PR 6443
[deliverable/binutils-gdb.git] / bfd / elf32-ppc.c
1 /* PowerPC-specific support for 32-bit ELF
2 Copyright 1994, 1995, 1996, 1997, 1998, 1999, 2000, 2001, 2002, 2003,
3 2004, 2005, 2006, 2007, 2008 Free Software Foundation, Inc.
4 Written by Ian Lance Taylor, Cygnus Support.
5
6 This file is part of BFD, the Binary File Descriptor library.
7
8 This program is free software; you can redistribute it and/or modify
9 it under the terms of the GNU General Public License as published by
10 the Free Software Foundation; either version 3 of the License, or
11 (at your option) any later version.
12
13 This program is distributed in the hope that it will be useful,
14 but WITHOUT ANY WARRANTY; without even the implied warranty of
15 MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
16 GNU General Public License for more details.
17
18 You should have received a copy of the GNU General Public License
19 along with this program; if not, write to the
20 Free Software Foundation, Inc., 51 Franklin Street - Fifth Floor,
21 Boston, MA 02110-1301, USA. */
22
23
24 /* This file is based on a preliminary PowerPC ELF ABI. The
25 information may not match the final PowerPC ELF ABI. It includes
26 suggestions from the in-progress Embedded PowerPC ABI, and that
27 information may also not match. */
28
29 #include "sysdep.h"
30 #include <stdarg.h>
31 #include "bfd.h"
32 #include "bfdlink.h"
33 #include "libbfd.h"
34 #include "elf-bfd.h"
35 #include "elf/ppc.h"
36 #include "elf32-ppc.h"
37 #include "elf-vxworks.h"
38
39 /* RELA relocations are used here. */
40
41 static bfd_reloc_status_type ppc_elf_addr16_ha_reloc
42 (bfd *, arelent *, asymbol *, void *, asection *, bfd *, char **);
43 static bfd_reloc_status_type ppc_elf_unhandled_reloc
44 (bfd *, arelent *, asymbol *, void *, asection *, bfd *, char **);
45
46 /* Branch prediction bit for branch taken relocs. */
47 #define BRANCH_PREDICT_BIT 0x200000
48 /* Mask to set RA in memory instructions. */
49 #define RA_REGISTER_MASK 0x001f0000
50 /* Value to shift register by to insert RA. */
51 #define RA_REGISTER_SHIFT 16
52
53 /* The name of the dynamic interpreter. This is put in the .interp
54 section. */
55 #define ELF_DYNAMIC_INTERPRETER "/usr/lib/ld.so.1"
56
57 /* For old-style PLT. */
58 /* The number of single-slot PLT entries (the rest use two slots). */
59 #define PLT_NUM_SINGLE_ENTRIES 8192
60
61 /* For new-style .glink and .plt. */
62 #define GLINK_PLTRESOLVE 16*4
63 #define GLINK_ENTRY_SIZE 4*4
64
65 /* VxWorks uses its own plt layout, filled in by the static linker. */
66
67 /* The standard VxWorks PLT entry. */
68 #define VXWORKS_PLT_ENTRY_SIZE 32
69 static const bfd_vma ppc_elf_vxworks_plt_entry
70 [VXWORKS_PLT_ENTRY_SIZE / 4] =
71 {
72 0x3d800000, /* lis r12,0 */
73 0x818c0000, /* lwz r12,0(r12) */
74 0x7d8903a6, /* mtctr r12 */
75 0x4e800420, /* bctr */
76 0x39600000, /* li r11,0 */
77 0x48000000, /* b 14 <.PLT0resolve+0x4> */
78 0x60000000, /* nop */
79 0x60000000, /* nop */
80 };
81 static const bfd_vma ppc_elf_vxworks_pic_plt_entry
82 [VXWORKS_PLT_ENTRY_SIZE / 4] =
83 {
84 0x3d9e0000, /* addis r12,r30,0 */
85 0x818c0000, /* lwz r12,0(r12) */
86 0x7d8903a6, /* mtctr r12 */
87 0x4e800420, /* bctr */
88 0x39600000, /* li r11,0 */
89 0x48000000, /* b 14 <.PLT0resolve+0x4> 14: R_PPC_REL24 .PLTresolve */
90 0x60000000, /* nop */
91 0x60000000, /* nop */
92 };
93
94 /* The initial VxWorks PLT entry. */
95 #define VXWORKS_PLT_INITIAL_ENTRY_SIZE 32
96 static const bfd_vma ppc_elf_vxworks_plt0_entry
97 [VXWORKS_PLT_INITIAL_ENTRY_SIZE / 4] =
98 {
99 0x3d800000, /* lis r12,0 */
100 0x398c0000, /* addi r12,r12,0 */
101 0x800c0008, /* lwz r0,8(r12) */
102 0x7c0903a6, /* mtctr r0 */
103 0x818c0004, /* lwz r12,4(r12) */
104 0x4e800420, /* bctr */
105 0x60000000, /* nop */
106 0x60000000, /* nop */
107 };
108 static const bfd_vma ppc_elf_vxworks_pic_plt0_entry
109 [VXWORKS_PLT_INITIAL_ENTRY_SIZE / 4] =
110 {
111 0x819e0008, /* lwz r12,8(r30) */
112 0x7d8903a6, /* mtctr r12 */
113 0x819e0004, /* lwz r12,4(r30) */
114 0x4e800420, /* bctr */
115 0x60000000, /* nop */
116 0x60000000, /* nop */
117 0x60000000, /* nop */
118 0x60000000, /* nop */
119 };
120
121 /* For executables, we have some additional relocations in
122 .rela.plt.unloaded, for the kernel loader. */
123
124 /* The number of non-JMP_SLOT relocations per PLT0 slot. */
125 #define VXWORKS_PLT_NON_JMP_SLOT_RELOCS 3
126 /* The number of relocations in the PLTResolve slot. */
127 #define VXWORKS_PLTRESOLVE_RELOCS 2
128 /* The number of relocations in the PLTResolve slot when when creating
129 a shared library. */
130 #define VXWORKS_PLTRESOLVE_RELOCS_SHLIB 0
131
132 /* Some instructions. */
133 #define ADDIS_11_11 0x3d6b0000
134 #define ADDIS_11_30 0x3d7e0000
135 #define ADDIS_12_12 0x3d8c0000
136 #define ADDI_11_11 0x396b0000
137 #define ADD_0_11_11 0x7c0b5a14
138 #define ADD_11_0_11 0x7d605a14
139 #define B 0x48000000
140 #define BCL_20_31 0x429f0005
141 #define BCTR 0x4e800420
142 #define LIS_11 0x3d600000
143 #define LIS_12 0x3d800000
144 #define LWZU_0_12 0x840c0000
145 #define LWZ_0_12 0x800c0000
146 #define LWZ_11_11 0x816b0000
147 #define LWZ_11_30 0x817e0000
148 #define LWZ_12_12 0x818c0000
149 #define MFLR_0 0x7c0802a6
150 #define MFLR_12 0x7d8802a6
151 #define MTCTR_0 0x7c0903a6
152 #define MTCTR_11 0x7d6903a6
153 #define MTLR_0 0x7c0803a6
154 #define NOP 0x60000000
155 #define SUB_11_11_12 0x7d6c5850
156
157 /* Offset of tp and dtp pointers from start of TLS block. */
158 #define TP_OFFSET 0x7000
159 #define DTP_OFFSET 0x8000
160 \f
161 static reloc_howto_type *ppc_elf_howto_table[R_PPC_max];
162
163 static reloc_howto_type ppc_elf_howto_raw[] = {
164 /* This reloc does nothing. */
165 HOWTO (R_PPC_NONE, /* type */
166 0, /* rightshift */
167 2, /* size (0 = byte, 1 = short, 2 = long) */
168 32, /* bitsize */
169 FALSE, /* pc_relative */
170 0, /* bitpos */
171 complain_overflow_bitfield, /* complain_on_overflow */
172 bfd_elf_generic_reloc, /* special_function */
173 "R_PPC_NONE", /* name */
174 FALSE, /* partial_inplace */
175 0, /* src_mask */
176 0, /* dst_mask */
177 FALSE), /* pcrel_offset */
178
179 /* A standard 32 bit relocation. */
180 HOWTO (R_PPC_ADDR32, /* type */
181 0, /* rightshift */
182 2, /* size (0 = byte, 1 = short, 2 = long) */
183 32, /* bitsize */
184 FALSE, /* pc_relative */
185 0, /* bitpos */
186 complain_overflow_bitfield, /* complain_on_overflow */
187 bfd_elf_generic_reloc, /* special_function */
188 "R_PPC_ADDR32", /* name */
189 FALSE, /* partial_inplace */
190 0, /* src_mask */
191 0xffffffff, /* dst_mask */
192 FALSE), /* pcrel_offset */
193
194 /* An absolute 26 bit branch; the lower two bits must be zero.
195 FIXME: we don't check that, we just clear them. */
196 HOWTO (R_PPC_ADDR24, /* type */
197 0, /* rightshift */
198 2, /* size (0 = byte, 1 = short, 2 = long) */
199 26, /* bitsize */
200 FALSE, /* pc_relative */
201 0, /* bitpos */
202 complain_overflow_bitfield, /* complain_on_overflow */
203 bfd_elf_generic_reloc, /* special_function */
204 "R_PPC_ADDR24", /* name */
205 FALSE, /* partial_inplace */
206 0, /* src_mask */
207 0x3fffffc, /* dst_mask */
208 FALSE), /* pcrel_offset */
209
210 /* A standard 16 bit relocation. */
211 HOWTO (R_PPC_ADDR16, /* type */
212 0, /* rightshift */
213 1, /* size (0 = byte, 1 = short, 2 = long) */
214 16, /* bitsize */
215 FALSE, /* pc_relative */
216 0, /* bitpos */
217 complain_overflow_bitfield, /* complain_on_overflow */
218 bfd_elf_generic_reloc, /* special_function */
219 "R_PPC_ADDR16", /* name */
220 FALSE, /* partial_inplace */
221 0, /* src_mask */
222 0xffff, /* dst_mask */
223 FALSE), /* pcrel_offset */
224
225 /* A 16 bit relocation without overflow. */
226 HOWTO (R_PPC_ADDR16_LO, /* type */
227 0, /* rightshift */
228 1, /* size (0 = byte, 1 = short, 2 = long) */
229 16, /* bitsize */
230 FALSE, /* pc_relative */
231 0, /* bitpos */
232 complain_overflow_dont,/* complain_on_overflow */
233 bfd_elf_generic_reloc, /* special_function */
234 "R_PPC_ADDR16_LO", /* name */
235 FALSE, /* partial_inplace */
236 0, /* src_mask */
237 0xffff, /* dst_mask */
238 FALSE), /* pcrel_offset */
239
240 /* The high order 16 bits of an address. */
241 HOWTO (R_PPC_ADDR16_HI, /* type */
242 16, /* rightshift */
243 1, /* size (0 = byte, 1 = short, 2 = long) */
244 16, /* bitsize */
245 FALSE, /* pc_relative */
246 0, /* bitpos */
247 complain_overflow_dont, /* complain_on_overflow */
248 bfd_elf_generic_reloc, /* special_function */
249 "R_PPC_ADDR16_HI", /* name */
250 FALSE, /* partial_inplace */
251 0, /* src_mask */
252 0xffff, /* dst_mask */
253 FALSE), /* pcrel_offset */
254
255 /* The high order 16 bits of an address, plus 1 if the contents of
256 the low 16 bits, treated as a signed number, is negative. */
257 HOWTO (R_PPC_ADDR16_HA, /* type */
258 16, /* rightshift */
259 1, /* size (0 = byte, 1 = short, 2 = long) */
260 16, /* bitsize */
261 FALSE, /* pc_relative */
262 0, /* bitpos */
263 complain_overflow_dont, /* complain_on_overflow */
264 ppc_elf_addr16_ha_reloc, /* special_function */
265 "R_PPC_ADDR16_HA", /* name */
266 FALSE, /* partial_inplace */
267 0, /* src_mask */
268 0xffff, /* dst_mask */
269 FALSE), /* pcrel_offset */
270
271 /* An absolute 16 bit branch; the lower two bits must be zero.
272 FIXME: we don't check that, we just clear them. */
273 HOWTO (R_PPC_ADDR14, /* type */
274 0, /* rightshift */
275 2, /* size (0 = byte, 1 = short, 2 = long) */
276 16, /* bitsize */
277 FALSE, /* pc_relative */
278 0, /* bitpos */
279 complain_overflow_bitfield, /* complain_on_overflow */
280 bfd_elf_generic_reloc, /* special_function */
281 "R_PPC_ADDR14", /* name */
282 FALSE, /* partial_inplace */
283 0, /* src_mask */
284 0xfffc, /* dst_mask */
285 FALSE), /* pcrel_offset */
286
287 /* An absolute 16 bit branch, for which bit 10 should be set to
288 indicate that the branch is expected to be taken. The lower two
289 bits must be zero. */
290 HOWTO (R_PPC_ADDR14_BRTAKEN, /* type */
291 0, /* rightshift */
292 2, /* size (0 = byte, 1 = short, 2 = long) */
293 16, /* bitsize */
294 FALSE, /* pc_relative */
295 0, /* bitpos */
296 complain_overflow_bitfield, /* complain_on_overflow */
297 bfd_elf_generic_reloc, /* special_function */
298 "R_PPC_ADDR14_BRTAKEN",/* name */
299 FALSE, /* partial_inplace */
300 0, /* src_mask */
301 0xfffc, /* dst_mask */
302 FALSE), /* pcrel_offset */
303
304 /* An absolute 16 bit branch, for which bit 10 should be set to
305 indicate that the branch is not expected to be taken. The lower
306 two bits must be zero. */
307 HOWTO (R_PPC_ADDR14_BRNTAKEN, /* type */
308 0, /* rightshift */
309 2, /* size (0 = byte, 1 = short, 2 = long) */
310 16, /* bitsize */
311 FALSE, /* pc_relative */
312 0, /* bitpos */
313 complain_overflow_bitfield, /* complain_on_overflow */
314 bfd_elf_generic_reloc, /* special_function */
315 "R_PPC_ADDR14_BRNTAKEN",/* name */
316 FALSE, /* partial_inplace */
317 0, /* src_mask */
318 0xfffc, /* dst_mask */
319 FALSE), /* pcrel_offset */
320
321 /* A relative 26 bit branch; the lower two bits must be zero. */
322 HOWTO (R_PPC_REL24, /* type */
323 0, /* rightshift */
324 2, /* size (0 = byte, 1 = short, 2 = long) */
325 26, /* bitsize */
326 TRUE, /* pc_relative */
327 0, /* bitpos */
328 complain_overflow_signed, /* complain_on_overflow */
329 bfd_elf_generic_reloc, /* special_function */
330 "R_PPC_REL24", /* name */
331 FALSE, /* partial_inplace */
332 0, /* src_mask */
333 0x3fffffc, /* dst_mask */
334 TRUE), /* pcrel_offset */
335
336 /* A relative 16 bit branch; the lower two bits must be zero. */
337 HOWTO (R_PPC_REL14, /* type */
338 0, /* rightshift */
339 2, /* size (0 = byte, 1 = short, 2 = long) */
340 16, /* bitsize */
341 TRUE, /* pc_relative */
342 0, /* bitpos */
343 complain_overflow_signed, /* complain_on_overflow */
344 bfd_elf_generic_reloc, /* special_function */
345 "R_PPC_REL14", /* name */
346 FALSE, /* partial_inplace */
347 0, /* src_mask */
348 0xfffc, /* dst_mask */
349 TRUE), /* pcrel_offset */
350
351 /* A relative 16 bit branch. Bit 10 should be set to indicate that
352 the branch is expected to be taken. The lower two bits must be
353 zero. */
354 HOWTO (R_PPC_REL14_BRTAKEN, /* type */
355 0, /* rightshift */
356 2, /* size (0 = byte, 1 = short, 2 = long) */
357 16, /* bitsize */
358 TRUE, /* pc_relative */
359 0, /* bitpos */
360 complain_overflow_signed, /* complain_on_overflow */
361 bfd_elf_generic_reloc, /* special_function */
362 "R_PPC_REL14_BRTAKEN", /* name */
363 FALSE, /* partial_inplace */
364 0, /* src_mask */
365 0xfffc, /* dst_mask */
366 TRUE), /* pcrel_offset */
367
368 /* A relative 16 bit branch. Bit 10 should be set to indicate that
369 the branch is not expected to be taken. The lower two bits must
370 be zero. */
371 HOWTO (R_PPC_REL14_BRNTAKEN, /* type */
372 0, /* rightshift */
373 2, /* size (0 = byte, 1 = short, 2 = long) */
374 16, /* bitsize */
375 TRUE, /* pc_relative */
376 0, /* bitpos */
377 complain_overflow_signed, /* complain_on_overflow */
378 bfd_elf_generic_reloc, /* special_function */
379 "R_PPC_REL14_BRNTAKEN",/* name */
380 FALSE, /* partial_inplace */
381 0, /* src_mask */
382 0xfffc, /* dst_mask */
383 TRUE), /* pcrel_offset */
384
385 /* Like R_PPC_ADDR16, but referring to the GOT table entry for the
386 symbol. */
387 HOWTO (R_PPC_GOT16, /* type */
388 0, /* rightshift */
389 1, /* size (0 = byte, 1 = short, 2 = long) */
390 16, /* bitsize */
391 FALSE, /* pc_relative */
392 0, /* bitpos */
393 complain_overflow_signed, /* complain_on_overflow */
394 bfd_elf_generic_reloc, /* special_function */
395 "R_PPC_GOT16", /* name */
396 FALSE, /* partial_inplace */
397 0, /* src_mask */
398 0xffff, /* dst_mask */
399 FALSE), /* pcrel_offset */
400
401 /* Like R_PPC_ADDR16_LO, but referring to the GOT table entry for
402 the symbol. */
403 HOWTO (R_PPC_GOT16_LO, /* type */
404 0, /* rightshift */
405 1, /* size (0 = byte, 1 = short, 2 = long) */
406 16, /* bitsize */
407 FALSE, /* pc_relative */
408 0, /* bitpos */
409 complain_overflow_dont, /* complain_on_overflow */
410 bfd_elf_generic_reloc, /* special_function */
411 "R_PPC_GOT16_LO", /* name */
412 FALSE, /* partial_inplace */
413 0, /* src_mask */
414 0xffff, /* dst_mask */
415 FALSE), /* pcrel_offset */
416
417 /* Like R_PPC_ADDR16_HI, but referring to the GOT table entry for
418 the symbol. */
419 HOWTO (R_PPC_GOT16_HI, /* type */
420 16, /* rightshift */
421 1, /* size (0 = byte, 1 = short, 2 = long) */
422 16, /* bitsize */
423 FALSE, /* pc_relative */
424 0, /* bitpos */
425 complain_overflow_bitfield, /* complain_on_overflow */
426 bfd_elf_generic_reloc, /* special_function */
427 "R_PPC_GOT16_HI", /* name */
428 FALSE, /* partial_inplace */
429 0, /* src_mask */
430 0xffff, /* dst_mask */
431 FALSE), /* pcrel_offset */
432
433 /* Like R_PPC_ADDR16_HA, but referring to the GOT table entry for
434 the symbol. */
435 HOWTO (R_PPC_GOT16_HA, /* type */
436 16, /* rightshift */
437 1, /* size (0 = byte, 1 = short, 2 = long) */
438 16, /* bitsize */
439 FALSE, /* pc_relative */
440 0, /* bitpos */
441 complain_overflow_bitfield, /* complain_on_overflow */
442 ppc_elf_addr16_ha_reloc, /* special_function */
443 "R_PPC_GOT16_HA", /* name */
444 FALSE, /* partial_inplace */
445 0, /* src_mask */
446 0xffff, /* dst_mask */
447 FALSE), /* pcrel_offset */
448
449 /* Like R_PPC_REL24, but referring to the procedure linkage table
450 entry for the symbol. */
451 HOWTO (R_PPC_PLTREL24, /* type */
452 0, /* rightshift */
453 2, /* size (0 = byte, 1 = short, 2 = long) */
454 26, /* bitsize */
455 TRUE, /* pc_relative */
456 0, /* bitpos */
457 complain_overflow_signed, /* complain_on_overflow */
458 bfd_elf_generic_reloc, /* special_function */
459 "R_PPC_PLTREL24", /* name */
460 FALSE, /* partial_inplace */
461 0, /* src_mask */
462 0x3fffffc, /* dst_mask */
463 TRUE), /* pcrel_offset */
464
465 /* This is used only by the dynamic linker. The symbol should exist
466 both in the object being run and in some shared library. The
467 dynamic linker copies the data addressed by the symbol from the
468 shared library into the object, because the object being
469 run has to have the data at some particular address. */
470 HOWTO (R_PPC_COPY, /* type */
471 0, /* rightshift */
472 2, /* size (0 = byte, 1 = short, 2 = long) */
473 32, /* bitsize */
474 FALSE, /* pc_relative */
475 0, /* bitpos */
476 complain_overflow_bitfield, /* complain_on_overflow */
477 bfd_elf_generic_reloc, /* special_function */
478 "R_PPC_COPY", /* name */
479 FALSE, /* partial_inplace */
480 0, /* src_mask */
481 0, /* dst_mask */
482 FALSE), /* pcrel_offset */
483
484 /* Like R_PPC_ADDR32, but used when setting global offset table
485 entries. */
486 HOWTO (R_PPC_GLOB_DAT, /* type */
487 0, /* rightshift */
488 2, /* size (0 = byte, 1 = short, 2 = long) */
489 32, /* bitsize */
490 FALSE, /* pc_relative */
491 0, /* bitpos */
492 complain_overflow_bitfield, /* complain_on_overflow */
493 bfd_elf_generic_reloc, /* special_function */
494 "R_PPC_GLOB_DAT", /* name */
495 FALSE, /* partial_inplace */
496 0, /* src_mask */
497 0xffffffff, /* dst_mask */
498 FALSE), /* pcrel_offset */
499
500 /* Marks a procedure linkage table entry for a symbol. */
501 HOWTO (R_PPC_JMP_SLOT, /* type */
502 0, /* rightshift */
503 2, /* size (0 = byte, 1 = short, 2 = long) */
504 32, /* bitsize */
505 FALSE, /* pc_relative */
506 0, /* bitpos */
507 complain_overflow_bitfield, /* complain_on_overflow */
508 bfd_elf_generic_reloc, /* special_function */
509 "R_PPC_JMP_SLOT", /* name */
510 FALSE, /* partial_inplace */
511 0, /* src_mask */
512 0, /* dst_mask */
513 FALSE), /* pcrel_offset */
514
515 /* Used only by the dynamic linker. When the object is run, this
516 longword is set to the load address of the object, plus the
517 addend. */
518 HOWTO (R_PPC_RELATIVE, /* type */
519 0, /* rightshift */
520 2, /* size (0 = byte, 1 = short, 2 = long) */
521 32, /* bitsize */
522 FALSE, /* pc_relative */
523 0, /* bitpos */
524 complain_overflow_bitfield, /* complain_on_overflow */
525 bfd_elf_generic_reloc, /* special_function */
526 "R_PPC_RELATIVE", /* name */
527 FALSE, /* partial_inplace */
528 0, /* src_mask */
529 0xffffffff, /* dst_mask */
530 FALSE), /* pcrel_offset */
531
532 /* Like R_PPC_REL24, but uses the value of the symbol within the
533 object rather than the final value. Normally used for
534 _GLOBAL_OFFSET_TABLE_. */
535 HOWTO (R_PPC_LOCAL24PC, /* type */
536 0, /* rightshift */
537 2, /* size (0 = byte, 1 = short, 2 = long) */
538 26, /* bitsize */
539 TRUE, /* pc_relative */
540 0, /* bitpos */
541 complain_overflow_signed, /* complain_on_overflow */
542 bfd_elf_generic_reloc, /* special_function */
543 "R_PPC_LOCAL24PC", /* name */
544 FALSE, /* partial_inplace */
545 0, /* src_mask */
546 0x3fffffc, /* dst_mask */
547 TRUE), /* pcrel_offset */
548
549 /* Like R_PPC_ADDR32, but may be unaligned. */
550 HOWTO (R_PPC_UADDR32, /* type */
551 0, /* rightshift */
552 2, /* size (0 = byte, 1 = short, 2 = long) */
553 32, /* bitsize */
554 FALSE, /* pc_relative */
555 0, /* bitpos */
556 complain_overflow_bitfield, /* complain_on_overflow */
557 bfd_elf_generic_reloc, /* special_function */
558 "R_PPC_UADDR32", /* name */
559 FALSE, /* partial_inplace */
560 0, /* src_mask */
561 0xffffffff, /* dst_mask */
562 FALSE), /* pcrel_offset */
563
564 /* Like R_PPC_ADDR16, but may be unaligned. */
565 HOWTO (R_PPC_UADDR16, /* type */
566 0, /* rightshift */
567 1, /* size (0 = byte, 1 = short, 2 = long) */
568 16, /* bitsize */
569 FALSE, /* pc_relative */
570 0, /* bitpos */
571 complain_overflow_bitfield, /* complain_on_overflow */
572 bfd_elf_generic_reloc, /* special_function */
573 "R_PPC_UADDR16", /* name */
574 FALSE, /* partial_inplace */
575 0, /* src_mask */
576 0xffff, /* dst_mask */
577 FALSE), /* pcrel_offset */
578
579 /* 32-bit PC relative */
580 HOWTO (R_PPC_REL32, /* type */
581 0, /* rightshift */
582 2, /* size (0 = byte, 1 = short, 2 = long) */
583 32, /* bitsize */
584 TRUE, /* pc_relative */
585 0, /* bitpos */
586 complain_overflow_bitfield, /* complain_on_overflow */
587 bfd_elf_generic_reloc, /* special_function */
588 "R_PPC_REL32", /* name */
589 FALSE, /* partial_inplace */
590 0, /* src_mask */
591 0xffffffff, /* dst_mask */
592 TRUE), /* pcrel_offset */
593
594 /* 32-bit relocation to the symbol's procedure linkage table.
595 FIXME: not supported. */
596 HOWTO (R_PPC_PLT32, /* type */
597 0, /* rightshift */
598 2, /* size (0 = byte, 1 = short, 2 = long) */
599 32, /* bitsize */
600 FALSE, /* pc_relative */
601 0, /* bitpos */
602 complain_overflow_bitfield, /* complain_on_overflow */
603 bfd_elf_generic_reloc, /* special_function */
604 "R_PPC_PLT32", /* name */
605 FALSE, /* partial_inplace */
606 0, /* src_mask */
607 0, /* dst_mask */
608 FALSE), /* pcrel_offset */
609
610 /* 32-bit PC relative relocation to the symbol's procedure linkage table.
611 FIXME: not supported. */
612 HOWTO (R_PPC_PLTREL32, /* type */
613 0, /* rightshift */
614 2, /* size (0 = byte, 1 = short, 2 = long) */
615 32, /* bitsize */
616 TRUE, /* pc_relative */
617 0, /* bitpos */
618 complain_overflow_bitfield, /* complain_on_overflow */
619 bfd_elf_generic_reloc, /* special_function */
620 "R_PPC_PLTREL32", /* name */
621 FALSE, /* partial_inplace */
622 0, /* src_mask */
623 0, /* dst_mask */
624 TRUE), /* pcrel_offset */
625
626 /* Like R_PPC_ADDR16_LO, but referring to the PLT table entry for
627 the symbol. */
628 HOWTO (R_PPC_PLT16_LO, /* type */
629 0, /* rightshift */
630 1, /* size (0 = byte, 1 = short, 2 = long) */
631 16, /* bitsize */
632 FALSE, /* pc_relative */
633 0, /* bitpos */
634 complain_overflow_dont, /* complain_on_overflow */
635 bfd_elf_generic_reloc, /* special_function */
636 "R_PPC_PLT16_LO", /* name */
637 FALSE, /* partial_inplace */
638 0, /* src_mask */
639 0xffff, /* dst_mask */
640 FALSE), /* pcrel_offset */
641
642 /* Like R_PPC_ADDR16_HI, but referring to the PLT table entry for
643 the symbol. */
644 HOWTO (R_PPC_PLT16_HI, /* type */
645 16, /* rightshift */
646 1, /* size (0 = byte, 1 = short, 2 = long) */
647 16, /* bitsize */
648 FALSE, /* pc_relative */
649 0, /* bitpos */
650 complain_overflow_bitfield, /* complain_on_overflow */
651 bfd_elf_generic_reloc, /* special_function */
652 "R_PPC_PLT16_HI", /* name */
653 FALSE, /* partial_inplace */
654 0, /* src_mask */
655 0xffff, /* dst_mask */
656 FALSE), /* pcrel_offset */
657
658 /* Like R_PPC_ADDR16_HA, but referring to the PLT table entry for
659 the symbol. */
660 HOWTO (R_PPC_PLT16_HA, /* type */
661 16, /* rightshift */
662 1, /* size (0 = byte, 1 = short, 2 = long) */
663 16, /* bitsize */
664 FALSE, /* pc_relative */
665 0, /* bitpos */
666 complain_overflow_bitfield, /* complain_on_overflow */
667 ppc_elf_addr16_ha_reloc, /* special_function */
668 "R_PPC_PLT16_HA", /* name */
669 FALSE, /* partial_inplace */
670 0, /* src_mask */
671 0xffff, /* dst_mask */
672 FALSE), /* pcrel_offset */
673
674 /* A sign-extended 16 bit value relative to _SDA_BASE_, for use with
675 small data items. */
676 HOWTO (R_PPC_SDAREL16, /* type */
677 0, /* rightshift */
678 1, /* size (0 = byte, 1 = short, 2 = long) */
679 16, /* bitsize */
680 FALSE, /* pc_relative */
681 0, /* bitpos */
682 complain_overflow_signed, /* complain_on_overflow */
683 bfd_elf_generic_reloc, /* special_function */
684 "R_PPC_SDAREL16", /* name */
685 FALSE, /* partial_inplace */
686 0, /* src_mask */
687 0xffff, /* dst_mask */
688 FALSE), /* pcrel_offset */
689
690 /* 16-bit section relative relocation. */
691 HOWTO (R_PPC_SECTOFF, /* type */
692 0, /* rightshift */
693 1, /* size (0 = byte, 1 = short, 2 = long) */
694 16, /* bitsize */
695 FALSE, /* pc_relative */
696 0, /* bitpos */
697 complain_overflow_bitfield, /* complain_on_overflow */
698 bfd_elf_generic_reloc, /* special_function */
699 "R_PPC_SECTOFF", /* name */
700 FALSE, /* partial_inplace */
701 0, /* src_mask */
702 0xffff, /* dst_mask */
703 FALSE), /* pcrel_offset */
704
705 /* 16-bit lower half section relative relocation. */
706 HOWTO (R_PPC_SECTOFF_LO, /* type */
707 0, /* rightshift */
708 1, /* size (0 = byte, 1 = short, 2 = long) */
709 16, /* bitsize */
710 FALSE, /* pc_relative */
711 0, /* bitpos */
712 complain_overflow_dont, /* complain_on_overflow */
713 bfd_elf_generic_reloc, /* special_function */
714 "R_PPC_SECTOFF_LO", /* name */
715 FALSE, /* partial_inplace */
716 0, /* src_mask */
717 0xffff, /* dst_mask */
718 FALSE), /* pcrel_offset */
719
720 /* 16-bit upper half section relative relocation. */
721 HOWTO (R_PPC_SECTOFF_HI, /* type */
722 16, /* rightshift */
723 1, /* size (0 = byte, 1 = short, 2 = long) */
724 16, /* bitsize */
725 FALSE, /* pc_relative */
726 0, /* bitpos */
727 complain_overflow_bitfield, /* complain_on_overflow */
728 bfd_elf_generic_reloc, /* special_function */
729 "R_PPC_SECTOFF_HI", /* name */
730 FALSE, /* partial_inplace */
731 0, /* src_mask */
732 0xffff, /* dst_mask */
733 FALSE), /* pcrel_offset */
734
735 /* 16-bit upper half adjusted section relative relocation. */
736 HOWTO (R_PPC_SECTOFF_HA, /* type */
737 16, /* rightshift */
738 1, /* size (0 = byte, 1 = short, 2 = long) */
739 16, /* bitsize */
740 FALSE, /* pc_relative */
741 0, /* bitpos */
742 complain_overflow_bitfield, /* complain_on_overflow */
743 ppc_elf_addr16_ha_reloc, /* special_function */
744 "R_PPC_SECTOFF_HA", /* name */
745 FALSE, /* partial_inplace */
746 0, /* src_mask */
747 0xffff, /* dst_mask */
748 FALSE), /* pcrel_offset */
749
750 /* Marker reloc for TLS. */
751 HOWTO (R_PPC_TLS,
752 0, /* rightshift */
753 2, /* size (0 = byte, 1 = short, 2 = long) */
754 32, /* bitsize */
755 FALSE, /* pc_relative */
756 0, /* bitpos */
757 complain_overflow_dont, /* complain_on_overflow */
758 bfd_elf_generic_reloc, /* special_function */
759 "R_PPC_TLS", /* name */
760 FALSE, /* partial_inplace */
761 0, /* src_mask */
762 0, /* dst_mask */
763 FALSE), /* pcrel_offset */
764
765 /* Computes the load module index of the load module that contains the
766 definition of its TLS sym. */
767 HOWTO (R_PPC_DTPMOD32,
768 0, /* rightshift */
769 2, /* size (0 = byte, 1 = short, 2 = long) */
770 32, /* bitsize */
771 FALSE, /* pc_relative */
772 0, /* bitpos */
773 complain_overflow_dont, /* complain_on_overflow */
774 ppc_elf_unhandled_reloc, /* special_function */
775 "R_PPC_DTPMOD32", /* name */
776 FALSE, /* partial_inplace */
777 0, /* src_mask */
778 0xffffffff, /* dst_mask */
779 FALSE), /* pcrel_offset */
780
781 /* Computes a dtv-relative displacement, the difference between the value
782 of sym+add and the base address of the thread-local storage block that
783 contains the definition of sym, minus 0x8000. */
784 HOWTO (R_PPC_DTPREL32,
785 0, /* rightshift */
786 2, /* size (0 = byte, 1 = short, 2 = long) */
787 32, /* bitsize */
788 FALSE, /* pc_relative */
789 0, /* bitpos */
790 complain_overflow_dont, /* complain_on_overflow */
791 ppc_elf_unhandled_reloc, /* special_function */
792 "R_PPC_DTPREL32", /* name */
793 FALSE, /* partial_inplace */
794 0, /* src_mask */
795 0xffffffff, /* dst_mask */
796 FALSE), /* pcrel_offset */
797
798 /* A 16 bit dtprel reloc. */
799 HOWTO (R_PPC_DTPREL16,
800 0, /* rightshift */
801 1, /* size (0 = byte, 1 = short, 2 = long) */
802 16, /* bitsize */
803 FALSE, /* pc_relative */
804 0, /* bitpos */
805 complain_overflow_signed, /* complain_on_overflow */
806 ppc_elf_unhandled_reloc, /* special_function */
807 "R_PPC_DTPREL16", /* name */
808 FALSE, /* partial_inplace */
809 0, /* src_mask */
810 0xffff, /* dst_mask */
811 FALSE), /* pcrel_offset */
812
813 /* Like DTPREL16, but no overflow. */
814 HOWTO (R_PPC_DTPREL16_LO,
815 0, /* rightshift */
816 1, /* size (0 = byte, 1 = short, 2 = long) */
817 16, /* bitsize */
818 FALSE, /* pc_relative */
819 0, /* bitpos */
820 complain_overflow_dont, /* complain_on_overflow */
821 ppc_elf_unhandled_reloc, /* special_function */
822 "R_PPC_DTPREL16_LO", /* name */
823 FALSE, /* partial_inplace */
824 0, /* src_mask */
825 0xffff, /* dst_mask */
826 FALSE), /* pcrel_offset */
827
828 /* Like DTPREL16_LO, but next higher group of 16 bits. */
829 HOWTO (R_PPC_DTPREL16_HI,
830 16, /* rightshift */
831 1, /* size (0 = byte, 1 = short, 2 = long) */
832 16, /* bitsize */
833 FALSE, /* pc_relative */
834 0, /* bitpos */
835 complain_overflow_dont, /* complain_on_overflow */
836 ppc_elf_unhandled_reloc, /* special_function */
837 "R_PPC_DTPREL16_HI", /* name */
838 FALSE, /* partial_inplace */
839 0, /* src_mask */
840 0xffff, /* dst_mask */
841 FALSE), /* pcrel_offset */
842
843 /* Like DTPREL16_HI, but adjust for low 16 bits. */
844 HOWTO (R_PPC_DTPREL16_HA,
845 16, /* rightshift */
846 1, /* size (0 = byte, 1 = short, 2 = long) */
847 16, /* bitsize */
848 FALSE, /* pc_relative */
849 0, /* bitpos */
850 complain_overflow_dont, /* complain_on_overflow */
851 ppc_elf_unhandled_reloc, /* special_function */
852 "R_PPC_DTPREL16_HA", /* name */
853 FALSE, /* partial_inplace */
854 0, /* src_mask */
855 0xffff, /* dst_mask */
856 FALSE), /* pcrel_offset */
857
858 /* Computes a tp-relative displacement, the difference between the value of
859 sym+add and the value of the thread pointer (r13). */
860 HOWTO (R_PPC_TPREL32,
861 0, /* rightshift */
862 2, /* size (0 = byte, 1 = short, 2 = long) */
863 32, /* bitsize */
864 FALSE, /* pc_relative */
865 0, /* bitpos */
866 complain_overflow_dont, /* complain_on_overflow */
867 ppc_elf_unhandled_reloc, /* special_function */
868 "R_PPC_TPREL32", /* name */
869 FALSE, /* partial_inplace */
870 0, /* src_mask */
871 0xffffffff, /* dst_mask */
872 FALSE), /* pcrel_offset */
873
874 /* A 16 bit tprel reloc. */
875 HOWTO (R_PPC_TPREL16,
876 0, /* rightshift */
877 1, /* size (0 = byte, 1 = short, 2 = long) */
878 16, /* bitsize */
879 FALSE, /* pc_relative */
880 0, /* bitpos */
881 complain_overflow_signed, /* complain_on_overflow */
882 ppc_elf_unhandled_reloc, /* special_function */
883 "R_PPC_TPREL16", /* name */
884 FALSE, /* partial_inplace */
885 0, /* src_mask */
886 0xffff, /* dst_mask */
887 FALSE), /* pcrel_offset */
888
889 /* Like TPREL16, but no overflow. */
890 HOWTO (R_PPC_TPREL16_LO,
891 0, /* rightshift */
892 1, /* size (0 = byte, 1 = short, 2 = long) */
893 16, /* bitsize */
894 FALSE, /* pc_relative */
895 0, /* bitpos */
896 complain_overflow_dont, /* complain_on_overflow */
897 ppc_elf_unhandled_reloc, /* special_function */
898 "R_PPC_TPREL16_LO", /* name */
899 FALSE, /* partial_inplace */
900 0, /* src_mask */
901 0xffff, /* dst_mask */
902 FALSE), /* pcrel_offset */
903
904 /* Like TPREL16_LO, but next higher group of 16 bits. */
905 HOWTO (R_PPC_TPREL16_HI,
906 16, /* rightshift */
907 1, /* size (0 = byte, 1 = short, 2 = long) */
908 16, /* bitsize */
909 FALSE, /* pc_relative */
910 0, /* bitpos */
911 complain_overflow_dont, /* complain_on_overflow */
912 ppc_elf_unhandled_reloc, /* special_function */
913 "R_PPC_TPREL16_HI", /* name */
914 FALSE, /* partial_inplace */
915 0, /* src_mask */
916 0xffff, /* dst_mask */
917 FALSE), /* pcrel_offset */
918
919 /* Like TPREL16_HI, but adjust for low 16 bits. */
920 HOWTO (R_PPC_TPREL16_HA,
921 16, /* rightshift */
922 1, /* size (0 = byte, 1 = short, 2 = long) */
923 16, /* bitsize */
924 FALSE, /* pc_relative */
925 0, /* bitpos */
926 complain_overflow_dont, /* complain_on_overflow */
927 ppc_elf_unhandled_reloc, /* special_function */
928 "R_PPC_TPREL16_HA", /* name */
929 FALSE, /* partial_inplace */
930 0, /* src_mask */
931 0xffff, /* dst_mask */
932 FALSE), /* pcrel_offset */
933
934 /* Allocates two contiguous entries in the GOT to hold a tls_index structure,
935 with values (sym+add)@dtpmod and (sym+add)@dtprel, and computes the offset
936 to the first entry. */
937 HOWTO (R_PPC_GOT_TLSGD16,
938 0, /* rightshift */
939 1, /* size (0 = byte, 1 = short, 2 = long) */
940 16, /* bitsize */
941 FALSE, /* pc_relative */
942 0, /* bitpos */
943 complain_overflow_signed, /* complain_on_overflow */
944 ppc_elf_unhandled_reloc, /* special_function */
945 "R_PPC_GOT_TLSGD16", /* name */
