Use %pI, %pR, %pS, %pT in place of %I, %R, %S and %T.
[deliverable/binutils-gdb.git] / bfd / elf32-ppc.c
CommitLineData
252b5132 1/* PowerPC-specific support for 32-bit ELF
219d1afa 2 Copyright (C) 1994-2018 Free Software Foundation, Inc.
252b5132
RH
3 Written by Ian Lance Taylor, Cygnus Support.
4
ae9a127f 5 This file is part of BFD, the Binary File Descriptor library.
252b5132 6
ae9a127f
NC
7 This program is free software; you can redistribute it and/or modify
8 it under the terms of the GNU General Public License as published by
cd123cb7 9 the Free Software Foundation; either version 3 of the License, or
ae9a127f 10 (at your option) any later version.
252b5132 11
ae9a127f
NC
12 This program is distributed in the hope that it will be useful,
13 but WITHOUT ANY WARRANTY; without even the implied warranty of
14 MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
15 GNU General Public License for more details.
252b5132 16
ae9a127f 17 You should have received a copy of the GNU General Public License
fc0bffd6 18 along with this program; if not, write to the
3e110533 19 Free Software Foundation, Inc., 51 Franklin Street - Fifth Floor,
53e09e0a 20 Boston, MA 02110-1301, USA. */
252b5132 21
cd123cb7 22
252b5132
RH
23/* This file is based on a preliminary PowerPC ELF ABI. The
24 information may not match the final PowerPC ELF ABI. It includes
25 suggestions from the in-progress Embedded PowerPC ABI, and that
26 information may also not match. */
27
3db64b00 28#include "sysdep.h"
183e98be 29#include <stdarg.h>
252b5132 30#include "bfd.h"
252b5132
RH
31#include "bfdlink.h"
32#include "libbfd.h"
33#include "elf-bfd.h"
34#include "elf/ppc.h"
7619e7c7 35#include "elf32-ppc.h"
9d8504b1 36#include "elf-vxworks.h"
6177242a 37#include "dwarf2.h"
08dc996f 38#include "opcode/ppc.h"
252b5132 39
b9c361e0
JL
40typedef enum split16_format_type
41{
42 split16a_type = 0,
43 split16d_type
44}
45split16_format_type;
46
f0fe0e16 47/* RELA relocations are used here. */
252b5132 48
252b5132 49static bfd_reloc_status_type ppc_elf_addr16_ha_reloc
55fd94b0 50 (bfd *, arelent *, asymbol *, void *, asection *, bfd *, char **);
7619e7c7 51static bfd_reloc_status_type ppc_elf_unhandled_reloc
55fd94b0 52 (bfd *, arelent *, asymbol *, void *, asection *, bfd *, char **);
252b5132 53
70bccea4
AM
54/* Branch prediction bit for branch taken relocs. */
55#define BRANCH_PREDICT_BIT 0x200000
56/* Mask to set RA in memory instructions. */
57#define RA_REGISTER_MASK 0x001f0000
58/* Value to shift register by to insert RA. */
59#define RA_REGISTER_SHIFT 16
252b5132
RH
60
61/* The name of the dynamic interpreter. This is put in the .interp
62 section. */
252b5132
RH
63#define ELF_DYNAMIC_INTERPRETER "/usr/lib/ld.so.1"
64
d7128ce4 65/* For old-style PLT. */
252b5132
RH
66/* The number of single-slot PLT entries (the rest use two slots). */
67#define PLT_NUM_SINGLE_ENTRIES 8192
68
d7128ce4 69/* For new-style .glink and .plt. */
a6aa5195 70#define GLINK_PLTRESOLVE 16*4
9e390558 71#define GLINK_ENTRY_SIZE(htab, h) \
407aa07c 72 ((4*4 \
9e390558
AM
73 + (h != NULL \
74 && h == htab->tls_get_addr \
75 && !htab->params->no_tls_get_addr_opt ? 8*4 : 0) \
76 + (1u << htab->params->plt_stub_align) - 1) \
77 & -(1u << htab->params->plt_stub_align))
d7128ce4 78
9d8504b1
PB
79/* VxWorks uses its own plt layout, filled in by the static linker. */
80
81/* The standard VxWorks PLT entry. */
82#define VXWORKS_PLT_ENTRY_SIZE 32
83static const bfd_vma ppc_elf_vxworks_plt_entry
84 [VXWORKS_PLT_ENTRY_SIZE / 4] =
85 {
07d6d2b8
AM
86 0x3d800000, /* lis r12,0 */
87 0x818c0000, /* lwz r12,0(r12) */
88 0x7d8903a6, /* mtctr r12 */
89 0x4e800420, /* bctr */
90 0x39600000, /* li r11,0 */
91 0x48000000, /* b 14 <.PLT0resolve+0x4> */
92 0x60000000, /* nop */
93 0x60000000, /* nop */
9d8504b1
PB
94 };
95static const bfd_vma ppc_elf_vxworks_pic_plt_entry
96 [VXWORKS_PLT_ENTRY_SIZE / 4] =
97 {
98 0x3d9e0000, /* addis r12,r30,0 */
99 0x818c0000, /* lwz r12,0(r12) */
100 0x7d8903a6, /* mtctr r12 */
101 0x4e800420, /* bctr */
102 0x39600000, /* li r11,0 */
103 0x48000000, /* b 14 <.PLT0resolve+0x4> 14: R_PPC_REL24 .PLTresolve */
104 0x60000000, /* nop */
105 0x60000000, /* nop */
106 };
107
108/* The initial VxWorks PLT entry. */
109#define VXWORKS_PLT_INITIAL_ENTRY_SIZE 32
110static const bfd_vma ppc_elf_vxworks_plt0_entry
111 [VXWORKS_PLT_INITIAL_ENTRY_SIZE / 4] =
112 {
07d6d2b8
AM
113 0x3d800000, /* lis r12,0 */
114 0x398c0000, /* addi r12,r12,0 */
115 0x800c0008, /* lwz r0,8(r12) */
116 0x7c0903a6, /* mtctr r0 */
117 0x818c0004, /* lwz r12,4(r12) */
118 0x4e800420, /* bctr */
119 0x60000000, /* nop */
120 0x60000000, /* nop */
9d8504b1
PB
121 };
122static const bfd_vma ppc_elf_vxworks_pic_plt0_entry
123 [VXWORKS_PLT_INITIAL_ENTRY_SIZE / 4] =
124 {
125 0x819e0008, /* lwz r12,8(r30) */
07d6d2b8 126 0x7d8903a6, /* mtctr r12 */
9d8504b1 127 0x819e0004, /* lwz r12,4(r30) */
07d6d2b8
AM
128 0x4e800420, /* bctr */
129 0x60000000, /* nop */
130 0x60000000, /* nop */
131 0x60000000, /* nop */
132 0x60000000, /* nop */
9d8504b1
PB
133 };
134
135/* For executables, we have some additional relocations in
136 .rela.plt.unloaded, for the kernel loader. */
137
138/* The number of non-JMP_SLOT relocations per PLT0 slot. */
139#define VXWORKS_PLT_NON_JMP_SLOT_RELOCS 3
140/* The number of relocations in the PLTResolve slot. */
141#define VXWORKS_PLTRESOLVE_RELOCS 2
de194d85 142/* The number of relocations in the PLTResolve slot when creating
9d8504b1
PB
143 a shared library. */
144#define VXWORKS_PLTRESOLVE_RELOCS_SHLIB 0
145
d7128ce4 146/* Some instructions. */
d7128ce4 147#define ADDIS_11_11 0x3d6b0000
a6aa5195
AM
148#define ADDIS_11_30 0x3d7e0000
149#define ADDIS_12_12 0x3d8c0000
d7128ce4 150#define ADDI_11_11 0x396b0000
d7128ce4 151#define ADD_0_11_11 0x7c0b5a14
a7f2871e 152#define ADD_3_12_2 0x7c6c1214
d7128ce4 153#define ADD_11_0_11 0x7d605a14
a6aa5195 154#define B 0x48000000
da3a2088 155#define BA 0x48000002
a6aa5195 156#define BCL_20_31 0x429f0005
d7128ce4 157#define BCTR 0x4e800420
a7f2871e
AM
158#define BEQLR 0x4d820020
159#define CMPWI_11_0 0x2c0b0000
7e8aeb9a
AM
160#define LIS_11 0x3d600000
161#define LIS_12 0x3d800000
a6aa5195
AM
162#define LWZU_0_12 0x840c0000
163#define LWZ_0_12 0x800c0000
a7f2871e 164#define LWZ_11_3 0x81630000
a6aa5195
AM
165#define LWZ_11_11 0x816b0000
166#define LWZ_11_30 0x817e0000
a7f2871e 167#define LWZ_12_3 0x81830000
a6aa5195 168#define LWZ_12_12 0x818c0000
a7f2871e
AM
169#define MR_0_3 0x7c601b78
170#define MR_3_0 0x7c030378
a6aa5195
AM
171#define MFLR_0 0x7c0802a6
172#define MFLR_12 0x7d8802a6
173#define MTCTR_0 0x7c0903a6
174#define MTCTR_11 0x7d6903a6
175#define MTLR_0 0x7c0803a6
176#define NOP 0x60000000
177#define SUB_11_11_12 0x7d6c5850
7619e7c7
AM
178
179/* Offset of tp and dtp pointers from start of TLS block. */
180#define TP_OFFSET 0x7000
181#define DTP_OFFSET 0x8000
e87d4038
AM
182
183/* The value of a defined global symbol. */
184#define SYM_VAL(SYM) \
185 ((SYM)->root.u.def.section->output_section->vma \
186 + (SYM)->root.u.def.section->output_offset \
187 + (SYM)->root.u.def.value)
7fce784e 188\f
e47cd125 189static reloc_howto_type *ppc_elf_howto_table[R_PPC_max];
252b5132 190
8da6118f 191static reloc_howto_type ppc_elf_howto_raw[] = {
252b5132
RH
192 /* This reloc does nothing. */
193 HOWTO (R_PPC_NONE, /* type */
194 0, /* rightshift */
6346d5ca
AM
195 3, /* size (0 = byte, 1 = short, 2 = long) */
196 0, /* bitsize */
b34976b6 197 FALSE, /* pc_relative */
252b5132 198 0, /* bitpos */
86c95733 199 complain_overflow_dont, /* complain_on_overflow */
252b5132
RH
200 bfd_elf_generic_reloc, /* special_function */
201 "R_PPC_NONE", /* name */
b34976b6 202 FALSE, /* partial_inplace */
252b5132
RH
203 0, /* src_mask */
204 0, /* dst_mask */
b34976b6 205 FALSE), /* pcrel_offset */
252b5132
RH
206
207 /* A standard 32 bit relocation. */
208 HOWTO (R_PPC_ADDR32, /* type */
209 0, /* rightshift */
210 2, /* size (0 = byte, 1 = short, 2 = long) */
211 32, /* bitsize */
b34976b6 212 FALSE, /* pc_relative */
252b5132 213 0, /* bitpos */
86c95733 214 complain_overflow_dont, /* complain_on_overflow */
252b5132
RH
215 bfd_elf_generic_reloc, /* special_function */
216 "R_PPC_ADDR32", /* name */
b34976b6 217 FALSE, /* partial_inplace */
252b5132
RH
218 0, /* src_mask */
219 0xffffffff, /* dst_mask */
b34976b6 220 FALSE), /* pcrel_offset */
252b5132
RH
221
222 /* An absolute 26 bit branch; the lower two bits must be zero.
223 FIXME: we don't check that, we just clear them. */
224 HOWTO (R_PPC_ADDR24, /* type */
225 0, /* rightshift */
226 2, /* size (0 = byte, 1 = short, 2 = long) */
227 26, /* bitsize */
b34976b6 228 FALSE, /* pc_relative */
252b5132 229 0, /* bitpos */
86c95733 230 complain_overflow_signed, /* complain_on_overflow */
252b5132
RH
231 bfd_elf_generic_reloc, /* special_function */
232 "R_PPC_ADDR24", /* name */
b34976b6 233 FALSE, /* partial_inplace */
252b5132
RH
234 0, /* src_mask */
235 0x3fffffc, /* dst_mask */
b34976b6 236 FALSE), /* pcrel_offset */
252b5132
RH
237
238 /* A standard 16 bit relocation. */
239 HOWTO (R_PPC_ADDR16, /* type */
240 0, /* rightshift */
241 1, /* size (0 = byte, 1 = short, 2 = long) */
242 16, /* bitsize */
b34976b6 243 FALSE, /* pc_relative */
252b5132
RH
244 0, /* bitpos */
245 complain_overflow_bitfield, /* complain_on_overflow */
246 bfd_elf_generic_reloc, /* special_function */
247 "R_PPC_ADDR16", /* name */
b34976b6 248 FALSE, /* partial_inplace */
252b5132
RH
249 0, /* src_mask */
250 0xffff, /* dst_mask */
b34976b6 251 FALSE), /* pcrel_offset */
252b5132
RH
252
253 /* A 16 bit relocation without overflow. */
254 HOWTO (R_PPC_ADDR16_LO, /* type */
255 0, /* rightshift */
256 1, /* size (0 = byte, 1 = short, 2 = long) */
257 16, /* bitsize */
b34976b6 258 FALSE, /* pc_relative */
252b5132
RH
259 0, /* bitpos */
260 complain_overflow_dont,/* complain_on_overflow */
261 bfd_elf_generic_reloc, /* special_function */
262 "R_PPC_ADDR16_LO", /* name */
b34976b6 263 FALSE, /* partial_inplace */
252b5132
RH
264 0, /* src_mask */
265 0xffff, /* dst_mask */
b34976b6 266 FALSE), /* pcrel_offset */
252b5132
RH
267
268 /* The high order 16 bits of an address. */
269 HOWTO (R_PPC_ADDR16_HI, /* type */
270 16, /* rightshift */
271 1, /* size (0 = byte, 1 = short, 2 = long) */
272 16, /* bitsize */
b34976b6 273 FALSE, /* pc_relative */
252b5132
RH
274 0, /* bitpos */
275 complain_overflow_dont, /* complain_on_overflow */
276 bfd_elf_generic_reloc, /* special_function */
277 "R_PPC_ADDR16_HI", /* name */
b34976b6 278 FALSE, /* partial_inplace */
252b5132
RH
279 0, /* src_mask */
280 0xffff, /* dst_mask */
b34976b6 281 FALSE), /* pcrel_offset */
252b5132
RH
282
283 /* The high order 16 bits of an address, plus 1 if the contents of
8da6118f 284 the low 16 bits, treated as a signed number, is negative. */
252b5132
RH
285 HOWTO (R_PPC_ADDR16_HA, /* type */
286 16, /* rightshift */
287 1, /* size (0 = byte, 1 = short, 2 = long) */
288 16, /* bitsize */
b34976b6 289 FALSE, /* pc_relative */
252b5132
RH
290 0, /* bitpos */
291 complain_overflow_dont, /* complain_on_overflow */
292 ppc_elf_addr16_ha_reloc, /* special_function */
293 "R_PPC_ADDR16_HA", /* name */
b34976b6 294 FALSE, /* partial_inplace */
252b5132
RH
295 0, /* src_mask */
296 0xffff, /* dst_mask */
b34976b6 297 FALSE), /* pcrel_offset */
252b5132
RH
298
299 /* An absolute 16 bit branch; the lower two bits must be zero.
300 FIXME: we don't check that, we just clear them. */
301 HOWTO (R_PPC_ADDR14, /* type */
302 0, /* rightshift */
303 2, /* size (0 = byte, 1 = short, 2 = long) */
304 16, /* bitsize */
b34976b6 305 FALSE, /* pc_relative */
252b5132 306 0, /* bitpos */
86c95733 307 complain_overflow_signed, /* complain_on_overflow */
252b5132
RH
308 bfd_elf_generic_reloc, /* special_function */
309 "R_PPC_ADDR14", /* name */
b34976b6 310 FALSE, /* partial_inplace */
252b5132
RH
311 0, /* src_mask */
312 0xfffc, /* dst_mask */
b34976b6 313 FALSE), /* pcrel_offset */
252b5132
RH
314
315 /* An absolute 16 bit branch, for which bit 10 should be set to
316 indicate that the branch is expected to be taken. The lower two
8da6118f 317 bits must be zero. */
252b5132
RH
318 HOWTO (R_PPC_ADDR14_BRTAKEN, /* type */
319 0, /* rightshift */
320 2, /* size (0 = byte, 1 = short, 2 = long) */
321 16, /* bitsize */
b34976b6 322 FALSE, /* pc_relative */
252b5132 323 0, /* bitpos */
86c95733 324 complain_overflow_signed, /* complain_on_overflow */
252b5132
RH
325 bfd_elf_generic_reloc, /* special_function */
326 "R_PPC_ADDR14_BRTAKEN",/* name */
b34976b6 327 FALSE, /* partial_inplace */
252b5132
RH
328 0, /* src_mask */
329 0xfffc, /* dst_mask */
b34976b6 330 FALSE), /* pcrel_offset */
252b5132
RH
331
332 /* An absolute 16 bit branch, for which bit 10 should be set to
333 indicate that the branch is not expected to be taken. The lower
334 two bits must be zero. */
335 HOWTO (R_PPC_ADDR14_BRNTAKEN, /* type */
336 0, /* rightshift */
337 2, /* size (0 = byte, 1 = short, 2 = long) */
338 16, /* bitsize */
b34976b6 339 FALSE, /* pc_relative */
252b5132 340 0, /* bitpos */
86c95733 341 complain_overflow_signed, /* complain_on_overflow */
252b5132
RH
342 bfd_elf_generic_reloc, /* special_function */
343 "R_PPC_ADDR14_BRNTAKEN",/* name */
b34976b6 344 FALSE, /* partial_inplace */
252b5132
RH
345 0, /* src_mask */
346 0xfffc, /* dst_mask */
b34976b6 347 FALSE), /* pcrel_offset */
252b5132 348
8da6118f 349 /* A relative 26 bit branch; the lower two bits must be zero. */
252b5132
RH
350 HOWTO (R_PPC_REL24, /* type */
351 0, /* rightshift */
352 2, /* size (0 = byte, 1 = short, 2 = long) */
353 26, /* bitsize */
b34976b6 354 TRUE, /* pc_relative */
252b5132
RH
355 0, /* bitpos */
356 complain_overflow_signed, /* complain_on_overflow */
357 bfd_elf_generic_reloc, /* special_function */
358 "R_PPC_REL24", /* name */
b34976b6 359 FALSE, /* partial_inplace */
252b5132
RH
360 0, /* src_mask */
361 0x3fffffc, /* dst_mask */
b34976b6 362 TRUE), /* pcrel_offset */
252b5132 363
8da6118f 364 /* A relative 16 bit branch; the lower two bits must be zero. */
252b5132
RH
365 HOWTO (R_PPC_REL14, /* type */
366 0, /* rightshift */
367 2, /* size (0 = byte, 1 = short, 2 = long) */
368 16, /* bitsize */
b34976b6 369 TRUE, /* pc_relative */
252b5132
RH
370 0, /* bitpos */
371 complain_overflow_signed, /* complain_on_overflow */
372 bfd_elf_generic_reloc, /* special_function */
373 "R_PPC_REL14", /* name */
b34976b6 374 FALSE, /* partial_inplace */
252b5132
RH
375 0, /* src_mask */
376 0xfffc, /* dst_mask */
b34976b6 377 TRUE), /* pcrel_offset */
252b5132 378
8da6118f 379 /* A relative 16 bit branch. Bit 10 should be set to indicate that
252b5132
RH
380 the branch is expected to be taken. The lower two bits must be
381 zero. */
382 HOWTO (R_PPC_REL14_BRTAKEN, /* type */
383 0, /* rightshift */
384 2, /* size (0 = byte, 1 = short, 2 = long) */
385 16, /* bitsize */
b34976b6 386 TRUE, /* pc_relative */
252b5132
RH
387 0, /* bitpos */
388 complain_overflow_signed, /* complain_on_overflow */
389 bfd_elf_generic_reloc, /* special_function */
390 "R_PPC_REL14_BRTAKEN", /* name */
b34976b6 391 FALSE, /* partial_inplace */
252b5132
RH
392 0, /* src_mask */
393 0xfffc, /* dst_mask */
b34976b6 394 TRUE), /* pcrel_offset */
252b5132 395
8da6118f 396 /* A relative 16 bit branch. Bit 10 should be set to indicate that
252b5132
RH
397 the branch is not expected to be taken. The lower two bits must
398 be zero. */
399 HOWTO (R_PPC_REL14_BRNTAKEN, /* type */
400 0, /* rightshift */
401 2, /* size (0 = byte, 1 = short, 2 = long) */
402 16, /* bitsize */
b34976b6 403 TRUE, /* pc_relative */
252b5132
RH
404 0, /* bitpos */
405 complain_overflow_signed, /* complain_on_overflow */
406 bfd_elf_generic_reloc, /* special_function */
407 "R_PPC_REL14_BRNTAKEN",/* name */
b34976b6 408 FALSE, /* partial_inplace */
252b5132
RH
409 0, /* src_mask */
410 0xfffc, /* dst_mask */
b34976b6 411 TRUE), /* pcrel_offset */
252b5132
RH
412
413 /* Like R_PPC_ADDR16, but referring to the GOT table entry for the
414 symbol. */
415 HOWTO (R_PPC_GOT16, /* type */
416 0, /* rightshift */
417 1, /* size (0 = byte, 1 = short, 2 = long) */
418 16, /* bitsize */
b34976b6 419 FALSE, /* pc_relative */
252b5132
RH
420 0, /* bitpos */
421 complain_overflow_signed, /* complain_on_overflow */
3ce51288 422 ppc_elf_unhandled_reloc, /* special_function */
252b5132 423 "R_PPC_GOT16", /* name */
b34976b6 424 FALSE, /* partial_inplace */
252b5132
RH
425 0, /* src_mask */
426 0xffff, /* dst_mask */
b34976b6 427 FALSE), /* pcrel_offset */
252b5132
RH
428
429 /* Like R_PPC_ADDR16_LO, but referring to the GOT table entry for
430 the symbol. */
431 HOWTO (R_PPC_GOT16_LO, /* type */
432 0, /* rightshift */
433 1, /* size (0 = byte, 1 = short, 2 = long) */
434 16, /* bitsize */
b34976b6 435 FALSE, /* pc_relative */
252b5132
RH
436 0, /* bitpos */
437 complain_overflow_dont, /* complain_on_overflow */
3ce51288 438 ppc_elf_unhandled_reloc, /* special_function */
252b5132 439 "R_PPC_GOT16_LO", /* name */
b34976b6 440 FALSE, /* partial_inplace */
252b5132
RH
441 0, /* src_mask */
442 0xffff, /* dst_mask */
b34976b6 443 FALSE), /* pcrel_offset */
252b5132
RH
444
445 /* Like R_PPC_ADDR16_HI, but referring to the GOT table entry for
446 the symbol. */
447 HOWTO (R_PPC_GOT16_HI, /* type */
448 16, /* rightshift */
449 1, /* size (0 = byte, 1 = short, 2 = long) */
450 16, /* bitsize */
b34976b6 451 FALSE, /* pc_relative */
252b5132 452 0, /* bitpos */
86c95733 453 complain_overflow_dont, /* complain_on_overflow */
3ce51288 454 ppc_elf_unhandled_reloc, /* special_function */
252b5132 455 "R_PPC_GOT16_HI", /* name */
b34976b6 456 FALSE, /* partial_inplace */
252b5132
RH
457 0, /* src_mask */
458 0xffff, /* dst_mask */
b34976b6 459 FALSE), /* pcrel_offset */
252b5132
RH
460
461 /* Like R_PPC_ADDR16_HA, but referring to the GOT table entry for
462 the symbol. */
463 HOWTO (R_PPC_GOT16_HA, /* type */
464 16, /* rightshift */
465 1, /* size (0 = byte, 1 = short, 2 = long) */
466 16, /* bitsize */
b34976b6 467 FALSE, /* pc_relative */
252b5132 468 0, /* bitpos */
86c95733 469 complain_overflow_dont, /* complain_on_overflow */
3ce51288 470 ppc_elf_unhandled_reloc, /* special_function */
252b5132 471 "R_PPC_GOT16_HA", /* name */
b34976b6 472 FALSE, /* partial_inplace */
252b5132
RH
473 0, /* src_mask */
474 0xffff, /* dst_mask */
b34976b6 475 FALSE), /* pcrel_offset */
252b5132
RH
476
477 /* Like R_PPC_REL24, but referring to the procedure linkage table
478 entry for the symbol. */
479 HOWTO (R_PPC_PLTREL24, /* type */
480 0, /* rightshift */
481 2, /* size (0 = byte, 1 = short, 2 = long) */
482 26, /* bitsize */
b34976b6 483 TRUE, /* pc_relative */
252b5132 484 0, /* bitpos */
3ce51288
AM
485 complain_overflow_signed, /* complain_on_overflow */
486 ppc_elf_unhandled_reloc, /* special_function */
252b5132 487 "R_PPC_PLTREL24", /* name */
b34976b6 488 FALSE, /* partial_inplace */
252b5132
RH
489 0, /* src_mask */
490 0x3fffffc, /* dst_mask */
b34976b6 491 TRUE), /* pcrel_offset */
252b5132
RH
492
493 /* This is used only by the dynamic linker. The symbol should exist
494 both in the object being run and in some shared library. The
495 dynamic linker copies the data addressed by the symbol from the
496 shared library into the object, because the object being
497 run has to have the data at some particular address. */
498 HOWTO (R_PPC_COPY, /* type */
499 0, /* rightshift */
500 2, /* size (0 = byte, 1 = short, 2 = long) */
501 32, /* bitsize */
b34976b6 502 FALSE, /* pc_relative */
252b5132 503 0, /* bitpos */
86c95733 504 complain_overflow_dont, /* complain_on_overflow */
3ce51288 505 ppc_elf_unhandled_reloc, /* special_function */
252b5132 506 "R_PPC_COPY", /* name */
b34976b6 507 FALSE, /* partial_inplace */
252b5132
RH
508 0, /* src_mask */
509 0, /* dst_mask */
b34976b6 510 FALSE), /* pcrel_offset */
252b5132
RH
511
512 /* Like R_PPC_ADDR32, but used when setting global offset table
513 entries. */
514 HOWTO (R_PPC_GLOB_DAT, /* type */
515 0, /* rightshift */
516 2, /* size (0 = byte, 1 = short, 2 = long) */
517 32, /* bitsize */
b34976b6 518 FALSE, /* pc_relative */
252b5132 519 0, /* bitpos */
86c95733 520 complain_overflow_dont, /* complain_on_overflow */
3ce51288 521 ppc_elf_unhandled_reloc, /* special_function */
252b5132 522 "R_PPC_GLOB_DAT", /* name */
b34976b6 523 FALSE, /* partial_inplace */
252b5132
RH
524 0, /* src_mask */
525 0xffffffff, /* dst_mask */
b34976b6 526 FALSE), /* pcrel_offset */
252b5132
RH
527
528 /* Marks a procedure linkage table entry for a symbol. */
529 HOWTO (R_PPC_JMP_SLOT, /* type */
530 0, /* rightshift */
531 2, /* size (0 = byte, 1 = short, 2 = long) */
532 32, /* bitsize */
b34976b6 533 FALSE, /* pc_relative */
252b5132 534 0, /* bitpos */
86c95733 535 complain_overflow_dont, /* complain_on_overflow */
3ce51288 536 ppc_elf_unhandled_reloc, /* special_function */
252b5132 537 "R_PPC_JMP_SLOT", /* name */
b34976b6 538 FALSE, /* partial_inplace */
252b5132
RH
539 0, /* src_mask */
540 0, /* dst_mask */
b34976b6 541 FALSE), /* pcrel_offset */
252b5132
RH
542
543 /* Used only by the dynamic linker. When the object is run, this
544 longword is set to the load address of the object, plus the
545 addend. */
546 HOWTO (R_PPC_RELATIVE, /* type */
547 0, /* rightshift */
548 2, /* size (0 = byte, 1 = short, 2 = long) */
549 32, /* bitsize */
b34976b6 550 FALSE, /* pc_relative */
252b5132 551 0, /* bitpos */
86c95733 552 complain_overflow_dont, /* complain_on_overflow */
252b5132
RH
553 bfd_elf_generic_reloc, /* special_function */
554 "R_PPC_RELATIVE", /* name */
b34976b6 555 FALSE, /* partial_inplace */
252b5132
RH
556 0, /* src_mask */
557 0xffffffff, /* dst_mask */
b34976b6 558 FALSE), /* pcrel_offset */
252b5132
RH
559
560 /* Like R_PPC_REL24, but uses the value of the symbol within the
561 object rather than the final value. Normally used for
562 _GLOBAL_OFFSET_TABLE_. */
563 HOWTO (R_PPC_LOCAL24PC, /* type */
564 0, /* rightshift */
565 2, /* size (0 = byte, 1 = short, 2 = long) */
566 26, /* bitsize */
b34976b6 567 TRUE, /* pc_relative */
252b5132
RH
568 0, /* bitpos */
569 complain_overflow_signed, /* complain_on_overflow */
570 bfd_elf_generic_reloc, /* special_function */
571 "R_PPC_LOCAL24PC", /* name */
b34976b6 572 FALSE, /* partial_inplace */
252b5132
RH
573 0, /* src_mask */
574 0x3fffffc, /* dst_mask */
b34976b6 575 TRUE), /* pcrel_offset */
252b5132
RH
576
577 /* Like R_PPC_ADDR32, but may be unaligned. */
578 HOWTO (R_PPC_UADDR32, /* type */
579 0, /* rightshift */
580 2, /* size (0 = byte, 1 = short, 2 = long) */
581 32, /* bitsize */
b34976b6 582 FALSE, /* pc_relative */
252b5132 583 0, /* bitpos */
86c95733 584 complain_overflow_dont, /* complain_on_overflow */
252b5132
RH
585 bfd_elf_generic_reloc, /* special_function */
586 "R_PPC_UADDR32", /* name */
b34976b6 587 FALSE, /* partial_inplace */
252b5132
RH
588 0, /* src_mask */
589 0xffffffff, /* dst_mask */
b34976b6 590 FALSE), /* pcrel_offset */
252b5132
RH
591
592 /* Like R_PPC_ADDR16, but may be unaligned. */
593 HOWTO (R_PPC_UADDR16, /* type */
594 0, /* rightshift */
595 1, /* size (0 = byte, 1 = short, 2 = long) */
596 16, /* bitsize */
b34976b6 597 FALSE, /* pc_relative */
252b5132
RH
598 0, /* bitpos */
599 complain_overflow_bitfield, /* complain_on_overflow */
600 bfd_elf_generic_reloc, /* special_function */
601 "R_PPC_UADDR16", /* name */
b34976b6 602 FALSE, /* partial_inplace */
252b5132
RH
603 0, /* src_mask */
604 0xffff, /* dst_mask */
b34976b6 605 FALSE), /* pcrel_offset */
252b5132
RH
606
607 /* 32-bit PC relative */
608 HOWTO (R_PPC_REL32, /* type */
609 0, /* rightshift */
610 2, /* size (0 = byte, 1 = short, 2 = long) */
611 32, /* bitsize */
b34976b6 612 TRUE, /* pc_relative */
252b5132 613 0, /* bitpos */
86c95733 614 complain_overflow_dont, /* complain_on_overflow */
252b5132
RH
615 bfd_elf_generic_reloc, /* special_function */
616 "R_PPC_REL32", /* name */
b34976b6 617 FALSE, /* partial_inplace */
252b5132
RH
618 0, /* src_mask */
619 0xffffffff, /* dst_mask */
b34976b6 620 TRUE), /* pcrel_offset */
252b5132
RH
621
622 /* 32-bit relocation to the symbol's procedure linkage table.
c3668558 623 FIXME: not supported. */
252b5132
RH
624 HOWTO (R_PPC_PLT32, /* type */
625 0, /* rightshift */
626 2, /* size (0 = byte, 1 = short, 2 = long) */
627 32, /* bitsize */
b34976b6 628 FALSE, /* pc_relative */
252b5132 629 0, /* bitpos */
86c95733 630 complain_overflow_dont, /* complain_on_overflow */
3ce51288 631 ppc_elf_unhandled_reloc, /* special_function */
252b5132 632 "R_PPC_PLT32", /* name */
b34976b6 633 FALSE, /* partial_inplace */
252b5132
RH
634 0, /* src_mask */
635 0, /* dst_mask */
b34976b6 636 FALSE), /* pcrel_offset */
252b5132
RH
637
638 /* 32-bit PC relative relocation to the symbol's procedure linkage table.
c3668558 639 FIXME: not supported. */
252b5132
RH
640 HOWTO (R_PPC_PLTREL32, /* type */
641 0, /* rightshift */
642 2, /* size (0 = byte, 1 = short, 2 = long) */
643 32, /* bitsize */
b34976b6 644 TRUE, /* pc_relative */
252b5132 645 0, /* bitpos */
86c95733 646 complain_overflow_dont, /* complain_on_overflow */
3ce51288 647 ppc_elf_unhandled_reloc, /* special_function */
252b5132 648 "R_PPC_PLTREL32", /* name */
b34976b6 649 FALSE, /* partial_inplace */
252b5132
RH
650 0, /* src_mask */
651 0, /* dst_mask */
b34976b6 652 TRUE), /* pcrel_offset */
252b5132
RH
653
654 /* Like R_PPC_ADDR16_LO, but referring to the PLT table entry for
655 the symbol. */
656 HOWTO (R_PPC_PLT16_LO, /* type */
657 0, /* rightshift */
658 1, /* size (0 = byte, 1 = short, 2 = long) */
659 16, /* bitsize */
b34976b6 660 FALSE, /* pc_relative */
252b5132
RH
661 0, /* bitpos */
662 complain_overflow_dont, /* complain_on_overflow */
3ce51288 663 ppc_elf_unhandled_reloc, /* special_function */
252b5132 664 "R_PPC_PLT16_LO", /* name */
b34976b6 665 FALSE, /* partial_inplace */
252b5132
RH
666 0, /* src_mask */
667 0xffff, /* dst_mask */
b34976b6 668 FALSE), /* pcrel_offset */
252b5132
RH
669
670 /* Like R_PPC_ADDR16_HI, but referring to the PLT table entry for
671 the symbol. */
672 HOWTO (R_PPC_PLT16_HI, /* type */
673 16, /* rightshift */
674 1, /* size (0 = byte, 1 = short, 2 = long) */
675 16, /* bitsize */
b34976b6 676 FALSE, /* pc_relative */
252b5132 677 0, /* bitpos */
86c95733 678 complain_overflow_dont, /* complain_on_overflow */
3ce51288 679 ppc_elf_unhandled_reloc, /* special_function */
252b5132 680 "R_PPC_PLT16_HI", /* name */
b34976b6 681 FALSE, /* partial_inplace */
252b5132
RH
682 0, /* src_mask */
683 0xffff, /* dst_mask */
b34976b6 684 FALSE), /* pcrel_offset */
252b5132
RH
685
686 /* Like R_PPC_ADDR16_HA, but referring to the PLT table entry for
687 the symbol. */
688 HOWTO (R_PPC_PLT16_HA, /* type */
689 16, /* rightshift */
690 1, /* size (0 = byte, 1 = short, 2 = long) */
691 16, /* bitsize */
b34976b6 692 FALSE, /* pc_relative */
252b5132 693 0, /* bitpos */
86c95733 694 complain_overflow_dont, /* complain_on_overflow */
3ce51288 695 ppc_elf_unhandled_reloc, /* special_function */
252b5132 696 "R_PPC_PLT16_HA", /* name */
b34976b6 697 FALSE, /* partial_inplace */
252b5132
RH
698 0, /* src_mask */
699 0xffff, /* dst_mask */
b34976b6 700 FALSE), /* pcrel_offset */
252b5132
RH
701
702 /* A sign-extended 16 bit value relative to _SDA_BASE_, for use with
703 small data items. */
704 HOWTO (R_PPC_SDAREL16, /* type */
705 0, /* rightshift */
706 1, /* size (0 = byte, 1 = short, 2 = long) */
707 16, /* bitsize */
b34976b6 708 FALSE, /* pc_relative */
252b5132
RH
709 0, /* bitpos */
710 complain_overflow_signed, /* complain_on_overflow */
3ce51288 711 ppc_elf_unhandled_reloc, /* special_function */
252b5132 712 "R_PPC_SDAREL16", /* name */
b34976b6 713 FALSE, /* partial_inplace */
252b5132
RH
714 0, /* src_mask */
715 0xffff, /* dst_mask */
b34976b6 716 FALSE), /* pcrel_offset */
252b5132 717
c061c2d8 718 /* 16-bit section relative relocation. */
252b5132
RH
719 HOWTO (R_PPC_SECTOFF, /* type */
720 0, /* rightshift */
c061c2d8
AM
721 1, /* size (0 = byte, 1 = short, 2 = long) */
722 16, /* bitsize */
b34976b6 723 FALSE, /* pc_relative */
252b5132 724 0, /* bitpos */
86c95733 725 complain_overflow_signed, /* complain_on_overflow */
3ce51288 726 ppc_elf_unhandled_reloc, /* special_function */
252b5132 727 "R_PPC_SECTOFF", /* name */
b34976b6 728 FALSE, /* partial_inplace */
252b5132 729 0, /* src_mask */
c061c2d8 730 0xffff, /* dst_mask */
b34976b6 731 FALSE), /* pcrel_offset */
252b5132 732
c3668558 733 /* 16-bit lower half section relative relocation. */
252b5132
RH
734 HOWTO (R_PPC_SECTOFF_LO, /* type */
735 0, /* rightshift */
736 1, /* size (0 = byte, 1 = short, 2 = long) */
737 16, /* bitsize */
b34976b6 738 FALSE, /* pc_relative */
252b5132
RH
739 0, /* bitpos */
740 complain_overflow_dont, /* complain_on_overflow */
3ce51288 741 ppc_elf_unhandled_reloc, /* special_function */
252b5132 742 "R_PPC_SECTOFF_LO", /* name */
b34976b6 743 FALSE, /* partial_inplace */
252b5132
RH
744 0, /* src_mask */
745 0xffff, /* dst_mask */
b34976b6 746 FALSE), /* pcrel_offset */
252b5132 747
c3668558 748 /* 16-bit upper half section relative relocation. */
252b5132
RH
749 HOWTO (R_PPC_SECTOFF_HI, /* type */
750 16, /* rightshift */
751 1, /* size (0 = byte, 1 = short, 2 = long) */
752 16, /* bitsize */
b34976b6 753 FALSE, /* pc_relative */
252b5132 754 0, /* bitpos */
86c95733 755 complain_overflow_dont, /* complain_on_overflow */
3ce51288 756 ppc_elf_unhandled_reloc, /* special_function */
252b5132 757 "R_PPC_SECTOFF_HI", /* name */
b34976b6 758 FALSE, /* partial_inplace */
252b5132
RH
759 0, /* src_mask */
760 0xffff, /* dst_mask */
b34976b6 761 FALSE), /* pcrel_offset */
252b5132 762
c3668558 763 /* 16-bit upper half adjusted section relative relocation. */
252b5132
RH
764 HOWTO (R_PPC_SECTOFF_HA, /* type */
765 16, /* rightshift */
766 1, /* size (0 = byte, 1 = short, 2 = long) */
767 16, /* bitsize */
b34976b6 768 FALSE, /* pc_relative */
252b5132 769 0, /* bitpos */
86c95733 770 complain_overflow_dont, /* complain_on_overflow */
3ce51288 771 ppc_elf_unhandled_reloc, /* special_function */
252b5132 772 "R_PPC_SECTOFF_HA", /* name */
b34976b6 773 FALSE, /* partial_inplace */
252b5132
RH
774 0, /* src_mask */
775 0xffff, /* dst_mask */
b34976b6 776 FALSE), /* pcrel_offset */
252b5132 777
727fc41e 778 /* Marker relocs for TLS. */
7619e7c7 779 HOWTO (R_PPC_TLS,
252b5132
RH
780 0, /* rightshift */
781 2, /* size (0 = byte, 1 = short, 2 = long) */
782 32, /* bitsize */
b34976b6 783 FALSE, /* pc_relative */
252b5132 784 0, /* bitpos */
7619e7c7 785 complain_overflow_dont, /* complain_on_overflow */
252b5132 786 bfd_elf_generic_reloc, /* special_function */
7619e7c7
AM
787 "R_PPC_TLS", /* name */
788 FALSE, /* partial_inplace */
789 0, /* src_mask */
790 0, /* dst_mask */
791 FALSE), /* pcrel_offset */
792
727fc41e
AM
793 HOWTO (R_PPC_TLSGD,
794 0, /* rightshift */
795 2, /* size (0 = byte, 1 = short, 2 = long) */
796 32, /* bitsize */
797 FALSE, /* pc_relative */
798 0, /* bitpos */
799 complain_overflow_dont, /* complain_on_overflow */
800 bfd_elf_generic_reloc, /* special_function */
801 "R_PPC_TLSGD", /* name */
802 FALSE, /* partial_inplace */
803 0, /* src_mask */
804 0, /* dst_mask */
805 FALSE), /* pcrel_offset */
806
807 HOWTO (R_PPC_TLSLD,
808 0, /* rightshift */
809 2, /* size (0 = byte, 1 = short, 2 = long) */
810 32, /* bitsize */
811 FALSE, /* pc_relative */
812 0, /* bitpos */
813 complain_overflow_dont, /* complain_on_overflow */
814 bfd_elf_generic_reloc, /* special_function */
815 "R_PPC_TLSLD", /* name */
816 FALSE, /* partial_inplace */
817 0, /* src_mask */
818 0, /* dst_mask */
819 FALSE), /* pcrel_offset */
820
7619e7c7
AM
821 /* Computes the load module index of the load module that contains the
822 definition of its TLS sym. */
823 HOWTO (R_PPC_DTPMOD32,
824 0, /* rightshift */
825 2, /* size (0 = byte, 1 = short, 2 = long) */
826 32, /* bitsize */
827 FALSE, /* pc_relative */
828 0, /* bitpos */
829 complain_overflow_dont, /* complain_on_overflow */
830 ppc_elf_unhandled_reloc, /* special_function */
831 "R_PPC_DTPMOD32", /* name */
b34976b6 832 FALSE, /* partial_inplace */
252b5132
RH
833 0, /* src_mask */
834 0xffffffff, /* dst_mask */
b34976b6 835 FALSE), /* pcrel_offset */
252b5132 836
7619e7c7
AM
837 /* Computes a dtv-relative displacement, the difference between the value
838 of sym+add and the base address of the thread-local storage block that
839 contains the definition of sym, minus 0x8000. */
840 HOWTO (R_PPC_DTPREL32,
841 0, /* rightshift */
842 2, /* size (0 = byte, 1 = short, 2 = long) */
843 32, /* bitsize */
844 FALSE, /* pc_relative */
845 0, /* bitpos */
846 complain_overflow_dont, /* complain_on_overflow */
847 ppc_elf_unhandled_reloc, /* special_function */
848 "R_PPC_DTPREL32", /* name */
849 FALSE, /* partial_inplace */
850 0, /* src_mask */
851 0xffffffff, /* dst_mask */
852 FALSE), /* pcrel_offset */
853
854 /* A 16 bit dtprel reloc. */
855 HOWTO (R_PPC_DTPREL16,
252b5132
RH
856 0, /* rightshift */
857 1, /* size (0 = byte, 1 = short, 2 = long) */
858 16, /* bitsize */
b34976b6 859 FALSE, /* pc_relative */
252b5132 860 0, /* bitpos */
7619e7c7
AM
861 complain_overflow_signed, /* complain_on_overflow */
862 ppc_elf_unhandled_reloc, /* special_function */
863 "R_PPC_DTPREL16", /* name */
b34976b6 864 FALSE, /* partial_inplace */
252b5132
RH
865 0, /* src_mask */
866 0xffff, /* dst_mask */
b34976b6 867 FALSE), /* pcrel_offset */
252b5132 868
7619e7c7
AM
869 /* Like DTPREL16, but no overflow. */
870 HOWTO (R_PPC_DTPREL16_LO,
252b5132
RH
871 0, /* rightshift */
872 1, /* size (0 = byte, 1 = short, 2 = long) */
873 16, /* bitsize */
b34976b6 874 FALSE, /* pc_relative */
252b5132 875 0, /* bitpos */
7619e7c7
AM
876 complain_overflow_dont, /* complain_on_overflow */
877 ppc_elf_unhandled_reloc, /* special_function */
878 "R_PPC_DTPREL16_LO", /* name */
b34976b6 879 FALSE, /* partial_inplace */
252b5132
RH
880 0, /* src_mask */
881 0xffff, /* dst_mask */
b34976b6 882 FALSE), /* pcrel_offset */
252b5132 883
7619e7c7
AM
884 /* Like DTPREL16_LO, but next higher group of 16 bits. */
885 HOWTO (R_PPC_DTPREL16_HI,
252b5132
RH
886 16, /* rightshift */
887 1, /* size (0 = byte, 1 = short, 2 = long) */
888 16, /* bitsize */
b34976b6 889 FALSE, /* pc_relative */
252b5132
RH
890 0, /* bitpos */
891 complain_overflow_dont, /* complain_on_overflow */
7619e7c7
AM
892 ppc_elf_unhandled_reloc, /* special_function */
893 "R_PPC_DTPREL16_HI", /* name */
b34976b6 894 FALSE, /* partial_inplace */
252b5132
RH
895 0, /* src_mask */
896 0xffff, /* dst_mask */
b34976b6 897 FALSE), /* pcrel_offset */
252b5132 898
7619e7c7
AM
899 /* Like DTPREL16_HI, but adjust for low 16 bits. */
900 HOWTO (R_PPC_DTPREL16_HA,
252b5132
RH
901 16, /* rightshift */
902 1, /* size (0 = byte, 1 = short, 2 = long) */
903 16, /* bitsize */
b34976b6 904 FALSE, /* pc_relative */
252b5132
RH
905 0, /* bitpos */
906 complain_overflow_dont, /* complain_on_overflow */
7619e7c7
AM
907 ppc_elf_unhandled_reloc, /* special_function */
908 "R_PPC_DTPREL16_HA", /* name */
b34976b6 909 FALSE, /* partial_inplace */
252b5132
RH
910 0, /* src_mask */
911 0xffff, /* dst_mask */
b34976b6 912 FALSE), /* pcrel_offset */
252b5132 913
7619e7c7
AM
914 /* Computes a tp-relative displacement, the difference between the value of
915 sym+add and the value of the thread pointer (r13). */
916 HOWTO (R_PPC_TPREL32,
917 0, /* rightshift */
918 2, /* size (0 = byte, 1 = short, 2 = long) */
919 32, /* bitsize */
920 FALSE, /* pc_relative */
921 0, /* bitpos */
922 complain_overflow_dont, /* complain_on_overflow */
923 ppc_elf_unhandled_reloc, /* special_function */
924 "R_PPC_TPREL32", /* name */
925 FALSE, /* partial_inplace */
926 0, /* src_mask */
927 0xffffffff, /* dst_mask */
928 FALSE), /* pcrel_offset */
929
930 /* A 16 bit tprel reloc. */
931 HOWTO (R_PPC_TPREL16,
252b5132
RH
932 0, /* rightshift */
933 1, /* size (0 = byte, 1 = short, 2 = long) */
934 16, /* bitsize */
b34976b6 935 FALSE, /* pc_relative */
252b5132 936 0, /* bitpos */
7619e7c7
AM
937 complain_overflow_signed, /* complain_on_overflow */
938 ppc_elf_unhandled_reloc, /* special_function */
939 "R_PPC_TPREL16", /* name */
b34976b6 940 FALSE, /* partial_inplace */
252b5132
RH
941 0, /* src_mask */
942 0xffff, /* dst_mask */
b34976b6 943 FALSE), /* pcrel_offset */
252b5132 944
7619e7c7
AM
945 /* Like TPREL16, but no overflow. */
946 HOWTO (R_PPC_TPREL16_LO,
252b5132
RH
947 0, /* rightshift */
948 1, /* size (0 = byte, 1 = short, 2 = long) */
949 16, /* bitsize */
b34976b6 950 FALSE, /* pc_relative */
252b5132 951 0, /* bitpos */
7619e7c7
AM
952 complain_overflow_dont, /* complain_on_overflow */
953 ppc_elf_unhandled_reloc, /* special_function */
954 "R_PPC_TPREL16_LO", /* name */
b34976b6 955 FALSE, /* partial_inplace */
252b5132
RH
956 0, /* src_mask */
957 0xffff, /* dst_mask */
b34976b6 958 FALSE), /* pcrel_offset */
252b5132 959
7619e7c7
AM
960 /* Like TPREL16_LO, but next higher group of 16 bits. */
961 HOWTO (R_PPC_TPREL16_HI,
962 16, /* rightshift */
963 1, /* size (0 = byte, 1 = short, 2 = long) */
964 16, /* bitsize */
965 FALSE, /* pc_relative */
966 0, /* bitpos */
967 complain_overflow_dont, /* complain_on_overflow */
968 ppc_elf_unhandled_reloc, /* special_function */
969 "R_PPC_TPREL16_HI", /* name */
970 FALSE, /* partial_inplace */
971 0, /* src_mask */
972 0xffff, /* dst_mask */
973 FALSE), /* pcrel_offset */
974
975 /* Like TPREL16_HI, but adjust for low 16 bits. */
976 HOWTO (R_PPC_TPREL16_HA,
977 16, /* rightshift */
978 1, /* size (0 = byte, 1 = short, 2 = long) */
979 16, /* bitsize */
980 FALSE, /* pc_relative */
981 0, /* bitpos */
982 complain_overflow_dont, /* complain_on_overflow */
983 ppc_elf_unhandled_reloc, /* special_function */
984 "R_PPC_TPREL16_HA", /* name */
985 FALSE, /* partial_inplace */
986 0, /* src_mask */
987 0xffff, /* dst_mask */
988 FALSE), /* pcrel_offset */
989
990 /* Allocates two contiguous entries in the GOT to hold a tls_index structure,
991 with values (sym+add)@dtpmod and (sym+add)@dtprel, and computes the offset
992 to the first entry. */
993 HOWTO (R_PPC_GOT_TLSGD16,
252b5132
RH
994 0, /* rightshift */
995 1, /* size (0 = byte, 1 = short, 2 = long) */
996 16, /* bitsize */
b34976b6 997 FALSE, /* pc_relative */
252b5132
RH
998 0, /* bitpos */
999 complain_overflow_signed, /* complain_on_overflow */
7619e7c7
AM
1000 ppc_elf_unhandled_reloc, /* special_function */
1001 "R_PPC_GOT_TLSGD16", /* name */
b34976b6 1002 FALSE, /* partial_inplace */
252b5132
RH
1003 0, /* src_mask */
1004 0xffff, /* dst_mask */
b34976b6 1005 FALSE), /* pcrel_offset */
252b5132 1006
7619e7c7
AM
1007 /* Like GOT_TLSGD16, but no overflow. */
1008 HOWTO (R_PPC_GOT_TLSGD16_LO,
252b5132 1009 0, /* rightshift */
7619e7c7 1010 1, /* size (0 = byte, 1 = short, 2 = long) */
252b5132 1011 16, /* bitsize */
b34976b6 1012 FALSE, /* pc_relative */
252b5132 1013 0, /* bitpos */
7619e7c7
AM
1014 complain_overflow_dont, /* complain_on_overflow */
1015 ppc_elf_unhandled_reloc, /* special_function */
1016 "R_PPC_GOT_TLSGD16_LO", /* name */
b34976b6 1017 FALSE, /* partial_inplace */
252b5132
RH
1018 0, /* src_mask */
1019 0xffff, /* dst_mask */
b34976b6 1020 FALSE), /* pcrel_offset */
252b5132 1021
7619e7c7
AM
1022 /* Like GOT_TLSGD16_LO, but next higher group of 16 bits. */
1023 HOWTO (R_PPC_GOT_TLSGD16_HI,
1024 16, /* rightshift */
1025 1, /* size (0 = byte, 1 = short, 2 = long) */
1026 16, /* bitsize */
1027 FALSE, /* pc_relative */
1028 0, /* bitpos */
1029 complain_overflow_dont, /* complain_on_overflow */
1030 ppc_elf_unhandled_reloc, /* special_function */
1031 "R_PPC_GOT_TLSGD16_HI", /* name */
1032 FALSE, /* partial_inplace */
1033 0, /* src_mask */
1034 0xffff, /* dst_mask */
1035 FALSE), /* pcrel_offset */
252b5132 1036
7619e7c7
AM
1037 /* Like GOT_TLSGD16_HI, but adjust for low 16 bits. */
1038 HOWTO (R_PPC_GOT_TLSGD16_HA,
1039 16, /* rightshift */
1040 1, /* size (0 = byte, 1 = short, 2 = long) */
1041 16, /* bitsize */
1042 FALSE, /* pc_relative */
1043 0, /* bitpos */
1044 complain_overflow_dont, /* complain_on_overflow */
1045 ppc_elf_unhandled_reloc, /* special_function */
1046 "R_PPC_GOT_TLSGD16_HA", /* name */
1047 FALSE, /* partial_inplace */
1048 0, /* src_mask */
1049 0xffff, /* dst_mask */
1050 FALSE), /* pcrel_offset */
1051
1052 /* Allocates two contiguous entries in the GOT to hold a tls_index structure,
1053 with values (sym+add)@dtpmod and zero, and computes the offset to the
1054 first entry. */
1055 HOWTO (R_PPC_GOT_TLSLD16,
252b5132
RH
1056 0, /* rightshift */
1057 1, /* size (0 = byte, 1 = short, 2 = long) */
1058 16, /* bitsize */
7619e7c7 1059 FALSE, /* pc_relative */
252b5132
RH
1060 0, /* bitpos */
1061 complain_overflow_signed, /* complain_on_overflow */
7619e7c7
AM
1062 ppc_elf_unhandled_reloc, /* special_function */
1063 "R_PPC_GOT_TLSLD16", /* name */
b34976b6 1064 FALSE, /* partial_inplace */
252b5132
RH
1065 0, /* src_mask */
1066 0xffff, /* dst_mask */
b34976b6 1067 FALSE), /* pcrel_offset */
252b5132 1068
7619e7c7
AM
1069 /* Like GOT_TLSLD16, but no overflow. */
1070 HOWTO (R_PPC_GOT_TLSLD16_LO,
252b5132 1071 0, /* rightshift */
7619e7c7
AM
1072 1, /* size (0 = byte, 1 = short, 2 = long) */
1073 16, /* bitsize */
b34976b6 1074 FALSE, /* pc_relative */
252b5132
RH
1075 0, /* bitpos */
1076 complain_overflow_dont, /* complain_on_overflow */
7619e7c7
AM
1077 ppc_elf_unhandled_reloc, /* special_function */
1078 "R_PPC_GOT_TLSLD16_LO", /* name */
b34976b6 1079 FALSE, /* partial_inplace */
252b5132 1080 0, /* src_mask */
7619e7c7 1081 0xffff, /* dst_mask */
b34976b6 1082 FALSE), /* pcrel_offset */
252b5132 1083
7619e7c7
AM
1084 /* Like GOT_TLSLD16_LO, but next higher group of 16 bits. */
1085 HOWTO (R_PPC_GOT_TLSLD16_HI,
1086 16, /* rightshift */
1087 1, /* size (0 = byte, 1 = short, 2 = long) */
1088 16, /* bitsize */
b34976b6 1089 FALSE, /* pc_relative */
252b5132
RH
1090 0, /* bitpos */
1091 complain_overflow_dont, /* complain_on_overflow */
7619e7c7
AM
1092 ppc_elf_unhandled_reloc, /* special_function */
1093 "R_PPC_GOT_TLSLD16_HI", /* name */
b34976b6 1094 FALSE, /* partial_inplace */
252b5132 1095 0, /* src_mask */
7619e7c7 1096 0xffff, /* dst_mask */
b34976b6 1097 FALSE), /* pcrel_offset */
252b5132 1098
7619e7c7
AM
1099 /* Like GOT_TLSLD16_HI, but adjust for low 16 bits. */
1100 HOWTO (R_PPC_GOT_TLSLD16_HA,
1101 16, /* rightshift */
1102 1, /* size (0 = byte, 1 = short, 2 = long) */
1103 16, /* bitsize */
1104 FALSE, /* pc_relative */
1105 0, /* bitpos */
1106 complain_overflow_dont, /* complain_on_overflow */
1107 ppc_elf_unhandled_reloc, /* special_function */
1108 "R_PPC_GOT_TLSLD16_HA", /* name */
1109 FALSE, /* partial_inplace */
1110 0, /* src_mask */
1111 0xffff, /* dst_mask */
1112 FALSE), /* pcrel_offset */
1113
1114 /* Allocates an entry in the GOT with value (sym+add)@dtprel, and computes
1115 the offset to the entry. */
1116 HOWTO (R_PPC_GOT_DTPREL16,
252b5132
RH
1117 0, /* rightshift */
1118 1, /* size (0 = byte, 1 = short, 2 = long) */
1119 16, /* bitsize */
b34976b6 1120 FALSE, /* pc_relative */
252b5132
RH
1121 0, /* bitpos */
1122 complain_overflow_signed, /* complain_on_overflow */
7619e7c7
AM
1123 ppc_elf_unhandled_reloc, /* special_function */
1124 "R_PPC_GOT_DTPREL16", /* name */
b34976b6 1125 FALSE, /* partial_inplace */
252b5132
RH
1126 0, /* src_mask */
1127 0xffff, /* dst_mask */
b34976b6 1128 FALSE), /* pcrel_offset */
252b5132 1129
7619e7c7
AM
1130 /* Like GOT_DTPREL16, but no overflow. */
1131 HOWTO (R_PPC_GOT_DTPREL16_LO,
1132 0, /* rightshift */
1133 1, /* size (0 = byte, 1 = short, 2 = long) */
1134 16, /* bitsize */
1135 FALSE, /* pc_relative */
1136 0, /* bitpos */
1137 complain_overflow_dont, /* complain_on_overflow */
1138 ppc_elf_unhandled_reloc, /* special_function */
1139 "R_PPC_GOT_DTPREL16_LO", /* name */
1140 FALSE, /* partial_inplace */
1141 0, /* src_mask */
1142 0xffff, /* dst_mask */
1143 FALSE), /* pcrel_offset */
252b5132 1144
7619e7c7
AM
1145 /* Like GOT_DTPREL16_LO, but next higher group of 16 bits. */
1146 HOWTO (R_PPC_GOT_DTPREL16_HI,
1147 16, /* rightshift */
1148 1, /* size (0 = byte, 1 = short, 2 = long) */
1149 16, /* bitsize */
1150 FALSE, /* pc_relative */
1151 0, /* bitpos */
1152 complain_overflow_dont, /* complain_on_overflow */
1153 ppc_elf_unhandled_reloc, /* special_function */
1154 "R_PPC_GOT_DTPREL16_HI", /* name */
1155 FALSE, /* partial_inplace */
1156 0, /* src_mask */
1157 0xffff, /* dst_mask */
1158 FALSE), /* pcrel_offset */
252b5132 1159
7619e7c7
AM
1160 /* Like GOT_DTPREL16_HI, but adjust for low 16 bits. */
1161 HOWTO (R_PPC_GOT_DTPREL16_HA,
1162 16, /* rightshift */
1163 1, /* size (0 = byte, 1 = short, 2 = long) */
1164 16, /* bitsize */
1165 FALSE, /* pc_relative */
1166 0, /* bitpos */
1167 complain_overflow_dont, /* complain_on_overflow */
1168 ppc_elf_unhandled_reloc, /* special_function */
1169 "R_PPC_GOT_DTPREL16_HA", /* name */
1170 FALSE, /* partial_inplace */
1171 0, /* src_mask */
1172 0xffff, /* dst_mask */
1173 FALSE), /* pcrel_offset */
c3668558 1174
7619e7c7
AM
1175 /* Allocates an entry in the GOT with value (sym+add)@tprel, and computes the
1176 offset to the entry. */
1177 HOWTO (R_PPC_GOT_TPREL16,
1178 0, /* rightshift */
1179 1, /* size (0 = byte, 1 = short, 2 = long) */
1180 16, /* bitsize */
1181 FALSE, /* pc_relative */
1182 0, /* bitpos */
1183 complain_overflow_signed, /* complain_on_overflow */
1184 ppc_elf_unhandled_reloc, /* special_function */
1185 "R_PPC_GOT_TPREL16", /* name */
1186 FALSE, /* partial_inplace */
1187 0, /* src_mask */
1188 0xffff, /* dst_mask */
1189 FALSE), /* pcrel_offset */
1190
1191 /* Like GOT_TPREL16, but no overflow. */
1192 HOWTO (R_PPC_GOT_TPREL16_LO,
1193 0, /* rightshift */
1194 1, /* size (0 = byte, 1 = short, 2 = long) */
1195 16, /* bitsize */
1196 FALSE, /* pc_relative */
1197 0, /* bitpos */
1198 complain_overflow_dont, /* complain_on_overflow */
1199 ppc_elf_unhandled_reloc, /* special_function */
1200 "R_PPC_GOT_TPREL16_LO", /* name */
1201 FALSE, /* partial_inplace */
1202 0, /* src_mask */
1203 0xffff, /* dst_mask */
1204 FALSE), /* pcrel_offset */
1205
1206 /* Like GOT_TPREL16_LO, but next higher group of 16 bits. */
1207 HOWTO (R_PPC_GOT_TPREL16_HI,
1208 16, /* rightshift */
1209 1, /* size (0 = byte, 1 = short, 2 = long) */
1210 16, /* bitsize */
1211 FALSE, /* pc_relative */
1212 0, /* bitpos */
1213 complain_overflow_dont, /* complain_on_overflow */
1214 ppc_elf_unhandled_reloc, /* special_function */
1215 "R_PPC_GOT_TPREL16_HI", /* name */
1216 FALSE, /* partial_inplace */
1217 0, /* src_mask */
1218 0xffff, /* dst_mask */
1219 FALSE), /* pcrel_offset */
1220
1221 /* Like GOT_TPREL16_HI, but adjust for low 16 bits. */
1222 HOWTO (R_PPC_GOT_TPREL16_HA,
1223 16, /* rightshift */
1224 1, /* size (0 = byte, 1 = short, 2 = long) */
1225 16, /* bitsize */
1226 FALSE, /* pc_relative */
1227 0, /* bitpos */
1228 complain_overflow_dont, /* complain_on_overflow */
