
2937{
2938 bfd_boolean (*slurp_relocs) (bfd *, asection *, asymbol **, bfd_boolean);
2939 asection *plt, *relplt, *dynamic, *glink;
2940 bfd_vma glink_vma = 0;
2941 bfd_vma resolv_vma = 0;
9e390558 2942 bfd_vma stub_off;
468392fb
AM
2943 asymbol *s;
2944 arelent *p;
9e390558 2945 long count, i, stub_delta;
468392fb
AM
2946 size_t size;
2947 char *names;
2948 bfd_byte buf[4];
2949
2950 *ret = NULL;
2951
2952 if ((abfd->flags & (DYNAMIC | EXEC_P)) == 0)
2953 return 0;
2954
2955 if (dynsymcount <= 0)
2956 return 0;
2957
2958 relplt = bfd_get_section_by_name (abfd, ".rela.plt");
2959 if (relplt == NULL)
2960 return 0;
2961
2962 plt = bfd_get_section_by_name (abfd, ".plt");
2963 if (plt == NULL)
2964 return 0;
2965
2966 /* Call common code to handle old-style executable PLTs. */
2967 if (elf_section_flags (plt) & SHF_EXECINSTR)
2968 return _bfd_elf_get_synthetic_symtab (abfd, symcount, syms,
2969 dynsymcount, dynsyms, ret);
2970
2971 /* If this object was prelinked, the prelinker stored the address
2972 of .glink at got[1]. If it wasn't prelinked, got[1] will be zero. */
2973 dynamic = bfd_get_section_by_name (abfd, ".dynamic");
2974 if (dynamic != NULL)
2975 {
2976 bfd_byte *dynbuf, *extdyn, *extdynend;
2977 size_t extdynsize;
2978 void (*swap_dyn_in) (bfd *, const void *, Elf_Internal_Dyn *);
2979
2980 if (!bfd_malloc_and_get_section (abfd, dynamic, &dynbuf))
2981 return -1;
2982
2983 extdynsize = get_elf_backend_data (abfd)->s->sizeof_dyn;
2984 swap_dyn_in = get_elf_backend_data (abfd)->s->swap_dyn_in;
2985
2986 extdyn = dynbuf;
2987 extdynend = extdyn + dynamic->size;
2988 for (; extdyn < extdynend; extdyn += extdynsize)
2989 {
2990 Elf_Internal_Dyn dyn;
2991 (*swap_dyn_in) (abfd, extdyn, &dyn);
2992
2993 if (dyn.d_tag == DT_NULL)
2994 break;
2995
2996 if (dyn.d_tag == DT_PPC_GOT)
2997 {
2998 unsigned int g_o_t = dyn.d_un.d_val;
2999 asection *got = bfd_get_section_by_name (abfd, ".got");
3000 if (got != NULL
3001 && bfd_get_section_contents (abfd, got, buf,
3002 g_o_t - got->vma + 4, 4))
3003 glink_vma = bfd_get_32 (abfd, buf);
3004 break;
3005 }
3006 }
3007 free (dynbuf);
3008 }
3009
3010 /* Otherwise we read the first plt entry. */
3011 if (glink_vma == 0)
3012 {
3013 if (bfd_get_section_contents (abfd, plt, buf, 0, 4))
3014 glink_vma = bfd_get_32 (abfd, buf);
3015 }
3016
3017 if (glink_vma == 0)
3018 return 0;
3019
3020 /* The .glink section usually does not survive the final
3021 link; search for the section (usually .text) where the
3022 glink stubs now reside. */
3023 glink = bfd_sections_find_if (abfd, section_covers_vma, &glink_vma);
3024 if (glink == NULL)
3025 return 0;
3026
3027 /* Determine glink PLT resolver by reading the relative branch
3028 from the first glink stub. */
3029 if (bfd_get_section_contents (abfd, glink, buf,
3030 glink_vma - glink->vma, 4))
3031 {
3032 unsigned int insn = bfd_get_32 (abfd, buf);
3033
3034 /* The first glink stub may either branch to the resolver ... */
3035 insn ^= B;
3036 if ((insn & ~0x3fffffc) == 0)
3037 resolv_vma = glink_vma + (insn ^ 0x2000000) - 0x2000000;
3038
3039 /* ... or fall through a bunch of NOPs. */
3040 else if ((insn ^ B ^ NOP) == 0)
3041 for (i = 4;
3042 bfd_get_section_contents (abfd, glink, buf,
3043 glink_vma - glink->vma + i, 4);
3044 i += 4)
3045 if (bfd_get_32 (abfd, buf) != NOP)
3046 {
3047 resolv_vma = glink_vma + i;
3048 break;
3049 }
3050 }
3051
7382d32a 3052 count = relplt->size / sizeof (Elf32_External_Rela);
7382d32a
AM
3053 /* If the stubs are those for -shared/-pie then we might have
3054 multiple stubs for each plt entry. If that is the case then
3055 there is no way to associate stubs with their plt entries short
9e390558
AM
3056 of figuring out the GOT pointer value used in the stub.
3057 The offsets tested here need to cover all possible values of
3058 GLINK_ENTRY_SIZE for other than __tls_get_addr_opt. */
3059 stub_off = glink_vma - glink->vma;
3060 for (stub_delta = 16; stub_delta <= 32; stub_delta += 8)
3061 if (is_nonpic_glink_stub (abfd, glink, stub_off - stub_delta))
3062 break;
3063 if (stub_delta > 32)
7382d32a
AM
3064 return 0;
3065
468392fb
AM
3066 slurp_relocs = get_elf_backend_data (abfd)->s->slurp_reloc_table;
3067 if (! (*slurp_relocs) (abfd, relplt, dynsyms, TRUE))
3068 return -1;
3069
468392fb
AM
3070 size = count * sizeof (asymbol);
3071 p = relplt->relocation;
3072 for (i = 0; i < count; i++, p++)
e054468f
AM
3073 {
3074 size += strlen ((*p->sym_ptr_ptr)->name) + sizeof ("@plt");
3075 if (p->addend != 0)
3076 size += sizeof ("+0x") - 1 + 8;
3077 }
468392fb
AM
3078
3079 size += sizeof (asymbol) + sizeof ("__glink");
3080
3081 if (resolv_vma)
3082 size += sizeof (asymbol) + sizeof ("__glink_PLTresolve");
3083
3084 s = *ret = bfd_malloc (size);
3085 if (s == NULL)
3086 return -1;
3087
9e390558 3088 stub_off = glink_vma - glink->vma;
468392fb 3089 names = (char *) (s + count + 1 + (resolv_vma != 0));
1079403c
AM
3090 p = relplt->relocation + count - 1;
3091 for (i = 0; i < count; i++)
468392fb
AM
3092 {
3093 size_t len;
3094
9e390558
AM
3095 stub_off -= stub_delta;
3096 if (strcmp ((*p->sym_ptr_ptr)->name, "__tls_get_addr_opt") == 0)
3097 stub_off -= 32;
468392fb
AM
3098 *s = **p->sym_ptr_ptr;
3099 /* Undefined syms won't have BSF_LOCAL or BSF_GLOBAL set. Since
3100 we are defining a symbol, ensure one of them is set. */
3101 if ((s->flags & BSF_LOCAL) == 0)
3102 s->flags |= BSF_GLOBAL;
6ba2a415 3103 s->flags |= BSF_SYNTHETIC;
468392fb 3104 s->section = glink;
9e390558 3105 s->value = stub_off;
468392fb
AM
3106 s->name = names;
3107 s->udata.p = NULL;
3108 len = strlen ((*p->sym_ptr_ptr)->name);
3109 memcpy (names, (*p->sym_ptr_ptr)->name, len);
3110 names += len;
e054468f
AM
3111 if (p->addend != 0)
3112 {
3113 memcpy (names, "+0x", sizeof ("+0x") - 1);
3114 names += sizeof ("+0x") - 1;
3115 bfd_sprintf_vma (abfd, names, p->addend);
3116 names += strlen (names);
3117 }
468392fb
AM
3118 memcpy (names, "@plt", sizeof ("@plt"));
3119 names += sizeof ("@plt");
3120 ++s;
1079403c 3121 --p;
468392fb
AM
3122 }
3123
3124 /* Add a symbol at the start of the glink branch table. */
86a4952b 3125 memset (s, 0, sizeof *s);
468392fb 3126 s->the_bfd = abfd;
6ba2a415 3127 s->flags = BSF_GLOBAL | BSF_SYNTHETIC;
468392fb
AM
3128 s->section = glink;
3129 s->value = glink_vma - glink->vma;
3130 s->name = names;
3131 memcpy (names, "__glink", sizeof ("__glink"));
3132 names += sizeof ("__glink");
3133 s++;
3134 count++;
3135
3136 if (resolv_vma)
3137 {
3138 /* Add a symbol for the glink PLT resolver. */
86a4952b 3139 memset (s, 0, sizeof *s);
468392fb 3140 s->the_bfd = abfd;
6ba2a415 3141 s->flags = BSF_GLOBAL | BSF_SYNTHETIC;
468392fb
AM
3142 s->section = glink;
3143 s->value = resolv_vma - glink->vma;
3144 s->name = names;
3145 memcpy (names, "__glink_PLTresolve", sizeof ("__glink_PLTresolve"));
3146 names += sizeof ("__glink_PLTresolve");
3147 s++;
3148 count++;
3149 }
3150
3151 return count;
3152}
3153\f
25dbc73a
AM
3154/* The following functions are specific to the ELF linker, while
3155 functions above are used generally. They appear in this file more
3156 or less in the order in which they are called. eg.
3157 ppc_elf_check_relocs is called early in the link process,
3158 ppc_elf_finish_dynamic_sections is one of the last functions
3159 called. */
252b5132 3160
a6aa5195 3161/* Track PLT entries needed for a given symbol. We might need more
a877a2b6 3162 than one glink entry per symbol when generating a pic binary. */
a6aa5195
AM
3163struct plt_entry
3164{
3165 struct plt_entry *next;
3166
3167 /* -fPIC uses multiple GOT sections, one per file, called ".got2".
3168 This field stores the offset into .got2 used to initialise the
a877a2b6
AM
3169 GOT pointer reg. It will always be at least 32768. (Current
3170 gcc always uses an offset of 32768, but ld -r will pack .got2
3171 sections together resulting in larger offsets). */
a6aa5195
AM
3172 bfd_vma addend;
3173
3174 /* The .got2 section. */
3175 asection *sec;
3176
3177 /* PLT refcount or offset. */
3178 union
3179 {
3180 bfd_signed_vma refcount;
3181 bfd_vma offset;
3182 } plt;
3183
3184 /* .glink stub offset. */
3185 bfd_vma glink_offset;
3186};
3187
7c8bbca5
AM
3188/* Of those relocs that might be copied as dynamic relocs, this
3189 function selects those that must be copied when linking a shared
3190 library or PIE, even when the symbol is local. */
252b5132 3191
1d483afe
AM
3192static int
3193must_be_dyn_reloc (struct bfd_link_info *info,
3194 enum elf_ppc_reloc_type r_type)
3195{
3196 switch (r_type)
3197 {
3198 default:
7c8bbca5
AM
3199 /* Only relative relocs can be resolved when the object load
3200 address isn't fixed. DTPREL32 is excluded because the
3201 dynamic linker needs to differentiate global dynamic from
3202 local dynamic __tls_index pairs when PPC_OPT_TLS is set. */
1d483afe
AM
3203 return 1;
3204
3205 case R_PPC_REL24:
3206 case R_PPC_REL14:
3207 case R_PPC_REL14_BRTAKEN:
3208 case R_PPC_REL14_BRNTAKEN:
3209 case R_PPC_REL32:
3210 return 0;
3211
3212 case R_PPC_TPREL32:
3213 case R_PPC_TPREL16:
3214 case R_PPC_TPREL16_LO:
3215 case R_PPC_TPREL16_HI:
3216 case R_PPC_TPREL16_HA:
7c8bbca5
AM
3217 /* These relocations are relative but in a shared library the
3218 linker doesn't know the thread pointer base. */
3219 return bfd_link_dll (info);
1d483afe
AM
3220 }
3221}
252b5132 3222
25dbc73a
AM
3223/* If ELIMINATE_COPY_RELOCS is non-zero, the linker will try to avoid
3224 copying dynamic variables from a shared lib into an app's dynbss
3225 section, and instead use a dynamic relocation to point into the
3226 shared lib. */
3227#define ELIMINATE_COPY_RELOCS 1
252b5132 3228
f95f8542
AM
3229/* Used to track dynamic relocations for local symbols. */
3230struct ppc_dyn_relocs
3231{
3232 struct ppc_dyn_relocs *next;
3233
3234 /* The input section of the reloc. */
3235 asection *sec;
3236
3237 /* Total number of relocs copied for the input section. */
3238 unsigned int count : 31;
3239
3240 /* Whether this entry is for STT_GNU_IFUNC symbols. */
3241 unsigned int ifunc : 1;
3242};
3243
25dbc73a 3244/* PPC ELF linker hash entry. */
252b5132 3245
25dbc73a
AM
3246struct ppc_elf_link_hash_entry
3247{
3248 struct elf_link_hash_entry elf;
252b5132 3249
25dbc73a
AM
3250 /* If this symbol is used in the linker created sections, the processor
3251 specific backend uses this field to map the field into the offset
3252 from the beginning of the section. */
3253 elf_linker_section_pointers_t *linker_section_pointer;
252b5132 3254
25dbc73a 3255 /* Track dynamic relocs copied for this symbol. */
6061a67d 3256 struct elf_dyn_relocs *dyn_relocs;
252b5132 3257
37da22e5
AM
3258 /* Contexts in which symbol is used in the GOT.
3259 Bits are or'd into the mask as the corresponding relocs are
3260 encountered during check_relocs, with TLS_TLS being set when any
3261 of the other TLS bits are set. tls_optimize clears bits when
3262 optimizing to indicate the corresponding GOT entry type is not
3263 needed. If set, TLS_TLS is never cleared. tls_optimize may also
3264 set TLS_TPRELGD when a GD reloc turns into a TPREL one. We use a
3265 separate flag rather than setting TPREL just for convenience in
3266 distinguishing the two cases.
3267 These flags are also kept for local symbols. */
3268#define TLS_TLS 1 /* Any TLS reloc. */
3269#define TLS_GD 2 /* GD reloc. */
3270#define TLS_LD 4 /* LD reloc. */
3271#define TLS_TPREL 8 /* TPREL reloc, => IE. */
3272#define TLS_DTPREL 16 /* DTPREL reloc, => LD. */
3273#define TLS_MARK 32 /* __tls_get_addr call marked. */
3274#define TLS_TPRELGD 64 /* TPREL reloc resulting from GD->IE. */
bac3c8c5 3275 unsigned char tls_mask;
4dc4a9a5 3276
37da22e5
AM
3277 /* The above field is also used to mark function symbols. In which
3278 case TLS_TLS will be 0. */
3279#define PLT_IFUNC 2 /* STT_GNU_IFUNC. */
2d7ad24e 3280#define PLT_KEEP 4 /* inline plt call requires plt entry. */
37da22e5
AM
3281#define NON_GOT 256 /* local symbol plt, not stored. */
3282
4dc4a9a5
DJ
3283 /* Nonzero if we have seen a small data relocation referring to this
3284 symbol. */
d3e454b9
AM
3285 unsigned char has_sda_refs : 1;
3286
3287 /* Flag use of given relocations. */
3288 unsigned char has_addr16_ha : 1;
3289 unsigned char has_addr16_lo : 1;
25dbc73a 3290};
252b5132 3291
25dbc73a
AM
3292#define ppc_elf_hash_entry(ent) ((struct ppc_elf_link_hash_entry *) (ent))
3293
3294/* PPC ELF linker hash table. */
3295
3296struct ppc_elf_link_hash_table
3297{
3298 struct elf_link_hash_table elf;
3299
5446cbdf
AM
3300 /* Various options passed from the linker. */
3301 struct ppc_elf_params *params;
3302
25dbc73a 3303 /* Short-cuts to get to dynamic linker sections. */
d7128ce4 3304 asection *glink;
25dbc73a
AM
3305 asection *dynsbss;
3306 asection *relsbss;
c9a2f333 3307 elf_linker_section_t sdata[2];
25dbc73a 3308 asection *sbss;
6177242a 3309 asection *glink_eh_frame;
2d7ad24e
AM
3310 asection *pltlocal;
3311 asection *relpltlocal;
25dbc73a 3312
016687f8
AM
3313 /* The (unloaded but important) .rela.plt.unloaded on VxWorks. */
3314 asection *srelplt2;
3315
1d483afe 3316 /* Shortcut to __tls_get_addr. */
25dbc73a 3317 struct elf_link_hash_entry *tls_get_addr;
252b5132 3318
016687f8
AM
3319 /* The bfd that forced an old-style PLT. */
3320 bfd *old_bfd;
5b914448 3321
25dbc73a
AM
3322 /* TLS local dynamic got entry handling. */
3323 union {
3324 bfd_signed_vma refcount;
3325 bfd_vma offset;
3326 } tlsld_got;
252b5132 3327
c6dd29ce 3328 /* Offset of branch table to PltResolve function in glink. */
d7128ce4
AM
3329 bfd_vma glink_pltresolve;
3330
3b36f7e6
AM
3331 /* Size of reserved GOT entries. */
3332 unsigned int got_header_size;
3333 /* Non-zero if allocating the header left a gap. */
3334 unsigned int got_gap;
3335
4a3dc543
RS
3336 /* The type of PLT we have chosen to use. */
3337 enum ppc_elf_plt_type plt_type;
3338
9d8504b1 3339 /* True if the target system is VxWorks. */
016687f8 3340 unsigned int is_vxworks:1;
9d8504b1 3341
82e66161
AM
3342 /* Whether there exist local gnu indirect function resolvers,
3343 referenced by dynamic relocations. */
3344 unsigned int local_ifunc_resolver:1;
3345 unsigned int maybe_local_ifunc_resolver:1;
3346
9a23f96e
AM
3347 /* Set if tls optimization is enabled. */
3348 unsigned int do_tls_opt:1;
3349
3e04d765
AM
3350 /* Set if inline plt calls should be converted to direct calls. */
3351 unsigned int can_convert_all_inline_plt:1;
3352
9d8504b1
PB
3353 /* The size of PLT entries. */
3354 int plt_entry_size;
3355 /* The distance between adjacent PLT slots. */
3356 int plt_slot_size;
3357 /* The size of the first PLT entry. */
3358 int plt_initial_entry_size;
016687f8 3359
87d72d41
AM
3360 /* Small local sym cache. */
3361 struct sym_cache sym_cache;
25dbc73a 3362};
252b5132 3363
94caa966
AM
3364/* Rename some of the generic section flags to better document how they
3365 are used for ppc32. The flags are only valid for ppc32 elf objects. */
3366
3367/* Nonzero if this section has TLS related relocations. */
3368#define has_tls_reloc sec_flg0
3369
3370/* Nonzero if this section has a call to __tls_get_addr. */
3371#define has_tls_get_addr_call sec_flg1
3372
3e04d765
AM
3373 /* Flag set when PLTCALL relocs are detected. */
3374#define has_pltcall sec_flg2
3375
25dbc73a 3376/* Get the PPC ELF linker hash table from a link_info structure. */
252b5132 3377
25dbc73a 3378#define ppc_elf_hash_table(p) \
4dfe6ac6
NC
3379 (elf_hash_table_id ((struct elf_link_hash_table *) ((p)->hash)) \
3380 == PPC32_ELF_DATA ? ((struct ppc_elf_link_hash_table *) ((p)->hash)) : NULL)
252b5132 3381
25dbc73a 3382/* Create an entry in a PPC ELF linker hash table. */
252b5132 3383
25dbc73a
AM
3384static struct bfd_hash_entry *
3385ppc_elf_link_hash_newfunc (struct bfd_hash_entry *entry,
3386 struct bfd_hash_table *table,
3387 const char *string)
252b5132 3388{
25dbc73a
AM
3389 /* Allocate the structure if it has not already been allocated by a
3390 subclass. */
3391 if (entry == NULL)
3392 {
3393 entry = bfd_hash_allocate (table,
3394 sizeof (struct ppc_elf_link_hash_entry));
3395 if (entry == NULL)
3396 return entry;
3397 }
252b5132 3398
25dbc73a
AM
3399 /* Call the allocation method of the superclass. */
3400 entry = _bfd_elf_link_hash_newfunc (entry, table, string);
3401 if (entry != NULL)
3402 {
3403 ppc_elf_hash_entry (entry)->linker_section_pointer = NULL;
3404 ppc_elf_hash_entry (entry)->dyn_relocs = NULL;
3405 ppc_elf_hash_entry (entry)->tls_mask = 0;
5240d94d 3406 ppc_elf_hash_entry (entry)->has_sda_refs = 0;
25dbc73a 3407 }
252b5132 3408
25dbc73a 3409 return entry;
252b5132 3410}
3dab13f6 3411
25dbc73a 3412/* Create a PPC ELF linker hash table. */
3dab13f6 3413
25dbc73a
AM
3414static struct bfd_link_hash_table *
3415ppc_elf_link_hash_table_create (bfd *abfd)
3dab13f6 3416{
25dbc73a 3417 struct ppc_elf_link_hash_table *ret;
76e7a751 3418 static struct ppc_elf_params default_params
407aa07c 3419 = { PLT_OLD, 0, 0, 1, 0, 0, 12, 0, 0, 0 };
3dab13f6 3420
25dbc73a
AM
3421 ret = bfd_zmalloc (sizeof (struct ppc_elf_link_hash_table));
3422 if (ret == NULL)
3423 return NULL;
3dab13f6 3424
66eb6687
AM
3425 if (!_bfd_elf_link_hash_table_init (&ret->elf, abfd,
3426 ppc_elf_link_hash_newfunc,
4dfe6ac6
NC
3427 sizeof (struct ppc_elf_link_hash_entry),
3428 PPC32_ELF_DATA))
3dab13f6 3429 {
25dbc73a
AM
3430 free (ret);
3431 return NULL;
3432 }
58111eb7 3433
a6aa5195
AM
3434 ret->elf.init_plt_refcount.refcount = 0;
3435 ret->elf.init_plt_refcount.glist = NULL;
3436 ret->elf.init_plt_offset.offset = 0;
3437 ret->elf.init_plt_offset.glist = NULL;
3438
db434ba0
AM
3439 ret->params = &default_params;
3440
c9a2f333
AM
3441 ret->sdata[0].name = ".sdata";
3442 ret->sdata[0].sym_name = "_SDA_BASE_";
3443 ret->sdata[0].bss_name = ".sbss";
3444
3445 ret->sdata[1].name = ".sdata2";
3446 ret->sdata[1].sym_name = "_SDA2_BASE_";
3447 ret->sdata[1].bss_name = ".sbss2";
3448
9d8504b1
PB
3449 ret->plt_entry_size = 12;
3450 ret->plt_slot_size = 8;
3451 ret->plt_initial_entry_size = 72;
9d8504b1 3452
25dbc73a
AM
3453 return &ret->elf.root;
3454}
3dab13f6 3455
5446cbdf
AM
3456/* Hook linker params into hash table. */
3457
3458void
3459ppc_elf_link_params (struct bfd_link_info *info, struct ppc_elf_params *params)
3460{
3461 struct ppc_elf_link_hash_table *htab = ppc_elf_hash_table (info);
3462
3463 if (htab)
3464 htab->params = params;
76e7a751 3465 params->pagesize_p2 = bfd_log2 (params->pagesize);
5446cbdf
AM
3466}
3467
9d8504b1 3468/* Create .got and the related sections. */
3dab13f6 3469
25dbc73a
AM
3470static bfd_boolean
3471ppc_elf_create_got (bfd *abfd, struct bfd_link_info *info)
3472{
3473 struct ppc_elf_link_hash_table *htab;
3dab13f6 3474
25dbc73a
AM
3475 if (!_bfd_elf_create_got_section (abfd, info))
3476 return FALSE;
3dab13f6 3477
25dbc73a 3478 htab = ppc_elf_hash_table (info);
ce558b89 3479 if (!htab->is_vxworks)
9d8504b1
PB
3480 {
3481 /* The powerpc .got has a blrl instruction in it. Mark it
3482 executable. */
ce558b89
AM
3483 flagword flags = (SEC_ALLOC | SEC_LOAD | SEC_CODE | SEC_HAS_CONTENTS
3484 | SEC_IN_MEMORY | SEC_LINKER_CREATED);
3485 if (!bfd_set_section_flags (abfd, htab->elf.sgot, flags))
9d8504b1
PB
3486 return FALSE;
3487 }
3dab13f6 3488
25dbc73a
AM
3489 return TRUE;
3490}
3dab13f6 3491
93d1b056
AM
3492/* Create a special linker section, used for R_PPC_EMB_SDAI16 and
3493 R_PPC_EMB_SDA2I16 pointers. These sections become part of .sdata
3494 and .sdata2. Create _SDA_BASE_ and _SDA2_BASE too. */
3495
3496static bfd_boolean
3497ppc_elf_create_linker_section (bfd *abfd,
3498 struct bfd_link_info *info,
3499 flagword flags,
3500 elf_linker_section_t *lsect)
3501{
3502 asection *s;
3503
3504 flags |= (SEC_ALLOC | SEC_LOAD | SEC_HAS_CONTENTS | SEC_IN_MEMORY
3505 | SEC_LINKER_CREATED);
3506
3507 s = bfd_make_section_anyway_with_flags (abfd, lsect->name, flags);
3508 if (s == NULL)
3509 return FALSE;
3510 lsect->section = s;
3511
3512 /* Define the sym on the first section of this name. */
3513 s = bfd_get_section_by_name (abfd, lsect->name);
3514
3515 lsect->sym = _bfd_elf_define_linkage_sym (abfd, info, s, lsect->sym_name);
3516 if (lsect->sym == NULL)
3517 return FALSE;
3518 lsect->sym->root.u.def.value = 0x8000;
3519 return TRUE;
3520}
3521
e054468f
AM
3522static bfd_boolean
3523ppc_elf_create_glink (bfd *abfd, struct bfd_link_info *info)
3524{
3525 struct ppc_elf_link_hash_table *htab = ppc_elf_hash_table (info);
3526 asection *s;
3527 flagword flags;
691d2e9a 3528 int p2align;
e054468f
AM
3529
3530 flags = (SEC_ALLOC | SEC_LOAD | SEC_CODE | SEC_READONLY | SEC_HAS_CONTENTS
3531 | SEC_IN_MEMORY | SEC_LINKER_CREATED);
3532 s = bfd_make_section_anyway_with_flags (abfd, ".glink", flags);
3533 htab->glink = s;
691d2e9a
AM
3534 p2align = htab->params->ppc476_workaround ? 6 : 4;
3535 if (p2align < htab->params->plt_stub_align)
3536 p2align = htab->params->plt_stub_align;
e054468f 3537 if (s == NULL
691d2e9a 3538 || !bfd_set_section_alignment (abfd, s, p2align))
e054468f
AM
3539 return FALSE;
3540
6177242a
AM
3541 if (!info->no_ld_generated_unwind_info)
3542 {
3543 flags = (SEC_ALLOC | SEC_LOAD | SEC_READONLY | SEC_HAS_CONTENTS
3544 | SEC_IN_MEMORY | SEC_LINKER_CREATED);
3545 s = bfd_make_section_anyway_with_flags (abfd, ".eh_frame", flags);
3546 htab->glink_eh_frame = s;
3547 if (s == NULL
3548 || !bfd_set_section_alignment (abfd, s, 2))
3549 return FALSE;
3550 }
3551
e054468f
AM
3552 flags = SEC_ALLOC | SEC_LINKER_CREATED;
3553 s = bfd_make_section_anyway_with_flags (abfd, ".iplt", flags);
ce558b89 3554 htab->elf.iplt = s;
e054468f
AM
3555 if (s == NULL
3556 || !bfd_set_section_alignment (abfd, s, 4))
3557 return FALSE;
3558
3559 flags = (SEC_ALLOC | SEC_LOAD | SEC_READONLY | SEC_HAS_CONTENTS
3560 | SEC_IN_MEMORY | SEC_LINKER_CREATED);
14b2f831 3561 s = bfd_make_section_anyway_with_flags (abfd, ".rela.iplt", flags);
ce558b89 3562 htab->elf.irelplt = s;
e054468f
AM
3563 if (s == NULL
3564 || ! bfd_set_section_alignment (abfd, s, 2))
3565 return FALSE;
93d1b056 3566
2d7ad24e
AM
3567 /* Local plt entries. */
3568 flags = (SEC_ALLOC | SEC_LOAD
3569 | SEC_HAS_CONTENTS | SEC_IN_MEMORY | SEC_LINKER_CREATED);
3570 htab->pltlocal = bfd_make_section_anyway_with_flags (abfd, ".branch_lt",
3571 flags);
3572 if (htab->pltlocal == NULL
3573 || ! bfd_set_section_alignment (abfd, htab->pltlocal, 2))
3574 return FALSE;
3575
3576 if (bfd_link_pic (info))
3577 {
3578 flags = (SEC_ALLOC | SEC_LOAD | SEC_READONLY
3579 | SEC_HAS_CONTENTS | SEC_IN_MEMORY | SEC_LINKER_CREATED);
3580 htab->relpltlocal
3581 = bfd_make_section_anyway_with_flags (abfd, ".rela.branch_lt", flags);
3582 if (htab->relpltlocal == NULL
3583 || ! bfd_set_section_alignment (abfd, htab->relpltlocal, 2))
3584 return FALSE;
3585 }
3586
93d1b056
AM
3587 if (!ppc_elf_create_linker_section (abfd, info, 0,
3588 &htab->sdata[0]))
3589 return FALSE;
3590
3591 if (!ppc_elf_create_linker_section (abfd, info, SEC_READONLY,
3592 &htab->sdata[1]))
3593 return FALSE;
3594
e054468f
AM
3595 return TRUE;
3596}
3597
25dbc73a
AM
3598/* We have to create .dynsbss and .rela.sbss here so that they get mapped
3599 to output sections (just like _bfd_elf_create_dynamic_sections has
3600 to create .dynbss and .rela.bss). */
3dab13f6 3601
25dbc73a
AM
3602static bfd_boolean
3603ppc_elf_create_dynamic_sections (bfd *abfd, struct bfd_link_info *info)
3604{
3605 struct ppc_elf_link_hash_table *htab;
3606 asection *s;
3607 flagword flags;
3dab13f6 3608
25dbc73a 3609 htab = ppc_elf_hash_table (info);
3dab13f6 3610
ce558b89 3611 if (htab->elf.sgot == NULL
25dbc73a 3612 && !ppc_elf_create_got (abfd, info))
3dab13f6
AM
3613 return FALSE;
3614
25dbc73a
AM
3615 if (!_bfd_elf_create_dynamic_sections (abfd, info))
3616 return FALSE;
3dab13f6 3617
e054468f
AM
3618 if (htab->glink == NULL
3619 && !ppc_elf_create_glink (abfd, info))
d7128ce4 3620 return FALSE;
3dab13f6 3621
14b2f831
AM
3622 s = bfd_make_section_anyway_with_flags (abfd, ".dynsbss",
3623 SEC_ALLOC | SEC_LINKER_CREATED);
3b36f7e6 3624 htab->dynsbss = s;
3496cb2a 3625 if (s == NULL)
25dbc73a 3626 return FALSE;
3dab13f6 3627
0e1862bb 3628 if (! bfd_link_pic (info))
25dbc73a 3629 {
e054468f
AM
3630 flags = (SEC_ALLOC | SEC_LOAD | SEC_READONLY | SEC_HAS_CONTENTS
3631 | SEC_IN_MEMORY | SEC_LINKER_CREATED);
14b2f831 3632 s = bfd_make_section_anyway_with_flags (abfd, ".rela.sbss", flags);
3b36f7e6 3633 htab->relsbss = s;
25dbc73a 3634 if (s == NULL
25dbc73a
AM
3635 || ! bfd_set_section_alignment (abfd, s, 2))
3636 return FALSE;
3637 }
3dab13f6 3638
711de32c
RS
3639 if (htab->is_vxworks
3640 && !elf_vxworks_create_dynamic_sections (abfd, info, &htab->srelplt2))
3641 return FALSE;
9d8504b1 3642
ce558b89 3643 s = htab->elf.splt;
3b36f7e6 3644 flags = SEC_ALLOC | SEC_CODE | SEC_LINKER_CREATED;
4a3dc543
RS
3645 if (htab->plt_type == PLT_VXWORKS)
3646 /* The VxWorks PLT is a loaded section with contents. */
3647 flags |= SEC_HAS_CONTENTS | SEC_LOAD | SEC_READONLY;
25dbc73a
AM
3648 return bfd_set_section_flags (abfd, s, flags);
3649}
3dab13f6 3650
25dbc73a 3651/* Copy the extra info we tack onto an elf_link_hash_entry. */
58111eb7 3652
25dbc73a 3653static void
fcfa13d2 3654ppc_elf_copy_indirect_symbol (struct bfd_link_info *info,
25dbc73a
AM
3655 struct elf_link_hash_entry *dir,
3656 struct elf_link_hash_entry *ind)
3657{
3658 struct ppc_elf_link_hash_entry *edir, *eind;
3dab13f6 3659
25dbc73a
AM
3660 edir = (struct ppc_elf_link_hash_entry *) dir;
3661 eind = (struct ppc_elf_link_hash_entry *) ind;
3dab13f6 3662
c79d6685
AM
3663 edir->tls_mask |= eind->tls_mask;
3664 edir->has_sda_refs |= eind->has_sda_refs;
3665
e81830c5
AM
3666 if (edir->elf.versioned != versioned_hidden)
3667 edir->elf.ref_dynamic |= eind->elf.ref_dynamic;
c79d6685
AM
3668 edir->elf.ref_regular |= eind->elf.ref_regular;
3669 edir->elf.ref_regular_nonweak |= eind->elf.ref_regular_nonweak;
4a7e5234 3670 edir->elf.non_got_ref |= eind->elf.non_got_ref;
c79d6685
AM
3671 edir->elf.needs_plt |= eind->elf.needs_plt;
3672 edir->elf.pointer_equality_needed |= eind->elf.pointer_equality_needed;
3673
287c7eaf
AM
3674 /* If we were called to copy over info for a weak sym, that's all. */
3675 if (eind->elf.root.type != bfd_link_hash_indirect)
3676 return;
3677
25dbc73a
AM
3678 if (eind->dyn_relocs != NULL)
3679 {
3680 if (edir->dyn_relocs != NULL)
3dab13f6 3681 {
6061a67d
AM
3682 struct elf_dyn_relocs **pp;
3683 struct elf_dyn_relocs *p;
3dab13f6 3684
fcfa13d2 3685 /* Add reloc counts against the indirect sym to the direct sym
25dbc73a
AM
3686 list. Merge any entries against the same section. */
3687 for (pp = &eind->dyn_relocs; (p = *pp) != NULL; )
3dab13f6 3688 {
6061a67d 3689 struct elf_dyn_relocs *q;
25dbc73a
AM
3690
3691 for (q = edir->dyn_relocs; q != NULL; q = q->next)
3692 if (q->sec == p->sec)
3693 {
3694 q->pc_count += p->pc_count;
3695 q->count += p->count;
3696 *pp = p->next;
3697 break;
3698 }
3699 if (q == NULL)
3700 pp = &p->next;
3dab13f6 3701 }
25dbc73a 3702 *pp = edir->dyn_relocs;
3dab13f6 3703 }
25dbc73a
AM
3704
3705 edir->dyn_relocs = eind->dyn_relocs;
3706 eind->dyn_relocs = NULL;
3dab13f6 3707 }
3dab13f6 3708
a6aa5195
AM
3709 /* Copy over the GOT refcount entries that we may have already seen to
3710 the symbol which just became indirect. */
fcfa13d2
AM
3711 edir->elf.got.refcount += eind->elf.got.refcount;
3712 eind->elf.got.refcount = 0;
a6aa5195
AM
3713
3714 /* And plt entries. */
3715 if (eind->elf.plt.plist != NULL)
3716 {
3717 if (edir->elf.plt.plist != NULL)
3718 {
3719 struct plt_entry **entp;
3720 struct plt_entry *ent;
3721
3722 for (entp = &eind->elf.plt.plist; (ent = *entp) != NULL; )
3723 {
3724 struct plt_entry *dent;
3725
3726 for (dent = edir->elf.plt.plist; dent != NULL; dent = dent->next)
3727 if (dent->sec == ent->sec && dent->addend == ent->addend)
3728 {
3729 dent->plt.refcount += ent->plt.refcount;
3730 *entp = ent->next;
3731 break;
3732 }
3733 if (dent == NULL)
3734 entp = &ent->next;
3735 }
3736 *entp = edir->elf.plt.plist;
3737 }
3738
3739 edir->elf.plt.plist = eind->elf.plt.plist;
3740 eind->elf.plt.plist = NULL;
3741 }
3742
fcfa13d2 3743 if (eind->elf.dynindx != -1)
25dbc73a 3744 {
fcfa13d2
AM
3745 if (edir->elf.dynindx != -1)
3746 _bfd_elf_strtab_delref (elf_hash_table (info)->dynstr,
3747 edir->elf.dynstr_index);
a6aa5195
AM
3748 edir->elf.dynindx = eind->elf.dynindx;
3749 edir->elf.dynstr_index = eind->elf.dynstr_index;
3750 eind->elf.dynindx = -1;
3751 eind->elf.dynstr_index = 0;
25dbc73a 3752 }
25dbc73a 3753}
3dab13f6 3754
25dbc73a
AM
3755/* Hook called by the linker routine which adds symbols from an object
3756 file. We use it to put .comm items in .sbss, and not .bss. */
58111eb7 3757
25dbc73a
AM
3758static bfd_boolean
3759ppc_elf_add_symbol_hook (bfd *abfd,
3760 struct bfd_link_info *info,
3761 Elf_Internal_Sym *sym,
3762 const char **namep ATTRIBUTE_UNUSED,
3763 flagword *flagsp ATTRIBUTE_UNUSED,
3764 asection **secp,
3765 bfd_vma *valp)
3766{
3767 if (sym->st_shndx == SHN_COMMON
0e1862bb 3768 && !bfd_link_relocatable (info)
0c8d6e5c
AM
3769 && is_ppc_elf (info->output_bfd)
3770 && sym->st_size <= elf_gp_size (abfd))
25dbc73a
AM
3771 {
3772 /* Common symbols less than or equal to -G nn bytes are automatically
3773 put into .sbss. */
3774 struct ppc_elf_link_hash_table *htab;
3dab13f6 3775
25dbc73a
AM
3776 htab = ppc_elf_hash_table (info);
3777 if (htab->sbss == NULL)
3778 {
644285ef 3779 flagword flags = SEC_IS_COMMON | SEC_LINKER_CREATED;
3dab13f6 3780
644285ef
AM
3781 if (!htab->elf.dynobj)
3782 htab->elf.dynobj = abfd;
3783
3496cb2a
L
3784 htab->sbss = bfd_make_section_anyway_with_flags (htab->elf.dynobj,
3785 ".sbss",
3786 flags);
3787 if (htab->sbss == NULL)
25dbc73a 3788 return FALSE;
3dab13f6 3789 }
3dab13f6 3790
25dbc73a
AM
3791 *secp = htab->sbss;
3792 *valp = sym->st_size;
3793 }
3dab13f6 3794
25dbc73a 3795 return TRUE;
3dab13f6
AM
3796}
3797\f
25dbc73a
AM
3798/* Find a linker generated pointer with a given addend and type. */
3799
3800static elf_linker_section_pointers_t *
3801elf_find_pointer_linker_section
3802 (elf_linker_section_pointers_t *linker_pointers,
3803 bfd_vma addend,
3804 elf_linker_section_t *lsect)
252b5132 3805{
25dbc73a
AM
3806 for ( ; linker_pointers != NULL; linker_pointers = linker_pointers->next)
3807 if (lsect == linker_pointers->lsect && addend == linker_pointers->addend)
3808 return linker_pointers;
252b5132 3809
25dbc73a
AM
3810 return NULL;
3811}
3812
3813/* Allocate a pointer to live in a linker created section. */
3814
3815static bfd_boolean
93d1b056
AM
3816elf_allocate_pointer_linker_section (bfd *abfd,
3817 elf_linker_section_t *lsect,
3818 struct elf_link_hash_entry *h,
3819 const Elf_Internal_Rela *rel)
25dbc73a
AM
3820{
3821 elf_linker_section_pointers_t **ptr_linker_section_ptr = NULL;
3822 elf_linker_section_pointers_t *linker_section_ptr;
3823 unsigned long r_symndx = ELF32_R_SYM (rel->r_info);
3824 bfd_size_type amt;
3825
3826 BFD_ASSERT (lsect != NULL);
3827
3828 /* Is this a global symbol? */
3829 if (h != NULL)
3830 {
3831 struct ppc_elf_link_hash_entry *eh;
3832
3833 /* Has this symbol already been allocated? If so, our work is done. */
3834 eh = (struct ppc_elf_link_hash_entry *) h;
3835 if (elf_find_pointer_linker_section (eh->linker_section_pointer,
3836 rel->r_addend,
3837 lsect))
3838 return TRUE;
3839
3840 ptr_linker_section_ptr = &eh->linker_section_pointer;
25dbc73a
AM
3841 }
3842 else
3843 {
0c8d6e5c 3844 BFD_ASSERT (is_ppc_elf (abfd));
0ffa91dd 3845
25dbc73a
AM
3846 /* Allocation of a pointer to a local symbol. */
3847 elf_linker_section_pointers_t **ptr = elf_local_ptr_offsets (abfd);
3848
3849 /* Allocate a table to hold the local symbols if first time. */
3850 if (!ptr)
3851 {
0ffa91dd 3852 unsigned int num_symbols = elf_symtab_hdr (abfd).sh_info;
25dbc73a
AM
3853
3854 amt = num_symbols;
3855 amt *= sizeof (elf_linker_section_pointers_t *);
3856 ptr = bfd_zalloc (abfd, amt);
3857
3858 if (!ptr)
3859 return FALSE;
3860
3861 elf_local_ptr_offsets (abfd) = ptr;
3862 }
3863
3864 /* Has this symbol already been allocated? If so, our work is done. */
3865 if (elf_find_pointer_linker_section (ptr[r_symndx],
3866 rel->r_addend,
3867 lsect))
3868 return TRUE;
252b5132 3869
25dbc73a 3870 ptr_linker_section_ptr = &ptr[r_symndx];
25dbc73a 3871 }
41fcb14e 3872
25dbc73a
AM
3873 /* Allocate space for a pointer in the linker section, and allocate
3874 a new pointer record from internal memory. */
3875 BFD_ASSERT (ptr_linker_section_ptr != NULL);
3876 amt = sizeof (elf_linker_section_pointers_t);
3877 linker_section_ptr = bfd_alloc (abfd, amt);
41fcb14e 3878
25dbc73a 3879 if (!linker_section_ptr)
7619e7c7 3880 return FALSE;
41fcb14e 3881
25dbc73a
AM
3882 linker_section_ptr->next = *ptr_linker_section_ptr;
3883 linker_section_ptr->addend = rel->r_addend;
3884 linker_section_ptr->lsect = lsect;
25dbc73a 3885 *ptr_linker_section_ptr = linker_section_ptr;
41fcb14e 3886
93d1b056
AM
3887 if (!bfd_set_section_alignment (lsect->section->owner, lsect->section, 2))
3888 return FALSE;
25dbc73a
AM
3889 linker_section_ptr->offset = lsect->section->size;
3890 lsect->section->size += 4;
7619e7c7 3891
25dbc73a
AM
3892#ifdef DEBUG
3893 fprintf (stderr,
3894 "Create pointer in linker section %s, offset = %ld, section size = %ld\n",
3895 lsect->name, (long) linker_section_ptr->offset,
3896 (long) lsect->section->size);
3897#endif
7619e7c7
AM
3898
3899 return TRUE;
41fcb14e
AM
3900}
3901
e054468f 3902static struct plt_entry **
25dbc73a
AM
3903update_local_sym_info (bfd *abfd,
3904 Elf_Internal_Shdr *symtab_hdr,
3905 unsigned long r_symndx,
3906 int tls_type)
252b5132 3907{
25dbc73a 3908 bfd_signed_vma *local_got_refcounts = elf_local_got_refcounts (abfd);
e054468f 3909 struct plt_entry **local_plt;
bac3c8c5 3910 unsigned char *local_got_tls_masks;
252b5132 3911
25dbc73a 3912 if (local_got_refcounts == NULL)
252b5132 3913 {
25dbc73a
AM
3914 bfd_size_type size = symtab_hdr->sh_info;
3915
e054468f
AM
3916 size *= (sizeof (*local_got_refcounts)
3917 + sizeof (*local_plt)
3918 + sizeof (*local_got_tls_masks));
25dbc73a
AM
3919 local_got_refcounts = bfd_zalloc (abfd, size);
3920 if (local_got_refcounts == NULL)
e054468f 3921 return NULL;
25dbc73a 3922 elf_local_got_refcounts (abfd) = local_got_refcounts;
252b5132 3923 }
41fcb14e 3924
e054468f 3925 local_plt = (struct plt_entry **) (local_got_refcounts + symtab_hdr->sh_info);
bac3c8c5 3926 local_got_tls_masks = (unsigned char *) (local_plt + symtab_hdr->sh_info);
37da22e5
AM
3927 local_got_tls_masks[r_symndx] |= tls_type & 0xff;
3928 if ((tls_type & NON_GOT) == 0)
e054468f
AM
3929 local_got_refcounts[r_symndx] += 1;
3930 return local_plt + r_symndx;
25dbc73a 3931}
41fcb14e 3932
a6aa5195 3933static bfd_boolean
3ec01793 3934update_plt_info (bfd *abfd, struct plt_entry **plist,
a6aa5195
AM
3935 asection *sec, bfd_vma addend)
3936{
3937 struct plt_entry *ent;
3938
32af9f6e
AM
3939 if (addend < 32768)
3940 sec = NULL;
3ec01793 3941 for (ent = *plist; ent != NULL; ent = ent->next)
a6aa5195
AM
3942 if (ent->sec == sec && ent->addend == addend)
3943 break;
3944 if (ent == NULL)
3945 {
3946 bfd_size_type amt = sizeof (*ent);
3947 ent = bfd_alloc (abfd, amt);
3948 if (ent == NULL)
3949 return FALSE;
3ec01793 3950 ent->next = *plist;
a6aa5195
AM
3951 ent->sec = sec;
3952 ent->addend = addend;
3953 ent->plt.refcount = 0;
3ec01793 3954 *plist = ent;
a6aa5195
AM
3955 }
3956 ent->plt.refcount += 1;
3957 return TRUE;
3958}
3959
3960static struct plt_entry *
3ec01793 3961find_plt_ent (struct plt_entry **plist, asection *sec, bfd_vma addend)
a6aa5195
AM
3962{
3963 struct plt_entry *ent;
3964
3965 if (addend < 32768)
3966 sec = NULL;
3ec01793 3967 for (ent = *plist; ent != NULL; ent = ent->next)
a6aa5195
AM
3968 if (ent->sec == sec && ent->addend == addend)
3969 break;
3970 return ent;
3971}
3972
e054468f
AM
3973static bfd_boolean
3974is_branch_reloc (enum elf_ppc_reloc_type r_type)
3975{
3976 return (r_type == R_PPC_PLTREL24
3977 || r_type == R_PPC_LOCAL24PC
3978 || r_type == R_PPC_REL24
3979 || r_type == R_PPC_REL14
3980 || r_type == R_PPC_REL14_BRTAKEN
3981 || r_type == R_PPC_REL14_BRNTAKEN
3982 || r_type == R_PPC_ADDR24
3983 || r_type == R_PPC_ADDR14
3984 || r_type == R_PPC_ADDR14_BRTAKEN
dfdaec14
AJ
3985 || r_type == R_PPC_ADDR14_BRNTAKEN
3986 || r_type == R_PPC_VLE_REL24);
e054468f
AM
3987}
3988
23cedd1d
AM
3989/* Relocs on inline plt call sequence insns prior to the call. */
3990
3991static bfd_boolean
3992is_plt_seq_reloc (enum elf_ppc_reloc_type r_type)
3993{
3994 return (r_type == R_PPC_PLT16_HA
3995 || r_type == R_PPC_PLT16_HI
3996 || r_type == R_PPC_PLT16_LO
3997 || r_type == R_PPC_PLTSEQ);
3998}
3999
25dbc73a
AM
4000static void
4001bad_shared_reloc (bfd *abfd, enum elf_ppc_reloc_type r_type)
4002{
4eca0228 4003 _bfd_error_handler
695344c0 4004 /* xgettext:c-format */
871b3ab2 4005 (_("%pB: relocation %s cannot be used when making a shared object"),
25dbc73a
AM
4006 abfd,
4007 ppc_elf_howto_table[r_type]->name);
4008 bfd_set_error (bfd_error_bad_value);
252b5132
RH
4009}
4010
25dbc73a
AM
4011/* Look through the relocs for a section during the first phase, and
4012 allocate space in the global offset table or procedure linkage
4013 table. */
252b5132 4014
b34976b6 4015static bfd_boolean
25dbc73a
AM
4016ppc_elf_check_relocs (bfd *abfd,
4017 struct bfd_link_info *info,
4018 asection *sec,
4019 const Elf_Internal_Rela *relocs)
252b5132 4020{
7619e7c7 4021 struct ppc_elf_link_hash_table *htab;
25dbc73a
AM
4022 Elf_Internal_Shdr *symtab_hdr;
4023 struct elf_link_hash_entry **sym_hashes;
4024 const Elf_Internal_Rela *rel;
4025 const Elf_Internal_Rela *rel_end;
a6aa5195 4026 asection *got2, *sreloc;
727fc41e 4027 struct elf_link_hash_entry *tga;
25dbc73a 4028
0e1862bb 4029 if (bfd_link_relocatable (info))
25dbc73a 4030 return TRUE;
252b5132 4031
c87b5a93
AM
4032 /* Don't do anything special with non-loaded, non-alloced sections.
