* app.c (do_scrub_chars): Handle '||' in two states.
[deliverable/binutils-gdb.git] / bfd / elf32-ppc.c
CommitLineData
252b5132 1/* PowerPC-specific support for 32-bit ELF
86bbe32f 2 Copyright 1994, 1995, 1996, 1997, 1998, 1999, 2000, 2001, 2002, 2003
7898deda 3 Free Software Foundation, Inc.
252b5132
RH
4 Written by Ian Lance Taylor, Cygnus Support.
5
ae9a127f 6 This file is part of BFD, the Binary File Descriptor library.
252b5132 7
ae9a127f
NC
8 This program is free software; you can redistribute it and/or modify
9 it under the terms of the GNU General Public License as published by
10 the Free Software Foundation; either version 2 of the License, or
11 (at your option) any later version.
252b5132 12
ae9a127f
NC
13 This program is distributed in the hope that it will be useful,
14 but WITHOUT ANY WARRANTY; without even the implied warranty of
15 MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
16 GNU General Public License for more details.
252b5132 17
ae9a127f
NC
18 You should have received a copy of the GNU General Public License
19 along with this program; if not, write to the Free Software
20 Foundation, Inc., 59 Temple Place - Suite 330, Boston, MA 02111-1307, USA. */
252b5132
RH
21
22/* This file is based on a preliminary PowerPC ELF ABI. The
23 information may not match the final PowerPC ELF ABI. It includes
24 suggestions from the in-progress Embedded PowerPC ABI, and that
25 information may also not match. */
26
27#include "bfd.h"
28#include "sysdep.h"
29#include "bfdlink.h"
30#include "libbfd.h"
31#include "elf-bfd.h"
32#include "elf/ppc.h"
7619e7c7 33#include "elf32-ppc.h"
252b5132 34
f0fe0e16 35/* RELA relocations are used here. */
252b5132 36
7fce784e
AS
37static struct bfd_hash_entry *ppc_elf_link_hash_newfunc
38 PARAMS ((struct bfd_hash_entry *entry, struct bfd_hash_table *table,
39 const char *string));
40static struct bfd_link_hash_table *ppc_elf_link_hash_table_create
41 PARAMS ((bfd *abfd));
42static void ppc_elf_copy_indirect_symbol
43 PARAMS ((struct elf_backend_data *bed, struct elf_link_hash_entry *dir,
44 struct elf_link_hash_entry *ind));
252b5132
RH
45static reloc_howto_type *ppc_elf_reloc_type_lookup
46 PARAMS ((bfd *abfd, bfd_reloc_code_real_type code));
47static void ppc_elf_info_to_howto
947216bf 48 PARAMS ((bfd *abfd, arelent *cache_ptr, Elf_Internal_Rela *dst));
b34976b6
AM
49static void ppc_elf_howto_init
50 PARAMS ((void));
51static int ppc_elf_sort_rela
52 PARAMS ((const PTR, const PTR));
53static bfd_boolean ppc_elf_relax_section
54 PARAMS ((bfd *, asection *, struct bfd_link_info *, bfd_boolean *));
252b5132
RH
55static bfd_reloc_status_type ppc_elf_addr16_ha_reloc
56 PARAMS ((bfd *, arelent *, asymbol *, PTR, asection *, bfd *, char **));
7619e7c7
AM
57static bfd_reloc_status_type ppc_elf_unhandled_reloc
58 PARAMS ((bfd *, arelent *, asymbol *, PTR, asection *, bfd *, char **));
b34976b6
AM
59static bfd_boolean ppc_elf_object_p
60 PARAMS ((bfd *));
61static bfd_boolean ppc_elf_set_private_flags
62 PARAMS ((bfd *, flagword));
63static bfd_boolean ppc_elf_merge_private_bfd_data
64 PARAMS ((bfd *, bfd *));
65static int ppc_elf_additional_program_headers
66 PARAMS ((bfd *));
67static bfd_boolean ppc_elf_modify_segment_map
68 PARAMS ((bfd *));
7619e7c7 69static bfd_boolean ppc_elf_create_got
41fcb14e 70 PARAMS ((bfd *, struct bfd_link_info *));
b34976b6 71static bfd_boolean ppc_elf_create_dynamic_sections
252b5132 72 PARAMS ((bfd *, struct bfd_link_info *));
b34976b6
AM
73static bfd_boolean ppc_elf_section_from_shdr
74 PARAMS ((bfd *, Elf_Internal_Shdr *, const char *));
75static bfd_boolean ppc_elf_fake_sections
947216bf 76 PARAMS ((bfd *, Elf_Internal_Shdr *, asection *));
252b5132 77static elf_linker_section_t *ppc_elf_create_linker_section
b34976b6 78 PARAMS ((bfd *abfd, struct bfd_link_info *info,
252b5132 79 enum elf_linker_section_enum));
7619e7c7
AM
80static bfd_boolean update_local_sym_info
81 PARAMS ((bfd *, Elf_Internal_Shdr *, unsigned long, int));
82static void bad_shared_reloc
83 PARAMS ((bfd *, enum elf_ppc_reloc_type));
b34976b6
AM
84static bfd_boolean ppc_elf_check_relocs
85 PARAMS ((bfd *, struct bfd_link_info *, asection *,
86 const Elf_Internal_Rela *));
87static asection * ppc_elf_gc_mark_hook
88 PARAMS ((asection *sec, struct bfd_link_info *info, Elf_Internal_Rela *rel,
89 struct elf_link_hash_entry *h, Elf_Internal_Sym *sym));
90static bfd_boolean ppc_elf_gc_sweep_hook
91 PARAMS ((bfd *abfd, struct bfd_link_info *info, asection *sec,
92 const Elf_Internal_Rela *relocs));
93static bfd_boolean ppc_elf_adjust_dynamic_symbol
94 PARAMS ((struct bfd_link_info *, struct elf_link_hash_entry *));
7fce784e
AS
95static bfd_boolean allocate_dynrelocs
96 PARAMS ((struct elf_link_hash_entry *, PTR));
97static bfd_boolean readonly_dynrelocs
98 PARAMS ((struct elf_link_hash_entry *, PTR));
b34976b6
AM
99static bfd_boolean ppc_elf_size_dynamic_sections
100 PARAMS ((bfd *, struct bfd_link_info *));
101static bfd_boolean ppc_elf_relocate_section
102 PARAMS ((bfd *, struct bfd_link_info *info, bfd *, asection *, bfd_byte *,
103 Elf_Internal_Rela *relocs, Elf_Internal_Sym *local_syms,
104 asection **));
105static bfd_boolean ppc_elf_add_symbol_hook
106 PARAMS ((bfd *, struct bfd_link_info *, const Elf_Internal_Sym *,
107 const char **, flagword *, asection **, bfd_vma *));
108static bfd_boolean ppc_elf_finish_dynamic_symbol
109 PARAMS ((bfd *, struct bfd_link_info *, struct elf_link_hash_entry *,
110 Elf_Internal_Sym *));
111static bfd_boolean ppc_elf_finish_dynamic_sections
112 PARAMS ((bfd *, struct bfd_link_info *));
f51e552e
AM
113static enum elf_reloc_type_class ppc_elf_reloc_type_class
114 PARAMS ((const Elf_Internal_Rela *));
b34976b6 115static bfd_boolean ppc_elf_grok_prstatus
2e67030c 116 PARAMS ((bfd *abfd, Elf_Internal_Note *note));
b34976b6 117static bfd_boolean ppc_elf_grok_psinfo
2e67030c 118 PARAMS ((bfd *abfd, Elf_Internal_Note *note));
252b5132 119
ae9a127f
NC
120#define BRANCH_PREDICT_BIT 0x200000 /* Branch prediction bit for branch taken relocs. */
121#define RA_REGISTER_MASK 0x001f0000 /* Mask to set RA in memory instructions. */
122#define RA_REGISTER_SHIFT 16 /* Value to shift register by to insert RA. */
252b5132
RH
123
124/* The name of the dynamic interpreter. This is put in the .interp
125 section. */
126
127#define ELF_DYNAMIC_INTERPRETER "/usr/lib/ld.so.1"
128
129/* The size in bytes of an entry in the procedure linkage table. */
130#define PLT_ENTRY_SIZE 12
131/* The initial size of the plt reserved for the dynamic linker. */
132#define PLT_INITIAL_ENTRY_SIZE 72
133/* The size of the gap between entries in the PLT. */
134#define PLT_SLOT_SIZE 8
135/* The number of single-slot PLT entries (the rest use two slots). */
136#define PLT_NUM_SINGLE_ENTRIES 8192
137
7619e7c7
AM
138/* Some nop instructions. */
139#define NOP 0x60000000
140#define CROR_151515 0x4def7b82
141#define CROR_313131 0x4ffffb82
142
143/* Offset of tp and dtp pointers from start of TLS block. */
144#define TP_OFFSET 0x7000
145#define DTP_OFFSET 0x8000
146
e1e0340b
GK
147/* Will references to this symbol always reference the symbol
148 in this object? */
149#define SYMBOL_REFERENCES_LOCAL(INFO, H) \
150 ((! INFO->shared \
151 || INFO->symbolic \
152 || H->dynindx == -1 \
153 || ELF_ST_VISIBILITY (H->other) == STV_INTERNAL \
154 || ELF_ST_VISIBILITY (H->other) == STV_HIDDEN) \
155 && (H->elf_link_hash_flags & ELF_LINK_HASH_DEF_REGULAR) != 0)
156
157/* Will _calls_ to this symbol always call the version in this object? */
158#define SYMBOL_CALLS_LOCAL(INFO, H) \
159 ((! INFO->shared \
160 || INFO->symbolic \
161 || H->dynindx == -1 \
162 || ELF_ST_VISIBILITY (H->other) != STV_DEFAULT) \
163 && (H->elf_link_hash_flags & ELF_LINK_HASH_DEF_REGULAR) != 0)
252b5132 164\f
7fce784e
AS
165/* The PPC linker needs to keep track of the number of relocs that it
166 decides to copy as dynamic relocs in check_relocs for each symbol.
167 This is so that it can later discard them if they are found to be
168 unnecessary. We store the information in a field extending the
169 regular ELF linker hash table. */
170
171struct ppc_elf_dyn_relocs
172{
173 struct ppc_elf_dyn_relocs *next;
174
175 /* The input section of the reloc. */
176 asection *sec;
177
178 /* Total number of relocs copied for the input section. */
179 bfd_size_type count;
180};
181
182/* PPC ELF linker hash entry. */
183
184struct ppc_elf_link_hash_entry
185{
7619e7c7 186 struct elf_link_hash_entry elf;
7fce784e
AS
187
188 /* Track dynamic relocs copied for this symbol. */
189 struct ppc_elf_dyn_relocs *dyn_relocs;
7619e7c7
AM
190
191 /* Contexts in which symbol is used in the GOT (or TOC).
192 TLS_GD .. TLS_EXPLICIT bits are or'd into the mask as the
193 corresponding relocs are encountered during check_relocs.
194 tls_optimize clears TLS_GD .. TLS_TPREL when optimizing to
195 indicate the corresponding GOT entry type is not needed. */
196#define TLS_GD 1 /* GD reloc. */
197#define TLS_LD 2 /* LD reloc. */
198#define TLS_TPREL 4 /* TPREL reloc, => IE. */
199#define TLS_DTPREL 8 /* DTPREL reloc, => LD. */
200#define TLS_TLS 16 /* Any TLS reloc. */
201#define TLS_TPRELGD 32 /* TPREL reloc resulting from GD->IE. */
202 char tls_mask;
7fce784e
AS
203};
204
205#define ppc_elf_hash_entry(ent) ((struct ppc_elf_link_hash_entry *) (ent))
206
207/* PPC ELF linker hash table. */
208
209struct ppc_elf_link_hash_table
210{
7619e7c7
AM
211 struct elf_link_hash_table elf;
212
213 /* Short-cuts to get to dynamic linker sections. */
214 asection *got;
215 asection *relgot;
216 asection *plt;
217 asection *relplt;
218 asection *dynbss;
219 asection *relbss;
220 asection *dynsbss;
221 asection *relsbss;
222 elf_linker_section_t *sdata;
223 elf_linker_section_t *sdata2;
224
225 /* Short-cut to first output tls section. */
226 asection *tls_sec;
227
228 /* Shortcut to .__tls_get_addr. */
229 struct elf_link_hash_entry *tls_get_addr;
230
231 /* TLS local dynamic got entry handling. */
232 union {
233 bfd_signed_vma refcount;
234 bfd_vma offset;
235 } tlsld_got;
7fce784e
AS
236
237 /* Small local sym to section mapping cache. */
238 struct sym_sec_cache sym_sec;
239};
240
241/* Get the PPC ELF linker hash table from a link_info structure. */
242
243#define ppc_elf_hash_table(p) \
244 ((struct ppc_elf_link_hash_table *) (p)->hash)
245
246/* Create an entry in a PPC ELF linker hash table. */
247
248static struct bfd_hash_entry *
249ppc_elf_link_hash_newfunc (entry, table, string)
250 struct bfd_hash_entry *entry;
251 struct bfd_hash_table *table;
252 const char *string;
253{
254 /* Allocate the structure if it has not already been allocated by a
255 subclass. */
256 if (entry == NULL)
257 {
258 entry = bfd_hash_allocate (table,
259 sizeof (struct ppc_elf_link_hash_entry));
260 if (entry == NULL)
261 return entry;
262 }
263
264 /* Call the allocation method of the superclass. */
265 entry = _bfd_elf_link_hash_newfunc (entry, table, string);
266 if (entry != NULL)
7619e7c7
AM
267 {
268 ppc_elf_hash_entry (entry)->dyn_relocs = NULL;
269 ppc_elf_hash_entry (entry)->tls_mask = 0;
270 }
7fce784e
AS
271
272 return entry;
273}
274
275/* Create a PPC ELF linker hash table. */
276
277static struct bfd_link_hash_table *
278ppc_elf_link_hash_table_create (abfd)
279 bfd *abfd;
280{
281 struct ppc_elf_link_hash_table *ret;
282
283 ret = ((struct ppc_elf_link_hash_table *)
284 bfd_malloc (sizeof (struct ppc_elf_link_hash_table)));
285 if (ret == NULL)
286 return NULL;
287
7619e7c7 288 if (! _bfd_elf_link_hash_table_init (&ret->elf, abfd,
7fce784e
AS
289 ppc_elf_link_hash_newfunc))
290 {
291 free (ret);
292 return NULL;
293 }
294
7619e7c7
AM
295 ret->got = NULL;
296 ret->relgot = NULL;
297 ret->plt = NULL;
298 ret->relplt = NULL;
299 ret->dynbss = NULL;
300 ret->relbss = NULL;
301 ret->dynsbss = NULL;
302 ret->relsbss = NULL;
303 ret->sdata = NULL;
304 ret->sdata2 = NULL;
305 ret->tls_sec = NULL;
306 ret->tls_get_addr = NULL;
307 ret->tlsld_got.refcount = 0;
7fce784e
AS
308 ret->sym_sec.abfd = NULL;
309
7619e7c7 310 return &ret->elf.root;
7fce784e
AS
311}
312
313/* Copy the extra info we tack onto an elf_link_hash_entry. */
314
315static void
316ppc_elf_copy_indirect_symbol (bed, dir, ind)
317 struct elf_backend_data *bed;
318 struct elf_link_hash_entry *dir, *ind;
319{
320 struct ppc_elf_link_hash_entry *edir, *eind;
321
322 edir = (struct ppc_elf_link_hash_entry *) dir;
323 eind = (struct ppc_elf_link_hash_entry *) ind;
324
325 if (eind->dyn_relocs != NULL)
326 {
327 if (edir->dyn_relocs != NULL)
328 {
329 struct ppc_elf_dyn_relocs **pp;
330 struct ppc_elf_dyn_relocs *p;
331
332 if (ind->root.type == bfd_link_hash_indirect)
333 abort ();
334
335 /* Add reloc counts against the weak sym to the strong sym
336 list. Merge any entries against the same section. */
337 for (pp = &eind->dyn_relocs; (p = *pp) != NULL; )
338 {
339 struct ppc_elf_dyn_relocs *q;
340
341 for (q = edir->dyn_relocs; q != NULL; q = q->next)
342 if (q->sec == p->sec)
343 {
344 q->count += p->count;
345 *pp = p->next;
346 break;
347 }
348 if (q == NULL)
349 pp = &p->next;
350 }
351 *pp = edir->dyn_relocs;
352 }
353
354 edir->dyn_relocs = eind->dyn_relocs;
355 eind->dyn_relocs = NULL;
356 }
357
7619e7c7
AM
358 edir->tls_mask |= eind->tls_mask;
359
7fce784e
AS
360 _bfd_elf_link_hash_copy_indirect (bed, dir, ind);
361}
362\f
8da6118f 363static reloc_howto_type *ppc_elf_howto_table[(int) R_PPC_max];
252b5132 364
8da6118f 365static reloc_howto_type ppc_elf_howto_raw[] = {
252b5132
RH
366 /* This reloc does nothing. */
367 HOWTO (R_PPC_NONE, /* type */
368 0, /* rightshift */
369 2, /* size (0 = byte, 1 = short, 2 = long) */
370 32, /* bitsize */
b34976b6 371 FALSE, /* pc_relative */
252b5132
RH
372 0, /* bitpos */
373 complain_overflow_bitfield, /* complain_on_overflow */
374 bfd_elf_generic_reloc, /* special_function */
375 "R_PPC_NONE", /* name */
b34976b6 376 FALSE, /* partial_inplace */
252b5132
RH
377 0, /* src_mask */
378 0, /* dst_mask */
b34976b6 379 FALSE), /* pcrel_offset */
252b5132
RH
380
381 /* A standard 32 bit relocation. */
382 HOWTO (R_PPC_ADDR32, /* type */
383 0, /* rightshift */
384 2, /* size (0 = byte, 1 = short, 2 = long) */
385 32, /* bitsize */
b34976b6 386 FALSE, /* pc_relative */
252b5132
RH
387 0, /* bitpos */
388 complain_overflow_bitfield, /* complain_on_overflow */
389 bfd_elf_generic_reloc, /* special_function */
390 "R_PPC_ADDR32", /* name */
b34976b6 391 FALSE, /* partial_inplace */
252b5132
RH
392 0, /* src_mask */
393 0xffffffff, /* dst_mask */
b34976b6 394 FALSE), /* pcrel_offset */
252b5132
RH
395
396 /* An absolute 26 bit branch; the lower two bits must be zero.
397 FIXME: we don't check that, we just clear them. */
398 HOWTO (R_PPC_ADDR24, /* type */
399 0, /* rightshift */
400 2, /* size (0 = byte, 1 = short, 2 = long) */
401 26, /* bitsize */
b34976b6 402 FALSE, /* pc_relative */
252b5132
RH
403 0, /* bitpos */
404 complain_overflow_bitfield, /* complain_on_overflow */
405 bfd_elf_generic_reloc, /* special_function */
406 "R_PPC_ADDR24", /* name */
b34976b6 407 FALSE, /* partial_inplace */
252b5132
RH
408 0, /* src_mask */
409 0x3fffffc, /* dst_mask */
b34976b6 410 FALSE), /* pcrel_offset */
252b5132
RH
411
412 /* A standard 16 bit relocation. */
413 HOWTO (R_PPC_ADDR16, /* type */
414 0, /* rightshift */
415 1, /* size (0 = byte, 1 = short, 2 = long) */
416 16, /* bitsize */
b34976b6 417 FALSE, /* pc_relative */
252b5132
RH
418 0, /* bitpos */
419 complain_overflow_bitfield, /* complain_on_overflow */
420 bfd_elf_generic_reloc, /* special_function */
421 "R_PPC_ADDR16", /* name */
b34976b6 422 FALSE, /* partial_inplace */
252b5132
RH
423 0, /* src_mask */
424 0xffff, /* dst_mask */
b34976b6 425 FALSE), /* pcrel_offset */
252b5132
RH
426
427 /* A 16 bit relocation without overflow. */
428 HOWTO (R_PPC_ADDR16_LO, /* type */
429 0, /* rightshift */
430 1, /* size (0 = byte, 1 = short, 2 = long) */
431 16, /* bitsize */
b34976b6 432 FALSE, /* pc_relative */
252b5132
RH
433 0, /* bitpos */
434 complain_overflow_dont,/* complain_on_overflow */
435 bfd_elf_generic_reloc, /* special_function */
436 "R_PPC_ADDR16_LO", /* name */
b34976b6 437 FALSE, /* partial_inplace */
252b5132
RH
438 0, /* src_mask */
439 0xffff, /* dst_mask */
b34976b6 440 FALSE), /* pcrel_offset */
252b5132
RH
441
442 /* The high order 16 bits of an address. */
443 HOWTO (R_PPC_ADDR16_HI, /* type */
444 16, /* rightshift */
445 1, /* size (0 = byte, 1 = short, 2 = long) */
446 16, /* bitsize */
b34976b6 447 FALSE, /* pc_relative */
252b5132
RH
448 0, /* bitpos */
449 complain_overflow_dont, /* complain_on_overflow */
450 bfd_elf_generic_reloc, /* special_function */
451 "R_PPC_ADDR16_HI", /* name */
b34976b6 452 FALSE, /* partial_inplace */
252b5132
RH
453 0, /* src_mask */
454 0xffff, /* dst_mask */
b34976b6 455 FALSE), /* pcrel_offset */
252b5132
RH
456
457 /* The high order 16 bits of an address, plus 1 if the contents of
8da6118f 458 the low 16 bits, treated as a signed number, is negative. */
252b5132
RH
459 HOWTO (R_PPC_ADDR16_HA, /* type */
460 16, /* rightshift */
461 1, /* size (0 = byte, 1 = short, 2 = long) */
462 16, /* bitsize */
b34976b6 463 FALSE, /* pc_relative */
252b5132
RH
464 0, /* bitpos */
465 complain_overflow_dont, /* complain_on_overflow */
466 ppc_elf_addr16_ha_reloc, /* special_function */
467 "R_PPC_ADDR16_HA", /* name */
b34976b6 468 FALSE, /* partial_inplace */
252b5132
RH
469 0, /* src_mask */
470 0xffff, /* dst_mask */
b34976b6 471 FALSE), /* pcrel_offset */
252b5132
RH
472
473 /* An absolute 16 bit branch; the lower two bits must be zero.
474 FIXME: we don't check that, we just clear them. */
475 HOWTO (R_PPC_ADDR14, /* type */
476 0, /* rightshift */
477 2, /* size (0 = byte, 1 = short, 2 = long) */
478 16, /* bitsize */
b34976b6 479 FALSE, /* pc_relative */
252b5132
RH
480 0, /* bitpos */
481 complain_overflow_bitfield, /* complain_on_overflow */
482 bfd_elf_generic_reloc, /* special_function */
483 "R_PPC_ADDR14", /* name */
b34976b6 484 FALSE, /* partial_inplace */
252b5132
RH
485 0, /* src_mask */
486 0xfffc, /* dst_mask */
b34976b6 487 FALSE), /* pcrel_offset */
252b5132
RH
488
489 /* An absolute 16 bit branch, for which bit 10 should be set to
490 indicate that the branch is expected to be taken. The lower two
8da6118f 491 bits must be zero. */
252b5132
RH
492 HOWTO (R_PPC_ADDR14_BRTAKEN, /* type */
493 0, /* rightshift */
494 2, /* size (0 = byte, 1 = short, 2 = long) */
495 16, /* bitsize */
b34976b6 496 FALSE, /* pc_relative */
252b5132
RH
497 0, /* bitpos */
498 complain_overflow_bitfield, /* complain_on_overflow */
499 bfd_elf_generic_reloc, /* special_function */
500 "R_PPC_ADDR14_BRTAKEN",/* name */
b34976b6 501 FALSE, /* partial_inplace */
252b5132
RH
502 0, /* src_mask */
503 0xfffc, /* dst_mask */
b34976b6 504 FALSE), /* pcrel_offset */
252b5132
RH
505
506 /* An absolute 16 bit branch, for which bit 10 should be set to
507 indicate that the branch is not expected to be taken. The lower
508 two bits must be zero. */
509 HOWTO (R_PPC_ADDR14_BRNTAKEN, /* type */
510 0, /* rightshift */
511 2, /* size (0 = byte, 1 = short, 2 = long) */
512 16, /* bitsize */
b34976b6 513 FALSE, /* pc_relative */
252b5132
RH
514 0, /* bitpos */
515 complain_overflow_bitfield, /* complain_on_overflow */
516 bfd_elf_generic_reloc, /* special_function */
517 "R_PPC_ADDR14_BRNTAKEN",/* name */
b34976b6 518 FALSE, /* partial_inplace */
252b5132
RH
519 0, /* src_mask */
520 0xfffc, /* dst_mask */
b34976b6 521 FALSE), /* pcrel_offset */
252b5132 522
8da6118f 523 /* A relative 26 bit branch; the lower two bits must be zero. */
252b5132
RH
524 HOWTO (R_PPC_REL24, /* type */
525 0, /* rightshift */
526 2, /* size (0 = byte, 1 = short, 2 = long) */
527 26, /* bitsize */
b34976b6 528 TRUE, /* pc_relative */
252b5132
RH
529 0, /* bitpos */
530 complain_overflow_signed, /* complain_on_overflow */
531 bfd_elf_generic_reloc, /* special_function */
532 "R_PPC_REL24", /* name */
b34976b6 533 FALSE, /* partial_inplace */
252b5132
RH
534 0, /* src_mask */
535 0x3fffffc, /* dst_mask */
b34976b6 536 TRUE), /* pcrel_offset */
252b5132 537
8da6118f 538 /* A relative 16 bit branch; the lower two bits must be zero. */
252b5132
RH
539 HOWTO (R_PPC_REL14, /* type */
540 0, /* rightshift */
541 2, /* size (0 = byte, 1 = short, 2 = long) */
542 16, /* bitsize */
b34976b6 543 TRUE, /* pc_relative */
252b5132
RH
544 0, /* bitpos */
545 complain_overflow_signed, /* complain_on_overflow */
546 bfd_elf_generic_reloc, /* special_function */
547 "R_PPC_REL14", /* name */
b34976b6 548 FALSE, /* partial_inplace */
252b5132
RH
549 0, /* src_mask */
550 0xfffc, /* dst_mask */
b34976b6 551 TRUE), /* pcrel_offset */
252b5132 552
8da6118f 553 /* A relative 16 bit branch. Bit 10 should be set to indicate that
252b5132
RH
554 the branch is expected to be taken. The lower two bits must be
555 zero. */
556 HOWTO (R_PPC_REL14_BRTAKEN, /* type */
557 0, /* rightshift */
558 2, /* size (0 = byte, 1 = short, 2 = long) */
559 16, /* bitsize */
b34976b6 560 TRUE, /* pc_relative */
252b5132
RH
561 0, /* bitpos */
562 complain_overflow_signed, /* complain_on_overflow */
563 bfd_elf_generic_reloc, /* special_function */
564 "R_PPC_REL14_BRTAKEN", /* name */
b34976b6 565 FALSE, /* partial_inplace */
252b5132
RH
566 0, /* src_mask */
567 0xfffc, /* dst_mask */
b34976b6 568 TRUE), /* pcrel_offset */
252b5132 569
8da6118f 570 /* A relative 16 bit branch. Bit 10 should be set to indicate that
252b5132
RH
571 the branch is not expected to be taken. The lower two bits must
572 be zero. */
573 HOWTO (R_PPC_REL14_BRNTAKEN, /* type */
574 0, /* rightshift */
575 2, /* size (0 = byte, 1 = short, 2 = long) */
576 16, /* bitsize */
b34976b6 577 TRUE, /* pc_relative */
252b5132
RH
578 0, /* bitpos */
579 complain_overflow_signed, /* complain_on_overflow */
580 bfd_elf_generic_reloc, /* special_function */
581 "R_PPC_REL14_BRNTAKEN",/* name */
b34976b6 582 FALSE, /* partial_inplace */
252b5132
RH
583 0, /* src_mask */
584 0xfffc, /* dst_mask */
b34976b6 585 TRUE), /* pcrel_offset */
252b5132
RH
586
587 /* Like R_PPC_ADDR16, but referring to the GOT table entry for the
588 symbol. */
589 HOWTO (R_PPC_GOT16, /* type */
590 0, /* rightshift */
591 1, /* size (0 = byte, 1 = short, 2 = long) */
592 16, /* bitsize */
b34976b6 593 FALSE, /* pc_relative */
252b5132
RH
594 0, /* bitpos */
595 complain_overflow_signed, /* complain_on_overflow */
596 bfd_elf_generic_reloc, /* special_function */
597 "R_PPC_GOT16", /* name */
b34976b6 598 FALSE, /* partial_inplace */
252b5132
RH
599 0, /* src_mask */
600 0xffff, /* dst_mask */
b34976b6 601 FALSE), /* pcrel_offset */
252b5132
RH
602
603 /* Like R_PPC_ADDR16_LO, but referring to the GOT table entry for
604 the symbol. */
605 HOWTO (R_PPC_GOT16_LO, /* type */
606 0, /* rightshift */
607 1, /* size (0 = byte, 1 = short, 2 = long) */
608 16, /* bitsize */
b34976b6 609 FALSE, /* pc_relative */
252b5132
RH
610 0, /* bitpos */
611 complain_overflow_dont, /* complain_on_overflow */
612 bfd_elf_generic_reloc, /* special_function */
613 "R_PPC_GOT16_LO", /* name */
b34976b6 614 FALSE, /* partial_inplace */
252b5132
RH
615 0, /* src_mask */
616 0xffff, /* dst_mask */
b34976b6 617 FALSE), /* pcrel_offset */
252b5132
RH
618
619 /* Like R_PPC_ADDR16_HI, but referring to the GOT table entry for
620 the symbol. */
621 HOWTO (R_PPC_GOT16_HI, /* type */
622 16, /* rightshift */
623 1, /* size (0 = byte, 1 = short, 2 = long) */
624 16, /* bitsize */
b34976b6 625 FALSE, /* pc_relative */
252b5132
RH
626 0, /* bitpos */
627 complain_overflow_bitfield, /* complain_on_overflow */
628 bfd_elf_generic_reloc, /* special_function */
629 "R_PPC_GOT16_HI", /* name */
b34976b6 630 FALSE, /* partial_inplace */
252b5132
RH
631 0, /* src_mask */
632 0xffff, /* dst_mask */
b34976b6 633 FALSE), /* pcrel_offset */
252b5132
RH
634
635 /* Like R_PPC_ADDR16_HA, but referring to the GOT table entry for
636 the symbol. */
637 HOWTO (R_PPC_GOT16_HA, /* type */
638 16, /* rightshift */
639 1, /* size (0 = byte, 1 = short, 2 = long) */
640 16, /* bitsize */
b34976b6 641 FALSE, /* pc_relative */
252b5132
RH
642 0, /* bitpos */
643 complain_overflow_bitfield, /* complain_on_overflow */
644 ppc_elf_addr16_ha_reloc, /* special_function */
645 "R_PPC_GOT16_HA", /* name */
b34976b6 646 FALSE, /* partial_inplace */
252b5132
RH
647 0, /* src_mask */
648 0xffff, /* dst_mask */
b34976b6 649 FALSE), /* pcrel_offset */
252b5132
RH
650
651 /* Like R_PPC_REL24, but referring to the procedure linkage table
652 entry for the symbol. */
653 HOWTO (R_PPC_PLTREL24, /* type */
654 0, /* rightshift */
655 2, /* size (0 = byte, 1 = short, 2 = long) */
656 26, /* bitsize */
b34976b6 657 TRUE, /* pc_relative */
252b5132
RH
658 0, /* bitpos */
659 complain_overflow_signed, /* complain_on_overflow */
660 bfd_elf_generic_reloc, /* special_function */
661 "R_PPC_PLTREL24", /* name */
b34976b6 662 FALSE, /* partial_inplace */
252b5132
RH
663 0, /* src_mask */
664 0x3fffffc, /* dst_mask */
b34976b6 665 TRUE), /* pcrel_offset */
252b5132
RH
666
667 /* This is used only by the dynamic linker. The symbol should exist
668 both in the object being run and in some shared library. The
669 dynamic linker copies the data addressed by the symbol from the
670 shared library into the object, because the object being
671 run has to have the data at some particular address. */
672 HOWTO (R_PPC_COPY, /* type */
673 0, /* rightshift */
674 2, /* size (0 = byte, 1 = short, 2 = long) */
675 32, /* bitsize */
b34976b6 676 FALSE, /* pc_relative */
252b5132
RH
677 0, /* bitpos */
678 complain_overflow_bitfield, /* complain_on_overflow */
679 bfd_elf_generic_reloc, /* special_function */
680 "R_PPC_COPY", /* name */
b34976b6 681 FALSE, /* partial_inplace */
252b5132
RH
682 0, /* src_mask */
683 0, /* dst_mask */
b34976b6 684 FALSE), /* pcrel_offset */
252b5132
RH
685
686 /* Like R_PPC_ADDR32, but used when setting global offset table
687 entries. */
688 HOWTO (R_PPC_GLOB_DAT, /* type */
689 0, /* rightshift */
690 2, /* size (0 = byte, 1 = short, 2 = long) */
691 32, /* bitsize */
b34976b6 692 FALSE, /* pc_relative */
252b5132
RH
693 0, /* bitpos */
694 complain_overflow_bitfield, /* complain_on_overflow */
695 bfd_elf_generic_reloc, /* special_function */
696 "R_PPC_GLOB_DAT", /* name */
b34976b6 697 FALSE, /* partial_inplace */
252b5132
RH
698 0, /* src_mask */
699 0xffffffff, /* dst_mask */
b34976b6 700 FALSE), /* pcrel_offset */
252b5132
RH
701
702 /* Marks a procedure linkage table entry for a symbol. */
703 HOWTO (R_PPC_JMP_SLOT, /* type */
704 0, /* rightshift */
705 2, /* size (0 = byte, 1 = short, 2 = long) */
706 32, /* bitsize */
b34976b6 707 FALSE, /* pc_relative */
252b5132
RH
708 0, /* bitpos */
709 complain_overflow_bitfield, /* complain_on_overflow */
710 bfd_elf_generic_reloc, /* special_function */
711 "R_PPC_JMP_SLOT", /* name */
b34976b6 712 FALSE, /* partial_inplace */
252b5132
RH
713 0, /* src_mask */
714 0, /* dst_mask */
b34976b6 715 FALSE), /* pcrel_offset */
252b5132
RH
716
717 /* Used only by the dynamic linker. When the object is run, this
718 longword is set to the load address of the object, plus the
719 addend. */
720 HOWTO (R_PPC_RELATIVE, /* type */
721 0, /* rightshift */
722 2, /* size (0 = byte, 1 = short, 2 = long) */
723 32, /* bitsize */
b34976b6 724 FALSE, /* pc_relative */
252b5132
RH
725 0, /* bitpos */
726 complain_overflow_bitfield, /* complain_on_overflow */
727 bfd_elf_generic_reloc, /* special_function */
728 "R_PPC_RELATIVE", /* name */
b34976b6 729 FALSE, /* partial_inplace */
252b5132
RH
730 0, /* src_mask */
731 0xffffffff, /* dst_mask */
b34976b6 732 FALSE), /* pcrel_offset */
252b5132
RH
733
734 /* Like R_PPC_REL24, but uses the value of the symbol within the
735 object rather than the final value. Normally used for
736 _GLOBAL_OFFSET_TABLE_. */
737 HOWTO (R_PPC_LOCAL24PC, /* type */
738 0, /* rightshift */
739 2, /* size (0 = byte, 1 = short, 2 = long) */
740 26, /* bitsize */
b34976b6 741 TRUE, /* pc_relative */
252b5132
RH
742 0, /* bitpos */
743 complain_overflow_signed, /* complain_on_overflow */
744 bfd_elf_generic_reloc, /* special_function */
745 "R_PPC_LOCAL24PC", /* name */
b34976b6 746 FALSE, /* partial_inplace */
252b5132
RH
747 0, /* src_mask */
748 0x3fffffc, /* dst_mask */
b34976b6 749 TRUE), /* pcrel_offset */
252b5132
RH
750
751 /* Like R_PPC_ADDR32, but may be unaligned. */
752 HOWTO (R_PPC_UADDR32, /* type */
753 0, /* rightshift */
754 2, /* size (0 = byte, 1 = short, 2 = long) */
755 32, /* bitsize */
b34976b6 756 FALSE, /* pc_relative */
252b5132
RH
757 0, /* bitpos */
758 complain_overflow_bitfield, /* complain_on_overflow */
759 bfd_elf_generic_reloc, /* special_function */
760 "R_PPC_UADDR32", /* name */
b34976b6 761 FALSE, /* partial_inplace */
252b5132
RH
762 0, /* src_mask */
763 0xffffffff, /* dst_mask */
b34976b6 764 FALSE), /* pcrel_offset */
252b5132
RH
765
766 /* Like R_PPC_ADDR16, but may be unaligned. */
767 HOWTO (R_PPC_UADDR16, /* type */
768 0, /* rightshift */
769 1, /* size (0 = byte, 1 = short, 2 = long) */
770 16, /* bitsize */
b34976b6 771 FALSE, /* pc_relative */
252b5132
RH
772 0, /* bitpos */
773 complain_overflow_bitfield, /* complain_on_overflow */
774 bfd_elf_generic_reloc, /* special_function */
775 "R_PPC_UADDR16", /* name */
b34976b6 776 FALSE, /* partial_inplace */
252b5132
RH
777 0, /* src_mask */
778 0xffff, /* dst_mask */
b34976b6 779 FALSE), /* pcrel_offset */
252b5132
RH
780
781 /* 32-bit PC relative */
782 HOWTO (R_PPC_REL32, /* type */
783 0, /* rightshift */
784 2, /* size (0 = byte, 1 = short, 2 = long) */
785 32, /* bitsize */
b34976b6 786 TRUE, /* pc_relative */
252b5132
RH
787 0, /* bitpos */
788 complain_overflow_bitfield, /* complain_on_overflow */
789 bfd_elf_generic_reloc, /* special_function */
790 "R_PPC_REL32", /* name */
b34976b6 791 FALSE, /* partial_inplace */
252b5132
RH
792 0, /* src_mask */
793 0xffffffff, /* dst_mask */
b34976b6 794 TRUE), /* pcrel_offset */
252b5132
RH
795
796 /* 32-bit relocation to the symbol's procedure linkage table.
