i386-gnu-nat: Use ptid from regcache instead of inferior_ptid
[deliverable/binutils-gdb.git] / bfd / elf32-ppc.c
CommitLineData
252b5132 1/* PowerPC-specific support for 32-bit ELF
2571583a 2 Copyright (C) 1994-2017 Free Software Foundation, Inc.
252b5132
RH
3 Written by Ian Lance Taylor, Cygnus Support.
4
ae9a127f 5 This file is part of BFD, the Binary File Descriptor library.
252b5132 6
ae9a127f
NC
7 This program is free software; you can redistribute it and/or modify
8 it under the terms of the GNU General Public License as published by
cd123cb7 9 the Free Software Foundation; either version 3 of the License, or
ae9a127f 10 (at your option) any later version.
252b5132 11
ae9a127f
NC
12 This program is distributed in the hope that it will be useful,
13 but WITHOUT ANY WARRANTY; without even the implied warranty of
14 MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
15 GNU General Public License for more details.
252b5132 16
ae9a127f 17 You should have received a copy of the GNU General Public License
fc0bffd6 18 along with this program; if not, write to the
3e110533 19 Free Software Foundation, Inc., 51 Franklin Street - Fifth Floor,
53e09e0a 20 Boston, MA 02110-1301, USA. */
252b5132 21
cd123cb7 22
252b5132
RH
23/* This file is based on a preliminary PowerPC ELF ABI. The
24 information may not match the final PowerPC ELF ABI. It includes
25 suggestions from the in-progress Embedded PowerPC ABI, and that
26 information may also not match. */
27
3db64b00 28#include "sysdep.h"
183e98be 29#include <stdarg.h>
252b5132 30#include "bfd.h"
252b5132
RH
31#include "bfdlink.h"
32#include "libbfd.h"
33#include "elf-bfd.h"
34#include "elf/ppc.h"
7619e7c7 35#include "elf32-ppc.h"
9d8504b1 36#include "elf-vxworks.h"
6177242a 37#include "dwarf2.h"
08dc996f 38#include "opcode/ppc.h"
252b5132 39
b9c361e0
JL
40typedef enum split16_format_type
41{
42 split16a_type = 0,
43 split16d_type
44}
45split16_format_type;
46
f0fe0e16 47/* RELA relocations are used here. */
252b5132 48
252b5132 49static bfd_reloc_status_type ppc_elf_addr16_ha_reloc
55fd94b0 50 (bfd *, arelent *, asymbol *, void *, asection *, bfd *, char **);
7619e7c7 51static bfd_reloc_status_type ppc_elf_unhandled_reloc
55fd94b0 52 (bfd *, arelent *, asymbol *, void *, asection *, bfd *, char **);
252b5132 53
70bccea4
AM
54/* Branch prediction bit for branch taken relocs. */
55#define BRANCH_PREDICT_BIT 0x200000
56/* Mask to set RA in memory instructions. */
57#define RA_REGISTER_MASK 0x001f0000
58/* Value to shift register by to insert RA. */
59#define RA_REGISTER_SHIFT 16
252b5132
RH
60
61/* The name of the dynamic interpreter. This is put in the .interp
62 section. */
252b5132
RH
63#define ELF_DYNAMIC_INTERPRETER "/usr/lib/ld.so.1"
64
d7128ce4 65/* For old-style PLT. */
252b5132
RH
66/* The number of single-slot PLT entries (the rest use two slots). */
67#define PLT_NUM_SINGLE_ENTRIES 8192
68
d7128ce4 69/* For new-style .glink and .plt. */
a6aa5195 70#define GLINK_PLTRESOLVE 16*4
d7128ce4 71#define GLINK_ENTRY_SIZE 4*4
a7f2871e 72#define TLS_GET_ADDR_GLINK_SIZE 12*4
d7128ce4 73
9d8504b1
PB
74/* VxWorks uses its own plt layout, filled in by the static linker. */
75
76/* The standard VxWorks PLT entry. */
77#define VXWORKS_PLT_ENTRY_SIZE 32
78static const bfd_vma ppc_elf_vxworks_plt_entry
79 [VXWORKS_PLT_ENTRY_SIZE / 4] =
80 {
81 0x3d800000, /* lis r12,0 */
82 0x818c0000, /* lwz r12,0(r12) */
83 0x7d8903a6, /* mtctr r12 */
84 0x4e800420, /* bctr */
85 0x39600000, /* li r11,0 */
86 0x48000000, /* b 14 <.PLT0resolve+0x4> */
87 0x60000000, /* nop */
88 0x60000000, /* nop */
89 };
90static const bfd_vma ppc_elf_vxworks_pic_plt_entry
91 [VXWORKS_PLT_ENTRY_SIZE / 4] =
92 {
93 0x3d9e0000, /* addis r12,r30,0 */
94 0x818c0000, /* lwz r12,0(r12) */
95 0x7d8903a6, /* mtctr r12 */
96 0x4e800420, /* bctr */
97 0x39600000, /* li r11,0 */
98 0x48000000, /* b 14 <.PLT0resolve+0x4> 14: R_PPC_REL24 .PLTresolve */
99 0x60000000, /* nop */
100 0x60000000, /* nop */
101 };
102
103/* The initial VxWorks PLT entry. */
104#define VXWORKS_PLT_INITIAL_ENTRY_SIZE 32
105static const bfd_vma ppc_elf_vxworks_plt0_entry
106 [VXWORKS_PLT_INITIAL_ENTRY_SIZE / 4] =
107 {
108 0x3d800000, /* lis r12,0 */
109 0x398c0000, /* addi r12,r12,0 */
110 0x800c0008, /* lwz r0,8(r12) */
111 0x7c0903a6, /* mtctr r0 */
112 0x818c0004, /* lwz r12,4(r12) */
113 0x4e800420, /* bctr */
114 0x60000000, /* nop */
115 0x60000000, /* nop */
116 };
117static const bfd_vma ppc_elf_vxworks_pic_plt0_entry
118 [VXWORKS_PLT_INITIAL_ENTRY_SIZE / 4] =
119 {
120 0x819e0008, /* lwz r12,8(r30) */
121 0x7d8903a6, /* mtctr r12 */
122 0x819e0004, /* lwz r12,4(r30) */
123 0x4e800420, /* bctr */
124 0x60000000, /* nop */
125 0x60000000, /* nop */
126 0x60000000, /* nop */
127 0x60000000, /* nop */
128 };
129
130/* For executables, we have some additional relocations in
131 .rela.plt.unloaded, for the kernel loader. */
132
133/* The number of non-JMP_SLOT relocations per PLT0 slot. */
134#define VXWORKS_PLT_NON_JMP_SLOT_RELOCS 3
135/* The number of relocations in the PLTResolve slot. */
136#define VXWORKS_PLTRESOLVE_RELOCS 2
137/* The number of relocations in the PLTResolve slot when when creating
138 a shared library. */
139#define VXWORKS_PLTRESOLVE_RELOCS_SHLIB 0
140
d7128ce4 141/* Some instructions. */
d7128ce4 142#define ADDIS_11_11 0x3d6b0000
a6aa5195
AM
143#define ADDIS_11_30 0x3d7e0000
144#define ADDIS_12_12 0x3d8c0000
d7128ce4 145#define ADDI_11_11 0x396b0000
d7128ce4 146#define ADD_0_11_11 0x7c0b5a14
a7f2871e 147#define ADD_3_12_2 0x7c6c1214
d7128ce4 148#define ADD_11_0_11 0x7d605a14
a6aa5195 149#define B 0x48000000
da3a2088 150#define BA 0x48000002
a6aa5195 151#define BCL_20_31 0x429f0005
d7128ce4 152#define BCTR 0x4e800420
a7f2871e
AM
153#define BEQLR 0x4d820020
154#define CMPWI_11_0 0x2c0b0000
7e8aeb9a
AM
155#define LIS_11 0x3d600000
156#define LIS_12 0x3d800000
a6aa5195
AM
157#define LWZU_0_12 0x840c0000
158#define LWZ_0_12 0x800c0000
a7f2871e 159#define LWZ_11_3 0x81630000
a6aa5195
AM
160#define LWZ_11_11 0x816b0000
161#define LWZ_11_30 0x817e0000
a7f2871e 162#define LWZ_12_3 0x81830000
a6aa5195 163#define LWZ_12_12 0x818c0000
a7f2871e
AM
164#define MR_0_3 0x7c601b78
165#define MR_3_0 0x7c030378
a6aa5195
AM
166#define MFLR_0 0x7c0802a6
167#define MFLR_12 0x7d8802a6
168#define MTCTR_0 0x7c0903a6
169#define MTCTR_11 0x7d6903a6
170#define MTLR_0 0x7c0803a6
171#define NOP 0x60000000
172#define SUB_11_11_12 0x7d6c5850
7619e7c7
AM
173
174/* Offset of tp and dtp pointers from start of TLS block. */
175#define TP_OFFSET 0x7000
176#define DTP_OFFSET 0x8000
e87d4038
AM
177
178/* The value of a defined global symbol. */
179#define SYM_VAL(SYM) \
180 ((SYM)->root.u.def.section->output_section->vma \
181 + (SYM)->root.u.def.section->output_offset \
182 + (SYM)->root.u.def.value)
7fce784e 183\f
e47cd125 184static reloc_howto_type *ppc_elf_howto_table[R_PPC_max];
252b5132 185
8da6118f 186static reloc_howto_type ppc_elf_howto_raw[] = {
252b5132
RH
187 /* This reloc does nothing. */
188 HOWTO (R_PPC_NONE, /* type */
189 0, /* rightshift */
6346d5ca
AM
190 3, /* size (0 = byte, 1 = short, 2 = long) */
191 0, /* bitsize */
b34976b6 192 FALSE, /* pc_relative */
252b5132 193 0, /* bitpos */
86c95733 194 complain_overflow_dont, /* complain_on_overflow */
252b5132
RH
195 bfd_elf_generic_reloc, /* special_function */
196 "R_PPC_NONE", /* name */
b34976b6 197 FALSE, /* partial_inplace */
252b5132
RH
198 0, /* src_mask */
199 0, /* dst_mask */
b34976b6 200 FALSE), /* pcrel_offset */
252b5132
RH
201
202 /* A standard 32 bit relocation. */
203 HOWTO (R_PPC_ADDR32, /* type */
204 0, /* rightshift */
205 2, /* size (0 = byte, 1 = short, 2 = long) */
206 32, /* bitsize */
b34976b6 207 FALSE, /* pc_relative */
252b5132 208 0, /* bitpos */
86c95733 209 complain_overflow_dont, /* complain_on_overflow */
252b5132
RH
210 bfd_elf_generic_reloc, /* special_function */
211 "R_PPC_ADDR32", /* name */
b34976b6 212 FALSE, /* partial_inplace */
252b5132
RH
213 0, /* src_mask */
214 0xffffffff, /* dst_mask */
b34976b6 215 FALSE), /* pcrel_offset */
252b5132
RH
216
217 /* An absolute 26 bit branch; the lower two bits must be zero.
218 FIXME: we don't check that, we just clear them. */
219 HOWTO (R_PPC_ADDR24, /* type */
220 0, /* rightshift */
221 2, /* size (0 = byte, 1 = short, 2 = long) */
222 26, /* bitsize */
b34976b6 223 FALSE, /* pc_relative */
252b5132 224 0, /* bitpos */
86c95733 225 complain_overflow_signed, /* complain_on_overflow */
252b5132
RH
226 bfd_elf_generic_reloc, /* special_function */
227 "R_PPC_ADDR24", /* name */
b34976b6 228 FALSE, /* partial_inplace */
252b5132
RH
229 0, /* src_mask */
230 0x3fffffc, /* dst_mask */
b34976b6 231 FALSE), /* pcrel_offset */
252b5132
RH
232
233 /* A standard 16 bit relocation. */
234 HOWTO (R_PPC_ADDR16, /* type */
235 0, /* rightshift */
236 1, /* size (0 = byte, 1 = short, 2 = long) */
237 16, /* bitsize */
b34976b6 238 FALSE, /* pc_relative */
252b5132
RH
239 0, /* bitpos */
240 complain_overflow_bitfield, /* complain_on_overflow */
241 bfd_elf_generic_reloc, /* special_function */
242 "R_PPC_ADDR16", /* name */
b34976b6 243 FALSE, /* partial_inplace */
252b5132
RH
244 0, /* src_mask */
245 0xffff, /* dst_mask */
b34976b6 246 FALSE), /* pcrel_offset */
252b5132
RH
247
248 /* A 16 bit relocation without overflow. */
249 HOWTO (R_PPC_ADDR16_LO, /* type */
250 0, /* rightshift */
251 1, /* size (0 = byte, 1 = short, 2 = long) */
252 16, /* bitsize */
b34976b6 253 FALSE, /* pc_relative */
252b5132
RH
254 0, /* bitpos */
255 complain_overflow_dont,/* complain_on_overflow */
256 bfd_elf_generic_reloc, /* special_function */
257 "R_PPC_ADDR16_LO", /* name */
b34976b6 258 FALSE, /* partial_inplace */
252b5132
RH
259 0, /* src_mask */
260 0xffff, /* dst_mask */
b34976b6 261 FALSE), /* pcrel_offset */
252b5132
RH
262
263 /* The high order 16 bits of an address. */
264 HOWTO (R_PPC_ADDR16_HI, /* type */
265 16, /* rightshift */
266 1, /* size (0 = byte, 1 = short, 2 = long) */
267 16, /* bitsize */
b34976b6 268 FALSE, /* pc_relative */
252b5132
RH
269 0, /* bitpos */
270 complain_overflow_dont, /* complain_on_overflow */
271 bfd_elf_generic_reloc, /* special_function */
272 "R_PPC_ADDR16_HI", /* name */
b34976b6 273 FALSE, /* partial_inplace */
252b5132
RH
274 0, /* src_mask */
275 0xffff, /* dst_mask */
b34976b6 276 FALSE), /* pcrel_offset */
252b5132
RH
277
278 /* The high order 16 bits of an address, plus 1 if the contents of
8da6118f 279 the low 16 bits, treated as a signed number, is negative. */
252b5132
RH
280 HOWTO (R_PPC_ADDR16_HA, /* type */
281 16, /* rightshift */
282 1, /* size (0 = byte, 1 = short, 2 = long) */
283 16, /* bitsize */
b34976b6 284 FALSE, /* pc_relative */
252b5132
RH
285 0, /* bitpos */
286 complain_overflow_dont, /* complain_on_overflow */
287 ppc_elf_addr16_ha_reloc, /* special_function */
288 "R_PPC_ADDR16_HA", /* name */
b34976b6 289 FALSE, /* partial_inplace */
252b5132
RH
290 0, /* src_mask */
291 0xffff, /* dst_mask */
b34976b6 292 FALSE), /* pcrel_offset */
252b5132
RH
293
294 /* An absolute 16 bit branch; the lower two bits must be zero.
295 FIXME: we don't check that, we just clear them. */
296 HOWTO (R_PPC_ADDR14, /* type */
297 0, /* rightshift */
298 2, /* size (0 = byte, 1 = short, 2 = long) */
299 16, /* bitsize */
b34976b6 300 FALSE, /* pc_relative */
252b5132 301 0, /* bitpos */
86c95733 302 complain_overflow_signed, /* complain_on_overflow */
252b5132
RH
303 bfd_elf_generic_reloc, /* special_function */
304 "R_PPC_ADDR14", /* name */
b34976b6 305 FALSE, /* partial_inplace */
252b5132
RH
306 0, /* src_mask */
307 0xfffc, /* dst_mask */
b34976b6 308 FALSE), /* pcrel_offset */
252b5132
RH
309
310 /* An absolute 16 bit branch, for which bit 10 should be set to
311 indicate that the branch is expected to be taken. The lower two
8da6118f 312 bits must be zero. */
252b5132
RH
313 HOWTO (R_PPC_ADDR14_BRTAKEN, /* type */
314 0, /* rightshift */
315 2, /* size (0 = byte, 1 = short, 2 = long) */
316 16, /* bitsize */
b34976b6 317 FALSE, /* pc_relative */
252b5132 318 0, /* bitpos */
86c95733 319 complain_overflow_signed, /* complain_on_overflow */
252b5132
RH
320 bfd_elf_generic_reloc, /* special_function */
321 "R_PPC_ADDR14_BRTAKEN",/* name */
b34976b6 322 FALSE, /* partial_inplace */
252b5132
RH
323 0, /* src_mask */
324 0xfffc, /* dst_mask */
b34976b6 325 FALSE), /* pcrel_offset */
252b5132
RH
326
327 /* An absolute 16 bit branch, for which bit 10 should be set to
328 indicate that the branch is not expected to be taken. The lower
329 two bits must be zero. */
330 HOWTO (R_PPC_ADDR14_BRNTAKEN, /* type */
331 0, /* rightshift */
332 2, /* size (0 = byte, 1 = short, 2 = long) */
333 16, /* bitsize */
b34976b6 334 FALSE, /* pc_relative */
252b5132 335 0, /* bitpos */
86c95733 336 complain_overflow_signed, /* complain_on_overflow */
252b5132
RH
337 bfd_elf_generic_reloc, /* special_function */
338 "R_PPC_ADDR14_BRNTAKEN",/* name */
b34976b6 339 FALSE, /* partial_inplace */
252b5132
RH
340 0, /* src_mask */
341 0xfffc, /* dst_mask */
b34976b6 342 FALSE), /* pcrel_offset */
252b5132 343
8da6118f 344 /* A relative 26 bit branch; the lower two bits must be zero. */
252b5132
RH
345 HOWTO (R_PPC_REL24, /* type */
346 0, /* rightshift */
347 2, /* size (0 = byte, 1 = short, 2 = long) */
348 26, /* bitsize */
b34976b6 349 TRUE, /* pc_relative */
252b5132
RH
350 0, /* bitpos */
351 complain_overflow_signed, /* complain_on_overflow */
352 bfd_elf_generic_reloc, /* special_function */
353 "R_PPC_REL24", /* name */
b34976b6 354 FALSE, /* partial_inplace */
252b5132
RH
355 0, /* src_mask */
356 0x3fffffc, /* dst_mask */
b34976b6 357 TRUE), /* pcrel_offset */
252b5132 358
8da6118f 359 /* A relative 16 bit branch; the lower two bits must be zero. */
252b5132
RH
360 HOWTO (R_PPC_REL14, /* type */
361 0, /* rightshift */
362 2, /* size (0 = byte, 1 = short, 2 = long) */
363 16, /* bitsize */
b34976b6 364 TRUE, /* pc_relative */
252b5132
RH
365 0, /* bitpos */
366 complain_overflow_signed, /* complain_on_overflow */
367 bfd_elf_generic_reloc, /* special_function */
368 "R_PPC_REL14", /* name */
b34976b6 369 FALSE, /* partial_inplace */
252b5132
RH
370 0, /* src_mask */
371 0xfffc, /* dst_mask */
b34976b6 372 TRUE), /* pcrel_offset */
252b5132 373
8da6118f 374 /* A relative 16 bit branch. Bit 10 should be set to indicate that
252b5132
RH
375 the branch is expected to be taken. The lower two bits must be
376 zero. */
377 HOWTO (R_PPC_REL14_BRTAKEN, /* type */
378 0, /* rightshift */
379 2, /* size (0 = byte, 1 = short, 2 = long) */
380 16, /* bitsize */
b34976b6 381 TRUE, /* pc_relative */
252b5132
RH
382 0, /* bitpos */
383 complain_overflow_signed, /* complain_on_overflow */
384 bfd_elf_generic_reloc, /* special_function */
385 "R_PPC_REL14_BRTAKEN", /* name */
b34976b6 386 FALSE, /* partial_inplace */
252b5132
RH
387 0, /* src_mask */
388 0xfffc, /* dst_mask */
b34976b6 389 TRUE), /* pcrel_offset */
252b5132 390
8da6118f 391 /* A relative 16 bit branch. Bit 10 should be set to indicate that
252b5132
RH
392 the branch is not expected to be taken. The lower two bits must
393 be zero. */
394 HOWTO (R_PPC_REL14_BRNTAKEN, /* type */
395 0, /* rightshift */
396 2, /* size (0 = byte, 1 = short, 2 = long) */
397 16, /* bitsize */
b34976b6 398 TRUE, /* pc_relative */
252b5132
RH
399 0, /* bitpos */
400 complain_overflow_signed, /* complain_on_overflow */
401 bfd_elf_generic_reloc, /* special_function */
402 "R_PPC_REL14_BRNTAKEN",/* name */
b34976b6 403 FALSE, /* partial_inplace */
252b5132
RH
404 0, /* src_mask */
405 0xfffc, /* dst_mask */
b34976b6 406 TRUE), /* pcrel_offset */
252b5132
RH
407
408 /* Like R_PPC_ADDR16, but referring to the GOT table entry for the
409 symbol. */
410 HOWTO (R_PPC_GOT16, /* type */
411 0, /* rightshift */
412 1, /* size (0 = byte, 1 = short, 2 = long) */
413 16, /* bitsize */
b34976b6 414 FALSE, /* pc_relative */
252b5132
RH
415 0, /* bitpos */
416 complain_overflow_signed, /* complain_on_overflow */
3ce51288 417 ppc_elf_unhandled_reloc, /* special_function */
252b5132 418 "R_PPC_GOT16", /* name */
b34976b6 419 FALSE, /* partial_inplace */
252b5132
RH
420 0, /* src_mask */
421 0xffff, /* dst_mask */
b34976b6 422 FALSE), /* pcrel_offset */
252b5132
RH
423
424 /* Like R_PPC_ADDR16_LO, but referring to the GOT table entry for
425 the symbol. */
426 HOWTO (R_PPC_GOT16_LO, /* type */
427 0, /* rightshift */
428 1, /* size (0 = byte, 1 = short, 2 = long) */
429 16, /* bitsize */
b34976b6 430 FALSE, /* pc_relative */
252b5132
RH
431 0, /* bitpos */
432 complain_overflow_dont, /* complain_on_overflow */
3ce51288 433 ppc_elf_unhandled_reloc, /* special_function */
252b5132 434 "R_PPC_GOT16_LO", /* name */
b34976b6 435 FALSE, /* partial_inplace */
252b5132
RH
436 0, /* src_mask */
437 0xffff, /* dst_mask */
b34976b6 438 FALSE), /* pcrel_offset */
252b5132
RH
439
440 /* Like R_PPC_ADDR16_HI, but referring to the GOT table entry for
441 the symbol. */
442 HOWTO (R_PPC_GOT16_HI, /* type */
443 16, /* rightshift */
444 1, /* size (0 = byte, 1 = short, 2 = long) */
445 16, /* bitsize */
b34976b6 446 FALSE, /* pc_relative */
252b5132 447 0, /* bitpos */
86c95733 448 complain_overflow_dont, /* complain_on_overflow */
3ce51288 449 ppc_elf_unhandled_reloc, /* special_function */
252b5132 450 "R_PPC_GOT16_HI", /* name */
b34976b6 451 FALSE, /* partial_inplace */
252b5132
RH
452 0, /* src_mask */
453 0xffff, /* dst_mask */
b34976b6 454 FALSE), /* pcrel_offset */
252b5132
RH
455
456 /* Like R_PPC_ADDR16_HA, but referring to the GOT table entry for
457 the symbol. */
458 HOWTO (R_PPC_GOT16_HA, /* type */
459 16, /* rightshift */
460 1, /* size (0 = byte, 1 = short, 2 = long) */
461 16, /* bitsize */
b34976b6 462 FALSE, /* pc_relative */
252b5132 463 0, /* bitpos */
86c95733 464 complain_overflow_dont, /* complain_on_overflow */
3ce51288 465 ppc_elf_unhandled_reloc, /* special_function */
252b5132 466 "R_PPC_GOT16_HA", /* name */
b34976b6 467 FALSE, /* partial_inplace */
252b5132
RH
468 0, /* src_mask */
469 0xffff, /* dst_mask */
b34976b6 470 FALSE), /* pcrel_offset */
252b5132
RH
471
472 /* Like R_PPC_REL24, but referring to the procedure linkage table
473 entry for the symbol. */
474 HOWTO (R_PPC_PLTREL24, /* type */
475 0, /* rightshift */
476 2, /* size (0 = byte, 1 = short, 2 = long) */
477 26, /* bitsize */
b34976b6 478 TRUE, /* pc_relative */
252b5132 479 0, /* bitpos */
3ce51288
AM
480 complain_overflow_signed, /* complain_on_overflow */
481 ppc_elf_unhandled_reloc, /* special_function */
252b5132 482 "R_PPC_PLTREL24", /* name */
b34976b6 483 FALSE, /* partial_inplace */
252b5132
RH
484 0, /* src_mask */
485 0x3fffffc, /* dst_mask */
b34976b6 486 TRUE), /* pcrel_offset */
252b5132
RH
487
488 /* This is used only by the dynamic linker. The symbol should exist
489 both in the object being run and in some shared library. The
490 dynamic linker copies the data addressed by the symbol from the
491 shared library into the object, because the object being
492 run has to have the data at some particular address. */
493 HOWTO (R_PPC_COPY, /* type */
494 0, /* rightshift */
495 2, /* size (0 = byte, 1 = short, 2 = long) */
496 32, /* bitsize */
b34976b6 497 FALSE, /* pc_relative */
252b5132 498 0, /* bitpos */
86c95733 499 complain_overflow_dont, /* complain_on_overflow */
3ce51288 500 ppc_elf_unhandled_reloc, /* special_function */
252b5132 501 "R_PPC_COPY", /* name */
b34976b6 502 FALSE, /* partial_inplace */
252b5132
RH
503 0, /* src_mask */
504 0, /* dst_mask */
b34976b6 505 FALSE), /* pcrel_offset */
252b5132
RH
506
507 /* Like R_PPC_ADDR32, but used when setting global offset table
508 entries. */
509 HOWTO (R_PPC_GLOB_DAT, /* type */
510 0, /* rightshift */
511 2, /* size (0 = byte, 1 = short, 2 = long) */
512 32, /* bitsize */
b34976b6 513 FALSE, /* pc_relative */
252b5132 514 0, /* bitpos */
86c95733 515 complain_overflow_dont, /* complain_on_overflow */
3ce51288 516 ppc_elf_unhandled_reloc, /* special_function */
252b5132 517 "R_PPC_GLOB_DAT", /* name */
b34976b6 518 FALSE, /* partial_inplace */
252b5132
RH
519 0, /* src_mask */
520 0xffffffff, /* dst_mask */
b34976b6 521 FALSE), /* pcrel_offset */
252b5132
RH
522
523 /* Marks a procedure linkage table entry for a symbol. */
524 HOWTO (R_PPC_JMP_SLOT, /* type */
525 0, /* rightshift */
526 2, /* size (0 = byte, 1 = short, 2 = long) */
527 32, /* bitsize */
b34976b6 528 FALSE, /* pc_relative */
252b5132 529 0, /* bitpos */
86c95733 530 complain_overflow_dont, /* complain_on_overflow */
3ce51288 531 ppc_elf_unhandled_reloc, /* special_function */
252b5132 532 "R_PPC_JMP_SLOT", /* name */
b34976b6 533 FALSE, /* partial_inplace */
252b5132
RH
534 0, /* src_mask */
535 0, /* dst_mask */
b34976b6 536 FALSE), /* pcrel_offset */
252b5132
RH
537
538 /* Used only by the dynamic linker. When the object is run, this
539 longword is set to the load address of the object, plus the
540 addend. */
541 HOWTO (R_PPC_RELATIVE, /* type */
542 0, /* rightshift */
543 2, /* size (0 = byte, 1 = short, 2 = long) */
544 32, /* bitsize */
b34976b6 545 FALSE, /* pc_relative */
252b5132 546 0, /* bitpos */
86c95733 547 complain_overflow_dont, /* complain_on_overflow */
252b5132
RH
548 bfd_elf_generic_reloc, /* special_function */
549 "R_PPC_RELATIVE", /* name */
b34976b6 550 FALSE, /* partial_inplace */
252b5132
RH
551 0, /* src_mask */
552 0xffffffff, /* dst_mask */
b34976b6 553 FALSE), /* pcrel_offset */
252b5132
RH
554
555 /* Like R_PPC_REL24, but uses the value of the symbol within the
556 object rather than the final value. Normally used for
557 _GLOBAL_OFFSET_TABLE_. */
558 HOWTO (R_PPC_LOCAL24PC, /* type */
559 0, /* rightshift */
560 2, /* size (0 = byte, 1 = short, 2 = long) */
561 26, /* bitsize */
b34976b6 562 TRUE, /* pc_relative */
252b5132
RH
563 0, /* bitpos */
564 complain_overflow_signed, /* complain_on_overflow */
565 bfd_elf_generic_reloc, /* special_function */
566 "R_PPC_LOCAL24PC", /* name */
b34976b6 567 FALSE, /* partial_inplace */
252b5132
RH
568 0, /* src_mask */
569 0x3fffffc, /* dst_mask */
b34976b6 570 TRUE), /* pcrel_offset */
252b5132
RH
571
572 /* Like R_PPC_ADDR32, but may be unaligned. */
573 HOWTO (R_PPC_UADDR32, /* type */
574 0, /* rightshift */
575 2, /* size (0 = byte, 1 = short, 2 = long) */
576 32, /* bitsize */
b34976b6 577 FALSE, /* pc_relative */
252b5132 578 0, /* bitpos */
86c95733 579 complain_overflow_dont, /* complain_on_overflow */
252b5132
RH
580 bfd_elf_generic_reloc, /* special_function */
581 "R_PPC_UADDR32", /* name */
b34976b6 582 FALSE, /* partial_inplace */
252b5132
RH
583 0, /* src_mask */
584 0xffffffff, /* dst_mask */
b34976b6 585 FALSE), /* pcrel_offset */
252b5132
RH
586
587 /* Like R_PPC_ADDR16, but may be unaligned. */
588 HOWTO (R_PPC_UADDR16, /* type */
589 0, /* rightshift */
590 1, /* size (0 = byte, 1 = short, 2 = long) */
591 16, /* bitsize */
b34976b6 592 FALSE, /* pc_relative */
252b5132
RH
593 0, /* bitpos */
594 complain_overflow_bitfield, /* complain_on_overflow */
595 bfd_elf_generic_reloc, /* special_function */
596 "R_PPC_UADDR16", /* name */
b34976b6 597 FALSE, /* partial_inplace */
252b5132
RH
598 0, /* src_mask */
599 0xffff, /* dst_mask */
b34976b6 600 FALSE), /* pcrel_offset */
252b5132
RH
601
602 /* 32-bit PC relative */
603 HOWTO (R_PPC_REL32, /* type */
604 0, /* rightshift */
605 2, /* size (0 = byte, 1 = short, 2 = long) */
606 32, /* bitsize */
b34976b6 607 TRUE, /* pc_relative */
252b5132 608 0, /* bitpos */
86c95733 609 complain_overflow_dont, /* complain_on_overflow */
252b5132
RH
610 bfd_elf_generic_reloc, /* special_function */
611 "R_PPC_REL32", /* name */
b34976b6 612 FALSE, /* partial_inplace */
252b5132
RH
613 0, /* src_mask */
614 0xffffffff, /* dst_mask */
b34976b6 615 TRUE), /* pcrel_offset */
252b5132
RH
616
617 /* 32-bit relocation to the symbol's procedure linkage table.
c3668558 618 FIXME: not supported. */
252b5132
RH
619 HOWTO (R_PPC_PLT32, /* type */
620 0, /* rightshift */
621 2, /* size (0 = byte, 1 = short, 2 = long) */
622 32, /* bitsize */
b34976b6 623 FALSE, /* pc_relative */
252b5132 624 0, /* bitpos */
86c95733 625 complain_overflow_dont, /* complain_on_overflow */
3ce51288 626 ppc_elf_unhandled_reloc, /* special_function */
252b5132 627 "R_PPC_PLT32", /* name */
b34976b6 628 FALSE, /* partial_inplace */
252b5132
RH
629 0, /* src_mask */
630 0, /* dst_mask */
b34976b6 631 FALSE), /* pcrel_offset */
252b5132
RH
632
633 /* 32-bit PC relative relocation to the symbol's procedure linkage table.
c3668558 634 FIXME: not supported. */
252b5132
RH
635 HOWTO (R_PPC_PLTREL32, /* type */
636 0, /* rightshift */
637 2, /* size (0 = byte, 1 = short, 2 = long) */
638 32, /* bitsize */
b34976b6 639 TRUE, /* pc_relative */
252b5132 640 0, /* bitpos */
86c95733 641 complain_overflow_dont, /* complain_on_overflow */
3ce51288 642 ppc_elf_unhandled_reloc, /* special_function */
252b5132 643 "R_PPC_PLTREL32", /* name */
b34976b6 644 FALSE, /* partial_inplace */
252b5132
RH
645 0, /* src_mask */
646 0, /* dst_mask */
b34976b6 647 TRUE), /* pcrel_offset */
252b5132
RH
648
649 /* Like R_PPC_ADDR16_LO, but referring to the PLT table entry for
650 the symbol. */
651 HOWTO (R_PPC_PLT16_LO, /* type */
652 0, /* rightshift */
653 1, /* size (0 = byte, 1 = short, 2 = long) */
654 16, /* bitsize */
b34976b6 655 FALSE, /* pc_relative */
252b5132
RH
656 0, /* bitpos */
657 complain_overflow_dont, /* complain_on_overflow */
3ce51288 658 ppc_elf_unhandled_reloc, /* special_function */
252b5132 659 "R_PPC_PLT16_LO", /* name */
b34976b6 660 FALSE, /* partial_inplace */
252b5132
RH
661 0, /* src_mask */
662 0xffff, /* dst_mask */
b34976b6 663 FALSE), /* pcrel_offset */
252b5132
RH
664
665 /* Like R_PPC_ADDR16_HI, but referring to the PLT table entry for
666 the symbol. */
667 HOWTO (R_PPC_PLT16_HI, /* type */
668 16, /* rightshift */
669 1, /* size (0 = byte, 1 = short, 2 = long) */
670 16, /* bitsize */
b34976b6 671 FALSE, /* pc_relative */
252b5132 672 0, /* bitpos */
86c95733 673 complain_overflow_dont, /* complain_on_overflow */
3ce51288 674 ppc_elf_unhandled_reloc, /* special_function */
252b5132 675 "R_PPC_PLT16_HI", /* name */
b34976b6 676 FALSE, /* partial_inplace */
252b5132
RH
677 0, /* src_mask */
678 0xffff, /* dst_mask */
b34976b6 679 FALSE), /* pcrel_offset */
252b5132
RH
680
681 /* Like R_PPC_ADDR16_HA, but referring to the PLT table entry for
682 the symbol. */
683 HOWTO (R_PPC_PLT16_HA, /* type */
684 16, /* rightshift */
685 1, /* size (0 = byte, 1 = short, 2 = long) */
686 16, /* bitsize */
b34976b6 687 FALSE, /* pc_relative */
252b5132 688 0, /* bitpos */
86c95733 689 complain_overflow_dont, /* complain_on_overflow */
3ce51288 690 ppc_elf_unhandled_reloc, /* special_function */
252b5132 691 "R_PPC_PLT16_HA", /* name */
b34976b6 692 FALSE, /* partial_inplace */
252b5132
RH
693 0, /* src_mask */
694 0xffff, /* dst_mask */
b34976b6 695 FALSE), /* pcrel_offset */
252b5132
RH
696
697 /* A sign-extended 16 bit value relative to _SDA_BASE_, for use with
698 small data items. */
699 HOWTO (R_PPC_SDAREL16, /* type */
700 0, /* rightshift */
701 1, /* size (0 = byte, 1 = short, 2 = long) */
702 16, /* bitsize */
b34976b6 703 FALSE, /* pc_relative */
252b5132
RH
704 0, /* bitpos */
705 complain_overflow_signed, /* complain_on_overflow */
3ce51288 706 ppc_elf_unhandled_reloc, /* special_function */
252b5132 707 "R_PPC_SDAREL16", /* name */
b34976b6 708 FALSE, /* partial_inplace */
252b5132
RH
709 0, /* src_mask */
710 0xffff, /* dst_mask */
b34976b6 711 FALSE), /* pcrel_offset */
252b5132 712
c061c2d8 713 /* 16-bit section relative relocation. */
252b5132
RH
714 HOWTO (R_PPC_SECTOFF, /* type */
715 0, /* rightshift */
c061c2d8
AM
716 1, /* size (0 = byte, 1 = short, 2 = long) */
717 16, /* bitsize */
b34976b6 718 FALSE, /* pc_relative */
252b5132 719 0, /* bitpos */
86c95733 720 complain_overflow_signed, /* complain_on_overflow */
3ce51288 721 ppc_elf_unhandled_reloc, /* special_function */
252b5132 722 "R_PPC_SECTOFF", /* name */
b34976b6 723 FALSE, /* partial_inplace */
252b5132 724 0, /* src_mask */
c061c2d8 725 0xffff, /* dst_mask */
b34976b6 726 FALSE), /* pcrel_offset */
252b5132 727
c3668558 728 /* 16-bit lower half section relative relocation. */
252b5132
RH
729 HOWTO (R_PPC_SECTOFF_LO, /* type */
730 0, /* rightshift */
731 1, /* size (0 = byte, 1 = short, 2 = long) */
732 16, /* bitsize */
b34976b6 733 FALSE, /* pc_relative */
252b5132
RH
734 0, /* bitpos */
735 complain_overflow_dont, /* complain_on_overflow */
3ce51288 736 ppc_elf_unhandled_reloc, /* special_function */
252b5132 737 "R_PPC_SECTOFF_LO", /* name */
b34976b6 738 FALSE, /* partial_inplace */
252b5132
RH
739 0, /* src_mask */
740 0xffff, /* dst_mask */
b34976b6 741 FALSE), /* pcrel_offset */
252b5132 742
c3668558 743 /* 16-bit upper half section relative relocation. */
252b5132
RH
744 HOWTO (R_PPC_SECTOFF_HI, /* type */
745 16, /* rightshift */
746 1, /* size (0 = byte, 1 = short, 2 = long) */
747 16, /* bitsize */
b34976b6 748 FALSE, /* pc_relative */
252b5132 749 0, /* bitpos */
86c95733 750 complain_overflow_dont, /* complain_on_overflow */
3ce51288 751 ppc_elf_unhandled_reloc, /* special_function */
252b5132 752 "R_PPC_SECTOFF_HI", /* name */
b34976b6 753 FALSE, /* partial_inplace */
252b5132
RH
754 0, /* src_mask */
755 0xffff, /* dst_mask */
b34976b6 756 FALSE), /* pcrel_offset */
252b5132 757
c3668558 758 /* 16-bit upper half adjusted section relative relocation. */
252b5132
RH
759 HOWTO (R_PPC_SECTOFF_HA, /* type */
760 16, /* rightshift */
761 1, /* size (0 = byte, 1 = short, 2 = long) */
762 16, /* bitsize */
b34976b6 763 FALSE, /* pc_relative */
252b5132 764 0, /* bitpos */
86c95733 765 complain_overflow_dont, /* complain_on_overflow */
3ce51288 766 ppc_elf_unhandled_reloc, /* special_function */
252b5132 767 "R_PPC_SECTOFF_HA", /* name */
b34976b6 768 FALSE, /* partial_inplace */
252b5132
RH
769 0, /* src_mask */
770 0xffff, /* dst_mask */
b34976b6 771 FALSE), /* pcrel_offset */
252b5132 772
727fc41e 773 /* Marker relocs for TLS. */
7619e7c7 774 HOWTO (R_PPC_TLS,
252b5132
RH
775 0, /* rightshift */
776 2, /* size (0 = byte, 1 = short, 2 = long) */
777 32, /* bitsize */
b34976b6 778 FALSE, /* pc_relative */
252b5132 779 0, /* bitpos */
7619e7c7 780 complain_overflow_dont, /* complain_on_overflow */
252b5132 781 bfd_elf_generic_reloc, /* special_function */
7619e7c7
AM
782 "R_PPC_TLS", /* name */
783 FALSE, /* partial_inplace */
784 0, /* src_mask */
785 0, /* dst_mask */
786 FALSE), /* pcrel_offset */
787
727fc41e
AM
788 HOWTO (R_PPC_TLSGD,
789 0, /* rightshift */
790 2, /* size (0 = byte, 1 = short, 2 = long) */
791 32, /* bitsize */
792 FALSE, /* pc_relative */
793 0, /* bitpos */
794 complain_overflow_dont, /* complain_on_overflow */
795 bfd_elf_generic_reloc, /* special_function */
796 "R_PPC_TLSGD", /* name */
797 FALSE, /* partial_inplace */
798 0, /* src_mask */
799 0, /* dst_mask */
800 FALSE), /* pcrel_offset */
801
802 HOWTO (R_PPC_TLSLD,
803 0, /* rightshift */
804 2, /* size (0 = byte, 1 = short, 2 = long) */
805 32, /* bitsize */
806 FALSE, /* pc_relative */
807 0, /* bitpos */
808 complain_overflow_dont, /* complain_on_overflow */
809 bfd_elf_generic_reloc, /* special_function */
810 "R_PPC_TLSLD", /* name */
811 FALSE, /* partial_inplace */
812 0, /* src_mask */
813 0, /* dst_mask */
814 FALSE), /* pcrel_offset */
815
7619e7c7
AM
816 /* Computes the load module index of the load module that contains the
817 definition of its TLS sym. */
818 HOWTO (R_PPC_DTPMOD32,
819 0, /* rightshift */
820 2, /* size (0 = byte, 1 = short, 2 = long) */
821 32, /* bitsize */
822 FALSE, /* pc_relative */
823 0, /* bitpos */
824 complain_overflow_dont, /* complain_on_overflow */
825 ppc_elf_unhandled_reloc, /* special_function */
826 "R_PPC_DTPMOD32", /* name */
b34976b6 827 FALSE, /* partial_inplace */
252b5132
RH
828 0, /* src_mask */
829 0xffffffff, /* dst_mask */
b34976b6 830 FALSE), /* pcrel_offset */
252b5132 831
7619e7c7
AM
832 /* Computes a dtv-relative displacement, the difference between the value
833 of sym+add and the base address of the thread-local storage block that
834 contains the definition of sym, minus 0x8000. */
835 HOWTO (R_PPC_DTPREL32,
836 0, /* rightshift */
837 2, /* size (0 = byte, 1 = short, 2 = long) */
838 32, /* bitsize */
839 FALSE, /* pc_relative */
840 0, /* bitpos */
841 complain_overflow_dont, /* complain_on_overflow */
842 ppc_elf_unhandled_reloc, /* special_function */
843 "R_PPC_DTPREL32", /* name */
844 FALSE, /* partial_inplace */
845 0, /* src_mask */
846 0xffffffff, /* dst_mask */
847 FALSE), /* pcrel_offset */
848
849 /* A 16 bit dtprel reloc. */
850 HOWTO (R_PPC_DTPREL16,
252b5132
RH
851 0, /* rightshift */
852 1, /* size (0 = byte, 1 = short, 2 = long) */
853 16, /* bitsize */
b34976b6 854 FALSE, /* pc_relative */
252b5132 855 0, /* bitpos */
7619e7c7
AM
856 complain_overflow_signed, /* complain_on_overflow */
857 ppc_elf_unhandled_reloc, /* special_function */
858 "R_PPC_DTPREL16", /* name */
b34976b6 859 FALSE, /* partial_inplace */
252b5132
RH
860 0, /* src_mask */
861 0xffff, /* dst_mask */
b34976b6 862 FALSE), /* pcrel_offset */
252b5132 863
7619e7c7
AM
864 /* Like DTPREL16, but no overflow. */
865 HOWTO (R_PPC_DTPREL16_LO,
252b5132
RH
866 0, /* rightshift */
867 1, /* size (0 = byte, 1 = short, 2 = long) */
868 16, /* bitsize */
b34976b6 869 FALSE, /* pc_relative */
252b5132 870 0, /* bitpos */
7619e7c7
AM
871 complain_overflow_dont, /* complain_on_overflow */
872 ppc_elf_unhandled_reloc, /* special_function */
873 "R_PPC_DTPREL16_LO", /* name */
b34976b6 874 FALSE, /* partial_inplace */
252b5132
RH
875 0, /* src_mask */
876 0xffff, /* dst_mask */
b34976b6 877 FALSE), /* pcrel_offset */
252b5132 878
7619e7c7
AM
879 /* Like DTPREL16_LO, but next higher group of 16 bits. */
880 HOWTO (R_PPC_DTPREL16_HI,
252b5132
RH
881 16, /* rightshift */
882 1, /* size (0 = byte, 1 = short, 2 = long) */
883 16, /* bitsize */
b34976b6 884 FALSE, /* pc_relative */
252b5132
RH
885 0, /* bitpos */
886 complain_overflow_dont, /* complain_on_overflow */
7619e7c7
AM
887 ppc_elf_unhandled_reloc, /* special_function */
888 "R_PPC_DTPREL16_HI", /* name */
b34976b6 889 FALSE, /* partial_inplace */
252b5132
RH
890 0, /* src_mask */
891 0xffff, /* dst_mask */
b34976b6 892 FALSE), /* pcrel_offset */
252b5132 893
7619e7c7
AM
894 /* Like DTPREL16_HI, but adjust for low 16 bits. */
895 HOWTO (R_PPC_DTPREL16_HA,
252b5132
RH
896 16, /* rightshift */
897 1, /* size (0 = byte, 1 = short, 2 = long) */
898 16, /* bitsize */
b34976b6 899 FALSE, /* pc_relative */
252b5132
RH
900 0, /* bitpos */
901 complain_overflow_dont, /* complain_on_overflow */
7619e7c7
AM
902 ppc_elf_unhandled_reloc, /* special_function */
903 "R_PPC_DTPREL16_HA", /* name */
b34976b6 904 FALSE, /* partial_inplace */
252b5132
RH
905 0, /* src_mask */
906 0xffff, /* dst_mask */
b34976b6 907 FALSE), /* pcrel_offset */
252b5132 908
7619e7c7
AM
909 /* Computes a tp-relative displacement, the difference between the value of
910 sym+add and the value of the thread pointer (r13). */
911 HOWTO (R_PPC_TPREL32,
912 0, /* rightshift */
913 2, /* size (0 = byte, 1 = short, 2 = long) */
914 32, /* bitsize */
915 FALSE, /* pc_relative */
916 0, /* bitpos */
917 complain_overflow_dont, /* complain_on_overflow */
918 ppc_elf_unhandled_reloc, /* special_function */
919 "R_PPC_TPREL32", /* name */
920 FALSE, /* partial_inplace */
921 0, /* src_mask */
922 0xffffffff, /* dst_mask */
923 FALSE), /* pcrel_offset */
924
925 /* A 16 bit tprel reloc. */
926 HOWTO (R_PPC_TPREL16,
252b5132
RH
927 0, /* rightshift */
928 1, /* size (0 = byte, 1 = short, 2 = long) */
929 16, /* bitsize */
b34976b6 930 FALSE, /* pc_relative */
252b5132 931 0, /* bitpos */
7619e7c7
AM
932 complain_overflow_signed, /* complain_on_overflow */
933 ppc_elf_unhandled_reloc, /* special_function */
934 "R_PPC_TPREL16", /* name */
b34976b6 935 FALSE, /* partial_inplace */
252b5132
RH
936 0, /* src_mask */
937 0xffff, /* dst_mask */
b34976b6 938 FALSE), /* pcrel_offset */
252b5132 939
7619e7c7
AM
940 /* Like TPREL16, but no overflow. */
941 HOWTO (R_PPC_TPREL16_LO,
252b5132
RH
942 0, /* rightshift */
943 1, /* size (0 = byte, 1 = short, 2 = long) */
944 16, /* bitsize */
b34976b6 945 FALSE, /* pc_relative */
252b5132 946 0, /* bitpos */
7619e7c7
AM
947 complain_overflow_dont, /* complain_on_overflow */
948 ppc_elf_unhandled_reloc, /* special_function */
949 "R_PPC_TPREL16_LO", /* name */
b34976b6 950 FALSE, /* partial_inplace */
252b5132
RH
951 0, /* src_mask */
952 0xffff, /* dst_mask */
b34976b6 953 FALSE), /* pcrel_offset */
252b5132 954
7619e7c7
AM
955 /* Like TPREL16_LO, but next higher group of 16 bits. */
956 HOWTO (R_PPC_TPREL16_HI,
957 16, /* rightshift */
958 1, /* size (0 = byte, 1 = short, 2 = long) */
959 16, /* bitsize */
960 FALSE, /* pc_relative */
961 0, /* bitpos */
962 complain_overflow_dont, /* complain_on_overflow */
963 ppc_elf_unhandled_reloc, /* special_function */
964 "R_PPC_TPREL16_HI", /* name */
965 FALSE, /* partial_inplace */
966 0, /* src_mask */
967 0xffff, /* dst_mask */
968 FALSE), /* pcrel_offset */
969
970 /* Like TPREL16_HI, but adjust for low 16 bits. */
971 HOWTO (R_PPC_TPREL16_HA,
972 16, /* rightshift */
973 1, /* size (0 = byte, 1 = short, 2 = long) */
974 16, /* bitsize */
975 FALSE, /* pc_relative */
976 0, /* bitpos */
977 complain_overflow_dont, /* complain_on_overflow */
978 ppc_elf_unhandled_reloc, /* special_function */
979 "R_PPC_TPREL16_HA", /* name */
980 FALSE, /* partial_inplace */
981 0, /* src_mask */
982 0xffff, /* dst_mask */
983 FALSE), /* pcrel_offset */
984
985 /* Allocates two contiguous entries in the GOT to hold a tls_index structure,
986 with values (sym+add)@dtpmod and (sym+add)@dtprel, and computes the offset
987 to the first entry. */
988 HOWTO (R_PPC_GOT_TLSGD16,
252b5132
RH
989 0, /* rightshift */
990 1, /* size (0 = byte, 1 = short, 2 = long) */
991 16, /* bitsize */
b34976b6 992 FALSE, /* pc_relative */
252b5132
RH
993 0, /* bitpos */
994 complain_overflow_signed, /* complain_on_overflow */
7619e7c7
AM
995 ppc_elf_unhandled_reloc, /* special_function */
996 "R_PPC_GOT_TLSGD16", /* name */
b34976b6 997 FALSE, /* partial_inplace */
252b5132
RH
998 0, /* src_mask */
999 0xffff, /* dst_mask */
b34976b6 1000 FALSE), /* pcrel_offset */
252b5132 1001
7619e7c7
AM
1002 /* Like GOT_TLSGD16, but no overflow. */
1003 HOWTO (R_PPC_GOT_TLSGD16_LO,
252b5132 1004 0, /* rightshift */
7619e7c7 1005 1, /* size (0 = byte, 1 = short, 2 = long) */
252b5132 1006 16, /* bitsize */
b34976b6 1007 FALSE, /* pc_relative */
252b5132 1008 0, /* bitpos */
7619e7c7
AM
1009 complain_overflow_dont, /* complain_on_overflow */
1010 ppc_elf_unhandled_reloc, /* special_function */
1011 "R_PPC_GOT_TLSGD16_LO", /* name */
b34976b6 1012 FALSE, /* partial_inplace */
252b5132
RH
1013 0, /* src_mask */
1014 0xffff, /* dst_mask */
b34976b6 1015 FALSE), /* pcrel_offset */
252b5132 1016
7619e7c7
AM
1017 /* Like GOT_TLSGD16_LO, but next higher group of 16 bits. */
1018 HOWTO (R_PPC_GOT_TLSGD16_HI,
1019 16, /* rightshift */
1020 1, /* size (0 = byte, 1 = short, 2 = long) */
1021 16, /* bitsize */
1022 FALSE, /* pc_relative */
1023 0, /* bitpos */
1024 complain_overflow_dont, /* complain_on_overflow */
1025 ppc_elf_unhandled_reloc, /* special_function */
1026 "R_PPC_GOT_TLSGD16_HI", /* name */
1027 FALSE, /* partial_inplace */
1028 0, /* src_mask */
1029 0xffff, /* dst_mask */
1030 FALSE), /* pcrel_offset */
252b5132 1031
7619e7c7
AM
1032 /* Like GOT_TLSGD16_HI, but adjust for low 16 bits. */
1033 HOWTO (R_PPC_GOT_TLSGD16_HA,
1034 16, /* rightshift */
1035 1, /* size (0 = byte, 1 = short, 2 = long) */
1036 16, /* bitsize */
1037 FALSE, /* pc_relative */
1038 0, /* bitpos */
1039 complain_overflow_dont, /* complain_on_overflow */
1040 ppc_elf_unhandled_reloc, /* special_function */
1041 "R_PPC_GOT_TLSGD16_HA", /* name */
1042 FALSE, /* partial_inplace */
1043 0, /* src_mask */
1044 0xffff, /* dst_mask */
1045 FALSE), /* pcrel_offset */
1046
1047 /* Allocates two contiguous entries in the GOT to hold a tls_index structure,
1048 with values (sym+add)@dtpmod and zero, and computes the offset to the
1049 first entry. */
1050 HOWTO (R_PPC_GOT_TLSLD16,
252b5132
RH
1051 0, /* rightshift */
1052 1, /* size (0 = byte, 1 = short, 2 = long) */
1053 16, /* bitsize */
7619e7c7 1054 FALSE, /* pc_relative */
252b5132
RH
1055 0, /* bitpos */
1056 complain_overflow_signed, /* complain_on_overflow */
7619e7c7
AM
1057 ppc_elf_unhandled_reloc, /* special_function */
1058 "R_PPC_GOT_TLSLD16", /* name */
b34976b6 1059 FALSE, /* partial_inplace */
252b5132
RH
1060 0, /* src_mask */
1061 0xffff, /* dst_mask */
b34976b6 1062 FALSE), /* pcrel_offset */
252b5132 1063
7619e7c7
AM
1064 /* Like GOT_TLSLD16, but no overflow. */
1065 HOWTO (R_PPC_GOT_TLSLD16_LO,
252b5132 1066 0, /* rightshift */
7619e7c7
AM
1067 1, /* size (0 = byte, 1 = short, 2 = long) */
1068 16, /* bitsize */
b34976b6 1069 FALSE, /* pc_relative */
252b5132
RH
1070 0, /* bitpos */
1071 complain_overflow_dont, /* complain_on_overflow */
7619e7c7
AM
1072 ppc_elf_unhandled_reloc, /* special_function */
1073 "R_PPC_GOT_TLSLD16_LO", /* name */
b34976b6 1074 FALSE, /* partial_inplace */
252b5132 1075 0, /* src_mask */
7619e7c7 1076 0xffff, /* dst_mask */
b34976b6 1077 FALSE), /* pcrel_offset */
252b5132 1078
7619e7c7
AM
1079 /* Like GOT_TLSLD16_LO, but next higher group of 16 bits. */
1080 HOWTO (R_PPC_GOT_TLSLD16_HI,
1081 16, /* rightshift */
1082 1, /* size (0 = byte, 1 = short, 2 = long) */
1083 16, /* bitsize */
b34976b6 1084 FALSE, /* pc_relative */
252b5132
RH
1085 0, /* bitpos */
1086 complain_overflow_dont, /* complain_on_overflow */
7619e7c7
AM
1087 ppc_elf_unhandled_reloc, /* special_function */
1088 "R_PPC_GOT_TLSLD16_HI", /* name */
b34976b6 1089 FALSE, /* partial_inplace */
252b5132 1090 0, /* src_mask */
7619e7c7 1091 0xffff, /* dst_mask */
b34976b6 1092 FALSE), /* pcrel_offset */
252b5132 1093
7619e7c7
AM
1094 /* Like GOT_TLSLD16_HI, but adjust for low 16 bits. */
1095 HOWTO (R_PPC_GOT_TLSLD16_HA,
1096 16, /* rightshift */
1097 1, /* size (0 = byte, 1 = short, 2 = long) */
1098 16, /* bitsize */
1099 FALSE, /* pc_relative */
1100 0, /* bitpos */
1101 complain_overflow_dont, /* complain_on_overflow */
1102 ppc_elf_unhandled_reloc, /* special_function */
1103 "R_PPC_GOT_TLSLD16_HA", /* name */
1104 FALSE, /* partial_inplace */
1105 0, /* src_mask */
1106 0xffff, /* dst_mask */
1107 FALSE), /* pcrel_offset */
1108
1109 /* Allocates an entry in the GOT with value (sym+add)@dtprel, and computes
1110 the offset to the entry. */
1111 HOWTO (R_PPC_GOT_DTPREL16,
252b5132
RH
1112 0, /* rightshift */
1113 1, /* size (0 = byte, 1 = short, 2 = long) */
1114 16, /* bitsize */
b34976b6 1115 FALSE, /* pc_relative */
252b5132
RH
1116 0, /* bitpos */
1117 complain_overflow_signed, /* complain_on_overflow */
7619e7c7
AM
1118 ppc_elf_unhandled_reloc, /* special_function */
1119 "R_PPC_GOT_DTPREL16", /* name */
b34976b6 1120 FALSE, /* partial_inplace */
252b5132
RH
1121 0, /* src_mask */
1122 0xffff, /* dst_mask */
b34976b6 1123 FALSE), /* pcrel_offset */
252b5132 1124
7619e7c7
AM
1125 /* Like GOT_DTPREL16, but no overflow. */
1126 HOWTO (R_PPC_GOT_DTPREL16_LO,
1127 0, /* rightshift */
1128 1, /* size (0 = byte, 1 = short, 2 = long) */
1129 16, /* bitsize */
1130 FALSE, /* pc_relative */
1131 0, /* bitpos */
1132 complain_overflow_dont, /* complain_on_overflow */
1133 ppc_elf_unhandled_reloc, /* special_function */
1134 "R_PPC_GOT_DTPREL16_LO", /* name */
1135 FALSE, /* partial_inplace */
1136 0, /* src_mask */
1137 0xffff, /* dst_mask */
1138 FALSE), /* pcrel_offset */
252b5132 1139
7619e7c7
AM
1140 /* Like GOT_DTPREL16_LO, but next higher group of 16 bits. */
1141 HOWTO (R_PPC_GOT_DTPREL16_HI,
1142 16, /* rightshift */
1143 1, /* size (0 = byte, 1 = short, 2 = long) */
1144 16, /* bitsize */
1145 FALSE, /* pc_relative */
1146 0, /* bitpos */
1147 complain_overflow_dont, /* complain_on_overflow */
1148 ppc_elf_unhandled_reloc, /* special_function */
1149 "R_PPC_GOT_DTPREL16_HI", /* name */
1150 FALSE, /* partial_inplace */
1151 0, /* src_mask */
1152 0xffff, /* dst_mask */
1153 FALSE), /* pcrel_offset */
252b5132 1154
7619e7c7
AM
1155 /* Like GOT_DTPREL16_HI, but adjust for low 16 bits. */
1156 HOWTO (R_PPC_GOT_DTPREL16_HA,
1157 16, /* rightshift */
1158 1, /* size (0 = byte, 1 = short, 2 = long) */
1159 16, /* bitsize */
1160 FALSE, /* pc_relative */
1161 0, /* bitpos */
1162 complain_overflow_dont, /* complain_on_overflow */
1163 ppc_elf_unhandled_reloc, /* special_function */
1164 "R_PPC_GOT_DTPREL16_HA", /* name */
1165 FALSE, /* partial_inplace */
1166 0, /* src_mask */
1167 0xffff, /* dst_mask */
1168 FALSE), /* pcrel_offset */
c3668558 1169
7619e7c7
AM
1170 /* Allocates an entry in the GOT with value (sym+add)@tprel, and computes the
1171 offset to the entry. */
1172 HOWTO (R_PPC_GOT_TPREL16,
1173 0, /* rightshift */
1174 1, /* size (0 = byte, 1 = short, 2 = long) */
1175 16, /* bitsize */
1176 FALSE, /* pc_relative */
1177 0, /* bitpos */
1178 complain_overflow_signed, /* complain_on_overflow */
1179 ppc_elf_unhandled_reloc, /* special_function */
1180 "R_PPC_GOT_TPREL16", /* name */
1181 FALSE, /* partial_inplace */
1182 0, /* src_mask */
1183 0xffff, /* dst_mask */
1184 FALSE), /* pcrel_offset */
1185
1186 /* Like GOT_TPREL16, but no overflow. */
1187 HOWTO (R_PPC_GOT_TPREL16_LO,
1188 0, /* rightshift */
1189 1, /* size (0 = byte, 1 = short, 2 = long) */
1190 16, /* bitsize */
1191 FALSE, /* pc_relative */
1192 0, /* bitpos */
1193 complain_overflow_dont, /* complain_on_overflow */
1194 ppc_elf_unhandled_reloc, /* special_function */
1195 "R_PPC_GOT_TPREL16_LO", /* name */
1196 FALSE, /* partial_inplace */
1197 0, /* src_mask */
1198 0xffff, /* dst_mask */
1199 FALSE), /* pcrel_offset */
1200
1201 /* Like GOT_TPREL16_LO, but next higher group of 16 bits. */
1202 HOWTO (R_PPC_GOT_TPREL16_HI,
1203 16, /* rightshift */
1204 1, /* size (0 = byte, 1 = short, 2 = long) */
1205 16, /* bitsize */
1206 FALSE, /* pc_relative */
1207 0, /* bitpos */
1208 complain_overflow_dont, /* complain_on_overflow */
1209 ppc_elf_unhandled_reloc, /* special_function */
1210 "R_PPC_GOT_TPREL16_HI", /* name */
1211 FALSE, /* partial_inplace */
1212 0, /* src_mask */
1213 0xffff, /* dst_mask */
1214 FALSE), /* pcrel_offset */
1215
1216 /* Like GOT_TPREL16_HI, but adjust for low 16 bits. */
1217 HOWTO (R_PPC_GOT_TPREL16_HA,
1218 16, /* rightshift */
1219 1, /* size (0 = byte, 1 = short, 2 = long) */
1220 16, /* bitsize */
1221 FALSE, /* pc_relative */
1222 0, /* bitpos */
1223 complain_overflow_dont, /* complain_on_overflow */
1224 ppc_elf_unhandled_reloc, /* special_function */
1225 "R_PPC_GOT_TPREL16_HA", /* name */
1226 FALSE, /* partial_inplace */
1227 0, /* src_mask */
1228 0xffff, /* dst_mask */
1229 FALSE), /* pcrel_offset */
1230
1231 /* The remaining relocs are from the Embedded ELF ABI, and are not
1232 in the SVR4 ELF ABI. */
1233
1234 /* 32 bit value resulting from the addend minus the symbol. */
1235 HOWTO (R_PPC_EMB_NADDR32, /* type */
1236 0, /* rightshift */
1237 2, /* size (0 = byte, 1 = short, 2 = long) */
1238 32, /* bitsize */
1239 FALSE, /* pc_relative */
1240 0, /* bitpos */
86c95733 1241 complain_overflow_dont, /* complain_on_overflow */
3ce51288 1242 ppc_elf_unhandled_reloc, /* special_function */
7619e7c7
AM
1243 "R_PPC_EMB_NADDR32", /* name */
1244 FALSE, /* partial_inplace */
1245 0, /* src_mask */
1246 0xffffffff, /* dst_mask */
1247 FALSE), /* pcrel_offset */
1248
1249 /* 16 bit value resulting from the addend minus the symbol. */
1250 HOWTO (R_PPC_EMB_NADDR16, /* type */
1251 0, /* rightshift */
1252 1, /* size (0 = byte, 1 = short, 2 = long) */
1253 16, /* bitsize */
1254 FALSE, /* pc_relative */