4033 In particular, any relocs in such sections should not affect GOT
4034 and PLT reference counting (ie. we don't allow them to create GOT
4035 or PLT entries), there's no possibility or desire to optimize TLS
4036 relocs, and there's not much point in propagating relocs to shared
4037 libs that the dynamic linker won't relocate. */
4038 if ((sec->flags & SEC_ALLOC) == 0)
4039 return TRUE;
4040
252b5132 4041#ifdef DEBUG
871b3ab2 4042 _bfd_error_handler ("ppc_elf_check_relocs called for section %pA in %pB",
25dbc73a 4043 sec, abfd);
252b5132
RH
4044#endif
4045
0c8d6e5c 4046 BFD_ASSERT (is_ppc_elf (abfd));
0ffa91dd 4047
25dbc73a
AM
4048 /* Initialize howto table if not already done. */
4049 if (!ppc_elf_howto_table[R_PPC_ADDR32])
4050 ppc_elf_howto_init ();
4051
7619e7c7 4052 htab = ppc_elf_hash_table (info);
25f23106
AM
4053 if (htab->glink == NULL)
4054 {
4055 if (htab->elf.dynobj == NULL)
4056 htab->elf.dynobj = abfd;
4057 if (!ppc_elf_create_glink (htab->elf.dynobj, info))
4058 return FALSE;
4059 }
727fc41e
AM
4060 tga = elf_link_hash_lookup (&htab->elf, "__tls_get_addr",
4061 FALSE, FALSE, TRUE);
0ffa91dd 4062 symtab_hdr = &elf_symtab_hdr (abfd);
25dbc73a 4063 sym_hashes = elf_sym_hashes (abfd);
a6aa5195 4064 got2 = bfd_get_section_by_name (abfd, ".got2");
25dbc73a
AM
4065 sreloc = NULL;
4066
4067 rel_end = relocs + sec->reloc_count;
4068 for (rel = relocs; rel < rel_end; rel++)
4069 {
4070 unsigned long r_symndx;
4071 enum elf_ppc_reloc_type r_type;
4072 struct elf_link_hash_entry *h;
727fc41e 4073 int tls_type;
cbf95972 4074 struct plt_entry **ifunc;
2d7ad24e
AM
4075 struct plt_entry **pltent;
4076 bfd_vma addend;
25dbc73a
AM
4077
4078 r_symndx = ELF32_R_SYM (rel->r_info);
4079 if (r_symndx < symtab_hdr->sh_info)
4080 h = NULL;
4081 else
973a3492
L
4082 {
4083 h = sym_hashes[r_symndx - symtab_hdr->sh_info];
4084 while (h->root.type == bfd_link_hash_indirect
4085 || h->root.type == bfd_link_hash_warning)
4086 h = (struct elf_link_hash_entry *) h->root.u.i.link;
4087 }
25dbc73a
AM
4088
4089 /* If a relocation refers to _GLOBAL_OFFSET_TABLE_, create the .got.
4090 This shows up in particular in an R_PPC_ADDR32 in the eabi
4091 startup code. */
3b36f7e6 4092 if (h != NULL
ce558b89 4093 && htab->elf.sgot == NULL
3b36f7e6 4094 && strcmp (h->root.root.string, "_GLOBAL_OFFSET_TABLE_") == 0)
252b5132 4095 {
3b36f7e6
AM
4096 if (htab->elf.dynobj == NULL)
4097 htab->elf.dynobj = abfd;
4098 if (!ppc_elf_create_got (htab->elf.dynobj, info))
4099 return FALSE;
4100 BFD_ASSERT (h == htab->elf.hgot);
25dbc73a 4101 }
252b5132 4102
727fc41e 4103 tls_type = 0;
de972ffa 4104 r_type = ELF32_R_TYPE (rel->r_info);
cbf95972 4105 ifunc = NULL;
06a162cf 4106 if (h == NULL && !htab->is_vxworks)
e054468f 4107 {
06a162cf
AM
4108 Elf_Internal_Sym *isym = bfd_sym_from_r_symndx (&htab->sym_cache,
4109 abfd, r_symndx);
4110 if (isym == NULL)
4111 return FALSE;
4112
0bed072f 4113 if (ELF_ST_TYPE (isym->st_info) == STT_GNU_IFUNC)
e054468f 4114 {
0bed072f 4115 /* Set PLT_IFUNC flag for this sym, no GOT entry yet. */
06a162cf 4116 ifunc = update_local_sym_info (abfd, symtab_hdr, r_symndx,
37da22e5 4117 NON_GOT | PLT_IFUNC);
06a162cf 4118 if (ifunc == NULL)
e054468f
AM
4119 return FALSE;
4120
06a162cf
AM
4121 /* STT_GNU_IFUNC symbols must have a PLT entry;
4122 In a non-pie executable even when there are
4123 no plt calls. */
0e1862bb 4124 if (!bfd_link_pic (info)
08be3224
AM
4125 || is_branch_reloc (r_type)
4126 || r_type == R_PPC_PLT16_LO
4127 || r_type == R_PPC_PLT16_HI
4128 || r_type == R_PPC_PLT16_HA)
e054468f 4129 {
2d7ad24e 4130 addend = 0;
0bed072f 4131 if (r_type == R_PPC_PLTREL24)
08be3224
AM
4132 ppc_elf_tdata (abfd)->makes_plt_call = 1;
4133 if (bfd_link_pic (info)
4134 && (r_type == R_PPC_PLTREL24
4135 || r_type == R_PPC_PLT16_LO
4136 || r_type == R_PPC_PLT16_HI
4137 || r_type == R_PPC_PLT16_HA))
4138 addend = rel->r_addend;
0bed072f
AM
4139 if (!update_plt_info (abfd, ifunc, got2, addend))
4140 return FALSE;
e054468f
AM
4141 }
4142 }
25f23106
AM
4143 }
4144
de972ffa
AM
4145 if (!htab->is_vxworks
4146 && is_branch_reloc (r_type)
4147 && h != NULL
4148 && h == tga)
25f23106 4149 {
de972ffa
AM
4150 if (rel != relocs
4151 && (ELF32_R_TYPE (rel[-1].r_info) == R_PPC_TLSGD
4152 || ELF32_R_TYPE (rel[-1].r_info) == R_PPC_TLSLD))
4153 /* We have a new-style __tls_get_addr call with a marker
4154 reloc. */
4155 ;
4156 else
4157 /* Mark this section as having an old-style call. */
4158 sec->has_tls_get_addr_call = 1;
e054468f 4159 }
727fc41e 4160
25dbc73a
AM
4161 switch (r_type)
4162 {
727fc41e
AM
4163 case R_PPC_TLSGD:
4164 case R_PPC_TLSLD:
4165 /* These special tls relocs tie a call to __tls_get_addr with
4166 its parameter symbol. */
37da22e5
AM
4167 if (h != NULL)
4168 ppc_elf_hash_entry (h)->tls_mask |= TLS_TLS | TLS_MARK;
4169 else
4170 if (!update_local_sym_info (abfd, symtab_hdr, r_symndx,
4171 NON_GOT | TLS_TLS | TLS_MARK))
4172 return FALSE;
727fc41e
AM
4173 break;
4174
23cedd1d
AM
4175 case R_PPC_PLTSEQ:
4176 break;
4177
25dbc73a
AM
4178 case R_PPC_GOT_TLSLD16:
4179 case R_PPC_GOT_TLSLD16_LO:
4180 case R_PPC_GOT_TLSLD16_HI:
4181 case R_PPC_GOT_TLSLD16_HA:
25dbc73a
AM
4182 tls_type = TLS_TLS | TLS_LD;
4183 goto dogottls;
252b5132 4184
25dbc73a
AM
4185 case R_PPC_GOT_TLSGD16:
4186 case R_PPC_GOT_TLSGD16_LO:
4187 case R_PPC_GOT_TLSGD16_HI:
4188 case R_PPC_GOT_TLSGD16_HA:
4189 tls_type = TLS_TLS | TLS_GD;
4190 goto dogottls;
4191
4192 case R_PPC_GOT_TPREL16:
4193 case R_PPC_GOT_TPREL16_LO:
4194 case R_PPC_GOT_TPREL16_HI:
4195 case R_PPC_GOT_TPREL16_HA:
7c8bbca5 4196 if (bfd_link_dll (info))
25dbc73a
AM
4197 info->flags |= DF_STATIC_TLS;
4198 tls_type = TLS_TLS | TLS_TPREL;
4199 goto dogottls;
4200
4201 case R_PPC_GOT_DTPREL16:
4202 case R_PPC_GOT_DTPREL16_LO:
4203 case R_PPC_GOT_DTPREL16_HI:
4204 case R_PPC_GOT_DTPREL16_HA:
4205 tls_type = TLS_TLS | TLS_DTPREL;
4206 dogottls:
4207 sec->has_tls_reloc = 1;
1a0670f3 4208 /* Fall through. */
252b5132 4209
25dbc73a
AM
4210 /* GOT16 relocations */
4211 case R_PPC_GOT16:
4212 case R_PPC_GOT16_LO:
4213 case R_PPC_GOT16_HI:
4214 case R_PPC_GOT16_HA:
4215 /* This symbol requires a global offset table entry. */
ce558b89 4216 if (htab->elf.sgot == NULL)
25dbc73a
AM
4217 {
4218 if (htab->elf.dynobj == NULL)
4219 htab->elf.dynobj = abfd;
4220 if (!ppc_elf_create_got (htab->elf.dynobj, info))
4221 return FALSE;
4222 }
4223 if (h != NULL)
4224 {
4225 h->got.refcount += 1;
4226 ppc_elf_hash_entry (h)->tls_mask |= tls_type;
4227 }
4228 else
4229 /* This is a global offset table entry for a local symbol. */
4230 if (!update_local_sym_info (abfd, symtab_hdr, r_symndx, tls_type))
4231 return FALSE;
91e21fb7
AM
4232
4233 /* We may also need a plt entry if the symbol turns out to be
4234 an ifunc. */
0e1862bb 4235 if (h != NULL && !bfd_link_pic (info))
91e21fb7
AM
4236 {
4237 if (!update_plt_info (abfd, &h->plt.plist, NULL, 0))
4238 return FALSE;
4239 }
25dbc73a 4240 break;
252b5132 4241
25dbc73a
AM
4242 /* Indirect .sdata relocation. */
4243 case R_PPC_EMB_SDAI16:
0e1862bb 4244 if (bfd_link_pic (info))
25dbc73a
AM
4245 {
4246 bad_shared_reloc (abfd, r_type);
4247 return FALSE;
4248 }
93d1b056
AM
4249 htab->sdata[0].sym->ref_regular = 1;
4250 if (!elf_allocate_pointer_linker_section (abfd, &htab->sdata[0],
4251 h, rel))
25dbc73a 4252 return FALSE;
046183de
AM
4253 if (h != NULL)
4254 {
4255 ppc_elf_hash_entry (h)->has_sda_refs = TRUE;
4256 h->non_got_ref = TRUE;
4257 }
25dbc73a 4258 break;
252b5132 4259
25dbc73a
AM
4260 /* Indirect .sdata2 relocation. */
4261 case R_PPC_EMB_SDA2I16:
0e1862bb 4262 if (bfd_link_pic (info))
25dbc73a
AM
4263 {
4264 bad_shared_reloc (abfd, r_type);
4265 return FALSE;
4266 }
93d1b056
AM
4267 htab->sdata[1].sym->ref_regular = 1;
4268 if (!elf_allocate_pointer_linker_section (abfd, &htab->sdata[1],
4269 h, rel))
25dbc73a 4270 return FALSE;
046183de
AM
4271 if (h != NULL)
4272 {
4273 ppc_elf_hash_entry (h)->has_sda_refs = TRUE;
4274 h->non_got_ref = TRUE;
4275 }
25dbc73a 4276 break;
252b5132 4277
93d1b056
AM
4278 case R_PPC_SDAREL16:
4279 htab->sdata[0].sym->ref_regular = 1;
1a0670f3 4280 /* Fall through. */
93d1b056 4281
b9c361e0
JL
4282 case R_PPC_VLE_SDAREL_LO16A:
4283 case R_PPC_VLE_SDAREL_LO16D:
4284 case R_PPC_VLE_SDAREL_HI16A:
4285 case R_PPC_VLE_SDAREL_HI16D:
4286 case R_PPC_VLE_SDAREL_HA16A:
4287 case R_PPC_VLE_SDAREL_HA16D:
046183de
AM
4288 if (h != NULL)
4289 {
4290 ppc_elf_hash_entry (h)->has_sda_refs = TRUE;
4291 h->non_got_ref = TRUE;
4292 }
4293 break;
4294
b9c361e0
JL
4295 case R_PPC_VLE_REL8:
4296 case R_PPC_VLE_REL15:
4297 case R_PPC_VLE_REL24:
4298 case R_PPC_VLE_LO16A:
4299 case R_PPC_VLE_LO16D:
4300 case R_PPC_VLE_HI16A:
4301 case R_PPC_VLE_HI16D:
4302 case R_PPC_VLE_HA16A:
4303 case R_PPC_VLE_HA16D:
83eef883 4304 case R_PPC_VLE_ADDR20:
b9c361e0
JL
4305 break;
4306
25dbc73a 4307 case R_PPC_EMB_SDA2REL:
0e1862bb 4308 if (bfd_link_pic (info))
046183de
AM
4309 {
4310 bad_shared_reloc (abfd, r_type);
4311 return FALSE;
4312 }
93d1b056 4313 htab->sdata[1].sym->ref_regular = 1;
046183de
AM
4314 if (h != NULL)
4315 {
4316 ppc_elf_hash_entry (h)->has_sda_refs = TRUE;
4317 h->non_got_ref = TRUE;
4318 }
4319 break;
4320
b9c361e0
JL
4321 case R_PPC_VLE_SDA21_LO:
4322 case R_PPC_VLE_SDA21:
25dbc73a
AM
4323 case R_PPC_EMB_SDA21:
4324 case R_PPC_EMB_RELSDA:
0e1862bb 4325 if (bfd_link_pic (info))
046183de
AM
4326 {
4327 bad_shared_reloc (abfd, r_type);
4328 return FALSE;
4329 }
046183de
AM
4330 if (h != NULL)
4331 {
4332 ppc_elf_hash_entry (h)->has_sda_refs = TRUE;
4333 h->non_got_ref = TRUE;
4334 }
4335 break;
4336
25dbc73a
AM
4337 case R_PPC_EMB_NADDR32:
4338 case R_PPC_EMB_NADDR16:
4339 case R_PPC_EMB_NADDR16_LO:
4340 case R_PPC_EMB_NADDR16_HI:
4341 case R_PPC_EMB_NADDR16_HA:
0e1862bb 4342 if (bfd_link_pic (info))
25dbc73a
AM
4343 {
4344 bad_shared_reloc (abfd, r_type);
4345 return FALSE;
4346 }
4dc4a9a5 4347 if (h != NULL)
046183de 4348 h->non_got_ref = TRUE;
25dbc73a 4349 break;
252b5132 4350
25dbc73a 4351 case R_PPC_PLTREL24:
de972ffa 4352 if (h == NULL)
6d78d0b9 4353 break;
08be3224 4354 ppc_elf_tdata (abfd)->makes_plt_call = 1;
3e04d765 4355 goto pltentry;
08be3224 4356
23cedd1d 4357 case R_PPC_PLTCALL:
3e04d765
AM
4358 sec->has_pltcall = 1;
4359 /* Fall through. */
4360
6d78d0b9 4361 case R_PPC_PLT32:
25dbc73a
AM
4362 case R_PPC_PLTREL32:
4363 case R_PPC_PLT16_LO:
4364 case R_PPC_PLT16_HI:
4365 case R_PPC_PLT16_HA:
3e04d765 4366 pltentry:
25dbc73a
AM
4367#ifdef DEBUG
4368 fprintf (stderr, "Reloc requires a PLT entry\n");
4369#endif
cbf95972 4370 /* This symbol requires a procedure linkage table entry. */
25dbc73a
AM
4371 if (h == NULL)
4372 {
2d7ad24e
AM
4373 pltent = update_local_sym_info (abfd, symtab_hdr, r_symndx,
4374 NON_GOT | PLT_KEEP);
4375 if (pltent == NULL)
4376 return FALSE;
25dbc73a 4377 }
a6aa5195
AM
4378 else
4379 {
2d7ad24e
AM
4380 if (r_type != R_PPC_PLTREL24)
4381 ppc_elf_hash_entry (h)->tls_mask |= PLT_KEEP;
a6aa5195 4382 h->needs_plt = 1;
2d7ad24e 4383 pltent = &h->plt.plist;
a6aa5195 4384 }
2d7ad24e
AM
4385 addend = 0;
4386 if (bfd_link_pic (info)
4387 && (r_type == R_PPC_PLTREL24
4388 || r_type == R_PPC_PLT16_LO
4389 || r_type == R_PPC_PLT16_HI
4390 || r_type == R_PPC_PLT16_HA))
4391 addend = rel->r_addend;
4392 if (!update_plt_info (abfd, pltent, got2, addend))
4393 return FALSE;
25dbc73a 4394 break;
ee05f2fe 4395
25dbc73a
AM
4396 /* The following relocations don't need to propagate the
4397 relocation if linking a shared object since they are
4398 section relative. */
4399 case R_PPC_SECTOFF:
4400 case R_PPC_SECTOFF_LO:
4401 case R_PPC_SECTOFF_HI:
4402 case R_PPC_SECTOFF_HA:
4403 case R_PPC_DTPREL16:
4404 case R_PPC_DTPREL16_LO:
4405 case R_PPC_DTPREL16_HI:
4406 case R_PPC_DTPREL16_HA:
4407 case R_PPC_TOC16:
4408 break;
252b5132 4409
d7128ce4
AM
4410 case R_PPC_REL16:
4411 case R_PPC_REL16_LO:
4412 case R_PPC_REL16_HI:
4413 case R_PPC_REL16_HA:
a680de9a 4414 case R_PPC_REL16DX_HA:
016687f8 4415 ppc_elf_tdata (abfd)->has_rel16 = 1;
d7128ce4
AM
4416 break;
4417
a6aa5195 4418 /* These are just markers. */
25dbc73a
AM
4419 case R_PPC_TLS:
4420 case R_PPC_EMB_MRKREF:
4421 case R_PPC_NONE:
4422 case R_PPC_max:
32af9f6e
AM
4423 case R_PPC_RELAX:
4424 case R_PPC_RELAX_PLT:
4425 case R_PPC_RELAX_PLTREL24:
7ba71655 4426 case R_PPC_16DX_HA:
25dbc73a 4427 break;
252b5132 4428
25dbc73a
AM
4429 /* These should only appear in dynamic objects. */
4430 case R_PPC_COPY:
4431 case R_PPC_GLOB_DAT:
4432 case R_PPC_JMP_SLOT:
4433 case R_PPC_RELATIVE:
e054468f 4434 case R_PPC_IRELATIVE:
25dbc73a 4435 break;
252b5132 4436
25dbc73a
AM
4437 /* These aren't handled yet. We'll report an error later. */
4438 case R_PPC_ADDR30:
4439 case R_PPC_EMB_RELSEC16:
4440 case R_PPC_EMB_RELST_LO:
4441 case R_PPC_EMB_RELST_HI:
4442 case R_PPC_EMB_RELST_HA:
4443 case R_PPC_EMB_BIT_FLD:
4444 break;
252b5132 4445
25dbc73a
AM
4446 /* This refers only to functions defined in the shared library. */
4447 case R_PPC_LOCAL24PC:
727fc41e 4448 if (h != NULL && h == htab->elf.hgot && htab->plt_type == PLT_UNSET)
016687f8
AM
4449 {
4450 htab->plt_type = PLT_OLD;
4451 htab->old_bfd = abfd;
4452 }
c7e17e05
AM
4453 if (h != NULL && h->type == STT_GNU_IFUNC)
4454 {
c7e17e05
AM
4455 h->needs_plt = 1;
4456 if (!update_plt_info (abfd, &h->plt.plist, NULL, 0))
4457 return FALSE;
4458 }
25dbc73a 4459 break;
252b5132 4460
25dbc73a
AM
4461 /* This relocation describes the C++ object vtable hierarchy.
4462 Reconstruct it for later use during GC. */
4463 case R_PPC_GNU_VTINHERIT:
4464 if (!bfd_elf_gc_record_vtinherit (abfd, sec, h, rel->r_offset))
4465 return FALSE;
4466 break;
252b5132 4467
25dbc73a
AM
4468 /* This relocation describes which C++ vtable entries are actually
4469 used. Record for later use during GC. */
4470 case R_PPC_GNU_VTENTRY:
d17e0c6e
JB
4471 BFD_ASSERT (h != NULL);
4472 if (h != NULL
4473 && !bfd_elf_gc_record_vtentry (abfd, sec, h, rel->r_addend))
25dbc73a
AM
4474 return FALSE;
4475 break;
252b5132 4476
7c8bbca5 4477 /* We shouldn't really be seeing TPREL32. */
25dbc73a 4478 case R_PPC_TPREL32:
1d483afe
AM
4479 case R_PPC_TPREL16:
4480 case R_PPC_TPREL16_LO:
4481 case R_PPC_TPREL16_HI:
4482 case R_PPC_TPREL16_HA:
7c8bbca5 4483 if (bfd_link_dll (info))
25dbc73a
AM
4484 info->flags |= DF_STATIC_TLS;
4485 goto dodyn;
252b5132 4486
25dbc73a
AM
4487 /* Nor these. */
4488 case R_PPC_DTPMOD32:
4489 case R_PPC_DTPREL32:
4490 goto dodyn;
252b5132 4491
9edfd1af
AM
4492 case R_PPC_REL32:
4493 if (h == NULL
4494 && got2 != NULL
4495 && (sec->flags & SEC_CODE) != 0
0e1862bb 4496 && bfd_link_pic (info)
4a3dc543 4497 && htab->plt_type == PLT_UNSET)
9edfd1af
AM
4498 {
4499 /* Old -fPIC gcc code has .long LCTOC1-LCFx just before
4500 the start of a function, which assembles to a REL32
4501 reference to .got2. If we detect one of these, then
4502 force the old PLT layout because the linker cannot
4503 reliably deduce the GOT pointer value needed for
4504 PLT call stubs. */
4505 asection *s;
87d72d41 4506 Elf_Internal_Sym *isym;
9edfd1af 4507
87d72d41
AM
4508 isym = bfd_sym_from_r_symndx (&htab->sym_cache,
4509 abfd, r_symndx);
4510 if (isym == NULL)
4511 return FALSE;
4512
4513 s = bfd_section_from_elf_index (abfd, isym->st_shndx);
9edfd1af 4514 if (s == got2)
016687f8
AM
4515 {
4516 htab->plt_type = PLT_OLD;
4517 htab->old_bfd = abfd;
4518 }
9edfd1af 4519 }
7123df0e 4520 if (h == NULL || h == htab->elf.hgot)
fd38b44c 4521 break;
625af618
AM
4522 /* fall through */
4523
4524 case R_PPC_ADDR32:
4525 case R_PPC_ADDR16:
4526 case R_PPC_ADDR16_LO:
4527 case R_PPC_ADDR16_HI:
4528 case R_PPC_ADDR16_HA:
4529 case R_PPC_UADDR32:
4530 case R_PPC_UADDR16:
0e1862bb 4531 if (h != NULL && !bfd_link_pic (info))
625af618
AM
4532 {
4533 /* We may need a plt entry if the symbol turns out to be
4534 a function defined in a dynamic object. */
3ec01793 4535 if (!update_plt_info (abfd, &h->plt.plist, NULL, 0))
625af618
AM
4536 return FALSE;
4537
4538 /* We may need a copy reloc too. */
4539 h->non_got_ref = 1;
4540 h->pointer_equality_needed = 1;
d3e454b9
AM
4541 if (r_type == R_PPC_ADDR16_HA)
4542 ppc_elf_hash_entry (h)->has_addr16_ha = 1;
4543 if (r_type == R_PPC_ADDR16_LO)
4544 ppc_elf_hash_entry (h)->has_addr16_lo = 1;
625af618
AM
4545 }
4546 goto dodyn;
9edfd1af 4547
25dbc73a
AM
4548 case R_PPC_REL24:
4549 case R_PPC_REL14:
4550 case R_PPC_REL14_BRTAKEN:
4551 case R_PPC_REL14_BRNTAKEN:
d7128ce4 4552 if (h == NULL)
25dbc73a 4553 break;
7123df0e 4554 if (h == htab->elf.hgot)
d7128ce4 4555 {
7123df0e 4556 if (htab->plt_type == PLT_UNSET)
016687f8
AM
4557 {
4558 htab->plt_type = PLT_OLD;
4559 htab->old_bfd = abfd;
4560 }
d7128ce4
AM
4561 break;
4562 }
25dbc73a 4563 /* fall through */
ee05f2fe 4564
25dbc73a 4565 case R_PPC_ADDR24:
25dbc73a
AM
4566 case R_PPC_ADDR14:
4567 case R_PPC_ADDR14_BRTAKEN:
4568 case R_PPC_ADDR14_BRNTAKEN:
0e1862bb 4569 if (h != NULL && !bfd_link_pic (info))
25dbc73a
AM
4570 {
4571 /* We may need a plt entry if the symbol turns out to be
4572 a function defined in a dynamic object. */
e054468f 4573 h->needs_plt = 1;
de972ffa 4574 if (!update_plt_info (abfd, &h->plt.plist, NULL, 0))
a6aa5195 4575 return FALSE;
625af618 4576 break;
25dbc73a 4577 }
7619e7c7 4578
25dbc73a
AM
4579 dodyn:
4580 /* If we are creating a shared library, and this is a reloc
4581 against a global symbol, or a non PC relative reloc
4582 against a local symbol, then we need to copy the reloc
4583 into the shared library. However, if we are linking with
4584 -Bsymbolic, we do not need to copy a reloc against a
4585 global symbol which is defined in an object we are
4586 including in the link (i.e., DEF_REGULAR is set). At
4587 this point we have not seen all the input files, so it is
4588 possible that DEF_REGULAR is not set now but will be set
4589 later (it is never cleared). In case of a weak definition,
4590 DEF_REGULAR may be cleared later by a strong definition in
4591 a shared library. We account for that possibility below by
4592 storing information in the dyn_relocs field of the hash
4593 table entry. A similar situation occurs when creating
4594 shared libraries and symbol visibility changes render the
4595 symbol local.
7619e7c7 4596
25dbc73a
AM
4597 If on the other hand, we are creating an executable, we
4598 may need to keep relocations for symbols satisfied by a
4599 dynamic library if we manage to avoid copy relocs for the
4600 symbol. */
0e1862bb 4601 if ((bfd_link_pic (info)
1d483afe 4602 && (must_be_dyn_reloc (info, r_type)
25dbc73a 4603 || (h != NULL
198f1157 4604 && (!SYMBOLIC_BIND (info, h)
25dbc73a
AM
4605 || h->root.type == bfd_link_hash_defweak
4606 || !h->def_regular))))
4607 || (ELIMINATE_COPY_RELOCS
0e1862bb 4608 && !bfd_link_pic (info)
25dbc73a
AM
4609 && h != NULL
4610 && (h->root.type == bfd_link_hash_defweak
de972ffa 4611 || !h->def_regular)))
25dbc73a 4612 {
25dbc73a
AM
4613#ifdef DEBUG
4614 fprintf (stderr,
4615 "ppc_elf_check_relocs needs to "
4616 "create relocation for %s\n",
4617 (h && h->root.root.string
4618 ? h->root.root.string : "<unknown>"));
4619#endif
4620 if (sreloc == NULL)
4621 {
c9a2f333
AM
4622 if (htab->elf.dynobj == NULL)
4623 htab->elf.dynobj = abfd;
83bac4b0
NC
4624
4625 sreloc = _bfd_elf_make_dynamic_reloc_section
4626 (sec, htab->elf.dynobj, 2, abfd, /*rela?*/ TRUE);
4627
25dbc73a 4628 if (sreloc == NULL)
83bac4b0 4629 return FALSE;
25dbc73a 4630 }
7619e7c7 4631
25dbc73a
AM
4632 /* If this is a global symbol, we count the number of
4633 relocations we need for this symbol. */
4634 if (h != NULL)
4635 {
f95f8542
AM
4636 struct elf_dyn_relocs *p;
4637 struct elf_dyn_relocs **rel_head;
4638
91d6fa6a 4639 rel_head = &ppc_elf_hash_entry (h)->dyn_relocs;
f95f8542
AM
4640 p = *rel_head;
4641 if (p == NULL || p->sec != sec)
4642 {
4643 p = bfd_alloc (htab->elf.dynobj, sizeof *p);
4644 if (p == NULL)
4645 return FALSE;
4646 p->next = *rel_head;
4647 *rel_head = p;
4648 p->sec = sec;
4649 p->count = 0;
4650 p->pc_count = 0;
4651 }
4652 p->count += 1;
4653 if (!must_be_dyn_reloc (info, r_type))
4654 p->pc_count += 1;
25dbc73a
AM
4655 }
4656 else
4657 {
4658 /* Track dynamic relocs needed for local syms too.
4659 We really need local syms available to do this
4660 easily. Oh well. */
f95f8542
AM
4661 struct ppc_dyn_relocs *p;
4662 struct ppc_dyn_relocs **rel_head;
4663 bfd_boolean is_ifunc;
25dbc73a 4664 asection *s;
6edfbbad 4665 void *vpp;
87d72d41 4666 Elf_Internal_Sym *isym;
6edfbbad 4667
87d72d41
AM
4668 isym = bfd_sym_from_r_symndx (&htab->sym_cache,
4669 abfd, r_symndx);
4670 if (isym == NULL)
25dbc73a 4671 return FALSE;
7fce784e 4672
87d72d41
AM
4673 s = bfd_section_from_elf_index (abfd, isym->st_shndx);
4674 if (s == NULL)
4675 s = sec;
4676
6edfbbad 4677 vpp = &elf_section_data (s)->local_dynrel;
f95f8542
AM
4678 rel_head = (struct ppc_dyn_relocs **) vpp;
4679 is_ifunc = ELF_ST_TYPE (isym->st_info) == STT_GNU_IFUNC;
4680 p = *rel_head;
4681 if (p != NULL && p->sec == sec && p->ifunc != is_ifunc)
4682 p = p->next;
4683 if (p == NULL || p->sec != sec || p->ifunc != is_ifunc)
4684 {
4685 p = bfd_alloc (htab->elf.dynobj, sizeof *p);
4686 if (p == NULL)
4687 return FALSE;
4688 p->next = *rel_head;
4689 *rel_head = p;
4690 p->sec = sec;
4691 p->ifunc = is_ifunc;
4692 p->count = 0;
4693 }
4694 p->count += 1;
25dbc73a 4695 }
7619e7c7 4696 }
25dbc73a
AM
4697
4698 break;
7619e7c7
AM
4699 }
4700 }
ee05f2fe 4701
25dbc73a
AM
4702 return TRUE;
4703}
4704\f
005d79fd
AM
4705/* Warn for conflicting Tag_GNU_Power_ABI_FP attributes between IBFD
4706 and OBFD, and merge non-conflicting ones. */
4707void
50e03d47 4708_bfd_elf_ppc_merge_fp_attributes (bfd *ibfd, struct bfd_link_info *info)
34c8bcba 4709{
50e03d47 4710 bfd *obfd = info->output_bfd;
c6e65352
DJ
4711 obj_attribute *in_attr, *in_attrs;
4712 obj_attribute *out_attr, *out_attrs;
34c8bcba 4713
c6e65352
DJ
4714 in_attrs = elf_known_obj_attributes (ibfd)[OBJ_ATTR_GNU];
4715 out_attrs = elf_known_obj_attributes (obfd)[OBJ_ATTR_GNU];
4716
c6e65352
DJ
4717 in_attr = &in_attrs[Tag_GNU_Power_ABI_FP];
4718 out_attr = &out_attrs[Tag_GNU_Power_ABI_FP];
005d79fd 4719
c6e65352 4720 if (in_attr->i != out_attr->i)
34c8bcba 4721 {
005d79fd
AM
4722 int in_fp = in_attr->i & 3;
4723 int out_fp = out_attr->i & 3;
4724
4725 if (in_fp == 0)
34c8bcba 4726 ;
005d79fd
AM
4727 else if (out_fp == 0)
4728 {
4729 out_attr->type = 1;
4730 out_attr->i ^= in_fp;
4731 }
4732 else if (out_fp != 2 && in_fp == 2)
34c8bcba 4733 _bfd_error_handler
695344c0 4734 /* xgettext:c-format */
cf97bcb0 4735 (_("warning: %pB uses hard float, %pB uses soft float"), obfd, ibfd);
005d79fd
AM
4736 else if (out_fp == 2 && in_fp != 2)
4737 _bfd_error_handler
695344c0 4738 /* xgettext:c-format */
cf97bcb0 4739 (_("warning: %pB uses hard float, %pB uses soft float"), ibfd, obfd);
005d79fd 4740 else if (out_fp == 1 && in_fp == 3)
3c7b9897 4741 _bfd_error_handler
695344c0 4742 /* xgettext:c-format */
cf97bcb0 4743 (_("warning: %pB uses double-precision hard float, "
871b3ab2 4744 "%pB uses single-precision hard float"), obfd, ibfd);
005d79fd 4745 else if (out_fp == 3 && in_fp == 1)
3c7b9897 4746 _bfd_error_handler
695344c0 4747 /* xgettext:c-format */
cf97bcb0 4748 (_("warning: %pB uses double-precision hard float, "
871b3ab2 4749 "%pB uses single-precision hard float"), ibfd, obfd);
005d79fd
AM
4750
4751 in_fp = in_attr->i & 0xc;
4752 out_fp = out_attr->i & 0xc;
4753 if (in_fp == 0)
4754 ;
4755 else if (out_fp == 0)
4756 {
4757 out_attr->type = 1;
4758 out_attr->i ^= in_fp;
4759 }
4760 else if (out_fp != 2 * 4 && in_fp == 2 * 4)
3c7b9897 4761 _bfd_error_handler
695344c0 4762 /* xgettext:c-format */
cf97bcb0 4763 (_("warning: %pB uses 64-bit long double, "
871b3ab2 4764 "%pB uses 128-bit long double"), ibfd, obfd);
005d79fd 4765 else if (in_fp != 2 * 4 && out_fp == 2 * 4)
34c8bcba 4766 _bfd_error_handler
695344c0 4767 /* xgettext:c-format */
cf97bcb0 4768 (_("warning: %pB uses 64-bit long double, "
871b3ab2 4769 "%pB uses 128-bit long double"), obfd, ibfd);
005d79fd 4770 else if (out_fp == 1 * 4 && in_fp == 3 * 4)
34c8bcba 4771 _bfd_error_handler
695344c0 4772 /* xgettext:c-format */
cf97bcb0 4773 (_("warning: %pB uses IBM long double, "
a27ca19c 4774 "%pB uses IEEE long double"), obfd, ibfd);
005d79fd 4775 else if (out_fp == 3 * 4 && in_fp == 1 * 4)
34c8bcba 4776 _bfd_error_handler
695344c0 4777 /* xgettext:c-format */
cf97bcb0 4778 (_("warning: %pB uses IBM long double, "
a27ca19c 4779 "%pB uses IEEE long double"), ibfd, obfd);
c6e65352 4780 }
005d79fd
AM
4781}
4782
4783/* Merge object attributes from IBFD into OBFD. Warn if
4784 there are conflicting attributes. */
4785static bfd_boolean
50e03d47 4786ppc_elf_merge_obj_attributes (bfd *ibfd, struct bfd_link_info *info)
005d79fd 4787{
50e03d47 4788 bfd *obfd;
005d79fd
AM
4789 obj_attribute *in_attr, *in_attrs;
4790 obj_attribute *out_attr, *out_attrs;
4791
50e03d47 4792 _bfd_elf_ppc_merge_fp_attributes (ibfd, info);
005d79fd 4793
50e03d47 4794 obfd = info->output_bfd;
005d79fd
AM
4795 in_attrs = elf_known_obj_attributes (ibfd)[OBJ_ATTR_GNU];
4796 out_attrs = elf_known_obj_attributes (obfd)[OBJ_ATTR_GNU];
c6e65352
DJ
4797
4798 /* Check for conflicting Tag_GNU_Power_ABI_Vector attributes and
4799 merge non-conflicting ones. */
4800 in_attr = &in_attrs[Tag_GNU_Power_ABI_Vector];
4801 out_attr = &out_attrs[Tag_GNU_Power_ABI_Vector];
4802 if (in_attr->i != out_attr->i)
4803 {
005d79fd
AM
4804 int in_vec = in_attr->i & 3;
4805 int out_vec = out_attr->i & 3;
c6e65352 4806
005d79fd
AM
4807 if (in_vec == 0)
4808 ;
4809 else if (out_vec == 0)
c6e65352 4810 {
005d79fd
AM
4811 out_attr->type = 1;
4812 out_attr->i = in_vec;
c6e65352 4813 }
c6e65352
DJ
4814 /* For now, allow generic to transition to AltiVec or SPE
4815 without a warning. If GCC marked files with their stack
4816 alignment and used don't-care markings for files which are
4817 not affected by the vector ABI, we could warn about this
4818 case too. */
005d79fd 4819 else if (in_vec == 1)
c6e65352 4820 ;
005d79fd
AM
4821 else if (out_vec == 1)
4822 {
4823 out_attr->type = 1;
4824 out_attr->i = in_vec;
4825 }
4826 else if (out_vec < in_vec)
c6e65352 4827 _bfd_error_handler
695344c0 4828 /* xgettext:c-format */
cf97bcb0 4829 (_("warning: %pB uses AltiVec vector ABI, %pB uses SPE vector ABI"),
005d79fd
AM
4830 obfd, ibfd);
4831 else if (out_vec > in_vec)
c6e65352 4832 _bfd_error_handler
695344c0 4833 /* xgettext:c-format */
cf97bcb0 4834 (_("warning: %pB uses AltiVec vector ABI, %pB uses SPE vector ABI"),
005d79fd 4835 ibfd, obfd);
34c8bcba
JM
4836 }
4837
f82e0623
NF
4838 /* Check for conflicting Tag_GNU_Power_ABI_Struct_Return attributes
4839 and merge non-conflicting ones. */
4840 in_attr = &in_attrs[Tag_GNU_Power_ABI_Struct_Return];
4841 out_attr = &out_attrs[Tag_GNU_Power_ABI_Struct_Return];
4842 if (in_attr->i != out_attr->i)
4843 {
005d79fd
AM
4844 int in_struct = in_attr->i & 3;
4845 int out_struct = out_attr->i & 3;
4846
4847 if (in_struct == 0 || in_struct == 3)
f82e0623 4848 ;
005d79fd
AM
4849 else if (out_struct == 0)
4850 {
4851 out_attr->type = 1;
4852 out_attr->i = in_struct;
4853 }
4854 else if (out_struct < in_struct)
4855 _bfd_error_handler
695344c0 4856 /* xgettext:c-format */
cf97bcb0 4857 (_("warning: %pB uses r3/r4 for small structure returns, "
871b3ab2 4858 "%pB uses memory"), obfd, ibfd);
005d79fd
AM
4859 else if (out_struct > in_struct)
4860 _bfd_error_handler
695344c0 4861 /* xgettext:c-format */
cf97bcb0 4862 (_("warning: %pB uses r3/r4 for small structure returns, "
871b3ab2 4863 "%pB uses memory"), ibfd, obfd);
f82e0623
NF
4864 }
4865
34c8bcba 4866 /* Merge Tag_compatibility attributes and any common GNU ones. */
50e03d47 4867 _bfd_elf_merge_object_attributes (ibfd, info);
34c8bcba
JM
4868
4869 return TRUE;
4870}
4871
8853c3d3
AM
4872/* Merge backend specific data from an object file to the output
4873 object file when linking. */
4874
4875static bfd_boolean
50e03d47 4876ppc_elf_merge_private_bfd_data (bfd *ibfd, struct bfd_link_info *info)
8853c3d3 4877{
50e03d47 4878 bfd *obfd = info->output_bfd;
8853c3d3
AM
4879 flagword old_flags;
4880 flagword new_flags;
4881 bfd_boolean error;
4882
0c8d6e5c 4883 if (!is_ppc_elf (ibfd) || !is_ppc_elf (obfd))
8853c3d3
AM
4884 return TRUE;
4885
cc643b88 4886 /* Check if we have the same endianness. */
50e03d47 4887 if (! _bfd_generic_verify_endian_match (ibfd, info))
8853c3d3
AM
4888 return FALSE;
4889
50e03d47 4890 if (!ppc_elf_merge_obj_attributes (ibfd, info))
34c8bcba
JM
4891 return FALSE;
4892
8853c3d3
AM
4893 new_flags = elf_elfheader (ibfd)->e_flags;
4894 old_flags = elf_elfheader (obfd)->e_flags;
4895 if (!elf_flags_init (obfd))
4896 {
4897 /* First call, no flags set. */
4898 elf_flags_init (obfd) = TRUE;
4899 elf_elfheader (obfd)->e_flags = new_flags;
4900 }
4901
4902 /* Compatible flags are ok. */
4903 else if (new_flags == old_flags)
4904 ;
4905
4906 /* Incompatible flags. */
4907 else
4908 {
4909 /* Warn about -mrelocatable mismatch. Allow -mrelocatable-lib
4910 to be linked with either. */
4911 error = FALSE;
4912 if ((new_flags & EF_PPC_RELOCATABLE) != 0
4913 && (old_flags & (EF_PPC_RELOCATABLE | EF_PPC_RELOCATABLE_LIB)) == 0)
4914 {
4915 error = TRUE;
4eca0228 4916 _bfd_error_handler
871b3ab2 4917 (_("%pB: compiled with -mrelocatable and linked with "
8853c3d3
AM
4918 "modules compiled normally"), ibfd);
4919 }
4920 else if ((new_flags & (EF_PPC_RELOCATABLE | EF_PPC_RELOCATABLE_LIB)) == 0
4921 && (old_flags & EF_PPC_RELOCATABLE) != 0)
4922 {
4923 error = TRUE;
4eca0228 4924 _bfd_error_handler
871b3ab2 4925 (_("%pB: compiled normally and linked with "
8853c3d3
AM
4926 "modules compiled with -mrelocatable"), ibfd);
4927 }
4928
4929 /* The output is -mrelocatable-lib iff both the input files are. */
4930 if (! (new_flags & EF_PPC_RELOCATABLE_LIB))
4931 elf_elfheader (obfd)->e_flags &= ~EF_PPC_RELOCATABLE_LIB;
4932
4933 /* The output is -mrelocatable iff it can't be -mrelocatable-lib,
4934 but each input file is either -mrelocatable or -mrelocatable-lib. */
4935 if (! (elf_elfheader (obfd)->e_flags & EF_PPC_RELOCATABLE_LIB)
4936 && (new_flags & (EF_PPC_RELOCATABLE_LIB | EF_PPC_RELOCATABLE))
4937 && (old_flags & (EF_PPC_RELOCATABLE_LIB | EF_PPC_RELOCATABLE)))
4938 elf_elfheader (obfd)->e_flags |= EF_PPC_RELOCATABLE;
4939
4940 /* Do not warn about eabi vs. V.4 mismatch, just or in the bit if
4941 any module uses it. */
4942 elf_elfheader (obfd)->e_flags |= (new_flags & EF_PPC_EMB);
4943
4944 new_flags &= ~(EF_PPC_RELOCATABLE | EF_PPC_RELOCATABLE_LIB | EF_PPC_EMB);
4945 old_flags &= ~(EF_PPC_RELOCATABLE | EF_PPC_RELOCATABLE_LIB | EF_PPC_EMB);
4946
4947 /* Warn about any other mismatches. */
4948 if (new_flags != old_flags)
4949 {
4950 error = TRUE;
4eca0228 4951 _bfd_error_handler
695344c0 4952 /* xgettext:c-format */
871b3ab2 4953 (_("%pB: uses different e_flags (%#x) fields "
cd9af601
AM
4954 "than previous modules (%#x)"),
4955 ibfd, new_flags, old_flags);
8853c3d3
AM
4956 }
4957
4958 if (error)
4959 {
4960 bfd_set_error (bfd_error_bad_value);
4961 return FALSE;
4962 }
4963 }
4964
4965 return TRUE;
4966}
b9c361e0
JL
4967
4968static void
95f0d0d2 4969ppc_elf_vle_split16 (bfd *input_bfd,
08dc996f
AM
4970 asection *input_section,
4971 unsigned long offset,
95f0d0d2 4972 bfd_byte *loc,
86c95733 4973 bfd_vma value,
08dc996f
AM
4974 split16_format_type split16_format,
4975 bfd_boolean fixup)
b9c361e0 4976{
08dc996f 4977 unsigned int insn, opcode, top5;
b9c361e0 4978
95f0d0d2 4979 insn = bfd_get_32 (input_bfd, loc);
673cff9b 4980 opcode = insn & 0xfc00f800;
08dc996f
AM
4981 if (opcode == E_OR2I_INSN
4982 || opcode == E_AND2I_DOT_INSN
4983 || opcode == E_OR2IS_INSN
4984 || opcode == E_LIS_INSN
4985 || opcode == E_AND2IS_DOT_INSN)
4986 {
4987 if (split16_format != split16a_type)
4988 {
4989 if (fixup)
4990 split16_format = split16a_type;
4991 else
4992 _bfd_error_handler
4993 /* xgettext:c-format */
871b3ab2 4994 (_("%pB(%pA+0x%lx): expected 16A style relocation on 0x%08x insn"),
08dc996f
AM
4995 input_bfd, input_section, offset, opcode);
4996 }
4997 }
4998 else if (opcode == E_ADD2I_DOT_INSN
4999 || opcode == E_ADD2IS_INSN
5000 || opcode == E_CMP16I_INSN
5001 || opcode == E_MULL2I_INSN
5002 || opcode == E_CMPL16I_INSN
5003 || opcode == E_CMPH16I_INSN
5004 || opcode == E_CMPHL16I_INSN)
5005 {
5006 if (split16_format != split16d_type)
5007 {
5008 if (fixup)
5009 split16_format = split16d_type;
5010 else
5011 _bfd_error_handler
5012 /* xgettext:c-format */
871b3ab2 5013 (_("%pB(%pA+0x%lx): expected 16D style relocation on 0x%08x insn"),
08dc996f
AM
5014 input_bfd, input_section, offset, opcode);
5015 }
5016 }
86c95733 5017 top5 = value & 0xf800;
5499c7c7
AM
5018 top5 = top5 << (split16_format == split16a_type ? 5 : 10);
5019 insn &= (split16_format == split16a_type ? ~0x1f07ff : ~0x3e007ff);
b9c361e0 5020 insn |= top5;
86c95733 5021 insn |= value & 0x7ff;
95f0d0d2 5022 bfd_put_32 (input_bfd, insn, loc);
b9c361e0 5023}
83eef883
AFB
5024
5025static void
5026ppc_elf_vle_split20 (bfd *output_bfd, bfd_byte *loc, bfd_vma value)
5027{
5028 unsigned int insn;
5029
5030 insn = bfd_get_32 (output_bfd, loc);
5031 /* We have an li20 field, bits 17..20, 11..15, 21..31. */
5032 /* Top 4 bits of value to 17..20. */
5033 insn |= (value & 0xf0000) >> 5;
5034 /* Next 5 bits of the value to 11..15. */
5035 insn |= (value & 0xf800) << 5;
5036 /* And the final 11 bits of the value to bits 21 to 31. */
5037 insn |= value & 0x7ff;
5038 bfd_put_32 (output_bfd, insn, loc);
5039}
5040
8853c3d3 5041\f
d7128ce4
AM
5042/* Choose which PLT scheme to use, and set .plt flags appropriately.
5043 Returns -1 on error, 0 for old PLT, 1 for new PLT. */
5044int
5045ppc_elf_select_plt_layout (bfd *output_bfd ATTRIBUTE_UNUSED,
5446cbdf 5046 struct bfd_link_info *info)
d7128ce4
AM
5047{
5048 struct ppc_elf_link_hash_table *htab;
9d8504b1 5049 flagword flags;
d7128ce4
AM
5050
5051 htab = ppc_elf_hash_table (info);
4a3dc543
RS
5052
5053 if (htab->plt_type == PLT_UNSET)
016687f8 5054 {
b3874e1a
AM
5055 struct elf_link_hash_entry *h;
5056
5446cbdf 5057 if (htab->params->plt_style == PLT_OLD)
016687f8 5058 htab->plt_type = PLT_OLD;
0e1862bb 5059 else if (bfd_link_pic (info)
b3874e1a
AM
5060 && htab->elf.dynamic_sections_created
5061 && (h = elf_link_hash_lookup (&htab->elf, "_mcount",
5062 FALSE, FALSE, TRUE)) != NULL
5063 && (h->type == STT_FUNC
5064 || h->needs_plt)
5065 && h->ref_regular
5066 && !(SYMBOL_CALLS_LOCAL (info, h)
21d68fcd 5067 || UNDEFWEAK_NO_DYNAMIC_RELOC (info, h)))
b3874e1a
AM
5068 {
5069 /* Profiling of shared libs (and pies) is not supported with
5070 secure plt, because ppc32 does profiling before a
5071 function prologue and a secure plt pic call stubs needs
5072 r30 to be set up. */
5073 htab->plt_type = PLT_OLD;
5074 }
016687f8
AM
5075 else
5076 {
5077 bfd *ibfd;
5446cbdf 5078 enum ppc_elf_plt_type plt_type = htab->params->plt_style;
016687f8
AM
5079
5080 /* Look through the reloc flags left by ppc_elf_check_relocs.
