Updated translations
[deliverable/binutils-gdb.git] / bfd / elf64-hppa.c
CommitLineData
b352eebf 1/* Support for HPPA 64-bit ELF
ae9a127f 2 Copyright 1999, 2000, 2001, 2002, 2003 Free Software Foundation, Inc.
15bda425 3
ae9a127f 4 This file is part of BFD, the Binary File Descriptor library.
15bda425 5
ae9a127f
NC
6 This program is free software; you can redistribute it and/or modify
7 it under the terms of the GNU General Public License as published by
8 the Free Software Foundation; either version 2 of the License, or
9 (at your option) any later version.
15bda425 10
ae9a127f
NC
11 This program is distributed in the hope that it will be useful,
12 but WITHOUT ANY WARRANTY; without even the implied warranty of
13 MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
14 GNU General Public License for more details.
15bda425 15
ae9a127f
NC
16 You should have received a copy of the GNU General Public License
17 along with this program; if not, write to the Free Software
18 Foundation, Inc., 59 Temple Place - Suite 330, Boston, MA 02111-1307, USA. */
15bda425 19
3ef20aaa 20#include "alloca-conf.h"
15bda425
JL
21#include "bfd.h"
22#include "sysdep.h"
23#include "libbfd.h"
24#include "elf-bfd.h"
25#include "elf/hppa.h"
26#include "libhppa.h"
27#include "elf64-hppa.h"
28#define ARCH_SIZE 64
29
30#define PLT_ENTRY_SIZE 0x10
31#define DLT_ENTRY_SIZE 0x8
32#define OPD_ENTRY_SIZE 0x20
fe8bc63d 33
15bda425
JL
34#define ELF_DYNAMIC_INTERPRETER "/usr/lib/pa20_64/dld.sl"
35
36/* The stub is supposed to load the target address and target's DP
37 value out of the PLT, then do an external branch to the target
38 address.
39
40 LDD PLTOFF(%r27),%r1
41 BVE (%r1)
42 LDD PLTOFF+8(%r27),%r27
43
44 Note that we must use the LDD with a 14 bit displacement, not the one
45 with a 5 bit displacement. */
46static char plt_stub[] = {0x53, 0x61, 0x00, 0x00, 0xe8, 0x20, 0xd0, 0x00,
47 0x53, 0x7b, 0x00, 0x00 };
48
49struct elf64_hppa_dyn_hash_entry
50{
51 struct bfd_hash_entry root;
52
53 /* Offsets for this symbol in various linker sections. */
54 bfd_vma dlt_offset;
55 bfd_vma plt_offset;
56 bfd_vma opd_offset;
57 bfd_vma stub_offset;
58
edd21aca 59 /* The symbol table entry, if any, that this was derived from. */
15bda425
JL
60 struct elf_link_hash_entry *h;
61
62 /* The index of the (possibly local) symbol in the input bfd and its
63 associated BFD. Needed so that we can have relocs against local
64 symbols in shared libraries. */
dc810e39 65 long sym_indx;
15bda425
JL
66 bfd *owner;
67
68 /* Dynamic symbols may need to have two different values. One for
69 the dynamic symbol table, one for the normal symbol table.
70
71 In such cases we store the symbol's real value and section
72 index here so we can restore the real value before we write
73 the normal symbol table. */
74 bfd_vma st_value;
75 int st_shndx;
76
77 /* Used to count non-got, non-plt relocations for delayed sizing
78 of relocation sections. */
79 struct elf64_hppa_dyn_reloc_entry
80 {
81 /* Next relocation in the chain. */
82 struct elf64_hppa_dyn_reloc_entry *next;
83
84 /* The type of the relocation. */
85 int type;
86
87 /* The input section of the relocation. */
88 asection *sec;
89
90 /* The index of the section symbol for the input section of
91 the relocation. Only needed when building shared libraries. */
92 int sec_symndx;
93
94 /* The offset within the input section of the relocation. */
95 bfd_vma offset;
96
97 /* The addend for the relocation. */
98 bfd_vma addend;
99
100 } *reloc_entries;
101
102 /* Nonzero if this symbol needs an entry in one of the linker
103 sections. */
104 unsigned want_dlt;
105 unsigned want_plt;
106 unsigned want_opd;
107 unsigned want_stub;
108};
109
110struct elf64_hppa_dyn_hash_table
111{
112 struct bfd_hash_table root;
113};
114
115struct elf64_hppa_link_hash_table
116{
117 struct elf_link_hash_table root;
118
119 /* Shortcuts to get to the various linker defined sections. */
120 asection *dlt_sec;
121 asection *dlt_rel_sec;
122 asection *plt_sec;
123 asection *plt_rel_sec;
124 asection *opd_sec;
125 asection *opd_rel_sec;
126 asection *other_rel_sec;
127
128 /* Offset of __gp within .plt section. When the PLT gets large we want
129 to slide __gp into the PLT section so that we can continue to use
130 single DP relative instructions to load values out of the PLT. */
131 bfd_vma gp_offset;
132
133 /* Note this is not strictly correct. We should create a stub section for
134 each input section with calls. The stub section should be placed before
135 the section with the call. */
136 asection *stub_sec;
137
138 bfd_vma text_segment_base;
139 bfd_vma data_segment_base;
140
141 struct elf64_hppa_dyn_hash_table dyn_hash_table;
142
143 /* We build tables to map from an input section back to its
144 symbol index. This is the BFD for which we currently have
145 a map. */
146 bfd *section_syms_bfd;
147
148 /* Array of symbol numbers for each input section attached to the
149 current BFD. */
150 int *section_syms;
151};
152
153#define elf64_hppa_hash_table(p) \
154 ((struct elf64_hppa_link_hash_table *) ((p)->hash))
155
156typedef struct bfd_hash_entry *(*new_hash_entry_func)
157 PARAMS ((struct bfd_hash_entry *, struct bfd_hash_table *, const char *));
158
b34976b6 159static bfd_boolean elf64_hppa_dyn_hash_table_init
15bda425
JL
160 PARAMS ((struct elf64_hppa_dyn_hash_table *ht, bfd *abfd,
161 new_hash_entry_func new));
162static struct bfd_hash_entry *elf64_hppa_new_dyn_hash_entry
163 PARAMS ((struct bfd_hash_entry *entry, struct bfd_hash_table *table,
164 const char *string));
165static struct bfd_link_hash_table *elf64_hppa_hash_table_create
166 PARAMS ((bfd *abfd));
167static struct elf64_hppa_dyn_hash_entry *elf64_hppa_dyn_hash_lookup
168 PARAMS ((struct elf64_hppa_dyn_hash_table *table, const char *string,
b34976b6 169 bfd_boolean create, bfd_boolean copy));
15bda425
JL
170static void elf64_hppa_dyn_hash_traverse
171 PARAMS ((struct elf64_hppa_dyn_hash_table *table,
b34976b6 172 bfd_boolean (*func) (struct elf64_hppa_dyn_hash_entry *, PTR),
15bda425
JL
173 PTR info));
174
175static const char *get_dyn_name
0ba2a60e
AM
176 PARAMS ((asection *, struct elf_link_hash_entry *,
177 const Elf_Internal_Rela *, char **, size_t *));
15bda425 178
15bda425
JL
179/* This must follow the definitions of the various derived linker
180 hash tables and shared functions. */
181#include "elf-hppa.h"
182
b34976b6 183static bfd_boolean elf64_hppa_object_p
15bda425
JL
184 PARAMS ((bfd *));
185
b34976b6 186static bfd_boolean elf64_hppa_section_from_shdr
947216bf 187 PARAMS ((bfd *, Elf_Internal_Shdr *, const char *));
15bda425
JL
188
189static void elf64_hppa_post_process_headers
190 PARAMS ((bfd *, struct bfd_link_info *));
191
b34976b6 192static bfd_boolean elf64_hppa_create_dynamic_sections
15bda425
JL
193 PARAMS ((bfd *, struct bfd_link_info *));
194
b34976b6 195static bfd_boolean elf64_hppa_adjust_dynamic_symbol
15bda425
JL
196 PARAMS ((struct bfd_link_info *, struct elf_link_hash_entry *));
197
b34976b6 198static bfd_boolean elf64_hppa_mark_milli_and_exported_functions
47b7c2db
AM
199 PARAMS ((struct elf_link_hash_entry *, PTR));
200
b34976b6 201static bfd_boolean elf64_hppa_size_dynamic_sections
15bda425
JL
202 PARAMS ((bfd *, struct bfd_link_info *));
203
b34976b6
AM
204static bfd_boolean elf64_hppa_link_output_symbol_hook
205 PARAMS ((bfd *abfd, struct bfd_link_info *, const char *,
206 Elf_Internal_Sym *, asection *input_sec));
99c79b2e 207
b34976b6 208static bfd_boolean elf64_hppa_finish_dynamic_symbol
15bda425
JL
209 PARAMS ((bfd *, struct bfd_link_info *,
210 struct elf_link_hash_entry *, Elf_Internal_Sym *));
fe8bc63d 211
b34976b6
AM
212static int elf64_hppa_additional_program_headers
213 PARAMS ((bfd *));
99c79b2e 214
b34976b6
AM
215static bfd_boolean elf64_hppa_modify_segment_map
216 PARAMS ((bfd *));
99c79b2e 217
5ac81c74
JL
218static enum elf_reloc_type_class elf64_hppa_reloc_type_class
219 PARAMS ((const Elf_Internal_Rela *));
220
b34976b6 221static bfd_boolean elf64_hppa_finish_dynamic_sections
15bda425
JL
222 PARAMS ((bfd *, struct bfd_link_info *));
223
b34976b6 224static bfd_boolean elf64_hppa_check_relocs
15bda425
JL
225 PARAMS ((bfd *, struct bfd_link_info *,
226 asection *, const Elf_Internal_Rela *));
227
b34976b6 228static bfd_boolean elf64_hppa_dynamic_symbol_p
15bda425
JL
229 PARAMS ((struct elf_link_hash_entry *, struct bfd_link_info *));
230
b34976b6 231static bfd_boolean elf64_hppa_mark_exported_functions
15bda425
JL
232 PARAMS ((struct elf_link_hash_entry *, PTR));
233
b34976b6 234static bfd_boolean elf64_hppa_finalize_opd
15bda425
JL
235 PARAMS ((struct elf64_hppa_dyn_hash_entry *, PTR));
236
b34976b6 237static bfd_boolean elf64_hppa_finalize_dlt
15bda425
JL
238 PARAMS ((struct elf64_hppa_dyn_hash_entry *, PTR));
239
b34976b6 240static bfd_boolean allocate_global_data_dlt
15bda425
JL
241 PARAMS ((struct elf64_hppa_dyn_hash_entry *, PTR));
242
b34976b6 243static bfd_boolean allocate_global_data_plt
15bda425
JL
244 PARAMS ((struct elf64_hppa_dyn_hash_entry *, PTR));
245
b34976b6 246static bfd_boolean allocate_global_data_stub
15bda425
JL
247 PARAMS ((struct elf64_hppa_dyn_hash_entry *, PTR));
248
b34976b6 249static bfd_boolean allocate_global_data_opd
15bda425
JL
250 PARAMS ((struct elf64_hppa_dyn_hash_entry *, PTR));
251
b34976b6 252static bfd_boolean get_reloc_section
15bda425
JL
253 PARAMS ((bfd *, struct elf64_hppa_link_hash_table *, asection *));
254
b34976b6 255static bfd_boolean count_dyn_reloc
15bda425
JL
256 PARAMS ((bfd *, struct elf64_hppa_dyn_hash_entry *,
257 int, asection *, int, bfd_vma, bfd_vma));
258
b34976b6 259static bfd_boolean allocate_dynrel_entries
15bda425
JL
260 PARAMS ((struct elf64_hppa_dyn_hash_entry *, PTR));
261
b34976b6 262static bfd_boolean elf64_hppa_finalize_dynreloc
15bda425
JL
263 PARAMS ((struct elf64_hppa_dyn_hash_entry *, PTR));
264
b34976b6 265static bfd_boolean get_opd
15bda425
JL
266 PARAMS ((bfd *, struct bfd_link_info *, struct elf64_hppa_link_hash_table *));
267
b34976b6 268static bfd_boolean get_plt
15bda425
JL
269 PARAMS ((bfd *, struct bfd_link_info *, struct elf64_hppa_link_hash_table *));
270
b34976b6 271static bfd_boolean get_dlt
15bda425
JL
272 PARAMS ((bfd *, struct bfd_link_info *, struct elf64_hppa_link_hash_table *));
273
b34976b6 274static bfd_boolean get_stub
15bda425
JL
275 PARAMS ((bfd *, struct bfd_link_info *, struct elf64_hppa_link_hash_table *));
276
3fab46d0
AM
277static int elf64_hppa_elf_get_symbol_type
278 PARAMS ((Elf_Internal_Sym *, int));
279
b34976b6 280static bfd_boolean
15bda425
JL
281elf64_hppa_dyn_hash_table_init (ht, abfd, new)
282 struct elf64_hppa_dyn_hash_table *ht;
edd21aca 283 bfd *abfd ATTRIBUTE_UNUSED;
15bda425
JL
284 new_hash_entry_func new;
285{
fe8bc63d 286 memset (ht, 0, sizeof (*ht));
15bda425
JL
287 return bfd_hash_table_init (&ht->root, new);
288}
289
290static struct bfd_hash_entry*
291elf64_hppa_new_dyn_hash_entry (entry, table, string)
292 struct bfd_hash_entry *entry;
293 struct bfd_hash_table *table;
294 const char *string;
295{
296 struct elf64_hppa_dyn_hash_entry *ret;
297 ret = (struct elf64_hppa_dyn_hash_entry *) entry;
298
299 /* Allocate the structure if it has not already been allocated by a
300 subclass. */
301 if (!ret)
302 ret = bfd_hash_allocate (table, sizeof (*ret));
303
304 if (!ret)
305 return 0;
306
307 /* Initialize our local data. All zeros, and definitely easier
308 than setting 8 bit fields. */
fe8bc63d 309 memset (ret, 0, sizeof (*ret));
15bda425
JL
310
311 /* Call the allocation method of the superclass. */
312 ret = ((struct elf64_hppa_dyn_hash_entry *)
313 bfd_hash_newfunc ((struct bfd_hash_entry *) ret, table, string));
314
315 return &ret->root;
316}
317
318/* Create the derived linker hash table. The PA64 ELF port uses this
319 derived hash table to keep information specific to the PA ElF
320 linker (without using static variables). */
321
322static struct bfd_link_hash_table*
323elf64_hppa_hash_table_create (abfd)
324 bfd *abfd;
325{
326 struct elf64_hppa_link_hash_table *ret;
327
dc810e39 328 ret = bfd_zalloc (abfd, (bfd_size_type) sizeof (*ret));
15bda425
JL
329 if (!ret)
330 return 0;
331 if (!_bfd_elf_link_hash_table_init (&ret->root, abfd,
332 _bfd_elf_link_hash_newfunc))
333 {
334 bfd_release (abfd, ret);
335 return 0;
336 }
337
338 if (!elf64_hppa_dyn_hash_table_init (&ret->dyn_hash_table, abfd,
339 elf64_hppa_new_dyn_hash_entry))
340 return 0;
341 return &ret->root.root;
342}
343
344/* Look up an entry in a PA64 ELF linker hash table. */
345
346static struct elf64_hppa_dyn_hash_entry *
347elf64_hppa_dyn_hash_lookup(table, string, create, copy)
348 struct elf64_hppa_dyn_hash_table *table;
349 const char *string;
b34976b6 350 bfd_boolean create, copy;
15bda425
JL
351{
352 return ((struct elf64_hppa_dyn_hash_entry *)
353 bfd_hash_lookup (&table->root, string, create, copy));
354}
355
356/* Traverse a PA64 ELF linker hash table. */
357
358static void
359elf64_hppa_dyn_hash_traverse (table, func, info)
360 struct elf64_hppa_dyn_hash_table *table;
b34976b6 361 bfd_boolean (*func) PARAMS ((struct elf64_hppa_dyn_hash_entry *, PTR));
15bda425
JL
362 PTR info;
363{
364 (bfd_hash_traverse
365 (&table->root,
b34976b6 366 (bfd_boolean (*) PARAMS ((struct bfd_hash_entry *, PTR))) func,
15bda425
JL
367 info));
368}
369\f
370/* Return nonzero if ABFD represents a PA2.0 ELF64 file.