1229 ppc_elf_unhandled_reloc, /* special_function */
1230 "R_PPC_GOT_TPREL16_HA", /* name */
1231 FALSE, /* partial_inplace */
1232 0, /* src_mask */
1233 0xffff, /* dst_mask */
1234 FALSE), /* pcrel_offset */
1235
1236 /* The remaining relocs are from the Embedded ELF ABI, and are not
1237 in the SVR4 ELF ABI. */
1238
1239 /* 32 bit value resulting from the addend minus the symbol. */
1240 HOWTO (R_PPC_EMB_NADDR32, /* type */
1241 0, /* rightshift */
1242 2, /* size (0 = byte, 1 = short, 2 = long) */
1243 32, /* bitsize */
1244 FALSE, /* pc_relative */
1245 0, /* bitpos */
86c95733 1246 complain_overflow_dont, /* complain_on_overflow */
3ce51288 1247 ppc_elf_unhandled_reloc, /* special_function */
7619e7c7
AM
1248 "R_PPC_EMB_NADDR32", /* name */
1249 FALSE, /* partial_inplace */
1250 0, /* src_mask */
1251 0xffffffff, /* dst_mask */
1252 FALSE), /* pcrel_offset */
1253
1254 /* 16 bit value resulting from the addend minus the symbol. */
1255 HOWTO (R_PPC_EMB_NADDR16, /* type */
1256 0, /* rightshift */
1257 1, /* size (0 = byte, 1 = short, 2 = long) */
1258 16, /* bitsize */
1259 FALSE, /* pc_relative */
1260 0, /* bitpos */
86c95733 1261 complain_overflow_signed, /* complain_on_overflow */
3ce51288 1262 ppc_elf_unhandled_reloc, /* special_function */
7619e7c7
AM
1263 "R_PPC_EMB_NADDR16", /* name */
1264 FALSE, /* partial_inplace */
1265 0, /* src_mask */
1266 0xffff, /* dst_mask */
1267 FALSE), /* pcrel_offset */
1268
1269 /* 16 bit value resulting from the addend minus the symbol. */
1270 HOWTO (R_PPC_EMB_NADDR16_LO, /* type */
1271 0, /* rightshift */
1272 1, /* size (0 = byte, 1 = short, 2 = long) */
1273 16, /* bitsize */
1274 FALSE, /* pc_relative */
1275 0, /* bitpos */
1276 complain_overflow_dont,/* complain_on_overflow */
3ce51288 1277 ppc_elf_unhandled_reloc, /* special_function */
7619e7c7
AM
1278 "R_PPC_EMB_ADDR16_LO", /* name */
1279 FALSE, /* partial_inplace */
1280 0, /* src_mask */
1281 0xffff, /* dst_mask */
1282 FALSE), /* pcrel_offset */
1283
1284 /* The high order 16 bits of the addend minus the symbol. */
1285 HOWTO (R_PPC_EMB_NADDR16_HI, /* type */
1286 16, /* rightshift */
1287 1, /* size (0 = byte, 1 = short, 2 = long) */
1288 16, /* bitsize */
1289 FALSE, /* pc_relative */
1290 0, /* bitpos */
1291 complain_overflow_dont, /* complain_on_overflow */
3ce51288 1292 ppc_elf_unhandled_reloc, /* special_function */
7619e7c7
AM
1293 "R_PPC_EMB_NADDR16_HI", /* name */
1294 FALSE, /* partial_inplace */
1295 0, /* src_mask */
1296 0xffff, /* dst_mask */
1297 FALSE), /* pcrel_offset */
1298
1299 /* The high order 16 bits of the result of the addend minus the address,
1300 plus 1 if the contents of the low 16 bits, treated as a signed number,
1301 is negative. */
1302 HOWTO (R_PPC_EMB_NADDR16_HA, /* type */
1303 16, /* rightshift */
1304 1, /* size (0 = byte, 1 = short, 2 = long) */
1305 16, /* bitsize */
1306 FALSE, /* pc_relative */
1307 0, /* bitpos */
1308 complain_overflow_dont, /* complain_on_overflow */
3ce51288 1309 ppc_elf_unhandled_reloc, /* special_function */
25dbc73a
AM
1310 "R_PPC_EMB_NADDR16_HA", /* name */
1311 FALSE, /* partial_inplace */
1312 0, /* src_mask */
1313 0xffff, /* dst_mask */
1314 FALSE), /* pcrel_offset */
1315
1316 /* 16 bit value resulting from allocating a 4 byte word to hold an
1317 address in the .sdata section, and returning the offset from
1318 _SDA_BASE_ for that relocation. */
1319 HOWTO (R_PPC_EMB_SDAI16, /* type */
1320 0, /* rightshift */
1321 1, /* size (0 = byte, 1 = short, 2 = long) */
1322 16, /* bitsize */
1323 FALSE, /* pc_relative */
1324 0, /* bitpos */
bd6c6e2b 1325 complain_overflow_signed, /* complain_on_overflow */
3ce51288 1326 ppc_elf_unhandled_reloc, /* special_function */
25dbc73a
AM
1327 "R_PPC_EMB_SDAI16", /* name */
1328 FALSE, /* partial_inplace */
1329 0, /* src_mask */
1330 0xffff, /* dst_mask */
1331 FALSE), /* pcrel_offset */
1332
1333 /* 16 bit value resulting from allocating a 4 byte word to hold an
1334 address in the .sdata2 section, and returning the offset from
1335 _SDA2_BASE_ for that relocation. */
1336 HOWTO (R_PPC_EMB_SDA2I16, /* type */
1337 0, /* rightshift */
1338 1, /* size (0 = byte, 1 = short, 2 = long) */
1339 16, /* bitsize */
1340 FALSE, /* pc_relative */
1341 0, /* bitpos */
bd6c6e2b 1342 complain_overflow_signed, /* complain_on_overflow */
3ce51288 1343 ppc_elf_unhandled_reloc, /* special_function */
25dbc73a
AM
1344 "R_PPC_EMB_SDA2I16", /* name */
1345 FALSE, /* partial_inplace */
1346 0, /* src_mask */
1347 0xffff, /* dst_mask */
1348 FALSE), /* pcrel_offset */
1349
1350 /* A sign-extended 16 bit value relative to _SDA2_BASE_, for use with
1351 small data items. */
1352 HOWTO (R_PPC_EMB_SDA2REL, /* type */
1353 0, /* rightshift */
1354 1, /* size (0 = byte, 1 = short, 2 = long) */
1355 16, /* bitsize */
1356 FALSE, /* pc_relative */
1357 0, /* bitpos */
1358 complain_overflow_signed, /* complain_on_overflow */
3ce51288 1359 ppc_elf_unhandled_reloc, /* special_function */
25dbc73a
AM
1360 "R_PPC_EMB_SDA2REL", /* name */
1361 FALSE, /* partial_inplace */
1362 0, /* src_mask */
1363 0xffff, /* dst_mask */
1364 FALSE), /* pcrel_offset */
1365
1366 /* Relocate against either _SDA_BASE_ or _SDA2_BASE_, filling in the 16 bit
1367 signed offset from the appropriate base, and filling in the register
1368 field with the appropriate register (0, 2, or 13). */
1369 HOWTO (R_PPC_EMB_SDA21, /* type */
1370 0, /* rightshift */
1371 2, /* size (0 = byte, 1 = short, 2 = long) */
1372 16, /* bitsize */
1373 FALSE, /* pc_relative */
1374 0, /* bitpos */
1375 complain_overflow_signed, /* complain_on_overflow */
3ce51288 1376 ppc_elf_unhandled_reloc, /* special_function */
25dbc73a
AM
1377 "R_PPC_EMB_SDA21", /* name */
1378 FALSE, /* partial_inplace */
1379 0, /* src_mask */
1380 0xffff, /* dst_mask */
1381 FALSE), /* pcrel_offset */
1382
1383 /* Relocation not handled: R_PPC_EMB_MRKREF */
1384 /* Relocation not handled: R_PPC_EMB_RELSEC16 */
1385 /* Relocation not handled: R_PPC_EMB_RELST_LO */
1386 /* Relocation not handled: R_PPC_EMB_RELST_HI */
1387 /* Relocation not handled: R_PPC_EMB_RELST_HA */
1388 /* Relocation not handled: R_PPC_EMB_BIT_FLD */
1389
1390 /* PC relative relocation against either _SDA_BASE_ or _SDA2_BASE_, filling
1391 in the 16 bit signed offset from the appropriate base, and filling in the
1392 register field with the appropriate register (0, 2, or 13). */
1393 HOWTO (R_PPC_EMB_RELSDA, /* type */
1394 0, /* rightshift */
1395 1, /* size (0 = byte, 1 = short, 2 = long) */
1396 16, /* bitsize */
ddfd6795 1397 FALSE, /* pc_relative */
25dbc73a
AM
1398 0, /* bitpos */
1399 complain_overflow_signed, /* complain_on_overflow */
3ce51288 1400 ppc_elf_unhandled_reloc, /* special_function */
25dbc73a
AM
1401 "R_PPC_EMB_RELSDA", /* name */
1402 FALSE, /* partial_inplace */
1403 0, /* src_mask */
1404 0xffff, /* dst_mask */
1405 FALSE), /* pcrel_offset */
1406
b9c361e0
JL
1407 /* A relative 8 bit branch. */
1408 HOWTO (R_PPC_VLE_REL8, /* type */
1409 1, /* rightshift */
1410 1, /* size (0 = byte, 1 = short, 2 = long) */
1411 8, /* bitsize */
1412 TRUE, /* pc_relative */
1413 0, /* bitpos */
1414 complain_overflow_signed, /* complain_on_overflow */
1415 bfd_elf_generic_reloc, /* special_function */
1416 "R_PPC_VLE_REL8", /* name */
1417 FALSE, /* partial_inplace */
1418 0, /* src_mask */
1419 0xff, /* dst_mask */
1420 TRUE), /* pcrel_offset */
68ffbac6 1421
b9c361e0
JL
1422 /* A relative 15 bit branch. */
1423 HOWTO (R_PPC_VLE_REL15, /* type */
1424 1, /* rightshift */
1425 2, /* size (0 = byte, 1 = short, 2 = long) */
1426 15, /* bitsize */
1427 TRUE, /* pc_relative */
1428 1, /* bitpos */
1429 complain_overflow_signed, /* complain_on_overflow */
1430 bfd_elf_generic_reloc, /* special_function */
1431 "R_PPC_VLE_REL15", /* name */
1432 FALSE, /* partial_inplace */
1433 0, /* src_mask */
dfdaec14 1434 0xfffe, /* dst_mask */
b9c361e0
JL
1435 TRUE), /* pcrel_offset */
1436
68ffbac6 1437 /* A relative 24 bit branch. */
b9c361e0
JL
1438 HOWTO (R_PPC_VLE_REL24, /* type */
1439 1, /* rightshift */
1440 2, /* size (0 = byte, 1 = short, 2 = long) */
1441 24, /* bitsize */
1442 TRUE, /* pc_relative */
1443 1, /* bitpos */
1444 complain_overflow_signed, /* complain_on_overflow */
1445 bfd_elf_generic_reloc, /* special_function */
1446 "R_PPC_VLE_REL24", /* name */
1447 FALSE, /* partial_inplace */
1448 0, /* src_mask */
1449 0x1fffffe, /* dst_mask */
1450 TRUE), /* pcrel_offset */
1451
1452 /* The 16 LSBS in split16a format. */
1453 HOWTO (R_PPC_VLE_LO16A, /* type */
1454 0, /* rightshift */
1455 2, /* size (0 = byte, 1 = short, 2 = long) */
86c95733 1456 16, /* bitsize */
bdaacd3a 1457 FALSE, /* pc_relative */
b9c361e0 1458 0, /* bitpos */
86c95733 1459 complain_overflow_dont, /* complain_on_overflow */
3ce51288 1460 ppc_elf_unhandled_reloc, /* special_function */
b9c361e0
JL
1461 "R_PPC_VLE_LO16A", /* name */
1462 FALSE, /* partial_inplace */
1463 0, /* src_mask */
08dc996f 1464 0x1f07ff, /* dst_mask */
b9c361e0
JL
1465 FALSE), /* pcrel_offset */
1466
1467 /* The 16 LSBS in split16d format. */
1468 HOWTO (R_PPC_VLE_LO16D, /* type */
1469 0, /* rightshift */
1470 2, /* size (0 = byte, 1 = short, 2 = long) */
86c95733 1471 16, /* bitsize */
b9c361e0
JL
1472 FALSE, /* pc_relative */
1473 0, /* bitpos */
86c95733 1474 complain_overflow_dont, /* complain_on_overflow */
3ce51288
AM
1475 ppc_elf_unhandled_reloc, /* special_function */
1476 "R_PPC_VLE_LO16D", /* name */
b9c361e0
JL
1477 FALSE, /* partial_inplace */
1478 0, /* src_mask */
5499c7c7 1479 0x3e007ff, /* dst_mask */
b9c361e0
JL
1480 FALSE), /* pcrel_offset */
1481
1482 /* Bits 16-31 split16a format. */
1483 HOWTO (R_PPC_VLE_HI16A, /* type */
86c95733 1484 16, /* rightshift */
b9c361e0 1485 2, /* size (0 = byte, 1 = short, 2 = long) */
86c95733 1486 16, /* bitsize */
b9c361e0
JL
1487 FALSE, /* pc_relative */
1488 0, /* bitpos */
86c95733 1489 complain_overflow_dont, /* complain_on_overflow */
3ce51288
AM
1490 ppc_elf_unhandled_reloc, /* special_function */
1491 "R_PPC_VLE_HI16A", /* name */
b9c361e0
JL
1492 FALSE, /* partial_inplace */
1493 0, /* src_mask */
08dc996f 1494 0x1f07ff, /* dst_mask */
b9c361e0
JL
1495 FALSE), /* pcrel_offset */
1496
1497 /* Bits 16-31 split16d format. */
1498 HOWTO (R_PPC_VLE_HI16D, /* type */
86c95733 1499 16, /* rightshift */
b9c361e0 1500 2, /* size (0 = byte, 1 = short, 2 = long) */
86c95733 1501 16, /* bitsize */
b9c361e0
JL
1502 FALSE, /* pc_relative */
1503 0, /* bitpos */
86c95733 1504 complain_overflow_dont, /* complain_on_overflow */
3ce51288
AM
1505 ppc_elf_unhandled_reloc, /* special_function */
1506 "R_PPC_VLE_HI16D", /* name */
b9c361e0
JL
1507 FALSE, /* partial_inplace */
1508 0, /* src_mask */
5499c7c7 1509 0x3e007ff, /* dst_mask */
b9c361e0
JL
1510 FALSE), /* pcrel_offset */
1511
1512 /* Bits 16-31 (High Adjusted) in split16a format. */
1513 HOWTO (R_PPC_VLE_HA16A, /* type */
86c95733 1514 16, /* rightshift */
b9c361e0 1515 2, /* size (0 = byte, 1 = short, 2 = long) */
86c95733 1516 16, /* bitsize */
b9c361e0
JL
1517 FALSE, /* pc_relative */
1518 0, /* bitpos */
86c95733 1519 complain_overflow_dont, /* complain_on_overflow */
3ce51288
AM
1520 ppc_elf_unhandled_reloc, /* special_function */
1521 "R_PPC_VLE_HA16A", /* name */
b9c361e0
JL
1522 FALSE, /* partial_inplace */
1523 0, /* src_mask */
08dc996f 1524 0x1f07ff, /* dst_mask */
b9c361e0
JL
1525 FALSE), /* pcrel_offset */
1526
1527 /* Bits 16-31 (High Adjusted) in split16d format. */
1528 HOWTO (R_PPC_VLE_HA16D, /* type */
86c95733 1529 16, /* rightshift */
b9c361e0 1530 2, /* size (0 = byte, 1 = short, 2 = long) */
86c95733 1531 16, /* bitsize */
b9c361e0
JL
1532 FALSE, /* pc_relative */
1533 0, /* bitpos */
86c95733 1534 complain_overflow_dont, /* complain_on_overflow */
3ce51288
AM
1535 ppc_elf_unhandled_reloc, /* special_function */
1536 "R_PPC_VLE_HA16D", /* name */
b9c361e0
JL
1537 FALSE, /* partial_inplace */
1538 0, /* src_mask */
5499c7c7 1539 0x3e007ff, /* dst_mask */
b9c361e0
JL
1540 FALSE), /* pcrel_offset */
1541
86c95733
AM
1542 /* This reloc is like R_PPC_EMB_SDA21 but only applies to e_add16i
1543 instructions. If the register base is 0 then the linker changes
1544 the e_add16i to an e_li instruction. */
1545 HOWTO (R_PPC_VLE_SDA21, /* type */
b9c361e0
JL
1546 0, /* rightshift */
1547 2, /* size (0 = byte, 1 = short, 2 = long) */
86c95733 1548 16, /* bitsize */
b9c361e0
JL
1549 FALSE, /* pc_relative */
1550 0, /* bitpos */
86c95733 1551 complain_overflow_signed, /* complain_on_overflow */
3ce51288
AM
1552 ppc_elf_unhandled_reloc, /* special_function */
1553 "R_PPC_VLE_SDA21", /* name */
b9c361e0
JL
1554 FALSE, /* partial_inplace */
1555 0, /* src_mask */
1556 0xffff, /* dst_mask */
1557 FALSE), /* pcrel_offset */
1558
86c95733 1559 /* Like R_PPC_VLE_SDA21 but ignore overflow. */
b9c361e0
JL
1560 HOWTO (R_PPC_VLE_SDA21_LO, /* type */
1561 0, /* rightshift */
1562 2, /* size (0 = byte, 1 = short, 2 = long) */
86c95733 1563 16, /* bitsize */
b9c361e0
JL
1564 FALSE, /* pc_relative */
1565 0, /* bitpos */
86c95733 1566 complain_overflow_dont, /* complain_on_overflow */
3ce51288 1567 ppc_elf_unhandled_reloc, /* special_function */
b9c361e0
JL
1568 "R_PPC_VLE_SDA21_LO", /* name */
1569 FALSE, /* partial_inplace */
1570 0, /* src_mask */
86c95733 1571 0xffff, /* dst_mask */
b9c361e0
JL
1572 FALSE), /* pcrel_offset */
1573
1574 /* The 16 LSBS relative to _SDA_BASE_ in split16a format. */
1575 HOWTO (R_PPC_VLE_SDAREL_LO16A,/* type */
1576 0, /* rightshift */
1577 2, /* size (0 = byte, 1 = short, 2 = long) */
86c95733 1578 16, /* bitsize */
b9c361e0
JL
1579 FALSE, /* pc_relative */
1580 0, /* bitpos */
3ce51288
AM
1581 complain_overflow_dont, /* complain_on_overflow */
1582 ppc_elf_unhandled_reloc, /* special_function */
1583 "R_PPC_VLE_SDAREL_LO16A", /* name */
b9c361e0
JL
1584 FALSE, /* partial_inplace */
1585 0, /* src_mask */
08dc996f 1586 0x1f07ff, /* dst_mask */
b9c361e0
JL
1587 FALSE), /* pcrel_offset */
1588
1589 /* The 16 LSBS relative to _SDA_BASE_ in split16d format. */
b9c361e0
JL
1590 HOWTO (R_PPC_VLE_SDAREL_LO16D, /* type */
1591 0, /* rightshift */
1592 2, /* size (0 = byte, 1 = short, 2 = long) */
86c95733 1593 16, /* bitsize */
b9c361e0
JL
1594 FALSE, /* pc_relative */
1595 0, /* bitpos */
3ce51288
AM
1596 complain_overflow_dont, /* complain_on_overflow */
1597 ppc_elf_unhandled_reloc, /* special_function */
1598 "R_PPC_VLE_SDAREL_LO16D", /* name */
b9c361e0
JL
1599 FALSE, /* partial_inplace */
1600 0, /* src_mask */
5499c7c7 1601 0x3e007ff, /* dst_mask */
b9c361e0
JL
1602 FALSE), /* pcrel_offset */
1603
1604 /* Bits 16-31 relative to _SDA_BASE_ in split16a format. */
3ce51288 1605 HOWTO (R_PPC_VLE_SDAREL_HI16A, /* type */
86c95733 1606 16, /* rightshift */
b9c361e0 1607 2, /* size (0 = byte, 1 = short, 2 = long) */
86c95733 1608 16, /* bitsize */
b9c361e0
JL
1609 FALSE, /* pc_relative */
1610 0, /* bitpos */
3ce51288
AM
1611 complain_overflow_dont, /* complain_on_overflow */
1612 ppc_elf_unhandled_reloc, /* special_function */
1613 "R_PPC_VLE_SDAREL_HI16A", /* name */
b9c361e0
JL
1614 FALSE, /* partial_inplace */
1615 0, /* src_mask */
08dc996f 1616 0x1f07ff, /* dst_mask */
b9c361e0
JL
1617 FALSE), /* pcrel_offset */
1618
1619 /* Bits 16-31 relative to _SDA_BASE_ in split16d format. */
3ce51288 1620 HOWTO (R_PPC_VLE_SDAREL_HI16D, /* type */
86c95733 1621 16, /* rightshift */
b9c361e0 1622 2, /* size (0 = byte, 1 = short, 2 = long) */
86c95733 1623 16, /* bitsize */
b9c361e0
JL
1624 FALSE, /* pc_relative */
1625 0, /* bitpos */
3ce51288
AM
1626 complain_overflow_dont, /* complain_on_overflow */
1627 ppc_elf_unhandled_reloc, /* special_function */
1628 "R_PPC_VLE_SDAREL_HI16D", /* name */
b9c361e0
JL
1629 FALSE, /* partial_inplace */
1630 0, /* src_mask */
5499c7c7 1631 0x3e007ff, /* dst_mask */
b9c361e0
JL
1632 FALSE), /* pcrel_offset */
1633
1634 /* Bits 16-31 (HA) relative to _SDA_BASE split16a format. */
3ce51288 1635 HOWTO (R_PPC_VLE_SDAREL_HA16A, /* type */
86c95733 1636 16, /* rightshift */
b9c361e0 1637 2, /* size (0 = byte, 1 = short, 2 = long) */
86c95733 1638 16, /* bitsize */
b9c361e0
JL
1639 FALSE, /* pc_relative */
1640 0, /* bitpos */
3ce51288
AM
1641 complain_overflow_dont, /* complain_on_overflow */
1642 ppc_elf_unhandled_reloc, /* special_function */
1643 "R_PPC_VLE_SDAREL_HA16A", /* name */
b9c361e0
JL
1644 FALSE, /* partial_inplace */
1645 0, /* src_mask */
08dc996f 1646 0x1f07ff, /* dst_mask */
b9c361e0
JL
1647 FALSE), /* pcrel_offset */
1648
1649 /* Bits 16-31 (HA) relative to _SDA_BASE split16d format. */
3ce51288 1650 HOWTO (R_PPC_VLE_SDAREL_HA16D, /* type */
86c95733 1651 16, /* rightshift */
b9c361e0 1652 2, /* size (0 = byte, 1 = short, 2 = long) */
86c95733 1653 16, /* bitsize */
b9c361e0
JL
1654 FALSE, /* pc_relative */
1655 0, /* bitpos */
3ce51288
AM
1656 complain_overflow_dont, /* complain_on_overflow */
1657 ppc_elf_unhandled_reloc, /* special_function */
1658 "R_PPC_VLE_SDAREL_HA16D", /* name */
b9c361e0
JL
1659 FALSE, /* partial_inplace */
1660 0, /* src_mask */
5499c7c7 1661 0x3e007ff, /* dst_mask */
b9c361e0
JL
1662 FALSE), /* pcrel_offset */
1663
83eef883
AFB
1664 /* e_li split20 format. */
1665 HOWTO (R_PPC_VLE_ADDR20, /* type */
1666 16, /* rightshift */
1667 2, /* size (0 = byte, 1 = short, 2 = long) */
1668 20, /* bitsize */
1669 FALSE, /* pc_relative */
1670 0, /* bitpos */
1671 complain_overflow_dont, /* complain_on_overflow */
1672 bfd_elf_generic_reloc, /* special_function */
1673 "R_PPC_VLE_ADDR20", /* name */
1674 FALSE, /* partial_inplace */
1675 0, /* src_mask */
1676 0x1f07ff, /* dst_mask */
1677 FALSE), /* pcrel_offset */
1678
e054468f
AM
1679 HOWTO (R_PPC_IRELATIVE, /* type */
1680 0, /* rightshift */
1681 2, /* size (0 = byte, 1 = short, 2 = long) */
1682 32, /* bitsize */
1683 FALSE, /* pc_relative */
1684 0, /* bitpos */
86c95733 1685 complain_overflow_dont, /* complain_on_overflow */
3ce51288 1686 ppc_elf_unhandled_reloc, /* special_function */
e054468f
AM
1687 "R_PPC_IRELATIVE", /* name */
1688 FALSE, /* partial_inplace */
1689 0, /* src_mask */
1690 0xffffffff, /* dst_mask */
1691 FALSE), /* pcrel_offset */
1692
d7128ce4
AM
1693 /* A 16 bit relative relocation. */
1694 HOWTO (R_PPC_REL16, /* type */
1695 0, /* rightshift */
1696 1, /* size (0 = byte, 1 = short, 2 = long) */
1697 16, /* bitsize */
1698 TRUE, /* pc_relative */
1699 0, /* bitpos */
86c95733 1700 complain_overflow_signed, /* complain_on_overflow */
d7128ce4
AM
1701 bfd_elf_generic_reloc, /* special_function */
1702 "R_PPC_REL16", /* name */
1703 FALSE, /* partial_inplace */
1704 0, /* src_mask */
1705 0xffff, /* dst_mask */
1706 TRUE), /* pcrel_offset */
1707
1708 /* A 16 bit relative relocation without overflow. */
1709 HOWTO (R_PPC_REL16_LO, /* type */
1710 0, /* rightshift */
1711 1, /* size (0 = byte, 1 = short, 2 = long) */
1712 16, /* bitsize */
1713 TRUE, /* pc_relative */
1714 0, /* bitpos */
1715 complain_overflow_dont,/* complain_on_overflow */
1716 bfd_elf_generic_reloc, /* special_function */
1717 "R_PPC_REL16_LO", /* name */
1718 FALSE, /* partial_inplace */
1719 0, /* src_mask */
1720 0xffff, /* dst_mask */
1721 TRUE), /* pcrel_offset */
1722
1723 /* The high order 16 bits of a relative address. */
1724 HOWTO (R_PPC_REL16_HI, /* type */
1725 16, /* rightshift */
1726 1, /* size (0 = byte, 1 = short, 2 = long) */
1727 16, /* bitsize */
1728 TRUE, /* pc_relative */
1729 0, /* bitpos */
1730 complain_overflow_dont, /* complain_on_overflow */
1731 bfd_elf_generic_reloc, /* special_function */
1732 "R_PPC_REL16_HI", /* name */
1733 FALSE, /* partial_inplace */
1734 0, /* src_mask */
1735 0xffff, /* dst_mask */
1736 TRUE), /* pcrel_offset */
1737
1738 /* The high order 16 bits of a relative address, plus 1 if the contents of
1739 the low 16 bits, treated as a signed number, is negative. */
1740 HOWTO (R_PPC_REL16_HA, /* type */
1741 16, /* rightshift */
1742 1, /* size (0 = byte, 1 = short, 2 = long) */
1743 16, /* bitsize */
1744 TRUE, /* pc_relative */
1745 0, /* bitpos */
1746 complain_overflow_dont, /* complain_on_overflow */
1747 ppc_elf_addr16_ha_reloc, /* special_function */
1748 "R_PPC_REL16_HA", /* name */
1749 FALSE, /* partial_inplace */
1750 0, /* src_mask */
1751 0xffff, /* dst_mask */
1752 TRUE), /* pcrel_offset */
1753
a680de9a
PB
1754 /* Like R_PPC_REL16_HA but for split field in addpcis. */
1755 HOWTO (R_PPC_REL16DX_HA, /* type */
1756 16, /* rightshift */
1757 2, /* size (0 = byte, 1 = short, 2 = long) */
1758 16, /* bitsize */
1759 TRUE, /* pc_relative */
1760 0, /* bitpos */
1761 complain_overflow_signed, /* complain_on_overflow */
1762 ppc_elf_addr16_ha_reloc, /* special_function */
1763 "R_PPC_REL16DX_HA", /* name */
1764 FALSE, /* partial_inplace */
1765 0, /* src_mask */
1766 0x1fffc1, /* dst_mask */
1767 TRUE), /* pcrel_offset */
1768
7ba71655
AM
1769 /* A split-field reloc for addpcis, non-relative (gas internal use only). */
1770 HOWTO (R_PPC_16DX_HA, /* type */
1771 16, /* rightshift */
1772 2, /* size (0 = byte, 1 = short, 2 = long) */
1773 16, /* bitsize */
1774 FALSE, /* pc_relative */
1775 0, /* bitpos */
1776 complain_overflow_signed, /* complain_on_overflow */
1777 ppc_elf_addr16_ha_reloc, /* special_function */
1778 "R_PPC_16DX_HA", /* name */
1779 FALSE, /* partial_inplace */
1780 0, /* src_mask */
1781 0x1fffc1, /* dst_mask */
1782 FALSE), /* pcrel_offset */
1783
25dbc73a
AM
1784 /* GNU extension to record C++ vtable hierarchy. */
1785 HOWTO (R_PPC_GNU_VTINHERIT, /* type */
1786 0, /* rightshift */
1787 0, /* size (0 = byte, 1 = short, 2 = long) */
1788 0, /* bitsize */
1789 FALSE, /* pc_relative */
1790 0, /* bitpos */
1791 complain_overflow_dont, /* complain_on_overflow */
1792 NULL, /* special_function */
1793 "R_PPC_GNU_VTINHERIT", /* name */
1794 FALSE, /* partial_inplace */
1795 0, /* src_mask */
1796 0, /* dst_mask */
1797 FALSE), /* pcrel_offset */
1798
1799 /* GNU extension to record C++ vtable member usage. */
1800 HOWTO (R_PPC_GNU_VTENTRY, /* type */
1801 0, /* rightshift */
1802 0, /* size (0 = byte, 1 = short, 2 = long) */
1803 0, /* bitsize */
1804 FALSE, /* pc_relative */
1805 0, /* bitpos */
1806 complain_overflow_dont, /* complain_on_overflow */
1807 NULL, /* special_function */
1808 "R_PPC_GNU_VTENTRY", /* name */
7619e7c7
AM
1809 FALSE, /* partial_inplace */
1810 0, /* src_mask */
25dbc73a 1811 0, /* dst_mask */
7619e7c7
AM
1812 FALSE), /* pcrel_offset */
1813
25dbc73a
AM
1814 /* Phony reloc to handle AIX style TOC entries. */
1815 HOWTO (R_PPC_TOC16, /* type */
7619e7c7
AM
1816 0, /* rightshift */
1817 1, /* size (0 = byte, 1 = short, 2 = long) */
1818 16, /* bitsize */
1819 FALSE, /* pc_relative */
1820 0, /* bitpos */
25dbc73a 1821 complain_overflow_signed, /* complain_on_overflow */
3ce51288 1822 ppc_elf_unhandled_reloc, /* special_function */
25dbc73a 1823 "R_PPC_TOC16", /* name */
7619e7c7
AM
1824 FALSE, /* partial_inplace */
1825 0, /* src_mask */
1826 0xffff, /* dst_mask */
1827 FALSE), /* pcrel_offset */
25dbc73a
AM
1828};
1829\f
1830/* Initialize the ppc_elf_howto_table, so that linear accesses can be done. */
1831
1832static void
1833ppc_elf_howto_init (void)
1834{
1835 unsigned int i, type;
1836
1837 for (i = 0;
1838 i < sizeof (ppc_elf_howto_raw) / sizeof (ppc_elf_howto_raw[0]);
1839 i++)
1840 {
1841 type = ppc_elf_howto_raw[i].type;
1842 if (type >= (sizeof (ppc_elf_howto_table)
1843 / sizeof (ppc_elf_howto_table[0])))
1844 abort ();
1845 ppc_elf_howto_table[type] = &ppc_elf_howto_raw[i];
1846 }
1847}
1848
1849static reloc_howto_type *
1850ppc_elf_reloc_type_lookup (bfd *abfd ATTRIBUTE_UNUSED,
1851 bfd_reloc_code_real_type code)
1852{
1853 enum elf_ppc_reloc_type r;
1854
1855 /* Initialize howto table if not already done. */
1856 if (!ppc_elf_howto_table[R_PPC_ADDR32])
1857 ppc_elf_howto_init ();
1858
1859 switch (code)
1860 {
1861 default:
1862 return NULL;
1863
1864 case BFD_RELOC_NONE: r = R_PPC_NONE; break;
1865 case BFD_RELOC_32: r = R_PPC_ADDR32; break;
1866 case BFD_RELOC_PPC_BA26: r = R_PPC_ADDR24; break;
1fe532cf 1867 case BFD_RELOC_PPC64_ADDR16_DS:
25dbc73a 1868 case BFD_RELOC_16: r = R_PPC_ADDR16; break;
1fe532cf 1869 case BFD_RELOC_PPC64_ADDR16_LO_DS:
25dbc73a
AM
1870 case BFD_RELOC_LO16: r = R_PPC_ADDR16_LO; break;
1871 case BFD_RELOC_HI16: r = R_PPC_ADDR16_HI; break;
1872 case BFD_RELOC_HI16_S: r = R_PPC_ADDR16_HA; break;
1873 case BFD_RELOC_PPC_BA16: r = R_PPC_ADDR14; break;
1874 case BFD_RELOC_PPC_BA16_BRTAKEN: r = R_PPC_ADDR14_BRTAKEN; break;
1875 case BFD_RELOC_PPC_BA16_BRNTAKEN: r = R_PPC_ADDR14_BRNTAKEN; break;
1876 case BFD_RELOC_PPC_B26: r = R_PPC_REL24; break;
1877 case BFD_RELOC_PPC_B16: r = R_PPC_REL14; break;
1878 case BFD_RELOC_PPC_B16_BRTAKEN: r = R_PPC_REL14_BRTAKEN; break;
1879 case BFD_RELOC_PPC_B16_BRNTAKEN: r = R_PPC_REL14_BRNTAKEN; break;
1fe532cf 1880 case BFD_RELOC_PPC64_GOT16_DS:
25dbc73a 1881 case BFD_RELOC_16_GOTOFF: r = R_PPC_GOT16; break;
1fe532cf 1882 case BFD_RELOC_PPC64_GOT16_LO_DS:
25dbc73a
AM
1883 case BFD_RELOC_LO16_GOTOFF: r = R_PPC_GOT16_LO; break;
1884 case BFD_RELOC_HI16_GOTOFF: r = R_PPC_GOT16_HI; break;
1885 case BFD_RELOC_HI16_S_GOTOFF: r = R_PPC_GOT16_HA; break;
1886 case BFD_RELOC_24_PLT_PCREL: r = R_PPC_PLTREL24; break;
1887 case BFD_RELOC_PPC_COPY: r = R_PPC_COPY; break;
1888 case BFD_RELOC_PPC_GLOB_DAT: r = R_PPC_GLOB_DAT; break;
1889 case BFD_RELOC_PPC_LOCAL24PC: r = R_PPC_LOCAL24PC; break;
1890 case BFD_RELOC_32_PCREL: r = R_PPC_REL32; break;
1891 case BFD_RELOC_32_PLTOFF: r = R_PPC_PLT32; break;
1892 case BFD_RELOC_32_PLT_PCREL: r = R_PPC_PLTREL32; break;
1fe532cf 1893 case BFD_RELOC_PPC64_PLT16_LO_DS:
25dbc73a
AM
1894 case BFD_RELOC_LO16_PLTOFF: r = R_PPC_PLT16_LO; break;
1895 case BFD_RELOC_HI16_PLTOFF: r = R_PPC_PLT16_HI; break;
1896 case BFD_RELOC_HI16_S_PLTOFF: r = R_PPC_PLT16_HA; break;
1897 case BFD_RELOC_GPREL16: r = R_PPC_SDAREL16; break;
1fe532cf 1898 case BFD_RELOC_PPC64_SECTOFF_DS:
25dbc73a 1899 case BFD_RELOC_16_BASEREL: r = R_PPC_SECTOFF; break;
1fe532cf 1900 case BFD_RELOC_PPC64_SECTOFF_LO_DS:
25dbc73a
AM
1901 case BFD_RELOC_LO16_BASEREL: r = R_PPC_SECTOFF_LO; break;
1902 case BFD_RELOC_HI16_BASEREL: r = R_PPC_SECTOFF_HI; break;
1903 case BFD_RELOC_HI16_S_BASEREL: r = R_PPC_SECTOFF_HA; break;
1904 case BFD_RELOC_CTOR: r = R_PPC_ADDR32; break;
1fe532cf 1905 case BFD_RELOC_PPC64_TOC16_DS:
25dbc73a
AM
1906 case BFD_RELOC_PPC_TOC16: r = R_PPC_TOC16; break;
1907 case BFD_RELOC_PPC_TLS: r = R_PPC_TLS; break;
727fc41e
AM
1908 case BFD_RELOC_PPC_TLSGD: r = R_PPC_TLSGD; break;
1909 case BFD_RELOC_PPC_TLSLD: r = R_PPC_TLSLD; break;
25dbc73a 1910 case BFD_RELOC_PPC_DTPMOD: r = R_PPC_DTPMOD32; break;
1fe532cf 1911 case BFD_RELOC_PPC64_TPREL16_DS:
25dbc73a 1912 case BFD_RELOC_PPC_TPREL16: r = R_PPC_TPREL16; break;
1fe532cf 1913 case BFD_RELOC_PPC64_TPREL16_LO_DS:
25dbc73a
AM
1914 case BFD_RELOC_PPC_TPREL16_LO: r = R_PPC_TPREL16_LO; break;
1915 case BFD_RELOC_PPC_TPREL16_HI: r = R_PPC_TPREL16_HI; break;
1916 case BFD_RELOC_PPC_TPREL16_HA: r = R_PPC_TPREL16_HA; break;
1917 case BFD_RELOC_PPC_TPREL: r = R_PPC_TPREL32; break;
1fe532cf 1918 case BFD_RELOC_PPC64_DTPREL16_DS:
25dbc73a 1919 case BFD_RELOC_PPC_DTPREL16: r = R_PPC_DTPREL16; break;
1fe532cf 1920 case BFD_RELOC_PPC64_DTPREL16_LO_DS:
25dbc73a
AM
1921 case BFD_RELOC_PPC_DTPREL16_LO: r = R_PPC_DTPREL16_LO; break;
1922 case BFD_RELOC_PPC_DTPREL16_HI: r = R_PPC_DTPREL16_HI; break;
1923 case BFD_RELOC_PPC_DTPREL16_HA: r = R_PPC_DTPREL16_HA; break;
1924 case BFD_RELOC_PPC_DTPREL: r = R_PPC_DTPREL32; break;
1925 case BFD_RELOC_PPC_GOT_TLSGD16: r = R_PPC_GOT_TLSGD16; break;
1926 case BFD_RELOC_PPC_GOT_TLSGD16_LO: r = R_PPC_GOT_TLSGD16_LO; break;
1927 case BFD_RELOC_PPC_GOT_TLSGD16_HI: r = R_PPC_GOT_TLSGD16_HI; break;
1928 case BFD_RELOC_PPC_GOT_TLSGD16_HA: r = R_PPC_GOT_TLSGD16_HA; break;
1929 case BFD_RELOC_PPC_GOT_TLSLD16: r = R_PPC_GOT_TLSLD16; break;
1930 case BFD_RELOC_PPC_GOT_TLSLD16_LO: r = R_PPC_GOT_TLSLD16_LO; break;
1931 case BFD_RELOC_PPC_GOT_TLSLD16_HI: r = R_PPC_GOT_TLSLD16_HI; break;
1932 case BFD_RELOC_PPC_GOT_TLSLD16_HA: r = R_PPC_GOT_TLSLD16_HA; break;
1933 case BFD_RELOC_PPC_GOT_TPREL16: r = R_PPC_GOT_TPREL16; break;
1934 case BFD_RELOC_PPC_GOT_TPREL16_LO: r = R_PPC_GOT_TPREL16_LO; break;
1935 case BFD_RELOC_PPC_GOT_TPREL16_HI: r = R_PPC_GOT_TPREL16_HI; break;
1936 case BFD_RELOC_PPC_GOT_TPREL16_HA: r = R_PPC_GOT_TPREL16_HA; break;
1937 case BFD_RELOC_PPC_GOT_DTPREL16: r = R_PPC_GOT_DTPREL16; break;
1938 case BFD_RELOC_PPC_GOT_DTPREL16_LO: r = R_PPC_GOT_DTPREL16_LO; break;
1939 case BFD_RELOC_PPC_GOT_DTPREL16_HI: r = R_PPC_GOT_DTPREL16_HI; break;
1940 case BFD_RELOC_PPC_GOT_DTPREL16_HA: r = R_PPC_GOT_DTPREL16_HA; break;
1941 case BFD_RELOC_PPC_EMB_NADDR32: r = R_PPC_EMB_NADDR32; break;
1942 case BFD_RELOC_PPC_EMB_NADDR16: r = R_PPC_EMB_NADDR16; break;
1943 case BFD_RELOC_PPC_EMB_NADDR16_LO: r = R_PPC_EMB_NADDR16_LO; break;
1944 case BFD_RELOC_PPC_EMB_NADDR16_HI: r = R_PPC_EMB_NADDR16_HI; break;
1945 case BFD_RELOC_PPC_EMB_NADDR16_HA: r = R_PPC_EMB_NADDR16_HA; break;
1946 case BFD_RELOC_PPC_EMB_SDAI16: r = R_PPC_EMB_SDAI16; break;
1947 case BFD_RELOC_PPC_EMB_SDA2I16: r = R_PPC_EMB_SDA2I16; break;
1948 case BFD_RELOC_PPC_EMB_SDA2REL: r = R_PPC_EMB_SDA2REL; break;
1949 case BFD_RELOC_PPC_EMB_SDA21: r = R_PPC_EMB_SDA21; break;
1950 case BFD_RELOC_PPC_EMB_MRKREF: r = R_PPC_EMB_MRKREF; break;
1951 case BFD_RELOC_PPC_EMB_RELSEC16: r = R_PPC_EMB_RELSEC16; break;
1952 case BFD_RELOC_PPC_EMB_RELST_LO: r = R_PPC_EMB_RELST_LO; break;
1953 case BFD_RELOC_PPC_EMB_RELST_HI: r = R_PPC_EMB_RELST_HI; break;
1954 case BFD_RELOC_PPC_EMB_RELST_HA: r = R_PPC_EMB_RELST_HA; break;
1955 case BFD_RELOC_PPC_EMB_BIT_FLD: r = R_PPC_EMB_BIT_FLD; break;
1956 case BFD_RELOC_PPC_EMB_RELSDA: r = R_PPC_EMB_RELSDA; break;
b9c361e0
JL
1957 case BFD_RELOC_PPC_VLE_REL8: r = R_PPC_VLE_REL8; break;
1958 case BFD_RELOC_PPC_VLE_REL15: r = R_PPC_VLE_REL15; break;
1959 case BFD_RELOC_PPC_VLE_REL24: r = R_PPC_VLE_REL24; break;
1960 case BFD_RELOC_PPC_VLE_LO16A: r = R_PPC_VLE_LO16A; break;
1961 case BFD_RELOC_PPC_VLE_LO16D: r = R_PPC_VLE_LO16D; break;
1962 case BFD_RELOC_PPC_VLE_HI16A: r = R_PPC_VLE_HI16A; break;
1963 case BFD_RELOC_PPC_VLE_HI16D: r = R_PPC_VLE_HI16D; break;
1964 case BFD_RELOC_PPC_VLE_HA16A: r = R_PPC_VLE_HA16A; break;
1965 case BFD_RELOC_PPC_VLE_HA16D: r = R_PPC_VLE_HA16D; break;
1966 case BFD_RELOC_PPC_VLE_SDA21: r = R_PPC_VLE_SDA21; break;
1967 case BFD_RELOC_PPC_VLE_SDA21_LO: r = R_PPC_VLE_SDA21_LO; break;
1968 case BFD_RELOC_PPC_VLE_SDAREL_LO16A:
1969 r = R_PPC_VLE_SDAREL_LO16A;
1970 break;
1971 case BFD_RELOC_PPC_VLE_SDAREL_LO16D:
1972 r = R_PPC_VLE_SDAREL_LO16D;
1973 break;
1974 case BFD_RELOC_PPC_VLE_SDAREL_HI16A:
1975 r = R_PPC_VLE_SDAREL_HI16A;
1976 break;
1977 case BFD_RELOC_PPC_VLE_SDAREL_HI16D:
1978 r = R_PPC_VLE_SDAREL_HI16D;
1979 break;
1980 case BFD_RELOC_PPC_VLE_SDAREL_HA16A:
1981 r = R_PPC_VLE_SDAREL_HA16A;
1982 break;
1983 case BFD_RELOC_PPC_VLE_SDAREL_HA16D:
1984 r = R_PPC_VLE_SDAREL_HA16D;
1985 break;
d7128ce4
AM
1986 case BFD_RELOC_16_PCREL: r = R_PPC_REL16; break;
1987 case BFD_RELOC_LO16_PCREL: r = R_PPC_REL16_LO; break;
1988 case BFD_RELOC_HI16_PCREL: r = R_PPC_REL16_HI; break;
1989 case BFD_RELOC_HI16_S_PCREL: r = R_PPC_REL16_HA; break;
7ba71655 1990 case BFD_RELOC_PPC_16DX_HA: r = R_PPC_16DX_HA; break;
a680de9a 1991 case BFD_RELOC_PPC_REL16DX_HA: r = R_PPC_REL16DX_HA; break;
25dbc73a
AM
1992 case BFD_RELOC_VTABLE_INHERIT: r = R_PPC_GNU_VTINHERIT; break;
1993 case BFD_RELOC_VTABLE_ENTRY: r = R_PPC_GNU_VTENTRY; break;
1994 }
1995
1996 return ppc_elf_howto_table[r];
1997};
1998
157090f7
AM
1999static reloc_howto_type *
2000ppc_elf_reloc_name_lookup (bfd *abfd ATTRIBUTE_UNUSED,
2001 const char *r_name)
2002{
2003 unsigned int i;
2004
2005 for (i = 0;
2006 i < sizeof (ppc_elf_howto_raw) / sizeof (ppc_elf_howto_raw[0]);
2007 i++)
2008 if (ppc_elf_howto_raw[i].name != NULL
2009 && strcasecmp (ppc_elf_howto_raw[i].name, r_name) == 0)
2010 return &ppc_elf_howto_raw[i];
2011
2012 return NULL;
2013}
2014
25dbc73a
AM
2015/* Set the howto pointer for a PowerPC ELF reloc. */
2016
2017static void
4aef7643 2018ppc_elf_info_to_howto (bfd *abfd,
25dbc73a
AM
2019 arelent *cache_ptr,
2020 Elf_Internal_Rela *dst)
2021{
cd21f5da
NC
2022 unsigned int r_type;
2023
25dbc73a
AM
2024 /* Initialize howto table if not already done. */
2025 if (!ppc_elf_howto_table[R_PPC_ADDR32])
2026 ppc_elf_howto_init ();
2027
cd21f5da
NC
2028 r_type = ELF32_R_TYPE (dst->r_info);
2029 if (r_type >= R_PPC_max)
2030 {
695344c0 2031 /* xgettext:c-format */
871b3ab2 2032 _bfd_error_handler (_("%pB: unrecognised PPC reloc number: %d"),
4eca0228 2033 abfd, r_type);
cd21f5da
NC
2034 bfd_set_error (bfd_error_bad_value);
2035 r_type = R_PPC_NONE;
2036 }
2037 cache_ptr->howto = ppc_elf_howto_table[r_type];
375de94a
AM
2038
2039 /* Just because the above assert didn't trigger doesn't mean that
2040 ELF32_R_TYPE (dst->r_info) is necessarily a valid relocation. */
2041 if (!cache_ptr->howto)
2042 {
695344c0 2043 /* xgettext:c-format */
871b3ab2 2044 _bfd_error_handler (_("%pB: invalid relocation type %d"),
4eca0228 2045 abfd, r_type);
375de94a
AM
2046 bfd_set_error (bfd_error_bad_value);
2047
2048 cache_ptr->howto = ppc_elf_howto_table[R_PPC_NONE];
2049 }
25dbc73a
AM
2050}
2051
d7128ce4 2052/* Handle the R_PPC_ADDR16_HA and R_PPC_REL16_HA relocs. */
25dbc73a
AM
2053
2054static bfd_reloc_status_type
4aef7643 2055ppc_elf_addr16_ha_reloc (bfd *abfd,
25dbc73a
AM
2056 arelent *reloc_entry,
2057 asymbol *symbol,
4aef7643 2058 void *data,
25dbc73a
AM
2059 asection *input_section,
2060 bfd *output_bfd,
2061 char **error_message ATTRIBUTE_UNUSED)
2062{
a680de9a
PB
2063 enum elf_ppc_reloc_type r_type;
2064 long insn;
2065 bfd_size_type octets;
2066 bfd_vma value;
25dbc73a
AM
2067
2068 if (output_bfd != NULL)
2069 {
2070 reloc_entry->address += input_section->output_offset;
2071 return bfd_reloc_ok;
2072 }
2073
a680de9a
PB
2074 reloc_entry->addend += 0x8000;
2075 r_type = reloc_entry->howto->type;
2076 if (r_type != R_PPC_REL16DX_HA)
2077 return bfd_reloc_continue;
2078
2079 value = 0;
2080 if (!bfd_is_com_section (symbol->section))
2081 value = symbol->value;
2082 value += (reloc_entry->addend
2083 + symbol->section->output_offset
2084 + symbol->section->output_section->vma);
2085 value -= (reloc_entry->address
2086 + input_section->output_offset
2087 + input_section->output_section->vma);
2088 value >>= 16;
2089
2090 octets = reloc_entry->address * bfd_octets_per_byte (abfd);
2091 insn = bfd_get_32 (abfd, (bfd_byte *) data + octets);
2092 insn &= ~0x1fffc1;
2093 insn |= (value & 0xffc1) | ((value & 0x3e) << 15);
2094 bfd_put_32 (abfd, insn, (bfd_byte *) data + octets);
2095 return bfd_reloc_ok;
25dbc73a
AM
2096}
2097
2098static bfd_reloc_status_type
2099ppc_elf_unhandled_reloc (bfd *abfd,
2100 arelent *reloc_entry,
2101 asymbol *symbol,
2102 void *data,
2103 asection *input_section,
2104 bfd *output_bfd,
2105 char **error_message)
2106{
2107 /* If this is a relocatable link (output_bfd test tells us), just
2108 call the generic function. Any adjustment will be done at final
2109 link time. */
2110 if (output_bfd != NULL)
2111 return bfd_elf_generic_reloc (abfd, reloc_entry, symbol, data,
2112 input_section, output_bfd, error_message);
2113
2114 if (error_message != NULL)
2115 {
2116 static char buf[60];
2117 sprintf (buf, _("generic linker can't handle %s"),
2118 reloc_entry->howto->name);
2119 *error_message = buf;
2120 }
2121 return bfd_reloc_dangerous;
2122}
2123\f
2124/* Sections created by the linker. */
2125
2126typedef struct elf_linker_section
2127{
c9a2f333 2128 /* Pointer to the bfd section. */
25dbc73a 2129 asection *section;
c9a2f333
AM
2130 /* Section name. */
2131 const char *name;
2132 /* Associated bss section name. */
2133 const char *bss_name;
2134 /* Associated symbol name. */
2135 const char *sym_name;
046183de
AM
2136 /* Associated symbol. */
2137 struct elf_link_hash_entry *sym;
25dbc73a
AM
2138} elf_linker_section_t;
2139
2140/* Linked list of allocated pointer entries. This hangs off of the
2141 symbol lists, and provides allows us to return different pointers,
2142 based on different addend's. */
2143
2144typedef struct elf_linker_section_pointers
2145{
2146 /* next allocated pointer for this symbol */
2147 struct elf_linker_section_pointers *next;
2148 /* offset of pointer from beginning of section */
2149 bfd_vma offset;
2150 /* addend used */
2151 bfd_vma addend;
2152 /* which linker section this is */
2153 elf_linker_section_t *lsect;
25dbc73a
AM
2154} elf_linker_section_pointers_t;
2155
2156struct ppc_elf_obj_tdata
2157{
2158 struct elf_obj_tdata elf;
2159
2160 /* A mapping from local symbols to offsets into the various linker
2161 sections added. This is index by the symbol index. */
2162 elf_linker_section_pointers_t **linker_section_pointers;
016687f8
AM
2163
2164 /* Flags used to auto-detect plt type. */
2165 unsigned int makes_plt_call : 1;
2166 unsigned int has_rel16 : 1;
25dbc73a
AM
2167};
2168
2169#define ppc_elf_tdata(bfd) \
2170 ((struct ppc_elf_obj_tdata *) (bfd)->tdata.any)
7619e7c7 2171
25dbc73a
AM
2172#define elf_local_ptr_offsets(bfd) \
2173 (ppc_elf_tdata (bfd)->linker_section_pointers)
7619e7c7 2174
0c8d6e5c
AM
2175#define is_ppc_elf(bfd) \
2176 (bfd_get_flavour (bfd) == bfd_target_elf_flavour \
4dfe6ac6 2177 && elf_object_id (bfd) == PPC32_ELF_DATA)
0c8d6e5c 2178
25dbc73a 2179/* Override the generic function because we store some extras. */
7619e7c7 2180
25dbc73a
AM
2181static bfd_boolean
2182ppc_elf_mkobject (bfd *abfd)
2183{
0ffa91dd 2184 return bfd_elf_allocate_object (abfd, sizeof (struct ppc_elf_obj_tdata),
4dfe6ac6 2185 PPC32_ELF_DATA);
25dbc73a 2186}
7619e7c7 2187
14b57c7c
AM
2188/* When defaulting arch/mach, decode apuinfo to find a better match. */
2189
2190bfd_boolean
2191_bfd_elf_ppc_set_arch (bfd *abfd)
2192{
2193 unsigned long mach = 0;
2194 asection *s;
2195 unsigned char *contents;
2196
2197 if (abfd->arch_info->bits_per_word == 32
2198 && bfd_big_endian (abfd))
2199 {
2200
2201 for (s = abfd->sections; s != NULL; s = s->next)
2202 if ((elf_section_data (s)->this_hdr.sh_flags & SHF_PPC_VLE) != 0)
2203 break;
2204 if (s != NULL)
2205 mach = bfd_mach_ppc_vle;
2206 }
2207
2208 if (mach == 0)
2209 {
2210 s = bfd_get_section_by_name (abfd, APUINFO_SECTION_NAME);
2211 if (s != NULL && bfd_malloc_and_get_section (abfd, s, &contents))
2212 {
2213 unsigned int apuinfo_size = bfd_get_32 (abfd, contents + 4);
2214 unsigned int i;
2215
2216 for (i = 20; i < apuinfo_size + 20 && i + 4 <= s->size; i += 4)
2217 {
2218 unsigned int val = bfd_get_32 (abfd, contents + i);
2219 switch (val >> 16)
2220 {
2221 case PPC_APUINFO_PMR:
2222 case PPC_APUINFO_RFMCI:
2223 if (mach == 0)
2224 mach = bfd_mach_ppc_titan;
2225 break;
2226
2227 case PPC_APUINFO_ISEL:
2228 case PPC_APUINFO_CACHELCK:
2229 if (mach == bfd_mach_ppc_titan)
2230 mach = bfd_mach_ppc_e500mc;
2231 break;
2232
2233 case PPC_APUINFO_SPE:
2234 case PPC_APUINFO_EFS:
2235 case PPC_APUINFO_BRLOCK:
2236 if (mach != bfd_mach_ppc_vle)
2237 mach = bfd_mach_ppc_e500;
8941017b 2238 break;
14b57c7c
AM
2239
2240 case PPC_APUINFO_VLE:
2241 mach = bfd_mach_ppc_vle;
2242 break;
2243
2244 default:
2245 mach = -1ul;
2246 }
2247 }
2248 free (contents);
2249 }
2250 }
2251
2252 if (mach != 0 && mach != -1ul)
2253 {
2254 const bfd_arch_info_type *arch;
2255
2256 for (arch = abfd->arch_info->next; arch; arch = arch->next)
2257 if (arch->mach == mach)
2258 {
2259 abfd->arch_info = arch;
2260 break;
2261 }
2262 }
2263 return TRUE;
2264}
2265
25dbc73a 2266/* Fix bad default arch selected for a 32 bit input bfd when the
14b57c7c 2267 default is 64 bit. Also select arch based on apuinfo. */
7619e7c7 2268
25dbc73a
AM
2269static bfd_boolean
2270ppc_elf_object_p (bfd *abfd)
2271{
14b57c7c
AM
2272 if (!abfd->arch_info->the_default)
2273 return TRUE;
2274
2275 if (abfd->arch_info->bits_per_word == 64)
25dbc73a
AM
2276 {
2277 Elf_Internal_Ehdr *i_ehdr = elf_elfheader (abfd);
7619e7c7 2278
25dbc73a
AM
2279 if (i_ehdr->e_ident[EI_CLASS] == ELFCLASS32)
2280 {
2281 /* Relies on arch after 64 bit default being 32 bit default. */
2282 abfd->arch_info = abfd->arch_info->next;
2283 BFD_ASSERT (abfd->arch_info->bits_per_word == 32);
2284 }
2285 }
14b57c7c 2286 return _bfd_elf_ppc_set_arch (abfd);
25dbc73a 2287}
7619e7c7 2288
25dbc73a 2289/* Function to set whether a module needs the -mrelocatable bit set. */
7619e7c7 2290
25dbc73a
AM
2291static bfd_boolean
2292ppc_elf_set_private_flags (bfd *abfd, flagword flags)
2293{
2294 BFD_ASSERT (!elf_flags_init (abfd)
2295 || elf_elfheader (abfd)->e_flags == flags);
7619e7c7 2296
25dbc73a
AM
2297 elf_elfheader (abfd)->e_flags = flags;
2298 elf_flags_init (abfd) = TRUE;
2299 return TRUE;
2300}
2301
25dbc73a 2302/* Support for core dump NOTE sections. */
deaaf2f3 2303
b34976b6 2304static bfd_boolean
25dbc73a 2305ppc_elf_grok_prstatus (bfd *abfd, Elf_Internal_Note *note)
252b5132 2306{
25dbc73a
AM
2307 int offset;
2308 unsigned int size;
252b5132 2309
25dbc73a
AM
2310 switch (note->descsz)
2311 {
2312 default:
2313 return FALSE;
252b5132 2314
25dbc73a
AM
2315 case 268: /* Linux/PPC. */
2316 /* pr_cursig */
228e534f 2317 elf_tdata (abfd)->core->signal = bfd_get_16 (abfd, note->descdata + 12);
deaaf2f3 2318
25dbc73a 2319 /* pr_pid */
228e534f 2320 elf_tdata (abfd)->core->lwpid = bfd_get_32 (abfd, note->descdata + 24);
9abc968f 2321
25dbc73a
AM
2322 /* pr_reg */
2323 offset = 72;
2324 size = 192;
deaaf2f3 2325
25dbc73a
AM
2326 break;
2327 }
deaaf2f3 2328
25dbc73a
AM
2329 /* Make a ".reg/999" section. */
2330 return _bfd_elfcore_make_pseudosection (abfd, ".reg",
2331 size, note->descpos + offset);
2332}
252b5132 2333
25dbc73a
AM
2334static bfd_boolean
2335ppc_elf_grok_psinfo (bfd *abfd, Elf_Internal_Note *note)
2336{
2337 switch (note->descsz)
deaaf2f3 2338 {
25dbc73a
AM
2339 default:
2340 return FALSE;
deaaf2f3 2341
25dbc73a 2342 case 128: /* Linux/PPC elf_prpsinfo. */
228e534f 2343 elf_tdata (abfd)->core->pid
bc989cdc 2344 = bfd_get_32 (abfd, note->descdata + 16);
228e534f 2345 elf_tdata (abfd)->core->program
25dbc73a 2346 = _bfd_elfcore_strndup (abfd, note->descdata + 32, 16);
228e534f 2347 elf_tdata (abfd)->core->command
25dbc73a
AM
2348 = _bfd_elfcore_strndup (abfd, note->descdata + 48, 80);
2349 }
9abc968f 2350
25dbc73a
AM
2351 /* Note that for some reason, a spurious space is tacked
2352 onto the end of the args in some (at least one anyway)
2353 implementations, so strip it off if it exists. */
70bccea4 2354
25dbc73a 2355 {
228e534f 2356 char *command = elf_tdata (abfd)->core->command;
25dbc73a 2357 int n = strlen (command);
70bccea4 2358
25dbc73a
AM
2359 if (0 < n && command[n - 1] == ' ')
2360 command[n - 1] = '\0';
2361 }
deaaf2f3 2362
25dbc73a
AM
2363 return TRUE;
2364}
deaaf2f3 2365
183e98be
AM
2366static char *
2367ppc_elf_write_core_note (bfd *abfd, char *buf, int *bufsiz, int note_type, ...)
2368{
2369 switch (note_type)
2370 {
2371 default:
2372 return NULL;
2373
2374 case NT_PRPSINFO:
2375 {
2376 char data[128];
2377 va_list ap;
2378
2379 va_start (ap, note_type);
75cd47ed 2380 memset (data, 0, sizeof (data));
183e98be
AM
2381 strncpy (data + 32, va_arg (ap, const char *), 16);
2382 strncpy (data + 48, va_arg (ap, const char *), 80);
2383 va_end (ap);
2384 return elfcore_write_note (abfd, buf, bufsiz,
2385 "CORE", note_type, data, sizeof (data));
2386 }
2387
2388 case NT_PRSTATUS:
2389 {
2390 char data[268];
2391 va_list ap;
2392 long pid;
2393 int cursig;
2394 const void *greg;
2395
2396 va_start (ap, note_type);
2397 memset (data, 0, 72);
2398 pid = va_arg (ap, long);
2399 bfd_put_32 (abfd, pid, data + 24);
2400 cursig = va_arg (ap, int);
2401 bfd_put_16 (abfd, cursig, data + 12);
2402 greg = va_arg (ap, const void *);
2403 memcpy (data + 72, greg, 192);
2404 memset (data + 264, 0, 4);
2405 va_end (ap);
2406 return elfcore_write_note (abfd, buf, bufsiz,
2407 "CORE", note_type, data, sizeof (data));
2408 }
2409 }
2410}
2411
b9c361e0 2412static flagword
68ffbac6 2413ppc_elf_lookup_section_flags (char *flag_name)
b9c361e0
JL
2414{
2415
2416 if (!strcmp (flag_name, "SHF_PPC_VLE"))
2417 return SHF_PPC_VLE;
2418
2419 return 0;
2420}
2421
25dbc73a
AM
2422/* Return address for Ith PLT stub in section PLT, for relocation REL
2423 or (bfd_vma) -1 if it should not be included. */
deaaf2f3 2424
25dbc73a
AM
2425static bfd_vma
2426ppc_elf_plt_sym_val (bfd_vma i ATTRIBUTE_UNUSED,
2427 const asection *plt ATTRIBUTE_UNUSED,
2428 const arelent *rel)
2429{
2430 return rel->address;
2431}
deaaf2f3 2432
25dbc73a 2433/* Handle a PowerPC specific section when reading an object file. This
6dc132d9
L
2434 is called when bfd_section_from_shdr finds a section with an unknown
2435 type. */
deaaf2f3 2436
25dbc73a 2437static bfd_boolean
6dc132d9
L
2438ppc_elf_section_from_shdr (bfd *abfd,
2439 Elf_Internal_Shdr *hdr,
2440 const char *name,
2441 int shindex)
25dbc73a
AM
2442{
2443 asection *newsect;
2444 flagword flags;
d1c6de6f 2445
6dc132d9 2446 if (! _bfd_elf_make_section_from_shdr (abfd, hdr, name, shindex))
25dbc73a 2447 return FALSE;
deaaf2f3 2448
25dbc73a
AM
2449 newsect = hdr->bfd_section;
2450 flags = bfd_get_section_flags (abfd, newsect);
2451 if (hdr->sh_flags & SHF_EXCLUDE)
2452 flags |= SEC_EXCLUDE;
9abc968f 2453
25dbc73a
AM
2454 if (hdr->sh_type == SHT_ORDERED)
2455 flags |= SEC_SORT_ENTRIES;
d1c6de6f 2456
25dbc73a
AM
2457 bfd_set_section_flags (abfd, newsect, flags);
2458 return TRUE;
2459}
2460
2461/* Set up any other section flags and such that may be necessary. */
2462
2463static bfd_boolean
2464ppc_elf_fake_sections (bfd *abfd ATTRIBUTE_UNUSED,
2465 Elf_Internal_Shdr *shdr,
2466 asection *asect)
2467{
25dbc73a
AM
2468 if ((asect->flags & SEC_SORT_ENTRIES) != 0)
2469 shdr->sh_type = SHT_ORDERED;
2470
2471 return TRUE;
2472}
2473
2474/* If we have .sbss2 or .PPC.EMB.sbss0 output sections, we
2475 need to bump up the number of section headers. */
2476
2477static int
a6b96beb
AM
2478ppc_elf_additional_program_headers (bfd *abfd,
2479 struct bfd_link_info *info ATTRIBUTE_UNUSED)
25dbc73a
AM
2480{
2481 asection *s;
2482 int ret = 0;
d1c6de6f 2483
25dbc73a
AM
2484 s = bfd_get_section_by_name (abfd, ".sbss2");
2485 if (s != NULL && (s->flags & SEC_ALLOC) != 0)
2486 ++ret;
d1c6de6f 2487
25dbc73a
AM
2488 s = bfd_get_section_by_name (abfd, ".PPC.EMB.sbss0");
2489 if (s != NULL && (s->flags & SEC_ALLOC) != 0)
2490 ++ret;
deaaf2f3 2491
25dbc73a
AM
2492 return ret;
2493}
deaaf2f3 2494
68ffbac6 2495/* Modify the segment map for VLE executables. */
b9c361e0
JL
2496
2497bfd_boolean
2498ppc_elf_modify_segment_map (bfd *abfd,
2499 struct bfd_link_info *info ATTRIBUTE_UNUSED)
2500{
f7d69005 2501 struct elf_segment_map *m;
b9c361e0
JL
2502
2503 /* At this point in the link, output sections have already been sorted by
2504 LMA and assigned to segments. All that is left to do is to ensure
2505 there is no mixing of VLE & non-VLE sections in a text segment.
