Automatic date update in version.in
[deliverable/binutils-gdb.git] / bfd / elf32-hppa.c
CommitLineData
252b5132 1/* BFD back-end for HP PA-RISC ELF files.
b3adc24a 2 Copyright (C) 1990-2020 Free Software Foundation, Inc.
252b5132 3
30667bf3 4 Original code by
252b5132
RH
5 Center for Software Science
6 Department of Computer Science
7 University of Utah
30667bf3 8 Largely rewritten by Alan Modra <alan@linuxcare.com.au>
9b52905e
NC
9 Naming cleanup by Carlos O'Donell <carlos@systemhalted.org>
10 TLS support written by Randolph Chung <tausq@debian.org>
68ffbac6 11
ae9a127f 12 This file is part of BFD, the Binary File Descriptor library.
252b5132 13
ae9a127f
NC
14 This program is free software; you can redistribute it and/or modify
15 it under the terms of the GNU General Public License as published by
cd123cb7 16 the Free Software Foundation; either version 3 of the License, or
ae9a127f 17 (at your option) any later version.
252b5132 18
ae9a127f
NC
19 This program is distributed in the hope that it will be useful,
20 but WITHOUT ANY WARRANTY; without even the implied warranty of
21 MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
22 GNU General Public License for more details.
252b5132 23
ae9a127f
NC
24 You should have received a copy of the GNU General Public License
25 along with this program; if not, write to the Free Software
cd123cb7
NC
26 Foundation, Inc., 51 Franklin Street - Fifth Floor, Boston,
27 MA 02110-1301, USA. */
252b5132 28
252b5132 29#include "sysdep.h"
3db64b00 30#include "bfd.h"
252b5132
RH
31#include "libbfd.h"
32#include "elf-bfd.h"
9e103c9c
JL
33#include "elf/hppa.h"
34#include "libhppa.h"
35#include "elf32-hppa.h"
36#define ARCH_SIZE 32
edd21aca 37#include "elf32-hppa.h"
189c6563 38#include "elf-hppa.h"
9e103c9c 39
74d1c347
AM
40/* In order to gain some understanding of code in this file without
41 knowing all the intricate details of the linker, note the
42 following:
43
44 Functions named elf32_hppa_* are called by external routines, other
45 functions are only called locally. elf32_hppa_* functions appear
46 in this file more or less in the order in which they are called
47 from external routines. eg. elf32_hppa_check_relocs is called
48 early in the link process, elf32_hppa_finish_dynamic_sections is
49 one of the last functions. */
50
edd21aca 51/* We use two hash tables to hold information for linking PA ELF objects.
252b5132
RH
52
53 The first is the elf32_hppa_link_hash_table which is derived
54 from the standard ELF linker hash table. We use this as a place to
55 attach other hash tables and static information.
56
57 The second is the stub hash table which is derived from the
58 base BFD hash table. The stub hash table holds the information
30667bf3
AM
59 necessary to build the linker stubs during a link.
60
61 There are a number of different stubs generated by the linker.
62
63 Long branch stub:
64 : ldil LR'X,%r1
65 : be,n RR'X(%sr4,%r1)
66
67 PIC long branch stub:
68 : b,l .+8,%r1
3ee1d854
AM
69 : addil LR'X - ($PIC_pcrel$0 - 4),%r1
70 : be,n RR'X - ($PIC_pcrel$0 - 8)(%sr4,%r1)
30667bf3
AM
71
72 Import stub to call shared library routine from normal object file
73 (single sub-space version)
18338fce
JDA
74 : addil LR'lt_ptr+ltoff,%dp ; get PLT address
75 : ldo RR'lt_ptr+ltoff(%r1),%r22 ;
76 : ldw 0(%r22),%r21 ; get procedure entry point
46fe4e66 77 : bv %r0(%r21)
18338fce 78 : ldw 4(%r22),%r19 ; get new dlt value.
30667bf3
AM
79
80 Import stub to call shared library routine from shared library
81 (single sub-space version)
18338fce
JDA
82 : addil LR'ltoff,%r19 ; get PLT address
83 : ldo RR'ltoff(%r1),%r22
84 : ldw 0(%r22),%r21 ; get procedure entry point
46fe4e66 85 : bv %r0(%r21)
18338fce 86 : ldw 4(%r22),%r19 ; get new dlt value.
30667bf3
AM
87
88 Import stub to call shared library routine from normal object file
89 (multiple sub-space support)
18338fce
JDA
90 : addil LR'lt_ptr+ltoff,%dp ; get PLT address
91 : ldo RR'lt_ptr+ltoff(%r1),%r22 ;
92 : ldw 0(%r22),%r21 ; get procedure entry point
93 : ldsid (%r21),%r1 ; get target sid
94 : ldw 4(%r22),%r19 ; get new dlt value.
30667bf3
AM
95 : mtsp %r1,%sr0
96 : be 0(%sr0,%r21) ; branch to target
97 : stw %rp,-24(%sp) ; save rp
98
99 Import stub to call shared library routine from shared library
100 (multiple sub-space support)
18338fce
JDA
101 : addil LR'ltoff,%r19 ; get PLT address
102 : ldo RR'ltoff(%r1),%r22
103 : ldw 0(%r22),%r21 ; get procedure entry point
104 : ldsid (%r21),%r1 ; get target sid
105 : ldw 4(%r22),%r19 ; get new dlt value.
30667bf3
AM
106 : mtsp %r1,%sr0
107 : be 0(%sr0,%r21) ; branch to target
108 : stw %rp,-24(%sp) ; save rp
109
110 Export stub to return from shared lib routine (multiple sub-space support)
111 One of these is created for each exported procedure in a shared
112 library (and stored in the shared lib). Shared lib routines are
113 called via the first instruction in the export stub so that we can
114 do an inter-space return. Not required for single sub-space.
115 : bl,n X,%rp ; trap the return
116 : nop
117 : ldw -24(%sp),%rp ; restore the original rp
118 : ldsid (%rp),%r1
119 : mtsp %r1,%sr0
ae9a127f 120 : be,n 0(%sr0,%rp) ; inter-space return. */
30667bf3 121
875c0872
DA
122
123/* Variable names follow a coding style.
124 Please follow this (Apps Hungarian) style:
125
07d6d2b8 126 Structure/Variable Prefix
875c0872
DA
127 elf_link_hash_table "etab"
128 elf_link_hash_entry "eh"
68ffbac6 129
875c0872
DA
130 elf32_hppa_link_hash_table "htab"
131 elf32_hppa_link_hash_entry "hh"
132
133 bfd_hash_table "btab"
134 bfd_hash_entry "bh"
68ffbac6 135
875c0872
DA
136 bfd_hash_table containing stubs "bstab"
137 elf32_hppa_stub_hash_entry "hsh"
138
875c0872 139 Always remember to use GNU Coding Style. */
68ffbac6 140
30667bf3
AM
141#define PLT_ENTRY_SIZE 8
142#define GOT_ENTRY_SIZE 4
18338fce
JDA
143#define LONG_BRANCH_STUB_SIZE 8
144#define LONG_BRANCH_SHARED_STUB_SIZE 12
145#define IMPORT_STUB_SIZE 20
146#define IMPORT_SHARED_STUB_SIZE 32
147#define EXPORT_STUB_SIZE 24
30667bf3
AM
148#define ELF_DYNAMIC_INTERPRETER "/lib/ld.so.1"
149
47d89dba
AM
150static const bfd_byte plt_stub[] =
151{
18338fce
JDA
152 0x0e, 0x80, 0x10, 0x95, /* 1: ldw 0(%r20),%r21 */
153 0xea, 0xa0, 0xc0, 0x00, /* bv %r0(%r21) */
47d89dba
AM
154 0x0e, 0x88, 0x10, 0x95, /* ldw 4(%r20),%r21 */
155#define PLT_STUB_ENTRY (3*4)
156 0xea, 0x9f, 0x1f, 0xdd, /* b,l 1b,%r20 */
157 0xd6, 0x80, 0x1c, 0x1e, /* depi 0,31,2,%r20 */
158 0x00, 0xc0, 0xff, 0xee, /* 9: .word fixup_func */
159 0xde, 0xad, 0xbe, 0xef /* .word fixup_ltp */
160};
161
30667bf3 162/* Section name for stubs is the associated section name plus this
29942be8
NC
163 string. */
164#define STUB_SUFFIX ".stub"
30667bf3 165
98ceb8ce
AM
166/* We don't need to copy certain PC- or GP-relative dynamic relocs
167 into a shared object's dynamic section. All the relocs of the
168 limited class we are interested in, are absolute. */
169#ifndef RELATIVE_DYNRELOCS
170#define RELATIVE_DYNRELOCS 0
446f2863 171#define IS_ABSOLUTE_RELOC(r_type) 1
287c7eaf 172#define pc_dynrelocs(hh) 0
30667bf3
AM
173#endif
174
4fc8051d
AM
175/* If ELIMINATE_COPY_RELOCS is non-zero, the linker will try to avoid
176 copying dynamic variables from a shared lib into an app's dynbss
177 section, and instead use a dynamic relocation to point into the
178 shared lib. */
179#define ELIMINATE_COPY_RELOCS 1
180
9b52905e
NC
181enum elf32_hppa_stub_type
182{
30667bf3
AM
183 hppa_stub_long_branch,
184 hppa_stub_long_branch_shared,
185 hppa_stub_import,
186 hppa_stub_import_shared,
187 hppa_stub_export,
188 hppa_stub_none
189};
190
9b52905e
NC
191struct elf32_hppa_stub_hash_entry
192{
edd21aca 193 /* Base hash table entry structure. */
a63e02c7 194 struct bfd_hash_entry bh_root;
252b5132 195
edd21aca
AM
196 /* The stub section. */
197 asection *stub_sec;
198
199 /* Offset within stub_sec of the beginning of this stub. */
30667bf3 200 bfd_vma stub_offset;
252b5132
RH
201
202 /* Given the symbol's value and its section we can determine its final
203 value when building the stubs (so the stub knows where to jump. */
30667bf3 204 bfd_vma target_value;
252b5132 205 asection *target_section;
30667bf3
AM
206
207 enum elf32_hppa_stub_type stub_type;
208
209 /* The symbol table entry, if any, that this was derived from. */
a63e02c7 210 struct elf32_hppa_link_hash_entry *hh;
30667bf3 211
25f72752
AM
212 /* Where this stub is being called from, or, in the case of combined
213 stub sections, the first input section in the group. */
214 asection *id_sec;
252b5132
RH
215};
216
2e684e75
AM
217enum _tls_type
218 {
219 GOT_UNKNOWN = 0,
220 GOT_NORMAL = 1,
221 GOT_TLS_GD = 2,
222 GOT_TLS_LDM = 4,
223 GOT_TLS_IE = 8
224 };
225
9b52905e
NC
226struct elf32_hppa_link_hash_entry
227{
a63e02c7 228 struct elf_link_hash_entry eh;
30667bf3
AM
229
230 /* A pointer to the most recently used stub hash entry against this
231 symbol. */
a63e02c7 232 struct elf32_hppa_stub_hash_entry *hsh_cache;
30667bf3 233
2e684e75 234 ENUM_BITFIELD (_tls_type) tls_type : 8;
9b52905e 235
74d1c347
AM
236 /* Set if this symbol is used by a plabel reloc. */
237 unsigned int plabel:1;
30667bf3
AM
238};
239
9b52905e
NC
240struct elf32_hppa_link_hash_table
241{
252b5132 242 /* The main hash table. */
a63e02c7 243 struct elf_link_hash_table etab;
252b5132
RH
244
245 /* The stub hash table. */
a63e02c7 246 struct bfd_hash_table bstab;
252b5132 247
30667bf3
AM
248 /* Linker stub bfd. */
249 bfd *stub_bfd;
250
30667bf3 251 /* Linker call-backs. */
c39a58e6
AM
252 asection * (*add_stub_section) (const char *, asection *);
253 void (*layout_sections_again) (void);
30667bf3 254
25f72752
AM
255 /* Array to keep track of which stub sections have been created, and
256 information on stub grouping. */
9b52905e
NC
257 struct map_stub
258 {
25f72752
AM
259 /* This is the section to which stubs in the group will be
260 attached. */
261 asection *link_sec;
262 /* The stub section. */
263 asection *stub_sec;
25f72752 264 } *stub_group;
30667bf3 265
b4655ea9
AM
266 /* Assorted information used by elf32_hppa_size_stubs. */
267 unsigned int bfd_count;
7292b3ac 268 unsigned int top_index;
b4655ea9
AM
269 asection **input_list;
270 Elf_Internal_Sym **all_local_syms;
271
c46b7515
AM
272 /* Used during a final link to store the base of the text and data
273 segments so that we can perform SEGREL relocations. */
274 bfd_vma text_segment_base;
275 bfd_vma data_segment_base;
276
47d89dba
AM
277 /* Whether we support multiple sub-spaces for shared libs. */
278 unsigned int multi_subspace:1;
279
067fa4a6 280 /* Flags set when various size branches are detected. Used to
47d89dba
AM
281 select suitable defaults for the stub group size. */
282 unsigned int has_12bit_branch:1;
283 unsigned int has_17bit_branch:1;
067fa4a6 284 unsigned int has_22bit_branch:1;
47d89dba
AM
285
286 /* Set if we need a .plt stub to support lazy dynamic linking. */
287 unsigned int need_plt_stub:1;
ec338859 288
87d72d41
AM
289 /* Small local sym cache. */
290 struct sym_cache sym_cache;
9b52905e
NC
291
292 /* Data for LDM relocations. */
293 union
294 {
295 bfd_signed_vma refcount;
296 bfd_vma offset;
297 } tls_ldm_got;
252b5132
RH
298};
299
30667bf3
AM
300/* Various hash macros and functions. */
301#define hppa_link_hash_table(p) \
4dfe6ac6
NC
302 (elf_hash_table_id ((struct elf_link_hash_table *) ((p)->hash)) \
303 == HPPA32_ELF_DATA ? ((struct elf32_hppa_link_hash_table *) ((p)->hash)) : NULL)
252b5132 304
875c0872
DA
305#define hppa_elf_hash_entry(ent) \
306 ((struct elf32_hppa_link_hash_entry *)(ent))
307
308#define hppa_stub_hash_entry(ent) \
309 ((struct elf32_hppa_stub_hash_entry *)(ent))
310
30667bf3
AM
311#define hppa_stub_hash_lookup(table, string, create, copy) \
312 ((struct elf32_hppa_stub_hash_entry *) \
313 bfd_hash_lookup ((table), (string), (create), (copy)))
314
9b52905e
NC
315#define hppa_elf_local_got_tls_type(abfd) \
316 ((char *)(elf_local_got_offsets (abfd) + (elf_tdata (abfd)->symtab_hdr.sh_info * 2)))
317
318#define hh_name(hh) \
319 (hh ? hh->eh.root.root.string : "<undef>")
320
321#define eh_name(eh) \
322 (eh ? eh->root.root.string : "<undef>")
323
252b5132
RH
324/* Assorted hash table functions. */
325
326/* Initialize an entry in the stub hash table. */
327
328static struct bfd_hash_entry *
c39a58e6
AM
329stub_hash_newfunc (struct bfd_hash_entry *entry,
330 struct bfd_hash_table *table,
331 const char *string)
252b5132 332{
252b5132
RH
333 /* Allocate the structure if it has not already been allocated by a
334 subclass. */
ebe50bae 335 if (entry == NULL)
30667bf3 336 {
ebe50bae
AM
337 entry = bfd_hash_allocate (table,
338 sizeof (struct elf32_hppa_stub_hash_entry));
339 if (entry == NULL)
340 return entry;
30667bf3 341 }
252b5132
RH
342
343 /* Call the allocation method of the superclass. */
ebe50bae
AM
344 entry = bfd_hash_newfunc (entry, table, string);
345 if (entry != NULL)
252b5132 346 {
875c0872 347 struct elf32_hppa_stub_hash_entry *hsh;
ebe50bae 348
252b5132 349 /* Initialize the local fields. */
875c0872
DA
350 hsh = hppa_stub_hash_entry (entry);
351 hsh->stub_sec = NULL;
352 hsh->stub_offset = 0;
353 hsh->target_value = 0;
354 hsh->target_section = NULL;
355 hsh->stub_type = hppa_stub_long_branch;
a63e02c7 356 hsh->hh = NULL;
875c0872 357 hsh->id_sec = NULL;
30667bf3
AM
358 }
359
ebe50bae 360 return entry;
30667bf3
AM
361}
362
30667bf3
AM
363/* Initialize an entry in the link hash table. */
364
365static struct bfd_hash_entry *
c39a58e6
AM
366hppa_link_hash_newfunc (struct bfd_hash_entry *entry,
367 struct bfd_hash_table *table,
368 const char *string)
30667bf3 369{
30667bf3
AM
370 /* Allocate the structure if it has not already been allocated by a
371 subclass. */
ebe50bae 372 if (entry == NULL)
30667bf3 373 {
ebe50bae
AM
374 entry = bfd_hash_allocate (table,
375 sizeof (struct elf32_hppa_link_hash_entry));
376 if (entry == NULL)
377 return entry;
30667bf3
AM
378 }
379
380 /* Call the allocation method of the superclass. */
ebe50bae
AM
381 entry = _bfd_elf_link_hash_newfunc (entry, table, string);
382 if (entry != NULL)
30667bf3 383 {
875c0872 384 struct elf32_hppa_link_hash_entry *hh;
ebe50bae 385
30667bf3 386 /* Initialize the local fields. */
875c0872 387 hh = hppa_elf_hash_entry (entry);
a63e02c7 388 hh->hsh_cache = NULL;
875c0872 389 hh->plabel = 0;
9b52905e 390 hh->tls_type = GOT_UNKNOWN;
252b5132
RH
391 }
392
ebe50bae 393 return entry;
252b5132
RH
394}
395
68faa637
AM
396/* Free the derived linker hash table. */
397
398static void
d495ab0d 399elf32_hppa_link_hash_table_free (bfd *obfd)
68faa637
AM
400{
401 struct elf32_hppa_link_hash_table *htab
d495ab0d 402 = (struct elf32_hppa_link_hash_table *) obfd->link.hash;
68faa637
AM
403
404 bfd_hash_table_free (&htab->bstab);
d495ab0d 405 _bfd_elf_link_hash_table_free (obfd);
68faa637
AM
406}
407
252b5132
RH
408/* Create the derived linker hash table. The PA ELF port uses the derived
409 hash table to keep information specific to the PA ELF linker (without
410 using static variables). */
411
412static struct bfd_link_hash_table *
c39a58e6 413elf32_hppa_link_hash_table_create (bfd *abfd)
252b5132 414{
875c0872 415 struct elf32_hppa_link_hash_table *htab;
986f0783 416 size_t amt = sizeof (*htab);
252b5132 417
7bf52ea2 418 htab = bfd_zmalloc (amt);
875c0872 419 if (htab == NULL)
252b5132 420 return NULL;
edd21aca 421
66eb6687 422 if (!_bfd_elf_link_hash_table_init (&htab->etab, abfd, hppa_link_hash_newfunc,
4dfe6ac6
NC
423 sizeof (struct elf32_hppa_link_hash_entry),
424 HPPA32_ELF_DATA))
252b5132 425 {
875c0872 426 free (htab);
252b5132
RH
427 return NULL;
428 }
edd21aca
AM
429
430 /* Init the stub hash table too. */
66eb6687
AM
431 if (!bfd_hash_table_init (&htab->bstab, stub_hash_newfunc,
432 sizeof (struct elf32_hppa_stub_hash_entry)))
d495ab0d
AM
433 {
434 _bfd_elf_link_hash_table_free (abfd);
435 return NULL;
436 }
437 htab->etab.root.hash_table_free = elf32_hppa_link_hash_table_free;
edd21aca 438
875c0872
DA
439 htab->text_segment_base = (bfd_vma) -1;
440 htab->data_segment_base = (bfd_vma) -1;
a63e02c7 441 return &htab->etab.root;
252b5132
RH
442}
443
a464198b
AM
444/* Initialize the linker stubs BFD so that we can use it for linker
445 created dynamic sections. */
446
447void
448elf32_hppa_init_stub_bfd (bfd *abfd, struct bfd_link_info *info)
449{
450 struct elf32_hppa_link_hash_table *htab = hppa_link_hash_table (info);
451
452 elf_elfheader (abfd)->e_ident[EI_CLASS] = ELFCLASS32;
453 htab->etab.dynobj = abfd;
454}
455
30667bf3
AM
456/* Build a name for an entry in the stub hash table. */
457
edd21aca 458static char *
c39a58e6
AM
459hppa_stub_name (const asection *input_section,
460 const asection *sym_sec,
875c0872
DA
461 const struct elf32_hppa_link_hash_entry *hh,
462 const Elf_Internal_Rela *rela)
edd21aca
AM
463{
464 char *stub_name;
dc810e39 465 bfd_size_type len;
edd21aca 466
875c0872 467 if (hh)
30667bf3 468 {
9b52905e 469 len = 8 + 1 + strlen (hh_name (hh)) + 1 + 8 + 1;
30667bf3
AM
470 stub_name = bfd_malloc (len);
471 if (stub_name != NULL)
9b52905e
NC
472 sprintf (stub_name, "%08x_%s+%x",
473 input_section->id & 0xffffffff,
474 hh_name (hh),
475 (int) rela->r_addend & 0xffffffff);
30667bf3
AM
476 }
477 else
edd21aca 478 {
30667bf3
AM
479 len = 8 + 1 + 8 + 1 + 8 + 1 + 8 + 1;
480 stub_name = bfd_malloc (len);
481 if (stub_name != NULL)
9b52905e
NC
482 sprintf (stub_name, "%08x_%x:%x+%x",
483 input_section->id & 0xffffffff,
484 sym_sec->id & 0xffffffff,
485 (int) ELF32_R_SYM (rela->r_info) & 0xffffffff,
486 (int) rela->r_addend & 0xffffffff);
edd21aca
AM
487 }
488 return stub_name;
489}
252b5132 490
30667bf3
AM
491/* Look up an entry in the stub hash. Stub entries are cached because
492 creating the stub name takes a bit of time. */
493
494static struct elf32_hppa_stub_hash_entry *
c39a58e6
AM
495hppa_get_stub_entry (const asection *input_section,
496 const asection *sym_sec,
875c0872
DA
497 struct elf32_hppa_link_hash_entry *hh,
498 const Elf_Internal_Rela *rela,
c39a58e6 499 struct elf32_hppa_link_hash_table *htab)
252b5132 500{
a63e02c7 501 struct elf32_hppa_stub_hash_entry *hsh_entry;
25f72752
AM
502 const asection *id_sec;
503
504 /* If this input section is part of a group of sections sharing one
505 stub section, then use the id of the first section in the group.
506 Stub names need to include a section id, as there may well be
507 more than one stub used to reach say, printf, and we need to
508 distinguish between them. */
83c81bfe 509 id_sec = htab->stub_group[input_section->id].link_sec;
215f5271
AM
510 if (id_sec == NULL)
511 return NULL;
edd21aca 512
a63e02c7
DA
513 if (hh != NULL && hh->hsh_cache != NULL
514 && hh->hsh_cache->hh == hh
515 && hh->hsh_cache->id_sec == id_sec)
edd21aca 516 {
a63e02c7 517 hsh_entry = hh->hsh_cache;
30667bf3
AM
518 }
519 else
520 {
30667bf3 521 char *stub_name;
edd21aca 522
875c0872 523 stub_name = hppa_stub_name (id_sec, sym_sec, hh, rela);
30667bf3
AM
524 if (stub_name == NULL)
525 return NULL;
edd21aca 526
a63e02c7 527 hsh_entry = hppa_stub_hash_lookup (&htab->bstab,
b34976b6 528 stub_name, FALSE, FALSE);
875c0872 529 if (hh != NULL)
a63e02c7 530 hh->hsh_cache = hsh_entry;
30667bf3
AM
531
532 free (stub_name);
edd21aca 533 }
30667bf3 534
a63e02c7 535 return hsh_entry;
30667bf3
AM
536}
537
30667bf3
AM
538/* Add a new stub entry to the stub hash. Not all fields of the new
539 stub entry are initialised. */
540
541static struct elf32_hppa_stub_hash_entry *
c39a58e6
AM
542hppa_add_stub (const char *stub_name,
543 asection *section,
544 struct elf32_hppa_link_hash_table *htab)
30667bf3 545{
25f72752 546 asection *link_sec;
30667bf3 547 asection *stub_sec;
875c0872 548 struct elf32_hppa_stub_hash_entry *hsh;
edd21aca 549
83c81bfe
AM
550 link_sec = htab->stub_group[section->id].link_sec;
551 stub_sec = htab->stub_group[section->id].stub_sec;
30667bf3 552 if (stub_sec == NULL)
edd21aca 553 {
83c81bfe 554 stub_sec = htab->stub_group[link_sec->id].stub_sec;
30667bf3
AM
555 if (stub_sec == NULL)
556 {
d4c88bbb 557 size_t namelen;
dc810e39 558 bfd_size_type len;
30667bf3
AM
559 char *s_name;
560
d4c88bbb
AM
561 namelen = strlen (link_sec->name);
562 len = namelen + sizeof (STUB_SUFFIX);
83c81bfe 563 s_name = bfd_alloc (htab->stub_bfd, len);
30667bf3
AM
564 if (s_name == NULL)
565 return NULL;
566
d4c88bbb
AM
567 memcpy (s_name, link_sec->name, namelen);
568 memcpy (s_name + namelen, STUB_SUFFIX, sizeof (STUB_SUFFIX));
83c81bfe 569 stub_sec = (*htab->add_stub_section) (s_name, link_sec);
30667bf3
AM
570 if (stub_sec == NULL)
571 return NULL;
83c81bfe 572 htab->stub_group[link_sec->id].stub_sec = stub_sec;
30667bf3 573 }
83c81bfe 574 htab->stub_group[section->id].stub_sec = stub_sec;
edd21aca 575 }
252b5132 576
30667bf3 577 /* Enter this entry into the linker stub hash table. */
a63e02c7 578 hsh = hppa_stub_hash_lookup (&htab->bstab, stub_name,
b34976b6 579 TRUE, FALSE);
875c0872 580 if (hsh == NULL)
30667bf3 581 {
695344c0 582 /* xgettext:c-format */
871b3ab2 583 _bfd_error_handler (_("%pB: cannot create stub entry %s"),
4eca0228 584 section->owner, stub_name);
30667bf3 585 return NULL;
edd21aca
AM
586 }
587
875c0872
DA
588 hsh->stub_sec = stub_sec;
589 hsh->stub_offset = 0;
590 hsh->id_sec = link_sec;
591 return hsh;
edd21aca
AM
592}
593
30667bf3
AM
594/* Determine the type of stub needed, if any, for a call. */
595
596static enum elf32_hppa_stub_type
c39a58e6 597hppa_type_of_stub (asection *input_sec,
875c0872
DA
598 const Elf_Internal_Rela *rela,
599 struct elf32_hppa_link_hash_entry *hh,
a252afa4
DA
600 bfd_vma destination,
601 struct bfd_link_info *info)
edd21aca 602{
edd21aca 603 bfd_vma location;
30667bf3
AM
604 bfd_vma branch_offset;
605 bfd_vma max_branch_offset;
606 unsigned int r_type;
607
875c0872 608 if (hh != NULL
a63e02c7
DA
609 && hh->eh.plt.offset != (bfd_vma) -1
610 && hh->eh.dynindx != -1
875c0872 611 && !hh->plabel
0e1862bb 612 && (bfd_link_pic (info)
a63e02c7
DA
613 || !hh->eh.def_regular
614 || hh->eh.root.type == bfd_link_hash_defweak))
30667bf3 615 {
067fa4a6
AM
616 /* We need an import stub. Decide between hppa_stub_import
617 and hppa_stub_import_shared later. */
30667bf3
AM
618 return hppa_stub_import;
619 }
edd21aca 620
f6a8b8c7
AM
621 if (destination == (bfd_vma) -1)
622 return hppa_stub_none;
623
30667bf3
AM
624 /* Determine where the call point is. */
625 location = (input_sec->output_offset
626 + input_sec->output_section->vma
875c0872 627 + rela->r_offset);
edd21aca 628
30667bf3 629 branch_offset = destination - location - 8;
875c0872 630 r_type = ELF32_R_TYPE (rela->r_info);
edd21aca 631
30667bf3
AM
632 /* Determine if a long branch stub is needed. parisc branch offsets
633 are relative to the second instruction past the branch, ie. +8
634 bytes on from the branch instruction location. The offset is
635 signed and counts in units of 4 bytes. */
636 if (r_type == (unsigned int) R_PARISC_PCREL17F)
9b52905e
NC
637 max_branch_offset = (1 << (17 - 1)) << 2;
638
30667bf3 639 else if (r_type == (unsigned int) R_PARISC_PCREL12F)
9b52905e
NC
640 max_branch_offset = (1 << (12 - 1)) << 2;
641
25f72752 642 else /* R_PARISC_PCREL22F. */
9b52905e 643 max_branch_offset = (1 << (22 - 1)) << 2;
edd21aca 644
30667bf3 645 if (branch_offset + max_branch_offset >= 2*max_branch_offset)
98ceb8ce
AM
646 return hppa_stub_long_branch;
647
30667bf3
AM
648 return hppa_stub_none;
649}
edd21aca 650
30667bf3
AM
651/* Build one linker stub as defined by the stub hash table entry GEN_ENTRY.