371
372 Additionally we set the default architecture and machine. */
b34976b6 373static bfd_boolean
15bda425
JL
374elf64_hppa_object_p (abfd)
375 bfd *abfd;
376{
24a5e751
L
377 Elf_Internal_Ehdr * i_ehdrp;
378 unsigned int flags;
d9634ba1 379
24a5e751
L
380 i_ehdrp = elf_elfheader (abfd);
381 if (strcmp (bfd_get_target (abfd), "elf64-hppa-linux") == 0)
382 {
383 if (i_ehdrp->e_ident[EI_OSABI] != ELFOSABI_LINUX)
b34976b6 384 return FALSE;
24a5e751
L
385 }
386 else
387 {
388 if (i_ehdrp->e_ident[EI_OSABI] != ELFOSABI_HPUX)
b34976b6 389 return FALSE;
24a5e751
L
390 }
391
392 flags = i_ehdrp->e_flags;
d9634ba1
AM
393 switch (flags & (EF_PARISC_ARCH | EF_PARISC_WIDE))
394 {
395 case EFA_PARISC_1_0:
396 return bfd_default_set_arch_mach (abfd, bfd_arch_hppa, 10);
397 case EFA_PARISC_1_1:
398 return bfd_default_set_arch_mach (abfd, bfd_arch_hppa, 11);
399 case EFA_PARISC_2_0:
400 return bfd_default_set_arch_mach (abfd, bfd_arch_hppa, 20);
401 case EFA_PARISC_2_0 | EF_PARISC_WIDE:
402 return bfd_default_set_arch_mach (abfd, bfd_arch_hppa, 25);
403 }
404 /* Don't be fussy. */
b34976b6 405 return TRUE;
15bda425
JL
406}
407
408/* Given section type (hdr->sh_type), return a boolean indicating
409 whether or not the section is an elf64-hppa specific section. */
b34976b6 410static bfd_boolean
15bda425
JL
411elf64_hppa_section_from_shdr (abfd, hdr, name)
412 bfd *abfd;
947216bf 413 Elf_Internal_Shdr *hdr;
90937f86 414 const char *name;
15bda425
JL
415{
416 asection *newsect;
417
418 switch (hdr->sh_type)
419 {
420 case SHT_PARISC_EXT:
421 if (strcmp (name, ".PARISC.archext") != 0)
b34976b6 422 return FALSE;
15bda425
JL
423 break;
424 case SHT_PARISC_UNWIND:
425 if (strcmp (name, ".PARISC.unwind") != 0)
b34976b6 426 return FALSE;
15bda425
JL
427 break;
428 case SHT_PARISC_DOC:
429 case SHT_PARISC_ANNOT:
430 default:
b34976b6 431 return FALSE;
15bda425
JL
432 }
433
434 if (! _bfd_elf_make_section_from_shdr (abfd, hdr, name))
b34976b6 435 return FALSE;
15bda425
JL
436 newsect = hdr->bfd_section;
437
b34976b6 438 return TRUE;
15bda425
JL
439}
440
15bda425 441/* Construct a string for use in the elf64_hppa_dyn_hash_table. The
fe8bc63d 442 name describes what was once potentially anonymous memory. We
15bda425
JL
443 allocate memory as necessary, possibly reusing PBUF/PLEN. */
444
445static const char *
0ba2a60e
AM
446get_dyn_name (sec, h, rel, pbuf, plen)
447 asection *sec;
15bda425
JL
448 struct elf_link_hash_entry *h;
449 const Elf_Internal_Rela *rel;
450 char **pbuf;
451 size_t *plen;
452{
453 size_t nlen, tlen;
454 char *buf;
455 size_t len;
456
457 if (h && rel->r_addend == 0)
458 return h->root.root.string;
459
460 if (h)
461 nlen = strlen (h->root.root.string);
462 else
0ba2a60e
AM
463 nlen = 8 + 1 + sizeof (rel->r_info) * 2 - 8;
464 tlen = nlen + 1 + sizeof (rel->r_addend) * 2 + 1;
15bda425
JL
465
466 len = *plen;
467 buf = *pbuf;
468 if (len < tlen)
469 {
470 if (buf)
471 free (buf);
472 *pbuf = buf = malloc (tlen);
473 *plen = len = tlen;
474 if (!buf)
475 return NULL;
476 }
477
478 if (h)
479 {
480 memcpy (buf, h->root.root.string, nlen);
0ba2a60e 481 buf[nlen++] = '+';
15bda425
JL
482 sprintf_vma (buf + nlen, rel->r_addend);
483 }
484 else
485 {
0ba2a60e
AM
486 nlen = sprintf (buf, "%x:%lx",
487 sec->id & 0xffffffff,
488 (long) ELF64_R_SYM (rel->r_info));
15bda425
JL
489 if (rel->r_addend)
490 {
491 buf[nlen++] = '+';
492 sprintf_vma (buf + nlen, rel->r_addend);
493 }
494 }
495
496 return buf;
497}
498
499/* SEC is a section containing relocs for an input BFD when linking; return
500 a suitable section for holding relocs in the output BFD for a link. */
501
b34976b6 502static bfd_boolean
15bda425
JL
503get_reloc_section (abfd, hppa_info, sec)
504 bfd *abfd;
505 struct elf64_hppa_link_hash_table *hppa_info;
506 asection *sec;
507{
508 const char *srel_name;
509 asection *srel;
510 bfd *dynobj;
511
512 srel_name = (bfd_elf_string_from_elf_section
513 (abfd, elf_elfheader(abfd)->e_shstrndx,
514 elf_section_data(sec)->rel_hdr.sh_name));
515 if (srel_name == NULL)
b34976b6 516 return FALSE;
15bda425
JL
517
518 BFD_ASSERT ((strncmp (srel_name, ".rela", 5) == 0
519 && strcmp (bfd_get_section_name (abfd, sec),
520 srel_name+5) == 0)
521 || (strncmp (srel_name, ".rel", 4) == 0
522 && strcmp (bfd_get_section_name (abfd, sec),
523 srel_name+4) == 0));
524
525 dynobj = hppa_info->root.dynobj;
526 if (!dynobj)
527 hppa_info->root.dynobj = dynobj = abfd;
528
529 srel = bfd_get_section_by_name (dynobj, srel_name);
530 if (srel == NULL)
531 {
532 srel = bfd_make_section (dynobj, srel_name);
533 if (srel == NULL
534 || !bfd_set_section_flags (dynobj, srel,
535 (SEC_ALLOC
536 | SEC_LOAD
537 | SEC_HAS_CONTENTS
538 | SEC_IN_MEMORY
539 | SEC_LINKER_CREATED
540 | SEC_READONLY))
541 || !bfd_set_section_alignment (dynobj, srel, 3))
b34976b6 542 return FALSE;
15bda425
JL
543 }
544
545 hppa_info->other_rel_sec = srel;
b34976b6 546 return TRUE;
15bda425
JL
547}
548
fe8bc63d 549/* Add a new entry to the list of dynamic relocations against DYN_H.
15bda425
JL
550
551 We use this to keep a record of all the FPTR relocations against a
552 particular symbol so that we can create FPTR relocations in the
553 output file. */
554
b34976b6 555static bfd_boolean
15bda425
JL
556count_dyn_reloc (abfd, dyn_h, type, sec, sec_symndx, offset, addend)
557 bfd *abfd;
558 struct elf64_hppa_dyn_hash_entry *dyn_h;
559 int type;
560 asection *sec;
561 int sec_symndx;
562 bfd_vma offset;
563 bfd_vma addend;
564{
565 struct elf64_hppa_dyn_reloc_entry *rent;
566
567 rent = (struct elf64_hppa_dyn_reloc_entry *)
dc810e39 568 bfd_alloc (abfd, (bfd_size_type) sizeof (*rent));
15bda425 569 if (!rent)
b34976b6 570 return FALSE;
15bda425
JL
571
572 rent->next = dyn_h->reloc_entries;
573 rent->type = type;
574 rent->sec = sec;
575 rent->sec_symndx = sec_symndx;
576 rent->offset = offset;
577 rent->addend = addend;
578 dyn_h->reloc_entries = rent;
579
b34976b6 580 return TRUE;
15bda425
JL
581}
582
583/* Scan the RELOCS and record the type of dynamic entries that each
584 referenced symbol needs. */
585
b34976b6 586static bfd_boolean
15bda425
JL
587elf64_hppa_check_relocs (abfd, info, sec, relocs)
588 bfd *abfd;
589 struct bfd_link_info *info;
590 asection *sec;
591 const Elf_Internal_Rela *relocs;
592{
593 struct elf64_hppa_link_hash_table *hppa_info;
594 const Elf_Internal_Rela *relend;
595 Elf_Internal_Shdr *symtab_hdr;
596 const Elf_Internal_Rela *rel;
597 asection *dlt, *plt, *stubs;
598 char *buf;
599 size_t buf_len;
600 int sec_symndx;
601
1049f94e 602 if (info->relocatable)
b34976b6 603 return TRUE;
15bda425
JL
604
605 /* If this is the first dynamic object found in the link, create
606 the special sections required for dynamic linking. */
607 if (! elf_hash_table (info)->dynamic_sections_created)
608 {
45d6a902 609 if (! _bfd_elf_link_create_dynamic_sections (abfd, info))
b34976b6 610 return FALSE;
15bda425
JL
611 }
612
613 hppa_info = elf64_hppa_hash_table (info);
614 symtab_hdr = &elf_tdata (abfd)->symtab_hdr;
615
616 /* If necessary, build a new table holding section symbols indices
6cdc0ccc 617 for this BFD. */
fe8bc63d 618
15bda425
JL
619 if (info->shared && hppa_info->section_syms_bfd != abfd)
620 {
832d951b 621 unsigned long i;
9ad5cbcf 622 unsigned int highest_shndx;
6cdc0ccc
AM
623 Elf_Internal_Sym *local_syms = NULL;
624 Elf_Internal_Sym *isym, *isymend;
dc810e39 625 bfd_size_type amt;
15bda425
JL
626
627 /* We're done with the old cache of section index to section symbol
628 index information. Free it.