946 FALSE, /* partial_inplace */
947 0, /* src_mask */
948 0xffff, /* dst_mask */
949 FALSE), /* pcrel_offset */
950
951 /* Like GOT_TLSGD16, but no overflow. */
952 HOWTO (R_PPC_GOT_TLSGD16_LO,
953 0, /* rightshift */
954 1, /* size (0 = byte, 1 = short, 2 = long) */
955 16, /* bitsize */
956 FALSE, /* pc_relative */
957 0, /* bitpos */
958 complain_overflow_dont, /* complain_on_overflow */
959 ppc_elf_unhandled_reloc, /* special_function */
960 "R_PPC_GOT_TLSGD16_LO", /* name */
961 FALSE, /* partial_inplace */
962 0, /* src_mask */
963 0xffff, /* dst_mask */
964 FALSE), /* pcrel_offset */
965
966 /* Like GOT_TLSGD16_LO, but next higher group of 16 bits. */
967 HOWTO (R_PPC_GOT_TLSGD16_HI,
968 16, /* rightshift */
969 1, /* size (0 = byte, 1 = short, 2 = long) */
970 16, /* bitsize */
971 FALSE, /* pc_relative */
972 0, /* bitpos */
973 complain_overflow_dont, /* complain_on_overflow */
974 ppc_elf_unhandled_reloc, /* special_function */
975 "R_PPC_GOT_TLSGD16_HI", /* name */
976 FALSE, /* partial_inplace */
977 0, /* src_mask */
978 0xffff, /* dst_mask */
979 FALSE), /* pcrel_offset */
980
981 /* Like GOT_TLSGD16_HI, but adjust for low 16 bits. */
982 HOWTO (R_PPC_GOT_TLSGD16_HA,
983 16, /* rightshift */
984 1, /* size (0 = byte, 1 = short, 2 = long) */
985 16, /* bitsize */
986 FALSE, /* pc_relative */
987 0, /* bitpos */
988 complain_overflow_dont, /* complain_on_overflow */
989 ppc_elf_unhandled_reloc, /* special_function */
990 "R_PPC_GOT_TLSGD16_HA", /* name */
991 FALSE, /* partial_inplace */
992 0, /* src_mask */
993 0xffff, /* dst_mask */
994 FALSE), /* pcrel_offset */
995
996 /* Allocates two contiguous entries in the GOT to hold a tls_index structure,
997 with values (sym+add)@dtpmod and zero, and computes the offset to the
998 first entry. */
999 HOWTO (R_PPC_GOT_TLSLD16,
1000 0, /* rightshift */
1001 1, /* size (0 = byte, 1 = short, 2 = long) */
1002 16, /* bitsize */
1003 FALSE, /* pc_relative */
1004 0, /* bitpos */
1005 complain_overflow_signed, /* complain_on_overflow */
1006 ppc_elf_unhandled_reloc, /* special_function */
1007 "R_PPC_GOT_TLSLD16", /* name */
1008 FALSE, /* partial_inplace */
1009 0, /* src_mask */
1010 0xffff, /* dst_mask */
1011 FALSE), /* pcrel_offset */
1012
1013 /* Like GOT_TLSLD16, but no overflow. */
1014 HOWTO (R_PPC_GOT_TLSLD16_LO,
1015 0, /* rightshift */
1016 1, /* size (0 = byte, 1 = short, 2 = long) */
1017 16, /* bitsize */
1018 FALSE, /* pc_relative */
1019 0, /* bitpos */
1020 complain_overflow_dont, /* complain_on_overflow */
1021 ppc_elf_unhandled_reloc, /* special_function */
1022 "R_PPC_GOT_TLSLD16_LO", /* name */
1023 FALSE, /* partial_inplace */
1024 0, /* src_mask */
1025 0xffff, /* dst_mask */
1026 FALSE), /* pcrel_offset */
1027
1028 /* Like GOT_TLSLD16_LO, but next higher group of 16 bits. */
1029 HOWTO (R_PPC_GOT_TLSLD16_HI,
1030 16, /* rightshift */
1031 1, /* size (0 = byte, 1 = short, 2 = long) */
1032 16, /* bitsize */
1033 FALSE, /* pc_relative */
1034 0, /* bitpos */
1035 complain_overflow_dont, /* complain_on_overflow */
1036 ppc_elf_unhandled_reloc, /* special_function */
1037 "R_PPC_GOT_TLSLD16_HI", /* name */
1038 FALSE, /* partial_inplace */
1039 0, /* src_mask */
1040 0xffff, /* dst_mask */
1041 FALSE), /* pcrel_offset */
1042
1043 /* Like GOT_TLSLD16_HI, but adjust for low 16 bits. */
1044 HOWTO (R_PPC_GOT_TLSLD16_HA,
1045 16, /* rightshift */
1046 1, /* size (0 = byte, 1 = short, 2 = long) */
1047 16, /* bitsize */
1048 FALSE, /* pc_relative */
1049 0, /* bitpos */
1050 complain_overflow_dont, /* complain_on_overflow */
1051 ppc_elf_unhandled_reloc, /* special_function */
1052 "R_PPC_GOT_TLSLD16_HA", /* name */
1053 FALSE, /* partial_inplace */
1054 0, /* src_mask */
1055 0xffff, /* dst_mask */
1056 FALSE), /* pcrel_offset */
1057
1058 /* Allocates an entry in the GOT with value (sym+add)@dtprel, and computes
1059 the offset to the entry. */
1060 HOWTO (R_PPC_GOT_DTPREL16,
1061 0, /* rightshift */
1062 1, /* size (0 = byte, 1 = short, 2 = long) */
1063 16, /* bitsize */
1064 FALSE, /* pc_relative */
1065 0, /* bitpos */
1066 complain_overflow_signed, /* complain_on_overflow */
1067 ppc_elf_unhandled_reloc, /* special_function */
1068 "R_PPC_GOT_DTPREL16", /* name */
1069 FALSE, /* partial_inplace */
1070 0, /* src_mask */
1071 0xffff, /* dst_mask */
1072 FALSE), /* pcrel_offset */
1073
1074 /* Like GOT_DTPREL16, but no overflow. */
1075 HOWTO (R_PPC_GOT_DTPREL16_LO,
1076 0, /* rightshift */
1077 1, /* size (0 = byte, 1 = short, 2 = long) */
1078 16, /* bitsize */
1079 FALSE, /* pc_relative */
1080 0, /* bitpos */
1081 complain_overflow_dont, /* complain_on_overflow */
1082 ppc_elf_unhandled_reloc, /* special_function */
1083 "R_PPC_GOT_DTPREL16_LO", /* name */
1084 FALSE, /* partial_inplace */
1085 0, /* src_mask */
1086 0xffff, /* dst_mask */
1087 FALSE), /* pcrel_offset */
1088
1089 /* Like GOT_DTPREL16_LO, but next higher group of 16 bits. */
1090 HOWTO (R_PPC_GOT_DTPREL16_HI,
1091 16, /* rightshift */
1092 1, /* size (0 = byte, 1 = short, 2 = long) */
1093 16, /* bitsize */
1094 FALSE, /* pc_relative */
1095 0, /* bitpos */
1096 complain_overflow_dont, /* complain_on_overflow */
1097 ppc_elf_unhandled_reloc, /* special_function */
1098 "R_PPC_GOT_DTPREL16_HI", /* name */
1099 FALSE, /* partial_inplace */
1100 0, /* src_mask */
1101 0xffff, /* dst_mask */
1102 FALSE), /* pcrel_offset */
1103
1104 /* Like GOT_DTPREL16_HI, but adjust for low 16 bits. */
1105 HOWTO (R_PPC_GOT_DTPREL16_HA,
1106 16, /* rightshift */
1107 1, /* size (0 = byte, 1 = short, 2 = long) */
1108 16, /* bitsize */
1109 FALSE, /* pc_relative */
1110 0, /* bitpos */
1111 complain_overflow_dont, /* complain_on_overflow */
1112 ppc_elf_unhandled_reloc, /* special_function */
1113 "R_PPC_GOT_DTPREL16_HA", /* name */
1114 FALSE, /* partial_inplace */
1115 0, /* src_mask */
1116 0xffff, /* dst_mask */
1117 FALSE), /* pcrel_offset */
1118
1119 /* Allocates an entry in the GOT with value (sym+add)@tprel, and computes the
1120 offset to the entry. */
1121 HOWTO (R_PPC_GOT_TPREL16,
1122 0, /* rightshift */
1123 1, /* size (0 = byte, 1 = short, 2 = long) */
1124 16, /* bitsize */
1125 FALSE, /* pc_relative */
1126 0, /* bitpos */
1127 complain_overflow_signed, /* complain_on_overflow */
1128 ppc_elf_unhandled_reloc, /* special_function */
1129 "R_PPC_GOT_TPREL16", /* name */
1130 FALSE, /* partial_inplace */
1131 0, /* src_mask */
1132 0xffff, /* dst_mask */
1133 FALSE), /* pcrel_offset */
1134
1135 /* Like GOT_TPREL16, but no overflow. */
1136 HOWTO (R_PPC_GOT_TPREL16_LO,
1137 0, /* rightshift */
1138 1, /* size (0 = byte, 1 = short, 2 = long) */
1139 16, /* bitsize */
1140 FALSE, /* pc_relative */
1141 0, /* bitpos */
1142 complain_overflow_dont, /* complain_on_overflow */
1143 ppc_elf_unhandled_reloc, /* special_function */
1144 "R_PPC_GOT_TPREL16_LO", /* name */
1145 FALSE, /* partial_inplace */
1146 0, /* src_mask */
1147 0xffff, /* dst_mask */
1148 FALSE), /* pcrel_offset */
1149
1150 /* Like GOT_TPREL16_LO, but next higher group of 16 bits. */
1151 HOWTO (R_PPC_GOT_TPREL16_HI,
1152 16, /* rightshift */
1153 1, /* size (0 = byte, 1 = short, 2 = long) */
1154 16, /* bitsize */
1155 FALSE, /* pc_relative */
1156 0, /* bitpos */
1157 complain_overflow_dont, /* complain_on_overflow */
1158 ppc_elf_unhandled_reloc, /* special_function */
1159 "R_PPC_GOT_TPREL16_HI", /* name */
1160 FALSE, /* partial_inplace */
1161 0, /* src_mask */
1162 0xffff, /* dst_mask */
1163 FALSE), /* pcrel_offset */
1164
1165 /* Like GOT_TPREL16_HI, but adjust for low 16 bits. */
1166 HOWTO (R_PPC_GOT_TPREL16_HA,
1167 16, /* rightshift */
1168 1, /* size (0 = byte, 1 = short, 2 = long) */
1169 16, /* bitsize */
1170 FALSE, /* pc_relative */
1171 0, /* bitpos */
1172 complain_overflow_dont, /* complain_on_overflow */
1173 ppc_elf_unhandled_reloc, /* special_function */
1174 "R_PPC_GOT_TPREL16_HA", /* name */
1175 FALSE, /* partial_inplace */
1176 0, /* src_mask */
1177 0xffff, /* dst_mask */
1178 FALSE), /* pcrel_offset */
1179
1180 /* The remaining relocs are from the Embedded ELF ABI, and are not
1181 in the SVR4 ELF ABI. */
1182
1183 /* 32 bit value resulting from the addend minus the symbol. */
1184 HOWTO (R_PPC_EMB_NADDR32, /* type */
1185 0, /* rightshift */
1186 2, /* size (0 = byte, 1 = short, 2 = long) */
1187 32, /* bitsize */
1188 FALSE, /* pc_relative */
1189 0, /* bitpos */
1190 complain_overflow_bitfield, /* complain_on_overflow */
1191 bfd_elf_generic_reloc, /* special_function */
1192 "R_PPC_EMB_NADDR32", /* name */
1193 FALSE, /* partial_inplace */
1194 0, /* src_mask */
1195 0xffffffff, /* dst_mask */
1196 FALSE), /* pcrel_offset */
1197
1198 /* 16 bit value resulting from the addend minus the symbol. */
1199 HOWTO (R_PPC_EMB_NADDR16, /* type */
1200 0, /* rightshift */
1201 1, /* size (0 = byte, 1 = short, 2 = long) */
1202 16, /* bitsize */
1203 FALSE, /* pc_relative */
1204 0, /* bitpos */
1205 complain_overflow_bitfield, /* complain_on_overflow */
1206 bfd_elf_generic_reloc, /* special_function */
1207 "R_PPC_EMB_NADDR16", /* name */
1208 FALSE, /* partial_inplace */
1209 0, /* src_mask */
1210 0xffff, /* dst_mask */
1211 FALSE), /* pcrel_offset */
1212
1213 /* 16 bit value resulting from the addend minus the symbol. */
1214 HOWTO (R_PPC_EMB_NADDR16_LO, /* type */
1215 0, /* rightshift */
1216 1, /* size (0 = byte, 1 = short, 2 = long) */
1217 16, /* bitsize */
1218 FALSE, /* pc_relative */
1219 0, /* bitpos */
1220 complain_overflow_dont,/* complain_on_overflow */
1221 bfd_elf_generic_reloc, /* special_function */
1222 "R_PPC_EMB_ADDR16_LO", /* name */
1223 FALSE, /* partial_inplace */
1224 0, /* src_mask */
1225 0xffff, /* dst_mask */
1226 FALSE), /* pcrel_offset */
1227
1228 /* The high order 16 bits of the addend minus the symbol. */
1229 HOWTO (R_PPC_EMB_NADDR16_HI, /* type */
1230 16, /* rightshift */
1231 1, /* size (0 = byte, 1 = short, 2 = long) */
1232 16, /* bitsize */
1233 FALSE, /* pc_relative */
1234 0, /* bitpos */
1235 complain_overflow_dont, /* complain_on_overflow */
1236 bfd_elf_generic_reloc, /* special_function */
1237 "R_PPC_EMB_NADDR16_HI", /* name */
1238 FALSE, /* partial_inplace */
1239 0, /* src_mask */
1240 0xffff, /* dst_mask */
1241 FALSE), /* pcrel_offset */
1242
1243 /* The high order 16 bits of the result of the addend minus the address,
1244 plus 1 if the contents of the low 16 bits, treated as a signed number,
1245 is negative. */
1246 HOWTO (R_PPC_EMB_NADDR16_HA, /* type */
1247 16, /* rightshift */
1248 1, /* size (0 = byte, 1 = short, 2 = long) */
1249 16, /* bitsize */
1250 FALSE, /* pc_relative */
1251 0, /* bitpos */
1252 complain_overflow_dont, /* complain_on_overflow */
1253 ppc_elf_addr16_ha_reloc, /* special_function */
1254 "R_PPC_EMB_NADDR16_HA", /* name */
1255 FALSE, /* partial_inplace */
1256 0, /* src_mask */
1257 0xffff, /* dst_mask */
1258 FALSE), /* pcrel_offset */
1259
1260 /* 16 bit value resulting from allocating a 4 byte word to hold an
1261 address in the .sdata section, and returning the offset from
1262 _SDA_BASE_ for that relocation. */
1263 HOWTO (R_PPC_EMB_SDAI16, /* type */
1264 0, /* rightshift */
1265 1, /* size (0 = byte, 1 = short, 2 = long) */
1266 16, /* bitsize */
1267 FALSE, /* pc_relative */
1268 0, /* bitpos */
1269 complain_overflow_bitfield, /* complain_on_overflow */
1270 bfd_elf_generic_reloc, /* special_function */
1271 "R_PPC_EMB_SDAI16", /* name */
1272 FALSE, /* partial_inplace */
1273 0, /* src_mask */
1274 0xffff, /* dst_mask */
1275 FALSE), /* pcrel_offset */
1276
1277 /* 16 bit value resulting from allocating a 4 byte word to hold an
1278 address in the .sdata2 section, and returning the offset from
1279 _SDA2_BASE_ for that relocation. */
1280 HOWTO (R_PPC_EMB_SDA2I16, /* type */
1281 0, /* rightshift */
1282 1, /* size (0 = byte, 1 = short, 2 = long) */
1283 16, /* bitsize */
1284 FALSE, /* pc_relative */
1285 0, /* bitpos */
1286 complain_overflow_bitfield, /* complain_on_overflow */
1287 bfd_elf_generic_reloc, /* special_function */
1288 "R_PPC_EMB_SDA2I16", /* name */
1289 FALSE, /* partial_inplace */
1290 0, /* src_mask */
1291 0xffff, /* dst_mask */
1292 FALSE), /* pcrel_offset */
1293
1294 /* A sign-extended 16 bit value relative to _SDA2_BASE_, for use with
1295 small data items. */
1296 HOWTO (R_PPC_EMB_SDA2REL, /* type */
1297 0, /* rightshift */
1298 1, /* size (0 = byte, 1 = short, 2 = long) */
1299 16, /* bitsize */
1300 FALSE, /* pc_relative */
1301 0, /* bitpos */
1302 complain_overflow_signed, /* complain_on_overflow */
1303 bfd_elf_generic_reloc, /* special_function */
1304 "R_PPC_EMB_SDA2REL", /* name */
1305 FALSE, /* partial_inplace */
1306 0, /* src_mask */
1307 0xffff, /* dst_mask */
1308 FALSE), /* pcrel_offset */
1309
1310 /* Relocate against either _SDA_BASE_ or _SDA2_BASE_, filling in the 16 bit
1311 signed offset from the appropriate base, and filling in the register
1312 field with the appropriate register (0, 2, or 13). */
1313 HOWTO (R_PPC_EMB_SDA21, /* type */
1314 0, /* rightshift */
1315 2, /* size (0 = byte, 1 = short, 2 = long) */
1316 16, /* bitsize */
1317 FALSE, /* pc_relative */
1318 0, /* bitpos */
1319 complain_overflow_signed, /* complain_on_overflow */
1320 bfd_elf_generic_reloc, /* special_function */
1321 "R_PPC_EMB_SDA21", /* name */
1322 FALSE, /* partial_inplace */
1323 0, /* src_mask */
1324 0xffff, /* dst_mask */
1325 FALSE), /* pcrel_offset */
1326
1327 /* Relocation not handled: R_PPC_EMB_MRKREF */
1328 /* Relocation not handled: R_PPC_EMB_RELSEC16 */
1329 /* Relocation not handled: R_PPC_EMB_RELST_LO */
1330 /* Relocation not handled: R_PPC_EMB_RELST_HI */
1331 /* Relocation not handled: R_PPC_EMB_RELST_HA */
1332 /* Relocation not handled: R_PPC_EMB_BIT_FLD */
1333
1334 /* PC relative relocation against either _SDA_BASE_ or _SDA2_BASE_, filling
1335 in the 16 bit signed offset from the appropriate base, and filling in the
1336 register field with the appropriate register (0, 2, or 13). */
1337 HOWTO (R_PPC_EMB_RELSDA, /* type */
1338 0, /* rightshift */
1339 1, /* size (0 = byte, 1 = short, 2 = long) */
1340 16, /* bitsize */
1341 TRUE, /* pc_relative */
1342 0, /* bitpos */
1343 complain_overflow_signed, /* complain_on_overflow */
1344 bfd_elf_generic_reloc, /* special_function */
1345 "R_PPC_EMB_RELSDA", /* name */
1346 FALSE, /* partial_inplace */
1347 0, /* src_mask */
1348 0xffff, /* dst_mask */
1349 FALSE), /* pcrel_offset */
1350
1351 /* A 16 bit relative relocation. */
1352 HOWTO (R_PPC_REL16, /* type */
1353 0, /* rightshift */
1354 1, /* size (0 = byte, 1 = short, 2 = long) */
1355 16, /* bitsize */
1356 TRUE, /* pc_relative */
1357 0, /* bitpos */
1358 complain_overflow_bitfield, /* complain_on_overflow */
1359 bfd_elf_generic_reloc, /* special_function */
1360 "R_PPC_REL16", /* name */
1361 FALSE, /* partial_inplace */
1362 0, /* src_mask */
1363 0xffff, /* dst_mask */
1364 TRUE), /* pcrel_offset */
1365
1366 /* A 16 bit relative relocation without overflow. */
1367 HOWTO (R_PPC_REL16_LO, /* type */
1368 0, /* rightshift */
1369 1, /* size (0 = byte, 1 = short, 2 = long) */
1370 16, /* bitsize */
1371 TRUE, /* pc_relative */
1372 0, /* bitpos */
1373 complain_overflow_dont,/* complain_on_overflow */
1374 bfd_elf_generic_reloc, /* special_function */
1375 "R_PPC_REL16_LO", /* name */
1376 FALSE, /* partial_inplace */
1377 0, /* src_mask */
1378 0xffff, /* dst_mask */
1379 TRUE), /* pcrel_offset */
1380
1381 /* The high order 16 bits of a relative address. */
1382 HOWTO (R_PPC_REL16_HI, /* type */
1383 16, /* rightshift */
1384 1, /* size (0 = byte, 1 = short, 2 = long) */
1385 16, /* bitsize */
1386 TRUE, /* pc_relative */
1387 0, /* bitpos */
1388 complain_overflow_dont, /* complain_on_overflow */
1389 bfd_elf_generic_reloc, /* special_function */
1390 "R_PPC_REL16_HI", /* name */
1391 FALSE, /* partial_inplace */
1392 0, /* src_mask */
1393 0xffff, /* dst_mask */
1394 TRUE), /* pcrel_offset */
1395
1396 /* The high order 16 bits of a relative address, plus 1 if the contents of
1397 the low 16 bits, treated as a signed number, is negative. */
1398 HOWTO (R_PPC_REL16_HA, /* type */
1399 16, /* rightshift */
1400 1, /* size (0 = byte, 1 = short, 2 = long) */
1401 16, /* bitsize */
1402 TRUE, /* pc_relative */
1403 0, /* bitpos */
1404 complain_overflow_dont, /* complain_on_overflow */
1405 ppc_elf_addr16_ha_reloc, /* special_function */
1406 "R_PPC_REL16_HA", /* name */
1407 FALSE, /* partial_inplace */
1408 0, /* src_mask */
1409 0xffff, /* dst_mask */
1410 TRUE), /* pcrel_offset */
1411
1412 /* GNU extension to record C++ vtable hierarchy. */
1413 HOWTO (R_PPC_GNU_VTINHERIT, /* type */
1414 0, /* rightshift */
1415 0, /* size (0 = byte, 1 = short, 2 = long) */
1416 0, /* bitsize */
1417 FALSE, /* pc_relative */
1418 0, /* bitpos */
1419 complain_overflow_dont, /* complain_on_overflow */
1420 NULL, /* special_function */
1421 "R_PPC_GNU_VTINHERIT", /* name */
1422 FALSE, /* partial_inplace */
1423 0, /* src_mask */
1424 0, /* dst_mask */
1425 FALSE), /* pcrel_offset */
1426
1427 /* GNU extension to record C++ vtable member usage. */
1428 HOWTO (R_PPC_GNU_VTENTRY, /* type */
1429 0, /* rightshift */
1430 0, /* size (0 = byte, 1 = short, 2 = long) */
1431 0, /* bitsize */
1432 FALSE, /* pc_relative */
1433 0, /* bitpos */
1434 complain_overflow_dont, /* complain_on_overflow */
1435 NULL, /* special_function */
1436 "R_PPC_GNU_VTENTRY", /* name */
1437 FALSE, /* partial_inplace */
1438 0, /* src_mask */
1439 0, /* dst_mask */
1440 FALSE), /* pcrel_offset */
1441
1442 /* Phony reloc to handle AIX style TOC entries. */
1443 HOWTO (R_PPC_TOC16, /* type */
1444 0, /* rightshift */
1445 1, /* size (0 = byte, 1 = short, 2 = long) */
1446 16, /* bitsize */
1447 FALSE, /* pc_relative */
1448 0, /* bitpos */
1449 complain_overflow_signed, /* complain_on_overflow */
1450 bfd_elf_generic_reloc, /* special_function */
1451 "R_PPC_TOC16", /* name */
1452 FALSE, /* partial_inplace */
1453 0, /* src_mask */
1454 0xffff, /* dst_mask */
1455 FALSE), /* pcrel_offset */
1456 };
1457 \f
1458 /* Initialize the ppc_elf_howto_table, so that linear accesses can be done. */
1459
1460 static void
1461 ppc_elf_howto_init (void)
1462 {
1463 unsigned int i, type;
1464
1465 for (i = 0;
1466 i < sizeof (ppc_elf_howto_raw) / sizeof (ppc_elf_howto_raw[0]);
1467 i++)
1468 {
1469 type = ppc_elf_howto_raw[i].type;
1470 if (type >= (sizeof (ppc_elf_howto_table)
1471 / sizeof (ppc_elf_howto_table[0])))
1472 abort ();
1473 ppc_elf_howto_table[type] = &ppc_elf_howto_raw[i];
1474 }
1475 }
1476
1477 static reloc_howto_type *
1478 ppc_elf_reloc_type_lookup (bfd *abfd ATTRIBUTE_UNUSED,
1479 bfd_reloc_code_real_type code)
1480 {
1481 enum elf_ppc_reloc_type r;
1482
1483 /* Initialize howto table if not already done. */
1484 if (!ppc_elf_howto_table[R_PPC_ADDR32])
1485 ppc_elf_howto_init ();
1486
1487 switch (code)
1488 {
1489 default:
1490 return NULL;
1491
1492 case BFD_RELOC_NONE: r = R_PPC_NONE; break;
1493 case BFD_RELOC_32: r = R_PPC_ADDR32; break;
1494 case BFD_RELOC_PPC_BA26: r = R_PPC_ADDR24; break;
1495 case BFD_RELOC_16: r = R_PPC_ADDR16; break;
1496 case BFD_RELOC_LO16: r = R_PPC_ADDR16_LO; break;
1497 case BFD_RELOC_HI16: r = R_PPC_ADDR16_HI; break;
1498 case BFD_RELOC_HI16_S: r = R_PPC_ADDR16_HA; break;
1499 case BFD_RELOC_PPC_BA16: r = R_PPC_ADDR14; break;
1500 case BFD_RELOC_PPC_BA16_BRTAKEN: r = R_PPC_ADDR14_BRTAKEN; break;
1501 case BFD_RELOC_PPC_BA16_BRNTAKEN: r = R_PPC_ADDR14_BRNTAKEN; break;
1502 case BFD_RELOC_PPC_B26: r = R_PPC_REL24; break;
1503 case BFD_RELOC_PPC_B16: r = R_PPC_REL14; break;
1504 case BFD_RELOC_PPC_B16_BRTAKEN: r = R_PPC_REL14_BRTAKEN; break;
1505 case BFD_RELOC_PPC_B16_BRNTAKEN: r = R_PPC_REL14_BRNTAKEN; break;
1506 case BFD_RELOC_16_GOTOFF: r = R_PPC_GOT16; break;
1507 case BFD_RELOC_LO16_GOTOFF: r = R_PPC_GOT16_LO; break;
1508 case BFD_RELOC_HI16_GOTOFF: r = R_PPC_GOT16_HI; break;
1509 case BFD_RELOC_HI16_S_GOTOFF: r = R_PPC_GOT16_HA; break;
1510 case BFD_RELOC_24_PLT_PCREL: r = R_PPC_PLTREL24; break;
1511 case BFD_RELOC_PPC_COPY: r = R_PPC_COPY; break;
1512 case BFD_RELOC_PPC_GLOB_DAT: r = R_PPC_GLOB_DAT; break;
1513 case BFD_RELOC_PPC_LOCAL24PC: r = R_PPC_LOCAL24PC; break;
1514 case BFD_RELOC_32_PCREL: r = R_PPC_REL32; break;
1515 case BFD_RELOC_32_PLTOFF: r = R_PPC_PLT32; break;
1516 case BFD_RELOC_32_PLT_PCREL: r = R_PPC_PLTREL32; break;
1517 case BFD_RELOC_LO16_PLTOFF: r = R_PPC_PLT16_LO; break;
1518 case BFD_RELOC_HI16_PLTOFF: r = R_PPC_PLT16_HI; break;
1519 case BFD_RELOC_HI16_S_PLTOFF: r = R_PPC_PLT16_HA; break;
1520 case BFD_RELOC_GPREL16: r = R_PPC_SDAREL16; break;
1521 case BFD_RELOC_16_BASEREL: r = R_PPC_SECTOFF; break;
1522 case BFD_RELOC_LO16_BASEREL: r = R_PPC_SECTOFF_LO; break;
1523 case BFD_RELOC_HI16_BASEREL: r = R_PPC_SECTOFF_HI; break;
1524 case BFD_RELOC_HI16_S_BASEREL: r = R_PPC_SECTOFF_HA; break;
1525 case BFD_RELOC_CTOR: r = R_PPC_ADDR32; break;
1526 case BFD_RELOC_PPC_TOC16: r = R_PPC_TOC16; break;
1527 case BFD_RELOC_PPC_TLS: r = R_PPC_TLS; break;
1528 case BFD_RELOC_PPC_DTPMOD: r = R_PPC_DTPMOD32; break;
1529 case BFD_RELOC_PPC_TPREL16: r = R_PPC_TPREL16; break;
1530 case BFD_RELOC_PPC_TPREL16_LO: r = R_PPC_TPREL16_LO; break;
1531 case BFD_RELOC_PPC_TPREL16_HI: r = R_PPC_TPREL16_HI; break;
1532 case BFD_RELOC_PPC_TPREL16_HA: r = R_PPC_TPREL16_HA; break;
1533 case BFD_RELOC_PPC_TPREL: r = R_PPC_TPREL32; break;
1534 case BFD_RELOC_PPC_DTPREL16: r = R_PPC_DTPREL16; break;
1535 case BFD_RELOC_PPC_DTPREL16_LO: r = R_PPC_DTPREL16_LO; break;
1536 case BFD_RELOC_PPC_DTPREL16_HI: r = R_PPC_DTPREL16_HI; break;
1537 case BFD_RELOC_PPC_DTPREL16_HA: r = R_PPC_DTPREL16_HA; break;
1538 case BFD_RELOC_PPC_DTPREL: r = R_PPC_DTPREL32; break;
1539 case BFD_RELOC_PPC_GOT_TLSGD16: r = R_PPC_GOT_TLSGD16; break;
1540 case BFD_RELOC_PPC_GOT_TLSGD16_LO: r = R_PPC_GOT_TLSGD16_LO; break;
1541 case BFD_RELOC_PPC_GOT_TLSGD16_HI: r = R_PPC_GOT_TLSGD16_HI; break;
1542 case BFD_RELOC_PPC_GOT_TLSGD16_HA: r = R_PPC_GOT_TLSGD16_HA; break;
1543 case BFD_RELOC_PPC_GOT_TLSLD16: r = R_PPC_GOT_TLSLD16; break;
1544 case BFD_RELOC_PPC_GOT_TLSLD16_LO: r = R_PPC_GOT_TLSLD16_LO; break;
1545 case BFD_RELOC_PPC_GOT_TLSLD16_HI: r = R_PPC_GOT_TLSLD16_HI; break;
1546 case BFD_RELOC_PPC_GOT_TLSLD16_HA: r = R_PPC_GOT_TLSLD16_HA; break;
1547 case BFD_RELOC_PPC_GOT_TPREL16: r = R_PPC_GOT_TPREL16; break;
1548 case BFD_RELOC_PPC_GOT_TPREL16_LO: r = R_PPC_GOT_TPREL16_LO; break;
1549 case BFD_RELOC_PPC_GOT_TPREL16_HI: r = R_PPC_GOT_TPREL16_HI; break;
1550 case BFD_RELOC_PPC_GOT_TPREL16_HA: r = R_PPC_GOT_TPREL16_HA; break;
1551 case BFD_RELOC_PPC_GOT_DTPREL16: r = R_PPC_GOT_DTPREL16; break;
1552 case BFD_RELOC_PPC_GOT_DTPREL16_LO: r = R_PPC_GOT_DTPREL16_LO; break;
1553 case BFD_RELOC_PPC_GOT_DTPREL16_HI: r = R_PPC_GOT_DTPREL16_HI; break;
1554 case BFD_RELOC_PPC_GOT_DTPREL16_HA: r = R_PPC_GOT_DTPREL16_HA; break;
1555 case BFD_RELOC_PPC_EMB_NADDR32: r = R_PPC_EMB_NADDR32; break;
1556 case BFD_RELOC_PPC_EMB_NADDR16: r = R_PPC_EMB_NADDR16; break;
1557 case BFD_RELOC_PPC_EMB_NADDR16_LO: r = R_PPC_EMB_NADDR16_LO; break;
1558 case BFD_RELOC_PPC_EMB_NADDR16_HI: r = R_PPC_EMB_NADDR16_HI; break;
1559 case BFD_RELOC_PPC_EMB_NADDR16_HA: r = R_PPC_EMB_NADDR16_HA; break;
1560 case BFD_RELOC_PPC_EMB_SDAI16: r = R_PPC_EMB_SDAI16; break;
1561 case BFD_RELOC_PPC_EMB_SDA2I16: r = R_PPC_EMB_SDA2I16; break;
1562 case BFD_RELOC_PPC_EMB_SDA2REL: r = R_PPC_EMB_SDA2REL; break;
1563 case BFD_RELOC_PPC_EMB_SDA21: r = R_PPC_EMB_SDA21; break;
1564 case BFD_RELOC_PPC_EMB_MRKREF: r = R_PPC_EMB_MRKREF; break;
1565 case BFD_RELOC_PPC_EMB_RELSEC16: r = R_PPC_EMB_RELSEC16; break;
1566 case BFD_RELOC_PPC_EMB_RELST_LO: r = R_PPC_EMB_RELST_LO; break;
1567 case BFD_RELOC_PPC_EMB_RELST_HI: r = R_PPC_EMB_RELST_HI; break;
1568 case BFD_RELOC_PPC_EMB_RELST_HA: r = R_PPC_EMB_RELST_HA; break;
1569 case BFD_RELOC_PPC_EMB_BIT_FLD: r = R_PPC_EMB_BIT_FLD; break;
1570 case BFD_RELOC_PPC_EMB_RELSDA: r = R_PPC_EMB_RELSDA; break;
1571 case BFD_RELOC_16_PCREL: r = R_PPC_REL16; break;
1572 case BFD_RELOC_LO16_PCREL: r = R_PPC_REL16_LO; break;
1573 case BFD_RELOC_HI16_PCREL: r = R_PPC_REL16_HI; break;
1574 case BFD_RELOC_HI16_S_PCREL: r = R_PPC_REL16_HA; break;
1575 case BFD_RELOC_VTABLE_INHERIT: r = R_PPC_GNU_VTINHERIT; break;
1576 case BFD_RELOC_VTABLE_ENTRY: r = R_PPC_GNU_VTENTRY; break;
1577 }
1578
1579 return ppc_elf_howto_table[r];
1580 };
1581
1582 static reloc_howto_type *
1583 ppc_elf_reloc_name_lookup (bfd *abfd ATTRIBUTE_UNUSED,
1584 const char *r_name)
1585 {
1586 unsigned int i;
1587
1588 for (i = 0;
1589 i < sizeof (ppc_elf_howto_raw) / sizeof (ppc_elf_howto_raw[0]);
1590 i++)
1591 if (ppc_elf_howto_raw[i].name != NULL
1592 && strcasecmp (ppc_elf_howto_raw[i].name, r_name) == 0)
1593 return &ppc_elf_howto_raw[i];
1594
1595 return NULL;
1596 }
1597
1598 /* Set the howto pointer for a PowerPC ELF reloc. */
1599
1600 static void
1601 ppc_elf_info_to_howto (bfd *abfd ATTRIBUTE_UNUSED,
1602 arelent *cache_ptr,
1603 Elf_Internal_Rela *dst)
1604 {
1605 /* Initialize howto table if not already done. */
1606 if (!ppc_elf_howto_table[R_PPC_ADDR32])
1607 ppc_elf_howto_init ();
1608
1609 BFD_ASSERT (ELF32_R_TYPE (dst->r_info) < (unsigned int) R_PPC_max);
1610 cache_ptr->howto = ppc_elf_howto_table[ELF32_R_TYPE (dst->r_info)];
1611
1612 /* Just because the above assert didn't trigger doesn't mean that
1613 ELF32_R_TYPE (dst->r_info) is necessarily a valid relocation. */
1614 if (!cache_ptr->howto)
1615 {
1616 (*_bfd_error_handler) (_("%B: invalid relocation type %d"),
1617 abfd, ELF32_R_TYPE (dst->r_info));
1618 bfd_set_error (bfd_error_bad_value);
1619
1620 cache_ptr->howto = ppc_elf_howto_table[R_PPC_NONE];
1621 }
1622 }
1623
1624 /* Handle the R_PPC_ADDR16_HA and R_PPC_REL16_HA relocs. */
1625
1626 static bfd_reloc_status_type
1627 ppc_elf_addr16_ha_reloc (bfd *abfd ATTRIBUTE_UNUSED,
1628 arelent *reloc_entry,
1629 asymbol *symbol,
1630 void *data ATTRIBUTE_UNUSED,
1631 asection *input_section,
1632 bfd *output_bfd,
1633 char **error_message ATTRIBUTE_UNUSED)
1634 {
1635 bfd_vma relocation;
1636
1637 if (output_bfd != NULL)
1638 {
1639 reloc_entry->address += input_section->output_offset;
1640 return bfd_reloc_ok;
1641 }
1642
1643 if (reloc_entry->address > bfd_get_section_limit (abfd, input_section))
1644 return bfd_reloc_outofrange;
1645
1646 if (bfd_is_com_section (symbol->section))
1647 relocation = 0;
1648 else
1649 relocation = symbol->value;
1650
1651 relocation += symbol->section->output_section->vma;
1652 relocation += symbol->section->output_offset;
1653 relocation += reloc_entry->addend;
1654 if (reloc_entry->howto->pc_relative)
1655 relocation -= reloc_entry->address;
1656
1657 reloc_entry->addend += (relocation & 0x8000) << 1;
1658
1659 return bfd_reloc_continue;
1660 }
1661
1662 static bfd_reloc_status_type
1663 ppc_elf_unhandled_reloc (bfd *abfd,
1664 arelent *reloc_entry,
1665 asymbol *symbol,
1666 void *data,
1667 asection *input_section,
1668 bfd *output_bfd,
1669 char **error_message)
1670 {
1671 /* If this is a relocatable link (output_bfd test tells us), just
1672 call the generic function. Any adjustment will be done at final
1673 link time. */
1674 if (output_bfd != NULL)
1675 return bfd_elf_generic_reloc (abfd, reloc_entry, symbol, data,
1676 input_section, output_bfd, error_message);
1677
1678 if (error_message != NULL)
1679 {
1680 static char buf[60];
1681 sprintf (buf, _("generic linker can't handle %s"),
1682 reloc_entry->howto->name);
1683 *error_message = buf;
1684 }
1685 return bfd_reloc_dangerous;
1686 }
1687 \f
1688 /* Sections created by the linker. */
1689
1690 typedef struct elf_linker_section
1691 {
1692 /* Pointer to the bfd section. */
1693 asection *section;
1694 /* Section name. */
1695 const char *name;
1696 /* Associated bss section name. */
1697 const char *bss_name;
1698 /* Associated symbol name. */
1699 const char *sym_name;
1700 /* Associated symbol. */
1701 struct elf_link_hash_entry *sym;
1702 } elf_linker_section_t;
1703
1704 /* Linked list of allocated pointer entries. This hangs off of the
1705 symbol lists, and provides allows us to return different pointers,
1706 based on different addend's. */
1707
1708 typedef struct elf_linker_section_pointers
1709 {
1710 /* next allocated pointer for this symbol */
1711 struct elf_linker_section_pointers *next;
1712 /* offset of pointer from beginning of section */
1713 bfd_vma offset;
1714 /* addend used */
1715 bfd_vma addend;
1716 /* which linker section this is */
1717 elf_linker_section_t *lsect;
1718 } elf_linker_section_pointers_t;
1719
1720 struct ppc_elf_obj_tdata
1721 {
1722 struct elf_obj_tdata elf;
1723
1724 /* A mapping from local symbols to offsets into the various linker
1725 sections added. This is index by the symbol index. */
1726 elf_linker_section_pointers_t **linker_section_pointers;
1727
1728 /* Flags used to auto-detect plt type. */
1729 unsigned int makes_plt_call : 1;
1730 unsigned int has_rel16 : 1;
1731 };
1732
1733 #define ppc_elf_tdata(bfd) \
1734 ((struct ppc_elf_obj_tdata *) (bfd)->tdata.any)
1735
1736 #define elf_local_ptr_offsets(bfd) \
1737 (ppc_elf_tdata (bfd)->linker_section_pointers)
1738
1739 #define is_ppc_elf(bfd) \
1740 (bfd_get_flavour (bfd) == bfd_target_elf_flavour \
1741 && elf_object_id (bfd) == PPC32_ELF_TDATA)
1742
1743 /* Override the generic function because we store some extras. */
1744
1745 static bfd_boolean
1746 ppc_elf_mkobject (bfd *abfd)
1747 {
1748 return bfd_elf_allocate_object (abfd, sizeof (struct ppc_elf_obj_tdata),
1749 PPC32_ELF_TDATA);
1750 }
1751
1752 /* Fix bad default arch selected for a 32 bit input bfd when the
1753 default is 64 bit. */
1754
1755 static bfd_boolean
1756 ppc_elf_object_p (bfd *abfd)
1757 {
1758 if (abfd->arch_info->the_default && abfd->arch_info->bits_per_word == 64)
1759 {
1760 Elf_Internal_Ehdr *i_ehdr = elf_elfheader (abfd);
1761
1762 if (i_ehdr->e_ident[EI_CLASS] == ELFCLASS32)
1763 {
1764 /* Relies on arch after 64 bit default being 32 bit default. */
1765 abfd->arch_info = abfd->arch_info->next;
1766 BFD_ASSERT (abfd->arch_info->bits_per_word == 32);
1767 }
1768 }
1769 return TRUE;
1770 }
1771
1772 /* Function to set whether a module needs the -mrelocatable bit set. */
1773
1774 static bfd_boolean
1775 ppc_elf_set_private_flags (bfd *abfd, flagword flags)
1776 {
1777 BFD_ASSERT (!elf_flags_init (abfd)
1778 || elf_elfheader (abfd)->e_flags == flags);
1779
1780 elf_elfheader (abfd)->e_flags = flags;
1781 elf_flags_init (abfd) = TRUE;
1782 return TRUE;
1783 }
1784
1785 /* Support for core dump NOTE sections. */
1786
1787 static bfd_boolean
1788 ppc_elf_grok_prstatus (bfd *abfd, Elf_Internal_Note *note)
1789 {
1790 int offset;
1791 unsigned int size;
1792
1793 switch (note->descsz)
1794 {
1795 default:
1796 return FALSE;
1797
1798 case 268: /* Linux/PPC. */
1799 /* pr_cursig */
1800 elf_tdata (abfd)->core_signal = bfd_get_16 (abfd, note->descdata + 12);
1801
1802 /* pr_pid */
1803 elf_tdata (abfd)->core_pid = bfd_get_32 (abfd, note->descdata + 24);
1804
1805 /* pr_reg */
1806 offset = 72;
1807 size = 192;
1808
1809 break;
1810 }
1811
1812 /* Make a ".reg/999" section. */
1813 return _bfd_elfcore_make_pseudosection (abfd, ".reg",
1814 size, note->descpos + offset);
1815 }
1816
1817 static bfd_boolean
1818 ppc_elf_grok_psinfo (bfd *abfd, Elf_Internal_Note *note)
1819 {
1820 switch (note->descsz)
1821 {
1822 default:
1823 return FALSE;
1824
1825 case 128: /* Linux/PPC elf_prpsinfo. */
1826 elf_tdata (abfd)->core_program
1827 = _bfd_elfcore_strndup (abfd, note->descdata + 32, 16);
1828 elf_tdata (abfd)->core_command
1829 = _bfd_elfcore_strndup (abfd, note->descdata + 48, 80);
1830 }
1831
1832 /* Note that for some reason, a spurious space is tacked
1833 onto the end of the args in some (at least one anyway)
1834 implementations, so strip it off if it exists. */
1835
1836 {
1837 char *command = elf_tdata (abfd)->core_command;
1838 int n = strlen (command);
1839
1840 if (0 < n && command[n - 1] == ' ')
1841 command[n - 1] = '\0';
1842 }
1843
1844 return TRUE;
1845 }
1846
1847 static char *
1848 ppc_elf_write_core_note (bfd *abfd, char *buf, int *bufsiz, int note_type, ...)