1255 0, /* bitpos */
86c95733 1256 complain_overflow_signed, /* complain_on_overflow */
3ce51288 1257 ppc_elf_unhandled_reloc, /* special_function */
7619e7c7
AM
1258 "R_PPC_EMB_NADDR16", /* name */
1259 FALSE, /* partial_inplace */
1260 0, /* src_mask */
1261 0xffff, /* dst_mask */
1262 FALSE), /* pcrel_offset */
1263
1264 /* 16 bit value resulting from the addend minus the symbol. */
1265 HOWTO (R_PPC_EMB_NADDR16_LO, /* type */
1266 0, /* rightshift */
1267 1, /* size (0 = byte, 1 = short, 2 = long) */
1268 16, /* bitsize */
1269 FALSE, /* pc_relative */
1270 0, /* bitpos */
1271 complain_overflow_dont,/* complain_on_overflow */
3ce51288 1272 ppc_elf_unhandled_reloc, /* special_function */
7619e7c7
AM
1273 "R_PPC_EMB_ADDR16_LO", /* name */
1274 FALSE, /* partial_inplace */
1275 0, /* src_mask */
1276 0xffff, /* dst_mask */
1277 FALSE), /* pcrel_offset */
1278
1279 /* The high order 16 bits of the addend minus the symbol. */
1280 HOWTO (R_PPC_EMB_NADDR16_HI, /* type */
1281 16, /* rightshift */
1282 1, /* size (0 = byte, 1 = short, 2 = long) */
1283 16, /* bitsize */
1284 FALSE, /* pc_relative */
1285 0, /* bitpos */
1286 complain_overflow_dont, /* complain_on_overflow */
3ce51288 1287 ppc_elf_unhandled_reloc, /* special_function */
7619e7c7
AM
1288 "R_PPC_EMB_NADDR16_HI", /* name */
1289 FALSE, /* partial_inplace */
1290 0, /* src_mask */
1291 0xffff, /* dst_mask */
1292 FALSE), /* pcrel_offset */
1293
1294 /* The high order 16 bits of the result of the addend minus the address,
1295 plus 1 if the contents of the low 16 bits, treated as a signed number,
1296 is negative. */
1297 HOWTO (R_PPC_EMB_NADDR16_HA, /* type */
1298 16, /* rightshift */
1299 1, /* size (0 = byte, 1 = short, 2 = long) */
1300 16, /* bitsize */
1301 FALSE, /* pc_relative */
1302 0, /* bitpos */
1303 complain_overflow_dont, /* complain_on_overflow */
3ce51288 1304 ppc_elf_unhandled_reloc, /* special_function */
25dbc73a
AM
1305 "R_PPC_EMB_NADDR16_HA", /* name */
1306 FALSE, /* partial_inplace */
1307 0, /* src_mask */
1308 0xffff, /* dst_mask */
1309 FALSE), /* pcrel_offset */
1310
1311 /* 16 bit value resulting from allocating a 4 byte word to hold an
1312 address in the .sdata section, and returning the offset from
1313 _SDA_BASE_ for that relocation. */
1314 HOWTO (R_PPC_EMB_SDAI16, /* type */
1315 0, /* rightshift */
1316 1, /* size (0 = byte, 1 = short, 2 = long) */
1317 16, /* bitsize */
1318 FALSE, /* pc_relative */
1319 0, /* bitpos */
bd6c6e2b 1320 complain_overflow_signed, /* complain_on_overflow */
3ce51288 1321 ppc_elf_unhandled_reloc, /* special_function */
25dbc73a
AM
1322 "R_PPC_EMB_SDAI16", /* name */
1323 FALSE, /* partial_inplace */
1324 0, /* src_mask */
1325 0xffff, /* dst_mask */
1326 FALSE), /* pcrel_offset */
1327
1328 /* 16 bit value resulting from allocating a 4 byte word to hold an
1329 address in the .sdata2 section, and returning the offset from
1330 _SDA2_BASE_ for that relocation. */
1331 HOWTO (R_PPC_EMB_SDA2I16, /* type */
1332 0, /* rightshift */
1333 1, /* size (0 = byte, 1 = short, 2 = long) */
1334 16, /* bitsize */
1335 FALSE, /* pc_relative */
1336 0, /* bitpos */
bd6c6e2b 1337 complain_overflow_signed, /* complain_on_overflow */
3ce51288 1338 ppc_elf_unhandled_reloc, /* special_function */
25dbc73a
AM
1339 "R_PPC_EMB_SDA2I16", /* name */
1340 FALSE, /* partial_inplace */
1341 0, /* src_mask */
1342 0xffff, /* dst_mask */
1343 FALSE), /* pcrel_offset */
1344
1345 /* A sign-extended 16 bit value relative to _SDA2_BASE_, for use with
1346 small data items. */
1347 HOWTO (R_PPC_EMB_SDA2REL, /* type */
1348 0, /* rightshift */
1349 1, /* size (0 = byte, 1 = short, 2 = long) */
1350 16, /* bitsize */
1351 FALSE, /* pc_relative */
1352 0, /* bitpos */
1353 complain_overflow_signed, /* complain_on_overflow */
3ce51288 1354 ppc_elf_unhandled_reloc, /* special_function */
25dbc73a
AM
1355 "R_PPC_EMB_SDA2REL", /* name */
1356 FALSE, /* partial_inplace */
1357 0, /* src_mask */
1358 0xffff, /* dst_mask */
1359 FALSE), /* pcrel_offset */
1360
1361 /* Relocate against either _SDA_BASE_ or _SDA2_BASE_, filling in the 16 bit
1362 signed offset from the appropriate base, and filling in the register
1363 field with the appropriate register (0, 2, or 13). */
1364 HOWTO (R_PPC_EMB_SDA21, /* type */
1365 0, /* rightshift */
1366 2, /* size (0 = byte, 1 = short, 2 = long) */
1367 16, /* bitsize */
1368 FALSE, /* pc_relative */
1369 0, /* bitpos */
1370 complain_overflow_signed, /* complain_on_overflow */
3ce51288 1371 ppc_elf_unhandled_reloc, /* special_function */
25dbc73a
AM
1372 "R_PPC_EMB_SDA21", /* name */
1373 FALSE, /* partial_inplace */
1374 0, /* src_mask */
1375 0xffff, /* dst_mask */
1376 FALSE), /* pcrel_offset */
1377
1378 /* Relocation not handled: R_PPC_EMB_MRKREF */
1379 /* Relocation not handled: R_PPC_EMB_RELSEC16 */
1380 /* Relocation not handled: R_PPC_EMB_RELST_LO */
1381 /* Relocation not handled: R_PPC_EMB_RELST_HI */
1382 /* Relocation not handled: R_PPC_EMB_RELST_HA */
1383 /* Relocation not handled: R_PPC_EMB_BIT_FLD */
1384
1385 /* PC relative relocation against either _SDA_BASE_ or _SDA2_BASE_, filling
1386 in the 16 bit signed offset from the appropriate base, and filling in the
1387 register field with the appropriate register (0, 2, or 13). */
1388 HOWTO (R_PPC_EMB_RELSDA, /* type */
1389 0, /* rightshift */
1390 1, /* size (0 = byte, 1 = short, 2 = long) */
1391 16, /* bitsize */
ddfd6795 1392 FALSE, /* pc_relative */
25dbc73a
AM
1393 0, /* bitpos */
1394 complain_overflow_signed, /* complain_on_overflow */
3ce51288 1395 ppc_elf_unhandled_reloc, /* special_function */
25dbc73a
AM
1396 "R_PPC_EMB_RELSDA", /* name */
1397 FALSE, /* partial_inplace */
1398 0, /* src_mask */
1399 0xffff, /* dst_mask */
1400 FALSE), /* pcrel_offset */
1401
b9c361e0
JL
1402 /* A relative 8 bit branch. */
1403 HOWTO (R_PPC_VLE_REL8, /* type */
1404 1, /* rightshift */
1405 1, /* size (0 = byte, 1 = short, 2 = long) */
1406 8, /* bitsize */
1407 TRUE, /* pc_relative */
1408 0, /* bitpos */
1409 complain_overflow_signed, /* complain_on_overflow */
1410 bfd_elf_generic_reloc, /* special_function */
1411 "R_PPC_VLE_REL8", /* name */
1412 FALSE, /* partial_inplace */
1413 0, /* src_mask */
1414 0xff, /* dst_mask */
1415 TRUE), /* pcrel_offset */
68ffbac6 1416
b9c361e0
JL
1417 /* A relative 15 bit branch. */
1418 HOWTO (R_PPC_VLE_REL15, /* type */
1419 1, /* rightshift */
1420 2, /* size (0 = byte, 1 = short, 2 = long) */
1421 15, /* bitsize */
1422 TRUE, /* pc_relative */
1423 1, /* bitpos */
1424 complain_overflow_signed, /* complain_on_overflow */
1425 bfd_elf_generic_reloc, /* special_function */
1426 "R_PPC_VLE_REL15", /* name */
1427 FALSE, /* partial_inplace */
1428 0, /* src_mask */
dfdaec14 1429 0xfffe, /* dst_mask */
b9c361e0
JL
1430 TRUE), /* pcrel_offset */
1431
68ffbac6 1432 /* A relative 24 bit branch. */
b9c361e0
JL
1433 HOWTO (R_PPC_VLE_REL24, /* type */
1434 1, /* rightshift */
1435 2, /* size (0 = byte, 1 = short, 2 = long) */
1436 24, /* bitsize */
1437 TRUE, /* pc_relative */
1438 1, /* bitpos */
1439 complain_overflow_signed, /* complain_on_overflow */
1440 bfd_elf_generic_reloc, /* special_function */
1441 "R_PPC_VLE_REL24", /* name */
1442 FALSE, /* partial_inplace */
1443 0, /* src_mask */
1444 0x1fffffe, /* dst_mask */
1445 TRUE), /* pcrel_offset */
1446
1447 /* The 16 LSBS in split16a format. */
1448 HOWTO (R_PPC_VLE_LO16A, /* type */
1449 0, /* rightshift */
1450 2, /* size (0 = byte, 1 = short, 2 = long) */
86c95733 1451 16, /* bitsize */
bdaacd3a 1452 FALSE, /* pc_relative */
b9c361e0 1453 0, /* bitpos */
86c95733 1454 complain_overflow_dont, /* complain_on_overflow */
3ce51288 1455 ppc_elf_unhandled_reloc, /* special_function */
b9c361e0
JL
1456 "R_PPC_VLE_LO16A", /* name */
1457 FALSE, /* partial_inplace */
1458 0, /* src_mask */
08dc996f 1459 0x1f07ff, /* dst_mask */
b9c361e0
JL
1460 FALSE), /* pcrel_offset */
1461
1462 /* The 16 LSBS in split16d format. */
1463 HOWTO (R_PPC_VLE_LO16D, /* type */
1464 0, /* rightshift */
1465 2, /* size (0 = byte, 1 = short, 2 = long) */
86c95733 1466 16, /* bitsize */
b9c361e0
JL
1467 FALSE, /* pc_relative */
1468 0, /* bitpos */
86c95733 1469 complain_overflow_dont, /* complain_on_overflow */
3ce51288
AM
1470 ppc_elf_unhandled_reloc, /* special_function */
1471 "R_PPC_VLE_LO16D", /* name */
b9c361e0
JL
1472 FALSE, /* partial_inplace */
1473 0, /* src_mask */
5499c7c7 1474 0x3e007ff, /* dst_mask */
b9c361e0
JL
1475 FALSE), /* pcrel_offset */
1476
1477 /* Bits 16-31 split16a format. */
1478 HOWTO (R_PPC_VLE_HI16A, /* type */
86c95733 1479 16, /* rightshift */
b9c361e0 1480 2, /* size (0 = byte, 1 = short, 2 = long) */
86c95733 1481 16, /* bitsize */
b9c361e0
JL
1482 FALSE, /* pc_relative */
1483 0, /* bitpos */
86c95733 1484 complain_overflow_dont, /* complain_on_overflow */
3ce51288
AM
1485 ppc_elf_unhandled_reloc, /* special_function */
1486 "R_PPC_VLE_HI16A", /* name */
b9c361e0
JL
1487 FALSE, /* partial_inplace */
1488 0, /* src_mask */
08dc996f 1489 0x1f07ff, /* dst_mask */
b9c361e0
JL
1490 FALSE), /* pcrel_offset */
1491
1492 /* Bits 16-31 split16d format. */
1493 HOWTO (R_PPC_VLE_HI16D, /* type */
86c95733 1494 16, /* rightshift */
b9c361e0 1495 2, /* size (0 = byte, 1 = short, 2 = long) */
86c95733 1496 16, /* bitsize */
b9c361e0
JL
1497 FALSE, /* pc_relative */
1498 0, /* bitpos */
86c95733 1499 complain_overflow_dont, /* complain_on_overflow */
3ce51288
AM
1500 ppc_elf_unhandled_reloc, /* special_function */
1501 "R_PPC_VLE_HI16D", /* name */
b9c361e0
JL
1502 FALSE, /* partial_inplace */
1503 0, /* src_mask */
5499c7c7 1504 0x3e007ff, /* dst_mask */
b9c361e0
JL
1505 FALSE), /* pcrel_offset */
1506
1507 /* Bits 16-31 (High Adjusted) in split16a format. */
1508 HOWTO (R_PPC_VLE_HA16A, /* type */
86c95733 1509 16, /* rightshift */
b9c361e0 1510 2, /* size (0 = byte, 1 = short, 2 = long) */
86c95733 1511 16, /* bitsize */
b9c361e0
JL
1512 FALSE, /* pc_relative */
1513 0, /* bitpos */
86c95733 1514 complain_overflow_dont, /* complain_on_overflow */
3ce51288
AM
1515 ppc_elf_unhandled_reloc, /* special_function */
1516 "R_PPC_VLE_HA16A", /* name */
b9c361e0
JL
1517 FALSE, /* partial_inplace */
1518 0, /* src_mask */
08dc996f 1519 0x1f07ff, /* dst_mask */
b9c361e0
JL
1520 FALSE), /* pcrel_offset */
1521
1522 /* Bits 16-31 (High Adjusted) in split16d format. */
1523 HOWTO (R_PPC_VLE_HA16D, /* type */
86c95733 1524 16, /* rightshift */
b9c361e0 1525 2, /* size (0 = byte, 1 = short, 2 = long) */
86c95733 1526 16, /* bitsize */
b9c361e0
JL
1527 FALSE, /* pc_relative */
1528 0, /* bitpos */
86c95733 1529 complain_overflow_dont, /* complain_on_overflow */
3ce51288
AM
1530 ppc_elf_unhandled_reloc, /* special_function */
1531 "R_PPC_VLE_HA16D", /* name */
b9c361e0
JL
1532 FALSE, /* partial_inplace */
1533 0, /* src_mask */
5499c7c7 1534 0x3e007ff, /* dst_mask */
b9c361e0
JL
1535 FALSE), /* pcrel_offset */
1536
86c95733
AM
1537 /* This reloc is like R_PPC_EMB_SDA21 but only applies to e_add16i
1538 instructions. If the register base is 0 then the linker changes
1539 the e_add16i to an e_li instruction. */
1540 HOWTO (R_PPC_VLE_SDA21, /* type */
b9c361e0
JL
1541 0, /* rightshift */
1542 2, /* size (0 = byte, 1 = short, 2 = long) */
86c95733 1543 16, /* bitsize */
b9c361e0
JL
1544 FALSE, /* pc_relative */
1545 0, /* bitpos */
86c95733 1546 complain_overflow_signed, /* complain_on_overflow */
3ce51288
AM
1547 ppc_elf_unhandled_reloc, /* special_function */
1548 "R_PPC_VLE_SDA21", /* name */
b9c361e0
JL
1549 FALSE, /* partial_inplace */
1550 0, /* src_mask */
1551 0xffff, /* dst_mask */
1552 FALSE), /* pcrel_offset */
1553
86c95733 1554 /* Like R_PPC_VLE_SDA21 but ignore overflow. */
b9c361e0
JL
1555 HOWTO (R_PPC_VLE_SDA21_LO, /* type */
1556 0, /* rightshift */
1557 2, /* size (0 = byte, 1 = short, 2 = long) */
86c95733 1558 16, /* bitsize */
b9c361e0
JL
1559 FALSE, /* pc_relative */
1560 0, /* bitpos */
86c95733 1561 complain_overflow_dont, /* complain_on_overflow */
3ce51288 1562 ppc_elf_unhandled_reloc, /* special_function */
b9c361e0
JL
1563 "R_PPC_VLE_SDA21_LO", /* name */
1564 FALSE, /* partial_inplace */
1565 0, /* src_mask */
86c95733 1566 0xffff, /* dst_mask */
b9c361e0
JL
1567 FALSE), /* pcrel_offset */
1568
1569 /* The 16 LSBS relative to _SDA_BASE_ in split16a format. */
1570 HOWTO (R_PPC_VLE_SDAREL_LO16A,/* type */
1571 0, /* rightshift */
1572 2, /* size (0 = byte, 1 = short, 2 = long) */
86c95733 1573 16, /* bitsize */
b9c361e0
JL
1574 FALSE, /* pc_relative */
1575 0, /* bitpos */
3ce51288
AM
1576 complain_overflow_dont, /* complain_on_overflow */
1577 ppc_elf_unhandled_reloc, /* special_function */
1578 "R_PPC_VLE_SDAREL_LO16A", /* name */
b9c361e0
JL
1579 FALSE, /* partial_inplace */
1580 0, /* src_mask */
08dc996f 1581 0x1f07ff, /* dst_mask */
b9c361e0
JL
1582 FALSE), /* pcrel_offset */
1583
1584 /* The 16 LSBS relative to _SDA_BASE_ in split16d format. */
b9c361e0
JL
1585 HOWTO (R_PPC_VLE_SDAREL_LO16D, /* type */
1586 0, /* rightshift */
1587 2, /* size (0 = byte, 1 = short, 2 = long) */
86c95733 1588 16, /* bitsize */
b9c361e0
JL
1589 FALSE, /* pc_relative */
1590 0, /* bitpos */
3ce51288
AM
1591 complain_overflow_dont, /* complain_on_overflow */
1592 ppc_elf_unhandled_reloc, /* special_function */
1593 "R_PPC_VLE_SDAREL_LO16D", /* name */
b9c361e0
JL
1594 FALSE, /* partial_inplace */
1595 0, /* src_mask */
5499c7c7 1596 0x3e007ff, /* dst_mask */
b9c361e0
JL
1597 FALSE), /* pcrel_offset */
1598
1599 /* Bits 16-31 relative to _SDA_BASE_ in split16a format. */
3ce51288 1600 HOWTO (R_PPC_VLE_SDAREL_HI16A, /* type */
86c95733 1601 16, /* rightshift */
b9c361e0 1602 2, /* size (0 = byte, 1 = short, 2 = long) */
86c95733 1603 16, /* bitsize */
b9c361e0
JL
1604 FALSE, /* pc_relative */
1605 0, /* bitpos */
3ce51288
AM
1606 complain_overflow_dont, /* complain_on_overflow */
1607 ppc_elf_unhandled_reloc, /* special_function */
1608 "R_PPC_VLE_SDAREL_HI16A", /* name */
b9c361e0
JL
1609 FALSE, /* partial_inplace */
1610 0, /* src_mask */
08dc996f 1611 0x1f07ff, /* dst_mask */
b9c361e0
JL
1612 FALSE), /* pcrel_offset */
1613
1614 /* Bits 16-31 relative to _SDA_BASE_ in split16d format. */
3ce51288 1615 HOWTO (R_PPC_VLE_SDAREL_HI16D, /* type */
86c95733 1616 16, /* rightshift */
b9c361e0 1617 2, /* size (0 = byte, 1 = short, 2 = long) */
86c95733 1618 16, /* bitsize */
b9c361e0
JL
1619 FALSE, /* pc_relative */
1620 0, /* bitpos */
3ce51288
AM
1621 complain_overflow_dont, /* complain_on_overflow */
1622 ppc_elf_unhandled_reloc, /* special_function */
1623 "R_PPC_VLE_SDAREL_HI16D", /* name */
b9c361e0
JL
1624 FALSE, /* partial_inplace */
1625 0, /* src_mask */
5499c7c7 1626 0x3e007ff, /* dst_mask */
b9c361e0
JL
1627 FALSE), /* pcrel_offset */
1628
1629 /* Bits 16-31 (HA) relative to _SDA_BASE split16a format. */
3ce51288 1630 HOWTO (R_PPC_VLE_SDAREL_HA16A, /* type */
86c95733 1631 16, /* rightshift */
b9c361e0 1632 2, /* size (0 = byte, 1 = short, 2 = long) */
86c95733 1633 16, /* bitsize */
b9c361e0
JL
1634 FALSE, /* pc_relative */
1635 0, /* bitpos */
3ce51288
AM
1636 complain_overflow_dont, /* complain_on_overflow */
1637 ppc_elf_unhandled_reloc, /* special_function */
1638 "R_PPC_VLE_SDAREL_HA16A", /* name */
b9c361e0
JL
1639 FALSE, /* partial_inplace */
1640 0, /* src_mask */
08dc996f 1641 0x1f07ff, /* dst_mask */
b9c361e0
JL
1642 FALSE), /* pcrel_offset */
1643
1644 /* Bits 16-31 (HA) relative to _SDA_BASE split16d format. */
3ce51288 1645 HOWTO (R_PPC_VLE_SDAREL_HA16D, /* type */
86c95733 1646 16, /* rightshift */
b9c361e0 1647 2, /* size (0 = byte, 1 = short, 2 = long) */
86c95733 1648 16, /* bitsize */
b9c361e0
JL
1649 FALSE, /* pc_relative */
1650 0, /* bitpos */
3ce51288
AM
1651 complain_overflow_dont, /* complain_on_overflow */
1652 ppc_elf_unhandled_reloc, /* special_function */
1653 "R_PPC_VLE_SDAREL_HA16D", /* name */
b9c361e0
JL
1654 FALSE, /* partial_inplace */
1655 0, /* src_mask */
5499c7c7 1656 0x3e007ff, /* dst_mask */
b9c361e0
JL
1657 FALSE), /* pcrel_offset */
1658
e054468f
AM
1659 HOWTO (R_PPC_IRELATIVE, /* type */
1660 0, /* rightshift */
1661 2, /* size (0 = byte, 1 = short, 2 = long) */
1662 32, /* bitsize */
1663 FALSE, /* pc_relative */
1664 0, /* bitpos */
86c95733 1665 complain_overflow_dont, /* complain_on_overflow */
3ce51288 1666 ppc_elf_unhandled_reloc, /* special_function */
e054468f
AM
1667 "R_PPC_IRELATIVE", /* name */
1668 FALSE, /* partial_inplace */
1669 0, /* src_mask */
1670 0xffffffff, /* dst_mask */
1671 FALSE), /* pcrel_offset */
1672
d7128ce4
AM
1673 /* A 16 bit relative relocation. */
1674 HOWTO (R_PPC_REL16, /* type */
1675 0, /* rightshift */
1676 1, /* size (0 = byte, 1 = short, 2 = long) */
1677 16, /* bitsize */
1678 TRUE, /* pc_relative */
1679 0, /* bitpos */
86c95733 1680 complain_overflow_signed, /* complain_on_overflow */
d7128ce4
AM
1681 bfd_elf_generic_reloc, /* special_function */
1682 "R_PPC_REL16", /* name */
1683 FALSE, /* partial_inplace */
1684 0, /* src_mask */
1685 0xffff, /* dst_mask */
1686 TRUE), /* pcrel_offset */
1687
1688 /* A 16 bit relative relocation without overflow. */
1689 HOWTO (R_PPC_REL16_LO, /* type */
1690 0, /* rightshift */
1691 1, /* size (0 = byte, 1 = short, 2 = long) */
1692 16, /* bitsize */
1693 TRUE, /* pc_relative */
1694 0, /* bitpos */
1695 complain_overflow_dont,/* complain_on_overflow */
1696 bfd_elf_generic_reloc, /* special_function */
1697 "R_PPC_REL16_LO", /* name */
1698 FALSE, /* partial_inplace */
1699 0, /* src_mask */
1700 0xffff, /* dst_mask */
1701 TRUE), /* pcrel_offset */
1702
1703 /* The high order 16 bits of a relative address. */
1704 HOWTO (R_PPC_REL16_HI, /* type */
1705 16, /* rightshift */
1706 1, /* size (0 = byte, 1 = short, 2 = long) */
1707 16, /* bitsize */
1708 TRUE, /* pc_relative */
1709 0, /* bitpos */
1710 complain_overflow_dont, /* complain_on_overflow */
1711 bfd_elf_generic_reloc, /* special_function */
1712 "R_PPC_REL16_HI", /* name */
1713 FALSE, /* partial_inplace */
1714 0, /* src_mask */
1715 0xffff, /* dst_mask */
1716 TRUE), /* pcrel_offset */
1717
1718 /* The high order 16 bits of a relative address, plus 1 if the contents of
1719 the low 16 bits, treated as a signed number, is negative. */
1720 HOWTO (R_PPC_REL16_HA, /* type */
1721 16, /* rightshift */
1722 1, /* size (0 = byte, 1 = short, 2 = long) */
1723 16, /* bitsize */
1724 TRUE, /* pc_relative */
1725 0, /* bitpos */
1726 complain_overflow_dont, /* complain_on_overflow */
1727 ppc_elf_addr16_ha_reloc, /* special_function */
1728 "R_PPC_REL16_HA", /* name */
1729 FALSE, /* partial_inplace */
1730 0, /* src_mask */
1731 0xffff, /* dst_mask */
1732 TRUE), /* pcrel_offset */
1733
a680de9a
PB
1734 /* Like R_PPC_REL16_HA but for split field in addpcis. */
1735 HOWTO (R_PPC_REL16DX_HA, /* type */
1736 16, /* rightshift */
1737 2, /* size (0 = byte, 1 = short, 2 = long) */
1738 16, /* bitsize */
1739 TRUE, /* pc_relative */
1740 0, /* bitpos */
1741 complain_overflow_signed, /* complain_on_overflow */
1742 ppc_elf_addr16_ha_reloc, /* special_function */
1743 "R_PPC_REL16DX_HA", /* name */
1744 FALSE, /* partial_inplace */
1745 0, /* src_mask */
1746 0x1fffc1, /* dst_mask */
1747 TRUE), /* pcrel_offset */
1748
7ba71655
AM
1749 /* A split-field reloc for addpcis, non-relative (gas internal use only). */
1750 HOWTO (R_PPC_16DX_HA, /* type */
1751 16, /* rightshift */
1752 2, /* size (0 = byte, 1 = short, 2 = long) */
1753 16, /* bitsize */
1754 FALSE, /* pc_relative */
1755 0, /* bitpos */
1756 complain_overflow_signed, /* complain_on_overflow */
1757 ppc_elf_addr16_ha_reloc, /* special_function */
1758 "R_PPC_16DX_HA", /* name */
1759 FALSE, /* partial_inplace */
1760 0, /* src_mask */
1761 0x1fffc1, /* dst_mask */
1762 FALSE), /* pcrel_offset */
1763
25dbc73a
AM
1764 /* GNU extension to record C++ vtable hierarchy. */
1765 HOWTO (R_PPC_GNU_VTINHERIT, /* type */
1766 0, /* rightshift */
1767 0, /* size (0 = byte, 1 = short, 2 = long) */
1768 0, /* bitsize */
1769 FALSE, /* pc_relative */
1770 0, /* bitpos */
1771 complain_overflow_dont, /* complain_on_overflow */
1772 NULL, /* special_function */
1773 "R_PPC_GNU_VTINHERIT", /* name */
1774 FALSE, /* partial_inplace */
1775 0, /* src_mask */
1776 0, /* dst_mask */
1777 FALSE), /* pcrel_offset */
1778
1779 /* GNU extension to record C++ vtable member usage. */
1780 HOWTO (R_PPC_GNU_VTENTRY, /* type */
1781 0, /* rightshift */
1782 0, /* size (0 = byte, 1 = short, 2 = long) */
1783 0, /* bitsize */
1784 FALSE, /* pc_relative */
1785 0, /* bitpos */
1786 complain_overflow_dont, /* complain_on_overflow */
1787 NULL, /* special_function */
1788 "R_PPC_GNU_VTENTRY", /* name */
7619e7c7
AM
1789 FALSE, /* partial_inplace */
1790 0, /* src_mask */
25dbc73a 1791 0, /* dst_mask */
7619e7c7
AM
1792 FALSE), /* pcrel_offset */
1793
25dbc73a
AM
1794 /* Phony reloc to handle AIX style TOC entries. */
1795 HOWTO (R_PPC_TOC16, /* type */
7619e7c7
AM
1796 0, /* rightshift */
1797 1, /* size (0 = byte, 1 = short, 2 = long) */
1798 16, /* bitsize */
1799 FALSE, /* pc_relative */
1800 0, /* bitpos */
25dbc73a 1801 complain_overflow_signed, /* complain_on_overflow */
3ce51288 1802 ppc_elf_unhandled_reloc, /* special_function */
25dbc73a 1803 "R_PPC_TOC16", /* name */
7619e7c7
AM
1804 FALSE, /* partial_inplace */
1805 0, /* src_mask */
1806 0xffff, /* dst_mask */
1807 FALSE), /* pcrel_offset */
25dbc73a 1808};
70a38d42
SDJ
1809
1810/* External 32-bit PPC structure for PRPSINFO. This structure is
1811 ABI-defined, thus we choose to use char arrays here in order to
1812 avoid dealing with different types in different architectures.
1813
1814 The PPC 32-bit structure uses int for `pr_uid' and `pr_gid' while
1815 most non-PPC architectures use `short int'.
1816
1817 This structure will ultimately be written in the corefile's note
1818 section, as the PRPSINFO. */
1819
1820struct elf_external_ppc_linux_prpsinfo32
1821 {
1822 char pr_state; /* Numeric process state. */
1823 char pr_sname; /* Char for pr_state. */
1824 char pr_zomb; /* Zombie. */
1825 char pr_nice; /* Nice val. */
1826 char pr_flag[4]; /* Flags. */
1827 char pr_uid[4];
1828 char pr_gid[4];
1829 char pr_pid[4];
1830 char pr_ppid[4];
1831 char pr_pgrp[4];
1832 char pr_sid[4];
1833 char pr_fname[16]; /* Filename of executable. */
1834 char pr_psargs[80]; /* Initial part of arg list. */
1835 };
1836
aeb70569
AM
1837/* Helper function to copy an elf_internal_linux_prpsinfo in host
1838 endian to an elf_external_ppc_linux_prpsinfo32 in target endian. */
70a38d42 1839
aeb70569
AM
1840static inline void
1841swap_ppc_linux_prpsinfo32_out (bfd *obfd,
1842 const struct elf_internal_linux_prpsinfo *from,
1843 struct elf_external_ppc_linux_prpsinfo32 *to)
1844{
1845 bfd_put_8 (obfd, from->pr_state, &to->pr_state);
1846 bfd_put_8 (obfd, from->pr_sname, &to->pr_sname);
1847 bfd_put_8 (obfd, from->pr_zomb, &to->pr_zomb);
1848 bfd_put_8 (obfd, from->pr_nice, &to->pr_nice);
1849 bfd_put_32 (obfd, from->pr_flag, to->pr_flag);
1850 bfd_put_32 (obfd, from->pr_uid, to->pr_uid);
1851 bfd_put_32 (obfd, from->pr_gid, to->pr_gid);
1852 bfd_put_32 (obfd, from->pr_pid, to->pr_pid);
1853 bfd_put_32 (obfd, from->pr_ppid, to->pr_ppid);
1854 bfd_put_32 (obfd, from->pr_pgrp, to->pr_pgrp);
1855 bfd_put_32 (obfd, from->pr_sid, to->pr_sid);
1856 strncpy (to->pr_fname, from->pr_fname, sizeof (to->pr_fname));
1857 strncpy (to->pr_psargs, from->pr_psargs, sizeof (to->pr_psargs));
1858}
25dbc73a
AM
1859\f
1860/* Initialize the ppc_elf_howto_table, so that linear accesses can be done. */
1861
1862static void
1863ppc_elf_howto_init (void)
1864{
1865 unsigned int i, type;
1866
1867 for (i = 0;
1868 i < sizeof (ppc_elf_howto_raw) / sizeof (ppc_elf_howto_raw[0]);
1869 i++)
1870 {
1871 type = ppc_elf_howto_raw[i].type;
1872 if (type >= (sizeof (ppc_elf_howto_table)
1873 / sizeof (ppc_elf_howto_table[0])))
1874 abort ();
1875 ppc_elf_howto_table[type] = &ppc_elf_howto_raw[i];
1876 }
1877}
1878
1879static reloc_howto_type *
1880ppc_elf_reloc_type_lookup (bfd *abfd ATTRIBUTE_UNUSED,
1881 bfd_reloc_code_real_type code)
1882{
1883 enum elf_ppc_reloc_type r;
1884
1885 /* Initialize howto table if not already done. */
1886 if (!ppc_elf_howto_table[R_PPC_ADDR32])
1887 ppc_elf_howto_init ();
1888
1889 switch (code)
1890 {
1891 default:
1892 return NULL;
1893
1894 case BFD_RELOC_NONE: r = R_PPC_NONE; break;
1895 case BFD_RELOC_32: r = R_PPC_ADDR32; break;
1896 case BFD_RELOC_PPC_BA26: r = R_PPC_ADDR24; break;
1fe532cf 1897 case BFD_RELOC_PPC64_ADDR16_DS:
25dbc73a 1898 case BFD_RELOC_16: r = R_PPC_ADDR16; break;
1fe532cf 1899 case BFD_RELOC_PPC64_ADDR16_LO_DS:
25dbc73a
AM
1900 case BFD_RELOC_LO16: r = R_PPC_ADDR16_LO; break;
1901 case BFD_RELOC_HI16: r = R_PPC_ADDR16_HI; break;
1902 case BFD_RELOC_HI16_S: r = R_PPC_ADDR16_HA; break;
1903 case BFD_RELOC_PPC_BA16: r = R_PPC_ADDR14; break;
1904 case BFD_RELOC_PPC_BA16_BRTAKEN: r = R_PPC_ADDR14_BRTAKEN; break;
1905 case BFD_RELOC_PPC_BA16_BRNTAKEN: r = R_PPC_ADDR14_BRNTAKEN; break;
1906 case BFD_RELOC_PPC_B26: r = R_PPC_REL24; break;
1907 case BFD_RELOC_PPC_B16: r = R_PPC_REL14; break;
1908 case BFD_RELOC_PPC_B16_BRTAKEN: r = R_PPC_REL14_BRTAKEN; break;
1909 case BFD_RELOC_PPC_B16_BRNTAKEN: r = R_PPC_REL14_BRNTAKEN; break;
1fe532cf 1910 case BFD_RELOC_PPC64_GOT16_DS:
25dbc73a 1911 case BFD_RELOC_16_GOTOFF: r = R_PPC_GOT16; break;
1fe532cf 1912 case BFD_RELOC_PPC64_GOT16_LO_DS:
25dbc73a
AM
1913 case BFD_RELOC_LO16_GOTOFF: r = R_PPC_GOT16_LO; break;
1914 case BFD_RELOC_HI16_GOTOFF: r = R_PPC_GOT16_HI; break;
1915 case BFD_RELOC_HI16_S_GOTOFF: r = R_PPC_GOT16_HA; break;
1916 case BFD_RELOC_24_PLT_PCREL: r = R_PPC_PLTREL24; break;
1917 case BFD_RELOC_PPC_COPY: r = R_PPC_COPY; break;
1918 case BFD_RELOC_PPC_GLOB_DAT: r = R_PPC_GLOB_DAT; break;
1919 case BFD_RELOC_PPC_LOCAL24PC: r = R_PPC_LOCAL24PC; break;
1920 case BFD_RELOC_32_PCREL: r = R_PPC_REL32; break;
1921 case BFD_RELOC_32_PLTOFF: r = R_PPC_PLT32; break;
1922 case BFD_RELOC_32_PLT_PCREL: r = R_PPC_PLTREL32; break;
1fe532cf 1923 case BFD_RELOC_PPC64_PLT16_LO_DS:
25dbc73a
AM
1924 case BFD_RELOC_LO16_PLTOFF: r = R_PPC_PLT16_LO; break;
1925 case BFD_RELOC_HI16_PLTOFF: r = R_PPC_PLT16_HI; break;
1926 case BFD_RELOC_HI16_S_PLTOFF: r = R_PPC_PLT16_HA; break;
1927 case BFD_RELOC_GPREL16: r = R_PPC_SDAREL16; break;
1fe532cf 1928 case BFD_RELOC_PPC64_SECTOFF_DS:
25dbc73a 1929 case BFD_RELOC_16_BASEREL: r = R_PPC_SECTOFF; break;
1fe532cf 1930 case BFD_RELOC_PPC64_SECTOFF_LO_DS:
25dbc73a
AM
1931 case BFD_RELOC_LO16_BASEREL: r = R_PPC_SECTOFF_LO; break;
1932 case BFD_RELOC_HI16_BASEREL: r = R_PPC_SECTOFF_HI; break;
1933 case BFD_RELOC_HI16_S_BASEREL: r = R_PPC_SECTOFF_HA; break;
1934 case BFD_RELOC_CTOR: r = R_PPC_ADDR32; break;
1fe532cf 1935 case BFD_RELOC_PPC64_TOC16_DS:
25dbc73a
AM
1936 case BFD_RELOC_PPC_TOC16: r = R_PPC_TOC16; break;
1937 case BFD_RELOC_PPC_TLS: r = R_PPC_TLS; break;
727fc41e
AM
1938 case BFD_RELOC_PPC_TLSGD: r = R_PPC_TLSGD; break;
1939 case BFD_RELOC_PPC_TLSLD: r = R_PPC_TLSLD; break;
25dbc73a 1940 case BFD_RELOC_PPC_DTPMOD: r = R_PPC_DTPMOD32; break;
1fe532cf 1941 case BFD_RELOC_PPC64_TPREL16_DS:
25dbc73a 1942 case BFD_RELOC_PPC_TPREL16: r = R_PPC_TPREL16; break;
1fe532cf 1943 case BFD_RELOC_PPC64_TPREL16_LO_DS:
25dbc73a
AM
1944 case BFD_RELOC_PPC_TPREL16_LO: r = R_PPC_TPREL16_LO; break;
1945 case BFD_RELOC_PPC_TPREL16_HI: r = R_PPC_TPREL16_HI; break;
1946 case BFD_RELOC_PPC_TPREL16_HA: r = R_PPC_TPREL16_HA; break;
1947 case BFD_RELOC_PPC_TPREL: r = R_PPC_TPREL32; break;
1fe532cf 1948 case BFD_RELOC_PPC64_DTPREL16_DS:
25dbc73a 1949 case BFD_RELOC_PPC_DTPREL16: r = R_PPC_DTPREL16; break;
1fe532cf 1950 case BFD_RELOC_PPC64_DTPREL16_LO_DS:
25dbc73a
AM
1951 case BFD_RELOC_PPC_DTPREL16_LO: r = R_PPC_DTPREL16_LO; break;
1952 case BFD_RELOC_PPC_DTPREL16_HI: r = R_PPC_DTPREL16_HI; break;
1953 case BFD_RELOC_PPC_DTPREL16_HA: r = R_PPC_DTPREL16_HA; break;
1954 case BFD_RELOC_PPC_DTPREL: r = R_PPC_DTPREL32; break;
1955 case BFD_RELOC_PPC_GOT_TLSGD16: r = R_PPC_GOT_TLSGD16; break;
1956 case BFD_RELOC_PPC_GOT_TLSGD16_LO: r = R_PPC_GOT_TLSGD16_LO; break;
1957 case BFD_RELOC_PPC_GOT_TLSGD16_HI: r = R_PPC_GOT_TLSGD16_HI; break;
1958 case BFD_RELOC_PPC_GOT_TLSGD16_HA: r = R_PPC_GOT_TLSGD16_HA; break;
1959 case BFD_RELOC_PPC_GOT_TLSLD16: r = R_PPC_GOT_TLSLD16; break;
1960 case BFD_RELOC_PPC_GOT_TLSLD16_LO: r = R_PPC_GOT_TLSLD16_LO; break;
1961 case BFD_RELOC_PPC_GOT_TLSLD16_HI: r = R_PPC_GOT_TLSLD16_HI; break;
1962 case BFD_RELOC_PPC_GOT_TLSLD16_HA: r = R_PPC_GOT_TLSLD16_HA; break;
1963 case BFD_RELOC_PPC_GOT_TPREL16: r = R_PPC_GOT_TPREL16; break;
1964 case BFD_RELOC_PPC_GOT_TPREL16_LO: r = R_PPC_GOT_TPREL16_LO; break;
1965 case BFD_RELOC_PPC_GOT_TPREL16_HI: r = R_PPC_GOT_TPREL16_HI; break;
1966 case BFD_RELOC_PPC_GOT_TPREL16_HA: r = R_PPC_GOT_TPREL16_HA; break;
1967 case BFD_RELOC_PPC_GOT_DTPREL16: r = R_PPC_GOT_DTPREL16; break;
1968 case BFD_RELOC_PPC_GOT_DTPREL16_LO: r = R_PPC_GOT_DTPREL16_LO; break;
1969 case BFD_RELOC_PPC_GOT_DTPREL16_HI: r = R_PPC_GOT_DTPREL16_HI; break;
1970 case BFD_RELOC_PPC_GOT_DTPREL16_HA: r = R_PPC_GOT_DTPREL16_HA; break;
1971 case BFD_RELOC_PPC_EMB_NADDR32: r = R_PPC_EMB_NADDR32; break;
1972 case BFD_RELOC_PPC_EMB_NADDR16: r = R_PPC_EMB_NADDR16; break;
1973 case BFD_RELOC_PPC_EMB_NADDR16_LO: r = R_PPC_EMB_NADDR16_LO; break;
1974 case BFD_RELOC_PPC_EMB_NADDR16_HI: r = R_PPC_EMB_NADDR16_HI; break;
1975 case BFD_RELOC_PPC_EMB_NADDR16_HA: r = R_PPC_EMB_NADDR16_HA; break;
1976 case BFD_RELOC_PPC_EMB_SDAI16: r = R_PPC_EMB_SDAI16; break;
1977 case BFD_RELOC_PPC_EMB_SDA2I16: r = R_PPC_EMB_SDA2I16; break;
1978 case BFD_RELOC_PPC_EMB_SDA2REL: r = R_PPC_EMB_SDA2REL; break;
1979 case BFD_RELOC_PPC_EMB_SDA21: r = R_PPC_EMB_SDA21; break;
1980 case BFD_RELOC_PPC_EMB_MRKREF: r = R_PPC_EMB_MRKREF; break;
1981 case BFD_RELOC_PPC_EMB_RELSEC16: r = R_PPC_EMB_RELSEC16; break;
1982 case BFD_RELOC_PPC_EMB_RELST_LO: r = R_PPC_EMB_RELST_LO; break;
1983 case BFD_RELOC_PPC_EMB_RELST_HI: r = R_PPC_EMB_RELST_HI; break;
1984 case BFD_RELOC_PPC_EMB_RELST_HA: r = R_PPC_EMB_RELST_HA; break;
1985 case BFD_RELOC_PPC_EMB_BIT_FLD: r = R_PPC_EMB_BIT_FLD; break;
1986 case BFD_RELOC_PPC_EMB_RELSDA: r = R_PPC_EMB_RELSDA; break;
b9c361e0
JL
1987 case BFD_RELOC_PPC_VLE_REL8: r = R_PPC_VLE_REL8; break;
1988 case BFD_RELOC_PPC_VLE_REL15: r = R_PPC_VLE_REL15; break;
1989 case BFD_RELOC_PPC_VLE_REL24: r = R_PPC_VLE_REL24; break;
1990 case BFD_RELOC_PPC_VLE_LO16A: r = R_PPC_VLE_LO16A; break;
1991 case BFD_RELOC_PPC_VLE_LO16D: r = R_PPC_VLE_LO16D; break;
1992 case BFD_RELOC_PPC_VLE_HI16A: r = R_PPC_VLE_HI16A; break;
1993 case BFD_RELOC_PPC_VLE_HI16D: r = R_PPC_VLE_HI16D; break;
1994 case BFD_RELOC_PPC_VLE_HA16A: r = R_PPC_VLE_HA16A; break;
1995 case BFD_RELOC_PPC_VLE_HA16D: r = R_PPC_VLE_HA16D; break;
1996 case BFD_RELOC_PPC_VLE_SDA21: r = R_PPC_VLE_SDA21; break;
1997 case BFD_RELOC_PPC_VLE_SDA21_LO: r = R_PPC_VLE_SDA21_LO; break;
1998 case BFD_RELOC_PPC_VLE_SDAREL_LO16A:
1999 r = R_PPC_VLE_SDAREL_LO16A;
2000 break;
2001 case BFD_RELOC_PPC_VLE_SDAREL_LO16D:
2002 r = R_PPC_VLE_SDAREL_LO16D;
2003 break;
2004 case BFD_RELOC_PPC_VLE_SDAREL_HI16A:
2005 r = R_PPC_VLE_SDAREL_HI16A;
2006 break;
2007 case BFD_RELOC_PPC_VLE_SDAREL_HI16D:
2008 r = R_PPC_VLE_SDAREL_HI16D;
2009 break;
2010 case BFD_RELOC_PPC_VLE_SDAREL_HA16A:
2011 r = R_PPC_VLE_SDAREL_HA16A;
2012 break;
2013 case BFD_RELOC_PPC_VLE_SDAREL_HA16D:
2014 r = R_PPC_VLE_SDAREL_HA16D;
2015 break;
d7128ce4
AM
2016 case BFD_RELOC_16_PCREL: r = R_PPC_REL16; break;
2017 case BFD_RELOC_LO16_PCREL: r = R_PPC_REL16_LO; break;
2018 case BFD_RELOC_HI16_PCREL: r = R_PPC_REL16_HI; break;
2019 case BFD_RELOC_HI16_S_PCREL: r = R_PPC_REL16_HA; break;
7ba71655 2020 case BFD_RELOC_PPC_16DX_HA: r = R_PPC_16DX_HA; break;
a680de9a 2021 case BFD_RELOC_PPC_REL16DX_HA: r = R_PPC_REL16DX_HA; break;
25dbc73a
AM
2022 case BFD_RELOC_VTABLE_INHERIT: r = R_PPC_GNU_VTINHERIT; break;
2023 case BFD_RELOC_VTABLE_ENTRY: r = R_PPC_GNU_VTENTRY; break;
2024 }
2025
2026 return ppc_elf_howto_table[r];
2027};
2028
157090f7
AM
2029static reloc_howto_type *
2030ppc_elf_reloc_name_lookup (bfd *abfd ATTRIBUTE_UNUSED,
2031 const char *r_name)
2032{
2033 unsigned int i;
2034
2035 for (i = 0;
2036 i < sizeof (ppc_elf_howto_raw) / sizeof (ppc_elf_howto_raw[0]);
2037 i++)
2038 if (ppc_elf_howto_raw[i].name != NULL
2039 && strcasecmp (ppc_elf_howto_raw[i].name, r_name) == 0)
2040 return &ppc_elf_howto_raw[i];
2041
2042 return NULL;
2043}
2044
25dbc73a
AM
2045/* Set the howto pointer for a PowerPC ELF reloc. */
2046
2047static void
4aef7643 2048ppc_elf_info_to_howto (bfd *abfd,
25dbc73a
AM
2049 arelent *cache_ptr,
2050 Elf_Internal_Rela *dst)
2051{
cd21f5da
NC
2052 unsigned int r_type;
2053
25dbc73a
AM
2054 /* Initialize howto table if not already done. */
2055 if (!ppc_elf_howto_table[R_PPC_ADDR32])
2056 ppc_elf_howto_init ();
2057
cd21f5da
NC
2058 r_type = ELF32_R_TYPE (dst->r_info);
2059 if (r_type >= R_PPC_max)
2060 {
695344c0 2061 /* xgettext:c-format */
4eca0228
AM
2062 _bfd_error_handler (_("%B: unrecognised PPC reloc number: %d"),
2063 abfd, r_type);
cd21f5da
NC
2064 bfd_set_error (bfd_error_bad_value);
2065 r_type = R_PPC_NONE;
2066 }
2067 cache_ptr->howto = ppc_elf_howto_table[r_type];
375de94a
AM
2068
2069 /* Just because the above assert didn't trigger doesn't mean that
2070 ELF32_R_TYPE (dst->r_info) is necessarily a valid relocation. */
2071 if (!cache_ptr->howto)
2072 {
695344c0 2073 /* xgettext:c-format */
4eca0228
AM
2074 _bfd_error_handler (_("%B: invalid relocation type %d"),
2075 abfd, r_type);
375de94a
AM
2076 bfd_set_error (bfd_error_bad_value);
2077
2078 cache_ptr->howto = ppc_elf_howto_table[R_PPC_NONE];
2079 }
25dbc73a
AM
2080}
2081
d7128ce4 2082/* Handle the R_PPC_ADDR16_HA and R_PPC_REL16_HA relocs. */
25dbc73a
AM
2083
2084static bfd_reloc_status_type
4aef7643 2085ppc_elf_addr16_ha_reloc (bfd *abfd,
25dbc73a
AM
2086 arelent *reloc_entry,
2087 asymbol *symbol,
4aef7643 2088 void *data,
25dbc73a
AM
2089 asection *input_section,
2090 bfd *output_bfd,
2091 char **error_message ATTRIBUTE_UNUSED)
2092{
a680de9a
PB
2093 enum elf_ppc_reloc_type r_type;
2094 long insn;
2095 bfd_size_type octets;
2096 bfd_vma value;
25dbc73a
AM
2097
2098 if (output_bfd != NULL)
2099 {
2100 reloc_entry->address += input_section->output_offset;
2101 return bfd_reloc_ok;
2102 }
2103
a680de9a
PB
2104 reloc_entry->addend += 0x8000;
2105 r_type = reloc_entry->howto->type;
2106 if (r_type != R_PPC_REL16DX_HA)
2107 return bfd_reloc_continue;
2108
2109 value = 0;
2110 if (!bfd_is_com_section (symbol->section))
2111 value = symbol->value;
2112 value += (reloc_entry->addend
2113 + symbol->section->output_offset
2114 + symbol->section->output_section->vma);
2115 value -= (reloc_entry->address
2116 + input_section->output_offset
2117 + input_section->output_section->vma);
2118 value >>= 16;
2119
2120 octets = reloc_entry->address * bfd_octets_per_byte (abfd);
2121 insn = bfd_get_32 (abfd, (bfd_byte *) data + octets);
2122 insn &= ~0x1fffc1;
2123 insn |= (value & 0xffc1) | ((value & 0x3e) << 15);
2124 bfd_put_32 (abfd, insn, (bfd_byte *) data + octets);
2125 return bfd_reloc_ok;
25dbc73a
AM
2126}
2127
2128static bfd_reloc_status_type
2129ppc_elf_unhandled_reloc (bfd *abfd,
2130 arelent *reloc_entry,
2131 asymbol *symbol,
2132 void *data,
2133 asection *input_section,
2134 bfd *output_bfd,
2135 char **error_message)
2136{
2137 /* If this is a relocatable link (output_bfd test tells us), just
2138 call the generic function. Any adjustment will be done at final
2139 link time. */
2140 if (output_bfd != NULL)
2141 return bfd_elf_generic_reloc (abfd, reloc_entry, symbol, data,
2142 input_section, output_bfd, error_message);
2143
2144 if (error_message != NULL)
2145 {
2146 static char buf[60];
2147 sprintf (buf, _("generic linker can't handle %s"),
2148 reloc_entry->howto->name);
2149 *error_message = buf;
2150 }
2151 return bfd_reloc_dangerous;
2152}
2153\f
2154/* Sections created by the linker. */
2155
2156typedef struct elf_linker_section
2157{
c9a2f333 2158 /* Pointer to the bfd section. */
25dbc73a 2159 asection *section;
c9a2f333
AM
2160 /* Section name. */
2161 const char *name;
2162 /* Associated bss section name. */
2163 const char *bss_name;
2164 /* Associated symbol name. */
2165 const char *sym_name;
046183de
AM
2166 /* Associated symbol. */
2167 struct elf_link_hash_entry *sym;
25dbc73a
AM
2168} elf_linker_section_t;
2169
2170/* Linked list of allocated pointer entries. This hangs off of the
2171 symbol lists, and provides allows us to return different pointers,
2172 based on different addend's. */
2173
2174typedef struct elf_linker_section_pointers
2175{
2176 /* next allocated pointer for this symbol */
2177 struct elf_linker_section_pointers *next;
2178 /* offset of pointer from beginning of section */
2179 bfd_vma offset;
2180 /* addend used */
2181 bfd_vma addend;
2182 /* which linker section this is */
2183 elf_linker_section_t *lsect;
25dbc73a
AM
2184} elf_linker_section_pointers_t;
2185
2186struct ppc_elf_obj_tdata
2187{
2188 struct elf_obj_tdata elf;
2189
2190 /* A mapping from local symbols to offsets into the various linker
2191 sections added. This is index by the symbol index. */
2192 elf_linker_section_pointers_t **linker_section_pointers;
016687f8
AM
2193
2194 /* Flags used to auto-detect plt type. */
2195 unsigned int makes_plt_call : 1;
2196 unsigned int has_rel16 : 1;
25dbc73a
AM
2197};
2198
2199#define ppc_elf_tdata(bfd) \
2200 ((struct ppc_elf_obj_tdata *) (bfd)->tdata.any)
7619e7c7 2201
25dbc73a
AM
2202#define elf_local_ptr_offsets(bfd) \
2203 (ppc_elf_tdata (bfd)->linker_section_pointers)
7619e7c7 2204
0c8d6e5c
AM
2205#define is_ppc_elf(bfd) \
2206 (bfd_get_flavour (bfd) == bfd_target_elf_flavour \
4dfe6ac6 2207 && elf_object_id (bfd) == PPC32_ELF_DATA)
0c8d6e5c 2208
25dbc73a 2209/* Override the generic function because we store some extras. */
7619e7c7 2210
25dbc73a
AM
2211static bfd_boolean
2212ppc_elf_mkobject (bfd *abfd)
2213{
0ffa91dd 2214 return bfd_elf_allocate_object (abfd, sizeof (struct ppc_elf_obj_tdata),
4dfe6ac6 2215 PPC32_ELF_DATA);
25dbc73a 2216}
7619e7c7 2217
14b57c7c
AM
2218/* When defaulting arch/mach, decode apuinfo to find a better match. */
2219
2220bfd_boolean
2221_bfd_elf_ppc_set_arch (bfd *abfd)
2222{
2223 unsigned long mach = 0;
2224 asection *s;
2225 unsigned char *contents;
2226
2227 if (abfd->arch_info->bits_per_word == 32
2228 && bfd_big_endian (abfd))
2229 {
2230
2231 for (s = abfd->sections; s != NULL; s = s->next)
2232 if ((elf_section_data (s)->this_hdr.sh_flags & SHF_PPC_VLE) != 0)
2233 break;
2234 if (s != NULL)
2235 mach = bfd_mach_ppc_vle;
2236 }
2237
2238 if (mach == 0)
2239 {
2240 s = bfd_get_section_by_name (abfd, APUINFO_SECTION_NAME);
2241 if (s != NULL && bfd_malloc_and_get_section (abfd, s, &contents))
2242 {
2243 unsigned int apuinfo_size = bfd_get_32 (abfd, contents + 4);
2244 unsigned int i;
2245
2246 for (i = 20; i < apuinfo_size + 20 && i + 4 <= s->size; i += 4)
2247 {
2248 unsigned int val = bfd_get_32 (abfd, contents + i);
2249 switch (val >> 16)
2250 {
2251 case PPC_APUINFO_PMR:
2252 case PPC_APUINFO_RFMCI:
2253 if (mach == 0)
2254 mach = bfd_mach_ppc_titan;
2255 break;
2256
2257 case PPC_APUINFO_ISEL:
2258 case PPC_APUINFO_CACHELCK:
2259 if (mach == bfd_mach_ppc_titan)
2260 mach = bfd_mach_ppc_e500mc;
2261 break;
2262
2263 case PPC_APUINFO_SPE:
2264 case PPC_APUINFO_EFS:
2265 case PPC_APUINFO_BRLOCK:
2266 if (mach != bfd_mach_ppc_vle)
2267 mach = bfd_mach_ppc_e500;
8941017b 2268 break;
14b57c7c
AM
2269
2270 case PPC_APUINFO_VLE:
2271 mach = bfd_mach_ppc_vle;
2272 break;
2273
2274 default:
2275 mach = -1ul;
2276 }
2277 }
2278 free (contents);
2279 }
2280 }
2281
2282 if (mach != 0 && mach != -1ul)
2283 {
2284 const bfd_arch_info_type *arch;
2285
2286 for (arch = abfd->arch_info->next; arch; arch = arch->next)
2287 if (arch->mach == mach)
2288 {
2289 abfd->arch_info = arch;
2290 break;
2291 }
2292 }
2293 return TRUE;
2294}
2295
25dbc73a 2296/* Fix bad default arch selected for a 32 bit input bfd when the
14b57c7c 2297 default is 64 bit. Also select arch based on apuinfo. */
7619e7c7 2298
25dbc73a
AM
2299static bfd_boolean
2300ppc_elf_object_p (bfd *abfd)
2301{
14b57c7c
AM
2302 if (!abfd->arch_info->the_default)
2303 return TRUE;
2304
2305 if (abfd->arch_info->bits_per_word == 64)
25dbc73a
AM
2306 {
2307 Elf_Internal_Ehdr *i_ehdr = elf_elfheader (abfd);
7619e7c7 2308
25dbc73a
AM
2309 if (i_ehdr->e_ident[EI_CLASS] == ELFCLASS32)
2310 {
2311 /* Relies on arch after 64 bit default being 32 bit default. */
2312 abfd->arch_info = abfd->arch_info->next;
2313 BFD_ASSERT (abfd->arch_info->bits_per_word == 32);
2314 }
2315 }
14b57c7c 2316 return _bfd_elf_ppc_set_arch (abfd);
25dbc73a 2317}
7619e7c7 2318
25dbc73a 2319/* Function to set whether a module needs the -mrelocatable bit set. */
7619e7c7 2320
25dbc73a
AM
2321static bfd_boolean
2322ppc_elf_set_private_flags (bfd *abfd, flagword flags)
2323{
2324 BFD_ASSERT (!elf_flags_init (abfd)
2325 || elf_elfheader (abfd)->e_flags == flags);
7619e7c7 2326
25dbc73a
AM
2327 elf_elfheader (abfd)->e_flags = flags;
2328 elf_flags_init (abfd) = TRUE;
2329 return TRUE;
2330}
2331
25dbc73a 2332/* Support for core dump NOTE sections. */
deaaf2f3 2333
b34976b6 2334static bfd_boolean
25dbc73a 2335ppc_elf_grok_prstatus (bfd *abfd, Elf_Internal_Note *note)
252b5132 2336{
25dbc73a
AM
2337 int offset;
2338 unsigned int size;
252b5132 2339
25dbc73a
AM
2340 switch (note->descsz)
2341 {
2342 default:
2343 return FALSE;
252b5132 2344
25dbc73a
AM
2345 case 268: /* Linux/PPC. */
2346 /* pr_cursig */
228e534f 2347 elf_tdata (abfd)->core->signal = bfd_get_16 (abfd, note->descdata + 12);
deaaf2f3 2348
25dbc73a 2349 /* pr_pid */
228e534f 2350 elf_tdata (abfd)->core->lwpid = bfd_get_32 (abfd, note->descdata + 24);
9abc968f 2351
25dbc73a
AM
2352 /* pr_reg */
2353 offset = 72;
2354 size = 192;
deaaf2f3 2355
25dbc73a
AM
2356 break;
2357 }
deaaf2f3 2358
25dbc73a
AM
2359 /* Make a ".reg/999" section. */
2360 return _bfd_elfcore_make_pseudosection (abfd, ".reg",
2361 size, note->descpos + offset);
2362}
252b5132 2363
25dbc73a
AM
2364static bfd_boolean
2365ppc_elf_grok_psinfo (bfd *abfd, Elf_Internal_Note *note)
2366{
2367 switch (note->descsz)
deaaf2f3 2368 {
25dbc73a
AM
2369 default:
2370 return FALSE;
deaaf2f3 2371
25dbc73a 2372 case 128: /* Linux/PPC elf_prpsinfo. */
228e534f 2373 elf_tdata (abfd)->core->pid
bc989cdc 2374 = bfd_get_32 (abfd, note->descdata + 16);
228e534f 2375 elf_tdata (abfd)->core->program
25dbc73a 2376 = _bfd_elfcore_strndup (abfd, note->descdata + 32, 16);
228e534f 2377 elf_tdata (abfd)->core->command
25dbc73a
AM
2378 = _bfd_elfcore_strndup (abfd, note->descdata + 48, 80);
2379 }
9abc968f 2380
25dbc73a
AM
2381 /* Note that for some reason, a spurious space is tacked
2382 onto the end of the args in some (at least one anyway)
2383 implementations, so strip it off if it exists. */
70bccea4 2384
25dbc73a 2385 {
228e534f 2386 char *command = elf_tdata (abfd)->core->command;
25dbc73a 2387 int n = strlen (command);
70bccea4 2388
25dbc73a
AM
2389 if (0 < n && command[n - 1] == ' ')
2390 command[n - 1] = '\0';
2391 }
deaaf2f3 2392
25dbc73a
AM
2393 return TRUE;
2394}
deaaf2f3 2395
70a38d42 2396char *
aeb70569
AM
2397elfcore_write_ppc_linux_prpsinfo32
2398 (bfd *abfd,
2399 char *buf,
2400 int *bufsiz,
2401 const struct elf_internal_linux_prpsinfo *prpsinfo)
70a38d42
SDJ
2402{
2403 struct elf_external_ppc_linux_prpsinfo32 data;
2404
aeb70569 2405 swap_ppc_linux_prpsinfo32_out (abfd, prpsinfo, &data);
70a38d42
SDJ
2406 return elfcore_write_note (abfd, buf, bufsiz,
2407 "CORE", NT_PRPSINFO, &data, sizeof (data));
2408}
2409
183e98be
AM
2410static char *
2411ppc_elf_write_core_note (bfd *abfd, char *buf, int *bufsiz, int note_type, ...)
2412{
2413 switch (note_type)
2414 {
2415 default:
2416 return NULL;
2417
2418 case NT_PRPSINFO:
2419 {
2420 char data[128];
2421 va_list ap;
2422
2423 va_start (ap, note_type);
75cd47ed 2424 memset (data, 0, sizeof (data));
183e98be
AM
2425 strncpy (data + 32, va_arg (ap, const char *), 16);
2426 strncpy (data + 48, va_arg (ap, const char *), 80);
2427 va_end (ap);
2428 return elfcore_write_note (abfd, buf, bufsiz,
2429 "CORE", note_type, data, sizeof (data));
2430 }
2431
2432 case NT_PRSTATUS:
2433 {
2434 char data[268];
2435 va_list ap;
2436 long pid;
2437 int cursig;
2438 const void *greg;
2439
2440 va_start (ap, note_type);
2441 memset (data, 0, 72);
2442 pid = va_arg (ap, long);
2443 bfd_put_32 (abfd, pid, data + 24);
2444 cursig = va_arg (ap, int);
2445 bfd_put_16 (abfd, cursig, data + 12);
2446 greg = va_arg (ap, const void *);
2447 memcpy (data + 72, greg, 192);
2448 memset (data + 264, 0, 4);
2449 va_end (ap);
2450 return elfcore_write_note (abfd, buf, bufsiz,
2451 "CORE", note_type, data, sizeof (data));
2452 }
2453 }
2454}
2455
b9c361e0 2456static flagword
68ffbac6 2457ppc_elf_lookup_section_flags (char *flag_name)
b9c361e0
JL
2458{
2459
2460 if (!strcmp (flag_name, "SHF_PPC_VLE"))
2461 return SHF_PPC_VLE;
2462
2463 return 0;
2464}
2465
25dbc73a
AM
2466/* Return address for Ith PLT stub in section PLT, for relocation REL
2467 or (bfd_vma) -1 if it should not be included. */
deaaf2f3 2468
25dbc73a
AM
2469static bfd_vma
2470ppc_elf_plt_sym_val (bfd_vma i ATTRIBUTE_UNUSED,
2471 const asection *plt ATTRIBUTE_UNUSED,
2472 const arelent *rel)
2473{
2474 return rel->address;
2475}
deaaf2f3 2476
25dbc73a 2477/* Handle a PowerPC specific section when reading an object file. This
6dc132d9
L
2478 is called when bfd_section_from_shdr finds a section with an unknown
2479 type. */
deaaf2f3 2480
25dbc73a 2481static bfd_boolean
6dc132d9
L
2482ppc_elf_section_from_shdr (bfd *abfd,
2483 Elf_Internal_Shdr *hdr,
2484 const char *name,
2485 int shindex)
25dbc73a
AM
2486{
2487 asection *newsect;
2488 flagword flags;
d1c6de6f 2489
6dc132d9 2490 if (! _bfd_elf_make_section_from_shdr (abfd, hdr, name, shindex))
25dbc73a 2491 return FALSE;
deaaf2f3 2492
25dbc73a
AM
2493 newsect = hdr->bfd_section;
2494 flags = bfd_get_section_flags (abfd, newsect);
2495 if (hdr->sh_flags & SHF_EXCLUDE)
2496 flags |= SEC_EXCLUDE;
9abc968f 2497
25dbc73a
AM
2498 if (hdr->sh_type == SHT_ORDERED)
2499 flags |= SEC_SORT_ENTRIES;
d1c6de6f 2500
25dbc73a
AM
2501 bfd_set_section_flags (abfd, newsect, flags);
2502 return TRUE;
2503}
2504
2505/* Set up any other section flags and such that may be necessary. */
2506
2507static bfd_boolean
2508ppc_elf_fake_sections (bfd *abfd ATTRIBUTE_UNUSED,
2509 Elf_Internal_Shdr *shdr,
2510 asection *asect)
2511{
25dbc73a
AM
2512 if ((asect->flags & SEC_SORT_ENTRIES) != 0)
2513 shdr->sh_type = SHT_ORDERED;
2514
2515 return TRUE;
2516}
2517
2518/* If we have .sbss2 or .PPC.EMB.sbss0 output sections, we
2519 need to bump up the number of section headers. */
2520
2521static int
a6b96beb
AM
2522ppc_elf_additional_program_headers (bfd *abfd,
2523 struct bfd_link_info *info ATTRIBUTE_UNUSED)
25dbc73a
AM
2524{
2525 asection *s;
2526 int ret = 0;
d1c6de6f 2527
25dbc73a
AM
2528 s = bfd_get_section_by_name (abfd, ".sbss2");
2529 if (s != NULL && (s->flags & SEC_ALLOC) != 0)
2530 ++ret;
d1c6de6f 2531
25dbc73a
AM
2532 s = bfd_get_section_by_name (abfd, ".PPC.EMB.sbss0");
2533 if (s != NULL && (s->flags & SEC_ALLOC) != 0)
2534 ++ret;
deaaf2f3 2535
25dbc73a
AM
2536 return ret;
2537}
deaaf2f3 2538
68ffbac6 2539/* Modify the segment map for VLE executables. */
b9c361e0
JL
2540
2541bfd_boolean
2542ppc_elf_modify_segment_map (bfd *abfd,
2543 struct bfd_link_info *info ATTRIBUTE_UNUSED)
2544{
f7d69005 2545 struct elf_segment_map *m;
b9c361e0
JL
2546
2547 /* At this point in the link, output sections have already been sorted by
2548 LMA and assigned to segments. All that is left to do is to ensure
2549 there is no mixing of VLE & non-VLE sections in a text segment.