c3668558 797 FIXME: not supported. */
252b5132
RH
798 HOWTO (R_PPC_PLT32, /* type */
799 0, /* rightshift */
800 2, /* size (0 = byte, 1 = short, 2 = long) */
801 32, /* bitsize */
b34976b6 802 FALSE, /* pc_relative */
252b5132
RH
803 0, /* bitpos */
804 complain_overflow_bitfield, /* complain_on_overflow */
805 bfd_elf_generic_reloc, /* special_function */
806 "R_PPC_PLT32", /* name */
b34976b6 807 FALSE, /* partial_inplace */
252b5132
RH
808 0, /* src_mask */
809 0, /* dst_mask */
b34976b6 810 FALSE), /* pcrel_offset */
252b5132
RH
811
812 /* 32-bit PC relative relocation to the symbol's procedure linkage table.
c3668558 813 FIXME: not supported. */
252b5132
RH
814 HOWTO (R_PPC_PLTREL32, /* type */
815 0, /* rightshift */
816 2, /* size (0 = byte, 1 = short, 2 = long) */
817 32, /* bitsize */
b34976b6 818 TRUE, /* pc_relative */
252b5132
RH
819 0, /* bitpos */
820 complain_overflow_bitfield, /* complain_on_overflow */
821 bfd_elf_generic_reloc, /* special_function */
822 "R_PPC_PLTREL32", /* name */
b34976b6 823 FALSE, /* partial_inplace */
252b5132
RH
824 0, /* src_mask */
825 0, /* dst_mask */
b34976b6 826 TRUE), /* pcrel_offset */
252b5132
RH
827
828 /* Like R_PPC_ADDR16_LO, but referring to the PLT table entry for
829 the symbol. */
830 HOWTO (R_PPC_PLT16_LO, /* type */
831 0, /* rightshift */
832 1, /* size (0 = byte, 1 = short, 2 = long) */
833 16, /* bitsize */
b34976b6 834 FALSE, /* pc_relative */
252b5132
RH
835 0, /* bitpos */
836 complain_overflow_dont, /* complain_on_overflow */
837 bfd_elf_generic_reloc, /* special_function */
838 "R_PPC_PLT16_LO", /* name */
b34976b6 839 FALSE, /* partial_inplace */
252b5132
RH
840 0, /* src_mask */
841 0xffff, /* dst_mask */
b34976b6 842 FALSE), /* pcrel_offset */
252b5132
RH
843
844 /* Like R_PPC_ADDR16_HI, but referring to the PLT table entry for
845 the symbol. */
846 HOWTO (R_PPC_PLT16_HI, /* type */
847 16, /* rightshift */
848 1, /* size (0 = byte, 1 = short, 2 = long) */
849 16, /* bitsize */
b34976b6 850 FALSE, /* pc_relative */
252b5132
RH
851 0, /* bitpos */
852 complain_overflow_bitfield, /* complain_on_overflow */
853 bfd_elf_generic_reloc, /* special_function */
854 "R_PPC_PLT16_HI", /* name */
b34976b6 855 FALSE, /* partial_inplace */
252b5132
RH
856 0, /* src_mask */
857 0xffff, /* dst_mask */
b34976b6 858 FALSE), /* pcrel_offset */
252b5132
RH
859
860 /* Like R_PPC_ADDR16_HA, but referring to the PLT table entry for
861 the symbol. */
862 HOWTO (R_PPC_PLT16_HA, /* type */
863 16, /* rightshift */
864 1, /* size (0 = byte, 1 = short, 2 = long) */
865 16, /* bitsize */
b34976b6 866 FALSE, /* pc_relative */
252b5132
RH
867 0, /* bitpos */
868 complain_overflow_bitfield, /* complain_on_overflow */
869 ppc_elf_addr16_ha_reloc, /* special_function */
870 "R_PPC_PLT16_HA", /* name */
b34976b6 871 FALSE, /* partial_inplace */
252b5132
RH
872 0, /* src_mask */
873 0xffff, /* dst_mask */
b34976b6 874 FALSE), /* pcrel_offset */
252b5132
RH
875
876 /* A sign-extended 16 bit value relative to _SDA_BASE_, for use with
877 small data items. */
878 HOWTO (R_PPC_SDAREL16, /* type */
879 0, /* rightshift */
880 1, /* size (0 = byte, 1 = short, 2 = long) */
881 16, /* bitsize */
b34976b6 882 FALSE, /* pc_relative */
252b5132
RH
883 0, /* bitpos */
884 complain_overflow_signed, /* complain_on_overflow */
885 bfd_elf_generic_reloc, /* special_function */
886 "R_PPC_SDAREL16", /* name */
b34976b6 887 FALSE, /* partial_inplace */
252b5132
RH
888 0, /* src_mask */
889 0xffff, /* dst_mask */
b34976b6 890 FALSE), /* pcrel_offset */
252b5132 891
c061c2d8 892 /* 16-bit section relative relocation. */
252b5132
RH
893 HOWTO (R_PPC_SECTOFF, /* type */
894 0, /* rightshift */
c061c2d8
AM
895 1, /* size (0 = byte, 1 = short, 2 = long) */
896 16, /* bitsize */
b34976b6 897 FALSE, /* pc_relative */
252b5132
RH
898 0, /* bitpos */
899 complain_overflow_bitfield, /* complain_on_overflow */
900 bfd_elf_generic_reloc, /* special_function */
901 "R_PPC_SECTOFF", /* name */
b34976b6 902 FALSE, /* partial_inplace */
252b5132 903 0, /* src_mask */
c061c2d8 904 0xffff, /* dst_mask */
b34976b6 905 FALSE), /* pcrel_offset */
252b5132 906
c3668558 907 /* 16-bit lower half section relative relocation. */
252b5132
RH
908 HOWTO (R_PPC_SECTOFF_LO, /* type */
909 0, /* rightshift */
910 1, /* size (0 = byte, 1 = short, 2 = long) */
911 16, /* bitsize */
b34976b6 912 FALSE, /* pc_relative */
252b5132
RH
913 0, /* bitpos */
914 complain_overflow_dont, /* complain_on_overflow */
915 bfd_elf_generic_reloc, /* special_function */
916 "R_PPC_SECTOFF_LO", /* name */
b34976b6 917 FALSE, /* partial_inplace */
252b5132
RH
918 0, /* src_mask */
919 0xffff, /* dst_mask */
b34976b6 920 FALSE), /* pcrel_offset */
252b5132 921
c3668558 922 /* 16-bit upper half section relative relocation. */
252b5132
RH
923 HOWTO (R_PPC_SECTOFF_HI, /* type */
924 16, /* rightshift */
925 1, /* size (0 = byte, 1 = short, 2 = long) */
926 16, /* bitsize */
b34976b6 927 FALSE, /* pc_relative */
252b5132
RH
928 0, /* bitpos */
929 complain_overflow_bitfield, /* complain_on_overflow */
930 bfd_elf_generic_reloc, /* special_function */
931 "R_PPC_SECTOFF_HI", /* name */
b34976b6 932 FALSE, /* partial_inplace */
252b5132
RH
933 0, /* src_mask */
934 0xffff, /* dst_mask */
b34976b6 935 FALSE), /* pcrel_offset */
252b5132 936
c3668558 937 /* 16-bit upper half adjusted section relative relocation. */
252b5132
RH
938 HOWTO (R_PPC_SECTOFF_HA, /* type */
939 16, /* rightshift */
940 1, /* size (0 = byte, 1 = short, 2 = long) */
941 16, /* bitsize */
b34976b6 942 FALSE, /* pc_relative */
252b5132
RH
943 0, /* bitpos */
944 complain_overflow_bitfield, /* complain_on_overflow */
945 ppc_elf_addr16_ha_reloc, /* special_function */
946 "R_PPC_SECTOFF_HA", /* name */
b34976b6 947 FALSE, /* partial_inplace */
252b5132
RH
948 0, /* src_mask */
949 0xffff, /* dst_mask */
b34976b6 950 FALSE), /* pcrel_offset */
252b5132 951
7619e7c7
AM
952 /* Marker reloc for TLS. */
953 HOWTO (R_PPC_TLS,
252b5132
RH
954 0, /* rightshift */
955 2, /* size (0 = byte, 1 = short, 2 = long) */
956 32, /* bitsize */
b34976b6 957 FALSE, /* pc_relative */
252b5132 958 0, /* bitpos */
7619e7c7 959 complain_overflow_dont, /* complain_on_overflow */
252b5132 960 bfd_elf_generic_reloc, /* special_function */
7619e7c7
AM
961 "R_PPC_TLS", /* name */
962 FALSE, /* partial_inplace */
963 0, /* src_mask */
964 0, /* dst_mask */
965 FALSE), /* pcrel_offset */
966
967 /* Computes the load module index of the load module that contains the
968 definition of its TLS sym. */
969 HOWTO (R_PPC_DTPMOD32,
970 0, /* rightshift */
971 2, /* size (0 = byte, 1 = short, 2 = long) */
972 32, /* bitsize */
973 FALSE, /* pc_relative */
974 0, /* bitpos */
975 complain_overflow_dont, /* complain_on_overflow */
976 ppc_elf_unhandled_reloc, /* special_function */
977 "R_PPC_DTPMOD32", /* name */
b34976b6 978 FALSE, /* partial_inplace */
252b5132
RH
979 0, /* src_mask */
980 0xffffffff, /* dst_mask */
b34976b6 981 FALSE), /* pcrel_offset */
252b5132 982
7619e7c7
AM
983 /* Computes a dtv-relative displacement, the difference between the value
984 of sym+add and the base address of the thread-local storage block that
985 contains the definition of sym, minus 0x8000. */
986 HOWTO (R_PPC_DTPREL32,
987 0, /* rightshift */
988 2, /* size (0 = byte, 1 = short, 2 = long) */
989 32, /* bitsize */
990 FALSE, /* pc_relative */
991 0, /* bitpos */
992 complain_overflow_dont, /* complain_on_overflow */
993 ppc_elf_unhandled_reloc, /* special_function */
994 "R_PPC_DTPREL32", /* name */
995 FALSE, /* partial_inplace */
996 0, /* src_mask */
997 0xffffffff, /* dst_mask */
998 FALSE), /* pcrel_offset */
999
1000 /* A 16 bit dtprel reloc. */
1001 HOWTO (R_PPC_DTPREL16,
252b5132
RH
1002 0, /* rightshift */
1003 1, /* size (0 = byte, 1 = short, 2 = long) */
1004 16, /* bitsize */
b34976b6 1005 FALSE, /* pc_relative */
252b5132 1006 0, /* bitpos */
7619e7c7
AM
1007 complain_overflow_signed, /* complain_on_overflow */
1008 ppc_elf_unhandled_reloc, /* special_function */
1009 "R_PPC_DTPREL16", /* name */
b34976b6 1010 FALSE, /* partial_inplace */
252b5132
RH
1011 0, /* src_mask */
1012 0xffff, /* dst_mask */
b34976b6 1013 FALSE), /* pcrel_offset */
252b5132 1014
7619e7c7
AM
1015 /* Like DTPREL16, but no overflow. */
1016 HOWTO (R_PPC_DTPREL16_LO,
252b5132
RH
1017 0, /* rightshift */
1018 1, /* size (0 = byte, 1 = short, 2 = long) */
1019 16, /* bitsize */
b34976b6 1020 FALSE, /* pc_relative */
252b5132 1021 0, /* bitpos */
7619e7c7
AM
1022 complain_overflow_dont, /* complain_on_overflow */
1023 ppc_elf_unhandled_reloc, /* special_function */
1024 "R_PPC_DTPREL16_LO", /* name */
b34976b6 1025 FALSE, /* partial_inplace */
252b5132
RH
1026 0, /* src_mask */
1027 0xffff, /* dst_mask */
b34976b6 1028 FALSE), /* pcrel_offset */
252b5132 1029
7619e7c7
AM
1030 /* Like DTPREL16_LO, but next higher group of 16 bits. */
1031 HOWTO (R_PPC_DTPREL16_HI,
252b5132
RH
1032 16, /* rightshift */
1033 1, /* size (0 = byte, 1 = short, 2 = long) */
1034 16, /* bitsize */
b34976b6 1035 FALSE, /* pc_relative */
252b5132
RH
1036 0, /* bitpos */
1037 complain_overflow_dont, /* complain_on_overflow */
7619e7c7
AM
1038 ppc_elf_unhandled_reloc, /* special_function */
1039 "R_PPC_DTPREL16_HI", /* name */
b34976b6 1040 FALSE, /* partial_inplace */
252b5132
RH
1041 0, /* src_mask */
1042 0xffff, /* dst_mask */
b34976b6 1043 FALSE), /* pcrel_offset */
252b5132 1044
7619e7c7
AM
1045 /* Like DTPREL16_HI, but adjust for low 16 bits. */
1046 HOWTO (R_PPC_DTPREL16_HA,
252b5132
RH
1047 16, /* rightshift */
1048 1, /* size (0 = byte, 1 = short, 2 = long) */
1049 16, /* bitsize */
b34976b6 1050 FALSE, /* pc_relative */
252b5132
RH
1051 0, /* bitpos */
1052 complain_overflow_dont, /* complain_on_overflow */
7619e7c7
AM
1053 ppc_elf_unhandled_reloc, /* special_function */
1054 "R_PPC_DTPREL16_HA", /* name */
b34976b6 1055 FALSE, /* partial_inplace */
252b5132
RH
1056 0, /* src_mask */
1057 0xffff, /* dst_mask */
b34976b6 1058 FALSE), /* pcrel_offset */
252b5132 1059
7619e7c7
AM
1060 /* Computes a tp-relative displacement, the difference between the value of
1061 sym+add and the value of the thread pointer (r13). */
1062 HOWTO (R_PPC_TPREL32,
1063 0, /* rightshift */
1064 2, /* size (0 = byte, 1 = short, 2 = long) */
1065 32, /* bitsize */
1066 FALSE, /* pc_relative */
1067 0, /* bitpos */
1068 complain_overflow_dont, /* complain_on_overflow */
1069 ppc_elf_unhandled_reloc, /* special_function */
1070 "R_PPC_TPREL32", /* name */
1071 FALSE, /* partial_inplace */
1072 0, /* src_mask */
1073 0xffffffff, /* dst_mask */
1074 FALSE), /* pcrel_offset */
1075
1076 /* A 16 bit tprel reloc. */
1077 HOWTO (R_PPC_TPREL16,
252b5132
RH
1078 0, /* rightshift */
1079 1, /* size (0 = byte, 1 = short, 2 = long) */
1080 16, /* bitsize */
b34976b6 1081 FALSE, /* pc_relative */
252b5132 1082 0, /* bitpos */
7619e7c7
AM
1083 complain_overflow_signed, /* complain_on_overflow */
1084 ppc_elf_unhandled_reloc, /* special_function */
1085 "R_PPC_TPREL16", /* name */
b34976b6 1086 FALSE, /* partial_inplace */
252b5132
RH
1087 0, /* src_mask */
1088 0xffff, /* dst_mask */
b34976b6 1089 FALSE), /* pcrel_offset */
252b5132 1090
7619e7c7
AM
1091 /* Like TPREL16, but no overflow. */
1092 HOWTO (R_PPC_TPREL16_LO,
252b5132
RH
1093 0, /* rightshift */
1094 1, /* size (0 = byte, 1 = short, 2 = long) */
1095 16, /* bitsize */
b34976b6 1096 FALSE, /* pc_relative */
252b5132 1097 0, /* bitpos */
7619e7c7
AM
1098 complain_overflow_dont, /* complain_on_overflow */
1099 ppc_elf_unhandled_reloc, /* special_function */
1100 "R_PPC_TPREL16_LO", /* name */
b34976b6 1101 FALSE, /* partial_inplace */
252b5132
RH
1102 0, /* src_mask */
1103 0xffff, /* dst_mask */
b34976b6 1104 FALSE), /* pcrel_offset */
252b5132 1105
7619e7c7
AM
1106 /* Like TPREL16_LO, but next higher group of 16 bits. */
1107 HOWTO (R_PPC_TPREL16_HI,
1108 16, /* rightshift */
1109 1, /* size (0 = byte, 1 = short, 2 = long) */
1110 16, /* bitsize */
1111 FALSE, /* pc_relative */
1112 0, /* bitpos */
1113 complain_overflow_dont, /* complain_on_overflow */
1114 ppc_elf_unhandled_reloc, /* special_function */
1115 "R_PPC_TPREL16_HI", /* name */
1116 FALSE, /* partial_inplace */
1117 0, /* src_mask */
1118 0xffff, /* dst_mask */
1119 FALSE), /* pcrel_offset */
1120
1121 /* Like TPREL16_HI, but adjust for low 16 bits. */
1122 HOWTO (R_PPC_TPREL16_HA,
1123 16, /* rightshift */
1124 1, /* size (0 = byte, 1 = short, 2 = long) */
1125 16, /* bitsize */
1126 FALSE, /* pc_relative */
1127 0, /* bitpos */
1128 complain_overflow_dont, /* complain_on_overflow */
1129 ppc_elf_unhandled_reloc, /* special_function */
1130 "R_PPC_TPREL16_HA", /* name */
1131 FALSE, /* partial_inplace */
1132 0, /* src_mask */
1133 0xffff, /* dst_mask */
1134 FALSE), /* pcrel_offset */
1135
1136 /* Allocates two contiguous entries in the GOT to hold a tls_index structure,
1137 with values (sym+add)@dtpmod and (sym+add)@dtprel, and computes the offset
1138 to the first entry. */
1139 HOWTO (R_PPC_GOT_TLSGD16,
252b5132
RH
1140 0, /* rightshift */
1141 1, /* size (0 = byte, 1 = short, 2 = long) */
1142 16, /* bitsize */
b34976b6 1143 FALSE, /* pc_relative */
252b5132
RH
1144 0, /* bitpos */
1145 complain_overflow_signed, /* complain_on_overflow */
7619e7c7
AM
1146 ppc_elf_unhandled_reloc, /* special_function */
1147 "R_PPC_GOT_TLSGD16", /* name */
b34976b6 1148 FALSE, /* partial_inplace */
252b5132
RH
1149 0, /* src_mask */
1150 0xffff, /* dst_mask */
b34976b6 1151 FALSE), /* pcrel_offset */
252b5132 1152
7619e7c7
AM
1153 /* Like GOT_TLSGD16, but no overflow. */
1154 HOWTO (R_PPC_GOT_TLSGD16_LO,
252b5132 1155 0, /* rightshift */
7619e7c7 1156 1, /* size (0 = byte, 1 = short, 2 = long) */
252b5132 1157 16, /* bitsize */
b34976b6 1158 FALSE, /* pc_relative */
252b5132 1159 0, /* bitpos */
7619e7c7
AM
1160 complain_overflow_dont, /* complain_on_overflow */
1161 ppc_elf_unhandled_reloc, /* special_function */
1162 "R_PPC_GOT_TLSGD16_LO", /* name */
b34976b6 1163 FALSE, /* partial_inplace */
252b5132
RH
1164 0, /* src_mask */
1165 0xffff, /* dst_mask */
b34976b6 1166 FALSE), /* pcrel_offset */
252b5132 1167
7619e7c7
AM
1168 /* Like GOT_TLSGD16_LO, but next higher group of 16 bits. */
1169 HOWTO (R_PPC_GOT_TLSGD16_HI,
1170 16, /* rightshift */
1171 1, /* size (0 = byte, 1 = short, 2 = long) */
1172 16, /* bitsize */
1173 FALSE, /* pc_relative */
1174 0, /* bitpos */
1175 complain_overflow_dont, /* complain_on_overflow */
1176 ppc_elf_unhandled_reloc, /* special_function */
1177 "R_PPC_GOT_TLSGD16_HI", /* name */
1178 FALSE, /* partial_inplace */
1179 0, /* src_mask */
1180 0xffff, /* dst_mask */
1181 FALSE), /* pcrel_offset */
252b5132 1182
7619e7c7
AM
1183 /* Like GOT_TLSGD16_HI, but adjust for low 16 bits. */
1184 HOWTO (R_PPC_GOT_TLSGD16_HA,
1185 16, /* rightshift */
1186 1, /* size (0 = byte, 1 = short, 2 = long) */
1187 16, /* bitsize */
1188 FALSE, /* pc_relative */
1189 0, /* bitpos */
1190 complain_overflow_dont, /* complain_on_overflow */
1191 ppc_elf_unhandled_reloc, /* special_function */
1192 "R_PPC_GOT_TLSGD16_HA", /* name */
1193 FALSE, /* partial_inplace */
1194 0, /* src_mask */
1195 0xffff, /* dst_mask */
1196 FALSE), /* pcrel_offset */
1197
1198 /* Allocates two contiguous entries in the GOT to hold a tls_index structure,
1199 with values (sym+add)@dtpmod and zero, and computes the offset to the
1200 first entry. */
1201 HOWTO (R_PPC_GOT_TLSLD16,
252b5132
RH
1202 0, /* rightshift */
1203 1, /* size (0 = byte, 1 = short, 2 = long) */
1204 16, /* bitsize */
7619e7c7 1205 FALSE, /* pc_relative */
252b5132
RH
1206 0, /* bitpos */
1207 complain_overflow_signed, /* complain_on_overflow */
7619e7c7
AM
1208 ppc_elf_unhandled_reloc, /* special_function */
1209 "R_PPC_GOT_TLSLD16", /* name */
b34976b6 1210 FALSE, /* partial_inplace */
252b5132
RH
1211 0, /* src_mask */
1212 0xffff, /* dst_mask */
b34976b6 1213 FALSE), /* pcrel_offset */
252b5132 1214
7619e7c7
AM
1215 /* Like GOT_TLSLD16, but no overflow. */
1216 HOWTO (R_PPC_GOT_TLSLD16_LO,
252b5132 1217 0, /* rightshift */
7619e7c7
AM
1218 1, /* size (0 = byte, 1 = short, 2 = long) */
1219 16, /* bitsize */
b34976b6 1220 FALSE, /* pc_relative */
252b5132
RH
1221 0, /* bitpos */
1222 complain_overflow_dont, /* complain_on_overflow */
7619e7c7
AM
1223 ppc_elf_unhandled_reloc, /* special_function */
1224 "R_PPC_GOT_TLSLD16_LO", /* name */
b34976b6 1225 FALSE, /* partial_inplace */
252b5132 1226 0, /* src_mask */
7619e7c7 1227 0xffff, /* dst_mask */
b34976b6 1228 FALSE), /* pcrel_offset */
252b5132 1229
7619e7c7
AM
1230 /* Like GOT_TLSLD16_LO, but next higher group of 16 bits. */
1231 HOWTO (R_PPC_GOT_TLSLD16_HI,
1232 16, /* rightshift */
1233 1, /* size (0 = byte, 1 = short, 2 = long) */
1234 16, /* bitsize */
b34976b6 1235 FALSE, /* pc_relative */
252b5132
RH
1236 0, /* bitpos */
1237 complain_overflow_dont, /* complain_on_overflow */
7619e7c7
AM
1238 ppc_elf_unhandled_reloc, /* special_function */
1239 "R_PPC_GOT_TLSLD16_HI", /* name */
b34976b6 1240 FALSE, /* partial_inplace */
252b5132 1241 0, /* src_mask */
7619e7c7 1242 0xffff, /* dst_mask */
b34976b6 1243 FALSE), /* pcrel_offset */
252b5132 1244
7619e7c7
AM
1245 /* Like GOT_TLSLD16_HI, but adjust for low 16 bits. */
1246 HOWTO (R_PPC_GOT_TLSLD16_HA,
1247 16, /* rightshift */
1248 1, /* size (0 = byte, 1 = short, 2 = long) */
1249 16, /* bitsize */
1250 FALSE, /* pc_relative */
1251 0, /* bitpos */
1252 complain_overflow_dont, /* complain_on_overflow */
1253 ppc_elf_unhandled_reloc, /* special_function */
1254 "R_PPC_GOT_TLSLD16_HA", /* name */
1255 FALSE, /* partial_inplace */
1256 0, /* src_mask */
1257 0xffff, /* dst_mask */
1258 FALSE), /* pcrel_offset */
1259
1260 /* Allocates an entry in the GOT with value (sym+add)@dtprel, and computes
1261 the offset to the entry. */
1262 HOWTO (R_PPC_GOT_DTPREL16,
252b5132
RH
1263 0, /* rightshift */
1264 1, /* size (0 = byte, 1 = short, 2 = long) */
1265 16, /* bitsize */
b34976b6 1266 FALSE, /* pc_relative */
252b5132
RH
1267 0, /* bitpos */
1268 complain_overflow_signed, /* complain_on_overflow */
7619e7c7
AM
1269 ppc_elf_unhandled_reloc, /* special_function */
1270 "R_PPC_GOT_DTPREL16", /* name */
b34976b6 1271 FALSE, /* partial_inplace */
252b5132
RH
1272 0, /* src_mask */
1273 0xffff, /* dst_mask */
b34976b6 1274 FALSE), /* pcrel_offset */
252b5132 1275
7619e7c7
AM
1276 /* Like GOT_DTPREL16, but no overflow. */
1277 HOWTO (R_PPC_GOT_DTPREL16_LO,
1278 0, /* rightshift */
1279 1, /* size (0 = byte, 1 = short, 2 = long) */
1280 16, /* bitsize */
1281 FALSE, /* pc_relative */
1282 0, /* bitpos */
1283 complain_overflow_dont, /* complain_on_overflow */
1284 ppc_elf_unhandled_reloc, /* special_function */
1285 "R_PPC_GOT_DTPREL16_LO", /* name */
1286 FALSE, /* partial_inplace */
1287 0, /* src_mask */
1288 0xffff, /* dst_mask */
1289 FALSE), /* pcrel_offset */
252b5132 1290
7619e7c7
AM
1291 /* Like GOT_DTPREL16_LO, but next higher group of 16 bits. */
1292 HOWTO (R_PPC_GOT_DTPREL16_HI,
1293 16, /* rightshift */
1294 1, /* size (0 = byte, 1 = short, 2 = long) */
1295 16, /* bitsize */
1296 FALSE, /* pc_relative */
1297 0, /* bitpos */
1298 complain_overflow_dont, /* complain_on_overflow */
1299 ppc_elf_unhandled_reloc, /* special_function */
1300 "R_PPC_GOT_DTPREL16_HI", /* name */
1301 FALSE, /* partial_inplace */
1302 0, /* src_mask */
1303 0xffff, /* dst_mask */
1304 FALSE), /* pcrel_offset */
252b5132 1305
7619e7c7
AM
