ELF: Move dyn_relocs to struct elf_link_hash_entry
[deliverable/binutils-gdb.git] / bfd / elf32-hppa.c
1 /* BFD back-end for HP PA-RISC ELF files.
2 Copyright (C) 1990-2020 Free Software Foundation, Inc.
3
4 Original code by
5 Center for Software Science
6 Department of Computer Science
7 University of Utah
8 Largely rewritten by Alan Modra <alan@linuxcare.com.au>
9 Naming cleanup by Carlos O'Donell <carlos@systemhalted.org>
10 TLS support written by Randolph Chung <tausq@debian.org>
11
12 This file is part of BFD, the Binary File Descriptor library.
13
14 This program is free software; you can redistribute it and/or modify
15 it under the terms of the GNU General Public License as published by
16 the Free Software Foundation; either version 3 of the License, or
17 (at your option) any later version.
18
19 This program is distributed in the hope that it will be useful,
20 but WITHOUT ANY WARRANTY; without even the implied warranty of
21 MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
22 GNU General Public License for more details.
23
24 You should have received a copy of the GNU General Public License
25 along with this program; if not, write to the Free Software
26 Foundation, Inc., 51 Franklin Street - Fifth Floor, Boston,
27 MA 02110-1301, USA. */
28
29 #include "sysdep.h"
30 #include "bfd.h"
31 #include "libbfd.h"
32 #include "elf-bfd.h"
33 #include "elf/hppa.h"
34 #include "libhppa.h"
35 #include "elf32-hppa.h"
36 #define ARCH_SIZE 32
37 #include "elf32-hppa.h"
38 #include "elf-hppa.h"
39
40 /* In order to gain some understanding of code in this file without
41 knowing all the intricate details of the linker, note the
42 following:
43
44 Functions named elf32_hppa_* are called by external routines, other
45 functions are only called locally. elf32_hppa_* functions appear
46 in this file more or less in the order in which they are called
47 from external routines. eg. elf32_hppa_check_relocs is called
48 early in the link process, elf32_hppa_finish_dynamic_sections is
49 one of the last functions. */
50
51 /* We use two hash tables to hold information for linking PA ELF objects.
52
53 The first is the elf32_hppa_link_hash_table which is derived
54 from the standard ELF linker hash table. We use this as a place to
55 attach other hash tables and static information.
56
57 The second is the stub hash table which is derived from the
58 base BFD hash table. The stub hash table holds the information
59 necessary to build the linker stubs during a link.
60
61 There are a number of different stubs generated by the linker.
62
63 Long branch stub:
64 : ldil LR'X,%r1
65 : be,n RR'X(%sr4,%r1)
66
67 PIC long branch stub:
68 : b,l .+8,%r1
69 : addil LR'X - ($PIC_pcrel$0 - 4),%r1
70 : be,n RR'X - ($PIC_pcrel$0 - 8)(%sr4,%r1)
71
72 Import stub to call shared library routine from normal object file
73 (single sub-space version)
74 : addil LR'lt_ptr+ltoff,%dp ; get PLT address
75 : ldo RR'lt_ptr+ltoff(%r1),%r22 ;
76 : ldw 0(%r22),%r21 ; get procedure entry point
77 : bv %r0(%r21)
78 : ldw 4(%r22),%r19 ; get new dlt value.
79
80 Import stub to call shared library routine from shared library
81 (single sub-space version)
82 : addil LR'ltoff,%r19 ; get PLT address
83 : ldo RR'ltoff(%r1),%r22
84 : ldw 0(%r22),%r21 ; get procedure entry point
85 : bv %r0(%r21)
86 : ldw 4(%r22),%r19 ; get new dlt value.
87
88 Import stub to call shared library routine from normal object file
89 (multiple sub-space support)
90 : addil LR'lt_ptr+ltoff,%dp ; get PLT address
91 : ldo RR'lt_ptr+ltoff(%r1),%r22 ;
92 : ldw 0(%r22),%r21 ; get procedure entry point
93 : ldsid (%r21),%r1 ; get target sid
94 : ldw 4(%r22),%r19 ; get new dlt value.
95 : mtsp %r1,%sr0
96 : be 0(%sr0,%r21) ; branch to target
97 : stw %rp,-24(%sp) ; save rp
98
99 Import stub to call shared library routine from shared library
100 (multiple sub-space support)
101 : addil LR'ltoff,%r19 ; get PLT address
102 : ldo RR'ltoff(%r1),%r22
103 : ldw 0(%r22),%r21 ; get procedure entry point
104 : ldsid (%r21),%r1 ; get target sid
105 : ldw 4(%r22),%r19 ; get new dlt value.
106 : mtsp %r1,%sr0
107 : be 0(%sr0,%r21) ; branch to target
108 : stw %rp,-24(%sp) ; save rp
109
110 Export stub to return from shared lib routine (multiple sub-space support)
111 One of these is created for each exported procedure in a shared
112 library (and stored in the shared lib). Shared lib routines are
113 called via the first instruction in the export stub so that we can
114 do an inter-space return. Not required for single sub-space.
115 : bl,n X,%rp ; trap the return
116 : nop
117 : ldw -24(%sp),%rp ; restore the original rp
118 : ldsid (%rp),%r1
119 : mtsp %r1,%sr0
120 : be,n 0(%sr0,%rp) ; inter-space return. */
121
122
123 /* Variable names follow a coding style.
124 Please follow this (Apps Hungarian) style:
125
126 Structure/Variable Prefix
127 elf_link_hash_table "etab"
128 elf_link_hash_entry "eh"
129
130 elf32_hppa_link_hash_table "htab"
131 elf32_hppa_link_hash_entry "hh"
132
133 bfd_hash_table "btab"
134 bfd_hash_entry "bh"
135
136 bfd_hash_table containing stubs "bstab"
137 elf32_hppa_stub_hash_entry "hsh"
138
139 Always remember to use GNU Coding Style. */
140
141 #define PLT_ENTRY_SIZE 8
142 #define GOT_ENTRY_SIZE 4
143 #define LONG_BRANCH_STUB_SIZE 8
144 #define LONG_BRANCH_SHARED_STUB_SIZE 12
145 #define IMPORT_STUB_SIZE 20
146 #define IMPORT_SHARED_STUB_SIZE 32
147 #define EXPORT_STUB_SIZE 24
148 #define ELF_DYNAMIC_INTERPRETER "/lib/ld.so.1"
149
150 static const bfd_byte plt_stub[] =
151 {
152 0x0e, 0x80, 0x10, 0x95, /* 1: ldw 0(%r20),%r21 */
153 0xea, 0xa0, 0xc0, 0x00, /* bv %r0(%r21) */
154 0x0e, 0x88, 0x10, 0x95, /* ldw 4(%r20),%r21 */
155 #define PLT_STUB_ENTRY (3*4)
156 0xea, 0x9f, 0x1f, 0xdd, /* b,l 1b,%r20 */
157 0xd6, 0x80, 0x1c, 0x1e, /* depi 0,31,2,%r20 */
158 0x00, 0xc0, 0xff, 0xee, /* 9: .word fixup_func */
159 0xde, 0xad, 0xbe, 0xef /* .word fixup_ltp */
160 };
161
162 /* Section name for stubs is the associated section name plus this
163 string. */
164 #define STUB_SUFFIX ".stub"
165
166 /* We don't need to copy certain PC- or GP-relative dynamic relocs
167 into a shared object's dynamic section. All the relocs of the
168 limited class we are interested in, are absolute. */
169 #ifndef RELATIVE_DYNRELOCS
170 #define RELATIVE_DYNRELOCS 0
171 #define IS_ABSOLUTE_RELOC(r_type) 1
172 #define pc_dynrelocs(hh) 0
173 #endif
174
175 /* If ELIMINATE_COPY_RELOCS is non-zero, the linker will try to avoid
176 copying dynamic variables from a shared lib into an app's dynbss
177 section, and instead use a dynamic relocation to point into the
178 shared lib. */
179 #define ELIMINATE_COPY_RELOCS 1
180
181 enum elf32_hppa_stub_type
182 {
183 hppa_stub_long_branch,
184 hppa_stub_long_branch_shared,
185 hppa_stub_import,
186 hppa_stub_import_shared,
187 hppa_stub_export,
188 hppa_stub_none
189 };
190
191 struct elf32_hppa_stub_hash_entry
192 {
193 /* Base hash table entry structure. */
194 struct bfd_hash_entry bh_root;
195
196 /* The stub section. */
197 asection *stub_sec;
198
199 /* Offset within stub_sec of the beginning of this stub. */
200 bfd_vma stub_offset;
201
202 /* Given the symbol's value and its section we can determine its final
203 value when building the stubs (so the stub knows where to jump. */
204 bfd_vma target_value;
205 asection *target_section;
206
207 enum elf32_hppa_stub_type stub_type;
208
209 /* The symbol table entry, if any, that this was derived from. */
210 struct elf32_hppa_link_hash_entry *hh;
211
212 /* Where this stub is being called from, or, in the case of combined
213 stub sections, the first input section in the group. */
214 asection *id_sec;
215 };
216
217 enum _tls_type
218 {
219 GOT_UNKNOWN = 0,
220 GOT_NORMAL = 1,
221 GOT_TLS_GD = 2,
222 GOT_TLS_LDM = 4,
223 GOT_TLS_IE = 8
224 };
225
226 struct elf32_hppa_link_hash_entry
227 {
228 struct elf_link_hash_entry eh;
229
230 /* A pointer to the most recently used stub hash entry against this
231 symbol. */
232 struct elf32_hppa_stub_hash_entry *hsh_cache;
233
234 ENUM_BITFIELD (_tls_type) tls_type : 8;
235
236 /* Set if this symbol is used by a plabel reloc. */
237 unsigned int plabel:1;
238 };
239
240 struct elf32_hppa_link_hash_table
241 {
242 /* The main hash table. */
243 struct elf_link_hash_table etab;
244
245 /* The stub hash table. */
246 struct bfd_hash_table bstab;
247
248 /* Linker stub bfd. */
249 bfd *stub_bfd;
250
251 /* Linker call-backs. */
252 asection * (*add_stub_section) (const char *, asection *);
253 void (*layout_sections_again) (void);
254
255 /* Array to keep track of which stub sections have been created, and
256 information on stub grouping. */
257 struct map_stub
258 {
259 /* This is the section to which stubs in the group will be
260 attached. */
261 asection *link_sec;
262 /* The stub section. */
263 asection *stub_sec;
264 } *stub_group;
265
266 /* Assorted information used by elf32_hppa_size_stubs. */
267 unsigned int bfd_count;
268 unsigned int top_index;
269 asection **input_list;
270 Elf_Internal_Sym **all_local_syms;
271
272 /* Used during a final link to store the base of the text and data
273 segments so that we can perform SEGREL relocations. */
274 bfd_vma text_segment_base;
275 bfd_vma data_segment_base;
276
277 /* Whether we support multiple sub-spaces for shared libs. */
278 unsigned int multi_subspace:1;
279
280 /* Flags set when various size branches are detected. Used to
281 select suitable defaults for the stub group size. */
282 unsigned int has_12bit_branch:1;
283 unsigned int has_17bit_branch:1;
284 unsigned int has_22bit_branch:1;
285
286 /* Set if we need a .plt stub to support lazy dynamic linking. */
287 unsigned int need_plt_stub:1;
288
289 /* Small local sym cache. */
290 struct sym_cache sym_cache;
291
292 /* Data for LDM relocations. */
293 union
294 {
295 bfd_signed_vma refcount;
296 bfd_vma offset;
297 } tls_ldm_got;
298 };
299
300 /* Various hash macros and functions. */
301 #define hppa_link_hash_table(p) \
302 (elf_hash_table_id ((struct elf_link_hash_table *) ((p)->hash)) \
303 == HPPA32_ELF_DATA ? ((struct elf32_hppa_link_hash_table *) ((p)->hash)) : NULL)
304
305 #define hppa_elf_hash_entry(ent) \
306 ((struct elf32_hppa_link_hash_entry *)(ent))
307
308 #define hppa_stub_hash_entry(ent) \
309 ((struct elf32_hppa_stub_hash_entry *)(ent))
310
311 #define hppa_stub_hash_lookup(table, string, create, copy) \
312 ((struct elf32_hppa_stub_hash_entry *) \
313 bfd_hash_lookup ((table), (string), (create), (copy)))
314
315 #define hppa_elf_local_got_tls_type(abfd) \
316 ((char *)(elf_local_got_offsets (abfd) + (elf_tdata (abfd)->symtab_hdr.sh_info * 2)))
317
318 #define hh_name(hh) \
319 (hh ? hh->eh.root.root.string : "<undef>")
320
321 #define eh_name(eh) \
322 (eh ? eh->root.root.string : "<undef>")
323
324 /* Assorted hash table functions. */
325
326 /* Initialize an entry in the stub hash table. */
327
328 static struct bfd_hash_entry *
329 stub_hash_newfunc (struct bfd_hash_entry *entry,
330 struct bfd_hash_table *table,
331 const char *string)
332 {
333 /* Allocate the structure if it has not already been allocated by a
334 subclass. */
335 if (entry == NULL)
336 {
337 entry = bfd_hash_allocate (table,
338 sizeof (struct elf32_hppa_stub_hash_entry));
339 if (entry == NULL)
340 return entry;
341 }
342
343 /* Call the allocation method of the superclass. */
344 entry = bfd_hash_newfunc (entry, table, string);
345 if (entry != NULL)
346 {
347 struct elf32_hppa_stub_hash_entry *hsh;
348
349 /* Initialize the local fields. */
350 hsh = hppa_stub_hash_entry (entry);
351 hsh->stub_sec = NULL;
352 hsh->stub_offset = 0;
353 hsh->target_value = 0;