629
630 ?!? Note we leak the last section_syms array. Presumably we
631 could free it in one of the later routines in this file. */
632 if (hppa_info->section_syms)
633 free (hppa_info->section_syms);
634
6cdc0ccc
AM
635 /* Read this BFD's local symbols. */
636 if (symtab_hdr->sh_info != 0)
47b7c2db 637 {
6cdc0ccc
AM
638 local_syms = (Elf_Internal_Sym *) symtab_hdr->contents;
639 if (local_syms == NULL)
640 local_syms = bfd_elf_get_elf_syms (abfd, symtab_hdr,
641 symtab_hdr->sh_info, 0,
642 NULL, NULL, NULL);
643 if (local_syms == NULL)
b34976b6 644 return FALSE;
9ad5cbcf
AM
645 }
646
6cdc0ccc 647 /* Record the highest section index referenced by the local symbols. */
15bda425 648 highest_shndx = 0;
6cdc0ccc
AM
649 isymend = local_syms + symtab_hdr->sh_info;
650 for (isym = local_syms; isym < isymend; isym++)
15bda425 651 {
15bda425
JL
652 if (isym->st_shndx > highest_shndx)
653 highest_shndx = isym->st_shndx;
654 }
655
15bda425
JL
656 /* Allocate an array to hold the section index to section symbol index
657 mapping. Bump by one since we start counting at zero. */
658 highest_shndx++;
dc810e39
AM
659 amt = highest_shndx;
660 amt *= sizeof (int);
661 hppa_info->section_syms = (int *) bfd_malloc (amt);
15bda425
JL
662
663 /* Now walk the local symbols again. If we find a section symbol,
664 record the index of the symbol into the section_syms array. */
6cdc0ccc 665 for (i = 0, isym = local_syms; isym < isymend; i++, isym++)
15bda425
JL
666 {
667 if (ELF_ST_TYPE (isym->st_info) == STT_SECTION)
668 hppa_info->section_syms[isym->st_shndx] = i;
669 }
670
6cdc0ccc
AM
671 /* We are finished with the local symbols. */
672 if (local_syms != NULL
673 && symtab_hdr->contents != (unsigned char *) local_syms)
674 {
675 if (! info->keep_memory)
676 free (local_syms);
677 else
678 {
679 /* Cache the symbols for elf_link_input_bfd. */
680 symtab_hdr->contents = (unsigned char *) local_syms;
681 }
682 }
15bda425
JL
683
684 /* Record which BFD we built the section_syms mapping for. */
685 hppa_info->section_syms_bfd = abfd;
686 }
687
688 /* Record the symbol index for this input section. We may need it for
689 relocations when building shared libraries. When not building shared
690 libraries this value is never really used, but assign it to zero to
691 prevent out of bounds memory accesses in other routines. */
692 if (info->shared)
693 {
694 sec_symndx = _bfd_elf_section_from_bfd_section (abfd, sec);
695
696 /* If we did not find a section symbol for this section, then
697 something went terribly wrong above. */
698 if (sec_symndx == -1)
b34976b6 699 return FALSE;
15bda425
JL
700
701 sec_symndx = hppa_info->section_syms[sec_symndx];
702 }
703 else
704 sec_symndx = 0;
fe8bc63d 705
15bda425
JL
706 dlt = plt = stubs = NULL;
707 buf = NULL;
708 buf_len = 0;
709
710 relend = relocs + sec->reloc_count;
711 for (rel = relocs; rel < relend; ++rel)
712 {
560e09e9
NC
713 enum
714 {
715 NEED_DLT = 1,
716 NEED_PLT = 2,
717 NEED_STUB = 4,
718 NEED_OPD = 8,
719 NEED_DYNREL = 16,
720 };
15bda425
JL
721
722 struct elf_link_hash_entry *h = NULL;
723 unsigned long r_symndx = ELF64_R_SYM (rel->r_info);
724 struct elf64_hppa_dyn_hash_entry *dyn_h;
725 int need_entry;
726 const char *addr_name;
b34976b6 727 bfd_boolean maybe_dynamic;
15bda425
JL
728 int dynrel_type = R_PARISC_NONE;
729 static reloc_howto_type *howto;
730
731 if (r_symndx >= symtab_hdr->sh_info)
732 {
733 /* We're dealing with a global symbol -- find its hash entry
734 and mark it as being referenced. */
735 long indx = r_symndx - symtab_hdr->sh_info;
736 h = elf_sym_hashes (abfd)[indx];
737 while (h->root.type == bfd_link_hash_indirect
738 || h->root.type == bfd_link_hash_warning)
739 h = (struct elf_link_hash_entry *) h->root.u.i.link;
740
741 h->elf_link_hash_flags |= ELF_LINK_HASH_REF_REGULAR;
742 }
743
744 /* We can only get preliminary data on whether a symbol is
745 locally or externally defined, as not all of the input files
746 have yet been processed. Do something with what we know, as
747 this may help reduce memory usage and processing time later. */
b34976b6 748 maybe_dynamic = FALSE;
671bae9c 749 if (h && ((info->shared
560e09e9 750 && (!info->symbolic || info->unresolved_syms_in_shared_libs == RM_IGNORE))
15bda425
JL
751 || ! (h->elf_link_hash_flags & ELF_LINK_HASH_DEF_REGULAR)
752 || h->root.type == bfd_link_hash_defweak))
b34976b6 753 maybe_dynamic = TRUE;
15bda425
JL
754
755 howto = elf_hppa_howto_table + ELF64_R_TYPE (rel->r_info);
756 need_entry = 0;
757 switch (howto->type)
758 {
759 /* These are simple indirect references to symbols through the
760 DLT. We need to create a DLT entry for any symbols which
761 appears in a DLTIND relocation. */
762 case R_PARISC_DLTIND21L:
763 case R_PARISC_DLTIND14R:
764 case R_PARISC_DLTIND14F:
765 case R_PARISC_DLTIND14WR:
766 case R_PARISC_DLTIND14DR:
767 need_entry = NEED_DLT;
768 break;
769
770 /* ?!? These need a DLT entry. But I have no idea what to do with
771 the "link time TP value. */
772 case R_PARISC_LTOFF_TP21L:
773 case R_PARISC_LTOFF_TP14R:
774 case R_PARISC_LTOFF_TP14F:
775 case R_PARISC_LTOFF_TP64:
776 case R_PARISC_LTOFF_TP14WR:
777 case R_PARISC_LTOFF_TP14DR:
778 case R_PARISC_LTOFF_TP16F:
779 case R_PARISC_LTOFF_TP16WF:
780 case R_PARISC_LTOFF_TP16DF:
781 need_entry = NEED_DLT;
782 break;
783
784 /* These are function calls. Depending on their precise target we
785 may need to make a stub for them. The stub uses the PLT, so we
786 need to create PLT entries for these symbols too. */
832d951b 787 case R_PARISC_PCREL12F:
15bda425
JL
788 case R_PARISC_PCREL17F:
789 case R_PARISC_PCREL22F:
790 case R_PARISC_PCREL32:
791 case R_PARISC_PCREL64:
792 case R_PARISC_PCREL21L:
793 case R_PARISC_PCREL17R:
794 case R_PARISC_PCREL17C:
795 case R_PARISC_PCREL14R:
796 case R_PARISC_PCREL14F:
797 case R_PARISC_PCREL22C:
798 case R_PARISC_PCREL14WR:
799 case R_PARISC_PCREL14DR:
800 case R_PARISC_PCREL16F:
801 case R_PARISC_PCREL16WF:
802 case R_PARISC_PCREL16DF:
803 need_entry = (NEED_PLT | NEED_STUB);
804 break;
805
806 case R_PARISC_PLTOFF21L:
807 case R_PARISC_PLTOFF14R:
808 case R_PARISC_PLTOFF14F:
809 case R_PARISC_PLTOFF14WR:
810 case R_PARISC_PLTOFF14DR:
811 case R_PARISC_PLTOFF16F:
812 case R_PARISC_PLTOFF16WF:
813 case R_PARISC_PLTOFF16DF:
814 need_entry = (NEED_PLT);
815 break;
816
817 case R_PARISC_DIR64:
818 if (info->shared || maybe_dynamic)
819 need_entry = (NEED_DYNREL);
820 dynrel_type = R_PARISC_DIR64;
821 break;
822
823 /* This is an indirect reference through the DLT to get the address
824 of a OPD descriptor. Thus we need to make a DLT entry that points
825 to an OPD entry. */
826 case R_PARISC_LTOFF_FPTR21L:
827 case R_PARISC_LTOFF_FPTR14R:
828 case R_PARISC_LTOFF_FPTR14WR:
829 case R_PARISC_LTOFF_FPTR14DR:
830 case R_PARISC_LTOFF_FPTR32:
831 case R_PARISC_LTOFF_FPTR64:
832 case R_PARISC_LTOFF_FPTR16F:
833 case R_PARISC_LTOFF_FPTR16WF:
834 case R_PARISC_LTOFF_FPTR16DF:
835 if (info->shared || maybe_dynamic)
836 need_entry = (NEED_DLT | NEED_OPD);
837 else
838 need_entry = (NEED_DLT | NEED_OPD);
839 dynrel_type = R_PARISC_FPTR64;
840 break;
841
842 /* This is a simple OPD entry. */
843 case R_PARISC_FPTR64:
844 if (info->shared || maybe_dynamic)
845 need_entry = (NEED_OPD | NEED_DYNREL);
846 else
847 need_entry = (NEED_OPD);
848 dynrel_type = R_PARISC_FPTR64;
849 break;
850
851 /* Add more cases as needed. */
852 }
853
854 if (!need_entry)
855 continue;
856
857 /* Collect a canonical name for this address. */
0ba2a60e 858 addr_name = get_dyn_name (sec, h, rel, &buf, &buf_len);
15bda425
JL
859
860 /* Collect the canonical entry data for this address. */
861 dyn_h = elf64_hppa_dyn_hash_lookup (&hppa_info->dyn_hash_table,
b34976b6 862 addr_name, TRUE, TRUE);
15bda425
JL
863 BFD_ASSERT (dyn_h);
864
865 /* Stash away enough information to be able to find this symbol
866 regardless of whether or not it is local or global. */
867 dyn_h->h = h;
868 dyn_h->owner = abfd;
869 dyn_h->sym_indx = r_symndx;
870
871 /* ?!? We may need to do some error checking in here. */
872 /* Create what's needed. */
873 if (need_entry & NEED_DLT)
874 {
875 if (! hppa_info->dlt_sec
876 && ! get_dlt (abfd, info, hppa_info))
877 goto err_out;
878 dyn_h->want_dlt = 1;
879 }
880
881 if (need_entry & NEED_PLT)
882 {
883 if (! hppa_info->plt_sec
884 && ! get_plt (abfd, info, hppa_info))
885 goto err_out;
886 dyn_h->want_plt = 1;
887 }
888
889 if (need_entry & NEED_STUB)
890 {
891 if (! hppa_info->stub_sec
892 && ! get_stub (abfd, info, hppa_info))
893 goto err_out;
894 dyn_h->want_stub = 1;
895 }
896
897 if (need_entry & NEED_OPD)
898 {
899 if (! hppa_info->opd_sec
900 && ! get_opd (abfd, info, hppa_info))
901 goto err_out;
902
903 dyn_h->want_opd = 1;
904
905 /* FPTRs are not allocated by the dynamic linker for PA64, though
906 it is possible that will change in the future. */
fe8bc63d 907
15bda425
JL
908 /* This could be a local function that had its address taken, in
909 which case H will be NULL. */
910 if (h)
911 h->elf_link_hash_flags |= ELF_LINK_HASH_NEEDS_PLT;
912 }
913
914 /* Add a new dynamic relocation to the chain of dynamic
915 relocations for this symbol. */
916 if ((need_entry & NEED_DYNREL) && (sec->flags & SEC_ALLOC))
917 {
918 if (! hppa_info->other_rel_sec
919 && ! get_reloc_section (abfd, hppa_info, sec))
920 goto err_out;
921
922 if (!count_dyn_reloc (abfd, dyn_h, dynrel_type, sec,
923 sec_symndx, rel->r_offset, rel->r_addend))
924 goto err_out;
925
926 /* If we are building a shared library and we just recorded
927 a dynamic R_PARISC_FPTR64 relocation, then make sure the
928 section symbol for this section ends up in the dynamic
929 symbol table. */
930 if (info->shared && dynrel_type == R_PARISC_FPTR64
931 && ! (_bfd_elf64_link_record_local_dynamic_symbol
932 (info, abfd, sec_symndx)))
b34976b6 933 return FALSE;
15bda425
JL
934 }
935 }
936
937 if (buf)
938 free (buf);
b34976b6 939 return TRUE;
15bda425
JL
940
941 err_out:
942 if (buf)
943 free (buf);
b34976b6 944 return FALSE;
15bda425
JL
945}
946
947struct elf64_hppa_allocate_data
948{
949 struct bfd_link_info *info;
950 bfd_size_type ofs;
951};
952
953/* Should we do dynamic things to this symbol? */
954
b34976b6 955static bfd_boolean
15bda425
JL
956elf64_hppa_dynamic_symbol_p (h, info)
957 struct elf_link_hash_entry *h;
958 struct bfd_link_info *info;
959{
986a241f
RH
960 /* ??? What, if anything, needs to happen wrt STV_PROTECTED symbols
961 and relocations that retrieve a function descriptor? Assume the
962 worst for now. */
963 if (_bfd_elf_dynamic_symbol_p (h, info, 1))
964 {
965 /* ??? Why is this here and not elsewhere is_local_label_name. */
966 if (h->root.root.string[0] == '$' && h->root.root.string[1] == '$')
967 return FALSE;
15bda425 968
986a241f
RH
969 return TRUE;
970 }
971 else
b34976b6 972 return FALSE;
15bda425
JL
973}
974
975/* Mark all funtions exported by this file so that we can later allocate
976 entries in .opd for them. */
977
b34976b6 978static bfd_boolean
15bda425
JL
979elf64_hppa_mark_exported_functions (h, data)
980 struct elf_link_hash_entry *h;
981 PTR data;
982{
983 struct bfd_link_info *info = (struct bfd_link_info *)data;
984 struct elf64_hppa_link_hash_table *hppa_info;
985
986 hppa_info = elf64_hppa_hash_table (info);
987
e92d460e
AM
988 if (h->root.type == bfd_link_hash_warning)
989 h = (struct elf_link_hash_entry *) h->root.u.i.link;
990
15bda425
JL
991 if (h
992 && (h->root.type == bfd_link_hash_defined
993 || h->root.type == bfd_link_hash_defweak)
994 && h->root.u.def.section->output_section != NULL
995 && h->type == STT_FUNC)
996 {
997 struct elf64_hppa_dyn_hash_entry *dyn_h;
998