5081 Use the old style bss plt if a file makes plt calls
5082 without using the new relocs, and if ld isn't given
5083 --secure-plt and we never see REL16 relocs. */
5084 if (plt_type == PLT_UNSET)
5085 plt_type = PLT_OLD;
c72f2fb2 5086 for (ibfd = info->input_bfds; ibfd; ibfd = ibfd->link.next)
0c8d6e5c 5087 if (is_ppc_elf (ibfd))
016687f8
AM
5088 {
5089 if (ppc_elf_tdata (ibfd)->has_rel16)
5090 plt_type = PLT_NEW;
5091 else if (ppc_elf_tdata (ibfd)->makes_plt_call)
5092 {
5093 plt_type = PLT_OLD;
5094 htab->old_bfd = ibfd;
5095 break;
5096 }
5097 }
5098 htab->plt_type = plt_type;
5099 }
5100 }
5446cbdf 5101 if (htab->plt_type == PLT_OLD && htab->params->plt_style == PLT_NEW)
b3874e1a
AM
5102 {
5103 if (htab->old_bfd != NULL)
cf97bcb0 5104 _bfd_error_handler (_("bss-plt forced due to %pB"), htab->old_bfd);
b3874e1a 5105 else
cf97bcb0 5106 _bfd_error_handler (_("bss-plt forced by profiling"));
b3874e1a 5107 }
d7128ce4 5108
4a3dc543 5109 BFD_ASSERT (htab->plt_type != PLT_VXWORKS);
9d8504b1 5110
4a3dc543 5111 if (htab->plt_type == PLT_NEW)
9d8504b1
PB
5112 {
5113 flags = (SEC_ALLOC | SEC_LOAD | SEC_HAS_CONTENTS
5114 | SEC_IN_MEMORY | SEC_LINKER_CREATED);
86b9da88
AM
5115
5116 /* The new PLT is a loaded section. */
ce558b89
AM
5117 if (htab->elf.splt != NULL
5118 && !bfd_set_section_flags (htab->elf.dynobj, htab->elf.splt, flags))
86b9da88
AM
5119 return -1;
5120
5121 /* The new GOT is not executable. */
ce558b89
AM
5122 if (htab->elf.sgot != NULL
5123 && !bfd_set_section_flags (htab->elf.dynobj, htab->elf.sgot, flags))
86b9da88 5124 return -1;
d7128ce4
AM
5125 }
5126 else
5127 {
5128 /* Stop an unused .glink section from affecting .text alignment. */
86b9da88
AM
5129 if (htab->glink != NULL
5130 && !bfd_set_section_alignment (htab->elf.dynobj, htab->glink, 0))
5131 return -1;
d7128ce4 5132 }
4a3dc543 5133 return htab->plt_type == PLT_NEW;
d7128ce4
AM
5134}
5135\f
25dbc73a
AM
5136/* Return the section that should be marked against GC for a given
5137 relocation. */
586119b3 5138
25dbc73a
AM
5139static asection *
5140ppc_elf_gc_mark_hook (asection *sec,
07adf181 5141 struct bfd_link_info *info,
25dbc73a
AM
5142 Elf_Internal_Rela *rel,
5143 struct elf_link_hash_entry *h,
5144 Elf_Internal_Sym *sym)
5145{
5146 if (h != NULL)
07adf181
AM
5147 switch (ELF32_R_TYPE (rel->r_info))
5148 {
5149 case R_PPC_GNU_VTINHERIT:
5150 case R_PPC_GNU_VTENTRY:
5151 return NULL;
5152 }
5153
5154 return _bfd_elf_gc_mark_hook (sec, info, rel, h, sym);
25dbc73a 5155}
49c09209
AM
5156
5157static bfd_boolean
5158get_sym_h (struct elf_link_hash_entry **hp,
5159 Elf_Internal_Sym **symp,
5160 asection **symsecp,
5161 unsigned char **tls_maskp,
5162 Elf_Internal_Sym **locsymsp,
5163 unsigned long r_symndx,
5164 bfd *ibfd)
5165{
5166 Elf_Internal_Shdr *symtab_hdr = &elf_symtab_hdr (ibfd);
5167
5168 if (r_symndx >= symtab_hdr->sh_info)
5169 {
5170 struct elf_link_hash_entry **sym_hashes = elf_sym_hashes (ibfd);
5171 struct elf_link_hash_entry *h;
5172
5173 h = sym_hashes[r_symndx - symtab_hdr->sh_info];
5174 while (h->root.type == bfd_link_hash_indirect
5175 || h->root.type == bfd_link_hash_warning)
5176 h = (struct elf_link_hash_entry *) h->root.u.i.link;
5177
5178 if (hp != NULL)
5179 *hp = h;
5180
5181 if (symp != NULL)
5182 *symp = NULL;
5183
5184 if (symsecp != NULL)
5185 {
5186 asection *symsec = NULL;
5187 if (h->root.type == bfd_link_hash_defined
5188 || h->root.type == bfd_link_hash_defweak)
5189 symsec = h->root.u.def.section;
5190 *symsecp = symsec;
5191 }
5192
5193 if (tls_maskp != NULL)
5194 *tls_maskp = &ppc_elf_hash_entry (h)->tls_mask;
5195 }
5196 else
5197 {
5198 Elf_Internal_Sym *sym;
5199 Elf_Internal_Sym *locsyms = *locsymsp;
5200
5201 if (locsyms == NULL)
5202 {
5203 locsyms = (Elf_Internal_Sym *) symtab_hdr->contents;
5204 if (locsyms == NULL)
5205 locsyms = bfd_elf_get_elf_syms (ibfd, symtab_hdr,
5206 symtab_hdr->sh_info,
5207 0, NULL, NULL, NULL);
5208 if (locsyms == NULL)
5209 return FALSE;
5210 *locsymsp = locsyms;
5211 }
5212 sym = locsyms + r_symndx;
5213
5214 if (hp != NULL)
5215 *hp = NULL;
5216
5217 if (symp != NULL)
5218 *symp = sym;
5219
5220 if (symsecp != NULL)
5221 *symsecp = bfd_section_from_elf_index (ibfd, sym->st_shndx);
5222
5223 if (tls_maskp != NULL)
5224 {
5225 bfd_signed_vma *local_got;
5226 unsigned char *tls_mask;
5227
5228 tls_mask = NULL;
5229 local_got = elf_local_got_refcounts (ibfd);
5230 if (local_got != NULL)
5231 {
5232 struct plt_entry **local_plt = (struct plt_entry **)
5233 (local_got + symtab_hdr->sh_info);
5234 unsigned char *lgot_masks = (unsigned char *)
5235 (local_plt + symtab_hdr->sh_info);
5236 tls_mask = &lgot_masks[r_symndx];
5237 }
5238 *tls_maskp = tls_mask;
5239 }
5240 }
5241 return TRUE;
5242}
25dbc73a 5243\f
3e04d765
AM
5244/* Analyze inline PLT call relocations to see whether calls to locally
5245 defined functions can be converted to direct calls. */
5246
5247bfd_boolean
5248ppc_elf_inline_plt (struct bfd_link_info *info)
5249{
5250 struct ppc_elf_link_hash_table *htab;
5251 bfd *ibfd;
5252 asection *sec;
5253 bfd_vma low_vma, high_vma, limit;
5254
5255 htab = ppc_elf_hash_table (info);
5256 if (htab == NULL)
5257 return FALSE;
5258
5259 /* A bl insn can reach -0x2000000 to 0x1fffffc. The limit is
5260 reduced somewhat to cater for possible stubs that might be added
5261 between the call and its destination. */
5262 limit = 0x1e00000;
5263 low_vma = -1;
5264 high_vma = 0;
5265 for (sec = info->output_bfd->sections; sec != NULL; sec = sec->next)
5266 if ((sec->flags & (SEC_ALLOC | SEC_CODE)) == (SEC_ALLOC | SEC_CODE))
5267 {
5268 if (low_vma > sec->vma)
5269 low_vma = sec->vma;
5270 if (high_vma < sec->vma + sec->size)
5271 high_vma = sec->vma + sec->size;
5272 }
5273
5274 /* If a "bl" can reach anywhere in local code sections, then we can
5275 convert all inline PLT sequences to direct calls when the symbol
5276 is local. */
5277 if (high_vma - low_vma < limit)
5278 {
5279 htab->can_convert_all_inline_plt = 1;
5280 return TRUE;
5281 }
5282
5283 /* Otherwise, go looking through relocs for cases where a direct
5284 call won't reach. Mark the symbol on any such reloc to disable
5285 the optimization and keep the PLT entry as it seems likely that
5286 this will be better than creating trampolines. Note that this
5287 will disable the optimization for all inline PLT calls to a
5288 particular symbol, not just those that won't reach. The
5289 difficulty in doing a more precise optimization is that the
5290 linker needs to make a decision depending on whether a
5291 particular R_PPC_PLTCALL insn can be turned into a direct
5292 call, for each of the R_PPC_PLTSEQ and R_PPC_PLT16* insns in
5293 the sequence, and there is nothing that ties those relocs
5294 together except their symbol. */
5295
5296 for (ibfd = info->input_bfds; ibfd != NULL; ibfd = ibfd->link.next)
5297 {
5298 Elf_Internal_Shdr *symtab_hdr;
5299 Elf_Internal_Sym *local_syms;
5300
5301 if (!is_ppc_elf (ibfd))
5302 continue;
5303
5304 local_syms = NULL;
5305 symtab_hdr = &elf_symtab_hdr (ibfd);
5306
5307 for (sec = ibfd->sections; sec != NULL; sec = sec->next)
5308 if (sec->has_pltcall
5309 && !bfd_is_abs_section (sec->output_section))
5310 {
5311 Elf_Internal_Rela *relstart, *rel, *relend;
5312
5313 /* Read the relocations. */
5314 relstart = _bfd_elf_link_read_relocs (ibfd, sec, NULL, NULL,
5315 info->keep_memory);
5316 if (relstart == NULL)
5317 return FALSE;
5318
5319 relend = relstart + sec->reloc_count;
5320 for (rel = relstart; rel < relend; )
5321 {
5322 enum elf_ppc_reloc_type r_type;
5323 unsigned long r_symndx;
5324 asection *sym_sec;
5325 struct elf_link_hash_entry *h;
5326 Elf_Internal_Sym *sym;
5327 unsigned char *tls_maskp;
5328
5329 r_type = ELF32_R_TYPE (rel->r_info);
5330 if (r_type != R_PPC_PLTCALL)
5331 continue;
5332
5333 r_symndx = ELF32_R_SYM (rel->r_info);
5334 if (!get_sym_h (&h, &sym, &sym_sec, &tls_maskp, &local_syms,
5335 r_symndx, ibfd))
5336 {
5337 if (elf_section_data (sec)->relocs != relstart)
5338 free (relstart);
5339 if (local_syms != NULL
5340 && symtab_hdr->contents != (unsigned char *) local_syms)
5341 free (local_syms);
5342 return FALSE;
5343 }
5344
5345 if (sym_sec != NULL && sym_sec->output_section != NULL)
5346 {
5347 bfd_vma from, to;
5348 if (h != NULL)
5349 to = h->root.u.def.value;
5350 else
5351 to = sym->st_value;
5352 to += (rel->r_addend
5353 + sym_sec->output_offset
5354 + sym_sec->output_section->vma);
5355 from = (rel->r_offset
5356 + sec->output_offset
5357 + sec->output_section->vma);
5358 if (to - from + limit < 2 * limit)
5359 *tls_maskp &= ~PLT_KEEP;
5360 }
5361 }
5362 if (elf_section_data (sec)->relocs != relstart)
5363 free (relstart);
5364 }
5365
5366 if (local_syms != NULL
5367 && symtab_hdr->contents != (unsigned char *) local_syms)
5368 {
5369 if (!info->keep_memory)
5370 free (local_syms);
5371 else
5372 symtab_hdr->contents = (unsigned char *) local_syms;
5373 }
5374 }
5375
5376 return TRUE;
5377}
5378
3a71aa26
AM
5379/* Set plt output section type, htab->tls_get_addr, and call the
5380 generic ELF tls_setup function. */
7fce784e 5381
25dbc73a 5382asection *
5446cbdf 5383ppc_elf_tls_setup (bfd *obfd, struct bfd_link_info *info)
7fce784e 5384{
25dbc73a 5385 struct ppc_elf_link_hash_table *htab;
7fce784e 5386
25dbc73a 5387 htab = ppc_elf_hash_table (info);
a7f2871e
AM
5388 htab->tls_get_addr = elf_link_hash_lookup (&htab->elf, "__tls_get_addr",
5389 FALSE, FALSE, TRUE);
f01f1741
AM
5390 if (htab->plt_type != PLT_NEW)
5391 htab->params->no_tls_get_addr_opt = TRUE;
5392
5446cbdf 5393 if (!htab->params->no_tls_get_addr_opt)
a7f2871e
AM
5394 {
5395 struct elf_link_hash_entry *opt, *tga;
5396 opt = elf_link_hash_lookup (&htab->elf, "__tls_get_addr_opt",
5397 FALSE, FALSE, TRUE);
5398 if (opt != NULL
5399 && (opt->root.type == bfd_link_hash_defined
5400 || opt->root.type == bfd_link_hash_defweak))
5401 {
5402 /* If glibc supports an optimized __tls_get_addr call stub,
5403 signalled by the presence of __tls_get_addr_opt, and we'll
5404 be calling __tls_get_addr via a plt call stub, then
5405 make __tls_get_addr point to __tls_get_addr_opt. */
5406 tga = htab->tls_get_addr;
5407 if (htab->elf.dynamic_sections_created
5408 && tga != NULL
5409 && (tga->type == STT_FUNC
5410 || tga->needs_plt)
5411 && !(SYMBOL_CALLS_LOCAL (info, tga)
21d68fcd 5412 || UNDEFWEAK_NO_DYNAMIC_RELOC (info, tga)))
a7f2871e
AM
5413 {
5414 struct plt_entry *ent;
32af9f6e
AM
5415 for (ent = tga->plt.plist; ent != NULL; ent = ent->next)
5416 if (ent->plt.refcount > 0)
5417 break;
5418 if (ent != NULL)
a7f2871e
AM
5419 {
5420 tga->root.type = bfd_link_hash_indirect;
5421 tga->root.u.i.link = &opt->root;
5422 ppc_elf_copy_indirect_symbol (info, opt, tga);
b531344c 5423 opt->mark = 1;
a7f2871e
AM
5424 if (opt->dynindx != -1)
5425 {
5426 /* Use __tls_get_addr_opt in dynamic relocations. */
5427 opt->dynindx = -1;
5428 _bfd_elf_strtab_delref (elf_hash_table (info)->dynstr,
5429 opt->dynstr_index);
5430 if (!bfd_elf_link_record_dynamic_symbol (info, opt))
5431 return FALSE;
5432 }
5433 htab->tls_get_addr = opt;
5434 }
5435 }
5436 }
5437 else
5446cbdf 5438 htab->params->no_tls_get_addr_opt = TRUE;
a7f2871e 5439 }
4a3dc543 5440 if (htab->plt_type == PLT_NEW
ce558b89
AM
5441 && htab->elf.splt != NULL
5442 && htab->elf.splt->output_section != NULL)
d7128ce4 5443 {
ce558b89
AM
5444 elf_section_type (htab->elf.splt->output_section) = SHT_PROGBITS;
5445 elf_section_flags (htab->elf.splt->output_section) = SHF_ALLOC + SHF_WRITE;
d7128ce4
AM
5446 }
5447
25dbc73a 5448 return _bfd_elf_tls_setup (obfd, info);
7fce784e
AS
5449}
5450
3a71aa26
AM
5451/* Return TRUE iff REL is a branch reloc with a global symbol matching
5452 HASH. */
5453
5454static bfd_boolean
5455branch_reloc_hash_match (const bfd *ibfd,
5456 const Elf_Internal_Rela *rel,
5457 const struct elf_link_hash_entry *hash)
5458{
5459 Elf_Internal_Shdr *symtab_hdr = &elf_symtab_hdr (ibfd);
5460 enum elf_ppc_reloc_type r_type = ELF32_R_TYPE (rel->r_info);
5461 unsigned int r_symndx = ELF32_R_SYM (rel->r_info);
5462
e054468f 5463 if (r_symndx >= symtab_hdr->sh_info && is_branch_reloc (r_type))
3a71aa26
AM
5464 {
5465 struct elf_link_hash_entry **sym_hashes = elf_sym_hashes (ibfd);
5466 struct elf_link_hash_entry *h;
5467
5468 h = sym_hashes[r_symndx - symtab_hdr->sh_info];
5469 while (h->root.type == bfd_link_hash_indirect
5470 || h->root.type == bfd_link_hash_warning)
5471 h = (struct elf_link_hash_entry *) h->root.u.i.link;
5472 if (h == hash)
5473 return TRUE;
5474 }
5475 return FALSE;
5476}
5477
25dbc73a
AM
5478/* Run through all the TLS relocs looking for optimization
5479 opportunities. */
252b5132 5480
25dbc73a
AM
5481bfd_boolean
5482ppc_elf_tls_optimize (bfd *obfd ATTRIBUTE_UNUSED,
5483 struct bfd_link_info *info)
252b5132 5484{
7fce784e 5485 bfd *ibfd;
25dbc73a
AM
5486 asection *sec;
5487 struct ppc_elf_link_hash_table *htab;
b7fcf6f6 5488 int pass;
252b5132 5489
3cbc1e5e 5490 if (!bfd_link_executable (info))
25dbc73a 5491 return TRUE;
252b5132 5492
7619e7c7 5493 htab = ppc_elf_hash_table (info);
663a1470
AM
5494 if (htab == NULL)
5495 return FALSE;
5496
b7fcf6f6
AM
5497 /* Make two passes through the relocs. First time check that tls
5498 relocs involved in setting up a tls_get_addr call are indeed
663a1470
AM
5499 followed by such a call. If they are not, don't do any tls
5500 optimization. On the second pass twiddle tls_mask flags to
5501 notify relocate_section that optimization can be done, and
5502 adjust got and plt refcounts. */
b7fcf6f6 5503 for (pass = 0; pass < 2; ++pass)
c72f2fb2 5504 for (ibfd = info->input_bfds; ibfd != NULL; ibfd = ibfd->link.next)
b7fcf6f6 5505 {
0ffa91dd 5506 Elf_Internal_Shdr *symtab_hdr = &elf_symtab_hdr (ibfd);
32af9f6e 5507 asection *got2 = bfd_get_section_by_name (ibfd, ".got2");
7619e7c7 5508
b7fcf6f6
AM
5509 for (sec = ibfd->sections; sec != NULL; sec = sec->next)
5510 if (sec->has_tls_reloc && !bfd_is_abs_section (sec->output_section))
5511 {
5512 Elf_Internal_Rela *relstart, *rel, *relend;
663a1470 5513 int expecting_tls_get_addr = 0;
252b5132 5514
b7fcf6f6
AM
5515 /* Read the relocations. */
5516 relstart = _bfd_elf_link_read_relocs (ibfd, sec, NULL, NULL,
5517 info->keep_memory);
5518 if (relstart == NULL)
5519 return FALSE;
7619e7c7 5520
b7fcf6f6
AM
5521 relend = relstart + sec->reloc_count;
5522 for (rel = relstart; rel < relend; rel++)
5523 {
5524 enum elf_ppc_reloc_type r_type;
5525 unsigned long r_symndx;
5526 struct elf_link_hash_entry *h = NULL;
bac3c8c5 5527 unsigned char *tls_mask;
37da22e5 5528 unsigned char tls_set, tls_clear;
b7fcf6f6 5529 bfd_boolean is_local;
b7fcf6f6
AM
5530 bfd_signed_vma *got_count;
5531
5532 r_symndx = ELF32_R_SYM (rel->r_info);
5533 if (r_symndx >= symtab_hdr->sh_info)
5534 {
5535 struct elf_link_hash_entry **sym_hashes;
7fce784e 5536
b7fcf6f6
AM
5537 sym_hashes = elf_sym_hashes (ibfd);
5538 h = sym_hashes[r_symndx - symtab_hdr->sh_info];
5539 while (h->root.type == bfd_link_hash_indirect
5540 || h->root.type == bfd_link_hash_warning)
5541 h = (struct elf_link_hash_entry *) h->root.u.i.link;
5542 }
7619e7c7 5543
b7fcf6f6
AM
5544 is_local = FALSE;
5545 if (h == NULL
5546 || !h->def_dynamic)
5547 is_local = TRUE;
7619e7c7 5548
b7fcf6f6 5549 r_type = ELF32_R_TYPE (rel->r_info);
663a1470
AM
5550 /* If this section has old-style __tls_get_addr calls
5551 without marker relocs, then check that each
5552 __tls_get_addr call reloc is preceded by a reloc
5553 that conceivably belongs to the __tls_get_addr arg
5554 setup insn. If we don't find matching arg setup
5555 relocs, don't do any tls optimization. */
5556 if (pass == 0
5557 && sec->has_tls_get_addr_call
5558 && h != NULL
5559 && h == htab->tls_get_addr
5560 && !expecting_tls_get_addr
5561 && is_branch_reloc (r_type))
5562 {
25f53a85 5563 info->callbacks->minfo ("%H __tls_get_addr lost arg, "
663a1470
AM
5564 "TLS optimization disabled\n",
5565 ibfd, sec, rel->r_offset);
5566 if (elf_section_data (sec)->relocs != relstart)
5567 free (relstart);
5568 return TRUE;
5569 }
5570
5571 expecting_tls_get_addr = 0;
b7fcf6f6
AM
5572 switch (r_type)
5573 {
5574 case R_PPC_GOT_TLSLD16:
5575 case R_PPC_GOT_TLSLD16_LO:
5576 expecting_tls_get_addr = 1;
1a0670f3 5577 /* Fall through. */
b7fcf6f6
AM
5578
5579 case R_PPC_GOT_TLSLD16_HI:
5580 case R_PPC_GOT_TLSLD16_HA:
5581 /* These relocs should never be against a symbol
5582 defined in a shared lib. Leave them alone if
5583 that turns out to be the case. */
5584 if (!is_local)
5585 continue;
5586
5587 /* LD -> LE */
5588 tls_set = 0;
5589 tls_clear = TLS_LD;
5590 break;
5591
5592 case R_PPC_GOT_TLSGD16:
5593 case R_PPC_GOT_TLSGD16_LO:
5594 expecting_tls_get_addr = 1;
1a0670f3 5595 /* Fall through. */
b7fcf6f6
AM
5596
5597 case R_PPC_GOT_TLSGD16_HI:
5598 case R_PPC_GOT_TLSGD16_HA:
5599 if (is_local)
5600 /* GD -> LE */
5601 tls_set = 0;
5602 else
5603 /* GD -> IE */
5604 tls_set = TLS_TLS | TLS_TPRELGD;
5605 tls_clear = TLS_GD;
5606 break;
5607
5608 case R_PPC_GOT_TPREL16:
5609 case R_PPC_GOT_TPREL16_LO:
5610 case R_PPC_GOT_TPREL16_HI:
5611 case R_PPC_GOT_TPREL16_HA:
5612 if (is_local)
5613 {
5614 /* IE -> LE */
5615 tls_set = 0;
5616 tls_clear = TLS_TPREL;
5617 break;
5618 }
5619 else
5620 continue;
5621
32af9f6e
AM
5622 case R_PPC_TLSGD:
5623 case R_PPC_TLSLD:
23cedd1d
AM
5624 if (rel + 1 < relend
5625 && is_plt_seq_reloc (ELF32_R_TYPE (rel[1].r_info)))
5626 {
5627 if (pass != 0
5628 && ELF32_R_TYPE (rel[1].r_info) != R_PPC_PLTSEQ)
5629 {
5630 r_type = ELF32_R_TYPE (rel[1].r_info);
5631 r_symndx = ELF32_R_SYM (rel[1].r_info);
5632 if (r_symndx >= symtab_hdr->sh_info)
5633 {
5634 struct elf_link_hash_entry **sym_hashes;
5635
5636 sym_hashes = elf_sym_hashes (ibfd);
5637 h = sym_hashes[r_symndx - symtab_hdr->sh_info];
5638 while (h->root.type == bfd_link_hash_indirect
5639 || h->root.type == bfd_link_hash_warning)
5640 h = (struct elf_link_hash_entry *) h->root.u.i.link;
5641 if (h != NULL)
5642 {
5643 struct plt_entry *ent = NULL;
5644 bfd_vma addend = 0;
5645
5646 if (bfd_link_pic (info))
5647 addend = rel->r_addend;
5648 ent = find_plt_ent (&h->plt.plist,
5649 got2, addend);
5650 if (ent != NULL
5651 && ent->plt.refcount > 0)
5652 ent->plt.refcount -= 1;
5653 }
5654 }
5655 }
5656 continue;
5657 }
32af9f6e
AM
5658 expecting_tls_get_addr = 2;
5659 tls_set = 0;
5660 tls_clear = 0;
5661 break;
5662
b7fcf6f6 5663 default:
25dbc73a 5664 continue;
b7fcf6f6 5665 }
25dbc73a 5666
b7fcf6f6
AM
5667 if (pass == 0)
5668 {
727fc41e 5669 if (!expecting_tls_get_addr
23cedd1d 5670 || !sec->has_tls_get_addr_call)
b7fcf6f6 5671 continue;
25dbc73a 5672
3a71aa26
AM
5673 if (rel + 1 < relend
5674 && branch_reloc_hash_match (ibfd, rel + 1,
5675 htab->tls_get_addr))
5676 continue;
25dbc73a 5677
b7fcf6f6
AM
5678 /* Uh oh, we didn't find the expected call. We
5679 could just mark this symbol to exclude it
5680 from tls optimization but it's safer to skip
663a1470 5681 the entire optimization. */
25f53a85 5682 info->callbacks->minfo (_("%H arg lost __tls_get_addr, "
663a1470
AM
5683 "TLS optimization disabled\n"),
5684 ibfd, sec, rel->r_offset);
5685 if (elf_section_data (sec)->relocs != relstart)
5686 free (relstart);
5687 return TRUE;
b7fcf6f6 5688 }
25dbc73a 5689
b7fcf6f6
AM
5690 if (h != NULL)
5691 {
5692 tls_mask = &ppc_elf_hash_entry (h)->tls_mask;
5693 got_count = &h->got.refcount;
5694 }
5695 else
5696 {
b7fcf6f6 5697 bfd_signed_vma *lgot_refs;
e054468f 5698 struct plt_entry **local_plt;
bac3c8c5 5699 unsigned char *lgot_masks;
25dbc73a 5700
b7fcf6f6
AM
5701 lgot_refs = elf_local_got_refcounts (ibfd);
5702 if (lgot_refs == NULL)
5703 abort ();
e054468f
AM
5704 local_plt = (struct plt_entry **)
5705 (lgot_refs + symtab_hdr->sh_info);
bac3c8c5
AM
5706 lgot_masks = (unsigned char *)
5707 (local_plt + symtab_hdr->sh_info);
b7fcf6f6
AM
5708 tls_mask = &lgot_masks[r_symndx];
5709 got_count = &lgot_refs[r_symndx];
5710 }
25dbc73a 5711
37da22e5
AM
5712 /* If we don't have old-style __tls_get_addr calls
5713 without TLSGD/TLSLD marker relocs, and we haven't
5714 found a new-style __tls_get_addr call with a
5715 marker for this symbol, then we either have a
5716 broken object file or an -mlongcall style
5717 indirect call to __tls_get_addr without a marker.
5718 Disable optimization in this case. */
5719 if ((tls_clear & (TLS_GD | TLS_LD)) != 0
5720 && !sec->has_tls_get_addr_call
5721 && ((*tls_mask & (TLS_TLS | TLS_MARK))
5722 != (TLS_TLS | TLS_MARK)))
5723 continue;
5724
5725 if (expecting_tls_get_addr)
5726 {
5727 struct plt_entry *ent;
5728 bfd_vma addend = 0;
5729
5730 if (bfd_link_pic (info)
23cedd1d
AM
5731 && (ELF32_R_TYPE (rel[1].r_info) == R_PPC_PLTREL24
5732 || ELF32_R_TYPE (rel[1].r_info) == R_PPC_PLTCALL))
37da22e5
AM
5733 addend = rel[1].r_addend;
5734 ent = find_plt_ent (&htab->tls_get_addr->plt.plist,
5735 got2, addend);
5736 if (ent != NULL && ent->plt.refcount > 0)
5737 ent->plt.refcount -= 1;
5738
5739 if (expecting_tls_get_addr == 2)
5740 continue;
5741 }
5742
b7fcf6f6
AM
5743 if (tls_set == 0)
5744 {
5745 /* We managed to get rid of a got entry. */
5746 if (*got_count > 0)
5747 *got_count -= 1;
5748 }
25dbc73a 5749
b7fcf6f6
AM
5750 *tls_mask |= tls_set;
5751 *tls_mask &= ~tls_clear;
5752 }
25dbc73a 5753
b7fcf6f6
AM
5754 if (elf_section_data (sec)->relocs != relstart)
5755 free (relstart);
5756 }
b7fcf6f6 5757 }
9a23f96e 5758 htab->do_tls_opt = 1;
25dbc73a
AM
5759 return TRUE;
5760}
5761\f
98bbb1b8 5762/* Find dynamic relocs for H that apply to read-only sections. */
625af618 5763
98bbb1b8
AM
5764static asection *
5765readonly_dynrelocs (struct elf_link_hash_entry *h)
625af618 5766{
6061a67d 5767 struct elf_dyn_relocs *p;
625af618
AM
5768
5769 for (p = ppc_elf_hash_entry (h)->dyn_relocs; p != NULL; p = p->next)
5770 {
5771 asection *s = p->sec->output_section;
5772
98bbb1b8
AM
5773 if (s != NULL && (s->flags & SEC_READONLY) != 0)
5774 return p->sec;
625af618 5775 }
98bbb1b8 5776 return NULL;
625af618
AM
5777}
5778
287c7eaf
AM
5779/* Return true if we have dynamic relocs against H or any of its weak
5780 aliases, that apply to read-only sections. Cannot be used after
5781 size_dynamic_sections. */
5782
5783static bfd_boolean
5784alias_readonly_dynrelocs (struct elf_link_hash_entry *h)
5785{
5786 struct ppc_elf_link_hash_entry *eh = ppc_elf_hash_entry (h);
5787 do
5788 {
5789 if (readonly_dynrelocs (&eh->elf))
5790 return TRUE;
5791 eh = ppc_elf_hash_entry (eh->elf.u.alias);
5792 } while (eh != NULL && &eh->elf != h);
5793
5794 return FALSE;
5795}
5796
5797/* Return whether H has pc-relative dynamic relocs. */
5798
5799static bfd_boolean
5800pc_dynrelocs (struct elf_link_hash_entry *h)
5801{
5802 struct elf_dyn_relocs *p;
5803
5804 for (p = ppc_elf_hash_entry (h)->dyn_relocs; p != NULL; p = p->next)
5805 if (p->pc_count != 0)
5806 return TRUE;
5807 return FALSE;
5808}
5809
25dbc73a
AM
5810/* Adjust a symbol defined by a dynamic object and referenced by a
5811 regular object. The current definition is in some section of the
5812 dynamic object, but we're not including those sections. We have to
5813 change the definition to something the rest of the link can
5814 understand. */
7fce784e 5815
25dbc73a
AM
5816static bfd_boolean
5817ppc_elf_adjust_dynamic_symbol (struct bfd_link_info *info,
5818 struct elf_link_hash_entry *h)
5819{
5820 struct ppc_elf_link_hash_table *htab;
5821 asection *s;
7fce784e 5822
25dbc73a
AM
5823#ifdef DEBUG
5824 fprintf (stderr, "ppc_elf_adjust_dynamic_symbol called for %s\n",
5825 h->root.root.string);
5826#endif
252b5132 5827
25dbc73a
AM
5828 /* Make sure we know what is going on here. */
5829 htab = ppc_elf_hash_table (info);
5830 BFD_ASSERT (htab->elf.dynobj != NULL
5831 && (h->needs_plt
91e21fb7 5832 || h->type == STT_GNU_IFUNC
60d67dc8 5833 || h->is_weakalias
25dbc73a
AM
5834 || (h->def_dynamic
5835 && h->ref_regular
5836 && !h->def_regular)));
252b5132 5837
25dbc73a
AM
5838 /* Deal with function syms. */
5839 if (h->type == STT_FUNC
e054468f 5840 || h->type == STT_GNU_IFUNC
25dbc73a
AM
5841 || h->needs_plt)
5842 {
529fe20e
AM
5843 bfd_boolean local = (SYMBOL_CALLS_LOCAL (info, h)
5844 || UNDEFWEAK_NO_DYNAMIC_RELOC (info, h));
287c7eaf
AM
5845 /* Discard dyn_relocs when non-pic if we've decided that a
5846 function symbol is local. */
5847 if (!bfd_link_pic (info) && local)
5848 ppc_elf_hash_entry (h)->dyn_relocs = NULL;
529fe20e 5849
25dbc73a
AM
5850 /* Clear procedure linkage table information for any symbol that
5851 won't need a .plt entry. */
a6aa5195
AM
5852 struct plt_entry *ent;
5853 for (ent = h->plt.plist; ent != NULL; ent = ent->next)
5854 if (ent->plt.refcount > 0)
5855 break;
5856 if (ent == NULL
2d7ad24e
AM
5857 || (h->type != STT_GNU_IFUNC
5858 && local
3e04d765
AM
5859 && (htab->can_convert_all_inline_plt
5860 || (ppc_elf_hash_entry (h)->tls_mask
5861 & (TLS_TLS | PLT_KEEP)) != PLT_KEEP)))
252b5132 5862 {
25dbc73a 5863 /* A PLT entry is not required/allowed when:
252b5132 5864
25dbc73a
AM
5865 1. We are not using ld.so; because then the PLT entry
5866 can't be set up, so we can't use one. In this case,
5867 ppc_elf_adjust_dynamic_symbol won't even be called.
252b5132 5868
25dbc73a
AM
5869 2. GC has rendered the entry unused.
5870
5871 3. We know for certain that a call to this symbol
5872 will go to this object, or will remain undefined. */
a6aa5195 5873 h->plt.plist = NULL;
25dbc73a 5874 h->needs_plt = 0;
d1eca1e4 5875 h->pointer_equality_needed = 0;
25dbc73a 5876 }
625af618
AM
5877 else
5878 {
d1eca1e4
AM
5879 /* Taking a function's address in a read/write section
5880 doesn't require us to define the function symbol in the
1009ef28 5881 executable on a plt call stub. A dynamic reloc can
f0158f44
AM
5882 be used instead, giving better runtime performance.
5883 (Calls via that function pointer don't need to bounce
5884 through the plt call stub.) Similarly, use a dynamic
5885 reloc for a weak reference when possible, allowing the
5886 resolution of the symbol to be set at load time rather
5887 than link time. */
5888 if ((h->pointer_equality_needed
3988aed5
AM
5889 || (h->non_got_ref
5890 && !h->ref_regular_nonweak
5891 && !UNDEFWEAK_NO_DYNAMIC_RELOC (info, h)))
1009ef28
AM
5892 && !htab->is_vxworks
5893 && !ppc_elf_hash_entry (h)->has_sda_refs
98bbb1b8 5894 && !readonly_dynrelocs (h))
d1eca1e4
AM
5895 {
5896 h->pointer_equality_needed = 0;
04383fd1
AM
5897 /* If we haven't seen a branch reloc and the symbol
5898 isn't an ifunc then we don't need a plt entry. */
5899 if (!h->needs_plt && h->type != STT_GNU_IFUNC)
3988aed5 5900 h->plt.plist = NULL;
d1eca1e4 5901 }
287c7eaf 5902 else if (!bfd_link_pic (info))
529fe20e
AM
5903 /* We are going to be defining the function symbol on the
5904 plt stub, so no dyn_relocs needed when non-pic. */
287c7eaf 5905 ppc_elf_hash_entry (h)->dyn_relocs = NULL;
625af618 5906 }
d3e454b9 5907 h->protected_def = 0;
3988aed5 5908 /* Function symbols can't have copy relocs. */
25dbc73a 5909 return TRUE;
252b5132 5910 }
25dbc73a 5911 else
a6aa5195 5912 h->plt.plist = NULL;
252b5132 5913
25dbc73a
AM
5914 /* If this is a weak symbol, and there is a real definition, the
5915 processor independent code will have arranged for us to see the
5916 real definition first, and we can just use the same value. */
60d67dc8 5917 if (h->is_weakalias)
252b5132 5918 {
60d67dc8
AM
5919 struct elf_link_hash_entry *def = weakdef (h);
5920 BFD_ASSERT (def->root.type == bfd_link_hash_defined);
5921 h->root.u.def.section = def->root.u.def.section;
5922 h->root.u.def.value = def->root.u.def.value;
4a7e5234
AM
5923 if (def->root.u.def.section == htab->elf.sdynbss
5924 || def->root.u.def.section == htab->elf.sdynrelro
5925 || def->root.u.def.section == htab->dynsbss)
5926 ppc_elf_hash_entry (h)->dyn_relocs = NULL;
25dbc73a
AM
5927 return TRUE;
5928 }
dc810e39 5929
25dbc73a
AM
5930 /* This is a reference to a symbol defined by a dynamic object which
5931 is not a function. */
252b5132 5932
25dbc73a
AM
5933 /* If we are creating a shared library, we must presume that the
5934 only references to the symbol are via the global offset table.
5935 For such cases we need not do anything here; the relocations will
5936 be handled correctly by relocate_section. */
0e1862bb 5937 if (bfd_link_pic (info))
d3e454b9
AM
5938 {
5939 h->protected_def = 0;
5940 return TRUE;
5941 }
252b5132 5942
25dbc73a
AM
5943 /* If there are no references to this symbol that do not use the
5944 GOT, we don't need to generate a copy reloc. */
5945 if (!h->non_got_ref)
d3e454b9
AM
5946 {
5947 h->protected_def = 0;
5948 return TRUE;
5949 }
5950
5951 /* Protected variables do not work with .dynbss. The copy in
5952 .dynbss won't be used by the shared library with the protected
5953 definition for the variable. Editing to PIC, or text relocations
5954 are preferable to an incorrect program. */
5955 if (h->protected_def)
5956 {
5957 if (ELIMINATE_COPY_RELOCS
5958 && ppc_elf_hash_entry (h)->has_addr16_ha
5959 && ppc_elf_hash_entry (h)->has_addr16_lo
5960 && htab->params->pic_fixup == 0
5961 && info->disable_target_specific_optimizations <= 1)
5962 htab->params->pic_fixup = 1;
d3e454b9
AM
5963 return TRUE;
5964 }
25dbc73a 5965
a127494f
AM
5966 /* If -z nocopyreloc was given, we won't generate them either. */
5967 if (info->nocopyreloc)
529fe20e 5968 return TRUE;
a127494f 5969
dce2246a 5970 /* If we don't find any dynamic relocs in read-only sections, then
cfd2c773
NS
5971 we'll be keeping the dynamic relocs and avoiding the copy reloc.
5972 We can't do this if there are any small data relocations. This
5973 doesn't work on VxWorks, where we can not have dynamic
5974 relocations (other than copy and jump slot relocations) in an
5975 executable. */
4dc4a9a5 5976 if (ELIMINATE_COPY_RELOCS
cfd2c773 5977 && !ppc_elf_hash_entry (h)->has_sda_refs
625af618
AM
5978 && !htab->is_vxworks
5979 && !h->def_regular
287c7eaf 5980 && !alias_readonly_dynrelocs (h))
529fe20e 5981 return TRUE;
252b5132 5982
25dbc73a
AM
5983 /* We must allocate the symbol in our .dynbss section, which will
5984 become part of the .bss section of the executable. There will be
5985 an entry for this symbol in the .dynsym section. The dynamic
5986 object will contain position independent code, so all references
5987 from the dynamic object to this symbol will go through the global
5988 offset table. The dynamic linker will use the .dynsym entry to
5989 determine the address it must put in the global offset table, so
5990 both the dynamic object and the regular object will refer to the
5991 same memory location for the variable.
5992
4dc4a9a5
DJ
5993 Of course, if the symbol is referenced using SDAREL relocs, we
5994 must instead allocate it in .sbss. */
4dc4a9a5 5995 if (ppc_elf_hash_entry (h)->has_sda_refs)
25dbc73a 5996 s = htab->dynsbss;
5474d94f
AM
5997 else if ((h->root.u.def.section->flags & SEC_READONLY) != 0)
5998 s = htab->elf.sdynrelro;
25dbc73a 5999 else
9d19e4fd 6000 s = htab->elf.sdynbss;
25dbc73a
AM
6001 BFD_ASSERT (s != NULL);
6002
1d7e9d18 6003 if ((h->root.u.def.section->flags & SEC_ALLOC) != 0 && h->size != 0)
25dbc73a
AM
6004 {
6005 asection *srel;
6006
4a7e5234
AM
6007 /* We must generate a R_PPC_COPY reloc to tell the dynamic
6008 linker to copy the initial value out of the dynamic object
6009 and into the runtime process image. */
4dc4a9a5 6010 if (ppc_elf_hash_entry (h)->has_sda_refs)
25dbc73a 6011 srel = htab->relsbss;
5474d94f
AM
6012 else if ((h->root.u.def.section->flags & SEC_READONLY) != 0)
6013 srel = htab->elf.sreldynrelro;
25dbc73a 6014 else
9d19e4fd 6015 srel = htab->elf.srelbss;
25dbc73a
AM
6016 BFD_ASSERT (srel != NULL);
6017 srel->size += sizeof (Elf32_External_Rela);
6018 h->needs_copy = 1;
6019 }
7619e7c7 6020
529fe20e 6021 /* We no longer want dyn_relocs. */
287c7eaf 6022 ppc_elf_hash_entry (h)->dyn_relocs = NULL;
6cabe1ea 6023 return _bfd_elf_adjust_dynamic_copy (info, h, s);
25dbc73a
AM
6024}
6025\f
ac39eb42
AM
6026/* Generate a symbol to mark plt call stubs. For non-PIC code the sym is
6027 xxxxxxxx.plt_call32.<callee> where xxxxxxxx is a hex number, usually 0,
6028 specifying the addend on the plt relocation. For -fpic code, the sym
6029 is xxxxxxxx.plt_pic32.<callee>, and for -fPIC
6030 xxxxxxxx.got2.plt_pic32.<callee>. */
0ba07910
AM
6031
6032static bfd_boolean
6033add_stub_sym (struct plt_entry *ent,
6034 struct elf_link_hash_entry *h,
ac39eb42 6035 struct bfd_link_info *info)
0ba07910
AM
6036{
6037 struct elf_link_hash_entry *sh;
6038 size_t len1, len2, len3;
6039 char *name;
ac39eb42
AM
6040 const char *stub;
6041 struct ppc_elf_link_hash_table *htab = ppc_elf_hash_table (info);
6042
0e1862bb 6043 if (bfd_link_pic (info))
ac39eb42
AM
6044 stub = ".plt_pic32.";
6045 else
6046 stub = ".plt_call32.";
0ba07910
AM
6047
6048 len1 = strlen (h->root.root.string);
ac39eb42 6049 len2 = strlen (stub);
0ba07910
AM
6050 len3 = 0;
6051 if (ent->sec)
6052 len3 = strlen (ent->sec->name);
ac39eb42 6053 name = bfd_malloc (len1 + len2 + len3 + 9);
0ba07910
AM
6054 if (name == NULL)
6055 return FALSE;
6056 sprintf (name, "%08x", (unsigned) ent->addend & 0xffffffff);
6057 if (ent->sec)
6058 memcpy (name + 8, ent->sec->name, len3);
ac39eb42
AM
6059 memcpy (name + 8 + len3, stub, len2);
6060 memcpy (name + 8 + len3 + len2, h->root.root.string, len1 + 1);
0ba07910
AM
6061 sh = elf_link_hash_lookup (&htab->elf, name, TRUE, FALSE, FALSE);
6062 if (sh == NULL)
6063 return FALSE;
6064 if (sh->root.type == bfd_link_hash_new)
6065 {
6066 sh->root.type = bfd_link_hash_defined;
6067 sh->root.u.def.section = htab->glink;
6068 sh->root.u.def.value = ent->glink_offset;
6069 sh->ref_regular = 1;
6070 sh->def_regular = 1;
6071 sh->ref_regular_nonweak = 1;
6072 sh->forced_local = 1;
6073 sh->non_elf = 0;
2ec55de3 6074 sh->root.linker_def = 1;
0ba07910
AM
6075 }
6076 return TRUE;
6077}
6078
3b36f7e6
AM
6079/* Allocate NEED contiguous space in .got, and return the offset.
6080 Handles allocation of the got header when crossing 32k. */
6081
6082static bfd_vma
6083allocate_got (struct ppc_elf_link_hash_table *htab, unsigned int need)
6084{
6085 bfd_vma where;
4a3dc543 6086 unsigned int max_before_header;
3b36f7e6 6087
4a3dc543 6088 if (htab->plt_type == PLT_VXWORKS)
9d8504b1 6089 {
ce558b89
AM
6090 where = htab->elf.sgot->size;
6091 htab->elf.sgot->size += need;
9d8504b1 6092 }
3b36f7e6
AM
6093 else
6094 {
4a3dc543
RS
6095 max_before_header = htab->plt_type == PLT_NEW ? 32768 : 32764;
6096 if (need <= htab->got_gap)
3b36f7e6 6097 {
4a3dc543
RS
6098 where = max_before_header - htab->got_gap;
6099 htab->got_gap -= need;
6100 }
6101 else
6102 {
ce558b89
AM
6103 if (htab->elf.sgot->size + need > max_before_header
6104 && htab->elf.sgot->size <= max_before_header)
4a3dc543 6105 {
ce558b89
AM
6106 htab->got_gap = max_before_header - htab->elf.sgot->size;
6107 htab->elf.sgot->size = max_before_header + htab->got_header_size;
4a3dc543 6108 }
ce558b89
AM
6109 where = htab->elf.sgot->size;
6110 htab->elf.sgot->size += need;
3b36f7e6 6111 }
3b36f7e6
AM
6112 }
6113 return where;
6114}
6115
f15d0b54
AM
6116/* Calculate size of GOT entries for symbol given its TLS_MASK.
6117 TLS_LD is excluded because those go in a special GOT slot. */
6118
6119static inline unsigned int
6120got_entries_needed (int tls_mask)
6121{
6122 unsigned int need;
6123 if ((tls_mask & TLS_TLS) == 0)
6124 need = 4;
6125 else
6126 {
6127 need = 0;
6128 if ((tls_mask & TLS_GD) != 0)
6129 need += 8;
6130 if ((tls_mask & (TLS_TPREL | TLS_TPRELGD)) != 0)
6131 need += 4;
6132 if ((tls_mask & TLS_DTPREL) != 0)
6133 need += 4;
6134 }
6135 return need;
6136}
6137
6138/* Calculate size of relocs needed for symbol given its TLS_MASK and
6139 NEEDed GOT entries. KNOWN says a TPREL offset can be calculated at
6140 link time. */
6141
6142static inline unsigned int
6143got_relocs_needed (int tls_mask, unsigned int need, bfd_boolean known)
6144{
6145 /* All the entries we allocated need relocs.