652 IN_ARG contains the link info pointer. */
edd21aca 653
30667bf3
AM
654#define LDIL_R1 0x20200000 /* ldil LR'XXX,%r1 */
655#define BE_SR4_R1 0xe0202002 /* be,n RR'XXX(%sr4,%r1) */
edd21aca 656
30667bf3 657#define BL_R1 0xe8200000 /* b,l .+8,%r1 */
3ee1d854 658#define ADDIL_R1 0x28200000 /* addil LR'XXX,%r1,%r1 */
30667bf3 659#define DEPI_R1 0xd4201c1e /* depi 0,31,2,%r1 */
252b5132 660
3ee1d854
AM
661#define ADDIL_DP 0x2b600000 /* addil LR'XXX,%dp,%r1 */
662#define LDW_R1_R21 0x48350000 /* ldw RR'XXX(%sr0,%r1),%r21 */
30667bf3 663#define BV_R0_R21 0xeaa0c000 /* bv %r0(%r21) */
3ee1d854 664#define LDW_R1_R19 0x48330000 /* ldw RR'XXX(%sr0,%r1),%r19 */
252b5132 665
3ee1d854
AM
666#define ADDIL_R19 0x2a600000 /* addil LR'XXX,%r19,%r1 */
667#define LDW_R1_DP 0x483b0000 /* ldw RR'XXX(%sr0,%r1),%dp */
edd21aca 668
18338fce
JDA
669#define LDO_R1_R22 0x34360000 /* ldo RR'XXX(%r1),%r22 */
670#define LDW_R22_R21 0x0ec01095 /* ldw 0(%r22),%r21 */
671#define LDW_R22_R19 0x0ec81093 /* ldw 4(%r22),%r19 */
672
30667bf3
AM
673#define LDSID_R21_R1 0x02a010a1 /* ldsid (%sr0,%r21),%r1 */
674#define MTSP_R1 0x00011820 /* mtsp %r1,%sr0 */
675#define BE_SR0_R21 0xe2a00000 /* be 0(%sr0,%r21) */
676#define STW_RP 0x6bc23fd1 /* stw %rp,-24(%sr0,%sp) */
edd21aca 677
067fa4a6 678#define BL22_RP 0xe800a002 /* b,l,n XXX,%rp */
30667bf3
AM
679#define BL_RP 0xe8400002 /* b,l,n XXX,%rp */
680#define NOP 0x08000240 /* nop */
681#define LDW_RP 0x4bc23fd1 /* ldw -24(%sr0,%sp),%rp */
682#define LDSID_RP_R1 0x004010a1 /* ldsid (%sr0,%rp),%r1 */
683#define BE_SR0_RP 0xe0400002 /* be,n 0(%sr0,%rp) */
edd21aca 684
30667bf3
AM
685#ifndef R19_STUBS
686#define R19_STUBS 1
687#endif
edd21aca 688
30667bf3
AM
689#if R19_STUBS
690#define LDW_R1_DLT LDW_R1_R19
691#else
692#define LDW_R1_DLT LDW_R1_DP
693#endif
edd21aca 694
b34976b6 695static bfd_boolean
875c0872 696hppa_build_one_stub (struct bfd_hash_entry *bh, void *in_arg)
30667bf3 697{
875c0872 698 struct elf32_hppa_stub_hash_entry *hsh;
30667bf3 699 struct bfd_link_info *info;
83c81bfe 700 struct elf32_hppa_link_hash_table *htab;
30667bf3
AM
701 asection *stub_sec;
702 bfd *stub_bfd;
703 bfd_byte *loc;
704 bfd_vma sym_value;
74d1c347 705 bfd_vma insn;
8dea1268 706 bfd_vma off;
74d1c347 707 int val;
30667bf3 708 int size;
edd21aca 709
30667bf3 710 /* Massage our args to the form they really have. */
875c0872
DA
711 hsh = hppa_stub_hash_entry (bh);
712 info = (struct bfd_link_info *)in_arg;
30667bf3 713
83c81bfe 714 htab = hppa_link_hash_table (info);
4dfe6ac6
NC
715 if (htab == NULL)
716 return FALSE;
717
875c0872 718 stub_sec = hsh->stub_sec;
edd21aca 719
30667bf3 720 /* Make a note of the offset within the stubs for this entry. */
875c0872
DA
721 hsh->stub_offset = stub_sec->size;
722 loc = stub_sec->contents + hsh->stub_offset;
252b5132 723
30667bf3
AM
724 stub_bfd = stub_sec->owner;
725
875c0872 726 switch (hsh->stub_type)
30667bf3
AM
727 {
728 case hppa_stub_long_branch:
abf874aa
CL
729 /* Fail if the target section could not be assigned to an output
730 section. The user should fix his linker script. */
731 if (hsh->target_section->output_section == NULL
732 && info->non_contiguous_regions)
53215f21
CL
733 info->callbacks->einfo (_("%F%P: Could not assign '%pA' to an output "
734 "section. Retry without "
735 "--enable-non-contiguous-regions.\n"),
736 hsh->target_section);
abf874aa 737
30667bf3
AM
738 /* Create the long branch. A long branch is formed with "ldil"
739 loading the upper bits of the target address into a register,
740 then branching with "be" which adds in the lower bits.
741 The "be" has its delay slot nullified. */
875c0872
DA
742 sym_value = (hsh->target_value
743 + hsh->target_section->output_offset
744 + hsh->target_section->output_section->vma);
30667bf3 745
c39a58e6 746 val = hppa_field_adjust (sym_value, 0, e_lrsel);
74d1c347 747 insn = hppa_rebuild_insn ((int) LDIL_R1, val, 21);
30667bf3
AM
748 bfd_put_32 (stub_bfd, insn, loc);
749
c39a58e6 750 val = hppa_field_adjust (sym_value, 0, e_rrsel) >> 2;
74d1c347 751 insn = hppa_rebuild_insn ((int) BE_SR4_R1, val, 17);
30667bf3
AM
752 bfd_put_32 (stub_bfd, insn, loc + 4);
753
18338fce 754 size = LONG_BRANCH_STUB_SIZE;
edd21aca
AM
755 break;
756
30667bf3 757 case hppa_stub_long_branch_shared:
abf874aa
CL
758 /* Fail if the target section could not be assigned to an output
759 section. The user should fix his linker script. */
760 if (hsh->target_section->output_section == NULL
761 && info->non_contiguous_regions)
53215f21
CL
762 info->callbacks->einfo (_("%F%P: Could not assign %pA to an output "
763 "section. Retry without "
764 "--enable-non-contiguous-regions.\n"),
765 hsh->target_section);
766
30667bf3 767 /* Branches are relative. This is where we are going to. */
875c0872
DA
768 sym_value = (hsh->target_value
769 + hsh->target_section->output_offset
770 + hsh->target_section->output_section->vma);
30667bf3
AM
771
772 /* And this is where we are coming from, more or less. */
875c0872 773 sym_value -= (hsh->stub_offset
30667bf3
AM
774 + stub_sec->output_offset
775 + stub_sec->output_section->vma);
776
74d1c347 777 bfd_put_32 (stub_bfd, (bfd_vma) BL_R1, loc);
47d89dba 778 val = hppa_field_adjust (sym_value, (bfd_signed_vma) -8, e_lrsel);
74d1c347 779 insn = hppa_rebuild_insn ((int) ADDIL_R1, val, 21);
30667bf3
AM
780 bfd_put_32 (stub_bfd, insn, loc + 4);
781
47d89dba 782 val = hppa_field_adjust (sym_value, (bfd_signed_vma) -8, e_rrsel) >> 2;
74d1c347 783 insn = hppa_rebuild_insn ((int) BE_SR4_R1, val, 17);
30667bf3 784 bfd_put_32 (stub_bfd, insn, loc + 8);
18338fce 785 size = LONG_BRANCH_SHARED_STUB_SIZE;
30667bf3 786 break;
edd21aca 787
30667bf3
AM
788 case hppa_stub_import:
789 case hppa_stub_import_shared:
a63e02c7 790 off = hsh->hh->eh.plt.offset;
8dea1268 791 if (off >= (bfd_vma) -2)
49e9d0d3 792 abort ();
8dea1268
AM
793
794 off &= ~ (bfd_vma) 1;
795 sym_value = (off
ce558b89
AM
796 + htab->etab.splt->output_offset
797 + htab->etab.splt->output_section->vma
798 - elf_gp (htab->etab.splt->output_section->owner));
30667bf3
AM
799
800 insn = ADDIL_DP;
801#if R19_STUBS
875c0872 802 if (hsh->stub_type == hppa_stub_import_shared)
30667bf3
AM
803 insn = ADDIL_R19;
804#endif
18338fce
JDA
805
806 /* Load function descriptor address into register %r22. It is
807 sometimes needed for lazy binding. */
c39a58e6 808 val = hppa_field_adjust (sym_value, 0, e_lrsel),
74d1c347 809 insn = hppa_rebuild_insn ((int) insn, val, 21);
30667bf3 810 bfd_put_32 (stub_bfd, insn, loc);
edd21aca 811
c39a58e6 812 val = hppa_field_adjust (sym_value, 0, e_rrsel);
18338fce 813 insn = hppa_rebuild_insn ((int) LDO_R1_R22, val, 14);
30667bf3 814 bfd_put_32 (stub_bfd, insn, loc + 4);
252b5132 815
18338fce
JDA
816 bfd_put_32 (stub_bfd, (bfd_vma) LDW_R22_R21, loc + 8);
817
83c81bfe 818 if (htab->multi_subspace)
30667bf3 819 {
74d1c347 820 bfd_put_32 (stub_bfd, (bfd_vma) LDSID_R21_R1, loc + 12);
18338fce
JDA
821 bfd_put_32 (stub_bfd, (bfd_vma) LDW_R22_R19, loc + 16);
822 bfd_put_32 (stub_bfd, (bfd_vma) MTSP_R1, loc + 20);
823 bfd_put_32 (stub_bfd, (bfd_vma) BE_SR0_R21, loc + 24);
824 bfd_put_32 (stub_bfd, (bfd_vma) STW_RP, loc + 28);
252b5132 825
18338fce 826 size = IMPORT_SHARED_STUB_SIZE;
30667bf3
AM
827 }
828 else
829 {
18338fce
JDA
830 bfd_put_32 (stub_bfd, (bfd_vma) BV_R0_R21, loc + 12);
831 bfd_put_32 (stub_bfd, (bfd_vma) LDW_R22_R19, loc + 16);
252b5132 832
18338fce 833 size = IMPORT_STUB_SIZE;
30667bf3 834 }
252b5132 835
30667bf3 836 break;
252b5132 837
30667bf3 838 case hppa_stub_export:
abf874aa
CL
839 /* Fail if the target section could not be assigned to an output
840 section. The user should fix his linker script. */
841 if (hsh->target_section->output_section == NULL
842 && info->non_contiguous_regions)
53215f21
CL
843 info->callbacks->einfo (_("%F%P: Could not assign %pA to an output "
844 "section. Retry without "
845 "--enable-non-contiguous-regions.\n"),
846 hsh->target_section);
847
30667bf3 848 /* Branches are relative. This is where we are going to. */
875c0872
DA
849 sym_value = (hsh->target_value
850 + hsh->target_section->output_offset
851 + hsh->target_section->output_section->vma);
252b5132 852
30667bf3 853 /* And this is where we are coming from. */
875c0872 854 sym_value -= (hsh->stub_offset
30667bf3
AM
855 + stub_sec->output_offset
856 + stub_sec->output_section->vma);
edd21aca 857
067fa4a6
AM
858 if (sym_value - 8 + (1 << (17 + 1)) >= (1 << (17 + 2))
859 && (!htab->has_22bit_branch
860 || sym_value - 8 + (1 << (22 + 1)) >= (1 << (22 + 2))))
30667bf3 861 {
4eca0228 862 _bfd_error_handler
695344c0 863 /* xgettext:c-format */
2dcf00ce
AM
864 (_("%pB(%pA+%#" PRIx64 "): "
865 "cannot reach %s, recompile with -ffunction-sections"),
875c0872 866 hsh->target_section->owner,
d003868e 867 stub_sec,
2dcf00ce 868 (uint64_t) hsh->stub_offset,
a63e02c7 869 hsh->bh_root.string);
30667bf3 870 bfd_set_error (bfd_error_bad_value);
b34976b6 871 return FALSE;
252b5132 872 }
30667bf3 873
74d1c347 874 val = hppa_field_adjust (sym_value, (bfd_signed_vma) -8, e_fsel) >> 2;
067fa4a6
AM
875 if (!htab->has_22bit_branch)
876 insn = hppa_rebuild_insn ((int) BL_RP, val, 17);
877 else
878 insn = hppa_rebuild_insn ((int) BL22_RP, val, 22);
30667bf3
AM
879 bfd_put_32 (stub_bfd, insn, loc);
880
07d6d2b8 881 bfd_put_32 (stub_bfd, (bfd_vma) NOP, loc + 4);
74d1c347
AM
882 bfd_put_32 (stub_bfd, (bfd_vma) LDW_RP, loc + 8);
883 bfd_put_32 (stub_bfd, (bfd_vma) LDSID_RP_R1, loc + 12);
884 bfd_put_32 (stub_bfd, (bfd_vma) MTSP_R1, loc + 16);
885 bfd_put_32 (stub_bfd, (bfd_vma) BE_SR0_RP, loc + 20);
30667bf3
AM
886
887 /* Point the function symbol at the stub. */
a63e02c7
DA
888 hsh->hh->eh.root.u.def.section = stub_sec;
889 hsh->hh->eh.root.u.def.value = stub_sec->size;
30667bf3 890
18338fce 891 size = EXPORT_STUB_SIZE;
30667bf3
AM
892 break;
893
894 default:
895 BFD_FAIL ();
b34976b6 896 return FALSE;
252b5132
RH
897 }
898
eea6121a 899 stub_sec->size += size;
b34976b6 900 return TRUE;
252b5132
RH
901}
902
30667bf3
AM
903#undef LDIL_R1
904#undef BE_SR4_R1
905#undef BL_R1
906#undef ADDIL_R1
907#undef DEPI_R1
30667bf3
AM
908#undef LDW_R1_R21
909#undef LDW_R1_DLT
910#undef LDW_R1_R19
911#undef ADDIL_R19
912#undef LDW_R1_DP
913#undef LDSID_R21_R1
914#undef MTSP_R1
915#undef BE_SR0_R21
916#undef STW_RP
917#undef BV_R0_R21
918#undef BL_RP
919#undef NOP
920#undef LDW_RP
921#undef LDSID_RP_R1
922#undef BE_SR0_RP
252b5132 923
30667bf3
AM
924/* As above, but don't actually build the stub. Just bump offset so
925 we know stub section sizes. */
926
b34976b6 927static bfd_boolean
875c0872 928hppa_size_one_stub (struct bfd_hash_entry *bh, void *in_arg)
252b5132 929{
875c0872 930 struct elf32_hppa_stub_hash_entry *hsh;
83c81bfe 931 struct elf32_hppa_link_hash_table *htab;
30667bf3
AM
932 int size;
933
934 /* Massage our args to the form they really have. */
875c0872 935 hsh = hppa_stub_hash_entry (bh);
c39a58e6 936 htab = in_arg;
30667bf3 937
875c0872 938 if (hsh->stub_type == hppa_stub_long_branch)
18338fce 939 size = LONG_BRANCH_STUB_SIZE;
875c0872 940 else if (hsh->stub_type == hppa_stub_long_branch_shared)
18338fce 941 size = LONG_BRANCH_SHARED_STUB_SIZE;
875c0872 942 else if (hsh->stub_type == hppa_stub_export)
18338fce 943 size = EXPORT_STUB_SIZE;
74d1c347 944 else /* hppa_stub_import or hppa_stub_import_shared. */
252b5132 945 {
83c81bfe 946 if (htab->multi_subspace)
18338fce 947 size = IMPORT_SHARED_STUB_SIZE;
30667bf3 948 else
18338fce 949 size = IMPORT_STUB_SIZE;
30667bf3 950 }
252b5132 951
875c0872 952 hsh->stub_sec->size += size;
b34976b6 953 return TRUE;
30667bf3 954}
252b5132 955
30667bf3
AM
956/* Return nonzero if ABFD represents an HPPA ELF32 file.
957 Additionally we set the default architecture and machine. */
958
b34976b6 959static bfd_boolean
c39a58e6 960elf32_hppa_object_p (bfd *abfd)
30667bf3 961{
24a5e751
L
962 Elf_Internal_Ehdr * i_ehdrp;
963 unsigned int flags;
252b5132 964
24a5e751
L
965 i_ehdrp = elf_elfheader (abfd);
966 if (strcmp (bfd_get_target (abfd), "elf32-hppa-linux") == 0)
967 {
9c55345c 968 /* GCC on hppa-linux produces binaries with OSABI=GNU,
6c21aa76 969 but the kernel produces corefiles with OSABI=SysV. */
9c55345c 970 if (i_ehdrp->e_ident[EI_OSABI] != ELFOSABI_GNU &&
6c21aa76 971 i_ehdrp->e_ident[EI_OSABI] != ELFOSABI_NONE) /* aka SYSV */
b34976b6 972 return FALSE;
24a5e751 973 }
225247f0
JT
974 else if (strcmp (bfd_get_target (abfd), "elf32-hppa-netbsd") == 0)
975 {
976 /* GCC on hppa-netbsd produces binaries with OSABI=NetBSD,
977 but the kernel produces corefiles with OSABI=SysV. */
978 if (i_ehdrp->e_ident[EI_OSABI] != ELFOSABI_NETBSD &&
979 i_ehdrp->e_ident[EI_OSABI] != ELFOSABI_NONE) /* aka SYSV */
980 return FALSE;
981 }
24a5e751
L
982 else
983 {
984 if (i_ehdrp->e_ident[EI_OSABI] != ELFOSABI_HPUX)
b34976b6 985 return FALSE;
24a5e751
L
986 }
987
988 flags = i_ehdrp->e_flags;
30667bf3
AM
989 switch (flags & (EF_PARISC_ARCH | EF_PARISC_WIDE))
990 {
991 case EFA_PARISC_1_0:
992 return bfd_default_set_arch_mach (abfd, bfd_arch_hppa, 10);
993 case EFA_PARISC_1_1:
994 return bfd_default_set_arch_mach (abfd, bfd_arch_hppa, 11);
995 case EFA_PARISC_2_0:
996 return bfd_default_set_arch_mach (abfd, bfd_arch_hppa, 20);
997 case EFA_PARISC_2_0 | EF_PARISC_WIDE:
998 return bfd_default_set_arch_mach (abfd, bfd_arch_hppa, 25);
999 }
b34976b6 1000 return TRUE;
252b5132
RH
1001}
1002
30667bf3
AM
1003/* Create the .plt and .got sections, and set up our hash table
1004 short-cuts to various dynamic sections. */
1005
b34976b6 1006static bfd_boolean
c39a58e6 1007elf32_hppa_create_dynamic_sections (bfd *abfd, struct bfd_link_info *info)
252b5132 1008{
83c81bfe 1009 struct elf32_hppa_link_hash_table *htab;
875c0872 1010 struct elf_link_hash_entry *eh;
edd21aca 1011
30667bf3 1012 /* Don't try to create the .plt and .got twice. */
83c81bfe 1013 htab = hppa_link_hash_table (info);
4dfe6ac6
NC
1014 if (htab == NULL)
1015 return FALSE;
ce558b89 1016 if (htab->etab.splt != NULL)
b34976b6 1017 return TRUE;
edd21aca 1018
30667bf3
AM
1019 /* Call the generic code to do most of the work. */
1020 if (! _bfd_elf_create_dynamic_sections (abfd, info))
b34976b6 1021 return FALSE;
252b5132 1022
b18e2ae5
AM
1023 /* hppa-linux needs _GLOBAL_OFFSET_TABLE_ to be visible from the main
1024 application, because __canonicalize_funcptr_for_compare needs it. */
875c0872
DA
1025 eh = elf_hash_table (info)->hgot;
1026 eh->forced_local = 0;
1027 eh->other = STV_DEFAULT;
1028 return bfd_elf_link_record_dynamic_symbol (info, eh);
30667bf3
AM
1029}
1030
ebe50bae
AM
1031/* Copy the extra info we tack onto an elf_link_hash_entry. */
1032
51b64d56 1033static void
fcfa13d2 1034elf32_hppa_copy_indirect_symbol (struct bfd_link_info *info,
875c0872
DA
1035 struct elf_link_hash_entry *eh_dir,
1036 struct elf_link_hash_entry *eh_ind)
ebe50bae 1037{
875c0872 1038 struct elf32_hppa_link_hash_entry *hh_dir, *hh_ind;
ebe50bae 1039
875c0872
DA
1040 hh_dir = hppa_elf_hash_entry (eh_dir);
1041 hh_ind = hppa_elf_hash_entry (eh_ind);
ebe50bae 1042
190eb1dd 1043 if (eh_ind->dyn_relocs != NULL
287c7eaf 1044 && eh_ind->root.type == bfd_link_hash_indirect)
ebe50bae 1045 {
190eb1dd 1046 if (eh_dir->dyn_relocs != NULL)
bbd7ec4a 1047 {
3bf083ed
AM
1048 struct elf_dyn_relocs **hdh_pp;
1049 struct elf_dyn_relocs *hdh_p;
bbd7ec4a 1050
fcfa13d2 1051 /* Add reloc counts against the indirect sym to the direct sym
bbd7ec4a 1052 list. Merge any entries against the same section. */
190eb1dd 1053 for (hdh_pp = &eh_ind->dyn_relocs; (hdh_p = *hdh_pp) != NULL; )
bbd7ec4a 1054 {
3bf083ed 1055 struct elf_dyn_relocs *hdh_q;
bbd7ec4a 1056
190eb1dd 1057 for (hdh_q = eh_dir->dyn_relocs;
fcfa13d2 1058 hdh_q != NULL;
3bf083ed 1059 hdh_q = hdh_q->next)
875c0872 1060 if (hdh_q->sec == hdh_p->sec)
bbd7ec4a
AM
1061 {
1062#if RELATIVE_DYNRELOCS
3bf083ed 1063 hdh_q->pc_count += hdh_p->pc_count;
bbd7ec4a 1064#endif
875c0872 1065 hdh_q->count += hdh_p->count;
3bf083ed 1066 *hdh_pp = hdh_p->next;
bbd7ec4a
AM
1067 break;
1068 }
875c0872 1069 if (hdh_q == NULL)
3bf083ed 1070 hdh_pp = &hdh_p->next;
bbd7ec4a 1071 }
190eb1dd 1072 *hdh_pp = eh_dir->dyn_relocs;
bbd7ec4a
AM
1073 }
1074
190eb1dd
L
1075 eh_dir->dyn_relocs = eh_ind->dyn_relocs;
1076 eh_ind->dyn_relocs = NULL;
ebe50bae 1077 }
ebe50bae 1078
4a7e5234 1079 if (eh_ind->root.type == bfd_link_hash_indirect)
9b52905e 1080 {
4a7e5234
AM
1081 hh_dir->plabel |= hh_ind->plabel;
1082 hh_dir->tls_type |= hh_ind->tls_type;
1083 hh_ind->tls_type = GOT_UNKNOWN;
9b52905e 1084 }
4a7e5234
AM
1085
1086 _bfd_elf_link_hash_copy_indirect (info, eh_dir, eh_ind);
9b52905e
NC
1087}
1088
1089static int
1090elf32_hppa_optimized_tls_reloc (struct bfd_link_info *info ATTRIBUTE_UNUSED,
1091 int r_type, int is_local ATTRIBUTE_UNUSED)
1092{
1093 /* For now we don't support linker optimizations. */
1094 return r_type;
ebe50bae
AM
1095}
1096
d45b7d74
DA
1097/* Return a pointer to the local GOT, PLT and TLS reference counts
1098 for ABFD. Returns NULL if the storage allocation fails. */
1099
1100static bfd_signed_vma *
1101hppa32_elf_local_refcounts (bfd *abfd)
1102{
1103 Elf_Internal_Shdr *symtab_hdr = &elf_tdata (abfd)->symtab_hdr;
1104 bfd_signed_vma *local_refcounts;
68ffbac6 1105
d45b7d74
DA
1106 local_refcounts = elf_local_got_refcounts (abfd);
1107 if (local_refcounts == NULL)
1108 {
1109 bfd_size_type size;
1110
1111 /* Allocate space for local GOT and PLT reference
1112 counts. Done this way to save polluting elf_obj_tdata
1113 with another target specific pointer. */
1114 size = symtab_hdr->sh_info;
1115 size *= 2 * sizeof (bfd_signed_vma);
1116 /* Add in space to store the local GOT TLS types. */
1117 size += symtab_hdr->sh_info;
1118 local_refcounts = bfd_zalloc (abfd, size);
1119 if (local_refcounts == NULL)
1120 return NULL;
1121 elf_local_got_refcounts (abfd) = local_refcounts;
1122 memset (hppa_elf_local_got_tls_type (abfd), GOT_UNKNOWN,
1123 symtab_hdr->sh_info);
1124 }
1125 return local_refcounts;
1126}
1127
1128
30667bf3 1129/* Look through the relocs for a section during the first phase, and
3ac8354b
AM
1130 calculate needed space in the global offset table, procedure linkage
1131 table, and dynamic reloc sections. At this point we haven't
1132 necessarily read all the input files. */
252b5132 1133
b34976b6 1134static bfd_boolean
c39a58e6
AM
1135elf32_hppa_check_relocs (bfd *abfd,
1136 struct bfd_link_info *info,
1137 asection *sec,
1138 const Elf_Internal_Rela *relocs)
252b5132 1139{
30667bf3 1140 Elf_Internal_Shdr *symtab_hdr;
875c0872
DA
1141 struct elf_link_hash_entry **eh_syms;
1142 const Elf_Internal_Rela *rela;
1143 const Elf_Internal_Rela *rela_end;
83c81bfe 1144 struct elf32_hppa_link_hash_table *htab;
30667bf3 1145 asection *sreloc;
30667bf3 1146
0e1862bb 1147 if (bfd_link_relocatable (info))
b34976b6 1148 return TRUE;
30667bf3 1149
83c81bfe 1150 htab = hppa_link_hash_table (info);
4dfe6ac6
NC
1151 if (htab == NULL)
1152 return FALSE;
30667bf3 1153 symtab_hdr = &elf_tdata (abfd)->symtab_hdr;
875c0872 1154 eh_syms = elf_sym_hashes (abfd);
30667bf3 1155 sreloc = NULL;
30667bf3 1156
875c0872
DA
1157 rela_end = relocs + sec->reloc_count;
1158 for (rela = relocs; rela < rela_end; rela++)
30667bf3
AM
1159 {
1160 enum {
1161 NEED_GOT = 1,
1162 NEED_PLT = 2,
1163 NEED_DYNREL = 4,
98ceb8ce 1164 PLT_PLABEL = 8
30667bf3 1165 };
edd21aca 1166
30667bf3 1167 unsigned int r_symndx, r_type;
875c0872
DA
1168 struct elf32_hppa_link_hash_entry *hh;
1169 int need_entry = 0;
252b5132 1170
875c0872 1171 r_symndx = ELF32_R_SYM (rela->r_info);
252b5132 1172
30667bf3 1173 if (r_symndx < symtab_hdr->sh_info)
875c0872 1174 hh = NULL;
30667bf3 1175 else
f7c5057a 1176 {
875c0872 1177 hh = hppa_elf_hash_entry (eh_syms[r_symndx - symtab_hdr->sh_info]);
a63e02c7
DA
1178 while (hh->eh.root.type == bfd_link_hash_indirect
1179 || hh->eh.root.type == bfd_link_hash_warning)
1180 hh = hppa_elf_hash_entry (hh->eh.root.u.i.link);
f7c5057a 1181 }
252b5132 1182
875c0872 1183 r_type = ELF32_R_TYPE (rela->r_info);
9b52905e 1184 r_type = elf32_hppa_optimized_tls_reloc (info, r_type, hh == NULL);
252b5132 1185
30667bf3
AM
1186 switch (r_type)
1187 {
1188 case R_PARISC_DLTIND14F:
1189 case R_PARISC_DLTIND14R:
1190 case R_PARISC_DLTIND21L:
1191 /* This symbol requires a global offset table entry. */
1192 need_entry = NEED_GOT;
30667bf3
AM
1193 break;
1194
1195 case R_PARISC_PLABEL14R: /* "Official" procedure labels. */
1196 case R_PARISC_PLABEL21L:
1197 case R_PARISC_PLABEL32:
74d1c347 1198 /* If the addend is non-zero, we break badly. */
875c0872 1199 if (rela->r_addend != 0)
49e9d0d3 1200 abort ();
74d1c347
AM
1201
1202 /* If we are creating a shared library, then we need to
1203 create a PLT entry for all PLABELs, because PLABELs with
1204 local symbols may be passed via a pointer to another
1205 object. Additionally, output a dynamic relocation
4dc86686 1206 pointing to the PLT entry.