999 /* Add this symbol to the PA64 linker hash table. */
1000 dyn_h = elf64_hppa_dyn_hash_lookup (&hppa_info->dyn_hash_table,
b34976b6 1001 h->root.root.string, TRUE, TRUE);
15bda425
JL
1002 BFD_ASSERT (dyn_h);
1003 dyn_h->h = h;
1004
1005 if (! hppa_info->opd_sec
1006 && ! get_opd (hppa_info->root.dynobj, info, hppa_info))
b34976b6 1007 return FALSE;
15bda425
JL
1008
1009 dyn_h->want_opd = 1;
832d951b
AM
1010 /* Put a flag here for output_symbol_hook. */
1011 dyn_h->st_shndx = -1;
15bda425
JL
1012 h->elf_link_hash_flags |= ELF_LINK_HASH_NEEDS_PLT;
1013 }
1014
b34976b6 1015 return TRUE;
15bda425
JL
1016}
1017
1018/* Allocate space for a DLT entry. */
1019
b34976b6 1020static bfd_boolean
15bda425
JL
1021allocate_global_data_dlt (dyn_h, data)
1022 struct elf64_hppa_dyn_hash_entry *dyn_h;
1023 PTR data;
1024{
1025 struct elf64_hppa_allocate_data *x = (struct elf64_hppa_allocate_data *)data;
1026
1027 if (dyn_h->want_dlt)
1028 {
1029 struct elf_link_hash_entry *h = dyn_h->h;
1030
1031 if (x->info->shared)
1032 {
1033 /* Possibly add the symbol to the local dynamic symbol
1034 table since we might need to create a dynamic relocation
1035 against it. */
1036 if (! h
47b7c2db 1037 || (h->dynindx == -1 && h->type != STT_PARISC_MILLI))
15bda425
JL
1038 {
1039 bfd *owner;
1040 owner = (h ? h->root.u.def.section->owner : dyn_h->owner);
1041
dc810e39
AM
1042 if (! (_bfd_elf64_link_record_local_dynamic_symbol
1043 (x->info, owner, dyn_h->sym_indx)))
b34976b6 1044 return FALSE;
15bda425
JL
1045 }
1046 }
1047
1048 dyn_h->dlt_offset = x->ofs;
1049 x->ofs += DLT_ENTRY_SIZE;
1050 }
b34976b6 1051 return TRUE;
15bda425
JL
1052}
1053
1054/* Allocate space for a DLT.PLT entry. */
1055
b34976b6 1056static bfd_boolean
15bda425
JL
1057allocate_global_data_plt (dyn_h, data)
1058 struct elf64_hppa_dyn_hash_entry *dyn_h;
1059 PTR data;
1060{
1061 struct elf64_hppa_allocate_data *x = (struct elf64_hppa_allocate_data *)data;
1062
1063 if (dyn_h->want_plt
1064 && elf64_hppa_dynamic_symbol_p (dyn_h->h, x->info)
1065 && !((dyn_h->h->root.type == bfd_link_hash_defined
1066 || dyn_h->h->root.type == bfd_link_hash_defweak)
1067 && dyn_h->h->root.u.def.section->output_section != NULL))
1068 {
1069 dyn_h->plt_offset = x->ofs;
1070 x->ofs += PLT_ENTRY_SIZE;
1071 if (dyn_h->plt_offset < 0x2000)
1072 elf64_hppa_hash_table (x->info)->gp_offset = dyn_h->plt_offset;
1073 }
1074 else
1075 dyn_h->want_plt = 0;
1076
b34976b6 1077 return TRUE;
15bda425
JL
1078}
1079
1080/* Allocate space for a STUB entry. */
1081
b34976b6 1082static bfd_boolean
15bda425
JL
1083allocate_global_data_stub (dyn_h, data)
1084 struct elf64_hppa_dyn_hash_entry *dyn_h;
1085 PTR data;
1086{
1087 struct elf64_hppa_allocate_data *x = (struct elf64_hppa_allocate_data *)data;
1088
1089 if (dyn_h->want_stub
1090 && elf64_hppa_dynamic_symbol_p (dyn_h->h, x->info)
1091 && !((dyn_h->h->root.type == bfd_link_hash_defined
1092 || dyn_h->h->root.type == bfd_link_hash_defweak)
1093 && dyn_h->h->root.u.def.section->output_section != NULL))
1094 {
1095 dyn_h->stub_offset = x->ofs;
1096 x->ofs += sizeof (plt_stub);
1097 }
1098 else
1099 dyn_h->want_stub = 0;
b34976b6 1100 return TRUE;
15bda425
JL
1101}
1102
1103/* Allocate space for a FPTR entry. */
1104
b34976b6 1105static bfd_boolean
15bda425
JL
1106allocate_global_data_opd (dyn_h, data)
1107 struct elf64_hppa_dyn_hash_entry *dyn_h;
1108 PTR data;
1109{
1110 struct elf64_hppa_allocate_data *x = (struct elf64_hppa_allocate_data *)data;
1111
1112 if (dyn_h->want_opd)
1113 {
1114 struct elf_link_hash_entry *h = dyn_h->h;
fe8bc63d 1115
15bda425
JL
1116 if (h)
1117 while (h->root.type == bfd_link_hash_indirect
1118 || h->root.type == bfd_link_hash_warning)
1119 h = (struct elf_link_hash_entry *) h->root.u.i.link;
1120
1121 /* We never need an opd entry for a symbol which is not
1122 defined by this output file. */
3db4b612
JL
1123 if (h && (h->root.type == bfd_link_hash_undefined
1124 || h->root.u.def.section->output_section == NULL))
15bda425
JL
1125 dyn_h->want_opd = 0;
1126
1127 /* If we are creating a shared library, took the address of a local
1128 function or might export this function from this object file, then
1129 we have to create an opd descriptor. */
1130 else if (x->info->shared
1131 || h == NULL
47b7c2db 1132 || (h->dynindx == -1 && h->type != STT_PARISC_MILLI)
3db4b612
JL
1133 || (h->root.type == bfd_link_hash_defined
1134 || h->root.type == bfd_link_hash_defweak))
15bda425
JL
1135 {
1136 /* If we are creating a shared library, then we will have to
1137 create a runtime relocation for the symbol to properly
1138 initialize the .opd entry. Make sure the symbol gets
1139 added to the dynamic symbol table. */
1140 if (x->info->shared
1141 && (h == NULL || (h->dynindx == -1)))
1142 {
1143 bfd *owner;
1144 owner = (h ? h->root.u.def.section->owner : dyn_h->owner);
1145
1146 if (!_bfd_elf64_link_record_local_dynamic_symbol
1147 (x->info, owner, dyn_h->sym_indx))
b34976b6 1148 return FALSE;
15bda425
JL
1149 }
1150
1151 /* This may not be necessary or desirable anymore now that
1152 we have some support for dealing with section symbols
1153 in dynamic relocs. But name munging does make the result
1154 much easier to debug. ie, the EPLT reloc will reference
1155 a symbol like .foobar, instead of .text + offset. */
1156 if (x->info->shared && h)
1157 {
1158 char *new_name;
1159 struct elf_link_hash_entry *nh;
1160
1161 new_name = alloca (strlen (h->root.root.string) + 2);
1162 new_name[0] = '.';
1163 strcpy (new_name + 1, h->root.root.string);
1164
1165 nh = elf_link_hash_lookup (elf_hash_table (x->info),
b34976b6 1166 new_name, TRUE, TRUE, TRUE);
15bda425
JL
1167
1168 nh->root.type = h->root.type;
1169 nh->root.u.def.value = h->root.u.def.value;
1170 nh->root.u.def.section = h->root.u.def.section;
1171
1172 if (! bfd_elf64_link_record_dynamic_symbol (x->info, nh))
b34976b6 1173 return FALSE;
15bda425
JL
1174
1175 }
1176 dyn_h->opd_offset = x->ofs;
1177 x->ofs += OPD_ENTRY_SIZE;
1178 }
1179
1180 /* Otherwise we do not need an opd entry. */
1181 else
1182 dyn_h->want_opd = 0;
1183 }
b34976b6 1184 return TRUE;
15bda425
JL
1185}
1186
1187/* HP requires the EI_OSABI field to be filled in. The assignment to
1188 EI_ABIVERSION may not be strictly necessary. */
1189
1190static void
1191elf64_hppa_post_process_headers (abfd, link_info)
1192 bfd * abfd;
1193 struct bfd_link_info * link_info ATTRIBUTE_UNUSED;
1194{
1195 Elf_Internal_Ehdr * i_ehdrp;
1196
1197 i_ehdrp = elf_elfheader (abfd);
1198
d952f17a
AM
1199 if (strcmp (bfd_get_target (abfd), "elf64-hppa-linux") == 0)
1200 {
1201 i_ehdrp->e_ident[EI_OSABI] = ELFOSABI_LINUX;
1202 }
1203 else
1204 {
1205 i_ehdrp->e_ident[EI_OSABI] = ELFOSABI_HPUX;
1206 i_ehdrp->e_ident[EI_ABIVERSION] = 1;
1207 }
15bda425
JL
1208}
1209
1210/* Create function descriptor section (.opd). This section is called .opd
1211 because it contains "official prodecure descriptors". The "official"
1212 refers to the fact that these descriptors are used when taking the address
1213 of a procedure, thus ensuring a unique address for each procedure. */
1214
b34976b6 1215static bfd_boolean
15bda425
JL
1216get_opd (abfd, info, hppa_info)
1217 bfd *abfd;
edd21aca 1218 struct bfd_link_info *info ATTRIBUTE_UNUSED;
15bda425
JL
1219 struct elf64_hppa_link_hash_table *hppa_info;
1220{
1221 asection *opd;
1222 bfd *dynobj;
1223
1224 opd = hppa_info->opd_sec;
1225 if (!opd)
1226 {
1227 dynobj = hppa_info->root.dynobj;
1228 if (!dynobj)
1229 hppa_info->root.dynobj = dynobj = abfd;
1230
1231 opd = bfd_make_section (dynobj, ".opd");
1232 if (!opd
1233 || !bfd_set_section_flags (dynobj, opd,
1234 (SEC_ALLOC
1235 | SEC_LOAD
1236 | SEC_HAS_CONTENTS
1237 | SEC_IN_MEMORY
1238 | SEC_LINKER_CREATED))
1239 || !bfd_set_section_alignment (abfd, opd, 3))
1240 {
1241 BFD_ASSERT (0);
b34976b6 1242 return FALSE;
15bda425
JL
1243 }
1244
1245 hppa_info->opd_sec = opd;
1246 }
1247
b34976b6 1248 return TRUE;
15bda425
JL
1249}
1250
1251/* Create the PLT section. */
1252
b34976b6 1253static bfd_boolean
15bda425
JL
1254get_plt (abfd, info, hppa_info)
1255 bfd *abfd;
edd21aca 1256 struct bfd_link_info *info ATTRIBUTE_UNUSED;
15bda425
JL
1257 struct elf64_hppa_link_hash_table *hppa_info;
1258{
1259 asection *plt;
1260 bfd *dynobj;
1261
1262 plt = hppa_info->plt_sec;
1263 if (!plt)
1264 {
1265 dynobj = hppa_info->root.dynobj;
1266 if (!dynobj)
1267 hppa_info->root.dynobj = dynobj = abfd;
1268
1269 plt = bfd_make_section (dynobj, ".plt");
1270 if (!plt
1271 || !bfd_set_section_flags (dynobj, plt,
1272 (SEC_ALLOC
1273 | SEC_LOAD
1274 | SEC_HAS_CONTENTS
1275 | SEC_IN_MEMORY
1276 | SEC_LINKER_CREATED))
1277 || !bfd_set_section_alignment (abfd, plt, 3))
1278 {
1279 BFD_ASSERT (0);
b34976b6 1280 return FALSE;
15bda425
JL
1281 }
1282
1283 hppa_info->plt_sec = plt;
1284 }
1285
b34976b6 1286 return TRUE;
15bda425
JL
1287}
1288
1289/* Create the DLT section. */
1290
b34976b6 1291static bfd_boolean
15bda425
JL
1292get_dlt (abfd, info, hppa_info)
1293 bfd *abfd;
edd21aca 1294 struct bfd_link_info *info ATTRIBUTE_UNUSED;
15bda425
JL
1295 struct elf64_hppa_link_hash_table *hppa_info;
1296{
1297 asection *dlt;
1298 bfd *dynobj;
1299
1300 dlt = hppa_info->dlt_sec;
1301 if (!dlt)
1302 {
1303 dynobj = hppa_info->root.dynobj;
1304 if (!dynobj)
1305 hppa_info->root.dynobj = dynobj = abfd;
1306
1307 dlt = bfd_make_section (dynobj, ".dlt");
1308 if (!dlt
1309 || !bfd_set_section_flags (dynobj, dlt,
1310 (SEC_ALLOC
1311 | SEC_LOAD
1312 | SEC_HAS_CONTENTS
1313 | SEC_IN_MEMORY
1314 | SEC_LINKER_CREATED))
1315 || !bfd_set_section_alignment (abfd, dlt, 3))
1316 {
1317 BFD_ASSERT (0);
b34976b6 1318 return FALSE;
15bda425
JL
1319 }
1320
1321 hppa_info->dlt_sec = dlt;
1322 }
1323
b34976b6 1324 return TRUE;
15bda425
JL
1325}
1326
1327/* Create the stubs section. */
1328
b34976b6 1329static bfd_boolean
15bda425
JL
1330get_stub (abfd, info, hppa_info)
1331 bfd *abfd;
edd21aca 1332 struct bfd_link_info *info ATTRIBUTE_UNUSED;
15bda425
JL
1333 struct elf64_hppa_link_hash_table *hppa_info;
1334{
1335 asection *stub;
1336 bfd *dynobj;
1337
1338 stub = hppa_info->stub_sec;
1339 if (!stub)
1340 {
1341 dynobj = hppa_info->root.dynobj;
1342 if (!dynobj)
1343 hppa_info->root.dynobj = dynobj = abfd;
1344
1345 stub = bfd_make_section (dynobj, ".stub");
1346 if (!stub
1347 || !bfd_set_section_flags (dynobj, stub,
1348 (SEC_ALLOC
1349 | SEC_LOAD
1350 | SEC_HAS_CONTENTS
1351 | SEC_IN_MEMORY
1352 | SEC_READONLY
1353 | SEC_LINKER_CREATED))
1354 || !bfd_set_section_alignment (abfd, stub, 3))
1355 {
1356 BFD_ASSERT (0);
b34976b6 1357 return FALSE;
15bda425
JL
1358 }
1359
1360 hppa_info->stub_sec = stub;
1361 }
1362
b34976b6 1363 return TRUE;
15bda425
JL
1364}
1365
1366/* Create sections necessary for dynamic linking. This is only a rough
1367 cut and will likely change as we learn more about the somewhat
1368 unusual dynamic linking scheme HP uses.
1369
1370 .stub:
1371 Contains code to implement cross-space calls. The first time one
1372 of the stubs is used it will call into the dynamic linker, later
1373 calls will go straight to the target.
1374
1375 The only stub we support right now looks like
1376
1377 ldd OFFSET(%dp),%r1
1378 bve %r0(%r1)
1379 ldd OFFSET+8(%dp),%dp
1380
1381 Other stubs may be needed in the future. We may want the remove
1382 the break/nop instruction. It is only used right now to keep the
1383 offset of a .plt entry and a .stub entry in sync.
1384
1385 .dlt:
1386 This is what most people call the .got. HP used a different name.
1387 Losers.
1388
1389 .rela.dlt:
1390 Relocations for the DLT.
1391
1392 .plt:
1393 Function pointers as address,gp pairs.
1394
1395 .rela.plt:
