PowerPC inline PLT call support
[deliverable/binutils-gdb.git] / bfd / elf32-ppc.c
1 /* PowerPC-specific support for 32-bit ELF
2 Copyright (C) 1994-2018 Free Software Foundation, Inc.
3 Written by Ian Lance Taylor, Cygnus Support.
4
5 This file is part of BFD, the Binary File Descriptor library.
6
7 This program is free software; you can redistribute it and/or modify
8 it under the terms of the GNU General Public License as published by
9 the Free Software Foundation; either version 3 of the License, or
10 (at your option) any later version.
11
12 This program is distributed in the hope that it will be useful,
13 but WITHOUT ANY WARRANTY; without even the implied warranty of
14 MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
15 GNU General Public License for more details.
16
17 You should have received a copy of the GNU General Public License
18 along with this program; if not, write to the
19 Free Software Foundation, Inc., 51 Franklin Street - Fifth Floor,
20 Boston, MA 02110-1301, USA. */
21
22
23 /* This file is based on a preliminary PowerPC ELF ABI. The
24 information may not match the final PowerPC ELF ABI. It includes
25 suggestions from the in-progress Embedded PowerPC ABI, and that
26 information may also not match. */
27
28 #include "sysdep.h"
29 #include <stdarg.h>
30 #include "bfd.h"
31 #include "bfdlink.h"
32 #include "libbfd.h"
33 #include "elf-bfd.h"
34 #include "elf/ppc.h"
35 #include "elf32-ppc.h"
36 #include "elf-vxworks.h"
37 #include "dwarf2.h"
38 #include "opcode/ppc.h"
39
40 typedef enum split16_format_type
41 {
42 split16a_type = 0,
43 split16d_type
44 }
45 split16_format_type;
46
47 /* RELA relocations are used here. */
48
49 static bfd_reloc_status_type ppc_elf_addr16_ha_reloc
50 (bfd *, arelent *, asymbol *, void *, asection *, bfd *, char **);
51 static bfd_reloc_status_type ppc_elf_unhandled_reloc
52 (bfd *, arelent *, asymbol *, void *, asection *, bfd *, char **);
53
54 /* Branch prediction bit for branch taken relocs. */
55 #define BRANCH_PREDICT_BIT 0x200000
56 /* Mask to set RA in memory instructions. */
57 #define RA_REGISTER_MASK 0x001f0000
58 /* Value to shift register by to insert RA. */
59 #define RA_REGISTER_SHIFT 16
60
61 /* The name of the dynamic interpreter. This is put in the .interp
62 section. */
63 #define ELF_DYNAMIC_INTERPRETER "/usr/lib/ld.so.1"
64
65 /* For old-style PLT. */
66 /* The number of single-slot PLT entries (the rest use two slots). */
67 #define PLT_NUM_SINGLE_ENTRIES 8192
68
69 /* For new-style .glink and .plt. */
70 #define GLINK_PLTRESOLVE 16*4
71 #define GLINK_ENTRY_SIZE(htab, h) \
72 ((4*4 \
73 + (h != NULL \
74 && h == htab->tls_get_addr \
75 && !htab->params->no_tls_get_addr_opt ? 8*4 : 0) \
76 + (1u << htab->params->plt_stub_align) - 1) \
77 & -(1u << htab->params->plt_stub_align))
78
79 /* VxWorks uses its own plt layout, filled in by the static linker. */
80
81 /* The standard VxWorks PLT entry. */
82 #define VXWORKS_PLT_ENTRY_SIZE 32
83 static const bfd_vma ppc_elf_vxworks_plt_entry
84 [VXWORKS_PLT_ENTRY_SIZE / 4] =
85 {
86 0x3d800000, /* lis r12,0 */
87 0x818c0000, /* lwz r12,0(r12) */
88 0x7d8903a6, /* mtctr r12 */
89 0x4e800420, /* bctr */
90 0x39600000, /* li r11,0 */
91 0x48000000, /* b 14 <.PLT0resolve+0x4> */
92 0x60000000, /* nop */
93 0x60000000, /* nop */
94 };
95 static const bfd_vma ppc_elf_vxworks_pic_plt_entry
96 [VXWORKS_PLT_ENTRY_SIZE / 4] =
97 {
98 0x3d9e0000, /* addis r12,r30,0 */
99 0x818c0000, /* lwz r12,0(r12) */
100 0x7d8903a6, /* mtctr r12 */
101 0x4e800420, /* bctr */
102 0x39600000, /* li r11,0 */
103 0x48000000, /* b 14 <.PLT0resolve+0x4> 14: R_PPC_REL24 .PLTresolve */
104 0x60000000, /* nop */
105 0x60000000, /* nop */
106 };
107
108 /* The initial VxWorks PLT entry. */
109 #define VXWORKS_PLT_INITIAL_ENTRY_SIZE 32
110 static const bfd_vma ppc_elf_vxworks_plt0_entry
111 [VXWORKS_PLT_INITIAL_ENTRY_SIZE / 4] =
112 {
113 0x3d800000, /* lis r12,0 */
114 0x398c0000, /* addi r12,r12,0 */
115 0x800c0008, /* lwz r0,8(r12) */
116 0x7c0903a6, /* mtctr r0 */
117 0x818c0004, /* lwz r12,4(r12) */
118 0x4e800420, /* bctr */
119 0x60000000, /* nop */
120 0x60000000, /* nop */
121 };
122 static const bfd_vma ppc_elf_vxworks_pic_plt0_entry
123 [VXWORKS_PLT_INITIAL_ENTRY_SIZE / 4] =
124 {
125 0x819e0008, /* lwz r12,8(r30) */
126 0x7d8903a6, /* mtctr r12 */
127 0x819e0004, /* lwz r12,4(r30) */
128 0x4e800420, /* bctr */
129 0x60000000, /* nop */
130 0x60000000, /* nop */
131 0x60000000, /* nop */
132 0x60000000, /* nop */
133 };
134
135 /* For executables, we have some additional relocations in
136 .rela.plt.unloaded, for the kernel loader. */
137
138 /* The number of non-JMP_SLOT relocations per PLT0 slot. */
139 #define VXWORKS_PLT_NON_JMP_SLOT_RELOCS 3
140 /* The number of relocations in the PLTResolve slot. */
141 #define VXWORKS_PLTRESOLVE_RELOCS 2
142 /* The number of relocations in the PLTResolve slot when creating
143 a shared library. */
144 #define VXWORKS_PLTRESOLVE_RELOCS_SHLIB 0
145
146 /* Some instructions. */
147 #define ADDIS_11_11 0x3d6b0000
148 #define ADDIS_11_30 0x3d7e0000
149 #define ADDIS_12_12 0x3d8c0000
150 #define ADDI_11_11 0x396b0000
151 #define ADD_0_11_11 0x7c0b5a14
152 #define ADD_3_12_2 0x7c6c1214
153 #define ADD_11_0_11 0x7d605a14
154 #define B 0x48000000
155 #define BA 0x48000002
156 #define BCL_20_31 0x429f0005
157 #define BCTR 0x4e800420
158 #define BEQLR 0x4d820020
159 #define CMPWI_11_0 0x2c0b0000
160 #define LIS_11 0x3d600000
161 #define LIS_12 0x3d800000
162 #define LWZU_0_12 0x840c0000
163 #define LWZ_0_12 0x800c0000
164 #define LWZ_11_3 0x81630000
165 #define LWZ_11_11 0x816b0000
166 #define LWZ_11_30 0x817e0000
167 #define LWZ_12_3 0x81830000
168 #define LWZ_12_12 0x818c0000
169 #define MR_0_3 0x7c601b78
170 #define MR_3_0 0x7c030378
171 #define MFLR_0 0x7c0802a6
172 #define MFLR_12 0x7d8802a6
173 #define MTCTR_0 0x7c0903a6
174 #define MTCTR_11 0x7d6903a6
175 #define MTLR_0 0x7c0803a6
176 #define NOP 0x60000000
177 #define SUB_11_11_12 0x7d6c5850
178
179 /* Offset of tp and dtp pointers from start of TLS block. */
180 #define TP_OFFSET 0x7000
181 #define DTP_OFFSET 0x8000
182
183 /* The value of a defined global symbol. */
184 #define SYM_VAL(SYM) \
185 ((SYM)->root.u.def.section->output_section->vma \
186 + (SYM)->root.u.def.section->output_offset \
187 + (SYM)->root.u.def.value)
188 \f
189 static reloc_howto_type *ppc_elf_howto_table[R_PPC_max];
190
191 static reloc_howto_type ppc_elf_howto_raw[] = {
192 /* This reloc does nothing. */
193 HOWTO (R_PPC_NONE, /* type */
194 0, /* rightshift */
195 3, /* size (0 = byte, 1 = short, 2 = long) */
196 0, /* bitsize */
197 FALSE, /* pc_relative */
198 0, /* bitpos */
199 complain_overflow_dont, /* complain_on_overflow */
200 bfd_elf_generic_reloc, /* special_function */
201 "R_PPC_NONE", /* name */
202 FALSE, /* partial_inplace */
203 0, /* src_mask */
204 0, /* dst_mask */
205 FALSE), /* pcrel_offset */
206
207 /* A standard 32 bit relocation. */
208 HOWTO (R_PPC_ADDR32, /* type */
209 0, /* rightshift */
210 2, /* size (0 = byte, 1 = short, 2 = long) */
211 32, /* bitsize */
212 FALSE, /* pc_relative */
213 0, /* bitpos */
214 complain_overflow_dont, /* complain_on_overflow */
215 bfd_elf_generic_reloc, /* special_function */
216 "R_PPC_ADDR32", /* name */
217 FALSE, /* partial_inplace */
218 0, /* src_mask */
219 0xffffffff, /* dst_mask */
220 FALSE), /* pcrel_offset */
221
222 /* An absolute 26 bit branch; the lower two bits must be zero.
223 FIXME: we don't check that, we just clear them. */
224 HOWTO (R_PPC_ADDR24, /* type */
225 0, /* rightshift */
226 2, /* size (0 = byte, 1 = short, 2 = long) */
227 26, /* bitsize */
228 FALSE, /* pc_relative */
229 0, /* bitpos */
230 complain_overflow_signed, /* complain_on_overflow */
231 bfd_elf_generic_reloc, /* special_function */
232 "R_PPC_ADDR24", /* name */
233 FALSE, /* partial_inplace */
234 0, /* src_mask */
235 0x3fffffc, /* dst_mask */
236 FALSE), /* pcrel_offset */
237
238 /* A standard 16 bit relocation. */
239 HOWTO (R_PPC_ADDR16, /* type */
240 0, /* rightshift */
241 1, /* size (0 = byte, 1 = short, 2 = long) */
242 16, /* bitsize */
243 FALSE, /* pc_relative */
244 0, /* bitpos */
245 complain_overflow_bitfield, /* complain_on_overflow */
246 bfd_elf_generic_reloc, /* special_function */
247 "R_PPC_ADDR16", /* name */
248 FALSE, /* partial_inplace */
249 0, /* src_mask */
250 0xffff, /* dst_mask */
251 FALSE), /* pcrel_offset */
252
253 /* A 16 bit relocation without overflow. */
254 HOWTO (R_PPC_ADDR16_LO, /* type */
255 0, /* rightshift */
256 1, /* size (0 = byte, 1 = short, 2 = long) */
257 16, /* bitsize */
258 FALSE, /* pc_relative */
259 0, /* bitpos */
260 complain_overflow_dont,/* complain_on_overflow */
261 bfd_elf_generic_reloc, /* special_function */
262 "R_PPC_ADDR16_LO", /* name */
263 FALSE, /* partial_inplace */
264 0, /* src_mask */
265 0xffff, /* dst_mask */
266 FALSE), /* pcrel_offset */
267
268 /* The high order 16 bits of an address. */
269 HOWTO (R_PPC_ADDR16_HI, /* type */
270 16, /* rightshift */
271 1, /* size (0 = byte, 1 = short, 2 = long) */
272 16, /* bitsize */
273 FALSE, /* pc_relative */
274 0, /* bitpos */
275 complain_overflow_dont, /* complain_on_overflow */
276 bfd_elf_generic_reloc, /* special_function */
277 "R_PPC_ADDR16_HI", /* name */
278 FALSE, /* partial_inplace */
279 0, /* src_mask */
280 0xffff, /* dst_mask */
281 FALSE), /* pcrel_offset */
282
283 /* The high order 16 bits of an address, plus 1 if the contents of
284 the low 16 bits, treated as a signed number, is negative. */
285 HOWTO (R_PPC_ADDR16_HA, /* type */
286 16, /* rightshift */
287 1, /* size (0 = byte, 1 = short, 2 = long) */
288 16, /* bitsize */
289 FALSE, /* pc_relative */
290 0, /* bitpos */
291 complain_overflow_dont, /* complain_on_overflow */
292 ppc_elf_addr16_ha_reloc, /* special_function */
293 "R_PPC_ADDR16_HA", /* name */
294 FALSE, /* partial_inplace */
295 0, /* src_mask */
296 0xffff, /* dst_mask */
297 FALSE), /* pcrel_offset */
298
299 /* An absolute 16 bit branch; the lower two bits must be zero.
300 FIXME: we don't check that, we just clear them. */
301 HOWTO (R_PPC_ADDR14, /* type */
302 0, /* rightshift */
303 2, /* size (0 = byte, 1 = short, 2 = long) */
304 16, /* bitsize */
305 FALSE, /* pc_relative */
306 0, /* bitpos */
307 complain_overflow_signed, /* complain_on_overflow */
308 bfd_elf_generic_reloc, /* special_function */
309 "R_PPC_ADDR14", /* name */
310 FALSE, /* partial_inplace */
311 0, /* src_mask */
312 0xfffc, /* dst_mask */
313 FALSE), /* pcrel_offset */
314
315 /* An absolute 16 bit branch, for which bit 10 should be set to
316 indicate that the branch is expected to be taken. The lower two
317 bits must be zero. */
318 HOWTO (R_PPC_ADDR14_BRTAKEN, /* type */
319 0, /* rightshift */
320 2, /* size (0 = byte, 1 = short, 2 = long) */
321 16, /* bitsize */
322 FALSE, /* pc_relative */
323 0, /* bitpos */
324 complain_overflow_signed, /* complain_on_overflow */
325 bfd_elf_generic_reloc, /* special_function */
326 "R_PPC_ADDR14_BRTAKEN",/* name */
327 FALSE, /* partial_inplace */
328 0, /* src_mask */
329 0xfffc, /* dst_mask */
330 FALSE), /* pcrel_offset */
331
332 /* An absolute 16 bit branch, for which bit 10 should be set to
333 indicate that the branch is not expected to be taken. The lower
334 two bits must be zero. */
335 HOWTO (R_PPC_ADDR14_BRNTAKEN, /* type */
336 0, /* rightshift */
337 2, /* size (0 = byte, 1 = short, 2 = long) */
338 16, /* bitsize */
339 FALSE, /* pc_relative */
340 0, /* bitpos */
341 complain_overflow_signed, /* complain_on_overflow */
342 bfd_elf_generic_reloc, /* special_function */
343 "R_PPC_ADDR14_BRNTAKEN",/* name */
344 FALSE, /* partial_inplace */
345 0, /* src_mask */
346 0xfffc, /* dst_mask */
347 FALSE), /* pcrel_offset */
348
349 /* A relative 26 bit branch; the lower two bits must be zero. */
350 HOWTO (R_PPC_REL24, /* type */
351 0, /* rightshift */
352 2, /* size (0 = byte, 1 = short, 2 = long) */
353 26, /* bitsize */
354 TRUE, /* pc_relative */
355 0, /* bitpos */
356 complain_overflow_signed, /* complain_on_overflow */
357 bfd_elf_generic_reloc, /* special_function */
358 "R_PPC_REL24", /* name */
359 FALSE, /* partial_inplace */
360 0, /* src_mask */
361 0x3fffffc, /* dst_mask */
362 TRUE), /* pcrel_offset */
363
364 /* A relative 16 bit branch; the lower two bits must be zero. */
365 HOWTO (R_PPC_REL14, /* type */
366 0, /* rightshift */
367 2, /* size (0 = byte, 1 = short, 2 = long) */
368 16, /* bitsize */
369 TRUE, /* pc_relative */
370 0, /* bitpos */
371 complain_overflow_signed, /* complain_on_overflow */
372 bfd_elf_generic_reloc, /* special_function */
373 "R_PPC_REL14", /* name */
374 FALSE, /* partial_inplace */
375 0, /* src_mask */
376 0xfffc, /* dst_mask */
377 TRUE), /* pcrel_offset */
378
379 /* A relative 16 bit branch. Bit 10 should be set to indicate that
380 the branch is expected to be taken. The lower two bits must be
381 zero. */
382 HOWTO (R_PPC_REL14_BRTAKEN, /* type */
383 0, /* rightshift */
384 2, /* size (0 = byte, 1 = short, 2 = long) */
385 16, /* bitsize */
386 TRUE, /* pc_relative */
387 0, /* bitpos */
388 complain_overflow_signed, /* complain_on_overflow */
389 bfd_elf_generic_reloc, /* special_function */
390 "R_PPC_REL14_BRTAKEN", /* name */
391 FALSE, /* partial_inplace */
392 0, /* src_mask */
393 0xfffc, /* dst_mask */
394 TRUE), /* pcrel_offset */
395
396 /* A relative 16 bit branch. Bit 10 should be set to indicate that
397 the branch is not expected to be taken. The lower two bits must
398 be zero. */
399 HOWTO (R_PPC_REL14_BRNTAKEN, /* type */
400 0, /* rightshift */
401 2, /* size (0 = byte, 1 = short, 2 = long) */
402 16, /* bitsize */
403 TRUE, /* pc_relative */
404 0, /* bitpos */
405 complain_overflow_signed, /* complain_on_overflow */
406 bfd_elf_generic_reloc, /* special_function */
407 "R_PPC_REL14_BRNTAKEN",/* name */
408 FALSE, /* partial_inplace */
409 0, /* src_mask */
410 0xfffc, /* dst_mask */
411 TRUE), /* pcrel_offset */
412
413 /* Like R_PPC_ADDR16, but referring to the GOT table entry for the
414 symbol. */
415 HOWTO (R_PPC_GOT16, /* type */
416 0, /* rightshift */
417 1, /* size (0 = byte, 1 = short, 2 = long) */
418 16, /* bitsize */
419 FALSE, /* pc_relative */
420 0, /* bitpos */
421 complain_overflow_signed, /* complain_on_overflow */
422 ppc_elf_unhandled_reloc, /* special_function */
423 "R_PPC_GOT16", /* name */
424 FALSE, /* partial_inplace */
425 0, /* src_mask */
426 0xffff, /* dst_mask */
427 FALSE), /* pcrel_offset */
428
429 /* Like R_PPC_ADDR16_LO, but referring to the GOT table entry for
430 the symbol. */
431 HOWTO (R_PPC_GOT16_LO, /* type */
432 0, /* rightshift */
433 1, /* size (0 = byte, 1 = short, 2 = long) */
434 16, /* bitsize */
435 FALSE, /* pc_relative */
436 0, /* bitpos */
437 complain_overflow_dont, /* complain_on_overflow */
438 ppc_elf_unhandled_reloc, /* special_function */
439 "R_PPC_GOT16_LO", /* name */
440 FALSE, /* partial_inplace */
441 0, /* src_mask */
442 0xffff, /* dst_mask */
443 FALSE), /* pcrel_offset */
444
445 /* Like R_PPC_ADDR16_HI, but referring to the GOT table entry for
446 the symbol. */
447 HOWTO (R_PPC_GOT16_HI, /* type */
448 16, /* rightshift */
449 1, /* size (0 = byte, 1 = short, 2 = long) */
450 16, /* bitsize */
451 FALSE, /* pc_relative */
452 0, /* bitpos */
453 complain_overflow_dont, /* complain_on_overflow */
454 ppc_elf_unhandled_reloc, /* special_function */
455 "R_PPC_GOT16_HI", /* name */
456 FALSE, /* partial_inplace */
457 0, /* src_mask */
458 0xffff, /* dst_mask */
459 FALSE), /* pcrel_offset */
460
461 /* Like R_PPC_ADDR16_HA, but referring to the GOT table entry for
462 the symbol. */
463 HOWTO (R_PPC_GOT16_HA, /* type */
464 16, /* rightshift */
465 1, /* size (0 = byte, 1 = short, 2 = long) */
466 16, /* bitsize */
467 FALSE, /* pc_relative */
468 0, /* bitpos */
469 complain_overflow_dont, /* complain_on_overflow */
470 ppc_elf_unhandled_reloc, /* special_function */
471 "R_PPC_GOT16_HA", /* name */
472 FALSE, /* partial_inplace */
473 0, /* src_mask */
474 0xffff, /* dst_mask */
475 FALSE), /* pcrel_offset */
476
477 /* Like R_PPC_REL24, but referring to the procedure linkage table
478 entry for the symbol. */
479 HOWTO (R_PPC_PLTREL24, /* type */
480 0, /* rightshift */
481 2, /* size (0 = byte, 1 = short, 2 = long) */
482 26, /* bitsize */
483 TRUE, /* pc_relative */
484 0, /* bitpos */
485 complain_overflow_signed, /* complain_on_overflow */
486 ppc_elf_unhandled_reloc, /* special_function */
487 "R_PPC_PLTREL24", /* name */
488 FALSE, /* partial_inplace */
489 0, /* src_mask */
490 0x3fffffc, /* dst_mask */
491 TRUE), /* pcrel_offset */
492
493 /* This is used only by the dynamic linker. The symbol should exist
494 both in the object being run and in some shared library. The
495 dynamic linker copies the data addressed by the symbol from the
496 shared library into the object, because the object being
497 run has to have the data at some particular address. */
498 HOWTO (R_PPC_COPY, /* type */
499 0, /* rightshift */
500 2, /* size (0 = byte, 1 = short, 2 = long) */
501 32, /* bitsize */
502 FALSE, /* pc_relative */
503 0, /* bitpos */
504 complain_overflow_dont, /* complain_on_overflow */
505 ppc_elf_unhandled_reloc, /* special_function */
506 "R_PPC_COPY", /* name */
507 FALSE, /* partial_inplace */
508 0, /* src_mask */
509 0, /* dst_mask */
510 FALSE), /* pcrel_offset */
511
512 /* Like R_PPC_ADDR32, but used when setting global offset table
513 entries. */
514 HOWTO (R_PPC_GLOB_DAT, /* type */
515 0, /* rightshift */
516 2, /* size (0 = byte, 1 = short, 2 = long) */
517 32, /* bitsize */
518 FALSE, /* pc_relative */
519 0, /* bitpos */
520 complain_overflow_dont, /* complain_on_overflow */
521 ppc_elf_unhandled_reloc, /* special_function */
522 "R_PPC_GLOB_DAT", /* name */
523 FALSE, /* partial_inplace */
524 0, /* src_mask */
525 0xffffffff, /* dst_mask */
526 FALSE), /* pcrel_offset */
527
528 /* Marks a procedure linkage table entry for a symbol. */
529 HOWTO (R_PPC_JMP_SLOT, /* type */
530 0, /* rightshift */
531 2, /* size (0 = byte, 1 = short, 2 = long) */
532 32, /* bitsize */
533 FALSE, /* pc_relative */
534 0, /* bitpos */
535 complain_overflow_dont, /* complain_on_overflow */
536 ppc_elf_unhandled_reloc, /* special_function */
537 "R_PPC_JMP_SLOT", /* name */
538 FALSE, /* partial_inplace */
539 0, /* src_mask */
540 0, /* dst_mask */
541 FALSE), /* pcrel_offset */
542
543 /* Used only by the dynamic linker. When the object is run, this
544 longword is set to the load address of the object, plus the
545 addend. */
546 HOWTO (R_PPC_RELATIVE, /* type */
547 0, /* rightshift */
548 2, /* size (0 = byte, 1 = short, 2 = long) */
549 32, /* bitsize */
550 FALSE, /* pc_relative */
551 0, /* bitpos */
552 complain_overflow_dont, /* complain_on_overflow */
553 bfd_elf_generic_reloc, /* special_function */
554 "R_PPC_RELATIVE", /* name */
555 FALSE, /* partial_inplace */
556 0, /* src_mask */
557 0xffffffff, /* dst_mask */
558 FALSE), /* pcrel_offset */
559
560 /* Like R_PPC_REL24, but uses the value of the symbol within the
561 object rather than the final value. Normally used for
562 _GLOBAL_OFFSET_TABLE_. */
563 HOWTO (R_PPC_LOCAL24PC, /* type */
564 0, /* rightshift */
565 2, /* size (0 = byte, 1 = short, 2 = long) */
566 26, /* bitsize */
567 TRUE, /* pc_relative */
568 0, /* bitpos */
569 complain_overflow_signed, /* complain_on_overflow */
570 bfd_elf_generic_reloc, /* special_function */
571 "R_PPC_LOCAL24PC", /* name */
572 FALSE, /* partial_inplace */
573 0, /* src_mask */
574 0x3fffffc, /* dst_mask */
575 TRUE), /* pcrel_offset */
576
577 /* Like R_PPC_ADDR32, but may be unaligned. */
578 HOWTO (R_PPC_UADDR32, /* type */
579 0, /* rightshift */
580 2, /* size (0 = byte, 1 = short, 2 = long) */
581 32, /* bitsize */
582 FALSE, /* pc_relative */
583 0, /* bitpos */
584 complain_overflow_dont, /* complain_on_overflow */
585 bfd_elf_generic_reloc, /* special_function */
586 "R_PPC_UADDR32", /* name */
587 FALSE, /* partial_inplace */
588 0, /* src_mask */
589 0xffffffff, /* dst_mask */
590 FALSE), /* pcrel_offset */
591
592 /* Like R_PPC_ADDR16, but may be unaligned. */
593 HOWTO (R_PPC_UADDR16, /* type */
594 0, /* rightshift */
595 1, /* size (0 = byte, 1 = short, 2 = long) */
596 16, /* bitsize */
597 FALSE, /* pc_relative */
598 0, /* bitpos */
599 complain_overflow_bitfield, /* complain_on_overflow */
600 bfd_elf_generic_reloc, /* special_function */
601 "R_PPC_UADDR16", /* name */
602 FALSE, /* partial_inplace */
603 0, /* src_mask */
604 0xffff, /* dst_mask */
605 FALSE), /* pcrel_offset */
606
607 /* 32-bit PC relative */
608 HOWTO (R_PPC_REL32, /* type */
609 0, /* rightshift */
610 2, /* size (0 = byte, 1 = short, 2 = long) */
611 32, /* bitsize */
612 TRUE, /* pc_relative */
613 0, /* bitpos */
614 complain_overflow_dont, /* complain_on_overflow */
615 bfd_elf_generic_reloc, /* special_function */
616 "R_PPC_REL32", /* name */
617 FALSE, /* partial_inplace */
618 0, /* src_mask */
619 0xffffffff, /* dst_mask */
620 TRUE), /* pcrel_offset */
621
622 /* 32-bit relocation to the symbol's procedure linkage table.
623 FIXME: not supported. */
624 HOWTO (R_PPC_PLT32, /* type */
625 0, /* rightshift */
626 2, /* size (0 = byte, 1 = short, 2 = long) */
627 32, /* bitsize */
628 FALSE, /* pc_relative */
629 0, /* bitpos */
630 complain_overflow_dont, /* complain_on_overflow */
631 ppc_elf_unhandled_reloc, /* special_function */
632 "R_PPC_PLT32", /* name */
633 FALSE, /* partial_inplace */
634 0, /* src_mask */
635 0, /* dst_mask */
636 FALSE), /* pcrel_offset */
637
638 /* 32-bit PC relative relocation to the symbol's procedure linkage table.
639 FIXME: not supported. */
640 HOWTO (R_PPC_PLTREL32, /* type */
641 0, /* rightshift */
642 2, /* size (0 = byte, 1 = short, 2 = long) */
643 32, /* bitsize */
644 TRUE, /* pc_relative */
645 0, /* bitpos */
646 complain_overflow_dont, /* complain_on_overflow */
647 ppc_elf_unhandled_reloc, /* special_function */
648 "R_PPC_PLTREL32", /* name */
649 FALSE, /* partial_inplace */
650 0, /* src_mask */
651 0, /* dst_mask */
652 TRUE), /* pcrel_offset */
653
654 /* Like R_PPC_ADDR16_LO, but referring to the PLT table entry for
655 the symbol. */
656 HOWTO (R_PPC_PLT16_LO, /* type */
657 0, /* rightshift */
658 1, /* size (0 = byte, 1 = short, 2 = long) */
659 16, /* bitsize */
660 FALSE, /* pc_relative */
661 0, /* bitpos */
662 complain_overflow_dont, /* complain_on_overflow */
663 ppc_elf_unhandled_reloc, /* special_function */
664 "R_PPC_PLT16_LO", /* name */
665 FALSE, /* partial_inplace */
666 0, /* src_mask */
667 0xffff, /* dst_mask */
668 FALSE), /* pcrel_offset */
669
670 /* Like R_PPC_ADDR16_HI, but referring to the PLT table entry for
671 the symbol. */
672 HOWTO (R_PPC_PLT16_HI, /* type */
673 16, /* rightshift */
674 1, /* size (0 = byte, 1 = short, 2 = long) */
675 16, /* bitsize */
676 FALSE, /* pc_relative */
677 0, /* bitpos */
678 complain_overflow_dont, /* complain_on_overflow */
679 ppc_elf_unhandled_reloc, /* special_function */
680 "R_PPC_PLT16_HI", /* name */
681 FALSE, /* partial_inplace */
682 0, /* src_mask */
683 0xffff, /* dst_mask */
684 FALSE), /* pcrel_offset */
685
686 /* Like R_PPC_ADDR16_HA, but referring to the PLT table entry for
687 the symbol. */
688 HOWTO (R_PPC_PLT16_HA, /* type */
689 16, /* rightshift */
690 1, /* size (0 = byte, 1 = short, 2 = long) */
691 16, /* bitsize */
692 FALSE, /* pc_relative */
693 0, /* bitpos */
694 complain_overflow_dont, /* complain_on_overflow */
695 ppc_elf_unhandled_reloc, /* special_function */
696 "R_PPC_PLT16_HA", /* name */
697 FALSE, /* partial_inplace */
698 0, /* src_mask */
699 0xffff, /* dst_mask */
700 FALSE), /* pcrel_offset */
701
702 /* A sign-extended 16 bit value relative to _SDA_BASE_, for use with
703 small data items. */
704 HOWTO (R_PPC_SDAREL16, /* type */
705 0, /* rightshift */
706 1, /* size (0 = byte, 1 = short, 2 = long) */
707 16, /* bitsize */
708 FALSE, /* pc_relative */
709 0, /* bitpos */
710 complain_overflow_signed, /* complain_on_overflow */
711 ppc_elf_unhandled_reloc, /* special_function */
712 "R_PPC_SDAREL16", /* name */
713 FALSE, /* partial_inplace */
714 0, /* src_mask */
715 0xffff, /* dst_mask */
716 FALSE), /* pcrel_offset */
717
718 /* 16-bit section relative relocation. */
719 HOWTO (R_PPC_SECTOFF, /* type */
720 0, /* rightshift */
721 1, /* size (0 = byte, 1 = short, 2 = long) */
722 16, /* bitsize */
723 FALSE, /* pc_relative */
724 0, /* bitpos */
725 complain_overflow_signed, /* complain_on_overflow */
726 ppc_elf_unhandled_reloc, /* special_function */
727 "R_PPC_SECTOFF", /* name */
728 FALSE, /* partial_inplace */
729 0, /* src_mask */
730 0xffff, /* dst_mask */
731 FALSE), /* pcrel_offset */
732
733 /* 16-bit lower half section relative relocation. */
734 HOWTO (R_PPC_SECTOFF_LO, /* type */
735 0, /* rightshift */
736 1, /* size (0 = byte, 1 = short, 2 = long) */
737 16, /* bitsize */
738 FALSE, /* pc_relative */
739 0, /* bitpos */
740 complain_overflow_dont, /* complain_on_overflow */
741 ppc_elf_unhandled_reloc, /* special_function */
742 "R_PPC_SECTOFF_LO", /* name */
743 FALSE, /* partial_inplace */
744 0, /* src_mask */
745 0xffff, /* dst_mask */
746 FALSE), /* pcrel_offset */
747
748 /* 16-bit upper half section relative relocation. */
749 HOWTO (R_PPC_SECTOFF_HI, /* type */
750 16, /* rightshift */
751 1, /* size (0 = byte, 1 = short, 2 = long) */
752 16, /* bitsize */
753 FALSE, /* pc_relative */
754 0, /* bitpos */
755 complain_overflow_dont, /* complain_on_overflow */
756 ppc_elf_unhandled_reloc, /* special_function */
757 "R_PPC_SECTOFF_HI", /* name */
758 FALSE, /* partial_inplace */
759 0, /* src_mask */
760 0xffff, /* dst_mask */
761 FALSE), /* pcrel_offset */
762
763 /* 16-bit upper half adjusted section relative relocation. */
764 HOWTO (R_PPC_SECTOFF_HA, /* type */
765 16, /* rightshift */
766 1, /* size (0 = byte, 1 = short, 2 = long) */
767 16, /* bitsize */
768 FALSE, /* pc_relative */
769 0, /* bitpos */
770 complain_overflow_dont, /* complain_on_overflow */
771 ppc_elf_unhandled_reloc, /* special_function */
772 "R_PPC_SECTOFF_HA", /* name */
773 FALSE, /* partial_inplace */
774 0, /* src_mask */
775 0xffff, /* dst_mask */
776 FALSE), /* pcrel_offset */
777
778 /* Marker relocs for TLS. */
779 HOWTO (R_PPC_TLS,
780 0, /* rightshift */
781 2, /* size (0 = byte, 1 = short, 2 = long) */
782 32, /* bitsize */
783 FALSE, /* pc_relative */
784 0, /* bitpos */
785 complain_overflow_dont, /* complain_on_overflow */
786 bfd_elf_generic_reloc, /* special_function */
787 "R_PPC_TLS", /* name */
788 FALSE, /* partial_inplace */
789 0, /* src_mask */
790 0, /* dst_mask */
791 FALSE), /* pcrel_offset */
792
793 HOWTO (R_PPC_TLSGD,
794 0, /* rightshift */
795 2, /* size (0 = byte, 1 = short, 2 = long) */
796 32, /* bitsize */
797 FALSE, /* pc_relative */
798 0, /* bitpos */
799 complain_overflow_dont, /* complain_on_overflow */
800 bfd_elf_generic_reloc, /* special_function */
801 "R_PPC_TLSGD", /* name */
802 FALSE, /* partial_inplace */
803 0, /* src_mask */
804 0, /* dst_mask */
805 FALSE), /* pcrel_offset */
806
807 HOWTO (R_PPC_TLSLD,
808 0, /* rightshift */
809 2, /* size (0 = byte, 1 = short, 2 = long) */
810 32, /* bitsize */
811 FALSE, /* pc_relative */
812 0, /* bitpos */
813 complain_overflow_dont, /* complain_on_overflow */
814 bfd_elf_generic_reloc, /* special_function */
815 "R_PPC_TLSLD", /* name */
816 FALSE, /* partial_inplace */
817 0, /* src_mask */
818 0, /* dst_mask */
819 FALSE), /* pcrel_offset */
820
821 /* Marker relocs on inline plt call instructions. */
822 HOWTO (R_PPC_PLTSEQ,
823 0, /* rightshift */
824 2, /* size (0 = byte, 1 = short, 2 = long) */
825 32, /* bitsize */
826 FALSE, /* pc_relative */
827 0, /* bitpos */
828 complain_overflow_dont, /* complain_on_overflow */
829 bfd_elf_generic_reloc, /* special_function */
830 "R_PPC_PLTSEQ", /* name */
831 FALSE, /* partial_inplace */
832 0, /* src_mask */
833 0, /* dst_mask */
834 FALSE), /* pcrel_offset */
835
836 HOWTO (R_PPC_PLTCALL,
837 0, /* rightshift */
838 2, /* size (0 = byte, 1 = short, 2 = long) */
839 32, /* bitsize */
840 FALSE, /* pc_relative */
841 0, /* bitpos */
842 complain_overflow_dont, /* complain_on_overflow */
843 bfd_elf_generic_reloc, /* special_function */
844 "R_PPC_PLTCALL", /* name */
845 FALSE, /* partial_inplace */
846 0, /* src_mask */
847 0, /* dst_mask */
848 FALSE), /* pcrel_offset */
849
850 /* Computes the load module index of the load module that contains the
851 definition of its TLS sym. */
852 HOWTO (R_PPC_DTPMOD32,
853 0, /* rightshift */
854 2, /* size (0 = byte, 1 = short, 2 = long) */
855 32, /* bitsize */
856 FALSE, /* pc_relative */
857 0, /* bitpos */
858 complain_overflow_dont, /* complain_on_overflow */
859 ppc_elf_unhandled_reloc, /* special_function */
860 "R_PPC_DTPMOD32", /* name */
861 FALSE, /* partial_inplace */
862 0, /* src_mask */
863 0xffffffff, /* dst_mask */
864 FALSE), /* pcrel_offset */
865
866 /* Computes a dtv-relative displacement, the difference between the value
867 of sym+add and the base address of the thread-local storage block that
868 contains the definition of sym, minus 0x8000. */
869 HOWTO (R_PPC_DTPREL32,
870 0, /* rightshift */
871 2, /* size (0 = byte, 1 = short, 2 = long) */
872 32, /* bitsize */
873 FALSE, /* pc_relative */
874 0, /* bitpos */
875 complain_overflow_dont, /* complain_on_overflow */
876 ppc_elf_unhandled_reloc, /* special_function */
877 "R_PPC_DTPREL32", /* name */
878 FALSE, /* partial_inplace */
879 0, /* src_mask */
880 0xffffffff, /* dst_mask */
881 FALSE), /* pcrel_offset */
882
883 /* A 16 bit dtprel reloc. */
884 HOWTO (R_PPC_DTPREL16,
885 0, /* rightshift */
886 1, /* size (0 = byte, 1 = short, 2 = long) */
887 16, /* bitsize */
888 FALSE, /* pc_relative */
889 0, /* bitpos */
890 complain_overflow_signed, /* complain_on_overflow */
891 ppc_elf_unhandled_reloc, /* special_function */
892 "R_PPC_DTPREL16", /* name */
893 FALSE, /* partial_inplace */
894 0, /* src_mask */
895 0xffff, /* dst_mask */
896 FALSE), /* pcrel_offset */
897
898 /* Like DTPREL16, but no overflow. */
899 HOWTO (R_PPC_DTPREL16_LO,
900 0, /* rightshift */
901 1, /* size (0 = byte, 1 = short, 2 = long) */
902 16, /* bitsize */
903 FALSE, /* pc_relative */
904 0, /* bitpos */
905 complain_overflow_dont, /* complain_on_overflow */
906 ppc_elf_unhandled_reloc, /* special_function */
907 "R_PPC_DTPREL16_LO", /* name */
908 FALSE, /* partial_inplace */
909 0, /* src_mask */
910 0xffff, /* dst_mask */
911 FALSE), /* pcrel_offset */
912
913 /* Like DTPREL16_LO, but next higher group of 16 bits. */
914 HOWTO (R_PPC_DTPREL16_HI,
915 16, /* rightshift */
916 1, /* size (0 = byte, 1 = short, 2 = long) */
917 16, /* bitsize */
918 FALSE, /* pc_relative */
919 0, /* bitpos */
920 complain_overflow_dont, /* complain_on_overflow */
921 ppc_elf_unhandled_reloc, /* special_function */
922 "R_PPC_DTPREL16_HI", /* name */
923 FALSE, /* partial_inplace */
924 0, /* src_mask */
925 0xffff, /* dst_mask */
926 FALSE), /* pcrel_offset */
927
928 /* Like DTPREL16_HI, but adjust for low 16 bits. */
929 HOWTO (R_PPC_DTPREL16_HA,
930 16, /* rightshift */
931 1, /* size (0 = byte, 1 = short, 2 = long) */
932 16, /* bitsize */
933 FALSE, /* pc_relative */
934 0, /* bitpos */
935 complain_overflow_dont, /* complain_on_overflow */
936 ppc_elf_unhandled_reloc, /* special_function */
937 "R_PPC_DTPREL16_HA", /* name */
938 FALSE, /* partial_inplace */
939 0, /* src_mask */
940 0xffff, /* dst_mask */
941 FALSE), /* pcrel_offset */
942
943 /* Computes a tp-relative displacement, the difference between the value of
944 sym+add and the value of the thread pointer (r13). */
945 HOWTO (R_PPC_TPREL32,
946 0, /* rightshift */
947 2, /* size (0 = byte, 1 = short, 2 = long) */
948 32, /* bitsize */
949 FALSE, /* pc_relative */
950 0, /* bitpos */
951 complain_overflow_dont, /* complain_on_overflow */
952 ppc_elf_unhandled_reloc, /* special_function */
953 "R_PPC_TPREL32", /* name */
954 FALSE, /* partial_inplace */
955 0, /* src_mask */
956 0xffffffff, /* dst_mask */
957 FALSE), /* pcrel_offset */
958
959 /* A 16 bit tprel reloc. */
960 HOWTO (R_PPC_TPREL16,
961 0, /* rightshift */
962 1, /* size (0 = byte, 1 = short, 2 = long) */
963 16, /* bitsize */
964 FALSE, /* pc_relative */
965 0, /* bitpos */
966 complain_overflow_signed, /* complain_on_overflow */
967 ppc_elf_unhandled_reloc, /* special_function */
968 "R_PPC_TPREL16", /* name */
969 FALSE, /* partial_inplace */
970 0, /* src_mask */
971 0xffff, /* dst_mask */
972 FALSE), /* pcrel_offset */
973
974 /* Like TPREL16, but no overflow. */
975 HOWTO (R_PPC_TPREL16_LO,
976 0, /* rightshift */
977 1, /* size (0 = byte, 1 = short, 2 = long) */
978 16, /* bitsize */
979 FALSE, /* pc_relative */
980 0, /* bitpos */
981 complain_overflow_dont, /* complain_on_overflow */
982 ppc_elf_unhandled_reloc, /* special_function */
983 "R_PPC_TPREL16_LO", /* name */
984 FALSE, /* partial_inplace */
985 0, /* src_mask */
986 0xffff, /* dst_mask */
987 FALSE), /* pcrel_offset */
988
989 /* Like TPREL16_LO, but next higher group of 16 bits. */
990 HOWTO (R_PPC_TPREL16_HI,
991 16, /* rightshift */
992 1, /* size (0 = byte, 1 = short, 2 = long) */
993 16, /* bitsize */
994 FALSE, /* pc_relative */
995 0, /* bitpos */
996 complain_overflow_dont, /* complain_on_overflow */
997 ppc_elf_unhandled_reloc, /* special_function */
998 "R_PPC_TPREL16_HI", /* name */
999 FALSE, /* partial_inplace */
1000 0, /* src_mask */
1001 0xffff, /* dst_mask */
1002 FALSE), /* pcrel_offset */
1003
1004 /* Like TPREL16_HI, but adjust for low 16 bits. */
1005 HOWTO (R_PPC_TPREL16_HA,
1006 16, /* rightshift */
1007 1, /* size (0 = byte, 1 = short, 2 = long) */
1008 16, /* bitsize */
1009 FALSE, /* pc_relative */
1010 0, /* bitpos */
1011 complain_overflow_dont, /* complain_on_overflow */
1012 ppc_elf_unhandled_reloc, /* special_function */
1013 "R_PPC_TPREL16_HA", /* name */
1014 FALSE, /* partial_inplace */
1015 0, /* src_mask */
1016 0xffff, /* dst_mask */
1017 FALSE), /* pcrel_offset */
1018
1019 /* Allocates two contiguous entries in the GOT to hold a tls_index structure,
1020 with values (sym+add)@dtpmod and (sym+add)@dtprel, and computes the offset
1021 to the first entry. */
1022 HOWTO (R_PPC_GOT_TLSGD16,
1023 0, /* rightshift */
1024 1, /* size (0 = byte, 1 = short, 2 = long) */
1025 16, /* bitsize */
1026 FALSE, /* pc_relative */
1027 0, /* bitpos */
1028 complain_overflow_signed, /* complain_on_overflow */
1029 ppc_elf_unhandled_reloc, /* special_function */
1030 "R_PPC_GOT_TLSGD16", /* name */
1031 FALSE, /* partial_inplace */
1032 0, /* src_mask */
1033 0xffff, /* dst_mask */
1034 FALSE), /* pcrel_offset */
1035
1036 /* Like GOT_TLSGD16, but no overflow. */
1037 HOWTO (R_PPC_GOT_TLSGD16_LO,
1038 0, /* rightshift */
1039 1, /* size (0 = byte, 1 = short, 2 = long) */
1040 16, /* bitsize */
1041 FALSE, /* pc_relative */
1042 0, /* bitpos */
1043 complain_overflow_dont, /* complain_on_overflow */
1044 ppc_elf_unhandled_reloc, /* special_function */
1045 "R_PPC_GOT_TLSGD16_LO", /* name */
1046 FALSE, /* partial_inplace */
1047 0, /* src_mask */
1048 0xffff, /* dst_mask */
1049 FALSE), /* pcrel_offset */
1050
1051 /* Like GOT_TLSGD16_LO, but next higher group of 16 bits. */
1052 HOWTO (R_PPC_GOT_TLSGD16_HI,
1053 16, /* rightshift */
1054 1, /* size (0 = byte, 1 = short, 2 = long) */
1055 16, /* bitsize */
1056 FALSE, /* pc_relative */
1057 0, /* bitpos */
1058 complain_overflow_dont, /* complain_on_overflow */
1059 ppc_elf_unhandled_reloc, /* special_function */
1060 "R_PPC_GOT_TLSGD16_HI", /* name */
1061 FALSE, /* partial_inplace */
1062 0, /* src_mask */
1063 0xffff, /* dst_mask */
1064 FALSE), /* pcrel_offset */
1065
1066 /* Like GOT_TLSGD16_HI, but adjust for low 16 bits. */
1067 HOWTO (R_PPC_GOT_TLSGD16_HA,
1068 16, /* rightshift */
1069 1, /* size (0 = byte, 1 = short, 2 = long) */
1070 16, /* bitsize */
1071 FALSE, /* pc_relative */
1072 0, /* bitpos */
1073 complain_overflow_dont, /* complain_on_overflow */
1074 ppc_elf_unhandled_reloc, /* special_function */
1075 "R_PPC_GOT_TLSGD16_HA", /* name */
1076 FALSE, /* partial_inplace */
1077 0, /* src_mask */
1078 0xffff, /* dst_mask */
1079 FALSE), /* pcrel_offset */
1080
1081 /* Allocates two contiguous entries in the GOT to hold a tls_index structure,
1082 with values (sym+add)@dtpmod and zero, and computes the offset to the
1083 first entry. */
1084 HOWTO (R_PPC_GOT_TLSLD16,
1085 0, /* rightshift */
1086 1, /* size (0 = byte, 1 = short, 2 = long) */
1087 16, /* bitsize */
1088 FALSE, /* pc_relative */
1089 0, /* bitpos */
1090 complain_overflow_signed, /* complain_on_overflow */
1091 ppc_elf_unhandled_reloc, /* special_function */
1092 "R_PPC_GOT_TLSLD16", /* name */
1093 FALSE, /* partial_inplace */
1094 0, /* src_mask */
1095 0xffff, /* dst_mask */
1096 FALSE), /* pcrel_offset */
1097
1098 /* Like GOT_TLSLD16, but no overflow. */
1099 HOWTO (R_PPC_GOT_TLSLD16_LO,
1100 0, /* rightshift */
1101 1, /* size (0 = byte, 1 = short, 2 = long) */
1102 16, /* bitsize */
1103 FALSE, /* pc_relative */
1104 0, /* bitpos */
1105 complain_overflow_dont, /* complain_on_overflow */
1106 ppc_elf_unhandled_reloc, /* special_function */
1107 "R_PPC_GOT_TLSLD16_LO", /* name */
1108 FALSE, /* partial_inplace */
1109 0, /* src_mask */
1110 0xffff, /* dst_mask */
1111 FALSE), /* pcrel_offset */
1112
1113 /* Like GOT_TLSLD16_LO, but next higher group of 16 bits. */
1114 HOWTO (R_PPC_GOT_TLSLD16_HI,
1115 16, /* rightshift */
1116 1, /* size (0 = byte, 1 = short, 2 = long) */
1117 16, /* bitsize */
1118 FALSE, /* pc_relative */
1119 0, /* bitpos */
1120 complain_overflow_dont, /* complain_on_overflow */
1121 ppc_elf_unhandled_reloc, /* special_function */
1122 "R_PPC_GOT_TLSLD16_HI", /* name */
1123 FALSE, /* partial_inplace */
1124 0, /* src_mask */
1125 0xffff, /* dst_mask */
1126 FALSE), /* pcrel_offset */
1127
1128 /* Like GOT_TLSLD16_HI, but adjust for low 16 bits. */
1129 HOWTO (R_PPC_GOT_TLSLD16_HA,
1130 16, /* rightshift */
1131 1, /* size (0 = byte, 1 = short, 2 = long) */
1132 16, /* bitsize */
1133 FALSE, /* pc_relative */
1134 0, /* bitpos */
1135 complain_overflow_dont, /* complain_on_overflow */
1136 ppc_elf_unhandled_reloc, /* special_function */
1137 "R_PPC_GOT_TLSLD16_HA", /* name */
1138 FALSE, /* partial_inplace */
1139 0, /* src_mask */
1140 0xffff, /* dst_mask */
1141 FALSE), /* pcrel_offset */
1142
1143 /* Allocates an entry in the GOT with value (sym+add)@dtprel, and computes
1144 the offset to the entry. */
1145 HOWTO (R_PPC_GOT_DTPREL16,
1146 0, /* rightshift */
1147 1, /* size (0 = byte, 1 = short, 2 = long) */
1148 16, /* bitsize */
1149 FALSE, /* pc_relative */
1150 0, /* bitpos */
1151 complain_overflow_signed, /* complain_on_overflow */
1152 ppc_elf_unhandled_reloc, /* special_function */
1153 "R_PPC_GOT_DTPREL16", /* name */
1154 FALSE, /* partial_inplace */
1155 0, /* src_mask */
1156 0xffff, /* dst_mask */
1157 FALSE), /* pcrel_offset */
1158
1159 /* Like GOT_DTPREL16, but no overflow. */
1160 HOWTO (R_PPC_GOT_DTPREL16_LO,
1161 0, /* rightshift */
1162 1, /* size (0 = byte, 1 = short, 2 = long) */
1163 16, /* bitsize */
1164 FALSE, /* pc_relative */
1165 0, /* bitpos */
1166 complain_overflow_dont, /* complain_on_overflow */
1167 ppc_elf_unhandled_reloc, /* special_function */
1168 "R_PPC_GOT_DTPREL16_LO", /* name */
1169 FALSE, /* partial_inplace */
1170 0, /* src_mask */
1171 0xffff, /* dst_mask */
1172 FALSE), /* pcrel_offset */
1173
1174 /* Like GOT_DTPREL16_LO, but next higher group of 16 bits. */
1175 HOWTO (R_PPC_GOT_DTPREL16_HI,
1176 16, /* rightshift */
1177 1, /* size (0 = byte, 1 = short, 2 = long) */
1178 16, /* bitsize */
1179 FALSE, /* pc_relative */
1180 0, /* bitpos */
1181 complain_overflow_dont, /* complain_on_overflow */
1182 ppc_elf_unhandled_reloc, /* special_function */
1183 "R_PPC_GOT_DTPREL16_HI", /* name */
1184 FALSE, /* partial_inplace */
1185 0, /* src_mask */
1186 0xffff, /* dst_mask */
1187 FALSE), /* pcrel_offset */
1188
1189 /* Like GOT_DTPREL16_HI, but adjust for low 16 bits. */
1190 HOWTO (R_PPC_GOT_DTPREL16_HA,
1191 16, /* rightshift */
1192 1, /* size (0 = byte, 1 = short, 2 = long) */
1193 16, /* bitsize */
1194 FALSE, /* pc_relative */
1195 0, /* bitpos */
1196 complain_overflow_dont, /* complain_on_overflow */
1197 ppc_elf_unhandled_reloc, /* special_function */
1198 "R_PPC_GOT_DTPREL16_HA", /* name */
1199 FALSE, /* partial_inplace */
1200 0, /* src_mask */
1201 0xffff, /* dst_mask */
1202 FALSE), /* pcrel_offset */
1203
1204 /* Allocates an entry in the GOT with value (sym+add)@tprel, and computes the
1205 offset to the entry. */
1206 HOWTO (R_PPC_GOT_TPREL16,
1207 0, /* rightshift */
1208 1, /* size (0 = byte, 1 = short, 2 = long) */
1209 16, /* bitsize */
1210 FALSE, /* pc_relative */
1211 0, /* bitpos */
1212 complain_overflow_signed, /* complain_on_overflow */
1213 ppc_elf_unhandled_reloc, /* special_function */
1214 "R_PPC_GOT_TPREL16", /* name */
1215 FALSE, /* partial_inplace */
1216 0, /* src_mask */
1217 0xffff, /* dst_mask */
1218 FALSE), /* pcrel_offset */
1219
1220 /* Like GOT_TPREL16, but no overflow. */
1221 HOWTO (R_PPC_GOT_TPREL16_LO,
1222 0, /* rightshift */
1223 1, /* size (0 = byte, 1 = short, 2 = long) */
1224 16, /* bitsize */
1225 FALSE, /* pc_relative */
1226 0, /* bitpos */
1227 complain_overflow_dont, /* complain_on_overflow */
1228 ppc_elf_unhandled_reloc, /* special_function */
1229 "R_PPC_GOT_TPREL16_LO", /* name */
1230 FALSE, /* partial_inplace */
1231 0, /* src_mask */
1232 0xffff, /* dst_mask */
1233 FALSE), /* pcrel_offset */
1234
1235 /* Like GOT_TPREL16_LO, but next higher group of 16 bits. */
1236 HOWTO (R_PPC_GOT_TPREL16_HI,
1237 16, /* rightshift */
1238 1, /* size (0 = byte, 1 = short, 2 = long) */
1239 16, /* bitsize */
1240 FALSE, /* pc_relative */
1241 0, /* bitpos */
1242 complain_overflow_dont, /* complain_on_overflow */
1243 ppc_elf_unhandled_reloc, /* special_function */
1244 "R_PPC_GOT_TPREL16_HI", /* name */
1245 FALSE, /* partial_inplace */
1246 0, /* src_mask */
1247 0xffff, /* dst_mask */
1248 FALSE), /* pcrel_offset */
1249
1250 /* Like GOT_TPREL16_HI, but adjust for low 16 bits. */
1251 HOWTO (R_PPC_GOT_TPREL16_HA,
1252 16, /* rightshift */
1253 1, /* size (0 = byte, 1 = short, 2 = long) */
1254 16, /* bitsize */
1255 FALSE, /* pc_relative */
1256 0, /* bitpos */
1257 complain_overflow_dont, /* complain_on_overflow */
1258 ppc_elf_unhandled_reloc, /* special_function */
1259 "R_PPC_GOT_TPREL16_HA", /* name */
1260 FALSE, /* partial_inplace */
1261 0, /* src_mask */
1262 0xffff, /* dst_mask */
1263 FALSE), /* pcrel_offset */
1264
1265 /* The remaining relocs are from the Embedded ELF ABI, and are not
1266 in the SVR4 ELF ABI. */
1267
1268 /* 32 bit value resulting from the addend minus the symbol. */
1269 HOWTO (R_PPC_EMB_NADDR32, /* type */
1270 0, /* rightshift */
1271 2, /* size (0 = byte, 1 = short, 2 = long) */
1272 32, /* bitsize */
1273 FALSE, /* pc_relative */
1274 0, /* bitpos */
1275 complain_overflow_dont, /* complain_on_overflow */
1276 ppc_elf_unhandled_reloc, /* special_function */
1277 "R_PPC_EMB_NADDR32", /* name */
1278 FALSE, /* partial_inplace */
1279 0, /* src_mask */
1280 0xffffffff, /* dst_mask */
1281 FALSE), /* pcrel_offset */
1282
1283 /* 16 bit value resulting from the addend minus the symbol. */
1284 HOWTO (R_PPC_EMB_NADDR16, /* type */
1285 0, /* rightshift */
1286 1, /* size (0 = byte, 1 = short, 2 = long) */
1287 16, /* bitsize */
1288 FALSE, /* pc_relative */
1289 0, /* bitpos */
1290 complain_overflow_signed, /* complain_on_overflow */
1291 ppc_elf_unhandled_reloc, /* special_function */
1292 "R_PPC_EMB_NADDR16", /* name */