354 hsh->target_section = NULL;
355 hsh->stub_type = hppa_stub_long_branch;
356 hsh->hh = NULL;
357 hsh->id_sec = NULL;
358 }
359
360 return entry;
361 }
362
363 /* Initialize an entry in the link hash table. */
364
365 static struct bfd_hash_entry *
366 hppa_link_hash_newfunc (struct bfd_hash_entry *entry,
367 struct bfd_hash_table *table,
368 const char *string)
369 {
370 /* Allocate the structure if it has not already been allocated by a
371 subclass. */
372 if (entry == NULL)
373 {
374 entry = bfd_hash_allocate (table,
375 sizeof (struct elf32_hppa_link_hash_entry));
376 if (entry == NULL)
377 return entry;
378 }
379
380 /* Call the allocation method of the superclass. */
381 entry = _bfd_elf_link_hash_newfunc (entry, table, string);
382 if (entry != NULL)
383 {
384 struct elf32_hppa_link_hash_entry *hh;
385
386 /* Initialize the local fields. */
387 hh = hppa_elf_hash_entry (entry);
388 hh->hsh_cache = NULL;
389 hh->plabel = 0;
390 hh->tls_type = GOT_UNKNOWN;
391 }
392
393 return entry;
394 }
395
396 /* Free the derived linker hash table. */
397
398 static void
399 elf32_hppa_link_hash_table_free (bfd *obfd)
400 {
401 struct elf32_hppa_link_hash_table *htab
402 = (struct elf32_hppa_link_hash_table *) obfd->link.hash;
403
404 bfd_hash_table_free (&htab->bstab);
405 _bfd_elf_link_hash_table_free (obfd);
406 }
407
408 /* Create the derived linker hash table. The PA ELF port uses the derived
409 hash table to keep information specific to the PA ELF linker (without
410 using static variables). */
411
412 static struct bfd_link_hash_table *
413 elf32_hppa_link_hash_table_create (bfd *abfd)
414 {
415 struct elf32_hppa_link_hash_table *htab;
416 size_t amt = sizeof (*htab);
417
418 htab = bfd_zmalloc (amt);
419 if (htab == NULL)
420 return NULL;
421
422 if (!_bfd_elf_link_hash_table_init (&htab->etab, abfd, hppa_link_hash_newfunc,
423 sizeof (struct elf32_hppa_link_hash_entry),
424 HPPA32_ELF_DATA))
425 {
426 free (htab);
427 return NULL;
428 }
429
430 /* Init the stub hash table too. */
431 if (!bfd_hash_table_init (&htab->bstab, stub_hash_newfunc,
432 sizeof (struct elf32_hppa_stub_hash_entry)))
433 {
434 _bfd_elf_link_hash_table_free (abfd);
435 return NULL;
436 }
437 htab->etab.root.hash_table_free = elf32_hppa_link_hash_table_free;
438
439 htab->text_segment_base = (bfd_vma) -1;
440 htab->data_segment_base = (bfd_vma) -1;
441 return &htab->etab.root;
442 }
443
444 /* Initialize the linker stubs BFD so that we can use it for linker
445 created dynamic sections. */
446
447 void
448 elf32_hppa_init_stub_bfd (bfd *abfd, struct bfd_link_info *info)
449 {
450 struct elf32_hppa_link_hash_table *htab = hppa_link_hash_table (info);
451
452 elf_elfheader (abfd)->e_ident[EI_CLASS] = ELFCLASS32;
453 htab->etab.dynobj = abfd;
454 }
455
456 /* Build a name for an entry in the stub hash table. */
457
458 static char *
459 hppa_stub_name (const asection *input_section,
460 const asection *sym_sec,
461 const struct elf32_hppa_link_hash_entry *hh,
462 const Elf_Internal_Rela *rela)
463 {
464 char *stub_name;
465 bfd_size_type len;
466
467 if (hh)
468 {
469 len = 8 + 1 + strlen (hh_name (hh)) + 1 + 8 + 1;
470 stub_name = bfd_malloc (len);
471 if (stub_name != NULL)
472 sprintf (stub_name, "%08x_%s+%x",
473 input_section->id & 0xffffffff,
474 hh_name (hh),
475 (int) rela->r_addend & 0xffffffff);
476 }
477 else
478 {
479 len = 8 + 1 + 8 + 1 + 8 + 1 + 8 + 1;
480 stub_name = bfd_malloc (len);
481 if (stub_name != NULL)
482 sprintf (stub_name, "%08x_%x:%x+%x",
483 input_section->id & 0xffffffff,
484 sym_sec->id & 0xffffffff,
485 (int) ELF32_R_SYM (rela->r_info) & 0xffffffff,
486 (int) rela->r_addend & 0xffffffff);
487 }
488 return stub_name;
489 }
490
491 /* Look up an entry in the stub hash. Stub entries are cached because
492 creating the stub name takes a bit of time. */
493
494 static struct elf32_hppa_stub_hash_entry *
495 hppa_get_stub_entry (const asection *input_section,
496 const asection *sym_sec,
497 struct elf32_hppa_link_hash_entry *hh,
498 const Elf_Internal_Rela *rela,
499 struct elf32_hppa_link_hash_table *htab)
500 {
501 struct elf32_hppa_stub_hash_entry *hsh_entry;
502 const asection *id_sec;
503
504 /* If this input section is part of a group of sections sharing one
505 stub section, then use the id of the first section in the group.
506 Stub names need to include a section id, as there may well be
507 more than one stub used to reach say, printf, and we need to
508 distinguish between them. */
509 id_sec = htab->stub_group[input_section->id].link_sec;
510 if (id_sec == NULL)
511 return NULL;
512
513 if (hh != NULL && hh->hsh_cache != NULL
514 && hh->hsh_cache->hh == hh
515 && hh->hsh_cache->id_sec == id_sec)
516 {
517 hsh_entry = hh->hsh_cache;
518 }
519 else
520 {
521 char *stub_name;
522
523 stub_name = hppa_stub_name (id_sec, sym_sec, hh, rela);
524 if (stub_name == NULL)
525 return NULL;
526
527 hsh_entry = hppa_stub_hash_lookup (&htab->bstab,
528 stub_name, FALSE, FALSE);
529 if (hh != NULL)
530 hh->hsh_cache = hsh_entry;
531
532 free (stub_name);
533 }
534
535 return hsh_entry;
536 }
537
538 /* Add a new stub entry to the stub hash. Not all fields of the new
539 stub entry are initialised. */
540
541 static struct elf32_hppa_stub_hash_entry *
542 hppa_add_stub (const char *stub_name,
543 asection *section,
544 struct elf32_hppa_link_hash_table *htab)
545 {
546 asection *link_sec;
547 asection *stub_sec;
548 struct elf32_hppa_stub_hash_entry *hsh;
549
550 link_sec = htab->stub_group[section->id].link_sec;
551 stub_sec = htab->stub_group[section->id].stub_sec;
552 if (stub_sec == NULL)
553 {
554 stub_sec = htab->stub_group[link_sec->id].stub_sec;
555 if (stub_sec == NULL)
556 {
557 size_t namelen;
558 bfd_size_type len;
559 char *s_name;
560
561 namelen = strlen (link_sec->name);
562 len = namelen + sizeof (STUB_SUFFIX);
563 s_name = bfd_alloc (htab->stub_bfd, len);
564 if (s_name == NULL)
565 return NULL;
566
567 memcpy (s_name, link_sec->name, namelen);
568 memcpy (s_name + namelen, STUB_SUFFIX, sizeof (STUB_SUFFIX));
569 stub_sec = (*htab->add_stub_section) (s_name, link_sec);
570 if (stub_sec == NULL)
571 return NULL;
572 htab->stub_group[link_sec->id].stub_sec = stub_sec;
573 }
574 htab->stub_group[section->id].stub_sec = stub_sec;
575 }
576
577 /* Enter this entry into the linker stub hash table. */
578 hsh = hppa_stub_hash_lookup (&htab->bstab, stub_name,
579 TRUE, FALSE);
580 if (hsh == NULL)
581 {
582 /* xgettext:c-format */
583 _bfd_error_handler (_("%pB: cannot create stub entry %s"),
584 section->owner, stub_name);
585 return NULL;
586 }
587
588 hsh->stub_sec = stub_sec;
589 hsh->stub_offset = 0;
590 hsh->id_sec = link_sec;
591 return hsh;
592 }
593
594 /* Determine the type of stub needed, if any, for a call. */
595
596 static enum elf32_hppa_stub_type
597 hppa_type_of_stub (asection *input_sec,
598 const Elf_Internal_Rela *rela,
599 struct elf32_hppa_link_hash_entry *hh,
600 bfd_vma destination,
601 struct bfd_link_info *info)
602 {
603 bfd_vma location;
604 bfd_vma branch_offset;
605 bfd_vma max_branch_offset;
606 unsigned int r_type;
607
608 if (hh != NULL
609 && hh->eh.plt.offset != (bfd_vma) -1
610 && hh->eh.dynindx != -1
611 && !hh->plabel
612 && (bfd_link_pic (info)
613 || !hh->eh.def_regular
614 || hh->eh.root.type == bfd_link_hash_defweak))
615 {
616 /* We need an import stub. Decide between hppa_stub_import
617 and hppa_stub_import_shared later. */
618 return hppa_stub_import;
619 }
620
621 if (destination == (bfd_vma) -1)
622 return hppa_stub_none;
623
624 /* Determine where the call point is. */
625 location = (input_sec->output_offset
626 + input_sec->output_section->vma
627 + rela->r_offset);
628
629 branch_offset = destination - location - 8;
630 r_type = ELF32_R_TYPE (rela->r_info);
631
632 /* Determine if a long branch stub is needed. parisc branch offsets
633 are relative to the second instruction past the branch, ie. +8
634 bytes on from the branch instruction location. The offset is
635 signed and counts in units of 4 bytes. */
636 if (r_type == (unsigned int) R_PARISC_PCREL17F)
637 max_branch_offset = (1 << (17 - 1)) << 2;
638
639 else if (r_type == (unsigned int) R_PARISC_PCREL12F)
640 max_branch_offset = (1 << (12 - 1)) << 2;
641
642 else /* R_PARISC_PCREL22F. */
643 max_branch_offset = (1 << (22 - 1)) << 2;
644
645 if (branch_offset + max_branch_offset >= 2*max_branch_offset)
646 return hppa_stub_long_branch;
647
648 return hppa_stub_none;
649 }
650
651 /* Build one linker stub as defined by the stub hash table entry GEN_ENTRY.
652 IN_ARG contains the link info pointer. */
653
654 #define LDIL_R1 0x20200000 /* ldil LR'XXX,%r1 */
655 #define BE_SR4_R1 0xe0202002 /* be,n RR'XXX(%sr4,%r1) */
656
657 #define BL_R1 0xe8200000 /* b,l .+8,%r1 */
658 #define ADDIL_R1 0x28200000 /* addil LR'XXX,%r1,%r1 */
659 #define DEPI_R1 0xd4201c1e /* depi 0,31,2,%r1 */
660
661 #define ADDIL_DP 0x2b600000 /* addil LR'XXX,%dp,%r1 */
662 #define LDW_R1_R21 0x48350000 /* ldw RR'XXX(%sr0,%r1),%r21 */
663 #define BV_R0_R21 0xeaa0c000 /* bv %r0(%r21) */
664 #define LDW_R1_R19 0x48330000 /* ldw RR'XXX(%sr0,%r1),%r19 */
665
666 #define ADDIL_R19 0x2a600000 /* addil LR'XXX,%r19,%r1 */
667 #define LDW_R1_DP 0x483b0000 /* ldw RR'XXX(%sr0,%r1),%dp */
668
669 #define LDO_R1_R22 0x34360000 /* ldo RR'XXX(%r1),%r22 */
670 #define LDW_R22_R21 0x0ec01095 /* ldw 0(%r22),%r21 */
671 #define LDW_R22_R19 0x0ec81093 /* ldw 4(%r22),%r19 */
672
673 #define LDSID_R21_R1 0x02a010a1 /* ldsid (%sr0,%r21),%r1 */
674 #define MTSP_R1 0x00011820 /* mtsp %r1,%sr0 */
675 #define BE_SR0_R21 0xe2a00000 /* be 0(%sr0,%r21) */
676 #define STW_RP 0x6bc23fd1 /* stw %rp,-24(%sr0,%sp) */
677
678 #define BL22_RP 0xe800a002 /* b,l,n XXX,%rp */
679 #define BL_RP 0xe8400002 /* b,l,n XXX,%rp */
680 #define NOP 0x08000240 /* nop */
681 #define LDW_RP 0x4bc23fd1 /* ldw -24(%sr0,%sp),%rp */
682 #define LDSID_RP_R1 0x004010a1 /* ldsid (%sr0,%rp),%r1 */
683 #define BE_SR0_RP 0xe0400002 /* be,n 0(%sr0,%rp) */
684
685 #ifndef R19_STUBS
686 #define R19_STUBS 1
687 #endif
688
689 #if R19_STUBS
690 #define LDW_R1_DLT LDW_R1_R19
691 #else
692 #define LDW_R1_DLT LDW_R1_DP
693 #endif
694
695 static bfd_boolean
696 hppa_build_one_stub (struct bfd_hash_entry *bh, void *in_arg)
697 {
698 struct elf32_hppa_stub_hash_entry *hsh;
699 struct bfd_link_info *info;
700 struct elf32_hppa_link_hash_table *htab;
701 asection *stub_sec;
702 bfd *stub_bfd;
703 bfd_byte *loc;
704 bfd_vma sym_value;
705 bfd_vma insn;
706 bfd_vma off;
707 int val;
708 int size;
709
710 /* Massage our args to the form they really have. */
711 hsh = hppa_stub_hash_entry (bh);
712 info = (struct bfd_link_info *)in_arg;
713
714 htab = hppa_link_hash_table (info);
715 if (htab == NULL)
716 return FALSE;
717
718 stub_sec = hsh->stub_sec;
719
720 /* Make a note of the offset within the stubs for this entry. */
721 hsh->stub_offset = stub_sec->size;
722 loc = stub_sec->contents + hsh->stub_offset;
723
724 stub_bfd = stub_sec->owner;
725
726 switch (hsh->stub_type)
727 {
728 case hppa_stub_long_branch:
729 /* Fail if the target section could not be assigned to an output
730 section. The user should fix his linker script. */
731 if (hsh->target_section->output_section == NULL
732 && info->non_contiguous_regions)
733 info->callbacks->einfo (_("%F%P: Could not assign '%pA' to an output "
734 "section. Retry without "
735 "--enable-non-contiguous-regions.\n"),
736 hsh->target_section);
737
738 /* Create the long branch. A long branch is formed with "ldil"
739 loading the upper bits of the target address into a register,
740 then branching with "be" which adds in the lower bits.