2506 If we find that case, we split the segment.
2507 We maintain the original output section order. */
2508
12bd6957 2509 for (m = elf_seg_map (abfd); m != NULL; m = m->next)
b9c361e0 2510 {
f7d69005
AM
2511 struct elf_segment_map *n;
2512 bfd_size_type amt;
2513 unsigned int j, k;
2514 unsigned int p_flags;
2515
2516 if (m->p_type != PT_LOAD || m->count == 0)
b9c361e0
JL
2517 continue;
2518
f7d69005 2519 for (p_flags = PF_R, j = 0; j != m->count; ++j)
b9c361e0 2520 {
f7d69005
AM
2521 if ((m->sections[j]->flags & SEC_READONLY) == 0)
2522 p_flags |= PF_W;
2523 if ((m->sections[j]->flags & SEC_CODE) != 0)
2524 {
2525 p_flags |= PF_X;
2526 if ((elf_section_flags (m->sections[j]) & SHF_PPC_VLE) != 0)
2527 p_flags |= PF_PPC_VLE;
2528 break;
2529 }
2530 }
2531 if (j != m->count)
2532 while (++j != m->count)
2533 {
2534 unsigned int p_flags1 = PF_R;
94caa966 2535
f7d69005
AM
2536 if ((m->sections[j]->flags & SEC_READONLY) == 0)
2537 p_flags1 |= PF_W;
2538 if ((m->sections[j]->flags & SEC_CODE) != 0)
2539 {
2540 p_flags1 |= PF_X;
2541 if ((elf_section_flags (m->sections[j]) & SHF_PPC_VLE) != 0)
2542 p_flags1 |= PF_PPC_VLE;
2543 if (((p_flags1 ^ p_flags) & PF_PPC_VLE) != 0)
2544 break;
2545 }
2546 p_flags |= p_flags1;
2547 }
2548 /* If we're splitting a segment which originally contained rw
2549 sections then those sections might now only be in one of the
2550 two parts. So always set p_flags if splitting, even if we
2551 are being called for objcopy with p_flags_valid set. */
2552 if (j != m->count || !m->p_flags_valid)
2553 {
2554 m->p_flags_valid = 1;
2555 m->p_flags = p_flags;
2556 }
2557 if (j == m->count)
b9c361e0
JL
2558 continue;
2559
f7d69005 2560 /* Sections 0..j-1 stay in this (current) segment,
b9c361e0
JL
2561 the remainder are put in a new segment.
2562 The scan resumes with the new segment. */
2563
b9c361e0
JL
2564 amt = sizeof (struct elf_segment_map);
2565 amt += (m->count - j - 1) * sizeof (asection *);
2566 n = (struct elf_segment_map *) bfd_zalloc (abfd, amt);
2567 if (n == NULL)
954b63d4 2568 return FALSE;
b9c361e0
JL
2569
2570 n->p_type = PT_LOAD;
b9c361e0
JL
2571 n->count = m->count - j;
2572 for (k = 0; k < n->count; ++k)
f7d69005
AM
2573 n->sections[k] = m->sections[j + k];
2574 m->count = j;
2575 m->p_size_valid = 0;
b9c361e0
JL
2576 n->next = m->next;
2577 m->next = n;
b9c361e0
JL
2578 }
2579
2580 return TRUE;
2581}
2582
25dbc73a
AM
2583/* Add extra PPC sections -- Note, for now, make .sbss2 and
2584 .PPC.EMB.sbss0 a normal section, and not a bss section so
2585 that the linker doesn't crater when trying to make more than
2586 2 sections. */
e656e369 2587
b35d266b 2588static const struct bfd_elf_special_section ppc_elf_special_sections[] =
7f4d3958 2589{
14b57c7c
AM
2590 { STRING_COMMA_LEN (".plt"), 0, SHT_NOBITS, SHF_ALLOC + SHF_EXECINSTR },
2591 { STRING_COMMA_LEN (".sbss"), -2, SHT_NOBITS, SHF_ALLOC + SHF_WRITE },
2592 { STRING_COMMA_LEN (".sbss2"), -2, SHT_PROGBITS, SHF_ALLOC },
2593 { STRING_COMMA_LEN (".sdata"), -2, SHT_PROGBITS, SHF_ALLOC + SHF_WRITE },
2594 { STRING_COMMA_LEN (".sdata2"), -2, SHT_PROGBITS, SHF_ALLOC },
2595 { STRING_COMMA_LEN (".tags"), 0, SHT_ORDERED, SHF_ALLOC },
2596 { STRING_COMMA_LEN (APUINFO_SECTION_NAME), 0, SHT_NOTE, 0 },
2597 { STRING_COMMA_LEN (".PPC.EMB.sbss0"), 0, SHT_PROGBITS, SHF_ALLOC },
2598 { STRING_COMMA_LEN (".PPC.EMB.sdata0"), 0, SHT_PROGBITS, SHF_ALLOC },
2599 { NULL, 0, 0, 0, 0 }
7f4d3958
L
2600};
2601
551b43fd
AM
2602/* This is what we want for new plt/got. */
2603static struct bfd_elf_special_section ppc_alt_plt =
07d6d2b8 2604 { STRING_COMMA_LEN (".plt"), 0, SHT_PROGBITS, SHF_ALLOC };
551b43fd
AM
2605
2606static const struct bfd_elf_special_section *
4aef7643 2607ppc_elf_get_sec_type_attr (bfd *abfd, asection *sec)
7f4d3958 2608{
b35d266b 2609 const struct bfd_elf_special_section *ssect;
551b43fd
AM
2610
2611 /* See if this is one of the special sections. */
2612 if (sec->name == NULL)
2613 return NULL;
2614
2615 ssect = _bfd_elf_get_special_section (sec->name, ppc_elf_special_sections,
2616 sec->use_rela_p);
2617 if (ssect != NULL)
2618 {
2619 if (ssect == ppc_elf_special_sections && (sec->flags & SEC_LOAD) != 0)
2620 ssect = &ppc_alt_plt;
2621 return ssect;
2622 }
2623
2624 return _bfd_elf_get_sec_type_attr (abfd, sec);
2625}
25dbc73a
AM
2626\f
2627/* Very simple linked list structure for recording apuinfo values. */
2628typedef struct apuinfo_list
2629{
2630 struct apuinfo_list *next;
2631 unsigned long value;
2632}
2633apuinfo_list;
e656e369 2634
25dbc73a 2635static apuinfo_list *head;
f2faa800 2636static bfd_boolean apuinfo_set;
deaaf2f3 2637
25dbc73a
AM
2638static void
2639apuinfo_list_init (void)
2640{
2641 head = NULL;
f2faa800 2642 apuinfo_set = FALSE;
25dbc73a 2643}
9abc968f 2644
25dbc73a
AM
2645static void
2646apuinfo_list_add (unsigned long value)
2647{
2648 apuinfo_list *entry = head;
deaaf2f3 2649
25dbc73a
AM
2650 while (entry != NULL)
2651 {
2652 if (entry->value == value)
2653 return;
2654 entry = entry->next;
2655 }
b4a38de6 2656
25dbc73a
AM
2657 entry = bfd_malloc (sizeof (* entry));
2658 if (entry == NULL)
2659 return;
e656e369 2660
25dbc73a
AM
2661 entry->value = value;
2662 entry->next = head;
2663 head = entry;
2664}
9abc968f 2665
25dbc73a
AM
2666static unsigned
2667apuinfo_list_length (void)
2668{
2669 apuinfo_list *entry;
2670 unsigned long count;
9abc968f 2671
25dbc73a
AM
2672 for (entry = head, count = 0;
2673 entry;
2674 entry = entry->next)
2675 ++ count;
e656e369 2676
25dbc73a
AM
2677 return count;
2678}
eea6121a 2679
25dbc73a
AM
2680static inline unsigned long
2681apuinfo_list_element (unsigned long number)
2682{
2683 apuinfo_list * entry;
e656e369 2684
25dbc73a
AM
2685 for (entry = head;
2686 entry && number --;
2687 entry = entry->next)
2688 ;
252b5132 2689
25dbc73a
AM
2690 return entry ? entry->value : 0;
2691}
2692
2693static void
2694apuinfo_list_finish (void)
2695{
2696 apuinfo_list *entry;
2697
2698 for (entry = head; entry;)
252b5132 2699 {
25dbc73a
AM
2700 apuinfo_list *next = entry->next;
2701 free (entry);
2702 entry = next;
2703 }
9abc968f 2704
25dbc73a
AM
2705 head = NULL;
2706}
9abc968f 2707
25dbc73a
AM
2708/* Scan the input BFDs and create a linked list of
2709 the APUinfo values that will need to be emitted. */
9abc968f 2710
25dbc73a
AM
2711static void
2712ppc_elf_begin_write_processing (bfd *abfd, struct bfd_link_info *link_info)
2713{
2714 bfd *ibfd;
2715 asection *asec;
deddc40b
NS
2716 char *buffer = NULL;
2717 bfd_size_type largest_input_size = 0;
25dbc73a 2718 unsigned i;
25dbc73a
AM
2719 unsigned long length;
2720 const char *error_message = NULL;
9abc968f 2721
25dbc73a
AM
2722 if (link_info == NULL)
2723 return;
9abc968f 2724
25dbc73a 2725 apuinfo_list_init ();
252b5132 2726
25dbc73a 2727 /* Read in the input sections contents. */
c72f2fb2 2728 for (ibfd = link_info->input_bfds; ibfd; ibfd = ibfd->link.next)
252b5132 2729 {
25dbc73a 2730 unsigned long datum;
252b5132 2731
25dbc73a
AM
2732 asec = bfd_get_section_by_name (ibfd, APUINFO_SECTION_NAME);
2733 if (asec == NULL)
2734 continue;
252b5132 2735
695344c0 2736 /* xgettext:c-format */
871b3ab2 2737 error_message = _("corrupt %s section in %pB");
25dbc73a 2738 length = asec->size;
deddc40b
NS
2739 if (length < 20)
2740 goto fail;
2741
f2faa800 2742 apuinfo_set = TRUE;
deddc40b 2743 if (largest_input_size < asec->size)
25dbc73a 2744 {
deddc40b
NS
2745 if (buffer)
2746 free (buffer);
2747 largest_input_size = asec->size;
2748 buffer = bfd_malloc (largest_input_size);
2749 if (!buffer)
2750 return;
25dbc73a 2751 }
5b914448 2752
25dbc73a 2753 if (bfd_seek (ibfd, asec->filepos, SEEK_SET) != 0
deddc40b 2754 || (bfd_bread (buffer, length, ibfd) != length))
25dbc73a 2755 {
695344c0 2756 /* xgettext:c-format */
871b3ab2 2757 error_message = _("unable to read in %s section from %pB");
25dbc73a
AM
2758 goto fail;
2759 }
252b5132 2760
25dbc73a
AM
2761 /* Verify the contents of the header. Note - we have to
2762 extract the values this way in order to allow for a
2763 host whose endian-ness is different from the target. */
deddc40b 2764 datum = bfd_get_32 (ibfd, buffer);
25dbc73a
AM
2765 if (datum != sizeof APUINFO_LABEL)
2766 goto fail;
252b5132 2767
deddc40b 2768 datum = bfd_get_32 (ibfd, buffer + 8);
25dbc73a
AM
2769 if (datum != 0x2)
2770 goto fail;
252b5132 2771
deddc40b 2772 if (strcmp (buffer + 12, APUINFO_LABEL) != 0)
25dbc73a 2773 goto fail;
252b5132 2774
25dbc73a 2775 /* Get the number of bytes used for apuinfo entries. */
deddc40b 2776 datum = bfd_get_32 (ibfd, buffer + 4);
25dbc73a
AM
2777 if (datum + 20 != length)
2778 goto fail;
2779
25dbc73a
AM
2780 /* Scan the apuinfo section, building a list of apuinfo numbers. */
2781 for (i = 0; i < datum; i += 4)
deddc40b 2782 apuinfo_list_add (bfd_get_32 (ibfd, buffer + 20 + i));
252b5132
RH
2783 }
2784
25dbc73a 2785 error_message = NULL;
252b5132 2786
f2faa800 2787 if (apuinfo_set)
deddc40b 2788 {
f2faa800
NS
2789 /* Compute the size of the output section. */
2790 unsigned num_entries = apuinfo_list_length ();
5b914448 2791
deddc40b
NS
2792 /* Set the output section size, if it exists. */
2793 asec = bfd_get_section_by_name (abfd, APUINFO_SECTION_NAME);
f2faa800 2794
deddc40b
NS
2795 if (asec && ! bfd_set_section_size (abfd, asec, 20 + num_entries * 4))
2796 {
2797 ibfd = abfd;
695344c0 2798 /* xgettext:c-format */
871b3ab2 2799 error_message = _("warning: unable to set size of %s section in %pB");
deddc40b
NS
2800 }
2801 }
25dbc73a
AM
2802
2803 fail:
deddc40b
NS
2804 if (buffer)
2805 free (buffer);
25dbc73a
AM
2806
2807 if (error_message)
cd9af601 2808 _bfd_error_handler (error_message, APUINFO_SECTION_NAME, ibfd);
25dbc73a 2809}
252b5132 2810
25dbc73a
AM
2811/* Prevent the output section from accumulating the input sections'
2812 contents. We have already stored this in our linked list structure. */
252b5132 2813
25dbc73a
AM
2814static bfd_boolean
2815ppc_elf_write_section (bfd *abfd ATTRIBUTE_UNUSED,
c7b8f16e 2816 struct bfd_link_info *link_info ATTRIBUTE_UNUSED,
25dbc73a
AM
2817 asection *asec,
2818 bfd_byte *contents ATTRIBUTE_UNUSED)
2819{
f2faa800 2820 return apuinfo_set && strcmp (asec->name, APUINFO_SECTION_NAME) == 0;
252b5132
RH
2821}
2822
25dbc73a
AM
2823/* Finally we can generate the output section. */
2824
2825static void
2826ppc_elf_final_write_processing (bfd *abfd, bfd_boolean linker ATTRIBUTE_UNUSED)
7619e7c7 2827{
25dbc73a
AM
2828 bfd_byte *buffer;
2829 asection *asec;
2830 unsigned i;
2831 unsigned num_entries;
2832 bfd_size_type length;
7619e7c7 2833
25dbc73a
AM
2834 asec = bfd_get_section_by_name (abfd, APUINFO_SECTION_NAME);
2835 if (asec == NULL)
2836 return;
2837
f2faa800 2838 if (!apuinfo_set)
25dbc73a
AM
2839 return;
2840
2841 length = asec->size;
2842 if (length < 20)
2843 return;
2844
2845 buffer = bfd_malloc (length);
2846 if (buffer == NULL)
7619e7c7 2847 {
4eca0228 2848 _bfd_error_handler
25dbc73a
AM
2849 (_("failed to allocate space for new APUinfo section."));
2850 return;
7619e7c7 2851 }
7619e7c7 2852
25dbc73a
AM
2853 /* Create the apuinfo header. */
2854 num_entries = apuinfo_list_length ();
2855 bfd_put_32 (abfd, sizeof APUINFO_LABEL, buffer);
2856 bfd_put_32 (abfd, num_entries * 4, buffer + 4);
2857 bfd_put_32 (abfd, 0x2, buffer + 8);
2858 strcpy ((char *) buffer + 12, APUINFO_LABEL);
feee612b 2859
25dbc73a
AM
2860 length = 20;
2861 for (i = 0; i < num_entries; i++)
feee612b 2862 {
25dbc73a
AM
2863 bfd_put_32 (abfd, apuinfo_list_element (i), buffer + length);
2864 length += 4;
feee612b 2865 }
feee612b 2866
25dbc73a 2867 if (length != asec->size)
4eca0228 2868 _bfd_error_handler (_("failed to compute new APUinfo section."));
252b5132 2869
25dbc73a 2870 if (! bfd_set_section_contents (abfd, asec, buffer, (file_ptr) 0, length))
4eca0228 2871 _bfd_error_handler (_("failed to install new APUinfo section."));
252b5132 2872
25dbc73a
AM
2873 free (buffer);
2874
2875 apuinfo_list_finish ();
252b5132 2876}
25dbc73a 2877\f
7382d32a 2878static bfd_boolean
c6dd29ce 2879is_nonpic_glink_stub (bfd *abfd, asection *glink, bfd_vma off)
7382d32a 2880{
407aa07c 2881 bfd_byte buf[4 * 4];
7382d32a 2882
9e390558 2883 if (!bfd_get_section_contents (abfd, glink, buf, off, sizeof buf))
7382d32a
AM
2884 return FALSE;
2885
c6dd29ce
AM
2886 return ((bfd_get_32 (abfd, buf + 0) & 0xffff0000) == LIS_11
2887 && (bfd_get_32 (abfd, buf + 4) & 0xffff0000) == LWZ_11_11
407aa07c
AM
2888 && bfd_get_32 (abfd, buf + 8) == MTCTR_11
2889 && bfd_get_32 (abfd, buf + 12) == BCTR);
7382d32a
AM
2890}
2891
468392fb
AM
2892static bfd_boolean
2893section_covers_vma (bfd *abfd ATTRIBUTE_UNUSED, asection *section, void *ptr)
2894{
2895 bfd_vma vma = *(bfd_vma *) ptr;
2896 return ((section->flags & SEC_ALLOC) != 0
2897 && section->vma <= vma
2898 && vma < section->vma + section->size);
2899}
2900
2901static long
2902ppc_elf_get_synthetic_symtab (bfd *abfd, long symcount, asymbol **syms,
2903 long dynsymcount, asymbol **dynsyms,
2904 asymbol **ret)
2905{
2906 bfd_boolean (*slurp_relocs) (bfd *, asection *, asymbol **, bfd_boolean);
2907 asection *plt, *relplt, *dynamic, *glink;
2908 bfd_vma glink_vma = 0;
2909 bfd_vma resolv_vma = 0;
9e390558 2910 bfd_vma stub_off;
468392fb
AM
2911 asymbol *s;
2912 arelent *p;
9e390558 2913 long count, i, stub_delta;
468392fb
AM
2914 size_t size;
2915 char *names;
2916 bfd_byte buf[4];
2917
2918 *ret = NULL;
2919
2920 if ((abfd->flags & (DYNAMIC | EXEC_P)) == 0)
2921 return 0;
2922
2923 if (dynsymcount <= 0)
2924 return 0;
2925
2926 relplt = bfd_get_section_by_name (abfd, ".rela.plt");
2927 if (relplt == NULL)
2928 return 0;
2929
2930 plt = bfd_get_section_by_name (abfd, ".plt");
2931 if (plt == NULL)
2932 return 0;
2933
2934 /* Call common code to handle old-style executable PLTs. */
2935 if (elf_section_flags (plt) & SHF_EXECINSTR)
2936 return _bfd_elf_get_synthetic_symtab (abfd, symcount, syms,
2937 dynsymcount, dynsyms, ret);
2938
2939 /* If this object was prelinked, the prelinker stored the address
2940 of .glink at got[1]. If it wasn't prelinked, got[1] will be zero. */
2941 dynamic = bfd_get_section_by_name (abfd, ".dynamic");
2942 if (dynamic != NULL)
2943 {
2944 bfd_byte *dynbuf, *extdyn, *extdynend;
2945 size_t extdynsize;
2946 void (*swap_dyn_in) (bfd *, const void *, Elf_Internal_Dyn *);
2947
2948 if (!bfd_malloc_and_get_section (abfd, dynamic, &dynbuf))
2949 return -1;
2950
2951 extdynsize = get_elf_backend_data (abfd)->s->sizeof_dyn;
2952 swap_dyn_in = get_elf_backend_data (abfd)->s->swap_dyn_in;
2953
2954 extdyn = dynbuf;
2955 extdynend = extdyn + dynamic->size;
2956 for (; extdyn < extdynend; extdyn += extdynsize)
2957 {
2958 Elf_Internal_Dyn dyn;
2959 (*swap_dyn_in) (abfd, extdyn, &dyn);
2960
2961 if (dyn.d_tag == DT_NULL)
2962 break;
2963
2964 if (dyn.d_tag == DT_PPC_GOT)
2965 {
2966 unsigned int g_o_t = dyn.d_un.d_val;
2967 asection *got = bfd_get_section_by_name (abfd, ".got");
2968 if (got != NULL
2969 && bfd_get_section_contents (abfd, got, buf,
2970 g_o_t - got->vma + 4, 4))
2971 glink_vma = bfd_get_32 (abfd, buf);
2972 break;
2973 }
2974 }
2975 free (dynbuf);
2976 }
2977
2978 /* Otherwise we read the first plt entry. */
2979 if (glink_vma == 0)
2980 {
2981 if (bfd_get_section_contents (abfd, plt, buf, 0, 4))
2982 glink_vma = bfd_get_32 (abfd, buf);
2983 }
2984
2985 if (glink_vma == 0)
2986 return 0;
2987
2988 /* The .glink section usually does not survive the final
2989 link; search for the section (usually .text) where the
2990 glink stubs now reside. */
2991 glink = bfd_sections_find_if (abfd, section_covers_vma, &glink_vma);
2992 if (glink == NULL)
2993 return 0;
2994
2995 /* Determine glink PLT resolver by reading the relative branch
2996 from the first glink stub. */
2997 if (bfd_get_section_contents (abfd, glink, buf,
2998 glink_vma - glink->vma, 4))
2999 {
3000 unsigned int insn = bfd_get_32 (abfd, buf);
3001
3002 /* The first glink stub may either branch to the resolver ... */
3003 insn ^= B;
3004 if ((insn & ~0x3fffffc) == 0)
3005 resolv_vma = glink_vma + (insn ^ 0x2000000) - 0x2000000;
3006
3007 /* ... or fall through a bunch of NOPs. */
3008 else if ((insn ^ B ^ NOP) == 0)
3009 for (i = 4;
3010 bfd_get_section_contents (abfd, glink, buf,
3011 glink_vma - glink->vma + i, 4);
3012 i += 4)
3013 if (bfd_get_32 (abfd, buf) != NOP)
3014 {
3015 resolv_vma = glink_vma + i;
3016 break;
3017 }
3018 }
3019
7382d32a 3020 count = relplt->size / sizeof (Elf32_External_Rela);
7382d32a
AM
3021 /* If the stubs are those for -shared/-pie then we might have
3022 multiple stubs for each plt entry. If that is the case then
3023 there is no way to associate stubs with their plt entries short
9e390558
AM
3024 of figuring out the GOT pointer value used in the stub.
3025 The offsets tested here need to cover all possible values of
3026 GLINK_ENTRY_SIZE for other than __tls_get_addr_opt. */
3027 stub_off = glink_vma - glink->vma;
3028 for (stub_delta = 16; stub_delta <= 32; stub_delta += 8)
3029 if (is_nonpic_glink_stub (abfd, glink, stub_off - stub_delta))
3030 break;
3031 if (stub_delta > 32)
7382d32a
AM
3032 return 0;
3033
468392fb
AM
3034 slurp_relocs = get_elf_backend_data (abfd)->s->slurp_reloc_table;
3035 if (! (*slurp_relocs) (abfd, relplt, dynsyms, TRUE))
3036 return -1;
3037
468392fb
AM
3038 size = count * sizeof (asymbol);
3039 p = relplt->relocation;
3040 for (i = 0; i < count; i++, p++)
e054468f
AM
3041 {
3042 size += strlen ((*p->sym_ptr_ptr)->name) + sizeof ("@plt");
3043 if (p->addend != 0)
3044 size += sizeof ("+0x") - 1 + 8;
3045 }
468392fb
AM
3046
3047 size += sizeof (asymbol) + sizeof ("__glink");
3048
3049 if (resolv_vma)
3050 size += sizeof (asymbol) + sizeof ("__glink_PLTresolve");
3051
3052 s = *ret = bfd_malloc (size);
3053 if (s == NULL)
3054 return -1;
3055
9e390558 3056 stub_off = glink_vma - glink->vma;
468392fb 3057 names = (char *) (s + count + 1 + (resolv_vma != 0));
1079403c
AM
3058 p = relplt->relocation + count - 1;
3059 for (i = 0; i < count; i++)
468392fb
AM
3060 {
3061 size_t len;
3062
9e390558
AM
3063 stub_off -= stub_delta;
3064 if (strcmp ((*p->sym_ptr_ptr)->name, "__tls_get_addr_opt") == 0)
3065 stub_off -= 32;
468392fb
AM
3066 *s = **p->sym_ptr_ptr;
3067 /* Undefined syms won't have BSF_LOCAL or BSF_GLOBAL set. Since
3068 we are defining a symbol, ensure one of them is set. */
3069 if ((s->flags & BSF_LOCAL) == 0)
3070 s->flags |= BSF_GLOBAL;
6ba2a415 3071 s->flags |= BSF_SYNTHETIC;
468392fb 3072 s->section = glink;
9e390558 3073 s->value = stub_off;
468392fb
AM
3074 s->name = names;
3075 s->udata.p = NULL;
3076 len = strlen ((*p->sym_ptr_ptr)->name);
3077 memcpy (names, (*p->sym_ptr_ptr)->name, len);
3078 names += len;
e054468f
AM
3079 if (p->addend != 0)
3080 {
3081 memcpy (names, "+0x", sizeof ("+0x") - 1);
3082 names += sizeof ("+0x") - 1;
3083 bfd_sprintf_vma (abfd, names, p->addend);
3084 names += strlen (names);
3085 }
468392fb
AM
3086 memcpy (names, "@plt", sizeof ("@plt"));
3087 names += sizeof ("@plt");
3088 ++s;
1079403c 3089 --p;
468392fb
AM
3090 }
3091
3092 /* Add a symbol at the start of the glink branch table. */
86a4952b 3093 memset (s, 0, sizeof *s);
468392fb 3094 s->the_bfd = abfd;
6ba2a415 3095 s->flags = BSF_GLOBAL | BSF_SYNTHETIC;
468392fb
AM
3096 s->section = glink;
3097 s->value = glink_vma - glink->vma;
3098 s->name = names;
3099 memcpy (names, "__glink", sizeof ("__glink"));
3100 names += sizeof ("__glink");
3101 s++;
3102 count++;
3103
3104 if (resolv_vma)
3105 {
3106 /* Add a symbol for the glink PLT resolver. */
86a4952b 3107 memset (s, 0, sizeof *s);
468392fb 3108 s->the_bfd = abfd;
6ba2a415 3109 s->flags = BSF_GLOBAL | BSF_SYNTHETIC;
468392fb
AM
3110 s->section = glink;
3111 s->value = resolv_vma - glink->vma;
3112 s->name = names;
3113 memcpy (names, "__glink_PLTresolve", sizeof ("__glink_PLTresolve"));
3114 names += sizeof ("__glink_PLTresolve");
3115 s++;
3116 count++;
3117 }
3118
3119 return count;
3120}
3121\f
25dbc73a
AM
3122/* The following functions are specific to the ELF linker, while
3123 functions above are used generally. They appear in this file more
3124 or less in the order in which they are called. eg.
3125 ppc_elf_check_relocs is called early in the link process,
3126 ppc_elf_finish_dynamic_sections is one of the last functions
3127 called. */
252b5132 3128
a6aa5195 3129/* Track PLT entries needed for a given symbol. We might need more
a877a2b6 3130 than one glink entry per symbol when generating a pic binary. */
a6aa5195
AM
3131struct plt_entry
3132{
3133 struct plt_entry *next;
3134
3135 /* -fPIC uses multiple GOT sections, one per file, called ".got2".
3136 This field stores the offset into .got2 used to initialise the
a877a2b6
AM
3137 GOT pointer reg. It will always be at least 32768. (Current
3138 gcc always uses an offset of 32768, but ld -r will pack .got2
3139 sections together resulting in larger offsets). */
a6aa5195
AM
3140 bfd_vma addend;
3141
3142 /* The .got2 section. */
3143 asection *sec;
3144
3145 /* PLT refcount or offset. */
3146 union
3147 {
3148 bfd_signed_vma refcount;
3149 bfd_vma offset;
3150 } plt;
3151
3152 /* .glink stub offset. */
3153 bfd_vma glink_offset;
3154};
3155
7c8bbca5
AM
3156/* Of those relocs that might be copied as dynamic relocs, this
3157 function selects those that must be copied when linking a shared
3158 library or PIE, even when the symbol is local. */
252b5132 3159
1d483afe
AM
3160static int
3161must_be_dyn_reloc (struct bfd_link_info *info,
3162 enum elf_ppc_reloc_type r_type)
3163{
3164 switch (r_type)
3165 {
3166 default:
7c8bbca5
AM
3167 /* Only relative relocs can be resolved when the object load
3168 address isn't fixed. DTPREL32 is excluded because the
3169 dynamic linker needs to differentiate global dynamic from
3170 local dynamic __tls_index pairs when PPC_OPT_TLS is set. */
1d483afe
AM
3171 return 1;
3172
3173 case R_PPC_REL24:
3174 case R_PPC_REL14:
3175 case R_PPC_REL14_BRTAKEN:
3176 case R_PPC_REL14_BRNTAKEN:
3177 case R_PPC_REL32:
3178 return 0;
3179
3180 case R_PPC_TPREL32:
3181 case R_PPC_TPREL16:
3182 case R_PPC_TPREL16_LO:
3183 case R_PPC_TPREL16_HI:
3184 case R_PPC_TPREL16_HA:
7c8bbca5
AM
3185 /* These relocations are relative but in a shared library the
3186 linker doesn't know the thread pointer base. */
3187 return bfd_link_dll (info);
1d483afe
AM
3188 }
3189}
252b5132 3190
25dbc73a
AM
3191/* If ELIMINATE_COPY_RELOCS is non-zero, the linker will try to avoid
3192 copying dynamic variables from a shared lib into an app's dynbss
3193 section, and instead use a dynamic relocation to point into the
3194 shared lib. */
3195#define ELIMINATE_COPY_RELOCS 1
252b5132 3196
f95f8542
AM
3197/* Used to track dynamic relocations for local symbols. */
3198struct ppc_dyn_relocs
3199{
3200 struct ppc_dyn_relocs *next;
3201
3202 /* The input section of the reloc. */
3203 asection *sec;
3204
3205 /* Total number of relocs copied for the input section. */
3206 unsigned int count : 31;
3207
3208 /* Whether this entry is for STT_GNU_IFUNC symbols. */
3209 unsigned int ifunc : 1;
3210};
3211
25dbc73a 3212/* PPC ELF linker hash entry. */
252b5132 3213
25dbc73a
AM
3214struct ppc_elf_link_hash_entry
3215{
3216 struct elf_link_hash_entry elf;
252b5132 3217
25dbc73a
AM
3218 /* If this symbol is used in the linker created sections, the processor
3219 specific backend uses this field to map the field into the offset
3220 from the beginning of the section. */
3221 elf_linker_section_pointers_t *linker_section_pointer;
252b5132 3222
25dbc73a 3223 /* Track dynamic relocs copied for this symbol. */
6061a67d 3224 struct elf_dyn_relocs *dyn_relocs;
252b5132 3225
25dbc73a
AM
3226 /* Contexts in which symbol is used in the GOT (or TOC).
3227 TLS_GD .. TLS_TLS bits are or'd into the mask as the
3228 corresponding relocs are encountered during check_relocs.
3229 tls_optimize clears TLS_GD .. TLS_TPREL when optimizing to
3230 indicate the corresponding GOT entry type is not needed. */
3231#define TLS_GD 1 /* GD reloc. */
3232#define TLS_LD 2 /* LD reloc. */
3233#define TLS_TPREL 4 /* TPREL reloc, => IE. */
3234#define TLS_DTPREL 8 /* DTPREL reloc, => LD. */
3235#define TLS_TLS 16 /* Any TLS reloc. */
3236#define TLS_TPRELGD 32 /* TPREL reloc resulting from GD->IE. */
e054468f 3237#define PLT_IFUNC 64 /* STT_GNU_IFUNC. */
25dbc73a 3238 char tls_mask;
4dc4a9a5
DJ
3239
3240 /* Nonzero if we have seen a small data relocation referring to this
3241 symbol. */
d3e454b9
AM
3242 unsigned char has_sda_refs : 1;
3243
3244 /* Flag use of given relocations. */
3245 unsigned char has_addr16_ha : 1;
3246 unsigned char has_addr16_lo : 1;
25dbc73a 3247};
252b5132 3248
25dbc73a
AM
3249#define ppc_elf_hash_entry(ent) ((struct ppc_elf_link_hash_entry *) (ent))
3250
3251/* PPC ELF linker hash table. */
3252
3253struct ppc_elf_link_hash_table
3254{
3255 struct elf_link_hash_table elf;
3256
5446cbdf
AM
3257 /* Various options passed from the linker. */
3258 struct ppc_elf_params *params;
3259
25dbc73a 3260 /* Short-cuts to get to dynamic linker sections. */
d7128ce4 3261 asection *glink;
25dbc73a
AM
3262 asection *dynsbss;
3263 asection *relsbss;
c9a2f333 3264 elf_linker_section_t sdata[2];
25dbc73a 3265 asection *sbss;
6177242a 3266 asection *glink_eh_frame;
25dbc73a 3267
016687f8
AM
3268 /* The (unloaded but important) .rela.plt.unloaded on VxWorks. */
3269 asection *srelplt2;
3270
1d483afe 3271 /* Shortcut to __tls_get_addr. */
25dbc73a 3272 struct elf_link_hash_entry *tls_get_addr;
252b5132 3273
016687f8
AM
3274 /* The bfd that forced an old-style PLT. */
3275 bfd *old_bfd;
5b914448 3276
25dbc73a
AM
3277 /* TLS local dynamic got entry handling. */
3278 union {
3279 bfd_signed_vma refcount;
3280 bfd_vma offset;
3281 } tlsld_got;
252b5132 3282
c6dd29ce 3283 /* Offset of branch table to PltResolve function in glink. */
d7128ce4
AM
3284 bfd_vma glink_pltresolve;
3285
3b36f7e6
AM
3286 /* Size of reserved GOT entries. */
3287 unsigned int got_header_size;
3288 /* Non-zero if allocating the header left a gap. */
3289 unsigned int got_gap;
3290
4a3dc543
RS
3291 /* The type of PLT we have chosen to use. */
3292 enum ppc_elf_plt_type plt_type;
3293
9d8504b1 3294 /* True if the target system is VxWorks. */
016687f8 3295 unsigned int is_vxworks:1;
9d8504b1 3296
82e66161
AM
3297 /* Whether there exist local gnu indirect function resolvers,
3298 referenced by dynamic relocations. */
3299 unsigned int local_ifunc_resolver:1;
3300 unsigned int maybe_local_ifunc_resolver:1;
3301
9a23f96e
AM
3302 /* Set if tls optimization is enabled. */
3303 unsigned int do_tls_opt:1;
3304
9d8504b1
PB
3305 /* The size of PLT entries. */
3306 int plt_entry_size;
3307 /* The distance between adjacent PLT slots. */
3308 int plt_slot_size;
3309 /* The size of the first PLT entry. */
3310 int plt_initial_entry_size;
016687f8 3311
87d72d41
AM
3312 /* Small local sym cache. */
3313 struct sym_cache sym_cache;
25dbc73a 3314};
252b5132 3315
94caa966
AM
3316/* Rename some of the generic section flags to better document how they
3317 are used for ppc32. The flags are only valid for ppc32 elf objects. */
3318
3319/* Nonzero if this section has TLS related relocations. */
3320#define has_tls_reloc sec_flg0
3321
3322/* Nonzero if this section has a call to __tls_get_addr. */
3323#define has_tls_get_addr_call sec_flg1
3324
25dbc73a 3325/* Get the PPC ELF linker hash table from a link_info structure. */
252b5132 3326
25dbc73a 3327#define ppc_elf_hash_table(p) \
4dfe6ac6
NC
3328 (elf_hash_table_id ((struct elf_link_hash_table *) ((p)->hash)) \
3329 == PPC32_ELF_DATA ? ((struct ppc_elf_link_hash_table *) ((p)->hash)) : NULL)
252b5132 3330
25dbc73a 3331/* Create an entry in a PPC ELF linker hash table. */
252b5132 3332
25dbc73a
AM
3333static struct bfd_hash_entry *
3334ppc_elf_link_hash_newfunc (struct bfd_hash_entry *entry,
3335 struct bfd_hash_table *table,
3336 const char *string)
252b5132 3337{
25dbc73a
AM
3338 /* Allocate the structure if it has not already been allocated by a
3339 subclass. */
3340 if (entry == NULL)
3341 {
3342 entry = bfd_hash_allocate (table,
3343 sizeof (struct ppc_elf_link_hash_entry));
3344 if (entry == NULL)
3345 return entry;
3346 }
252b5132 3347
25dbc73a
AM
3348 /* Call the allocation method of the superclass. */
3349 entry = _bfd_elf_link_hash_newfunc (entry, table, string);
3350 if (entry != NULL)
3351 {
3352 ppc_elf_hash_entry (entry)->linker_section_pointer = NULL;
3353 ppc_elf_hash_entry (entry)->dyn_relocs = NULL;
3354 ppc_elf_hash_entry (entry)->tls_mask = 0;
5240d94d 3355 ppc_elf_hash_entry (entry)->has_sda_refs = 0;
25dbc73a 3356 }
252b5132 3357
25dbc73a 3358 return entry;
252b5132 3359}
3dab13f6 3360
25dbc73a 3361/* Create a PPC ELF linker hash table. */
3dab13f6 3362
25dbc73a
AM
3363static struct bfd_link_hash_table *
3364ppc_elf_link_hash_table_create (bfd *abfd)
3dab13f6 3365{
25dbc73a 3366 struct ppc_elf_link_hash_table *ret;
76e7a751 3367 static struct ppc_elf_params default_params
407aa07c 3368 = { PLT_OLD, 0, 0, 1, 0, 0, 12, 0, 0, 0 };
3dab13f6 3369
25dbc73a
AM
3370 ret = bfd_zmalloc (sizeof (struct ppc_elf_link_hash_table));
3371 if (ret == NULL)
3372 return NULL;
3dab13f6 3373
66eb6687
AM
3374 if (!_bfd_elf_link_hash_table_init (&ret->elf, abfd,
3375 ppc_elf_link_hash_newfunc,
4dfe6ac6
NC
3376 sizeof (struct ppc_elf_link_hash_entry),
3377 PPC32_ELF_DATA))
3dab13f6 3378 {
25dbc73a
AM
3379 free (ret);
3380 return NULL;
3381 }
58111eb7 3382
a6aa5195
AM
3383 ret->elf.init_plt_refcount.refcount = 0;
3384 ret->elf.init_plt_refcount.glist = NULL;
3385 ret->elf.init_plt_offset.offset = 0;
3386 ret->elf.init_plt_offset.glist = NULL;
3387
db434ba0
AM
3388 ret->params = &default_params;
3389
c9a2f333
AM
3390 ret->sdata[0].name = ".sdata";
3391 ret->sdata[0].sym_name = "_SDA_BASE_";
3392 ret->sdata[0].bss_name = ".sbss";
3393
3394 ret->sdata[1].name = ".sdata2";
3395 ret->sdata[1].sym_name = "_SDA2_BASE_";
3396 ret->sdata[1].bss_name = ".sbss2";
3397
9d8504b1
PB
3398 ret->plt_entry_size = 12;
3399 ret->plt_slot_size = 8;
3400 ret->plt_initial_entry_size = 72;
9d8504b1 3401
25dbc73a
AM
3402 return &ret->elf.root;
3403}
3dab13f6 3404
5446cbdf
AM
3405/* Hook linker params into hash table. */
3406
3407void
3408ppc_elf_link_params (struct bfd_link_info *info, struct ppc_elf_params *params)
3409{
3410 struct ppc_elf_link_hash_table *htab = ppc_elf_hash_table (info);
3411
3412 if (htab)
3413 htab->params = params;
76e7a751 3414 params->pagesize_p2 = bfd_log2 (params->pagesize);
5446cbdf
AM
3415}
3416
9d8504b1 3417/* Create .got and the related sections. */
3dab13f6 3418
25dbc73a
AM
3419static bfd_boolean
3420ppc_elf_create_got (bfd *abfd, struct bfd_link_info *info)
3421{
3422 struct ppc_elf_link_hash_table *htab;
3dab13f6 3423
25dbc73a
AM
3424 if (!_bfd_elf_create_got_section (abfd, info))
3425 return FALSE;
3dab13f6 3426
25dbc73a 3427 htab = ppc_elf_hash_table (info);
ce558b89 3428 if (!htab->is_vxworks)
9d8504b1
PB
3429 {
3430 /* The powerpc .got has a blrl instruction in it. Mark it
3431 executable. */
ce558b89
AM
3432 flagword flags = (SEC_ALLOC | SEC_LOAD | SEC_CODE | SEC_HAS_CONTENTS
3433 | SEC_IN_MEMORY | SEC_LINKER_CREATED);
3434 if (!bfd_set_section_flags (abfd, htab->elf.sgot, flags))
9d8504b1
PB
3435 return FALSE;
3436 }
3dab13f6 3437
25dbc73a
AM
3438 return TRUE;
3439}
3dab13f6 3440
93d1b056
AM
3441/* Create a special linker section, used for R_PPC_EMB_SDAI16 and
3442 R_PPC_EMB_SDA2I16 pointers. These sections become part of .sdata
3443 and .sdata2. Create _SDA_BASE_ and _SDA2_BASE too. */
3444
3445static bfd_boolean
3446ppc_elf_create_linker_section (bfd *abfd,
3447 struct bfd_link_info *info,
3448 flagword flags,
3449 elf_linker_section_t *lsect)
3450{
3451 asection *s;
3452
3453 flags |= (SEC_ALLOC | SEC_LOAD | SEC_HAS_CONTENTS | SEC_IN_MEMORY
3454 | SEC_LINKER_CREATED);
3455
3456 s = bfd_make_section_anyway_with_flags (abfd, lsect->name, flags);
3457 if (s == NULL)
3458 return FALSE;
3459 lsect->section = s;
3460
3461 /* Define the sym on the first section of this name. */
3462 s = bfd_get_section_by_name (abfd, lsect->name);
3463
3464 lsect->sym = _bfd_elf_define_linkage_sym (abfd, info, s, lsect->sym_name);
3465 if (lsect->sym == NULL)
3466 return FALSE;
3467 lsect->sym->root.u.def.value = 0x8000;
3468 return TRUE;
3469}
3470
e054468f
AM
3471static bfd_boolean
3472ppc_elf_create_glink (bfd *abfd, struct bfd_link_info *info)
3473{
3474 struct ppc_elf_link_hash_table *htab = ppc_elf_hash_table (info);
3475 asection *s;
3476 flagword flags;
691d2e9a 3477 int p2align;
e054468f
AM
3478
3479 flags = (SEC_ALLOC | SEC_LOAD | SEC_CODE | SEC_READONLY | SEC_HAS_CONTENTS
3480 | SEC_IN_MEMORY | SEC_LINKER_CREATED);
3481 s = bfd_make_section_anyway_with_flags (abfd, ".glink", flags);
3482 htab->glink = s;
691d2e9a
AM
3483 p2align = htab->params->ppc476_workaround ? 6 : 4;
3484 if (p2align < htab->params->plt_stub_align)
3485 p2align = htab->params->plt_stub_align;
e054468f 3486 if (s == NULL
691d2e9a 3487 || !bfd_set_section_alignment (abfd, s, p2align))
e054468f
AM
3488 return FALSE;
3489
6177242a
AM
3490 if (!info->no_ld_generated_unwind_info)
3491 {
3492 flags = (SEC_ALLOC | SEC_LOAD | SEC_READONLY | SEC_HAS_CONTENTS
3493 | SEC_IN_MEMORY | SEC_LINKER_CREATED);
3494 s = bfd_make_section_anyway_with_flags (abfd, ".eh_frame", flags);
3495 htab->glink_eh_frame = s;
3496 if (s == NULL
3497 || !bfd_set_section_alignment (abfd, s, 2))
3498 return FALSE;
3499 }
3500
e054468f
AM
3501 flags = SEC_ALLOC | SEC_LINKER_CREATED;
3502 s = bfd_make_section_anyway_with_flags (abfd, ".iplt", flags);
ce558b89 3503 htab->elf.iplt = s;
e054468f
AM
3504 if (s == NULL
3505 || !bfd_set_section_alignment (abfd, s, 4))
3506 return FALSE;
3507
3508 flags = (SEC_ALLOC | SEC_LOAD | SEC_READONLY | SEC_HAS_CONTENTS
3509 | SEC_IN_MEMORY | SEC_LINKER_CREATED);
14b2f831 3510 s = bfd_make_section_anyway_with_flags (abfd, ".rela.iplt", flags);
ce558b89 3511 htab->elf.irelplt = s;
e054468f
AM
3512 if (s == NULL
3513 || ! bfd_set_section_alignment (abfd, s, 2))
3514 return FALSE;
93d1b056
AM
3515
3516 if (!ppc_elf_create_linker_section (abfd, info, 0,
3517 &htab->sdata[0]))
3518 return FALSE;
3519
3520 if (!ppc_elf_create_linker_section (abfd, info, SEC_READONLY,
3521 &htab->sdata[1]))
3522 return FALSE;
3523
e054468f
AM
3524 return TRUE;
3525}
3526
25dbc73a
AM
3527/* We have to create .dynsbss and .rela.sbss here so that they get mapped
3528 to output sections (just like _bfd_elf_create_dynamic_sections has
3529 to create .dynbss and .rela.bss). */
3dab13f6 3530
25dbc73a
AM
3531static bfd_boolean
3532ppc_elf_create_dynamic_sections (bfd *abfd, struct bfd_link_info *info)
3533{
3534 struct ppc_elf_link_hash_table *htab;
3535 asection *s;
3536 flagword flags;
3dab13f6 3537
25dbc73a 3538 htab = ppc_elf_hash_table (info);
3dab13f6 3539
ce558b89 3540 if (htab->elf.sgot == NULL
25dbc73a 3541 && !ppc_elf_create_got (abfd, info))
3dab13f6
AM
3542 return FALSE;
3543
25dbc73a
AM
3544 if (!_bfd_elf_create_dynamic_sections (abfd, info))
3545 return FALSE;
3dab13f6 3546
e054468f
AM
3547 if (htab->glink == NULL
3548 && !ppc_elf_create_glink (abfd, info))
d7128ce4 3549 return FALSE;
3dab13f6 3550
14b2f831
AM
3551 s = bfd_make_section_anyway_with_flags (abfd, ".dynsbss",
3552 SEC_ALLOC | SEC_LINKER_CREATED);
3b36f7e6 3553 htab->dynsbss = s;
3496cb2a 3554 if (s == NULL)
25dbc73a 3555 return FALSE;
3dab13f6 3556
0e1862bb 3557 if (! bfd_link_pic (info))
25dbc73a 3558 {
e054468f
AM
3559 flags = (SEC_ALLOC | SEC_LOAD | SEC_READONLY | SEC_HAS_CONTENTS
3560 | SEC_IN_MEMORY | SEC_LINKER_CREATED);
14b2f831 3561 s = bfd_make_section_anyway_with_flags (abfd, ".rela.sbss", flags);
3b36f7e6 3562 htab->relsbss = s;
25dbc73a 3563 if (s == NULL
25dbc73a
AM
3564 || ! bfd_set_section_alignment (abfd, s, 2))
3565 return FALSE;
3566 }
3dab13f6 3567
711de32c
RS
3568 if (htab->is_vxworks
3569 && !elf_vxworks_create_dynamic_sections (abfd, info, &htab->srelplt2))
3570 return FALSE;
9d8504b1 3571
ce558b89 3572 s = htab->elf.splt;
3b36f7e6 3573 flags = SEC_ALLOC | SEC_CODE | SEC_LINKER_CREATED;
4a3dc543
RS
3574 if (htab->plt_type == PLT_VXWORKS)
3575 /* The VxWorks PLT is a loaded section with contents. */
3576 flags |= SEC_HAS_CONTENTS | SEC_LOAD | SEC_READONLY;
25dbc73a
AM
3577 return bfd_set_section_flags (abfd, s, flags);
3578}
3dab13f6 3579
25dbc73a 3580/* Copy the extra info we tack onto an elf_link_hash_entry. */
58111eb7 3581
25dbc73a 3582static void
fcfa13d2 3583ppc_elf_copy_indirect_symbol (struct bfd_link_info *info,
25dbc73a
AM
3584 struct elf_link_hash_entry *dir,
3585 struct elf_link_hash_entry *ind)
3586{
3587 struct ppc_elf_link_hash_entry *edir, *eind;
3dab13f6 3588
25dbc73a
AM
3589 edir = (struct ppc_elf_link_hash_entry *) dir;
3590 eind = (struct ppc_elf_link_hash_entry *) ind;
3dab13f6 3591
c79d6685
AM
3592 edir->tls_mask |= eind->tls_mask;
3593 edir->has_sda_refs |= eind->has_sda_refs;
3594
e81830c5
AM
3595 if (edir->elf.versioned != versioned_hidden)
3596 edir->elf.ref_dynamic |= eind->elf.ref_dynamic;
c79d6685
AM
3597 edir->elf.ref_regular |= eind->elf.ref_regular;
3598 edir->elf.ref_regular_nonweak |= eind->elf.ref_regular_nonweak;
4a7e5234 3599 edir->elf.non_got_ref |= eind->elf.non_got_ref;
c79d6685
AM
3600 edir->elf.needs_plt |= eind->elf.needs_plt;
3601 edir->elf.pointer_equality_needed |= eind->elf.pointer_equality_needed;
3602
287c7eaf
AM
3603 /* If we were called to copy over info for a weak sym, that's all. */
3604 if (eind->elf.root.type != bfd_link_hash_indirect)
3605 return;
3606
25dbc73a
AM
3607 if (eind->dyn_relocs != NULL)
3608 {
3609 if (edir->dyn_relocs != NULL)
3dab13f6 3610 {
6061a67d
AM
3611 struct elf_dyn_relocs **pp;
3612 struct elf_dyn_relocs *p;
3dab13f6 3613
fcfa13d2 3614 /* Add reloc counts against the indirect sym to the direct sym
25dbc73a
AM
3615 list. Merge any entries against the same section. */
3616 for (pp = &eind->dyn_relocs; (p = *pp) != NULL; )
3dab13f6 3617 {
6061a67d 3618 struct elf_dyn_relocs *q;
25dbc73a
AM
3619
3620 for (q = edir->dyn_relocs; q != NULL; q = q->next)
3621 if (q->sec == p->sec)
3622 {
3623 q->pc_count += p->pc_count;
3624 q->count += p->count;
3625 *pp = p->next;
3626 break;
3627 }
3628 if (q == NULL)
3629 pp = &p->next;
3dab13f6 3630 }
25dbc73a 3631 *pp = edir->dyn_relocs;
3dab13f6 3632 }
25dbc73a
AM
3633
3634 edir->dyn_relocs = eind->dyn_relocs;
3635 eind->dyn_relocs = NULL;
3dab13f6 3636 }
3dab13f6 3637
a6aa5195
AM
3638 /* Copy over the GOT refcount entries that we may have already seen to
3639 the symbol which just became indirect. */
fcfa13d2
AM
3640 edir->elf.got.refcount += eind->elf.got.refcount;
3641 eind->elf.got.refcount = 0;
a6aa5195
AM
3642
3643 /* And plt entries. */
3644 if (eind->elf.plt.plist != NULL)
3645 {
3646 if (edir->elf.plt.plist != NULL)
3647 {
3648 struct plt_entry **entp;
3649 struct plt_entry *ent;
3650
3651 for (entp = &eind->elf.plt.plist; (ent = *entp) != NULL; )
3652 {
3653 struct plt_entry *dent;
3654
3655 for (dent = edir->elf.plt.plist; dent != NULL; dent = dent->next)
3656 if (dent->sec == ent->sec && dent->addend == ent->addend)
3657 {
3658 dent->plt.refcount += ent->plt.refcount;
3659 *entp = ent->next;
3660 break;
3661 }
3662 if (dent == NULL)
3663 entp = &ent->next;
3664 }
3665 *entp = edir->elf.plt.plist;
3666 }
3667
3668 edir->elf.plt.plist = eind->elf.plt.plist;
3669 eind->elf.plt.plist = NULL;
3670 }
3671
fcfa13d2 3672 if (eind->elf.dynindx != -1)
25dbc73a 3673 {
fcfa13d2
AM
3674 if (edir->elf.dynindx != -1)
3675 _bfd_elf_strtab_delref (elf_hash_table (info)->dynstr,
3676 edir->elf.dynstr_index);
a6aa5195
AM
3677 edir->elf.dynindx = eind->elf.dynindx;
3678 edir->elf.dynstr_index = eind->elf.dynstr_index;
3679 eind->elf.dynindx = -1;
3680 eind->elf.dynstr_index = 0;
25dbc73a 3681 }
25dbc73a 3682}
3dab13f6 3683
25dbc73a
AM
3684/* Hook called by the linker routine which adds symbols from an object
3685 file. We use it to put .comm items in .sbss, and not .bss. */
58111eb7 3686
25dbc73a
AM
3687static bfd_boolean
3688ppc_elf_add_symbol_hook (bfd *abfd,
3689 struct bfd_link_info *info,
3690 Elf_Internal_Sym *sym,
3691 const char **namep ATTRIBUTE_UNUSED,
3692 flagword *flagsp ATTRIBUTE_UNUSED,
3693 asection **secp,
3694 bfd_vma *valp)
3695{
3696 if (sym->st_shndx == SHN_COMMON
0e1862bb 3697 && !bfd_link_relocatable (info)
0c8d6e5c
AM
3698 && is_ppc_elf (info->output_bfd)
3699 && sym->st_size <= elf_gp_size (abfd))
25dbc73a
AM
3700 {
3701 /* Common symbols less than or equal to -G nn bytes are automatically
3702 put into .sbss. */
3703 struct ppc_elf_link_hash_table *htab;
3dab13f6 3704
25dbc73a
AM
3705 htab = ppc_elf_hash_table (info);
3706 if (htab->sbss == NULL)
3707 {
644285ef 3708 flagword flags = SEC_IS_COMMON | SEC_LINKER_CREATED;
3dab13f6 3709
644285ef
AM
3710 if (!htab->elf.dynobj)
3711 htab->elf.dynobj = abfd;
3712
3496cb2a
L
3713 htab->sbss = bfd_make_section_anyway_with_flags (htab->elf.dynobj,
3714 ".sbss",
3715 flags);
3716 if (htab->sbss == NULL)
25dbc73a 3717 return FALSE;
3dab13f6 3718 }
3dab13f6 3719
25dbc73a
AM
3720 *secp = htab->sbss;
3721 *valp = sym->st_size;
3722 }
3dab13f6 3723
a43942db 3724 if (ELF_ST_TYPE (sym->st_info) == STT_GNU_IFUNC
f1885d1e
AM
3725 && (abfd->flags & DYNAMIC) == 0
3726 && bfd_get_flavour (info->output_bfd) == bfd_target_elf_flavour)
a43942db 3727 elf_tdata (info->output_bfd)->has_gnu_symbols |= elf_gnu_symbol_ifunc;
e054468f 3728
25dbc73a 3729 return TRUE;
3dab13f6
AM
3730}
3731\f
25dbc73a
AM
3732/* Find a linker generated pointer with a given addend and type. */
3733
3734static elf_linker_section_pointers_t *
3735elf_find_pointer_linker_section
3736 (elf_linker_section_pointers_t *linker_pointers,
3737 bfd_vma addend,
3738 elf_linker_section_t *lsect)
252b5132 3739{
25dbc73a
AM
3740 for ( ; linker_pointers != NULL; linker_pointers = linker_pointers->next)
3741 if (lsect == linker_pointers->lsect && addend == linker_pointers->addend)
3742 return linker_pointers;
252b5132 3743
25dbc73a
AM
3744 return NULL;
3745}
3746
3747/* Allocate a pointer to live in a linker created section. */
3748
3749static bfd_boolean
93d1b056
AM
3750elf_allocate_pointer_linker_section (bfd *abfd,
3751 elf_linker_section_t *lsect,
3752 struct elf_link_hash_entry *h,
3753 const Elf_Internal_Rela *rel)
25dbc73a
AM
3754{
3755 elf_linker_section_pointers_t **ptr_linker_section_ptr = NULL;
3756 elf_linker_section_pointers_t *linker_section_ptr;
3757 unsigned long r_symndx = ELF32_R_SYM (rel->r_info);
3758 bfd_size_type amt;
3759
3760 BFD_ASSERT (lsect != NULL);
3761
3762 /* Is this a global symbol? */
3763 if (h != NULL)
3764 {
3765 struct ppc_elf_link_hash_entry *eh;
3766
3767 /* Has this symbol already been allocated? If so, our work is done. */
3768 eh = (struct ppc_elf_link_hash_entry *) h;
3769 if (elf_find_pointer_linker_section (eh->linker_section_pointer,
3770 rel->r_addend,
3771 lsect))
3772 return TRUE;
3773
3774 ptr_linker_section_ptr = &eh->linker_section_pointer;
25dbc73a
AM
3775 }
3776 else
3777 {
0c8d6e5c 3778 BFD_ASSERT (is_ppc_elf (abfd));
0ffa91dd 3779
25dbc73a
AM
3780 /* Allocation of a pointer to a local symbol. */
3781 elf_linker_section_pointers_t **ptr = elf_local_ptr_offsets (abfd);
3782
3783 /* Allocate a table to hold the local symbols if first time. */
3784 if (!ptr)
3785 {
0ffa91dd 3786 unsigned int num_symbols = elf_symtab_hdr (abfd).sh_info;
25dbc73a
AM
3787
3788 amt = num_symbols;
3789 amt *= sizeof (elf_linker_section_pointers_t *);
3790 ptr = bfd_zalloc (abfd, amt);
3791
3792 if (!ptr)
3793 return FALSE;
3794
3795 elf_local_ptr_offsets (abfd) = ptr;
3796 }
3797
3798 /* Has this symbol already been allocated? If so, our work is done. */
3799 if (elf_find_pointer_linker_section (ptr[r_symndx],
3800 rel->r_addend,
3801 lsect))
3802 return TRUE;
252b5132 3803
25dbc73a 3804 ptr_linker_section_ptr = &ptr[r_symndx];
25dbc73a 3805 }
41fcb14e 3806
25dbc73a
AM
3807 /* Allocate space for a pointer in the linker section, and allocate
3808 a new pointer record from internal memory. */
3809 BFD_ASSERT (ptr_linker_section_ptr != NULL);
3810 amt = sizeof (elf_linker_section_pointers_t);
3811 linker_section_ptr = bfd_alloc (abfd, amt);
41fcb14e 3812
25dbc73a 3813 if (!linker_section_ptr)
7619e7c7 3814 return FALSE;
41fcb14e 3815
25dbc73a
AM
3816 linker_section_ptr->next = *ptr_linker_section_ptr;
3817 linker_section_ptr->addend = rel->r_addend;
3818 linker_section_ptr->lsect = lsect;
25dbc73a 3819 *ptr_linker_section_ptr = linker_section_ptr;
41fcb14e 3820
93d1b056
AM
3821 if (!bfd_set_section_alignment (lsect->section->owner, lsect->section, 2))
3822 return FALSE;
25dbc73a
AM
3823 linker_section_ptr->offset = lsect->section->size;
3824 lsect->section->size += 4;
7619e7c7 3825
25dbc73a
AM
3826#ifdef DEBUG
3827 fprintf (stderr,
3828 "Create pointer in linker section %s, offset = %ld, section size = %ld\n",
3829 lsect->name, (long) linker_section_ptr->offset,
3830 (long) lsect->section->size);
3831#endif
7619e7c7
AM
3832
3833 return TRUE;
41fcb14e
AM
3834}
3835
e054468f 3836static struct plt_entry **
25dbc73a
AM
3837update_local_sym_info (bfd *abfd,
3838 Elf_Internal_Shdr *symtab_hdr,
3839 unsigned long r_symndx,
3840 int tls_type)
252b5132 3841{
25dbc73a 3842 bfd_signed_vma *local_got_refcounts = elf_local_got_refcounts (abfd);
e054468f 3843 struct plt_entry **local_plt;
25dbc73a 3844 char *local_got_tls_masks;
252b5132 3845
25dbc73a 3846 if (local_got_refcounts == NULL)
252b5132 3847 {
25dbc73a
AM
3848 bfd_size_type size = symtab_hdr->sh_info;
3849
e054468f
AM
3850 size *= (sizeof (*local_got_refcounts)
3851 + sizeof (*local_plt)
3852 + sizeof (*local_got_tls_masks));
25dbc73a
AM
3853 local_got_refcounts = bfd_zalloc (abfd, size);
3854 if (local_got_refcounts == NULL)
e054468f 3855 return NULL;
25dbc73a 3856 elf_local_got_refcounts (abfd) = local_got_refcounts;
252b5132 3857 }
41fcb14e 3858
e054468f
AM
3859 local_plt = (struct plt_entry **) (local_got_refcounts + symtab_hdr->sh_info);
3860 local_got_tls_masks = (char *) (local_plt + symtab_hdr->sh_info);
25dbc73a 3861 local_got_tls_masks[r_symndx] |= tls_type;
e054468f
AM
3862 if (tls_type != PLT_IFUNC)
3863 local_got_refcounts[r_symndx] += 1;
3864 return local_plt + r_symndx;
25dbc73a 3865}
41fcb14e 3866
a6aa5195 3867static bfd_boolean
3ec01793 3868update_plt_info (bfd *abfd, struct plt_entry **plist,
a6aa5195
AM
3869 asection *sec, bfd_vma addend)
3870{
3871 struct plt_entry *ent;
3872
32af9f6e
AM
3873 if (addend < 32768)
3874 sec = NULL;
3ec01793 3875 for (ent = *plist; ent != NULL; ent = ent->next)
a6aa5195
AM
3876 if (ent->sec == sec && ent->addend == addend)
3877 break;
3878 if (ent == NULL)
3879 {
3880 bfd_size_type amt = sizeof (*ent);
3881 ent = bfd_alloc (abfd, amt);
3882 if (ent == NULL)
3883 return FALSE;
3ec01793 3884 ent->next = *plist;
a6aa5195
AM
3885 ent->sec = sec;
3886 ent->addend = addend;
3887 ent->plt.refcount = 0;
3ec01793 3888 *plist = ent;
a6aa5195
AM
3889 }
3890 ent->plt.refcount += 1;
3891 return TRUE;
3892}
3893
3894static struct plt_entry *
3ec01793 3895find_plt_ent (struct plt_entry **plist, asection *sec, bfd_vma addend)
a6aa5195
AM
3896{
3897 struct plt_entry *ent;
3898
3899 if (addend < 32768)
3900 sec = NULL;
3ec01793 3901 for (ent = *plist; ent != NULL; ent = ent->next)
a6aa5195
AM
3902 if (ent->sec == sec && ent->addend == addend)
3903 break;
3904 return ent;
3905}
3906
e054468f
AM
3907static bfd_boolean
3908is_branch_reloc (enum elf_ppc_reloc_type r_type)
3909{
3910 return (r_type == R_PPC_PLTREL24
3911 || r_type == R_PPC_LOCAL24PC
3912 || r_type == R_PPC_REL24
3913 || r_type == R_PPC_REL14
3914 || r_type == R_PPC_REL14_BRTAKEN
3915 || r_type == R_PPC_REL14_BRNTAKEN
3916 || r_type == R_PPC_ADDR24
3917 || r_type == R_PPC_ADDR14
3918 || r_type == R_PPC_ADDR14_BRTAKEN
dfdaec14
AJ
3919 || r_type == R_PPC_ADDR14_BRNTAKEN
3920 || r_type == R_PPC_VLE_REL24);
e054468f
AM
3921}
3922
25dbc73a
AM
3923static void
3924bad_shared_reloc (bfd *abfd, enum elf_ppc_reloc_type r_type)
3925{
4eca0228 3926 _bfd_error_handler
695344c0 3927 /* xgettext:c-format */
871b3ab2 3928 (_("%pB: relocation %s cannot be used when making a shared object"),
25dbc73a
AM
3929 abfd,
3930 ppc_elf_howto_table[r_type]->name);
3931 bfd_set_error (bfd_error_bad_value);
252b5132
RH
3932}
3933
25dbc73a
AM
3934/* Look through the relocs for a section during the first phase, and
3935 allocate space in the global offset table or procedure linkage
3936 table. */
252b5132 3937
b34976b6 3938static bfd_boolean
25dbc73a
AM
3939ppc_elf_check_relocs (bfd *abfd,
3940 struct bfd_link_info *info,
3941 asection *sec,
3942 const Elf_Internal_Rela *relocs)
252b5132 3943{
7619e7c7 3944 struct ppc_elf_link_hash_table *htab;
25dbc73a
AM
3945 Elf_Internal_Shdr *symtab_hdr;
3946 struct elf_link_hash_entry **sym_hashes;
3947 const Elf_Internal_Rela *rel;
3948 const Elf_Internal_Rela *rel_end;
a6aa5195 3949 asection *got2, *sreloc;
727fc41e 3950 struct elf_link_hash_entry *tga;
25dbc73a 3951
0e1862bb 3952 if (bfd_link_relocatable (info))
25dbc73a 3953 return TRUE;
252b5132 3954
c87b5a93
AM
3955 /* Don't do anything special with non-loaded, non-alloced sections.