1293 FALSE, /* partial_inplace */
1294 0, /* src_mask */
1295 0xffff, /* dst_mask */
1296 FALSE), /* pcrel_offset */
1297
1298 /* 16 bit value resulting from the addend minus the symbol. */
1299 HOWTO (R_PPC_EMB_NADDR16_LO, /* type */
1300 0, /* rightshift */
1301 1, /* size (0 = byte, 1 = short, 2 = long) */
1302 16, /* bitsize */
1303 FALSE, /* pc_relative */
1304 0, /* bitpos */
1305 complain_overflow_dont,/* complain_on_overflow */
1306 ppc_elf_unhandled_reloc, /* special_function */
1307 "R_PPC_EMB_ADDR16_LO", /* name */
1308 FALSE, /* partial_inplace */
1309 0, /* src_mask */
1310 0xffff, /* dst_mask */
1311 FALSE), /* pcrel_offset */
1312
1313 /* The high order 16 bits of the addend minus the symbol. */
1314 HOWTO (R_PPC_EMB_NADDR16_HI, /* type */
1315 16, /* rightshift */
1316 1, /* size (0 = byte, 1 = short, 2 = long) */
1317 16, /* bitsize */
1318 FALSE, /* pc_relative */
1319 0, /* bitpos */
1320 complain_overflow_dont, /* complain_on_overflow */
1321 ppc_elf_unhandled_reloc, /* special_function */
1322 "R_PPC_EMB_NADDR16_HI", /* name */
1323 FALSE, /* partial_inplace */
1324 0, /* src_mask */
1325 0xffff, /* dst_mask */
1326 FALSE), /* pcrel_offset */
1327
1328 /* The high order 16 bits of the result of the addend minus the address,
1329 plus 1 if the contents of the low 16 bits, treated as a signed number,
1330 is negative. */
1331 HOWTO (R_PPC_EMB_NADDR16_HA, /* type */
1332 16, /* rightshift */
1333 1, /* size (0 = byte, 1 = short, 2 = long) */
1334 16, /* bitsize */
1335 FALSE, /* pc_relative */
1336 0, /* bitpos */
1337 complain_overflow_dont, /* complain_on_overflow */
1338 ppc_elf_unhandled_reloc, /* special_function */
1339 "R_PPC_EMB_NADDR16_HA", /* name */
1340 FALSE, /* partial_inplace */
1341 0, /* src_mask */
1342 0xffff, /* dst_mask */
1343 FALSE), /* pcrel_offset */
1344
1345 /* 16 bit value resulting from allocating a 4 byte word to hold an
1346 address in the .sdata section, and returning the offset from
1347 _SDA_BASE_ for that relocation. */
1348 HOWTO (R_PPC_EMB_SDAI16, /* type */
1349 0, /* rightshift */
1350 1, /* size (0 = byte, 1 = short, 2 = long) */
1351 16, /* bitsize */
1352 FALSE, /* pc_relative */
1353 0, /* bitpos */
1354 complain_overflow_signed, /* complain_on_overflow */
1355 ppc_elf_unhandled_reloc, /* special_function */
1356 "R_PPC_EMB_SDAI16", /* name */
1357 FALSE, /* partial_inplace */
1358 0, /* src_mask */
1359 0xffff, /* dst_mask */
1360 FALSE), /* pcrel_offset */
1361
1362 /* 16 bit value resulting from allocating a 4 byte word to hold an
1363 address in the .sdata2 section, and returning the offset from
1364 _SDA2_BASE_ for that relocation. */
1365 HOWTO (R_PPC_EMB_SDA2I16, /* type */
1366 0, /* rightshift */
1367 1, /* size (0 = byte, 1 = short, 2 = long) */
1368 16, /* bitsize */
1369 FALSE, /* pc_relative */
1370 0, /* bitpos */
1371 complain_overflow_signed, /* complain_on_overflow */
1372 ppc_elf_unhandled_reloc, /* special_function */
1373 "R_PPC_EMB_SDA2I16", /* name */
1374 FALSE, /* partial_inplace */
1375 0, /* src_mask */
1376 0xffff, /* dst_mask */
1377 FALSE), /* pcrel_offset */
1378
1379 /* A sign-extended 16 bit value relative to _SDA2_BASE_, for use with
1380 small data items. */
1381 HOWTO (R_PPC_EMB_SDA2REL, /* type */
1382 0, /* rightshift */
1383 1, /* size (0 = byte, 1 = short, 2 = long) */
1384 16, /* bitsize */
1385 FALSE, /* pc_relative */
1386 0, /* bitpos */
1387 complain_overflow_signed, /* complain_on_overflow */
1388 ppc_elf_unhandled_reloc, /* special_function */
1389 "R_PPC_EMB_SDA2REL", /* name */
1390 FALSE, /* partial_inplace */
1391 0, /* src_mask */
1392 0xffff, /* dst_mask */
1393 FALSE), /* pcrel_offset */
1394
1395 /* Relocate against either _SDA_BASE_ or _SDA2_BASE_, filling in the 16 bit
1396 signed offset from the appropriate base, and filling in the register
1397 field with the appropriate register (0, 2, or 13). */
1398 HOWTO (R_PPC_EMB_SDA21, /* type */
1399 0, /* rightshift */
1400 2, /* size (0 = byte, 1 = short, 2 = long) */
1401 16, /* bitsize */
1402 FALSE, /* pc_relative */
1403 0, /* bitpos */
1404 complain_overflow_signed, /* complain_on_overflow */
1405 ppc_elf_unhandled_reloc, /* special_function */
1406 "R_PPC_EMB_SDA21", /* name */
1407 FALSE, /* partial_inplace */
1408 0, /* src_mask */
1409 0xffff, /* dst_mask */
1410 FALSE), /* pcrel_offset */
1411
1412 /* Relocation not handled: R_PPC_EMB_MRKREF */
1413 /* Relocation not handled: R_PPC_EMB_RELSEC16 */
1414 /* Relocation not handled: R_PPC_EMB_RELST_LO */
1415 /* Relocation not handled: R_PPC_EMB_RELST_HI */
1416 /* Relocation not handled: R_PPC_EMB_RELST_HA */
1417 /* Relocation not handled: R_PPC_EMB_BIT_FLD */
1418
1419 /* PC relative relocation against either _SDA_BASE_ or _SDA2_BASE_, filling
1420 in the 16 bit signed offset from the appropriate base, and filling in the
1421 register field with the appropriate register (0, 2, or 13). */
1422 HOWTO (R_PPC_EMB_RELSDA, /* type */
1423 0, /* rightshift */
1424 1, /* size (0 = byte, 1 = short, 2 = long) */
1425 16, /* bitsize */
1426 FALSE, /* pc_relative */
1427 0, /* bitpos */
1428 complain_overflow_signed, /* complain_on_overflow */
1429 ppc_elf_unhandled_reloc, /* special_function */
1430 "R_PPC_EMB_RELSDA", /* name */
1431 FALSE, /* partial_inplace */
1432 0, /* src_mask */
1433 0xffff, /* dst_mask */
1434 FALSE), /* pcrel_offset */
1435
1436 /* A relative 8 bit branch. */
1437 HOWTO (R_PPC_VLE_REL8, /* type */
1438 1, /* rightshift */
1439 1, /* size (0 = byte, 1 = short, 2 = long) */
1440 8, /* bitsize */
1441 TRUE, /* pc_relative */
1442 0, /* bitpos */
1443 complain_overflow_signed, /* complain_on_overflow */
1444 bfd_elf_generic_reloc, /* special_function */
1445 "R_PPC_VLE_REL8", /* name */
1446 FALSE, /* partial_inplace */
1447 0, /* src_mask */
1448 0xff, /* dst_mask */
1449 TRUE), /* pcrel_offset */
1450
1451 /* A relative 15 bit branch. */
1452 HOWTO (R_PPC_VLE_REL15, /* type */
1453 1, /* rightshift */
1454 2, /* size (0 = byte, 1 = short, 2 = long) */
1455 15, /* bitsize */
1456 TRUE, /* pc_relative */
1457 1, /* bitpos */
1458 complain_overflow_signed, /* complain_on_overflow */
1459 bfd_elf_generic_reloc, /* special_function */
1460 "R_PPC_VLE_REL15", /* name */
1461 FALSE, /* partial_inplace */
1462 0, /* src_mask */
1463 0xfffe, /* dst_mask */
1464 TRUE), /* pcrel_offset */
1465
1466 /* A relative 24 bit branch. */
1467 HOWTO (R_PPC_VLE_REL24, /* type */
1468 1, /* rightshift */
1469 2, /* size (0 = byte, 1 = short, 2 = long) */
1470 24, /* bitsize */
1471 TRUE, /* pc_relative */
1472 1, /* bitpos */
1473 complain_overflow_signed, /* complain_on_overflow */
1474 bfd_elf_generic_reloc, /* special_function */
1475 "R_PPC_VLE_REL24", /* name */
1476 FALSE, /* partial_inplace */
1477 0, /* src_mask */
1478 0x1fffffe, /* dst_mask */
1479 TRUE), /* pcrel_offset */
1480
1481 /* The 16 LSBS in split16a format. */
1482 HOWTO (R_PPC_VLE_LO16A, /* type */
1483 0, /* rightshift */
1484 2, /* size (0 = byte, 1 = short, 2 = long) */
1485 16, /* bitsize */
1486 FALSE, /* pc_relative */
1487 0, /* bitpos */
1488 complain_overflow_dont, /* complain_on_overflow */
1489 ppc_elf_unhandled_reloc, /* special_function */
1490 "R_PPC_VLE_LO16A", /* name */
1491 FALSE, /* partial_inplace */
1492 0, /* src_mask */
1493 0x1f07ff, /* dst_mask */
1494 FALSE), /* pcrel_offset */
1495
1496 /* The 16 LSBS in split16d format. */
1497 HOWTO (R_PPC_VLE_LO16D, /* type */
1498 0, /* rightshift */
1499 2, /* size (0 = byte, 1 = short, 2 = long) */
1500 16, /* bitsize */
1501 FALSE, /* pc_relative */
1502 0, /* bitpos */
1503 complain_overflow_dont, /* complain_on_overflow */
1504 ppc_elf_unhandled_reloc, /* special_function */
1505 "R_PPC_VLE_LO16D", /* name */
1506 FALSE, /* partial_inplace */
1507 0, /* src_mask */
1508 0x3e007ff, /* dst_mask */
1509 FALSE), /* pcrel_offset */
1510
1511 /* Bits 16-31 split16a format. */
1512 HOWTO (R_PPC_VLE_HI16A, /* type */
1513 16, /* rightshift */
1514 2, /* size (0 = byte, 1 = short, 2 = long) */
1515 16, /* bitsize */
1516 FALSE, /* pc_relative */
1517 0, /* bitpos */
1518 complain_overflow_dont, /* complain_on_overflow */
1519 ppc_elf_unhandled_reloc, /* special_function */
1520 "R_PPC_VLE_HI16A", /* name */
1521 FALSE, /* partial_inplace */
1522 0, /* src_mask */
1523 0x1f07ff, /* dst_mask */
1524 FALSE), /* pcrel_offset */
1525
1526 /* Bits 16-31 split16d format. */
1527 HOWTO (R_PPC_VLE_HI16D, /* type */
1528 16, /* rightshift */
1529 2, /* size (0 = byte, 1 = short, 2 = long) */
1530 16, /* bitsize */
1531 FALSE, /* pc_relative */
1532 0, /* bitpos */
1533 complain_overflow_dont, /* complain_on_overflow */
1534 ppc_elf_unhandled_reloc, /* special_function */
1535 "R_PPC_VLE_HI16D", /* name */
1536 FALSE, /* partial_inplace */
1537 0, /* src_mask */
1538 0x3e007ff, /* dst_mask */
1539 FALSE), /* pcrel_offset */
1540
1541 /* Bits 16-31 (High Adjusted) in split16a format. */
1542 HOWTO (R_PPC_VLE_HA16A, /* type */
1543 16, /* rightshift */
1544 2, /* size (0 = byte, 1 = short, 2 = long) */
1545 16, /* bitsize */
1546 FALSE, /* pc_relative */
1547 0, /* bitpos */
1548 complain_overflow_dont, /* complain_on_overflow */
1549 ppc_elf_unhandled_reloc, /* special_function */
1550 "R_PPC_VLE_HA16A", /* name */
1551 FALSE, /* partial_inplace */
1552 0, /* src_mask */
1553 0x1f07ff, /* dst_mask */
1554 FALSE), /* pcrel_offset */
1555
1556 /* Bits 16-31 (High Adjusted) in split16d format. */
1557 HOWTO (R_PPC_VLE_HA16D, /* type */
1558 16, /* rightshift */
1559 2, /* size (0 = byte, 1 = short, 2 = long) */
1560 16, /* bitsize */
1561 FALSE, /* pc_relative */
1562 0, /* bitpos */
1563 complain_overflow_dont, /* complain_on_overflow */
1564 ppc_elf_unhandled_reloc, /* special_function */
1565 "R_PPC_VLE_HA16D", /* name */
1566 FALSE, /* partial_inplace */
1567 0, /* src_mask */
1568 0x3e007ff, /* dst_mask */
1569 FALSE), /* pcrel_offset */
1570
1571 /* This reloc is like R_PPC_EMB_SDA21 but only applies to e_add16i
1572 instructions. If the register base is 0 then the linker changes
1573 the e_add16i to an e_li instruction. */
1574 HOWTO (R_PPC_VLE_SDA21, /* type */
1575 0, /* rightshift */
1576 2, /* size (0 = byte, 1 = short, 2 = long) */
1577 16, /* bitsize */
1578 FALSE, /* pc_relative */
1579 0, /* bitpos */
1580 complain_overflow_signed, /* complain_on_overflow */
1581 ppc_elf_unhandled_reloc, /* special_function */
1582 "R_PPC_VLE_SDA21", /* name */
1583 FALSE, /* partial_inplace */
1584 0, /* src_mask */
1585 0xffff, /* dst_mask */
1586 FALSE), /* pcrel_offset */
1587
1588 /* Like R_PPC_VLE_SDA21 but ignore overflow. */
1589 HOWTO (R_PPC_VLE_SDA21_LO, /* type */
1590 0, /* rightshift */
1591 2, /* size (0 = byte, 1 = short, 2 = long) */
1592 16, /* bitsize */
1593 FALSE, /* pc_relative */
1594 0, /* bitpos */
1595 complain_overflow_dont, /* complain_on_overflow */
1596 ppc_elf_unhandled_reloc, /* special_function */
1597 "R_PPC_VLE_SDA21_LO", /* name */
1598 FALSE, /* partial_inplace */
1599 0, /* src_mask */
1600 0xffff, /* dst_mask */
1601 FALSE), /* pcrel_offset */
1602
1603 /* The 16 LSBS relative to _SDA_BASE_ in split16a format. */
1604 HOWTO (R_PPC_VLE_SDAREL_LO16A,/* type */
1605 0, /* rightshift */
1606 2, /* size (0 = byte, 1 = short, 2 = long) */
1607 16, /* bitsize */
1608 FALSE, /* pc_relative */
1609 0, /* bitpos */
1610 complain_overflow_dont, /* complain_on_overflow */
1611 ppc_elf_unhandled_reloc, /* special_function */
1612 "R_PPC_VLE_SDAREL_LO16A", /* name */
1613 FALSE, /* partial_inplace */
1614 0, /* src_mask */
1615 0x1f07ff, /* dst_mask */
1616 FALSE), /* pcrel_offset */
1617
1618 /* The 16 LSBS relative to _SDA_BASE_ in split16d format. */
1619 HOWTO (R_PPC_VLE_SDAREL_LO16D, /* type */
1620 0, /* rightshift */
1621 2, /* size (0 = byte, 1 = short, 2 = long) */
1622 16, /* bitsize */
1623 FALSE, /* pc_relative */
1624 0, /* bitpos */
1625 complain_overflow_dont, /* complain_on_overflow */
1626 ppc_elf_unhandled_reloc, /* special_function */
1627 "R_PPC_VLE_SDAREL_LO16D", /* name */
1628 FALSE, /* partial_inplace */
1629 0, /* src_mask */
1630 0x3e007ff, /* dst_mask */
1631 FALSE), /* pcrel_offset */
1632
1633 /* Bits 16-31 relative to _SDA_BASE_ in split16a format. */
1634 HOWTO (R_PPC_VLE_SDAREL_HI16A, /* type */
1635 16, /* rightshift */
1636 2, /* size (0 = byte, 1 = short, 2 = long) */
1637 16, /* bitsize */
1638 FALSE, /* pc_relative */
1639 0, /* bitpos */
1640 complain_overflow_dont, /* complain_on_overflow */
1641 ppc_elf_unhandled_reloc, /* special_function */
1642 "R_PPC_VLE_SDAREL_HI16A", /* name */
1643 FALSE, /* partial_inplace */
1644 0, /* src_mask */
1645 0x1f07ff, /* dst_mask */
1646 FALSE), /* pcrel_offset */
1647
1648 /* Bits 16-31 relative to _SDA_BASE_ in split16d format. */
1649 HOWTO (R_PPC_VLE_SDAREL_HI16D, /* type */
1650 16, /* rightshift */
1651 2, /* size (0 = byte, 1 = short, 2 = long) */
1652 16, /* bitsize */
1653 FALSE, /* pc_relative */
1654 0, /* bitpos */
1655 complain_overflow_dont, /* complain_on_overflow */
1656 ppc_elf_unhandled_reloc, /* special_function */
1657 "R_PPC_VLE_SDAREL_HI16D", /* name */
1658 FALSE, /* partial_inplace */
1659 0, /* src_mask */
1660 0x3e007ff, /* dst_mask */
1661 FALSE), /* pcrel_offset */
1662
1663 /* Bits 16-31 (HA) relative to _SDA_BASE split16a format. */
1664 HOWTO (R_PPC_VLE_SDAREL_HA16A, /* type */
1665 16, /* rightshift */
1666 2, /* size (0 = byte, 1 = short, 2 = long) */
1667 16, /* bitsize */
1668 FALSE, /* pc_relative */
1669 0, /* bitpos */
1670 complain_overflow_dont, /* complain_on_overflow */
1671 ppc_elf_unhandled_reloc, /* special_function */
1672 "R_PPC_VLE_SDAREL_HA16A", /* name */
1673 FALSE, /* partial_inplace */
1674 0, /* src_mask */
1675 0x1f07ff, /* dst_mask */
1676 FALSE), /* pcrel_offset */
1677
1678 /* Bits 16-31 (HA) relative to _SDA_BASE split16d format. */
1679 HOWTO (R_PPC_VLE_SDAREL_HA16D, /* type */
1680 16, /* rightshift */
1681 2, /* size (0 = byte, 1 = short, 2 = long) */
1682 16, /* bitsize */
1683 FALSE, /* pc_relative */
1684 0, /* bitpos */
1685 complain_overflow_dont, /* complain_on_overflow */
1686 ppc_elf_unhandled_reloc, /* special_function */
1687 "R_PPC_VLE_SDAREL_HA16D", /* name */
1688 FALSE, /* partial_inplace */
1689 0, /* src_mask */
1690 0x3e007ff, /* dst_mask */
1691 FALSE), /* pcrel_offset */
1692
1693 /* e_li split20 format. */
1694 HOWTO (R_PPC_VLE_ADDR20, /* type */
1695 16, /* rightshift */
1696 2, /* size (0 = byte, 1 = short, 2 = long) */
1697 20, /* bitsize */
1698 FALSE, /* pc_relative */
1699 0, /* bitpos */
1700 complain_overflow_dont, /* complain_on_overflow */
1701 bfd_elf_generic_reloc, /* special_function */
1702 "R_PPC_VLE_ADDR20", /* name */
1703 FALSE, /* partial_inplace */
1704 0, /* src_mask */
1705 0x1f07ff, /* dst_mask */
1706 FALSE), /* pcrel_offset */
1707
1708 HOWTO (R_PPC_IRELATIVE, /* type */
1709 0, /* rightshift */
1710 2, /* size (0 = byte, 1 = short, 2 = long) */
1711 32, /* bitsize */
1712 FALSE, /* pc_relative */
1713 0, /* bitpos */
1714 complain_overflow_dont, /* complain_on_overflow */
1715 ppc_elf_unhandled_reloc, /* special_function */
1716 "R_PPC_IRELATIVE", /* name */
1717 FALSE, /* partial_inplace */
1718 0, /* src_mask */
1719 0xffffffff, /* dst_mask */
1720 FALSE), /* pcrel_offset */
1721
1722 /* A 16 bit relative relocation. */
1723 HOWTO (R_PPC_REL16, /* type */
1724 0, /* rightshift */
1725 1, /* size (0 = byte, 1 = short, 2 = long) */
1726 16, /* bitsize */
1727 TRUE, /* pc_relative */
1728 0, /* bitpos */
1729 complain_overflow_signed, /* complain_on_overflow */
1730 bfd_elf_generic_reloc, /* special_function */
1731 "R_PPC_REL16", /* name */
1732 FALSE, /* partial_inplace */
1733 0, /* src_mask */
1734 0xffff, /* dst_mask */
1735 TRUE), /* pcrel_offset */
1736
1737 /* A 16 bit relative relocation without overflow. */
1738 HOWTO (R_PPC_REL16_LO, /* type */
1739 0, /* rightshift */
1740 1, /* size (0 = byte, 1 = short, 2 = long) */
1741 16, /* bitsize */
1742 TRUE, /* pc_relative */
1743 0, /* bitpos */
1744 complain_overflow_dont,/* complain_on_overflow */
1745 bfd_elf_generic_reloc, /* special_function */
1746 "R_PPC_REL16_LO", /* name */
1747 FALSE, /* partial_inplace */
1748 0, /* src_mask */
1749 0xffff, /* dst_mask */
1750 TRUE), /* pcrel_offset */
1751
1752 /* The high order 16 bits of a relative address. */
1753 HOWTO (R_PPC_REL16_HI, /* type */
1754 16, /* rightshift */
1755 1, /* size (0 = byte, 1 = short, 2 = long) */
1756 16, /* bitsize */
1757 TRUE, /* pc_relative */
1758 0, /* bitpos */
1759 complain_overflow_dont, /* complain_on_overflow */
1760 bfd_elf_generic_reloc, /* special_function */
1761 "R_PPC_REL16_HI", /* name */
1762 FALSE, /* partial_inplace */
1763 0, /* src_mask */
1764 0xffff, /* dst_mask */
1765 TRUE), /* pcrel_offset */
1766
1767 /* The high order 16 bits of a relative address, plus 1 if the contents of
1768 the low 16 bits, treated as a signed number, is negative. */
1769 HOWTO (R_PPC_REL16_HA, /* type */
1770 16, /* rightshift */
1771 1, /* size (0 = byte, 1 = short, 2 = long) */
1772 16, /* bitsize */
1773 TRUE, /* pc_relative */
1774 0, /* bitpos */
1775 complain_overflow_dont, /* complain_on_overflow */
1776 ppc_elf_addr16_ha_reloc, /* special_function */
1777 "R_PPC_REL16_HA", /* name */
1778 FALSE, /* partial_inplace */
1779 0, /* src_mask */
1780 0xffff, /* dst_mask */
1781 TRUE), /* pcrel_offset */
1782
1783 /* Like R_PPC_REL16_HA but for split field in addpcis. */
1784 HOWTO (R_PPC_REL16DX_HA, /* type */
1785 16, /* rightshift */
1786 2, /* size (0 = byte, 1 = short, 2 = long) */
1787 16, /* bitsize */
1788 TRUE, /* pc_relative */
1789 0, /* bitpos */
1790 complain_overflow_signed, /* complain_on_overflow */
1791 ppc_elf_addr16_ha_reloc, /* special_function */
1792 "R_PPC_REL16DX_HA", /* name */
1793 FALSE, /* partial_inplace */
1794 0, /* src_mask */
1795 0x1fffc1, /* dst_mask */
1796 TRUE), /* pcrel_offset */
1797
1798 /* A split-field reloc for addpcis, non-relative (gas internal use only). */
1799 HOWTO (R_PPC_16DX_HA, /* type */
1800 16, /* rightshift */
1801 2, /* size (0 = byte, 1 = short, 2 = long) */
1802 16, /* bitsize */
1803 FALSE, /* pc_relative */
1804 0, /* bitpos */
1805 complain_overflow_signed, /* complain_on_overflow */
1806 ppc_elf_addr16_ha_reloc, /* special_function */
1807 "R_PPC_16DX_HA", /* name */
1808 FALSE, /* partial_inplace */
1809 0, /* src_mask */
1810 0x1fffc1, /* dst_mask */
1811 FALSE), /* pcrel_offset */
1812
1813 /* GNU extension to record C++ vtable hierarchy. */
1814 HOWTO (R_PPC_GNU_VTINHERIT, /* type */
1815 0, /* rightshift */
1816 0, /* size (0 = byte, 1 = short, 2 = long) */
1817 0, /* bitsize */
1818 FALSE, /* pc_relative */
1819 0, /* bitpos */
1820 complain_overflow_dont, /* complain_on_overflow */
1821 NULL, /* special_function */
1822 "R_PPC_GNU_VTINHERIT", /* name */
1823 FALSE, /* partial_inplace */
1824 0, /* src_mask */
1825 0, /* dst_mask */
1826 FALSE), /* pcrel_offset */
1827
1828 /* GNU extension to record C++ vtable member usage. */
1829 HOWTO (R_PPC_GNU_VTENTRY, /* type */
1830 0, /* rightshift */
1831 0, /* size (0 = byte, 1 = short, 2 = long) */
1832 0, /* bitsize */
1833 FALSE, /* pc_relative */
1834 0, /* bitpos */
1835 complain_overflow_dont, /* complain_on_overflow */
1836 NULL, /* special_function */
1837 "R_PPC_GNU_VTENTRY", /* name */
1838 FALSE, /* partial_inplace */
1839 0, /* src_mask */
1840 0, /* dst_mask */
1841 FALSE), /* pcrel_offset */
1842
1843 /* Phony reloc to handle AIX style TOC entries. */
1844 HOWTO (R_PPC_TOC16, /* type */
1845 0, /* rightshift */
1846 1, /* size (0 = byte, 1 = short, 2 = long) */
1847 16, /* bitsize */
1848 FALSE, /* pc_relative */
1849 0, /* bitpos */
1850 complain_overflow_signed, /* complain_on_overflow */
1851 ppc_elf_unhandled_reloc, /* special_function */
1852 "R_PPC_TOC16", /* name */
1853 FALSE, /* partial_inplace */
1854 0, /* src_mask */
1855 0xffff, /* dst_mask */
1856 FALSE), /* pcrel_offset */
1857 };
1858 \f
1859 /* Initialize the ppc_elf_howto_table, so that linear accesses can be done. */
1860
1861 static void
1862 ppc_elf_howto_init (void)
1863 {
1864 unsigned int i, type;
1865
1866 for (i = 0;
1867 i < sizeof (ppc_elf_howto_raw) / sizeof (ppc_elf_howto_raw[0]);
1868 i++)
1869 {
1870 type = ppc_elf_howto_raw[i].type;
1871 if (type >= (sizeof (ppc_elf_howto_table)
1872 / sizeof (ppc_elf_howto_table[0])))
1873 abort ();
1874 ppc_elf_howto_table[type] = &ppc_elf_howto_raw[i];
1875 }
1876 }
1877
1878 static reloc_howto_type *
1879 ppc_elf_reloc_type_lookup (bfd *abfd ATTRIBUTE_UNUSED,
1880 bfd_reloc_code_real_type code)
1881 {
1882 enum elf_ppc_reloc_type r;
1883
1884 /* Initialize howto table if not already done. */
1885 if (!ppc_elf_howto_table[R_PPC_ADDR32])
1886 ppc_elf_howto_init ();
1887
1888 switch (code)
1889 {
1890 default:
1891 return NULL;
1892
1893 case BFD_RELOC_NONE: r = R_PPC_NONE; break;
1894 case BFD_RELOC_32: r = R_PPC_ADDR32; break;
1895 case BFD_RELOC_PPC_BA26: r = R_PPC_ADDR24; break;
1896 case BFD_RELOC_PPC64_ADDR16_DS:
1897 case BFD_RELOC_16: r = R_PPC_ADDR16; break;
1898 case BFD_RELOC_PPC64_ADDR16_LO_DS:
1899 case BFD_RELOC_LO16: r = R_PPC_ADDR16_LO; break;
1900 case BFD_RELOC_HI16: r = R_PPC_ADDR16_HI; break;
1901 case BFD_RELOC_HI16_S: r = R_PPC_ADDR16_HA; break;
1902 case BFD_RELOC_PPC_BA16: r = R_PPC_ADDR14; break;
1903 case BFD_RELOC_PPC_BA16_BRTAKEN: r = R_PPC_ADDR14_BRTAKEN; break;
1904 case BFD_RELOC_PPC_BA16_BRNTAKEN: r = R_PPC_ADDR14_BRNTAKEN; break;
1905 case BFD_RELOC_PPC_B26: r = R_PPC_REL24; break;
1906 case BFD_RELOC_PPC_B16: r = R_PPC_REL14; break;
1907 case BFD_RELOC_PPC_B16_BRTAKEN: r = R_PPC_REL14_BRTAKEN; break;
1908 case BFD_RELOC_PPC_B16_BRNTAKEN: r = R_PPC_REL14_BRNTAKEN; break;
1909 case BFD_RELOC_PPC64_GOT16_DS:
1910 case BFD_RELOC_16_GOTOFF: r = R_PPC_GOT16; break;
1911 case BFD_RELOC_PPC64_GOT16_LO_DS:
1912 case BFD_RELOC_LO16_GOTOFF: r = R_PPC_GOT16_LO; break;
1913 case BFD_RELOC_HI16_GOTOFF: r = R_PPC_GOT16_HI; break;
1914 case BFD_RELOC_HI16_S_GOTOFF: r = R_PPC_GOT16_HA; break;
1915 case BFD_RELOC_24_PLT_PCREL: r = R_PPC_PLTREL24; break;
1916 case BFD_RELOC_PPC_COPY: r = R_PPC_COPY; break;
1917 case BFD_RELOC_PPC_GLOB_DAT: r = R_PPC_GLOB_DAT; break;
1918 case BFD_RELOC_PPC_LOCAL24PC: r = R_PPC_LOCAL24PC; break;
1919 case BFD_RELOC_32_PCREL: r = R_PPC_REL32; break;
1920 case BFD_RELOC_32_PLTOFF: r = R_PPC_PLT32; break;
1921 case BFD_RELOC_32_PLT_PCREL: r = R_PPC_PLTREL32; break;
1922 case BFD_RELOC_PPC64_PLT16_LO_DS:
1923 case BFD_RELOC_LO16_PLTOFF: r = R_PPC_PLT16_LO; break;
1924 case BFD_RELOC_HI16_PLTOFF: r = R_PPC_PLT16_HI; break;
1925 case BFD_RELOC_HI16_S_PLTOFF: r = R_PPC_PLT16_HA; break;
1926 case BFD_RELOC_GPREL16: r = R_PPC_SDAREL16; break;
1927 case BFD_RELOC_PPC64_SECTOFF_DS:
1928 case BFD_RELOC_16_BASEREL: r = R_PPC_SECTOFF; break;
1929 case BFD_RELOC_PPC64_SECTOFF_LO_DS:
1930 case BFD_RELOC_LO16_BASEREL: r = R_PPC_SECTOFF_LO; break;
1931 case BFD_RELOC_HI16_BASEREL: r = R_PPC_SECTOFF_HI; break;
1932 case BFD_RELOC_HI16_S_BASEREL: r = R_PPC_SECTOFF_HA; break;
1933 case BFD_RELOC_CTOR: r = R_PPC_ADDR32; break;
1934 case BFD_RELOC_PPC64_TOC16_DS:
1935 case BFD_RELOC_PPC_TOC16: r = R_PPC_TOC16; break;
1936 case BFD_RELOC_PPC_TLS: r = R_PPC_TLS; break;
1937 case BFD_RELOC_PPC_TLSGD: r = R_PPC_TLSGD; break;
1938 case BFD_RELOC_PPC_TLSLD: r = R_PPC_TLSLD; break;
1939 case BFD_RELOC_PPC_DTPMOD: r = R_PPC_DTPMOD32; break;
1940 case BFD_RELOC_PPC64_TPREL16_DS:
1941 case BFD_RELOC_PPC_TPREL16: r = R_PPC_TPREL16; break;
1942 case BFD_RELOC_PPC64_TPREL16_LO_DS:
1943 case BFD_RELOC_PPC_TPREL16_LO: r = R_PPC_TPREL16_LO; break;
1944 case BFD_RELOC_PPC_TPREL16_HI: r = R_PPC_TPREL16_HI; break;
1945 case BFD_RELOC_PPC_TPREL16_HA: r = R_PPC_TPREL16_HA; break;
1946 case BFD_RELOC_PPC_TPREL: r = R_PPC_TPREL32; break;
1947 case BFD_RELOC_PPC64_DTPREL16_DS:
1948 case BFD_RELOC_PPC_DTPREL16: r = R_PPC_DTPREL16; break;
1949 case BFD_RELOC_PPC64_DTPREL16_LO_DS:
1950 case BFD_RELOC_PPC_DTPREL16_LO: r = R_PPC_DTPREL16_LO; break;
1951 case BFD_RELOC_PPC_DTPREL16_HI: r = R_PPC_DTPREL16_HI; break;
1952 case BFD_RELOC_PPC_DTPREL16_HA: r = R_PPC_DTPREL16_HA; break;
1953 case BFD_RELOC_PPC_DTPREL: r = R_PPC_DTPREL32; break;
1954 case BFD_RELOC_PPC_GOT_TLSGD16: r = R_PPC_GOT_TLSGD16; break;
1955 case BFD_RELOC_PPC_GOT_TLSGD16_LO: r = R_PPC_GOT_TLSGD16_LO; break;
1956 case BFD_RELOC_PPC_GOT_TLSGD16_HI: r = R_PPC_GOT_TLSGD16_HI; break;
1957 case BFD_RELOC_PPC_GOT_TLSGD16_HA: r = R_PPC_GOT_TLSGD16_HA; break;
1958 case BFD_RELOC_PPC_GOT_TLSLD16: r = R_PPC_GOT_TLSLD16; break;
1959 case BFD_RELOC_PPC_GOT_TLSLD16_LO: r = R_PPC_GOT_TLSLD16_LO; break;
1960 case BFD_RELOC_PPC_GOT_TLSLD16_HI: r = R_PPC_GOT_TLSLD16_HI; break;
1961 case BFD_RELOC_PPC_GOT_TLSLD16_HA: r = R_PPC_GOT_TLSLD16_HA; break;
1962 case BFD_RELOC_PPC_GOT_TPREL16: r = R_PPC_GOT_TPREL16; break;
1963 case BFD_RELOC_PPC_GOT_TPREL16_LO: r = R_PPC_GOT_TPREL16_LO; break;
1964 case BFD_RELOC_PPC_GOT_TPREL16_HI: r = R_PPC_GOT_TPREL16_HI; break;
1965 case BFD_RELOC_PPC_GOT_TPREL16_HA: r = R_PPC_GOT_TPREL16_HA; break;
1966 case BFD_RELOC_PPC_GOT_DTPREL16: r = R_PPC_GOT_DTPREL16; break;
1967 case BFD_RELOC_PPC_GOT_DTPREL16_LO: r = R_PPC_GOT_DTPREL16_LO; break;
1968 case BFD_RELOC_PPC_GOT_DTPREL16_HI: r = R_PPC_GOT_DTPREL16_HI; break;
1969 case BFD_RELOC_PPC_GOT_DTPREL16_HA: r = R_PPC_GOT_DTPREL16_HA; break;
1970 case BFD_RELOC_PPC_EMB_NADDR32: r = R_PPC_EMB_NADDR32; break;
1971 case BFD_RELOC_PPC_EMB_NADDR16: r = R_PPC_EMB_NADDR16; break;
1972 case BFD_RELOC_PPC_EMB_NADDR16_LO: r = R_PPC_EMB_NADDR16_LO; break;
1973 case BFD_RELOC_PPC_EMB_NADDR16_HI: r = R_PPC_EMB_NADDR16_HI; break;
1974 case BFD_RELOC_PPC_EMB_NADDR16_HA: r = R_PPC_EMB_NADDR16_HA; break;
1975 case BFD_RELOC_PPC_EMB_SDAI16: r = R_PPC_EMB_SDAI16; break;
1976 case BFD_RELOC_PPC_EMB_SDA2I16: r = R_PPC_EMB_SDA2I16; break;
1977 case BFD_RELOC_PPC_EMB_SDA2REL: r = R_PPC_EMB_SDA2REL; break;
1978 case BFD_RELOC_PPC_EMB_SDA21: r = R_PPC_EMB_SDA21; break;
1979 case BFD_RELOC_PPC_EMB_MRKREF: r = R_PPC_EMB_MRKREF; break;
1980 case BFD_RELOC_PPC_EMB_RELSEC16: r = R_PPC_EMB_RELSEC16; break;
1981 case BFD_RELOC_PPC_EMB_RELST_LO: r = R_PPC_EMB_RELST_LO; break;
1982 case BFD_RELOC_PPC_EMB_RELST_HI: r = R_PPC_EMB_RELST_HI; break;
1983 case BFD_RELOC_PPC_EMB_RELST_HA: r = R_PPC_EMB_RELST_HA; break;
1984 case BFD_RELOC_PPC_EMB_BIT_FLD: r = R_PPC_EMB_BIT_FLD; break;
1985 case BFD_RELOC_PPC_EMB_RELSDA: r = R_PPC_EMB_RELSDA; break;
1986 case BFD_RELOC_PPC_VLE_REL8: r = R_PPC_VLE_REL8; break;
1987 case BFD_RELOC_PPC_VLE_REL15: r = R_PPC_VLE_REL15; break;
1988 case BFD_RELOC_PPC_VLE_REL24: r = R_PPC_VLE_REL24; break;
1989 case BFD_RELOC_PPC_VLE_LO16A: r = R_PPC_VLE_LO16A; break;
1990 case BFD_RELOC_PPC_VLE_LO16D: r = R_PPC_VLE_LO16D; break;
1991 case BFD_RELOC_PPC_VLE_HI16A: r = R_PPC_VLE_HI16A; break;
1992 case BFD_RELOC_PPC_VLE_HI16D: r = R_PPC_VLE_HI16D; break;
1993 case BFD_RELOC_PPC_VLE_HA16A: r = R_PPC_VLE_HA16A; break;
1994 case BFD_RELOC_PPC_VLE_HA16D: r = R_PPC_VLE_HA16D; break;
1995 case BFD_RELOC_PPC_VLE_SDA21: r = R_PPC_VLE_SDA21; break;
1996 case BFD_RELOC_PPC_VLE_SDA21_LO: r = R_PPC_VLE_SDA21_LO; break;
1997 case BFD_RELOC_PPC_VLE_SDAREL_LO16A:
1998 r = R_PPC_VLE_SDAREL_LO16A;
1999 break;
2000 case BFD_RELOC_PPC_VLE_SDAREL_LO16D:
2001 r = R_PPC_VLE_SDAREL_LO16D;
2002 break;
2003 case BFD_RELOC_PPC_VLE_SDAREL_HI16A:
2004 r = R_PPC_VLE_SDAREL_HI16A;
2005 break;
2006 case BFD_RELOC_PPC_VLE_SDAREL_HI16D:
2007 r = R_PPC_VLE_SDAREL_HI16D;
2008 break;
2009 case BFD_RELOC_PPC_VLE_SDAREL_HA16A:
2010 r = R_PPC_VLE_SDAREL_HA16A;
2011 break;
2012 case BFD_RELOC_PPC_VLE_SDAREL_HA16D:
2013 r = R_PPC_VLE_SDAREL_HA16D;
2014 break;
2015 case BFD_RELOC_16_PCREL: r = R_PPC_REL16; break;
2016 case BFD_RELOC_LO16_PCREL: r = R_PPC_REL16_LO; break;
2017 case BFD_RELOC_HI16_PCREL: r = R_PPC_REL16_HI; break;
2018 case BFD_RELOC_HI16_S_PCREL: r = R_PPC_REL16_HA; break;
2019 case BFD_RELOC_PPC_16DX_HA: r = R_PPC_16DX_HA; break;
2020 case BFD_RELOC_PPC_REL16DX_HA: r = R_PPC_REL16DX_HA; break;
2021 case BFD_RELOC_VTABLE_INHERIT: r = R_PPC_GNU_VTINHERIT; break;
2022 case BFD_RELOC_VTABLE_ENTRY: r = R_PPC_GNU_VTENTRY; break;
2023 }
2024
2025 return ppc_elf_howto_table[r];
2026 };
2027
2028 static reloc_howto_type *
2029 ppc_elf_reloc_name_lookup (bfd *abfd ATTRIBUTE_UNUSED,
2030 const char *r_name)
2031 {
2032 unsigned int i;
2033
2034 for (i = 0;
2035 i < sizeof (ppc_elf_howto_raw) / sizeof (ppc_elf_howto_raw[0]);
2036 i++)
2037 if (ppc_elf_howto_raw[i].name != NULL
2038 && strcasecmp (ppc_elf_howto_raw[i].name, r_name) == 0)
2039 return &ppc_elf_howto_raw[i];
2040
2041 return NULL;
2042 }
2043
2044 /* Set the howto pointer for a PowerPC ELF reloc. */
2045
2046 static bfd_boolean
2047 ppc_elf_info_to_howto (bfd *abfd,
2048 arelent *cache_ptr,
2049 Elf_Internal_Rela *dst)
2050 {
2051 unsigned int r_type;
2052
2053 /* Initialize howto table if not already done. */
2054 if (!ppc_elf_howto_table[R_PPC_ADDR32])
2055 ppc_elf_howto_init ();
2056
2057 r_type = ELF32_R_TYPE (dst->r_info);
2058 if (r_type >= R_PPC_max)
2059 {
2060 /* xgettext:c-format */
2061 _bfd_error_handler (_("%pB: unsupported relocation type %#x"),
2062 abfd, r_type);
2063 bfd_set_error (bfd_error_bad_value);
2064 return FALSE;
2065 }
2066
2067 cache_ptr->howto = ppc_elf_howto_table[r_type];
2068
2069 /* Just because the above assert didn't trigger doesn't mean that
2070 ELF32_R_TYPE (dst->r_info) is necessarily a valid relocation. */
2071 if (cache_ptr->howto == NULL)
2072 {
2073 /* xgettext:c-format */
2074 _bfd_error_handler (_("%pB: unsupported relocation type %#x"),
2075 abfd, r_type);
2076 bfd_set_error (bfd_error_bad_value);
2077
2078 return FALSE;
2079 }
2080
2081 return TRUE;
2082 }
2083
2084 /* Handle the R_PPC_ADDR16_HA and R_PPC_REL16_HA relocs. */
2085
2086 static bfd_reloc_status_type
2087 ppc_elf_addr16_ha_reloc (bfd *abfd,
2088 arelent *reloc_entry,
2089 asymbol *symbol,
2090 void *data,
2091 asection *input_section,
2092 bfd *output_bfd,
2093 char **error_message ATTRIBUTE_UNUSED)
2094 {
2095 enum elf_ppc_reloc_type r_type;
2096 long insn;
2097 bfd_size_type octets;
2098 bfd_vma value;
2099
2100 if (output_bfd != NULL)
2101 {
2102 reloc_entry->address += input_section->output_offset;
2103 return bfd_reloc_ok;
2104 }
2105
2106 reloc_entry->addend += 0x8000;
2107 r_type = reloc_entry->howto->type;
2108 if (r_type != R_PPC_REL16DX_HA)
2109 return bfd_reloc_continue;
2110
2111 value = 0;
2112 if (!bfd_is_com_section (symbol->section))
2113 value = symbol->value;
2114 value += (reloc_entry->addend
2115 + symbol->section->output_offset
2116 + symbol->section->output_section->vma);
2117 value -= (reloc_entry->address
2118 + input_section->output_offset
2119 + input_section->output_section->vma);
2120 value >>= 16;
2121
2122 octets = reloc_entry->address * bfd_octets_per_byte (abfd);
2123 insn = bfd_get_32 (abfd, (bfd_byte *) data + octets);
2124 insn &= ~0x1fffc1;
2125 insn |= (value & 0xffc1) | ((value & 0x3e) << 15);
2126 bfd_put_32 (abfd, insn, (bfd_byte *) data + octets);
2127 return bfd_reloc_ok;
2128 }
2129
2130 static bfd_reloc_status_type
2131 ppc_elf_unhandled_reloc (bfd *abfd,
2132 arelent *reloc_entry,
2133 asymbol *symbol,
2134 void *data,
2135 asection *input_section,
2136 bfd *output_bfd,
2137 char **error_message)
2138 {
2139 /* If this is a relocatable link (output_bfd test tells us), just
2140 call the generic function. Any adjustment will be done at final
2141 link time. */
2142 if (output_bfd != NULL)
2143 return bfd_elf_generic_reloc (abfd, reloc_entry, symbol, data,
2144 input_section, output_bfd, error_message);
2145
2146 if (error_message != NULL)
2147 {
2148 static char buf[60];
2149 sprintf (buf, _("generic linker can't handle %s"),
2150 reloc_entry->howto->name);
2151 *error_message = buf;
2152 }
2153 return bfd_reloc_dangerous;
2154 }
2155 \f
2156 /* Sections created by the linker. */
2157
2158 typedef struct elf_linker_section
2159 {
2160 /* Pointer to the bfd section. */
2161 asection *section;
2162 /* Section name. */
2163 const char *name;
2164 /* Associated bss section name. */
2165 const char *bss_name;
2166 /* Associated symbol name. */
2167 const char *sym_name;
2168 /* Associated symbol. */
2169 struct elf_link_hash_entry *sym;
2170 } elf_linker_section_t;
2171
2172 /* Linked list of allocated pointer entries. This hangs off of the
2173 symbol lists, and provides allows us to return different pointers,
2174 based on different addend's. */
2175
2176 typedef struct elf_linker_section_pointers
2177 {
2178 /* next allocated pointer for this symbol */
2179 struct elf_linker_section_pointers *next;
2180 /* offset of pointer from beginning of section */
2181 bfd_vma offset;
2182 /* addend used */
2183 bfd_vma addend;
2184 /* which linker section this is */
2185 elf_linker_section_t *lsect;
2186 } elf_linker_section_pointers_t;
2187
2188 struct ppc_elf_obj_tdata
2189 {
2190 struct elf_obj_tdata elf;
2191
2192 /* A mapping from local symbols to offsets into the various linker
2193 sections added. This is index by the symbol index. */
2194 elf_linker_section_pointers_t **linker_section_pointers;
2195
2196 /* Flags used to auto-detect plt type. */
2197 unsigned int makes_plt_call : 1;
2198 unsigned int has_rel16 : 1;
2199 };
2200
2201 #define ppc_elf_tdata(bfd) \
2202 ((struct ppc_elf_obj_tdata *) (bfd)->tdata.any)
2203
2204 #define elf_local_ptr_offsets(bfd) \
2205 (ppc_elf_tdata (bfd)->linker_section_pointers)
2206
2207 #define is_ppc_elf(bfd) \
2208 (bfd_get_flavour (bfd) == bfd_target_elf_flavour \
2209 && elf_object_id (bfd) == PPC32_ELF_DATA)
2210
2211 /* Override the generic function because we store some extras. */
2212
2213 static bfd_boolean
2214 ppc_elf_mkobject (bfd *abfd)
2215 {
2216 return bfd_elf_allocate_object (abfd, sizeof (struct ppc_elf_obj_tdata),
2217 PPC32_ELF_DATA);
2218 }
2219
2220 /* When defaulting arch/mach, decode apuinfo to find a better match. */
2221
2222 bfd_boolean
2223 _bfd_elf_ppc_set_arch (bfd *abfd)
2224 {
2225 unsigned long mach = 0;
2226 asection *s;
2227 unsigned char *contents;
2228
2229 if (abfd->arch_info->bits_per_word == 32
2230 && bfd_big_endian (abfd))
2231 {
2232
2233 for (s = abfd->sections; s != NULL; s = s->next)
2234 if ((elf_section_data (s)->this_hdr.sh_flags & SHF_PPC_VLE) != 0)
2235 break;
2236 if (s != NULL)
2237 mach = bfd_mach_ppc_vle;
2238 }
2239
2240 if (mach == 0)
2241 {
2242 s = bfd_get_section_by_name (abfd, APUINFO_SECTION_NAME);
2243 if (s != NULL && bfd_malloc_and_get_section (abfd, s, &contents))
2244 {
2245 unsigned int apuinfo_size = bfd_get_32 (abfd, contents + 4);
2246 unsigned int i;
2247
2248 for (i = 20; i < apuinfo_size + 20 && i + 4 <= s->size; i += 4)
2249 {
2250 unsigned int val = bfd_get_32 (abfd, contents + i);
2251 switch (val >> 16)
2252 {
2253 case PPC_APUINFO_PMR:
2254 case PPC_APUINFO_RFMCI:
2255 if (mach == 0)
2256 mach = bfd_mach_ppc_titan;
2257 break;
2258
2259 case PPC_APUINFO_ISEL:
2260 case PPC_APUINFO_CACHELCK:
2261 if (mach == bfd_mach_ppc_titan)
2262 mach = bfd_mach_ppc_e500mc;
2263 break;
2264
2265 case PPC_APUINFO_SPE:
2266 case PPC_APUINFO_EFS:
2267 case PPC_APUINFO_BRLOCK:
2268 if (mach != bfd_mach_ppc_vle)
2269 mach = bfd_mach_ppc_e500;
2270 break;
2271
2272 case PPC_APUINFO_VLE:
2273 mach = bfd_mach_ppc_vle;
2274 break;
2275
2276 default:
2277 mach = -1ul;
2278 }
2279 }
2280 free (contents);
2281 }
2282 }
2283
2284 if (mach != 0 && mach != -1ul)
2285 {
2286 const bfd_arch_info_type *arch;
2287
2288 for (arch = abfd->arch_info->next; arch; arch = arch->next)
2289 if (arch->mach == mach)
2290 {
2291 abfd->arch_info = arch;
2292 break;
2293 }
2294 }
2295 return TRUE;
2296 }
2297
2298 /* Fix bad default arch selected for a 32 bit input bfd when the
2299 default is 64 bit. Also select arch based on apuinfo. */
2300
2301 static bfd_boolean
2302 ppc_elf_object_p (bfd *abfd)
2303 {
2304 if (!abfd->arch_info->the_default)
2305 return TRUE;
2306
2307 if (abfd->arch_info->bits_per_word == 64)
2308 {
2309 Elf_Internal_Ehdr *i_ehdr = elf_elfheader (abfd);
2310
2311 if (i_ehdr->e_ident[EI_CLASS] == ELFCLASS32)
2312 {
2313 /* Relies on arch after 64 bit default being 32 bit default. */
2314 abfd->arch_info = abfd->arch_info->next;
2315 BFD_ASSERT (abfd->arch_info->bits_per_word == 32);
2316 }
2317 }
2318 return _bfd_elf_ppc_set_arch (abfd);
2319 }
2320
2321 /* Function to set whether a module needs the -mrelocatable bit set. */
2322
2323 static bfd_boolean
2324 ppc_elf_set_private_flags (bfd *abfd, flagword flags)
2325 {
2326 BFD_ASSERT (!elf_flags_init (abfd)
2327 || elf_elfheader (abfd)->e_flags == flags);
2328
2329 elf_elfheader (abfd)->e_flags = flags;
2330 elf_flags_init (abfd) = TRUE;
2331 return TRUE;
2332 }
2333
2334 /* Support for core dump NOTE sections. */
2335
2336 static bfd_boolean
2337 ppc_elf_grok_prstatus (bfd *abfd, Elf_Internal_Note *note)
2338 {
2339 int offset;
2340 unsigned int size;
2341
2342 switch (note->descsz)
2343 {
2344 default:
2345 return FALSE;
2346
2347 case 268: /* Linux/PPC. */
2348 /* pr_cursig */
2349 elf_tdata (abfd)->core->signal = bfd_get_16 (abfd, note->descdata + 12);
2350
2351 /* pr_pid */
2352 elf_tdata (abfd)->core->lwpid = bfd_get_32 (abfd, note->descdata + 24);
2353
2354 /* pr_reg */
2355 offset = 72;
2356 size = 192;
2357
2358 break;
2359 }
2360
2361 /* Make a ".reg/999" section. */
2362 return _bfd_elfcore_make_pseudosection (abfd, ".reg",
2363 size, note->descpos + offset);
2364 }
2365
2366 static bfd_boolean
2367 ppc_elf_grok_psinfo (bfd *abfd, Elf_Internal_Note *note)
2368 {
2369 switch (note->descsz)
2370 {
2371 default:
2372 return FALSE;
2373
2374 case 128: /* Linux/PPC elf_prpsinfo. */
2375 elf_tdata (abfd)->core->pid
2376 = bfd_get_32 (abfd, note->descdata + 16);
2377 elf_tdata (abfd)->core->program
2378 = _bfd_elfcore_strndup (abfd, note->descdata + 32, 16);
2379 elf_tdata (abfd)->core->command
2380 = _bfd_elfcore_strndup (abfd, note->descdata + 48, 80);
2381 }
2382
2383 /* Note that for some reason, a spurious space is tacked
2384 onto the end of the args in some (at least one anyway)
2385 implementations, so strip it off if it exists. */
2386
2387 {
2388 char *command = elf_tdata (abfd)->core->command;
2389 int n = strlen (command);
2390
2391 if (0 < n && command[n - 1] == ' ')
2392 command[n - 1] = '\0';
2393 }
2394
2395 return TRUE;
2396 }
2397
2398 static char *
2399 ppc_elf_write_core_note (bfd *abfd, char *buf, int *bufsiz, int note_type, ...)
2400 {
2401 switch (note_type)
2402 {
2403 default:
2404 return NULL;
2405
2406 case NT_PRPSINFO:
2407 {
2408 char data[128];
2409 va_list ap;
2410
2411 va_start (ap, note_type);
2412 memset (data, 0, sizeof (data));
2413 strncpy (data + 32, va_arg (ap, const char *), 16);
2414 strncpy (data + 48, va_arg (ap, const char *), 80);
2415 va_end (ap);
2416 return elfcore_write_note (abfd, buf, bufsiz,
2417 "CORE", note_type, data, sizeof (data));
2418 }
2419
2420 case NT_PRSTATUS:
2421 {
2422 char data[268];
2423 va_list ap;
2424 long pid;
2425 int cursig;
2426 const void *greg;
2427
2428 va_start (ap, note_type);
2429 memset (data, 0, 72);
2430 pid = va_arg (ap, long);
2431 bfd_put_32 (abfd, pid, data + 24);
2432 cursig = va_arg (ap, int);
2433 bfd_put_16 (abfd, cursig, data + 12);
2434 greg = va_arg (ap, const void *);
2435 memcpy (data + 72, greg, 192);
2436 memset (data + 264, 0, 4);
2437 va_end (ap);
2438 return elfcore_write_note (abfd, buf, bufsiz,
2439 "CORE", note_type, data, sizeof (data));
2440 }
2441 }
2442 }
2443
2444 static flagword
2445 ppc_elf_lookup_section_flags (char *flag_name)
2446 {
2447
2448 if (!strcmp (flag_name, "SHF_PPC_VLE"))
2449 return SHF_PPC_VLE;
2450
2451 return 0;
2452 }
2453
2454 /* Return address for Ith PLT stub in section PLT, for relocation REL
2455 or (bfd_vma) -1 if it should not be included. */
2456
2457 static bfd_vma
2458 ppc_elf_plt_sym_val (bfd_vma i ATTRIBUTE_UNUSED,
2459 const asection *plt ATTRIBUTE_UNUSED,
2460 const arelent *rel)
2461 {
2462 return rel->address;
2463 }
2464
2465 /* Handle a PowerPC specific section when reading an object file. This
2466 is called when bfd_section_from_shdr finds a section with an unknown
2467 type. */
2468
2469 static bfd_boolean
2470 ppc_elf_section_from_shdr (bfd *abfd,
2471 Elf_Internal_Shdr *hdr,
2472 const char *name,
2473 int shindex)
2474 {
2475 asection *newsect;
2476 flagword flags;
2477
2478 if (! _bfd_elf_make_section_from_shdr (abfd, hdr, name, shindex))
2479 return FALSE;
2480
2481 newsect = hdr->bfd_section;
2482 flags = bfd_get_section_flags (abfd, newsect);
2483 if (hdr->sh_flags & SHF_EXCLUDE)
2484 flags |= SEC_EXCLUDE;
2485
2486 if (hdr->sh_type == SHT_ORDERED)
2487 flags |= SEC_SORT_ENTRIES;
2488
2489 bfd_set_section_flags (abfd, newsect, flags);
2490 return TRUE;
2491 }
2492
2493 /* Set up any other section flags and such that may be necessary. */
2494
2495 static bfd_boolean
2496 ppc_elf_fake_sections (bfd *abfd ATTRIBUTE_UNUSED,
2497 Elf_Internal_Shdr *shdr,
2498 asection *asect)
2499 {
2500 if ((asect->flags & SEC_SORT_ENTRIES) != 0)
2501 shdr->sh_type = SHT_ORDERED;
2502
2503 return TRUE;
2504 }
2505
2506 /* If we have .sbss2 or .PPC.EMB.sbss0 output sections, we
2507 need to bump up the number of section headers. */
2508
2509 static int
2510 ppc_elf_additional_program_headers (bfd *abfd,
2511 struct bfd_link_info *info ATTRIBUTE_UNUSED)
2512 {
2513 asection *s;
2514 int ret = 0;
2515
2516 s = bfd_get_section_by_name (abfd, ".sbss2");
2517 if (s != NULL && (s->flags & SEC_ALLOC) != 0)
2518 ++ret;
2519
2520 s = bfd_get_section_by_name (abfd, ".PPC.EMB.sbss0");
2521 if (s != NULL && (s->flags & SEC_ALLOC) != 0)
2522 ++ret;
2523
2524 return ret;
2525 }
2526
2527 /* Modify the segment map for VLE executables. */
2528
2529 bfd_boolean
2530 ppc_elf_modify_segment_map (bfd *abfd,
2531 struct bfd_link_info *info ATTRIBUTE_UNUSED)
2532 {
2533 struct elf_segment_map *m;
2534
2535 /* At this point in the link, output sections have already been sorted by
2536 LMA and assigned to segments. All that is left to do is to ensure
2537 there is no mixing of VLE & non-VLE sections in a text segment.
2538 If we find that case, we split the segment.
2539 We maintain the original output section order. */
2540
2541 for (m = elf_seg_map (abfd); m != NULL; m = m->next)
2542 {
2543 struct elf_segment_map *n;
2544 bfd_size_type amt;
2545 unsigned int j, k;
2546 unsigned int p_flags;
2547
2548 if (m->p_type != PT_LOAD || m->count == 0)
2549 continue;
2550
2551 for (p_flags = PF_R, j = 0; j != m->count; ++j)
2552 {
2553 if ((m->sections[j]->flags & SEC_READONLY) == 0)
2554 p_flags |= PF_W;
2555 if ((m->sections[j]->flags & SEC_CODE) != 0)
2556 {
2557 p_flags |= PF_X;
2558 if ((elf_section_flags (m->sections[j]) & SHF_PPC_VLE) != 0)
2559 p_flags |= PF_PPC_VLE;
2560 break;
2561 }
2562 }
2563 if (j != m->count)
2564 while (++j != m->count)
2565 {
2566 unsigned int p_flags1 = PF_R;
2567
2568 if ((m->sections[j]->flags & SEC_READONLY) == 0)
2569 p_flags1 |= PF_W;
2570 if ((m->sections[j]->flags & SEC_CODE) != 0)
2571 {
2572 p_flags1 |= PF_X;
2573 if ((elf_section_flags (m->sections[j]) & SHF_PPC_VLE) != 0)
2574 p_flags1 |= PF_PPC_VLE;
2575 if (((p_flags1 ^ p_flags) & PF_PPC_VLE) != 0)
2576 break;
2577 }
2578 p_flags |= p_flags1;
2579 }
2580 /* If we're splitting a segment which originally contained rw
2581 sections then those sections might now only be in one of the
2582 two parts. So always set p_flags if splitting, even if we
2583 are being called for objcopy with p_flags_valid set. */
2584 if (j != m->count || !m->p_flags_valid)
2585 {
2586 m->p_flags_valid = 1;
2587 m->p_flags = p_flags;
2588 }
2589 if (j == m->count)
2590 continue;
2591
2592 /* Sections 0..j-1 stay in this (current) segment,
2593 the remainder are put in a new segment.