741 The "be" has its delay slot nullified. */
742 sym_value = (hsh->target_value
743 + hsh->target_section->output_offset
744 + hsh->target_section->output_section->vma);
745
746 val = hppa_field_adjust (sym_value, 0, e_lrsel);
747 insn = hppa_rebuild_insn ((int) LDIL_R1, val, 21);
748 bfd_put_32 (stub_bfd, insn, loc);
749
750 val = hppa_field_adjust (sym_value, 0, e_rrsel) >> 2;
751 insn = hppa_rebuild_insn ((int) BE_SR4_R1, val, 17);
752 bfd_put_32 (stub_bfd, insn, loc + 4);
753
754 size = LONG_BRANCH_STUB_SIZE;
755 break;
756
757 case hppa_stub_long_branch_shared:
758 /* Fail if the target section could not be assigned to an output
759 section. The user should fix his linker script. */
760 if (hsh->target_section->output_section == NULL
761 && info->non_contiguous_regions)
762 info->callbacks->einfo (_("%F%P: Could not assign %pA to an output "
763 "section. Retry without "
764 "--enable-non-contiguous-regions.\n"),
765 hsh->target_section);
766
767 /* Branches are relative. This is where we are going to. */
768 sym_value = (hsh->target_value
769 + hsh->target_section->output_offset
770 + hsh->target_section->output_section->vma);
771
772 /* And this is where we are coming from, more or less. */
773 sym_value -= (hsh->stub_offset
774 + stub_sec->output_offset
775 + stub_sec->output_section->vma);
776
777 bfd_put_32 (stub_bfd, (bfd_vma) BL_R1, loc);
778 val = hppa_field_adjust (sym_value, (bfd_signed_vma) -8, e_lrsel);
779 insn = hppa_rebuild_insn ((int) ADDIL_R1, val, 21);
780 bfd_put_32 (stub_bfd, insn, loc + 4);
781
782 val = hppa_field_adjust (sym_value, (bfd_signed_vma) -8, e_rrsel) >> 2;
783 insn = hppa_rebuild_insn ((int) BE_SR4_R1, val, 17);
784 bfd_put_32 (stub_bfd, insn, loc + 8);
785 size = LONG_BRANCH_SHARED_STUB_SIZE;
786 break;
787
788 case hppa_stub_import:
789 case hppa_stub_import_shared:
790 off = hsh->hh->eh.plt.offset;
791 if (off >= (bfd_vma) -2)
792 abort ();
793
794 off &= ~ (bfd_vma) 1;
795 sym_value = (off
796 + htab->etab.splt->output_offset
797 + htab->etab.splt->output_section->vma
798 - elf_gp (htab->etab.splt->output_section->owner));
799
800 insn = ADDIL_DP;
801 #if R19_STUBS
802 if (hsh->stub_type == hppa_stub_import_shared)
803 insn = ADDIL_R19;
804 #endif
805
806 /* Load function descriptor address into register %r22. It is
807 sometimes needed for lazy binding. */
808 val = hppa_field_adjust (sym_value, 0, e_lrsel),
809 insn = hppa_rebuild_insn ((int) insn, val, 21);
810 bfd_put_32 (stub_bfd, insn, loc);
811
812 val = hppa_field_adjust (sym_value, 0, e_rrsel);
813 insn = hppa_rebuild_insn ((int) LDO_R1_R22, val, 14);
814 bfd_put_32 (stub_bfd, insn, loc + 4);
815
816 bfd_put_32 (stub_bfd, (bfd_vma) LDW_R22_R21, loc + 8);
817
818 if (htab->multi_subspace)
819 {
820 bfd_put_32 (stub_bfd, (bfd_vma) LDSID_R21_R1, loc + 12);
821 bfd_put_32 (stub_bfd, (bfd_vma) LDW_R22_R19, loc + 16);
822 bfd_put_32 (stub_bfd, (bfd_vma) MTSP_R1, loc + 20);
823 bfd_put_32 (stub_bfd, (bfd_vma) BE_SR0_R21, loc + 24);
824 bfd_put_32 (stub_bfd, (bfd_vma) STW_RP, loc + 28);
825
826 size = IMPORT_SHARED_STUB_SIZE;
827 }
828 else
829 {
830 bfd_put_32 (stub_bfd, (bfd_vma) BV_R0_R21, loc + 12);
831 bfd_put_32 (stub_bfd, (bfd_vma) LDW_R22_R19, loc + 16);
832
833 size = IMPORT_STUB_SIZE;
834 }
835
836 break;
837
838 case hppa_stub_export:
839 /* Fail if the target section could not be assigned to an output
840 section. The user should fix his linker script. */
841 if (hsh->target_section->output_section == NULL
842 && info->non_contiguous_regions)
843 info->callbacks->einfo (_("%F%P: Could not assign %pA to an output "
844 "section. Retry without "
845 "--enable-non-contiguous-regions.\n"),
846 hsh->target_section);
847
848 /* Branches are relative. This is where we are going to. */
849 sym_value = (hsh->target_value
850 + hsh->target_section->output_offset
851 + hsh->target_section->output_section->vma);
852
853 /* And this is where we are coming from. */
854 sym_value -= (hsh->stub_offset
855 + stub_sec->output_offset
856 + stub_sec->output_section->vma);
857
858 if (sym_value - 8 + (1 << (17 + 1)) >= (1 << (17 + 2))
859 && (!htab->has_22bit_branch
860 || sym_value - 8 + (1 << (22 + 1)) >= (1 << (22 + 2))))
861 {
862 _bfd_error_handler
863 /* xgettext:c-format */
864 (_("%pB(%pA+%#" PRIx64 "): "
865 "cannot reach %s, recompile with -ffunction-sections"),
866 hsh->target_section->owner,
867 stub_sec,
868 (uint64_t) hsh->stub_offset,
869 hsh->bh_root.string);
870 bfd_set_error (bfd_error_bad_value);
871 return FALSE;
872 }
873
874 val = hppa_field_adjust (sym_value, (bfd_signed_vma) -8, e_fsel) >> 2;
875 if (!htab->has_22bit_branch)
876 insn = hppa_rebuild_insn ((int) BL_RP, val, 17);
877 else
878 insn = hppa_rebuild_insn ((int) BL22_RP, val, 22);
879 bfd_put_32 (stub_bfd, insn, loc);
880
881 bfd_put_32 (stub_bfd, (bfd_vma) NOP, loc + 4);
882 bfd_put_32 (stub_bfd, (bfd_vma) LDW_RP, loc + 8);
883 bfd_put_32 (stub_bfd, (bfd_vma) LDSID_RP_R1, loc + 12);
884 bfd_put_32 (stub_bfd, (bfd_vma) MTSP_R1, loc + 16);
885 bfd_put_32 (stub_bfd, (bfd_vma) BE_SR0_RP, loc + 20);
886
887 /* Point the function symbol at the stub. */
888 hsh->hh->eh.root.u.def.section = stub_sec;
889 hsh->hh->eh.root.u.def.value = stub_sec->size;
890
891 size = EXPORT_STUB_SIZE;
892 break;
893
894 default:
895 BFD_FAIL ();
896 return FALSE;
897 }
898
899 stub_sec->size += size;
900 return TRUE;
901 }
902
903 #undef LDIL_R1
904 #undef BE_SR4_R1
905 #undef BL_R1
906 #undef ADDIL_R1
907 #undef DEPI_R1
908 #undef LDW_R1_R21
909 #undef LDW_R1_DLT
910 #undef LDW_R1_R19
911 #undef ADDIL_R19
912 #undef LDW_R1_DP
913 #undef LDSID_R21_R1
914 #undef MTSP_R1
915 #undef BE_SR0_R21
916 #undef STW_RP
917 #undef BV_R0_R21
918 #undef BL_RP
919 #undef NOP
920 #undef LDW_RP
921 #undef LDSID_RP_R1
922 #undef BE_SR0_RP
923
924 /* As above, but don't actually build the stub. Just bump offset so
925 we know stub section sizes. */
926
927 static bfd_boolean
928 hppa_size_one_stub (struct bfd_hash_entry *bh, void *in_arg)
929 {
930 struct elf32_hppa_stub_hash_entry *hsh;
931 struct elf32_hppa_link_hash_table *htab;
932 int size;
933
934 /* Massage our args to the form they really have. */
935 hsh = hppa_stub_hash_entry (bh);
936 htab = in_arg;
937
938 if (hsh->stub_type == hppa_stub_long_branch)
939 size = LONG_BRANCH_STUB_SIZE;
940 else if (hsh->stub_type == hppa_stub_long_branch_shared)
941 size = LONG_BRANCH_SHARED_STUB_SIZE;
942 else if (hsh->stub_type == hppa_stub_export)
943 size = EXPORT_STUB_SIZE;
944 else /* hppa_stub_import or hppa_stub_import_shared. */
945 {
946 if (htab->multi_subspace)
947 size = IMPORT_SHARED_STUB_SIZE;
948 else
949 size = IMPORT_STUB_SIZE;
950 }
951
952 hsh->stub_sec->size += size;
953 return TRUE;
954 }
955
956 /* Return nonzero if ABFD represents an HPPA ELF32 file.
957 Additionally we set the default architecture and machine. */
958
959 static bfd_boolean
960 elf32_hppa_object_p (bfd *abfd)
961 {
962 Elf_Internal_Ehdr * i_ehdrp;
963 unsigned int flags;
964
965 i_ehdrp = elf_elfheader (abfd);
966 if (strcmp (bfd_get_target (abfd), "elf32-hppa-linux") == 0)
967 {
968 /* GCC on hppa-linux produces binaries with OSABI=GNU,
969 but the kernel produces corefiles with OSABI=SysV. */
970 if (i_ehdrp->e_ident[EI_OSABI] != ELFOSABI_GNU &&
971 i_ehdrp->e_ident[EI_OSABI] != ELFOSABI_NONE) /* aka SYSV */
972 return FALSE;
973 }
974 else if (strcmp (bfd_get_target (abfd), "elf32-hppa-netbsd") == 0)
975 {
976 /* GCC on hppa-netbsd produces binaries with OSABI=NetBSD,
977 but the kernel produces corefiles with OSABI=SysV. */
978 if (i_ehdrp->e_ident[EI_OSABI] != ELFOSABI_NETBSD &&
979 i_ehdrp->e_ident[EI_OSABI] != ELFOSABI_NONE) /* aka SYSV */
980 return FALSE;
981 }
982 else
983 {
984 if (i_ehdrp->e_ident[EI_OSABI] != ELFOSABI_HPUX)
985 return FALSE;
986 }
987
988 flags = i_ehdrp->e_flags;
989 switch (flags & (EF_PARISC_ARCH | EF_PARISC_WIDE))
990 {
991 case EFA_PARISC_1_0:
992 return bfd_default_set_arch_mach (abfd, bfd_arch_hppa, 10);
993 case EFA_PARISC_1_1:
994 return bfd_default_set_arch_mach (abfd, bfd_arch_hppa, 11);
995 case EFA_PARISC_2_0:
996 return bfd_default_set_arch_mach (abfd, bfd_arch_hppa, 20);
997 case EFA_PARISC_2_0 | EF_PARISC_WIDE:
998 return bfd_default_set_arch_mach (abfd, bfd_arch_hppa, 25);
999 }
1000 return TRUE;
1001 }
1002
1003 /* Create the .plt and .got sections, and set up our hash table
1004 short-cuts to various dynamic sections. */
1005
1006 static bfd_boolean
1007 elf32_hppa_create_dynamic_sections (bfd *abfd, struct bfd_link_info *info)
1008 {
1009 struct elf32_hppa_link_hash_table *htab;
1010 struct elf_link_hash_entry *eh;
1011
1012 /* Don't try to create the .plt and .got twice. */
1013 htab = hppa_link_hash_table (info);
1014 if (htab == NULL)
1015 return FALSE;
1016 if (htab->etab.splt != NULL)
1017 return TRUE;
1018
1019 /* Call the generic code to do most of the work. */
1020 if (! _bfd_elf_create_dynamic_sections (abfd, info))
1021 return FALSE;
1022
1023 /* hppa-linux needs _GLOBAL_OFFSET_TABLE_ to be visible from the main
1024 application, because __canonicalize_funcptr_for_compare needs it. */
1025 eh = elf_hash_table (info)->hgot;
1026 eh->forced_local = 0;
1027 eh->other = STV_DEFAULT;
1028 return bfd_elf_link_record_dynamic_symbol (info, eh);
1029 }
1030
1031 /* Copy the extra info we tack onto an elf_link_hash_entry. */
1032
1033 static void
1034 elf32_hppa_copy_indirect_symbol (struct bfd_link_info *info,
1035 struct elf_link_hash_entry *eh_dir,
1036 struct elf_link_hash_entry *eh_ind)
1037 {
1038 struct elf32_hppa_link_hash_entry *hh_dir, *hh_ind;
1039
1040 hh_dir = hppa_elf_hash_entry (eh_dir);
1041 hh_ind = hppa_elf_hash_entry (eh_ind);
1042
1043 if (eh_ind->dyn_relocs != NULL
1044 && eh_ind->root.type == bfd_link_hash_indirect)
1045 {
1046 if (eh_dir->dyn_relocs != NULL)
1047 {
1048 struct elf_dyn_relocs **hdh_pp;
1049 struct elf_dyn_relocs *hdh_p;
1050
1051 /* Add reloc counts against the indirect sym to the direct sym
1052 list. Merge any entries against the same section. */
1053 for (hdh_pp = &eh_ind->dyn_relocs; (hdh_p = *hdh_pp) != NULL; )
1054 {
1055 struct elf_dyn_relocs *hdh_q;
1056
1057 for (hdh_q = eh_dir->dyn_relocs;
1058 hdh_q != NULL;
1059 hdh_q = hdh_q->next)
1060 if (hdh_q->sec == hdh_p->sec)
1061 {
1062 #if RELATIVE_DYNRELOCS
1063 hdh_q->pc_count += hdh_p->pc_count;
1064 #endif
1065 hdh_q->count += hdh_p->count;
1066 *hdh_pp = hdh_p->next;
1067 break;
1068 }
1069 if (hdh_q == NULL)
1070 hdh_pp = &hdh_p->next;
1071 }
1072 *hdh_pp = eh_dir->dyn_relocs;
1073 }
1074
1075 eh_dir->dyn_relocs = eh_ind->dyn_relocs;
1076 eh_ind->dyn_relocs = NULL;
1077 }
1078
1079 if (eh_ind->root.type == bfd_link_hash_indirect)
1080 {
1081 hh_dir->plabel |= hh_ind->plabel;
1082 hh_dir->tls_type |= hh_ind->tls_type;
1083 hh_ind->tls_type = GOT_UNKNOWN;
1084 }
1085
1086 _bfd_elf_link_hash_copy_indirect (info, eh_dir, eh_ind);
1087 }
1088
1089 static int
1090 elf32_hppa_optimized_tls_reloc (struct bfd_link_info *info ATTRIBUTE_UNUSED,
1091 int r_type, int is_local ATTRIBUTE_UNUSED)
1092 {
1093 /* For now we don't support linker optimizations. */
1094 return r_type;
1095 }
1096
1097 /* Return a pointer to the local GOT, PLT and TLS reference counts
1098 for ABFD. Returns NULL if the storage allocation fails. */
1099
1100 static bfd_signed_vma *
1101 hppa32_elf_local_refcounts (bfd *abfd)
1102 {
1103 Elf_Internal_Shdr *symtab_hdr = &elf_tdata (abfd)->symtab_hdr;
1104 bfd_signed_vma *local_refcounts;
1105