3956 In particular, any relocs in such sections should not affect GOT
3957 and PLT reference counting (ie. we don't allow them to create GOT
3958 or PLT entries), there's no possibility or desire to optimize TLS
3959 relocs, and there's not much point in propagating relocs to shared
3960 libs that the dynamic linker won't relocate. */
3961 if ((sec->flags & SEC_ALLOC) == 0)
3962 return TRUE;
3963
252b5132 3964#ifdef DEBUG
871b3ab2 3965 _bfd_error_handler ("ppc_elf_check_relocs called for section %pA in %pB",
25dbc73a 3966 sec, abfd);
252b5132
RH
3967#endif
3968
0c8d6e5c 3969 BFD_ASSERT (is_ppc_elf (abfd));
0ffa91dd 3970
25dbc73a
AM
3971 /* Initialize howto table if not already done. */
3972 if (!ppc_elf_howto_table[R_PPC_ADDR32])
3973 ppc_elf_howto_init ();
3974
7619e7c7 3975 htab = ppc_elf_hash_table (info);
25f23106
AM
3976 if (htab->glink == NULL)
3977 {
3978 if (htab->elf.dynobj == NULL)
3979 htab->elf.dynobj = abfd;
3980 if (!ppc_elf_create_glink (htab->elf.dynobj, info))
3981 return FALSE;
3982 }
727fc41e
AM
3983 tga = elf_link_hash_lookup (&htab->elf, "__tls_get_addr",
3984 FALSE, FALSE, TRUE);
0ffa91dd 3985 symtab_hdr = &elf_symtab_hdr (abfd);
25dbc73a 3986 sym_hashes = elf_sym_hashes (abfd);
a6aa5195 3987 got2 = bfd_get_section_by_name (abfd, ".got2");
25dbc73a
AM
3988 sreloc = NULL;
3989
3990 rel_end = relocs + sec->reloc_count;
3991 for (rel = relocs; rel < rel_end; rel++)
3992 {
3993 unsigned long r_symndx;
3994 enum elf_ppc_reloc_type r_type;
3995 struct elf_link_hash_entry *h;
727fc41e 3996 int tls_type;
cbf95972 3997 struct plt_entry **ifunc;
25dbc73a
AM
3998
3999 r_symndx = ELF32_R_SYM (rel->r_info);
4000 if (r_symndx < symtab_hdr->sh_info)
4001 h = NULL;
4002 else
973a3492
L
4003 {
4004 h = sym_hashes[r_symndx - symtab_hdr->sh_info];
4005 while (h->root.type == bfd_link_hash_indirect
4006 || h->root.type == bfd_link_hash_warning)
4007 h = (struct elf_link_hash_entry *) h->root.u.i.link;
4008 }
25dbc73a
AM
4009
4010 /* If a relocation refers to _GLOBAL_OFFSET_TABLE_, create the .got.
4011 This shows up in particular in an R_PPC_ADDR32 in the eabi
4012 startup code. */
3b36f7e6 4013 if (h != NULL
ce558b89 4014 && htab->elf.sgot == NULL
3b36f7e6 4015 && strcmp (h->root.root.string, "_GLOBAL_OFFSET_TABLE_") == 0)
252b5132 4016 {
3b36f7e6
AM
4017 if (htab->elf.dynobj == NULL)
4018 htab->elf.dynobj = abfd;
4019 if (!ppc_elf_create_got (htab->elf.dynobj, info))
4020 return FALSE;
4021 BFD_ASSERT (h == htab->elf.hgot);
25dbc73a 4022 }
252b5132 4023
727fc41e 4024 tls_type = 0;
de972ffa 4025 r_type = ELF32_R_TYPE (rel->r_info);
cbf95972 4026 ifunc = NULL;
06a162cf 4027 if (h == NULL && !htab->is_vxworks)
e054468f 4028 {
06a162cf
AM
4029 Elf_Internal_Sym *isym = bfd_sym_from_r_symndx (&htab->sym_cache,
4030 abfd, r_symndx);
4031 if (isym == NULL)
4032 return FALSE;
4033
0bed072f 4034 if (ELF_ST_TYPE (isym->st_info) == STT_GNU_IFUNC)
e054468f 4035 {
0bed072f 4036 /* Set PLT_IFUNC flag for this sym, no GOT entry yet. */
06a162cf
AM
4037 ifunc = update_local_sym_info (abfd, symtab_hdr, r_symndx,
4038 PLT_IFUNC);
4039 if (ifunc == NULL)
e054468f
AM
4040 return FALSE;
4041
06a162cf
AM
4042 /* STT_GNU_IFUNC symbols must have a PLT entry;
4043 In a non-pie executable even when there are
4044 no plt calls. */
0e1862bb 4045 if (!bfd_link_pic (info)
0bed072f 4046 || is_branch_reloc (r_type))
e054468f 4047 {
0bed072f
AM
4048 bfd_vma addend = 0;
4049 if (r_type == R_PPC_PLTREL24)
4050 {
4051 ppc_elf_tdata (abfd)->makes_plt_call = 1;
0e1862bb 4052 if (bfd_link_pic (info))
0bed072f
AM
4053 addend = rel->r_addend;
4054 }
4055 if (!update_plt_info (abfd, ifunc, got2, addend))
4056 return FALSE;
e054468f
AM
4057 }
4058 }
25f23106
AM
4059 }
4060
de972ffa
AM
4061 if (!htab->is_vxworks
4062 && is_branch_reloc (r_type)
4063 && h != NULL
4064 && h == tga)
25f23106 4065 {
de972ffa
AM
4066 if (rel != relocs
4067 && (ELF32_R_TYPE (rel[-1].r_info) == R_PPC_TLSGD
4068 || ELF32_R_TYPE (rel[-1].r_info) == R_PPC_TLSLD))
4069 /* We have a new-style __tls_get_addr call with a marker
4070 reloc. */
4071 ;
4072 else
4073 /* Mark this section as having an old-style call. */
4074 sec->has_tls_get_addr_call = 1;
e054468f 4075 }
727fc41e 4076
25dbc73a
AM
4077 switch (r_type)
4078 {
727fc41e
AM
4079 case R_PPC_TLSGD:
4080 case R_PPC_TLSLD:
4081 /* These special tls relocs tie a call to __tls_get_addr with
4082 its parameter symbol. */
4083 break;
4084
25dbc73a
AM
4085 case R_PPC_GOT_TLSLD16:
4086 case R_PPC_GOT_TLSLD16_LO:
4087 case R_PPC_GOT_TLSLD16_HI:
4088 case R_PPC_GOT_TLSLD16_HA:
25dbc73a
AM
4089 tls_type = TLS_TLS | TLS_LD;
4090 goto dogottls;
252b5132 4091
25dbc73a
AM
4092 case R_PPC_GOT_TLSGD16:
4093 case R_PPC_GOT_TLSGD16_LO:
4094 case R_PPC_GOT_TLSGD16_HI:
4095 case R_PPC_GOT_TLSGD16_HA:
4096 tls_type = TLS_TLS | TLS_GD;
4097 goto dogottls;
4098
4099 case R_PPC_GOT_TPREL16:
4100 case R_PPC_GOT_TPREL16_LO:
4101 case R_PPC_GOT_TPREL16_HI:
4102 case R_PPC_GOT_TPREL16_HA:
7c8bbca5 4103 if (bfd_link_dll (info))
25dbc73a
AM
4104 info->flags |= DF_STATIC_TLS;
4105 tls_type = TLS_TLS | TLS_TPREL;
4106 goto dogottls;
4107
4108 case R_PPC_GOT_DTPREL16:
4109 case R_PPC_GOT_DTPREL16_LO:
4110 case R_PPC_GOT_DTPREL16_HI:
4111 case R_PPC_GOT_DTPREL16_HA:
4112 tls_type = TLS_TLS | TLS_DTPREL;
4113 dogottls:
4114 sec->has_tls_reloc = 1;
1a0670f3 4115 /* Fall through. */
252b5132 4116
25dbc73a
AM
4117 /* GOT16 relocations */
4118 case R_PPC_GOT16:
4119 case R_PPC_GOT16_LO:
4120 case R_PPC_GOT16_HI:
4121 case R_PPC_GOT16_HA:
4122 /* This symbol requires a global offset table entry. */
ce558b89 4123 if (htab->elf.sgot == NULL)
25dbc73a
AM
4124 {
4125 if (htab->elf.dynobj == NULL)
4126 htab->elf.dynobj = abfd;
4127 if (!ppc_elf_create_got (htab->elf.dynobj, info))
4128 return FALSE;
4129 }
4130 if (h != NULL)
4131 {
4132 h->got.refcount += 1;
4133 ppc_elf_hash_entry (h)->tls_mask |= tls_type;
4134 }
4135 else
4136 /* This is a global offset table entry for a local symbol. */
4137 if (!update_local_sym_info (abfd, symtab_hdr, r_symndx, tls_type))
4138 return FALSE;
91e21fb7
AM
4139
4140 /* We may also need a plt entry if the symbol turns out to be
4141 an ifunc. */
0e1862bb 4142 if (h != NULL && !bfd_link_pic (info))
91e21fb7
AM
4143 {
4144 if (!update_plt_info (abfd, &h->plt.plist, NULL, 0))
4145 return FALSE;
4146 }
25dbc73a 4147 break;
252b5132 4148
25dbc73a
AM
4149 /* Indirect .sdata relocation. */
4150 case R_PPC_EMB_SDAI16:
0e1862bb 4151 if (bfd_link_pic (info))
25dbc73a
AM
4152 {
4153 bad_shared_reloc (abfd, r_type);
4154 return FALSE;
4155 }
93d1b056
AM
4156 htab->sdata[0].sym->ref_regular = 1;
4157 if (!elf_allocate_pointer_linker_section (abfd, &htab->sdata[0],
4158 h, rel))
25dbc73a 4159 return FALSE;
046183de
AM
4160 if (h != NULL)
4161 {
4162 ppc_elf_hash_entry (h)->has_sda_refs = TRUE;
4163 h->non_got_ref = TRUE;
4164 }
25dbc73a 4165 break;
252b5132 4166
25dbc73a
AM
4167 /* Indirect .sdata2 relocation. */
4168 case R_PPC_EMB_SDA2I16:
0e1862bb 4169 if (bfd_link_pic (info))
25dbc73a
AM
4170 {
4171 bad_shared_reloc (abfd, r_type);
4172 return FALSE;
4173 }
93d1b056
AM
4174 htab->sdata[1].sym->ref_regular = 1;
4175 if (!elf_allocate_pointer_linker_section (abfd, &htab->sdata[1],
4176 h, rel))
25dbc73a 4177 return FALSE;
046183de
AM
4178 if (h != NULL)
4179 {
4180 ppc_elf_hash_entry (h)->has_sda_refs = TRUE;
4181 h->non_got_ref = TRUE;
4182 }
25dbc73a 4183 break;
252b5132 4184
93d1b056
AM
4185 case R_PPC_SDAREL16:
4186 htab->sdata[0].sym->ref_regular = 1;
1a0670f3 4187 /* Fall through. */
93d1b056 4188
b9c361e0
JL
4189 case R_PPC_VLE_SDAREL_LO16A:
4190 case R_PPC_VLE_SDAREL_LO16D:
4191 case R_PPC_VLE_SDAREL_HI16A:
4192 case R_PPC_VLE_SDAREL_HI16D:
4193 case R_PPC_VLE_SDAREL_HA16A:
4194 case R_PPC_VLE_SDAREL_HA16D:
046183de
AM
4195 if (h != NULL)
4196 {
4197 ppc_elf_hash_entry (h)->has_sda_refs = TRUE;
4198 h->non_got_ref = TRUE;
4199 }
4200 break;
4201
b9c361e0
JL
4202 case R_PPC_VLE_REL8:
4203 case R_PPC_VLE_REL15:
4204 case R_PPC_VLE_REL24:
4205 case R_PPC_VLE_LO16A:
4206 case R_PPC_VLE_LO16D:
4207 case R_PPC_VLE_HI16A:
4208 case R_PPC_VLE_HI16D:
4209 case R_PPC_VLE_HA16A:
4210 case R_PPC_VLE_HA16D:
83eef883 4211 case R_PPC_VLE_ADDR20:
b9c361e0
JL
4212 break;
4213
25dbc73a 4214 case R_PPC_EMB_SDA2REL:
0e1862bb 4215 if (bfd_link_pic (info))
046183de
AM
4216 {
4217 bad_shared_reloc (abfd, r_type);
4218 return FALSE;
4219 }
93d1b056 4220 htab->sdata[1].sym->ref_regular = 1;
046183de
AM
4221 if (h != NULL)
4222 {
4223 ppc_elf_hash_entry (h)->has_sda_refs = TRUE;
4224 h->non_got_ref = TRUE;
4225 }
4226 break;
4227
b9c361e0
JL
4228 case R_PPC_VLE_SDA21_LO:
4229 case R_PPC_VLE_SDA21:
25dbc73a
AM
4230 case R_PPC_EMB_SDA21:
4231 case R_PPC_EMB_RELSDA:
0e1862bb 4232 if (bfd_link_pic (info))
046183de
AM
4233 {
4234 bad_shared_reloc (abfd, r_type);
4235 return FALSE;
4236 }
046183de
AM
4237 if (h != NULL)
4238 {
4239 ppc_elf_hash_entry (h)->has_sda_refs = TRUE;
4240 h->non_got_ref = TRUE;
4241 }
4242 break;
4243
25dbc73a
AM
4244 case R_PPC_EMB_NADDR32:
4245 case R_PPC_EMB_NADDR16:
4246 case R_PPC_EMB_NADDR16_LO:
4247 case R_PPC_EMB_NADDR16_HI:
4248 case R_PPC_EMB_NADDR16_HA:
0e1862bb 4249 if (bfd_link_pic (info))
25dbc73a
AM
4250 {
4251 bad_shared_reloc (abfd, r_type);
4252 return FALSE;
4253 }
4dc4a9a5 4254 if (h != NULL)
046183de 4255 h->non_got_ref = TRUE;
25dbc73a 4256 break;
252b5132 4257
25dbc73a 4258 case R_PPC_PLTREL24:
de972ffa 4259 if (h == NULL)
6d78d0b9
AM
4260 break;
4261 /* Fall through */
4262 case R_PPC_PLT32:
25dbc73a
AM
4263 case R_PPC_PLTREL32:
4264 case R_PPC_PLT16_LO:
4265 case R_PPC_PLT16_HI:
4266 case R_PPC_PLT16_HA:
4267#ifdef DEBUG
4268 fprintf (stderr, "Reloc requires a PLT entry\n");
4269#endif
cbf95972 4270 /* This symbol requires a procedure linkage table entry. */
25dbc73a
AM
4271 if (h == NULL)
4272 {
cbf95972
AM
4273 if (ifunc == NULL)
4274 {
4275 /* It does not make sense to have a procedure linkage
4276 table entry for a non-ifunc local symbol. */
4277 info->callbacks->einfo
695344c0 4278 /* xgettext:c-format */
174d0a74 4279 (_("%H: %s reloc against local symbol\n"),
cbf95972
AM
4280 abfd, sec, rel->r_offset,
4281 ppc_elf_howto_table[r_type]->name);
4282 bfd_set_error (bfd_error_bad_value);
4283 return FALSE;
4284 }
25dbc73a 4285 }
a6aa5195
AM
4286 else
4287 {
016687f8 4288 bfd_vma addend = 0;
ee05f2fe 4289
016687f8
AM
4290 if (r_type == R_PPC_PLTREL24)
4291 {
4292 ppc_elf_tdata (abfd)->makes_plt_call = 1;
0e1862bb 4293 if (bfd_link_pic (info))
a877a2b6 4294 addend = rel->r_addend;
016687f8 4295 }
a6aa5195 4296 h->needs_plt = 1;
32af9f6e 4297 if (!update_plt_info (abfd, &h->plt.plist, got2, addend))
a6aa5195
AM
4298 return FALSE;
4299 }
25dbc73a 4300 break;
ee05f2fe 4301
25dbc73a
AM
4302 /* The following relocations don't need to propagate the
4303 relocation if linking a shared object since they are
4304 section relative. */
4305 case R_PPC_SECTOFF:
4306 case R_PPC_SECTOFF_LO:
4307 case R_PPC_SECTOFF_HI:
4308 case R_PPC_SECTOFF_HA:
4309 case R_PPC_DTPREL16:
4310 case R_PPC_DTPREL16_LO:
4311 case R_PPC_DTPREL16_HI:
4312 case R_PPC_DTPREL16_HA:
4313 case R_PPC_TOC16:
4314 break;
252b5132 4315
d7128ce4
AM
4316 case R_PPC_REL16:
4317 case R_PPC_REL16_LO:
4318 case R_PPC_REL16_HI:
4319 case R_PPC_REL16_HA:
a680de9a 4320 case R_PPC_REL16DX_HA:
016687f8 4321 ppc_elf_tdata (abfd)->has_rel16 = 1;
d7128ce4
AM
4322 break;
4323
a6aa5195 4324 /* These are just markers. */
25dbc73a
AM
4325 case R_PPC_TLS:
4326 case R_PPC_EMB_MRKREF:
4327 case R_PPC_NONE:
4328 case R_PPC_max:
32af9f6e
AM
4329 case R_PPC_RELAX:
4330 case R_PPC_RELAX_PLT:
4331 case R_PPC_RELAX_PLTREL24:
7ba71655 4332 case R_PPC_16DX_HA:
25dbc73a 4333 break;
252b5132 4334
25dbc73a
AM
4335 /* These should only appear in dynamic objects. */
4336 case R_PPC_COPY:
4337 case R_PPC_GLOB_DAT:
4338 case R_PPC_JMP_SLOT:
4339 case R_PPC_RELATIVE:
e054468f 4340 case R_PPC_IRELATIVE:
25dbc73a 4341 break;
252b5132 4342
25dbc73a
AM
4343 /* These aren't handled yet. We'll report an error later. */
4344 case R_PPC_ADDR30:
4345 case R_PPC_EMB_RELSEC16:
4346 case R_PPC_EMB_RELST_LO:
4347 case R_PPC_EMB_RELST_HI:
4348 case R_PPC_EMB_RELST_HA:
4349 case R_PPC_EMB_BIT_FLD:
4350 break;
252b5132 4351
25dbc73a
AM
4352 /* This refers only to functions defined in the shared library. */
4353 case R_PPC_LOCAL24PC:
727fc41e 4354 if (h != NULL && h == htab->elf.hgot && htab->plt_type == PLT_UNSET)
016687f8
AM
4355 {
4356 htab->plt_type = PLT_OLD;
4357 htab->old_bfd = abfd;
4358 }
c7e17e05
AM
4359 if (h != NULL && h->type == STT_GNU_IFUNC)
4360 {
c7e17e05
AM
4361 h->needs_plt = 1;
4362 if (!update_plt_info (abfd, &h->plt.plist, NULL, 0))
4363 return FALSE;
4364 }
25dbc73a 4365 break;
252b5132 4366
25dbc73a
AM
4367 /* This relocation describes the C++ object vtable hierarchy.
4368 Reconstruct it for later use during GC. */
4369 case R_PPC_GNU_VTINHERIT:
4370 if (!bfd_elf_gc_record_vtinherit (abfd, sec, h, rel->r_offset))
4371 return FALSE;
4372 break;
252b5132 4373
25dbc73a
AM
4374 /* This relocation describes which C++ vtable entries are actually
4375 used. Record for later use during GC. */
4376 case R_PPC_GNU_VTENTRY:
d17e0c6e
JB
4377 BFD_ASSERT (h != NULL);
4378 if (h != NULL
4379 && !bfd_elf_gc_record_vtentry (abfd, sec, h, rel->r_addend))
25dbc73a
AM
4380 return FALSE;
4381 break;
252b5132 4382
7c8bbca5 4383 /* We shouldn't really be seeing TPREL32. */
25dbc73a 4384 case R_PPC_TPREL32:
1d483afe
AM
4385 case R_PPC_TPREL16:
4386 case R_PPC_TPREL16_LO:
4387 case R_PPC_TPREL16_HI:
4388 case R_PPC_TPREL16_HA:
7c8bbca5 4389 if (bfd_link_dll (info))
25dbc73a
AM
4390 info->flags |= DF_STATIC_TLS;
4391 goto dodyn;
252b5132 4392
25dbc73a
AM
4393 /* Nor these. */
4394 case R_PPC_DTPMOD32:
4395 case R_PPC_DTPREL32:
4396 goto dodyn;
252b5132 4397
9edfd1af
AM
4398 case R_PPC_REL32:
4399 if (h == NULL
4400 && got2 != NULL
4401 && (sec->flags & SEC_CODE) != 0
0e1862bb 4402 && bfd_link_pic (info)
4a3dc543 4403 && htab->plt_type == PLT_UNSET)
9edfd1af
AM
4404 {
4405 /* Old -fPIC gcc code has .long LCTOC1-LCFx just before
4406 the start of a function, which assembles to a REL32
4407 reference to .got2. If we detect one of these, then
4408 force the old PLT layout because the linker cannot
4409 reliably deduce the GOT pointer value needed for
4410 PLT call stubs. */
4411 asection *s;
87d72d41 4412 Elf_Internal_Sym *isym;
9edfd1af 4413
87d72d41
AM
4414 isym = bfd_sym_from_r_symndx (&htab->sym_cache,
4415 abfd, r_symndx);
4416 if (isym == NULL)
4417 return FALSE;
4418
4419 s = bfd_section_from_elf_index (abfd, isym->st_shndx);
9edfd1af 4420 if (s == got2)
016687f8
AM
4421 {
4422 htab->plt_type = PLT_OLD;
4423 htab->old_bfd = abfd;
4424 }
9edfd1af 4425 }
7123df0e 4426 if (h == NULL || h == htab->elf.hgot)
fd38b44c 4427 break;
625af618
AM
4428 /* fall through */
4429
4430 case R_PPC_ADDR32:
4431 case R_PPC_ADDR16:
4432 case R_PPC_ADDR16_LO:
4433 case R_PPC_ADDR16_HI:
4434 case R_PPC_ADDR16_HA:
4435 case R_PPC_UADDR32:
4436 case R_PPC_UADDR16:
0e1862bb 4437 if (h != NULL && !bfd_link_pic (info))
625af618
AM
4438 {
4439 /* We may need a plt entry if the symbol turns out to be
4440 a function defined in a dynamic object. */
3ec01793 4441 if (!update_plt_info (abfd, &h->plt.plist, NULL, 0))
625af618
AM
4442 return FALSE;
4443
4444 /* We may need a copy reloc too. */
4445 h->non_got_ref = 1;
4446 h->pointer_equality_needed = 1;
d3e454b9
AM
4447 if (r_type == R_PPC_ADDR16_HA)
4448 ppc_elf_hash_entry (h)->has_addr16_ha = 1;
4449 if (r_type == R_PPC_ADDR16_LO)
4450 ppc_elf_hash_entry (h)->has_addr16_lo = 1;
625af618
AM
4451 }
4452 goto dodyn;
9edfd1af 4453
25dbc73a
AM
4454 case R_PPC_REL24:
4455 case R_PPC_REL14:
4456 case R_PPC_REL14_BRTAKEN:
4457 case R_PPC_REL14_BRNTAKEN:
d7128ce4 4458 if (h == NULL)
25dbc73a 4459 break;
7123df0e 4460 if (h == htab->elf.hgot)
d7128ce4 4461 {
7123df0e 4462 if (htab->plt_type == PLT_UNSET)
016687f8
AM
4463 {
4464 htab->plt_type = PLT_OLD;
4465 htab->old_bfd = abfd;
4466 }
d7128ce4
AM
4467 break;
4468 }
25dbc73a 4469 /* fall through */
ee05f2fe 4470
25dbc73a 4471 case R_PPC_ADDR24:
25dbc73a
AM
4472 case R_PPC_ADDR14:
4473 case R_PPC_ADDR14_BRTAKEN:
4474 case R_PPC_ADDR14_BRNTAKEN:
0e1862bb 4475 if (h != NULL && !bfd_link_pic (info))
25dbc73a
AM
4476 {
4477 /* We may need a plt entry if the symbol turns out to be
4478 a function defined in a dynamic object. */
e054468f 4479 h->needs_plt = 1;
de972ffa 4480 if (!update_plt_info (abfd, &h->plt.plist, NULL, 0))
a6aa5195 4481 return FALSE;
625af618 4482 break;
25dbc73a 4483 }
7619e7c7 4484
25dbc73a
AM
4485 dodyn:
4486 /* If we are creating a shared library, and this is a reloc
4487 against a global symbol, or a non PC relative reloc
4488 against a local symbol, then we need to copy the reloc
4489 into the shared library. However, if we are linking with
4490 -Bsymbolic, we do not need to copy a reloc against a
4491 global symbol which is defined in an object we are
4492 including in the link (i.e., DEF_REGULAR is set). At
4493 this point we have not seen all the input files, so it is
4494 possible that DEF_REGULAR is not set now but will be set
4495 later (it is never cleared). In case of a weak definition,
4496 DEF_REGULAR may be cleared later by a strong definition in
4497 a shared library. We account for that possibility below by
4498 storing information in the dyn_relocs field of the hash
4499 table entry. A similar situation occurs when creating
4500 shared libraries and symbol visibility changes render the
4501 symbol local.
7619e7c7 4502
25dbc73a
AM
4503 If on the other hand, we are creating an executable, we
4504 may need to keep relocations for symbols satisfied by a
4505 dynamic library if we manage to avoid copy relocs for the
4506 symbol. */
0e1862bb 4507 if ((bfd_link_pic (info)
1d483afe 4508 && (must_be_dyn_reloc (info, r_type)
25dbc73a 4509 || (h != NULL
198f1157 4510 && (!SYMBOLIC_BIND (info, h)
25dbc73a
AM
4511 || h->root.type == bfd_link_hash_defweak
4512 || !h->def_regular))))
4513 || (ELIMINATE_COPY_RELOCS
0e1862bb 4514 && !bfd_link_pic (info)
25dbc73a
AM
4515 && h != NULL
4516 && (h->root.type == bfd_link_hash_defweak
de972ffa 4517 || !h->def_regular)))
25dbc73a 4518 {
25dbc73a
AM
4519#ifdef DEBUG
4520 fprintf (stderr,
4521 "ppc_elf_check_relocs needs to "
4522 "create relocation for %s\n",
4523 (h && h->root.root.string
4524 ? h->root.root.string : "<unknown>"));
4525#endif
4526 if (sreloc == NULL)
4527 {
c9a2f333
AM
4528 if (htab->elf.dynobj == NULL)
4529 htab->elf.dynobj = abfd;
83bac4b0
NC
4530
4531 sreloc = _bfd_elf_make_dynamic_reloc_section
4532 (sec, htab->elf.dynobj, 2, abfd, /*rela?*/ TRUE);
4533
25dbc73a 4534 if (sreloc == NULL)
83bac4b0 4535 return FALSE;
25dbc73a 4536 }
7619e7c7 4537
25dbc73a
AM
4538 /* If this is a global symbol, we count the number of
4539 relocations we need for this symbol. */
4540 if (h != NULL)
4541 {
f95f8542
AM
4542 struct elf_dyn_relocs *p;
4543 struct elf_dyn_relocs **rel_head;
4544
91d6fa6a 4545 rel_head = &ppc_elf_hash_entry (h)->dyn_relocs;
f95f8542
AM
4546 p = *rel_head;
4547 if (p == NULL || p->sec != sec)
4548 {
4549 p = bfd_alloc (htab->elf.dynobj, sizeof *p);
4550 if (p == NULL)
4551 return FALSE;
4552 p->next = *rel_head;
4553 *rel_head = p;
4554 p->sec = sec;
4555 p->count = 0;
4556 p->pc_count = 0;
4557 }
4558 p->count += 1;
4559 if (!must_be_dyn_reloc (info, r_type))
4560 p->pc_count += 1;
25dbc73a
AM
4561 }
4562 else
4563 {
4564 /* Track dynamic relocs needed for local syms too.
4565 We really need local syms available to do this
4566 easily. Oh well. */
f95f8542
AM
4567 struct ppc_dyn_relocs *p;
4568 struct ppc_dyn_relocs **rel_head;
4569 bfd_boolean is_ifunc;
25dbc73a 4570 asection *s;
6edfbbad 4571 void *vpp;
87d72d41 4572 Elf_Internal_Sym *isym;
6edfbbad 4573
87d72d41
AM
4574 isym = bfd_sym_from_r_symndx (&htab->sym_cache,
4575 abfd, r_symndx);
4576 if (isym == NULL)
25dbc73a 4577 return FALSE;
7fce784e 4578
87d72d41
AM
4579 s = bfd_section_from_elf_index (abfd, isym->st_shndx);
4580 if (s == NULL)
4581 s = sec;
4582
6edfbbad 4583 vpp = &elf_section_data (s)->local_dynrel;
f95f8542
AM
4584 rel_head = (struct ppc_dyn_relocs **) vpp;
4585 is_ifunc = ELF_ST_TYPE (isym->st_info) == STT_GNU_IFUNC;
4586 p = *rel_head;
4587 if (p != NULL && p->sec == sec && p->ifunc != is_ifunc)
4588 p = p->next;
4589 if (p == NULL || p->sec != sec || p->ifunc != is_ifunc)
4590 {
4591 p = bfd_alloc (htab->elf.dynobj, sizeof *p);
4592 if (p == NULL)
4593 return FALSE;
4594 p->next = *rel_head;
4595 *rel_head = p;
4596 p->sec = sec;
4597 p->ifunc = is_ifunc;
4598 p->count = 0;
4599 }
4600 p->count += 1;
25dbc73a 4601 }
7619e7c7 4602 }
25dbc73a
AM
4603
4604 break;
7619e7c7
AM
4605 }
4606 }
ee05f2fe 4607
25dbc73a
AM
4608 return TRUE;
4609}
4610\f
005d79fd
AM
4611/* Warn for conflicting Tag_GNU_Power_ABI_FP attributes between IBFD
4612 and OBFD, and merge non-conflicting ones. */
4613void
50e03d47 4614_bfd_elf_ppc_merge_fp_attributes (bfd *ibfd, struct bfd_link_info *info)
34c8bcba 4615{
50e03d47 4616 bfd *obfd = info->output_bfd;
c6e65352
DJ
4617 obj_attribute *in_attr, *in_attrs;
4618 obj_attribute *out_attr, *out_attrs;
34c8bcba 4619
c6e65352
DJ
4620 in_attrs = elf_known_obj_attributes (ibfd)[OBJ_ATTR_GNU];
4621 out_attrs = elf_known_obj_attributes (obfd)[OBJ_ATTR_GNU];
4622
c6e65352
DJ
4623 in_attr = &in_attrs[Tag_GNU_Power_ABI_FP];
4624 out_attr = &out_attrs[Tag_GNU_Power_ABI_FP];
005d79fd 4625
c6e65352 4626 if (in_attr->i != out_attr->i)
34c8bcba 4627 {
005d79fd
AM
4628 int in_fp = in_attr->i & 3;
4629 int out_fp = out_attr->i & 3;
4630
4631 if (in_fp == 0)
34c8bcba 4632 ;
005d79fd
AM
4633 else if (out_fp == 0)
4634 {
4635 out_attr->type = 1;
4636 out_attr->i ^= in_fp;
4637 }
4638 else if (out_fp != 2 && in_fp == 2)
34c8bcba 4639 _bfd_error_handler
695344c0 4640 /* xgettext:c-format */
871b3ab2 4641 (_("Warning: %pB uses hard float, %pB uses soft float"), obfd, ibfd);
005d79fd
AM
4642 else if (out_fp == 2 && in_fp != 2)
4643 _bfd_error_handler
695344c0 4644 /* xgettext:c-format */
871b3ab2 4645 (_("Warning: %pB uses hard float, %pB uses soft float"), ibfd, obfd);
005d79fd 4646 else if (out_fp == 1 && in_fp == 3)
3c7b9897 4647 _bfd_error_handler
695344c0 4648 /* xgettext:c-format */
871b3ab2
AM
4649 (_("Warning: %pB uses double-precision hard float, "
4650 "%pB uses single-precision hard float"), obfd, ibfd);
005d79fd 4651 else if (out_fp == 3 && in_fp == 1)
3c7b9897 4652 _bfd_error_handler
695344c0 4653 /* xgettext:c-format */
871b3ab2
AM
4654 (_("Warning: %pB uses double-precision hard float, "
4655 "%pB uses single-precision hard float"), ibfd, obfd);
005d79fd
AM
4656
4657 in_fp = in_attr->i & 0xc;
4658 out_fp = out_attr->i & 0xc;
4659 if (in_fp == 0)
4660 ;
4661 else if (out_fp == 0)
4662 {
4663 out_attr->type = 1;
4664 out_attr->i ^= in_fp;
4665 }
4666 else if (out_fp != 2 * 4 && in_fp == 2 * 4)
3c7b9897 4667 _bfd_error_handler
695344c0 4668 /* xgettext:c-format */
871b3ab2
AM
4669 (_("Warning: %pB uses 64-bit long double, "
4670 "%pB uses 128-bit long double"), ibfd, obfd);
005d79fd 4671 else if (in_fp != 2 * 4 && out_fp == 2 * 4)
34c8bcba 4672 _bfd_error_handler
695344c0 4673 /* xgettext:c-format */
871b3ab2
AM
4674 (_("Warning: %pB uses 64-bit long double, "
4675 "%pB uses 128-bit long double"), obfd, ibfd);
005d79fd 4676 else if (out_fp == 1 * 4 && in_fp == 3 * 4)
34c8bcba 4677 _bfd_error_handler
695344c0 4678 /* xgettext:c-format */
871b3ab2
AM
4679 (_("Warning: %pB uses IBM long double, "
4680 "%pB uses IEEE long double"), ibfd, obfd);
005d79fd 4681 else if (out_fp == 3 * 4 && in_fp == 1 * 4)
34c8bcba 4682 _bfd_error_handler
695344c0 4683 /* xgettext:c-format */
871b3ab2
AM
4684 (_("Warning: %pB uses IBM long double, "
4685 "%pB uses IEEE long double"), obfd, ibfd);
c6e65352 4686 }
005d79fd
AM
4687}
4688
4689/* Merge object attributes from IBFD into OBFD. Warn if
4690 there are conflicting attributes. */
4691static bfd_boolean
50e03d47 4692ppc_elf_merge_obj_attributes (bfd *ibfd, struct bfd_link_info *info)
005d79fd 4693{
50e03d47 4694 bfd *obfd;
005d79fd
AM
4695 obj_attribute *in_attr, *in_attrs;
4696 obj_attribute *out_attr, *out_attrs;
4697
50e03d47 4698 _bfd_elf_ppc_merge_fp_attributes (ibfd, info);
005d79fd 4699
50e03d47 4700 obfd = info->output_bfd;
005d79fd
AM
4701 in_attrs = elf_known_obj_attributes (ibfd)[OBJ_ATTR_GNU];
4702 out_attrs = elf_known_obj_attributes (obfd)[OBJ_ATTR_GNU];
c6e65352
DJ
4703
4704 /* Check for conflicting Tag_GNU_Power_ABI_Vector attributes and
4705 merge non-conflicting ones. */
4706 in_attr = &in_attrs[Tag_GNU_Power_ABI_Vector];
4707 out_attr = &out_attrs[Tag_GNU_Power_ABI_Vector];
4708 if (in_attr->i != out_attr->i)
4709 {
005d79fd
AM
4710 int in_vec = in_attr->i & 3;
4711 int out_vec = out_attr->i & 3;
c6e65352 4712
005d79fd
AM
4713 if (in_vec == 0)
4714 ;
4715 else if (out_vec == 0)
c6e65352 4716 {
005d79fd
AM
4717 out_attr->type = 1;
4718 out_attr->i = in_vec;
c6e65352 4719 }
c6e65352
DJ
4720 /* For now, allow generic to transition to AltiVec or SPE
4721 without a warning. If GCC marked files with their stack
4722 alignment and used don't-care markings for files which are
4723 not affected by the vector ABI, we could warn about this
4724 case too. */
005d79fd 4725 else if (in_vec == 1)
c6e65352 4726 ;
005d79fd
AM
4727 else if (out_vec == 1)
4728 {
4729 out_attr->type = 1;
4730 out_attr->i = in_vec;
4731 }
4732 else if (out_vec < in_vec)
c6e65352 4733 _bfd_error_handler
695344c0 4734 /* xgettext:c-format */
871b3ab2 4735 (_("Warning: %pB uses AltiVec vector ABI, %pB uses SPE vector ABI"),
005d79fd
AM
4736 obfd, ibfd);
4737 else if (out_vec > in_vec)
c6e65352 4738 _bfd_error_handler
695344c0 4739 /* xgettext:c-format */
871b3ab2 4740 (_("Warning: %pB uses AltiVec vector ABI, %pB uses SPE vector ABI"),
005d79fd 4741 ibfd, obfd);
34c8bcba
JM
4742 }
4743
f82e0623
NF
4744 /* Check for conflicting Tag_GNU_Power_ABI_Struct_Return attributes
4745 and merge non-conflicting ones. */
4746 in_attr = &in_attrs[Tag_GNU_Power_ABI_Struct_Return];
4747 out_attr = &out_attrs[Tag_GNU_Power_ABI_Struct_Return];
4748 if (in_attr->i != out_attr->i)
4749 {
005d79fd
AM
4750 int in_struct = in_attr->i & 3;
4751 int out_struct = out_attr->i & 3;
4752
4753 if (in_struct == 0 || in_struct == 3)
f82e0623 4754 ;
005d79fd
AM
4755 else if (out_struct == 0)
4756 {
4757 out_attr->type = 1;
4758 out_attr->i = in_struct;
4759 }
4760 else if (out_struct < in_struct)
4761 _bfd_error_handler
695344c0 4762 /* xgettext:c-format */
871b3ab2
AM
4763 (_("Warning: %pB uses r3/r4 for small structure returns, "
4764 "%pB uses memory"), obfd, ibfd);
005d79fd
AM
4765 else if (out_struct > in_struct)
4766 _bfd_error_handler
695344c0 4767 /* xgettext:c-format */
871b3ab2
AM
4768 (_("Warning: %pB uses r3/r4 for small structure returns, "
4769 "%pB uses memory"), ibfd, obfd);
f82e0623
NF
4770 }
4771
34c8bcba 4772 /* Merge Tag_compatibility attributes and any common GNU ones. */
50e03d47 4773 _bfd_elf_merge_object_attributes (ibfd, info);
34c8bcba
JM
4774
4775 return TRUE;
4776}
4777
8853c3d3
AM
4778/* Merge backend specific data from an object file to the output
4779 object file when linking. */
4780
4781static bfd_boolean
50e03d47 4782ppc_elf_merge_private_bfd_data (bfd *ibfd, struct bfd_link_info *info)
8853c3d3 4783{
50e03d47 4784 bfd *obfd = info->output_bfd;
8853c3d3
AM
4785 flagword old_flags;
4786 flagword new_flags;
4787 bfd_boolean error;
4788
0c8d6e5c 4789 if (!is_ppc_elf (ibfd) || !is_ppc_elf (obfd))
8853c3d3
AM
4790 return TRUE;
4791
cc643b88 4792 /* Check if we have the same endianness. */
50e03d47 4793 if (! _bfd_generic_verify_endian_match (ibfd, info))
8853c3d3
AM
4794 return FALSE;
4795
50e03d47 4796 if (!ppc_elf_merge_obj_attributes (ibfd, info))
34c8bcba
JM
4797 return FALSE;
4798
8853c3d3
AM
4799 new_flags = elf_elfheader (ibfd)->e_flags;
4800 old_flags = elf_elfheader (obfd)->e_flags;
4801 if (!elf_flags_init (obfd))
4802 {
4803 /* First call, no flags set. */
4804 elf_flags_init (obfd) = TRUE;
4805 elf_elfheader (obfd)->e_flags = new_flags;
4806 }
4807
4808 /* Compatible flags are ok. */
4809 else if (new_flags == old_flags)
4810 ;
4811
4812 /* Incompatible flags. */
4813 else
4814 {
4815 /* Warn about -mrelocatable mismatch. Allow -mrelocatable-lib
4816 to be linked with either. */
4817 error = FALSE;
4818 if ((new_flags & EF_PPC_RELOCATABLE) != 0
4819 && (old_flags & (EF_PPC_RELOCATABLE | EF_PPC_RELOCATABLE_LIB)) == 0)
4820 {
4821 error = TRUE;
4eca0228 4822 _bfd_error_handler
871b3ab2 4823 (_("%pB: compiled with -mrelocatable and linked with "
8853c3d3
AM
4824 "modules compiled normally"), ibfd);
4825 }
4826 else if ((new_flags & (EF_PPC_RELOCATABLE | EF_PPC_RELOCATABLE_LIB)) == 0
4827 && (old_flags & EF_PPC_RELOCATABLE) != 0)
4828 {
4829 error = TRUE;
4eca0228 4830 _bfd_error_handler
871b3ab2 4831 (_("%pB: compiled normally and linked with "
8853c3d3
AM
4832 "modules compiled with -mrelocatable"), ibfd);
4833 }
4834
4835 /* The output is -mrelocatable-lib iff both the input files are. */
4836 if (! (new_flags & EF_PPC_RELOCATABLE_LIB))
4837 elf_elfheader (obfd)->e_flags &= ~EF_PPC_RELOCATABLE_LIB;
4838
4839 /* The output is -mrelocatable iff it can't be -mrelocatable-lib,
4840 but each input file is either -mrelocatable or -mrelocatable-lib. */
4841 if (! (elf_elfheader (obfd)->e_flags & EF_PPC_RELOCATABLE_LIB)
4842 && (new_flags & (EF_PPC_RELOCATABLE_LIB | EF_PPC_RELOCATABLE))
4843 && (old_flags & (EF_PPC_RELOCATABLE_LIB | EF_PPC_RELOCATABLE)))
4844 elf_elfheader (obfd)->e_flags |= EF_PPC_RELOCATABLE;
4845
4846 /* Do not warn about eabi vs. V.4 mismatch, just or in the bit if
4847 any module uses it. */
4848 elf_elfheader (obfd)->e_flags |= (new_flags & EF_PPC_EMB);
4849
4850 new_flags &= ~(EF_PPC_RELOCATABLE | EF_PPC_RELOCATABLE_LIB | EF_PPC_EMB);
4851 old_flags &= ~(EF_PPC_RELOCATABLE | EF_PPC_RELOCATABLE_LIB | EF_PPC_EMB);
4852
4853 /* Warn about any other mismatches. */
4854 if (new_flags != old_flags)
4855 {
4856 error = TRUE;
4eca0228 4857 _bfd_error_handler
695344c0 4858 /* xgettext:c-format */
871b3ab2 4859 (_("%pB: uses different e_flags (%#x) fields "
cd9af601
AM
4860 "than previous modules (%#x)"),
4861 ibfd, new_flags, old_flags);
8853c3d3
AM
4862 }
4863
4864 if (error)
4865 {
4866 bfd_set_error (bfd_error_bad_value);
4867 return FALSE;
4868 }
4869 }
4870
4871 return TRUE;
4872}
b9c361e0
JL
4873
4874static void
95f0d0d2 4875ppc_elf_vle_split16 (bfd *input_bfd,
08dc996f
AM
4876 asection *input_section,
4877 unsigned long offset,
95f0d0d2 4878 bfd_byte *loc,
86c95733 4879 bfd_vma value,
08dc996f
AM
4880 split16_format_type split16_format,
4881 bfd_boolean fixup)
b9c361e0 4882{
08dc996f 4883 unsigned int insn, opcode, top5;
b9c361e0 4884
95f0d0d2 4885 insn = bfd_get_32 (input_bfd, loc);
673cff9b 4886 opcode = insn & 0xfc00f800;
08dc996f
AM
4887 if (opcode == E_OR2I_INSN
4888 || opcode == E_AND2I_DOT_INSN
4889 || opcode == E_OR2IS_INSN
4890 || opcode == E_LIS_INSN
4891 || opcode == E_AND2IS_DOT_INSN)
4892 {
4893 if (split16_format != split16a_type)
4894 {
4895 if (fixup)
4896 split16_format = split16a_type;
4897 else
4898 _bfd_error_handler
4899 /* xgettext:c-format */
871b3ab2 4900 (_("%pB(%pA+0x%lx): expected 16A style relocation on 0x%08x insn"),
08dc996f
AM
4901 input_bfd, input_section, offset, opcode);
4902 }
4903 }
4904 else if (opcode == E_ADD2I_DOT_INSN
4905 || opcode == E_ADD2IS_INSN
4906 || opcode == E_CMP16I_INSN
4907 || opcode == E_MULL2I_INSN
4908 || opcode == E_CMPL16I_INSN
4909 || opcode == E_CMPH16I_INSN
4910 || opcode == E_CMPHL16I_INSN)
4911 {
4912 if (split16_format != split16d_type)
4913 {
4914 if (fixup)
4915 split16_format = split16d_type;
4916 else
4917 _bfd_error_handler
4918 /* xgettext:c-format */
871b3ab2 4919 (_("%pB(%pA+0x%lx): expected 16D style relocation on 0x%08x insn"),
08dc996f
AM
4920 input_bfd, input_section, offset, opcode);
4921 }
4922 }
86c95733 4923 top5 = value & 0xf800;
5499c7c7
AM
4924 top5 = top5 << (split16_format == split16a_type ? 5 : 10);
4925 insn &= (split16_format == split16a_type ? ~0x1f07ff : ~0x3e007ff);
b9c361e0 4926 insn |= top5;
86c95733 4927 insn |= value & 0x7ff;
95f0d0d2 4928 bfd_put_32 (input_bfd, insn, loc);
b9c361e0 4929}
83eef883
AFB
4930
4931static void
4932ppc_elf_vle_split20 (bfd *output_bfd, bfd_byte *loc, bfd_vma value)
4933{
4934 unsigned int insn;
4935
4936 insn = bfd_get_32 (output_bfd, loc);
4937 /* We have an li20 field, bits 17..20, 11..15, 21..31. */
4938 /* Top 4 bits of value to 17..20. */
4939 insn |= (value & 0xf0000) >> 5;
4940 /* Next 5 bits of the value to 11..15. */
4941 insn |= (value & 0xf800) << 5;
4942 /* And the final 11 bits of the value to bits 21 to 31. */
4943 insn |= value & 0x7ff;
4944 bfd_put_32 (output_bfd, insn, loc);
4945}
4946
8853c3d3 4947\f
d7128ce4
AM
4948/* Choose which PLT scheme to use, and set .plt flags appropriately.
4949 Returns -1 on error, 0 for old PLT, 1 for new PLT. */
4950int
4951ppc_elf_select_plt_layout (bfd *output_bfd ATTRIBUTE_UNUSED,
5446cbdf 4952 struct bfd_link_info *info)
d7128ce4
AM
4953{
4954 struct ppc_elf_link_hash_table *htab;
9d8504b1 4955 flagword flags;
d7128ce4
AM
4956
4957 htab = ppc_elf_hash_table (info);
4a3dc543
RS
4958
4959 if (htab->plt_type == PLT_UNSET)
016687f8 4960 {
b3874e1a
AM
4961 struct elf_link_hash_entry *h;
4962
5446cbdf 4963 if (htab->params->plt_style == PLT_OLD)
016687f8 4964 htab->plt_type = PLT_OLD;
0e1862bb 4965 else if (bfd_link_pic (info)
b3874e1a
AM
4966 && htab->elf.dynamic_sections_created
4967 && (h = elf_link_hash_lookup (&htab->elf, "_mcount",
4968 FALSE, FALSE, TRUE)) != NULL
4969 && (h->type == STT_FUNC
4970 || h->needs_plt)
4971 && h->ref_regular
4972 && !(SYMBOL_CALLS_LOCAL (info, h)
21d68fcd 4973 || UNDEFWEAK_NO_DYNAMIC_RELOC (info, h)))
b3874e1a
AM
4974 {
4975 /* Profiling of shared libs (and pies) is not supported with
4976 secure plt, because ppc32 does profiling before a
4977 function prologue and a secure plt pic call stubs needs
4978 r30 to be set up. */
4979 htab->plt_type = PLT_OLD;
4980 }
016687f8
AM
4981 else
4982 {
4983 bfd *ibfd;
5446cbdf 4984 enum ppc_elf_plt_type plt_type = htab->params->plt_style;
016687f8
AM
4985
4986 /* Look through the reloc flags left by ppc_elf_check_relocs.
4987 Use the old style bss plt if a file makes plt calls
4988 without using the new relocs, and if ld isn't given
4989 --secure-plt and we never see REL16 relocs. */
4990 if (plt_type == PLT_UNSET)
4991 plt_type = PLT_OLD;
c72f2fb2 4992 for (ibfd = info->input_bfds; ibfd; ibfd = ibfd->link.next)
0c8d6e5c 4993 if (is_ppc_elf (ibfd))
016687f8
AM
4994 {
4995 if (ppc_elf_tdata (ibfd)->has_rel16)
4996 plt_type = PLT_NEW;
4997 else if (ppc_elf_tdata (ibfd)->makes_plt_call)
4998 {
4999 plt_type = PLT_OLD;
5000 htab->old_bfd = ibfd;
5001 break;
5002 }
5003 }
5004 htab->plt_type = plt_type;
5005 }
5006 }
5446cbdf 5007 if (htab->plt_type == PLT_OLD && htab->params->plt_style == PLT_NEW)
b3874e1a
AM
5008 {
5009 if (htab->old_bfd != NULL)
871b3ab2 5010 info->callbacks->einfo (_("%P: bss-plt forced due to %pB\n"),
b3874e1a
AM
5011 htab->old_bfd);
5012 else
5013 info->callbacks->einfo (_("%P: bss-plt forced by profiling\n"));
5014 }
d7128ce4 5015
4a3dc543 5016 BFD_ASSERT (htab->plt_type != PLT_VXWORKS);
9d8504b1 5017
4a3dc543 5018 if (htab->plt_type == PLT_NEW)
9d8504b1
PB
5019 {
5020 flags = (SEC_ALLOC | SEC_LOAD | SEC_HAS_CONTENTS
5021 | SEC_IN_MEMORY | SEC_LINKER_CREATED);
86b9da88
AM
5022
5023 /* The new PLT is a loaded section. */
ce558b89
AM
5024 if (htab->elf.splt != NULL
5025 && !bfd_set_section_flags (htab->elf.dynobj, htab->elf.splt, flags))
86b9da88
AM
5026 return -1;
5027
5028 /* The new GOT is not executable. */
ce558b89
AM
5029 if (htab->elf.sgot != NULL
5030 && !bfd_set_section_flags (htab->elf.dynobj, htab->elf.sgot, flags))
86b9da88 5031 return -1;
d7128ce4
AM
5032 }
5033 else
5034 {
5035 /* Stop an unused .glink section from affecting .text alignment. */
86b9da88
AM
5036 if (htab->glink != NULL
5037 && !bfd_set_section_alignment (htab->elf.dynobj, htab->glink, 0))
5038 return -1;
d7128ce4 5039 }
4a3dc543 5040 return htab->plt_type == PLT_NEW;
d7128ce4
AM
5041}
5042\f
25dbc73a
AM
5043/* Return the section that should be marked against GC for a given
5044 relocation. */
586119b3 5045
25dbc73a
AM
5046static asection *
5047ppc_elf_gc_mark_hook (asection *sec,
07adf181 5048 struct bfd_link_info *info,
25dbc73a
AM
5049 Elf_Internal_Rela *rel,
5050 struct elf_link_hash_entry *h,
5051 Elf_Internal_Sym *sym)
5052{
5053 if (h != NULL)
07adf181
AM
5054 switch (ELF32_R_TYPE (rel->r_info))
5055 {
5056 case R_PPC_GNU_VTINHERIT:
5057 case R_PPC_GNU_VTENTRY:
5058 return NULL;
5059 }
5060
5061 return _bfd_elf_gc_mark_hook (sec, info, rel, h, sym);
25dbc73a 5062}
25dbc73a 5063\f
3a71aa26
AM
5064/* Set plt output section type, htab->tls_get_addr, and call the
5065 generic ELF tls_setup function. */
7fce784e 5066
25dbc73a 5067asection *
5446cbdf 5068ppc_elf_tls_setup (bfd *obfd, struct bfd_link_info *info)
7fce784e 5069{
25dbc73a 5070 struct ppc_elf_link_hash_table *htab;
7fce784e 5071
25dbc73a 5072 htab = ppc_elf_hash_table (info);
a7f2871e
AM
5073 htab->tls_get_addr = elf_link_hash_lookup (&htab->elf, "__tls_get_addr",
5074 FALSE, FALSE, TRUE);
f01f1741
AM
5075 if (htab->plt_type != PLT_NEW)
5076 htab->params->no_tls_get_addr_opt = TRUE;
5077
5446cbdf 5078 if (!htab->params->no_tls_get_addr_opt)
a7f2871e
AM
5079 {
5080 struct elf_link_hash_entry *opt, *tga;
5081 opt = elf_link_hash_lookup (&htab->elf, "__tls_get_addr_opt",
5082 FALSE, FALSE, TRUE);
5083 if (opt != NULL
5084 && (opt->root.type == bfd_link_hash_defined
5085 || opt->root.type == bfd_link_hash_defweak))
5086 {
5087 /* If glibc supports an optimized __tls_get_addr call stub,
5088 signalled by the presence of __tls_get_addr_opt, and we'll
5089 be calling __tls_get_addr via a plt call stub, then
5090 make __tls_get_addr point to __tls_get_addr_opt. */
5091 tga = htab->tls_get_addr;
5092 if (htab->elf.dynamic_sections_created
5093 && tga != NULL
5094 && (tga->type == STT_FUNC
5095 || tga->needs_plt)
5096 && !(SYMBOL_CALLS_LOCAL (info, tga)
21d68fcd 5097 || UNDEFWEAK_NO_DYNAMIC_RELOC (info, tga)))
a7f2871e
AM
5098 {
5099 struct plt_entry *ent;
32af9f6e
AM
5100 for (ent = tga->plt.plist; ent != NULL; ent = ent->next)
5101 if (ent->plt.refcount > 0)
5102 break;
5103 if (ent != NULL)
a7f2871e
AM
5104 {
5105 tga->root.type = bfd_link_hash_indirect;
5106 tga->root.u.i.link = &opt->root;
5107 ppc_elf_copy_indirect_symbol (info, opt, tga);
b531344c 5108 opt->mark = 1;
a7f2871e
AM
5109 if (opt->dynindx != -1)
5110 {
5111 /* Use __tls_get_addr_opt in dynamic relocations. */
5112 opt->dynindx = -1;
5113 _bfd_elf_strtab_delref (elf_hash_table (info)->dynstr,
5114 opt->dynstr_index);
5115 if (!bfd_elf_link_record_dynamic_symbol (info, opt))
5116 return FALSE;
5117 }
5118 htab->tls_get_addr = opt;
5119 }
5120 }
5121 }
5122 else
5446cbdf 5123 htab->params->no_tls_get_addr_opt = TRUE;
a7f2871e 5124 }
4a3dc543 5125 if (htab->plt_type == PLT_NEW
ce558b89
AM
5126 && htab->elf.splt != NULL
5127 && htab->elf.splt->output_section != NULL)
d7128ce4 5128 {
ce558b89
AM
5129 elf_section_type (htab->elf.splt->output_section) = SHT_PROGBITS;
5130 elf_section_flags (htab->elf.splt->output_section) = SHF_ALLOC + SHF_WRITE;
d7128ce4
AM
5131 }
5132
25dbc73a 5133 return _bfd_elf_tls_setup (obfd, info);
7fce784e
AS
5134}
5135
3a71aa26
AM
5136/* Return TRUE iff REL is a branch reloc with a global symbol matching
5137 HASH. */
5138
5139static bfd_boolean
5140branch_reloc_hash_match (const bfd *ibfd,
5141 const Elf_Internal_Rela *rel,
5142 const struct elf_link_hash_entry *hash)
5143{
5144 Elf_Internal_Shdr *symtab_hdr = &elf_symtab_hdr (ibfd);
5145 enum elf_ppc_reloc_type r_type = ELF32_R_TYPE (rel->r_info);
5146 unsigned int r_symndx = ELF32_R_SYM (rel->r_info);
5147
e054468f 5148 if (r_symndx >= symtab_hdr->sh_info && is_branch_reloc (r_type))
3a71aa26
AM
5149 {
5150 struct elf_link_hash_entry **sym_hashes = elf_sym_hashes (ibfd);
5151 struct elf_link_hash_entry *h;
5152
5153 h = sym_hashes[r_symndx - symtab_hdr->sh_info];
5154 while (h->root.type == bfd_link_hash_indirect
5155 || h->root.type == bfd_link_hash_warning)
5156 h = (struct elf_link_hash_entry *) h->root.u.i.link;
5157 if (h == hash)
5158 return TRUE;
5159 }
5160 return FALSE;
5161}
5162
25dbc73a
AM
5163/* Run through all the TLS relocs looking for optimization
5164 opportunities. */
252b5132 5165
25dbc73a
AM
5166bfd_boolean
5167ppc_elf_tls_optimize (bfd *obfd ATTRIBUTE_UNUSED,
5168 struct bfd_link_info *info)
252b5132 5169{
7fce784e 5170 bfd *ibfd;
25dbc73a
AM
5171 asection *sec;
5172 struct ppc_elf_link_hash_table *htab;
b7fcf6f6 5173 int pass;
252b5132 5174
3cbc1e5e 5175 if (!bfd_link_executable (info))
25dbc73a 5176 return TRUE;
252b5132 5177
7619e7c7 5178 htab = ppc_elf_hash_table (info);
663a1470
AM
5179 if (htab == NULL)
5180 return FALSE;
5181
b7fcf6f6
AM
5182 /* Make two passes through the relocs. First time check that tls
5183 relocs involved in setting up a tls_get_addr call are indeed
663a1470
AM
5184 followed by such a call. If they are not, don't do any tls
5185 optimization. On the second pass twiddle tls_mask flags to
5186 notify relocate_section that optimization can be done, and
5187 adjust got and plt refcounts. */
b7fcf6f6 5188 for (pass = 0; pass < 2; ++pass)
c72f2fb2 5189 for (ibfd = info->input_bfds; ibfd != NULL; ibfd = ibfd->link.next)
b7fcf6f6
AM
5190 {
5191 Elf_Internal_Sym *locsyms = NULL;
0ffa91dd 5192 Elf_Internal_Shdr *symtab_hdr = &elf_symtab_hdr (ibfd);
32af9f6e 5193 asection *got2 = bfd_get_section_by_name (ibfd, ".got2");
7619e7c7 5194
b7fcf6f6
AM
5195 for (sec = ibfd->sections; sec != NULL; sec = sec->next)
5196 if (sec->has_tls_reloc && !bfd_is_abs_section (sec->output_section))
5197 {
5198 Elf_Internal_Rela *relstart, *rel, *relend;
663a1470 5199 int expecting_tls_get_addr = 0;
252b5132 5200
b7fcf6f6
AM
5201 /* Read the relocations. */
5202 relstart = _bfd_elf_link_read_relocs (ibfd, sec, NULL, NULL,
5203 info->keep_memory);
5204 if (relstart == NULL)
5205 return FALSE;
7619e7c7 5206
b7fcf6f6
AM
5207 relend = relstart + sec->reloc_count;
5208 for (rel = relstart; rel < relend; rel++)
5209 {
5210 enum elf_ppc_reloc_type r_type;
5211 unsigned long r_symndx;
5212 struct elf_link_hash_entry *h = NULL;
5213 char *tls_mask;
5214 char tls_set, tls_clear;
5215 bfd_boolean is_local;
b7fcf6f6
AM
5216 bfd_signed_vma *got_count;
5217
5218 r_symndx = ELF32_R_SYM (rel->r_info);
5219 if (r_symndx >= symtab_hdr->sh_info)
5220 {
5221 struct elf_link_hash_entry **sym_hashes;
7fce784e 5222
b7fcf6f6
AM
5223 sym_hashes = elf_sym_hashes (ibfd);
5224 h = sym_hashes[r_symndx - symtab_hdr->sh_info];
5225 while (h->root.type == bfd_link_hash_indirect
5226 || h->root.type == bfd_link_hash_warning)
5227 h = (struct elf_link_hash_entry *) h->root.u.i.link;
5228 }
7619e7c7 5229
b7fcf6f6
AM
5230 is_local = FALSE;
5231 if (h == NULL
5232 || !h->def_dynamic)
5233 is_local = TRUE;
7619e7c7 5234
b7fcf6f6 5235 r_type = ELF32_R_TYPE (rel->r_info);
663a1470
AM
5236 /* If this section has old-style __tls_get_addr calls
5237 without marker relocs, then check that each
5238 __tls_get_addr call reloc is preceded by a reloc
5239 that conceivably belongs to the __tls_get_addr arg
5240 setup insn. If we don't find matching arg setup
5241 relocs, don't do any tls optimization. */
5242 if (pass == 0
5243 && sec->has_tls_get_addr_call
5244 && h != NULL
5245 && h == htab->tls_get_addr
5246 && !expecting_tls_get_addr
5247 && is_branch_reloc (r_type))
5248 {
25f53a85 5249 info->callbacks->minfo ("%H __tls_get_addr lost arg, "
663a1470
AM
5250 "TLS optimization disabled\n",
5251 ibfd, sec, rel->r_offset);
5252 if (elf_section_data (sec)->relocs != relstart)
5253 free (relstart);
5254 return TRUE;
5255 }
5256
5257 expecting_tls_get_addr = 0;
b7fcf6f6
AM
5258 switch (r_type)
5259 {
5260 case R_PPC_GOT_TLSLD16:
5261 case R_PPC_GOT_TLSLD16_LO:
5262 expecting_tls_get_addr = 1;
1a0670f3 5263 /* Fall through. */
b7fcf6f6
AM
5264
5265 case R_PPC_GOT_TLSLD16_HI:
5266 case R_PPC_GOT_TLSLD16_HA:
5267 /* These relocs should never be against a symbol
5268 defined in a shared lib. Leave them alone if
5269 that turns out to be the case. */
5270 if (!is_local)
5271 continue;
5272
5273 /* LD -> LE */
5274 tls_set = 0;
5275 tls_clear = TLS_LD;
5276 break;
5277
5278 case R_PPC_GOT_TLSGD16:
5279 case R_PPC_GOT_TLSGD16_LO:
5280 expecting_tls_get_addr = 1;
1a0670f3 5281 /* Fall through. */
b7fcf6f6
AM
5282
5283 case R_PPC_GOT_TLSGD16_HI:
5284 case R_PPC_GOT_TLSGD16_HA:
5285 if (is_local)
5286 /* GD -> LE */
5287 tls_set = 0;
5288 else
5289 /* GD -> IE */
5290 tls_set = TLS_TLS | TLS_TPRELGD;
5291 tls_clear = TLS_GD;
5292 break;
5293
5294 case R_PPC_GOT_TPREL16:
5295 case R_PPC_GOT_TPREL16_LO:
5296 case R_PPC_GOT_TPREL16_HI:
5297 case R_PPC_GOT_TPREL16_HA:
5298 if (is_local)
5299 {
5300 /* IE -> LE */
5301 tls_set = 0;
5302 tls_clear = TLS_TPREL;
5303 break;
5304 }
5305 else
5306 continue;
5307
32af9f6e
AM
5308 case R_PPC_TLSGD:
5309 case R_PPC_TLSLD:
5310 expecting_tls_get_addr = 2;
5311 tls_set = 0;
5312 tls_clear = 0;
5313 break;
5314
b7fcf6f6 5315 default:
25dbc73a 5316 continue;
b7fcf6f6 5317 }
25dbc73a 5318
b7fcf6f6
AM
5319 if (pass == 0)
5320 {
727fc41e 5321 if (!expecting_tls_get_addr
32af9f6e
AM
5322 || (expecting_tls_get_addr == 1
5323 && !sec->has_tls_get_addr_call))
b7fcf6f6 5324 continue;
25dbc73a 5325
3a71aa26
AM
5326 if (rel + 1 < relend
5327 && branch_reloc_hash_match (ibfd, rel + 1,
5328 htab->tls_get_addr))
5329 continue;
25dbc73a 5330
b7fcf6f6
AM
5331 /* Uh oh, we didn't find the expected call. We
5332 could just mark this symbol to exclude it
5333 from tls optimization but it's safer to skip
663a1470 5334 the entire optimization. */
25f53a85 5335 info->callbacks->minfo (_("%H arg lost __tls_get_addr, "
663a1470
AM
5336 "TLS optimization disabled\n"),
5337 ibfd, sec, rel->r_offset);
5338 if (elf_section_data (sec)->relocs != relstart)
5339 free (relstart);
5340 return TRUE;
b7fcf6f6 5341 }
25dbc73a 5342
32af9f6e
AM
5343 if (expecting_tls_get_addr)
5344 {
5345 struct plt_entry *ent;
5346 bfd_vma addend = 0;
5347
0e1862bb 5348 if (bfd_link_pic (info)
32af9f6e
AM
5349 && ELF32_R_TYPE (rel[1].r_info) == R_PPC_PLTREL24)
5350 addend = rel[1].r_addend;
5351 ent = find_plt_ent (&htab->tls_get_addr->plt.plist,
5352 got2, addend);
5353 if (ent != NULL && ent->plt.refcount > 0)
5354 ent->plt.refcount -= 1;
5355
5356 if (expecting_tls_get_addr == 2)
5357 continue;
5358 }
5359
b7fcf6f6
AM
5360 if (h != NULL)
5361 {
5362 tls_mask = &ppc_elf_hash_entry (h)->tls_mask;
5363 got_count = &h->got.refcount;
5364 }
5365 else
5366 {
b7fcf6f6 5367 bfd_signed_vma *lgot_refs;
e054468f 5368 struct plt_entry **local_plt;
b7fcf6f6 5369 char *lgot_masks;
25dbc73a 5370
b7fcf6f6
AM
5371 if (locsyms == NULL)
5372 {
5373 locsyms = (Elf_Internal_Sym *) symtab_hdr->contents;
5374 if (locsyms == NULL)
5375 locsyms = bfd_elf_get_elf_syms (ibfd, symtab_hdr,
5376 symtab_hdr->sh_info,
5377 0, NULL, NULL, NULL);
5378 if (locsyms == NULL)
5379 {
5380 if (elf_section_data (sec)->relocs != relstart)
5381 free (relstart);
5382 return FALSE;
5383 }
5384 }
b7fcf6f6
AM
5385 lgot_refs = elf_local_got_refcounts (ibfd);
5386 if (lgot_refs == NULL)
5387 abort ();
e054468f
AM
5388 local_plt = (struct plt_entry **)
5389 (lgot_refs + symtab_hdr->sh_info);
5390 lgot_masks = (char *) (local_plt + symtab_hdr->sh_info);
b7fcf6f6
AM
5391 tls_mask = &lgot_masks[r_symndx];
5392 got_count = &lgot_refs[r_symndx];
5393 }
25dbc73a 5394
b7fcf6f6
AM
5395 if (tls_set == 0)
5396 {
5397 /* We managed to get rid of a got entry. */
5398 if (*got_count > 0)
5399 *got_count -= 1;
5400 }
25dbc73a 5401
b7fcf6f6
AM
5402 *tls_mask |= tls_set;
5403 *tls_mask &= ~tls_clear;
5404 }
25dbc73a 5405
b7fcf6f6
AM
5406 if (elf_section_data (sec)->relocs != relstart)
5407 free (relstart);
5408 }
5409
5410 if (locsyms != NULL
5411 && (symtab_hdr->contents != (unsigned char *) locsyms))
5412 {
5413 if (!info->keep_memory)
5414 free (locsyms);
5415 else
5416 symtab_hdr->contents = (unsigned char *) locsyms;
5417 }
5418 }
9a23f96e 5419 htab->do_tls_opt = 1;
25dbc73a
AM
5420 return TRUE;
5421}
5422\f
98bbb1b8 5423/* Find dynamic relocs for H that apply to read-only sections. */
625af618 5424
98bbb1b8
AM
5425static asection *
5426readonly_dynrelocs (struct elf_link_hash_entry *h)
625af618 5427{
6061a67d 5428 struct elf_dyn_relocs *p;
625af618
AM
5429
5430 for (p = ppc_elf_hash_entry (h)->dyn_relocs; p != NULL; p = p->next)
5431 {
5432 asection *s = p->sec->output_section;
5433
98bbb1b8
AM
5434 if (s != NULL && (s->flags & SEC_READONLY) != 0)
5435 return p->sec;
625af618 5436 }
98bbb1b8 5437 return NULL;
625af618
AM
5438}
5439
287c7eaf
AM
5440/* Return true if we have dynamic relocs against H or any of its weak
5441 aliases, that apply to read-only sections. Cannot be used after
5442 size_dynamic_sections. */
5443
5444static bfd_boolean
5445alias_readonly_dynrelocs (struct elf_link_hash_entry *h)
5446{
5447 struct ppc_elf_link_hash_entry *eh = ppc_elf_hash_entry (h);
5448 do
5449 {
5450 if (readonly_dynrelocs (&eh->elf))
5451 return TRUE;
5452 eh = ppc_elf_hash_entry (eh->elf.u.alias);
5453 } while (eh != NULL && &eh->elf != h);
5454
5455 return FALSE;
5456}
5457
5458/* Return whether H has pc-relative dynamic relocs. */
5459
5460static bfd_boolean
5461pc_dynrelocs (struct elf_link_hash_entry *h)
5462{
5463 struct elf_dyn_relocs *p;
5464
5465 for (p = ppc_elf_hash_entry (h)->dyn_relocs; p != NULL; p = p->next)
5466 if (p->pc_count != 0)
5467 return TRUE;
5468 return FALSE;
5469}
5470
25dbc73a
AM
5471/* Adjust a symbol defined by a dynamic object and referenced by a
5472 regular object. The current definition is in some section of the
5473 dynamic object, but we're not including those sections. We have to
5474 change the definition to something the rest of the link can
5475 understand. */
7fce784e 5476
25dbc73a
AM
5477static bfd_boolean
5478ppc_elf_adjust_dynamic_symbol (struct bfd_link_info *info,
5479 struct elf_link_hash_entry *h)
5480{
5481 struct ppc_elf_link_hash_table *htab;
5482 asection *s;
7fce784e 5483
25dbc73a
AM
5484#ifdef DEBUG
5485 fprintf (stderr, "ppc_elf_adjust_dynamic_symbol called for %s\n",
5486 h->root.root.string);
5487#endif
252b5132 5488
25dbc73a
AM
5489 /* Make sure we know what is going on here. */
5490 htab = ppc_elf_hash_table (info);
5491 BFD_ASSERT (htab->elf.dynobj != NULL
5492 && (h->needs_plt
91e21fb7 5493 || h->type == STT_GNU_IFUNC
60d67dc8 5494 || h->is_weakalias
25dbc73a
AM
5495 || (h->def_dynamic
5496 && h->ref_regular
5497 && !h->def_regular)));
252b5132 5498
25dbc73a
AM
5499 /* Deal with function syms. */
5500 if (h->type == STT_FUNC
e054468f 5501 || h->type == STT_GNU_IFUNC
25dbc73a
AM
5502 || h->needs_plt)
5503 {
529fe20e
AM
5504 bfd_boolean local = (SYMBOL_CALLS_LOCAL (info, h)
5505 || UNDEFWEAK_NO_DYNAMIC_RELOC (info, h));
287c7eaf
AM
5506 /* Discard dyn_relocs when non-pic if we've decided that a
5507 function symbol is local. */
5508 if (!bfd_link_pic (info) && local)
5509 ppc_elf_hash_entry (h)->dyn_relocs = NULL;
529fe20e 5510
25dbc73a
AM
5511 /* Clear procedure linkage table information for any symbol that
5512 won't need a .plt entry. */
a6aa5195
AM
5513 struct plt_entry *ent;
5514 for (ent = h->plt.plist; ent != NULL; ent = ent->next)
5515 if (ent->plt.refcount > 0)
5516 break;
5517 if (ent == NULL
529fe20e 5518 || (h->type != STT_GNU_IFUNC && local))
252b5132 5519 {
25dbc73a 5520 /* A PLT entry is not required/allowed when:
252b5132 5521
25dbc73a
AM
5522 1. We are not using ld.so; because then the PLT entry
5523 can't be set up, so we can't use one. In this case,
5524 ppc_elf_adjust_dynamic_symbol won't even be called.