6146 Except IE in executable with a local symbol. We could also omit
6147 the DTPREL reloc on the second word of a GD entry under the same
6148 condition as that for IE, but ld.so needs to differentiate
6149 LD and GD entries. */
37da22e5
AM
6150 if (known && (tls_mask & TLS_TLS) != 0
6151 && (tls_mask & (TLS_TPREL | TLS_TPRELGD)) != 0)
f15d0b54
AM
6152 need -= 4;
6153 return need * sizeof (Elf32_External_Rela) / 4;
6154}
6155
46434633 6156/* If H is undefined, make it dynamic if that makes sense. */
f0158f44
AM
6157
6158static bfd_boolean
46434633
AM
6159ensure_undef_dynamic (struct bfd_link_info *info,
6160 struct elf_link_hash_entry *h)
f0158f44
AM
6161{
6162 struct elf_link_hash_table *htab = elf_hash_table (info);
6163
6164 if (htab->dynamic_sections_created
46434633
AM
6165 && ((info->dynamic_undefined_weak != 0
6166 && h->root.type == bfd_link_hash_undefweak)
6167 || h->root.type == bfd_link_hash_undefined)
f0158f44
AM
6168 && h->dynindx == -1
6169 && !h->forced_local
6170 && ELF_ST_VISIBILITY (h->other) == STV_DEFAULT)
6171 return bfd_elf_link_record_dynamic_symbol (info, h);
6172 return TRUE;
6173}
6174
25dbc73a 6175/* Allocate space in associated reloc sections for dynamic relocs. */
252b5132 6176
b34976b6 6177static bfd_boolean
25dbc73a 6178allocate_dynrelocs (struct elf_link_hash_entry *h, void *inf)
252b5132 6179{
25dbc73a
AM
6180 struct bfd_link_info *info = inf;
6181 struct ppc_elf_link_hash_entry *eh;
7619e7c7 6182 struct ppc_elf_link_hash_table *htab;
6061a67d 6183 struct elf_dyn_relocs *p;
f0158f44 6184 bfd_boolean dyn;
252b5132 6185
25dbc73a 6186 if (h->root.type == bfd_link_hash_indirect)
b34976b6 6187 return TRUE;
252b5132 6188
7619e7c7 6189 htab = ppc_elf_hash_table (info);
25dbc73a 6190 eh = (struct ppc_elf_link_hash_entry *) h;
d3e454b9
AM
6191 if (eh->elf.got.refcount > 0
6192 || (ELIMINATE_COPY_RELOCS
6193 && !eh->elf.def_regular
6194 && eh->elf.protected_def
6195 && eh->has_addr16_ha
6196 && eh->has_addr16_lo
6197 && htab->params->pic_fixup > 0))
25dbc73a 6198 {
d6e14abc
AM
6199 unsigned int need;
6200
46434633
AM
6201 /* Make sure this symbol is output as a dynamic symbol. */
6202 if (!ensure_undef_dynamic (info, &eh->elf))
f0158f44 6203 return FALSE;
252b5132 6204
d6e14abc 6205 need = 0;
37da22e5 6206 if ((eh->tls_mask & (TLS_TLS | TLS_LD)) == (TLS_TLS | TLS_LD))
25dbc73a 6207 {
f15d0b54
AM
6208 if (!eh->elf.def_dynamic)
6209 /* We'll just use htab->tlsld_got.offset. This should
6210 always be the case. It's a little odd if we have
6211 a local dynamic reloc against a non-local symbol. */
6212 htab->tlsld_got.refcount += 1;
6213 else
d6e14abc 6214 need += 8;
d6e14abc 6215 }
f15d0b54 6216 need += got_entries_needed (eh->tls_mask);
d6e14abc
AM
6217 if (need == 0)
6218 eh->elf.got.offset = (bfd_vma) -1;
6219 else
6220 {
3b36f7e6 6221 eh->elf.got.offset = allocate_got (htab, need);
0e1862bb 6222 if ((bfd_link_pic (info)
f0158f44
AM
6223 || (htab->elf.dynamic_sections_created
6224 && eh->elf.dynindx != -1
6225 && !SYMBOL_REFERENCES_LOCAL (info, &eh->elf)))
21d68fcd 6226 && !UNDEFWEAK_NO_DYNAMIC_RELOC (info, &eh->elf))
252b5132 6227 {
f15d0b54
AM
6228 asection *rsec;
6229 bfd_boolean tprel_known = (bfd_link_executable (info)
6230 && SYMBOL_REFERENCES_LOCAL (info,
6231 &eh->elf));
6232
6233 need = got_relocs_needed (eh->tls_mask, need, tprel_known);
37da22e5
AM
6234 if ((eh->tls_mask & (TLS_TLS | TLS_LD)) == (TLS_TLS | TLS_LD)
6235 && eh->elf.def_dynamic)
f15d0b54
AM
6236 need -= sizeof (Elf32_External_Rela);
6237 rsec = htab->elf.srelgot;
0bed072f 6238 if (eh->elf.type == STT_GNU_IFUNC)
ce558b89 6239 rsec = htab->elf.irelplt;
f15d0b54 6240 rsec->size += need;
252b5132 6241 }
25dbc73a
AM
6242 }
6243 }
6244 else
6245 eh->elf.got.offset = (bfd_vma) -1;
252b5132 6246
954b63d4
AM
6247 /* If no dynamic sections we can't have dynamic relocs, except for
6248 IFUNCs which are handled even in static executables. */
f0158f44
AM
6249 if (!htab->elf.dynamic_sections_created
6250 && h->type != STT_GNU_IFUNC)
6251 eh->dyn_relocs = NULL;
6252
529fe20e
AM
6253 /* Discard relocs on undefined symbols that must be local. */
6254 else if (h->root.type == bfd_link_hash_undefined
6255 && ELF_ST_VISIBILITY (h->other) != STV_DEFAULT)
6256 eh->dyn_relocs = NULL;
6257
6258 /* Also discard relocs on undefined weak syms with non-default
6259 visibility, or when dynamic_undefined_weak says so. */
6260 else if (UNDEFWEAK_NO_DYNAMIC_RELOC (info, h))
6261 eh->dyn_relocs = NULL;
6262
f0158f44 6263 if (eh->dyn_relocs == NULL)
287c7eaf 6264 ;
252b5132 6265
25dbc73a
AM
6266 /* In the shared -Bsymbolic case, discard space allocated for
6267 dynamic pc-relative relocs against symbols which turn out to be
6268 defined in regular objects. For the normal shared case, discard
6269 space for relocs that have become local due to symbol visibility
6270 changes. */
f0158f44 6271 else if (bfd_link_pic (info))
25dbc73a
AM
6272 {
6273 /* Relocs that use pc_count are those that appear on a call insn,
1d483afe 6274 or certain REL relocs (see must_be_dyn_reloc) that can be
25dbc73a
AM
6275 generated via assembly. We want calls to protected symbols to
6276 resolve directly to the function rather than going via the plt.
6277 If people want function pointer comparisons to work as expected
6278 then they should avoid writing weird assembly. */
529fe20e 6279 if (SYMBOL_CALLS_LOCAL (info, h))
25dbc73a 6280 {
6061a67d 6281 struct elf_dyn_relocs **pp;
25dbc73a
AM
6282
6283 for (pp = &eh->dyn_relocs; (p = *pp) != NULL; )
252b5132 6284 {
25dbc73a
AM
6285 p->count -= p->pc_count;
6286 p->pc_count = 0;
6287 if (p->count == 0)
6288 *pp = p->next;
6289 else
6290 pp = &p->next;
252b5132 6291 }
25dbc73a 6292 }
252b5132 6293
3348747a
NS
6294 if (htab->is_vxworks)
6295 {
6061a67d 6296 struct elf_dyn_relocs **pp;
3348747a
NS
6297
6298 for (pp = &eh->dyn_relocs; (p = *pp) != NULL; )
6299 {
6300 if (strcmp (p->sec->output_section->name, ".tls_vars") == 0)
6301 *pp = p->next;
6302 else
6303 pp = &p->next;
6304 }
6305 }
6306
954b63d4 6307 if (eh->dyn_relocs != NULL)
25dbc73a 6308 {
46434633
AM
6309 /* Make sure this symbol is output as a dynamic symbol. */
6310 if (!ensure_undef_dynamic (info, h))
f0158f44 6311 return FALSE;
25dbc73a
AM
6312 }
6313 }
6314 else if (ELIMINATE_COPY_RELOCS)
6315 {
f0158f44 6316 /* For the non-pic case, discard space for relocs against
25dbc73a
AM
6317 symbols which turn out to need copy relocs or are not
6318 dynamic. */
529fe20e 6319 if (h->dynamic_adjusted
d3e454b9 6320 && !h->def_regular
529fe20e 6321 && !ELF_COMMON_DEF_P (h)
d3e454b9
AM
6322 && !(h->protected_def
6323 && eh->has_addr16_ha
6324 && eh->has_addr16_lo
6325 && htab->params->pic_fixup > 0))
25dbc73a 6326 {
46434633
AM
6327 /* Make sure this symbol is output as a dynamic symbol. */
6328 if (!ensure_undef_dynamic (info, h))
f0158f44 6329 return FALSE;
7619e7c7 6330
f0158f44 6331 if (h->dynindx == -1)
287c7eaf 6332 eh->dyn_relocs = NULL;
25dbc73a 6333 }
f0158f44 6334 else
287c7eaf 6335 eh->dyn_relocs = NULL;
25dbc73a 6336 }
252b5132 6337
f0158f44 6338 /* Allocate space. */
25dbc73a
AM
6339 for (p = eh->dyn_relocs; p != NULL; p = p->next)
6340 {
6341 asection *sreloc = elf_section_data (p->sec)->sreloc;
f95f8542 6342 if (eh->elf.type == STT_GNU_IFUNC)
ce558b89 6343 sreloc = htab->elf.irelplt;
25dbc73a
AM
6344 sreloc->size += p->count * sizeof (Elf32_External_Rela);
6345 }
252b5132 6346
2d7ad24e
AM
6347 /* Handle PLT relocs. Done last, after dynindx has settled.
6348 We might need a PLT entry when the symbol
6349 a) is dynamic, or
6350 b) is an ifunc, or
6351 c) has plt16 relocs and has been processed by adjust_dynamic_symbol, or
6352 d) has plt16 relocs and we are linking statically. */
f0158f44 6353 dyn = htab->elf.dynamic_sections_created && h->dynindx != -1;
2d7ad24e
AM
6354 if (dyn
6355 || h->type == STT_GNU_IFUNC
6356 || (h->needs_plt && h->dynamic_adjusted)
6357 || (h->needs_plt
6358 && h->def_regular
6359 && !htab->elf.dynamic_sections_created
3e04d765 6360 && !htab->can_convert_all_inline_plt
2d7ad24e
AM
6361 && (ppc_elf_hash_entry (h)->tls_mask
6362 & (TLS_TLS | PLT_KEEP)) == PLT_KEEP))
f0158f44
AM
6363 {
6364 struct plt_entry *ent;
6365 bfd_boolean doneone = FALSE;
2d7ad24e 6366 bfd_vma plt_offset = 0, glink_offset = (bfd_vma) -1;
f0158f44
AM
6367
6368 for (ent = h->plt.plist; ent != NULL; ent = ent->next)
6369 if (ent->plt.refcount > 0)
6370 {
6371 asection *s = htab->elf.splt;
6372
6373 if (!dyn)
2d7ad24e
AM
6374 {
6375 if (h->type == STT_GNU_IFUNC)
6376 s = htab->elf.iplt;
6377 else
6378 s = htab->pltlocal;
6379 }
f0158f44
AM
6380
6381 if (htab->plt_type == PLT_NEW || !dyn)
6382 {
6383 if (!doneone)
6384 {
6385 plt_offset = s->size;
6386 s->size += 4;
6387 }
6388 ent->plt.offset = plt_offset;
6389
2d7ad24e
AM
6390 if (s == htab->pltlocal)
6391 ent->glink_offset = glink_offset;
6392 else
f0158f44 6393 {
2d7ad24e
AM
6394 s = htab->glink;
6395 if (!doneone || bfd_link_pic (info))
6396 {
6397 glink_offset = s->size;
6398 s->size += GLINK_ENTRY_SIZE (htab, h);
6399 }
6400 if (!doneone
6401 && !bfd_link_pic (info)
6402 && h->def_dynamic
6403 && !h->def_regular)
6404 {
6405 h->root.u.def.section = s;
6406 h->root.u.def.value = glink_offset;
6407 }
6408 ent->glink_offset = glink_offset;
f0158f44 6409
2d7ad24e
AM
6410 if (htab->params->emit_stub_syms
6411 && !add_stub_sym (ent, h, info))
6412 return FALSE;
6413 }
f0158f44
AM
6414 }
6415 else
6416 {
6417 if (!doneone)
6418 {
6419 /* If this is the first .plt entry, make room
6420 for the special first entry. */
6421 if (s->size == 0)
6422 s->size += htab->plt_initial_entry_size;
6423
6424 /* The PowerPC PLT is actually composed of two
6425 parts, the first part is 2 words (for a load
6426 and a jump), and then there is a remaining
6427 word available at the end. */
6428 plt_offset = (htab->plt_initial_entry_size
6429 + (htab->plt_slot_size
6430 * ((s->size
6431 - htab->plt_initial_entry_size)
6432 / htab->plt_entry_size)));
6433
6434 /* If this symbol is not defined in a regular
6435 file, and we are not generating a shared
6436 library, then set the symbol to this location
6437 in the .plt. This is to avoid text
6438 relocations, and is required to make
6439 function pointers compare as equal between
6440 the normal executable and the shared library. */
6441 if (! bfd_link_pic (info)
6442 && h->def_dynamic
6443 && !h->def_regular)
6444 {
6445 h->root.u.def.section = s;
6446 h->root.u.def.value = plt_offset;
6447 }
6448
6449 /* Make room for this entry. */
6450 s->size += htab->plt_entry_size;
6451 /* After the 8192nd entry, room for two entries
6452 is allocated. */
6453 if (htab->plt_type == PLT_OLD
6454 && (s->size - htab->plt_initial_entry_size)
6455 / htab->plt_entry_size
6456 > PLT_NUM_SINGLE_ENTRIES)
6457 s->size += htab->plt_entry_size;
6458 }
6459 ent->plt.offset = plt_offset;
6460 }
6461
6462 /* We also need to make an entry in the .rela.plt section. */
6463 if (!doneone)
6464 {
6465 if (!dyn)
2d7ad24e
AM
6466 {
6467 if (h->type == STT_GNU_IFUNC)
6468 {
6469 s = htab->elf.irelplt;
6470 s->size += sizeof (Elf32_External_Rela);
6471 }
6472 else if (bfd_link_pic (info))
6473 {
6474 s = htab->relpltlocal;
6475 s->size += sizeof (Elf32_External_Rela);
6476 }
6477 }
f0158f44
AM
6478 else
6479 {
6480 htab->elf.srelplt->size += sizeof (Elf32_External_Rela);
6481
6482 if (htab->plt_type == PLT_VXWORKS)
6483 {
6484 /* Allocate space for the unloaded relocations. */
6485 if (!bfd_link_pic (info)
6486 && htab->elf.dynamic_sections_created)
6487 {
6488 if (ent->plt.offset
6489 == (bfd_vma) htab->plt_initial_entry_size)
6490 {
6491 htab->srelplt2->size
6492 += (sizeof (Elf32_External_Rela)
6493 * VXWORKS_PLTRESOLVE_RELOCS);
6494 }
6495
6496 htab->srelplt2->size
6497 += (sizeof (Elf32_External_Rela)
6498 * VXWORKS_PLT_NON_JMP_SLOT_RELOCS);
6499 }
6500
6501 /* Every PLT entry has an associated GOT entry in
6502 .got.plt. */
6503 htab->elf.sgotplt->size += 4;
6504 }
6505 }
6506 doneone = TRUE;
6507 }
6508 }
6509 else
6510 ent->plt.offset = (bfd_vma) -1;
6511
6512 if (!doneone)
6513 {
6514 h->plt.plist = NULL;
6515 h->needs_plt = 0;
6516 }
6517 }
6518 else
6519 {
6520 h->plt.plist = NULL;
6521 h->needs_plt = 0;
6522 }
6523
25dbc73a
AM
6524 return TRUE;
6525}
7619e7c7 6526
625af618
AM
6527/* Set DF_TEXTREL if we find any dynamic relocs that apply to
6528 read-only sections. */
7619e7c7 6529
25dbc73a 6530static bfd_boolean
0caf6c82 6531maybe_set_textrel (struct elf_link_hash_entry *h, void *info_p)
25dbc73a 6532{
98bbb1b8 6533 asection *sec;
0caf6c82 6534
25dbc73a
AM
6535 if (h->root.type == bfd_link_hash_indirect)
6536 return TRUE;
252b5132 6537
98bbb1b8
AM
6538 sec = readonly_dynrelocs (h);
6539 if (sec != NULL)
25dbc73a 6540 {
98bbb1b8
AM
6541 struct bfd_link_info *info = (struct bfd_link_info *) info_p;
6542
0caf6c82 6543 info->flags |= DF_TEXTREL;
98bbb1b8 6544 info->callbacks->minfo
c1c8c1ef 6545 (_("%pB: dynamic relocation against `%pT' in read-only section `%pA'\n"),
63c1f59d 6546 sec->owner, h->root.root.string, sec);
ee05f2fe 6547
625af618
AM
6548 /* Not an error, just cut short the traversal. */
6549 return FALSE;
25dbc73a
AM
6550 }
6551 return TRUE;
6552}
6553
6177242a
AM
6554static const unsigned char glink_eh_frame_cie[] =
6555{
6556 0, 0, 0, 16, /* length. */
6557 0, 0, 0, 0, /* id. */
6558 1, /* CIE version. */
6559 'z', 'R', 0, /* Augmentation string. */
6560 4, /* Code alignment. */
6561 0x7c, /* Data alignment. */
6562 65, /* RA reg. */
6563 1, /* Augmentation size. */
6564 DW_EH_PE_pcrel | DW_EH_PE_sdata4, /* FDE encoding. */
6565 DW_CFA_def_cfa, 1, 0 /* def_cfa: r1 offset 0. */
6566};
6567
25dbc73a
AM
6568/* Set the sizes of the dynamic sections. */
6569
6570static bfd_boolean
93d1b056 6571ppc_elf_size_dynamic_sections (bfd *output_bfd,
25dbc73a
AM
6572 struct bfd_link_info *info)
6573{
6574 struct ppc_elf_link_hash_table *htab;
6575 asection *s;
6576 bfd_boolean relocs;
6577 bfd *ibfd;
7fce784e 6578
252b5132 6579#ifdef DEBUG
25dbc73a 6580 fprintf (stderr, "ppc_elf_size_dynamic_sections called\n");
252b5132 6581#endif
252b5132 6582
25dbc73a
AM
6583 htab = ppc_elf_hash_table (info);
6584 BFD_ASSERT (htab->elf.dynobj != NULL);
252b5132 6585
25dbc73a
AM
6586 if (elf_hash_table (info)->dynamic_sections_created)
6587 {
6588 /* Set the contents of the .interp section to the interpreter. */
9b8b325a 6589 if (bfd_link_executable (info) && !info->nointerp)
25dbc73a 6590 {
3d4d4302 6591 s = bfd_get_linker_section (htab->elf.dynobj, ".interp");
25dbc73a
AM
6592 BFD_ASSERT (s != NULL);
6593 s->size = sizeof ELF_DYNAMIC_INTERPRETER;
6594 s->contents = (unsigned char *) ELF_DYNAMIC_INTERPRETER;
6595 }
6596 }
252b5132 6597
4a3dc543 6598 if (htab->plt_type == PLT_OLD)
d7128ce4 6599 htab->got_header_size = 16;
4a3dc543 6600 else if (htab->plt_type == PLT_NEW)
d7128ce4 6601 htab->got_header_size = 12;
252b5132 6602
25dbc73a
AM
6603 /* Set up .got offsets for local syms, and space for local dynamic
6604 relocs. */
c72f2fb2 6605 for (ibfd = info->input_bfds; ibfd != NULL; ibfd = ibfd->link.next)
25dbc73a
AM
6606 {
6607 bfd_signed_vma *local_got;
6608 bfd_signed_vma *end_local_got;
e054468f
AM
6609 struct plt_entry **local_plt;
6610 struct plt_entry **end_local_plt;
25dbc73a
AM
6611 char *lgot_masks;
6612 bfd_size_type locsymcount;
6613 Elf_Internal_Shdr *symtab_hdr;
7fce784e 6614
0c8d6e5c 6615 if (!is_ppc_elf (ibfd))
25dbc73a 6616 continue;
7fce784e 6617
25dbc73a
AM
6618 for (s = ibfd->sections; s != NULL; s = s->next)
6619 {
f95f8542 6620 struct ppc_dyn_relocs *p;
252b5132 6621
f95f8542 6622 for (p = ((struct ppc_dyn_relocs *)
25dbc73a
AM
6623 elf_section_data (s)->local_dynrel);
6624 p != NULL;
6625 p = p->next)
6626 {
6627 if (!bfd_is_abs_section (p->sec)
6628 && bfd_is_abs_section (p->sec->output_section))
6629 {
6630 /* Input section has been discarded, either because
6631 it is a copy of a linkonce section or due to
6632 linker script /DISCARD/, so we'll be discarding
6633 the relocs too. */
7fce784e 6634 }
3348747a
NS
6635 else if (htab->is_vxworks
6636 && strcmp (p->sec->output_section->name,
6637 ".tls_vars") == 0)
6638 {
6639 /* Relocations in vxworks .tls_vars sections are
6640 handled specially by the loader. */
6641 }
25dbc73a 6642 else if (p->count != 0)
7fce784e 6643 {
25f23106 6644 asection *sreloc = elf_section_data (p->sec)->sreloc;
f95f8542 6645 if (p->ifunc)
ce558b89 6646 sreloc = htab->elf.irelplt;
25f23106 6647 sreloc->size += p->count * sizeof (Elf32_External_Rela);
25dbc73a
AM
6648 if ((p->sec->output_section->flags
6649 & (SEC_READONLY | SEC_ALLOC))
6650 == (SEC_READONLY | SEC_ALLOC))
0caf6c82
L
6651 {
6652 info->flags |= DF_TEXTREL;
871b3ab2 6653 info->callbacks->minfo (_("%pB: dynamic relocation in read-only section `%pA'\n"),
0caf6c82
L
6654 p->sec->owner, p->sec);
6655 }
7fce784e 6656 }
252b5132 6657 }
252b5132 6658 }
252b5132 6659
25dbc73a
AM
6660 local_got = elf_local_got_refcounts (ibfd);
6661 if (!local_got)
6662 continue;
252b5132 6663
0ffa91dd 6664 symtab_hdr = &elf_symtab_hdr (ibfd);
25dbc73a
AM
6665 locsymcount = symtab_hdr->sh_info;
6666 end_local_got = local_got + locsymcount;
e054468f
AM
6667 local_plt = (struct plt_entry **) end_local_got;
6668 end_local_plt = local_plt + locsymcount;
6669 lgot_masks = (char *) end_local_plt;
91d6fa6a 6670
25dbc73a
AM
6671 for (; local_got < end_local_got; ++local_got, ++lgot_masks)
6672 if (*local_got > 0)
6673 {
f15d0b54 6674 unsigned int need;
37da22e5 6675 if ((*lgot_masks & (TLS_TLS | TLS_LD)) == (TLS_TLS | TLS_LD))
f15d0b54
AM
6676 htab->tlsld_got.refcount += 1;
6677 need = got_entries_needed (*lgot_masks);
d6e14abc
AM
6678 if (need == 0)
6679 *local_got = (bfd_vma) -1;
25dbc73a
AM
6680 else
6681 {
3b36f7e6 6682 *local_got = allocate_got (htab, need);
0e1862bb 6683 if (bfd_link_pic (info))
0bed072f 6684 {
f15d0b54
AM
6685 asection *srel;
6686 bfd_boolean tprel_known = bfd_link_executable (info);
6687
6688 need = got_relocs_needed (*lgot_masks, need, tprel_known);
6689 srel = htab->elf.srelgot;
37da22e5 6690 if ((*lgot_masks & (TLS_TLS | PLT_IFUNC)) == PLT_IFUNC)
ce558b89 6691 srel = htab->elf.irelplt;
f15d0b54 6692 srel->size += need;
0bed072f 6693 }
25dbc73a
AM
6694 }
6695 }
6696 else
6697 *local_got = (bfd_vma) -1;
e054468f
AM
6698
6699 if (htab->is_vxworks)
6700 continue;
6701
6702 /* Allocate space for calls to local STT_GNU_IFUNC syms in .iplt. */
2d7ad24e
AM
6703 lgot_masks = (char *) end_local_plt;
6704 for (; local_plt < end_local_plt; ++local_plt, ++lgot_masks)
e054468f
AM
6705 {
6706 struct plt_entry *ent;
6707 bfd_boolean doneone = FALSE;
2d7ad24e 6708 bfd_vma plt_offset = 0, glink_offset = (bfd_vma) -1;
e054468f
AM
6709
6710 for (ent = *local_plt; ent != NULL; ent = ent->next)
6711 if (ent->plt.refcount > 0)
6712 {
2d7ad24e
AM
6713 if ((*lgot_masks & (TLS_TLS | PLT_IFUNC)) == PLT_IFUNC)
6714 s = htab->elf.iplt;
3e04d765
AM
6715 else if (htab->can_convert_all_inline_plt
6716 || (*lgot_masks & (TLS_TLS | PLT_KEEP)) != PLT_KEEP)
2d7ad24e
AM
6717 {
6718 ent->plt.offset = (bfd_vma) -1;
6719 continue;
6720 }
6721 else
6722 s = htab->pltlocal;
e054468f
AM
6723
6724 if (!doneone)
6725 {
6726 plt_offset = s->size;
6727 s->size += 4;
6728 }
6729 ent->plt.offset = plt_offset;
6730
2d7ad24e 6731 if (s != htab->pltlocal && (!doneone || bfd_link_pic (info)))
e054468f 6732 {
2d7ad24e 6733 s = htab->glink;
e054468f 6734 glink_offset = s->size;
9e390558 6735 s->size += GLINK_ENTRY_SIZE (htab, NULL);
e054468f
AM
6736 }
6737 ent->glink_offset = glink_offset;
6738
6739 if (!doneone)
6740 {
2d7ad24e
AM
6741 if ((*lgot_masks & (TLS_TLS | PLT_IFUNC)) == PLT_IFUNC)
6742 {
6743 s = htab->elf.irelplt;
6744 s->size += sizeof (Elf32_External_Rela);
6745 }
6746 else if (bfd_link_pic (info))
6747 {
6748 s = htab->relpltlocal;
6749 s->size += sizeof (Elf32_External_Rela);
6750 }
e054468f
AM
6751 doneone = TRUE;
6752 }
6753 }
6754 else
6755 ent->plt.offset = (bfd_vma) -1;
6756 }
25dbc73a 6757 }
252b5132 6758
b7fcf6f6
AM
6759 /* Allocate space for global sym dynamic relocs. */
6760 elf_link_hash_traverse (elf_hash_table (info), allocate_dynrelocs, info);
6761
3b36f7e6
AM
6762 if (htab->tlsld_got.refcount > 0)
6763 {
6764 htab->tlsld_got.offset = allocate_got (htab, 8);
0e1862bb 6765 if (bfd_link_pic (info))
ce558b89 6766 htab->elf.srelgot->size += sizeof (Elf32_External_Rela);
3b36f7e6
AM
6767 }
6768 else
6769 htab->tlsld_got.offset = (bfd_vma) -1;
6770
ce558b89 6771 if (htab->elf.sgot != NULL && htab->plt_type != PLT_VXWORKS)
3b36f7e6
AM
6772 {
6773 unsigned int g_o_t = 32768;
6774
4d962050
AM
6775 /* If we haven't allocated the header, do so now. When we get here,
6776 for old plt/got the got size will be 0 to 32764 (not allocated),
6777 or 32780 to 65536 (header allocated). For new plt/got, the
6778 corresponding ranges are 0 to 32768 and 32780 to 65536. */
ce558b89 6779 if (htab->elf.sgot->size <= 32768)
3b36f7e6 6780 {
ce558b89 6781 g_o_t = htab->elf.sgot->size;
4a3dc543 6782 if (htab->plt_type == PLT_OLD)
4d962050 6783 g_o_t += 4;
ce558b89 6784 htab->elf.sgot->size += htab->got_header_size;
3b36f7e6 6785 }
3b36f7e6
AM
6786
6787 htab->elf.hgot->root.u.def.value = g_o_t;
6788 }
0e1862bb 6789 if (bfd_link_pic (info))
bd6c6e2b
AM
6790 {
6791 struct elf_link_hash_entry *sda = htab->sdata[0].sym;
93d1b056
AM
6792
6793 sda->root.u.def.section = htab->elf.hgot->root.u.def.section;
6794 sda->root.u.def.value = htab->elf.hgot->root.u.def.value;
bd6c6e2b 6795 }
15bfcc77
AM
6796 if (info->emitrelocations)
6797 {
6798 struct elf_link_hash_entry *sda = htab->sdata[0].sym;
6799
6800 if (sda != NULL && sda->ref_regular)
6801 sda->root.u.def.section->flags |= SEC_KEEP;
6802 sda = htab->sdata[1].sym;
6803 if (sda != NULL && sda->ref_regular)
6804 sda->root.u.def.section->flags |= SEC_KEEP;
6805 }
3b36f7e6 6806
e054468f
AM
6807 if (htab->glink != NULL
6808 && htab->glink->size != 0
6809 && htab->elf.dynamic_sections_created)
d7128ce4
AM
6810 {
6811 htab->glink_pltresolve = htab->glink->size;
9e390558
AM
6812 /* Space for the branch table. */
6813 htab->glink->size
6814 += htab->elf.srelplt->size / (sizeof (Elf32_External_Rela) / 4) - 4;
86b9da88 6815 /* Pad out to align the start of PLTresolve. */
5446cbdf
AM
6816 htab->glink->size += -htab->glink->size & (htab->params->ppc476_workaround
6817 ? 63 : 15);
d7128ce4 6818 htab->glink->size += GLINK_PLTRESOLVE;
0ba07910 6819
5446cbdf 6820 if (htab->params->emit_stub_syms)
0ba07910
AM
6821 {
6822 struct elf_link_hash_entry *sh;
6823 sh = elf_link_hash_lookup (&htab->elf, "__glink",
6824 TRUE, FALSE, FALSE);
6825 if (sh == NULL)
6826 return FALSE;
6827 if (sh->root.type == bfd_link_hash_new)
6828 {
6829 sh->root.type = bfd_link_hash_defined;
6830 sh->root.u.def.section = htab->glink;
6831 sh->root.u.def.value = htab->glink_pltresolve;
6832 sh->ref_regular = 1;
6833 sh->def_regular = 1;
6834 sh->ref_regular_nonweak = 1;
6835 sh->forced_local = 1;
6836 sh->non_elf = 0;
2ec55de3 6837 sh->root.linker_def = 1;
0ba07910
AM
6838 }
6839 sh = elf_link_hash_lookup (&htab->elf, "__glink_PLTresolve",
6840 TRUE, FALSE, FALSE);
6841 if (sh == NULL)
6842 return FALSE;
6843 if (sh->root.type == bfd_link_hash_new)
6844 {
6845 sh->root.type = bfd_link_hash_defined;
6846 sh->root.u.def.section = htab->glink;
6847 sh->root.u.def.value = htab->glink->size - GLINK_PLTRESOLVE;
6848 sh->ref_regular = 1;
6849 sh->def_regular = 1;
6850 sh->ref_regular_nonweak = 1;
6851 sh->forced_local = 1;
6852 sh->non_elf = 0;
2ec55de3 6853 sh->root.linker_def = 1;
0ba07910
AM
6854 }
6855 }
d7128ce4
AM
6856 }
6857
6177242a
AM
6858 if (htab->glink != NULL
6859 && htab->glink->size != 0
6860 && htab->glink_eh_frame != NULL
9a2a56cc
AM
6861 && !bfd_is_abs_section (htab->glink_eh_frame->output_section)
6862 && _bfd_elf_eh_frame_present (info))
6177242a
AM
6863 {
6864 s = htab->glink_eh_frame;
6865 s->size = sizeof (glink_eh_frame_cie) + 20;
0e1862bb 6866 if (bfd_link_pic (info))
6177242a
AM
6867 {
6868 s->size += 4;
6869 if (htab->glink->size - GLINK_PLTRESOLVE + 8 >= 256)
6870 s->size += 4;
6871 }
6872 }
6873
25dbc73a
AM
6874 /* We've now determined the sizes of the various dynamic sections.
6875 Allocate memory for them. */
6876 relocs = FALSE;
6877 for (s = htab->elf.dynobj->sections; s != NULL; s = s->next)
252b5132 6878 {
9d8504b1
PB
6879 bfd_boolean strip_section = TRUE;
6880
25dbc73a
AM
6881 if ((s->flags & SEC_LINKER_CREATED) == 0)
6882 continue;
252b5132 6883
ce558b89
AM
6884 if (s == htab->elf.splt
6885 || s == htab->elf.sgot)
25dbc73a 6886 {
9d8504b1
PB
6887 /* We'd like to strip these sections if they aren't needed, but if
6888 we've exported dynamic symbols from them we must leave them.
6889 It's too late to tell BFD to get rid of the symbols. */
e054468f 6890 if (htab->elf.hplt != NULL)
9d8504b1 6891 strip_section = FALSE;
25dbc73a
AM
6892 /* Strip this section if we don't need it; see the
6893 comment below. */
6894 }
ce558b89 6895 else if (s == htab->elf.iplt
2d7ad24e 6896 || s == htab->pltlocal
e054468f 6897 || s == htab->glink
6177242a 6898 || s == htab->glink_eh_frame
ce558b89 6899 || s == htab->elf.sgotplt
e054468f 6900 || s == htab->sbss
9d19e4fd 6901 || s == htab->elf.sdynbss
5474d94f 6902 || s == htab->elf.sdynrelro
15bfcc77 6903 || s == htab->dynsbss)
25dbc73a 6904 {
c9a2f333 6905 /* Strip these too. */
25dbc73a 6906 }
15bfcc77
AM
6907 else if (s == htab->sdata[0].section
6908 || s == htab->sdata[1].section)
6909 {
6910 strip_section = (s->flags & SEC_KEEP) == 0;
6911 }
a0f49396
NC
6912 else if (CONST_STRNEQ (bfd_get_section_name (htab->elf.dynobj, s),
6913 ".rela"))
25dbc73a 6914 {
c456f082 6915 if (s->size != 0)
25dbc73a
AM
6916 {
6917 /* Remember whether there are any relocation sections. */
6918 relocs = TRUE;
252b5132 6919
25dbc73a
AM
6920 /* We use the reloc_count field as a counter if we need
6921 to copy relocs into the output file. */
6922 s->reloc_count = 0;
252b5132
RH
6923 }
6924 }
25dbc73a
AM
6925 else
6926 {
6927 /* It's not one of our sections, so don't allocate space. */
6928 continue;
6929 }
252b5132 6930
9d8504b1 6931 if (s->size == 0 && strip_section)
25dbc73a 6932 {
c456f082
AM
6933 /* If we don't need this section, strip it from the
6934 output file. This is mostly to handle .rela.bss and
6935 .rela.plt. We must create both sections in
6936 create_dynamic_sections, because they must be created
6937 before the linker maps input sections to output
6938 sections. The linker does that before
6939 adjust_dynamic_symbol is called, and it is that
6940 function which decides whether anything needs to go
6941 into these sections. */
8423293d 6942 s->flags |= SEC_EXCLUDE;
25dbc73a
AM
6943 continue;
6944 }
7fce784e 6945
d7128ce4 6946 if ((s->flags & SEC_HAS_CONTENTS) == 0)
644285ef
AM
6947 continue;
6948
25dbc73a
AM
6949 /* Allocate memory for the section contents. */
6950 s->contents = bfd_zalloc (htab->elf.dynobj, s->size);
6951 if (s->contents == NULL)
6952 return FALSE;
6953 }
252b5132 6954
25dbc73a 6955 if (htab->elf.dynamic_sections_created)
7619e7c7 6956 {
25dbc73a
AM
6957 /* Add some entries to the .dynamic section. We fill in the
6958 values later, in ppc_elf_finish_dynamic_sections, but we
6959 must add the entries now so that we get the correct size for
6960 the .dynamic section. The DT_DEBUG entry is filled in by the
6961 dynamic linker and used by the debugger. */
6962#define add_dynamic_entry(TAG, VAL) \
6963 _bfd_elf_add_dynamic_entry (info, TAG, VAL)
252b5132 6964
0e1862bb 6965 if (bfd_link_executable (info))
7619e7c7 6966 {
25dbc73a
AM
6967 if (!add_dynamic_entry (DT_DEBUG, 0))
6968 return FALSE;
7619e7c7
AM
6969 }
6970
ce558b89 6971 if (htab->elf.splt != NULL && htab->elf.splt->size != 0)
7619e7c7 6972 {
25dbc73a
AM
6973 if (!add_dynamic_entry (DT_PLTGOT, 0)
6974 || !add_dynamic_entry (DT_PLTRELSZ, 0)
6975 || !add_dynamic_entry (DT_PLTREL, DT_RELA)
6976 || !add_dynamic_entry (DT_JMPREL, 0))
6977 return FALSE;
6978 }
7619e7c7 6979
c7e17e05
AM
6980 if (htab->plt_type == PLT_NEW
6981 && htab->glink != NULL
6982 && htab->glink->size != 0)
d7128ce4 6983 {
1fe44d79 6984 if (!add_dynamic_entry (DT_PPC_GOT, 0))
d7128ce4 6985 return FALSE;
5446cbdf 6986 if (!htab->params->no_tls_get_addr_opt
a7f2871e
AM
6987 && htab->tls_get_addr != NULL
6988 && htab->tls_get_addr->plt.plist != NULL
e8910a83 6989 && !add_dynamic_entry (DT_PPC_OPT, PPC_OPT_TLS))
a7f2871e 6990 return FALSE;
d7128ce4
AM
6991 }
6992
25dbc73a
AM
6993 if (relocs)
6994 {
6995 if (!add_dynamic_entry (DT_RELA, 0)
6996 || !add_dynamic_entry (DT_RELASZ, 0)
6997 || !add_dynamic_entry (DT_RELAENT, sizeof (Elf32_External_Rela)))
6998 return FALSE;
6999 }
7619e7c7 7000
25dbc73a
AM
7001 /* If any dynamic relocs apply to a read-only section, then we
7002 need a DT_TEXTREL entry. */
7003 if ((info->flags & DF_TEXTREL) == 0)
625af618 7004 elf_link_hash_traverse (elf_hash_table (info), maybe_set_textrel,
25dbc73a 7005 info);
7619e7c7 7006
25dbc73a
AM
7007 if ((info->flags & DF_TEXTREL) != 0)
7008 {
7009 if (!add_dynamic_entry (DT_TEXTREL, 0))
7010 return FALSE;
7619e7c7 7011 }
7a2b07ff
NS
7012 if (htab->is_vxworks
7013 && !elf_vxworks_add_dynamic_entries (output_bfd, info))
7014 return FALSE;
7015 }
25dbc73a
AM
7016#undef add_dynamic_entry
7017
7e01508c
AM
7018 if (htab->glink_eh_frame != NULL
7019 && htab->glink_eh_frame->contents != NULL)
7020 {
7021 unsigned char *p = htab->glink_eh_frame->contents;
7022 bfd_vma val;
7023
7024 memcpy (p, glink_eh_frame_cie, sizeof (glink_eh_frame_cie));
7025 /* CIE length (rewrite in case little-endian). */
7026 bfd_put_32 (htab->elf.dynobj, sizeof (glink_eh_frame_cie) - 4, p);
7027 p += sizeof (glink_eh_frame_cie);
7028 /* FDE length. */
7029 val = htab->glink_eh_frame->size - 4 - sizeof (glink_eh_frame_cie);
7030 bfd_put_32 (htab->elf.dynobj, val, p);
7031 p += 4;
7032 /* CIE pointer. */
7033 val = p - htab->glink_eh_frame->contents;
7034 bfd_put_32 (htab->elf.dynobj, val, p);
7035 p += 4;
7036 /* Offset to .glink. Set later. */
7037 p += 4;
7038 /* .glink size. */
7039 bfd_put_32 (htab->elf.dynobj, htab->glink->size, p);
7040 p += 4;
7041 /* Augmentation. */
7042 p += 1;
7043
0e1862bb 7044 if (bfd_link_pic (info)
7e01508c
AM
7045 && htab->elf.dynamic_sections_created)
7046 {
7047 bfd_vma adv = (htab->glink->size - GLINK_PLTRESOLVE + 8) >> 2;
7048 if (adv < 64)
7049 *p++ = DW_CFA_advance_loc + adv;
7050 else if (adv < 256)
7051 {
7052 *p++ = DW_CFA_advance_loc1;
7053 *p++ = adv;
7054 }
7055 else if (adv < 65536)
7056 {
7057 *p++ = DW_CFA_advance_loc2;
7058 bfd_put_16 (htab->elf.dynobj, adv, p);
7059 p += 2;
7060 }
7061 else
7062 {
7063 *p++ = DW_CFA_advance_loc4;
7064 bfd_put_32 (htab->elf.dynobj, adv, p);
7065 p += 4;
7066 }
7067 *p++ = DW_CFA_register;
7068 *p++ = 65;
7069 p++;
7070 *p++ = DW_CFA_advance_loc + 4;
7071 *p++ = DW_CFA_restore_extended;
7072 *p++ = 65;
7073 }
7074 BFD_ASSERT ((bfd_vma) ((p + 3 - htab->glink_eh_frame->contents) & -4)
7075 == htab->glink_eh_frame->size);
7076 }
7077
7619e7c7
AM
7078 return TRUE;
7079}
0eb4a168 7080
93d1b056
AM
7081/* Arrange to have _SDA_BASE_ or _SDA2_BASE_ stripped from the output
7082 if it looks like nothing is using them. */
7083
7084static void
7085maybe_strip_sdasym (bfd *output_bfd, elf_linker_section_t *lsect)
7086{
7087 struct elf_link_hash_entry *sda = lsect->sym;
7088
7089 if (sda != NULL && !sda->ref_regular && sda->dynindx == -1)
7090 {
7091 asection *s;
7092
7093 s = bfd_get_section_by_name (output_bfd, lsect->name);
7094 if (s == NULL || bfd_section_removed_from_list (output_bfd, s))
7095 {
7096 s = bfd_get_section_by_name (output_bfd, lsect->bss_name);
7097 if (s == NULL || bfd_section_removed_from_list (output_bfd, s))
7098 {
7099 sda->def_regular = 0;
7100 /* This is somewhat magic. See elf_link_output_extsym. */
7101 sda->ref_dynamic = 1;
7102 sda->forced_local = 0;
7103 }
7104 }
7105 }
7106}
7107
7108void
7109ppc_elf_maybe_strip_sdata_syms (struct bfd_link_info *info)
7110{
7111 struct ppc_elf_link_hash_table *htab = ppc_elf_hash_table (info);
7112
7113 if (htab != NULL)
7114 {
7115 maybe_strip_sdasym (info->output_bfd, &htab->sdata[0]);
7116 maybe_strip_sdasym (info->output_bfd, &htab->sdata[1]);
7117 }
7118}
7119
7120
0eb4a168
AM
7121/* Return TRUE if symbol should be hashed in the `.gnu.hash' section. */
7122
7123static bfd_boolean
7124ppc_elf_hash_symbol (struct elf_link_hash_entry *h)
7125{
7126 if (h->plt.plist != NULL
7127 && !h->def_regular
7128 && (!h->pointer_equality_needed
7129 || !h->ref_regular_nonweak))
7130 return FALSE;
7131
7132 return _bfd_elf_hash_symbol (h);
7133}
25dbc73a
AM
7134\f
7135#define ARRAY_SIZE(a) (sizeof (a) / sizeof ((a)[0]))
7136
01017ef8
NS
7137/* Relaxation trampolines. r12 is available for clobbering (r11, is
7138 used for some functions that are allowed to break the ABI). */
25dbc73a
AM
7139static const int shared_stub_entry[] =
7140 {
7141 0x7c0802a6, /* mflr 0 */
7142 0x429f0005, /* bcl 20, 31, .Lxxx */
01017ef8
NS
7143 0x7d8802a6, /* mflr 12 */
7144 0x3d8c0000, /* addis 12, 12, (xxx-.Lxxx)@ha */
53291d1f 7145 0x398c0000, /* addi 12, 12, (xxx-.Lxxx)@l */
25dbc73a 7146 0x7c0803a6, /* mtlr 0 */
01017ef8 7147 0x7d8903a6, /* mtctr 12 */
25dbc73a
AM
7148 0x4e800420, /* bctr */
7149 };
7150
7151static const int stub_entry[] =
7152 {
01017ef8
NS
7153 0x3d800000, /* lis 12,xxx@ha */
7154 0x398c0000, /* addi 12,12,xxx@l */
7155 0x7d8903a6, /* mtctr 12 */
25dbc73a
AM
7156 0x4e800420, /* bctr */
7157 };
7158
5446cbdf
AM
7159struct ppc_elf_relax_info
7160{
7161 unsigned int workaround_size;
d3e454b9 7162 unsigned int picfixup_size;
5446cbdf
AM
7163};
7164
7165/* This function implements long branch trampolines, and the ppc476
7166 icache bug workaround. Any section needing trampolines or patch
7167 space for the workaround has its size extended so that we can
53291d1f 7168 add trampolines at the end of the section. */
5446cbdf 7169
25dbc73a
AM
7170static bfd_boolean
7171ppc_elf_relax_section (bfd *abfd,
7172 asection *isec,
7173 struct bfd_link_info *link_info,
7174 bfd_boolean *again)
7175{
d3e454b9 7176 struct one_branch_fixup
25dbc73a 7177 {
d3e454b9 7178 struct one_branch_fixup *next;
25dbc73a 7179 asection *tsec;
01017ef8
NS
7180 /* Final link, can use the symbol offset. For a
7181 relocatable link we use the symbol's index. */
25dbc73a
AM
7182 bfd_vma toff;
7183 bfd_vma trampoff;
7184 };
7619e7c7 7185
25dbc73a
AM
7186 Elf_Internal_Shdr *symtab_hdr;
7187 bfd_byte *contents = NULL;
7188 Elf_Internal_Sym *isymbuf = NULL;
7189 Elf_Internal_Rela *internal_relocs = NULL;
5446cbdf 7190 Elf_Internal_Rela *irel, *irelend = NULL;
d3e454b9 7191 struct one_branch_fixup *branch_fixups = NULL;
5446cbdf 7192 struct ppc_elf_relax_info *relax_info = NULL;
9bc4e62b 7193 unsigned changes = 0;
5446cbdf 7194 bfd_boolean workaround_change;
d7128ce4 7195 struct ppc_elf_link_hash_table *htab;
d3e454b9 7196 bfd_size_type trampbase, trampoff, newsize, picfixup_size;
a6aa5195 7197 asection *got2;
50248c89 7198 bfd_boolean maybe_pasted;
7619e7c7 7199
25dbc73a 7200 *again = FALSE;
7619e7c7 7201
5446cbdf 7202 /* No need to do anything with non-alloc or non-code sections. */
c87b5a93 7203 if ((isec->flags & SEC_ALLOC) == 0
a8ad78a7 7204 || (isec->flags & SEC_CODE) == 0
5446cbdf
AM
7205 || (isec->flags & SEC_LINKER_CREATED) != 0
7206 || isec->size < 4)
25dbc73a 7207 return TRUE;
7619e7c7 7208
c8a1f254
NS
7209 /* We cannot represent the required PIC relocs in the output, so don't
7210 do anything. The linker doesn't support mixing -shared and -r
7211 anyway. */
0e1862bb 7212 if (bfd_link_relocatable (link_info) && bfd_link_pic (link_info))
795bc6b3 7213 return TRUE;
5b914448 7214
5446cbdf
AM
7215 htab = ppc_elf_hash_table (link_info);
7216 if (htab == NULL)
7217 return TRUE;
7218
7219 isec->size = (isec->size + 3) & -4;
7220 if (isec->rawsize == 0)
7221 isec->rawsize = isec->size;
7222 trampbase = isec->size;
7223
53291d1f
AM
7224 BFD_ASSERT (isec->sec_info_type == SEC_INFO_TYPE_NONE
7225 || isec->sec_info_type == SEC_INFO_TYPE_TARGET);
7226 isec->sec_info_type = SEC_INFO_TYPE_TARGET;
7227
d3e454b9
AM
7228 if (htab->params->ppc476_workaround
7229 || htab->params->pic_fixup > 0)
5446cbdf
AM
7230 {
7231 if (elf_section_data (isec)->sec_info == NULL)
7232 {
5446cbdf
AM
7233 elf_section_data (isec)->sec_info
7234 = bfd_zalloc (abfd, sizeof (struct ppc_elf_relax_info));
7235 if (elf_section_data (isec)->sec_info == NULL)
7236 return FALSE;
7237 }
7238 relax_info = elf_section_data (isec)->sec_info;
7239 trampbase -= relax_info->workaround_size;
7240 }
7241
50248c89
AM
7242 maybe_pasted = (strcmp (isec->output_section->name, ".init") == 0
7243 || strcmp (isec->output_section->name, ".fini") == 0);
25dbc73a 7244 /* Space for a branch around any trampolines. */
5446cbdf
AM
7245 trampoff = trampbase;
7246 if (maybe_pasted && trampbase == isec->rawsize)
50248c89 7247 trampoff += 4;
7619e7c7 7248
0ffa91dd 7249 symtab_hdr = &elf_symtab_hdr (abfd);
d3e454b9
AM
7250 picfixup_size = 0;
7251 if (htab->params->branch_trampolines
7252 || htab->params->pic_fixup > 0)
7619e7c7 7253 {
5446cbdf
AM
7254 /* Get a copy of the native relocations. */
7255 if (isec->reloc_count != 0)
25dbc73a 7256 {
5446cbdf
AM
7257 internal_relocs = _bfd_elf_link_read_relocs (abfd, isec, NULL, NULL,
7258 link_info->keep_memory);
7259 if (internal_relocs == NULL)
7260 goto error_return;
25dbc73a 7261 }
7619e7c7 7262
5446cbdf
AM
7263 got2 = bfd_get_section_by_name (abfd, ".got2");
7264
7265 irelend = internal_relocs + isec->reloc_count;
7266 for (irel = internal_relocs; irel < irelend; irel++)
25dbc73a 7267 {
5446cbdf
AM
7268 unsigned long r_type = ELF32_R_TYPE (irel->r_info);
7269 bfd_vma toff, roff;
7270 asection *tsec;
d3e454b9 7271 struct one_branch_fixup *f;
5446cbdf 7272 size_t insn_offset = 0;
d3e454b9 7273 bfd_vma max_branch_offset = 0, val;
5446cbdf
AM
7274 bfd_byte *hit_addr;
7275 unsigned long t0;
7276 struct elf_link_hash_entry *h;
49c09209 7277 Elf_Internal_Sym *isym;
5446cbdf
AM
7278 struct plt_entry **plist;
7279 unsigned char sym_type;
7280
7281 switch (r_type)
7282 {
7283 case R_PPC_REL24:
7284 case R_PPC_LOCAL24PC:
7285 case R_PPC_PLTREL24:
23cedd1d 7286 case R_PPC_PLTCALL:
5446cbdf
AM
7287 max_branch_offset = 1 << 25;
7288 break;
7289
7290 case R_PPC_REL14:
7291 case R_PPC_REL14_BRTAKEN:
7292 case R_PPC_REL14_BRNTAKEN:
7293 max_branch_offset = 1 << 15;
7294 break;
7fce784e 7295
d3e454b9
AM
7296 case R_PPC_ADDR16_HA:
7297 if (htab->params->pic_fixup > 0)
7298 break;
7299 continue;
7300
5446cbdf
AM
7301 default:
7302 continue;
7303 }
7304
7305 /* Get the value of the symbol referred to by the reloc. */
49c09209
AM
7306 if (!get_sym_h (&h, &isym, &tsec, NULL, &isymbuf,
7307 ELF32_R_SYM (irel->r_info), abfd))
7308 goto error_return;
5446cbdf 7309
49c09209
AM
7310 if (isym != NULL)
7311 {
7312 if (tsec != NULL)
7313 ;
7314 else if (isym->st_shndx == SHN_UNDEF)
5446cbdf
AM
7315 tsec = bfd_und_section_ptr;
7316 else if (isym->st_shndx == SHN_ABS)
7317 tsec = bfd_abs_section_ptr;
7318 else if (isym->st_shndx == SHN_COMMON)
7319 tsec = bfd_com_section_ptr;
5446cbdf
AM
7320
7321 toff = isym->st_value;
7322 sym_type = ELF_ST_TYPE (isym->st_info);
25dbc73a 7323 }
25dbc73a 7324 else
5446cbdf 7325 {
49c09209
AM
7326 if (tsec != NULL)
7327 toff = h->root.u.def.value;
5446cbdf
AM
7328 else if (h->root.type == bfd_link_hash_undefined
7329 || h->root.type == bfd_link_hash_undefweak)
7330 {
49c09209
AM
7331 unsigned long indx;
7332
7333 indx = ELF32_R_SYM (irel->r_info) - symtab_hdr->sh_info;
5446cbdf 7334 tsec = bfd_und_section_ptr;
0e1862bb 7335 toff = bfd_link_relocatable (link_info) ? indx : 0;
5446cbdf
AM
7336 }
7337 else
7338 continue;
7339
9f7552cf
AM
7340 /* If this branch is to __tls_get_addr then we may later
7341 optimise away the call. We won't be needing a long-
7342 branch stub in that case. */
0e1862bb 7343 if (bfd_link_executable (link_info)
9f7552cf
AM
7344 && h == htab->tls_get_addr
7345 && irel != internal_relocs)
7346 {
7347 unsigned long t_symndx = ELF32_R_SYM (irel[-1].r_info);
7348 unsigned long t_rtype = ELF32_R_TYPE (irel[-1].r_info);
7349 unsigned int tls_mask = 0;
7350
7351 /* The previous reloc should be one of R_PPC_TLSGD or
7352 R_PPC_TLSLD, or for older object files, a reloc
7353 on the __tls_get_addr arg setup insn. Get tls
7354 mask bits from the symbol on that reloc. */
7355 if (t_symndx < symtab_hdr->sh_info)
7356 {
7357 bfd_vma *local_got_offsets = elf_local_got_offsets (abfd);
7358
7359 if (local_got_offsets != NULL)
7360 {
7361 struct plt_entry **local_plt = (struct plt_entry **)
7362 (local_got_offsets + symtab_hdr->sh_info);
7363 char *lgot_masks = (char *)
7364 (local_plt + symtab_hdr->sh_info);
7365 tls_mask = lgot_masks[t_symndx];
7366 }
7367 }
7368 else
7369 {
7370 struct elf_link_hash_entry *th
7371 = elf_sym_hashes (abfd)[t_symndx - symtab_hdr->sh_info];
7372
7373 while (th->root.type == bfd_link_hash_indirect
7374 || th->root.type == bfd_link_hash_warning)
7375 th = (struct elf_link_hash_entry *) th->root.u.i.link;
7376
7377 tls_mask
7378 = ((struct ppc_elf_link_hash_entry *) th)->tls_mask;
7379 }
7380
7381 /* The mask bits tell us if the call will be
7382 optimised away. */
7383 if ((tls_mask & TLS_TLS) != 0 && (tls_mask & TLS_GD) == 0
7384 && (t_rtype == R_PPC_TLSGD
7385 || t_rtype == R_PPC_GOT_TLSGD16
7386 || t_rtype == R_PPC_GOT_TLSGD16_LO))
7387 continue;
7388 if ((tls_mask & TLS_TLS) != 0 && (tls_mask & TLS_LD) == 0
7389 && (t_rtype == R_PPC_TLSLD
7390 || t_rtype == R_PPC_GOT_TLSLD16
7391 || t_rtype == R_PPC_GOT_TLSLD16_LO))
7392 continue;
7393 }
7394
5446cbdf
AM
7395 sym_type = h->type;
7396 }
7619e7c7 7397
d3e454b9
AM
7398 if (r_type == R_PPC_ADDR16_HA)
7399 {
7400 if (h != NULL
7401 && !h->def_regular
7402 && h->protected_def
7403 && ppc_elf_hash_entry (h)->has_addr16_ha
7404 && ppc_elf_hash_entry (h)->has_addr16_lo)
7405 picfixup_size += 12;
7406 continue;
7407 }
7408
5446cbdf
AM
7409 /* The condition here under which we call find_plt_ent must
7410 match that in relocate_section. If we call find_plt_ent here
7411 but not in relocate_section, or vice versa, then the branch
7412 destination used here may be incorrect. */
7413 plist = NULL;
7414 if (h != NULL)
25dbc73a 7415 {
5446cbdf
AM
7416 /* We know is_branch_reloc (r_type) is true. */
7417 if (h->type == STT_GNU_IFUNC
7418 || r_type == R_PPC_PLTREL24)
7419 plist = &h->plt.plist;
25dbc73a 7420 }
5446cbdf
AM
7421 else if (sym_type == STT_GNU_IFUNC
7422 && elf_local_got_offsets (abfd) != NULL)
c8a1f254 7423 {
5446cbdf
AM
7424 bfd_vma *local_got_offsets = elf_local_got_offsets (abfd);
7425 struct plt_entry **local_plt = (struct plt_entry **)
7426 (local_got_offsets + symtab_hdr->sh_info);
7427 plist = local_plt + ELF32_R_SYM (irel->r_info);
c8a1f254 7428 }
5446cbdf 7429 if (plist != NULL)
a9585d22 7430 {
5446cbdf
AM
7431 bfd_vma addend = 0;
7432 struct plt_entry *ent;
7433
0e1862bb 7434 if (r_type == R_PPC_PLTREL24 && bfd_link_pic (link_info))
5446cbdf
AM
7435 addend = irel->r_addend;
7436 ent = find_plt_ent (plist, got2, addend);
7437 if (ent != NULL)
a9585d22 7438 {
5446cbdf
AM
7439 if (htab->plt_type == PLT_NEW
7440 || h == NULL
7441 || !htab->elf.dynamic_sections_created
7442 || h->dynindx == -1)
7443 {
7444 tsec = htab->glink;
7445 toff = ent->glink_offset;
7446 }
7447 else
7448 {
ce558b89 7449 tsec = htab->elf.splt;
5446cbdf
AM
7450 toff = ent->plt.offset;
7451 }
de972ffa
AM
7452 }
7453 }
de972ffa 7454
5446cbdf
AM
7455 /* If the branch and target are in the same section, you have
7456 no hope of adding stubs. We'll error out later should the
7457 branch overflow. */
7458 if (tsec == isec)
7459 continue;
25dbc73a 7460
5446cbdf
AM
7461 /* There probably isn't any reason to handle symbols in
7462 SEC_MERGE sections; SEC_MERGE doesn't seem a likely
7463 attribute for a code section, and we are only looking at
7464 branches. However, implement it correctly here as a
7465 reference for other target relax_section functions. */
7466 if (0 && tsec->sec_info_type == SEC_INFO_TYPE_MERGE)
7467 {
7468 /* At this stage in linking, no SEC_MERGE symbol has been
7469 adjusted, so all references to such symbols need to be
7470 passed through _bfd_merged_section_offset. (Later, in
7471 relocate_section, all SEC_MERGE symbols *except* for
7472 section symbols have been adjusted.)