1849 {
1850 switch (note_type)
1851 {
1852 default:
1853 return NULL;
1854
1855 case NT_PRPSINFO:
1856 {
1857 char data[128];
1858 va_list ap;
1859
1860 va_start (ap, note_type);
1861 memset (data, 0, 32);
1862 strncpy (data + 32, va_arg (ap, const char *), 16);
1863 strncpy (data + 48, va_arg (ap, const char *), 80);
1864 va_end (ap);
1865 return elfcore_write_note (abfd, buf, bufsiz,
1866 "CORE", note_type, data, sizeof (data));
1867 }
1868
1869 case NT_PRSTATUS:
1870 {
1871 char data[268];
1872 va_list ap;
1873 long pid;
1874 int cursig;
1875 const void *greg;
1876
1877 va_start (ap, note_type);
1878 memset (data, 0, 72);
1879 pid = va_arg (ap, long);
1880 bfd_put_32 (abfd, pid, data + 24);
1881 cursig = va_arg (ap, int);
1882 bfd_put_16 (abfd, cursig, data + 12);
1883 greg = va_arg (ap, const void *);
1884 memcpy (data + 72, greg, 192);
1885 memset (data + 264, 0, 4);
1886 va_end (ap);
1887 return elfcore_write_note (abfd, buf, bufsiz,
1888 "CORE", note_type, data, sizeof (data));
1889 }
1890 }
1891 }
1892
1893 /* Return address for Ith PLT stub in section PLT, for relocation REL
1894 or (bfd_vma) -1 if it should not be included. */
1895
1896 static bfd_vma
1897 ppc_elf_plt_sym_val (bfd_vma i ATTRIBUTE_UNUSED,
1898 const asection *plt ATTRIBUTE_UNUSED,
1899 const arelent *rel)
1900 {
1901 return rel->address;
1902 }
1903
1904 /* Handle a PowerPC specific section when reading an object file. This
1905 is called when bfd_section_from_shdr finds a section with an unknown
1906 type. */
1907
1908 static bfd_boolean
1909 ppc_elf_section_from_shdr (bfd *abfd,
1910 Elf_Internal_Shdr *hdr,
1911 const char *name,
1912 int shindex)
1913 {
1914 asection *newsect;
1915 flagword flags;
1916
1917 if (! _bfd_elf_make_section_from_shdr (abfd, hdr, name, shindex))
1918 return FALSE;
1919
1920 newsect = hdr->bfd_section;
1921 flags = bfd_get_section_flags (abfd, newsect);
1922 if (hdr->sh_flags & SHF_EXCLUDE)
1923 flags |= SEC_EXCLUDE;
1924
1925 if (hdr->sh_type == SHT_ORDERED)
1926 flags |= SEC_SORT_ENTRIES;
1927
1928 bfd_set_section_flags (abfd, newsect, flags);
1929 return TRUE;
1930 }
1931
1932 /* Set up any other section flags and such that may be necessary. */
1933
1934 static bfd_boolean
1935 ppc_elf_fake_sections (bfd *abfd ATTRIBUTE_UNUSED,
1936 Elf_Internal_Shdr *shdr,
1937 asection *asect)
1938 {
1939 if ((asect->flags & (SEC_GROUP | SEC_EXCLUDE)) == SEC_EXCLUDE)
1940 shdr->sh_flags |= SHF_EXCLUDE;
1941
1942 if ((asect->flags & SEC_SORT_ENTRIES) != 0)
1943 shdr->sh_type = SHT_ORDERED;
1944
1945 return TRUE;
1946 }
1947
1948 /* If we have .sbss2 or .PPC.EMB.sbss0 output sections, we
1949 need to bump up the number of section headers. */
1950
1951 static int
1952 ppc_elf_additional_program_headers (bfd *abfd,
1953 struct bfd_link_info *info ATTRIBUTE_UNUSED)
1954 {
1955 asection *s;
1956 int ret = 0;
1957
1958 s = bfd_get_section_by_name (abfd, ".sbss2");
1959 if (s != NULL && (s->flags & SEC_ALLOC) != 0)
1960 ++ret;
1961
1962 s = bfd_get_section_by_name (abfd, ".PPC.EMB.sbss0");
1963 if (s != NULL && (s->flags & SEC_ALLOC) != 0)
1964 ++ret;
1965
1966 return ret;
1967 }
1968
1969 /* Add extra PPC sections -- Note, for now, make .sbss2 and
1970 .PPC.EMB.sbss0 a normal section, and not a bss section so
1971 that the linker doesn't crater when trying to make more than
1972 2 sections. */
1973
1974 static const struct bfd_elf_special_section ppc_elf_special_sections[] =
1975 {
1976 { STRING_COMMA_LEN (".plt"), 0, SHT_NOBITS, SHF_ALLOC + SHF_EXECINSTR },
1977 { STRING_COMMA_LEN (".sbss"), -2, SHT_NOBITS, SHF_ALLOC + SHF_WRITE },
1978 { STRING_COMMA_LEN (".sbss2"), -2, SHT_PROGBITS, SHF_ALLOC },
1979 { STRING_COMMA_LEN (".sdata"), -2, SHT_PROGBITS, SHF_ALLOC + SHF_WRITE },
1980 { STRING_COMMA_LEN (".sdata2"), -2, SHT_PROGBITS, SHF_ALLOC },
1981 { STRING_COMMA_LEN (".tags"), 0, SHT_ORDERED, SHF_ALLOC },
1982 { STRING_COMMA_LEN (".PPC.EMB.apuinfo"), 0, SHT_NOTE, 0 },
1983 { STRING_COMMA_LEN (".PPC.EMB.sbss0"), 0, SHT_PROGBITS, SHF_ALLOC },
1984 { STRING_COMMA_LEN (".PPC.EMB.sdata0"), 0, SHT_PROGBITS, SHF_ALLOC },
1985 { NULL, 0, 0, 0, 0 }
1986 };
1987
1988 /* This is what we want for new plt/got. */
1989 static struct bfd_elf_special_section ppc_alt_plt =
1990 { STRING_COMMA_LEN (".plt"), 0, SHT_PROGBITS, SHF_ALLOC };
1991
1992 static const struct bfd_elf_special_section *
1993 ppc_elf_get_sec_type_attr (bfd *abfd ATTRIBUTE_UNUSED, asection *sec)
1994 {
1995 const struct bfd_elf_special_section *ssect;
1996
1997 /* See if this is one of the special sections. */
1998 if (sec->name == NULL)
1999 return NULL;
2000
2001 ssect = _bfd_elf_get_special_section (sec->name, ppc_elf_special_sections,
2002 sec->use_rela_p);
2003 if (ssect != NULL)
2004 {
2005 if (ssect == ppc_elf_special_sections && (sec->flags & SEC_LOAD) != 0)
2006 ssect = &ppc_alt_plt;
2007 return ssect;
2008 }
2009
2010 return _bfd_elf_get_sec_type_attr (abfd, sec);
2011 }
2012 \f
2013 /* Very simple linked list structure for recording apuinfo values. */
2014 typedef struct apuinfo_list
2015 {
2016 struct apuinfo_list *next;
2017 unsigned long value;
2018 }
2019 apuinfo_list;
2020
2021 static apuinfo_list *head;
2022
2023
2024 static void
2025 apuinfo_list_init (void)
2026 {
2027 head = NULL;
2028 }
2029
2030 static void
2031 apuinfo_list_add (unsigned long value)
2032 {
2033 apuinfo_list *entry = head;
2034
2035 while (entry != NULL)
2036 {
2037 if (entry->value == value)
2038 return;
2039 entry = entry->next;
2040 }
2041
2042 entry = bfd_malloc (sizeof (* entry));
2043 if (entry == NULL)
2044 return;
2045
2046 entry->value = value;
2047 entry->next = head;
2048 head = entry;
2049 }
2050
2051 static unsigned
2052 apuinfo_list_length (void)
2053 {
2054 apuinfo_list *entry;
2055 unsigned long count;
2056
2057 for (entry = head, count = 0;
2058 entry;
2059 entry = entry->next)
2060 ++ count;
2061
2062 return count;
2063 }
2064
2065 static inline unsigned long
2066 apuinfo_list_element (unsigned long number)
2067 {
2068 apuinfo_list * entry;
2069
2070 for (entry = head;
2071 entry && number --;
2072 entry = entry->next)
2073 ;
2074
2075 return entry ? entry->value : 0;
2076 }
2077
2078 static void
2079 apuinfo_list_finish (void)
2080 {
2081 apuinfo_list *entry;
2082
2083 for (entry = head; entry;)
2084 {
2085 apuinfo_list *next = entry->next;
2086 free (entry);
2087 entry = next;
2088 }
2089
2090 head = NULL;
2091 }
2092
2093 #define APUINFO_SECTION_NAME ".PPC.EMB.apuinfo"
2094 #define APUINFO_LABEL "APUinfo"
2095
2096 /* Scan the input BFDs and create a linked list of
2097 the APUinfo values that will need to be emitted. */
2098
2099 static void
2100 ppc_elf_begin_write_processing (bfd *abfd, struct bfd_link_info *link_info)
2101 {
2102 bfd *ibfd;
2103 asection *asec;
2104 char *buffer;
2105 unsigned num_input_sections;
2106 bfd_size_type output_section_size;
2107 unsigned i;
2108 unsigned num_entries;
2109 unsigned long offset;
2110 unsigned long length;
2111 const char *error_message = NULL;
2112
2113 if (link_info == NULL)
2114 return;
2115
2116 /* Scan the input bfds, looking for apuinfo sections. */
2117 num_input_sections = 0;
2118 output_section_size = 0;
2119
2120 for (ibfd = link_info->input_bfds; ibfd; ibfd = ibfd->link_next)
2121 {
2122 asec = bfd_get_section_by_name (ibfd, APUINFO_SECTION_NAME);
2123 if (asec)
2124 {
2125 ++ num_input_sections;
2126 output_section_size += asec->size;
2127 }
2128 }
2129
2130 /* We need at least one input sections
2131 in order to make merging worthwhile. */
2132 if (num_input_sections < 1)
2133 return;
2134
2135 /* Just make sure that the output section exists as well. */
2136 asec = bfd_get_section_by_name (abfd, APUINFO_SECTION_NAME);
2137 if (asec == NULL)
2138 return;
2139
2140 /* Allocate a buffer for the contents of the input sections. */
2141 buffer = bfd_malloc (output_section_size);
2142 if (buffer == NULL)
2143 return;
2144
2145 offset = 0;
2146 apuinfo_list_init ();
2147
2148 /* Read in the input sections contents. */
2149 for (ibfd = link_info->input_bfds; ibfd; ibfd = ibfd->link_next)
2150 {
2151 unsigned long datum;
2152 char *ptr;
2153
2154 asec = bfd_get_section_by_name (ibfd, APUINFO_SECTION_NAME);
2155 if (asec == NULL)
2156 continue;
2157
2158 length = asec->size;
2159 if (length < 24)
2160 {
2161 error_message = _("corrupt or empty %s section in %B");
2162 goto fail;
2163 }
2164
2165 if (bfd_seek (ibfd, asec->filepos, SEEK_SET) != 0
2166 || (bfd_bread (buffer + offset, length, ibfd) != length))
2167 {
2168 error_message = _("unable to read in %s section from %B");
2169 goto fail;
2170 }
2171
2172 /* Process the contents of the section. */
2173 ptr = buffer + offset;
2174 error_message = _("corrupt %s section in %B");
2175
2176 /* Verify the contents of the header. Note - we have to
2177 extract the values this way in order to allow for a
2178 host whose endian-ness is different from the target. */
2179 datum = bfd_get_32 (ibfd, ptr);
2180 if (datum != sizeof APUINFO_LABEL)
2181 goto fail;
2182
2183 datum = bfd_get_32 (ibfd, ptr + 8);
2184 if (datum != 0x2)
2185 goto fail;
2186
2187 if (strcmp (ptr + 12, APUINFO_LABEL) != 0)
2188 goto fail;
2189
2190 /* Get the number of bytes used for apuinfo entries. */
2191 datum = bfd_get_32 (ibfd, ptr + 4);
2192 if (datum + 20 != length)
2193 goto fail;
2194
2195 /* Make sure that we do not run off the end of the section. */
2196 if (offset + length > output_section_size)
2197 goto fail;
2198
2199 /* Scan the apuinfo section, building a list of apuinfo numbers. */
2200 for (i = 0; i < datum; i += 4)
2201 apuinfo_list_add (bfd_get_32 (ibfd, ptr + 20 + i));
2202
2203 /* Update the offset. */
2204 offset += length;
2205 }
2206
2207 error_message = NULL;
2208
2209 /* Compute the size of the output section. */
2210 num_entries = apuinfo_list_length ();
2211 output_section_size = 20 + num_entries * 4;
2212
2213 asec = bfd_get_section_by_name (abfd, APUINFO_SECTION_NAME);
2214
2215 if (! bfd_set_section_size (abfd, asec, output_section_size))
2216 ibfd = abfd,
2217 error_message = _("warning: unable to set size of %s section in %B");
2218
2219 fail:
2220 free (buffer);
2221
2222 if (error_message)
2223 (*_bfd_error_handler) (error_message, ibfd, APUINFO_SECTION_NAME);
2224 }
2225
2226 /* Prevent the output section from accumulating the input sections'
2227 contents. We have already stored this in our linked list structure. */
2228
2229 static bfd_boolean
2230 ppc_elf_write_section (bfd *abfd ATTRIBUTE_UNUSED,
2231 struct bfd_link_info *link_info ATTRIBUTE_UNUSED,
2232 asection *asec,
2233 bfd_byte *contents ATTRIBUTE_UNUSED)
2234 {
2235 return (apuinfo_list_length ()
2236 && strcmp (asec->name, APUINFO_SECTION_NAME) == 0);
2237 }
2238
2239 /* Finally we can generate the output section. */
2240
2241 static void
2242 ppc_elf_final_write_processing (bfd *abfd, bfd_boolean linker ATTRIBUTE_UNUSED)
2243 {
2244 bfd_byte *buffer;
2245 asection *asec;
2246 unsigned i;
2247 unsigned num_entries;
2248 bfd_size_type length;
2249
2250 asec = bfd_get_section_by_name (abfd, APUINFO_SECTION_NAME);
2251 if (asec == NULL)
2252 return;
2253
2254 if (apuinfo_list_length () == 0)
2255 return;
2256
2257 length = asec->size;
2258 if (length < 20)
2259 return;
2260
2261 buffer = bfd_malloc (length);
2262 if (buffer == NULL)
2263 {
2264 (*_bfd_error_handler)
2265 (_("failed to allocate space for new APUinfo section."));
2266 return;
2267 }
2268
2269 /* Create the apuinfo header. */
2270 num_entries = apuinfo_list_length ();
2271 bfd_put_32 (abfd, sizeof APUINFO_LABEL, buffer);
2272 bfd_put_32 (abfd, num_entries * 4, buffer + 4);
2273 bfd_put_32 (abfd, 0x2, buffer + 8);
2274 strcpy ((char *) buffer + 12, APUINFO_LABEL);
2275
2276 length = 20;
2277 for (i = 0; i < num_entries; i++)
2278 {
2279 bfd_put_32 (abfd, apuinfo_list_element (i), buffer + length);
2280 length += 4;
2281 }
2282
2283 if (length != asec->size)
2284 (*_bfd_error_handler) (_("failed to compute new APUinfo section."));
2285
2286 if (! bfd_set_section_contents (abfd, asec, buffer, (file_ptr) 0, length))
2287 (*_bfd_error_handler) (_("failed to install new APUinfo section."));
2288
2289 free (buffer);
2290
2291 apuinfo_list_finish ();
2292 }
2293 \f
2294 /* The following functions are specific to the ELF linker, while
2295 functions above are used generally. They appear in this file more
2296 or less in the order in which they are called. eg.
2297 ppc_elf_check_relocs is called early in the link process,
2298 ppc_elf_finish_dynamic_sections is one of the last functions
2299 called. */
2300
2301 /* The PPC linker needs to keep track of the number of relocs that it
2302 decides to copy as dynamic relocs in check_relocs for each symbol.
2303 This is so that it can later discard them if they are found to be
2304 unnecessary. We store the information in a field extending the
2305 regular ELF linker hash table. */
2306
2307 struct ppc_elf_dyn_relocs
2308 {
2309 struct ppc_elf_dyn_relocs *next;
2310
2311 /* The input section of the reloc. */
2312 asection *sec;
2313
2314 /* Total number of relocs copied for the input section. */
2315 bfd_size_type count;
2316
2317 /* Number of pc-relative relocs copied for the input section. */
2318 bfd_size_type pc_count;
2319 };
2320
2321 /* Track PLT entries needed for a given symbol. We might need more
2322 than one glink entry per symbol. */
2323 struct plt_entry
2324 {
2325 struct plt_entry *next;
2326
2327 /* -fPIC uses multiple GOT sections, one per file, called ".got2".
2328 This field stores the offset into .got2 used to initialise the
2329 GOT pointer reg. It will always be at least 32768 (and for
2330 current gcc this is the only offset used). */
2331 bfd_vma addend;
2332
2333 /* The .got2 section. */
2334 asection *sec;
2335
2336 /* PLT refcount or offset. */
2337 union
2338 {
2339 bfd_signed_vma refcount;
2340 bfd_vma offset;
2341 } plt;
2342
2343 /* .glink stub offset. */
2344 bfd_vma glink_offset;
2345 };
2346
2347 /* Of those relocs that might be copied as dynamic relocs, this function
2348 selects those that must be copied when linking a shared library,
2349 even when the symbol is local. */
2350
2351 static int
2352 must_be_dyn_reloc (struct bfd_link_info *info,
2353 enum elf_ppc_reloc_type r_type)
2354 {
2355 switch (r_type)
2356 {
2357 default:
2358 return 1;
2359
2360 case R_PPC_REL24:
2361 case R_PPC_REL14:
2362 case R_PPC_REL14_BRTAKEN:
2363 case R_PPC_REL14_BRNTAKEN:
2364 case R_PPC_REL32:
2365 return 0;
2366
2367 case R_PPC_TPREL32:
2368 case R_PPC_TPREL16:
2369 case R_PPC_TPREL16_LO:
2370 case R_PPC_TPREL16_HI:
2371 case R_PPC_TPREL16_HA:
2372 return !info->executable;
2373 }
2374 }
2375
2376 /* If ELIMINATE_COPY_RELOCS is non-zero, the linker will try to avoid
2377 copying dynamic variables from a shared lib into an app's dynbss
2378 section, and instead use a dynamic relocation to point into the
2379 shared lib. */
2380 #define ELIMINATE_COPY_RELOCS 1
2381
2382 /* PPC ELF linker hash entry. */
2383
2384 struct ppc_elf_link_hash_entry
2385 {
2386 struct elf_link_hash_entry elf;
2387
2388 /* If this symbol is used in the linker created sections, the processor
2389 specific backend uses this field to map the field into the offset
2390 from the beginning of the section. */
2391 elf_linker_section_pointers_t *linker_section_pointer;
2392
2393 /* Track dynamic relocs copied for this symbol. */
2394 struct ppc_elf_dyn_relocs *dyn_relocs;
2395
2396 /* Contexts in which symbol is used in the GOT (or TOC).
2397 TLS_GD .. TLS_TLS bits are or'd into the mask as the
2398 corresponding relocs are encountered during check_relocs.
2399 tls_optimize clears TLS_GD .. TLS_TPREL when optimizing to
2400 indicate the corresponding GOT entry type is not needed. */
2401 #define TLS_GD 1 /* GD reloc. */
2402 #define TLS_LD 2 /* LD reloc. */
2403 #define TLS_TPREL 4 /* TPREL reloc, => IE. */
2404 #define TLS_DTPREL 8 /* DTPREL reloc, => LD. */
2405 #define TLS_TLS 16 /* Any TLS reloc. */
2406 #define TLS_TPRELGD 32 /* TPREL reloc resulting from GD->IE. */
2407 char tls_mask;
2408
2409 /* Nonzero if we have seen a small data relocation referring to this
2410 symbol. */
2411 unsigned char has_sda_refs;
2412 };
2413
2414 #define ppc_elf_hash_entry(ent) ((struct ppc_elf_link_hash_entry *) (ent))
2415
2416 /* PPC ELF linker hash table. */
2417
2418 struct ppc_elf_link_hash_table
2419 {
2420 struct elf_link_hash_table elf;
2421
2422 /* Short-cuts to get to dynamic linker sections. */
2423 asection *got;
2424 asection *relgot;
2425 asection *glink;
2426 asection *plt;
2427 asection *relplt;
2428 asection *dynbss;
2429 asection *relbss;
2430 asection *dynsbss;
2431 asection *relsbss;
2432 elf_linker_section_t sdata[2];
2433 asection *sbss;
2434
2435 /* The (unloaded but important) .rela.plt.unloaded on VxWorks. */
2436 asection *srelplt2;
2437
2438 /* The .got.plt section (VxWorks only)*/
2439 asection *sgotplt;
2440
2441 /* Shortcut to __tls_get_addr. */
2442 struct elf_link_hash_entry *tls_get_addr;
2443
2444 /* The bfd that forced an old-style PLT. */
2445 bfd *old_bfd;
2446
2447 /* TLS local dynamic got entry handling. */
2448 union {
2449 bfd_signed_vma refcount;
2450 bfd_vma offset;
2451 } tlsld_got;
2452
2453 /* Offset of PltResolve function in glink. */
2454 bfd_vma glink_pltresolve;
2455
2456 /* Size of reserved GOT entries. */
2457 unsigned int got_header_size;
2458 /* Non-zero if allocating the header left a gap. */
2459 unsigned int got_gap;
2460
2461 /* The type of PLT we have chosen to use. */
2462 enum ppc_elf_plt_type plt_type;
2463
2464 /* Set if we should emit symbols for stubs. */
2465 unsigned int emit_stub_syms:1;
2466
2467 /* True if the target system is VxWorks. */
2468 unsigned int is_vxworks:1;
2469
2470 /* The size of PLT entries. */
2471 int plt_entry_size;
2472 /* The distance between adjacent PLT slots. */
2473 int plt_slot_size;
2474 /* The size of the first PLT entry. */
2475 int plt_initial_entry_size;
2476
2477 /* Small local sym to section mapping cache. */
2478 struct sym_sec_cache sym_sec;
2479 };
2480
2481 /* Get the PPC ELF linker hash table from a link_info structure. */
2482
2483 #define ppc_elf_hash_table(p) \
2484 ((struct ppc_elf_link_hash_table *) (p)->hash)
2485
2486 /* Create an entry in a PPC ELF linker hash table. */
2487
2488 static struct bfd_hash_entry *
2489 ppc_elf_link_hash_newfunc (struct bfd_hash_entry *entry,
2490 struct bfd_hash_table *table,
2491 const char *string)
2492 {
2493 /* Allocate the structure if it has not already been allocated by a
2494 subclass. */
2495 if (entry == NULL)
2496 {
2497 entry = bfd_hash_allocate (table,
2498 sizeof (struct ppc_elf_link_hash_entry));
2499 if (entry == NULL)
2500 return entry;
2501 }
2502
2503 /* Call the allocation method of the superclass. */
2504 entry = _bfd_elf_link_hash_newfunc (entry, table, string);
2505 if (entry != NULL)
2506 {
2507 ppc_elf_hash_entry (entry)->linker_section_pointer = NULL;
2508 ppc_elf_hash_entry (entry)->dyn_relocs = NULL;
2509 ppc_elf_hash_entry (entry)->tls_mask = 0;
2510 }
2511
2512 return entry;
2513 }
2514
2515 /* Create a PPC ELF linker hash table. */
2516
2517 static struct bfd_link_hash_table *
2518 ppc_elf_link_hash_table_create (bfd *abfd)
2519 {
2520 struct ppc_elf_link_hash_table *ret;
2521
2522 ret = bfd_zmalloc (sizeof (struct ppc_elf_link_hash_table));
2523 if (ret == NULL)
2524 return NULL;
2525
2526 if (!_bfd_elf_link_hash_table_init (&ret->elf, abfd,
2527 ppc_elf_link_hash_newfunc,
2528 sizeof (struct ppc_elf_link_hash_entry)))
2529 {
2530 free (ret);
2531 return NULL;
2532 }
2533
2534 ret->elf.init_plt_refcount.refcount = 0;
2535 ret->elf.init_plt_refcount.glist = NULL;
2536 ret->elf.init_plt_offset.offset = 0;
2537 ret->elf.init_plt_offset.glist = NULL;
2538
2539 ret->sdata[0].name = ".sdata";
2540 ret->sdata[0].sym_name = "_SDA_BASE_";
2541 ret->sdata[0].bss_name = ".sbss";
2542
2543 ret->sdata[1].name = ".sdata2";
2544 ret->sdata[1].sym_name = "_SDA2_BASE_";
2545 ret->sdata[1].bss_name = ".sbss2";
2546
2547 ret->plt_entry_size = 12;
2548 ret->plt_slot_size = 8;
2549 ret->plt_initial_entry_size = 72;
2550
2551 return &ret->elf.root;
2552 }
2553
2554 /* Create .got and the related sections. */
2555
2556 static bfd_boolean
2557 ppc_elf_create_got (bfd *abfd, struct bfd_link_info *info)
2558 {
2559 struct ppc_elf_link_hash_table *htab;
2560 asection *s;
2561 flagword flags;
2562
2563 if (!_bfd_elf_create_got_section (abfd, info))
2564 return FALSE;
2565
2566 htab = ppc_elf_hash_table (info);
2567 htab->got = s = bfd_get_section_by_name (abfd, ".got");
2568 if (s == NULL)
2569 abort ();
2570
2571 if (htab->is_vxworks)
2572 {
2573 htab->sgotplt = bfd_get_section_by_name (abfd, ".got.plt");
2574 if (!htab->sgotplt)
2575 abort ();
2576 }
2577 else
2578 {
2579 /* The powerpc .got has a blrl instruction in it. Mark it
2580 executable. */
2581 flags = (SEC_ALLOC | SEC_LOAD | SEC_CODE | SEC_HAS_CONTENTS
2582 | SEC_IN_MEMORY | SEC_LINKER_CREATED);
2583 if (!bfd_set_section_flags (abfd, s, flags))
2584 return FALSE;
2585 }
2586
2587 flags = (SEC_ALLOC | SEC_LOAD | SEC_HAS_CONTENTS | SEC_IN_MEMORY
2588 | SEC_LINKER_CREATED | SEC_READONLY);
2589 htab->relgot = bfd_make_section_with_flags (abfd, ".rela.got", flags);
2590 if (!htab->relgot
2591 || ! bfd_set_section_alignment (abfd, htab->relgot, 2))
2592 return FALSE;
2593
2594 return TRUE;
2595 }
2596
2597 /* We have to create .dynsbss and .rela.sbss here so that they get mapped
2598 to output sections (just like _bfd_elf_create_dynamic_sections has
2599 to create .dynbss and .rela.bss). */
2600
2601 static bfd_boolean
2602 ppc_elf_create_dynamic_sections (bfd *abfd, struct bfd_link_info *info)
2603 {
2604 struct ppc_elf_link_hash_table *htab;
2605 asection *s;
2606 flagword flags;
2607
2608 htab = ppc_elf_hash_table (info);
2609
2610 if (htab->got == NULL
2611 && !ppc_elf_create_got (abfd, info))
2612 return FALSE;
2613
2614 if (!_bfd_elf_create_dynamic_sections (abfd, info))
2615 return FALSE;
2616
2617 flags = (SEC_ALLOC | SEC_LOAD | SEC_READONLY | SEC_HAS_CONTENTS
2618 | SEC_IN_MEMORY | SEC_LINKER_CREATED);
2619
2620 s = bfd_make_section_anyway_with_flags (abfd, ".glink", flags | SEC_CODE);
2621 htab->glink = s;
2622 if (s == NULL
2623 || !bfd_set_section_alignment (abfd, s, 4))
2624 return FALSE;
2625
2626 htab->dynbss = bfd_get_section_by_name (abfd, ".dynbss");
2627 s = bfd_make_section_with_flags (abfd, ".dynsbss",
2628 SEC_ALLOC | SEC_LINKER_CREATED);
2629 htab->dynsbss = s;
2630 if (s == NULL)
2631 return FALSE;
2632
2633 if (! info->shared)
2634 {
2635 htab->relbss = bfd_get_section_by_name (abfd, ".rela.bss");
2636 s = bfd_make_section_with_flags (abfd, ".rela.sbss", flags);
2637 htab->relsbss = s;
2638 if (s == NULL
2639 || ! bfd_set_section_alignment (abfd, s, 2))
2640 return FALSE;
2641 }
2642
2643 if (htab->is_vxworks
2644 && !elf_vxworks_create_dynamic_sections (abfd, info, &htab->srelplt2))
2645 return FALSE;
2646
2647 htab->relplt = bfd_get_section_by_name (abfd, ".rela.plt");
2648 htab->plt = s = bfd_get_section_by_name (abfd, ".plt");
2649 if (s == NULL)
2650 abort ();
2651
2652 flags = SEC_ALLOC | SEC_CODE | SEC_LINKER_CREATED;
2653 if (htab->plt_type == PLT_VXWORKS)
2654 /* The VxWorks PLT is a loaded section with contents. */
2655 flags |= SEC_HAS_CONTENTS | SEC_LOAD | SEC_READONLY;
2656 return bfd_set_section_flags (abfd, s, flags);
2657 }
2658
2659 /* Copy the extra info we tack onto an elf_link_hash_entry. */
2660
2661 static void
2662 ppc_elf_copy_indirect_symbol (struct bfd_link_info *info,
2663 struct elf_link_hash_entry *dir,
2664 struct elf_link_hash_entry *ind)
2665 {
2666 struct ppc_elf_link_hash_entry *edir, *eind;
2667
2668 edir = (struct ppc_elf_link_hash_entry *) dir;
2669 eind = (struct ppc_elf_link_hash_entry *) ind;
2670
2671 if (eind->dyn_relocs != NULL)
2672 {
2673 if (edir->dyn_relocs != NULL)
2674 {
2675 struct ppc_elf_dyn_relocs **pp;
2676 struct ppc_elf_dyn_relocs *p;
2677
2678 /* Add reloc counts against the indirect sym to the direct sym
2679 list. Merge any entries against the same section. */
2680 for (pp = &eind->dyn_relocs; (p = *pp) != NULL; )
2681 {
2682 struct ppc_elf_dyn_relocs *q;
2683
2684 for (q = edir->dyn_relocs; q != NULL; q = q->next)
2685 if (q->sec == p->sec)
2686 {
2687 q->pc_count += p->pc_count;
2688 q->count += p->count;
2689 *pp = p->next;
2690 break;
2691 }
2692 if (q == NULL)
2693 pp = &p->next;
2694 }
2695 *pp = edir->dyn_relocs;
2696 }
2697
2698 edir->dyn_relocs = eind->dyn_relocs;
2699 eind->dyn_relocs = NULL;
2700 }
2701
2702 edir->tls_mask |= eind->tls_mask;
2703 edir->has_sda_refs |= eind->has_sda_refs;
2704
2705 /* If called to transfer flags for a weakdef during processing
2706 of elf_adjust_dynamic_symbol, don't copy non_got_ref.