1396 Should contain dynamic IPLT (and EPLT?) relocations.
1397
1398 .opd:
fe8bc63d 1399 FPTRS
15bda425
JL
1400
1401 .rela.opd:
1402 EPLT relocations for symbols exported from shared libraries. */
1403
b34976b6 1404static bfd_boolean
15bda425
JL
1405elf64_hppa_create_dynamic_sections (abfd, info)
1406 bfd *abfd;
1407 struct bfd_link_info *info;
1408{
1409 asection *s;
1410
1411 if (! get_stub (abfd, info, elf64_hppa_hash_table (info)))
b34976b6 1412 return FALSE;
15bda425
JL
1413
1414 if (! get_dlt (abfd, info, elf64_hppa_hash_table (info)))
b34976b6 1415 return FALSE;
15bda425
JL
1416
1417 if (! get_plt (abfd, info, elf64_hppa_hash_table (info)))
b34976b6 1418 return FALSE;
15bda425
JL
1419
1420 if (! get_opd (abfd, info, elf64_hppa_hash_table (info)))
b34976b6 1421 return FALSE;
15bda425
JL
1422
1423 s = bfd_make_section(abfd, ".rela.dlt");
1424 if (s == NULL
1425 || !bfd_set_section_flags (abfd, s, (SEC_ALLOC | SEC_LOAD
1426 | SEC_HAS_CONTENTS
1427 | SEC_IN_MEMORY
1428 | SEC_READONLY
1429 | SEC_LINKER_CREATED))
1430 || !bfd_set_section_alignment (abfd, s, 3))
b34976b6 1431 return FALSE;
15bda425
JL
1432 elf64_hppa_hash_table (info)->dlt_rel_sec = s;
1433
1434 s = bfd_make_section(abfd, ".rela.plt");
1435 if (s == NULL
1436 || !bfd_set_section_flags (abfd, s, (SEC_ALLOC | SEC_LOAD
1437 | SEC_HAS_CONTENTS
1438 | SEC_IN_MEMORY
1439 | SEC_READONLY
1440 | SEC_LINKER_CREATED))
1441 || !bfd_set_section_alignment (abfd, s, 3))
b34976b6 1442 return FALSE;
15bda425
JL
1443 elf64_hppa_hash_table (info)->plt_rel_sec = s;
1444
1445 s = bfd_make_section(abfd, ".rela.data");
1446 if (s == NULL
1447 || !bfd_set_section_flags (abfd, s, (SEC_ALLOC | SEC_LOAD
1448 | SEC_HAS_CONTENTS
1449 | SEC_IN_MEMORY
1450 | SEC_READONLY
1451 | SEC_LINKER_CREATED))
1452 || !bfd_set_section_alignment (abfd, s, 3))
b34976b6 1453 return FALSE;
15bda425
JL
1454 elf64_hppa_hash_table (info)->other_rel_sec = s;
1455
1456 s = bfd_make_section(abfd, ".rela.opd");
1457 if (s == NULL
1458 || !bfd_set_section_flags (abfd, s, (SEC_ALLOC | SEC_LOAD
1459 | SEC_HAS_CONTENTS
1460 | SEC_IN_MEMORY
1461 | SEC_READONLY
1462 | SEC_LINKER_CREATED))
1463 || !bfd_set_section_alignment (abfd, s, 3))
b34976b6 1464 return FALSE;
15bda425
JL
1465 elf64_hppa_hash_table (info)->opd_rel_sec = s;
1466
b34976b6 1467 return TRUE;
15bda425
JL
1468}
1469
1470/* Allocate dynamic relocations for those symbols that turned out
1471 to be dynamic. */
1472
b34976b6 1473static bfd_boolean
15bda425
JL
1474allocate_dynrel_entries (dyn_h, data)
1475 struct elf64_hppa_dyn_hash_entry *dyn_h;
1476 PTR data;
1477{
1478 struct elf64_hppa_allocate_data *x = (struct elf64_hppa_allocate_data *)data;
1479 struct elf64_hppa_link_hash_table *hppa_info;
1480 struct elf64_hppa_dyn_reloc_entry *rent;
b34976b6 1481 bfd_boolean dynamic_symbol, shared;
15bda425
JL
1482
1483 hppa_info = elf64_hppa_hash_table (x->info);
1484 dynamic_symbol = elf64_hppa_dynamic_symbol_p (dyn_h->h, x->info);
1485 shared = x->info->shared;
1486
1487 /* We may need to allocate relocations for a non-dynamic symbol
1488 when creating a shared library. */
1489 if (!dynamic_symbol && !shared)
b34976b6 1490 return TRUE;
15bda425
JL
1491
1492 /* Take care of the normal data relocations. */
1493
1494 for (rent = dyn_h->reloc_entries; rent; rent = rent->next)
1495 {
d663e1cd
JL
1496 /* Allocate one iff we are building a shared library, the relocation
1497 isn't a R_PARISC_FPTR64, or we don't want an opd entry. */
1498 if (!shared && rent->type == R_PARISC_FPTR64 && dyn_h->want_opd)
1499 continue;
1500
15bda425
JL
1501 hppa_info->other_rel_sec->_raw_size += sizeof (Elf64_External_Rela);
1502
1503 /* Make sure this symbol gets into the dynamic symbol table if it is
1504 not already recorded. ?!? This should not be in the loop since
1505 the symbol need only be added once. */
47b7c2db
AM
1506 if (dyn_h->h == 0
1507 || (dyn_h->h->dynindx == -1 && dyn_h->h->type != STT_PARISC_MILLI))
15bda425
JL
1508 if (!_bfd_elf64_link_record_local_dynamic_symbol
1509 (x->info, rent->sec->owner, dyn_h->sym_indx))
b34976b6 1510 return FALSE;
15bda425
JL
1511 }
1512
1513 /* Take care of the GOT and PLT relocations. */
1514
1515 if ((dynamic_symbol || shared) && dyn_h->want_dlt)
1516 hppa_info->dlt_rel_sec->_raw_size += sizeof (Elf64_External_Rela);
1517
1518 /* If we are building a shared library, then every symbol that has an
1519 opd entry will need an EPLT relocation to relocate the symbol's address
1520 and __gp value based on the runtime load address. */
1521 if (shared && dyn_h->want_opd)
1522 hppa_info->opd_rel_sec->_raw_size += sizeof (Elf64_External_Rela);
1523
1524 if (dyn_h->want_plt && dynamic_symbol)
1525 {
1526 bfd_size_type t = 0;
1527
1528 /* Dynamic symbols get one IPLT relocation. Local symbols in
1529 shared libraries get two REL relocations. Local symbols in
1530 main applications get nothing. */
1531 if (dynamic_symbol)
1532 t = sizeof (Elf64_External_Rela);
1533 else if (shared)
1534 t = 2 * sizeof (Elf64_External_Rela);
1535
1536 hppa_info->plt_rel_sec->_raw_size += t;
1537 }
1538
b34976b6 1539 return TRUE;
15bda425
JL
1540}
1541
1542/* Adjust a symbol defined by a dynamic object and referenced by a
1543 regular object. */
1544
b34976b6 1545static bfd_boolean
15bda425 1546elf64_hppa_adjust_dynamic_symbol (info, h)
edd21aca 1547 struct bfd_link_info *info ATTRIBUTE_UNUSED;
15bda425
JL
1548 struct elf_link_hash_entry *h;
1549{
1550 /* ??? Undefined symbols with PLT entries should be re-defined
1551 to be the PLT entry. */
1552
1553 /* If this is a weak symbol, and there is a real definition, the
1554 processor independent code will have arranged for us to see the
1555 real definition first, and we can just use the same value. */
1556 if (h->weakdef != NULL)
1557 {
1558 BFD_ASSERT (h->weakdef->root.type == bfd_link_hash_defined
1559 || h->weakdef->root.type == bfd_link_hash_defweak);
1560 h->root.u.def.section = h->weakdef->root.u.def.section;
1561 h->root.u.def.value = h->weakdef->root.u.def.value;
b34976b6 1562 return TRUE;
15bda425
JL
1563 }
1564
1565 /* If this is a reference to a symbol defined by a dynamic object which
1566 is not a function, we might allocate the symbol in our .dynbss section
1567 and allocate a COPY dynamic relocation.
1568
1569 But PA64 code is canonically PIC, so as a rule we can avoid this sort
1570 of hackery. */
1571
b34976b6 1572 return TRUE;
15bda425
JL
1573}
1574
47b7c2db
AM
1575/* This function is called via elf_link_hash_traverse to mark millicode
1576 symbols with a dynindx of -1 and to remove the string table reference
1577 from the dynamic symbol table. If the symbol is not a millicode symbol,
1578 elf64_hppa_mark_exported_functions is called. */
1579
b34976b6 1580static bfd_boolean
47b7c2db
AM
1581elf64_hppa_mark_milli_and_exported_functions (h, data)
1582 struct elf_link_hash_entry *h;
1583 PTR data;
1584{
1585 struct bfd_link_info *info = (struct bfd_link_info *)data;
1586 struct elf_link_hash_entry *elf = h;
1587
1588 if (elf->root.type == bfd_link_hash_warning)
1589 elf = (struct elf_link_hash_entry *) elf->root.u.i.link;
1590
1591 if (elf->type == STT_PARISC_MILLI)
1592 {
1593 if (elf->dynindx != -1)
1594 {
1595 elf->dynindx = -1;
1596 _bfd_elf_strtab_delref (elf_hash_table (info)->dynstr,
1597 elf->dynstr_index);
1598 }
b34976b6 1599 return TRUE;
47b7c2db
AM
1600 }
1601
1602 return elf64_hppa_mark_exported_functions (h, data);
1603}
1604
15bda425
JL
1605/* Set the final sizes of the dynamic sections and allocate memory for
1606 the contents of our special sections. */
1607
b34976b6 1608static bfd_boolean
15bda425
JL
1609elf64_hppa_size_dynamic_sections (output_bfd, info)
1610 bfd *output_bfd;
1611 struct bfd_link_info *info;
1612{
1613 bfd *dynobj;
1614 asection *s;
b34976b6
AM
1615 bfd_boolean plt;
1616 bfd_boolean relocs;
1617 bfd_boolean reltext;
15bda425
JL
1618 struct elf64_hppa_allocate_data data;
1619 struct elf64_hppa_link_hash_table *hppa_info;
1620
1621 hppa_info = elf64_hppa_hash_table (info);
1622
1623 dynobj = elf_hash_table (info)->dynobj;
1624 BFD_ASSERT (dynobj != NULL);
1625
47b7c2db
AM
1626 /* Mark each function this program exports so that we will allocate
1627 space in the .opd section for each function's FPTR. If we are
1628 creating dynamic sections, change the dynamic index of millicode
1629 symbols to -1 and remove them from the string table for .dynstr.
1630
1631 We have to traverse the main linker hash table since we have to
1632 find functions which may not have been mentioned in any relocs. */
1633 elf_link_hash_traverse (elf_hash_table (info),
1634 (elf_hash_table (info)->dynamic_sections_created
1635 ? elf64_hppa_mark_milli_and_exported_functions
1636 : elf64_hppa_mark_exported_functions),
1637 info);
1638
15bda425
JL
1639 if (elf_hash_table (info)->dynamic_sections_created)
1640 {
1641 /* Set the contents of the .interp section to the interpreter. */
1642 if (! info->shared)
1643 {
1644 s = bfd_get_section_by_name (dynobj, ".interp");
1645 BFD_ASSERT (s != NULL);
1646 s->_raw_size = sizeof ELF_DYNAMIC_INTERPRETER;
1647 s->contents = (unsigned char *) ELF_DYNAMIC_INTERPRETER;
1648 }
1649 }
1650 else
1651 {
1652 /* We may have created entries in the .rela.got section.
1653 However, if we are not creating the dynamic sections, we will
1654 not actually use these entries. Reset the size of .rela.dlt,
1655 which will cause it to get stripped from the output file
1656 below. */
1657 s = bfd_get_section_by_name (dynobj, ".rela.dlt");
1658 if (s != NULL)
1659 s->_raw_size = 0;
1660 }
1661
1662 /* Allocate the GOT entries. */
1663
1664 data.info = info;
1665 if (elf64_hppa_hash_table (info)->dlt_sec)
1666 {
1667 data.ofs = 0x0;
1668 elf64_hppa_dyn_hash_traverse (&hppa_info->dyn_hash_table,
1669 allocate_global_data_dlt, &data);
1670 hppa_info->dlt_sec->_raw_size = data.ofs;
1671
1672 data.ofs = 0x0;
1673 elf64_hppa_dyn_hash_traverse (&hppa_info->dyn_hash_table,
1674 allocate_global_data_plt, &data);
1675 hppa_info->plt_sec->_raw_size = data.ofs;
1676
1677 data.ofs = 0x0;
1678 elf64_hppa_dyn_hash_traverse (&hppa_info->dyn_hash_table,
1679 allocate_global_data_stub, &data);
1680 hppa_info->stub_sec->_raw_size = data.ofs;
1681 }
1682
15bda425
JL
1683 /* Allocate space for entries in the .opd section. */
1684 if (elf64_hppa_hash_table (info)->opd_sec)
1685 {
1686 data.ofs = 0;
1687 elf64_hppa_dyn_hash_traverse (&hppa_info->dyn_hash_table,
1688 allocate_global_data_opd, &data);
1689 hppa_info->opd_sec->_raw_size = data.ofs;
1690 }
1691
1692 /* Now allocate space for dynamic relocations, if necessary. */
1693 if (hppa_info->root.dynamic_sections_created)
1694 elf64_hppa_dyn_hash_traverse (&hppa_info->dyn_hash_table,
1695 allocate_dynrel_entries, &data);
1696
1697 /* The sizes of all the sections are set. Allocate memory for them. */
b34976b6
AM
1698 plt = FALSE;
1699 relocs = FALSE;
1700 reltext = FALSE;
15bda425
JL
1701 for (s = dynobj->sections; s != NULL; s = s->next)
1702 {
1703 const char *name;
b34976b6 1704 bfd_boolean strip;
15bda425
JL
1705
1706 if ((s->flags & SEC_LINKER_CREATED) == 0)
1707 continue;
1708
1709 /* It's OK to base decisions on the section name, because none
1710 of the dynobj section names depend upon the input files. */
1711 name = bfd_get_section_name (dynobj, s);
1712
1713 strip = 0;
1714
1715 if (strcmp (name, ".plt") == 0)
1716 {
d663e1cd 1717 /* Strip this section if we don't need it; see the comment below. */
15bda425
JL
1718 if (s->_raw_size == 0)
1719 {
b34976b6 1720 strip = TRUE;
15bda425
JL
1721 }
1722 else
1723 {
1724 /* Remember whether there is a PLT. */
b34976b6 1725 plt = TRUE;
15bda425
JL
1726 }
1727 }
1728 else if (strcmp (name, ".dlt") == 0)
1729 {
d663e1cd 1730 /* Strip this section if we don't need it; see the comment below. */
15bda425
JL
1731 if (s->_raw_size == 0)
1732 {
b34976b6 1733 strip = TRUE;
15bda425
JL
1734 }
1735 }
1736 else if (strcmp (name, ".opd") == 0)
1737 {
d663e1cd 1738 /* Strip this section if we don't need it; see the comment below. */
15bda425
JL
1739 if (s->_raw_size == 0)
1740 {
b34976b6 1741 strip = TRUE;
15bda425
JL
1742 }
1743 }
d663e1cd 1744 else if (strncmp (name, ".rela", 5) == 0)
15bda425 1745 {
d663e1cd
JL
1746 /* If we don't need this section, strip it from the output file.