252b5132 5525
25dbc73a
AM
5526 2. GC has rendered the entry unused.
5527
5528 3. We know for certain that a call to this symbol
5529 will go to this object, or will remain undefined. */
a6aa5195 5530 h->plt.plist = NULL;
25dbc73a 5531 h->needs_plt = 0;
d1eca1e4 5532 h->pointer_equality_needed = 0;
25dbc73a 5533 }
625af618
AM
5534 else
5535 {
d1eca1e4
AM
5536 /* Taking a function's address in a read/write section
5537 doesn't require us to define the function symbol in the
1009ef28 5538 executable on a plt call stub. A dynamic reloc can
f0158f44
AM
5539 be used instead, giving better runtime performance.
5540 (Calls via that function pointer don't need to bounce
5541 through the plt call stub.) Similarly, use a dynamic
5542 reloc for a weak reference when possible, allowing the
5543 resolution of the symbol to be set at load time rather
5544 than link time. */
5545 if ((h->pointer_equality_needed
3988aed5
AM
5546 || (h->non_got_ref
5547 && !h->ref_regular_nonweak
5548 && !UNDEFWEAK_NO_DYNAMIC_RELOC (info, h)))
1009ef28
AM
5549 && !htab->is_vxworks
5550 && !ppc_elf_hash_entry (h)->has_sda_refs
98bbb1b8 5551 && !readonly_dynrelocs (h))
d1eca1e4
AM
5552 {
5553 h->pointer_equality_needed = 0;
3988aed5
AM
5554 /* If we haven't seen a branch reloc then we don't need
5555 a plt entry. */
5556 if (!h->needs_plt)
5557 h->plt.plist = NULL;
d1eca1e4 5558 }
287c7eaf 5559 else if (!bfd_link_pic (info))
529fe20e
AM
5560 /* We are going to be defining the function symbol on the
5561 plt stub, so no dyn_relocs needed when non-pic. */
287c7eaf 5562 ppc_elf_hash_entry (h)->dyn_relocs = NULL;
625af618 5563 }
d3e454b9 5564 h->protected_def = 0;
3988aed5 5565 /* Function symbols can't have copy relocs. */
25dbc73a 5566 return TRUE;
252b5132 5567 }
25dbc73a 5568 else
a6aa5195 5569 h->plt.plist = NULL;
252b5132 5570
25dbc73a
AM
5571 /* If this is a weak symbol, and there is a real definition, the
5572 processor independent code will have arranged for us to see the
5573 real definition first, and we can just use the same value. */
60d67dc8 5574 if (h->is_weakalias)
252b5132 5575 {
60d67dc8
AM
5576 struct elf_link_hash_entry *def = weakdef (h);
5577 BFD_ASSERT (def->root.type == bfd_link_hash_defined);
5578 h->root.u.def.section = def->root.u.def.section;
5579 h->root.u.def.value = def->root.u.def.value;
4a7e5234
AM
5580 if (def->root.u.def.section == htab->elf.sdynbss
5581 || def->root.u.def.section == htab->elf.sdynrelro
5582 || def->root.u.def.section == htab->dynsbss)
5583 ppc_elf_hash_entry (h)->dyn_relocs = NULL;
25dbc73a
AM
5584 return TRUE;
5585 }
dc810e39 5586
25dbc73a
AM
5587 /* This is a reference to a symbol defined by a dynamic object which
5588 is not a function. */
252b5132 5589
25dbc73a
AM
5590 /* If we are creating a shared library, we must presume that the
5591 only references to the symbol are via the global offset table.
5592 For such cases we need not do anything here; the relocations will
5593 be handled correctly by relocate_section. */
0e1862bb 5594 if (bfd_link_pic (info))
d3e454b9
AM
5595 {
5596 h->protected_def = 0;
5597 return TRUE;
5598 }
252b5132 5599
25dbc73a
AM
5600 /* If there are no references to this symbol that do not use the
5601 GOT, we don't need to generate a copy reloc. */
5602 if (!h->non_got_ref)
d3e454b9
AM
5603 {
5604 h->protected_def = 0;
5605 return TRUE;
5606 }
5607
5608 /* Protected variables do not work with .dynbss. The copy in
5609 .dynbss won't be used by the shared library with the protected
5610 definition for the variable. Editing to PIC, or text relocations
5611 are preferable to an incorrect program. */
5612 if (h->protected_def)
5613 {
5614 if (ELIMINATE_COPY_RELOCS
5615 && ppc_elf_hash_entry (h)->has_addr16_ha
5616 && ppc_elf_hash_entry (h)->has_addr16_lo
5617 && htab->params->pic_fixup == 0
5618 && info->disable_target_specific_optimizations <= 1)
5619 htab->params->pic_fixup = 1;
d3e454b9
AM
5620 return TRUE;
5621 }
25dbc73a 5622
a127494f
AM
5623 /* If -z nocopyreloc was given, we won't generate them either. */
5624 if (info->nocopyreloc)
529fe20e 5625 return TRUE;
a127494f 5626
dce2246a 5627 /* If we don't find any dynamic relocs in read-only sections, then
cfd2c773
NS
5628 we'll be keeping the dynamic relocs and avoiding the copy reloc.
5629 We can't do this if there are any small data relocations. This
5630 doesn't work on VxWorks, where we can not have dynamic
5631 relocations (other than copy and jump slot relocations) in an
5632 executable. */
4dc4a9a5 5633 if (ELIMINATE_COPY_RELOCS
cfd2c773 5634 && !ppc_elf_hash_entry (h)->has_sda_refs
625af618
AM
5635 && !htab->is_vxworks
5636 && !h->def_regular
287c7eaf 5637 && !alias_readonly_dynrelocs (h))
529fe20e 5638 return TRUE;
252b5132 5639
25dbc73a
AM
5640 /* We must allocate the symbol in our .dynbss section, which will
5641 become part of the .bss section of the executable. There will be
5642 an entry for this symbol in the .dynsym section. The dynamic
5643 object will contain position independent code, so all references
5644 from the dynamic object to this symbol will go through the global
5645 offset table. The dynamic linker will use the .dynsym entry to
5646 determine the address it must put in the global offset table, so
5647 both the dynamic object and the regular object will refer to the
5648 same memory location for the variable.
5649
4dc4a9a5
DJ
5650 Of course, if the symbol is referenced using SDAREL relocs, we
5651 must instead allocate it in .sbss. */
4dc4a9a5 5652 if (ppc_elf_hash_entry (h)->has_sda_refs)
25dbc73a 5653 s = htab->dynsbss;
5474d94f
AM
5654 else if ((h->root.u.def.section->flags & SEC_READONLY) != 0)
5655 s = htab->elf.sdynrelro;
25dbc73a 5656 else
9d19e4fd 5657 s = htab->elf.sdynbss;
25dbc73a
AM
5658 BFD_ASSERT (s != NULL);
5659
1d7e9d18 5660 if ((h->root.u.def.section->flags & SEC_ALLOC) != 0 && h->size != 0)
25dbc73a
AM
5661 {
5662 asection *srel;
5663
4a7e5234
AM
5664 /* We must generate a R_PPC_COPY reloc to tell the dynamic
5665 linker to copy the initial value out of the dynamic object
5666 and into the runtime process image. */
4dc4a9a5 5667 if (ppc_elf_hash_entry (h)->has_sda_refs)
25dbc73a 5668 srel = htab->relsbss;
5474d94f
AM
5669 else if ((h->root.u.def.section->flags & SEC_READONLY) != 0)
5670 srel = htab->elf.sreldynrelro;
25dbc73a 5671 else
9d19e4fd 5672 srel = htab->elf.srelbss;
25dbc73a
AM
5673 BFD_ASSERT (srel != NULL);
5674 srel->size += sizeof (Elf32_External_Rela);
5675 h->needs_copy = 1;
5676 }
7619e7c7 5677
529fe20e 5678 /* We no longer want dyn_relocs. */
287c7eaf 5679 ppc_elf_hash_entry (h)->dyn_relocs = NULL;
6cabe1ea 5680 return _bfd_elf_adjust_dynamic_copy (info, h, s);
25dbc73a
AM
5681}
5682\f
ac39eb42
AM
5683/* Generate a symbol to mark plt call stubs. For non-PIC code the sym is
5684 xxxxxxxx.plt_call32.<callee> where xxxxxxxx is a hex number, usually 0,
5685 specifying the addend on the plt relocation. For -fpic code, the sym
5686 is xxxxxxxx.plt_pic32.<callee>, and for -fPIC
5687 xxxxxxxx.got2.plt_pic32.<callee>. */
0ba07910
AM
5688
5689static bfd_boolean
5690add_stub_sym (struct plt_entry *ent,
5691 struct elf_link_hash_entry *h,
ac39eb42 5692 struct bfd_link_info *info)
0ba07910
AM
5693{
5694 struct elf_link_hash_entry *sh;
5695 size_t len1, len2, len3;
5696 char *name;
ac39eb42
AM
5697 const char *stub;
5698 struct ppc_elf_link_hash_table *htab = ppc_elf_hash_table (info);
5699
0e1862bb 5700 if (bfd_link_pic (info))
ac39eb42
AM
5701 stub = ".plt_pic32.";
5702 else
5703 stub = ".plt_call32.";
0ba07910
AM
5704
5705 len1 = strlen (h->root.root.string);
ac39eb42 5706 len2 = strlen (stub);
0ba07910
AM
5707 len3 = 0;
5708 if (ent->sec)
5709 len3 = strlen (ent->sec->name);
ac39eb42 5710 name = bfd_malloc (len1 + len2 + len3 + 9);
0ba07910
AM
5711 if (name == NULL)
5712 return FALSE;
5713 sprintf (name, "%08x", (unsigned) ent->addend & 0xffffffff);
5714 if (ent->sec)
5715 memcpy (name + 8, ent->sec->name, len3);
ac39eb42
AM
5716 memcpy (name + 8 + len3, stub, len2);
5717 memcpy (name + 8 + len3 + len2, h->root.root.string, len1 + 1);
0ba07910
AM
5718 sh = elf_link_hash_lookup (&htab->elf, name, TRUE, FALSE, FALSE);
5719 if (sh == NULL)
5720 return FALSE;
5721 if (sh->root.type == bfd_link_hash_new)
5722 {
5723 sh->root.type = bfd_link_hash_defined;
5724 sh->root.u.def.section = htab->glink;
5725 sh->root.u.def.value = ent->glink_offset;
5726 sh->ref_regular = 1;
5727 sh->def_regular = 1;
5728 sh->ref_regular_nonweak = 1;
5729 sh->forced_local = 1;
5730 sh->non_elf = 0;
2ec55de3 5731 sh->root.linker_def = 1;
0ba07910
AM
5732 }
5733 return TRUE;
5734}
5735
3b36f7e6
AM
5736/* Allocate NEED contiguous space in .got, and return the offset.
5737 Handles allocation of the got header when crossing 32k. */
5738
5739static bfd_vma
5740allocate_got (struct ppc_elf_link_hash_table *htab, unsigned int need)
5741{
5742 bfd_vma where;
4a3dc543 5743 unsigned int max_before_header;
3b36f7e6 5744
4a3dc543 5745 if (htab->plt_type == PLT_VXWORKS)
9d8504b1 5746 {
ce558b89
AM
5747 where = htab->elf.sgot->size;
5748 htab->elf.sgot->size += need;
9d8504b1 5749 }
3b36f7e6
AM
5750 else
5751 {
4a3dc543
RS
5752 max_before_header = htab->plt_type == PLT_NEW ? 32768 : 32764;
5753 if (need <= htab->got_gap)
3b36f7e6 5754 {
4a3dc543
RS
5755 where = max_before_header - htab->got_gap;
5756 htab->got_gap -= need;
5757 }
5758 else
5759 {
ce558b89
AM
5760 if (htab->elf.sgot->size + need > max_before_header
5761 && htab->elf.sgot->size <= max_before_header)
4a3dc543 5762 {
ce558b89
AM
5763 htab->got_gap = max_before_header - htab->elf.sgot->size;
5764 htab->elf.sgot->size = max_before_header + htab->got_header_size;
4a3dc543 5765 }
ce558b89
AM
5766 where = htab->elf.sgot->size;
5767 htab->elf.sgot->size += need;
3b36f7e6 5768 }
3b36f7e6
AM
5769 }
5770 return where;
5771}
5772
f15d0b54
AM
5773/* Calculate size of GOT entries for symbol given its TLS_MASK.
5774 TLS_LD is excluded because those go in a special GOT slot. */
5775
5776static inline unsigned int
5777got_entries_needed (int tls_mask)
5778{
5779 unsigned int need;
5780 if ((tls_mask & TLS_TLS) == 0)
5781 need = 4;
5782 else
5783 {
5784 need = 0;
5785 if ((tls_mask & TLS_GD) != 0)
5786 need += 8;
5787 if ((tls_mask & (TLS_TPREL | TLS_TPRELGD)) != 0)
5788 need += 4;
5789 if ((tls_mask & TLS_DTPREL) != 0)
5790 need += 4;
5791 }
5792 return need;
5793}
5794
5795/* Calculate size of relocs needed for symbol given its TLS_MASK and
5796 NEEDed GOT entries. KNOWN says a TPREL offset can be calculated at
5797 link time. */
5798
5799static inline unsigned int
5800got_relocs_needed (int tls_mask, unsigned int need, bfd_boolean known)
5801{
5802 /* All the entries we allocated need relocs.
5803 Except IE in executable with a local symbol. We could also omit
5804 the DTPREL reloc on the second word of a GD entry under the same
5805 condition as that for IE, but ld.so needs to differentiate
5806 LD and GD entries. */
5807 if ((tls_mask & (TLS_TPREL | TLS_TPRELGD)) != 0 && known)
5808 need -= 4;
5809 return need * sizeof (Elf32_External_Rela) / 4;
5810}
5811
46434633 5812/* If H is undefined, make it dynamic if that makes sense. */
f0158f44
AM
5813
5814static bfd_boolean
46434633
AM
5815ensure_undef_dynamic (struct bfd_link_info *info,
5816 struct elf_link_hash_entry *h)
f0158f44
AM
5817{
5818 struct elf_link_hash_table *htab = elf_hash_table (info);
5819
5820 if (htab->dynamic_sections_created
46434633
AM
5821 && ((info->dynamic_undefined_weak != 0
5822 && h->root.type == bfd_link_hash_undefweak)
5823 || h->root.type == bfd_link_hash_undefined)
f0158f44
AM
5824 && h->dynindx == -1
5825 && !h->forced_local
5826 && ELF_ST_VISIBILITY (h->other) == STV_DEFAULT)
5827 return bfd_elf_link_record_dynamic_symbol (info, h);
5828 return TRUE;
5829}
5830
25dbc73a 5831/* Allocate space in associated reloc sections for dynamic relocs. */
252b5132 5832
b34976b6 5833static bfd_boolean
25dbc73a 5834allocate_dynrelocs (struct elf_link_hash_entry *h, void *inf)
252b5132 5835{
25dbc73a
AM
5836 struct bfd_link_info *info = inf;
5837 struct ppc_elf_link_hash_entry *eh;
7619e7c7 5838 struct ppc_elf_link_hash_table *htab;
6061a67d 5839 struct elf_dyn_relocs *p;
f0158f44 5840 bfd_boolean dyn;
252b5132 5841
25dbc73a 5842 if (h->root.type == bfd_link_hash_indirect)
b34976b6 5843 return TRUE;
252b5132 5844
7619e7c7 5845 htab = ppc_elf_hash_table (info);
25dbc73a 5846 eh = (struct ppc_elf_link_hash_entry *) h;
d3e454b9
AM
5847 if (eh->elf.got.refcount > 0
5848 || (ELIMINATE_COPY_RELOCS
5849 && !eh->elf.def_regular
5850 && eh->elf.protected_def
5851 && eh->has_addr16_ha
5852 && eh->has_addr16_lo
5853 && htab->params->pic_fixup > 0))
25dbc73a 5854 {
d6e14abc
AM
5855 unsigned int need;
5856
46434633
AM
5857 /* Make sure this symbol is output as a dynamic symbol. */
5858 if (!ensure_undef_dynamic (info, &eh->elf))
f0158f44 5859 return FALSE;
252b5132 5860
d6e14abc 5861 need = 0;
f15d0b54 5862 if ((eh->tls_mask & TLS_LD) != 0)
25dbc73a 5863 {
f15d0b54
AM
5864 if (!eh->elf.def_dynamic)
5865 /* We'll just use htab->tlsld_got.offset. This should
5866 always be the case. It's a little odd if we have
5867 a local dynamic reloc against a non-local symbol. */
5868 htab->tlsld_got.refcount += 1;
5869 else
d6e14abc 5870 need += 8;
d6e14abc 5871 }
f15d0b54 5872 need += got_entries_needed (eh->tls_mask);
d6e14abc
AM
5873 if (need == 0)
5874 eh->elf.got.offset = (bfd_vma) -1;
5875 else
5876 {
3b36f7e6 5877 eh->elf.got.offset = allocate_got (htab, need);
0e1862bb 5878 if ((bfd_link_pic (info)
f0158f44
AM
5879 || (htab->elf.dynamic_sections_created
5880 && eh->elf.dynindx != -1
5881 && !SYMBOL_REFERENCES_LOCAL (info, &eh->elf)))
21d68fcd 5882 && !UNDEFWEAK_NO_DYNAMIC_RELOC (info, &eh->elf))
252b5132 5883 {
f15d0b54
AM
5884 asection *rsec;
5885 bfd_boolean tprel_known = (bfd_link_executable (info)
5886 && SYMBOL_REFERENCES_LOCAL (info,
5887 &eh->elf));
5888
5889 need = got_relocs_needed (eh->tls_mask, need, tprel_known);
5890 if ((eh->tls_mask & TLS_LD) != 0 && eh->elf.def_dynamic)
5891 need -= sizeof (Elf32_External_Rela);
5892 rsec = htab->elf.srelgot;
0bed072f 5893 if (eh->elf.type == STT_GNU_IFUNC)
ce558b89 5894 rsec = htab->elf.irelplt;
f15d0b54 5895 rsec->size += need;
252b5132 5896 }
25dbc73a
AM
5897 }
5898 }
5899 else
5900 eh->elf.got.offset = (bfd_vma) -1;
252b5132 5901
954b63d4
AM
5902 /* If no dynamic sections we can't have dynamic relocs, except for
5903 IFUNCs which are handled even in static executables. */
f0158f44
AM
5904 if (!htab->elf.dynamic_sections_created
5905 && h->type != STT_GNU_IFUNC)
5906 eh->dyn_relocs = NULL;
5907
529fe20e
AM
5908 /* Discard relocs on undefined symbols that must be local. */
5909 else if (h->root.type == bfd_link_hash_undefined
5910 && ELF_ST_VISIBILITY (h->other) != STV_DEFAULT)
5911 eh->dyn_relocs = NULL;
5912
5913 /* Also discard relocs on undefined weak syms with non-default
5914 visibility, or when dynamic_undefined_weak says so. */
5915 else if (UNDEFWEAK_NO_DYNAMIC_RELOC (info, h))
5916 eh->dyn_relocs = NULL;
5917
f0158f44 5918 if (eh->dyn_relocs == NULL)
287c7eaf 5919 ;
252b5132 5920
25dbc73a
AM
5921 /* In the shared -Bsymbolic case, discard space allocated for
5922 dynamic pc-relative relocs against symbols which turn out to be
5923 defined in regular objects. For the normal shared case, discard
5924 space for relocs that have become local due to symbol visibility
5925 changes. */
f0158f44 5926 else if (bfd_link_pic (info))
25dbc73a
AM
5927 {
5928 /* Relocs that use pc_count are those that appear on a call insn,
1d483afe 5929 or certain REL relocs (see must_be_dyn_reloc) that can be
25dbc73a
AM
5930 generated via assembly. We want calls to protected symbols to
5931 resolve directly to the function rather than going via the plt.
5932 If people want function pointer comparisons to work as expected
5933 then they should avoid writing weird assembly. */
529fe20e 5934 if (SYMBOL_CALLS_LOCAL (info, h))
25dbc73a 5935 {
6061a67d 5936 struct elf_dyn_relocs **pp;
25dbc73a
AM
5937
5938 for (pp = &eh->dyn_relocs; (p = *pp) != NULL; )
252b5132 5939 {
25dbc73a
AM
5940 p->count -= p->pc_count;
5941 p->pc_count = 0;
5942 if (p->count == 0)
5943 *pp = p->next;
5944 else
5945 pp = &p->next;
252b5132 5946 }
25dbc73a 5947 }
252b5132 5948
3348747a
NS
5949 if (htab->is_vxworks)
5950 {
6061a67d 5951 struct elf_dyn_relocs **pp;
3348747a
NS
5952
5953 for (pp = &eh->dyn_relocs; (p = *pp) != NULL; )
5954 {
5955 if (strcmp (p->sec->output_section->name, ".tls_vars") == 0)
5956 *pp = p->next;
5957 else
5958 pp = &p->next;
5959 }
5960 }
5961
954b63d4 5962 if (eh->dyn_relocs != NULL)
25dbc73a 5963 {
46434633
AM
5964 /* Make sure this symbol is output as a dynamic symbol. */
5965 if (!ensure_undef_dynamic (info, h))
f0158f44 5966 return FALSE;
25dbc73a
AM
5967 }
5968 }
5969 else if (ELIMINATE_COPY_RELOCS)
5970 {
f0158f44 5971 /* For the non-pic case, discard space for relocs against
25dbc73a
AM
5972 symbols which turn out to need copy relocs or are not
5973 dynamic. */
529fe20e 5974 if (h->dynamic_adjusted
d3e454b9 5975 && !h->def_regular
529fe20e 5976 && !ELF_COMMON_DEF_P (h)
d3e454b9
AM
5977 && !(h->protected_def
5978 && eh->has_addr16_ha
5979 && eh->has_addr16_lo
5980 && htab->params->pic_fixup > 0))
25dbc73a 5981 {
46434633
AM
5982 /* Make sure this symbol is output as a dynamic symbol. */
5983 if (!ensure_undef_dynamic (info, h))
f0158f44 5984 return FALSE;
7619e7c7 5985
f0158f44 5986 if (h->dynindx == -1)
287c7eaf 5987 eh->dyn_relocs = NULL;
25dbc73a 5988 }
f0158f44 5989 else
287c7eaf 5990 eh->dyn_relocs = NULL;
25dbc73a 5991 }
252b5132 5992
f0158f44 5993 /* Allocate space. */
25dbc73a
AM
5994 for (p = eh->dyn_relocs; p != NULL; p = p->next)
5995 {
5996 asection *sreloc = elf_section_data (p->sec)->sreloc;
f95f8542 5997 if (eh->elf.type == STT_GNU_IFUNC)
ce558b89 5998 sreloc = htab->elf.irelplt;
25dbc73a
AM
5999 sreloc->size += p->count * sizeof (Elf32_External_Rela);
6000 }
252b5132 6001
f0158f44
AM
6002 /* Handle PLT relocs. Done last, after dynindx has settled. */
6003 dyn = htab->elf.dynamic_sections_created && h->dynindx != -1;
6004 if (dyn || h->type == STT_GNU_IFUNC)
6005 {
6006 struct plt_entry *ent;
6007 bfd_boolean doneone = FALSE;
6008 bfd_vma plt_offset = 0, glink_offset = 0;
6009
6010 for (ent = h->plt.plist; ent != NULL; ent = ent->next)
6011 if (ent->plt.refcount > 0)
6012 {
6013 asection *s = htab->elf.splt;
6014
6015 if (!dyn)
6016 s = htab->elf.iplt;
6017
6018 if (htab->plt_type == PLT_NEW || !dyn)
6019 {
6020 if (!doneone)
6021 {
6022 plt_offset = s->size;
6023 s->size += 4;
6024 }
6025 ent->plt.offset = plt_offset;
6026
6027 s = htab->glink;
6028 if (!doneone || bfd_link_pic (info))
6029 {
6030 glink_offset = s->size;
9e390558 6031 s->size += GLINK_ENTRY_SIZE (htab, h);
f0158f44
AM
6032 }
6033 if (!doneone
6034 && !bfd_link_pic (info)
6035 && h->def_dynamic
6036 && !h->def_regular)
6037 {
6038 h->root.u.def.section = s;
6039 h->root.u.def.value = glink_offset;
6040 }
6041 ent->glink_offset = glink_offset;
6042
6043 if (htab->params->emit_stub_syms
6044 && !add_stub_sym (ent, h, info))
6045 return FALSE;
6046 }
6047 else
6048 {
6049 if (!doneone)
6050 {
6051 /* If this is the first .plt entry, make room
6052 for the special first entry. */
6053 if (s->size == 0)
6054 s->size += htab->plt_initial_entry_size;
6055
6056 /* The PowerPC PLT is actually composed of two
6057 parts, the first part is 2 words (for a load
6058 and a jump), and then there is a remaining
6059 word available at the end. */
6060 plt_offset = (htab->plt_initial_entry_size
6061 + (htab->plt_slot_size
6062 * ((s->size
6063 - htab->plt_initial_entry_size)
6064 / htab->plt_entry_size)));
6065
6066 /* If this symbol is not defined in a regular
6067 file, and we are not generating a shared
6068 library, then set the symbol to this location
6069 in the .plt. This is to avoid text
6070 relocations, and is required to make
6071 function pointers compare as equal between
6072 the normal executable and the shared library. */
6073 if (! bfd_link_pic (info)
6074 && h->def_dynamic
6075 && !h->def_regular)
6076 {
6077 h->root.u.def.section = s;
6078 h->root.u.def.value = plt_offset;
6079 }
6080
6081 /* Make room for this entry. */
6082 s->size += htab->plt_entry_size;
6083 /* After the 8192nd entry, room for two entries
6084 is allocated. */
6085 if (htab->plt_type == PLT_OLD
6086 && (s->size - htab->plt_initial_entry_size)
6087 / htab->plt_entry_size
6088 > PLT_NUM_SINGLE_ENTRIES)
6089 s->size += htab->plt_entry_size;
6090 }
6091 ent->plt.offset = plt_offset;
6092 }
6093
6094 /* We also need to make an entry in the .rela.plt section. */
6095 if (!doneone)
6096 {
6097 if (!dyn)
6098 htab->elf.irelplt->size += sizeof (Elf32_External_Rela);
6099 else
6100 {
6101 htab->elf.srelplt->size += sizeof (Elf32_External_Rela);
6102
6103 if (htab->plt_type == PLT_VXWORKS)
6104 {
6105 /* Allocate space for the unloaded relocations. */
6106 if (!bfd_link_pic (info)
6107 && htab->elf.dynamic_sections_created)
6108 {
6109 if (ent->plt.offset
6110 == (bfd_vma) htab->plt_initial_entry_size)
6111 {
6112 htab->srelplt2->size
6113 += (sizeof (Elf32_External_Rela)
6114 * VXWORKS_PLTRESOLVE_RELOCS);
6115 }
6116
6117 htab->srelplt2->size
6118 += (sizeof (Elf32_External_Rela)
6119 * VXWORKS_PLT_NON_JMP_SLOT_RELOCS);
6120 }
6121
6122 /* Every PLT entry has an associated GOT entry in
6123 .got.plt. */
6124 htab->elf.sgotplt->size += 4;
6125 }
6126 }
6127 doneone = TRUE;
6128 }
6129 }
6130 else
6131 ent->plt.offset = (bfd_vma) -1;
6132
6133 if (!doneone)
6134 {
6135 h->plt.plist = NULL;
6136 h->needs_plt = 0;
6137 }
6138 }
6139 else
6140 {
6141 h->plt.plist = NULL;
6142 h->needs_plt = 0;
6143 }
6144
25dbc73a
AM
6145 return TRUE;
6146}
7619e7c7 6147
625af618
AM
6148/* Set DF_TEXTREL if we find any dynamic relocs that apply to
6149 read-only sections. */
7619e7c7 6150
25dbc73a 6151static bfd_boolean
0caf6c82 6152maybe_set_textrel (struct elf_link_hash_entry *h, void *info_p)
25dbc73a 6153{
98bbb1b8 6154 asection *sec;
0caf6c82 6155
25dbc73a
AM
6156 if (h->root.type == bfd_link_hash_indirect)
6157 return TRUE;
252b5132 6158
98bbb1b8
AM
6159 sec = readonly_dynrelocs (h);
6160 if (sec != NULL)
25dbc73a 6161 {
98bbb1b8
AM
6162 struct bfd_link_info *info = (struct bfd_link_info *) info_p;
6163
0caf6c82 6164 info->flags |= DF_TEXTREL;
98bbb1b8 6165 info->callbacks->minfo
c1c8c1ef 6166 (_("%pB: dynamic relocation against `%pT' in read-only section `%pA'\n"),
63c1f59d 6167 sec->owner, h->root.root.string, sec);
ee05f2fe 6168
625af618
AM
6169 /* Not an error, just cut short the traversal. */
6170 return FALSE;
25dbc73a
AM
6171 }
6172 return TRUE;
6173}
6174
6177242a
AM
6175static const unsigned char glink_eh_frame_cie[] =
6176{
6177 0, 0, 0, 16, /* length. */
6178 0, 0, 0, 0, /* id. */
6179 1, /* CIE version. */
6180 'z', 'R', 0, /* Augmentation string. */
6181 4, /* Code alignment. */
6182 0x7c, /* Data alignment. */
6183 65, /* RA reg. */
6184 1, /* Augmentation size. */
6185 DW_EH_PE_pcrel | DW_EH_PE_sdata4, /* FDE encoding. */
6186 DW_CFA_def_cfa, 1, 0 /* def_cfa: r1 offset 0. */
6187};
6188
25dbc73a
AM
6189/* Set the sizes of the dynamic sections. */
6190
6191static bfd_boolean
93d1b056 6192ppc_elf_size_dynamic_sections (bfd *output_bfd,
25dbc73a
AM
6193 struct bfd_link_info *info)
6194{
6195 struct ppc_elf_link_hash_table *htab;
6196 asection *s;
6197 bfd_boolean relocs;
6198 bfd *ibfd;
7fce784e 6199
252b5132 6200#ifdef DEBUG
25dbc73a 6201 fprintf (stderr, "ppc_elf_size_dynamic_sections called\n");
252b5132 6202#endif
252b5132 6203
25dbc73a
AM
6204 htab = ppc_elf_hash_table (info);
6205 BFD_ASSERT (htab->elf.dynobj != NULL);
252b5132 6206
25dbc73a
AM
6207 if (elf_hash_table (info)->dynamic_sections_created)
6208 {
6209 /* Set the contents of the .interp section to the interpreter. */
9b8b325a 6210 if (bfd_link_executable (info) && !info->nointerp)
25dbc73a 6211 {
3d4d4302 6212 s = bfd_get_linker_section (htab->elf.dynobj, ".interp");
25dbc73a
AM
6213 BFD_ASSERT (s != NULL);
6214 s->size = sizeof ELF_DYNAMIC_INTERPRETER;
6215 s->contents = (unsigned char *) ELF_DYNAMIC_INTERPRETER;
6216 }
6217 }
252b5132 6218
4a3dc543 6219 if (htab->plt_type == PLT_OLD)
d7128ce4 6220 htab->got_header_size = 16;
4a3dc543 6221 else if (htab->plt_type == PLT_NEW)
d7128ce4 6222 htab->got_header_size = 12;
252b5132 6223
25dbc73a
AM
6224 /* Set up .got offsets for local syms, and space for local dynamic
6225 relocs. */
c72f2fb2 6226 for (ibfd = info->input_bfds; ibfd != NULL; ibfd = ibfd->link.next)
25dbc73a
AM
6227 {
6228 bfd_signed_vma *local_got;
6229 bfd_signed_vma *end_local_got;
e054468f
AM
6230 struct plt_entry **local_plt;
6231 struct plt_entry **end_local_plt;
25dbc73a
AM
6232 char *lgot_masks;
6233 bfd_size_type locsymcount;
6234 Elf_Internal_Shdr *symtab_hdr;
7fce784e 6235
0c8d6e5c 6236 if (!is_ppc_elf (ibfd))
25dbc73a 6237 continue;
7fce784e 6238
25dbc73a
AM
6239 for (s = ibfd->sections; s != NULL; s = s->next)
6240 {
f95f8542 6241 struct ppc_dyn_relocs *p;
252b5132 6242
f95f8542 6243 for (p = ((struct ppc_dyn_relocs *)
25dbc73a
AM
6244 elf_section_data (s)->local_dynrel);
6245 p != NULL;
6246 p = p->next)
6247 {
6248 if (!bfd_is_abs_section (p->sec)
6249 && bfd_is_abs_section (p->sec->output_section))
6250 {
6251 /* Input section has been discarded, either because
6252 it is a copy of a linkonce section or due to
6253 linker script /DISCARD/, so we'll be discarding
6254 the relocs too. */
7fce784e 6255 }
3348747a
NS
6256 else if (htab->is_vxworks
6257 && strcmp (p->sec->output_section->name,
6258 ".tls_vars") == 0)
6259 {
6260 /* Relocations in vxworks .tls_vars sections are
6261 handled specially by the loader. */
6262 }
25dbc73a 6263 else if (p->count != 0)
7fce784e 6264 {
25f23106 6265 asection *sreloc = elf_section_data (p->sec)->sreloc;
f95f8542 6266 if (p->ifunc)
ce558b89 6267 sreloc = htab->elf.irelplt;
25f23106 6268 sreloc->size += p->count * sizeof (Elf32_External_Rela);
25dbc73a
AM
6269 if ((p->sec->output_section->flags
6270 & (SEC_READONLY | SEC_ALLOC))
6271 == (SEC_READONLY | SEC_ALLOC))
0caf6c82
L
6272 {
6273 info->flags |= DF_TEXTREL;
871b3ab2 6274 info->callbacks->minfo (_("%pB: dynamic relocation in read-only section `%pA'\n"),
0caf6c82
L
6275 p->sec->owner, p->sec);
6276 }
7fce784e 6277 }
252b5132 6278 }
252b5132 6279 }
252b5132 6280
25dbc73a
AM
6281 local_got = elf_local_got_refcounts (ibfd);
6282 if (!local_got)
6283 continue;
252b5132 6284
0ffa91dd 6285 symtab_hdr = &elf_symtab_hdr (ibfd);
25dbc73a
AM
6286 locsymcount = symtab_hdr->sh_info;
6287 end_local_got = local_got + locsymcount;
e054468f
AM
6288 local_plt = (struct plt_entry **) end_local_got;
6289 end_local_plt = local_plt + locsymcount;
6290 lgot_masks = (char *) end_local_plt;
91d6fa6a 6291
25dbc73a
AM
6292 for (; local_got < end_local_got; ++local_got, ++lgot_masks)
6293 if (*local_got > 0)
6294 {
f15d0b54
AM
6295 unsigned int need;
6296 if ((*lgot_masks & TLS_LD) != 0)
6297 htab->tlsld_got.refcount += 1;
6298 need = got_entries_needed (*lgot_masks);
d6e14abc
AM
6299 if (need == 0)
6300 *local_got = (bfd_vma) -1;
25dbc73a
AM
6301 else
6302 {
3b36f7e6 6303 *local_got = allocate_got (htab, need);
0e1862bb 6304 if (bfd_link_pic (info))
0bed072f 6305 {
f15d0b54
AM
6306 asection *srel;
6307 bfd_boolean tprel_known = bfd_link_executable (info);
6308
6309 need = got_relocs_needed (*lgot_masks, need, tprel_known);
6310 srel = htab->elf.srelgot;
0bed072f 6311 if ((*lgot_masks & PLT_IFUNC) != 0)
ce558b89 6312 srel = htab->elf.irelplt;
f15d0b54 6313 srel->size += need;
0bed072f 6314 }
25dbc73a
AM
6315 }
6316 }
6317 else
6318 *local_got = (bfd_vma) -1;
e054468f
AM
6319
6320 if (htab->is_vxworks)
6321 continue;
6322
6323 /* Allocate space for calls to local STT_GNU_IFUNC syms in .iplt. */
6324 for (; local_plt < end_local_plt; ++local_plt)
6325 {
6326 struct plt_entry *ent;
6327 bfd_boolean doneone = FALSE;
6328 bfd_vma plt_offset = 0, glink_offset = 0;
6329
6330 for (ent = *local_plt; ent != NULL; ent = ent->next)
6331 if (ent->plt.refcount > 0)
6332 {
ce558b89 6333 s = htab->elf.iplt;
e054468f
AM
6334
6335 if (!doneone)
6336 {
6337 plt_offset = s->size;
6338 s->size += 4;
6339 }
6340 ent->plt.offset = plt_offset;
6341
6342 s = htab->glink;
0e1862bb 6343 if (!doneone || bfd_link_pic (info))
e054468f
AM
6344 {
6345 glink_offset = s->size;
9e390558 6346 s->size += GLINK_ENTRY_SIZE (htab, NULL);
e054468f
AM
6347 }
6348 ent->glink_offset = glink_offset;
6349
6350 if (!doneone)
6351 {
ce558b89 6352 htab->elf.irelplt->size += sizeof (Elf32_External_Rela);
e054468f
AM
6353 doneone = TRUE;
6354 }
6355 }
6356 else
6357 ent->plt.offset = (bfd_vma) -1;
6358 }
25dbc73a 6359 }
252b5132 6360
b7fcf6f6
AM
6361 /* Allocate space for global sym dynamic relocs. */
6362 elf_link_hash_traverse (elf_hash_table (info), allocate_dynrelocs, info);
6363
3b36f7e6
AM
6364 if (htab->tlsld_got.refcount > 0)
6365 {
6366 htab->tlsld_got.offset = allocate_got (htab, 8);
0e1862bb 6367 if (bfd_link_pic (info))
ce558b89 6368 htab->elf.srelgot->size += sizeof (Elf32_External_Rela);
3b36f7e6
AM
6369 }
6370 else
6371 htab->tlsld_got.offset = (bfd_vma) -1;
6372
ce558b89 6373 if (htab->elf.sgot != NULL && htab->plt_type != PLT_VXWORKS)
3b36f7e6
AM
6374 {
6375 unsigned int g_o_t = 32768;
6376
4d962050
AM
6377 /* If we haven't allocated the header, do so now. When we get here,
6378 for old plt/got the got size will be 0 to 32764 (not allocated),
6379 or 32780 to 65536 (header allocated). For new plt/got, the
6380 corresponding ranges are 0 to 32768 and 32780 to 65536. */
ce558b89 6381 if (htab->elf.sgot->size <= 32768)
3b36f7e6 6382 {
ce558b89 6383 g_o_t = htab->elf.sgot->size;
4a3dc543 6384 if (htab->plt_type == PLT_OLD)
4d962050 6385 g_o_t += 4;
ce558b89 6386 htab->elf.sgot->size += htab->got_header_size;
3b36f7e6 6387 }
3b36f7e6
AM
6388
6389 htab->elf.hgot->root.u.def.value = g_o_t;
6390 }
0e1862bb 6391 if (bfd_link_pic (info))
bd6c6e2b
AM
6392 {
6393 struct elf_link_hash_entry *sda = htab->sdata[0].sym;
93d1b056
AM
6394
6395 sda->root.u.def.section = htab->elf.hgot->root.u.def.section;
6396 sda->root.u.def.value = htab->elf.hgot->root.u.def.value;
bd6c6e2b 6397 }
15bfcc77
AM
6398 if (info->emitrelocations)
6399 {
6400 struct elf_link_hash_entry *sda = htab->sdata[0].sym;
6401
6402 if (sda != NULL && sda->ref_regular)
6403 sda->root.u.def.section->flags |= SEC_KEEP;
6404 sda = htab->sdata[1].sym;
6405 if (sda != NULL && sda->ref_regular)
6406 sda->root.u.def.section->flags |= SEC_KEEP;
6407 }
3b36f7e6 6408
e054468f
AM
6409 if (htab->glink != NULL
6410 && htab->glink->size != 0
6411 && htab->elf.dynamic_sections_created)
d7128ce4
AM
6412 {
6413 htab->glink_pltresolve = htab->glink->size;
9e390558
AM
6414 /* Space for the branch table. */
6415 htab->glink->size
6416 += htab->elf.srelplt->size / (sizeof (Elf32_External_Rela) / 4) - 4;
86b9da88 6417 /* Pad out to align the start of PLTresolve. */
5446cbdf
AM
6418 htab->glink->size += -htab->glink->size & (htab->params->ppc476_workaround
6419 ? 63 : 15);
d7128ce4 6420 htab->glink->size += GLINK_PLTRESOLVE;
0ba07910 6421
5446cbdf 6422 if (htab->params->emit_stub_syms)
0ba07910
AM
6423 {
6424 struct elf_link_hash_entry *sh;
6425 sh = elf_link_hash_lookup (&htab->elf, "__glink",
6426 TRUE, FALSE, FALSE);
6427 if (sh == NULL)
6428 return FALSE;
6429 if (sh->root.type == bfd_link_hash_new)
6430 {
6431 sh->root.type = bfd_link_hash_defined;
6432 sh->root.u.def.section = htab->glink;
6433 sh->root.u.def.value = htab->glink_pltresolve;
6434 sh->ref_regular = 1;
6435 sh->def_regular = 1;
6436 sh->ref_regular_nonweak = 1;
6437 sh->forced_local = 1;
6438 sh->non_elf = 0;
2ec55de3 6439 sh->root.linker_def = 1;
0ba07910
AM
6440 }
6441 sh = elf_link_hash_lookup (&htab->elf, "__glink_PLTresolve",
6442 TRUE, FALSE, FALSE);
6443 if (sh == NULL)
6444 return FALSE;
6445 if (sh->root.type == bfd_link_hash_new)
6446 {
6447 sh->root.type = bfd_link_hash_defined;
6448 sh->root.u.def.section = htab->glink;
6449 sh->root.u.def.value = htab->glink->size - GLINK_PLTRESOLVE;
6450 sh->ref_regular = 1;
6451 sh->def_regular = 1;
6452 sh->ref_regular_nonweak = 1;
6453 sh->forced_local = 1;
6454 sh->non_elf = 0;
2ec55de3 6455 sh->root.linker_def = 1;
0ba07910
AM
6456 }
6457 }
d7128ce4
AM
6458 }
6459
6177242a
AM
6460 if (htab->glink != NULL
6461 && htab->glink->size != 0
6462 && htab->glink_eh_frame != NULL
9a2a56cc
AM
6463 && !bfd_is_abs_section (htab->glink_eh_frame->output_section)
6464 && _bfd_elf_eh_frame_present (info))
6177242a
AM
6465 {
6466 s = htab->glink_eh_frame;
6467 s->size = sizeof (glink_eh_frame_cie) + 20;
0e1862bb 6468 if (bfd_link_pic (info))
6177242a
AM
6469 {
6470 s->size += 4;
6471 if (htab->glink->size - GLINK_PLTRESOLVE + 8 >= 256)
6472 s->size += 4;
6473 }
6474 }
6475
25dbc73a
AM
6476 /* We've now determined the sizes of the various dynamic sections.
6477 Allocate memory for them. */
6478 relocs = FALSE;
6479 for (s = htab->elf.dynobj->sections; s != NULL; s = s->next)
252b5132 6480 {
9d8504b1
PB
6481 bfd_boolean strip_section = TRUE;
6482
25dbc73a
AM
6483 if ((s->flags & SEC_LINKER_CREATED) == 0)
6484 continue;
252b5132 6485
ce558b89
AM
6486 if (s == htab->elf.splt
6487 || s == htab->elf.sgot)
25dbc73a 6488 {
9d8504b1
PB
6489 /* We'd like to strip these sections if they aren't needed, but if
6490 we've exported dynamic symbols from them we must leave them.
6491 It's too late to tell BFD to get rid of the symbols. */
e054468f 6492 if (htab->elf.hplt != NULL)
9d8504b1 6493 strip_section = FALSE;
25dbc73a
AM
6494 /* Strip this section if we don't need it; see the
6495 comment below. */
6496 }
ce558b89 6497 else if (s == htab->elf.iplt
e054468f 6498 || s == htab->glink
6177242a 6499 || s == htab->glink_eh_frame
ce558b89 6500 || s == htab->elf.sgotplt
e054468f 6501 || s == htab->sbss
9d19e4fd 6502 || s == htab->elf.sdynbss
5474d94f 6503 || s == htab->elf.sdynrelro
15bfcc77 6504 || s == htab->dynsbss)
25dbc73a 6505 {
c9a2f333 6506 /* Strip these too. */
25dbc73a 6507 }
15bfcc77
AM
6508 else if (s == htab->sdata[0].section
6509 || s == htab->sdata[1].section)
6510 {
6511 strip_section = (s->flags & SEC_KEEP) == 0;
6512 }
a0f49396
NC
6513 else if (CONST_STRNEQ (bfd_get_section_name (htab->elf.dynobj, s),
6514 ".rela"))
25dbc73a 6515 {
c456f082 6516 if (s->size != 0)
25dbc73a
AM
6517 {
6518 /* Remember whether there are any relocation sections. */
6519 relocs = TRUE;
252b5132 6520
25dbc73a
AM
6521 /* We use the reloc_count field as a counter if we need
6522 to copy relocs into the output file. */
6523 s->reloc_count = 0;
252b5132
RH
6524 }
6525 }
25dbc73a
AM
6526 else
6527 {
6528 /* It's not one of our sections, so don't allocate space. */
6529 continue;
6530 }
252b5132 6531
9d8504b1 6532 if (s->size == 0 && strip_section)
25dbc73a 6533 {
c456f082
AM
6534 /* If we don't need this section, strip it from the
6535 output file. This is mostly to handle .rela.bss and
6536 .rela.plt. We must create both sections in
6537 create_dynamic_sections, because they must be created
6538 before the linker maps input sections to output
6539 sections. The linker does that before
6540 adjust_dynamic_symbol is called, and it is that
6541 function which decides whether anything needs to go
6542 into these sections. */
8423293d 6543 s->flags |= SEC_EXCLUDE;
25dbc73a
AM
6544 continue;
6545 }
7fce784e 6546
d7128ce4 6547 if ((s->flags & SEC_HAS_CONTENTS) == 0)
644285ef
AM
6548 continue;
6549
25dbc73a
AM
6550 /* Allocate memory for the section contents. */
6551 s->contents = bfd_zalloc (htab->elf.dynobj, s->size);
6552 if (s->contents == NULL)
6553 return FALSE;
6554 }
252b5132 6555
25dbc73a 6556 if (htab->elf.dynamic_sections_created)
7619e7c7 6557 {
25dbc73a
AM
6558 /* Add some entries to the .dynamic section. We fill in the
6559 values later, in ppc_elf_finish_dynamic_sections, but we
6560 must add the entries now so that we get the correct size for
6561 the .dynamic section. The DT_DEBUG entry is filled in by the
6562 dynamic linker and used by the debugger. */
6563#define add_dynamic_entry(TAG, VAL) \
6564 _bfd_elf_add_dynamic_entry (info, TAG, VAL)
252b5132 6565
0e1862bb 6566 if (bfd_link_executable (info))
7619e7c7 6567 {
25dbc73a
AM
6568 if (!add_dynamic_entry (DT_DEBUG, 0))
6569 return FALSE;
7619e7c7
AM
6570 }
6571
ce558b89 6572 if (htab->elf.splt != NULL && htab->elf.splt->size != 0)
7619e7c7 6573 {
25dbc73a
AM
6574 if (!add_dynamic_entry (DT_PLTGOT, 0)
6575 || !add_dynamic_entry (DT_PLTRELSZ, 0)
6576 || !add_dynamic_entry (DT_PLTREL, DT_RELA)
6577 || !add_dynamic_entry (DT_JMPREL, 0))
6578 return FALSE;
6579 }
7619e7c7 6580
c7e17e05
AM
6581 if (htab->plt_type == PLT_NEW
6582 && htab->glink != NULL
6583 && htab->glink->size != 0)
d7128ce4 6584 {
1fe44d79 6585 if (!add_dynamic_entry (DT_PPC_GOT, 0))
d7128ce4 6586 return FALSE;
5446cbdf 6587 if (!htab->params->no_tls_get_addr_opt
a7f2871e
AM
6588 && htab->tls_get_addr != NULL
6589 && htab->tls_get_addr->plt.plist != NULL
e8910a83 6590 && !add_dynamic_entry (DT_PPC_OPT, PPC_OPT_TLS))
a7f2871e 6591 return FALSE;
d7128ce4
AM
6592 }
6593
25dbc73a
AM
6594 if (relocs)
6595 {
6596 if (!add_dynamic_entry (DT_RELA, 0)
6597 || !add_dynamic_entry (DT_RELASZ, 0)
6598 || !add_dynamic_entry (DT_RELAENT, sizeof (Elf32_External_Rela)))
6599 return FALSE;
6600 }
7619e7c7 6601
25dbc73a
AM
6602 /* If any dynamic relocs apply to a read-only section, then we
6603 need a DT_TEXTREL entry. */
6604 if ((info->flags & DF_TEXTREL) == 0)
625af618 6605 elf_link_hash_traverse (elf_hash_table (info), maybe_set_textrel,
25dbc73a 6606 info);
7619e7c7 6607
25dbc73a
AM
6608 if ((info->flags & DF_TEXTREL) != 0)
6609 {
6610 if (!add_dynamic_entry (DT_TEXTREL, 0))
6611 return FALSE;
7619e7c7 6612 }
7a2b07ff
NS
6613 if (htab->is_vxworks
6614 && !elf_vxworks_add_dynamic_entries (output_bfd, info))
6615 return FALSE;
6616 }
25dbc73a
AM
6617#undef add_dynamic_entry
6618
7e01508c
AM
6619 if (htab->glink_eh_frame != NULL
6620 && htab->glink_eh_frame->contents != NULL)
6621 {
6622 unsigned char *p = htab->glink_eh_frame->contents;
6623 bfd_vma val;
6624
6625 memcpy (p, glink_eh_frame_cie, sizeof (glink_eh_frame_cie));
6626 /* CIE length (rewrite in case little-endian). */
6627 bfd_put_32 (htab->elf.dynobj, sizeof (glink_eh_frame_cie) - 4, p);
6628 p += sizeof (glink_eh_frame_cie);
6629 /* FDE length. */
6630 val = htab->glink_eh_frame->size - 4 - sizeof (glink_eh_frame_cie);
6631 bfd_put_32 (htab->elf.dynobj, val, p);
6632 p += 4;
6633 /* CIE pointer. */
6634 val = p - htab->glink_eh_frame->contents;
6635 bfd_put_32 (htab->elf.dynobj, val, p);
6636 p += 4;
6637 /* Offset to .glink. Set later. */
6638 p += 4;
6639 /* .glink size. */
6640 bfd_put_32 (htab->elf.dynobj, htab->glink->size, p);
6641 p += 4;
6642 /* Augmentation. */
6643 p += 1;
6644
0e1862bb 6645 if (bfd_link_pic (info)
7e01508c
AM
6646 && htab->elf.dynamic_sections_created)
6647 {
6648 bfd_vma adv = (htab->glink->size - GLINK_PLTRESOLVE + 8) >> 2;
6649 if (adv < 64)
6650 *p++ = DW_CFA_advance_loc + adv;
6651 else if (adv < 256)
6652 {
6653 *p++ = DW_CFA_advance_loc1;
6654 *p++ = adv;
6655 }
6656 else if (adv < 65536)
6657 {
6658 *p++ = DW_CFA_advance_loc2;
6659 bfd_put_16 (htab->elf.dynobj, adv, p);
6660 p += 2;
6661 }
6662 else
6663 {
6664 *p++ = DW_CFA_advance_loc4;
6665 bfd_put_32 (htab->elf.dynobj, adv, p);
6666 p += 4;
6667 }
6668 *p++ = DW_CFA_register;
6669 *p++ = 65;
6670 p++;
6671 *p++ = DW_CFA_advance_loc + 4;
6672 *p++ = DW_CFA_restore_extended;
6673 *p++ = 65;
6674 }
6675 BFD_ASSERT ((bfd_vma) ((p + 3 - htab->glink_eh_frame->contents) & -4)
6676 == htab->glink_eh_frame->size);
6677 }
6678
7619e7c7
AM
6679 return TRUE;
6680}
0eb4a168 6681
93d1b056
AM
6682/* Arrange to have _SDA_BASE_ or _SDA2_BASE_ stripped from the output
6683 if it looks like nothing is using them. */
6684
6685static void
6686maybe_strip_sdasym (bfd *output_bfd, elf_linker_section_t *lsect)
6687{
6688 struct elf_link_hash_entry *sda = lsect->sym;
6689
6690 if (sda != NULL && !sda->ref_regular && sda->dynindx == -1)
6691 {
6692 asection *s;
6693
6694 s = bfd_get_section_by_name (output_bfd, lsect->name);
6695 if (s == NULL || bfd_section_removed_from_list (output_bfd, s))
6696 {
6697 s = bfd_get_section_by_name (output_bfd, lsect->bss_name);
6698 if (s == NULL || bfd_section_removed_from_list (output_bfd, s))
6699 {
6700 sda->def_regular = 0;
6701 /* This is somewhat magic. See elf_link_output_extsym. */
6702 sda->ref_dynamic = 1;
6703 sda->forced_local = 0;
6704 }
6705 }
6706 }
6707}
6708
6709void
6710ppc_elf_maybe_strip_sdata_syms (struct bfd_link_info *info)
6711{
6712 struct ppc_elf_link_hash_table *htab = ppc_elf_hash_table (info);
6713
6714 if (htab != NULL)
6715 {
6716 maybe_strip_sdasym (info->output_bfd, &htab->sdata[0]);
6717 maybe_strip_sdasym (info->output_bfd, &htab->sdata[1]);
6718 }
6719}
6720
6721
0eb4a168
AM
6722/* Return TRUE if symbol should be hashed in the `.gnu.hash' section. */
6723
6724static bfd_boolean
6725ppc_elf_hash_symbol (struct elf_link_hash_entry *h)
6726{
6727 if (h->plt.plist != NULL
6728 && !h->def_regular
6729 && (!h->pointer_equality_needed
6730 || !h->ref_regular_nonweak))
6731 return FALSE;
6732
6733 return _bfd_elf_hash_symbol (h);
6734}
25dbc73a
AM
6735\f
6736#define ARRAY_SIZE(a) (sizeof (a) / sizeof ((a)[0]))
6737
01017ef8
NS
6738/* Relaxation trampolines. r12 is available for clobbering (r11, is
6739 used for some functions that are allowed to break the ABI). */
25dbc73a
AM
6740static const int shared_stub_entry[] =
6741 {
6742 0x7c0802a6, /* mflr 0 */
6743 0x429f0005, /* bcl 20, 31, .Lxxx */
01017ef8
NS
6744 0x7d8802a6, /* mflr 12 */
6745 0x3d8c0000, /* addis 12, 12, (xxx-.Lxxx)@ha */
53291d1f 6746 0x398c0000, /* addi 12, 12, (xxx-.Lxxx)@l */
25dbc73a 6747 0x7c0803a6, /* mtlr 0 */
01017ef8 6748 0x7d8903a6, /* mtctr 12 */
25dbc73a
AM
6749 0x4e800420, /* bctr */
6750 };
6751
6752static const int stub_entry[] =
6753 {
01017ef8
NS
6754 0x3d800000, /* lis 12,xxx@ha */
6755 0x398c0000, /* addi 12,12,xxx@l */
6756 0x7d8903a6, /* mtctr 12 */
25dbc73a
AM
6757 0x4e800420, /* bctr */
6758 };
6759
5446cbdf
AM
6760struct ppc_elf_relax_info
6761{
6762 unsigned int workaround_size;
d3e454b9 6763 unsigned int picfixup_size;
5446cbdf
AM
6764};
6765
6766/* This function implements long branch trampolines, and the ppc476
6767 icache bug workaround. Any section needing trampolines or patch
6768 space for the workaround has its size extended so that we can
53291d1f 6769 add trampolines at the end of the section. */
5446cbdf 6770
25dbc73a
AM
6771static bfd_boolean
6772ppc_elf_relax_section (bfd *abfd,
6773 asection *isec,
6774 struct bfd_link_info *link_info,
6775 bfd_boolean *again)
6776{
d3e454b9 6777 struct one_branch_fixup
25dbc73a 6778 {
d3e454b9 6779 struct one_branch_fixup *next;
25dbc73a 6780 asection *tsec;
01017ef8
NS
6781 /* Final link, can use the symbol offset. For a
6782 relocatable link we use the symbol's index. */
25dbc73a
AM
6783 bfd_vma toff;
6784 bfd_vma trampoff;
6785 };
7619e7c7 6786
25dbc73a
AM
6787 Elf_Internal_Shdr *symtab_hdr;
6788 bfd_byte *contents = NULL;
6789 Elf_Internal_Sym *isymbuf = NULL;
6790 Elf_Internal_Rela *internal_relocs = NULL;
5446cbdf 6791 Elf_Internal_Rela *irel, *irelend = NULL;
d3e454b9 6792 struct one_branch_fixup *branch_fixups = NULL;
5446cbdf 6793 struct ppc_elf_relax_info *relax_info = NULL;
9bc4e62b 6794 unsigned changes = 0;
5446cbdf 6795 bfd_boolean workaround_change;
d7128ce4 6796 struct ppc_elf_link_hash_table *htab;
d3e454b9 6797 bfd_size_type trampbase, trampoff, newsize, picfixup_size;
a6aa5195 6798 asection *got2;
50248c89 6799 bfd_boolean maybe_pasted;
7619e7c7 6800
25dbc73a 6801 *again = FALSE;
7619e7c7 6802
5446cbdf 6803 /* No need to do anything with non-alloc or non-code sections. */
c87b5a93 6804 if ((isec->flags & SEC_ALLOC) == 0
a8ad78a7 6805 || (isec->flags & SEC_CODE) == 0
5446cbdf
AM
6806 || (isec->flags & SEC_LINKER_CREATED) != 0
6807 || isec->size < 4)
25dbc73a 6808 return TRUE;
7619e7c7 6809
c8a1f254
NS
6810 /* We cannot represent the required PIC relocs in the output, so don't
6811 do anything. The linker doesn't support mixing -shared and -r
6812 anyway. */
0e1862bb 6813 if (bfd_link_relocatable (link_info) && bfd_link_pic (link_info))
795bc6b3 6814 return TRUE;
5b914448 6815
5446cbdf
AM
6816 htab = ppc_elf_hash_table (link_info);
6817 if (htab == NULL)
6818 return TRUE;
6819
6820 isec->size = (isec->size + 3) & -4;
6821 if (isec->rawsize == 0)
6822 isec->rawsize = isec->size;
6823 trampbase = isec->size;
6824
53291d1f
AM
6825 BFD_ASSERT (isec->sec_info_type == SEC_INFO_TYPE_NONE
6826 || isec->sec_info_type == SEC_INFO_TYPE_TARGET);
6827 isec->sec_info_type = SEC_INFO_TYPE_TARGET;
6828
d3e454b9
AM
6829 if (htab->params->ppc476_workaround
6830 || htab->params->pic_fixup > 0)
5446cbdf
AM
6831 {
6832 if (elf_section_data (isec)->sec_info == NULL)
6833 {
5446cbdf
AM
6834 elf_section_data (isec)->sec_info
6835 = bfd_zalloc (abfd, sizeof (struct ppc_elf_relax_info));
6836 if (elf_section_data (isec)->sec_info == NULL)
6837 return FALSE;
6838 }
6839 relax_info = elf_section_data (isec)->sec_info;
6840 trampbase -= relax_info->workaround_size;
6841 }
6842
50248c89
AM
6843 maybe_pasted = (strcmp (isec->output_section->name, ".init") == 0
6844 || strcmp (isec->output_section->name, ".fini") == 0);
25dbc73a 6845 /* Space for a branch around any trampolines. */
5446cbdf
AM
6846 trampoff = trampbase;
6847 if (maybe_pasted && trampbase == isec->rawsize)
50248c89 6848 trampoff += 4;
7619e7c7 6849
0ffa91dd 6850 symtab_hdr = &elf_symtab_hdr (abfd);
d3e454b9
AM
6851 picfixup_size = 0;
6852 if (htab->params->branch_trampolines
6853 || htab->params->pic_fixup > 0)
7619e7c7 6854 {
5446cbdf
AM
6855 /* Get a copy of the native relocations. */
6856 if (isec->reloc_count != 0)
25dbc73a 6857 {
5446cbdf
AM
6858 internal_relocs = _bfd_elf_link_read_relocs (abfd, isec, NULL, NULL,
6859 link_info->keep_memory);
6860 if (internal_relocs == NULL)
6861 goto error_return;
25dbc73a 6862 }
7619e7c7 6863
5446cbdf
AM
6864 got2 = bfd_get_section_by_name (abfd, ".got2");
6865
6866 irelend = internal_relocs + isec->reloc_count;
6867 for (irel = internal_relocs; irel < irelend; irel++)
25dbc73a 6868 {
5446cbdf
AM
6869 unsigned long r_type = ELF32_R_TYPE (irel->r_info);
6870 bfd_vma toff, roff;
6871 asection *tsec;
d3e454b9 6872 struct one_branch_fixup *f;
5446cbdf 6873 size_t insn_offset = 0;
d3e454b9 6874 bfd_vma max_branch_offset = 0, val;
5446cbdf
AM
6875 bfd_byte *hit_addr;
6876 unsigned long t0;
6877 struct elf_link_hash_entry *h;
6878 struct plt_entry **plist;
6879 unsigned char sym_type;
6880
6881 switch (r_type)
6882 {
6883 case R_PPC_REL24:
6884 case R_PPC_LOCAL24PC:
6885 case R_PPC_PLTREL24:
6886 max_branch_offset = 1 << 25;
6887 break;
6888
6889 case R_PPC_REL14:
6890 case R_PPC_REL14_BRTAKEN:
6891 case R_PPC_REL14_BRNTAKEN:
6892 max_branch_offset = 1 << 15;
6893 break;
7fce784e 6894
d3e454b9
AM
6895 case R_PPC_ADDR16_HA:
6896 if (htab->params->pic_fixup > 0)
6897 break;
6898 continue;
6899
5446cbdf
AM
6900 default:
6901 continue;
6902 }
6903
6904 /* Get the value of the symbol referred to by the reloc. */
6905 h = NULL;
6906 if (ELF32_R_SYM (irel->r_info) < symtab_hdr->sh_info)
25dbc73a 6907 {
5446cbdf
AM
6908 /* A local symbol. */
6909 Elf_Internal_Sym *isym;
6910
6911 /* Read this BFD's local symbols. */
25dbc73a 6912 if (isymbuf == NULL)
5446cbdf
AM
6913 {
6914 isymbuf = (Elf_Internal_Sym *) symtab_hdr->contents;
6915 if (isymbuf == NULL)
6916 isymbuf = bfd_elf_get_elf_syms (abfd, symtab_hdr,
6917 symtab_hdr->sh_info, 0,
6918 NULL, NULL, NULL);
6919 if (isymbuf == 0)
6920 goto error_return;
6921 }
6922 isym = isymbuf + ELF32_R_SYM (irel->r_info);
6923 if (isym->st_shndx == SHN_UNDEF)
6924 tsec = bfd_und_section_ptr;
6925 else if (isym->st_shndx == SHN_ABS)
6926 tsec = bfd_abs_section_ptr;
6927 else if (isym->st_shndx == SHN_COMMON)
6928 tsec = bfd_com_section_ptr;
6929 else
6930 tsec = bfd_section_from_elf_index (abfd, isym->st_shndx);
6931
6932 toff = isym->st_value;
6933 sym_type = ELF_ST_TYPE (isym->st_info);
25dbc73a 6934 }
25dbc73a 6935 else
5446cbdf
AM
6936 {
6937 /* Global symbol handling. */
6938 unsigned long indx;
7fce784e 6939
5446cbdf
AM
6940 indx = ELF32_R_SYM (irel->r_info) - symtab_hdr->sh_info;
6941 h = elf_sym_hashes (abfd)[indx];
7619e7c7 6942
5446cbdf
AM
6943 while (h->root.type == bfd_link_hash_indirect
6944 || h->root.type == bfd_link_hash_warning)
6945 h = (struct elf_link_hash_entry *) h->root.u.i.link;
7619e7c7 6946
5446cbdf
AM
6947 if (h->root.type == bfd_link_hash_defined
6948 || h->root.type == bfd_link_hash_defweak)
6949 {
6950 tsec = h->root.u.def.section;
6951 toff = h->root.u.def.value;
6952 }
6953 else if (h->root.type == bfd_link_hash_undefined
6954 || h->root.type == bfd_link_hash_undefweak)
6955 {
6956 tsec = bfd_und_section_ptr;
0e1862bb 6957 toff = bfd_link_relocatable (link_info) ? indx : 0;
5446cbdf
AM
6958 }
6959 else
6960 continue;
6961
9f7552cf
AM
6962 /* If this branch is to __tls_get_addr then we may later
6963 optimise away the call. We won't be needing a long-
6964 branch stub in that case. */
0e1862bb 6965 if (bfd_link_executable (link_info)
9f7552cf
AM
6966 && h == htab->tls_get_addr
6967 && irel != internal_relocs)
6968 {
6969 unsigned long t_symndx = ELF32_R_SYM (irel[-1].r_info);
6970 unsigned long t_rtype = ELF32_R_TYPE (irel[-1].r_info);
6971 unsigned int tls_mask = 0;
6972
6973 /* The previous reloc should be one of R_PPC_TLSGD or
6974 R_PPC_TLSLD, or for older object files, a reloc
6975 on the __tls_get_addr arg setup insn. Get tls
6976 mask bits from the symbol on that reloc. */
6977 if (t_symndx < symtab_hdr->sh_info)
6978 {
6979 bfd_vma *local_got_offsets = elf_local_got_offsets (abfd);
6980
6981 if (local_got_offsets != NULL)
6982 {
6983 struct plt_entry **local_plt = (struct plt_entry **)
6984 (local_got_offsets + symtab_hdr->sh_info);
6985 char *lgot_masks = (char *)
6986 (local_plt + symtab_hdr->sh_info);
6987 tls_mask = lgot_masks[t_symndx];
6988 }
6989 }
6990 else
6991 {
6992 struct elf_link_hash_entry *th
6993 = elf_sym_hashes (abfd)[t_symndx - symtab_hdr->sh_info];
6994
6995 while (th->root.type == bfd_link_hash_indirect
6996 || th->root.type == bfd_link_hash_warning)
6997 th = (struct elf_link_hash_entry *) th->root.u.i.link;
6998
6999 tls_mask
7000 = ((struct ppc_elf_link_hash_entry *) th)->tls_mask;
7001 }
7002
7003 /* The mask bits tell us if the call will be
7004 optimised away. */
7005 if ((tls_mask & TLS_TLS) != 0 && (tls_mask & TLS_GD) == 0
7006 && (t_rtype == R_PPC_TLSGD
7007 || t_rtype == R_PPC_GOT_TLSGD16
7008 || t_rtype == R_PPC_GOT_TLSGD16_LO))
7009 continue;
7010 if ((tls_mask & TLS_TLS) != 0 && (tls_mask & TLS_LD) == 0
7011 && (t_rtype == R_PPC_TLSLD
7012 || t_rtype == R_PPC_GOT_TLSLD16
7013 || t_rtype == R_PPC_GOT_TLSLD16_LO))
7014 continue;
7015 }
7016
5446cbdf
AM
7017 sym_type = h->type;
7018 }
7619e7c7 7019
d3e454b9
AM
7020 if (r_type == R_PPC_ADDR16_HA)
7021 {
7022 if (h != NULL
7023 && !h->def_regular
7024 && h->protected_def
7025 && ppc_elf_hash_entry (h)->has_addr16_ha
7026 && ppc_elf_hash_entry (h)->has_addr16_lo)
7027 picfixup_size += 12;
7028 continue;
7029 }
7030
5446cbdf
AM
7031 /* The condition here under which we call find_plt_ent must
7032 match that in relocate_section. If we call find_plt_ent here
7033 but not in relocate_section, or vice versa, then the branch
7034 destination used here may be incorrect. */
7035 plist = NULL;
7036 if (h != NULL)
25dbc73a 7037 {
5446cbdf
AM
7038 /* We know is_branch_reloc (r_type) is true. */
7039 if (h->type == STT_GNU_IFUNC
7040 || r_type == R_PPC_PLTREL24)
7041 plist = &h->plt.plist;
25dbc73a 7042 }
5446cbdf
AM
7043 else if (sym_type == STT_GNU_IFUNC
7044 && elf_local_got_offsets (abfd) != NULL)
c8a1f254 7045 {
5446cbdf
AM
7046 bfd_vma *local_got_offsets = elf_local_got_offsets (abfd);
7047 struct plt_entry **local_plt = (struct plt_entry **)
7048 (local_got_offsets + symtab_hdr->sh_info);
7049 plist = local_plt + ELF32_R_SYM (irel->r_info);
c8a1f254 7050 }
5446cbdf 7051 if (plist != NULL)
a9585d22 7052 {
5446cbdf
AM
7053 bfd_vma addend = 0;
7054 struct plt_entry *ent;
7055
0e1862bb 7056 if (r_type == R_PPC_PLTREL24 && bfd_link_pic (link_info))
5446cbdf
AM
7057 addend = irel->r_addend;
7058 ent = find_plt_ent (plist, got2, addend);
7059 if (ent != NULL)
a9585d22 7060 {
5446cbdf
AM
7061 if (htab->plt_type == PLT_NEW
7062 || h == NULL
7063 || !htab->elf.dynamic_sections_created
7064 || h->dynindx == -1)
7065 {
7066 tsec = htab->glink;
7067 toff = ent->glink_offset;
7068 }
7069 else
7070 {
ce558b89 7071 tsec = htab->elf.splt;
5446cbdf
AM
7072 toff = ent->plt.offset;
7073 }
de972ffa
AM
7074 }
7075 }
de972ffa 7076
5446cbdf
AM
7077 /* If the branch and target are in the same section, you have
7078 no hope of adding stubs. We'll error out later should the
7079 branch overflow. */
7080 if (tsec == isec)
7081 continue;
25dbc73a 7082
5446cbdf
AM
7083 /* There probably isn't any reason to handle symbols in
7084 SEC_MERGE sections; SEC_MERGE doesn't seem a likely
7085 attribute for a code section, and we are only looking at
7086 branches. However, implement it correctly here as a
7087 reference for other target relax_section functions. */
7088 if (0 && tsec->sec_info_type == SEC_INFO_TYPE_MERGE)
7089 {
7090 /* At this stage in linking, no SEC_MERGE symbol has been
7091 adjusted, so all references to such symbols need to be
7092 passed through _bfd_merged_section_offset. (Later, in
7093 relocate_section, all SEC_MERGE symbols *except* for
7094 section symbols have been adjusted.)