2594 The scan resumes with the new segment. */
2595
2596 amt = sizeof (struct elf_segment_map);
2597 amt += (m->count - j - 1) * sizeof (asection *);
2598 n = (struct elf_segment_map *) bfd_zalloc (abfd, amt);
2599 if (n == NULL)
2600 return FALSE;
2601
2602 n->p_type = PT_LOAD;
2603 n->count = m->count - j;
2604 for (k = 0; k < n->count; ++k)
2605 n->sections[k] = m->sections[j + k];
2606 m->count = j;
2607 m->p_size_valid = 0;
2608 n->next = m->next;
2609 m->next = n;
2610 }
2611
2612 return TRUE;
2613 }
2614
2615 /* Add extra PPC sections -- Note, for now, make .sbss2 and
2616 .PPC.EMB.sbss0 a normal section, and not a bss section so
2617 that the linker doesn't crater when trying to make more than
2618 2 sections. */
2619
2620 static const struct bfd_elf_special_section ppc_elf_special_sections[] =
2621 {
2622 { STRING_COMMA_LEN (".plt"), 0, SHT_NOBITS, SHF_ALLOC + SHF_EXECINSTR },
2623 { STRING_COMMA_LEN (".sbss"), -2, SHT_NOBITS, SHF_ALLOC + SHF_WRITE },
2624 { STRING_COMMA_LEN (".sbss2"), -2, SHT_PROGBITS, SHF_ALLOC },
2625 { STRING_COMMA_LEN (".sdata"), -2, SHT_PROGBITS, SHF_ALLOC + SHF_WRITE },
2626 { STRING_COMMA_LEN (".sdata2"), -2, SHT_PROGBITS, SHF_ALLOC },
2627 { STRING_COMMA_LEN (".tags"), 0, SHT_ORDERED, SHF_ALLOC },
2628 { STRING_COMMA_LEN (APUINFO_SECTION_NAME), 0, SHT_NOTE, 0 },
2629 { STRING_COMMA_LEN (".PPC.EMB.sbss0"), 0, SHT_PROGBITS, SHF_ALLOC },
2630 { STRING_COMMA_LEN (".PPC.EMB.sdata0"), 0, SHT_PROGBITS, SHF_ALLOC },
2631 { NULL, 0, 0, 0, 0 }
2632 };
2633
2634 /* This is what we want for new plt/got. */
2635 static struct bfd_elf_special_section ppc_alt_plt =
2636 { STRING_COMMA_LEN (".plt"), 0, SHT_PROGBITS, SHF_ALLOC };
2637
2638 static const struct bfd_elf_special_section *
2639 ppc_elf_get_sec_type_attr (bfd *abfd, asection *sec)
2640 {
2641 const struct bfd_elf_special_section *ssect;
2642
2643 /* See if this is one of the special sections. */
2644 if (sec->name == NULL)
2645 return NULL;
2646
2647 ssect = _bfd_elf_get_special_section (sec->name, ppc_elf_special_sections,
2648 sec->use_rela_p);
2649 if (ssect != NULL)
2650 {
2651 if (ssect == ppc_elf_special_sections && (sec->flags & SEC_LOAD) != 0)
2652 ssect = &ppc_alt_plt;
2653 return ssect;
2654 }
2655
2656 return _bfd_elf_get_sec_type_attr (abfd, sec);
2657 }
2658 \f
2659 /* Very simple linked list structure for recording apuinfo values. */
2660 typedef struct apuinfo_list
2661 {
2662 struct apuinfo_list *next;
2663 unsigned long value;
2664 }
2665 apuinfo_list;
2666
2667 static apuinfo_list *head;
2668 static bfd_boolean apuinfo_set;
2669
2670 static void
2671 apuinfo_list_init (void)
2672 {
2673 head = NULL;
2674 apuinfo_set = FALSE;
2675 }
2676
2677 static void
2678 apuinfo_list_add (unsigned long value)
2679 {
2680 apuinfo_list *entry = head;
2681
2682 while (entry != NULL)
2683 {
2684 if (entry->value == value)
2685 return;
2686 entry = entry->next;
2687 }
2688
2689 entry = bfd_malloc (sizeof (* entry));
2690 if (entry == NULL)
2691 return;
2692
2693 entry->value = value;
2694 entry->next = head;
2695 head = entry;
2696 }
2697
2698 static unsigned
2699 apuinfo_list_length (void)
2700 {
2701 apuinfo_list *entry;
2702 unsigned long count;
2703
2704 for (entry = head, count = 0;
2705 entry;
2706 entry = entry->next)
2707 ++ count;
2708
2709 return count;
2710 }
2711
2712 static inline unsigned long
2713 apuinfo_list_element (unsigned long number)
2714 {
2715 apuinfo_list * entry;
2716
2717 for (entry = head;
2718 entry && number --;
2719 entry = entry->next)
2720 ;
2721
2722 return entry ? entry->value : 0;
2723 }
2724
2725 static void
2726 apuinfo_list_finish (void)
2727 {
2728 apuinfo_list *entry;
2729
2730 for (entry = head; entry;)
2731 {
2732 apuinfo_list *next = entry->next;
2733 free (entry);
2734 entry = next;
2735 }
2736
2737 head = NULL;
2738 }
2739
2740 /* Scan the input BFDs and create a linked list of
2741 the APUinfo values that will need to be emitted. */
2742
2743 static void
2744 ppc_elf_begin_write_processing (bfd *abfd, struct bfd_link_info *link_info)
2745 {
2746 bfd *ibfd;
2747 asection *asec;
2748 char *buffer = NULL;
2749 bfd_size_type largest_input_size = 0;
2750 unsigned i;
2751 unsigned long length;
2752 const char *error_message = NULL;
2753
2754 if (link_info == NULL)
2755 return;
2756
2757 apuinfo_list_init ();
2758
2759 /* Read in the input sections contents. */
2760 for (ibfd = link_info->input_bfds; ibfd; ibfd = ibfd->link.next)
2761 {
2762 unsigned long datum;
2763
2764 asec = bfd_get_section_by_name (ibfd, APUINFO_SECTION_NAME);
2765 if (asec == NULL)
2766 continue;
2767
2768 /* xgettext:c-format */
2769 error_message = _("corrupt %s section in %pB");
2770 length = asec->size;
2771 if (length < 20)
2772 goto fail;
2773
2774 apuinfo_set = TRUE;
2775 if (largest_input_size < asec->size)
2776 {
2777 if (buffer)
2778 free (buffer);
2779 largest_input_size = asec->size;
2780 buffer = bfd_malloc (largest_input_size);
2781 if (!buffer)
2782 return;
2783 }
2784
2785 if (bfd_seek (ibfd, asec->filepos, SEEK_SET) != 0
2786 || (bfd_bread (buffer, length, ibfd) != length))
2787 {
2788 /* xgettext:c-format */
2789 error_message = _("unable to read in %s section from %pB");
2790 goto fail;
2791 }
2792
2793 /* Verify the contents of the header. Note - we have to
2794 extract the values this way in order to allow for a
2795 host whose endian-ness is different from the target. */
2796 datum = bfd_get_32 (ibfd, buffer);
2797 if (datum != sizeof APUINFO_LABEL)
2798 goto fail;
2799
2800 datum = bfd_get_32 (ibfd, buffer + 8);
2801 if (datum != 0x2)
2802 goto fail;
2803
2804 if (strcmp (buffer + 12, APUINFO_LABEL) != 0)
2805 goto fail;
2806
2807 /* Get the number of bytes used for apuinfo entries. */
2808 datum = bfd_get_32 (ibfd, buffer + 4);
2809 if (datum + 20 != length)
2810 goto fail;
2811
2812 /* Scan the apuinfo section, building a list of apuinfo numbers. */
2813 for (i = 0; i < datum; i += 4)
2814 apuinfo_list_add (bfd_get_32 (ibfd, buffer + 20 + i));
2815 }
2816
2817 error_message = NULL;
2818
2819 if (apuinfo_set)
2820 {
2821 /* Compute the size of the output section. */
2822 unsigned num_entries = apuinfo_list_length ();
2823
2824 /* Set the output section size, if it exists. */
2825 asec = bfd_get_section_by_name (abfd, APUINFO_SECTION_NAME);
2826
2827 if (asec && ! bfd_set_section_size (abfd, asec, 20 + num_entries * 4))
2828 {
2829 ibfd = abfd;
2830 /* xgettext:c-format */
2831 error_message = _("warning: unable to set size of %s section in %pB");
2832 }
2833 }
2834
2835 fail:
2836 if (buffer)
2837 free (buffer);
2838
2839 if (error_message)
2840 _bfd_error_handler (error_message, APUINFO_SECTION_NAME, ibfd);
2841 }
2842
2843 /* Prevent the output section from accumulating the input sections'
2844 contents. We have already stored this in our linked list structure. */
2845
2846 static bfd_boolean
2847 ppc_elf_write_section (bfd *abfd ATTRIBUTE_UNUSED,
2848 struct bfd_link_info *link_info ATTRIBUTE_UNUSED,
2849 asection *asec,
2850 bfd_byte *contents ATTRIBUTE_UNUSED)
2851 {
2852 return apuinfo_set && strcmp (asec->name, APUINFO_SECTION_NAME) == 0;
2853 }
2854
2855 /* Finally we can generate the output section. */
2856
2857 static void
2858 ppc_elf_final_write_processing (bfd *abfd, bfd_boolean linker ATTRIBUTE_UNUSED)
2859 {
2860 bfd_byte *buffer;
2861 asection *asec;
2862 unsigned i;
2863 unsigned num_entries;
2864 bfd_size_type length;
2865
2866 asec = bfd_get_section_by_name (abfd, APUINFO_SECTION_NAME);
2867 if (asec == NULL)
2868 return;
2869
2870 if (!apuinfo_set)
2871 return;
2872
2873 length = asec->size;
2874 if (length < 20)
2875 return;
2876
2877 buffer = bfd_malloc (length);
2878 if (buffer == NULL)
2879 {
2880 _bfd_error_handler
2881 (_("failed to allocate space for new APUinfo section"));
2882 return;
2883 }
2884
2885 /* Create the apuinfo header. */
2886 num_entries = apuinfo_list_length ();
2887 bfd_put_32 (abfd, sizeof APUINFO_LABEL, buffer);
2888 bfd_put_32 (abfd, num_entries * 4, buffer + 4);
2889 bfd_put_32 (abfd, 0x2, buffer + 8);
2890 strcpy ((char *) buffer + 12, APUINFO_LABEL);
2891
2892 length = 20;
2893 for (i = 0; i < num_entries; i++)
2894 {
2895 bfd_put_32 (abfd, apuinfo_list_element (i), buffer + length);
2896 length += 4;
2897 }
2898
2899 if (length != asec->size)
2900 _bfd_error_handler (_("failed to compute new APUinfo section"));
2901
2902 if (! bfd_set_section_contents (abfd, asec, buffer, (file_ptr) 0, length))
2903 _bfd_error_handler (_("failed to install new APUinfo section"));
2904
2905 free (buffer);
2906
2907 apuinfo_list_finish ();
2908 }
2909 \f
2910 static bfd_boolean
2911 is_nonpic_glink_stub (bfd *abfd, asection *glink, bfd_vma off)
2912 {
2913 bfd_byte buf[4 * 4];
2914
2915 if (!bfd_get_section_contents (abfd, glink, buf, off, sizeof buf))
2916 return FALSE;
2917
2918 return ((bfd_get_32 (abfd, buf + 0) & 0xffff0000) == LIS_11
2919 && (bfd_get_32 (abfd, buf + 4) & 0xffff0000) == LWZ_11_11
2920 && bfd_get_32 (abfd, buf + 8) == MTCTR_11
2921 && bfd_get_32 (abfd, buf + 12) == BCTR);
2922 }
2923
2924 static bfd_boolean
2925 section_covers_vma (bfd *abfd ATTRIBUTE_UNUSED, asection *section, void *ptr)
2926 {
2927 bfd_vma vma = *(bfd_vma *) ptr;
2928 return ((section->flags & SEC_ALLOC) != 0
2929 && section->vma <= vma
2930 && vma < section->vma + section->size);
2931 }
2932
2933 static long
2934 ppc_elf_get_synthetic_symtab (bfd *abfd, long symcount, asymbol **syms,
2935 long dynsymcount, asymbol **dynsyms,
2936 asymbol **ret)
2937 {
2938 bfd_boolean (*slurp_relocs) (bfd *, asection *, asymbol **, bfd_boolean);
2939 asection *plt, *relplt, *dynamic, *glink;
2940 bfd_vma glink_vma = 0;
2941 bfd_vma resolv_vma = 0;
2942 bfd_vma stub_off;
2943 asymbol *s;
2944 arelent *p;
2945 long count, i, stub_delta;
2946 size_t size;
2947 char *names;
2948 bfd_byte buf[4];
2949
2950 *ret = NULL;
2951
2952 if ((abfd->flags & (DYNAMIC | EXEC_P)) == 0)
2953 return 0;
2954
2955 if (dynsymcount <= 0)
2956 return 0;
2957
2958 relplt = bfd_get_section_by_name (abfd, ".rela.plt");
2959 if (relplt == NULL)
2960 return 0;
2961
2962 plt = bfd_get_section_by_name (abfd, ".plt");
2963 if (plt == NULL)
2964 return 0;
2965
2966 /* Call common code to handle old-style executable PLTs. */
2967 if (elf_section_flags (plt) & SHF_EXECINSTR)
2968 return _bfd_elf_get_synthetic_symtab (abfd, symcount, syms,
2969 dynsymcount, dynsyms, ret);
2970
2971 /* If this object was prelinked, the prelinker stored the address
2972 of .glink at got[1]. If it wasn't prelinked, got[1] will be zero. */
2973 dynamic = bfd_get_section_by_name (abfd, ".dynamic");
2974 if (dynamic != NULL)
2975 {
2976 bfd_byte *dynbuf, *extdyn, *extdynend;
2977 size_t extdynsize;
2978 void (*swap_dyn_in) (bfd *, const void *, Elf_Internal_Dyn *);
2979
2980 if (!bfd_malloc_and_get_section (abfd, dynamic, &dynbuf))
2981 return -1;
2982
2983 extdynsize = get_elf_backend_data (abfd)->s->sizeof_dyn;
2984 swap_dyn_in = get_elf_backend_data (abfd)->s->swap_dyn_in;
2985
2986 extdyn = dynbuf;
2987 extdynend = extdyn + dynamic->size;
2988 for (; extdyn < extdynend; extdyn += extdynsize)
2989 {
2990 Elf_Internal_Dyn dyn;
2991 (*swap_dyn_in) (abfd, extdyn, &dyn);
2992
2993 if (dyn.d_tag == DT_NULL)
2994 break;
2995
2996 if (dyn.d_tag == DT_PPC_GOT)
2997 {
2998 unsigned int g_o_t = dyn.d_un.d_val;
2999 asection *got = bfd_get_section_by_name (abfd, ".got");
3000 if (got != NULL
3001 && bfd_get_section_contents (abfd, got, buf,
3002 g_o_t - got->vma + 4, 4))
3003 glink_vma = bfd_get_32 (abfd, buf);
3004 break;
3005 }
3006 }
3007 free (dynbuf);
3008 }
3009
3010 /* Otherwise we read the first plt entry. */
3011 if (glink_vma == 0)
3012 {
3013 if (bfd_get_section_contents (abfd, plt, buf, 0, 4))
3014 glink_vma = bfd_get_32 (abfd, buf);
3015 }
3016
3017 if (glink_vma == 0)
3018 return 0;
3019
3020 /* The .glink section usually does not survive the final
3021 link; search for the section (usually .text) where the
3022 glink stubs now reside. */
3023 glink = bfd_sections_find_if (abfd, section_covers_vma, &glink_vma);
3024 if (glink == NULL)
3025 return 0;
3026
3027 /* Determine glink PLT resolver by reading the relative branch
3028 from the first glink stub. */
3029 if (bfd_get_section_contents (abfd, glink, buf,
3030 glink_vma - glink->vma, 4))
3031 {
3032 unsigned int insn = bfd_get_32 (abfd, buf);
3033
3034 /* The first glink stub may either branch to the resolver ... */
3035 insn ^= B;
3036 if ((insn & ~0x3fffffc) == 0)
3037 resolv_vma = glink_vma + (insn ^ 0x2000000) - 0x2000000;
3038
3039 /* ... or fall through a bunch of NOPs. */
3040 else if ((insn ^ B ^ NOP) == 0)
3041 for (i = 4;
3042 bfd_get_section_contents (abfd, glink, buf,
3043 glink_vma - glink->vma + i, 4);
3044 i += 4)
3045 if (bfd_get_32 (abfd, buf) != NOP)
3046 {
3047 resolv_vma = glink_vma + i;
3048 break;
3049 }
3050 }
3051
3052 count = relplt->size / sizeof (Elf32_External_Rela);
3053 /* If the stubs are those for -shared/-pie then we might have
3054 multiple stubs for each plt entry. If that is the case then
3055 there is no way to associate stubs with their plt entries short
3056 of figuring out the GOT pointer value used in the stub.
3057 The offsets tested here need to cover all possible values of
3058 GLINK_ENTRY_SIZE for other than __tls_get_addr_opt. */
3059 stub_off = glink_vma - glink->vma;
3060 for (stub_delta = 16; stub_delta <= 32; stub_delta += 8)
3061 if (is_nonpic_glink_stub (abfd, glink, stub_off - stub_delta))
3062 break;
3063 if (stub_delta > 32)
3064 return 0;
3065
3066 slurp_relocs = get_elf_backend_data (abfd)->s->slurp_reloc_table;
3067 if (! (*slurp_relocs) (abfd, relplt, dynsyms, TRUE))
3068 return -1;
3069
3070 size = count * sizeof (asymbol);
3071 p = relplt->relocation;
3072 for (i = 0; i < count; i++, p++)
3073 {
3074 size += strlen ((*p->sym_ptr_ptr)->name) + sizeof ("@plt");
3075 if (p->addend != 0)
3076 size += sizeof ("+0x") - 1 + 8;
3077 }
3078
3079 size += sizeof (asymbol) + sizeof ("__glink");
3080
3081 if (resolv_vma)
3082 size += sizeof (asymbol) + sizeof ("__glink_PLTresolve");
3083
3084 s = *ret = bfd_malloc (size);
3085 if (s == NULL)
3086 return -1;
3087
3088 stub_off = glink_vma - glink->vma;
3089 names = (char *) (s + count + 1 + (resolv_vma != 0));
3090 p = relplt->relocation + count - 1;
3091 for (i = 0; i < count; i++)
3092 {
3093 size_t len;
3094
3095 stub_off -= stub_delta;
3096 if (strcmp ((*p->sym_ptr_ptr)->name, "__tls_get_addr_opt") == 0)
3097 stub_off -= 32;
3098 *s = **p->sym_ptr_ptr;
3099 /* Undefined syms won't have BSF_LOCAL or BSF_GLOBAL set. Since
3100 we are defining a symbol, ensure one of them is set. */
3101 if ((s->flags & BSF_LOCAL) == 0)
3102 s->flags |= BSF_GLOBAL;
3103 s->flags |= BSF_SYNTHETIC;
3104 s->section = glink;
3105 s->value = stub_off;
3106 s->name = names;
3107 s->udata.p = NULL;
3108 len = strlen ((*p->sym_ptr_ptr)->name);
3109 memcpy (names, (*p->sym_ptr_ptr)->name, len);
3110 names += len;
3111 if (p->addend != 0)
3112 {
3113 memcpy (names, "+0x", sizeof ("+0x") - 1);
3114 names += sizeof ("+0x") - 1;
3115 bfd_sprintf_vma (abfd, names, p->addend);
3116 names += strlen (names);
3117 }
3118 memcpy (names, "@plt", sizeof ("@plt"));
3119 names += sizeof ("@plt");
3120 ++s;
3121 --p;
3122 }
3123
3124 /* Add a symbol at the start of the glink branch table. */
3125 memset (s, 0, sizeof *s);
3126 s->the_bfd = abfd;
3127 s->flags = BSF_GLOBAL | BSF_SYNTHETIC;
3128 s->section = glink;
3129 s->value = glink_vma - glink->vma;
3130 s->name = names;
3131 memcpy (names, "__glink", sizeof ("__glink"));
3132 names += sizeof ("__glink");
3133 s++;
3134 count++;
3135
3136 if (resolv_vma)
3137 {
3138 /* Add a symbol for the glink PLT resolver. */
3139 memset (s, 0, sizeof *s);
3140 s->the_bfd = abfd;
3141 s->flags = BSF_GLOBAL | BSF_SYNTHETIC;
3142 s->section = glink;
3143 s->value = resolv_vma - glink->vma;
3144 s->name = names;
3145 memcpy (names, "__glink_PLTresolve", sizeof ("__glink_PLTresolve"));
3146 names += sizeof ("__glink_PLTresolve");
3147 s++;
3148 count++;
3149 }
3150
3151 return count;
3152 }
3153 \f
3154 /* The following functions are specific to the ELF linker, while
3155 functions above are used generally. They appear in this file more
3156 or less in the order in which they are called. eg.
3157 ppc_elf_check_relocs is called early in the link process,
3158 ppc_elf_finish_dynamic_sections is one of the last functions
3159 called. */
3160
3161 /* Track PLT entries needed for a given symbol. We might need more
3162 than one glink entry per symbol when generating a pic binary. */
3163 struct plt_entry
3164 {
3165 struct plt_entry *next;
3166
3167 /* -fPIC uses multiple GOT sections, one per file, called ".got2".
3168 This field stores the offset into .got2 used to initialise the
3169 GOT pointer reg. It will always be at least 32768. (Current
3170 gcc always uses an offset of 32768, but ld -r will pack .got2
3171 sections together resulting in larger offsets). */
3172 bfd_vma addend;
3173
3174 /* The .got2 section. */
3175 asection *sec;
3176
3177 /* PLT refcount or offset. */
3178 union
3179 {
3180 bfd_signed_vma refcount;
3181 bfd_vma offset;
3182 } plt;
3183
3184 /* .glink stub offset. */
3185 bfd_vma glink_offset;
3186 };
3187
3188 /* Of those relocs that might be copied as dynamic relocs, this
3189 function selects those that must be copied when linking a shared
3190 library or PIE, even when the symbol is local. */
3191
3192 static int
3193 must_be_dyn_reloc (struct bfd_link_info *info,
3194 enum elf_ppc_reloc_type r_type)
3195 {
3196 switch (r_type)
3197 {
3198 default:
3199 /* Only relative relocs can be resolved when the object load
3200 address isn't fixed. DTPREL32 is excluded because the
3201 dynamic linker needs to differentiate global dynamic from
3202 local dynamic __tls_index pairs when PPC_OPT_TLS is set. */
3203 return 1;
3204
3205 case R_PPC_REL24:
3206 case R_PPC_REL14:
3207 case R_PPC_REL14_BRTAKEN:
3208 case R_PPC_REL14_BRNTAKEN:
3209 case R_PPC_REL32:
3210 return 0;
3211
3212 case R_PPC_TPREL32:
3213 case R_PPC_TPREL16:
3214 case R_PPC_TPREL16_LO:
3215 case R_PPC_TPREL16_HI:
3216 case R_PPC_TPREL16_HA:
3217 /* These relocations are relative but in a shared library the
3218 linker doesn't know the thread pointer base. */
3219 return bfd_link_dll (info);
3220 }
3221 }
3222
3223 /* If ELIMINATE_COPY_RELOCS is non-zero, the linker will try to avoid
3224 copying dynamic variables from a shared lib into an app's dynbss
3225 section, and instead use a dynamic relocation to point into the
3226 shared lib. */
3227 #define ELIMINATE_COPY_RELOCS 1
3228
3229 /* Used to track dynamic relocations for local symbols. */
3230 struct ppc_dyn_relocs
3231 {
3232 struct ppc_dyn_relocs *next;
3233
3234 /* The input section of the reloc. */
3235 asection *sec;
3236
3237 /* Total number of relocs copied for the input section. */
3238 unsigned int count : 31;
3239
3240 /* Whether this entry is for STT_GNU_IFUNC symbols. */
3241 unsigned int ifunc : 1;
3242 };
3243
3244 /* PPC ELF linker hash entry. */
3245
3246 struct ppc_elf_link_hash_entry
3247 {
3248 struct elf_link_hash_entry elf;
3249
3250 /* If this symbol is used in the linker created sections, the processor
3251 specific backend uses this field to map the field into the offset
3252 from the beginning of the section. */
3253 elf_linker_section_pointers_t *linker_section_pointer;
3254
3255 /* Track dynamic relocs copied for this symbol. */
3256 struct elf_dyn_relocs *dyn_relocs;
3257
3258 /* Contexts in which symbol is used in the GOT.
3259 Bits are or'd into the mask as the corresponding relocs are
3260 encountered during check_relocs, with TLS_TLS being set when any
3261 of the other TLS bits are set. tls_optimize clears bits when
3262 optimizing to indicate the corresponding GOT entry type is not
3263 needed. If set, TLS_TLS is never cleared. tls_optimize may also
3264 set TLS_TPRELGD when a GD reloc turns into a TPREL one. We use a
3265 separate flag rather than setting TPREL just for convenience in
3266 distinguishing the two cases.
3267 These flags are also kept for local symbols. */
3268 #define TLS_TLS 1 /* Any TLS reloc. */
3269 #define TLS_GD 2 /* GD reloc. */
3270 #define TLS_LD 4 /* LD reloc. */
3271 #define TLS_TPREL 8 /* TPREL reloc, => IE. */
3272 #define TLS_DTPREL 16 /* DTPREL reloc, => LD. */
3273 #define TLS_MARK 32 /* __tls_get_addr call marked. */
3274 #define TLS_TPRELGD 64 /* TPREL reloc resulting from GD->IE. */
3275 unsigned char tls_mask;
3276
3277 /* The above field is also used to mark function symbols. In which
3278 case TLS_TLS will be 0. */
3279 #define PLT_IFUNC 2 /* STT_GNU_IFUNC. */
3280 #define PLT_KEEP 4 /* inline plt call requires plt entry. */
3281 #define NON_GOT 256 /* local symbol plt, not stored. */
3282
3283 /* Nonzero if we have seen a small data relocation referring to this
3284 symbol. */
3285 unsigned char has_sda_refs : 1;
3286
3287 /* Flag use of given relocations. */
3288 unsigned char has_addr16_ha : 1;
3289 unsigned char has_addr16_lo : 1;
3290 };
3291
3292 #define ppc_elf_hash_entry(ent) ((struct ppc_elf_link_hash_entry *) (ent))
3293
3294 /* PPC ELF linker hash table. */
3295
3296 struct ppc_elf_link_hash_table
3297 {
3298 struct elf_link_hash_table elf;
3299
3300 /* Various options passed from the linker. */
3301 struct ppc_elf_params *params;
3302
3303 /* Short-cuts to get to dynamic linker sections. */
3304 asection *glink;
3305 asection *dynsbss;
3306 asection *relsbss;
3307 elf_linker_section_t sdata[2];
3308 asection *sbss;
3309 asection *glink_eh_frame;
3310 asection *pltlocal;
3311 asection *relpltlocal;
3312
3313 /* The (unloaded but important) .rela.plt.unloaded on VxWorks. */
3314 asection *srelplt2;
3315
3316 /* Shortcut to __tls_get_addr. */
3317 struct elf_link_hash_entry *tls_get_addr;
3318
3319 /* The bfd that forced an old-style PLT. */
3320 bfd *old_bfd;
3321
3322 /* TLS local dynamic got entry handling. */
3323 union {
3324 bfd_signed_vma refcount;
3325 bfd_vma offset;
3326 } tlsld_got;
3327
3328 /* Offset of branch table to PltResolve function in glink. */
3329 bfd_vma glink_pltresolve;
3330
3331 /* Size of reserved GOT entries. */
3332 unsigned int got_header_size;
3333 /* Non-zero if allocating the header left a gap. */
3334 unsigned int got_gap;
3335
3336 /* The type of PLT we have chosen to use. */
3337 enum ppc_elf_plt_type plt_type;
3338
3339 /* True if the target system is VxWorks. */
3340 unsigned int is_vxworks:1;
3341
3342 /* Whether there exist local gnu indirect function resolvers,
3343 referenced by dynamic relocations. */
3344 unsigned int local_ifunc_resolver:1;
3345 unsigned int maybe_local_ifunc_resolver:1;
3346
3347 /* Set if tls optimization is enabled. */
3348 unsigned int do_tls_opt:1;
3349
3350 /* The size of PLT entries. */
3351 int plt_entry_size;
3352 /* The distance between adjacent PLT slots. */
3353 int plt_slot_size;
3354 /* The size of the first PLT entry. */
3355 int plt_initial_entry_size;
3356
3357 /* Small local sym cache. */
3358 struct sym_cache sym_cache;
3359 };
3360
3361 /* Rename some of the generic section flags to better document how they
3362 are used for ppc32. The flags are only valid for ppc32 elf objects. */
3363
3364 /* Nonzero if this section has TLS related relocations. */
3365 #define has_tls_reloc sec_flg0
3366
3367 /* Nonzero if this section has a call to __tls_get_addr. */
3368 #define has_tls_get_addr_call sec_flg1
3369
3370 /* Get the PPC ELF linker hash table from a link_info structure. */
3371
3372 #define ppc_elf_hash_table(p) \
3373 (elf_hash_table_id ((struct elf_link_hash_table *) ((p)->hash)) \
3374 == PPC32_ELF_DATA ? ((struct ppc_elf_link_hash_table *) ((p)->hash)) : NULL)
3375
3376 /* Create an entry in a PPC ELF linker hash table. */
3377
3378 static struct bfd_hash_entry *
3379 ppc_elf_link_hash_newfunc (struct bfd_hash_entry *entry,
3380 struct bfd_hash_table *table,
3381 const char *string)
3382 {
3383 /* Allocate the structure if it has not already been allocated by a
3384 subclass. */
3385 if (entry == NULL)
3386 {
3387 entry = bfd_hash_allocate (table,
3388 sizeof (struct ppc_elf_link_hash_entry));
3389 if (entry == NULL)
3390 return entry;
3391 }
3392
3393 /* Call the allocation method of the superclass. */
3394 entry = _bfd_elf_link_hash_newfunc (entry, table, string);
3395 if (entry != NULL)
3396 {
3397 ppc_elf_hash_entry (entry)->linker_section_pointer = NULL;
3398 ppc_elf_hash_entry (entry)->dyn_relocs = NULL;
3399 ppc_elf_hash_entry (entry)->tls_mask = 0;
3400 ppc_elf_hash_entry (entry)->has_sda_refs = 0;
3401 }
3402
3403 return entry;
3404 }
3405
3406 /* Create a PPC ELF linker hash table. */
3407
3408 static struct bfd_link_hash_table *
3409 ppc_elf_link_hash_table_create (bfd *abfd)
3410 {
3411 struct ppc_elf_link_hash_table *ret;
3412 static struct ppc_elf_params default_params
3413 = { PLT_OLD, 0, 0, 1, 0, 0, 12, 0, 0, 0 };
3414
3415 ret = bfd_zmalloc (sizeof (struct ppc_elf_link_hash_table));
3416 if (ret == NULL)
3417 return NULL;
3418
3419 if (!_bfd_elf_link_hash_table_init (&ret->elf, abfd,
3420 ppc_elf_link_hash_newfunc,
3421 sizeof (struct ppc_elf_link_hash_entry),
3422 PPC32_ELF_DATA))
3423 {
3424 free (ret);
3425 return NULL;
3426 }
3427
3428 ret->elf.init_plt_refcount.refcount = 0;
3429 ret->elf.init_plt_refcount.glist = NULL;
3430 ret->elf.init_plt_offset.offset = 0;
3431 ret->elf.init_plt_offset.glist = NULL;
3432
3433 ret->params = &default_params;
3434
3435 ret->sdata[0].name = ".sdata";
3436 ret->sdata[0].sym_name = "_SDA_BASE_";
3437 ret->sdata[0].bss_name = ".sbss";
3438
3439 ret->sdata[1].name = ".sdata2";
3440 ret->sdata[1].sym_name = "_SDA2_BASE_";
3441 ret->sdata[1].bss_name = ".sbss2";
3442
3443 ret->plt_entry_size = 12;
3444 ret->plt_slot_size = 8;
3445 ret->plt_initial_entry_size = 72;
3446
3447 return &ret->elf.root;
3448 }
3449
3450 /* Hook linker params into hash table. */
3451
3452 void
3453 ppc_elf_link_params (struct bfd_link_info *info, struct ppc_elf_params *params)
3454 {
3455 struct ppc_elf_link_hash_table *htab = ppc_elf_hash_table (info);
3456
3457 if (htab)
3458 htab->params = params;
3459 params->pagesize_p2 = bfd_log2 (params->pagesize);
3460 }
3461
3462 /* Create .got and the related sections. */
3463
3464 static bfd_boolean
3465 ppc_elf_create_got (bfd *abfd, struct bfd_link_info *info)
3466 {
3467 struct ppc_elf_link_hash_table *htab;
3468
3469 if (!_bfd_elf_create_got_section (abfd, info))
3470 return FALSE;
3471
3472 htab = ppc_elf_hash_table (info);
3473 if (!htab->is_vxworks)
3474 {
3475 /* The powerpc .got has a blrl instruction in it. Mark it
3476 executable. */
3477 flagword flags = (SEC_ALLOC | SEC_LOAD | SEC_CODE | SEC_HAS_CONTENTS
3478 | SEC_IN_MEMORY | SEC_LINKER_CREATED);
3479 if (!bfd_set_section_flags (abfd, htab->elf.sgot, flags))
3480 return FALSE;
3481 }
3482
3483 return TRUE;
3484 }
3485
3486 /* Create a special linker section, used for R_PPC_EMB_SDAI16 and
3487 R_PPC_EMB_SDA2I16 pointers. These sections become part of .sdata
3488 and .sdata2. Create _SDA_BASE_ and _SDA2_BASE too. */
3489
3490 static bfd_boolean
3491 ppc_elf_create_linker_section (bfd *abfd,
3492 struct bfd_link_info *info,
3493 flagword flags,
3494 elf_linker_section_t *lsect)
3495 {
3496 asection *s;
3497
3498 flags |= (SEC_ALLOC | SEC_LOAD | SEC_HAS_CONTENTS | SEC_IN_MEMORY
3499 | SEC_LINKER_CREATED);
3500
3501 s = bfd_make_section_anyway_with_flags (abfd, lsect->name, flags);
3502 if (s == NULL)
3503 return FALSE;
3504 lsect->section = s;
3505
3506 /* Define the sym on the first section of this name. */
3507 s = bfd_get_section_by_name (abfd, lsect->name);
3508
3509 lsect->sym = _bfd_elf_define_linkage_sym (abfd, info, s, lsect->sym_name);
3510 if (lsect->sym == NULL)
3511 return FALSE;
3512 lsect->sym->root.u.def.value = 0x8000;
3513 return TRUE;
3514 }
3515
3516 static bfd_boolean
3517 ppc_elf_create_glink (bfd *abfd, struct bfd_link_info *info)
3518 {
3519 struct ppc_elf_link_hash_table *htab = ppc_elf_hash_table (info);
3520 asection *s;
3521 flagword flags;
3522 int p2align;
3523
3524 flags = (SEC_ALLOC | SEC_LOAD | SEC_CODE | SEC_READONLY | SEC_HAS_CONTENTS
3525 | SEC_IN_MEMORY | SEC_LINKER_CREATED);
3526 s = bfd_make_section_anyway_with_flags (abfd, ".glink", flags);
3527 htab->glink = s;
3528 p2align = htab->params->ppc476_workaround ? 6 : 4;
3529 if (p2align < htab->params->plt_stub_align)
3530 p2align = htab->params->plt_stub_align;
3531 if (s == NULL
3532 || !bfd_set_section_alignment (abfd, s, p2align))
3533 return FALSE;
3534
3535 if (!info->no_ld_generated_unwind_info)
3536 {
3537 flags = (SEC_ALLOC | SEC_LOAD | SEC_READONLY | SEC_HAS_CONTENTS
3538 | SEC_IN_MEMORY | SEC_LINKER_CREATED);
3539 s = bfd_make_section_anyway_with_flags (abfd, ".eh_frame", flags);
3540 htab->glink_eh_frame = s;
3541 if (s == NULL
3542 || !bfd_set_section_alignment (abfd, s, 2))
3543 return FALSE;
3544 }
3545
3546 flags = SEC_ALLOC | SEC_LINKER_CREATED;
3547 s = bfd_make_section_anyway_with_flags (abfd, ".iplt", flags);
3548 htab->elf.iplt = s;
3549 if (s == NULL
3550 || !bfd_set_section_alignment (abfd, s, 4))
3551 return FALSE;
3552
3553 flags = (SEC_ALLOC | SEC_LOAD | SEC_READONLY | SEC_HAS_CONTENTS
3554 | SEC_IN_MEMORY | SEC_LINKER_CREATED);
3555 s = bfd_make_section_anyway_with_flags (abfd, ".rela.iplt", flags);
3556 htab->elf.irelplt = s;
3557 if (s == NULL
3558 || ! bfd_set_section_alignment (abfd, s, 2))
3559 return FALSE;
3560
3561 /* Local plt entries. */
3562 flags = (SEC_ALLOC | SEC_LOAD
3563 | SEC_HAS_CONTENTS | SEC_IN_MEMORY | SEC_LINKER_CREATED);
3564 htab->pltlocal = bfd_make_section_anyway_with_flags (abfd, ".branch_lt",
3565 flags);
3566 if (htab->pltlocal == NULL
3567 || ! bfd_set_section_alignment (abfd, htab->pltlocal, 2))
3568 return FALSE;
3569
3570 if (bfd_link_pic (info))
3571 {
3572 flags = (SEC_ALLOC | SEC_LOAD | SEC_READONLY
3573 | SEC_HAS_CONTENTS | SEC_IN_MEMORY | SEC_LINKER_CREATED);
3574 htab->relpltlocal
3575 = bfd_make_section_anyway_with_flags (abfd, ".rela.branch_lt", flags);
3576 if (htab->relpltlocal == NULL
3577 || ! bfd_set_section_alignment (abfd, htab->relpltlocal, 2))
3578 return FALSE;
3579 }
3580
3581 if (!ppc_elf_create_linker_section (abfd, info, 0,
3582 &htab->sdata[0]))
3583 return FALSE;
3584
3585 if (!ppc_elf_create_linker_section (abfd, info, SEC_READONLY,
3586 &htab->sdata[1]))
3587 return FALSE;
3588
3589 return TRUE;
3590 }
3591
3592 /* We have to create .dynsbss and .rela.sbss here so that they get mapped
3593 to output sections (just like _bfd_elf_create_dynamic_sections has
3594 to create .dynbss and .rela.bss). */
3595
3596 static bfd_boolean
3597 ppc_elf_create_dynamic_sections (bfd *abfd, struct bfd_link_info *info)
3598 {
3599 struct ppc_elf_link_hash_table *htab;
3600 asection *s;
3601 flagword flags;
3602
3603 htab = ppc_elf_hash_table (info);
3604
3605 if (htab->elf.sgot == NULL
3606 && !ppc_elf_create_got (abfd, info))
3607 return FALSE;
3608
3609 if (!_bfd_elf_create_dynamic_sections (abfd, info))
3610 return FALSE;
3611
3612 if (htab->glink == NULL
3613 && !ppc_elf_create_glink (abfd, info))
3614 return FALSE;
3615
3616 s = bfd_make_section_anyway_with_flags (abfd, ".dynsbss",
3617 SEC_ALLOC | SEC_LINKER_CREATED);
3618 htab->dynsbss = s;
3619 if (s == NULL)
3620 return FALSE;
3621
3622 if (! bfd_link_pic (info))
3623 {
3624 flags = (SEC_ALLOC | SEC_LOAD | SEC_READONLY | SEC_HAS_CONTENTS
3625 | SEC_IN_MEMORY | SEC_LINKER_CREATED);
3626 s = bfd_make_section_anyway_with_flags (abfd, ".rela.sbss", flags);
3627 htab->relsbss = s;
3628 if (s == NULL
3629 || ! bfd_set_section_alignment (abfd, s, 2))
3630 return FALSE;
3631 }
3632
3633 if (htab->is_vxworks
3634 && !elf_vxworks_create_dynamic_sections (abfd, info, &htab->srelplt2))
3635 return FALSE;
3636
3637 s = htab->elf.splt;
3638 flags = SEC_ALLOC | SEC_CODE | SEC_LINKER_CREATED;
3639 if (htab->plt_type == PLT_VXWORKS)
3640 /* The VxWorks PLT is a loaded section with contents. */
3641 flags |= SEC_HAS_CONTENTS | SEC_LOAD | SEC_READONLY;
3642 return bfd_set_section_flags (abfd, s, flags);
3643 }
3644
3645 /* Copy the extra info we tack onto an elf_link_hash_entry. */
3646
3647 static void
3648 ppc_elf_copy_indirect_symbol (struct bfd_link_info *info,
3649 struct elf_link_hash_entry *dir,
3650 struct elf_link_hash_entry *ind)
3651 {
3652 struct ppc_elf_link_hash_entry *edir, *eind;
3653
3654 edir = (struct ppc_elf_link_hash_entry *) dir;
3655 eind = (struct ppc_elf_link_hash_entry *) ind;
3656
3657 edir->tls_mask |= eind->tls_mask;
3658 edir->has_sda_refs |= eind->has_sda_refs;
3659
3660 if (edir->elf.versioned != versioned_hidden)
3661 edir->elf.ref_dynamic |= eind->elf.ref_dynamic;
3662 edir->elf.ref_regular |= eind->elf.ref_regular;
3663 edir->elf.ref_regular_nonweak |= eind->elf.ref_regular_nonweak;
3664 edir->elf.non_got_ref |= eind->elf.non_got_ref;
3665 edir->elf.needs_plt |= eind->elf.needs_plt;
3666 edir->elf.pointer_equality_needed |= eind->elf.pointer_equality_needed;
3667
3668 /* If we were called to copy over info for a weak sym, that's all. */
3669 if (eind->elf.root.type != bfd_link_hash_indirect)
3670 return;
3671
3672 if (eind->dyn_relocs != NULL)
3673 {
3674 if (edir->dyn_relocs != NULL)
3675 {
3676 struct elf_dyn_relocs **pp;
3677 struct elf_dyn_relocs *p;
3678
3679 /* Add reloc counts against the indirect sym to the direct sym
3680 list. Merge any entries against the same section. */
3681 for (pp = &eind->dyn_relocs; (p = *pp) != NULL; )
3682 {
3683 struct elf_dyn_relocs *q;
3684
3685 for (q = edir->dyn_relocs; q != NULL; q = q->next)
3686 if (q->sec == p->sec)
3687 {
3688 q->pc_count += p->pc_count;
3689 q->count += p->count;
3690 *pp = p->next;
3691 break;
3692 }
3693 if (q == NULL)
3694 pp = &p->next;
3695 }
3696 *pp = edir->dyn_relocs;
3697 }
3698
3699 edir->dyn_relocs = eind->dyn_relocs;
3700 eind->dyn_relocs = NULL;
3701 }
3702
3703 /* Copy over the GOT refcount entries that we may have already seen to
3704 the symbol which just became indirect. */
3705 edir->elf.got.refcount += eind->elf.got.refcount;
3706 eind->elf.got.refcount = 0;
3707
3708 /* And plt entries. */
3709 if (eind->elf.plt.plist != NULL)
3710 {
3711 if (edir->elf.plt.plist != NULL)
3712 {
3713 struct plt_entry **entp;
3714 struct plt_entry *ent;
3715
3716 for (entp = &eind->elf.plt.plist; (ent = *entp) != NULL; )
3717 {
3718 struct plt_entry *dent;
3719
3720 for (dent = edir->elf.plt.plist; dent != NULL; dent = dent->next)
3721 if (dent->sec == ent->sec && dent->addend == ent->addend)
3722 {
3723 dent->plt.refcount += ent->plt.refcount;
3724 *entp = ent->next;
3725 break;
3726 }
3727 if (dent == NULL)
3728 entp = &ent->next;
3729 }
3730 *entp = edir->elf.plt.plist;
3731 }
3732
3733 edir->elf.plt.plist = eind->elf.plt.plist;
3734 eind->elf.plt.plist = NULL;
3735 }
3736
3737 if (eind->elf.dynindx != -1)
3738 {
3739 if (edir->elf.dynindx != -1)
3740 _bfd_elf_strtab_delref (elf_hash_table (info)->dynstr,
3741 edir->elf.dynstr_index);
3742 edir->elf.dynindx = eind->elf.dynindx;
3743 edir->elf.dynstr_index = eind->elf.dynstr_index;
3744 eind->elf.dynindx = -1;
3745 eind->elf.dynstr_index = 0;
3746 }
3747 }
3748
3749 /* Hook called by the linker routine which adds symbols from an object
3750 file. We use it to put .comm items in .sbss, and not .bss. */
3751
3752 static bfd_boolean
3753 ppc_elf_add_symbol_hook (bfd *abfd,
3754 struct bfd_link_info *info,
3755 Elf_Internal_Sym *sym,
3756 const char **namep ATTRIBUTE_UNUSED,
3757 flagword *flagsp ATTRIBUTE_UNUSED,
3758 asection **secp,
3759 bfd_vma *valp)
3760 {
3761 if (sym->st_shndx == SHN_COMMON
3762 && !bfd_link_relocatable (info)
3763 && is_ppc_elf (info->output_bfd)
3764 && sym->st_size <= elf_gp_size (abfd))
3765 {
3766 /* Common symbols less than or equal to -G nn bytes are automatically
3767 put into .sbss. */
3768 struct ppc_elf_link_hash_table *htab;
3769
3770 htab = ppc_elf_hash_table (info);
3771 if (htab->sbss == NULL)
3772 {
3773 flagword flags = SEC_IS_COMMON | SEC_LINKER_CREATED;
3774
3775 if (!htab->elf.dynobj)
3776 htab->elf.dynobj = abfd;
3777
3778 htab->sbss = bfd_make_section_anyway_with_flags (htab->elf.dynobj,
3779 ".sbss",
3780 flags);
3781 if (htab->sbss == NULL)
3782 return FALSE;
3783 }
3784
3785 *secp = htab->sbss;
3786 *valp = sym->st_size;
3787 }
3788
3789 if (ELF_ST_TYPE (sym->st_info) == STT_GNU_IFUNC
3790 && (abfd->flags & DYNAMIC) == 0
3791 && bfd_get_flavour (info->output_bfd) == bfd_target_elf_flavour)
3792 elf_tdata (info->output_bfd)->has_gnu_symbols |= elf_gnu_symbol_ifunc;
3793
3794 return TRUE;
3795 }
3796 \f
3797 /* Find a linker generated pointer with a given addend and type. */
3798
3799 static elf_linker_section_pointers_t *
3800 elf_find_pointer_linker_section
3801 (elf_linker_section_pointers_t *linker_pointers,
3802 bfd_vma addend,
3803 elf_linker_section_t *lsect)
3804 {
3805 for ( ; linker_pointers != NULL; linker_pointers = linker_pointers->next)
3806 if (lsect == linker_pointers->lsect && addend == linker_pointers->addend)
3807 return linker_pointers;
3808
3809 return NULL;
3810 }
3811
3812 /* Allocate a pointer to live in a linker created section. */
3813
3814 static bfd_boolean
3815 elf_allocate_pointer_linker_section (bfd *abfd,
3816 elf_linker_section_t *lsect,
3817 struct elf_link_hash_entry *h,
3818 const Elf_Internal_Rela *rel)
3819 {
3820 elf_linker_section_pointers_t **ptr_linker_section_ptr = NULL;
3821 elf_linker_section_pointers_t *linker_section_ptr;
3822 unsigned long r_symndx = ELF32_R_SYM (rel->r_info);
3823 bfd_size_type amt;
3824
3825 BFD_ASSERT (lsect != NULL);
3826
3827 /* Is this a global symbol? */
3828 if (h != NULL)
3829 {
3830 struct ppc_elf_link_hash_entry *eh;
3831
3832 /* Has this symbol already been allocated? If so, our work is done. */
3833 eh = (struct ppc_elf_link_hash_entry *) h;
3834 if (elf_find_pointer_linker_section (eh->linker_section_pointer,
3835 rel->r_addend,
3836 lsect))
3837 return TRUE;
3838
3839 ptr_linker_section_ptr = &eh->linker_section_pointer;
3840 }
3841 else
3842 {
3843 BFD_ASSERT (is_ppc_elf (abfd));
3844
3845 /* Allocation of a pointer to a local symbol. */
3846 elf_linker_section_pointers_t **ptr = elf_local_ptr_offsets (abfd);
3847
3848 /* Allocate a table to hold the local symbols if first time. */
3849 if (!ptr)
3850 {
3851 unsigned int num_symbols = elf_symtab_hdr (abfd).sh_info;
3852
3853 amt = num_symbols;
3854 amt *= sizeof (elf_linker_section_pointers_t *);
3855 ptr = bfd_zalloc (abfd, amt);
3856
3857 if (!ptr)
3858 return FALSE;
3859
3860 elf_local_ptr_offsets (abfd) = ptr;
3861 }
3862
3863 /* Has this symbol already been allocated? If so, our work is done. */
3864 if (elf_find_pointer_linker_section (ptr[r_symndx],
3865 rel->r_addend,
3866 lsect))
3867 return TRUE;
3868
3869 ptr_linker_section_ptr = &ptr[r_symndx];
3870 }
3871
3872 /* Allocate space for a pointer in the linker section, and allocate
3873 a new pointer record from internal memory. */
3874 BFD_ASSERT (ptr_linker_section_ptr != NULL);
3875 amt = sizeof (elf_linker_section_pointers_t);
3876 linker_section_ptr = bfd_alloc (abfd, amt);
3877
3878 if (!linker_section_ptr)
3879 return FALSE;
3880
3881 linker_section_ptr->next = *ptr_linker_section_ptr;
3882 linker_section_ptr->addend = rel->r_addend;
3883 linker_section_ptr->lsect = lsect;
3884 *ptr_linker_section_ptr = linker_section_ptr;
3885
3886 if (!bfd_set_section_alignment (lsect->section->owner, lsect->section, 2))
3887 return FALSE;
3888 linker_section_ptr->offset = lsect->section->size;
3889 lsect->section->size += 4;
3890
3891 #ifdef DEBUG
3892 fprintf (stderr,
3893 "Create pointer in linker section %s, offset = %ld, section size = %ld\n",
3894 lsect->name, (long) linker_section_ptr->offset,
3895 (long) lsect->section->size);
3896 #endif
3897
3898 return TRUE;
3899 }
3900
3901 static struct plt_entry **
3902 update_local_sym_info (bfd *abfd,
3903 Elf_Internal_Shdr *symtab_hdr,
3904 unsigned long r_symndx,
3905 int tls_type)
3906 {
3907 bfd_signed_vma *local_got_refcounts = elf_local_got_refcounts (abfd);
3908 struct plt_entry **local_plt;
3909 unsigned char *local_got_tls_masks;
3910
3911 if (local_got_refcounts == NULL)
3912 {
3913 bfd_size_type size = symtab_hdr->sh_info;
3914
3915 size *= (sizeof (*local_got_refcounts)
3916 + sizeof (*local_plt)
3917 + sizeof (*local_got_tls_masks));
3918 local_got_refcounts = bfd_zalloc (abfd, size);
3919 if (local_got_refcounts == NULL)
3920 return NULL;
3921 elf_local_got_refcounts (abfd) = local_got_refcounts;
3922 }
3923
3924 local_plt = (struct plt_entry **) (local_got_refcounts + symtab_hdr->sh_info);
3925 local_got_tls_masks = (unsigned char *) (local_plt + symtab_hdr->sh_info);
3926 local_got_tls_masks[r_symndx] |= tls_type & 0xff;
3927 if ((tls_type & NON_GOT) == 0)
3928 local_got_refcounts[r_symndx] += 1;
3929 return local_plt + r_symndx;
3930 }
3931
3932 static bfd_boolean
3933 update_plt_info (bfd *abfd, struct plt_entry **plist,
3934 asection *sec, bfd_vma addend)
3935 {
3936 struct plt_entry *ent;
3937
3938 if (addend < 32768)
3939 sec = NULL;
3940 for (ent = *plist; ent != NULL; ent = ent->next)
3941 if (ent->sec == sec && ent->addend == addend)
3942 break;
3943 if (ent == NULL)
3944 {
3945 bfd_size_type amt = sizeof (*ent);
3946 ent = bfd_alloc (abfd, amt);
3947 if (ent == NULL)
3948 return FALSE;
3949 ent->next = *plist;
3950 ent->sec = sec;
3951 ent->addend = addend;
3952 ent->plt.refcount = 0;
3953 *plist = ent;
3954 }
3955 ent->plt.refcount += 1;
3956 return TRUE;
3957 }
3958
3959 static struct plt_entry *
3960 find_plt_ent (struct plt_entry **plist, asection *sec, bfd_vma addend)
3961 {
3962 struct plt_entry *ent;
3963
3964 if (addend < 32768)
3965 sec = NULL;
3966 for (ent = *plist; ent != NULL; ent = ent->next)
3967 if (ent->sec == sec && ent->addend == addend)
3968 break;
3969 return ent;
3970 }
3971
3972 static bfd_boolean
3973 is_branch_reloc (enum elf_ppc_reloc_type r_type)
3974 {
3975 return (r_type == R_PPC_PLTREL24
3976 || r_type == R_PPC_LOCAL24PC
3977 || r_type == R_PPC_REL24
3978 || r_type == R_PPC_REL14
3979 || r_type == R_PPC_REL14_BRTAKEN
3980 || r_type == R_PPC_REL14_BRNTAKEN
3981 || r_type == R_PPC_ADDR24
3982 || r_type == R_PPC_ADDR14
3983 || r_type == R_PPC_ADDR14_BRTAKEN
3984 || r_type == R_PPC_ADDR14_BRNTAKEN
3985 || r_type == R_PPC_VLE_REL24);
3986 }
3987
3988 /* Relocs on inline plt call sequence insns prior to the call. */
3989
3990 static bfd_boolean
3991 is_plt_seq_reloc (enum elf_ppc_reloc_type r_type)
3992 {
3993 return (r_type == R_PPC_PLT16_HA
3994 || r_type == R_PPC_PLT16_HI
3995 || r_type == R_PPC_PLT16_LO
3996 || r_type == R_PPC_PLTSEQ);
3997 }
3998
3999 static void
4000 bad_shared_reloc (bfd *abfd, enum elf_ppc_reloc_type r_type)
4001 {
4002 _bfd_error_handler
4003 /* xgettext:c-format */
4004 (_("%pB: relocation %s cannot be used when making a shared object"),
4005 abfd,
4006 ppc_elf_howto_table[r_type]->name);
4007 bfd_set_error (bfd_error_bad_value);
4008 }
4009
4010 /* Look through the relocs for a section during the first phase, and
4011 allocate space in the global offset table or procedure linkage
4012 table. */
4013
4014 static bfd_boolean
4015 ppc_elf_check_relocs (bfd *abfd,
4016 struct bfd_link_info *info,
4017 asection *sec,
4018 const Elf_Internal_Rela *relocs)
4019 {
4020 struct ppc_elf_link_hash_table *htab;
4021 Elf_Internal_Shdr *symtab_hdr;
4022 struct elf_link_hash_entry **sym_hashes;
4023 const Elf_Internal_Rela *rel;
4024 const Elf_Internal_Rela *rel_end;
4025 asection *got2, *sreloc;
4026 struct elf_link_hash_entry *tga;
4027
4028 if (bfd_link_relocatable (info))
4029 return TRUE;
4030
4031 /* Don't do anything special with non-loaded, non-alloced sections.
4032 In particular, any relocs in such sections should not affect GOT
4033 and PLT reference counting (ie. we don't allow them to create GOT
4034 or PLT entries), there's no possibility or desire to optimize TLS
4035 relocs, and there's not much point in propagating relocs to shared
4036 libs that the dynamic linker won't relocate. */
4037 if ((sec->flags & SEC_ALLOC) == 0)
4038 return TRUE;
4039
4040 #ifdef DEBUG
4041 _bfd_error_handler ("ppc_elf_check_relocs called for section %pA in %pB",
4042 sec, abfd);
4043 #endif
4044
4045 BFD_ASSERT (is_ppc_elf (abfd));
4046
4047 /* Initialize howto table if not already done. */
4048 if (!ppc_elf_howto_table[R_PPC_ADDR32])
4049 ppc_elf_howto_init ();
4050
4051 htab = ppc_elf_hash_table (info);
4052 if (htab->glink == NULL)
4053 {
4054 if (htab->elf.dynobj == NULL)
4055 htab->elf.dynobj = abfd;
4056 if (!ppc_elf_create_glink (htab->elf.dynobj, info))
4057 return FALSE;
4058 }
4059 tga = elf_link_hash_lookup (&htab->elf, "__tls_get_addr",
4060 FALSE, FALSE, TRUE);
4061 symtab_hdr = &elf_symtab_hdr (abfd);
4062 sym_hashes = elf_sym_hashes (abfd);
4063 got2 = bfd_get_section_by_name (abfd, ".got2");
4064 sreloc = NULL;
4065
4066 rel_end = relocs + sec->reloc_count;
4067 for (rel = relocs; rel < rel_end; rel++)
4068 {
4069 unsigned long r_symndx;
4070 enum elf_ppc_reloc_type r_type;
4071 struct elf_link_hash_entry *h;
4072 int tls_type;
4073 struct plt_entry **ifunc;
4074 struct plt_entry **pltent;
4075 bfd_vma addend;
4076
4077 r_symndx = ELF32_R_SYM (rel->r_info);
4078 if (r_symndx < symtab_hdr->sh_info)
4079 h = NULL;
4080 else
4081 {
4082 h = sym_hashes[r_symndx - symtab_hdr->sh_info];
4083 while (h->root.type == bfd_link_hash_indirect
4084 || h->root.type == bfd_link_hash_warning)
4085 h = (struct elf_link_hash_entry *) h->root.u.i.link;
4086 }
4087
4088 /* If a relocation refers to _GLOBAL_OFFSET_TABLE_, create the .got.