2707 We clear it ourselves for ELIMINATE_COPY_RELOCS. */
2708 if (!(ELIMINATE_COPY_RELOCS
2709 && eind->elf.root.type != bfd_link_hash_indirect
2710 && edir->elf.dynamic_adjusted))
2711 edir->elf.non_got_ref |= eind->elf.non_got_ref;
2712
2713 edir->elf.ref_dynamic |= eind->elf.ref_dynamic;
2714 edir->elf.ref_regular |= eind->elf.ref_regular;
2715 edir->elf.ref_regular_nonweak |= eind->elf.ref_regular_nonweak;
2716 edir->elf.needs_plt |= eind->elf.needs_plt;
2717 edir->elf.pointer_equality_needed |= eind->elf.pointer_equality_needed;
2718
2719 /* If we were called to copy over info for a weak sym, that's all. */
2720 if (eind->elf.root.type != bfd_link_hash_indirect)
2721 return;
2722
2723 /* Copy over the GOT refcount entries that we may have already seen to
2724 the symbol which just became indirect. */
2725 edir->elf.got.refcount += eind->elf.got.refcount;
2726 eind->elf.got.refcount = 0;
2727
2728 /* And plt entries. */
2729 if (eind->elf.plt.plist != NULL)
2730 {
2731 if (edir->elf.plt.plist != NULL)
2732 {
2733 struct plt_entry **entp;
2734 struct plt_entry *ent;
2735
2736 for (entp = &eind->elf.plt.plist; (ent = *entp) != NULL; )
2737 {
2738 struct plt_entry *dent;
2739
2740 for (dent = edir->elf.plt.plist; dent != NULL; dent = dent->next)
2741 if (dent->sec == ent->sec && dent->addend == ent->addend)
2742 {
2743 dent->plt.refcount += ent->plt.refcount;
2744 *entp = ent->next;
2745 break;
2746 }
2747 if (dent == NULL)
2748 entp = &ent->next;
2749 }
2750 *entp = edir->elf.plt.plist;
2751 }
2752
2753 edir->elf.plt.plist = eind->elf.plt.plist;
2754 eind->elf.plt.plist = NULL;
2755 }
2756
2757 if (eind->elf.dynindx != -1)
2758 {
2759 if (edir->elf.dynindx != -1)
2760 _bfd_elf_strtab_delref (elf_hash_table (info)->dynstr,
2761 edir->elf.dynstr_index);
2762 edir->elf.dynindx = eind->elf.dynindx;
2763 edir->elf.dynstr_index = eind->elf.dynstr_index;
2764 eind->elf.dynindx = -1;
2765 eind->elf.dynstr_index = 0;
2766 }
2767 }
2768
2769 /* Hook called by the linker routine which adds symbols from an object
2770 file. We use it to put .comm items in .sbss, and not .bss. */
2771
2772 static bfd_boolean
2773 ppc_elf_add_symbol_hook (bfd *abfd,
2774 struct bfd_link_info *info,
2775 Elf_Internal_Sym *sym,
2776 const char **namep ATTRIBUTE_UNUSED,
2777 flagword *flagsp ATTRIBUTE_UNUSED,
2778 asection **secp,
2779 bfd_vma *valp)
2780 {
2781 if (sym->st_shndx == SHN_COMMON
2782 && !info->relocatable
2783 && is_ppc_elf (info->output_bfd)
2784 && sym->st_size <= elf_gp_size (abfd))
2785 {
2786 /* Common symbols less than or equal to -G nn bytes are automatically
2787 put into .sbss. */
2788 struct ppc_elf_link_hash_table *htab;
2789
2790 htab = ppc_elf_hash_table (info);
2791 if (htab->sbss == NULL)
2792 {
2793 flagword flags = SEC_IS_COMMON | SEC_LINKER_CREATED;
2794
2795 if (!htab->elf.dynobj)
2796 htab->elf.dynobj = abfd;
2797
2798 htab->sbss = bfd_make_section_anyway_with_flags (htab->elf.dynobj,
2799 ".sbss",
2800 flags);
2801 if (htab->sbss == NULL)
2802 return FALSE;
2803 }
2804
2805 *secp = htab->sbss;
2806 *valp = sym->st_size;
2807 }
2808
2809 return TRUE;
2810 }
2811 \f
2812 static bfd_boolean
2813 create_sdata_sym (struct ppc_elf_link_hash_table *htab,
2814 elf_linker_section_t *lsect)
2815 {
2816 lsect->sym = elf_link_hash_lookup (&htab->elf, lsect->sym_name,
2817 TRUE, FALSE, TRUE);
2818 if (lsect->sym == NULL)
2819 return FALSE;
2820 if (lsect->sym->root.type == bfd_link_hash_new)
2821 lsect->sym->non_elf = 0;
2822 lsect->sym->ref_regular = 1;
2823 return TRUE;
2824 }
2825
2826 /* Create a special linker section. */
2827
2828 static bfd_boolean
2829 ppc_elf_create_linker_section (bfd *abfd,
2830 struct bfd_link_info *info,
2831 flagword flags,
2832 elf_linker_section_t *lsect)
2833 {
2834 struct ppc_elf_link_hash_table *htab = ppc_elf_hash_table (info);
2835 asection *s;
2836
2837 flags |= (SEC_ALLOC | SEC_LOAD | SEC_HAS_CONTENTS | SEC_IN_MEMORY
2838 | SEC_LINKER_CREATED);
2839
2840 /* Record the first bfd that needs the special sections. */
2841 if (!htab->elf.dynobj)
2842 htab->elf.dynobj = abfd;
2843
2844 s = bfd_make_section_anyway_with_flags (htab->elf.dynobj,
2845 lsect->name,
2846 flags);
2847 if (s == NULL
2848 || !bfd_set_section_alignment (htab->elf.dynobj, s, 2))
2849 return FALSE;
2850 lsect->section = s;
2851
2852 return create_sdata_sym (htab, lsect);
2853 }
2854
2855 /* Find a linker generated pointer with a given addend and type. */
2856
2857 static elf_linker_section_pointers_t *
2858 elf_find_pointer_linker_section
2859 (elf_linker_section_pointers_t *linker_pointers,
2860 bfd_vma addend,
2861 elf_linker_section_t *lsect)
2862 {
2863 for ( ; linker_pointers != NULL; linker_pointers = linker_pointers->next)
2864 if (lsect == linker_pointers->lsect && addend == linker_pointers->addend)
2865 return linker_pointers;
2866
2867 return NULL;
2868 }
2869
2870 /* Allocate a pointer to live in a linker created section. */
2871
2872 static bfd_boolean
2873 elf_create_pointer_linker_section (bfd *abfd,
2874 elf_linker_section_t *lsect,
2875 struct elf_link_hash_entry *h,
2876 const Elf_Internal_Rela *rel)
2877 {
2878 elf_linker_section_pointers_t **ptr_linker_section_ptr = NULL;
2879 elf_linker_section_pointers_t *linker_section_ptr;
2880 unsigned long r_symndx = ELF32_R_SYM (rel->r_info);
2881 bfd_size_type amt;
2882
2883 BFD_ASSERT (lsect != NULL);
2884
2885 /* Is this a global symbol? */
2886 if (h != NULL)
2887 {
2888 struct ppc_elf_link_hash_entry *eh;
2889
2890 /* Has this symbol already been allocated? If so, our work is done. */
2891 eh = (struct ppc_elf_link_hash_entry *) h;
2892 if (elf_find_pointer_linker_section (eh->linker_section_pointer,
2893 rel->r_addend,
2894 lsect))
2895 return TRUE;
2896
2897 ptr_linker_section_ptr = &eh->linker_section_pointer;
2898 }
2899 else
2900 {
2901 BFD_ASSERT (is_ppc_elf (abfd));
2902
2903 /* Allocation of a pointer to a local symbol. */
2904 elf_linker_section_pointers_t **ptr = elf_local_ptr_offsets (abfd);
2905
2906 /* Allocate a table to hold the local symbols if first time. */
2907 if (!ptr)
2908 {
2909 unsigned int num_symbols = elf_symtab_hdr (abfd).sh_info;
2910
2911 amt = num_symbols;
2912 amt *= sizeof (elf_linker_section_pointers_t *);
2913 ptr = bfd_zalloc (abfd, amt);
2914
2915 if (!ptr)
2916 return FALSE;
2917
2918 elf_local_ptr_offsets (abfd) = ptr;
2919 }
2920
2921 /* Has this symbol already been allocated? If so, our work is done. */
2922 if (elf_find_pointer_linker_section (ptr[r_symndx],
2923 rel->r_addend,
2924 lsect))
2925 return TRUE;
2926
2927 ptr_linker_section_ptr = &ptr[r_symndx];
2928 }
2929
2930 /* Allocate space for a pointer in the linker section, and allocate
2931 a new pointer record from internal memory. */
2932 BFD_ASSERT (ptr_linker_section_ptr != NULL);
2933 amt = sizeof (elf_linker_section_pointers_t);
2934 linker_section_ptr = bfd_alloc (abfd, amt);
2935
2936 if (!linker_section_ptr)
2937 return FALSE;
2938
2939 linker_section_ptr->next = *ptr_linker_section_ptr;
2940 linker_section_ptr->addend = rel->r_addend;
2941 linker_section_ptr->lsect = lsect;
2942 *ptr_linker_section_ptr = linker_section_ptr;
2943
2944 linker_section_ptr->offset = lsect->section->size;
2945 lsect->section->size += 4;
2946
2947 #ifdef DEBUG
2948 fprintf (stderr,
2949 "Create pointer in linker section %s, offset = %ld, section size = %ld\n",
2950 lsect->name, (long) linker_section_ptr->offset,
2951 (long) lsect->section->size);
2952 #endif
2953
2954 return TRUE;
2955 }
2956
2957 static bfd_boolean
2958 update_local_sym_info (bfd *abfd,
2959 Elf_Internal_Shdr *symtab_hdr,
2960 unsigned long r_symndx,
2961 int tls_type)
2962 {
2963 bfd_signed_vma *local_got_refcounts = elf_local_got_refcounts (abfd);
2964 char *local_got_tls_masks;
2965
2966 if (local_got_refcounts == NULL)
2967 {
2968 bfd_size_type size = symtab_hdr->sh_info;
2969
2970 size *= sizeof (*local_got_refcounts) + sizeof (*local_got_tls_masks);
2971 local_got_refcounts = bfd_zalloc (abfd, size);
2972 if (local_got_refcounts == NULL)
2973 return FALSE;
2974 elf_local_got_refcounts (abfd) = local_got_refcounts;
2975 }
2976
2977 local_got_refcounts[r_symndx] += 1;
2978 local_got_tls_masks = (char *) (local_got_refcounts + symtab_hdr->sh_info);
2979 local_got_tls_masks[r_symndx] |= tls_type;
2980 return TRUE;
2981 }
2982
2983 static bfd_boolean
2984 update_plt_info (bfd *abfd, struct elf_link_hash_entry *h,
2985 asection *sec, bfd_vma addend)
2986 {
2987 struct plt_entry *ent;
2988
2989 if (addend < 32768)
2990 sec = NULL;
2991 for (ent = h->plt.plist; ent != NULL; ent = ent->next)
2992 if (ent->sec == sec && ent->addend == addend)
2993 break;
2994 if (ent == NULL)
2995 {
2996 bfd_size_type amt = sizeof (*ent);
2997 ent = bfd_alloc (abfd, amt);
2998 if (ent == NULL)
2999 return FALSE;
3000 ent->next = h->plt.plist;
3001 ent->sec = sec;
3002 ent->addend = addend;
3003 ent->plt.refcount = 0;
3004 h->plt.plist = ent;
3005 }
3006 ent->plt.refcount += 1;
3007 return TRUE;
3008 }
3009
3010 static struct plt_entry *
3011 find_plt_ent (struct elf_link_hash_entry *h, asection *sec, bfd_vma addend)
3012 {
3013 struct plt_entry *ent;
3014
3015 if (addend < 32768)
3016 sec = NULL;
3017 for (ent = h->plt.plist; ent != NULL; ent = ent->next)
3018 if (ent->sec == sec && ent->addend == addend)
3019 break;
3020 return ent;
3021 }
3022
3023 static void
3024 bad_shared_reloc (bfd *abfd, enum elf_ppc_reloc_type r_type)
3025 {
3026 (*_bfd_error_handler)
3027 (_("%B: relocation %s cannot be used when making a shared object"),
3028 abfd,
3029 ppc_elf_howto_table[r_type]->name);
3030 bfd_set_error (bfd_error_bad_value);
3031 }
3032
3033 /* Look through the relocs for a section during the first phase, and
3034 allocate space in the global offset table or procedure linkage
3035 table. */
3036
3037 static bfd_boolean
3038 ppc_elf_check_relocs (bfd *abfd,
3039 struct bfd_link_info *info,
3040 asection *sec,
3041 const Elf_Internal_Rela *relocs)
3042 {
3043 struct ppc_elf_link_hash_table *htab;
3044 Elf_Internal_Shdr *symtab_hdr;
3045 struct elf_link_hash_entry **sym_hashes;
3046 const Elf_Internal_Rela *rel;
3047 const Elf_Internal_Rela *rel_end;
3048 asection *got2, *sreloc;
3049
3050 if (info->relocatable)
3051 return TRUE;
3052
3053 /* Don't do anything special with non-loaded, non-alloced sections.
3054 In particular, any relocs in such sections should not affect GOT
3055 and PLT reference counting (ie. we don't allow them to create GOT
3056 or PLT entries), there's no possibility or desire to optimize TLS
3057 relocs, and there's not much point in propagating relocs to shared
3058 libs that the dynamic linker won't relocate. */
3059 if ((sec->flags & SEC_ALLOC) == 0)
3060 return TRUE;
3061
3062 #ifdef DEBUG
3063 _bfd_error_handler ("ppc_elf_check_relocs called for section %A in %B",
3064 sec, abfd);
3065 #endif
3066
3067 BFD_ASSERT (is_ppc_elf (abfd));
3068
3069 /* Initialize howto table if not already done. */
3070 if (!ppc_elf_howto_table[R_PPC_ADDR32])
3071 ppc_elf_howto_init ();
3072
3073 htab = ppc_elf_hash_table (info);
3074 symtab_hdr = &elf_symtab_hdr (abfd);
3075 sym_hashes = elf_sym_hashes (abfd);
3076 got2 = bfd_get_section_by_name (abfd, ".got2");
3077 sreloc = NULL;
3078
3079 rel_end = relocs + sec->reloc_count;
3080 for (rel = relocs; rel < rel_end; rel++)
3081 {
3082 unsigned long r_symndx;
3083 enum elf_ppc_reloc_type r_type;
3084 struct elf_link_hash_entry *h;
3085 int tls_type = 0;
3086
3087 r_symndx = ELF32_R_SYM (rel->r_info);
3088 if (r_symndx < symtab_hdr->sh_info)
3089 h = NULL;
3090 else
3091 {
3092 h = sym_hashes[r_symndx - symtab_hdr->sh_info];
3093 while (h->root.type == bfd_link_hash_indirect
3094 || h->root.type == bfd_link_hash_warning)
3095 h = (struct elf_link_hash_entry *) h->root.u.i.link;
3096 }
3097
3098 /* If a relocation refers to _GLOBAL_OFFSET_TABLE_, create the .got.
3099 This shows up in particular in an R_PPC_ADDR32 in the eabi
3100 startup code. */
3101 if (h != NULL
3102 && htab->got == NULL
3103 && strcmp (h->root.root.string, "_GLOBAL_OFFSET_TABLE_") == 0)
3104 {
3105 if (htab->elf.dynobj == NULL)
3106 htab->elf.dynobj = abfd;
3107 if (!ppc_elf_create_got (htab->elf.dynobj, info))
3108 return FALSE;
3109 BFD_ASSERT (h == htab->elf.hgot);
3110 }
3111
3112 r_type = ELF32_R_TYPE (rel->r_info);
3113 switch (r_type)
3114 {
3115 case R_PPC_GOT_TLSLD16:
3116 case R_PPC_GOT_TLSLD16_LO:
3117 case R_PPC_GOT_TLSLD16_HI:
3118 case R_PPC_GOT_TLSLD16_HA:
3119 tls_type = TLS_TLS | TLS_LD;
3120 goto dogottls;
3121
3122 case R_PPC_GOT_TLSGD16:
3123 case R_PPC_GOT_TLSGD16_LO:
3124 case R_PPC_GOT_TLSGD16_HI:
3125 case R_PPC_GOT_TLSGD16_HA:
3126 tls_type = TLS_TLS | TLS_GD;
3127 goto dogottls;
3128
3129 case R_PPC_GOT_TPREL16:
3130 case R_PPC_GOT_TPREL16_LO:
3131 case R_PPC_GOT_TPREL16_HI:
3132 case R_PPC_GOT_TPREL16_HA:
3133 if (!info->executable)
3134 info->flags |= DF_STATIC_TLS;
3135 tls_type = TLS_TLS | TLS_TPREL;
3136 goto dogottls;
3137
3138 case R_PPC_GOT_DTPREL16:
3139 case R_PPC_GOT_DTPREL16_LO:
3140 case R_PPC_GOT_DTPREL16_HI:
3141 case R_PPC_GOT_DTPREL16_HA:
3142 tls_type = TLS_TLS | TLS_DTPREL;
3143 dogottls:
3144 sec->has_tls_reloc = 1;
3145 /* Fall thru */
3146
3147 /* GOT16 relocations */
3148 case R_PPC_GOT16:
3149 case R_PPC_GOT16_LO:
3150 case R_PPC_GOT16_HI:
3151 case R_PPC_GOT16_HA:
3152 /* This symbol requires a global offset table entry. */
3153 if (htab->got == NULL)
3154 {
3155 if (htab->elf.dynobj == NULL)
3156 htab->elf.dynobj = abfd;
3157 if (!ppc_elf_create_got (htab->elf.dynobj, info))
3158 return FALSE;
3159 }
3160 if (h != NULL)
3161 {
3162 h->got.refcount += 1;
3163 ppc_elf_hash_entry (h)->tls_mask |= tls_type;
3164 }
3165 else
3166 /* This is a global offset table entry for a local symbol. */
3167 if (!update_local_sym_info (abfd, symtab_hdr, r_symndx, tls_type))
3168 return FALSE;
3169 break;
3170
3171 /* Indirect .sdata relocation. */
3172 case R_PPC_EMB_SDAI16:
3173 if (info->shared)
3174 {
3175 bad_shared_reloc (abfd, r_type);
3176 return FALSE;
3177 }
3178 if (htab->sdata[0].section == NULL
3179 && !ppc_elf_create_linker_section (abfd, info, 0,
3180 &htab->sdata[0]))
3181 return FALSE;
3182 if (!elf_create_pointer_linker_section (abfd, &htab->sdata[0],
3183 h, rel))
3184 return FALSE;
3185 if (h != NULL)
3186 {
3187 ppc_elf_hash_entry (h)->has_sda_refs = TRUE;
3188 h->non_got_ref = TRUE;
3189 }
3190 break;
3191
3192 /* Indirect .sdata2 relocation. */
3193 case R_PPC_EMB_SDA2I16:
3194 if (info->shared)
3195 {
3196 bad_shared_reloc (abfd, r_type);
3197 return FALSE;
3198 }
3199 if (htab->sdata[1].section == NULL
3200 && !ppc_elf_create_linker_section (abfd, info, SEC_READONLY,
3201 &htab->sdata[1]))
3202 return FALSE;
3203 if (!elf_create_pointer_linker_section (abfd, &htab->sdata[1],
3204 h, rel))
3205 return FALSE;
3206 if (h != NULL)
3207 {
3208 ppc_elf_hash_entry (h)->has_sda_refs = TRUE;
3209 h->non_got_ref = TRUE;
3210 }
3211 break;
3212
3213 case R_PPC_SDAREL16:
3214 if (info->shared)
3215 {
3216 bad_shared_reloc (abfd, r_type);
3217 return FALSE;
3218 }
3219 if (htab->sdata[0].sym == NULL
3220 && !create_sdata_sym (htab, &htab->sdata[0]))
3221 return FALSE;
3222 if (h != NULL)
3223 {
3224 ppc_elf_hash_entry (h)->has_sda_refs = TRUE;
3225 h->non_got_ref = TRUE;
3226 }
3227 break;
3228
3229 case R_PPC_EMB_SDA2REL:
3230 if (info->shared)
3231 {
3232 bad_shared_reloc (abfd, r_type);
3233 return FALSE;
3234 }
3235 if (htab->sdata[1].sym == NULL
3236 && !create_sdata_sym (htab, &htab->sdata[1]))
3237 return FALSE;
3238 if (h != NULL)
3239 {
3240 ppc_elf_hash_entry (h)->has_sda_refs = TRUE;
3241 h->non_got_ref = TRUE;
3242 }
3243 break;
3244
3245 case R_PPC_EMB_SDA21:
3246 case R_PPC_EMB_RELSDA:
3247 if (info->shared)
3248 {
3249 bad_shared_reloc (abfd, r_type);
3250 return FALSE;
3251 }
3252 if (htab->sdata[0].sym == NULL
3253 && !create_sdata_sym (htab, &htab->sdata[0]))
3254 return FALSE;
3255 if (htab->sdata[1].sym == NULL
3256 && !create_sdata_sym (htab, &htab->sdata[1]))
3257 return FALSE;
3258 if (h != NULL)
3259 {
3260 ppc_elf_hash_entry (h)->has_sda_refs = TRUE;
3261 h->non_got_ref = TRUE;
3262 }
3263 break;
3264
3265 case R_PPC_EMB_NADDR32:
3266 case R_PPC_EMB_NADDR16:
3267 case R_PPC_EMB_NADDR16_LO:
3268 case R_PPC_EMB_NADDR16_HI:
3269 case R_PPC_EMB_NADDR16_HA:
3270 if (info->shared)
3271 {
3272 bad_shared_reloc (abfd, r_type);
3273 return FALSE;
3274 }
3275 if (h != NULL)
3276 h->non_got_ref = TRUE;
3277 break;
3278
3279 case R_PPC_PLT32:
3280 case R_PPC_PLTREL24:
3281 case R_PPC_PLTREL32:
3282 case R_PPC_PLT16_LO:
3283 case R_PPC_PLT16_HI:
3284 case R_PPC_PLT16_HA:
3285 #ifdef DEBUG
3286 fprintf (stderr, "Reloc requires a PLT entry\n");
3287 #endif
3288 /* This symbol requires a procedure linkage table entry. We
3289 actually build the entry in finish_dynamic_symbol,
3290 because this might be a case of linking PIC code without
3291 linking in any dynamic objects, in which case we don't
3292 need to generate a procedure linkage table after all. */
3293
3294 if (h == NULL)
3295 {
3296 /* It does not make sense to have a procedure linkage
3297 table entry for a local symbol. */
3298 (*_bfd_error_handler) (_("%B(%A+0x%lx): %s reloc against "
3299 "local symbol"),
3300 abfd,
3301 sec,
3302 (long) rel->r_offset,
3303 ppc_elf_howto_table[r_type]->name);
3304 bfd_set_error (bfd_error_bad_value);
3305 return FALSE;
3306 }
3307 else
3308 {
3309 bfd_vma addend = 0;
3310
3311 if (r_type == R_PPC_PLTREL24)
3312 {
3313 ppc_elf_tdata (abfd)->makes_plt_call = 1;
3314 addend = rel->r_addend;
3315 }
3316 h->needs_plt = 1;
3317 if (!update_plt_info (abfd, h, got2, addend))
3318 return FALSE;
3319 }
3320 break;
3321
3322 /* The following relocations don't need to propagate the
3323 relocation if linking a shared object since they are
3324 section relative. */
3325 case R_PPC_SECTOFF:
3326 case R_PPC_SECTOFF_LO:
3327 case R_PPC_SECTOFF_HI:
3328 case R_PPC_SECTOFF_HA:
3329 case R_PPC_DTPREL16:
3330 case R_PPC_DTPREL16_LO:
3331 case R_PPC_DTPREL16_HI:
3332 case R_PPC_DTPREL16_HA:
3333 case R_PPC_TOC16:
3334 break;
3335
3336 case R_PPC_REL16:
3337 case R_PPC_REL16_LO:
3338 case R_PPC_REL16_HI:
3339 case R_PPC_REL16_HA:
3340 ppc_elf_tdata (abfd)->has_rel16 = 1;
3341 break;
3342
3343 /* These are just markers. */
3344 case R_PPC_TLS:
3345 case R_PPC_EMB_MRKREF:
3346 case R_PPC_NONE:
3347 case R_PPC_max:
3348 break;
3349
3350 /* These should only appear in dynamic objects. */
3351 case R_PPC_COPY:
3352 case R_PPC_GLOB_DAT:
3353 case R_PPC_JMP_SLOT:
3354 case R_PPC_RELATIVE:
3355 break;
3356
3357 /* These aren't handled yet. We'll report an error later. */
3358 case R_PPC_ADDR30:
3359 case R_PPC_EMB_RELSEC16:
3360 case R_PPC_EMB_RELST_LO:
3361 case R_PPC_EMB_RELST_HI:
3362 case R_PPC_EMB_RELST_HA:
3363 case R_PPC_EMB_BIT_FLD:
3364 break;
3365
3366 /* This refers only to functions defined in the shared library. */
3367 case R_PPC_LOCAL24PC:
3368 if (h && h == htab->elf.hgot && htab->plt_type == PLT_UNSET)
3369 {
3370 htab->plt_type = PLT_OLD;
3371 htab->old_bfd = abfd;
3372 }
3373 break;
3374
3375 /* This relocation describes the C++ object vtable hierarchy.
3376 Reconstruct it for later use during GC. */
3377 case R_PPC_GNU_VTINHERIT:
3378 if (!bfd_elf_gc_record_vtinherit (abfd, sec, h, rel->r_offset))
3379 return FALSE;
3380 break;
3381
3382 /* This relocation describes which C++ vtable entries are actually
3383 used. Record for later use during GC. */
3384 case R_PPC_GNU_VTENTRY:
3385 BFD_ASSERT (h != NULL);
3386 if (h != NULL
3387 && !bfd_elf_gc_record_vtentry (abfd, sec, h, rel->r_addend))
3388 return FALSE;
3389 break;
3390
3391 /* We shouldn't really be seeing these. */
3392 case R_PPC_TPREL32:
3393 case R_PPC_TPREL16:
3394 case R_PPC_TPREL16_LO:
3395 case R_PPC_TPREL16_HI:
3396 case R_PPC_TPREL16_HA:
3397 if (!info->executable)
3398 info->flags |= DF_STATIC_TLS;
3399 goto dodyn;
3400
3401 /* Nor these. */
3402 case R_PPC_DTPMOD32:
3403 case R_PPC_DTPREL32:
3404 goto dodyn;
3405
3406 case R_PPC_REL32:
3407 if (h == NULL
3408 && got2 != NULL
3409 && (sec->flags & SEC_CODE) != 0
3410 && (info->shared || info->pie)
3411 && htab->plt_type == PLT_UNSET)
3412 {
3413 /* Old -fPIC gcc code has .long LCTOC1-LCFx just before
3414 the start of a function, which assembles to a REL32
3415 reference to .got2. If we detect one of these, then
3416 force the old PLT layout because the linker cannot
3417 reliably deduce the GOT pointer value needed for
3418 PLT call stubs. */
3419 asection *s;
3420
3421 s = bfd_section_from_r_symndx (abfd, &htab->sym_sec, sec,
3422 r_symndx);
3423 if (s == got2)
3424 {
3425 htab->plt_type = PLT_OLD;
3426 htab->old_bfd = abfd;
3427 }
3428 }
3429 if (h == NULL || h == htab->elf.hgot)
3430 break;
3431 /* fall through */
3432
3433 case R_PPC_ADDR32:
3434 case R_PPC_ADDR16:
3435 case R_PPC_ADDR16_LO:
3436 case R_PPC_ADDR16_HI:
3437 case R_PPC_ADDR16_HA:
3438 case R_PPC_UADDR32:
3439 case R_PPC_UADDR16:
3440 if (h != NULL && !info->shared)
3441 {
3442 /* We may need a plt entry if the symbol turns out to be
3443 a function defined in a dynamic object. */
3444 if (!update_plt_info (abfd, h, NULL, 0))
3445 return FALSE;
3446
3447 /* We may need a copy reloc too. */
3448 h->non_got_ref = 1;
3449 h->pointer_equality_needed = 1;
3450 }
3451 goto dodyn;
3452
3453 case R_PPC_REL24:
3454 case R_PPC_REL14:
3455 case R_PPC_REL14_BRTAKEN:
3456 case R_PPC_REL14_BRNTAKEN:
3457 if (h == NULL)
3458 break;
3459 if (h == htab->elf.hgot)
3460 {
3461 if (htab->plt_type == PLT_UNSET)
3462 {
3463 htab->plt_type = PLT_OLD;
3464 htab->old_bfd = abfd;
3465 }
3466 break;
3467 }
3468 /* fall through */
3469
3470 case R_PPC_ADDR24:
3471 case R_PPC_ADDR14:
3472 case R_PPC_ADDR14_BRTAKEN:
3473 case R_PPC_ADDR14_BRNTAKEN:
3474 if (h != NULL && !info->shared)
3475 {
3476 /* We may need a plt entry if the symbol turns out to be
3477 a function defined in a dynamic object. */
3478 if (!update_plt_info (abfd, h, NULL, 0))
3479 return FALSE;
3480 break;
3481 }
3482
3483 dodyn:
3484 /* If we are creating a shared library, and this is a reloc
3485 against a global symbol, or a non PC relative reloc
3486 against a local symbol, then we need to copy the reloc
3487 into the shared library. However, if we are linking with
3488 -Bsymbolic, we do not need to copy a reloc against a
3489 global symbol which is defined in an object we are
3490 including in the link (i.e., DEF_REGULAR is set). At
3491 this point we have not seen all the input files, so it is
3492 possible that DEF_REGULAR is not set now but will be set
3493 later (it is never cleared). In case of a weak definition,
3494 DEF_REGULAR may be cleared later by a strong definition in
3495 a shared library. We account for that possibility below by
3496 storing information in the dyn_relocs field of the hash
3497 table entry. A similar situation occurs when creating
3498 shared libraries and symbol visibility changes render the
3499 symbol local.
3500
3501 If on the other hand, we are creating an executable, we
3502 may need to keep relocations for symbols satisfied by a
3503 dynamic library if we manage to avoid copy relocs for the
3504 symbol. */
3505 if ((info->shared
3506 && (must_be_dyn_reloc (info, r_type)
3507 || (h != NULL
3508 && (! info->symbolic
3509 || h->root.type == bfd_link_hash_defweak
3510 || !h->def_regular))))
3511 || (ELIMINATE_COPY_RELOCS
3512 && !info->shared
3513 && h != NULL
3514 && (h->root.type == bfd_link_hash_defweak
3515 || !h->def_regular)))
3516 {
3517 struct ppc_elf_dyn_relocs *p;
3518 struct ppc_elf_dyn_relocs **head;
3519
3520 #ifdef DEBUG
3521 fprintf (stderr,
3522 "ppc_elf_check_relocs needs to "
3523 "create relocation for %s\n",
3524 (h && h->root.root.string
3525 ? h->root.root.string : "<unknown>"));
3526 #endif
3527 if (sreloc == NULL)
3528 {
3529 const char *name;
3530
3531 name = (bfd_elf_string_from_elf_section
3532 (abfd,
3533 elf_elfheader (abfd)->e_shstrndx,
3534 elf_section_data (sec)->rel_hdr.sh_name));
3535 if (name == NULL)
3536 return FALSE;
3537
3538 BFD_ASSERT (CONST_STRNEQ (name, ".rela")
3539 && strcmp (bfd_get_section_name (abfd, sec),
3540 name + 5) == 0);
3541
3542 if (htab->elf.dynobj == NULL)
3543 htab->elf.dynobj = abfd;
3544 sreloc = bfd_get_section_by_name (htab->elf.dynobj, name);
3545 if (sreloc == NULL)
3546 {
3547 flagword flags;
3548
3549 flags = (SEC_HAS_CONTENTS | SEC_READONLY
3550 | SEC_IN_MEMORY | SEC_LINKER_CREATED
3551 | SEC_ALLOC | SEC_LOAD);
3552 sreloc = bfd_make_section_with_flags (htab->elf.dynobj,
3553 name,
3554 flags);
3555 if (sreloc == NULL
3556 || ! bfd_set_section_alignment (htab->elf.dynobj,
3557 sreloc, 2))
3558 return FALSE;
3559 }
3560 elf_section_data (sec)->sreloc = sreloc;
3561 }
3562
3563 /* If this is a global symbol, we count the number of
3564 relocations we need for this symbol. */
3565 if (h != NULL)
3566 {
3567 head = &ppc_elf_hash_entry (h)->dyn_relocs;
3568 }
3569 else
3570 {
3571 /* Track dynamic relocs needed for local syms too.
3572 We really need local syms available to do this
3573 easily. Oh well. */
3574
3575 asection *s;
3576 void *vpp;
3577
3578 s = bfd_section_from_r_symndx (abfd, &htab->sym_sec,
3579 sec, r_symndx);
3580 if (s == NULL)
3581 return FALSE;
3582
3583 vpp = &elf_section_data (s)->local_dynrel;
3584 head = (struct ppc_elf_dyn_relocs **) vpp;
3585 }
3586
3587 p = *head;
3588 if (p == NULL || p->sec != sec)
3589 {
3590 p = bfd_alloc (htab->elf.dynobj, sizeof *p);
3591 if (p == NULL)
3592 return FALSE;
3593 p->next = *head;
3594 *head = p;
3595 p->sec = sec;
3596 p->count = 0;
3597 p->pc_count = 0;
3598 }
3599
3600 p->count += 1;
3601 if (!must_be_dyn_reloc (info, r_type))
3602 p->pc_count += 1;
3603 }
3604
3605 break;
3606 }
3607 }
3608
3609 return TRUE;
3610 }
3611 \f
3612
3613 /* Merge object attributes from IBFD into OBFD. Raise an error if
3614 there are conflicting attributes. */
3615 static bfd_boolean
3616 ppc_elf_merge_obj_attributes (bfd *ibfd, bfd *obfd)
3617 {
3618 obj_attribute *in_attr, *in_attrs;
3619 obj_attribute *out_attr, *out_attrs;
3620
3621 if (!elf_known_obj_attributes_proc (obfd)[0].i)
3622 {
3623 /* This is the first object. Copy the attributes. */
3624 _bfd_elf_copy_obj_attributes (ibfd, obfd);
3625
3626 /* Use the Tag_null value to indicate the attributes have been
3627 initialized. */
3628 elf_known_obj_attributes_proc (obfd)[0].i = 1;
3629
3630 return TRUE;
3631 }
3632
3633 in_attrs = elf_known_obj_attributes (ibfd)[OBJ_ATTR_GNU];
3634 out_attrs = elf_known_obj_attributes (obfd)[OBJ_ATTR_GNU];
3635
3636 /* Check for conflicting Tag_GNU_Power_ABI_FP attributes and merge
3637 non-conflicting ones. */
3638 in_attr = &in_attrs[Tag_GNU_Power_ABI_FP];
3639 out_attr = &out_attrs[Tag_GNU_Power_ABI_FP];
3640 if (in_attr->i != out_attr->i)
3641 {
3642 out_attr->type = 1;
3643 if (out_attr->i == 0)
3644 out_attr->i = in_attr->i;
3645 else if (in_attr->i == 0)
3646 ;
3647 else if (out_attr->i == 1 && in_attr->i == 2)
3648 _bfd_error_handler
3649 (_("Warning: %B uses hard float, %B uses soft float"), obfd, ibfd);
3650 else if (out_attr->i == 2 && in_attr->i == 1)
3651 _bfd_error_handler
3652 (_("Warning: %B uses hard float, %B uses soft float"), ibfd, obfd);
3653 else if (in_attr->i > 2)
3654 _bfd_error_handler
3655 (_("Warning: %B uses unknown floating point ABI %d"), ibfd,
3656 in_attr->i);
3657 else
3658 _bfd_error_handler
3659 (_("Warning: %B uses unknown floating point ABI %d"), obfd,
3660 out_attr->i);
3661 }
3662
3663 /* Check for conflicting Tag_GNU_Power_ABI_Vector attributes and
3664 merge non-conflicting ones. */
3665 in_attr = &in_attrs[Tag_GNU_Power_ABI_Vector];
3666 out_attr = &out_attrs[Tag_GNU_Power_ABI_Vector];
3667 if (in_attr->i != out_attr->i)
3668 {
3669 const char *in_abi = NULL, *out_abi = NULL;
3670
3671 switch (in_attr->i)
3672 {
3673 case 1: in_abi = "generic"; break;
3674 case 2: in_abi = "AltiVec"; break;
3675 case 3: in_abi = "SPE"; break;
3676 }
3677
3678 switch (out_attr->i)
3679 {
3680 case 1: out_abi = "generic"; break;
3681 case 2: out_abi = "AltiVec"; break;
3682 case 3: out_abi = "SPE"; break;
3683 }
3684
3685 out_attr->type = 1;
3686 if (out_attr->i == 0)
3687 out_attr->i = in_attr->i;
3688 else if (in_attr->i == 0)
3689 ;
3690 /* For now, allow generic to transition to AltiVec or SPE
3691 without a warning. If GCC marked files with their stack
3692 alignment and used don't-care markings for files which are
3693 not affected by the vector ABI, we could warn about this
3694 case too. */
3695 else if (out_attr->i == 1)
3696 out_attr->i = in_attr->i;
3697 else if (in_attr->i == 1)
3698 ;
3699 else if (in_abi == NULL)
3700 _bfd_error_handler
3701 (_("Warning: %B uses unknown vector ABI %d"), ibfd,
3702 in_attr->i);
3703 else if (out_abi == NULL)
3704 _bfd_error_handler
3705 (_("Warning: %B uses unknown vector ABI %d"), obfd,
3706 in_attr->i);
3707 else
3708 _bfd_error_handler
3709 (_("Warning: %B uses vector ABI \"%s\", %B uses \"%s\""),
3710 ibfd, obfd, in_abi, out_abi);
3711 }
3712
3713 /* Merge Tag_compatibility attributes and any common GNU ones. */
3714 _bfd_elf_merge_object_attributes (ibfd, obfd);
3715
3716 return TRUE;
3717 }
3718
3719 /* Merge backend specific data from an object file to the output
3720 object file when linking. */
3721
3722 static bfd_boolean
3723 ppc_elf_merge_private_bfd_data (bfd *ibfd, bfd *obfd)
3724 {
3725 flagword old_flags;
3726 flagword new_flags;
3727 bfd_boolean error;
3728
3729 if (!is_ppc_elf (ibfd) || !is_ppc_elf (obfd))
3730 return TRUE;
3731
3732 /* Check if we have the same endianess. */
3733 if (! _bfd_generic_verify_endian_match (ibfd, obfd))
3734 return FALSE;
3735
3736 if (!ppc_elf_merge_obj_attributes (ibfd, obfd))
3737 return FALSE;
3738
3739 new_flags = elf_elfheader (ibfd)->e_flags;
3740 old_flags = elf_elfheader (obfd)->e_flags;
3741 if (!elf_flags_init (obfd))
3742 {
3743 /* First call, no flags set. */
3744 elf_flags_init (obfd) = TRUE;
3745 elf_elfheader (obfd)->e_flags = new_flags;
3746 }
3747
3748 /* Compatible flags are ok. */
3749 else if (new_flags == old_flags)
3750 ;
3751
3752 /* Incompatible flags. */
3753 else
3754 {
3755 /* Warn about -mrelocatable mismatch. Allow -mrelocatable-lib
3756 to be linked with either. */
3757 error = FALSE;
3758 if ((new_flags & EF_PPC_RELOCATABLE) != 0
3759 && (old_flags & (EF_PPC_RELOCATABLE | EF_PPC_RELOCATABLE_LIB)) == 0)
3760 {
3761 error = TRUE;
3762 (*_bfd_error_handler)
3763 (_("%B: compiled with -mrelocatable and linked with "
3764 "modules compiled normally"), ibfd);
3765 }
3766 else if ((new_flags & (EF_PPC_RELOCATABLE | EF_PPC_RELOCATABLE_LIB)) == 0
3767 && (old_flags & EF_PPC_RELOCATABLE) != 0)
3768 {
3769 error = TRUE;
3770 (*_bfd_error_handler)
3771 (_("%B: compiled normally and linked with "
3772 "modules compiled with -mrelocatable"), ibfd);
3773 }
3774
3775 /* The output is -mrelocatable-lib iff both the input files are. */
3776 if (! (new_flags & EF_PPC_RELOCATABLE_LIB))
3777 elf_elfheader (obfd)->e_flags &= ~EF_PPC_RELOCATABLE_LIB;
3778
3779 /* The output is -mrelocatable iff it can't be -mrelocatable-lib,
3780 but each input file is either -mrelocatable or -mrelocatable-lib. */
3781 if (! (elf_elfheader (obfd)->e_flags & EF_PPC_RELOCATABLE_LIB)
3782 && (new_flags & (EF_PPC_RELOCATABLE_LIB | EF_PPC_RELOCATABLE))
3783 && (old_flags & (EF_PPC_RELOCATABLE_LIB | EF_PPC_RELOCATABLE)))
3784 elf_elfheader (obfd)->e_flags |= EF_PPC_RELOCATABLE;
3785
3786 /* Do not warn about eabi vs. V.4 mismatch, just or in the bit if
3787 any module uses it. */
3788 elf_elfheader (obfd)->e_flags |= (new_flags & EF_PPC_EMB);
3789
3790 new_flags &= ~(EF_PPC_RELOCATABLE | EF_PPC_RELOCATABLE_LIB | EF_PPC_EMB);
3791 old_flags &= ~(EF_PPC_RELOCATABLE | EF_PPC_RELOCATABLE_LIB | EF_PPC_EMB);
3792
3793 /* Warn about any other mismatches. */
3794 if (new_flags != old_flags)
3795 {
3796 error = TRUE;
3797 (*_bfd_error_handler)
3798 (_("%B: uses different e_flags (0x%lx) fields "
3799 "than previous modules (0x%lx)"),
3800 ibfd, (long) new_flags, (long) old_flags);
3801 }
3802
3803 if (error)
3804 {
3805 bfd_set_error (bfd_error_bad_value);
3806 return FALSE;
3807 }
3808 }
3809
3810 return TRUE;
3811 }
3812 \f
3813 /* Choose which PLT scheme to use, and set .plt flags appropriately.
3814 Returns -1 on error, 0 for old PLT, 1 for new PLT. */
3815 int
3816 ppc_elf_select_plt_layout (bfd *output_bfd ATTRIBUTE_UNUSED,
3817 struct bfd_link_info *info,
3818 enum ppc_elf_plt_type plt_style,
3819 int emit_stub_syms)
3820 {
3821 struct ppc_elf_link_hash_table *htab;
3822 flagword flags;
3823
3824 htab = ppc_elf_hash_table (info);
3825
3826 if (htab->plt_type == PLT_UNSET)
3827 {
3828 if (plt_style == PLT_OLD)
3829 htab->plt_type = PLT_OLD;
3830 else
3831 {
3832 bfd *ibfd;
3833 enum ppc_elf_plt_type plt_type = plt_style;
3834
3835 /* Look through the reloc flags left by ppc_elf_check_relocs.