1306 /* Like GOT_DTPREL16_HI, but adjust for low 16 bits. */
1307 HOWTO (R_PPC_GOT_DTPREL16_HA,
1308 16, /* rightshift */
1309 1, /* size (0 = byte, 1 = short, 2 = long) */
1310 16, /* bitsize */
1311 FALSE, /* pc_relative */
1312 0, /* bitpos */
1313 complain_overflow_dont, /* complain_on_overflow */
1314 ppc_elf_unhandled_reloc, /* special_function */
1315 "R_PPC_GOT_DTPREL16_HA", /* name */
1316 FALSE, /* partial_inplace */
1317 0, /* src_mask */
1318 0xffff, /* dst_mask */
1319 FALSE), /* pcrel_offset */
c3668558 1320
7619e7c7
AM
1321 /* Allocates an entry in the GOT with value (sym+add)@tprel, and computes the
1322 offset to the entry. */
1323 HOWTO (R_PPC_GOT_TPREL16,
1324 0, /* rightshift */
1325 1, /* size (0 = byte, 1 = short, 2 = long) */
1326 16, /* bitsize */
1327 FALSE, /* pc_relative */
1328 0, /* bitpos */
1329 complain_overflow_signed, /* complain_on_overflow */
1330 ppc_elf_unhandled_reloc, /* special_function */
1331 "R_PPC_GOT_TPREL16", /* name */
1332 FALSE, /* partial_inplace */
1333 0, /* src_mask */
1334 0xffff, /* dst_mask */
1335 FALSE), /* pcrel_offset */
1336
1337 /* Like GOT_TPREL16, but no overflow. */
1338 HOWTO (R_PPC_GOT_TPREL16_LO,
1339 0, /* rightshift */
1340 1, /* size (0 = byte, 1 = short, 2 = long) */
1341 16, /* bitsize */
1342 FALSE, /* pc_relative */
1343 0, /* bitpos */
1344 complain_overflow_dont, /* complain_on_overflow */
1345 ppc_elf_unhandled_reloc, /* special_function */
1346 "R_PPC_GOT_TPREL16_LO", /* name */
1347 FALSE, /* partial_inplace */
1348 0, /* src_mask */
1349 0xffff, /* dst_mask */
1350 FALSE), /* pcrel_offset */
1351
1352 /* Like GOT_TPREL16_LO, but next higher group of 16 bits. */
1353 HOWTO (R_PPC_GOT_TPREL16_HI,
1354 16, /* rightshift */
1355 1, /* size (0 = byte, 1 = short, 2 = long) */
1356 16, /* bitsize */
1357 FALSE, /* pc_relative */
1358 0, /* bitpos */
1359 complain_overflow_dont, /* complain_on_overflow */
1360 ppc_elf_unhandled_reloc, /* special_function */
1361 "R_PPC_GOT_TPREL16_HI", /* name */
1362 FALSE, /* partial_inplace */
1363 0, /* src_mask */
1364 0xffff, /* dst_mask */
1365 FALSE), /* pcrel_offset */
1366
1367 /* Like GOT_TPREL16_HI, but adjust for low 16 bits. */
1368 HOWTO (R_PPC_GOT_TPREL16_HA,
1369 16, /* rightshift */
1370 1, /* size (0 = byte, 1 = short, 2 = long) */
1371 16, /* bitsize */
1372 FALSE, /* pc_relative */
1373 0, /* bitpos */
1374 complain_overflow_dont, /* complain_on_overflow */
1375 ppc_elf_unhandled_reloc, /* special_function */
1376 "R_PPC_GOT_TPREL16_HA", /* name */
1377 FALSE, /* partial_inplace */
1378 0, /* src_mask */
1379 0xffff, /* dst_mask */
1380 FALSE), /* pcrel_offset */
1381
1382 /* The remaining relocs are from the Embedded ELF ABI, and are not
1383 in the SVR4 ELF ABI. */
1384
1385 /* 32 bit value resulting from the addend minus the symbol. */
1386 HOWTO (R_PPC_EMB_NADDR32, /* type */
1387 0, /* rightshift */
1388 2, /* size (0 = byte, 1 = short, 2 = long) */
1389 32, /* bitsize */
1390 FALSE, /* pc_relative */
1391 0, /* bitpos */
1392 complain_overflow_bitfield, /* complain_on_overflow */
1393 bfd_elf_generic_reloc, /* special_function */
1394 "R_PPC_EMB_NADDR32", /* name */
1395 FALSE, /* partial_inplace */
1396 0, /* src_mask */
1397 0xffffffff, /* dst_mask */
1398 FALSE), /* pcrel_offset */
1399
1400 /* 16 bit value resulting from the addend minus the symbol. */
1401 HOWTO (R_PPC_EMB_NADDR16, /* type */
1402 0, /* rightshift */
1403 1, /* size (0 = byte, 1 = short, 2 = long) */
1404 16, /* bitsize */
1405 FALSE, /* pc_relative */
1406 0, /* bitpos */
1407 complain_overflow_bitfield, /* complain_on_overflow */
1408 bfd_elf_generic_reloc, /* special_function */
1409 "R_PPC_EMB_NADDR16", /* name */
1410 FALSE, /* partial_inplace */
1411 0, /* src_mask */
1412 0xffff, /* dst_mask */
1413 FALSE), /* pcrel_offset */
1414
1415 /* 16 bit value resulting from the addend minus the symbol. */
1416 HOWTO (R_PPC_EMB_NADDR16_LO, /* type */
1417 0, /* rightshift */
1418 1, /* size (0 = byte, 1 = short, 2 = long) */
1419 16, /* bitsize */
1420 FALSE, /* pc_relative */
1421 0, /* bitpos */
1422 complain_overflow_dont,/* complain_on_overflow */
1423 bfd_elf_generic_reloc, /* special_function */
1424 "R_PPC_EMB_ADDR16_LO", /* name */
1425 FALSE, /* partial_inplace */
1426 0, /* src_mask */
1427 0xffff, /* dst_mask */
1428 FALSE), /* pcrel_offset */
1429
1430 /* The high order 16 bits of the addend minus the symbol. */
1431 HOWTO (R_PPC_EMB_NADDR16_HI, /* type */
1432 16, /* rightshift */
1433 1, /* size (0 = byte, 1 = short, 2 = long) */
1434 16, /* bitsize */
1435 FALSE, /* pc_relative */
1436 0, /* bitpos */
1437 complain_overflow_dont, /* complain_on_overflow */
1438 bfd_elf_generic_reloc, /* special_function */
1439 "R_PPC_EMB_NADDR16_HI", /* name */
1440 FALSE, /* partial_inplace */
1441 0, /* src_mask */
1442 0xffff, /* dst_mask */
1443 FALSE), /* pcrel_offset */
1444
1445 /* The high order 16 bits of the result of the addend minus the address,
1446 plus 1 if the contents of the low 16 bits, treated as a signed number,
1447 is negative. */
1448 HOWTO (R_PPC_EMB_NADDR16_HA, /* type */
1449 16, /* rightshift */
1450 1, /* size (0 = byte, 1 = short, 2 = long) */
1451 16, /* bitsize */
1452 FALSE, /* pc_relative */
1453 0, /* bitpos */
1454 complain_overflow_dont, /* complain_on_overflow */
1455 ppc_elf_addr16_ha_reloc, /* special_function */
1456 "R_PPC_EMB_NADDR16_HA", /* name */
1457 FALSE, /* partial_inplace */
1458 0, /* src_mask */
1459 0xffff, /* dst_mask */
1460 FALSE), /* pcrel_offset */
1461
1462 /* 16 bit value resulting from allocating a 4 byte word to hold an
1463 address in the .sdata section, and returning the offset from
1464 _SDA_BASE_ for that relocation. */
1465 HOWTO (R_PPC_EMB_SDAI16, /* type */
1466 0, /* rightshift */
1467 1, /* size (0 = byte, 1 = short, 2 = long) */
1468 16, /* bitsize */
1469 FALSE, /* pc_relative */
1470 0, /* bitpos */
1471 complain_overflow_bitfield, /* complain_on_overflow */
1472 bfd_elf_generic_reloc, /* special_function */
1473 "R_PPC_EMB_SDAI16", /* name */
1474 FALSE, /* partial_inplace */
1475 0, /* src_mask */
1476 0xffff, /* dst_mask */
1477 FALSE), /* pcrel_offset */
1478
1479 /* 16 bit value resulting from allocating a 4 byte word to hold an
1480 address in the .sdata2 section, and returning the offset from
1481 _SDA2_BASE_ for that relocation. */
1482 HOWTO (R_PPC_EMB_SDA2I16, /* type */
1483 0, /* rightshift */
1484 1, /* size (0 = byte, 1 = short, 2 = long) */
1485 16, /* bitsize */
1486 FALSE, /* pc_relative */
1487 0, /* bitpos */
1488 complain_overflow_bitfield, /* complain_on_overflow */
1489 bfd_elf_generic_reloc, /* special_function */
1490 "R_PPC_EMB_SDA2I16", /* name */
1491 FALSE, /* partial_inplace */
1492 0, /* src_mask */
1493 0xffff, /* dst_mask */
1494 FALSE), /* pcrel_offset */
1495
1496 /* A sign-extended 16 bit value relative to _SDA2_BASE_, for use with
1497 small data items. */
1498 HOWTO (R_PPC_EMB_SDA2REL, /* type */
1499 0, /* rightshift */
1500 1, /* size (0 = byte, 1 = short, 2 = long) */
1501 16, /* bitsize */
1502 FALSE, /* pc_relative */
1503 0, /* bitpos */
1504 complain_overflow_signed, /* complain_on_overflow */
1505 bfd_elf_generic_reloc, /* special_function */
1506 "R_PPC_EMB_SDA2REL", /* name */
1507 FALSE, /* partial_inplace */
1508 0, /* src_mask */
1509 0xffff, /* dst_mask */
1510 FALSE), /* pcrel_offset */
1511
1512 /* Relocate against either _SDA_BASE_ or _SDA2_BASE_, filling in the 16 bit
1513 signed offset from the appropriate base, and filling in the register
1514 field with the appropriate register (0, 2, or 13). */
1515 HOWTO (R_PPC_EMB_SDA21, /* type */
1516 0, /* rightshift */
1517 2, /* size (0 = byte, 1 = short, 2 = long) */
1518 16, /* bitsize */
1519 FALSE, /* pc_relative */
1520 0, /* bitpos */
1521 complain_overflow_signed, /* complain_on_overflow */
1522 bfd_elf_generic_reloc, /* special_function */
1523 "R_PPC_EMB_SDA21", /* name */
1524 FALSE, /* partial_inplace */
1525 0, /* src_mask */
1526 0xffff, /* dst_mask */
1527 FALSE), /* pcrel_offset */
1528
1529 /* Relocation not handled: R_PPC_EMB_MRKREF */
1530 /* Relocation not handled: R_PPC_EMB_RELSEC16 */
1531 /* Relocation not handled: R_PPC_EMB_RELST_LO */
1532 /* Relocation not handled: R_PPC_EMB_RELST_HI */
1533 /* Relocation not handled: R_PPC_EMB_RELST_HA */
1534 /* Relocation not handled: R_PPC_EMB_BIT_FLD */
1535
1536 /* PC relative relocation against either _SDA_BASE_ or _SDA2_BASE_, filling
1537 in the 16 bit signed offset from the appropriate base, and filling in the
1538 register field with the appropriate register (0, 2, or 13). */
1539 HOWTO (R_PPC_EMB_RELSDA, /* type */
1540 0, /* rightshift */
1541 1, /* size (0 = byte, 1 = short, 2 = long) */
1542 16, /* bitsize */
1543 TRUE, /* pc_relative */
1544 0, /* bitpos */
1545 complain_overflow_signed, /* complain_on_overflow */
1546 bfd_elf_generic_reloc, /* special_function */
1547 "R_PPC_EMB_RELSDA", /* name */
1548 FALSE, /* partial_inplace */
1549 0, /* src_mask */
1550 0xffff, /* dst_mask */
1551 FALSE), /* pcrel_offset */
1552
1553 /* GNU extension to record C++ vtable hierarchy. */
1554 HOWTO (R_PPC_GNU_VTINHERIT, /* type */
1555 0, /* rightshift */
1556 0, /* size (0 = byte, 1 = short, 2 = long) */
1557 0, /* bitsize */
1558 FALSE, /* pc_relative */
1559 0, /* bitpos */
1560 complain_overflow_dont, /* complain_on_overflow */
1561 NULL, /* special_function */
1562 "R_PPC_GNU_VTINHERIT", /* name */
1563 FALSE, /* partial_inplace */
1564 0, /* src_mask */
1565 0, /* dst_mask */
1566 FALSE), /* pcrel_offset */
1567
1568 /* GNU extension to record C++ vtable member usage. */
1569 HOWTO (R_PPC_GNU_VTENTRY, /* type */
1570 0, /* rightshift */
1571 0, /* size (0 = byte, 1 = short, 2 = long) */
1572 0, /* bitsize */
1573 FALSE, /* pc_relative */
1574 0, /* bitpos */
1575 complain_overflow_dont, /* complain_on_overflow */
1576 NULL, /* special_function */
1577 "R_PPC_GNU_VTENTRY", /* name */
1578 FALSE, /* partial_inplace */
1579 0, /* src_mask */
1580 0, /* dst_mask */
1581 FALSE), /* pcrel_offset */
1582
1583 /* Phony reloc to handle AIX style TOC entries. */
1584 HOWTO (R_PPC_TOC16, /* type */
1585 0, /* rightshift */
1586 1, /* size (0 = byte, 1 = short, 2 = long) */
1587 16, /* bitsize */
1588 FALSE, /* pc_relative */
1589 0, /* bitpos */
1590 complain_overflow_signed, /* complain_on_overflow */
1591 bfd_elf_generic_reloc, /* special_function */
1592 "R_PPC_TOC16", /* name */
1593 FALSE, /* partial_inplace */
1594 0, /* src_mask */
1595 0xffff, /* dst_mask */
1596 FALSE), /* pcrel_offset */
1597};
1598\f
1599/* Initialize the ppc_elf_howto_table, so that linear accesses can be done. */
1600
1601static void
1602ppc_elf_howto_init ()
1603{
1604 unsigned int i, type;
1605
1606 for (i = 0; i < sizeof (ppc_elf_howto_raw) / sizeof (ppc_elf_howto_raw[0]); i++)
1607 {
1608 type = ppc_elf_howto_raw[i].type;
1609 BFD_ASSERT (type < sizeof (ppc_elf_howto_table) / sizeof (ppc_elf_howto_table[0]));
1610 ppc_elf_howto_table[type] = &ppc_elf_howto_raw[i];
1611 }
1612}
1613\f
1614/* This function handles relaxing for the PPC with option --mpc860c0[=<n>].
1615
1616 The MPC860, revision C0 or earlier contains a bug in the die.
1617 If all of the following conditions are true, the next instruction
1618 to be executed *may* be treated as a no-op.
1619 1/ A forward branch is executed.
1620 2/ The branch is predicted as not taken.
1621 3/ The branch is taken.
1622 4/ The branch is located in the last 5 words of a page.
1623 (The EOP limit is 5 by default but may be specified as any value from 1-10.)
1624
1625 Our software solution is to detect these problematic branches in a
1626 linker pass and modify them as follows:
1627 1/ Unconditional branches - Since these are always predicted taken,
252b5132
RH
1628 there is no problem and no action is required.
1629 2/ Conditional backward branches - No problem, no action required.
1630 3/ Conditional forward branches - Ensure that the "inverse prediction
1631 bit" is set (ensure it is predicted taken).
1632 4/ Conditional register branches - Ensure that the "y bit" is set
ae9a127f 1633 (ensure it is predicted taken). */
252b5132
RH
1634
1635/* Sort sections by address. */
1636
1637static int
1638ppc_elf_sort_rela (arg1, arg2)
a7b97311
AM
1639 const PTR arg1;
1640 const PTR arg2;
252b5132
RH
1641{
1642 const Elf_Internal_Rela **rela1 = (const Elf_Internal_Rela**) arg1;
1643 const Elf_Internal_Rela **rela2 = (const Elf_Internal_Rela**) arg2;
1644
c3668558 1645 /* Sort by offset. */
252b5132
RH
1646 return ((*rela1)->r_offset - (*rela2)->r_offset);
1647}
1648
b34976b6 1649static bfd_boolean
252b5132 1650ppc_elf_relax_section (abfd, isec, link_info, again)
8da6118f
KH
1651 bfd *abfd;
1652 asection *isec;
1653 struct bfd_link_info *link_info;
b34976b6 1654 bfd_boolean *again;
252b5132
RH
1655{
1656#define PAGESIZE 0x1000
1657
1658 bfd_byte *contents = NULL;
1659 bfd_byte *free_contents = NULL;
1660 Elf_Internal_Rela *internal_relocs = NULL;
1661 Elf_Internal_Rela *free_relocs = NULL;
1662 Elf_Internal_Rela **rela_comb = NULL;
1663 int comb_curr, comb_count;
1664
c3668558 1665 /* We never have to do this more than once per input section. */
b34976b6 1666 *again = FALSE;
252b5132
RH
1667
1668 /* If needed, initialize this section's cooked size. */
1669 if (isec->_cooked_size == 0)
1670 isec->_cooked_size = isec->_raw_size;
1671
1672 /* We're only interested in text sections which overlap the
8da6118f 1673 troublesome area at the end of a page. */
252b5132
RH
1674 if (link_info->mpc860c0 && (isec->flags & SEC_CODE) && isec->_cooked_size)
1675 {
1676 bfd_vma dot, end_page, end_section;
b34976b6 1677 bfd_boolean section_modified;
252b5132 1678
c3668558 1679 /* Get the section contents. */
252b5132
RH
1680 /* Get cached copy if it exists. */
1681 if (elf_section_data (isec)->this_hdr.contents != NULL)
1682 contents = elf_section_data (isec)->this_hdr.contents;
1683 else
1684 {
1685 /* Go get them off disk. */
1686 contents = (bfd_byte *) bfd_malloc (isec->_raw_size);
1687 if (contents == NULL)
8da6118f 1688 goto error_return;
252b5132
RH
1689 free_contents = contents;
1690
1691 if (! bfd_get_section_contents (abfd, isec, contents,
1692 (file_ptr) 0, isec->_raw_size))
8da6118f 1693 goto error_return;
252b5132
RH
1694 }
1695
1696 comb_curr = 0;
1697 comb_count = 0;
1698 if (isec->reloc_count)
8da6118f 1699 {
252b5132 1700 unsigned n;
dc810e39 1701 bfd_size_type amt;
252b5132
RH
1702
1703 /* Get a copy of the native relocations. */
1704 internal_relocs = _bfd_elf32_link_read_relocs (
c3668558 1705 abfd, isec, (PTR) NULL, (Elf_Internal_Rela *) NULL,
252b5132
RH
1706 link_info->keep_memory);
1707 if (internal_relocs == NULL)
1708 goto error_return;
1709 if (! link_info->keep_memory)
1710 free_relocs = internal_relocs;
c3668558
KH
1711
1712 /* Setup a faster access method for the reloc info we need. */
dc810e39
AM
1713 amt = isec->reloc_count;
1714 amt *= sizeof (Elf_Internal_Rela*);
1715 rela_comb = (Elf_Internal_Rela**) bfd_malloc (amt);
252b5132
RH
1716 if (rela_comb == NULL)
1717 goto error_return;
8da6118f 1718 for (n = 0; n < isec->reloc_count; ++n)
252b5132
RH
1719 {
1720 long r_type;
c3668558 1721
252b5132 1722 r_type = ELF32_R_TYPE (internal_relocs[n].r_info);
8da6118f 1723 if (r_type < 0 || r_type >= (int) R_PPC_max)
252b5132 1724 goto error_return;
c3668558 1725
252b5132
RH
1726 /* Prologue constants are sometimes present in the ".text"
1727 sections and they can be identified by their associated relocation.
1728 We don't want to process those words and some others which
1729 can also be identified by their relocations. However, not all
1730 conditional branches will have a relocation so we will
1731 only ignore words that 1) have a reloc, and 2) the reloc
1732 is not applicable to a conditional branch.
c3668558 1733 The array rela_comb is built here for use in the EOP scan loop. */
252b5132
RH
1734 switch (r_type)
1735 {
ae9a127f
NC
1736 case R_PPC_ADDR14_BRNTAKEN: /* Absolute, predicted not taken */
1737 case R_PPC_REL14: /* Relative cond. br. */
1738 case R_PPC_REL14_BRNTAKEN: /* Rel. cond. br., predicted not taken */
c3668558 1739 /* We should check the instruction. */
252b5132
RH
1740 break;
1741 default:
c3668558 1742 /* The word is not a conditional branch - ignore it. */
252b5132
RH
1743 rela_comb[comb_count++] = &internal_relocs[n];
1744 break;
1745 }
1746 }
1747 if (comb_count > 1)
8da6118f
KH
1748 qsort (rela_comb, (size_t) comb_count, sizeof (int), ppc_elf_sort_rela);
1749 }
252b5132 1750
c3668558 1751 /* Enumerate each EOP region that overlaps this section. */
252b5132
RH
1752 end_section = isec->vma + isec->_cooked_size;
1753 dot = end_page = (isec->vma | (PAGESIZE - 1)) + 1;
1754 dot -= link_info->mpc860c0;
b34976b6 1755 section_modified = FALSE;
252b5132 1756 if (dot < isec->vma) /* Increment the start position if this section */
c3668558 1757 dot = isec->vma; /* begins in the middle of its first EOP region. */
252b5132
RH
1758 for (;
1759 dot < end_section;
1760 dot += PAGESIZE, end_page += PAGESIZE)
1761 {
1762
c3668558 1763 /* Check each word in this EOP region. */
252b5132
RH
1764 for (; dot < end_page; dot += 4)
1765 {
1766 bfd_vma isec_offset;
1767 unsigned long insn;
b34976b6 1768 bfd_boolean skip, modified;
252b5132
RH
1769
1770 /* Don't process this word if there is a relocation for it and
ae9a127f 1771 the relocation indicates the word is not a conditional branch. */
b34976b6 1772 skip = FALSE;
252b5132
RH
1773 isec_offset = dot - isec->vma;
1774 for (; comb_curr<comb_count; ++comb_curr)
1775 {
1776 bfd_vma r_offset;
1777
1778 r_offset = rela_comb[comb_curr]->r_offset;
1779 if (r_offset >= isec_offset)
1780 {
b34976b6 1781 if (r_offset == isec_offset) skip = TRUE;
252b5132
RH
1782 break;
1783 }
1784 }
1785 if (skip) continue;
1786
c3668558 1787 /* Check the current word for a problematic conditional branch. */
252b5132
RH
1788#define BO0(insn) ((insn) & 0x02000000)
1789#define BO2(insn) ((insn) & 0x00800000)
1790#define BO4(insn) ((insn) & 0x00200000)
1791 insn = (unsigned long) bfd_get_32 (abfd, contents + isec_offset);
b34976b6 1792 modified = FALSE;
252b5132
RH
1793 if ((insn & 0xFc000000) == 0x40000000)
1794 {
1795 /* Instruction is BCx */
1796 if ((!BO0(insn) || !BO2(insn)) && !BO4(insn))
1797 {
1798 bfd_vma target;
1799 /* This branch is predicted as "normal".
ae9a127f 1800 If this is a forward branch, it is problematic. */
252b5132
RH
1801
1802 target = insn & 0x0000Fffc; /*extract*/
1803 target = (target ^ 0x8000) - 0x8000; /*sign extend*/
1804 if ((insn & 0x00000002) == 0)
1805 target += dot; /*convert to abs*/
1806 if (target > dot)
1807 {
ae9a127f 1808 insn |= 0x00200000; /* Set the prediction bit. */
b34976b6 1809 modified = TRUE;
252b5132
RH
1810 }
1811 }
1812 }
1813 else if ((insn & 0xFc00Fffe) == 0x4c000420)
1814 {
ae9a127f 1815 /* Instruction is BCCTRx. */
252b5132
RH
1816 if ((!BO0(insn) || !BO2(insn)) && !BO4(insn))
1817 {
1818 /* This branch is predicted as not-taken.
ae9a127f
NC
1819 If this is a forward branch, it is problematic.
1820 Since we can't tell statically if it will branch forward,
1821 always set the prediction bit. */
1822 insn |= 0x00200000; /* Set the prediction bit. */
b34976b6 1823 modified = TRUE;
252b5132
RH
1824 }
1825 }
1826 else if ((insn & 0xFc00Fffe) == 0x4c000020)
1827 {
1828 /* Instruction is BCLRx */
1829 if ((!BO0(insn) || !BO2(insn)) && !BO4(insn))
1830 {
1831 /* This branch is predicted as not-taken.