4089 This shows up in particular in an R_PPC_ADDR32 in the eabi
4090 startup code. */
4091 if (h != NULL
4092 && htab->elf.sgot == NULL
4093 && strcmp (h->root.root.string, "_GLOBAL_OFFSET_TABLE_") == 0)
4094 {
4095 if (htab->elf.dynobj == NULL)
4096 htab->elf.dynobj = abfd;
4097 if (!ppc_elf_create_got (htab->elf.dynobj, info))
4098 return FALSE;
4099 BFD_ASSERT (h == htab->elf.hgot);
4100 }
4101
4102 tls_type = 0;
4103 r_type = ELF32_R_TYPE (rel->r_info);
4104 ifunc = NULL;
4105 if (h == NULL && !htab->is_vxworks)
4106 {
4107 Elf_Internal_Sym *isym = bfd_sym_from_r_symndx (&htab->sym_cache,
4108 abfd, r_symndx);
4109 if (isym == NULL)
4110 return FALSE;
4111
4112 if (ELF_ST_TYPE (isym->st_info) == STT_GNU_IFUNC)
4113 {
4114 /* Set PLT_IFUNC flag for this sym, no GOT entry yet. */
4115 ifunc = update_local_sym_info (abfd, symtab_hdr, r_symndx,
4116 NON_GOT | PLT_IFUNC);
4117 if (ifunc == NULL)
4118 return FALSE;
4119
4120 /* STT_GNU_IFUNC symbols must have a PLT entry;
4121 In a non-pie executable even when there are
4122 no plt calls. */
4123 if (!bfd_link_pic (info)
4124 || is_branch_reloc (r_type)
4125 || r_type == R_PPC_PLT16_LO
4126 || r_type == R_PPC_PLT16_HI
4127 || r_type == R_PPC_PLT16_HA)
4128 {
4129 addend = 0;
4130 if (r_type == R_PPC_PLTREL24)
4131 ppc_elf_tdata (abfd)->makes_plt_call = 1;
4132 if (bfd_link_pic (info)
4133 && (r_type == R_PPC_PLTREL24
4134 || r_type == R_PPC_PLT16_LO
4135 || r_type == R_PPC_PLT16_HI
4136 || r_type == R_PPC_PLT16_HA))
4137 addend = rel->r_addend;
4138 if (!update_plt_info (abfd, ifunc, got2, addend))
4139 return FALSE;
4140 }
4141 }
4142 }
4143
4144 if (!htab->is_vxworks
4145 && is_branch_reloc (r_type)
4146 && h != NULL
4147 && h == tga)
4148 {
4149 if (rel != relocs
4150 && (ELF32_R_TYPE (rel[-1].r_info) == R_PPC_TLSGD
4151 || ELF32_R_TYPE (rel[-1].r_info) == R_PPC_TLSLD))
4152 /* We have a new-style __tls_get_addr call with a marker
4153 reloc. */
4154 ;
4155 else
4156 /* Mark this section as having an old-style call. */
4157 sec->has_tls_get_addr_call = 1;
4158 }
4159
4160 switch (r_type)
4161 {
4162 case R_PPC_TLSGD:
4163 case R_PPC_TLSLD:
4164 /* These special tls relocs tie a call to __tls_get_addr with
4165 its parameter symbol. */
4166 if (h != NULL)
4167 ppc_elf_hash_entry (h)->tls_mask |= TLS_TLS | TLS_MARK;
4168 else
4169 if (!update_local_sym_info (abfd, symtab_hdr, r_symndx,
4170 NON_GOT | TLS_TLS | TLS_MARK))
4171 return FALSE;
4172 break;
4173
4174 case R_PPC_PLTSEQ:
4175 break;
4176
4177 case R_PPC_GOT_TLSLD16:
4178 case R_PPC_GOT_TLSLD16_LO:
4179 case R_PPC_GOT_TLSLD16_HI:
4180 case R_PPC_GOT_TLSLD16_HA:
4181 tls_type = TLS_TLS | TLS_LD;
4182 goto dogottls;
4183
4184 case R_PPC_GOT_TLSGD16:
4185 case R_PPC_GOT_TLSGD16_LO:
4186 case R_PPC_GOT_TLSGD16_HI:
4187 case R_PPC_GOT_TLSGD16_HA:
4188 tls_type = TLS_TLS | TLS_GD;
4189 goto dogottls;
4190
4191 case R_PPC_GOT_TPREL16:
4192 case R_PPC_GOT_TPREL16_LO:
4193 case R_PPC_GOT_TPREL16_HI:
4194 case R_PPC_GOT_TPREL16_HA:
4195 if (bfd_link_dll (info))
4196 info->flags |= DF_STATIC_TLS;
4197 tls_type = TLS_TLS | TLS_TPREL;
4198 goto dogottls;
4199
4200 case R_PPC_GOT_DTPREL16:
4201 case R_PPC_GOT_DTPREL16_LO:
4202 case R_PPC_GOT_DTPREL16_HI:
4203 case R_PPC_GOT_DTPREL16_HA:
4204 tls_type = TLS_TLS | TLS_DTPREL;
4205 dogottls:
4206 sec->has_tls_reloc = 1;
4207 /* Fall through. */
4208
4209 /* GOT16 relocations */
4210 case R_PPC_GOT16:
4211 case R_PPC_GOT16_LO:
4212 case R_PPC_GOT16_HI:
4213 case R_PPC_GOT16_HA:
4214 /* This symbol requires a global offset table entry. */
4215 if (htab->elf.sgot == NULL)
4216 {
4217 if (htab->elf.dynobj == NULL)
4218 htab->elf.dynobj = abfd;
4219 if (!ppc_elf_create_got (htab->elf.dynobj, info))
4220 return FALSE;
4221 }
4222 if (h != NULL)
4223 {
4224 h->got.refcount += 1;
4225 ppc_elf_hash_entry (h)->tls_mask |= tls_type;
4226 }
4227 else
4228 /* This is a global offset table entry for a local symbol. */
4229 if (!update_local_sym_info (abfd, symtab_hdr, r_symndx, tls_type))
4230 return FALSE;
4231
4232 /* We may also need a plt entry if the symbol turns out to be
4233 an ifunc. */
4234 if (h != NULL && !bfd_link_pic (info))
4235 {
4236 if (!update_plt_info (abfd, &h->plt.plist, NULL, 0))
4237 return FALSE;
4238 }
4239 break;
4240
4241 /* Indirect .sdata relocation. */
4242 case R_PPC_EMB_SDAI16:
4243 if (bfd_link_pic (info))
4244 {
4245 bad_shared_reloc (abfd, r_type);
4246 return FALSE;
4247 }
4248 htab->sdata[0].sym->ref_regular = 1;
4249 if (!elf_allocate_pointer_linker_section (abfd, &htab->sdata[0],
4250 h, rel))
4251 return FALSE;
4252 if (h != NULL)
4253 {
4254 ppc_elf_hash_entry (h)->has_sda_refs = TRUE;
4255 h->non_got_ref = TRUE;
4256 }
4257 break;
4258
4259 /* Indirect .sdata2 relocation. */
4260 case R_PPC_EMB_SDA2I16:
4261 if (bfd_link_pic (info))
4262 {
4263 bad_shared_reloc (abfd, r_type);
4264 return FALSE;
4265 }
4266 htab->sdata[1].sym->ref_regular = 1;
4267 if (!elf_allocate_pointer_linker_section (abfd, &htab->sdata[1],
4268 h, rel))
4269 return FALSE;
4270 if (h != NULL)
4271 {
4272 ppc_elf_hash_entry (h)->has_sda_refs = TRUE;
4273 h->non_got_ref = TRUE;
4274 }
4275 break;
4276
4277 case R_PPC_SDAREL16:
4278 htab->sdata[0].sym->ref_regular = 1;
4279 /* Fall through. */
4280
4281 case R_PPC_VLE_SDAREL_LO16A:
4282 case R_PPC_VLE_SDAREL_LO16D:
4283 case R_PPC_VLE_SDAREL_HI16A:
4284 case R_PPC_VLE_SDAREL_HI16D:
4285 case R_PPC_VLE_SDAREL_HA16A:
4286 case R_PPC_VLE_SDAREL_HA16D:
4287 if (h != NULL)
4288 {
4289 ppc_elf_hash_entry (h)->has_sda_refs = TRUE;
4290 h->non_got_ref = TRUE;
4291 }
4292 break;
4293
4294 case R_PPC_VLE_REL8:
4295 case R_PPC_VLE_REL15:
4296 case R_PPC_VLE_REL24:
4297 case R_PPC_VLE_LO16A:
4298 case R_PPC_VLE_LO16D:
4299 case R_PPC_VLE_HI16A:
4300 case R_PPC_VLE_HI16D:
4301 case R_PPC_VLE_HA16A:
4302 case R_PPC_VLE_HA16D:
4303 case R_PPC_VLE_ADDR20:
4304 break;
4305
4306 case R_PPC_EMB_SDA2REL:
4307 if (bfd_link_pic (info))
4308 {
4309 bad_shared_reloc (abfd, r_type);
4310 return FALSE;
4311 }
4312 htab->sdata[1].sym->ref_regular = 1;
4313 if (h != NULL)
4314 {
4315 ppc_elf_hash_entry (h)->has_sda_refs = TRUE;
4316 h->non_got_ref = TRUE;
4317 }
4318 break;
4319
4320 case R_PPC_VLE_SDA21_LO:
4321 case R_PPC_VLE_SDA21:
4322 case R_PPC_EMB_SDA21:
4323 case R_PPC_EMB_RELSDA:
4324 if (bfd_link_pic (info))
4325 {
4326 bad_shared_reloc (abfd, r_type);
4327 return FALSE;
4328 }
4329 if (h != NULL)
4330 {
4331 ppc_elf_hash_entry (h)->has_sda_refs = TRUE;
4332 h->non_got_ref = TRUE;
4333 }
4334 break;
4335
4336 case R_PPC_EMB_NADDR32:
4337 case R_PPC_EMB_NADDR16:
4338 case R_PPC_EMB_NADDR16_LO:
4339 case R_PPC_EMB_NADDR16_HI:
4340 case R_PPC_EMB_NADDR16_HA:
4341 if (bfd_link_pic (info))
4342 {
4343 bad_shared_reloc (abfd, r_type);
4344 return FALSE;
4345 }
4346 if (h != NULL)
4347 h->non_got_ref = TRUE;
4348 break;
4349
4350 case R_PPC_PLTREL24:
4351 if (h == NULL)
4352 break;
4353 ppc_elf_tdata (abfd)->makes_plt_call = 1;
4354 /* Fall through */
4355
4356 case R_PPC_PLTCALL:
4357 case R_PPC_PLT32:
4358 case R_PPC_PLTREL32:
4359 case R_PPC_PLT16_LO:
4360 case R_PPC_PLT16_HI:
4361 case R_PPC_PLT16_HA:
4362 #ifdef DEBUG
4363 fprintf (stderr, "Reloc requires a PLT entry\n");
4364 #endif
4365 /* This symbol requires a procedure linkage table entry. */
4366 if (h == NULL)
4367 {
4368 pltent = update_local_sym_info (abfd, symtab_hdr, r_symndx,
4369 NON_GOT | PLT_KEEP);
4370 if (pltent == NULL)
4371 return FALSE;
4372 }
4373 else
4374 {
4375 if (r_type != R_PPC_PLTREL24)
4376 ppc_elf_hash_entry (h)->tls_mask |= PLT_KEEP;
4377 h->needs_plt = 1;
4378 pltent = &h->plt.plist;
4379 }
4380 addend = 0;
4381 if (bfd_link_pic (info)
4382 && (r_type == R_PPC_PLTREL24
4383 || r_type == R_PPC_PLT16_LO
4384 || r_type == R_PPC_PLT16_HI
4385 || r_type == R_PPC_PLT16_HA))
4386 addend = rel->r_addend;
4387 if (!update_plt_info (abfd, pltent, got2, addend))
4388 return FALSE;
4389 break;
4390
4391 /* The following relocations don't need to propagate the
4392 relocation if linking a shared object since they are
4393 section relative. */
4394 case R_PPC_SECTOFF:
4395 case R_PPC_SECTOFF_LO:
4396 case R_PPC_SECTOFF_HI:
4397 case R_PPC_SECTOFF_HA:
4398 case R_PPC_DTPREL16:
4399 case R_PPC_DTPREL16_LO:
4400 case R_PPC_DTPREL16_HI:
4401 case R_PPC_DTPREL16_HA:
4402 case R_PPC_TOC16:
4403 break;
4404
4405 case R_PPC_REL16:
4406 case R_PPC_REL16_LO:
4407 case R_PPC_REL16_HI:
4408 case R_PPC_REL16_HA:
4409 case R_PPC_REL16DX_HA:
4410 ppc_elf_tdata (abfd)->has_rel16 = 1;
4411 break;
4412
4413 /* These are just markers. */
4414 case R_PPC_TLS:
4415 case R_PPC_EMB_MRKREF:
4416 case R_PPC_NONE:
4417 case R_PPC_max:
4418 case R_PPC_RELAX:
4419 case R_PPC_RELAX_PLT:
4420 case R_PPC_RELAX_PLTREL24:
4421 case R_PPC_16DX_HA:
4422 break;
4423
4424 /* These should only appear in dynamic objects. */
4425 case R_PPC_COPY:
4426 case R_PPC_GLOB_DAT:
4427 case R_PPC_JMP_SLOT:
4428 case R_PPC_RELATIVE:
4429 case R_PPC_IRELATIVE:
4430 break;
4431
4432 /* These aren't handled yet. We'll report an error later. */
4433 case R_PPC_ADDR30:
4434 case R_PPC_EMB_RELSEC16:
4435 case R_PPC_EMB_RELST_LO:
4436 case R_PPC_EMB_RELST_HI:
4437 case R_PPC_EMB_RELST_HA:
4438 case R_PPC_EMB_BIT_FLD:
4439 break;
4440
4441 /* This refers only to functions defined in the shared library. */
4442 case R_PPC_LOCAL24PC:
4443 if (h != NULL && h == htab->elf.hgot && htab->plt_type == PLT_UNSET)
4444 {
4445 htab->plt_type = PLT_OLD;
4446 htab->old_bfd = abfd;
4447 }
4448 if (h != NULL && h->type == STT_GNU_IFUNC)
4449 {
4450 h->needs_plt = 1;
4451 if (!update_plt_info (abfd, &h->plt.plist, NULL, 0))
4452 return FALSE;
4453 }
4454 break;
4455
4456 /* This relocation describes the C++ object vtable hierarchy.
4457 Reconstruct it for later use during GC. */
4458 case R_PPC_GNU_VTINHERIT:
4459 if (!bfd_elf_gc_record_vtinherit (abfd, sec, h, rel->r_offset))
4460 return FALSE;
4461 break;
4462
4463 /* This relocation describes which C++ vtable entries are actually
4464 used. Record for later use during GC. */
4465 case R_PPC_GNU_VTENTRY:
4466 BFD_ASSERT (h != NULL);
4467 if (h != NULL
4468 && !bfd_elf_gc_record_vtentry (abfd, sec, h, rel->r_addend))
4469 return FALSE;
4470 break;
4471
4472 /* We shouldn't really be seeing TPREL32. */
4473 case R_PPC_TPREL32:
4474 case R_PPC_TPREL16:
4475 case R_PPC_TPREL16_LO:
4476 case R_PPC_TPREL16_HI:
4477 case R_PPC_TPREL16_HA:
4478 if (bfd_link_dll (info))
4479 info->flags |= DF_STATIC_TLS;
4480 goto dodyn;
4481
4482 /* Nor these. */
4483 case R_PPC_DTPMOD32:
4484 case R_PPC_DTPREL32:
4485 goto dodyn;
4486
4487 case R_PPC_REL32:
4488 if (h == NULL
4489 && got2 != NULL
4490 && (sec->flags & SEC_CODE) != 0
4491 && bfd_link_pic (info)
4492 && htab->plt_type == PLT_UNSET)
4493 {
4494 /* Old -fPIC gcc code has .long LCTOC1-LCFx just before
4495 the start of a function, which assembles to a REL32
4496 reference to .got2. If we detect one of these, then
4497 force the old PLT layout because the linker cannot
4498 reliably deduce the GOT pointer value needed for
4499 PLT call stubs. */
4500 asection *s;
4501 Elf_Internal_Sym *isym;
4502
4503 isym = bfd_sym_from_r_symndx (&htab->sym_cache,
4504 abfd, r_symndx);
4505 if (isym == NULL)
4506 return FALSE;
4507
4508 s = bfd_section_from_elf_index (abfd, isym->st_shndx);
4509 if (s == got2)
4510 {
4511 htab->plt_type = PLT_OLD;
4512 htab->old_bfd = abfd;
4513 }
4514 }
4515 if (h == NULL || h == htab->elf.hgot)
4516 break;
4517 /* fall through */
4518
4519 case R_PPC_ADDR32:
4520 case R_PPC_ADDR16:
4521 case R_PPC_ADDR16_LO:
4522 case R_PPC_ADDR16_HI:
4523 case R_PPC_ADDR16_HA:
4524 case R_PPC_UADDR32:
4525 case R_PPC_UADDR16:
4526 if (h != NULL && !bfd_link_pic (info))
4527 {
4528 /* We may need a plt entry if the symbol turns out to be
4529 a function defined in a dynamic object. */
4530 if (!update_plt_info (abfd, &h->plt.plist, NULL, 0))
4531 return FALSE;
4532
4533 /* We may need a copy reloc too. */
4534 h->non_got_ref = 1;
4535 h->pointer_equality_needed = 1;
4536 if (r_type == R_PPC_ADDR16_HA)
4537 ppc_elf_hash_entry (h)->has_addr16_ha = 1;
4538 if (r_type == R_PPC_ADDR16_LO)
4539 ppc_elf_hash_entry (h)->has_addr16_lo = 1;
4540 }
4541 goto dodyn;
4542
4543 case R_PPC_REL24:
4544 case R_PPC_REL14:
4545 case R_PPC_REL14_BRTAKEN:
4546 case R_PPC_REL14_BRNTAKEN:
4547 if (h == NULL)
4548 break;
4549 if (h == htab->elf.hgot)
4550 {
4551 if (htab->plt_type == PLT_UNSET)
4552 {
4553 htab->plt_type = PLT_OLD;
4554 htab->old_bfd = abfd;
4555 }
4556 break;
4557 }
4558 /* fall through */
4559
4560 case R_PPC_ADDR24:
4561 case R_PPC_ADDR14:
4562 case R_PPC_ADDR14_BRTAKEN:
4563 case R_PPC_ADDR14_BRNTAKEN:
4564 if (h != NULL && !bfd_link_pic (info))
4565 {
4566 /* We may need a plt entry if the symbol turns out to be
4567 a function defined in a dynamic object. */
4568 h->needs_plt = 1;
4569 if (!update_plt_info (abfd, &h->plt.plist, NULL, 0))
4570 return FALSE;
4571 break;
4572 }
4573
4574 dodyn:
4575 /* If we are creating a shared library, and this is a reloc
4576 against a global symbol, or a non PC relative reloc
4577 against a local symbol, then we need to copy the reloc
4578 into the shared library. However, if we are linking with
4579 -Bsymbolic, we do not need to copy a reloc against a
4580 global symbol which is defined in an object we are
4581 including in the link (i.e., DEF_REGULAR is set). At
4582 this point we have not seen all the input files, so it is
4583 possible that DEF_REGULAR is not set now but will be set
4584 later (it is never cleared). In case of a weak definition,
4585 DEF_REGULAR may be cleared later by a strong definition in
4586 a shared library. We account for that possibility below by
4587 storing information in the dyn_relocs field of the hash
4588 table entry. A similar situation occurs when creating
4589 shared libraries and symbol visibility changes render the
4590 symbol local.
4591
4592 If on the other hand, we are creating an executable, we
4593 may need to keep relocations for symbols satisfied by a
4594 dynamic library if we manage to avoid copy relocs for the
4595 symbol. */
4596 if ((bfd_link_pic (info)
4597 && (must_be_dyn_reloc (info, r_type)
4598 || (h != NULL
4599 && (!SYMBOLIC_BIND (info, h)
4600 || h->root.type == bfd_link_hash_defweak
4601 || !h->def_regular))))
4602 || (ELIMINATE_COPY_RELOCS
4603 && !bfd_link_pic (info)
4604 && h != NULL
4605 && (h->root.type == bfd_link_hash_defweak
4606 || !h->def_regular)))
4607 {
4608 #ifdef DEBUG
4609 fprintf (stderr,
4610 "ppc_elf_check_relocs needs to "
4611 "create relocation for %s\n",
4612 (h && h->root.root.string
4613 ? h->root.root.string : "<unknown>"));
4614 #endif
4615 if (sreloc == NULL)
4616 {
4617 if (htab->elf.dynobj == NULL)
4618 htab->elf.dynobj = abfd;
4619
4620 sreloc = _bfd_elf_make_dynamic_reloc_section
4621 (sec, htab->elf.dynobj, 2, abfd, /*rela?*/ TRUE);
4622
4623 if (sreloc == NULL)
4624 return FALSE;
4625 }
4626
4627 /* If this is a global symbol, we count the number of
4628 relocations we need for this symbol. */
4629 if (h != NULL)
4630 {
4631 struct elf_dyn_relocs *p;
4632 struct elf_dyn_relocs **rel_head;
4633
4634 rel_head = &ppc_elf_hash_entry (h)->dyn_relocs;
4635 p = *rel_head;
4636 if (p == NULL || p->sec != sec)
4637 {
4638 p = bfd_alloc (htab->elf.dynobj, sizeof *p);
4639 if (p == NULL)
4640 return FALSE;
4641 p->next = *rel_head;
4642 *rel_head = p;
4643 p->sec = sec;
4644 p->count = 0;
4645 p->pc_count = 0;
4646 }
4647 p->count += 1;
4648 if (!must_be_dyn_reloc (info, r_type))
4649 p->pc_count += 1;
4650 }
4651 else
4652 {
4653 /* Track dynamic relocs needed for local syms too.
4654 We really need local syms available to do this
4655 easily. Oh well. */
4656 struct ppc_dyn_relocs *p;
4657 struct ppc_dyn_relocs **rel_head;
4658 bfd_boolean is_ifunc;
4659 asection *s;
4660 void *vpp;
4661 Elf_Internal_Sym *isym;
4662
4663 isym = bfd_sym_from_r_symndx (&htab->sym_cache,
4664 abfd, r_symndx);
4665 if (isym == NULL)
4666 return FALSE;
4667
4668 s = bfd_section_from_elf_index (abfd, isym->st_shndx);
4669 if (s == NULL)
4670 s = sec;
4671
4672 vpp = &elf_section_data (s)->local_dynrel;
4673 rel_head = (struct ppc_dyn_relocs **) vpp;
4674 is_ifunc = ELF_ST_TYPE (isym->st_info) == STT_GNU_IFUNC;
4675 p = *rel_head;
4676 if (p != NULL && p->sec == sec && p->ifunc != is_ifunc)
4677 p = p->next;
4678 if (p == NULL || p->sec != sec || p->ifunc != is_ifunc)
4679 {
4680 p = bfd_alloc (htab->elf.dynobj, sizeof *p);
4681 if (p == NULL)
4682 return FALSE;
4683 p->next = *rel_head;
4684 *rel_head = p;
4685 p->sec = sec;
4686 p->ifunc = is_ifunc;
4687 p->count = 0;
4688 }
4689 p->count += 1;
4690 }
4691 }
4692
4693 break;
4694 }
4695 }
4696
4697 return TRUE;
4698 }
4699 \f
4700 /* Warn for conflicting Tag_GNU_Power_ABI_FP attributes between IBFD
4701 and OBFD, and merge non-conflicting ones. */
4702 void
4703 _bfd_elf_ppc_merge_fp_attributes (bfd *ibfd, struct bfd_link_info *info)
4704 {
4705 bfd *obfd = info->output_bfd;
4706 obj_attribute *in_attr, *in_attrs;
4707 obj_attribute *out_attr, *out_attrs;
4708
4709 in_attrs = elf_known_obj_attributes (ibfd)[OBJ_ATTR_GNU];
4710 out_attrs = elf_known_obj_attributes (obfd)[OBJ_ATTR_GNU];
4711
4712 in_attr = &in_attrs[Tag_GNU_Power_ABI_FP];
4713 out_attr = &out_attrs[Tag_GNU_Power_ABI_FP];
4714
4715 if (in_attr->i != out_attr->i)
4716 {
4717 int in_fp = in_attr->i & 3;
4718 int out_fp = out_attr->i & 3;
4719
4720 if (in_fp == 0)
4721 ;
4722 else if (out_fp == 0)
4723 {
4724 out_attr->type = 1;
4725 out_attr->i ^= in_fp;
4726 }
4727 else if (out_fp != 2 && in_fp == 2)
4728 _bfd_error_handler
4729 /* xgettext:c-format */
4730 (_("warning: %pB uses hard float, %pB uses soft float"), obfd, ibfd);
4731 else if (out_fp == 2 && in_fp != 2)
4732 _bfd_error_handler
4733 /* xgettext:c-format */
4734 (_("warning: %pB uses hard float, %pB uses soft float"), ibfd, obfd);
4735 else if (out_fp == 1 && in_fp == 3)
4736 _bfd_error_handler
4737 /* xgettext:c-format */
4738 (_("warning: %pB uses double-precision hard float, "
4739 "%pB uses single-precision hard float"), obfd, ibfd);
4740 else if (out_fp == 3 && in_fp == 1)
4741 _bfd_error_handler
4742 /* xgettext:c-format */
4743 (_("warning: %pB uses double-precision hard float, "
4744 "%pB uses single-precision hard float"), ibfd, obfd);
4745
4746 in_fp = in_attr->i & 0xc;
4747 out_fp = out_attr->i & 0xc;
4748 if (in_fp == 0)
4749 ;
4750 else if (out_fp == 0)
4751 {
4752 out_attr->type = 1;
4753 out_attr->i ^= in_fp;
4754 }
4755 else if (out_fp != 2 * 4 && in_fp == 2 * 4)
4756 _bfd_error_handler
4757 /* xgettext:c-format */
4758 (_("warning: %pB uses 64-bit long double, "
4759 "%pB uses 128-bit long double"), ibfd, obfd);
4760 else if (in_fp != 2 * 4 && out_fp == 2 * 4)
4761 _bfd_error_handler
4762 /* xgettext:c-format */
4763 (_("warning: %pB uses 64-bit long double, "
4764 "%pB uses 128-bit long double"), obfd, ibfd);
4765 else if (out_fp == 1 * 4 && in_fp == 3 * 4)
4766 _bfd_error_handler
4767 /* xgettext:c-format */
4768 (_("warning: %pB uses IBM long double, "
4769 "%pB uses IEEE long double"), ibfd, obfd);
4770 else if (out_fp == 3 * 4 && in_fp == 1 * 4)
4771 _bfd_error_handler
4772 /* xgettext:c-format */
4773 (_("warning: %pB uses IBM long double, "
4774 "%pB uses IEEE long double"), obfd, ibfd);
4775 }
4776 }
4777
4778 /* Merge object attributes from IBFD into OBFD. Warn if
4779 there are conflicting attributes. */
4780 static bfd_boolean
4781 ppc_elf_merge_obj_attributes (bfd *ibfd, struct bfd_link_info *info)
4782 {
4783 bfd *obfd;
4784 obj_attribute *in_attr, *in_attrs;
4785 obj_attribute *out_attr, *out_attrs;
4786
4787 _bfd_elf_ppc_merge_fp_attributes (ibfd, info);
4788
4789 obfd = info->output_bfd;
4790 in_attrs = elf_known_obj_attributes (ibfd)[OBJ_ATTR_GNU];
4791 out_attrs = elf_known_obj_attributes (obfd)[OBJ_ATTR_GNU];
4792
4793 /* Check for conflicting Tag_GNU_Power_ABI_Vector attributes and
4794 merge non-conflicting ones. */
4795 in_attr = &in_attrs[Tag_GNU_Power_ABI_Vector];
4796 out_attr = &out_attrs[Tag_GNU_Power_ABI_Vector];
4797 if (in_attr->i != out_attr->i)
4798 {
4799 int in_vec = in_attr->i & 3;
4800 int out_vec = out_attr->i & 3;
4801
4802 if (in_vec == 0)
4803 ;
4804 else if (out_vec == 0)
4805 {
4806 out_attr->type = 1;
4807 out_attr->i = in_vec;
4808 }
4809 /* For now, allow generic to transition to AltiVec or SPE
4810 without a warning. If GCC marked files with their stack
4811 alignment and used don't-care markings for files which are
4812 not affected by the vector ABI, we could warn about this
4813 case too. */
4814 else if (in_vec == 1)
4815 ;
4816 else if (out_vec == 1)
4817 {
4818 out_attr->type = 1;
4819 out_attr->i = in_vec;
4820 }
4821 else if (out_vec < in_vec)
4822 _bfd_error_handler
4823 /* xgettext:c-format */
4824 (_("warning: %pB uses AltiVec vector ABI, %pB uses SPE vector ABI"),
4825 obfd, ibfd);
4826 else if (out_vec > in_vec)
4827 _bfd_error_handler
4828 /* xgettext:c-format */
4829 (_("warning: %pB uses AltiVec vector ABI, %pB uses SPE vector ABI"),
4830 ibfd, obfd);
4831 }
4832
4833 /* Check for conflicting Tag_GNU_Power_ABI_Struct_Return attributes
4834 and merge non-conflicting ones. */
4835 in_attr = &in_attrs[Tag_GNU_Power_ABI_Struct_Return];
4836 out_attr = &out_attrs[Tag_GNU_Power_ABI_Struct_Return];
4837 if (in_attr->i != out_attr->i)
4838 {
4839 int in_struct = in_attr->i & 3;
4840 int out_struct = out_attr->i & 3;
4841
4842 if (in_struct == 0 || in_struct == 3)
4843 ;
4844 else if (out_struct == 0)
4845 {
4846 out_attr->type = 1;
4847 out_attr->i = in_struct;
4848 }
4849 else if (out_struct < in_struct)
4850 _bfd_error_handler
4851 /* xgettext:c-format */
4852 (_("warning: %pB uses r3/r4 for small structure returns, "
4853 "%pB uses memory"), obfd, ibfd);
4854 else if (out_struct > in_struct)
4855 _bfd_error_handler
4856 /* xgettext:c-format */
4857 (_("warning: %pB uses r3/r4 for small structure returns, "
4858 "%pB uses memory"), ibfd, obfd);
4859 }
4860
4861 /* Merge Tag_compatibility attributes and any common GNU ones. */
4862 _bfd_elf_merge_object_attributes (ibfd, info);
4863
4864 return TRUE;
4865 }
4866
4867 /* Merge backend specific data from an object file to the output
4868 object file when linking. */
4869
4870 static bfd_boolean
4871 ppc_elf_merge_private_bfd_data (bfd *ibfd, struct bfd_link_info *info)
4872 {
4873 bfd *obfd = info->output_bfd;
4874 flagword old_flags;
4875 flagword new_flags;
4876 bfd_boolean error;
4877
4878 if (!is_ppc_elf (ibfd) || !is_ppc_elf (obfd))
4879 return TRUE;
4880
4881 /* Check if we have the same endianness. */
4882 if (! _bfd_generic_verify_endian_match (ibfd, info))
4883 return FALSE;
4884
4885 if (!ppc_elf_merge_obj_attributes (ibfd, info))
4886 return FALSE;
4887
4888 new_flags = elf_elfheader (ibfd)->e_flags;
4889 old_flags = elf_elfheader (obfd)->e_flags;
4890 if (!elf_flags_init (obfd))
4891 {
4892 /* First call, no flags set. */
4893 elf_flags_init (obfd) = TRUE;
4894 elf_elfheader (obfd)->e_flags = new_flags;
4895 }
4896
4897 /* Compatible flags are ok. */
4898 else if (new_flags == old_flags)
4899 ;
4900
4901 /* Incompatible flags. */
4902 else
4903 {
4904 /* Warn about -mrelocatable mismatch. Allow -mrelocatable-lib
4905 to be linked with either. */
4906 error = FALSE;
4907 if ((new_flags & EF_PPC_RELOCATABLE) != 0
4908 && (old_flags & (EF_PPC_RELOCATABLE | EF_PPC_RELOCATABLE_LIB)) == 0)
4909 {
4910 error = TRUE;
4911 _bfd_error_handler
4912 (_("%pB: compiled with -mrelocatable and linked with "
4913 "modules compiled normally"), ibfd);
4914 }
4915 else if ((new_flags & (EF_PPC_RELOCATABLE | EF_PPC_RELOCATABLE_LIB)) == 0
4916 && (old_flags & EF_PPC_RELOCATABLE) != 0)
4917 {
4918 error = TRUE;
4919 _bfd_error_handler
4920 (_("%pB: compiled normally and linked with "
4921 "modules compiled with -mrelocatable"), ibfd);
4922 }
4923
4924 /* The output is -mrelocatable-lib iff both the input files are. */
4925 if (! (new_flags & EF_PPC_RELOCATABLE_LIB))
4926 elf_elfheader (obfd)->e_flags &= ~EF_PPC_RELOCATABLE_LIB;
4927
4928 /* The output is -mrelocatable iff it can't be -mrelocatable-lib,
4929 but each input file is either -mrelocatable or -mrelocatable-lib. */
4930 if (! (elf_elfheader (obfd)->e_flags & EF_PPC_RELOCATABLE_LIB)
4931 && (new_flags & (EF_PPC_RELOCATABLE_LIB | EF_PPC_RELOCATABLE))
4932 && (old_flags & (EF_PPC_RELOCATABLE_LIB | EF_PPC_RELOCATABLE)))
4933 elf_elfheader (obfd)->e_flags |= EF_PPC_RELOCATABLE;
4934
4935 /* Do not warn about eabi vs. V.4 mismatch, just or in the bit if
4936 any module uses it. */
4937 elf_elfheader (obfd)->e_flags |= (new_flags & EF_PPC_EMB);
4938
4939 new_flags &= ~(EF_PPC_RELOCATABLE | EF_PPC_RELOCATABLE_LIB | EF_PPC_EMB);
4940 old_flags &= ~(EF_PPC_RELOCATABLE | EF_PPC_RELOCATABLE_LIB | EF_PPC_EMB);
4941
4942 /* Warn about any other mismatches. */
4943 if (new_flags != old_flags)
4944 {
4945 error = TRUE;
4946 _bfd_error_handler
4947 /* xgettext:c-format */
4948 (_("%pB: uses different e_flags (%#x) fields "
4949 "than previous modules (%#x)"),
4950 ibfd, new_flags, old_flags);
4951 }
4952
4953 if (error)
4954 {
4955 bfd_set_error (bfd_error_bad_value);
4956 return FALSE;
4957 }
4958 }
4959
4960 return TRUE;
4961 }
4962
4963 static void
4964 ppc_elf_vle_split16 (bfd *input_bfd,
4965 asection *input_section,
4966 unsigned long offset,
4967 bfd_byte *loc,
4968 bfd_vma value,
4969 split16_format_type split16_format,
4970 bfd_boolean fixup)
4971 {
4972 unsigned int insn, opcode, top5;
4973
4974 insn = bfd_get_32 (input_bfd, loc);
4975 opcode = insn & 0xfc00f800;
4976 if (opcode == E_OR2I_INSN
4977 || opcode == E_AND2I_DOT_INSN
4978 || opcode == E_OR2IS_INSN
4979 || opcode == E_LIS_INSN
4980 || opcode == E_AND2IS_DOT_INSN)
4981 {
4982 if (split16_format != split16a_type)
4983 {
4984 if (fixup)
4985 split16_format = split16a_type;
4986 else
4987 _bfd_error_handler
4988 /* xgettext:c-format */
4989 (_("%pB(%pA+0x%lx): expected 16A style relocation on 0x%08x insn"),
4990 input_bfd, input_section, offset, opcode);
4991 }
4992 }
4993 else if (opcode == E_ADD2I_DOT_INSN
4994 || opcode == E_ADD2IS_INSN
4995 || opcode == E_CMP16I_INSN
4996 || opcode == E_MULL2I_INSN
4997 || opcode == E_CMPL16I_INSN
4998 || opcode == E_CMPH16I_INSN
4999 || opcode == E_CMPHL16I_INSN)
5000 {
5001 if (split16_format != split16d_type)
5002 {
5003 if (fixup)
5004 split16_format = split16d_type;
5005 else
5006 _bfd_error_handler
5007 /* xgettext:c-format */
5008 (_("%pB(%pA+0x%lx): expected 16D style relocation on 0x%08x insn"),
5009 input_bfd, input_section, offset, opcode);
5010 }
5011 }
5012 top5 = value & 0xf800;
5013 top5 = top5 << (split16_format == split16a_type ? 5 : 10);
5014 insn &= (split16_format == split16a_type ? ~0x1f07ff : ~0x3e007ff);
5015 insn |= top5;
5016 insn |= value & 0x7ff;
5017 bfd_put_32 (input_bfd, insn, loc);
5018 }
5019
5020 static void
5021 ppc_elf_vle_split20 (bfd *output_bfd, bfd_byte *loc, bfd_vma value)
5022 {
5023 unsigned int insn;
5024
5025 insn = bfd_get_32 (output_bfd, loc);
5026 /* We have an li20 field, bits 17..20, 11..15, 21..31. */
5027 /* Top 4 bits of value to 17..20. */
5028 insn |= (value & 0xf0000) >> 5;
5029 /* Next 5 bits of the value to 11..15. */
5030 insn |= (value & 0xf800) << 5;
5031 /* And the final 11 bits of the value to bits 21 to 31. */
5032 insn |= value & 0x7ff;
5033 bfd_put_32 (output_bfd, insn, loc);
5034 }
5035
5036 \f
5037 /* Choose which PLT scheme to use, and set .plt flags appropriately.
5038 Returns -1 on error, 0 for old PLT, 1 for new PLT. */
5039 int
5040 ppc_elf_select_plt_layout (bfd *output_bfd ATTRIBUTE_UNUSED,
5041 struct bfd_link_info *info)
5042 {
5043 struct ppc_elf_link_hash_table *htab;
5044 flagword flags;
5045
5046 htab = ppc_elf_hash_table (info);
5047
5048 if (htab->plt_type == PLT_UNSET)
5049 {
5050 struct elf_link_hash_entry *h;
5051
5052 if (htab->params->plt_style == PLT_OLD)
5053 htab->plt_type = PLT_OLD;
5054 else if (bfd_link_pic (info)
5055 && htab->elf.dynamic_sections_created
5056 && (h = elf_link_hash_lookup (&htab->elf, "_mcount",
5057 FALSE, FALSE, TRUE)) != NULL
5058 && (h->type == STT_FUNC
5059 || h->needs_plt)
5060 && h->ref_regular
5061 && !(SYMBOL_CALLS_LOCAL (info, h)
5062 || UNDEFWEAK_NO_DYNAMIC_RELOC (info, h)))
5063 {
5064 /* Profiling of shared libs (and pies) is not supported with
5065 secure plt, because ppc32 does profiling before a
5066 function prologue and a secure plt pic call stubs needs
5067 r30 to be set up. */
5068 htab->plt_type = PLT_OLD;
5069 }
5070 else
5071 {
5072 bfd *ibfd;
5073 enum ppc_elf_plt_type plt_type = htab->params->plt_style;
5074
5075 /* Look through the reloc flags left by ppc_elf_check_relocs.
5076 Use the old style bss plt if a file makes plt calls
5077 without using the new relocs, and if ld isn't given
5078 --secure-plt and we never see REL16 relocs. */
5079 if (plt_type == PLT_UNSET)
5080 plt_type = PLT_OLD;
5081 for (ibfd = info->input_bfds; ibfd; ibfd = ibfd->link.next)
5082 if (is_ppc_elf (ibfd))
5083 {
5084 if (ppc_elf_tdata (ibfd)->has_rel16)
5085 plt_type = PLT_NEW;
5086 else if (ppc_elf_tdata (ibfd)->makes_plt_call)
5087 {
5088 plt_type = PLT_OLD;
5089 htab->old_bfd = ibfd;
5090 break;
5091 }
5092 }
5093 htab->plt_type = plt_type;
5094 }
5095 }
5096 if (htab->plt_type == PLT_OLD && htab->params->plt_style == PLT_NEW)
5097 {
5098 if (htab->old_bfd != NULL)
5099 _bfd_error_handler (_("bss-plt forced due to %pB"), htab->old_bfd);
5100 else
5101 _bfd_error_handler (_("bss-plt forced by profiling"));
5102 }
5103
5104 BFD_ASSERT (htab->plt_type != PLT_VXWORKS);
5105
5106 if (htab->plt_type == PLT_NEW)
5107 {
5108 flags = (SEC_ALLOC | SEC_LOAD | SEC_HAS_CONTENTS
5109 | SEC_IN_MEMORY | SEC_LINKER_CREATED);
5110
5111 /* The new PLT is a loaded section. */
5112 if (htab->elf.splt != NULL
5113 && !bfd_set_section_flags (htab->elf.dynobj, htab->elf.splt, flags))
5114 return -1;
5115
5116 /* The new GOT is not executable. */
5117 if (htab->elf.sgot != NULL
5118 && !bfd_set_section_flags (htab->elf.dynobj, htab->elf.sgot, flags))
5119 return -1;
5120 }
5121 else
5122 {
5123 /* Stop an unused .glink section from affecting .text alignment. */
5124 if (htab->glink != NULL
5125 && !bfd_set_section_alignment (htab->elf.dynobj, htab->glink, 0))
5126 return -1;
5127 }
5128 return htab->plt_type == PLT_NEW;
5129 }
5130 \f
5131 /* Return the section that should be marked against GC for a given
5132 relocation. */
5133
5134 static asection *
5135 ppc_elf_gc_mark_hook (asection *sec,
5136 struct bfd_link_info *info,
5137 Elf_Internal_Rela *rel,
5138 struct elf_link_hash_entry *h,
5139 Elf_Internal_Sym *sym)
5140 {
5141 if (h != NULL)
5142 switch (ELF32_R_TYPE (rel->r_info))
5143 {
5144 case R_PPC_GNU_VTINHERIT:
5145 case R_PPC_GNU_VTENTRY:
5146 return NULL;
5147 }
5148
5149 return _bfd_elf_gc_mark_hook (sec, info, rel, h, sym);
5150 }
5151
5152 static bfd_boolean
5153 get_sym_h (struct elf_link_hash_entry **hp,
5154 Elf_Internal_Sym **symp,
5155 asection **symsecp,
5156 unsigned char **tls_maskp,
5157 Elf_Internal_Sym **locsymsp,
5158 unsigned long r_symndx,
5159 bfd *ibfd)
5160 {
5161 Elf_Internal_Shdr *symtab_hdr = &elf_symtab_hdr (ibfd);
5162
5163 if (r_symndx >= symtab_hdr->sh_info)
5164 {
5165 struct elf_link_hash_entry **sym_hashes = elf_sym_hashes (ibfd);
5166 struct elf_link_hash_entry *h;
5167
5168 h = sym_hashes[r_symndx - symtab_hdr->sh_info];
5169 while (h->root.type == bfd_link_hash_indirect
5170 || h->root.type == bfd_link_hash_warning)
5171 h = (struct elf_link_hash_entry *) h->root.u.i.link;
5172
5173 if (hp != NULL)
5174 *hp = h;
5175
5176 if (symp != NULL)
5177 *symp = NULL;
5178
5179 if (symsecp != NULL)
5180 {
5181 asection *symsec = NULL;
5182 if (h->root.type == bfd_link_hash_defined
5183 || h->root.type == bfd_link_hash_defweak)
5184 symsec = h->root.u.def.section;
5185 *symsecp = symsec;
5186 }
5187
5188 if (tls_maskp != NULL)
5189 *tls_maskp = &ppc_elf_hash_entry (h)->tls_mask;
5190 }
5191 else
5192 {
5193 Elf_Internal_Sym *sym;
5194 Elf_Internal_Sym *locsyms = *locsymsp;
5195
5196 if (locsyms == NULL)
5197 {
5198 locsyms = (Elf_Internal_Sym *) symtab_hdr->contents;
5199 if (locsyms == NULL)
5200 locsyms = bfd_elf_get_elf_syms (ibfd, symtab_hdr,
5201 symtab_hdr->sh_info,
5202 0, NULL, NULL, NULL);
5203 if (locsyms == NULL)
5204 return FALSE;
5205 *locsymsp = locsyms;
5206 }
5207 sym = locsyms + r_symndx;
5208
5209 if (hp != NULL)
5210 *hp = NULL;
5211
5212 if (symp != NULL)
5213 *symp = sym;
5214
5215 if (symsecp != NULL)
5216 *symsecp = bfd_section_from_elf_index (ibfd, sym->st_shndx);
5217
5218 if (tls_maskp != NULL)
5219 {
5220 bfd_signed_vma *local_got;
5221 unsigned char *tls_mask;
5222
5223 tls_mask = NULL;
5224 local_got = elf_local_got_refcounts (ibfd);
5225 if (local_got != NULL)
5226 {
5227 struct plt_entry **local_plt = (struct plt_entry **)
5228 (local_got + symtab_hdr->sh_info);
5229 unsigned char *lgot_masks = (unsigned char *)
5230 (local_plt + symtab_hdr->sh_info);
5231 tls_mask = &lgot_masks[r_symndx];
5232 }
5233 *tls_maskp = tls_mask;
5234 }
5235 }
5236 return TRUE;
5237 }
5238 \f
5239 /* Set plt output section type, htab->tls_get_addr, and call the
5240 generic ELF tls_setup function. */
5241
5242 asection *
5243 ppc_elf_tls_setup (bfd *obfd, struct bfd_link_info *info)
5244 {
5245 struct ppc_elf_link_hash_table *htab;
5246
5247 htab = ppc_elf_hash_table (info);
5248 htab->tls_get_addr = elf_link_hash_lookup (&htab->elf, "__tls_get_addr",
5249 FALSE, FALSE, TRUE);
5250 if (htab->plt_type != PLT_NEW)
5251 htab->params->no_tls_get_addr_opt = TRUE;
5252
5253 if (!htab->params->no_tls_get_addr_opt)
5254 {
5255 struct elf_link_hash_entry *opt, *tga;
5256 opt = elf_link_hash_lookup (&htab->elf, "__tls_get_addr_opt",
5257 FALSE, FALSE, TRUE);
5258 if (opt != NULL
5259 && (opt->root.type == bfd_link_hash_defined
5260 || opt->root.type == bfd_link_hash_defweak))
5261 {
5262 /* If glibc supports an optimized __tls_get_addr call stub,
5263 signalled by the presence of __tls_get_addr_opt, and we'll
5264 be calling __tls_get_addr via a plt call stub, then
5265 make __tls_get_addr point to __tls_get_addr_opt. */
5266 tga = htab->tls_get_addr;
5267 if (htab->elf.dynamic_sections_created
5268 && tga != NULL
5269 && (tga->type == STT_FUNC
5270 || tga->needs_plt)
5271 && !(SYMBOL_CALLS_LOCAL (info, tga)
5272 || UNDEFWEAK_NO_DYNAMIC_RELOC (info, tga)))
5273 {
5274 struct plt_entry *ent;
5275 for (ent = tga->plt.plist; ent != NULL; ent = ent->next)
5276 if (ent->plt.refcount > 0)
5277 break;
5278 if (ent != NULL)
5279 {
5280 tga->root.type = bfd_link_hash_indirect;
5281 tga->root.u.i.link = &opt->root;
5282 ppc_elf_copy_indirect_symbol (info, opt, tga);
5283 opt->mark = 1;
5284 if (opt->dynindx != -1)
5285 {
5286 /* Use __tls_get_addr_opt in dynamic relocations. */
5287 opt->dynindx = -1;
5288 _bfd_elf_strtab_delref (elf_hash_table (info)->dynstr,
5289 opt->dynstr_index);
5290 if (!bfd_elf_link_record_dynamic_symbol (info, opt))
5291 return FALSE;
5292 }
5293 htab->tls_get_addr = opt;
5294 }
5295 }
5296 }
5297 else
5298 htab->params->no_tls_get_addr_opt = TRUE;
5299 }
5300 if (htab->plt_type == PLT_NEW
5301 && htab->elf.splt != NULL
5302 && htab->elf.splt->output_section != NULL)
5303 {
5304 elf_section_type (htab->elf.splt->output_section) = SHT_PROGBITS;
5305 elf_section_flags (htab->elf.splt->output_section) = SHF_ALLOC + SHF_WRITE;
5306 }
5307
5308 return _bfd_elf_tls_setup (obfd, info);
5309 }
5310
5311 /* Return TRUE iff REL is a branch reloc with a global symbol matching
5312 HASH. */
5313
5314 static bfd_boolean
5315 branch_reloc_hash_match (const bfd *ibfd,
5316 const Elf_Internal_Rela *rel,
5317 const struct elf_link_hash_entry *hash)
5318 {
5319 Elf_Internal_Shdr *symtab_hdr = &elf_symtab_hdr (ibfd);
5320 enum elf_ppc_reloc_type r_type = ELF32_R_TYPE (rel->r_info);
5321 unsigned int r_symndx = ELF32_R_SYM (rel->r_info);
5322
5323 if (r_symndx >= symtab_hdr->sh_info && is_branch_reloc (r_type))
5324 {
5325 struct elf_link_hash_entry **sym_hashes = elf_sym_hashes (ibfd);
5326 struct elf_link_hash_entry *h;
5327
5328 h = sym_hashes[r_symndx - symtab_hdr->sh_info];
5329 while (h->root.type == bfd_link_hash_indirect
5330 || h->root.type == bfd_link_hash_warning)
5331 h = (struct elf_link_hash_entry *) h->root.u.i.link;
5332 if (h == hash)
5333 return TRUE;
5334 }
5335 return FALSE;
5336 }
5337
5338 /* Run through all the TLS relocs looking for optimization
5339 opportunities. */
5340
5341 bfd_boolean
5342 ppc_elf_tls_optimize (bfd *obfd ATTRIBUTE_UNUSED,
5343 struct bfd_link_info *info)
5344 {
5345 bfd *ibfd;
5346 asection *sec;
5347 struct ppc_elf_link_hash_table *htab;
5348 int pass;
5349
5350 if (!bfd_link_executable (info))
5351 return TRUE;
5352
5353 htab = ppc_elf_hash_table (info);
5354 if (htab == NULL)
5355 return FALSE;
5356
5357 /* Make two passes through the relocs. First time check that tls
5358 relocs involved in setting up a tls_get_addr call are indeed
5359 followed by such a call. If they are not, don't do any tls
5360 optimization. On the second pass twiddle tls_mask flags to
5361 notify relocate_section that optimization can be done, and
5362 adjust got and plt refcounts. */
5363 for (pass = 0; pass < 2; ++pass)
5364 for (ibfd = info->input_bfds; ibfd != NULL; ibfd = ibfd->link.next)
5365 {
5366 Elf_Internal_Shdr *symtab_hdr = &elf_symtab_hdr (ibfd);
5367 asection *got2 = bfd_get_section_by_name (ibfd, ".got2");
5368
5369 for (sec = ibfd->sections; sec != NULL; sec = sec->next)
5370 if (sec->has_tls_reloc && !bfd_is_abs_section (sec->output_section))
5371 {
5372 Elf_Internal_Rela *relstart, *rel, *relend;
5373 int expecting_tls_get_addr = 0;
5374
5375 /* Read the relocations. */
5376 relstart = _bfd_elf_link_read_relocs (ibfd, sec, NULL, NULL,
5377 info->keep_memory);
5378 if (relstart == NULL)
5379 return FALSE;
5380
5381 relend = relstart + sec->reloc_count;
5382 for (rel = relstart; rel < relend; rel++)
5383 {
5384 enum elf_ppc_reloc_type r_type;
5385 unsigned long r_symndx;
5386 struct elf_link_hash_entry *h = NULL;
5387 unsigned char *tls_mask;
5388 unsigned char tls_set, tls_clear;
5389 bfd_boolean is_local;
5390 bfd_signed_vma *got_count;
5391
5392 r_symndx = ELF32_R_SYM (rel->r_info);
5393 if (r_symndx >= symtab_hdr->sh_info)
5394 {
5395 struct elf_link_hash_entry **sym_hashes;
5396
5397 sym_hashes = elf_sym_hashes (ibfd);
5398 h = sym_hashes[r_symndx - symtab_hdr->sh_info];
5399 while (h->root.type == bfd_link_hash_indirect
5400 || h->root.type == bfd_link_hash_warning)
5401 h = (struct elf_link_hash_entry *) h->root.u.i.link;
5402 }
5403
5404 is_local = FALSE;
5405 if (h == NULL
5406 || !h->def_dynamic)
5407 is_local = TRUE;
5408
5409 r_type = ELF32_R_TYPE (rel->r_info);
5410 /* If this section has old-style __tls_get_addr calls
5411 without marker relocs, then check that each
5412 __tls_get_addr call reloc is preceded by a reloc
5413 that conceivably belongs to the __tls_get_addr arg
5414 setup insn. If we don't find matching arg setup
5415 relocs, don't do any tls optimization. */
5416 if (pass == 0
5417 && sec->has_tls_get_addr_call
5418 && h != NULL
5419 && h == htab->tls_get_addr
5420 && !expecting_tls_get_addr
5421 && is_branch_reloc (r_type))
5422 {
5423 info->callbacks->minfo ("%H __tls_get_addr lost arg, "
5424 "TLS optimization disabled\n",
5425 ibfd, sec, rel->r_offset);
5426 if (elf_section_data (sec)->relocs != relstart)
5427 free (relstart);
5428 return TRUE;
5429 }
5430
5431 expecting_tls_get_addr = 0;
5432 switch (r_type)
5433 {
5434 case R_PPC_GOT_TLSLD16:
5435 case R_PPC_GOT_TLSLD16_LO:
5436 expecting_tls_get_addr = 1;
5437 /* Fall through. */
5438
5439 case R_PPC_GOT_TLSLD16_HI:
5440 case R_PPC_GOT_TLSLD16_HA:
5441 /* These relocs should never be against a symbol
5442 defined in a shared lib. Leave them alone if
5443 that turns out to be the case. */
5444 if (!is_local)
5445 continue;
5446
5447 /* LD -> LE */
5448 tls_set = 0;
5449 tls_clear = TLS_LD;
5450 break;
5451
5452 case R_PPC_GOT_TLSGD16:
5453 case R_PPC_GOT_TLSGD16_LO:
5454 expecting_tls_get_addr = 1;
5455 /* Fall through. */
5456
5457 case R_PPC_GOT_TLSGD16_HI:
5458 case R_PPC_GOT_TLSGD16_HA:
5459 if (is_local)
5460 /* GD -> LE */
5461 tls_set = 0;
5462 else
5463 /* GD -> IE */
5464 tls_set = TLS_TLS | TLS_TPRELGD;
5465 tls_clear = TLS_GD;
5466 break;
5467
5468 case R_PPC_GOT_TPREL16:
5469 case R_PPC_GOT_TPREL16_LO:
5470 case R_PPC_GOT_TPREL16_HI:
5471 case R_PPC_GOT_TPREL16_HA:
5472 if (is_local)
5473 {
5474 /* IE -> LE */
5475 tls_set = 0;
5476 tls_clear = TLS_TPREL;
5477 break;
5478 }
5479 else
5480 continue;
5481
5482 case R_PPC_TLSGD:
5483 case R_PPC_TLSLD:
5484 if (rel + 1 < relend
5485 && is_plt_seq_reloc (ELF32_R_TYPE (rel[1].r_info)))
5486 {
5487 if (pass != 0
5488 && ELF32_R_TYPE (rel[1].r_info) != R_PPC_PLTSEQ)
5489 {
5490 r_type = ELF32_R_TYPE (rel[1].r_info);
5491 r_symndx = ELF32_R_SYM (rel[1].r_info);
5492 if (r_symndx >= symtab_hdr->sh_info)
5493 {
5494 struct elf_link_hash_entry **sym_hashes;
5495
5496 sym_hashes = elf_sym_hashes (ibfd);
5497 h = sym_hashes[r_symndx - symtab_hdr->sh_info];
5498 while (h->root.type == bfd_link_hash_indirect
5499 || h->root.type == bfd_link_hash_warning)
5500 h = (struct elf_link_hash_entry *) h->root.u.i.link;
5501 if (h != NULL)
5502 {
5503 struct plt_entry *ent = NULL;
5504 bfd_vma addend = 0;
5505
5506 if (bfd_link_pic (info))
5507 addend = rel->r_addend;
5508 ent = find_plt_ent (&h->plt.plist,
5509 got2, addend);
5510 if (ent != NULL
5511 && ent->plt.refcount > 0)
5512 ent->plt.refcount -= 1;
5513 }
5514 }
5515 }
5516 continue;
5517 }
5518 expecting_tls_get_addr = 2;
5519 tls_set = 0;
5520 tls_clear = 0;
5521 break;
5522
5523 default:
5524 continue;
5525 }
5526
5527 if (pass == 0)
5528 {
5529 if (!expecting_tls_get_addr
5530 || !sec->has_tls_get_addr_call)
5531 continue;
5532
5533 if (rel + 1 < relend
5534 && branch_reloc_hash_match (ibfd, rel + 1,
5535 htab->tls_get_addr))
5536 continue;
5537
5538 /* Uh oh, we didn't find the expected call. We
5539 could just mark this symbol to exclude it
5540 from tls optimization but it's safer to skip
5541 the entire optimization. */
5542 info->callbacks->minfo (_("%H arg lost __tls_get_addr, "
5543 "TLS optimization disabled\n"),
5544 ibfd, sec, rel->r_offset);
5545 if (elf_section_data (sec)->relocs != relstart)
5546 free (relstart);
5547 return TRUE;
5548 }
5549
5550 if (h != NULL)
5551 {
5552 tls_mask = &ppc_elf_hash_entry (h)->tls_mask;
5553 got_count = &h->got.refcount;
5554 }
5555 else
5556 {
5557 bfd_signed_vma *lgot_refs;
5558 struct plt_entry **local_plt;
5559 unsigned char *lgot_masks;
5560
5561 lgot_refs = elf_local_got_refcounts (ibfd);
5562 if (lgot_refs == NULL)
5563 abort ();
5564 local_plt = (struct plt_entry **)
5565 (lgot_refs + symtab_hdr->sh_info);
5566 lgot_masks = (unsigned char *)
5567 (local_plt + symtab_hdr->sh_info);
5568 tls_mask = &lgot_masks[r_symndx];
5569 got_count = &lgot_refs[r_symndx];
5570 }
5571
5572 /* If we don't have old-style __tls_get_addr calls
5573 without TLSGD/TLSLD marker relocs, and we haven't
5574 found a new-style __tls_get_addr call with a
5575 marker for this symbol, then we either have a
5576 broken object file or an -mlongcall style
5577 indirect call to __tls_get_addr without a marker.