1106 local_refcounts = elf_local_got_refcounts (abfd);
1107 if (local_refcounts == NULL)
1108 {
1109 bfd_size_type size;
1110
1111 /* Allocate space for local GOT and PLT reference
1112 counts. Done this way to save polluting elf_obj_tdata
1113 with another target specific pointer. */
1114 size = symtab_hdr->sh_info;
1115 size *= 2 * sizeof (bfd_signed_vma);
1116 /* Add in space to store the local GOT TLS types. */
1117 size += symtab_hdr->sh_info;
1118 local_refcounts = bfd_zalloc (abfd, size);
1119 if (local_refcounts == NULL)
1120 return NULL;
1121 elf_local_got_refcounts (abfd) = local_refcounts;
1122 memset (hppa_elf_local_got_tls_type (abfd), GOT_UNKNOWN,
1123 symtab_hdr->sh_info);
1124 }
1125 return local_refcounts;
1126 }
1127
1128
1129 /* Look through the relocs for a section during the first phase, and
1130 calculate needed space in the global offset table, procedure linkage
1131 table, and dynamic reloc sections. At this point we haven't
1132 necessarily read all the input files. */
1133
1134 static bfd_boolean
1135 elf32_hppa_check_relocs (bfd *abfd,
1136 struct bfd_link_info *info,
1137 asection *sec,
1138 const Elf_Internal_Rela *relocs)
1139 {
1140 Elf_Internal_Shdr *symtab_hdr;
1141 struct elf_link_hash_entry **eh_syms;
1142 const Elf_Internal_Rela *rela;
1143 const Elf_Internal_Rela *rela_end;
1144 struct elf32_hppa_link_hash_table *htab;
1145 asection *sreloc;
1146
1147 if (bfd_link_relocatable (info))
1148 return TRUE;
1149
1150 htab = hppa_link_hash_table (info);
1151 if (htab == NULL)
1152 return FALSE;
1153 symtab_hdr = &elf_tdata (abfd)->symtab_hdr;
1154 eh_syms = elf_sym_hashes (abfd);
1155 sreloc = NULL;
1156
1157 rela_end = relocs + sec->reloc_count;
1158 for (rela = relocs; rela < rela_end; rela++)
1159 {
1160 enum {
1161 NEED_GOT = 1,
1162 NEED_PLT = 2,
1163 NEED_DYNREL = 4,
1164 PLT_PLABEL = 8
1165 };
1166
1167 unsigned int r_symndx, r_type;
1168 struct elf32_hppa_link_hash_entry *hh;
1169 int need_entry = 0;
1170
1171 r_symndx = ELF32_R_SYM (rela->r_info);
1172
1173 if (r_symndx < symtab_hdr->sh_info)
1174 hh = NULL;
1175 else
1176 {
1177 hh = hppa_elf_hash_entry (eh_syms[r_symndx - symtab_hdr->sh_info]);
1178 while (hh->eh.root.type == bfd_link_hash_indirect
1179 || hh->eh.root.type == bfd_link_hash_warning)
1180 hh = hppa_elf_hash_entry (hh->eh.root.u.i.link);
1181 }
1182
1183 r_type = ELF32_R_TYPE (rela->r_info);
1184 r_type = elf32_hppa_optimized_tls_reloc (info, r_type, hh == NULL);
1185
1186 switch (r_type)
1187 {
1188 case R_PARISC_DLTIND14F:
1189 case R_PARISC_DLTIND14R:
1190 case R_PARISC_DLTIND21L:
1191 /* This symbol requires a global offset table entry. */
1192 need_entry = NEED_GOT;
1193 break;
1194
1195 case R_PARISC_PLABEL14R: /* "Official" procedure labels. */
1196 case R_PARISC_PLABEL21L:
1197 case R_PARISC_PLABEL32:
1198 /* If the addend is non-zero, we break badly. */
1199 if (rela->r_addend != 0)
1200 abort ();
1201
1202 /* If we are creating a shared library, then we need to
1203 create a PLT entry for all PLABELs, because PLABELs with
1204 local symbols may be passed via a pointer to another
1205 object. Additionally, output a dynamic relocation
1206 pointing to the PLT entry.
1207
1208 For executables, the original 32-bit ABI allowed two
1209 different styles of PLABELs (function pointers): For
1210 global functions, the PLABEL word points into the .plt
1211 two bytes past a (function address, gp) pair, and for
1212 local functions the PLABEL points directly at the
1213 function. The magic +2 for the first type allows us to
1214 differentiate between the two. As you can imagine, this
1215 is a real pain when it comes to generating code to call
1216 functions indirectly or to compare function pointers.
1217 We avoid the mess by always pointing a PLABEL into the
1218 .plt, even for local functions. */
1219 need_entry = PLT_PLABEL | NEED_PLT;
1220 if (bfd_link_pic (info))
1221 need_entry |= NEED_DYNREL;
1222 break;
1223
1224 case R_PARISC_PCREL12F:
1225 htab->has_12bit_branch = 1;
1226 goto branch_common;
1227
1228 case R_PARISC_PCREL17C:
1229 case R_PARISC_PCREL17F:
1230 htab->has_17bit_branch = 1;
1231 goto branch_common;
1232
1233 case R_PARISC_PCREL22F:
1234 htab->has_22bit_branch = 1;
1235 branch_common:
1236 /* Function calls might need to go through the .plt, and
1237 might require long branch stubs. */
1238 if (hh == NULL)
1239 {
1240 /* We know local syms won't need a .plt entry, and if
1241 they need a long branch stub we can't guarantee that
1242 we can reach the stub. So just flag an error later
1243 if we're doing a shared link and find we need a long
1244 branch stub. */
1245 continue;
1246 }
1247 else
1248 {
1249 /* Global symbols will need a .plt entry if they remain
1250 global, and in most cases won't need a long branch
1251 stub. Unfortunately, we have to cater for the case
1252 where a symbol is forced local by versioning, or due
1253 to symbolic linking, and we lose the .plt entry. */
1254 need_entry = NEED_PLT;
1255 if (hh->eh.type == STT_PARISC_MILLI)
1256 need_entry = 0;
1257 }
1258 break;
1259
1260 case R_PARISC_SEGBASE: /* Used to set segment base. */
1261 case R_PARISC_SEGREL32: /* Relative reloc, used for unwind. */
1262 case R_PARISC_PCREL14F: /* PC relative load/store. */
1263 case R_PARISC_PCREL14R:
1264 case R_PARISC_PCREL17R: /* External branches. */
1265 case R_PARISC_PCREL21L: /* As above, and for load/store too. */
1266 case R_PARISC_PCREL32:
1267 /* We don't need to propagate the relocation if linking a
1268 shared object since these are section relative. */
1269 continue;
1270
1271 case R_PARISC_DPREL14F: /* Used for gp rel data load/store. */
1272 case R_PARISC_DPREL14R:
1273 case R_PARISC_DPREL21L:
1274 if (bfd_link_pic (info))
1275 {
1276 _bfd_error_handler
1277 /* xgettext:c-format */
1278 (_("%pB: relocation %s can not be used when making a shared object; recompile with -fPIC"),
1279 abfd,
1280 elf_hppa_howto_table[r_type].name);
1281 bfd_set_error (bfd_error_bad_value);
1282 return FALSE;
1283 }
1284 /* Fall through. */
1285
1286 case R_PARISC_DIR17F: /* Used for external branches. */
1287 case R_PARISC_DIR17R:
1288 case R_PARISC_DIR14F: /* Used for load/store from absolute locn. */
1289 case R_PARISC_DIR14R:
1290 case R_PARISC_DIR21L: /* As above, and for ext branches too. */
1291 case R_PARISC_DIR32: /* .word relocs. */
1292 /* We may want to output a dynamic relocation later. */
1293 need_entry = NEED_DYNREL;
1294 break;
1295
1296 /* This relocation describes the C++ object vtable hierarchy.
1297 Reconstruct it for later use during GC. */
1298 case R_PARISC_GNU_VTINHERIT:
1299 if (!bfd_elf_gc_record_vtinherit (abfd, sec, &hh->eh, rela->r_offset))
1300 return FALSE;
1301 continue;
1302
1303 /* This relocation describes which C++ vtable entries are actually
1304 used. Record for later use during GC. */
1305 case R_PARISC_GNU_VTENTRY:
1306 if (!bfd_elf_gc_record_vtentry (abfd, sec, &hh->eh, rela->r_addend))
1307 return FALSE;
1308 continue;
1309
1310 case R_PARISC_TLS_GD21L:
1311 case R_PARISC_TLS_GD14R:
1312 case R_PARISC_TLS_LDM21L:
1313 case R_PARISC_TLS_LDM14R:
1314 need_entry = NEED_GOT;
1315 break;
1316
1317 case R_PARISC_TLS_IE21L:
1318 case R_PARISC_TLS_IE14R:
1319 if (bfd_link_dll (info))
1320 info->flags |= DF_STATIC_TLS;
1321 need_entry = NEED_GOT;
1322 break;
1323
1324 default:
1325 continue;
1326 }
1327
1328 /* Now carry out our orders. */
1329 if (need_entry & NEED_GOT)
1330 {
1331 int tls_type = GOT_NORMAL;
1332
1333 switch (r_type)
1334 {
1335 default:
1336 break;
1337 case R_PARISC_TLS_GD21L:
1338 case R_PARISC_TLS_GD14R:
1339 tls_type = GOT_TLS_GD;
1340 break;
1341 case R_PARISC_TLS_LDM21L:
1342 case R_PARISC_TLS_LDM14R:
1343 tls_type = GOT_TLS_LDM;
1344 break;
1345 case R_PARISC_TLS_IE21L:
1346 case R_PARISC_TLS_IE14R:
1347 tls_type = GOT_TLS_IE;
1348 break;
1349 }
1350
1351 /* Allocate space for a GOT entry, as well as a dynamic
1352 relocation for this entry. */
1353 if (htab->etab.sgot == NULL)
1354 {
1355 if (!elf32_hppa_create_dynamic_sections (htab->etab.dynobj, info))
1356 return FALSE;
1357 }
1358
1359 if (hh != NULL)
1360 {
1361 if (tls_type == GOT_TLS_LDM)
1362 htab->tls_ldm_got.refcount += 1;
1363 else
1364 hh->eh.got.refcount += 1;
1365 hh->tls_type |= tls_type;
1366 }
1367 else
1368 {
1369 bfd_signed_vma *local_got_refcounts;
1370
1371 /* This is a global offset table entry for a local symbol. */
1372 local_got_refcounts = hppa32_elf_local_refcounts (abfd);
1373 if (local_got_refcounts == NULL)
1374 return FALSE;
1375 if (tls_type == GOT_TLS_LDM)
1376 htab->tls_ldm_got.refcount += 1;
1377 else
1378 local_got_refcounts[r_symndx] += 1;
1379
1380 hppa_elf_local_got_tls_type (abfd) [r_symndx] |= tls_type;
1381 }
1382 }
1383
1384 if (need_entry & NEED_PLT)
1385 {
1386 /* If we are creating a shared library, and this is a reloc
1387 against a weak symbol or a global symbol in a dynamic
1388 object, then we will be creating an import stub and a
1389 .plt entry for the symbol. Similarly, on a normal link
1390 to symbols defined in a dynamic object we'll need the
1391 import stub and a .plt entry. We don't know yet whether
1392 the symbol is defined or not, so make an entry anyway and
1393 clean up later in adjust_dynamic_symbol. */
1394 if ((sec->flags & SEC_ALLOC) != 0)
1395 {
1396 if (hh != NULL)
1397 {
1398 hh->eh.needs_plt = 1;
1399 hh->eh.plt.refcount += 1;
1400
1401 /* If this .plt entry is for a plabel, mark it so
1402 that adjust_dynamic_symbol will keep the entry
1403 even if it appears to be local. */
1404 if (need_entry & PLT_PLABEL)
1405 hh->plabel = 1;
1406 }
1407 else if (need_entry & PLT_PLABEL)
1408 {
1409 bfd_signed_vma *local_got_refcounts;
1410 bfd_signed_vma *local_plt_refcounts;
1411
1412 local_got_refcounts = hppa32_elf_local_refcounts (abfd);
1413 if (local_got_refcounts == NULL)
1414 return FALSE;
1415 local_plt_refcounts = (local_got_refcounts
1416 + symtab_hdr->sh_info);
1417 local_plt_refcounts[r_symndx] += 1;
1418 }
1419 }
1420 }
1421
1422 if ((need_entry & NEED_DYNREL) != 0
1423 && (sec->flags & SEC_ALLOC) != 0)
1424 {
1425 /* Flag this symbol as having a non-got, non-plt reference
1426 so that we generate copy relocs if it turns out to be
1427 dynamic. */
1428 if (hh != NULL)
1429 hh->eh.non_got_ref = 1;
1430
1431 /* If we are creating a shared library then we need to copy
1432 the reloc into the shared library. However, if we are
1433 linking with -Bsymbolic, we need only copy absolute
1434 relocs or relocs against symbols that are not defined in
1435 an object we are including in the link. PC- or DP- or
1436 DLT-relative relocs against any local sym or global sym
1437 with DEF_REGULAR set, can be discarded. At this point we
1438 have not seen all the input files, so it is possible that
1439 DEF_REGULAR is not set now but will be set later (it is
1440 never cleared). We account for that possibility below by
1441 storing information in the dyn_relocs field of the
1442 hash table entry.
1443
1444 A similar situation to the -Bsymbolic case occurs when
1445 creating shared libraries and symbol visibility changes
1446 render the symbol local.
1447
1448 As it turns out, all the relocs we will be creating here
1449 are absolute, so we cannot remove them on -Bsymbolic
1450 links or visibility changes anyway. A STUB_REL reloc
1451 is absolute too, as in that case it is the reloc in the
1452 stub we will be creating, rather than copying the PCREL
1453 reloc in the branch.