7095
7096 gas may reduce relocations against symbols in SEC_MERGE
7097 sections to a relocation against the section symbol when
7098 the original addend was zero. When the reloc is against
7099 a section symbol we should include the addend in the
7100 offset passed to _bfd_merged_section_offset, since the
7101 location of interest is the original symbol. On the
7102 other hand, an access to "sym+addend" where "sym" is not
7103 a section symbol should not include the addend; Such an
7104 access is presumed to be an offset from "sym"; The
7105 location of interest is just "sym". */
7106 if (sym_type == STT_SECTION)
7107 toff += irel->r_addend;
7108
7109 toff
7110 = _bfd_merged_section_offset (abfd, &tsec,
7111 elf_section_data (tsec)->sec_info,
7112 toff);
7113
7114 if (sym_type != STT_SECTION)
7115 toff += irel->r_addend;
7116 }
7117 /* PLTREL24 addends are special. */
7118 else if (r_type != R_PPC_PLTREL24)
25dbc73a 7119 toff += irel->r_addend;
7619e7c7 7120
5446cbdf 7121 /* Attempted -shared link of non-pic code loses. */
0e1862bb 7122 if ((!bfd_link_relocatable (link_info)
5446cbdf
AM
7123 && tsec == bfd_und_section_ptr)
7124 || tsec->output_section == NULL
7125 || (tsec->owner != NULL
7126 && (tsec->owner->flags & BFD_PLUGIN) != 0))
7127 continue;
7619e7c7 7128
5446cbdf 7129 roff = irel->r_offset;
7de713b9 7130
5446cbdf
AM
7131 /* If the branch is in range, no need to do anything. */
7132 if (tsec != bfd_und_section_ptr
0e1862bb 7133 && (!bfd_link_relocatable (link_info)
5446cbdf
AM
7134 /* A relocatable link may have sections moved during
7135 final link, so do not presume they remain in range. */
7136 || tsec->output_section == isec->output_section))
7137 {
7138 bfd_vma symaddr, reladdr;
7619e7c7 7139
5446cbdf
AM
7140 symaddr = tsec->output_section->vma + tsec->output_offset + toff;
7141 reladdr = isec->output_section->vma + isec->output_offset + roff;
7142 if (symaddr - reladdr + max_branch_offset
7143 < 2 * max_branch_offset)
7144 continue;
7145 }
01017ef8 7146
5446cbdf 7147 /* Look for an existing fixup to this address. */
d3e454b9 7148 for (f = branch_fixups; f ; f = f->next)
5446cbdf
AM
7149 if (f->tsec == tsec && f->toff == toff)
7150 break;
252b5132 7151
5446cbdf
AM
7152 if (f == NULL)
7153 {
7154 size_t size;
7155 unsigned long stub_rtype;
25dbc73a 7156
5446cbdf
AM
7157 val = trampoff - roff;
7158 if (val >= max_branch_offset)
7159 /* Oh dear, we can't reach a trampoline. Don't try to add
7160 one. We'll report an error later. */
7161 continue;
252b5132 7162
0e1862bb 7163 if (bfd_link_pic (link_info))
5446cbdf
AM
7164 {
7165 size = 4 * ARRAY_SIZE (shared_stub_entry);
7166 insn_offset = 12;
7167 }
7168 else
7169 {
7170 size = 4 * ARRAY_SIZE (stub_entry);
7171 insn_offset = 0;
7172 }
7173 stub_rtype = R_PPC_RELAX;
ce558b89 7174 if (tsec == htab->elf.splt
5446cbdf
AM
7175 || tsec == htab->glink)
7176 {
7177 stub_rtype = R_PPC_RELAX_PLT;
7178 if (r_type == R_PPC_PLTREL24)
7179 stub_rtype = R_PPC_RELAX_PLTREL24;
7180 }
252b5132 7181
5446cbdf
AM
7182 /* Hijack the old relocation. Since we need two
7183 relocations for this use a "composite" reloc. */
7184 irel->r_info = ELF32_R_INFO (ELF32_R_SYM (irel->r_info),
7185 stub_rtype);
7186 irel->r_offset = trampoff + insn_offset;
7187 if (r_type == R_PPC_PLTREL24
7188 && stub_rtype != R_PPC_RELAX_PLTREL24)
7189 irel->r_addend = 0;
7190
7191 /* Record the fixup so we don't do it again this section. */
7192 f = bfd_malloc (sizeof (*f));
d3e454b9 7193 f->next = branch_fixups;
5446cbdf
AM
7194 f->tsec = tsec;
7195 f->toff = toff;
7196 f->trampoff = trampoff;
d3e454b9 7197 branch_fixups = f;
5446cbdf
AM
7198
7199 trampoff += size;
7200 changes++;
25dbc73a
AM
7201 }
7202 else
7203 {
5446cbdf
AM
7204 val = f->trampoff - roff;
7205 if (val >= max_branch_offset)
7206 continue;
252b5132 7207
5446cbdf
AM
7208 /* Nop out the reloc, since we're finalizing things here. */
7209 irel->r_info = ELF32_R_INFO (0, R_PPC_NONE);
7210 }
252b5132 7211
5446cbdf
AM
7212 /* Get the section contents. */
7213 if (contents == NULL)
25dbc73a 7214 {
5446cbdf
AM
7215 /* Get cached copy if it exists. */
7216 if (elf_section_data (isec)->this_hdr.contents != NULL)
7217 contents = elf_section_data (isec)->this_hdr.contents;
25dbc73a 7218 /* Go get them off disk. */
5446cbdf 7219 else if (!bfd_malloc_and_get_section (abfd, isec, &contents))
25dbc73a
AM
7220 goto error_return;
7221 }
252b5132 7222
5446cbdf
AM
7223 /* Fix up the existing branch to hit the trampoline. */
7224 hit_addr = contents + roff;
7225 switch (r_type)
7226 {
7227 case R_PPC_REL24:
7228 case R_PPC_LOCAL24PC:
7229 case R_PPC_PLTREL24:
7230 t0 = bfd_get_32 (abfd, hit_addr);
7231 t0 &= ~0x3fffffc;
7232 t0 |= val & 0x3fffffc;
7233 bfd_put_32 (abfd, t0, hit_addr);
7234 break;
252b5132 7235
5446cbdf
AM
7236 case R_PPC_REL14:
7237 case R_PPC_REL14_BRTAKEN:
7238 case R_PPC_REL14_BRNTAKEN:
7239 t0 = bfd_get_32 (abfd, hit_addr);
7240 t0 &= ~0xfffc;
7241 t0 |= val & 0xfffc;
7242 bfd_put_32 (abfd, t0, hit_addr);
7243 break;
7244 }
25dbc73a 7245 }
252b5132 7246
d3e454b9 7247 while (branch_fixups != NULL)
25dbc73a 7248 {
d3e454b9
AM
7249 struct one_branch_fixup *f = branch_fixups;
7250 branch_fixups = branch_fixups->next;
25dbc73a
AM
7251 free (f);
7252 }
5446cbdf 7253 }
252b5132 7254
5446cbdf
AM
7255 workaround_change = FALSE;
7256 newsize = trampoff;
795bc6b3 7257 if (htab->params->ppc476_workaround
0e1862bb 7258 && (!bfd_link_relocatable (link_info)
795bc6b3 7259 || isec->output_section->alignment_power >= htab->params->pagesize_p2))
5446cbdf
AM
7260 {
7261 bfd_vma addr, end_addr;
7262 unsigned int crossings;
795bc6b3 7263 bfd_vma pagesize = (bfd_vma) 1 << htab->params->pagesize_p2;
5446cbdf
AM
7264
7265 addr = isec->output_section->vma + isec->output_offset;
6128f9cf 7266 end_addr = addr + trampoff;
5446cbdf 7267 addr &= -pagesize;
795bc6b3 7268 crossings = ((end_addr & -pagesize) - addr) >> htab->params->pagesize_p2;
5446cbdf
AM
7269 if (crossings != 0)
7270 {
7271 /* Keep space aligned, to ensure the patch code itself does
7272 not cross a page. Don't decrease size calculated on a
7273 previous pass as otherwise we might never settle on a layout. */
1e269e9b 7274 newsize = 15 - ((end_addr - 1) & 15);
5446cbdf
AM
7275 newsize += crossings * 16;
7276 if (relax_info->workaround_size < newsize)
7277 {
7278 relax_info->workaround_size = newsize;
7279 workaround_change = TRUE;
5446cbdf
AM
7280 }
7281 /* Ensure relocate_section is called. */
7282 isec->flags |= SEC_RELOC;
7283 }
7284 newsize = trampoff + relax_info->workaround_size;
7285 }
7286
d3e454b9
AM
7287 if (htab->params->pic_fixup > 0)
7288 {
7289 picfixup_size -= relax_info->picfixup_size;
7290 if (picfixup_size != 0)
7291 relax_info->picfixup_size += picfixup_size;
7292 newsize += relax_info->picfixup_size;
7293 }
7294
7295 if (changes != 0 || picfixup_size != 0 || workaround_change)
5446cbdf
AM
7296 isec->size = newsize;
7297
25dbc73a
AM
7298 if (isymbuf != NULL
7299 && symtab_hdr->contents != (unsigned char *) isymbuf)
252b5132 7300 {
25dbc73a
AM
7301 if (! link_info->keep_memory)
7302 free (isymbuf);
252b5132 7303 else
25dbc73a
AM
7304 {
7305 /* Cache the symbols for elf_link_input_bfd. */
7306 symtab_hdr->contents = (unsigned char *) isymbuf;
7307 }
252b5132
RH
7308 }
7309
25dbc73a
AM
7310 if (contents != NULL
7311 && elf_section_data (isec)->this_hdr.contents != contents)
7312 {
53291d1f 7313 if (!changes && !link_info->keep_memory)
25dbc73a
AM
7314 free (contents);
7315 else
7316 {
7317 /* Cache the section contents for elf_link_input_bfd. */
7318 elf_section_data (isec)->this_hdr.contents = contents;
7319 }
7320 }
252b5132 7321
d3e454b9 7322 changes += picfixup_size;
9bc4e62b 7323 if (changes != 0)
25dbc73a 7324 {
9bc4e62b
NS
7325 /* Append sufficient NOP relocs so we can write out relocation
7326 information for the trampolines. */
d4730f92 7327 Elf_Internal_Shdr *rel_hdr;
9bc4e62b
NS
7328 Elf_Internal_Rela *new_relocs = bfd_malloc ((changes + isec->reloc_count)
7329 * sizeof (*new_relocs));
7330 unsigned ix;
5b914448 7331
9bc4e62b
NS
7332 if (!new_relocs)
7333 goto error_return;
7334 memcpy (new_relocs, internal_relocs,
7335 isec->reloc_count * sizeof (*new_relocs));
7336 for (ix = changes; ix--;)
7337 {
7338 irel = new_relocs + ix + isec->reloc_count;
7339
7340 irel->r_info = ELF32_R_INFO (0, R_PPC_NONE);
7341 }
7342 if (internal_relocs != elf_section_data (isec)->relocs)
25dbc73a 7343 free (internal_relocs);
9bc4e62b
NS
7344 elf_section_data (isec)->relocs = new_relocs;
7345 isec->reloc_count += changes;
d4730f92
BS
7346 rel_hdr = _bfd_elf_single_rel_hdr (isec);
7347 rel_hdr->sh_size += changes * rel_hdr->sh_entsize;
25dbc73a 7348 }
5446cbdf
AM
7349 else if (internal_relocs != NULL
7350 && elf_section_data (isec)->relocs != internal_relocs)
9bc4e62b 7351 free (internal_relocs);
252b5132 7352
5446cbdf 7353 *again = changes != 0 || workaround_change;
b34976b6 7354 return TRUE;
25dbc73a
AM
7355
7356 error_return:
d3e454b9 7357 while (branch_fixups != NULL)
5446cbdf 7358 {
d3e454b9
AM
7359 struct one_branch_fixup *f = branch_fixups;
7360 branch_fixups = branch_fixups->next;
5446cbdf
AM
7361 free (f);
7362 }
25dbc73a
AM
7363 if (isymbuf != NULL && (unsigned char *) isymbuf != symtab_hdr->contents)
7364 free (isymbuf);
7365 if (contents != NULL
7366 && elf_section_data (isec)->this_hdr.contents != contents)
7367 free (contents);
7368 if (internal_relocs != NULL
7369 && elf_section_data (isec)->relocs != internal_relocs)
7370 free (internal_relocs);
7371 return FALSE;
252b5132 7372}
252b5132 7373\f
8a696751
AM
7374/* What to do when ld finds relocations against symbols defined in
7375 discarded sections. */
7376
7377static unsigned int
7378ppc_elf_action_discarded (asection *sec)
7379{
7380 if (strcmp (".fixup", sec->name) == 0)
7381 return 0;
7382
7383 if (strcmp (".got2", sec->name) == 0)
7384 return 0;
7385
7386 return _bfd_elf_default_action_discarded (sec);
7387}
c9a2f333 7388\f
25dbc73a 7389/* Fill in the address for a pointer generated in a linker section. */
252b5132 7390
25dbc73a 7391static bfd_vma
76750a2f 7392elf_finish_pointer_linker_section (bfd *input_bfd,
25dbc73a
AM
7393 elf_linker_section_t *lsect,
7394 struct elf_link_hash_entry *h,
7395 bfd_vma relocation,
2bb04cf2 7396 const Elf_Internal_Rela *rel)
25dbc73a
AM
7397{
7398 elf_linker_section_pointers_t *linker_section_ptr;
252b5132 7399
25dbc73a 7400 BFD_ASSERT (lsect != NULL);
252b5132 7401
25dbc73a 7402 if (h != NULL)
252b5132 7403 {
25dbc73a
AM
7404 /* Handle global symbol. */
7405 struct ppc_elf_link_hash_entry *eh;
252b5132 7406
25dbc73a 7407 eh = (struct ppc_elf_link_hash_entry *) h;
76750a2f
AM
7408 BFD_ASSERT (eh->elf.def_regular);
7409 linker_section_ptr = eh->linker_section_pointer;
25dbc73a
AM
7410 }
7411 else
7412 {
7413 /* Handle local symbol. */
7414 unsigned long r_symndx = ELF32_R_SYM (rel->r_info);
76750a2f 7415
0c8d6e5c 7416 BFD_ASSERT (is_ppc_elf (input_bfd));
25dbc73a 7417 BFD_ASSERT (elf_local_ptr_offsets (input_bfd) != NULL);
76750a2f
AM
7418 linker_section_ptr = elf_local_ptr_offsets (input_bfd)[r_symndx];
7419 }
252b5132 7420
76750a2f
AM
7421 linker_section_ptr = elf_find_pointer_linker_section (linker_section_ptr,
7422 rel->r_addend,
7423 lsect);
7424 BFD_ASSERT (linker_section_ptr != NULL);
25dbc73a 7425
76750a2f
AM
7426 /* Offset will always be a multiple of four, so use the bottom bit
7427 as a "written" flag. */
7428 if ((linker_section_ptr->offset & 1) == 0)
7429 {
7430 bfd_put_32 (lsect->section->owner,
7431 relocation + linker_section_ptr->addend,
7432 lsect->section->contents + linker_section_ptr->offset);
7433 linker_section_ptr->offset += 1;
252b5132
RH
7434 }
7435
bd6c6e2b
AM
7436 relocation = (lsect->section->output_section->vma
7437 + lsect->section->output_offset
76750a2f 7438 + linker_section_ptr->offset - 1
bd6c6e2b 7439 - SYM_VAL (lsect->sym));
252b5132 7440
25dbc73a
AM
7441#ifdef DEBUG
7442 fprintf (stderr,
7443 "Finish pointer in linker section %s, offset = %ld (0x%lx)\n",
7444 lsect->name, (long) relocation, (long) relocation);
7445#endif
252b5132 7446
bd6c6e2b 7447 return relocation;
252b5132 7448}
25dbc73a 7449
e054468f
AM
7450#define PPC_LO(v) ((v) & 0xffff)
7451#define PPC_HI(v) (((v) >> 16) & 0xffff)
7452#define PPC_HA(v) PPC_HI ((v) + 0x8000)
7453
7454static void
9e390558
AM
7455write_glink_stub (struct elf_link_hash_entry *h, struct plt_entry *ent,
7456 asection *plt_sec, unsigned char *p,
e054468f
AM
7457 struct bfd_link_info *info)
7458{
7459 struct ppc_elf_link_hash_table *htab = ppc_elf_hash_table (info);
7460 bfd *output_bfd = info->output_bfd;
7461 bfd_vma plt;
9e390558
AM
7462 unsigned char *end = p + GLINK_ENTRY_SIZE (htab, h);
7463
7464 if (h != NULL
7465 && h == htab->tls_get_addr
7466 && !htab->params->no_tls_get_addr_opt)
7467 {
7468 bfd_put_32 (output_bfd, LWZ_11_3, p);
7469 p += 4;
7470 bfd_put_32 (output_bfd, LWZ_12_3 + 4, p);
7471 p += 4;
7472 bfd_put_32 (output_bfd, MR_0_3, p);
7473 p += 4;
7474 bfd_put_32 (output_bfd, CMPWI_11_0, p);
7475 p += 4;
7476 bfd_put_32 (output_bfd, ADD_3_12_2, p);
7477 p += 4;
7478 bfd_put_32 (output_bfd, BEQLR, p);
7479 p += 4;
7480 bfd_put_32 (output_bfd, MR_3_0, p);
7481 p += 4;
7482 bfd_put_32 (output_bfd, NOP, p);
7483 p += 4;
7484 }
e054468f
AM
7485
7486 plt = ((ent->plt.offset & ~1)
7487 + plt_sec->output_section->vma
7488 + plt_sec->output_offset);
e054468f 7489
0e1862bb 7490 if (bfd_link_pic (info))
e054468f
AM
7491 {
7492 bfd_vma got = 0;
7493
7494 if (ent->addend >= 32768)
7495 got = (ent->addend
7496 + ent->sec->output_section->vma
7497 + ent->sec->output_offset);
7498 else if (htab->elf.hgot != NULL)
7499 got = SYM_VAL (htab->elf.hgot);
7500
7501 plt -= got;
7502
7503 if (plt + 0x8000 < 0x10000)
9e390558 7504 bfd_put_32 (output_bfd, LWZ_11_30 + PPC_LO (plt), p);
e054468f
AM
7505 else
7506 {
7507 bfd_put_32 (output_bfd, ADDIS_11_30 + PPC_HA (plt), p);
7508 p += 4;
7509 bfd_put_32 (output_bfd, LWZ_11_11 + PPC_LO (plt), p);
e054468f
AM
7510 }
7511 }
7512 else
7513 {
7514 bfd_put_32 (output_bfd, LIS_11 + PPC_HA (plt), p);
7515 p += 4;
7516 bfd_put_32 (output_bfd, LWZ_11_11 + PPC_LO (plt), p);
9e390558
AM
7517 }
7518 p += 4;
7519 bfd_put_32 (output_bfd, MTCTR_11, p);
7520 p += 4;
407aa07c
AM
7521 bfd_put_32 (output_bfd, BCTR, p);
7522 p += 4;
9e390558
AM
7523 while (p < end)
7524 {
7525 bfd_put_32 (output_bfd, htab->params->ppc476_workaround ? BA : NOP, p);
e054468f
AM
7526 p += 4;
7527 }
7528}
7529
bd6c6e2b
AM
7530/* Return true if symbol is defined statically. */
7531
7532static bfd_boolean
7533is_static_defined (struct elf_link_hash_entry *h)
7534{
7535 return ((h->root.type == bfd_link_hash_defined
7536 || h->root.type == bfd_link_hash_defweak)
7537 && h->root.u.def.section != NULL
7538 && h->root.u.def.section->output_section != NULL);
7539}
7540
2d0f3896
AM
7541/* If INSN is an opcode that may be used with an @tls operand, return
7542 the transformed insn for TLS optimisation, otherwise return 0. If
7543 REG is non-zero only match an insn with RB or RA equal to REG. */
7544
7545unsigned int
7546_bfd_elf_ppc_at_tls_transform (unsigned int insn, unsigned int reg)
7547{
7548 unsigned int rtra;
7549
7550 if ((insn & (0x3f << 26)) != 31 << 26)
7551 return 0;
7552
7553 if (reg == 0 || ((insn >> 11) & 0x1f) == reg)
7554 rtra = insn & ((1 << 26) - (1 << 16));
7555 else if (((insn >> 16) & 0x1f) == reg)
7556 rtra = (insn & (0x1f << 21)) | ((insn & (0x1f << 11)) << 5);
7557 else
7558 return 0;
7559
7560 if ((insn & (0x3ff << 1)) == 266 << 1)
7561 /* add -> addi. */
7562 insn = 14 << 26;
7563 else if ((insn & (0x1f << 1)) == 23 << 1
7564 && ((insn & (0x1f << 6)) < 14 << 6
7565 || ((insn & (0x1f << 6)) >= 16 << 6
7566 && (insn & (0x1f << 6)) < 24 << 6)))
7567 /* load and store indexed -> dform. */
7568 insn = (32 | ((insn >> 6) & 0x1f)) << 26;
7569 else if ((insn & (((0x1a << 5) | 0x1f) << 1)) == 21 << 1)
7570 /* ldx, ldux, stdx, stdux -> ld, ldu, std, stdu. */
7571 insn = ((58 | ((insn >> 6) & 4)) << 26) | ((insn >> 6) & 1);
7572 else if ((insn & (((0x1f << 5) | 0x1f) << 1)) == 341 << 1)
7573 /* lwax -> lwa. */
7574 insn = (58 << 26) | 2;
7575 else
7576 return 0;
7577 insn |= rtra;
7578 return insn;
7579}
7580
766bc656
AM
7581/* If INSN is an opcode that may be used with an @tprel operand, return
7582 the transformed insn for an undefined weak symbol, ie. with the
7583 thread pointer REG operand removed. Otherwise return 0. */
7584
7585unsigned int
7586_bfd_elf_ppc_at_tprel_transform (unsigned int insn, unsigned int reg)
7587{
7588 if ((insn & (0x1f << 16)) == reg << 16
7589 && ((insn & (0x3f << 26)) == 14u << 26 /* addi */
7590 || (insn & (0x3f << 26)) == 15u << 26 /* addis */
7591 || (insn & (0x3f << 26)) == 32u << 26 /* lwz */
7592 || (insn & (0x3f << 26)) == 34u << 26 /* lbz */
7593 || (insn & (0x3f << 26)) == 36u << 26 /* stw */
7594 || (insn & (0x3f << 26)) == 38u << 26 /* stb */
7595 || (insn & (0x3f << 26)) == 40u << 26 /* lhz */
7596 || (insn & (0x3f << 26)) == 42u << 26 /* lha */
7597 || (insn & (0x3f << 26)) == 44u << 26 /* sth */
7598 || (insn & (0x3f << 26)) == 46u << 26 /* lmw */
7599 || (insn & (0x3f << 26)) == 47u << 26 /* stmw */
7600 || (insn & (0x3f << 26)) == 48u << 26 /* lfs */
7601 || (insn & (0x3f << 26)) == 50u << 26 /* lfd */
7602 || (insn & (0x3f << 26)) == 52u << 26 /* stfs */
7603 || (insn & (0x3f << 26)) == 54u << 26 /* stfd */
7604 || ((insn & (0x3f << 26)) == 58u << 26 /* lwa,ld,lmd */
7605 && (insn & 3) != 1)
7606 || ((insn & (0x3f << 26)) == 62u << 26 /* std, stmd */
7607 && ((insn & 3) == 0 || (insn & 3) == 3))))
7608 {
7609 insn &= ~(0x1f << 16);
7610 }
7611 else if ((insn & (0x1f << 21)) == reg << 21
7612 && ((insn & (0x3e << 26)) == 24u << 26 /* ori, oris */
7613 || (insn & (0x3e << 26)) == 26u << 26 /* xori,xoris */
7614 || (insn & (0x3e << 26)) == 28u << 26 /* andi,andis */))
7615 {
7616 insn &= ~(0x1f << 21);
7617 insn |= (insn & (0x1f << 16)) << 5;
7618 if ((insn & (0x3e << 26)) == 26 << 26 /* xori,xoris */)
7619 insn -= 2 >> 26; /* convert to ori,oris */
7620 }
7621 else
7622 insn = 0;
7623 return insn;
7624}
7625
1fe532cf
AM
7626static bfd_boolean
7627is_insn_ds_form (unsigned int insn)
7628{
7629 return ((insn & (0x3f << 26)) == 58u << 26 /* ld,ldu,lwa */
7630 || (insn & (0x3f << 26)) == 62u << 26 /* std,stdu,stq */
7631 || (insn & (0x3f << 26)) == 57u << 26 /* lfdp */
7632 || (insn & (0x3f << 26)) == 61u << 26 /* stfdp */);
7633}
7634
7635static bfd_boolean
7636is_insn_dq_form (unsigned int insn)
7637{
a680de9a
PB
7638 return ((insn & (0x3f << 26)) == 56u << 26 /* lq */
7639 || ((insn & (0x3f << 26)) == (61u << 26) /* lxv, stxv */
7640 && (insn & 3) == 1));
1fe532cf
AM
7641}
7642
252b5132
RH
7643/* The RELOCATE_SECTION function is called by the ELF backend linker
7644 to handle the relocations for a section.
7645
7646 The relocs are always passed as Rela structures; if the section
7647 actually uses Rel structures, the r_addend field will always be
7648 zero.
7649
7650 This function is responsible for adjust the section contents as
7651 necessary, and (if using Rela relocs and generating a
1049f94e 7652 relocatable output file) adjusting the reloc addend as
252b5132
RH
7653 necessary.
7654
7655 This function does not have to worry about setting the reloc
7656 address or the reloc symbol index.
7657
7658 LOCAL_SYMS is a pointer to the swapped in local symbols.
7659
7660 LOCAL_SECTIONS is an array giving the section in the input file
7661 corresponding to the st_shndx field of each local symbol.
7662
7663 The global hash table entry for the global symbols can be found
7664 via elf_sym_hashes (input_bfd).
7665
1049f94e 7666 When generating relocatable output, this function must handle
252b5132
RH
7667 STB_LOCAL/STT_SECTION symbols specially. The output symbol is
7668 going to be the section symbol corresponding to the output
7669 section, which means that the addend must be adjusted
7670 accordingly. */
7671
b34976b6 7672static bfd_boolean
55fd94b0
AM
7673ppc_elf_relocate_section (bfd *output_bfd,
7674 struct bfd_link_info *info,
7675 bfd *input_bfd,
7676 asection *input_section,
7677 bfd_byte *contents,
7678 Elf_Internal_Rela *relocs,
7679 Elf_Internal_Sym *local_syms,
7680 asection **local_sections)
252b5132 7681{
7619e7c7
AM
7682 Elf_Internal_Shdr *symtab_hdr;
7683 struct elf_link_hash_entry **sym_hashes;
7684 struct ppc_elf_link_hash_table *htab;
7685 Elf_Internal_Rela *rel;
c316a17c 7686 Elf_Internal_Rela *wrel;
7619e7c7
AM
7687 Elf_Internal_Rela *relend;
7688 Elf_Internal_Rela outrel;
f95f8542 7689 asection *got2;
252b5132 7690 bfd_vma *local_got_offsets;
b34976b6 7691 bfd_boolean ret = TRUE;
95f0d0d2 7692 bfd_vma d_offset = (bfd_big_endian (input_bfd) ? 2 : 0);
3348747a 7693 bfd_boolean is_vxworks_tls;
d3e454b9
AM
7694 unsigned int picfixup_size = 0;
7695 struct ppc_elf_relax_info *relax_info = NULL;
b34976b6 7696
252b5132 7697#ifdef DEBUG
871b3ab2 7698 _bfd_error_handler ("ppc_elf_relocate_section called for %pB section %pA, "
d003868e
AM
7699 "%ld relocations%s",
7700 input_bfd, input_section,
7701 (long) input_section->reloc_count,
0e1862bb 7702 (bfd_link_relocatable (info)) ? " (relocatable)" : "");
252b5132
RH
7703#endif
7704
a6aa5195
AM
7705 got2 = bfd_get_section_by_name (input_bfd, ".got2");
7706
e47cd125 7707 /* Initialize howto table if not already done. */
8da6118f 7708 if (!ppc_elf_howto_table[R_PPC_ADDR32])
252b5132
RH
7709 ppc_elf_howto_init ();
7710
7619e7c7 7711 htab = ppc_elf_hash_table (info);
252b5132 7712 local_got_offsets = elf_local_got_offsets (input_bfd);
0ffa91dd 7713 symtab_hdr = &elf_symtab_hdr (input_bfd);
7619e7c7 7714 sym_hashes = elf_sym_hashes (input_bfd);
3348747a
NS
7715 /* We have to handle relocations in vxworks .tls_vars sections
7716 specially, because the dynamic loader is 'weird'. */
0e1862bb 7717 is_vxworks_tls = (htab->is_vxworks && bfd_link_pic (info)
3348747a
NS
7718 && !strcmp (input_section->output_section->name,
7719 ".tls_vars"));
d3e454b9
AM
7720 if (input_section->sec_info_type == SEC_INFO_TYPE_TARGET)
7721 relax_info = elf_section_data (input_section)->sec_info;
c316a17c 7722 rel = wrel = relocs;
7619e7c7 7723 relend = relocs + input_section->reloc_count;
c316a17c 7724 for (; rel < relend; wrel++, rel++)
252b5132 7725 {
7619e7c7
AM
7726 enum elf_ppc_reloc_type r_type;
7727 bfd_vma addend;
7728 bfd_reloc_status_type r;
7729 Elf_Internal_Sym *sym;
7730 asection *sec;
7731 struct elf_link_hash_entry *h;
7732 const char *sym_name;
252b5132
RH
7733 reloc_howto_type *howto;
7734 unsigned long r_symndx;
7735 bfd_vma relocation;
91d6fa6a 7736 bfd_vma branch_bit, from;
7619e7c7
AM
7737 bfd_boolean unresolved_reloc;
7738 bfd_boolean warned;
7739 unsigned int tls_type, tls_mask, tls_gd;
e054468f 7740 struct plt_entry **ifunc;
86c95733 7741 struct reloc_howto_struct alt_howto;
7619e7c7 7742
c316a17c 7743 again:
55fd94b0
AM
7744 r_type = ELF32_R_TYPE (rel->r_info);
7745 sym = NULL;
7746 sec = NULL;
7747 h = NULL;
7619e7c7
AM
7748 unresolved_reloc = FALSE;
7749 warned = FALSE;
252b5132 7750 r_symndx = ELF32_R_SYM (rel->r_info);
560e09e9 7751
252b5132
RH
7752 if (r_symndx < symtab_hdr->sh_info)
7753 {
7754 sym = local_syms + r_symndx;
7755 sec = local_sections[r_symndx];
26c61ae5 7756 sym_name = bfd_elf_sym_name (input_bfd, symtab_hdr, sym, sec);
252b5132 7757
8517fae7 7758 relocation = _bfd_elf_rela_local_sym (output_bfd, sym, &sec, rel);
252b5132
RH
7759 }
7760 else
7761 {
62d887d4
L
7762 bfd_boolean ignored;
7763
b2a8e766
AM
7764 RELOC_FOR_GLOBAL_SYMBOL (info, input_bfd, input_section, rel,
7765 r_symndx, symtab_hdr, sym_hashes,
7766 h, sec, relocation,
62d887d4 7767 unresolved_reloc, warned, ignored);
9abc968f 7768
252b5132 7769 sym_name = h->root.root.string;
7619e7c7
AM
7770 }
7771
dbaa2011 7772 if (sec != NULL && discarded_section (sec))
ab96bf03
AM
7773 {
7774 /* For relocs against symbols from removed linkonce sections,
7775 or sections discarded by a linker script, we just want the
7776 section contents zeroed. Avoid any special processing. */
7777 howto = NULL;
7778 if (r_type < R_PPC_max)
7779 howto = ppc_elf_howto_table[r_type];
c316a17c
AM
7780
7781 _bfd_clear_contents (howto, input_bfd, input_section,
7782 contents + rel->r_offset);
7783 wrel->r_offset = rel->r_offset;
7784 wrel->r_info = 0;
7785 wrel->r_addend = 0;
7786
7787 /* For ld -r, remove relocations in debug sections against
dcd2b8a0 7788 symbols defined in discarded sections. Not done for
c316a17c
AM
7789 non-debug to preserve relocs in .eh_frame which the
7790 eh_frame editing code expects to be present. */
7791 if (bfd_link_relocatable (info)
7792 && (input_section->flags & SEC_DEBUGGING))
7793 wrel--;
7794
7795 continue;
ab96bf03
AM
7796 }
7797
0e1862bb 7798 if (bfd_link_relocatable (info))
ab96bf03
AM
7799 {
7800 if (got2 != NULL
7801 && r_type == R_PPC_PLTREL24
f75e0e33 7802 && rel->r_addend != 0)
ab96bf03
AM
7803 {
7804 /* R_PPC_PLTREL24 is rather special. If non-zero, the
7805 addend specifies the GOT pointer offset within .got2. */
7806 rel->r_addend += got2->output_offset;
7807 }
53291d1f
AM
7808 if (r_type != R_PPC_RELAX_PLT
7809 && r_type != R_PPC_RELAX_PLTREL24
7810 && r_type != R_PPC_RELAX)
c316a17c 7811 goto copy_reloc;
ab96bf03
AM
7812 }
7813
7619e7c7
AM
7814 /* TLS optimizations. Replace instruction sequences and relocs
7815 based on information we collected in tls_optimize. We edit
7816 RELOCS so that --emit-relocs will output something sensible
7817 for the final instruction stream. */
7818 tls_mask = 0;
7819 tls_gd = 0;
727fc41e
AM
7820 if (h != NULL)
7821 tls_mask = ((struct ppc_elf_link_hash_entry *) h)->tls_mask;
7822 else if (local_got_offsets != NULL)
7619e7c7 7823 {
e054468f 7824 struct plt_entry **local_plt;
727fc41e 7825 char *lgot_masks;
e054468f
AM
7826 local_plt
7827 = (struct plt_entry **) (local_got_offsets + symtab_hdr->sh_info);
7828 lgot_masks = (char *) (local_plt + symtab_hdr->sh_info);
727fc41e 7829 tls_mask = lgot_masks[r_symndx];
7619e7c7
AM
7830 }
7831
7832 /* Ensure reloc mapping code below stays sane. */
7833 if ((R_PPC_GOT_TLSLD16 & 3) != (R_PPC_GOT_TLSGD16 & 3)
7834 || (R_PPC_GOT_TLSLD16_LO & 3) != (R_PPC_GOT_TLSGD16_LO & 3)
7835 || (R_PPC_GOT_TLSLD16_HI & 3) != (R_PPC_GOT_TLSGD16_HI & 3)
7836 || (R_PPC_GOT_TLSLD16_HA & 3) != (R_PPC_GOT_TLSGD16_HA & 3)
7837 || (R_PPC_GOT_TLSLD16 & 3) != (R_PPC_GOT_TPREL16 & 3)
7838 || (R_PPC_GOT_TLSLD16_LO & 3) != (R_PPC_GOT_TPREL16_LO & 3)
7839 || (R_PPC_GOT_TLSLD16_HI & 3) != (R_PPC_GOT_TPREL16_HI & 3)
7840 || (R_PPC_GOT_TLSLD16_HA & 3) != (R_PPC_GOT_TPREL16_HA & 3))
7841 abort ();
7842 switch (r_type)
7843 {
7844 default:
7845 break;
7846
7847 case R_PPC_GOT_TPREL16:
7848 case R_PPC_GOT_TPREL16_LO:
e054468f 7849 if ((tls_mask & TLS_TLS) != 0
7619e7c7
AM
7850 && (tls_mask & TLS_TPREL) == 0)
7851 {
7852 bfd_vma insn;
91d6fa6a 7853
95f0d0d2 7854 insn = bfd_get_32 (input_bfd,
c316a17c 7855 contents + rel->r_offset - d_offset);
7619e7c7
AM
7856 insn &= 31 << 21;
7857 insn |= 0x3c020000; /* addis 0,2,0 */
95f0d0d2 7858 bfd_put_32 (input_bfd, insn,
c316a17c 7859 contents + rel->r_offset - d_offset);
7619e7c7
AM
7860 r_type = R_PPC_TPREL16_HA;
7861 rel->r_info = ELF32_R_INFO (r_symndx, r_type);
7862 }
7863 break;
7864
7865 case R_PPC_TLS:
e054468f 7866 if ((tls_mask & TLS_TLS) != 0
7619e7c7
AM
7867 && (tls_mask & TLS_TPREL) == 0)
7868 {
2d0f3896
AM
7869 bfd_vma insn;
7870
95f0d0d2 7871 insn = bfd_get_32 (input_bfd, contents + rel->r_offset);
2d0f3896
AM
7872 insn = _bfd_elf_ppc_at_tls_transform (insn, 2);
7873 if (insn == 0)
7619e7c7 7874 abort ();
95f0d0d2 7875 bfd_put_32 (input_bfd, insn, contents + rel->r_offset);
7619e7c7
AM
7876 r_type = R_PPC_TPREL16_LO;
7877 rel->r_info = ELF32_R_INFO (r_symndx, r_type);
4fe5ca5b 7878
7619e7c7 7879 /* Was PPC_TLS which sits on insn boundary, now
4fe5ca5b
GM
7880 PPC_TPREL16_LO which is at low-order half-word. */
7881 rel->r_offset += d_offset;
7619e7c7
AM
7882 }
7883 break;
7884
7885 case R_PPC_GOT_TLSGD16_HI:
7886 case R_PPC_GOT_TLSGD16_HA:
7887 tls_gd = TLS_TPRELGD;
e054468f 7888 if ((tls_mask & TLS_TLS) != 0 && (tls_mask & TLS_GD) == 0)
7619e7c7
AM
7889 goto tls_gdld_hi;
7890 break;
7891
7892 case R_PPC_GOT_TLSLD16_HI:
7893 case R_PPC_GOT_TLSLD16_HA:
e054468f 7894 if ((tls_mask & TLS_TLS) != 0 && (tls_mask & TLS_LD) == 0)
7619e7c7
AM
7895 {
7896 tls_gdld_hi:
7897 if ((tls_mask & tls_gd) != 0)
7898 r_type = (((r_type - (R_PPC_GOT_TLSGD16 & 3)) & 3)
7899 + R_PPC_GOT_TPREL16);
7900 else
7901 {
4fe5ca5b 7902 rel->r_offset -= d_offset;
95f0d0d2 7903 bfd_put_32 (input_bfd, NOP, contents + rel->r_offset);
7619e7c7
AM
7904 r_type = R_PPC_NONE;
7905 }
7906 rel->r_info = ELF32_R_INFO (r_symndx, r_type);
7907 }
7908 break;
7909
7910 case R_PPC_GOT_TLSGD16:
7911 case R_PPC_GOT_TLSGD16_LO:
7912 tls_gd = TLS_TPRELGD;
e054468f 7913 if ((tls_mask & TLS_TLS) != 0 && (tls_mask & TLS_GD) == 0)
b7fcf6f6 7914 goto tls_ldgd_opt;
7619e7c7
AM
7915 break;
7916
7917 case R_PPC_GOT_TLSLD16:
7918 case R_PPC_GOT_TLSLD16_LO:
e054468f 7919 if ((tls_mask & TLS_TLS) != 0 && (tls_mask & TLS_LD) == 0)
7619e7c7 7920 {
3a71aa26 7921 unsigned int insn1, insn2;
b7fcf6f6 7922 bfd_vma offset;
7619e7c7 7923
b7fcf6f6 7924 tls_ldgd_opt:
727fc41e
AM
7925 offset = (bfd_vma) -1;
7926 /* If not using the newer R_PPC_TLSGD/LD to mark
7927 __tls_get_addr calls, we must trust that the call
7928 stays with its arg setup insns, ie. that the next
7929 reloc is the __tls_get_addr call associated with
7930 the current reloc. Edit both insns. */
7931 if (input_section->has_tls_get_addr_call
7932 && rel + 1 < relend
7933 && branch_reloc_hash_match (input_bfd, rel + 1,
7934 htab->tls_get_addr))
7935 offset = rel[1].r_offset;
b86ac8e3
AM
7936 /* We read the low GOT_TLS insn because we need to keep
7937 the destination reg. It may be something other than
7938 the usual r3, and moved to r3 before the call by
7939 intervening code. */
95f0d0d2 7940 insn1 = bfd_get_32 (input_bfd,
b86ac8e3 7941 contents + rel->r_offset - d_offset);
b7fcf6f6
AM
7942 if ((tls_mask & tls_gd) != 0)
7943 {
7944 /* IE */
b86ac8e3 7945 insn1 &= (0x1f << 21) | (0x1f << 16);
b7fcf6f6 7946 insn1 |= 32 << 26; /* lwz */
727fc41e
AM
7947 if (offset != (bfd_vma) -1)
7948 {
f58d5a2d 7949 rel[1].r_info = ELF32_R_INFO (STN_UNDEF, R_PPC_NONE);
727fc41e 7950 insn2 = 0x7c631214; /* add 3,3,2 */
95f0d0d2 7951 bfd_put_32 (input_bfd, insn2, contents + offset);
727fc41e 7952 }
b7fcf6f6
AM
7953 r_type = (((r_type - (R_PPC_GOT_TLSGD16 & 3)) & 3)
7954 + R_PPC_GOT_TPREL16);
7955 rel->r_info = ELF32_R_INFO (r_symndx, r_type);
7956 }
7957 else
7958 {
7959 /* LE */
b86ac8e3
AM
7960 insn1 &= 0x1f << 21;
7961 insn1 |= 0x3c020000; /* addis r,2,0 */
7619e7c7
AM
7962 if (tls_gd == 0)
7963 {
b7fcf6f6 7964 /* Was an LD reloc. */
1d483afe
AM
7965 for (r_symndx = 0;
7966 r_symndx < symtab_hdr->sh_info;
7967 r_symndx++)
7968 if (local_sections[r_symndx] == sec)
7969 break;
7970 if (r_symndx >= symtab_hdr->sh_info)
cf35638d 7971 r_symndx = STN_UNDEF;
b7fcf6f6 7972 rel->r_addend = htab->elf.tls_sec->vma + DTP_OFFSET;
cf35638d 7973 if (r_symndx != STN_UNDEF)
1d483afe
AM
7974 rel->r_addend -= (local_syms[r_symndx].st_value
7975 + sec->output_offset
7976 + sec->output_section->vma);
7619e7c7 7977 }
b7fcf6f6
AM
7978 r_type = R_PPC_TPREL16_HA;
7979 rel->r_info = ELF32_R_INFO (r_symndx, r_type);
727fc41e
AM
7980 if (offset != (bfd_vma) -1)
7981 {
7982 rel[1].r_info = ELF32_R_INFO (r_symndx, R_PPC_TPREL16_LO);
7983 rel[1].r_offset = offset + d_offset;
7984 rel[1].r_addend = rel->r_addend;
7985 insn2 = 0x38630000; /* addi 3,3,0 */
95f0d0d2 7986 bfd_put_32 (input_bfd, insn2, contents + offset);
727fc41e 7987 }
b7fcf6f6 7988 }
95f0d0d2 7989 bfd_put_32 (input_bfd, insn1,
b7fcf6f6 7990 contents + rel->r_offset - d_offset);
b7fcf6f6
AM
7991 if (tls_gd == 0)
7992 {
7993 /* We changed the symbol on an LD reloc. Start over
7994 in order to get h, sym, sec etc. right. */
c316a17c 7995 goto again;
7619e7c7 7996 }
252b5132 7997 }
7619e7c7 7998 break;
727fc41e
AM
7999
8000 case R_PPC_TLSGD:
e054468f 8001 if ((tls_mask & TLS_TLS) != 0 && (tls_mask & TLS_GD) == 0)
727fc41e
AM
8002 {
8003 unsigned int insn2;
8004 bfd_vma offset = rel->r_offset;
8005
8006 if ((tls_mask & TLS_TPRELGD) != 0)
8007 {
8008 /* IE */
8009 r_type = R_PPC_NONE;
8010 insn2 = 0x7c631214; /* add 3,3,2 */
8011 }
8012 else
8013 {
8014 /* LE */
8015 r_type = R_PPC_TPREL16_LO;
8016 rel->r_offset += d_offset;
8017 insn2 = 0x38630000; /* addi 3,3,0 */
8018 }
8019 rel->r_info = ELF32_R_INFO (r_symndx, r_type);
95f0d0d2 8020 bfd_put_32 (input_bfd, insn2, contents + offset);
727fc41e
AM
8021 /* Zap the reloc on the _tls_get_addr call too. */
8022 BFD_ASSERT (offset == rel[1].r_offset);
f58d5a2d 8023 rel[1].r_info = ELF32_R_INFO (STN_UNDEF, R_PPC_NONE);
727fc41e
AM
8024 }
8025 break;
8026
8027 case R_PPC_TLSLD:
e054468f 8028 if ((tls_mask & TLS_TLS) != 0 && (tls_mask & TLS_LD) == 0)
727fc41e
AM
8029 {
8030 unsigned int insn2;
8031
8032 for (r_symndx = 0;
8033 r_symndx < symtab_hdr->sh_info;
8034 r_symndx++)
8035 if (local_sections[r_symndx] == sec)
8036 break;
8037 if (r_symndx >= symtab_hdr->sh_info)
cf35638d 8038 r_symndx = STN_UNDEF;
727fc41e 8039 rel->r_addend = htab->elf.tls_sec->vma + DTP_OFFSET;
cf35638d 8040 if (r_symndx != STN_UNDEF)
727fc41e
AM
8041 rel->r_addend -= (local_syms[r_symndx].st_value
8042 + sec->output_offset
8043 + sec->output_section->vma);
8044
8045 rel->r_info = ELF32_R_INFO (r_symndx, R_PPC_TPREL16_LO);
8046 rel->r_offset += d_offset;
8047 insn2 = 0x38630000; /* addi 3,3,0 */
95f0d0d2 8048 bfd_put_32 (input_bfd, insn2,
727fc41e
AM
8049 contents + rel->r_offset - d_offset);
8050 /* Zap the reloc on the _tls_get_addr call too. */
8051 BFD_ASSERT (rel->r_offset - d_offset == rel[1].r_offset);
f58d5a2d 8052 rel[1].r_info = ELF32_R_INFO (STN_UNDEF, R_PPC_NONE);
c316a17c 8053 goto again;
727fc41e
AM
8054 }
8055 break;
7619e7c7
AM
8056 }
8057
8058 /* Handle other relocations that tweak non-addend part of insn. */
8059 branch_bit = 0;
8060 switch (r_type)
8061 {
8062 default:
8063 break;
8064
8065 /* Branch taken prediction relocations. */
8066 case R_PPC_ADDR14_BRTAKEN:
8067 case R_PPC_REL14_BRTAKEN:
8068 branch_bit = BRANCH_PREDICT_BIT;
1a0670f3 8069 /* Fall through. */
7619e7c7 8070
4cc11e76 8071 /* Branch not taken prediction relocations. */
7619e7c7
AM
8072 case R_PPC_ADDR14_BRNTAKEN:
8073 case R_PPC_REL14_BRNTAKEN:
91d6fa6a
NC
8074 {
8075 bfd_vma insn;
7619e7c7 8076
95f0d0d2 8077 insn = bfd_get_32 (input_bfd, contents + rel->r_offset);
91d6fa6a
NC
8078 insn &= ~BRANCH_PREDICT_BIT;
8079 insn |= branch_bit;
7619e7c7 8080
91d6fa6a
NC
8081 from = (rel->r_offset
8082 + input_section->output_offset
8083 + input_section->output_section->vma);
7619e7c7 8084
91d6fa6a
NC
8085 /* Invert 'y' bit if not the default. */
8086 if ((bfd_signed_vma) (relocation + rel->r_addend - from) < 0)
8087 insn ^= BRANCH_PREDICT_BIT;
8088
95f0d0d2 8089 bfd_put_32 (input_bfd, insn, contents + rel->r_offset);
91d6fa6a
NC
8090 break;
8091 }
252b5132
RH
8092 }
8093
d3e454b9
AM
8094 if (ELIMINATE_COPY_RELOCS
8095 && h != NULL
8096 && !h->def_regular
8097 && h->protected_def
8098 && ppc_elf_hash_entry (h)->has_addr16_ha
8099 && ppc_elf_hash_entry (h)->has_addr16_lo
8100 && htab->params->pic_fixup > 0)
8101 {
8102 /* Convert lis;addi or lis;load/store accessing a protected
8103 variable defined in a shared library to PIC. */
8104 unsigned int insn;
8105
8106 if (r_type == R_PPC_ADDR16_HA)
8107 {
95f0d0d2 8108 insn = bfd_get_32 (input_bfd,
d3e454b9
AM
8109 contents + rel->r_offset - d_offset);
8110 if ((insn & (0x3f << 26)) == (15u << 26)
8111 && (insn & (0x1f << 16)) == 0 /* lis */)
8112 {
8113 bfd_byte *p;
8114 bfd_vma off;
8115 bfd_vma got_addr;
8116
8117 p = (contents + input_section->size
8118 - relax_info->workaround_size
8119 - relax_info->picfixup_size
8120 + picfixup_size);
8121 off = (p - contents) - (rel->r_offset - d_offset);
8122 if (off > 0x1fffffc || (off & 3) != 0)
8123 info->callbacks->einfo
174d0a74 8124 (_("%H: fixup branch overflow\n"),
d3e454b9
AM
8125 input_bfd, input_section, rel->r_offset);
8126
95f0d0d2 8127 bfd_put_32 (input_bfd, B | off,
d3e454b9 8128 contents + rel->r_offset - d_offset);
ce558b89
AM
8129 got_addr = (htab->elf.sgot->output_section->vma
8130 + htab->elf.sgot->output_offset
d3e454b9 8131 + (h->got.offset & ~1));
c316a17c
AM
8132 wrel->r_offset = (p - contents) + d_offset;
8133 wrel->r_info = ELF32_R_INFO (0, R_PPC_ADDR16_HA);
8134 wrel->r_addend = got_addr;
d3e454b9 8135 insn &= ~0xffff;
4aef7643 8136 insn |= ((unsigned int) (got_addr + 0x8000) >> 16) & 0xffff;
95f0d0d2 8137 bfd_put_32 (input_bfd, insn, p);
d3e454b9
AM
8138
8139 /* Convert lis to lwz, loading address from GOT. */
8140 insn &= ~0xffff;
8141 insn ^= (32u ^ 15u) << 26;
8142 insn |= (insn & (0x1f << 21)) >> 5;
8143 insn |= got_addr & 0xffff;
95f0d0d2 8144 bfd_put_32 (input_bfd, insn, p + 4);
d3e454b9 8145
95f0d0d2 8146 bfd_put_32 (input_bfd, B | ((-4 - off) & 0x3ffffff), p + 8);
d3e454b9
AM
8147 picfixup_size += 12;
8148
8149 /* Use one of the spare relocs, so --emit-relocs
8150 output is reasonable. */
8151 memmove (rel + 1, rel, (relend - rel - 1) * sizeof (*rel));
c316a17c
AM
8152 wrel++, rel++;
8153 rel->r_offset = wrel[-1].r_offset + 4;
d3e454b9 8154 rel->r_info = ELF32_R_INFO (0, R_PPC_ADDR16_LO);
c316a17c 8155 rel->r_addend = wrel[-1].r_addend;
d3e454b9
AM
8156
8157 /* Continue on as if we had a got reloc, to output
8158 dynamic reloc. */
8159 r_type = R_PPC_GOT16_LO;
8160 }
8161 else
2c4d9cbe 8162 _bfd_error_handler
695344c0 8163 /* xgettext:c-format */
871b3ab2 8164 (_("%pB(%pA+%#Lx): error: %s with unexpected instruction %#x"),
d3e454b9
AM
8165 input_bfd, input_section, rel->r_offset,
8166 "R_PPC_ADDR16_HA", insn);
8167 }
8168 else if (r_type == R_PPC_ADDR16_LO)
8169 {
95f0d0d2 8170 insn = bfd_get_32 (input_bfd,
d3e454b9
AM
8171 contents + rel->r_offset - d_offset);
8172 if ((insn & (0x3f << 26)) == 14u << 26 /* addi */
8173 || (insn & (0x3f << 26)) == 32u << 26 /* lwz */
8174 || (insn & (0x3f << 26)) == 34u << 26 /* lbz */
8175 || (insn & (0x3f << 26)) == 36u << 26 /* stw */
8176 || (insn & (0x3f << 26)) == 38u << 26 /* stb */
8177 || (insn & (0x3f << 26)) == 40u << 26 /* lhz */
8178 || (insn & (0x3f << 26)) == 42u << 26 /* lha */
8179 || (insn & (0x3f << 26)) == 44u << 26 /* sth */
8180 || (insn & (0x3f << 26)) == 46u << 26 /* lmw */
8181 || (insn & (0x3f << 26)) == 47u << 26 /* stmw */
8182 || (insn & (0x3f << 26)) == 48u << 26 /* lfs */
8183 || (insn & (0x3f << 26)) == 50u << 26 /* lfd */
8184 || (insn & (0x3f << 26)) == 52u << 26 /* stfs */
8185 || (insn & (0x3f << 26)) == 54u << 26 /* stfd */
8186 || ((insn & (0x3f << 26)) == 58u << 26 /* lwa,ld,lmd */
8187 && (insn & 3) != 1)
8188 || ((insn & (0x3f << 26)) == 62u << 26 /* std, stmd */
8189 && ((insn & 3) == 0 || (insn & 3) == 3)))
8190 {
8191 /* Arrange to apply the reloc addend, if any. */
8192 relocation = 0;
8193 unresolved_reloc = FALSE;
8194 rel->r_info = ELF32_R_INFO (0, r_type);
8195 }
8196 else
2c4d9cbe 8197 _bfd_error_handler
695344c0 8198 /* xgettext:c-format */
871b3ab2 8199 (_("%pB(%pA+%#Lx): error: %s with unexpected instruction %#x"),
d3e454b9
AM
8200 input_bfd, input_section, rel->r_offset,
8201 "R_PPC_ADDR16_LO", insn);
8202 }
8203 }
8204
e054468f 8205 ifunc = NULL;
25f23106 8206 if (!htab->is_vxworks)
e054468f 8207 {
de972ffa
AM
8208 struct plt_entry *ent;
8209
e054468f
AM
8210 if (h != NULL)
8211 {
8212 if (h->type == STT_GNU_IFUNC)
8213 ifunc = &h->plt.plist;
8214 }
de972ffa
AM
8215 else if (local_got_offsets != NULL
8216 && ELF_ST_TYPE (sym->st_info) == STT_GNU_IFUNC)
e054468f 8217 {
de972ffa 8218 struct plt_entry **local_plt;
e054468f 8219
de972ffa
AM
8220 local_plt = (struct plt_entry **) (local_got_offsets
8221 + symtab_hdr->sh_info);
8222 ifunc = local_plt + r_symndx;
e054468f 8223 }
e054468f 8224
de972ffa
AM
8225 ent = NULL;
8226 if (ifunc != NULL
0e1862bb 8227 && (!bfd_link_pic (info)
de972ffa
AM
8228 || is_branch_reloc (r_type)))
8229 {
8230 addend = 0;
0e1862bb 8231 if (r_type == R_PPC_PLTREL24 && bfd_link_pic (info))
de972ffa
AM
8232 addend = rel->r_addend;
8233 ent = find_plt_ent (ifunc, got2, addend);
8234 }
8235 if (ent != NULL)
8236 {
888a7fc3
AM
8237 if (bfd_link_pic (info)
8238 && ent->sec != got2
8239 && htab->plt_type != PLT_NEW
8240 && (!htab->elf.dynamic_sections_created
8241 || h == NULL
8242 || h->dynindx == -1))
8243 {
8244 /* Uh oh, we are going to create a pic glink stub
8245 for an ifunc (here for h == NULL and later in
8246 finish_dynamic_symbol for h != NULL), and
8247 apparently are using code compiled with
8248 -mbss-plt. The difficulty is that -mbss-plt code
8249 gives no indication via a magic PLTREL24 addend
8250 whether r30 is equal to _GLOBAL_OFFSET_TABLE_ or
8251 is pointing into a .got2 section (and how far
8252 into .got2). */
8253 info->callbacks->einfo
695344c0 8254 /* xgettext:c-format */
174d0a74 8255 (_("%X%H: unsupported bss-plt -fPIC ifunc %s\n"),
888a7fc3
AM
8256 input_bfd, input_section, rel->r_offset, sym_name);
8257 }
e054468f
AM
8258 if (h == NULL && (ent->plt.offset & 1) == 0)
8259 {
8260 Elf_Internal_Rela rela;
8261 bfd_byte *loc;
8262
ce558b89
AM
8263 rela.r_offset = (htab->elf.iplt->output_section->vma
8264 + htab->elf.iplt->output_offset
e054468f
AM
8265 + ent->plt.offset);
8266 rela.r_info = ELF32_R_INFO (0, R_PPC_IRELATIVE);
8267 rela.r_addend = relocation;
ce558b89
AM
8268 loc = htab->elf.irelplt->contents;
8269 loc += (htab->elf.irelplt->reloc_count++
25f23106 8270 * sizeof (Elf32_External_Rela));
e054468f 8271 bfd_elf32_swap_reloca_out (output_bfd, &rela, loc);
82e66161 8272 htab->local_ifunc_resolver = 1;
e054468f
AM
8273
8274 ent->plt.offset |= 1;
8275 }
8276 if (h == NULL && (ent->glink_offset & 1) == 0)
8277 {
a7f2871e
AM
8278 unsigned char *p = ((unsigned char *) htab->glink->contents
8279 + ent->glink_offset);
9e390558
AM
8280
8281 write_glink_stub (NULL, ent, htab->elf.iplt, p, info);
e054468f
AM
8282 ent->glink_offset |= 1;
8283 }
8284
8285 unresolved_reloc = FALSE;
8286 if (htab->plt_type == PLT_NEW
8287 || !htab->elf.dynamic_sections_created
c7e17e05
AM
8288 || h == NULL
8289 || h->dynindx == -1)
e054468f
AM
8290 relocation = (htab->glink->output_section->vma
8291 + htab->glink->output_offset
8292 + (ent->glink_offset & ~1));
8293 else
ce558b89
AM
8294 relocation = (htab->elf.splt->output_section->vma
8295 + htab->elf.splt->output_offset
e054468f
AM
8296 + ent->plt.offset);
8297 }
8298 }
8299
7619e7c7 8300 addend = rel->r_addend;
7619e7c7 8301 howto = NULL;
55fd94b0
AM
8302 if (r_type < R_PPC_max)
8303 howto = ppc_elf_howto_table[r_type];
9a23f96e
AM
8304
8305 switch (r_type)
8306 {
8307 default:
8308 break;
8309
8310 case R_PPC_TPREL16_HA:
8311 if (htab->do_tls_opt && relocation + addend + 0x8000 < 0x10000)
8312 {
8313 bfd_byte *p = contents + (rel->r_offset & ~3);
8314 unsigned int insn = bfd_get_32 (input_bfd, p);
8315 if ((insn & ((0x3f << 26) | 0x1f << 16))
8316 != ((15u << 26) | (2 << 16)) /* addis rt,2,imm */)
8317 /* xgettext:c-format */
8318 info->callbacks->minfo
8319 (_("%H: warning: %s unexpected insn %#x.\n"),
8320 input_bfd, input_section, rel->r_offset, howto->name, insn);
8321 else
8322 bfd_put_32 (input_bfd, NOP, p);
8323 }
8324 break;
8325
8326 case R_PPC_TPREL16_LO:
8327 if (htab->do_tls_opt && relocation + addend + 0x8000 < 0x10000)
8328 {
8329 bfd_byte *p = contents + (rel->r_offset & ~3);
8330 unsigned int insn = bfd_get_32 (input_bfd, p);
8331 insn &= ~(0x1f << 16);
8332 insn |= 2 << 16;
8333 bfd_put_32 (input_bfd, insn, p);
8334 }
8335 break;
8336 }
8337
8338 tls_type = 0;
7619e7c7 8339 switch (r_type)
252b5132
RH
8340 {
8341 default:
25f53a85 8342 info->callbacks->einfo
695344c0 8343 /* xgettext:c-format */
871b3ab2 8344 (_("%P: %pB: unknown relocation type %d for symbol %s\n"),
d003868e 8345 input_bfd, (int) r_type, sym_name);
252b5132
RH
8346
8347 bfd_set_error (bfd_error_bad_value);
b34976b6 8348 ret = FALSE;
c316a17c 8349 goto copy_reloc;
252b5132 8350
7619e7c7
AM
8351 case R_PPC_NONE:
8352 case R_PPC_TLS:
727fc41e
AM
8353 case R_PPC_TLSGD:
8354 case R_PPC_TLSLD:
7619e7c7
AM
8355 case R_PPC_EMB_MRKREF:
8356 case R_PPC_GNU_VTINHERIT:
8357 case R_PPC_GNU_VTENTRY:
c316a17c 8358 goto copy_reloc;
7595d193 8359
7619e7c7
AM
8360 /* GOT16 relocations. Like an ADDR16 using the symbol's
8361 address in the GOT as relocation value instead of the
8362 symbol's value itself. Also, create a GOT entry for the
8363 symbol and put the symbol value there. */
8364 case R_PPC_GOT_TLSGD16:
8365 case R_PPC_GOT_TLSGD16_LO:
8366 case R_PPC_GOT_TLSGD16_HI:
8367 case R_PPC_GOT_TLSGD16_HA:
8368 tls_type = TLS_TLS | TLS_GD;
8369 goto dogot;
8370
8371 case R_PPC_GOT_TLSLD16:
8372 case R_PPC_GOT_TLSLD16_LO:
8373 case R_PPC_GOT_TLSLD16_HI:
8374 case R_PPC_GOT_TLSLD16_HA:
8375 tls_type = TLS_TLS | TLS_LD;
8376 goto dogot;
8377
8378 case R_PPC_GOT_TPREL16:
8379 case R_PPC_GOT_TPREL16_LO:
8380 case R_PPC_GOT_TPREL16_HI:
8381 case R_PPC_GOT_TPREL16_HA:
8382 tls_type = TLS_TLS | TLS_TPREL;
8383 goto dogot;
8384
8385 case R_PPC_GOT_DTPREL16:
8386 case R_PPC_GOT_DTPREL16_LO:
8387 case R_PPC_GOT_DTPREL16_HI:
8388 case R_PPC_GOT_DTPREL16_HA:
8389 tls_type = TLS_TLS | TLS_DTPREL;
8390 goto dogot;
8391
8392 case R_PPC_GOT16:
8393 case R_PPC_GOT16_LO:
8394 case R_PPC_GOT16_HI:
8395 case R_PPC_GOT16_HA:
727fc41e 8396 tls_mask = 0;
7619e7c7
AM
8397 dogot:
8398 {
8399 /* Relocation is to the entry for this symbol in the global
8400 offset table. */
8401 bfd_vma off;
8402 bfd_vma *offp;
8403 unsigned long indx;
8404
ce558b89 8405 if (htab->elf.sgot == NULL)
7619e7c7
AM
8406 abort ();
8407
8408 indx = 0;
8409 if (tls_type == (TLS_TLS | TLS_LD)
d881513a 8410 && (h == NULL
f5385ebf 8411 || !h->def_dynamic))
7619e7c7
AM
8412 offp = &htab->tlsld_got.offset;
8413 else if (h != NULL)
8414 {
f0158f44
AM
8415 if (!htab->elf.dynamic_sections_created
8416 || h->dynindx == -1
8417 || SYMBOL_REFERENCES_LOCAL (info, h)
21d68fcd 8418 || UNDEFWEAK_NO_DYNAMIC_RELOC (info, h))
7619e7c7
AM
8419 /* This is actually a static link, or it is a
8420 -Bsymbolic link and the symbol is defined
8421 locally, or the symbol was forced to be local
8422 because of a version file. */
8423 ;
8424 else
8425 {
8426 indx = h->dynindx;
8427 unresolved_reloc = FALSE;
8428 }
8429 offp = &h->got.offset;
8430 }
8431 else
8432 {
8433 if (local_got_offsets == NULL)
8434 abort ();
8435 offp = &local_got_offsets[r_symndx];
8436 }
8437
8438 /* The offset must always be a multiple of 4. We use the
8439 least significant bit to record whether we have already
8440 processed this entry. */
8441 off = *offp;
8442 if ((off & 1) != 0)
8443 off &= ~1;
8444 else
8445 {
70bccea4
AM
8446 unsigned int tls_m = (tls_mask
8447 & (TLS_LD | TLS_GD | TLS_DTPREL
8448 | TLS_TPREL | TLS_TPRELGD));
8449
8450 if (offp == &htab->tlsld_got.offset)
8451 tls_m = TLS_LD;
8452 else if (h == NULL
f5385ebf 8453 || !h->def_dynamic)
70bccea4
AM
8454 tls_m &= ~TLS_LD;
8455
8456 /* We might have multiple got entries for this sym.