5578 Disable optimization in this case. */
5579 if ((tls_clear & (TLS_GD | TLS_LD)) != 0
5580 && !sec->has_tls_get_addr_call
5581 && ((*tls_mask & (TLS_TLS | TLS_MARK))
5582 != (TLS_TLS | TLS_MARK)))
5583 continue;
5584
5585 if (expecting_tls_get_addr)
5586 {
5587 struct plt_entry *ent;
5588 bfd_vma addend = 0;
5589
5590 if (bfd_link_pic (info)
5591 && (ELF32_R_TYPE (rel[1].r_info) == R_PPC_PLTREL24
5592 || ELF32_R_TYPE (rel[1].r_info) == R_PPC_PLTCALL))
5593 addend = rel[1].r_addend;
5594 ent = find_plt_ent (&htab->tls_get_addr->plt.plist,
5595 got2, addend);
5596 if (ent != NULL && ent->plt.refcount > 0)
5597 ent->plt.refcount -= 1;
5598
5599 if (expecting_tls_get_addr == 2)
5600 continue;
5601 }
5602
5603 if (tls_set == 0)
5604 {
5605 /* We managed to get rid of a got entry. */
5606 if (*got_count > 0)
5607 *got_count -= 1;
5608 }
5609
5610 *tls_mask |= tls_set;
5611 *tls_mask &= ~tls_clear;
5612 }
5613
5614 if (elf_section_data (sec)->relocs != relstart)
5615 free (relstart);
5616 }
5617 }
5618 htab->do_tls_opt = 1;
5619 return TRUE;
5620 }
5621 \f
5622 /* Find dynamic relocs for H that apply to read-only sections. */
5623
5624 static asection *
5625 readonly_dynrelocs (struct elf_link_hash_entry *h)
5626 {
5627 struct elf_dyn_relocs *p;
5628
5629 for (p = ppc_elf_hash_entry (h)->dyn_relocs; p != NULL; p = p->next)
5630 {
5631 asection *s = p->sec->output_section;
5632
5633 if (s != NULL && (s->flags & SEC_READONLY) != 0)
5634 return p->sec;
5635 }
5636 return NULL;
5637 }
5638
5639 /* Return true if we have dynamic relocs against H or any of its weak
5640 aliases, that apply to read-only sections. Cannot be used after
5641 size_dynamic_sections. */
5642
5643 static bfd_boolean
5644 alias_readonly_dynrelocs (struct elf_link_hash_entry *h)
5645 {
5646 struct ppc_elf_link_hash_entry *eh = ppc_elf_hash_entry (h);
5647 do
5648 {
5649 if (readonly_dynrelocs (&eh->elf))
5650 return TRUE;
5651 eh = ppc_elf_hash_entry (eh->elf.u.alias);
5652 } while (eh != NULL && &eh->elf != h);
5653
5654 return FALSE;
5655 }
5656
5657 /* Return whether H has pc-relative dynamic relocs. */
5658
5659 static bfd_boolean
5660 pc_dynrelocs (struct elf_link_hash_entry *h)
5661 {
5662 struct elf_dyn_relocs *p;
5663
5664 for (p = ppc_elf_hash_entry (h)->dyn_relocs; p != NULL; p = p->next)
5665 if (p->pc_count != 0)
5666 return TRUE;
5667 return FALSE;
5668 }
5669
5670 /* Adjust a symbol defined by a dynamic object and referenced by a
5671 regular object. The current definition is in some section of the
5672 dynamic object, but we're not including those sections. We have to
5673 change the definition to something the rest of the link can
5674 understand. */
5675
5676 static bfd_boolean
5677 ppc_elf_adjust_dynamic_symbol (struct bfd_link_info *info,
5678 struct elf_link_hash_entry *h)
5679 {
5680 struct ppc_elf_link_hash_table *htab;
5681 asection *s;
5682
5683 #ifdef DEBUG
5684 fprintf (stderr, "ppc_elf_adjust_dynamic_symbol called for %s\n",
5685 h->root.root.string);
5686 #endif
5687
5688 /* Make sure we know what is going on here. */
5689 htab = ppc_elf_hash_table (info);
5690 BFD_ASSERT (htab->elf.dynobj != NULL
5691 && (h->needs_plt
5692 || h->type == STT_GNU_IFUNC
5693 || h->is_weakalias
5694 || (h->def_dynamic
5695 && h->ref_regular
5696 && !h->def_regular)));
5697
5698 /* Deal with function syms. */
5699 if (h->type == STT_FUNC
5700 || h->type == STT_GNU_IFUNC
5701 || h->needs_plt)
5702 {
5703 bfd_boolean local = (SYMBOL_CALLS_LOCAL (info, h)
5704 || UNDEFWEAK_NO_DYNAMIC_RELOC (info, h));
5705 /* Discard dyn_relocs when non-pic if we've decided that a
5706 function symbol is local. */
5707 if (!bfd_link_pic (info) && local)
5708 ppc_elf_hash_entry (h)->dyn_relocs = NULL;
5709
5710 /* Clear procedure linkage table information for any symbol that
5711 won't need a .plt entry. */
5712 struct plt_entry *ent;
5713 for (ent = h->plt.plist; ent != NULL; ent = ent->next)
5714 if (ent->plt.refcount > 0)
5715 break;
5716 if (ent == NULL
5717 || (h->type != STT_GNU_IFUNC
5718 && local
5719 && ((ppc_elf_hash_entry (h)->tls_mask & (TLS_TLS | PLT_KEEP))
5720 != PLT_KEEP)))
5721 {
5722 /* A PLT entry is not required/allowed when:
5723
5724 1. We are not using ld.so; because then the PLT entry
5725 can't be set up, so we can't use one. In this case,
5726 ppc_elf_adjust_dynamic_symbol won't even be called.
5727
5728 2. GC has rendered the entry unused.
5729
5730 3. We know for certain that a call to this symbol
5731 will go to this object, or will remain undefined. */
5732 h->plt.plist = NULL;
5733 h->needs_plt = 0;
5734 h->pointer_equality_needed = 0;
5735 }
5736 else
5737 {
5738 /* Taking a function's address in a read/write section
5739 doesn't require us to define the function symbol in the
5740 executable on a plt call stub. A dynamic reloc can
5741 be used instead, giving better runtime performance.
5742 (Calls via that function pointer don't need to bounce
5743 through the plt call stub.) Similarly, use a dynamic
5744 reloc for a weak reference when possible, allowing the
5745 resolution of the symbol to be set at load time rather
5746 than link time. */
5747 if ((h->pointer_equality_needed
5748 || (h->non_got_ref
5749 && !h->ref_regular_nonweak
5750 && !UNDEFWEAK_NO_DYNAMIC_RELOC (info, h)))
5751 && !htab->is_vxworks
5752 && !ppc_elf_hash_entry (h)->has_sda_refs
5753 && !readonly_dynrelocs (h))
5754 {
5755 h->pointer_equality_needed = 0;
5756 /* If we haven't seen a branch reloc then we don't need
5757 a plt entry. */
5758 if (!h->needs_plt)
5759 h->plt.plist = NULL;
5760 }
5761 else if (!bfd_link_pic (info))
5762 /* We are going to be defining the function symbol on the
5763 plt stub, so no dyn_relocs needed when non-pic. */
5764 ppc_elf_hash_entry (h)->dyn_relocs = NULL;
5765 }
5766 h->protected_def = 0;
5767 /* Function symbols can't have copy relocs. */
5768 return TRUE;
5769 }
5770 else
5771 h->plt.plist = NULL;
5772
5773 /* If this is a weak symbol, and there is a real definition, the
5774 processor independent code will have arranged for us to see the
5775 real definition first, and we can just use the same value. */
5776 if (h->is_weakalias)
5777 {
5778 struct elf_link_hash_entry *def = weakdef (h);
5779 BFD_ASSERT (def->root.type == bfd_link_hash_defined);
5780 h->root.u.def.section = def->root.u.def.section;
5781 h->root.u.def.value = def->root.u.def.value;
5782 if (def->root.u.def.section == htab->elf.sdynbss
5783 || def->root.u.def.section == htab->elf.sdynrelro
5784 || def->root.u.def.section == htab->dynsbss)
5785 ppc_elf_hash_entry (h)->dyn_relocs = NULL;
5786 return TRUE;
5787 }
5788
5789 /* This is a reference to a symbol defined by a dynamic object which
5790 is not a function. */
5791
5792 /* If we are creating a shared library, we must presume that the
5793 only references to the symbol are via the global offset table.
5794 For such cases we need not do anything here; the relocations will
5795 be handled correctly by relocate_section. */
5796 if (bfd_link_pic (info))
5797 {
5798 h->protected_def = 0;
5799 return TRUE;
5800 }
5801
5802 /* If there are no references to this symbol that do not use the
5803 GOT, we don't need to generate a copy reloc. */
5804 if (!h->non_got_ref)
5805 {
5806 h->protected_def = 0;
5807 return TRUE;
5808 }
5809
5810 /* Protected variables do not work with .dynbss. The copy in
5811 .dynbss won't be used by the shared library with the protected
5812 definition for the variable. Editing to PIC, or text relocations
5813 are preferable to an incorrect program. */
5814 if (h->protected_def)
5815 {
5816 if (ELIMINATE_COPY_RELOCS
5817 && ppc_elf_hash_entry (h)->has_addr16_ha
5818 && ppc_elf_hash_entry (h)->has_addr16_lo
5819 && htab->params->pic_fixup == 0
5820 && info->disable_target_specific_optimizations <= 1)
5821 htab->params->pic_fixup = 1;
5822 return TRUE;
5823 }
5824
5825 /* If -z nocopyreloc was given, we won't generate them either. */
5826 if (info->nocopyreloc)
5827 return TRUE;
5828
5829 /* If we don't find any dynamic relocs in read-only sections, then
5830 we'll be keeping the dynamic relocs and avoiding the copy reloc.
5831 We can't do this if there are any small data relocations. This
5832 doesn't work on VxWorks, where we can not have dynamic
5833 relocations (other than copy and jump slot relocations) in an
5834 executable. */
5835 if (ELIMINATE_COPY_RELOCS
5836 && !ppc_elf_hash_entry (h)->has_sda_refs
5837 && !htab->is_vxworks
5838 && !h->def_regular
5839 && !alias_readonly_dynrelocs (h))
5840 return TRUE;
5841
5842 /* We must allocate the symbol in our .dynbss section, which will
5843 become part of the .bss section of the executable. There will be
5844 an entry for this symbol in the .dynsym section. The dynamic
5845 object will contain position independent code, so all references
5846 from the dynamic object to this symbol will go through the global
5847 offset table. The dynamic linker will use the .dynsym entry to
5848 determine the address it must put in the global offset table, so
5849 both the dynamic object and the regular object will refer to the
5850 same memory location for the variable.
5851
5852 Of course, if the symbol is referenced using SDAREL relocs, we
5853 must instead allocate it in .sbss. */
5854 if (ppc_elf_hash_entry (h)->has_sda_refs)
5855 s = htab->dynsbss;
5856 else if ((h->root.u.def.section->flags & SEC_READONLY) != 0)
5857 s = htab->elf.sdynrelro;
5858 else
5859 s = htab->elf.sdynbss;
5860 BFD_ASSERT (s != NULL);
5861
5862 if ((h->root.u.def.section->flags & SEC_ALLOC) != 0 && h->size != 0)
5863 {
5864 asection *srel;
5865
5866 /* We must generate a R_PPC_COPY reloc to tell the dynamic
5867 linker to copy the initial value out of the dynamic object
5868 and into the runtime process image. */
5869 if (ppc_elf_hash_entry (h)->has_sda_refs)
5870 srel = htab->relsbss;
5871 else if ((h->root.u.def.section->flags & SEC_READONLY) != 0)
5872 srel = htab->elf.sreldynrelro;
5873 else
5874 srel = htab->elf.srelbss;
5875 BFD_ASSERT (srel != NULL);
5876 srel->size += sizeof (Elf32_External_Rela);
5877 h->needs_copy = 1;
5878 }
5879
5880 /* We no longer want dyn_relocs. */
5881 ppc_elf_hash_entry (h)->dyn_relocs = NULL;
5882 return _bfd_elf_adjust_dynamic_copy (info, h, s);
5883 }
5884 \f
5885 /* Generate a symbol to mark plt call stubs. For non-PIC code the sym is
5886 xxxxxxxx.plt_call32.<callee> where xxxxxxxx is a hex number, usually 0,
5887 specifying the addend on the plt relocation. For -fpic code, the sym
5888 is xxxxxxxx.plt_pic32.<callee>, and for -fPIC
5889 xxxxxxxx.got2.plt_pic32.<callee>. */
5890
5891 static bfd_boolean
5892 add_stub_sym (struct plt_entry *ent,
5893 struct elf_link_hash_entry *h,
5894 struct bfd_link_info *info)
5895 {
5896 struct elf_link_hash_entry *sh;
5897 size_t len1, len2, len3;
5898 char *name;
5899 const char *stub;
5900 struct ppc_elf_link_hash_table *htab = ppc_elf_hash_table (info);
5901
5902 if (bfd_link_pic (info))
5903 stub = ".plt_pic32.";
5904 else
5905 stub = ".plt_call32.";
5906
5907 len1 = strlen (h->root.root.string);
5908 len2 = strlen (stub);
5909 len3 = 0;
5910 if (ent->sec)
5911 len3 = strlen (ent->sec->name);
5912 name = bfd_malloc (len1 + len2 + len3 + 9);
5913 if (name == NULL)
5914 return FALSE;
5915 sprintf (name, "%08x", (unsigned) ent->addend & 0xffffffff);
5916 if (ent->sec)
5917 memcpy (name + 8, ent->sec->name, len3);
5918 memcpy (name + 8 + len3, stub, len2);
5919 memcpy (name + 8 + len3 + len2, h->root.root.string, len1 + 1);
5920 sh = elf_link_hash_lookup (&htab->elf, name, TRUE, FALSE, FALSE);
5921 if (sh == NULL)
5922 return FALSE;
5923 if (sh->root.type == bfd_link_hash_new)
5924 {
5925 sh->root.type = bfd_link_hash_defined;
5926 sh->root.u.def.section = htab->glink;
5927 sh->root.u.def.value = ent->glink_offset;
5928 sh->ref_regular = 1;
5929 sh->def_regular = 1;
5930 sh->ref_regular_nonweak = 1;
5931 sh->forced_local = 1;
5932 sh->non_elf = 0;
5933 sh->root.linker_def = 1;
5934 }
5935 return TRUE;
5936 }
5937
5938 /* Allocate NEED contiguous space in .got, and return the offset.
5939 Handles allocation of the got header when crossing 32k. */
5940
5941 static bfd_vma
5942 allocate_got (struct ppc_elf_link_hash_table *htab, unsigned int need)
5943 {
5944 bfd_vma where;
5945 unsigned int max_before_header;
5946
5947 if (htab->plt_type == PLT_VXWORKS)
5948 {
5949 where = htab->elf.sgot->size;
5950 htab->elf.sgot->size += need;
5951 }
5952 else
5953 {
5954 max_before_header = htab->plt_type == PLT_NEW ? 32768 : 32764;
5955 if (need <= htab->got_gap)
5956 {
5957 where = max_before_header - htab->got_gap;
5958 htab->got_gap -= need;
5959 }
5960 else
5961 {
5962 if (htab->elf.sgot->size + need > max_before_header
5963 && htab->elf.sgot->size <= max_before_header)
5964 {
5965 htab->got_gap = max_before_header - htab->elf.sgot->size;
5966 htab->elf.sgot->size = max_before_header + htab->got_header_size;
5967 }
5968 where = htab->elf.sgot->size;
5969 htab->elf.sgot->size += need;
5970 }
5971 }
5972 return where;
5973 }
5974
5975 /* Calculate size of GOT entries for symbol given its TLS_MASK.
5976 TLS_LD is excluded because those go in a special GOT slot. */
5977
5978 static inline unsigned int
5979 got_entries_needed (int tls_mask)
5980 {
5981 unsigned int need;
5982 if ((tls_mask & TLS_TLS) == 0)
5983 need = 4;
5984 else
5985 {
5986 need = 0;
5987 if ((tls_mask & TLS_GD) != 0)
5988 need += 8;
5989 if ((tls_mask & (TLS_TPREL | TLS_TPRELGD)) != 0)
5990 need += 4;
5991 if ((tls_mask & TLS_DTPREL) != 0)
5992 need += 4;
5993 }
5994 return need;
5995 }
5996
5997 /* Calculate size of relocs needed for symbol given its TLS_MASK and
5998 NEEDed GOT entries. KNOWN says a TPREL offset can be calculated at
5999 link time. */
6000
6001 static inline unsigned int
6002 got_relocs_needed (int tls_mask, unsigned int need, bfd_boolean known)
6003 {
6004 /* All the entries we allocated need relocs.
6005 Except IE in executable with a local symbol. We could also omit
6006 the DTPREL reloc on the second word of a GD entry under the same
6007 condition as that for IE, but ld.so needs to differentiate
6008 LD and GD entries. */
6009 if (known && (tls_mask & TLS_TLS) != 0
6010 && (tls_mask & (TLS_TPREL | TLS_TPRELGD)) != 0)
6011 need -= 4;
6012 return need * sizeof (Elf32_External_Rela) / 4;
6013 }
6014
6015 /* If H is undefined, make it dynamic if that makes sense. */
6016
6017 static bfd_boolean
6018 ensure_undef_dynamic (struct bfd_link_info *info,
6019 struct elf_link_hash_entry *h)
6020 {
6021 struct elf_link_hash_table *htab = elf_hash_table (info);
6022
6023 if (htab->dynamic_sections_created
6024 && ((info->dynamic_undefined_weak != 0
6025 && h->root.type == bfd_link_hash_undefweak)
6026 || h->root.type == bfd_link_hash_undefined)
6027 && h->dynindx == -1
6028 && !h->forced_local
6029 && ELF_ST_VISIBILITY (h->other) == STV_DEFAULT)
6030 return bfd_elf_link_record_dynamic_symbol (info, h);
6031 return TRUE;
6032 }
6033
6034 /* Allocate space in associated reloc sections for dynamic relocs. */
6035
6036 static bfd_boolean
6037 allocate_dynrelocs (struct elf_link_hash_entry *h, void *inf)
6038 {
6039 struct bfd_link_info *info = inf;
6040 struct ppc_elf_link_hash_entry *eh;
6041 struct ppc_elf_link_hash_table *htab;
6042 struct elf_dyn_relocs *p;
6043 bfd_boolean dyn;
6044
6045 if (h->root.type == bfd_link_hash_indirect)
6046 return TRUE;
6047
6048 htab = ppc_elf_hash_table (info);
6049 eh = (struct ppc_elf_link_hash_entry *) h;
6050 if (eh->elf.got.refcount > 0
6051 || (ELIMINATE_COPY_RELOCS
6052 && !eh->elf.def_regular
6053 && eh->elf.protected_def
6054 && eh->has_addr16_ha
6055 && eh->has_addr16_lo
6056 && htab->params->pic_fixup > 0))
6057 {
6058 unsigned int need;
6059
6060 /* Make sure this symbol is output as a dynamic symbol. */
6061 if (!ensure_undef_dynamic (info, &eh->elf))
6062 return FALSE;
6063
6064 need = 0;
6065 if ((eh->tls_mask & (TLS_TLS | TLS_LD)) == (TLS_TLS | TLS_LD))
6066 {
6067 if (!eh->elf.def_dynamic)
6068 /* We'll just use htab->tlsld_got.offset. This should
6069 always be the case. It's a little odd if we have
6070 a local dynamic reloc against a non-local symbol. */
6071 htab->tlsld_got.refcount += 1;
6072 else
6073 need += 8;
6074 }
6075 need += got_entries_needed (eh->tls_mask);
6076 if (need == 0)
6077 eh->elf.got.offset = (bfd_vma) -1;
6078 else
6079 {
6080 eh->elf.got.offset = allocate_got (htab, need);
6081 if ((bfd_link_pic (info)
6082 || (htab->elf.dynamic_sections_created
6083 && eh->elf.dynindx != -1
6084 && !SYMBOL_REFERENCES_LOCAL (info, &eh->elf)))
6085 && !UNDEFWEAK_NO_DYNAMIC_RELOC (info, &eh->elf))
6086 {
6087 asection *rsec;
6088 bfd_boolean tprel_known = (bfd_link_executable (info)
6089 && SYMBOL_REFERENCES_LOCAL (info,
6090 &eh->elf));
6091
6092 need = got_relocs_needed (eh->tls_mask, need, tprel_known);
6093 if ((eh->tls_mask & (TLS_TLS | TLS_LD)) == (TLS_TLS | TLS_LD)
6094 && eh->elf.def_dynamic)
6095 need -= sizeof (Elf32_External_Rela);
6096 rsec = htab->elf.srelgot;
6097 if (eh->elf.type == STT_GNU_IFUNC)
6098 rsec = htab->elf.irelplt;
6099 rsec->size += need;
6100 }
6101 }
6102 }
6103 else
6104 eh->elf.got.offset = (bfd_vma) -1;
6105
6106 /* If no dynamic sections we can't have dynamic relocs, except for
6107 IFUNCs which are handled even in static executables. */
6108 if (!htab->elf.dynamic_sections_created
6109 && h->type != STT_GNU_IFUNC)
6110 eh->dyn_relocs = NULL;
6111
6112 /* Discard relocs on undefined symbols that must be local. */
6113 else if (h->root.type == bfd_link_hash_undefined
6114 && ELF_ST_VISIBILITY (h->other) != STV_DEFAULT)
6115 eh->dyn_relocs = NULL;
6116
6117 /* Also discard relocs on undefined weak syms with non-default
6118 visibility, or when dynamic_undefined_weak says so. */
6119 else if (UNDEFWEAK_NO_DYNAMIC_RELOC (info, h))
6120 eh->dyn_relocs = NULL;
6121
6122 if (eh->dyn_relocs == NULL)
6123 ;
6124
6125 /* In the shared -Bsymbolic case, discard space allocated for
6126 dynamic pc-relative relocs against symbols which turn out to be
6127 defined in regular objects. For the normal shared case, discard
6128 space for relocs that have become local due to symbol visibility
6129 changes. */
6130 else if (bfd_link_pic (info))
6131 {
6132 /* Relocs that use pc_count are those that appear on a call insn,
6133 or certain REL relocs (see must_be_dyn_reloc) that can be
6134 generated via assembly. We want calls to protected symbols to
6135 resolve directly to the function rather than going via the plt.
6136 If people want function pointer comparisons to work as expected
6137 then they should avoid writing weird assembly. */
6138 if (SYMBOL_CALLS_LOCAL (info, h))
6139 {
6140 struct elf_dyn_relocs **pp;
6141
6142 for (pp = &eh->dyn_relocs; (p = *pp) != NULL; )
6143 {
6144 p->count -= p->pc_count;
6145 p->pc_count = 0;
6146 if (p->count == 0)
6147 *pp = p->next;
6148 else
6149 pp = &p->next;
6150 }
6151 }
6152
6153 if (htab->is_vxworks)
6154 {
6155 struct elf_dyn_relocs **pp;
6156
6157 for (pp = &eh->dyn_relocs; (p = *pp) != NULL; )
6158 {
6159 if (strcmp (p->sec->output_section->name, ".tls_vars") == 0)
6160 *pp = p->next;
6161 else
6162 pp = &p->next;
6163 }
6164 }
6165
6166 if (eh->dyn_relocs != NULL)
6167 {
6168 /* Make sure this symbol is output as a dynamic symbol. */
6169 if (!ensure_undef_dynamic (info, h))
6170 return FALSE;
6171 }
6172 }
6173 else if (ELIMINATE_COPY_RELOCS)
6174 {
6175 /* For the non-pic case, discard space for relocs against
6176 symbols which turn out to need copy relocs or are not
6177 dynamic. */
6178 if (h->dynamic_adjusted
6179 && !h->def_regular
6180 && !ELF_COMMON_DEF_P (h)
6181 && !(h->protected_def
6182 && eh->has_addr16_ha
6183 && eh->has_addr16_lo
6184 && htab->params->pic_fixup > 0))
6185 {
6186 /* Make sure this symbol is output as a dynamic symbol. */
6187 if (!ensure_undef_dynamic (info, h))
6188 return FALSE;
6189
6190 if (h->dynindx == -1)
6191 eh->dyn_relocs = NULL;
6192 }
6193 else
6194 eh->dyn_relocs = NULL;
6195 }
6196
6197 /* Allocate space. */
6198 for (p = eh->dyn_relocs; p != NULL; p = p->next)
6199 {
6200 asection *sreloc = elf_section_data (p->sec)->sreloc;
6201 if (eh->elf.type == STT_GNU_IFUNC)
6202 sreloc = htab->elf.irelplt;
6203 sreloc->size += p->count * sizeof (Elf32_External_Rela);
6204 }
6205
6206 /* Handle PLT relocs. Done last, after dynindx has settled.
6207 We might need a PLT entry when the symbol
6208 a) is dynamic, or
6209 b) is an ifunc, or
6210 c) has plt16 relocs and has been processed by adjust_dynamic_symbol, or
6211 d) has plt16 relocs and we are linking statically. */
6212 dyn = htab->elf.dynamic_sections_created && h->dynindx != -1;
6213 if (dyn
6214 || h->type == STT_GNU_IFUNC
6215 || (h->needs_plt && h->dynamic_adjusted)
6216 || (h->needs_plt
6217 && h->def_regular
6218 && !htab->elf.dynamic_sections_created
6219 && (ppc_elf_hash_entry (h)->tls_mask
6220 & (TLS_TLS | PLT_KEEP)) == PLT_KEEP))
6221 {
6222 struct plt_entry *ent;
6223 bfd_boolean doneone = FALSE;
6224 bfd_vma plt_offset = 0, glink_offset = (bfd_vma) -1;
6225
6226 for (ent = h->plt.plist; ent != NULL; ent = ent->next)
6227 if (ent->plt.refcount > 0)
6228 {
6229 asection *s = htab->elf.splt;
6230
6231 if (!dyn)
6232 {
6233 if (h->type == STT_GNU_IFUNC)
6234 s = htab->elf.iplt;
6235 else
6236 s = htab->pltlocal;
6237 }
6238
6239 if (htab->plt_type == PLT_NEW || !dyn)
6240 {
6241 if (!doneone)
6242 {
6243 plt_offset = s->size;
6244 s->size += 4;
6245 }
6246 ent->plt.offset = plt_offset;
6247
6248 if (s == htab->pltlocal)
6249 ent->glink_offset = glink_offset;
6250 else
6251 {
6252 s = htab->glink;
6253 if (!doneone || bfd_link_pic (info))
6254 {
6255 glink_offset = s->size;
6256 s->size += GLINK_ENTRY_SIZE (htab, h);
6257 }
6258 if (!doneone
6259 && !bfd_link_pic (info)
6260 && h->def_dynamic
6261 && !h->def_regular)
6262 {
6263 h->root.u.def.section = s;
6264 h->root.u.def.value = glink_offset;
6265 }
6266 ent->glink_offset = glink_offset;
6267
6268 if (htab->params->emit_stub_syms
6269 && !add_stub_sym (ent, h, info))
6270 return FALSE;
6271 }
6272 }
6273 else
6274 {
6275 if (!doneone)
6276 {
6277 /* If this is the first .plt entry, make room
6278 for the special first entry. */
6279 if (s->size == 0)
6280 s->size += htab->plt_initial_entry_size;
6281
6282 /* The PowerPC PLT is actually composed of two
6283 parts, the first part is 2 words (for a load
6284 and a jump), and then there is a remaining
6285 word available at the end. */
6286 plt_offset = (htab->plt_initial_entry_size
6287 + (htab->plt_slot_size
6288 * ((s->size
6289 - htab->plt_initial_entry_size)
6290 / htab->plt_entry_size)));
6291
6292 /* If this symbol is not defined in a regular
6293 file, and we are not generating a shared
6294 library, then set the symbol to this location
6295 in the .plt. This is to avoid text
6296 relocations, and is required to make
6297 function pointers compare as equal between
6298 the normal executable and the shared library. */
6299 if (! bfd_link_pic (info)
6300 && h->def_dynamic
6301 && !h->def_regular)
6302 {
6303 h->root.u.def.section = s;
6304 h->root.u.def.value = plt_offset;
6305 }
6306
6307 /* Make room for this entry. */
6308 s->size += htab->plt_entry_size;
6309 /* After the 8192nd entry, room for two entries
6310 is allocated. */
6311 if (htab->plt_type == PLT_OLD
6312 && (s->size - htab->plt_initial_entry_size)
6313 / htab->plt_entry_size
6314 > PLT_NUM_SINGLE_ENTRIES)
6315 s->size += htab->plt_entry_size;
6316 }
6317 ent->plt.offset = plt_offset;
6318 }
6319
6320 /* We also need to make an entry in the .rela.plt section. */
6321 if (!doneone)
6322 {
6323 if (!dyn)
6324 {
6325 if (h->type == STT_GNU_IFUNC)
6326 {
6327 s = htab->elf.irelplt;
6328 s->size += sizeof (Elf32_External_Rela);
6329 }
6330 else if (bfd_link_pic (info))
6331 {
6332 s = htab->relpltlocal;
6333 s->size += sizeof (Elf32_External_Rela);
6334 }
6335 }
6336 else
6337 {
6338 htab->elf.srelplt->size += sizeof (Elf32_External_Rela);
6339
6340 if (htab->plt_type == PLT_VXWORKS)
6341 {
6342 /* Allocate space for the unloaded relocations. */
6343 if (!bfd_link_pic (info)
6344 && htab->elf.dynamic_sections_created)
6345 {
6346 if (ent->plt.offset
6347 == (bfd_vma) htab->plt_initial_entry_size)
6348 {
6349 htab->srelplt2->size
6350 += (sizeof (Elf32_External_Rela)
6351 * VXWORKS_PLTRESOLVE_RELOCS);
6352 }
6353
6354 htab->srelplt2->size
6355 += (sizeof (Elf32_External_Rela)
6356 * VXWORKS_PLT_NON_JMP_SLOT_RELOCS);
6357 }
6358
6359 /* Every PLT entry has an associated GOT entry in
6360 .got.plt. */
6361 htab->elf.sgotplt->size += 4;
6362 }
6363 }
6364 doneone = TRUE;
6365 }
6366 }
6367 else
6368 ent->plt.offset = (bfd_vma) -1;
6369
6370 if (!doneone)
6371 {
6372 h->plt.plist = NULL;
6373 h->needs_plt = 0;
6374 }
6375 }
6376 else
6377 {
6378 h->plt.plist = NULL;
6379 h->needs_plt = 0;
6380 }
6381
6382 return TRUE;
6383 }
6384
6385 /* Set DF_TEXTREL if we find any dynamic relocs that apply to
6386 read-only sections. */
6387
6388 static bfd_boolean
6389 maybe_set_textrel (struct elf_link_hash_entry *h, void *info_p)
6390 {
6391 asection *sec;
6392
6393 if (h->root.type == bfd_link_hash_indirect)
6394 return TRUE;
6395
6396 sec = readonly_dynrelocs (h);
6397 if (sec != NULL)
6398 {
6399 struct bfd_link_info *info = (struct bfd_link_info *) info_p;
6400
6401 info->flags |= DF_TEXTREL;
6402 info->callbacks->minfo
6403 (_("%pB: dynamic relocation against `%pT' in read-only section `%pA'\n"),
6404 sec->owner, h->root.root.string, sec);
6405
6406 /* Not an error, just cut short the traversal. */
6407 return FALSE;
6408 }
6409 return TRUE;
6410 }
6411
6412 static const unsigned char glink_eh_frame_cie[] =
6413 {
6414 0, 0, 0, 16, /* length. */
6415 0, 0, 0, 0, /* id. */
6416 1, /* CIE version. */
6417 'z', 'R', 0, /* Augmentation string. */
6418 4, /* Code alignment. */
6419 0x7c, /* Data alignment. */
6420 65, /* RA reg. */
6421 1, /* Augmentation size. */
6422 DW_EH_PE_pcrel | DW_EH_PE_sdata4, /* FDE encoding. */
6423 DW_CFA_def_cfa, 1, 0 /* def_cfa: r1 offset 0. */
6424 };
6425
6426 /* Set the sizes of the dynamic sections. */
6427
6428 static bfd_boolean
6429 ppc_elf_size_dynamic_sections (bfd *output_bfd,
6430 struct bfd_link_info *info)
6431 {
6432 struct ppc_elf_link_hash_table *htab;
6433 asection *s;
6434 bfd_boolean relocs;
6435 bfd *ibfd;
6436
6437 #ifdef DEBUG
6438 fprintf (stderr, "ppc_elf_size_dynamic_sections called\n");
6439 #endif
6440
6441 htab = ppc_elf_hash_table (info);
6442 BFD_ASSERT (htab->elf.dynobj != NULL);
6443
6444 if (elf_hash_table (info)->dynamic_sections_created)
6445 {
6446 /* Set the contents of the .interp section to the interpreter. */
6447 if (bfd_link_executable (info) && !info->nointerp)
6448 {
6449 s = bfd_get_linker_section (htab->elf.dynobj, ".interp");
6450 BFD_ASSERT (s != NULL);
6451 s->size = sizeof ELF_DYNAMIC_INTERPRETER;
6452 s->contents = (unsigned char *) ELF_DYNAMIC_INTERPRETER;
6453 }
6454 }
6455
6456 if (htab->plt_type == PLT_OLD)
6457 htab->got_header_size = 16;
6458 else if (htab->plt_type == PLT_NEW)
6459 htab->got_header_size = 12;
6460
6461 /* Set up .got offsets for local syms, and space for local dynamic
6462 relocs. */
6463 for (ibfd = info->input_bfds; ibfd != NULL; ibfd = ibfd->link.next)
6464 {
6465 bfd_signed_vma *local_got;
6466 bfd_signed_vma *end_local_got;
6467 struct plt_entry **local_plt;
6468 struct plt_entry **end_local_plt;
6469 char *lgot_masks;
6470 bfd_size_type locsymcount;
6471 Elf_Internal_Shdr *symtab_hdr;
6472
6473 if (!is_ppc_elf (ibfd))
6474 continue;
6475
6476 for (s = ibfd->sections; s != NULL; s = s->next)
6477 {
6478 struct ppc_dyn_relocs *p;
6479
6480 for (p = ((struct ppc_dyn_relocs *)
6481 elf_section_data (s)->local_dynrel);
6482 p != NULL;
6483 p = p->next)
6484 {
6485 if (!bfd_is_abs_section (p->sec)
6486 && bfd_is_abs_section (p->sec->output_section))
6487 {
6488 /* Input section has been discarded, either because
6489 it is a copy of a linkonce section or due to
6490 linker script /DISCARD/, so we'll be discarding
6491 the relocs too. */
6492 }
6493 else if (htab->is_vxworks
6494 && strcmp (p->sec->output_section->name,
6495 ".tls_vars") == 0)
6496 {
6497 /* Relocations in vxworks .tls_vars sections are
6498 handled specially by the loader. */
6499 }
6500 else if (p->count != 0)
6501 {
6502 asection *sreloc = elf_section_data (p->sec)->sreloc;
6503 if (p->ifunc)
6504 sreloc = htab->elf.irelplt;
6505 sreloc->size += p->count * sizeof (Elf32_External_Rela);
6506 if ((p->sec->output_section->flags
6507 & (SEC_READONLY | SEC_ALLOC))
6508 == (SEC_READONLY | SEC_ALLOC))
6509 {
6510 info->flags |= DF_TEXTREL;
6511 info->callbacks->minfo (_("%pB: dynamic relocation in read-only section `%pA'\n"),
6512 p->sec->owner, p->sec);
6513 }
6514 }
6515 }
6516 }
6517
6518 local_got = elf_local_got_refcounts (ibfd);
6519 if (!local_got)
6520 continue;
6521
6522 symtab_hdr = &elf_symtab_hdr (ibfd);
6523 locsymcount = symtab_hdr->sh_info;
6524 end_local_got = local_got + locsymcount;
6525 local_plt = (struct plt_entry **) end_local_got;
6526 end_local_plt = local_plt + locsymcount;
6527 lgot_masks = (char *) end_local_plt;
6528
6529 for (; local_got < end_local_got; ++local_got, ++lgot_masks)
6530 if (*local_got > 0)
6531 {
6532 unsigned int need;
6533 if ((*lgot_masks & (TLS_TLS | TLS_LD)) == (TLS_TLS | TLS_LD))
6534 htab->tlsld_got.refcount += 1;
6535 need = got_entries_needed (*lgot_masks);
6536 if (need == 0)
6537 *local_got = (bfd_vma) -1;
6538 else
6539 {
6540 *local_got = allocate_got (htab, need);
6541 if (bfd_link_pic (info))
6542 {
6543 asection *srel;
6544 bfd_boolean tprel_known = bfd_link_executable (info);
6545
6546 need = got_relocs_needed (*lgot_masks, need, tprel_known);
6547 srel = htab->elf.srelgot;
6548 if ((*lgot_masks & (TLS_TLS | PLT_IFUNC)) == PLT_IFUNC)
6549 srel = htab->elf.irelplt;
6550 srel->size += need;
6551 }
6552 }
6553 }
6554 else
6555 *local_got = (bfd_vma) -1;
6556
6557 if (htab->is_vxworks)
6558 continue;
6559
6560 /* Allocate space for calls to local STT_GNU_IFUNC syms in .iplt. */
6561 lgot_masks = (char *) end_local_plt;
6562 for (; local_plt < end_local_plt; ++local_plt, ++lgot_masks)
6563 {
6564 struct plt_entry *ent;
6565 bfd_boolean doneone = FALSE;
6566 bfd_vma plt_offset = 0, glink_offset = (bfd_vma) -1;
6567
6568 for (ent = *local_plt; ent != NULL; ent = ent->next)
6569 if (ent->plt.refcount > 0)
6570 {
6571 if ((*lgot_masks & (TLS_TLS | PLT_IFUNC)) == PLT_IFUNC)
6572 s = htab->elf.iplt;
6573 else if ((*lgot_masks & (TLS_TLS | PLT_KEEP)) != PLT_KEEP)
6574 {
6575 ent->plt.offset = (bfd_vma) -1;
6576 continue;
6577 }
6578 else
6579 s = htab->pltlocal;
6580
6581 if (!doneone)
6582 {
6583 plt_offset = s->size;
6584 s->size += 4;
6585 }
6586 ent->plt.offset = plt_offset;
6587
6588 if (s != htab->pltlocal && (!doneone || bfd_link_pic (info)))
6589 {
6590 s = htab->glink;
6591 glink_offset = s->size;
6592 s->size += GLINK_ENTRY_SIZE (htab, NULL);
6593 }
6594 ent->glink_offset = glink_offset;
6595
6596 if (!doneone)
6597 {
6598 if ((*lgot_masks & (TLS_TLS | PLT_IFUNC)) == PLT_IFUNC)
6599 {
6600 s = htab->elf.irelplt;
6601 s->size += sizeof (Elf32_External_Rela);
6602 }
6603 else if (bfd_link_pic (info))
6604 {
6605 s = htab->relpltlocal;
6606 s->size += sizeof (Elf32_External_Rela);
6607 }
6608 doneone = TRUE;
6609 }
6610 }
6611 else
6612 ent->plt.offset = (bfd_vma) -1;
6613 }
6614 }
6615
6616 /* Allocate space for global sym dynamic relocs. */
6617 elf_link_hash_traverse (elf_hash_table (info), allocate_dynrelocs, info);
6618
6619 if (htab->tlsld_got.refcount > 0)
6620 {
6621 htab->tlsld_got.offset = allocate_got (htab, 8);
6622 if (bfd_link_pic (info))
6623 htab->elf.srelgot->size += sizeof (Elf32_External_Rela);
6624 }
6625 else
6626 htab->tlsld_got.offset = (bfd_vma) -1;
6627
6628 if (htab->elf.sgot != NULL && htab->plt_type != PLT_VXWORKS)
6629 {
6630 unsigned int g_o_t = 32768;
6631
6632 /* If we haven't allocated the header, do so now. When we get here,
6633 for old plt/got the got size will be 0 to 32764 (not allocated),
6634 or 32780 to 65536 (header allocated). For new plt/got, the
6635 corresponding ranges are 0 to 32768 and 32780 to 65536. */
6636 if (htab->elf.sgot->size <= 32768)
6637 {
6638 g_o_t = htab->elf.sgot->size;
6639 if (htab->plt_type == PLT_OLD)
6640 g_o_t += 4;
6641 htab->elf.sgot->size += htab->got_header_size;
6642 }
6643
6644 htab->elf.hgot->root.u.def.value = g_o_t;
6645 }
6646 if (bfd_link_pic (info))
6647 {
6648 struct elf_link_hash_entry *sda = htab->sdata[0].sym;
6649
6650 sda->root.u.def.section = htab->elf.hgot->root.u.def.section;
6651 sda->root.u.def.value = htab->elf.hgot->root.u.def.value;
6652 }
6653 if (info->emitrelocations)
6654 {
6655 struct elf_link_hash_entry *sda = htab->sdata[0].sym;
6656
6657 if (sda != NULL && sda->ref_regular)
6658 sda->root.u.def.section->flags |= SEC_KEEP;
6659 sda = htab->sdata[1].sym;
6660 if (sda != NULL && sda->ref_regular)
6661 sda->root.u.def.section->flags |= SEC_KEEP;
6662 }
6663
6664 if (htab->glink != NULL
6665 && htab->glink->size != 0
6666 && htab->elf.dynamic_sections_created)
6667 {
6668 htab->glink_pltresolve = htab->glink->size;
6669 /* Space for the branch table. */
6670 htab->glink->size
6671 += htab->elf.srelplt->size / (sizeof (Elf32_External_Rela) / 4) - 4;
6672 /* Pad out to align the start of PLTresolve. */
6673 htab->glink->size += -htab->glink->size & (htab->params->ppc476_workaround
6674 ? 63 : 15);
6675 htab->glink->size += GLINK_PLTRESOLVE;
6676
6677 if (htab->params->emit_stub_syms)
6678 {
6679 struct elf_link_hash_entry *sh;
6680 sh = elf_link_hash_lookup (&htab->elf, "__glink",
6681 TRUE, FALSE, FALSE);
6682 if (sh == NULL)
6683 return FALSE;
6684 if (sh->root.type == bfd_link_hash_new)
6685 {
6686 sh->root.type = bfd_link_hash_defined;
6687 sh->root.u.def.section = htab->glink;
6688 sh->root.u.def.value = htab->glink_pltresolve;
6689 sh->ref_regular = 1;
6690 sh->def_regular = 1;
6691 sh->ref_regular_nonweak = 1;
6692 sh->forced_local = 1;
6693 sh->non_elf = 0;
6694 sh->root.linker_def = 1;
6695 }
6696 sh = elf_link_hash_lookup (&htab->elf, "__glink_PLTresolve",
6697 TRUE, FALSE, FALSE);
6698 if (sh == NULL)
6699 return FALSE;
6700 if (sh->root.type == bfd_link_hash_new)
6701 {
6702 sh->root.type = bfd_link_hash_defined;
6703 sh->root.u.def.section = htab->glink;
6704 sh->root.u.def.value = htab->glink->size - GLINK_PLTRESOLVE;
6705 sh->ref_regular = 1;
6706 sh->def_regular = 1;
6707 sh->ref_regular_nonweak = 1;
6708 sh->forced_local = 1;
6709 sh->non_elf = 0;
6710 sh->root.linker_def = 1;
6711 }
6712 }
6713 }
6714
6715 if (htab->glink != NULL
6716 && htab->glink->size != 0
6717 && htab->glink_eh_frame != NULL
6718 && !bfd_is_abs_section (htab->glink_eh_frame->output_section)
6719 && _bfd_elf_eh_frame_present (info))
6720 {
6721 s = htab->glink_eh_frame;
6722 s->size = sizeof (glink_eh_frame_cie) + 20;
6723 if (bfd_link_pic (info))
6724 {
6725 s->size += 4;
6726 if (htab->glink->size - GLINK_PLTRESOLVE + 8 >= 256)
6727 s->size += 4;
6728 }
6729 }
6730
6731 /* We've now determined the sizes of the various dynamic sections.
6732 Allocate memory for them. */
6733 relocs = FALSE;
6734 for (s = htab->elf.dynobj->sections; s != NULL; s = s->next)
6735 {
6736 bfd_boolean strip_section = TRUE;
6737
6738 if ((s->flags & SEC_LINKER_CREATED) == 0)
6739 continue;
6740
6741 if (s == htab->elf.splt
6742 || s == htab->elf.sgot)
6743 {
6744 /* We'd like to strip these sections if they aren't needed, but if
6745 we've exported dynamic symbols from them we must leave them.
6746 It's too late to tell BFD to get rid of the symbols. */
6747 if (htab->elf.hplt != NULL)
6748 strip_section = FALSE;
6749 /* Strip this section if we don't need it; see the
6750 comment below. */
6751 }
6752 else if (s == htab->elf.iplt
6753 || s == htab->pltlocal
6754 || s == htab->glink
6755 || s == htab->glink_eh_frame
6756 || s == htab->elf.sgotplt
6757 || s == htab->sbss
6758 || s == htab->elf.sdynbss
6759 || s == htab->elf.sdynrelro
6760 || s == htab->dynsbss)
6761 {
6762 /* Strip these too. */
6763 }
6764 else if (s == htab->sdata[0].section
6765 || s == htab->sdata[1].section)
6766 {
6767 strip_section = (s->flags & SEC_KEEP) == 0;
6768 }
6769 else if (CONST_STRNEQ (bfd_get_section_name (htab->elf.dynobj, s),
6770 ".rela"))
6771 {
6772 if (s->size != 0)
6773 {
6774 /* Remember whether there are any relocation sections. */
6775 relocs = TRUE;
6776
6777 /* We use the reloc_count field as a counter if we need
6778 to copy relocs into the output file. */
6779 s->reloc_count = 0;
6780 }
6781 }
6782 else
6783 {
6784 /* It's not one of our sections, so don't allocate space. */
6785 continue;
6786 }
6787
6788 if (s->size == 0 && strip_section)
6789 {
6790 /* If we don't need this section, strip it from the
6791 output file. This is mostly to handle .rela.bss and
6792 .rela.plt. We must create both sections in
6793 create_dynamic_sections, because they must be created
6794 before the linker maps input sections to output
6795 sections. The linker does that before
6796 adjust_dynamic_symbol is called, and it is that
6797 function which decides whether anything needs to go
6798 into these sections. */
6799 s->flags |= SEC_EXCLUDE;
6800 continue;
6801 }
6802
6803 if ((s->flags & SEC_HAS_CONTENTS) == 0)
6804 continue;
6805
6806 /* Allocate memory for the section contents. */
6807 s->contents = bfd_zalloc (htab->elf.dynobj, s->size);
6808 if (s->contents == NULL)
6809 return FALSE;
6810 }
6811
6812 if (htab->elf.dynamic_sections_created)
6813 {
6814 /* Add some entries to the .dynamic section. We fill in the
6815 values later, in ppc_elf_finish_dynamic_sections, but we
6816 must add the entries now so that we get the correct size for
6817 the .dynamic section. The DT_DEBUG entry is filled in by the
6818 dynamic linker and used by the debugger. */
6819 #define add_dynamic_entry(TAG, VAL) \
6820 _bfd_elf_add_dynamic_entry (info, TAG, VAL)
6821
6822 if (bfd_link_executable (info))
6823 {
6824 if (!add_dynamic_entry (DT_DEBUG, 0))
6825 return FALSE;
6826 }
6827
6828 if (htab->elf.splt != NULL && htab->elf.splt->size != 0)
6829 {
6830 if (!add_dynamic_entry (DT_PLTGOT, 0)
6831 || !add_dynamic_entry (DT_PLTRELSZ, 0)
6832 || !add_dynamic_entry (DT_PLTREL, DT_RELA)
6833 || !add_dynamic_entry (DT_JMPREL, 0))
6834 return FALSE;
6835 }
6836
6837 if (htab->plt_type == PLT_NEW
6838 && htab->glink != NULL
6839 && htab->glink->size != 0)
6840 {
6841 if (!add_dynamic_entry (DT_PPC_GOT, 0))
6842 return FALSE;
6843 if (!htab->params->no_tls_get_addr_opt
6844 && htab->tls_get_addr != NULL
6845 && htab->tls_get_addr->plt.plist != NULL
6846 && !add_dynamic_entry (DT_PPC_OPT, PPC_OPT_TLS))
6847 return FALSE;
6848 }
6849
6850 if (relocs)
6851 {
6852 if (!add_dynamic_entry (DT_RELA, 0)
6853 || !add_dynamic_entry (DT_RELASZ, 0)
6854 || !add_dynamic_entry (DT_RELAENT, sizeof (Elf32_External_Rela)))
6855 return FALSE;
6856 }
6857
6858 /* If any dynamic relocs apply to a read-only section, then we
6859 need a DT_TEXTREL entry. */
6860 if ((info->flags & DF_TEXTREL) == 0)
6861 elf_link_hash_traverse (elf_hash_table (info), maybe_set_textrel,
6862 info);
6863
6864 if ((info->flags & DF_TEXTREL) != 0)
6865 {
6866 if (!add_dynamic_entry (DT_TEXTREL, 0))
6867 return FALSE;
6868 }
6869 if (htab->is_vxworks
6870 && !elf_vxworks_add_dynamic_entries (output_bfd, info))
6871 return FALSE;
6872 }
6873 #undef add_dynamic_entry
6874
6875 if (htab->glink_eh_frame != NULL
6876 && htab->glink_eh_frame->contents != NULL)
6877 {
6878 unsigned char *p = htab->glink_eh_frame->contents;
6879 bfd_vma val;
6880
6881 memcpy (p, glink_eh_frame_cie, sizeof (glink_eh_frame_cie));
6882 /* CIE length (rewrite in case little-endian). */
6883 bfd_put_32 (htab->elf.dynobj, sizeof (glink_eh_frame_cie) - 4, p);
6884 p += sizeof (glink_eh_frame_cie);
6885 /* FDE length. */
6886 val = htab->glink_eh_frame->size - 4 - sizeof (glink_eh_frame_cie);
6887 bfd_put_32 (htab->elf.dynobj, val, p);
6888 p += 4;
6889 /* CIE pointer. */
6890 val = p - htab->glink_eh_frame->contents;
6891 bfd_put_32 (htab->elf.dynobj, val, p);
6892 p += 4;
6893 /* Offset to .glink. Set later. */
6894 p += 4;
6895 /* .glink size. */
6896 bfd_put_32 (htab->elf.dynobj, htab->glink->size, p);
6897 p += 4;
6898 /* Augmentation. */
6899 p += 1;
6900
6901 if (bfd_link_pic (info)
6902 && htab->elf.dynamic_sections_created)
6903 {
6904 bfd_vma adv = (htab->glink->size - GLINK_PLTRESOLVE + 8) >> 2;
6905 if (adv < 64)
6906 *p++ = DW_CFA_advance_loc + adv;
6907 else if (adv < 256)
6908 {
6909 *p++ = DW_CFA_advance_loc1;
6910 *p++ = adv;
6911 }
6912 else if (adv < 65536)
6913 {
6914 *p++ = DW_CFA_advance_loc2;
6915 bfd_put_16 (htab->elf.dynobj, adv, p);
6916 p += 2;
6917 }
6918 else
6919 {
6920 *p++ = DW_CFA_advance_loc4;
6921 bfd_put_32 (htab->elf.dynobj, adv, p);
6922 p += 4;
6923 }
6924 *p++ = DW_CFA_register;
6925 *p++ = 65;
6926 p++;
6927 *p++ = DW_CFA_advance_loc + 4;
6928 *p++ = DW_CFA_restore_extended;
6929 *p++ = 65;
6930 }
6931 BFD_ASSERT ((bfd_vma) ((p + 3 - htab->glink_eh_frame->contents) & -4)
6932 == htab->glink_eh_frame->size);
6933 }
6934
6935 return TRUE;
6936 }
6937
6938 /* Arrange to have _SDA_BASE_ or _SDA2_BASE_ stripped from the output
6939 if it looks like nothing is using them. */
6940
6941 static void
6942 maybe_strip_sdasym (bfd *output_bfd, elf_linker_section_t *lsect)
6943 {
6944 struct elf_link_hash_entry *sda = lsect->sym;
6945
6946 if (sda != NULL && !sda->ref_regular && sda->dynindx == -1)
6947 {
6948 asection *s;
6949
6950 s = bfd_get_section_by_name (output_bfd, lsect->name);
6951 if (s == NULL || bfd_section_removed_from_list (output_bfd, s))
6952 {
6953 s = bfd_get_section_by_name (output_bfd, lsect->bss_name);
6954 if (s == NULL || bfd_section_removed_from_list (output_bfd, s))
6955 {
6956 sda->def_regular = 0;
6957 /* This is somewhat magic. See elf_link_output_extsym. */
6958 sda->ref_dynamic = 1;
6959 sda->forced_local = 0;
6960 }
6961 }
6962 }
6963 }
6964
6965 void
6966 ppc_elf_maybe_strip_sdata_syms (struct bfd_link_info *info)
6967 {
6968 struct ppc_elf_link_hash_table *htab = ppc_elf_hash_table (info);
6969
6970 if (htab != NULL)
6971 {
6972 maybe_strip_sdasym (info->output_bfd, &htab->sdata[0]);
6973 maybe_strip_sdasym (info->output_bfd, &htab->sdata[1]);
6974 }
6975 }
6976
6977
6978 /* Return TRUE if symbol should be hashed in the `.gnu.hash' section. */
6979
6980 static bfd_boolean
6981 ppc_elf_hash_symbol (struct elf_link_hash_entry *h)
6982 {
6983 if (h->plt.plist != NULL
6984 && !h->def_regular
6985 && (!h->pointer_equality_needed
6986 || !h->ref_regular_nonweak))
6987 return FALSE;
6988
6989 return _bfd_elf_hash_symbol (h);
6990 }
6991 \f
6992 #define ARRAY_SIZE(a) (sizeof (a) / sizeof ((a)[0]))
6993
6994 /* Relaxation trampolines. r12 is available for clobbering (r11, is
6995 used for some functions that are allowed to break the ABI). */
6996 static const int shared_stub_entry[] =
6997 {
6998 0x7c0802a6, /* mflr 0 */
6999 0x429f0005, /* bcl 20, 31, .Lxxx */
7000 0x7d8802a6, /* mflr 12 */
7001 0x3d8c0000, /* addis 12, 12, (xxx-.Lxxx)@ha */
7002 0x398c0000, /* addi 12, 12, (xxx-.Lxxx)@l */
7003 0x7c0803a6, /* mtlr 0 */
7004 0x7d8903a6, /* mtctr 12 */
7005 0x4e800420, /* bctr */
7006 };
7007
7008 static const int stub_entry[] =
7009 {
7010 0x3d800000, /* lis 12,xxx@ha */
7011 0x398c0000, /* addi 12,12,xxx@l */
7012 0x7d8903a6, /* mtctr 12 */
7013 0x4e800420, /* bctr */
7014 };
7015
7016 struct ppc_elf_relax_info
7017 {
7018 unsigned int workaround_size;
7019 unsigned int picfixup_size;
7020 };
7021
7022 /* This function implements long branch trampolines, and the ppc476
7023 icache bug workaround. Any section needing trampolines or patch
7024 space for the workaround has its size extended so that we can
7025 add trampolines at the end of the section. */
7026
7027 static bfd_boolean
7028 ppc_elf_relax_section (bfd *abfd,
7029 asection *isec,
7030 struct bfd_link_info *link_info,
7031 bfd_boolean *again)
7032 {
7033 struct one_branch_fixup
7034 {
7035 struct one_branch_fixup *next;
7036 asection *tsec;
7037 /* Final link, can use the symbol offset. For a
7038 relocatable link we use the symbol's index. */
7039 bfd_vma toff;
7040 bfd_vma trampoff;
7041 };
7042
7043 Elf_Internal_Shdr *symtab_hdr;
7044 bfd_byte *contents = NULL;
7045 Elf_Internal_Sym *isymbuf = NULL;
7046 Elf_Internal_Rela *internal_relocs = NULL;
7047 Elf_Internal_Rela *irel, *irelend = NULL;
7048 struct one_branch_fixup *branch_fixups = NULL;
7049 struct ppc_elf_relax_info *relax_info = NULL;
7050 unsigned changes = 0;
7051 bfd_boolean workaround_change;
7052 struct ppc_elf_link_hash_table *htab;
7053 bfd_size_type trampbase, trampoff, newsize, picfixup_size;
7054 asection *got2;
7055 bfd_boolean maybe_pasted;
7056
7057 *again = FALSE;
7058
7059 /* No need to do anything with non-alloc or non-code sections. */
7060 if ((isec->flags & SEC_ALLOC) == 0
7061 || (isec->flags & SEC_CODE) == 0
7062 || (isec->flags & SEC_LINKER_CREATED) != 0
7063 || isec->size < 4)
7064 return TRUE;
7065
7066 /* We cannot represent the required PIC relocs in the output, so don't
7067 do anything. The linker doesn't support mixing -shared and -r
7068 anyway. */
7069 if (bfd_link_relocatable (link_info) && bfd_link_pic (link_info))
7070 return TRUE;
7071
7072 htab = ppc_elf_hash_table (link_info);
7073 if (htab == NULL)
7074 return TRUE;
7075
7076 isec->size = (isec->size + 3) & -4;
7077 if (isec->rawsize == 0)
7078 isec->rawsize = isec->size;
7079 trampbase = isec->size;
7080
7081 BFD_ASSERT (isec->sec_info_type == SEC_INFO_TYPE_NONE
7082 || isec->sec_info_type == SEC_INFO_TYPE_TARGET);
7083 isec->sec_info_type = SEC_INFO_TYPE_TARGET;
7084
7085 if (htab->params->ppc476_workaround
7086 || htab->params->pic_fixup > 0)
7087 {
7088 if (elf_section_data (isec)->sec_info == NULL)
7089 {
7090 elf_section_data (isec)->sec_info
7091 = bfd_zalloc (abfd, sizeof (struct ppc_elf_relax_info));
7092 if (elf_section_data (isec)->sec_info == NULL)
7093 return FALSE;
7094 }
7095 relax_info = elf_section_data (isec)->sec_info;
7096 trampbase -= relax_info->workaround_size;
7097 }
7098
7099 maybe_pasted = (strcmp (isec->output_section->name, ".init") == 0
7100 || strcmp (isec->output_section->name, ".fini") == 0);
7101 /* Space for a branch around any trampolines. */
7102 trampoff = trampbase;
7103 if (maybe_pasted && trampbase == isec->rawsize)
7104 trampoff += 4;
7105
7106 symtab_hdr = &elf_symtab_hdr (abfd);
7107 picfixup_size = 0;
7108 if (htab->params->branch_trampolines
7109 || htab->params->pic_fixup > 0)
7110 {
7111 /* Get a copy of the native relocations. */
7112 if (isec->reloc_count != 0)
7113 {
7114 internal_relocs = _bfd_elf_link_read_relocs (abfd, isec, NULL, NULL,
7115 link_info->keep_memory);
7116 if (internal_relocs == NULL)
7117 goto error_return;
7118 }
7119
7120 got2 = bfd_get_section_by_name (abfd, ".got2");
7121
7122 irelend = internal_relocs + isec->reloc_count;
7123 for (irel = internal_relocs; irel < irelend; irel++)
7124 {
7125 unsigned long r_type = ELF32_R_TYPE (irel->r_info);
7126 bfd_vma toff, roff;
7127 asection *tsec;
7128 struct one_branch_fixup *f;
7129 size_t insn_offset = 0;
7130 bfd_vma max_branch_offset = 0, val;
7131 bfd_byte *hit_addr;
7132 unsigned long t0;
7133 struct elf_link_hash_entry *h;
7134 Elf_Internal_Sym *isym;
7135 struct plt_entry **plist;
7136 unsigned char sym_type;
7137
7138 switch (r_type)
7139 {
7140 case R_PPC_REL24:
7141 case R_PPC_LOCAL24PC:
7142 case R_PPC_PLTREL24:
7143 case R_PPC_PLTCALL:
7144 max_branch_offset = 1 << 25;
7145 break;
7146
7147 case R_PPC_REL14:
7148 case R_PPC_REL14_BRTAKEN:
7149 case R_PPC_REL14_BRNTAKEN:
7150 max_branch_offset = 1 << 15;
7151 break;
7152
7153 case R_PPC_ADDR16_HA:
7154 if (htab->params->pic_fixup > 0)
7155 break;
7156 continue;
7157
7158 default:
7159 continue;
7160 }
7161
7162 /* Get the value of the symbol referred to by the reloc. */
7163 if (!get_sym_h (&h, &isym, &tsec, NULL, &isymbuf,
7164 ELF32_R_SYM (irel->r_info), abfd))
7165 goto error_return;
7166
7167 if (isym != NULL)
7168 {
7169 if (tsec != NULL)
7170 ;
7171 else if (isym->st_shndx == SHN_UNDEF)
7172 tsec = bfd_und_section_ptr;
7173 else if (isym->st_shndx == SHN_ABS)
7174 tsec = bfd_abs_section_ptr;
7175 else if (isym->st_shndx == SHN_COMMON)
7176 tsec = bfd_com_section_ptr;
7177
7178 toff = isym->st_value;
7179 sym_type = ELF_ST_TYPE (isym->st_info);
7180 }
7181 else
7182 {
7183 if (tsec != NULL)
7184 toff = h->root.u.def.value;
7185 else if (h->root.type == bfd_link_hash_undefined
7186 || h->root.type == bfd_link_hash_undefweak)
7187 {
7188 unsigned long indx;
7189
7190 indx = ELF32_R_SYM (irel->r_info) - symtab_hdr->sh_info;
7191 tsec = bfd_und_section_ptr;
7192 toff = bfd_link_relocatable (link_info) ? indx : 0;
7193 }
7194 else
7195 continue;
7196
7197 /* If this branch is to __tls_get_addr then we may later
7198 optimise away the call. We won't be needing a long-
7199 branch stub in that case. */
7200 if (bfd_link_executable (link_info)
7201 && h == htab->tls_get_addr
7202 && irel != internal_relocs)
7203 {
7204 unsigned long t_symndx = ELF32_R_SYM (irel[-1].r_info);
7205 unsigned long t_rtype = ELF32_R_TYPE (irel[-1].r_info);
7206 unsigned int tls_mask = 0;
7207
7208 /* The previous reloc should be one of R_PPC_TLSGD or
7209 R_PPC_TLSLD, or for older object files, a reloc
7210 on the __tls_get_addr arg setup insn. Get tls
7211 mask bits from the symbol on that reloc. */
7212 if (t_symndx < symtab_hdr->sh_info)
7213 {
7214 bfd_vma *local_got_offsets = elf_local_got_offsets (abfd);
7215
7216 if (local_got_offsets != NULL)
7217 {
7218 struct plt_entry **local_plt = (struct plt_entry **)
7219 (local_got_offsets + symtab_hdr->sh_info);
7220 char *lgot_masks = (char *)
7221 (local_plt + symtab_hdr->sh_info);
7222 tls_mask = lgot_masks[t_symndx];
7223 }
7224 }
7225 else
7226 {
7227 struct elf_link_hash_entry *th
7228 = elf_sym_hashes (abfd)[t_symndx - symtab_hdr->sh_info];
7229
7230 while (th->root.type == bfd_link_hash_indirect
7231 || th->root.type == bfd_link_hash_warning)
7232 th = (struct elf_link_hash_entry *) th->root.u.i.link;
7233
7234 tls_mask
7235 = ((struct ppc_elf_link_hash_entry *) th)->tls_mask;
7236 }
7237
7238 /* The mask bits tell us if the call will be
7239 optimised away. */
7240 if ((tls_mask & TLS_TLS) != 0 && (tls_mask & TLS_GD) == 0
7241 && (t_rtype == R_PPC_TLSGD
7242 || t_rtype == R_PPC_GOT_TLSGD16
7243 || t_rtype == R_PPC_GOT_TLSGD16_LO))
7244 continue;
7245 if ((tls_mask & TLS_TLS) != 0 && (tls_mask & TLS_LD) == 0
7246 && (t_rtype == R_PPC_TLSLD
7247 || t_rtype == R_PPC_GOT_TLSLD16
7248 || t_rtype == R_PPC_GOT_TLSLD16_LO))
7249 continue;
7250 }
7251
7252 sym_type = h->type;
7253 }
7254
7255 if (r_type == R_PPC_ADDR16_HA)
7256 {
7257 if (h != NULL
7258 && !h->def_regular
7259 && h->protected_def
7260 && ppc_elf_hash_entry (h)->has_addr16_ha
7261 && ppc_elf_hash_entry (h)->has_addr16_lo)
7262 picfixup_size += 12;
7263 continue;
7264 }
7265
7266 /* The condition here under which we call find_plt_ent must
7267 match that in relocate_section. If we call find_plt_ent here
7268 but not in relocate_section, or vice versa, then the branch
7269 destination used here may be incorrect. */
7270 plist = NULL;
7271 if (h != NULL)
7272 {
7273 /* We know is_branch_reloc (r_type) is true. */
7274 if (h->type == STT_GNU_IFUNC
7275 || r_type == R_PPC_PLTREL24)
7276 plist = &h->plt.plist;
7277 }
7278 else if (sym_type == STT_GNU_IFUNC
7279 && elf_local_got_offsets (abfd) != NULL)
7280 {
7281 bfd_vma *local_got_offsets = elf_local_got_offsets (abfd);
7282 struct plt_entry **local_plt = (struct plt_entry **)
7283 (local_got_offsets + symtab_hdr->sh_info);
7284 plist = local_plt + ELF32_R_SYM (irel->r_info);
7285 }
7286 if (plist != NULL)
7287 {
7288 bfd_vma addend = 0;
7289 struct plt_entry *ent;
7290
7291 if (r_type == R_PPC_PLTREL24 && bfd_link_pic (link_info))
7292 addend = irel->r_addend;
7293 ent = find_plt_ent (plist, got2, addend);
7294 if (ent != NULL)
7295 {
7296 if (htab->plt_type == PLT_NEW
7297 || h == NULL
7298 || !htab->elf.dynamic_sections_created
7299 || h->dynindx == -1)
7300 {
7301 tsec = htab->glink;
7302 toff = ent->glink_offset;
7303 }
7304 else
7305 {
7306 tsec = htab->elf.splt;
7307 toff = ent->plt.offset;
7308 }
7309 }
7310 }
7311
7312 /* If the branch and target are in the same section, you have
7313 no hope of adding stubs. We'll error out later should the
7314 branch overflow. */
7315 if (tsec == isec)
7316 continue;
7317
7318 /* There probably isn't any reason to handle symbols in
7319 SEC_MERGE sections; SEC_MERGE doesn't seem a likely
7320 attribute for a code section, and we are only looking at
7321 branches. However, implement it correctly here as a
7322 reference for other target relax_section functions. */
7323 if (0 && tsec->sec_info_type == SEC_INFO_TYPE_MERGE)
7324 {
7325 /* At this stage in linking, no SEC_MERGE symbol has been
7326 adjusted, so all references to such symbols need to be
7327 passed through _bfd_merged_section_offset. (Later, in
7328 relocate_section, all SEC_MERGE symbols *except* for
7329 section symbols have been adjusted.)