ae9a127f
NC
1832 If this is a forward branch, it is problematic.
1833 Since we can't tell statically if it will branch forward,
1834 always set the prediction bit. */
1835 insn |= 0x00200000; /* Set the prediction bit. */
b34976b6 1836 modified = TRUE;
252b5132
RH
1837 }
1838 }
1839#undef BO0
1840#undef BO2
1841#undef BO4
1842 if (modified)
1843 {
dc810e39 1844 bfd_put_32 (abfd, (bfd_vma) insn, contents + isec_offset);
b34976b6 1845 section_modified = TRUE;
252b5132
RH
1846 }
1847 }
1848 }
1849 if (section_modified)
1850 {
1851 elf_section_data (isec)->this_hdr.contents = contents;
1852 free_contents = NULL;
1853 }
1854 }
1855
1856 if (rela_comb != NULL)
1857 {
1858 free (rela_comb);
1859 rela_comb = NULL;
1860 }
1861
1862 if (free_relocs != NULL)
1863 {
1864 free (free_relocs);
1865 free_relocs = NULL;
1866 }
1867
1868 if (free_contents != NULL)
1869 {
1870 if (! link_info->keep_memory)
1871 free (free_contents);
1872 else
1873 {
1874 /* Cache the section contents for elf_link_input_bfd. */
1875 elf_section_data (isec)->this_hdr.contents = contents;
1876 }
1877 free_contents = NULL;
1878 }
1879
b34976b6 1880 return TRUE;
252b5132
RH
1881
1882error_return:
1883 if (rela_comb != NULL)
1884 free (rela_comb);
1885 if (free_relocs != NULL)
1886 free (free_relocs);
1887 if (free_contents != NULL)
1888 free (free_contents);
b34976b6 1889 return FALSE;
252b5132 1890}
252b5132
RH
1891\f
1892static reloc_howto_type *
1893ppc_elf_reloc_type_lookup (abfd, code)
5f771d47 1894 bfd *abfd ATTRIBUTE_UNUSED;
252b5132
RH
1895 bfd_reloc_code_real_type code;
1896{
7619e7c7 1897 enum elf_ppc_reloc_type r;
252b5132
RH
1898
1899 if (!ppc_elf_howto_table[R_PPC_ADDR32])
8da6118f 1900 /* Initialize howto table if needed. */
252b5132
RH
1901 ppc_elf_howto_init ();
1902
8da6118f 1903 switch ((int) code)
252b5132
RH
1904 {
1905 default:
8da6118f 1906 return (reloc_howto_type *) NULL;
252b5132 1907
7619e7c7
AM
1908 case BFD_RELOC_NONE: r = R_PPC_NONE; break;
1909 case BFD_RELOC_32: r = R_PPC_ADDR32; break;
1910 case BFD_RELOC_PPC_BA26: r = R_PPC_ADDR24; break;
1911 case BFD_RELOC_16: r = R_PPC_ADDR16; break;
1912 case BFD_RELOC_LO16: r = R_PPC_ADDR16_LO; break;
1913 case BFD_RELOC_HI16: r = R_PPC_ADDR16_HI; break;
1914 case BFD_RELOC_HI16_S: r = R_PPC_ADDR16_HA; break;
1915 case BFD_RELOC_PPC_BA16: r = R_PPC_ADDR14; break;
1916 case BFD_RELOC_PPC_BA16_BRTAKEN: r = R_PPC_ADDR14_BRTAKEN; break;
1917 case BFD_RELOC_PPC_BA16_BRNTAKEN: r = R_PPC_ADDR14_BRNTAKEN; break;
1918 case BFD_RELOC_PPC_B26: r = R_PPC_REL24; break;
1919 case BFD_RELOC_PPC_B16: r = R_PPC_REL14; break;
1920 case BFD_RELOC_PPC_B16_BRTAKEN: r = R_PPC_REL14_BRTAKEN; break;
1921 case BFD_RELOC_PPC_B16_BRNTAKEN: r = R_PPC_REL14_BRNTAKEN; break;
1922 case BFD_RELOC_16_GOTOFF: r = R_PPC_GOT16; break;
1923 case BFD_RELOC_LO16_GOTOFF: r = R_PPC_GOT16_LO; break;
1924 case BFD_RELOC_HI16_GOTOFF: r = R_PPC_GOT16_HI; break;
1925 case BFD_RELOC_HI16_S_GOTOFF: r = R_PPC_GOT16_HA; break;
1926 case BFD_RELOC_24_PLT_PCREL: r = R_PPC_PLTREL24; break;
1927 case BFD_RELOC_PPC_COPY: r = R_PPC_COPY; break;
1928 case BFD_RELOC_PPC_GLOB_DAT: r = R_PPC_GLOB_DAT; break;
1929 case BFD_RELOC_PPC_LOCAL24PC: r = R_PPC_LOCAL24PC; break;
1930 case BFD_RELOC_32_PCREL: r = R_PPC_REL32; break;
1931 case BFD_RELOC_32_PLTOFF: r = R_PPC_PLT32; break;
1932 case BFD_RELOC_32_PLT_PCREL: r = R_PPC_PLTREL32; break;
1933 case BFD_RELOC_LO16_PLTOFF: r = R_PPC_PLT16_LO; break;
1934 case BFD_RELOC_HI16_PLTOFF: r = R_PPC_PLT16_HI; break;
1935 case BFD_RELOC_HI16_S_PLTOFF: r = R_PPC_PLT16_HA; break;
1936 case BFD_RELOC_GPREL16: r = R_PPC_SDAREL16; break;
1937 case BFD_RELOC_16_BASEREL: r = R_PPC_SECTOFF; break;
1938 case BFD_RELOC_LO16_BASEREL: r = R_PPC_SECTOFF_LO; break;
1939 case BFD_RELOC_HI16_BASEREL: r = R_PPC_SECTOFF_HI; break;
1940 case BFD_RELOC_HI16_S_BASEREL: r = R_PPC_SECTOFF_HA; break;
1941 case BFD_RELOC_CTOR: r = R_PPC_ADDR32; break;
1942 case BFD_RELOC_PPC_TOC16: r = R_PPC_TOC16; break;
1943 case BFD_RELOC_PPC_TLS: r = R_PPC_TLS; break;
1944 case BFD_RELOC_PPC_DTPMOD: r = R_PPC_DTPMOD32; break;
1945 case BFD_RELOC_PPC_TPREL16: r = R_PPC_TPREL16; break;
1946 case BFD_RELOC_PPC_TPREL16_LO: r = R_PPC_TPREL16_LO; break;
1947 case BFD_RELOC_PPC_TPREL16_HI: r = R_PPC_TPREL16_HI; break;
1948 case BFD_RELOC_PPC_TPREL16_HA: r = R_PPC_TPREL16_HA; break;
1949 case BFD_RELOC_PPC_TPREL: r = R_PPC_TPREL32; break;
1950 case BFD_RELOC_PPC_DTPREL16: r = R_PPC_DTPREL16; break;
1951 case BFD_RELOC_PPC_DTPREL16_LO: r = R_PPC_DTPREL16_LO; break;
1952 case BFD_RELOC_PPC_DTPREL16_HI: r = R_PPC_DTPREL16_HI; break;
1953 case BFD_RELOC_PPC_DTPREL16_HA: r = R_PPC_DTPREL16_HA; break;
1954 case BFD_RELOC_PPC_DTPREL: r = R_PPC_DTPREL32; break;
1955 case BFD_RELOC_PPC_GOT_TLSGD16: r = R_PPC_GOT_TLSGD16; break;
1956 case BFD_RELOC_PPC_GOT_TLSGD16_LO: r = R_PPC_GOT_TLSGD16_LO; break;
1957 case BFD_RELOC_PPC_GOT_TLSGD16_HI: r = R_PPC_GOT_TLSGD16_HI; break;
1958 case BFD_RELOC_PPC_GOT_TLSGD16_HA: r = R_PPC_GOT_TLSGD16_HA; break;
1959 case BFD_RELOC_PPC_GOT_TLSLD16: r = R_PPC_GOT_TLSLD16; break;
1960 case BFD_RELOC_PPC_GOT_TLSLD16_LO: r = R_PPC_GOT_TLSLD16_LO; break;
1961 case BFD_RELOC_PPC_GOT_TLSLD16_HI: r = R_PPC_GOT_TLSLD16_HI; break;
1962 case BFD_RELOC_PPC_GOT_TLSLD16_HA: r = R_PPC_GOT_TLSLD16_HA; break;
1963 case BFD_RELOC_PPC_GOT_TPREL16: r = R_PPC_GOT_TPREL16; break;
1964 case BFD_RELOC_PPC_GOT_TPREL16_LO: r = R_PPC_GOT_TPREL16_LO; break;
1965 case BFD_RELOC_PPC_GOT_TPREL16_HI: r = R_PPC_GOT_TPREL16_HI; break;
1966 case BFD_RELOC_PPC_GOT_TPREL16_HA: r = R_PPC_GOT_TPREL16_HA; break;
1967 case BFD_RELOC_PPC_GOT_DTPREL16: r = R_PPC_GOT_DTPREL16; break;
1968 case BFD_RELOC_PPC_GOT_DTPREL16_LO: r = R_PPC_GOT_DTPREL16_LO; break;
1969 case BFD_RELOC_PPC_GOT_DTPREL16_HI: r = R_PPC_GOT_DTPREL16_HI; break;
1970 case BFD_RELOC_PPC_GOT_DTPREL16_HA: r = R_PPC_GOT_DTPREL16_HA; break;
1971 case BFD_RELOC_PPC_EMB_NADDR32: r = R_PPC_EMB_NADDR32; break;
1972 case BFD_RELOC_PPC_EMB_NADDR16: r = R_PPC_EMB_NADDR16; break;
1973 case BFD_RELOC_PPC_EMB_NADDR16_LO: r = R_PPC_EMB_NADDR16_LO; break;
1974 case BFD_RELOC_PPC_EMB_NADDR16_HI: r = R_PPC_EMB_NADDR16_HI; break;
1975 case BFD_RELOC_PPC_EMB_NADDR16_HA: r = R_PPC_EMB_NADDR16_HA; break;
1976 case BFD_RELOC_PPC_EMB_SDAI16: r = R_PPC_EMB_SDAI16; break;
1977 case BFD_RELOC_PPC_EMB_SDA2I16: r = R_PPC_EMB_SDA2I16; break;
1978 case BFD_RELOC_PPC_EMB_SDA2REL: r = R_PPC_EMB_SDA2REL; break;
1979 case BFD_RELOC_PPC_EMB_SDA21: r = R_PPC_EMB_SDA21; break;
1980 case BFD_RELOC_PPC_EMB_MRKREF: r = R_PPC_EMB_MRKREF; break;
1981 case BFD_RELOC_PPC_EMB_RELSEC16: r = R_PPC_EMB_RELSEC16; break;
1982 case BFD_RELOC_PPC_EMB_RELST_LO: r = R_PPC_EMB_RELST_LO; break;
1983 case BFD_RELOC_PPC_EMB_RELST_HI: r = R_PPC_EMB_RELST_HI; break;
1984 case BFD_RELOC_PPC_EMB_RELST_HA: r = R_PPC_EMB_RELST_HA; break;
1985 case BFD_RELOC_PPC_EMB_BIT_FLD: r = R_PPC_EMB_BIT_FLD; break;
1986 case BFD_RELOC_PPC_EMB_RELSDA: r = R_PPC_EMB_RELSDA; break;
1987 case BFD_RELOC_VTABLE_INHERIT: r = R_PPC_GNU_VTINHERIT; break;
1988 case BFD_RELOC_VTABLE_ENTRY: r = R_PPC_GNU_VTENTRY; break;
252b5132
RH
1989 }
1990
7619e7c7 1991 return ppc_elf_howto_table[(int) r];
252b5132
RH
1992};
1993
1994/* Set the howto pointer for a PowerPC ELF reloc. */
1995
1996static void
1997ppc_elf_info_to_howto (abfd, cache_ptr, dst)
5f771d47 1998 bfd *abfd ATTRIBUTE_UNUSED;
252b5132 1999 arelent *cache_ptr;
947216bf 2000 Elf_Internal_Rela *dst;
252b5132 2001{
8da6118f
KH
2002 if (!ppc_elf_howto_table[R_PPC_ADDR32])
2003 /* Initialize howto table if needed. */
252b5132
RH
2004 ppc_elf_howto_init ();
2005
2006 BFD_ASSERT (ELF32_R_TYPE (dst->r_info) < (unsigned int) R_PPC_max);
2007 cache_ptr->howto = ppc_elf_howto_table[ELF32_R_TYPE (dst->r_info)];
2008}
2009
2010/* Handle the R_PPC_ADDR16_HA reloc. */
2011
2012static bfd_reloc_status_type
2013ppc_elf_addr16_ha_reloc (abfd, reloc_entry, symbol, data, input_section,
2014 output_bfd, error_message)
5f771d47 2015 bfd *abfd ATTRIBUTE_UNUSED;
252b5132
RH
2016 arelent *reloc_entry;
2017 asymbol *symbol;
5f771d47 2018 PTR data ATTRIBUTE_UNUSED;
252b5132
RH
2019 asection *input_section;
2020 bfd *output_bfd;
5f771d47 2021 char **error_message ATTRIBUTE_UNUSED;
252b5132
RH
2022{
2023 bfd_vma relocation;
2024
2025 if (output_bfd != NULL)
2026 {
2027 reloc_entry->address += input_section->output_offset;
2028 return bfd_reloc_ok;
2029 }
2030
2031 if (reloc_entry->address > input_section->_cooked_size)
2032 return bfd_reloc_outofrange;
2033
2034 if (bfd_is_com_section (symbol->section))
2035 relocation = 0;
2036 else
2037 relocation = symbol->value;
2038
2039 relocation += symbol->section->output_section->vma;
2040 relocation += symbol->section->output_offset;
2041 relocation += reloc_entry->addend;
2042
2043 reloc_entry->addend += (relocation & 0x8000) << 1;
2044
2045 return bfd_reloc_continue;
2046}
2047
7619e7c7
AM
2048static bfd_reloc_status_type
2049ppc_elf_unhandled_reloc (abfd, reloc_entry, symbol, data,
2050 input_section, output_bfd, error_message)
2051 bfd *abfd;
2052 arelent *reloc_entry;
2053 asymbol *symbol;
2054 PTR data;
2055 asection *input_section;
2056 bfd *output_bfd;
2057 char **error_message;
2058{
2059 /* If this is a relocatable link (output_bfd test tells us), just
2060 call the generic function. Any adjustment will be done at final
2061 link time. */
2062 if (output_bfd != NULL)
2063 return bfd_elf_generic_reloc (abfd, reloc_entry, symbol, data,
2064 input_section, output_bfd, error_message);
2065
2066 if (error_message != NULL)
2067 {
2068 static char buf[60];
2069 sprintf (buf, "generic linker can't handle %s",
2070 reloc_entry->howto->name);
2071 *error_message = buf;
2072 }
2073 return bfd_reloc_dangerous;
2074}
2075
feee612b
AM
2076/* Fix bad default arch selected for a 32 bit input bfd when the
2077 default is 64 bit. */
2078
b34976b6 2079static bfd_boolean
feee612b
AM
2080ppc_elf_object_p (abfd)
2081 bfd *abfd;
2082{
2083 if (abfd->arch_info->the_default && abfd->arch_info->bits_per_word == 64)
2084 {
2085 Elf_Internal_Ehdr *i_ehdr = elf_elfheader (abfd);
2086
2087 if (i_ehdr->e_ident[EI_CLASS] == ELFCLASS32)
2088 {
2089 /* Relies on arch after 64 bit default being 32 bit default. */
2090 abfd->arch_info = abfd->arch_info->next;
2091 BFD_ASSERT (abfd->arch_info->bits_per_word == 32);
2092 }
2093 }
b34976b6 2094 return TRUE;
feee612b
AM
2095}
2096
c3668558 2097/* Function to set whether a module needs the -mrelocatable bit set. */
252b5132 2098
b34976b6 2099static bfd_boolean
252b5132
RH
2100ppc_elf_set_private_flags (abfd, flags)
2101 bfd *abfd;
2102 flagword flags;
2103{
2104 BFD_ASSERT (!elf_flags_init (abfd)
2105 || elf_elfheader (abfd)->e_flags == flags);
2106
2107 elf_elfheader (abfd)->e_flags = flags;
b34976b6
AM
2108 elf_flags_init (abfd) = TRUE;
2109 return TRUE;
252b5132
RH
2110}
2111
252b5132 2112/* Merge backend specific data from an object file to the output
ae9a127f
NC
2113 object file when linking. */
2114
b34976b6 2115static bfd_boolean
252b5132
RH
2116ppc_elf_merge_private_bfd_data (ibfd, obfd)
2117 bfd *ibfd;
2118 bfd *obfd;
2119{
2120 flagword old_flags;
2121 flagword new_flags;
b34976b6 2122 bfd_boolean error;
252b5132 2123
ae9a127f 2124 /* Check if we have the same endianess. */
82e51918 2125 if (! _bfd_generic_verify_endian_match (ibfd, obfd))
b34976b6 2126 return FALSE;
252b5132
RH
2127
2128 if (bfd_get_flavour (ibfd) != bfd_target_elf_flavour
2129 || bfd_get_flavour (obfd) != bfd_target_elf_flavour)
b34976b6 2130 return TRUE;
252b5132
RH
2131
2132 new_flags = elf_elfheader (ibfd)->e_flags;
2133 old_flags = elf_elfheader (obfd)->e_flags;
ae9a127f 2134 if (!elf_flags_init (obfd)) /* First call, no flags set. */
252b5132 2135 {
b34976b6 2136 elf_flags_init (obfd) = TRUE;
252b5132
RH
2137 elf_elfheader (obfd)->e_flags = new_flags;
2138 }
2139
ae9a127f 2140 else if (new_flags == old_flags) /* Compatible flags are ok. */
252b5132
RH
2141 ;
2142
ae9a127f 2143 else /* Incompatible flags. */
252b5132
RH
2144 {
2145 /* Warn about -mrelocatable mismatch. Allow -mrelocatable-lib to be linked
2146 with either. */
b34976b6 2147 error = FALSE;
252b5132
RH
2148 if ((new_flags & EF_PPC_RELOCATABLE) != 0
2149 && (old_flags & (EF_PPC_RELOCATABLE | EF_PPC_RELOCATABLE_LIB)) == 0)
2150 {
b34976b6 2151 error = TRUE;
252b5132
RH
2152 (*_bfd_error_handler)
2153 (_("%s: compiled with -mrelocatable and linked with modules compiled normally"),
8f615d07 2154 bfd_archive_filename (ibfd));
252b5132
RH
2155 }
2156 else if ((new_flags & (EF_PPC_RELOCATABLE | EF_PPC_RELOCATABLE_LIB)) == 0
2157 && (old_flags & EF_PPC_RELOCATABLE) != 0)
2158 {
b34976b6 2159 error = TRUE;
252b5132
RH
2160 (*_bfd_error_handler)
2161 (_("%s: compiled normally and linked with modules compiled with -mrelocatable"),
8f615d07 2162 bfd_archive_filename (ibfd));
252b5132
RH
2163 }
2164
2165 /* The output is -mrelocatable-lib iff both the input files are. */
2166 if (! (new_flags & EF_PPC_RELOCATABLE_LIB))
2167 elf_elfheader (obfd)->e_flags &= ~EF_PPC_RELOCATABLE_LIB;
2168
2169 /* The output is -mrelocatable iff it can't be -mrelocatable-lib,
2170 but each input file is either -mrelocatable or -mrelocatable-lib. */
2171 if (! (elf_elfheader (obfd)->e_flags & EF_PPC_RELOCATABLE_LIB)
2172 && (new_flags & (EF_PPC_RELOCATABLE_LIB | EF_PPC_RELOCATABLE))
2173 && (old_flags & (EF_PPC_RELOCATABLE_LIB | EF_PPC_RELOCATABLE)))
2174 elf_elfheader (obfd)->e_flags |= EF_PPC_RELOCATABLE;
2175
ae9a127f 2176 /* Do not warn about eabi vs. V.4 mismatch, just or in the bit if any module uses it. */
252b5132
RH
2177 elf_elfheader (obfd)->e_flags |= (new_flags & EF_PPC_EMB);
2178
2179 new_flags &= ~ (EF_PPC_RELOCATABLE | EF_PPC_RELOCATABLE_LIB | EF_PPC_EMB);
2180 old_flags &= ~ (EF_PPC_RELOCATABLE | EF_PPC_RELOCATABLE_LIB | EF_PPC_EMB);
2181
ae9a127f 2182 /* Warn about any other mismatches. */
252b5132
RH
2183 if (new_flags != old_flags)
2184 {
b34976b6 2185 error = TRUE;
252b5132
RH
2186 (*_bfd_error_handler)
2187 (_("%s: uses different e_flags (0x%lx) fields than previous modules (0x%lx)"),
8f615d07 2188 bfd_archive_filename (ibfd), (long) new_flags, (long) old_flags);
252b5132
RH
2189 }
2190
2191 if (error)
2192 {
2193 bfd_set_error (bfd_error_bad_value);
b34976b6 2194 return FALSE;
252b5132
RH
2195 }
2196 }
2197
b34976b6 2198 return TRUE;
252b5132 2199}
252b5132
RH
2200\f
2201/* Handle a PowerPC specific section when reading an object file. This
2202 is called when elfcode.h finds a section with an unknown type. */
2203
b34976b6 2204static bfd_boolean
252b5132
RH
2205ppc_elf_section_from_shdr (abfd, hdr, name)
2206 bfd *abfd;
947216bf 2207 Elf_Internal_Shdr *hdr;
90937f86 2208 const char *name;
252b5132
RH
2209{
2210 asection *newsect;
2211 flagword flags;
2212
2213 if (! _bfd_elf_make_section_from_shdr (abfd, hdr, name))
b34976b6 2214 return FALSE;
252b5132
RH
2215
2216 newsect = hdr->bfd_section;
2217 flags = bfd_get_section_flags (abfd, newsect);
2218 if (hdr->sh_flags & SHF_EXCLUDE)
2219 flags |= SEC_EXCLUDE;
2220
2221 if (hdr->sh_type == SHT_ORDERED)
2222 flags |= SEC_SORT_ENTRIES;
2223
2224 bfd_set_section_flags (abfd, newsect, flags);
b34976b6 2225 return TRUE;
252b5132 2226}
252b5132
RH
2227\f
2228/* Set up any other section flags and such that may be necessary. */
2229
b34976b6 2230static bfd_boolean
252b5132 2231ppc_elf_fake_sections (abfd, shdr, asect)
5f771d47 2232 bfd *abfd ATTRIBUTE_UNUSED;
947216bf 2233 Elf_Internal_Shdr *shdr;
252b5132
RH
2234 asection *asect;
2235{
2236 if ((asect->flags & SEC_EXCLUDE) != 0)
2237 shdr->sh_flags |= SHF_EXCLUDE;
2238
2239 if ((asect->flags & SEC_SORT_ENTRIES) != 0)
2240 shdr->sh_type = SHT_ORDERED;
2241
b34976b6 2242 return TRUE;
252b5132 2243}
252b5132
RH
2244\f
2245/* Create a special linker section */
2246static elf_linker_section_t *
2247ppc_elf_create_linker_section (abfd, info, which)
2248 bfd *abfd;
2249 struct bfd_link_info *info;
2250 enum elf_linker_section_enum which;
2251{
2252 bfd *dynobj = elf_hash_table (info)->dynobj;
2253 elf_linker_section_t *lsect;
2254
ae9a127f 2255 /* Record the first bfd section that needs the special section. */
252b5132
RH
2256 if (!dynobj)
2257 dynobj = elf_hash_table (info)->dynobj = abfd;
2258
ae9a127f 2259 /* If this is the first time, create the section. */
252b5132
RH
2260 lsect = elf_linker_section (dynobj, which);
2261 if (!lsect)
2262 {
2263 elf_linker_section_t defaults;
2264 static elf_linker_section_t zero_section;
2265
2266 defaults = zero_section;
2267 defaults.which = which;
b34976b6 2268 defaults.hole_written_p = FALSE;
252b5132
RH
2269 defaults.alignment = 2;
2270
2271 /* Both of these sections are (technically) created by the user
2272 putting data in them, so they shouldn't be marked
2273 SEC_LINKER_CREATED.
2274
2275 The linker creates them so it has somewhere to attach their
2276 respective symbols. In fact, if they were empty it would
2277 be OK to leave the symbol set to 0 (or any random number), because
2278 the appropriate register should never be used. */
2279 defaults.flags = (SEC_ALLOC | SEC_LOAD | SEC_HAS_CONTENTS
2280 | SEC_IN_MEMORY);
2281
2282 switch (which)
2283 {
2284 default:
2285 (*_bfd_error_handler) (_("%s: Unknown special linker type %d"),
2286 bfd_get_filename (abfd),
8da6118f 2287 (int) which);
252b5132
RH
2288
2289 bfd_set_error (bfd_error_bad_value);
8da6118f 2290 return (elf_linker_section_t *) 0;
252b5132
RH
2291
2292 case LINKER_SECTION_SDATA: /* .sdata/.sbss section */
2293 defaults.name = ".sdata";
2294 defaults.rel_name = ".rela.sdata";
2295 defaults.bss_name = ".sbss";
2296 defaults.sym_name = "_SDA_BASE_";
2297 defaults.sym_offset = 32768;
2298 break;
2299
2300 case LINKER_SECTION_SDATA2: /* .sdata2/.sbss2 section */
2301 defaults.name = ".sdata2";
2302 defaults.rel_name = ".rela.sdata2";
2303 defaults.bss_name = ".sbss2";
2304 defaults.sym_name = "_SDA2_BASE_";
2305 defaults.sym_offset = 32768;
2306 defaults.flags |= SEC_READONLY;
2307 break;
2308 }
2309
2310 lsect = _bfd_elf_create_linker_section (abfd, info, which, &defaults);
2311 }
2312
2313 return lsect;
2314}
252b5132 2315\f
8da6118f
KH
2316/* If we have a non-zero sized .sbss2 or .PPC.EMB.sbss0 sections, we
2317 need to bump up the number of section headers. */
252b5132
RH
2318
2319static int
2320ppc_elf_additional_program_headers (abfd)
2321 bfd *abfd;
2322{
2323 asection *s;
2324 int ret;
2325
2326 ret = 0;
2327
2328 s = bfd_get_section_by_name (abfd, ".interp");
2329 if (s != NULL)
2330 ++ret;
2331
2332 s = bfd_get_section_by_name (abfd, ".sbss2");
2333 if (s != NULL && (s->flags & SEC_LOAD) != 0 && s->_raw_size > 0)
2334 ++ret;
2335
2336 s = bfd_get_section_by_name (abfd, ".PPC.EMB.sbss0");
2337 if (s != NULL && (s->flags & SEC_LOAD) != 0 && s->_raw_size > 0)
2338 ++ret;
2339
2340 return ret;
2341}
2342
8da6118f 2343/* Modify the segment map if needed. */
252b5132 2344
b34976b6 2345static bfd_boolean
252b5132 2346ppc_elf_modify_segment_map (abfd)
5f771d47 2347 bfd *abfd ATTRIBUTE_UNUSED;
252b5132 2348{
b34976b6 2349 return TRUE;
252b5132
RH
2350}
2351\f
41fcb14e
AM
2352/* The powerpc .got has a blrl instruction in it. Mark it executable. */
2353
7619e7c7 2354static bfd_boolean
41fcb14e
AM
2355ppc_elf_create_got (abfd, info)
2356 bfd *abfd;
2357 struct bfd_link_info *info;
2358{
7619e7c7
AM
2359 struct ppc_elf_link_hash_table *htab;
2360 asection *s;
41fcb14e
AM
2361 flagword flags;
2362
2363 if (!_bfd_elf_create_got_section (abfd, info))
7619e7c7 2364 return FALSE;
41fcb14e 2365
7619e7c7
AM
2366 htab = ppc_elf_hash_table (info);
2367 htab->got = s = bfd_get_section_by_name (abfd, ".got");
41fcb14e
AM
2368 if (s == NULL)
2369 abort ();
2370
2371 flags = (SEC_ALLOC | SEC_LOAD | SEC_CODE | SEC_HAS_CONTENTS | SEC_IN_MEMORY
2372 | SEC_LINKER_CREATED);
2373 if (!bfd_set_section_flags (abfd, s, flags))
7619e7c7
AM
2374 return FALSE;
2375
2376 htab->relgot = bfd_make_section (abfd, ".rela.got");
2377 if (!htab->relgot
2378 || ! bfd_set_section_flags (abfd, htab->relgot,
2379 (SEC_ALLOC | SEC_LOAD | SEC_HAS_CONTENTS
2380 | SEC_IN_MEMORY | SEC_LINKER_CREATED
2381 | SEC_READONLY))
2382 || ! bfd_set_section_alignment (abfd, htab->relgot, 2))
2383 return FALSE;
2384
2385 return TRUE;
41fcb14e
AM
2386}
2387
252b5132
RH
2388/* We have to create .dynsbss and .rela.sbss here so that they get mapped
2389 to output sections (just like _bfd_elf_create_dynamic_sections has
2390 to create .dynbss and .rela.bss). */
2391
b34976b6 2392static bfd_boolean
252b5132
RH
2393ppc_elf_create_dynamic_sections (abfd, info)
2394 bfd *abfd;
2395 struct bfd_link_info *info;
2396{
7619e7c7
AM
2397 struct ppc_elf_link_hash_table *htab;
2398 asection *s;
252b5132
RH
2399 flagword flags;
2400
41fcb14e 2401 if (!ppc_elf_create_got (abfd, info))
b34976b6 2402 return FALSE;
41fcb14e 2403
8da6118f 2404 if (!_bfd_elf_create_dynamic_sections (abfd, info))
b34976b6 2405 return FALSE;
252b5132
RH
2406
2407 flags = (SEC_ALLOC | SEC_LOAD | SEC_HAS_CONTENTS | SEC_IN_MEMORY
2408 | SEC_LINKER_CREATED);
2409
7619e7c7
AM
2410 htab = ppc_elf_hash_table (info);
2411 htab->dynbss = bfd_get_section_by_name (abfd, ".dynbss");
2412 htab->dynsbss = s = bfd_make_section (abfd, ".dynsbss");
252b5132
RH
2413 if (s == NULL
2414 || ! bfd_set_section_flags (abfd, s, SEC_ALLOC))
b34976b6 2415 return FALSE;
252b5132
RH
2416
2417 if (! info->shared)
2418 {
7619e7c7
AM
2419 htab->relbss = bfd_get_section_by_name (abfd, ".rela.bss");
2420 htab->relsbss = s = bfd_make_section (abfd, ".rela.sbss");
252b5132
RH
2421 if (s == NULL
2422 || ! bfd_set_section_flags (abfd, s, flags | SEC_READONLY)
2423 || ! bfd_set_section_alignment (abfd, s, 2))
b34976b6 2424 return FALSE;
252b5132 2425 }
41fcb14e 2426
7619e7c7
AM
2427 htab->relplt = bfd_get_section_by_name (abfd, ".rela.plt");
2428 htab->plt = s = bfd_get_section_by_name (abfd, ".plt");
41fcb14e
AM
2429 if (s == NULL)
2430 abort ();
2431
2432 flags = SEC_ALLOC | SEC_CODE | SEC_IN_MEMORY | SEC_LINKER_CREATED;
2433 return bfd_set_section_flags (abfd, s, flags);
252b5132
RH
2434}
2435
2436/* Adjust a symbol defined by a dynamic object and referenced by a
2437 regular object. The current definition is in some section of the
2438 dynamic object, but we're not including those sections. We have to
2439 change the definition to something the rest of the link can
2440 understand. */
2441
b34976b6 2442static bfd_boolean
252b5132
RH
2443ppc_elf_adjust_dynamic_symbol (info, h)
2444 struct bfd_link_info *info;
2445 struct elf_link_hash_entry *h;
2446{
7619e7c7 2447 struct ppc_elf_link_hash_table *htab;
252b5132
RH
2448 asection *s;
2449 unsigned int power_of_two;
252b5132
RH
2450
2451#ifdef DEBUG
2452 fprintf (stderr, "ppc_elf_adjust_dynamic_symbol called for %s\n", h->root.root.string);
2453#endif
2454
2455 /* Make sure we know what is going on here. */
7619e7c7
AM
2456 htab = ppc_elf_hash_table (info);
2457 BFD_ASSERT (htab->elf.dynobj != NULL
252b5132
RH
2458 && ((h->elf_link_hash_flags & ELF_LINK_HASH_NEEDS_PLT)
2459 || h->weakdef != NULL
2460 || ((h->elf_link_hash_flags
2461 & ELF_LINK_HASH_DEF_DYNAMIC) != 0
2462 && (h->elf_link_hash_flags
2463 & ELF_LINK_HASH_REF_REGULAR) != 0
2464 && (h->elf_link_hash_flags
2465 & ELF_LINK_HASH_DEF_REGULAR) == 0)));
2466
7619e7c7 2467 /* Deal with function syms. */
252b5132
RH
2468 if (h->type == STT_FUNC
2469 || (h->elf_link_hash_flags & ELF_LINK_HASH_NEEDS_PLT) != 0)
2470 {
7619e7c7
AM
2471 /* Clear procedure linkage table information for any symbol that
2472 won't need a .plt entry. */
2473 if (! htab->elf.dynamic_sections_created
e1e0340b 2474 || SYMBOL_CALLS_LOCAL (info, h)
7619e7c7 2475 || h->plt.refcount <= 0)
252b5132
RH
2476 {
2477 /* A PLT entry is not required/allowed when:
2478
2479 1. We are not using ld.so; because then the PLT entry
2480 can't be set up, so we can't use one.
2481
e1e0340b
GK
2482 2. We know for certain that a call to this symbol
2483 will go to this object.
252b5132 2484
7619e7c7 2485 3. GC has rendered the entry unused. */
252b5132
RH
2486 h->plt.offset = (bfd_vma) -1;
2487 h->elf_link_hash_flags &= ~ELF_LINK_HASH_NEEDS_PLT;
252b5132 2488 }
b34976b6 2489 return TRUE;
252b5132 2490 }
bbd7ec4a
AM
2491 else
2492 h->plt.offset = (bfd_vma) -1;
252b5132
RH
2493
2494 /* If this is a weak symbol, and there is a real definition, the
2495 processor independent code will have arranged for us to see the
2496 real definition first, and we can just use the same value. */
2497 if (h->weakdef != NULL)
2498 {
2499 BFD_ASSERT (h->weakdef->root.type == bfd_link_hash_defined
2500 || h->weakdef->root.type == bfd_link_hash_defweak);
2501 h->root.u.def.section = h->weakdef->root.u.def.section;
2502 h->root.u.def.value = h->weakdef->root.u.def.value;
b34976b6 2503 return TRUE;
252b5132
RH
2504 }
2505
2506 /* This is a reference to a symbol defined by a dynamic object which
2507 is not a function. */
2508
2509 /* If we are creating a shared library, we must presume that the
2510 only references to the symbol are via the global offset table.
2511 For such cases we need not do anything here; the relocations will
2512 be handled correctly by relocate_section. */
2513 if (info->shared)
b34976b6 2514 return TRUE;
252b5132 2515
7619e7c7
AM
2516 /* If there are no references to this symbol that do not use the
2517 GOT, we don't need to generate a copy reloc. */
2518 if ((h->elf_link_hash_flags & ELF_LINK_NON_GOT_REF) == 0)
2519 return TRUE;
2520
252b5132
RH
2521 /* We must allocate the symbol in our .dynbss section, which will
2522 become part of the .bss section of the executable. There will be
2523 an entry for this symbol in the .dynsym section. The dynamic
2524 object will contain position independent code, so all references
2525 from the dynamic object to this symbol will go through the global
2526 offset table. The dynamic linker will use the .dynsym entry to
2527 determine the address it must put in the global offset table, so
2528 both the dynamic object and the regular object will refer to the
2529 same memory location for the variable.