3836 Use the old style bss plt if a file makes plt calls
3837 without using the new relocs, and if ld isn't given
3838 --secure-plt and we never see REL16 relocs. */
3839 if (plt_type == PLT_UNSET)
3840 plt_type = PLT_OLD;
3841 for (ibfd = info->input_bfds; ibfd; ibfd = ibfd->link_next)
3842 if (is_ppc_elf (ibfd))
3843 {
3844 if (ppc_elf_tdata (ibfd)->has_rel16)
3845 plt_type = PLT_NEW;
3846 else if (ppc_elf_tdata (ibfd)->makes_plt_call)
3847 {
3848 plt_type = PLT_OLD;
3849 htab->old_bfd = ibfd;
3850 break;
3851 }
3852 }
3853 htab->plt_type = plt_type;
3854 }
3855 }
3856 if (htab->plt_type == PLT_OLD && plt_style == PLT_NEW)
3857 info->callbacks->info (_("Using bss-plt due to %B"), htab->old_bfd);
3858
3859 htab->emit_stub_syms = emit_stub_syms;
3860
3861 BFD_ASSERT (htab->plt_type != PLT_VXWORKS);
3862
3863 if (htab->plt_type == PLT_NEW)
3864 {
3865 flags = (SEC_ALLOC | SEC_LOAD | SEC_HAS_CONTENTS
3866 | SEC_IN_MEMORY | SEC_LINKER_CREATED);
3867
3868 /* The new PLT is a loaded section. */
3869 if (htab->plt != NULL
3870 && !bfd_set_section_flags (htab->elf.dynobj, htab->plt, flags))
3871 return -1;
3872
3873 /* The new GOT is not executable. */
3874 if (htab->got != NULL
3875 && !bfd_set_section_flags (htab->elf.dynobj, htab->got, flags))
3876 return -1;
3877 }
3878 else
3879 {
3880 /* Stop an unused .glink section from affecting .text alignment. */
3881 if (htab->glink != NULL
3882 && !bfd_set_section_alignment (htab->elf.dynobj, htab->glink, 0))
3883 return -1;
3884 }
3885 return htab->plt_type == PLT_NEW;
3886 }
3887 \f
3888 /* Return the section that should be marked against GC for a given
3889 relocation. */
3890
3891 static asection *
3892 ppc_elf_gc_mark_hook (asection *sec,
3893 struct bfd_link_info *info,
3894 Elf_Internal_Rela *rel,
3895 struct elf_link_hash_entry *h,
3896 Elf_Internal_Sym *sym)
3897 {
3898 if (h != NULL)
3899 switch (ELF32_R_TYPE (rel->r_info))
3900 {
3901 case R_PPC_GNU_VTINHERIT:
3902 case R_PPC_GNU_VTENTRY:
3903 return NULL;
3904 }
3905
3906 return _bfd_elf_gc_mark_hook (sec, info, rel, h, sym);
3907 }
3908
3909 /* Update the got, plt and dynamic reloc reference counts for the
3910 section being removed. */
3911
3912 static bfd_boolean
3913 ppc_elf_gc_sweep_hook (bfd *abfd,
3914 struct bfd_link_info *info,
3915 asection *sec,
3916 const Elf_Internal_Rela *relocs)
3917 {
3918 struct ppc_elf_link_hash_table *htab;
3919 Elf_Internal_Shdr *symtab_hdr;
3920 struct elf_link_hash_entry **sym_hashes;
3921 bfd_signed_vma *local_got_refcounts;
3922 const Elf_Internal_Rela *rel, *relend;
3923 asection *got2;
3924
3925 if (info->relocatable)
3926 return TRUE;
3927
3928 if ((sec->flags & SEC_ALLOC) == 0)
3929 return TRUE;
3930
3931 elf_section_data (sec)->local_dynrel = NULL;
3932
3933 htab = ppc_elf_hash_table (info);
3934 symtab_hdr = &elf_symtab_hdr (abfd);
3935 sym_hashes = elf_sym_hashes (abfd);
3936 local_got_refcounts = elf_local_got_refcounts (abfd);
3937 got2 = bfd_get_section_by_name (abfd, ".got2");
3938
3939 relend = relocs + sec->reloc_count;
3940 for (rel = relocs; rel < relend; rel++)
3941 {
3942 unsigned long r_symndx;
3943 enum elf_ppc_reloc_type r_type;
3944 struct elf_link_hash_entry *h = NULL;
3945
3946 r_symndx = ELF32_R_SYM (rel->r_info);
3947 if (r_symndx >= symtab_hdr->sh_info)
3948 {
3949 struct ppc_elf_dyn_relocs **pp, *p;
3950 struct ppc_elf_link_hash_entry *eh;
3951
3952 h = sym_hashes[r_symndx - symtab_hdr->sh_info];
3953 while (h->root.type == bfd_link_hash_indirect
3954 || h->root.type == bfd_link_hash_warning)
3955 h = (struct elf_link_hash_entry *) h->root.u.i.link;
3956 eh = (struct ppc_elf_link_hash_entry *) h;
3957
3958 for (pp = &eh->dyn_relocs; (p = *pp) != NULL; pp = &p->next)
3959 if (p->sec == sec)
3960 {
3961 /* Everything must go for SEC. */
3962 *pp = p->next;
3963 break;
3964 }
3965 }
3966
3967 r_type = ELF32_R_TYPE (rel->r_info);
3968 switch (r_type)
3969 {
3970 case R_PPC_GOT_TLSLD16:
3971 case R_PPC_GOT_TLSLD16_LO:
3972 case R_PPC_GOT_TLSLD16_HI:
3973 case R_PPC_GOT_TLSLD16_HA:
3974 case R_PPC_GOT_TLSGD16:
3975 case R_PPC_GOT_TLSGD16_LO:
3976 case R_PPC_GOT_TLSGD16_HI:
3977 case R_PPC_GOT_TLSGD16_HA:
3978 case R_PPC_GOT_TPREL16:
3979 case R_PPC_GOT_TPREL16_LO:
3980 case R_PPC_GOT_TPREL16_HI:
3981 case R_PPC_GOT_TPREL16_HA:
3982 case R_PPC_GOT_DTPREL16:
3983 case R_PPC_GOT_DTPREL16_LO:
3984 case R_PPC_GOT_DTPREL16_HI:
3985 case R_PPC_GOT_DTPREL16_HA:
3986 case R_PPC_GOT16:
3987 case R_PPC_GOT16_LO:
3988 case R_PPC_GOT16_HI:
3989 case R_PPC_GOT16_HA:
3990 if (h != NULL)
3991 {
3992 if (h->got.refcount > 0)
3993 h->got.refcount--;
3994 }
3995 else if (local_got_refcounts != NULL)
3996 {
3997 if (local_got_refcounts[r_symndx] > 0)
3998 local_got_refcounts[r_symndx]--;
3999 }
4000 break;
4001
4002 case R_PPC_REL24:
4003 case R_PPC_REL14:
4004 case R_PPC_REL14_BRTAKEN:
4005 case R_PPC_REL14_BRNTAKEN:
4006 case R_PPC_REL32:
4007 if (h == NULL || h == htab->elf.hgot)
4008 break;
4009 /* Fall thru */
4010
4011 case R_PPC_ADDR32:
4012 case R_PPC_ADDR24:
4013 case R_PPC_ADDR16:
4014 case R_PPC_ADDR16_LO:
4015 case R_PPC_ADDR16_HI:
4016 case R_PPC_ADDR16_HA:
4017 case R_PPC_ADDR14:
4018 case R_PPC_ADDR14_BRTAKEN:
4019 case R_PPC_ADDR14_BRNTAKEN:
4020 case R_PPC_UADDR32:
4021 case R_PPC_UADDR16:
4022 if (info->shared)
4023 break;
4024
4025 case R_PPC_PLT32:
4026 case R_PPC_PLTREL24:
4027 case R_PPC_PLTREL32:
4028 case R_PPC_PLT16_LO:
4029 case R_PPC_PLT16_HI:
4030 case R_PPC_PLT16_HA:
4031 if (h != NULL)
4032 {
4033 bfd_vma addend = r_type == R_PPC_PLTREL24 ? rel->r_addend : 0;
4034 struct plt_entry *ent = find_plt_ent (h, got2, addend);
4035 if (ent->plt.refcount > 0)
4036 ent->plt.refcount -= 1;
4037 }
4038 break;
4039
4040 default:
4041 break;
4042 }
4043 }
4044 return TRUE;
4045 }
4046 \f
4047 /* Set htab->tls_get_addr and call the generic ELF tls_setup function. */
4048
4049 asection *
4050 ppc_elf_tls_setup (bfd *obfd, struct bfd_link_info *info)
4051 {
4052 struct ppc_elf_link_hash_table *htab;
4053
4054 htab = ppc_elf_hash_table (info);
4055 if (htab->plt_type == PLT_NEW
4056 && htab->plt != NULL
4057 && htab->plt->output_section != NULL)
4058 {
4059 elf_section_type (htab->plt->output_section) = SHT_PROGBITS;
4060 elf_section_flags (htab->plt->output_section) = SHF_ALLOC + SHF_WRITE;
4061 }
4062
4063 htab->tls_get_addr = elf_link_hash_lookup (&htab->elf, "__tls_get_addr",
4064 FALSE, FALSE, TRUE);
4065 return _bfd_elf_tls_setup (obfd, info);
4066 }
4067
4068 /* Run through all the TLS relocs looking for optimization
4069 opportunities. */
4070
4071 bfd_boolean
4072 ppc_elf_tls_optimize (bfd *obfd ATTRIBUTE_UNUSED,
4073 struct bfd_link_info *info)
4074 {
4075 bfd *ibfd;
4076 asection *sec;
4077 struct ppc_elf_link_hash_table *htab;
4078 int pass;
4079
4080 if (info->relocatable || !info->executable)
4081 return TRUE;
4082
4083 htab = ppc_elf_hash_table (info);
4084 /* Make two passes through the relocs. First time check that tls
4085 relocs involved in setting up a tls_get_addr call are indeed
4086 followed by such a call. If they are not, exclude them from
4087 the optimizations done on the second pass. */
4088 for (pass = 0; pass < 2; ++pass)
4089 for (ibfd = info->input_bfds; ibfd != NULL; ibfd = ibfd->link_next)
4090 {
4091 Elf_Internal_Sym *locsyms = NULL;
4092 Elf_Internal_Shdr *symtab_hdr = &elf_symtab_hdr (ibfd);
4093
4094 for (sec = ibfd->sections; sec != NULL; sec = sec->next)
4095 if (sec->has_tls_reloc && !bfd_is_abs_section (sec->output_section))
4096 {
4097 Elf_Internal_Rela *relstart, *rel, *relend;
4098
4099 /* Read the relocations. */
4100 relstart = _bfd_elf_link_read_relocs (ibfd, sec, NULL, NULL,
4101 info->keep_memory);
4102 if (relstart == NULL)
4103 return FALSE;
4104
4105 relend = relstart + sec->reloc_count;
4106 for (rel = relstart; rel < relend; rel++)
4107 {
4108 enum elf_ppc_reloc_type r_type;
4109 unsigned long r_symndx;
4110 struct elf_link_hash_entry *h = NULL;
4111 char *tls_mask;
4112 char tls_set, tls_clear;
4113 bfd_boolean is_local;
4114 int expecting_tls_get_addr;
4115 bfd_signed_vma *got_count;
4116
4117 r_symndx = ELF32_R_SYM (rel->r_info);
4118 if (r_symndx >= symtab_hdr->sh_info)
4119 {
4120 struct elf_link_hash_entry **sym_hashes;
4121
4122 sym_hashes = elf_sym_hashes (ibfd);
4123 h = sym_hashes[r_symndx - symtab_hdr->sh_info];
4124 while (h->root.type == bfd_link_hash_indirect
4125 || h->root.type == bfd_link_hash_warning)
4126 h = (struct elf_link_hash_entry *) h->root.u.i.link;
4127 }
4128
4129 expecting_tls_get_addr = 0;
4130 is_local = FALSE;
4131 if (h == NULL
4132 || !h->def_dynamic)
4133 is_local = TRUE;
4134
4135 r_type = ELF32_R_TYPE (rel->r_info);
4136 switch (r_type)
4137 {
4138 case R_PPC_GOT_TLSLD16:
4139 case R_PPC_GOT_TLSLD16_LO:
4140 expecting_tls_get_addr = 1;
4141 /* Fall thru */
4142
4143 case R_PPC_GOT_TLSLD16_HI:
4144 case R_PPC_GOT_TLSLD16_HA:
4145 /* These relocs should never be against a symbol
4146 defined in a shared lib. Leave them alone if
4147 that turns out to be the case. */
4148 if (!is_local)
4149 continue;
4150
4151 /* LD -> LE */
4152 tls_set = 0;
4153 tls_clear = TLS_LD;
4154 break;
4155
4156 case R_PPC_GOT_TLSGD16:
4157 case R_PPC_GOT_TLSGD16_LO:
4158 expecting_tls_get_addr = 1;
4159 /* Fall thru */
4160
4161 case R_PPC_GOT_TLSGD16_HI:
4162 case R_PPC_GOT_TLSGD16_HA:
4163 if (is_local)
4164 /* GD -> LE */
4165 tls_set = 0;
4166 else
4167 /* GD -> IE */
4168 tls_set = TLS_TLS | TLS_TPRELGD;
4169 tls_clear = TLS_GD;
4170 break;
4171
4172 case R_PPC_GOT_TPREL16:
4173 case R_PPC_GOT_TPREL16_LO:
4174 case R_PPC_GOT_TPREL16_HI:
4175 case R_PPC_GOT_TPREL16_HA:
4176 if (is_local)
4177 {
4178 /* IE -> LE */
4179 tls_set = 0;
4180 tls_clear = TLS_TPREL;
4181 break;
4182 }
4183 else
4184 continue;
4185
4186 default:
4187 continue;
4188 }
4189
4190 if (pass == 0)
4191 {
4192 if (!expecting_tls_get_addr)
4193 continue;
4194
4195 if (rel + 1 < relend)
4196 {
4197 enum elf_ppc_reloc_type r_type2;
4198 unsigned long r_symndx2;
4199 struct elf_link_hash_entry *h2;
4200
4201 /* The next instruction should be a call to
4202 __tls_get_addr. Peek at the reloc to be sure. */
4203 r_type2 = ELF32_R_TYPE (rel[1].r_info);
4204 r_symndx2 = ELF32_R_SYM (rel[1].r_info);
4205 if (r_symndx2 >= symtab_hdr->sh_info
4206 && (r_type2 == R_PPC_REL14
4207 || r_type2 == R_PPC_REL14_BRTAKEN
4208 || r_type2 == R_PPC_REL14_BRNTAKEN
4209 || r_type2 == R_PPC_REL24
4210 || r_type2 == R_PPC_PLTREL24))
4211 {
4212 struct elf_link_hash_entry **sym_hashes;
4213
4214 sym_hashes = elf_sym_hashes (ibfd);
4215 h2 = sym_hashes[r_symndx2 - symtab_hdr->sh_info];
4216 while (h2->root.type == bfd_link_hash_indirect
4217 || h2->root.type == bfd_link_hash_warning)
4218 h2 = ((struct elf_link_hash_entry *)
4219 h2->root.u.i.link);
4220 if (h2 == htab->tls_get_addr)
4221 continue;
4222 }
4223 }
4224
4225 /* Uh oh, we didn't find the expected call. We
4226 could just mark this symbol to exclude it
4227 from tls optimization but it's safer to skip
4228 the entire section. */
4229 sec->has_tls_reloc = 0;
4230 break;
4231 }
4232
4233 if (h != NULL)
4234 {
4235 tls_mask = &ppc_elf_hash_entry (h)->tls_mask;
4236 got_count = &h->got.refcount;
4237 }
4238 else
4239 {
4240 Elf_Internal_Sym *sym;
4241 bfd_signed_vma *lgot_refs;
4242 char *lgot_masks;
4243
4244 if (locsyms == NULL)
4245 {
4246 locsyms = (Elf_Internal_Sym *) symtab_hdr->contents;
4247 if (locsyms == NULL)
4248 locsyms = bfd_elf_get_elf_syms (ibfd, symtab_hdr,
4249 symtab_hdr->sh_info,
4250 0, NULL, NULL, NULL);
4251 if (locsyms == NULL)
4252 {
4253 if (elf_section_data (sec)->relocs != relstart)
4254 free (relstart);
4255 return FALSE;
4256 }
4257 }
4258 sym = locsyms + r_symndx;
4259 lgot_refs = elf_local_got_refcounts (ibfd);
4260 if (lgot_refs == NULL)
4261 abort ();
4262 lgot_masks = (char *) (lgot_refs + symtab_hdr->sh_info);
4263 tls_mask = &lgot_masks[r_symndx];
4264 got_count = &lgot_refs[r_symndx];
4265 }
4266
4267 if (tls_set == 0)
4268 {
4269 /* We managed to get rid of a got entry. */
4270 if (*got_count > 0)
4271 *got_count -= 1;
4272 }
4273
4274 if (expecting_tls_get_addr)
4275 {
4276 struct plt_entry *ent;
4277
4278 ent = find_plt_ent (htab->tls_get_addr, NULL, 0);
4279 if (ent != NULL && ent->plt.refcount > 0)
4280 ent->plt.refcount -= 1;
4281 }
4282
4283 *tls_mask |= tls_set;
4284 *tls_mask &= ~tls_clear;
4285 }
4286
4287 if (elf_section_data (sec)->relocs != relstart)
4288 free (relstart);
4289 }
4290
4291 if (locsyms != NULL
4292 && (symtab_hdr->contents != (unsigned char *) locsyms))
4293 {
4294 if (!info->keep_memory)
4295 free (locsyms);
4296 else
4297 symtab_hdr->contents = (unsigned char *) locsyms;
4298 }
4299 }
4300 return TRUE;
4301 }
4302 \f
4303 /* Return true if we have dynamic relocs that apply to read-only sections. */
4304
4305 static bfd_boolean
4306 readonly_dynrelocs (struct elf_link_hash_entry *h)
4307 {
4308 struct ppc_elf_dyn_relocs *p;
4309
4310 for (p = ppc_elf_hash_entry (h)->dyn_relocs; p != NULL; p = p->next)
4311 {
4312 asection *s = p->sec->output_section;
4313
4314 if (s != NULL
4315 && ((s->flags & (SEC_READONLY | SEC_ALLOC))
4316 == (SEC_READONLY | SEC_ALLOC)))
4317 return TRUE;
4318 }
4319 return FALSE;
4320 }
4321
4322 /* Adjust a symbol defined by a dynamic object and referenced by a
4323 regular object. The current definition is in some section of the
4324 dynamic object, but we're not including those sections. We have to
4325 change the definition to something the rest of the link can
4326 understand. */
4327
4328 static bfd_boolean
4329 ppc_elf_adjust_dynamic_symbol (struct bfd_link_info *info,
4330 struct elf_link_hash_entry *h)
4331 {
4332 struct ppc_elf_link_hash_table *htab;
4333 asection *s;
4334
4335 #ifdef DEBUG
4336 fprintf (stderr, "ppc_elf_adjust_dynamic_symbol called for %s\n",
4337 h->root.root.string);
4338 #endif
4339
4340 /* Make sure we know what is going on here. */
4341 htab = ppc_elf_hash_table (info);
4342 BFD_ASSERT (htab->elf.dynobj != NULL
4343 && (h->needs_plt
4344 || h->u.weakdef != NULL
4345 || (h->def_dynamic
4346 && h->ref_regular
4347 && !h->def_regular)));
4348
4349 /* Deal with function syms. */
4350 if (h->type == STT_FUNC
4351 || h->needs_plt)
4352 {
4353 /* Clear procedure linkage table information for any symbol that
4354 won't need a .plt entry. */
4355 struct plt_entry *ent;
4356 for (ent = h->plt.plist; ent != NULL; ent = ent->next)
4357 if (ent->plt.refcount > 0)
4358 break;
4359 if (ent == NULL
4360 || SYMBOL_CALLS_LOCAL (info, h)
4361 || (ELF_ST_VISIBILITY (h->other) != STV_DEFAULT
4362 && h->root.type == bfd_link_hash_undefweak))
4363 {
4364 /* A PLT entry is not required/allowed when:
4365
4366 1. We are not using ld.so; because then the PLT entry
4367 can't be set up, so we can't use one. In this case,
4368 ppc_elf_adjust_dynamic_symbol won't even be called.
4369
4370 2. GC has rendered the entry unused.
4371
4372 3. We know for certain that a call to this symbol
4373 will go to this object, or will remain undefined. */
4374 h->plt.plist = NULL;
4375 h->needs_plt = 0;
4376 }
4377 else
4378 {
4379 /* After adjust_dynamic_symbol, non_got_ref set means that
4380 dyn_relocs for this symbol should be discarded.
4381 If we get here we know we are making a PLT entry for this
4382 symbol, and in an executable we'd normally resolve
4383 relocations against this symbol to the PLT entry. Allow
4384 dynamic relocs if the reference is weak, and the dynamic
4385 relocs will not cause text relocation. */
4386 if (!h->ref_regular_nonweak
4387 && h->non_got_ref
4388 && !htab->is_vxworks
4389 && !ppc_elf_hash_entry (h)->has_sda_refs
4390 && !readonly_dynrelocs (h))
4391 h->non_got_ref = 0;
4392 }
4393 return TRUE;
4394 }
4395 else
4396 h->plt.plist = NULL;
4397
4398 /* If this is a weak symbol, and there is a real definition, the
4399 processor independent code will have arranged for us to see the
4400 real definition first, and we can just use the same value. */
4401 if (h->u.weakdef != NULL)
4402 {
4403 BFD_ASSERT (h->u.weakdef->root.type == bfd_link_hash_defined
4404 || h->u.weakdef->root.type == bfd_link_hash_defweak);
4405 h->root.u.def.section = h->u.weakdef->root.u.def.section;
4406 h->root.u.def.value = h->u.weakdef->root.u.def.value;
4407 if (ELIMINATE_COPY_RELOCS)
4408 h->non_got_ref = h->u.weakdef->non_got_ref;
4409 return TRUE;
4410 }
4411
4412 /* This is a reference to a symbol defined by a dynamic object which
4413 is not a function. */
4414
4415 /* If we are creating a shared library, we must presume that the
4416 only references to the symbol are via the global offset table.
4417 For such cases we need not do anything here; the relocations will
4418 be handled correctly by relocate_section. */
4419 if (info->shared)
4420 return TRUE;
4421
4422 /* If there are no references to this symbol that do not use the
4423 GOT, we don't need to generate a copy reloc. */
4424 if (!h->non_got_ref)
4425 return TRUE;
4426
4427 /* If we didn't find any dynamic relocs in read-only sections, then
4428 we'll be keeping the dynamic relocs and avoiding the copy reloc.
4429 We can't do this if there are any small data relocations. This
4430 doesn't work on VxWorks, where we can not have dynamic
4431 relocations (other than copy and jump slot relocations) in an
4432 executable. */
4433 if (ELIMINATE_COPY_RELOCS
4434 && !ppc_elf_hash_entry (h)->has_sda_refs
4435 && !htab->is_vxworks
4436 && !h->def_regular
4437 && !readonly_dynrelocs (h))
4438 {
4439 h->non_got_ref = 0;
4440 return TRUE;
4441 }
4442
4443 if (h->size == 0)
4444 {
4445 (*_bfd_error_handler) (_("dynamic variable `%s' is zero size"),
4446 h->root.root.string);
4447 return TRUE;
4448 }
4449
4450 /* We must allocate the symbol in our .dynbss section, which will
4451 become part of the .bss section of the executable. There will be
4452 an entry for this symbol in the .dynsym section. The dynamic
4453 object will contain position independent code, so all references
4454 from the dynamic object to this symbol will go through the global
4455 offset table. The dynamic linker will use the .dynsym entry to
4456 determine the address it must put in the global offset table, so
4457 both the dynamic object and the regular object will refer to the
4458 same memory location for the variable.
4459
4460 Of course, if the symbol is referenced using SDAREL relocs, we
4461 must instead allocate it in .sbss. */
4462
4463 if (ppc_elf_hash_entry (h)->has_sda_refs)
4464 s = htab->dynsbss;
4465 else
4466 s = htab->dynbss;
4467 BFD_ASSERT (s != NULL);
4468
4469 /* We must generate a R_PPC_COPY reloc to tell the dynamic linker to
4470 copy the initial value out of the dynamic object and into the
4471 runtime process image. We need to remember the offset into the
4472 .rela.bss section we are going to use. */
4473 if ((h->root.u.def.section->flags & SEC_ALLOC) != 0)
4474 {
4475 asection *srel;
4476
4477 if (ppc_elf_hash_entry (h)->has_sda_refs)
4478 srel = htab->relsbss;
4479 else
4480 srel = htab->relbss;
4481 BFD_ASSERT (srel != NULL);
4482 srel->size += sizeof (Elf32_External_Rela);
4483 h->needs_copy = 1;
4484 }
4485
4486 return _bfd_elf_adjust_dynamic_copy (h, s);
4487 }
4488 \f
4489 /* Generate a symbol to mark plt call stubs. For non-PIC code the sym is
4490 xxxxxxxx.plt_call32.<callee> where xxxxxxxx is a hex number, usually 0,
4491 specifying the addend on the plt relocation. For -fpic code, the sym
4492 is xxxxxxxx.plt_pic32.<callee>, and for -fPIC
4493 xxxxxxxx.got2.plt_pic32.<callee>. */
4494
4495 static bfd_boolean
4496 add_stub_sym (struct plt_entry *ent,
4497 struct elf_link_hash_entry *h,
4498 struct bfd_link_info *info)
4499 {
4500 struct elf_link_hash_entry *sh;
4501 size_t len1, len2, len3;
4502 char *name;
4503 const char *stub;
4504 struct ppc_elf_link_hash_table *htab = ppc_elf_hash_table (info);
4505
4506 if (info->shared || info->pie)
4507 stub = ".plt_pic32.";
4508 else
4509 stub = ".plt_call32.";
4510
4511 len1 = strlen (h->root.root.string);
4512 len2 = strlen (stub);
4513 len3 = 0;
4514 if (ent->sec)
4515 len3 = strlen (ent->sec->name);
4516 name = bfd_malloc (len1 + len2 + len3 + 9);
4517 if (name == NULL)
4518 return FALSE;
4519 sprintf (name, "%08x", (unsigned) ent->addend & 0xffffffff);
4520 if (ent->sec)
4521 memcpy (name + 8, ent->sec->name, len3);
4522 memcpy (name + 8 + len3, stub, len2);
4523 memcpy (name + 8 + len3 + len2, h->root.root.string, len1 + 1);
4524 sh = elf_link_hash_lookup (&htab->elf, name, TRUE, FALSE, FALSE);
4525 if (sh == NULL)
4526 return FALSE;
4527 if (sh->root.type == bfd_link_hash_new)
4528 {
4529 sh->root.type = bfd_link_hash_defined;
4530 sh->root.u.def.section = htab->glink;
4531 sh->root.u.def.value = ent->glink_offset;
4532 sh->ref_regular = 1;
4533 sh->def_regular = 1;
4534 sh->ref_regular_nonweak = 1;
4535 sh->forced_local = 1;
4536 sh->non_elf = 0;
4537 }
4538 return TRUE;
4539 }
4540
4541 /* Allocate NEED contiguous space in .got, and return the offset.
4542 Handles allocation of the got header when crossing 32k. */
4543
4544 static bfd_vma
4545 allocate_got (struct ppc_elf_link_hash_table *htab, unsigned int need)
4546 {
4547 bfd_vma where;
4548 unsigned int max_before_header;
4549
4550 if (htab->plt_type == PLT_VXWORKS)
4551 {
4552 where = htab->got->size;
4553 htab->got->size += need;
4554 }
4555 else
4556 {
4557 max_before_header = htab->plt_type == PLT_NEW ? 32768 : 32764;
4558 if (need <= htab->got_gap)
4559 {
4560 where = max_before_header - htab->got_gap;
4561 htab->got_gap -= need;
4562 }
4563 else
4564 {
4565 if (htab->got->size + need > max_before_header
4566 && htab->got->size <= max_before_header)
4567 {
4568 htab->got_gap = max_before_header - htab->got->size;
4569 htab->got->size = max_before_header + htab->got_header_size;
4570 }
4571 where = htab->got->size;
4572 htab->got->size += need;
4573 }
4574 }
4575 return where;
4576 }
4577
4578 /* Allocate space in associated reloc sections for dynamic relocs. */
4579
4580 static bfd_boolean
4581 allocate_dynrelocs (struct elf_link_hash_entry *h, void *inf)
4582 {
4583 struct bfd_link_info *info = inf;
4584 struct ppc_elf_link_hash_entry *eh;
4585 struct ppc_elf_link_hash_table *htab;
4586 struct ppc_elf_dyn_relocs *p;
4587
4588 if (h->root.type == bfd_link_hash_indirect)
4589 return TRUE;
4590
4591 if (h->root.type == bfd_link_hash_warning)
4592 /* When warning symbols are created, they **replace** the "real"
4593 entry in the hash table, thus we never get to see the real
4594 symbol in a hash traversal. So look at it now. */
4595 h = (struct elf_link_hash_entry *) h->root.u.i.link;
4596
4597 htab = ppc_elf_hash_table (info);
4598 if (htab->elf.dynamic_sections_created)
4599 {
4600 struct plt_entry *ent;
4601 bfd_boolean doneone = FALSE;
4602 bfd_vma plt_offset = 0, glink_offset = 0;
4603
4604 for (ent = h->plt.plist; ent != NULL; ent = ent->next)
4605 if (ent->plt.refcount > 0)
4606 {
4607 /* Make sure this symbol is output as a dynamic symbol. */
4608 if (h->dynindx == -1
4609 && !h->forced_local)
4610 {
4611 if (! bfd_elf_link_record_dynamic_symbol (info, h))
4612 return FALSE;
4613 }
4614
4615 if (info->shared
4616 || WILL_CALL_FINISH_DYNAMIC_SYMBOL (1, 0, h))
4617 {
4618 asection *s = htab->plt;
4619
4620 if (htab->plt_type == PLT_NEW)
4621 {
4622 if (!doneone)
4623 {
4624 plt_offset = s->size;
4625 s->size += 4;
4626 }
4627 ent->plt.offset = plt_offset;
4628
4629 s = htab->glink;
4630 if (!doneone || info->shared || info->pie)
4631 {
4632 glink_offset = s->size;
4633 s->size += GLINK_ENTRY_SIZE;
4634 }
4635 if (!doneone
4636 && !info->shared
4637 && h->def_dynamic
4638 && !h->def_regular)
4639 {
4640 h->root.u.def.section = s;
4641 h->root.u.def.value = glink_offset;
4642 }
4643 ent->glink_offset = glink_offset;
4644
4645 if (htab->emit_stub_syms
4646 && !add_stub_sym (ent, h, info))
4647 return FALSE;
4648 }
4649 else
4650 {
4651 if (!doneone)
4652 {
4653 /* If this is the first .plt entry, make room
4654 for the special first entry. */
4655 if (s->size == 0)
4656 s->size += htab->plt_initial_entry_size;
4657
4658 /* The PowerPC PLT is actually composed of two
4659 parts, the first part is 2 words (for a load
4660 and a jump), and then there is a remaining
4661 word available at the end. */
4662 plt_offset = (htab->plt_initial_entry_size
4663 + (htab->plt_slot_size
4664 * ((s->size
4665 - htab->plt_initial_entry_size)
4666 / htab->plt_entry_size)));
4667
4668 /* If this symbol is not defined in a regular
4669 file, and we are not generating a shared
4670 library, then set the symbol to this location
4671 in the .plt. This is required to make
4672 function pointers compare as equal between
4673 the normal executable and the shared library. */
4674 if (! info->shared
4675 && h->def_dynamic
4676 && !h->def_regular)
4677 {
4678 h->root.u.def.section = s;
4679 h->root.u.def.value = plt_offset;
4680 }
4681
4682 /* Make room for this entry. */
4683 s->size += htab->plt_entry_size;
4684 /* After the 8192nd entry, room for two entries
4685 is allocated. */
4686 if (htab->plt_type == PLT_OLD
4687 && (s->size - htab->plt_initial_entry_size)
4688 / htab->plt_entry_size
4689 > PLT_NUM_SINGLE_ENTRIES)
4690 s->size += htab->plt_entry_size;
4691 }
4692 ent->plt.offset = plt_offset;
4693 }
4694
4695 /* We also need to make an entry in the .rela.plt section. */
4696 if (!doneone)
4697 {
4698 htab->relplt->size += sizeof (Elf32_External_Rela);
4699
4700 if (htab->plt_type == PLT_VXWORKS)
4701 {
4702 /* Allocate space for the unloaded relocations. */
4703 if (!info->shared)
4704 {
4705 if (ent->plt.offset
4706 == (bfd_vma) htab->plt_initial_entry_size)
4707 {
4708 htab->srelplt2->size
4709 += sizeof (Elf32_External_Rela)
4710 * VXWORKS_PLTRESOLVE_RELOCS;
4711 }
4712
4713 htab->srelplt2->size
4714 += sizeof (Elf32_External_Rela)
4715 * VXWORKS_PLT_NON_JMP_SLOT_RELOCS;
4716 }
4717
4718 /* Every PLT entry has an associated GOT entry in
4719 .got.plt. */
4720 htab->sgotplt->size += 4;
4721 }
4722 doneone = TRUE;
4723 }
4724 }
4725 else
4726 ent->plt.offset = (bfd_vma) -1;
4727 }
4728 else
4729 ent->plt.offset = (bfd_vma) -1;
4730
4731 if (!doneone)
4732 {
4733 h->plt.plist = NULL;
4734 h->needs_plt = 0;
4735 }
4736 }
4737 else
4738 {
4739 h->plt.plist = NULL;
4740 h->needs_plt = 0;
4741 }
4742
4743 eh = (struct ppc_elf_link_hash_entry *) h;
4744 if (eh->elf.got.refcount > 0)
4745 {
4746 /* Make sure this symbol is output as a dynamic symbol. */
4747 if (eh->elf.dynindx == -1
4748 && !eh->elf.forced_local)
4749 {
4750 if (!bfd_elf_link_record_dynamic_symbol (info, &eh->elf))
4751 return FALSE;
4752 }
4753
4754 if (eh->tls_mask == (TLS_TLS | TLS_LD)
4755 && !eh->elf.def_dynamic)
4756 {
4757 /* If just an LD reloc, we'll just use htab->tlsld_got.offset. */
4758 htab->tlsld_got.refcount += 1;
4759 eh->elf.got.offset = (bfd_vma) -1;
4760 }
4761 else
4762 {
4763 bfd_boolean dyn;
4764 unsigned int need = 0;
4765 if ((eh->tls_mask & TLS_TLS) != 0)
4766 {
4767 if ((eh->tls_mask & TLS_LD) != 0)
4768 need += 8;
4769 if ((eh->tls_mask & TLS_GD) != 0)
4770 need += 8;
4771 if ((eh->tls_mask & (TLS_TPREL | TLS_TPRELGD)) != 0)
4772 need += 4;
4773 if ((eh->tls_mask & TLS_DTPREL) != 0)
4774 need += 4;
4775 }
4776 else
4777 need += 4;
4778 eh->elf.got.offset = allocate_got (htab, need);
4779 dyn = htab->elf.dynamic_sections_created;
4780 if ((info->shared
4781 || WILL_CALL_FINISH_DYNAMIC_SYMBOL (dyn, 0, &eh->elf))
4782 && (ELF_ST_VISIBILITY (eh->elf.other) == STV_DEFAULT
4783 || eh->elf.root.type != bfd_link_hash_undefweak))
4784 {
4785 /* All the entries we allocated need relocs.
4786 Except LD only needs one. */
4787 if ((eh->tls_mask & TLS_LD) != 0)
4788 need -= 4;
4789 htab->relgot->size += need * (sizeof (Elf32_External_Rela) / 4);
4790 }
4791 }
4792 }
4793 else
4794 eh->elf.got.offset = (bfd_vma) -1;
4795
4796 if (eh->dyn_relocs == NULL)
4797 return TRUE;
4798
4799 /* In the shared -Bsymbolic case, discard space allocated for
4800 dynamic pc-relative relocs against symbols which turn out to be
4801 defined in regular objects. For the normal shared case, discard
4802 space for relocs that have become local due to symbol visibility
4803 changes. */
4804
4805 if (info->shared)
4806 {
4807 /* Relocs that use pc_count are those that appear on a call insn,
4808 or certain REL relocs (see must_be_dyn_reloc) that can be
4809 generated via assembly. We want calls to protected symbols to
4810 resolve directly to the function rather than going via the plt.
4811 If people want function pointer comparisons to work as expected
4812 then they should avoid writing weird assembly. */
4813 if (SYMBOL_CALLS_LOCAL (info, h))
4814 {
4815 struct ppc_elf_dyn_relocs **pp;
4816
4817 for (pp = &eh->dyn_relocs; (p = *pp) != NULL; )
4818 {
4819 p->count -= p->pc_count;
4820 p->pc_count = 0;
4821 if (p->count == 0)
4822 *pp = p->next;
4823 else
4824 pp = &p->next;
4825 }
4826 }
4827
4828 if (htab->is_vxworks)
4829 {
4830 struct ppc_elf_dyn_relocs **pp;
4831
4832 for (pp = &eh->dyn_relocs; (p = *pp) != NULL; )
4833 {
4834 if (strcmp (p->sec->output_section->name, ".tls_vars") == 0)
4835 *pp = p->next;
4836 else
4837 pp = &p->next;
4838 }
4839 }
4840
4841 /* Discard relocs on undefined symbols that must be local. */
4842 if (eh->dyn_relocs != NULL
4843 && h->root.type == bfd_link_hash_undefined
4844 && (ELF_ST_VISIBILITY (h->other) == STV_HIDDEN
4845 || ELF_ST_VISIBILITY (h->other) == STV_INTERNAL))
4846 eh->dyn_relocs = NULL;
4847
4848 /* Also discard relocs on undefined weak syms with non-default
4849 visibility. */
4850 if (eh->dyn_relocs != NULL
4851 && h->root.type == bfd_link_hash_undefweak)
4852 {
4853 if (ELF_ST_VISIBILITY (h->other) != STV_DEFAULT)
4854 eh->dyn_relocs = NULL;
4855
4856 /* Make sure undefined weak symbols are output as a dynamic
4857 symbol in PIEs. */
4858 else if (h->dynindx == -1
4859 && !h->forced_local)
4860 {
4861 if (! bfd_elf_link_record_dynamic_symbol (info, h))
4862 return FALSE;
4863 }
4864 }
4865 }
4866 else if (ELIMINATE_COPY_RELOCS)
4867 {
4868 /* For the non-shared case, discard space for relocs against
4869 symbols which turn out to need copy relocs or are not
4870 dynamic. */
4871
4872 if (!h->non_got_ref
4873 && !h->def_regular)
4874 {
4875 /* Make sure this symbol is output as a dynamic symbol.