1454
1455 If on the other hand, we are creating an executable, we
1456 may need to keep relocations for symbols satisfied by a
1457 dynamic library if we manage to avoid copy relocs for the
1458 symbol. */
1459 if ((bfd_link_pic (info)
1460 && (IS_ABSOLUTE_RELOC (r_type)
1461 || (hh != NULL
1462 && (!SYMBOLIC_BIND (info, &hh->eh)
1463 || hh->eh.root.type == bfd_link_hash_defweak
1464 || !hh->eh.def_regular))))
1465 || (ELIMINATE_COPY_RELOCS
1466 && !bfd_link_pic (info)
1467 && hh != NULL
1468 && (hh->eh.root.type == bfd_link_hash_defweak
1469 || !hh->eh.def_regular)))
1470 {
1471 struct elf_dyn_relocs *hdh_p;
1472 struct elf_dyn_relocs **hdh_head;
1473
1474 /* Create a reloc section in dynobj and make room for
1475 this reloc. */
1476 if (sreloc == NULL)
1477 {
1478 sreloc = _bfd_elf_make_dynamic_reloc_section
1479 (sec, htab->etab.dynobj, 2, abfd, /*rela?*/ TRUE);
1480
1481 if (sreloc == NULL)
1482 {
1483 bfd_set_error (bfd_error_bad_value);
1484 return FALSE;
1485 }
1486 }
1487
1488 /* If this is a global symbol, we count the number of
1489 relocations we need for this symbol. */
1490 if (hh != NULL)
1491 {
1492 hdh_head = &hh->eh.dyn_relocs;
1493 }
1494 else
1495 {
1496 /* Track dynamic relocs needed for local syms too.
1497 We really need local syms available to do this
1498 easily. Oh well. */
1499 asection *sr;
1500 void *vpp;
1501 Elf_Internal_Sym *isym;
1502
1503 isym = bfd_sym_from_r_symndx (&htab->sym_cache,
1504 abfd, r_symndx);
1505 if (isym == NULL)
1506 return FALSE;
1507
1508 sr = bfd_section_from_elf_index (abfd, isym->st_shndx);
1509 if (sr == NULL)
1510 sr = sec;
1511
1512 vpp = &elf_section_data (sr)->local_dynrel;
1513 hdh_head = (struct elf_dyn_relocs **) vpp;
1514 }
1515
1516 hdh_p = *hdh_head;
1517 if (hdh_p == NULL || hdh_p->sec != sec)
1518 {
1519 hdh_p = bfd_alloc (htab->etab.dynobj, sizeof *hdh_p);
1520 if (hdh_p == NULL)
1521 return FALSE;
1522 hdh_p->next = *hdh_head;
1523 *hdh_head = hdh_p;
1524 hdh_p->sec = sec;
1525 hdh_p->count = 0;
1526 #if RELATIVE_DYNRELOCS
1527 hdh_p->pc_count = 0;
1528 #endif
1529 }
1530
1531 hdh_p->count += 1;
1532 #if RELATIVE_DYNRELOCS
1533 if (!IS_ABSOLUTE_RELOC (rtype))
1534 hdh_p->pc_count += 1;
1535 #endif
1536 }
1537 }
1538 }
1539
1540 return TRUE;
1541 }
1542
1543 /* Return the section that should be marked against garbage collection
1544 for a given relocation. */
1545
1546 static asection *
1547 elf32_hppa_gc_mark_hook (asection *sec,
1548 struct bfd_link_info *info,
1549 Elf_Internal_Rela *rela,
1550 struct elf_link_hash_entry *hh,
1551 Elf_Internal_Sym *sym)
1552 {
1553 if (hh != NULL)
1554 switch ((unsigned int) ELF32_R_TYPE (rela->r_info))
1555 {
1556 case R_PARISC_GNU_VTINHERIT:
1557 case R_PARISC_GNU_VTENTRY:
1558 return NULL;
1559 }
1560
1561 return _bfd_elf_gc_mark_hook (sec, info, rela, hh, sym);
1562 }
1563
1564 /* Support for core dump NOTE sections. */
1565
1566 static bfd_boolean
1567 elf32_hppa_grok_prstatus (bfd *abfd, Elf_Internal_Note *note)
1568 {
1569 int offset;
1570 size_t size;
1571
1572 switch (note->descsz)
1573 {
1574 default:
1575 return FALSE;
1576
1577 case 396: /* Linux/hppa */
1578 /* pr_cursig */
1579 elf_tdata (abfd)->core->signal = bfd_get_16 (abfd, note->descdata + 12);
1580
1581 /* pr_pid */
1582 elf_tdata (abfd)->core->lwpid = bfd_get_32 (abfd, note->descdata + 24);
1583
1584 /* pr_reg */
1585 offset = 72;
1586 size = 320;
1587
1588 break;
1589 }
1590
1591 /* Make a ".reg/999" section. */
1592 return _bfd_elfcore_make_pseudosection (abfd, ".reg",
1593 size, note->descpos + offset);
1594 }
1595
1596 static bfd_boolean
1597 elf32_hppa_grok_psinfo (bfd *abfd, Elf_Internal_Note *note)
1598 {
1599 switch (note->descsz)
1600 {
1601 default:
1602 return FALSE;
1603
1604 case 124: /* Linux/hppa elf_prpsinfo. */
1605 elf_tdata (abfd)->core->program
1606 = _bfd_elfcore_strndup (abfd, note->descdata + 28, 16);
1607 elf_tdata (abfd)->core->command
1608 = _bfd_elfcore_strndup (abfd, note->descdata + 44, 80);
1609 }
1610
1611 /* Note that for some reason, a spurious space is tacked
1612 onto the end of the args in some (at least one anyway)
1613 implementations, so strip it off if it exists. */
1614 {
1615 char *command = elf_tdata (abfd)->core->command;
1616 int n = strlen (command);
1617
1618 if (0 < n && command[n - 1] == ' ')
1619 command[n - 1] = '\0';
1620 }
1621
1622 return TRUE;
1623 }
1624
1625 /* Our own version of hide_symbol, so that we can keep plt entries for
1626 plabels. */
1627
1628 static void
1629 elf32_hppa_hide_symbol (struct bfd_link_info *info,
1630 struct elf_link_hash_entry *eh,
1631 bfd_boolean force_local)
1632 {
1633 if (force_local)
1634 {
1635 eh->forced_local = 1;
1636 if (eh->dynindx != -1)
1637 {
1638 eh->dynindx = -1;
1639 _bfd_elf_strtab_delref (elf_hash_table (info)->dynstr,
1640 eh->dynstr_index);
1641 }
1642
1643 /* PR 16082: Remove version information from hidden symbol. */
1644 eh->verinfo.verdef = NULL;
1645 eh->verinfo.vertree = NULL;
1646 }
1647
1648 /* STT_GNU_IFUNC symbol must go through PLT. */
1649 if (! hppa_elf_hash_entry (eh)->plabel
1650 && eh->type != STT_GNU_IFUNC)
1651 {
1652 eh->needs_plt = 0;
1653 eh->plt = elf_hash_table (info)->init_plt_offset;
1654 }
1655 }
1656
1657 /* Find any dynamic relocs that apply to read-only sections. */
1658
1659 static asection *
1660 readonly_dynrelocs (struct elf_link_hash_entry *eh)
1661 {
1662 struct elf_dyn_relocs *hdh_p;
1663
1664 for (hdh_p = eh->dyn_relocs; hdh_p != NULL; hdh_p = hdh_p->next)
1665 {
1666 asection *sec = hdh_p->sec->output_section;
1667
1668 if (sec != NULL && (sec->flags & SEC_READONLY) != 0)
1669 return hdh_p->sec;
1670 }
1671 return NULL;
1672 }
1673
1674 /* Return true if we have dynamic relocs against H or any of its weak
1675 aliases, that apply to read-only sections. Cannot be used after
1676 size_dynamic_sections. */
1677
1678 static bfd_boolean
1679 alias_readonly_dynrelocs (struct elf_link_hash_entry *eh)
1680 {
1681 struct elf32_hppa_link_hash_entry *hh = hppa_elf_hash_entry (eh);
1682 do
1683 {
1684 if (readonly_dynrelocs (&hh->eh))
1685 return TRUE;
1686 hh = hppa_elf_hash_entry (hh->eh.u.alias);
1687 } while (hh != NULL && &hh->eh != eh);
1688
1689 return FALSE;
1690 }
1691
1692 /* Adjust a symbol defined by a dynamic object and referenced by a
1693 regular object. The current definition is in some section of the
1694 dynamic object, but we're not including those sections. We have to
1695 change the definition to something the rest of the link can
1696 understand. */
1697
1698 static bfd_boolean
1699 elf32_hppa_adjust_dynamic_symbol (struct bfd_link_info *info,
1700 struct elf_link_hash_entry *eh)
1701 {
1702 struct elf32_hppa_link_hash_table *htab;
1703 asection *sec, *srel;
1704
1705 /* If this is a function, put it in the procedure linkage table. We
1706 will fill in the contents of the procedure linkage table later. */
1707 if (eh->type == STT_FUNC
1708 || eh->needs_plt)
1709 {
1710 bfd_boolean local = (SYMBOL_CALLS_LOCAL (info, eh)
1711 || UNDEFWEAK_NO_DYNAMIC_RELOC (info, eh));
1712 /* Discard dyn_relocs when non-pic if we've decided that a
1713 function symbol is local. */
1714 if (!bfd_link_pic (info) && local)
1715 eh->dyn_relocs = NULL;
1716
1717 /* If the symbol is used by a plabel, we must allocate a PLT slot.
1718 The refcounts are not reliable when it has been hidden since
1719 hide_symbol can be called before the plabel flag is set. */
1720 if (hppa_elf_hash_entry (eh)->plabel)
1721 eh->plt.refcount = 1;
1722
1723 /* Note that unlike some other backends, the refcount is not
1724 incremented for a non-call (and non-plabel) function reference. */
1725 else if (eh->plt.refcount <= 0
1726 || local)
1727 {
1728 /* The .plt entry is not needed when:
1729 a) Garbage collection has removed all references to the
1730 symbol, or
1731 b) We know for certain the symbol is defined in this
1732 object, and it's not a weak definition, nor is the symbol
1733 used by a plabel relocation. Either this object is the
1734 application or we are doing a shared symbolic link. */
1735 eh->plt.offset = (bfd_vma) -1;
1736 eh->needs_plt = 0;
1737 }
1738
1739 /* Unlike other targets, elf32-hppa.c does not define a function
1740 symbol in a non-pic executable on PLT stub code, so we don't
1741 have a local definition in that case. ie. dyn_relocs can't
1742 be discarded. */
1743
1744 /* Function symbols can't have copy relocs. */
1745 return TRUE;
1746 }
1747 else
1748 eh->plt.offset = (bfd_vma) -1;
1749
1750 htab = hppa_link_hash_table (info);
1751 if (htab == NULL)
1752 return FALSE;
1753
1754 /* If this is a weak symbol, and there is a real definition, the
1755 processor independent code will have arranged for us to see the
1756 real definition first, and we can just use the same value. */
1757 if (eh->is_weakalias)
1758 {
1759 struct elf_link_hash_entry *def = weakdef (eh);
1760 BFD_ASSERT (def->root.type == bfd_link_hash_defined);
1761 eh->root.u.def.section = def->root.u.def.section;
1762 eh->root.u.def.value = def->root.u.def.value;
1763 if (def->root.u.def.section == htab->etab.sdynbss
1764 || def->root.u.def.section == htab->etab.sdynrelro)
1765 eh->dyn_relocs = NULL;
1766 return TRUE;
1767 }
1768
1769 /* This is a reference to a symbol defined by a dynamic object which
1770 is not a function. */
1771
1772 /* If we are creating a shared library, we must presume that the
1773 only references to the symbol are via the global offset table.
1774 For such cases we need not do anything here; the relocations will
1775 be handled correctly by relocate_section. */
1776 if (bfd_link_pic (info))
1777 return TRUE;
1778
1779 /* If there are no references to this symbol that do not use the
1780 GOT, we don't need to generate a copy reloc. */
1781 if (!eh->non_got_ref)
1782 return TRUE;
1783
1784 /* If -z nocopyreloc was given, we won't generate them either. */
1785 if (info->nocopyreloc)
1786 return TRUE;
1787
1788 /* If we don't find any dynamic relocs in read-only sections, then
1789 we'll be keeping the dynamic relocs and avoiding the copy reloc. */
1790 if (ELIMINATE_COPY_RELOCS
1791 && !alias_readonly_dynrelocs (eh))
1792 return TRUE;
1793
1794 /* We must allocate the symbol in our .dynbss section, which will
1795 become part of the .bss section of the executable. There will be
1796 an entry for this symbol in the .dynsym section. The dynamic
1797 object will contain position independent code, so all references
1798 from the dynamic object to this symbol will go through the global
1799 offset table. The dynamic linker will use the .dynsym entry to
1800 determine the address it must put in the global offset table, so
1801 both the dynamic object and the regular object will refer to the
1802 same memory location for the variable. */
1803 if ((eh->root.u.def.section->flags & SEC_READONLY) != 0)
1804 {
1805 sec = htab->etab.sdynrelro;
1806 srel = htab->etab.sreldynrelro;
1807 }
1808 else
1809 {
1810 sec = htab->etab.sdynbss;
1811 srel = htab->etab.srelbss;
1812 }
1813 if ((eh->root.u.def.section->flags & SEC_ALLOC) != 0 && eh->size != 0)
1814 {
1815 /* We must generate a COPY reloc to tell the dynamic linker to
1816 copy the initial value out of the dynamic object and into the
1817 runtime process image. */
1818 srel->size += sizeof (Elf32_External_Rela);
1819 eh->needs_copy = 1;
1820 }
1821
1822 /* We no longer want dyn_relocs. */
1823 eh->dyn_relocs = NULL;
1824 return _bfd_elf_adjust_dynamic_copy (info, eh, sec);
1825 }
1826
1827 /* If EH is undefined, make it dynamic if that makes sense. */
1828
1829 static bfd_boolean
1830 ensure_undef_dynamic (struct bfd_link_info *info,
1831 struct elf_link_hash_entry *eh)
1832 {
1833 struct elf_link_hash_table *htab = elf_hash_table (info);
1834
1835 if (htab->dynamic_sections_created
1836 && (eh->root.type == bfd_link_hash_undefweak
1837 || eh->root.type == bfd_link_hash_undefined)
1838 && eh->dynindx == -1
1839 && !eh->forced_local
1840 && eh->type != STT_PARISC_MILLI
1841 && !UNDEFWEAK_NO_DYNAMIC_RELOC (info, eh)
1842 && ELF_ST_VISIBILITY (eh->other) == STV_DEFAULT)
1843 return bfd_elf_link_record_dynamic_symbol (info, eh);
1844 return TRUE;
1845 }
1846
1847 /* Allocate space in the .plt for entries that won't have relocations.