2550 If we find that case, we split the segment.
2551 We maintain the original output section order. */
2552
12bd6957 2553 for (m = elf_seg_map (abfd); m != NULL; m = m->next)
b9c361e0 2554 {
f7d69005
AM
2555 struct elf_segment_map *n;
2556 bfd_size_type amt;
2557 unsigned int j, k;
2558 unsigned int p_flags;
2559
2560 if (m->p_type != PT_LOAD || m->count == 0)
b9c361e0
JL
2561 continue;
2562
f7d69005 2563 for (p_flags = PF_R, j = 0; j != m->count; ++j)
b9c361e0 2564 {
f7d69005
AM
2565 if ((m->sections[j]->flags & SEC_READONLY) == 0)
2566 p_flags |= PF_W;
2567 if ((m->sections[j]->flags & SEC_CODE) != 0)
2568 {
2569 p_flags |= PF_X;
2570 if ((elf_section_flags (m->sections[j]) & SHF_PPC_VLE) != 0)
2571 p_flags |= PF_PPC_VLE;
2572 break;
2573 }
2574 }
2575 if (j != m->count)
2576 while (++j != m->count)
2577 {
2578 unsigned int p_flags1 = PF_R;
94caa966 2579
f7d69005
AM
2580 if ((m->sections[j]->flags & SEC_READONLY) == 0)
2581 p_flags1 |= PF_W;
2582 if ((m->sections[j]->flags & SEC_CODE) != 0)
2583 {
2584 p_flags1 |= PF_X;
2585 if ((elf_section_flags (m->sections[j]) & SHF_PPC_VLE) != 0)
2586 p_flags1 |= PF_PPC_VLE;
2587 if (((p_flags1 ^ p_flags) & PF_PPC_VLE) != 0)
2588 break;
2589 }
2590 p_flags |= p_flags1;
2591 }
2592 /* If we're splitting a segment which originally contained rw
2593 sections then those sections might now only be in one of the
2594 two parts. So always set p_flags if splitting, even if we
2595 are being called for objcopy with p_flags_valid set. */
2596 if (j != m->count || !m->p_flags_valid)
2597 {
2598 m->p_flags_valid = 1;
2599 m->p_flags = p_flags;
2600 }
2601 if (j == m->count)
b9c361e0
JL
2602 continue;
2603
f7d69005 2604 /* Sections 0..j-1 stay in this (current) segment,
b9c361e0
JL
2605 the remainder are put in a new segment.
2606 The scan resumes with the new segment. */
2607
b9c361e0
JL
2608 amt = sizeof (struct elf_segment_map);
2609 amt += (m->count - j - 1) * sizeof (asection *);
2610 n = (struct elf_segment_map *) bfd_zalloc (abfd, amt);
2611 if (n == NULL)
2612 return FALSE;
2613
2614 n->p_type = PT_LOAD;
b9c361e0
JL
2615 n->count = m->count - j;
2616 for (k = 0; k < n->count; ++k)
f7d69005
AM
2617 n->sections[k] = m->sections[j + k];
2618 m->count = j;
2619 m->p_size_valid = 0;
b9c361e0
JL
2620 n->next = m->next;
2621 m->next = n;
b9c361e0
JL
2622 }
2623
2624 return TRUE;
2625}
2626
25dbc73a
AM
2627/* Add extra PPC sections -- Note, for now, make .sbss2 and
2628 .PPC.EMB.sbss0 a normal section, and not a bss section so
2629 that the linker doesn't crater when trying to make more than
2630 2 sections. */
e656e369 2631
b35d266b 2632static const struct bfd_elf_special_section ppc_elf_special_sections[] =
7f4d3958 2633{
14b57c7c
AM
2634 { STRING_COMMA_LEN (".plt"), 0, SHT_NOBITS, SHF_ALLOC + SHF_EXECINSTR },
2635 { STRING_COMMA_LEN (".sbss"), -2, SHT_NOBITS, SHF_ALLOC + SHF_WRITE },
2636 { STRING_COMMA_LEN (".sbss2"), -2, SHT_PROGBITS, SHF_ALLOC },
2637 { STRING_COMMA_LEN (".sdata"), -2, SHT_PROGBITS, SHF_ALLOC + SHF_WRITE },
2638 { STRING_COMMA_LEN (".sdata2"), -2, SHT_PROGBITS, SHF_ALLOC },
2639 { STRING_COMMA_LEN (".tags"), 0, SHT_ORDERED, SHF_ALLOC },
2640 { STRING_COMMA_LEN (APUINFO_SECTION_NAME), 0, SHT_NOTE, 0 },
2641 { STRING_COMMA_LEN (".PPC.EMB.sbss0"), 0, SHT_PROGBITS, SHF_ALLOC },
2642 { STRING_COMMA_LEN (".PPC.EMB.sdata0"), 0, SHT_PROGBITS, SHF_ALLOC },
2643 { NULL, 0, 0, 0, 0 }
7f4d3958
L
2644};
2645
551b43fd
AM
2646/* This is what we want for new plt/got. */
2647static struct bfd_elf_special_section ppc_alt_plt =
0112cd26 2648 { STRING_COMMA_LEN (".plt"), 0, SHT_PROGBITS, SHF_ALLOC };
551b43fd
AM
2649
2650static const struct bfd_elf_special_section *
4aef7643 2651ppc_elf_get_sec_type_attr (bfd *abfd, asection *sec)
7f4d3958 2652{
b35d266b 2653 const struct bfd_elf_special_section *ssect;
551b43fd
AM
2654
2655 /* See if this is one of the special sections. */
2656 if (sec->name == NULL)
2657 return NULL;
2658
2659 ssect = _bfd_elf_get_special_section (sec->name, ppc_elf_special_sections,
2660 sec->use_rela_p);
2661 if (ssect != NULL)
2662 {
2663 if (ssect == ppc_elf_special_sections && (sec->flags & SEC_LOAD) != 0)
2664 ssect = &ppc_alt_plt;
2665 return ssect;
2666 }
2667
2668 return _bfd_elf_get_sec_type_attr (abfd, sec);
2669}
25dbc73a
AM
2670\f
2671/* Very simple linked list structure for recording apuinfo values. */
2672typedef struct apuinfo_list
2673{
2674 struct apuinfo_list *next;
2675 unsigned long value;
2676}
2677apuinfo_list;
e656e369 2678
25dbc73a 2679static apuinfo_list *head;
f2faa800 2680static bfd_boolean apuinfo_set;
deaaf2f3 2681
25dbc73a
AM
2682static void
2683apuinfo_list_init (void)
2684{
2685 head = NULL;
f2faa800 2686 apuinfo_set = FALSE;
25dbc73a 2687}
9abc968f 2688
25dbc73a
AM
2689static void
2690apuinfo_list_add (unsigned long value)
2691{
2692 apuinfo_list *entry = head;
deaaf2f3 2693
25dbc73a
AM
2694 while (entry != NULL)
2695 {
2696 if (entry->value == value)
2697 return;
2698 entry = entry->next;
2699 }
b4a38de6 2700
25dbc73a
AM
2701 entry = bfd_malloc (sizeof (* entry));
2702 if (entry == NULL)
2703 return;
e656e369 2704
25dbc73a
AM
2705 entry->value = value;
2706 entry->next = head;
2707 head = entry;
2708}
9abc968f 2709
25dbc73a
AM
2710static unsigned
2711apuinfo_list_length (void)
2712{
2713 apuinfo_list *entry;
2714 unsigned long count;
9abc968f 2715
25dbc73a
AM
2716 for (entry = head, count = 0;
2717 entry;
2718 entry = entry->next)
2719 ++ count;
e656e369 2720
25dbc73a
AM
2721 return count;
2722}
eea6121a 2723
25dbc73a
AM
2724static inline unsigned long
2725apuinfo_list_element (unsigned long number)
2726{
2727 apuinfo_list * entry;
e656e369 2728
25dbc73a
AM
2729 for (entry = head;
2730 entry && number --;
2731 entry = entry->next)
2732 ;
252b5132 2733
25dbc73a
AM
2734 return entry ? entry->value : 0;
2735}
2736
2737static void
2738apuinfo_list_finish (void)
2739{
2740 apuinfo_list *entry;
2741
2742 for (entry = head; entry;)
252b5132 2743 {
25dbc73a
AM
2744 apuinfo_list *next = entry->next;
2745 free (entry);
2746 entry = next;
2747 }
9abc968f 2748
25dbc73a
AM
2749 head = NULL;
2750}
9abc968f 2751
25dbc73a
AM
2752/* Scan the input BFDs and create a linked list of
2753 the APUinfo values that will need to be emitted. */
9abc968f 2754
25dbc73a
AM
2755static void
2756ppc_elf_begin_write_processing (bfd *abfd, struct bfd_link_info *link_info)
2757{
2758 bfd *ibfd;
2759 asection *asec;
deddc40b
NS
2760 char *buffer = NULL;
2761 bfd_size_type largest_input_size = 0;
25dbc73a 2762 unsigned i;
25dbc73a
AM
2763 unsigned long length;
2764 const char *error_message = NULL;
9abc968f 2765
25dbc73a
AM
2766 if (link_info == NULL)
2767 return;
9abc968f 2768
25dbc73a 2769 apuinfo_list_init ();
252b5132 2770
25dbc73a 2771 /* Read in the input sections contents. */
c72f2fb2 2772 for (ibfd = link_info->input_bfds; ibfd; ibfd = ibfd->link.next)
252b5132 2773 {
25dbc73a 2774 unsigned long datum;
252b5132 2775
25dbc73a
AM
2776 asec = bfd_get_section_by_name (ibfd, APUINFO_SECTION_NAME);
2777 if (asec == NULL)
2778 continue;
252b5132 2779
695344c0 2780 /* xgettext:c-format */
deddc40b 2781 error_message = _("corrupt %s section in %B");
25dbc73a 2782 length = asec->size;
deddc40b
NS
2783 if (length < 20)
2784 goto fail;
2785
f2faa800 2786 apuinfo_set = TRUE;
deddc40b 2787 if (largest_input_size < asec->size)
25dbc73a 2788 {
deddc40b
NS
2789 if (buffer)
2790 free (buffer);
2791 largest_input_size = asec->size;
2792 buffer = bfd_malloc (largest_input_size);
2793 if (!buffer)
2794 return;
25dbc73a 2795 }
5b914448 2796
25dbc73a 2797 if (bfd_seek (ibfd, asec->filepos, SEEK_SET) != 0
deddc40b 2798 || (bfd_bread (buffer, length, ibfd) != length))
25dbc73a 2799 {
695344c0 2800 /* xgettext:c-format */
25dbc73a
AM
2801 error_message = _("unable to read in %s section from %B");
2802 goto fail;
2803 }
252b5132 2804
25dbc73a
AM
2805 /* Verify the contents of the header. Note - we have to
2806 extract the values this way in order to allow for a
2807 host whose endian-ness is different from the target. */
deddc40b 2808 datum = bfd_get_32 (ibfd, buffer);
25dbc73a
AM
2809 if (datum != sizeof APUINFO_LABEL)
2810 goto fail;
252b5132 2811
deddc40b 2812 datum = bfd_get_32 (ibfd, buffer + 8);
25dbc73a
AM
2813 if (datum != 0x2)
2814 goto fail;
252b5132 2815
deddc40b 2816 if (strcmp (buffer + 12, APUINFO_LABEL) != 0)
25dbc73a 2817 goto fail;
252b5132 2818
25dbc73a 2819 /* Get the number of bytes used for apuinfo entries. */
deddc40b 2820 datum = bfd_get_32 (ibfd, buffer + 4);
25dbc73a
AM
2821 if (datum + 20 != length)
2822 goto fail;
2823
25dbc73a
AM
2824 /* Scan the apuinfo section, building a list of apuinfo numbers. */
2825 for (i = 0; i < datum; i += 4)
deddc40b 2826 apuinfo_list_add (bfd_get_32 (ibfd, buffer + 20 + i));
252b5132
RH
2827 }
2828
25dbc73a 2829 error_message = NULL;
252b5132 2830
f2faa800 2831 if (apuinfo_set)
deddc40b 2832 {
f2faa800
NS
2833 /* Compute the size of the output section. */
2834 unsigned num_entries = apuinfo_list_length ();
5b914448 2835
deddc40b
NS
2836 /* Set the output section size, if it exists. */
2837 asec = bfd_get_section_by_name (abfd, APUINFO_SECTION_NAME);
f2faa800 2838
deddc40b
NS
2839 if (asec && ! bfd_set_section_size (abfd, asec, 20 + num_entries * 4))
2840 {
2841 ibfd = abfd;
695344c0 2842 /* xgettext:c-format */
deddc40b
NS
2843 error_message = _("warning: unable to set size of %s section in %B");
2844 }
2845 }
25dbc73a
AM
2846
2847 fail:
deddc40b
NS
2848 if (buffer)
2849 free (buffer);
25dbc73a
AM
2850
2851 if (error_message)
4eca0228 2852 _bfd_error_handler (error_message, ibfd, APUINFO_SECTION_NAME);
25dbc73a 2853}
252b5132 2854
25dbc73a
AM
2855/* Prevent the output section from accumulating the input sections'
2856 contents. We have already stored this in our linked list structure. */
252b5132 2857
25dbc73a
AM
2858static bfd_boolean
2859ppc_elf_write_section (bfd *abfd ATTRIBUTE_UNUSED,
c7b8f16e 2860 struct bfd_link_info *link_info ATTRIBUTE_UNUSED,
25dbc73a
AM
2861 asection *asec,
2862 bfd_byte *contents ATTRIBUTE_UNUSED)
2863{
f2faa800 2864 return apuinfo_set && strcmp (asec->name, APUINFO_SECTION_NAME) == 0;
252b5132
RH
2865}
2866
25dbc73a
AM
2867/* Finally we can generate the output section. */
2868
2869static void
2870ppc_elf_final_write_processing (bfd *abfd, bfd_boolean linker ATTRIBUTE_UNUSED)
7619e7c7 2871{
25dbc73a
AM
2872 bfd_byte *buffer;
2873 asection *asec;
2874 unsigned i;
2875 unsigned num_entries;
2876 bfd_size_type length;
7619e7c7 2877
25dbc73a
AM
2878 asec = bfd_get_section_by_name (abfd, APUINFO_SECTION_NAME);
2879 if (asec == NULL)
2880 return;
2881
f2faa800 2882 if (!apuinfo_set)
25dbc73a
AM
2883 return;
2884
2885 length = asec->size;
2886 if (length < 20)
2887 return;
2888
2889 buffer = bfd_malloc (length);
2890 if (buffer == NULL)
7619e7c7 2891 {
4eca0228 2892 _bfd_error_handler
25dbc73a
AM
2893 (_("failed to allocate space for new APUinfo section."));
2894 return;
7619e7c7 2895 }
7619e7c7 2896
25dbc73a
AM
2897 /* Create the apuinfo header. */
2898 num_entries = apuinfo_list_length ();
2899 bfd_put_32 (abfd, sizeof APUINFO_LABEL, buffer);
2900 bfd_put_32 (abfd, num_entries * 4, buffer + 4);
2901 bfd_put_32 (abfd, 0x2, buffer + 8);
2902 strcpy ((char *) buffer + 12, APUINFO_LABEL);
feee612b 2903
25dbc73a
AM
2904 length = 20;
2905 for (i = 0; i < num_entries; i++)
feee612b 2906 {
25dbc73a
AM
2907 bfd_put_32 (abfd, apuinfo_list_element (i), buffer + length);
2908 length += 4;
feee612b 2909 }
feee612b 2910
25dbc73a 2911 if (length != asec->size)
4eca0228 2912 _bfd_error_handler (_("failed to compute new APUinfo section."));
252b5132 2913
25dbc73a 2914 if (! bfd_set_section_contents (abfd, asec, buffer, (file_ptr) 0, length))
4eca0228 2915 _bfd_error_handler (_("failed to install new APUinfo section."));
252b5132 2916
25dbc73a
AM
2917 free (buffer);
2918
2919 apuinfo_list_finish ();
252b5132 2920}
25dbc73a 2921\f
7382d32a 2922static bfd_boolean
c6dd29ce 2923is_nonpic_glink_stub (bfd *abfd, asection *glink, bfd_vma off)
7382d32a 2924{
c6dd29ce 2925 bfd_byte buf[GLINK_ENTRY_SIZE];
7382d32a 2926
c6dd29ce 2927 if (!bfd_get_section_contents (abfd, glink, buf, off, GLINK_ENTRY_SIZE))
7382d32a
AM
2928 return FALSE;
2929
c6dd29ce
AM
2930 return ((bfd_get_32 (abfd, buf + 0) & 0xffff0000) == LIS_11
2931 && (bfd_get_32 (abfd, buf + 4) & 0xffff0000) == LWZ_11_11
2932 && bfd_get_32 (abfd, buf + 8) == MTCTR_11
2933 && bfd_get_32 (abfd, buf + 12) == BCTR);
7382d32a
AM
2934}
2935
468392fb
AM
2936static bfd_boolean
2937section_covers_vma (bfd *abfd ATTRIBUTE_UNUSED, asection *section, void *ptr)
2938{
2939 bfd_vma vma = *(bfd_vma *) ptr;
2940 return ((section->flags & SEC_ALLOC) != 0
2941 && section->vma <= vma
2942 && vma < section->vma + section->size);
2943}
2944
2945static long
2946ppc_elf_get_synthetic_symtab (bfd *abfd, long symcount, asymbol **syms,
2947 long dynsymcount, asymbol **dynsyms,
2948 asymbol **ret)
2949{
2950 bfd_boolean (*slurp_relocs) (bfd *, asection *, asymbol **, bfd_boolean);
2951 asection *plt, *relplt, *dynamic, *glink;
2952 bfd_vma glink_vma = 0;
2953 bfd_vma resolv_vma = 0;
2954 bfd_vma stub_vma;
2955 asymbol *s;
2956 arelent *p;
2957 long count, i;
2958 size_t size;
2959 char *names;
2960 bfd_byte buf[4];
2961
2962 *ret = NULL;
2963
2964 if ((abfd->flags & (DYNAMIC | EXEC_P)) == 0)
2965 return 0;
2966
2967 if (dynsymcount <= 0)
2968 return 0;
2969
2970 relplt = bfd_get_section_by_name (abfd, ".rela.plt");
2971 if (relplt == NULL)
2972 return 0;
2973
2974 plt = bfd_get_section_by_name (abfd, ".plt");
2975 if (plt == NULL)
2976 return 0;
2977
2978 /* Call common code to handle old-style executable PLTs. */
2979 if (elf_section_flags (plt) & SHF_EXECINSTR)
2980 return _bfd_elf_get_synthetic_symtab (abfd, symcount, syms,
2981 dynsymcount, dynsyms, ret);
2982
2983 /* If this object was prelinked, the prelinker stored the address
2984 of .glink at got[1]. If it wasn't prelinked, got[1] will be zero. */
2985 dynamic = bfd_get_section_by_name (abfd, ".dynamic");
2986 if (dynamic != NULL)
2987 {
2988 bfd_byte *dynbuf, *extdyn, *extdynend;
2989 size_t extdynsize;
2990 void (*swap_dyn_in) (bfd *, const void *, Elf_Internal_Dyn *);
2991
2992 if (!bfd_malloc_and_get_section (abfd, dynamic, &dynbuf))
2993 return -1;
2994
2995 extdynsize = get_elf_backend_data (abfd)->s->sizeof_dyn;
2996 swap_dyn_in = get_elf_backend_data (abfd)->s->swap_dyn_in;
2997
2998 extdyn = dynbuf;
2999 extdynend = extdyn + dynamic->size;
3000 for (; extdyn < extdynend; extdyn += extdynsize)
3001 {
3002 Elf_Internal_Dyn dyn;
3003 (*swap_dyn_in) (abfd, extdyn, &dyn);
3004
3005 if (dyn.d_tag == DT_NULL)
3006 break;
3007
3008 if (dyn.d_tag == DT_PPC_GOT)
3009 {
3010 unsigned int g_o_t = dyn.d_un.d_val;
3011 asection *got = bfd_get_section_by_name (abfd, ".got");
3012 if (got != NULL
3013 && bfd_get_section_contents (abfd, got, buf,
3014 g_o_t - got->vma + 4, 4))
3015 glink_vma = bfd_get_32 (abfd, buf);
3016 break;
3017 }
3018 }
3019 free (dynbuf);
3020 }
3021
3022 /* Otherwise we read the first plt entry. */
3023 if (glink_vma == 0)
3024 {
3025 if (bfd_get_section_contents (abfd, plt, buf, 0, 4))
3026 glink_vma = bfd_get_32 (abfd, buf);
3027 }
3028
3029 if (glink_vma == 0)
3030 return 0;
3031
3032 /* The .glink section usually does not survive the final
3033 link; search for the section (usually .text) where the
3034 glink stubs now reside. */
3035 glink = bfd_sections_find_if (abfd, section_covers_vma, &glink_vma);
3036 if (glink == NULL)
3037 return 0;
3038
3039 /* Determine glink PLT resolver by reading the relative branch
3040 from the first glink stub. */
3041 if (bfd_get_section_contents (abfd, glink, buf,
3042 glink_vma - glink->vma, 4))
3043 {
3044 unsigned int insn = bfd_get_32 (abfd, buf);
3045
3046 /* The first glink stub may either branch to the resolver ... */
3047 insn ^= B;
3048 if ((insn & ~0x3fffffc) == 0)
3049 resolv_vma = glink_vma + (insn ^ 0x2000000) - 0x2000000;
3050
3051 /* ... or fall through a bunch of NOPs. */
3052 else if ((insn ^ B ^ NOP) == 0)
3053 for (i = 4;
3054 bfd_get_section_contents (abfd, glink, buf,
3055 glink_vma - glink->vma + i, 4);
3056 i += 4)
3057 if (bfd_get_32 (abfd, buf) != NOP)
3058 {
3059 resolv_vma = glink_vma + i;
3060 break;
3061 }
3062 }
3063
7382d32a 3064 count = relplt->size / sizeof (Elf32_External_Rela);
7382d32a
AM
3065 /* If the stubs are those for -shared/-pie then we might have
3066 multiple stubs for each plt entry. If that is the case then
3067 there is no way to associate stubs with their plt entries short
3068 of figuring out the GOT pointer value used in the stub. */
c6dd29ce
AM
3069 if (!is_nonpic_glink_stub (abfd, glink,
3070 glink_vma - GLINK_ENTRY_SIZE - glink->vma))
7382d32a
AM
3071 return 0;
3072
468392fb
AM
3073 slurp_relocs = get_elf_backend_data (abfd)->s->slurp_reloc_table;
3074 if (! (*slurp_relocs) (abfd, relplt, dynsyms, TRUE))
3075 return -1;
3076
468392fb
AM
3077 size = count * sizeof (asymbol);
3078 p = relplt->relocation;
3079 for (i = 0; i < count; i++, p++)
e054468f
AM
3080 {
3081 size += strlen ((*p->sym_ptr_ptr)->name) + sizeof ("@plt");
3082 if (p->addend != 0)
3083 size += sizeof ("+0x") - 1 + 8;
3084 }
468392fb
AM
3085
3086 size += sizeof (asymbol) + sizeof ("__glink");
3087
3088 if (resolv_vma)
3089 size += sizeof (asymbol) + sizeof ("__glink_PLTresolve");
3090
3091 s = *ret = bfd_malloc (size);
3092 if (s == NULL)
3093 return -1;
3094
1079403c 3095 stub_vma = glink_vma;
468392fb 3096 names = (char *) (s + count + 1 + (resolv_vma != 0));
1079403c
AM
3097 p = relplt->relocation + count - 1;
3098 for (i = 0; i < count; i++)
468392fb
AM
3099 {
3100 size_t len;
3101
3102 *s = **p->sym_ptr_ptr;
3103 /* Undefined syms won't have BSF_LOCAL or BSF_GLOBAL set. Since
3104 we are defining a symbol, ensure one of them is set. */
3105 if ((s->flags & BSF_LOCAL) == 0)
3106 s->flags |= BSF_GLOBAL;
6ba2a415 3107 s->flags |= BSF_SYNTHETIC;
468392fb 3108 s->section = glink;
1079403c
AM
3109 stub_vma -= 16;
3110 if (strcmp ((*p->sym_ptr_ptr)->name, "__tls_get_addr_opt") == 0)
3111 stub_vma -= 32;
468392fb
AM
3112 s->value = stub_vma - glink->vma;
3113 s->name = names;
3114 s->udata.p = NULL;
3115 len = strlen ((*p->sym_ptr_ptr)->name);
3116 memcpy (names, (*p->sym_ptr_ptr)->name, len);
3117 names += len;
e054468f
AM
3118 if (p->addend != 0)
3119 {
3120 memcpy (names, "+0x", sizeof ("+0x") - 1);
3121 names += sizeof ("+0x") - 1;
3122 bfd_sprintf_vma (abfd, names, p->addend);
3123 names += strlen (names);
3124 }
468392fb
AM
3125 memcpy (names, "@plt", sizeof ("@plt"));
3126 names += sizeof ("@plt");
3127 ++s;
1079403c 3128 --p;
468392fb
AM
3129 }
3130
3131 /* Add a symbol at the start of the glink branch table. */
86a4952b 3132 memset (s, 0, sizeof *s);
468392fb 3133 s->the_bfd = abfd;
6ba2a415 3134 s->flags = BSF_GLOBAL | BSF_SYNTHETIC;
468392fb
AM
3135 s->section = glink;
3136 s->value = glink_vma - glink->vma;
3137 s->name = names;
3138 memcpy (names, "__glink", sizeof ("__glink"));
3139 names += sizeof ("__glink");
3140 s++;
3141 count++;
3142
3143 if (resolv_vma)
3144 {
3145 /* Add a symbol for the glink PLT resolver. */
86a4952b 3146 memset (s, 0, sizeof *s);
468392fb 3147 s->the_bfd = abfd;
6ba2a415 3148 s->flags = BSF_GLOBAL | BSF_SYNTHETIC;
468392fb
AM
3149 s->section = glink;
3150 s->value = resolv_vma - glink->vma;
3151 s->name = names;
3152 memcpy (names, "__glink_PLTresolve", sizeof ("__glink_PLTresolve"));
3153 names += sizeof ("__glink_PLTresolve");
3154 s++;
3155 count++;
3156 }
3157
3158 return count;
3159}
3160\f
25dbc73a
AM
3161/* The following functions are specific to the ELF linker, while
3162 functions above are used generally. They appear in this file more
3163 or less in the order in which they are called. eg.
3164 ppc_elf_check_relocs is called early in the link process,
3165 ppc_elf_finish_dynamic_sections is one of the last functions
3166 called. */
252b5132 3167
a6aa5195 3168/* Track PLT entries needed for a given symbol. We might need more
a877a2b6 3169 than one glink entry per symbol when generating a pic binary. */
a6aa5195
AM
3170struct plt_entry
3171{
3172 struct plt_entry *next;
3173
3174 /* -fPIC uses multiple GOT sections, one per file, called ".got2".
3175 This field stores the offset into .got2 used to initialise the
a877a2b6
AM
3176 GOT pointer reg. It will always be at least 32768. (Current
3177 gcc always uses an offset of 32768, but ld -r will pack .got2
3178 sections together resulting in larger offsets). */
a6aa5195
AM
3179 bfd_vma addend;
3180
3181 /* The .got2 section. */
3182 asection *sec;
3183
3184 /* PLT refcount or offset. */
3185 union
3186 {
3187 bfd_signed_vma refcount;
3188 bfd_vma offset;
3189 } plt;
3190
3191 /* .glink stub offset. */
3192 bfd_vma glink_offset;
3193};
3194
1d483afe 3195/* Of those relocs that might be copied as dynamic relocs, this function
25dbc73a
AM
3196 selects those that must be copied when linking a shared library,
3197 even when the symbol is local. */
252b5132 3198
1d483afe
AM
3199static int
3200must_be_dyn_reloc (struct bfd_link_info *info,
3201 enum elf_ppc_reloc_type r_type)
3202{
3203 switch (r_type)
3204 {
3205 default:
3206 return 1;
3207
3208 case R_PPC_REL24:
3209 case R_PPC_REL14:
3210 case R_PPC_REL14_BRTAKEN:
3211 case R_PPC_REL14_BRNTAKEN:
3212 case R_PPC_REL32:
3213 return 0;
3214
3215 case R_PPC_TPREL32:
3216 case R_PPC_TPREL16:
3217 case R_PPC_TPREL16_LO:
3218 case R_PPC_TPREL16_HI:
3219 case R_PPC_TPREL16_HA:
0e1862bb 3220 return !bfd_link_executable (info);
1d483afe
AM
3221 }
3222}
252b5132 3223
25dbc73a
AM
3224/* If ELIMINATE_COPY_RELOCS is non-zero, the linker will try to avoid
3225 copying dynamic variables from a shared lib into an app's dynbss
3226 section, and instead use a dynamic relocation to point into the
3227 shared lib. */
3228#define ELIMINATE_COPY_RELOCS 1
252b5132 3229
f95f8542
AM
3230/* Used to track dynamic relocations for local symbols. */
3231struct ppc_dyn_relocs
3232{
3233 struct ppc_dyn_relocs *next;
3234
3235 /* The input section of the reloc. */
3236 asection *sec;
3237
3238 /* Total number of relocs copied for the input section. */
3239 unsigned int count : 31;
3240
3241 /* Whether this entry is for STT_GNU_IFUNC symbols. */
3242 unsigned int ifunc : 1;
3243};
3244
25dbc73a 3245/* PPC ELF linker hash entry. */
252b5132 3246
25dbc73a
AM
3247struct ppc_elf_link_hash_entry
3248{
3249 struct elf_link_hash_entry elf;
252b5132 3250
25dbc73a
AM
3251 /* If this symbol is used in the linker created sections, the processor
3252 specific backend uses this field to map the field into the offset
3253 from the beginning of the section. */
3254 elf_linker_section_pointers_t *linker_section_pointer;
252b5132 3255
25dbc73a 3256 /* Track dynamic relocs copied for this symbol. */
6061a67d 3257 struct elf_dyn_relocs *dyn_relocs;
252b5132 3258
25dbc73a
AM
3259 /* Contexts in which symbol is used in the GOT (or TOC).
3260 TLS_GD .. TLS_TLS bits are or'd into the mask as the
3261 corresponding relocs are encountered during check_relocs.
3262 tls_optimize clears TLS_GD .. TLS_TPREL when optimizing to
3263 indicate the corresponding GOT entry type is not needed. */
3264#define TLS_GD 1 /* GD reloc. */
3265#define TLS_LD 2 /* LD reloc. */
3266#define TLS_TPREL 4 /* TPREL reloc, => IE. */
3267#define TLS_DTPREL 8 /* DTPREL reloc, => LD. */
3268#define TLS_TLS 16 /* Any TLS reloc. */
3269#define TLS_TPRELGD 32 /* TPREL reloc resulting from GD->IE. */
e054468f 3270#define PLT_IFUNC 64 /* STT_GNU_IFUNC. */
25dbc73a 3271 char tls_mask;
4dc4a9a5
DJ
3272
3273 /* Nonzero if we have seen a small data relocation referring to this
3274 symbol. */
d3e454b9
AM
3275 unsigned char has_sda_refs : 1;
3276
3277 /* Flag use of given relocations. */
3278 unsigned char has_addr16_ha : 1;
3279 unsigned char has_addr16_lo : 1;
25dbc73a 3280};
252b5132 3281
25dbc73a
AM
3282#define ppc_elf_hash_entry(ent) ((struct ppc_elf_link_hash_entry *) (ent))
3283
3284/* PPC ELF linker hash table. */
3285
3286struct ppc_elf_link_hash_table
3287{
3288 struct elf_link_hash_table elf;
3289
5446cbdf
AM
3290 /* Various options passed from the linker. */
3291 struct ppc_elf_params *params;
3292
25dbc73a 3293 /* Short-cuts to get to dynamic linker sections. */
d7128ce4 3294 asection *glink;
25dbc73a
AM
3295 asection *dynsbss;
3296 asection *relsbss;
c9a2f333 3297 elf_linker_section_t sdata[2];
25dbc73a 3298 asection *sbss;
6177242a 3299 asection *glink_eh_frame;
25dbc73a 3300
016687f8
AM
3301 /* The (unloaded but important) .rela.plt.unloaded on VxWorks. */
3302 asection *srelplt2;
3303
1d483afe 3304 /* Shortcut to __tls_get_addr. */
25dbc73a 3305 struct elf_link_hash_entry *tls_get_addr;
252b5132 3306
016687f8
AM
3307 /* The bfd that forced an old-style PLT. */
3308 bfd *old_bfd;
5b914448 3309
25dbc73a
AM
3310 /* TLS local dynamic got entry handling. */
3311 union {
3312 bfd_signed_vma refcount;
3313 bfd_vma offset;
3314 } tlsld_got;
252b5132 3315
c6dd29ce 3316 /* Offset of branch table to PltResolve function in glink. */
d7128ce4
AM
3317 bfd_vma glink_pltresolve;
3318
3b36f7e6
AM
3319 /* Size of reserved GOT entries. */
3320 unsigned int got_header_size;
3321 /* Non-zero if allocating the header left a gap. */
3322 unsigned int got_gap;
3323
4a3dc543
RS
3324 /* The type of PLT we have chosen to use. */
3325 enum ppc_elf_plt_type plt_type;
3326
9d8504b1 3327 /* True if the target system is VxWorks. */
016687f8 3328 unsigned int is_vxworks:1;
9d8504b1
PB
3329
3330 /* The size of PLT entries. */
3331 int plt_entry_size;
3332 /* The distance between adjacent PLT slots. */
3333 int plt_slot_size;
3334 /* The size of the first PLT entry. */
3335 int plt_initial_entry_size;
016687f8 3336
87d72d41
AM
3337 /* Small local sym cache. */
3338 struct sym_cache sym_cache;
25dbc73a 3339};
252b5132 3340
94caa966
AM
3341/* Rename some of the generic section flags to better document how they
3342 are used for ppc32. The flags are only valid for ppc32 elf objects. */
3343
3344/* Nonzero if this section has TLS related relocations. */
3345#define has_tls_reloc sec_flg0
3346
3347/* Nonzero if this section has a call to __tls_get_addr. */
3348#define has_tls_get_addr_call sec_flg1
3349
25dbc73a 3350/* Get the PPC ELF linker hash table from a link_info structure. */
252b5132 3351
25dbc73a 3352#define ppc_elf_hash_table(p) \
4dfe6ac6
NC
3353 (elf_hash_table_id ((struct elf_link_hash_table *) ((p)->hash)) \
3354 == PPC32_ELF_DATA ? ((struct ppc_elf_link_hash_table *) ((p)->hash)) : NULL)
252b5132 3355
25dbc73a 3356/* Create an entry in a PPC ELF linker hash table. */
252b5132 3357
25dbc73a
AM
3358static struct bfd_hash_entry *
3359ppc_elf_link_hash_newfunc (struct bfd_hash_entry *entry,
3360 struct bfd_hash_table *table,
3361 const char *string)
252b5132 3362{
25dbc73a
AM
3363 /* Allocate the structure if it has not already been allocated by a
3364 subclass. */
3365 if (entry == NULL)
3366 {
3367 entry = bfd_hash_allocate (table,
3368 sizeof (struct ppc_elf_link_hash_entry));
3369 if (entry == NULL)
3370 return entry;
3371 }
252b5132 3372
25dbc73a
AM
3373 /* Call the allocation method of the superclass. */
3374 entry = _bfd_elf_link_hash_newfunc (entry, table, string);
3375 if (entry != NULL)
3376 {
3377 ppc_elf_hash_entry (entry)->linker_section_pointer = NULL;
3378 ppc_elf_hash_entry (entry)->dyn_relocs = NULL;
3379 ppc_elf_hash_entry (entry)->tls_mask = 0;
5240d94d 3380 ppc_elf_hash_entry (entry)->has_sda_refs = 0;
25dbc73a 3381 }
252b5132 3382
25dbc73a 3383 return entry;
252b5132 3384}
3dab13f6 3385
25dbc73a 3386/* Create a PPC ELF linker hash table. */
3dab13f6 3387
25dbc73a
AM
3388static struct bfd_link_hash_table *
3389ppc_elf_link_hash_table_create (bfd *abfd)
3dab13f6 3390{
25dbc73a 3391 struct ppc_elf_link_hash_table *ret;
76e7a751 3392 static struct ppc_elf_params default_params
08dc996f 3393 = { PLT_OLD, 0, 1, 0, 0, 12, 0, 0, 0 };
3dab13f6 3394
25dbc73a
AM
3395 ret = bfd_zmalloc (sizeof (struct ppc_elf_link_hash_table));
3396 if (ret == NULL)
3397 return NULL;
3dab13f6 3398
66eb6687
AM
3399 if (!_bfd_elf_link_hash_table_init (&ret->elf, abfd,
3400 ppc_elf_link_hash_newfunc,
4dfe6ac6
NC
3401 sizeof (struct ppc_elf_link_hash_entry),
3402 PPC32_ELF_DATA))
3dab13f6 3403 {
25dbc73a
AM
3404 free (ret);
3405 return NULL;
3406 }
58111eb7 3407
a6aa5195
AM
3408 ret->elf.init_plt_refcount.refcount = 0;
3409 ret->elf.init_plt_refcount.glist = NULL;
3410 ret->elf.init_plt_offset.offset = 0;
3411 ret->elf.init_plt_offset.glist = NULL;
3412
db434ba0
AM
3413 ret->params = &default_params;
3414
c9a2f333
AM
3415 ret->sdata[0].name = ".sdata";
3416 ret->sdata[0].sym_name = "_SDA_BASE_";
3417 ret->sdata[0].bss_name = ".sbss";
3418
3419 ret->sdata[1].name = ".sdata2";
3420 ret->sdata[1].sym_name = "_SDA2_BASE_";
3421 ret->sdata[1].bss_name = ".sbss2";
3422
9d8504b1
PB
3423 ret->plt_entry_size = 12;
3424 ret->plt_slot_size = 8;
3425 ret->plt_initial_entry_size = 72;
9d8504b1 3426
25dbc73a
AM
3427 return &ret->elf.root;
3428}
3dab13f6 3429
5446cbdf
AM
3430/* Hook linker params into hash table. */
3431
3432void
3433ppc_elf_link_params (struct bfd_link_info *info, struct ppc_elf_params *params)
3434{
3435 struct ppc_elf_link_hash_table *htab = ppc_elf_hash_table (info);
3436
3437 if (htab)
3438 htab->params = params;
76e7a751 3439 params->pagesize_p2 = bfd_log2 (params->pagesize);
5446cbdf
AM
3440}
3441
9d8504b1 3442/* Create .got and the related sections. */
3dab13f6 3443
25dbc73a
AM
3444static bfd_boolean
3445ppc_elf_create_got (bfd *abfd, struct bfd_link_info *info)
3446{
3447 struct ppc_elf_link_hash_table *htab;
3dab13f6 3448
25dbc73a
AM
3449 if (!_bfd_elf_create_got_section (abfd, info))
3450 return FALSE;
3dab13f6 3451
25dbc73a 3452 htab = ppc_elf_hash_table (info);
ce558b89 3453 if (!htab->is_vxworks)
9d8504b1
PB
3454 {
3455 /* The powerpc .got has a blrl instruction in it. Mark it
3456 executable. */
ce558b89
AM
3457 flagword flags = (SEC_ALLOC | SEC_LOAD | SEC_CODE | SEC_HAS_CONTENTS
3458 | SEC_IN_MEMORY | SEC_LINKER_CREATED);
3459 if (!bfd_set_section_flags (abfd, htab->elf.sgot, flags))
9d8504b1
PB
3460 return FALSE;
3461 }
3dab13f6 3462
25dbc73a
AM
3463 return TRUE;
3464}
3dab13f6 3465
93d1b056
AM
3466/* Create a special linker section, used for R_PPC_EMB_SDAI16 and
3467 R_PPC_EMB_SDA2I16 pointers. These sections become part of .sdata
3468 and .sdata2. Create _SDA_BASE_ and _SDA2_BASE too. */
3469
3470static bfd_boolean
3471ppc_elf_create_linker_section (bfd *abfd,
3472 struct bfd_link_info *info,
3473 flagword flags,
3474 elf_linker_section_t *lsect)
3475{
3476 asection *s;
3477
3478 flags |= (SEC_ALLOC | SEC_LOAD | SEC_HAS_CONTENTS | SEC_IN_MEMORY
3479 | SEC_LINKER_CREATED);
3480
3481 s = bfd_make_section_anyway_with_flags (abfd, lsect->name, flags);
3482 if (s == NULL)
3483 return FALSE;
3484 lsect->section = s;
3485
3486 /* Define the sym on the first section of this name. */
3487 s = bfd_get_section_by_name (abfd, lsect->name);
3488
3489 lsect->sym = _bfd_elf_define_linkage_sym (abfd, info, s, lsect->sym_name);
3490 if (lsect->sym == NULL)
3491 return FALSE;
3492 lsect->sym->root.u.def.value = 0x8000;
3493 return TRUE;
3494}
3495
e054468f
AM
3496static bfd_boolean
3497ppc_elf_create_glink (bfd *abfd, struct bfd_link_info *info)
3498{
3499 struct ppc_elf_link_hash_table *htab = ppc_elf_hash_table (info);
3500 asection *s;
3501 flagword flags;
3502
3503 flags = (SEC_ALLOC | SEC_LOAD | SEC_CODE | SEC_READONLY | SEC_HAS_CONTENTS
3504 | SEC_IN_MEMORY | SEC_LINKER_CREATED);
3505 s = bfd_make_section_anyway_with_flags (abfd, ".glink", flags);
3506 htab->glink = s;
3507 if (s == NULL
5446cbdf
AM
3508 || !bfd_set_section_alignment (abfd, s,
3509 htab->params->ppc476_workaround ? 6 : 4))
e054468f
AM
3510 return FALSE;
3511
6177242a
AM
3512 if (!info->no_ld_generated_unwind_info)
3513 {
3514 flags = (SEC_ALLOC | SEC_LOAD | SEC_READONLY | SEC_HAS_CONTENTS
3515 | SEC_IN_MEMORY | SEC_LINKER_CREATED);
3516 s = bfd_make_section_anyway_with_flags (abfd, ".eh_frame", flags);
3517 htab->glink_eh_frame = s;
3518 if (s == NULL
3519 || !bfd_set_section_alignment (abfd, s, 2))
3520 return FALSE;
3521 }
3522
e054468f
AM
3523 flags = SEC_ALLOC | SEC_LINKER_CREATED;
3524 s = bfd_make_section_anyway_with_flags (abfd, ".iplt", flags);
ce558b89 3525 htab->elf.iplt = s;
e054468f
AM
3526 if (s == NULL
3527 || !bfd_set_section_alignment (abfd, s, 4))
3528 return FALSE;
3529
3530 flags = (SEC_ALLOC | SEC_LOAD | SEC_READONLY | SEC_HAS_CONTENTS
3531 | SEC_IN_MEMORY | SEC_LINKER_CREATED);
14b2f831 3532 s = bfd_make_section_anyway_with_flags (abfd, ".rela.iplt", flags);
ce558b89 3533 htab->elf.irelplt = s;
e054468f
AM
3534 if (s == NULL
3535 || ! bfd_set_section_alignment (abfd, s, 2))
3536 return FALSE;
93d1b056
AM
3537
3538 if (!ppc_elf_create_linker_section (abfd, info, 0,
3539 &htab->sdata[0]))
3540 return FALSE;
3541
3542 if (!ppc_elf_create_linker_section (abfd, info, SEC_READONLY,
3543 &htab->sdata[1]))
3544 return FALSE;
3545
e054468f
AM
3546 return TRUE;
3547}
3548
25dbc73a
AM
3549/* We have to create .dynsbss and .rela.sbss here so that they get mapped
3550 to output sections (just like _bfd_elf_create_dynamic_sections has
3551 to create .dynbss and .rela.bss). */
3dab13f6 3552
25dbc73a
AM
3553static bfd_boolean
3554ppc_elf_create_dynamic_sections (bfd *abfd, struct bfd_link_info *info)
3555{
3556 struct ppc_elf_link_hash_table *htab;
3557 asection *s;
3558 flagword flags;
3dab13f6 3559
25dbc73a 3560 htab = ppc_elf_hash_table (info);
3dab13f6 3561
ce558b89 3562 if (htab->elf.sgot == NULL
25dbc73a 3563 && !ppc_elf_create_got (abfd, info))
3dab13f6
AM
3564 return FALSE;
3565
25dbc73a
AM
3566 if (!_bfd_elf_create_dynamic_sections (abfd, info))
3567 return FALSE;
3dab13f6 3568
e054468f
AM
3569 if (htab->glink == NULL
3570 && !ppc_elf_create_glink (abfd, info))
d7128ce4 3571 return FALSE;
3dab13f6 3572
14b2f831
AM
3573 s = bfd_make_section_anyway_with_flags (abfd, ".dynsbss",
3574 SEC_ALLOC | SEC_LINKER_CREATED);
3b36f7e6 3575 htab->dynsbss = s;
3496cb2a 3576 if (s == NULL)
25dbc73a 3577 return FALSE;
3dab13f6 3578
0e1862bb 3579 if (! bfd_link_pic (info))
25dbc73a 3580 {
e054468f
AM
3581 flags = (SEC_ALLOC | SEC_LOAD | SEC_READONLY | SEC_HAS_CONTENTS
3582 | SEC_IN_MEMORY | SEC_LINKER_CREATED);
14b2f831 3583 s = bfd_make_section_anyway_with_flags (abfd, ".rela.sbss", flags);
3b36f7e6 3584 htab->relsbss = s;
25dbc73a 3585 if (s == NULL
25dbc73a
AM
3586 || ! bfd_set_section_alignment (abfd, s, 2))
3587 return FALSE;
3588 }
3dab13f6 3589
711de32c
RS
3590 if (htab->is_vxworks
3591 && !elf_vxworks_create_dynamic_sections (abfd, info, &htab->srelplt2))
3592 return FALSE;
9d8504b1 3593
ce558b89 3594 s = htab->elf.splt;
3b36f7e6 3595 flags = SEC_ALLOC | SEC_CODE | SEC_LINKER_CREATED;
4a3dc543
RS
3596 if (htab->plt_type == PLT_VXWORKS)
3597 /* The VxWorks PLT is a loaded section with contents. */
3598 flags |= SEC_HAS_CONTENTS | SEC_LOAD | SEC_READONLY;
25dbc73a
AM
3599 return bfd_set_section_flags (abfd, s, flags);
3600}
3dab13f6 3601
25dbc73a 3602/* Copy the extra info we tack onto an elf_link_hash_entry. */
58111eb7 3603
25dbc73a 3604static void
fcfa13d2 3605ppc_elf_copy_indirect_symbol (struct bfd_link_info *info,
25dbc73a
AM
3606 struct elf_link_hash_entry *dir,
3607 struct elf_link_hash_entry *ind)
3608{
3609 struct ppc_elf_link_hash_entry *edir, *eind;
3dab13f6 3610
25dbc73a
AM
3611 edir = (struct ppc_elf_link_hash_entry *) dir;
3612 eind = (struct ppc_elf_link_hash_entry *) ind;
3dab13f6 3613
c79d6685
AM
3614 edir->tls_mask |= eind->tls_mask;
3615 edir->has_sda_refs |= eind->has_sda_refs;
3616
3617 /* If called to transfer flags for a weakdef during processing
3618 of elf_adjust_dynamic_symbol, don't copy non_got_ref.
3619 We clear it ourselves for ELIMINATE_COPY_RELOCS. */
3620 if (!(ELIMINATE_COPY_RELOCS
3621 && eind->elf.root.type != bfd_link_hash_indirect
3622 && edir->elf.dynamic_adjusted))
3623 edir->elf.non_got_ref |= eind->elf.non_got_ref;
3624
e81830c5
AM
3625 if (edir->elf.versioned != versioned_hidden)
3626 edir->elf.ref_dynamic |= eind->elf.ref_dynamic;
c79d6685
AM
3627 edir->elf.ref_regular |= eind->elf.ref_regular;
3628 edir->elf.ref_regular_nonweak |= eind->elf.ref_regular_nonweak;
3629 edir->elf.needs_plt |= eind->elf.needs_plt;
3630 edir->elf.pointer_equality_needed |= eind->elf.pointer_equality_needed;
3631
25dbc73a
AM
3632 if (eind->dyn_relocs != NULL)
3633 {
3634 if (edir->dyn_relocs != NULL)
3dab13f6 3635 {
6061a67d
AM
3636 struct elf_dyn_relocs **pp;
3637 struct elf_dyn_relocs *p;
3dab13f6 3638
fcfa13d2 3639 /* Add reloc counts against the indirect sym to the direct sym
25dbc73a
AM
3640 list. Merge any entries against the same section. */
3641 for (pp = &eind->dyn_relocs; (p = *pp) != NULL; )
3dab13f6 3642 {
6061a67d 3643 struct elf_dyn_relocs *q;
25dbc73a
AM
3644
3645 for (q = edir->dyn_relocs; q != NULL; q = q->next)
3646 if (q->sec == p->sec)
3647 {
3648 q->pc_count += p->pc_count;
3649 q->count += p->count;
3650 *pp = p->next;
3651 break;
3652 }
3653 if (q == NULL)
3654 pp = &p->next;
3dab13f6 3655 }
25dbc73a 3656 *pp = edir->dyn_relocs;
3dab13f6 3657 }
25dbc73a
AM
3658
3659 edir->dyn_relocs = eind->dyn_relocs;
3660 eind->dyn_relocs = NULL;
3dab13f6 3661 }
3dab13f6 3662
68ba6d40
AM
3663 /* If we were called to copy over info for a weak sym, that's all.
3664 You might think dyn_relocs need not be copied over; After all,
3665 both syms will be dynamic or both non-dynamic so we're just
68ffbac6 3666 moving reloc accounting around. However, ELIMINATE_COPY_RELOCS
68ba6d40
AM
3667 code in ppc_elf_adjust_dynamic_symbol needs to check for
3668 dyn_relocs in read-only sections, and it does so on what is the
3669 DIR sym here. */
3670 if (eind->elf.root.type != bfd_link_hash_indirect)
3671 return;
3672
a6aa5195
AM
3673 /* Copy over the GOT refcount entries that we may have already seen to
3674 the symbol which just became indirect. */
fcfa13d2
AM
3675 edir->elf.got.refcount += eind->elf.got.refcount;
3676 eind->elf.got.refcount = 0;
a6aa5195
AM
3677
3678 /* And plt entries. */
3679 if (eind->elf.plt.plist != NULL)
3680 {
3681 if (edir->elf.plt.plist != NULL)
3682 {
3683 struct plt_entry **entp;
3684 struct plt_entry *ent;
3685
3686 for (entp = &eind->elf.plt.plist; (ent = *entp) != NULL; )
3687 {
3688 struct plt_entry *dent;
3689
3690 for (dent = edir->elf.plt.plist; dent != NULL; dent = dent->next)
3691 if (dent->sec == ent->sec && dent->addend == ent->addend)
3692 {
3693 dent->plt.refcount += ent->plt.refcount;
3694 *entp = ent->next;
3695 break;
3696 }
3697 if (dent == NULL)
3698 entp = &ent->next;
3699 }
3700 *entp = edir->elf.plt.plist;
3701 }
3702
3703 edir->elf.plt.plist = eind->elf.plt.plist;
3704 eind->elf.plt.plist = NULL;
3705 }
3706
fcfa13d2 3707 if (eind->elf.dynindx != -1)
25dbc73a 3708 {
fcfa13d2
AM
3709 if (edir->elf.dynindx != -1)
3710 _bfd_elf_strtab_delref (elf_hash_table (info)->dynstr,
3711 edir->elf.dynstr_index);
a6aa5195
AM
3712 edir->elf.dynindx = eind->elf.dynindx;
3713 edir->elf.dynstr_index = eind->elf.dynstr_index;
3714 eind->elf.dynindx = -1;
3715 eind->elf.dynstr_index = 0;
25dbc73a 3716 }
25dbc73a 3717}
3dab13f6 3718
25dbc73a
AM
3719/* Hook called by the linker routine which adds symbols from an object
3720 file. We use it to put .comm items in .sbss, and not .bss. */
58111eb7 3721
25dbc73a
AM
3722static bfd_boolean
3723ppc_elf_add_symbol_hook (bfd *abfd,
3724 struct bfd_link_info *info,
3725 Elf_Internal_Sym *sym,
3726 const char **namep ATTRIBUTE_UNUSED,
3727 flagword *flagsp ATTRIBUTE_UNUSED,
3728 asection **secp,
3729 bfd_vma *valp)
3730{
3731 if (sym->st_shndx == SHN_COMMON
0e1862bb 3732 && !bfd_link_relocatable (info)
0c8d6e5c
AM
3733 && is_ppc_elf (info->output_bfd)
3734 && sym->st_size <= elf_gp_size (abfd))
25dbc73a
AM
3735 {
3736 /* Common symbols less than or equal to -G nn bytes are automatically
3737 put into .sbss. */
3738 struct ppc_elf_link_hash_table *htab;
3dab13f6 3739
25dbc73a
AM
3740 htab = ppc_elf_hash_table (info);
3741 if (htab->sbss == NULL)
3742 {
644285ef 3743 flagword flags = SEC_IS_COMMON | SEC_LINKER_CREATED;
3dab13f6 3744
644285ef
AM
3745 if (!htab->elf.dynobj)
3746 htab->elf.dynobj = abfd;
3747
3496cb2a
L
3748 htab->sbss = bfd_make_section_anyway_with_flags (htab->elf.dynobj,
3749 ".sbss",
3750 flags);
3751 if (htab->sbss == NULL)
25dbc73a 3752 return FALSE;
3dab13f6 3753 }
3dab13f6 3754
25dbc73a
AM
3755 *secp = htab->sbss;
3756 *valp = sym->st_size;
3757 }
3dab13f6 3758
a43942db 3759 if (ELF_ST_TYPE (sym->st_info) == STT_GNU_IFUNC
f1885d1e
AM
3760 && (abfd->flags & DYNAMIC) == 0
3761 && bfd_get_flavour (info->output_bfd) == bfd_target_elf_flavour)
a43942db 3762 elf_tdata (info->output_bfd)->has_gnu_symbols |= elf_gnu_symbol_ifunc;
e054468f 3763
25dbc73a 3764 return TRUE;
3dab13f6
AM
3765}
3766\f
25dbc73a
AM
3767/* Find a linker generated pointer with a given addend and type. */
3768
3769static elf_linker_section_pointers_t *
3770elf_find_pointer_linker_section
3771 (elf_linker_section_pointers_t *linker_pointers,
3772 bfd_vma addend,
3773 elf_linker_section_t *lsect)
252b5132 3774{
25dbc73a
AM
3775 for ( ; linker_pointers != NULL; linker_pointers = linker_pointers->next)
3776 if (lsect == linker_pointers->lsect && addend == linker_pointers->addend)
3777 return linker_pointers;
252b5132 3778
25dbc73a
AM
3779 return NULL;
3780}
3781
3782/* Allocate a pointer to live in a linker created section. */
3783
3784static bfd_boolean
93d1b056
AM
3785elf_allocate_pointer_linker_section (bfd *abfd,
3786 elf_linker_section_t *lsect,
3787 struct elf_link_hash_entry *h,
3788 const Elf_Internal_Rela *rel)
25dbc73a
AM
3789{
3790 elf_linker_section_pointers_t **ptr_linker_section_ptr = NULL;
3791 elf_linker_section_pointers_t *linker_section_ptr;
3792 unsigned long r_symndx = ELF32_R_SYM (rel->r_info);
3793 bfd_size_type amt;
3794
3795 BFD_ASSERT (lsect != NULL);
3796
3797 /* Is this a global symbol? */
3798 if (h != NULL)
3799 {
3800 struct ppc_elf_link_hash_entry *eh;
3801
3802 /* Has this symbol already been allocated? If so, our work is done. */
3803 eh = (struct ppc_elf_link_hash_entry *) h;
3804 if (elf_find_pointer_linker_section (eh->linker_section_pointer,
3805 rel->r_addend,
3806 lsect))
3807 return TRUE;
3808
3809 ptr_linker_section_ptr = &eh->linker_section_pointer;
25dbc73a
AM
3810 }
3811 else
3812 {
0c8d6e5c 3813 BFD_ASSERT (is_ppc_elf (abfd));
0ffa91dd 3814
25dbc73a
AM
3815 /* Allocation of a pointer to a local symbol. */
3816 elf_linker_section_pointers_t **ptr = elf_local_ptr_offsets (abfd);
3817
3818 /* Allocate a table to hold the local symbols if first time. */
3819 if (!ptr)
3820 {
0ffa91dd 3821 unsigned int num_symbols = elf_symtab_hdr (abfd).sh_info;
25dbc73a
AM
3822
3823 amt = num_symbols;
3824 amt *= sizeof (elf_linker_section_pointers_t *);
3825 ptr = bfd_zalloc (abfd, amt);
3826
3827 if (!ptr)
3828 return FALSE;
3829
3830 elf_local_ptr_offsets (abfd) = ptr;
3831 }
3832
3833 /* Has this symbol already been allocated? If so, our work is done. */
3834 if (elf_find_pointer_linker_section (ptr[r_symndx],
3835 rel->r_addend,
3836 lsect))
3837 return TRUE;
252b5132 3838
25dbc73a 3839 ptr_linker_section_ptr = &ptr[r_symndx];
25dbc73a 3840 }
41fcb14e 3841
25dbc73a
AM
3842 /* Allocate space for a pointer in the linker section, and allocate
3843 a new pointer record from internal memory. */
3844 BFD_ASSERT (ptr_linker_section_ptr != NULL);
3845 amt = sizeof (elf_linker_section_pointers_t);
3846 linker_section_ptr = bfd_alloc (abfd, amt);
41fcb14e 3847
25dbc73a 3848 if (!linker_section_ptr)
7619e7c7 3849 return FALSE;
41fcb14e 3850
25dbc73a
AM
3851 linker_section_ptr->next = *ptr_linker_section_ptr;
3852 linker_section_ptr->addend = rel->r_addend;
3853 linker_section_ptr->lsect = lsect;
25dbc73a 3854 *ptr_linker_section_ptr = linker_section_ptr;
41fcb14e 3855
93d1b056
AM
3856 if (!bfd_set_section_alignment (lsect->section->owner, lsect->section, 2))
3857 return FALSE;
25dbc73a
AM
3858 linker_section_ptr->offset = lsect->section->size;
3859 lsect->section->size += 4;
7619e7c7 3860
25dbc73a
AM
3861#ifdef DEBUG
3862 fprintf (stderr,
3863 "Create pointer in linker section %s, offset = %ld, section size = %ld\n",
3864 lsect->name, (long) linker_section_ptr->offset,
3865 (long) lsect->section->size);
3866#endif
7619e7c7
AM
3867
3868 return TRUE;
41fcb14e
AM
3869}
3870
e054468f 3871static struct plt_entry **
25dbc73a
AM
3872update_local_sym_info (bfd *abfd,
3873 Elf_Internal_Shdr *symtab_hdr,
3874 unsigned long r_symndx,
3875 int tls_type)
252b5132 3876{
25dbc73a 3877 bfd_signed_vma *local_got_refcounts = elf_local_got_refcounts (abfd);
e054468f 3878 struct plt_entry **local_plt;
25dbc73a 3879 char *local_got_tls_masks;
252b5132 3880
25dbc73a 3881 if (local_got_refcounts == NULL)
252b5132 3882 {
25dbc73a
AM
3883 bfd_size_type size = symtab_hdr->sh_info;
3884
e054468f
AM
3885 size *= (sizeof (*local_got_refcounts)
3886 + sizeof (*local_plt)
3887 + sizeof (*local_got_tls_masks));
25dbc73a
AM
3888 local_got_refcounts = bfd_zalloc (abfd, size);
3889 if (local_got_refcounts == NULL)
e054468f 3890 return NULL;
25dbc73a 3891 elf_local_got_refcounts (abfd) = local_got_refcounts;
252b5132 3892 }
41fcb14e 3893
e054468f
AM
3894 local_plt = (struct plt_entry **) (local_got_refcounts + symtab_hdr->sh_info);
3895 local_got_tls_masks = (char *) (local_plt + symtab_hdr->sh_info);
25dbc73a 3896 local_got_tls_masks[r_symndx] |= tls_type;
e054468f
AM
3897 if (tls_type != PLT_IFUNC)
3898 local_got_refcounts[r_symndx] += 1;
3899 return local_plt + r_symndx;
25dbc73a 3900}
41fcb14e 3901
a6aa5195 3902static bfd_boolean
3ec01793 3903update_plt_info (bfd *abfd, struct plt_entry **plist,
a6aa5195
AM
3904 asection *sec, bfd_vma addend)
3905{
3906 struct plt_entry *ent;
3907
32af9f6e
AM
3908 if (addend < 32768)
3909 sec = NULL;
3ec01793 3910 for (ent = *plist; ent != NULL; ent = ent->next)
a6aa5195
AM
3911 if (ent->sec == sec && ent->addend == addend)
3912 break;
3913 if (ent == NULL)
3914 {
3915 bfd_size_type amt = sizeof (*ent);
3916 ent = bfd_alloc (abfd, amt);
3917 if (ent == NULL)
3918 return FALSE;
3ec01793 3919 ent->next = *plist;
a6aa5195
AM
3920 ent->sec = sec;
3921 ent->addend = addend;
3922 ent->plt.refcount = 0;
3ec01793 3923 *plist = ent;
a6aa5195
AM
3924 }
3925 ent->plt.refcount += 1;
3926 return TRUE;
3927}
3928
3929static struct plt_entry *
3ec01793 3930find_plt_ent (struct plt_entry **plist, asection *sec, bfd_vma addend)
a6aa5195
AM
3931{
3932 struct plt_entry *ent;
3933
3934 if (addend < 32768)
3935 sec = NULL;
3ec01793 3936 for (ent = *plist; ent != NULL; ent = ent->next)
a6aa5195
AM
3937 if (ent->sec == sec && ent->addend == addend)
3938 break;
3939 return ent;
3940}
3941
e054468f
AM
3942static bfd_boolean
3943is_branch_reloc (enum elf_ppc_reloc_type r_type)
3944{
3945 return (r_type == R_PPC_PLTREL24
3946 || r_type == R_PPC_LOCAL24PC
3947 || r_type == R_PPC_REL24
3948 || r_type == R_PPC_REL14
3949 || r_type == R_PPC_REL14_BRTAKEN
3950 || r_type == R_PPC_REL14_BRNTAKEN
3951 || r_type == R_PPC_ADDR24
3952 || r_type == R_PPC_ADDR14
3953 || r_type == R_PPC_ADDR14_BRTAKEN
dfdaec14
AJ
3954 || r_type == R_PPC_ADDR14_BRNTAKEN
3955 || r_type == R_PPC_VLE_REL24);
e054468f
AM
3956}
3957
25dbc73a
AM
3958static void
3959bad_shared_reloc (bfd *abfd, enum elf_ppc_reloc_type r_type)
3960{
4eca0228 3961 _bfd_error_handler
695344c0 3962 /* xgettext:c-format */
25dbc73a
AM
3963 (_("%B: relocation %s cannot be used when making a shared object"),
3964 abfd,
3965 ppc_elf_howto_table[r_type]->name);
3966 bfd_set_error (bfd_error_bad_value);
252b5132
RH
3967}
3968
25dbc73a
AM
3969/* Look through the relocs for a section during the first phase, and
3970 allocate space in the global offset table or procedure linkage
3971 table. */
252b5132 3972
b34976b6 3973static bfd_boolean
25dbc73a
AM
3974ppc_elf_check_relocs (bfd *abfd,
3975 struct bfd_link_info *info,
3976 asection *sec,
3977 const Elf_Internal_Rela *relocs)
252b5132 3978{
7619e7c7 3979 struct ppc_elf_link_hash_table *htab;
25dbc73a
AM
3980 Elf_Internal_Shdr *symtab_hdr;
3981 struct elf_link_hash_entry **sym_hashes;
3982 const Elf_Internal_Rela *rel;
3983 const Elf_Internal_Rela *rel_end;
a6aa5195 3984 asection *got2, *sreloc;
727fc41e 3985 struct elf_link_hash_entry *tga;
25dbc73a 3986
0e1862bb 3987 if (bfd_link_relocatable (info))
25dbc73a 3988 return TRUE;
252b5132 3989
c87b5a93
AM
3990 /* Don't do anything special with non-loaded, non-alloced sections.