7473
7474 gas may reduce relocations against symbols in SEC_MERGE
7475 sections to a relocation against the section symbol when
7476 the original addend was zero. When the reloc is against
7477 a section symbol we should include the addend in the
7478 offset passed to _bfd_merged_section_offset, since the
7479 location of interest is the original symbol. On the
7480 other hand, an access to "sym+addend" where "sym" is not
7481 a section symbol should not include the addend; Such an
7482 access is presumed to be an offset from "sym"; The
7483 location of interest is just "sym". */
7484 if (sym_type == STT_SECTION)
7485 toff += irel->r_addend;
7486
7487 toff
7488 = _bfd_merged_section_offset (abfd, &tsec,
7489 elf_section_data (tsec)->sec_info,
7490 toff);
7491
7492 if (sym_type != STT_SECTION)
7493 toff += irel->r_addend;
7494 }
7495 /* PLTREL24 addends are special. */
7496 else if (r_type != R_PPC_PLTREL24)
25dbc73a 7497 toff += irel->r_addend;
7619e7c7 7498
5446cbdf 7499 /* Attempted -shared link of non-pic code loses. */
0e1862bb 7500 if ((!bfd_link_relocatable (link_info)
5446cbdf
AM
7501 && tsec == bfd_und_section_ptr)
7502 || tsec->output_section == NULL
7503 || (tsec->owner != NULL
7504 && (tsec->owner->flags & BFD_PLUGIN) != 0))
7505 continue;
7619e7c7 7506
5446cbdf 7507 roff = irel->r_offset;
7de713b9 7508
5446cbdf
AM
7509 /* If the branch is in range, no need to do anything. */
7510 if (tsec != bfd_und_section_ptr
0e1862bb 7511 && (!bfd_link_relocatable (link_info)
5446cbdf
AM
7512 /* A relocatable link may have sections moved during
7513 final link, so do not presume they remain in range. */
7514 || tsec->output_section == isec->output_section))
7515 {
7516 bfd_vma symaddr, reladdr;
7619e7c7 7517
5446cbdf
AM
7518 symaddr = tsec->output_section->vma + tsec->output_offset + toff;
7519 reladdr = isec->output_section->vma + isec->output_offset + roff;
7520 if (symaddr - reladdr + max_branch_offset
7521 < 2 * max_branch_offset)
7522 continue;
7523 }
01017ef8 7524
5446cbdf 7525 /* Look for an existing fixup to this address. */
d3e454b9 7526 for (f = branch_fixups; f ; f = f->next)
5446cbdf
AM
7527 if (f->tsec == tsec && f->toff == toff)
7528 break;
252b5132 7529
5446cbdf
AM
7530 if (f == NULL)
7531 {
7532 size_t size;
7533 unsigned long stub_rtype;
25dbc73a 7534
5446cbdf
AM
7535 val = trampoff - roff;
7536 if (val >= max_branch_offset)
7537 /* Oh dear, we can't reach a trampoline. Don't try to add
7538 one. We'll report an error later. */
7539 continue;
252b5132 7540
0e1862bb 7541 if (bfd_link_pic (link_info))
5446cbdf
AM
7542 {
7543 size = 4 * ARRAY_SIZE (shared_stub_entry);
7544 insn_offset = 12;
7545 }
7546 else
7547 {
7548 size = 4 * ARRAY_SIZE (stub_entry);
7549 insn_offset = 0;
7550 }
7551 stub_rtype = R_PPC_RELAX;
ce558b89 7552 if (tsec == htab->elf.splt
5446cbdf
AM
7553 || tsec == htab->glink)
7554 {
7555 stub_rtype = R_PPC_RELAX_PLT;
7556 if (r_type == R_PPC_PLTREL24)
7557 stub_rtype = R_PPC_RELAX_PLTREL24;
7558 }
252b5132 7559
5446cbdf
AM
7560 /* Hijack the old relocation. Since we need two
7561 relocations for this use a "composite" reloc. */
7562 irel->r_info = ELF32_R_INFO (ELF32_R_SYM (irel->r_info),
7563 stub_rtype);
7564 irel->r_offset = trampoff + insn_offset;
7565 if (r_type == R_PPC_PLTREL24
7566 && stub_rtype != R_PPC_RELAX_PLTREL24)
7567 irel->r_addend = 0;
7568
7569 /* Record the fixup so we don't do it again this section. */
7570 f = bfd_malloc (sizeof (*f));
d3e454b9 7571 f->next = branch_fixups;
5446cbdf
AM
7572 f->tsec = tsec;
7573 f->toff = toff;
7574 f->trampoff = trampoff;
d3e454b9 7575 branch_fixups = f;
5446cbdf
AM
7576
7577 trampoff += size;
7578 changes++;
25dbc73a
AM
7579 }
7580 else
7581 {
5446cbdf
AM
7582 val = f->trampoff - roff;
7583 if (val >= max_branch_offset)
7584 continue;
252b5132 7585
5446cbdf
AM
7586 /* Nop out the reloc, since we're finalizing things here. */
7587 irel->r_info = ELF32_R_INFO (0, R_PPC_NONE);
7588 }
252b5132 7589
5446cbdf
AM
7590 /* Get the section contents. */
7591 if (contents == NULL)
25dbc73a 7592 {
5446cbdf
AM
7593 /* Get cached copy if it exists. */
7594 if (elf_section_data (isec)->this_hdr.contents != NULL)
7595 contents = elf_section_data (isec)->this_hdr.contents;
25dbc73a 7596 /* Go get them off disk. */
5446cbdf 7597 else if (!bfd_malloc_and_get_section (abfd, isec, &contents))
25dbc73a
AM
7598 goto error_return;
7599 }
252b5132 7600
5446cbdf
AM
7601 /* Fix up the existing branch to hit the trampoline. */
7602 hit_addr = contents + roff;
7603 switch (r_type)
7604 {
7605 case R_PPC_REL24:
7606 case R_PPC_LOCAL24PC:
7607 case R_PPC_PLTREL24:
7608 t0 = bfd_get_32 (abfd, hit_addr);
7609 t0 &= ~0x3fffffc;
7610 t0 |= val & 0x3fffffc;
7611 bfd_put_32 (abfd, t0, hit_addr);
7612 break;
252b5132 7613
5446cbdf
AM
7614 case R_PPC_REL14:
7615 case R_PPC_REL14_BRTAKEN:
7616 case R_PPC_REL14_BRNTAKEN:
7617 t0 = bfd_get_32 (abfd, hit_addr);
7618 t0 &= ~0xfffc;
7619 t0 |= val & 0xfffc;
7620 bfd_put_32 (abfd, t0, hit_addr);
7621 break;
7622 }
25dbc73a 7623 }
252b5132 7624
d3e454b9 7625 while (branch_fixups != NULL)
25dbc73a 7626 {
d3e454b9
AM
7627 struct one_branch_fixup *f = branch_fixups;
7628 branch_fixups = branch_fixups->next;
25dbc73a
AM
7629 free (f);
7630 }
5446cbdf 7631 }
252b5132 7632
5446cbdf
AM
7633 workaround_change = FALSE;
7634 newsize = trampoff;
795bc6b3 7635 if (htab->params->ppc476_workaround
0e1862bb 7636 && (!bfd_link_relocatable (link_info)
795bc6b3 7637 || isec->output_section->alignment_power >= htab->params->pagesize_p2))
5446cbdf
AM
7638 {
7639 bfd_vma addr, end_addr;
7640 unsigned int crossings;
795bc6b3 7641 bfd_vma pagesize = (bfd_vma) 1 << htab->params->pagesize_p2;
5446cbdf
AM
7642
7643 addr = isec->output_section->vma + isec->output_offset;
6128f9cf 7644 end_addr = addr + trampoff;
5446cbdf 7645 addr &= -pagesize;
795bc6b3 7646 crossings = ((end_addr & -pagesize) - addr) >> htab->params->pagesize_p2;
5446cbdf
AM
7647 if (crossings != 0)
7648 {
7649 /* Keep space aligned, to ensure the patch code itself does
7650 not cross a page. Don't decrease size calculated on a
7651 previous pass as otherwise we might never settle on a layout. */
1e269e9b 7652 newsize = 15 - ((end_addr - 1) & 15);
5446cbdf
AM
7653 newsize += crossings * 16;
7654 if (relax_info->workaround_size < newsize)
7655 {
7656 relax_info->workaround_size = newsize;
7657 workaround_change = TRUE;
5446cbdf
AM
7658 }
7659 /* Ensure relocate_section is called. */
7660 isec->flags |= SEC_RELOC;
7661 }
7662 newsize = trampoff + relax_info->workaround_size;
7663 }
7664
d3e454b9
AM
7665 if (htab->params->pic_fixup > 0)
7666 {
7667 picfixup_size -= relax_info->picfixup_size;
7668 if (picfixup_size != 0)
7669 relax_info->picfixup_size += picfixup_size;
7670 newsize += relax_info->picfixup_size;
7671 }
7672
7673 if (changes != 0 || picfixup_size != 0 || workaround_change)
5446cbdf
AM
7674 isec->size = newsize;
7675
25dbc73a
AM
7676 if (isymbuf != NULL
7677 && symtab_hdr->contents != (unsigned char *) isymbuf)
252b5132 7678 {
25dbc73a
AM
7679 if (! link_info->keep_memory)
7680 free (isymbuf);
252b5132 7681 else
25dbc73a
AM
7682 {
7683 /* Cache the symbols for elf_link_input_bfd. */
7684 symtab_hdr->contents = (unsigned char *) isymbuf;
7685 }
252b5132
RH
7686 }
7687
25dbc73a
AM
7688 if (contents != NULL
7689 && elf_section_data (isec)->this_hdr.contents != contents)
7690 {
53291d1f 7691 if (!changes && !link_info->keep_memory)
25dbc73a
AM
7692 free (contents);
7693 else
7694 {
7695 /* Cache the section contents for elf_link_input_bfd. */
7696 elf_section_data (isec)->this_hdr.contents = contents;
7697 }
7698 }
252b5132 7699
d3e454b9 7700 changes += picfixup_size;
9bc4e62b 7701 if (changes != 0)
25dbc73a 7702 {
9bc4e62b
NS
7703 /* Append sufficient NOP relocs so we can write out relocation
7704 information for the trampolines. */
d4730f92 7705 Elf_Internal_Shdr *rel_hdr;
9bc4e62b
NS
7706 Elf_Internal_Rela *new_relocs = bfd_malloc ((changes + isec->reloc_count)
7707 * sizeof (*new_relocs));
7708 unsigned ix;
5b914448 7709
9bc4e62b
NS
7710 if (!new_relocs)
7711 goto error_return;
7712 memcpy (new_relocs, internal_relocs,
7713 isec->reloc_count * sizeof (*new_relocs));
7714 for (ix = changes; ix--;)
7715 {
7716 irel = new_relocs + ix + isec->reloc_count;
7717
7718 irel->r_info = ELF32_R_INFO (0, R_PPC_NONE);
7719 }
7720 if (internal_relocs != elf_section_data (isec)->relocs)
25dbc73a 7721 free (internal_relocs);
9bc4e62b
NS
7722 elf_section_data (isec)->relocs = new_relocs;
7723 isec->reloc_count += changes;
d4730f92
BS
7724 rel_hdr = _bfd_elf_single_rel_hdr (isec);
7725 rel_hdr->sh_size += changes * rel_hdr->sh_entsize;
25dbc73a 7726 }
5446cbdf
AM
7727 else if (internal_relocs != NULL
7728 && elf_section_data (isec)->relocs != internal_relocs)
9bc4e62b 7729 free (internal_relocs);
252b5132 7730
5446cbdf 7731 *again = changes != 0 || workaround_change;
b34976b6 7732 return TRUE;
25dbc73a
AM
7733
7734 error_return:
d3e454b9 7735 while (branch_fixups != NULL)
5446cbdf 7736 {
d3e454b9
AM
7737 struct one_branch_fixup *f = branch_fixups;
7738 branch_fixups = branch_fixups->next;
5446cbdf
AM
7739 free (f);
7740 }
25dbc73a
AM
7741 if (isymbuf != NULL && (unsigned char *) isymbuf != symtab_hdr->contents)
7742 free (isymbuf);
7743 if (contents != NULL
7744 && elf_section_data (isec)->this_hdr.contents != contents)
7745 free (contents);
7746 if (internal_relocs != NULL
7747 && elf_section_data (isec)->relocs != internal_relocs)
7748 free (internal_relocs);
7749 return FALSE;
252b5132 7750}
252b5132 7751\f
8a696751
AM
7752/* What to do when ld finds relocations against symbols defined in
7753 discarded sections. */
7754
7755static unsigned int
7756ppc_elf_action_discarded (asection *sec)
7757{
7758 if (strcmp (".fixup", sec->name) == 0)
7759 return 0;
7760
7761 if (strcmp (".got2", sec->name) == 0)
7762 return 0;
7763
7764 return _bfd_elf_default_action_discarded (sec);
7765}
c9a2f333 7766\f
25dbc73a 7767/* Fill in the address for a pointer generated in a linker section. */
252b5132 7768
25dbc73a 7769static bfd_vma
76750a2f 7770elf_finish_pointer_linker_section (bfd *input_bfd,
25dbc73a
AM
7771 elf_linker_section_t *lsect,
7772 struct elf_link_hash_entry *h,
7773 bfd_vma relocation,
2bb04cf2 7774 const Elf_Internal_Rela *rel)
25dbc73a
AM
7775{
7776 elf_linker_section_pointers_t *linker_section_ptr;
252b5132 7777
25dbc73a 7778 BFD_ASSERT (lsect != NULL);
252b5132 7779
25dbc73a 7780 if (h != NULL)
252b5132 7781 {
25dbc73a
AM
7782 /* Handle global symbol. */
7783 struct ppc_elf_link_hash_entry *eh;
252b5132 7784
25dbc73a 7785 eh = (struct ppc_elf_link_hash_entry *) h;
76750a2f
AM
7786 BFD_ASSERT (eh->elf.def_regular);
7787 linker_section_ptr = eh->linker_section_pointer;
25dbc73a
AM
7788 }
7789 else
7790 {
7791 /* Handle local symbol. */
7792 unsigned long r_symndx = ELF32_R_SYM (rel->r_info);
76750a2f 7793
0c8d6e5c 7794 BFD_ASSERT (is_ppc_elf (input_bfd));
25dbc73a 7795 BFD_ASSERT (elf_local_ptr_offsets (input_bfd) != NULL);
76750a2f
AM
7796 linker_section_ptr = elf_local_ptr_offsets (input_bfd)[r_symndx];
7797 }
252b5132 7798
76750a2f
AM
7799 linker_section_ptr = elf_find_pointer_linker_section (linker_section_ptr,
7800 rel->r_addend,
7801 lsect);
7802 BFD_ASSERT (linker_section_ptr != NULL);
25dbc73a 7803
76750a2f
AM
7804 /* Offset will always be a multiple of four, so use the bottom bit
7805 as a "written" flag. */
7806 if ((linker_section_ptr->offset & 1) == 0)
7807 {
7808 bfd_put_32 (lsect->section->owner,
7809 relocation + linker_section_ptr->addend,
7810 lsect->section->contents + linker_section_ptr->offset);
7811 linker_section_ptr->offset += 1;
252b5132
RH
7812 }
7813
bd6c6e2b
AM
7814 relocation = (lsect->section->output_section->vma
7815 + lsect->section->output_offset
76750a2f 7816 + linker_section_ptr->offset - 1
bd6c6e2b 7817 - SYM_VAL (lsect->sym));
252b5132 7818
25dbc73a
AM
7819#ifdef DEBUG
7820 fprintf (stderr,
7821 "Finish pointer in linker section %s, offset = %ld (0x%lx)\n",
7822 lsect->name, (long) relocation, (long) relocation);
7823#endif
252b5132 7824
bd6c6e2b 7825 return relocation;
252b5132 7826}
25dbc73a 7827
e054468f
AM
7828#define PPC_LO(v) ((v) & 0xffff)
7829#define PPC_HI(v) (((v) >> 16) & 0xffff)
7830#define PPC_HA(v) PPC_HI ((v) + 0x8000)
7831
7832static void
9e390558
AM
7833write_glink_stub (struct elf_link_hash_entry *h, struct plt_entry *ent,
7834 asection *plt_sec, unsigned char *p,
e054468f
AM
7835 struct bfd_link_info *info)
7836{
7837 struct ppc_elf_link_hash_table *htab = ppc_elf_hash_table (info);
7838 bfd *output_bfd = info->output_bfd;
7839 bfd_vma plt;
9e390558
AM
7840 unsigned char *end = p + GLINK_ENTRY_SIZE (htab, h);
7841
7842 if (h != NULL
7843 && h == htab->tls_get_addr
7844 && !htab->params->no_tls_get_addr_opt)
7845 {
7846 bfd_put_32 (output_bfd, LWZ_11_3, p);
7847 p += 4;
7848 bfd_put_32 (output_bfd, LWZ_12_3 + 4, p);
7849 p += 4;
7850 bfd_put_32 (output_bfd, MR_0_3, p);
7851 p += 4;
7852 bfd_put_32 (output_bfd, CMPWI_11_0, p);
7853 p += 4;
7854 bfd_put_32 (output_bfd, ADD_3_12_2, p);
7855 p += 4;
7856 bfd_put_32 (output_bfd, BEQLR, p);
7857 p += 4;
7858 bfd_put_32 (output_bfd, MR_3_0, p);
7859 p += 4;
7860 bfd_put_32 (output_bfd, NOP, p);
7861 p += 4;
7862 }
e054468f
AM
7863
7864 plt = ((ent->plt.offset & ~1)
7865 + plt_sec->output_section->vma
7866 + plt_sec->output_offset);
e054468f 7867
0e1862bb 7868 if (bfd_link_pic (info))
e054468f
AM
7869 {
7870 bfd_vma got = 0;
7871
7872 if (ent->addend >= 32768)
7873 got = (ent->addend
7874 + ent->sec->output_section->vma
7875 + ent->sec->output_offset);
7876 else if (htab->elf.hgot != NULL)
7877 got = SYM_VAL (htab->elf.hgot);
7878
7879 plt -= got;
7880
7881 if (plt + 0x8000 < 0x10000)
9e390558 7882 bfd_put_32 (output_bfd, LWZ_11_30 + PPC_LO (plt), p);
e054468f
AM
7883 else
7884 {
7885 bfd_put_32 (output_bfd, ADDIS_11_30 + PPC_HA (plt), p);
7886 p += 4;
7887 bfd_put_32 (output_bfd, LWZ_11_11 + PPC_LO (plt), p);
e054468f
AM
7888 }
7889 }
7890 else
7891 {
7892 bfd_put_32 (output_bfd, LIS_11 + PPC_HA (plt), p);
7893 p += 4;
7894 bfd_put_32 (output_bfd, LWZ_11_11 + PPC_LO (plt), p);
9e390558
AM
7895 }
7896 p += 4;
7897 bfd_put_32 (output_bfd, MTCTR_11, p);
7898 p += 4;
407aa07c
AM
7899 bfd_put_32 (output_bfd, BCTR, p);
7900 p += 4;
9e390558
AM
7901 while (p < end)
7902 {
7903 bfd_put_32 (output_bfd, htab->params->ppc476_workaround ? BA : NOP, p);
e054468f
AM
7904 p += 4;
7905 }
7906}
7907
bd6c6e2b
AM
7908/* Return true if symbol is defined statically. */
7909
7910static bfd_boolean
7911is_static_defined (struct elf_link_hash_entry *h)
7912{
7913 return ((h->root.type == bfd_link_hash_defined
7914 || h->root.type == bfd_link_hash_defweak)
7915 && h->root.u.def.section != NULL
7916 && h->root.u.def.section->output_section != NULL);
7917}
7918
2d0f3896
AM
7919/* If INSN is an opcode that may be used with an @tls operand, return
7920 the transformed insn for TLS optimisation, otherwise return 0. If
7921 REG is non-zero only match an insn with RB or RA equal to REG. */
7922
7923unsigned int
7924_bfd_elf_ppc_at_tls_transform (unsigned int insn, unsigned int reg)
7925{
7926 unsigned int rtra;
7927
7928 if ((insn & (0x3f << 26)) != 31 << 26)
7929 return 0;
7930
7931 if (reg == 0 || ((insn >> 11) & 0x1f) == reg)
7932 rtra = insn & ((1 << 26) - (1 << 16));
7933 else if (((insn >> 16) & 0x1f) == reg)
7934 rtra = (insn & (0x1f << 21)) | ((insn & (0x1f << 11)) << 5);
7935 else
7936 return 0;
7937
7938 if ((insn & (0x3ff << 1)) == 266 << 1)
7939 /* add -> addi. */
7940 insn = 14 << 26;
7941 else if ((insn & (0x1f << 1)) == 23 << 1
7942 && ((insn & (0x1f << 6)) < 14 << 6
7943 || ((insn & (0x1f << 6)) >= 16 << 6
7944 && (insn & (0x1f << 6)) < 24 << 6)))
7945 /* load and store indexed -> dform. */
7946 insn = (32 | ((insn >> 6) & 0x1f)) << 26;
7947 else if ((insn & (((0x1a << 5) | 0x1f) << 1)) == 21 << 1)
7948 /* ldx, ldux, stdx, stdux -> ld, ldu, std, stdu. */
7949 insn = ((58 | ((insn >> 6) & 4)) << 26) | ((insn >> 6) & 1);
7950 else if ((insn & (((0x1f << 5) | 0x1f) << 1)) == 341 << 1)
7951 /* lwax -> lwa. */
7952 insn = (58 << 26) | 2;
7953 else
7954 return 0;
7955 insn |= rtra;
7956 return insn;
7957}
7958
766bc656
AM
7959/* If INSN is an opcode that may be used with an @tprel operand, return
7960 the transformed insn for an undefined weak symbol, ie. with the
7961 thread pointer REG operand removed. Otherwise return 0. */
7962
7963unsigned int
7964_bfd_elf_ppc_at_tprel_transform (unsigned int insn, unsigned int reg)
7965{
7966 if ((insn & (0x1f << 16)) == reg << 16
7967 && ((insn & (0x3f << 26)) == 14u << 26 /* addi */
7968 || (insn & (0x3f << 26)) == 15u << 26 /* addis */
7969 || (insn & (0x3f << 26)) == 32u << 26 /* lwz */
7970 || (insn & (0x3f << 26)) == 34u << 26 /* lbz */
7971 || (insn & (0x3f << 26)) == 36u << 26 /* stw */
7972 || (insn & (0x3f << 26)) == 38u << 26 /* stb */
7973 || (insn & (0x3f << 26)) == 40u << 26 /* lhz */
7974 || (insn & (0x3f << 26)) == 42u << 26 /* lha */
7975 || (insn & (0x3f << 26)) == 44u << 26 /* sth */
7976 || (insn & (0x3f << 26)) == 46u << 26 /* lmw */
7977 || (insn & (0x3f << 26)) == 47u << 26 /* stmw */
7978 || (insn & (0x3f << 26)) == 48u << 26 /* lfs */
7979 || (insn & (0x3f << 26)) == 50u << 26 /* lfd */
7980 || (insn & (0x3f << 26)) == 52u << 26 /* stfs */
7981 || (insn & (0x3f << 26)) == 54u << 26 /* stfd */
7982 || ((insn & (0x3f << 26)) == 58u << 26 /* lwa,ld,lmd */
7983 && (insn & 3) != 1)
7984 || ((insn & (0x3f << 26)) == 62u << 26 /* std, stmd */
7985 && ((insn & 3) == 0 || (insn & 3) == 3))))
7986 {
7987 insn &= ~(0x1f << 16);
7988 }
7989 else if ((insn & (0x1f << 21)) == reg << 21
7990 && ((insn & (0x3e << 26)) == 24u << 26 /* ori, oris */
7991 || (insn & (0x3e << 26)) == 26u << 26 /* xori,xoris */
7992 || (insn & (0x3e << 26)) == 28u << 26 /* andi,andis */))
7993 {
7994 insn &= ~(0x1f << 21);
7995 insn |= (insn & (0x1f << 16)) << 5;
7996 if ((insn & (0x3e << 26)) == 26 << 26 /* xori,xoris */)
7997 insn -= 2 >> 26; /* convert to ori,oris */
7998 }
7999 else
8000 insn = 0;
8001 return insn;
8002}
8003
1fe532cf
AM
8004static bfd_boolean
8005is_insn_ds_form (unsigned int insn)
8006{
8007 return ((insn & (0x3f << 26)) == 58u << 26 /* ld,ldu,lwa */
8008 || (insn & (0x3f << 26)) == 62u << 26 /* std,stdu,stq */
8009 || (insn & (0x3f << 26)) == 57u << 26 /* lfdp */
8010 || (insn & (0x3f << 26)) == 61u << 26 /* stfdp */);
8011}
8012
8013static bfd_boolean
8014is_insn_dq_form (unsigned int insn)
8015{
a680de9a
PB
8016 return ((insn & (0x3f << 26)) == 56u << 26 /* lq */
8017 || ((insn & (0x3f << 26)) == (61u << 26) /* lxv, stxv */
8018 && (insn & 3) == 1));
1fe532cf
AM
8019}
8020
252b5132
RH
8021/* The RELOCATE_SECTION function is called by the ELF backend linker
8022 to handle the relocations for a section.
8023
8024 The relocs are always passed as Rela structures; if the section
8025 actually uses Rel structures, the r_addend field will always be
8026 zero.
8027
8028 This function is responsible for adjust the section contents as
8029 necessary, and (if using Rela relocs and generating a
1049f94e 8030 relocatable output file) adjusting the reloc addend as
252b5132
RH
8031 necessary.
8032
8033 This function does not have to worry about setting the reloc
8034 address or the reloc symbol index.
8035
8036 LOCAL_SYMS is a pointer to the swapped in local symbols.
8037
8038 LOCAL_SECTIONS is an array giving the section in the input file
8039 corresponding to the st_shndx field of each local symbol.
8040
8041 The global hash table entry for the global symbols can be found
8042 via elf_sym_hashes (input_bfd).
8043
1049f94e 8044 When generating relocatable output, this function must handle
252b5132
RH
8045 STB_LOCAL/STT_SECTION symbols specially. The output symbol is
8046 going to be the section symbol corresponding to the output
8047 section, which means that the addend must be adjusted
8048 accordingly. */
8049
b34976b6 8050static bfd_boolean
55fd94b0
AM
8051ppc_elf_relocate_section (bfd *output_bfd,
8052 struct bfd_link_info *info,
8053 bfd *input_bfd,
8054 asection *input_section,
8055 bfd_byte *contents,
8056 Elf_Internal_Rela *relocs,
8057 Elf_Internal_Sym *local_syms,
8058 asection **local_sections)
252b5132 8059{
7619e7c7
AM
8060 Elf_Internal_Shdr *symtab_hdr;
8061 struct elf_link_hash_entry **sym_hashes;
8062 struct ppc_elf_link_hash_table *htab;
8063 Elf_Internal_Rela *rel;
c316a17c 8064 Elf_Internal_Rela *wrel;
7619e7c7
AM
8065 Elf_Internal_Rela *relend;
8066 Elf_Internal_Rela outrel;
f95f8542 8067 asection *got2;
252b5132 8068 bfd_vma *local_got_offsets;
b34976b6 8069 bfd_boolean ret = TRUE;
95f0d0d2 8070 bfd_vma d_offset = (bfd_big_endian (input_bfd) ? 2 : 0);
3348747a 8071 bfd_boolean is_vxworks_tls;
d3e454b9
AM
8072 unsigned int picfixup_size = 0;
8073 struct ppc_elf_relax_info *relax_info = NULL;
b34976b6 8074
252b5132 8075#ifdef DEBUG
871b3ab2 8076 _bfd_error_handler ("ppc_elf_relocate_section called for %pB section %pA, "
d003868e
AM
8077 "%ld relocations%s",
8078 input_bfd, input_section,
8079 (long) input_section->reloc_count,
0e1862bb 8080 (bfd_link_relocatable (info)) ? " (relocatable)" : "");
252b5132
RH
8081#endif
8082
a6aa5195
AM
8083 got2 = bfd_get_section_by_name (input_bfd, ".got2");
8084
e47cd125 8085 /* Initialize howto table if not already done. */
8da6118f 8086 if (!ppc_elf_howto_table[R_PPC_ADDR32])
252b5132
RH
8087 ppc_elf_howto_init ();
8088
7619e7c7 8089 htab = ppc_elf_hash_table (info);
252b5132 8090 local_got_offsets = elf_local_got_offsets (input_bfd);
0ffa91dd 8091 symtab_hdr = &elf_symtab_hdr (input_bfd);
7619e7c7 8092 sym_hashes = elf_sym_hashes (input_bfd);
3348747a
NS
8093 /* We have to handle relocations in vxworks .tls_vars sections
8094 specially, because the dynamic loader is 'weird'. */
0e1862bb 8095 is_vxworks_tls = (htab->is_vxworks && bfd_link_pic (info)
3348747a
NS
8096 && !strcmp (input_section->output_section->name,
8097 ".tls_vars"));
d3e454b9
AM
8098 if (input_section->sec_info_type == SEC_INFO_TYPE_TARGET)
8099 relax_info = elf_section_data (input_section)->sec_info;
c316a17c 8100 rel = wrel = relocs;
7619e7c7 8101 relend = relocs + input_section->reloc_count;
c316a17c 8102 for (; rel < relend; wrel++, rel++)
252b5132 8103 {
7619e7c7
AM
8104 enum elf_ppc_reloc_type r_type;
8105 bfd_vma addend;
8106 bfd_reloc_status_type r;
8107 Elf_Internal_Sym *sym;
8108 asection *sec;
8109 struct elf_link_hash_entry *h;
8110 const char *sym_name;
252b5132
RH
8111 reloc_howto_type *howto;
8112 unsigned long r_symndx;
8113 bfd_vma relocation;
91d6fa6a 8114 bfd_vma branch_bit, from;
23cedd1d 8115 bfd_boolean unresolved_reloc, save_unresolved_reloc;
7619e7c7
AM
8116 bfd_boolean warned;
8117 unsigned int tls_type, tls_mask, tls_gd;
08be3224 8118 struct plt_entry **ifunc, **plt_list;
86c95733 8119 struct reloc_howto_struct alt_howto;
7619e7c7 8120
c316a17c 8121 again:
55fd94b0
AM
8122 r_type = ELF32_R_TYPE (rel->r_info);
8123 sym = NULL;
8124 sec = NULL;
8125 h = NULL;
7619e7c7
AM
8126 unresolved_reloc = FALSE;
8127 warned = FALSE;
252b5132 8128 r_symndx = ELF32_R_SYM (rel->r_info);
560e09e9 8129
252b5132
RH
8130 if (r_symndx < symtab_hdr->sh_info)
8131 {
8132 sym = local_syms + r_symndx;
8133 sec = local_sections[r_symndx];
26c61ae5 8134 sym_name = bfd_elf_sym_name (input_bfd, symtab_hdr, sym, sec);
252b5132 8135
8517fae7 8136 relocation = _bfd_elf_rela_local_sym (output_bfd, sym, &sec, rel);
252b5132
RH
8137 }
8138 else
8139 {
62d887d4
L
8140 bfd_boolean ignored;
8141
b2a8e766
AM
8142 RELOC_FOR_GLOBAL_SYMBOL (info, input_bfd, input_section, rel,
8143 r_symndx, symtab_hdr, sym_hashes,
8144 h, sec, relocation,
62d887d4 8145 unresolved_reloc, warned, ignored);
9abc968f 8146
252b5132 8147 sym_name = h->root.root.string;
7619e7c7
AM
8148 }
8149
dbaa2011 8150 if (sec != NULL && discarded_section (sec))
ab96bf03
AM
8151 {
8152 /* For relocs against symbols from removed linkonce sections,
8153 or sections discarded by a linker script, we just want the
8154 section contents zeroed. Avoid any special processing. */
8155 howto = NULL;
8156 if (r_type < R_PPC_max)
8157 howto = ppc_elf_howto_table[r_type];
c316a17c
AM
8158
8159 _bfd_clear_contents (howto, input_bfd, input_section,
8160 contents + rel->r_offset);
8161 wrel->r_offset = rel->r_offset;
8162 wrel->r_info = 0;
8163 wrel->r_addend = 0;
8164
8165 /* For ld -r, remove relocations in debug sections against
dcd2b8a0 8166 symbols defined in discarded sections. Not done for
c316a17c
AM
8167 non-debug to preserve relocs in .eh_frame which the
8168 eh_frame editing code expects to be present. */
8169 if (bfd_link_relocatable (info)
8170 && (input_section->flags & SEC_DEBUGGING))
8171 wrel--;
8172
8173 continue;
ab96bf03
AM
8174 }
8175
0e1862bb 8176 if (bfd_link_relocatable (info))
ab96bf03
AM
8177 {
8178 if (got2 != NULL
8179 && r_type == R_PPC_PLTREL24
f75e0e33 8180 && rel->r_addend != 0)
ab96bf03
AM
8181 {
8182 /* R_PPC_PLTREL24 is rather special. If non-zero, the
8183 addend specifies the GOT pointer offset within .got2. */
8184 rel->r_addend += got2->output_offset;
8185 }
53291d1f
AM
8186 if (r_type != R_PPC_RELAX_PLT
8187 && r_type != R_PPC_RELAX_PLTREL24
8188 && r_type != R_PPC_RELAX)
c316a17c 8189 goto copy_reloc;
ab96bf03
AM
8190 }
8191
7619e7c7
AM
8192 /* TLS optimizations. Replace instruction sequences and relocs
8193 based on information we collected in tls_optimize. We edit
8194 RELOCS so that --emit-relocs will output something sensible
8195 for the final instruction stream. */
8196 tls_mask = 0;
8197 tls_gd = 0;
727fc41e
AM
8198 if (h != NULL)
8199 tls_mask = ((struct ppc_elf_link_hash_entry *) h)->tls_mask;
8200 else if (local_got_offsets != NULL)
7619e7c7 8201 {
e054468f 8202 struct plt_entry **local_plt;
727fc41e 8203 char *lgot_masks;
e054468f
AM
8204 local_plt
8205 = (struct plt_entry **) (local_got_offsets + symtab_hdr->sh_info);
8206 lgot_masks = (char *) (local_plt + symtab_hdr->sh_info);
727fc41e 8207 tls_mask = lgot_masks[r_symndx];
7619e7c7
AM
8208 }
8209
8210 /* Ensure reloc mapping code below stays sane. */
8211 if ((R_PPC_GOT_TLSLD16 & 3) != (R_PPC_GOT_TLSGD16 & 3)
8212 || (R_PPC_GOT_TLSLD16_LO & 3) != (R_PPC_GOT_TLSGD16_LO & 3)
8213 || (R_PPC_GOT_TLSLD16_HI & 3) != (R_PPC_GOT_TLSGD16_HI & 3)
8214 || (R_PPC_GOT_TLSLD16_HA & 3) != (R_PPC_GOT_TLSGD16_HA & 3)
8215 || (R_PPC_GOT_TLSLD16 & 3) != (R_PPC_GOT_TPREL16 & 3)
8216 || (R_PPC_GOT_TLSLD16_LO & 3) != (R_PPC_GOT_TPREL16_LO & 3)
8217 || (R_PPC_GOT_TLSLD16_HI & 3) != (R_PPC_GOT_TPREL16_HI & 3)
8218 || (R_PPC_GOT_TLSLD16_HA & 3) != (R_PPC_GOT_TPREL16_HA & 3))
8219 abort ();
8220 switch (r_type)
8221 {
8222 default:
8223 break;
8224
8225 case R_PPC_GOT_TPREL16:
8226 case R_PPC_GOT_TPREL16_LO:
e054468f 8227 if ((tls_mask & TLS_TLS) != 0
7619e7c7
AM
8228 && (tls_mask & TLS_TPREL) == 0)
8229 {
8230 bfd_vma insn;
91d6fa6a 8231
95f0d0d2 8232 insn = bfd_get_32 (input_bfd,
c316a17c 8233 contents + rel->r_offset - d_offset);
7619e7c7
AM
8234 insn &= 31 << 21;
8235 insn |= 0x3c020000; /* addis 0,2,0 */
95f0d0d2 8236 bfd_put_32 (input_bfd, insn,
c316a17c 8237 contents + rel->r_offset - d_offset);
7619e7c7
AM
8238 r_type = R_PPC_TPREL16_HA;
8239 rel->r_info = ELF32_R_INFO (r_symndx, r_type);
8240 }
8241 break;
8242
8243 case R_PPC_TLS:
e054468f 8244 if ((tls_mask & TLS_TLS) != 0
7619e7c7
AM
8245 && (tls_mask & TLS_TPREL) == 0)
8246 {
2d0f3896
AM
8247 bfd_vma insn;
8248
95f0d0d2 8249 insn = bfd_get_32 (input_bfd, contents + rel->r_offset);
2d0f3896
AM
8250 insn = _bfd_elf_ppc_at_tls_transform (insn, 2);
8251 if (insn == 0)
7619e7c7 8252 abort ();
95f0d0d2 8253 bfd_put_32 (input_bfd, insn, contents + rel->r_offset);
7619e7c7
AM
8254 r_type = R_PPC_TPREL16_LO;
8255 rel->r_info = ELF32_R_INFO (r_symndx, r_type);
4fe5ca5b 8256
7619e7c7 8257 /* Was PPC_TLS which sits on insn boundary, now
4fe5ca5b
GM
8258 PPC_TPREL16_LO which is at low-order half-word. */
8259 rel->r_offset += d_offset;
7619e7c7
AM
8260 }
8261 break;
8262
8263 case R_PPC_GOT_TLSGD16_HI:
8264 case R_PPC_GOT_TLSGD16_HA:
8265 tls_gd = TLS_TPRELGD;
e054468f 8266 if ((tls_mask & TLS_TLS) != 0 && (tls_mask & TLS_GD) == 0)
7619e7c7
AM
8267 goto tls_gdld_hi;
8268 break;
8269
8270 case R_PPC_GOT_TLSLD16_HI:
8271 case R_PPC_GOT_TLSLD16_HA:
e054468f 8272 if ((tls_mask & TLS_TLS) != 0 && (tls_mask & TLS_LD) == 0)
7619e7c7
AM
8273 {
8274 tls_gdld_hi:
8275 if ((tls_mask & tls_gd) != 0)
8276 r_type = (((r_type - (R_PPC_GOT_TLSGD16 & 3)) & 3)
8277 + R_PPC_GOT_TPREL16);
8278 else
8279 {
4fe5ca5b 8280 rel->r_offset -= d_offset;
95f0d0d2 8281 bfd_put_32 (input_bfd, NOP, contents + rel->r_offset);
7619e7c7
AM
8282 r_type = R_PPC_NONE;
8283 }
8284 rel->r_info = ELF32_R_INFO (r_symndx, r_type);
8285 }
8286 break;
8287
8288 case R_PPC_GOT_TLSGD16:
8289 case R_PPC_GOT_TLSGD16_LO:
8290 tls_gd = TLS_TPRELGD;
e054468f 8291 if ((tls_mask & TLS_TLS) != 0 && (tls_mask & TLS_GD) == 0)
b7fcf6f6 8292 goto tls_ldgd_opt;
7619e7c7
AM
8293 break;
8294
8295 case R_PPC_GOT_TLSLD16:
8296 case R_PPC_GOT_TLSLD16_LO:
e054468f 8297 if ((tls_mask & TLS_TLS) != 0 && (tls_mask & TLS_LD) == 0)
7619e7c7 8298 {
3a71aa26 8299 unsigned int insn1, insn2;
b7fcf6f6 8300 bfd_vma offset;
7619e7c7 8301
b7fcf6f6 8302 tls_ldgd_opt:
727fc41e
AM
8303 offset = (bfd_vma) -1;
8304 /* If not using the newer R_PPC_TLSGD/LD to mark
8305 __tls_get_addr calls, we must trust that the call
8306 stays with its arg setup insns, ie. that the next
8307 reloc is the __tls_get_addr call associated with
8308 the current reloc. Edit both insns. */
8309 if (input_section->has_tls_get_addr_call
8310 && rel + 1 < relend
8311 && branch_reloc_hash_match (input_bfd, rel + 1,
8312 htab->tls_get_addr))
8313 offset = rel[1].r_offset;
b86ac8e3
AM
8314 /* We read the low GOT_TLS insn because we need to keep
8315 the destination reg. It may be something other than
8316 the usual r3, and moved to r3 before the call by
8317 intervening code. */
95f0d0d2 8318 insn1 = bfd_get_32 (input_bfd,
b86ac8e3 8319 contents + rel->r_offset - d_offset);
b7fcf6f6
AM
8320 if ((tls_mask & tls_gd) != 0)
8321 {
8322 /* IE */
b86ac8e3 8323 insn1 &= (0x1f << 21) | (0x1f << 16);
b7fcf6f6 8324 insn1 |= 32 << 26; /* lwz */
727fc41e
AM
8325 if (offset != (bfd_vma) -1)
8326 {
f58d5a2d 8327 rel[1].r_info = ELF32_R_INFO (STN_UNDEF, R_PPC_NONE);
727fc41e 8328 insn2 = 0x7c631214; /* add 3,3,2 */
95f0d0d2 8329 bfd_put_32 (input_bfd, insn2, contents + offset);
727fc41e 8330 }
b7fcf6f6
AM
8331 r_type = (((r_type - (R_PPC_GOT_TLSGD16 & 3)) & 3)
8332 + R_PPC_GOT_TPREL16);
8333 rel->r_info = ELF32_R_INFO (r_symndx, r_type);
8334 }
8335 else
8336 {
8337 /* LE */
b86ac8e3
AM
8338 insn1 &= 0x1f << 21;
8339 insn1 |= 0x3c020000; /* addis r,2,0 */
7619e7c7
AM
8340 if (tls_gd == 0)
8341 {
b7fcf6f6 8342 /* Was an LD reloc. */
1d483afe
AM
8343 for (r_symndx = 0;
8344 r_symndx < symtab_hdr->sh_info;
8345 r_symndx++)
8346 if (local_sections[r_symndx] == sec)
8347 break;
8348 if (r_symndx >= symtab_hdr->sh_info)
cf35638d 8349 r_symndx = STN_UNDEF;
b7fcf6f6 8350 rel->r_addend = htab->elf.tls_sec->vma + DTP_OFFSET;
cf35638d 8351 if (r_symndx != STN_UNDEF)
1d483afe
AM
8352 rel->r_addend -= (local_syms[r_symndx].st_value
8353 + sec->output_offset
8354 + sec->output_section->vma);
7619e7c7 8355 }
b7fcf6f6
AM
8356 r_type = R_PPC_TPREL16_HA;
8357 rel->r_info = ELF32_R_INFO (r_symndx, r_type);
727fc41e
AM
8358 if (offset != (bfd_vma) -1)
8359 {
8360 rel[1].r_info = ELF32_R_INFO (r_symndx, R_PPC_TPREL16_LO);
8361 rel[1].r_offset = offset + d_offset;
8362 rel[1].r_addend = rel->r_addend;
8363 insn2 = 0x38630000; /* addi 3,3,0 */
95f0d0d2 8364 bfd_put_32 (input_bfd, insn2, contents + offset);
727fc41e 8365 }
b7fcf6f6 8366 }
95f0d0d2 8367 bfd_put_32 (input_bfd, insn1,
b7fcf6f6 8368 contents + rel->r_offset - d_offset);
b7fcf6f6
AM
8369 if (tls_gd == 0)
8370 {
8371 /* We changed the symbol on an LD reloc. Start over
8372 in order to get h, sym, sec etc. right. */
c316a17c 8373 goto again;
7619e7c7 8374 }
252b5132 8375 }
7619e7c7 8376 break;
727fc41e
AM
8377
8378 case R_PPC_TLSGD:
675e2809
AM
8379 if ((tls_mask & TLS_TLS) != 0 && (tls_mask & TLS_GD) == 0
8380 && rel + 1 < relend)
727fc41e
AM
8381 {
8382 unsigned int insn2;
8383 bfd_vma offset = rel->r_offset;
8384
23cedd1d
AM
8385 if (is_plt_seq_reloc (ELF32_R_TYPE (rel[1].r_info)))
8386 {
8387 bfd_put_32 (input_bfd, NOP, contents + offset);
8388 rel[1].r_info = ELF32_R_INFO (STN_UNDEF, R_PPC_NONE);
8389 break;
8390 }
8391
727fc41e
AM
8392 if ((tls_mask & TLS_TPRELGD) != 0)
8393 {
8394 /* IE */
8395 r_type = R_PPC_NONE;
8396 insn2 = 0x7c631214; /* add 3,3,2 */
8397 }
8398 else
8399 {
8400 /* LE */
8401 r_type = R_PPC_TPREL16_LO;
8402 rel->r_offset += d_offset;
8403 insn2 = 0x38630000; /* addi 3,3,0 */
8404 }
8405 rel->r_info = ELF32_R_INFO (r_symndx, r_type);
95f0d0d2 8406 bfd_put_32 (input_bfd, insn2, contents + offset);
727fc41e
AM
8407 /* Zap the reloc on the _tls_get_addr call too. */
8408 BFD_ASSERT (offset == rel[1].r_offset);
f58d5a2d 8409 rel[1].r_info = ELF32_R_INFO (STN_UNDEF, R_PPC_NONE);
727fc41e
AM
8410 }
8411 break;
8412
8413 case R_PPC_TLSLD:
675e2809
AM
8414 if ((tls_mask & TLS_TLS) != 0 && (tls_mask & TLS_LD) == 0
8415 && rel + 1 < relend)
727fc41e
AM
8416 {
8417 unsigned int insn2;
8418
23cedd1d
AM
8419 if (is_plt_seq_reloc (ELF32_R_TYPE (rel[1].r_info)))
8420 {
8421 bfd_put_32 (input_bfd, NOP, contents + rel->r_offset);
8422 rel[1].r_info = ELF32_R_INFO (STN_UNDEF, R_PPC_NONE);
8423 break;
8424 }
8425
727fc41e
AM
8426 for (r_symndx = 0;
8427 r_symndx < symtab_hdr->sh_info;
8428 r_symndx++)
8429 if (local_sections[r_symndx] == sec)
8430 break;
8431 if (r_symndx >= symtab_hdr->sh_info)
cf35638d 8432 r_symndx = STN_UNDEF;
727fc41e 8433 rel->r_addend = htab->elf.tls_sec->vma + DTP_OFFSET;
cf35638d 8434 if (r_symndx != STN_UNDEF)
727fc41e
AM
8435 rel->r_addend -= (local_syms[r_symndx].st_value
8436 + sec->output_offset
8437 + sec->output_section->vma);
8438