1747 This is mostly to handle .rela.bss and .rela.plt. We must
1748 create both sections in create_dynamic_sections, because they
1749 must be created before the linker maps input sections to output
1750 sections. The linker does that before adjust_dynamic_symbol
1751 is called, and it is that function which decides whether
1752 anything needs to go into these sections. */
15bda425
JL
1753 if (s->_raw_size == 0)
1754 {
1755 /* If we don't need this section, strip it from the
1756 output file. This is mostly to handle .rela.bss and
1757 .rela.plt. We must create both sections in
1758 create_dynamic_sections, because they must be created
1759 before the linker maps input sections to output
1760 sections. The linker does that before
1761 adjust_dynamic_symbol is called, and it is that
1762 function which decides whether anything needs to go
1763 into these sections. */
b34976b6 1764 strip = TRUE;
15bda425
JL
1765 }
1766 else
1767 {
1768 asection *target;
1769
1770 /* Remember whether there are any reloc sections other
1771 than .rela.plt. */
1772 if (strcmp (name, ".rela.plt") != 0)
1773 {
1774 const char *outname;
1775
b34976b6 1776 relocs = TRUE;
15bda425
JL
1777
1778 /* If this relocation section applies to a read only
1779 section, then we probably need a DT_TEXTREL
1780 entry. The entries in the .rela.plt section
1781 really apply to the .got section, which we
1782 created ourselves and so know is not readonly. */
1783 outname = bfd_get_section_name (output_bfd,
1784 s->output_section);
1785 target = bfd_get_section_by_name (output_bfd, outname + 4);
1786 if (target != NULL
1787 && (target->flags & SEC_READONLY) != 0
1788 && (target->flags & SEC_ALLOC) != 0)
b34976b6 1789 reltext = TRUE;
15bda425
JL
1790 }
1791
1792 /* We use the reloc_count field as a counter if we need
1793 to copy relocs into the output file. */
1794 s->reloc_count = 0;
1795 }
1796 }
1797 else if (strncmp (name, ".dlt", 4) != 0
1798 && strcmp (name, ".stub") != 0
1799 && strcmp (name, ".got") != 0)
1800 {
1801 /* It's not one of our sections, so don't allocate space. */
1802 continue;
1803 }
1804
1805 if (strip)
1806 {
1807 _bfd_strip_section_from_output (info, s);
1808 continue;
1809 }
1810
1811 /* Allocate memory for the section contents if it has not
832d951b
AM
1812 been allocated already. We use bfd_zalloc here in case
1813 unused entries are not reclaimed before the section's
1814 contents are written out. This should not happen, but this
1815 way if it does, we get a R_PARISC_NONE reloc instead of
1816 garbage. */
15bda425
JL
1817 if (s->contents == NULL)
1818 {
7a9af8c4 1819 s->contents = (bfd_byte *) bfd_zalloc (dynobj, s->_raw_size);
15bda425 1820 if (s->contents == NULL && s->_raw_size != 0)
b34976b6 1821 return FALSE;
15bda425
JL
1822 }
1823 }
1824
1825 if (elf_hash_table (info)->dynamic_sections_created)
1826 {
1827 /* Always create a DT_PLTGOT. It actually has nothing to do with
1828 the PLT, it is how we communicate the __gp value of a load
1829 module to the dynamic linker. */
dc810e39
AM
1830#define add_dynamic_entry(TAG, VAL) \
1831 bfd_elf64_add_dynamic_entry (info, (bfd_vma) (TAG), (bfd_vma) (VAL))
1832
1833 if (!add_dynamic_entry (DT_HP_DLD_FLAGS, 0)
1834 || !add_dynamic_entry (DT_PLTGOT, 0))
b34976b6 1835 return FALSE;
15bda425
JL
1836
1837 /* Add some entries to the .dynamic section. We fill in the
1838 values later, in elf64_hppa_finish_dynamic_sections, but we
1839 must add the entries now so that we get the correct size for
1840 the .dynamic section. The DT_DEBUG entry is filled in by the
1841 dynamic linker and used by the debugger. */
1842 if (! info->shared)
1843 {
dc810e39
AM
1844 if (!add_dynamic_entry (DT_DEBUG, 0)
1845 || !add_dynamic_entry (DT_HP_DLD_HOOK, 0)
1846 || !add_dynamic_entry (DT_HP_LOAD_MAP, 0))
b34976b6 1847 return FALSE;
15bda425
JL
1848 }
1849
f2482cb2
NC
1850 /* Force DT_FLAGS to always be set.
1851 Required by HPUX 11.00 patch PHSS_26559. */
1852 if (!add_dynamic_entry (DT_FLAGS, (info)->flags))
b34976b6 1853 return FALSE;
f2482cb2 1854
15bda425
JL
1855 if (plt)
1856 {
dc810e39
AM
1857 if (!add_dynamic_entry (DT_PLTRELSZ, 0)
1858 || !add_dynamic_entry (DT_PLTREL, DT_RELA)
1859 || !add_dynamic_entry (DT_JMPREL, 0))
b34976b6 1860 return FALSE;
15bda425
JL
1861 }
1862
1863 if (relocs)
1864 {
dc810e39
AM
1865 if (!add_dynamic_entry (DT_RELA, 0)
1866 || !add_dynamic_entry (DT_RELASZ, 0)
1867 || !add_dynamic_entry (DT_RELAENT, sizeof (Elf64_External_Rela)))
b34976b6 1868 return FALSE;
15bda425
JL
1869 }
1870
1871 if (reltext)
1872 {
dc810e39 1873 if (!add_dynamic_entry (DT_TEXTREL, 0))
b34976b6 1874 return FALSE;
d6cf2879 1875 info->flags |= DF_TEXTREL;
15bda425
JL
1876 }
1877 }
dc810e39 1878#undef add_dynamic_entry
15bda425 1879
b34976b6 1880 return TRUE;
15bda425
JL
1881}
1882
1883/* Called after we have output the symbol into the dynamic symbol
1884 table, but before we output the symbol into the normal symbol
1885 table.
1886
1887 For some symbols we had to change their address when outputting
1888 the dynamic symbol table. We undo that change here so that
1889 the symbols have their expected value in the normal symbol
1890 table. Ick. */
1891
b34976b6 1892static bfd_boolean
15bda425 1893elf64_hppa_link_output_symbol_hook (abfd, info, name, sym, input_sec)
edd21aca 1894 bfd *abfd ATTRIBUTE_UNUSED;
15bda425
JL
1895 struct bfd_link_info *info;
1896 const char *name;
1897 Elf_Internal_Sym *sym;
edd21aca 1898 asection *input_sec ATTRIBUTE_UNUSED;
15bda425
JL
1899{
1900 struct elf64_hppa_link_hash_table *hppa_info;
1901 struct elf64_hppa_dyn_hash_entry *dyn_h;
1902
1903 /* We may be called with the file symbol or section symbols.
1904 They never need munging, so it is safe to ignore them. */
1905 if (!name)
b34976b6 1906 return TRUE;
15bda425
JL
1907
1908 /* Get the PA dyn_symbol (if any) associated with NAME. */
1909 hppa_info = elf64_hppa_hash_table (info);
1910 dyn_h = elf64_hppa_dyn_hash_lookup (&hppa_info->dyn_hash_table,
b34976b6 1911 name, FALSE, FALSE);
15bda425 1912
832d951b
AM
1913 /* Function symbols for which we created .opd entries *may* have been
1914 munged by finish_dynamic_symbol and have to be un-munged here.
1915
1916 Note that finish_dynamic_symbol sometimes turns dynamic symbols
1917 into non-dynamic ones, so we initialize st_shndx to -1 in
1918 mark_exported_functions and check to see if it was overwritten
1919 here instead of just checking dyn_h->h->dynindx. */
1920 if (dyn_h && dyn_h->want_opd && dyn_h->st_shndx != -1)
15bda425
JL
1921 {
1922 /* Restore the saved value and section index. */
1923 sym->st_value = dyn_h->st_value;
fe8bc63d 1924 sym->st_shndx = dyn_h->st_shndx;
15bda425
JL
1925 }
1926
b34976b6 1927 return TRUE;
15bda425
JL
1928}
1929
1930/* Finish up dynamic symbol handling. We set the contents of various
1931 dynamic sections here. */
1932
b34976b6 1933static bfd_boolean
15bda425
JL
1934elf64_hppa_finish_dynamic_symbol (output_bfd, info, h, sym)
1935 bfd *output_bfd;
1936 struct bfd_link_info *info;
1937 struct elf_link_hash_entry *h;
1938 Elf_Internal_Sym *sym;
1939{
1940 asection *stub, *splt, *sdlt, *sopd, *spltrel, *sdltrel;
1941 struct elf64_hppa_link_hash_table *hppa_info;
1942 struct elf64_hppa_dyn_hash_entry *dyn_h;
1943
1944 hppa_info = elf64_hppa_hash_table (info);
1945 dyn_h = elf64_hppa_dyn_hash_lookup (&hppa_info->dyn_hash_table,
b34976b6 1946 h->root.root.string, FALSE, FALSE);
15bda425
JL
1947
1948 stub = hppa_info->stub_sec;
1949 splt = hppa_info->plt_sec;
1950 sdlt = hppa_info->dlt_sec;
1951 sopd = hppa_info->opd_sec;
1952 spltrel = hppa_info->plt_rel_sec;
1953 sdltrel = hppa_info->dlt_rel_sec;
1954
15bda425
JL
1955 /* Incredible. It is actually necessary to NOT use the symbol's real
1956 value when building the dynamic symbol table for a shared library.
1957 At least for symbols that refer to functions.
1958
1959 We will store a new value and section index into the symbol long
1960 enough to output it into the dynamic symbol table, then we restore
1961 the original values (in elf64_hppa_link_output_symbol_hook). */
1962 if (dyn_h && dyn_h->want_opd)
1963 {
d663e1cd
JL
1964 BFD_ASSERT (sopd != NULL)
1965
15bda425
JL
1966 /* Save away the original value and section index so that we
1967 can restore them later. */
1968 dyn_h->st_value = sym->st_value;
1969 dyn_h->st_shndx = sym->st_shndx;
1970
1971 /* For the dynamic symbol table entry, we want the value to be
1972 address of this symbol's entry within the .opd section. */
1973 sym->st_value = (dyn_h->opd_offset
1974 + sopd->output_offset
1975 + sopd->output_section->vma);
1976 sym->st_shndx = _bfd_elf_section_from_bfd_section (output_bfd,
1977 sopd->output_section);
1978 }
1979
1980 /* Initialize a .plt entry if requested. */
1981 if (dyn_h && dyn_h->want_plt
1982 && elf64_hppa_dynamic_symbol_p (dyn_h->h, info))
1983 {
1984 bfd_vma value;
1985 Elf_Internal_Rela rel;
947216bf 1986 bfd_byte *loc;
15bda425 1987
d663e1cd
JL
1988 BFD_ASSERT (splt != NULL && spltrel != NULL)
1989
15bda425
JL
1990 /* We do not actually care about the value in the PLT entry
1991 if we are creating a shared library and the symbol is
1992 still undefined, we create a dynamic relocation to fill
1993 in the correct value. */
1994 if (info->shared && h->root.type == bfd_link_hash_undefined)
1995 value = 0;
1996 else
1997 value = (h->root.u.def.value + h->root.u.def.section->vma);
1998
fe8bc63d 1999 /* Fill in the entry in the procedure linkage table.
15bda425
JL
2000
2001 The format of a plt entry is
fe8bc63d 2002 <funcaddr> <__gp>.
15bda425
JL
2003
2004 plt_offset is the offset within the PLT section at which to
fe8bc63d 2005 install the PLT entry.
15bda425
JL
2006
2007 We are modifying the in-memory PLT contents here, so we do not add
2008 in the output_offset of the PLT section. */
2009
2010 bfd_put_64 (splt->owner, value, splt->contents + dyn_h->plt_offset);
2011 value = _bfd_get_gp_value (splt->output_section->owner);
2012 bfd_put_64 (splt->owner, value, splt->contents + dyn_h->plt_offset + 0x8);
2013
2014 /* Create a dynamic IPLT relocation for this entry.
2015
2016 We are creating a relocation in the output file's PLT section,
2017 which is included within the DLT secton. So we do need to include
2018 the PLT's output_offset in the computation of the relocation's
2019 address. */
2020 rel.r_offset = (dyn_h->plt_offset + splt->output_offset
2021 + splt->output_section->vma);
2022 rel.r_info = ELF64_R_INFO (h->dynindx, R_PARISC_IPLT);
2023 rel.r_addend = 0;
2024
947216bf
AM
2025 loc = spltrel->contents;
2026 loc += spltrel->reloc_count++ * sizeof (Elf64_External_Rela);
2027 bfd_elf64_swap_reloca_out (splt->output_section->owner, &rel, loc);
15bda425
JL
2028 }
2029
2030 /* Initialize an external call stub entry if requested. */
2031 if (dyn_h && dyn_h->want_stub
2032 && elf64_hppa_dynamic_symbol_p (dyn_h->h, info))
2033 {
2034 bfd_vma value;
2035 int insn;
b352eebf 2036 unsigned int max_offset;
15bda425 2037
d663e1cd
JL
2038 BFD_ASSERT (stub != NULL)
2039
15bda425
JL
2040 /* Install the generic stub template.
2041
2042 We are modifying the contents of the stub section, so we do not
2043 need to include the stub section's output_offset here. */
2044 memcpy (stub->contents + dyn_h->stub_offset, plt_stub, sizeof (plt_stub));
2045
2046 /* Fix up the first ldd instruction.
2047
2048 We are modifying the contents of the STUB section in memory,
fe8bc63d 2049 so we do not need to include its output offset in this computation.
15bda425
JL
2050
2051 Note the plt_offset value is the value of the PLT entry relative to
2052 the start of the PLT section. These instructions will reference
2053 data relative to the value of __gp, which may not necessarily have
2054 the same address as the start of the PLT section.
2055
2056 gp_offset contains the offset of __gp within the PLT section. */
2057 value = dyn_h->plt_offset - hppa_info->gp_offset;
fe8bc63d 2058
15bda425 2059 insn = bfd_get_32 (stub->owner, stub->contents + dyn_h->stub_offset);
b352eebf
AM
2060 if (output_bfd->arch_info->mach >= 25)
2061 {
2062 /* Wide mode allows 16 bit offsets. */
2063 max_offset = 32768;
2064 insn &= ~ 0xfff1;
dc810e39 2065 insn |= re_assemble_16 ((int) value);
b352eebf
AM
2066 }
2067 else
2068 {
2069 max_offset = 8192;
2070 insn &= ~ 0x3ff1;
dc810e39 2071 insn |= re_assemble_14 ((int) value);
b352eebf
AM
2072 }
2073
2074 if ((value & 7) || value + max_offset >= 2*max_offset - 8)
2075 {
2076 (*_bfd_error_handler) (_("stub entry for %s cannot load .plt, dp offset = %ld"),
2077 dyn_h->root.string,
2078 (long) value);
b34976b6 2079 return FALSE;
b352eebf
AM
2080 }
2081
dc810e39 2082 bfd_put_32 (stub->owner, (bfd_vma) insn,
15bda425
JL
2083 stub->contents + dyn_h->stub_offset);
2084
2085 /* Fix up the second ldd instruction. */
b352eebf 2086 value += 8;
15bda425 2087 insn = bfd_get_32 (stub->owner, stub->contents + dyn_h->stub_offset + 8);
b352eebf
AM
2088 if (output_bfd->arch_info->mach >= 25)
2089 {
2090 insn &= ~ 0xfff1;
dc810e39 2091 insn |= re_assemble_16 ((int) value);
b352eebf
AM
2092 }
2093 else
2094 {
2095 insn &= ~ 0x3ff1;
dc810e39 2096 insn |= re_assemble_14 ((int) value);
b352eebf 2097 }
dc810e39 2098 bfd_put_32 (stub->owner, (bfd_vma) insn,
15bda425
JL
2099 stub->contents + dyn_h->stub_offset + 8);
2100 }
2101
b34976b6 2102 return TRUE;
15bda425
JL
2103}
2104
2105/* The .opd section contains FPTRs for each function this file
2106 exports. Initialize the FPTR entries. */
2107
b34976b6 2108static bfd_boolean
15bda425
JL
2109elf64_hppa_finalize_opd (dyn_h, data)
2110 struct elf64_hppa_dyn_hash_entry *dyn_h;
2111 PTR data;
2112{
2113 struct bfd_link_info *info = (struct bfd_link_info *)data;
2114 struct elf64_hppa_link_hash_table *hppa_info;
3db4b612 2115 struct elf_link_hash_entry *h = dyn_h ? dyn_h->h : NULL;
15bda425
JL
2116 asection *sopd;
2117 asection *sopdrel;
2118
2119 hppa_info = elf64_hppa_hash_table (info);
2120 sopd = hppa_info->opd_sec;
2121 sopdrel = hppa_info->opd_rel_sec;
2122
3db4b612 2123 if (h && dyn_h->want_opd)
15bda425
JL
2124 {
2125 bfd_vma value;
2126
fe8bc63d 2127 /* The first two words of an .opd entry are zero.