875c0872 1207
4dc86686
AM
1208 For executables, the original 32-bit ABI allowed two
1209 different styles of PLABELs (function pointers): For
1210 global functions, the PLABEL word points into the .plt
1211 two bytes past a (function address, gp) pair, and for
1212 local functions the PLABEL points directly at the
1213 function. The magic +2 for the first type allows us to
1214 differentiate between the two. As you can imagine, this
1215 is a real pain when it comes to generating code to call
1216 functions indirectly or to compare function pointers.
1217 We avoid the mess by always pointing a PLABEL into the
1218 .plt, even for local functions. */
127e8e9f
AM
1219 need_entry = PLT_PLABEL | NEED_PLT;
1220 if (bfd_link_pic (info))
1221 need_entry |= NEED_DYNREL;
30667bf3
AM
1222 break;
1223
1224 case R_PARISC_PCREL12F:
83c81bfe 1225 htab->has_12bit_branch = 1;
067fa4a6
AM
1226 goto branch_common;
1227
30667bf3
AM
1228 case R_PARISC_PCREL17C:
1229 case R_PARISC_PCREL17F:
83c81bfe 1230 htab->has_17bit_branch = 1;
067fa4a6
AM
1231 goto branch_common;
1232
30667bf3 1233 case R_PARISC_PCREL22F:
067fa4a6
AM
1234 htab->has_22bit_branch = 1;
1235 branch_common:
47d89dba
AM
1236 /* Function calls might need to go through the .plt, and
1237 might require long branch stubs. */
875c0872 1238 if (hh == NULL)
30667bf3
AM
1239 {
1240 /* We know local syms won't need a .plt entry, and if
1241 they need a long branch stub we can't guarantee that
1242 we can reach the stub. So just flag an error later
1243 if we're doing a shared link and find we need a long
1244 branch stub. */
1245 continue;
1246 }
1247 else
1248 {
1249 /* Global symbols will need a .plt entry if they remain
1250 global, and in most cases won't need a long branch
1251 stub. Unfortunately, we have to cater for the case
1252 where a symbol is forced local by versioning, or due
1253 to symbolic linking, and we lose the .plt entry. */
98ceb8ce 1254 need_entry = NEED_PLT;
a63e02c7 1255 if (hh->eh.type == STT_PARISC_MILLI)
98ceb8ce 1256 need_entry = 0;
30667bf3
AM
1257 }
1258 break;
1259
36751eee 1260 case R_PARISC_SEGBASE: /* Used to set segment base. */
c46b7515 1261 case R_PARISC_SEGREL32: /* Relative reloc, used for unwind. */
30667bf3
AM
1262 case R_PARISC_PCREL14F: /* PC relative load/store. */
1263 case R_PARISC_PCREL14R:
1264 case R_PARISC_PCREL17R: /* External branches. */
1265 case R_PARISC_PCREL21L: /* As above, and for load/store too. */
36751eee 1266 case R_PARISC_PCREL32:
30667bf3
AM
1267 /* We don't need to propagate the relocation if linking a
1268 shared object since these are section relative. */
1269 continue;
1270
1271 case R_PARISC_DPREL14F: /* Used for gp rel data load/store. */
1272 case R_PARISC_DPREL14R:
1273 case R_PARISC_DPREL21L:
0e1862bb 1274 if (bfd_link_pic (info))
30667bf3 1275 {
4eca0228 1276 _bfd_error_handler
695344c0 1277 /* xgettext:c-format */
871b3ab2 1278 (_("%pB: relocation %s can not be used when making a shared object; recompile with -fPIC"),
d003868e 1279 abfd,
30667bf3
AM
1280 elf_hppa_howto_table[r_type].name);
1281 bfd_set_error (bfd_error_bad_value);
b34976b6 1282 return FALSE;
30667bf3
AM
1283 }
1284 /* Fall through. */
1285
1286 case R_PARISC_DIR17F: /* Used for external branches. */
1287 case R_PARISC_DIR17R:
47d89dba
AM
1288 case R_PARISC_DIR14F: /* Used for load/store from absolute locn. */
1289 case R_PARISC_DIR14R:
30667bf3 1290 case R_PARISC_DIR21L: /* As above, and for ext branches too. */
c46b7515 1291 case R_PARISC_DIR32: /* .word relocs. */
30667bf3
AM
1292 /* We may want to output a dynamic relocation later. */
1293 need_entry = NEED_DYNREL;
1294 break;
1295
1296 /* This relocation describes the C++ object vtable hierarchy.
1297 Reconstruct it for later use during GC. */
1298 case R_PARISC_GNU_VTINHERIT:
a63e02c7 1299 if (!bfd_elf_gc_record_vtinherit (abfd, sec, &hh->eh, rela->r_offset))
b34976b6 1300 return FALSE;
30667bf3
AM
1301 continue;
1302
1303 /* This relocation describes which C++ vtable entries are actually
1304 used. Record for later use during GC. */
1305 case R_PARISC_GNU_VTENTRY:
a0ea3a14 1306 if (!bfd_elf_gc_record_vtentry (abfd, sec, &hh->eh, rela->r_addend))
b34976b6 1307 return FALSE;
30667bf3
AM
1308 continue;
1309
9b52905e
NC
1310 case R_PARISC_TLS_GD21L:
1311 case R_PARISC_TLS_GD14R:
1312 case R_PARISC_TLS_LDM21L:
1313 case R_PARISC_TLS_LDM14R:
1314 need_entry = NEED_GOT;
1315 break;
1316
1317 case R_PARISC_TLS_IE21L:
1318 case R_PARISC_TLS_IE14R:
2e684e75 1319 if (bfd_link_dll (info))
07d6d2b8 1320 info->flags |= DF_STATIC_TLS;
9b52905e
NC
1321 need_entry = NEED_GOT;
1322 break;
1323
30667bf3
AM
1324 default:
1325 continue;
1326 }
1327
1328 /* Now carry out our orders. */
1329 if (need_entry & NEED_GOT)
1330 {
2e684e75
AM
1331 int tls_type = GOT_NORMAL;
1332
9b52905e
NC
1333 switch (r_type)
1334 {
1335 default:
9b52905e
NC
1336 break;
1337 case R_PARISC_TLS_GD21L:
1338 case R_PARISC_TLS_GD14R:
2e684e75 1339 tls_type = GOT_TLS_GD;
9b52905e
NC
1340 break;
1341 case R_PARISC_TLS_LDM21L:
1342 case R_PARISC_TLS_LDM14R:
2e684e75 1343 tls_type = GOT_TLS_LDM;
9b52905e
NC
1344 break;
1345 case R_PARISC_TLS_IE21L:
1346 case R_PARISC_TLS_IE14R:
2e684e75 1347 tls_type = GOT_TLS_IE;
9b52905e
NC
1348 break;
1349 }
1350
30667bf3 1351 /* Allocate space for a GOT entry, as well as a dynamic
25f72752 1352 relocation for this entry. */
ce558b89 1353 if (htab->etab.sgot == NULL)
30667bf3 1354 {
a63e02c7 1355 if (!elf32_hppa_create_dynamic_sections (htab->etab.dynobj, info))
b34976b6 1356 return FALSE;
30667bf3
AM
1357 }
1358
2e684e75 1359 if (hh != NULL)
30667bf3 1360 {
2e684e75
AM
1361 if (tls_type == GOT_TLS_LDM)
1362 htab->tls_ldm_got.refcount += 1;
9b52905e 1363 else
2e684e75
AM
1364 hh->eh.got.refcount += 1;
1365 hh->tls_type |= tls_type;
1366 }
1367 else
1368 {
1369 bfd_signed_vma *local_got_refcounts;
9b52905e 1370
2e684e75
AM
1371 /* This is a global offset table entry for a local symbol. */
1372 local_got_refcounts = hppa32_elf_local_refcounts (abfd);
1373 if (local_got_refcounts == NULL)
1374 return FALSE;
1375 if (tls_type == GOT_TLS_LDM)
1376 htab->tls_ldm_got.refcount += 1;
1377 else
1378 local_got_refcounts[r_symndx] += 1;
9b52905e 1379
2e684e75 1380 hppa_elf_local_got_tls_type (abfd) [r_symndx] |= tls_type;
30667bf3
AM
1381 }
1382 }
1383
1384 if (need_entry & NEED_PLT)
1385 {
1386 /* If we are creating a shared library, and this is a reloc
1387 against a weak symbol or a global symbol in a dynamic
1388 object, then we will be creating an import stub and a
1389 .plt entry for the symbol. Similarly, on a normal link
1390 to symbols defined in a dynamic object we'll need the
1391 import stub and a .plt entry. We don't know yet whether
1392 the symbol is defined or not, so make an entry anyway and
1393 clean up later in adjust_dynamic_symbol. */
1394 if ((sec->flags & SEC_ALLOC) != 0)
1395 {
875c0872 1396 if (hh != NULL)
30667bf3 1397 {
a63e02c7
DA
1398 hh->eh.needs_plt = 1;
1399 hh->eh.plt.refcount += 1;
74d1c347 1400
36605136
AM
1401 /* If this .plt entry is for a plabel, mark it so
1402 that adjust_dynamic_symbol will keep the entry
1403 even if it appears to be local. */
74d1c347 1404 if (need_entry & PLT_PLABEL)
875c0872 1405 hh->plabel = 1;
74d1c347
AM
1406 }
1407 else if (need_entry & PLT_PLABEL)
1408 {
3ac8354b 1409 bfd_signed_vma *local_got_refcounts;
68fb2e56 1410 bfd_signed_vma *local_plt_refcounts;
74d1c347 1411
d45b7d74 1412 local_got_refcounts = hppa32_elf_local_refcounts (abfd);
74d1c347 1413 if (local_got_refcounts == NULL)
d45b7d74 1414 return FALSE;
68fb2e56
AM
1415 local_plt_refcounts = (local_got_refcounts
1416 + symtab_hdr->sh_info);
ebe50bae 1417 local_plt_refcounts[r_symndx] += 1;
30667bf3 1418 }
30667bf3
AM
1419 }
1420 }
1421
d336fa6d
AM
1422 if ((need_entry & NEED_DYNREL) != 0
1423 && (sec->flags & SEC_ALLOC) != 0)
30667bf3
AM
1424 {
1425 /* Flag this symbol as having a non-got, non-plt reference
1426 so that we generate copy relocs if it turns out to be
1427 dynamic. */
4a7e5234 1428 if (hh != NULL)
a63e02c7 1429 hh->eh.non_got_ref = 1;
30667bf3
AM
1430
1431 /* If we are creating a shared library then we need to copy
1432 the reloc into the shared library. However, if we are
1433 linking with -Bsymbolic, we need only copy absolute
1434 relocs or relocs against symbols that are not defined in
1435 an object we are including in the link. PC- or DP- or
1436 DLT-relative relocs against any local sym or global sym
1437 with DEF_REGULAR set, can be discarded. At this point we
1438 have not seen all the input files, so it is possible that
1439 DEF_REGULAR is not set now but will be set later (it is
1440 never cleared). We account for that possibility below by
98ceb8ce 1441 storing information in the dyn_relocs field of the
30667bf3
AM
1442 hash table entry.
1443
1444 A similar situation to the -Bsymbolic case occurs when
1445 creating shared libraries and symbol visibility changes
1446 render the symbol local.
1447
1448 As it turns out, all the relocs we will be creating here
1449 are absolute, so we cannot remove them on -Bsymbolic
1450 links or visibility changes anyway. A STUB_REL reloc
1451 is absolute too, as in that case it is the reloc in the
1452 stub we will be creating, rather than copying the PCREL
56882138
AM
1453 reloc in the branch.
1454
1455 If on the other hand, we are creating an executable, we
1456 may need to keep relocations for symbols satisfied by a
1457 dynamic library if we manage to avoid copy relocs for the
1458 symbol. */
0e1862bb 1459 if ((bfd_link_pic (info)
446f2863 1460 && (IS_ABSOLUTE_RELOC (r_type)
875c0872 1461 || (hh != NULL
a496fbc8 1462 && (!SYMBOLIC_BIND (info, &hh->eh)
a63e02c7
DA
1463 || hh->eh.root.type == bfd_link_hash_defweak
1464 || !hh->eh.def_regular))))
4fc8051d 1465 || (ELIMINATE_COPY_RELOCS
0e1862bb 1466 && !bfd_link_pic (info)
875c0872 1467 && hh != NULL
a63e02c7
DA
1468 && (hh->eh.root.type == bfd_link_hash_defweak
1469 || !hh->eh.def_regular)))
30667bf3 1470 {
3bf083ed
AM
1471 struct elf_dyn_relocs *hdh_p;
1472 struct elf_dyn_relocs **hdh_head;
ec338859 1473
30667bf3
AM
1474 /* Create a reloc section in dynobj and make room for
1475 this reloc. */
98ceb8ce 1476 if (sreloc == NULL)
30667bf3 1477 {
83bac4b0
NC
1478 sreloc = _bfd_elf_make_dynamic_reloc_section
1479 (sec, htab->etab.dynobj, 2, abfd, /*rela?*/ TRUE);
1480
98ceb8ce 1481 if (sreloc == NULL)
30667bf3 1482 {
83bac4b0
NC
1483 bfd_set_error (bfd_error_bad_value);
1484 return FALSE;
30667bf3 1485 }
30667bf3
AM
1486 }
1487
98ceb8ce
AM
1488 /* If this is a global symbol, we count the number of
1489 relocations we need for this symbol. */
875c0872 1490 if (hh != NULL)
30667bf3 1491 {
190eb1dd 1492 hdh_head = &hh->eh.dyn_relocs;
ec338859
AM
1493 }
1494 else
1495 {
1496 /* Track dynamic relocs needed for local syms too.
1497 We really need local syms available to do this
1498 easily. Oh well. */
875c0872 1499 asection *sr;
6edfbbad 1500 void *vpp;
87d72d41 1501 Elf_Internal_Sym *isym;
6edfbbad 1502
87d72d41
AM
1503 isym = bfd_sym_from_r_symndx (&htab->sym_cache,
1504 abfd, r_symndx);
1505 if (isym == NULL)
b34976b6 1506 return FALSE;
30667bf3 1507
87d72d41
AM
1508 sr = bfd_section_from_elf_index (abfd, isym->st_shndx);
1509 if (sr == NULL)
1510 sr = sec;
1511
6edfbbad 1512 vpp = &elf_section_data (sr)->local_dynrel;
3bf083ed 1513 hdh_head = (struct elf_dyn_relocs **) vpp;
ec338859
AM
1514 }
1515
875c0872
DA
1516 hdh_p = *hdh_head;
1517 if (hdh_p == NULL || hdh_p->sec != sec)
ec338859 1518 {
a63e02c7 1519 hdh_p = bfd_alloc (htab->etab.dynobj, sizeof *hdh_p);
875c0872 1520 if (hdh_p == NULL)
b34976b6 1521 return FALSE;
3bf083ed 1522 hdh_p->next = *hdh_head;
875c0872
DA
1523 *hdh_head = hdh_p;
1524 hdh_p->sec = sec;
1525 hdh_p->count = 0;
98ceb8ce 1526#if RELATIVE_DYNRELOCS
3bf083ed 1527 hdh_p->pc_count = 0;
98ceb8ce 1528#endif
ec338859 1529 }
98ceb8ce 1530
875c0872 1531 hdh_p->count += 1;
98ceb8ce 1532#if RELATIVE_DYNRELOCS
ec338859 1533 if (!IS_ABSOLUTE_RELOC (rtype))
3bf083ed 1534 hdh_p->pc_count += 1;
98ceb8ce 1535#endif
30667bf3
AM
1536 }
1537 }
1538 }
edd21aca 1539
b34976b6 1540 return TRUE;
edd21aca
AM
1541}
1542
30667bf3
AM
1543/* Return the section that should be marked against garbage collection
1544 for a given relocation. */
1545
1546static asection *
c39a58e6 1547elf32_hppa_gc_mark_hook (asection *sec,
07adf181 1548 struct bfd_link_info *info,
875c0872
DA
1549 Elf_Internal_Rela *rela,
1550 struct elf_link_hash_entry *hh,
c39a58e6 1551 Elf_Internal_Sym *sym)
30667bf3 1552{
875c0872 1553 if (hh != NULL)
07adf181
AM
1554 switch ((unsigned int) ELF32_R_TYPE (rela->r_info))
1555 {
1556 case R_PARISC_GNU_VTINHERIT:
1557 case R_PARISC_GNU_VTENTRY:
1558 return NULL;
1559 }
30667bf3 1560
07adf181 1561 return _bfd_elf_gc_mark_hook (sec, info, rela, hh, sym);
30667bf3
AM
1562}
1563
edfc032f
AM
1564/* Support for core dump NOTE sections. */
1565
1566static bfd_boolean
1567elf32_hppa_grok_prstatus (bfd *abfd, Elf_Internal_Note *note)
1568{
1569 int offset;
1570 size_t size;
1571
1572 switch (note->descsz)
1573 {
1574 default:
1575 return FALSE;
1576
1577 case 396: /* Linux/hppa */
1578 /* pr_cursig */
228e534f 1579 elf_tdata (abfd)->core->signal = bfd_get_16 (abfd, note->descdata + 12);
edfc032f
AM
1580
1581 /* pr_pid */
228e534f 1582 elf_tdata (abfd)->core->lwpid = bfd_get_32 (abfd, note->descdata + 24);
edfc032f
AM
1583
1584 /* pr_reg */
1585 offset = 72;
1586 size = 320;
1587
1588 break;
1589 }
1590
1591 /* Make a ".reg/999" section. */
1592 return _bfd_elfcore_make_pseudosection (abfd, ".reg",
1593 size, note->descpos + offset);
1594}
1595
1596static bfd_boolean
1597elf32_hppa_grok_psinfo (bfd *abfd, Elf_Internal_Note *note)
1598{
1599 switch (note->descsz)
1600 {
1601 default:
1602 return FALSE;
1603
1604 case 124: /* Linux/hppa elf_prpsinfo. */
228e534f 1605 elf_tdata (abfd)->core->program
edfc032f 1606 = _bfd_elfcore_strndup (abfd, note->descdata + 28, 16);
228e534f 1607 elf_tdata (abfd)->core->command
edfc032f
AM
1608 = _bfd_elfcore_strndup (abfd, note->descdata + 44, 80);
1609 }
1610
1611 /* Note that for some reason, a spurious space is tacked
1612 onto the end of the args in some (at least one anyway)
1613 implementations, so strip it off if it exists. */
1614 {
228e534f 1615 char *command = elf_tdata (abfd)->core->command;
edfc032f
AM
1616 int n = strlen (command);
1617
1618 if (0 < n && command[n - 1] == ' ')
1619 command[n - 1] = '\0';
1620 }
1621
1622 return TRUE;
1623}
1624
74d1c347
AM
1625/* Our own version of hide_symbol, so that we can keep plt entries for
1626 plabels. */
1627
1628static void
c39a58e6 1629elf32_hppa_hide_symbol (struct bfd_link_info *info,
875c0872 1630 struct elf_link_hash_entry *eh,
c39a58e6 1631 bfd_boolean force_local)
74d1c347 1632{
e5094212
AM
1633 if (force_local)
1634 {
875c0872
DA
1635 eh->forced_local = 1;
1636 if (eh->dynindx != -1)
e5094212 1637 {
875c0872 1638 eh->dynindx = -1;
e5094212 1639 _bfd_elf_strtab_delref (elf_hash_table (info)->dynstr,
875c0872 1640 eh->dynstr_index);
e5094212 1641 }
31fc8a0b
NC
1642
1643 /* PR 16082: Remove version information from hidden symbol. */
1644 eh->verinfo.verdef = NULL;
1645 eh->verinfo.vertree = NULL;
e5094212
AM
1646 }
1647
4340287b
DA
1648 /* STT_GNU_IFUNC symbol must go through PLT. */
1649 if (! hppa_elf_hash_entry (eh)->plabel
1650 && eh->type != STT_GNU_IFUNC)
74d1c347 1651 {
875c0872 1652 eh->needs_plt = 0;
4340287b 1653 eh->plt = elf_hash_table (info)->init_plt_offset;
74d1c347
AM
1654 }
1655}
1656
127e8e9f
AM
1657/* Find any dynamic relocs that apply to read-only sections. */
1658
1659static asection *
1660readonly_dynrelocs (struct elf_link_hash_entry *eh)
1661{
3bf083ed 1662 struct elf_dyn_relocs *hdh_p;
127e8e9f 1663
190eb1dd 1664 for (hdh_p = eh->dyn_relocs; hdh_p != NULL; hdh_p = hdh_p->next)
127e8e9f
AM
1665 {
1666 asection *sec = hdh_p->sec->output_section;
1667
1668 if (sec != NULL && (sec->flags & SEC_READONLY) != 0)
1669 return hdh_p->sec;
1670 }
1671 return NULL;
1672}
1673
287c7eaf
AM
1674/* Return true if we have dynamic relocs against H or any of its weak
1675 aliases, that apply to read-only sections. Cannot be used after
1676 size_dynamic_sections. */
1677
1678static bfd_boolean
1679alias_readonly_dynrelocs (struct elf_link_hash_entry *eh)
1680{
1681 struct elf32_hppa_link_hash_entry *hh = hppa_elf_hash_entry (eh);
1682 do
1683 {
1684 if (readonly_dynrelocs (&hh->eh))
1685 return TRUE;
1686 hh = hppa_elf_hash_entry (hh->eh.u.alias);
1687 } while (hh != NULL && &hh->eh != eh);
1688
1689 return FALSE;
1690}
1691
30667bf3
AM
1692/* Adjust a symbol defined by a dynamic object and referenced by a
1693 regular object. The current definition is in some section of the
1694 dynamic object, but we're not including those sections. We have to
1695 change the definition to something the rest of the link can
1696 understand. */
252b5132 1697
b34976b6 1698static bfd_boolean
c39a58e6 1699elf32_hppa_adjust_dynamic_symbol (struct bfd_link_info *info,
875c0872 1700 struct elf_link_hash_entry *eh)
252b5132 1701{
83c81bfe 1702 struct elf32_hppa_link_hash_table *htab;
5474d94f 1703 asection *sec, *srel;
30667bf3
AM
1704
1705 /* If this is a function, put it in the procedure linkage table. We
067fa4a6 1706 will fill in the contents of the procedure linkage table later. */
875c0872
DA
1707 if (eh->type == STT_FUNC
1708 || eh->needs_plt)
30667bf3 1709 {
127e8e9f
AM
1710 bfd_boolean local = (SYMBOL_CALLS_LOCAL (info, eh)
1711 || UNDEFWEAK_NO_DYNAMIC_RELOC (info, eh));
287c7eaf 1712 /* Discard dyn_relocs when non-pic if we've decided that a
529fe20e 1713 function symbol is local. */
287c7eaf 1714 if (!bfd_link_pic (info) && local)
190eb1dd 1715 eh->dyn_relocs = NULL;
127e8e9f 1716
4340287b
DA
1717 /* If the symbol is used by a plabel, we must allocate a PLT slot.