8457 Initialize them all. */
8458 do
7619e7c7 8459 {
70bccea4
AM
8460 int tls_ty = 0;
8461
8462 if ((tls_m & TLS_LD) != 0)
7619e7c7 8463 {
70bccea4
AM
8464 tls_ty = TLS_TLS | TLS_LD;
8465 tls_m &= ~TLS_LD;
8466 }
8467 else if ((tls_m & TLS_GD) != 0)
8468 {
8469 tls_ty = TLS_TLS | TLS_GD;
8470 tls_m &= ~TLS_GD;
8471 }
8472 else if ((tls_m & TLS_DTPREL) != 0)
8473 {
8474 tls_ty = TLS_TLS | TLS_DTPREL;
8475 tls_m &= ~TLS_DTPREL;
8476 }
8477 else if ((tls_m & (TLS_TPREL | TLS_TPRELGD)) != 0)
8478 {
8479 tls_ty = TLS_TLS | TLS_TPREL;
8480 tls_m = 0;
7619e7c7 8481 }
7619e7c7 8482
70bccea4 8483 /* Generate relocs for the dynamic linker. */
f0158f44
AM
8484 if (indx != 0
8485 || (bfd_link_pic (info)
8486 && (h == NULL
21d68fcd 8487 || !UNDEFWEAK_NO_DYNAMIC_RELOC (info, h)
f15d0b54
AM
8488 || offp == &htab->tlsld_got.offset)
8489 && !(tls_ty == (TLS_TLS | TLS_TPREL)
8490 && bfd_link_executable (info)
8491 && SYMBOL_REFERENCES_LOCAL (info, h))))
7619e7c7 8492 {
ce558b89 8493 asection *rsec = htab->elf.srelgot;
91d6fa6a 8494 bfd_byte * loc;
91e21fb7 8495
0bed072f 8496 if (ifunc != NULL)
82e66161
AM
8497 {
8498 rsec = htab->elf.irelplt;
8499 if (indx == 0)
8500 htab->local_ifunc_resolver = 1;
8501 else if (is_static_defined (h))
8502 htab->maybe_local_ifunc_resolver = 1;
8503 }
ce558b89
AM
8504 outrel.r_offset = (htab->elf.sgot->output_section->vma
8505 + htab->elf.sgot->output_offset
70bccea4 8506 + off);
e515b051 8507 outrel.r_addend = 0;
70bccea4
AM
8508 if (tls_ty & (TLS_LD | TLS_GD))
8509 {
8510 outrel.r_info = ELF32_R_INFO (indx, R_PPC_DTPMOD32);
70bccea4
AM
8511 if (tls_ty == (TLS_TLS | TLS_GD))
8512 {
25f23106
AM
8513 loc = rsec->contents;
8514 loc += (rsec->reloc_count++
70bccea4
AM
8515 * sizeof (Elf32_External_Rela));
8516 bfd_elf32_swap_reloca_out (output_bfd,
8517 &outrel, loc);
e515b051 8518 outrel.r_offset += 4;
70bccea4
AM
8519 outrel.r_info
8520 = ELF32_R_INFO (indx, R_PPC_DTPREL32);
70bccea4
AM
8521 }
8522 }
8523 else if (tls_ty == (TLS_TLS | TLS_DTPREL))
8524 outrel.r_info = ELF32_R_INFO (indx, R_PPC_DTPREL32);
8525 else if (tls_ty == (TLS_TLS | TLS_TPREL))
8526 outrel.r_info = ELF32_R_INFO (indx, R_PPC_TPREL32);
25f23106 8527 else if (indx != 0)
70bccea4 8528 outrel.r_info = ELF32_R_INFO (indx, R_PPC_GLOB_DAT);
25f23106
AM
8529 else if (ifunc != NULL)
8530 outrel.r_info = ELF32_R_INFO (0, R_PPC_IRELATIVE);
8531 else
8532 outrel.r_info = ELF32_R_INFO (0, R_PPC_RELATIVE);
d6e14abc 8533 if (indx == 0 && tls_ty != (TLS_TLS | TLS_LD))
e515b051
AM
8534 {
8535 outrel.r_addend += relocation;
8536 if (tls_ty & (TLS_GD | TLS_DTPREL | TLS_TPREL))
989f9879
AM
8537 {
8538 if (htab->elf.tls_sec == NULL)
8539 outrel.r_addend = 0;
8540 else
8541 outrel.r_addend -= htab->elf.tls_sec->vma;
8542 }
e515b051 8543 }
25f23106
AM
8544 loc = rsec->contents;
8545 loc += (rsec->reloc_count++
70bccea4
AM
8546 * sizeof (Elf32_External_Rela));
8547 bfd_elf32_swap_reloca_out (output_bfd, &outrel, loc);
7619e7c7
AM
8548 }
8549
70bccea4
AM
8550 /* Init the .got section contents if we're not
8551 emitting a reloc. */
8552 else
7619e7c7 8553 {
70bccea4
AM
8554 bfd_vma value = relocation;
8555
f0158f44 8556 if (tls_ty != 0)
70bccea4 8557 {
989f9879
AM
8558 if (htab->elf.tls_sec == NULL)
8559 value = 0;
8560 else
8561 {
f0158f44
AM
8562 if (tls_ty & TLS_LD)
8563 value = 0;
8564 else
8565 value -= htab->elf.tls_sec->vma + DTP_OFFSET;
676ee2b5 8566 if (tls_ty & TLS_TPREL)
989f9879
AM
8567 value += DTP_OFFSET - TP_OFFSET;
8568 }
70bccea4 8569
f0158f44 8570 if (tls_ty & (TLS_LD | TLS_GD))
7b609f53 8571 {
95f0d0d2 8572 bfd_put_32 (input_bfd, value,
ce558b89 8573 htab->elf.sgot->contents + off + 4);
676ee2b5 8574 value = 1;
7b609f53 8575 }
70bccea4 8576 }
95f0d0d2 8577 bfd_put_32 (input_bfd, value,
ce558b89 8578 htab->elf.sgot->contents + off);
7619e7c7 8579 }
70bccea4
AM
8580
8581 off += 4;
8582 if (tls_ty & (TLS_LD | TLS_GD))
8583 off += 4;
7619e7c7 8584 }
70bccea4
AM
8585 while (tls_m != 0);
8586
8587 off = *offp;
8588 *offp = off | 1;
7619e7c7
AM
8589 }
8590
8591 if (off >= (bfd_vma) -2)
8592 abort ();
8593
70bccea4
AM
8594 if ((tls_type & TLS_TLS) != 0)
8595 {
8596 if (tls_type != (TLS_TLS | TLS_LD))
8597 {
8598 if ((tls_mask & TLS_LD) != 0
8599 && !(h == NULL
f5385ebf 8600 || !h->def_dynamic))
70bccea4
AM
8601 off += 8;
8602 if (tls_type != (TLS_TLS | TLS_GD))
8603 {
8604 if ((tls_mask & TLS_GD) != 0)
8605 off += 8;
8606 if (tls_type != (TLS_TLS | TLS_DTPREL))
8607 {
8608 if ((tls_mask & TLS_DTPREL) != 0)
8609 off += 4;
8610 }
8611 }
8612 }
8613 }
8614
d3e454b9
AM
8615 /* If here for a picfixup, we're done. */
8616 if (r_type != ELF32_R_TYPE (rel->r_info))
c316a17c 8617 goto copy_reloc;
d3e454b9 8618
ce558b89
AM
8619 relocation = (htab->elf.sgot->output_section->vma
8620 + htab->elf.sgot->output_offset
e87d4038
AM
8621 + off
8622 - SYM_VAL (htab->elf.hgot));
7619e7c7
AM
8623
8624 /* Addends on got relocations don't make much sense.
8625 x+off@got is actually x@got+off, and since the got is
8626 generated by a hash table traversal, the value in the
8627 got at entry m+n bears little relation to the entry m. */
8628 if (addend != 0)
25f53a85 8629 info->callbacks->einfo
695344c0 8630 /* xgettext:c-format */
174d0a74 8631 (_("%H: non-zero addend on %s reloc against `%s'\n"),
25f53a85 8632 input_bfd, input_section, rel->r_offset,
7b609f53 8633 howto->name,
7619e7c7
AM
8634 sym_name);
8635 }
86c95733 8636 break;
7619e7c7 8637
86c95733 8638 /* Relocations that need no special processing. */
7619e7c7 8639 case R_PPC_LOCAL24PC:
252b5132
RH
8640 /* It makes no sense to point a local relocation
8641 at a symbol not in this object. */
7b609f53 8642 if (unresolved_reloc)
252b5132 8643 {
1a72702b
AM
8644 (*info->callbacks->undefined_symbol) (info,
8645 h->root.root.string,
8646 input_bfd,
8647 input_section,
8648 rel->r_offset,
8649 TRUE);
c316a17c 8650 goto copy_reloc;
252b5132 8651 }
888a7fc3
AM
8652 if (h != NULL && h->type == STT_GNU_IFUNC && bfd_link_pic (info))
8653 {
8654 /* @local on an ifunc does not really make sense since
8655 the ifunc resolver can take you anywhere. More
8656 seriously, calls to ifuncs must go through a plt call
8657 stub, and for pic the plt call stubs uses r30 to
8658 access the PLT. The problem is that a call that is
8659 local won't have the +32k reloc addend trick marking
8660 -fPIC code, so the linker won't know whether r30 is
8661 _GLOBAL_OFFSET_TABLE_ or pointing into a .got2 section. */
695344c0 8662 /* xgettext:c-format */
174d0a74 8663 info->callbacks->einfo (_("%X%H: @local call to ifunc %s\n"),
888a7fc3
AM
8664 input_bfd, input_section, rel->r_offset,
8665 h->root.root.string);
8666 }
252b5132
RH
8667 break;
8668
7619e7c7
AM
8669 case R_PPC_DTPREL16:
8670 case R_PPC_DTPREL16_LO:
8671 case R_PPC_DTPREL16_HI:
8672 case R_PPC_DTPREL16_HA:
989f9879
AM
8673 if (htab->elf.tls_sec != NULL)
8674 addend -= htab->elf.tls_sec->vma + DTP_OFFSET;
7619e7c7
AM
8675 break;
8676
70bccea4
AM
8677 /* Relocations that may need to be propagated if this is a shared
8678 object. */
7619e7c7
AM
8679 case R_PPC_TPREL16:
8680 case R_PPC_TPREL16_LO:
8681 case R_PPC_TPREL16_HI:
8682 case R_PPC_TPREL16_HA:
766bc656
AM
8683 if (h != NULL
8684 && h->root.type == bfd_link_hash_undefweak
8685 && h->dynindx == -1)
8686 {
8687 /* Make this relocation against an undefined weak symbol
8688 resolve to zero. This is really just a tweak, since
8689 code using weak externs ought to check that they are
8690 defined before using them. */
8691 bfd_byte *p = contents + rel->r_offset - d_offset;
95f0d0d2 8692 unsigned int insn = bfd_get_32 (input_bfd, p);
766bc656
AM
8693 insn = _bfd_elf_ppc_at_tprel_transform (insn, 2);
8694 if (insn != 0)
95f0d0d2 8695 bfd_put_32 (input_bfd, insn, p);
766bc656
AM
8696 break;
8697 }
989f9879
AM
8698 if (htab->elf.tls_sec != NULL)
8699 addend -= htab->elf.tls_sec->vma + TP_OFFSET;
7619e7c7 8700 /* The TPREL16 relocs shouldn't really be used in shared
7c8bbca5
AM
8701 libs or with non-local symbols as that will result in
8702 DT_TEXTREL being set, but support them anyway. */
7619e7c7
AM
8703 goto dodyn;
8704
8705 case R_PPC_TPREL32:
989f9879
AM
8706 if (htab->elf.tls_sec != NULL)
8707 addend -= htab->elf.tls_sec->vma + TP_OFFSET;
7619e7c7
AM
8708 goto dodyn;
8709
8710 case R_PPC_DTPREL32:
989f9879
AM
8711 if (htab->elf.tls_sec != NULL)
8712 addend -= htab->elf.tls_sec->vma + DTP_OFFSET;
7619e7c7
AM
8713 goto dodyn;
8714
e515b051
AM
8715 case R_PPC_DTPMOD32:
8716 relocation = 1;
8717 addend = 0;
8718 goto dodyn;
8719
d7128ce4
AM
8720 case R_PPC_REL16:
8721 case R_PPC_REL16_LO:
8722 case R_PPC_REL16_HI:
8723 case R_PPC_REL16_HA:
a680de9a 8724 case R_PPC_REL16DX_HA:
d7128ce4
AM
8725 break;
8726
7619e7c7 8727 case R_PPC_REL32:
625af618
AM
8728 if (h == NULL || h == htab->elf.hgot)
8729 break;
8730 /* fall through */
8731
8732 case R_PPC_ADDR32:
8733 case R_PPC_ADDR16:
8734 case R_PPC_ADDR16_LO:
8735 case R_PPC_ADDR16_HI:
8736 case R_PPC_ADDR16_HA:
8737 case R_PPC_UADDR32:
8738 case R_PPC_UADDR16:
8739 goto dodyn;
8740
b9c361e0
JL
8741 case R_PPC_VLE_REL8:
8742 case R_PPC_VLE_REL15:
8743 case R_PPC_VLE_REL24:
625af618 8744 case R_PPC_REL24:
7619e7c7
AM
8745 case R_PPC_REL14:
8746 case R_PPC_REL14_BRTAKEN:
8747 case R_PPC_REL14_BRNTAKEN:
252b5132
RH
8748 /* If these relocations are not to a named symbol, they can be
8749 handled right here, no need to bother the dynamic linker. */
89200bf8 8750 if (SYMBOL_CALLS_LOCAL (info, h)
3b36f7e6 8751 || h == htab->elf.hgot)
252b5132 8752 break;
70bccea4 8753 /* fall through */
252b5132 8754
7619e7c7 8755 case R_PPC_ADDR24:
7619e7c7
AM
8756 case R_PPC_ADDR14:
8757 case R_PPC_ADDR14_BRTAKEN:
8758 case R_PPC_ADDR14_BRNTAKEN:
0e1862bb 8759 if (h != NULL && !bfd_link_pic (info))
625af618
AM
8760 break;
8761 /* fall through */
8762
7619e7c7 8763 dodyn:
3348747a
NS
8764 if ((input_section->flags & SEC_ALLOC) == 0
8765 || is_vxworks_tls)
c87b5a93 8766 break;
c87b5a93 8767
287c7eaf
AM
8768 if (bfd_link_pic (info)
8769 ? ((h == NULL
8770 || ppc_elf_hash_entry (h)->dyn_relocs != NULL)
8771 && ((h != NULL && pc_dynrelocs (h))
8772 || must_be_dyn_reloc (info, r_type)))
8773 : (h != NULL
8774 && ppc_elf_hash_entry (h)->dyn_relocs != NULL))
252b5132 8775 {
0bb2d96a 8776 int skip;
f95f8542
AM
8777 bfd_byte *loc;
8778 asection *sreloc;
82e66161
AM
8779 long indx = 0;
8780
252b5132 8781#ifdef DEBUG
55fd94b0
AM
8782 fprintf (stderr, "ppc_elf_relocate_section needs to "
8783 "create relocation for %s\n",
70bccea4
AM
8784 (h && h->root.root.string
8785 ? h->root.root.string : "<unknown>"));
252b5132
RH
8786#endif
8787
8788 /* When generating a shared object, these relocations
70bccea4
AM
8789 are copied into the output file to be resolved at run
8790 time. */
0bb2d96a 8791 skip = 0;
5b914448
AM
8792 outrel.r_offset = _bfd_elf_section_offset (output_bfd, info,
8793 input_section,
8794 rel->r_offset);
0bb2d96a
JJ
8795 if (outrel.r_offset == (bfd_vma) -1
8796 || outrel.r_offset == (bfd_vma) -2)
8797 skip = (int) outrel.r_offset;
252b5132
RH
8798 outrel.r_offset += (input_section->output_section->vma
8799 + input_section->output_offset);
8800
8801 if (skip)
8802 memset (&outrel, 0, sizeof outrel);
21d68fcd 8803 else if (!SYMBOL_REFERENCES_LOCAL (info, h))
252b5132 8804 {
82e66161
AM
8805 indx = h->dynindx;
8806 BFD_ASSERT (indx != -1);
7619e7c7 8807 unresolved_reloc = FALSE;
82e66161 8808 outrel.r_info = ELF32_R_INFO (indx, r_type);
252b5132
RH
8809 outrel.r_addend = rel->r_addend;
8810 }
8811 else
8812 {
47388f4c
AM
8813 outrel.r_addend = relocation + rel->r_addend;
8814
25f23106 8815 if (r_type != R_PPC_ADDR32)
252b5132 8816 {
25f23106
AM
8817 if (ifunc != NULL)
8818 {
8819 /* If we get here when building a static
8820 executable, then the libc startup function
8821 responsible for applying indirect function
8822 relocations is going to complain about
8823 the reloc type.
8824 If we get here when building a dynamic
8825 executable, it will be because we have
8826 a text relocation. The dynamic loader
8827 will set the text segment writable and
8828 non-executable to apply text relocations.
8829 So we'll segfault when trying to run the
8830 indirection function to resolve the reloc. */
25f53a85 8831 info->callbacks->einfo
695344c0 8832 /* xgettext:c-format */
174d0a74 8833 (_("%H: relocation %s for indirect "
25f53a85
AM
8834 "function %s unsupported\n"),
8835 input_bfd, input_section, rel->r_offset,
25f23106
AM
8836 howto->name,
8837 sym_name);
8838 ret = FALSE;
8839 }
cf35638d 8840 else if (r_symndx == STN_UNDEF || bfd_is_abs_section (sec))
89200bf8 8841 ;
252b5132
RH
8842 else if (sec == NULL || sec->owner == NULL)
8843 {
8844 bfd_set_error (bfd_error_bad_value);
89200bf8 8845 ret = FALSE;
252b5132
RH
8846 }
8847 else
8848 {
8849 asection *osec;
8850
47388f4c
AM
8851 /* We are turning this relocation into one
8852 against a section symbol. It would be
8853 proper to subtract the symbol's value,
8854 osec->vma, from the emitted reloc addend,
25f23106
AM
8855 but ld.so expects buggy relocs.
8856 FIXME: Why not always use a zero index? */
252b5132
RH
8857 osec = sec->output_section;
8858 indx = elf_section_data (osec)->dynindx;
74541ad4
AM
8859 if (indx == 0)
8860 {
8861 osec = htab->elf.text_index_section;
8862 indx = elf_section_data (osec)->dynindx;
8863 }
8864 BFD_ASSERT (indx != 0);
252b5132 8865#ifdef DEBUG
74541ad4 8866 if (indx == 0)
e460dd0d 8867 printf ("indx=%ld section=%s flags=%08x name=%s\n",
55fd94b0
AM
8868 indx, osec->name, osec->flags,
8869 h->root.root.string);
252b5132
RH
8870#endif
8871 }
8872
8873 outrel.r_info = ELF32_R_INFO (indx, r_type);
252b5132 8874 }
25f23106
AM
8875 else if (ifunc != NULL)
8876 outrel.r_info = ELF32_R_INFO (0, R_PPC_IRELATIVE);
8877 else
8878 outrel.r_info = ELF32_R_INFO (0, R_PPC_RELATIVE);
252b5132
RH
8879 }
8880
82e66161
AM
8881 sreloc = elf_section_data (input_section)->sreloc;
8882 if (ifunc)
8883 {
8884 sreloc = htab->elf.irelplt;
8885 if (indx == 0)
8886 htab->local_ifunc_resolver = 1;
8887 else if (is_static_defined (h))
8888 htab->maybe_local_ifunc_resolver = 1;
8889 }
8890 if (sreloc == NULL)
8891 return FALSE;
8892
947216bf
AM
8893 loc = sreloc->contents;
8894 loc += sreloc->reloc_count++ * sizeof (Elf32_External_Rela);
8895 bfd_elf32_swap_reloca_out (output_bfd, &outrel, loc);
252b5132 8896
2243deae 8897 if (skip == -1)
c316a17c 8898 goto copy_reloc;
2243deae 8899
f0158f44
AM
8900 /* This reloc will be computed at runtime. Clear the memory
8901 so that it contains a predictable value for prelink. */
8902 if (!skip)
2243deae
L
8903 {
8904 relocation = howto->pc_relative ? outrel.r_offset : 0;
8905 addend = 0;
8906 break;
8907 }
252b5132 8908 }
252b5132
RH
8909 break;
8910
32af9f6e
AM
8911 case R_PPC_RELAX_PLT:
8912 case R_PPC_RELAX_PLTREL24:
de972ffa
AM
8913 if (h != NULL)
8914 {
32af9f6e
AM
8915 struct plt_entry *ent;
8916 bfd_vma got2_addend = 0;
8917
8918 if (r_type == R_PPC_RELAX_PLTREL24)
8919 {
0e1862bb 8920 if (bfd_link_pic (info))
32af9f6e
AM
8921 got2_addend = addend;
8922 addend = 0;
8923 }
8924 ent = find_plt_ent (&h->plt.plist, got2, got2_addend);
de972ffa
AM
8925 if (htab->plt_type == PLT_NEW)
8926 relocation = (htab->glink->output_section->vma
8927 + htab->glink->output_offset
8928 + ent->glink_offset);
8929 else
ce558b89
AM
8930 relocation = (htab->elf.splt->output_section->vma
8931 + htab->elf.splt->output_offset
de972ffa
AM
8932 + ent->plt.offset);
8933 }
1a0670f3 8934 /* Fall through. */
b4a38de6 8935
32af9f6e 8936 case R_PPC_RELAX:
9abc968f 8937 {
53291d1f
AM
8938 const int *stub;
8939 size_t size;
8940 size_t insn_offset = rel->r_offset;
8941 unsigned int insn;
9abc968f 8942
0e1862bb 8943 if (bfd_link_pic (info))
53291d1f
AM
8944 {
8945 relocation -= (input_section->output_section->vma
8946 + input_section->output_offset
8947 + rel->r_offset - 4);
8948 stub = shared_stub_entry;
95f0d0d2
AM
8949 bfd_put_32 (input_bfd, stub[0], contents + insn_offset - 12);
8950 bfd_put_32 (input_bfd, stub[1], contents + insn_offset - 8);
8951 bfd_put_32 (input_bfd, stub[2], contents + insn_offset - 4);
53291d1f
AM
8952 stub += 3;
8953 size = ARRAY_SIZE (shared_stub_entry) - 3;
8954 }
8955 else
8956 {
8957 stub = stub_entry;
8958 size = ARRAY_SIZE (stub_entry);
8959 }
9abc968f 8960
9abc968f 8961 relocation += addend;
0e1862bb 8962 if (bfd_link_relocatable (info))
53291d1f
AM
8963 relocation = 0;
8964
8965 /* First insn is HA, second is LO. */
8966 insn = *stub++;
8967 insn |= ((relocation + 0x8000) >> 16) & 0xffff;
95f0d0d2 8968 bfd_put_32 (input_bfd, insn, contents + insn_offset);
53291d1f
AM
8969 insn_offset += 4;
8970
8971 insn = *stub++;
8972 insn |= relocation & 0xffff;
95f0d0d2 8973 bfd_put_32 (input_bfd, insn, contents + insn_offset);
53291d1f
AM
8974 insn_offset += 4;
8975 size -= 2;
8976
8977 while (size != 0)
8978 {
8979 insn = *stub++;
8980 --size;
95f0d0d2 8981 bfd_put_32 (input_bfd, insn, contents + insn_offset);
53291d1f
AM
8982 insn_offset += 4;
8983 }
9bc4e62b
NS
8984
8985 /* Rewrite the reloc and convert one of the trailing nop
8986 relocs to describe this relocation. */
8987 BFD_ASSERT (ELF32_R_TYPE (relend[-1].r_info) == R_PPC_NONE);
8988 /* The relocs are at the bottom 2 bytes */
c316a17c
AM
8989 wrel->r_offset = rel->r_offset + d_offset;
8990 wrel->r_info = ELF32_R_INFO (r_symndx, R_PPC_ADDR16_HA);
8991 wrel->r_addend = rel->r_addend;
8992 memmove (wrel + 1, wrel, (relend - wrel - 1) * sizeof (*wrel));
8993 wrel++, rel++;
8994 wrel->r_offset += 4;
8995 wrel->r_info = ELF32_R_INFO (r_symndx, R_PPC_ADDR16_LO);
9abc968f 8996 }
8517fae7 8997 continue;
deaaf2f3 8998
70bccea4 8999 /* Indirect .sdata relocation. */
7619e7c7 9000 case R_PPC_EMB_SDAI16:
c9a2f333 9001 BFD_ASSERT (htab->sdata[0].section != NULL);
bd6c6e2b
AM
9002 if (!is_static_defined (htab->sdata[0].sym))
9003 {
9004 unresolved_reloc = TRUE;
9005 break;
9006 }
7619e7c7 9007 relocation
76750a2f
AM
9008 = elf_finish_pointer_linker_section (input_bfd, &htab->sdata[0],
9009 h, relocation, rel);
bd6c6e2b 9010 addend = 0;
252b5132
RH
9011 break;
9012
70bccea4 9013 /* Indirect .sdata2 relocation. */
7619e7c7 9014 case R_PPC_EMB_SDA2I16:
c9a2f333 9015 BFD_ASSERT (htab->sdata[1].section != NULL);
bd6c6e2b
AM
9016 if (!is_static_defined (htab->sdata[1].sym))
9017 {
9018 unresolved_reloc = TRUE;
9019 break;
9020 }
7619e7c7 9021 relocation
76750a2f
AM
9022 = elf_finish_pointer_linker_section (input_bfd, &htab->sdata[1],
9023 h, relocation, rel);
bd6c6e2b 9024 addend = 0;
252b5132
RH
9025 break;
9026
70bccea4
AM
9027 /* Handle the TOC16 reloc. We want to use the offset within the .got
9028 section, not the actual VMA. This is appropriate when generating
9029 an embedded ELF object, for which the .got section acts like the
9030 AIX .toc section. */
7619e7c7 9031 case R_PPC_TOC16: /* phony GOT16 relocations */
3b4f3a11
AM
9032 if (sec == NULL || sec->output_section == NULL)
9033 {
9034 unresolved_reloc = TRUE;
9035 break;
9036 }
a0f49396
NC
9037 BFD_ASSERT (strcmp (bfd_get_section_name (sec->owner, sec),
9038 ".got") == 0
9039 || strcmp (bfd_get_section_name (sec->owner, sec),
9040 ".cgot") == 0);
252b5132 9041
3b4f3a11 9042 addend -= sec->output_section->vma + sec->output_offset + 0x8000;
252b5132
RH
9043 break;
9044
7619e7c7 9045 case R_PPC_PLTREL24:
f75e0e33
AM
9046 if (h != NULL && ifunc == NULL)
9047 {
cbf95972
AM
9048 struct plt_entry *ent;
9049
9050 ent = find_plt_ent (&h->plt.plist, got2,
9051 bfd_link_pic (info) ? addend : 0);
f75e0e33 9052 if (ent == NULL
ce558b89 9053 || htab->elf.splt == NULL)
f75e0e33
AM
9054 {
9055 /* We didn't make a PLT entry for this symbol. This
9056 happens when statically linking PIC code, or when
9057 using -Bsymbolic. */
9058 }
9059 else
9060 {
9061 /* Relocation is to the entry for this symbol in the
9062 procedure linkage table. */
9063 unresolved_reloc = FALSE;
9064 if (htab->plt_type == PLT_NEW)
9065 relocation = (htab->glink->output_section->vma
9066 + htab->glink->output_offset
9067 + ent->glink_offset);
9068 else
ce558b89
AM
9069 relocation = (htab->elf.splt->output_section->vma
9070 + htab->elf.splt->output_offset
f75e0e33
AM
9071 + ent->plt.offset);
9072 }
9073 }
252b5132 9074
f75e0e33
AM
9075 /* R_PPC_PLTREL24 is rather special. If non-zero, the
9076 addend specifies the GOT pointer offset within .got2.
9077 Don't apply it to the relocation field. */
9078 addend = 0;
8da6118f 9079 break;
252b5132 9080
70bccea4 9081 /* Relocate against _SDA_BASE_. */
7619e7c7 9082 case R_PPC_SDAREL16:
252b5132
RH
9083 {
9084 const char *name;
bd6c6e2b 9085 struct elf_link_hash_entry *sda = htab->sdata[0].sym;
252b5132 9086
bd6c6e2b
AM
9087 if (sec == NULL
9088 || sec->output_section == NULL
9089 || !is_static_defined (sda))
3b4f3a11
AM
9090 {
9091 unresolved_reloc = TRUE;
9092 break;
9093 }
bd6c6e2b 9094 addend -= SYM_VAL (sda);
3b4f3a11 9095
a0f49396 9096 name = bfd_get_section_name (output_bfd, sec->output_section);
93d1b056
AM
9097 if (!(strcmp (name, ".sdata") == 0
9098 || strcmp (name, ".sbss") == 0))
252b5132 9099 {
25f53a85 9100 info->callbacks->einfo
695344c0 9101 /* xgettext:c-format */
871b3ab2 9102 (_("%P: %pB: the target (%s) of a %s relocation is "
25f53a85 9103 "in the wrong output section (%s)\n"),
d003868e 9104 input_bfd,
55fd94b0
AM
9105 sym_name,
9106 howto->name,
9107 name);
252b5132 9108 }
252b5132
RH
9109 }
9110 break;
9111
70bccea4 9112 /* Relocate against _SDA2_BASE_. */
7619e7c7 9113 case R_PPC_EMB_SDA2REL:
252b5132
RH
9114 {
9115 const char *name;
bd6c6e2b 9116 struct elf_link_hash_entry *sda = htab->sdata[1].sym;
252b5132 9117
bd6c6e2b
AM
9118 if (sec == NULL
9119 || sec->output_section == NULL
9120 || !is_static_defined (sda))
3b4f3a11
AM
9121 {
9122 unresolved_reloc = TRUE;
9123 break;
9124 }
bd6c6e2b 9125 addend -= SYM_VAL (sda);
3b4f3a11 9126
a0f49396 9127 name = bfd_get_section_name (output_bfd, sec->output_section);
93d1b056
AM
9128 if (!(strcmp (name, ".sdata2") == 0
9129 || strcmp (name, ".sbss2") == 0))
252b5132 9130 {
25f53a85 9131 info->callbacks->einfo
695344c0 9132 /* xgettext:c-format */
871b3ab2 9133 (_("%P: %pB: the target (%s) of a %s relocation is "
25f53a85 9134 "in the wrong output section (%s)\n"),
d003868e 9135 input_bfd,
55fd94b0
AM
9136 sym_name,
9137 howto->name,
9138 name);
252b5132 9139 }
252b5132
RH
9140 }
9141 break;
9142
b9c361e0 9143 case R_PPC_VLE_LO16A:
86c95733 9144 relocation = relocation + addend;
08dc996f
AM
9145 ppc_elf_vle_split16 (input_bfd, input_section, rel->r_offset,
9146 contents + rel->r_offset, relocation,
9147 split16a_type, htab->params->vle_reloc_fixup);
c316a17c 9148 goto copy_reloc;
b9c361e0
JL
9149
9150 case R_PPC_VLE_LO16D:
86c95733 9151 relocation = relocation + addend;
08dc996f
AM
9152 ppc_elf_vle_split16 (input_bfd, input_section, rel->r_offset,
9153 contents + rel->r_offset, relocation,
9154 split16d_type, htab->params->vle_reloc_fixup);
c316a17c 9155 goto copy_reloc;
b9c361e0
JL
9156
9157 case R_PPC_VLE_HI16A:
86c95733 9158 relocation = (relocation + addend) >> 16;
08dc996f
AM
9159 ppc_elf_vle_split16 (input_bfd, input_section, rel->r_offset,
9160 contents + rel->r_offset, relocation,
9161 split16a_type, htab->params->vle_reloc_fixup);
c316a17c 9162 goto copy_reloc;
b9c361e0
JL
9163
9164 case R_PPC_VLE_HI16D:
86c95733 9165 relocation = (relocation + addend) >> 16;
08dc996f
AM
9166 ppc_elf_vle_split16 (input_bfd, input_section, rel->r_offset,
9167 contents + rel->r_offset, relocation,
9168 split16d_type, htab->params->vle_reloc_fixup);
c316a17c 9169 goto copy_reloc;
b9c361e0
JL
9170
9171 case R_PPC_VLE_HA16A:
86c95733 9172 relocation = (relocation + addend + 0x8000) >> 16;
08dc996f
AM
9173 ppc_elf_vle_split16 (input_bfd, input_section, rel->r_offset,
9174 contents + rel->r_offset, relocation,
9175 split16a_type, htab->params->vle_reloc_fixup);
c316a17c 9176 goto copy_reloc;
b9c361e0
JL
9177
9178 case R_PPC_VLE_HA16D:
86c95733 9179 relocation = (relocation + addend + 0x8000) >> 16;
08dc996f
AM
9180 ppc_elf_vle_split16 (input_bfd, input_section, rel->r_offset,
9181 contents + rel->r_offset, relocation,
9182 split16d_type, htab->params->vle_reloc_fixup);
c316a17c 9183 goto copy_reloc;
b9c361e0 9184
70bccea4 9185 /* Relocate against either _SDA_BASE_, _SDA2_BASE_, or 0. */
7619e7c7 9186 case R_PPC_EMB_SDA21:
b9c361e0 9187 case R_PPC_VLE_SDA21:
7619e7c7 9188 case R_PPC_EMB_RELSDA:
b9c361e0 9189 case R_PPC_VLE_SDA21_LO:
252b5132
RH
9190 {
9191 const char *name;
9192 int reg;
86c95733 9193 unsigned int insn;
bd6c6e2b 9194 struct elf_link_hash_entry *sda = NULL;
252b5132 9195
3b4f3a11
AM
9196 if (sec == NULL || sec->output_section == NULL)
9197 {
9198 unresolved_reloc = TRUE;
9199 break;
9200 }
9201
a0f49396 9202 name = bfd_get_section_name (output_bfd, sec->output_section);
93d1b056
AM
9203 if (strcmp (name, ".sdata") == 0
9204 || strcmp (name, ".sbss") == 0)
252b5132
RH
9205 {
9206 reg = 13;
bd6c6e2b 9207 sda = htab->sdata[0].sym;
252b5132 9208 }
93d1b056
AM
9209 else if (strcmp (name, ".sdata2") == 0
9210 || strcmp (name, ".sbss2") == 0)
252b5132
RH
9211 {
9212 reg = 2;
bd6c6e2b 9213 sda = htab->sdata[1].sym;
252b5132 9214 }
8da6118f
KH
9215 else if (strcmp (name, ".PPC.EMB.sdata0") == 0
9216 || strcmp (name, ".PPC.EMB.sbss0") == 0)
252b5132
RH
9217 {
9218 reg = 0;
9219 }
252b5132
RH
9220 else
9221 {
25f53a85 9222 info->callbacks->einfo
695344c0 9223 /* xgettext:c-format */
871b3ab2 9224 (_("%P: %pB: the target (%s) of a %s relocation is "
25f53a85 9225 "in the wrong output section (%s)\n"),
d003868e 9226 input_bfd,
55fd94b0
AM
9227 sym_name,
9228 howto->name,
9229 name);
252b5132
RH
9230
9231 bfd_set_error (bfd_error_bad_value);
b34976b6 9232 ret = FALSE;
c316a17c 9233 goto copy_reloc;
252b5132
RH
9234 }
9235
bd6c6e2b
AM
9236 if (sda != NULL)
9237 {
9238 if (!is_static_defined (sda))
9239 {
9240 unresolved_reloc = TRUE;
9241 break;
9242 }
9243 addend -= SYM_VAL (sda);
9244 }
9245
95f0d0d2 9246 insn = bfd_get_32 (input_bfd, contents + rel->r_offset);
b9c361e0
JL
9247 if (reg == 0
9248 && (r_type == R_PPC_VLE_SDA21
9249 || r_type == R_PPC_VLE_SDA21_LO))
9250 {
86c95733
AM
9251 relocation = relocation + addend;
9252 addend = 0;
9253
9254 /* Force e_li insn, keeping RT from original insn. */
9255 insn &= 0x1f << 21;
9256 insn |= 28u << 26;
9257
9258 /* We have an li20 field, bits 17..20, 11..15, 21..31. */
9259 /* Top 4 bits of value to 17..20. */
9260 insn |= (relocation & 0xf0000) >> 5;
9261 /* Next 5 bits of the value to 11..15. */
9262 insn |= (relocation & 0xf800) << 5;
9263 /* And the final 11 bits of the value to bits 21 to 31. */
9264 insn |= relocation & 0x7ff;
9265
95f0d0d2 9266 bfd_put_32 (input_bfd, insn, contents + rel->r_offset);
c3301df1
AM
9267
9268 if (r_type == R_PPC_VLE_SDA21
9269 && ((relocation + 0x80000) & 0xffffffff) > 0x100000)
9270 goto overflow;
c316a17c 9271 goto copy_reloc;
b9c361e0
JL
9272 }
9273 else if (r_type == R_PPC_EMB_SDA21
9274 || r_type == R_PPC_VLE_SDA21
9275 || r_type == R_PPC_VLE_SDA21_LO)
91d6fa6a 9276 {
86c95733 9277 /* Fill in register field. */
252b5132 9278 insn = (insn & ~RA_REGISTER_MASK) | (reg << RA_REGISTER_SHIFT);
252b5132 9279 }
95f0d0d2 9280 bfd_put_32 (input_bfd, insn, contents + rel->r_offset);
252b5132
RH
9281 }
9282 break;
9283
b9c361e0
JL
9284 case R_PPC_VLE_SDAREL_LO16A:
9285 case R_PPC_VLE_SDAREL_LO16D:
9286 case R_PPC_VLE_SDAREL_HI16A:
9287 case R_PPC_VLE_SDAREL_HI16D:
9288 case R_PPC_VLE_SDAREL_HA16A:
9289 case R_PPC_VLE_SDAREL_HA16D:
9290 {
9291 bfd_vma value;
9292 const char *name;
b9c361e0
JL
9293 struct elf_link_hash_entry *sda = NULL;
9294
9295 if (sec == NULL || sec->output_section == NULL)
9296 {
9297 unresolved_reloc = TRUE;
9298 break;
9299 }
9300
a0f49396 9301 name = bfd_get_section_name (output_bfd, sec->output_section);
93d1b056
AM
9302 if (strcmp (name, ".sdata") == 0
9303 || strcmp (name, ".sbss") == 0)
5499c7c7 9304 sda = htab->sdata[0].sym;
93d1b056
AM
9305 else if (strcmp (name, ".sdata2") == 0
9306 || strcmp (name, ".sbss2") == 0)
5499c7c7 9307 sda = htab->sdata[1].sym;
b9c361e0
JL
9308 else
9309 {
4eca0228 9310 _bfd_error_handler
695344c0 9311 /* xgettext:c-format */
871b3ab2 9312 (_("%pB: the target (%s) of a %s relocation is "
b9c361e0
JL
9313 "in the wrong output section (%s)"),
9314 input_bfd,
9315 sym_name,
9316 howto->name,
9317 name);
9318
9319 bfd_set_error (bfd_error_bad_value);
9320 ret = FALSE;
c316a17c 9321 goto copy_reloc;
b9c361e0
JL
9322 }
9323
5499c7c7 9324 if (sda == NULL || !is_static_defined (sda))
b9c361e0 9325 {
5499c7c7
AM
9326 unresolved_reloc = TRUE;
9327 break;
b9c361e0 9328 }
5499c7c7 9329 value = relocation + addend - SYM_VAL (sda);
86c95733
AM
9330
9331 if (r_type == R_PPC_VLE_SDAREL_LO16A)
08dc996f
AM
9332 ppc_elf_vle_split16 (input_bfd, input_section, rel->r_offset,
9333 contents + rel->r_offset, value,
9334 split16a_type,
9335 htab->params->vle_reloc_fixup);
86c95733 9336 else if (r_type == R_PPC_VLE_SDAREL_LO16D)
08dc996f
AM
9337 ppc_elf_vle_split16 (input_bfd, input_section, rel->r_offset,
9338 contents + rel->r_offset, value,
9339 split16d_type,
9340 htab->params->vle_reloc_fixup);
86c95733 9341 else if (r_type == R_PPC_VLE_SDAREL_HI16A)
b9c361e0 9342 {
86c95733 9343 value = value >> 16;
08dc996f
AM
9344 ppc_elf_vle_split16 (input_bfd, input_section, rel->r_offset,
9345 contents + rel->r_offset, value,
9346 split16a_type,
9347 htab->params->vle_reloc_fixup);
b9c361e0 9348 }
86c95733 9349 else if (r_type == R_PPC_VLE_SDAREL_HI16D)
b9c361e0 9350 {
86c95733 9351 value = value >> 16;
08dc996f
AM
9352 ppc_elf_vle_split16 (input_bfd, input_section, rel->r_offset,
9353 contents + rel->r_offset, value,
9354 split16d_type,
9355 htab->params->vle_reloc_fixup);
b9c361e0 9356 }
86c95733 9357 else if (r_type == R_PPC_VLE_SDAREL_HA16A)
b9c361e0 9358 {
86c95733 9359 value = (value + 0x8000) >> 16;
08dc996f
AM
9360 ppc_elf_vle_split16 (input_bfd, input_section, rel->r_offset,
9361 contents + rel->r_offset, value,
9362 split16a_type,
9363 htab->params->vle_reloc_fixup);
b9c361e0 9364 }
86c95733 9365 else if (r_type == R_PPC_VLE_SDAREL_HA16D)
b9c361e0 9366 {
86c95733 9367 value = (value + 0x8000) >> 16;
08dc996f
AM
9368 ppc_elf_vle_split16 (input_bfd, input_section, rel->r_offset,
9369 contents + rel->r_offset, value,
9370 split16d_type,
9371 htab->params->vle_reloc_fixup);
b9c361e0
JL
9372 }
9373 }
c316a17c 9374 goto copy_reloc;
b9c361e0 9375
83eef883
AFB
9376 case R_PPC_VLE_ADDR20:
9377 ppc_elf_vle_split20 (output_bfd, contents + rel->r_offset, relocation);
9378 continue;
9379
70bccea4 9380 /* Relocate against the beginning of the section. */
7619e7c7
AM
9381 case R_PPC_SECTOFF:
9382 case R_PPC_SECTOFF_LO:
9383 case R_PPC_SECTOFF_HI:
9384 case R_PPC_SECTOFF_HA:
3b4f3a11
AM
9385 if (sec == NULL || sec->output_section == NULL)
9386 {
9387 unresolved_reloc = TRUE;
9388 break;
9389 }
252b5132 9390 addend -= sec->output_section->vma;
252b5132
RH
9391 break;
9392
70bccea4 9393 /* Negative relocations. */
7619e7c7
AM
9394 case R_PPC_EMB_NADDR32:
9395 case R_PPC_EMB_NADDR16:
9396 case R_PPC_EMB_NADDR16_LO:
9397 case R_PPC_EMB_NADDR16_HI:
9398 case R_PPC_EMB_NADDR16_HA:
8da6118f 9399 addend -= 2 * relocation;
252b5132
RH
9400 break;
9401
7619e7c7
AM
9402 case R_PPC_COPY:
9403 case R_PPC_GLOB_DAT:
9404 case R_PPC_JMP_SLOT:
9405 case R_PPC_RELATIVE:
e054468f 9406 case R_PPC_IRELATIVE:
7619e7c7
AM
9407 case R_PPC_PLT32:
9408 case R_PPC_PLTREL32:
9409 case R_PPC_PLT16_LO:
9410 case R_PPC_PLT16_HI:
9411 case R_PPC_PLT16_HA:
9412 case R_PPC_ADDR30:
9413 case R_PPC_EMB_RELSEC16:
9414 case R_PPC_EMB_RELST_LO:
9415 case R_PPC_EMB_RELST_HI:
9416 case R_PPC_EMB_RELST_HA:
9417 case R_PPC_EMB_BIT_FLD:
25f53a85 9418 info->callbacks->einfo
695344c0 9419 /* xgettext:c-format */
871b3ab2 9420 (_("%P: %pB: relocation %s is not yet supported for symbol %s\n"),
d003868e 9421 input_bfd,
7619e7c7
AM
9422 howto->name,
9423 sym_name);
252b5132
RH
9424
9425 bfd_set_error (bfd_error_invalid_operation);
b34976b6 9426 ret = FALSE;
c316a17c 9427 goto copy_reloc;
7619e7c7 9428 }
252b5132 9429
7619e7c7
AM
9430 /* Do any further special processing. */
9431 switch (r_type)
9432 {
9433 default:
9434 break;
9435
9436 case R_PPC_ADDR16_HA:
d7128ce4 9437 case R_PPC_REL16_HA:
a680de9a 9438 case R_PPC_REL16DX_HA:
7619e7c7
AM
9439 case R_PPC_SECTOFF_HA:
9440 case R_PPC_TPREL16_HA:
9441 case R_PPC_DTPREL16_HA:
7619e7c7
AM
9442 case R_PPC_EMB_NADDR16_HA:
9443 case R_PPC_EMB_RELST_HA:
9444 /* It's just possible that this symbol is a weak symbol
7b609f53 9445 that's not actually defined anywhere. In that case,
7619e7c7
AM
9446 'sec' would be NULL, and we should leave the symbol
9447 alone (it will be set to zero elsewhere in the link). */
5c5f6e17
AM
9448 if (sec == NULL)
9449 break;
1a0670f3 9450 /* Fall through. */
5c5f6e17
AM
9451
9452 case R_PPC_PLT16_HA:
9453 case R_PPC_GOT16_HA:
9454 case R_PPC_GOT_TLSGD16_HA:
9455 case R_PPC_GOT_TLSLD16_HA:
9456 case R_PPC_GOT_TPREL16_HA:
9457 case R_PPC_GOT_DTPREL16_HA:
9458 /* Add 0x10000 if sign bit in 0:15 is set.
9459 Bits 0:15 are not used. */
9460 addend += 0x8000;
7619e7c7 9461 break;
1fe532cf
AM
9462
9463 case R_PPC_ADDR16:
9464 case R_PPC_ADDR16_LO:
9465 case R_PPC_GOT16:
9466 case R_PPC_GOT16_LO:
9467 case R_PPC_SDAREL16:
9468 case R_PPC_SECTOFF:
9469 case R_PPC_SECTOFF_LO:
9470 case R_PPC_DTPREL16:
9471 case R_PPC_DTPREL16_LO:
9472 case R_PPC_TPREL16:
9473 case R_PPC_TPREL16_LO:
9474 case R_PPC_GOT_TLSGD16:
9475 case R_PPC_GOT_TLSGD16_LO:
9476 case R_PPC_GOT_TLSLD16:
9477 case R_PPC_GOT_TLSLD16_LO:
9478 case R_PPC_GOT_DTPREL16:
9479 case R_PPC_GOT_DTPREL16_LO:
9480 case R_PPC_GOT_TPREL16:
9481 case R_PPC_GOT_TPREL16_LO:
9482 {
9483 /* The 32-bit ABI lacks proper relocations to deal with
9484 certain 64-bit instructions. Prevent damage to bits
9485 that make up part of the insn opcode. */
9486 unsigned int insn, mask, lobit;
9487
95f0d0d2 9488 insn = bfd_get_32 (input_bfd,
c316a17c 9489 contents + rel->r_offset - d_offset);
1fe532cf
AM
9490 mask = 0;
9491 if (is_insn_ds_form (insn))
9492 mask = 3;
9493 else if (is_insn_dq_form (insn))
9494 mask = 15;
9495 else
9496 break;
a680de9a
PB
9497 relocation += addend;
9498 addend = insn & mask;
9499 lobit = mask & relocation;
1fe532cf
AM
9500 if (lobit != 0)
9501 {
a680de9a 9502 relocation ^= lobit;
1fe532cf 9503 info->callbacks->einfo
695344c0 9504 /* xgettext:c-format */
174d0a74 9505 (_("%H: error: %s against `%s' not a multiple of %u\n"),
1fe532cf
AM
9506 input_bfd, input_section, rel->r_offset,
9507 howto->name, sym_name, mask + 1);
9508 bfd_set_error (bfd_error_bad_value);
9509 ret = FALSE;
9510 }
1fe532cf
AM
9511 }
9512 break;
252b5132
RH
9513 }
9514
252b5132 9515#ifdef DEBUG
55fd94b0
AM
9516 fprintf (stderr, "\ttype = %s (%d), name = %s, symbol index = %ld, "
9517 "offset = %ld, addend = %ld\n",
252b5132 9518 howto->name,
8da6118f 9519 (int) r_type,
252b5132
RH
9520 sym_name,
9521 r_symndx,
7619e7c7 9522 (long) rel->r_offset,
8da6118f 9523 (long) addend);
252b5132
RH
9524#endif
9525
7619e7c7
AM
9526 if (unresolved_reloc
9527 && !((input_section->flags & SEC_DEBUGGING) != 0
1d5316ab
AM
9528 && h->def_dynamic)
9529 && _bfd_elf_section_offset (output_bfd, info, input_section,
9530 rel->r_offset) != (bfd_vma) -1)
7619e7c7 9531 {
25f53a85 9532 info->callbacks->einfo
695344c0 9533 /* xgettext:c-format */
174d0a74 9534 (_("%H: unresolvable %s relocation against symbol `%s'\n"),
25f53a85 9535 input_bfd, input_section, rel->r_offset,
7b609f53 9536 howto->name,
7619e7c7
AM
9537 sym_name);
9538 ret = FALSE;
9539 }
9540
86c95733
AM
9541 /* 16-bit fields in insns mostly have signed values, but a
9542 few insns have 16-bit unsigned values. Really, we should
9543 have different reloc types. */
9544 if (howto->complain_on_overflow != complain_overflow_dont
9545 && howto->dst_mask == 0xffff
9546 && (input_section->flags & SEC_CODE) != 0)
9547 {
9548 enum complain_overflow complain = complain_overflow_signed;
9549
9550 if ((elf_section_flags (input_section) & SHF_PPC_VLE) == 0)
9551 {
9552 unsigned int insn;
9553
9554 insn = bfd_get_32 (input_bfd, contents + (rel->r_offset & ~3));
a47622ac
AM
9555 if ((insn & (0x3f << 26)) == 10u << 26 /* cmpli */)
9556 complain = complain_overflow_bitfield;
9557 else if ((insn & (0x3f << 26)) == 28u << 26 /* andi */
9558 || (insn & (0x3f << 26)) == 24u << 26 /* ori */
9559 || (insn & (0x3f << 26)) == 26u << 26 /* xori */)
86c95733
AM
9560 complain = complain_overflow_unsigned;
9561 }
9562 if (howto->complain_on_overflow != complain)
9563 {
9564 alt_howto = *howto;
9565 alt_howto.complain_on_overflow = complain;
9566 howto = &alt_howto;
9567 }
9568 }
9569
a680de9a
PB
9570 if (r_type == R_PPC_REL16DX_HA)
9571 {
9572 /* Split field reloc isn't handled by _bfd_final_link_relocate. */
9573 if (rel->r_offset + 4 > input_section->size)
9574 r = bfd_reloc_outofrange;
9575 else
9576 {
9577 unsigned int insn;
9578
9579 relocation += addend;
9580 relocation -= (rel->r_offset
9581 + input_section->output_offset
9582 + input_section->output_section->vma);
9583 relocation >>= 16;
9584 insn = bfd_get_32 (input_bfd, contents + rel->r_offset);
9585 insn &= ~0x1fffc1;
9586 insn |= (relocation & 0xffc1) | ((relocation & 0x3e) << 15);
9587 bfd_put_32 (input_bfd, insn, contents + rel->r_offset);
9588 r = bfd_reloc_ok;
9589 }
9590 }
9591 else
9592 r = _bfd_final_link_relocate (howto, input_bfd, input_section, contents,
9593 rel->r_offset, relocation, addend);
252b5132 9594
7619e7c7 9595 if (r != bfd_reloc_ok)
252b5132 9596 {
7619e7c7 9597 if (r == bfd_reloc_overflow)
252b5132 9598 {
c3301df1 9599 overflow:
8131c122
AM
9600 /* On code like "if (foo) foo();" don't report overflow
9601 on a branch to zero when foo is undefined. */
9602 if (!warned
9603 && !(h != NULL
9604 && (h->root.type == bfd_link_hash_undefweak
9605 || h->root.type == bfd_link_hash_undefined)
9606 && is_branch_reloc (r_type)))
1a72702b
AM
9607 info->callbacks->reloc_overflow
9608 (info, (h ? &h->root : NULL), sym_name, howto->name,
9609 rel->r_addend, input_bfd, input_section, rel->r_offset);
dc1bc0c9
RH
9610 }
9611 else
9612 {
25f53a85 9613 info->callbacks->einfo
695344c0 9614 /* xgettext:c-format */
174d0a74 9615 (_("%H: %s reloc against `%s': error %d\n"),
25f53a85
AM
9616 input_bfd, input_section, rel->r_offset,
9617 howto->name, sym_name, (int) r);
7619e7c7 9618 ret = FALSE;
252b5132
RH
9619 }
9620 }
c316a17c
AM
9621 copy_reloc:
9622 if (wrel != rel)
9623 *wrel = *rel;
9624 }
9625
9626 if (wrel != rel)
9627 {
9628 Elf_Internal_Shdr *rel_hdr;
9629 size_t deleted = rel - wrel;
9630
9631 rel_hdr = _bfd_elf_single_rel_hdr (input_section->output_section);
9632 rel_hdr->sh_size -= rel_hdr->sh_entsize * deleted;
9633 if (rel_hdr->sh_size == 0)
9634 {
9635 /* It is too late to remove an empty reloc section. Leave
9636 one NONE reloc.