8439 rel->r_info = ELF32_R_INFO (r_symndx, R_PPC_TPREL16_LO);
8440 rel->r_offset += d_offset;
8441 insn2 = 0x38630000; /* addi 3,3,0 */
95f0d0d2 8442 bfd_put_32 (input_bfd, insn2,
727fc41e
AM
8443 contents + rel->r_offset - d_offset);
8444 /* Zap the reloc on the _tls_get_addr call too. */
8445 BFD_ASSERT (rel->r_offset - d_offset == rel[1].r_offset);
f58d5a2d 8446 rel[1].r_info = ELF32_R_INFO (STN_UNDEF, R_PPC_NONE);
c316a17c 8447 goto again;
727fc41e
AM
8448 }
8449 break;
7619e7c7
AM
8450 }
8451
8452 /* Handle other relocations that tweak non-addend part of insn. */
8453 branch_bit = 0;
8454 switch (r_type)
8455 {
8456 default:
8457 break;
8458
8459 /* Branch taken prediction relocations. */
8460 case R_PPC_ADDR14_BRTAKEN:
8461 case R_PPC_REL14_BRTAKEN:
8462 branch_bit = BRANCH_PREDICT_BIT;
1a0670f3 8463 /* Fall through. */
7619e7c7 8464
4cc11e76 8465 /* Branch not taken prediction relocations. */
7619e7c7
AM
8466 case R_PPC_ADDR14_BRNTAKEN:
8467 case R_PPC_REL14_BRNTAKEN:
91d6fa6a 8468 {
23cedd1d 8469 unsigned int insn;
7619e7c7 8470
95f0d0d2 8471 insn = bfd_get_32 (input_bfd, contents + rel->r_offset);
91d6fa6a
NC
8472 insn &= ~BRANCH_PREDICT_BIT;
8473 insn |= branch_bit;
7619e7c7 8474
91d6fa6a
NC
8475 from = (rel->r_offset
8476 + input_section->output_offset
8477 + input_section->output_section->vma);
7619e7c7 8478
91d6fa6a
NC
8479 /* Invert 'y' bit if not the default. */
8480 if ((bfd_signed_vma) (relocation + rel->r_addend - from) < 0)
8481 insn ^= BRANCH_PREDICT_BIT;
8482
95f0d0d2 8483 bfd_put_32 (input_bfd, insn, contents + rel->r_offset);
91d6fa6a 8484 }
08be3224
AM
8485 break;
8486
8487 case R_PPC_PLT16_HA:
8488 {
8489 unsigned int insn;
8490
8491 insn = bfd_get_32 (input_bfd,
8492 contents + rel->r_offset - d_offset);
8493 if ((insn & (0x3f << 26)) == 15u << 26
8494 && (insn & (0x1f << 16)) != 0)
8495 {
8496 if (!bfd_link_pic (info))
8497 {
8498 /* Convert addis to lis. */
8499 insn &= ~(0x1f << 16);
8500 bfd_put_32 (input_bfd, insn,
8501 contents + rel->r_offset - d_offset);
8502 }
8503 }
8504 else if (bfd_link_pic (info))
8505 info->callbacks->einfo
8506 (_("%P: %H: error: %s with unexpected instruction %x\n"),
8507 input_bfd, input_section, rel->r_offset,
8508 "R_PPC_PLT16_HA", insn);
8509 }
8510 break;
252b5132
RH
8511 }
8512
d3e454b9
AM
8513 if (ELIMINATE_COPY_RELOCS
8514 && h != NULL
8515 && !h->def_regular
8516 && h->protected_def
8517 && ppc_elf_hash_entry (h)->has_addr16_ha
8518 && ppc_elf_hash_entry (h)->has_addr16_lo
8519 && htab->params->pic_fixup > 0)
8520 {
8521 /* Convert lis;addi or lis;load/store accessing a protected
8522 variable defined in a shared library to PIC. */
8523 unsigned int insn;
8524
8525 if (r_type == R_PPC_ADDR16_HA)
8526 {
95f0d0d2 8527 insn = bfd_get_32 (input_bfd,
d3e454b9
AM
8528 contents + rel->r_offset - d_offset);
8529 if ((insn & (0x3f << 26)) == (15u << 26)
8530 && (insn & (0x1f << 16)) == 0 /* lis */)
8531 {
8532 bfd_byte *p;
8533 bfd_vma off;
8534 bfd_vma got_addr;
8535
8536 p = (contents + input_section->size
8537 - relax_info->workaround_size
8538 - relax_info->picfixup_size
8539 + picfixup_size);
8540 off = (p - contents) - (rel->r_offset - d_offset);
8541 if (off > 0x1fffffc || (off & 3) != 0)
8542 info->callbacks->einfo
174d0a74 8543 (_("%H: fixup branch overflow\n"),
d3e454b9
AM
8544 input_bfd, input_section, rel->r_offset);
8545
95f0d0d2 8546 bfd_put_32 (input_bfd, B | off,
d3e454b9 8547 contents + rel->r_offset - d_offset);
ce558b89
AM
8548 got_addr = (htab->elf.sgot->output_section->vma
8549 + htab->elf.sgot->output_offset
d3e454b9 8550 + (h->got.offset & ~1));
c316a17c
AM
8551 wrel->r_offset = (p - contents) + d_offset;
8552 wrel->r_info = ELF32_R_INFO (0, R_PPC_ADDR16_HA);
8553 wrel->r_addend = got_addr;
d3e454b9 8554 insn &= ~0xffff;
4aef7643 8555 insn |= ((unsigned int) (got_addr + 0x8000) >> 16) & 0xffff;
95f0d0d2 8556 bfd_put_32 (input_bfd, insn, p);
d3e454b9
AM
8557
8558 /* Convert lis to lwz, loading address from GOT. */
8559 insn &= ~0xffff;
8560 insn ^= (32u ^ 15u) << 26;
8561 insn |= (insn & (0x1f << 21)) >> 5;
8562 insn |= got_addr & 0xffff;
95f0d0d2 8563 bfd_put_32 (input_bfd, insn, p + 4);
d3e454b9 8564
95f0d0d2 8565 bfd_put_32 (input_bfd, B | ((-4 - off) & 0x3ffffff), p + 8);
d3e454b9
AM
8566 picfixup_size += 12;
8567
8568 /* Use one of the spare relocs, so --emit-relocs
8569 output is reasonable. */
8570 memmove (rel + 1, rel, (relend - rel - 1) * sizeof (*rel));
c316a17c
AM
8571 wrel++, rel++;
8572 rel->r_offset = wrel[-1].r_offset + 4;
d3e454b9 8573 rel->r_info = ELF32_R_INFO (0, R_PPC_ADDR16_LO);
c316a17c 8574 rel->r_addend = wrel[-1].r_addend;
d3e454b9
AM
8575
8576 /* Continue on as if we had a got reloc, to output
8577 dynamic reloc. */
8578 r_type = R_PPC_GOT16_LO;
8579 }
8580 else
2c4d9cbe 8581 _bfd_error_handler
695344c0 8582 /* xgettext:c-format */
2dcf00ce
AM
8583 (_("%pB(%pA+%#" PRIx64 "): error: "
8584 "%s with unexpected instruction %#x"),
8585 input_bfd, input_section, (uint64_t) rel->r_offset,
d3e454b9
AM
8586 "R_PPC_ADDR16_HA", insn);
8587 }
8588 else if (r_type == R_PPC_ADDR16_LO)
8589 {
95f0d0d2 8590 insn = bfd_get_32 (input_bfd,
d3e454b9
AM
8591 contents + rel->r_offset - d_offset);
8592 if ((insn & (0x3f << 26)) == 14u << 26 /* addi */
8593 || (insn & (0x3f << 26)) == 32u << 26 /* lwz */
8594 || (insn & (0x3f << 26)) == 34u << 26 /* lbz */
8595 || (insn & (0x3f << 26)) == 36u << 26 /* stw */
8596 || (insn & (0x3f << 26)) == 38u << 26 /* stb */
8597 || (insn & (0x3f << 26)) == 40u << 26 /* lhz */
8598 || (insn & (0x3f << 26)) == 42u << 26 /* lha */
8599 || (insn & (0x3f << 26)) == 44u << 26 /* sth */
8600 || (insn & (0x3f << 26)) == 46u << 26 /* lmw */
8601 || (insn & (0x3f << 26)) == 47u << 26 /* stmw */
8602 || (insn & (0x3f << 26)) == 48u << 26 /* lfs */
8603 || (insn & (0x3f << 26)) == 50u << 26 /* lfd */
8604 || (insn & (0x3f << 26)) == 52u << 26 /* stfs */
8605 || (insn & (0x3f << 26)) == 54u << 26 /* stfd */
8606 || ((insn & (0x3f << 26)) == 58u << 26 /* lwa,ld,lmd */
8607 && (insn & 3) != 1)
8608 || ((insn & (0x3f << 26)) == 62u << 26 /* std, stmd */
8609 && ((insn & 3) == 0 || (insn & 3) == 3)))
8610 {
8611 /* Arrange to apply the reloc addend, if any. */
8612 relocation = 0;
8613 unresolved_reloc = FALSE;
8614 rel->r_info = ELF32_R_INFO (0, r_type);
8615 }
8616 else
2c4d9cbe 8617 _bfd_error_handler
695344c0 8618 /* xgettext:c-format */
2dcf00ce
AM
8619 (_("%pB(%pA+%#" PRIx64 "): error: "
8620 "%s with unexpected instruction %#x"),
8621 input_bfd, input_section, (uint64_t) rel->r_offset,
d3e454b9
AM
8622 "R_PPC_ADDR16_LO", insn);
8623 }
8624 }
8625
e054468f 8626 ifunc = NULL;
25f23106 8627 if (!htab->is_vxworks)
e054468f 8628 {
de972ffa
AM
8629 struct plt_entry *ent;
8630
e054468f
AM
8631 if (h != NULL)
8632 {
8633 if (h->type == STT_GNU_IFUNC)
8634 ifunc = &h->plt.plist;
8635 }
de972ffa
AM
8636 else if (local_got_offsets != NULL
8637 && ELF_ST_TYPE (sym->st_info) == STT_GNU_IFUNC)
e054468f 8638 {
de972ffa 8639 struct plt_entry **local_plt;
e054468f 8640
de972ffa
AM
8641 local_plt = (struct plt_entry **) (local_got_offsets
8642 + symtab_hdr->sh_info);
8643 ifunc = local_plt + r_symndx;
e054468f 8644 }
e054468f 8645
de972ffa
AM
8646 ent = NULL;
8647 if (ifunc != NULL
0e1862bb 8648 && (!bfd_link_pic (info)
08be3224
AM
8649 || is_branch_reloc (r_type)
8650 || r_type == R_PPC_PLT16_LO
8651 || r_type == R_PPC_PLT16_HI
8652 || r_type == R_PPC_PLT16_HA))
de972ffa
AM
8653 {
8654 addend = 0;
08be3224
AM
8655 if (bfd_link_pic (info)
8656 && (r_type == R_PPC_PLTREL24
8657 || r_type == R_PPC_PLT16_LO
8658 || r_type == R_PPC_PLT16_HI
8659 || r_type == R_PPC_PLT16_HA))
de972ffa
AM
8660 addend = rel->r_addend;
8661 ent = find_plt_ent (ifunc, got2, addend);
8662 }
8663 if (ent != NULL)
8664 {
888a7fc3
AM
8665 if (bfd_link_pic (info)
8666 && ent->sec != got2
8667 && htab->plt_type != PLT_NEW
8668 && (!htab->elf.dynamic_sections_created
8669 || h == NULL
8670 || h->dynindx == -1))
8671 {
8672 /* Uh oh, we are going to create a pic glink stub
8673 for an ifunc (here for h == NULL and later in
8674 finish_dynamic_symbol for h != NULL), and
8675 apparently are using code compiled with
8676 -mbss-plt. The difficulty is that -mbss-plt code
8677 gives no indication via a magic PLTREL24 addend
8678 whether r30 is equal to _GLOBAL_OFFSET_TABLE_ or
8679 is pointing into a .got2 section (and how far
8680 into .got2). */
8681 info->callbacks->einfo
695344c0 8682 /* xgettext:c-format */
174d0a74 8683 (_("%X%H: unsupported bss-plt -fPIC ifunc %s\n"),
888a7fc3
AM
8684 input_bfd, input_section, rel->r_offset, sym_name);
8685 }
e054468f
AM
8686
8687 unresolved_reloc = FALSE;
8688 if (htab->plt_type == PLT_NEW
8689 || !htab->elf.dynamic_sections_created
c7e17e05
AM
8690 || h == NULL
8691 || h->dynindx == -1)
e054468f
AM
8692 relocation = (htab->glink->output_section->vma
8693 + htab->glink->output_offset
8694 + (ent->glink_offset & ~1));
8695 else
ce558b89
AM
8696 relocation = (htab->elf.splt->output_section->vma
8697 + htab->elf.splt->output_offset
e054468f
AM
8698 + ent->plt.offset);
8699 }
8700 }
8701
7619e7c7 8702 addend = rel->r_addend;
23cedd1d 8703 save_unresolved_reloc = unresolved_reloc;
7619e7c7 8704 howto = NULL;
55fd94b0
AM
8705 if (r_type < R_PPC_max)
8706 howto = ppc_elf_howto_table[r_type];
9a23f96e
AM
8707
8708 switch (r_type)
8709 {
8710 default:
8711 break;
8712
8713 case R_PPC_TPREL16_HA:
8714 if (htab->do_tls_opt && relocation + addend + 0x8000 < 0x10000)
8715 {
8716 bfd_byte *p = contents + (rel->r_offset & ~3);
8717 unsigned int insn = bfd_get_32 (input_bfd, p);
8718 if ((insn & ((0x3f << 26) | 0x1f << 16))
8719 != ((15u << 26) | (2 << 16)) /* addis rt,2,imm */)
8720 /* xgettext:c-format */
8721 info->callbacks->minfo
8722 (_("%H: warning: %s unexpected insn %#x.\n"),
8723 input_bfd, input_section, rel->r_offset, howto->name, insn);
8724 else
8725 bfd_put_32 (input_bfd, NOP, p);
8726 }
8727 break;
8728
8729 case R_PPC_TPREL16_LO:
8730 if (htab->do_tls_opt && relocation + addend + 0x8000 < 0x10000)
8731 {
8732 bfd_byte *p = contents + (rel->r_offset & ~3);
8733 unsigned int insn = bfd_get_32 (input_bfd, p);
8734 insn &= ~(0x1f << 16);
8735 insn |= 2 << 16;
8736 bfd_put_32 (input_bfd, insn, p);
8737 }
8738 break;
8739 }
8740
8741 tls_type = 0;
7619e7c7 8742 switch (r_type)
252b5132
RH
8743 {
8744 default:
cf97bcb0
AM
8745 /* xgettext:c-format */
8746 _bfd_error_handler (_("%pB: %s unsupported"),
8747 input_bfd, howto->name);
252b5132
RH
8748
8749 bfd_set_error (bfd_error_bad_value);
b34976b6 8750 ret = FALSE;
c316a17c 8751 goto copy_reloc;
252b5132 8752
7619e7c7
AM
8753 case R_PPC_NONE:
8754 case R_PPC_TLS:
727fc41e
AM
8755 case R_PPC_TLSGD:
8756 case R_PPC_TLSLD:
7619e7c7
AM
8757 case R_PPC_EMB_MRKREF:
8758 case R_PPC_GNU_VTINHERIT:
8759 case R_PPC_GNU_VTENTRY:
c316a17c 8760 goto copy_reloc;
7595d193 8761
7619e7c7
AM
8762 /* GOT16 relocations. Like an ADDR16 using the symbol's
8763 address in the GOT as relocation value instead of the
8764 symbol's value itself. Also, create a GOT entry for the
8765 symbol and put the symbol value there. */
8766 case R_PPC_GOT_TLSGD16:
8767 case R_PPC_GOT_TLSGD16_LO:
8768 case R_PPC_GOT_TLSGD16_HI:
8769 case R_PPC_GOT_TLSGD16_HA:
8770 tls_type = TLS_TLS | TLS_GD;
8771 goto dogot;
8772
8773 case R_PPC_GOT_TLSLD16:
8774 case R_PPC_GOT_TLSLD16_LO:
8775 case R_PPC_GOT_TLSLD16_HI:
8776 case R_PPC_GOT_TLSLD16_HA:
8777 tls_type = TLS_TLS | TLS_LD;
8778 goto dogot;
8779
8780 case R_PPC_GOT_TPREL16:
8781 case R_PPC_GOT_TPREL16_LO:
8782 case R_PPC_GOT_TPREL16_HI:
8783 case R_PPC_GOT_TPREL16_HA:
8784 tls_type = TLS_TLS | TLS_TPREL;
8785 goto dogot;
8786
8787 case R_PPC_GOT_DTPREL16:
8788 case R_PPC_GOT_DTPREL16_LO:
8789 case R_PPC_GOT_DTPREL16_HI:
8790 case R_PPC_GOT_DTPREL16_HA:
8791 tls_type = TLS_TLS | TLS_DTPREL;
8792 goto dogot;
8793
8794 case R_PPC_GOT16:
8795 case R_PPC_GOT16_LO:
8796 case R_PPC_GOT16_HI:
8797 case R_PPC_GOT16_HA:
727fc41e 8798 tls_mask = 0;
7619e7c7
AM
8799 dogot:
8800 {
8801 /* Relocation is to the entry for this symbol in the global
8802 offset table. */
8803 bfd_vma off;
8804 bfd_vma *offp;
8805 unsigned long indx;
8806
ce558b89 8807 if (htab->elf.sgot == NULL)
7619e7c7
AM
8808 abort ();
8809
8810 indx = 0;
8811 if (tls_type == (TLS_TLS | TLS_LD)
d881513a 8812 && (h == NULL
f5385ebf 8813 || !h->def_dynamic))
7619e7c7
AM
8814 offp = &htab->tlsld_got.offset;
8815 else if (h != NULL)
8816 {
f0158f44
AM
8817 if (!htab->elf.dynamic_sections_created
8818 || h->dynindx == -1
8819 || SYMBOL_REFERENCES_LOCAL (info, h)
21d68fcd 8820 || UNDEFWEAK_NO_DYNAMIC_RELOC (info, h))
7619e7c7
AM
8821 /* This is actually a static link, or it is a
8822 -Bsymbolic link and the symbol is defined
8823 locally, or the symbol was forced to be local
8824 because of a version file. */
8825 ;
8826 else
8827 {
8828 indx = h->dynindx;
8829 unresolved_reloc = FALSE;
8830 }
8831 offp = &h->got.offset;
8832 }
8833 else
8834 {
8835 if (local_got_offsets == NULL)
8836 abort ();
8837 offp = &local_got_offsets[r_symndx];
8838 }
8839
8840 /* The offset must always be a multiple of 4. We use the
8841 least significant bit to record whether we have already
8842 processed this entry. */
8843 off = *offp;
8844 if ((off & 1) != 0)
8845 off &= ~1;
8846 else
8847 {
37da22e5
AM
8848 unsigned int tls_m = ((tls_mask & TLS_TLS) != 0
8849 ? tls_mask & (TLS_LD | TLS_GD | TLS_DTPREL
8850 | TLS_TPREL | TLS_TPRELGD)
8851 : 0);
70bccea4
AM
8852
8853 if (offp == &htab->tlsld_got.offset)
8854 tls_m = TLS_LD;
8855 else if (h == NULL
f5385ebf 8856 || !h->def_dynamic)
70bccea4
AM
8857 tls_m &= ~TLS_LD;
8858
8859 /* We might have multiple got entries for this sym.
8860 Initialize them all. */
8861 do
7619e7c7 8862 {
70bccea4
AM
8863 int tls_ty = 0;
8864
8865 if ((tls_m & TLS_LD) != 0)
7619e7c7 8866 {
70bccea4
AM
8867 tls_ty = TLS_TLS | TLS_LD;
8868 tls_m &= ~TLS_LD;
8869 }
8870 else if ((tls_m & TLS_GD) != 0)
8871 {
8872 tls_ty = TLS_TLS | TLS_GD;
8873 tls_m &= ~TLS_GD;
8874 }
8875 else if ((tls_m & TLS_DTPREL) != 0)
8876 {
8877 tls_ty = TLS_TLS | TLS_DTPREL;
8878 tls_m &= ~TLS_DTPREL;
8879 }
8880 else if ((tls_m & (TLS_TPREL | TLS_TPRELGD)) != 0)
8881 {
8882 tls_ty = TLS_TLS | TLS_TPREL;
8883 tls_m = 0;
7619e7c7 8884 }
7619e7c7 8885
70bccea4 8886 /* Generate relocs for the dynamic linker. */
f0158f44
AM
8887 if (indx != 0
8888 || (bfd_link_pic (info)
8889 && (h == NULL
21d68fcd 8890 || !UNDEFWEAK_NO_DYNAMIC_RELOC (info, h)
f15d0b54
AM
8891 || offp == &htab->tlsld_got.offset)
8892 && !(tls_ty == (TLS_TLS | TLS_TPREL)
8893 && bfd_link_executable (info)
8894 && SYMBOL_REFERENCES_LOCAL (info, h))))
7619e7c7 8895 {
ce558b89 8896 asection *rsec = htab->elf.srelgot;
91d6fa6a 8897 bfd_byte * loc;
91e21fb7 8898
0bed072f 8899 if (ifunc != NULL)
82e66161
AM
8900 {
8901 rsec = htab->elf.irelplt;
8902 if (indx == 0)
8903 htab->local_ifunc_resolver = 1;
8904 else if (is_static_defined (h))
8905 htab->maybe_local_ifunc_resolver = 1;
8906 }
ce558b89
AM
8907 outrel.r_offset = (htab->elf.sgot->output_section->vma
8908 + htab->elf.sgot->output_offset
70bccea4 8909 + off);
e515b051 8910 outrel.r_addend = 0;
70bccea4
AM
8911 if (tls_ty & (TLS_LD | TLS_GD))
8912 {
8913 outrel.r_info = ELF32_R_INFO (indx, R_PPC_DTPMOD32);
70bccea4
AM
8914 if (tls_ty == (TLS_TLS | TLS_GD))
8915 {
25f23106
AM
8916 loc = rsec->contents;
8917 loc += (rsec->reloc_count++
70bccea4
AM
8918 * sizeof (Elf32_External_Rela));
8919 bfd_elf32_swap_reloca_out (output_bfd,
8920 &outrel, loc);
e515b051 8921 outrel.r_offset += 4;
70bccea4
AM
8922 outrel.r_info
8923 = ELF32_R_INFO (indx, R_PPC_DTPREL32);
70bccea4
AM
8924 }
8925 }
8926 else if (tls_ty == (TLS_TLS | TLS_DTPREL))
8927 outrel.r_info = ELF32_R_INFO (indx, R_PPC_DTPREL32);
8928 else if (tls_ty == (TLS_TLS | TLS_TPREL))
8929 outrel.r_info = ELF32_R_INFO (indx, R_PPC_TPREL32);
25f23106 8930 else if (indx != 0)
70bccea4 8931 outrel.r_info = ELF32_R_INFO (indx, R_PPC_GLOB_DAT);
25f23106
AM
8932 else if (ifunc != NULL)
8933 outrel.r_info = ELF32_R_INFO (0, R_PPC_IRELATIVE);
8934 else
8935 outrel.r_info = ELF32_R_INFO (0, R_PPC_RELATIVE);
d6e14abc 8936 if (indx == 0 && tls_ty != (TLS_TLS | TLS_LD))
e515b051
AM
8937 {
8938 outrel.r_addend += relocation;
8939 if (tls_ty & (TLS_GD | TLS_DTPREL | TLS_TPREL))
989f9879
AM
8940 {
8941 if (htab->elf.tls_sec == NULL)
8942 outrel.r_addend = 0;
8943 else
8944 outrel.r_addend -= htab->elf.tls_sec->vma;
8945 }
e515b051 8946 }
25f23106
AM
8947 loc = rsec->contents;
8948 loc += (rsec->reloc_count++
70bccea4
AM
8949 * sizeof (Elf32_External_Rela));
8950 bfd_elf32_swap_reloca_out (output_bfd, &outrel, loc);
7619e7c7
AM
8951 }
8952
70bccea4
AM
8953 /* Init the .got section contents if we're not
8954 emitting a reloc. */
8955 else
7619e7c7 8956 {
70bccea4
AM
8957 bfd_vma value = relocation;
8958
f0158f44 8959 if (tls_ty != 0)
70bccea4 8960 {
989f9879
AM
8961 if (htab->elf.tls_sec == NULL)
8962 value = 0;
8963 else
8964 {
f0158f44
AM
8965 if (tls_ty & TLS_LD)
8966 value = 0;
8967 else
8968 value -= htab->elf.tls_sec->vma + DTP_OFFSET;
676ee2b5 8969 if (tls_ty & TLS_TPREL)
989f9879
AM
8970 value += DTP_OFFSET - TP_OFFSET;
8971 }
70bccea4 8972
f0158f44 8973 if (tls_ty & (TLS_LD | TLS_GD))
7b609f53 8974 {
95f0d0d2 8975 bfd_put_32 (input_bfd, value,
ce558b89 8976 htab->elf.sgot->contents + off + 4);
676ee2b5 8977 value = 1;
7b609f53 8978 }
70bccea4 8979 }
95f0d0d2 8980 bfd_put_32 (input_bfd, value,
ce558b89 8981 htab->elf.sgot->contents + off);
7619e7c7 8982 }
70bccea4
AM
8983
8984 off += 4;
8985 if (tls_ty & (TLS_LD | TLS_GD))
8986 off += 4;
7619e7c7 8987 }
70bccea4
AM
8988 while (tls_m != 0);
8989
8990 off = *offp;
8991 *offp = off | 1;
7619e7c7
AM
8992 }
8993
8994 if (off >= (bfd_vma) -2)
8995 abort ();
8996
70bccea4
AM
8997 if ((tls_type & TLS_TLS) != 0)
8998 {
8999 if (tls_type != (TLS_TLS | TLS_LD))
9000 {
9001 if ((tls_mask & TLS_LD) != 0
9002 && !(h == NULL
f5385ebf 9003 || !h->def_dynamic))
70bccea4
AM
9004 off += 8;
9005 if (tls_type != (TLS_TLS | TLS_GD))
9006 {
9007 if ((tls_mask & TLS_GD) != 0)
9008 off += 8;
9009 if (tls_type != (TLS_TLS | TLS_DTPREL))
9010 {
9011 if ((tls_mask & TLS_DTPREL) != 0)
9012 off += 4;
9013 }
9014 }
9015 }
9016 }
9017
d3e454b9
AM
9018 /* If here for a picfixup, we're done. */
9019 if (r_type != ELF32_R_TYPE (rel->r_info))
c316a17c 9020 goto copy_reloc;
d3e454b9 9021
ce558b89
AM
9022 relocation = (htab->elf.sgot->output_section->vma
9023 + htab->elf.sgot->output_offset
e87d4038
AM
9024 + off
9025 - SYM_VAL (htab->elf.hgot));
7619e7c7
AM
9026
9027 /* Addends on got relocations don't make much sense.
9028 x+off@got is actually x@got+off, and since the got is
9029 generated by a hash table traversal, the value in the
9030 got at entry m+n bears little relation to the entry m. */
9031 if (addend != 0)
25f53a85 9032 info->callbacks->einfo
695344c0 9033 /* xgettext:c-format */
174d0a74 9034 (_("%H: non-zero addend on %s reloc against `%s'\n"),
25f53a85 9035 input_bfd, input_section, rel->r_offset,
7b609f53 9036 howto->name,
7619e7c7
AM
9037 sym_name);
9038 }
86c95733 9039 break;
7619e7c7 9040
86c95733 9041 /* Relocations that need no special processing. */
7619e7c7 9042 case R_PPC_LOCAL24PC:
252b5132
RH
9043 /* It makes no sense to point a local relocation
9044 at a symbol not in this object. */
7b609f53 9045 if (unresolved_reloc)
252b5132 9046 {
1a72702b
AM
9047 (*info->callbacks->undefined_symbol) (info,
9048 h->root.root.string,
9049 input_bfd,
9050 input_section,
9051 rel->r_offset,
9052 TRUE);
c316a17c 9053 goto copy_reloc;
252b5132 9054 }
888a7fc3
AM
9055 if (h != NULL && h->type == STT_GNU_IFUNC && bfd_link_pic (info))
9056 {
9057 /* @local on an ifunc does not really make sense since
9058 the ifunc resolver can take you anywhere. More
9059 seriously, calls to ifuncs must go through a plt call
9060 stub, and for pic the plt call stubs uses r30 to
9061 access the PLT. The problem is that a call that is
9062 local won't have the +32k reloc addend trick marking
9063 -fPIC code, so the linker won't know whether r30 is
9064 _GLOBAL_OFFSET_TABLE_ or pointing into a .got2 section. */
695344c0 9065 /* xgettext:c-format */
174d0a74 9066 info->callbacks->einfo (_("%X%H: @local call to ifunc %s\n"),
888a7fc3
AM
9067 input_bfd, input_section, rel->r_offset,
9068 h->root.root.string);
9069 }
252b5132
RH
9070 break;
9071
7619e7c7
AM
9072 case R_PPC_DTPREL16:
9073 case R_PPC_DTPREL16_LO:
9074 case R_PPC_DTPREL16_HI:
9075 case R_PPC_DTPREL16_HA:
989f9879
AM
9076 if (htab->elf.tls_sec != NULL)
9077 addend -= htab->elf.tls_sec->vma + DTP_OFFSET;
7619e7c7
AM
9078 break;
9079
70bccea4
AM
9080 /* Relocations that may need to be propagated if this is a shared
9081 object. */
7619e7c7
AM
9082 case R_PPC_TPREL16:
9083 case R_PPC_TPREL16_LO:
9084 case R_PPC_TPREL16_HI:
9085 case R_PPC_TPREL16_HA:
766bc656
AM
9086 if (h != NULL
9087 && h->root.type == bfd_link_hash_undefweak
9088 && h->dynindx == -1)
9089 {
9090 /* Make this relocation against an undefined weak symbol
9091 resolve to zero. This is really just a tweak, since
9092 code using weak externs ought to check that they are
9093 defined before using them. */
9094 bfd_byte *p = contents + rel->r_offset - d_offset;
95f0d0d2 9095 unsigned int insn = bfd_get_32 (input_bfd, p);
766bc656
AM
9096 insn = _bfd_elf_ppc_at_tprel_transform (insn, 2);
9097 if (insn != 0)
95f0d0d2 9098 bfd_put_32 (input_bfd, insn, p);
766bc656
AM
9099 break;
9100 }
989f9879
AM
9101 if (htab->elf.tls_sec != NULL)
9102 addend -= htab->elf.tls_sec->vma + TP_OFFSET;
7619e7c7 9103 /* The TPREL16 relocs shouldn't really be used in shared
7c8bbca5
AM
9104 libs or with non-local symbols as that will result in
9105 DT_TEXTREL being set, but support them anyway. */
7619e7c7
AM
9106 goto dodyn;
9107
9108 case R_PPC_TPREL32:
989f9879
AM
9109 if (htab->elf.tls_sec != NULL)
9110 addend -= htab->elf.tls_sec->vma + TP_OFFSET;
7619e7c7
AM
9111 goto dodyn;
9112
9113 case R_PPC_DTPREL32:
989f9879
AM
9114 if (htab->elf.tls_sec != NULL)
9115 addend -= htab->elf.tls_sec->vma + DTP_OFFSET;
7619e7c7
AM
9116 goto dodyn;
9117
e515b051
AM
9118 case R_PPC_DTPMOD32:
9119 relocation = 1;
9120 addend = 0;
9121 goto dodyn;
9122
d7128ce4
AM
9123 case R_PPC_REL16:
9124 case R_PPC_REL16_LO:
9125 case R_PPC_REL16_HI:
9126 case R_PPC_REL16_HA:
a680de9a 9127 case R_PPC_REL16DX_HA:
d7128ce4
AM
9128 break;
9129
7619e7c7 9130 case R_PPC_REL32:
625af618
AM
9131 if (h == NULL || h == htab->elf.hgot)
9132 break;
9133 /* fall through */
9134
9135 case R_PPC_ADDR32:
9136 case R_PPC_ADDR16:
9137 case R_PPC_ADDR16_LO:
9138 case R_PPC_ADDR16_HI:
9139 case R_PPC_ADDR16_HA:
9140 case R_PPC_UADDR32:
9141 case R_PPC_UADDR16:
9142 goto dodyn;
9143
b9c361e0
JL
9144 case R_PPC_VLE_REL8:
9145 case R_PPC_VLE_REL15:
9146 case R_PPC_VLE_REL24:
625af618 9147 case R_PPC_REL24:
7619e7c7
AM
9148 case R_PPC_REL14:
9149 case R_PPC_REL14_BRTAKEN:
9150 case R_PPC_REL14_BRNTAKEN:
252b5132
RH
9151 /* If these relocations are not to a named symbol, they can be
9152 handled right here, no need to bother the dynamic linker. */
89200bf8 9153 if (SYMBOL_CALLS_LOCAL (info, h)
3b36f7e6 9154 || h == htab->elf.hgot)
252b5132 9155 break;
70bccea4 9156 /* fall through */
252b5132 9157
7619e7c7 9158 case R_PPC_ADDR24:
7619e7c7
AM
9159 case R_PPC_ADDR14:
9160 case R_PPC_ADDR14_BRTAKEN:
9161 case R_PPC_ADDR14_BRNTAKEN:
0e1862bb 9162 if (h != NULL && !bfd_link_pic (info))
625af618
AM
9163 break;
9164 /* fall through */
9165
7619e7c7 9166 dodyn:
3348747a
NS
9167 if ((input_section->flags & SEC_ALLOC) == 0
9168 || is_vxworks_tls)
c87b5a93 9169 break;
c87b5a93 9170
287c7eaf
AM
9171 if (bfd_link_pic (info)
9172 ? ((h == NULL
9173 || ppc_elf_hash_entry (h)->dyn_relocs != NULL)
9174 && ((h != NULL && pc_dynrelocs (h))
9175 || must_be_dyn_reloc (info, r_type)))
9176 : (h != NULL
9177 && ppc_elf_hash_entry (h)->dyn_relocs != NULL))
252b5132 9178 {
0bb2d96a 9179 int skip;
f95f8542
AM
9180 bfd_byte *loc;
9181 asection *sreloc;
82e66161
AM
9182 long indx = 0;
9183
252b5132 9184#ifdef DEBUG
55fd94b0
AM
9185 fprintf (stderr, "ppc_elf_relocate_section needs to "
9186 "create relocation for %s\n",
70bccea4
AM
9187 (h && h->root.root.string
9188 ? h->root.root.string : "<unknown>"));
252b5132
RH
9189#endif
9190
9191 /* When generating a shared object, these relocations
70bccea4
AM
9192 are copied into the output file to be resolved at run
9193 time. */
0bb2d96a 9194 skip = 0;
5b914448
AM
9195 outrel.r_offset = _bfd_elf_section_offset (output_bfd, info,
9196 input_section,
9197 rel->r_offset);
0bb2d96a
JJ
9198 if (outrel.r_offset == (bfd_vma) -1
9199 || outrel.r_offset == (bfd_vma) -2)
9200 skip = (int) outrel.r_offset;
252b5132
RH
9201 outrel.r_offset += (input_section->output_section->vma
9202 + input_section->output_offset);
9203
9204 if (skip)
9205 memset (&outrel, 0, sizeof outrel);
21d68fcd 9206 else if (!SYMBOL_REFERENCES_LOCAL (info, h))
252b5132 9207 {
82e66161
AM
9208 indx = h->dynindx;
9209 BFD_ASSERT (indx != -1);
7619e7c7 9210 unresolved_reloc = FALSE;
82e66161 9211 outrel.r_info = ELF32_R_INFO (indx, r_type);
252b5132
RH
9212 outrel.r_addend = rel->r_addend;
9213 }
9214 else
9215 {
47388f4c
AM
9216 outrel.r_addend = relocation + rel->r_addend;
9217
25f23106 9218 if (r_type != R_PPC_ADDR32)
252b5132 9219 {
25f23106
AM
9220 if (ifunc != NULL)
9221 {
9222 /* If we get here when building a static
9223 executable, then the libc startup function
9224 responsible for applying indirect function
9225 relocations is going to complain about
9226 the reloc type.
9227 If we get here when building a dynamic
9228 executable, it will be because we have
9229 a text relocation. The dynamic loader
9230 will set the text segment writable and
9231 non-executable to apply text relocations.
9232 So we'll segfault when trying to run the
9233 indirection function to resolve the reloc. */
25f53a85 9234 info->callbacks->einfo
695344c0 9235 /* xgettext:c-format */
174d0a74 9236 (_("%H: relocation %s for indirect "
25f53a85
AM
9237 "function %s unsupported\n"),
9238 input_bfd, input_section, rel->r_offset,
25f23106
AM
9239 howto->name,
9240 sym_name);
9241 ret = FALSE;
9242 }
cf35638d 9243 else if (r_symndx == STN_UNDEF || bfd_is_abs_section (sec))
89200bf8 9244 ;
252b5132
RH
9245 else if (sec == NULL || sec->owner == NULL)
9246 {
9247 bfd_set_error (bfd_error_bad_value);
89200bf8 9248 ret = FALSE;
252b5132
RH
9249 }
9250 else
9251 {
9252 asection *osec;
9253
47388f4c
AM
9254 /* We are turning this relocation into one
9255 against a section symbol. It would be
9256 proper to subtract the symbol's value,
9257 osec->vma, from the emitted reloc addend,
25f23106
AM
9258 but ld.so expects buggy relocs.
9259 FIXME: Why not always use a zero index? */
252b5132
RH
9260 osec = sec->output_section;
9261 indx = elf_section_data (osec)->dynindx;
74541ad4
AM
9262 if (indx == 0)
9263 {
9264 osec = htab->elf.text_index_section;
9265 indx = elf_section_data (osec)->dynindx;
9266 }
9267 BFD_ASSERT (indx != 0);
252b5132 9268#ifdef DEBUG
74541ad4 9269 if (indx == 0)
e460dd0d 9270 printf ("indx=%ld section=%s flags=%08x name=%s\n",
55fd94b0
AM
9271 indx, osec->name, osec->flags,
9272 h->root.root.string);
252b5132
RH
9273#endif
9274 }
9275
9276 outrel.r_info = ELF32_R_INFO (indx, r_type);
252b5132 9277 }
25f23106
AM
9278 else if (ifunc != NULL)
9279 outrel.r_info = ELF32_R_INFO (0, R_PPC_IRELATIVE);
9280 else
9281 outrel.r_info = ELF32_R_INFO (0, R_PPC_RELATIVE);
252b5132
RH
9282 }
9283
82e66161
AM
9284 sreloc = elf_section_data (input_section)->sreloc;
9285 if (ifunc)
9286 {
9287 sreloc = htab->elf.irelplt;
9288 if (indx == 0)
9289 htab->local_ifunc_resolver = 1;
9290 else if (is_static_defined (h))
9291 htab->maybe_local_ifunc_resolver = 1;
9292 }
9293 if (sreloc == NULL)
9294 return FALSE;
9295
947216bf
AM
9296 loc = sreloc->contents;
9297 loc += sreloc->reloc_count++ * sizeof (Elf32_External_Rela);
9298 bfd_elf32_swap_reloca_out (output_bfd, &outrel, loc);
252b5132 9299
2243deae 9300 if (skip == -1)
c316a17c 9301 goto copy_reloc;
2243deae 9302
f0158f44
AM
9303 /* This reloc will be computed at runtime. Clear the memory
9304 so that it contains a predictable value for prelink. */
9305 if (!skip)
2243deae
L
9306 {
9307 relocation = howto->pc_relative ? outrel.r_offset : 0;
9308 addend = 0;
9309 break;
9310 }
252b5132 9311 }
252b5132
RH
9312 break;
9313
32af9f6e
AM
9314 case R_PPC_RELAX_PLT:
9315 case R_PPC_RELAX_PLTREL24:
de972ffa
AM
9316 if (h != NULL)
9317 {
32af9f6e
AM
9318 struct plt_entry *ent;
9319 bfd_vma got2_addend = 0;
9320
9321 if (r_type == R_PPC_RELAX_PLTREL24)
9322 {
0e1862bb 9323 if (bfd_link_pic (info))
32af9f6e
AM
9324 got2_addend = addend;
9325 addend = 0;
9326 }
9327 ent = find_plt_ent (&h->plt.plist, got2, got2_addend);
de972ffa
AM
9328 if (htab->plt_type == PLT_NEW)
9329 relocation = (htab->glink->output_section->vma
9330 + htab->glink->output_offset
9331 + ent->glink_offset);
9332 else
ce558b89
AM
9333 relocation = (htab->elf.splt->output_section->vma
9334 + htab->elf.splt->output_offset
de972ffa
AM
9335 + ent->plt.offset);
9336 }
1a0670f3 9337 /* Fall through. */
b4a38de6 9338
32af9f6e 9339 case R_PPC_RELAX:
9abc968f 9340 {
53291d1f
AM
9341 const int *stub;
9342 size_t size;
9343 size_t insn_offset = rel->r_offset;
9344 unsigned int insn;
9abc968f 9345
0e1862bb 9346 if (bfd_link_pic (info))
53291d1f
AM
9347 {
9348 relocation -= (input_section->output_section->vma
9349 + input_section->output_offset
9350 + rel->r_offset - 4);
9351 stub = shared_stub_entry;
95f0d0d2
AM
9352 bfd_put_32 (input_bfd, stub[0], contents + insn_offset - 12);
9353 bfd_put_32 (input_bfd, stub[1], contents + insn_offset - 8);
9354 bfd_put_32 (input_bfd, stub[2], contents + insn_offset - 4);
53291d1f
AM
9355 stub += 3;
9356 size = ARRAY_SIZE (shared_stub_entry) - 3;
9357 }
9358 else
9359 {
9360 stub = stub_entry;
9361 size = ARRAY_SIZE (stub_entry);
9362 }
9abc968f 9363
9abc968f 9364 relocation += addend;
0e1862bb 9365 if (bfd_link_relocatable (info))
53291d1f
AM
9366 relocation = 0;
9367
9368 /* First insn is HA, second is LO. */
9369 insn = *stub++;
9370 insn |= ((relocation + 0x8000) >> 16) & 0xffff;
95f0d0d2 9371 bfd_put_32 (input_bfd, insn, contents + insn_offset);
53291d1f
AM
9372 insn_offset += 4;
9373
9374 insn = *stub++;
9375 insn |= relocation & 0xffff;
95f0d0d2 9376 bfd_put_32 (input_bfd, insn, contents + insn_offset);
53291d1f
AM
9377 insn_offset += 4;
9378 size -= 2;
9379
9380 while (size != 0)
9381 {
9382 insn = *stub++;
9383 --size;
95f0d0d2 9384 bfd_put_32 (input_bfd, insn, contents + insn_offset);
53291d1f
AM
9385 insn_offset += 4;
9386 }
9bc4e62b
NS
9387
9388 /* Rewrite the reloc and convert one of the trailing nop
9389 relocs to describe this relocation. */
9390 BFD_ASSERT (ELF32_R_TYPE (relend[-1].r_info) == R_PPC_NONE);
9391 /* The relocs are at the bottom 2 bytes */
c316a17c
AM
9392 wrel->r_offset = rel->r_offset + d_offset;
9393 wrel->r_info = ELF32_R_INFO (r_symndx, R_PPC_ADDR16_HA);
9394 wrel->r_addend = rel->r_addend;
9395 memmove (wrel + 1, wrel, (relend - wrel - 1) * sizeof (*wrel));
9396 wrel++, rel++;
9397 wrel->r_offset += 4;
9398 wrel->r_info = ELF32_R_INFO (r_symndx, R_PPC_ADDR16_LO);
9abc968f 9399 }
8517fae7 9400 continue;
deaaf2f3 9401
70bccea4 9402 /* Indirect .sdata relocation. */
7619e7c7 9403 case R_PPC_EMB_SDAI16:
c9a2f333 9404 BFD_ASSERT (htab->sdata[0].section != NULL);
bd6c6e2b
AM
9405 if (!is_static_defined (htab->sdata[0].sym))
9406 {
9407 unresolved_reloc = TRUE;
9408 break;
9409 }
7619e7c7 9410 relocation
76750a2f
AM
9411 = elf_finish_pointer_linker_section (input_bfd, &htab->sdata[0],
9412 h, relocation, rel);
bd6c6e2b 9413 addend = 0;
252b5132
RH
9414 break;
9415
70bccea4 9416 /* Indirect .sdata2 relocation. */
7619e7c7 9417 case R_PPC_EMB_SDA2I16:
c9a2f333 9418 BFD_ASSERT (htab->sdata[1].section != NULL);
bd6c6e2b
AM
9419 if (!is_static_defined (htab->sdata[1].sym))
9420 {
9421 unresolved_reloc = TRUE;
9422 break;
9423 }
7619e7c7 9424 relocation
76750a2f
AM
9425 = elf_finish_pointer_linker_section (input_bfd, &htab->sdata[1],
9426 h, relocation, rel);
bd6c6e2b 9427 addend = 0;
252b5132
RH
9428 break;
9429
70bccea4
AM
9430 /* Handle the TOC16 reloc. We want to use the offset within the .got
9431 section, not the actual VMA. This is appropriate when generating
9432 an embedded ELF object, for which the .got section acts like the
9433 AIX .toc section. */
7619e7c7 9434 case R_PPC_TOC16: /* phony GOT16 relocations */
3b4f3a11
AM
9435 if (sec == NULL || sec->output_section == NULL)
9436 {
9437 unresolved_reloc = TRUE;
9438 break;
9439 }
a0f49396
NC
9440 BFD_ASSERT (strcmp (bfd_get_section_name (sec->owner, sec),
9441 ".got") == 0
9442 || strcmp (bfd_get_section_name (sec->owner, sec),
9443 ".cgot") == 0);
252b5132 9444
3b4f3a11 9445 addend -= sec->output_section->vma + sec->output_offset + 0x8000;
252b5132
RH
9446 break;
9447
7619e7c7 9448 case R_PPC_PLTREL24:
f75e0e33
AM
9449 if (h != NULL && ifunc == NULL)
9450 {
cbf95972
AM
9451 struct plt_entry *ent;
9452
9453 ent = find_plt_ent (&h->plt.plist, got2,
9454 bfd_link_pic (info) ? addend : 0);
f75e0e33 9455 if (ent == NULL
ce558b89 9456 || htab->elf.splt == NULL)
f75e0e33
AM
9457 {
9458 /* We didn't make a PLT entry for this symbol. This
9459 happens when statically linking PIC code, or when
9460 using -Bsymbolic. */
9461 }
9462 else
9463 {
9464 /* Relocation is to the entry for this symbol in the
9465 procedure linkage table. */
9466 unresolved_reloc = FALSE;
9467 if (htab->plt_type == PLT_NEW)
9468 relocation = (htab->glink->output_section->vma
9469 + htab->glink->output_offset
9470 + ent->glink_offset);
9471 else
ce558b89
AM
9472 relocation = (htab->elf.splt->output_section->vma
9473 + htab->elf.splt->output_offset
f75e0e33
AM
9474 + ent->plt.offset);
9475 }
9476 }
252b5132 9477
f75e0e33
AM
9478 /* R_PPC_PLTREL24 is rather special. If non-zero, the
9479 addend specifies the GOT pointer offset within .got2.