1848 ie. plabel entries. */
1849
1850 static bfd_boolean
1851 allocate_plt_static (struct elf_link_hash_entry *eh, void *inf)
1852 {
1853 struct bfd_link_info *info;
1854 struct elf32_hppa_link_hash_table *htab;
1855 struct elf32_hppa_link_hash_entry *hh;
1856 asection *sec;
1857
1858 if (eh->root.type == bfd_link_hash_indirect)
1859 return TRUE;
1860
1861 info = (struct bfd_link_info *) inf;
1862 hh = hppa_elf_hash_entry (eh);
1863 htab = hppa_link_hash_table (info);
1864 if (htab == NULL)
1865 return FALSE;
1866
1867 if (htab->etab.dynamic_sections_created
1868 && eh->plt.refcount > 0)
1869 {
1870 if (!ensure_undef_dynamic (info, eh))
1871 return FALSE;
1872
1873 if (WILL_CALL_FINISH_DYNAMIC_SYMBOL (1, bfd_link_pic (info), eh))
1874 {
1875 /* Allocate these later. From this point on, h->plabel
1876 means that the plt entry is only used by a plabel.
1877 We'll be using a normal plt entry for this symbol, so
1878 clear the plabel indicator. */
1879
1880 hh->plabel = 0;
1881 }
1882 else if (hh->plabel)
1883 {
1884 /* Make an entry in the .plt section for plabel references
1885 that won't have a .plt entry for other reasons. */
1886 sec = htab->etab.splt;
1887 eh->plt.offset = sec->size;
1888 sec->size += PLT_ENTRY_SIZE;
1889 if (bfd_link_pic (info))
1890 htab->etab.srelplt->size += sizeof (Elf32_External_Rela);
1891 }
1892 else
1893 {
1894 /* No .plt entry needed. */
1895 eh->plt.offset = (bfd_vma) -1;
1896 eh->needs_plt = 0;
1897 }
1898 }
1899 else
1900 {
1901 eh->plt.offset = (bfd_vma) -1;
1902 eh->needs_plt = 0;
1903 }
1904
1905 return TRUE;
1906 }
1907
1908 /* Calculate size of GOT entries for symbol given its TLS_TYPE. */
1909
1910 static inline unsigned int
1911 got_entries_needed (int tls_type)
1912 {
1913 unsigned int need = 0;
1914
1915 if ((tls_type & GOT_NORMAL) != 0)
1916 need += GOT_ENTRY_SIZE;
1917 if ((tls_type & GOT_TLS_GD) != 0)
1918 need += GOT_ENTRY_SIZE * 2;
1919 if ((tls_type & GOT_TLS_IE) != 0)
1920 need += GOT_ENTRY_SIZE;
1921 return need;
1922 }
1923
1924 /* Calculate size of relocs needed for symbol given its TLS_TYPE and
1925 NEEDed GOT entries. TPREL_KNOWN says a TPREL offset can be
1926 calculated at link time. DTPREL_KNOWN says the same for a DTPREL
1927 offset. */
1928
1929 static inline unsigned int
1930 got_relocs_needed (int tls_type, unsigned int need,
1931 bfd_boolean dtprel_known, bfd_boolean tprel_known)
1932 {
1933 /* All the entries we allocated need relocs.
1934 Except for GD and IE with local symbols. */
1935 if ((tls_type & GOT_TLS_GD) != 0 && dtprel_known)
1936 need -= GOT_ENTRY_SIZE;
1937 if ((tls_type & GOT_TLS_IE) != 0 && tprel_known)
1938 need -= GOT_ENTRY_SIZE;
1939 return need * sizeof (Elf32_External_Rela) / GOT_ENTRY_SIZE;
1940 }
1941
1942 /* Allocate space in .plt, .got and associated reloc sections for
1943 global syms. */
1944
1945 static bfd_boolean
1946 allocate_dynrelocs (struct elf_link_hash_entry *eh, void *inf)
1947 {
1948 struct bfd_link_info *info;
1949 struct elf32_hppa_link_hash_table *htab;
1950 asection *sec;
1951 struct elf32_hppa_link_hash_entry *hh;
1952 struct elf_dyn_relocs *hdh_p;
1953
1954 if (eh->root.type == bfd_link_hash_indirect)
1955 return TRUE;
1956
1957 info = inf;
1958 htab = hppa_link_hash_table (info);
1959 if (htab == NULL)
1960 return FALSE;
1961
1962 hh = hppa_elf_hash_entry (eh);
1963
1964 if (htab->etab.dynamic_sections_created
1965 && eh->plt.offset != (bfd_vma) -1
1966 && !hh->plabel
1967 && eh->plt.refcount > 0)
1968 {
1969 /* Make an entry in the .plt section. */
1970 sec = htab->etab.splt;
1971 eh->plt.offset = sec->size;
1972 sec->size += PLT_ENTRY_SIZE;
1973
1974 /* We also need to make an entry in the .rela.plt section. */
1975 htab->etab.srelplt->size += sizeof (Elf32_External_Rela);
1976 htab->need_plt_stub = 1;
1977 }
1978
1979 if (eh->got.refcount > 0)
1980 {
1981 unsigned int need;
1982
1983 if (!ensure_undef_dynamic (info, eh))
1984 return FALSE;
1985
1986 sec = htab->etab.sgot;
1987 eh->got.offset = sec->size;
1988 need = got_entries_needed (hh->tls_type);
1989 sec->size += need;
1990 if (htab->etab.dynamic_sections_created
1991 && (bfd_link_dll (info)
1992 || (bfd_link_pic (info) && (hh->tls_type & GOT_NORMAL) != 0)
1993 || (eh->dynindx != -1
1994 && !SYMBOL_REFERENCES_LOCAL (info, eh)))
1995 && !UNDEFWEAK_NO_DYNAMIC_RELOC (info, eh))
1996 {
1997 bfd_boolean local = SYMBOL_REFERENCES_LOCAL (info, eh);
1998 htab->etab.srelgot->size
1999 += got_relocs_needed (hh->tls_type, need, local,
2000 local && bfd_link_executable (info));
2001 }
2002 }
2003 else
2004 eh->got.offset = (bfd_vma) -1;
2005
2006 /* If no dynamic sections we can't have dynamic relocs. */
2007 if (!htab->etab.dynamic_sections_created)
2008 eh->dyn_relocs = NULL;
2009
2010 /* Discard relocs on undefined syms with non-default visibility. */
2011 else if ((eh->root.type == bfd_link_hash_undefined
2012 && ELF_ST_VISIBILITY (eh->other) != STV_DEFAULT)
2013 || UNDEFWEAK_NO_DYNAMIC_RELOC (info, eh))
2014 eh->dyn_relocs = NULL;
2015
2016 if (eh->dyn_relocs == NULL)
2017 return TRUE;
2018
2019 /* If this is a -Bsymbolic shared link, then we need to discard all
2020 space allocated for dynamic pc-relative relocs against symbols
2021 defined in a regular object. For the normal shared case, discard
2022 space for relocs that have become local due to symbol visibility
2023 changes. */
2024 if (bfd_link_pic (info))
2025 {
2026 #if RELATIVE_DYNRELOCS
2027 if (SYMBOL_CALLS_LOCAL (info, eh))
2028 {
2029 struct elf_dyn_relocs **hdh_pp;
2030
2031 for (hdh_pp = &eh->dyn_relocs; (hdh_p = *hdh_pp) != NULL; )
2032 {
2033 hdh_p->count -= hdh_p->pc_count;
2034 hdh_p->pc_count = 0;
2035 if (hdh_p->count == 0)
2036 *hdh_pp = hdh_p->next;
2037 else
2038 hdh_pp = &hdh_p->next;
2039 }
2040 }
2041 #endif
2042
2043 if (eh->dyn_relocs != NULL)
2044 {
2045 if (!ensure_undef_dynamic (info, eh))
2046 return FALSE;
2047 }
2048 }
2049 else if (ELIMINATE_COPY_RELOCS)
2050 {
2051 /* For the non-shared case, discard space for relocs against
2052 symbols which turn out to need copy relocs or are not
2053 dynamic. */
2054
2055 if (eh->dynamic_adjusted
2056 && !eh->def_regular
2057 && !ELF_COMMON_DEF_P (eh))
2058 {
2059 if (!ensure_undef_dynamic (info, eh))
2060 return FALSE;
2061
2062 if (eh->dynindx == -1)
2063 eh->dyn_relocs = NULL;
2064 }
2065 else
2066 eh->dyn_relocs = NULL;
2067 }
2068
2069 /* Finally, allocate space. */
2070 for (hdh_p = eh->dyn_relocs; hdh_p != NULL; hdh_p = hdh_p->next)
2071 {
2072 asection *sreloc = elf_section_data (hdh_p->sec)->sreloc;
2073 sreloc->size += hdh_p->count * sizeof (Elf32_External_Rela);
2074 }
2075
2076 return TRUE;
2077 }
2078
2079 /* This function is called via elf_link_hash_traverse to force
2080 millicode symbols local so they do not end up as globals in the
2081 dynamic symbol table. We ought to be able to do this in
2082 adjust_dynamic_symbol, but our adjust_dynamic_symbol is not called
2083 for all dynamic symbols. Arguably, this is a bug in
2084 elf_adjust_dynamic_symbol. */
2085
2086 static bfd_boolean
2087 clobber_millicode_symbols (struct elf_link_hash_entry *eh,
2088 struct bfd_link_info *info)
2089 {
2090 if (eh->type == STT_PARISC_MILLI
2091 && !eh->forced_local)
2092 {
2093 elf32_hppa_hide_symbol (info, eh, TRUE);
2094 }
2095 return TRUE;
2096 }
2097
2098 /* Set DF_TEXTREL if we find any dynamic relocs that apply to
2099 read-only sections. */
2100
2101 static bfd_boolean
2102 maybe_set_textrel (struct elf_link_hash_entry *eh, void *inf)
2103 {
2104 asection *sec;
2105
2106 if (eh->root.type == bfd_link_hash_indirect)
2107 return TRUE;
2108
2109 sec = readonly_dynrelocs (eh);
2110 if (sec != NULL)
2111 {
2112 struct bfd_link_info *info = (struct bfd_link_info *) inf;
2113
2114 info->flags |= DF_TEXTREL;
2115 info->callbacks->minfo
2116 (_("%pB: dynamic relocation against `%pT' in read-only section `%pA'\n"),
2117 sec->owner, eh->root.root.string, sec);
2118
2119 /* Not an error, just cut short the traversal. */
2120 return FALSE;
2121 }
2122 return TRUE;
2123 }
2124
2125 /* Set the sizes of the dynamic sections. */
2126
2127 static bfd_boolean
2128 elf32_hppa_size_dynamic_sections (bfd *output_bfd ATTRIBUTE_UNUSED,
2129 struct bfd_link_info *info)
2130 {
2131 struct elf32_hppa_link_hash_table *htab;
2132 bfd *dynobj;
2133 bfd *ibfd;
2134 asection *sec;
2135 bfd_boolean relocs;
2136
2137 htab = hppa_link_hash_table (info);
2138 if (htab == NULL)
2139 return FALSE;
2140
2141 dynobj = htab->etab.dynobj;
2142 if (dynobj == NULL)
2143 abort ();
2144
2145 if (htab->etab.dynamic_sections_created)
2146 {
2147 /* Set the contents of the .interp section to the interpreter. */
2148 if (bfd_link_executable (info) && !info->nointerp)
2149 {
2150 sec = bfd_get_linker_section (dynobj, ".interp");
2151 if (sec == NULL)
2152 abort ();
2153 sec->size = sizeof ELF_DYNAMIC_INTERPRETER;
2154 sec->contents = (unsigned char *) ELF_DYNAMIC_INTERPRETER;
2155 }
2156
2157 /* Force millicode symbols local. */
2158 elf_link_hash_traverse (&htab->etab,
2159 clobber_millicode_symbols,
2160 info);
2161 }
2162
2163 /* Set up .got and .plt offsets for local syms, and space for local
2164 dynamic relocs. */
2165 for (ibfd = info->input_bfds; ibfd != NULL; ibfd = ibfd->link.next)
2166 {
2167 bfd_signed_vma *local_got;
2168 bfd_signed_vma *end_local_got;
2169 bfd_signed_vma *local_plt;
2170 bfd_signed_vma *end_local_plt;
2171 bfd_size_type locsymcount;
2172 Elf_Internal_Shdr *symtab_hdr;
2173 asection *srel;
2174 char *local_tls_type;
2175
2176 if (bfd_get_flavour (ibfd) != bfd_target_elf_flavour)
2177 continue;
2178
2179 for (sec = ibfd->sections; sec != NULL; sec = sec->next)
2180 {
2181 struct elf_dyn_relocs *hdh_p;
2182
2183 for (hdh_p = ((struct elf_dyn_relocs *)
2184 elf_section_data (sec)->local_dynrel);
2185 hdh_p != NULL;
2186 hdh_p = hdh_p->next)
2187 {
2188 if (!bfd_is_abs_section (hdh_p->sec)
2189 && bfd_is_abs_section (hdh_p->sec->output_section))
2190 {
2191 /* Input section has been discarded, either because
2192 it is a copy of a linkonce section or due to
2193 linker script /DISCARD/, so we'll be discarding
2194 the relocs too. */
2195 }
2196 else if (hdh_p->count != 0)
2197 {
2198 srel = elf_section_data (hdh_p->sec)->sreloc;
2199 srel->size += hdh_p->count * sizeof (Elf32_External_Rela);
2200 if ((hdh_p->sec->output_section->flags & SEC_READONLY) != 0)
2201 info->flags |= DF_TEXTREL;
2202 }
2203 }
2204 }
2205
2206 local_got = elf_local_got_refcounts (ibfd);
2207 if (!local_got)
2208 continue;
2209
2210 symtab_hdr = &elf_tdata (ibfd)->symtab_hdr;
2211 locsymcount = symtab_hdr->sh_info;
2212 end_local_got = local_got + locsymcount;
2213 local_tls_type = hppa_elf_local_got_tls_type (ibfd);
2214 sec = htab->etab.sgot;
2215 srel = htab->etab.srelgot;
2216 for (; local_got < end_local_got; ++local_got)
2217 {
2218 if (*local_got > 0)
2219 {
2220 unsigned int need;
2221
2222 *local_got = sec->size;
2223 need = got_entries_needed (*local_tls_type);
2224 sec->size += need;
2225 if (bfd_link_dll (info)
2226 || (bfd_link_pic (info)
2227 && (*local_tls_type & GOT_NORMAL) != 0))
2228 htab->etab.srelgot->size
2229 += got_relocs_needed (*local_tls_type, need, TRUE,
2230 bfd_link_executable (info));
2231 }
2232 else
2233 *local_got = (bfd_vma) -1;
2234
2235 ++local_tls_type;
2236 }
2237
2238 local_plt = end_local_got;
2239 end_local_plt = local_plt + locsymcount;
2240 if (! htab->etab.dynamic_sections_created)
2241 {
2242 /* Won't be used, but be safe. */
2243 for (; local_plt < end_local_plt; ++local_plt)
2244 *local_plt = (bfd_vma) -1;
2245 }
2246 else
2247 {
2248 sec = htab->etab.splt;
2249 srel = htab->etab.srelplt;
2250 for (; local_plt < end_local_plt; ++local_plt)
2251 {
2252 if (*local_plt > 0)
2253 {
2254 *local_plt = sec->size;
2255 sec->size += PLT_ENTRY_SIZE;
2256 if (bfd_link_pic (info))
2257 srel->size += sizeof (Elf32_External_Rela);
2258 }
2259 else
2260 *local_plt = (bfd_vma) -1;
2261 }
2262 }
2263 }
2264
2265 if (htab->tls_ldm_got.refcount > 0)
2266 {