15bda425
JL
2128
2129 We are modifying the contents of the OPD section in memory, so we
2130 do not need to include its output offset in this computation. */
2131 memset (sopd->contents + dyn_h->opd_offset, 0, 16);
2132
2133 value = (h->root.u.def.value
2134 + h->root.u.def.section->output_section->vma
2135 + h->root.u.def.section->output_offset);
2136
2137 /* The next word is the address of the function. */
2138 bfd_put_64 (sopd->owner, value, sopd->contents + dyn_h->opd_offset + 16);
2139
2140 /* The last word is our local __gp value. */
2141 value = _bfd_get_gp_value (sopd->output_section->owner);
2142 bfd_put_64 (sopd->owner, value, sopd->contents + dyn_h->opd_offset + 24);
2143 }
2144
2145 /* If we are generating a shared library, we must generate EPLT relocations
2146 for each entry in the .opd, even for static functions (they may have
2147 had their address taken). */
2148 if (info->shared && dyn_h && dyn_h->want_opd)
2149 {
947216bf
AM
2150 Elf_Internal_Rela rel;
2151 bfd_byte *loc;
15bda425
JL
2152 int dynindx;
2153
2154 /* We may need to do a relocation against a local symbol, in
2155 which case we have to look up it's dynamic symbol index off
2156 the local symbol hash table. */
2157 if (h && h->dynindx != -1)
2158 dynindx = h->dynindx;
2159 else
2160 dynindx
2161 = _bfd_elf_link_lookup_local_dynindx (info, dyn_h->owner,
2162 dyn_h->sym_indx);
2163
2164 /* The offset of this relocation is the absolute address of the
2165 .opd entry for this symbol. */
2166 rel.r_offset = (dyn_h->opd_offset + sopd->output_offset
2167 + sopd->output_section->vma);
2168
2169 /* If H is non-null, then we have an external symbol.
2170
2171 It is imperative that we use a different dynamic symbol for the
2172 EPLT relocation if the symbol has global scope.
2173
2174 In the dynamic symbol table, the function symbol will have a value
2175 which is address of the function's .opd entry.
2176
2177 Thus, we can not use that dynamic symbol for the EPLT relocation
2178 (if we did, the data in the .opd would reference itself rather
2179 than the actual address of the function). Instead we have to use
2180 a new dynamic symbol which has the same value as the original global
fe8bc63d 2181 function symbol.
15bda425
JL
2182
2183 We prefix the original symbol with a "." and use the new symbol in
2184 the EPLT relocation. This new symbol has already been recorded in
2185 the symbol table, we just have to look it up and use it.
2186
2187 We do not have such problems with static functions because we do
2188 not make their addresses in the dynamic symbol table point to
2189 the .opd entry. Ultimately this should be safe since a static
2190 function can not be directly referenced outside of its shared
2191 library.
2192
2193 We do have to play similar games for FPTR relocations in shared
2194 libraries, including those for static symbols. See the FPTR
2195 handling in elf64_hppa_finalize_dynreloc. */
2196 if (h)
2197 {
2198 char *new_name;
2199 struct elf_link_hash_entry *nh;
2200
2201 new_name = alloca (strlen (h->root.root.string) + 2);
2202 new_name[0] = '.';
2203 strcpy (new_name + 1, h->root.root.string);
2204
2205 nh = elf_link_hash_lookup (elf_hash_table (info),
b34976b6 2206 new_name, FALSE, FALSE, FALSE);
15bda425
JL
2207
2208 /* All we really want from the new symbol is its dynamic
2209 symbol index. */
2210 dynindx = nh->dynindx;
2211 }
2212
2213 rel.r_addend = 0;
2214 rel.r_info = ELF64_R_INFO (dynindx, R_PARISC_EPLT);
2215
947216bf
AM
2216 loc = sopdrel->contents;
2217 loc += sopdrel->reloc_count++ * sizeof (Elf64_External_Rela);
2218 bfd_elf64_swap_reloca_out (sopd->output_section->owner, &rel, loc);
15bda425 2219 }
b34976b6 2220 return TRUE;
15bda425
JL
2221}
2222
2223/* The .dlt section contains addresses for items referenced through the
2224 dlt. Note that we can have a DLTIND relocation for a local symbol, thus
2225 we can not depend on finish_dynamic_symbol to initialize the .dlt. */
2226
b34976b6 2227static bfd_boolean
15bda425
JL
2228elf64_hppa_finalize_dlt (dyn_h, data)
2229 struct elf64_hppa_dyn_hash_entry *dyn_h;
2230 PTR data;
2231{
2232 struct bfd_link_info *info = (struct bfd_link_info *)data;
2233 struct elf64_hppa_link_hash_table *hppa_info;
2234 asection *sdlt, *sdltrel;
3db4b612 2235 struct elf_link_hash_entry *h = dyn_h ? dyn_h->h : NULL;
15bda425
JL
2236
2237 hppa_info = elf64_hppa_hash_table (info);
2238
2239 sdlt = hppa_info->dlt_sec;
2240 sdltrel = hppa_info->dlt_rel_sec;
2241
2242 /* H/DYN_H may refer to a local variable and we know it's
2243 address, so there is no need to create a relocation. Just install
2244 the proper value into the DLT, note this shortcut can not be
2245 skipped when building a shared library. */
3db4b612 2246 if (! info->shared && h && dyn_h->want_dlt)
15bda425
JL
2247 {
2248 bfd_vma value;
2249
2250 /* If we had an LTOFF_FPTR style relocation we want the DLT entry
fe8bc63d 2251 to point to the FPTR entry in the .opd section.
15bda425
JL
2252
2253 We include the OPD's output offset in this computation as
2254 we are referring to an absolute address in the resulting
2255 object file. */
2256 if (dyn_h->want_opd)
2257 {
2258 value = (dyn_h->opd_offset
2259 + hppa_info->opd_sec->output_offset
2260 + hppa_info->opd_sec->output_section->vma);
2261 }
37f4508b
AM
2262 else if ((h->root.type == bfd_link_hash_defined
2263 || h->root.type == bfd_link_hash_defweak)
2264 && h->root.u.def.section)
15bda425 2265 {
3db4b612 2266 value = h->root.u.def.value + h->root.u.def.section->output_offset;
15bda425
JL
2267 if (h->root.u.def.section->output_section)
2268 value += h->root.u.def.section->output_section->vma;
2269 else
2270 value += h->root.u.def.section->vma;
2271 }
3db4b612
JL
2272 else
2273 /* We have an undefined function reference. */
2274 value = 0;
15bda425
JL
2275
2276 /* We do not need to include the output offset of the DLT section
2277 here because we are modifying the in-memory contents. */
2278 bfd_put_64 (sdlt->owner, value, sdlt->contents + dyn_h->dlt_offset);
2279 }
2280
2281 /* Create a relocation for the DLT entry assocated with this symbol.
2282 When building a shared library the symbol does not have to be dynamic. */
2283 if (dyn_h->want_dlt
2284 && (elf64_hppa_dynamic_symbol_p (dyn_h->h, info) || info->shared))
2285 {
947216bf
AM
2286 Elf_Internal_Rela rel;
2287 bfd_byte *loc;
15bda425
JL
2288 int dynindx;
2289
2290 /* We may need to do a relocation against a local symbol, in
2291 which case we have to look up it's dynamic symbol index off
2292 the local symbol hash table. */
2293 if (h && h->dynindx != -1)
2294 dynindx = h->dynindx;
2295 else
2296 dynindx
2297 = _bfd_elf_link_lookup_local_dynindx (info, dyn_h->owner,
2298 dyn_h->sym_indx);
2299
15bda425
JL
2300 /* Create a dynamic relocation for this entry. Do include the output
2301 offset of the DLT entry since we need an absolute address in the
2302 resulting object file. */
2303 rel.r_offset = (dyn_h->dlt_offset + sdlt->output_offset
2304 + sdlt->output_section->vma);
2305 if (h && h->type == STT_FUNC)
2306 rel.r_info = ELF64_R_INFO (dynindx, R_PARISC_FPTR64);
2307 else
2308 rel.r_info = ELF64_R_INFO (dynindx, R_PARISC_DIR64);
2309 rel.r_addend = 0;
2310
947216bf
AM
2311 loc = sdltrel->contents;
2312 loc += sdltrel->reloc_count++ * sizeof (Elf64_External_Rela);
2313 bfd_elf64_swap_reloca_out (sdlt->output_section->owner, &rel, loc);
15bda425 2314 }
b34976b6 2315 return TRUE;
15bda425
JL
2316}
2317
2318/* Finalize the dynamic relocations. Specifically the FPTR relocations
2319 for dynamic functions used to initialize static data. */
2320
b34976b6 2321static bfd_boolean
15bda425
JL
2322elf64_hppa_finalize_dynreloc (dyn_h, data)
2323 struct elf64_hppa_dyn_hash_entry *dyn_h;
2324 PTR data;
2325{
2326 struct bfd_link_info *info = (struct bfd_link_info *)data;
2327 struct elf64_hppa_link_hash_table *hppa_info;
2328 struct elf_link_hash_entry *h;
2329 int dynamic_symbol;
2330
2331 dynamic_symbol = elf64_hppa_dynamic_symbol_p (dyn_h->h, info);
2332
2333 if (!dynamic_symbol && !info->shared)
b34976b6 2334 return TRUE;
15bda425
JL
2335
2336 if (dyn_h->reloc_entries)
2337 {
2338 struct elf64_hppa_dyn_reloc_entry *rent;
2339 int dynindx;
2340
2341 hppa_info = elf64_hppa_hash_table (info);
2342 h = dyn_h->h;
2343
2344 /* We may need to do a relocation against a local symbol, in
2345 which case we have to look up it's dynamic symbol index off
2346 the local symbol hash table. */
2347 if (h && h->dynindx != -1)
2348 dynindx = h->dynindx;
2349 else
2350 dynindx
2351 = _bfd_elf_link_lookup_local_dynindx (info, dyn_h->owner,
2352 dyn_h->sym_indx);
2353
2354 for (rent = dyn_h->reloc_entries; rent; rent = rent->next)
2355 {
947216bf
AM
2356 Elf_Internal_Rela rel;
2357 bfd_byte *loc;
15bda425 2358
d663e1cd
JL
2359 /* Allocate one iff we are building a shared library, the relocation
2360 isn't a R_PARISC_FPTR64, or we don't want an opd entry. */
2361 if (!info->shared && rent->type == R_PARISC_FPTR64 && dyn_h->want_opd)
2362 continue;
15bda425 2363
fe8bc63d 2364 /* Create a dynamic relocation for this entry.
15bda425
JL
2365
2366 We need the output offset for the reloc's section because
2367 we are creating an absolute address in the resulting object
2368 file. */
2369 rel.r_offset = (rent->offset + rent->sec->output_offset
2370 + rent->sec->output_section->vma);
2371
2372 /* An FPTR64 relocation implies that we took the address of
2373 a function and that the function has an entry in the .opd
2374 section. We want the FPTR64 relocation to reference the
2375 entry in .opd.
2376
2377 We could munge the symbol value in the dynamic symbol table
2378 (in fact we already do for functions with global scope) to point
2379 to the .opd entry. Then we could use that dynamic symbol in
2380 this relocation.
2381
2382 Or we could do something sensible, not munge the symbol's
2383 address and instead just use a different symbol to reference
2384 the .opd entry. At least that seems sensible until you
2385 realize there's no local dynamic symbols we can use for that
2386 purpose. Thus the hair in the check_relocs routine.
fe8bc63d 2387
15bda425
JL
2388 We use a section symbol recorded by check_relocs as the
2389 base symbol for the relocation. The addend is the difference
2390 between the section symbol and the address of the .opd entry. */
3db4b612 2391 if (info->shared && rent->type == R_PARISC_FPTR64 && dyn_h->want_opd)
15bda425
JL
2392 {
2393 bfd_vma value, value2;
15bda425
JL
2394
2395 /* First compute the address of the opd entry for this symbol. */
2396 value = (dyn_h->opd_offset
2397 + hppa_info->opd_sec->output_section->vma
2398 + hppa_info->opd_sec->output_offset);
2399
2400 /* Compute the value of the start of the section with
2401 the relocation. */
2402 value2 = (rent->sec->output_section->vma
2403 + rent->sec->output_offset);
2404
2405 /* Compute the difference between the start of the section
2406 with the relocation and the opd entry. */
2407 value -= value2;
fe8bc63d 2408
15bda425
JL
2409 /* The result becomes the addend of the relocation. */
2410 rel.r_addend = value;
2411
2412 /* The section symbol becomes the symbol for the dynamic
2413 relocation. */
2414 dynindx
2415 = _bfd_elf_link_lookup_local_dynindx (info,
2416 rent->sec->owner,
2417 rent->sec_symndx);
2418 }
2419 else
2420 rel.r_addend = rent->addend;
2421
2422 rel.r_info = ELF64_R_INFO (dynindx, rent->type);
2423
947216bf
AM
2424 loc = hppa_info->other_rel_sec->contents;
2425 loc += (hppa_info->other_rel_sec->reloc_count++
2426 * sizeof (Elf64_External_Rela));
15bda425 2427 bfd_elf64_swap_reloca_out (hppa_info->other_rel_sec->output_section->owner,
947216bf 2428 &rel, loc);
15bda425
JL
2429 }
2430 }
2431
b34976b6 2432 return TRUE;
15bda425
JL
2433}
2434
5ac81c74
JL
2435/* Used to decide how to sort relocs in an optimal manner for the
2436 dynamic linker, before writing them out. */
2437
2438static enum elf_reloc_type_class
2439elf64_hppa_reloc_type_class (rela)
2440 const Elf_Internal_Rela *rela;
2441{
2442 if (ELF64_R_SYM (rela->r_info) == 0)
2443 return reloc_class_relative;
2444
2445 switch ((int) ELF64_R_TYPE (rela->r_info))
2446 {
2447 case R_PARISC_IPLT:
2448 return reloc_class_plt;
2449 case R_PARISC_COPY:
2450 return reloc_class_copy;
2451 default:
2452 return reloc_class_normal;
2453 }
2454}
2455
15bda425
JL
2456/* Finish up the dynamic sections. */
2457
b34976b6 2458static bfd_boolean
15bda425
JL
2459elf64_hppa_finish_dynamic_sections (output_bfd, info)
2460 bfd *output_bfd;
2461 struct bfd_link_info *info;
2462{
2463 bfd *dynobj;
2464 asection *sdyn;
2465 struct elf64_hppa_link_hash_table *hppa_info;
2466
2467 hppa_info = elf64_hppa_hash_table (info);
2468
2469 /* Finalize the contents of the .opd section. */
2470 elf64_hppa_dyn_hash_traverse (&hppa_info->dyn_hash_table,
2471 elf64_hppa_finalize_opd,
2472 info);
2473
2474 elf64_hppa_dyn_hash_traverse (&hppa_info->dyn_hash_table,
2475 elf64_hppa_finalize_dynreloc,
2476 info);
2477
2478 /* Finalize the contents of the .dlt section. */
2479 dynobj = elf_hash_table (info)->dynobj;
2480 /* Finalize the contents of the .dlt section. */
2481 elf64_hppa_dyn_hash_traverse (&hppa_info->dyn_hash_table,
2482 elf64_hppa_finalize_dlt,
2483 info);
2484
15bda425
JL
2485 sdyn = bfd_get_section_by_name (dynobj, ".dynamic");
2486
2487 if (elf_hash_table (info)->dynamic_sections_created)
2488 {
2489 Elf64_External_Dyn *dyncon, *dynconend;
15bda425
JL
2490
2491 BFD_ASSERT (sdyn != NULL);
2492
2493 dyncon = (Elf64_External_Dyn *) sdyn->contents;
2494 dynconend = (Elf64_External_Dyn *) (sdyn->contents + sdyn->_raw_size);
2495 for (; dyncon < dynconend; dyncon++)
2496 {
2497 Elf_Internal_Dyn dyn;
2498 asection *s;
2499
2500 bfd_elf64_swap_dyn_in (dynobj, dyncon, &dyn);
2501
2502 switch (dyn.d_tag)
2503 {
2504 default:
2505 break;
2506
2507 case DT_HP_LOAD_MAP:
2508 /* Compute the absolute address of 16byte scratchpad area
2509 for the dynamic linker.