1718 The refcounts are not reliable when it has been hidden since
1719 hide_symbol can be called before the plabel flag is set. */
d336fa6d 1720 if (hppa_elf_hash_entry (eh)->plabel)
4340287b
DA
1721 eh->plt.refcount = 1;
1722
127e8e9f
AM
1723 /* Note that unlike some other backends, the refcount is not
1724 incremented for a non-call (and non-plabel) function reference. */
d336fa6d 1725 else if (eh->plt.refcount <= 0
127e8e9f 1726 || local)
30667bf3
AM
1727 {
1728 /* The .plt entry is not needed when:
1729 a) Garbage collection has removed all references to the
1730 symbol, or
1731 b) We know for certain the symbol is defined in this
74d1c347
AM
1732 object, and it's not a weak definition, nor is the symbol
1733 used by a plabel relocation. Either this object is the
1734 application or we are doing a shared symbolic link. */
875c0872
DA
1735 eh->plt.offset = (bfd_vma) -1;
1736 eh->needs_plt = 0;
30667bf3 1737 }
4dc86686 1738
287c7eaf
AM
1739 /* Unlike other targets, elf32-hppa.c does not define a function
1740 symbol in a non-pic executable on PLT stub code, so we don't
1741 have a local definition in that case. ie. dyn_relocs can't
1742 be discarded. */
1743
127e8e9f 1744 /* Function symbols can't have copy relocs. */
b34976b6 1745 return TRUE;
30667bf3 1746 }
bbd7ec4a 1747 else
875c0872 1748 eh->plt.offset = (bfd_vma) -1;
edd21aca 1749
4a7e5234
AM
1750 htab = hppa_link_hash_table (info);
1751 if (htab == NULL)
1752 return FALSE;
1753
30667bf3
AM
1754 /* If this is a weak symbol, and there is a real definition, the
1755 processor independent code will have arranged for us to see the
1756 real definition first, and we can just use the same value. */
60d67dc8 1757 if (eh->is_weakalias)
edd21aca 1758 {
60d67dc8
AM
1759 struct elf_link_hash_entry *def = weakdef (eh);
1760 BFD_ASSERT (def->root.type == bfd_link_hash_defined);
1761 eh->root.u.def.section = def->root.u.def.section;
1762 eh->root.u.def.value = def->root.u.def.value;
4a7e5234
AM
1763 if (def->root.u.def.section == htab->etab.sdynbss
1764 || def->root.u.def.section == htab->etab.sdynrelro)
190eb1dd 1765 eh->dyn_relocs = NULL;
b34976b6 1766 return TRUE;
30667bf3 1767 }
edd21aca 1768
30667bf3
AM
1769 /* This is a reference to a symbol defined by a dynamic object which
1770 is not a function. */
1771
1772 /* If we are creating a shared library, we must presume that the
1773 only references to the symbol are via the global offset table.
1774 For such cases we need not do anything here; the relocations will
1775 be handled correctly by relocate_section. */
0e1862bb 1776 if (bfd_link_pic (info))
b34976b6 1777 return TRUE;
30667bf3
AM
1778
1779 /* If there are no references to this symbol that do not use the
1780 GOT, we don't need to generate a copy reloc. */
875c0872 1781 if (!eh->non_got_ref)
529fe20e 1782 return TRUE;
ebe50bae 1783
127e8e9f
AM
1784 /* If -z nocopyreloc was given, we won't generate them either. */
1785 if (info->nocopyreloc)
529fe20e 1786 return TRUE;
4fc8051d 1787
3bf083ed
AM
1788 /* If we don't find any dynamic relocs in read-only sections, then
1789 we'll be keeping the dynamic relocs and avoiding the copy reloc. */
127e8e9f 1790 if (ELIMINATE_COPY_RELOCS
287c7eaf 1791 && !alias_readonly_dynrelocs (eh))
3bf083ed 1792 return TRUE;
ebe50bae 1793
30667bf3
AM
1794 /* We must allocate the symbol in our .dynbss section, which will
1795 become part of the .bss section of the executable. There will be
1796 an entry for this symbol in the .dynsym section. The dynamic
1797 object will contain position independent code, so all references
1798 from the dynamic object to this symbol will go through the global
1799 offset table. The dynamic linker will use the .dynsym entry to
1800 determine the address it must put in the global offset table, so
1801 both the dynamic object and the regular object will refer to the
1802 same memory location for the variable. */
5474d94f
AM
1803 if ((eh->root.u.def.section->flags & SEC_READONLY) != 0)
1804 {
1805 sec = htab->etab.sdynrelro;
1806 srel = htab->etab.sreldynrelro;
1807 }
1808 else
1809 {
1810 sec = htab->etab.sdynbss;
1811 srel = htab->etab.srelbss;
1812 }
1d7e9d18 1813 if ((eh->root.u.def.section->flags & SEC_ALLOC) != 0 && eh->size != 0)
30667bf3 1814 {
4a7e5234
AM
1815 /* We must generate a COPY reloc to tell the dynamic linker to
1816 copy the initial value out of the dynamic object and into the
1817 runtime process image. */
5474d94f 1818 srel->size += sizeof (Elf32_External_Rela);
875c0872 1819 eh->needs_copy = 1;
edd21aca 1820 }
252b5132 1821
529fe20e 1822 /* We no longer want dyn_relocs. */
190eb1dd 1823 eh->dyn_relocs = NULL;
6cabe1ea 1824 return _bfd_elf_adjust_dynamic_copy (info, eh, sec);
252b5132
RH
1825}
1826
46434633 1827/* If EH is undefined, make it dynamic if that makes sense. */
595e0a47
AM
1828
1829static bfd_boolean
46434633
AM
1830ensure_undef_dynamic (struct bfd_link_info *info,
1831 struct elf_link_hash_entry *eh)
595e0a47 1832{
46434633
AM
1833 struct elf_link_hash_table *htab = elf_hash_table (info);
1834
1835 if (htab->dynamic_sections_created
1836 && (eh->root.type == bfd_link_hash_undefweak
1837 || eh->root.type == bfd_link_hash_undefined)
1838 && eh->dynindx == -1
595e0a47
AM
1839 && !eh->forced_local
1840 && eh->type != STT_PARISC_MILLI
60c1b909 1841 && !UNDEFWEAK_NO_DYNAMIC_RELOC (info, eh)
595e0a47
AM
1842 && ELF_ST_VISIBILITY (eh->other) == STV_DEFAULT)
1843 return bfd_elf_link_record_dynamic_symbol (info, eh);
1844 return TRUE;
1845}
1846
e5ee5df1 1847/* Allocate space in the .plt for entries that won't have relocations.
a252afa4 1848 ie. plabel entries. */
a8d02d66 1849
b34976b6 1850static bfd_boolean
875c0872 1851allocate_plt_static (struct elf_link_hash_entry *eh, void *inf)
a8d02d66
AM
1852{
1853 struct bfd_link_info *info;
1854 struct elf32_hppa_link_hash_table *htab;
875c0872
DA
1855 struct elf32_hppa_link_hash_entry *hh;
1856 asection *sec;
a8d02d66 1857
875c0872 1858 if (eh->root.type == bfd_link_hash_indirect)
b34976b6 1859 return TRUE;
a8d02d66 1860
875c0872 1861 info = (struct bfd_link_info *) inf;
9b52905e 1862 hh = hppa_elf_hash_entry (eh);
a8d02d66 1863 htab = hppa_link_hash_table (info);
4dfe6ac6
NC
1864 if (htab == NULL)
1865 return FALSE;
1866
a63e02c7 1867 if (htab->etab.dynamic_sections_created
875c0872 1868 && eh->plt.refcount > 0)
e5ee5df1 1869 {
46434633 1870 if (!ensure_undef_dynamic (info, eh))
595e0a47 1871 return FALSE;
e5ee5df1 1872
0e1862bb 1873 if (WILL_CALL_FINISH_DYNAMIC_SYMBOL (1, bfd_link_pic (info), eh))
e5ee5df1 1874 {
067fa4a6
AM
1875 /* Allocate these later. From this point on, h->plabel
1876 means that the plt entry is only used by a plabel.
1877 We'll be using a normal plt entry for this symbol, so
1878 clear the plabel indicator. */
68ffbac6 1879
875c0872 1880 hh->plabel = 0;
e5ee5df1 1881 }
875c0872 1882 else if (hh->plabel)
e5ee5df1
AM
1883 {
1884 /* Make an entry in the .plt section for plabel references
1885 that won't have a .plt entry for other reasons. */
ce558b89 1886 sec = htab->etab.splt;
875c0872
DA
1887 eh->plt.offset = sec->size;
1888 sec->size += PLT_ENTRY_SIZE;
247d6c4c
AM
1889 if (bfd_link_pic (info))
1890 htab->etab.srelplt->size += sizeof (Elf32_External_Rela);
a8d02d66
AM
1891 }
1892 else
e5ee5df1
AM
1893 {
1894 /* No .plt entry needed. */
875c0872
DA
1895 eh->plt.offset = (bfd_vma) -1;
1896 eh->needs_plt = 0;
e5ee5df1
AM
1897 }
1898 }
1899 else
1900 {
875c0872
DA
1901 eh->plt.offset = (bfd_vma) -1;
1902 eh->needs_plt = 0;
a8d02d66
AM
1903 }
1904
b34976b6 1905 return TRUE;
a8d02d66
AM
1906}
1907
2e684e75
AM
1908/* Calculate size of GOT entries for symbol given its TLS_TYPE. */
1909
1910static inline unsigned int
1911got_entries_needed (int tls_type)
1912{
1913 unsigned int need = 0;
1914
1915 if ((tls_type & GOT_NORMAL) != 0)
1916 need += GOT_ENTRY_SIZE;
1917 if ((tls_type & GOT_TLS_GD) != 0)
1918 need += GOT_ENTRY_SIZE * 2;
1919 if ((tls_type & GOT_TLS_IE) != 0)
1920 need += GOT_ENTRY_SIZE;
1921 return need;
1922}
1923
1924/* Calculate size of relocs needed for symbol given its TLS_TYPE and
4352556b
AM
1925 NEEDed GOT entries. TPREL_KNOWN says a TPREL offset can be
1926 calculated at link time. DTPREL_KNOWN says the same for a DTPREL
1927 offset. */
2e684e75
AM
1928
1929static inline unsigned int
4352556b
AM
1930got_relocs_needed (int tls_type, unsigned int need,
1931 bfd_boolean dtprel_known, bfd_boolean tprel_known)
2e684e75
AM
1932{
1933 /* All the entries we allocated need relocs.
4352556b
AM
1934 Except for GD and IE with local symbols. */
1935 if ((tls_type & GOT_TLS_GD) != 0 && dtprel_known)
1936 need -= GOT_ENTRY_SIZE;
1937 if ((tls_type & GOT_TLS_IE) != 0 && tprel_known)
2e684e75
AM
1938 need -= GOT_ENTRY_SIZE;
1939 return need * sizeof (Elf32_External_Rela) / GOT_ENTRY_SIZE;
1940}
1941
4dc86686
AM
1942/* Allocate space in .plt, .got and associated reloc sections for
1943 global syms. */
1944
b34976b6 1945static bfd_boolean
875c0872 1946allocate_dynrelocs (struct elf_link_hash_entry *eh, void *inf)
4dc86686
AM
1947{
1948 struct bfd_link_info *info;
83c81bfe 1949 struct elf32_hppa_link_hash_table *htab;
875c0872
DA
1950 asection *sec;
1951 struct elf32_hppa_link_hash_entry *hh;
3bf083ed 1952 struct elf_dyn_relocs *hdh_p;
4dc86686 1953
875c0872 1954 if (eh->root.type == bfd_link_hash_indirect)
b34976b6 1955 return TRUE;
73a74a62 1956
c39a58e6 1957 info = inf;
83c81bfe 1958 htab = hppa_link_hash_table (info);
4dfe6ac6
NC
1959 if (htab == NULL)
1960 return FALSE;
1961
875c0872 1962 hh = hppa_elf_hash_entry (eh);
68ffbac6 1963
a63e02c7 1964 if (htab->etab.dynamic_sections_created
875c0872
DA
1965 && eh->plt.offset != (bfd_vma) -1
1966 && !hh->plabel
1967 && eh->plt.refcount > 0)
4dc86686 1968 {
e5ee5df1 1969 /* Make an entry in the .plt section. */
ce558b89 1970 sec = htab->etab.splt;
875c0872
DA
1971 eh->plt.offset = sec->size;
1972 sec->size += PLT_ENTRY_SIZE;
3ac8354b 1973
e5ee5df1 1974 /* We also need to make an entry in the .rela.plt section. */
ce558b89 1975 htab->etab.srelplt->size += sizeof (Elf32_External_Rela);
e5ee5df1 1976 htab->need_plt_stub = 1;
4dc86686 1977 }
edd21aca 1978
875c0872 1979 if (eh->got.refcount > 0)
4dc86686 1980 {
2e684e75
AM
1981 unsigned int need;
1982
46434633 1983 if (!ensure_undef_dynamic (info, eh))
595e0a47 1984 return FALSE;
446f2863 1985
ce558b89 1986 sec = htab->etab.sgot;
875c0872 1987 eh->got.offset = sec->size;
2e684e75
AM
1988 need = got_entries_needed (hh->tls_type);
1989 sec->size += need;
a63e02c7 1990 if (htab->etab.dynamic_sections_created
4352556b
AM
1991 && (bfd_link_dll (info)
1992 || (bfd_link_pic (info) && (hh->tls_type & GOT_NORMAL) != 0)
875c0872 1993 || (eh->dynindx != -1
d336fa6d
AM
1994 && !SYMBOL_REFERENCES_LOCAL (info, eh)))
1995 && !UNDEFWEAK_NO_DYNAMIC_RELOC (info, eh))
ce757d15 1996 {
4352556b 1997 bfd_boolean local = SYMBOL_REFERENCES_LOCAL (info, eh);
2e684e75 1998 htab->etab.srelgot->size
4352556b
AM
1999 += got_relocs_needed (hh->tls_type, need, local,
2000 local && bfd_link_executable (info));
ce757d15 2001 }
4dc86686
AM
2002 }
2003 else
875c0872 2004 eh->got.offset = (bfd_vma) -1;
30667bf3 2005
d336fa6d
AM
2006 /* If no dynamic sections we can't have dynamic relocs. */
2007 if (!htab->etab.dynamic_sections_created)
190eb1dd 2008 eh->dyn_relocs = NULL;
d336fa6d 2009
529fe20e
AM
2010 /* Discard relocs on undefined syms with non-default visibility. */
2011 else if ((eh->root.type == bfd_link_hash_undefined
2012 && ELF_ST_VISIBILITY (eh->other) != STV_DEFAULT)
2013 || UNDEFWEAK_NO_DYNAMIC_RELOC (info, eh))
190eb1dd 2014 eh->dyn_relocs = NULL;
529fe20e 2015
190eb1dd 2016 if (eh->dyn_relocs == NULL)
287c7eaf 2017 return TRUE;
30667bf3 2018
98ceb8ce
AM
2019 /* If this is a -Bsymbolic shared link, then we need to discard all
2020 space allocated for dynamic pc-relative relocs against symbols
2021 defined in a regular object. For the normal shared case, discard
2022 space for relocs that have become local due to symbol visibility
2023 changes. */
0e1862bb 2024 if (bfd_link_pic (info))
446f2863 2025 {
98ceb8ce 2026#if RELATIVE_DYNRELOCS
529fe20e 2027 if (SYMBOL_CALLS_LOCAL (info, eh))
446f2863 2028 {
3bf083ed 2029 struct elf_dyn_relocs **hdh_pp;
30667bf3 2030
190eb1dd 2031 for (hdh_pp = &eh->dyn_relocs; (hdh_p = *hdh_pp) != NULL; )
98ceb8ce 2032 {
3bf083ed
AM
2033 hdh_p->count -= hdh_p->pc_count;
2034 hdh_p->pc_count = 0;
875c0872 2035 if (hdh_p->count == 0)
3bf083ed 2036 *hdh_pp = hdh_p->next;
98ceb8ce 2037 else
3bf083ed 2038 hdh_pp = &hdh_p->next;
98ceb8ce
AM
2039 }
2040 }
2041#endif
4fc8051d 2042
190eb1dd 2043 if (eh->dyn_relocs != NULL)
22d606e9 2044 {
46434633 2045 if (!ensure_undef_dynamic (info, eh))
595e0a47 2046 return FALSE;
22d606e9 2047 }
446f2863 2048 }
d336fa6d 2049 else if (ELIMINATE_COPY_RELOCS)
30667bf3 2050 {
98ceb8ce
AM
2051 /* For the non-shared case, discard space for relocs against
2052 symbols which turn out to need copy relocs or are not
2053 dynamic. */
68ffbac6 2054
529fe20e 2055 if (eh->dynamic_adjusted
529fe20e
AM
2056 && !eh->def_regular
2057 && !ELF_COMMON_DEF_P (eh))
98ceb8ce 2058 {
46434633 2059 if (!ensure_undef_dynamic (info, eh))
595e0a47 2060 return FALSE;
98ceb8ce 2061
46434633 2062 if (eh->dynindx == -1)
190eb1dd 2063 eh->dyn_relocs = NULL;
98ceb8ce 2064 }
46434633 2065 else
190eb1dd 2066 eh->dyn_relocs = NULL;
30667bf3 2067 }
30667bf3 2068
98ceb8ce 2069 /* Finally, allocate space. */
190eb1dd 2070 for (hdh_p = eh->dyn_relocs; hdh_p != NULL; hdh_p = hdh_p->next)
30667bf3 2071 {
875c0872
DA
2072 asection *sreloc = elf_section_data (hdh_p->sec)->sreloc;
2073 sreloc->size += hdh_p->count * sizeof (Elf32_External_Rela);
30667bf3 2074 }
30667bf3 2075
b34976b6 2076 return TRUE;
30667bf3 2077}
30667bf3 2078
d5c73c2f
AM
2079/* This function is called via elf_link_hash_traverse to force
2080 millicode symbols local so they do not end up as globals in the
2081 dynamic symbol table. We ought to be able to do this in
2082 adjust_dynamic_symbol, but our adjust_dynamic_symbol is not called
2083 for all dynamic symbols. Arguably, this is a bug in
2084 elf_adjust_dynamic_symbol. */
2085
b34976b6 2086static bfd_boolean
875c0872 2087clobber_millicode_symbols (struct elf_link_hash_entry *eh,
c39a58e6 2088 struct bfd_link_info *info)
d5c73c2f 2089{
875c0872
DA
2090 if (eh->type == STT_PARISC_MILLI
2091 && !eh->forced_local)
e0522e89 2092 {
875c0872 2093 elf32_hppa_hide_symbol (info, eh, TRUE);
e0522e89 2094 }
b34976b6 2095 return TRUE;
d5c73c2f
AM
2096}
2097
127e8e9f
AM
2098/* Set DF_TEXTREL if we find any dynamic relocs that apply to
2099 read-only sections. */
98ceb8ce 2100
b34976b6 2101static bfd_boolean
127e8e9f 2102maybe_set_textrel (struct elf_link_hash_entry *eh, void *inf)
98ceb8ce 2103{
127e8e9f 2104 asection *sec;
98ceb8ce 2105
127e8e9f
AM
2106 if (eh->root.type == bfd_link_hash_indirect)
2107 return TRUE;
98ceb8ce 2108
127e8e9f
AM
2109 sec = readonly_dynrelocs (eh);
2110 if (sec != NULL)
2111 {
2112 struct bfd_link_info *info = (struct bfd_link_info *) inf;
98ceb8ce 2113
127e8e9f
AM
2114 info->flags |= DF_TEXTREL;
2115 info->callbacks->minfo
c1c8c1ef 2116 (_("%pB: dynamic relocation against `%pT' in read-only section `%pA'\n"),
63c1f59d 2117 sec->owner, eh->root.root.string, sec);
98ceb8ce 2118
127e8e9f
AM
2119 /* Not an error, just cut short the traversal. */
2120 return FALSE;
98ceb8ce 2121 }
b34976b6 2122 return TRUE;
98ceb8ce
AM
2123}
2124
30667bf3
AM
2125/* Set the sizes of the dynamic sections. */
2126
b34976b6 2127static bfd_boolean
c39a58e6
AM
2128elf32_hppa_size_dynamic_sections (bfd *output_bfd ATTRIBUTE_UNUSED,
2129 struct bfd_link_info *info)
30667bf3 2130{
83c81bfe 2131 struct elf32_hppa_link_hash_table *htab;
30667bf3 2132 bfd *dynobj;
98ceb8ce 2133 bfd *ibfd;
875c0872 2134 asection *sec;
b34976b6 2135 bfd_boolean relocs;
30667bf3 2136
83c81bfe 2137 htab = hppa_link_hash_table (info);
4dfe6ac6
NC
2138 if (htab == NULL)
2139 return FALSE;
2140
a63e02c7 2141 dynobj = htab->etab.dynobj;
49e9d0d3
AM
2142 if (dynobj == NULL)
2143 abort ();
30667bf3 2144
a63e02c7 2145 if (htab->etab.dynamic_sections_created)
30667bf3
AM
2146 {
2147 /* Set the contents of the .interp section to the interpreter. */
9b8b325a 2148 if (bfd_link_executable (info) && !info->nointerp)
30667bf3 2149 {
3d4d4302 2150 sec = bfd_get_linker_section (dynobj, ".interp");
875c0872 2151 if (sec == NULL)
49e9d0d3 2152 abort ();
875c0872
DA
2153 sec->size = sizeof ELF_DYNAMIC_INTERPRETER;
2154 sec->contents = (unsigned char *) ELF_DYNAMIC_INTERPRETER;
30667bf3 2155 }
74d1c347 2156
d5c73c2f 2157 /* Force millicode symbols local. */
a63e02c7 2158 elf_link_hash_traverse (&htab->etab,
d5c73c2f
AM
2159 clobber_millicode_symbols,
2160 info);
68fb2e56 2161 }
d5c73c2f 2162
98ceb8ce
AM
2163 /* Set up .got and .plt offsets for local syms, and space for local
2164 dynamic relocs. */
c72f2fb2 2165 for (ibfd = info->input_bfds; ibfd != NULL; ibfd = ibfd->link.next)
68fb2e56
AM
2166 {
2167 bfd_signed_vma *local_got;
2168 bfd_signed_vma *end_local_got;
2169 bfd_signed_vma *local_plt;
2170 bfd_signed_vma *end_local_plt;
2171 bfd_size_type locsymcount;
2172 Elf_Internal_Shdr *symtab_hdr;
2173 asection *srel;
9b52905e 2174 char *local_tls_type;
74d1c347 2175
98ceb8ce 2176 if (bfd_get_flavour (ibfd) != bfd_target_elf_flavour)
68fb2e56 2177 continue;
4dc86686 2178
875c0872 2179 for (sec = ibfd->sections; sec != NULL; sec = sec->next)
98ceb8ce 2180 {
3bf083ed 2181 struct elf_dyn_relocs *hdh_p;
98ceb8ce 2182
3bf083ed 2183 for (hdh_p = ((struct elf_dyn_relocs *)
875c0872
DA
2184 elf_section_data (sec)->local_dynrel);
2185 hdh_p != NULL;
3bf083ed 2186 hdh_p = hdh_p->next)
98ceb8ce 2187 {
875c0872
DA
2188 if (!bfd_is_abs_section (hdh_p->sec)
2189 && bfd_is_abs_section (hdh_p->sec->output_section))
ec338859
AM
2190 {
2191 /* Input section has been discarded, either because
2192 it is a copy of a linkonce section or due to
2193 linker script /DISCARD/, so we'll be discarding
2194 the relocs too. */
2195 }
875c0872 2196 else if (hdh_p->count != 0)
ec338859 2197 {
875c0872
DA
2198 srel = elf_section_data (hdh_p->sec)->sreloc;
2199 srel->size += hdh_p->count * sizeof (Elf32_External_Rela);
2200 if ((hdh_p->sec->output_section->flags & SEC_READONLY) != 0)
248866a8 2201 info->flags |= DF_TEXTREL;
ec338859 2202 }
98ceb8ce
AM
2203 }
2204 }
2205
2206 local_got = elf_local_got_refcounts (ibfd);
68fb2e56
AM
2207 if (!local_got)
2208 continue;
74d1c347 2209
98ceb8ce 2210 symtab_hdr = &elf_tdata (ibfd)->symtab_hdr;
68fb2e56
AM
2211 locsymcount = symtab_hdr->sh_info;
2212 end_local_got = local_got + locsymcount;
9b52905e 2213 local_tls_type = hppa_elf_local_got_tls_type (ibfd);
ce558b89
AM
2214 sec = htab->etab.sgot;
2215 srel = htab->etab.srelgot;
68fb2e56
AM
2216 for (; local_got < end_local_got; ++local_got)
2217 {
2218 if (*local_got > 0)
4dc86686 2219 {
2e684e75
AM
2220 unsigned int need;
2221
875c0872 2222 *local_got = sec->size;