4876 Undefined weak syms won't yet be marked as dynamic. */
4877 if (h->dynindx == -1
4878 && !h->forced_local)
4879 {
4880 if (! bfd_elf_link_record_dynamic_symbol (info, h))
4881 return FALSE;
4882 }
4883
4884 /* If that succeeded, we know we'll be keeping all the
4885 relocs. */
4886 if (h->dynindx != -1)
4887 goto keep;
4888 }
4889
4890 eh->dyn_relocs = NULL;
4891
4892 keep: ;
4893 }
4894
4895 /* Finally, allocate space. */
4896 for (p = eh->dyn_relocs; p != NULL; p = p->next)
4897 {
4898 asection *sreloc = elf_section_data (p->sec)->sreloc;
4899 sreloc->size += p->count * sizeof (Elf32_External_Rela);
4900 }
4901
4902 return TRUE;
4903 }
4904
4905 /* Set DF_TEXTREL if we find any dynamic relocs that apply to
4906 read-only sections. */
4907
4908 static bfd_boolean
4909 maybe_set_textrel (struct elf_link_hash_entry *h, void *info)
4910 {
4911 if (h->root.type == bfd_link_hash_indirect)
4912 return TRUE;
4913
4914 if (h->root.type == bfd_link_hash_warning)
4915 h = (struct elf_link_hash_entry *) h->root.u.i.link;
4916
4917 if (readonly_dynrelocs (h))
4918 {
4919 ((struct bfd_link_info *) info)->flags |= DF_TEXTREL;
4920
4921 /* Not an error, just cut short the traversal. */
4922 return FALSE;
4923 }
4924 return TRUE;
4925 }
4926
4927 /* Set the sizes of the dynamic sections. */
4928
4929 static bfd_boolean
4930 ppc_elf_size_dynamic_sections (bfd *output_bfd ATTRIBUTE_UNUSED,
4931 struct bfd_link_info *info)
4932 {
4933 struct ppc_elf_link_hash_table *htab;
4934 asection *s;
4935 bfd_boolean relocs;
4936 bfd *ibfd;
4937
4938 #ifdef DEBUG
4939 fprintf (stderr, "ppc_elf_size_dynamic_sections called\n");
4940 #endif
4941
4942 htab = ppc_elf_hash_table (info);
4943 BFD_ASSERT (htab->elf.dynobj != NULL);
4944
4945 if (elf_hash_table (info)->dynamic_sections_created)
4946 {
4947 /* Set the contents of the .interp section to the interpreter. */
4948 if (info->executable)
4949 {
4950 s = bfd_get_section_by_name (htab->elf.dynobj, ".interp");
4951 BFD_ASSERT (s != NULL);
4952 s->size = sizeof ELF_DYNAMIC_INTERPRETER;
4953 s->contents = (unsigned char *) ELF_DYNAMIC_INTERPRETER;
4954 }
4955 }
4956
4957 if (htab->plt_type == PLT_OLD)
4958 htab->got_header_size = 16;
4959 else if (htab->plt_type == PLT_NEW)
4960 htab->got_header_size = 12;
4961
4962 /* Set up .got offsets for local syms, and space for local dynamic
4963 relocs. */
4964 for (ibfd = info->input_bfds; ibfd != NULL; ibfd = ibfd->link_next)
4965 {
4966 bfd_signed_vma *local_got;
4967 bfd_signed_vma *end_local_got;
4968 char *lgot_masks;
4969 bfd_size_type locsymcount;
4970 Elf_Internal_Shdr *symtab_hdr;
4971
4972 if (!is_ppc_elf (ibfd))
4973 continue;
4974
4975 for (s = ibfd->sections; s != NULL; s = s->next)
4976 {
4977 struct ppc_elf_dyn_relocs *p;
4978
4979 for (p = ((struct ppc_elf_dyn_relocs *)
4980 elf_section_data (s)->local_dynrel);
4981 p != NULL;
4982 p = p->next)
4983 {
4984 if (!bfd_is_abs_section (p->sec)
4985 && bfd_is_abs_section (p->sec->output_section))
4986 {
4987 /* Input section has been discarded, either because
4988 it is a copy of a linkonce section or due to
4989 linker script /DISCARD/, so we'll be discarding
4990 the relocs too. */
4991 }
4992 else if (htab->is_vxworks
4993 && strcmp (p->sec->output_section->name,
4994 ".tls_vars") == 0)
4995 {
4996 /* Relocations in vxworks .tls_vars sections are
4997 handled specially by the loader. */
4998 }
4999 else if (p->count != 0)
5000 {
5001 elf_section_data (p->sec)->sreloc->size
5002 += p->count * sizeof (Elf32_External_Rela);
5003 if ((p->sec->output_section->flags
5004 & (SEC_READONLY | SEC_ALLOC))
5005 == (SEC_READONLY | SEC_ALLOC))
5006 info->flags |= DF_TEXTREL;
5007 }
5008 }
5009 }
5010
5011 local_got = elf_local_got_refcounts (ibfd);
5012 if (!local_got)
5013 continue;
5014
5015 symtab_hdr = &elf_symtab_hdr (ibfd);
5016 locsymcount = symtab_hdr->sh_info;
5017 end_local_got = local_got + locsymcount;
5018 lgot_masks = (char *) end_local_got;
5019 for (; local_got < end_local_got; ++local_got, ++lgot_masks)
5020 if (*local_got > 0)
5021 {
5022 if (*lgot_masks == (TLS_TLS | TLS_LD))
5023 {
5024 /* If just an LD reloc, we'll just use
5025 htab->tlsld_got.offset. */
5026 htab->tlsld_got.refcount += 1;
5027 *local_got = (bfd_vma) -1;
5028 }
5029 else
5030 {
5031 unsigned int need = 0;
5032 if ((*lgot_masks & TLS_TLS) != 0)
5033 {
5034 if ((*lgot_masks & TLS_GD) != 0)
5035 need += 8;
5036 if ((*lgot_masks & (TLS_TPREL | TLS_TPRELGD)) != 0)
5037 need += 4;
5038 if ((*lgot_masks & TLS_DTPREL) != 0)
5039 need += 4;
5040 }
5041 else
5042 need += 4;
5043 *local_got = allocate_got (htab, need);
5044 if (info->shared)
5045 htab->relgot->size += (need
5046 * (sizeof (Elf32_External_Rela) / 4));
5047 }
5048 }
5049 else
5050 *local_got = (bfd_vma) -1;
5051 }
5052
5053 /* Allocate space for global sym dynamic relocs. */
5054 elf_link_hash_traverse (elf_hash_table (info), allocate_dynrelocs, info);
5055
5056 if (htab->tlsld_got.refcount > 0)
5057 {
5058 htab->tlsld_got.offset = allocate_got (htab, 8);
5059 if (info->shared)
5060 htab->relgot->size += sizeof (Elf32_External_Rela);
5061 }
5062 else
5063 htab->tlsld_got.offset = (bfd_vma) -1;
5064
5065 if (htab->got != NULL && htab->plt_type != PLT_VXWORKS)
5066 {
5067 unsigned int g_o_t = 32768;
5068
5069 /* If we haven't allocated the header, do so now. When we get here,
5070 for old plt/got the got size will be 0 to 32764 (not allocated),
5071 or 32780 to 65536 (header allocated). For new plt/got, the
5072 corresponding ranges are 0 to 32768 and 32780 to 65536. */
5073 if (htab->got->size <= 32768)
5074 {
5075 g_o_t = htab->got->size;
5076 if (htab->plt_type == PLT_OLD)
5077 g_o_t += 4;
5078 htab->got->size += htab->got_header_size;
5079 }
5080
5081 htab->elf.hgot->root.u.def.value = g_o_t;
5082 }
5083
5084 if (htab->glink != NULL && htab->glink->size != 0)
5085 {
5086 htab->glink_pltresolve = htab->glink->size;
5087 /* Space for the branch table. */
5088 htab->glink->size += htab->glink->size / (GLINK_ENTRY_SIZE / 4) - 4;
5089 /* Pad out to align the start of PLTresolve. */
5090 htab->glink->size += -htab->glink->size & 15;
5091 htab->glink->size += GLINK_PLTRESOLVE;
5092
5093 if (htab->emit_stub_syms)
5094 {
5095 struct elf_link_hash_entry *sh;
5096 sh = elf_link_hash_lookup (&htab->elf, "__glink",
5097 TRUE, FALSE, FALSE);
5098 if (sh == NULL)
5099 return FALSE;
5100 if (sh->root.type == bfd_link_hash_new)
5101 {
5102 sh->root.type = bfd_link_hash_defined;
5103 sh->root.u.def.section = htab->glink;
5104 sh->root.u.def.value = htab->glink_pltresolve;
5105 sh->ref_regular = 1;
5106 sh->def_regular = 1;
5107 sh->ref_regular_nonweak = 1;
5108 sh->forced_local = 1;
5109 sh->non_elf = 0;
5110 }
5111 sh = elf_link_hash_lookup (&htab->elf, "__glink_PLTresolve",
5112 TRUE, FALSE, FALSE);
5113 if (sh == NULL)
5114 return FALSE;
5115 if (sh->root.type == bfd_link_hash_new)
5116 {
5117 sh->root.type = bfd_link_hash_defined;
5118 sh->root.u.def.section = htab->glink;
5119 sh->root.u.def.value = htab->glink->size - GLINK_PLTRESOLVE;
5120 sh->ref_regular = 1;
5121 sh->def_regular = 1;
5122 sh->ref_regular_nonweak = 1;
5123 sh->forced_local = 1;
5124 sh->non_elf = 0;
5125 }
5126 }
5127 }
5128
5129 /* We've now determined the sizes of the various dynamic sections.
5130 Allocate memory for them. */
5131 relocs = FALSE;
5132 for (s = htab->elf.dynobj->sections; s != NULL; s = s->next)
5133 {
5134 bfd_boolean strip_section = TRUE;
5135
5136 if ((s->flags & SEC_LINKER_CREATED) == 0)
5137 continue;
5138
5139 if (s == htab->plt
5140 || s == htab->glink
5141 || s == htab->got
5142 || s == htab->sgotplt
5143 || s == htab->sbss
5144 || s == htab->dynbss
5145 || s == htab->dynsbss)
5146 {
5147 /* We'd like to strip these sections if they aren't needed, but if
5148 we've exported dynamic symbols from them we must leave them.
5149 It's too late to tell BFD to get rid of the symbols. */
5150 if ((s == htab->plt || s == htab->got) && htab->elf.hplt != NULL)
5151 strip_section = FALSE;
5152 /* Strip this section if we don't need it; see the
5153 comment below. */
5154 }
5155 else if (s == htab->sdata[0].section
5156 || s == htab->sdata[1].section)
5157 {
5158 /* Strip these too. */
5159 }
5160 else if (CONST_STRNEQ (bfd_get_section_name (dynobj, s), ".rela"))
5161 {
5162 if (s->size != 0)
5163 {
5164 /* Remember whether there are any relocation sections. */
5165 relocs = TRUE;
5166
5167 /* We use the reloc_count field as a counter if we need
5168 to copy relocs into the output file. */
5169 s->reloc_count = 0;
5170 }
5171 }
5172 else
5173 {
5174 /* It's not one of our sections, so don't allocate space. */
5175 continue;
5176 }
5177
5178 if (s->size == 0 && strip_section)
5179 {
5180 /* If we don't need this section, strip it from the
5181 output file. This is mostly to handle .rela.bss and
5182 .rela.plt. We must create both sections in
5183 create_dynamic_sections, because they must be created
5184 before the linker maps input sections to output
5185 sections. The linker does that before
5186 adjust_dynamic_symbol is called, and it is that
5187 function which decides whether anything needs to go
5188 into these sections. */
5189 s->flags |= SEC_EXCLUDE;
5190 continue;
5191 }
5192
5193 if ((s->flags & SEC_HAS_CONTENTS) == 0)
5194 continue;
5195
5196 /* Allocate memory for the section contents. */
5197 s->contents = bfd_zalloc (htab->elf.dynobj, s->size);
5198 if (s->contents == NULL)
5199 return FALSE;
5200 }
5201
5202 if (htab->elf.dynamic_sections_created)
5203 {
5204 /* Add some entries to the .dynamic section. We fill in the
5205 values later, in ppc_elf_finish_dynamic_sections, but we
5206 must add the entries now so that we get the correct size for
5207 the .dynamic section. The DT_DEBUG entry is filled in by the
5208 dynamic linker and used by the debugger. */
5209 #define add_dynamic_entry(TAG, VAL) \
5210 _bfd_elf_add_dynamic_entry (info, TAG, VAL)
5211
5212 if (info->executable)
5213 {
5214 if (!add_dynamic_entry (DT_DEBUG, 0))
5215 return FALSE;
5216 }
5217
5218 if (htab->plt != NULL && htab->plt->size != 0)
5219 {
5220 if (!add_dynamic_entry (DT_PLTGOT, 0)
5221 || !add_dynamic_entry (DT_PLTRELSZ, 0)
5222 || !add_dynamic_entry (DT_PLTREL, DT_RELA)
5223 || !add_dynamic_entry (DT_JMPREL, 0))
5224 return FALSE;
5225 }
5226
5227 if (htab->glink != NULL && htab->glink->size != 0)
5228 {
5229 if (!add_dynamic_entry (DT_PPC_GOT, 0))
5230 return FALSE;
5231 }
5232
5233 if (relocs)
5234 {
5235 if (!add_dynamic_entry (DT_RELA, 0)
5236 || !add_dynamic_entry (DT_RELASZ, 0)
5237 || !add_dynamic_entry (DT_RELAENT, sizeof (Elf32_External_Rela)))
5238 return FALSE;
5239 }
5240
5241 /* If any dynamic relocs apply to a read-only section, then we
5242 need a DT_TEXTREL entry. */
5243 if ((info->flags & DF_TEXTREL) == 0)
5244 elf_link_hash_traverse (elf_hash_table (info), maybe_set_textrel,
5245 info);
5246
5247 if ((info->flags & DF_TEXTREL) != 0)
5248 {
5249 if (!add_dynamic_entry (DT_TEXTREL, 0))
5250 return FALSE;
5251 }
5252 if (htab->is_vxworks
5253 && !elf_vxworks_add_dynamic_entries (output_bfd, info))
5254 return FALSE;
5255 }
5256 #undef add_dynamic_entry
5257
5258 return TRUE;
5259 }
5260
5261 /* Return TRUE if symbol should be hashed in the `.gnu.hash' section. */
5262
5263 static bfd_boolean
5264 ppc_elf_hash_symbol (struct elf_link_hash_entry *h)
5265 {
5266 if (h->plt.plist != NULL
5267 && !h->def_regular
5268 && (!h->pointer_equality_needed
5269 || !h->ref_regular_nonweak))
5270 return FALSE;
5271
5272 return _bfd_elf_hash_symbol (h);
5273 }
5274 \f
5275 #define ARRAY_SIZE(a) (sizeof (a) / sizeof ((a)[0]))
5276
5277 static const int shared_stub_entry[] =
5278 {
5279 0x7c0802a6, /* mflr 0 */
5280 0x429f0005, /* bcl 20, 31, .Lxxx */
5281 0x7d6802a6, /* mflr 11 */
5282 0x3d6b0000, /* addis 11, 11, (xxx-.Lxxx)@ha */
5283 0x396b0018, /* addi 11, 11, (xxx-.Lxxx)@l */
5284 0x7c0803a6, /* mtlr 0 */
5285 0x7d6903a6, /* mtctr 11 */
5286 0x4e800420, /* bctr */
5287 };
5288
5289 static const int stub_entry[] =
5290 {
5291 0x3d600000, /* lis 11,xxx@ha */
5292 0x396b0000, /* addi 11,11,xxx@l */
5293 0x7d6903a6, /* mtctr 11 */
5294 0x4e800420, /* bctr */
5295 };
5296
5297 static bfd_boolean
5298 ppc_elf_relax_section (bfd *abfd,
5299 asection *isec,
5300 struct bfd_link_info *link_info,
5301 bfd_boolean *again)
5302 {
5303 struct one_fixup
5304 {
5305 struct one_fixup *next;
5306 asection *tsec;
5307 bfd_vma toff;
5308 bfd_vma trampoff;
5309 };
5310
5311 Elf_Internal_Shdr *symtab_hdr;
5312 bfd_byte *contents = NULL;
5313 Elf_Internal_Sym *isymbuf = NULL;
5314 Elf_Internal_Rela *internal_relocs = NULL;
5315 Elf_Internal_Rela *irel, *irelend;
5316 struct one_fixup *fixups = NULL;
5317 bfd_boolean changed;
5318 struct ppc_elf_link_hash_table *htab;
5319 bfd_size_type trampoff;
5320 asection *got2;
5321
5322 *again = FALSE;
5323
5324 /* Nothing to do if there are no relocations, and no need to do
5325 anything with non-alloc sections. */
5326 if ((isec->flags & SEC_ALLOC) == 0
5327 || (isec->flags & SEC_RELOC) == 0
5328 || isec->reloc_count == 0)
5329 return TRUE;
5330
5331 trampoff = (isec->size + 3) & (bfd_vma) -4;
5332 /* Space for a branch around any trampolines. */
5333 trampoff += 4;
5334
5335 symtab_hdr = &elf_symtab_hdr (abfd);
5336
5337 /* Get a copy of the native relocations. */
5338 internal_relocs = _bfd_elf_link_read_relocs (abfd, isec, NULL, NULL,
5339 link_info->keep_memory);
5340 if (internal_relocs == NULL)
5341 goto error_return;
5342
5343 htab = ppc_elf_hash_table (link_info);
5344 got2 = bfd_get_section_by_name (abfd, ".got2");
5345
5346 irelend = internal_relocs + isec->reloc_count;
5347 for (irel = internal_relocs; irel < irelend; irel++)
5348 {
5349 unsigned long r_type = ELF32_R_TYPE (irel->r_info);
5350 bfd_vma symaddr, reladdr, toff, roff;
5351 asection *tsec;
5352 struct one_fixup *f;
5353 size_t insn_offset = 0;
5354 bfd_vma max_branch_offset, val;
5355 bfd_byte *hit_addr;
5356 unsigned long t0;
5357 unsigned char sym_type;
5358
5359 switch (r_type)
5360 {
5361 case R_PPC_REL24:
5362 case R_PPC_LOCAL24PC:
5363 case R_PPC_PLTREL24:
5364 max_branch_offset = 1 << 25;
5365 break;
5366
5367 case R_PPC_REL14:
5368 case R_PPC_REL14_BRTAKEN:
5369 case R_PPC_REL14_BRNTAKEN:
5370 max_branch_offset = 1 << 15;
5371 break;
5372
5373 default:
5374 continue;
5375 }
5376
5377 /* Get the value of the symbol referred to by the reloc. */
5378 if (ELF32_R_SYM (irel->r_info) < symtab_hdr->sh_info)
5379 {
5380 /* A local symbol. */
5381 Elf_Internal_Sym *isym;
5382
5383 /* Read this BFD's local symbols. */
5384 if (isymbuf == NULL)
5385 {
5386 isymbuf = (Elf_Internal_Sym *) symtab_hdr->contents;
5387 if (isymbuf == NULL)
5388 isymbuf = bfd_elf_get_elf_syms (abfd, symtab_hdr,
5389 symtab_hdr->sh_info, 0,
5390 NULL, NULL, NULL);
5391 if (isymbuf == 0)
5392 goto error_return;
5393 }
5394 isym = isymbuf + ELF32_R_SYM (irel->r_info);
5395 if (isym->st_shndx == SHN_UNDEF)
5396 continue; /* We can't do anything with undefined symbols. */
5397 else if (isym->st_shndx == SHN_ABS)
5398 tsec = bfd_abs_section_ptr;
5399 else if (isym->st_shndx == SHN_COMMON)
5400 tsec = bfd_com_section_ptr;
5401 else
5402 tsec = bfd_section_from_elf_index (abfd, isym->st_shndx);
5403
5404 toff = isym->st_value;
5405 sym_type = ELF_ST_TYPE (isym->st_info);
5406 }
5407 else
5408 {
5409 /* Global symbol handling. */
5410 unsigned long indx;
5411 struct elf_link_hash_entry *h;
5412
5413 indx = ELF32_R_SYM (irel->r_info) - symtab_hdr->sh_info;
5414 h = elf_sym_hashes (abfd)[indx];
5415
5416 while (h->root.type == bfd_link_hash_indirect
5417 || h->root.type == bfd_link_hash_warning)
5418 h = (struct elf_link_hash_entry *) h->root.u.i.link;
5419
5420 tsec = NULL;
5421 toff = 0;
5422 if (r_type == R_PPC_PLTREL24
5423 && htab->plt != NULL)
5424 {
5425 struct plt_entry *ent = find_plt_ent (h, got2, irel->r_addend);
5426
5427 if (ent != NULL)
5428 {
5429 if (htab->plt_type == PLT_NEW)
5430 {
5431 tsec = htab->glink;
5432 toff = ent->glink_offset;
5433 }
5434 else
5435 {
5436 tsec = htab->plt;
5437 toff = ent->plt.offset;
5438 }
5439 }
5440 }
5441 if (tsec != NULL)
5442 ;
5443 else if (h->root.type == bfd_link_hash_defined
5444 || h->root.type == bfd_link_hash_defweak)
5445 {
5446 tsec = h->root.u.def.section;
5447 toff = h->root.u.def.value;
5448 }
5449 else
5450 continue;
5451
5452 sym_type = h->type;
5453 }
5454
5455 /* If the branch and target are in the same section, you have
5456 no hope of adding stubs. We'll error out later should the
5457 branch overflow. */
5458 if (tsec == isec)
5459 continue;
5460
5461 /* There probably isn't any reason to handle symbols in
5462 SEC_MERGE sections; SEC_MERGE doesn't seem a likely
5463 attribute for a code section, and we are only looking at
5464 branches. However, implement it correctly here as a
5465 reference for other target relax_section functions. */
5466 if (0 && tsec->sec_info_type == ELF_INFO_TYPE_MERGE)
5467 {
5468 /* At this stage in linking, no SEC_MERGE symbol has been
5469 adjusted, so all references to such symbols need to be
5470 passed through _bfd_merged_section_offset. (Later, in
5471 relocate_section, all SEC_MERGE symbols *except* for
5472 section symbols have been adjusted.)
5473
5474 gas may reduce relocations against symbols in SEC_MERGE
5475 sections to a relocation against the section symbol when
5476 the original addend was zero. When the reloc is against
5477 a section symbol we should include the addend in the
5478 offset passed to _bfd_merged_section_offset, since the
5479 location of interest is the original symbol. On the
5480 other hand, an access to "sym+addend" where "sym" is not
5481 a section symbol should not include the addend; Such an
5482 access is presumed to be an offset from "sym"; The
5483 location of interest is just "sym". */
5484 if (sym_type == STT_SECTION)
5485 toff += irel->r_addend;
5486
5487 toff = _bfd_merged_section_offset (abfd, &tsec,
5488 elf_section_data (tsec)->sec_info,
5489 toff);
5490
5491 if (sym_type != STT_SECTION)
5492 toff += irel->r_addend;
5493 }
5494 /* PLTREL24 addends are special. */
5495 else if (r_type != R_PPC_PLTREL24)
5496 toff += irel->r_addend;
5497
5498 /* Attempted -shared link of non-pic code loses. */
5499 if (tsec->output_section == NULL)
5500 continue;
5501
5502 symaddr = tsec->output_section->vma + tsec->output_offset + toff;
5503
5504 roff = irel->r_offset;
5505 reladdr = isec->output_section->vma + isec->output_offset + roff;
5506
5507 /* If the branch is in range, no need to do anything. */
5508 if (symaddr - reladdr + max_branch_offset < 2 * max_branch_offset)
5509 continue;
5510
5511 /* Look for an existing fixup to this address. */
5512 for (f = fixups; f ; f = f->next)
5513 if (f->tsec == tsec && f->toff == toff)
5514 break;
5515
5516 if (f == NULL)
5517 {
5518 size_t size;
5519 unsigned long stub_rtype;
5520
5521 val = trampoff - roff;
5522 if (val >= max_branch_offset)
5523 /* Oh dear, we can't reach a trampoline. Don't try to add
5524 one. We'll report an error later. */
5525 continue;
5526
5527 if (link_info->shared)
5528 {
5529 size = 4 * ARRAY_SIZE (shared_stub_entry);
5530 insn_offset = 12;
5531 stub_rtype = R_PPC_RELAX32PC;
5532 }
5533 else
5534 {
5535 size = 4 * ARRAY_SIZE (stub_entry);
5536 insn_offset = 0;
5537 stub_rtype = R_PPC_RELAX32;
5538 }
5539
5540 if (R_PPC_RELAX32_PLT - R_PPC_RELAX32
5541 != R_PPC_RELAX32PC_PLT - R_PPC_RELAX32PC)
5542 abort ();
5543 if (tsec == htab->plt
5544 || tsec == htab->glink)
5545 stub_rtype += R_PPC_RELAX32_PLT - R_PPC_RELAX32;
5546
5547 /* Hijack the old relocation. Since we need two
5548 relocations for this use a "composite" reloc. */
5549 irel->r_info = ELF32_R_INFO (ELF32_R_SYM (irel->r_info),
5550 stub_rtype);
5551 irel->r_offset = trampoff + insn_offset;
5552
5553 /* Record the fixup so we don't do it again this section. */
5554 f = bfd_malloc (sizeof (*f));
5555 f->next = fixups;
5556 f->tsec = tsec;
5557 f->toff = toff;
5558 f->trampoff = trampoff;
5559 fixups = f;
5560
5561 trampoff += size;
5562 }
5563 else
5564 {
5565 val = f->trampoff - roff;
5566 if (val >= max_branch_offset)
5567 continue;
5568
5569 /* Nop out the reloc, since we're finalizing things here. */
5570 irel->r_info = ELF32_R_INFO (0, R_PPC_NONE);
5571 }
5572
5573 /* Get the section contents. */
5574 if (contents == NULL)
5575 {
5576 /* Get cached copy if it exists. */
5577 if (elf_section_data (isec)->this_hdr.contents != NULL)
5578 contents = elf_section_data (isec)->this_hdr.contents;
5579 else
5580 {
5581 /* Go get them off disk. */
5582 if (!bfd_malloc_and_get_section (abfd, isec, &contents))
5583 goto error_return;
5584 }
5585 }
5586
5587 /* Fix up the existing branch to hit the trampoline. */
5588 hit_addr = contents + roff;
5589 switch (r_type)
5590 {
5591 case R_PPC_REL24:
5592 case R_PPC_LOCAL24PC:
5593 case R_PPC_PLTREL24:
5594 t0 = bfd_get_32 (abfd, hit_addr);
5595 t0 &= ~0x3fffffc;
5596 t0 |= val & 0x3fffffc;
5597 bfd_put_32 (abfd, t0, hit_addr);
5598 break;
5599
5600 case R_PPC_REL14:
5601 case R_PPC_REL14_BRTAKEN:
5602 case R_PPC_REL14_BRNTAKEN:
5603 t0 = bfd_get_32 (abfd, hit_addr);
5604 t0 &= ~0xfffc;
5605 t0 |= val & 0xfffc;
5606 bfd_put_32 (abfd, t0, hit_addr);
5607 break;
5608 }
5609 }
5610
5611 /* Write out the trampolines. */
5612 changed = fixups != NULL;
5613 if (fixups != NULL)
5614 {
5615 const int *stub;
5616 bfd_byte *dest;
5617 bfd_vma val;
5618 int i, size;
5619
5620 do
5621 {
5622 struct one_fixup *f = fixups;
5623 fixups = fixups->next;
5624 free (f);
5625 }
5626 while (fixups);
5627
5628 contents = bfd_realloc_or_free (contents, trampoff);
5629 if (contents == NULL)
5630 goto error_return;
5631
5632 isec->size = (isec->size + 3) & (bfd_vma) -4;
5633 /* Branch around the trampolines. */
5634 val = trampoff - isec->size + 0x48000000;
5635 dest = contents + isec->size;
5636 isec->size = trampoff;
5637 bfd_put_32 (abfd, val, dest);
5638 dest += 4;
5639
5640 if (link_info->shared)
5641 {
5642 stub = shared_stub_entry;
5643 size = ARRAY_SIZE (shared_stub_entry);
5644 }
5645 else
5646 {
5647 stub = stub_entry;
5648 size = ARRAY_SIZE (stub_entry);
5649 }
5650
5651 i = 0;
5652 while (dest < contents + trampoff)
5653 {
5654 bfd_put_32 (abfd, stub[i], dest);
5655 i++;
5656 if (i == size)
5657 i = 0;
5658 dest += 4;
5659 }
5660 BFD_ASSERT (i == 0);
5661 }
5662
5663 if (isymbuf != NULL
5664 && symtab_hdr->contents != (unsigned char *) isymbuf)
5665 {
5666 if (! link_info->keep_memory)
5667 free (isymbuf);
5668 else
5669 {
5670 /* Cache the symbols for elf_link_input_bfd. */
5671 symtab_hdr->contents = (unsigned char *) isymbuf;
5672 }
5673 }
5674
5675 if (contents != NULL
5676 && elf_section_data (isec)->this_hdr.contents != contents)
5677 {
5678 if (!changed && !link_info->keep_memory)
5679 free (contents);
5680 else
5681 {
5682 /* Cache the section contents for elf_link_input_bfd. */
5683 elf_section_data (isec)->this_hdr.contents = contents;
5684 }
5685 }
5686
5687 if (elf_section_data (isec)->relocs != internal_relocs)
5688 {
5689 if (!changed)
5690 free (internal_relocs);
5691 else
5692 elf_section_data (isec)->relocs = internal_relocs;
5693 }
5694
5695 *again = changed;
5696 return TRUE;
5697
5698 error_return:
5699 if (isymbuf != NULL && (unsigned char *) isymbuf != symtab_hdr->contents)
5700 free (isymbuf);
5701 if (contents != NULL
5702 && elf_section_data (isec)->this_hdr.contents != contents)
5703 free (contents);
5704 if (internal_relocs != NULL
5705 && elf_section_data (isec)->relocs != internal_relocs)
5706 free (internal_relocs);
5707 return FALSE;
5708 }
5709 \f
5710 /* What to do when ld finds relocations against symbols defined in
5711 discarded sections. */
5712
5713 static unsigned int
5714 ppc_elf_action_discarded (asection *sec)
5715 {
5716 if (strcmp (".fixup", sec->name) == 0)
5717 return 0;
5718
5719 if (strcmp (".got2", sec->name) == 0)
5720 return 0;
5721
5722 return _bfd_elf_default_action_discarded (sec);
5723 }
5724 \f
5725 /* Fill in the address for a pointer generated in a linker section. */
5726
5727 static bfd_vma
5728 elf_finish_pointer_linker_section (bfd *input_bfd,
5729 elf_linker_section_t *lsect,
5730 struct elf_link_hash_entry *h,
5731 bfd_vma relocation,
5732 const Elf_Internal_Rela *rel)
5733 {
5734 elf_linker_section_pointers_t *linker_section_ptr;
5735
5736 BFD_ASSERT (lsect != NULL);
5737
5738 if (h != NULL)
5739 {
5740 /* Handle global symbol. */
5741 struct ppc_elf_link_hash_entry *eh;
5742
5743 eh = (struct ppc_elf_link_hash_entry *) h;
5744 BFD_ASSERT (eh->elf.def_regular);
5745 linker_section_ptr = eh->linker_section_pointer;
5746 }
5747 else
5748 {
5749 /* Handle local symbol. */
5750 unsigned long r_symndx = ELF32_R_SYM (rel->r_info);
5751
5752 BFD_ASSERT (is_ppc_elf (input_bfd));
5753 BFD_ASSERT (elf_local_ptr_offsets (input_bfd) != NULL);
5754 linker_section_ptr = elf_local_ptr_offsets (input_bfd)[r_symndx];
5755 }
5756
5757 linker_section_ptr = elf_find_pointer_linker_section (linker_section_ptr,
5758 rel->r_addend,
5759 lsect);
5760 BFD_ASSERT (linker_section_ptr != NULL);
5761
5762 /* Offset will always be a multiple of four, so use the bottom bit
5763 as a "written" flag. */
5764 if ((linker_section_ptr->offset & 1) == 0)
5765 {
5766 bfd_put_32 (lsect->section->owner,
5767 relocation + linker_section_ptr->addend,
5768 lsect->section->contents + linker_section_ptr->offset);
5769 linker_section_ptr->offset += 1;
5770 }
5771
5772 relocation = (lsect->section->output_offset
5773 + linker_section_ptr->offset - 1
5774 - 0x8000);
5775
5776 #ifdef DEBUG
5777 fprintf (stderr,
5778 "Finish pointer in linker section %s, offset = %ld (0x%lx)\n",
5779 lsect->name, (long) relocation, (long) relocation);
5780 #endif
5781
5782 /* Subtract out the addend, because it will get added back in by the normal
5783 processing. */
5784 return relocation - linker_section_ptr->addend;
5785 }
5786
5787 /* The RELOCATE_SECTION function is called by the ELF backend linker
5788 to handle the relocations for a section.
5789
5790 The relocs are always passed as Rela structures; if the section
5791 actually uses Rel structures, the r_addend field will always be
5792 zero.
5793
5794 This function is responsible for adjust the section contents as
5795 necessary, and (if using Rela relocs and generating a
5796 relocatable output file) adjusting the reloc addend as
5797 necessary.
5798
5799 This function does not have to worry about setting the reloc
5800 address or the reloc symbol index.
5801
5802 LOCAL_SYMS is a pointer to the swapped in local symbols.
5803
5804 LOCAL_SECTIONS is an array giving the section in the input file
5805 corresponding to the st_shndx field of each local symbol.
5806
5807 The global hash table entry for the global symbols can be found
5808 via elf_sym_hashes (input_bfd).