2530
2531 Of course, if the symbol is sufficiently small, we must instead
2532 allocate it in .sbss. FIXME: It would be better to do this if and
2533 only if there were actually SDAREL relocs for that symbol. */
2534
7619e7c7
AM
2535 if (h->size <= elf_gp_size (htab->elf.dynobj))
2536 s = htab->dynsbss;
252b5132 2537 else
7619e7c7 2538 s = htab->dynbss;
252b5132
RH
2539 BFD_ASSERT (s != NULL);
2540
2541 /* We must generate a R_PPC_COPY reloc to tell the dynamic linker to
2542 copy the initial value out of the dynamic object and into the
2543 runtime process image. We need to remember the offset into the
2544 .rela.bss section we are going to use. */
2545 if ((h->root.u.def.section->flags & SEC_ALLOC) != 0)
2546 {
2547 asection *srel;
2548
7619e7c7
AM
2549 if (h->size <= elf_gp_size (htab->elf.dynobj))
2550 srel = htab->relsbss;
252b5132 2551 else
7619e7c7 2552 srel = htab->relbss;
252b5132
RH
2553 BFD_ASSERT (srel != NULL);
2554 srel->_raw_size += sizeof (Elf32_External_Rela);
2555 h->elf_link_hash_flags |= ELF_LINK_HASH_NEEDS_COPY;
2556 }
2557
2558 /* We need to figure out the alignment required for this symbol. I
2559 have no idea how ELF linkers handle this. */
2560 power_of_two = bfd_log2 (h->size);
2561 if (power_of_two > 4)
2562 power_of_two = 4;
2563
2564 /* Apply the required alignment. */
2565 s->_raw_size = BFD_ALIGN (s->_raw_size,
2566 (bfd_size_type) (1 << power_of_two));
7619e7c7 2567 if (power_of_two > bfd_get_section_alignment (htab->elf.dynobj, s))
252b5132 2568 {
7619e7c7 2569 if (! bfd_set_section_alignment (htab->elf.dynobj, s, power_of_two))
b34976b6 2570 return FALSE;
252b5132
RH
2571 }
2572
2573 /* Define the symbol as being at this point in the section. */
2574 h->root.u.def.section = s;
2575 h->root.u.def.value = s->_raw_size;
2576
2577 /* Increment the section size to make room for the symbol. */
2578 s->_raw_size += h->size;
2579
b34976b6 2580 return TRUE;
252b5132 2581}
252b5132 2582\f
7619e7c7
AM
2583/* This is the condition under which finish_dynamic_symbol will be
2584 called from elflink.h. If elflink.h doesn't call our
2585 finish_dynamic_symbol routine, we'll need to do something about
2586 initializing any .plt and .got entries in relocate_section. */
2587#define WILL_CALL_FINISH_DYNAMIC_SYMBOL(DYN, INFO, H) \
2588 ((DYN) \
2589 && ((INFO)->shared \
2590 || ((H)->elf_link_hash_flags & ELF_LINK_FORCED_LOCAL) == 0) \
2591 && ((H)->dynindx != -1 \
2592 || ((H)->elf_link_hash_flags & ELF_LINK_FORCED_LOCAL) != 0))
2593
7fce784e
AS
2594/* Allocate space in associated reloc sections for dynamic relocs. */
2595
7619e7c7
AM
2596static bfd_boolean
2597allocate_dynrelocs (h, inf)
2598 struct elf_link_hash_entry *h;
2599 PTR inf;
2600{
2601 struct bfd_link_info *info = (struct bfd_link_info *) inf;
2602 struct ppc_elf_link_hash_entry *eh;
2603 struct ppc_elf_link_hash_table *htab;
2604 struct ppc_elf_dyn_relocs *p;
2605
2606 if (h->root.type == bfd_link_hash_indirect)
2607 return TRUE;
2608
2609 if (h->root.type == bfd_link_hash_warning)
2610 /* When warning symbols are created, they **replace** the "real"
2611 entry in the hash table, thus we never get to see the real
2612 symbol in a hash traversal. So look at it now. */
2613 h = (struct elf_link_hash_entry *) h->root.u.i.link;
2614
2615 htab = ppc_elf_hash_table (info);
2616 if (htab->elf.dynamic_sections_created
2617 && h->plt.refcount > 0)
2618 {
2619 /* Make sure this symbol is output as a dynamic symbol. */
2620 if (h->dynindx == -1
2621 && (h->elf_link_hash_flags & ELF_LINK_FORCED_LOCAL) == 0)
2622 {
2623 if (! bfd_elf32_link_record_dynamic_symbol (info, h))
2624 return FALSE;
2625 }
2626
2627 if (WILL_CALL_FINISH_DYNAMIC_SYMBOL (1, info, h))
2628 {
2629 asection *s = htab->plt;
2630
2631 /* If this is the first .plt entry, make room for the special
2632 first entry. */
2633 if (s->_raw_size == 0)
2634 s->_raw_size += PLT_INITIAL_ENTRY_SIZE;
2635
2636 /* The PowerPC PLT is actually composed of two parts, the
2637 first part is 2 words (for a load and a jump), and then
2638 there is a remaining word available at the end. */
2639 h->plt.offset = (PLT_INITIAL_ENTRY_SIZE
2640 + (PLT_SLOT_SIZE
2641 * ((s->_raw_size - PLT_INITIAL_ENTRY_SIZE)
2642 / PLT_ENTRY_SIZE)));
2643
2644 /* If this symbol is not defined in a regular file, and we
2645 are not generating a shared library, then set the symbol
2646 to this location in the .plt. This is required to make
2647 function pointers compare as equal between the normal
2648 executable and the shared library. */
2649 if (! info->shared
2650 && (h->elf_link_hash_flags & ELF_LINK_HASH_DEF_REGULAR) == 0)
2651 {
2652 h->root.u.def.section = s;
2653 h->root.u.def.value = h->plt.offset;
2654 }
2655
2656 /* Make room for this entry. After the 8192nd entry, room
2657 for two entries is allocated. */
2658 s->_raw_size += PLT_ENTRY_SIZE;
2659 if ((s->_raw_size - PLT_INITIAL_ENTRY_SIZE) / PLT_ENTRY_SIZE
2660 >= PLT_NUM_SINGLE_ENTRIES)
2661 s->_raw_size += PLT_ENTRY_SIZE;
2662
2663 /* We also need to make an entry in the .rela.plt section. */
2664 htab->relplt->_raw_size += sizeof (Elf32_External_Rela);
2665 }
2666 else
2667 {
2668 h->plt.offset = (bfd_vma) -1;
2669 h->elf_link_hash_flags &= ~ELF_LINK_HASH_NEEDS_PLT;
2670 }
2671 }
2672 else
2673 {
2674 h->plt.offset = (bfd_vma) -1;
2675 h->elf_link_hash_flags &= ~ELF_LINK_HASH_NEEDS_PLT;
2676 }
7fce784e 2677
7619e7c7
AM
2678 eh = (struct ppc_elf_link_hash_entry *) h;
2679 if (eh->elf.got.refcount > 0)
2680 {
2681 /* Make sure this symbol is output as a dynamic symbol. */
2682 if (eh->elf.dynindx == -1
2683 && (eh->elf.elf_link_hash_flags & ELF_LINK_FORCED_LOCAL) == 0)
2684 {
2685 if (!bfd_elf32_link_record_dynamic_symbol (info, &eh->elf))
2686 return FALSE;
2687 }
7fce784e 2688
7619e7c7
AM
2689 if (eh->tls_mask == (TLS_TLS | TLS_LD)
2690 && !(eh->elf.elf_link_hash_flags & ELF_LINK_HASH_DEF_DYNAMIC))
2691 /* If just an LD reloc, we'll just use htab->tlsld_got.offset. */
2692 eh->elf.got.offset = (bfd_vma) -1;
2693 else
2694 {
2695 bfd_boolean dyn;
2696 eh->elf.got.offset = htab->got->_raw_size;
2697 if ((eh->tls_mask & TLS_TLS) != 0)
2698 {
2699 if ((eh->tls_mask & (TLS_GD | TLS_LD)) != 0)
2700 htab->got->_raw_size += 8;
2701 if ((eh->tls_mask & (TLS_TPREL | TLS_TPRELGD)) != 0)
2702 htab->got->_raw_size += 4;
2703 if ((eh->tls_mask & TLS_DTPREL) != 0)
2704 htab->got->_raw_size += 4;
2705 }
2706 else
2707 htab->got->_raw_size += 4;
2708 dyn = htab->elf.dynamic_sections_created;
2709 if (WILL_CALL_FINISH_DYNAMIC_SYMBOL (dyn, info, &eh->elf))
2710 {
2711 /* All the entries we allocated need relocs. */
2712 htab->relgot->_raw_size
2713 += ((htab->got->_raw_size - eh->elf.got.offset) / 4
2714 * sizeof (Elf32_External_Rela));
2715 /* Except LD only needs one. */
2716 if ((eh->tls_mask & TLS_LD) != 0)
2717 htab->relgot->_raw_size -= sizeof (Elf32_External_Rela);
2718 }
2719 }
2720 }
2721 else
2722 eh->elf.got.offset = (bfd_vma) -1;
7fce784e 2723
7619e7c7 2724 for (p = eh->dyn_relocs; p != NULL; p = p->next)
7fce784e
AS
2725 {
2726 asection *sreloc = elf_section_data (p->sec)->sreloc;
2727 sreloc->_raw_size += p->count * sizeof (Elf32_External_Rela);
2728 }
2729
2730 return TRUE;
2731}
2732
2733/* Find any dynamic relocs that apply to read-only sections. */
2734
2735static bfd_boolean
2736readonly_dynrelocs (h, info)
2737 struct elf_link_hash_entry *h;
2738 PTR info;
2739{
2740 struct ppc_elf_dyn_relocs *p;
2741
2742 if (h->root.type == bfd_link_hash_indirect)
2743 return TRUE;
2744
2745 if (h->root.type == bfd_link_hash_warning)
2746 h = (struct elf_link_hash_entry *) h->root.u.i.link;
2747
2748 for (p = ppc_elf_hash_entry (h)->dyn_relocs; p != NULL; p = p->next)
2749 {
2750 asection *s = p->sec->output_section;
2751
2752 if (s != NULL
2753 && ((s->flags & (SEC_READONLY | SEC_ALLOC))
2754 == (SEC_READONLY | SEC_ALLOC)))
2755 {
2756 ((struct bfd_link_info *) info)->flags |= DF_TEXTREL;
2757
2758 /* Not an error, just cut short the traversal. */
2759 return FALSE;
2760 }
2761 }
2762 return TRUE;
2763}
2764
252b5132
RH
2765/* Set the sizes of the dynamic sections. */
2766
b34976b6 2767static bfd_boolean
252b5132 2768ppc_elf_size_dynamic_sections (output_bfd, info)
29c2fb7c 2769 bfd *output_bfd ATTRIBUTE_UNUSED;
252b5132
RH
2770 struct bfd_link_info *info;
2771{
7619e7c7 2772 struct ppc_elf_link_hash_table *htab;
252b5132 2773 asection *s;
b34976b6 2774 bfd_boolean relocs;
7fce784e 2775 bfd *ibfd;
252b5132
RH
2776
2777#ifdef DEBUG
2778 fprintf (stderr, "ppc_elf_size_dynamic_sections called\n");
2779#endif
2780
7619e7c7
AM
2781 htab = ppc_elf_hash_table (info);
2782 BFD_ASSERT (htab->elf.dynobj != NULL);
252b5132
RH
2783
2784 if (elf_hash_table (info)->dynamic_sections_created)
2785 {
2786 /* Set the contents of the .interp section to the interpreter. */
2787 if (! info->shared)
2788 {
7619e7c7 2789 s = bfd_get_section_by_name (htab->elf.dynobj, ".interp");
252b5132
RH
2790 BFD_ASSERT (s != NULL);
2791 s->_raw_size = sizeof ELF_DYNAMIC_INTERPRETER;
2792 s->contents = (unsigned char *) ELF_DYNAMIC_INTERPRETER;
2793 }
2794 }
7619e7c7
AM
2795
2796 if (htab->tlsld_got.refcount > 0)
252b5132 2797 {
7619e7c7
AM
2798 htab->tlsld_got.offset = htab->got->_raw_size;
2799 htab->got->_raw_size += 8;
2800 if (info->shared)
2801 htab->relgot->_raw_size += sizeof (Elf32_External_Rela);
252b5132 2802 }
7619e7c7
AM
2803 else
2804 htab->tlsld_got.offset = (bfd_vma) -1;
252b5132 2805
7619e7c7
AM
2806 /* Set up .got offsets for local syms, and space for local dynamic
2807 relocs. */
7fce784e
AS
2808 for (ibfd = info->input_bfds; ibfd != NULL; ibfd = ibfd->link_next)
2809 {
7619e7c7
AM
2810 bfd_signed_vma *local_got;
2811 bfd_signed_vma *end_local_got;
2812 char *lgot_masks;
2813 bfd_size_type locsymcount;
2814 Elf_Internal_Shdr *symtab_hdr;
2815 asection *srel;
2816
7fce784e
AS
2817 if (bfd_get_flavour (ibfd) != bfd_target_elf_flavour)
2818 continue;
2819
2820 for (s = ibfd->sections; s != NULL; s = s->next)
2821 {
2822 struct ppc_elf_dyn_relocs *p;
2823
2824 for (p = ((struct ppc_elf_dyn_relocs *)
2825 elf_section_data (s)->local_dynrel);
2826 p != NULL;
2827 p = p->next)
2828 {
2829 if (!bfd_is_abs_section (p->sec)
2830 && bfd_is_abs_section (p->sec->output_section))
2831 {
2832 /* Input section has been discarded, either because
2833 it is a copy of a linkonce section or due to
2834 linker script /DISCARD/, so we'll be discarding
2835 the relocs too. */
2836 }
2837 else if (p->count != 0)
2838 {
2839 elf_section_data (p->sec)->sreloc->_raw_size
2840 += p->count * sizeof (Elf32_External_Rela);
2841 if ((p->sec->output_section->flags
2842 & (SEC_READONLY | SEC_ALLOC))
2843 == (SEC_READONLY | SEC_ALLOC))
2844 info->flags |= DF_TEXTREL;
2845 }
2846 }
2847 }
7619e7c7
AM
2848
2849 local_got = elf_local_got_refcounts (ibfd);
2850 if (!local_got)
2851 continue;
2852
2853 symtab_hdr = &elf_tdata (ibfd)->symtab_hdr;
2854 locsymcount = symtab_hdr->sh_info;
2855 end_local_got = local_got + locsymcount;
2856 lgot_masks = (char *) end_local_got;
2857 s = htab->got;
2858 srel = htab->relgot;
2859 for (; local_got < end_local_got; ++local_got, ++lgot_masks)
2860 if (*local_got > 0)
2861 {
2862 if (*lgot_masks == (TLS_TLS | TLS_LD))
2863 {
2864 /* If just an LD reloc, we'll just use
2865 htab->tlsld_got.offset. */
2866 if (htab->tlsld_got.offset == (bfd_vma) -1)
2867 {
2868 htab->tlsld_got.offset = s->_raw_size;
2869 s->_raw_size += 8;
2870 if (info->shared)
2871 srel->_raw_size += sizeof (Elf32_External_Rela);
2872 }
2873 *local_got = (bfd_vma) -1;
2874 }
2875 else
2876 {
2877 *local_got = s->_raw_size;
2878 if ((*lgot_masks & TLS_TLS) != 0)
2879 {
2880 if ((*lgot_masks & TLS_GD) != 0)
2881 s->_raw_size += 8;
2882 if ((*lgot_masks & (TLS_TPREL | TLS_TPRELGD)) != 0)
2883 s->_raw_size += 4;
2884 if ((*lgot_masks & TLS_DTPREL) != 0)
2885 s->_raw_size += 4;
2886 }
2887 else
2888 s->_raw_size += 4;
2889 if (info->shared)
2890 srel->_raw_size += ((s->_raw_size - *local_got) / 4
2891 * sizeof (Elf32_External_Rela));
2892 }
2893 }
2894 else
2895 *local_got = (bfd_vma) -1;
7fce784e
AS
2896 }
2897
2898 /* Allocate space for global sym dynamic relocs. */
7619e7c7 2899 elf_link_hash_traverse (elf_hash_table (info), allocate_dynrelocs, info);
7fce784e 2900
7619e7c7
AM
2901 /* We've now determined the sizes of the various dynamic sections.
2902 Allocate memory for them. */
b34976b6 2903 relocs = FALSE;
7619e7c7 2904 for (s = htab->elf.dynobj->sections; s != NULL; s = s->next)
252b5132 2905 {
252b5132
RH
2906 if ((s->flags & SEC_LINKER_CREATED) == 0)
2907 continue;
2908
7619e7c7
AM
2909 if (s == htab->plt
2910 || s == htab->got
2911 || (htab->sdata != NULL && s == htab->sdata->section)
2912 || (htab->sdata2 != NULL && s == htab->sdata2->section))
252b5132 2913 {
7619e7c7
AM
2914 /* Strip this section if we don't need it; see the
2915 comment below. */
252b5132 2916 }
7619e7c7 2917 else if (strncmp (bfd_get_section_name (dynobj, s), ".rela", 5) == 0)
252b5132
RH
2918 {
2919 if (s->_raw_size == 0)
2920 {
2921 /* If we don't need this section, strip it from the
2922 output file. This is mostly to handle .rela.bss and
2923 .rela.plt. We must create both sections in
2924 create_dynamic_sections, because they must be created
2925 before the linker maps input sections to output
2926 sections. The linker does that before
2927 adjust_dynamic_symbol is called, and it is that
2928 function which decides whether anything needs to go
2929 into these sections. */
252b5132
RH
2930 }
2931 else
2932 {
c3668558 2933 /* Remember whether there are any relocation sections. */
b34976b6 2934 relocs = TRUE;
252b5132 2935
252b5132
RH
2936 /* We use the reloc_count field as a counter if we need
2937 to copy relocs into the output file. */
2938 s->reloc_count = 0;
2939 }
2940 }
7619e7c7 2941 else
252b5132
RH
2942 {
2943 /* It's not one of our sections, so don't allocate space. */
2944 continue;
2945 }
2946
7619e7c7 2947 if (s->_raw_size == 0)
252b5132 2948 {
7f8d5fc9 2949 _bfd_strip_section_from_output (info, s);
252b5132
RH
2950 continue;
2951 }
2952
2953 /* Allocate memory for the section contents. */
7619e7c7
AM
2954 s->contents = (bfd_byte *) bfd_zalloc (htab->elf.dynobj, s->_raw_size);
2955 if (s->contents == NULL)
b34976b6 2956 return FALSE;
252b5132
RH
2957 }
2958
7619e7c7 2959 if (htab->elf.dynamic_sections_created)
252b5132
RH
2960 {
2961 /* Add some entries to the .dynamic section. We fill in the
2962 values later, in ppc_elf_finish_dynamic_sections, but we
2963 must add the entries now so that we get the correct size for
2964 the .dynamic section. The DT_DEBUG entry is filled in by the
2965 dynamic linker and used by the debugger. */
dc810e39
AM
2966#define add_dynamic_entry(TAG, VAL) \
2967 bfd_elf32_add_dynamic_entry (info, (bfd_vma) (TAG), (bfd_vma) (VAL))
2968
2969 if (!info->shared)
252b5132 2970 {
dc810e39 2971 if (!add_dynamic_entry (DT_DEBUG, 0))
b34976b6 2972 return FALSE;
252b5132
RH
2973 }
2974
7619e7c7 2975 if (htab->plt != NULL && htab->plt->_raw_size != 0)
252b5132 2976 {
dc810e39
AM
2977 if (!add_dynamic_entry (DT_PLTGOT, 0)
2978 || !add_dynamic_entry (DT_PLTRELSZ, 0)
2979 || !add_dynamic_entry (DT_PLTREL, DT_RELA)
2980 || !add_dynamic_entry (DT_JMPREL, 0))
b34976b6 2981 return FALSE;
252b5132
RH
2982 }
2983
2984 if (relocs)
2985 {
dc810e39
AM
2986 if (!add_dynamic_entry (DT_RELA, 0)
2987 || !add_dynamic_entry (DT_RELASZ, 0)
2988 || !add_dynamic_entry (DT_RELAENT, sizeof (Elf32_External_Rela)))
b34976b6 2989 return FALSE;
252b5132
RH
2990 }
2991
7fce784e
AS
2992 /* If any dynamic relocs apply to a read-only section, then we
2993 need a DT_TEXTREL entry. */
2994 if ((info->flags & DF_TEXTREL) == 0)
2995 elf_link_hash_traverse (elf_hash_table (info), readonly_dynrelocs,
2996 (PTR) info);
2997
29c2fb7c 2998 if ((info->flags & DF_TEXTREL) != 0)
252b5132 2999 {
dc810e39 3000 if (!add_dynamic_entry (DT_TEXTREL, 0))
b34976b6 3001 return FALSE;
252b5132
RH
3002 }
3003 }
dc810e39 3004#undef add_dynamic_entry
252b5132 3005
b34976b6 3006 return TRUE;
252b5132 3007}
252b5132 3008\f
7619e7c7
AM
3009static bfd_boolean
3010update_local_sym_info (abfd, symtab_hdr, r_symndx, tls_type)
3011 bfd *abfd;
3012 Elf_Internal_Shdr *symtab_hdr;
3013 unsigned long r_symndx;
3014 int tls_type;
3015{
3016 bfd_signed_vma *local_got_refcounts = elf_local_got_refcounts (abfd);
3017 char *local_got_tls_masks;
3018
3019 if (local_got_refcounts == NULL)
3020 {
3021 bfd_size_type size = symtab_hdr->sh_info;
3022
3023 size *= sizeof (*local_got_refcounts) + sizeof (*local_got_tls_masks);
3024 local_got_refcounts = (bfd_signed_vma *) bfd_zalloc (abfd, size);
3025 if (local_got_refcounts == NULL)
3026 return FALSE;
3027 elf_local_got_refcounts (abfd) = local_got_refcounts;
3028 }
3029
3030 local_got_refcounts[r_symndx] += 1;
3031 local_got_tls_masks = (char *) (local_got_refcounts + symtab_hdr->sh_info);
3032 local_got_tls_masks[r_symndx] |= tls_type;
3033 return TRUE;
3034}
3035
3036static void
3037bad_shared_reloc (abfd, r_type)
3038 bfd *abfd;
3039 enum elf_ppc_reloc_type r_type;
3040{
3041 (*_bfd_error_handler)
3042 (_("%s: relocation %s cannot be used when making a shared object"),
3043 bfd_archive_filename (abfd),
3044 ppc_elf_howto_table[(int) r_type]->name);
3045 bfd_set_error (bfd_error_bad_value);
3046}
3047
252b5132
RH
3048/* Look through the relocs for a section during the first phase, and
3049 allocate space in the global offset table or procedure linkage
3050 table. */
3051
b34976b6 3052static bfd_boolean
252b5132
RH
3053ppc_elf_check_relocs (abfd, info, sec, relocs)
3054 bfd *abfd;
3055 struct bfd_link_info *info;
3056 asection *sec;
3057 const Elf_Internal_Rela *relocs;
3058{
7619e7c7 3059 struct ppc_elf_link_hash_table *htab;
252b5132 3060 Elf_Internal_Shdr *symtab_hdr;
7619e7c7 3061 struct elf_link_hash_entry **sym_hashes;
252b5132
RH
3062 const Elf_Internal_Rela *rel;
3063 const Elf_Internal_Rela *rel_end;
252b5132 3064 asection *sreloc;
252b5132
RH
3065
3066 if (info->relocateable)
b34976b6 3067 return TRUE;
252b5132
RH
3068
3069#ifdef DEBUG
3070 fprintf (stderr, "ppc_elf_check_relocs called for section %s in %s\n",
3071 bfd_get_section_name (abfd, sec),
8f615d07 3072 bfd_archive_filename (abfd));
252b5132
RH
3073#endif
3074
3075 /* Create the linker generated sections all the time so that the
3076 special symbols are created. */
3077
7619e7c7
AM
3078 htab = ppc_elf_hash_table (info);
3079 if (htab->sdata == NULL)
252b5132 3080 {
7619e7c7
AM
3081 htab->sdata = elf_linker_section (abfd, LINKER_SECTION_SDATA);
3082 if (htab->sdata == NULL)
3083 htab->sdata = ppc_elf_create_linker_section (abfd, info,
3084 LINKER_SECTION_SDATA);
3085 if (htab->sdata == NULL)
b34976b6 3086 return FALSE;
252b5132
RH
3087 }
3088
7619e7c7 3089 if (htab->sdata2 == NULL)
252b5132 3090 {
7619e7c7
AM
3091 htab->sdata2 = elf_linker_section (abfd, LINKER_SECTION_SDATA2);
3092 if (htab->sdata2 == NULL)
3093 htab->sdata2 = ppc_elf_create_linker_section (abfd, info,
3094 LINKER_SECTION_SDATA2);
3095 if (htab->sdata2 == NULL)
b34976b6 3096 return FALSE;
252b5132
RH
3097 }
3098
252b5132 3099 symtab_hdr = &elf_tdata (abfd)->symtab_hdr;
252b5132 3100 sym_hashes = elf_sym_hashes (abfd);
252b5132
RH
3101 sreloc = NULL;
3102
3103 rel_end = relocs + sec->reloc_count;
3104 for (rel = relocs; rel < rel_end; rel++)
3105 {
3106 unsigned long r_symndx;
7619e7c7 3107 enum elf_ppc_reloc_type r_type;
252b5132 3108 struct elf_link_hash_entry *h;
7619e7c7 3109 int tls_type = 0;
252b5132
RH
3110
3111 r_symndx = ELF32_R_SYM (rel->r_info);
3112 if (r_symndx < symtab_hdr->sh_info)
3113 h = NULL;
3114 else
3115 h = sym_hashes[r_symndx - symtab_hdr->sh_info];
3116
3117 /* If a relocation refers to _GLOBAL_OFFSET_TABLE_, create the .got.
3118 This shows up in particular in an R_PPC_ADDR32 in the eabi
3119 startup code. */
3120 if (h && strcmp (h->root.root.string, "_GLOBAL_OFFSET_TABLE_") == 0)
3121 {
7619e7c7 3122 if (htab->got == NULL)
252b5132 3123 {
7619e7c7
AM
3124 if (htab->elf.dynobj == NULL)
3125 htab->elf.dynobj = abfd;
3126 if (!ppc_elf_create_got (htab->elf.dynobj, info))
b34976b6 3127 return FALSE;
252b5132
RH
3128 }
3129 }
3130
7619e7c7
AM
3131 r_type = (enum elf_ppc_reloc_type) ELF32_R_TYPE (rel->r_info);
3132 switch (r_type)
252b5132 3133 {
7619e7c7
AM
3134 case R_PPC_GOT_TLSLD16:
3135 case R_PPC_GOT_TLSLD16_LO:
3136 case R_PPC_GOT_TLSLD16_HI:
3137 case R_PPC_GOT_TLSLD16_HA:
3138 htab->tlsld_got.refcount += 1;
3139 tls_type = TLS_TLS | TLS_LD;
3140 goto dogottls;
3141
3142 case R_PPC_GOT_TLSGD16:
3143 case R_PPC_GOT_TLSGD16_LO:
3144 case R_PPC_GOT_TLSGD16_HI:
3145 case R_PPC_GOT_TLSGD16_HA:
3146 tls_type = TLS_TLS | TLS_GD;
3147 goto dogottls;
3148
3149 case R_PPC_GOT_TPREL16:
3150 case R_PPC_GOT_TPREL16_LO:
3151 case R_PPC_GOT_TPREL16_HI:
3152 case R_PPC_GOT_TPREL16_HA:
3153 if (info->shared)
3154 info->flags |= DF_STATIC_TLS;
3155 tls_type = TLS_TLS | TLS_TPREL;
3156 goto dogottls;
3157
3158 case R_PPC_GOT_DTPREL16:
3159 case R_PPC_GOT_DTPREL16_LO:
3160 case R_PPC_GOT_DTPREL16_HI:
3161 case R_PPC_GOT_DTPREL16_HA:
3162 tls_type = TLS_TLS | TLS_DTPREL;
3163 dogottls:
3164 sec->has_tls_reloc = 1;
3165 /* Fall thru */
3166
252b5132
RH
3167 /* GOT16 relocations */
3168 case R_PPC_GOT16:
3169 case R_PPC_GOT16_LO:
3170 case R_PPC_GOT16_HI:
3171 case R_PPC_GOT16_HA:
3172 /* This symbol requires a global offset table entry. */
7619e7c7 3173 if (htab->got == NULL)
252b5132 3174 {
7619e7c7
AM
3175 if (htab->elf.dynobj == NULL)
3176 htab->elf.dynobj = abfd;
3177 if (!ppc_elf_create_got (htab->elf.dynobj, info))
b34976b6 3178 return FALSE;
252b5132 3179 }
252b5132
RH
3180 if (h != NULL)
3181 {
7619e7c7
AM
3182 h->got.refcount += 1;
3183 ppc_elf_hash_entry (h)->tls_mask |= tls_type;
252b5132
RH
3184 }
3185 else
7619e7c7
AM
3186 /* This is a global offset table entry for a local symbol. */
3187 if (!update_local_sym_info (abfd, symtab_hdr, r_symndx, tls_type))
3188 return FALSE;
252b5132
RH
3189 break;
3190
ae9a127f 3191 /* Indirect .sdata relocation. */
252b5132
RH
3192 case R_PPC_EMB_SDAI16:
3193 if (info->shared)
3194 {
7619e7c7 3195 bad_shared_reloc (abfd, r_type);
b34976b6 3196 return FALSE;
252b5132 3197 }
7619e7c7
AM
3198 if (!bfd_elf32_create_pointer_linker_section (abfd, info,
3199 htab->sdata, h, rel))
b34976b6 3200 return FALSE;
252b5132
RH
3201 break;
3202
ae9a127f 3203 /* Indirect .sdata2 relocation. */
252b5132
RH
3204 case R_PPC_EMB_SDA2I16:
3205 if (info->shared)
3206 {
7619e7c7 3207 bad_shared_reloc (abfd, r_type);
b34976b6 3208 return FALSE;
252b5132 3209 }
7619e7c7
AM
3210 if (!bfd_elf32_create_pointer_linker_section (abfd, info,
3211 htab->sdata2, h, rel))
b34976b6 3212 return FALSE;
252b5132
RH
3213 break;
3214
3215 case R_PPC_SDAREL16:
3216 case R_PPC_EMB_SDA2REL:
3217 case R_PPC_EMB_SDA21:
7619e7c7
AM
3218 case R_PPC_EMB_RELSDA:
3219 case R_PPC_EMB_NADDR32:
3220 case R_PPC_EMB_NADDR16:
3221 case R_PPC_EMB_NADDR16_LO:
3222 case R_PPC_EMB_NADDR16_HI:
3223 case R_PPC_EMB_NADDR16_HA:
252b5132
RH
3224 if (info->shared)
3225 {
7619e7c7 3226 bad_shared_reloc (abfd, r_type);
b34976b6 3227 return FALSE;
252b5132
RH
3228 }
3229 break;
3230
3231 case R_PPC_PLT32:
3232 case R_PPC_PLTREL24:
7619e7c7 3233 case R_PPC_PLTREL32:
252b5132
RH
3234 case R_PPC_PLT16_LO:
3235 case R_PPC_PLT16_HI:
3236 case R_PPC_PLT16_HA:
3237#ifdef DEBUG
3238 fprintf (stderr, "Reloc requires a PLT entry\n");
3239#endif
3240 /* This symbol requires a procedure linkage table entry. We
7619e7c7 3241 actually build the entry in finish_dynamic_symbol,
252b5132
RH
3242 because this might be a case of linking PIC code without
3243 linking in any dynamic objects, in which case we don't
3244 need to generate a procedure linkage table after all. */
3245
3246 if (h == NULL)
3247 {
3248 /* It does not make sense to have a procedure linkage
3249 table entry for a local symbol. */
3250 bfd_set_error (bfd_error_bad_value);
b34976b6 3251 return FALSE;
252b5132
RH
3252 }
3253
51b64d56
AM
3254 h->elf_link_hash_flags |= ELF_LINK_HASH_NEEDS_PLT;
3255 h->plt.refcount++;
252b5132
RH
3256 break;
3257
3258 /* The following relocations don't need to propagate the
3259 relocation if linking a shared object since they are
3260 section relative. */
3261 case R_PPC_SECTOFF:
3262 case R_PPC_SECTOFF_LO:
3263 case R_PPC_SECTOFF_HI:
3264 case R_PPC_SECTOFF_HA:
7619e7c7
AM
3265 case R_PPC_DTPREL16:
3266 case R_PPC_DTPREL16_LO:
3267 case R_PPC_DTPREL16_HI:
3268 case R_PPC_DTPREL16_HA:
3269 case R_PPC_TOC16:
3270 break;
3271
3272 /* This are just markers. */
3273 case R_PPC_TLS:
3274 case R_PPC_EMB_MRKREF:
3275 case R_PPC_NONE:
3276 case R_PPC_max:
3277 break;
3278
3279 /* These should only appear in dynamic objects. */
3280 case R_PPC_COPY:
3281 case R_PPC_GLOB_DAT:
3282 case R_PPC_JMP_SLOT:
3283 case R_PPC_RELATIVE:
3284 break;
3285
3286 /* These aren't handled yet. We'll report an error later. */
3287 case R_PPC_ADDR30:
3288 case R_PPC_EMB_RELSEC16:
3289 case R_PPC_EMB_RELST_LO:
3290 case R_PPC_EMB_RELST_HI:
3291 case R_PPC_EMB_RELST_HA:
3292 case R_PPC_EMB_BIT_FLD:
252b5132
RH
3293 break;
3294
ae9a127f 3295 /* This refers only to functions defined in the shared library. */
252b5132
RH
3296 case R_PPC_LOCAL24PC:
3297 break;
3298
3299 /* This relocation describes the C++ object vtable hierarchy.