9637 ??? What is wrong with an empty section??? */
9638 rel_hdr->sh_size = rel_hdr->sh_entsize;
9639 deleted -= 1;
9640 wrel++;
9641 }
9642 relend = wrel;
9643 rel_hdr = _bfd_elf_single_rel_hdr (input_section);
9644 rel_hdr->sh_size -= rel_hdr->sh_entsize * deleted;
9645 input_section->reloc_count -= deleted;
252b5132
RH
9646 }
9647
252b5132
RH
9648#ifdef DEBUG
9649 fprintf (stderr, "\n");
9650#endif
9651
53291d1f
AM
9652 if (input_section->sec_info_type == SEC_INFO_TYPE_TARGET
9653 && input_section->size != input_section->rawsize
9654 && (strcmp (input_section->output_section->name, ".init") == 0
9655 || strcmp (input_section->output_section->name, ".fini") == 0))
9656 {
9657 /* Branch around the trampolines. */
9658 unsigned int insn = B + input_section->size - input_section->rawsize;
9659 bfd_put_32 (input_bfd, insn, contents + input_section->rawsize);
9660 }
9661
5446cbdf 9662 if (htab->params->ppc476_workaround
795bc6b3 9663 && input_section->sec_info_type == SEC_INFO_TYPE_TARGET
0e1862bb 9664 && (!bfd_link_relocatable (info)
795bc6b3
AM
9665 || (input_section->output_section->alignment_power
9666 >= htab->params->pagesize_p2)))
5446cbdf 9667 {
5446cbdf 9668 bfd_vma start_addr, end_addr, addr;
795bc6b3 9669 bfd_vma pagesize = (bfd_vma) 1 << htab->params->pagesize_p2;
5446cbdf 9670
5446cbdf 9671 if (relax_info->workaround_size != 0)
40fd06d1
AM
9672 {
9673 bfd_byte *p;
9674 unsigned int n;
9675 bfd_byte fill[4];
9676
9677 bfd_put_32 (input_bfd, BA, fill);
9678 p = contents + input_section->size - relax_info->workaround_size;
9679 n = relax_info->workaround_size >> 2;
9680 while (n--)
9681 {
9682 memcpy (p, fill, 4);
9683 p += 4;
9684 }
9685 }
5446cbdf
AM
9686
9687 /* The idea is: Replace the last instruction on a page with a
9688 branch to a patch area. Put the insn there followed by a
9689 branch back to the next page. Complicated a little by
9690 needing to handle moved conditional branches, and by not
9691 wanting to touch data-in-text. */
9692
9693 start_addr = (input_section->output_section->vma
9694 + input_section->output_offset);
9695 end_addr = (start_addr + input_section->size
9696 - relax_info->workaround_size);
9697 for (addr = ((start_addr & -pagesize) + pagesize - 4);
9698 addr < end_addr;
9699 addr += pagesize)
9700 {
9701 bfd_vma offset = addr - start_addr;
9702 Elf_Internal_Rela *lo, *hi;
9703 bfd_boolean is_data;
9704 bfd_vma patch_off, patch_addr;
9705 unsigned int insn;
9706
9707 /* Do we have a data reloc at this offset? If so, leave
9708 the word alone. */
9709 is_data = FALSE;
9710 lo = relocs;
668e22e5
AM
9711 hi = relend;
9712 rel = NULL;
5446cbdf
AM
9713 while (lo < hi)
9714 {
9715 rel = lo + (hi - lo) / 2;
9716 if (rel->r_offset < offset)
9717 lo = rel + 1;
668e22e5 9718 else if (rel->r_offset > offset + 3)
5446cbdf
AM
9719 hi = rel;
9720 else
9721 {
9722 switch (ELF32_R_TYPE (rel->r_info))
9723 {
9724 case R_PPC_ADDR32:
9725 case R_PPC_UADDR32:
9726 case R_PPC_REL32:
9727 case R_PPC_ADDR30:
9728 is_data = TRUE;
9729 break;
9730 default:
9731 break;
9732 }
9733 break;
9734 }
9735 }
9736 if (is_data)
9737 continue;
9738
b4ab4364
AM
9739 /* Some instructions can be left alone too. Unconditional
9740 branches, except for bcctr with BO=0x14 (bctr, bctrl),
9741 avoid the icache failure.
9742
9743 The problem occurs due to prefetch across a page boundary
9744 where stale instructions can be fetched from the next
9745 page, and the mechanism for flushing these bad
9746 instructions fails under certain circumstances. The
9747 unconditional branches:
9748 1) Branch: b, bl, ba, bla,
9749 2) Branch Conditional: bc, bca, bcl, bcla,
9750 3) Branch Conditional to Link Register: bclr, bclrl,
9751 where (2) and (3) have BO=0x14 making them unconditional,
9752 prevent the bad prefetch because the prefetch itself is
9753 affected by these instructions. This happens even if the
9754 instruction is not executed.
9755
9756 A bctr example:
9757 .
9758 . lis 9,new_page@ha
9759 . addi 9,9,new_page@l
9760 . mtctr 9
9761 . bctr
9762 . nop
9763 . nop
9764 . new_page:
9765 .
9766 The bctr is not predicted taken due to ctr not being
9767 ready, so prefetch continues on past the bctr into the
9768 new page which might have stale instructions. If they
9769 fail to be flushed, then they will be executed after the
9770 bctr executes. Either of the following modifications
9771 prevent the bad prefetch from happening in the first
9772 place:
9773 .
1b786873
L
9774 . lis 9,new_page@ha lis 9,new_page@ha
9775 . addi 9,9,new_page@l addi 9,9,new_page@l
9776 . mtctr 9 mtctr 9
9777 . bctr bctr
b4ab4364 9778 . nop b somewhere_else
1b786873
L
9779 . b somewhere_else nop
9780 . new_page: new_page:
b4ab4364 9781 . */
5446cbdf 9782 insn = bfd_get_32 (input_bfd, contents + offset);
07d6d2b8
AM
9783 if ((insn & (0x3f << 26)) == (18u << 26) /* b,bl,ba,bla */
9784 || ((insn & (0x3f << 26)) == (16u << 26) /* bc,bcl,bca,bcla*/
9785 && (insn & (0x14 << 21)) == (0x14 << 21)) /* with BO=0x14 */
5446cbdf 9786 || ((insn & (0x3f << 26)) == (19u << 26)
b4ab4364 9787 && (insn & (0x3ff << 1)) == (16u << 1) /* bclr,bclrl */
07d6d2b8 9788 && (insn & (0x14 << 21)) == (0x14 << 21)))/* with BO=0x14 */
5446cbdf
AM
9789 continue;
9790
9791 patch_addr = (start_addr + input_section->size
9792 - relax_info->workaround_size);
9793 patch_addr = (patch_addr + 15) & -16;
9794 patch_off = patch_addr - start_addr;
9795 bfd_put_32 (input_bfd, B + patch_off - offset, contents + offset);
668e22e5
AM
9796
9797 if (rel != NULL
9798 && rel->r_offset >= offset
9799 && rel->r_offset < offset + 4)
9800 {
f8b44781
AM
9801 asection *sreloc;
9802
668e22e5
AM
9803 /* If the insn we are patching had a reloc, adjust the
9804 reloc r_offset so that the reloc applies to the moved
9805 location. This matters for -r and --emit-relocs. */
9806 if (rel + 1 != relend)
9807 {
9808 Elf_Internal_Rela tmp = *rel;
9809
9810 /* Keep the relocs sorted by r_offset. */
9811 memmove (rel, rel + 1, (relend - (rel + 1)) * sizeof (*rel));
9812 relend[-1] = tmp;
9813 }
9814 relend[-1].r_offset += patch_off - offset;
f8b44781
AM
9815
9816 /* Adjust REL16 addends too. */
9817 switch (ELF32_R_TYPE (relend[-1].r_info))
9818 {
9819 case R_PPC_REL16:
9820 case R_PPC_REL16_LO:
9821 case R_PPC_REL16_HI:
9822 case R_PPC_REL16_HA:
9823 relend[-1].r_addend += patch_off - offset;
9824 break;
9825 default:
9826 break;
9827 }
9828
9829 /* If we are building a PIE or shared library with
9830 non-PIC objects, perhaps we had a dynamic reloc too?
9831 If so, the dynamic reloc must move with the insn. */
9832 sreloc = elf_section_data (input_section)->sreloc;
9833 if (sreloc != NULL)
9834 {
1d5c94cb 9835 Elf32_External_Rela *slo, *shi, *srelend;
f8b44781
AM
9836 bfd_vma soffset;
9837
1d5c94cb
AM
9838 slo = (Elf32_External_Rela *) sreloc->contents;
9839 shi = srelend = slo + sreloc->reloc_count;
f8b44781
AM
9840 soffset = (offset + input_section->output_section->vma
9841 + input_section->output_offset);
9842 while (slo < shi)
9843 {
1d5c94cb
AM
9844 Elf32_External_Rela *srel = slo + (shi - slo) / 2;
9845 bfd_elf32_swap_reloca_in (output_bfd, (bfd_byte *) srel,
9846 &outrel);
f8b44781
AM
9847 if (outrel.r_offset < soffset)
9848 slo = srel + 1;
9849 else if (outrel.r_offset > soffset + 3)
9850 shi = srel;
9851 else
9852 {
1d5c94cb 9853 if (srel + 1 != srelend)
f8b44781 9854 {
1d5c94cb
AM
9855 memmove (srel, srel + 1,
9856 (srelend - (srel + 1)) * sizeof (*srel));
9857 srel = srelend - 1;
f8b44781
AM
9858 }
9859 outrel.r_offset += patch_off - offset;
1d5c94cb
AM
9860 bfd_elf32_swap_reloca_out (output_bfd, &outrel,
9861 (bfd_byte *) srel);
f8b44781
AM
9862 break;
9863 }
9864 }
9865 }
668e22e5
AM
9866 }
9867 else
9868 rel = NULL;
9869
5446cbdf
AM
9870 if ((insn & (0x3f << 26)) == (16u << 26) /* bc */
9871 && (insn & 2) == 0 /* relative */)
9872 {
9873 bfd_vma delta = ((insn & 0xfffc) ^ 0x8000) - 0x8000;
9874
9875 delta += offset - patch_off;
0e1862bb 9876 if (bfd_link_relocatable (info) && rel != NULL)
668e22e5 9877 delta = 0;
0e1862bb 9878 if (!bfd_link_relocatable (info) && rel != NULL)
668e22e5
AM
9879 {
9880 enum elf_ppc_reloc_type r_type;
9881
9882 r_type = ELF32_R_TYPE (relend[-1].r_info);
9883 if (r_type == R_PPC_REL14_BRTAKEN)
9884 insn |= BRANCH_PREDICT_BIT;
9885 else if (r_type == R_PPC_REL14_BRNTAKEN)
9886 insn &= ~BRANCH_PREDICT_BIT;
9887 else
9888 BFD_ASSERT (r_type == R_PPC_REL14);
9889
9890 if ((r_type == R_PPC_REL14_BRTAKEN
9891 || r_type == R_PPC_REL14_BRNTAKEN)
9892 && delta + 0x8000 < 0x10000
9893 && (bfd_signed_vma) delta < 0)
9894 insn ^= BRANCH_PREDICT_BIT;
9895 }
5446cbdf
AM
9896 if (delta + 0x8000 < 0x10000)
9897 {
9898 bfd_put_32 (input_bfd,
9899 (insn & ~0xfffc) | (delta & 0xfffc),
9900 contents + patch_off);
9901 patch_off += 4;
9902 bfd_put_32 (input_bfd,
9903 B | ((offset + 4 - patch_off) & 0x3fffffc),
9904 contents + patch_off);
9905 patch_off += 4;
9906 }
9907 else
9908 {
668e22e5
AM
9909 if (rel != NULL)
9910 {
9911 unsigned int r_sym = ELF32_R_SYM (relend[-1].r_info);
9912
9913 relend[-1].r_offset += 8;
9914 relend[-1].r_info = ELF32_R_INFO (r_sym, R_PPC_REL24);
9915 }
5446cbdf
AM
9916 bfd_put_32 (input_bfd,
9917 (insn & ~0xfffc) | 8,
9918 contents + patch_off);
9919 patch_off += 4;
9920 bfd_put_32 (input_bfd,
9921 B | ((offset + 4 - patch_off) & 0x3fffffc),
9922 contents + patch_off);
9923 patch_off += 4;
9924 bfd_put_32 (input_bfd,
9925 B | ((delta - 8) & 0x3fffffc),
9926 contents + patch_off);
9927 patch_off += 4;
9928 }
9929 }
9930 else
9931 {
9932 bfd_put_32 (input_bfd, insn, contents + patch_off);
9933 patch_off += 4;
9934 bfd_put_32 (input_bfd,
9935 B | ((offset + 4 - patch_off) & 0x3fffffc),
9936 contents + patch_off);
9937 patch_off += 4;
9938 }
9939 BFD_ASSERT (patch_off <= input_section->size);
9940 relax_info->workaround_size = input_section->size - patch_off;
9941 }
9942 }
9943
252b5132
RH
9944 return ret;
9945}
252b5132 9946\f
25dbc73a
AM
9947/* Finish up dynamic symbol handling. We set the contents of various
9948 dynamic sections here. */
c5fccbec 9949
b34976b6 9950static bfd_boolean
25dbc73a
AM
9951ppc_elf_finish_dynamic_symbol (bfd *output_bfd,
9952 struct bfd_link_info *info,
9953 struct elf_link_hash_entry *h,
9954 Elf_Internal_Sym *sym)
e1a9cb8e 9955{
25dbc73a 9956 struct ppc_elf_link_hash_table *htab;
a6aa5195
AM
9957 struct plt_entry *ent;
9958 bfd_boolean doneone;
e1a9cb8e 9959
25dbc73a
AM
9960#ifdef DEBUG
9961 fprintf (stderr, "ppc_elf_finish_dynamic_symbol called for %s",
9962 h->root.root.string);
9963#endif
e1a9cb8e 9964
25dbc73a
AM
9965 htab = ppc_elf_hash_table (info);
9966 BFD_ASSERT (htab->elf.dynobj != NULL);
e1a9cb8e 9967
a6aa5195
AM
9968 doneone = FALSE;
9969 for (ent = h->plt.plist; ent != NULL; ent = ent->next)
9970 if (ent->plt.offset != (bfd_vma) -1)
9971 {
9972 if (!doneone)
9973 {
9974 Elf_Internal_Rela rela;
9975 bfd_byte *loc;
9976 bfd_vma reloc_index;
e1a9cb8e 9977
e054468f 9978 if (htab->plt_type == PLT_NEW
25f23106
AM
9979 || !htab->elf.dynamic_sections_created
9980 || h->dynindx == -1)
9d8504b1
PB
9981 reloc_index = ent->plt.offset / 4;
9982 else
9983 {
9984 reloc_index = ((ent->plt.offset - htab->plt_initial_entry_size)
9985 / htab->plt_slot_size);
9986 if (reloc_index > PLT_NUM_SINGLE_ENTRIES
4a3dc543 9987 && htab->plt_type == PLT_OLD)
9d8504b1
PB
9988 reloc_index -= (reloc_index - PLT_NUM_SINGLE_ENTRIES) / 2;
9989 }
9990
a6aa5195
AM
9991 /* This symbol has an entry in the procedure linkage table.
9992 Set it up. */
e054468f 9993 if (htab->plt_type == PLT_VXWORKS
25f23106
AM
9994 && htab->elf.dynamic_sections_created
9995 && h->dynindx != -1)
a6aa5195 9996 {
9d8504b1
PB
9997 bfd_vma got_offset;
9998 const bfd_vma *plt_entry;
5b914448 9999
9d8504b1
PB
10000 /* The first three entries in .got.plt are reserved. */
10001 got_offset = (reloc_index + 3) * 4;
10002
10003 /* Use the right PLT. */
0e1862bb 10004 plt_entry = bfd_link_pic (info) ? ppc_elf_vxworks_pic_plt_entry
9d8504b1
PB
10005 : ppc_elf_vxworks_plt_entry;
10006
10007 /* Fill in the .plt on VxWorks. */
0e1862bb 10008 if (bfd_link_pic (info))
9d8504b1 10009 {
9d8504b1 10010 bfd_put_32 (output_bfd,
e87d4038 10011 plt_entry[0] | PPC_HA (got_offset),
ce558b89 10012 htab->elf.splt->contents + ent->plt.offset + 0);
9d8504b1 10013 bfd_put_32 (output_bfd,
e87d4038 10014 plt_entry[1] | PPC_LO (got_offset),
ce558b89 10015 htab->elf.splt->contents + ent->plt.offset + 4);
9d8504b1
PB
10016 }
10017 else
10018 {
e87d4038 10019 bfd_vma got_loc = got_offset + SYM_VAL (htab->elf.hgot);
9d8504b1
PB
10020
10021 bfd_put_32 (output_bfd,
e87d4038 10022 plt_entry[0] | PPC_HA (got_loc),
ce558b89 10023 htab->elf.splt->contents + ent->plt.offset + 0);
9d8504b1 10024 bfd_put_32 (output_bfd,
e87d4038 10025 plt_entry[1] | PPC_LO (got_loc),
ce558b89 10026 htab->elf.splt->contents + ent->plt.offset + 4);
9d8504b1
PB
10027 }
10028
10029 bfd_put_32 (output_bfd, plt_entry[2],
ce558b89 10030 htab->elf.splt->contents + ent->plt.offset + 8);
9d8504b1 10031 bfd_put_32 (output_bfd, plt_entry[3],
ce558b89 10032 htab->elf.splt->contents + ent->plt.offset + 12);
9d8504b1
PB
10033
10034 /* This instruction is an immediate load. The value loaded is
10035 the byte offset of the R_PPC_JMP_SLOT relocation from the
10036 start of the .rela.plt section. The value is stored in the
10037 low-order 16 bits of the load instruction. */
10038 /* NOTE: It appears that this is now an index rather than a
10039 prescaled offset. */
5b914448 10040 bfd_put_32 (output_bfd,
9d8504b1 10041 plt_entry[4] | reloc_index,
ce558b89 10042 htab->elf.splt->contents + ent->plt.offset + 16);
9d8504b1
PB
10043 /* This instruction is a PC-relative branch whose target is
10044 the start of the PLT section. The address of this branch
10045 instruction is 20 bytes beyond the start of this PLT entry.
10046 The address is encoded in bits 6-29, inclusive. The value
10047 stored is right-shifted by two bits, permitting a 26-bit
10048 offset. */
5b914448
AM
10049 bfd_put_32 (output_bfd,
10050 (plt_entry[5]
9d8504b1 10051 | (-(ent->plt.offset + 20) & 0x03fffffc)),
ce558b89 10052 htab->elf.splt->contents + ent->plt.offset + 20);
9d8504b1 10053 bfd_put_32 (output_bfd, plt_entry[6],
ce558b89 10054 htab->elf.splt->contents + ent->plt.offset + 24);
9d8504b1 10055 bfd_put_32 (output_bfd, plt_entry[7],
ce558b89 10056 htab->elf.splt->contents + ent->plt.offset + 28);
9d8504b1
PB
10057
10058 /* Fill in the GOT entry corresponding to this PLT slot with
a8685210 10059 the address immediately after the "bctr" instruction
9d8504b1 10060 in this PLT entry. */
ce558b89
AM
10061 bfd_put_32 (output_bfd, (htab->elf.splt->output_section->vma
10062 + htab->elf.splt->output_offset
9d8504b1 10063 + ent->plt.offset + 16),
ce558b89 10064 htab->elf.sgotplt->contents + got_offset);
9d8504b1 10065
0e1862bb 10066 if (!bfd_link_pic (info))
9d8504b1
PB
10067 {
10068 /* Fill in a couple of entries in .rela.plt.unloaded. */
10069 loc = htab->srelplt2->contents
10070 + ((VXWORKS_PLTRESOLVE_RELOCS + reloc_index
10071 * VXWORKS_PLT_NON_JMP_SLOT_RELOCS)
10072 * sizeof (Elf32_External_Rela));
10073
10074 /* Provide the @ha relocation for the first instruction. */
ce558b89
AM
10075 rela.r_offset = (htab->elf.splt->output_section->vma
10076 + htab->elf.splt->output_offset
9d8504b1 10077 + ent->plt.offset + 2);
636ce3f5 10078 rela.r_info = ELF32_R_INFO (htab->elf.hgot->indx,
9d8504b1
PB
10079 R_PPC_ADDR16_HA);
10080 rela.r_addend = got_offset;
10081 bfd_elf32_swap_reloca_out (output_bfd, &rela, loc);
10082 loc += sizeof (Elf32_External_Rela);
10083
10084 /* Provide the @l relocation for the second instruction. */
ce558b89
AM
10085 rela.r_offset = (htab->elf.splt->output_section->vma
10086 + htab->elf.splt->output_offset
9d8504b1 10087 + ent->plt.offset + 6);
636ce3f5 10088 rela.r_info = ELF32_R_INFO (htab->elf.hgot->indx,
9d8504b1
PB
10089 R_PPC_ADDR16_LO);
10090 rela.r_addend = got_offset;
10091 bfd_elf32_swap_reloca_out (output_bfd, &rela, loc);
10092 loc += sizeof (Elf32_External_Rela);
10093
10094 /* Provide a relocation for the GOT entry corresponding to this
10095 PLT slot. Point it at the middle of the .plt entry. */
ce558b89
AM
10096 rela.r_offset = (htab->elf.sgotplt->output_section->vma
10097 + htab->elf.sgotplt->output_offset
9d8504b1 10098 + got_offset);
7325306f 10099 rela.r_info = ELF32_R_INFO (htab->elf.hplt->indx,
9d8504b1
PB
10100 R_PPC_ADDR32);
10101 rela.r_addend = ent->plt.offset + 16;
10102 bfd_elf32_swap_reloca_out (output_bfd, &rela, loc);
10103 }
10104
10105 /* VxWorks uses non-standard semantics for R_PPC_JMP_SLOT.
10106 In particular, the offset for the relocation is not the
10107 address of the PLT entry for this function, as specified
10108 by the ABI. Instead, the offset is set to the address of
10109 the GOT slot for this function. See EABI 4.4.4.1. */
ce558b89
AM
10110 rela.r_offset = (htab->elf.sgotplt->output_section->vma
10111 + htab->elf.sgotplt->output_offset
9d8504b1
PB
10112 + got_offset);
10113
a6aa5195
AM
10114 }
10115 else
10116 {
ce558b89 10117 asection *splt = htab->elf.splt;
25f23106
AM
10118 if (!htab->elf.dynamic_sections_created
10119 || h->dynindx == -1)
ce558b89 10120 splt = htab->elf.iplt;
e054468f
AM
10121
10122 rela.r_offset = (splt->output_section->vma
10123 + splt->output_offset
9d8504b1 10124 + ent->plt.offset);
e054468f 10125 if (htab->plt_type == PLT_OLD
25f23106
AM
10126 || !htab->elf.dynamic_sections_created
10127 || h->dynindx == -1)
9d8504b1
PB
10128 {
10129 /* We don't need to fill in the .plt. The ppc dynamic
10130 linker will fill it in. */
10131 }
10132 else
10133 {
10134 bfd_vma val = (htab->glink_pltresolve + ent->plt.offset
10135 + htab->glink->output_section->vma
10136 + htab->glink->output_offset);
10137 bfd_put_32 (output_bfd, val,
e054468f 10138 splt->contents + ent->plt.offset);
9d8504b1 10139 }
a6aa5195 10140 }
e1a9cb8e 10141
a6aa5195 10142 /* Fill in the entry in the .rela.plt section. */
a6aa5195 10143 rela.r_addend = 0;
e054468f
AM
10144 if (!htab->elf.dynamic_sections_created
10145 || h->dynindx == -1)
10146 {
10147 BFD_ASSERT (h->type == STT_GNU_IFUNC
10148 && h->def_regular
10149 && (h->root.type == bfd_link_hash_defined
10150 || h->root.type == bfd_link_hash_defweak));
10151 rela.r_info = ELF32_R_INFO (0, R_PPC_IRELATIVE);
10152 rela.r_addend = SYM_VAL (h);
10153 }
10154 else
10155 rela.r_info = ELF32_R_INFO (h->dynindx, R_PPC_JMP_SLOT);
e1a9cb8e 10156
25f23106
AM
10157 if (!htab->elf.dynamic_sections_created
10158 || h->dynindx == -1)
82e66161
AM
10159 {
10160 loc = (htab->elf.irelplt->contents
10161 + (htab->elf.irelplt->reloc_count++
10162 * sizeof (Elf32_External_Rela)));
10163 htab->local_ifunc_resolver = 1;
10164 }
e054468f 10165 else
82e66161
AM
10166 {
10167 loc = (htab->elf.srelplt->contents
10168 + reloc_index * sizeof (Elf32_External_Rela));
10169 if (h->type == STT_GNU_IFUNC && is_static_defined (h))
10170 htab->maybe_local_ifunc_resolver = 1;
10171 }
a6aa5195 10172 bfd_elf32_swap_reloca_out (output_bfd, &rela, loc);
e1a9cb8e 10173
a6aa5195
AM
10174 if (!h->def_regular)
10175 {
0eb4a168
AM
10176 /* Mark the symbol as undefined, rather than as
10177 defined in the .plt section. Leave the value if
10178 there were any relocations where pointer equality
10179 matters (this is a clue for the dynamic linker, to
10180 make function pointer comparisons work between an
10181 application and shared library), otherwise set it
10182 to zero. */
a6aa5195 10183 sym->st_shndx = SHN_UNDEF;
0eb4a168 10184 if (!h->pointer_equality_needed)
a6aa5195 10185 sym->st_value = 0;
0eb4a168
AM
10186 else if (!h->ref_regular_nonweak)
10187 {
625af618
AM
10188 /* This breaks function pointer comparisons, but
10189 that is better than breaking tests for a NULL
0eb4a168 10190 function pointer. */
0eb4a168
AM
10191 sym->st_value = 0;
10192 }
a6aa5195 10193 }
de972ffa 10194 else if (h->type == STT_GNU_IFUNC
0e1862bb 10195 && !bfd_link_pic (info))
de972ffa
AM
10196 {
10197 /* Set the value of ifunc symbols in a non-pie
10198 executable to the glink entry. This is to avoid
10199 text relocations. We can't do this for ifunc in
10200 allocate_dynrelocs, as we do for normal dynamic
10201 function symbols with plt entries, because we need
10202 to keep the original value around for the ifunc
10203 relocation. */
10204 sym->st_shndx = (_bfd_elf_section_from_bfd_section
10205 (output_bfd, htab->glink->output_section));
5b914448
AM
10206 sym->st_value = (ent->glink_offset
10207 + htab->glink->output_offset
de972ffa
AM
10208 + htab->glink->output_section->vma);
10209 }
a6aa5195
AM
10210 doneone = TRUE;
10211 }
e1a9cb8e 10212
e054468f 10213 if (htab->plt_type == PLT_NEW
25f23106
AM
10214 || !htab->elf.dynamic_sections_created
10215 || h->dynindx == -1)
a6aa5195 10216 {
a7f2871e 10217 unsigned char *p;
ce558b89 10218 asection *splt = htab->elf.splt;
9e390558 10219
25f23106
AM
10220 if (!htab->elf.dynamic_sections_created
10221 || h->dynindx == -1)
ce558b89 10222 splt = htab->elf.iplt;
e1a9cb8e 10223
a7f2871e 10224 p = (unsigned char *) htab->glink->contents + ent->glink_offset;
9e390558 10225 write_glink_stub (h, ent, splt, p, info);
e1a9cb8e 10226
0e1862bb 10227 if (!bfd_link_pic (info))
e054468f
AM
10228 /* We only need one non-PIC glink stub. */
10229 break;
a6aa5195
AM
10230 }
10231 else
10232 break;
10233 }
e1a9cb8e 10234
25dbc73a
AM
10235 if (h->needs_copy)
10236 {
10237 asection *s;
10238 Elf_Internal_Rela rela;
10239 bfd_byte *loc;
e1a9cb8e 10240
25dbc73a 10241 /* This symbols needs a copy reloc. Set it up. */
e1a9cb8e 10242
25dbc73a
AM
10243#ifdef DEBUG
10244 fprintf (stderr, ", copy");
10245#endif
e1a9cb8e 10246
25dbc73a 10247 BFD_ASSERT (h->dynindx != -1);
86bbe32f 10248
4dc4a9a5 10249 if (ppc_elf_hash_entry (h)->has_sda_refs)
25dbc73a 10250 s = htab->relsbss;
afbf7e8e 10251 else if (h->root.u.def.section == htab->elf.sdynrelro)
5474d94f 10252 s = htab->elf.sreldynrelro;
25dbc73a 10253 else
9d19e4fd 10254 s = htab->elf.srelbss;
25dbc73a 10255 BFD_ASSERT (s != NULL);
e1a9cb8e 10256
e87d4038 10257 rela.r_offset = SYM_VAL (h);
25dbc73a
AM
10258 rela.r_info = ELF32_R_INFO (h->dynindx, R_PPC_COPY);
10259 rela.r_addend = 0;
10260 loc = s->contents + s->reloc_count++ * sizeof (Elf32_External_Rela);
10261 bfd_elf32_swap_reloca_out (output_bfd, &rela, loc);
10262 }
e1a9cb8e 10263
25dbc73a
AM
10264#ifdef DEBUG
10265 fprintf (stderr, "\n");
10266#endif
e1a9cb8e 10267
25dbc73a
AM
10268 return TRUE;
10269}
10270\f
10271static enum elf_reloc_type_class
7e612e98
AM
10272ppc_elf_reloc_type_class (const struct bfd_link_info *info,
10273 const asection *rel_sec,
10274 const Elf_Internal_Rela *rela)
e1a9cb8e 10275{
7e612e98
AM
10276 struct ppc_elf_link_hash_table *htab = ppc_elf_hash_table (info);
10277
ce558b89 10278 if (rel_sec == htab->elf.irelplt)
7e612e98
AM
10279 return reloc_class_ifunc;
10280
25dbc73a
AM
10281 switch (ELF32_R_TYPE (rela->r_info))
10282 {
10283 case R_PPC_RELATIVE:
10284 return reloc_class_relative;
25dbc73a
AM
10285 case R_PPC_JMP_SLOT:
10286 return reloc_class_plt;
10287 case R_PPC_COPY:
10288 return reloc_class_copy;
10289 default:
10290 return reloc_class_normal;
10291 }
e1a9cb8e 10292}
25dbc73a
AM
10293\f
10294/* Finish up the dynamic sections. */
e1a9cb8e 10295
25dbc73a
AM
10296static bfd_boolean
10297ppc_elf_finish_dynamic_sections (bfd *output_bfd,
10298 struct bfd_link_info *info)
e1a9cb8e 10299{
25dbc73a
AM
10300 asection *sdyn;
10301 struct ppc_elf_link_hash_table *htab;
1fe44d79 10302 bfd_vma got;
e87d4038
AM
10303 bfd *dynobj;
10304 bfd_boolean ret = TRUE;
e1a9cb8e 10305
25dbc73a
AM
10306#ifdef DEBUG
10307 fprintf (stderr, "ppc_elf_finish_dynamic_sections called\n");
10308#endif
6b0817e5 10309
25dbc73a 10310 htab = ppc_elf_hash_table (info);
ce558b89 10311 dynobj = htab->elf.dynobj;
3d4d4302 10312 sdyn = bfd_get_linker_section (dynobj, ".dynamic");
e1a9cb8e 10313
1fe44d79
AM
10314 got = 0;
10315 if (htab->elf.hgot != NULL)
e87d4038 10316 got = SYM_VAL (htab->elf.hgot);
1fe44d79 10317
25dbc73a 10318 if (htab->elf.dynamic_sections_created)
e1a9cb8e 10319 {
25dbc73a 10320 Elf32_External_Dyn *dyncon, *dynconend;
e1a9cb8e 10321
ce558b89 10322 BFD_ASSERT (htab->elf.splt != NULL && sdyn != NULL);
86bbe32f 10323
25dbc73a
AM
10324 dyncon = (Elf32_External_Dyn *) sdyn->contents;
10325 dynconend = (Elf32_External_Dyn *) (sdyn->contents + sdyn->size);
10326 for (; dyncon < dynconend; dyncon++)
10327 {
10328 Elf_Internal_Dyn dyn;
10329 asection *s;
e1a9cb8e 10330
9d8504b1 10331 bfd_elf32_swap_dyn_in (dynobj, dyncon, &dyn);
86bbe32f 10332
25dbc73a
AM
10333 switch (dyn.d_tag)
10334 {
10335 case DT_PLTGOT:
9d8504b1 10336 if (htab->is_vxworks)
ce558b89 10337 s = htab->elf.sgotplt;
9d8504b1 10338 else
ce558b89 10339 s = htab->elf.splt;
25dbc73a
AM
10340 dyn.d_un.d_ptr = s->output_section->vma + s->output_offset;
10341 break;
86bbe32f 10342
25dbc73a 10343 case DT_PLTRELSZ:
ce558b89 10344 dyn.d_un.d_val = htab->elf.srelplt->size;
25dbc73a 10345 break;
e1a9cb8e 10346
25dbc73a 10347 case DT_JMPREL:
ce558b89 10348 s = htab->elf.srelplt;
25dbc73a
AM
10349 dyn.d_un.d_ptr = s->output_section->vma + s->output_offset;
10350 break;
2f89ff8d 10351
1fe44d79
AM
10352 case DT_PPC_GOT:
10353 dyn.d_un.d_ptr = got;
d7128ce4
AM
10354 break;
10355
82e66161
AM
10356 case DT_TEXTREL:
10357 if (htab->local_ifunc_resolver)
10358 info->callbacks->einfo
10359 (_("%X%P: text relocations and GNU indirect "
10360 "functions will result in a segfault at runtime\n"));
10361 else if (htab->maybe_local_ifunc_resolver)
10362 info->callbacks->einfo
10363 (_("%P: warning: text relocations and GNU indirect "
10364 "functions may result in a segfault at runtime\n"));
10365 continue;
10366
25dbc73a 10367 default:
7a2b07ff
NS
10368 if (htab->is_vxworks
10369 && elf_vxworks_finish_dynamic_entry (output_bfd, &dyn))
10370 break;
25dbc73a
AM
10371 continue;
10372 }
4c45e5c9 10373
25dbc73a
AM
10374 bfd_elf32_swap_dyn_out (output_bfd, &dyn, dyncon);
10375 }
10376 }
4c45e5c9 10377
6528b6eb
AM
10378 if (htab->elf.sgot != NULL
10379 && htab->elf.sgot->output_section != bfd_abs_section_ptr)
25dbc73a 10380 {
ce558b89
AM
10381 if (htab->elf.hgot->root.u.def.section == htab->elf.sgot
10382 || htab->elf.hgot->root.u.def.section == htab->elf.sgotplt)
e87d4038 10383 {
e79f5955 10384 unsigned char *p = htab->elf.hgot->root.u.def.section->contents;
2f89ff8d 10385
e87d4038
AM
10386 p += htab->elf.hgot->root.u.def.value;
10387 if (htab->plt_type == PLT_OLD)
e79f5955
AM
10388 {
10389 /* Add a blrl instruction at _GLOBAL_OFFSET_TABLE_-4
10390 so that a function can easily find the address of
10391 _GLOBAL_OFFSET_TABLE_. */
10392 BFD_ASSERT (htab->elf.hgot->root.u.def.value - 4
10393 < htab->elf.hgot->root.u.def.section->size);
10394 bfd_put_32 (output_bfd, 0x4e800021, p - 4);
10395 }
3b36f7e6 10396
e87d4038 10397 if (sdyn != NULL)
e79f5955
AM
10398 {
10399 bfd_vma val = sdyn->output_section->vma + sdyn->output_offset;
10400 BFD_ASSERT (htab->elf.hgot->root.u.def.value
10401 < htab->elf.hgot->root.u.def.section->size);
10402 bfd_put_32 (output_bfd, val, p);
10403 }
e87d4038
AM
10404 }
10405 else
10406 {
695344c0 10407 /* xgettext:c-format */
8de848d8 10408 info->callbacks->einfo (_("%P: %s not defined in linker created %s\n"),
25f53a85 10409 htab->elf.hgot->root.root.string,
ce558b89
AM
10410 (htab->elf.sgotplt != NULL
10411 ? htab->elf.sgotplt->name
10412 : htab->elf.sgot->name));
e87d4038
AM
10413 bfd_set_error (bfd_error_bad_value);
10414 ret = FALSE;
10415 }
25dbc73a 10416
ce558b89 10417 elf_section_data (htab->elf.sgot->output_section)->this_hdr.sh_entsize = 4;
25dbc73a
AM
10418 }
10419
9d8504b1 10420 /* Fill in the first entry in the VxWorks procedure linkage table. */
6528b6eb
AM
10421 if (htab->is_vxworks
10422 && htab->elf.splt != NULL
10423 && htab->elf.splt->size != 0
10424 && htab->elf.splt->output_section != bfd_abs_section_ptr)
9d8504b1 10425 {
6528b6eb 10426 asection *splt = htab->elf.splt;
9d8504b1 10427 /* Use the right PLT. */
0e1862bb 10428 const bfd_vma *plt_entry = (bfd_link_pic (info)
5b914448
AM
10429 ? ppc_elf_vxworks_pic_plt0_entry
10430 : ppc_elf_vxworks_plt0_entry);
9d8504b1 10431
0e1862bb 10432 if (!bfd_link_pic (info))
9d8504b1 10433 {
e87d4038 10434 bfd_vma got_value = SYM_VAL (htab->elf.hgot);
9d8504b1 10435
e87d4038 10436 bfd_put_32 (output_bfd, plt_entry[0] | PPC_HA (got_value),
9d8504b1 10437 splt->contents + 0);
e87d4038 10438 bfd_put_32 (output_bfd, plt_entry[1] | PPC_LO (got_value),
9d8504b1
PB
10439 splt->contents + 4);
10440 }
10441 else
10442 {
10443 bfd_put_32 (output_bfd, plt_entry[0], splt->contents + 0);
10444 bfd_put_32 (output_bfd, plt_entry[1], splt->contents + 4);
10445 }
10446 bfd_put_32 (output_bfd, plt_entry[2], splt->contents + 8);
10447 bfd_put_32 (output_bfd, plt_entry[3], splt->contents + 12);
10448 bfd_put_32 (output_bfd, plt_entry[4], splt->contents + 16);
10449 bfd_put_32 (output_bfd, plt_entry[5], splt->contents + 20);
10450 bfd_put_32 (output_bfd, plt_entry[6], splt->contents + 24);
10451 bfd_put_32 (output_bfd, plt_entry[7], splt->contents + 28);
10452
0e1862bb 10453 if (! bfd_link_pic (info))
9d8504b1
PB
10454 {
10455 Elf_Internal_Rela rela;
10456 bfd_byte *loc;
10457
10458 loc = htab->srelplt2->contents;
10459
10460 /* Output the @ha relocation for the first instruction. */
ce558b89
AM
10461 rela.r_offset = (htab->elf.splt->output_section->vma
10462 + htab->elf.splt->output_offset
9d8504b1 10463 + 2);
636ce3f5 10464 rela.r_info = ELF32_R_INFO (htab->elf.hgot->indx, R_PPC_ADDR16_HA);
9d8504b1
PB
10465 rela.r_addend = 0;
10466 bfd_elf32_swap_reloca_out (output_bfd, &rela, loc);
10467 loc += sizeof (Elf32_External_Rela);
5b914448 10468
9d8504b1 10469 /* Output the @l relocation for the second instruction. */
ce558b89
AM
10470 rela.r_offset = (htab->elf.splt->output_section->vma
10471 + htab->elf.splt->output_offset
9d8504b1 10472 + 6);
636ce3f5 10473 rela.r_info = ELF32_R_INFO (htab->elf.hgot->indx, R_PPC_ADDR16_LO);
9d8504b1
PB
10474 rela.r_addend = 0;
10475 bfd_elf32_swap_reloca_out (output_bfd, &rela, loc);
10476 loc += sizeof (Elf32_External_Rela);
10477
10478 /* Fix up the remaining relocations. They may have the wrong
10479 symbol index for _G_O_T_ or _P_L_T_ depending on the order
10480 in which symbols were output. */
10481 while (loc < htab->srelplt2->contents + htab->srelplt2->size)
10482 {
10483 Elf_Internal_Rela rel;
10484
10485 bfd_elf32_swap_reloc_in (output_bfd, loc, &rel);
636ce3f5 10486 rel.r_info = ELF32_R_INFO (htab->elf.hgot->indx, R_PPC_ADDR16_HA);
9d8504b1
PB
10487 bfd_elf32_swap_reloc_out (output_bfd, &rel, loc);
10488 loc += sizeof (Elf32_External_Rela);
10489
10490 bfd_elf32_swap_reloc_in (output_bfd, loc, &rel);
636ce3f5 10491 rel.r_info = ELF32_R_INFO (htab->elf.hgot->indx, R_PPC_ADDR16_LO);
9d8504b1
PB
10492 bfd_elf32_swap_reloc_out (output_bfd, &rel, loc);
10493 loc += sizeof (Elf32_External_Rela);
10494
10495 bfd_elf32_swap_reloc_in (output_bfd, loc, &rel);
7325306f 10496 rel.r_info = ELF32_R_INFO (htab->elf.hplt->indx, R_PPC_ADDR32);
9d8504b1
PB
10497 bfd_elf32_swap_reloc_out (output_bfd, &rel, loc);
10498 loc += sizeof (Elf32_External_Rela);
10499 }
10500 }
10501 }
10502
e054468f
AM
10503 if (htab->glink != NULL
10504 && htab->glink->contents != NULL
10505 && htab->elf.dynamic_sections_created)
d7128ce4
AM
10506 {
10507 unsigned char *p;
10508 unsigned char *endp;
a6aa5195 10509 bfd_vma res0;
a6aa5195
AM
10510
10511 /*
10512 * PIC glink code is the following:
10513 *
10514 * # ith PLT code stub.
10515 * addis 11,30,(plt+(i-1)*4-got)@ha
10516 * lwz 11,(plt+(i-1)*4-got)@l(11)
10517 * mtctr 11
10518 * bctr
10519 *
10520 * # A table of branches, one for each plt entry.
176a0d42 10521 * # The idea is that the plt call stub loads ctr and r11 with these
a6aa5195
AM
10522 * # addresses, so (r11 - res_0) gives the plt index * 4.
10523 * res_0: b PLTresolve
10524 * res_1: b PLTresolve
10525 * .
10526 * # Some number of entries towards the end can be nops
10527 * res_n_m3: nop
10528 * res_n_m2: nop
10529 * res_n_m1:
10530 *
10531 * PLTresolve:
10532 * addis 11,11,(1f-res_0)@ha
10533 * mflr 0
10534 * bcl 20,31,1f
10535 * 1: addi 11,11,(1b-res_0)@l
10536 * mflr 12
10537 * mtlr 0
07d6d2b8 10538 * sub 11,11,12 # r11 = index * 4
a6aa5195 10539 * addis 12,12,(got+4-1b)@ha
07d6d2b8
AM
10540 * lwz 0,(got+4-1b)@l(12) # got[1] address of dl_runtime_resolve
10541 * lwz 12,(got+8-1b)@l(12) # got[2] contains the map address
a6aa5195
AM
10542 * mtctr 0
10543 * add 0,11,11
07d6d2b8 10544 * add 11,0,11 # r11 = index * 12 = reloc offset.
a6aa5195 10545 * bctr
9e390558 10546 *
176a0d42
AM
10547 * Non-PIC glink code is a little simpler.
10548 *
10549 * # ith PLT code stub.
10550 * lis 11,(plt+(i-1)*4)@ha
10551 * lwz 11,(plt+(i-1)*4)@l(11)
10552 * mtctr 11
10553 * bctr
10554 *
10555 * The branch table is the same, then comes
10556 *
10557 * PLTresolve:
10558 * lis 12,(got+4)@ha
10559 * addis 11,11,(-res_0)@ha
07d6d2b8
AM
10560 * lwz 0,(got+4)@l(12) # got[1] address of dl_runtime_resolve
10561 * addi 11,11,(-res_0)@l # r11 = index * 4
176a0d42
AM
10562 * mtctr 0
10563 * add 0,11,11
07d6d2b8
AM
10564 * lwz 12,(got+8)@l(12) # got[2] contains the map address
10565 * add 11,0,11 # r11 = index * 12 = reloc offset.
176a0d42
AM
10566 * bctr
10567 */
7e8aeb9a 10568
a6aa5195 10569 /* Build the branch table, one for each plt entry (less one),
86b9da88 10570 and perhaps some padding. */
a6aa5195
AM
10571 p = htab->glink->contents;
10572 p += htab->glink_pltresolve;
86b9da88
AM
10573 endp = htab->glink->contents;
10574 endp += htab->glink->size - GLINK_PLTRESOLVE;
da3a2088 10575 while (p < endp - (htab->params->ppc476_workaround ? 0 : 8 * 4))
86b9da88
AM
10576 {
10577 bfd_put_32 (output_bfd, B + endp - p, p);
10578 p += 4;
10579 }
10580 while (p < endp)
10581 {
10582 bfd_put_32 (output_bfd, NOP, p);
10583 p += 4;
10584 }
10585
7e8aeb9a 10586 res0 = (htab->glink_pltresolve
86b9da88
AM
10587 + htab->glink->output_section->vma
10588 + htab->glink->output_offset);
10589
da3a2088
AM
10590 if (htab->params->ppc476_workaround)
10591 {
10592 /* Ensure that a call stub at the end of a page doesn't
10593 result in prefetch over the end of the page into the
10594 glink branch table. */
10595 bfd_vma pagesize = (bfd_vma) 1 << htab->params->pagesize_p2;
10596 bfd_vma page_addr;
10597 bfd_vma glink_start = (htab->glink->output_section->vma
10598 + htab->glink->output_offset);
10599
10600 for (page_addr = res0 & -pagesize;
10601 page_addr > glink_start;
10602 page_addr -= pagesize)
10603 {
10604 /* We have a plt call stub that may need fixing. */
10605 bfd_byte *loc;
10606 unsigned int insn;
10607
10608 loc = htab->glink->contents + page_addr - 4 - glink_start;
10609 insn = bfd_get_32 (output_bfd, loc);
10610 if (insn == BCTR)
10611 {
10612 /* By alignment, we know that there must be at least
10613 one other call stub before this one. */
10614 insn = bfd_get_32 (output_bfd, loc - 16);
10615 if (insn == BCTR)
10616 bfd_put_32 (output_bfd, B | (-16 & 0x3fffffc), loc);
10617 else
10618 bfd_put_32 (output_bfd, B | (-20 & 0x3fffffc), loc);
10619 }
10620 }
10621 }
10622
86b9da88 10623 /* Last comes the PLTresolve stub. */
9e390558 10624 endp = p + GLINK_PLTRESOLVE;
0e1862bb 10625 if (bfd_link_pic (info))
7e8aeb9a 10626 {
a6aa5195 10627 bfd_vma bcl;
d7128ce4 10628
a6aa5195
AM
10629 bcl = (htab->glink->size - GLINK_PLTRESOLVE + 3*4
10630 + htab->glink->output_section->vma
10631 + htab->glink->output_offset);
10632
9e390558
AM
10633 bfd_put_32 (output_bfd, ADDIS_11_11 + PPC_HA (bcl - res0), p);
10634 p += 4;
10635 bfd_put_32 (output_bfd, MFLR_0, p);
10636 p += 4;
10637 bfd_put_32 (output_bfd, BCL_20_31, p);
10638 p += 4;
10639 bfd_put_32 (output_bfd, ADDI_11_11 + PPC_LO (bcl - res0), p);
10640 p += 4;
10641 bfd_put_32 (output_bfd, MFLR_12, p);
10642 p += 4;
10643 bfd_put_32 (output_bfd, MTLR_0, p);
10644 p += 4;
10645 bfd_put_32 (output_bfd, SUB_11_11_12, p);
10646 p += 4;
10647 bfd_put_32 (output_bfd, ADDIS_12_12 + PPC_HA (got + 4 - bcl), p);
10648 p += 4;
a6aa5195
AM
10649 if (PPC_HA (got + 4 - bcl) == PPC_HA (got + 8 - bcl))
10650 {
9e390558
AM
10651 bfd_put_32 (output_bfd, LWZ_0_12 + PPC_LO (got + 4 - bcl), p);
10652 p += 4;
10653 bfd_put_32 (output_bfd, LWZ_12_12 + PPC_LO (got + 8 - bcl), p);
10654 p += 4;
a6aa5195
AM
10655 }
10656 else
10657 {
9e390558
AM
10658 bfd_put_32 (output_bfd, LWZU_0_12 + PPC_LO (got + 4 - bcl), p);
10659 p += 4;
10660 bfd_put_32 (output_bfd, LWZ_12_12 + 4, p);
10661 p += 4;
a6aa5195 10662 }
9e390558
AM
10663 bfd_put_32 (output_bfd, MTCTR_0, p);
10664 p += 4;
10665 bfd_put_32 (output_bfd, ADD_0_11_11, p);
7e8aeb9a
AM
10666 }
10667 else
d7128ce4 10668 {
9e390558
AM
10669 bfd_put_32 (output_bfd, LIS_12 + PPC_HA (got + 4), p);
10670 p += 4;
10671 bfd_put_32 (output_bfd, ADDIS_11_11 + PPC_HA (-res0), p);
10672 p += 4;
a6aa5195 10673 if (PPC_HA (got + 4) == PPC_HA (got + 8))
9e390558 10674 bfd_put_32 (output_bfd, LWZ_0_12 + PPC_LO (got + 4), p);
a6aa5195 10675 else
9e390558
AM
10676 bfd_put_32 (output_bfd, LWZU_0_12 + PPC_LO (got + 4), p);
10677 p += 4;
10678 bfd_put_32 (output_bfd, ADDI_11_11 + PPC_LO (-res0), p);
10679 p += 4;
10680 bfd_put_32 (output_bfd, MTCTR_0, p);
10681 p += 4;
10682 bfd_put_32 (output_bfd, ADD_0_11_11, p);
10683 p += 4;
10684 if (PPC_HA (got + 4) == PPC_HA (got + 8))
10685 bfd_put_32 (output_bfd, LWZ_12_12 + PPC_LO (got + 8), p);
10686 else
10687 bfd_put_32 (output_bfd, LWZ_12_12 + 4, p);
10688 }
10689 p += 4;
10690 bfd_put_32 (output_bfd, ADD_11_0_11, p);
10691 p += 4;
407aa07c
AM
10692 bfd_put_32 (output_bfd, BCTR, p);
10693 p += 4;
9e390558
AM
10694 while (p < endp)
10695 {
10696 bfd_put_32 (output_bfd,
10697 htab->params->ppc476_workaround ? BA : NOP, p);
10698 p += 4;
d7128ce4 10699 }
9e390558 10700 BFD_ASSERT (p == endp);
d7128ce4
AM
10701 }
10702
6177242a
AM
10703 if (htab->glink_eh_frame != NULL
10704 && htab->glink_eh_frame->contents != NULL)
10705 {
10706 unsigned char *p = htab->glink_eh_frame->contents;
10707 bfd_vma val;
10708
6177242a
AM
10709 p += sizeof (glink_eh_frame_cie);
10710 /* FDE length. */
6177242a
AM
10711 p += 4;
10712 /* CIE pointer. */
6177242a
AM
10713 p += 4;
10714 /* Offset to .glink. */
10715 val = (htab->glink->output_section->vma
10716 + htab->glink->output_offset);
10717 val -= (htab->glink_eh_frame->output_section->vma
10718 + htab->glink_eh_frame->output_offset);
10719 val -= p - htab->glink_eh_frame->contents;
10720 bfd_put_32 (htab->elf.dynobj, val, p);
6177242a 10721
dbaa2011 10722 if (htab->glink_eh_frame->sec_info_type == SEC_INFO_TYPE_EH_FRAME
6177242a
AM
10723 && !_bfd_elf_write_section_eh_frame (output_bfd, info,
10724 htab->glink_eh_frame,
10725 htab->glink_eh_frame->contents))
10726 return FALSE;
10727 }
10728
e87d4038 10729 return ret;
25dbc73a 10730}
e1a9cb8e 10731\f
6d00b590 10732#define TARGET_LITTLE_SYM powerpc_elf32_le_vec
252b5132 10733#define TARGET_LITTLE_NAME "elf32-powerpcle"
6d00b590 10734#define TARGET_BIG_SYM powerpc_elf32_vec
252b5132
RH
10735#define TARGET_BIG_NAME "elf32-powerpc"
10736#define ELF_ARCH bfd_arch_powerpc
ae95ffa6 10737#define ELF_TARGET_ID PPC32_ELF_DATA
252b5132 10738#define ELF_MACHINE_CODE EM_PPC
d0facd1b
NC
10739#ifdef __QNXTARGET__
10740#define ELF_MAXPAGESIZE 0x1000
04c6a44c 10741#define ELF_COMMONPAGESIZE 0x1000
d0facd1b 10742#else
252b5132 10743#define ELF_MAXPAGESIZE 0x10000
04c6a44c 10744#define ELF_COMMONPAGESIZE 0x10000
d0facd1b 10745#endif
b1342370 10746#define ELF_MINPAGESIZE 0x1000
252b5132
RH
10747#define elf_info_to_howto ppc_elf_info_to_howto
10748
10749#ifdef EM_CYGNUS_POWERPC
10750#define ELF_MACHINE_ALT1 EM_CYGNUS_POWERPC
10751#endif
10752
10753#ifdef EM_PPC_OLD
10754#define ELF_MACHINE_ALT2 EM_PPC_OLD
10755#endif
10756
10757#define elf_backend_plt_not_loaded 1
5474d94f 10758#define elf_backend_want_dynrelro 1
252b5132 10759#define elf_backend_can_gc_sections 1
51b64d56 10760#define elf_backend_can_refcount 1
b491616a 10761#define elf_backend_rela_normal 1
53291d1f 10762#define elf_backend_caches_rawsize 1
252b5132 10763
43c40ab2 10764#define bfd_elf32_mkobject ppc_elf_mkobject
252b5132 10765#define bfd_elf32_bfd_merge_private_bfd_data ppc_elf_merge_private_bfd_data
70bccea4 10766#define bfd_elf32_bfd_relax_section ppc_elf_relax_section
252b5132 10767#define bfd_elf32_bfd_reloc_type_lookup ppc_elf_reloc_type_lookup
b9c361e0 10768#define bfd_elf32_bfd_reloc_name_lookup ppc_elf_reloc_name_lookup
252b5132 10769#define bfd_elf32_bfd_set_private_flags ppc_elf_set_private_flags
70bccea4 10770#define bfd_elf32_bfd_link_hash_table_create ppc_elf_link_hash_table_create
468392fb 10771#define bfd_elf32_get_synthetic_symtab ppc_elf_get_synthetic_symtab
252b5132 10772
feee612b 10773#define elf_backend_object_p ppc_elf_object_p
252b5132 10774#define elf_backend_gc_mark_hook ppc_elf_gc_mark_hook
252b5132
RH
10775#define elf_backend_section_from_shdr ppc_elf_section_from_shdr
10776#define elf_backend_relocate_section ppc_elf_relocate_section
10777#define elf_backend_create_dynamic_sections ppc_elf_create_dynamic_sections
10778#define elf_backend_check_relocs ppc_elf_check_relocs
c0e331c7 10779#define elf_backend_relocs_compatible _bfd_elf_relocs_compatible
7fce784e 10780#define elf_backend_copy_indirect_symbol ppc_elf_copy_indirect_symbol
252b5132
RH
10781#define elf_backend_adjust_dynamic_symbol ppc_elf_adjust_dynamic_symbol
10782#define elf_backend_add_symbol_hook ppc_elf_add_symbol_hook
10783#define elf_backend_size_dynamic_sections ppc_elf_size_dynamic_sections
0eb4a168 10784#define elf_backend_hash_symbol ppc_elf_hash_symbol
252b5132
RH
10785#define elf_backend_finish_dynamic_symbol ppc_elf_finish_dynamic_symbol
10786#define elf_backend_finish_dynamic_sections ppc_elf_finish_dynamic_sections
10787#define elf_backend_fake_sections ppc_elf_fake_sections
10788#define elf_backend_additional_program_headers ppc_elf_additional_program_headers
954b63d4 10789#define elf_backend_modify_segment_map ppc_elf_modify_segment_map
c5fccbec
DJ
10790#define elf_backend_grok_prstatus ppc_elf_grok_prstatus
10791#define elf_backend_grok_psinfo ppc_elf_grok_psinfo
183e98be 10792#define elf_backend_write_core_note ppc_elf_write_core_note
29c2fb7c 10793#define elf_backend_reloc_type_class ppc_elf_reloc_type_class
70bccea4
AM
10794#define elf_backend_begin_write_processing ppc_elf_begin_write_processing
10795#define elf_backend_final_write_processing ppc_elf_final_write_processing
10796#define elf_backend_write_section ppc_elf_write_section
551b43fd 10797#define elf_backend_get_sec_type_attr ppc_elf_get_sec_type_attr
4c45e5c9 10798#define elf_backend_plt_sym_val ppc_elf_plt_sym_val
8a696751 10799#define elf_backend_action_discarded ppc_elf_action_discarded
74541ad4 10800#define elf_backend_init_index_section _bfd_elf_init_1_index_section
b9c361e0 10801#define elf_backend_lookup_section_flags_hook ppc_elf_lookup_section_flags
252b5132
RH
10802
10803#include "elf32-target.h"
9d8504b1 10804
7b8e7dad
AM
10805/* FreeBSD Target */
10806
10807#undef TARGET_LITTLE_SYM
10808#undef TARGET_LITTLE_NAME
10809
10810#undef TARGET_BIG_SYM
6d00b590 10811#define TARGET_BIG_SYM powerpc_elf32_fbsd_vec
7b8e7dad
AM
10812#undef TARGET_BIG_NAME
10813#define TARGET_BIG_NAME "elf32-powerpc-freebsd"
10814
10815#undef ELF_OSABI
10816#define ELF_OSABI ELFOSABI_FREEBSD
10817
10818#undef elf32_bed
10819#define elf32_bed elf32_powerpc_fbsd_bed
10820
10821#include "elf32-target.h"
10822
9d8504b1
PB
10823/* VxWorks Target */
10824
10825#undef TARGET_LITTLE_SYM
10826#undef TARGET_LITTLE_NAME
10827
10828#undef TARGET_BIG_SYM
6d00b590 10829#define TARGET_BIG_SYM powerpc_elf32_vxworks_vec
9d8504b1
PB
10830#undef TARGET_BIG_NAME
10831#define TARGET_BIG_NAME "elf32-powerpc-vxworks"
10832
7b8e7dad
AM
10833#undef ELF_OSABI
10834
d5e3d971
PB
10835/* VxWorks uses the elf default section flags for .plt. */
10836static const struct bfd_elf_special_section *
4aef7643 10837ppc_elf_vxworks_get_sec_type_attr (bfd *abfd, asection *sec)
9d8504b1 10838{
d5e3d971
PB
10839 if (sec->name == NULL)
10840 return NULL;
10841
10842 if (strcmp (sec->name, ".plt") == 0)
10843 return _bfd_elf_get_sec_type_attr (abfd, sec);
10844
10845 return ppc_elf_get_sec_type_attr (abfd, sec);
10846}
9d8504b1
PB
10847
10848/* Like ppc_elf_link_hash_table_create, but overrides
10849 appropriately for VxWorks. */
10850static struct bfd_link_hash_table *
10851ppc_elf_vxworks_link_hash_table_create (bfd *abfd)
10852{
10853 struct bfd_link_hash_table *ret;
10854
10855 ret = ppc_elf_link_hash_table_create (abfd);
10856 if (ret)
10857 {
10858 struct ppc_elf_link_hash_table *htab
954b63d4 10859 = (struct ppc_elf_link_hash_table *)ret;
9d8504b1 10860 htab->is_vxworks = 1;
4a3dc543 10861 htab->plt_type = PLT_VXWORKS;
9d8504b1
PB
10862 htab->plt_entry_size = VXWORKS_PLT_ENTRY_SIZE;
10863 htab->plt_slot_size = VXWORKS_PLT_ENTRY_SIZE;
10864 htab->plt_initial_entry_size = VXWORKS_PLT_INITIAL_ENTRY_SIZE;
10865 }
10866 return ret;
10867}
10868
10869/* Tweak magic VxWorks symbols as they are loaded. */
10870static bfd_boolean
10871ppc_elf_vxworks_add_symbol_hook (bfd *abfd,
10872 struct bfd_link_info *info,
10873 Elf_Internal_Sym *sym,
4aef7643
AM
10874 const char **namep,
10875 flagword *flagsp,
9d8504b1
PB
10876 asection **secp,
10877 bfd_vma *valp)
10878{
4aef7643
AM
10879 if (!elf_vxworks_add_symbol_hook (abfd, info, sym, namep, flagsp, secp,
10880 valp))
9d8504b1
PB
10881 return FALSE;
10882
4aef7643 10883 return ppc_elf_add_symbol_hook (abfd, info, sym, namep, flagsp, secp, valp);
9d8504b1
PB
10884}
10885
9d8504b1
PB
10886static void
10887ppc_elf_vxworks_final_write_processing (bfd *abfd, bfd_boolean linker)
10888{
4aef7643
AM
10889 ppc_elf_final_write_processing (abfd, linker);
10890 elf_vxworks_final_write_processing (abfd, linker);
9d8504b1
PB
10891}
10892
10893/* On VxWorks, we emit relocations against _PROCEDURE_LINKAGE_TABLE_, so
10894 define it. */
10895#undef elf_backend_want_plt_sym
10896#define elf_backend_want_plt_sym 1
10897#undef elf_backend_want_got_plt
10898#define elf_backend_want_got_plt 1
10899#undef elf_backend_got_symbol_offset
10900#define elf_backend_got_symbol_offset 0
10901#undef elf_backend_plt_not_loaded
10902#define elf_backend_plt_not_loaded 0
10903#undef elf_backend_plt_readonly
10904#define elf_backend_plt_readonly 1
10905#undef elf_backend_got_header_size
10906#define elf_backend_got_header_size 12
64f52338
AM
10907#undef elf_backend_dtrel_excludes_plt
10908#define elf_backend_dtrel_excludes_plt 1
9d8504b1 10909
468392fb
AM
10910#undef bfd_elf32_get_synthetic_symtab
10911
9d8504b1
PB
10912#undef bfd_elf32_bfd_link_hash_table_create
10913#define bfd_elf32_bfd_link_hash_table_create \
10914 ppc_elf_vxworks_link_hash_table_create
9d8504b1
PB
10915#undef elf_backend_add_symbol_hook
10916#define elf_backend_add_symbol_hook \
10917 ppc_elf_vxworks_add_symbol_hook
10918#undef elf_backend_link_output_symbol_hook
10919#define elf_backend_link_output_symbol_hook \
9c72ff84 10920 elf_vxworks_link_output_symbol_hook
9d8504b1
PB
10921#undef elf_backend_final_write_processing
10922#define elf_backend_final_write_processing \
10923 ppc_elf_vxworks_final_write_processing
d5e3d971
PB
10924#undef elf_backend_get_sec_type_attr
10925#define elf_backend_get_sec_type_attr \
10926 ppc_elf_vxworks_get_sec_type_attr
9d8504b1
PB
10927#undef elf_backend_emit_relocs
10928#define elf_backend_emit_relocs \
10929 elf_vxworks_emit_relocs
10930
10931#undef elf32_bed
10932#define elf32_bed ppc_elf_vxworks_bed
e054468f 10933#undef elf_backend_post_process_headers
9d8504b1
PB
10934
10935#include "elf32-target.h"
This page took 1.971418 seconds and 4 git commands to generate.