2e684e75
AM
2223 need = got_entries_needed (*local_tls_type);
2224 sec->size += need;
4352556b
AM
2225 if (bfd_link_dll (info)
2226 || (bfd_link_pic (info)
2227 && (*local_tls_type & GOT_NORMAL) != 0))
2228 htab->etab.srelgot->size
2229 += got_relocs_needed (*local_tls_type, need, TRUE,
2230 bfd_link_executable (info));
4dc86686 2231 }
68fb2e56
AM
2232 else
2233 *local_got = (bfd_vma) -1;
9b52905e
NC
2234
2235 ++local_tls_type;
68fb2e56 2236 }
74d1c347 2237
68fb2e56
AM
2238 local_plt = end_local_got;
2239 end_local_plt = local_plt + locsymcount;
a63e02c7 2240 if (! htab->etab.dynamic_sections_created)
68fb2e56
AM
2241 {
2242 /* Won't be used, but be safe. */
2243 for (; local_plt < end_local_plt; ++local_plt)
2244 *local_plt = (bfd_vma) -1;
2245 }
2246 else
2247 {
ce558b89
AM
2248 sec = htab->etab.splt;
2249 srel = htab->etab.srelplt;
74d1c347
AM
2250 for (; local_plt < end_local_plt; ++local_plt)
2251 {
2252 if (*local_plt > 0)
2253 {
875c0872
DA
2254 *local_plt = sec->size;
2255 sec->size += PLT_ENTRY_SIZE;
0e1862bb 2256 if (bfd_link_pic (info))
eea6121a 2257 srel->size += sizeof (Elf32_External_Rela);
74d1c347
AM
2258 }
2259 else
2260 *local_plt = (bfd_vma) -1;
2261 }
2262 }
30667bf3 2263 }
68ffbac6 2264
9b52905e
NC
2265 if (htab->tls_ldm_got.refcount > 0)
2266 {
68ffbac6 2267 /* Allocate 2 got entries and 1 dynamic reloc for
07d6d2b8 2268 R_PARISC_TLS_DTPMOD32 relocs. */
ce558b89
AM
2269 htab->tls_ldm_got.offset = htab->etab.sgot->size;
2270 htab->etab.sgot->size += (GOT_ENTRY_SIZE * 2);
2271 htab->etab.srelgot->size += sizeof (Elf32_External_Rela);
9b52905e
NC
2272 }
2273 else
2274 htab->tls_ldm_got.offset = -1;
30667bf3 2275
e5ee5df1
AM
2276 /* Do all the .plt entries without relocs first. The dynamic linker
2277 uses the last .plt reloc to find the end of the .plt (and hence
2278 the start of the .got) for lazy linking. */
a63e02c7 2279 elf_link_hash_traverse (&htab->etab, allocate_plt_static, info);
a8d02d66 2280
98ceb8ce
AM
2281 /* Allocate global sym .plt and .got entries, and space for global
2282 sym dynamic relocs. */
a63e02c7 2283 elf_link_hash_traverse (&htab->etab, allocate_dynrelocs, info);
30667bf3
AM
2284
2285 /* The check_relocs and adjust_dynamic_symbol entry points have
2286 determined the sizes of the various dynamic sections. Allocate
2287 memory for them. */
b34976b6 2288 relocs = FALSE;
875c0872 2289 for (sec = dynobj->sections; sec != NULL; sec = sec->next)
30667bf3 2290 {
875c0872 2291 if ((sec->flags & SEC_LINKER_CREATED) == 0)
30667bf3
AM
2292 continue;
2293
ce558b89 2294 if (sec == htab->etab.splt)
68fb2e56 2295 {
83c81bfe 2296 if (htab->need_plt_stub)
68fb2e56
AM
2297 {
2298 /* Make space for the plt stub at the end of the .plt
2299 section. We want this stub right at the end, up
2300 against the .got section. */
fd361982
AM
2301 int gotalign = bfd_section_alignment (htab->etab.sgot);
2302 int pltalign = bfd_section_alignment (sec);
2c9e9550 2303 int align = gotalign > 3 ? gotalign : 3;
68fb2e56 2304 bfd_size_type mask;
30667bf3 2305
2c9e9550
JDA
2306 if (align > pltalign)
2307 bfd_set_section_alignment (sec, align);
68fb2e56 2308 mask = ((bfd_size_type) 1 << gotalign) - 1;
875c0872 2309 sec->size = (sec->size + sizeof (plt_stub) + mask) & ~mask;
68fb2e56
AM
2310 }
2311 }
ce558b89 2312 else if (sec == htab->etab.sgot
5474d94f
AM
2313 || sec == htab->etab.sdynbss
2314 || sec == htab->etab.sdynrelro)
68fb2e56 2315 ;
fd361982 2316 else if (CONST_STRNEQ (bfd_section_name (sec), ".rela"))
30667bf3 2317 {
875c0872 2318 if (sec->size != 0)
30667bf3 2319 {
4e12ff7f
AM
2320 /* Remember whether there are any reloc sections other
2321 than .rela.plt. */
ce558b89 2322 if (sec != htab->etab.srelplt)
b34976b6 2323 relocs = TRUE;
47d89dba 2324
30667bf3
AM
2325 /* We use the reloc_count field as a counter if we need
2326 to copy relocs into the output file. */
875c0872 2327 sec->reloc_count = 0;
30667bf3
AM
2328 }
2329 }
30667bf3
AM
2330 else
2331 {
2332 /* It's not one of our sections, so don't allocate space. */
2333 continue;
2334 }
2335
875c0872 2336 if (sec->size == 0)
30667bf3
AM
2337 {
2338 /* If we don't need this section, strip it from the
2339 output file. This is mostly to handle .rela.bss and
2340 .rela.plt. We must create both sections in
2341 create_dynamic_sections, because they must be created
2342 before the linker maps input sections to output
2343 sections. The linker does that before
2344 adjust_dynamic_symbol is called, and it is that
2345 function which decides whether anything needs to go
2346 into these sections. */
875c0872 2347 sec->flags |= SEC_EXCLUDE;
30667bf3
AM
2348 continue;
2349 }
2350
c456f082
AM
2351 if ((sec->flags & SEC_HAS_CONTENTS) == 0)
2352 continue;
2353
30667bf3
AM
2354 /* Allocate memory for the section contents. Zero it, because
2355 we may not fill in all the reloc sections. */
875c0872 2356 sec->contents = bfd_zalloc (dynobj, sec->size);
c456f082 2357 if (sec->contents == NULL)
b34976b6 2358 return FALSE;
30667bf3
AM
2359 }
2360
a63e02c7 2361 if (htab->etab.dynamic_sections_created)
30667bf3
AM
2362 {
2363 /* Like IA-64 and HPPA64, always create a DT_PLTGOT. It
2364 actually has nothing to do with the PLT, it is how we
2365 communicate the LTP value of a load module to the dynamic
2366 linker. */
dc810e39 2367#define add_dynamic_entry(TAG, VAL) \
5a580b3a 2368 _bfd_elf_add_dynamic_entry (info, TAG, VAL)
dc810e39
AM
2369
2370 if (!add_dynamic_entry (DT_PLTGOT, 0))
b34976b6 2371 return FALSE;
30667bf3
AM
2372
2373 /* Add some entries to the .dynamic section. We fill in the
2374 values later, in elf32_hppa_finish_dynamic_sections, but we
2375 must add the entries now so that we get the correct size for
2376 the .dynamic section. The DT_DEBUG entry is filled in by the
2377 dynamic linker and used by the debugger. */
0e1862bb 2378 if (bfd_link_executable (info))
30667bf3 2379 {
dc810e39 2380 if (!add_dynamic_entry (DT_DEBUG, 0))
b34976b6 2381 return FALSE;
30667bf3
AM
2382 }
2383
ce558b89 2384 if (htab->etab.srelplt->size != 0)
30667bf3 2385 {
dc810e39
AM
2386 if (!add_dynamic_entry (DT_PLTRELSZ, 0)
2387 || !add_dynamic_entry (DT_PLTREL, DT_RELA)
2388 || !add_dynamic_entry (DT_JMPREL, 0))
b34976b6 2389 return FALSE;
30667bf3
AM
2390 }
2391
2392 if (relocs)
2393 {
dc810e39
AM
2394 if (!add_dynamic_entry (DT_RELA, 0)
2395 || !add_dynamic_entry (DT_RELASZ, 0)
2396 || !add_dynamic_entry (DT_RELAENT, sizeof (Elf32_External_Rela)))
b34976b6 2397 return FALSE;
30667bf3 2398
98ceb8ce
AM
2399 /* If any dynamic relocs apply to a read-only section,
2400 then we need a DT_TEXTREL entry. */
248866a8 2401 if ((info->flags & DF_TEXTREL) == 0)
127e8e9f 2402 elf_link_hash_traverse (&htab->etab, maybe_set_textrel, info);
98ceb8ce
AM
2403
2404 if ((info->flags & DF_TEXTREL) != 0)
2405 {
2406 if (!add_dynamic_entry (DT_TEXTREL, 0))
b34976b6 2407 return FALSE;
98ceb8ce 2408 }
30667bf3
AM
2409 }
2410 }
dc810e39 2411#undef add_dynamic_entry
30667bf3 2412
b34976b6 2413 return TRUE;
30667bf3
AM
2414}
2415
30667bf3
AM
2416/* External entry points for sizing and building linker stubs. */
2417
b4655ea9
AM
2418/* Set up various things so that we can make a list of input sections
2419 for each output section included in the link. Returns -1 on error,
cedb70c5 2420 0 when no stubs will be needed, and 1 on success. */
30667bf3 2421
b4655ea9 2422int
c39a58e6 2423elf32_hppa_setup_section_lists (bfd *output_bfd, struct bfd_link_info *info)
30667bf3
AM
2424{
2425 bfd *input_bfd;
b4655ea9 2426 unsigned int bfd_count;
7292b3ac 2427 unsigned int top_id, top_index;
30667bf3 2428 asection *section;
25f72752 2429 asection **input_list, **list;
986f0783 2430 size_t amt;
b4655ea9 2431 struct elf32_hppa_link_hash_table *htab = hppa_link_hash_table (info);
30667bf3 2432
4dfe6ac6
NC
2433 if (htab == NULL)
2434 return -1;
2435
1badb539
AM
2436 /* Count the number of input BFDs and find the top input section id. */
2437 for (input_bfd = info->input_bfds, bfd_count = 0, top_id = 0;
30667bf3 2438 input_bfd != NULL;
c72f2fb2 2439 input_bfd = input_bfd->link.next)
30667bf3
AM
2440 {
2441 bfd_count += 1;
25f72752
AM
2442 for (section = input_bfd->sections;
2443 section != NULL;
2444 section = section->next)
2445 {
2446 if (top_id < section->id)
2447 top_id = section->id;
2448 }
30667bf3 2449 }
b4655ea9 2450 htab->bfd_count = bfd_count;
30667bf3 2451
dc810e39 2452 amt = sizeof (struct map_stub) * (top_id + 1);
c39a58e6 2453 htab->stub_group = bfd_zmalloc (amt);
83c81bfe 2454 if (htab->stub_group == NULL)
b4655ea9 2455 return -1;
1badb539 2456
b4655ea9 2457 /* We can't use output_bfd->section_count here to find the top output
1badb539 2458 section index as some sections may have been removed, and
8423293d 2459 strip_excluded_output_sections doesn't renumber the indices. */
1badb539
AM
2460 for (section = output_bfd->sections, top_index = 0;
2461 section != NULL;
2462 section = section->next)
2463 {
2464 if (top_index < section->index)
2465 top_index = section->index;
2466 }
2467
b4655ea9 2468 htab->top_index = top_index;
dc810e39 2469 amt = sizeof (asection *) * (top_index + 1);
c39a58e6 2470 input_list = bfd_malloc (amt);
b4655ea9 2471 htab->input_list = input_list;
25f72752 2472 if (input_list == NULL)
b4655ea9 2473 return -1;
25f72752 2474
1badb539
AM
2475 /* For sections we aren't interested in, mark their entries with a
2476 value we can check later. */
2477 list = input_list + top_index;
2478 do
2479 *list = bfd_abs_section_ptr;
2480 while (list-- != input_list);
2481
2482 for (section = output_bfd->sections;
2483 section != NULL;
2484 section = section->next)
2485 {
47d89dba 2486 if ((section->flags & SEC_CODE) != 0)
1badb539
AM
2487 input_list[section->index] = NULL;
2488 }
2489
b4655ea9
AM
2490 return 1;
2491}
2492
2493/* The linker repeatedly calls this function for each input section,
2494 in the order that input sections are linked into output sections.
2495 Build lists of input sections to determine groupings between which
2496 we may insert linker stubs. */
2497
2498void
c39a58e6 2499elf32_hppa_next_input_section (struct bfd_link_info *info, asection *isec)
b4655ea9
AM
2500{
2501 struct elf32_hppa_link_hash_table *htab = hppa_link_hash_table (info);
2502
4dfe6ac6
NC
2503 if (htab == NULL)
2504 return;
2505
b4655ea9 2506 if (isec->output_section->index <= htab->top_index)
25f72752 2507 {
b4655ea9
AM
2508 asection **list = htab->input_list + isec->output_section->index;
2509 if (*list != bfd_abs_section_ptr)
25f72752 2510 {
b4655ea9 2511 /* Steal the link_sec pointer for our list. */
83c81bfe 2512#define PREV_SEC(sec) (htab->stub_group[(sec)->id].link_sec)
b4655ea9
AM
2513 /* This happens to make the list in reverse order,
2514 which is what we want. */
2515 PREV_SEC (isec) = *list;
2516 *list = isec;
25f72752
AM
2517 }
2518 }
b4655ea9 2519}
25f72752 2520
b4655ea9
AM
2521/* See whether we can group stub sections together. Grouping stub
2522 sections may result in fewer stubs. More importantly, we need to
2523 put all .init* and .fini* stubs at the beginning of the .init or
2524 .fini output sections respectively, because glibc splits the
2525 _init and _fini functions into multiple parts. Putting a stub in
2526 the middle of a function is not a good idea. */
2527
2528static void
c39a58e6
AM
2529group_sections (struct elf32_hppa_link_hash_table *htab,
2530 bfd_size_type stub_group_size,
2531 bfd_boolean stubs_always_before_branch)
b4655ea9
AM
2532{
2533 asection **list = htab->input_list + htab->top_index;
1badb539 2534 do
25f72752
AM
2535 {
2536 asection *tail = *list;
1badb539
AM
2537 if (tail == bfd_abs_section_ptr)
2538 continue;
25f72752
AM
2539 while (tail != NULL)
2540 {
2541 asection *curr;
2542 asection *prev;
2543 bfd_size_type total;
00b28bb0 2544 bfd_boolean big_sec;
25f72752
AM
2545
2546 curr = tail;
eea6121a 2547 total = tail->size;
00b28bb0
AM
2548 big_sec = total >= stub_group_size;
2549
25f72752
AM
2550 while ((prev = PREV_SEC (curr)) != NULL
2551 && ((total += curr->output_offset - prev->output_offset)
47d89dba 2552 < stub_group_size))
25f72752
AM
2553 curr = prev;
2554
2555 /* OK, the size from the start of CURR to the end is less
a248e267 2556 than 240000 bytes and thus can be handled by one stub
25f72752 2557 section. (or the tail section is itself larger than
a248e267 2558 240000 bytes, in which case we may be toast.)
25f72752
AM
2559 We should really be keeping track of the total size of
2560 stubs added here, as stubs contribute to the final output
2561 section size. That's a little tricky, and this way will
a248e267
AM
2562 only break if stubs added total more than 22144 bytes, or
2563 2768 long branch stubs. It seems unlikely for more than
2564 2768 different functions to be called, especially from
2565 code only 240000 bytes long. This limit used to be
2566 250000, but c++ code tends to generate lots of little
2567 functions, and sometimes violated the assumption. */
25f72752
AM
2568 do
2569 {
2570 prev = PREV_SEC (tail);
2571 /* Set up this stub group. */
83c81bfe 2572 htab->stub_group[tail->id].link_sec = curr;
25f72752
AM
2573 }
2574 while (tail != curr && (tail = prev) != NULL);
2575
a248e267 2576 /* But wait, there's more! Input sections up to 240000
00b28bb0
AM
2577 bytes before the stub section can be handled by it too.
2578 Don't do this if we have a really large section after the
2579 stubs, as adding more stubs increases the chance that
2580 branches may not reach into the stub section. */
2581 if (!stubs_always_before_branch && !big_sec)
25f72752 2582 {
47d89dba
AM
2583 total = 0;
2584 while (prev != NULL
2585 && ((total += tail->output_offset - prev->output_offset)
2586 < stub_group_size))
2587 {
2588 tail = prev;
2589 prev = PREV_SEC (tail);
83c81bfe 2590 htab->stub_group[tail->id].link_sec = curr;
47d89dba 2591 }
25f72752
AM
2592 }
2593 tail = prev;
2594 }
2595 }
b4655ea9
AM
2596 while (list-- != htab->input_list);
2597 free (htab->input_list);
1badb539 2598#undef PREV_SEC
b4655ea9
AM
2599}
2600
2601/* Read in all local syms for all input bfds, and create hash entries
2602 for export stubs if we are building a multi-subspace shared lib.
2603 Returns -1 on error, 1 if export stubs created, 0 otherwise. */
2604
2605static int
c39a58e6 2606get_local_syms (bfd *output_bfd, bfd *input_bfd, struct bfd_link_info *info)
b4655ea9
AM
2607{
2608 unsigned int bfd_indx;
2609 Elf_Internal_Sym *local_syms, **all_local_syms;
2610 int stub_changed = 0;
2611 struct elf32_hppa_link_hash_table *htab = hppa_link_hash_table (info);
30667bf3 2612
4dfe6ac6
NC
2613 if (htab == NULL)
2614 return -1;
2615
30667bf3
AM
2616 /* We want to read in symbol extension records only once. To do this
2617 we need to read in the local symbols in parallel and save them for
2618 later use; so hold pointers to the local symbols in an array. */
986f0783 2619 size_t amt = sizeof (Elf_Internal_Sym *) * htab->bfd_count;
c39a58e6 2620 all_local_syms = bfd_zmalloc (amt);
b4655ea9 2621 htab->all_local_syms = all_local_syms;
30667bf3 2622 if (all_local_syms == NULL)
b4655ea9 2623 return -1;
30667bf3
AM
2624
2625 /* Walk over all the input BFDs, swapping in local symbols.
2626 If we are creating a shared library, create hash entries for the
2627 export stubs. */
b4655ea9 2628 for (bfd_indx = 0;
30667bf3 2629 input_bfd != NULL;
c72f2fb2 2630 input_bfd = input_bfd->link.next, bfd_indx++)
30667bf3
AM
2631 {
2632 Elf_Internal_Shdr *symtab_hdr;
edd21aca 2633
252b5132
RH
2634 /* We'll need the symbol table in a second. */
2635 symtab_hdr = &elf_tdata (input_bfd)->symtab_hdr;
2636 if (symtab_hdr->sh_info == 0)
2637 continue;
2638
6cdc0ccc
AM
2639 /* We need an array of the local symbols attached to the input bfd. */
2640 local_syms = (Elf_Internal_Sym *) symtab_hdr->contents;
edd21aca 2641 if (local_syms == NULL)
edd21aca 2642 {
6cdc0ccc
AM
2643 local_syms = bfd_elf_get_elf_syms (input_bfd, symtab_hdr,
2644 symtab_hdr->sh_info, 0,
2645 NULL, NULL, NULL);
2646 /* Cache them for elf_link_input_bfd. */
2647 symtab_hdr->contents = (unsigned char *) local_syms;
edd21aca 2648 }
6cdc0ccc
AM
2649 if (local_syms == NULL)
2650 return -1;
edd21aca 2651
6cdc0ccc 2652 all_local_syms[bfd_indx] = local_syms;
edd21aca 2653
0e1862bb 2654 if (bfd_link_pic (info) && htab->multi_subspace)
30667bf3 2655 {
875c0872
DA
2656 struct elf_link_hash_entry **eh_syms;
2657 struct elf_link_hash_entry **eh_symend;
30667bf3
AM
2658 unsigned int symcount;
2659
2660 symcount = (symtab_hdr->sh_size / sizeof (Elf32_External_Sym)
2661 - symtab_hdr->sh_info);
875c0872
DA
2662 eh_syms = (struct elf_link_hash_entry **) elf_sym_hashes (input_bfd);
2663 eh_symend = (struct elf_link_hash_entry **) (eh_syms + symcount);
30667bf3
AM
2664
2665 /* Look through the global syms for functions; We need to
2666 build export stubs for all globally visible functions. */
875c0872 2667 for (; eh_syms < eh_symend; eh_syms++)
30667bf3 2668 {
875c0872 2669 struct elf32_hppa_link_hash_entry *hh;
30667bf3 2670
875c0872 2671 hh = hppa_elf_hash_entry (*eh_syms);
30667bf3 2672
a63e02c7
DA
2673 while (hh->eh.root.type == bfd_link_hash_indirect
2674 || hh->eh.root.type == bfd_link_hash_warning)
2675 hh = hppa_elf_hash_entry (hh->eh.root.u.i.link);
30667bf3
AM
2676
2677 /* At this point in the link, undefined syms have been
2678 resolved, so we need to check that the symbol was
2679 defined in this BFD. */
a63e02c7
DA
2680 if ((hh->eh.root.type == bfd_link_hash_defined
2681 || hh->eh.root.type == bfd_link_hash_defweak)
2682 && hh->eh.type == STT_FUNC
2683 && hh->eh.root.u.def.section->output_section != NULL
2684 && (hh->eh.root.u.def.section->output_section->owner
25f72752 2685 == output_bfd)
a63e02c7
DA
2686 && hh->eh.root.u.def.section->owner == input_bfd
2687 && hh->eh.def_regular
2688 && !hh->eh.forced_local
2689 && ELF_ST_VISIBILITY (hh->eh.other) == STV_DEFAULT)
30667bf3
AM
2690 {
2691 asection *sec;
2692 const char *stub_name;
875c0872 2693 struct elf32_hppa_stub_hash_entry *hsh;
30667bf3 2694
a63e02c7 2695 sec = hh->eh.root.u.def.section;
9b52905e 2696 stub_name = hh_name (hh);
a63e02c7 2697 hsh = hppa_stub_hash_lookup (&htab->bstab,
30667bf3 2698 stub_name,
b34976b6 2699 FALSE, FALSE);
875c0872 2700 if (hsh == NULL)
30667bf3 2701 {
875c0872
DA
2702 hsh = hppa_add_stub (stub_name, sec, htab);
2703 if (!hsh)
b4655ea9 2704 return -1;
30667bf3 2705
a63e02c7
DA
2706 hsh->target_value = hh->eh.root.u.def.value;
2707 hsh->target_section = hh->eh.root.u.def.section;
875c0872 2708 hsh->stub_type = hppa_stub_export;
a63e02c7 2709 hsh->hh = hh;
30667bf3
AM
2710 stub_changed = 1;
2711 }
2712 else
2713 {
695344c0 2714 /* xgettext:c-format */
871b3ab2 2715 _bfd_error_handler (_("%pB: duplicate export stub %s"),
4eca0228 2716 input_bfd, stub_name);
30667bf3
AM
2717 }
2718 }
2719 }
30667bf3
AM
2720 }
2721 }
edd21aca 2722
b4655ea9
AM
2723 return stub_changed;
2724}
2725
2726/* Determine and set the size of the stub section for a final link.