5809
5810 When generating relocatable output, this function must handle
5811 STB_LOCAL/STT_SECTION symbols specially. The output symbol is
5812 going to be the section symbol corresponding to the output
5813 section, which means that the addend must be adjusted
5814 accordingly. */
5815
5816 static bfd_boolean
5817 ppc_elf_relocate_section (bfd *output_bfd,
5818 struct bfd_link_info *info,
5819 bfd *input_bfd,
5820 asection *input_section,
5821 bfd_byte *contents,
5822 Elf_Internal_Rela *relocs,
5823 Elf_Internal_Sym *local_syms,
5824 asection **local_sections)
5825 {
5826 Elf_Internal_Shdr *symtab_hdr;
5827 struct elf_link_hash_entry **sym_hashes;
5828 struct ppc_elf_link_hash_table *htab;
5829 Elf_Internal_Rela *rel;
5830 Elf_Internal_Rela *relend;
5831 Elf_Internal_Rela outrel;
5832 bfd_byte *loc;
5833 asection *got2, *sreloc = NULL;
5834 bfd_vma *local_got_offsets;
5835 bfd_boolean ret = TRUE;
5836 bfd_vma d_offset = (bfd_big_endian (output_bfd) ? 2 : 0);
5837 bfd_boolean is_vxworks_tls;
5838
5839 #ifdef DEBUG
5840 _bfd_error_handler ("ppc_elf_relocate_section called for %B section %A, "
5841 "%ld relocations%s",
5842 input_bfd, input_section,
5843 (long) input_section->reloc_count,
5844 (info->relocatable) ? " (relocatable)" : "");
5845 #endif
5846
5847 got2 = bfd_get_section_by_name (input_bfd, ".got2");
5848
5849 /* Initialize howto table if not already done. */
5850 if (!ppc_elf_howto_table[R_PPC_ADDR32])
5851 ppc_elf_howto_init ();
5852
5853 htab = ppc_elf_hash_table (info);
5854 local_got_offsets = elf_local_got_offsets (input_bfd);
5855 symtab_hdr = &elf_symtab_hdr (input_bfd);
5856 sym_hashes = elf_sym_hashes (input_bfd);
5857 /* We have to handle relocations in vxworks .tls_vars sections
5858 specially, because the dynamic loader is 'weird'. */
5859 is_vxworks_tls = (htab->is_vxworks && info->shared
5860 && !strcmp (input_section->output_section->name,
5861 ".tls_vars"));
5862 rel = relocs;
5863 relend = relocs + input_section->reloc_count;
5864 for (; rel < relend; rel++)
5865 {
5866 enum elf_ppc_reloc_type r_type;
5867 bfd_vma addend;
5868 bfd_reloc_status_type r;
5869 Elf_Internal_Sym *sym;
5870 asection *sec;
5871 struct elf_link_hash_entry *h;
5872 const char *sym_name;
5873 reloc_howto_type *howto;
5874 unsigned long r_symndx;
5875 bfd_vma relocation;
5876 bfd_vma branch_bit, insn, from;
5877 bfd_boolean unresolved_reloc;
5878 bfd_boolean warned;
5879 unsigned int tls_type, tls_mask, tls_gd;
5880
5881 r_type = ELF32_R_TYPE (rel->r_info);
5882 sym = NULL;
5883 sec = NULL;
5884 h = NULL;
5885 unresolved_reloc = FALSE;
5886 warned = FALSE;
5887 r_symndx = ELF32_R_SYM (rel->r_info);
5888
5889 if (r_symndx < symtab_hdr->sh_info)
5890 {
5891 sym = local_syms + r_symndx;
5892 sec = local_sections[r_symndx];
5893 sym_name = bfd_elf_sym_name (input_bfd, symtab_hdr, sym, sec);
5894
5895 relocation = _bfd_elf_rela_local_sym (output_bfd, sym, &sec, rel);
5896 }
5897 else
5898 {
5899 RELOC_FOR_GLOBAL_SYMBOL (info, input_bfd, input_section, rel,
5900 r_symndx, symtab_hdr, sym_hashes,
5901 h, sec, relocation,
5902 unresolved_reloc, warned);
5903
5904 sym_name = h->root.root.string;
5905 }
5906
5907 if (sec != NULL && elf_discarded_section (sec))
5908 {
5909 /* For relocs against symbols from removed linkonce sections,
5910 or sections discarded by a linker script, we just want the
5911 section contents zeroed. Avoid any special processing. */
5912 howto = NULL;
5913 if (r_type < R_PPC_max)
5914 howto = ppc_elf_howto_table[r_type];
5915 _bfd_clear_contents (howto, input_bfd, contents + rel->r_offset);
5916 rel->r_info = 0;
5917 rel->r_addend = 0;
5918 continue;
5919 }
5920
5921 if (info->relocatable)
5922 {
5923 if (got2 != NULL
5924 && r_type == R_PPC_PLTREL24
5925 && rel->r_addend >= 32768)
5926 {
5927 /* R_PPC_PLTREL24 is rather special. If non-zero, the
5928 addend specifies the GOT pointer offset within .got2. */
5929 rel->r_addend += got2->output_offset;
5930 }
5931 continue;
5932 }
5933
5934 /* TLS optimizations. Replace instruction sequences and relocs
5935 based on information we collected in tls_optimize. We edit
5936 RELOCS so that --emit-relocs will output something sensible
5937 for the final instruction stream. */
5938 tls_mask = 0;
5939 tls_gd = 0;
5940 if (IS_PPC_TLS_RELOC (r_type))
5941 {
5942 if (h != NULL)
5943 tls_mask = ((struct ppc_elf_link_hash_entry *) h)->tls_mask;
5944 else if (local_got_offsets != NULL)
5945 {
5946 char *lgot_masks;
5947 lgot_masks = (char *) (local_got_offsets + symtab_hdr->sh_info);
5948 tls_mask = lgot_masks[r_symndx];
5949 }
5950 }
5951
5952 /* Ensure reloc mapping code below stays sane. */
5953 if ((R_PPC_GOT_TLSLD16 & 3) != (R_PPC_GOT_TLSGD16 & 3)
5954 || (R_PPC_GOT_TLSLD16_LO & 3) != (R_PPC_GOT_TLSGD16_LO & 3)
5955 || (R_PPC_GOT_TLSLD16_HI & 3) != (R_PPC_GOT_TLSGD16_HI & 3)
5956 || (R_PPC_GOT_TLSLD16_HA & 3) != (R_PPC_GOT_TLSGD16_HA & 3)
5957 || (R_PPC_GOT_TLSLD16 & 3) != (R_PPC_GOT_TPREL16 & 3)
5958 || (R_PPC_GOT_TLSLD16_LO & 3) != (R_PPC_GOT_TPREL16_LO & 3)
5959 || (R_PPC_GOT_TLSLD16_HI & 3) != (R_PPC_GOT_TPREL16_HI & 3)
5960 || (R_PPC_GOT_TLSLD16_HA & 3) != (R_PPC_GOT_TPREL16_HA & 3))
5961 abort ();
5962 switch (r_type)
5963 {
5964 default:
5965 break;
5966
5967 case R_PPC_GOT_TPREL16:
5968 case R_PPC_GOT_TPREL16_LO:
5969 if (tls_mask != 0
5970 && (tls_mask & TLS_TPREL) == 0)
5971 {
5972 bfd_vma insn;
5973 insn = bfd_get_32 (output_bfd, contents + rel->r_offset - d_offset);
5974 insn &= 31 << 21;
5975 insn |= 0x3c020000; /* addis 0,2,0 */
5976 bfd_put_32 (output_bfd, insn, contents + rel->r_offset - d_offset);
5977 r_type = R_PPC_TPREL16_HA;
5978 rel->r_info = ELF32_R_INFO (r_symndx, r_type);
5979 }
5980 break;
5981
5982 case R_PPC_TLS:
5983 if (tls_mask != 0
5984 && (tls_mask & TLS_TPREL) == 0)
5985 {
5986 bfd_vma insn, rtra;
5987 insn = bfd_get_32 (output_bfd, contents + rel->r_offset);
5988 if ((insn & ((31 << 26) | (31 << 11)))
5989 == ((31 << 26) | (2 << 11)))
5990 rtra = insn & ((1 << 26) - (1 << 16));
5991 else if ((insn & ((31 << 26) | (31 << 16)))
5992 == ((31 << 26) | (2 << 16)))
5993 rtra = (insn & (31 << 21)) | ((insn & (31 << 11)) << 5);
5994 else
5995 abort ();
5996 if ((insn & ((1 << 11) - (1 << 1))) == 266 << 1)
5997 /* add -> addi. */
5998 insn = 14 << 26;
5999 else if ((insn & (31 << 1)) == 23 << 1
6000 && ((insn & (31 << 6)) < 14 << 6
6001 || ((insn & (31 << 6)) >= 16 << 6
6002 && (insn & (31 << 6)) < 24 << 6)))
6003 /* load and store indexed -> dform. */
6004 insn = (32 | ((insn >> 6) & 31)) << 26;
6005 else if ((insn & (31 << 1)) == 21 << 1
6006 && (insn & (0x1a << 6)) == 0)
6007 /* ldx, ldux, stdx, stdux -> ld, ldu, std, stdu. */
6008 insn = (((58 | ((insn >> 6) & 4)) << 26)
6009 | ((insn >> 6) & 1));
6010 else if ((insn & (31 << 1)) == 21 << 1
6011 && (insn & ((1 << 11) - (1 << 1))) == 341 << 1)
6012 /* lwax -> lwa. */
6013 insn = (58 << 26) | 2;
6014 else
6015 abort ();
6016 insn |= rtra;
6017 bfd_put_32 (output_bfd, insn, contents + rel->r_offset);
6018 r_type = R_PPC_TPREL16_LO;
6019 rel->r_info = ELF32_R_INFO (r_symndx, r_type);
6020
6021 /* Was PPC_TLS which sits on insn boundary, now
6022 PPC_TPREL16_LO which is at low-order half-word. */
6023 rel->r_offset += d_offset;
6024 }
6025 break;
6026
6027 case R_PPC_GOT_TLSGD16_HI:
6028 case R_PPC_GOT_TLSGD16_HA:
6029 tls_gd = TLS_TPRELGD;
6030 if (tls_mask != 0 && (tls_mask & TLS_GD) == 0)
6031 goto tls_gdld_hi;
6032 break;
6033
6034 case R_PPC_GOT_TLSLD16_HI:
6035 case R_PPC_GOT_TLSLD16_HA:
6036 if (tls_mask != 0 && (tls_mask & TLS_LD) == 0)
6037 {
6038 tls_gdld_hi:
6039 if ((tls_mask & tls_gd) != 0)
6040 r_type = (((r_type - (R_PPC_GOT_TLSGD16 & 3)) & 3)
6041 + R_PPC_GOT_TPREL16);
6042 else
6043 {
6044 bfd_put_32 (output_bfd, NOP, contents + rel->r_offset);
6045 rel->r_offset -= d_offset;
6046 r_type = R_PPC_NONE;
6047 }
6048 rel->r_info = ELF32_R_INFO (r_symndx, r_type);
6049 }
6050 break;
6051
6052 case R_PPC_GOT_TLSGD16:
6053 case R_PPC_GOT_TLSGD16_LO:
6054 tls_gd = TLS_TPRELGD;
6055 if (tls_mask != 0 && (tls_mask & TLS_GD) == 0)
6056 goto tls_ldgd_opt;
6057 break;
6058
6059 case R_PPC_GOT_TLSLD16:
6060 case R_PPC_GOT_TLSLD16_LO:
6061 if (tls_mask != 0 && (tls_mask & TLS_LD) == 0)
6062 {
6063 bfd_vma insn1, insn2;
6064 bfd_vma offset;
6065
6066 tls_ldgd_opt:
6067 offset = rel[1].r_offset;
6068 insn1 = bfd_get_32 (output_bfd,
6069 contents + rel->r_offset - d_offset);
6070 if ((tls_mask & tls_gd) != 0)
6071 {
6072 /* IE */
6073 insn1 &= (1 << 26) - 1;
6074 insn1 |= 32 << 26; /* lwz */
6075 insn2 = 0x7c631214; /* add 3,3,2 */
6076 rel[1].r_info
6077 = ELF32_R_INFO (ELF32_R_SYM (rel[1].r_info), R_PPC_NONE);
6078 rel[1].r_addend = 0;
6079 r_type = (((r_type - (R_PPC_GOT_TLSGD16 & 3)) & 3)
6080 + R_PPC_GOT_TPREL16);
6081 rel->r_info = ELF32_R_INFO (r_symndx, r_type);
6082 }
6083 else
6084 {
6085 /* LE */
6086 insn1 = 0x3c620000; /* addis 3,2,0 */
6087 insn2 = 0x38630000; /* addi 3,3,0 */
6088 if (tls_gd == 0)
6089 {
6090 /* Was an LD reloc. */
6091 for (r_symndx = 0;
6092 r_symndx < symtab_hdr->sh_info;
6093 r_symndx++)
6094 if (local_sections[r_symndx] == sec)
6095 break;
6096 if (r_symndx >= symtab_hdr->sh_info)
6097 r_symndx = 0;
6098 rel->r_addend = htab->elf.tls_sec->vma + DTP_OFFSET;
6099 if (r_symndx != 0)
6100 rel->r_addend -= (local_syms[r_symndx].st_value
6101 + sec->output_offset
6102 + sec->output_section->vma);
6103 }
6104 r_type = R_PPC_TPREL16_HA;
6105 rel->r_info = ELF32_R_INFO (r_symndx, r_type);
6106 rel[1].r_info = ELF32_R_INFO (r_symndx,
6107 R_PPC_TPREL16_LO);
6108 rel[1].r_offset += d_offset;
6109 rel[1].r_addend = rel->r_addend;
6110 }
6111 bfd_put_32 (output_bfd, insn1,
6112 contents + rel->r_offset - d_offset);
6113 bfd_put_32 (output_bfd, insn2, contents + offset);
6114 if (tls_gd == 0)
6115 {
6116 /* We changed the symbol on an LD reloc. Start over
6117 in order to get h, sym, sec etc. right. */
6118 rel--;
6119 continue;
6120 }
6121 }
6122 break;
6123 }
6124
6125 /* Handle other relocations that tweak non-addend part of insn. */
6126 branch_bit = 0;
6127 switch (r_type)
6128 {
6129 default:
6130 break;
6131
6132 /* Branch taken prediction relocations. */
6133 case R_PPC_ADDR14_BRTAKEN:
6134 case R_PPC_REL14_BRTAKEN:
6135 branch_bit = BRANCH_PREDICT_BIT;
6136 /* Fall thru */
6137
6138 /* Branch not taken prediction relocations. */
6139 case R_PPC_ADDR14_BRNTAKEN:
6140 case R_PPC_REL14_BRNTAKEN:
6141 insn = bfd_get_32 (output_bfd, contents + rel->r_offset);
6142 insn &= ~BRANCH_PREDICT_BIT;
6143 insn |= branch_bit;
6144
6145 from = (rel->r_offset
6146 + input_section->output_offset
6147 + input_section->output_section->vma);
6148
6149 /* Invert 'y' bit if not the default. */
6150 if ((bfd_signed_vma) (relocation + rel->r_addend - from) < 0)
6151 insn ^= BRANCH_PREDICT_BIT;
6152
6153 bfd_put_32 (output_bfd, insn, contents + rel->r_offset);
6154 break;
6155 }
6156
6157 addend = rel->r_addend;
6158 tls_type = 0;
6159 howto = NULL;
6160 if (r_type < R_PPC_max)
6161 howto = ppc_elf_howto_table[r_type];
6162 switch (r_type)
6163 {
6164 default:
6165 (*_bfd_error_handler)
6166 (_("%B: unknown relocation type %d for symbol %s"),
6167 input_bfd, (int) r_type, sym_name);
6168
6169 bfd_set_error (bfd_error_bad_value);
6170 ret = FALSE;
6171 continue;
6172
6173 case R_PPC_NONE:
6174 case R_PPC_TLS:
6175 case R_PPC_EMB_MRKREF:
6176 case R_PPC_GNU_VTINHERIT:
6177 case R_PPC_GNU_VTENTRY:
6178 continue;
6179
6180 /* GOT16 relocations. Like an ADDR16 using the symbol's
6181 address in the GOT as relocation value instead of the
6182 symbol's value itself. Also, create a GOT entry for the
6183 symbol and put the symbol value there. */
6184 case R_PPC_GOT_TLSGD16:
6185 case R_PPC_GOT_TLSGD16_LO:
6186 case R_PPC_GOT_TLSGD16_HI:
6187 case R_PPC_GOT_TLSGD16_HA:
6188 tls_type = TLS_TLS | TLS_GD;
6189 goto dogot;
6190
6191 case R_PPC_GOT_TLSLD16:
6192 case R_PPC_GOT_TLSLD16_LO:
6193 case R_PPC_GOT_TLSLD16_HI:
6194 case R_PPC_GOT_TLSLD16_HA:
6195 tls_type = TLS_TLS | TLS_LD;
6196 goto dogot;
6197
6198 case R_PPC_GOT_TPREL16:
6199 case R_PPC_GOT_TPREL16_LO:
6200 case R_PPC_GOT_TPREL16_HI:
6201 case R_PPC_GOT_TPREL16_HA:
6202 tls_type = TLS_TLS | TLS_TPREL;
6203 goto dogot;
6204
6205 case R_PPC_GOT_DTPREL16:
6206 case R_PPC_GOT_DTPREL16_LO:
6207 case R_PPC_GOT_DTPREL16_HI:
6208 case R_PPC_GOT_DTPREL16_HA:
6209 tls_type = TLS_TLS | TLS_DTPREL;
6210 goto dogot;
6211
6212 case R_PPC_GOT16:
6213 case R_PPC_GOT16_LO:
6214 case R_PPC_GOT16_HI:
6215 case R_PPC_GOT16_HA:
6216 dogot:
6217 {
6218 /* Relocation is to the entry for this symbol in the global
6219 offset table. */
6220 bfd_vma off;
6221 bfd_vma *offp;
6222 unsigned long indx;
6223
6224 if (htab->got == NULL)
6225 abort ();
6226
6227 indx = 0;
6228 if (tls_type == (TLS_TLS | TLS_LD)
6229 && (h == NULL
6230 || !h->def_dynamic))
6231 offp = &htab->tlsld_got.offset;
6232 else if (h != NULL)
6233 {
6234 bfd_boolean dyn;
6235 dyn = htab->elf.dynamic_sections_created;
6236 if (! WILL_CALL_FINISH_DYNAMIC_SYMBOL (dyn, info->shared, h)
6237 || (info->shared
6238 && SYMBOL_REFERENCES_LOCAL (info, h)))
6239 /* This is actually a static link, or it is a
6240 -Bsymbolic link and the symbol is defined
6241 locally, or the symbol was forced to be local
6242 because of a version file. */
6243 ;
6244 else
6245 {
6246 indx = h->dynindx;
6247 unresolved_reloc = FALSE;
6248 }
6249 offp = &h->got.offset;
6250 }
6251 else
6252 {
6253 if (local_got_offsets == NULL)
6254 abort ();
6255 offp = &local_got_offsets[r_symndx];
6256 }
6257
6258 /* The offset must always be a multiple of 4. We use the
6259 least significant bit to record whether we have already
6260 processed this entry. */
6261 off = *offp;
6262 if ((off & 1) != 0)
6263 off &= ~1;
6264 else
6265 {
6266 unsigned int tls_m = (tls_mask
6267 & (TLS_LD | TLS_GD | TLS_DTPREL
6268 | TLS_TPREL | TLS_TPRELGD));
6269
6270 if (offp == &htab->tlsld_got.offset)
6271 tls_m = TLS_LD;
6272 else if (h == NULL
6273 || !h->def_dynamic)
6274 tls_m &= ~TLS_LD;
6275
6276 /* We might have multiple got entries for this sym.
6277 Initialize them all. */
6278 do
6279 {
6280 int tls_ty = 0;
6281
6282 if ((tls_m & TLS_LD) != 0)
6283 {
6284 tls_ty = TLS_TLS | TLS_LD;
6285 tls_m &= ~TLS_LD;
6286 }
6287 else if ((tls_m & TLS_GD) != 0)
6288 {
6289 tls_ty = TLS_TLS | TLS_GD;
6290 tls_m &= ~TLS_GD;
6291 }
6292 else if ((tls_m & TLS_DTPREL) != 0)
6293 {
6294 tls_ty = TLS_TLS | TLS_DTPREL;
6295 tls_m &= ~TLS_DTPREL;
6296 }
6297 else if ((tls_m & (TLS_TPREL | TLS_TPRELGD)) != 0)
6298 {
6299 tls_ty = TLS_TLS | TLS_TPREL;
6300 tls_m = 0;
6301 }
6302
6303 /* Generate relocs for the dynamic linker. */
6304 if ((info->shared || indx != 0)
6305 && (h == NULL
6306 || ELF_ST_VISIBILITY (h->other) == STV_DEFAULT
6307 || h->root.type != bfd_link_hash_undefweak))
6308 {
6309 outrel.r_offset = (htab->got->output_section->vma
6310 + htab->got->output_offset
6311 + off);
6312 outrel.r_addend = 0;
6313 if (tls_ty & (TLS_LD | TLS_GD))
6314 {
6315 outrel.r_info = ELF32_R_INFO (indx, R_PPC_DTPMOD32);
6316 if (tls_ty == (TLS_TLS | TLS_GD))
6317 {
6318 loc = htab->relgot->contents;
6319 loc += (htab->relgot->reloc_count++
6320 * sizeof (Elf32_External_Rela));
6321 bfd_elf32_swap_reloca_out (output_bfd,
6322 &outrel, loc);
6323 outrel.r_offset += 4;
6324 outrel.r_info
6325 = ELF32_R_INFO (indx, R_PPC_DTPREL32);
6326 }
6327 }
6328 else if (tls_ty == (TLS_TLS | TLS_DTPREL))
6329 outrel.r_info = ELF32_R_INFO (indx, R_PPC_DTPREL32);
6330 else if (tls_ty == (TLS_TLS | TLS_TPREL))
6331 outrel.r_info = ELF32_R_INFO (indx, R_PPC_TPREL32);
6332 else if (indx == 0)
6333 outrel.r_info = ELF32_R_INFO (indx, R_PPC_RELATIVE);
6334 else
6335 outrel.r_info = ELF32_R_INFO (indx, R_PPC_GLOB_DAT);
6336 if (indx == 0)
6337 {
6338 outrel.r_addend += relocation;
6339 if (tls_ty & (TLS_GD | TLS_DTPREL | TLS_TPREL))
6340 outrel.r_addend -= htab->elf.tls_sec->vma;
6341 }
6342 loc = htab->relgot->contents;
6343 loc += (htab->relgot->reloc_count++
6344 * sizeof (Elf32_External_Rela));
6345 bfd_elf32_swap_reloca_out (output_bfd, &outrel, loc);
6346 }
6347
6348 /* Init the .got section contents if we're not
6349 emitting a reloc. */
6350 else
6351 {
6352 bfd_vma value = relocation;
6353
6354 if (tls_ty == (TLS_TLS | TLS_LD))
6355 value = 1;
6356 else if (tls_ty != 0)
6357 {
6358 value -= htab->elf.tls_sec->vma + DTP_OFFSET;
6359 if (tls_ty == (TLS_TLS | TLS_TPREL))
6360 value += DTP_OFFSET - TP_OFFSET;
6361
6362 if (tls_ty == (TLS_TLS | TLS_GD))
6363 {
6364 bfd_put_32 (output_bfd, value,
6365 htab->got->contents + off + 4);
6366 value = 1;
6367 }
6368 }
6369 bfd_put_32 (output_bfd, value,
6370 htab->got->contents + off);
6371 }
6372
6373 off += 4;
6374 if (tls_ty & (TLS_LD | TLS_GD))
6375 off += 4;
6376 }
6377 while (tls_m != 0);
6378
6379 off = *offp;
6380 *offp = off | 1;
6381 }
6382
6383 if (off >= (bfd_vma) -2)
6384 abort ();
6385
6386 if ((tls_type & TLS_TLS) != 0)
6387 {
6388 if (tls_type != (TLS_TLS | TLS_LD))
6389 {
6390 if ((tls_mask & TLS_LD) != 0
6391 && !(h == NULL
6392 || !h->def_dynamic))
6393 off += 8;
6394 if (tls_type != (TLS_TLS | TLS_GD))
6395 {
6396 if ((tls_mask & TLS_GD) != 0)
6397 off += 8;
6398 if (tls_type != (TLS_TLS | TLS_DTPREL))
6399 {
6400 if ((tls_mask & TLS_DTPREL) != 0)
6401 off += 4;
6402 }
6403 }
6404 }
6405 }
6406
6407 relocation = htab->got->output_offset + off;
6408 relocation -= htab->elf.hgot->root.u.def.value;
6409
6410 /* Addends on got relocations don't make much sense.
6411 x+off@got is actually x@got+off, and since the got is
6412 generated by a hash table traversal, the value in the
6413 got at entry m+n bears little relation to the entry m. */
6414 if (addend != 0)
6415 (*_bfd_error_handler)
6416 (_("%B(%A+0x%lx): non-zero addend on %s reloc against `%s'"),
6417 input_bfd,
6418 input_section,
6419 (long) rel->r_offset,
6420 howto->name,
6421 sym_name);
6422 }
6423 break;
6424
6425 /* Relocations that need no special processing. */
6426 case R_PPC_LOCAL24PC:
6427 /* It makes no sense to point a local relocation
6428 at a symbol not in this object. */
6429 if (unresolved_reloc)
6430 {
6431 if (! (*info->callbacks->undefined_symbol) (info,
6432 h->root.root.string,
6433 input_bfd,
6434 input_section,
6435 rel->r_offset,
6436 TRUE))
6437 return FALSE;
6438 continue;
6439 }
6440 break;
6441
6442 case R_PPC_DTPREL16:
6443 case R_PPC_DTPREL16_LO:
6444 case R_PPC_DTPREL16_HI:
6445 case R_PPC_DTPREL16_HA:
6446 addend -= htab->elf.tls_sec->vma + DTP_OFFSET;
6447 break;
6448
6449 /* Relocations that may need to be propagated if this is a shared
6450 object. */
6451 case R_PPC_TPREL16:
6452 case R_PPC_TPREL16_LO:
6453 case R_PPC_TPREL16_HI:
6454 case R_PPC_TPREL16_HA:
6455 addend -= htab->elf.tls_sec->vma + TP_OFFSET;
6456 /* The TPREL16 relocs shouldn't really be used in shared
6457 libs as they will result in DT_TEXTREL being set, but
6458 support them anyway. */
6459 goto dodyn;
6460
6461 case R_PPC_TPREL32:
6462 addend -= htab->elf.tls_sec->vma + TP_OFFSET;
6463 goto dodyn;
6464
6465 case R_PPC_DTPREL32:
6466 addend -= htab->elf.tls_sec->vma + DTP_OFFSET;
6467 goto dodyn;
6468
6469 case R_PPC_DTPMOD32:
6470 relocation = 1;
6471 addend = 0;
6472 goto dodyn;
6473
6474 case R_PPC_REL16:
6475 case R_PPC_REL16_LO:
6476 case R_PPC_REL16_HI:
6477 case R_PPC_REL16_HA:
6478 break;
6479
6480 case R_PPC_REL32:
6481 if (h == NULL || h == htab->elf.hgot)
6482 break;
6483 /* fall through */
6484
6485 case R_PPC_ADDR32:
6486 case R_PPC_ADDR16:
6487 case R_PPC_ADDR16_LO:
6488 case R_PPC_ADDR16_HI:
6489 case R_PPC_ADDR16_HA:
6490 case R_PPC_UADDR32:
6491 case R_PPC_UADDR16:
6492 goto dodyn;
6493
6494 case R_PPC_REL24:
6495 case R_PPC_REL14:
6496 case R_PPC_REL14_BRTAKEN:
6497 case R_PPC_REL14_BRNTAKEN:
6498 /* If these relocations are not to a named symbol, they can be
6499 handled right here, no need to bother the dynamic linker. */
6500 if (SYMBOL_CALLS_LOCAL (info, h)
6501 || h == htab->elf.hgot)
6502 break;
6503 /* fall through */
6504
6505 case R_PPC_ADDR24:
6506 case R_PPC_ADDR14:
6507 case R_PPC_ADDR14_BRTAKEN:
6508 case R_PPC_ADDR14_BRNTAKEN:
6509 if (h != NULL && !info->shared)
6510 break;
6511 /* fall through */
6512
6513 dodyn:
6514 if ((input_section->flags & SEC_ALLOC) == 0
6515 || is_vxworks_tls)
6516 break;
6517
6518 if ((info->shared
6519 && !(h != NULL
6520 && ((h->root.type == bfd_link_hash_undefined
6521 && (ELF_ST_VISIBILITY (h->other) == STV_HIDDEN
6522 || ELF_ST_VISIBILITY (h->other) == STV_INTERNAL))
6523 || (h->root.type == bfd_link_hash_undefweak
6524 && ELF_ST_VISIBILITY (h->other) != STV_DEFAULT)))
6525 && (must_be_dyn_reloc (info, r_type)
6526 || !SYMBOL_CALLS_LOCAL (info, h)))
6527 || (ELIMINATE_COPY_RELOCS
6528 && !info->shared
6529 && h != NULL
6530 && h->dynindx != -1
6531 && !h->non_got_ref
6532 && !h->def_regular))
6533 {
6534 int skip;
6535
6536 #ifdef DEBUG
6537 fprintf (stderr, "ppc_elf_relocate_section needs to "
6538 "create relocation for %s\n",
6539 (h && h->root.root.string
6540 ? h->root.root.string : "<unknown>"));
6541 #endif
6542
6543 /* When generating a shared object, these relocations
6544 are copied into the output file to be resolved at run
6545 time. */
6546 if (sreloc == NULL)
6547 {
6548 const char *name;
6549
6550 name = (bfd_elf_string_from_elf_section
6551 (input_bfd,
6552 elf_elfheader (input_bfd)->e_shstrndx,
6553 elf_section_data (input_section)->rel_hdr.sh_name));
6554 if (name == NULL)
6555 return FALSE;
6556
6557 BFD_ASSERT (CONST_STRNEQ (name, ".rela")
6558 && strcmp (bfd_get_section_name (input_bfd,
6559 input_section),
6560 name + 5) == 0);
6561
6562 sreloc = bfd_get_section_by_name (htab->elf.dynobj, name);
6563 BFD_ASSERT (sreloc != NULL);
6564 }
6565
6566 skip = 0;
6567 outrel.r_offset =
6568 _bfd_elf_section_offset (output_bfd, info, input_section,
6569 rel->r_offset);
6570 if (outrel.r_offset == (bfd_vma) -1
6571 || outrel.r_offset == (bfd_vma) -2)
6572 skip = (int) outrel.r_offset;
6573 outrel.r_offset += (input_section->output_section->vma
6574 + input_section->output_offset);
6575
6576 if (skip)
6577 memset (&outrel, 0, sizeof outrel);
6578 else if ((h != NULL
6579 && (h->root.type == bfd_link_hash_undefined
6580 || h->root.type == bfd_link_hash_undefweak))
6581 || !SYMBOL_REFERENCES_LOCAL (info, h))
6582 {
6583 unresolved_reloc = FALSE;
6584 outrel.r_info = ELF32_R_INFO (h->dynindx, r_type);
6585 outrel.r_addend = rel->r_addend;
6586 }
6587 else
6588 {
6589 outrel.r_addend = relocation + rel->r_addend;
6590
6591 if (r_type == R_PPC_ADDR32)
6592 outrel.r_info = ELF32_R_INFO (0, R_PPC_RELATIVE);
6593 else
6594 {
6595 long indx = 0;
6596
6597 if (r_symndx == 0 || bfd_is_abs_section (sec))
6598 ;
6599 else if (sec == NULL || sec->owner == NULL)
6600 {
6601 bfd_set_error (bfd_error_bad_value);
6602 ret = FALSE;
6603 }
6604 else
6605 {
6606 asection *osec;
6607
6608 /* We are turning this relocation into one
6609 against a section symbol. It would be
6610 proper to subtract the symbol's value,
6611 osec->vma, from the emitted reloc addend,
6612 but ld.so expects buggy relocs. */
6613 osec = sec->output_section;
6614 indx = elf_section_data (osec)->dynindx;
6615 if (indx == 0)
6616 {
6617 osec = htab->elf.text_index_section;
6618 indx = elf_section_data (osec)->dynindx;
6619 }
6620 BFD_ASSERT (indx != 0);
6621 #ifdef DEBUG
6622 if (indx == 0)
6623 printf ("indx=%ld section=%s flags=%08x name=%s\n",
6624 indx, osec->name, osec->flags,
6625 h->root.root.string);
6626 #endif
6627 }
6628
6629 outrel.r_info = ELF32_R_INFO (indx, r_type);
6630 }
6631 }
6632
6633 loc = sreloc->contents;
6634 loc += sreloc->reloc_count++ * sizeof (Elf32_External_Rela);
6635 bfd_elf32_swap_reloca_out (output_bfd, &outrel, loc);
6636
6637 if (skip == -1)
6638 continue;
6639
6640 /* This reloc will be computed at runtime. We clear the memory
6641 so that it contains predictable value. */
6642 if (! skip
6643 && ((input_section->flags & SEC_ALLOC) != 0
6644 || ELF32_R_TYPE (outrel.r_info) != R_PPC_RELATIVE))
6645 {
6646 relocation = howto->pc_relative ? outrel.r_offset : 0;
6647 addend = 0;
6648 break;
6649 }
6650 }
6651 break;
6652
6653 case R_PPC_RELAX32PC_PLT:
6654 case R_PPC_RELAX32_PLT:
6655 {
6656 struct plt_entry *ent = find_plt_ent (h, got2, addend);
6657
6658 if (htab->plt_type == PLT_NEW)
6659 relocation = (htab->glink->output_section->vma
6660 + htab->glink->output_offset
6661 + ent->glink_offset);
6662 else
6663 relocation = (htab->plt->output_section->vma
6664 + htab->plt->output_offset
6665 + ent->plt.offset);
6666 addend = 0;
6667 }
6668 if (r_type == R_PPC_RELAX32_PLT)
6669 goto relax32;
6670 /* Fall thru */
6671
6672 case R_PPC_RELAX32PC:
6673 relocation -= (input_section->output_section->vma
6674 + input_section->output_offset
6675 + rel->r_offset - 4);
6676 /* Fall thru */
6677
6678 case R_PPC_RELAX32:
6679 relax32:
6680 {
6681 unsigned long t0;
6682 unsigned long t1;
6683
6684 t0 = bfd_get_32 (output_bfd, contents + rel->r_offset);
6685 t1 = bfd_get_32 (output_bfd, contents + rel->r_offset + 4);
6686
6687 /* We're clearing the bits for R_PPC_ADDR16_HA
6688 and R_PPC_ADDR16_LO here. */
6689 t0 &= ~0xffff;
6690 t1 &= ~0xffff;
6691
6692 /* t0 is HA, t1 is LO */
6693 relocation += addend;
6694 t0 |= ((relocation + 0x8000) >> 16) & 0xffff;
6695 t1 |= relocation & 0xffff;
6696
6697 bfd_put_32 (output_bfd, t0, contents + rel->r_offset);
6698 bfd_put_32 (output_bfd, t1, contents + rel->r_offset + 4);
6699 }
6700 continue;
6701
6702 /* Indirect .sdata relocation. */
6703 case R_PPC_EMB_SDAI16:
6704 BFD_ASSERT (htab->sdata[0].section != NULL);
6705 relocation
6706 = elf_finish_pointer_linker_section (input_bfd, &htab->sdata[0],
6707 h, relocation, rel);
6708 break;
6709
6710 /* Indirect .sdata2 relocation. */
6711 case R_PPC_EMB_SDA2I16:
6712 BFD_ASSERT (htab->sdata[1].section != NULL);
6713 relocation
6714 = elf_finish_pointer_linker_section (input_bfd, &htab->sdata[1],
6715 h, relocation, rel);
6716 break;
6717
6718 /* Handle the TOC16 reloc. We want to use the offset within the .got
6719 section, not the actual VMA. This is appropriate when generating
6720 an embedded ELF object, for which the .got section acts like the
6721 AIX .toc section. */
6722 case R_PPC_TOC16: /* phony GOT16 relocations */
6723 BFD_ASSERT (sec != NULL);
6724 BFD_ASSERT (bfd_is_und_section (sec)
6725 || strcmp (bfd_get_section_name (abfd, sec), ".got") == 0
6726 || strcmp (bfd_get_section_name (abfd, sec), ".cgot") == 0);
6727
6728 addend -= sec->output_section->vma + sec->output_offset + 0x8000;
6729 break;
6730
6731 case R_PPC_PLTREL24:
6732 /* Relocation is to the entry for this symbol in the
6733 procedure linkage table. */
6734 {
6735 struct plt_entry *ent = find_plt_ent (h, got2, addend);
6736
6737 addend = 0;
6738 if (ent == NULL
6739 || htab->plt == NULL)
6740 {
6741 /* We didn't make a PLT entry for this symbol. This
6742 happens when statically linking PIC code, or when
6743 using -Bsymbolic. */
6744 break;
6745 }
6746
6747 unresolved_reloc = FALSE;
6748 if (htab->plt_type == PLT_NEW)
6749 relocation = (htab->glink->output_section->vma
6750 + htab->glink->output_offset
6751 + ent->glink_offset);
6752 else
6753 relocation = (htab->plt->output_section->vma
6754 + htab->plt->output_offset
6755 + ent->plt.offset);
6756 }
6757 break;
6758
6759 /* Relocate against _SDA_BASE_. */
6760 case R_PPC_SDAREL16:
6761 {
6762 const char *name;
6763 struct elf_link_hash_entry *sh;
6764
6765 BFD_ASSERT (sec != NULL);
6766 name = bfd_get_section_name (abfd, sec->output_section);
6767 if (! ((CONST_STRNEQ (name, ".sdata")
6768 && (name[6] == 0 || name[6] == '.'))
6769 || (CONST_STRNEQ (name, ".sbss")
6770 && (name[5] == 0 || name[5] == '.'))))
6771 {
6772 (*_bfd_error_handler)
6773 (_("%B: the target (%s) of a %s relocation is "
6774 "in the wrong output section (%s)"),
6775 input_bfd,
6776 sym_name,
6777 howto->name,
6778 name);
6779 }
6780 sh = htab->sdata[0].sym;
6781 addend -= (sh->root.u.def.value
6782 + sh->root.u.def.section->output_offset
6783 + sh->root.u.def.section->output_section->vma);
6784 }
6785 break;
6786
6787 /* Relocate against _SDA2_BASE_. */
6788 case R_PPC_EMB_SDA2REL:
6789 {
6790 const char *name;
6791 struct elf_link_hash_entry *sh;
6792
6793 BFD_ASSERT (sec != NULL);
6794 name = bfd_get_section_name (abfd, sec->output_section);
6795 if (! (CONST_STRNEQ (name, ".sdata2")
6796 || CONST_STRNEQ (name, ".sbss2")))
6797 {
6798 (*_bfd_error_handler)
6799 (_("%B: the target (%s) of a %s relocation is "
6800 "in the wrong output section (%s)"),
6801 input_bfd,
6802 sym_name,
6803 howto->name,
6804 name);
6805
6806 bfd_set_error (bfd_error_bad_value);
6807 ret = FALSE;
6808 continue;
6809 }
6810 sh = htab->sdata[1].sym;
6811 addend -= (sh->root.u.def.value
6812 + sh->root.u.def.section->output_offset
6813 + sh->root.u.def.section->output_section->vma);
6814 }
6815 break;
6816
6817 /* Relocate against either _SDA_BASE_, _SDA2_BASE_, or 0. */
6818 case R_PPC_EMB_SDA21:
6819 case R_PPC_EMB_RELSDA:
6820 {
6821 const char *name;
6822 int reg;
6823 struct elf_link_hash_entry *sh;
6824
6825 BFD_ASSERT (sec != NULL);
6826 name = bfd_get_section_name (abfd, sec->output_section);
6827 if (((CONST_STRNEQ (name, ".sdata")
6828 && (name[6] == 0 || name[6] == '.'))
6829 || (CONST_STRNEQ (name, ".sbss")
6830 && (name[5] == 0 || name[5] == '.'))))
6831 {
6832 reg = 13;
6833 sh = htab->sdata[0].sym;
6834 addend -= (sh->root.u.def.value
6835 + sh->root.u.def.section->output_offset
6836 + sh->root.u.def.section->output_section->vma);
6837 }
6838
6839 else if (CONST_STRNEQ (name, ".sdata2")
6840 || CONST_STRNEQ (name, ".sbss2"))
6841 {
6842 reg = 2;
6843 sh = htab->sdata[1].sym;
6844 addend -= (sh->root.u.def.value
6845 + sh->root.u.def.section->output_offset
6846 + sh->root.u.def.section->output_section->vma);
6847 }
6848
6849 else if (strcmp (name, ".PPC.EMB.sdata0") == 0
6850 || strcmp (name, ".PPC.EMB.sbss0") == 0)
6851 {
6852 reg = 0;
6853 }
6854
6855 else
6856 {
6857 (*_bfd_error_handler)
6858 (_("%B: the target (%s) of a %s relocation is "
6859 "in the wrong output section (%s)"),
6860 input_bfd,
6861 sym_name,
6862 howto->name,
6863 name);
6864
6865 bfd_set_error (bfd_error_bad_value);
6866 ret = FALSE;
6867 continue;
6868 }
6869
6870 if (r_type == R_PPC_EMB_SDA21)
6871 { /* fill in register field */
6872 insn = bfd_get_32 (output_bfd, contents + rel->r_offset);
6873 insn = (insn & ~RA_REGISTER_MASK) | (reg << RA_REGISTER_SHIFT);
6874 bfd_put_32 (output_bfd, insn, contents + rel->r_offset);
6875 }
6876 }
6877 break;
6878
6879 /* Relocate against the beginning of the section. */
6880 case R_PPC_SECTOFF:
6881 case R_PPC_SECTOFF_LO:
6882 case R_PPC_SECTOFF_HI:
6883 case R_PPC_SECTOFF_HA:
6884 BFD_ASSERT (sec != NULL);
6885 addend -= sec->output_section->vma;
6886 break;
6887
6888 /* Negative relocations. */
6889 case R_PPC_EMB_NADDR32:
6890 case R_PPC_EMB_NADDR16:
6891 case R_PPC_EMB_NADDR16_LO:
6892 case R_PPC_EMB_NADDR16_HI:
6893 case R_PPC_EMB_NADDR16_HA:
6894 addend -= 2 * relocation;
6895 break;
6896
6897 case R_PPC_COPY:
6898 case R_PPC_GLOB_DAT:
6899 case R_PPC_JMP_SLOT:
6900 case R_PPC_RELATIVE:
6901 case R_PPC_PLT32:
6902 case R_PPC_PLTREL32:
6903 case R_PPC_PLT16_LO:
6904 case R_PPC_PLT16_HI:
6905 case R_PPC_PLT16_HA:
6906 case R_PPC_ADDR30:
6907 case R_PPC_EMB_RELSEC16:
6908 case R_PPC_EMB_RELST_LO:
6909 case R_PPC_EMB_RELST_HI:
6910 case R_PPC_EMB_RELST_HA:
6911 case R_PPC_EMB_BIT_FLD:
6912 (*_bfd_error_handler)
6913 (_("%B: relocation %s is not yet supported for symbol %s."),
6914 input_bfd,
6915 howto->name,
6916 sym_name);
6917
6918 bfd_set_error (bfd_error_invalid_operation);
6919 ret = FALSE;
6920 continue;
6921 }
6922
6923 /* Do any further special processing. */
6924 switch (r_type)
6925 {
6926 default:
6927 break;
6928
6929 case R_PPC_ADDR16_HA:
6930 case R_PPC_REL16_HA:
6931 case R_PPC_SECTOFF_HA:
6932 case R_PPC_TPREL16_HA:
6933 case R_PPC_DTPREL16_HA:
6934 case R_PPC_EMB_NADDR16_HA:
6935 case R_PPC_EMB_RELST_HA:
6936 /* It's just possible that this symbol is a weak symbol
6937 that's not actually defined anywhere. In that case,
6938 'sec' would be NULL, and we should leave the symbol
6939 alone (it will be set to zero elsewhere in the link). */
6940 if (sec == NULL)
6941 break;
6942 /* Fall thru */
6943
6944 case R_PPC_PLT16_HA:
6945 case R_PPC_GOT16_HA:
6946 case R_PPC_GOT_TLSGD16_HA:
6947 case R_PPC_GOT_TLSLD16_HA:
6948 case R_PPC_GOT_TPREL16_HA:
6949 case R_PPC_GOT_DTPREL16_HA:
6950 /* Add 0x10000 if sign bit in 0:15 is set.