3300 Reconstruct it for later use during GC. */
3301 case R_PPC_GNU_VTINHERIT:
3302 if (!_bfd_elf32_gc_record_vtinherit (abfd, sec, h, rel->r_offset))
b34976b6 3303 return FALSE;
252b5132
RH
3304 break;
3305
3306 /* This relocation describes which C++ vtable entries are actually
3307 used. Record for later use during GC. */
3308 case R_PPC_GNU_VTENTRY:
3309 if (!_bfd_elf32_gc_record_vtentry (abfd, sec, h, rel->r_addend))
b34976b6 3310 return FALSE;
252b5132
RH
3311 break;
3312
7619e7c7
AM
3313 /* We shouldn't really be seeing these. */
3314 case R_PPC_TPREL32:
3315 if (info->shared)
3316 info->flags |= DF_STATIC_TLS;
3317 goto dodyn;
3318
3319 /* Nor these. */
3320 case R_PPC_DTPMOD32:
3321 case R_PPC_DTPREL32:
3322 goto dodyn;
3323
3324 case R_PPC_TPREL16:
3325 case R_PPC_TPREL16_LO:
3326 case R_PPC_TPREL16_HI:
3327 case R_PPC_TPREL16_HA:
3328 if (info->shared)
3329 info->flags |= DF_STATIC_TLS;
3330 goto dodyn;
3331
252b5132
RH
3332 /* When creating a shared object, we must copy these
3333 relocs into the output file. We create a reloc
3334 section in dynobj and make room for the reloc. */
3335 case R_PPC_REL24:
3336 case R_PPC_REL14:
3337 case R_PPC_REL14_BRTAKEN:
3338 case R_PPC_REL14_BRNTAKEN:
3339 case R_PPC_REL32:
3340 if (h == NULL
e1e0340b
GK
3341 || strcmp (h->root.root.string, "_GLOBAL_OFFSET_TABLE_") == 0
3342 || SYMBOL_REFERENCES_LOCAL (info, h))
252b5132
RH
3343 break;
3344 /* fall through */
3345
7619e7c7
AM
3346 case R_PPC_ADDR32:
3347 case R_PPC_ADDR24:
3348 case R_PPC_ADDR16:
3349 case R_PPC_ADDR16_LO:
3350 case R_PPC_ADDR16_HI:
3351 case R_PPC_ADDR16_HA:
3352 case R_PPC_ADDR14:
3353 case R_PPC_ADDR14_BRTAKEN:
3354 case R_PPC_ADDR14_BRNTAKEN:
3355 case R_PPC_UADDR32:
3356 case R_PPC_UADDR16:
3357 if (h != NULL && !info->shared)
3358 {
3359 /* We may need a plt entry if the symbol turns out to be
3360 a function defined in a dynamic object. */
3361 h->plt.refcount++;
3362
3363 /* We may need a copy reloc too. */
3364 h->elf_link_hash_flags |= ELF_LINK_NON_GOT_REF;
3365 }
3366 dodyn:
252b5132
RH
3367 if (info->shared)
3368 {
7fce784e
AS
3369 struct ppc_elf_dyn_relocs *p;
3370 struct ppc_elf_dyn_relocs **head;
3371
252b5132
RH
3372#ifdef DEBUG
3373 fprintf (stderr, "ppc_elf_check_relocs need to create relocation for %s\n",
3374 (h && h->root.root.string) ? h->root.root.string : "<unknown>");
3375#endif
3376 if (sreloc == NULL)
3377 {
3378 const char *name;
3379
3380 name = (bfd_elf_string_from_elf_section
3381 (abfd,
3382 elf_elfheader (abfd)->e_shstrndx,
3383 elf_section_data (sec)->rel_hdr.sh_name));
3384 if (name == NULL)
b34976b6 3385 return FALSE;
252b5132
RH
3386
3387 BFD_ASSERT (strncmp (name, ".rela", 5) == 0
3388 && strcmp (bfd_get_section_name (abfd, sec),
3389 name + 5) == 0);
3390
7619e7c7 3391 sreloc = bfd_get_section_by_name (htab->elf.dynobj, name);
252b5132
RH
3392 if (sreloc == NULL)
3393 {
3394 flagword flags;
3395
7619e7c7 3396 sreloc = bfd_make_section (htab->elf.dynobj, name);
252b5132
RH
3397 flags = (SEC_HAS_CONTENTS | SEC_READONLY
3398 | SEC_IN_MEMORY | SEC_LINKER_CREATED);
3399 if ((sec->flags & SEC_ALLOC) != 0)
3400 flags |= SEC_ALLOC | SEC_LOAD;
3401 if (sreloc == NULL
7619e7c7
AM
3402 || ! bfd_set_section_flags (htab->elf.dynobj,
3403 sreloc, flags)
3404 || ! bfd_set_section_alignment (htab->elf.dynobj,
3405 sreloc, 2))
b34976b6 3406 return FALSE;
252b5132 3407 }
7fce784e
AS
3408 elf_section_data (sec)->sreloc = sreloc;
3409 }
3410
3411 /* If this is a global symbol, we count the number of
3412 relocations we need for this symbol. */
3413 if (h != NULL)
3414 {
3415 head = &ppc_elf_hash_entry (h)->dyn_relocs;
252b5132 3416 }
7fce784e
AS
3417 else
3418 {
3419 /* Track dynamic relocs needed for local syms too.
3420 We really need local syms available to do this
3421 easily. Oh well. */
3422
3423 asection *s;
3424 s = (bfd_section_from_r_symndx
3425 (abfd, &ppc_elf_hash_table (info)->sym_sec,
3426 sec, r_symndx));
3427 if (s == NULL)
3428 return FALSE;
252b5132 3429
7fce784e
AS
3430 head = ((struct ppc_elf_dyn_relocs **)
3431 &elf_section_data (s)->local_dynrel);
3432 }
252b5132 3433
7fce784e
AS
3434 p = *head;
3435 if (p == NULL || p->sec != sec)
3436 {
3437 p = ((struct ppc_elf_dyn_relocs *)
7619e7c7 3438 bfd_alloc (htab->elf.dynobj, sizeof *p));
7fce784e
AS
3439 if (p == NULL)
3440 return FALSE;
3441 p->next = *head;
3442 *head = p;
3443 p->sec = sec;
3444 p->count = 0;
3445 }
3446
3447 p->count++;
252b5132
RH
3448 }
3449
3450 break;
3451 }
3452 }
3453
b34976b6 3454 return TRUE;
252b5132
RH
3455}
3456
3457/* Return the section that should be marked against GC for a given
3458 relocation. */
3459
3460static asection *
1e2f5b6e
AM
3461ppc_elf_gc_mark_hook (sec, info, rel, h, sym)
3462 asection *sec;
5f771d47 3463 struct bfd_link_info *info ATTRIBUTE_UNUSED;
252b5132
RH
3464 Elf_Internal_Rela *rel;
3465 struct elf_link_hash_entry *h;
3466 Elf_Internal_Sym *sym;
3467{
3468 if (h != NULL)
3469 {
3470 switch (ELF32_R_TYPE (rel->r_info))
3471 {
3472 case R_PPC_GNU_VTINHERIT:
3473 case R_PPC_GNU_VTENTRY:
3474 break;
3475
3476 default:
3477 switch (h->root.type)
3478 {
3479 case bfd_link_hash_defined:
3480 case bfd_link_hash_defweak:
3481 return h->root.u.def.section;
3482
3483 case bfd_link_hash_common:
3484 return h->root.u.c.p->section;
3485
3486 default:
3487 break;
3488 }
3489 }
3490 }
3491 else
1e2f5b6e 3492 return bfd_section_from_elf_index (sec->owner, sym->st_shndx);
252b5132
RH
3493
3494 return NULL;
3495}
3496
7619e7c7
AM
3497/* Update the got, plt and dynamic reloc reference counts for the
3498 section being removed. */
252b5132 3499
b34976b6 3500static bfd_boolean
252b5132
RH
3501ppc_elf_gc_sweep_hook (abfd, info, sec, relocs)
3502 bfd *abfd;
7619e7c7 3503 struct bfd_link_info *info;
252b5132
RH
3504 asection *sec;
3505 const Elf_Internal_Rela *relocs;
3506{
7619e7c7 3507 struct ppc_elf_link_hash_table *htab;
252b5132
RH
3508 Elf_Internal_Shdr *symtab_hdr;
3509 struct elf_link_hash_entry **sym_hashes;
3510 bfd_signed_vma *local_got_refcounts;
3511 const Elf_Internal_Rela *rel, *relend;
252b5132 3512
7fce784e
AS
3513 elf_section_data (sec)->local_dynrel = NULL;
3514
7619e7c7 3515 htab = ppc_elf_hash_table (info);
252b5132
RH
3516 symtab_hdr = &elf_tdata (abfd)->symtab_hdr;
3517 sym_hashes = elf_sym_hashes (abfd);
3518 local_got_refcounts = elf_local_got_refcounts (abfd);
3519
3520 relend = relocs + sec->reloc_count;
3521 for (rel = relocs; rel < relend; rel++)
7619e7c7
AM
3522 {
3523 unsigned long r_symndx;
3524 enum elf_ppc_reloc_type r_type;
3525 struct elf_link_hash_entry *h = NULL;
252b5132 3526
7619e7c7
AM
3527 r_symndx = ELF32_R_SYM (rel->r_info);
3528 if (r_symndx >= symtab_hdr->sh_info)
3529 {
3530 struct ppc_elf_dyn_relocs **pp, *p;
3531 struct ppc_elf_link_hash_entry *eh;
3532
3533 h = sym_hashes[r_symndx - symtab_hdr->sh_info];
3534 eh = (struct ppc_elf_link_hash_entry *) h;
3535
3536 for (pp = &eh->dyn_relocs; (p = *pp) != NULL; pp = &p->next)
3537 if (p->sec == sec)
3538 {
3539 /* Everything must go for SEC. */
3540 *pp = p->next;
3541 break;
3542 }
3543 }
3544
3545 r_type = (enum elf_ppc_reloc_type) ELF32_R_TYPE (rel->r_info);
3546 switch (r_type)
3547 {
3548 case R_PPC_GOT_TLSLD16:
3549 case R_PPC_GOT_TLSLD16_LO:
3550 case R_PPC_GOT_TLSLD16_HI:
3551 case R_PPC_GOT_TLSLD16_HA:
3552 htab->tlsld_got.refcount -= 1;
3553 /* Fall thru */
3554
3555 case R_PPC_GOT_TLSGD16:
3556 case R_PPC_GOT_TLSGD16_LO:
3557 case R_PPC_GOT_TLSGD16_HI:
3558 case R_PPC_GOT_TLSGD16_HA:
3559 case R_PPC_GOT_TPREL16:
3560 case R_PPC_GOT_TPREL16_LO:
3561 case R_PPC_GOT_TPREL16_HI:
3562 case R_PPC_GOT_TPREL16_HA:
3563 case R_PPC_GOT_DTPREL16:
3564 case R_PPC_GOT_DTPREL16_LO:
3565 case R_PPC_GOT_DTPREL16_HI:
3566 case R_PPC_GOT_DTPREL16_HA:
3567 case R_PPC_GOT16:
3568 case R_PPC_GOT16_LO:
3569 case R_PPC_GOT16_HI:
3570 case R_PPC_GOT16_HA:
3571 if (h != NULL)
3572 {
3573 if (h->got.refcount > 0)
3574 h->got.refcount--;
3575 }
3576 else if (local_got_refcounts != NULL)
3577 {
3578 if (local_got_refcounts[r_symndx] > 0)
3579 local_got_refcounts[r_symndx]--;
3580 }
3581 break;
3582
3583 case R_PPC_REL24:
3584 case R_PPC_REL14:
3585 case R_PPC_REL14_BRTAKEN:
3586 case R_PPC_REL14_BRNTAKEN:
3587 case R_PPC_REL32:
3588 if (h == NULL
3589 || strcmp (h->root.root.string, "_GLOBAL_OFFSET_TABLE_") == 0
3590 || SYMBOL_REFERENCES_LOCAL (info, h))
3591 break;
3592 /* Fall thru */
3593
3594 case R_PPC_ADDR32:
3595 case R_PPC_ADDR24:
3596 case R_PPC_ADDR16:
3597 case R_PPC_ADDR16_LO:
3598 case R_PPC_ADDR16_HI:
3599 case R_PPC_ADDR16_HA:
3600 case R_PPC_ADDR14:
3601 case R_PPC_ADDR14_BRTAKEN:
3602 case R_PPC_ADDR14_BRNTAKEN:
3603 case R_PPC_UADDR32:
3604 case R_PPC_UADDR16:
3605 case R_PPC_PLT32:
3606 case R_PPC_PLTREL24:
3607 case R_PPC_PLT16_LO:
3608 case R_PPC_PLT16_HI:
3609 case R_PPC_PLT16_HA:
3610 if (h != NULL)
3611 {
3612 if (h->plt.refcount > 0)
3613 h->plt.refcount--;
3614 }
3615 break;
3616
3617 default:
3618 break;
3619 }
3620 }
3621 return TRUE;
3622}
3623
3624/* Set htab->tls_sec and htab->tls_get_addr. */
3625
3626bfd_boolean
3627ppc_elf_tls_setup (obfd, info)
3628 bfd *obfd;
3629 struct bfd_link_info *info;
3630{
3631 asection *tls;
3632 struct ppc_elf_link_hash_table *htab;
3633
3634 htab = ppc_elf_hash_table (info);
3635 htab->tls_get_addr = elf_link_hash_lookup (&htab->elf, "__tls_get_addr",
3636 FALSE, FALSE, TRUE);
3637
3638 for (tls = obfd->sections; tls != NULL; tls = tls->next)
3639 if ((tls->flags & (SEC_THREAD_LOCAL | SEC_LOAD))
3640 == (SEC_THREAD_LOCAL | SEC_LOAD))
3641 break;
3642 htab->tls_sec = tls;
3643
3644 return tls != NULL;
3645}
3646
3647/* Run through all the TLS relocs looking for optimization
3648 opportunities. */
3649
3650bfd_boolean
3651ppc_elf_tls_optimize (obfd, info)
3652 bfd *obfd ATTRIBUTE_UNUSED;
3653 struct bfd_link_info *info;
3654{
3655 bfd *ibfd;
3656 asection *sec;
3657 struct ppc_elf_link_hash_table *htab;
3658
3659 if (info->relocateable || info->shared)
3660 return TRUE;
3661
3662 htab = ppc_elf_hash_table (info);
3663 for (ibfd = info->input_bfds; ibfd != NULL; ibfd = ibfd->link_next)
3664 {
3665 Elf_Internal_Sym *locsyms = NULL;
3666 Elf_Internal_Shdr *symtab_hdr = &elf_tdata (ibfd)->symtab_hdr;
3667
3668 for (sec = ibfd->sections; sec != NULL; sec = sec->next)
3669 if (sec->has_tls_reloc && !bfd_is_abs_section (sec->output_section))
7fce784e 3670 {
7619e7c7
AM
3671 Elf_Internal_Rela *relstart, *rel, *relend;
3672 int expecting_tls_get_addr;
3673
3674 /* Read the relocations. */
3675 relstart = _bfd_elf32_link_read_relocs (ibfd, sec, (PTR) NULL,
3676 (Elf_Internal_Rela *) NULL,
3677 info->keep_memory);
3678 if (relstart == NULL)
3679 return FALSE;
3680
3681 expecting_tls_get_addr = 0;
3682 relend = relstart + sec->reloc_count;
3683 for (rel = relstart; rel < relend; rel++)
3684 {
3685 enum elf_ppc_reloc_type r_type;
3686 unsigned long r_symndx;
3687 struct elf_link_hash_entry *h = NULL;
3688 char *tls_mask;
3689 char tls_set, tls_clear;
3690 bfd_boolean is_local;
3691
3692 r_symndx = ELF32_R_SYM (rel->r_info);
3693 if (r_symndx >= symtab_hdr->sh_info)
3694 {
3695 struct elf_link_hash_entry **sym_hashes;
7fce784e 3696
7619e7c7
AM
3697 sym_hashes = elf_sym_hashes (ibfd);
3698 h = sym_hashes[r_symndx - symtab_hdr->sh_info];
3699 while (h->root.type == bfd_link_hash_indirect
3700 || h->root.type == bfd_link_hash_warning)
3701 h = (struct elf_link_hash_entry *) h->root.u.i.link;
3702 }
7fce784e 3703
7619e7c7
AM
3704 is_local = FALSE;
3705 if (h == NULL
3706 || !(h->elf_link_hash_flags & ELF_LINK_HASH_DEF_DYNAMIC))
3707 is_local = TRUE;
3708
3709 r_type = (enum elf_ppc_reloc_type) ELF32_R_TYPE (rel->r_info);
3710 switch (r_type)
3711 {
3712 case R_PPC_GOT_TLSLD16:
3713 case R_PPC_GOT_TLSLD16_LO:
3714 case R_PPC_GOT_TLSLD16_HI:
3715 case R_PPC_GOT_TLSLD16_HA:
3716 /* These relocs should never be against a symbol
3717 defined in a shared lib. Leave them alone if
3718 that turns out to be the case. */
3719 expecting_tls_get_addr = 0;
3720 htab->tlsld_got.refcount -= 1;
3721 if (!is_local)
3722 continue;
3723
3724 /* LD -> LE */
3725 tls_set = 0;
3726 tls_clear = TLS_LD;
3727 expecting_tls_get_addr = 1;
3728 break;
3729
3730 case R_PPC_GOT_TLSGD16:
3731 case R_PPC_GOT_TLSGD16_LO:
3732 case R_PPC_GOT_TLSGD16_HI:
3733 case R_PPC_GOT_TLSGD16_HA:
3734 if (is_local)
3735 /* GD -> LE */
3736 tls_set = 0;
3737 else
3738 /* GD -> IE */
3739 tls_set = TLS_TLS | TLS_TPRELGD;
3740 tls_clear = TLS_GD;
3741 expecting_tls_get_addr = 1;
3742 break;
3743
3744 case R_PPC_GOT_TPREL16:
3745 case R_PPC_GOT_TPREL16_LO:
3746 case R_PPC_GOT_TPREL16_HI:
3747 case R_PPC_GOT_TPREL16_HA:
3748 expecting_tls_get_addr = 0;
3749 if (is_local)
3750 {
3751 /* IE -> LE */
3752 tls_set = 0;
3753 tls_clear = TLS_TPREL;
3754 break;
3755 }
3756 else
3757 continue;
3758
3759 case R_PPC_REL14:
3760 case R_PPC_REL14_BRTAKEN:
3761 case R_PPC_REL14_BRNTAKEN:
3762 case R_PPC_REL24:
3763 if (expecting_tls_get_addr
3764 && h != NULL
3765 && h == htab->tls_get_addr)
3766 {
3767 if (h->plt.refcount > 0)
3768 h->plt.refcount -= 1;
3769 }
3770 expecting_tls_get_addr = 0;
3771 continue;
3772
3773 default:
3774 expecting_tls_get_addr = 0;
3775 continue;
3776 }
3777
3778 if (h != NULL)
3779 {
3780 if (tls_set == 0)
3781 {
3782 /* We managed to get rid of a got entry. */
3783 if (h->got.refcount > 0)
3784 h->got.refcount -= 1;
3785 }
3786 tls_mask = &ppc_elf_hash_entry (h)->tls_mask;
3787 }
3788 else
3789 {
3790 Elf_Internal_Sym *sym;
3791 bfd_signed_vma *lgot_refs;
3792 char *lgot_masks;
3793
3794 if (locsyms == NULL)
3795 {
3796 locsyms = (Elf_Internal_Sym *) symtab_hdr->contents;
3797 if (locsyms == NULL)
3798 locsyms = bfd_elf_get_elf_syms (ibfd, symtab_hdr,
3799 symtab_hdr->sh_info,
3800 0, NULL, NULL, NULL);
3801 if (locsyms == NULL)
3802 {
3803 if (elf_section_data (sec)->relocs != relstart)
3804 free (relstart);
3805 return FALSE;
3806 }
3807 }
3808 sym = locsyms + r_symndx;
3809 lgot_refs = elf_local_got_refcounts (ibfd);
3810 if (lgot_refs == NULL)
3811 abort ();
3812 if (tls_set == 0)
3813 {
3814 /* We managed to get rid of a got entry. */
3815 if (lgot_refs[r_symndx] > 0)
3816 lgot_refs[r_symndx] -= 1;
3817 }
3818 lgot_masks = (char *) (lgot_refs + symtab_hdr->sh_info);
3819 tls_mask = &lgot_masks[r_symndx];
3820 }
3821
3822 *tls_mask |= tls_set;
3823 *tls_mask &= ~tls_clear;
3824 }
3825
3826 if (elf_section_data (sec)->relocs != relstart)
3827 free (relstart);
7fce784e 3828 }
252b5132 3829
7619e7c7
AM
3830 if (locsyms != NULL
3831 && (symtab_hdr->contents != (unsigned char *) locsyms))
3832 {
3833 if (!info->keep_memory)
3834 free (locsyms);
3835 else
3836 symtab_hdr->contents = (unsigned char *) locsyms;
3837 }
3838 }
b34976b6 3839 return TRUE;
252b5132
RH
3840}
3841\f
3842/* Hook called by the linker routine which adds symbols from an object
3843 file. We use it to put .comm items in .sbss, and not .bss. */
3844
b34976b6 3845static bfd_boolean
252b5132
RH
3846ppc_elf_add_symbol_hook (abfd, info, sym, namep, flagsp, secp, valp)
3847 bfd *abfd;
3848 struct bfd_link_info *info;
3849 const Elf_Internal_Sym *sym;
5f771d47
ILT
3850 const char **namep ATTRIBUTE_UNUSED;
3851 flagword *flagsp ATTRIBUTE_UNUSED;
252b5132
RH
3852 asection **secp;
3853 bfd_vma *valp;
3854{
3855 if (sym->st_shndx == SHN_COMMON
3856 && !info->relocateable
27242387
AM
3857 && sym->st_size <= elf_gp_size (abfd)
3858 && info->hash->creator->flavour == bfd_target_elf_flavour)
252b5132
RH
3859 {
3860 /* Common symbols less than or equal to -G nn bytes are automatically
3861 put into .sdata. */
3862 elf_linker_section_t *sdata
3863 = ppc_elf_create_linker_section (abfd, info, LINKER_SECTION_SDATA);
3864
3865 if (!sdata->bss_section)
3866 {
dc810e39
AM
3867 bfd_size_type amt;
3868
252b5132
RH
3869 /* We don't go through bfd_make_section, because we don't
3870 want to attach this common section to DYNOBJ. The linker
3871 will move the symbols to the appropriate output section
3872 when it defines common symbols. */
dc810e39
AM
3873 amt = sizeof (asection);
3874 sdata->bss_section = (asection *) bfd_zalloc (abfd, amt);
252b5132 3875 if (sdata->bss_section == NULL)
b34976b6 3876 return FALSE;
252b5132
RH
3877 sdata->bss_section->name = sdata->bss_name;
3878 sdata->bss_section->flags = SEC_IS_COMMON;
3879 sdata->bss_section->output_section = sdata->bss_section;
dc810e39
AM
3880 amt = sizeof (asymbol);
3881 sdata->bss_section->symbol = (asymbol *) bfd_zalloc (abfd, amt);
3882 amt = sizeof (asymbol *);
252b5132 3883 sdata->bss_section->symbol_ptr_ptr =
dc810e39 3884 (asymbol **) bfd_zalloc (abfd, amt);
252b5132
RH
3885 if (sdata->bss_section->symbol == NULL
3886 || sdata->bss_section->symbol_ptr_ptr == NULL)
b34976b6 3887 return FALSE;
252b5132
RH
3888 sdata->bss_section->symbol->name = sdata->bss_name;
3889 sdata->bss_section->symbol->flags = BSF_SECTION_SYM;
3890 sdata->bss_section->symbol->section = sdata->bss_section;
3891 *sdata->bss_section->symbol_ptr_ptr = sdata->bss_section->symbol;
3892 }
3893
3894 *secp = sdata->bss_section;
3895 *valp = sym->st_size;
3896 }
3897
b34976b6 3898 return TRUE;
252b5132 3899}
252b5132
RH
3900\f
3901/* Finish up dynamic symbol handling. We set the contents of various
3902 dynamic sections here. */
3903
b34976b6 3904static bfd_boolean
252b5132
RH
3905ppc_elf_finish_dynamic_symbol (output_bfd, info, h, sym)
3906 bfd *output_bfd;
3907 struct bfd_link_info *info;
3908 struct elf_link_hash_entry *h;
3909 Elf_Internal_Sym *sym;
3910{
7619e7c7 3911 struct ppc_elf_link_hash_table *htab;
252b5132
RH
3912
3913#ifdef DEBUG
3914 fprintf (stderr, "ppc_elf_finish_dynamic_symbol called for %s",
3915 h->root.root.string);
3916#endif
3917
7619e7c7
AM
3918 htab = ppc_elf_hash_table (info);
3919 BFD_ASSERT (htab->elf.dynobj != NULL);
252b5132
RH
3920
3921 if (h->plt.offset != (bfd_vma) -1)
3922 {
252b5132 3923 Elf_Internal_Rela rela;
947216bf 3924 bfd_byte *loc;
252b5132
RH
3925 bfd_vma reloc_index;
3926
3927#ifdef DEBUG
3928 fprintf (stderr, ", plt_offset = %d", h->plt.offset);
3929#endif
3930
3931 /* This symbol has an entry in the procedure linkage table. Set
3932 it up. */
3933
3934 BFD_ASSERT (h->dynindx != -1);
7619e7c7 3935 BFD_ASSERT (htab->plt != NULL && htab->relplt != NULL);
252b5132
RH
3936
3937 /* We don't need to fill in the .plt. The ppc dynamic linker
3938 will fill it in. */
3939
3940 /* Fill in the entry in the .rela.plt section. */
7619e7c7
AM
3941 rela.r_offset = (htab->plt->output_section->vma
3942 + htab->plt->output_offset
252b5132
RH
3943 + h->plt.offset);
3944 rela.r_info = ELF32_R_INFO (h->dynindx, R_PPC_JMP_SLOT);
3945 rela.r_addend = 0;
3946
3947 reloc_index = (h->plt.offset - PLT_INITIAL_ENTRY_SIZE) / PLT_SLOT_SIZE;
3948 if (reloc_index > PLT_NUM_SINGLE_ENTRIES)
3949 reloc_index -= (reloc_index - PLT_NUM_SINGLE_ENTRIES) / 2;
7619e7c7
AM
3950 loc = (htab->relplt->contents
3951 + reloc_index * sizeof (Elf32_External_Rela));
947216bf 3952 bfd_elf32_swap_reloca_out (output_bfd, &rela, loc);
252b5132
RH
3953
3954 if ((h->elf_link_hash_flags & ELF_LINK_HASH_DEF_REGULAR) == 0)
3955 {
3956 /* Mark the symbol as undefined, rather than as defined in
3957 the .plt section. Leave the value alone. */
3958 sym->st_shndx = SHN_UNDEF;
a4b120e1
GK
3959 /* If the symbol is weak, we do need to clear the value.
3960 Otherwise, the PLT entry would provide a definition for
3961 the symbol even if the symbol wasn't defined anywhere,
3962 and so the symbol would never be NULL. */
c3668558 3963 if ((h->elf_link_hash_flags & ELF_LINK_HASH_REF_REGULAR_NONWEAK)
a4b120e1
GK
3964 == 0)
3965 sym->st_value = 0;
252b5132
RH
3966 }
3967 }
3968
252b5132
RH
3969 if ((h->elf_link_hash_flags & ELF_LINK_HASH_NEEDS_COPY) != 0)
3970 {
3971 asection *s;
3972 Elf_Internal_Rela rela;
947216bf 3973 bfd_byte *loc;
252b5132
RH
3974
3975 /* This symbols needs a copy reloc. Set it up. */
3976
3977#ifdef DEBUG
3978 fprintf (stderr, ", copy");
3979#endif
3980
3981 BFD_ASSERT (h->dynindx != -1);
3982
7619e7c7
AM
3983 if (h->size <= elf_gp_size (htab->elf.dynobj))
3984 s = htab->relsbss;
252b5132 3985 else
7619e7c7 3986 s = htab->relbss;
252b5132
RH
3987 BFD_ASSERT (s != NULL);
3988
3989 rela.r_offset = (h->root.u.def.value
3990 + h->root.u.def.section->output_section->vma
3991 + h->root.u.def.section->output_offset);
3992 rela.r_info = ELF32_R_INFO (h->dynindx, R_PPC_COPY);
3993 rela.r_addend = 0;
947216bf
AM
3994 loc = s->contents + s->reloc_count++ * sizeof (Elf32_External_Rela);
3995 bfd_elf32_swap_reloca_out (output_bfd, &rela, loc);
252b5132
RH
3996 }
3997
3998#ifdef DEBUG
3999 fprintf (stderr, "\n");
4000#endif
4001
4002 /* Mark some specially defined symbols as absolute. */
4003 if (strcmp (h->root.root.string, "_DYNAMIC") == 0
4004 || strcmp (h->root.root.string, "_GLOBAL_OFFSET_TABLE_") == 0
4005 || strcmp (h->root.root.string, "_PROCEDURE_LINKAGE_TABLE_") == 0)
4006 sym->st_shndx = SHN_ABS;
4007
b34976b6 4008 return TRUE;
252b5132 4009}
252b5132
RH
4010\f
4011/* Finish up the dynamic sections. */
4012
b34976b6 4013static bfd_boolean
252b5132
RH
4014ppc_elf_finish_dynamic_sections (output_bfd, info)
4015 bfd *output_bfd;
4016 struct bfd_link_info *info;
4017{
4018 asection *sdyn;
7619e7c7 4019 struct ppc_elf_link_hash_table *htab;
252b5132
RH
4020
4021#ifdef DEBUG
4022 fprintf (stderr, "ppc_elf_finish_dynamic_sections called\n");
4023#endif
4024
7619e7c7
AM
4025 htab = ppc_elf_hash_table (info);
4026 sdyn = bfd_get_section_by_name (htab->elf.dynobj, ".dynamic");
252b5132 4027
7619e7c7 4028 if (htab->elf.dynamic_sections_created)
252b5132 4029 {
252b5132
RH
4030 Elf32_External_Dyn *dyncon, *dynconend;
4031
7619e7c7 4032 BFD_ASSERT (htab->plt != NULL && sdyn != NULL);
252b5132
RH
4033
4034 dyncon = (Elf32_External_Dyn *) sdyn->contents;
4035 dynconend = (Elf32_External_Dyn *) (sdyn->contents + sdyn->_raw_size);
4036 for (; dyncon < dynconend; dyncon++)
4037 {
4038 Elf_Internal_Dyn dyn;
7619e7c7 4039 asection *s;
252b5132 4040
7619e7c7 4041 bfd_elf32_swap_dyn_in (htab->elf.dynobj, dyncon, &dyn);
252b5132
RH
4042
4043 switch (dyn.d_tag)
4044 {
7619e7c7
AM
4045 case DT_PLTGOT:
4046 s = htab->plt;
4047 dyn.d_un.d_ptr = s->output_section->vma + s->output_offset;
4048 break;
252b5132 4049
7619e7c7
AM
4050 case DT_PLTRELSZ:
4051 dyn.d_un.d_val = htab->relplt->_raw_size;
4052 break;
252b5132 4053
7619e7c7
AM
4054 case DT_JMPREL:
4055 s = htab->relplt;
4056 dyn.d_un.d_ptr = s->output_section->vma + s->output_offset;
4057 break;
4058
4059 default:
4060 continue;
252b5132 4061 }
7619e7c7
AM
4062
4063 bfd_elf32_swap_dyn_out (output_bfd, &dyn, dyncon);
252b5132
RH
4064 }
4065 }
4066
4067 /* Add a blrl instruction at _GLOBAL_OFFSET_TABLE_-4 so that a function can
4068 easily find the address of the _GLOBAL_OFFSET_TABLE_. */
7619e7c7 4069 if (htab->got)
252b5132 4070 {
7619e7c7 4071 unsigned char *contents = htab->got->contents;
dc810e39 4072 bfd_put_32 (output_bfd, (bfd_vma) 0x4e800021 /* blrl */, contents);
252b5132
RH
4073
4074 if (sdyn == NULL)
7619e7c7 4075 bfd_put_32 (output_bfd, (bfd_vma) 0, contents + 4);
252b5132
RH
4076 else
4077 bfd_put_32 (output_bfd,
4078 sdyn->output_section->vma + sdyn->output_offset,
7619e7c7 4079 contents + 4);
252b5132 4080
7619e7c7 4081 elf_section_data (htab->got->output_section)->this_hdr.sh_entsize = 4;
252b5132
RH
4082 }
4083
b34976b6 4084 return TRUE;
252b5132 4085}
252b5132
RH
4086\f
4087/* The RELOCATE_SECTION function is called by the ELF backend linker
4088 to handle the relocations for a section.
4089
4090 The relocs are always passed as Rela structures; if the section
4091 actually uses Rel structures, the r_addend field will always be
4092 zero.
4093
4094 This function is responsible for adjust the section contents as
4095 necessary, and (if using Rela relocs and generating a
4096 relocateable output file) adjusting the reloc addend as
4097 necessary.
4098
4099 This function does not have to worry about setting the reloc
4100 address or the reloc symbol index.
4101
4102 LOCAL_SYMS is a pointer to the swapped in local symbols.
4103
4104 LOCAL_SECTIONS is an array giving the section in the input file
4105 corresponding to the st_shndx field of each local symbol.
4106
4107 The global hash table entry for the global symbols can be found
4108 via elf_sym_hashes (input_bfd).