2267 /* Allocate 2 got entries and 1 dynamic reloc for
2268 R_PARISC_TLS_DTPMOD32 relocs. */
2269 htab->tls_ldm_got.offset = htab->etab.sgot->size;
2270 htab->etab.sgot->size += (GOT_ENTRY_SIZE * 2);
2271 htab->etab.srelgot->size += sizeof (Elf32_External_Rela);
2272 }
2273 else
2274 htab->tls_ldm_got.offset = -1;
2275
2276 /* Do all the .plt entries without relocs first. The dynamic linker
2277 uses the last .plt reloc to find the end of the .plt (and hence
2278 the start of the .got) for lazy linking. */
2279 elf_link_hash_traverse (&htab->etab, allocate_plt_static, info);
2280
2281 /* Allocate global sym .plt and .got entries, and space for global
2282 sym dynamic relocs. */
2283 elf_link_hash_traverse (&htab->etab, allocate_dynrelocs, info);
2284
2285 /* The check_relocs and adjust_dynamic_symbol entry points have
2286 determined the sizes of the various dynamic sections. Allocate
2287 memory for them. */
2288 relocs = FALSE;
2289 for (sec = dynobj->sections; sec != NULL; sec = sec->next)
2290 {
2291 if ((sec->flags & SEC_LINKER_CREATED) == 0)
2292 continue;
2293
2294 if (sec == htab->etab.splt)
2295 {
2296 if (htab->need_plt_stub)
2297 {
2298 /* Make space for the plt stub at the end of the .plt
2299 section. We want this stub right at the end, up
2300 against the .got section. */
2301 int gotalign = bfd_section_alignment (htab->etab.sgot);
2302 int pltalign = bfd_section_alignment (sec);
2303 int align = gotalign > 3 ? gotalign : 3;
2304 bfd_size_type mask;
2305
2306 if (align > pltalign)
2307 bfd_set_section_alignment (sec, align);
2308 mask = ((bfd_size_type) 1 << gotalign) - 1;
2309 sec->size = (sec->size + sizeof (plt_stub) + mask) & ~mask;
2310 }
2311 }
2312 else if (sec == htab->etab.sgot
2313 || sec == htab->etab.sdynbss
2314 || sec == htab->etab.sdynrelro)
2315 ;
2316 else if (CONST_STRNEQ (bfd_section_name (sec), ".rela"))
2317 {
2318 if (sec->size != 0)
2319 {
2320 /* Remember whether there are any reloc sections other
2321 than .rela.plt. */
2322 if (sec != htab->etab.srelplt)
2323 relocs = TRUE;
2324
2325 /* We use the reloc_count field as a counter if we need
2326 to copy relocs into the output file. */
2327 sec->reloc_count = 0;
2328 }
2329 }
2330 else
2331 {
2332 /* It's not one of our sections, so don't allocate space. */
2333 continue;
2334 }
2335
2336 if (sec->size == 0)
2337 {
2338 /* If we don't need this section, strip it from the
2339 output file. This is mostly to handle .rela.bss and
2340 .rela.plt. We must create both sections in
2341 create_dynamic_sections, because they must be created
2342 before the linker maps input sections to output
2343 sections. The linker does that before
2344 adjust_dynamic_symbol is called, and it is that
2345 function which decides whether anything needs to go
2346 into these sections. */
2347 sec->flags |= SEC_EXCLUDE;
2348 continue;
2349 }
2350
2351 if ((sec->flags & SEC_HAS_CONTENTS) == 0)
2352 continue;
2353
2354 /* Allocate memory for the section contents. Zero it, because
2355 we may not fill in all the reloc sections. */
2356 sec->contents = bfd_zalloc (dynobj, sec->size);
2357 if (sec->contents == NULL)
2358 return FALSE;
2359 }
2360
2361 if (htab->etab.dynamic_sections_created)
2362 {
2363 /* Like IA-64 and HPPA64, always create a DT_PLTGOT. It
2364 actually has nothing to do with the PLT, it is how we
2365 communicate the LTP value of a load module to the dynamic
2366 linker. */
2367 #define add_dynamic_entry(TAG, VAL) \
2368 _bfd_elf_add_dynamic_entry (info, TAG, VAL)
2369
2370 if (!add_dynamic_entry (DT_PLTGOT, 0))
2371 return FALSE;
2372
2373 /* Add some entries to the .dynamic section. We fill in the
2374 values later, in elf32_hppa_finish_dynamic_sections, but we
2375 must add the entries now so that we get the correct size for
2376 the .dynamic section. The DT_DEBUG entry is filled in by the
2377 dynamic linker and used by the debugger. */
2378 if (bfd_link_executable (info))
2379 {
2380 if (!add_dynamic_entry (DT_DEBUG, 0))
2381 return FALSE;
2382 }
2383
2384 if (htab->etab.srelplt->size != 0)
2385 {
2386 if (!add_dynamic_entry (DT_PLTRELSZ, 0)
2387 || !add_dynamic_entry (DT_PLTREL, DT_RELA)
2388 || !add_dynamic_entry (DT_JMPREL, 0))
2389 return FALSE;
2390 }
2391
2392 if (relocs)
2393 {
2394 if (!add_dynamic_entry (DT_RELA, 0)
2395 || !add_dynamic_entry (DT_RELASZ, 0)
2396 || !add_dynamic_entry (DT_RELAENT, sizeof (Elf32_External_Rela)))
2397 return FALSE;
2398
2399 /* If any dynamic relocs apply to a read-only section,
2400 then we need a DT_TEXTREL entry. */
2401 if ((info->flags & DF_TEXTREL) == 0)
2402 elf_link_hash_traverse (&htab->etab, maybe_set_textrel, info);
2403
2404 if ((info->flags & DF_TEXTREL) != 0)
2405 {
2406 if (!add_dynamic_entry (DT_TEXTREL, 0))
2407 return FALSE;
2408 }
2409 }
2410 }
2411 #undef add_dynamic_entry
2412
2413 return TRUE;
2414 }
2415
2416 /* External entry points for sizing and building linker stubs. */
2417
2418 /* Set up various things so that we can make a list of input sections
2419 for each output section included in the link. Returns -1 on error,
2420 0 when no stubs will be needed, and 1 on success. */
2421
2422 int
2423 elf32_hppa_setup_section_lists (bfd *output_bfd, struct bfd_link_info *info)
2424 {
2425 bfd *input_bfd;
2426 unsigned int bfd_count;
2427 unsigned int top_id, top_index;
2428 asection *section;
2429 asection **input_list, **list;
2430 size_t amt;
2431 struct elf32_hppa_link_hash_table *htab = hppa_link_hash_table (info);
2432
2433 if (htab == NULL)
2434 return -1;
2435
2436 /* Count the number of input BFDs and find the top input section id. */
2437 for (input_bfd = info->input_bfds, bfd_count = 0, top_id = 0;
2438 input_bfd != NULL;
2439 input_bfd = input_bfd->link.next)
2440 {
2441 bfd_count += 1;
2442 for (section = input_bfd->sections;
2443 section != NULL;
2444 section = section->next)
2445 {
2446 if (top_id < section->id)
2447 top_id = section->id;
2448 }
2449 }
2450 htab->bfd_count = bfd_count;
2451
2452 amt = sizeof (struct map_stub) * (top_id + 1);
2453 htab->stub_group = bfd_zmalloc (amt);
2454 if (htab->stub_group == NULL)
2455 return -1;
2456
2457 /* We can't use output_bfd->section_count here to find the top output
2458 section index as some sections may have been removed, and
2459 strip_excluded_output_sections doesn't renumber the indices. */
2460 for (section = output_bfd->sections, top_index = 0;
2461 section != NULL;
2462 section = section->next)
2463 {
2464 if (top_index < section->index)
2465 top_index = section->index;
2466 }
2467
2468 htab->top_index = top_index;
2469 amt = sizeof (asection *) * (top_index + 1);
2470 input_list = bfd_malloc (amt);
2471 htab->input_list = input_list;
2472 if (input_list == NULL)
2473 return -1;
2474
2475 /* For sections we aren't interested in, mark their entries with a
2476 value we can check later. */
2477 list = input_list + top_index;
2478 do
2479 *list = bfd_abs_section_ptr;
2480 while (list-- != input_list);
2481
2482 for (section = output_bfd->sections;
2483 section != NULL;
2484 section = section->next)
2485 {
2486 if ((section->flags & SEC_CODE) != 0)
2487 input_list[section->index] = NULL;
2488 }
2489
2490 return 1;
2491 }
2492
2493 /* The linker repeatedly calls this function for each input section,
2494 in the order that input sections are linked into output sections.
2495 Build lists of input sections to determine groupings between which
2496 we may insert linker stubs. */
2497
2498 void
2499 elf32_hppa_next_input_section (struct bfd_link_info *info, asection *isec)
2500 {
2501 struct elf32_hppa_link_hash_table *htab = hppa_link_hash_table (info);
2502
2503 if (htab == NULL)
2504 return;
2505
2506 if (isec->output_section->index <= htab->top_index)
2507 {
2508 asection **list = htab->input_list + isec->output_section->index;
2509 if (*list != bfd_abs_section_ptr)
2510 {
2511 /* Steal the link_sec pointer for our list. */
2512 #define PREV_SEC(sec) (htab->stub_group[(sec)->id].link_sec)
2513 /* This happens to make the list in reverse order,
2514 which is what we want. */
2515 PREV_SEC (isec) = *list;
2516 *list = isec;
2517 }
2518 }
2519 }
2520
2521 /* See whether we can group stub sections together. Grouping stub
2522 sections may result in fewer stubs. More importantly, we need to
2523 put all .init* and .fini* stubs at the beginning of the .init or
2524 .fini output sections respectively, because glibc splits the
2525 _init and _fini functions into multiple parts. Putting a stub in
2526 the middle of a function is not a good idea. */
2527
2528 static void
2529 group_sections (struct elf32_hppa_link_hash_table *htab,
2530 bfd_size_type stub_group_size,
2531 bfd_boolean stubs_always_before_branch)
2532 {
2533 asection **list = htab->input_list + htab->top_index;
2534 do
2535 {
2536 asection *tail = *list;
2537 if (tail == bfd_abs_section_ptr)
2538 continue;
2539 while (tail != NULL)
2540 {
2541 asection *curr;
2542 asection *prev;
2543 bfd_size_type total;
2544 bfd_boolean big_sec;
2545
2546 curr = tail;
2547 total = tail->size;
2548 big_sec = total >= stub_group_size;
2549
2550 while ((prev = PREV_SEC (curr)) != NULL
2551 && ((total += curr->output_offset - prev->output_offset)
2552 < stub_group_size))
2553 curr = prev;
2554
2555 /* OK, the size from the start of CURR to the end is less
2556 than 240000 bytes and thus can be handled by one stub
2557 section. (or the tail section is itself larger than
2558 240000 bytes, in which case we may be toast.)
2559 We should really be keeping track of the total size of
2560 stubs added here, as stubs contribute to the final output
2561 section size. That's a little tricky, and this way will
2562 only break if stubs added total more than 22144 bytes, or
2563 2768 long branch stubs. It seems unlikely for more than
2564 2768 different functions to be called, especially from
2565 code only 240000 bytes long. This limit used to be
2566 250000, but c++ code tends to generate lots of little
2567 functions, and sometimes violated the assumption. */
2568 do
2569 {
2570 prev = PREV_SEC (tail);
2571 /* Set up this stub group. */
2572 htab->stub_group[tail->id].link_sec = curr;
2573 }
2574 while (tail != curr && (tail = prev) != NULL);
2575
2576 /* But wait, there's more! Input sections up to 240000
2577 bytes before the stub section can be handled by it too.
2578 Don't do this if we have a really large section after the
2579 stubs, as adding more stubs increases the chance that
2580 branches may not reach into the stub section. */
2581 if (!stubs_always_before_branch && !big_sec)
2582 {
2583 total = 0;
2584 while (prev != NULL
2585 && ((total += tail->output_offset - prev->output_offset)
2586 < stub_group_size))
2587 {
2588 tail = prev;
2589 prev = PREV_SEC (tail);
2590 htab->stub_group[tail->id].link_sec = curr;
2591 }
2592 }
2593 tail = prev;
2594 }
2595 }
2596 while (list-- != htab->input_list);
2597 free (htab->input_list);
2598 #undef PREV_SEC
2599 }
2600
2601 /* Read in all local syms for all input bfds, and create hash entries
2602 for export stubs if we are building a multi-subspace shared lib.
2603 Returns -1 on error, 1 if export stubs created, 0 otherwise. */
2604
2605 static int
2606 get_local_syms (bfd *output_bfd, bfd *input_bfd, struct bfd_link_info *info)
2607 {
2608 unsigned int bfd_indx;
2609 Elf_Internal_Sym *local_syms, **all_local_syms;
2610 int stub_changed = 0;
2611 struct elf32_hppa_link_hash_table *htab = hppa_link_hash_table (info);
2612
2613 if (htab == NULL)
2614 return -1;
2615
2616 /* We want to read in symbol extension records only once. To do this
2617 we need to read in the local symbols in parallel and save them for
2618 later use; so hold pointers to the local symbols in an array. */
2619 size_t amt = sizeof (Elf_Internal_Sym *) * htab->bfd_count;
2620 all_local_syms = bfd_zmalloc (amt);
2621 htab->all_local_syms = all_local_syms;
2622 if (all_local_syms == NULL)
2623 return -1;
2624
2625 /* Walk over all the input BFDs, swapping in local symbols.