3991 In particular, any relocs in such sections should not affect GOT
3992 and PLT reference counting (ie. we don't allow them to create GOT
3993 or PLT entries), there's no possibility or desire to optimize TLS
3994 relocs, and there's not much point in propagating relocs to shared
3995 libs that the dynamic linker won't relocate. */
3996 if ((sec->flags & SEC_ALLOC) == 0)
3997 return TRUE;
3998
252b5132 3999#ifdef DEBUG
25dbc73a
AM
4000 _bfd_error_handler ("ppc_elf_check_relocs called for section %A in %B",
4001 sec, abfd);
252b5132
RH
4002#endif
4003
0c8d6e5c 4004 BFD_ASSERT (is_ppc_elf (abfd));
0ffa91dd 4005
25dbc73a
AM
4006 /* Initialize howto table if not already done. */
4007 if (!ppc_elf_howto_table[R_PPC_ADDR32])
4008 ppc_elf_howto_init ();
4009
7619e7c7 4010 htab = ppc_elf_hash_table (info);
25f23106
AM
4011 if (htab->glink == NULL)
4012 {
4013 if (htab->elf.dynobj == NULL)
4014 htab->elf.dynobj = abfd;
4015 if (!ppc_elf_create_glink (htab->elf.dynobj, info))
4016 return FALSE;
4017 }
727fc41e
AM
4018 tga = elf_link_hash_lookup (&htab->elf, "__tls_get_addr",
4019 FALSE, FALSE, TRUE);
0ffa91dd 4020 symtab_hdr = &elf_symtab_hdr (abfd);
25dbc73a 4021 sym_hashes = elf_sym_hashes (abfd);
a6aa5195 4022 got2 = bfd_get_section_by_name (abfd, ".got2");
25dbc73a
AM
4023 sreloc = NULL;
4024
4025 rel_end = relocs + sec->reloc_count;
4026 for (rel = relocs; rel < rel_end; rel++)
4027 {
4028 unsigned long r_symndx;
4029 enum elf_ppc_reloc_type r_type;
4030 struct elf_link_hash_entry *h;
727fc41e 4031 int tls_type;
cbf95972 4032 struct plt_entry **ifunc;
25dbc73a
AM
4033
4034 r_symndx = ELF32_R_SYM (rel->r_info);
4035 if (r_symndx < symtab_hdr->sh_info)
4036 h = NULL;
4037 else
973a3492
L
4038 {
4039 h = sym_hashes[r_symndx - symtab_hdr->sh_info];
4040 while (h->root.type == bfd_link_hash_indirect
4041 || h->root.type == bfd_link_hash_warning)
4042 h = (struct elf_link_hash_entry *) h->root.u.i.link;
81fbe831
AM
4043
4044 /* PR15323, ref flags aren't set for references in the same
4045 object. */
4046 h->root.non_ir_ref = 1;
973a3492 4047 }
25dbc73a
AM
4048
4049 /* If a relocation refers to _GLOBAL_OFFSET_TABLE_, create the .got.
4050 This shows up in particular in an R_PPC_ADDR32 in the eabi
4051 startup code. */
3b36f7e6 4052 if (h != NULL
ce558b89 4053 && htab->elf.sgot == NULL
3b36f7e6 4054 && strcmp (h->root.root.string, "_GLOBAL_OFFSET_TABLE_") == 0)
252b5132 4055 {
3b36f7e6
AM
4056 if (htab->elf.dynobj == NULL)
4057 htab->elf.dynobj = abfd;
4058 if (!ppc_elf_create_got (htab->elf.dynobj, info))
4059 return FALSE;
4060 BFD_ASSERT (h == htab->elf.hgot);
25dbc73a 4061 }
252b5132 4062
727fc41e 4063 tls_type = 0;
de972ffa 4064 r_type = ELF32_R_TYPE (rel->r_info);
cbf95972 4065 ifunc = NULL;
06a162cf 4066 if (h == NULL && !htab->is_vxworks)
e054468f 4067 {
06a162cf
AM
4068 Elf_Internal_Sym *isym = bfd_sym_from_r_symndx (&htab->sym_cache,
4069 abfd, r_symndx);
4070 if (isym == NULL)
4071 return FALSE;
4072
0bed072f 4073 if (ELF_ST_TYPE (isym->st_info) == STT_GNU_IFUNC)
e054468f 4074 {
0bed072f 4075 /* Set PLT_IFUNC flag for this sym, no GOT entry yet. */
06a162cf
AM
4076 ifunc = update_local_sym_info (abfd, symtab_hdr, r_symndx,
4077 PLT_IFUNC);
4078 if (ifunc == NULL)
e054468f
AM
4079 return FALSE;
4080
06a162cf
AM
4081 /* STT_GNU_IFUNC symbols must have a PLT entry;
4082 In a non-pie executable even when there are
4083 no plt calls. */
0e1862bb 4084 if (!bfd_link_pic (info)
0bed072f 4085 || is_branch_reloc (r_type))
e054468f 4086 {
0bed072f
AM
4087 bfd_vma addend = 0;
4088 if (r_type == R_PPC_PLTREL24)
4089 {
4090 ppc_elf_tdata (abfd)->makes_plt_call = 1;
0e1862bb 4091 if (bfd_link_pic (info))
0bed072f
AM
4092 addend = rel->r_addend;
4093 }
4094 if (!update_plt_info (abfd, ifunc, got2, addend))
4095 return FALSE;
e054468f
AM
4096 }
4097 }
25f23106
AM
4098 }
4099
de972ffa
AM
4100 if (!htab->is_vxworks
4101 && is_branch_reloc (r_type)
4102 && h != NULL
4103 && h == tga)
25f23106 4104 {
de972ffa
AM
4105 if (rel != relocs
4106 && (ELF32_R_TYPE (rel[-1].r_info) == R_PPC_TLSGD
4107 || ELF32_R_TYPE (rel[-1].r_info) == R_PPC_TLSLD))
4108 /* We have a new-style __tls_get_addr call with a marker
4109 reloc. */
4110 ;
4111 else
4112 /* Mark this section as having an old-style call. */
4113 sec->has_tls_get_addr_call = 1;
e054468f 4114 }
727fc41e 4115
25dbc73a
AM
4116 switch (r_type)
4117 {
727fc41e
AM
4118 case R_PPC_TLSGD:
4119 case R_PPC_TLSLD:
4120 /* These special tls relocs tie a call to __tls_get_addr with
4121 its parameter symbol. */
4122 break;
4123
25dbc73a
AM
4124 case R_PPC_GOT_TLSLD16:
4125 case R_PPC_GOT_TLSLD16_LO:
4126 case R_PPC_GOT_TLSLD16_HI:
4127 case R_PPC_GOT_TLSLD16_HA:
25dbc73a
AM
4128 tls_type = TLS_TLS | TLS_LD;
4129 goto dogottls;
252b5132 4130
25dbc73a
AM
4131 case R_PPC_GOT_TLSGD16:
4132 case R_PPC_GOT_TLSGD16_LO:
4133 case R_PPC_GOT_TLSGD16_HI:
4134 case R_PPC_GOT_TLSGD16_HA:
4135 tls_type = TLS_TLS | TLS_GD;
4136 goto dogottls;
4137
4138 case R_PPC_GOT_TPREL16:
4139 case R_PPC_GOT_TPREL16_LO:
4140 case R_PPC_GOT_TPREL16_HI:
4141 case R_PPC_GOT_TPREL16_HA:
0e1862bb 4142 if (bfd_link_pic (info))
25dbc73a
AM
4143 info->flags |= DF_STATIC_TLS;
4144 tls_type = TLS_TLS | TLS_TPREL;
4145 goto dogottls;
4146
4147 case R_PPC_GOT_DTPREL16:
4148 case R_PPC_GOT_DTPREL16_LO:
4149 case R_PPC_GOT_DTPREL16_HI:
4150 case R_PPC_GOT_DTPREL16_HA:
4151 tls_type = TLS_TLS | TLS_DTPREL;
4152 dogottls:
4153 sec->has_tls_reloc = 1;
1a0670f3 4154 /* Fall through. */
252b5132 4155
25dbc73a
AM
4156 /* GOT16 relocations */
4157 case R_PPC_GOT16:
4158 case R_PPC_GOT16_LO:
4159 case R_PPC_GOT16_HI:
4160 case R_PPC_GOT16_HA:
4161 /* This symbol requires a global offset table entry. */
ce558b89 4162 if (htab->elf.sgot == NULL)
25dbc73a
AM
4163 {
4164 if (htab->elf.dynobj == NULL)
4165 htab->elf.dynobj = abfd;
4166 if (!ppc_elf_create_got (htab->elf.dynobj, info))
4167 return FALSE;
4168 }
4169 if (h != NULL)
4170 {
4171 h->got.refcount += 1;
4172 ppc_elf_hash_entry (h)->tls_mask |= tls_type;
4173 }
4174 else
4175 /* This is a global offset table entry for a local symbol. */
4176 if (!update_local_sym_info (abfd, symtab_hdr, r_symndx, tls_type))
4177 return FALSE;
91e21fb7
AM
4178
4179 /* We may also need a plt entry if the symbol turns out to be
4180 an ifunc. */
0e1862bb 4181 if (h != NULL && !bfd_link_pic (info))
91e21fb7
AM
4182 {
4183 if (!update_plt_info (abfd, &h->plt.plist, NULL, 0))
4184 return FALSE;
4185 }
25dbc73a 4186 break;
252b5132 4187
25dbc73a
AM
4188 /* Indirect .sdata relocation. */
4189 case R_PPC_EMB_SDAI16:
0e1862bb 4190 if (bfd_link_pic (info))
25dbc73a
AM
4191 {
4192 bad_shared_reloc (abfd, r_type);
4193 return FALSE;
4194 }
93d1b056
AM
4195 htab->sdata[0].sym->ref_regular = 1;
4196 if (!elf_allocate_pointer_linker_section (abfd, &htab->sdata[0],
4197 h, rel))
25dbc73a 4198 return FALSE;
046183de
AM
4199 if (h != NULL)
4200 {
4201 ppc_elf_hash_entry (h)->has_sda_refs = TRUE;
4202 h->non_got_ref = TRUE;
4203 }
25dbc73a 4204 break;
252b5132 4205
25dbc73a
AM
4206 /* Indirect .sdata2 relocation. */
4207 case R_PPC_EMB_SDA2I16:
0e1862bb 4208 if (bfd_link_pic (info))
25dbc73a
AM
4209 {
4210 bad_shared_reloc (abfd, r_type);
4211 return FALSE;
4212 }
93d1b056
AM
4213 htab->sdata[1].sym->ref_regular = 1;
4214 if (!elf_allocate_pointer_linker_section (abfd, &htab->sdata[1],
4215 h, rel))
25dbc73a 4216 return FALSE;
046183de
AM
4217 if (h != NULL)
4218 {
4219 ppc_elf_hash_entry (h)->has_sda_refs = TRUE;
4220 h->non_got_ref = TRUE;
4221 }
25dbc73a 4222 break;
252b5132 4223
93d1b056
AM
4224 case R_PPC_SDAREL16:
4225 htab->sdata[0].sym->ref_regular = 1;
1a0670f3 4226 /* Fall through. */
93d1b056 4227
b9c361e0
JL
4228 case R_PPC_VLE_SDAREL_LO16A:
4229 case R_PPC_VLE_SDAREL_LO16D:
4230 case R_PPC_VLE_SDAREL_HI16A:
4231 case R_PPC_VLE_SDAREL_HI16D:
4232 case R_PPC_VLE_SDAREL_HA16A:
4233 case R_PPC_VLE_SDAREL_HA16D:
046183de
AM
4234 if (h != NULL)
4235 {
4236 ppc_elf_hash_entry (h)->has_sda_refs = TRUE;
4237 h->non_got_ref = TRUE;
4238 }
4239 break;
4240
b9c361e0
JL
4241 case R_PPC_VLE_REL8:
4242 case R_PPC_VLE_REL15:
4243 case R_PPC_VLE_REL24:
4244 case R_PPC_VLE_LO16A:
4245 case R_PPC_VLE_LO16D:
4246 case R_PPC_VLE_HI16A:
4247 case R_PPC_VLE_HI16D:
4248 case R_PPC_VLE_HA16A:
4249 case R_PPC_VLE_HA16D:
4250 break;
4251
25dbc73a 4252 case R_PPC_EMB_SDA2REL:
0e1862bb 4253 if (bfd_link_pic (info))
046183de
AM
4254 {
4255 bad_shared_reloc (abfd, r_type);
4256 return FALSE;
4257 }
93d1b056 4258 htab->sdata[1].sym->ref_regular = 1;
046183de
AM
4259 if (h != NULL)
4260 {
4261 ppc_elf_hash_entry (h)->has_sda_refs = TRUE;
4262 h->non_got_ref = TRUE;
4263 }
4264 break;
4265
b9c361e0
JL
4266 case R_PPC_VLE_SDA21_LO:
4267 case R_PPC_VLE_SDA21:
25dbc73a
AM
4268 case R_PPC_EMB_SDA21:
4269 case R_PPC_EMB_RELSDA:
0e1862bb 4270 if (bfd_link_pic (info))
046183de
AM
4271 {
4272 bad_shared_reloc (abfd, r_type);
4273 return FALSE;
4274 }
046183de
AM
4275 if (h != NULL)
4276 {
4277 ppc_elf_hash_entry (h)->has_sda_refs = TRUE;
4278 h->non_got_ref = TRUE;
4279 }
4280 break;
4281
25dbc73a
AM
4282 case R_PPC_EMB_NADDR32:
4283 case R_PPC_EMB_NADDR16:
4284 case R_PPC_EMB_NADDR16_LO:
4285 case R_PPC_EMB_NADDR16_HI:
4286 case R_PPC_EMB_NADDR16_HA:
0e1862bb 4287 if (bfd_link_pic (info))
25dbc73a
AM
4288 {
4289 bad_shared_reloc (abfd, r_type);
4290 return FALSE;
4291 }
4dc4a9a5 4292 if (h != NULL)
046183de 4293 h->non_got_ref = TRUE;
25dbc73a 4294 break;
252b5132 4295
25dbc73a 4296 case R_PPC_PLTREL24:
de972ffa 4297 if (h == NULL)
6d78d0b9
AM
4298 break;
4299 /* Fall through */
4300 case R_PPC_PLT32:
25dbc73a
AM
4301 case R_PPC_PLTREL32:
4302 case R_PPC_PLT16_LO:
4303 case R_PPC_PLT16_HI:
4304 case R_PPC_PLT16_HA:
4305#ifdef DEBUG
4306 fprintf (stderr, "Reloc requires a PLT entry\n");
4307#endif
cbf95972 4308 /* This symbol requires a procedure linkage table entry. */
25dbc73a
AM
4309 if (h == NULL)
4310 {
cbf95972
AM
4311 if (ifunc == NULL)
4312 {
4313 /* It does not make sense to have a procedure linkage
4314 table entry for a non-ifunc local symbol. */
4315 info->callbacks->einfo
695344c0 4316 /* xgettext:c-format */
174d0a74 4317 (_("%H: %s reloc against local symbol\n"),
cbf95972
AM
4318 abfd, sec, rel->r_offset,
4319 ppc_elf_howto_table[r_type]->name);
4320 bfd_set_error (bfd_error_bad_value);
4321 return FALSE;
4322 }
25dbc73a 4323 }
a6aa5195
AM
4324 else
4325 {
016687f8 4326 bfd_vma addend = 0;
ee05f2fe 4327
016687f8
AM
4328 if (r_type == R_PPC_PLTREL24)
4329 {
4330 ppc_elf_tdata (abfd)->makes_plt_call = 1;
0e1862bb 4331 if (bfd_link_pic (info))
a877a2b6 4332 addend = rel->r_addend;
016687f8 4333 }
a6aa5195 4334 h->needs_plt = 1;
32af9f6e 4335 if (!update_plt_info (abfd, &h->plt.plist, got2, addend))
a6aa5195
AM
4336 return FALSE;
4337 }
25dbc73a 4338 break;
ee05f2fe 4339
25dbc73a
AM
4340 /* The following relocations don't need to propagate the
4341 relocation if linking a shared object since they are
4342 section relative. */
4343 case R_PPC_SECTOFF:
4344 case R_PPC_SECTOFF_LO:
4345 case R_PPC_SECTOFF_HI:
4346 case R_PPC_SECTOFF_HA:
4347 case R_PPC_DTPREL16:
4348 case R_PPC_DTPREL16_LO:
4349 case R_PPC_DTPREL16_HI:
4350 case R_PPC_DTPREL16_HA:
4351 case R_PPC_TOC16:
4352 break;
252b5132 4353
d7128ce4
AM
4354 case R_PPC_REL16:
4355 case R_PPC_REL16_LO:
4356 case R_PPC_REL16_HI:
4357 case R_PPC_REL16_HA:
a680de9a 4358 case R_PPC_REL16DX_HA:
016687f8 4359 ppc_elf_tdata (abfd)->has_rel16 = 1;
d7128ce4
AM
4360 break;
4361
a6aa5195 4362 /* These are just markers. */
25dbc73a
AM
4363 case R_PPC_TLS:
4364 case R_PPC_EMB_MRKREF:
4365 case R_PPC_NONE:
4366 case R_PPC_max:
32af9f6e
AM
4367 case R_PPC_RELAX:
4368 case R_PPC_RELAX_PLT:
4369 case R_PPC_RELAX_PLTREL24:
7ba71655 4370 case R_PPC_16DX_HA:
25dbc73a 4371 break;
252b5132 4372
25dbc73a
AM
4373 /* These should only appear in dynamic objects. */
4374 case R_PPC_COPY:
4375 case R_PPC_GLOB_DAT:
4376 case R_PPC_JMP_SLOT:
4377 case R_PPC_RELATIVE:
e054468f 4378 case R_PPC_IRELATIVE:
25dbc73a 4379 break;
252b5132 4380
25dbc73a
AM
4381 /* These aren't handled yet. We'll report an error later. */
4382 case R_PPC_ADDR30:
4383 case R_PPC_EMB_RELSEC16:
4384 case R_PPC_EMB_RELST_LO:
4385 case R_PPC_EMB_RELST_HI:
4386 case R_PPC_EMB_RELST_HA:
4387 case R_PPC_EMB_BIT_FLD:
4388 break;
252b5132 4389
25dbc73a
AM
4390 /* This refers only to functions defined in the shared library. */
4391 case R_PPC_LOCAL24PC:
727fc41e 4392 if (h != NULL && h == htab->elf.hgot && htab->plt_type == PLT_UNSET)
016687f8
AM
4393 {
4394 htab->plt_type = PLT_OLD;
4395 htab->old_bfd = abfd;
4396 }
c7e17e05
AM
4397 if (h != NULL && h->type == STT_GNU_IFUNC)
4398 {
c7e17e05
AM
4399 h->needs_plt = 1;
4400 if (!update_plt_info (abfd, &h->plt.plist, NULL, 0))
4401 return FALSE;
4402 }
25dbc73a 4403 break;
252b5132 4404
25dbc73a
AM
4405 /* This relocation describes the C++ object vtable hierarchy.
4406 Reconstruct it for later use during GC. */
4407 case R_PPC_GNU_VTINHERIT:
4408 if (!bfd_elf_gc_record_vtinherit (abfd, sec, h, rel->r_offset))
4409 return FALSE;
4410 break;
252b5132 4411
25dbc73a
AM
4412 /* This relocation describes which C++ vtable entries are actually
4413 used. Record for later use during GC. */
4414 case R_PPC_GNU_VTENTRY:
d17e0c6e
JB
4415 BFD_ASSERT (h != NULL);
4416 if (h != NULL
4417 && !bfd_elf_gc_record_vtentry (abfd, sec, h, rel->r_addend))
25dbc73a
AM
4418 return FALSE;
4419 break;
252b5132 4420
25dbc73a
AM
4421 /* We shouldn't really be seeing these. */
4422 case R_PPC_TPREL32:
1d483afe
AM
4423 case R_PPC_TPREL16:
4424 case R_PPC_TPREL16_LO:
4425 case R_PPC_TPREL16_HI:
4426 case R_PPC_TPREL16_HA:
0e1862bb 4427 if (bfd_link_pic (info))
25dbc73a
AM
4428 info->flags |= DF_STATIC_TLS;
4429 goto dodyn;
252b5132 4430
25dbc73a
AM
4431 /* Nor these. */
4432 case R_PPC_DTPMOD32:
4433 case R_PPC_DTPREL32:
4434 goto dodyn;
252b5132 4435
9edfd1af
AM
4436 case R_PPC_REL32:
4437 if (h == NULL
4438 && got2 != NULL
4439 && (sec->flags & SEC_CODE) != 0
0e1862bb 4440 && bfd_link_pic (info)
4a3dc543 4441 && htab->plt_type == PLT_UNSET)
9edfd1af
AM
4442 {
4443 /* Old -fPIC gcc code has .long LCTOC1-LCFx just before
4444 the start of a function, which assembles to a REL32
4445 reference to .got2. If we detect one of these, then
4446 force the old PLT layout because the linker cannot
4447 reliably deduce the GOT pointer value needed for
4448 PLT call stubs. */
4449 asection *s;
87d72d41 4450 Elf_Internal_Sym *isym;
9edfd1af 4451
87d72d41
AM
4452 isym = bfd_sym_from_r_symndx (&htab->sym_cache,
4453 abfd, r_symndx);
4454 if (isym == NULL)
4455 return FALSE;
4456
4457 s = bfd_section_from_elf_index (abfd, isym->st_shndx);
9edfd1af 4458 if (s == got2)
016687f8
AM
4459 {
4460 htab->plt_type = PLT_OLD;
4461 htab->old_bfd = abfd;
4462 }
9edfd1af 4463 }
7123df0e 4464 if (h == NULL || h == htab->elf.hgot)
fd38b44c 4465 break;
625af618
AM
4466 /* fall through */
4467
4468 case R_PPC_ADDR32:
4469 case R_PPC_ADDR16:
4470 case R_PPC_ADDR16_LO:
4471 case R_PPC_ADDR16_HI:
4472 case R_PPC_ADDR16_HA:
4473 case R_PPC_UADDR32:
4474 case R_PPC_UADDR16:
0e1862bb 4475 if (h != NULL && !bfd_link_pic (info))
625af618
AM
4476 {
4477 /* We may need a plt entry if the symbol turns out to be
4478 a function defined in a dynamic object. */
3ec01793 4479 if (!update_plt_info (abfd, &h->plt.plist, NULL, 0))
625af618
AM
4480 return FALSE;
4481
4482 /* We may need a copy reloc too. */
4483 h->non_got_ref = 1;
4484 h->pointer_equality_needed = 1;
d3e454b9
AM
4485 if (r_type == R_PPC_ADDR16_HA)
4486 ppc_elf_hash_entry (h)->has_addr16_ha = 1;
4487 if (r_type == R_PPC_ADDR16_LO)
4488 ppc_elf_hash_entry (h)->has_addr16_lo = 1;
625af618
AM
4489 }
4490 goto dodyn;
9edfd1af 4491
25dbc73a
AM
4492 case R_PPC_REL24:
4493 case R_PPC_REL14:
4494 case R_PPC_REL14_BRTAKEN:
4495 case R_PPC_REL14_BRNTAKEN:
d7128ce4 4496 if (h == NULL)
25dbc73a 4497 break;
7123df0e 4498 if (h == htab->elf.hgot)
d7128ce4 4499 {
7123df0e 4500 if (htab->plt_type == PLT_UNSET)
016687f8
AM
4501 {
4502 htab->plt_type = PLT_OLD;
4503 htab->old_bfd = abfd;
4504 }
d7128ce4
AM
4505 break;
4506 }
25dbc73a 4507 /* fall through */
ee05f2fe 4508
25dbc73a 4509 case R_PPC_ADDR24:
25dbc73a
AM
4510 case R_PPC_ADDR14:
4511 case R_PPC_ADDR14_BRTAKEN:
4512 case R_PPC_ADDR14_BRNTAKEN:
0e1862bb 4513 if (h != NULL && !bfd_link_pic (info))
25dbc73a
AM
4514 {
4515 /* We may need a plt entry if the symbol turns out to be
4516 a function defined in a dynamic object. */
e054468f 4517 h->needs_plt = 1;
de972ffa 4518 if (!update_plt_info (abfd, &h->plt.plist, NULL, 0))
a6aa5195 4519 return FALSE;
625af618 4520 break;
25dbc73a 4521 }
7619e7c7 4522
25dbc73a
AM
4523 dodyn:
4524 /* If we are creating a shared library, and this is a reloc
4525 against a global symbol, or a non PC relative reloc
4526 against a local symbol, then we need to copy the reloc
4527 into the shared library. However, if we are linking with
4528 -Bsymbolic, we do not need to copy a reloc against a
4529 global symbol which is defined in an object we are
4530 including in the link (i.e., DEF_REGULAR is set). At
4531 this point we have not seen all the input files, so it is
4532 possible that DEF_REGULAR is not set now but will be set
4533 later (it is never cleared). In case of a weak definition,
4534 DEF_REGULAR may be cleared later by a strong definition in
4535 a shared library. We account for that possibility below by
4536 storing information in the dyn_relocs field of the hash
4537 table entry. A similar situation occurs when creating
4538 shared libraries and symbol visibility changes render the
4539 symbol local.
7619e7c7 4540
25dbc73a
AM
4541 If on the other hand, we are creating an executable, we
4542 may need to keep relocations for symbols satisfied by a
4543 dynamic library if we manage to avoid copy relocs for the
4544 symbol. */
0e1862bb 4545 if ((bfd_link_pic (info)
1d483afe 4546 && (must_be_dyn_reloc (info, r_type)
25dbc73a 4547 || (h != NULL
198f1157 4548 && (!SYMBOLIC_BIND (info, h)
25dbc73a
AM
4549 || h->root.type == bfd_link_hash_defweak
4550 || !h->def_regular))))
4551 || (ELIMINATE_COPY_RELOCS
0e1862bb 4552 && !bfd_link_pic (info)
25dbc73a
AM
4553 && h != NULL
4554 && (h->root.type == bfd_link_hash_defweak
de972ffa 4555 || !h->def_regular)))
25dbc73a 4556 {
25dbc73a
AM
4557#ifdef DEBUG
4558 fprintf (stderr,
4559 "ppc_elf_check_relocs needs to "
4560 "create relocation for %s\n",
4561 (h && h->root.root.string
4562 ? h->root.root.string : "<unknown>"));
4563#endif
4564 if (sreloc == NULL)
4565 {
c9a2f333
AM
4566 if (htab->elf.dynobj == NULL)
4567 htab->elf.dynobj = abfd;
83bac4b0
NC
4568
4569 sreloc = _bfd_elf_make_dynamic_reloc_section
4570 (sec, htab->elf.dynobj, 2, abfd, /*rela?*/ TRUE);
4571
25dbc73a 4572 if (sreloc == NULL)
83bac4b0 4573 return FALSE;
25dbc73a 4574 }
7619e7c7 4575
25dbc73a
AM
4576 /* If this is a global symbol, we count the number of
4577 relocations we need for this symbol. */
4578 if (h != NULL)
4579 {
f95f8542
AM
4580 struct elf_dyn_relocs *p;
4581 struct elf_dyn_relocs **rel_head;
4582
91d6fa6a 4583 rel_head = &ppc_elf_hash_entry (h)->dyn_relocs;
f95f8542
AM
4584 p = *rel_head;
4585 if (p == NULL || p->sec != sec)
4586 {
4587 p = bfd_alloc (htab->elf.dynobj, sizeof *p);
4588 if (p == NULL)
4589 return FALSE;
4590 p->next = *rel_head;
4591 *rel_head = p;
4592 p->sec = sec;
4593 p->count = 0;
4594 p->pc_count = 0;
4595 }
4596 p->count += 1;
4597 if (!must_be_dyn_reloc (info, r_type))
4598 p->pc_count += 1;
25dbc73a
AM
4599 }
4600 else
4601 {
4602 /* Track dynamic relocs needed for local syms too.
4603 We really need local syms available to do this
4604 easily. Oh well. */
f95f8542
AM
4605 struct ppc_dyn_relocs *p;
4606 struct ppc_dyn_relocs **rel_head;
4607 bfd_boolean is_ifunc;
25dbc73a 4608 asection *s;
6edfbbad 4609 void *vpp;
87d72d41 4610 Elf_Internal_Sym *isym;
6edfbbad 4611
87d72d41
AM
4612 isym = bfd_sym_from_r_symndx (&htab->sym_cache,
4613 abfd, r_symndx);
4614 if (isym == NULL)
25dbc73a 4615 return FALSE;
7fce784e 4616
87d72d41
AM
4617 s = bfd_section_from_elf_index (abfd, isym->st_shndx);
4618 if (s == NULL)
4619 s = sec;
4620
6edfbbad 4621 vpp = &elf_section_data (s)->local_dynrel;
f95f8542
AM
4622 rel_head = (struct ppc_dyn_relocs **) vpp;
4623 is_ifunc = ELF_ST_TYPE (isym->st_info) == STT_GNU_IFUNC;
4624 p = *rel_head;
4625 if (p != NULL && p->sec == sec && p->ifunc != is_ifunc)
4626 p = p->next;
4627 if (p == NULL || p->sec != sec || p->ifunc != is_ifunc)
4628 {
4629 p = bfd_alloc (htab->elf.dynobj, sizeof *p);
4630 if (p == NULL)
4631 return FALSE;
4632 p->next = *rel_head;
4633 *rel_head = p;
4634 p->sec = sec;
4635 p->ifunc = is_ifunc;
4636 p->count = 0;
4637 }
4638 p->count += 1;
25dbc73a 4639 }
7619e7c7 4640 }
25dbc73a
AM
4641
4642 break;
7619e7c7
AM
4643 }
4644 }
ee05f2fe 4645
25dbc73a
AM
4646 return TRUE;
4647}
4648\f
005d79fd
AM
4649/* Warn for conflicting Tag_GNU_Power_ABI_FP attributes between IBFD
4650 and OBFD, and merge non-conflicting ones. */
4651void
50e03d47 4652_bfd_elf_ppc_merge_fp_attributes (bfd *ibfd, struct bfd_link_info *info)
34c8bcba 4653{
50e03d47 4654 bfd *obfd = info->output_bfd;
c6e65352
DJ
4655 obj_attribute *in_attr, *in_attrs;
4656 obj_attribute *out_attr, *out_attrs;
34c8bcba 4657
c6e65352
DJ
4658 in_attrs = elf_known_obj_attributes (ibfd)[OBJ_ATTR_GNU];
4659 out_attrs = elf_known_obj_attributes (obfd)[OBJ_ATTR_GNU];
4660
c6e65352
DJ
4661 in_attr = &in_attrs[Tag_GNU_Power_ABI_FP];
4662 out_attr = &out_attrs[Tag_GNU_Power_ABI_FP];
005d79fd 4663
c6e65352 4664 if (in_attr->i != out_attr->i)
34c8bcba 4665 {
005d79fd
AM
4666 int in_fp = in_attr->i & 3;
4667 int out_fp = out_attr->i & 3;
4668
4669 if (in_fp == 0)
34c8bcba 4670 ;
005d79fd
AM
4671 else if (out_fp == 0)
4672 {
4673 out_attr->type = 1;
4674 out_attr->i ^= in_fp;
4675 }
4676 else if (out_fp != 2 && in_fp == 2)
34c8bcba 4677 _bfd_error_handler
695344c0 4678 /* xgettext:c-format */
34c8bcba 4679 (_("Warning: %B uses hard float, %B uses soft float"), obfd, ibfd);
005d79fd
AM
4680 else if (out_fp == 2 && in_fp != 2)
4681 _bfd_error_handler
695344c0 4682 /* xgettext:c-format */
005d79fd
AM
4683 (_("Warning: %B uses hard float, %B uses soft float"), ibfd, obfd);
4684 else if (out_fp == 1 && in_fp == 3)
3c7b9897 4685 _bfd_error_handler
695344c0 4686 /* xgettext:c-format */
005d79fd
AM
4687 (_("Warning: %B uses double-precision hard float, "
4688 "%B uses single-precision hard float"), obfd, ibfd);
4689 else if (out_fp == 3 && in_fp == 1)
3c7b9897 4690 _bfd_error_handler
695344c0 4691 /* xgettext:c-format */
005d79fd
AM
4692 (_("Warning: %B uses double-precision hard float, "
4693 "%B uses single-precision hard float"), ibfd, obfd);
4694
4695 in_fp = in_attr->i & 0xc;
4696 out_fp = out_attr->i & 0xc;
4697 if (in_fp == 0)
4698 ;
4699 else if (out_fp == 0)
4700 {
4701 out_attr->type = 1;
4702 out_attr->i ^= in_fp;
4703 }
4704 else if (out_fp != 2 * 4 && in_fp == 2 * 4)
3c7b9897 4705 _bfd_error_handler
695344c0 4706 /* xgettext:c-format */
005d79fd
AM
4707 (_("Warning: %B uses 64-bit long double, "
4708 "%B uses 128-bit long double"), ibfd, obfd);
4709 else if (in_fp != 2 * 4 && out_fp == 2 * 4)
34c8bcba 4710 _bfd_error_handler
695344c0 4711 /* xgettext:c-format */
005d79fd
AM
4712 (_("Warning: %B uses 64-bit long double, "
4713 "%B uses 128-bit long double"), obfd, ibfd);
4714 else if (out_fp == 1 * 4 && in_fp == 3 * 4)
34c8bcba 4715 _bfd_error_handler
695344c0 4716 /* xgettext:c-format */
005d79fd
AM
4717 (_("Warning: %B uses IBM long double, "
4718 "%B uses IEEE long double"), ibfd, obfd);
4719 else if (out_fp == 3 * 4 && in_fp == 1 * 4)
34c8bcba 4720 _bfd_error_handler
695344c0 4721 /* xgettext:c-format */
005d79fd
AM
4722 (_("Warning: %B uses IBM long double, "
4723 "%B uses IEEE long double"), obfd, ibfd);
c6e65352 4724 }
005d79fd
AM
4725}
4726
4727/* Merge object attributes from IBFD into OBFD. Warn if
4728 there are conflicting attributes. */
4729static bfd_boolean
50e03d47 4730ppc_elf_merge_obj_attributes (bfd *ibfd, struct bfd_link_info *info)
005d79fd 4731{
50e03d47 4732 bfd *obfd;
005d79fd
AM
4733 obj_attribute *in_attr, *in_attrs;
4734 obj_attribute *out_attr, *out_attrs;
4735
50e03d47 4736 _bfd_elf_ppc_merge_fp_attributes (ibfd, info);
005d79fd 4737
50e03d47 4738 obfd = info->output_bfd;
005d79fd
AM
4739 in_attrs = elf_known_obj_attributes (ibfd)[OBJ_ATTR_GNU];
4740 out_attrs = elf_known_obj_attributes (obfd)[OBJ_ATTR_GNU];
c6e65352
DJ
4741
4742 /* Check for conflicting Tag_GNU_Power_ABI_Vector attributes and
4743 merge non-conflicting ones. */
4744 in_attr = &in_attrs[Tag_GNU_Power_ABI_Vector];
4745 out_attr = &out_attrs[Tag_GNU_Power_ABI_Vector];
4746 if (in_attr->i != out_attr->i)
4747 {
005d79fd
AM
4748 int in_vec = in_attr->i & 3;
4749 int out_vec = out_attr->i & 3;
c6e65352 4750
005d79fd
AM
4751 if (in_vec == 0)
4752 ;
4753 else if (out_vec == 0)
c6e65352 4754 {
005d79fd
AM
4755 out_attr->type = 1;
4756 out_attr->i = in_vec;
c6e65352 4757 }
c6e65352
DJ
4758 /* For now, allow generic to transition to AltiVec or SPE
4759 without a warning. If GCC marked files with their stack
4760 alignment and used don't-care markings for files which are
4761 not affected by the vector ABI, we could warn about this
4762 case too. */
005d79fd 4763 else if (in_vec == 1)
c6e65352 4764 ;
005d79fd
AM
4765 else if (out_vec == 1)
4766 {
4767 out_attr->type = 1;
4768 out_attr->i = in_vec;
4769 }
4770 else if (out_vec < in_vec)
c6e65352 4771 _bfd_error_handler
695344c0 4772 /* xgettext:c-format */
005d79fd
AM
4773 (_("Warning: %B uses AltiVec vector ABI, %B uses SPE vector ABI"),
4774 obfd, ibfd);
4775 else if (out_vec > in_vec)
c6e65352 4776 _bfd_error_handler
695344c0 4777 /* xgettext:c-format */
005d79fd
AM
4778 (_("Warning: %B uses AltiVec vector ABI, %B uses SPE vector ABI"),
4779 ibfd, obfd);
34c8bcba
JM
4780 }
4781
f82e0623
NF
4782 /* Check for conflicting Tag_GNU_Power_ABI_Struct_Return attributes
4783 and merge non-conflicting ones. */
4784 in_attr = &in_attrs[Tag_GNU_Power_ABI_Struct_Return];
4785 out_attr = &out_attrs[Tag_GNU_Power_ABI_Struct_Return];
4786 if (in_attr->i != out_attr->i)
4787 {
005d79fd
AM
4788 int in_struct = in_attr->i & 3;
4789 int out_struct = out_attr->i & 3;
4790
4791 if (in_struct == 0 || in_struct == 3)
f82e0623 4792 ;
005d79fd
AM
4793 else if (out_struct == 0)
4794 {
4795 out_attr->type = 1;
4796 out_attr->i = in_struct;
4797 }
4798 else if (out_struct < in_struct)
4799 _bfd_error_handler
695344c0 4800 /* xgettext:c-format */
005d79fd
AM
4801 (_("Warning: %B uses r3/r4 for small structure returns, "
4802 "%B uses memory"), obfd, ibfd);
4803 else if (out_struct > in_struct)
4804 _bfd_error_handler
695344c0 4805 /* xgettext:c-format */
005d79fd
AM
4806 (_("Warning: %B uses r3/r4 for small structure returns, "
4807 "%B uses memory"), ibfd, obfd);
f82e0623
NF
4808 }
4809
34c8bcba 4810 /* Merge Tag_compatibility attributes and any common GNU ones. */
50e03d47 4811 _bfd_elf_merge_object_attributes (ibfd, info);
34c8bcba
JM
4812
4813 return TRUE;
4814}
4815
8853c3d3
AM
4816/* Merge backend specific data from an object file to the output
4817 object file when linking. */
4818
4819static bfd_boolean
50e03d47 4820ppc_elf_merge_private_bfd_data (bfd *ibfd, struct bfd_link_info *info)
8853c3d3 4821{
50e03d47 4822 bfd *obfd = info->output_bfd;
8853c3d3
AM
4823 flagword old_flags;
4824 flagword new_flags;
4825 bfd_boolean error;
4826
0c8d6e5c 4827 if (!is_ppc_elf (ibfd) || !is_ppc_elf (obfd))
8853c3d3
AM
4828 return TRUE;
4829
cc643b88 4830 /* Check if we have the same endianness. */
50e03d47 4831 if (! _bfd_generic_verify_endian_match (ibfd, info))
8853c3d3
AM
4832 return FALSE;
4833
50e03d47 4834 if (!ppc_elf_merge_obj_attributes (ibfd, info))
34c8bcba
JM
4835 return FALSE;
4836
8853c3d3
AM
4837 new_flags = elf_elfheader (ibfd)->e_flags;
4838 old_flags = elf_elfheader (obfd)->e_flags;
4839 if (!elf_flags_init (obfd))
4840 {
4841 /* First call, no flags set. */
4842 elf_flags_init (obfd) = TRUE;
4843 elf_elfheader (obfd)->e_flags = new_flags;
4844 }
4845
4846 /* Compatible flags are ok. */
4847 else if (new_flags == old_flags)
4848 ;
4849
4850 /* Incompatible flags. */
4851 else
4852 {
4853 /* Warn about -mrelocatable mismatch. Allow -mrelocatable-lib
4854 to be linked with either. */
4855 error = FALSE;
4856 if ((new_flags & EF_PPC_RELOCATABLE) != 0
4857 && (old_flags & (EF_PPC_RELOCATABLE | EF_PPC_RELOCATABLE_LIB)) == 0)
4858 {
4859 error = TRUE;
4eca0228 4860 _bfd_error_handler
8853c3d3
AM
4861 (_("%B: compiled with -mrelocatable and linked with "
4862 "modules compiled normally"), ibfd);
4863 }
4864 else if ((new_flags & (EF_PPC_RELOCATABLE | EF_PPC_RELOCATABLE_LIB)) == 0
4865 && (old_flags & EF_PPC_RELOCATABLE) != 0)
4866 {
4867 error = TRUE;
4eca0228 4868 _bfd_error_handler
8853c3d3
AM
4869 (_("%B: compiled normally and linked with "
4870 "modules compiled with -mrelocatable"), ibfd);
4871 }
4872
4873 /* The output is -mrelocatable-lib iff both the input files are. */
4874 if (! (new_flags & EF_PPC_RELOCATABLE_LIB))
4875 elf_elfheader (obfd)->e_flags &= ~EF_PPC_RELOCATABLE_LIB;
4876
4877 /* The output is -mrelocatable iff it can't be -mrelocatable-lib,
4878 but each input file is either -mrelocatable or -mrelocatable-lib. */
4879 if (! (elf_elfheader (obfd)->e_flags & EF_PPC_RELOCATABLE_LIB)
4880 && (new_flags & (EF_PPC_RELOCATABLE_LIB | EF_PPC_RELOCATABLE))
4881 && (old_flags & (EF_PPC_RELOCATABLE_LIB | EF_PPC_RELOCATABLE)))
4882 elf_elfheader (obfd)->e_flags |= EF_PPC_RELOCATABLE;
4883
4884 /* Do not warn about eabi vs. V.4 mismatch, just or in the bit if
4885 any module uses it. */
4886 elf_elfheader (obfd)->e_flags |= (new_flags & EF_PPC_EMB);
4887
4888 new_flags &= ~(EF_PPC_RELOCATABLE | EF_PPC_RELOCATABLE_LIB | EF_PPC_EMB);
4889 old_flags &= ~(EF_PPC_RELOCATABLE | EF_PPC_RELOCATABLE_LIB | EF_PPC_EMB);
4890
4891 /* Warn about any other mismatches. */
4892 if (new_flags != old_flags)
4893 {
4894 error = TRUE;
4eca0228 4895 _bfd_error_handler
695344c0 4896 /* xgettext:c-format */
8853c3d3
AM
4897 (_("%B: uses different e_flags (0x%lx) fields "
4898 "than previous modules (0x%lx)"),
4899 ibfd, (long) new_flags, (long) old_flags);
4900 }
4901
4902 if (error)
4903 {
4904 bfd_set_error (bfd_error_bad_value);
4905 return FALSE;
4906 }
4907 }
4908
4909 return TRUE;
4910}
b9c361e0
JL
4911
4912static void
95f0d0d2 4913ppc_elf_vle_split16 (bfd *input_bfd,
08dc996f
AM
4914 asection *input_section,
4915 unsigned long offset,
95f0d0d2 4916 bfd_byte *loc,
86c95733 4917 bfd_vma value,
08dc996f
AM
4918 split16_format_type split16_format,
4919 bfd_boolean fixup)
b9c361e0 4920{
08dc996f 4921 unsigned int insn, opcode, top5;
b9c361e0 4922
95f0d0d2 4923 insn = bfd_get_32 (input_bfd, loc);
673cff9b 4924 opcode = insn & 0xfc00f800;
08dc996f
AM
4925 if (opcode == E_OR2I_INSN
4926 || opcode == E_AND2I_DOT_INSN
4927 || opcode == E_OR2IS_INSN
4928 || opcode == E_LIS_INSN
4929 || opcode == E_AND2IS_DOT_INSN)
4930 {
4931 if (split16_format != split16a_type)
4932 {
4933 if (fixup)
4934 split16_format = split16a_type;
4935 else
4936 _bfd_error_handler
4937 /* xgettext:c-format */
4938 (_("%B(%A+0x%lx): expected 16A style relocation on 0x%08x insn"),
4939 input_bfd, input_section, offset, opcode);
4940 }
4941 }
4942 else if (opcode == E_ADD2I_DOT_INSN
4943 || opcode == E_ADD2IS_INSN
4944 || opcode == E_CMP16I_INSN
4945 || opcode == E_MULL2I_INSN
4946 || opcode == E_CMPL16I_INSN
4947 || opcode == E_CMPH16I_INSN
4948 || opcode == E_CMPHL16I_INSN)
4949 {
4950 if (split16_format != split16d_type)
4951 {
4952 if (fixup)
4953 split16_format = split16d_type;
4954 else
4955 _bfd_error_handler
4956 /* xgettext:c-format */
4957 (_("%B(%A+0x%lx): expected 16D style relocation on 0x%08x insn"),
4958 input_bfd, input_section, offset, opcode);
4959 }
4960 }
86c95733 4961 top5 = value & 0xf800;
5499c7c7
AM
4962 top5 = top5 << (split16_format == split16a_type ? 5 : 10);
4963 insn &= (split16_format == split16a_type ? ~0x1f07ff : ~0x3e007ff);
b9c361e0 4964 insn |= top5;
86c95733 4965 insn |= value & 0x7ff;
95f0d0d2 4966 bfd_put_32 (input_bfd, insn, loc);
b9c361e0 4967}
8853c3d3 4968\f
d7128ce4
AM
4969/* Choose which PLT scheme to use, and set .plt flags appropriately.
4970 Returns -1 on error, 0 for old PLT, 1 for new PLT. */
4971int
4972ppc_elf_select_plt_layout (bfd *output_bfd ATTRIBUTE_UNUSED,
5446cbdf 4973 struct bfd_link_info *info)
d7128ce4
AM
4974{
4975 struct ppc_elf_link_hash_table *htab;
9d8504b1 4976 flagword flags;
d7128ce4
AM
4977
4978 htab = ppc_elf_hash_table (info);
4a3dc543
RS
4979
4980 if (htab->plt_type == PLT_UNSET)
016687f8 4981 {
b3874e1a
AM
4982 struct elf_link_hash_entry *h;
4983
5446cbdf 4984 if (htab->params->plt_style == PLT_OLD)
016687f8 4985 htab->plt_type = PLT_OLD;
0e1862bb 4986 else if (bfd_link_pic (info)
b3874e1a
AM
4987 && htab->elf.dynamic_sections_created
4988 && (h = elf_link_hash_lookup (&htab->elf, "_mcount",
4989 FALSE, FALSE, TRUE)) != NULL
4990 && (h->type == STT_FUNC
4991 || h->needs_plt)
4992 && h->ref_regular
4993 && !(SYMBOL_CALLS_LOCAL (info, h)
4994 || (ELF_ST_VISIBILITY (h->other) != STV_DEFAULT
4995 && h->root.type == bfd_link_hash_undefweak)))
4996 {
4997 /* Profiling of shared libs (and pies) is not supported with
4998 secure plt, because ppc32 does profiling before a
4999 function prologue and a secure plt pic call stubs needs
5000 r30 to be set up. */
5001 htab->plt_type = PLT_OLD;
5002 }
016687f8
AM
5003 else
5004 {
5005 bfd *ibfd;
5446cbdf 5006 enum ppc_elf_plt_type plt_type = htab->params->plt_style;
016687f8
AM
5007
5008 /* Look through the reloc flags left by ppc_elf_check_relocs.
5009 Use the old style bss plt if a file makes plt calls
5010 without using the new relocs, and if ld isn't given
5011 --secure-plt and we never see REL16 relocs. */
5012 if (plt_type == PLT_UNSET)
5013 plt_type = PLT_OLD;
c72f2fb2 5014 for (ibfd = info->input_bfds; ibfd; ibfd = ibfd->link.next)
0c8d6e5c 5015 if (is_ppc_elf (ibfd))
016687f8
AM
5016 {
5017 if (ppc_elf_tdata (ibfd)->has_rel16)
5018 plt_type = PLT_NEW;
5019 else if (ppc_elf_tdata (ibfd)->makes_plt_call)
5020 {
5021 plt_type = PLT_OLD;
5022 htab->old_bfd = ibfd;
5023 break;
5024 }
5025 }
5026 htab->plt_type = plt_type;
5027 }
5028 }
5446cbdf 5029 if (htab->plt_type == PLT_OLD && htab->params->plt_style == PLT_NEW)
b3874e1a
AM
5030 {
5031 if (htab->old_bfd != NULL)
5032 info->callbacks->einfo (_("%P: bss-plt forced due to %B\n"),
5033 htab->old_bfd);
5034 else
5035 info->callbacks->einfo (_("%P: bss-plt forced by profiling\n"));
5036 }
d7128ce4 5037
4a3dc543 5038 BFD_ASSERT (htab->plt_type != PLT_VXWORKS);
9d8504b1 5039
4a3dc543 5040 if (htab->plt_type == PLT_NEW)
9d8504b1
PB
5041 {
5042 flags = (SEC_ALLOC | SEC_LOAD | SEC_HAS_CONTENTS
5043 | SEC_IN_MEMORY | SEC_LINKER_CREATED);
86b9da88
AM
5044
5045 /* The new PLT is a loaded section. */
ce558b89
AM
5046 if (htab->elf.splt != NULL
5047 && !bfd_set_section_flags (htab->elf.dynobj, htab->elf.splt, flags))
86b9da88
AM
5048 return -1;
5049
5050 /* The new GOT is not executable. */
ce558b89
AM
5051 if (htab->elf.sgot != NULL
5052 && !bfd_set_section_flags (htab->elf.dynobj, htab->elf.sgot, flags))
86b9da88 5053 return -1;
d7128ce4
AM
5054 }
5055 else
5056 {
5057 /* Stop an unused .glink section from affecting .text alignment. */
86b9da88
AM
5058 if (htab->glink != NULL
5059 && !bfd_set_section_alignment (htab->elf.dynobj, htab->glink, 0))
5060 return -1;
d7128ce4 5061 }
4a3dc543 5062 return htab->plt_type == PLT_NEW;
d7128ce4
AM
5063}
5064\f
25dbc73a
AM
5065/* Return the section that should be marked against GC for a given
5066 relocation. */
586119b3 5067
25dbc73a
AM
5068static asection *
5069ppc_elf_gc_mark_hook (asection *sec,
07adf181 5070 struct bfd_link_info *info,
25dbc73a
AM
5071 Elf_Internal_Rela *rel,
5072 struct elf_link_hash_entry *h,
5073 Elf_Internal_Sym *sym)
5074{
5075 if (h != NULL)
07adf181
AM
5076 switch (ELF32_R_TYPE (rel->r_info))
5077 {
5078 case R_PPC_GNU_VTINHERIT:
5079 case R_PPC_GNU_VTENTRY:
5080 return NULL;
5081 }
5082
5083 return _bfd_elf_gc_mark_hook (sec, info, rel, h, sym);
25dbc73a 5084}
a876ecf9 5085
25dbc73a
AM
5086/* Update the got, plt and dynamic reloc reference counts for the
5087 section being removed. */
5088
5089static bfd_boolean
5090ppc_elf_gc_sweep_hook (bfd *abfd,
5091 struct bfd_link_info *info,
5092 asection *sec,
5093 const Elf_Internal_Rela *relocs)
5094{
5095 struct ppc_elf_link_hash_table *htab;
5096 Elf_Internal_Shdr *symtab_hdr;
5097 struct elf_link_hash_entry **sym_hashes;
5098 bfd_signed_vma *local_got_refcounts;
5099 const Elf_Internal_Rela *rel, *relend;
a6aa5195 5100 asection *got2;
25dbc73a 5101
0e1862bb 5102 if (bfd_link_relocatable (info))
7dda2462
TG
5103 return TRUE;
5104
c87b5a93
AM
5105 if ((sec->flags & SEC_ALLOC) == 0)
5106 return TRUE;
5107
25dbc73a
AM
5108 elf_section_data (sec)->local_dynrel = NULL;
5109
5110 htab = ppc_elf_hash_table (info);
0ffa91dd 5111 symtab_hdr = &elf_symtab_hdr (abfd);
25dbc73a
AM
5112 sym_hashes = elf_sym_hashes (abfd);
5113 local_got_refcounts = elf_local_got_refcounts (abfd);
a6aa5195 5114 got2 = bfd_get_section_by_name (abfd, ".got2");
25dbc73a
AM
5115
5116 relend = relocs + sec->reloc_count;
5117 for (rel = relocs; rel < relend; rel++)
5118 {
5119 unsigned long r_symndx;
5120 enum elf_ppc_reloc_type r_type;
5121 struct elf_link_hash_entry *h = NULL;
5122
5123 r_symndx = ELF32_R_SYM (rel->r_info);
5124 if (r_symndx >= symtab_hdr->sh_info)
a876ecf9 5125 {
6061a67d 5126 struct elf_dyn_relocs **pp, *p;
25dbc73a
AM
5127 struct ppc_elf_link_hash_entry *eh;
5128
5129 h = sym_hashes[r_symndx - symtab_hdr->sh_info];
5130 while (h->root.type == bfd_link_hash_indirect
5131 || h->root.type == bfd_link_hash_warning)
5132 h = (struct elf_link_hash_entry *) h->root.u.i.link;
5133 eh = (struct ppc_elf_link_hash_entry *) h;
5134
5135 for (pp = &eh->dyn_relocs; (p = *pp) != NULL; pp = &p->next)
5136 if (p->sec == sec)
5137 {
5138 /* Everything must go for SEC. */
5139 *pp = p->next;
5140 break;
5141 }
a876ecf9 5142 }
ee05f2fe 5143
25dbc73a 5144 r_type = ELF32_R_TYPE (rel->r_info);
de972ffa
AM
5145 if (!htab->is_vxworks
5146 && h == NULL
5147 && local_got_refcounts != NULL
0e1862bb 5148 && (!bfd_link_pic (info)
de972ffa 5149 || is_branch_reloc (r_type)))
e054468f 5150 {
de972ffa
AM
5151 struct plt_entry **local_plt = (struct plt_entry **)
5152 (local_got_refcounts + symtab_hdr->sh_info);
5153 char *local_got_tls_masks = (char *)
5154 (local_plt + symtab_hdr->sh_info);
5155 if ((local_got_tls_masks[r_symndx] & PLT_IFUNC) != 0)
e054468f 5156 {
de972ffa 5157 struct plt_entry **ifunc = local_plt + r_symndx;
a877a2b6
AM
5158 bfd_vma addend = 0;
5159 struct plt_entry *ent;
5160
0e1862bb 5161 if (r_type == R_PPC_PLTREL24 && bfd_link_pic (info))
a877a2b6
AM
5162 addend = rel->r_addend;
5163 ent = find_plt_ent (ifunc, got2, addend);
e054468f
AM
5164 if (ent->plt.refcount > 0)
5165 ent->plt.refcount -= 1;
5166 continue;
5167 }
5168 }
5169
25dbc73a 5170 switch (r_type)
ee05f2fe 5171 {
25dbc73a
AM
5172 case R_PPC_GOT_TLSLD16:
5173 case R_PPC_GOT_TLSLD16_LO:
5174 case R_PPC_GOT_TLSLD16_HI:
5175 case R_PPC_GOT_TLSLD16_HA:
25dbc73a
AM
5176 case R_PPC_GOT_TLSGD16:
5177 case R_PPC_GOT_TLSGD16_LO:
5178 case R_PPC_GOT_TLSGD16_HI:
5179 case R_PPC_GOT_TLSGD16_HA:
5180 case R_PPC_GOT_TPREL16:
5181 case R_PPC_GOT_TPREL16_LO:
5182 case R_PPC_GOT_TPREL16_HI:
5183 case R_PPC_GOT_TPREL16_HA:
5184 case R_PPC_GOT_DTPREL16:
5185 case R_PPC_GOT_DTPREL16_LO:
5186 case R_PPC_GOT_DTPREL16_HI:
5187 case R_PPC_GOT_DTPREL16_HA:
5188 case R_PPC_GOT16:
5189 case R_PPC_GOT16_LO:
5190 case R_PPC_GOT16_HI:
5191 case R_PPC_GOT16_HA:
5192 if (h != NULL)
ee05f2fe 5193 {
25dbc73a
AM
5194 if (h->got.refcount > 0)
5195 h->got.refcount--;
0e1862bb 5196 if (!bfd_link_pic (info))
91e21fb7
AM
5197 {
5198 struct plt_entry *ent;
5199
5200 ent = find_plt_ent (&h->plt.plist, NULL, 0);
32af9f6e 5201 if (ent != NULL && ent->plt.refcount > 0)
91e21fb7
AM
5202 ent->plt.refcount -= 1;
5203 }
ee05f2fe 5204 }
25dbc73a
AM
5205 else if (local_got_refcounts != NULL)
5206 {
5207 if (local_got_refcounts[r_symndx] > 0)
5208 local_got_refcounts[r_symndx]--;
5209 }
5210 break;
ee05f2fe 5211
25dbc73a
AM
5212 case R_PPC_REL24:
5213 case R_PPC_REL14:
5214 case R_PPC_REL14_BRTAKEN:
5215 case R_PPC_REL14_BRNTAKEN:
5216 case R_PPC_REL32:
3b36f7e6 5217 if (h == NULL || h == htab->elf.hgot)
25dbc73a 5218 break;
1a0670f3 5219 /* Fall through. */
ee05f2fe 5220
25dbc73a
AM
5221 case R_PPC_ADDR32:
5222 case R_PPC_ADDR24:
5223 case R_PPC_ADDR16:
5224 case R_PPC_ADDR16_LO:
5225 case R_PPC_ADDR16_HI:
5226 case R_PPC_ADDR16_HA:
5227 case R_PPC_ADDR14:
5228 case R_PPC_ADDR14_BRTAKEN:
5229 case R_PPC_ADDR14_BRNTAKEN:
5230 case R_PPC_UADDR32:
5231 case R_PPC_UADDR16:
0e1862bb 5232 if (bfd_link_pic (info))
87538722 5233 break;
1a0670f3 5234 /* Fall through. */
87538722 5235
25dbc73a
AM
5236 case R_PPC_PLT32:
5237 case R_PPC_PLTREL24:
87538722 5238 case R_PPC_PLTREL32:
25dbc73a
AM
5239 case R_PPC_PLT16_LO:
5240 case R_PPC_PLT16_HI:
5241 case R_PPC_PLT16_HA:
5242 if (h != NULL)
5243 {
a877a2b6
AM
5244 bfd_vma addend = 0;
5245 struct plt_entry *ent;
5246
0e1862bb 5247 if (r_type == R_PPC_PLTREL24 && bfd_link_pic (info))
a877a2b6
AM
5248 addend = rel->r_addend;
5249 ent = find_plt_ent (&h->plt.plist, got2, addend);
32af9f6e 5250 if (ent != NULL && ent->plt.refcount > 0)
a6aa5195 5251 ent->plt.refcount -= 1;
25dbc73a
AM
5252 }
5253 break;
ee05f2fe 5254
25dbc73a
AM
5255 default:
5256 break;
5257 }
7fce784e 5258 }
7fce784e
AS
5259 return TRUE;
5260}
25dbc73a 5261\f
3a71aa26
AM
5262/* Set plt output section type, htab->tls_get_addr, and call the
5263 generic ELF tls_setup function. */
7fce784e 5264
25dbc73a 5265asection *
5446cbdf 5266ppc_elf_tls_setup (bfd *obfd, struct bfd_link_info *info)
7fce784e 5267{
25dbc73a 5268 struct ppc_elf_link_hash_table *htab;
7fce784e 5269
25dbc73a 5270 htab = ppc_elf_hash_table (info);
a7f2871e
AM
5271 htab->tls_get_addr = elf_link_hash_lookup (&htab->elf, "__tls_get_addr",
5272 FALSE, FALSE, TRUE);
f01f1741
AM
5273 if (htab->plt_type != PLT_NEW)
5274 htab->params->no_tls_get_addr_opt = TRUE;
5275
5446cbdf 5276 if (!htab->params->no_tls_get_addr_opt)
a7f2871e
AM
5277 {
5278 struct elf_link_hash_entry *opt, *tga;
5279 opt = elf_link_hash_lookup (&htab->elf, "__tls_get_addr_opt",
5280 FALSE, FALSE, TRUE);
5281 if (opt != NULL
5282 && (opt->root.type == bfd_link_hash_defined
5283 || opt->root.type == bfd_link_hash_defweak))
5284 {
5285 /* If glibc supports an optimized __tls_get_addr call stub,
5286 signalled by the presence of __tls_get_addr_opt, and we'll
5287 be calling __tls_get_addr via a plt call stub, then
5288 make __tls_get_addr point to __tls_get_addr_opt. */
5289 tga = htab->tls_get_addr;
5290 if (htab->elf.dynamic_sections_created
5291 && tga != NULL
5292 && (tga->type == STT_FUNC
5293 || tga->needs_plt)
5294 && !(SYMBOL_CALLS_LOCAL (info, tga)
5295 || (ELF_ST_VISIBILITY (tga->other) != STV_DEFAULT
5296 && tga->root.type == bfd_link_hash_undefweak)))
5297 {
5298 struct plt_entry *ent;
32af9f6e
AM
5299 for (ent = tga->plt.plist; ent != NULL; ent = ent->next)
5300 if (ent->plt.refcount > 0)
5301 break;
5302 if (ent != NULL)
a7f2871e
AM
5303 {
5304 tga->root.type = bfd_link_hash_indirect;
5305 tga->root.u.i.link = &opt->root;
5306 ppc_elf_copy_indirect_symbol (info, opt, tga);
b531344c 5307 opt->mark = 1;
a7f2871e
AM
5308 if (opt->dynindx != -1)
5309 {
5310 /* Use __tls_get_addr_opt in dynamic relocations. */
5311 opt->dynindx = -1;
5312 _bfd_elf_strtab_delref (elf_hash_table (info)->dynstr,
5313 opt->dynstr_index);
5314 if (!bfd_elf_link_record_dynamic_symbol (info, opt))
5315 return FALSE;
5316 }
5317 htab->tls_get_addr = opt;
5318 }
5319 }
5320 }
5321 else
5446cbdf 5322 htab->params->no_tls_get_addr_opt = TRUE;
a7f2871e 5323 }
4a3dc543 5324 if (htab->plt_type == PLT_NEW
ce558b89
AM
5325 && htab->elf.splt != NULL
5326 && htab->elf.splt->output_section != NULL)
d7128ce4 5327 {
ce558b89
AM
5328 elf_section_type (htab->elf.splt->output_section) = SHT_PROGBITS;
5329 elf_section_flags (htab->elf.splt->output_section) = SHF_ALLOC + SHF_WRITE;
d7128ce4
AM
5330 }
5331
25dbc73a 5332 return _bfd_elf_tls_setup (obfd, info);
7fce784e
AS
5333}
5334
3a71aa26
AM
5335/* Return TRUE iff REL is a branch reloc with a global symbol matching
5336 HASH. */
5337
5338static bfd_boolean
5339branch_reloc_hash_match (const bfd *ibfd,
5340 const Elf_Internal_Rela *rel,
5341 const struct elf_link_hash_entry *hash)
5342{
5343 Elf_Internal_Shdr *symtab_hdr = &elf_symtab_hdr (ibfd);
5344 enum elf_ppc_reloc_type r_type = ELF32_R_TYPE (rel->r_info);
5345 unsigned int r_symndx = ELF32_R_SYM (rel->r_info);
5346
e054468f 5347 if (r_symndx >= symtab_hdr->sh_info && is_branch_reloc (r_type))
3a71aa26
AM
5348 {
5349 struct elf_link_hash_entry **sym_hashes = elf_sym_hashes (ibfd);
5350 struct elf_link_hash_entry *h;
5351
5352 h = sym_hashes[r_symndx - symtab_hdr->sh_info];
5353 while (h->root.type == bfd_link_hash_indirect
5354 || h->root.type == bfd_link_hash_warning)
5355 h = (struct elf_link_hash_entry *) h->root.u.i.link;
5356 if (h == hash)
5357 return TRUE;
5358 }
5359 return FALSE;
5360}
5361
25dbc73a
AM
5362/* Run through all the TLS relocs looking for optimization
5363 opportunities. */
252b5132 5364
25dbc73a
AM
5365bfd_boolean
5366ppc_elf_tls_optimize (bfd *obfd ATTRIBUTE_UNUSED,
5367 struct bfd_link_info *info)
252b5132 5368{
7fce784e 5369 bfd *ibfd;
25dbc73a
AM
5370 asection *sec;
5371 struct ppc_elf_link_hash_table *htab;
b7fcf6f6 5372 int pass;
252b5132 5373
3cbc1e5e 5374 if (!bfd_link_executable (info))
25dbc73a 5375 return TRUE;
252b5132 5376
7619e7c7 5377 htab = ppc_elf_hash_table (info);
663a1470
AM
5378 if (htab == NULL)
5379 return FALSE;
5380
b7fcf6f6
AM
5381 /* Make two passes through the relocs. First time check that tls
5382 relocs involved in setting up a tls_get_addr call are indeed
663a1470
AM
5383 followed by such a call. If they are not, don't do any tls
5384 optimization. On the second pass twiddle tls_mask flags to
5385 notify relocate_section that optimization can be done, and
5386 adjust got and plt refcounts. */
b7fcf6f6 5387 for (pass = 0; pass < 2; ++pass)
c72f2fb2 5388 for (ibfd = info->input_bfds; ibfd != NULL; ibfd = ibfd->link.next)
b7fcf6f6
AM
5389 {
5390 Elf_Internal_Sym *locsyms = NULL;
0ffa91dd 5391 Elf_Internal_Shdr *symtab_hdr = &elf_symtab_hdr (ibfd);
32af9f6e 5392 asection *got2 = bfd_get_section_by_name (ibfd, ".got2");
7619e7c7 5393
b7fcf6f6
AM
5394 for (sec = ibfd->sections; sec != NULL; sec = sec->next)
5395 if (sec->has_tls_reloc && !bfd_is_abs_section (sec->output_section))
5396 {
5397 Elf_Internal_Rela *relstart, *rel, *relend;
663a1470 5398 int expecting_tls_get_addr = 0;
252b5132 5399
b7fcf6f6
AM
5400 /* Read the relocations. */
5401 relstart = _bfd_elf_link_read_relocs (ibfd, sec, NULL, NULL,
5402 info->keep_memory);
5403 if (relstart == NULL)
5404 return FALSE;
7619e7c7 5405
b7fcf6f6
AM
5406 relend = relstart + sec->reloc_count;
5407 for (rel = relstart; rel < relend; rel++)
5408 {
5409 enum elf_ppc_reloc_type r_type;
5410 unsigned long r_symndx;
5411 struct elf_link_hash_entry *h = NULL;
5412 char *tls_mask;
5413 char tls_set, tls_clear;
5414 bfd_boolean is_local;
b7fcf6f6
AM
5415 bfd_signed_vma *got_count;
5416
5417 r_symndx = ELF32_R_SYM (rel->r_info);
5418 if (r_symndx >= symtab_hdr->sh_info)
5419 {
5420 struct elf_link_hash_entry **sym_hashes;
7fce784e 5421
b7fcf6f6
AM
5422 sym_hashes = elf_sym_hashes (ibfd);
5423 h = sym_hashes[r_symndx - symtab_hdr->sh_info];
5424 while (h->root.type == bfd_link_hash_indirect
5425 || h->root.type == bfd_link_hash_warning)
5426 h = (struct elf_link_hash_entry *) h->root.u.i.link;
5427 }
7619e7c7 5428
b7fcf6f6
AM
5429 is_local = FALSE;
5430 if (h == NULL
5431 || !h->def_dynamic)
5432 is_local = TRUE;
7619e7c7 5433
b7fcf6f6 5434 r_type = ELF32_R_TYPE (rel->r_info);
663a1470
AM
5435 /* If this section has old-style __tls_get_addr calls
5436 without marker relocs, then check that each
5437 __tls_get_addr call reloc is preceded by a reloc
5438 that conceivably belongs to the __tls_get_addr arg
5439 setup insn. If we don't find matching arg setup
5440 relocs, don't do any tls optimization. */
5441 if (pass == 0
5442 && sec->has_tls_get_addr_call
5443 && h != NULL
5444 && h == htab->tls_get_addr
5445 && !expecting_tls_get_addr
5446 && is_branch_reloc (r_type))
5447 {
25f53a85 5448 info->callbacks->minfo ("%H __tls_get_addr lost arg, "
663a1470
AM
5449 "TLS optimization disabled\n",
5450 ibfd, sec, rel->r_offset);
5451 if (elf_section_data (sec)->relocs != relstart)
5452 free (relstart);
5453 return TRUE;
5454 }
5455
5456 expecting_tls_get_addr = 0;
b7fcf6f6
AM
5457 switch (r_type)
5458 {
5459 case R_PPC_GOT_TLSLD16:
5460 case R_PPC_GOT_TLSLD16_LO:
5461 expecting_tls_get_addr = 1;
1a0670f3 5462 /* Fall through. */
b7fcf6f6
AM
5463
5464 case R_PPC_GOT_TLSLD16_HI:
5465 case R_PPC_GOT_TLSLD16_HA:
5466 /* These relocs should never be against a symbol
5467 defined in a shared lib. Leave them alone if
5468 that turns out to be the case. */
5469 if (!is_local)
5470 continue;
5471
5472 /* LD -> LE */
5473 tls_set = 0;
5474 tls_clear = TLS_LD;
5475 break;
5476
5477 case R_PPC_GOT_TLSGD16:
5478 case R_PPC_GOT_TLSGD16_LO:
5479 expecting_tls_get_addr = 1;
1a0670f3 5480 /* Fall through. */
b7fcf6f6
AM
5481
5482 case R_PPC_GOT_TLSGD16_HI:
5483 case R_PPC_GOT_TLSGD16_HA:
5484 if (is_local)
5485 /* GD -> LE */
5486 tls_set = 0;
5487 else
5488 /* GD -> IE */
5489 tls_set = TLS_TLS | TLS_TPRELGD;
5490 tls_clear = TLS_GD;
5491 break;
5492
5493 case R_PPC_GOT_TPREL16:
5494 case R_PPC_GOT_TPREL16_LO:
5495 case R_PPC_GOT_TPREL16_HI:
5496 case R_PPC_GOT_TPREL16_HA:
5497 if (is_local)
5498 {
5499 /* IE -> LE */
5500 tls_set = 0;
5501 tls_clear = TLS_TPREL;
5502 break;
5503 }
5504 else
5505 continue;
5506
32af9f6e
AM
5507 case R_PPC_TLSGD:
5508 case R_PPC_TLSLD:
5509 expecting_tls_get_addr = 2;
5510 tls_set = 0;
5511 tls_clear = 0;
5512 break;
5513
b7fcf6f6 5514 default:
25dbc73a 5515 continue;
b7fcf6f6 5516 }
25dbc73a 5517
b7fcf6f6
AM
5518 if (pass == 0)
5519 {
727fc41e 5520 if (!expecting_tls_get_addr
32af9f6e
AM
5521 || (expecting_tls_get_addr == 1
5522 && !sec->has_tls_get_addr_call))
b7fcf6f6 5523 continue;
25dbc73a 5524
3a71aa26
AM
5525 if (rel + 1 < relend
5526 && branch_reloc_hash_match (ibfd, rel + 1,
5527 htab->tls_get_addr))
5528 continue;
25dbc73a 5529
b7fcf6f6
AM
5530 /* Uh oh, we didn't find the expected call. We
5531 could just mark this symbol to exclude it
5532 from tls optimization but it's safer to skip
663a1470 5533 the entire optimization. */
25f53a85 5534 info->callbacks->minfo (_("%H arg lost __tls_get_addr, "
663a1470
AM
5535 "TLS optimization disabled\n"),
5536 ibfd, sec, rel->r_offset);
5537 if (elf_section_data (sec)->relocs != relstart)
5538 free (relstart);
5539 return TRUE;
b7fcf6f6 5540 }
25dbc73a 5541
32af9f6e
AM
5542 if (expecting_tls_get_addr)
5543 {
5544 struct plt_entry *ent;
5545 bfd_vma addend = 0;
5546
0e1862bb 5547 if (bfd_link_pic (info)
32af9f6e
AM
5548 && ELF32_R_TYPE (rel[1].r_info) == R_PPC_PLTREL24)
5549 addend = rel[1].r_addend;
5550 ent = find_plt_ent (&htab->tls_get_addr->plt.plist,
5551 got2, addend);
5552 if (ent != NULL && ent->plt.refcount > 0)
5553 ent->plt.refcount -= 1;
5554
5555 if (expecting_tls_get_addr == 2)
5556 continue;
5557 }
5558
b7fcf6f6
AM
5559 if (h != NULL)
5560 {
5561 tls_mask = &ppc_elf_hash_entry (h)->tls_mask;
5562 got_count = &h->got.refcount;
5563 }
5564 else
5565 {
b7fcf6f6 5566 bfd_signed_vma *lgot_refs;
e054468f 5567 struct plt_entry **local_plt;
b7fcf6f6 5568 char *lgot_masks;
25dbc73a 5569
b7fcf6f6
AM
5570 if (locsyms == NULL)
5571 {
5572 locsyms = (Elf_Internal_Sym *) symtab_hdr->contents;
5573 if (locsyms == NULL)
5574 locsyms = bfd_elf_get_elf_syms (ibfd, symtab_hdr,
5575 symtab_hdr->sh_info,
5576 0, NULL, NULL, NULL);
5577 if (locsyms == NULL)
5578 {
5579 if (elf_section_data (sec)->relocs != relstart)
5580 free (relstart);
5581 return FALSE;
5582 }
5583 }
b7fcf6f6
AM
5584 lgot_refs = elf_local_got_refcounts (ibfd);
5585 if (lgot_refs == NULL)
5586 abort ();
e054468f
AM
5587 local_plt = (struct plt_entry **)
5588 (lgot_refs + symtab_hdr->sh_info);
5589 lgot_masks = (char *) (local_plt + symtab_hdr->sh_info);
b7fcf6f6
AM
5590 tls_mask = &lgot_masks[r_symndx];
5591 got_count = &lgot_refs[r_symndx];
5592 }
25dbc73a 5593
b7fcf6f6
AM
5594 if (tls_set == 0)
5595 {
5596 /* We managed to get rid of a got entry. */
5597 if (*got_count > 0)
5598 *got_count -= 1;
5599 }
25dbc73a 5600
b7fcf6f6
AM
5601 *tls_mask |= tls_set;
5602 *tls_mask &= ~tls_clear;
5603 }
25dbc73a 5604
b7fcf6f6
AM
5605 if (elf_section_data (sec)->relocs != relstart)
5606 free (relstart);
5607 }
5608
5609 if (locsyms != NULL
5610 && (symtab_hdr->contents != (unsigned char *) locsyms))
5611 {
5612 if (!info->keep_memory)
5613 free (locsyms);
5614 else
5615 symtab_hdr->contents = (unsigned char *) locsyms;
5616 }
5617 }
25dbc73a
AM
5618 return TRUE;
5619}
5620\f
625af618
AM
5621/* Return true if we have dynamic relocs that apply to read-only sections. */
5622
5623static bfd_boolean
5624readonly_dynrelocs (struct elf_link_hash_entry *h)
5625{
6061a67d 5626 struct elf_dyn_relocs *p;
625af618
AM
5627
5628 for (p = ppc_elf_hash_entry (h)->dyn_relocs; p != NULL; p = p->next)
5629 {
5630 asection *s = p->sec->output_section;
5631
5632 if (s != NULL
5633 && ((s->flags & (SEC_READONLY | SEC_ALLOC))
5634 == (SEC_READONLY | SEC_ALLOC)))
5635 return TRUE;
5636 }
5637 return FALSE;
5638}
5639
25dbc73a
AM
5640/* Adjust a symbol defined by a dynamic object and referenced by a
5641 regular object. The current definition is in some section of the
5642 dynamic object, but we're not including those sections. We have to
5643 change the definition to something the rest of the link can
5644 understand. */
7fce784e 5645
25dbc73a
AM
5646static bfd_boolean
5647ppc_elf_adjust_dynamic_symbol (struct bfd_link_info *info,
5648 struct elf_link_hash_entry *h)
5649{
5650 struct ppc_elf_link_hash_table *htab;
5651 asection *s;
7fce784e 5652
25dbc73a
AM
5653#ifdef DEBUG
5654 fprintf (stderr, "ppc_elf_adjust_dynamic_symbol called for %s\n",
5655 h->root.root.string);
5656#endif
252b5132 5657
25dbc73a
AM
5658 /* Make sure we know what is going on here. */
5659 htab = ppc_elf_hash_table (info);
5660 BFD_ASSERT (htab->elf.dynobj != NULL
5661 && (h->needs_plt
91e21fb7 5662 || h->type == STT_GNU_IFUNC
25dbc73a
AM
5663 || h->u.weakdef != NULL
5664 || (h->def_dynamic
5665 && h->ref_regular
5666 && !h->def_regular)));
252b5132 5667
25dbc73a
AM
5668 /* Deal with function syms. */
5669 if (h->type == STT_FUNC
e054468f 5670 || h->type == STT_GNU_IFUNC
25dbc73a
AM
5671 || h->needs_plt)
5672 {
5673 /* Clear procedure linkage table information for any symbol that
5674 won't need a .plt entry. */
a6aa5195
AM
5675 struct plt_entry *ent;
5676 for (ent = h->plt.plist; ent != NULL; ent = ent->next)
5677 if (ent->plt.refcount > 0)
5678 break;
5679 if (ent == NULL
e054468f
AM
5680 || (h->type != STT_GNU_IFUNC
5681 && (SYMBOL_CALLS_LOCAL (info, h)
5682 || (ELF_ST_VISIBILITY (h->other) != STV_DEFAULT
5683 && h->root.type == bfd_link_hash_undefweak))))
252b5132 5684 {
25dbc73a 5685 /* A PLT entry is not required/allowed when:
252b5132 5686
25dbc73a
AM
5687 1. We are not using ld.so; because then the PLT entry
5688 can't be set up, so we can't use one. In this case,
5689 ppc_elf_adjust_dynamic_symbol won't even be called.