2510
2511 By convention the linker script will allocate the scratchpad
2512 area at the start of the .data section. So all we have to
2513 to is find the start of the .data section. */
2514 s = bfd_get_section_by_name (output_bfd, ".data");
2515 dyn.d_un.d_ptr = s->vma;
2516 bfd_elf64_swap_dyn_out (output_bfd, &dyn, dyncon);
2517 break;
2518
2519 case DT_PLTGOT:
2520 /* HP's use PLTGOT to set the GOT register. */
2521 dyn.d_un.d_ptr = _bfd_get_gp_value (output_bfd);
2522 bfd_elf64_swap_dyn_out (output_bfd, &dyn, dyncon);
2523 break;
2524
2525 case DT_JMPREL:
2526 s = hppa_info->plt_rel_sec;
2527 dyn.d_un.d_ptr = s->output_section->vma + s->output_offset;
2528 bfd_elf64_swap_dyn_out (output_bfd, &dyn, dyncon);
2529 break;
2530
2531 case DT_PLTRELSZ:
2532 s = hppa_info->plt_rel_sec;
2533 dyn.d_un.d_val = s->_raw_size;
2534 bfd_elf64_swap_dyn_out (output_bfd, &dyn, dyncon);
2535 break;
2536
2537 case DT_RELA:
2538 s = hppa_info->other_rel_sec;
5ac81c74 2539 if (! s || ! s->_raw_size)
15bda425 2540 s = hppa_info->dlt_rel_sec;
5ac81c74
JL
2541 if (! s || ! s->_raw_size)
2542 s = hppa_info->opd_rel_sec;
15bda425
JL
2543 dyn.d_un.d_ptr = s->output_section->vma + s->output_offset;
2544 bfd_elf64_swap_dyn_out (output_bfd, &dyn, dyncon);
2545 break;
2546
2547 case DT_RELASZ:
2548 s = hppa_info->other_rel_sec;
2549 dyn.d_un.d_val = s->_raw_size;
2550 s = hppa_info->dlt_rel_sec;
2551 dyn.d_un.d_val += s->_raw_size;
2552 s = hppa_info->opd_rel_sec;
2553 dyn.d_un.d_val += s->_raw_size;
2554 /* There is some question about whether or not the size of
2555 the PLT relocs should be included here. HP's tools do
2556 it, so we'll emulate them. */
2557 s = hppa_info->plt_rel_sec;
2558 dyn.d_un.d_val += s->_raw_size;
2559 bfd_elf64_swap_dyn_out (output_bfd, &dyn, dyncon);
2560 break;
2561
2562 }
2563 }
2564 }
2565
b34976b6 2566 return TRUE;
15bda425
JL
2567}
2568
15bda425
JL
2569/* Return the number of additional phdrs we will need.
2570
2571 The generic ELF code only creates PT_PHDRs for executables. The HP
fe8bc63d 2572 dynamic linker requires PT_PHDRs for dynamic libraries too.
15bda425
JL
2573
2574 This routine indicates that the backend needs one additional program
2575 header for that case.
2576
2577 Note we do not have access to the link info structure here, so we have
2578 to guess whether or not we are building a shared library based on the
2579 existence of a .interp section. */
2580
2581static int
2582elf64_hppa_additional_program_headers (abfd)
2583 bfd *abfd;
2584{
2585 asection *s;
2586
2587 /* If we are creating a shared library, then we have to create a
2588 PT_PHDR segment. HP's dynamic linker chokes without it. */
2589 s = bfd_get_section_by_name (abfd, ".interp");
2590 if (! s)
2591 return 1;
2592 return 0;
2593}
2594
2595/* Allocate and initialize any program headers required by this
2596 specific backend.
2597
2598 The generic ELF code only creates PT_PHDRs for executables. The HP
fe8bc63d 2599 dynamic linker requires PT_PHDRs for dynamic libraries too.
15bda425
JL
2600
2601 This allocates the PT_PHDR and initializes it in a manner suitable
fe8bc63d 2602 for the HP linker.
15bda425
JL
2603
2604 Note we do not have access to the link info structure here, so we have
2605 to guess whether or not we are building a shared library based on the
2606 existence of a .interp section. */
2607
b34976b6 2608static bfd_boolean
15bda425
JL
2609elf64_hppa_modify_segment_map (abfd)
2610 bfd *abfd;
2611{
edd21aca 2612 struct elf_segment_map *m;
15bda425
JL
2613 asection *s;
2614
2615 s = bfd_get_section_by_name (abfd, ".interp");
2616 if (! s)
2617 {
2618 for (m = elf_tdata (abfd)->segment_map; m != NULL; m = m->next)
2619 if (m->p_type == PT_PHDR)
2620 break;
2621 if (m == NULL)
2622 {
dc810e39
AM
2623 m = ((struct elf_segment_map *)
2624 bfd_zalloc (abfd, (bfd_size_type) sizeof *m));
15bda425 2625 if (m == NULL)
b34976b6 2626 return FALSE;
15bda425
JL
2627
2628 m->p_type = PT_PHDR;
2629 m->p_flags = PF_R | PF_X;
2630 m->p_flags_valid = 1;
2631 m->p_paddr_valid = 1;
2632 m->includes_phdrs = 1;
2633
2634 m->next = elf_tdata (abfd)->segment_map;
2635 elf_tdata (abfd)->segment_map = m;
2636 }
2637 }
2638
2639 for (m = elf_tdata (abfd)->segment_map; m != NULL; m = m->next)
2640 if (m->p_type == PT_LOAD)
2641 {
0ba2a60e 2642 unsigned int i;
15bda425
JL
2643
2644 for (i = 0; i < m->count; i++)
2645 {
2646 /* The code "hint" is not really a hint. It is a requirement
2647 for certain versions of the HP dynamic linker. Worse yet,
2648 it must be set even if the shared library does not have
2649 any code in its "text" segment (thus the check for .hash
2650 to catch this situation). */
2651 if (m->sections[i]->flags & SEC_CODE
2652 || (strcmp (m->sections[i]->name, ".hash") == 0))
2653 m->p_flags |= (PF_X | PF_HP_CODE);
2654 }
2655 }
2656
b34976b6 2657 return TRUE;
15bda425
JL
2658}
2659
3fab46d0
AM
2660/* Called when writing out an object file to decide the type of a
2661 symbol. */
2662static int
2663elf64_hppa_elf_get_symbol_type (elf_sym, type)
2664 Elf_Internal_Sym *elf_sym;
2665 int type;
2666{
2667 if (ELF_ST_TYPE (elf_sym->st_info) == STT_PARISC_MILLI)
2668 return STT_PARISC_MILLI;
2669 else
2670 return type;
2671}
2672
2f89ff8d
L
2673static struct bfd_elf_special_section const elf64_hppa_special_sections[]=
2674{
2675 { ".fini", 0, NULL, 0,
2676 SHT_PROGBITS, SHF_ALLOC + SHF_WRITE },
2677 { ".init", 0, NULL, 0,
2678 SHT_PROGBITS, SHF_ALLOC + SHF_WRITE },
2679 { NULL, 0, NULL, 0,
2680 0, 0 }
2681};
2682
15bda425
JL
2683/* The hash bucket size is the standard one, namely 4. */
2684
2685const struct elf_size_info hppa64_elf_size_info =
2686{
2687 sizeof (Elf64_External_Ehdr),
2688 sizeof (Elf64_External_Phdr),
2689 sizeof (Elf64_External_Shdr),
2690 sizeof (Elf64_External_Rel),
2691 sizeof (Elf64_External_Rela),
2692 sizeof (Elf64_External_Sym),
2693 sizeof (Elf64_External_Dyn),
2694 sizeof (Elf_External_Note),
2695 4,
2696 1,
45d6a902 2697 64, 3,
15bda425
JL
2698 ELFCLASS64, EV_CURRENT,
2699 bfd_elf64_write_out_phdrs,
2700 bfd_elf64_write_shdrs_and_ehdr,
2701 bfd_elf64_write_relocs,
73ff0d56 2702 bfd_elf64_swap_symbol_in,
15bda425
JL
2703 bfd_elf64_swap_symbol_out,
2704 bfd_elf64_slurp_reloc_table,
2705 bfd_elf64_slurp_symbol_table,
2706 bfd_elf64_swap_dyn_in,
2707 bfd_elf64_swap_dyn_out,
947216bf
AM
2708 bfd_elf64_swap_reloc_in,
2709 bfd_elf64_swap_reloc_out,
2710 bfd_elf64_swap_reloca_in,
2711 bfd_elf64_swap_reloca_out
15bda425
JL
2712};
2713
2714#define TARGET_BIG_SYM bfd_elf64_hppa_vec
2715#define TARGET_BIG_NAME "elf64-hppa"
2716#define ELF_ARCH bfd_arch_hppa
2717#define ELF_MACHINE_CODE EM_PARISC
2718/* This is not strictly correct. The maximum page size for PA2.0 is
2719 64M. But everything still uses 4k. */
2720#define ELF_MAXPAGESIZE 0x1000
2721#define bfd_elf64_bfd_reloc_type_lookup elf_hppa_reloc_type_lookup
2722#define bfd_elf64_bfd_is_local_label_name elf_hppa_is_local_label_name
2723#define elf_info_to_howto elf_hppa_info_to_howto
2724#define elf_info_to_howto_rel elf_hppa_info_to_howto_rel
2725
2726#define elf_backend_section_from_shdr elf64_hppa_section_from_shdr
2727#define elf_backend_object_p elf64_hppa_object_p
2728#define elf_backend_final_write_processing \
2729 elf_hppa_final_write_processing
99c79b2e 2730#define elf_backend_fake_sections elf_hppa_fake_sections
15bda425
JL
2731#define elf_backend_add_symbol_hook elf_hppa_add_symbol_hook
2732
f0fe0e16 2733#define elf_backend_relocate_section elf_hppa_relocate_section
15bda425
JL
2734
2735#define bfd_elf64_bfd_final_link elf_hppa_final_link
2736
2737#define elf_backend_create_dynamic_sections \
2738 elf64_hppa_create_dynamic_sections
2739#define elf_backend_post_process_headers elf64_hppa_post_process_headers
2740
2741#define elf_backend_adjust_dynamic_symbol \
2742 elf64_hppa_adjust_dynamic_symbol
2743
2744#define elf_backend_size_dynamic_sections \
2745 elf64_hppa_size_dynamic_sections
2746
2747#define elf_backend_finish_dynamic_symbol \
2748 elf64_hppa_finish_dynamic_symbol
2749#define elf_backend_finish_dynamic_sections \
2750 elf64_hppa_finish_dynamic_sections
2751
2752/* Stuff for the BFD linker: */
2753#define bfd_elf64_bfd_link_hash_table_create \
2754 elf64_hppa_hash_table_create
2755
2756#define elf_backend_check_relocs \
2757 elf64_hppa_check_relocs
2758
2759#define elf_backend_size_info \
2760 hppa64_elf_size_info
2761
2762#define elf_backend_additional_program_headers \
2763 elf64_hppa_additional_program_headers
2764
2765#define elf_backend_modify_segment_map \
2766 elf64_hppa_modify_segment_map
2767
2768#define elf_backend_link_output_symbol_hook \
2769 elf64_hppa_link_output_symbol_hook
2770
15bda425
JL
2771#define elf_backend_want_got_plt 0
2772#define elf_backend_plt_readonly 0
2773#define elf_backend_want_plt_sym 0
2774#define elf_backend_got_header_size 0
2775#define elf_backend_plt_header_size 0
b34976b6
AM
2776#define elf_backend_type_change_ok TRUE
2777#define elf_backend_get_symbol_type elf64_hppa_elf_get_symbol_type
2778#define elf_backend_reloc_type_class elf64_hppa_reloc_type_class
2779#define elf_backend_rela_normal 1
2f89ff8d 2780#define elf_backend_special_sections elf64_hppa_special_sections
15bda425
JL
2781
2782#include "elf64-target.h"
d952f17a
AM
2783
2784#undef TARGET_BIG_SYM
2785#define TARGET_BIG_SYM bfd_elf64_hppa_linux_vec
2786#undef TARGET_BIG_NAME
2787#define TARGET_BIG_NAME "elf64-hppa-linux"
2788
2f89ff8d
L
2789#undef elf_backend_special_sections
2790
d952f17a
AM
2791#define INCLUDED_TARGET_FILE 1
2792#include "elf64-target.h"
This page took 0.317866 seconds and 4 git commands to generate.