7330
7331 gas may reduce relocations against symbols in SEC_MERGE
7332 sections to a relocation against the section symbol when
7333 the original addend was zero. When the reloc is against
7334 a section symbol we should include the addend in the
7335 offset passed to _bfd_merged_section_offset, since the
7336 location of interest is the original symbol. On the
7337 other hand, an access to "sym+addend" where "sym" is not
7338 a section symbol should not include the addend; Such an
7339 access is presumed to be an offset from "sym"; The
7340 location of interest is just "sym". */
7341 if (sym_type == STT_SECTION)
7342 toff += irel->r_addend;
7343
7344 toff
7345 = _bfd_merged_section_offset (abfd, &tsec,
7346 elf_section_data (tsec)->sec_info,
7347 toff);
7348
7349 if (sym_type != STT_SECTION)
7350 toff += irel->r_addend;
7351 }
7352 /* PLTREL24 addends are special. */
7353 else if (r_type != R_PPC_PLTREL24)
7354 toff += irel->r_addend;
7355
7356 /* Attempted -shared link of non-pic code loses. */
7357 if ((!bfd_link_relocatable (link_info)
7358 && tsec == bfd_und_section_ptr)
7359 || tsec->output_section == NULL
7360 || (tsec->owner != NULL
7361 && (tsec->owner->flags & BFD_PLUGIN) != 0))
7362 continue;
7363
7364 roff = irel->r_offset;
7365
7366 /* If the branch is in range, no need to do anything. */
7367 if (tsec != bfd_und_section_ptr
7368 && (!bfd_link_relocatable (link_info)
7369 /* A relocatable link may have sections moved during
7370 final link, so do not presume they remain in range. */
7371 || tsec->output_section == isec->output_section))
7372 {
7373 bfd_vma symaddr, reladdr;
7374
7375 symaddr = tsec->output_section->vma + tsec->output_offset + toff;
7376 reladdr = isec->output_section->vma + isec->output_offset + roff;
7377 if (symaddr - reladdr + max_branch_offset
7378 < 2 * max_branch_offset)
7379 continue;
7380 }
7381
7382 /* Look for an existing fixup to this address. */
7383 for (f = branch_fixups; f ; f = f->next)
7384 if (f->tsec == tsec && f->toff == toff)
7385 break;
7386
7387 if (f == NULL)
7388 {
7389 size_t size;
7390 unsigned long stub_rtype;
7391
7392 val = trampoff - roff;
7393 if (val >= max_branch_offset)
7394 /* Oh dear, we can't reach a trampoline. Don't try to add
7395 one. We'll report an error later. */
7396 continue;
7397
7398 if (bfd_link_pic (link_info))
7399 {
7400 size = 4 * ARRAY_SIZE (shared_stub_entry);
7401 insn_offset = 12;
7402 }
7403 else
7404 {
7405 size = 4 * ARRAY_SIZE (stub_entry);
7406 insn_offset = 0;
7407 }
7408 stub_rtype = R_PPC_RELAX;
7409 if (tsec == htab->elf.splt
7410 || tsec == htab->glink)
7411 {
7412 stub_rtype = R_PPC_RELAX_PLT;
7413 if (r_type == R_PPC_PLTREL24)
7414 stub_rtype = R_PPC_RELAX_PLTREL24;
7415 }
7416
7417 /* Hijack the old relocation. Since we need two
7418 relocations for this use a "composite" reloc. */
7419 irel->r_info = ELF32_R_INFO (ELF32_R_SYM (irel->r_info),
7420 stub_rtype);
7421 irel->r_offset = trampoff + insn_offset;
7422 if (r_type == R_PPC_PLTREL24
7423 && stub_rtype != R_PPC_RELAX_PLTREL24)
7424 irel->r_addend = 0;
7425
7426 /* Record the fixup so we don't do it again this section. */
7427 f = bfd_malloc (sizeof (*f));
7428 f->next = branch_fixups;
7429 f->tsec = tsec;
7430 f->toff = toff;
7431 f->trampoff = trampoff;
7432 branch_fixups = f;
7433
7434 trampoff += size;
7435 changes++;
7436 }
7437 else
7438 {
7439 val = f->trampoff - roff;
7440 if (val >= max_branch_offset)
7441 continue;
7442
7443 /* Nop out the reloc, since we're finalizing things here. */
7444 irel->r_info = ELF32_R_INFO (0, R_PPC_NONE);
7445 }
7446
7447 /* Get the section contents. */
7448 if (contents == NULL)
7449 {
7450 /* Get cached copy if it exists. */
7451 if (elf_section_data (isec)->this_hdr.contents != NULL)
7452 contents = elf_section_data (isec)->this_hdr.contents;
7453 /* Go get them off disk. */
7454 else if (!bfd_malloc_and_get_section (abfd, isec, &contents))
7455 goto error_return;
7456 }
7457
7458 /* Fix up the existing branch to hit the trampoline. */
7459 hit_addr = contents + roff;
7460 switch (r_type)
7461 {
7462 case R_PPC_REL24:
7463 case R_PPC_LOCAL24PC:
7464 case R_PPC_PLTREL24:
7465 t0 = bfd_get_32 (abfd, hit_addr);
7466 t0 &= ~0x3fffffc;
7467 t0 |= val & 0x3fffffc;
7468 bfd_put_32 (abfd, t0, hit_addr);
7469 break;
7470
7471 case R_PPC_REL14:
7472 case R_PPC_REL14_BRTAKEN:
7473 case R_PPC_REL14_BRNTAKEN:
7474 t0 = bfd_get_32 (abfd, hit_addr);
7475 t0 &= ~0xfffc;
7476 t0 |= val & 0xfffc;
7477 bfd_put_32 (abfd, t0, hit_addr);
7478 break;
7479 }
7480 }
7481
7482 while (branch_fixups != NULL)
7483 {
7484 struct one_branch_fixup *f = branch_fixups;
7485 branch_fixups = branch_fixups->next;
7486 free (f);
7487 }
7488 }
7489
7490 workaround_change = FALSE;
7491 newsize = trampoff;
7492 if (htab->params->ppc476_workaround
7493 && (!bfd_link_relocatable (link_info)
7494 || isec->output_section->alignment_power >= htab->params->pagesize_p2))
7495 {
7496 bfd_vma addr, end_addr;
7497 unsigned int crossings;
7498 bfd_vma pagesize = (bfd_vma) 1 << htab->params->pagesize_p2;
7499
7500 addr = isec->output_section->vma + isec->output_offset;
7501 end_addr = addr + trampoff;
7502 addr &= -pagesize;
7503 crossings = ((end_addr & -pagesize) - addr) >> htab->params->pagesize_p2;
7504 if (crossings != 0)
7505 {
7506 /* Keep space aligned, to ensure the patch code itself does
7507 not cross a page. Don't decrease size calculated on a
7508 previous pass as otherwise we might never settle on a layout. */
7509 newsize = 15 - ((end_addr - 1) & 15);
7510 newsize += crossings * 16;
7511 if (relax_info->workaround_size < newsize)
7512 {
7513 relax_info->workaround_size = newsize;
7514 workaround_change = TRUE;
7515 }
7516 /* Ensure relocate_section is called. */
7517 isec->flags |= SEC_RELOC;
7518 }
7519 newsize = trampoff + relax_info->workaround_size;
7520 }
7521
7522 if (htab->params->pic_fixup > 0)
7523 {
7524 picfixup_size -= relax_info->picfixup_size;
7525 if (picfixup_size != 0)
7526 relax_info->picfixup_size += picfixup_size;
7527 newsize += relax_info->picfixup_size;
7528 }
7529
7530 if (changes != 0 || picfixup_size != 0 || workaround_change)
7531 isec->size = newsize;
7532
7533 if (isymbuf != NULL
7534 && symtab_hdr->contents != (unsigned char *) isymbuf)
7535 {
7536 if (! link_info->keep_memory)
7537 free (isymbuf);
7538 else
7539 {
7540 /* Cache the symbols for elf_link_input_bfd. */
7541 symtab_hdr->contents = (unsigned char *) isymbuf;
7542 }
7543 }
7544
7545 if (contents != NULL
7546 && elf_section_data (isec)->this_hdr.contents != contents)
7547 {
7548 if (!changes && !link_info->keep_memory)
7549 free (contents);
7550 else
7551 {
7552 /* Cache the section contents for elf_link_input_bfd. */
7553 elf_section_data (isec)->this_hdr.contents = contents;
7554 }
7555 }
7556
7557 changes += picfixup_size;
7558 if (changes != 0)
7559 {
7560 /* Append sufficient NOP relocs so we can write out relocation
7561 information for the trampolines. */
7562 Elf_Internal_Shdr *rel_hdr;
7563 Elf_Internal_Rela *new_relocs = bfd_malloc ((changes + isec->reloc_count)
7564 * sizeof (*new_relocs));
7565 unsigned ix;
7566
7567 if (!new_relocs)
7568 goto error_return;
7569 memcpy (new_relocs, internal_relocs,
7570 isec->reloc_count * sizeof (*new_relocs));
7571 for (ix = changes; ix--;)
7572 {
7573 irel = new_relocs + ix + isec->reloc_count;
7574
7575 irel->r_info = ELF32_R_INFO (0, R_PPC_NONE);
7576 }
7577 if (internal_relocs != elf_section_data (isec)->relocs)
7578 free (internal_relocs);
7579 elf_section_data (isec)->relocs = new_relocs;
7580 isec->reloc_count += changes;
7581 rel_hdr = _bfd_elf_single_rel_hdr (isec);
7582 rel_hdr->sh_size += changes * rel_hdr->sh_entsize;
7583 }
7584 else if (internal_relocs != NULL
7585 && elf_section_data (isec)->relocs != internal_relocs)
7586 free (internal_relocs);
7587
7588 *again = changes != 0 || workaround_change;
7589 return TRUE;
7590
7591 error_return:
7592 while (branch_fixups != NULL)
7593 {
7594 struct one_branch_fixup *f = branch_fixups;
7595 branch_fixups = branch_fixups->next;
7596 free (f);
7597 }
7598 if (isymbuf != NULL && (unsigned char *) isymbuf != symtab_hdr->contents)
7599 free (isymbuf);
7600 if (contents != NULL
7601 && elf_section_data (isec)->this_hdr.contents != contents)
7602 free (contents);
7603 if (internal_relocs != NULL
7604 && elf_section_data (isec)->relocs != internal_relocs)
7605 free (internal_relocs);
7606 return FALSE;
7607 }
7608 \f
7609 /* What to do when ld finds relocations against symbols defined in
7610 discarded sections. */
7611
7612 static unsigned int
7613 ppc_elf_action_discarded (asection *sec)
7614 {
7615 if (strcmp (".fixup", sec->name) == 0)
7616 return 0;
7617
7618 if (strcmp (".got2", sec->name) == 0)
7619 return 0;
7620
7621 return _bfd_elf_default_action_discarded (sec);
7622 }
7623 \f
7624 /* Fill in the address for a pointer generated in a linker section. */
7625
7626 static bfd_vma
7627 elf_finish_pointer_linker_section (bfd *input_bfd,
7628 elf_linker_section_t *lsect,
7629 struct elf_link_hash_entry *h,
7630 bfd_vma relocation,
7631 const Elf_Internal_Rela *rel)
7632 {
7633 elf_linker_section_pointers_t *linker_section_ptr;
7634
7635 BFD_ASSERT (lsect != NULL);
7636
7637 if (h != NULL)
7638 {
7639 /* Handle global symbol. */
7640 struct ppc_elf_link_hash_entry *eh;
7641
7642 eh = (struct ppc_elf_link_hash_entry *) h;
7643 BFD_ASSERT (eh->elf.def_regular);
7644 linker_section_ptr = eh->linker_section_pointer;
7645 }
7646 else
7647 {
7648 /* Handle local symbol. */
7649 unsigned long r_symndx = ELF32_R_SYM (rel->r_info);
7650
7651 BFD_ASSERT (is_ppc_elf (input_bfd));
7652 BFD_ASSERT (elf_local_ptr_offsets (input_bfd) != NULL);
7653 linker_section_ptr = elf_local_ptr_offsets (input_bfd)[r_symndx];
7654 }
7655
7656 linker_section_ptr = elf_find_pointer_linker_section (linker_section_ptr,
7657 rel->r_addend,
7658 lsect);
7659 BFD_ASSERT (linker_section_ptr != NULL);
7660
7661 /* Offset will always be a multiple of four, so use the bottom bit
7662 as a "written" flag. */
7663 if ((linker_section_ptr->offset & 1) == 0)
7664 {
7665 bfd_put_32 (lsect->section->owner,
7666 relocation + linker_section_ptr->addend,
7667 lsect->section->contents + linker_section_ptr->offset);
7668 linker_section_ptr->offset += 1;
7669 }
7670
7671 relocation = (lsect->section->output_section->vma
7672 + lsect->section->output_offset
7673 + linker_section_ptr->offset - 1
7674 - SYM_VAL (lsect->sym));
7675
7676 #ifdef DEBUG
7677 fprintf (stderr,
7678 "Finish pointer in linker section %s, offset = %ld (0x%lx)\n",
7679 lsect->name, (long) relocation, (long) relocation);
7680 #endif
7681
7682 return relocation;
7683 }
7684
7685 #define PPC_LO(v) ((v) & 0xffff)
7686 #define PPC_HI(v) (((v) >> 16) & 0xffff)
7687 #define PPC_HA(v) PPC_HI ((v) + 0x8000)
7688
7689 static void
7690 write_glink_stub (struct elf_link_hash_entry *h, struct plt_entry *ent,
7691 asection *plt_sec, unsigned char *p,
7692 struct bfd_link_info *info)
7693 {
7694 struct ppc_elf_link_hash_table *htab = ppc_elf_hash_table (info);
7695 bfd *output_bfd = info->output_bfd;
7696 bfd_vma plt;
7697 unsigned char *end = p + GLINK_ENTRY_SIZE (htab, h);
7698
7699 if (h != NULL
7700 && h == htab->tls_get_addr
7701 && !htab->params->no_tls_get_addr_opt)
7702 {
7703 bfd_put_32 (output_bfd, LWZ_11_3, p);
7704 p += 4;
7705 bfd_put_32 (output_bfd, LWZ_12_3 + 4, p);
7706 p += 4;
7707 bfd_put_32 (output_bfd, MR_0_3, p);
7708 p += 4;
7709 bfd_put_32 (output_bfd, CMPWI_11_0, p);
7710 p += 4;
7711 bfd_put_32 (output_bfd, ADD_3_12_2, p);
7712 p += 4;
7713 bfd_put_32 (output_bfd, BEQLR, p);
7714 p += 4;
7715 bfd_put_32 (output_bfd, MR_3_0, p);
7716 p += 4;
7717 bfd_put_32 (output_bfd, NOP, p);
7718 p += 4;
7719 }
7720
7721 plt = ((ent->plt.offset & ~1)
7722 + plt_sec->output_section->vma
7723 + plt_sec->output_offset);
7724
7725 if (bfd_link_pic (info))
7726 {
7727 bfd_vma got = 0;
7728
7729 if (ent->addend >= 32768)
7730 got = (ent->addend
7731 + ent->sec->output_section->vma
7732 + ent->sec->output_offset);
7733 else if (htab->elf.hgot != NULL)
7734 got = SYM_VAL (htab->elf.hgot);
7735
7736 plt -= got;
7737
7738 if (plt + 0x8000 < 0x10000)
7739 bfd_put_32 (output_bfd, LWZ_11_30 + PPC_LO (plt), p);
7740 else
7741 {
7742 bfd_put_32 (output_bfd, ADDIS_11_30 + PPC_HA (plt), p);
7743 p += 4;
7744 bfd_put_32 (output_bfd, LWZ_11_11 + PPC_LO (plt), p);
7745 }
7746 }
7747 else
7748 {
7749 bfd_put_32 (output_bfd, LIS_11 + PPC_HA (plt), p);
7750 p += 4;
7751 bfd_put_32 (output_bfd, LWZ_11_11 + PPC_LO (plt), p);
7752 }
7753 p += 4;
7754 bfd_put_32 (output_bfd, MTCTR_11, p);
7755 p += 4;
7756 bfd_put_32 (output_bfd, BCTR, p);
7757 p += 4;
7758 while (p < end)
7759 {
7760 bfd_put_32 (output_bfd, htab->params->ppc476_workaround ? BA : NOP, p);
7761 p += 4;
7762 }
7763 }
7764
7765 /* Return true if symbol is defined statically. */
7766
7767 static bfd_boolean
7768 is_static_defined (struct elf_link_hash_entry *h)
7769 {
7770 return ((h->root.type == bfd_link_hash_defined
7771 || h->root.type == bfd_link_hash_defweak)
7772 && h->root.u.def.section != NULL
7773 && h->root.u.def.section->output_section != NULL);
7774 }
7775
7776 /* If INSN is an opcode that may be used with an @tls operand, return
7777 the transformed insn for TLS optimisation, otherwise return 0. If
7778 REG is non-zero only match an insn with RB or RA equal to REG. */
7779
7780 unsigned int
7781 _bfd_elf_ppc_at_tls_transform (unsigned int insn, unsigned int reg)
7782 {
7783 unsigned int rtra;
7784
7785 if ((insn & (0x3f << 26)) != 31 << 26)
7786 return 0;
7787
7788 if (reg == 0 || ((insn >> 11) & 0x1f) == reg)
7789 rtra = insn & ((1 << 26) - (1 << 16));
7790 else if (((insn >> 16) & 0x1f) == reg)
7791 rtra = (insn & (0x1f << 21)) | ((insn & (0x1f << 11)) << 5);
7792 else
7793 return 0;
7794
7795 if ((insn & (0x3ff << 1)) == 266 << 1)
7796 /* add -> addi. */
7797 insn = 14 << 26;
7798 else if ((insn & (0x1f << 1)) == 23 << 1
7799 && ((insn & (0x1f << 6)) < 14 << 6
7800 || ((insn & (0x1f << 6)) >= 16 << 6
7801 && (insn & (0x1f << 6)) < 24 << 6)))
7802 /* load and store indexed -> dform. */
7803 insn = (32 | ((insn >> 6) & 0x1f)) << 26;
7804 else if ((insn & (((0x1a << 5) | 0x1f) << 1)) == 21 << 1)
7805 /* ldx, ldux, stdx, stdux -> ld, ldu, std, stdu. */
7806 insn = ((58 | ((insn >> 6) & 4)) << 26) | ((insn >> 6) & 1);
7807 else if ((insn & (((0x1f << 5) | 0x1f) << 1)) == 341 << 1)
7808 /* lwax -> lwa. */
7809 insn = (58 << 26) | 2;
7810 else
7811 return 0;
7812 insn |= rtra;
7813 return insn;
7814 }
7815
7816 /* If INSN is an opcode that may be used with an @tprel operand, return
7817 the transformed insn for an undefined weak symbol, ie. with the
7818 thread pointer REG operand removed. Otherwise return 0. */
7819
7820 unsigned int
7821 _bfd_elf_ppc_at_tprel_transform (unsigned int insn, unsigned int reg)
7822 {
7823 if ((insn & (0x1f << 16)) == reg << 16
7824 && ((insn & (0x3f << 26)) == 14u << 26 /* addi */
7825 || (insn & (0x3f << 26)) == 15u << 26 /* addis */
7826 || (insn & (0x3f << 26)) == 32u << 26 /* lwz */
7827 || (insn & (0x3f << 26)) == 34u << 26 /* lbz */
7828 || (insn & (0x3f << 26)) == 36u << 26 /* stw */
7829 || (insn & (0x3f << 26)) == 38u << 26 /* stb */
7830 || (insn & (0x3f << 26)) == 40u << 26 /* lhz */
7831 || (insn & (0x3f << 26)) == 42u << 26 /* lha */
7832 || (insn & (0x3f << 26)) == 44u << 26 /* sth */
7833 || (insn & (0x3f << 26)) == 46u << 26 /* lmw */
7834 || (insn & (0x3f << 26)) == 47u << 26 /* stmw */
7835 || (insn & (0x3f << 26)) == 48u << 26 /* lfs */
7836 || (insn & (0x3f << 26)) == 50u << 26 /* lfd */
7837 || (insn & (0x3f << 26)) == 52u << 26 /* stfs */
7838 || (insn & (0x3f << 26)) == 54u << 26 /* stfd */
7839 || ((insn & (0x3f << 26)) == 58u << 26 /* lwa,ld,lmd */
7840 && (insn & 3) != 1)
7841 || ((insn & (0x3f << 26)) == 62u << 26 /* std, stmd */
7842 && ((insn & 3) == 0 || (insn & 3) == 3))))
7843 {
7844 insn &= ~(0x1f << 16);
7845 }
7846 else if ((insn & (0x1f << 21)) == reg << 21
7847 && ((insn & (0x3e << 26)) == 24u << 26 /* ori, oris */
7848 || (insn & (0x3e << 26)) == 26u << 26 /* xori,xoris */
7849 || (insn & (0x3e << 26)) == 28u << 26 /* andi,andis */))
7850 {
7851 insn &= ~(0x1f << 21);
7852 insn |= (insn & (0x1f << 16)) << 5;
7853 if ((insn & (0x3e << 26)) == 26 << 26 /* xori,xoris */)
7854 insn -= 2 >> 26; /* convert to ori,oris */
7855 }
7856 else
7857 insn = 0;
7858 return insn;
7859 }
7860
7861 static bfd_boolean
7862 is_insn_ds_form (unsigned int insn)
7863 {
7864 return ((insn & (0x3f << 26)) == 58u << 26 /* ld,ldu,lwa */
7865 || (insn & (0x3f << 26)) == 62u << 26 /* std,stdu,stq */
7866 || (insn & (0x3f << 26)) == 57u << 26 /* lfdp */
7867 || (insn & (0x3f << 26)) == 61u << 26 /* stfdp */);
7868 }
7869
7870 static bfd_boolean
7871 is_insn_dq_form (unsigned int insn)
7872 {
7873 return ((insn & (0x3f << 26)) == 56u << 26 /* lq */
7874 || ((insn & (0x3f << 26)) == (61u << 26) /* lxv, stxv */
7875 && (insn & 3) == 1));
7876 }
7877
7878 /* The RELOCATE_SECTION function is called by the ELF backend linker
7879 to handle the relocations for a section.
7880
7881 The relocs are always passed as Rela structures; if the section
7882 actually uses Rel structures, the r_addend field will always be
7883 zero.
7884
7885 This function is responsible for adjust the section contents as
7886 necessary, and (if using Rela relocs and generating a
7887 relocatable output file) adjusting the reloc addend as
7888 necessary.
7889
7890 This function does not have to worry about setting the reloc
7891 address or the reloc symbol index.
7892
7893 LOCAL_SYMS is a pointer to the swapped in local symbols.
7894
7895 LOCAL_SECTIONS is an array giving the section in the input file
7896 corresponding to the st_shndx field of each local symbol.
7897
7898 The global hash table entry for the global symbols can be found
7899 via elf_sym_hashes (input_bfd).
7900
7901 When generating relocatable output, this function must handle
7902 STB_LOCAL/STT_SECTION symbols specially. The output symbol is
7903 going to be the section symbol corresponding to the output
7904 section, which means that the addend must be adjusted
7905 accordingly. */
7906
7907 static bfd_boolean
7908 ppc_elf_relocate_section (bfd *output_bfd,
7909 struct bfd_link_info *info,
7910 bfd *input_bfd,
7911 asection *input_section,
7912 bfd_byte *contents,
7913 Elf_Internal_Rela *relocs,
7914 Elf_Internal_Sym *local_syms,
7915 asection **local_sections)
7916 {
7917 Elf_Internal_Shdr *symtab_hdr;
7918 struct elf_link_hash_entry **sym_hashes;
7919 struct ppc_elf_link_hash_table *htab;
7920 Elf_Internal_Rela *rel;
7921 Elf_Internal_Rela *wrel;
7922 Elf_Internal_Rela *relend;
7923 Elf_Internal_Rela outrel;
7924 asection *got2;
7925 bfd_vma *local_got_offsets;
7926 bfd_boolean ret = TRUE;
7927 bfd_vma d_offset = (bfd_big_endian (input_bfd) ? 2 : 0);
7928 bfd_boolean is_vxworks_tls;
7929 unsigned int picfixup_size = 0;
7930 struct ppc_elf_relax_info *relax_info = NULL;
7931
7932 #ifdef DEBUG
7933 _bfd_error_handler ("ppc_elf_relocate_section called for %pB section %pA, "
7934 "%ld relocations%s",
7935 input_bfd, input_section,
7936 (long) input_section->reloc_count,
7937 (bfd_link_relocatable (info)) ? " (relocatable)" : "");
7938 #endif
7939
7940 got2 = bfd_get_section_by_name (input_bfd, ".got2");
7941
7942 /* Initialize howto table if not already done. */
7943 if (!ppc_elf_howto_table[R_PPC_ADDR32])
7944 ppc_elf_howto_init ();
7945
7946 htab = ppc_elf_hash_table (info);
7947 local_got_offsets = elf_local_got_offsets (input_bfd);
7948 symtab_hdr = &elf_symtab_hdr (input_bfd);
7949 sym_hashes = elf_sym_hashes (input_bfd);
7950 /* We have to handle relocations in vxworks .tls_vars sections
7951 specially, because the dynamic loader is 'weird'. */
7952 is_vxworks_tls = (htab->is_vxworks && bfd_link_pic (info)
7953 && !strcmp (input_section->output_section->name,
7954 ".tls_vars"));
7955 if (input_section->sec_info_type == SEC_INFO_TYPE_TARGET)
7956 relax_info = elf_section_data (input_section)->sec_info;
7957 rel = wrel = relocs;
7958 relend = relocs + input_section->reloc_count;
7959 for (; rel < relend; wrel++, rel++)
7960 {
7961 enum elf_ppc_reloc_type r_type;
7962 bfd_vma addend;
7963 bfd_reloc_status_type r;
7964 Elf_Internal_Sym *sym;
7965 asection *sec;
7966 struct elf_link_hash_entry *h;
7967 const char *sym_name;
7968 reloc_howto_type *howto;
7969 unsigned long r_symndx;
7970 bfd_vma relocation;
7971 bfd_vma branch_bit, from;
7972 bfd_boolean unresolved_reloc, save_unresolved_reloc;
7973 bfd_boolean warned;
7974 unsigned int tls_type, tls_mask, tls_gd;
7975 struct plt_entry **ifunc, **plt_list;
7976 struct reloc_howto_struct alt_howto;
7977
7978 again:
7979 r_type = ELF32_R_TYPE (rel->r_info);
7980 sym = NULL;
7981 sec = NULL;
7982 h = NULL;
7983 unresolved_reloc = FALSE;
7984 warned = FALSE;
7985 r_symndx = ELF32_R_SYM (rel->r_info);
7986
7987 if (r_symndx < symtab_hdr->sh_info)
7988 {
7989 sym = local_syms + r_symndx;
7990 sec = local_sections[r_symndx];
7991 sym_name = bfd_elf_sym_name (input_bfd, symtab_hdr, sym, sec);
7992
7993 relocation = _bfd_elf_rela_local_sym (output_bfd, sym, &sec, rel);
7994 }
7995 else
7996 {
7997 bfd_boolean ignored;
7998
7999 RELOC_FOR_GLOBAL_SYMBOL (info, input_bfd, input_section, rel,
8000 r_symndx, symtab_hdr, sym_hashes,
8001 h, sec, relocation,
8002 unresolved_reloc, warned, ignored);
8003
8004 sym_name = h->root.root.string;
8005 }
8006
8007 if (sec != NULL && discarded_section (sec))
8008 {
8009 /* For relocs against symbols from removed linkonce sections,
8010 or sections discarded by a linker script, we just want the
8011 section contents zeroed. Avoid any special processing. */
8012 howto = NULL;
8013 if (r_type < R_PPC_max)
8014 howto = ppc_elf_howto_table[r_type];
8015
8016 _bfd_clear_contents (howto, input_bfd, input_section,
8017 contents + rel->r_offset);
8018 wrel->r_offset = rel->r_offset;
8019 wrel->r_info = 0;
8020 wrel->r_addend = 0;
8021
8022 /* For ld -r, remove relocations in debug sections against
8023 symbols defined in discarded sections. Not done for
8024 non-debug to preserve relocs in .eh_frame which the
8025 eh_frame editing code expects to be present. */
8026 if (bfd_link_relocatable (info)
8027 && (input_section->flags & SEC_DEBUGGING))
8028 wrel--;
8029
8030 continue;
8031 }
8032
8033 if (bfd_link_relocatable (info))
8034 {
8035 if (got2 != NULL
8036 && r_type == R_PPC_PLTREL24
8037 && rel->r_addend != 0)
8038 {
8039 /* R_PPC_PLTREL24 is rather special. If non-zero, the
8040 addend specifies the GOT pointer offset within .got2. */
8041 rel->r_addend += got2->output_offset;
8042 }
8043 if (r_type != R_PPC_RELAX_PLT
8044 && r_type != R_PPC_RELAX_PLTREL24
8045 && r_type != R_PPC_RELAX)
8046 goto copy_reloc;
8047 }
8048
8049 /* TLS optimizations. Replace instruction sequences and relocs
8050 based on information we collected in tls_optimize. We edit
8051 RELOCS so that --emit-relocs will output something sensible
8052 for the final instruction stream. */
8053 tls_mask = 0;
8054 tls_gd = 0;
8055 if (h != NULL)
8056 tls_mask = ((struct ppc_elf_link_hash_entry *) h)->tls_mask;
8057 else if (local_got_offsets != NULL)
8058 {
8059 struct plt_entry **local_plt;
8060 char *lgot_masks;
8061 local_plt
8062 = (struct plt_entry **) (local_got_offsets + symtab_hdr->sh_info);
8063 lgot_masks = (char *) (local_plt + symtab_hdr->sh_info);
8064 tls_mask = lgot_masks[r_symndx];
8065 }
8066
8067 /* Ensure reloc mapping code below stays sane. */
8068 if ((R_PPC_GOT_TLSLD16 & 3) != (R_PPC_GOT_TLSGD16 & 3)
8069 || (R_PPC_GOT_TLSLD16_LO & 3) != (R_PPC_GOT_TLSGD16_LO & 3)
8070 || (R_PPC_GOT_TLSLD16_HI & 3) != (R_PPC_GOT_TLSGD16_HI & 3)
8071 || (R_PPC_GOT_TLSLD16_HA & 3) != (R_PPC_GOT_TLSGD16_HA & 3)
8072 || (R_PPC_GOT_TLSLD16 & 3) != (R_PPC_GOT_TPREL16 & 3)
8073 || (R_PPC_GOT_TLSLD16_LO & 3) != (R_PPC_GOT_TPREL16_LO & 3)
8074 || (R_PPC_GOT_TLSLD16_HI & 3) != (R_PPC_GOT_TPREL16_HI & 3)
8075 || (R_PPC_GOT_TLSLD16_HA & 3) != (R_PPC_GOT_TPREL16_HA & 3))
8076 abort ();
8077 switch (r_type)
8078 {
8079 default:
8080 break;
8081
8082 case R_PPC_GOT_TPREL16:
8083 case R_PPC_GOT_TPREL16_LO:
8084 if ((tls_mask & TLS_TLS) != 0
8085 && (tls_mask & TLS_TPREL) == 0)
8086 {
8087 bfd_vma insn;
8088
8089 insn = bfd_get_32 (input_bfd,
8090 contents + rel->r_offset - d_offset);
8091 insn &= 31 << 21;
8092 insn |= 0x3c020000; /* addis 0,2,0 */
8093 bfd_put_32 (input_bfd, insn,
8094 contents + rel->r_offset - d_offset);
8095 r_type = R_PPC_TPREL16_HA;
8096 rel->r_info = ELF32_R_INFO (r_symndx, r_type);
8097 }
8098 break;
8099
8100 case R_PPC_TLS:
8101 if ((tls_mask & TLS_TLS) != 0
8102 && (tls_mask & TLS_TPREL) == 0)
8103 {
8104 bfd_vma insn;
8105
8106 insn = bfd_get_32 (input_bfd, contents + rel->r_offset);
8107 insn = _bfd_elf_ppc_at_tls_transform (insn, 2);
8108 if (insn == 0)
8109 abort ();
8110 bfd_put_32 (input_bfd, insn, contents + rel->r_offset);
8111 r_type = R_PPC_TPREL16_LO;
8112 rel->r_info = ELF32_R_INFO (r_symndx, r_type);
8113
8114 /* Was PPC_TLS which sits on insn boundary, now
8115 PPC_TPREL16_LO which is at low-order half-word. */
8116 rel->r_offset += d_offset;
8117 }
8118 break;
8119
8120 case R_PPC_GOT_TLSGD16_HI:
8121 case R_PPC_GOT_TLSGD16_HA:
8122 tls_gd = TLS_TPRELGD;
8123 if ((tls_mask & TLS_TLS) != 0 && (tls_mask & TLS_GD) == 0)
8124 goto tls_gdld_hi;
8125 break;
8126
8127 case R_PPC_GOT_TLSLD16_HI:
8128 case R_PPC_GOT_TLSLD16_HA:
8129 if ((tls_mask & TLS_TLS) != 0 && (tls_mask & TLS_LD) == 0)
8130 {
8131 tls_gdld_hi:
8132 if ((tls_mask & tls_gd) != 0)
8133 r_type = (((r_type - (R_PPC_GOT_TLSGD16 & 3)) & 3)
8134 + R_PPC_GOT_TPREL16);
8135 else
8136 {
8137 rel->r_offset -= d_offset;
8138 bfd_put_32 (input_bfd, NOP, contents + rel->r_offset);
8139 r_type = R_PPC_NONE;
8140 }
8141 rel->r_info = ELF32_R_INFO (r_symndx, r_type);
8142 }
8143 break;
8144
8145 case R_PPC_GOT_TLSGD16:
8146 case R_PPC_GOT_TLSGD16_LO:
8147 tls_gd = TLS_TPRELGD;
8148 if ((tls_mask & TLS_TLS) != 0 && (tls_mask & TLS_GD) == 0)
8149 goto tls_ldgd_opt;
8150 break;
8151
8152 case R_PPC_GOT_TLSLD16:
8153 case R_PPC_GOT_TLSLD16_LO:
8154 if ((tls_mask & TLS_TLS) != 0 && (tls_mask & TLS_LD) == 0)
8155 {
8156 unsigned int insn1, insn2;
8157 bfd_vma offset;
8158
8159 tls_ldgd_opt:
8160 offset = (bfd_vma) -1;
8161 /* If not using the newer R_PPC_TLSGD/LD to mark
8162 __tls_get_addr calls, we must trust that the call
8163 stays with its arg setup insns, ie. that the next
8164 reloc is the __tls_get_addr call associated with
8165 the current reloc. Edit both insns. */
8166 if (input_section->has_tls_get_addr_call
8167 && rel + 1 < relend
8168 && branch_reloc_hash_match (input_bfd, rel + 1,
8169 htab->tls_get_addr))
8170 offset = rel[1].r_offset;
8171 /* We read the low GOT_TLS insn because we need to keep
8172 the destination reg. It may be something other than
8173 the usual r3, and moved to r3 before the call by
8174 intervening code. */
8175 insn1 = bfd_get_32 (input_bfd,
8176 contents + rel->r_offset - d_offset);
8177 if ((tls_mask & tls_gd) != 0)
8178 {
8179 /* IE */
8180 insn1 &= (0x1f << 21) | (0x1f << 16);
8181 insn1 |= 32 << 26; /* lwz */
8182 if (offset != (bfd_vma) -1)
8183 {
8184 rel[1].r_info = ELF32_R_INFO (STN_UNDEF, R_PPC_NONE);
8185 insn2 = 0x7c631214; /* add 3,3,2 */
8186 bfd_put_32 (input_bfd, insn2, contents + offset);
8187 }
8188 r_type = (((r_type - (R_PPC_GOT_TLSGD16 & 3)) & 3)
8189 + R_PPC_GOT_TPREL16);
8190 rel->r_info = ELF32_R_INFO (r_symndx, r_type);
8191 }
8192 else
8193 {
8194 /* LE */
8195 insn1 &= 0x1f << 21;
8196 insn1 |= 0x3c020000; /* addis r,2,0 */
8197 if (tls_gd == 0)
8198 {
8199 /* Was an LD reloc. */
8200 for (r_symndx = 0;
8201 r_symndx < symtab_hdr->sh_info;
8202 r_symndx++)
8203 if (local_sections[r_symndx] == sec)
8204 break;
8205 if (r_symndx >= symtab_hdr->sh_info)
8206 r_symndx = STN_UNDEF;
8207 rel->r_addend = htab->elf.tls_sec->vma + DTP_OFFSET;
8208 if (r_symndx != STN_UNDEF)
8209 rel->r_addend -= (local_syms[r_symndx].st_value
8210 + sec->output_offset
8211 + sec->output_section->vma);
8212 }
8213 r_type = R_PPC_TPREL16_HA;
8214 rel->r_info = ELF32_R_INFO (r_symndx, r_type);
8215 if (offset != (bfd_vma) -1)
8216 {
8217 rel[1].r_info = ELF32_R_INFO (r_symndx, R_PPC_TPREL16_LO);
8218 rel[1].r_offset = offset + d_offset;
8219 rel[1].r_addend = rel->r_addend;
8220 insn2 = 0x38630000; /* addi 3,3,0 */
8221 bfd_put_32 (input_bfd, insn2, contents + offset);
8222 }
8223 }
8224 bfd_put_32 (input_bfd, insn1,
8225 contents + rel->r_offset - d_offset);
8226 if (tls_gd == 0)
8227 {
8228 /* We changed the symbol on an LD reloc. Start over
8229 in order to get h, sym, sec etc. right. */
8230 goto again;
8231 }
8232 }
8233 break;
8234
8235 case R_PPC_TLSGD:
8236 if ((tls_mask & TLS_TLS) != 0 && (tls_mask & TLS_GD) == 0
8237 && rel + 1 < relend)
8238 {
8239 unsigned int insn2;
8240 bfd_vma offset = rel->r_offset;
8241
8242 if (is_plt_seq_reloc (ELF32_R_TYPE (rel[1].r_info)))
8243 {
8244 bfd_put_32 (input_bfd, NOP, contents + offset);
8245 rel[1].r_info = ELF32_R_INFO (STN_UNDEF, R_PPC_NONE);
8246 break;
8247 }
8248
8249 if ((tls_mask & TLS_TPRELGD) != 0)
8250 {
8251 /* IE */
8252 r_type = R_PPC_NONE;
8253 insn2 = 0x7c631214; /* add 3,3,2 */
8254 }
8255 else
8256 {
8257 /* LE */
8258 r_type = R_PPC_TPREL16_LO;
8259 rel->r_offset += d_offset;
8260 insn2 = 0x38630000; /* addi 3,3,0 */
8261 }
8262 rel->r_info = ELF32_R_INFO (r_symndx, r_type);
8263 bfd_put_32 (input_bfd, insn2, contents + offset);
8264 /* Zap the reloc on the _tls_get_addr call too. */
8265 BFD_ASSERT (offset == rel[1].r_offset);
8266 rel[1].r_info = ELF32_R_INFO (STN_UNDEF, R_PPC_NONE);
8267 }
8268 break;
8269
8270 case R_PPC_TLSLD:
8271 if ((tls_mask & TLS_TLS) != 0 && (tls_mask & TLS_LD) == 0
8272 && rel + 1 < relend)
8273 {
8274 unsigned int insn2;
8275
8276 if (is_plt_seq_reloc (ELF32_R_TYPE (rel[1].r_info)))
8277 {
8278 bfd_put_32 (input_bfd, NOP, contents + rel->r_offset);
8279 rel[1].r_info = ELF32_R_INFO (STN_UNDEF, R_PPC_NONE);
8280 break;
8281 }
8282
8283 for (r_symndx = 0;
8284 r_symndx < symtab_hdr->sh_info;
8285 r_symndx++)
8286 if (local_sections[r_symndx] == sec)
8287 break;
8288 if (r_symndx >= symtab_hdr->sh_info)
8289 r_symndx = STN_UNDEF;
8290 rel->r_addend = htab->elf.tls_sec->vma + DTP_OFFSET;
8291 if (r_symndx != STN_UNDEF)
8292 rel->r_addend -= (local_syms[r_symndx].st_value
8293 + sec->output_offset
8294 + sec->output_section->vma);
8295
8296 rel->r_info = ELF32_R_INFO (r_symndx, R_PPC_TPREL16_LO);
8297 rel->r_offset += d_offset;
8298 insn2 = 0x38630000; /* addi 3,3,0 */
8299 bfd_put_32 (input_bfd, insn2,
8300 contents + rel->r_offset - d_offset);
8301 /* Zap the reloc on the _tls_get_addr call too. */
8302 BFD_ASSERT (rel->r_offset - d_offset == rel[1].r_offset);
8303 rel[1].r_info = ELF32_R_INFO (STN_UNDEF, R_PPC_NONE);
8304 goto again;
8305 }
8306 break;
8307 }
8308
8309 /* Handle other relocations that tweak non-addend part of insn. */
8310 branch_bit = 0;
8311 switch (r_type)
8312 {
8313 default:
8314 break;
8315
8316 /* Branch taken prediction relocations. */
8317 case R_PPC_ADDR14_BRTAKEN:
8318 case R_PPC_REL14_BRTAKEN:
8319 branch_bit = BRANCH_PREDICT_BIT;
8320 /* Fall through. */
8321
8322 /* Branch not taken prediction relocations. */
8323 case R_PPC_ADDR14_BRNTAKEN:
8324 case R_PPC_REL14_BRNTAKEN:
8325 {
8326 unsigned int insn;
8327
8328 insn = bfd_get_32 (input_bfd, contents + rel->r_offset);
8329 insn &= ~BRANCH_PREDICT_BIT;
8330 insn |= branch_bit;
8331
8332 from = (rel->r_offset
8333 + input_section->output_offset
8334 + input_section->output_section->vma);
8335
8336 /* Invert 'y' bit if not the default. */
8337 if ((bfd_signed_vma) (relocation + rel->r_addend - from) < 0)
8338 insn ^= BRANCH_PREDICT_BIT;
8339
8340 bfd_put_32 (input_bfd, insn, contents + rel->r_offset);
8341 }
8342 break;
8343
8344 case R_PPC_PLT16_HA:
8345 {
8346 unsigned int insn;
8347
8348 insn = bfd_get_32 (input_bfd,
8349 contents + rel->r_offset - d_offset);
8350 if ((insn & (0x3f << 26)) == 15u << 26
8351 && (insn & (0x1f << 16)) != 0)
8352 {
8353 if (!bfd_link_pic (info))
8354 {
8355 /* Convert addis to lis. */
8356 insn &= ~(0x1f << 16);
8357 bfd_put_32 (input_bfd, insn,
8358 contents + rel->r_offset - d_offset);
8359 }
8360 }
8361 else if (bfd_link_pic (info))
8362 info->callbacks->einfo
8363 (_("%P: %H: error: %s with unexpected instruction %x\n"),
8364 input_bfd, input_section, rel->r_offset,
8365 "R_PPC_PLT16_HA", insn);
8366 }
8367 break;
8368 }
8369
8370 if (ELIMINATE_COPY_RELOCS
8371 && h != NULL
8372 && !h->def_regular
8373 && h->protected_def
8374 && ppc_elf_hash_entry (h)->has_addr16_ha
8375 && ppc_elf_hash_entry (h)->has_addr16_lo
8376 && htab->params->pic_fixup > 0)
8377 {
8378 /* Convert lis;addi or lis;load/store accessing a protected
8379 variable defined in a shared library to PIC. */
8380 unsigned int insn;
8381
8382 if (r_type == R_PPC_ADDR16_HA)
8383 {
8384 insn = bfd_get_32 (input_bfd,
8385 contents + rel->r_offset - d_offset);
8386 if ((insn & (0x3f << 26)) == (15u << 26)
8387 && (insn & (0x1f << 16)) == 0 /* lis */)
8388 {
8389 bfd_byte *p;
8390 bfd_vma off;
8391 bfd_vma got_addr;
8392
8393 p = (contents + input_section->size
8394 - relax_info->workaround_size
8395 - relax_info->picfixup_size
8396 + picfixup_size);
8397 off = (p - contents) - (rel->r_offset - d_offset);
8398 if (off > 0x1fffffc || (off & 3) != 0)
8399 info->callbacks->einfo
8400 (_("%H: fixup branch overflow\n"),
8401 input_bfd, input_section, rel->r_offset);
8402
8403 bfd_put_32 (input_bfd, B | off,
8404 contents + rel->r_offset - d_offset);
8405 got_addr = (htab->elf.sgot->output_section->vma
8406 + htab->elf.sgot->output_offset
8407 + (h->got.offset & ~1));
8408 wrel->r_offset = (p - contents) + d_offset;
8409 wrel->r_info = ELF32_R_INFO (0, R_PPC_ADDR16_HA);
8410 wrel->r_addend = got_addr;
8411 insn &= ~0xffff;
8412 insn |= ((unsigned int) (got_addr + 0x8000) >> 16) & 0xffff;
8413 bfd_put_32 (input_bfd, insn, p);
8414
8415 /* Convert lis to lwz, loading address from GOT. */
8416 insn &= ~0xffff;
8417 insn ^= (32u ^ 15u) << 26;
8418 insn |= (insn & (0x1f << 21)) >> 5;
8419 insn |= got_addr & 0xffff;
8420 bfd_put_32 (input_bfd, insn, p + 4);
8421
8422 bfd_put_32 (input_bfd, B | ((-4 - off) & 0x3ffffff), p + 8);
8423 picfixup_size += 12;
8424
8425 /* Use one of the spare relocs, so --emit-relocs
8426 output is reasonable. */
8427 memmove (rel + 1, rel, (relend - rel - 1) * sizeof (*rel));
8428 wrel++, rel++;
8429 rel->r_offset = wrel[-1].r_offset + 4;
8430 rel->r_info = ELF32_R_INFO (0, R_PPC_ADDR16_LO);
8431 rel->r_addend = wrel[-1].r_addend;
8432
8433 /* Continue on as if we had a got reloc, to output
8434 dynamic reloc. */
8435 r_type = R_PPC_GOT16_LO;
8436 }
8437 else
8438 _bfd_error_handler
8439 /* xgettext:c-format */
8440 (_("%pB(%pA+%#" PRIx64 "): error: "
8441 "%s with unexpected instruction %#x"),
8442 input_bfd, input_section, (uint64_t) rel->r_offset,
8443 "R_PPC_ADDR16_HA", insn);
8444 }
8445 else if (r_type == R_PPC_ADDR16_LO)
8446 {
8447 insn = bfd_get_32 (input_bfd,
8448 contents + rel->r_offset - d_offset);
8449 if ((insn & (0x3f << 26)) == 14u << 26 /* addi */
8450 || (insn & (0x3f << 26)) == 32u << 26 /* lwz */
8451 || (insn & (0x3f << 26)) == 34u << 26 /* lbz */
8452 || (insn & (0x3f << 26)) == 36u << 26 /* stw */
8453 || (insn & (0x3f << 26)) == 38u << 26 /* stb */
8454 || (insn & (0x3f << 26)) == 40u << 26 /* lhz */
8455 || (insn & (0x3f << 26)) == 42u << 26 /* lha */
8456 || (insn & (0x3f << 26)) == 44u << 26 /* sth */
8457 || (insn & (0x3f << 26)) == 46u << 26 /* lmw */
8458 || (insn & (0x3f << 26)) == 47u << 26 /* stmw */
8459 || (insn & (0x3f << 26)) == 48u << 26 /* lfs */
8460 || (insn & (0x3f << 26)) == 50u << 26 /* lfd */
8461 || (insn & (0x3f << 26)) == 52u << 26 /* stfs */
8462 || (insn & (0x3f << 26)) == 54u << 26 /* stfd */
8463 || ((insn & (0x3f << 26)) == 58u << 26 /* lwa,ld,lmd */
8464 && (insn & 3) != 1)
8465 || ((insn & (0x3f << 26)) == 62u << 26 /* std, stmd */
8466 && ((insn & 3) == 0 || (insn & 3) == 3)))
8467 {
8468 /* Arrange to apply the reloc addend, if any. */
8469 relocation = 0;
8470 unresolved_reloc = FALSE;
8471 rel->r_info = ELF32_R_INFO (0, r_type);
8472 }
8473 else
8474 _bfd_error_handler
8475 /* xgettext:c-format */
8476 (_("%pB(%pA+%#" PRIx64 "): error: "
8477 "%s with unexpected instruction %#x"),
8478 input_bfd, input_section, (uint64_t) rel->r_offset,
8479 "R_PPC_ADDR16_LO", insn);
8480 }
8481 }
8482
8483 ifunc = NULL;
8484 if (!htab->is_vxworks)
8485 {
8486 struct plt_entry *ent;
8487
8488 if (h != NULL)
8489 {
8490 if (h->type == STT_GNU_IFUNC)
8491 ifunc = &h->plt.plist;
8492 }
8493 else if (local_got_offsets != NULL
8494 && ELF_ST_TYPE (sym->st_info) == STT_GNU_IFUNC)
8495 {
8496 struct plt_entry **local_plt;
8497
8498 local_plt = (struct plt_entry **) (local_got_offsets
8499 + symtab_hdr->sh_info);
8500 ifunc = local_plt + r_symndx;
8501 }
8502
8503 ent = NULL;
8504 if (ifunc != NULL
8505 && (!bfd_link_pic (info)
8506 || is_branch_reloc (r_type)
8507 || r_type == R_PPC_PLT16_LO
8508 || r_type == R_PPC_PLT16_HI
8509 || r_type == R_PPC_PLT16_HA))
8510 {
8511 addend = 0;
8512 if (bfd_link_pic (info)
8513 && (r_type == R_PPC_PLTREL24
8514 || r_type == R_PPC_PLT16_LO
8515 || r_type == R_PPC_PLT16_HI
8516 || r_type == R_PPC_PLT16_HA))
8517 addend = rel->r_addend;
8518 ent = find_plt_ent (ifunc, got2, addend);
8519 }
8520 if (ent != NULL)
8521 {
8522 if (bfd_link_pic (info)
8523 && ent->sec != got2
8524 && htab->plt_type != PLT_NEW
8525 && (!htab->elf.dynamic_sections_created
8526 || h == NULL
8527 || h->dynindx == -1))
8528 {
8529 /* Uh oh, we are going to create a pic glink stub
8530 for an ifunc (here for h == NULL and later in
8531 finish_dynamic_symbol for h != NULL), and
8532 apparently are using code compiled with
8533 -mbss-plt. The difficulty is that -mbss-plt code
8534 gives no indication via a magic PLTREL24 addend
8535 whether r30 is equal to _GLOBAL_OFFSET_TABLE_ or
8536 is pointing into a .got2 section (and how far
8537 into .got2). */
8538 info->callbacks->einfo
8539 /* xgettext:c-format */
8540 (_("%X%H: unsupported bss-plt -fPIC ifunc %s\n"),
8541 input_bfd, input_section, rel->r_offset, sym_name);
8542 }
8543
8544 unresolved_reloc = FALSE;
8545 if (htab->plt_type == PLT_NEW
8546 || !htab->elf.dynamic_sections_created
8547 || h == NULL
8548 || h->dynindx == -1)
8549 relocation = (htab->glink->output_section->vma
8550 + htab->glink->output_offset
8551 + (ent->glink_offset & ~1));
8552 else
8553 relocation = (htab->elf.splt->output_section->vma
8554 + htab->elf.splt->output_offset
8555 + ent->plt.offset);
8556 }
8557 }
8558
8559 addend = rel->r_addend;
8560 save_unresolved_reloc = unresolved_reloc;
8561 howto = NULL;
8562 if (r_type < R_PPC_max)
8563 howto = ppc_elf_howto_table[r_type];
8564
8565 switch (r_type)
8566 {
8567 default:
8568 break;
8569
8570 case R_PPC_TPREL16_HA:
8571 if (htab->do_tls_opt && relocation + addend + 0x8000 < 0x10000)
8572 {
8573 bfd_byte *p = contents + (rel->r_offset & ~3);
8574 unsigned int insn = bfd_get_32 (input_bfd, p);
8575 if ((insn & ((0x3f << 26) | 0x1f << 16))
8576 != ((15u << 26) | (2 << 16)) /* addis rt,2,imm */)
8577 /* xgettext:c-format */
8578 info->callbacks->minfo
8579 (_("%H: warning: %s unexpected insn %#x.\n"),
8580 input_bfd, input_section, rel->r_offset, howto->name, insn);
8581 else
8582 bfd_put_32 (input_bfd, NOP, p);
8583 }
8584 break;
8585
8586 case R_PPC_TPREL16_LO:
8587 if (htab->do_tls_opt && relocation + addend + 0x8000 < 0x10000)
8588 {
8589 bfd_byte *p = contents + (rel->r_offset & ~3);
8590 unsigned int insn = bfd_get_32 (input_bfd, p);
8591 insn &= ~(0x1f << 16);
8592 insn |= 2 << 16;
8593 bfd_put_32 (input_bfd, insn, p);
8594 }
8595 break;
8596 }
8597
8598 tls_type = 0;
8599 switch (r_type)
8600 {
8601 default:
8602 /* xgettext:c-format */
8603 _bfd_error_handler (_("%pB: %s unsupported"),
8604 input_bfd, howto->name);
8605
8606 bfd_set_error (bfd_error_bad_value);
8607 ret = FALSE;
8608 goto copy_reloc;
8609
8610 case R_PPC_NONE:
8611 case R_PPC_TLS:
8612 case R_PPC_TLSGD:
8613 case R_PPC_TLSLD:
8614 case R_PPC_EMB_MRKREF:
8615 case R_PPC_GNU_VTINHERIT:
8616 case R_PPC_GNU_VTENTRY:
8617 goto copy_reloc;
8618
8619 /* GOT16 relocations. Like an ADDR16 using the symbol's
8620 address in the GOT as relocation value instead of the
8621 symbol's value itself. Also, create a GOT entry for the
8622 symbol and put the symbol value there. */
8623 case R_PPC_GOT_TLSGD16:
8624 case R_PPC_GOT_TLSGD16_LO:
8625 case R_PPC_GOT_TLSGD16_HI:
8626 case R_PPC_GOT_TLSGD16_HA:
8627 tls_type = TLS_TLS | TLS_GD;
8628 goto dogot;
8629
8630 case R_PPC_GOT_TLSLD16:
8631 case R_PPC_GOT_TLSLD16_LO:
8632 case R_PPC_GOT_TLSLD16_HI:
8633 case R_PPC_GOT_TLSLD16_HA:
8634 tls_type = TLS_TLS | TLS_LD;
8635 goto dogot;
8636
8637 case R_PPC_GOT_TPREL16:
8638 case R_PPC_GOT_TPREL16_LO:
8639 case R_PPC_GOT_TPREL16_HI:
8640 case R_PPC_GOT_TPREL16_HA:
8641 tls_type = TLS_TLS | TLS_TPREL;
8642 goto dogot;
8643
8644 case R_PPC_GOT_DTPREL16:
8645 case R_PPC_GOT_DTPREL16_LO:
8646 case R_PPC_GOT_DTPREL16_HI:
8647 case R_PPC_GOT_DTPREL16_HA:
8648 tls_type = TLS_TLS | TLS_DTPREL;
8649 goto dogot;
8650
8651 case R_PPC_GOT16:
8652 case R_PPC_GOT16_LO:
8653 case R_PPC_GOT16_HI:
8654 case R_PPC_GOT16_HA:
8655 tls_mask = 0;
8656 dogot:
8657 {
8658 /* Relocation is to the entry for this symbol in the global
8659 offset table. */
8660 bfd_vma off;
8661 bfd_vma *offp;
8662 unsigned long indx;
8663
8664 if (htab->elf.sgot == NULL)
8665 abort ();
8666
8667 indx = 0;
8668 if (tls_type == (TLS_TLS | TLS_LD)
8669 && (h == NULL
8670 || !h->def_dynamic))
8671 offp = &htab->tlsld_got.offset;
8672 else if (h != NULL)
8673 {
8674 if (!htab->elf.dynamic_sections_created
8675 || h->dynindx == -1
8676 || SYMBOL_REFERENCES_LOCAL (info, h)
8677 || UNDEFWEAK_NO_DYNAMIC_RELOC (info, h))
8678 /* This is actually a static link, or it is a
8679 -Bsymbolic link and the symbol is defined
8680 locally, or the symbol was forced to be local
8681 because of a version file. */
8682 ;
8683 else
8684 {
8685 indx = h->dynindx;
8686 unresolved_reloc = FALSE;
8687 }
8688 offp = &h->got.offset;
8689 }
8690 else
8691 {
8692 if (local_got_offsets == NULL)
8693 abort ();
8694 offp = &local_got_offsets[r_symndx];
8695 }
8696
8697 /* The offset must always be a multiple of 4. We use the
8698 least significant bit to record whether we have already
8699 processed this entry. */
8700 off = *offp;
8701 if ((off & 1) != 0)
8702 off &= ~1;
8703 else
8704 {
8705 unsigned int tls_m = ((tls_mask & TLS_TLS) != 0
8706 ? tls_mask & (TLS_LD | TLS_GD | TLS_DTPREL
8707 | TLS_TPREL | TLS_TPRELGD)
8708 : 0);
8709
8710 if (offp == &htab->tlsld_got.offset)
8711 tls_m = TLS_LD;
8712 else if (h == NULL
8713 || !h->def_dynamic)
8714 tls_m &= ~TLS_LD;
8715
8716 /* We might have multiple got entries for this sym.