252b5132 5690
25dbc73a
AM
5691 2. GC has rendered the entry unused.
5692
5693 3. We know for certain that a call to this symbol
5694 will go to this object, or will remain undefined. */
a6aa5195 5695 h->plt.plist = NULL;
25dbc73a 5696 h->needs_plt = 0;
d1eca1e4 5697 h->pointer_equality_needed = 0;
25dbc73a 5698 }
625af618
AM
5699 else
5700 {
d1eca1e4
AM
5701 /* Taking a function's address in a read/write section
5702 doesn't require us to define the function symbol in the
1009ef28 5703 executable on a plt call stub. A dynamic reloc can
f0158f44
AM
5704 be used instead, giving better runtime performance.
5705 (Calls via that function pointer don't need to bounce
5706 through the plt call stub.) Similarly, use a dynamic
5707 reloc for a weak reference when possible, allowing the
5708 resolution of the symbol to be set at load time rather
5709 than link time. */
5710 if ((h->pointer_equality_needed
5711 || (!h->ref_regular_nonweak && h->non_got_ref))
1009ef28
AM
5712 && !htab->is_vxworks
5713 && !ppc_elf_hash_entry (h)->has_sda_refs
d1eca1e4
AM
5714 && !readonly_dynrelocs (h))
5715 {
5716 h->pointer_equality_needed = 0;
f0158f44
AM
5717 /* After adjust_dynamic_symbol, non_got_ref set in the
5718 non-pic case means that dyn_relocs for this symbol
5719 should be discarded. */
d1eca1e4
AM
5720 h->non_got_ref = 0;
5721 }
625af618 5722 }
d3e454b9 5723 h->protected_def = 0;
25dbc73a 5724 return TRUE;
252b5132 5725 }
25dbc73a 5726 else
a6aa5195 5727 h->plt.plist = NULL;
252b5132 5728
25dbc73a
AM
5729 /* If this is a weak symbol, and there is a real definition, the
5730 processor independent code will have arranged for us to see the
5731 real definition first, and we can just use the same value. */
5732 if (h->u.weakdef != NULL)
252b5132 5733 {
25dbc73a
AM
5734 BFD_ASSERT (h->u.weakdef->root.type == bfd_link_hash_defined
5735 || h->u.weakdef->root.type == bfd_link_hash_defweak);
5736 h->root.u.def.section = h->u.weakdef->root.u.def.section;
5737 h->root.u.def.value = h->u.weakdef->root.u.def.value;
5738 if (ELIMINATE_COPY_RELOCS)
5739 h->non_got_ref = h->u.weakdef->non_got_ref;
5740 return TRUE;
5741 }
dc810e39 5742
25dbc73a
AM
5743 /* This is a reference to a symbol defined by a dynamic object which
5744 is not a function. */
252b5132 5745
25dbc73a
AM
5746 /* If we are creating a shared library, we must presume that the
5747 only references to the symbol are via the global offset table.
5748 For such cases we need not do anything here; the relocations will
5749 be handled correctly by relocate_section. */
0e1862bb 5750 if (bfd_link_pic (info))
d3e454b9
AM
5751 {
5752 h->protected_def = 0;
5753 return TRUE;
5754 }
252b5132 5755
25dbc73a
AM
5756 /* If there are no references to this symbol that do not use the
5757 GOT, we don't need to generate a copy reloc. */
5758 if (!h->non_got_ref)
d3e454b9
AM
5759 {
5760 h->protected_def = 0;
5761 return TRUE;
5762 }
5763
5764 /* Protected variables do not work with .dynbss. The copy in
5765 .dynbss won't be used by the shared library with the protected
5766 definition for the variable. Editing to PIC, or text relocations
5767 are preferable to an incorrect program. */
5768 if (h->protected_def)
5769 {
5770 if (ELIMINATE_COPY_RELOCS
5771 && ppc_elf_hash_entry (h)->has_addr16_ha
5772 && ppc_elf_hash_entry (h)->has_addr16_lo
5773 && htab->params->pic_fixup == 0
5774 && info->disable_target_specific_optimizations <= 1)
5775 htab->params->pic_fixup = 1;
5776 h->non_got_ref = 0;
5777 return TRUE;
5778 }
25dbc73a 5779
a127494f
AM
5780 /* If -z nocopyreloc was given, we won't generate them either. */
5781 if (info->nocopyreloc)
5782 {
5783 h->non_got_ref = 0;
5784 return TRUE;
5785 }
5786
cfd2c773
NS
5787 /* If we didn't find any dynamic relocs in read-only sections, then
5788 we'll be keeping the dynamic relocs and avoiding the copy reloc.
5789 We can't do this if there are any small data relocations. This
5790 doesn't work on VxWorks, where we can not have dynamic
5791 relocations (other than copy and jump slot relocations) in an
5792 executable. */
4dc4a9a5 5793 if (ELIMINATE_COPY_RELOCS
cfd2c773 5794 && !ppc_elf_hash_entry (h)->has_sda_refs
625af618
AM
5795 && !htab->is_vxworks
5796 && !h->def_regular
5797 && !readonly_dynrelocs (h))
25dbc73a 5798 {
625af618
AM
5799 h->non_got_ref = 0;
5800 return TRUE;
252b5132
RH
5801 }
5802
25dbc73a
AM
5803 /* We must allocate the symbol in our .dynbss section, which will
5804 become part of the .bss section of the executable. There will be
5805 an entry for this symbol in the .dynsym section. The dynamic
5806 object will contain position independent code, so all references
5807 from the dynamic object to this symbol will go through the global
5808 offset table. The dynamic linker will use the .dynsym entry to
5809 determine the address it must put in the global offset table, so
5810 both the dynamic object and the regular object will refer to the
5811 same memory location for the variable.
5812
4dc4a9a5
DJ
5813 Of course, if the symbol is referenced using SDAREL relocs, we
5814 must instead allocate it in .sbss. */
25dbc73a 5815
4dc4a9a5 5816 if (ppc_elf_hash_entry (h)->has_sda_refs)
25dbc73a 5817 s = htab->dynsbss;
5474d94f
AM
5818 else if ((h->root.u.def.section->flags & SEC_READONLY) != 0)
5819 s = htab->elf.sdynrelro;
25dbc73a 5820 else
9d19e4fd 5821 s = htab->elf.sdynbss;
25dbc73a
AM
5822 BFD_ASSERT (s != NULL);
5823
5824 /* We must generate a R_PPC_COPY reloc to tell the dynamic linker to
5825 copy the initial value out of the dynamic object and into the
5826 runtime process image. We need to remember the offset into the
5827 .rela.bss section we are going to use. */
1d7e9d18 5828 if ((h->root.u.def.section->flags & SEC_ALLOC) != 0 && h->size != 0)
25dbc73a
AM
5829 {
5830 asection *srel;
5831
4dc4a9a5 5832 if (ppc_elf_hash_entry (h)->has_sda_refs)
25dbc73a 5833 srel = htab->relsbss;
5474d94f
AM
5834 else if ((h->root.u.def.section->flags & SEC_READONLY) != 0)
5835 srel = htab->elf.sreldynrelro;
25dbc73a 5836 else
9d19e4fd 5837 srel = htab->elf.srelbss;
25dbc73a
AM
5838 BFD_ASSERT (srel != NULL);
5839 srel->size += sizeof (Elf32_External_Rela);
5840 h->needs_copy = 1;
5841 }
7619e7c7 5842
6cabe1ea 5843 return _bfd_elf_adjust_dynamic_copy (info, h, s);
25dbc73a
AM
5844}
5845\f
ac39eb42
AM
5846/* Generate a symbol to mark plt call stubs. For non-PIC code the sym is
5847 xxxxxxxx.plt_call32.<callee> where xxxxxxxx is a hex number, usually 0,
5848 specifying the addend on the plt relocation. For -fpic code, the sym
5849 is xxxxxxxx.plt_pic32.<callee>, and for -fPIC
5850 xxxxxxxx.got2.plt_pic32.<callee>. */
0ba07910
AM
5851
5852static bfd_boolean
5853add_stub_sym (struct plt_entry *ent,
5854 struct elf_link_hash_entry *h,
ac39eb42 5855 struct bfd_link_info *info)
0ba07910
AM
5856{
5857 struct elf_link_hash_entry *sh;
5858 size_t len1, len2, len3;
5859 char *name;
ac39eb42
AM
5860 const char *stub;
5861 struct ppc_elf_link_hash_table *htab = ppc_elf_hash_table (info);
5862
0e1862bb 5863 if (bfd_link_pic (info))
ac39eb42
AM
5864 stub = ".plt_pic32.";
5865 else
5866 stub = ".plt_call32.";
0ba07910
AM
5867
5868 len1 = strlen (h->root.root.string);
ac39eb42 5869 len2 = strlen (stub);
0ba07910
AM
5870 len3 = 0;
5871 if (ent->sec)
5872 len3 = strlen (ent->sec->name);
ac39eb42 5873 name = bfd_malloc (len1 + len2 + len3 + 9);
0ba07910
AM
5874 if (name == NULL)
5875 return FALSE;
5876 sprintf (name, "%08x", (unsigned) ent->addend & 0xffffffff);
5877 if (ent->sec)
5878 memcpy (name + 8, ent->sec->name, len3);
ac39eb42
AM
5879 memcpy (name + 8 + len3, stub, len2);
5880 memcpy (name + 8 + len3 + len2, h->root.root.string, len1 + 1);
0ba07910
AM
5881 sh = elf_link_hash_lookup (&htab->elf, name, TRUE, FALSE, FALSE);
5882 if (sh == NULL)
5883 return FALSE;
5884 if (sh->root.type == bfd_link_hash_new)
5885 {
5886 sh->root.type = bfd_link_hash_defined;
5887 sh->root.u.def.section = htab->glink;
5888 sh->root.u.def.value = ent->glink_offset;
5889 sh->ref_regular = 1;
5890 sh->def_regular = 1;
5891 sh->ref_regular_nonweak = 1;
5892 sh->forced_local = 1;
5893 sh->non_elf = 0;
2ec55de3 5894 sh->root.linker_def = 1;
0ba07910
AM
5895 }
5896 return TRUE;
5897}
5898
3b36f7e6
AM
5899/* Allocate NEED contiguous space in .got, and return the offset.
5900 Handles allocation of the got header when crossing 32k. */
5901
5902static bfd_vma
5903allocate_got (struct ppc_elf_link_hash_table *htab, unsigned int need)
5904{
5905 bfd_vma where;
4a3dc543 5906 unsigned int max_before_header;
3b36f7e6 5907
4a3dc543 5908 if (htab->plt_type == PLT_VXWORKS)
9d8504b1 5909 {
ce558b89
AM
5910 where = htab->elf.sgot->size;
5911 htab->elf.sgot->size += need;
9d8504b1 5912 }
3b36f7e6
AM
5913 else
5914 {
4a3dc543
RS
5915 max_before_header = htab->plt_type == PLT_NEW ? 32768 : 32764;
5916 if (need <= htab->got_gap)
3b36f7e6 5917 {
4a3dc543
RS
5918 where = max_before_header - htab->got_gap;
5919 htab->got_gap -= need;
5920 }
5921 else
5922 {
ce558b89
AM
5923 if (htab->elf.sgot->size + need > max_before_header
5924 && htab->elf.sgot->size <= max_before_header)
4a3dc543 5925 {
ce558b89
AM
5926 htab->got_gap = max_before_header - htab->elf.sgot->size;
5927 htab->elf.sgot->size = max_before_header + htab->got_header_size;
4a3dc543 5928 }
ce558b89
AM
5929 where = htab->elf.sgot->size;
5930 htab->elf.sgot->size += need;
3b36f7e6 5931 }
3b36f7e6
AM
5932 }
5933 return where;
5934}
5935
f0158f44
AM
5936/* If H is undefined weak, make it dynamic if that makes sense. */
5937
5938static bfd_boolean
5939ensure_undefweak_dynamic (struct bfd_link_info *info,
5940 struct elf_link_hash_entry *h)
5941{
5942 struct elf_link_hash_table *htab = elf_hash_table (info);
5943
5944 if (htab->dynamic_sections_created
5945 && h->root.type == bfd_link_hash_undefweak
5946 && h->dynindx == -1
5947 && !h->forced_local
5948 && ELF_ST_VISIBILITY (h->other) == STV_DEFAULT)
5949 return bfd_elf_link_record_dynamic_symbol (info, h);
5950 return TRUE;
5951}
5952
25dbc73a 5953/* Allocate space in associated reloc sections for dynamic relocs. */
252b5132 5954
b34976b6 5955static bfd_boolean
25dbc73a 5956allocate_dynrelocs (struct elf_link_hash_entry *h, void *inf)
252b5132 5957{
25dbc73a
AM
5958 struct bfd_link_info *info = inf;
5959 struct ppc_elf_link_hash_entry *eh;
7619e7c7 5960 struct ppc_elf_link_hash_table *htab;
6061a67d 5961 struct elf_dyn_relocs *p;
f0158f44 5962 bfd_boolean dyn;
252b5132 5963
25dbc73a 5964 if (h->root.type == bfd_link_hash_indirect)
b34976b6 5965 return TRUE;
252b5132 5966
7619e7c7 5967 htab = ppc_elf_hash_table (info);
25dbc73a 5968 eh = (struct ppc_elf_link_hash_entry *) h;
d3e454b9
AM
5969 if (eh->elf.got.refcount > 0
5970 || (ELIMINATE_COPY_RELOCS
5971 && !eh->elf.def_regular
5972 && eh->elf.protected_def
5973 && eh->has_addr16_ha
5974 && eh->has_addr16_lo
5975 && htab->params->pic_fixup > 0))
25dbc73a 5976 {
d6e14abc
AM
5977 unsigned int need;
5978
f0158f44
AM
5979 /* Make sure this symbol is output as a dynamic symbol.
5980 Undefined weak syms won't yet be marked as dynamic. */
5981 if (!ensure_undefweak_dynamic (info, &eh->elf))
5982 return FALSE;
252b5132 5983
d6e14abc
AM
5984 need = 0;
5985 if ((eh->tls_mask & TLS_TLS) != 0)
25dbc73a 5986 {
d6e14abc 5987 if ((eh->tls_mask & TLS_LD) != 0)
252b5132 5988 {
d6e14abc
AM
5989 if (!eh->elf.def_dynamic)
5990 /* We'll just use htab->tlsld_got.offset. This should
5991 always be the case. It's a little odd if we have
5992 a local dynamic reloc against a non-local symbol. */
5993 htab->tlsld_got.refcount += 1;
5994 else
3b36f7e6 5995 need += 8;
252b5132 5996 }
d6e14abc
AM
5997 if ((eh->tls_mask & TLS_GD) != 0)
5998 need += 8;
5999 if ((eh->tls_mask & (TLS_TPREL | TLS_TPRELGD)) != 0)
6000 need += 4;
6001 if ((eh->tls_mask & TLS_DTPREL) != 0)
3b36f7e6 6002 need += 4;
d6e14abc
AM
6003 }
6004 else
6005 need += 4;
6006 if (need == 0)
6007 eh->elf.got.offset = (bfd_vma) -1;
6008 else
6009 {
3b36f7e6 6010 eh->elf.got.offset = allocate_got (htab, need);
0e1862bb 6011 if ((bfd_link_pic (info)
f0158f44
AM
6012 || (htab->elf.dynamic_sections_created
6013 && eh->elf.dynindx != -1
6014 && !SYMBOL_REFERENCES_LOCAL (info, &eh->elf)))
25dbc73a
AM
6015 && (ELF_ST_VISIBILITY (eh->elf.other) == STV_DEFAULT
6016 || eh->elf.root.type != bfd_link_hash_undefweak))
252b5132 6017 {
ce558b89 6018 asection *rsec = htab->elf.srelgot;
0bed072f
AM
6019
6020 if (eh->elf.type == STT_GNU_IFUNC)
ce558b89 6021 rsec = htab->elf.irelplt;
3b36f7e6
AM
6022 /* All the entries we allocated need relocs.
6023 Except LD only needs one. */
d6e14abc
AM
6024 if ((eh->tls_mask & TLS_LD) != 0
6025 && eh->elf.def_dynamic)
3b36f7e6 6026 need -= 4;
25f23106 6027 rsec->size += need * (sizeof (Elf32_External_Rela) / 4);
252b5132 6028 }
25dbc73a
AM
6029 }
6030 }
6031 else
6032 eh->elf.got.offset = (bfd_vma) -1;
252b5132 6033
f0158f44
AM
6034 if (!htab->elf.dynamic_sections_created
6035 && h->type != STT_GNU_IFUNC)
6036 eh->dyn_relocs = NULL;
6037
6038 if (eh->dyn_relocs == NULL)
6039 ;
252b5132 6040
25dbc73a
AM
6041 /* In the shared -Bsymbolic case, discard space allocated for
6042 dynamic pc-relative relocs against symbols which turn out to be
6043 defined in regular objects. For the normal shared case, discard
6044 space for relocs that have become local due to symbol visibility
6045 changes. */
f0158f44 6046 else if (bfd_link_pic (info))
25dbc73a
AM
6047 {
6048 /* Relocs that use pc_count are those that appear on a call insn,
1d483afe 6049 or certain REL relocs (see must_be_dyn_reloc) that can be
25dbc73a
AM
6050 generated via assembly. We want calls to protected symbols to
6051 resolve directly to the function rather than going via the plt.
6052 If people want function pointer comparisons to work as expected
6053 then they should avoid writing weird assembly. */
6054 if (SYMBOL_CALLS_LOCAL (info, h))
6055 {
6061a67d 6056 struct elf_dyn_relocs **pp;
25dbc73a
AM
6057
6058 for (pp = &eh->dyn_relocs; (p = *pp) != NULL; )
252b5132 6059 {
25dbc73a
AM
6060 p->count -= p->pc_count;
6061 p->pc_count = 0;
6062 if (p->count == 0)
6063 *pp = p->next;
6064 else
6065 pp = &p->next;
252b5132 6066 }
25dbc73a 6067 }
252b5132 6068
3348747a
NS
6069 if (htab->is_vxworks)
6070 {
6061a67d 6071 struct elf_dyn_relocs **pp;
3348747a
NS
6072
6073 for (pp = &eh->dyn_relocs; (p = *pp) != NULL; )
6074 {
6075 if (strcmp (p->sec->output_section->name, ".tls_vars") == 0)
6076 *pp = p->next;
6077 else
6078 pp = &p->next;
6079 }
6080 }
6081
89200bf8
AM
6082 /* Discard relocs on undefined symbols that must be local. */
6083 if (eh->dyn_relocs != NULL
6084 && h->root.type == bfd_link_hash_undefined
6085 && (ELF_ST_VISIBILITY (h->other) == STV_HIDDEN
6086 || ELF_ST_VISIBILITY (h->other) == STV_INTERNAL))
6087 eh->dyn_relocs = NULL;
6088
25dbc73a
AM
6089 /* Also discard relocs on undefined weak syms with non-default
6090 visibility. */
cab87ef9
AM
6091 if (eh->dyn_relocs != NULL
6092 && h->root.type == bfd_link_hash_undefweak)
25dbc73a 6093 {
dfbb6ac9
AM
6094 if (ELF_ST_VISIBILITY (h->other) != STV_DEFAULT)
6095 eh->dyn_relocs = NULL;
6096
6097 /* Make sure undefined weak symbols are output as a dynamic
6098 symbol in PIEs. */
f0158f44
AM
6099 else if (!ensure_undefweak_dynamic (info, h))
6100 return FALSE;
25dbc73a
AM
6101 }
6102 }
6103 else if (ELIMINATE_COPY_RELOCS)
6104 {
f0158f44 6105 /* For the non-pic case, discard space for relocs against
25dbc73a
AM
6106 symbols which turn out to need copy relocs or are not
6107 dynamic. */
25dbc73a 6108 if (!h->non_got_ref
d3e454b9
AM
6109 && !h->def_regular
6110 && !(h->protected_def
6111 && eh->has_addr16_ha
6112 && eh->has_addr16_lo
6113 && htab->params->pic_fixup > 0))
25dbc73a
AM
6114 {
6115 /* Make sure this symbol is output as a dynamic symbol.
6116 Undefined weak syms won't yet be marked as dynamic. */
f0158f44
AM
6117 if (!ensure_undefweak_dynamic (info, h))
6118 return FALSE;
7619e7c7 6119
f0158f44
AM
6120 if (h->dynindx == -1)
6121 eh->dyn_relocs = NULL;
25dbc73a 6122 }
f0158f44
AM
6123 else
6124 eh->dyn_relocs = NULL;
25dbc73a 6125 }
252b5132 6126
f0158f44 6127 /* Allocate space. */
25dbc73a
AM
6128 for (p = eh->dyn_relocs; p != NULL; p = p->next)
6129 {
6130 asection *sreloc = elf_section_data (p->sec)->sreloc;
f95f8542 6131 if (eh->elf.type == STT_GNU_IFUNC)
ce558b89 6132 sreloc = htab->elf.irelplt;
25dbc73a
AM
6133 sreloc->size += p->count * sizeof (Elf32_External_Rela);
6134 }
252b5132 6135
f0158f44
AM
6136 /* Handle PLT relocs. Done last, after dynindx has settled. */
6137 dyn = htab->elf.dynamic_sections_created && h->dynindx != -1;
6138 if (dyn || h->type == STT_GNU_IFUNC)
6139 {
6140 struct plt_entry *ent;
6141 bfd_boolean doneone = FALSE;
6142 bfd_vma plt_offset = 0, glink_offset = 0;
6143
6144 for (ent = h->plt.plist; ent != NULL; ent = ent->next)
6145 if (ent->plt.refcount > 0)
6146 {
6147 asection *s = htab->elf.splt;
6148
6149 if (!dyn)
6150 s = htab->elf.iplt;
6151
6152 if (htab->plt_type == PLT_NEW || !dyn)
6153 {
6154 if (!doneone)
6155 {
6156 plt_offset = s->size;
6157 s->size += 4;
6158 }
6159 ent->plt.offset = plt_offset;
6160
6161 s = htab->glink;
6162 if (!doneone || bfd_link_pic (info))
6163 {
6164 glink_offset = s->size;
6165 s->size += GLINK_ENTRY_SIZE;
6166 if (h == htab->tls_get_addr
6167 && !htab->params->no_tls_get_addr_opt)
6168 s->size += TLS_GET_ADDR_GLINK_SIZE - GLINK_ENTRY_SIZE;
6169 }
6170 if (!doneone
6171 && !bfd_link_pic (info)
6172 && h->def_dynamic
6173 && !h->def_regular)
6174 {
6175 h->root.u.def.section = s;
6176 h->root.u.def.value = glink_offset;
6177 }
6178 ent->glink_offset = glink_offset;
6179
6180 if (htab->params->emit_stub_syms
6181 && !add_stub_sym (ent, h, info))
6182 return FALSE;
6183 }
6184 else
6185 {
6186 if (!doneone)
6187 {
6188 /* If this is the first .plt entry, make room
6189 for the special first entry. */
6190 if (s->size == 0)
6191 s->size += htab->plt_initial_entry_size;
6192
6193 /* The PowerPC PLT is actually composed of two
6194 parts, the first part is 2 words (for a load
6195 and a jump), and then there is a remaining
6196 word available at the end. */
6197 plt_offset = (htab->plt_initial_entry_size
6198 + (htab->plt_slot_size
6199 * ((s->size
6200 - htab->plt_initial_entry_size)
6201 / htab->plt_entry_size)));
6202
6203 /* If this symbol is not defined in a regular
6204 file, and we are not generating a shared
6205 library, then set the symbol to this location
6206 in the .plt. This is to avoid text
6207 relocations, and is required to make
6208 function pointers compare as equal between
6209 the normal executable and the shared library. */
6210 if (! bfd_link_pic (info)
6211 && h->def_dynamic
6212 && !h->def_regular)
6213 {
6214 h->root.u.def.section = s;
6215 h->root.u.def.value = plt_offset;
6216 }
6217
6218 /* Make room for this entry. */
6219 s->size += htab->plt_entry_size;
6220 /* After the 8192nd entry, room for two entries
6221 is allocated. */
6222 if (htab->plt_type == PLT_OLD
6223 && (s->size - htab->plt_initial_entry_size)
6224 / htab->plt_entry_size
6225 > PLT_NUM_SINGLE_ENTRIES)
6226 s->size += htab->plt_entry_size;
6227 }
6228 ent->plt.offset = plt_offset;
6229 }
6230
6231 /* We also need to make an entry in the .rela.plt section. */
6232 if (!doneone)
6233 {
6234 if (!dyn)
6235 htab->elf.irelplt->size += sizeof (Elf32_External_Rela);
6236 else
6237 {
6238 htab->elf.srelplt->size += sizeof (Elf32_External_Rela);
6239
6240 if (htab->plt_type == PLT_VXWORKS)
6241 {
6242 /* Allocate space for the unloaded relocations. */
6243 if (!bfd_link_pic (info)
6244 && htab->elf.dynamic_sections_created)
6245 {
6246 if (ent->plt.offset
6247 == (bfd_vma) htab->plt_initial_entry_size)
6248 {
6249 htab->srelplt2->size
6250 += (sizeof (Elf32_External_Rela)
6251 * VXWORKS_PLTRESOLVE_RELOCS);
6252 }
6253
6254 htab->srelplt2->size
6255 += (sizeof (Elf32_External_Rela)
6256 * VXWORKS_PLT_NON_JMP_SLOT_RELOCS);
6257 }
6258
6259 /* Every PLT entry has an associated GOT entry in
6260 .got.plt. */
6261 htab->elf.sgotplt->size += 4;
6262 }
6263 }
6264 doneone = TRUE;
6265 }
6266 }
6267 else
6268 ent->plt.offset = (bfd_vma) -1;
6269
6270 if (!doneone)
6271 {
6272 h->plt.plist = NULL;
6273 h->needs_plt = 0;
6274 }
6275 }
6276 else
6277 {
6278 h->plt.plist = NULL;
6279 h->needs_plt = 0;
6280 }
6281
25dbc73a
AM
6282 return TRUE;
6283}
7619e7c7 6284
625af618
AM
6285/* Set DF_TEXTREL if we find any dynamic relocs that apply to
6286 read-only sections. */
7619e7c7 6287
25dbc73a 6288static bfd_boolean
625af618 6289maybe_set_textrel (struct elf_link_hash_entry *h, void *info)
25dbc73a 6290{
25dbc73a
AM
6291 if (h->root.type == bfd_link_hash_indirect)
6292 return TRUE;
252b5132 6293
625af618 6294 if (readonly_dynrelocs (h))
25dbc73a 6295 {
625af618 6296 ((struct bfd_link_info *) info)->flags |= DF_TEXTREL;
ee05f2fe 6297
625af618
AM
6298 /* Not an error, just cut short the traversal. */
6299 return FALSE;
25dbc73a
AM
6300 }
6301 return TRUE;
6302}
6303
6177242a
AM
6304static const unsigned char glink_eh_frame_cie[] =
6305{
6306 0, 0, 0, 16, /* length. */
6307 0, 0, 0, 0, /* id. */
6308 1, /* CIE version. */
6309 'z', 'R', 0, /* Augmentation string. */
6310 4, /* Code alignment. */
6311 0x7c, /* Data alignment. */
6312 65, /* RA reg. */
6313 1, /* Augmentation size. */
6314 DW_EH_PE_pcrel | DW_EH_PE_sdata4, /* FDE encoding. */
6315 DW_CFA_def_cfa, 1, 0 /* def_cfa: r1 offset 0. */
6316};
6317
25dbc73a
AM
6318/* Set the sizes of the dynamic sections. */
6319
6320static bfd_boolean
93d1b056 6321ppc_elf_size_dynamic_sections (bfd *output_bfd,
25dbc73a
AM
6322 struct bfd_link_info *info)
6323{
6324 struct ppc_elf_link_hash_table *htab;
6325 asection *s;
6326 bfd_boolean relocs;
6327 bfd *ibfd;
7fce784e 6328
252b5132 6329#ifdef DEBUG
25dbc73a 6330 fprintf (stderr, "ppc_elf_size_dynamic_sections called\n");
252b5132 6331#endif
252b5132 6332
25dbc73a
AM
6333 htab = ppc_elf_hash_table (info);
6334 BFD_ASSERT (htab->elf.dynobj != NULL);
252b5132 6335
25dbc73a
AM
6336 if (elf_hash_table (info)->dynamic_sections_created)
6337 {
6338 /* Set the contents of the .interp section to the interpreter. */
9b8b325a 6339 if (bfd_link_executable (info) && !info->nointerp)
25dbc73a 6340 {
3d4d4302 6341 s = bfd_get_linker_section (htab->elf.dynobj, ".interp");
25dbc73a
AM
6342 BFD_ASSERT (s != NULL);
6343 s->size = sizeof ELF_DYNAMIC_INTERPRETER;
6344 s->contents = (unsigned char *) ELF_DYNAMIC_INTERPRETER;
6345 }
6346 }
252b5132 6347
4a3dc543 6348 if (htab->plt_type == PLT_OLD)
d7128ce4 6349 htab->got_header_size = 16;
4a3dc543 6350 else if (htab->plt_type == PLT_NEW)
d7128ce4 6351 htab->got_header_size = 12;
252b5132 6352
25dbc73a
AM
6353 /* Set up .got offsets for local syms, and space for local dynamic
6354 relocs. */
c72f2fb2 6355 for (ibfd = info->input_bfds; ibfd != NULL; ibfd = ibfd->link.next)
25dbc73a
AM
6356 {
6357 bfd_signed_vma *local_got;
6358 bfd_signed_vma *end_local_got;
e054468f
AM
6359 struct plt_entry **local_plt;
6360 struct plt_entry **end_local_plt;
25dbc73a
AM
6361 char *lgot_masks;
6362 bfd_size_type locsymcount;
6363 Elf_Internal_Shdr *symtab_hdr;
7fce784e 6364
0c8d6e5c 6365 if (!is_ppc_elf (ibfd))
25dbc73a 6366 continue;
7fce784e 6367
25dbc73a
AM
6368 for (s = ibfd->sections; s != NULL; s = s->next)
6369 {
f95f8542 6370 struct ppc_dyn_relocs *p;
252b5132 6371
f95f8542 6372 for (p = ((struct ppc_dyn_relocs *)
25dbc73a
AM
6373 elf_section_data (s)->local_dynrel);
6374 p != NULL;
6375 p = p->next)
6376 {
6377 if (!bfd_is_abs_section (p->sec)
6378 && bfd_is_abs_section (p->sec->output_section))
6379 {
6380 /* Input section has been discarded, either because
6381 it is a copy of a linkonce section or due to
6382 linker script /DISCARD/, so we'll be discarding
6383 the relocs too. */
7fce784e 6384 }
3348747a
NS
6385 else if (htab->is_vxworks
6386 && strcmp (p->sec->output_section->name,
6387 ".tls_vars") == 0)
6388 {
6389 /* Relocations in vxworks .tls_vars sections are
6390 handled specially by the loader. */
6391 }
25dbc73a 6392 else if (p->count != 0)
7fce784e 6393 {
25f23106 6394 asection *sreloc = elf_section_data (p->sec)->sreloc;
f95f8542 6395 if (p->ifunc)
ce558b89 6396 sreloc = htab->elf.irelplt;
25f23106 6397 sreloc->size += p->count * sizeof (Elf32_External_Rela);
25dbc73a
AM
6398 if ((p->sec->output_section->flags
6399 & (SEC_READONLY | SEC_ALLOC))
6400 == (SEC_READONLY | SEC_ALLOC))
6401 info->flags |= DF_TEXTREL;
7fce784e 6402 }
252b5132 6403 }
252b5132 6404 }
252b5132 6405
25dbc73a
AM
6406 local_got = elf_local_got_refcounts (ibfd);
6407 if (!local_got)
6408 continue;
252b5132 6409
0ffa91dd 6410 symtab_hdr = &elf_symtab_hdr (ibfd);
25dbc73a
AM
6411 locsymcount = symtab_hdr->sh_info;
6412 end_local_got = local_got + locsymcount;
e054468f
AM
6413 local_plt = (struct plt_entry **) end_local_got;
6414 end_local_plt = local_plt + locsymcount;
6415 lgot_masks = (char *) end_local_plt;
91d6fa6a 6416
25dbc73a
AM
6417 for (; local_got < end_local_got; ++local_got, ++lgot_masks)
6418 if (*local_got > 0)
6419 {
d6e14abc
AM
6420 unsigned int need = 0;
6421 if ((*lgot_masks & TLS_TLS) != 0)
25dbc73a 6422 {
d6e14abc
AM
6423 if ((*lgot_masks & TLS_GD) != 0)
6424 need += 8;
6425 if ((*lgot_masks & TLS_LD) != 0)
6426 htab->tlsld_got.refcount += 1;
6427 if ((*lgot_masks & (TLS_TPREL | TLS_TPRELGD)) != 0)
6428 need += 4;
6429 if ((*lgot_masks & TLS_DTPREL) != 0)
6430 need += 4;
25dbc73a 6431 }
d6e14abc
AM
6432 else
6433 need += 4;
6434 if (need == 0)
6435 *local_got = (bfd_vma) -1;
25dbc73a
AM
6436 else
6437 {
3b36f7e6 6438 *local_got = allocate_got (htab, need);
0e1862bb 6439 if (bfd_link_pic (info))
0bed072f 6440 {
ce558b89 6441 asection *srel = htab->elf.srelgot;
0bed072f 6442 if ((*lgot_masks & PLT_IFUNC) != 0)
ce558b89 6443 srel = htab->elf.irelplt;
0bed072f
AM
6444 srel->size += need * (sizeof (Elf32_External_Rela) / 4);
6445 }
25dbc73a
AM
6446 }
6447 }
6448 else
6449 *local_got = (bfd_vma) -1;
e054468f
AM
6450
6451 if (htab->is_vxworks)
6452 continue;
6453
6454 /* Allocate space for calls to local STT_GNU_IFUNC syms in .iplt. */
6455 for (; local_plt < end_local_plt; ++local_plt)
6456 {
6457 struct plt_entry *ent;
6458 bfd_boolean doneone = FALSE;
6459 bfd_vma plt_offset = 0, glink_offset = 0;
6460
6461 for (ent = *local_plt; ent != NULL; ent = ent->next)
6462 if (ent->plt.refcount > 0)
6463 {
ce558b89 6464 s = htab->elf.iplt;
e054468f
AM
6465
6466 if (!doneone)
6467 {
6468 plt_offset = s->size;
6469 s->size += 4;
6470 }
6471 ent->plt.offset = plt_offset;
6472
6473 s = htab->glink;
0e1862bb 6474 if (!doneone || bfd_link_pic (info))
e054468f
AM
6475 {
6476 glink_offset = s->size;
6477 s->size += GLINK_ENTRY_SIZE;
6478 }
6479 ent->glink_offset = glink_offset;
6480
6481 if (!doneone)
6482 {
ce558b89 6483 htab->elf.irelplt->size += sizeof (Elf32_External_Rela);
e054468f
AM
6484 doneone = TRUE;
6485 }
6486 }
6487 else
6488 ent->plt.offset = (bfd_vma) -1;
6489 }
25dbc73a 6490 }
252b5132 6491
b7fcf6f6
AM
6492 /* Allocate space for global sym dynamic relocs. */
6493 elf_link_hash_traverse (elf_hash_table (info), allocate_dynrelocs, info);
6494
3b36f7e6
AM
6495 if (htab->tlsld_got.refcount > 0)
6496 {
6497 htab->tlsld_got.offset = allocate_got (htab, 8);
0e1862bb 6498 if (bfd_link_pic (info))
ce558b89 6499 htab->elf.srelgot->size += sizeof (Elf32_External_Rela);
3b36f7e6
AM
6500 }
6501 else
6502 htab->tlsld_got.offset = (bfd_vma) -1;
6503
ce558b89 6504 if (htab->elf.sgot != NULL && htab->plt_type != PLT_VXWORKS)
3b36f7e6
AM
6505 {
6506 unsigned int g_o_t = 32768;
6507
4d962050
AM
6508 /* If we haven't allocated the header, do so now. When we get here,
6509 for old plt/got the got size will be 0 to 32764 (not allocated),
6510 or 32780 to 65536 (header allocated). For new plt/got, the
6511 corresponding ranges are 0 to 32768 and 32780 to 65536. */
ce558b89 6512 if (htab->elf.sgot->size <= 32768)
3b36f7e6 6513 {
ce558b89 6514 g_o_t = htab->elf.sgot->size;
4a3dc543 6515 if (htab->plt_type == PLT_OLD)
4d962050 6516 g_o_t += 4;
ce558b89 6517 htab->elf.sgot->size += htab->got_header_size;
3b36f7e6 6518 }
3b36f7e6
AM
6519
6520 htab->elf.hgot->root.u.def.value = g_o_t;
6521 }
0e1862bb 6522 if (bfd_link_pic (info))
bd6c6e2b
AM
6523 {
6524 struct elf_link_hash_entry *sda = htab->sdata[0].sym;
93d1b056
AM
6525
6526 sda->root.u.def.section = htab->elf.hgot->root.u.def.section;
6527 sda->root.u.def.value = htab->elf.hgot->root.u.def.value;
bd6c6e2b 6528 }
15bfcc77
AM
6529 if (info->emitrelocations)
6530 {
6531 struct elf_link_hash_entry *sda = htab->sdata[0].sym;
6532
6533 if (sda != NULL && sda->ref_regular)
6534 sda->root.u.def.section->flags |= SEC_KEEP;
6535 sda = htab->sdata[1].sym;
6536 if (sda != NULL && sda->ref_regular)
6537 sda->root.u.def.section->flags |= SEC_KEEP;
6538 }
3b36f7e6 6539
e054468f
AM
6540 if (htab->glink != NULL
6541 && htab->glink->size != 0
6542 && htab->elf.dynamic_sections_created)
d7128ce4
AM
6543 {
6544 htab->glink_pltresolve = htab->glink->size;
888a7fc3
AM
6545 /* Space for the branch table. ??? We don't need entries for
6546 non-dynamic symbols in this table. This case can arise with
6547 static ifuncs or forced local ifuncs. */
86b9da88
AM
6548 htab->glink->size += htab->glink->size / (GLINK_ENTRY_SIZE / 4) - 4;
6549 /* Pad out to align the start of PLTresolve. */
5446cbdf
AM
6550 htab->glink->size += -htab->glink->size & (htab->params->ppc476_workaround
6551 ? 63 : 15);
d7128ce4 6552 htab->glink->size += GLINK_PLTRESOLVE;
0ba07910 6553
5446cbdf 6554 if (htab->params->emit_stub_syms)
0ba07910
AM
6555 {
6556 struct elf_link_hash_entry *sh;
6557 sh = elf_link_hash_lookup (&htab->elf, "__glink",
6558 TRUE, FALSE, FALSE);
6559 if (sh == NULL)
6560 return FALSE;
6561 if (sh->root.type == bfd_link_hash_new)
6562 {
6563 sh->root.type = bfd_link_hash_defined;
6564 sh->root.u.def.section = htab->glink;
6565 sh->root.u.def.value = htab->glink_pltresolve;
6566 sh->ref_regular = 1;
6567 sh->def_regular = 1;
6568 sh->ref_regular_nonweak = 1;
6569 sh->forced_local = 1;
6570 sh->non_elf = 0;
2ec55de3 6571 sh->root.linker_def = 1;
0ba07910
AM
6572 }
6573 sh = elf_link_hash_lookup (&htab->elf, "__glink_PLTresolve",
6574 TRUE, FALSE, FALSE);
6575 if (sh == NULL)
6576 return FALSE;
6577 if (sh->root.type == bfd_link_hash_new)
6578 {
6579 sh->root.type = bfd_link_hash_defined;
6580 sh->root.u.def.section = htab->glink;
6581 sh->root.u.def.value = htab->glink->size - GLINK_PLTRESOLVE;
6582 sh->ref_regular = 1;
6583 sh->def_regular = 1;
6584 sh->ref_regular_nonweak = 1;
6585 sh->forced_local = 1;
6586 sh->non_elf = 0;
2ec55de3 6587 sh->root.linker_def = 1;
0ba07910
AM
6588 }
6589 }
d7128ce4
AM
6590 }
6591
6177242a
AM
6592 if (htab->glink != NULL
6593 && htab->glink->size != 0
6594 && htab->glink_eh_frame != NULL
9a2a56cc
AM
6595 && !bfd_is_abs_section (htab->glink_eh_frame->output_section)
6596 && _bfd_elf_eh_frame_present (info))
6177242a
AM
6597 {
6598 s = htab->glink_eh_frame;
6599 s->size = sizeof (glink_eh_frame_cie) + 20;
0e1862bb 6600 if (bfd_link_pic (info))
6177242a
AM
6601 {
6602 s->size += 4;
6603 if (htab->glink->size - GLINK_PLTRESOLVE + 8 >= 256)
6604 s->size += 4;
6605 }
6606 }
6607
25dbc73a
AM
6608 /* We've now determined the sizes of the various dynamic sections.
6609 Allocate memory for them. */
6610 relocs = FALSE;
6611 for (s = htab->elf.dynobj->sections; s != NULL; s = s->next)
252b5132 6612 {
9d8504b1
PB
6613 bfd_boolean strip_section = TRUE;
6614
25dbc73a
AM
6615 if ((s->flags & SEC_LINKER_CREATED) == 0)
6616 continue;
252b5132 6617
ce558b89
AM
6618 if (s == htab->elf.splt
6619 || s == htab->elf.sgot)
25dbc73a 6620 {
9d8504b1
PB
6621 /* We'd like to strip these sections if they aren't needed, but if
6622 we've exported dynamic symbols from them we must leave them.