2727
2728 The basic idea here is to examine all the relocations looking for
2729 PC-relative calls to a target that is unreachable with a "bl"
2730 instruction. */
2731
b34976b6 2732bfd_boolean
c39a58e6
AM
2733elf32_hppa_size_stubs
2734 (bfd *output_bfd, bfd *stub_bfd, struct bfd_link_info *info,
2735 bfd_boolean multi_subspace, bfd_signed_vma group_size,
2736 asection * (*add_stub_section) (const char *, asection *),
2737 void (*layout_sections_again) (void))
b4655ea9
AM
2738{
2739 bfd_size_type stub_group_size;
b34976b6
AM
2740 bfd_boolean stubs_always_before_branch;
2741 bfd_boolean stub_changed;
b4655ea9
AM
2742 struct elf32_hppa_link_hash_table *htab = hppa_link_hash_table (info);
2743
4dfe6ac6
NC
2744 if (htab == NULL)
2745 return FALSE;
2746
b4655ea9
AM
2747 /* Stash our params away. */
2748 htab->stub_bfd = stub_bfd;
2749 htab->multi_subspace = multi_subspace;
2750 htab->add_stub_section = add_stub_section;
2751 htab->layout_sections_again = layout_sections_again;
2752 stubs_always_before_branch = group_size < 0;
2753 if (group_size < 0)
2754 stub_group_size = -group_size;
2755 else
2756 stub_group_size = group_size;
2757 if (stub_group_size == 1)
2758 {
2759 /* Default values. */
acc990f2
AM
2760 if (stubs_always_before_branch)
2761 {
2762 stub_group_size = 7680000;
2763 if (htab->has_17bit_branch || htab->multi_subspace)
2764 stub_group_size = 240000;
2765 if (htab->has_12bit_branch)
2766 stub_group_size = 7500;
2767 }
2768 else
2769 {
2770 stub_group_size = 6971392;
2771 if (htab->has_17bit_branch || htab->multi_subspace)
2772 stub_group_size = 217856;
2773 if (htab->has_12bit_branch)
2774 stub_group_size = 6808;
2775 }
b4655ea9
AM
2776 }
2777
2778 group_sections (htab, stub_group_size, stubs_always_before_branch);
2779
2780 switch (get_local_syms (output_bfd, info->input_bfds, info))
2781 {
2782 default:
2783 if (htab->all_local_syms)
2784 goto error_ret_free_local;
b34976b6 2785 return FALSE;
b4655ea9
AM
2786
2787 case 0:
b34976b6 2788 stub_changed = FALSE;
b4655ea9
AM
2789 break;
2790
2791 case 1:
b34976b6 2792 stub_changed = TRUE;
b4655ea9
AM
2793 break;
2794 }
2795
edd21aca
AM
2796 while (1)
2797 {
b4655ea9
AM
2798 bfd *input_bfd;
2799 unsigned int bfd_indx;
30667bf3
AM
2800 asection *stub_sec;
2801
25f72752 2802 for (input_bfd = info->input_bfds, bfd_indx = 0;
30667bf3 2803 input_bfd != NULL;
c72f2fb2 2804 input_bfd = input_bfd->link.next, bfd_indx++)
30667bf3
AM
2805 {
2806 Elf_Internal_Shdr *symtab_hdr;
b4655ea9
AM
2807 asection *section;
2808 Elf_Internal_Sym *local_syms;
30667bf3
AM
2809
2810 /* We'll need the symbol table in a second. */
2811 symtab_hdr = &elf_tdata (input_bfd)->symtab_hdr;
2812 if (symtab_hdr->sh_info == 0)
2813 continue;
2814
b4655ea9 2815 local_syms = htab->all_local_syms[bfd_indx];
30667bf3
AM
2816
2817 /* Walk over each section attached to the input bfd. */
2818 for (section = input_bfd->sections;
2819 section != NULL;
25f72752 2820 section = section->next)
30667bf3 2821 {
30667bf3
AM
2822 Elf_Internal_Rela *internal_relocs, *irelaend, *irela;
2823
2824 /* If there aren't any relocs, then there's nothing more
2825 to do. */
2826 if ((section->flags & SEC_RELOC) == 0
215f5271
AM
2827 || (section->flags & SEC_ALLOC) == 0
2828 || (section->flags & SEC_LOAD) == 0
2829 || (section->flags & SEC_CODE) == 0
30667bf3
AM
2830 || section->reloc_count == 0)
2831 continue;
2832
25f72752
AM
2833 /* If this section is a link-once section that will be
2834 discarded, then don't create any stubs. */
2835 if (section->output_section == NULL
2836 || section->output_section->owner != output_bfd)
2837 continue;
2838
1e2f5b6e
AM
2839 /* Get the relocs. */
2840 internal_relocs
c39a58e6 2841 = _bfd_elf_link_read_relocs (input_bfd, section, NULL, NULL,
45d6a902 2842 info->keep_memory);
30667bf3 2843 if (internal_relocs == NULL)
1e2f5b6e 2844 goto error_ret_free_local;
30667bf3
AM
2845
2846 /* Now examine each relocation. */
2847 irela = internal_relocs;
2848 irelaend = irela + section->reloc_count;
2849 for (; irela < irelaend; irela++)
2850 {
2851 unsigned int r_type, r_indx;
2852 enum elf32_hppa_stub_type stub_type;
875c0872 2853 struct elf32_hppa_stub_hash_entry *hsh;
30667bf3
AM
2854 asection *sym_sec;
2855 bfd_vma sym_value;
2856 bfd_vma destination;
875c0872 2857 struct elf32_hppa_link_hash_entry *hh;
30667bf3 2858 char *stub_name;
25f72752 2859 const asection *id_sec;
30667bf3
AM
2860
2861 r_type = ELF32_R_TYPE (irela->r_info);
2862 r_indx = ELF32_R_SYM (irela->r_info);
2863
2864 if (r_type >= (unsigned int) R_PARISC_UNIMPLEMENTED)
2865 {
2866 bfd_set_error (bfd_error_bad_value);
1e2f5b6e
AM
2867 error_ret_free_internal:
2868 if (elf_section_data (section)->relocs == NULL)
2869 free (internal_relocs);
2870 goto error_ret_free_local;
30667bf3
AM
2871 }
2872
2873 /* Only look for stubs on call instructions. */
2874 if (r_type != (unsigned int) R_PARISC_PCREL12F
2875 && r_type != (unsigned int) R_PARISC_PCREL17F
2876 && r_type != (unsigned int) R_PARISC_PCREL22F)
2877 continue;
2878
2879 /* Now determine the call target, its name, value,
2880 section. */
2881 sym_sec = NULL;
2882 sym_value = 0;
f6a8b8c7 2883 destination = -1;
875c0872 2884 hh = NULL;
30667bf3
AM
2885 if (r_indx < symtab_hdr->sh_info)
2886 {
2887 /* It's a local symbol. */
2888 Elf_Internal_Sym *sym;
2889 Elf_Internal_Shdr *hdr;
4fbb74a6 2890 unsigned int shndx;
30667bf3
AM
2891
2892 sym = local_syms + r_indx;
30667bf3
AM
2893 if (ELF_ST_TYPE (sym->st_info) != STT_SECTION)
2894 sym_value = sym->st_value;
4fbb74a6
AM
2895 shndx = sym->st_shndx;
2896 if (shndx < elf_numsections (input_bfd))
2897 {
2898 hdr = elf_elfsections (input_bfd)[shndx];
2899 sym_sec = hdr->bfd_section;
2900 destination = (sym_value + irela->r_addend
2901 + sym_sec->output_offset
2902 + sym_sec->output_section->vma);
2903 }
30667bf3
AM
2904 }
2905 else
2906 {
2907 /* It's an external symbol. */
2908 int e_indx;
2909
2910 e_indx = r_indx - symtab_hdr->sh_info;
875c0872 2911 hh = hppa_elf_hash_entry (elf_sym_hashes (input_bfd)[e_indx]);
30667bf3 2912
a63e02c7
DA
2913 while (hh->eh.root.type == bfd_link_hash_indirect
2914 || hh->eh.root.type == bfd_link_hash_warning)
2915 hh = hppa_elf_hash_entry (hh->eh.root.u.i.link);
30667bf3 2916
a63e02c7
DA
2917 if (hh->eh.root.type == bfd_link_hash_defined
2918 || hh->eh.root.type == bfd_link_hash_defweak)
30667bf3 2919 {
a63e02c7
DA
2920 sym_sec = hh->eh.root.u.def.section;
2921 sym_value = hh->eh.root.u.def.value;
30667bf3
AM
2922 if (sym_sec->output_section != NULL)
2923 destination = (sym_value + irela->r_addend
2924 + sym_sec->output_offset
2925 + sym_sec->output_section->vma);
2926 }
a63e02c7 2927 else if (hh->eh.root.type == bfd_link_hash_undefweak)
c432ba1a 2928 {
0e1862bb 2929 if (! bfd_link_pic (info))
c432ba1a
AM
2930 continue;
2931 }
a63e02c7 2932 else if (hh->eh.root.type == bfd_link_hash_undefined)
c432ba1a 2933 {
59c2e50f 2934 if (! (info->unresolved_syms_in_objects == RM_IGNORE
a63e02c7 2935 && (ELF_ST_VISIBILITY (hh->eh.other)
c432ba1a 2936 == STV_DEFAULT)
a63e02c7 2937 && hh->eh.type != STT_PARISC_MILLI))
c432ba1a
AM
2938 continue;
2939 }
30667bf3
AM
2940 else
2941 {
2942 bfd_set_error (bfd_error_bad_value);
2943 goto error_ret_free_internal;
2944 }
2945 }
2946
2947 /* Determine what (if any) linker stub is needed. */
875c0872 2948 stub_type = hppa_type_of_stub (section, irela, hh,
a252afa4 2949 destination, info);
30667bf3
AM
2950 if (stub_type == hppa_stub_none)
2951 continue;
2952
25f72752 2953 /* Support for grouping stub sections. */
83c81bfe 2954 id_sec = htab->stub_group[section->id].link_sec;
25f72752 2955
30667bf3 2956 /* Get the name of this stub. */
875c0872 2957 stub_name = hppa_stub_name (id_sec, sym_sec, hh, irela);
30667bf3
AM
2958 if (!stub_name)
2959 goto error_ret_free_internal;
2960
a63e02c7 2961 hsh = hppa_stub_hash_lookup (&htab->bstab,
30667bf3 2962 stub_name,
b34976b6 2963 FALSE, FALSE);
875c0872 2964 if (hsh != NULL)
30667bf3
AM
2965 {
2966 /* The proper stub has already been created. */
2967 free (stub_name);
2968 continue;
2969 }
2970
875c0872
DA
2971 hsh = hppa_add_stub (stub_name, section, htab);
2972 if (hsh == NULL)
30667bf3
AM
2973 {
2974 free (stub_name);
1e2f5b6e 2975 goto error_ret_free_internal;
30667bf3
AM
2976 }
2977
875c0872
DA
2978 hsh->target_value = sym_value;
2979 hsh->target_section = sym_sec;
2980 hsh->stub_type = stub_type;
0e1862bb 2981 if (bfd_link_pic (info))
30667bf3
AM
2982 {
2983 if (stub_type == hppa_stub_import)
875c0872 2984 hsh->stub_type = hppa_stub_import_shared;
98ceb8ce 2985 else if (stub_type == hppa_stub_long_branch)
875c0872 2986 hsh->stub_type = hppa_stub_long_branch_shared;
30667bf3 2987 }
a63e02c7 2988 hsh->hh = hh;
b34976b6 2989 stub_changed = TRUE;
30667bf3
AM
2990 }
2991
2992 /* We're done with the internal relocs, free them. */
1e2f5b6e
AM
2993 if (elf_section_data (section)->relocs == NULL)
2994 free (internal_relocs);
30667bf3
AM
2995 }
2996 }
2997
2998 if (!stub_changed)
2999 break;
3000
3001 /* OK, we've added some stubs. Find out the new size of the
3002 stub sections. */
83c81bfe 3003 for (stub_sec = htab->stub_bfd->sections;
30667bf3
AM
3004 stub_sec != NULL;
3005 stub_sec = stub_sec->next)
a464198b
AM
3006 if ((stub_sec->flags & SEC_LINKER_CREATED) == 0)
3007 stub_sec->size = 0;
74d1c347 3008
a63e02c7 3009 bfd_hash_traverse (&htab->bstab, hppa_size_one_stub, htab);
74d1c347 3010
30667bf3 3011 /* Ask the linker to do its stuff. */
83c81bfe 3012 (*htab->layout_sections_again) ();
b34976b6 3013 stub_changed = FALSE;
30667bf3
AM
3014 }
3015
6cdc0ccc 3016 free (htab->all_local_syms);
b34976b6 3017 return TRUE;
30667bf3
AM
3018
3019 error_ret_free_local:
b4655ea9 3020 free (htab->all_local_syms);
b34976b6 3021 return FALSE;
30667bf3
AM
3022}
3023
30667bf3
AM
3024/* For a final link, this function is called after we have sized the
3025 stubs to provide a value for __gp. */
3026
b34976b6 3027bfd_boolean
c39a58e6 3028elf32_hppa_set_gp (bfd *abfd, struct bfd_link_info *info)
30667bf3 3029{
b4655ea9
AM
3030 struct bfd_link_hash_entry *h;
3031 asection *sec = NULL;
3032 bfd_vma gp_val = 0;
30667bf3 3033
55ef6584 3034 h = bfd_link_hash_lookup (info->hash, "$global$", FALSE, FALSE, FALSE);
30667bf3 3035
df8634e3 3036 if (h != NULL
b4655ea9
AM
3037 && (h->type == bfd_link_hash_defined
3038 || h->type == bfd_link_hash_defweak))
30667bf3 3039 {
b4655ea9
AM
3040 gp_val = h->u.def.value;
3041 sec = h->u.def.section;
30667bf3
AM
3042 }
3043 else
3044 {
0eddce27
AM
3045 asection *splt = bfd_get_section_by_name (abfd, ".plt");
3046 asection *sgot = bfd_get_section_by_name (abfd, ".got");
b4655ea9 3047
74d1c347
AM
3048 /* Choose to point our LTP at, in this order, one of .plt, .got,
3049 or .data, if these sections exist. In the case of choosing
3050 .plt try to make the LTP ideal for addressing anywhere in the
3051 .plt or .got with a 14 bit signed offset. Typically, the end
3052 of the .plt is the start of the .got, so choose .plt + 0x2000
3053 if either the .plt or .got is larger than 0x2000. If both
3054 the .plt and .got are smaller than 0x2000, choose the end of
3055 the .plt section. */
225247f0
JT
3056 sec = strcmp (bfd_get_target (abfd), "elf32-hppa-netbsd") == 0
3057 ? NULL : splt;
74d1c347 3058 if (sec != NULL)
30667bf3 3059 {
eea6121a
AM
3060 gp_val = sec->size;
3061 if (gp_val > 0x2000 || (sgot && sgot->size > 0x2000))
74d1c347
AM
3062 {
3063 gp_val = 0x2000;
3064 }
3065 }
3066 else
3067 {
b4655ea9 3068 sec = sgot;
74d1c347
AM
3069 if (sec != NULL)
3070 {
225247f0
JT
3071 if (strcmp (bfd_get_target (abfd), "elf32-hppa-netbsd") != 0)
3072 {
07d6d2b8 3073 /* We know we don't have a .plt. If .got is large,
225247f0 3074 offset our LTP. */
07d6d2b8 3075 if (sec->size > 0x2000)
225247f0
JT
3076 gp_val = 0x2000;
3077 }
74d1c347
AM
3078 }
3079 else
3080 {
3081 /* No .plt or .got. Who cares what the LTP is? */
3082 sec = bfd_get_section_by_name (abfd, ".data");
3083 }
30667bf3 3084 }
df8634e3
AM
3085
3086 if (h != NULL)
3087 {
b4655ea9
AM
3088 h->type = bfd_link_hash_defined;
3089 h->u.def.value = gp_val;
df8634e3 3090 if (sec != NULL)
b4655ea9 3091 h->u.def.section = sec;
df8634e3 3092 else
b4655ea9 3093 h->u.def.section = bfd_abs_section_ptr;
df8634e3 3094 }
30667bf3
AM
3095 }
3096
55ef6584
AM
3097 if (bfd_get_flavour (abfd) == bfd_target_elf_flavour)
3098 {
3099 if (sec != NULL && sec->output_section != NULL)
3100 gp_val += sec->output_section->vma + sec->output_offset;
74d1c347 3101
55ef6584
AM
3102 elf_gp (abfd) = gp_val;
3103 }
b34976b6 3104 return TRUE;
30667bf3
AM
3105}
3106
30667bf3
AM
3107/* Build all the stubs associated with the current output file. The
3108 stubs are kept in a hash table attached to the main linker hash
3109 table. We also set up the .plt entries for statically linked PIC
3110 functions here. This function is called via hppaelf_finish in the
3111 linker. */
3112
b34976b6 3113bfd_boolean
c39a58e6 3114elf32_hppa_build_stubs (struct bfd_link_info *info)
30667bf3
AM
3115{
3116 asection *stub_sec;
3117 struct bfd_hash_table *table;
83c81bfe 3118 struct elf32_hppa_link_hash_table *htab;
30667bf3 3119
83c81bfe 3120 htab = hppa_link_hash_table (info);
4dfe6ac6
NC
3121 if (htab == NULL)
3122 return FALSE;
30667bf3 3123
83c81bfe 3124 for (stub_sec = htab->stub_bfd->sections;
30667bf3
AM
3125 stub_sec != NULL;
3126 stub_sec = stub_sec->next)
a464198b
AM
3127 if ((stub_sec->flags & SEC_LINKER_CREATED) == 0
3128 && stub_sec->size != 0)
3129 {
3130 /* Allocate memory to hold the linker stubs. */
3131 stub_sec->contents = bfd_zalloc (htab->stub_bfd, stub_sec->size);
3132 if (stub_sec->contents == NULL)
3133 return FALSE;
3134 stub_sec->size = 0;
3135 }
30667bf3
AM
3136
3137 /* Build the stubs as directed by the stub hash table. */
a63e02c7 3138 table = &htab->bstab;
30667bf3
AM
3139 bfd_hash_traverse (table, hppa_build_one_stub, info);
3140
b34976b6 3141 return TRUE;
30667bf3
AM
3142}
3143
9b52905e 3144/* Return the base vma address which should be subtracted from the real
68ffbac6 3145 address when resolving a dtpoff relocation.
9b52905e
NC
3146 This is PT_TLS segment p_vaddr. */
3147
3148static bfd_vma
3149dtpoff_base (struct bfd_link_info *info)
3150{
3151 /* If tls_sec is NULL, we should have signalled an error already. */
3152 if (elf_hash_table (info)->tls_sec == NULL)
3153 return 0;
3154 return elf_hash_table (info)->tls_sec->vma;
3155}
3156
3157/* Return the relocation value for R_PARISC_TLS_TPOFF*.. */
3158
3159static bfd_vma
3160tpoff (struct bfd_link_info *info, bfd_vma address)
3161{
3162 struct elf_link_hash_table *htab = elf_hash_table (info);
3163
3164 /* If tls_sec is NULL, we should have signalled an error already. */
3165 if (htab->tls_sec == NULL)
3166 return 0;
68ffbac6 3167 /* hppa TLS ABI is variant I and static TLS block start just after
9b52905e 3168 tcbhead structure which has 2 pointer fields. */
68ffbac6 3169 return (address - htab->tls_sec->vma
9b52905e
NC
3170 + align_power ((bfd_vma) 8, htab->tls_sec->alignment_power));
3171}
3172
c46b7515
AM
3173/* Perform a final link. */
3174
b34976b6 3175static bfd_boolean
c39a58e6 3176elf32_hppa_final_link (bfd *abfd, struct bfd_link_info *info)
c46b7515 3177{
6d4b2867
JDA
3178 struct stat buf;
3179
4dc86686 3180 /* Invoke the regular ELF linker to do all the work. */
c152c796 3181 if (!bfd_elf_final_link (abfd, info))
b34976b6 3182 return FALSE;
c46b7515
AM
3183
3184 /* If we're producing a final executable, sort the contents of the
985142a4 3185 unwind section. */
0e1862bb 3186 if (bfd_link_relocatable (info))
d9f40817
DA
3187 return TRUE;
3188
6d4b2867
JDA
3189 /* Do not attempt to sort non-regular files. This is here
3190 especially for configure scripts and kernel builds which run
3191 tests with "ld [...] -o /dev/null". */
765cf5f6 3192 if (stat (bfd_get_filename (abfd), &buf) != 0
6d4b2867
JDA
3193 || !S_ISREG(buf.st_mode))
3194 return TRUE;
3195
46fe4e66 3196 return elf_hppa_sort_unwind (abfd);
c46b7515
AM
3197}
3198
3199/* Record the lowest address for the data and text segments. */
3200
3201static void
2ea37f1c 3202hppa_record_segment_addr (bfd *abfd, asection *section, void *data)
c46b7515 3203{
83c81bfe 3204 struct elf32_hppa_link_hash_table *htab;
c46b7515 3205
875c0872 3206 htab = (struct elf32_hppa_link_hash_table*) data;
4dfe6ac6
NC
3207 if (htab == NULL)
3208 return;
c46b7515
AM
3209
3210 if ((section->flags & (SEC_ALLOC | SEC_LOAD)) == (SEC_ALLOC | SEC_LOAD))
3211 {
2ea37f1c
NC
3212 bfd_vma value;
3213 Elf_Internal_Phdr *p;
3214
3215 p = _bfd_elf_find_segment_containing_section (abfd, section->output_section);
3216 BFD_ASSERT (p != NULL);
3217 value = p->p_vaddr;
c46b7515
AM
3218
3219 if ((section->flags & SEC_READONLY) != 0)
3220 {
83c81bfe
AM
3221 if (value < htab->text_segment_base)
3222 htab->text_segment_base = value;
c46b7515
AM
3223 }
3224 else
3225 {
83c81bfe
AM
3226 if (value < htab->data_segment_base)
3227 htab->data_segment_base = value;
c46b7515
AM
3228 }
3229 }
3230}
3231
30667bf3
AM
3232/* Perform a relocation as part of a final link. */
3233
3234static bfd_reloc_status_type
c39a58e6
AM
3235final_link_relocate (asection *input_section,
3236 bfd_byte *contents,
875c0872 3237 const Elf_Internal_Rela *rela,
c39a58e6
AM
3238 bfd_vma value,
3239 struct elf32_hppa_link_hash_table *htab,
3240 asection *sym_sec,
875c0872 3241 struct elf32_hppa_link_hash_entry *hh,
a252afa4 3242 struct bfd_link_info *info)
30667bf3 3243{
2365f8d7 3244 unsigned int insn;
875c0872 3245 unsigned int r_type = ELF32_R_TYPE (rela->r_info);
a252afa4 3246 unsigned int orig_r_type = r_type;
30667bf3
AM
3247 reloc_howto_type *howto = elf_hppa_howto_table + r_type;
3248 int r_format = howto->bitsize;
3249 enum hppa_reloc_field_selector_type_alt r_field;
3250 bfd *input_bfd = input_section->owner;
875c0872 3251 bfd_vma offset = rela->r_offset;
30667bf3
AM
3252 bfd_vma max_branch_offset = 0;
3253 bfd_byte *hit_data = contents + offset;
875c0872 3254 bfd_signed_vma addend = rela->r_addend;
30667bf3 3255 bfd_vma location;
875c0872 3256 struct elf32_hppa_stub_hash_entry *hsh = NULL;
68ffbac6 3257 int val;
30667bf3
AM
3258
3259 if (r_type == R_PARISC_NONE)
3260 return bfd_reloc_ok;
3261
3262 insn = bfd_get_32 (input_bfd, hit_data);
3263
3264 /* Find out where we are and where we're going. */
3265 location = (offset +
3266 input_section->output_offset +
3267 input_section->output_section->vma);
3268
a252afa4
DA
3269 /* If we are not building a shared library, convert DLTIND relocs to
3270 DPREL relocs. */
0e1862bb 3271 if (!bfd_link_pic (info))
a252afa4
DA
3272 {
3273 switch (r_type)
4fc8051d
AM
3274 {
3275 case R_PARISC_DLTIND21L:
143bb599
DA
3276 case R_PARISC_TLS_GD21L:
3277 case R_PARISC_TLS_LDM21L:
3278 case R_PARISC_TLS_IE21L:
4fc8051d 3279 r_type = R_PARISC_DPREL21L;
a252afa4
DA
3280 break;
3281
4fc8051d 3282 case R_PARISC_DLTIND14R:
143bb599
DA
3283 case R_PARISC_TLS_GD14R:
3284 case R_PARISC_TLS_LDM14R:
3285 case R_PARISC_TLS_IE14R:
4fc8051d 3286 r_type = R_PARISC_DPREL14R;
a252afa4
DA
3287 break;
3288
4fc8051d
AM
3289 case R_PARISC_DLTIND14F:
3290 r_type = R_PARISC_DPREL14F;
a252afa4
DA
3291 break;
3292 }
3293 }
3294
30667bf3
AM
3295 switch (r_type)
3296 {
3297 case R_PARISC_PCREL12F:
3298 case R_PARISC_PCREL17F:
3299 case R_PARISC_PCREL22F:
067fa4a6
AM
3300 /* If this call should go via the plt, find the import stub in
3301 the stub hash. */
215f5271
AM
3302 if (sym_sec == NULL
3303 || sym_sec->output_section == NULL
3304 || (hh != NULL
3305 && hh->eh.plt.offset != (bfd_vma) -1
3306 && hh->eh.dynindx != -1
3307 && !hh->plabel
3308 && (bfd_link_pic (info)
3309 || !hh->eh.def_regular
3310 || hh->eh.root.type == bfd_link_hash_defweak)))
30667bf3 3311 {
875c0872 3312 hsh = hppa_get_stub_entry (input_section, sym_sec,
7455c018 3313 hh, rela, htab);
875c0872 3314 if (hsh != NULL)
30667bf3 3315 {
875c0872
DA
3316 value = (hsh->stub_offset
3317 + hsh->stub_sec->output_offset
3318 + hsh->stub_sec->output_section->vma);
30667bf3
AM
3319 addend = 0;
3320 }
875c0872 3321 else if (sym_sec == NULL && hh != NULL
a63e02c7 3322 && hh->eh.root.type == bfd_link_hash_undefweak)
30667bf3 3323 {
db20fd76
AM
3324 /* It's OK if undefined weak. Calls to undefined weak
3325 symbols behave as if the "called" function
3326 immediately returns. We can thus call to a weak
3327 function without first checking whether the function
3328 is defined. */
30667bf3 3329 value = location;
db20fd76 3330 addend = 8;
30667bf3
AM
3331 }
3332 else
f09ebc7d 3333 return bfd_reloc_undefined;
30667bf3
AM
3334 }
3335 /* Fall thru. */
3336
3337 case R_PARISC_PCREL21L:
3338 case R_PARISC_PCREL17C:
3339 case R_PARISC_PCREL17R:
3340 case R_PARISC_PCREL14R:
3341 case R_PARISC_PCREL14F:
36751eee 3342 case R_PARISC_PCREL32:
30667bf3
AM
3343 /* Make it a pc relative offset. */
3344 value -= location;
3345 addend -= 8;
3346 break;
3347
3348 case R_PARISC_DPREL21L:
3349 case R_PARISC_DPREL14R:
3350 case R_PARISC_DPREL14F:
a252afa4
DA
3351 /* Convert instructions that use the linkage table pointer (r19) to
3352 instructions that use the global data pointer (dp). This is the
3353 most efficient way of using PIC code in an incomplete executable,
3354 but the user must follow the standard runtime conventions for
3355 accessing data for this to work. */
143bb599 3356 if (orig_r_type != r_type)
a252afa4 3357 {
143bb599
DA
3358 if (r_type == R_PARISC_DPREL21L)
3359 {
3360 /* GCC sometimes uses a register other than r19 for the
3361 operation, so we must convert any addil instruction
3362 that uses this relocation. */
2365f8d7 3363 if ((insn & 0xfc000000) == OP_ADDIL << 26)
143bb599
DA
3364 insn = ADDIL_DP;
3365 else
3366 /* We must have a ldil instruction. It's too hard to find
3367 and convert the associated add instruction, so issue an
3368 error. */
4eca0228 3369 _bfd_error_handler
695344c0 3370 /* xgettext:c-format */
2dcf00ce
AM
3371 (_("%pB(%pA+%#" PRIx64 "): %s fixup for insn %#x "
3372 "is not supported in a non-shared link"),
143bb599
DA
3373 input_bfd,
3374 input_section,
2dcf00ce 3375 (uint64_t) offset,
143bb599
DA
3376 howto->name,
3377 insn);
3378 }
3379 else if (r_type == R_PARISC_DPREL14F)
3380 {
3381 /* This must be a format 1 load/store. Change the base
3382 register to dp. */
3383 insn = (insn & 0xfc1ffff) | (27 << 21);
3384 }
a252afa4
DA
3385 }
3386
143bb599
DA
3387 /* For all the DP relative relocations, we need to examine the symbol's
3388 section. If it has no section or if it's a code section, then
3389 "data pointer relative" makes no sense. In that case we don't
3390 adjust the "value", and for 21 bit addil instructions, we change the
3391 source addend register from %dp to %r0. This situation commonly
3392 arises for undefined weak symbols and when a variable's "constness"
3393 is declared differently from the way the variable is defined. For
3394 instance: "extern int foo" with foo defined as "const int foo". */
95d0f04a 3395 if (sym_sec == NULL || (sym_sec->flags & SEC_CODE) != 0)
30667bf3 3396 {
2365f8d7
AM
3397 if ((insn & ((0x3fu << 26) | (0x1f << 21)))
3398 == ((OP_ADDIL << 26) | (27 << 21)))
30667bf3
AM
3399 {
3400 insn &= ~ (0x1f << 21);
30667bf3
AM
3401 }
3402 /* Now try to make things easy for the dynamic linker. */
3403
3404 break;
3405 }
74d1c347 3406 /* Fall thru. */
30667bf3
AM
3407
3408 case R_PARISC_DLTIND21L:
3409 case R_PARISC_DLTIND14R:
3410 case R_PARISC_DLTIND14F:
143bb599
DA
3411 case R_PARISC_TLS_GD21L:
3412 case R_PARISC_TLS_LDM21L:
3413 case R_PARISC_TLS_IE21L:
9b52905e 3414 case R_PARISC_TLS_GD14R:
9b52905e 3415 case R_PARISC_TLS_LDM14R:
9b52905e 3416 case R_PARISC_TLS_IE14R:
30667bf3
AM
3417 value -= elf_gp (input_section->output_section->owner);
3418 break;
3419
c46b7515
AM
3420 case R_PARISC_SEGREL32:
3421 if ((sym_sec->flags & SEC_CODE) != 0)
83c81bfe 3422 value -= htab->text_segment_base;
c46b7515 3423 else
83c81bfe 3424 value -= htab->data_segment_base;
c46b7515
AM
3425 break;
3426
30667bf3
AM
3427 default:
3428 break;
3429 }
3430
3431 switch (r_type)
3432 {
3433 case R_PARISC_DIR32:
47d89dba 3434 case R_PARISC_DIR14F:
30667bf3
AM
3435 case R_PARISC_DIR17F:
3436 case R_PARISC_PCREL17C:
3437 case R_PARISC_PCREL14F:
36751eee 3438 case R_PARISC_PCREL32:
30667bf3
AM
3439 case R_PARISC_DPREL14F:
3440 case R_PARISC_PLABEL32:
3441 case R_PARISC_DLTIND14F:
3442 case R_PARISC_SEGBASE:
3443 case R_PARISC_SEGREL32:
9b52905e
NC
3444 case R_PARISC_TLS_DTPMOD32:
3445 case R_PARISC_TLS_DTPOFF32:
3446 case R_PARISC_TLS_TPREL32:
30667bf3
AM
3447 r_field = e_fsel;
3448 break;
3449
1bf42538 3450 case R_PARISC_DLTIND21L:
30667bf3 3451 case R_PARISC_PCREL21L:
30667bf3 3452 case R_PARISC_PLABEL21L:
1bf42538
JL
3453 r_field = e_lsel;
3454 break;
3455
3456 case R_PARISC_DIR21L:
3457 case R_PARISC_DPREL21L:
9b52905e
NC
3458 case R_PARISC_TLS_GD21L:
3459 case R_PARISC_TLS_LDM21L:
3460 case R_PARISC_TLS_LDO21L:
3461 case R_PARISC_TLS_IE21L:
3462 case R_PARISC_TLS_LE21L:
30667bf3
AM
3463 r_field = e_lrsel;
3464 break;
3465
30667bf3 3466 case R_PARISC_PCREL17R:
30667bf3 3467 case R_PARISC_PCREL14R:
30667bf3
AM
3468 case R_PARISC_PLABEL14R:
3469 case R_PARISC_DLTIND14R:
1bf42538
JL
3470 r_field = e_rsel;
3471 break;
3472
3473 case R_PARISC_DIR17R:
3474 case R_PARISC_DIR14R:
3475 case R_PARISC_DPREL14R:
9b52905e
NC
3476 case R_PARISC_TLS_GD14R:
3477 case R_PARISC_TLS_LDM14R:
3478 case R_PARISC_TLS_LDO14R:
3479 case R_PARISC_TLS_IE14R:
3480 case R_PARISC_TLS_LE14R:
30667bf3
AM
3481 r_field = e_rrsel;
3482 break;
3483
3484 case R_PARISC_PCREL12F:
3485 case R_PARISC_PCREL17F:
3486 case R_PARISC_PCREL22F:
3487 r_field = e_fsel;
3488
3489 if (r_type == (unsigned int) R_PARISC_PCREL17F)
3490 {
3491 max_branch_offset = (1 << (17-1)) << 2;
3492 }
3493 else if (r_type == (unsigned int) R_PARISC_PCREL12F)
3494 {
3495 max_branch_offset = (1 << (12-1)) << 2;
3496 }
3497 else
3498 {
3499 max_branch_offset = (1 << (22-1)) << 2;
3500 }
3501
3502 /* sym_sec is NULL on undefined weak syms or when shared on
3503 undefined syms. We've already checked for a stub for the
3504 shared undefined case. */
3505 if (sym_sec == NULL)
3506 break;
3507
3508 /* If the branch is out of reach, then redirect the
3509 call to the local stub for this function. */
3510 if (value + addend + max_branch_offset >= 2*max_branch_offset)
3511 {
875c0872 3512 hsh = hppa_get_stub_entry (input_section, sym_sec,
7455c018 3513 hh, rela, htab);
875c0872 3514 if (hsh == NULL)
f09ebc7d 3515 return bfd_reloc_undefined;
30667bf3
AM
3516
3517 /* Munge up the value and addend so that we call the stub
3518 rather than the procedure directly. */
875c0872
DA
3519 value = (hsh->stub_offset
3520 + hsh->stub_sec->output_offset
3521 + hsh->stub_sec->output_section->vma
30667bf3
AM
3522 - location);
3523 addend = -8;
3524 }
3525 break;
3526
3527 /* Something we don't know how to handle. */
3528 default:
3529 return bfd_reloc_notsupported;
3530 }
3531
3532 /* Make sure we can reach the stub. */
3533 if (max_branch_offset != 0
3534 && value + addend + max_branch_offset >= 2*max_branch_offset)
3535 {
4eca0228 3536 _bfd_error_handler
695344c0 3537 /* xgettext:c-format */
2dcf00ce
AM
3538 (_("%pB(%pA+%#" PRIx64 "): cannot reach %s, "
3539 "recompile with -ffunction-sections"),
d003868e
AM
3540 input_bfd,
3541 input_section,
2dcf00ce 3542 (uint64_t) offset,
a63e02c7 3543 hsh->bh_root.string);
ce757d15 3544 bfd_set_error (bfd_error_bad_value);
30667bf3
AM
3545 return bfd_reloc_notsupported;
3546 }
3547
3548 val = hppa_field_adjust (value, addend, r_field);
3549
3550 switch (r_type)
3551 {
3552 case R_PARISC_PCREL12F:
3553 case R_PARISC_PCREL17C:
3554 case R_PARISC_PCREL17F:
3555 case R_PARISC_PCREL17R:
3556 case R_PARISC_PCREL22F:
3557 case R_PARISC_DIR17F:
3558 case R_PARISC_DIR17R:
3559 /* This is a branch. Divide the offset by four.