9480 Don't apply it to the relocation field. */
9481 addend = 0;
8da6118f 9482 break;
252b5132 9483
23cedd1d
AM
9484 case R_PPC_PLTSEQ:
9485 case R_PPC_PLTCALL:
08be3224
AM
9486 case R_PPC_PLT16_LO:
9487 case R_PPC_PLT16_HI:
9488 case R_PPC_PLT16_HA:
2d7ad24e 9489 plt_list = NULL;
08be3224
AM
9490 if (h != NULL)
9491 plt_list = &h->plt.plist;
2d7ad24e
AM
9492 else if (ifunc != NULL)
9493 plt_list = ifunc;
9494 else if (local_got_offsets != NULL)
9495 {
9496 struct plt_entry **local_plt;
9497 local_plt = (struct plt_entry **) (local_got_offsets
9498 + symtab_hdr->sh_info);
9499 plt_list = local_plt + r_symndx;
9500 }
08be3224
AM
9501 unresolved_reloc = TRUE;
9502 if (plt_list != NULL)
9503 {
9504 struct plt_entry *ent;
9505
9506 ent = find_plt_ent (plt_list, got2,
9507 bfd_link_pic (info) ? addend : 0);
2d7ad24e 9508 if (ent != NULL && ent->plt.offset != (bfd_vma) -1)
08be3224 9509 {
2d7ad24e
AM
9510 asection *plt;
9511
08be3224 9512 unresolved_reloc = FALSE;
2d7ad24e
AM
9513 plt = htab->elf.splt;
9514 if (!htab->elf.dynamic_sections_created
9515 || h == NULL
9516 || h->dynindx == -1)
9517 {
9518 if (ifunc != NULL)
9519 plt = htab->elf.iplt;
9520 else
9521 plt = htab->pltlocal;
9522 }
9523 relocation = (plt->output_section->vma
9524 + plt->output_offset
08be3224
AM
9525 + ent->plt.offset);
9526 if (bfd_link_pic (info))
9527 {
9528 bfd_vma got = 0;
9529
9530 if (ent->addend >= 32768)
9531 got = (ent->addend
9532 + ent->sec->output_section->vma
9533 + ent->sec->output_offset);
9534 else
9535 got = SYM_VAL (htab->elf.hgot);
9536 relocation -= got;
9537 }
9538 }
9539 }
9540 addend = 0;
9541 break;
9542
70bccea4 9543 /* Relocate against _SDA_BASE_. */
7619e7c7 9544 case R_PPC_SDAREL16:
252b5132
RH
9545 {
9546 const char *name;
bd6c6e2b 9547 struct elf_link_hash_entry *sda = htab->sdata[0].sym;
252b5132 9548
bd6c6e2b
AM
9549 if (sec == NULL
9550 || sec->output_section == NULL
9551 || !is_static_defined (sda))
3b4f3a11
AM
9552 {
9553 unresolved_reloc = TRUE;
9554 break;
9555 }
bd6c6e2b 9556 addend -= SYM_VAL (sda);
3b4f3a11 9557
a0f49396 9558 name = bfd_get_section_name (output_bfd, sec->output_section);
93d1b056
AM
9559 if (!(strcmp (name, ".sdata") == 0
9560 || strcmp (name, ".sbss") == 0))
252b5132 9561 {
cf97bcb0 9562 _bfd_error_handler
695344c0 9563 /* xgettext:c-format */
cf97bcb0
AM
9564 (_("%pB: the target (%s) of a %s relocation is "
9565 "in the wrong output section (%s)"),
d003868e 9566 input_bfd,
55fd94b0
AM
9567 sym_name,
9568 howto->name,
9569 name);
252b5132 9570 }
252b5132
RH
9571 }
9572 break;
9573
70bccea4 9574 /* Relocate against _SDA2_BASE_. */
7619e7c7 9575 case R_PPC_EMB_SDA2REL:
252b5132
RH
9576 {
9577 const char *name;
bd6c6e2b 9578 struct elf_link_hash_entry *sda = htab->sdata[1].sym;
252b5132 9579
bd6c6e2b
AM
9580 if (sec == NULL
9581 || sec->output_section == NULL
9582 || !is_static_defined (sda))
3b4f3a11
AM
9583 {
9584 unresolved_reloc = TRUE;
9585 break;
9586 }
bd6c6e2b 9587 addend -= SYM_VAL (sda);
3b4f3a11 9588
a0f49396 9589 name = bfd_get_section_name (output_bfd, sec->output_section);
93d1b056
AM
9590 if (!(strcmp (name, ".sdata2") == 0
9591 || strcmp (name, ".sbss2") == 0))
252b5132 9592 {
cf97bcb0 9593 _bfd_error_handler
695344c0 9594 /* xgettext:c-format */
cf97bcb0
AM
9595 (_("%pB: the target (%s) of a %s relocation is "
9596 "in the wrong output section (%s)"),
d003868e 9597 input_bfd,
55fd94b0
AM
9598 sym_name,
9599 howto->name,
9600 name);
252b5132 9601 }
252b5132
RH
9602 }
9603 break;
9604
b9c361e0 9605 case R_PPC_VLE_LO16A:
86c95733 9606 relocation = relocation + addend;
08dc996f
AM
9607 ppc_elf_vle_split16 (input_bfd, input_section, rel->r_offset,
9608 contents + rel->r_offset, relocation,
9609 split16a_type, htab->params->vle_reloc_fixup);
c316a17c 9610 goto copy_reloc;
b9c361e0
JL
9611
9612 case R_PPC_VLE_LO16D:
86c95733 9613 relocation = relocation + addend;
08dc996f
AM
9614 ppc_elf_vle_split16 (input_bfd, input_section, rel->r_offset,
9615 contents + rel->r_offset, relocation,
9616 split16d_type, htab->params->vle_reloc_fixup);
c316a17c 9617 goto copy_reloc;
b9c361e0
JL
9618
9619 case R_PPC_VLE_HI16A:
86c95733 9620 relocation = (relocation + addend) >> 16;
08dc996f
AM
9621 ppc_elf_vle_split16 (input_bfd, input_section, rel->r_offset,
9622 contents + rel->r_offset, relocation,
9623 split16a_type, htab->params->vle_reloc_fixup);
c316a17c 9624 goto copy_reloc;
b9c361e0
JL
9625
9626 case R_PPC_VLE_HI16D:
86c95733 9627 relocation = (relocation + addend) >> 16;
08dc996f
AM
9628 ppc_elf_vle_split16 (input_bfd, input_section, rel->r_offset,
9629 contents + rel->r_offset, relocation,
9630 split16d_type, htab->params->vle_reloc_fixup);
c316a17c 9631 goto copy_reloc;
b9c361e0
JL
9632
9633 case R_PPC_VLE_HA16A:
86c95733 9634 relocation = (relocation + addend + 0x8000) >> 16;
08dc996f
AM
9635 ppc_elf_vle_split16 (input_bfd, input_section, rel->r_offset,
9636 contents + rel->r_offset, relocation,
9637 split16a_type, htab->params->vle_reloc_fixup);
c316a17c 9638 goto copy_reloc;
b9c361e0
JL
9639
9640 case R_PPC_VLE_HA16D:
86c95733 9641 relocation = (relocation + addend + 0x8000) >> 16;
08dc996f
AM
9642 ppc_elf_vle_split16 (input_bfd, input_section, rel->r_offset,
9643 contents + rel->r_offset, relocation,
9644 split16d_type, htab->params->vle_reloc_fixup);
c316a17c 9645 goto copy_reloc;
b9c361e0 9646
70bccea4 9647 /* Relocate against either _SDA_BASE_, _SDA2_BASE_, or 0. */
7619e7c7 9648 case R_PPC_EMB_SDA21:
b9c361e0 9649 case R_PPC_VLE_SDA21:
7619e7c7 9650 case R_PPC_EMB_RELSDA:
b9c361e0 9651 case R_PPC_VLE_SDA21_LO:
252b5132
RH
9652 {
9653 const char *name;
9654 int reg;
86c95733 9655 unsigned int insn;
bd6c6e2b 9656 struct elf_link_hash_entry *sda = NULL;
252b5132 9657
3b4f3a11
AM
9658 if (sec == NULL || sec->output_section == NULL)
9659 {
9660 unresolved_reloc = TRUE;
9661 break;
9662 }
9663
a0f49396 9664 name = bfd_get_section_name (output_bfd, sec->output_section);
93d1b056
AM
9665 if (strcmp (name, ".sdata") == 0
9666 || strcmp (name, ".sbss") == 0)
252b5132
RH
9667 {
9668 reg = 13;
bd6c6e2b 9669 sda = htab->sdata[0].sym;
252b5132 9670 }
93d1b056
AM
9671 else if (strcmp (name, ".sdata2") == 0
9672 || strcmp (name, ".sbss2") == 0)
252b5132
RH
9673 {
9674 reg = 2;
bd6c6e2b 9675 sda = htab->sdata[1].sym;
252b5132 9676 }
8da6118f
KH
9677 else if (strcmp (name, ".PPC.EMB.sdata0") == 0
9678 || strcmp (name, ".PPC.EMB.sbss0") == 0)
252b5132
RH
9679 {
9680 reg = 0;
9681 }
252b5132
RH
9682 else
9683 {
cf97bcb0 9684 _bfd_error_handler
695344c0 9685 /* xgettext:c-format */
cf97bcb0
AM
9686 (_("%pB: the target (%s) of a %s relocation is "
9687 "in the wrong output section (%s)"),
d003868e 9688 input_bfd,
55fd94b0
AM
9689 sym_name,
9690 howto->name,
9691 name);
252b5132
RH
9692
9693 bfd_set_error (bfd_error_bad_value);
b34976b6 9694 ret = FALSE;
c316a17c 9695 goto copy_reloc;
252b5132
RH
9696 }
9697
bd6c6e2b
AM
9698 if (sda != NULL)
9699 {
9700 if (!is_static_defined (sda))
9701 {
9702 unresolved_reloc = TRUE;
9703 break;
9704 }
9705 addend -= SYM_VAL (sda);
9706 }
9707
95f0d0d2 9708 insn = bfd_get_32 (input_bfd, contents + rel->r_offset);
b9c361e0
JL
9709 if (reg == 0
9710 && (r_type == R_PPC_VLE_SDA21
9711 || r_type == R_PPC_VLE_SDA21_LO))
9712 {
86c95733
AM
9713 relocation = relocation + addend;
9714 addend = 0;
9715
9716 /* Force e_li insn, keeping RT from original insn. */
9717 insn &= 0x1f << 21;
9718 insn |= 28u << 26;
9719
9720 /* We have an li20 field, bits 17..20, 11..15, 21..31. */
9721 /* Top 4 bits of value to 17..20. */
9722 insn |= (relocation & 0xf0000) >> 5;
9723 /* Next 5 bits of the value to 11..15. */
9724 insn |= (relocation & 0xf800) << 5;
9725 /* And the final 11 bits of the value to bits 21 to 31. */
9726 insn |= relocation & 0x7ff;
9727
95f0d0d2 9728 bfd_put_32 (input_bfd, insn, contents + rel->r_offset);
c3301df1
AM
9729
9730 if (r_type == R_PPC_VLE_SDA21
9731 && ((relocation + 0x80000) & 0xffffffff) > 0x100000)
9732 goto overflow;
c316a17c 9733 goto copy_reloc;
b9c361e0
JL
9734 }
9735 else if (r_type == R_PPC_EMB_SDA21
9736 || r_type == R_PPC_VLE_SDA21
9737 || r_type == R_PPC_VLE_SDA21_LO)
91d6fa6a 9738 {
86c95733 9739 /* Fill in register field. */
252b5132 9740 insn = (insn & ~RA_REGISTER_MASK) | (reg << RA_REGISTER_SHIFT);
252b5132 9741 }
95f0d0d2 9742 bfd_put_32 (input_bfd, insn, contents + rel->r_offset);
252b5132
RH
9743 }
9744 break;
9745
b9c361e0
JL
9746 case R_PPC_VLE_SDAREL_LO16A:
9747 case R_PPC_VLE_SDAREL_LO16D:
9748 case R_PPC_VLE_SDAREL_HI16A:
9749 case R_PPC_VLE_SDAREL_HI16D:
9750 case R_PPC_VLE_SDAREL_HA16A:
9751 case R_PPC_VLE_SDAREL_HA16D:
9752 {
9753 bfd_vma value;
9754 const char *name;
b9c361e0
JL
9755 struct elf_link_hash_entry *sda = NULL;
9756
9757 if (sec == NULL || sec->output_section == NULL)
9758 {
9759 unresolved_reloc = TRUE;
9760 break;
9761 }
9762
a0f49396 9763 name = bfd_get_section_name (output_bfd, sec->output_section);
93d1b056
AM
9764 if (strcmp (name, ".sdata") == 0
9765 || strcmp (name, ".sbss") == 0)
5499c7c7 9766 sda = htab->sdata[0].sym;
93d1b056
AM
9767 else if (strcmp (name, ".sdata2") == 0
9768 || strcmp (name, ".sbss2") == 0)
5499c7c7 9769 sda = htab->sdata[1].sym;
b9c361e0
JL
9770 else
9771 {
4eca0228 9772 _bfd_error_handler
695344c0 9773 /* xgettext:c-format */
871b3ab2 9774 (_("%pB: the target (%s) of a %s relocation is "
b9c361e0
JL
9775 "in the wrong output section (%s)"),
9776 input_bfd,
9777 sym_name,
9778 howto->name,
9779 name);
9780
9781 bfd_set_error (bfd_error_bad_value);
9782 ret = FALSE;
c316a17c 9783 goto copy_reloc;
b9c361e0
JL
9784 }
9785
5499c7c7 9786 if (sda == NULL || !is_static_defined (sda))
b9c361e0 9787 {
5499c7c7
AM
9788 unresolved_reloc = TRUE;
9789 break;
b9c361e0 9790 }
5499c7c7 9791 value = relocation + addend - SYM_VAL (sda);
86c95733
AM
9792
9793 if (r_type == R_PPC_VLE_SDAREL_LO16A)
08dc996f
AM
9794 ppc_elf_vle_split16 (input_bfd, input_section, rel->r_offset,
9795 contents + rel->r_offset, value,
9796 split16a_type,
9797 htab->params->vle_reloc_fixup);
86c95733 9798 else if (r_type == R_PPC_VLE_SDAREL_LO16D)
08dc996f
AM
9799 ppc_elf_vle_split16 (input_bfd, input_section, rel->r_offset,
9800 contents + rel->r_offset, value,
9801 split16d_type,
9802 htab->params->vle_reloc_fixup);
86c95733 9803 else if (r_type == R_PPC_VLE_SDAREL_HI16A)
b9c361e0 9804 {
86c95733 9805 value = value >> 16;
08dc996f
AM
9806 ppc_elf_vle_split16 (input_bfd, input_section, rel->r_offset,
9807 contents + rel->r_offset, value,
9808 split16a_type,
9809 htab->params->vle_reloc_fixup);
b9c361e0 9810 }
86c95733 9811 else if (r_type == R_PPC_VLE_SDAREL_HI16D)
b9c361e0 9812 {
86c95733 9813 value = value >> 16;
08dc996f
AM
9814 ppc_elf_vle_split16 (input_bfd, input_section, rel->r_offset,
9815 contents + rel->r_offset, value,
9816 split16d_type,
9817 htab->params->vle_reloc_fixup);
b9c361e0 9818 }
86c95733 9819 else if (r_type == R_PPC_VLE_SDAREL_HA16A)
b9c361e0 9820 {
86c95733 9821 value = (value + 0x8000) >> 16;
08dc996f
AM
9822 ppc_elf_vle_split16 (input_bfd, input_section, rel->r_offset,
9823 contents + rel->r_offset, value,
9824 split16a_type,
9825 htab->params->vle_reloc_fixup);
b9c361e0 9826 }
86c95733 9827 else if (r_type == R_PPC_VLE_SDAREL_HA16D)
b9c361e0 9828 {
86c95733 9829 value = (value + 0x8000) >> 16;
08dc996f
AM
9830 ppc_elf_vle_split16 (input_bfd, input_section, rel->r_offset,
9831 contents + rel->r_offset, value,
9832 split16d_type,
9833 htab->params->vle_reloc_fixup);
b9c361e0
JL
9834 }
9835 }
c316a17c 9836 goto copy_reloc;
b9c361e0 9837
83eef883
AFB
9838 case R_PPC_VLE_ADDR20:
9839 ppc_elf_vle_split20 (output_bfd, contents + rel->r_offset, relocation);
9840 continue;
9841
70bccea4 9842 /* Relocate against the beginning of the section. */
7619e7c7
AM
9843 case R_PPC_SECTOFF:
9844 case R_PPC_SECTOFF_LO:
9845 case R_PPC_SECTOFF_HI:
9846 case R_PPC_SECTOFF_HA:
3b4f3a11
AM
9847 if (sec == NULL || sec->output_section == NULL)
9848 {
9849 unresolved_reloc = TRUE;
9850 break;
9851 }
252b5132 9852 addend -= sec->output_section->vma;
252b5132
RH
9853 break;
9854
70bccea4 9855 /* Negative relocations. */
7619e7c7
AM
9856 case R_PPC_EMB_NADDR32:
9857 case R_PPC_EMB_NADDR16:
9858 case R_PPC_EMB_NADDR16_LO:
9859 case R_PPC_EMB_NADDR16_HI:
9860 case R_PPC_EMB_NADDR16_HA:
8da6118f 9861 addend -= 2 * relocation;
252b5132
RH
9862 break;
9863
7619e7c7
AM
9864 case R_PPC_COPY:
9865 case R_PPC_GLOB_DAT:
9866 case R_PPC_JMP_SLOT:
9867 case R_PPC_RELATIVE:
e054468f 9868 case R_PPC_IRELATIVE:
7619e7c7
AM
9869 case R_PPC_PLT32:
9870 case R_PPC_PLTREL32:
7619e7c7
AM
9871 case R_PPC_ADDR30:
9872 case R_PPC_EMB_RELSEC16:
9873 case R_PPC_EMB_RELST_LO:
9874 case R_PPC_EMB_RELST_HI:
9875 case R_PPC_EMB_RELST_HA:
9876 case R_PPC_EMB_BIT_FLD:
cf97bcb0
AM
9877 /* xgettext:c-format */
9878 _bfd_error_handler (_("%pB: %s unsupported"),
9879 input_bfd, howto->name);
252b5132
RH
9880
9881 bfd_set_error (bfd_error_invalid_operation);
b34976b6 9882 ret = FALSE;
c316a17c 9883 goto copy_reloc;
7619e7c7 9884 }
252b5132 9885
23cedd1d
AM
9886 switch (r_type)
9887 {
9888 default:
9889 break;
9890
9891 case R_PPC_PLTCALL:
9892 if (unresolved_reloc)
9893 {
9894 bfd_byte *p = contents + rel->r_offset;
9895 unsigned int insn = bfd_get_32 (input_bfd, p);
9896 insn &= 1;
9897 bfd_put_32 (input_bfd, B | insn, p);
9898 unresolved_reloc = save_unresolved_reloc;
9899 r_type = R_PPC_REL24;
9900 howto = ppc_elf_howto_table[r_type];
9901 }
9902 else if (htab->plt_type != PLT_NEW)
9903 info->callbacks->einfo
9904 (_("%P: %H: %s relocation unsupported for bss-plt\n"),
9905 input_bfd, input_section, rel->r_offset,
9906 howto->name);
9907 break;
9908
9909 case R_PPC_PLTSEQ:
9910 case R_PPC_PLT16_HA:
9911 case R_PPC_PLT16_LO:
9912 if (unresolved_reloc)
9913 {
9914 bfd_byte *p = contents + (rel->r_offset & ~3);
9915 bfd_put_32 (input_bfd, NOP, p);
9916 unresolved_reloc = FALSE;
9917 r_type = R_PPC_NONE;
9918 howto = ppc_elf_howto_table[r_type];
9919 }
9920 else if (htab->plt_type != PLT_NEW)
9921 info->callbacks->einfo
9922 (_("%P: %H: %s relocation unsupported for bss-plt\n"),
9923 input_bfd, input_section, rel->r_offset,
9924 howto->name);
9925 break;
9926 }
9927
7619e7c7
AM
9928 /* Do any further special processing. */
9929 switch (r_type)
9930 {
9931 default:
9932 break;
9933
9934 case R_PPC_ADDR16_HA:
d7128ce4 9935 case R_PPC_REL16_HA:
a680de9a 9936 case R_PPC_REL16DX_HA:
7619e7c7
AM
9937 case R_PPC_SECTOFF_HA:
9938 case R_PPC_TPREL16_HA:
9939 case R_PPC_DTPREL16_HA:
7619e7c7
AM
9940 case R_PPC_EMB_NADDR16_HA:
9941 case R_PPC_EMB_RELST_HA:
9942 /* It's just possible that this symbol is a weak symbol
7b609f53 9943 that's not actually defined anywhere. In that case,
7619e7c7
AM
9944 'sec' would be NULL, and we should leave the symbol
9945 alone (it will be set to zero elsewhere in the link). */
5c5f6e17
AM
9946 if (sec == NULL)
9947 break;
1a0670f3 9948 /* Fall through. */
5c5f6e17
AM
9949
9950 case R_PPC_PLT16_HA:
9951 case R_PPC_GOT16_HA:
9952 case R_PPC_GOT_TLSGD16_HA:
9953 case R_PPC_GOT_TLSLD16_HA:
9954 case R_PPC_GOT_TPREL16_HA:
9955 case R_PPC_GOT_DTPREL16_HA:
9956 /* Add 0x10000 if sign bit in 0:15 is set.
9957 Bits 0:15 are not used. */
9958 addend += 0x8000;
7619e7c7 9959 break;
1fe532cf
AM
9960
9961 case R_PPC_ADDR16:
9962 case R_PPC_ADDR16_LO:
9963 case R_PPC_GOT16:
9964 case R_PPC_GOT16_LO:
9965 case R_PPC_SDAREL16:
9966 case R_PPC_SECTOFF:
9967 case R_PPC_SECTOFF_LO:
9968 case R_PPC_DTPREL16:
9969 case R_PPC_DTPREL16_LO:
9970 case R_PPC_TPREL16:
9971 case R_PPC_TPREL16_LO:
9972 case R_PPC_GOT_TLSGD16:
9973 case R_PPC_GOT_TLSGD16_LO:
9974 case R_PPC_GOT_TLSLD16:
9975 case R_PPC_GOT_TLSLD16_LO:
9976 case R_PPC_GOT_DTPREL16:
9977 case R_PPC_GOT_DTPREL16_LO:
9978 case R_PPC_GOT_TPREL16:
9979 case R_PPC_GOT_TPREL16_LO:
9980 {
9981 /* The 32-bit ABI lacks proper relocations to deal with
9982 certain 64-bit instructions. Prevent damage to bits
9983 that make up part of the insn opcode. */
9984 unsigned int insn, mask, lobit;
9985
95f0d0d2 9986 insn = bfd_get_32 (input_bfd,
c316a17c 9987 contents + rel->r_offset - d_offset);
1fe532cf
AM
9988 mask = 0;
9989 if (is_insn_ds_form (insn))
9990 mask = 3;
9991 else if (is_insn_dq_form (insn))
9992 mask = 15;
9993 else
9994 break;
a680de9a
PB
9995 relocation += addend;
9996 addend = insn & mask;
9997 lobit = mask & relocation;
1fe532cf
AM
9998 if (lobit != 0)
9999 {
a680de9a 10000 relocation ^= lobit;
1fe532cf 10001 info->callbacks->einfo
695344c0 10002 /* xgettext:c-format */
174d0a74 10003 (_("%H: error: %s against `%s' not a multiple of %u\n"),
1fe532cf
AM
10004 input_bfd, input_section, rel->r_offset,
10005 howto->name, sym_name, mask + 1);
10006 bfd_set_error (bfd_error_bad_value);
10007 ret = FALSE;
10008 }
1fe532cf
AM
10009 }
10010 break;
252b5132
RH
10011 }
10012
252b5132 10013#ifdef DEBUG
55fd94b0
AM
10014 fprintf (stderr, "\ttype = %s (%d), name = %s, symbol index = %ld, "
10015 "offset = %ld, addend = %ld\n",
252b5132 10016 howto->name,
8da6118f 10017 (int) r_type,
252b5132
RH
10018 sym_name,
10019 r_symndx,
7619e7c7 10020 (long) rel->r_offset,
8da6118f 10021 (long) addend);
252b5132
RH
10022#endif
10023
7619e7c7
AM
10024 if (unresolved_reloc
10025 && !((input_section->flags & SEC_DEBUGGING) != 0
1d5316ab
AM
10026 && h->def_dynamic)
10027 && _bfd_elf_section_offset (output_bfd, info, input_section,
10028 rel->r_offset) != (bfd_vma) -1)
7619e7c7 10029 {
25f53a85 10030 info->callbacks->einfo
695344c0 10031 /* xgettext:c-format */
174d0a74 10032 (_("%H: unresolvable %s relocation against symbol `%s'\n"),
25f53a85 10033 input_bfd, input_section, rel->r_offset,
7b609f53 10034 howto->name,
7619e7c7
AM
10035 sym_name);
10036 ret = FALSE;
10037 }
10038
86c95733
AM
10039 /* 16-bit fields in insns mostly have signed values, but a
10040 few insns have 16-bit unsigned values. Really, we should
10041 have different reloc types. */
10042 if (howto->complain_on_overflow != complain_overflow_dont
10043 && howto->dst_mask == 0xffff
10044 && (input_section->flags & SEC_CODE) != 0)
10045 {
10046 enum complain_overflow complain = complain_overflow_signed;
10047
10048 if ((elf_section_flags (input_section) & SHF_PPC_VLE) == 0)
10049 {
10050 unsigned int insn;
10051
10052 insn = bfd_get_32 (input_bfd, contents + (rel->r_offset & ~3));
a47622ac
AM
10053 if ((insn & (0x3f << 26)) == 10u << 26 /* cmpli */)
10054 complain = complain_overflow_bitfield;
10055 else if ((insn & (0x3f << 26)) == 28u << 26 /* andi */
10056 || (insn & (0x3f << 26)) == 24u << 26 /* ori */
10057 || (insn & (0x3f << 26)) == 26u << 26 /* xori */)
86c95733
AM
10058 complain = complain_overflow_unsigned;
10059 }
10060 if (howto->complain_on_overflow != complain)
10061 {
10062 alt_howto = *howto;
10063 alt_howto.complain_on_overflow = complain;
10064 howto = &alt_howto;
10065 }
10066 }
10067
a680de9a
PB
10068 if (r_type == R_PPC_REL16DX_HA)
10069 {
10070 /* Split field reloc isn't handled by _bfd_final_link_relocate. */
10071 if (rel->r_offset + 4 > input_section->size)
10072 r = bfd_reloc_outofrange;
10073 else
10074 {
10075 unsigned int insn;
10076
10077 relocation += addend;
10078 relocation -= (rel->r_offset
10079 + input_section->output_offset
10080 + input_section->output_section->vma);
10081 relocation >>= 16;
10082 insn = bfd_get_32 (input_bfd, contents + rel->r_offset);
10083 insn &= ~0x1fffc1;
10084 insn |= (relocation & 0xffc1) | ((relocation & 0x3e) << 15);
10085 bfd_put_32 (input_bfd, insn, contents + rel->r_offset);
10086 r = bfd_reloc_ok;
10087 }
10088 }
10089 else
10090 r = _bfd_final_link_relocate (howto, input_bfd, input_section, contents,
10091 rel->r_offset, relocation, addend);
252b5132 10092
7619e7c7 10093 if (r != bfd_reloc_ok)
252b5132 10094 {
7619e7c7 10095 if (r == bfd_reloc_overflow)
252b5132 10096 {
c3301df1 10097 overflow:
8131c122
AM
10098 /* On code like "if (foo) foo();" don't report overflow
10099 on a branch to zero when foo is undefined. */
10100 if (!warned
10101 && !(h != NULL
10102 && (h->root.type == bfd_link_hash_undefweak
10103 || h->root.type == bfd_link_hash_undefined)
10104 && is_branch_reloc (r_type)))
1a72702b
AM
10105 info->callbacks->reloc_overflow
10106 (info, (h ? &h->root : NULL), sym_name, howto->name,
10107 rel->r_addend, input_bfd, input_section, rel->r_offset);
dc1bc0c9
RH
10108 }
10109 else
10110 {
25f53a85 10111 info->callbacks->einfo
695344c0 10112 /* xgettext:c-format */
174d0a74 10113 (_("%H: %s reloc against `%s': error %d\n"),
25f53a85
AM
10114 input_bfd, input_section, rel->r_offset,
10115 howto->name, sym_name, (int) r);
7619e7c7 10116 ret = FALSE;
252b5132
RH
10117 }
10118 }
c316a17c
AM
10119 copy_reloc:
10120 if (wrel != rel)
10121 *wrel = *rel;
10122 }
10123
10124 if (wrel != rel)
10125 {
10126 Elf_Internal_Shdr *rel_hdr;
10127 size_t deleted = rel - wrel;
10128
10129 rel_hdr = _bfd_elf_single_rel_hdr (input_section->output_section);
10130 rel_hdr->sh_size -= rel_hdr->sh_entsize * deleted;
10131 if (rel_hdr->sh_size == 0)
10132 {
10133 /* It is too late to remove an empty reloc section. Leave
10134 one NONE reloc.
10135 ??? What is wrong with an empty section??? */
10136 rel_hdr->sh_size = rel_hdr->sh_entsize;
10137 deleted -= 1;
10138 wrel++;
10139 }
10140 relend = wrel;
10141 rel_hdr = _bfd_elf_single_rel_hdr (input_section);
10142 rel_hdr->sh_size -= rel_hdr->sh_entsize * deleted;
10143 input_section->reloc_count -= deleted;
252b5132
RH
10144 }
10145
252b5132
RH
10146#ifdef DEBUG
10147 fprintf (stderr, "\n");
10148#endif
10149
53291d1f
AM
10150 if (input_section->sec_info_type == SEC_INFO_TYPE_TARGET
10151 && input_section->size != input_section->rawsize
10152 && (strcmp (input_section->output_section->name, ".init") == 0
10153 || strcmp (input_section->output_section->name, ".fini") == 0))
10154 {
10155 /* Branch around the trampolines. */
10156 unsigned int insn = B + input_section->size - input_section->rawsize;
10157 bfd_put_32 (input_bfd, insn, contents + input_section->rawsize);
10158 }
10159
5446cbdf 10160 if (htab->params->ppc476_workaround
795bc6b3 10161 && input_section->sec_info_type == SEC_INFO_TYPE_TARGET
0e1862bb 10162 && (!bfd_link_relocatable (info)
795bc6b3
AM
10163 || (input_section->output_section->alignment_power
10164 >= htab->params->pagesize_p2)))
5446cbdf 10165 {
5446cbdf 10166 bfd_vma start_addr, end_addr, addr;
795bc6b3 10167 bfd_vma pagesize = (bfd_vma) 1 << htab->params->pagesize_p2;
5446cbdf 10168
5446cbdf 10169 if (relax_info->workaround_size != 0)
40fd06d1
AM
10170 {
10171 bfd_byte *p;
10172 unsigned int n;
10173 bfd_byte fill[4];
10174
10175 bfd_put_32 (input_bfd, BA, fill);
10176 p = contents + input_section->size - relax_info->workaround_size;
10177 n = relax_info->workaround_size >> 2;
10178 while (n--)
10179 {
10180 memcpy (p, fill, 4);
10181 p += 4;
10182 }
10183 }
5446cbdf
AM
10184
10185 /* The idea is: Replace the last instruction on a page with a
10186 branch to a patch area. Put the insn there followed by a
10187 branch back to the next page. Complicated a little by
10188 needing to handle moved conditional branches, and by not
10189 wanting to touch data-in-text. */
10190
10191 start_addr = (input_section->output_section->vma
10192 + input_section->output_offset);
10193 end_addr = (start_addr + input_section->size
10194 - relax_info->workaround_size);
10195 for (addr = ((start_addr & -pagesize) + pagesize - 4);
10196 addr < end_addr;
10197 addr += pagesize)
10198 {
10199 bfd_vma offset = addr - start_addr;
10200 Elf_Internal_Rela *lo, *hi;
10201 bfd_boolean is_data;
10202 bfd_vma patch_off, patch_addr;
10203 unsigned int insn;
10204
10205 /* Do we have a data reloc at this offset? If so, leave
10206 the word alone. */
10207 is_data = FALSE;
10208 lo = relocs;
668e22e5
AM
10209 hi = relend;
10210 rel = NULL;
5446cbdf
AM
10211 while (lo < hi)
10212 {
10213 rel = lo + (hi - lo) / 2;
10214 if (rel->r_offset < offset)
10215 lo = rel + 1;
668e22e5 10216 else if (rel->r_offset > offset + 3)
5446cbdf
AM
10217 hi = rel;
10218 else
10219 {
10220 switch (ELF32_R_TYPE (rel->r_info))
10221 {
10222 case R_PPC_ADDR32:
10223 case R_PPC_UADDR32:
10224 case R_PPC_REL32:
10225 case R_PPC_ADDR30:
10226 is_data = TRUE;
10227 break;
10228 default:
10229 break;
10230 }
10231 break;
10232 }
10233 }
10234 if (is_data)
10235 continue;
10236
b4ab4364
AM
10237 /* Some instructions can be left alone too. Unconditional
10238 branches, except for bcctr with BO=0x14 (bctr, bctrl),
10239 avoid the icache failure.
10240
10241 The problem occurs due to prefetch across a page boundary
10242 where stale instructions can be fetched from the next
10243 page, and the mechanism for flushing these bad
10244 instructions fails under certain circumstances. The
10245 unconditional branches:
10246 1) Branch: b, bl, ba, bla,
10247 2) Branch Conditional: bc, bca, bcl, bcla,
10248 3) Branch Conditional to Link Register: bclr, bclrl,
10249 where (2) and (3) have BO=0x14 making them unconditional,
10250 prevent the bad prefetch because the prefetch itself is
10251 affected by these instructions. This happens even if the
10252 instruction is not executed.
10253
10254 A bctr example:
10255 .
10256 . lis 9,new_page@ha
10257 . addi 9,9,new_page@l
10258 . mtctr 9
10259 . bctr
10260 . nop
10261 . nop
10262 . new_page:
10263 .
10264 The bctr is not predicted taken due to ctr not being
10265 ready, so prefetch continues on past the bctr into the
10266 new page which might have stale instructions. If they
10267 fail to be flushed, then they will be executed after the
10268 bctr executes. Either of the following modifications
10269 prevent the bad prefetch from happening in the first
10270 place:
10271 .
1b786873
L
10272 . lis 9,new_page@ha lis 9,new_page@ha
10273 . addi 9,9,new_page@l addi 9,9,new_page@l
10274 . mtctr 9 mtctr 9
10275 . bctr bctr
b4ab4364 10276 . nop b somewhere_else
1b786873
L
10277 . b somewhere_else nop
10278 . new_page: new_page:
b4ab4364 10279 . */
5446cbdf 10280 insn = bfd_get_32 (input_bfd, contents + offset);
07d6d2b8
AM
10281 if ((insn & (0x3f << 26)) == (18u << 26) /* b,bl,ba,bla */
10282 || ((insn & (0x3f << 26)) == (16u << 26) /* bc,bcl,bca,bcla*/
10283 && (insn & (0x14 << 21)) == (0x14 << 21)) /* with BO=0x14 */
5446cbdf 10284 || ((insn & (0x3f << 26)) == (19u << 26)
b4ab4364 10285 && (insn & (0x3ff << 1)) == (16u << 1) /* bclr,bclrl */
07d6d2b8 10286 && (insn & (0x14 << 21)) == (0x14 << 21)))/* with BO=0x14 */
5446cbdf
AM
10287 continue;
10288
10289 patch_addr = (start_addr + input_section->size
10290 - relax_info->workaround_size);
10291 patch_addr = (patch_addr + 15) & -16;
10292 patch_off = patch_addr - start_addr;
10293 bfd_put_32 (input_bfd, B + patch_off - offset, contents + offset);
668e22e5
AM
10294
10295 if (rel != NULL
10296 && rel->r_offset >= offset
10297 && rel->r_offset < offset + 4)
10298 {
f8b44781
AM
10299 asection *sreloc;
10300
668e22e5
AM
10301 /* If the insn we are patching had a reloc, adjust the
10302 reloc r_offset so that the reloc applies to the moved
10303 location. This matters for -r and --emit-relocs. */
10304 if (rel + 1 != relend)
10305 {
10306 Elf_Internal_Rela tmp = *rel;
10307
10308 /* Keep the relocs sorted by r_offset. */
10309 memmove (rel, rel + 1, (relend - (rel + 1)) * sizeof (*rel));
10310 relend[-1] = tmp;
10311 }
10312 relend[-1].r_offset += patch_off - offset;
f8b44781
AM
10313
10314 /* Adjust REL16 addends too. */
10315 switch (ELF32_R_TYPE (relend[-1].r_info))
10316 {
10317 case R_PPC_REL16:
10318 case R_PPC_REL16_LO:
10319 case R_PPC_REL16_HI:
10320 case R_PPC_REL16_HA:
10321 relend[-1].r_addend += patch_off - offset;
10322 break;
10323 default:
10324 break;
10325 }
10326
10327 /* If we are building a PIE or shared library with
10328 non-PIC objects, perhaps we had a dynamic reloc too?
10329 If so, the dynamic reloc must move with the insn. */
10330 sreloc = elf_section_data (input_section)->sreloc;
10331 if (sreloc != NULL)
10332 {
1d5c94cb 10333 Elf32_External_Rela *slo, *shi, *srelend;
f8b44781
AM
10334 bfd_vma soffset;
10335
1d5c94cb
AM
10336 slo = (Elf32_External_Rela *) sreloc->contents;
10337 shi = srelend = slo + sreloc->reloc_count;
f8b44781
AM
10338 soffset = (offset + input_section->output_section->vma
10339 + input_section->output_offset);
10340 while (slo < shi)
10341 {
1d5c94cb
AM
10342 Elf32_External_Rela *srel = slo + (shi - slo) / 2;
10343 bfd_elf32_swap_reloca_in (output_bfd, (bfd_byte *) srel,
10344 &outrel);
f8b44781
AM
10345 if (outrel.r_offset < soffset)
10346 slo = srel + 1;
10347 else if (outrel.r_offset > soffset + 3)
10348 shi = srel;
10349 else
10350 {
1d5c94cb 10351 if (srel + 1 != srelend)
f8b44781 10352 {
1d5c94cb
AM
10353 memmove (srel, srel + 1,
10354 (srelend - (srel + 1)) * sizeof (*srel));
10355 srel = srelend - 1;
f8b44781
AM
10356 }
10357 outrel.r_offset += patch_off - offset;
1d5c94cb
AM
10358 bfd_elf32_swap_reloca_out (output_bfd, &outrel,
10359 (bfd_byte *) srel);
f8b44781
AM
10360 break;
10361 }
10362 }
10363 }
668e22e5
AM
10364 }
10365 else
10366 rel = NULL;
10367
5446cbdf
AM
10368 if ((insn & (0x3f << 26)) == (16u << 26) /* bc */
10369 && (insn & 2) == 0 /* relative */)
10370 {
10371 bfd_vma delta = ((insn & 0xfffc) ^ 0x8000) - 0x8000;
10372
10373 delta += offset - patch_off;
0e1862bb 10374 if (bfd_link_relocatable (info) && rel != NULL)
668e22e5 10375 delta = 0;
0e1862bb 10376 if (!bfd_link_relocatable (info) && rel != NULL)
668e22e5
AM
10377 {
10378 enum elf_ppc_reloc_type r_type;
10379
10380 r_type = ELF32_R_TYPE (relend[-1].r_info);
10381 if (r_type == R_PPC_REL14_BRTAKEN)
10382 insn |= BRANCH_PREDICT_BIT;
10383 else if (r_type == R_PPC_REL14_BRNTAKEN)
10384 insn &= ~BRANCH_PREDICT_BIT;
10385 else
10386 BFD_ASSERT (r_type == R_PPC_REL14);
10387
10388 if ((r_type == R_PPC_REL14_BRTAKEN
10389 || r_type == R_PPC_REL14_BRNTAKEN)
10390 && delta + 0x8000 < 0x10000
10391 && (bfd_signed_vma) delta < 0)
10392 insn ^= BRANCH_PREDICT_BIT;
10393 }
5446cbdf
AM
10394 if (delta + 0x8000 < 0x10000)
10395 {
10396 bfd_put_32 (input_bfd,
10397 (insn & ~0xfffc) | (delta & 0xfffc),
10398 contents + patch_off);
10399 patch_off += 4;
10400 bfd_put_32 (input_bfd,
10401 B | ((offset + 4 - patch_off) & 0x3fffffc),
10402 contents + patch_off);
10403 patch_off += 4;
10404 }
10405 else
10406 {
668e22e5
AM
10407 if (rel != NULL)
10408 {
10409 unsigned int r_sym = ELF32_R_SYM (relend[-1].r_info);
10410
10411 relend[-1].r_offset += 8;
10412 relend[-1].r_info = ELF32_R_INFO (r_sym, R_PPC_REL24);
10413 }
5446cbdf
AM
10414 bfd_put_32 (input_bfd,
10415 (insn & ~0xfffc) | 8,
10416 contents + patch_off);
10417 patch_off += 4;
10418 bfd_put_32 (input_bfd,
10419 B | ((offset + 4 - patch_off) & 0x3fffffc),
10420 contents + patch_off);
10421 patch_off += 4;
10422 bfd_put_32 (input_bfd,
10423 B | ((delta - 8) & 0x3fffffc),
10424 contents + patch_off);
10425 patch_off += 4;
10426 }
10427 }
10428 else
10429 {
10430 bfd_put_32 (input_bfd, insn, contents + patch_off);
10431 patch_off += 4;
10432 bfd_put_32 (input_bfd,
10433 B | ((offset + 4 - patch_off) & 0x3fffffc),
10434 contents + patch_off);
10435 patch_off += 4;
10436 }
10437 BFD_ASSERT (patch_off <= input_section->size);
10438 relax_info->workaround_size = input_section->size - patch_off;
10439 }
10440 }
10441
252b5132
RH
10442 return ret;
10443}
252b5132 10444\f
49c09209 10445/* Write out the PLT relocs and entries for H. */
c5fccbec 10446
b34976b6 10447static bfd_boolean
49c09209 10448write_global_sym_plt (struct elf_link_hash_entry *h, void *inf)
e1a9cb8e 10449{
49c09209
AM
10450 struct bfd_link_info *info = (struct bfd_link_info *) inf;
10451 struct ppc_elf_link_hash_table *htab = ppc_elf_hash_table (info);
a6aa5195
AM
10452 struct plt_entry *ent;
10453 bfd_boolean doneone;
e1a9cb8e 10454
a6aa5195
AM
10455 doneone = FALSE;
10456 for (ent = h->plt.plist; ent != NULL; ent = ent->next)
10457 if (ent->plt.offset != (bfd_vma) -1)
10458 {
10459 if (!doneone)
10460 {
10461 Elf_Internal_Rela rela;
10462 bfd_byte *loc;
10463 bfd_vma reloc_index;
2d7ad24e
AM
10464 asection *plt = htab->elf.splt;
10465 asection *relplt = htab->elf.srelplt;
e1a9cb8e 10466
e054468f 10467 if (htab->plt_type == PLT_NEW
25f23106
AM
10468 || !htab->elf.dynamic_sections_created
10469 || h->dynindx == -1)
9d8504b1
PB
10470 reloc_index = ent->plt.offset / 4;
10471 else
10472 {
10473 reloc_index = ((ent->plt.offset - htab->plt_initial_entry_size)
10474 / htab->plt_slot_size);
10475 if (reloc_index > PLT_NUM_SINGLE_ENTRIES
4a3dc543 10476 && htab->plt_type == PLT_OLD)
9d8504b1
PB
10477 reloc_index -= (reloc_index - PLT_NUM_SINGLE_ENTRIES) / 2;
10478 }
10479
a6aa5195
AM
10480 /* This symbol has an entry in the procedure linkage table.
10481 Set it up. */
e054468f 10482 if (htab->plt_type == PLT_VXWORKS
25f23106
AM
10483 && htab->elf.dynamic_sections_created
10484 && h->dynindx != -1)
a6aa5195 10485 {
9d8504b1
PB
10486 bfd_vma got_offset;
10487 const bfd_vma *plt_entry;
5b914448 10488
9d8504b1
PB
10489 /* The first three entries in .got.plt are reserved. */
10490 got_offset = (reloc_index + 3) * 4;
10491
10492 /* Use the right PLT. */
0e1862bb 10493 plt_entry = bfd_link_pic (info) ? ppc_elf_vxworks_pic_plt_entry
9d8504b1
PB
10494 : ppc_elf_vxworks_plt_entry;
10495
10496 /* Fill in the .plt on VxWorks. */
0e1862bb 10497 if (bfd_link_pic (info))
9d8504b1 10498 {
49c09209 10499 bfd_put_32 (info->output_bfd,
e87d4038 10500 plt_entry[0] | PPC_HA (got_offset),
2d7ad24e 10501 plt->contents + ent->plt.offset + 0);
49c09209 10502 bfd_put_32 (info->output_bfd,
e87d4038 10503 plt_entry[1] | PPC_LO (got_offset),
2d7ad24e 10504 plt->contents + ent->plt.offset + 4);
9d8504b1
PB
10505 }
10506 else
10507 {
e87d4038 10508 bfd_vma got_loc = got_offset + SYM_VAL (htab->elf.hgot);
9d8504b1 10509
49c09209 10510 bfd_put_32 (info->output_bfd,
e87d4038 10511 plt_entry[0] | PPC_HA (got_loc),
2d7ad24e 10512 plt->contents + ent->plt.offset + 0);
49c09209 10513 bfd_put_32 (info->output_bfd,
e87d4038 10514 plt_entry[1] | PPC_LO (got_loc),
2d7ad24e 10515 plt->contents + ent->plt.offset + 4);
9d8504b1
PB
10516 }
10517
49c09209 10518 bfd_put_32 (info->output_bfd, plt_entry[2],
2d7ad24e 10519 plt->contents + ent->plt.offset + 8);
49c09209 10520 bfd_put_32 (info->output_bfd, plt_entry[3],
2d7ad24e 10521 plt->contents + ent->plt.offset + 12);
9d8504b1
PB
10522
10523 /* This instruction is an immediate load. The value loaded is
10524 the byte offset of the R_PPC_JMP_SLOT relocation from the
10525 start of the .rela.plt section. The value is stored in the
10526 low-order 16 bits of the load instruction. */
10527 /* NOTE: It appears that this is now an index rather than a
10528 prescaled offset. */
49c09209 10529 bfd_put_32 (info->output_bfd,
9d8504b1 10530 plt_entry[4] | reloc_index,
2d7ad24e 10531 plt->contents + ent->plt.offset + 16);
9d8504b1
PB
10532 /* This instruction is a PC-relative branch whose target is
10533 the start of the PLT section. The address of this branch
10534 instruction is 20 bytes beyond the start of this PLT entry.