8717 Initialize them all. */
8718 do
8719 {
8720 int tls_ty = 0;
8721
8722 if ((tls_m & TLS_LD) != 0)
8723 {
8724 tls_ty = TLS_TLS | TLS_LD;
8725 tls_m &= ~TLS_LD;
8726 }
8727 else if ((tls_m & TLS_GD) != 0)
8728 {
8729 tls_ty = TLS_TLS | TLS_GD;
8730 tls_m &= ~TLS_GD;
8731 }
8732 else if ((tls_m & TLS_DTPREL) != 0)
8733 {
8734 tls_ty = TLS_TLS | TLS_DTPREL;
8735 tls_m &= ~TLS_DTPREL;
8736 }
8737 else if ((tls_m & (TLS_TPREL | TLS_TPRELGD)) != 0)
8738 {
8739 tls_ty = TLS_TLS | TLS_TPREL;
8740 tls_m = 0;
8741 }
8742
8743 /* Generate relocs for the dynamic linker. */
8744 if (indx != 0
8745 || (bfd_link_pic (info)
8746 && (h == NULL
8747 || !UNDEFWEAK_NO_DYNAMIC_RELOC (info, h)
8748 || offp == &htab->tlsld_got.offset)
8749 && !(tls_ty == (TLS_TLS | TLS_TPREL)
8750 && bfd_link_executable (info)
8751 && SYMBOL_REFERENCES_LOCAL (info, h))))
8752 {
8753 asection *rsec = htab->elf.srelgot;
8754 bfd_byte * loc;
8755
8756 if (ifunc != NULL)
8757 {
8758 rsec = htab->elf.irelplt;
8759 if (indx == 0)
8760 htab->local_ifunc_resolver = 1;
8761 else if (is_static_defined (h))
8762 htab->maybe_local_ifunc_resolver = 1;
8763 }
8764 outrel.r_offset = (htab->elf.sgot->output_section->vma
8765 + htab->elf.sgot->output_offset
8766 + off);
8767 outrel.r_addend = 0;
8768 if (tls_ty & (TLS_LD | TLS_GD))
8769 {
8770 outrel.r_info = ELF32_R_INFO (indx, R_PPC_DTPMOD32);
8771 if (tls_ty == (TLS_TLS | TLS_GD))
8772 {
8773 loc = rsec->contents;
8774 loc += (rsec->reloc_count++
8775 * sizeof (Elf32_External_Rela));
8776 bfd_elf32_swap_reloca_out (output_bfd,
8777 &outrel, loc);
8778 outrel.r_offset += 4;
8779 outrel.r_info
8780 = ELF32_R_INFO (indx, R_PPC_DTPREL32);
8781 }
8782 }
8783 else if (tls_ty == (TLS_TLS | TLS_DTPREL))
8784 outrel.r_info = ELF32_R_INFO (indx, R_PPC_DTPREL32);
8785 else if (tls_ty == (TLS_TLS | TLS_TPREL))
8786 outrel.r_info = ELF32_R_INFO (indx, R_PPC_TPREL32);
8787 else if (indx != 0)
8788 outrel.r_info = ELF32_R_INFO (indx, R_PPC_GLOB_DAT);
8789 else if (ifunc != NULL)
8790 outrel.r_info = ELF32_R_INFO (0, R_PPC_IRELATIVE);
8791 else
8792 outrel.r_info = ELF32_R_INFO (0, R_PPC_RELATIVE);
8793 if (indx == 0 && tls_ty != (TLS_TLS | TLS_LD))
8794 {
8795 outrel.r_addend += relocation;
8796 if (tls_ty & (TLS_GD | TLS_DTPREL | TLS_TPREL))
8797 {
8798 if (htab->elf.tls_sec == NULL)
8799 outrel.r_addend = 0;
8800 else
8801 outrel.r_addend -= htab->elf.tls_sec->vma;
8802 }
8803 }
8804 loc = rsec->contents;
8805 loc += (rsec->reloc_count++
8806 * sizeof (Elf32_External_Rela));
8807 bfd_elf32_swap_reloca_out (output_bfd, &outrel, loc);
8808 }
8809
8810 /* Init the .got section contents if we're not
8811 emitting a reloc. */
8812 else
8813 {
8814 bfd_vma value = relocation;
8815
8816 if (tls_ty != 0)
8817 {
8818 if (htab->elf.tls_sec == NULL)
8819 value = 0;
8820 else
8821 {
8822 if (tls_ty & TLS_LD)
8823 value = 0;
8824 else
8825 value -= htab->elf.tls_sec->vma + DTP_OFFSET;
8826 if (tls_ty & TLS_TPREL)
8827 value += DTP_OFFSET - TP_OFFSET;
8828 }
8829
8830 if (tls_ty & (TLS_LD | TLS_GD))
8831 {
8832 bfd_put_32 (input_bfd, value,
8833 htab->elf.sgot->contents + off + 4);
8834 value = 1;
8835 }
8836 }
8837 bfd_put_32 (input_bfd, value,
8838 htab->elf.sgot->contents + off);
8839 }
8840
8841 off += 4;
8842 if (tls_ty & (TLS_LD | TLS_GD))
8843 off += 4;
8844 }
8845 while (tls_m != 0);
8846
8847 off = *offp;
8848 *offp = off | 1;
8849 }
8850
8851 if (off >= (bfd_vma) -2)
8852 abort ();
8853
8854 if ((tls_type & TLS_TLS) != 0)
8855 {
8856 if (tls_type != (TLS_TLS | TLS_LD))
8857 {
8858 if ((tls_mask & TLS_LD) != 0
8859 && !(h == NULL
8860 || !h->def_dynamic))
8861 off += 8;
8862 if (tls_type != (TLS_TLS | TLS_GD))
8863 {
8864 if ((tls_mask & TLS_GD) != 0)
8865 off += 8;
8866 if (tls_type != (TLS_TLS | TLS_DTPREL))
8867 {
8868 if ((tls_mask & TLS_DTPREL) != 0)
8869 off += 4;
8870 }
8871 }
8872 }
8873 }
8874
8875 /* If here for a picfixup, we're done. */
8876 if (r_type != ELF32_R_TYPE (rel->r_info))
8877 goto copy_reloc;
8878
8879 relocation = (htab->elf.sgot->output_section->vma
8880 + htab->elf.sgot->output_offset
8881 + off
8882 - SYM_VAL (htab->elf.hgot));
8883
8884 /* Addends on got relocations don't make much sense.
8885 x+off@got is actually x@got+off, and since the got is
8886 generated by a hash table traversal, the value in the
8887 got at entry m+n bears little relation to the entry m. */
8888 if (addend != 0)
8889 info->callbacks->einfo
8890 /* xgettext:c-format */
8891 (_("%H: non-zero addend on %s reloc against `%s'\n"),
8892 input_bfd, input_section, rel->r_offset,
8893 howto->name,
8894 sym_name);
8895 }
8896 break;
8897
8898 /* Relocations that need no special processing. */
8899 case R_PPC_LOCAL24PC:
8900 /* It makes no sense to point a local relocation
8901 at a symbol not in this object. */
8902 if (unresolved_reloc)
8903 {
8904 (*info->callbacks->undefined_symbol) (info,
8905 h->root.root.string,
8906 input_bfd,
8907 input_section,
8908 rel->r_offset,
8909 TRUE);
8910 goto copy_reloc;
8911 }
8912 if (h != NULL && h->type == STT_GNU_IFUNC && bfd_link_pic (info))
8913 {
8914 /* @local on an ifunc does not really make sense since
8915 the ifunc resolver can take you anywhere. More
8916 seriously, calls to ifuncs must go through a plt call
8917 stub, and for pic the plt call stubs uses r30 to
8918 access the PLT. The problem is that a call that is
8919 local won't have the +32k reloc addend trick marking
8920 -fPIC code, so the linker won't know whether r30 is
8921 _GLOBAL_OFFSET_TABLE_ or pointing into a .got2 section. */
8922 /* xgettext:c-format */
8923 info->callbacks->einfo (_("%X%H: @local call to ifunc %s\n"),
8924 input_bfd, input_section, rel->r_offset,
8925 h->root.root.string);
8926 }
8927 break;
8928
8929 case R_PPC_DTPREL16:
8930 case R_PPC_DTPREL16_LO:
8931 case R_PPC_DTPREL16_HI:
8932 case R_PPC_DTPREL16_HA:
8933 if (htab->elf.tls_sec != NULL)
8934 addend -= htab->elf.tls_sec->vma + DTP_OFFSET;
8935 break;
8936
8937 /* Relocations that may need to be propagated if this is a shared
8938 object. */
8939 case R_PPC_TPREL16:
8940 case R_PPC_TPREL16_LO:
8941 case R_PPC_TPREL16_HI:
8942 case R_PPC_TPREL16_HA:
8943 if (h != NULL
8944 && h->root.type == bfd_link_hash_undefweak
8945 && h->dynindx == -1)
8946 {
8947 /* Make this relocation against an undefined weak symbol
8948 resolve to zero. This is really just a tweak, since
8949 code using weak externs ought to check that they are
8950 defined before using them. */
8951 bfd_byte *p = contents + rel->r_offset - d_offset;
8952 unsigned int insn = bfd_get_32 (input_bfd, p);
8953 insn = _bfd_elf_ppc_at_tprel_transform (insn, 2);
8954 if (insn != 0)
8955 bfd_put_32 (input_bfd, insn, p);
8956 break;
8957 }
8958 if (htab->elf.tls_sec != NULL)
8959 addend -= htab->elf.tls_sec->vma + TP_OFFSET;
8960 /* The TPREL16 relocs shouldn't really be used in shared
8961 libs or with non-local symbols as that will result in
8962 DT_TEXTREL being set, but support them anyway. */
8963 goto dodyn;
8964
8965 case R_PPC_TPREL32:
8966 if (htab->elf.tls_sec != NULL)
8967 addend -= htab->elf.tls_sec->vma + TP_OFFSET;
8968 goto dodyn;
8969
8970 case R_PPC_DTPREL32:
8971 if (htab->elf.tls_sec != NULL)
8972 addend -= htab->elf.tls_sec->vma + DTP_OFFSET;
8973 goto dodyn;
8974
8975 case R_PPC_DTPMOD32:
8976 relocation = 1;
8977 addend = 0;
8978 goto dodyn;
8979
8980 case R_PPC_REL16:
8981 case R_PPC_REL16_LO:
8982 case R_PPC_REL16_HI:
8983 case R_PPC_REL16_HA:
8984 case R_PPC_REL16DX_HA:
8985 break;
8986
8987 case R_PPC_REL32:
8988 if (h == NULL || h == htab->elf.hgot)
8989 break;
8990 /* fall through */
8991
8992 case R_PPC_ADDR32:
8993 case R_PPC_ADDR16:
8994 case R_PPC_ADDR16_LO:
8995 case R_PPC_ADDR16_HI:
8996 case R_PPC_ADDR16_HA:
8997 case R_PPC_UADDR32:
8998 case R_PPC_UADDR16:
8999 goto dodyn;
9000
9001 case R_PPC_VLE_REL8:
9002 case R_PPC_VLE_REL15:
9003 case R_PPC_VLE_REL24:
9004 case R_PPC_REL24:
9005 case R_PPC_REL14:
9006 case R_PPC_REL14_BRTAKEN:
9007 case R_PPC_REL14_BRNTAKEN:
9008 /* If these relocations are not to a named symbol, they can be
9009 handled right here, no need to bother the dynamic linker. */
9010 if (SYMBOL_CALLS_LOCAL (info, h)
9011 || h == htab->elf.hgot)
9012 break;
9013 /* fall through */
9014
9015 case R_PPC_ADDR24:
9016 case R_PPC_ADDR14:
9017 case R_PPC_ADDR14_BRTAKEN:
9018 case R_PPC_ADDR14_BRNTAKEN:
9019 if (h != NULL && !bfd_link_pic (info))
9020 break;
9021 /* fall through */
9022
9023 dodyn:
9024 if ((input_section->flags & SEC_ALLOC) == 0
9025 || is_vxworks_tls)
9026 break;
9027
9028 if (bfd_link_pic (info)
9029 ? ((h == NULL
9030 || ppc_elf_hash_entry (h)->dyn_relocs != NULL)
9031 && ((h != NULL && pc_dynrelocs (h))
9032 || must_be_dyn_reloc (info, r_type)))
9033 : (h != NULL
9034 && ppc_elf_hash_entry (h)->dyn_relocs != NULL))
9035 {
9036 int skip;
9037 bfd_byte *loc;
9038 asection *sreloc;
9039 long indx = 0;
9040
9041 #ifdef DEBUG
9042 fprintf (stderr, "ppc_elf_relocate_section needs to "
9043 "create relocation for %s\n",
9044 (h && h->root.root.string
9045 ? h->root.root.string : "<unknown>"));
9046 #endif
9047
9048 /* When generating a shared object, these relocations
9049 are copied into the output file to be resolved at run
9050 time. */
9051 skip = 0;
9052 outrel.r_offset = _bfd_elf_section_offset (output_bfd, info,
9053 input_section,
9054 rel->r_offset);
9055 if (outrel.r_offset == (bfd_vma) -1
9056 || outrel.r_offset == (bfd_vma) -2)
9057 skip = (int) outrel.r_offset;
9058 outrel.r_offset += (input_section->output_section->vma
9059 + input_section->output_offset);
9060
9061 if (skip)
9062 memset (&outrel, 0, sizeof outrel);
9063 else if (!SYMBOL_REFERENCES_LOCAL (info, h))
9064 {
9065 indx = h->dynindx;
9066 BFD_ASSERT (indx != -1);
9067 unresolved_reloc = FALSE;
9068 outrel.r_info = ELF32_R_INFO (indx, r_type);
9069 outrel.r_addend = rel->r_addend;
9070 }
9071 else
9072 {
9073 outrel.r_addend = relocation + rel->r_addend;
9074
9075 if (r_type != R_PPC_ADDR32)
9076 {
9077 if (ifunc != NULL)
9078 {
9079 /* If we get here when building a static
9080 executable, then the libc startup function
9081 responsible for applying indirect function
9082 relocations is going to complain about
9083 the reloc type.
9084 If we get here when building a dynamic
9085 executable, it will be because we have
9086 a text relocation. The dynamic loader
9087 will set the text segment writable and
9088 non-executable to apply text relocations.
9089 So we'll segfault when trying to run the
9090 indirection function to resolve the reloc. */
9091 info->callbacks->einfo
9092 /* xgettext:c-format */
9093 (_("%H: relocation %s for indirect "
9094 "function %s unsupported\n"),
9095 input_bfd, input_section, rel->r_offset,
9096 howto->name,
9097 sym_name);
9098 ret = FALSE;
9099 }
9100 else if (r_symndx == STN_UNDEF || bfd_is_abs_section (sec))
9101 ;
9102 else if (sec == NULL || sec->owner == NULL)
9103 {
9104 bfd_set_error (bfd_error_bad_value);
9105 ret = FALSE;
9106 }
9107 else
9108 {
9109 asection *osec;
9110
9111 /* We are turning this relocation into one
9112 against a section symbol. It would be
9113 proper to subtract the symbol's value,
9114 osec->vma, from the emitted reloc addend,
9115 but ld.so expects buggy relocs.
9116 FIXME: Why not always use a zero index? */
9117 osec = sec->output_section;
9118 indx = elf_section_data (osec)->dynindx;
9119 if (indx == 0)
9120 {
9121 osec = htab->elf.text_index_section;
9122 indx = elf_section_data (osec)->dynindx;
9123 }
9124 BFD_ASSERT (indx != 0);
9125 #ifdef DEBUG
9126 if (indx == 0)
9127 printf ("indx=%ld section=%s flags=%08x name=%s\n",
9128 indx, osec->name, osec->flags,
9129 h->root.root.string);
9130 #endif
9131 }
9132
9133 outrel.r_info = ELF32_R_INFO (indx, r_type);
9134 }
9135 else if (ifunc != NULL)
9136 outrel.r_info = ELF32_R_INFO (0, R_PPC_IRELATIVE);
9137 else
9138 outrel.r_info = ELF32_R_INFO (0, R_PPC_RELATIVE);
9139 }
9140
9141 sreloc = elf_section_data (input_section)->sreloc;
9142 if (ifunc)
9143 {
9144 sreloc = htab->elf.irelplt;
9145 if (indx == 0)
9146 htab->local_ifunc_resolver = 1;
9147 else if (is_static_defined (h))
9148 htab->maybe_local_ifunc_resolver = 1;
9149 }
9150 if (sreloc == NULL)
9151 return FALSE;
9152
9153 loc = sreloc->contents;
9154 loc += sreloc->reloc_count++ * sizeof (Elf32_External_Rela);
9155 bfd_elf32_swap_reloca_out (output_bfd, &outrel, loc);
9156
9157 if (skip == -1)
9158 goto copy_reloc;
9159
9160 /* This reloc will be computed at runtime. Clear the memory
9161 so that it contains a predictable value for prelink. */
9162 if (!skip)
9163 {
9164 relocation = howto->pc_relative ? outrel.r_offset : 0;
9165 addend = 0;
9166 break;
9167 }
9168 }
9169 break;
9170
9171 case R_PPC_RELAX_PLT:
9172 case R_PPC_RELAX_PLTREL24:
9173 if (h != NULL)
9174 {
9175 struct plt_entry *ent;
9176 bfd_vma got2_addend = 0;
9177
9178 if (r_type == R_PPC_RELAX_PLTREL24)
9179 {
9180 if (bfd_link_pic (info))
9181 got2_addend = addend;
9182 addend = 0;
9183 }
9184 ent = find_plt_ent (&h->plt.plist, got2, got2_addend);
9185 if (htab->plt_type == PLT_NEW)
9186 relocation = (htab->glink->output_section->vma
9187 + htab->glink->output_offset
9188 + ent->glink_offset);
9189 else
9190 relocation = (htab->elf.splt->output_section->vma
9191 + htab->elf.splt->output_offset
9192 + ent->plt.offset);
9193 }
9194 /* Fall through. */
9195
9196 case R_PPC_RELAX:
9197 {
9198 const int *stub;
9199 size_t size;
9200 size_t insn_offset = rel->r_offset;
9201 unsigned int insn;
9202
9203 if (bfd_link_pic (info))
9204 {
9205 relocation -= (input_section->output_section->vma
9206 + input_section->output_offset
9207 + rel->r_offset - 4);
9208 stub = shared_stub_entry;
9209 bfd_put_32 (input_bfd, stub[0], contents + insn_offset - 12);
9210 bfd_put_32 (input_bfd, stub[1], contents + insn_offset - 8);
9211 bfd_put_32 (input_bfd, stub[2], contents + insn_offset - 4);
9212 stub += 3;
9213 size = ARRAY_SIZE (shared_stub_entry) - 3;
9214 }
9215 else
9216 {
9217 stub = stub_entry;
9218 size = ARRAY_SIZE (stub_entry);
9219 }
9220
9221 relocation += addend;
9222 if (bfd_link_relocatable (info))
9223 relocation = 0;
9224
9225 /* First insn is HA, second is LO. */
9226 insn = *stub++;
9227 insn |= ((relocation + 0x8000) >> 16) & 0xffff;
9228 bfd_put_32 (input_bfd, insn, contents + insn_offset);
9229 insn_offset += 4;
9230
9231 insn = *stub++;
9232 insn |= relocation & 0xffff;
9233 bfd_put_32 (input_bfd, insn, contents + insn_offset);
9234 insn_offset += 4;
9235 size -= 2;
9236
9237 while (size != 0)
9238 {
9239 insn = *stub++;
9240 --size;
9241 bfd_put_32 (input_bfd, insn, contents + insn_offset);
9242 insn_offset += 4;
9243 }
9244
9245 /* Rewrite the reloc and convert one of the trailing nop
9246 relocs to describe this relocation. */
9247 BFD_ASSERT (ELF32_R_TYPE (relend[-1].r_info) == R_PPC_NONE);
9248 /* The relocs are at the bottom 2 bytes */
9249 wrel->r_offset = rel->r_offset + d_offset;
9250 wrel->r_info = ELF32_R_INFO (r_symndx, R_PPC_ADDR16_HA);
9251 wrel->r_addend = rel->r_addend;
9252 memmove (wrel + 1, wrel, (relend - wrel - 1) * sizeof (*wrel));
9253 wrel++, rel++;
9254 wrel->r_offset += 4;
9255 wrel->r_info = ELF32_R_INFO (r_symndx, R_PPC_ADDR16_LO);
9256 }
9257 continue;
9258
9259 /* Indirect .sdata relocation. */
9260 case R_PPC_EMB_SDAI16:
9261 BFD_ASSERT (htab->sdata[0].section != NULL);
9262 if (!is_static_defined (htab->sdata[0].sym))
9263 {
9264 unresolved_reloc = TRUE;
9265 break;
9266 }
9267 relocation
9268 = elf_finish_pointer_linker_section (input_bfd, &htab->sdata[0],
9269 h, relocation, rel);
9270 addend = 0;
9271 break;
9272
9273 /* Indirect .sdata2 relocation. */
9274 case R_PPC_EMB_SDA2I16:
9275 BFD_ASSERT (htab->sdata[1].section != NULL);
9276 if (!is_static_defined (htab->sdata[1].sym))
9277 {
9278 unresolved_reloc = TRUE;
9279 break;
9280 }
9281 relocation
9282 = elf_finish_pointer_linker_section (input_bfd, &htab->sdata[1],
9283 h, relocation, rel);
9284 addend = 0;
9285 break;
9286
9287 /* Handle the TOC16 reloc. We want to use the offset within the .got
9288 section, not the actual VMA. This is appropriate when generating
9289 an embedded ELF object, for which the .got section acts like the
9290 AIX .toc section. */
9291 case R_PPC_TOC16: /* phony GOT16 relocations */
9292 if (sec == NULL || sec->output_section == NULL)
9293 {
9294 unresolved_reloc = TRUE;
9295 break;
9296 }
9297 BFD_ASSERT (strcmp (bfd_get_section_name (sec->owner, sec),
9298 ".got") == 0
9299 || strcmp (bfd_get_section_name (sec->owner, sec),
9300 ".cgot") == 0);
9301
9302 addend -= sec->output_section->vma + sec->output_offset + 0x8000;
9303 break;
9304
9305 case R_PPC_PLTREL24:
9306 if (h != NULL && ifunc == NULL)
9307 {
9308 struct plt_entry *ent;
9309
9310 ent = find_plt_ent (&h->plt.plist, got2,
9311 bfd_link_pic (info) ? addend : 0);
9312 if (ent == NULL
9313 || htab->elf.splt == NULL)
9314 {
9315 /* We didn't make a PLT entry for this symbol. This
9316 happens when statically linking PIC code, or when
9317 using -Bsymbolic. */
9318 }
9319 else
9320 {
9321 /* Relocation is to the entry for this symbol in the
9322 procedure linkage table. */
9323 unresolved_reloc = FALSE;
9324 if (htab->plt_type == PLT_NEW)
9325 relocation = (htab->glink->output_section->vma
9326 + htab->glink->output_offset
9327 + ent->glink_offset);
9328 else
9329 relocation = (htab->elf.splt->output_section->vma
9330 + htab->elf.splt->output_offset
9331 + ent->plt.offset);
9332 }
9333 }
9334
9335 /* R_PPC_PLTREL24 is rather special. If non-zero, the
9336 addend specifies the GOT pointer offset within .got2.
9337 Don't apply it to the relocation field. */
9338 addend = 0;
9339 break;
9340
9341 case R_PPC_PLTSEQ:
9342 case R_PPC_PLTCALL:
9343 case R_PPC_PLT16_LO:
9344 case R_PPC_PLT16_HI:
9345 case R_PPC_PLT16_HA:
9346 plt_list = NULL;
9347 if (h != NULL)
9348 plt_list = &h->plt.plist;
9349 else if (ifunc != NULL)
9350 plt_list = ifunc;
9351 else if (local_got_offsets != NULL)
9352 {
9353 struct plt_entry **local_plt;
9354 local_plt = (struct plt_entry **) (local_got_offsets
9355 + symtab_hdr->sh_info);
9356 plt_list = local_plt + r_symndx;
9357 }
9358 unresolved_reloc = TRUE;
9359 if (plt_list != NULL)
9360 {
9361 struct plt_entry *ent;
9362
9363 ent = find_plt_ent (plt_list, got2,
9364 bfd_link_pic (info) ? addend : 0);
9365 if (ent != NULL && ent->plt.offset != (bfd_vma) -1)
9366 {
9367 asection *plt;
9368
9369 unresolved_reloc = FALSE;
9370 plt = htab->elf.splt;
9371 if (!htab->elf.dynamic_sections_created
9372 || h == NULL
9373 || h->dynindx == -1)
9374 {
9375 if (ifunc != NULL)
9376 plt = htab->elf.iplt;
9377 else
9378 plt = htab->pltlocal;
9379 }
9380 relocation = (plt->output_section->vma
9381 + plt->output_offset
9382 + ent->plt.offset);
9383 if (bfd_link_pic (info))
9384 {
9385 bfd_vma got = 0;
9386
9387 if (ent->addend >= 32768)
9388 got = (ent->addend
9389 + ent->sec->output_section->vma
9390 + ent->sec->output_offset);
9391 else
9392 got = SYM_VAL (htab->elf.hgot);
9393 relocation -= got;
9394 }
9395 }
9396 }
9397 addend = 0;
9398 break;
9399
9400 /* Relocate against _SDA_BASE_. */
9401 case R_PPC_SDAREL16:
9402 {
9403 const char *name;
9404 struct elf_link_hash_entry *sda = htab->sdata[0].sym;
9405
9406 if (sec == NULL
9407 || sec->output_section == NULL
9408 || !is_static_defined (sda))
9409 {
9410 unresolved_reloc = TRUE;
9411 break;
9412 }
9413 addend -= SYM_VAL (sda);
9414
9415 name = bfd_get_section_name (output_bfd, sec->output_section);
9416 if (!(strcmp (name, ".sdata") == 0
9417 || strcmp (name, ".sbss") == 0))
9418 {
9419 _bfd_error_handler
9420 /* xgettext:c-format */
9421 (_("%pB: the target (%s) of a %s relocation is "
9422 "in the wrong output section (%s)"),
9423 input_bfd,
9424 sym_name,
9425 howto->name,
9426 name);
9427 }
9428 }
9429 break;
9430
9431 /* Relocate against _SDA2_BASE_. */
9432 case R_PPC_EMB_SDA2REL:
9433 {
9434 const char *name;
9435 struct elf_link_hash_entry *sda = htab->sdata[1].sym;
9436
9437 if (sec == NULL
9438 || sec->output_section == NULL
9439 || !is_static_defined (sda))
9440 {
9441 unresolved_reloc = TRUE;
9442 break;
9443 }
9444 addend -= SYM_VAL (sda);
9445
9446 name = bfd_get_section_name (output_bfd, sec->output_section);
9447 if (!(strcmp (name, ".sdata2") == 0
9448 || strcmp (name, ".sbss2") == 0))
9449 {
9450 _bfd_error_handler
9451 /* xgettext:c-format */
9452 (_("%pB: the target (%s) of a %s relocation is "
9453 "in the wrong output section (%s)"),
9454 input_bfd,
9455 sym_name,
9456 howto->name,
9457 name);
9458 }
9459 }
9460 break;
9461
9462 case R_PPC_VLE_LO16A:
9463 relocation = relocation + addend;
9464 ppc_elf_vle_split16 (input_bfd, input_section, rel->r_offset,
9465 contents + rel->r_offset, relocation,
9466 split16a_type, htab->params->vle_reloc_fixup);
9467 goto copy_reloc;
9468
9469 case R_PPC_VLE_LO16D:
9470 relocation = relocation + addend;
9471 ppc_elf_vle_split16 (input_bfd, input_section, rel->r_offset,
9472 contents + rel->r_offset, relocation,
9473 split16d_type, htab->params->vle_reloc_fixup);
9474 goto copy_reloc;
9475
9476 case R_PPC_VLE_HI16A:
9477 relocation = (relocation + addend) >> 16;
9478 ppc_elf_vle_split16 (input_bfd, input_section, rel->r_offset,
9479 contents + rel->r_offset, relocation,
9480 split16a_type, htab->params->vle_reloc_fixup);
9481 goto copy_reloc;
9482
9483 case R_PPC_VLE_HI16D:
9484 relocation = (relocation + addend) >> 16;
9485 ppc_elf_vle_split16 (input_bfd, input_section, rel->r_offset,
9486 contents + rel->r_offset, relocation,
9487 split16d_type, htab->params->vle_reloc_fixup);
9488 goto copy_reloc;
9489
9490 case R_PPC_VLE_HA16A:
9491 relocation = (relocation + addend + 0x8000) >> 16;
9492 ppc_elf_vle_split16 (input_bfd, input_section, rel->r_offset,
9493 contents + rel->r_offset, relocation,
9494 split16a_type, htab->params->vle_reloc_fixup);
9495 goto copy_reloc;
9496
9497 case R_PPC_VLE_HA16D:
9498 relocation = (relocation + addend + 0x8000) >> 16;
9499 ppc_elf_vle_split16 (input_bfd, input_section, rel->r_offset,
9500 contents + rel->r_offset, relocation,
9501 split16d_type, htab->params->vle_reloc_fixup);
9502 goto copy_reloc;
9503
9504 /* Relocate against either _SDA_BASE_, _SDA2_BASE_, or 0. */
9505 case R_PPC_EMB_SDA21:
9506 case R_PPC_VLE_SDA21:
9507 case R_PPC_EMB_RELSDA:
9508 case R_PPC_VLE_SDA21_LO:
9509 {
9510 const char *name;
9511 int reg;
9512 unsigned int insn;
9513 struct elf_link_hash_entry *sda = NULL;
9514
9515 if (sec == NULL || sec->output_section == NULL)
9516 {
9517 unresolved_reloc = TRUE;
9518 break;
9519 }
9520
9521 name = bfd_get_section_name (output_bfd, sec->output_section);
9522 if (strcmp (name, ".sdata") == 0
9523 || strcmp (name, ".sbss") == 0)
9524 {
9525 reg = 13;
9526 sda = htab->sdata[0].sym;
9527 }
9528 else if (strcmp (name, ".sdata2") == 0
9529 || strcmp (name, ".sbss2") == 0)
9530 {
9531 reg = 2;
9532 sda = htab->sdata[1].sym;
9533 }
9534 else if (strcmp (name, ".PPC.EMB.sdata0") == 0
9535 || strcmp (name, ".PPC.EMB.sbss0") == 0)
9536 {
9537 reg = 0;
9538 }
9539 else
9540 {
9541 _bfd_error_handler
9542 /* xgettext:c-format */
9543 (_("%pB: the target (%s) of a %s relocation is "
9544 "in the wrong output section (%s)"),
9545 input_bfd,
9546 sym_name,
9547 howto->name,
9548 name);
9549
9550 bfd_set_error (bfd_error_bad_value);
9551 ret = FALSE;
9552 goto copy_reloc;
9553 }
9554
9555 if (sda != NULL)
9556 {
9557 if (!is_static_defined (sda))
9558 {
9559 unresolved_reloc = TRUE;
9560 break;
9561 }
9562 addend -= SYM_VAL (sda);
9563 }
9564
9565 insn = bfd_get_32 (input_bfd, contents + rel->r_offset);
9566 if (reg == 0
9567 && (r_type == R_PPC_VLE_SDA21
9568 || r_type == R_PPC_VLE_SDA21_LO))
9569 {
9570 relocation = relocation + addend;
9571 addend = 0;
9572
9573 /* Force e_li insn, keeping RT from original insn. */
9574 insn &= 0x1f << 21;
9575 insn |= 28u << 26;
9576
9577 /* We have an li20 field, bits 17..20, 11..15, 21..31. */
9578 /* Top 4 bits of value to 17..20. */
9579 insn |= (relocation & 0xf0000) >> 5;
9580 /* Next 5 bits of the value to 11..15. */
9581 insn |= (relocation & 0xf800) << 5;
9582 /* And the final 11 bits of the value to bits 21 to 31. */
9583 insn |= relocation & 0x7ff;
9584
9585 bfd_put_32 (input_bfd, insn, contents + rel->r_offset);
9586
9587 if (r_type == R_PPC_VLE_SDA21
9588 && ((relocation + 0x80000) & 0xffffffff) > 0x100000)
9589 goto overflow;
9590 goto copy_reloc;
9591 }
9592 else if (r_type == R_PPC_EMB_SDA21
9593 || r_type == R_PPC_VLE_SDA21
9594 || r_type == R_PPC_VLE_SDA21_LO)
9595 {
9596 /* Fill in register field. */
9597 insn = (insn & ~RA_REGISTER_MASK) | (reg << RA_REGISTER_SHIFT);
9598 }
9599 bfd_put_32 (input_bfd, insn, contents + rel->r_offset);
9600 }
9601 break;
9602
9603 case R_PPC_VLE_SDAREL_LO16A:
9604 case R_PPC_VLE_SDAREL_LO16D:
9605 case R_PPC_VLE_SDAREL_HI16A:
9606 case R_PPC_VLE_SDAREL_HI16D:
9607 case R_PPC_VLE_SDAREL_HA16A:
9608 case R_PPC_VLE_SDAREL_HA16D:
9609 {
9610 bfd_vma value;
9611 const char *name;
9612 struct elf_link_hash_entry *sda = NULL;
9613
9614 if (sec == NULL || sec->output_section == NULL)
9615 {
9616 unresolved_reloc = TRUE;
9617 break;
9618 }
9619
9620 name = bfd_get_section_name (output_bfd, sec->output_section);
9621 if (strcmp (name, ".sdata") == 0
9622 || strcmp (name, ".sbss") == 0)
9623 sda = htab->sdata[0].sym;
9624 else if (strcmp (name, ".sdata2") == 0
9625 || strcmp (name, ".sbss2") == 0)
9626 sda = htab->sdata[1].sym;
9627 else
9628 {
9629 _bfd_error_handler
9630 /* xgettext:c-format */
9631 (_("%pB: the target (%s) of a %s relocation is "
9632 "in the wrong output section (%s)"),
9633 input_bfd,
9634 sym_name,
9635 howto->name,
9636 name);
9637
9638 bfd_set_error (bfd_error_bad_value);
9639 ret = FALSE;
9640 goto copy_reloc;
9641 }
9642
9643 if (sda == NULL || !is_static_defined (sda))
9644 {
9645 unresolved_reloc = TRUE;
9646 break;
9647 }
9648 value = relocation + addend - SYM_VAL (sda);
9649
9650 if (r_type == R_PPC_VLE_SDAREL_LO16A)
9651 ppc_elf_vle_split16 (input_bfd, input_section, rel->r_offset,
9652 contents + rel->r_offset, value,
9653 split16a_type,
9654 htab->params->vle_reloc_fixup);
9655 else if (r_type == R_PPC_VLE_SDAREL_LO16D)
9656 ppc_elf_vle_split16 (input_bfd, input_section, rel->r_offset,
9657 contents + rel->r_offset, value,
9658 split16d_type,
9659 htab->params->vle_reloc_fixup);
9660 else if (r_type == R_PPC_VLE_SDAREL_HI16A)
9661 {
9662 value = value >> 16;
9663 ppc_elf_vle_split16 (input_bfd, input_section, rel->r_offset,
9664 contents + rel->r_offset, value,
9665 split16a_type,
9666 htab->params->vle_reloc_fixup);
9667 }
9668 else if (r_type == R_PPC_VLE_SDAREL_HI16D)
9669 {
9670 value = value >> 16;
9671 ppc_elf_vle_split16 (input_bfd, input_section, rel->r_offset,
9672 contents + rel->r_offset, value,
9673 split16d_type,
9674 htab->params->vle_reloc_fixup);
9675 }
9676 else if (r_type == R_PPC_VLE_SDAREL_HA16A)
9677 {
9678 value = (value + 0x8000) >> 16;
9679 ppc_elf_vle_split16 (input_bfd, input_section, rel->r_offset,
9680 contents + rel->r_offset, value,
9681 split16a_type,
9682 htab->params->vle_reloc_fixup);
9683 }
9684 else if (r_type == R_PPC_VLE_SDAREL_HA16D)
9685 {
9686 value = (value + 0x8000) >> 16;
9687 ppc_elf_vle_split16 (input_bfd, input_section, rel->r_offset,
9688 contents + rel->r_offset, value,
9689 split16d_type,
9690 htab->params->vle_reloc_fixup);
9691 }
9692 }
9693 goto copy_reloc;
9694
9695 case R_PPC_VLE_ADDR20:
9696 ppc_elf_vle_split20 (output_bfd, contents + rel->r_offset, relocation);
9697 continue;
9698
9699 /* Relocate against the beginning of the section. */
9700 case R_PPC_SECTOFF:
9701 case R_PPC_SECTOFF_LO:
9702 case R_PPC_SECTOFF_HI:
9703 case R_PPC_SECTOFF_HA:
9704 if (sec == NULL || sec->output_section == NULL)
9705 {
9706 unresolved_reloc = TRUE;
9707 break;
9708 }
9709 addend -= sec->output_section->vma;
9710 break;
9711
9712 /* Negative relocations. */
9713 case R_PPC_EMB_NADDR32:
9714 case R_PPC_EMB_NADDR16:
9715 case R_PPC_EMB_NADDR16_LO:
9716 case R_PPC_EMB_NADDR16_HI:
9717 case R_PPC_EMB_NADDR16_HA:
9718 addend -= 2 * relocation;
9719 break;
9720
9721 case R_PPC_COPY:
9722 case R_PPC_GLOB_DAT:
9723 case R_PPC_JMP_SLOT:
9724 case R_PPC_RELATIVE:
9725 case R_PPC_IRELATIVE:
9726 case R_PPC_PLT32:
9727 case R_PPC_PLTREL32:
9728 case R_PPC_ADDR30:
9729 case R_PPC_EMB_RELSEC16:
9730 case R_PPC_EMB_RELST_LO:
9731 case R_PPC_EMB_RELST_HI:
9732 case R_PPC_EMB_RELST_HA:
9733 case R_PPC_EMB_BIT_FLD:
9734 /* xgettext:c-format */
9735 _bfd_error_handler (_("%pB: %s unsupported"),
9736 input_bfd, howto->name);
9737
9738 bfd_set_error (bfd_error_invalid_operation);
9739 ret = FALSE;
9740 goto copy_reloc;
9741 }
9742
9743 switch (r_type)
9744 {
9745 default:
9746 break;
9747
9748 case R_PPC_PLTCALL:
9749 if (unresolved_reloc)
9750 {
9751 bfd_byte *p = contents + rel->r_offset;
9752 unsigned int insn = bfd_get_32 (input_bfd, p);
9753 insn &= 1;
9754 bfd_put_32 (input_bfd, B | insn, p);
9755 unresolved_reloc = save_unresolved_reloc;
9756 r_type = R_PPC_REL24;
9757 howto = ppc_elf_howto_table[r_type];
9758 }
9759 else if (htab->plt_type != PLT_NEW)
9760 info->callbacks->einfo
9761 (_("%P: %H: %s relocation unsupported for bss-plt\n"),
9762 input_bfd, input_section, rel->r_offset,
9763 howto->name);
9764 break;
9765
9766 case R_PPC_PLTSEQ:
9767 case R_PPC_PLT16_HA:
9768 case R_PPC_PLT16_LO:
9769 if (unresolved_reloc)
9770 {
9771 bfd_byte *p = contents + (rel->r_offset & ~3);
9772 bfd_put_32 (input_bfd, NOP, p);
9773 unresolved_reloc = FALSE;
9774 r_type = R_PPC_NONE;
9775 howto = ppc_elf_howto_table[r_type];
9776 }
9777 else if (htab->plt_type != PLT_NEW)
9778 info->callbacks->einfo
9779 (_("%P: %H: %s relocation unsupported for bss-plt\n"),
9780 input_bfd, input_section, rel->r_offset,
9781 howto->name);
9782 break;
9783 }
9784
9785 /* Do any further special processing. */
9786 switch (r_type)
9787 {
9788 default:
9789 break;
9790
9791 case R_PPC_ADDR16_HA:
9792 case R_PPC_REL16_HA:
9793 case R_PPC_REL16DX_HA:
9794 case R_PPC_SECTOFF_HA:
9795 case R_PPC_TPREL16_HA:
9796 case R_PPC_DTPREL16_HA:
9797 case R_PPC_EMB_NADDR16_HA:
9798 case R_PPC_EMB_RELST_HA:
9799 /* It's just possible that this symbol is a weak symbol
9800 that's not actually defined anywhere. In that case,
9801 'sec' would be NULL, and we should leave the symbol
9802 alone (it will be set to zero elsewhere in the link). */
9803 if (sec == NULL)
9804 break;
9805 /* Fall through. */
9806
9807 case R_PPC_PLT16_HA:
9808 case R_PPC_GOT16_HA:
9809 case R_PPC_GOT_TLSGD16_HA:
9810 case R_PPC_GOT_TLSLD16_HA:
9811 case R_PPC_GOT_TPREL16_HA:
9812 case R_PPC_GOT_DTPREL16_HA:
9813 /* Add 0x10000 if sign bit in 0:15 is set.
9814 Bits 0:15 are not used. */
9815 addend += 0x8000;
9816 break;
9817
9818 case R_PPC_ADDR16:
9819 case R_PPC_ADDR16_LO:
9820 case R_PPC_GOT16:
9821 case R_PPC_GOT16_LO:
9822 case R_PPC_SDAREL16:
9823 case R_PPC_SECTOFF:
9824 case R_PPC_SECTOFF_LO:
9825 case R_PPC_DTPREL16:
9826 case R_PPC_DTPREL16_LO:
9827 case R_PPC_TPREL16:
9828 case R_PPC_TPREL16_LO:
9829 case R_PPC_GOT_TLSGD16:
9830 case R_PPC_GOT_TLSGD16_LO:
9831 case R_PPC_GOT_TLSLD16:
9832 case R_PPC_GOT_TLSLD16_LO:
9833 case R_PPC_GOT_DTPREL16:
9834 case R_PPC_GOT_DTPREL16_LO:
9835 case R_PPC_GOT_TPREL16:
9836 case R_PPC_GOT_TPREL16_LO:
9837 {
9838 /* The 32-bit ABI lacks proper relocations to deal with
9839 certain 64-bit instructions. Prevent damage to bits
9840 that make up part of the insn opcode. */
9841 unsigned int insn, mask, lobit;
9842
9843 insn = bfd_get_32 (input_bfd,
9844 contents + rel->r_offset - d_offset);
9845 mask = 0;
9846 if (is_insn_ds_form (insn))
9847 mask = 3;
9848 else if (is_insn_dq_form (insn))
9849 mask = 15;
9850 else
9851 break;
9852 relocation += addend;
9853 addend = insn & mask;
9854 lobit = mask & relocation;
9855 if (lobit != 0)
9856 {
9857 relocation ^= lobit;
9858 info->callbacks->einfo
9859 /* xgettext:c-format */
9860 (_("%H: error: %s against `%s' not a multiple of %u\n"),
9861 input_bfd, input_section, rel->r_offset,
9862 howto->name, sym_name, mask + 1);
9863 bfd_set_error (bfd_error_bad_value);
9864 ret = FALSE;
9865 }
9866 }
9867 break;
9868 }
9869
9870 #ifdef DEBUG
9871 fprintf (stderr, "\ttype = %s (%d), name = %s, symbol index = %ld, "
9872 "offset = %ld, addend = %ld\n",
9873 howto->name,
9874 (int) r_type,
9875 sym_name,
9876 r_symndx,
9877 (long) rel->r_offset,
9878 (long) addend);
9879 #endif
9880
9881 if (unresolved_reloc
9882 && !((input_section->flags & SEC_DEBUGGING) != 0
9883 && h->def_dynamic)
9884 && _bfd_elf_section_offset (output_bfd, info, input_section,
9885 rel->r_offset) != (bfd_vma) -1)
9886 {
9887 info->callbacks->einfo
9888 /* xgettext:c-format */
9889 (_("%H: unresolvable %s relocation against symbol `%s'\n"),
9890 input_bfd, input_section, rel->r_offset,
9891 howto->name,
9892 sym_name);
9893 ret = FALSE;
9894 }
9895
9896 /* 16-bit fields in insns mostly have signed values, but a
9897 few insns have 16-bit unsigned values. Really, we should
9898 have different reloc types. */
9899 if (howto->complain_on_overflow != complain_overflow_dont
9900 && howto->dst_mask == 0xffff
9901 && (input_section->flags & SEC_CODE) != 0)
9902 {
9903 enum complain_overflow complain = complain_overflow_signed;
9904
9905 if ((elf_section_flags (input_section) & SHF_PPC_VLE) == 0)
9906 {
9907 unsigned int insn;
9908
9909 insn = bfd_get_32 (input_bfd, contents + (rel->r_offset & ~3));
9910 if ((insn & (0x3f << 26)) == 10u << 26 /* cmpli */)
9911 complain = complain_overflow_bitfield;
9912 else if ((insn & (0x3f << 26)) == 28u << 26 /* andi */
9913 || (insn & (0x3f << 26)) == 24u << 26 /* ori */
9914 || (insn & (0x3f << 26)) == 26u << 26 /* xori */)
9915 complain = complain_overflow_unsigned;
9916 }
9917 if (howto->complain_on_overflow != complain)
9918 {
9919 alt_howto = *howto;
9920 alt_howto.complain_on_overflow = complain;
9921 howto = &alt_howto;
9922 }
9923 }
9924
9925 if (r_type == R_PPC_REL16DX_HA)
9926 {
9927 /* Split field reloc isn't handled by _bfd_final_link_relocate. */
9928 if (rel->r_offset + 4 > input_section->size)
9929 r = bfd_reloc_outofrange;
9930 else
9931 {
9932 unsigned int insn;
9933
9934 relocation += addend;
9935 relocation -= (rel->r_offset
9936 + input_section->output_offset
9937 + input_section->output_section->vma);
9938 relocation >>= 16;
9939 insn = bfd_get_32 (input_bfd, contents + rel->r_offset);
9940 insn &= ~0x1fffc1;
9941 insn |= (relocation & 0xffc1) | ((relocation & 0x3e) << 15);
9942 bfd_put_32 (input_bfd, insn, contents + rel->r_offset);
9943 r = bfd_reloc_ok;
9944 }
9945 }
9946 else
9947 r = _bfd_final_link_relocate (howto, input_bfd, input_section, contents,
9948 rel->r_offset, relocation, addend);
9949
9950 if (r != bfd_reloc_ok)
9951 {
9952 if (r == bfd_reloc_overflow)
9953 {
9954 overflow:
9955 /* On code like "if (foo) foo();" don't report overflow
9956 on a branch to zero when foo is undefined. */
9957 if (!warned
9958 && !(h != NULL
9959 && (h->root.type == bfd_link_hash_undefweak
9960 || h->root.type == bfd_link_hash_undefined)
9961 && is_branch_reloc (r_type)))
9962 info->callbacks->reloc_overflow
9963 (info, (h ? &h->root : NULL), sym_name, howto->name,
9964 rel->r_addend, input_bfd, input_section, rel->r_offset);
9965 }
9966 else
9967 {
9968 info->callbacks->einfo
9969 /* xgettext:c-format */
9970 (_("%H: %s reloc against `%s': error %d\n"),
9971 input_bfd, input_section, rel->r_offset,
9972 howto->name, sym_name, (int) r);
9973 ret = FALSE;
9974 }
9975 }
9976 copy_reloc:
9977 if (wrel != rel)
9978 *wrel = *rel;
9979 }
9980
9981 if (wrel != rel)
9982 {
9983 Elf_Internal_Shdr *rel_hdr;
9984 size_t deleted = rel - wrel;
9985
9986 rel_hdr = _bfd_elf_single_rel_hdr (input_section->output_section);
9987 rel_hdr->sh_size -= rel_hdr->sh_entsize * deleted;
9988 if (rel_hdr->sh_size == 0)
9989 {
9990 /* It is too late to remove an empty reloc section. Leave
9991 one NONE reloc.