6951 Bits 0:15 are not used. */
6952 addend += 0x8000;
6953 break;
6954 }
6955
6956 #ifdef DEBUG
6957 fprintf (stderr, "\ttype = %s (%d), name = %s, symbol index = %ld, "
6958 "offset = %ld, addend = %ld\n",
6959 howto->name,
6960 (int) r_type,
6961 sym_name,
6962 r_symndx,
6963 (long) rel->r_offset,
6964 (long) addend);
6965 #endif
6966
6967 if (unresolved_reloc
6968 && !((input_section->flags & SEC_DEBUGGING) != 0
6969 && h->def_dynamic))
6970 {
6971 (*_bfd_error_handler)
6972 (_("%B(%A+0x%lx): unresolvable %s relocation against symbol `%s'"),
6973 input_bfd,
6974 input_section,
6975 (long) rel->r_offset,
6976 howto->name,
6977 sym_name);
6978 ret = FALSE;
6979 }
6980
6981 r = _bfd_final_link_relocate (howto,
6982 input_bfd,
6983 input_section,
6984 contents,
6985 rel->r_offset,
6986 relocation,
6987 addend);
6988
6989 if (r != bfd_reloc_ok)
6990 {
6991 if (r == bfd_reloc_overflow)
6992 {
6993 if (warned)
6994 continue;
6995 if (h != NULL
6996 && h->root.type == bfd_link_hash_undefweak
6997 && howto->pc_relative)
6998 {
6999 /* Assume this is a call protected by other code that
7000 detect the symbol is undefined. If this is the case,
7001 we can safely ignore the overflow. If not, the
7002 program is hosed anyway, and a little warning isn't
7003 going to help. */
7004
7005 continue;
7006 }
7007
7008 if (! (*info->callbacks->reloc_overflow) (info,
7009 (h ? &h->root : NULL),
7010 sym_name,
7011 howto->name,
7012 rel->r_addend,
7013 input_bfd,
7014 input_section,
7015 rel->r_offset))
7016 return FALSE;
7017 }
7018 else
7019 {
7020 (*_bfd_error_handler)
7021 (_("%B(%A+0x%lx): %s reloc against `%s': error %d"),
7022 input_bfd, input_section,
7023 (long) rel->r_offset, howto->name, sym_name, (int) r);
7024 ret = FALSE;
7025 }
7026 }
7027 }
7028
7029 #ifdef DEBUG
7030 fprintf (stderr, "\n");
7031 #endif
7032
7033 return ret;
7034 }
7035 \f
7036 #define PPC_LO(v) ((v) & 0xffff)
7037 #define PPC_HI(v) (((v) >> 16) & 0xffff)
7038 #define PPC_HA(v) PPC_HI ((v) + 0x8000)
7039
7040 /* Finish up dynamic symbol handling. We set the contents of various
7041 dynamic sections here. */
7042
7043 static bfd_boolean
7044 ppc_elf_finish_dynamic_symbol (bfd *output_bfd,
7045 struct bfd_link_info *info,
7046 struct elf_link_hash_entry *h,
7047 Elf_Internal_Sym *sym)
7048 {
7049 struct ppc_elf_link_hash_table *htab;
7050 struct plt_entry *ent;
7051 bfd_boolean doneone;
7052
7053 #ifdef DEBUG
7054 fprintf (stderr, "ppc_elf_finish_dynamic_symbol called for %s",
7055 h->root.root.string);
7056 #endif
7057
7058 htab = ppc_elf_hash_table (info);
7059 BFD_ASSERT (htab->elf.dynobj != NULL);
7060
7061 doneone = FALSE;
7062 for (ent = h->plt.plist; ent != NULL; ent = ent->next)
7063 if (ent->plt.offset != (bfd_vma) -1)
7064 {
7065 if (!doneone)
7066 {
7067 Elf_Internal_Rela rela;
7068 bfd_byte *loc;
7069 bfd_vma reloc_index;
7070
7071 if (htab->plt_type == PLT_NEW)
7072 reloc_index = ent->plt.offset / 4;
7073 else
7074 {
7075 reloc_index = ((ent->plt.offset - htab->plt_initial_entry_size)
7076 / htab->plt_slot_size);
7077 if (reloc_index > PLT_NUM_SINGLE_ENTRIES
7078 && htab->plt_type == PLT_OLD)
7079 reloc_index -= (reloc_index - PLT_NUM_SINGLE_ENTRIES) / 2;
7080 }
7081
7082 /* This symbol has an entry in the procedure linkage table.
7083 Set it up. */
7084 if (htab->plt_type == PLT_VXWORKS)
7085 {
7086 bfd_vma got_offset;
7087 const bfd_vma *plt_entry;
7088
7089 /* The first three entries in .got.plt are reserved. */
7090 got_offset = (reloc_index + 3) * 4;
7091
7092 /* Use the right PLT. */
7093 plt_entry = info->shared ? ppc_elf_vxworks_pic_plt_entry
7094 : ppc_elf_vxworks_plt_entry;
7095
7096 /* Fill in the .plt on VxWorks. */
7097 if (info->shared)
7098 {
7099 bfd_vma got_offset_hi = (got_offset >> 16)
7100 + ((got_offset & 0x8000) >> 15);
7101
7102 bfd_put_32 (output_bfd,
7103 plt_entry[0] | (got_offset_hi & 0xffff),
7104 htab->plt->contents + ent->plt.offset + 0);
7105 bfd_put_32 (output_bfd,
7106 plt_entry[1] | (got_offset & 0xffff),
7107 htab->plt->contents + ent->plt.offset + 4);
7108 }
7109 else
7110 {
7111 bfd_vma got_loc
7112 = (got_offset
7113 + htab->elf.hgot->root.u.def.value
7114 + htab->elf.hgot->root.u.def.section->output_offset
7115 + htab->elf.hgot->root.u.def.section->output_section->vma);
7116 bfd_vma got_loc_hi = (got_loc >> 16)
7117 + ((got_loc & 0x8000) >> 15);
7118
7119 bfd_put_32 (output_bfd,
7120 plt_entry[0] | (got_loc_hi & 0xffff),
7121 htab->plt->contents + ent->plt.offset + 0);
7122 bfd_put_32 (output_bfd,
7123 plt_entry[1] | (got_loc & 0xffff),
7124 htab->plt->contents + ent->plt.offset + 4);
7125 }
7126
7127 bfd_put_32 (output_bfd, plt_entry[2],
7128 htab->plt->contents + ent->plt.offset + 8);
7129 bfd_put_32 (output_bfd, plt_entry[3],
7130 htab->plt->contents + ent->plt.offset + 12);
7131
7132 /* This instruction is an immediate load. The value loaded is
7133 the byte offset of the R_PPC_JMP_SLOT relocation from the
7134 start of the .rela.plt section. The value is stored in the
7135 low-order 16 bits of the load instruction. */
7136 /* NOTE: It appears that this is now an index rather than a
7137 prescaled offset. */
7138 bfd_put_32 (output_bfd,
7139 plt_entry[4] | reloc_index,
7140 htab->plt->contents + ent->plt.offset + 16);
7141 /* This instruction is a PC-relative branch whose target is
7142 the start of the PLT section. The address of this branch
7143 instruction is 20 bytes beyond the start of this PLT entry.
7144 The address is encoded in bits 6-29, inclusive. The value
7145 stored is right-shifted by two bits, permitting a 26-bit
7146 offset. */
7147 bfd_put_32 (output_bfd,
7148 (plt_entry[5]
7149 | (-(ent->plt.offset + 20) & 0x03fffffc)),
7150 htab->plt->contents + ent->plt.offset + 20);
7151 bfd_put_32 (output_bfd, plt_entry[6],
7152 htab->plt->contents + ent->plt.offset + 24);
7153 bfd_put_32 (output_bfd, plt_entry[7],
7154 htab->plt->contents + ent->plt.offset + 28);
7155
7156 /* Fill in the GOT entry corresponding to this PLT slot with
7157 the address immediately after the the "bctr" instruction
7158 in this PLT entry. */
7159 bfd_put_32 (output_bfd, (htab->plt->output_section->vma
7160 + htab->plt->output_offset
7161 + ent->plt.offset + 16),
7162 htab->sgotplt->contents + got_offset);
7163
7164 if (!info->shared)
7165 {
7166 /* Fill in a couple of entries in .rela.plt.unloaded. */
7167 loc = htab->srelplt2->contents
7168 + ((VXWORKS_PLTRESOLVE_RELOCS + reloc_index
7169 * VXWORKS_PLT_NON_JMP_SLOT_RELOCS)
7170 * sizeof (Elf32_External_Rela));
7171
7172 /* Provide the @ha relocation for the first instruction. */
7173 rela.r_offset = (htab->plt->output_section->vma
7174 + htab->plt->output_offset
7175 + ent->plt.offset + 2);
7176 rela.r_info = ELF32_R_INFO (htab->elf.hgot->indx,
7177 R_PPC_ADDR16_HA);
7178 rela.r_addend = got_offset;
7179 bfd_elf32_swap_reloca_out (output_bfd, &rela, loc);
7180 loc += sizeof (Elf32_External_Rela);
7181
7182 /* Provide the @l relocation for the second instruction. */
7183 rela.r_offset = (htab->plt->output_section->vma
7184 + htab->plt->output_offset
7185 + ent->plt.offset + 6);
7186 rela.r_info = ELF32_R_INFO (htab->elf.hgot->indx,
7187 R_PPC_ADDR16_LO);
7188 rela.r_addend = got_offset;
7189 bfd_elf32_swap_reloca_out (output_bfd, &rela, loc);
7190 loc += sizeof (Elf32_External_Rela);
7191
7192 /* Provide a relocation for the GOT entry corresponding to this
7193 PLT slot. Point it at the middle of the .plt entry. */
7194 rela.r_offset = (htab->sgotplt->output_section->vma
7195 + htab->sgotplt->output_offset
7196 + got_offset);
7197 rela.r_info = ELF32_R_INFO (htab->elf.hplt->indx,
7198 R_PPC_ADDR32);
7199 rela.r_addend = ent->plt.offset + 16;
7200 bfd_elf32_swap_reloca_out (output_bfd, &rela, loc);
7201 }
7202
7203 /* VxWorks uses non-standard semantics for R_PPC_JMP_SLOT.
7204 In particular, the offset for the relocation is not the
7205 address of the PLT entry for this function, as specified
7206 by the ABI. Instead, the offset is set to the address of
7207 the GOT slot for this function. See EABI 4.4.4.1. */
7208 rela.r_offset = (htab->sgotplt->output_section->vma
7209 + htab->sgotplt->output_offset
7210 + got_offset);
7211
7212 }
7213 else
7214 {
7215 rela.r_offset = (htab->plt->output_section->vma
7216 + htab->plt->output_offset
7217 + ent->plt.offset);
7218 if (htab->plt_type == PLT_OLD)
7219 {
7220 /* We don't need to fill in the .plt. The ppc dynamic
7221 linker will fill it in. */
7222 }
7223 else
7224 {
7225 bfd_vma val = (htab->glink_pltresolve + ent->plt.offset
7226 + htab->glink->output_section->vma
7227 + htab->glink->output_offset);
7228 bfd_put_32 (output_bfd, val,
7229 htab->plt->contents + ent->plt.offset);
7230 }
7231 }
7232
7233 /* Fill in the entry in the .rela.plt section. */
7234 rela.r_info = ELF32_R_INFO (h->dynindx, R_PPC_JMP_SLOT);
7235 rela.r_addend = 0;
7236
7237 loc = (htab->relplt->contents
7238 + reloc_index * sizeof (Elf32_External_Rela));
7239 bfd_elf32_swap_reloca_out (output_bfd, &rela, loc);
7240
7241 if (!h->def_regular)
7242 {
7243 /* Mark the symbol as undefined, rather than as
7244 defined in the .plt section. Leave the value if
7245 there were any relocations where pointer equality
7246 matters (this is a clue for the dynamic linker, to
7247 make function pointer comparisons work between an
7248 application and shared library), otherwise set it
7249 to zero. */
7250 sym->st_shndx = SHN_UNDEF;
7251 if (!h->pointer_equality_needed)
7252 sym->st_value = 0;
7253 else if (!h->ref_regular_nonweak)
7254 {
7255 /* This breaks function pointer comparisons, but
7256 that is better than breaking tests for a NULL
7257 function pointer. */
7258 sym->st_value = 0;
7259 }
7260 }
7261 doneone = TRUE;
7262 }
7263
7264 if (htab->plt_type == PLT_NEW)
7265 {
7266 bfd_vma plt;
7267 unsigned char *p;
7268
7269 plt = (ent->plt.offset
7270 + htab->plt->output_section->vma
7271 + htab->plt->output_offset);
7272 p = (unsigned char *) htab->glink->contents + ent->glink_offset;
7273
7274 if (info->shared || info->pie)
7275 {
7276 bfd_vma got = 0;
7277
7278 if (ent->addend >= 32768)
7279 got = (ent->addend
7280 + ent->sec->output_section->vma
7281 + ent->sec->output_offset);
7282 else if (htab->elf.hgot != NULL)
7283 got = (htab->elf.hgot->root.u.def.value
7284 + htab->elf.hgot->root.u.def.section->output_section->vma
7285 + htab->elf.hgot->root.u.def.section->output_offset);
7286
7287 plt -= got;
7288
7289 if (plt + 0x8000 < 0x10000)
7290 {
7291 bfd_put_32 (output_bfd, LWZ_11_30 + PPC_LO (plt), p);
7292 p += 4;
7293 bfd_put_32 (output_bfd, MTCTR_11, p);
7294 p += 4;
7295 bfd_put_32 (output_bfd, BCTR, p);
7296 p += 4;
7297 bfd_put_32 (output_bfd, NOP, p);
7298 p += 4;
7299 }
7300 else
7301 {
7302 bfd_put_32 (output_bfd, ADDIS_11_30 + PPC_HA (plt), p);
7303 p += 4;
7304 bfd_put_32 (output_bfd, LWZ_11_11 + PPC_LO (plt), p);
7305 p += 4;
7306 bfd_put_32 (output_bfd, MTCTR_11, p);
7307 p += 4;
7308 bfd_put_32 (output_bfd, BCTR, p);
7309 p += 4;
7310 }
7311 }
7312 else
7313 {
7314 bfd_put_32 (output_bfd, LIS_11 + PPC_HA (plt), p);
7315 p += 4;
7316 bfd_put_32 (output_bfd, LWZ_11_11 + PPC_LO (plt), p);
7317 p += 4;
7318 bfd_put_32 (output_bfd, MTCTR_11, p);
7319 p += 4;
7320 bfd_put_32 (output_bfd, BCTR, p);
7321 p += 4;
7322
7323 /* We only need one non-PIC glink stub. */
7324 break;
7325 }
7326 }
7327 else
7328 break;
7329 }
7330
7331 if (h->needs_copy)
7332 {
7333 asection *s;
7334 Elf_Internal_Rela rela;
7335 bfd_byte *loc;
7336
7337 /* This symbols needs a copy reloc. Set it up. */
7338
7339 #ifdef DEBUG
7340 fprintf (stderr, ", copy");
7341 #endif
7342
7343 BFD_ASSERT (h->dynindx != -1);
7344
7345 if (ppc_elf_hash_entry (h)->has_sda_refs)
7346 s = htab->relsbss;
7347 else
7348 s = htab->relbss;
7349 BFD_ASSERT (s != NULL);
7350
7351 rela.r_offset = (h->root.u.def.value
7352 + h->root.u.def.section->output_section->vma
7353 + h->root.u.def.section->output_offset);
7354 rela.r_info = ELF32_R_INFO (h->dynindx, R_PPC_COPY);
7355 rela.r_addend = 0;
7356 loc = s->contents + s->reloc_count++ * sizeof (Elf32_External_Rela);
7357 bfd_elf32_swap_reloca_out (output_bfd, &rela, loc);
7358 }
7359
7360 #ifdef DEBUG
7361 fprintf (stderr, "\n");
7362 #endif
7363
7364 /* Mark some specially defined symbols as absolute. */
7365 if (strcmp (h->root.root.string, "_DYNAMIC") == 0
7366 || (!htab->is_vxworks
7367 && (h == htab->elf.hgot
7368 || strcmp (h->root.root.string,
7369 "_PROCEDURE_LINKAGE_TABLE_") == 0)))
7370 sym->st_shndx = SHN_ABS;
7371
7372 return TRUE;
7373 }
7374 \f
7375 static enum elf_reloc_type_class
7376 ppc_elf_reloc_type_class (const Elf_Internal_Rela *rela)
7377 {
7378 switch (ELF32_R_TYPE (rela->r_info))
7379 {
7380 case R_PPC_RELATIVE:
7381 return reloc_class_relative;
7382 case R_PPC_REL24:
7383 case R_PPC_ADDR24:
7384 case R_PPC_JMP_SLOT:
7385 return reloc_class_plt;
7386 case R_PPC_COPY:
7387 return reloc_class_copy;
7388 default:
7389 return reloc_class_normal;
7390 }
7391 }
7392 \f
7393 /* Finish up the dynamic sections. */
7394
7395 static bfd_boolean
7396 ppc_elf_finish_dynamic_sections (bfd *output_bfd,
7397 struct bfd_link_info *info)
7398 {
7399 asection *sdyn;
7400 asection *splt;
7401 struct ppc_elf_link_hash_table *htab;
7402 bfd_vma got;
7403 bfd * dynobj;
7404
7405 #ifdef DEBUG
7406 fprintf (stderr, "ppc_elf_finish_dynamic_sections called\n");
7407 #endif
7408
7409 htab = ppc_elf_hash_table (info);
7410 dynobj = elf_hash_table (info)->dynobj;
7411 sdyn = bfd_get_section_by_name (dynobj, ".dynamic");
7412 if (htab->is_vxworks)
7413 splt = bfd_get_section_by_name (dynobj, ".plt");
7414 else
7415 splt = NULL;
7416
7417 got = 0;
7418 if (htab->elf.hgot != NULL)
7419 got = (htab->elf.hgot->root.u.def.value
7420 + htab->elf.hgot->root.u.def.section->output_section->vma
7421 + htab->elf.hgot->root.u.def.section->output_offset);
7422
7423 if (htab->elf.dynamic_sections_created)
7424 {
7425 Elf32_External_Dyn *dyncon, *dynconend;
7426
7427 BFD_ASSERT (htab->plt != NULL && sdyn != NULL);
7428
7429 dyncon = (Elf32_External_Dyn *) sdyn->contents;
7430 dynconend = (Elf32_External_Dyn *) (sdyn->contents + sdyn->size);
7431 for (; dyncon < dynconend; dyncon++)
7432 {
7433 Elf_Internal_Dyn dyn;
7434 asection *s;
7435
7436 bfd_elf32_swap_dyn_in (dynobj, dyncon, &dyn);
7437
7438 switch (dyn.d_tag)
7439 {
7440 case DT_PLTGOT:
7441 if (htab->is_vxworks)
7442 s = htab->sgotplt;
7443 else
7444 s = htab->plt;
7445 dyn.d_un.d_ptr = s->output_section->vma + s->output_offset;
7446 break;
7447
7448 case DT_PLTRELSZ:
7449 dyn.d_un.d_val = htab->relplt->size;
7450 break;
7451
7452 case DT_JMPREL:
7453 s = htab->relplt;
7454 dyn.d_un.d_ptr = s->output_section->vma + s->output_offset;
7455 break;
7456
7457 case DT_PPC_GOT:
7458 dyn.d_un.d_ptr = got;
7459 break;
7460
7461 case DT_RELASZ:
7462 if (htab->is_vxworks)
7463 {
7464 if (htab->relplt)
7465 dyn.d_un.d_ptr -= htab->relplt->size;
7466 break;
7467 }
7468 continue;
7469
7470 default:
7471 if (htab->is_vxworks
7472 && elf_vxworks_finish_dynamic_entry (output_bfd, &dyn))
7473 break;
7474 continue;
7475 }
7476
7477 bfd_elf32_swap_dyn_out (output_bfd, &dyn, dyncon);
7478 }
7479 }
7480
7481 /* Add a blrl instruction at _GLOBAL_OFFSET_TABLE_-4 so that a function can
7482 easily find the address of the _GLOBAL_OFFSET_TABLE_. */
7483 if (htab->got != NULL)
7484 {
7485 unsigned char *p = htab->got->contents;
7486 bfd_vma val;
7487
7488 p += htab->elf.hgot->root.u.def.value;
7489 if (htab->plt_type == PLT_OLD)
7490 bfd_put_32 (output_bfd, 0x4e800021 /* blrl */, p - 4);
7491
7492 val = 0;
7493 if (sdyn != NULL)
7494 val = sdyn->output_section->vma + sdyn->output_offset;
7495 bfd_put_32 (output_bfd, val, p);
7496
7497 elf_section_data (htab->got->output_section)->this_hdr.sh_entsize = 4;
7498 }
7499
7500 /* Fill in the first entry in the VxWorks procedure linkage table. */
7501 if (splt && splt->size > 0)
7502 {
7503 /* Use the right PLT. */
7504 static const bfd_vma *plt_entry = NULL;
7505 plt_entry = info->shared ?
7506 ppc_elf_vxworks_pic_plt0_entry : ppc_elf_vxworks_plt0_entry;
7507
7508 if (!info->shared)
7509 {
7510 bfd_vma got_value =
7511 (htab->elf.hgot->root.u.def.section->output_section->vma
7512 + htab->elf.hgot->root.u.def.section->output_offset
7513 + htab->elf.hgot->root.u.def.value);
7514 bfd_vma got_hi = (got_value >> 16) + ((got_value & 0x8000) >> 15);
7515
7516 bfd_put_32 (output_bfd, plt_entry[0] | (got_hi & 0xffff),
7517 splt->contents + 0);
7518 bfd_put_32 (output_bfd, plt_entry[1] | (got_value & 0xffff),
7519 splt->contents + 4);
7520 }
7521 else
7522 {
7523 bfd_put_32 (output_bfd, plt_entry[0], splt->contents + 0);
7524 bfd_put_32 (output_bfd, plt_entry[1], splt->contents + 4);
7525 }
7526 bfd_put_32 (output_bfd, plt_entry[2], splt->contents + 8);
7527 bfd_put_32 (output_bfd, plt_entry[3], splt->contents + 12);
7528 bfd_put_32 (output_bfd, plt_entry[4], splt->contents + 16);
7529 bfd_put_32 (output_bfd, plt_entry[5], splt->contents + 20);
7530 bfd_put_32 (output_bfd, plt_entry[6], splt->contents + 24);
7531 bfd_put_32 (output_bfd, plt_entry[7], splt->contents + 28);
7532
7533 if (! info->shared)
7534 {
7535 Elf_Internal_Rela rela;
7536 bfd_byte *loc;
7537
7538 loc = htab->srelplt2->contents;
7539
7540 /* Output the @ha relocation for the first instruction. */
7541 rela.r_offset = (htab->plt->output_section->vma
7542 + htab->plt->output_offset
7543 + 2);
7544 rela.r_info = ELF32_R_INFO (htab->elf.hgot->indx, R_PPC_ADDR16_HA);
7545 rela.r_addend = 0;
7546 bfd_elf32_swap_reloca_out (output_bfd, &rela, loc);
7547 loc += sizeof (Elf32_External_Rela);
7548
7549 /* Output the @l relocation for the second instruction. */
7550 rela.r_offset = (htab->plt->output_section->vma
7551 + htab->plt->output_offset
7552 + 6);
7553 rela.r_info = ELF32_R_INFO (htab->elf.hgot->indx, R_PPC_ADDR16_LO);
7554 rela.r_addend = 0;
7555 bfd_elf32_swap_reloca_out (output_bfd, &rela, loc);
7556 loc += sizeof (Elf32_External_Rela);
7557
7558 /* Fix up the remaining relocations. They may have the wrong
7559 symbol index for _G_O_T_ or _P_L_T_ depending on the order
7560 in which symbols were output. */
7561 while (loc < htab->srelplt2->contents + htab->srelplt2->size)
7562 {
7563 Elf_Internal_Rela rel;
7564
7565 bfd_elf32_swap_reloc_in (output_bfd, loc, &rel);
7566 rel.r_info = ELF32_R_INFO (htab->elf.hgot->indx, R_PPC_ADDR16_HA);
7567 bfd_elf32_swap_reloc_out (output_bfd, &rel, loc);
7568 loc += sizeof (Elf32_External_Rela);
7569
7570 bfd_elf32_swap_reloc_in (output_bfd, loc, &rel);
7571 rel.r_info = ELF32_R_INFO (htab->elf.hgot->indx, R_PPC_ADDR16_LO);
7572 bfd_elf32_swap_reloc_out (output_bfd, &rel, loc);
7573 loc += sizeof (Elf32_External_Rela);
7574
7575 bfd_elf32_swap_reloc_in (output_bfd, loc, &rel);
7576 rel.r_info = ELF32_R_INFO (htab->elf.hplt->indx, R_PPC_ADDR32);
7577 bfd_elf32_swap_reloc_out (output_bfd, &rel, loc);
7578 loc += sizeof (Elf32_External_Rela);
7579 }
7580 }
7581 }
7582
7583 if (htab->glink != NULL && htab->glink->contents != NULL)
7584 {
7585 unsigned char *p;
7586 unsigned char *endp;
7587 bfd_vma res0;
7588 unsigned int i;
7589
7590 /*
7591 * PIC glink code is the following:
7592 *
7593 * # ith PLT code stub.
7594 * addis 11,30,(plt+(i-1)*4-got)@ha
7595 * lwz 11,(plt+(i-1)*4-got)@l(11)
7596 * mtctr 11
7597 * bctr
7598 *
7599 * # A table of branches, one for each plt entry.
7600 * # The idea is that the plt call stub loads ctr and r11 with these
7601 * # addresses, so (r11 - res_0) gives the plt index * 4.
7602 * res_0: b PLTresolve
7603 * res_1: b PLTresolve
7604 * .
7605 * # Some number of entries towards the end can be nops
7606 * res_n_m3: nop
7607 * res_n_m2: nop
7608 * res_n_m1:
7609 *
7610 * PLTresolve:
7611 * addis 11,11,(1f-res_0)@ha
7612 * mflr 0
7613 * bcl 20,31,1f
7614 * 1: addi 11,11,(1b-res_0)@l
7615 * mflr 12
7616 * mtlr 0
7617 * sub 11,11,12 # r11 = index * 4
7618 * addis 12,12,(got+4-1b)@ha
7619 * lwz 0,(got+4-1b)@l(12) # got[1] address of dl_runtime_resolve
7620 * lwz 12,(got+8-1b)@l(12) # got[2] contains the map address
7621 * mtctr 0
7622 * add 0,11,11
7623 * add 11,0,11 # r11 = index * 12 = reloc offset.
7624 * bctr
7625 */
7626 static const unsigned int pic_plt_resolve[] =
7627 {
7628 ADDIS_11_11,
7629 MFLR_0,
7630 BCL_20_31,
7631 ADDI_11_11,
7632 MFLR_12,
7633 MTLR_0,
7634 SUB_11_11_12,
7635 ADDIS_12_12,
7636 LWZ_0_12,
7637 LWZ_12_12,
7638 MTCTR_0,
7639 ADD_0_11_11,
7640 ADD_11_0_11,
7641 BCTR,
7642 NOP,
7643 NOP
7644 };
7645
7646 /*
7647 * Non-PIC glink code is a little simpler.
7648 *
7649 * # ith PLT code stub.
7650 * lis 11,(plt+(i-1)*4)@ha
7651 * lwz 11,(plt+(i-1)*4)@l(11)
7652 * mtctr 11
7653 * bctr
7654 *
7655 * The branch table is the same, then comes
7656 *
7657 * PLTresolve:
7658 * lis 12,(got+4)@ha
7659 * addis 11,11,(-res_0)@ha
7660 * lwz 0,(got+4)@l(12) # got[1] address of dl_runtime_resolve
7661 * addi 11,11,(-res_0)@l # r11 = index * 4
7662 * mtctr 0
7663 * add 0,11,11
7664 * lwz 12,(got+8)@l(12) # got[2] contains the map address
7665 * add 11,0,11 # r11 = index * 12 = reloc offset.
7666 * bctr
7667 */
7668 static const unsigned int plt_resolve[] =
7669 {
7670 LIS_12,
7671 ADDIS_11_11,
7672 LWZ_0_12,
7673 ADDI_11_11,
7674 MTCTR_0,
7675 ADD_0_11_11,
7676 LWZ_12_12,
7677 ADD_11_0_11,
7678 BCTR,
7679 NOP,
7680 NOP,
7681 NOP,
7682 NOP,
7683 NOP,
7684 NOP,
7685 NOP
7686 };
7687
7688 if (ARRAY_SIZE (pic_plt_resolve) != GLINK_PLTRESOLVE / 4)
7689 abort ();
7690 if (ARRAY_SIZE (plt_resolve) != GLINK_PLTRESOLVE / 4)
7691 abort ();
7692
7693 /* Build the branch table, one for each plt entry (less one),
7694 and perhaps some padding. */
7695 p = htab->glink->contents;
7696 p += htab->glink_pltresolve;
7697 endp = htab->glink->contents;
7698 endp += htab->glink->size - GLINK_PLTRESOLVE;
7699 while (p < endp - 8 * 4)
7700 {
7701 bfd_put_32 (output_bfd, B + endp - p, p);
7702 p += 4;
7703 }
7704 while (p < endp)
7705 {
7706 bfd_put_32 (output_bfd, NOP, p);
7707 p += 4;
7708 }
7709
7710 res0 = (htab->glink_pltresolve
7711 + htab->glink->output_section->vma
7712 + htab->glink->output_offset);
7713
7714 /* Last comes the PLTresolve stub. */
7715 if (info->shared || info->pie)
7716 {
7717 bfd_vma bcl;
7718
7719 for (i = 0; i < ARRAY_SIZE (pic_plt_resolve); i++)
7720 {
7721 bfd_put_32 (output_bfd, pic_plt_resolve[i], p);
7722 p += 4;
7723 }
7724 p -= 4 * ARRAY_SIZE (pic_plt_resolve);
7725
7726 bcl = (htab->glink->size - GLINK_PLTRESOLVE + 3*4
7727 + htab->glink->output_section->vma
7728 + htab->glink->output_offset);
7729
7730 bfd_put_32 (output_bfd,
7731 ADDIS_11_11 + PPC_HA (bcl - res0), p + 0*4);
7732 bfd_put_32 (output_bfd,
7733 ADDI_11_11 + PPC_LO (bcl - res0), p + 3*4);
7734 bfd_put_32 (output_bfd,
7735 ADDIS_12_12 + PPC_HA (got + 4 - bcl), p + 7*4);
7736 if (PPC_HA (got + 4 - bcl) == PPC_HA (got + 8 - bcl))
7737 {
7738 bfd_put_32 (output_bfd,
7739 LWZ_0_12 + PPC_LO (got + 4 - bcl), p + 8*4);
7740 bfd_put_32 (output_bfd,
7741 LWZ_12_12 + PPC_LO (got + 8 - bcl), p + 9*4);
7742 }
7743 else
7744 {
7745 bfd_put_32 (output_bfd,
7746 LWZU_0_12 + PPC_LO (got + 4 - bcl), p + 8*4);
7747 bfd_put_32 (output_bfd,
7748 LWZ_12_12 + 4, p + 9*4);
7749 }
7750 }
7751 else
7752 {
7753 for (i = 0; i < ARRAY_SIZE (plt_resolve); i++)
7754 {
7755 bfd_put_32 (output_bfd, plt_resolve[i], p);
7756 p += 4;
7757 }
7758 p -= 4 * ARRAY_SIZE (plt_resolve);
7759
7760 bfd_put_32 (output_bfd,
7761 LIS_12 + PPC_HA (got + 4), p + 0*4);
7762 bfd_put_32 (output_bfd,
7763 ADDIS_11_11 + PPC_HA (-res0), p + 1*4);
7764 bfd_put_32 (output_bfd,
7765 ADDI_11_11 + PPC_LO (-res0), p + 3*4);
7766 if (PPC_HA (got + 4) == PPC_HA (got + 8))
7767 {
7768 bfd_put_32 (output_bfd,
7769 LWZ_0_12 + PPC_LO (got + 4), p + 2*4);
7770 bfd_put_32 (output_bfd,
7771 LWZ_12_12 + PPC_LO (got + 8), p + 6*4);
7772 }
7773 else
7774 {
7775 bfd_put_32 (output_bfd,
7776 LWZU_0_12 + PPC_LO (got + 4), p + 2*4);
7777 bfd_put_32 (output_bfd,
7778 LWZ_12_12 + 4, p + 6*4);
7779 }
7780 }
7781 }
7782
7783 return TRUE;
7784 }
7785 \f
7786 #define TARGET_LITTLE_SYM bfd_elf32_powerpcle_vec
7787 #define TARGET_LITTLE_NAME "elf32-powerpcle"
7788 #define TARGET_BIG_SYM bfd_elf32_powerpc_vec
7789 #define TARGET_BIG_NAME "elf32-powerpc"
7790 #define ELF_ARCH bfd_arch_powerpc
7791 #define ELF_MACHINE_CODE EM_PPC
7792 #ifdef __QNXTARGET__
7793 #define ELF_MAXPAGESIZE 0x1000
7794 #else
7795 #define ELF_MAXPAGESIZE 0x10000
7796 #endif
7797 #define ELF_MINPAGESIZE 0x1000
7798 #define ELF_COMMONPAGESIZE 0x1000
7799 #define elf_info_to_howto ppc_elf_info_to_howto
7800
7801 #ifdef EM_CYGNUS_POWERPC
7802 #define ELF_MACHINE_ALT1 EM_CYGNUS_POWERPC
7803 #endif
7804
7805 #ifdef EM_PPC_OLD
7806 #define ELF_MACHINE_ALT2 EM_PPC_OLD
7807 #endif
7808
7809 #define elf_backend_plt_not_loaded 1
7810 #define elf_backend_can_gc_sections 1
7811 #define elf_backend_can_refcount 1
7812 #define elf_backend_rela_normal 1
7813
7814 #define bfd_elf32_mkobject ppc_elf_mkobject
7815 #define bfd_elf32_bfd_merge_private_bfd_data ppc_elf_merge_private_bfd_data
7816 #define bfd_elf32_bfd_relax_section ppc_elf_relax_section
7817 #define bfd_elf32_bfd_reloc_type_lookup ppc_elf_reloc_type_lookup
7818 #define bfd_elf32_bfd_reloc_name_lookup ppc_elf_reloc_name_lookup
7819 #define bfd_elf32_bfd_set_private_flags ppc_elf_set_private_flags
7820 #define bfd_elf32_bfd_link_hash_table_create ppc_elf_link_hash_table_create
7821
7822 #define elf_backend_object_p ppc_elf_object_p
7823 #define elf_backend_gc_mark_hook ppc_elf_gc_mark_hook
7824 #define elf_backend_gc_sweep_hook ppc_elf_gc_sweep_hook
7825 #define elf_backend_section_from_shdr ppc_elf_section_from_shdr
7826 #define elf_backend_relocate_section ppc_elf_relocate_section
7827 #define elf_backend_create_dynamic_sections ppc_elf_create_dynamic_sections
7828 #define elf_backend_check_relocs ppc_elf_check_relocs
7829 #define elf_backend_copy_indirect_symbol ppc_elf_copy_indirect_symbol
7830 #define elf_backend_adjust_dynamic_symbol ppc_elf_adjust_dynamic_symbol
7831 #define elf_backend_add_symbol_hook ppc_elf_add_symbol_hook
7832 #define elf_backend_size_dynamic_sections ppc_elf_size_dynamic_sections
7833 #define elf_backend_hash_symbol ppc_elf_hash_symbol
7834 #define elf_backend_finish_dynamic_symbol ppc_elf_finish_dynamic_symbol
7835 #define elf_backend_finish_dynamic_sections ppc_elf_finish_dynamic_sections
7836 #define elf_backend_fake_sections ppc_elf_fake_sections
7837 #define elf_backend_additional_program_headers ppc_elf_additional_program_headers
7838 #define elf_backend_grok_prstatus ppc_elf_grok_prstatus
7839 #define elf_backend_grok_psinfo ppc_elf_grok_psinfo
7840 #define elf_backend_write_core_note ppc_elf_write_core_note
7841 #define elf_backend_reloc_type_class ppc_elf_reloc_type_class
7842 #define elf_backend_begin_write_processing ppc_elf_begin_write_processing
7843 #define elf_backend_final_write_processing ppc_elf_final_write_processing
7844 #define elf_backend_write_section ppc_elf_write_section
7845 #define elf_backend_get_sec_type_attr ppc_elf_get_sec_type_attr
7846 #define elf_backend_plt_sym_val ppc_elf_plt_sym_val
7847 #define elf_backend_action_discarded ppc_elf_action_discarded
7848 #define elf_backend_init_index_section _bfd_elf_init_1_index_section
7849
7850 #include "elf32-target.h"
7851
7852 /* VxWorks Target */
7853
7854 #undef TARGET_LITTLE_SYM
7855 #undef TARGET_LITTLE_NAME
7856
7857 #undef TARGET_BIG_SYM
7858 #define TARGET_BIG_SYM bfd_elf32_powerpc_vxworks_vec
7859 #undef TARGET_BIG_NAME
7860 #define TARGET_BIG_NAME "elf32-powerpc-vxworks"
7861
7862 /* VxWorks uses the elf default section flags for .plt. */
7863 static const struct bfd_elf_special_section *
7864 ppc_elf_vxworks_get_sec_type_attr (bfd *abfd ATTRIBUTE_UNUSED, asection *sec)
7865 {
7866 if (sec->name == NULL)
7867 return NULL;
7868
7869 if (strcmp (sec->name, ".plt") == 0)
7870 return _bfd_elf_get_sec_type_attr (abfd, sec);
7871
7872 return ppc_elf_get_sec_type_attr (abfd, sec);
7873 }
7874
7875 /* Like ppc_elf_link_hash_table_create, but overrides
7876 appropriately for VxWorks. */
7877 static struct bfd_link_hash_table *
7878 ppc_elf_vxworks_link_hash_table_create (bfd *abfd)
7879 {
7880 struct bfd_link_hash_table *ret;
7881
7882 ret = ppc_elf_link_hash_table_create (abfd);
7883 if (ret)
7884 {
7885 struct ppc_elf_link_hash_table *htab
7886 = (struct ppc_elf_link_hash_table *)ret;
7887 htab->is_vxworks = 1;
7888 htab->plt_type = PLT_VXWORKS;
7889 htab->plt_entry_size = VXWORKS_PLT_ENTRY_SIZE;
7890 htab->plt_slot_size = VXWORKS_PLT_ENTRY_SIZE;
7891 htab->plt_initial_entry_size = VXWORKS_PLT_INITIAL_ENTRY_SIZE;
7892 }
7893 return ret;
7894 }
7895
7896 /* Tweak magic VxWorks symbols as they are loaded. */
7897 static bfd_boolean
7898 ppc_elf_vxworks_add_symbol_hook (bfd *abfd,
7899 struct bfd_link_info *info,
7900 Elf_Internal_Sym *sym,
7901 const char **namep ATTRIBUTE_UNUSED,
7902 flagword *flagsp ATTRIBUTE_UNUSED,
7903 asection **secp,
7904 bfd_vma *valp)
7905 {
7906 if (!elf_vxworks_add_symbol_hook(abfd, info, sym,namep, flagsp, secp,
7907 valp))
7908 return FALSE;
7909
7910 return ppc_elf_add_symbol_hook(abfd, info, sym,namep, flagsp, secp, valp);
7911 }
7912
7913 static void
7914 ppc_elf_vxworks_final_write_processing (bfd *abfd, bfd_boolean linker)
7915 {
7916 ppc_elf_final_write_processing(abfd, linker);
7917 elf_vxworks_final_write_processing(abfd, linker);
7918 }
7919
7920 /* On VxWorks, we emit relocations against _PROCEDURE_LINKAGE_TABLE_, so
7921 define it. */
7922 #undef elf_backend_want_plt_sym
7923 #define elf_backend_want_plt_sym 1
7924 #undef elf_backend_want_got_plt
7925 #define elf_backend_want_got_plt 1
7926 #undef elf_backend_got_symbol_offset
7927 #define elf_backend_got_symbol_offset 0
7928 #undef elf_backend_plt_not_loaded
7929 #define elf_backend_plt_not_loaded 0
7930 #undef elf_backend_plt_readonly
7931 #define elf_backend_plt_readonly 1
7932 #undef elf_backend_got_header_size
7933 #define elf_backend_got_header_size 12
7934
7935 #undef bfd_elf32_bfd_link_hash_table_create
7936 #define bfd_elf32_bfd_link_hash_table_create \
7937 ppc_elf_vxworks_link_hash_table_create
7938 #undef elf_backend_add_symbol_hook
7939 #define elf_backend_add_symbol_hook \
7940 ppc_elf_vxworks_add_symbol_hook
7941 #undef elf_backend_link_output_symbol_hook
7942 #define elf_backend_link_output_symbol_hook \
7943 elf_vxworks_link_output_symbol_hook
7944 #undef elf_backend_final_write_processing
7945 #define elf_backend_final_write_processing \
7946 ppc_elf_vxworks_final_write_processing
7947 #undef elf_backend_get_sec_type_attr
7948 #define elf_backend_get_sec_type_attr \
7949 ppc_elf_vxworks_get_sec_type_attr
7950 #undef elf_backend_emit_relocs
7951 #define elf_backend_emit_relocs \
7952 elf_vxworks_emit_relocs
7953
7954 #undef elf32_bed
7955 #define elf32_bed ppc_elf_vxworks_bed
7956
7957 #include "elf32-target.h"
This page took 0.187115 seconds and 5 git commands to generate.