3560 Note that we need to decide whether it's a branch or
3561 otherwise by inspecting the reloc. Inspecting insn won't
3562 work as insn might be from a .word directive. */
3563 val >>= 2;
3564 break;
3565
3566 default:
3567 break;
3568 }
3569
3570 insn = hppa_rebuild_insn (insn, val, r_format);
3571
3572 /* Update the instruction word. */
74d1c347 3573 bfd_put_32 (input_bfd, (bfd_vma) insn, hit_data);
30667bf3
AM
3574 return bfd_reloc_ok;
3575}
3576
30667bf3
AM
3577/* Relocate an HPPA ELF section. */
3578
b34976b6 3579static bfd_boolean
c39a58e6
AM
3580elf32_hppa_relocate_section (bfd *output_bfd,
3581 struct bfd_link_info *info,
3582 bfd *input_bfd,
3583 asection *input_section,
3584 bfd_byte *contents,
3585 Elf_Internal_Rela *relocs,
3586 Elf_Internal_Sym *local_syms,
3587 asection **local_sections)
30667bf3 3588{
30667bf3 3589 bfd_vma *local_got_offsets;
83c81bfe 3590 struct elf32_hppa_link_hash_table *htab;
30667bf3 3591 Elf_Internal_Shdr *symtab_hdr;
875c0872 3592 Elf_Internal_Rela *rela;
30667bf3 3593 Elf_Internal_Rela *relend;
30667bf3
AM
3594
3595 symtab_hdr = &elf_tdata (input_bfd)->symtab_hdr;
3596
83c81bfe 3597 htab = hppa_link_hash_table (info);
4dfe6ac6
NC
3598 if (htab == NULL)
3599 return FALSE;
3600
74d1c347 3601 local_got_offsets = elf_local_got_offsets (input_bfd);
30667bf3 3602
875c0872 3603 rela = relocs;
30667bf3 3604 relend = relocs + input_section->reloc_count;
875c0872 3605 for (; rela < relend; rela++)
30667bf3
AM
3606 {
3607 unsigned int r_type;
3608 reloc_howto_type *howto;
3609 unsigned int r_symndx;
875c0872 3610 struct elf32_hppa_link_hash_entry *hh;
30667bf3
AM
3611 Elf_Internal_Sym *sym;
3612 asection *sym_sec;
3613 bfd_vma relocation;
875c0872 3614 bfd_reloc_status_type rstatus;
30667bf3 3615 const char *sym_name;
b34976b6
AM
3616 bfd_boolean plabel;
3617 bfd_boolean warned_undef;
30667bf3 3618
875c0872 3619 r_type = ELF32_R_TYPE (rela->r_info);
30667bf3
AM
3620 if (r_type >= (unsigned int) R_PARISC_UNIMPLEMENTED)
3621 {
3622 bfd_set_error (bfd_error_bad_value);
b34976b6 3623 return FALSE;
30667bf3
AM
3624 }
3625 if (r_type == (unsigned int) R_PARISC_GNU_VTENTRY
3626 || r_type == (unsigned int) R_PARISC_GNU_VTINHERIT)
3627 continue;
3628
875c0872
DA
3629 r_symndx = ELF32_R_SYM (rela->r_info);
3630 hh = NULL;
30667bf3
AM
3631 sym = NULL;
3632 sym_sec = NULL;
b34976b6 3633 warned_undef = FALSE;
30667bf3
AM
3634 if (r_symndx < symtab_hdr->sh_info)
3635 {
3636 /* This is a local symbol, h defaults to NULL. */
3637 sym = local_syms + r_symndx;
3638 sym_sec = local_sections[r_symndx];
875c0872 3639 relocation = _bfd_elf_rela_local_sym (output_bfd, sym, &sym_sec, rela);
30667bf3
AM
3640 }
3641 else
3642 {
875c0872 3643 struct elf_link_hash_entry *eh;
62d887d4 3644 bfd_boolean unresolved_reloc, ignored;
b2a8e766 3645 struct elf_link_hash_entry **sym_hashes = elf_sym_hashes (input_bfd);
560e09e9 3646
875c0872 3647 RELOC_FOR_GLOBAL_SYMBOL (info, input_bfd, input_section, rela,
b2a8e766 3648 r_symndx, symtab_hdr, sym_hashes,
875c0872 3649 eh, sym_sec, relocation,
62d887d4
L
3650 unresolved_reloc, warned_undef,
3651 ignored);
560e09e9 3652
0e1862bb 3653 if (!bfd_link_relocatable (info)
ab96bf03 3654 && relocation == 0
875c0872
DA
3655 && eh->root.type != bfd_link_hash_defined
3656 && eh->root.type != bfd_link_hash_defweak
3657 && eh->root.type != bfd_link_hash_undefweak)
4fc8051d 3658 {
59c2e50f 3659 if (info->unresolved_syms_in_objects == RM_IGNORE
875c0872
DA
3660 && ELF_ST_VISIBILITY (eh->other) == STV_DEFAULT
3661 && eh->type == STT_PARISC_MILLI)
560e09e9 3662 {
1a72702b
AM
3663 (*info->callbacks->undefined_symbol)
3664 (info, eh_name (eh), input_bfd,
3665 input_section, rela->r_offset, FALSE);
560e09e9
NC
3666 warned_undef = TRUE;
3667 }
30667bf3 3668 }
875c0872 3669 hh = hppa_elf_hash_entry (eh);
30667bf3
AM
3670 }
3671
dbaa2011 3672 if (sym_sec != NULL && discarded_section (sym_sec))
e4067dbb 3673 RELOC_AGAINST_DISCARDED_SECTION (info, input_bfd, input_section,
545fd46b
MR
3674 rela, 1, relend,
3675 elf_hppa_howto_table + r_type, 0,
e4067dbb 3676 contents);
ab96bf03 3677
0e1862bb 3678 if (bfd_link_relocatable (info))
ab96bf03
AM
3679 continue;
3680
30667bf3 3681 /* Do any required modifications to the relocation value, and
25f72752
AM
3682 determine what types of dynamic info we need to output, if
3683 any. */
74d1c347 3684 plabel = 0;
30667bf3
AM
3685 switch (r_type)
3686 {
3687 case R_PARISC_DLTIND14F:
3688 case R_PARISC_DLTIND14R:
3689 case R_PARISC_DLTIND21L:
ce757d15
AM
3690 {
3691 bfd_vma off;
d336fa6d
AM
3692 bfd_boolean do_got = FALSE;
3693 bfd_boolean reloc = bfd_link_pic (info);
ce757d15
AM
3694
3695 /* Relocation is to the entry for this symbol in the
3696 global offset table. */
875c0872 3697 if (hh != NULL)
ce757d15 3698 {
b34976b6 3699 bfd_boolean dyn;
ce757d15 3700
a63e02c7
DA
3701 off = hh->eh.got.offset;
3702 dyn = htab->etab.dynamic_sections_created;
d336fa6d
AM
3703 reloc = (!UNDEFWEAK_NO_DYNAMIC_RELOC (info, &hh->eh)
3704 && (reloc
3705 || (hh->eh.dynindx != -1
3706 && !SYMBOL_REFERENCES_LOCAL (info, &hh->eh))));
3707 if (!reloc
3708 || !WILL_CALL_FINISH_DYNAMIC_SYMBOL (dyn,
3709 bfd_link_pic (info),
3710 &hh->eh))
ce757d15
AM
3711 {
3712 /* If we aren't going to call finish_dynamic_symbol,
3713 then we need to handle initialisation of the .got
3714 entry and create needed relocs here. Since the
3715 offset must always be a multiple of 4, we use the
3716 least significant bit to record whether we have
3717 initialised it already. */
3718 if ((off & 1) != 0)
3719 off &= ~1;
3720 else
3721 {
a63e02c7 3722 hh->eh.got.offset |= 1;
d336fa6d 3723 do_got = TRUE;
ce757d15
AM
3724 }
3725 }
3726 }
3727 else
3728 {
3729 /* Local symbol case. */
3730 if (local_got_offsets == NULL)
3731 abort ();
3732
3733 off = local_got_offsets[r_symndx];
3734
3735 /* The offset must always be a multiple of 4. We use
3736 the least significant bit to record whether we have
3737 already generated the necessary reloc. */
3738 if ((off & 1) != 0)
3739 off &= ~1;
3740 else
3741 {
3742 local_got_offsets[r_symndx] |= 1;
d336fa6d 3743 do_got = TRUE;
ce757d15
AM
3744 }
3745 }
68fb2e56 3746
ce757d15
AM
3747 if (do_got)
3748 {
d336fa6d 3749 if (reloc)
ce757d15
AM
3750 {
3751 /* Output a dynamic relocation for this GOT entry.
3752 In this case it is relative to the base of the
3753 object because the symbol index is zero. */
3754 Elf_Internal_Rela outrel;
947216bf 3755 bfd_byte *loc;
ce558b89 3756 asection *sec = htab->etab.srelgot;
ce757d15
AM
3757
3758 outrel.r_offset = (off
ce558b89
AM
3759 + htab->etab.sgot->output_offset
3760 + htab->etab.sgot->output_section->vma);
ce757d15
AM
3761 outrel.r_info = ELF32_R_INFO (0, R_PARISC_DIR32);
3762 outrel.r_addend = relocation;
875c0872
DA
3763 loc = sec->contents;
3764 loc += sec->reloc_count++ * sizeof (Elf32_External_Rela);
ce757d15
AM
3765 bfd_elf32_swap_reloca_out (output_bfd, &outrel, loc);
3766 }
3767 else
30667bf3 3768 bfd_put_32 (output_bfd, relocation,
ce558b89 3769 htab->etab.sgot->contents + off);
ce757d15 3770 }
30667bf3 3771
ce757d15
AM
3772 if (off >= (bfd_vma) -2)
3773 abort ();
30667bf3 3774
ce757d15
AM
3775 /* Add the base of the GOT to the relocation value. */
3776 relocation = (off
ce558b89
AM
3777 + htab->etab.sgot->output_offset
3778 + htab->etab.sgot->output_section->vma);
ce757d15 3779 }
30667bf3 3780 break;
252b5132 3781
c46b7515
AM
3782 case R_PARISC_SEGREL32:
3783 /* If this is the first SEGREL relocation, then initialize
3784 the segment base values. */
83c81bfe
AM
3785 if (htab->text_segment_base == (bfd_vma) -1)
3786 bfd_map_over_sections (output_bfd, hppa_record_segment_addr, htab);
c46b7515
AM
3787 break;
3788
30667bf3
AM
3789 case R_PARISC_PLABEL14R:
3790 case R_PARISC_PLABEL21L:
3791 case R_PARISC_PLABEL32:
a63e02c7 3792 if (htab->etab.dynamic_sections_created)
252b5132 3793 {
ce757d15 3794 bfd_vma off;
b34976b6 3795 bfd_boolean do_plt = 0;
74d1c347
AM
3796 /* If we have a global symbol with a PLT slot, then
3797 redirect this relocation to it. */
875c0872 3798 if (hh != NULL)
74d1c347 3799 {
a63e02c7 3800 off = hh->eh.plt.offset;
0e1862bb
L
3801 if (! WILL_CALL_FINISH_DYNAMIC_SYMBOL (1,
3802 bfd_link_pic (info),
a63e02c7 3803 &hh->eh))
8dea1268 3804 {
4a7e5234 3805 /* In a non-shared link, adjust_dynamic_symbol
8dea1268 3806 isn't called for symbols forced local. We
dc810e39 3807 need to write out the plt entry here. */
8dea1268
AM
3808 if ((off & 1) != 0)
3809 off &= ~1;
3810 else
3811 {
a63e02c7 3812 hh->eh.plt.offset |= 1;
ce757d15 3813 do_plt = 1;
8dea1268
AM
3814 }
3815 }
74d1c347
AM
3816 }
3817 else
3818 {
68fb2e56
AM
3819 bfd_vma *local_plt_offsets;
3820
3821 if (local_got_offsets == NULL)
3822 abort ();
74d1c347 3823
68fb2e56
AM
3824 local_plt_offsets = local_got_offsets + symtab_hdr->sh_info;
3825 off = local_plt_offsets[r_symndx];
74d1c347
AM
3826
3827 /* As for the local .got entry case, we use the last
3828 bit to record whether we've already initialised
3829 this local .plt entry. */
3830 if ((off & 1) != 0)
3831 off &= ~1;
ce757d15
AM
3832 else
3833 {
3834 local_plt_offsets[r_symndx] |= 1;
3835 do_plt = 1;
3836 }
3837 }
3838
3839 if (do_plt)
3840 {
0e1862bb 3841 if (bfd_link_pic (info))
ce757d15
AM
3842 {
3843 /* Output a dynamic IPLT relocation for this
3844 PLT entry. */
3845 Elf_Internal_Rela outrel;
947216bf 3846 bfd_byte *loc;
ce558b89 3847 asection *s = htab->etab.srelplt;
ce757d15
AM
3848
3849 outrel.r_offset = (off
ce558b89
AM
3850 + htab->etab.splt->output_offset
3851 + htab->etab.splt->output_section->vma);
ce757d15
AM
3852 outrel.r_info = ELF32_R_INFO (0, R_PARISC_IPLT);
3853 outrel.r_addend = relocation;
947216bf
AM
3854 loc = s->contents;
3855 loc += s->reloc_count++ * sizeof (Elf32_External_Rela);
ce757d15
AM
3856 bfd_elf32_swap_reloca_out (output_bfd, &outrel, loc);
3857 }
74d1c347
AM
3858 else
3859 {
3860 bfd_put_32 (output_bfd,
3861 relocation,
ce558b89 3862 htab->etab.splt->contents + off);
74d1c347 3863 bfd_put_32 (output_bfd,
ce558b89
AM
3864 elf_gp (htab->etab.splt->output_section->owner),
3865 htab->etab.splt->contents + off + 4);
74d1c347
AM
3866 }
3867 }
3868
68fb2e56 3869 if (off >= (bfd_vma) -2)
49e9d0d3 3870 abort ();
74d1c347
AM
3871
3872 /* PLABELs contain function pointers. Relocation is to
3873 the entry for the function in the .plt. The magic +2
3874 offset signals to $$dyncall that the function pointer
3875 is in the .plt and thus has a gp pointer too.
3876 Exception: Undefined PLABELs should have a value of
3877 zero. */
875c0872 3878 if (hh == NULL
a63e02c7
DA
3879 || (hh->eh.root.type != bfd_link_hash_undefweak
3880 && hh->eh.root.type != bfd_link_hash_undefined))
74d1c347
AM
3881 {
3882 relocation = (off
ce558b89
AM
3883 + htab->etab.splt->output_offset
3884 + htab->etab.splt->output_section->vma
74d1c347
AM
3885 + 2);
3886 }
3887 plabel = 1;
30667bf3 3888 }
1a0670f3 3889 /* Fall through. */
30667bf3
AM
3890
3891 case R_PARISC_DIR17F:
3892 case R_PARISC_DIR17R:
47d89dba 3893 case R_PARISC_DIR14F:
30667bf3
AM
3894 case R_PARISC_DIR14R:
3895 case R_PARISC_DIR21L:
3896 case R_PARISC_DPREL14F:
3897 case R_PARISC_DPREL14R:
3898 case R_PARISC_DPREL21L:
3899 case R_PARISC_DIR32:
b1e24c02 3900 if ((input_section->flags & SEC_ALLOC) == 0)
ec338859
AM
3901 break;
3902
287c7eaf
AM
3903 if (bfd_link_pic (info)
3904 ? ((hh == NULL
190eb1dd 3905 || hh->eh.dyn_relocs != NULL)
287c7eaf
AM
3906 && ((hh != NULL && pc_dynrelocs (hh))
3907 || IS_ABSOLUTE_RELOC (r_type)))
3908 : (hh != NULL
190eb1dd 3909 && hh->eh.dyn_relocs != NULL))
30667bf3
AM
3910 {
3911 Elf_Internal_Rela outrel;
b34976b6 3912 bfd_boolean skip;
98ceb8ce 3913 asection *sreloc;
947216bf 3914 bfd_byte *loc;
252b5132 3915
30667bf3
AM
3916 /* When generating a shared object, these relocations
3917 are copied into the output file to be resolved at run
3918 time. */
252b5132 3919
875c0872 3920 outrel.r_addend = rela->r_addend;
c629eae0
JJ
3921 outrel.r_offset =
3922 _bfd_elf_section_offset (output_bfd, info, input_section,
875c0872 3923 rela->r_offset);
0bb2d96a
JJ
3924 skip = (outrel.r_offset == (bfd_vma) -1
3925 || outrel.r_offset == (bfd_vma) -2);
30667bf3
AM
3926 outrel.r_offset += (input_section->output_offset
3927 + input_section->output_section->vma);
68ffbac6 3928
30667bf3 3929 if (skip)
252b5132 3930 {
30667bf3 3931 memset (&outrel, 0, sizeof (outrel));
252b5132 3932 }
875c0872 3933 else if (hh != NULL
a63e02c7 3934 && hh->eh.dynindx != -1
74d1c347 3935 && (plabel
446f2863 3936 || !IS_ABSOLUTE_RELOC (r_type)
0e1862bb 3937 || !bfd_link_pic (info)
a496fbc8 3938 || !SYMBOLIC_BIND (info, &hh->eh)
a63e02c7 3939 || !hh->eh.def_regular))
252b5132 3940 {
a63e02c7 3941 outrel.r_info = ELF32_R_INFO (hh->eh.dynindx, r_type);
30667bf3
AM
3942 }
3943 else /* It's a local symbol, or one marked to become local. */
3944 {
3945 int indx = 0;
edd21aca 3946
30667bf3
AM
3947 /* Add the absolute offset of the symbol. */
3948 outrel.r_addend += relocation;
edd21aca 3949
74d1c347
AM
3950 /* Global plabels need to be processed by the
3951 dynamic linker so that functions have at most one
3952 fptr. For this reason, we need to differentiate
3953 between global and local plabels, which we do by
3954 providing the function symbol for a global plabel
3955 reloc, and no symbol for local plabels. */
3956 if (! plabel
3957 && sym_sec != NULL
30667bf3
AM
3958 && sym_sec->output_section != NULL
3959 && ! bfd_is_abs_section (sym_sec))
252b5132 3960 {
74541ad4
AM
3961 asection *osec;
3962
3963 osec = sym_sec->output_section;
3964 indx = elf_section_data (osec)->dynindx;
3965 if (indx == 0)
3966 {
3967 osec = htab->etab.text_index_section;
3968 indx = elf_section_data (osec)->dynindx;
3969 }
3970 BFD_ASSERT (indx != 0);
4b71bec0 3971
30667bf3
AM
3972 /* We are turning this relocation into one
3973 against a section symbol, so subtract out the
3974 output section's address but not the offset
3975 of the input section in the output section. */
74541ad4 3976 outrel.r_addend -= osec->vma;
252b5132 3977 }
252b5132 3978
30667bf3
AM
3979 outrel.r_info = ELF32_R_INFO (indx, r_type);
3980 }
98ceb8ce
AM
3981 sreloc = elf_section_data (input_section)->sreloc;
3982 if (sreloc == NULL)
3983 abort ();
3984
947216bf
AM
3985 loc = sreloc->contents;
3986 loc += sreloc->reloc_count++ * sizeof (Elf32_External_Rela);
98ceb8ce 3987 bfd_elf32_swap_reloca_out (output_bfd, &outrel, loc);
30667bf3
AM
3988 }
3989 break;
68ffbac6 3990
9b52905e
NC
3991 case R_PARISC_TLS_LDM21L:
3992 case R_PARISC_TLS_LDM14R:
3993 {
3994 bfd_vma off;
68ffbac6 3995
9b52905e
NC
3996 off = htab->tls_ldm_got.offset;
3997 if (off & 1)
3998 off &= ~1;
3999 else
4000 {
4001 Elf_Internal_Rela outrel;
4002 bfd_byte *loc;
4003
68ffbac6 4004 outrel.r_offset = (off
ce558b89
AM
4005 + htab->etab.sgot->output_section->vma
4006 + htab->etab.sgot->output_offset);
9b52905e
NC
4007 outrel.r_addend = 0;
4008 outrel.r_info = ELF32_R_INFO (0, R_PARISC_TLS_DTPMOD32);
ce558b89
AM
4009 loc = htab->etab.srelgot->contents;
4010 loc += htab->etab.srelgot->reloc_count++ * sizeof (Elf32_External_Rela);
9b52905e
NC
4011
4012 bfd_elf32_swap_reloca_out (output_bfd, &outrel, loc);
4013 htab->tls_ldm_got.offset |= 1;
4014 }
4015
4016 /* Add the base of the GOT to the relocation value. */
4017 relocation = (off
ce558b89
AM
4018 + htab->etab.sgot->output_offset
4019 + htab->etab.sgot->output_section->vma);
9b52905e
NC
4020
4021 break;
4022 }
4023
4024 case R_PARISC_TLS_LDO21L:
4025 case R_PARISC_TLS_LDO14R:
4026 relocation -= dtpoff_base (info);
4027 break;
4028
4029 case R_PARISC_TLS_GD21L:
4030 case R_PARISC_TLS_GD14R:
4031 case R_PARISC_TLS_IE21L:
4032 case R_PARISC_TLS_IE14R:
4033 {
4034 bfd_vma off;
4035 int indx;
4036 char tls_type;
4037
4038 indx = 0;
4039 if (hh != NULL)
4040 {
2e684e75
AM
4041 if (!htab->etab.dynamic_sections_created
4042 || hh->eh.dynindx == -1
4043 || SYMBOL_REFERENCES_LOCAL (info, &hh->eh)
4044 || UNDEFWEAK_NO_DYNAMIC_RELOC (info, &hh->eh))
4045 /* This is actually a static link, or it is a
4046 -Bsymbolic link and the symbol is defined
4047 locally, or the symbol was forced to be local
4048 because of a version file. */
4049 ;
4050 else
4051 indx = hh->eh.dynindx;
9b52905e
NC
4052 off = hh->eh.got.offset;
4053 tls_type = hh->tls_type;
4054 }
4055 else
4056 {
4057 off = local_got_offsets[r_symndx];
4058 tls_type = hppa_elf_local_got_tls_type (input_bfd)[r_symndx];
4059 }
4060
4061 if (tls_type == GOT_UNKNOWN)
4062 abort ();
4063
4064 if ((off & 1) != 0)
4065 off &= ~1;
4066 else
4067 {
4068 bfd_boolean need_relocs = FALSE;
4069 Elf_Internal_Rela outrel;
4070 bfd_byte *loc = NULL;
4071 int cur_off = off;
4072
07d6d2b8
AM
4073 /* The GOT entries have not been initialized yet. Do it
4074 now, and emit any relocations. If both an IE GOT and a
4075 GD GOT are necessary, we emit the GD first. */
9b52905e 4076
2e684e75 4077 if (indx != 0
4352556b 4078 || (bfd_link_dll (info)
2e684e75
AM
4079 && (hh == NULL
4080 || !UNDEFWEAK_NO_DYNAMIC_RELOC (info, &hh->eh))))
9b52905e
NC
4081 {
4082 need_relocs = TRUE;
ce558b89 4083 loc = htab->etab.srelgot->contents;
2e684e75
AM
4084 loc += (htab->etab.srelgot->reloc_count
4085 * sizeof (Elf32_External_Rela));
9b52905e
NC
4086 }
4087
4088 if (tls_type & GOT_TLS_GD)
4089 {
4090 if (need_relocs)
4091 {
2e684e75
AM
4092 outrel.r_offset
4093 = (cur_off
4094 + htab->etab.sgot->output_section->vma
4095 + htab->etab.sgot->output_offset);
4096 outrel.r_info
4097 = ELF32_R_INFO (indx, R_PARISC_TLS_DTPMOD32);
9b52905e 4098 outrel.r_addend = 0;
9b52905e 4099 bfd_elf32_swap_reloca_out (output_bfd, &outrel, loc);
ce558b89 4100 htab->etab.srelgot->reloc_count++;
9b52905e 4101 loc += sizeof (Elf32_External_Rela);
4352556b
AM
4102 bfd_put_32 (output_bfd, 0,
4103 htab->etab.sgot->contents + cur_off);
4104 }
4105 else
4106 /* If we are not emitting relocations for a
4107 general dynamic reference, then we must be in a
4108 static link or an executable link with the
4109 symbol binding locally. Mark it as belonging
4110 to module 1, the executable. */
4111 bfd_put_32 (output_bfd, 1,
4112 htab->etab.sgot->contents + cur_off);
4113
4114 if (indx != 0)
4115 {
2e684e75
AM
4116 outrel.r_info
4117 = ELF32_R_INFO (indx, R_PARISC_TLS_DTPOFF32);
4118 outrel.r_offset += 4;
4119 bfd_elf32_swap_reloca_out (output_bfd, &outrel, loc);
4120 htab->etab.srelgot->reloc_count++;
4121 loc += sizeof (Elf32_External_Rela);
2e684e75
AM
4122 bfd_put_32 (output_bfd, 0,
4123 htab->etab.sgot->contents + cur_off + 4);
9b52905e
NC
4124 }
4125 else
4352556b
AM
4126 bfd_put_32 (output_bfd, relocation - dtpoff_base (info),