9992 ??? What is wrong with an empty section??? */
9993 rel_hdr->sh_size = rel_hdr->sh_entsize;
9994 deleted -= 1;
9995 wrel++;
9996 }
9997 relend = wrel;
9998 rel_hdr = _bfd_elf_single_rel_hdr (input_section);
9999 rel_hdr->sh_size -= rel_hdr->sh_entsize * deleted;
10000 input_section->reloc_count -= deleted;
10001 }
10002
10003 #ifdef DEBUG
10004 fprintf (stderr, "\n");
10005 #endif
10006
10007 if (input_section->sec_info_type == SEC_INFO_TYPE_TARGET
10008 && input_section->size != input_section->rawsize
10009 && (strcmp (input_section->output_section->name, ".init") == 0
10010 || strcmp (input_section->output_section->name, ".fini") == 0))
10011 {
10012 /* Branch around the trampolines. */
10013 unsigned int insn = B + input_section->size - input_section->rawsize;
10014 bfd_put_32 (input_bfd, insn, contents + input_section->rawsize);
10015 }
10016
10017 if (htab->params->ppc476_workaround
10018 && input_section->sec_info_type == SEC_INFO_TYPE_TARGET
10019 && (!bfd_link_relocatable (info)
10020 || (input_section->output_section->alignment_power
10021 >= htab->params->pagesize_p2)))
10022 {
10023 bfd_vma start_addr, end_addr, addr;
10024 bfd_vma pagesize = (bfd_vma) 1 << htab->params->pagesize_p2;
10025
10026 if (relax_info->workaround_size != 0)
10027 {
10028 bfd_byte *p;
10029 unsigned int n;
10030 bfd_byte fill[4];
10031
10032 bfd_put_32 (input_bfd, BA, fill);
10033 p = contents + input_section->size - relax_info->workaround_size;
10034 n = relax_info->workaround_size >> 2;
10035 while (n--)
10036 {
10037 memcpy (p, fill, 4);
10038 p += 4;
10039 }
10040 }
10041
10042 /* The idea is: Replace the last instruction on a page with a
10043 branch to a patch area. Put the insn there followed by a
10044 branch back to the next page. Complicated a little by
10045 needing to handle moved conditional branches, and by not
10046 wanting to touch data-in-text. */
10047
10048 start_addr = (input_section->output_section->vma
10049 + input_section->output_offset);
10050 end_addr = (start_addr + input_section->size
10051 - relax_info->workaround_size);
10052 for (addr = ((start_addr & -pagesize) + pagesize - 4);
10053 addr < end_addr;
10054 addr += pagesize)
10055 {
10056 bfd_vma offset = addr - start_addr;
10057 Elf_Internal_Rela *lo, *hi;
10058 bfd_boolean is_data;
10059 bfd_vma patch_off, patch_addr;
10060 unsigned int insn;
10061
10062 /* Do we have a data reloc at this offset? If so, leave
10063 the word alone. */
10064 is_data = FALSE;
10065 lo = relocs;
10066 hi = relend;
10067 rel = NULL;
10068 while (lo < hi)
10069 {
10070 rel = lo + (hi - lo) / 2;
10071 if (rel->r_offset < offset)
10072 lo = rel + 1;
10073 else if (rel->r_offset > offset + 3)
10074 hi = rel;
10075 else
10076 {
10077 switch (ELF32_R_TYPE (rel->r_info))
10078 {
10079 case R_PPC_ADDR32:
10080 case R_PPC_UADDR32:
10081 case R_PPC_REL32:
10082 case R_PPC_ADDR30:
10083 is_data = TRUE;
10084 break;
10085 default:
10086 break;
10087 }
10088 break;
10089 }
10090 }
10091 if (is_data)
10092 continue;
10093
10094 /* Some instructions can be left alone too. Unconditional
10095 branches, except for bcctr with BO=0x14 (bctr, bctrl),
10096 avoid the icache failure.
10097
10098 The problem occurs due to prefetch across a page boundary
10099 where stale instructions can be fetched from the next
10100 page, and the mechanism for flushing these bad
10101 instructions fails under certain circumstances. The
10102 unconditional branches:
10103 1) Branch: b, bl, ba, bla,
10104 2) Branch Conditional: bc, bca, bcl, bcla,
10105 3) Branch Conditional to Link Register: bclr, bclrl,
10106 where (2) and (3) have BO=0x14 making them unconditional,
10107 prevent the bad prefetch because the prefetch itself is
10108 affected by these instructions. This happens even if the
10109 instruction is not executed.
10110
10111 A bctr example:
10112 .
10113 . lis 9,new_page@ha
10114 . addi 9,9,new_page@l
10115 . mtctr 9
10116 . bctr
10117 . nop
10118 . nop
10119 . new_page:
10120 .
10121 The bctr is not predicted taken due to ctr not being
10122 ready, so prefetch continues on past the bctr into the
10123 new page which might have stale instructions. If they
10124 fail to be flushed, then they will be executed after the
10125 bctr executes. Either of the following modifications
10126 prevent the bad prefetch from happening in the first
10127 place:
10128 .
10129 . lis 9,new_page@ha lis 9,new_page@ha
10130 . addi 9,9,new_page@l addi 9,9,new_page@l
10131 . mtctr 9 mtctr 9
10132 . bctr bctr
10133 . nop b somewhere_else
10134 . b somewhere_else nop
10135 . new_page: new_page:
10136 . */
10137 insn = bfd_get_32 (input_bfd, contents + offset);
10138 if ((insn & (0x3f << 26)) == (18u << 26) /* b,bl,ba,bla */
10139 || ((insn & (0x3f << 26)) == (16u << 26) /* bc,bcl,bca,bcla*/
10140 && (insn & (0x14 << 21)) == (0x14 << 21)) /* with BO=0x14 */
10141 || ((insn & (0x3f << 26)) == (19u << 26)
10142 && (insn & (0x3ff << 1)) == (16u << 1) /* bclr,bclrl */
10143 && (insn & (0x14 << 21)) == (0x14 << 21)))/* with BO=0x14 */
10144 continue;
10145
10146 patch_addr = (start_addr + input_section->size
10147 - relax_info->workaround_size);
10148 patch_addr = (patch_addr + 15) & -16;
10149 patch_off = patch_addr - start_addr;
10150 bfd_put_32 (input_bfd, B + patch_off - offset, contents + offset);
10151
10152 if (rel != NULL
10153 && rel->r_offset >= offset
10154 && rel->r_offset < offset + 4)
10155 {
10156 asection *sreloc;
10157
10158 /* If the insn we are patching had a reloc, adjust the
10159 reloc r_offset so that the reloc applies to the moved
10160 location. This matters for -r and --emit-relocs. */
10161 if (rel + 1 != relend)
10162 {
10163 Elf_Internal_Rela tmp = *rel;
10164
10165 /* Keep the relocs sorted by r_offset. */
10166 memmove (rel, rel + 1, (relend - (rel + 1)) * sizeof (*rel));
10167 relend[-1] = tmp;
10168 }
10169 relend[-1].r_offset += patch_off - offset;
10170
10171 /* Adjust REL16 addends too. */
10172 switch (ELF32_R_TYPE (relend[-1].r_info))
10173 {
10174 case R_PPC_REL16:
10175 case R_PPC_REL16_LO:
10176 case R_PPC_REL16_HI:
10177 case R_PPC_REL16_HA:
10178 relend[-1].r_addend += patch_off - offset;
10179 break;
10180 default:
10181 break;
10182 }
10183
10184 /* If we are building a PIE or shared library with
10185 non-PIC objects, perhaps we had a dynamic reloc too?
10186 If so, the dynamic reloc must move with the insn. */
10187 sreloc = elf_section_data (input_section)->sreloc;
10188 if (sreloc != NULL)
10189 {
10190 Elf32_External_Rela *slo, *shi, *srelend;
10191 bfd_vma soffset;
10192
10193 slo = (Elf32_External_Rela *) sreloc->contents;
10194 shi = srelend = slo + sreloc->reloc_count;
10195 soffset = (offset + input_section->output_section->vma
10196 + input_section->output_offset);
10197 while (slo < shi)
10198 {
10199 Elf32_External_Rela *srel = slo + (shi - slo) / 2;
10200 bfd_elf32_swap_reloca_in (output_bfd, (bfd_byte *) srel,
10201 &outrel);
10202 if (outrel.r_offset < soffset)
10203 slo = srel + 1;
10204 else if (outrel.r_offset > soffset + 3)
10205 shi = srel;
10206 else
10207 {
10208 if (srel + 1 != srelend)
10209 {
10210 memmove (srel, srel + 1,
10211 (srelend - (srel + 1)) * sizeof (*srel));
10212 srel = srelend - 1;
10213 }
10214 outrel.r_offset += patch_off - offset;
10215 bfd_elf32_swap_reloca_out (output_bfd, &outrel,
10216 (bfd_byte *) srel);
10217 break;
10218 }
10219 }
10220 }
10221 }
10222 else
10223 rel = NULL;
10224
10225 if ((insn & (0x3f << 26)) == (16u << 26) /* bc */
10226 && (insn & 2) == 0 /* relative */)
10227 {
10228 bfd_vma delta = ((insn & 0xfffc) ^ 0x8000) - 0x8000;
10229
10230 delta += offset - patch_off;
10231 if (bfd_link_relocatable (info) && rel != NULL)
10232 delta = 0;
10233 if (!bfd_link_relocatable (info) && rel != NULL)
10234 {
10235 enum elf_ppc_reloc_type r_type;
10236
10237 r_type = ELF32_R_TYPE (relend[-1].r_info);
10238 if (r_type == R_PPC_REL14_BRTAKEN)
10239 insn |= BRANCH_PREDICT_BIT;
10240 else if (r_type == R_PPC_REL14_BRNTAKEN)
10241 insn &= ~BRANCH_PREDICT_BIT;
10242 else
10243 BFD_ASSERT (r_type == R_PPC_REL14);
10244
10245 if ((r_type == R_PPC_REL14_BRTAKEN
10246 || r_type == R_PPC_REL14_BRNTAKEN)
10247 && delta + 0x8000 < 0x10000
10248 && (bfd_signed_vma) delta < 0)
10249 insn ^= BRANCH_PREDICT_BIT;
10250 }
10251 if (delta + 0x8000 < 0x10000)
10252 {
10253 bfd_put_32 (input_bfd,
10254 (insn & ~0xfffc) | (delta & 0xfffc),
10255 contents + patch_off);
10256 patch_off += 4;
10257 bfd_put_32 (input_bfd,
10258 B | ((offset + 4 - patch_off) & 0x3fffffc),
10259 contents + patch_off);
10260 patch_off += 4;
10261 }
10262 else
10263 {
10264 if (rel != NULL)
10265 {
10266 unsigned int r_sym = ELF32_R_SYM (relend[-1].r_info);
10267
10268 relend[-1].r_offset += 8;
10269 relend[-1].r_info = ELF32_R_INFO (r_sym, R_PPC_REL24);
10270 }
10271 bfd_put_32 (input_bfd,
10272 (insn & ~0xfffc) | 8,
10273 contents + patch_off);
10274 patch_off += 4;
10275 bfd_put_32 (input_bfd,
10276 B | ((offset + 4 - patch_off) & 0x3fffffc),
10277 contents + patch_off);
10278 patch_off += 4;
10279 bfd_put_32 (input_bfd,
10280 B | ((delta - 8) & 0x3fffffc),
10281 contents + patch_off);
10282 patch_off += 4;
10283 }
10284 }
10285 else
10286 {
10287 bfd_put_32 (input_bfd, insn, contents + patch_off);
10288 patch_off += 4;
10289 bfd_put_32 (input_bfd,
10290 B | ((offset + 4 - patch_off) & 0x3fffffc),
10291 contents + patch_off);
10292 patch_off += 4;
10293 }
10294 BFD_ASSERT (patch_off <= input_section->size);
10295 relax_info->workaround_size = input_section->size - patch_off;
10296 }
10297 }
10298
10299 return ret;
10300 }
10301 \f
10302 /* Write out the PLT relocs and entries for H. */
10303
10304 static bfd_boolean
10305 write_global_sym_plt (struct elf_link_hash_entry *h, void *inf)
10306 {
10307 struct bfd_link_info *info = (struct bfd_link_info *) inf;
10308 struct ppc_elf_link_hash_table *htab = ppc_elf_hash_table (info);
10309 struct plt_entry *ent;
10310 bfd_boolean doneone;
10311
10312 doneone = FALSE;
10313 for (ent = h->plt.plist; ent != NULL; ent = ent->next)
10314 if (ent->plt.offset != (bfd_vma) -1)
10315 {
10316 if (!doneone)
10317 {
10318 Elf_Internal_Rela rela;
10319 bfd_byte *loc;
10320 bfd_vma reloc_index;
10321 asection *plt = htab->elf.splt;
10322 asection *relplt = htab->elf.srelplt;
10323
10324 if (htab->plt_type == PLT_NEW
10325 || !htab->elf.dynamic_sections_created
10326 || h->dynindx == -1)
10327 reloc_index = ent->plt.offset / 4;
10328 else
10329 {
10330 reloc_index = ((ent->plt.offset - htab->plt_initial_entry_size)
10331 / htab->plt_slot_size);
10332 if (reloc_index > PLT_NUM_SINGLE_ENTRIES
10333 && htab->plt_type == PLT_OLD)
10334 reloc_index -= (reloc_index - PLT_NUM_SINGLE_ENTRIES) / 2;
10335 }
10336
10337 /* This symbol has an entry in the procedure linkage table.
10338 Set it up. */
10339 if (htab->plt_type == PLT_VXWORKS
10340 && htab->elf.dynamic_sections_created
10341 && h->dynindx != -1)
10342 {
10343 bfd_vma got_offset;
10344 const bfd_vma *plt_entry;
10345
10346 /* The first three entries in .got.plt are reserved. */
10347 got_offset = (reloc_index + 3) * 4;
10348
10349 /* Use the right PLT. */
10350 plt_entry = bfd_link_pic (info) ? ppc_elf_vxworks_pic_plt_entry
10351 : ppc_elf_vxworks_plt_entry;
10352
10353 /* Fill in the .plt on VxWorks. */
10354 if (bfd_link_pic (info))
10355 {
10356 bfd_put_32 (info->output_bfd,
10357 plt_entry[0] | PPC_HA (got_offset),
10358 plt->contents + ent->plt.offset + 0);
10359 bfd_put_32 (info->output_bfd,
10360 plt_entry[1] | PPC_LO (got_offset),
10361 plt->contents + ent->plt.offset + 4);
10362 }
10363 else
10364 {
10365 bfd_vma got_loc = got_offset + SYM_VAL (htab->elf.hgot);
10366
10367 bfd_put_32 (info->output_bfd,
10368 plt_entry[0] | PPC_HA (got_loc),
10369 plt->contents + ent->plt.offset + 0);
10370 bfd_put_32 (info->output_bfd,
10371 plt_entry[1] | PPC_LO (got_loc),
10372 plt->contents + ent->plt.offset + 4);
10373 }
10374
10375 bfd_put_32 (info->output_bfd, plt_entry[2],
10376 plt->contents + ent->plt.offset + 8);
10377 bfd_put_32 (info->output_bfd, plt_entry[3],
10378 plt->contents + ent->plt.offset + 12);
10379
10380 /* This instruction is an immediate load. The value loaded is
10381 the byte offset of the R_PPC_JMP_SLOT relocation from the
10382 start of the .rela.plt section. The value is stored in the
10383 low-order 16 bits of the load instruction. */
10384 /* NOTE: It appears that this is now an index rather than a
10385 prescaled offset. */
10386 bfd_put_32 (info->output_bfd,
10387 plt_entry[4] | reloc_index,
10388 plt->contents + ent->plt.offset + 16);
10389 /* This instruction is a PC-relative branch whose target is
10390 the start of the PLT section. The address of this branch
10391 instruction is 20 bytes beyond the start of this PLT entry.
10392 The address is encoded in bits 6-29, inclusive. The value
10393 stored is right-shifted by two bits, permitting a 26-bit
10394 offset. */
10395 bfd_put_32 (info->output_bfd,
10396 (plt_entry[5]
10397 | (-(ent->plt.offset + 20) & 0x03fffffc)),
10398 plt->contents + ent->plt.offset + 20);
10399 bfd_put_32 (info->output_bfd, plt_entry[6],
10400 plt->contents + ent->plt.offset + 24);
10401 bfd_put_32 (info->output_bfd, plt_entry[7],
10402 plt->contents + ent->plt.offset + 28);
10403
10404 /* Fill in the GOT entry corresponding to this PLT slot with
10405 the address immediately after the "bctr" instruction
10406 in this PLT entry. */
10407 bfd_put_32 (info->output_bfd, (plt->output_section->vma
10408 + plt->output_offset
10409 + ent->plt.offset + 16),
10410 htab->elf.sgotplt->contents + got_offset);
10411
10412 if (!bfd_link_pic (info))
10413 {
10414 /* Fill in a couple of entries in .rela.plt.unloaded. */
10415 loc = htab->srelplt2->contents
10416 + ((VXWORKS_PLTRESOLVE_RELOCS + reloc_index
10417 * VXWORKS_PLT_NON_JMP_SLOT_RELOCS)
10418 * sizeof (Elf32_External_Rela));
10419
10420 /* Provide the @ha relocation for the first instruction. */
10421 rela.r_offset = (plt->output_section->vma
10422 + plt->output_offset
10423 + ent->plt.offset + 2);
10424 rela.r_info = ELF32_R_INFO (htab->elf.hgot->indx,
10425 R_PPC_ADDR16_HA);
10426 rela.r_addend = got_offset;
10427 bfd_elf32_swap_reloca_out (info->output_bfd, &rela, loc);
10428 loc += sizeof (Elf32_External_Rela);
10429
10430 /* Provide the @l relocation for the second instruction. */
10431 rela.r_offset = (plt->output_section->vma
10432 + plt->output_offset
10433 + ent->plt.offset + 6);
10434 rela.r_info = ELF32_R_INFO (htab->elf.hgot->indx,
10435 R_PPC_ADDR16_LO);
10436 rela.r_addend = got_offset;
10437 bfd_elf32_swap_reloca_out (info->output_bfd, &rela, loc);
10438 loc += sizeof (Elf32_External_Rela);
10439
10440 /* Provide a relocation for the GOT entry corresponding to this
10441 PLT slot. Point it at the middle of the .plt entry. */
10442 rela.r_offset = (htab->elf.sgotplt->output_section->vma
10443 + htab->elf.sgotplt->output_offset
10444 + got_offset);
10445 rela.r_info = ELF32_R_INFO (htab->elf.hplt->indx,
10446 R_PPC_ADDR32);
10447 rela.r_addend = ent->plt.offset + 16;
10448 bfd_elf32_swap_reloca_out (info->output_bfd, &rela, loc);
10449 }
10450
10451 /* VxWorks uses non-standard semantics for R_PPC_JMP_SLOT.
10452 In particular, the offset for the relocation is not the
10453 address of the PLT entry for this function, as specified
10454 by the ABI. Instead, the offset is set to the address of
10455 the GOT slot for this function. See EABI 4.4.4.1. */
10456 rela.r_offset = (htab->elf.sgotplt->output_section->vma
10457 + htab->elf.sgotplt->output_offset
10458 + got_offset);
10459 rela.r_addend = 0;
10460 }
10461 else
10462 {
10463 rela.r_addend = 0;
10464 if (!htab->elf.dynamic_sections_created
10465 || h->dynindx == -1)
10466 {
10467 if (h->type == STT_GNU_IFUNC)
10468 {
10469 plt = htab->elf.iplt;
10470 relplt = htab->elf.irelplt;
10471 }
10472 else
10473 {
10474 plt = htab->pltlocal;
10475 relplt = bfd_link_pic (info) ? htab->relpltlocal : NULL;
10476 }
10477 if (h->def_regular
10478 && (h->root.type == bfd_link_hash_defined
10479 || h->root.type == bfd_link_hash_defweak))
10480 rela.r_addend = SYM_VAL (h);
10481 }
10482
10483 if (relplt == NULL)
10484 {
10485 loc = plt->contents + ent->plt.offset;
10486 bfd_put_32 (info->output_bfd, rela.r_addend, loc);
10487 }
10488 else
10489 {
10490 rela.r_offset = (plt->output_section->vma
10491 + plt->output_offset
10492 + ent->plt.offset);
10493
10494 if (htab->plt_type == PLT_OLD
10495 || !htab->elf.dynamic_sections_created
10496 || h->dynindx == -1)
10497 {
10498 /* We don't need to fill in the .plt. The ppc dynamic
10499 linker will fill it in. */
10500 }
10501 else
10502 {
10503 bfd_vma val = (htab->glink_pltresolve + ent->plt.offset
10504 + htab->glink->output_section->vma
10505 + htab->glink->output_offset);
10506 bfd_put_32 (info->output_bfd, val,
10507 plt->contents + ent->plt.offset);
10508 }
10509 }
10510 }
10511
10512 if (relplt != NULL)
10513 {
10514 /* Fill in the entry in the .rela.plt section. */
10515 if (!htab->elf.dynamic_sections_created
10516 || h->dynindx == -1)
10517 {
10518 if (h->type == STT_GNU_IFUNC)
10519 rela.r_info = ELF32_R_INFO (0, R_PPC_IRELATIVE);
10520 else
10521 rela.r_info = ELF32_R_INFO (0, R_PPC_RELATIVE);
10522 loc = relplt->contents + (relplt->reloc_count++
10523 * sizeof (Elf32_External_Rela));
10524 htab->local_ifunc_resolver = 1;
10525 }
10526 else
10527 {
10528 rela.r_info = ELF32_R_INFO (h->dynindx, R_PPC_JMP_SLOT);
10529 loc = relplt->contents + (reloc_index
10530 * sizeof (Elf32_External_Rela));
10531 if (h->type == STT_GNU_IFUNC && is_static_defined (h))
10532 htab->maybe_local_ifunc_resolver = 1;
10533 }
10534 bfd_elf32_swap_reloca_out (info->output_bfd, &rela, loc);
10535 }
10536 doneone = TRUE;
10537 }
10538
10539 if (htab->plt_type == PLT_NEW
10540 || !htab->elf.dynamic_sections_created
10541 || h->dynindx == -1)
10542 {
10543 unsigned char *p;
10544 asection *plt = htab->elf.splt;
10545
10546 if (!htab->elf.dynamic_sections_created
10547 || h->dynindx == -1)
10548 {
10549 if (h->type == STT_GNU_IFUNC)
10550 plt = htab->elf.iplt;
10551 else
10552 break;
10553 }
10554
10555 p = (unsigned char *) htab->glink->contents + ent->glink_offset;
10556 write_glink_stub (h, ent, plt, p, info);
10557
10558 if (!bfd_link_pic (info))
10559 /* We only need one non-PIC glink stub. */
10560 break;
10561 }
10562 else
10563 break;
10564 }
10565 return TRUE;
10566 }
10567
10568 /* Finish up PLT handling. */
10569
10570 bfd_boolean
10571 ppc_finish_symbols (struct bfd_link_info *info)
10572 {
10573 struct ppc_elf_link_hash_table *htab = ppc_elf_hash_table (info);
10574 bfd *ibfd;
10575
10576 if (!htab)
10577 return TRUE;
10578
10579 elf_link_hash_traverse (&htab->elf, write_global_sym_plt, info);
10580
10581 for (ibfd = info->input_bfds; ibfd != NULL; ibfd = ibfd->link.next)
10582 {
10583 bfd_vma *local_got, *end_local_got;
10584 struct plt_entry **local_plt, **lplt, **end_local_plt;
10585 Elf_Internal_Shdr *symtab_hdr;
10586 bfd_size_type locsymcount;
10587 Elf_Internal_Sym *local_syms = NULL;
10588 struct plt_entry *ent;
10589
10590 if (!is_ppc_elf (ibfd))
10591 continue;
10592
10593 local_got = elf_local_got_offsets (ibfd);
10594 if (!local_got)
10595 continue;
10596
10597 symtab_hdr = &elf_symtab_hdr (ibfd);
10598 locsymcount = symtab_hdr->sh_info;
10599 end_local_got = local_got + locsymcount;
10600 local_plt = (struct plt_entry **) end_local_got;
10601 end_local_plt = local_plt + locsymcount;
10602 for (lplt = local_plt; lplt < end_local_plt; ++lplt)
10603 for (ent = *lplt; ent != NULL; ent = ent->next)
10604 {
10605 if (ent->plt.offset != (bfd_vma) -1)
10606 {
10607 Elf_Internal_Sym *sym;
10608 asection *sym_sec;
10609 asection *plt, *relplt;
10610 bfd_byte *loc;
10611 bfd_vma val;
10612 Elf_Internal_Rela rela;
10613
10614 if (!get_sym_h (NULL, &sym, &sym_sec, NULL, &local_syms,
10615 lplt - local_plt, ibfd))
10616 {
10617 if (local_syms != NULL
10618 && symtab_hdr->contents != (unsigned char *) local_syms)
10619 free (local_syms);
10620 return FALSE;
10621 }
10622
10623 val = sym->st_value;
10624 if (sym_sec != NULL && sym_sec->output_section != NULL)
10625 val += sym_sec->output_offset + sym_sec->output_section->vma;
10626
10627 if (ELF_ST_TYPE (sym->st_info) == STT_GNU_IFUNC)
10628 {
10629 htab->local_ifunc_resolver = 1;
10630 plt = htab->elf.iplt;
10631 relplt = htab->elf.irelplt;
10632 rela.r_info = ELF32_R_INFO (0, R_PPC_IRELATIVE);
10633 }
10634 else
10635 {
10636 plt = htab->pltlocal;
10637 if (bfd_link_pic (info))
10638 {
10639 relplt = htab->relpltlocal;
10640 rela.r_info = ELF32_R_INFO (0, R_PPC_RELATIVE);
10641 }
10642 else
10643 {
10644 loc = plt->contents + ent->plt.offset;
10645 bfd_put_32 (info->output_bfd, val, loc);
10646 continue;
10647 }
10648 }
10649
10650 rela.r_offset = (ent->plt.offset
10651 + plt->output_offset
10652 + plt->output_section->vma);
10653 rela.r_addend = val;
10654 loc = relplt->contents + (relplt->reloc_count++
10655 * sizeof (Elf32_External_Rela));
10656 bfd_elf32_swap_reloca_out (info->output_bfd, &rela, loc);
10657 }
10658 if ((ent->glink_offset & 1) == 0)
10659 {
10660 unsigned char *p = ((unsigned char *) htab->glink->contents
10661 + ent->glink_offset);
10662
10663 write_glink_stub (NULL, ent, htab->elf.iplt, p, info);
10664 ent->glink_offset |= 1;
10665 }
10666 }
10667
10668 if (local_syms != NULL
10669 && symtab_hdr->contents != (unsigned char *) local_syms)
10670 {
10671 if (!info->keep_memory)
10672 free (local_syms);
10673 else
10674 symtab_hdr->contents = (unsigned char *) local_syms;
10675 }
10676 }
10677 return TRUE;
10678 }
10679
10680 /* Finish up dynamic symbol handling. We set the contents of various
10681 dynamic sections here. */
10682
10683 static bfd_boolean
10684 ppc_elf_finish_dynamic_symbol (bfd *output_bfd,
10685 struct bfd_link_info *info,
10686 struct elf_link_hash_entry *h,
10687 Elf_Internal_Sym *sym)
10688 {
10689 struct ppc_elf_link_hash_table *htab = ppc_elf_hash_table (info);
10690 struct plt_entry *ent;
10691
10692 #ifdef DEBUG
10693 fprintf (stderr, "ppc_elf_finish_dynamic_symbol called for %s",
10694 h->root.root.string);
10695 #endif
10696
10697 if (!h->def_regular
10698 || (h->type == STT_GNU_IFUNC && !bfd_link_pic (info)))
10699 for (ent = h->plt.plist; ent != NULL; ent = ent->next)
10700 if (ent->plt.offset != (bfd_vma) -1)
10701 {
10702 if (!h->def_regular)
10703 {
10704 /* Mark the symbol as undefined, rather than as
10705 defined in the .plt section. Leave the value if
10706 there were any relocations where pointer equality
10707 matters (this is a clue for the dynamic linker, to
10708 make function pointer comparisons work between an
10709 application and shared library), otherwise set it
10710 to zero. */
10711 sym->st_shndx = SHN_UNDEF;
10712 if (!h->pointer_equality_needed)
10713 sym->st_value = 0;
10714 else if (!h->ref_regular_nonweak)
10715 {
10716 /* This breaks function pointer comparisons, but
10717 that is better than breaking tests for a NULL
10718 function pointer. */
10719 sym->st_value = 0;
10720 }
10721 }
10722 else
10723 {
10724 /* Set the value of ifunc symbols in a non-pie
10725 executable to the glink entry. This is to avoid
10726 text relocations. We can't do this for ifunc in
10727 allocate_dynrelocs, as we do for normal dynamic
10728 function symbols with plt entries, because we need
10729 to keep the original value around for the ifunc
10730 relocation. */
10731 sym->st_shndx
10732 = (_bfd_elf_section_from_bfd_section
10733 (info->output_bfd, htab->glink->output_section));
10734 sym->st_value = (ent->glink_offset
10735 + htab->glink->output_offset
10736 + htab->glink->output_section->vma);
10737 }
10738 break;
10739 }
10740
10741 if (h->needs_copy)
10742 {
10743 asection *s;
10744 Elf_Internal_Rela rela;
10745 bfd_byte *loc;
10746
10747 /* This symbols needs a copy reloc. Set it up. */
10748
10749 #ifdef DEBUG
10750 fprintf (stderr, ", copy");
10751 #endif
10752
10753 BFD_ASSERT (h->dynindx != -1);
10754
10755 if (ppc_elf_hash_entry (h)->has_sda_refs)
10756 s = htab->relsbss;
10757 else if (h->root.u.def.section == htab->elf.sdynrelro)
10758 s = htab->elf.sreldynrelro;
10759 else
10760 s = htab->elf.srelbss;
10761 BFD_ASSERT (s != NULL);
10762
10763 rela.r_offset = SYM_VAL (h);
10764 rela.r_info = ELF32_R_INFO (h->dynindx, R_PPC_COPY);
10765 rela.r_addend = 0;
10766 loc = s->contents + s->reloc_count++ * sizeof (Elf32_External_Rela);
10767 bfd_elf32_swap_reloca_out (output_bfd, &rela, loc);
10768 }
10769
10770 #ifdef DEBUG
10771 fprintf (stderr, "\n");
10772 #endif
10773
10774 return TRUE;
10775 }
10776 \f
10777 static enum elf_reloc_type_class
10778 ppc_elf_reloc_type_class (const struct bfd_link_info *info,
10779 const asection *rel_sec,
10780 const Elf_Internal_Rela *rela)
10781 {
10782 struct ppc_elf_link_hash_table *htab = ppc_elf_hash_table (info);
10783
10784 if (rel_sec == htab->elf.irelplt)
10785 return reloc_class_ifunc;
10786
10787 switch (ELF32_R_TYPE (rela->r_info))
10788 {
10789 case R_PPC_RELATIVE:
10790 return reloc_class_relative;
10791 case R_PPC_JMP_SLOT:
10792 return reloc_class_plt;
10793 case R_PPC_COPY:
10794 return reloc_class_copy;
10795 default:
10796 return reloc_class_normal;
10797 }
10798 }
10799 \f
10800 /* Finish up the dynamic sections. */
10801
10802 static bfd_boolean
10803 ppc_elf_finish_dynamic_sections (bfd *output_bfd,
10804 struct bfd_link_info *info)
10805 {
10806 asection *sdyn;
10807 struct ppc_elf_link_hash_table *htab;
10808 bfd_vma got;
10809 bfd *dynobj;
10810 bfd_boolean ret = TRUE;
10811
10812 #ifdef DEBUG
10813 fprintf (stderr, "ppc_elf_finish_dynamic_sections called\n");
10814 #endif
10815
10816 htab = ppc_elf_hash_table (info);
10817 dynobj = htab->elf.dynobj;
10818 sdyn = bfd_get_linker_section (dynobj, ".dynamic");
10819
10820 got = 0;
10821 if (htab->elf.hgot != NULL)
10822 got = SYM_VAL (htab->elf.hgot);
10823
10824 if (htab->elf.dynamic_sections_created)
10825 {
10826 Elf32_External_Dyn *dyncon, *dynconend;
10827
10828 BFD_ASSERT (htab->elf.splt != NULL && sdyn != NULL);
10829
10830 dyncon = (Elf32_External_Dyn *) sdyn->contents;
10831 dynconend = (Elf32_External_Dyn *) (sdyn->contents + sdyn->size);
10832 for (; dyncon < dynconend; dyncon++)
10833 {
10834 Elf_Internal_Dyn dyn;
10835 asection *s;
10836
10837 bfd_elf32_swap_dyn_in (dynobj, dyncon, &dyn);
10838
10839 switch (dyn.d_tag)
10840 {
10841 case DT_PLTGOT:
10842 if (htab->is_vxworks)
10843 s = htab->elf.sgotplt;
10844 else
10845 s = htab->elf.splt;
10846 dyn.d_un.d_ptr = s->output_section->vma + s->output_offset;
10847 break;
10848
10849 case DT_PLTRELSZ:
10850 dyn.d_un.d_val = htab->elf.srelplt->size;
10851 break;
10852
10853 case DT_JMPREL:
10854 s = htab->elf.srelplt;
10855 dyn.d_un.d_ptr = s->output_section->vma + s->output_offset;
10856 break;
10857
10858 case DT_PPC_GOT:
10859 dyn.d_un.d_ptr = got;
10860 break;
10861
10862 case DT_TEXTREL:
10863 if (htab->local_ifunc_resolver)
10864 info->callbacks->einfo
10865 (_("%X%P: text relocations and GNU indirect "
10866 "functions will result in a segfault at runtime\n"));
10867 else if (htab->maybe_local_ifunc_resolver)
10868 info->callbacks->einfo
10869 (_("%P: warning: text relocations and GNU indirect "
10870 "functions may result in a segfault at runtime\n"));
10871 continue;
10872
10873 default:
10874 if (htab->is_vxworks
10875 && elf_vxworks_finish_dynamic_entry (output_bfd, &dyn))
10876 break;
10877 continue;
10878 }
10879
10880 bfd_elf32_swap_dyn_out (output_bfd, &dyn, dyncon);
10881 }
10882 }
10883
10884 if (htab->elf.sgot != NULL
10885 && htab->elf.sgot->output_section != bfd_abs_section_ptr)
10886 {
10887 if (htab->elf.hgot->root.u.def.section == htab->elf.sgot
10888 || htab->elf.hgot->root.u.def.section == htab->elf.sgotplt)
10889 {
10890 unsigned char *p = htab->elf.hgot->root.u.def.section->contents;
10891
10892 p += htab->elf.hgot->root.u.def.value;
10893 if (htab->plt_type == PLT_OLD)
10894 {
10895 /* Add a blrl instruction at _GLOBAL_OFFSET_TABLE_-4
10896 so that a function can easily find the address of
10897 _GLOBAL_OFFSET_TABLE_. */
10898 BFD_ASSERT (htab->elf.hgot->root.u.def.value - 4
10899 < htab->elf.hgot->root.u.def.section->size);
10900 bfd_put_32 (output_bfd, 0x4e800021, p - 4);
10901 }
10902
10903 if (sdyn != NULL)
10904 {
10905 bfd_vma val = sdyn->output_section->vma + sdyn->output_offset;
10906 BFD_ASSERT (htab->elf.hgot->root.u.def.value
10907 < htab->elf.hgot->root.u.def.section->size);
10908 bfd_put_32 (output_bfd, val, p);
10909 }
10910 }
10911 else
10912 {
10913 /* xgettext:c-format */
10914 _bfd_error_handler (_("%s not defined in linker created %pA"),
10915 htab->elf.hgot->root.root.string,
10916 (htab->elf.sgotplt != NULL
10917 ? htab->elf.sgotplt : htab->elf.sgot));
10918 bfd_set_error (bfd_error_bad_value);
10919 ret = FALSE;
10920 }
10921
10922 elf_section_data (htab->elf.sgot->output_section)->this_hdr.sh_entsize = 4;
10923 }
10924
10925 /* Fill in the first entry in the VxWorks procedure linkage table. */
10926 if (htab->is_vxworks
10927 && htab->elf.splt != NULL
10928 && htab->elf.splt->size != 0
10929 && htab->elf.splt->output_section != bfd_abs_section_ptr)
10930 {
10931 asection *splt = htab->elf.splt;
10932 /* Use the right PLT. */
10933 const bfd_vma *plt_entry = (bfd_link_pic (info)
10934 ? ppc_elf_vxworks_pic_plt0_entry
10935 : ppc_elf_vxworks_plt0_entry);
10936
10937 if (!bfd_link_pic (info))
10938 {
10939 bfd_vma got_value = SYM_VAL (htab->elf.hgot);
10940
10941 bfd_put_32 (output_bfd, plt_entry[0] | PPC_HA (got_value),
10942 splt->contents + 0);
10943 bfd_put_32 (output_bfd, plt_entry[1] | PPC_LO (got_value),
10944 splt->contents + 4);
10945 }
10946 else
10947 {
10948 bfd_put_32 (output_bfd, plt_entry[0], splt->contents + 0);
10949 bfd_put_32 (output_bfd, plt_entry[1], splt->contents + 4);
10950 }
10951 bfd_put_32 (output_bfd, plt_entry[2], splt->contents + 8);
10952 bfd_put_32 (output_bfd, plt_entry[3], splt->contents + 12);
10953 bfd_put_32 (output_bfd, plt_entry[4], splt->contents + 16);
10954 bfd_put_32 (output_bfd, plt_entry[5], splt->contents + 20);
10955 bfd_put_32 (output_bfd, plt_entry[6], splt->contents + 24);
10956 bfd_put_32 (output_bfd, plt_entry[7], splt->contents + 28);
10957
10958 if (! bfd_link_pic (info))
10959 {
10960 Elf_Internal_Rela rela;
10961 bfd_byte *loc;
10962
10963 loc = htab->srelplt2->contents;
10964
10965 /* Output the @ha relocation for the first instruction. */
10966 rela.r_offset = (htab->elf.splt->output_section->vma
10967 + htab->elf.splt->output_offset
10968 + 2);
10969 rela.r_info = ELF32_R_INFO (htab->elf.hgot->indx, R_PPC_ADDR16_HA);
10970 rela.r_addend = 0;
10971 bfd_elf32_swap_reloca_out (output_bfd, &rela, loc);
10972 loc += sizeof (Elf32_External_Rela);
10973
10974 /* Output the @l relocation for the second instruction. */
10975 rela.r_offset = (htab->elf.splt->output_section->vma
10976 + htab->elf.splt->output_offset
10977 + 6);
10978 rela.r_info = ELF32_R_INFO (htab->elf.hgot->indx, R_PPC_ADDR16_LO);
10979 rela.r_addend = 0;
10980 bfd_elf32_swap_reloca_out (output_bfd, &rela, loc);
10981 loc += sizeof (Elf32_External_Rela);
10982
10983 /* Fix up the remaining relocations. They may have the wrong
10984 symbol index for _G_O_T_ or _P_L_T_ depending on the order
10985 in which symbols were output. */
10986 while (loc < htab->srelplt2->contents + htab->srelplt2->size)
10987 {
10988 Elf_Internal_Rela rel;
10989
10990 bfd_elf32_swap_reloc_in (output_bfd, loc, &rel);
10991 rel.r_info = ELF32_R_INFO (htab->elf.hgot->indx, R_PPC_ADDR16_HA);
10992 bfd_elf32_swap_reloc_out (output_bfd, &rel, loc);
10993 loc += sizeof (Elf32_External_Rela);
10994
10995 bfd_elf32_swap_reloc_in (output_bfd, loc, &rel);
10996 rel.r_info = ELF32_R_INFO (htab->elf.hgot->indx, R_PPC_ADDR16_LO);
10997 bfd_elf32_swap_reloc_out (output_bfd, &rel, loc);
10998 loc += sizeof (Elf32_External_Rela);
10999
11000 bfd_elf32_swap_reloc_in (output_bfd, loc, &rel);
11001 rel.r_info = ELF32_R_INFO (htab->elf.hplt->indx, R_PPC_ADDR32);
11002 bfd_elf32_swap_reloc_out (output_bfd, &rel, loc);
11003 loc += sizeof (Elf32_External_Rela);
11004 }
11005 }
11006 }
11007
11008 if (htab->glink != NULL
11009 && htab->glink->contents != NULL
11010 && htab->elf.dynamic_sections_created)
11011 {
11012 unsigned char *p;
11013 unsigned char *endp;
11014 bfd_vma res0;
11015
11016 /*
11017 * PIC glink code is the following:
11018 *
11019 * # ith PLT code stub.
11020 * addis 11,30,(plt+(i-1)*4-got)@ha
11021 * lwz 11,(plt+(i-1)*4-got)@l(11)
11022 * mtctr 11
11023 * bctr
11024 *
11025 * # A table of branches, one for each plt entry.
11026 * # The idea is that the plt call stub loads ctr and r11 with these
11027 * # addresses, so (r11 - res_0) gives the plt index * 4.
11028 * res_0: b PLTresolve
11029 * res_1: b PLTresolve
11030 * .
11031 * # Some number of entries towards the end can be nops
11032 * res_n_m3: nop
11033 * res_n_m2: nop
11034 * res_n_m1:
11035 *
11036 * PLTresolve:
11037 * addis 11,11,(1f-res_0)@ha
11038 * mflr 0
11039 * bcl 20,31,1f
11040 * 1: addi 11,11,(1b-res_0)@l
11041 * mflr 12
11042 * mtlr 0
11043 * sub 11,11,12 # r11 = index * 4
11044 * addis 12,12,(got+4-1b)@ha
11045 * lwz 0,(got+4-1b)@l(12) # got[1] address of dl_runtime_resolve
11046 * lwz 12,(got+8-1b)@l(12) # got[2] contains the map address
11047 * mtctr 0
11048 * add 0,11,11
11049 * add 11,0,11 # r11 = index * 12 = reloc offset.
11050 * bctr
11051 *
11052 * Non-PIC glink code is a little simpler.
11053 *
11054 * # ith PLT code stub.
11055 * lis 11,(plt+(i-1)*4)@ha
11056 * lwz 11,(plt+(i-1)*4)@l(11)
11057 * mtctr 11
11058 * bctr
11059 *
11060 * The branch table is the same, then comes
11061 *
11062 * PLTresolve:
11063 * lis 12,(got+4)@ha
11064 * addis 11,11,(-res_0)@ha
11065 * lwz 0,(got+4)@l(12) # got[1] address of dl_runtime_resolve
11066 * addi 11,11,(-res_0)@l # r11 = index * 4
11067 * mtctr 0
11068 * add 0,11,11
11069 * lwz 12,(got+8)@l(12) # got[2] contains the map address
11070 * add 11,0,11 # r11 = index * 12 = reloc offset.
11071 * bctr
11072 */
11073
11074 /* Build the branch table, one for each plt entry (less one),
11075 and perhaps some padding. */
11076 p = htab->glink->contents;
11077 p += htab->glink_pltresolve;
11078 endp = htab->glink->contents;
11079 endp += htab->glink->size - GLINK_PLTRESOLVE;
11080 while (p < endp - (htab->params->ppc476_workaround ? 0 : 8 * 4))
11081 {
11082 bfd_put_32 (output_bfd, B + endp - p, p);
11083 p += 4;
11084 }
11085 while (p < endp)
11086 {
11087 bfd_put_32 (output_bfd, NOP, p);
11088 p += 4;
11089 }
11090
11091 res0 = (htab->glink_pltresolve
11092 + htab->glink->output_section->vma
11093 + htab->glink->output_offset);
11094
11095 if (htab->params->ppc476_workaround)
11096 {
11097 /* Ensure that a call stub at the end of a page doesn't
11098 result in prefetch over the end of the page into the
11099 glink branch table. */
11100 bfd_vma pagesize = (bfd_vma) 1 << htab->params->pagesize_p2;
11101 bfd_vma page_addr;
11102 bfd_vma glink_start = (htab->glink->output_section->vma
11103 + htab->glink->output_offset);
11104
11105 for (page_addr = res0 & -pagesize;
11106 page_addr > glink_start;
11107 page_addr -= pagesize)
11108 {
11109 /* We have a plt call stub that may need fixing. */
11110 bfd_byte *loc;
11111 unsigned int insn;
11112
11113 loc = htab->glink->contents + page_addr - 4 - glink_start;
11114 insn = bfd_get_32 (output_bfd, loc);
11115 if (insn == BCTR)
11116 {
11117 /* By alignment, we know that there must be at least
11118 one other call stub before this one. */
11119 insn = bfd_get_32 (output_bfd, loc - 16);
11120 if (insn == BCTR)
11121 bfd_put_32 (output_bfd, B | (-16 & 0x3fffffc), loc);
11122 else
11123 bfd_put_32 (output_bfd, B | (-20 & 0x3fffffc), loc);
11124 }
11125 }
11126 }
11127
11128 /* Last comes the PLTresolve stub. */
11129 endp = p + GLINK_PLTRESOLVE;
11130 if (bfd_link_pic (info))
11131 {
11132 bfd_vma bcl;
11133
11134 bcl = (htab->glink->size - GLINK_PLTRESOLVE + 3*4
11135 + htab->glink->output_section->vma
11136 + htab->glink->output_offset);
11137
11138 bfd_put_32 (output_bfd, ADDIS_11_11 + PPC_HA (bcl - res0), p);
11139 p += 4;
11140 bfd_put_32 (output_bfd, MFLR_0, p);
11141 p += 4;
11142 bfd_put_32 (output_bfd, BCL_20_31, p);
11143 p += 4;
11144 bfd_put_32 (output_bfd, ADDI_11_11 + PPC_LO (bcl - res0), p);
11145 p += 4;
11146 bfd_put_32 (output_bfd, MFLR_12, p);
11147 p += 4;
11148 bfd_put_32 (output_bfd, MTLR_0, p);
11149 p += 4;
11150 bfd_put_32 (output_bfd, SUB_11_11_12, p);
11151 p += 4;
11152 bfd_put_32 (output_bfd, ADDIS_12_12 + PPC_HA (got + 4 - bcl), p);
11153 p += 4;
11154 if (PPC_HA (got + 4 - bcl) == PPC_HA (got + 8 - bcl))
11155 {
11156 bfd_put_32 (output_bfd, LWZ_0_12 + PPC_LO (got + 4 - bcl), p);
11157 p += 4;
11158 bfd_put_32 (output_bfd, LWZ_12_12 + PPC_LO (got + 8 - bcl), p);
11159 p += 4;
11160 }
11161 else
11162 {
11163 bfd_put_32 (output_bfd, LWZU_0_12 + PPC_LO (got + 4 - bcl), p);
11164 p += 4;
11165 bfd_put_32 (output_bfd, LWZ_12_12 + 4, p);
11166 p += 4;
11167 }
11168 bfd_put_32 (output_bfd, MTCTR_0, p);
11169 p += 4;
11170 bfd_put_32 (output_bfd, ADD_0_11_11, p);
11171 }
11172 else
11173 {
11174 bfd_put_32 (output_bfd, LIS_12 + PPC_HA (got + 4), p);
11175 p += 4;
11176 bfd_put_32 (output_bfd, ADDIS_11_11 + PPC_HA (-res0), p);
11177 p += 4;
11178 if (PPC_HA (got + 4) == PPC_HA (got + 8))
11179 bfd_put_32 (output_bfd, LWZ_0_12 + PPC_LO (got + 4), p);
11180 else
11181 bfd_put_32 (output_bfd, LWZU_0_12 + PPC_LO (got + 4), p);
11182 p += 4;
11183 bfd_put_32 (output_bfd, ADDI_11_11 + PPC_LO (-res0), p);
11184 p += 4;
11185 bfd_put_32 (output_bfd, MTCTR_0, p);
11186 p += 4;
11187 bfd_put_32 (output_bfd, ADD_0_11_11, p);
11188 p += 4;
11189 if (PPC_HA (got + 4) == PPC_HA (got + 8))
11190 bfd_put_32 (output_bfd, LWZ_12_12 + PPC_LO (got + 8), p);
11191 else
11192 bfd_put_32 (output_bfd, LWZ_12_12 + 4, p);
11193 }
11194 p += 4;
11195 bfd_put_32 (output_bfd, ADD_11_0_11, p);
11196 p += 4;
11197 bfd_put_32 (output_bfd, BCTR, p);
11198 p += 4;
11199 while (p < endp)
11200 {
11201 bfd_put_32 (output_bfd,
11202 htab->params->ppc476_workaround ? BA : NOP, p);
11203 p += 4;
11204 }
11205 BFD_ASSERT (p == endp);
11206 }
11207
11208 if (htab->glink_eh_frame != NULL
11209 && htab->glink_eh_frame->contents != NULL)
11210 {
11211 unsigned char *p = htab->glink_eh_frame->contents;
11212 bfd_vma val;
11213
11214 p += sizeof (glink_eh_frame_cie);
11215 /* FDE length. */
11216 p += 4;
11217 /* CIE pointer. */
11218 p += 4;
11219 /* Offset to .glink. */
11220 val = (htab->glink->output_section->vma
11221 + htab->glink->output_offset);
11222 val -= (htab->glink_eh_frame->output_section->vma
11223 + htab->glink_eh_frame->output_offset);
11224 val -= p - htab->glink_eh_frame->contents;
11225 bfd_put_32 (htab->elf.dynobj, val, p);
11226
11227 if (htab->glink_eh_frame->sec_info_type == SEC_INFO_TYPE_EH_FRAME
11228 && !_bfd_elf_write_section_eh_frame (output_bfd, info,
11229 htab->glink_eh_frame,
11230 htab->glink_eh_frame->contents))
11231 return FALSE;
11232 }
11233
11234 return ret;
11235 }
11236 \f
11237 #define TARGET_LITTLE_SYM powerpc_elf32_le_vec
11238 #define TARGET_LITTLE_NAME "elf32-powerpcle"
11239 #define TARGET_BIG_SYM powerpc_elf32_vec
11240 #define TARGET_BIG_NAME "elf32-powerpc"
11241 #define ELF_ARCH bfd_arch_powerpc
11242 #define ELF_TARGET_ID PPC32_ELF_DATA
11243 #define ELF_MACHINE_CODE EM_PPC
11244 #ifdef __QNXTARGET__
11245 #define ELF_MAXPAGESIZE 0x1000
11246 #define ELF_COMMONPAGESIZE 0x1000
11247 #else
11248 #define ELF_MAXPAGESIZE 0x10000
11249 #define ELF_COMMONPAGESIZE 0x10000
11250 #endif
11251 #define ELF_MINPAGESIZE 0x1000
11252 #define elf_info_to_howto ppc_elf_info_to_howto
11253
11254 #ifdef EM_CYGNUS_POWERPC
11255 #define ELF_MACHINE_ALT1 EM_CYGNUS_POWERPC
11256 #endif
11257
11258 #ifdef EM_PPC_OLD
11259 #define ELF_MACHINE_ALT2 EM_PPC_OLD
11260 #endif
11261
11262 #define elf_backend_plt_not_loaded 1
11263 #define elf_backend_want_dynrelro 1
11264 #define elf_backend_can_gc_sections 1
11265 #define elf_backend_can_refcount 1
11266 #define elf_backend_rela_normal 1
11267 #define elf_backend_caches_rawsize 1
11268
11269 #define bfd_elf32_mkobject ppc_elf_mkobject
11270 #define bfd_elf32_bfd_merge_private_bfd_data ppc_elf_merge_private_bfd_data
11271 #define bfd_elf32_bfd_relax_section ppc_elf_relax_section
11272 #define bfd_elf32_bfd_reloc_type_lookup ppc_elf_reloc_type_lookup
11273 #define bfd_elf32_bfd_reloc_name_lookup ppc_elf_reloc_name_lookup
11274 #define bfd_elf32_bfd_set_private_flags ppc_elf_set_private_flags
11275 #define bfd_elf32_bfd_link_hash_table_create ppc_elf_link_hash_table_create
11276 #define bfd_elf32_get_synthetic_symtab ppc_elf_get_synthetic_symtab
11277
11278 #define elf_backend_object_p ppc_elf_object_p
11279 #define elf_backend_gc_mark_hook ppc_elf_gc_mark_hook
11280 #define elf_backend_section_from_shdr ppc_elf_section_from_shdr
11281 #define elf_backend_relocate_section ppc_elf_relocate_section
11282 #define elf_backend_create_dynamic_sections ppc_elf_create_dynamic_sections
11283 #define elf_backend_check_relocs ppc_elf_check_relocs
11284 #define elf_backend_relocs_compatible _bfd_elf_relocs_compatible
11285 #define elf_backend_copy_indirect_symbol ppc_elf_copy_indirect_symbol
11286 #define elf_backend_adjust_dynamic_symbol ppc_elf_adjust_dynamic_symbol
11287 #define elf_backend_add_symbol_hook ppc_elf_add_symbol_hook
11288 #define elf_backend_size_dynamic_sections ppc_elf_size_dynamic_sections
11289 #define elf_backend_hash_symbol ppc_elf_hash_symbol
11290 #define elf_backend_finish_dynamic_symbol ppc_elf_finish_dynamic_symbol
11291 #define elf_backend_finish_dynamic_sections ppc_elf_finish_dynamic_sections
11292 #define elf_backend_fake_sections ppc_elf_fake_sections
11293 #define elf_backend_additional_program_headers ppc_elf_additional_program_headers
11294 #define elf_backend_modify_segment_map ppc_elf_modify_segment_map
11295 #define elf_backend_grok_prstatus ppc_elf_grok_prstatus
11296 #define elf_backend_grok_psinfo ppc_elf_grok_psinfo
11297 #define elf_backend_write_core_note ppc_elf_write_core_note
11298 #define elf_backend_reloc_type_class ppc_elf_reloc_type_class
11299 #define elf_backend_begin_write_processing ppc_elf_begin_write_processing
11300 #define elf_backend_final_write_processing ppc_elf_final_write_processing
11301 #define elf_backend_write_section ppc_elf_write_section
11302 #define elf_backend_get_sec_type_attr ppc_elf_get_sec_type_attr
11303 #define elf_backend_plt_sym_val ppc_elf_plt_sym_val
11304 #define elf_backend_action_discarded ppc_elf_action_discarded
11305 #define elf_backend_init_index_section _bfd_elf_init_1_index_section
11306 #define elf_backend_lookup_section_flags_hook ppc_elf_lookup_section_flags
11307
11308 #include "elf32-target.h"
11309
11310 /* FreeBSD Target */
11311
11312 #undef TARGET_LITTLE_SYM
11313 #undef TARGET_LITTLE_NAME
11314
11315 #undef TARGET_BIG_SYM
11316 #define TARGET_BIG_SYM powerpc_elf32_fbsd_vec
11317 #undef TARGET_BIG_NAME
11318 #define TARGET_BIG_NAME "elf32-powerpc-freebsd"
11319
11320 #undef ELF_OSABI
11321 #define ELF_OSABI ELFOSABI_FREEBSD
11322
11323 #undef elf32_bed
11324 #define elf32_bed elf32_powerpc_fbsd_bed
11325
11326 #include "elf32-target.h"
11327
11328 /* VxWorks Target */
11329
11330 #undef TARGET_LITTLE_SYM
11331 #undef TARGET_LITTLE_NAME
11332
11333 #undef TARGET_BIG_SYM
11334 #define TARGET_BIG_SYM powerpc_elf32_vxworks_vec
11335 #undef TARGET_BIG_NAME
11336 #define TARGET_BIG_NAME "elf32-powerpc-vxworks"
11337
11338 #undef ELF_OSABI
11339
11340 /* VxWorks uses the elf default section flags for .plt. */
11341 static const struct bfd_elf_special_section *
11342 ppc_elf_vxworks_get_sec_type_attr (bfd *abfd, asection *sec)
11343 {
11344 if (sec->name == NULL)
11345 return NULL;
11346
11347 if (strcmp (sec->name, ".plt") == 0)
11348 return _bfd_elf_get_sec_type_attr (abfd, sec);
11349
11350 return ppc_elf_get_sec_type_attr (abfd, sec);
11351 }
11352
11353 /* Like ppc_elf_link_hash_table_create, but overrides
11354 appropriately for VxWorks. */
11355 static struct bfd_link_hash_table *
11356 ppc_elf_vxworks_link_hash_table_create (bfd *abfd)
11357 {
11358 struct bfd_link_hash_table *ret;
11359
11360 ret = ppc_elf_link_hash_table_create (abfd);
11361 if (ret)
11362 {
11363 struct ppc_elf_link_hash_table *htab
11364 = (struct ppc_elf_link_hash_table *)ret;
11365 htab->is_vxworks = 1;
11366 htab->plt_type = PLT_VXWORKS;
11367 htab->plt_entry_size = VXWORKS_PLT_ENTRY_SIZE;
11368 htab->plt_slot_size = VXWORKS_PLT_ENTRY_SIZE;
11369 htab->plt_initial_entry_size = VXWORKS_PLT_INITIAL_ENTRY_SIZE;
11370 }
11371 return ret;
11372 }
11373
11374 /* Tweak magic VxWorks symbols as they are loaded. */
11375 static bfd_boolean
11376 ppc_elf_vxworks_add_symbol_hook (bfd *abfd,
11377 struct bfd_link_info *info,
11378 Elf_Internal_Sym *sym,
11379 const char **namep,
11380 flagword *flagsp,
11381 asection **secp,
11382 bfd_vma *valp)
11383 {
11384 if (!elf_vxworks_add_symbol_hook (abfd, info, sym, namep, flagsp, secp,
11385 valp))
11386 return FALSE;
11387
11388 return ppc_elf_add_symbol_hook (abfd, info, sym, namep, flagsp, secp, valp);
11389 }
11390
11391 static void
11392 ppc_elf_vxworks_final_write_processing (bfd *abfd, bfd_boolean linker)
11393 {
11394 ppc_elf_final_write_processing (abfd, linker);
11395 elf_vxworks_final_write_processing (abfd, linker);
11396 }
11397
11398 /* On VxWorks, we emit relocations against _PROCEDURE_LINKAGE_TABLE_, so
11399 define it. */
11400 #undef elf_backend_want_plt_sym
11401 #define elf_backend_want_plt_sym 1
11402 #undef elf_backend_want_got_plt
11403 #define elf_backend_want_got_plt 1
11404 #undef elf_backend_got_symbol_offset
11405 #define elf_backend_got_symbol_offset 0
11406 #undef elf_backend_plt_not_loaded
11407 #define elf_backend_plt_not_loaded 0
11408 #undef elf_backend_plt_readonly
11409 #define elf_backend_plt_readonly 1
11410 #undef elf_backend_got_header_size
11411 #define elf_backend_got_header_size 12
11412 #undef elf_backend_dtrel_excludes_plt
11413 #define elf_backend_dtrel_excludes_plt 1
11414
11415 #undef bfd_elf32_get_synthetic_symtab
11416
11417 #undef bfd_elf32_bfd_link_hash_table_create
11418 #define bfd_elf32_bfd_link_hash_table_create \
11419 ppc_elf_vxworks_link_hash_table_create
11420 #undef elf_backend_add_symbol_hook
11421 #define elf_backend_add_symbol_hook \
11422 ppc_elf_vxworks_add_symbol_hook
11423 #undef elf_backend_link_output_symbol_hook
11424 #define elf_backend_link_output_symbol_hook \
11425 elf_vxworks_link_output_symbol_hook
11426 #undef elf_backend_final_write_processing
11427 #define elf_backend_final_write_processing \
11428 ppc_elf_vxworks_final_write_processing
11429 #undef elf_backend_get_sec_type_attr
11430 #define elf_backend_get_sec_type_attr \
11431 ppc_elf_vxworks_get_sec_type_attr
11432 #undef elf_backend_emit_relocs
11433 #define elf_backend_emit_relocs \
11434 elf_vxworks_emit_relocs
11435
11436 #undef elf32_bed
11437 #define elf32_bed ppc_elf_vxworks_bed
11438 #undef elf_backend_post_process_headers
11439
11440 #include "elf32-target.h"
This page took 0.251673 seconds and 5 git commands to generate.