6623 It's too late to tell BFD to get rid of the symbols. */
e054468f 6624 if (htab->elf.hplt != NULL)
9d8504b1 6625 strip_section = FALSE;
25dbc73a
AM
6626 /* Strip this section if we don't need it; see the
6627 comment below. */
6628 }
ce558b89 6629 else if (s == htab->elf.iplt
e054468f 6630 || s == htab->glink
6177242a 6631 || s == htab->glink_eh_frame
ce558b89 6632 || s == htab->elf.sgotplt
e054468f 6633 || s == htab->sbss
9d19e4fd 6634 || s == htab->elf.sdynbss
5474d94f 6635 || s == htab->elf.sdynrelro
15bfcc77 6636 || s == htab->dynsbss)
25dbc73a 6637 {
c9a2f333 6638 /* Strip these too. */
25dbc73a 6639 }
15bfcc77
AM
6640 else if (s == htab->sdata[0].section
6641 || s == htab->sdata[1].section)
6642 {
6643 strip_section = (s->flags & SEC_KEEP) == 0;
6644 }
a0f49396
NC
6645 else if (CONST_STRNEQ (bfd_get_section_name (htab->elf.dynobj, s),
6646 ".rela"))
25dbc73a 6647 {
c456f082 6648 if (s->size != 0)
25dbc73a
AM
6649 {
6650 /* Remember whether there are any relocation sections. */
6651 relocs = TRUE;
252b5132 6652
25dbc73a
AM
6653 /* We use the reloc_count field as a counter if we need
6654 to copy relocs into the output file. */
6655 s->reloc_count = 0;
252b5132
RH
6656 }
6657 }
25dbc73a
AM
6658 else
6659 {
6660 /* It's not one of our sections, so don't allocate space. */
6661 continue;
6662 }
252b5132 6663
9d8504b1 6664 if (s->size == 0 && strip_section)
25dbc73a 6665 {
c456f082
AM
6666 /* If we don't need this section, strip it from the
6667 output file. This is mostly to handle .rela.bss and
6668 .rela.plt. We must create both sections in
6669 create_dynamic_sections, because they must be created
6670 before the linker maps input sections to output
6671 sections. The linker does that before
6672 adjust_dynamic_symbol is called, and it is that
6673 function which decides whether anything needs to go
6674 into these sections. */
8423293d 6675 s->flags |= SEC_EXCLUDE;
25dbc73a
AM
6676 continue;
6677 }
7fce784e 6678
d7128ce4 6679 if ((s->flags & SEC_HAS_CONTENTS) == 0)
644285ef
AM
6680 continue;
6681
25dbc73a
AM
6682 /* Allocate memory for the section contents. */
6683 s->contents = bfd_zalloc (htab->elf.dynobj, s->size);
6684 if (s->contents == NULL)
6685 return FALSE;
6686 }
252b5132 6687
25dbc73a 6688 if (htab->elf.dynamic_sections_created)
7619e7c7 6689 {
25dbc73a
AM
6690 /* Add some entries to the .dynamic section. We fill in the
6691 values later, in ppc_elf_finish_dynamic_sections, but we
6692 must add the entries now so that we get the correct size for
6693 the .dynamic section. The DT_DEBUG entry is filled in by the
6694 dynamic linker and used by the debugger. */
6695#define add_dynamic_entry(TAG, VAL) \
6696 _bfd_elf_add_dynamic_entry (info, TAG, VAL)
252b5132 6697
0e1862bb 6698 if (bfd_link_executable (info))
7619e7c7 6699 {
25dbc73a
AM
6700 if (!add_dynamic_entry (DT_DEBUG, 0))
6701 return FALSE;
7619e7c7
AM
6702 }
6703
ce558b89 6704 if (htab->elf.splt != NULL && htab->elf.splt->size != 0)
7619e7c7 6705 {
25dbc73a
AM
6706 if (!add_dynamic_entry (DT_PLTGOT, 0)
6707 || !add_dynamic_entry (DT_PLTRELSZ, 0)
6708 || !add_dynamic_entry (DT_PLTREL, DT_RELA)
6709 || !add_dynamic_entry (DT_JMPREL, 0))
6710 return FALSE;
6711 }
7619e7c7 6712
c7e17e05
AM
6713 if (htab->plt_type == PLT_NEW
6714 && htab->glink != NULL
6715 && htab->glink->size != 0)
d7128ce4 6716 {
1fe44d79 6717 if (!add_dynamic_entry (DT_PPC_GOT, 0))
d7128ce4 6718 return FALSE;
5446cbdf 6719 if (!htab->params->no_tls_get_addr_opt
a7f2871e
AM
6720 && htab->tls_get_addr != NULL
6721 && htab->tls_get_addr->plt.plist != NULL
e8910a83 6722 && !add_dynamic_entry (DT_PPC_OPT, PPC_OPT_TLS))
a7f2871e 6723 return FALSE;
d7128ce4
AM
6724 }
6725
25dbc73a
AM
6726 if (relocs)
6727 {
6728 if (!add_dynamic_entry (DT_RELA, 0)
6729 || !add_dynamic_entry (DT_RELASZ, 0)
6730 || !add_dynamic_entry (DT_RELAENT, sizeof (Elf32_External_Rela)))
6731 return FALSE;
6732 }
7619e7c7 6733
25dbc73a
AM
6734 /* If any dynamic relocs apply to a read-only section, then we
6735 need a DT_TEXTREL entry. */
6736 if ((info->flags & DF_TEXTREL) == 0)
625af618 6737 elf_link_hash_traverse (elf_hash_table (info), maybe_set_textrel,
25dbc73a 6738 info);
7619e7c7 6739
25dbc73a
AM
6740 if ((info->flags & DF_TEXTREL) != 0)
6741 {
6742 if (!add_dynamic_entry (DT_TEXTREL, 0))
6743 return FALSE;
7619e7c7 6744 }
7a2b07ff
NS
6745 if (htab->is_vxworks
6746 && !elf_vxworks_add_dynamic_entries (output_bfd, info))
6747 return FALSE;
6748 }
25dbc73a
AM
6749#undef add_dynamic_entry
6750
7e01508c
AM
6751 if (htab->glink_eh_frame != NULL
6752 && htab->glink_eh_frame->contents != NULL)
6753 {
6754 unsigned char *p = htab->glink_eh_frame->contents;
6755 bfd_vma val;
6756
6757 memcpy (p, glink_eh_frame_cie, sizeof (glink_eh_frame_cie));
6758 /* CIE length (rewrite in case little-endian). */
6759 bfd_put_32 (htab->elf.dynobj, sizeof (glink_eh_frame_cie) - 4, p);
6760 p += sizeof (glink_eh_frame_cie);
6761 /* FDE length. */
6762 val = htab->glink_eh_frame->size - 4 - sizeof (glink_eh_frame_cie);
6763 bfd_put_32 (htab->elf.dynobj, val, p);
6764 p += 4;
6765 /* CIE pointer. */
6766 val = p - htab->glink_eh_frame->contents;
6767 bfd_put_32 (htab->elf.dynobj, val, p);
6768 p += 4;
6769 /* Offset to .glink. Set later. */
6770 p += 4;
6771 /* .glink size. */
6772 bfd_put_32 (htab->elf.dynobj, htab->glink->size, p);
6773 p += 4;
6774 /* Augmentation. */
6775 p += 1;
6776
0e1862bb 6777 if (bfd_link_pic (info)
7e01508c
AM
6778 && htab->elf.dynamic_sections_created)
6779 {
6780 bfd_vma adv = (htab->glink->size - GLINK_PLTRESOLVE + 8) >> 2;
6781 if (adv < 64)
6782 *p++ = DW_CFA_advance_loc + adv;
6783 else if (adv < 256)
6784 {
6785 *p++ = DW_CFA_advance_loc1;
6786 *p++ = adv;
6787 }
6788 else if (adv < 65536)
6789 {
6790 *p++ = DW_CFA_advance_loc2;
6791 bfd_put_16 (htab->elf.dynobj, adv, p);
6792 p += 2;
6793 }
6794 else
6795 {
6796 *p++ = DW_CFA_advance_loc4;
6797 bfd_put_32 (htab->elf.dynobj, adv, p);
6798 p += 4;
6799 }
6800 *p++ = DW_CFA_register;
6801 *p++ = 65;
6802 p++;
6803 *p++ = DW_CFA_advance_loc + 4;
6804 *p++ = DW_CFA_restore_extended;
6805 *p++ = 65;
6806 }
6807 BFD_ASSERT ((bfd_vma) ((p + 3 - htab->glink_eh_frame->contents) & -4)
6808 == htab->glink_eh_frame->size);
6809 }
6810
7619e7c7
AM
6811 return TRUE;
6812}
0eb4a168 6813
93d1b056
AM
6814/* Arrange to have _SDA_BASE_ or _SDA2_BASE_ stripped from the output
6815 if it looks like nothing is using them. */
6816
6817static void
6818maybe_strip_sdasym (bfd *output_bfd, elf_linker_section_t *lsect)
6819{
6820 struct elf_link_hash_entry *sda = lsect->sym;
6821
6822 if (sda != NULL && !sda->ref_regular && sda->dynindx == -1)
6823 {
6824 asection *s;
6825
6826 s = bfd_get_section_by_name (output_bfd, lsect->name);
6827 if (s == NULL || bfd_section_removed_from_list (output_bfd, s))
6828 {
6829 s = bfd_get_section_by_name (output_bfd, lsect->bss_name);
6830 if (s == NULL || bfd_section_removed_from_list (output_bfd, s))
6831 {
6832 sda->def_regular = 0;
6833 /* This is somewhat magic. See elf_link_output_extsym. */
6834 sda->ref_dynamic = 1;
6835 sda->forced_local = 0;
6836 }
6837 }
6838 }
6839}
6840
6841void
6842ppc_elf_maybe_strip_sdata_syms (struct bfd_link_info *info)
6843{
6844 struct ppc_elf_link_hash_table *htab = ppc_elf_hash_table (info);
6845
6846 if (htab != NULL)
6847 {
6848 maybe_strip_sdasym (info->output_bfd, &htab->sdata[0]);
6849 maybe_strip_sdasym (info->output_bfd, &htab->sdata[1]);
6850 }
6851}
6852
6853
0eb4a168
AM
6854/* Return TRUE if symbol should be hashed in the `.gnu.hash' section. */
6855
6856static bfd_boolean
6857ppc_elf_hash_symbol (struct elf_link_hash_entry *h)
6858{
6859 if (h->plt.plist != NULL
6860 && !h->def_regular
6861 && (!h->pointer_equality_needed
6862 || !h->ref_regular_nonweak))
6863 return FALSE;
6864
6865 return _bfd_elf_hash_symbol (h);
6866}
25dbc73a
AM
6867\f
6868#define ARRAY_SIZE(a) (sizeof (a) / sizeof ((a)[0]))
6869
01017ef8
NS
6870/* Relaxation trampolines. r12 is available for clobbering (r11, is
6871 used for some functions that are allowed to break the ABI). */
25dbc73a
AM
6872static const int shared_stub_entry[] =
6873 {
6874 0x7c0802a6, /* mflr 0 */
6875 0x429f0005, /* bcl 20, 31, .Lxxx */
01017ef8
NS
6876 0x7d8802a6, /* mflr 12 */
6877 0x3d8c0000, /* addis 12, 12, (xxx-.Lxxx)@ha */
53291d1f 6878 0x398c0000, /* addi 12, 12, (xxx-.Lxxx)@l */
25dbc73a 6879 0x7c0803a6, /* mtlr 0 */
01017ef8 6880 0x7d8903a6, /* mtctr 12 */
25dbc73a
AM
6881 0x4e800420, /* bctr */
6882 };
6883
6884static const int stub_entry[] =
6885 {
01017ef8
NS
6886 0x3d800000, /* lis 12,xxx@ha */
6887 0x398c0000, /* addi 12,12,xxx@l */
6888 0x7d8903a6, /* mtctr 12 */
25dbc73a
AM
6889 0x4e800420, /* bctr */
6890 };
6891
5446cbdf
AM
6892struct ppc_elf_relax_info
6893{
6894 unsigned int workaround_size;
d3e454b9 6895 unsigned int picfixup_size;
5446cbdf
AM
6896};
6897
6898/* This function implements long branch trampolines, and the ppc476
6899 icache bug workaround. Any section needing trampolines or patch
6900 space for the workaround has its size extended so that we can
53291d1f 6901 add trampolines at the end of the section. */
5446cbdf 6902
25dbc73a
AM
6903static bfd_boolean
6904ppc_elf_relax_section (bfd *abfd,
6905 asection *isec,
6906 struct bfd_link_info *link_info,
6907 bfd_boolean *again)
6908{
d3e454b9 6909 struct one_branch_fixup
25dbc73a 6910 {
d3e454b9 6911 struct one_branch_fixup *next;
25dbc73a 6912 asection *tsec;
01017ef8
NS
6913 /* Final link, can use the symbol offset. For a
6914 relocatable link we use the symbol's index. */
25dbc73a
AM
6915 bfd_vma toff;
6916 bfd_vma trampoff;
6917 };
7619e7c7 6918
25dbc73a
AM
6919 Elf_Internal_Shdr *symtab_hdr;
6920 bfd_byte *contents = NULL;
6921 Elf_Internal_Sym *isymbuf = NULL;
6922 Elf_Internal_Rela *internal_relocs = NULL;
5446cbdf 6923 Elf_Internal_Rela *irel, *irelend = NULL;
d3e454b9 6924 struct one_branch_fixup *branch_fixups = NULL;
5446cbdf 6925 struct ppc_elf_relax_info *relax_info = NULL;
9bc4e62b 6926 unsigned changes = 0;
5446cbdf 6927 bfd_boolean workaround_change;
d7128ce4 6928 struct ppc_elf_link_hash_table *htab;
d3e454b9 6929 bfd_size_type trampbase, trampoff, newsize, picfixup_size;
a6aa5195 6930 asection *got2;
50248c89 6931 bfd_boolean maybe_pasted;
7619e7c7 6932
25dbc73a 6933 *again = FALSE;
7619e7c7 6934
5446cbdf 6935 /* No need to do anything with non-alloc or non-code sections. */
c87b5a93 6936 if ((isec->flags & SEC_ALLOC) == 0
a8ad78a7 6937 || (isec->flags & SEC_CODE) == 0
5446cbdf
AM
6938 || (isec->flags & SEC_LINKER_CREATED) != 0
6939 || isec->size < 4)
25dbc73a 6940 return TRUE;
7619e7c7 6941
c8a1f254
NS
6942 /* We cannot represent the required PIC relocs in the output, so don't
6943 do anything. The linker doesn't support mixing -shared and -r
6944 anyway. */
0e1862bb 6945 if (bfd_link_relocatable (link_info) && bfd_link_pic (link_info))
795bc6b3 6946 return TRUE;
5b914448 6947
5446cbdf
AM
6948 htab = ppc_elf_hash_table (link_info);
6949 if (htab == NULL)
6950 return TRUE;
6951
6952 isec->size = (isec->size + 3) & -4;
6953 if (isec->rawsize == 0)
6954 isec->rawsize = isec->size;
6955 trampbase = isec->size;
6956
53291d1f
AM
6957 BFD_ASSERT (isec->sec_info_type == SEC_INFO_TYPE_NONE
6958 || isec->sec_info_type == SEC_INFO_TYPE_TARGET);
6959 isec->sec_info_type = SEC_INFO_TYPE_TARGET;
6960
d3e454b9
AM
6961 if (htab->params->ppc476_workaround
6962 || htab->params->pic_fixup > 0)
5446cbdf
AM
6963 {
6964 if (elf_section_data (isec)->sec_info == NULL)
6965 {
5446cbdf
AM
6966 elf_section_data (isec)->sec_info
6967 = bfd_zalloc (abfd, sizeof (struct ppc_elf_relax_info));
6968 if (elf_section_data (isec)->sec_info == NULL)
6969 return FALSE;
6970 }
6971 relax_info = elf_section_data (isec)->sec_info;
6972 trampbase -= relax_info->workaround_size;
6973 }
6974
50248c89
AM
6975 maybe_pasted = (strcmp (isec->output_section->name, ".init") == 0
6976 || strcmp (isec->output_section->name, ".fini") == 0);
25dbc73a 6977 /* Space for a branch around any trampolines. */
5446cbdf
AM
6978 trampoff = trampbase;
6979 if (maybe_pasted && trampbase == isec->rawsize)
50248c89 6980 trampoff += 4;
7619e7c7 6981
0ffa91dd 6982 symtab_hdr = &elf_symtab_hdr (abfd);
d3e454b9
AM
6983 picfixup_size = 0;
6984 if (htab->params->branch_trampolines
6985 || htab->params->pic_fixup > 0)
7619e7c7 6986 {
5446cbdf
AM
6987 /* Get a copy of the native relocations. */
6988 if (isec->reloc_count != 0)
25dbc73a 6989 {
5446cbdf
AM
6990 internal_relocs = _bfd_elf_link_read_relocs (abfd, isec, NULL, NULL,
6991 link_info->keep_memory);
6992 if (internal_relocs == NULL)
6993 goto error_return;
25dbc73a 6994 }
7619e7c7 6995
5446cbdf
AM
6996 got2 = bfd_get_section_by_name (abfd, ".got2");
6997
6998 irelend = internal_relocs + isec->reloc_count;
6999 for (irel = internal_relocs; irel < irelend; irel++)
25dbc73a 7000 {
5446cbdf
AM
7001 unsigned long r_type = ELF32_R_TYPE (irel->r_info);
7002 bfd_vma toff, roff;
7003 asection *tsec;
d3e454b9 7004 struct one_branch_fixup *f;
5446cbdf 7005 size_t insn_offset = 0;
d3e454b9 7006 bfd_vma max_branch_offset = 0, val;
5446cbdf
AM
7007 bfd_byte *hit_addr;
7008 unsigned long t0;
7009 struct elf_link_hash_entry *h;
7010 struct plt_entry **plist;
7011 unsigned char sym_type;
7012
7013 switch (r_type)
7014 {
7015 case R_PPC_REL24:
7016 case R_PPC_LOCAL24PC:
7017 case R_PPC_PLTREL24:
7018 max_branch_offset = 1 << 25;
7019 break;
7020
7021 case R_PPC_REL14:
7022 case R_PPC_REL14_BRTAKEN:
7023 case R_PPC_REL14_BRNTAKEN:
7024 max_branch_offset = 1 << 15;
7025 break;
7fce784e 7026
d3e454b9
AM
7027 case R_PPC_ADDR16_HA:
7028 if (htab->params->pic_fixup > 0)
7029 break;
7030 continue;
7031
5446cbdf
AM
7032 default:
7033 continue;
7034 }
7035
7036 /* Get the value of the symbol referred to by the reloc. */
7037 h = NULL;
7038 if (ELF32_R_SYM (irel->r_info) < symtab_hdr->sh_info)
25dbc73a 7039 {
5446cbdf
AM
7040 /* A local symbol. */
7041 Elf_Internal_Sym *isym;
7042
7043 /* Read this BFD's local symbols. */
25dbc73a 7044 if (isymbuf == NULL)
5446cbdf
AM
7045 {
7046 isymbuf = (Elf_Internal_Sym *) symtab_hdr->contents;
7047 if (isymbuf == NULL)
7048 isymbuf = bfd_elf_get_elf_syms (abfd, symtab_hdr,
7049 symtab_hdr->sh_info, 0,
7050 NULL, NULL, NULL);
7051 if (isymbuf == 0)
7052 goto error_return;
7053 }
7054 isym = isymbuf + ELF32_R_SYM (irel->r_info);
7055 if (isym->st_shndx == SHN_UNDEF)
7056 tsec = bfd_und_section_ptr;
7057 else if (isym->st_shndx == SHN_ABS)
7058 tsec = bfd_abs_section_ptr;
7059 else if (isym->st_shndx == SHN_COMMON)
7060 tsec = bfd_com_section_ptr;
7061 else
7062 tsec = bfd_section_from_elf_index (abfd, isym->st_shndx);
7063
7064 toff = isym->st_value;
7065 sym_type = ELF_ST_TYPE (isym->st_info);
25dbc73a 7066 }
25dbc73a 7067 else
5446cbdf
AM
7068 {
7069 /* Global symbol handling. */
7070 unsigned long indx;
7fce784e 7071
5446cbdf
AM
7072 indx = ELF32_R_SYM (irel->r_info) - symtab_hdr->sh_info;
7073 h = elf_sym_hashes (abfd)[indx];
7619e7c7 7074
5446cbdf
AM
7075 while (h->root.type == bfd_link_hash_indirect
7076 || h->root.type == bfd_link_hash_warning)
7077 h = (struct elf_link_hash_entry *) h->root.u.i.link;
7619e7c7 7078
5446cbdf
AM
7079 if (h->root.type == bfd_link_hash_defined
7080 || h->root.type == bfd_link_hash_defweak)
7081 {
7082 tsec = h->root.u.def.section;
7083 toff = h->root.u.def.value;
7084 }
7085 else if (h->root.type == bfd_link_hash_undefined
7086 || h->root.type == bfd_link_hash_undefweak)
7087 {
7088 tsec = bfd_und_section_ptr;
0e1862bb 7089 toff = bfd_link_relocatable (link_info) ? indx : 0;
5446cbdf
AM
7090 }
7091 else
7092 continue;
7093
9f7552cf
AM
7094 /* If this branch is to __tls_get_addr then we may later
7095 optimise away the call. We won't be needing a long-
7096 branch stub in that case. */
0e1862bb 7097 if (bfd_link_executable (link_info)
9f7552cf
AM
7098 && h == htab->tls_get_addr
7099 && irel != internal_relocs)
7100 {
7101 unsigned long t_symndx = ELF32_R_SYM (irel[-1].r_info);
7102 unsigned long t_rtype = ELF32_R_TYPE (irel[-1].r_info);
7103 unsigned int tls_mask = 0;
7104
7105 /* The previous reloc should be one of R_PPC_TLSGD or
7106 R_PPC_TLSLD, or for older object files, a reloc
7107 on the __tls_get_addr arg setup insn. Get tls
7108 mask bits from the symbol on that reloc. */
7109 if (t_symndx < symtab_hdr->sh_info)
7110 {
7111 bfd_vma *local_got_offsets = elf_local_got_offsets (abfd);
7112
7113 if (local_got_offsets != NULL)
7114 {
7115 struct plt_entry **local_plt = (struct plt_entry **)
7116 (local_got_offsets + symtab_hdr->sh_info);
7117 char *lgot_masks = (char *)
7118 (local_plt + symtab_hdr->sh_info);
7119 tls_mask = lgot_masks[t_symndx];
7120 }
7121 }
7122 else
7123 {
7124 struct elf_link_hash_entry *th
7125 = elf_sym_hashes (abfd)[t_symndx - symtab_hdr->sh_info];
7126
7127 while (th->root.type == bfd_link_hash_indirect
7128 || th->root.type == bfd_link_hash_warning)
7129 th = (struct elf_link_hash_entry *) th->root.u.i.link;
7130
7131 tls_mask
7132 = ((struct ppc_elf_link_hash_entry *) th)->tls_mask;
7133 }
7134
7135 /* The mask bits tell us if the call will be
7136 optimised away. */
7137 if ((tls_mask & TLS_TLS) != 0 && (tls_mask & TLS_GD) == 0
7138 && (t_rtype == R_PPC_TLSGD
7139 || t_rtype == R_PPC_GOT_TLSGD16
7140 || t_rtype == R_PPC_GOT_TLSGD16_LO))
7141 continue;
7142 if ((tls_mask & TLS_TLS) != 0 && (tls_mask & TLS_LD) == 0
7143 && (t_rtype == R_PPC_TLSLD
7144 || t_rtype == R_PPC_GOT_TLSLD16
7145 || t_rtype == R_PPC_GOT_TLSLD16_LO))
7146 continue;
7147 }
7148
5446cbdf
AM
7149 sym_type = h->type;
7150 }
7619e7c7 7151
d3e454b9
AM
7152 if (r_type == R_PPC_ADDR16_HA)
7153 {
7154 if (h != NULL
7155 && !h->def_regular
7156 && h->protected_def
7157 && ppc_elf_hash_entry (h)->has_addr16_ha
7158 && ppc_elf_hash_entry (h)->has_addr16_lo)
7159 picfixup_size += 12;
7160 continue;
7161 }
7162
5446cbdf
AM
7163 /* The condition here under which we call find_plt_ent must
7164 match that in relocate_section. If we call find_plt_ent here
7165 but not in relocate_section, or vice versa, then the branch
7166 destination used here may be incorrect. */
7167 plist = NULL;
7168 if (h != NULL)
25dbc73a 7169 {
5446cbdf
AM
7170 /* We know is_branch_reloc (r_type) is true. */
7171 if (h->type == STT_GNU_IFUNC
7172 || r_type == R_PPC_PLTREL24)
7173 plist = &h->plt.plist;
25dbc73a 7174 }
5446cbdf
AM
7175 else if (sym_type == STT_GNU_IFUNC
7176 && elf_local_got_offsets (abfd) != NULL)
c8a1f254 7177 {
5446cbdf
AM
7178 bfd_vma *local_got_offsets = elf_local_got_offsets (abfd);
7179 struct plt_entry **local_plt = (struct plt_entry **)
7180 (local_got_offsets + symtab_hdr->sh_info);
7181 plist = local_plt + ELF32_R_SYM (irel->r_info);
c8a1f254 7182 }
5446cbdf 7183 if (plist != NULL)
a9585d22 7184 {
5446cbdf
AM
7185 bfd_vma addend = 0;
7186 struct plt_entry *ent;
7187
0e1862bb 7188 if (r_type == R_PPC_PLTREL24 && bfd_link_pic (link_info))
5446cbdf
AM
7189 addend = irel->r_addend;
7190 ent = find_plt_ent (plist, got2, addend);
7191 if (ent != NULL)
a9585d22 7192 {
5446cbdf
AM
7193 if (htab->plt_type == PLT_NEW
7194 || h == NULL
7195 || !htab->elf.dynamic_sections_created
7196 || h->dynindx == -1)
7197 {
7198 tsec = htab->glink;
7199 toff = ent->glink_offset;
7200 }
7201 else
7202 {
ce558b89 7203 tsec = htab->elf.splt;
5446cbdf
AM
7204 toff = ent->plt.offset;
7205 }
de972ffa
AM
7206 }
7207 }
de972ffa 7208
5446cbdf
AM
7209 /* If the branch and target are in the same section, you have
7210 no hope of adding stubs. We'll error out later should the
7211 branch overflow. */
7212 if (tsec == isec)
7213 continue;
25dbc73a 7214
5446cbdf
AM
7215 /* There probably isn't any reason to handle symbols in
7216 SEC_MERGE sections; SEC_MERGE doesn't seem a likely
7217 attribute for a code section, and we are only looking at
7218 branches. However, implement it correctly here as a
7219 reference for other target relax_section functions. */
7220 if (0 && tsec->sec_info_type == SEC_INFO_TYPE_MERGE)
7221 {
7222 /* At this stage in linking, no SEC_MERGE symbol has been
7223 adjusted, so all references to such symbols need to be
7224 passed through _bfd_merged_section_offset. (Later, in
7225 relocate_section, all SEC_MERGE symbols *except* for
7226 section symbols have been adjusted.)
7227
7228 gas may reduce relocations against symbols in SEC_MERGE
7229 sections to a relocation against the section symbol when
7230 the original addend was zero. When the reloc is against
7231 a section symbol we should include the addend in the
7232 offset passed to _bfd_merged_section_offset, since the
7233 location of interest is the original symbol. On the
7234 other hand, an access to "sym+addend" where "sym" is not
7235 a section symbol should not include the addend; Such an
7236 access is presumed to be an offset from "sym"; The
7237 location of interest is just "sym". */
7238 if (sym_type == STT_SECTION)
7239 toff += irel->r_addend;
7240
7241 toff
7242 = _bfd_merged_section_offset (abfd, &tsec,
7243 elf_section_data (tsec)->sec_info,
7244 toff);
7245
7246 if (sym_type != STT_SECTION)
7247 toff += irel->r_addend;
7248 }
7249 /* PLTREL24 addends are special. */
7250 else if (r_type != R_PPC_PLTREL24)
25dbc73a 7251 toff += irel->r_addend;
7619e7c7 7252
5446cbdf 7253 /* Attempted -shared link of non-pic code loses. */
0e1862bb 7254 if ((!bfd_link_relocatable (link_info)
5446cbdf
AM
7255 && tsec == bfd_und_section_ptr)
7256 || tsec->output_section == NULL
7257 || (tsec->owner != NULL
7258 && (tsec->owner->flags & BFD_PLUGIN) != 0))
7259 continue;
7619e7c7 7260
5446cbdf 7261 roff = irel->r_offset;
7de713b9 7262
5446cbdf
AM
7263 /* If the branch is in range, no need to do anything. */
7264 if (tsec != bfd_und_section_ptr
0e1862bb 7265 && (!bfd_link_relocatable (link_info)
5446cbdf
AM
7266 /* A relocatable link may have sections moved during
7267 final link, so do not presume they remain in range. */
7268 || tsec->output_section == isec->output_section))
7269 {
7270 bfd_vma symaddr, reladdr;
7619e7c7 7271
5446cbdf
AM
7272 symaddr = tsec->output_section->vma + tsec->output_offset + toff;
7273 reladdr = isec->output_section->vma + isec->output_offset + roff;
7274 if (symaddr - reladdr + max_branch_offset
7275 < 2 * max_branch_offset)
7276 continue;
7277 }
01017ef8 7278
5446cbdf 7279 /* Look for an existing fixup to this address. */
d3e454b9 7280 for (f = branch_fixups; f ; f = f->next)
5446cbdf
AM
7281 if (f->tsec == tsec && f->toff == toff)
7282 break;
252b5132 7283
5446cbdf
AM
7284 if (f == NULL)
7285 {
7286 size_t size;
7287 unsigned long stub_rtype;
25dbc73a 7288
5446cbdf
AM
7289 val = trampoff - roff;
7290 if (val >= max_branch_offset)
7291 /* Oh dear, we can't reach a trampoline. Don't try to add
7292 one. We'll report an error later. */
7293 continue;
252b5132 7294
0e1862bb 7295 if (bfd_link_pic (link_info))
5446cbdf
AM
7296 {
7297 size = 4 * ARRAY_SIZE (shared_stub_entry);
7298 insn_offset = 12;
7299 }
7300 else
7301 {
7302 size = 4 * ARRAY_SIZE (stub_entry);
7303 insn_offset = 0;
7304 }
7305 stub_rtype = R_PPC_RELAX;
ce558b89 7306 if (tsec == htab->elf.splt
5446cbdf
AM
7307 || tsec == htab->glink)
7308 {
7309 stub_rtype = R_PPC_RELAX_PLT;
7310 if (r_type == R_PPC_PLTREL24)
7311 stub_rtype = R_PPC_RELAX_PLTREL24;
7312 }
252b5132 7313
5446cbdf
AM
7314 /* Hijack the old relocation. Since we need two
7315 relocations for this use a "composite" reloc. */
7316 irel->r_info = ELF32_R_INFO (ELF32_R_SYM (irel->r_info),
7317 stub_rtype);
7318 irel->r_offset = trampoff + insn_offset;
7319 if (r_type == R_PPC_PLTREL24
7320 && stub_rtype != R_PPC_RELAX_PLTREL24)
7321 irel->r_addend = 0;
7322
7323 /* Record the fixup so we don't do it again this section. */
7324 f = bfd_malloc (sizeof (*f));
d3e454b9 7325 f->next = branch_fixups;
5446cbdf
AM
7326 f->tsec = tsec;
7327 f->toff = toff;
7328 f->trampoff = trampoff;
d3e454b9 7329 branch_fixups = f;
5446cbdf
AM
7330
7331 trampoff += size;
7332 changes++;
25dbc73a
AM
7333 }
7334 else
7335 {
5446cbdf
AM
7336 val = f->trampoff - roff;
7337 if (val >= max_branch_offset)
7338 continue;
252b5132 7339
5446cbdf
AM
7340 /* Nop out the reloc, since we're finalizing things here. */
7341 irel->r_info = ELF32_R_INFO (0, R_PPC_NONE);
7342 }
252b5132 7343
5446cbdf
AM
7344 /* Get the section contents. */
7345 if (contents == NULL)
25dbc73a 7346 {
5446cbdf
AM
7347 /* Get cached copy if it exists. */
7348 if (elf_section_data (isec)->this_hdr.contents != NULL)
7349 contents = elf_section_data (isec)->this_hdr.contents;
25dbc73a 7350 /* Go get them off disk. */
5446cbdf 7351 else if (!bfd_malloc_and_get_section (abfd, isec, &contents))
25dbc73a
AM
7352 goto error_return;
7353 }
252b5132 7354
5446cbdf
AM
7355 /* Fix up the existing branch to hit the trampoline. */
7356 hit_addr = contents + roff;
7357 switch (r_type)
7358 {
7359 case R_PPC_REL24:
7360 case R_PPC_LOCAL24PC:
7361 case R_PPC_PLTREL24:
7362 t0 = bfd_get_32 (abfd, hit_addr);
7363 t0 &= ~0x3fffffc;
7364 t0 |= val & 0x3fffffc;
7365 bfd_put_32 (abfd, t0, hit_addr);
7366 break;
252b5132 7367
5446cbdf
AM
7368 case R_PPC_REL14:
7369 case R_PPC_REL14_BRTAKEN:
7370 case R_PPC_REL14_BRNTAKEN:
7371 t0 = bfd_get_32 (abfd, hit_addr);
7372 t0 &= ~0xfffc;
7373 t0 |= val & 0xfffc;
7374 bfd_put_32 (abfd, t0, hit_addr);
7375 break;
7376 }
25dbc73a 7377 }
252b5132 7378
d3e454b9 7379 while (branch_fixups != NULL)
25dbc73a 7380 {
d3e454b9
AM
7381 struct one_branch_fixup *f = branch_fixups;
7382 branch_fixups = branch_fixups->next;
25dbc73a
AM
7383 free (f);
7384 }
5446cbdf 7385 }
252b5132 7386
5446cbdf
AM
7387 workaround_change = FALSE;
7388 newsize = trampoff;
795bc6b3 7389 if (htab->params->ppc476_workaround
0e1862bb 7390 && (!bfd_link_relocatable (link_info)
795bc6b3 7391 || isec->output_section->alignment_power >= htab->params->pagesize_p2))
5446cbdf
AM
7392 {
7393 bfd_vma addr, end_addr;
7394 unsigned int crossings;
795bc6b3 7395 bfd_vma pagesize = (bfd_vma) 1 << htab->params->pagesize_p2;
5446cbdf
AM
7396
7397 addr = isec->output_section->vma + isec->output_offset;
6128f9cf 7398 end_addr = addr + trampoff;
5446cbdf 7399 addr &= -pagesize;
795bc6b3 7400 crossings = ((end_addr & -pagesize) - addr) >> htab->params->pagesize_p2;
5446cbdf
AM
7401 if (crossings != 0)
7402 {
7403 /* Keep space aligned, to ensure the patch code itself does
7404 not cross a page. Don't decrease size calculated on a
7405 previous pass as otherwise we might never settle on a layout. */
1e269e9b 7406 newsize = 15 - ((end_addr - 1) & 15);
5446cbdf
AM
7407 newsize += crossings * 16;
7408 if (relax_info->workaround_size < newsize)
7409 {
7410 relax_info->workaround_size = newsize;
7411 workaround_change = TRUE;
5446cbdf
AM
7412 }
7413 /* Ensure relocate_section is called. */
7414 isec->flags |= SEC_RELOC;
7415 }
7416 newsize = trampoff + relax_info->workaround_size;
7417 }
7418
d3e454b9
AM
7419 if (htab->params->pic_fixup > 0)
7420 {
7421 picfixup_size -= relax_info->picfixup_size;
7422 if (picfixup_size != 0)
7423 relax_info->picfixup_size += picfixup_size;
7424 newsize += relax_info->picfixup_size;
7425 }
7426
7427 if (changes != 0 || picfixup_size != 0 || workaround_change)
5446cbdf
AM
7428 isec->size = newsize;
7429
25dbc73a
AM
7430 if (isymbuf != NULL
7431 && symtab_hdr->contents != (unsigned char *) isymbuf)
252b5132 7432 {
25dbc73a
AM
7433 if (! link_info->keep_memory)
7434 free (isymbuf);
252b5132 7435 else
25dbc73a
AM
7436 {
7437 /* Cache the symbols for elf_link_input_bfd. */
7438 symtab_hdr->contents = (unsigned char *) isymbuf;
7439 }
252b5132
RH
7440 }
7441
25dbc73a
AM
7442 if (contents != NULL
7443 && elf_section_data (isec)->this_hdr.contents != contents)
7444 {
53291d1f 7445 if (!changes && !link_info->keep_memory)
25dbc73a
AM
7446 free (contents);
7447 else
7448 {
7449 /* Cache the section contents for elf_link_input_bfd. */
7450 elf_section_data (isec)->this_hdr.contents = contents;
7451 }
7452 }
252b5132 7453
d3e454b9 7454 changes += picfixup_size;
9bc4e62b 7455 if (changes != 0)
25dbc73a 7456 {
9bc4e62b
NS
7457 /* Append sufficient NOP relocs so we can write out relocation
7458 information for the trampolines. */
d4730f92 7459 Elf_Internal_Shdr *rel_hdr;
9bc4e62b
NS
7460 Elf_Internal_Rela *new_relocs = bfd_malloc ((changes + isec->reloc_count)
7461 * sizeof (*new_relocs));
7462 unsigned ix;
5b914448 7463
9bc4e62b
NS
7464 if (!new_relocs)
7465 goto error_return;
7466 memcpy (new_relocs, internal_relocs,
7467 isec->reloc_count * sizeof (*new_relocs));
7468 for (ix = changes; ix--;)
7469 {
7470 irel = new_relocs + ix + isec->reloc_count;
7471
7472 irel->r_info = ELF32_R_INFO (0, R_PPC_NONE);
7473 }
7474 if (internal_relocs != elf_section_data (isec)->relocs)
25dbc73a 7475 free (internal_relocs);
9bc4e62b
NS
7476 elf_section_data (isec)->relocs = new_relocs;
7477 isec->reloc_count += changes;
d4730f92
BS
7478 rel_hdr = _bfd_elf_single_rel_hdr (isec);
7479 rel_hdr->sh_size += changes * rel_hdr->sh_entsize;
25dbc73a 7480 }
5446cbdf
AM
7481 else if (internal_relocs != NULL
7482 && elf_section_data (isec)->relocs != internal_relocs)
9bc4e62b 7483 free (internal_relocs);
252b5132 7484
5446cbdf 7485 *again = changes != 0 || workaround_change;
b34976b6 7486 return TRUE;
25dbc73a
AM
7487
7488 error_return:
d3e454b9 7489 while (branch_fixups != NULL)
5446cbdf 7490 {
d3e454b9
AM
7491 struct one_branch_fixup *f = branch_fixups;
7492 branch_fixups = branch_fixups->next;
5446cbdf
AM
7493 free (f);
7494 }
25dbc73a
AM
7495 if (isymbuf != NULL && (unsigned char *) isymbuf != symtab_hdr->contents)
7496 free (isymbuf);
7497 if (contents != NULL
7498 && elf_section_data (isec)->this_hdr.contents != contents)
7499 free (contents);
7500 if (internal_relocs != NULL
7501 && elf_section_data (isec)->relocs != internal_relocs)
7502 free (internal_relocs);
7503 return FALSE;
252b5132 7504}
252b5132 7505\f
8a696751
AM
7506/* What to do when ld finds relocations against symbols defined in
7507 discarded sections. */
7508
7509static unsigned int
7510ppc_elf_action_discarded (asection *sec)
7511{
7512 if (strcmp (".fixup", sec->name) == 0)
7513 return 0;
7514
7515 if (strcmp (".got2", sec->name) == 0)
7516 return 0;
7517
7518 return _bfd_elf_default_action_discarded (sec);
7519}
c9a2f333 7520\f
25dbc73a 7521/* Fill in the address for a pointer generated in a linker section. */
252b5132 7522
25dbc73a 7523static bfd_vma
76750a2f 7524elf_finish_pointer_linker_section (bfd *input_bfd,
25dbc73a
AM
7525 elf_linker_section_t *lsect,
7526 struct elf_link_hash_entry *h,
7527 bfd_vma relocation,
2bb04cf2 7528 const Elf_Internal_Rela *rel)
25dbc73a
AM
7529{
7530 elf_linker_section_pointers_t *linker_section_ptr;
252b5132 7531
25dbc73a 7532 BFD_ASSERT (lsect != NULL);
252b5132 7533
25dbc73a 7534 if (h != NULL)
252b5132 7535 {
25dbc73a
AM
7536 /* Handle global symbol. */
7537 struct ppc_elf_link_hash_entry *eh;
252b5132 7538
25dbc73a 7539 eh = (struct ppc_elf_link_hash_entry *) h;
76750a2f
AM
7540 BFD_ASSERT (eh->elf.def_regular);
7541 linker_section_ptr = eh->linker_section_pointer;
25dbc73a
AM
7542 }
7543 else
7544 {
7545 /* Handle local symbol. */
7546 unsigned long r_symndx = ELF32_R_SYM (rel->r_info);
76750a2f 7547
0c8d6e5c 7548 BFD_ASSERT (is_ppc_elf (input_bfd));
25dbc73a 7549 BFD_ASSERT (elf_local_ptr_offsets (input_bfd) != NULL);
76750a2f
AM
7550 linker_section_ptr = elf_local_ptr_offsets (input_bfd)[r_symndx];
7551 }
252b5132 7552
76750a2f
AM
7553 linker_section_ptr = elf_find_pointer_linker_section (linker_section_ptr,
7554 rel->r_addend,
7555 lsect);
7556 BFD_ASSERT (linker_section_ptr != NULL);
25dbc73a 7557
76750a2f
AM
7558 /* Offset will always be a multiple of four, so use the bottom bit
7559 as a "written" flag. */
7560 if ((linker_section_ptr->offset & 1) == 0)
7561 {
7562 bfd_put_32 (lsect->section->owner,
7563 relocation + linker_section_ptr->addend,
7564 lsect->section->contents + linker_section_ptr->offset);
7565 linker_section_ptr->offset += 1;
252b5132
RH
7566 }
7567
bd6c6e2b
AM
7568 relocation = (lsect->section->output_section->vma
7569 + lsect->section->output_offset
76750a2f 7570 + linker_section_ptr->offset - 1
bd6c6e2b 7571 - SYM_VAL (lsect->sym));
252b5132 7572
25dbc73a
AM
7573#ifdef DEBUG
7574 fprintf (stderr,
7575 "Finish pointer in linker section %s, offset = %ld (0x%lx)\n",
7576 lsect->name, (long) relocation, (long) relocation);
7577#endif
252b5132 7578
bd6c6e2b 7579 return relocation;
252b5132 7580}
25dbc73a 7581
e054468f
AM
7582#define PPC_LO(v) ((v) & 0xffff)
7583#define PPC_HI(v) (((v) >> 16) & 0xffff)
7584#define PPC_HA(v) PPC_HI ((v) + 0x8000)
7585
7586static void
a7f2871e 7587write_glink_stub (struct plt_entry *ent, asection *plt_sec, unsigned char *p,
e054468f
AM
7588 struct bfd_link_info *info)
7589{
7590 struct ppc_elf_link_hash_table *htab = ppc_elf_hash_table (info);
7591 bfd *output_bfd = info->output_bfd;
7592 bfd_vma plt;
e054468f
AM
7593
7594 plt = ((ent->plt.offset & ~1)
7595 + plt_sec->output_section->vma
7596 + plt_sec->output_offset);
e054468f 7597
0e1862bb 7598 if (bfd_link_pic (info))
e054468f
AM
7599 {
7600 bfd_vma got = 0;
7601
7602 if (ent->addend >= 32768)
7603 got = (ent->addend
7604 + ent->sec->output_section->vma
7605 + ent->sec->output_offset);
7606 else if (htab->elf.hgot != NULL)
7607 got = SYM_VAL (htab->elf.hgot);
7608
7609 plt -= got;
7610
7611 if (plt + 0x8000 < 0x10000)
7612 {
7613 bfd_put_32 (output_bfd, LWZ_11_30 + PPC_LO (plt), p);
7614 p += 4;
7615 bfd_put_32 (output_bfd, MTCTR_11, p);
7616 p += 4;
7617 bfd_put_32 (output_bfd, BCTR, p);
7618 p += 4;
da3a2088 7619 bfd_put_32 (output_bfd, htab->params->ppc476_workaround ? BA : NOP, p);
e054468f
AM
7620 p += 4;
7621 }
7622 else
7623 {
7624 bfd_put_32 (output_bfd, ADDIS_11_30 + PPC_HA (plt), p);
7625 p += 4;
7626 bfd_put_32 (output_bfd, LWZ_11_11 + PPC_LO (plt), p);
7627 p += 4;
7628 bfd_put_32 (output_bfd, MTCTR_11, p);
7629 p += 4;
7630 bfd_put_32 (output_bfd, BCTR, p);
7631 p += 4;
7632 }
7633 }
7634 else
7635 {
7636 bfd_put_32 (output_bfd, LIS_11 + PPC_HA (plt), p);
7637 p += 4;
7638 bfd_put_32 (output_bfd, LWZ_11_11 + PPC_LO (plt), p);
7639 p += 4;
7640 bfd_put_32 (output_bfd, MTCTR_11, p);
7641 p += 4;
7642 bfd_put_32 (output_bfd, BCTR, p);
7643 p += 4;
7644 }
7645}
7646
bd6c6e2b
AM
7647/* Return true if symbol is defined statically. */
7648
7649static bfd_boolean
7650is_static_defined (struct elf_link_hash_entry *h)
7651{
7652 return ((h->root.type == bfd_link_hash_defined
7653 || h->root.type == bfd_link_hash_defweak)
7654 && h->root.u.def.section != NULL
7655 && h->root.u.def.section->output_section != NULL);
7656}
7657
2d0f3896
AM
7658/* If INSN is an opcode that may be used with an @tls operand, return
7659 the transformed insn for TLS optimisation, otherwise return 0. If
7660 REG is non-zero only match an insn with RB or RA equal to REG. */
7661
7662unsigned int
7663_bfd_elf_ppc_at_tls_transform (unsigned int insn, unsigned int reg)
7664{
7665 unsigned int rtra;
7666
7667 if ((insn & (0x3f << 26)) != 31 << 26)
7668 return 0;
7669
7670 if (reg == 0 || ((insn >> 11) & 0x1f) == reg)
7671 rtra = insn & ((1 << 26) - (1 << 16));
7672 else if (((insn >> 16) & 0x1f) == reg)
7673 rtra = (insn & (0x1f << 21)) | ((insn & (0x1f << 11)) << 5);
7674 else
7675 return 0;
7676
7677 if ((insn & (0x3ff << 1)) == 266 << 1)
7678 /* add -> addi. */
7679 insn = 14 << 26;
7680 else if ((insn & (0x1f << 1)) == 23 << 1
7681 && ((insn & (0x1f << 6)) < 14 << 6
7682 || ((insn & (0x1f << 6)) >= 16 << 6
7683 && (insn & (0x1f << 6)) < 24 << 6)))
7684 /* load and store indexed -> dform. */
7685 insn = (32 | ((insn >> 6) & 0x1f)) << 26;
7686 else if ((insn & (((0x1a << 5) | 0x1f) << 1)) == 21 << 1)
7687 /* ldx, ldux, stdx, stdux -> ld, ldu, std, stdu. */
7688 insn = ((58 | ((insn >> 6) & 4)) << 26) | ((insn >> 6) & 1);
7689 else if ((insn & (((0x1f << 5) | 0x1f) << 1)) == 341 << 1)
7690 /* lwax -> lwa. */
7691 insn = (58 << 26) | 2;
7692 else
7693 return 0;
7694 insn |= rtra;
7695 return insn;
7696}
7697
766bc656
AM
7698/* If INSN is an opcode that may be used with an @tprel operand, return
7699 the transformed insn for an undefined weak symbol, ie. with the
7700 thread pointer REG operand removed. Otherwise return 0. */
7701
7702unsigned int
7703_bfd_elf_ppc_at_tprel_transform (unsigned int insn, unsigned int reg)
7704{
7705 if ((insn & (0x1f << 16)) == reg << 16
7706 && ((insn & (0x3f << 26)) == 14u << 26 /* addi */
7707 || (insn & (0x3f << 26)) == 15u << 26 /* addis */
7708 || (insn & (0x3f << 26)) == 32u << 26 /* lwz */
7709 || (insn & (0x3f << 26)) == 34u << 26 /* lbz */
7710 || (insn & (0x3f << 26)) == 36u << 26 /* stw */
7711 || (insn & (0x3f << 26)) == 38u << 26 /* stb */
7712 || (insn & (0x3f << 26)) == 40u << 26 /* lhz */
7713 || (insn & (0x3f << 26)) == 42u << 26 /* lha */
7714 || (insn & (0x3f << 26)) == 44u << 26 /* sth */
7715 || (insn & (0x3f << 26)) == 46u << 26 /* lmw */
7716 || (insn & (0x3f << 26)) == 47u << 26 /* stmw */
7717 || (insn & (0x3f << 26)) == 48u << 26 /* lfs */
7718 || (insn & (0x3f << 26)) == 50u << 26 /* lfd */
7719 || (insn & (0x3f << 26)) == 52u << 26 /* stfs */
7720 || (insn & (0x3f << 26)) == 54u << 26 /* stfd */
7721 || ((insn & (0x3f << 26)) == 58u << 26 /* lwa,ld,lmd */
7722 && (insn & 3) != 1)
7723 || ((insn & (0x3f << 26)) == 62u << 26 /* std, stmd */
7724 && ((insn & 3) == 0 || (insn & 3) == 3))))
7725 {
7726 insn &= ~(0x1f << 16);
7727 }
7728 else if ((insn & (0x1f << 21)) == reg << 21
7729 && ((insn & (0x3e << 26)) == 24u << 26 /* ori, oris */
7730 || (insn & (0x3e << 26)) == 26u << 26 /* xori,xoris */
7731 || (insn & (0x3e << 26)) == 28u << 26 /* andi,andis */))
7732 {
7733 insn &= ~(0x1f << 21);
7734 insn |= (insn & (0x1f << 16)) << 5;
7735 if ((insn & (0x3e << 26)) == 26 << 26 /* xori,xoris */)
7736 insn -= 2 >> 26; /* convert to ori,oris */
7737 }
7738 else
7739 insn = 0;
7740 return insn;
7741}
7742
1fe532cf
AM
7743static bfd_boolean
7744is_insn_ds_form (unsigned int insn)
7745{
7746 return ((insn & (0x3f << 26)) == 58u << 26 /* ld,ldu,lwa */
7747 || (insn & (0x3f << 26)) == 62u << 26 /* std,stdu,stq */
7748 || (insn & (0x3f << 26)) == 57u << 26 /* lfdp */
7749 || (insn & (0x3f << 26)) == 61u << 26 /* stfdp */);
7750}
7751
7752static bfd_boolean
7753is_insn_dq_form (unsigned int insn)
7754{
a680de9a
PB
7755 return ((insn & (0x3f << 26)) == 56u << 26 /* lq */
7756 || ((insn & (0x3f << 26)) == (61u << 26) /* lxv, stxv */
7757 && (insn & 3) == 1));
1fe532cf
AM
7758}
7759
252b5132
RH
7760/* The RELOCATE_SECTION function is called by the ELF backend linker
7761 to handle the relocations for a section.
7762
7763 The relocs are always passed as Rela structures; if the section
7764 actually uses Rel structures, the r_addend field will always be
7765 zero.
7766
7767 This function is responsible for adjust the section contents as
7768 necessary, and (if using Rela relocs and generating a
1049f94e 7769 relocatable output file) adjusting the reloc addend as
252b5132
RH
7770 necessary.
7771
7772 This function does not have to worry about setting the reloc
7773 address or the reloc symbol index.
7774
7775 LOCAL_SYMS is a pointer to the swapped in local symbols.
7776
7777 LOCAL_SECTIONS is an array giving the section in the input file
7778 corresponding to the st_shndx field of each local symbol.
7779
7780 The global hash table entry for the global symbols can be found
7781 via elf_sym_hashes (input_bfd).
7782
1049f94e 7783 When generating relocatable output, this function must handle
252b5132
RH
7784 STB_LOCAL/STT_SECTION symbols specially. The output symbol is
7785 going to be the section symbol corresponding to the output
7786 section, which means that the addend must be adjusted
7787 accordingly. */
7788
b34976b6 7789static bfd_boolean
55fd94b0
AM
7790ppc_elf_relocate_section (bfd *output_bfd,
7791 struct bfd_link_info *info,
7792 bfd *input_bfd,
7793 asection *input_section,
7794 bfd_byte *contents,
7795 Elf_Internal_Rela *relocs,
7796 Elf_Internal_Sym *local_syms,
7797 asection **local_sections)
252b5132 7798{
7619e7c7
AM
7799 Elf_Internal_Shdr *symtab_hdr;
7800 struct elf_link_hash_entry **sym_hashes;
7801 struct ppc_elf_link_hash_table *htab;
7802 Elf_Internal_Rela *rel;
c316a17c 7803 Elf_Internal_Rela *wrel;
7619e7c7
AM
7804 Elf_Internal_Rela *relend;
7805 Elf_Internal_Rela outrel;
f95f8542 7806 asection *got2;
252b5132 7807 bfd_vma *local_got_offsets;
b34976b6 7808 bfd_boolean ret = TRUE;
95f0d0d2 7809 bfd_vma d_offset = (bfd_big_endian (input_bfd) ? 2 : 0);
3348747a 7810 bfd_boolean is_vxworks_tls;
d3e454b9
AM
7811 unsigned int picfixup_size = 0;
7812 struct ppc_elf_relax_info *relax_info = NULL;
b34976b6 7813
252b5132 7814#ifdef DEBUG
d003868e
AM
7815 _bfd_error_handler ("ppc_elf_relocate_section called for %B section %A, "
7816 "%ld relocations%s",
7817 input_bfd, input_section,
7818 (long) input_section->reloc_count,
0e1862bb 7819 (bfd_link_relocatable (info)) ? " (relocatable)" : "");
252b5132
RH
7820#endif
7821
a6aa5195
AM
7822 got2 = bfd_get_section_by_name (input_bfd, ".got2");
7823
e47cd125 7824 /* Initialize howto table if not already done. */
8da6118f 7825 if (!ppc_elf_howto_table[R_PPC_ADDR32])
252b5132
RH
7826 ppc_elf_howto_init ();
7827
7619e7c7 7828 htab = ppc_elf_hash_table (info);
252b5132 7829 local_got_offsets = elf_local_got_offsets (input_bfd);
0ffa91dd 7830 symtab_hdr = &elf_symtab_hdr (input_bfd);
7619e7c7 7831 sym_hashes = elf_sym_hashes (input_bfd);
3348747a
NS
7832 /* We have to handle relocations in vxworks .tls_vars sections
7833 specially, because the dynamic loader is 'weird'. */
0e1862bb 7834 is_vxworks_tls = (htab->is_vxworks && bfd_link_pic (info)
3348747a
NS
7835 && !strcmp (input_section->output_section->name,
7836 ".tls_vars"));
d3e454b9
AM
7837 if (input_section->sec_info_type == SEC_INFO_TYPE_TARGET)
7838 relax_info = elf_section_data (input_section)->sec_info;
c316a17c 7839 rel = wrel = relocs;
7619e7c7 7840 relend = relocs + input_section->reloc_count;
c316a17c 7841 for (; rel < relend; wrel++, rel++)
252b5132 7842 {
7619e7c7
AM
7843 enum elf_ppc_reloc_type r_type;
7844 bfd_vma addend;
7845 bfd_reloc_status_type r;
7846 Elf_Internal_Sym *sym;
7847 asection *sec;
7848 struct elf_link_hash_entry *h;
7849 const char *sym_name;
252b5132
RH
7850 reloc_howto_type *howto;
7851 unsigned long r_symndx;
7852 bfd_vma relocation;
91d6fa6a 7853 bfd_vma branch_bit, from;
7619e7c7
AM
7854 bfd_boolean unresolved_reloc;
7855 bfd_boolean warned;
7856 unsigned int tls_type, tls_mask, tls_gd;
e054468f 7857 struct plt_entry **ifunc;
86c95733 7858 struct reloc_howto_struct alt_howto;
7619e7c7 7859
c316a17c 7860 again:
55fd94b0
AM
7861 r_type = ELF32_R_TYPE (rel->r_info);
7862 sym = NULL;
7863 sec = NULL;
7864 h = NULL;
7619e7c7
AM
7865 unresolved_reloc = FALSE;
7866 warned = FALSE;
252b5132 7867 r_symndx = ELF32_R_SYM (rel->r_info);
560e09e9 7868
252b5132
RH
7869 if (r_symndx < symtab_hdr->sh_info)
7870 {
7871 sym = local_syms + r_symndx;
7872 sec = local_sections[r_symndx];
26c61ae5 7873 sym_name = bfd_elf_sym_name (input_bfd, symtab_hdr, sym, sec);
252b5132 7874
8517fae7 7875 relocation = _bfd_elf_rela_local_sym (output_bfd, sym, &sec, rel);
252b5132
RH
7876 }
7877 else
7878 {
62d887d4
L
7879 bfd_boolean ignored;
7880
b2a8e766
AM
7881 RELOC_FOR_GLOBAL_SYMBOL (info, input_bfd, input_section, rel,
7882 r_symndx, symtab_hdr, sym_hashes,
7883 h, sec, relocation,
62d887d4 7884 unresolved_reloc, warned, ignored);
9abc968f 7885
252b5132 7886 sym_name = h->root.root.string;
7619e7c7
AM
7887 }
7888
dbaa2011 7889 if (sec != NULL && discarded_section (sec))
ab96bf03
AM
7890 {
7891 /* For relocs against symbols from removed linkonce sections,
7892 or sections discarded by a linker script, we just want the
7893 section contents zeroed. Avoid any special processing. */
7894 howto = NULL;
7895 if (r_type < R_PPC_max)
7896 howto = ppc_elf_howto_table[r_type];
c316a17c
AM
7897
7898 _bfd_clear_contents (howto, input_bfd, input_section,
7899 contents + rel->r_offset);
7900 wrel->r_offset = rel->r_offset;
7901 wrel->r_info = 0;
7902 wrel->r_addend = 0;
7903
7904 /* For ld -r, remove relocations in debug sections against
7905 sections defined in discarded sections. Not done for
7906 non-debug to preserve relocs in .eh_frame which the
7907 eh_frame editing code expects to be present. */
7908 if (bfd_link_relocatable (info)
7909 && (input_section->flags & SEC_DEBUGGING))
7910 wrel--;
7911
7912 continue;
ab96bf03
AM
7913 }
7914
0e1862bb 7915 if (bfd_link_relocatable (info))
ab96bf03
AM
7916 {
7917 if (got2 != NULL
7918 && r_type == R_PPC_PLTREL24
f75e0e33 7919 && rel->r_addend != 0)
ab96bf03
AM
7920 {
7921 /* R_PPC_PLTREL24 is rather special. If non-zero, the
7922 addend specifies the GOT pointer offset within .got2. */
7923 rel->r_addend += got2->output_offset;
7924 }
53291d1f
AM
7925 if (r_type != R_PPC_RELAX_PLT
7926 && r_type != R_PPC_RELAX_PLTREL24
7927 && r_type != R_PPC_RELAX)
c316a17c 7928 goto copy_reloc;
ab96bf03
AM
7929 }
7930
7619e7c7
AM
7931 /* TLS optimizations. Replace instruction sequences and relocs
7932 based on information we collected in tls_optimize. We edit
7933 RELOCS so that --emit-relocs will output something sensible
7934 for the final instruction stream. */
7935 tls_mask = 0;
7936 tls_gd = 0;
727fc41e
AM
7937 if (h != NULL)
7938 tls_mask = ((struct ppc_elf_link_hash_entry *) h)->tls_mask;
7939 else if (local_got_offsets != NULL)
7619e7c7 7940 {
e054468f 7941 struct plt_entry **local_plt;
727fc41e 7942 char *lgot_masks;
e054468f
AM
7943 local_plt
7944 = (struct plt_entry **) (local_got_offsets + symtab_hdr->sh_info);
7945 lgot_masks = (char *) (local_plt + symtab_hdr->sh_info);
727fc41e 7946 tls_mask = lgot_masks[r_symndx];
7619e7c7
AM
7947 }
7948
7949 /* Ensure reloc mapping code below stays sane. */
7950 if ((R_PPC_GOT_TLSLD16 & 3) != (R_PPC_GOT_TLSGD16 & 3)
7951 || (R_PPC_GOT_TLSLD16_LO & 3) != (R_PPC_GOT_TLSGD16_LO & 3)
7952 || (R_PPC_GOT_TLSLD16_HI & 3) != (R_PPC_GOT_TLSGD16_HI & 3)
7953 || (R_PPC_GOT_TLSLD16_HA & 3) != (R_PPC_GOT_TLSGD16_HA & 3)
7954 || (R_PPC_GOT_TLSLD16 & 3) != (R_PPC_GOT_TPREL16 & 3)
7955 || (R_PPC_GOT_TLSLD16_LO & 3) != (R_PPC_GOT_TPREL16_LO & 3)
7956 || (R_PPC_GOT_TLSLD16_HI & 3) != (R_PPC_GOT_TPREL16_HI & 3)
7957 || (R_PPC_GOT_TLSLD16_HA & 3) != (R_PPC_GOT_TPREL16_HA & 3))
7958 abort ();
7959 switch (r_type)
7960 {
7961 default:
7962 break;
7963
7964 case R_PPC_GOT_TPREL16:
7965 case R_PPC_GOT_TPREL16_LO:
e054468f 7966 if ((tls_mask & TLS_TLS) != 0
7619e7c7
AM
7967 && (tls_mask & TLS_TPREL) == 0)
7968 {
7969 bfd_vma insn;
91d6fa6a 7970
95f0d0d2 7971 insn = bfd_get_32 (input_bfd,
c316a17c 7972 contents + rel->r_offset - d_offset);
7619e7c7
AM
7973 insn &= 31 << 21;
7974 insn |= 0x3c020000; /* addis 0,2,0 */
95f0d0d2 7975 bfd_put_32 (input_bfd, insn,
c316a17c 7976 contents + rel->r_offset - d_offset);
7619e7c7
AM
7977 r_type = R_PPC_TPREL16_HA;
7978 rel->r_info = ELF32_R_INFO (r_symndx, r_type);
7979 }
7980 break;
7981
7982 case R_PPC_TLS:
e054468f 7983 if ((tls_mask & TLS_TLS) != 0
7619e7c7
AM
7984 && (tls_mask & TLS_TPREL) == 0)
7985 {
2d0f3896
AM
7986 bfd_vma insn;
7987
95f0d0d2 7988 insn = bfd_get_32 (input_bfd, contents + rel->r_offset);
2d0f3896
AM
7989 insn = _bfd_elf_ppc_at_tls_transform (insn, 2);
7990 if (insn == 0)
7619e7c7 7991 abort ();
95f0d0d2 7992 bfd_put_32 (input_bfd, insn, contents + rel->r_offset);
7619e7c7
AM
7993 r_type = R_PPC_TPREL16_LO;
7994 rel->r_info = ELF32_R_INFO (r_symndx, r_type);
4fe5ca5b 7995
7619e7c7 7996 /* Was PPC_TLS which sits on insn boundary, now
4fe5ca5b
GM
7997 PPC_TPREL16_LO which is at low-order half-word. */
7998 rel->r_offset += d_offset;
7619e7c7
AM
7999 }
8000 break;
8001
8002 case R_PPC_GOT_TLSGD16_HI:
8003 case R_PPC_GOT_TLSGD16_HA:
8004 tls_gd = TLS_TPRELGD;
e054468f 8005 if ((tls_mask & TLS_TLS) != 0 && (tls_mask & TLS_GD) == 0)
7619e7c7
AM
8006 goto tls_gdld_hi;
8007 break;
8008
8009 case R_PPC_GOT_TLSLD16_HI:
8010 case R_PPC_GOT_TLSLD16_HA:
e054468f 8011 if ((tls_mask & TLS_TLS) != 0 && (tls_mask & TLS_LD) == 0)
7619e7c7
AM
8012 {
8013 tls_gdld_hi:
8014 if ((tls_mask & tls_gd) != 0)
8015 r_type = (((r_type - (R_PPC_GOT_TLSGD16 & 3)) & 3)
8016 + R_PPC_GOT_TPREL16);
8017 else
8018 {
4fe5ca5b 8019 rel->r_offset -= d_offset;
95f0d0d2 8020 bfd_put_32 (input_bfd, NOP, contents + rel->r_offset);
7619e7c7
AM
8021 r_type = R_PPC_NONE;
8022 }
8023 rel->r_info = ELF32_R_INFO (r_symndx, r_type);
8024 }
8025 break;
8026
8027 case R_PPC_GOT_TLSGD16:
8028 case R_PPC_GOT_TLSGD16_LO:
8029 tls_gd = TLS_TPRELGD;
e054468f 8030 if ((tls_mask & TLS_TLS) != 0 && (tls_mask & TLS_GD) == 0)
b7fcf6f6 8031 goto tls_ldgd_opt;
7619e7c7
AM
8032 break;
8033
8034 case R_PPC_GOT_TLSLD16:
8035 case R_PPC_GOT_TLSLD16_LO:
e054468f 8036 if ((tls_mask & TLS_TLS) != 0 && (tls_mask & TLS_LD) == 0)
7619e7c7 8037 {
3a71aa26 8038 unsigned int insn1, insn2;
b7fcf6f6 8039 bfd_vma offset;
7619e7c7 8040
b7fcf6f6 8041 tls_ldgd_opt:
727fc41e
AM
8042 offset = (bfd_vma) -1;
8043 /* If not using the newer R_PPC_TLSGD/LD to mark
8044 __tls_get_addr calls, we must trust that the call
8045 stays with its arg setup insns, ie. that the next
8046 reloc is the __tls_get_addr call associated with
8047 the current reloc. Edit both insns. */
8048 if (input_section->has_tls_get_addr_call
8049 && rel + 1 < relend
8050 && branch_reloc_hash_match (input_bfd, rel + 1,
8051 htab->tls_get_addr))
8052 offset = rel[1].r_offset;
b86ac8e3
AM
8053 /* We read the low GOT_TLS insn because we need to keep
8054 the destination reg. It may be something other than
8055 the usual r3, and moved to r3 before the call by
8056 intervening code. */
95f0d0d2 8057 insn1 = bfd_get_32 (input_bfd,
b86ac8e3 8058 contents + rel->r_offset - d_offset);
b7fcf6f6
AM
8059 if ((tls_mask & tls_gd) != 0)
8060 {
8061 /* IE */
b86ac8e3 8062 insn1 &= (0x1f << 21) | (0x1f << 16);
b7fcf6f6 8063 insn1 |= 32 << 26; /* lwz */
727fc41e
AM
8064 if (offset != (bfd_vma) -1)
8065 {
f58d5a2d 8066 rel[1].r_info = ELF32_R_INFO (STN_UNDEF, R_PPC_NONE);
727fc41e 8067 insn2 = 0x7c631214; /* add 3,3,2 */
95f0d0d2 8068 bfd_put_32 (input_bfd, insn2, contents + offset);
727fc41e 8069 }
b7fcf6f6
AM
8070 r_type = (((r_type - (R_PPC_GOT_TLSGD16 & 3)) & 3)
8071 + R_PPC_GOT_TPREL16);
8072 rel->r_info = ELF32_R_INFO (r_symndx, r_type);
8073 }
8074 else
8075 {
8076 /* LE */
b86ac8e3
AM
8077 insn1 &= 0x1f << 21;
8078 insn1 |= 0x3c020000; /* addis r,2,0 */
7619e7c7
AM
8079 if (tls_gd == 0)
8080 {
b7fcf6f6 8081 /* Was an LD reloc. */
1d483afe
AM
8082 for (r_symndx = 0;
8083 r_symndx < symtab_hdr->sh_info;
8084 r_symndx++)
8085 if (local_sections[r_symndx] == sec)
8086 break;
8087 if (r_symndx >= symtab_hdr->sh_info)
cf35638d 8088 r_symndx = STN_UNDEF;
b7fcf6f6 8089 rel->r_addend = htab->elf.tls_sec->vma + DTP_OFFSET;
cf35638d 8090 if (r_symndx != STN_UNDEF)
1d483afe
AM
8091 rel->r_addend -= (local_syms[r_symndx].st_value
8092 + sec->output_offset
8093 + sec->output_section->vma);
7619e7c7 8094 }
b7fcf6f6
AM
8095 r_type = R_PPC_TPREL16_HA;
8096 rel->r_info = ELF32_R_INFO (r_symndx, r_type);
727fc41e
AM
8097 if (offset != (bfd_vma) -1)
8098 {
8099 rel[1].r_info = ELF32_R_INFO (r_symndx, R_PPC_TPREL16_LO);
8100 rel[1].r_offset = offset + d_offset;
8101 rel[1].r_addend = rel->r_addend;
8102 insn2 = 0x38630000; /* addi 3,3,0 */
95f0d0d2 8103 bfd_put_32 (input_bfd, insn2, contents + offset);
727fc41e 8104 }
b7fcf6f6 8105 }
95f0d0d2 8106 bfd_put_32 (input_bfd, insn1,
b7fcf6f6 8107 contents + rel->r_offset - d_offset);
b7fcf6f6
AM
8108 if (tls_gd == 0)
8109 {
8110 /* We changed the symbol on an LD reloc. Start over
8111 in order to get h, sym, sec etc. right. */
c316a17c 8112 goto again;
7619e7c7 8113 }
252b5132 8114 }
7619e7c7 8115 break;
727fc41e
AM
8116
8117 case R_PPC_TLSGD:
e054468f 8118 if ((tls_mask & TLS_TLS) != 0 && (tls_mask & TLS_GD) == 0)
727fc41e
AM
8119 {
8120 unsigned int insn2;
8121 bfd_vma offset = rel->r_offset;
8122
8123 if ((tls_mask & TLS_TPRELGD) != 0)
8124 {
8125 /* IE */
8126 r_type = R_PPC_NONE;
8127 insn2 = 0x7c631214; /* add 3,3,2 */
8128 }
8129 else
8130 {
8131 /* LE */
8132 r_type = R_PPC_TPREL16_LO;
8133 rel->r_offset += d_offset;
8134 insn2 = 0x38630000; /* addi 3,3,0 */
8135 }
8136 rel->r_info = ELF32_R_INFO (r_symndx, r_type);
95f0d0d2 8137 bfd_put_32 (input_bfd, insn2, contents + offset);
727fc41e
AM
8138 /* Zap the reloc on the _tls_get_addr call too. */
8139 BFD_ASSERT (offset == rel[1].r_offset);
f58d5a2d 8140 rel[1].r_info = ELF32_R_INFO (STN_UNDEF, R_PPC_NONE);
727fc41e
AM
8141 }
8142 break;
8143
8144 case R_PPC_TLSLD:
e054468f 8145 if ((tls_mask & TLS_TLS) != 0 && (tls_mask & TLS_LD) == 0)
727fc41e
AM
8146 {
8147 unsigned int insn2;
8148
8149 for (r_symndx = 0;
8150 r_symndx < symtab_hdr->sh_info;
8151 r_symndx++)
8152 if (local_sections[r_symndx] == sec)
8153 break;
8154 if (r_symndx >= symtab_hdr->sh_info)
cf35638d 8155 r_symndx = STN_UNDEF;
727fc41e 8156 rel->r_addend = htab->elf.tls_sec->vma + DTP_OFFSET;
cf35638d 8157 if (r_symndx != STN_UNDEF)
727fc41e
AM
8158 rel->r_addend -= (local_syms[r_symndx].st_value
8159 + sec->output_offset
8160 + sec->output_section->vma);
8161
8162 rel->r_info = ELF32_R_INFO (r_symndx, R_PPC_TPREL16_LO);
8163 rel->r_offset += d_offset;
8164 insn2 = 0x38630000; /* addi 3,3,0 */
95f0d0d2 8165 bfd_put_32 (input_bfd, insn2,
727fc41e
AM
8166 contents + rel->r_offset - d_offset);
8167 /* Zap the reloc on the _tls_get_addr call too. */
8168 BFD_ASSERT (rel->r_offset - d_offset == rel[1].r_offset);
f58d5a2d 8169 rel[1].r_info = ELF32_R_INFO (STN_UNDEF, R_PPC_NONE);
c316a17c 8170 goto again;
727fc41e
AM
8171 }
8172 break;
7619e7c7
AM
8173 }
8174
8175 /* Handle other relocations that tweak non-addend part of insn. */
8176 branch_bit = 0;
8177 switch (r_type)
8178 {
8179 default:
8180 break;
8181
8182 /* Branch taken prediction relocations. */
8183 case R_PPC_ADDR14_BRTAKEN:
8184 case R_PPC_REL14_BRTAKEN:
8185 branch_bit = BRANCH_PREDICT_BIT;
1a0670f3 8186 /* Fall through. */
7619e7c7 8187
4cc11e76 8188 /* Branch not taken prediction relocations. */
7619e7c7
AM
8189 case R_PPC_ADDR14_BRNTAKEN:
8190 case R_PPC_REL14_BRNTAKEN:
91d6fa6a
NC
8191 {
8192 bfd_vma insn;
7619e7c7 8193
95f0d0d2 8194 insn = bfd_get_32 (input_bfd, contents + rel->r_offset);
91d6fa6a
NC
8195 insn &= ~BRANCH_PREDICT_BIT;
8196 insn |= branch_bit;
7619e7c7 8197
91d6fa6a
NC
8198 from = (rel->r_offset
8199 + input_section->output_offset
8200 + input_section->output_section->vma);
7619e7c7 8201
91d6fa6a
NC
8202 /* Invert 'y' bit if not the default. */
8203 if ((bfd_signed_vma) (relocation + rel->r_addend - from) < 0)
8204 insn ^= BRANCH_PREDICT_BIT;
8205
95f0d0d2 8206 bfd_put_32 (input_bfd, insn, contents + rel->r_offset);
91d6fa6a
NC
8207 break;
8208 }
252b5132
RH
8209 }
8210
d3e454b9
AM
8211 if (ELIMINATE_COPY_RELOCS
8212 && h != NULL
8213 && !h->def_regular
8214 && h->protected_def
8215 && ppc_elf_hash_entry (h)->has_addr16_ha
8216 && ppc_elf_hash_entry (h)->has_addr16_lo
8217 && htab->params->pic_fixup > 0)
8218 {
8219 /* Convert lis;addi or lis;load/store accessing a protected
8220 variable defined in a shared library to PIC. */
8221 unsigned int insn;
8222
8223 if (r_type == R_PPC_ADDR16_HA)
8224 {
95f0d0d2 8225 insn = bfd_get_32 (input_bfd,
d3e454b9
AM
8226 contents + rel->r_offset - d_offset);
8227 if ((insn & (0x3f << 26)) == (15u << 26)
8228 && (insn & (0x1f << 16)) == 0 /* lis */)
8229 {
8230 bfd_byte *p;
8231 bfd_vma off;
8232 bfd_vma got_addr;
8233
8234 p = (contents + input_section->size
8235 - relax_info->workaround_size
8236 - relax_info->picfixup_size
8237 + picfixup_size);
8238 off = (p - contents) - (rel->r_offset - d_offset);
8239 if (off > 0x1fffffc || (off & 3) != 0)
8240 info->callbacks->einfo
174d0a74 8241 (_("%H: fixup branch overflow\n"),
d3e454b9
AM
8242 input_bfd, input_section, rel->r_offset);
8243
95f0d0d2 8244 bfd_put_32 (input_bfd, B | off,
d3e454b9 8245 contents + rel->r_offset - d_offset);
ce558b89
AM
8246 got_addr = (htab->elf.sgot->output_section->vma
8247 + htab->elf.sgot->output_offset
d3e454b9 8248 + (h->got.offset & ~1));
c316a17c
AM
8249 wrel->r_offset = (p - contents) + d_offset;
8250 wrel->r_info = ELF32_R_INFO (0, R_PPC_ADDR16_HA);
8251 wrel->r_addend = got_addr;
d3e454b9 8252 insn &= ~0xffff;
4aef7643 8253 insn |= ((unsigned int) (got_addr + 0x8000) >> 16) & 0xffff;
95f0d0d2 8254 bfd_put_32 (input_bfd, insn, p);
d3e454b9
AM
8255
8256 /* Convert lis to lwz, loading address from GOT. */
8257 insn &= ~0xffff;
8258 insn ^= (32u ^ 15u) << 26;
8259 insn |= (insn & (0x1f << 21)) >> 5;
8260 insn |= got_addr & 0xffff;
95f0d0d2 8261 bfd_put_32 (input_bfd, insn, p + 4);
d3e454b9 8262
95f0d0d2 8263 bfd_put_32 (input_bfd, B | ((-4 - off) & 0x3ffffff), p + 8);
d3e454b9
AM
8264 picfixup_size += 12;
8265
8266 /* Use one of the spare relocs, so --emit-relocs
8267 output is reasonable. */
8268 memmove (rel + 1, rel, (relend - rel - 1) * sizeof (*rel));
c316a17c
AM
8269 wrel++, rel++;
8270 rel->r_offset = wrel[-1].r_offset + 4;
d3e454b9 8271 rel->r_info = ELF32_R_INFO (0, R_PPC_ADDR16_LO);
c316a17c 8272 rel->r_addend = wrel[-1].r_addend;
d3e454b9
AM
8273
8274 /* Continue on as if we had a got reloc, to output
8275 dynamic reloc. */
8276 r_type = R_PPC_GOT16_LO;
8277 }
8278 else
8279 info->callbacks->einfo
695344c0 8280 /* xgettext:c-format */
174d0a74 8281 (_("%H: error: %s with unexpected instruction %x\n"),
d3e454b9
AM
8282 input_bfd, input_section, rel->r_offset,
8283 "R_PPC_ADDR16_HA", insn);
8284 }
8285 else if (r_type == R_PPC_ADDR16_LO)
8286 {
95f0d0d2 8287 insn = bfd_get_32 (input_bfd,
d3e454b9
AM
8288 contents + rel->r_offset - d_offset);
8289 if ((insn & (0x3f << 26)) == 14u << 26 /* addi */
8290 || (insn & (0x3f << 26)) == 32u << 26 /* lwz */
8291 || (insn & (0x3f << 26)) == 34u << 26 /* lbz */
8292 || (insn & (0x3f << 26)) == 36u << 26 /* stw */
8293 || (insn & (0x3f << 26)) == 38u << 26 /* stb */
8294 || (insn & (0x3f << 26)) == 40u << 26 /* lhz */
8295 || (insn & (0x3f << 26)) == 42u << 26 /* lha */
8296 || (insn & (0x3f << 26)) == 44u << 26 /* sth */
8297 || (insn & (0x3f << 26)) == 46u << 26 /* lmw */
8298 || (insn & (0x3f << 26)) == 47u << 26 /* stmw */
8299 || (insn & (0x3f << 26)) == 48u << 26 /* lfs */
8300 || (insn & (0x3f << 26)) == 50u << 26 /* lfd */
8301 || (insn & (0x3f << 26)) == 52u << 26 /* stfs */
8302 || (insn & (0x3f << 26)) == 54u << 26 /* stfd */
8303 || ((insn & (0x3f << 26)) == 58u << 26 /* lwa,ld,lmd */
8304 && (insn & 3) != 1)
8305 || ((insn & (0x3f << 26)) == 62u << 26 /* std, stmd */
8306 && ((insn & 3) == 0 || (insn & 3) == 3)))
8307 {
8308 /* Arrange to apply the reloc addend, if any. */
8309 relocation = 0;
8310 unresolved_reloc = FALSE;
8311 rel->r_info = ELF32_R_INFO (0, r_type);
8312 }
8313 else
8314 info->callbacks->einfo
695344c0 8315 /* xgettext:c-format */
174d0a74 8316 (_("%H: error: %s with unexpected instruction %x\n"),
d3e454b9
AM
8317 input_bfd, input_section, rel->r_offset,
8318 "R_PPC_ADDR16_LO", insn);
8319 }
8320 }
8321
e054468f 8322 ifunc = NULL;
25f23106 8323 if (!htab->is_vxworks)
e054468f 8324 {
de972ffa
AM
8325 struct plt_entry *ent;
8326
e054468f
AM
8327 if (h != NULL)
8328 {
8329 if (h->type == STT_GNU_IFUNC)
8330 ifunc = &h->plt.plist;
8331 }
de972ffa
AM
8332 else if (local_got_offsets != NULL
8333 && ELF_ST_TYPE (sym->st_info) == STT_GNU_IFUNC)
e054468f 8334 {
de972ffa 8335 struct plt_entry **local_plt;
e054468f 8336
de972ffa
AM
8337 local_plt = (struct plt_entry **) (local_got_offsets
8338 + symtab_hdr->sh_info);
8339 ifunc = local_plt + r_symndx;
e054468f 8340 }
e054468f 8341
de972ffa
AM
8342 ent = NULL;
8343 if (ifunc != NULL
0e1862bb 8344 && (!bfd_link_pic (info)
de972ffa
AM
8345 || is_branch_reloc (r_type)))
8346 {
8347 addend = 0;
0e1862bb 8348 if (r_type == R_PPC_PLTREL24 && bfd_link_pic (info))
de972ffa
AM
8349 addend = rel->r_addend;
8350 ent = find_plt_ent (ifunc, got2, addend);
8351 }
8352 if (ent != NULL)
8353 {
888a7fc3
AM
8354 if (bfd_link_pic (info)
8355 && ent->sec != got2
8356 && htab->plt_type != PLT_NEW
8357 && (!htab->elf.dynamic_sections_created
8358 || h == NULL
8359 || h->dynindx == -1))
8360 {
8361 /* Uh oh, we are going to create a pic glink stub
8362 for an ifunc (here for h == NULL and later in
8363 finish_dynamic_symbol for h != NULL), and
8364 apparently are using code compiled with
8365 -mbss-plt. The difficulty is that -mbss-plt code
8366 gives no indication via a magic PLTREL24 addend
8367 whether r30 is equal to _GLOBAL_OFFSET_TABLE_ or
8368 is pointing into a .got2 section (and how far
8369 into .got2). */
8370 info->callbacks->einfo
695344c0 8371 /* xgettext:c-format */
174d0a74 8372 (_("%X%H: unsupported bss-plt -fPIC ifunc %s\n"),
888a7fc3
AM
8373 input_bfd, input_section, rel->r_offset, sym_name);
8374 }
e054468f
AM
8375 if (h == NULL && (ent->plt.offset & 1) == 0)
8376 {
8377 Elf_Internal_Rela rela;
8378 bfd_byte *loc;
8379
ce558b89
AM
8380 rela.r_offset = (htab->elf.iplt->output_section->vma
8381 + htab->elf.iplt->output_offset
e054468f
AM
8382 + ent->plt.offset);
8383 rela.r_info = ELF32_R_INFO (0, R_PPC_IRELATIVE);
8384 rela.r_addend = relocation;
ce558b89
AM
8385 loc = htab->elf.irelplt->contents;
8386 loc += (htab->elf.irelplt->reloc_count++
25f23106 8387 * sizeof (Elf32_External_Rela));
e054468f
AM
8388 bfd_elf32_swap_reloca_out (output_bfd, &rela, loc);
8389
8390 ent->plt.offset |= 1;
8391 }
8392 if (h == NULL && (ent->glink_offset & 1) == 0)
8393 {
a7f2871e
AM
8394 unsigned char *p = ((unsigned char *) htab->glink->contents
8395 + ent->glink_offset);
ce558b89 8396 write_glink_stub (ent, htab->elf.iplt, p, info);
e054468f
AM
8397 ent->glink_offset |= 1;
8398 }
8399
8400 unresolved_reloc = FALSE;
8401 if (htab->plt_type == PLT_NEW
8402 || !htab->elf.dynamic_sections_created
c7e17e05
AM
8403 || h == NULL
8404 || h->dynindx == -1)
e054468f
AM
8405 relocation = (htab->glink->output_section->vma
8406 + htab->glink->output_offset
8407 + (ent->glink_offset & ~1));
8408 else
ce558b89
AM
8409 relocation = (htab->elf.splt->output_section->vma
8410 + htab->elf.splt->output_offset
e054468f
AM
8411 + ent->plt.offset);
8412 }
8413 }
8414
7619e7c7
AM
8415 addend = rel->r_addend;
8416 tls_type = 0;
8417 howto = NULL;
55fd94b0
AM
8418 if (r_type < R_PPC_max)
8419 howto = ppc_elf_howto_table[r_type];
7619e7c7 8420 switch (r_type)
252b5132
RH
8421 {
8422 default:
25f53a85 8423 info->callbacks->einfo
695344c0 8424 /* xgettext:c-format */
8de848d8 8425 (_("%P: %B: unknown relocation type %d for symbol %s\n"),
d003868e 8426 input_bfd, (int) r_type, sym_name);
252b5132
RH
8427
8428 bfd_set_error (bfd_error_bad_value);
b34976b6 8429 ret = FALSE;
c316a17c 8430 goto copy_reloc;
252b5132 8431
7619e7c7
AM
8432 case R_PPC_NONE:
8433 case R_PPC_TLS:
727fc41e
AM
8434 case R_PPC_TLSGD:
8435 case R_PPC_TLSLD:
7619e7c7
AM
8436 case R_PPC_EMB_MRKREF:
8437 case R_PPC_GNU_VTINHERIT:
8438 case R_PPC_GNU_VTENTRY:
c316a17c 8439 goto copy_reloc;
7595d193 8440
7619e7c7
AM
8441 /* GOT16 relocations. Like an ADDR16 using the symbol's
8442 address in the GOT as relocation value instead of the
8443 symbol's value itself. Also, create a GOT entry for the
8444 symbol and put the symbol value there. */
8445 case R_PPC_GOT_TLSGD16:
8446 case R_PPC_GOT_TLSGD16_LO:
8447 case R_PPC_GOT_TLSGD16_HI:
8448 case R_PPC_GOT_TLSGD16_HA:
8449 tls_type = TLS_TLS | TLS_GD;
8450 goto dogot;
8451
8452 case R_PPC_GOT_TLSLD16:
8453 case R_PPC_GOT_TLSLD16_LO:
8454 case R_PPC_GOT_TLSLD16_HI:
8455 case R_PPC_GOT_TLSLD16_HA:
8456 tls_type = TLS_TLS | TLS_LD;
8457 goto dogot;
8458
8459 case R_PPC_GOT_TPREL16:
8460 case R_PPC_GOT_TPREL16_LO:
8461 case R_PPC_GOT_TPREL16_HI:
8462 case R_PPC_GOT_TPREL16_HA:
8463 tls_type = TLS_TLS | TLS_TPREL;
8464 goto dogot;
8465
8466 case R_PPC_GOT_DTPREL16:
8467 case R_PPC_GOT_DTPREL16_LO:
8468 case R_PPC_GOT_DTPREL16_HI:
8469 case R_PPC_GOT_DTPREL16_HA:
8470 tls_type = TLS_TLS | TLS_DTPREL;
8471 goto dogot;
8472
8473 case R_PPC_GOT16:
8474 case R_PPC_GOT16_LO:
8475 case R_PPC_GOT16_HI:
8476 case R_PPC_GOT16_HA:
727fc41e 8477 tls_mask = 0;
7619e7c7
AM
8478 dogot:
8479 {
8480 /* Relocation is to the entry for this symbol in the global
8481 offset table. */
8482 bfd_vma off;
8483 bfd_vma *offp;
8484 unsigned long indx;
8485
ce558b89 8486 if (htab->elf.sgot == NULL)
7619e7c7
AM
8487 abort ();
8488
8489 indx = 0;
8490 if (tls_type == (TLS_TLS | TLS_LD)
d881513a 8491 && (h == NULL
f5385ebf 8492 || !h->def_dynamic))
7619e7c7
AM
8493 offp = &htab->tlsld_got.offset;
8494 else if (h != NULL)
8495 {
f0158f44
AM
8496 if (!htab->elf.dynamic_sections_created
8497 || h->dynindx == -1
8498 || SYMBOL_REFERENCES_LOCAL (info, h)
8499 || (ELF_ST_VISIBILITY (h->other) != STV_DEFAULT
8500 && h->root.type == bfd_link_hash_undefweak))
7619e7c7
AM
8501 /* This is actually a static link, or it is a
8502 -Bsymbolic link and the symbol is defined
8503 locally, or the symbol was forced to be local
8504 because of a version file. */
8505 ;
8506 else
8507 {
8508 indx = h->dynindx;
8509 unresolved_reloc = FALSE;
8510 }
8511 offp = &h->got.offset;
8512 }
8513 else
8514 {
8515 if (local_got_offsets == NULL)
8516 abort ();
8517 offp = &local_got_offsets[r_symndx];
8518 }
8519
8520 /* The offset must always be a multiple of 4. We use the
8521 least significant bit to record whether we have already
8522 processed this entry. */
8523 off = *offp;
8524 if ((off & 1) != 0)
8525 off &= ~1;
8526 else
8527 {
70bccea4
AM
8528 unsigned int tls_m = (tls_mask
8529 & (TLS_LD | TLS_GD | TLS_DTPREL
8530 | TLS_TPREL | TLS_TPRELGD));
8531
8532 if (offp == &htab->tlsld_got.offset)
8533 tls_m = TLS_LD;
8534 else if (h == NULL
f5385ebf 8535 || !h->def_dynamic)
70bccea4
AM
8536 tls_m &= ~TLS_LD;
8537
8538 /* We might have multiple got entries for this sym.