4127 htab->etab.sgot->contents + cur_off + 4);
9b52905e
NC
4128 cur_off += 8;
4129 }
4130
4131 if (tls_type & GOT_TLS_IE)
4132 {
2e684e75
AM
4133 if (need_relocs
4134 && !(bfd_link_executable (info)
4135 && SYMBOL_REFERENCES_LOCAL (info, &hh->eh)))
9b52905e 4136 {
2e684e75
AM
4137 outrel.r_offset
4138 = (cur_off
4139 + htab->etab.sgot->output_section->vma
4140 + htab->etab.sgot->output_offset);
4141 outrel.r_info = ELF32_R_INFO (indx,
4142 R_PARISC_TLS_TPREL32);
9b52905e
NC
4143 if (indx == 0)
4144 outrel.r_addend = relocation - dtpoff_base (info);
4145 else
4146 outrel.r_addend = 0;
9b52905e 4147 bfd_elf32_swap_reloca_out (output_bfd, &outrel, loc);
ce558b89 4148 htab->etab.srelgot->reloc_count++;
9b52905e
NC
4149 loc += sizeof (Elf32_External_Rela);
4150 }
4151 else
4152 bfd_put_32 (output_bfd, tpoff (info, relocation),
ce558b89 4153 htab->etab.sgot->contents + cur_off);
9b52905e
NC
4154 cur_off += 4;
4155 }
4156
4157 if (hh != NULL)
4158 hh->eh.got.offset |= 1;
4159 else
4160 local_got_offsets[r_symndx] |= 1;
4161 }
4162
2e684e75
AM
4163 if ((tls_type & GOT_NORMAL) != 0
4164 && (tls_type & (GOT_TLS_GD | GOT_TLS_LDM | GOT_TLS_IE)) != 0)
4165 {
4166 if (hh != NULL)
4167 _bfd_error_handler (_("%s has both normal and TLS relocs"),
4168 hh_name (hh));
4169 else
4170 {
4171 Elf_Internal_Sym *isym
4172 = bfd_sym_from_r_symndx (&htab->sym_cache,
4173 input_bfd, r_symndx);
4174 if (isym == NULL)
4175 return FALSE;
4176 sym_name
4177 = bfd_elf_string_from_elf_section (input_bfd,
4178 symtab_hdr->sh_link,
4179 isym->st_name);
4180 if (sym_name == NULL)
4181 return FALSE;
4182 if (*sym_name == '\0')
fd361982 4183 sym_name = bfd_section_name (sym_sec);
2e684e75 4184 _bfd_error_handler
871b3ab2 4185 (_("%pB:%s has both normal and TLS relocs"),
2e684e75
AM
4186 input_bfd, sym_name);
4187 }
4188 bfd_set_error (bfd_error_bad_value);
4189 return FALSE;
4190 }
4191
9b52905e 4192 if ((tls_type & GOT_TLS_GD)
07d6d2b8
AM
4193 && r_type != R_PARISC_TLS_GD21L
4194 && r_type != R_PARISC_TLS_GD14R)
9b52905e
NC
4195 off += 2 * GOT_ENTRY_SIZE;
4196
4197 /* Add the base of the GOT to the relocation value. */
4198 relocation = (off
ce558b89
AM
4199 + htab->etab.sgot->output_offset
4200 + htab->etab.sgot->output_section->vma);
9b52905e
NC
4201
4202 break;
4203 }
4204
4205 case R_PARISC_TLS_LE21L:
4206 case R_PARISC_TLS_LE14R:
4207 {
4208 relocation = tpoff (info, relocation);
4209 break;
4210 }
4211 break;
edd21aca 4212
30667bf3
AM
4213 default:
4214 break;
4215 }
252b5132 4216
875c0872
DA
4217 rstatus = final_link_relocate (input_section, contents, rela, relocation,
4218 htab, sym_sec, hh, info);
252b5132 4219
875c0872 4220 if (rstatus == bfd_reloc_ok)
30667bf3 4221 continue;
252b5132 4222
875c0872 4223 if (hh != NULL)
9b52905e 4224 sym_name = hh_name (hh);
30667bf3
AM
4225 else
4226 {
4227 sym_name = bfd_elf_string_from_elf_section (input_bfd,
4228 symtab_hdr->sh_link,
4229 sym->st_name);
4230 if (sym_name == NULL)
b34976b6 4231 return FALSE;
30667bf3 4232 if (*sym_name == '\0')
fd361982 4233 sym_name = bfd_section_name (sym_sec);
30667bf3 4234 }
edd21aca 4235
30667bf3 4236 howto = elf_hppa_howto_table + r_type;
252b5132 4237
875c0872 4238 if (rstatus == bfd_reloc_undefined || rstatus == bfd_reloc_notsupported)
30667bf3 4239 {
875c0872 4240 if (rstatus == bfd_reloc_notsupported || !warned_undef)
f09ebc7d 4241 {
4eca0228 4242 _bfd_error_handler
695344c0 4243 /* xgettext:c-format */
2dcf00ce 4244 (_("%pB(%pA+%#" PRIx64 "): cannot handle %s for %s"),
d003868e
AM
4245 input_bfd,
4246 input_section,
2dcf00ce 4247 (uint64_t) rela->r_offset,
f09ebc7d
AM
4248 howto->name,
4249 sym_name);
4250 bfd_set_error (bfd_error_bad_value);
b34976b6 4251 return FALSE;
f09ebc7d 4252 }
30667bf3
AM
4253 }
4254 else
1a72702b
AM
4255 (*info->callbacks->reloc_overflow)
4256 (info, (hh ? &hh->eh.root : NULL), sym_name, howto->name,
4257 (bfd_vma) 0, input_bfd, input_section, rela->r_offset);
30667bf3 4258 }
edd21aca 4259
b34976b6 4260 return TRUE;
30667bf3 4261}
252b5132 4262
30667bf3
AM
4263/* Finish up dynamic symbol handling. We set the contents of various
4264 dynamic sections here. */
252b5132 4265
b34976b6 4266static bfd_boolean
c39a58e6
AM
4267elf32_hppa_finish_dynamic_symbol (bfd *output_bfd,
4268 struct bfd_link_info *info,
875c0872 4269 struct elf_link_hash_entry *eh,
c39a58e6 4270 Elf_Internal_Sym *sym)
30667bf3 4271{
83c81bfe 4272 struct elf32_hppa_link_hash_table *htab;
875c0872 4273 Elf_Internal_Rela rela;
a252afa4 4274 bfd_byte *loc;
edd21aca 4275
83c81bfe 4276 htab = hppa_link_hash_table (info);
4dfe6ac6
NC
4277 if (htab == NULL)
4278 return FALSE;
30667bf3 4279
875c0872 4280 if (eh->plt.offset != (bfd_vma) -1)
30667bf3
AM
4281 {
4282 bfd_vma value;
30667bf3 4283
875c0872 4284 if (eh->plt.offset & 1)
8dea1268
AM
4285 abort ();
4286
30667bf3
AM
4287 /* This symbol has an entry in the procedure linkage table. Set
4288 it up.
4289
4290 The format of a plt entry is
74d1c347
AM
4291 <funcaddr>
4292 <__gp>
47d89dba 4293 */
30667bf3 4294 value = 0;
875c0872
DA
4295 if (eh->root.type == bfd_link_hash_defined
4296 || eh->root.type == bfd_link_hash_defweak)
30667bf3 4297 {
875c0872
DA
4298 value = eh->root.u.def.value;
4299 if (eh->root.u.def.section->output_section != NULL)
4300 value += (eh->root.u.def.section->output_offset
4301 + eh->root.u.def.section->output_section->vma);
252b5132 4302 }
edd21aca 4303
a252afa4 4304 /* Create a dynamic IPLT relocation for this entry. */
875c0872 4305 rela.r_offset = (eh->plt.offset
ce558b89
AM
4306 + htab->etab.splt->output_offset
4307 + htab->etab.splt->output_section->vma);
875c0872 4308 if (eh->dynindx != -1)
30667bf3 4309 {
875c0872
DA
4310 rela.r_info = ELF32_R_INFO (eh->dynindx, R_PARISC_IPLT);
4311 rela.r_addend = 0;
30667bf3 4312 }
ce757d15 4313 else
47d89dba 4314 {
a252afa4
DA
4315 /* This symbol has been marked to become local, and is
4316 used by a plabel so must be kept in the .plt. */
875c0872
DA
4317 rela.r_info = ELF32_R_INFO (0, R_PARISC_IPLT);
4318 rela.r_addend = value;
47d89dba
AM
4319 }
4320
ce558b89
AM
4321 loc = htab->etab.srelplt->contents;
4322 loc += htab->etab.srelplt->reloc_count++ * sizeof (Elf32_External_Rela);
4323 bfd_elf32_swap_reloca_out (htab->etab.splt->output_section->owner, &rela, loc);
a252afa4 4324
875c0872 4325 if (!eh->def_regular)
30667bf3
AM
4326 {
4327 /* Mark the symbol as undefined, rather than as defined in
4328 the .plt section. Leave the value alone. */
4329 sym->st_shndx = SHN_UNDEF;
4330 }
4331 }
edd21aca 4332
9b52905e 4333 if (eh->got.offset != (bfd_vma) -1
2e684e75 4334 && (hppa_elf_hash_entry (eh)->tls_type & GOT_NORMAL) != 0
d336fa6d 4335 && !UNDEFWEAK_NO_DYNAMIC_RELOC (info, eh))
30667bf3 4336 {
d336fa6d
AM
4337 bfd_boolean is_dyn = (eh->dynindx != -1
4338 && !SYMBOL_REFERENCES_LOCAL (info, eh));
4339
4340 if (is_dyn || bfd_link_pic (info))
30667bf3 4341 {
d336fa6d
AM
4342 /* This symbol has an entry in the global offset table. Set
4343 it up. */
4344
4345 rela.r_offset = ((eh->got.offset &~ (bfd_vma) 1)
4346 + htab->etab.sgot->output_offset
4347 + htab->etab.sgot->output_section->vma);
4348
4349 /* If this is a -Bsymbolic link and the symbol is defined
4350 locally or was forced to be local because of a version
4351 file, we just want to emit a RELATIVE reloc. The entry
4352 in the global offset table will already have been
4353 initialized in the relocate_section function. */
4354 if (!is_dyn)
4355 {
4356 rela.r_info = ELF32_R_INFO (0, R_PARISC_DIR32);
4357 rela.r_addend = (eh->root.u.def.value
4358 + eh->root.u.def.section->output_offset
4359 + eh->root.u.def.section->output_section->vma);
4360 }
4361 else
4362 {
4363 if ((eh->got.offset & 1) != 0)
4364 abort ();
875c0872 4365
d336fa6d
AM
4366 bfd_put_32 (output_bfd, 0,
4367 htab->etab.sgot->contents + (eh->got.offset & ~1));
4368 rela.r_info = ELF32_R_INFO (eh->dynindx, R_PARISC_DIR32);
4369 rela.r_addend = 0;
4370 }
edd21aca 4371
d336fa6d
AM
4372 loc = htab->etab.srelgot->contents;
4373 loc += (htab->etab.srelgot->reloc_count++
4374 * sizeof (Elf32_External_Rela));
4375 bfd_elf32_swap_reloca_out (output_bfd, &rela, loc);
4376 }
30667bf3 4377 }
edd21aca 4378
875c0872 4379 if (eh->needs_copy)
30667bf3 4380 {
875c0872 4381 asection *sec;
30667bf3
AM
4382
4383 /* This symbol needs a copy reloc. Set it up. */
4384
875c0872
DA
4385 if (! (eh->dynindx != -1
4386 && (eh->root.type == bfd_link_hash_defined
4387 || eh->root.type == bfd_link_hash_defweak)))
49e9d0d3 4388 abort ();
30667bf3 4389
875c0872
DA
4390 rela.r_offset = (eh->root.u.def.value
4391 + eh->root.u.def.section->output_offset
4392 + eh->root.u.def.section->output_section->vma);
4393 rela.r_addend = 0;
4394 rela.r_info = ELF32_R_INFO (eh->dynindx, R_PARISC_COPY);
afbf7e8e 4395 if (eh->root.u.def.section == htab->etab.sdynrelro)
5474d94f
AM
4396 sec = htab->etab.sreldynrelro;
4397 else
4398 sec = htab->etab.srelbss;
875c0872
DA
4399 loc = sec->contents + sec->reloc_count++ * sizeof (Elf32_External_Rela);
4400 bfd_elf32_swap_reloca_out (output_bfd, &rela, loc);
30667bf3
AM
4401 }
4402
4403 /* Mark _DYNAMIC and _GLOBAL_OFFSET_TABLE_ as absolute. */
9637f6ef 4404 if (eh == htab->etab.hdynamic || eh == htab->etab.hgot)
30667bf3
AM
4405 {
4406 sym->st_shndx = SHN_ABS;
4407 }
4408
b34976b6 4409 return TRUE;
30667bf3
AM
4410}
4411
98ceb8ce
AM
4412/* Used to decide how to sort relocs in an optimal manner for the
4413 dynamic linker, before writing them out. */
4414
4415static enum elf_reloc_type_class
7e612e98
AM
4416elf32_hppa_reloc_type_class (const struct bfd_link_info *info ATTRIBUTE_UNUSED,
4417 const asection *rel_sec ATTRIBUTE_UNUSED,
4418 const Elf_Internal_Rela *rela)
98ceb8ce 4419{
9b52905e 4420 /* Handle TLS relocs first; we don't want them to be marked
cf35638d 4421 relative by the "if (ELF32_R_SYM (rela->r_info) == STN_UNDEF)"
9b52905e
NC
4422 check below. */
4423 switch ((int) ELF32_R_TYPE (rela->r_info))
4424 {
4425 case R_PARISC_TLS_DTPMOD32:
4426 case R_PARISC_TLS_DTPOFF32:
4427 case R_PARISC_TLS_TPREL32:
07d6d2b8 4428 return reloc_class_normal;
9b52905e
NC
4429 }
4430
cf35638d 4431 if (ELF32_R_SYM (rela->r_info) == STN_UNDEF)
98ceb8ce
AM
4432 return reloc_class_relative;
4433
4434 switch ((int) ELF32_R_TYPE (rela->r_info))
4435 {
4436 case R_PARISC_IPLT:
4437 return reloc_class_plt;
4438 case R_PARISC_COPY:
4439 return reloc_class_copy;
4440 default:
4441 return reloc_class_normal;
4442 }
4443}
4444
30667bf3
AM
4445/* Finish up the dynamic sections. */
4446
b34976b6 4447static bfd_boolean
c39a58e6
AM
4448elf32_hppa_finish_dynamic_sections (bfd *output_bfd,
4449 struct bfd_link_info *info)
30667bf3
AM
4450{
4451 bfd *dynobj;
83c81bfe 4452 struct elf32_hppa_link_hash_table *htab;
30667bf3 4453 asection *sdyn;
894891db 4454 asection * sgot;
30667bf3 4455
83c81bfe 4456 htab = hppa_link_hash_table (info);
4dfe6ac6
NC
4457 if (htab == NULL)
4458 return FALSE;
4459
a63e02c7 4460 dynobj = htab->etab.dynobj;
30667bf3 4461
ce558b89 4462 sgot = htab->etab.sgot;
894891db
NC
4463 /* A broken linker script might have discarded the dynamic sections.
4464 Catch this here so that we do not seg-fault later on. */
4465 if (sgot != NULL && bfd_is_abs_section (sgot->output_section))
4466 return FALSE;
4467
3d4d4302 4468 sdyn = bfd_get_linker_section (dynobj, ".dynamic");
30667bf3 4469
a63e02c7 4470 if (htab->etab.dynamic_sections_created)
30667bf3
AM
4471 {
4472 Elf32_External_Dyn *dyncon, *dynconend;
4473
49e9d0d3
AM
4474 if (sdyn == NULL)
4475 abort ();
30667bf3
AM
4476
4477 dyncon = (Elf32_External_Dyn *) sdyn->contents;
eea6121a 4478 dynconend = (Elf32_External_Dyn *) (sdyn->contents + sdyn->size);
30667bf3 4479 for (; dyncon < dynconend; dyncon++)
edd21aca 4480 {
30667bf3
AM
4481 Elf_Internal_Dyn dyn;
4482 asection *s;
4483
4484 bfd_elf32_swap_dyn_in (dynobj, dyncon, &dyn);
4485
4486 switch (dyn.d_tag)
4487 {
4488 default:
3ac8354b 4489 continue;
30667bf3
AM
4490
4491 case DT_PLTGOT:
4492 /* Use PLTGOT to set the GOT register. */
4493 dyn.d_un.d_ptr = elf_gp (output_bfd);
30667bf3
AM
4494 break;
4495
4496 case DT_JMPREL:
ce558b89 4497 s = htab->etab.srelplt;
30667bf3 4498 dyn.d_un.d_ptr = s->output_section->vma + s->output_offset;
30667bf3
AM
4499 break;
4500
4501 case DT_PLTRELSZ:
ce558b89 4502 s = htab->etab.srelplt;
eea6121a 4503 dyn.d_un.d_val = s->size;
30667bf3
AM
4504 break;
4505 }
3ac8354b
AM
4506
4507 bfd_elf32_swap_dyn_out (output_bfd, &dyn, dyncon);
edd21aca 4508 }
252b5132 4509 }
edd21aca 4510
894891db 4511 if (sgot != NULL && sgot->size != 0)
30667bf3 4512 {
74d1c347
AM
4513 /* Fill in the first entry in the global offset table.
4514 We use it to point to our dynamic section, if we have one. */
30667bf3 4515 bfd_put_32 (output_bfd,
c39a58e6 4516 sdyn ? sdyn->output_section->vma + sdyn->output_offset : 0,
894891db 4517 sgot->contents);
30667bf3 4518
74d1c347 4519 /* The second entry is reserved for use by the dynamic linker. */
894891db 4520 memset (sgot->contents + GOT_ENTRY_SIZE, 0, GOT_ENTRY_SIZE);
74d1c347 4521
30667bf3 4522 /* Set .got entry size. */
894891db 4523 elf_section_data (sgot->output_section)
74d1c347 4524 ->this_hdr.sh_entsize = GOT_ENTRY_SIZE;
30667bf3
AM
4525 }
4526
ce558b89 4527 if (htab->etab.splt != NULL && htab->etab.splt->size != 0)
47d89dba 4528 {
f3c3938c
JDA
4529 /* Set plt entry size to 0 instead of PLT_ENTRY_SIZE, since we add the
4530 plt stubs and as such the section does not hold a table of fixed-size
4531 entries. */
ce558b89 4532 elf_section_data (htab->etab.splt->output_section)->this_hdr.sh_entsize = 0;
47d89dba 4533
83c81bfe 4534 if (htab->need_plt_stub)
47d89dba
AM
4535 {
4536 /* Set up the .plt stub. */
ce558b89
AM
4537 memcpy (htab->etab.splt->contents
4538 + htab->etab.splt->size - sizeof (plt_stub),
47d89dba
AM
4539 plt_stub, sizeof (plt_stub));
4540
ce558b89
AM
4541 if ((htab->etab.splt->output_offset
4542 + htab->etab.splt->output_section->vma
4543 + htab->etab.splt->size)
894891db
NC
4544 != (sgot->output_offset
4545 + sgot->output_section->vma))
47d89dba 4546 {
4eca0228 4547 _bfd_error_handler
47d89dba 4548 (_(".got section not immediately after .plt section"));
b34976b6 4549 return FALSE;
47d89dba
AM
4550 }
4551 }
4552 }
30667bf3 4553
b34976b6 4554 return TRUE;
30667bf3 4555}
252b5132 4556
30667bf3
AM
4557/* Called when writing out an object file to decide the type of a
4558 symbol. */
4559static int
c39a58e6 4560elf32_hppa_elf_get_symbol_type (Elf_Internal_Sym *elf_sym, int type)
30667bf3
AM
4561{
4562 if (ELF_ST_TYPE (elf_sym->st_info) == STT_PARISC_MILLI)
4563 return STT_PARISC_MILLI;
4564 else
4565 return type;
252b5132
RH
4566}
4567
4568/* Misc BFD support code. */
30667bf3
AM
4569#define bfd_elf32_bfd_is_local_label_name elf_hppa_is_local_label_name
4570#define bfd_elf32_bfd_reloc_type_lookup elf_hppa_reloc_type_lookup
0c8d6e5c 4571#define bfd_elf32_bfd_reloc_name_lookup elf_hppa_reloc_name_lookup
30667bf3
AM
4572#define elf_info_to_howto elf_hppa_info_to_howto
4573#define elf_info_to_howto_rel elf_hppa_info_to_howto_rel
252b5132 4574
252b5132 4575/* Stuff for the BFD linker. */
c46b7515 4576#define bfd_elf32_bfd_final_link elf32_hppa_final_link
30667bf3 4577#define bfd_elf32_bfd_link_hash_table_create elf32_hppa_link_hash_table_create
30667bf3 4578#define elf_backend_adjust_dynamic_symbol elf32_hppa_adjust_dynamic_symbol
ebe50bae 4579#define elf_backend_copy_indirect_symbol elf32_hppa_copy_indirect_symbol
30667bf3 4580#define elf_backend_check_relocs elf32_hppa_check_relocs
c0e331c7 4581#define elf_backend_relocs_compatible _bfd_elf_relocs_compatible
30667bf3
AM
4582#define elf_backend_create_dynamic_sections elf32_hppa_create_dynamic_sections
4583#define elf_backend_fake_sections elf_hppa_fake_sections
4584#define elf_backend_relocate_section elf32_hppa_relocate_section
74d1c347 4585#define elf_backend_hide_symbol elf32_hppa_hide_symbol
30667bf3
AM
4586#define elf_backend_finish_dynamic_symbol elf32_hppa_finish_dynamic_symbol
4587#define elf_backend_finish_dynamic_sections elf32_hppa_finish_dynamic_sections
4588#define elf_backend_size_dynamic_sections elf32_hppa_size_dynamic_sections
74541ad4 4589#define elf_backend_init_index_section _bfd_elf_init_1_index_section
30667bf3 4590#define elf_backend_gc_mark_hook elf32_hppa_gc_mark_hook
edfc032f
AM
4591#define elf_backend_grok_prstatus elf32_hppa_grok_prstatus
4592#define elf_backend_grok_psinfo elf32_hppa_grok_psinfo
30667bf3
AM
4593#define elf_backend_object_p elf32_hppa_object_p
4594#define elf_backend_final_write_processing elf_hppa_final_write_processing
4595#define elf_backend_get_symbol_type elf32_hppa_elf_get_symbol_type
98ceb8ce 4596#define elf_backend_reloc_type_class elf32_hppa_reloc_type_class
8a696751 4597#define elf_backend_action_discarded elf_hppa_action_discarded
30667bf3
AM
4598
4599#define elf_backend_can_gc_sections 1
51b64d56 4600#define elf_backend_can_refcount 1
30667bf3
AM
4601#define elf_backend_plt_alignment 2
4602#define elf_backend_want_got_plt 0
4603#define elf_backend_plt_readonly 0
4604#define elf_backend_want_plt_sym 0
74d1c347 4605#define elf_backend_got_header_size 8
5474d94f 4606#define elf_backend_want_dynrelro 1
f0fe0e16 4607#define elf_backend_rela_normal 1
64f52338 4608#define elf_backend_dtrel_excludes_plt 1
a8c75b76 4609#define elf_backend_no_page_alias 1
252b5132 4610
6d00b590 4611#define TARGET_BIG_SYM hppa_elf32_vec
252b5132
RH
4612#define TARGET_BIG_NAME "elf32-hppa"
4613#define ELF_ARCH bfd_arch_hppa
ae95ffa6 4614#define ELF_TARGET_ID HPPA32_ELF_DATA
252b5132
RH
4615#define ELF_MACHINE_CODE EM_PARISC
4616#define ELF_MAXPAGESIZE 0x1000
d1036acb 4617#define ELF_OSABI ELFOSABI_HPUX
914dfb0f 4618#define elf32_bed elf32_hppa_hpux_bed
252b5132
RH
4619
4620#include "elf32-target.h"
d952f17a
AM
4621
4622#undef TARGET_BIG_SYM
6d00b590 4623#define TARGET_BIG_SYM hppa_elf32_linux_vec
d952f17a 4624#undef TARGET_BIG_NAME
914dfb0f 4625#define TARGET_BIG_NAME "elf32-hppa-linux"
d1036acb 4626#undef ELF_OSABI
9c55345c 4627#define ELF_OSABI ELFOSABI_GNU
914dfb0f
DA
4628#undef elf32_bed
4629#define elf32_bed elf32_hppa_linux_bed
d952f17a 4630
d952f17a 4631#include "elf32-target.h"
225247f0
JT
4632
4633#undef TARGET_BIG_SYM
6d00b590 4634#define TARGET_BIG_SYM hppa_elf32_nbsd_vec
225247f0 4635#undef TARGET_BIG_NAME
914dfb0f 4636#define TARGET_BIG_NAME "elf32-hppa-netbsd"
d1036acb
L
4637#undef ELF_OSABI
4638#define ELF_OSABI ELFOSABI_NETBSD
914dfb0f
DA
4639#undef elf32_bed
4640#define elf32_bed elf32_hppa_netbsd_bed
225247f0
JT
4641
4642#include "elf32-target.h"
This page took 3.471004 seconds and 4 git commands to generate.