4109
4110 When generating relocateable output, this function must handle
4111 STB_LOCAL/STT_SECTION symbols specially. The output symbol is
4112 going to be the section symbol corresponding to the output
4113 section, which means that the addend must be adjusted
4114 accordingly. */
4115
b34976b6 4116static bfd_boolean
252b5132
RH
4117ppc_elf_relocate_section (output_bfd, info, input_bfd, input_section,
4118 contents, relocs, local_syms, local_sections)
4119 bfd *output_bfd;
4120 struct bfd_link_info *info;
4121 bfd *input_bfd;
4122 asection *input_section;
4123 bfd_byte *contents;
4124 Elf_Internal_Rela *relocs;
4125 Elf_Internal_Sym *local_syms;
4126 asection **local_sections;
4127{
7619e7c7
AM
4128 Elf_Internal_Shdr *symtab_hdr;
4129 struct elf_link_hash_entry **sym_hashes;
4130 struct ppc_elf_link_hash_table *htab;
4131 Elf_Internal_Rela *rel;
4132 Elf_Internal_Rela *relend;
4133 Elf_Internal_Rela outrel;
4134 bfd_byte *loc;
b34976b6 4135 asection *sreloc = NULL;
252b5132 4136 bfd_vma *local_got_offsets;
b34976b6 4137 bfd_boolean ret = TRUE;
b34976b6 4138
252b5132
RH
4139#ifdef DEBUG
4140 fprintf (stderr, "ppc_elf_relocate_section called for %s section %s, %ld relocations%s\n",
8f615d07 4141 bfd_archive_filename (input_bfd),
252b5132 4142 bfd_section_name(input_bfd, input_section),
8da6118f 4143 (long) input_section->reloc_count,
252b5132
RH
4144 (info->relocateable) ? " (relocatable)" : "");
4145#endif
4146
b491616a 4147 if (info->relocateable)
b34976b6 4148 return TRUE;
b491616a 4149
8da6118f
KH
4150 if (!ppc_elf_howto_table[R_PPC_ADDR32])
4151 /* Initialize howto table if needed. */
252b5132
RH
4152 ppc_elf_howto_init ();
4153
7619e7c7 4154 htab = ppc_elf_hash_table (info);
252b5132 4155 local_got_offsets = elf_local_got_offsets (input_bfd);
7619e7c7
AM
4156 symtab_hdr = &elf_tdata (input_bfd)->symtab_hdr;
4157 sym_hashes = elf_sym_hashes (input_bfd);
4158 rel = relocs;
4159 relend = relocs + input_section->reloc_count;
252b5132
RH
4160 for (; rel < relend; rel++)
4161 {
7619e7c7
AM
4162 enum elf_ppc_reloc_type r_type;
4163 bfd_vma addend;
4164 bfd_reloc_status_type r;
4165 Elf_Internal_Sym *sym;
4166 asection *sec;
4167 struct elf_link_hash_entry *h;
4168 const char *sym_name;
252b5132
RH
4169 reloc_howto_type *howto;
4170 unsigned long r_symndx;
4171 bfd_vma relocation;
7619e7c7
AM
4172 bfd_vma branch_bit, insn, from;
4173 bfd_boolean will_become_local;
4174 bfd_boolean unresolved_reloc;
4175 bfd_boolean warned;
4176 unsigned int tls_type, tls_mask, tls_gd;
4177
4178 r_type = (enum elf_ppc_reloc_type)ELF32_R_TYPE (rel->r_info);
4179 sym = (Elf_Internal_Sym *) 0;
4180 sec = (asection *) 0;
4181 h = (struct elf_link_hash_entry *) 0;
4182 unresolved_reloc = FALSE;
4183 warned = FALSE;
252b5132 4184 r_symndx = ELF32_R_SYM (rel->r_info);
252b5132
RH
4185 if (r_symndx < symtab_hdr->sh_info)
4186 {
4187 sym = local_syms + r_symndx;
4188 sec = local_sections[r_symndx];
7619e7c7 4189 sym_name = bfd_elf_local_sym_name (input_bfd, sym);
252b5132 4190
f8df10f4 4191 relocation = _bfd_elf_rela_local_sym (output_bfd, sym, sec, rel);
e1e0340b 4192 /* Relocs to local symbols are always resolved. */
7619e7c7 4193 will_become_local = TRUE;
252b5132
RH
4194 }
4195 else
4196 {
4197 h = sym_hashes[r_symndx - symtab_hdr->sh_info];
4198 while (h->root.type == bfd_link_hash_indirect
4199 || h->root.type == bfd_link_hash_warning)
4200 h = (struct elf_link_hash_entry *) h->root.u.i.link;
4201 sym_name = h->root.root.string;
e1e0340b
GK
4202
4203 /* Can this relocation be resolved immediately? */
4204 will_become_local = SYMBOL_REFERENCES_LOCAL (info, h);
7619e7c7 4205 relocation = 0;
252b5132
RH
4206 if (h->root.type == bfd_link_hash_defined
4207 || h->root.type == bfd_link_hash_defweak)
4208 {
4209 sec = h->root.u.def.section;
7619e7c7
AM
4210 /* Set a flag that will be cleared later if we find a
4211 relocation value for this symbol. output_section
4212 is typically NULL for symbols satisfied by a shared
4213 library. */
4214 if (sec->output_section == NULL)
4215 unresolved_reloc = TRUE;
252b5132
RH
4216 else
4217 relocation = (h->root.u.def.value
4218 + sec->output_section->vma
4219 + sec->output_offset);
4220 }
4221 else if (h->root.type == bfd_link_hash_undefweak)
7619e7c7 4222 ;
671bae9c 4223 else if (info->shared
671bae9c 4224 && !info->no_undefined
3a27a730 4225 && ELF_ST_VISIBILITY (h->other) == STV_DEFAULT)
7619e7c7 4226 ;
252b5132
RH
4227 else
4228 {
7619e7c7
AM
4229 if (! ((*info->callbacks->undefined_symbol)
4230 (info, h->root.root.string, input_bfd, input_section,
4231 rel->r_offset, (!info->shared
4232 || info->no_undefined
4233 || ELF_ST_VISIBILITY (h->other)))))
b34976b6 4234 return FALSE;
7619e7c7
AM
4235 warned = TRUE;
4236 }
4237 }
4238
4239 /* TLS optimizations. Replace instruction sequences and relocs
4240 based on information we collected in tls_optimize. We edit
4241 RELOCS so that --emit-relocs will output something sensible
4242 for the final instruction stream. */
4243 tls_mask = 0;
4244 tls_gd = 0;
4245 if (IS_PPC_TLS_RELOC (r_type))
4246 {
4247 if (h != NULL)
4248 tls_mask = ((struct ppc_elf_link_hash_entry *) h)->tls_mask;
4249 else if (local_got_offsets != NULL)
4250 {
4251 char *lgot_masks;
4252 lgot_masks = (char *) (local_got_offsets + symtab_hdr->sh_info);
4253 tls_mask = lgot_masks[r_symndx];
4254 }
4255 }
4256
4257 /* Ensure reloc mapping code below stays sane. */
4258 if ((R_PPC_GOT_TLSLD16 & 3) != (R_PPC_GOT_TLSGD16 & 3)
4259 || (R_PPC_GOT_TLSLD16_LO & 3) != (R_PPC_GOT_TLSGD16_LO & 3)
4260 || (R_PPC_GOT_TLSLD16_HI & 3) != (R_PPC_GOT_TLSGD16_HI & 3)
4261 || (R_PPC_GOT_TLSLD16_HA & 3) != (R_PPC_GOT_TLSGD16_HA & 3)
4262 || (R_PPC_GOT_TLSLD16 & 3) != (R_PPC_GOT_TPREL16 & 3)
4263 || (R_PPC_GOT_TLSLD16_LO & 3) != (R_PPC_GOT_TPREL16_LO & 3)
4264 || (R_PPC_GOT_TLSLD16_HI & 3) != (R_PPC_GOT_TPREL16_HI & 3)
4265 || (R_PPC_GOT_TLSLD16_HA & 3) != (R_PPC_GOT_TPREL16_HA & 3))
4266 abort ();
4267 switch (r_type)
4268 {
4269 default:
4270 break;
4271
4272 case R_PPC_GOT_TPREL16:
4273 case R_PPC_GOT_TPREL16_LO:
4274 if (tls_mask != 0
4275 && (tls_mask & TLS_TPREL) == 0)
4276 {
4277 bfd_vma insn;
4278 insn = bfd_get_32 (output_bfd, contents + rel->r_offset - 2);
4279 insn &= 31 << 21;
4280 insn |= 0x3c020000; /* addis 0,2,0 */
4281 bfd_put_32 (output_bfd, insn, contents + rel->r_offset - 2);
4282 r_type = R_PPC_TPREL16_HA;
4283 rel->r_info = ELF32_R_INFO (r_symndx, r_type);
4284 }
4285 break;
4286
4287 case R_PPC_TLS:
4288 if (tls_mask != 0
4289 && (tls_mask & TLS_TPREL) == 0)
4290 {
4291 bfd_vma insn, rtra;
4292 insn = bfd_get_32 (output_bfd, contents + rel->r_offset);
4293 if ((insn & ((31 << 26) | (31 << 11)))
4294 == ((31 << 26) | (2 << 11)))
4295 rtra = insn & ((1 << 26) - (1 << 16));
4296 else if ((insn & ((31 << 26) | (31 << 16)))
4297 == ((31 << 26) | (2 << 16)))
4298 rtra = (insn & (31 << 21)) | ((insn & (31 << 11)) << 5);
4299 else
4300 abort ();
4301 if ((insn & ((1 << 11) - (1 << 1))) == 266 << 1)
4302 /* add -> addi. */
4303 insn = 14 << 26;
4304 else if ((insn & (31 << 1)) == 23 << 1
4305 && ((insn & (31 << 6)) < 14 << 6
4306 || ((insn & (31 << 6)) >= 16 << 6
4307 && (insn & (31 << 6)) < 24 << 6)))
4308 /* load and store indexed -> dform. */
4309 insn = (32 | ((insn >> 6) & 31)) << 26;
4310 else if ((insn & (31 << 1)) == 21 << 1
4311 && (insn & (0x1a << 6)) == 0)
4312 /* ldx, ldux, stdx, stdux -> ld, ldu, std, stdu. */
4313 insn = (((58 | ((insn >> 6) & 4)) << 26)
4314 | ((insn >> 6) & 1));
4315 else if ((insn & (31 << 1)) == 21 << 1
4316 && (insn & ((1 << 11) - (1 << 1))) == 341 << 1)
4317 /* lwax -> lwa. */
4318 insn = (58 << 26) | 2;
4319 else
4320 abort ();
4321 insn |= rtra;
4322 bfd_put_32 (output_bfd, insn, contents + rel->r_offset);
4323 r_type = R_PPC_TPREL16_LO;
4324 rel->r_info = ELF32_R_INFO (r_symndx, r_type);
4325 /* Was PPC_TLS which sits on insn boundary, now
4326 PPC_TPREL16_LO which is at insn+2. */
4327 rel->r_offset += 2;
4328 }
4329 break;
4330
4331 case R_PPC_GOT_TLSGD16_HI:
4332 case R_PPC_GOT_TLSGD16_HA:
4333 tls_gd = TLS_TPRELGD;
4334 if (tls_mask != 0 && (tls_mask & TLS_GD) == 0)
4335 goto tls_gdld_hi;
4336 break;
4337
4338 case R_PPC_GOT_TLSLD16_HI:
4339 case R_PPC_GOT_TLSLD16_HA:
4340 if (tls_mask != 0 && (tls_mask & TLS_LD) == 0)
4341 {
4342 tls_gdld_hi:
4343 if ((tls_mask & tls_gd) != 0)
4344 r_type = (((r_type - (R_PPC_GOT_TLSGD16 & 3)) & 3)
4345 + R_PPC_GOT_TPREL16);
4346 else
4347 {
4348 bfd_put_32 (output_bfd, NOP, contents + rel->r_offset);
4349 rel->r_offset -= 2;
4350 r_type = R_PPC_NONE;
4351 }
4352 rel->r_info = ELF32_R_INFO (r_symndx, r_type);
4353 }
4354 break;
4355
4356 case R_PPC_GOT_TLSGD16:
4357 case R_PPC_GOT_TLSGD16_LO:
4358 tls_gd = TLS_TPRELGD;
4359 if (tls_mask != 0 && (tls_mask & TLS_GD) == 0)
4360 goto tls_get_addr_check;
4361 break;
4362
4363 case R_PPC_GOT_TLSLD16:
4364 case R_PPC_GOT_TLSLD16_LO:
4365 if (tls_mask != 0 && (tls_mask & TLS_LD) == 0)
4366 {
4367 tls_get_addr_check:
4368 if (rel + 1 < relend)
4369 {
4370 enum elf_ppc_reloc_type r_type2;
4371 unsigned long r_symndx2;
4372 struct elf_link_hash_entry *h2;
4373 bfd_vma insn1, insn2, insn3;
4374 bfd_vma offset;
4375
4376 /* The next instruction should be a call to
4377 __tls_get_addr. Peek at the reloc to be sure. */
4378 r_type2
4379 = (enum elf_ppc_reloc_type) ELF32_R_TYPE (rel[1].r_info);
4380 r_symndx2 = ELF32_R_SYM (rel[1].r_info);
4381 if (r_symndx2 < symtab_hdr->sh_info
4382 || (r_type2 != R_PPC_REL14
4383 && r_type2 != R_PPC_REL14_BRTAKEN
4384 && r_type2 != R_PPC_REL14_BRNTAKEN
4385 && r_type2 != R_PPC_REL24
4386 && r_type2 != R_PPC_PLTREL24))
4387 break;
4388
4389 h2 = sym_hashes[r_symndx2 - symtab_hdr->sh_info];
4390 while (h2->root.type == bfd_link_hash_indirect
4391 || h2->root.type == bfd_link_hash_warning)
4392 h2 = (struct elf_link_hash_entry *) h2->root.u.i.link;
4393 if (h2 == NULL || h2 != htab->tls_get_addr)
4394 break;
4395
4396 /* OK, it checks out. Replace the call. */
4397 offset = rel[1].r_offset;
4398 insn1 = bfd_get_32 (output_bfd,
4399 contents + rel->r_offset - 2);
4400 insn3 = bfd_get_32 (output_bfd,
4401 contents + offset + 4);
4402 if ((tls_mask & tls_gd) != 0)
4403 {
4404 /* IE */
4405 insn1 &= (1 << 26) - 1;
4406 insn1 |= 32 << 26; /* lwz */
4407 insn2 = 0x7c631214; /* add 3,3,2 */
4408 rel[1].r_info = ELF32_R_INFO (r_symndx2, R_PPC_NONE);
4409 r_type = (((r_type - (R_PPC_GOT_TLSGD16 & 3)) & 3)
4410 + R_PPC_GOT_TPREL16);
4411 rel->r_info = ELF32_R_INFO (r_symndx, r_type);
4412 }
4413 else
4414 {
4415 /* LE */
4416 insn1 = 0x3c620000; /* addis 3,2,0 */
4417 insn2 = 0x38630000; /* addi 3,3,0 */
4418 if (tls_gd == 0)
4419 {
4420 /* Was an LD reloc. */
4421 r_symndx = 0;
4422 rel->r_addend = htab->tls_sec->vma + DTP_OFFSET;
4423 rel[1].r_addend = htab->tls_sec->vma + DTP_OFFSET;
4424 }
4425 r_type = R_PPC_TPREL16_HA;
4426 rel->r_info = ELF32_R_INFO (r_symndx, r_type);
4427 rel[1].r_info = ELF32_R_INFO (r_symndx,
4428 R_PPC_TPREL16_LO);
4429 rel[1].r_offset += 2;
4430 }
4431 if (insn3 == NOP
4432 || insn3 == CROR_151515 || insn3 == CROR_313131)
4433 {
4434 insn3 = insn2;
4435 insn2 = NOP;
4436 rel[1].r_offset += 4;
4437 }
4438 bfd_put_32 (output_bfd, insn1, contents + rel->r_offset - 2);
4439 bfd_put_32 (output_bfd, insn2, contents + offset);
4440 bfd_put_32 (output_bfd, insn3, contents + offset + 4);
4441 if (tls_gd == 0)
4442 {
4443 /* We changed the symbol on an LD reloc. Start over
4444 in order to get h, sym, sec etc. right. */
4445 rel--;
4446 continue;
4447 }
4448 }
252b5132 4449 }
7619e7c7
AM
4450 break;
4451 }
4452
4453 /* Handle other relocations that tweak non-addend part of insn. */
4454 branch_bit = 0;
4455 switch (r_type)
4456 {
4457 default:
4458 break;
4459
4460 /* Branch taken prediction relocations. */
4461 case R_PPC_ADDR14_BRTAKEN:
4462 case R_PPC_REL14_BRTAKEN:
4463 branch_bit = BRANCH_PREDICT_BIT;
4464 /* Fall thru */
4465
4466 /* Branch not taken predicition relocations. */
4467 case R_PPC_ADDR14_BRNTAKEN:
4468 case R_PPC_REL14_BRNTAKEN:
4469 insn = bfd_get_32 (output_bfd, contents + rel->r_offset);
4470 insn &= ~BRANCH_PREDICT_BIT;
4471 insn |= branch_bit;
4472
4473 from = (rel->r_offset
4474 + input_section->output_offset
4475 + input_section->output_section->vma);
4476
4477 /* Invert 'y' bit if not the default. */
4478 if ((bfd_signed_vma) (relocation + rel->r_addend - from) < 0)
4479 insn ^= BRANCH_PREDICT_BIT;
4480
4481 bfd_put_32 (output_bfd, insn, contents + rel->r_offset);
4482 break;
252b5132
RH
4483 }
4484
7619e7c7
AM
4485 addend = rel->r_addend;
4486 tls_type = 0;
4487 howto = NULL;
4488 if ((unsigned) r_type < (unsigned) R_PPC_max)
4489 howto = ppc_elf_howto_table[(int) r_type];
4490 switch (r_type)
252b5132
RH
4491 {
4492 default:
7619e7c7
AM
4493 (*_bfd_error_handler)
4494 (_("%s: unknown relocation type %d for symbol %s"),
4495 bfd_archive_filename (input_bfd), (int) r_type, sym_name);
252b5132
RH
4496
4497 bfd_set_error (bfd_error_bad_value);
b34976b6 4498 ret = FALSE;
252b5132
RH
4499 continue;
4500
7619e7c7
AM
4501 case R_PPC_NONE:
4502 case R_PPC_TLS:
4503 case R_PPC_EMB_MRKREF:
4504 case R_PPC_GNU_VTINHERIT:
4505 case R_PPC_GNU_VTENTRY:
7595d193
L
4506 continue;
4507
7619e7c7
AM
4508 /* GOT16 relocations. Like an ADDR16 using the symbol's
4509 address in the GOT as relocation value instead of the
4510 symbol's value itself. Also, create a GOT entry for the
4511 symbol and put the symbol value there. */
4512 case R_PPC_GOT_TLSGD16:
4513 case R_PPC_GOT_TLSGD16_LO:
4514 case R_PPC_GOT_TLSGD16_HI:
4515 case R_PPC_GOT_TLSGD16_HA:
4516 tls_type = TLS_TLS | TLS_GD;
4517 goto dogot;
4518
4519 case R_PPC_GOT_TLSLD16:
4520 case R_PPC_GOT_TLSLD16_LO:
4521 case R_PPC_GOT_TLSLD16_HI:
4522 case R_PPC_GOT_TLSLD16_HA:
4523 tls_type = TLS_TLS | TLS_LD;
4524 goto dogot;
4525
4526 case R_PPC_GOT_TPREL16:
4527 case R_PPC_GOT_TPREL16_LO:
4528 case R_PPC_GOT_TPREL16_HI:
4529 case R_PPC_GOT_TPREL16_HA:
4530 tls_type = TLS_TLS | TLS_TPREL;
4531 goto dogot;
4532
4533 case R_PPC_GOT_DTPREL16:
4534 case R_PPC_GOT_DTPREL16_LO:
4535 case R_PPC_GOT_DTPREL16_HI:
4536 case R_PPC_GOT_DTPREL16_HA:
4537 tls_type = TLS_TLS | TLS_DTPREL;
4538 goto dogot;
4539
4540 case R_PPC_GOT16:
4541 case R_PPC_GOT16_LO:
4542 case R_PPC_GOT16_HI:
4543 case R_PPC_GOT16_HA:
4544 dogot:
4545 {
4546 /* Relocation is to the entry for this symbol in the global
4547 offset table. */
4548 bfd_vma off;
4549 bfd_vma *offp;
4550 unsigned long indx;
4551
4552 if (htab->got == NULL)
4553 abort ();
4554
4555 indx = 0;
4556 if (tls_type == (TLS_TLS | TLS_LD)
d881513a 4557 && (h == NULL
7619e7c7
AM
4558 || !(h->elf_link_hash_flags & ELF_LINK_HASH_DEF_DYNAMIC)))
4559 offp = &htab->tlsld_got.offset;
4560 else if (h != NULL)
4561 {
4562 bfd_boolean dyn;
4563 dyn = htab->elf.dynamic_sections_created;
4564 if (! WILL_CALL_FINISH_DYNAMIC_SYMBOL (dyn, info, h)
4565 || (info->shared
4566 && SYMBOL_REFERENCES_LOCAL (info, h)))
4567 /* This is actually a static link, or it is a
4568 -Bsymbolic link and the symbol is defined
4569 locally, or the symbol was forced to be local
4570 because of a version file. */
4571 ;
4572 else
4573 {
4574 indx = h->dynindx;
4575 unresolved_reloc = FALSE;
4576 }
4577 offp = &h->got.offset;
4578 }
4579 else
4580 {
4581 if (local_got_offsets == NULL)
4582 abort ();
4583 offp = &local_got_offsets[r_symndx];
4584 }
4585
4586 /* The offset must always be a multiple of 4. We use the
4587 least significant bit to record whether we have already
4588 processed this entry. */
4589 off = *offp;
4590 if ((off & 1) != 0)
4591 off &= ~1;
4592 else
4593 {
4594 *offp = off | 1;
4595
4596 /* Generate relocs for the dynamic linker, except in
4597 the case of TLSLD where we'll use one entry per
4598 module. */
4599 if (info->shared || indx != 0)
4600 {
4601 outrel.r_offset = (htab->got->output_section->vma
4602 + htab->got->output_offset
4603 + off);
4604 if (tls_type & (TLS_LD | TLS_GD))
4605 {
4606 outrel.r_info = ELF32_R_INFO (indx, R_PPC_DTPMOD32);
4607 outrel.r_addend = 0;
4608 if (tls_type == (TLS_TLS | TLS_GD))
4609 {
4610 loc = htab->relgot->contents;
4611 loc += (htab->relgot->reloc_count++
4612 * sizeof (Elf32_External_Rela));
4613 bfd_elf32_swap_reloca_out (output_bfd,
4614 &outrel, loc);
4615 outrel.r_info
4616 = ELF32_R_INFO (indx, R_PPC_DTPREL32);
4617 outrel.r_offset += 4;
4618 }
4619 }
4620 else if (tls_type == (TLS_TLS | TLS_DTPREL))
4621 outrel.r_info = ELF32_R_INFO (indx, R_PPC_DTPREL32);
4622 else if (tls_type == (TLS_TLS | TLS_TPREL))
4623 outrel.r_info = ELF32_R_INFO (indx, R_PPC_TPREL32);
4624 else if (indx == 0)
4625 outrel.r_info = ELF32_R_INFO (indx, R_PPC_RELATIVE);
4626 else
4627 outrel.r_info = ELF32_R_INFO (indx, R_PPC_GLOB_DAT);
4628 outrel.r_addend = 0;
4629 if (indx == 0)
4630 outrel.r_addend += relocation;
4631 loc = htab->relgot->contents;
4632 loc += (htab->relgot->reloc_count++
4633 * sizeof (Elf32_External_Rela));
4634 bfd_elf32_swap_reloca_out (output_bfd, &outrel, loc);
4635 }
4636
4637 /* Init the .got section contents if we're not
4638 emitting a reloc. */
4639 else
4640 {
4641 if (tls_type != 0)
4642 {
4643 relocation -= htab->tls_sec->vma + DTP_OFFSET;
4644 if ((tls_type & TLS_TPREL) != 0)
4645 relocation += DTP_OFFSET - TP_OFFSET;
4646 }
4647
4648 if (tls_type == (TLS_TLS | TLS_GD))
4649 {
4650 bfd_put_32 (output_bfd, relocation,
4651 htab->got->contents + off + 4);
4652 relocation = 1;
4653 }
4654 else if (tls_type == (TLS_TLS | TLS_LD))
4655 relocation = 1;
4656 bfd_put_32 (output_bfd, relocation,
4657 htab->got->contents + off);
4658 }
4659 }
4660
4661 if (off >= (bfd_vma) -2)
4662 abort ();
4663
4664 relocation = htab->got->output_offset + off - 4;
4665
4666 /* Addends on got relocations don't make much sense.
4667 x+off@got is actually x@got+off, and since the got is
4668 generated by a hash table traversal, the value in the
4669 got at entry m+n bears little relation to the entry m. */
4670 if (addend != 0)
4671 (*_bfd_error_handler)
4672 (_("%s(%s+0x%lx): non-zero addend on got reloc against `%s'"),
4673 bfd_archive_filename (input_bfd),
4674 bfd_get_section_name (input_bfd, input_section),
4675 (long) rel->r_offset,
4676 sym_name);
4677 }
4678 break;
4679
252b5132 4680 /* Relocations that need no special processing. */
7619e7c7 4681 case R_PPC_LOCAL24PC:
252b5132
RH
4682 /* It makes no sense to point a local relocation
4683 at a symbol not in this object. */
4684 if (h != NULL
4685 && (h->root.type == bfd_link_hash_defined
4686 || h->root.type == bfd_link_hash_defweak)
4687 && sec->output_section == NULL)
4688 {
464e1740
ILT
4689 if (! (*info->callbacks->undefined_symbol) (info,
4690 h->root.root.string,
4691 input_bfd,
4692 input_section,
5cc7c785 4693 rel->r_offset,
b34976b6
AM
4694 TRUE))
4695 return FALSE;
252b5132
RH
4696 continue;
4697 }
4698 break;
4699
7619e7c7
AM
4700 case R_PPC_DTPREL16:
4701 case R_PPC_DTPREL16_LO:
4702 case R_PPC_DTPREL16_HI:
4703 case R_PPC_DTPREL16_HA:
4704 addend -= htab->tls_sec->vma + DTP_OFFSET;
4705 break;
4706
252b5132
RH
4707 /* Relocations that may need to be propagated if this is a shared
4708 object. */
7619e7c7
AM
4709 case R_PPC_TPREL16:
4710 case R_PPC_TPREL16_LO:
4711 case R_PPC_TPREL16_HI:
4712 case R_PPC_TPREL16_HA:
4713 addend -= htab->tls_sec->vma + TP_OFFSET;
4714 /* The TPREL16 relocs shouldn't really be used in shared
4715 libs as they will result in DT_TEXTREL being set, but
4716 support them anyway. */
4717 goto dodyn;
4718
4719 case R_PPC_TPREL32:
4720 addend -= htab->tls_sec->vma + TP_OFFSET;
4721 goto dodyn;
4722
4723 case R_PPC_DTPREL32:
4724 addend -= htab->tls_sec->vma + DTP_OFFSET;
4725 goto dodyn;
4726
4727 case R_PPC_REL24:
4728 case R_PPC_REL32:
4729 case R_PPC_REL14:
4730 case R_PPC_REL14_BRTAKEN:
4731 case R_PPC_REL14_BRNTAKEN:
252b5132
RH
4732 /* If these relocations are not to a named symbol, they can be
4733 handled right here, no need to bother the dynamic linker. */
4734 if (h == NULL
e1e0340b
GK
4735 || strcmp (h->root.root.string, "_GLOBAL_OFFSET_TABLE_") == 0
4736 || SYMBOL_REFERENCES_LOCAL (info, h))
252b5132
RH
4737 break;
4738 /* fall through */
4739
4740 /* Relocations that always need to be propagated if this is a shared
4741 object. */
7619e7c7
AM
4742 case R_PPC_ADDR32:
4743 case R_PPC_ADDR24:
4744 case R_PPC_ADDR16:
4745 case R_PPC_ADDR16_LO:
4746 case R_PPC_ADDR16_HI:
4747 case R_PPC_ADDR16_HA:
4748 case R_PPC_ADDR14:
4749 case R_PPC_ADDR14_BRTAKEN:
4750 case R_PPC_ADDR14_BRNTAKEN:
4751 case R_PPC_UADDR32:
4752 case R_PPC_UADDR16:
4753 case R_PPC_DTPMOD32:
4754 dodyn:
ec338859 4755 if (info->shared && r_symndx != 0)
252b5132 4756 {
0bb2d96a 4757 int skip;
252b5132
RH
4758
4759#ifdef DEBUG
4760 fprintf (stderr, "ppc_elf_relocate_section need to create relocation for %s\n",
4761 (h && h->root.root.string) ? h->root.root.string : "<unknown>");
4762#endif
4763
4764 /* When generating a shared object, these relocations
4765 are copied into the output file to be resolved at run
4766 time. */
252b5132
RH
4767 if (sreloc == NULL)
4768 {
4769 const char *name;
4770
4771 name = (bfd_elf_string_from_elf_section
4772 (input_bfd,
4773 elf_elfheader (input_bfd)->e_shstrndx,
4774 elf_section_data (input_section)->rel_hdr.sh_name));
4775 if (name == NULL)
b34976b6 4776 return FALSE;
252b5132
RH
4777
4778 BFD_ASSERT (strncmp (name, ".rela", 5) == 0
4779 && strcmp (bfd_get_section_name (input_bfd,
4780 input_section),
4781 name + 5) == 0);
4782
7619e7c7 4783 sreloc = bfd_get_section_by_name (htab->elf.dynobj, name);
252b5132
RH
4784 BFD_ASSERT (sreloc != NULL);
4785 }
4786
0bb2d96a 4787 skip = 0;
252b5132 4788
c629eae0
JJ
4789 outrel.r_offset =
4790 _bfd_elf_section_offset (output_bfd, info, input_section,
4791 rel->r_offset);
0bb2d96a
JJ
4792 if (outrel.r_offset == (bfd_vma) -1
4793 || outrel.r_offset == (bfd_vma) -2)
4794 skip = (int) outrel.r_offset;
252b5132
RH
4795 outrel.r_offset += (input_section->output_section->vma
4796 + input_section->output_offset);
4797
4798 if (skip)
4799 memset (&outrel, 0, sizeof outrel);
4800 /* h->dynindx may be -1 if this symbol was marked to
4801 become local. */
e1e0340b 4802 else if (! will_become_local)
252b5132 4803 {
7619e7c7 4804 unresolved_reloc = FALSE;
252b5132
RH
4805 outrel.r_info = ELF32_R_INFO (h->dynindx, r_type);
4806 outrel.r_addend = rel->r_addend;
4807 }
4808 else
4809 {
47388f4c
AM
4810 outrel.r_addend = relocation + rel->r_addend;
4811
252b5132 4812 if (r_type == R_PPC_ADDR32)
47388f4c 4813 outrel.r_info = ELF32_R_INFO (0, R_PPC_RELATIVE);
252b5132
RH
4814 else
4815 {
4816 long indx;
4817
4818 if (h == NULL)
4819 sec = local_sections[r_symndx];
4820 else
4821 {
4822 BFD_ASSERT (h->root.type == bfd_link_hash_defined
4823 || (h->root.type
4824 == bfd_link_hash_defweak));
4825 sec = h->root.u.def.section;
4826 }
47388f4c
AM
4827
4828 if (bfd_is_abs_section (sec))
252b5132
RH
4829 indx = 0;
4830 else if (sec == NULL || sec->owner == NULL)
4831 {
4832 bfd_set_error (bfd_error_bad_value);
b34976b6 4833 return FALSE;
252b5132
RH
4834 }
4835 else
4836 {
4837 asection *osec;
4838
47388f4c
AM
4839 /* We are turning this relocation into one
4840 against a section symbol. It would be
4841 proper to subtract the symbol's value,
4842 osec->vma, from the emitted reloc addend,
4843 but ld.so expects buggy relocs. */
252b5132
RH
4844 osec = sec->output_section;
4845 indx = elf_section_data (osec)->dynindx;
8da6118f 4846 BFD_ASSERT (indx > 0);
252b5132
RH
4847#ifdef DEBUG
4848 if (indx <= 0)
4849 {
c3668558 4850 printf ("indx=%d section=%s flags=%08x name=%s\n",
252b5132
RH
4851 indx, osec->name, osec->flags,
4852 h->root.root.string);
4853 }
4854#endif
4855 }
4856
4857 outrel.r_info = ELF32_R_INFO (indx, r_type);
252b5132
RH
4858 }
4859 }
4860
947216bf
AM
4861 loc = sreloc->contents;
4862 loc += sreloc->reloc_count++ * sizeof (Elf32_External_Rela);
4863 bfd_elf32_swap_reloca_out (output_bfd, &outrel, loc);
252b5132 4864
2243deae 4865 if (skip == -1)
252b5132 4866 continue;
2243deae
L
4867
4868 /* This reloc will be computed at runtime. We clear the memory
4869 so that it contains predictable value. */
4870 if (! skip
4871 && ((input_section->flags & SEC_ALLOC) != 0
4872 || ELF32_R_TYPE (outrel.r_info) != R_PPC_RELATIVE))
4873 {
4874 relocation = howto->pc_relative ? outrel.r_offset : 0;
4875 addend = 0;
4876 break;
4877 }
252b5132 4878 }
252b5132
RH
4879 break;
4880
ae9a127f 4881 /* Indirect .sdata relocation. */
7619e7c7
AM
4882 case R_PPC_EMB_SDAI16:
4883 BFD_ASSERT (htab->sdata != NULL);
4884 relocation
4885 = bfd_elf32_finish_pointer_linker_section (output_bfd, input_bfd,
4886 info, htab->sdata, h,
4887 relocation, rel,
4888 R_PPC_RELATIVE);
252b5132
RH
4889 break;
4890
ae9a127f 4891 /* Indirect .sdata2 relocation. */
7619e7c7
AM
4892 case R_PPC_EMB_SDA2I16:
4893 BFD_ASSERT (htab->sdata2 != NULL);
4894 relocation
4895 = bfd_elf32_finish_pointer_linker_section (output_bfd, input_bfd,
4896 info, htab->sdata2, h,
4897 relocation, rel,
4898 R_PPC_RELATIVE);
252b5132
RH
4899 break;
4900
4901 /* Handle the TOC16 reloc. We want to use the offset within the .got
4902 section, not the actual VMA. This is appropriate when generating
4903 an embedded ELF object, for which the .got section acts like the
4904 AIX .toc section. */
7619e7c7 4905 case R_PPC_TOC16: /* phony GOT16 relocations */
8da6118f 4906 BFD_ASSERT (sec != (asection *) 0);
252b5132
RH
4907 BFD_ASSERT (bfd_is_und_section (sec)
4908 || strcmp (bfd_get_section_name (abfd, sec), ".got") == 0
4909 || strcmp (bfd_get_section_name (abfd, sec), ".cgot") == 0)
4910
4911 addend -= sec->output_section->vma + sec->output_offset + 0x8000;
4912 break;
4913
7619e7c7 4914 case R_PPC_PLTREL24:
252b5132
RH
4915 /* Relocation is to the entry for this symbol in the
4916 procedure linkage table. */
4917 BFD_ASSERT (h != NULL);
4918
4919 if (h->plt.offset == (bfd_vma) -1
7619e7c7 4920 || htab->plt == NULL)
252b5132
RH
4921 {
4922 /* We didn't make a PLT entry for this symbol. This
4923 happens when statically linking PIC code, or when
4924 using -Bsymbolic. */
4925 break;
4926 }
4927
7619e7c7
AM
4928 unresolved_reloc = FALSE;
4929 relocation = (htab->plt->output_section->vma
4930 + htab->plt->output_offset
252b5132 4931 + h->plt.offset);
8da6118f 4932 break;
252b5132 4933
ae9a127f 4934 /* Relocate against _SDA_BASE_. */
7619e7c7 4935 case R_PPC_SDAREL16:
252b5132
RH
4936 {
4937 const char *name;
7619e7c7 4938 const struct elf_link_hash_entry *sh;
252b5132 4939
8da6118f 4940 BFD_ASSERT (sec != (asection *) 0);
252b5132 4941 name = bfd_get_section_name (abfd, sec->output_section);
5f819128
AM
4942 if (! ((strncmp (name, ".sdata", 6) == 0
4943 && (name[6] == 0 || name[6] == '.'))