8539 Initialize them all. */
8540 do
7619e7c7 8541 {
70bccea4
AM
8542 int tls_ty = 0;
8543
8544 if ((tls_m & TLS_LD) != 0)
7619e7c7 8545 {
70bccea4
AM
8546 tls_ty = TLS_TLS | TLS_LD;
8547 tls_m &= ~TLS_LD;
8548 }
8549 else if ((tls_m & TLS_GD) != 0)
8550 {
8551 tls_ty = TLS_TLS | TLS_GD;
8552 tls_m &= ~TLS_GD;
8553 }
8554 else if ((tls_m & TLS_DTPREL) != 0)
8555 {
8556 tls_ty = TLS_TLS | TLS_DTPREL;
8557 tls_m &= ~TLS_DTPREL;
8558 }
8559 else if ((tls_m & (TLS_TPREL | TLS_TPRELGD)) != 0)
8560 {
8561 tls_ty = TLS_TLS | TLS_TPREL;
8562 tls_m = 0;
7619e7c7 8563 }
7619e7c7 8564
70bccea4 8565 /* Generate relocs for the dynamic linker. */
f0158f44
AM
8566 if (indx != 0
8567 || (bfd_link_pic (info)
8568 && (h == NULL
8569 || ELF_ST_VISIBILITY (h->other) == STV_DEFAULT
8570 || h->root.type != bfd_link_hash_undefweak
8571 || offp == &htab->tlsld_got.offset)))
7619e7c7 8572 {
ce558b89 8573 asection *rsec = htab->elf.srelgot;
91d6fa6a 8574 bfd_byte * loc;
91e21fb7 8575
0bed072f 8576 if (ifunc != NULL)
ce558b89
AM
8577 rsec = htab->elf.irelplt;
8578 outrel.r_offset = (htab->elf.sgot->output_section->vma
8579 + htab->elf.sgot->output_offset
70bccea4 8580 + off);
e515b051 8581 outrel.r_addend = 0;
70bccea4
AM
8582 if (tls_ty & (TLS_LD | TLS_GD))
8583 {
8584 outrel.r_info = ELF32_R_INFO (indx, R_PPC_DTPMOD32);
70bccea4
AM
8585 if (tls_ty == (TLS_TLS | TLS_GD))
8586 {
25f23106
AM
8587 loc = rsec->contents;
8588 loc += (rsec->reloc_count++
70bccea4
AM
8589 * sizeof (Elf32_External_Rela));
8590 bfd_elf32_swap_reloca_out (output_bfd,
8591 &outrel, loc);
e515b051 8592 outrel.r_offset += 4;
70bccea4
AM
8593 outrel.r_info
8594 = ELF32_R_INFO (indx, R_PPC_DTPREL32);
70bccea4
AM
8595 }
8596 }
8597 else if (tls_ty == (TLS_TLS | TLS_DTPREL))
8598 outrel.r_info = ELF32_R_INFO (indx, R_PPC_DTPREL32);
8599 else if (tls_ty == (TLS_TLS | TLS_TPREL))
8600 outrel.r_info = ELF32_R_INFO (indx, R_PPC_TPREL32);
25f23106 8601 else if (indx != 0)
70bccea4 8602 outrel.r_info = ELF32_R_INFO (indx, R_PPC_GLOB_DAT);
25f23106
AM
8603 else if (ifunc != NULL)
8604 outrel.r_info = ELF32_R_INFO (0, R_PPC_IRELATIVE);
8605 else
8606 outrel.r_info = ELF32_R_INFO (0, R_PPC_RELATIVE);
d6e14abc 8607 if (indx == 0 && tls_ty != (TLS_TLS | TLS_LD))
e515b051
AM
8608 {
8609 outrel.r_addend += relocation;
8610 if (tls_ty & (TLS_GD | TLS_DTPREL | TLS_TPREL))
989f9879
AM
8611 {
8612 if (htab->elf.tls_sec == NULL)
8613 outrel.r_addend = 0;
8614 else
8615 outrel.r_addend -= htab->elf.tls_sec->vma;
8616 }
e515b051 8617 }
25f23106
AM
8618 loc = rsec->contents;
8619 loc += (rsec->reloc_count++
70bccea4
AM
8620 * sizeof (Elf32_External_Rela));
8621 bfd_elf32_swap_reloca_out (output_bfd, &outrel, loc);
7619e7c7
AM
8622 }
8623
70bccea4
AM
8624 /* Init the .got section contents if we're not
8625 emitting a reloc. */
8626 else
7619e7c7 8627 {
70bccea4 8628 bfd_vma value = relocation;
f0158f44
AM
8629 int tlsopt = (htab->plt_type == PLT_NEW
8630 && !htab->params->no_tls_get_addr_opt
8631 && htab->tls_get_addr != NULL
8632 && htab->tls_get_addr->plt.plist != NULL);
70bccea4 8633
f0158f44 8634 if (tls_ty != 0)
70bccea4 8635 {
989f9879
AM
8636 if (htab->elf.tls_sec == NULL)
8637 value = 0;
8638 else
8639 {
f0158f44
AM
8640 if (tls_ty & TLS_LD)
8641 value = 0;
8642 else
8643 value -= htab->elf.tls_sec->vma + DTP_OFFSET;
8644 if ((tls_ty & TLS_TPREL)
8645 || (tlsopt && !(tls_ty & TLS_DTPREL)))
989f9879
AM
8646 value += DTP_OFFSET - TP_OFFSET;
8647 }
70bccea4 8648
f0158f44 8649 if (tls_ty & (TLS_LD | TLS_GD))
7b609f53 8650 {
95f0d0d2 8651 bfd_put_32 (input_bfd, value,
ce558b89 8652 htab->elf.sgot->contents + off + 4);
f0158f44 8653 value = !tlsopt;
7b609f53 8654 }
70bccea4 8655 }
95f0d0d2 8656 bfd_put_32 (input_bfd, value,
ce558b89 8657 htab->elf.sgot->contents + off);
7619e7c7 8658 }
70bccea4
AM
8659
8660 off += 4;
8661 if (tls_ty & (TLS_LD | TLS_GD))
8662 off += 4;
7619e7c7 8663 }
70bccea4
AM
8664 while (tls_m != 0);
8665
8666 off = *offp;
8667 *offp = off | 1;
7619e7c7
AM
8668 }
8669
8670 if (off >= (bfd_vma) -2)
8671 abort ();
8672
70bccea4
AM
8673 if ((tls_type & TLS_TLS) != 0)
8674 {
8675 if (tls_type != (TLS_TLS | TLS_LD))
8676 {
8677 if ((tls_mask & TLS_LD) != 0
8678 && !(h == NULL
f5385ebf 8679 || !h->def_dynamic))
70bccea4
AM
8680 off += 8;
8681 if (tls_type != (TLS_TLS | TLS_GD))
8682 {
8683 if ((tls_mask & TLS_GD) != 0)
8684 off += 8;
8685 if (tls_type != (TLS_TLS | TLS_DTPREL))
8686 {
8687 if ((tls_mask & TLS_DTPREL) != 0)
8688 off += 4;
8689 }
8690 }
8691 }
8692 }
8693
d3e454b9
AM
8694 /* If here for a picfixup, we're done. */
8695 if (r_type != ELF32_R_TYPE (rel->r_info))
c316a17c 8696 goto copy_reloc;
d3e454b9 8697
ce558b89
AM
8698 relocation = (htab->elf.sgot->output_section->vma
8699 + htab->elf.sgot->output_offset
e87d4038
AM
8700 + off
8701 - SYM_VAL (htab->elf.hgot));
7619e7c7
AM
8702
8703 /* Addends on got relocations don't make much sense.
8704 x+off@got is actually x@got+off, and since the got is
8705 generated by a hash table traversal, the value in the
8706 got at entry m+n bears little relation to the entry m. */
8707 if (addend != 0)
25f53a85 8708 info->callbacks->einfo
695344c0 8709 /* xgettext:c-format */
174d0a74 8710 (_("%H: non-zero addend on %s reloc against `%s'\n"),
25f53a85 8711 input_bfd, input_section, rel->r_offset,
7b609f53 8712 howto->name,
7619e7c7
AM
8713 sym_name);
8714 }
86c95733 8715 break;
7619e7c7 8716
86c95733 8717 /* Relocations that need no special processing. */
7619e7c7 8718 case R_PPC_LOCAL24PC:
252b5132
RH
8719 /* It makes no sense to point a local relocation
8720 at a symbol not in this object. */
7b609f53 8721 if (unresolved_reloc)
252b5132 8722 {
1a72702b
AM
8723 (*info->callbacks->undefined_symbol) (info,
8724 h->root.root.string,
8725 input_bfd,
8726 input_section,
8727 rel->r_offset,
8728 TRUE);
c316a17c 8729 goto copy_reloc;
252b5132 8730 }
888a7fc3
AM
8731 if (h != NULL && h->type == STT_GNU_IFUNC && bfd_link_pic (info))
8732 {
8733 /* @local on an ifunc does not really make sense since
8734 the ifunc resolver can take you anywhere. More
8735 seriously, calls to ifuncs must go through a plt call
8736 stub, and for pic the plt call stubs uses r30 to
8737 access the PLT. The problem is that a call that is
8738 local won't have the +32k reloc addend trick marking
8739 -fPIC code, so the linker won't know whether r30 is
8740 _GLOBAL_OFFSET_TABLE_ or pointing into a .got2 section. */
695344c0 8741 /* xgettext:c-format */
174d0a74 8742 info->callbacks->einfo (_("%X%H: @local call to ifunc %s\n"),
888a7fc3
AM
8743 input_bfd, input_section, rel->r_offset,
8744 h->root.root.string);
8745 }
252b5132
RH
8746 break;
8747
7619e7c7
AM
8748 case R_PPC_DTPREL16:
8749 case R_PPC_DTPREL16_LO:
8750 case R_PPC_DTPREL16_HI:
8751 case R_PPC_DTPREL16_HA:
989f9879
AM
8752 if (htab->elf.tls_sec != NULL)
8753 addend -= htab->elf.tls_sec->vma + DTP_OFFSET;
7619e7c7
AM
8754 break;
8755
70bccea4
AM
8756 /* Relocations that may need to be propagated if this is a shared
8757 object. */
7619e7c7
AM
8758 case R_PPC_TPREL16:
8759 case R_PPC_TPREL16_LO:
8760 case R_PPC_TPREL16_HI:
8761 case R_PPC_TPREL16_HA:
766bc656
AM
8762 if (h != NULL
8763 && h->root.type == bfd_link_hash_undefweak
8764 && h->dynindx == -1)
8765 {
8766 /* Make this relocation against an undefined weak symbol
8767 resolve to zero. This is really just a tweak, since
8768 code using weak externs ought to check that they are
8769 defined before using them. */
8770 bfd_byte *p = contents + rel->r_offset - d_offset;
95f0d0d2 8771 unsigned int insn = bfd_get_32 (input_bfd, p);
766bc656
AM
8772 insn = _bfd_elf_ppc_at_tprel_transform (insn, 2);
8773 if (insn != 0)
95f0d0d2 8774 bfd_put_32 (input_bfd, insn, p);
766bc656
AM
8775 break;
8776 }
989f9879
AM
8777 if (htab->elf.tls_sec != NULL)
8778 addend -= htab->elf.tls_sec->vma + TP_OFFSET;
7619e7c7
AM
8779 /* The TPREL16 relocs shouldn't really be used in shared
8780 libs as they will result in DT_TEXTREL being set, but
8781 support them anyway. */
8782 goto dodyn;
8783
8784 case R_PPC_TPREL32:
989f9879
AM
8785 if (htab->elf.tls_sec != NULL)
8786 addend -= htab->elf.tls_sec->vma + TP_OFFSET;
7619e7c7
AM
8787 goto dodyn;
8788
8789 case R_PPC_DTPREL32:
989f9879
AM
8790 if (htab->elf.tls_sec != NULL)
8791 addend -= htab->elf.tls_sec->vma + DTP_OFFSET;
7619e7c7
AM
8792 goto dodyn;
8793
e515b051
AM
8794 case R_PPC_DTPMOD32:
8795 relocation = 1;
8796 addend = 0;
8797 goto dodyn;
8798
d7128ce4
AM
8799 case R_PPC_REL16:
8800 case R_PPC_REL16_LO:
8801 case R_PPC_REL16_HI:
8802 case R_PPC_REL16_HA:
a680de9a 8803 case R_PPC_REL16DX_HA:
d7128ce4
AM
8804 break;
8805
7619e7c7 8806 case R_PPC_REL32:
625af618
AM
8807 if (h == NULL || h == htab->elf.hgot)
8808 break;
8809 /* fall through */
8810
8811 case R_PPC_ADDR32:
8812 case R_PPC_ADDR16:
8813 case R_PPC_ADDR16_LO:
8814 case R_PPC_ADDR16_HI:
8815 case R_PPC_ADDR16_HA:
8816 case R_PPC_UADDR32:
8817 case R_PPC_UADDR16:
8818 goto dodyn;
8819
b9c361e0
JL
8820 case R_PPC_VLE_REL8:
8821 case R_PPC_VLE_REL15:
8822 case R_PPC_VLE_REL24:
625af618 8823 case R_PPC_REL24:
7619e7c7
AM
8824 case R_PPC_REL14:
8825 case R_PPC_REL14_BRTAKEN:
8826 case R_PPC_REL14_BRNTAKEN:
252b5132
RH
8827 /* If these relocations are not to a named symbol, they can be
8828 handled right here, no need to bother the dynamic linker. */
89200bf8 8829 if (SYMBOL_CALLS_LOCAL (info, h)
3b36f7e6 8830 || h == htab->elf.hgot)
252b5132 8831 break;
70bccea4 8832 /* fall through */
252b5132 8833
7619e7c7 8834 case R_PPC_ADDR24:
7619e7c7
AM
8835 case R_PPC_ADDR14:
8836 case R_PPC_ADDR14_BRTAKEN:
8837 case R_PPC_ADDR14_BRNTAKEN:
0e1862bb 8838 if (h != NULL && !bfd_link_pic (info))
625af618
AM
8839 break;
8840 /* fall through */
8841
7619e7c7 8842 dodyn:
3348747a
NS
8843 if ((input_section->flags & SEC_ALLOC) == 0
8844 || is_vxworks_tls)
c87b5a93 8845 break;
c87b5a93 8846
0e1862bb 8847 if ((bfd_link_pic (info)
89200bf8
AM
8848 && !(h != NULL
8849 && ((h->root.type == bfd_link_hash_undefined
8850 && (ELF_ST_VISIBILITY (h->other) == STV_HIDDEN
8851 || ELF_ST_VISIBILITY (h->other) == STV_INTERNAL))
8852 || (h->root.type == bfd_link_hash_undefweak
8853 && ELF_ST_VISIBILITY (h->other) != STV_DEFAULT)))
1d483afe 8854 && (must_be_dyn_reloc (info, r_type)
f6c52c13 8855 || !SYMBOL_CALLS_LOCAL (info, h)))
ee05f2fe 8856 || (ELIMINATE_COPY_RELOCS
0e1862bb 8857 && !bfd_link_pic (info)
ee05f2fe
AM
8858 && h != NULL
8859 && h->dynindx != -1
f5385ebf 8860 && !h->non_got_ref
d3e454b9
AM
8861 && !h->def_regular
8862 && !(h->protected_def
8863 && ppc_elf_hash_entry (h)->has_addr16_ha
8864 && ppc_elf_hash_entry (h)->has_addr16_lo
8865 && htab->params->pic_fixup > 0)))
252b5132 8866 {
0bb2d96a 8867 int skip;
f95f8542
AM
8868 bfd_byte *loc;
8869 asection *sreloc;
252b5132 8870#ifdef DEBUG
55fd94b0
AM
8871 fprintf (stderr, "ppc_elf_relocate_section needs to "
8872 "create relocation for %s\n",
70bccea4
AM
8873 (h && h->root.root.string
8874 ? h->root.root.string : "<unknown>"));
252b5132
RH
8875#endif
8876
8877 /* When generating a shared object, these relocations
70bccea4
AM
8878 are copied into the output file to be resolved at run
8879 time. */
f95f8542
AM
8880 sreloc = elf_section_data (input_section)->sreloc;
8881 if (ifunc)
ce558b89 8882 sreloc = htab->elf.irelplt;
252b5132 8883 if (sreloc == NULL)
f95f8542 8884 return FALSE;
252b5132 8885
0bb2d96a 8886 skip = 0;
5b914448
AM
8887 outrel.r_offset = _bfd_elf_section_offset (output_bfd, info,
8888 input_section,
8889 rel->r_offset);
0bb2d96a
JJ
8890 if (outrel.r_offset == (bfd_vma) -1
8891 || outrel.r_offset == (bfd_vma) -2)
8892 skip = (int) outrel.r_offset;
252b5132
RH
8893 outrel.r_offset += (input_section->output_section->vma
8894 + input_section->output_offset);
8895
8896 if (skip)
8897 memset (&outrel, 0, sizeof outrel);
89200bf8
AM
8898 else if ((h != NULL
8899 && (h->root.type == bfd_link_hash_undefined
8900 || h->root.type == bfd_link_hash_undefweak))
8901 || !SYMBOL_REFERENCES_LOCAL (info, h))
252b5132 8902 {
14acf4dc 8903 BFD_ASSERT (h->dynindx != -1);
7619e7c7 8904 unresolved_reloc = FALSE;
252b5132
RH
8905 outrel.r_info = ELF32_R_INFO (h->dynindx, r_type);
8906 outrel.r_addend = rel->r_addend;
8907 }
8908 else
8909 {
47388f4c
AM
8910 outrel.r_addend = relocation + rel->r_addend;
8911
25f23106 8912 if (r_type != R_PPC_ADDR32)
252b5132 8913 {
89200bf8 8914 long indx = 0;
252b5132 8915
25f23106
AM
8916 if (ifunc != NULL)
8917 {
8918 /* If we get here when building a static
8919 executable, then the libc startup function
8920 responsible for applying indirect function
8921 relocations is going to complain about
8922 the reloc type.
8923 If we get here when building a dynamic
8924 executable, it will be because we have
8925 a text relocation. The dynamic loader
8926 will set the text segment writable and
8927 non-executable to apply text relocations.
8928 So we'll segfault when trying to run the
8929 indirection function to resolve the reloc. */
25f53a85 8930 info->callbacks->einfo
695344c0 8931 /* xgettext:c-format */
174d0a74 8932 (_("%H: relocation %s for indirect "
25f53a85
AM
8933 "function %s unsupported\n"),
8934 input_bfd, input_section, rel->r_offset,
25f23106
AM
8935 howto->name,
8936 sym_name);
8937 ret = FALSE;
8938 }
cf35638d 8939 else if (r_symndx == STN_UNDEF || bfd_is_abs_section (sec))
89200bf8 8940 ;
252b5132
RH
8941 else if (sec == NULL || sec->owner == NULL)
8942 {
8943 bfd_set_error (bfd_error_bad_value);
89200bf8 8944 ret = FALSE;
252b5132
RH
8945 }
8946 else
8947 {
8948 asection *osec;
8949
47388f4c
AM
8950 /* We are turning this relocation into one
8951 against a section symbol. It would be
8952 proper to subtract the symbol's value,
8953 osec->vma, from the emitted reloc addend,
25f23106
AM
8954 but ld.so expects buggy relocs.
8955 FIXME: Why not always use a zero index? */
252b5132
RH
8956 osec = sec->output_section;
8957 indx = elf_section_data (osec)->dynindx;
74541ad4
AM
8958 if (indx == 0)
8959 {
8960 osec = htab->elf.text_index_section;
8961 indx = elf_section_data (osec)->dynindx;
8962 }
8963 BFD_ASSERT (indx != 0);
252b5132 8964#ifdef DEBUG
74541ad4 8965 if (indx == 0)
e460dd0d 8966 printf ("indx=%ld section=%s flags=%08x name=%s\n",
55fd94b0
AM
8967 indx, osec->name, osec->flags,
8968 h->root.root.string);
252b5132
RH
8969#endif
8970 }
8971
8972 outrel.r_info = ELF32_R_INFO (indx, r_type);
252b5132 8973 }
25f23106
AM
8974 else if (ifunc != NULL)
8975 outrel.r_info = ELF32_R_INFO (0, R_PPC_IRELATIVE);
8976 else
8977 outrel.r_info = ELF32_R_INFO (0, R_PPC_RELATIVE);
252b5132
RH
8978 }
8979
947216bf
AM
8980 loc = sreloc->contents;
8981 loc += sreloc->reloc_count++ * sizeof (Elf32_External_Rela);
8982 bfd_elf32_swap_reloca_out (output_bfd, &outrel, loc);
252b5132 8983
2243deae 8984 if (skip == -1)
c316a17c 8985 goto copy_reloc;
2243deae 8986
f0158f44
AM
8987 /* This reloc will be computed at runtime. Clear the memory
8988 so that it contains a predictable value for prelink. */
8989 if (!skip)
2243deae
L
8990 {
8991 relocation = howto->pc_relative ? outrel.r_offset : 0;
8992 addend = 0;
8993 break;
8994 }
252b5132 8995 }
f0158f44
AM
8996 else if (r_type == R_PPC_DTPMOD32
8997 && htab->plt_type == PLT_NEW
8998 && !htab->params->no_tls_get_addr_opt
8999 && htab->tls_get_addr != NULL
9000 && htab->tls_get_addr->plt.plist != NULL)
9001 {
9002 /* Set up for __tls_get_addr_opt stub when this entry
9003 does not have dynamic relocs. */
9004 relocation = 0;
9005 /* Set up the next word for local dynamic. If it turns
9006 out to be global dynamic, the reloc will overwrite
9007 this value. */
9008 if (rel->r_offset + 8 <= input_section->size)
9009 bfd_put_32 (input_bfd, DTP_OFFSET - TP_OFFSET,
9010 contents + rel->r_offset + 4);
9011 }
9012 else if (r_type == R_PPC_DTPREL32
9013 && htab->plt_type == PLT_NEW
9014 && !htab->params->no_tls_get_addr_opt
9015 && htab->tls_get_addr != NULL
9016 && htab->tls_get_addr->plt.plist != NULL
9017 && rel > relocs
9018 && rel[-1].r_info == ELF32_R_INFO (r_symndx, R_PPC_DTPMOD32)
9019 && rel[-1].r_offset + 4 == rel->r_offset)
9020 {
9021 /* __tls_get_addr_opt stub value. */
9022 addend += DTP_OFFSET - TP_OFFSET;
9023 }
252b5132
RH
9024 break;
9025
32af9f6e
AM
9026 case R_PPC_RELAX_PLT:
9027 case R_PPC_RELAX_PLTREL24:
de972ffa
AM
9028 if (h != NULL)
9029 {
32af9f6e
AM
9030 struct plt_entry *ent;
9031 bfd_vma got2_addend = 0;
9032
9033 if (r_type == R_PPC_RELAX_PLTREL24)
9034 {
0e1862bb 9035 if (bfd_link_pic (info))
32af9f6e
AM
9036 got2_addend = addend;
9037 addend = 0;
9038 }
9039 ent = find_plt_ent (&h->plt.plist, got2, got2_addend);
de972ffa
AM
9040 if (htab->plt_type == PLT_NEW)
9041 relocation = (htab->glink->output_section->vma
9042 + htab->glink->output_offset
9043 + ent->glink_offset);
9044 else
ce558b89
AM
9045 relocation = (htab->elf.splt->output_section->vma
9046 + htab->elf.splt->output_offset
de972ffa
AM
9047 + ent->plt.offset);
9048 }
1a0670f3 9049 /* Fall through. */
b4a38de6 9050
32af9f6e 9051 case R_PPC_RELAX:
9abc968f 9052 {
53291d1f
AM
9053 const int *stub;
9054 size_t size;
9055 size_t insn_offset = rel->r_offset;
9056 unsigned int insn;
9abc968f 9057
0e1862bb 9058 if (bfd_link_pic (info))
53291d1f
AM
9059 {
9060 relocation -= (input_section->output_section->vma
9061 + input_section->output_offset
9062 + rel->r_offset - 4);
9063 stub = shared_stub_entry;
95f0d0d2
AM
9064 bfd_put_32 (input_bfd, stub[0], contents + insn_offset - 12);
9065 bfd_put_32 (input_bfd, stub[1], contents + insn_offset - 8);
9066 bfd_put_32 (input_bfd, stub[2], contents + insn_offset - 4);
53291d1f
AM
9067 stub += 3;
9068 size = ARRAY_SIZE (shared_stub_entry) - 3;
9069 }
9070 else
9071 {
9072 stub = stub_entry;
9073 size = ARRAY_SIZE (stub_entry);
9074 }
9abc968f 9075
9abc968f 9076 relocation += addend;
0e1862bb 9077 if (bfd_link_relocatable (info))
53291d1f
AM
9078 relocation = 0;
9079
9080 /* First insn is HA, second is LO. */
9081 insn = *stub++;
9082 insn |= ((relocation + 0x8000) >> 16) & 0xffff;
95f0d0d2 9083 bfd_put_32 (input_bfd, insn, contents + insn_offset);
53291d1f
AM
9084 insn_offset += 4;
9085
9086 insn = *stub++;
9087 insn |= relocation & 0xffff;
95f0d0d2 9088 bfd_put_32 (input_bfd, insn, contents + insn_offset);
53291d1f
AM
9089 insn_offset += 4;
9090 size -= 2;
9091
9092 while (size != 0)
9093 {
9094 insn = *stub++;
9095 --size;
95f0d0d2 9096 bfd_put_32 (input_bfd, insn, contents + insn_offset);
53291d1f
AM
9097 insn_offset += 4;
9098 }
9bc4e62b
NS
9099
9100 /* Rewrite the reloc and convert one of the trailing nop
9101 relocs to describe this relocation. */
9102 BFD_ASSERT (ELF32_R_TYPE (relend[-1].r_info) == R_PPC_NONE);
9103 /* The relocs are at the bottom 2 bytes */
c316a17c
AM
9104 wrel->r_offset = rel->r_offset + d_offset;
9105 wrel->r_info = ELF32_R_INFO (r_symndx, R_PPC_ADDR16_HA);
9106 wrel->r_addend = rel->r_addend;
9107 memmove (wrel + 1, wrel, (relend - wrel - 1) * sizeof (*wrel));
9108 wrel++, rel++;
9109 wrel->r_offset += 4;
9110 wrel->r_info = ELF32_R_INFO (r_symndx, R_PPC_ADDR16_LO);
9abc968f 9111 }
8517fae7 9112 continue;
deaaf2f3 9113
70bccea4 9114 /* Indirect .sdata relocation. */
7619e7c7 9115 case R_PPC_EMB_SDAI16:
c9a2f333 9116 BFD_ASSERT (htab->sdata[0].section != NULL);
bd6c6e2b
AM
9117 if (!is_static_defined (htab->sdata[0].sym))
9118 {
9119 unresolved_reloc = TRUE;
9120 break;
9121 }
7619e7c7 9122 relocation
76750a2f
AM
9123 = elf_finish_pointer_linker_section (input_bfd, &htab->sdata[0],
9124 h, relocation, rel);
bd6c6e2b 9125 addend = 0;
252b5132
RH
9126 break;
9127
70bccea4 9128 /* Indirect .sdata2 relocation. */
7619e7c7 9129 case R_PPC_EMB_SDA2I16:
c9a2f333 9130 BFD_ASSERT (htab->sdata[1].section != NULL);
bd6c6e2b
AM
9131 if (!is_static_defined (htab->sdata[1].sym))
9132 {
9133 unresolved_reloc = TRUE;
9134 break;
9135 }
7619e7c7 9136 relocation
76750a2f
AM
9137 = elf_finish_pointer_linker_section (input_bfd, &htab->sdata[1],
9138 h, relocation, rel);
bd6c6e2b 9139 addend = 0;
252b5132
RH
9140 break;
9141
70bccea4
AM
9142 /* Handle the TOC16 reloc. We want to use the offset within the .got
9143 section, not the actual VMA. This is appropriate when generating
9144 an embedded ELF object, for which the .got section acts like the
9145 AIX .toc section. */
7619e7c7 9146 case R_PPC_TOC16: /* phony GOT16 relocations */
3b4f3a11
AM
9147 if (sec == NULL || sec->output_section == NULL)
9148 {
9149 unresolved_reloc = TRUE;
9150 break;
9151 }
a0f49396
NC
9152 BFD_ASSERT (strcmp (bfd_get_section_name (sec->owner, sec),
9153 ".got") == 0
9154 || strcmp (bfd_get_section_name (sec->owner, sec),
9155 ".cgot") == 0);
252b5132 9156
3b4f3a11 9157 addend -= sec->output_section->vma + sec->output_offset + 0x8000;
252b5132
RH
9158 break;
9159
7619e7c7 9160 case R_PPC_PLTREL24:
f75e0e33
AM
9161 if (h != NULL && ifunc == NULL)
9162 {
cbf95972
AM
9163 struct plt_entry *ent;
9164
9165 ent = find_plt_ent (&h->plt.plist, got2,
9166 bfd_link_pic (info) ? addend : 0);
f75e0e33 9167 if (ent == NULL
ce558b89 9168 || htab->elf.splt == NULL)
f75e0e33
AM
9169 {
9170 /* We didn't make a PLT entry for this symbol. This
9171 happens when statically linking PIC code, or when
9172 using -Bsymbolic. */
9173 }
9174 else
9175 {
9176 /* Relocation is to the entry for this symbol in the
9177 procedure linkage table. */
9178 unresolved_reloc = FALSE;
9179 if (htab->plt_type == PLT_NEW)
9180 relocation = (htab->glink->output_section->vma
9181 + htab->glink->output_offset
9182 + ent->glink_offset);
9183 else
ce558b89
AM
9184 relocation = (htab->elf.splt->output_section->vma
9185 + htab->elf.splt->output_offset
f75e0e33
AM
9186 + ent->plt.offset);
9187 }
9188 }
252b5132 9189
f75e0e33
AM
9190 /* R_PPC_PLTREL24 is rather special. If non-zero, the
9191 addend specifies the GOT pointer offset within .got2.
9192 Don't apply it to the relocation field. */
9193 addend = 0;
8da6118f 9194 break;
252b5132 9195
70bccea4 9196 /* Relocate against _SDA_BASE_. */
7619e7c7 9197 case R_PPC_SDAREL16:
252b5132
RH
9198 {
9199 const char *name;
bd6c6e2b 9200 struct elf_link_hash_entry *sda = htab->sdata[0].sym;
252b5132 9201
bd6c6e2b
AM
9202 if (sec == NULL
9203 || sec->output_section == NULL
9204 || !is_static_defined (sda))
3b4f3a11
AM
9205 {
9206 unresolved_reloc = TRUE;
9207 break;
9208 }
bd6c6e2b 9209 addend -= SYM_VAL (sda);
3b4f3a11 9210
a0f49396 9211 name = bfd_get_section_name (output_bfd, sec->output_section);
93d1b056
AM
9212 if (!(strcmp (name, ".sdata") == 0
9213 || strcmp (name, ".sbss") == 0))
252b5132 9214 {
25f53a85 9215 info->callbacks->einfo
695344c0 9216 /* xgettext:c-format */
8de848d8 9217 (_("%P: %B: the target (%s) of a %s relocation is "
25f53a85 9218 "in the wrong output section (%s)\n"),
d003868e 9219 input_bfd,
55fd94b0
AM
9220 sym_name,
9221 howto->name,
9222 name);
252b5132 9223 }
252b5132
RH
9224 }
9225 break;
9226
70bccea4 9227 /* Relocate against _SDA2_BASE_. */
7619e7c7 9228 case R_PPC_EMB_SDA2REL:
252b5132
RH
9229 {
9230 const char *name;
bd6c6e2b 9231 struct elf_link_hash_entry *sda = htab->sdata[1].sym;
252b5132 9232
bd6c6e2b
AM
9233 if (sec == NULL
9234 || sec->output_section == NULL
9235 || !is_static_defined (sda))
3b4f3a11
AM
9236 {
9237 unresolved_reloc = TRUE;
9238 break;
9239 }
bd6c6e2b 9240 addend -= SYM_VAL (sda);
3b4f3a11 9241
a0f49396 9242 name = bfd_get_section_name (output_bfd, sec->output_section);
93d1b056
AM
9243 if (!(strcmp (name, ".sdata2") == 0
9244 || strcmp (name, ".sbss2") == 0))
252b5132 9245 {
25f53a85 9246 info->callbacks->einfo
695344c0 9247 /* xgettext:c-format */
8de848d8 9248 (_("%P: %B: the target (%s) of a %s relocation is "
25f53a85 9249 "in the wrong output section (%s)\n"),
d003868e 9250 input_bfd,
55fd94b0
AM
9251 sym_name,
9252 howto->name,
9253 name);
252b5132 9254 }
252b5132
RH
9255 }
9256 break;
9257
b9c361e0 9258 case R_PPC_VLE_LO16A:
86c95733 9259 relocation = relocation + addend;
08dc996f
AM
9260 ppc_elf_vle_split16 (input_bfd, input_section, rel->r_offset,
9261 contents + rel->r_offset, relocation,
9262 split16a_type, htab->params->vle_reloc_fixup);
c316a17c 9263 goto copy_reloc;
b9c361e0
JL
9264
9265 case R_PPC_VLE_LO16D:
86c95733 9266 relocation = relocation + addend;
08dc996f
AM
9267 ppc_elf_vle_split16 (input_bfd, input_section, rel->r_offset,
9268 contents + rel->r_offset, relocation,
9269 split16d_type, htab->params->vle_reloc_fixup);
c316a17c 9270 goto copy_reloc;
b9c361e0
JL
9271
9272 case R_PPC_VLE_HI16A:
86c95733 9273 relocation = (relocation + addend) >> 16;
08dc996f
AM
9274 ppc_elf_vle_split16 (input_bfd, input_section, rel->r_offset,
9275 contents + rel->r_offset, relocation,
9276 split16a_type, htab->params->vle_reloc_fixup);
c316a17c 9277 goto copy_reloc;
b9c361e0
JL
9278
9279 case R_PPC_VLE_HI16D:
86c95733 9280 relocation = (relocation + addend) >> 16;
08dc996f
AM
9281 ppc_elf_vle_split16 (input_bfd, input_section, rel->r_offset,
9282 contents + rel->r_offset, relocation,
9283 split16d_type, htab->params->vle_reloc_fixup);
c316a17c 9284 goto copy_reloc;
b9c361e0
JL
9285
9286 case R_PPC_VLE_HA16A:
86c95733 9287 relocation = (relocation + addend + 0x8000) >> 16;
08dc996f
AM
9288 ppc_elf_vle_split16 (input_bfd, input_section, rel->r_offset,
9289 contents + rel->r_offset, relocation,
9290 split16a_type, htab->params->vle_reloc_fixup);
c316a17c 9291 goto copy_reloc;
b9c361e0
JL
9292
9293 case R_PPC_VLE_HA16D:
86c95733 9294 relocation = (relocation + addend + 0x8000) >> 16;
08dc996f
AM
9295 ppc_elf_vle_split16 (input_bfd, input_section, rel->r_offset,
9296 contents + rel->r_offset, relocation,
9297 split16d_type, htab->params->vle_reloc_fixup);
c316a17c 9298 goto copy_reloc;
b9c361e0 9299
70bccea4 9300 /* Relocate against either _SDA_BASE_, _SDA2_BASE_, or 0. */
7619e7c7 9301 case R_PPC_EMB_SDA21:
b9c361e0 9302 case R_PPC_VLE_SDA21:
7619e7c7 9303 case R_PPC_EMB_RELSDA:
b9c361e0 9304 case R_PPC_VLE_SDA21_LO:
252b5132
RH
9305 {
9306 const char *name;
9307 int reg;
86c95733 9308 unsigned int insn;
bd6c6e2b 9309 struct elf_link_hash_entry *sda = NULL;
252b5132 9310
3b4f3a11
AM
9311 if (sec == NULL || sec->output_section == NULL)
9312 {
9313 unresolved_reloc = TRUE;
9314 break;
9315 }
9316
a0f49396 9317 name = bfd_get_section_name (output_bfd, sec->output_section);
93d1b056
AM
9318 if (strcmp (name, ".sdata") == 0
9319 || strcmp (name, ".sbss") == 0)
252b5132
RH
9320 {
9321 reg = 13;
bd6c6e2b 9322 sda = htab->sdata[0].sym;
252b5132 9323 }
93d1b056
AM
9324 else if (strcmp (name, ".sdata2") == 0
9325 || strcmp (name, ".sbss2") == 0)
252b5132
RH
9326 {
9327 reg = 2;
bd6c6e2b 9328 sda = htab->sdata[1].sym;
252b5132 9329 }
8da6118f
KH
9330 else if (strcmp (name, ".PPC.EMB.sdata0") == 0
9331 || strcmp (name, ".PPC.EMB.sbss0") == 0)
252b5132
RH
9332 {
9333 reg = 0;
9334 }
252b5132
RH
9335 else
9336 {
25f53a85 9337 info->callbacks->einfo
695344c0 9338 /* xgettext:c-format */
8de848d8 9339 (_("%P: %B: the target (%s) of a %s relocation is "
25f53a85 9340 "in the wrong output section (%s)\n"),
d003868e 9341 input_bfd,
55fd94b0
AM
9342 sym_name,
9343 howto->name,
9344 name);
252b5132
RH
9345
9346 bfd_set_error (bfd_error_bad_value);
b34976b6 9347 ret = FALSE;
c316a17c 9348 goto copy_reloc;
252b5132
RH
9349 }
9350
bd6c6e2b
AM
9351 if (sda != NULL)
9352 {
9353 if (!is_static_defined (sda))
9354 {
9355 unresolved_reloc = TRUE;
9356 break;
9357 }
9358 addend -= SYM_VAL (sda);
9359 }
9360
95f0d0d2 9361 insn = bfd_get_32 (input_bfd, contents + rel->r_offset);
b9c361e0
JL
9362 if (reg == 0
9363 && (r_type == R_PPC_VLE_SDA21
9364 || r_type == R_PPC_VLE_SDA21_LO))
9365 {
86c95733
AM
9366 relocation = relocation + addend;
9367 addend = 0;
9368
9369 /* Force e_li insn, keeping RT from original insn. */
9370 insn &= 0x1f << 21;
9371 insn |= 28u << 26;
9372
9373 /* We have an li20 field, bits 17..20, 11..15, 21..31. */
9374 /* Top 4 bits of value to 17..20. */
9375 insn |= (relocation & 0xf0000) >> 5;
9376 /* Next 5 bits of the value to 11..15. */
9377 insn |= (relocation & 0xf800) << 5;
9378 /* And the final 11 bits of the value to bits 21 to 31. */
9379 insn |= relocation & 0x7ff;
9380
95f0d0d2 9381 bfd_put_32 (input_bfd, insn, contents + rel->r_offset);
c3301df1
AM
9382
9383 if (r_type == R_PPC_VLE_SDA21
9384 && ((relocation + 0x80000) & 0xffffffff) > 0x100000)
9385 goto overflow;
c316a17c 9386 goto copy_reloc;
b9c361e0
JL
9387 }
9388 else if (r_type == R_PPC_EMB_SDA21
9389 || r_type == R_PPC_VLE_SDA21
9390 || r_type == R_PPC_VLE_SDA21_LO)
91d6fa6a 9391 {
86c95733 9392 /* Fill in register field. */
252b5132 9393 insn = (insn & ~RA_REGISTER_MASK) | (reg << RA_REGISTER_SHIFT);
252b5132 9394 }
95f0d0d2 9395 bfd_put_32 (input_bfd, insn, contents + rel->r_offset);
252b5132
RH
9396 }
9397 break;
9398
b9c361e0
JL
9399 case R_PPC_VLE_SDAREL_LO16A:
9400 case R_PPC_VLE_SDAREL_LO16D:
9401 case R_PPC_VLE_SDAREL_HI16A:
9402 case R_PPC_VLE_SDAREL_HI16D:
9403 case R_PPC_VLE_SDAREL_HA16A:
9404 case R_PPC_VLE_SDAREL_HA16D:
9405 {
9406 bfd_vma value;
9407 const char *name;
b9c361e0
JL
9408 struct elf_link_hash_entry *sda = NULL;
9409
9410 if (sec == NULL || sec->output_section == NULL)
9411 {
9412 unresolved_reloc = TRUE;
9413 break;
9414 }
9415
a0f49396 9416 name = bfd_get_section_name (output_bfd, sec->output_section);
93d1b056
AM
9417 if (strcmp (name, ".sdata") == 0
9418 || strcmp (name, ".sbss") == 0)
5499c7c7 9419 sda = htab->sdata[0].sym;
93d1b056
AM
9420 else if (strcmp (name, ".sdata2") == 0
9421 || strcmp (name, ".sbss2") == 0)
5499c7c7 9422 sda = htab->sdata[1].sym;
b9c361e0
JL
9423 else
9424 {
4eca0228 9425 _bfd_error_handler
695344c0 9426 /* xgettext:c-format */
b9c361e0
JL
9427 (_("%B: the target (%s) of a %s relocation is "
9428 "in the wrong output section (%s)"),
9429 input_bfd,
9430 sym_name,
9431 howto->name,
9432 name);
9433
9434 bfd_set_error (bfd_error_bad_value);
9435 ret = FALSE;
c316a17c 9436 goto copy_reloc;
b9c361e0
JL
9437 }
9438
5499c7c7 9439 if (sda == NULL || !is_static_defined (sda))
b9c361e0 9440 {
5499c7c7
AM
9441 unresolved_reloc = TRUE;
9442 break;
b9c361e0 9443 }
5499c7c7 9444 value = relocation + addend - SYM_VAL (sda);
86c95733
AM
9445
9446 if (r_type == R_PPC_VLE_SDAREL_LO16A)
08dc996f
AM
9447 ppc_elf_vle_split16 (input_bfd, input_section, rel->r_offset,
9448 contents + rel->r_offset, value,
9449 split16a_type,
9450 htab->params->vle_reloc_fixup);
86c95733 9451 else if (r_type == R_PPC_VLE_SDAREL_LO16D)
08dc996f
AM
9452 ppc_elf_vle_split16 (input_bfd, input_section, rel->r_offset,
9453 contents + rel->r_offset, value,
9454 split16d_type,
9455 htab->params->vle_reloc_fixup);
86c95733 9456 else if (r_type == R_PPC_VLE_SDAREL_HI16A)
b9c361e0 9457 {
86c95733 9458 value = value >> 16;
08dc996f
AM
9459 ppc_elf_vle_split16 (input_bfd, input_section, rel->r_offset,
9460 contents + rel->r_offset, value,
9461 split16a_type,
9462 htab->params->vle_reloc_fixup);
b9c361e0 9463 }
86c95733 9464 else if (r_type == R_PPC_VLE_SDAREL_HI16D)
b9c361e0 9465 {
86c95733 9466 value = value >> 16;
08dc996f
AM
9467 ppc_elf_vle_split16 (input_bfd, input_section, rel->r_offset,
9468 contents + rel->r_offset, value,
9469 split16d_type,
9470 htab->params->vle_reloc_fixup);
b9c361e0 9471 }
86c95733 9472 else if (r_type == R_PPC_VLE_SDAREL_HA16A)
b9c361e0 9473 {
86c95733 9474 value = (value + 0x8000) >> 16;
08dc996f
AM
9475 ppc_elf_vle_split16 (input_bfd, input_section, rel->r_offset,
9476 contents + rel->r_offset, value,
9477 split16a_type,
9478 htab->params->vle_reloc_fixup);
b9c361e0 9479 }
86c95733 9480 else if (r_type == R_PPC_VLE_SDAREL_HA16D)
b9c361e0 9481 {
86c95733 9482 value = (value + 0x8000) >> 16;
08dc996f
AM
9483 ppc_elf_vle_split16 (input_bfd, input_section, rel->r_offset,
9484 contents + rel->r_offset, value,
9485 split16d_type,
9486 htab->params->vle_reloc_fixup);
b9c361e0
JL
9487 }
9488 }
c316a17c 9489 goto copy_reloc;
b9c361e0 9490
70bccea4 9491 /* Relocate against the beginning of the section. */
7619e7c7
AM
9492 case R_PPC_SECTOFF:
9493 case R_PPC_SECTOFF_LO:
9494 case R_PPC_SECTOFF_HI:
9495 case R_PPC_SECTOFF_HA:
3b4f3a11
AM
9496 if (sec == NULL || sec->output_section == NULL)
9497 {
9498 unresolved_reloc = TRUE;
9499 break;
9500 }
252b5132 9501 addend -= sec->output_section->vma;
252b5132
RH
9502 break;
9503
70bccea4 9504 /* Negative relocations. */
7619e7c7
AM
9505 case R_PPC_EMB_NADDR32:
9506 case R_PPC_EMB_NADDR16:
9507 case R_PPC_EMB_NADDR16_LO:
9508 case R_PPC_EMB_NADDR16_HI:
9509 case R_PPC_EMB_NADDR16_HA:
8da6118f 9510 addend -= 2 * relocation;
252b5132
RH
9511 break;
9512
7619e7c7
AM
9513 case R_PPC_COPY:
9514 case R_PPC_GLOB_DAT:
9515 case R_PPC_JMP_SLOT:
9516 case R_PPC_RELATIVE:
e054468f 9517 case R_PPC_IRELATIVE:
7619e7c7
AM
9518 case R_PPC_PLT32:
9519 case R_PPC_PLTREL32:
9520 case R_PPC_PLT16_LO:
9521 case R_PPC_PLT16_HI:
9522 case R_PPC_PLT16_HA:
9523 case R_PPC_ADDR30:
9524 case R_PPC_EMB_RELSEC16:
9525 case R_PPC_EMB_RELST_LO:
9526 case R_PPC_EMB_RELST_HI:
9527 case R_PPC_EMB_RELST_HA:
9528 case R_PPC_EMB_BIT_FLD:
25f53a85 9529 info->callbacks->einfo
695344c0 9530 /* xgettext:c-format */
8de848d8 9531 (_("%P: %B: relocation %s is not yet supported for symbol %s\n"),
d003868e 9532 input_bfd,
7619e7c7
AM
9533 howto->name,
9534 sym_name);
252b5132
RH
9535
9536 bfd_set_error (bfd_error_invalid_operation);
b34976b6 9537 ret = FALSE;
c316a17c 9538 goto copy_reloc;
7619e7c7 9539 }
252b5132 9540
7619e7c7
AM
9541 /* Do any further special processing. */
9542 switch (r_type)
9543 {
9544 default:
9545 break;
9546
9547 case R_PPC_ADDR16_HA:
d7128ce4 9548 case R_PPC_REL16_HA:
a680de9a 9549 case R_PPC_REL16DX_HA:
7619e7c7
AM
9550 case R_PPC_SECTOFF_HA:
9551 case R_PPC_TPREL16_HA:
9552 case R_PPC_DTPREL16_HA:
7619e7c7
AM
9553 case R_PPC_EMB_NADDR16_HA:
9554 case R_PPC_EMB_RELST_HA:
9555 /* It's just possible that this symbol is a weak symbol
7b609f53 9556 that's not actually defined anywhere. In that case,
7619e7c7
AM
9557 'sec' would be NULL, and we should leave the symbol
9558 alone (it will be set to zero elsewhere in the link). */
5c5f6e17
AM
9559 if (sec == NULL)
9560 break;
1a0670f3 9561 /* Fall through. */
5c5f6e17
AM
9562
9563 case R_PPC_PLT16_HA:
9564 case R_PPC_GOT16_HA:
9565 case R_PPC_GOT_TLSGD16_HA:
9566 case R_PPC_GOT_TLSLD16_HA:
9567 case R_PPC_GOT_TPREL16_HA:
9568 case R_PPC_GOT_DTPREL16_HA:
9569 /* Add 0x10000 if sign bit in 0:15 is set.
9570 Bits 0:15 are not used. */
9571 addend += 0x8000;
7619e7c7 9572 break;
1fe532cf
AM
9573
9574 case R_PPC_ADDR16:
9575 case R_PPC_ADDR16_LO:
9576 case R_PPC_GOT16:
9577 case R_PPC_GOT16_LO:
9578 case R_PPC_SDAREL16:
9579 case R_PPC_SECTOFF:
9580 case R_PPC_SECTOFF_LO:
9581 case R_PPC_DTPREL16:
9582 case R_PPC_DTPREL16_LO:
9583 case R_PPC_TPREL16:
9584 case R_PPC_TPREL16_LO:
9585 case R_PPC_GOT_TLSGD16:
9586 case R_PPC_GOT_TLSGD16_LO:
9587 case R_PPC_GOT_TLSLD16:
9588 case R_PPC_GOT_TLSLD16_LO:
9589 case R_PPC_GOT_DTPREL16:
9590 case R_PPC_GOT_DTPREL16_LO:
9591 case R_PPC_GOT_TPREL16:
9592 case R_PPC_GOT_TPREL16_LO:
9593 {
9594 /* The 32-bit ABI lacks proper relocations to deal with
9595 certain 64-bit instructions. Prevent damage to bits
9596 that make up part of the insn opcode. */
9597 unsigned int insn, mask, lobit;
9598
95f0d0d2 9599 insn = bfd_get_32 (input_bfd,
c316a17c 9600 contents + rel->r_offset - d_offset);
1fe532cf
AM
9601 mask = 0;
9602 if (is_insn_ds_form (insn))
9603 mask = 3;
9604 else if (is_insn_dq_form (insn))
9605 mask = 15;
9606 else
9607 break;
a680de9a
PB
9608 relocation += addend;
9609 addend = insn & mask;
9610 lobit = mask & relocation;
1fe532cf
AM
9611 if (lobit != 0)
9612 {
a680de9a 9613 relocation ^= lobit;
1fe532cf 9614 info->callbacks->einfo
695344c0 9615 /* xgettext:c-format */
174d0a74 9616 (_("%H: error: %s against `%s' not a multiple of %u\n"),
1fe532cf
AM
9617 input_bfd, input_section, rel->r_offset,
9618 howto->name, sym_name, mask + 1);
9619 bfd_set_error (bfd_error_bad_value);
9620 ret = FALSE;
9621 }
1fe532cf
AM
9622 }
9623 break;
252b5132
RH
9624 }
9625
252b5132 9626#ifdef DEBUG
55fd94b0
AM
9627 fprintf (stderr, "\ttype = %s (%d), name = %s, symbol index = %ld, "
9628 "offset = %ld, addend = %ld\n",
252b5132 9629 howto->name,
8da6118f 9630 (int) r_type,
252b5132
RH
9631 sym_name,
9632 r_symndx,
7619e7c7 9633 (long) rel->r_offset,
8da6118f 9634 (long) addend);
252b5132
RH
9635#endif
9636
7619e7c7
AM
9637 if (unresolved_reloc
9638 && !((input_section->flags & SEC_DEBUGGING) != 0
1d5316ab
AM
9639 && h->def_dynamic)
9640 && _bfd_elf_section_offset (output_bfd, info, input_section,
9641 rel->r_offset) != (bfd_vma) -1)
7619e7c7 9642 {
25f53a85 9643 info->callbacks->einfo
695344c0 9644 /* xgettext:c-format */
174d0a74 9645 (_("%H: unresolvable %s relocation against symbol `%s'\n"),
25f53a85 9646 input_bfd, input_section, rel->r_offset,
7b609f53 9647 howto->name,
7619e7c7
AM
9648 sym_name);
9649 ret = FALSE;
9650 }
9651
86c95733
AM
9652 /* 16-bit fields in insns mostly have signed values, but a
9653 few insns have 16-bit unsigned values. Really, we should
9654 have different reloc types. */
9655 if (howto->complain_on_overflow != complain_overflow_dont
9656 && howto->dst_mask == 0xffff
9657 && (input_section->flags & SEC_CODE) != 0)
9658 {
9659 enum complain_overflow complain = complain_overflow_signed;
9660
9661 if ((elf_section_flags (input_section) & SHF_PPC_VLE) == 0)
9662 {
9663 unsigned int insn;
9664
9665 insn = bfd_get_32 (input_bfd, contents + (rel->r_offset & ~3));
a47622ac
AM
9666 if ((insn & (0x3f << 26)) == 10u << 26 /* cmpli */)
9667 complain = complain_overflow_bitfield;
9668 else if ((insn & (0x3f << 26)) == 28u << 26 /* andi */
9669 || (insn & (0x3f << 26)) == 24u << 26 /* ori */
9670 || (insn & (0x3f << 26)) == 26u << 26 /* xori */)
86c95733
AM
9671 complain = complain_overflow_unsigned;
9672 }
9673 if (howto->complain_on_overflow != complain)
9674 {
9675 alt_howto = *howto;
9676 alt_howto.complain_on_overflow = complain;
9677 howto = &alt_howto;
9678 }
9679 }
9680
a680de9a
PB
9681 if (r_type == R_PPC_REL16DX_HA)
9682 {
9683 /* Split field reloc isn't handled by _bfd_final_link_relocate. */
9684 if (rel->r_offset + 4 > input_section->size)
9685 r = bfd_reloc_outofrange;
9686 else
9687 {
9688 unsigned int insn;
9689
9690 relocation += addend;
9691 relocation -= (rel->r_offset
9692 + input_section->output_offset
9693 + input_section->output_section->vma);
9694 relocation >>= 16;
9695 insn = bfd_get_32 (input_bfd, contents + rel->r_offset);
9696 insn &= ~0x1fffc1;
9697 insn |= (relocation & 0xffc1) | ((relocation & 0x3e) << 15);
9698 bfd_put_32 (input_bfd, insn, contents + rel->r_offset);
9699 r = bfd_reloc_ok;
9700 }
9701 }
9702 else
9703 r = _bfd_final_link_relocate (howto, input_bfd, input_section, contents,
9704 rel->r_offset, relocation, addend);
252b5132 9705
7619e7c7 9706 if (r != bfd_reloc_ok)
252b5132 9707 {
7619e7c7 9708 if (r == bfd_reloc_overflow)
252b5132 9709 {
c3301df1 9710 overflow:
8131c122
AM
9711 /* On code like "if (foo) foo();" don't report overflow
9712 on a branch to zero when foo is undefined. */
9713 if (!warned
9714 && !(h != NULL
9715 && (h->root.type == bfd_link_hash_undefweak
9716 || h->root.type == bfd_link_hash_undefined)
9717 && is_branch_reloc (r_type)))
1a72702b
AM
9718 info->callbacks->reloc_overflow
9719 (info, (h ? &h->root : NULL), sym_name, howto->name,
9720 rel->r_addend, input_bfd, input_section, rel->r_offset);
dc1bc0c9
RH
9721 }
9722 else
9723 {
25f53a85 9724 info->callbacks->einfo
695344c0 9725 /* xgettext:c-format */
174d0a74 9726 (_("%H: %s reloc against `%s': error %d\n"),
25f53a85
AM
9727 input_bfd, input_section, rel->r_offset,
9728 howto->name, sym_name, (int) r);
7619e7c7 9729 ret = FALSE;
252b5132
RH
9730 }
9731 }
c316a17c
AM
9732 copy_reloc:
9733 if (wrel != rel)
9734 *wrel = *rel;
9735 }
9736
9737 if (wrel != rel)
9738 {
9739 Elf_Internal_Shdr *rel_hdr;
9740 size_t deleted = rel - wrel;
9741
9742 rel_hdr = _bfd_elf_single_rel_hdr (input_section->output_section);
9743 rel_hdr->sh_size -= rel_hdr->sh_entsize * deleted;
9744 if (rel_hdr->sh_size == 0)
9745 {
9746 /* It is too late to remove an empty reloc section. Leave
9747 one NONE reloc.