10535 The address is encoded in bits 6-29, inclusive. The value
10536 stored is right-shifted by two bits, permitting a 26-bit
10537 offset. */
49c09209 10538 bfd_put_32 (info->output_bfd,
5b914448 10539 (plt_entry[5]
9d8504b1 10540 | (-(ent->plt.offset + 20) & 0x03fffffc)),
2d7ad24e 10541 plt->contents + ent->plt.offset + 20);
49c09209 10542 bfd_put_32 (info->output_bfd, plt_entry[6],
2d7ad24e 10543 plt->contents + ent->plt.offset + 24);
49c09209 10544 bfd_put_32 (info->output_bfd, plt_entry[7],
2d7ad24e 10545 plt->contents + ent->plt.offset + 28);
9d8504b1
PB
10546
10547 /* Fill in the GOT entry corresponding to this PLT slot with
a8685210 10548 the address immediately after the "bctr" instruction
9d8504b1 10549 in this PLT entry. */
2d7ad24e
AM
10550 bfd_put_32 (info->output_bfd, (plt->output_section->vma
10551 + plt->output_offset
10552 + ent->plt.offset + 16),
ce558b89 10553 htab->elf.sgotplt->contents + got_offset);
9d8504b1 10554
0e1862bb 10555 if (!bfd_link_pic (info))
9d8504b1
PB
10556 {
10557 /* Fill in a couple of entries in .rela.plt.unloaded. */
10558 loc = htab->srelplt2->contents
10559 + ((VXWORKS_PLTRESOLVE_RELOCS + reloc_index
10560 * VXWORKS_PLT_NON_JMP_SLOT_RELOCS)
10561 * sizeof (Elf32_External_Rela));
10562
10563 /* Provide the @ha relocation for the first instruction. */
2d7ad24e
AM
10564 rela.r_offset = (plt->output_section->vma
10565 + plt->output_offset
9d8504b1 10566 + ent->plt.offset + 2);
636ce3f5 10567 rela.r_info = ELF32_R_INFO (htab->elf.hgot->indx,
9d8504b1
PB
10568 R_PPC_ADDR16_HA);
10569 rela.r_addend = got_offset;
49c09209 10570 bfd_elf32_swap_reloca_out (info->output_bfd, &rela, loc);
9d8504b1
PB
10571 loc += sizeof (Elf32_External_Rela);
10572
10573 /* Provide the @l relocation for the second instruction. */
2d7ad24e
AM
10574 rela.r_offset = (plt->output_section->vma
10575 + plt->output_offset
9d8504b1 10576 + ent->plt.offset + 6);
636ce3f5 10577 rela.r_info = ELF32_R_INFO (htab->elf.hgot->indx,
9d8504b1
PB
10578 R_PPC_ADDR16_LO);
10579 rela.r_addend = got_offset;
49c09209 10580 bfd_elf32_swap_reloca_out (info->output_bfd, &rela, loc);
9d8504b1
PB
10581 loc += sizeof (Elf32_External_Rela);
10582
10583 /* Provide a relocation for the GOT entry corresponding to this
10584 PLT slot. Point it at the middle of the .plt entry. */
ce558b89
AM
10585 rela.r_offset = (htab->elf.sgotplt->output_section->vma
10586 + htab->elf.sgotplt->output_offset
9d8504b1 10587 + got_offset);
7325306f 10588 rela.r_info = ELF32_R_INFO (htab->elf.hplt->indx,
9d8504b1
PB
10589 R_PPC_ADDR32);
10590 rela.r_addend = ent->plt.offset + 16;
49c09209 10591 bfd_elf32_swap_reloca_out (info->output_bfd, &rela, loc);
9d8504b1
PB
10592 }
10593
10594 /* VxWorks uses non-standard semantics for R_PPC_JMP_SLOT.
10595 In particular, the offset for the relocation is not the
10596 address of the PLT entry for this function, as specified
10597 by the ABI. Instead, the offset is set to the address of
10598 the GOT slot for this function. See EABI 4.4.4.1. */
ce558b89
AM
10599 rela.r_offset = (htab->elf.sgotplt->output_section->vma
10600 + htab->elf.sgotplt->output_offset
9d8504b1 10601 + got_offset);
2d7ad24e 10602 rela.r_addend = 0;
a6aa5195
AM
10603 }
10604 else
10605 {
2d7ad24e 10606 rela.r_addend = 0;
25f23106
AM
10607 if (!htab->elf.dynamic_sections_created
10608 || h->dynindx == -1)
2d7ad24e
AM
10609 {
10610 if (h->type == STT_GNU_IFUNC)
10611 {
10612 plt = htab->elf.iplt;
10613 relplt = htab->elf.irelplt;
10614 }
10615 else
10616 {
10617 plt = htab->pltlocal;
10618 relplt = bfd_link_pic (info) ? htab->relpltlocal : NULL;
10619 }
10620 if (h->def_regular
10621 && (h->root.type == bfd_link_hash_defined
10622 || h->root.type == bfd_link_hash_defweak))
10623 rela.r_addend = SYM_VAL (h);
10624 }
e054468f 10625
2d7ad24e 10626 if (relplt == NULL)
9d8504b1 10627 {
2d7ad24e
AM
10628 loc = plt->contents + ent->plt.offset;
10629 bfd_put_32 (info->output_bfd, rela.r_addend, loc);
9d8504b1
PB
10630 }
10631 else
10632 {
2d7ad24e
AM
10633 rela.r_offset = (plt->output_section->vma
10634 + plt->output_offset
10635 + ent->plt.offset);
10636
10637 if (htab->plt_type == PLT_OLD
10638 || !htab->elf.dynamic_sections_created
10639 || h->dynindx == -1)
10640 {
10641 /* We don't need to fill in the .plt. The ppc dynamic
10642 linker will fill it in. */
10643 }
10644 else
10645 {
10646 bfd_vma val = (htab->glink_pltresolve + ent->plt.offset
10647 + htab->glink->output_section->vma
10648 + htab->glink->output_offset);
10649 bfd_put_32 (info->output_bfd, val,
10650 plt->contents + ent->plt.offset);
10651 }
9d8504b1 10652 }
a6aa5195 10653 }
e1a9cb8e 10654
2d7ad24e 10655 if (relplt != NULL)
e054468f 10656 {
2d7ad24e
AM
10657 /* Fill in the entry in the .rela.plt section. */
10658 if (!htab->elf.dynamic_sections_created
10659 || h->dynindx == -1)
10660 {
10661 if (h->type == STT_GNU_IFUNC)
10662 rela.r_info = ELF32_R_INFO (0, R_PPC_IRELATIVE);
10663 else
10664 rela.r_info = ELF32_R_INFO (0, R_PPC_RELATIVE);
10665 loc = relplt->contents + (relplt->reloc_count++
10666 * sizeof (Elf32_External_Rela));
10667 htab->local_ifunc_resolver = 1;
10668 }
10669 else
10670 {
10671 rela.r_info = ELF32_R_INFO (h->dynindx, R_PPC_JMP_SLOT);
10672 loc = relplt->contents + (reloc_index
10673 * sizeof (Elf32_External_Rela));
10674 if (h->type == STT_GNU_IFUNC && is_static_defined (h))
10675 htab->maybe_local_ifunc_resolver = 1;
10676 }
10677 bfd_elf32_swap_reloca_out (info->output_bfd, &rela, loc);
82e66161 10678 }
a6aa5195
AM
10679 doneone = TRUE;
10680 }
e1a9cb8e 10681
e054468f 10682 if (htab->plt_type == PLT_NEW
25f23106
AM
10683 || !htab->elf.dynamic_sections_created
10684 || h->dynindx == -1)
a6aa5195 10685 {
a7f2871e 10686 unsigned char *p;
49c09209 10687 asection *plt = htab->elf.splt;
9e390558 10688
25f23106
AM
10689 if (!htab->elf.dynamic_sections_created
10690 || h->dynindx == -1)
2d7ad24e
AM
10691 {
10692 if (h->type == STT_GNU_IFUNC)
10693 plt = htab->elf.iplt;
10694 else
10695 break;
10696 }
e1a9cb8e 10697
a7f2871e 10698 p = (unsigned char *) htab->glink->contents + ent->glink_offset;
49c09209 10699 write_glink_stub (h, ent, plt, p, info);
e1a9cb8e 10700
0e1862bb 10701 if (!bfd_link_pic (info))
e054468f
AM
10702 /* We only need one non-PIC glink stub. */
10703 break;
a6aa5195
AM
10704 }
10705 else
10706 break;
10707 }
49c09209
AM
10708 return TRUE;
10709}
10710
10711/* Finish up PLT handling. */
10712
10713bfd_boolean
10714ppc_finish_symbols (struct bfd_link_info *info)
10715{
10716 struct ppc_elf_link_hash_table *htab = ppc_elf_hash_table (info);
10717 bfd *ibfd;
10718
10719 if (!htab)
10720 return TRUE;
10721
10722 elf_link_hash_traverse (&htab->elf, write_global_sym_plt, info);
10723
10724 for (ibfd = info->input_bfds; ibfd != NULL; ibfd = ibfd->link.next)
10725 {
10726 bfd_vma *local_got, *end_local_got;
10727 struct plt_entry **local_plt, **lplt, **end_local_plt;
10728 Elf_Internal_Shdr *symtab_hdr;
10729 bfd_size_type locsymcount;
10730 Elf_Internal_Sym *local_syms = NULL;
10731 struct plt_entry *ent;
10732
10733 if (!is_ppc_elf (ibfd))
10734 continue;
10735
10736 local_got = elf_local_got_offsets (ibfd);
10737 if (!local_got)
10738 continue;
10739
10740 symtab_hdr = &elf_symtab_hdr (ibfd);
10741 locsymcount = symtab_hdr->sh_info;
10742 end_local_got = local_got + locsymcount;
10743 local_plt = (struct plt_entry **) end_local_got;
10744 end_local_plt = local_plt + locsymcount;
10745 for (lplt = local_plt; lplt < end_local_plt; ++lplt)
10746 for (ent = *lplt; ent != NULL; ent = ent->next)
10747 {
10748 if (ent->plt.offset != (bfd_vma) -1)
10749 {
10750 Elf_Internal_Sym *sym;
10751 asection *sym_sec;
10752 asection *plt, *relplt;
10753 bfd_byte *loc;
10754 bfd_vma val;
10755 Elf_Internal_Rela rela;
10756
10757 if (!get_sym_h (NULL, &sym, &sym_sec, NULL, &local_syms,
10758 lplt - local_plt, ibfd))
10759 {
10760 if (local_syms != NULL
10761 && symtab_hdr->contents != (unsigned char *) local_syms)
10762 free (local_syms);
10763 return FALSE;
10764 }
10765
10766 val = sym->st_value;
10767 if (sym_sec != NULL && sym_sec->output_section != NULL)
10768 val += sym_sec->output_offset + sym_sec->output_section->vma;
10769
2d7ad24e
AM
10770 if (ELF_ST_TYPE (sym->st_info) == STT_GNU_IFUNC)
10771 {
10772 htab->local_ifunc_resolver = 1;
10773 plt = htab->elf.iplt;
10774 relplt = htab->elf.irelplt;
10775 rela.r_info = ELF32_R_INFO (0, R_PPC_IRELATIVE);
10776 }
10777 else
10778 {
10779 plt = htab->pltlocal;
10780 if (bfd_link_pic (info))
10781 {
10782 relplt = htab->relpltlocal;
10783 rela.r_info = ELF32_R_INFO (0, R_PPC_RELATIVE);
10784 }
10785 else
10786 {
10787 loc = plt->contents + ent->plt.offset;
10788 bfd_put_32 (info->output_bfd, val, loc);
10789 continue;
10790 }
10791 }
49c09209
AM
10792
10793 rela.r_offset = (ent->plt.offset
10794 + plt->output_offset
10795 + plt->output_section->vma);
49c09209
AM
10796 rela.r_addend = val;
10797 loc = relplt->contents + (relplt->reloc_count++
10798 * sizeof (Elf32_External_Rela));
10799 bfd_elf32_swap_reloca_out (info->output_bfd, &rela, loc);
10800 }
10801 if ((ent->glink_offset & 1) == 0)
10802 {
10803 unsigned char *p = ((unsigned char *) htab->glink->contents
10804 + ent->glink_offset);
10805
10806 write_glink_stub (NULL, ent, htab->elf.iplt, p, info);
10807 ent->glink_offset |= 1;
10808 }
10809 }
10810
10811 if (local_syms != NULL
10812 && symtab_hdr->contents != (unsigned char *) local_syms)
10813 {
10814 if (!info->keep_memory)
10815 free (local_syms);
10816 else
10817 symtab_hdr->contents = (unsigned char *) local_syms;
10818 }
10819 }
10820 return TRUE;
10821}
10822
10823/* Finish up dynamic symbol handling. We set the contents of various
10824 dynamic sections here. */
10825
10826static bfd_boolean
10827ppc_elf_finish_dynamic_symbol (bfd *output_bfd,
10828 struct bfd_link_info *info,
10829 struct elf_link_hash_entry *h,
10830 Elf_Internal_Sym *sym)
10831{
10832 struct ppc_elf_link_hash_table *htab = ppc_elf_hash_table (info);
10833 struct plt_entry *ent;
10834
10835#ifdef DEBUG
10836 fprintf (stderr, "ppc_elf_finish_dynamic_symbol called for %s",
10837 h->root.root.string);
10838#endif
10839
10840 if (!h->def_regular
10841 || (h->type == STT_GNU_IFUNC && !bfd_link_pic (info)))
10842 for (ent = h->plt.plist; ent != NULL; ent = ent->next)
10843 if (ent->plt.offset != (bfd_vma) -1)
10844 {
10845 if (!h->def_regular)
10846 {
10847 /* Mark the symbol as undefined, rather than as
10848 defined in the .plt section. Leave the value if
10849 there were any relocations where pointer equality
10850 matters (this is a clue for the dynamic linker, to
10851 make function pointer comparisons work between an
10852 application and shared library), otherwise set it
10853 to zero. */
10854 sym->st_shndx = SHN_UNDEF;
10855 if (!h->pointer_equality_needed)
10856 sym->st_value = 0;
10857 else if (!h->ref_regular_nonweak)
10858 {
10859 /* This breaks function pointer comparisons, but
10860 that is better than breaking tests for a NULL
10861 function pointer. */
10862 sym->st_value = 0;
10863 }
10864 }
10865 else
10866 {
10867 /* Set the value of ifunc symbols in a non-pie
10868 executable to the glink entry. This is to avoid
10869 text relocations. We can't do this for ifunc in
10870 allocate_dynrelocs, as we do for normal dynamic
10871 function symbols with plt entries, because we need
10872 to keep the original value around for the ifunc
10873 relocation. */
10874 sym->st_shndx
10875 = (_bfd_elf_section_from_bfd_section
10876 (info->output_bfd, htab->glink->output_section));
10877 sym->st_value = (ent->glink_offset
10878 + htab->glink->output_offset
10879 + htab->glink->output_section->vma);
10880 }
10881 break;
10882 }
e1a9cb8e 10883
25dbc73a
AM
10884 if (h->needs_copy)
10885 {
10886 asection *s;
10887 Elf_Internal_Rela rela;
10888 bfd_byte *loc;
e1a9cb8e 10889
25dbc73a 10890 /* This symbols needs a copy reloc. Set it up. */
e1a9cb8e 10891
25dbc73a
AM
10892#ifdef DEBUG
10893 fprintf (stderr, ", copy");
10894#endif
e1a9cb8e 10895
25dbc73a 10896 BFD_ASSERT (h->dynindx != -1);
86bbe32f 10897
4dc4a9a5 10898 if (ppc_elf_hash_entry (h)->has_sda_refs)
25dbc73a 10899 s = htab->relsbss;
afbf7e8e 10900 else if (h->root.u.def.section == htab->elf.sdynrelro)
5474d94f 10901 s = htab->elf.sreldynrelro;
25dbc73a 10902 else
9d19e4fd 10903 s = htab->elf.srelbss;
25dbc73a 10904 BFD_ASSERT (s != NULL);
e1a9cb8e 10905
e87d4038 10906 rela.r_offset = SYM_VAL (h);
25dbc73a
AM
10907 rela.r_info = ELF32_R_INFO (h->dynindx, R_PPC_COPY);
10908 rela.r_addend = 0;
10909 loc = s->contents + s->reloc_count++ * sizeof (Elf32_External_Rela);
10910 bfd_elf32_swap_reloca_out (output_bfd, &rela, loc);
10911 }
e1a9cb8e 10912
25dbc73a
AM
10913#ifdef DEBUG
10914 fprintf (stderr, "\n");
10915#endif
e1a9cb8e 10916
25dbc73a
AM
10917 return TRUE;
10918}
10919\f
10920static enum elf_reloc_type_class
7e612e98
AM
10921ppc_elf_reloc_type_class (const struct bfd_link_info *info,
10922 const asection *rel_sec,
10923 const Elf_Internal_Rela *rela)
e1a9cb8e 10924{
7e612e98
AM
10925 struct ppc_elf_link_hash_table *htab = ppc_elf_hash_table (info);
10926
ce558b89 10927 if (rel_sec == htab->elf.irelplt)
7e612e98
AM
10928 return reloc_class_ifunc;
10929
25dbc73a
AM
10930 switch (ELF32_R_TYPE (rela->r_info))
10931 {
10932 case R_PPC_RELATIVE:
10933 return reloc_class_relative;
25dbc73a
AM
10934 case R_PPC_JMP_SLOT:
10935 return reloc_class_plt;
10936 case R_PPC_COPY:
10937 return reloc_class_copy;
10938 default:
10939 return reloc_class_normal;
10940 }
e1a9cb8e 10941}
25dbc73a
AM
10942\f
10943/* Finish up the dynamic sections. */
e1a9cb8e 10944
25dbc73a
AM
10945static bfd_boolean
10946ppc_elf_finish_dynamic_sections (bfd *output_bfd,
10947 struct bfd_link_info *info)
e1a9cb8e 10948{
25dbc73a
AM
10949 asection *sdyn;
10950 struct ppc_elf_link_hash_table *htab;
1fe44d79 10951 bfd_vma got;
e87d4038
AM
10952 bfd *dynobj;
10953 bfd_boolean ret = TRUE;
e1a9cb8e 10954
25dbc73a
AM
10955#ifdef DEBUG
10956 fprintf (stderr, "ppc_elf_finish_dynamic_sections called\n");
10957#endif
6b0817e5 10958
25dbc73a 10959 htab = ppc_elf_hash_table (info);
ce558b89 10960 dynobj = htab->elf.dynobj;
3d4d4302 10961 sdyn = bfd_get_linker_section (dynobj, ".dynamic");
e1a9cb8e 10962
1fe44d79
AM
10963 got = 0;
10964 if (htab->elf.hgot != NULL)
e87d4038 10965 got = SYM_VAL (htab->elf.hgot);
1fe44d79 10966
25dbc73a 10967 if (htab->elf.dynamic_sections_created)
e1a9cb8e 10968 {
25dbc73a 10969 Elf32_External_Dyn *dyncon, *dynconend;
e1a9cb8e 10970
ce558b89 10971 BFD_ASSERT (htab->elf.splt != NULL && sdyn != NULL);
86bbe32f 10972
25dbc73a
AM
10973 dyncon = (Elf32_External_Dyn *) sdyn->contents;
10974 dynconend = (Elf32_External_Dyn *) (sdyn->contents + sdyn->size);
10975 for (; dyncon < dynconend; dyncon++)
10976 {
10977 Elf_Internal_Dyn dyn;
10978 asection *s;
e1a9cb8e 10979
9d8504b1 10980 bfd_elf32_swap_dyn_in (dynobj, dyncon, &dyn);
86bbe32f 10981
25dbc73a
AM
10982 switch (dyn.d_tag)
10983 {
10984 case DT_PLTGOT:
9d8504b1 10985 if (htab->is_vxworks)
ce558b89 10986 s = htab->elf.sgotplt;
9d8504b1 10987 else
ce558b89 10988 s = htab->elf.splt;
25dbc73a
AM
10989 dyn.d_un.d_ptr = s->output_section->vma + s->output_offset;
10990 break;
86bbe32f 10991
25dbc73a 10992 case DT_PLTRELSZ:
ce558b89 10993 dyn.d_un.d_val = htab->elf.srelplt->size;
25dbc73a 10994 break;
e1a9cb8e 10995
25dbc73a 10996 case DT_JMPREL:
ce558b89 10997 s = htab->elf.srelplt;
25dbc73a
AM
10998 dyn.d_un.d_ptr = s->output_section->vma + s->output_offset;
10999 break;
2f89ff8d 11000
1fe44d79
AM
11001 case DT_PPC_GOT:
11002 dyn.d_un.d_ptr = got;
d7128ce4
AM
11003 break;
11004
82e66161
AM
11005 case DT_TEXTREL:
11006 if (htab->local_ifunc_resolver)
11007 info->callbacks->einfo
11008 (_("%X%P: text relocations and GNU indirect "
11009 "functions will result in a segfault at runtime\n"));
11010 else if (htab->maybe_local_ifunc_resolver)
11011 info->callbacks->einfo
11012 (_("%P: warning: text relocations and GNU indirect "
11013 "functions may result in a segfault at runtime\n"));
11014 continue;
11015
25dbc73a 11016 default:
7a2b07ff
NS
11017 if (htab->is_vxworks
11018 && elf_vxworks_finish_dynamic_entry (output_bfd, &dyn))
11019 break;
25dbc73a
AM
11020 continue;
11021 }
4c45e5c9 11022
25dbc73a
AM
11023 bfd_elf32_swap_dyn_out (output_bfd, &dyn, dyncon);
11024 }
11025 }
4c45e5c9 11026
6528b6eb
AM
11027 if (htab->elf.sgot != NULL
11028 && htab->elf.sgot->output_section != bfd_abs_section_ptr)
25dbc73a 11029 {
ce558b89
AM
11030 if (htab->elf.hgot->root.u.def.section == htab->elf.sgot
11031 || htab->elf.hgot->root.u.def.section == htab->elf.sgotplt)
e87d4038 11032 {
e79f5955 11033 unsigned char *p = htab->elf.hgot->root.u.def.section->contents;
2f89ff8d 11034
e87d4038
AM
11035 p += htab->elf.hgot->root.u.def.value;
11036 if (htab->plt_type == PLT_OLD)
e79f5955
AM
11037 {
11038 /* Add a blrl instruction at _GLOBAL_OFFSET_TABLE_-4
11039 so that a function can easily find the address of
11040 _GLOBAL_OFFSET_TABLE_. */
11041 BFD_ASSERT (htab->elf.hgot->root.u.def.value - 4
11042 < htab->elf.hgot->root.u.def.section->size);
11043 bfd_put_32 (output_bfd, 0x4e800021, p - 4);
11044 }
3b36f7e6 11045
e87d4038 11046 if (sdyn != NULL)
e79f5955
AM
11047 {
11048 bfd_vma val = sdyn->output_section->vma + sdyn->output_offset;
11049 BFD_ASSERT (htab->elf.hgot->root.u.def.value
11050 < htab->elf.hgot->root.u.def.section->size);
11051 bfd_put_32 (output_bfd, val, p);
11052 }
e87d4038
AM
11053 }
11054 else
11055 {
695344c0 11056 /* xgettext:c-format */
cf97bcb0
AM
11057 _bfd_error_handler (_("%s not defined in linker created %pA"),
11058 htab->elf.hgot->root.root.string,
11059 (htab->elf.sgotplt != NULL
11060 ? htab->elf.sgotplt : htab->elf.sgot));
e87d4038
AM
11061 bfd_set_error (bfd_error_bad_value);
11062 ret = FALSE;
11063 }
25dbc73a 11064
ce558b89 11065 elf_section_data (htab->elf.sgot->output_section)->this_hdr.sh_entsize = 4;
25dbc73a
AM
11066 }
11067
9d8504b1 11068 /* Fill in the first entry in the VxWorks procedure linkage table. */
6528b6eb
AM
11069 if (htab->is_vxworks
11070 && htab->elf.splt != NULL
11071 && htab->elf.splt->size != 0
11072 && htab->elf.splt->output_section != bfd_abs_section_ptr)
9d8504b1 11073 {
6528b6eb 11074 asection *splt = htab->elf.splt;
9d8504b1 11075 /* Use the right PLT. */
0e1862bb 11076 const bfd_vma *plt_entry = (bfd_link_pic (info)
5b914448
AM
11077 ? ppc_elf_vxworks_pic_plt0_entry
11078 : ppc_elf_vxworks_plt0_entry);
9d8504b1 11079
0e1862bb 11080 if (!bfd_link_pic (info))
9d8504b1 11081 {
e87d4038 11082 bfd_vma got_value = SYM_VAL (htab->elf.hgot);
9d8504b1 11083
e87d4038 11084 bfd_put_32 (output_bfd, plt_entry[0] | PPC_HA (got_value),
9d8504b1 11085 splt->contents + 0);
e87d4038 11086 bfd_put_32 (output_bfd, plt_entry[1] | PPC_LO (got_value),
9d8504b1
PB
11087 splt->contents + 4);
11088 }
11089 else
11090 {
11091 bfd_put_32 (output_bfd, plt_entry[0], splt->contents + 0);
11092 bfd_put_32 (output_bfd, plt_entry[1], splt->contents + 4);
11093 }
11094 bfd_put_32 (output_bfd, plt_entry[2], splt->contents + 8);
11095 bfd_put_32 (output_bfd, plt_entry[3], splt->contents + 12);
11096 bfd_put_32 (output_bfd, plt_entry[4], splt->contents + 16);
11097 bfd_put_32 (output_bfd, plt_entry[5], splt->contents + 20);
11098 bfd_put_32 (output_bfd, plt_entry[6], splt->contents + 24);
11099 bfd_put_32 (output_bfd, plt_entry[7], splt->contents + 28);
11100
0e1862bb 11101 if (! bfd_link_pic (info))
9d8504b1
PB
11102 {
11103 Elf_Internal_Rela rela;
11104 bfd_byte *loc;
11105
11106 loc = htab->srelplt2->contents;
11107
11108 /* Output the @ha relocation for the first instruction. */
ce558b89
AM
11109 rela.r_offset = (htab->elf.splt->output_section->vma
11110 + htab->elf.splt->output_offset
9d8504b1 11111 + 2);
636ce3f5 11112 rela.r_info = ELF32_R_INFO (htab->elf.hgot->indx, R_PPC_ADDR16_HA);
9d8504b1
PB
11113 rela.r_addend = 0;
11114 bfd_elf32_swap_reloca_out (output_bfd, &rela, loc);
11115 loc += sizeof (Elf32_External_Rela);
5b914448 11116
9d8504b1 11117 /* Output the @l relocation for the second instruction. */
ce558b89
AM
11118 rela.r_offset = (htab->elf.splt->output_section->vma
11119 + htab->elf.splt->output_offset
9d8504b1 11120 + 6);
636ce3f5 11121 rela.r_info = ELF32_R_INFO (htab->elf.hgot->indx, R_PPC_ADDR16_LO);
9d8504b1
PB
11122 rela.r_addend = 0;
11123 bfd_elf32_swap_reloca_out (output_bfd, &rela, loc);
11124 loc += sizeof (Elf32_External_Rela);
11125
11126 /* Fix up the remaining relocations. They may have the wrong
11127 symbol index for _G_O_T_ or _P_L_T_ depending on the order
11128 in which symbols were output. */
11129 while (loc < htab->srelplt2->contents + htab->srelplt2->size)
11130 {
11131 Elf_Internal_Rela rel;
11132
11133 bfd_elf32_swap_reloc_in (output_bfd, loc, &rel);
636ce3f5 11134 rel.r_info = ELF32_R_INFO (htab->elf.hgot->indx, R_PPC_ADDR16_HA);
9d8504b1
PB
11135 bfd_elf32_swap_reloc_out (output_bfd, &rel, loc);
11136 loc += sizeof (Elf32_External_Rela);
11137
11138 bfd_elf32_swap_reloc_in (output_bfd, loc, &rel);
636ce3f5 11139 rel.r_info = ELF32_R_INFO (htab->elf.hgot->indx, R_PPC_ADDR16_LO);
9d8504b1
PB
11140 bfd_elf32_swap_reloc_out (output_bfd, &rel, loc);
11141 loc += sizeof (Elf32_External_Rela);
11142
11143 bfd_elf32_swap_reloc_in (output_bfd, loc, &rel);
7325306f 11144 rel.r_info = ELF32_R_INFO (htab->elf.hplt->indx, R_PPC_ADDR32);
9d8504b1
PB
11145 bfd_elf32_swap_reloc_out (output_bfd, &rel, loc);
11146 loc += sizeof (Elf32_External_Rela);
11147 }
11148 }
11149 }
11150
e054468f
AM
11151 if (htab->glink != NULL
11152 && htab->glink->contents != NULL
11153 && htab->elf.dynamic_sections_created)
d7128ce4
AM
11154 {
11155 unsigned char *p;
11156 unsigned char *endp;
a6aa5195 11157 bfd_vma res0;
a6aa5195
AM
11158
11159 /*
11160 * PIC glink code is the following:
11161 *
11162 * # ith PLT code stub.
11163 * addis 11,30,(plt+(i-1)*4-got)@ha
11164 * lwz 11,(plt+(i-1)*4-got)@l(11)
11165 * mtctr 11
11166 * bctr
11167 *
11168 * # A table of branches, one for each plt entry.
176a0d42 11169 * # The idea is that the plt call stub loads ctr and r11 with these
a6aa5195
AM
11170 * # addresses, so (r11 - res_0) gives the plt index * 4.
11171 * res_0: b PLTresolve
11172 * res_1: b PLTresolve
11173 * .
11174 * # Some number of entries towards the end can be nops
11175 * res_n_m3: nop
11176 * res_n_m2: nop
11177 * res_n_m1:
11178 *
11179 * PLTresolve:
11180 * addis 11,11,(1f-res_0)@ha
11181 * mflr 0
11182 * bcl 20,31,1f
11183 * 1: addi 11,11,(1b-res_0)@l
11184 * mflr 12
11185 * mtlr 0
07d6d2b8 11186 * sub 11,11,12 # r11 = index * 4
a6aa5195 11187 * addis 12,12,(got+4-1b)@ha
07d6d2b8
AM
11188 * lwz 0,(got+4-1b)@l(12) # got[1] address of dl_runtime_resolve
11189 * lwz 12,(got+8-1b)@l(12) # got[2] contains the map address
a6aa5195
AM
11190 * mtctr 0
11191 * add 0,11,11
07d6d2b8 11192 * add 11,0,11 # r11 = index * 12 = reloc offset.
a6aa5195 11193 * bctr
9e390558 11194 *
176a0d42
AM
11195 * Non-PIC glink code is a little simpler.
11196 *
11197 * # ith PLT code stub.
11198 * lis 11,(plt+(i-1)*4)@ha
11199 * lwz 11,(plt+(i-1)*4)@l(11)
11200 * mtctr 11
11201 * bctr
11202 *
11203 * The branch table is the same, then comes
11204 *
11205 * PLTresolve:
11206 * lis 12,(got+4)@ha
11207 * addis 11,11,(-res_0)@ha
07d6d2b8
AM
11208 * lwz 0,(got+4)@l(12) # got[1] address of dl_runtime_resolve
11209 * addi 11,11,(-res_0)@l # r11 = index * 4
176a0d42
AM
11210 * mtctr 0
11211 * add 0,11,11
07d6d2b8
AM
11212 * lwz 12,(got+8)@l(12) # got[2] contains the map address
11213 * add 11,0,11 # r11 = index * 12 = reloc offset.
176a0d42
AM
11214 * bctr
11215 */
7e8aeb9a 11216
a6aa5195 11217 /* Build the branch table, one for each plt entry (less one),
86b9da88 11218 and perhaps some padding. */
a6aa5195
AM
11219 p = htab->glink->contents;
11220 p += htab->glink_pltresolve;
86b9da88
AM
11221 endp = htab->glink->contents;
11222 endp += htab->glink->size - GLINK_PLTRESOLVE;
da3a2088 11223 while (p < endp - (htab->params->ppc476_workaround ? 0 : 8 * 4))
86b9da88
AM
11224 {
11225 bfd_put_32 (output_bfd, B + endp - p, p);
11226 p += 4;
11227 }
11228 while (p < endp)
11229 {
11230 bfd_put_32 (output_bfd, NOP, p);
11231 p += 4;
11232 }
11233
7e8aeb9a 11234 res0 = (htab->glink_pltresolve
86b9da88
AM
11235 + htab->glink->output_section->vma
11236 + htab->glink->output_offset);
11237
da3a2088
AM
11238 if (htab->params->ppc476_workaround)
11239 {
11240 /* Ensure that a call stub at the end of a page doesn't
11241 result in prefetch over the end of the page into the
11242 glink branch table. */
11243 bfd_vma pagesize = (bfd_vma) 1 << htab->params->pagesize_p2;
11244 bfd_vma page_addr;
11245 bfd_vma glink_start = (htab->glink->output_section->vma
11246 + htab->glink->output_offset);
11247
11248 for (page_addr = res0 & -pagesize;
11249 page_addr > glink_start;
11250 page_addr -= pagesize)
11251 {
11252 /* We have a plt call stub that may need fixing. */
11253 bfd_byte *loc;
11254 unsigned int insn;
11255
11256 loc = htab->glink->contents + page_addr - 4 - glink_start;
11257 insn = bfd_get_32 (output_bfd, loc);
11258 if (insn == BCTR)
11259 {
11260 /* By alignment, we know that there must be at least
11261 one other call stub before this one. */
11262 insn = bfd_get_32 (output_bfd, loc - 16);
11263 if (insn == BCTR)
11264 bfd_put_32 (output_bfd, B | (-16 & 0x3fffffc), loc);
11265 else
11266 bfd_put_32 (output_bfd, B | (-20 & 0x3fffffc), loc);
11267 }
11268 }
11269 }
11270
86b9da88 11271 /* Last comes the PLTresolve stub. */
9e390558 11272 endp = p + GLINK_PLTRESOLVE;
0e1862bb 11273 if (bfd_link_pic (info))
7e8aeb9a 11274 {
a6aa5195 11275 bfd_vma bcl;
d7128ce4 11276
a6aa5195
AM
11277 bcl = (htab->glink->size - GLINK_PLTRESOLVE + 3*4
11278 + htab->glink->output_section->vma
11279 + htab->glink->output_offset);
11280
9e390558
AM
11281 bfd_put_32 (output_bfd, ADDIS_11_11 + PPC_HA (bcl - res0), p);
11282 p += 4;
11283 bfd_put_32 (output_bfd, MFLR_0, p);
11284 p += 4;
11285 bfd_put_32 (output_bfd, BCL_20_31, p);
11286 p += 4;
11287 bfd_put_32 (output_bfd, ADDI_11_11 + PPC_LO (bcl - res0), p);
11288 p += 4;
11289 bfd_put_32 (output_bfd, MFLR_12, p);
11290 p += 4;
11291 bfd_put_32 (output_bfd, MTLR_0, p);
11292 p += 4;
11293 bfd_put_32 (output_bfd, SUB_11_11_12, p);
11294 p += 4;
11295 bfd_put_32 (output_bfd, ADDIS_12_12 + PPC_HA (got + 4 - bcl), p);
11296 p += 4;
a6aa5195
AM
11297 if (PPC_HA (got + 4 - bcl) == PPC_HA (got + 8 - bcl))
11298 {
9e390558
AM
11299 bfd_put_32 (output_bfd, LWZ_0_12 + PPC_LO (got + 4 - bcl), p);
11300 p += 4;
11301 bfd_put_32 (output_bfd, LWZ_12_12 + PPC_LO (got + 8 - bcl), p);
11302 p += 4;
a6aa5195
AM
11303 }
11304 else
11305 {
9e390558
AM
11306 bfd_put_32 (output_bfd, LWZU_0_12 + PPC_LO (got + 4 - bcl), p);
11307 p += 4;
11308 bfd_put_32 (output_bfd, LWZ_12_12 + 4, p);
11309 p += 4;
a6aa5195 11310 }
9e390558
AM
11311 bfd_put_32 (output_bfd, MTCTR_0, p);
11312 p += 4;
11313 bfd_put_32 (output_bfd, ADD_0_11_11, p);
7e8aeb9a
AM
11314 }
11315 else
d7128ce4 11316 {
9e390558
AM
11317 bfd_put_32 (output_bfd, LIS_12 + PPC_HA (got + 4), p);
11318 p += 4;
11319 bfd_put_32 (output_bfd, ADDIS_11_11 + PPC_HA (-res0), p);
11320 p += 4;
a6aa5195 11321 if (PPC_HA (got + 4) == PPC_HA (got + 8))
9e390558 11322 bfd_put_32 (output_bfd, LWZ_0_12 + PPC_LO (got + 4), p);
a6aa5195 11323 else
9e390558
AM
11324 bfd_put_32 (output_bfd, LWZU_0_12 + PPC_LO (got + 4), p);
11325 p += 4;
11326 bfd_put_32 (output_bfd, ADDI_11_11 + PPC_LO (-res0), p);
11327 p += 4;
11328 bfd_put_32 (output_bfd, MTCTR_0, p);
11329 p += 4;
11330 bfd_put_32 (output_bfd, ADD_0_11_11, p);
11331 p += 4;
11332 if (PPC_HA (got + 4) == PPC_HA (got + 8))
11333 bfd_put_32 (output_bfd, LWZ_12_12 + PPC_LO (got + 8), p);
11334 else
11335 bfd_put_32 (output_bfd, LWZ_12_12 + 4, p);
11336 }
11337 p += 4;
11338 bfd_put_32 (output_bfd, ADD_11_0_11, p);
11339 p += 4;
407aa07c
AM
11340 bfd_put_32 (output_bfd, BCTR, p);
11341 p += 4;
9e390558
AM
11342 while (p < endp)
11343 {
11344 bfd_put_32 (output_bfd,
11345 htab->params->ppc476_workaround ? BA : NOP, p);
11346 p += 4;
d7128ce4 11347 }
9e390558 11348 BFD_ASSERT (p == endp);
d7128ce4
AM
11349 }
11350
6177242a
AM
11351 if (htab->glink_eh_frame != NULL
11352 && htab->glink_eh_frame->contents != NULL)
11353 {
11354 unsigned char *p = htab->glink_eh_frame->contents;
11355 bfd_vma val;
11356
6177242a
AM
11357 p += sizeof (glink_eh_frame_cie);
11358 /* FDE length. */
6177242a
AM
11359 p += 4;
11360 /* CIE pointer. */
6177242a
AM
11361 p += 4;
11362 /* Offset to .glink. */
11363 val = (htab->glink->output_section->vma
11364 + htab->glink->output_offset);
11365 val -= (htab->glink_eh_frame->output_section->vma
11366 + htab->glink_eh_frame->output_offset);
11367 val -= p - htab->glink_eh_frame->contents;
11368 bfd_put_32 (htab->elf.dynobj, val, p);
6177242a 11369
dbaa2011 11370 if (htab->glink_eh_frame->sec_info_type == SEC_INFO_TYPE_EH_FRAME
6177242a
AM
11371 && !_bfd_elf_write_section_eh_frame (output_bfd, info,
11372 htab->glink_eh_frame,
11373 htab->glink_eh_frame->contents))
11374 return FALSE;
11375 }
11376
e87d4038 11377 return ret;
25dbc73a 11378}
e1a9cb8e 11379\f
6d00b590 11380#define TARGET_LITTLE_SYM powerpc_elf32_le_vec
252b5132 11381#define TARGET_LITTLE_NAME "elf32-powerpcle"
6d00b590 11382#define TARGET_BIG_SYM powerpc_elf32_vec
252b5132
RH
11383#define TARGET_BIG_NAME "elf32-powerpc"
11384#define ELF_ARCH bfd_arch_powerpc
ae95ffa6 11385#define ELF_TARGET_ID PPC32_ELF_DATA
252b5132
RH
11386#define ELF_MACHINE_CODE EM_PPC
11387#define ELF_MAXPAGESIZE 0x10000
702d1671
AM
11388#define ELF_COMMONPAGESIZE 0x1000
11389#define ELF_RELROPAGESIZE ELF_MAXPAGESIZE
252b5132
RH
11390#define elf_info_to_howto ppc_elf_info_to_howto
11391
11392#ifdef EM_CYGNUS_POWERPC
11393#define ELF_MACHINE_ALT1 EM_CYGNUS_POWERPC
11394#endif
11395
11396#ifdef EM_PPC_OLD
11397#define ELF_MACHINE_ALT2 EM_PPC_OLD
11398#endif
11399
11400#define elf_backend_plt_not_loaded 1
5474d94f 11401#define elf_backend_want_dynrelro 1
252b5132 11402#define elf_backend_can_gc_sections 1
51b64d56 11403#define elf_backend_can_refcount 1
b491616a 11404#define elf_backend_rela_normal 1
53291d1f 11405#define elf_backend_caches_rawsize 1
252b5132 11406
43c40ab2 11407#define bfd_elf32_mkobject ppc_elf_mkobject
252b5132 11408#define bfd_elf32_bfd_merge_private_bfd_data ppc_elf_merge_private_bfd_data
70bccea4 11409#define bfd_elf32_bfd_relax_section ppc_elf_relax_section
252b5132 11410#define bfd_elf32_bfd_reloc_type_lookup ppc_elf_reloc_type_lookup
b9c361e0 11411#define bfd_elf32_bfd_reloc_name_lookup ppc_elf_reloc_name_lookup
252b5132 11412#define bfd_elf32_bfd_set_private_flags ppc_elf_set_private_flags
70bccea4 11413#define bfd_elf32_bfd_link_hash_table_create ppc_elf_link_hash_table_create
468392fb 11414#define bfd_elf32_get_synthetic_symtab ppc_elf_get_synthetic_symtab
252b5132 11415
feee612b 11416#define elf_backend_object_p ppc_elf_object_p
252b5132 11417#define elf_backend_gc_mark_hook ppc_elf_gc_mark_hook
252b5132
RH
11418#define elf_backend_section_from_shdr ppc_elf_section_from_shdr
11419#define elf_backend_relocate_section ppc_elf_relocate_section
11420#define elf_backend_create_dynamic_sections ppc_elf_create_dynamic_sections
11421#define elf_backend_check_relocs ppc_elf_check_relocs
c0e331c7 11422#define elf_backend_relocs_compatible _bfd_elf_relocs_compatible
7fce784e 11423#define elf_backend_copy_indirect_symbol ppc_elf_copy_indirect_symbol
252b5132
RH
11424#define elf_backend_adjust_dynamic_symbol ppc_elf_adjust_dynamic_symbol
11425#define elf_backend_add_symbol_hook ppc_elf_add_symbol_hook
11426#define elf_backend_size_dynamic_sections ppc_elf_size_dynamic_sections
0eb4a168 11427#define elf_backend_hash_symbol ppc_elf_hash_symbol
252b5132
RH
11428#define elf_backend_finish_dynamic_symbol ppc_elf_finish_dynamic_symbol
11429#define elf_backend_finish_dynamic_sections ppc_elf_finish_dynamic_sections
11430#define elf_backend_fake_sections ppc_elf_fake_sections
11431#define elf_backend_additional_program_headers ppc_elf_additional_program_headers
954b63d4 11432#define elf_backend_modify_segment_map ppc_elf_modify_segment_map
c5fccbec
DJ
11433#define elf_backend_grok_prstatus ppc_elf_grok_prstatus
11434#define elf_backend_grok_psinfo ppc_elf_grok_psinfo
183e98be 11435#define elf_backend_write_core_note ppc_elf_write_core_note
29c2fb7c 11436#define elf_backend_reloc_type_class ppc_elf_reloc_type_class
70bccea4
AM
11437#define elf_backend_begin_write_processing ppc_elf_begin_write_processing
11438#define elf_backend_final_write_processing ppc_elf_final_write_processing
11439#define elf_backend_write_section ppc_elf_write_section
551b43fd 11440#define elf_backend_get_sec_type_attr ppc_elf_get_sec_type_attr
4c45e5c9 11441#define elf_backend_plt_sym_val ppc_elf_plt_sym_val
8a696751 11442#define elf_backend_action_discarded ppc_elf_action_discarded
74541ad4 11443#define elf_backend_init_index_section _bfd_elf_init_1_index_section
b9c361e0 11444#define elf_backend_lookup_section_flags_hook ppc_elf_lookup_section_flags
252b5132
RH
11445
11446#include "elf32-target.h"
9d8504b1 11447
7b8e7dad
AM
11448/* FreeBSD Target */
11449
11450#undef TARGET_LITTLE_SYM
11451#undef TARGET_LITTLE_NAME
11452
11453#undef TARGET_BIG_SYM
6d00b590 11454#define TARGET_BIG_SYM powerpc_elf32_fbsd_vec
7b8e7dad
AM
11455#undef TARGET_BIG_NAME
11456#define TARGET_BIG_NAME "elf32-powerpc-freebsd"
11457
11458#undef ELF_OSABI
11459#define ELF_OSABI ELFOSABI_FREEBSD
11460
11461#undef elf32_bed
11462#define elf32_bed elf32_powerpc_fbsd_bed
11463
11464#include "elf32-target.h"
11465
9d8504b1
PB
11466/* VxWorks Target */
11467
11468#undef TARGET_LITTLE_SYM
11469#undef TARGET_LITTLE_NAME
11470
11471#undef TARGET_BIG_SYM
6d00b590 11472#define TARGET_BIG_SYM powerpc_elf32_vxworks_vec
9d8504b1
PB
11473#undef TARGET_BIG_NAME
11474#define TARGET_BIG_NAME "elf32-powerpc-vxworks"
11475
7b8e7dad
AM
11476#undef ELF_OSABI
11477
d5e3d971
PB
11478/* VxWorks uses the elf default section flags for .plt. */
11479static const struct bfd_elf_special_section *
4aef7643 11480ppc_elf_vxworks_get_sec_type_attr (bfd *abfd, asection *sec)
9d8504b1 11481{
d5e3d971
PB
11482 if (sec->name == NULL)
11483 return NULL;
11484
11485 if (strcmp (sec->name, ".plt") == 0)
11486 return _bfd_elf_get_sec_type_attr (abfd, sec);
11487
11488 return ppc_elf_get_sec_type_attr (abfd, sec);
11489}
9d8504b1
PB
11490
11491/* Like ppc_elf_link_hash_table_create, but overrides
11492 appropriately for VxWorks. */
11493static struct bfd_link_hash_table *
11494ppc_elf_vxworks_link_hash_table_create (bfd *abfd)
11495{
11496 struct bfd_link_hash_table *ret;
11497
11498 ret = ppc_elf_link_hash_table_create (abfd);
11499 if (ret)
11500 {
11501 struct ppc_elf_link_hash_table *htab
954b63d4 11502 = (struct ppc_elf_link_hash_table *)ret;
9d8504b1 11503 htab->is_vxworks = 1;
4a3dc543 11504 htab->plt_type = PLT_VXWORKS;
9d8504b1
PB
11505 htab->plt_entry_size = VXWORKS_PLT_ENTRY_SIZE;
11506 htab->plt_slot_size = VXWORKS_PLT_ENTRY_SIZE;
11507 htab->plt_initial_entry_size = VXWORKS_PLT_INITIAL_ENTRY_SIZE;
11508 }
11509 return ret;
11510}
11511
11512/* Tweak magic VxWorks symbols as they are loaded. */
11513static bfd_boolean
11514ppc_elf_vxworks_add_symbol_hook (bfd *abfd,
11515 struct bfd_link_info *info,
11516 Elf_Internal_Sym *sym,
4aef7643
AM
11517 const char **namep,
11518 flagword *flagsp,
9d8504b1
PB
11519 asection **secp,
11520 bfd_vma *valp)
11521{
4aef7643
AM
11522 if (!elf_vxworks_add_symbol_hook (abfd, info, sym, namep, flagsp, secp,
11523 valp))
9d8504b1
PB
11524 return FALSE;
11525
4aef7643 11526 return ppc_elf_add_symbol_hook (abfd, info, sym, namep, flagsp, secp, valp);
9d8504b1
PB
11527}
11528
9d8504b1
PB
11529static void
11530ppc_elf_vxworks_final_write_processing (bfd *abfd, bfd_boolean linker)
11531{
4aef7643
AM
11532 ppc_elf_final_write_processing (abfd, linker);
11533 elf_vxworks_final_write_processing (abfd, linker);
9d8504b1
PB
11534}
11535
11536/* On VxWorks, we emit relocations against _PROCEDURE_LINKAGE_TABLE_, so
11537 define it. */
11538#undef elf_backend_want_plt_sym
11539#define elf_backend_want_plt_sym 1
11540#undef elf_backend_want_got_plt
11541#define elf_backend_want_got_plt 1
11542#undef elf_backend_got_symbol_offset
11543#define elf_backend_got_symbol_offset 0
11544#undef elf_backend_plt_not_loaded
11545#define elf_backend_plt_not_loaded 0
11546#undef elf_backend_plt_readonly
11547#define elf_backend_plt_readonly 1
11548#undef elf_backend_got_header_size
11549#define elf_backend_got_header_size 12
64f52338
AM
11550#undef elf_backend_dtrel_excludes_plt
11551#define elf_backend_dtrel_excludes_plt 1
9d8504b1 11552
468392fb
AM
11553#undef bfd_elf32_get_synthetic_symtab
11554
9d8504b1
PB
11555#undef bfd_elf32_bfd_link_hash_table_create
11556#define bfd_elf32_bfd_link_hash_table_create \
11557 ppc_elf_vxworks_link_hash_table_create
9d8504b1
PB
11558#undef elf_backend_add_symbol_hook
11559#define elf_backend_add_symbol_hook \
11560 ppc_elf_vxworks_add_symbol_hook
11561#undef elf_backend_link_output_symbol_hook
11562#define elf_backend_link_output_symbol_hook \
9c72ff84 11563 elf_vxworks_link_output_symbol_hook
9d8504b1
PB
11564#undef elf_backend_final_write_processing
11565#define elf_backend_final_write_processing \
11566 ppc_elf_vxworks_final_write_processing
d5e3d971
PB
11567#undef elf_backend_get_sec_type_attr
11568#define elf_backend_get_sec_type_attr \
11569 ppc_elf_vxworks_get_sec_type_attr
9d8504b1
PB
11570#undef elf_backend_emit_relocs
11571#define elf_backend_emit_relocs \
11572 elf_vxworks_emit_relocs
11573
11574#undef elf32_bed
11575#define elf32_bed ppc_elf_vxworks_bed
e054468f 11576#undef elf_backend_post_process_headers
9d8504b1
PB
11577
11578#include "elf32-target.h"
This page took 2.011221 seconds and 4 git commands to generate.