4944 || (strncmp (name, ".sbss", 5) == 0
4945 && (name[5] == 0 || name[5] == '.'))))
252b5132
RH
4946 {
4947 (*_bfd_error_handler) (_("%s: The target (%s) of a %s relocation is in the wrong output section (%s)"),
8f615d07 4948 bfd_archive_filename (input_bfd),
252b5132 4949 sym_name,
7619e7c7 4950 howto->name,
252b5132
RH
4951 name);
4952 }
7619e7c7
AM
4953 sh = htab->sdata->sym_hash;
4954 addend -= (sh->root.u.def.value
4955 + sh->root.u.def.section->output_section->vma
4956 + sh->root.u.def.section->output_offset);
252b5132
RH
4957 }
4958 break;
4959
7619e7c7
AM
4960 /* Relocate against _SDA2_BASE_. */
4961 case R_PPC_EMB_SDA2REL:
252b5132
RH
4962 {
4963 const char *name;
7619e7c7 4964 const struct elf_link_hash_entry *sh;
252b5132 4965
8da6118f 4966 BFD_ASSERT (sec != (asection *) 0);
252b5132 4967 name = bfd_get_section_name (abfd, sec->output_section);
5f819128
AM
4968 if (! (strncmp (name, ".sdata2", 7) == 0
4969 || strncmp (name, ".sbss2", 6) == 0))
252b5132
RH
4970 {
4971 (*_bfd_error_handler) (_("%s: The target (%s) of a %s relocation is in the wrong output section (%s)"),
8f615d07 4972 bfd_archive_filename (input_bfd),
252b5132 4973 sym_name,
7619e7c7 4974 howto->name,
252b5132 4975 name);
c3668558 4976
252b5132 4977 bfd_set_error (bfd_error_bad_value);
b34976b6 4978 ret = FALSE;
252b5132
RH
4979 continue;
4980 }
7619e7c7
AM
4981 sh = htab->sdata2->sym_hash;
4982 addend -= (sh->root.u.def.value
4983 + sh->root.u.def.section->output_section->vma
4984 + sh->root.u.def.section->output_offset);
252b5132
RH
4985 }
4986 break;
4987
ae9a127f 4988 /* Relocate against either _SDA_BASE_, _SDA2_BASE_, or 0. */
7619e7c7
AM
4989 case R_PPC_EMB_SDA21:
4990 case R_PPC_EMB_RELSDA:
252b5132
RH
4991 {
4992 const char *name;
7619e7c7 4993 const struct elf_link_hash_entry *sh;
252b5132
RH
4994 int reg;
4995
8da6118f 4996 BFD_ASSERT (sec != (asection *) 0);
252b5132 4997 name = bfd_get_section_name (abfd, sec->output_section);
b34976b6 4998 if (((strncmp (name, ".sdata", 6) == 0
5f819128
AM
4999 && (name[6] == 0 || name[6] == '.'))
5000 || (strncmp (name, ".sbss", 5) == 0
5001 && (name[5] == 0 || name[5] == '.'))))
252b5132
RH
5002 {
5003 reg = 13;
7619e7c7
AM
5004 sh = htab->sdata->sym_hash;
5005 addend -= (sh->root.u.def.value
5006 + sh->root.u.def.section->output_section->vma
5007 + sh->root.u.def.section->output_offset);
252b5132
RH
5008 }
5009
5f819128
AM
5010 else if (strncmp (name, ".sdata2", 7) == 0
5011 || strncmp (name, ".sbss2", 6) == 0)
252b5132
RH
5012 {
5013 reg = 2;
7619e7c7
AM
5014 sh = htab->sdata2->sym_hash;
5015 addend -= (sh->root.u.def.value
5016 + sh->root.u.def.section->output_section->vma
5017 + sh->root.u.def.section->output_offset);
252b5132
RH
5018 }
5019
8da6118f
KH
5020 else if (strcmp (name, ".PPC.EMB.sdata0") == 0
5021 || strcmp (name, ".PPC.EMB.sbss0") == 0)
252b5132
RH
5022 {
5023 reg = 0;
5024 }
5025
5026 else
5027 {
5028 (*_bfd_error_handler) (_("%s: The target (%s) of a %s relocation is in the wrong output section (%s)"),
8f615d07 5029 bfd_archive_filename (input_bfd),
252b5132 5030 sym_name,
7619e7c7 5031 howto->name,
252b5132
RH
5032 name);
5033
5034 bfd_set_error (bfd_error_bad_value);
b34976b6 5035 ret = FALSE;
252b5132
RH
5036 continue;
5037 }
5038
5039 if (r_type == R_PPC_EMB_SDA21)
5040 { /* fill in register field */
7619e7c7 5041 insn = bfd_get_32 (output_bfd, contents + rel->r_offset);
252b5132 5042 insn = (insn & ~RA_REGISTER_MASK) | (reg << RA_REGISTER_SHIFT);
7619e7c7 5043 bfd_put_32 (output_bfd, insn, contents + rel->r_offset);
252b5132
RH
5044 }
5045 }
5046 break;
5047
ae9a127f 5048 /* Relocate against the beginning of the section. */
7619e7c7
AM
5049 case R_PPC_SECTOFF:
5050 case R_PPC_SECTOFF_LO:
5051 case R_PPC_SECTOFF_HI:
5052 case R_PPC_SECTOFF_HA:
8da6118f 5053 BFD_ASSERT (sec != (asection *) 0);
252b5132 5054 addend -= sec->output_section->vma;
252b5132
RH
5055 break;
5056
7619e7c7
AM
5057 /* Negative relocations. */
5058 case R_PPC_EMB_NADDR32:
5059 case R_PPC_EMB_NADDR16:
5060 case R_PPC_EMB_NADDR16_LO:
5061 case R_PPC_EMB_NADDR16_HI:
5062 case R_PPC_EMB_NADDR16_HA:
8da6118f 5063 addend -= 2 * relocation;
252b5132
RH
5064 break;
5065
7619e7c7
AM
5066 case R_PPC_COPY:
5067 case R_PPC_GLOB_DAT:
5068 case R_PPC_JMP_SLOT:
5069 case R_PPC_RELATIVE:
5070 case R_PPC_PLT32:
5071 case R_PPC_PLTREL32:
5072 case R_PPC_PLT16_LO:
5073 case R_PPC_PLT16_HI:
5074 case R_PPC_PLT16_HA:
5075 case R_PPC_ADDR30:
5076 case R_PPC_EMB_RELSEC16:
5077 case R_PPC_EMB_RELST_LO:
5078 case R_PPC_EMB_RELST_HI:
5079 case R_PPC_EMB_RELST_HA:
5080 case R_PPC_EMB_BIT_FLD:
5081 (*_bfd_error_handler)
5082 (_("%s: Relocation %s is not yet supported for symbol %s."),
5083 bfd_archive_filename (input_bfd),
5084 howto->name,
5085 sym_name);
252b5132
RH
5086
5087 bfd_set_error (bfd_error_invalid_operation);
b34976b6 5088 ret = FALSE;
252b5132 5089 continue;
7619e7c7 5090 }
252b5132 5091
7619e7c7
AM
5092 /* Do any further special processing. */
5093 switch (r_type)
5094 {
5095 default:
5096 break;
5097
5098 case R_PPC_ADDR16_HA:
5099 case R_PPC_GOT16_HA:
5100 case R_PPC_PLT16_HA:
5101 case R_PPC_SECTOFF_HA:
5102 case R_PPC_TPREL16_HA:
5103 case R_PPC_DTPREL16_HA:
5104 case R_PPC_GOT_TLSGD16_HA:
5105 case R_PPC_GOT_TLSLD16_HA:
5106 case R_PPC_GOT_TPREL16_HA:
5107 case R_PPC_GOT_DTPREL16_HA:
5108 case R_PPC_EMB_NADDR16_HA:
5109 case R_PPC_EMB_RELST_HA:
5110 /* It's just possible that this symbol is a weak symbol
5111 that's not actually defined anywhere. In that case,
5112 'sec' would be NULL, and we should leave the symbol
5113 alone (it will be set to zero elsewhere in the link). */
5114 if (sec != NULL)
5115 /* Add 0x10000 if sign bit in 0:15 is set. */
5116 addend += ((relocation + addend) & 0x8000) << 1;
5117 break;
252b5132
RH
5118 }
5119
252b5132
RH
5120#ifdef DEBUG
5121 fprintf (stderr, "\ttype = %s (%d), name = %s, symbol index = %ld, offset = %ld, addend = %ld\n",
5122 howto->name,
8da6118f 5123 (int) r_type,
252b5132
RH
5124 sym_name,
5125 r_symndx,
7619e7c7 5126 (long) rel->r_offset,
8da6118f 5127 (long) addend);
252b5132
RH
5128#endif
5129
7619e7c7
AM
5130 if (unresolved_reloc
5131 && !((input_section->flags & SEC_DEBUGGING) != 0
5132 && (h->elf_link_hash_flags & ELF_LINK_HASH_DEF_DYNAMIC) != 0))
5133 {
5134 (*_bfd_error_handler)
5135 (_("%s(%s+0x%lx): unresolvable relocation against symbol `%s'"),
5136 bfd_archive_filename (input_bfd),
5137 bfd_get_section_name (input_bfd, input_section),
5138 (long) rel->r_offset,
5139 sym_name);
5140 ret = FALSE;
5141 }
5142
252b5132
RH
5143 r = _bfd_final_link_relocate (howto,
5144 input_bfd,
5145 input_section,
5146 contents,
7619e7c7 5147 rel->r_offset,
252b5132
RH
5148 relocation,
5149 addend);
5150
7619e7c7 5151 if (r != bfd_reloc_ok)
252b5132 5152 {
7619e7c7
AM
5153 if (sym_name == NULL)
5154 sym_name = "(null)";
5155 if (r == bfd_reloc_overflow)
252b5132 5156 {
7619e7c7
AM
5157 if (warned)
5158 continue;
5159 if (h != NULL
5160 && h->root.type == bfd_link_hash_undefweak
dc1bc0c9
RH
5161 && howto->pc_relative)
5162 {
5163 /* Assume this is a call protected by other code that
5164 detect the symbol is undefined. If this is the case,
5165 we can safely ignore the overflow. If not, the
5166 program is hosed anyway, and a little warning isn't
5167 going to help. */
252b5132 5168
dc1bc0c9
RH
5169 continue;
5170 }
252b5132 5171
7619e7c7
AM
5172 if (! (*info->callbacks->reloc_overflow) (info,
5173 sym_name,
5174 howto->name,
5175 rel->r_addend,
5176 input_bfd,
5177 input_section,
5178 rel->r_offset))
5179 return FALSE;
dc1bc0c9
RH
5180 }
5181 else
5182 {
7619e7c7
AM
5183 (*_bfd_error_handler)
5184 (_("%s(%s+0x%lx): reloc against `%s': error %d"),
5185 bfd_archive_filename (input_bfd),
5186 bfd_get_section_name (input_bfd, input_section),
5187 (long) rel->r_offset, sym_name, (int) r);
5188 ret = FALSE;
252b5132
RH
5189 }
5190 }
5191 }
5192
252b5132
RH
5193#ifdef DEBUG
5194 fprintf (stderr, "\n");
5195#endif
5196
5197 return ret;
5198}
29c2fb7c
AJ
5199
5200static enum elf_reloc_type_class
f51e552e
AM
5201ppc_elf_reloc_type_class (rela)
5202 const Elf_Internal_Rela *rela;
29c2fb7c 5203{
f51e552e 5204 switch ((int) ELF32_R_TYPE (rela->r_info))
29c2fb7c
AJ
5205 {
5206 case R_PPC_RELATIVE:
5207 return reloc_class_relative;
5208 case R_PPC_REL24:
5209 case R_PPC_ADDR24:
5210 case R_PPC_JMP_SLOT:
5211 return reloc_class_plt;
5212 case R_PPC_COPY:
5213 return reloc_class_copy;
5214 default:
5215 return reloc_class_normal;
5216 }
5217}
252b5132 5218\f
ae9a127f
NC
5219/* Support for core dump NOTE sections. */
5220
b34976b6 5221static bfd_boolean
c5fccbec
DJ
5222ppc_elf_grok_prstatus (abfd, note)
5223 bfd *abfd;
5224 Elf_Internal_Note *note;
5225{
5226 int offset;
dc810e39 5227 unsigned int raw_size;
c5fccbec
DJ
5228
5229 switch (note->descsz)
5230 {
5231 default:
b34976b6 5232 return FALSE;
c5fccbec 5233
ae9a127f 5234 case 268: /* Linux/PPC. */
c5fccbec
DJ
5235 /* pr_cursig */
5236 elf_tdata (abfd)->core_signal = bfd_get_16 (abfd, note->descdata + 12);
5237
5238 /* pr_pid */
5239 elf_tdata (abfd)->core_pid = bfd_get_32 (abfd, note->descdata + 24);
5240
5241 /* pr_reg */
5242 offset = 72;
5243 raw_size = 192;
5244
5245 break;
5246 }
5247
5248 /* Make a ".reg/999" section. */
5249 return _bfd_elfcore_make_pseudosection (abfd, ".reg",
5250 raw_size, note->descpos + offset);
5251}
5252
b34976b6 5253static bfd_boolean
c5fccbec
DJ
5254ppc_elf_grok_psinfo (abfd, note)
5255 bfd *abfd;
5256 Elf_Internal_Note *note;
5257{
5258 switch (note->descsz)
5259 {
5260 default:
b34976b6 5261 return FALSE;
c5fccbec 5262
ae9a127f 5263 case 128: /* Linux/PPC elf_prpsinfo. */
c5fccbec
DJ
5264 elf_tdata (abfd)->core_program
5265 = _bfd_elfcore_strndup (abfd, note->descdata + 32, 16);
5266 elf_tdata (abfd)->core_command
5267 = _bfd_elfcore_strndup (abfd, note->descdata + 48, 80);
5268 }
5269
5270 /* Note that for some reason, a spurious space is tacked
5271 onto the end of the args in some (at least one anyway)
5272 implementations, so strip it off if it exists. */
5273
5274 {
5275 char *command = elf_tdata (abfd)->core_command;
5276 int n = strlen (command);
5277
5278 if (0 < n && command[n - 1] == ' ')
5279 command[n - 1] = '\0';
5280 }
5281
b34976b6 5282 return TRUE;
c5fccbec
DJ
5283}
5284\f
e1a9cb8e
NC
5285/* Very simple linked list structure for recording apuinfo values. */
5286typedef struct apuinfo_list
5287{
5288 struct apuinfo_list * next;
5289 unsigned long value;
5290}
5291apuinfo_list;
5292
5293static apuinfo_list * head;
5294
5295static void apuinfo_list_init PARAMS ((void));
5296static void apuinfo_list_add PARAMS ((unsigned long));
5297static unsigned apuinfo_list_length PARAMS ((void));
5298static unsigned long apuinfo_list_element PARAMS ((unsigned long));
5299static void apuinfo_list_finish PARAMS ((void));
5300
5301extern void ppc_elf_begin_write_processing
5302 PARAMS ((bfd *, struct bfd_link_info *));
5303extern void ppc_elf_final_write_processing
5304 PARAMS ((bfd *, bfd_boolean));
5305extern bfd_boolean ppc_elf_write_section
5306 PARAMS ((bfd *, asection *, bfd_byte *));
5307
5308
5309
5310static void
5311apuinfo_list_init PARAMS ((void))
5312{
5313 head = NULL;
5314}
5315
5316static void
5317apuinfo_list_add (value)
5318 unsigned long value;
5319{
5320 apuinfo_list * entry = head;
5321
5322 while (entry != NULL)
5323 {
5324 if (entry->value == value)
5325 return;
5326 entry = entry->next;
5327 }
5328
5329 entry = bfd_malloc (sizeof (* entry));
5330 if (entry == NULL)
5331 return;
5332
5333 entry->value = value;
5334 entry->next = head;
5335 head = entry;
5336}
5337
5338static unsigned
5339apuinfo_list_length PARAMS ((void))
5340{
5341 apuinfo_list * entry;
5342 unsigned long count;
5343
5344 for (entry = head, count = 0;
5345 entry;
5346 entry = entry->next)
5347 ++ count;
5348
5349 return count;
5350}
5351
5352static inline unsigned long
5353apuinfo_list_element (number)
5354 unsigned long number;
5355{
5356 apuinfo_list * entry;
5357
5358 for (entry = head;
5359 entry && number --;
5360 entry = entry->next)
5361 ;
5362
5363 return entry ? entry->value : 0;
5364}
5365
5366static void
5367apuinfo_list_finish PARAMS ((void))
5368{
5369 apuinfo_list * entry;
5370
5371 for (entry = head; entry;)
5372 {
5373 apuinfo_list * next = entry->next;
5374 free (entry);
5375 entry = next;
5376 }
5377
5378 head = NULL;
5379}
5380
5381#define APUINFO_SECTION_NAME ".PPC.EMB.apuinfo"
5382#define APUINFO_LABEL "APUinfo"
5383
5384/* Scan the input BFDs and create a linked list of
5385 the APUinfo values that will need to be emitted. */
5386
5387void
5388ppc_elf_begin_write_processing (abfd, link_info)
5389 bfd *abfd;
5390 struct bfd_link_info *link_info;
5391{
5392 bfd * ibfd;
5393 asection * asec;
5394 char * buffer;
5395 unsigned num_input_sections;
5396 bfd_size_type output_section_size;
5397 unsigned i;
5398 unsigned num_entries;
5399 unsigned long offset;
5400 unsigned long length;
5401 const char * error_message = NULL;
5402
6b0817e5
NC
5403 if (link_info == NULL)
5404 return;
5405
e1a9cb8e
NC
5406 /* Scan the input bfds, looking for apuinfo sections. */
5407 num_input_sections = 0;
5408 output_section_size = 0;
5409
5410 for (ibfd = link_info->input_bfds; ibfd; ibfd = ibfd->link_next)
5411 {
5412 asec = bfd_get_section_by_name (ibfd, APUINFO_SECTION_NAME);
5413 if (asec)
5414 {
5415 ++ num_input_sections;
5416 output_section_size += asec->_raw_size;
5417 }
5418 }
5419
5420 /* We need at least one input sections
5421 in order to make merging worthwhile. */
5422 if (num_input_sections < 1)
5423 return;
5424
5425 /* Just make sure that the output section exists as well. */
5426 asec = bfd_get_section_by_name (abfd, APUINFO_SECTION_NAME);
5427 if (asec == NULL)
5428 return;
5429
5430 /* Allocate a buffer for the contents of the input sections. */
5431 buffer = bfd_malloc (output_section_size);
5432 if (buffer == NULL)
5433 return;
5434
5435 offset = 0;
5436 apuinfo_list_init ();
5437
5438 /* Read in the input sections contents. */
5439 for (ibfd = link_info->input_bfds; ibfd; ibfd = ibfd->link_next)
5440 {
5441 unsigned long datum;
5442 char * ptr;
5443
86bbe32f 5444
e1a9cb8e
NC
5445 asec = bfd_get_section_by_name (ibfd, APUINFO_SECTION_NAME);
5446 if (asec == NULL)
5447 continue;
5448
5449 length = asec->_raw_size;
5450 if (length < 24)
5451 {
5452 error_message = _("corrupt or empty %s section in %s");
5453 goto fail;
5454 }
86bbe32f 5455
e1a9cb8e
NC
5456 if (bfd_seek (ibfd, asec->filepos, SEEK_SET) != 0
5457 || (bfd_bread (buffer + offset, length, ibfd) != length))
5458 {
5459 error_message = _("unable to read in %s section from %s");
5460 goto fail;
5461 }
5462
5463 /* Process the contents of the section. */
5464 ptr = buffer + offset;
5465 error_message = _("corrupt %s section in %s");
5466
5467 /* Verify the contents of the header. Note - we have to
5468 extract the values this way in order to allow for a
5469 host whose endian-ness is different from the target. */
5470 datum = bfd_get_32 (ibfd, ptr);
5471 if (datum != sizeof APUINFO_LABEL)
5472 goto fail;
5473
5474 datum = bfd_get_32 (ibfd, ptr + 8);
5475 if (datum != 0x2)
5476 goto fail;
5477
5478 if (strcmp (ptr + 12, APUINFO_LABEL) != 0)
5479 goto fail;
5480
5481 /* Get the number of apuinfo entries. */
5482 datum = bfd_get_32 (ibfd, ptr + 4);
5483 if ((datum * 4 + 20) != length)
5484 goto fail;
5485
5486 /* Make sure that we do not run off the end of the section. */
5487 if (offset + length > output_section_size)
5488 goto fail;
5489
5490 /* Scan the apuinfo section, building a list of apuinfo numbers. */
5491 for (i = 0; i < datum; i++)
5492 apuinfo_list_add (bfd_get_32 (ibfd, ptr + 20 + (i * 4)));
5493
5494 /* Update the offset. */
5495 offset += length;
5496 }
5497
5498 error_message = NULL;
5499
5500 /* Compute the size of the output section. */
5501 num_entries = apuinfo_list_length ();
5502 output_section_size = 20 + num_entries * 4;
5503
5504 asec = bfd_get_section_by_name (abfd, APUINFO_SECTION_NAME);
5505
5506 if (! bfd_set_section_size (abfd, asec, output_section_size))
5507 ibfd = abfd,
5508 error_message = _("warning: unable to set size of %s section in %s");
86bbe32f 5509
e1a9cb8e
NC
5510 fail:
5511 free (buffer);
5512
5513 if (error_message)
5514 _bfd_error_handler (error_message, APUINFO_SECTION_NAME,
5515 bfd_archive_filename (ibfd));
5516}
5517
5518
5519/* Prevent the output section from accumulating the input sections'
5520 contents. We have already stored this in our linked list structure. */
5521
5522bfd_boolean
5523ppc_elf_write_section (abfd, asec, contents)
5524 bfd * abfd ATTRIBUTE_UNUSED;
5525 asection * asec;
5526 bfd_byte * contents ATTRIBUTE_UNUSED;
5527{
6b0817e5 5528 return apuinfo_list_length () && strcmp (asec->name, APUINFO_SECTION_NAME) == 0;
e1a9cb8e
NC
5529}
5530
5531
5532/* Finally we can generate the output section. */
5533
5534void
5535ppc_elf_final_write_processing (abfd, linker)
5536 bfd * abfd;
5537 bfd_boolean linker ATTRIBUTE_UNUSED;
5538{
5539 bfd_byte * buffer;
5540 asection * asec;
5541 unsigned i;
5542 unsigned num_entries;
5543 bfd_size_type length;
5544
5545 asec = bfd_get_section_by_name (abfd, APUINFO_SECTION_NAME);
5546 if (asec == NULL)
5547 return;
5548
6b0817e5
NC
5549 if (apuinfo_list_length () == 0)
5550 return;
5551
e1a9cb8e
NC
5552 length = asec->_raw_size;
5553 if (length < 20)
5554 return;
5555
5556 buffer = bfd_malloc (length);
5557 if (buffer == NULL)
5558 {
5559 _bfd_error_handler (_("failed to allocate space for new APUinfo section."));
5560 return;
5561 }
5562
5563 /* Create the apuinfo header. */
5564 num_entries = apuinfo_list_length ();
5565 bfd_put_32 (abfd, sizeof APUINFO_LABEL, buffer);
5566 bfd_put_32 (abfd, num_entries, buffer + 4);
5567 bfd_put_32 (abfd, 0x2, buffer + 8);
5568 strcpy (buffer + 12, APUINFO_LABEL);
86bbe32f 5569
e1a9cb8e
NC
5570 length = 20;
5571 for (i = 0; i < num_entries; i++)
5572 {
5573 bfd_put_32 (abfd, apuinfo_list_element (i), buffer + length);
5574 length += 4;
5575 }
5576
5577 if (length != asec->_raw_size)
5578 _bfd_error_handler (_("failed to compute new APUinfo section."));
86bbe32f 5579
e1a9cb8e
NC
5580 if (! bfd_set_section_contents (abfd, asec, buffer, (file_ptr) 0, length))
5581 _bfd_error_handler (_("failed to install new APUinfo section."));
86bbe32f 5582
e1a9cb8e
NC
5583 free (buffer);
5584
5585 apuinfo_list_finish ();
5586}
5587\f
252b5132
RH
5588#define TARGET_LITTLE_SYM bfd_elf32_powerpcle_vec
5589#define TARGET_LITTLE_NAME "elf32-powerpcle"
5590#define TARGET_BIG_SYM bfd_elf32_powerpc_vec
5591#define TARGET_BIG_NAME "elf32-powerpc"
5592#define ELF_ARCH bfd_arch_powerpc
5593#define ELF_MACHINE_CODE EM_PPC
5594#define ELF_MAXPAGESIZE 0x10000
5595#define elf_info_to_howto ppc_elf_info_to_howto
5596
5597#ifdef EM_CYGNUS_POWERPC
5598#define ELF_MACHINE_ALT1 EM_CYGNUS_POWERPC
5599#endif
5600
5601#ifdef EM_PPC_OLD
5602#define ELF_MACHINE_ALT2 EM_PPC_OLD
5603#endif
5604
5605#define elf_backend_plt_not_loaded 1
5606#define elf_backend_got_symbol_offset 4
5607#define elf_backend_can_gc_sections 1
51b64d56 5608#define elf_backend_can_refcount 1
252b5132
RH
5609#define elf_backend_got_header_size 12
5610#define elf_backend_plt_header_size PLT_INITIAL_ENTRY_SIZE
b491616a 5611#define elf_backend_rela_normal 1
252b5132 5612
252b5132
RH
5613#define bfd_elf32_bfd_merge_private_bfd_data ppc_elf_merge_private_bfd_data
5614#define bfd_elf32_bfd_relax_section ppc_elf_relax_section
5615#define bfd_elf32_bfd_reloc_type_lookup ppc_elf_reloc_type_lookup
5616#define bfd_elf32_bfd_set_private_flags ppc_elf_set_private_flags
7fce784e 5617#define bfd_elf32_bfd_link_hash_table_create ppc_elf_link_hash_table_create
252b5132 5618
feee612b 5619#define elf_backend_object_p ppc_elf_object_p
252b5132
RH
5620#define elf_backend_gc_mark_hook ppc_elf_gc_mark_hook
5621#define elf_backend_gc_sweep_hook ppc_elf_gc_sweep_hook
5622#define elf_backend_section_from_shdr ppc_elf_section_from_shdr
5623#define elf_backend_relocate_section ppc_elf_relocate_section
5624#define elf_backend_create_dynamic_sections ppc_elf_create_dynamic_sections
5625#define elf_backend_check_relocs ppc_elf_check_relocs
7fce784e 5626#define elf_backend_copy_indirect_symbol ppc_elf_copy_indirect_symbol
252b5132
RH
5627#define elf_backend_adjust_dynamic_symbol ppc_elf_adjust_dynamic_symbol
5628#define elf_backend_add_symbol_hook ppc_elf_add_symbol_hook
5629#define elf_backend_size_dynamic_sections ppc_elf_size_dynamic_sections
5630#define elf_backend_finish_dynamic_symbol ppc_elf_finish_dynamic_symbol
5631#define elf_backend_finish_dynamic_sections ppc_elf_finish_dynamic_sections
5632#define elf_backend_fake_sections ppc_elf_fake_sections
5633#define elf_backend_additional_program_headers ppc_elf_additional_program_headers
5634#define elf_backend_modify_segment_map ppc_elf_modify_segment_map
c5fccbec
DJ
5635#define elf_backend_grok_prstatus ppc_elf_grok_prstatus
5636#define elf_backend_grok_psinfo ppc_elf_grok_psinfo
29c2fb7c 5637#define elf_backend_reloc_type_class ppc_elf_reloc_type_class
e1a9cb8e
NC
5638#define elf_backend_begin_write_processing ppc_elf_begin_write_processing
5639#define elf_backend_final_write_processing ppc_elf_final_write_processing
5640#define elf_backend_write_section ppc_elf_write_section
252b5132
RH
5641
5642#include "elf32-target.h"
This page took 0.473273 seconds and 4 git commands to generate.