9748 ??? What is wrong with an empty section??? */
9749 rel_hdr->sh_size = rel_hdr->sh_entsize;
9750 deleted -= 1;
9751 wrel++;
9752 }
9753 relend = wrel;
9754 rel_hdr = _bfd_elf_single_rel_hdr (input_section);
9755 rel_hdr->sh_size -= rel_hdr->sh_entsize * deleted;
9756 input_section->reloc_count -= deleted;
252b5132
RH
9757 }
9758
252b5132
RH
9759#ifdef DEBUG
9760 fprintf (stderr, "\n");
9761#endif
9762
53291d1f
AM
9763 if (input_section->sec_info_type == SEC_INFO_TYPE_TARGET
9764 && input_section->size != input_section->rawsize
9765 && (strcmp (input_section->output_section->name, ".init") == 0
9766 || strcmp (input_section->output_section->name, ".fini") == 0))
9767 {
9768 /* Branch around the trampolines. */
9769 unsigned int insn = B + input_section->size - input_section->rawsize;
9770 bfd_put_32 (input_bfd, insn, contents + input_section->rawsize);
9771 }
9772
5446cbdf 9773 if (htab->params->ppc476_workaround
795bc6b3 9774 && input_section->sec_info_type == SEC_INFO_TYPE_TARGET
0e1862bb 9775 && (!bfd_link_relocatable (info)
795bc6b3
AM
9776 || (input_section->output_section->alignment_power
9777 >= htab->params->pagesize_p2)))
5446cbdf 9778 {
5446cbdf 9779 bfd_vma start_addr, end_addr, addr;
795bc6b3 9780 bfd_vma pagesize = (bfd_vma) 1 << htab->params->pagesize_p2;
5446cbdf 9781
5446cbdf 9782 if (relax_info->workaround_size != 0)
40fd06d1
AM
9783 {
9784 bfd_byte *p;
9785 unsigned int n;
9786 bfd_byte fill[4];
9787
9788 bfd_put_32 (input_bfd, BA, fill);
9789 p = contents + input_section->size - relax_info->workaround_size;
9790 n = relax_info->workaround_size >> 2;
9791 while (n--)
9792 {
9793 memcpy (p, fill, 4);
9794 p += 4;
9795 }
9796 }
5446cbdf
AM
9797
9798 /* The idea is: Replace the last instruction on a page with a
9799 branch to a patch area. Put the insn there followed by a
9800 branch back to the next page. Complicated a little by
9801 needing to handle moved conditional branches, and by not
9802 wanting to touch data-in-text. */
9803
9804 start_addr = (input_section->output_section->vma
9805 + input_section->output_offset);
9806 end_addr = (start_addr + input_section->size
9807 - relax_info->workaround_size);
9808 for (addr = ((start_addr & -pagesize) + pagesize - 4);
9809 addr < end_addr;
9810 addr += pagesize)
9811 {
9812 bfd_vma offset = addr - start_addr;
9813 Elf_Internal_Rela *lo, *hi;
9814 bfd_boolean is_data;
9815 bfd_vma patch_off, patch_addr;
9816 unsigned int insn;
9817
9818 /* Do we have a data reloc at this offset? If so, leave
9819 the word alone. */
9820 is_data = FALSE;
9821 lo = relocs;
668e22e5
AM
9822 hi = relend;
9823 rel = NULL;
5446cbdf
AM
9824 while (lo < hi)
9825 {
9826 rel = lo + (hi - lo) / 2;
9827 if (rel->r_offset < offset)
9828 lo = rel + 1;
668e22e5 9829 else if (rel->r_offset > offset + 3)
5446cbdf
AM
9830 hi = rel;
9831 else
9832 {
9833 switch (ELF32_R_TYPE (rel->r_info))
9834 {
9835 case R_PPC_ADDR32:
9836 case R_PPC_UADDR32:
9837 case R_PPC_REL32:
9838 case R_PPC_ADDR30:
9839 is_data = TRUE;
9840 break;
9841 default:
9842 break;
9843 }
9844 break;
9845 }
9846 }
9847 if (is_data)
9848 continue;
9849
b4ab4364
AM
9850 /* Some instructions can be left alone too. Unconditional
9851 branches, except for bcctr with BO=0x14 (bctr, bctrl),
9852 avoid the icache failure.
9853
9854 The problem occurs due to prefetch across a page boundary
9855 where stale instructions can be fetched from the next
9856 page, and the mechanism for flushing these bad
9857 instructions fails under certain circumstances. The
9858 unconditional branches:
9859 1) Branch: b, bl, ba, bla,
9860 2) Branch Conditional: bc, bca, bcl, bcla,
9861 3) Branch Conditional to Link Register: bclr, bclrl,
9862 where (2) and (3) have BO=0x14 making them unconditional,
9863 prevent the bad prefetch because the prefetch itself is
9864 affected by these instructions. This happens even if the
9865 instruction is not executed.
9866
9867 A bctr example:
9868 .
9869 . lis 9,new_page@ha
9870 . addi 9,9,new_page@l
9871 . mtctr 9
9872 . bctr
9873 . nop
9874 . nop
9875 . new_page:
9876 .
9877 The bctr is not predicted taken due to ctr not being
9878 ready, so prefetch continues on past the bctr into the
9879 new page which might have stale instructions. If they
9880 fail to be flushed, then they will be executed after the
9881 bctr executes. Either of the following modifications
9882 prevent the bad prefetch from happening in the first
9883 place:
9884 .
1b786873
L
9885 . lis 9,new_page@ha lis 9,new_page@ha
9886 . addi 9,9,new_page@l addi 9,9,new_page@l
9887 . mtctr 9 mtctr 9
9888 . bctr bctr
b4ab4364 9889 . nop b somewhere_else
1b786873
L
9890 . b somewhere_else nop
9891 . new_page: new_page:
b4ab4364 9892 . */
5446cbdf 9893 insn = bfd_get_32 (input_bfd, contents + offset);
b4ab4364
AM
9894 if ((insn & (0x3f << 26)) == (18u << 26) /* b,bl,ba,bla */
9895 || ((insn & (0x3f << 26)) == (16u << 26) /* bc,bcl,bca,bcla*/
9896 && (insn & (0x14 << 21)) == (0x14 << 21)) /* with BO=0x14 */
5446cbdf 9897 || ((insn & (0x3f << 26)) == (19u << 26)
b4ab4364
AM
9898 && (insn & (0x3ff << 1)) == (16u << 1) /* bclr,bclrl */
9899 && (insn & (0x14 << 21)) == (0x14 << 21)))/* with BO=0x14 */
5446cbdf
AM
9900 continue;
9901
9902 patch_addr = (start_addr + input_section->size
9903 - relax_info->workaround_size);
9904 patch_addr = (patch_addr + 15) & -16;
9905 patch_off = patch_addr - start_addr;
9906 bfd_put_32 (input_bfd, B + patch_off - offset, contents + offset);
668e22e5
AM
9907
9908 if (rel != NULL
9909 && rel->r_offset >= offset
9910 && rel->r_offset < offset + 4)
9911 {
f8b44781
AM
9912 asection *sreloc;
9913
668e22e5
AM
9914 /* If the insn we are patching had a reloc, adjust the
9915 reloc r_offset so that the reloc applies to the moved
9916 location. This matters for -r and --emit-relocs. */
9917 if (rel + 1 != relend)
9918 {
9919 Elf_Internal_Rela tmp = *rel;
9920
9921 /* Keep the relocs sorted by r_offset. */
9922 memmove (rel, rel + 1, (relend - (rel + 1)) * sizeof (*rel));
9923 relend[-1] = tmp;
9924 }
9925 relend[-1].r_offset += patch_off - offset;
f8b44781
AM
9926
9927 /* Adjust REL16 addends too. */
9928 switch (ELF32_R_TYPE (relend[-1].r_info))
9929 {
9930 case R_PPC_REL16:
9931 case R_PPC_REL16_LO:
9932 case R_PPC_REL16_HI:
9933 case R_PPC_REL16_HA:
9934 relend[-1].r_addend += patch_off - offset;
9935 break;
9936 default:
9937 break;
9938 }
9939
9940 /* If we are building a PIE or shared library with
9941 non-PIC objects, perhaps we had a dynamic reloc too?
9942 If so, the dynamic reloc must move with the insn. */
9943 sreloc = elf_section_data (input_section)->sreloc;
9944 if (sreloc != NULL)
9945 {
1d5c94cb 9946 Elf32_External_Rela *slo, *shi, *srelend;
f8b44781
AM
9947 bfd_vma soffset;
9948
1d5c94cb
AM
9949 slo = (Elf32_External_Rela *) sreloc->contents;
9950 shi = srelend = slo + sreloc->reloc_count;
f8b44781
AM
9951 soffset = (offset + input_section->output_section->vma
9952 + input_section->output_offset);
9953 while (slo < shi)
9954 {
1d5c94cb
AM
9955 Elf32_External_Rela *srel = slo + (shi - slo) / 2;
9956 bfd_elf32_swap_reloca_in (output_bfd, (bfd_byte *) srel,
9957 &outrel);
f8b44781
AM
9958 if (outrel.r_offset < soffset)
9959 slo = srel + 1;
9960 else if (outrel.r_offset > soffset + 3)
9961 shi = srel;
9962 else
9963 {
1d5c94cb 9964 if (srel + 1 != srelend)
f8b44781 9965 {
1d5c94cb
AM
9966 memmove (srel, srel + 1,
9967 (srelend - (srel + 1)) * sizeof (*srel));
9968 srel = srelend - 1;
f8b44781
AM
9969 }
9970 outrel.r_offset += patch_off - offset;
1d5c94cb
AM
9971 bfd_elf32_swap_reloca_out (output_bfd, &outrel,
9972 (bfd_byte *) srel);
f8b44781
AM
9973 break;
9974 }
9975 }
9976 }
668e22e5
AM
9977 }
9978 else
9979 rel = NULL;
9980
5446cbdf
AM
9981 if ((insn & (0x3f << 26)) == (16u << 26) /* bc */
9982 && (insn & 2) == 0 /* relative */)
9983 {
9984 bfd_vma delta = ((insn & 0xfffc) ^ 0x8000) - 0x8000;
9985
9986 delta += offset - patch_off;
0e1862bb 9987 if (bfd_link_relocatable (info) && rel != NULL)
668e22e5 9988 delta = 0;
0e1862bb 9989 if (!bfd_link_relocatable (info) && rel != NULL)
668e22e5
AM
9990 {
9991 enum elf_ppc_reloc_type r_type;
9992
9993 r_type = ELF32_R_TYPE (relend[-1].r_info);
9994 if (r_type == R_PPC_REL14_BRTAKEN)
9995 insn |= BRANCH_PREDICT_BIT;
9996 else if (r_type == R_PPC_REL14_BRNTAKEN)
9997 insn &= ~BRANCH_PREDICT_BIT;
9998 else
9999 BFD_ASSERT (r_type == R_PPC_REL14);
10000
10001 if ((r_type == R_PPC_REL14_BRTAKEN
10002 || r_type == R_PPC_REL14_BRNTAKEN)
10003 && delta + 0x8000 < 0x10000
10004 && (bfd_signed_vma) delta < 0)
10005 insn ^= BRANCH_PREDICT_BIT;
10006 }
5446cbdf
AM
10007 if (delta + 0x8000 < 0x10000)
10008 {
10009 bfd_put_32 (input_bfd,
10010 (insn & ~0xfffc) | (delta & 0xfffc),
10011 contents + patch_off);
10012 patch_off += 4;
10013 bfd_put_32 (input_bfd,
10014 B | ((offset + 4 - patch_off) & 0x3fffffc),
10015 contents + patch_off);
10016 patch_off += 4;
10017 }
10018 else
10019 {
668e22e5
AM
10020 if (rel != NULL)
10021 {
10022 unsigned int r_sym = ELF32_R_SYM (relend[-1].r_info);
10023
10024 relend[-1].r_offset += 8;
10025 relend[-1].r_info = ELF32_R_INFO (r_sym, R_PPC_REL24);
10026 }
5446cbdf
AM
10027 bfd_put_32 (input_bfd,
10028 (insn & ~0xfffc) | 8,
10029 contents + patch_off);
10030 patch_off += 4;
10031 bfd_put_32 (input_bfd,
10032 B | ((offset + 4 - patch_off) & 0x3fffffc),
10033 contents + patch_off);
10034 patch_off += 4;
10035 bfd_put_32 (input_bfd,
10036 B | ((delta - 8) & 0x3fffffc),
10037 contents + patch_off);
10038 patch_off += 4;
10039 }
10040 }
10041 else
10042 {
10043 bfd_put_32 (input_bfd, insn, contents + patch_off);
10044 patch_off += 4;
10045 bfd_put_32 (input_bfd,
10046 B | ((offset + 4 - patch_off) & 0x3fffffc),
10047 contents + patch_off);
10048 patch_off += 4;
10049 }
10050 BFD_ASSERT (patch_off <= input_section->size);
10051 relax_info->workaround_size = input_section->size - patch_off;
10052 }
10053 }
10054
252b5132
RH
10055 return ret;
10056}
252b5132 10057\f
25dbc73a
AM
10058/* Finish up dynamic symbol handling. We set the contents of various
10059 dynamic sections here. */
c5fccbec 10060
b34976b6 10061static bfd_boolean
25dbc73a
AM
10062ppc_elf_finish_dynamic_symbol (bfd *output_bfd,
10063 struct bfd_link_info *info,
10064 struct elf_link_hash_entry *h,
10065 Elf_Internal_Sym *sym)
e1a9cb8e 10066{
25dbc73a 10067 struct ppc_elf_link_hash_table *htab;
a6aa5195
AM
10068 struct plt_entry *ent;
10069 bfd_boolean doneone;
e1a9cb8e 10070
25dbc73a
AM
10071#ifdef DEBUG
10072 fprintf (stderr, "ppc_elf_finish_dynamic_symbol called for %s",
10073 h->root.root.string);
10074#endif
e1a9cb8e 10075
25dbc73a
AM
10076 htab = ppc_elf_hash_table (info);
10077 BFD_ASSERT (htab->elf.dynobj != NULL);
e1a9cb8e 10078
a6aa5195
AM
10079 doneone = FALSE;
10080 for (ent = h->plt.plist; ent != NULL; ent = ent->next)
10081 if (ent->plt.offset != (bfd_vma) -1)
10082 {
10083 if (!doneone)
10084 {
10085 Elf_Internal_Rela rela;
10086 bfd_byte *loc;
10087 bfd_vma reloc_index;
e1a9cb8e 10088
e054468f 10089 if (htab->plt_type == PLT_NEW
25f23106
AM
10090 || !htab->elf.dynamic_sections_created
10091 || h->dynindx == -1)
9d8504b1
PB
10092 reloc_index = ent->plt.offset / 4;
10093 else
10094 {
10095 reloc_index = ((ent->plt.offset - htab->plt_initial_entry_size)
10096 / htab->plt_slot_size);
10097 if (reloc_index > PLT_NUM_SINGLE_ENTRIES
4a3dc543 10098 && htab->plt_type == PLT_OLD)
9d8504b1
PB
10099 reloc_index -= (reloc_index - PLT_NUM_SINGLE_ENTRIES) / 2;
10100 }
10101
a6aa5195
AM
10102 /* This symbol has an entry in the procedure linkage table.
10103 Set it up. */
e054468f 10104 if (htab->plt_type == PLT_VXWORKS
25f23106
AM
10105 && htab->elf.dynamic_sections_created
10106 && h->dynindx != -1)
a6aa5195 10107 {
9d8504b1
PB
10108 bfd_vma got_offset;
10109 const bfd_vma *plt_entry;
5b914448 10110
9d8504b1
PB
10111 /* The first three entries in .got.plt are reserved. */
10112 got_offset = (reloc_index + 3) * 4;
10113
10114 /* Use the right PLT. */
0e1862bb 10115 plt_entry = bfd_link_pic (info) ? ppc_elf_vxworks_pic_plt_entry
9d8504b1
PB
10116 : ppc_elf_vxworks_plt_entry;
10117
10118 /* Fill in the .plt on VxWorks. */
0e1862bb 10119 if (bfd_link_pic (info))
9d8504b1 10120 {
9d8504b1 10121 bfd_put_32 (output_bfd,
e87d4038 10122 plt_entry[0] | PPC_HA (got_offset),
ce558b89 10123 htab->elf.splt->contents + ent->plt.offset + 0);
9d8504b1 10124 bfd_put_32 (output_bfd,
e87d4038 10125 plt_entry[1] | PPC_LO (got_offset),
ce558b89 10126 htab->elf.splt->contents + ent->plt.offset + 4);
9d8504b1
PB
10127 }
10128 else
10129 {
e87d4038 10130 bfd_vma got_loc = got_offset + SYM_VAL (htab->elf.hgot);
9d8504b1
PB
10131
10132 bfd_put_32 (output_bfd,
e87d4038 10133 plt_entry[0] | PPC_HA (got_loc),
ce558b89 10134 htab->elf.splt->contents + ent->plt.offset + 0);
9d8504b1 10135 bfd_put_32 (output_bfd,
e87d4038 10136 plt_entry[1] | PPC_LO (got_loc),
ce558b89 10137 htab->elf.splt->contents + ent->plt.offset + 4);
9d8504b1
PB
10138 }
10139
10140 bfd_put_32 (output_bfd, plt_entry[2],
ce558b89 10141 htab->elf.splt->contents + ent->plt.offset + 8);
9d8504b1 10142 bfd_put_32 (output_bfd, plt_entry[3],
ce558b89 10143 htab->elf.splt->contents + ent->plt.offset + 12);
9d8504b1
PB
10144
10145 /* This instruction is an immediate load. The value loaded is
10146 the byte offset of the R_PPC_JMP_SLOT relocation from the
10147 start of the .rela.plt section. The value is stored in the
10148 low-order 16 bits of the load instruction. */
10149 /* NOTE: It appears that this is now an index rather than a
10150 prescaled offset. */
5b914448 10151 bfd_put_32 (output_bfd,
9d8504b1 10152 plt_entry[4] | reloc_index,
ce558b89 10153 htab->elf.splt->contents + ent->plt.offset + 16);
9d8504b1
PB
10154 /* This instruction is a PC-relative branch whose target is
10155 the start of the PLT section. The address of this branch
10156 instruction is 20 bytes beyond the start of this PLT entry.
10157 The address is encoded in bits 6-29, inclusive. The value
10158 stored is right-shifted by two bits, permitting a 26-bit
10159 offset. */
5b914448
AM
10160 bfd_put_32 (output_bfd,
10161 (plt_entry[5]
9d8504b1 10162 | (-(ent->plt.offset + 20) & 0x03fffffc)),
ce558b89 10163 htab->elf.splt->contents + ent->plt.offset + 20);
9d8504b1 10164 bfd_put_32 (output_bfd, plt_entry[6],
ce558b89 10165 htab->elf.splt->contents + ent->plt.offset + 24);
9d8504b1 10166 bfd_put_32 (output_bfd, plt_entry[7],
ce558b89 10167 htab->elf.splt->contents + ent->plt.offset + 28);
9d8504b1
PB
10168
10169 /* Fill in the GOT entry corresponding to this PLT slot with
a8685210 10170 the address immediately after the "bctr" instruction
9d8504b1 10171 in this PLT entry. */
ce558b89
AM
10172 bfd_put_32 (output_bfd, (htab->elf.splt->output_section->vma
10173 + htab->elf.splt->output_offset
9d8504b1 10174 + ent->plt.offset + 16),
ce558b89 10175 htab->elf.sgotplt->contents + got_offset);
9d8504b1 10176
0e1862bb 10177 if (!bfd_link_pic (info))
9d8504b1
PB
10178 {
10179 /* Fill in a couple of entries in .rela.plt.unloaded. */
10180 loc = htab->srelplt2->contents
10181 + ((VXWORKS_PLTRESOLVE_RELOCS + reloc_index
10182 * VXWORKS_PLT_NON_JMP_SLOT_RELOCS)
10183 * sizeof (Elf32_External_Rela));
10184
10185 /* Provide the @ha relocation for the first instruction. */
ce558b89
AM
10186 rela.r_offset = (htab->elf.splt->output_section->vma
10187 + htab->elf.splt->output_offset
9d8504b1 10188 + ent->plt.offset + 2);
636ce3f5 10189 rela.r_info = ELF32_R_INFO (htab->elf.hgot->indx,
9d8504b1
PB
10190 R_PPC_ADDR16_HA);
10191 rela.r_addend = got_offset;
10192 bfd_elf32_swap_reloca_out (output_bfd, &rela, loc);
10193 loc += sizeof (Elf32_External_Rela);
10194
10195 /* Provide the @l relocation for the second instruction. */
ce558b89
AM
10196 rela.r_offset = (htab->elf.splt->output_section->vma
10197 + htab->elf.splt->output_offset
9d8504b1 10198 + ent->plt.offset + 6);
636ce3f5 10199 rela.r_info = ELF32_R_INFO (htab->elf.hgot->indx,
9d8504b1
PB
10200 R_PPC_ADDR16_LO);
10201 rela.r_addend = got_offset;
10202 bfd_elf32_swap_reloca_out (output_bfd, &rela, loc);
10203 loc += sizeof (Elf32_External_Rela);
10204
10205 /* Provide a relocation for the GOT entry corresponding to this
10206 PLT slot. Point it at the middle of the .plt entry. */
ce558b89
AM
10207 rela.r_offset = (htab->elf.sgotplt->output_section->vma
10208 + htab->elf.sgotplt->output_offset
9d8504b1 10209 + got_offset);
7325306f 10210 rela.r_info = ELF32_R_INFO (htab->elf.hplt->indx,
9d8504b1
PB
10211 R_PPC_ADDR32);
10212 rela.r_addend = ent->plt.offset + 16;
10213 bfd_elf32_swap_reloca_out (output_bfd, &rela, loc);
10214 }
10215
10216 /* VxWorks uses non-standard semantics for R_PPC_JMP_SLOT.
10217 In particular, the offset for the relocation is not the
10218 address of the PLT entry for this function, as specified
10219 by the ABI. Instead, the offset is set to the address of
10220 the GOT slot for this function. See EABI 4.4.4.1. */
ce558b89
AM
10221 rela.r_offset = (htab->elf.sgotplt->output_section->vma
10222 + htab->elf.sgotplt->output_offset
9d8504b1
PB
10223 + got_offset);
10224
a6aa5195
AM
10225 }
10226 else
10227 {
ce558b89 10228 asection *splt = htab->elf.splt;
25f23106
AM
10229 if (!htab->elf.dynamic_sections_created
10230 || h->dynindx == -1)
ce558b89 10231 splt = htab->elf.iplt;
e054468f
AM
10232
10233 rela.r_offset = (splt->output_section->vma
10234 + splt->output_offset
9d8504b1 10235 + ent->plt.offset);
e054468f 10236 if (htab->plt_type == PLT_OLD
25f23106
AM
10237 || !htab->elf.dynamic_sections_created
10238 || h->dynindx == -1)
9d8504b1
PB
10239 {
10240 /* We don't need to fill in the .plt. The ppc dynamic
10241 linker will fill it in. */
10242 }
10243 else
10244 {
10245 bfd_vma val = (htab->glink_pltresolve + ent->plt.offset
10246 + htab->glink->output_section->vma
10247 + htab->glink->output_offset);
10248 bfd_put_32 (output_bfd, val,
e054468f 10249 splt->contents + ent->plt.offset);
9d8504b1 10250 }
a6aa5195 10251 }
e1a9cb8e 10252
a6aa5195 10253 /* Fill in the entry in the .rela.plt section. */
a6aa5195 10254 rela.r_addend = 0;
e054468f
AM
10255 if (!htab->elf.dynamic_sections_created
10256 || h->dynindx == -1)
10257 {
10258 BFD_ASSERT (h->type == STT_GNU_IFUNC
10259 && h->def_regular
10260 && (h->root.type == bfd_link_hash_defined
10261 || h->root.type == bfd_link_hash_defweak));
10262 rela.r_info = ELF32_R_INFO (0, R_PPC_IRELATIVE);
10263 rela.r_addend = SYM_VAL (h);
10264 }
10265 else
10266 rela.r_info = ELF32_R_INFO (h->dynindx, R_PPC_JMP_SLOT);
e1a9cb8e 10267
25f23106
AM
10268 if (!htab->elf.dynamic_sections_created
10269 || h->dynindx == -1)
ce558b89
AM
10270 loc = (htab->elf.irelplt->contents
10271 + (htab->elf.irelplt->reloc_count++
25f23106 10272 * sizeof (Elf32_External_Rela)));
e054468f 10273 else
ce558b89 10274 loc = (htab->elf.srelplt->contents
25f23106 10275 + reloc_index * sizeof (Elf32_External_Rela));
a6aa5195 10276 bfd_elf32_swap_reloca_out (output_bfd, &rela, loc);
e1a9cb8e 10277
a6aa5195
AM
10278 if (!h->def_regular)
10279 {
0eb4a168
AM
10280 /* Mark the symbol as undefined, rather than as
10281 defined in the .plt section. Leave the value if
10282 there were any relocations where pointer equality
10283 matters (this is a clue for the dynamic linker, to
10284 make function pointer comparisons work between an
10285 application and shared library), otherwise set it
10286 to zero. */
a6aa5195 10287 sym->st_shndx = SHN_UNDEF;
0eb4a168 10288 if (!h->pointer_equality_needed)
a6aa5195 10289 sym->st_value = 0;
0eb4a168
AM
10290 else if (!h->ref_regular_nonweak)
10291 {
625af618
AM
10292 /* This breaks function pointer comparisons, but
10293 that is better than breaking tests for a NULL
0eb4a168 10294 function pointer. */
0eb4a168
AM
10295 sym->st_value = 0;
10296 }
a6aa5195 10297 }
de972ffa 10298 else if (h->type == STT_GNU_IFUNC
0e1862bb 10299 && !bfd_link_pic (info))
de972ffa
AM
10300 {
10301 /* Set the value of ifunc symbols in a non-pie
10302 executable to the glink entry. This is to avoid
10303 text relocations. We can't do this for ifunc in
10304 allocate_dynrelocs, as we do for normal dynamic
10305 function symbols with plt entries, because we need
10306 to keep the original value around for the ifunc
10307 relocation. */
10308 sym->st_shndx = (_bfd_elf_section_from_bfd_section
10309 (output_bfd, htab->glink->output_section));
5b914448
AM
10310 sym->st_value = (ent->glink_offset
10311 + htab->glink->output_offset
de972ffa
AM
10312 + htab->glink->output_section->vma);
10313 }
a6aa5195
AM
10314 doneone = TRUE;
10315 }
e1a9cb8e 10316
e054468f 10317 if (htab->plt_type == PLT_NEW
25f23106
AM
10318 || !htab->elf.dynamic_sections_created
10319 || h->dynindx == -1)
a6aa5195 10320 {
a7f2871e 10321 unsigned char *p;
ce558b89 10322 asection *splt = htab->elf.splt;
25f23106
AM
10323 if (!htab->elf.dynamic_sections_created
10324 || h->dynindx == -1)
ce558b89 10325 splt = htab->elf.iplt;
e1a9cb8e 10326
a7f2871e
AM
10327 p = (unsigned char *) htab->glink->contents + ent->glink_offset;
10328
5446cbdf 10329 if (h == htab->tls_get_addr && !htab->params->no_tls_get_addr_opt)
a7f2871e
AM
10330 {
10331 bfd_put_32 (output_bfd, LWZ_11_3, p);
10332 p += 4;
10333 bfd_put_32 (output_bfd, LWZ_12_3 + 4, p);
10334 p += 4;
10335 bfd_put_32 (output_bfd, MR_0_3, p);
10336 p += 4;
10337 bfd_put_32 (output_bfd, CMPWI_11_0, p);
10338 p += 4;
10339 bfd_put_32 (output_bfd, ADD_3_12_2, p);
10340 p += 4;
10341 bfd_put_32 (output_bfd, BEQLR, p);
10342 p += 4;
10343 bfd_put_32 (output_bfd, MR_3_0, p);
10344 p += 4;
10345 bfd_put_32 (output_bfd, NOP, p);
10346 p += 4;
10347 }
10348
10349 write_glink_stub (ent, splt, p, info);
e1a9cb8e 10350
0e1862bb 10351 if (!bfd_link_pic (info))
e054468f
AM
10352 /* We only need one non-PIC glink stub. */
10353 break;
a6aa5195
AM
10354 }
10355 else
10356 break;
10357 }
e1a9cb8e 10358
25dbc73a
AM
10359 if (h->needs_copy)
10360 {
10361 asection *s;
10362 Elf_Internal_Rela rela;
10363 bfd_byte *loc;
e1a9cb8e 10364
25dbc73a 10365 /* This symbols needs a copy reloc. Set it up. */
e1a9cb8e 10366
25dbc73a
AM
10367#ifdef DEBUG
10368 fprintf (stderr, ", copy");
10369#endif
e1a9cb8e 10370
25dbc73a 10371 BFD_ASSERT (h->dynindx != -1);
86bbe32f 10372
4dc4a9a5 10373 if (ppc_elf_hash_entry (h)->has_sda_refs)
25dbc73a 10374 s = htab->relsbss;
afbf7e8e 10375 else if (h->root.u.def.section == htab->elf.sdynrelro)
5474d94f 10376 s = htab->elf.sreldynrelro;
25dbc73a 10377 else
9d19e4fd 10378 s = htab->elf.srelbss;
25dbc73a 10379 BFD_ASSERT (s != NULL);
e1a9cb8e 10380
e87d4038 10381 rela.r_offset = SYM_VAL (h);
25dbc73a
AM
10382 rela.r_info = ELF32_R_INFO (h->dynindx, R_PPC_COPY);
10383 rela.r_addend = 0;
10384 loc = s->contents + s->reloc_count++ * sizeof (Elf32_External_Rela);
10385 bfd_elf32_swap_reloca_out (output_bfd, &rela, loc);
10386 }
e1a9cb8e 10387
25dbc73a
AM
10388#ifdef DEBUG
10389 fprintf (stderr, "\n");
10390#endif
e1a9cb8e 10391
25dbc73a
AM
10392 return TRUE;
10393}
10394\f
10395static enum elf_reloc_type_class
7e612e98
AM
10396ppc_elf_reloc_type_class (const struct bfd_link_info *info,
10397 const asection *rel_sec,
10398 const Elf_Internal_Rela *rela)
e1a9cb8e 10399{
7e612e98
AM
10400 struct ppc_elf_link_hash_table *htab = ppc_elf_hash_table (info);
10401
ce558b89 10402 if (rel_sec == htab->elf.irelplt)
7e612e98
AM
10403 return reloc_class_ifunc;
10404
25dbc73a
AM
10405 switch (ELF32_R_TYPE (rela->r_info))
10406 {
10407 case R_PPC_RELATIVE:
10408 return reloc_class_relative;
25dbc73a
AM
10409 case R_PPC_JMP_SLOT:
10410 return reloc_class_plt;
10411 case R_PPC_COPY:
10412 return reloc_class_copy;
10413 default:
10414 return reloc_class_normal;
10415 }
e1a9cb8e 10416}
25dbc73a
AM
10417\f
10418/* Finish up the dynamic sections. */
e1a9cb8e 10419
25dbc73a
AM
10420static bfd_boolean
10421ppc_elf_finish_dynamic_sections (bfd *output_bfd,
10422 struct bfd_link_info *info)
e1a9cb8e 10423{
25dbc73a
AM
10424 asection *sdyn;
10425 struct ppc_elf_link_hash_table *htab;
1fe44d79 10426 bfd_vma got;
e87d4038
AM
10427 bfd *dynobj;
10428 bfd_boolean ret = TRUE;
e1a9cb8e 10429
25dbc73a
AM
10430#ifdef DEBUG
10431 fprintf (stderr, "ppc_elf_finish_dynamic_sections called\n");
10432#endif
6b0817e5 10433
25dbc73a 10434 htab = ppc_elf_hash_table (info);
ce558b89 10435 dynobj = htab->elf.dynobj;
3d4d4302 10436 sdyn = bfd_get_linker_section (dynobj, ".dynamic");
e1a9cb8e 10437
1fe44d79
AM
10438 got = 0;
10439 if (htab->elf.hgot != NULL)
e87d4038 10440 got = SYM_VAL (htab->elf.hgot);
1fe44d79 10441
25dbc73a 10442 if (htab->elf.dynamic_sections_created)
e1a9cb8e 10443 {
25dbc73a 10444 Elf32_External_Dyn *dyncon, *dynconend;
e1a9cb8e 10445
ce558b89 10446 BFD_ASSERT (htab->elf.splt != NULL && sdyn != NULL);
86bbe32f 10447
25dbc73a
AM
10448 dyncon = (Elf32_External_Dyn *) sdyn->contents;
10449 dynconend = (Elf32_External_Dyn *) (sdyn->contents + sdyn->size);
10450 for (; dyncon < dynconend; dyncon++)
10451 {
10452 Elf_Internal_Dyn dyn;
10453 asection *s;
e1a9cb8e 10454
9d8504b1 10455 bfd_elf32_swap_dyn_in (dynobj, dyncon, &dyn);
86bbe32f 10456
25dbc73a
AM
10457 switch (dyn.d_tag)
10458 {
10459 case DT_PLTGOT:
9d8504b1 10460 if (htab->is_vxworks)
ce558b89 10461 s = htab->elf.sgotplt;
9d8504b1 10462 else
ce558b89 10463 s = htab->elf.splt;
25dbc73a
AM
10464 dyn.d_un.d_ptr = s->output_section->vma + s->output_offset;
10465 break;
86bbe32f 10466
25dbc73a 10467 case DT_PLTRELSZ:
ce558b89 10468 dyn.d_un.d_val = htab->elf.srelplt->size;
25dbc73a 10469 break;
e1a9cb8e 10470
25dbc73a 10471 case DT_JMPREL:
ce558b89 10472 s = htab->elf.srelplt;
25dbc73a
AM
10473 dyn.d_un.d_ptr = s->output_section->vma + s->output_offset;
10474 break;
2f89ff8d 10475
1fe44d79
AM
10476 case DT_PPC_GOT:
10477 dyn.d_un.d_ptr = got;
d7128ce4
AM
10478 break;
10479
25dbc73a 10480 default:
7a2b07ff
NS
10481 if (htab->is_vxworks
10482 && elf_vxworks_finish_dynamic_entry (output_bfd, &dyn))
10483 break;
25dbc73a
AM
10484 continue;
10485 }
4c45e5c9 10486
25dbc73a
AM
10487 bfd_elf32_swap_dyn_out (output_bfd, &dyn, dyncon);
10488 }
10489 }
4c45e5c9 10490
6528b6eb
AM
10491 if (htab->elf.sgot != NULL
10492 && htab->elf.sgot->output_section != bfd_abs_section_ptr)
25dbc73a 10493 {
ce558b89
AM
10494 if (htab->elf.hgot->root.u.def.section == htab->elf.sgot
10495 || htab->elf.hgot->root.u.def.section == htab->elf.sgotplt)
e87d4038 10496 {
e79f5955 10497 unsigned char *p = htab->elf.hgot->root.u.def.section->contents;
2f89ff8d 10498
e87d4038
AM
10499 p += htab->elf.hgot->root.u.def.value;
10500 if (htab->plt_type == PLT_OLD)
e79f5955
AM
10501 {
10502 /* Add a blrl instruction at _GLOBAL_OFFSET_TABLE_-4
10503 so that a function can easily find the address of
10504 _GLOBAL_OFFSET_TABLE_. */
10505 BFD_ASSERT (htab->elf.hgot->root.u.def.value - 4
10506 < htab->elf.hgot->root.u.def.section->size);
10507 bfd_put_32 (output_bfd, 0x4e800021, p - 4);
10508 }
3b36f7e6 10509
e87d4038 10510 if (sdyn != NULL)
e79f5955
AM
10511 {
10512 bfd_vma val = sdyn->output_section->vma + sdyn->output_offset;
10513 BFD_ASSERT (htab->elf.hgot->root.u.def.value
10514 < htab->elf.hgot->root.u.def.section->size);
10515 bfd_put_32 (output_bfd, val, p);
10516 }
e87d4038
AM
10517 }
10518 else
10519 {
695344c0 10520 /* xgettext:c-format */
8de848d8 10521 info->callbacks->einfo (_("%P: %s not defined in linker created %s\n"),
25f53a85 10522 htab->elf.hgot->root.root.string,
ce558b89
AM
10523 (htab->elf.sgotplt != NULL
10524 ? htab->elf.sgotplt->name
10525 : htab->elf.sgot->name));
e87d4038
AM
10526 bfd_set_error (bfd_error_bad_value);
10527 ret = FALSE;
10528 }
25dbc73a 10529
ce558b89 10530 elf_section_data (htab->elf.sgot->output_section)->this_hdr.sh_entsize = 4;
25dbc73a
AM
10531 }
10532
9d8504b1 10533 /* Fill in the first entry in the VxWorks procedure linkage table. */
6528b6eb
AM
10534 if (htab->is_vxworks
10535 && htab->elf.splt != NULL
10536 && htab->elf.splt->size != 0
10537 && htab->elf.splt->output_section != bfd_abs_section_ptr)
9d8504b1 10538 {
6528b6eb 10539 asection *splt = htab->elf.splt;
9d8504b1 10540 /* Use the right PLT. */
0e1862bb 10541 const bfd_vma *plt_entry = (bfd_link_pic (info)
5b914448
AM
10542 ? ppc_elf_vxworks_pic_plt0_entry
10543 : ppc_elf_vxworks_plt0_entry);
9d8504b1 10544
0e1862bb 10545 if (!bfd_link_pic (info))
9d8504b1 10546 {
e87d4038 10547 bfd_vma got_value = SYM_VAL (htab->elf.hgot);
9d8504b1 10548
e87d4038 10549 bfd_put_32 (output_bfd, plt_entry[0] | PPC_HA (got_value),
9d8504b1 10550 splt->contents + 0);
e87d4038 10551 bfd_put_32 (output_bfd, plt_entry[1] | PPC_LO (got_value),
9d8504b1
PB
10552 splt->contents + 4);
10553 }
10554 else
10555 {
10556 bfd_put_32 (output_bfd, plt_entry[0], splt->contents + 0);
10557 bfd_put_32 (output_bfd, plt_entry[1], splt->contents + 4);
10558 }
10559 bfd_put_32 (output_bfd, plt_entry[2], splt->contents + 8);
10560 bfd_put_32 (output_bfd, plt_entry[3], splt->contents + 12);
10561 bfd_put_32 (output_bfd, plt_entry[4], splt->contents + 16);
10562 bfd_put_32 (output_bfd, plt_entry[5], splt->contents + 20);
10563 bfd_put_32 (output_bfd, plt_entry[6], splt->contents + 24);
10564 bfd_put_32 (output_bfd, plt_entry[7], splt->contents + 28);
10565
0e1862bb 10566 if (! bfd_link_pic (info))
9d8504b1
PB
10567 {
10568 Elf_Internal_Rela rela;
10569 bfd_byte *loc;
10570
10571 loc = htab->srelplt2->contents;
10572
10573 /* Output the @ha relocation for the first instruction. */
ce558b89
AM
10574 rela.r_offset = (htab->elf.splt->output_section->vma
10575 + htab->elf.splt->output_offset
9d8504b1 10576 + 2);
636ce3f5 10577 rela.r_info = ELF32_R_INFO (htab->elf.hgot->indx, R_PPC_ADDR16_HA);
9d8504b1
PB
10578 rela.r_addend = 0;
10579 bfd_elf32_swap_reloca_out (output_bfd, &rela, loc);
10580 loc += sizeof (Elf32_External_Rela);
5b914448 10581
9d8504b1 10582 /* Output the @l relocation for the second instruction. */
ce558b89
AM
10583 rela.r_offset = (htab->elf.splt->output_section->vma
10584 + htab->elf.splt->output_offset
9d8504b1 10585 + 6);
636ce3f5 10586 rela.r_info = ELF32_R_INFO (htab->elf.hgot->indx, R_PPC_ADDR16_LO);
9d8504b1
PB
10587 rela.r_addend = 0;
10588 bfd_elf32_swap_reloca_out (output_bfd, &rela, loc);
10589 loc += sizeof (Elf32_External_Rela);
10590
10591 /* Fix up the remaining relocations. They may have the wrong
10592 symbol index for _G_O_T_ or _P_L_T_ depending on the order
10593 in which symbols were output. */
10594 while (loc < htab->srelplt2->contents + htab->srelplt2->size)
10595 {
10596 Elf_Internal_Rela rel;
10597
10598 bfd_elf32_swap_reloc_in (output_bfd, loc, &rel);
636ce3f5 10599 rel.r_info = ELF32_R_INFO (htab->elf.hgot->indx, R_PPC_ADDR16_HA);
9d8504b1
PB
10600 bfd_elf32_swap_reloc_out (output_bfd, &rel, loc);
10601 loc += sizeof (Elf32_External_Rela);
10602
10603 bfd_elf32_swap_reloc_in (output_bfd, loc, &rel);
636ce3f5 10604 rel.r_info = ELF32_R_INFO (htab->elf.hgot->indx, R_PPC_ADDR16_LO);
9d8504b1
PB
10605 bfd_elf32_swap_reloc_out (output_bfd, &rel, loc);
10606 loc += sizeof (Elf32_External_Rela);
10607
10608 bfd_elf32_swap_reloc_in (output_bfd, loc, &rel);
7325306f 10609 rel.r_info = ELF32_R_INFO (htab->elf.hplt->indx, R_PPC_ADDR32);
9d8504b1
PB
10610 bfd_elf32_swap_reloc_out (output_bfd, &rel, loc);
10611 loc += sizeof (Elf32_External_Rela);
10612 }
10613 }
10614 }
10615
e054468f
AM
10616 if (htab->glink != NULL
10617 && htab->glink->contents != NULL
10618 && htab->elf.dynamic_sections_created)
d7128ce4
AM
10619 {
10620 unsigned char *p;
10621 unsigned char *endp;
a6aa5195 10622 bfd_vma res0;
d7128ce4 10623 unsigned int i;
a6aa5195
AM
10624
10625 /*
10626 * PIC glink code is the following:
10627 *
10628 * # ith PLT code stub.
10629 * addis 11,30,(plt+(i-1)*4-got)@ha
10630 * lwz 11,(plt+(i-1)*4-got)@l(11)
10631 * mtctr 11
10632 * bctr
10633 *
10634 * # A table of branches, one for each plt entry.
176a0d42 10635 * # The idea is that the plt call stub loads ctr and r11 with these
a6aa5195
AM
10636 * # addresses, so (r11 - res_0) gives the plt index * 4.
10637 * res_0: b PLTresolve
10638 * res_1: b PLTresolve
10639 * .
10640 * # Some number of entries towards the end can be nops
10641 * res_n_m3: nop
10642 * res_n_m2: nop
10643 * res_n_m1:
10644 *
10645 * PLTresolve:
10646 * addis 11,11,(1f-res_0)@ha
10647 * mflr 0
10648 * bcl 20,31,1f
10649 * 1: addi 11,11,(1b-res_0)@l
10650 * mflr 12
10651 * mtlr 0
10652 * sub 11,11,12 # r11 = index * 4
10653 * addis 12,12,(got+4-1b)@ha
10654 * lwz 0,(got+4-1b)@l(12) # got[1] address of dl_runtime_resolve
10655 * lwz 12,(got+8-1b)@l(12) # got[2] contains the map address
10656 * mtctr 0
10657 * add 0,11,11
10658 * add 11,0,11 # r11 = index * 12 = reloc offset.
10659 * bctr
10660 */
10661 static const unsigned int pic_plt_resolve[] =
10662 {
10663 ADDIS_11_11,
10664 MFLR_0,
10665 BCL_20_31,
10666 ADDI_11_11,
10667 MFLR_12,
10668 MTLR_0,
10669 SUB_11_11_12,
10670 ADDIS_12_12,
10671 LWZ_0_12,
10672 LWZ_12_12,
10673 MTCTR_0,
10674 ADD_0_11_11,
10675 ADD_11_0_11,
10676 BCTR,
10677 NOP,
10678 NOP
10679 };
10680
176a0d42
AM
10681 /*
10682 * Non-PIC glink code is a little simpler.
10683 *
10684 * # ith PLT code stub.
10685 * lis 11,(plt+(i-1)*4)@ha
10686 * lwz 11,(plt+(i-1)*4)@l(11)
10687 * mtctr 11
10688 * bctr
10689 *
10690 * The branch table is the same, then comes
10691 *
10692 * PLTresolve:
10693 * lis 12,(got+4)@ha
10694 * addis 11,11,(-res_0)@ha
10695 * lwz 0,(got+4)@l(12) # got[1] address of dl_runtime_resolve
10696 * addi 11,11,(-res_0)@l # r11 = index * 4
10697 * mtctr 0
10698 * add 0,11,11
10699 * lwz 12,(got+8)@l(12) # got[2] contains the map address
10700 * add 11,0,11 # r11 = index * 12 = reloc offset.
10701 * bctr
10702 */
d7128ce4
AM
10703 static const unsigned int plt_resolve[] =
10704 {
a6aa5195
AM
10705 LIS_12,
10706 ADDIS_11_11,
10707 LWZ_0_12,
10708 ADDI_11_11,
d7128ce4 10709 MTCTR_0,
7e8aeb9a 10710 ADD_0_11_11,
a6aa5195 10711 LWZ_12_12,
7e8aeb9a 10712 ADD_11_0_11,
d7128ce4
AM
10713 BCTR,
10714 NOP,
10715 NOP,
a6aa5195
AM
10716 NOP,
10717 NOP,
10718 NOP,
10719 NOP,
d7128ce4
AM
10720 NOP
10721 };
10722
a6aa5195
AM
10723 if (ARRAY_SIZE (pic_plt_resolve) != GLINK_PLTRESOLVE / 4)
10724 abort ();
10725 if (ARRAY_SIZE (plt_resolve) != GLINK_PLTRESOLVE / 4)
7e8aeb9a
AM
10726 abort ();
10727
a6aa5195 10728 /* Build the branch table, one for each plt entry (less one),
86b9da88 10729 and perhaps some padding. */
a6aa5195
AM
10730 p = htab->glink->contents;
10731 p += htab->glink_pltresolve;
86b9da88
AM
10732 endp = htab->glink->contents;
10733 endp += htab->glink->size - GLINK_PLTRESOLVE;
da3a2088 10734 while (p < endp - (htab->params->ppc476_workaround ? 0 : 8 * 4))
86b9da88
AM
10735 {
10736 bfd_put_32 (output_bfd, B + endp - p, p);
10737 p += 4;
10738 }
10739 while (p < endp)
10740 {
10741 bfd_put_32 (output_bfd, NOP, p);
10742 p += 4;
10743 }
10744
7e8aeb9a 10745 res0 = (htab->glink_pltresolve
86b9da88
AM
10746 + htab->glink->output_section->vma
10747 + htab->glink->output_offset);
10748
da3a2088
AM
10749 if (htab->params->ppc476_workaround)
10750 {
10751 /* Ensure that a call stub at the end of a page doesn't
10752 result in prefetch over the end of the page into the
10753 glink branch table. */
10754 bfd_vma pagesize = (bfd_vma) 1 << htab->params->pagesize_p2;
10755 bfd_vma page_addr;
10756 bfd_vma glink_start = (htab->glink->output_section->vma
10757 + htab->glink->output_offset);
10758
10759 for (page_addr = res0 & -pagesize;
10760 page_addr > glink_start;
10761 page_addr -= pagesize)
10762 {
10763 /* We have a plt call stub that may need fixing. */
10764 bfd_byte *loc;
10765 unsigned int insn;
10766
10767 loc = htab->glink->contents + page_addr - 4 - glink_start;
10768 insn = bfd_get_32 (output_bfd, loc);
10769 if (insn == BCTR)
10770 {
10771 /* By alignment, we know that there must be at least
10772 one other call stub before this one. */
10773 insn = bfd_get_32 (output_bfd, loc - 16);
10774 if (insn == BCTR)
10775 bfd_put_32 (output_bfd, B | (-16 & 0x3fffffc), loc);
10776 else
10777 bfd_put_32 (output_bfd, B | (-20 & 0x3fffffc), loc);
10778 }
10779 }
10780 }
10781
86b9da88 10782 /* Last comes the PLTresolve stub. */
0e1862bb 10783 if (bfd_link_pic (info))
7e8aeb9a 10784 {
a6aa5195 10785 bfd_vma bcl;
d7128ce4 10786
a6aa5195 10787 for (i = 0; i < ARRAY_SIZE (pic_plt_resolve); i++)
7e8aeb9a 10788 {
da3a2088
AM
10789 unsigned int insn = pic_plt_resolve[i];
10790
10791 if (htab->params->ppc476_workaround && insn == NOP)
10792 insn = BA + 0;
10793 bfd_put_32 (output_bfd, insn, p);
7e8aeb9a
AM
10794 p += 4;
10795 }
a6aa5195
AM
10796 p -= 4 * ARRAY_SIZE (pic_plt_resolve);
10797
10798 bcl = (htab->glink->size - GLINK_PLTRESOLVE + 3*4
10799 + htab->glink->output_section->vma
10800 + htab->glink->output_offset);
10801
10802 bfd_put_32 (output_bfd,
10803 ADDIS_11_11 + PPC_HA (bcl - res0), p + 0*4);
10804 bfd_put_32 (output_bfd,
10805 ADDI_11_11 + PPC_LO (bcl - res0), p + 3*4);
10806 bfd_put_32 (output_bfd,
10807 ADDIS_12_12 + PPC_HA (got + 4 - bcl), p + 7*4);
10808 if (PPC_HA (got + 4 - bcl) == PPC_HA (got + 8 - bcl))
10809 {
10810 bfd_put_32 (output_bfd,
10811 LWZ_0_12 + PPC_LO (got + 4 - bcl), p + 8*4);
10812 bfd_put_32 (output_bfd,
10813 LWZ_12_12 + PPC_LO (got + 8 - bcl), p + 9*4);
10814 }
10815 else
10816 {
10817 bfd_put_32 (output_bfd,
10818 LWZU_0_12 + PPC_LO (got + 4 - bcl), p + 8*4);
10819 bfd_put_32 (output_bfd,
10820 LWZ_12_12 + 4, p + 9*4);
10821 }
7e8aeb9a
AM
10822 }
10823 else
d7128ce4 10824 {
a6aa5195 10825 for (i = 0; i < ARRAY_SIZE (plt_resolve); i++)
7e8aeb9a 10826 {
da3a2088
AM
10827 unsigned int insn = plt_resolve[i];
10828
10829 if (htab->params->ppc476_workaround && insn == NOP)
10830 insn = BA + 0;
10831 bfd_put_32 (output_bfd, insn, p);
7e8aeb9a
AM
10832 p += 4;
10833 }
a6aa5195
AM
10834 p -= 4 * ARRAY_SIZE (plt_resolve);
10835
10836 bfd_put_32 (output_bfd,
10837 LIS_12 + PPC_HA (got + 4), p + 0*4);
10838 bfd_put_32 (output_bfd,
10839 ADDIS_11_11 + PPC_HA (-res0), p + 1*4);
10840 bfd_put_32 (output_bfd,
10841 ADDI_11_11 + PPC_LO (-res0), p + 3*4);
10842 if (PPC_HA (got + 4) == PPC_HA (got + 8))
10843 {
10844 bfd_put_32 (output_bfd,
10845 LWZ_0_12 + PPC_LO (got + 4), p + 2*4);
10846 bfd_put_32 (output_bfd,
10847 LWZ_12_12 + PPC_LO (got + 8), p + 6*4);
10848 }
10849 else
10850 {
10851 bfd_put_32 (output_bfd,
10852 LWZU_0_12 + PPC_LO (got + 4), p + 2*4);
10853 bfd_put_32 (output_bfd,
10854 LWZ_12_12 + 4, p + 6*4);
10855 }
d7128ce4 10856 }
d7128ce4
AM
10857 }
10858
6177242a
AM
10859 if (htab->glink_eh_frame != NULL
10860 && htab->glink_eh_frame->contents != NULL)
10861 {
10862 unsigned char *p = htab->glink_eh_frame->contents;
10863 bfd_vma val;
10864
6177242a
AM
10865 p += sizeof (glink_eh_frame_cie);
10866 /* FDE length. */
6177242a
AM
10867 p += 4;
10868 /* CIE pointer. */
6177242a
AM
10869 p += 4;
10870 /* Offset to .glink. */
10871 val = (htab->glink->output_section->vma
10872 + htab->glink->output_offset);
10873 val -= (htab->glink_eh_frame->output_section->vma
10874 + htab->glink_eh_frame->output_offset);
10875 val -= p - htab->glink_eh_frame->contents;
10876 bfd_put_32 (htab->elf.dynobj, val, p);
6177242a 10877
dbaa2011 10878 if (htab->glink_eh_frame->sec_info_type == SEC_INFO_TYPE_EH_FRAME
6177242a
AM
10879 && !_bfd_elf_write_section_eh_frame (output_bfd, info,
10880 htab->glink_eh_frame,
10881 htab->glink_eh_frame->contents))
10882 return FALSE;
10883 }
10884
e87d4038 10885 return ret;
25dbc73a 10886}
e1a9cb8e 10887\f
6d00b590 10888#define TARGET_LITTLE_SYM powerpc_elf32_le_vec
252b5132 10889#define TARGET_LITTLE_NAME "elf32-powerpcle"
6d00b590 10890#define TARGET_BIG_SYM powerpc_elf32_vec
252b5132
RH
10891#define TARGET_BIG_NAME "elf32-powerpc"
10892#define ELF_ARCH bfd_arch_powerpc
ae95ffa6 10893#define ELF_TARGET_ID PPC32_ELF_DATA
252b5132 10894#define ELF_MACHINE_CODE EM_PPC
d0facd1b
NC
10895#ifdef __QNXTARGET__
10896#define ELF_MAXPAGESIZE 0x1000
04c6a44c 10897#define ELF_COMMONPAGESIZE 0x1000
d0facd1b 10898#else
252b5132 10899#define ELF_MAXPAGESIZE 0x10000
04c6a44c 10900#define ELF_COMMONPAGESIZE 0x10000
d0facd1b 10901#endif
b1342370 10902#define ELF_MINPAGESIZE 0x1000
252b5132
RH
10903#define elf_info_to_howto ppc_elf_info_to_howto
10904
10905#ifdef EM_CYGNUS_POWERPC
10906#define ELF_MACHINE_ALT1 EM_CYGNUS_POWERPC
10907#endif
10908
10909#ifdef EM_PPC_OLD
10910#define ELF_MACHINE_ALT2 EM_PPC_OLD
10911#endif
10912
10913#define elf_backend_plt_not_loaded 1
5474d94f 10914#define elf_backend_want_dynrelro 1
252b5132 10915#define elf_backend_can_gc_sections 1
51b64d56 10916#define elf_backend_can_refcount 1
b491616a 10917#define elf_backend_rela_normal 1
53291d1f 10918#define elf_backend_caches_rawsize 1
252b5132 10919
43c40ab2 10920#define bfd_elf32_mkobject ppc_elf_mkobject
252b5132 10921#define bfd_elf32_bfd_merge_private_bfd_data ppc_elf_merge_private_bfd_data
70bccea4 10922#define bfd_elf32_bfd_relax_section ppc_elf_relax_section
252b5132 10923#define bfd_elf32_bfd_reloc_type_lookup ppc_elf_reloc_type_lookup
b9c361e0 10924#define bfd_elf32_bfd_reloc_name_lookup ppc_elf_reloc_name_lookup
252b5132 10925#define bfd_elf32_bfd_set_private_flags ppc_elf_set_private_flags
70bccea4 10926#define bfd_elf32_bfd_link_hash_table_create ppc_elf_link_hash_table_create
468392fb 10927#define bfd_elf32_get_synthetic_symtab ppc_elf_get_synthetic_symtab
252b5132 10928
feee612b 10929#define elf_backend_object_p ppc_elf_object_p
252b5132
RH
10930#define elf_backend_gc_mark_hook ppc_elf_gc_mark_hook
10931#define elf_backend_gc_sweep_hook ppc_elf_gc_sweep_hook
10932#define elf_backend_section_from_shdr ppc_elf_section_from_shdr
10933#define elf_backend_relocate_section ppc_elf_relocate_section
10934#define elf_backend_create_dynamic_sections ppc_elf_create_dynamic_sections
10935#define elf_backend_check_relocs ppc_elf_check_relocs
7fce784e 10936#define elf_backend_copy_indirect_symbol ppc_elf_copy_indirect_symbol
252b5132
RH
10937#define elf_backend_adjust_dynamic_symbol ppc_elf_adjust_dynamic_symbol
10938#define elf_backend_add_symbol_hook ppc_elf_add_symbol_hook
10939#define elf_backend_size_dynamic_sections ppc_elf_size_dynamic_sections
0eb4a168 10940#define elf_backend_hash_symbol ppc_elf_hash_symbol
252b5132
RH
10941#define elf_backend_finish_dynamic_symbol ppc_elf_finish_dynamic_symbol
10942#define elf_backend_finish_dynamic_sections ppc_elf_finish_dynamic_sections
10943#define elf_backend_fake_sections ppc_elf_fake_sections
10944#define elf_backend_additional_program_headers ppc_elf_additional_program_headers
b9c361e0 10945#define elf_backend_modify_segment_map ppc_elf_modify_segment_map
c5fccbec
DJ
10946#define elf_backend_grok_prstatus ppc_elf_grok_prstatus
10947#define elf_backend_grok_psinfo ppc_elf_grok_psinfo
183e98be 10948#define elf_backend_write_core_note ppc_elf_write_core_note
29c2fb7c 10949#define elf_backend_reloc_type_class ppc_elf_reloc_type_class
70bccea4
AM
10950#define elf_backend_begin_write_processing ppc_elf_begin_write_processing
10951#define elf_backend_final_write_processing ppc_elf_final_write_processing
10952#define elf_backend_write_section ppc_elf_write_section
551b43fd 10953#define elf_backend_get_sec_type_attr ppc_elf_get_sec_type_attr
4c45e5c9 10954#define elf_backend_plt_sym_val ppc_elf_plt_sym_val
8a696751 10955#define elf_backend_action_discarded ppc_elf_action_discarded
74541ad4 10956#define elf_backend_init_index_section _bfd_elf_init_1_index_section
b9c361e0 10957#define elf_backend_lookup_section_flags_hook ppc_elf_lookup_section_flags
252b5132
RH
10958
10959#include "elf32-target.h"
9d8504b1 10960
7b8e7dad
AM
10961/* FreeBSD Target */
10962
10963#undef TARGET_LITTLE_SYM
10964#undef TARGET_LITTLE_NAME
10965
10966#undef TARGET_BIG_SYM
6d00b590 10967#define TARGET_BIG_SYM powerpc_elf32_fbsd_vec
7b8e7dad
AM
10968#undef TARGET_BIG_NAME
10969#define TARGET_BIG_NAME "elf32-powerpc-freebsd"
10970
10971#undef ELF_OSABI
10972#define ELF_OSABI ELFOSABI_FREEBSD
10973
10974#undef elf32_bed
10975#define elf32_bed elf32_powerpc_fbsd_bed
10976
10977#include "elf32-target.h"
10978
9d8504b1
PB
10979/* VxWorks Target */
10980
10981#undef TARGET_LITTLE_SYM
10982#undef TARGET_LITTLE_NAME
10983
10984#undef TARGET_BIG_SYM
6d00b590 10985#define TARGET_BIG_SYM powerpc_elf32_vxworks_vec
9d8504b1
PB
10986#undef TARGET_BIG_NAME
10987#define TARGET_BIG_NAME "elf32-powerpc-vxworks"
10988
7b8e7dad
AM
10989#undef ELF_OSABI
10990
d5e3d971
PB
10991/* VxWorks uses the elf default section flags for .plt. */
10992static const struct bfd_elf_special_section *
4aef7643 10993ppc_elf_vxworks_get_sec_type_attr (bfd *abfd, asection *sec)
9d8504b1 10994{
d5e3d971
PB
10995 if (sec->name == NULL)
10996 return NULL;
10997
10998 if (strcmp (sec->name, ".plt") == 0)
10999 return _bfd_elf_get_sec_type_attr (abfd, sec);
11000
11001 return ppc_elf_get_sec_type_attr (abfd, sec);
11002}
9d8504b1
PB
11003
11004/* Like ppc_elf_link_hash_table_create, but overrides
11005 appropriately for VxWorks. */
11006static struct bfd_link_hash_table *
11007ppc_elf_vxworks_link_hash_table_create (bfd *abfd)
11008{
11009 struct bfd_link_hash_table *ret;
11010
11011 ret = ppc_elf_link_hash_table_create (abfd);
11012 if (ret)
11013 {
11014 struct ppc_elf_link_hash_table *htab
11015 = (struct ppc_elf_link_hash_table *)ret;
11016 htab->is_vxworks = 1;
4a3dc543 11017 htab->plt_type = PLT_VXWORKS;
9d8504b1
PB
11018 htab->plt_entry_size = VXWORKS_PLT_ENTRY_SIZE;
11019 htab->plt_slot_size = VXWORKS_PLT_ENTRY_SIZE;
11020 htab->plt_initial_entry_size = VXWORKS_PLT_INITIAL_ENTRY_SIZE;
11021 }
11022 return ret;
11023}
11024
11025/* Tweak magic VxWorks symbols as they are loaded. */
11026static bfd_boolean
11027ppc_elf_vxworks_add_symbol_hook (bfd *abfd,
11028 struct bfd_link_info *info,
11029 Elf_Internal_Sym *sym,
4aef7643
AM
11030 const char **namep,
11031 flagword *flagsp,
9d8504b1
PB
11032 asection **secp,
11033 bfd_vma *valp)
11034{
4aef7643
AM
11035 if (!elf_vxworks_add_symbol_hook (abfd, info, sym, namep, flagsp, secp,
11036 valp))
9d8504b1
PB
11037 return FALSE;
11038
4aef7643 11039 return ppc_elf_add_symbol_hook (abfd, info, sym, namep, flagsp, secp, valp);
9d8504b1
PB
11040}
11041
9d8504b1
PB
11042static void
11043ppc_elf_vxworks_final_write_processing (bfd *abfd, bfd_boolean linker)
11044{
4aef7643
AM
11045 ppc_elf_final_write_processing (abfd, linker);
11046 elf_vxworks_final_write_processing (abfd, linker);
9d8504b1
PB
11047}
11048
11049/* On VxWorks, we emit relocations against _PROCEDURE_LINKAGE_TABLE_, so
11050 define it. */
11051#undef elf_backend_want_plt_sym
11052#define elf_backend_want_plt_sym 1
11053#undef elf_backend_want_got_plt
11054#define elf_backend_want_got_plt 1
11055#undef elf_backend_got_symbol_offset
11056#define elf_backend_got_symbol_offset 0
11057#undef elf_backend_plt_not_loaded
11058#define elf_backend_plt_not_loaded 0
11059#undef elf_backend_plt_readonly
11060#define elf_backend_plt_readonly 1
11061#undef elf_backend_got_header_size
11062#define elf_backend_got_header_size 12
64f52338
AM
11063#undef elf_backend_dtrel_excludes_plt
11064#define elf_backend_dtrel_excludes_plt 1
9d8504b1 11065
468392fb
AM
11066#undef bfd_elf32_get_synthetic_symtab
11067
9d8504b1
PB
11068#undef bfd_elf32_bfd_link_hash_table_create
11069#define bfd_elf32_bfd_link_hash_table_create \
11070 ppc_elf_vxworks_link_hash_table_create
9d8504b1
PB
11071#undef elf_backend_add_symbol_hook
11072#define elf_backend_add_symbol_hook \
11073 ppc_elf_vxworks_add_symbol_hook
11074#undef elf_backend_link_output_symbol_hook
11075#define elf_backend_link_output_symbol_hook \
9c72ff84 11076 elf_vxworks_link_output_symbol_hook
9d8504b1
PB
11077#undef elf_backend_final_write_processing
11078#define elf_backend_final_write_processing \
11079 ppc_elf_vxworks_final_write_processing
d5e3d971
PB
11080#undef elf_backend_get_sec_type_attr
11081#define elf_backend_get_sec_type_attr \
11082 ppc_elf_vxworks_get_sec_type_attr
9d8504b1
PB
11083#undef elf_backend_emit_relocs
11084#define elf_backend_emit_relocs \
11085 elf_vxworks_emit_relocs
11086
11087#undef elf32_bed
11088#define elf32_bed ppc_elf_vxworks_bed
e054468f 11089#undef elf_backend_post_process_headers
9d8504b1
PB
11090
11091#include "elf32-target.h"
This page took 2.156119 seconds and 4 git commands to generate.