2626 If we are creating a shared library, create hash entries for the
2627 export stubs. */
2628 for (bfd_indx = 0;
2629 input_bfd != NULL;
2630 input_bfd = input_bfd->link.next, bfd_indx++)
2631 {
2632 Elf_Internal_Shdr *symtab_hdr;
2633
2634 /* We'll need the symbol table in a second. */
2635 symtab_hdr = &elf_tdata (input_bfd)->symtab_hdr;
2636 if (symtab_hdr->sh_info == 0)
2637 continue;
2638
2639 /* We need an array of the local symbols attached to the input bfd. */
2640 local_syms = (Elf_Internal_Sym *) symtab_hdr->contents;
2641 if (local_syms == NULL)
2642 {
2643 local_syms = bfd_elf_get_elf_syms (input_bfd, symtab_hdr,
2644 symtab_hdr->sh_info, 0,
2645 NULL, NULL, NULL);
2646 /* Cache them for elf_link_input_bfd. */
2647 symtab_hdr->contents = (unsigned char *) local_syms;
2648 }
2649 if (local_syms == NULL)
2650 return -1;
2651
2652 all_local_syms[bfd_indx] = local_syms;
2653
2654 if (bfd_link_pic (info) && htab->multi_subspace)
2655 {
2656 struct elf_link_hash_entry **eh_syms;
2657 struct elf_link_hash_entry **eh_symend;
2658 unsigned int symcount;
2659
2660 symcount = (symtab_hdr->sh_size / sizeof (Elf32_External_Sym)
2661 - symtab_hdr->sh_info);
2662 eh_syms = (struct elf_link_hash_entry **) elf_sym_hashes (input_bfd);
2663 eh_symend = (struct elf_link_hash_entry **) (eh_syms + symcount);
2664
2665 /* Look through the global syms for functions; We need to
2666 build export stubs for all globally visible functions. */
2667 for (; eh_syms < eh_symend; eh_syms++)
2668 {
2669 struct elf32_hppa_link_hash_entry *hh;
2670
2671 hh = hppa_elf_hash_entry (*eh_syms);
2672
2673 while (hh->eh.root.type == bfd_link_hash_indirect
2674 || hh->eh.root.type == bfd_link_hash_warning)
2675 hh = hppa_elf_hash_entry (hh->eh.root.u.i.link);
2676
2677 /* At this point in the link, undefined syms have been
2678 resolved, so we need to check that the symbol was
2679 defined in this BFD. */
2680 if ((hh->eh.root.type == bfd_link_hash_defined
2681 || hh->eh.root.type == bfd_link_hash_defweak)
2682 && hh->eh.type == STT_FUNC
2683 && hh->eh.root.u.def.section->output_section != NULL
2684 && (hh->eh.root.u.def.section->output_section->owner
2685 == output_bfd)
2686 && hh->eh.root.u.def.section->owner == input_bfd
2687 && hh->eh.def_regular
2688 && !hh->eh.forced_local
2689 && ELF_ST_VISIBILITY (hh->eh.other) == STV_DEFAULT)
2690 {
2691 asection *sec;
2692 const char *stub_name;
2693 struct elf32_hppa_stub_hash_entry *hsh;
2694
2695 sec = hh->eh.root.u.def.section;
2696 stub_name = hh_name (hh);
2697 hsh = hppa_stub_hash_lookup (&htab->bstab,
2698 stub_name,
2699 FALSE, FALSE);
2700 if (hsh == NULL)
2701 {
2702 hsh = hppa_add_stub (stub_name, sec, htab);
2703 if (!hsh)
2704 return -1;
2705
2706 hsh->target_value = hh->eh.root.u.def.value;
2707 hsh->target_section = hh->eh.root.u.def.section;
2708 hsh->stub_type = hppa_stub_export;
2709 hsh->hh = hh;
2710 stub_changed = 1;
2711 }
2712 else
2713 {
2714 /* xgettext:c-format */
2715 _bfd_error_handler (_("%pB: duplicate export stub %s"),
2716 input_bfd, stub_name);
2717 }
2718 }
2719 }
2720 }
2721 }
2722
2723 return stub_changed;
2724 }
2725
2726 /* Determine and set the size of the stub section for a final link.
2727
2728 The basic idea here is to examine all the relocations looking for
2729 PC-relative calls to a target that is unreachable with a "bl"
2730 instruction. */
2731
2732 bfd_boolean
2733 elf32_hppa_size_stubs
2734 (bfd *output_bfd, bfd *stub_bfd, struct bfd_link_info *info,
2735 bfd_boolean multi_subspace, bfd_signed_vma group_size,
2736 asection * (*add_stub_section) (const char *, asection *),
2737 void (*layout_sections_again) (void))
2738 {
2739 bfd_size_type stub_group_size;
2740 bfd_boolean stubs_always_before_branch;
2741 bfd_boolean stub_changed;
2742 struct elf32_hppa_link_hash_table *htab = hppa_link_hash_table (info);
2743
2744 if (htab == NULL)
2745 return FALSE;
2746
2747 /* Stash our params away. */
2748 htab->stub_bfd = stub_bfd;
2749 htab->multi_subspace = multi_subspace;
2750 htab->add_stub_section = add_stub_section;
2751 htab->layout_sections_again = layout_sections_again;
2752 stubs_always_before_branch = group_size < 0;
2753 if (group_size < 0)
2754 stub_group_size = -group_size;
2755 else
2756 stub_group_size = group_size;
2757 if (stub_group_size == 1)
2758 {
2759 /* Default values. */
2760 if (stubs_always_before_branch)
2761 {
2762 stub_group_size = 7680000;
2763 if (htab->has_17bit_branch || htab->multi_subspace)
2764 stub_group_size = 240000;
2765 if (htab->has_12bit_branch)
2766 stub_group_size = 7500;
2767 }
2768 else
2769 {
2770 stub_group_size = 6971392;
2771 if (htab->has_17bit_branch || htab->multi_subspace)
2772 stub_group_size = 217856;
2773 if (htab->has_12bit_branch)
2774 stub_group_size = 6808;
2775 }
2776 }
2777
2778 group_sections (htab, stub_group_size, stubs_always_before_branch);
2779
2780 switch (get_local_syms (output_bfd, info->input_bfds, info))
2781 {
2782 default:
2783 if (htab->all_local_syms)
2784 goto error_ret_free_local;
2785 return FALSE;
2786
2787 case 0:
2788 stub_changed = FALSE;
2789 break;
2790
2791 case 1:
2792 stub_changed = TRUE;
2793 break;
2794 }
2795
2796 while (1)
2797 {
2798 bfd *input_bfd;
2799 unsigned int bfd_indx;
2800 asection *stub_sec;
2801
2802 for (input_bfd = info->input_bfds, bfd_indx = 0;
2803 input_bfd != NULL;
2804 input_bfd = input_bfd->link.next, bfd_indx++)
2805 {
2806 Elf_Internal_Shdr *symtab_hdr;
2807 asection *section;
2808 Elf_Internal_Sym *local_syms;
2809
2810 /* We'll need the symbol table in a second. */
2811 symtab_hdr = &elf_tdata (input_bfd)->symtab_hdr;
2812 if (symtab_hdr->sh_info == 0)
2813 continue;
2814
2815 local_syms = htab->all_local_syms[bfd_indx];
2816
2817 /* Walk over each section attached to the input bfd. */
2818 for (section = input_bfd->sections;
2819 section != NULL;
2820 section = section->next)
2821 {
2822 Elf_Internal_Rela *internal_relocs, *irelaend, *irela;
2823
2824 /* If there aren't any relocs, then there's nothing more
2825 to do. */
2826 if ((section->flags & SEC_RELOC) == 0
2827 || (section->flags & SEC_ALLOC) == 0
2828 || (section->flags & SEC_LOAD) == 0
2829 || (section->flags & SEC_CODE) == 0
2830 || section->reloc_count == 0)
2831 continue;
2832
2833 /* If this section is a link-once section that will be
2834 discarded, then don't create any stubs. */
2835 if (section->output_section == NULL
2836 || section->output_section->owner != output_bfd)
2837 continue;
2838
2839 /* Get the relocs. */
2840 internal_relocs
2841 = _bfd_elf_link_read_relocs (input_bfd, section, NULL, NULL,
2842 info->keep_memory);
2843 if (internal_relocs == NULL)
2844 goto error_ret_free_local;
2845
2846 /* Now examine each relocation. */
2847 irela = internal_relocs;
2848 irelaend = irela + section->reloc_count;
2849 for (; irela < irelaend; irela++)
2850 {
2851 unsigned int r_type, r_indx;
2852 enum elf32_hppa_stub_type stub_type;
2853 struct elf32_hppa_stub_hash_entry *hsh;
2854 asection *sym_sec;
2855 bfd_vma sym_value;
2856 bfd_vma destination;
2857 struct elf32_hppa_link_hash_entry *hh;
2858 char *stub_name;
2859 const asection *id_sec;
2860
2861 r_type = ELF32_R_TYPE (irela->r_info);
2862 r_indx = ELF32_R_SYM (irela->r_info);
2863
2864 if (r_type >= (unsigned int) R_PARISC_UNIMPLEMENTED)
2865 {
2866 bfd_set_error (bfd_error_bad_value);
2867 error_ret_free_internal:
2868 if (elf_section_data (section)->relocs == NULL)
2869 free (internal_relocs);
2870 goto error_ret_free_local;
2871 }
2872
2873 /* Only look for stubs on call instructions. */
2874 if (r_type != (unsigned int) R_PARISC_PCREL12F
2875 && r_type != (unsigned int) R_PARISC_PCREL17F
2876 && r_type != (unsigned int) R_PARISC_PCREL22F)
2877 continue;
2878
2879 /* Now determine the call target, its name, value,
2880 section. */
2881 sym_sec = NULL;
2882 sym_value = 0;
2883 destination = -1;
2884 hh = NULL;
2885 if (r_indx < symtab_hdr->sh_info)
2886 {
2887 /* It's a local symbol. */
2888 Elf_Internal_Sym *sym;
2889 Elf_Internal_Shdr *hdr;
2890 unsigned int shndx;
2891
2892 sym = local_syms + r_indx;
2893 if (ELF_ST_TYPE (sym->st_info) != STT_SECTION)
2894 sym_value = sym->st_value;
2895 shndx = sym->st_shndx;
2896 if (shndx < elf_numsections (input_bfd))
2897 {
2898 hdr = elf_elfsections (input_bfd)[shndx];
2899 sym_sec = hdr->bfd_section;
2900 destination = (sym_value + irela->r_addend
2901 + sym_sec->output_offset
2902 + sym_sec->output_section->vma);
2903 }
2904 }
2905 else
2906 {
2907 /* It's an external symbol. */
2908 int e_indx;
2909
2910 e_indx = r_indx - symtab_hdr->sh_info;
2911 hh = hppa_elf_hash_entry (elf_sym_hashes (input_bfd)[e_indx]);
2912
2913 while (hh->eh.root.type == bfd_link_hash_indirect
2914 || hh->eh.root.type == bfd_link_hash_warning)
2915 hh = hppa_elf_hash_entry (hh->eh.root.u.i.link);
2916
2917 if (hh->eh.root.type == bfd_link_hash_defined
2918 || hh->eh.root.type == bfd_link_hash_defweak)
2919 {
2920 sym_sec = hh->eh.root.u.def.section;
2921 sym_value = hh->eh.root.u.def.value;
2922 if (sym_sec->output_section != NULL)
2923 destination = (sym_value + irela->r_addend
2924 + sym_sec->output_offset
2925 + sym_sec->output_section->vma);
2926 }
2927 else if (hh->eh.root.type == bfd_link_hash_undefweak)
2928 {
2929 if (! bfd_link_pic (info))
2930 continue;
2931 }
2932 else if (hh->eh.root.type == bfd_link_hash_undefined)
2933 {
2934 if (! (info->unresolved_syms_in_objects == RM_IGNORE
2935 && (ELF_ST_VISIBILITY (hh->eh.other)
2936 == STV_DEFAULT)
2937 && hh->eh.type != STT_PARISC_MILLI))
2938 continue;
2939 }
2940 else
2941 {
2942 bfd_set_error (bfd_error_bad_value);
2943 goto error_ret_free_internal;
2944 }
2945 }
2946
2947 /* Determine what (if any) linker stub is needed. */
2948 stub_type = hppa_type_of_stub (section, irela, hh,
2949 destination, info);
2950 if (stub_type == hppa_stub_none)
2951 continue;
2952
2953 /* Support for grouping stub sections. */
2954 id_sec = htab->stub_group[section->id].link_sec;
2955
2956 /* Get the name of this stub. */
2957 stub_name = hppa_stub_name (id_sec, sym_sec, hh, irela);
2958 if (!stub_name)
2959 goto error_ret_free_internal;
2960
2961 hsh = hppa_stub_hash_lookup (&htab->bstab,
2962 stub_name,
2963 FALSE, FALSE);
2964 if (hsh != NULL)
2965 {
2966 /* The proper stub has already been created. */
2967 free (stub_name);
2968 continue;
2969 }
2970
2971 hsh = hppa_add_stub (stub_name, section, htab);
2972 if (hsh == NULL)
2973 {
2974 free (stub_name);
2975 goto error_ret_free_internal;
2976 }
2977
2978 hsh->target_value = sym_value;
2979 hsh->target_section = sym_sec;
2980 hsh->stub_type = stub_type;
2981 if (bfd_link_pic (info))
2982 {
2983 if (stub_type == hppa_stub_import)
2984 hsh->stub_type = hppa_stub_import_shared;
2985 else if (stub_type == hppa_stub_long_branch)
2986 hsh->stub_type = hppa_stub_long_branch_shared;
2987 }
2988 hsh->hh = hh;
2989 stub_changed = TRUE;
2990 }
2991
2992 /* We're done with the internal relocs, free them. */
2993 if (elf_section_data (section)->relocs == NULL)
2994 free (internal_relocs);
2995 }
2996 }
2997
2998 if (!stub_changed)
2999 break;
3000
3001 /* OK, we've added some stubs. Find out the new size of the
3002 stub sections. */
3003 for (stub_sec = htab->stub_bfd->sections;
3004 stub_sec != NULL;
3005 stub_sec = stub_sec->next)
3006 if ((stub_sec->flags & SEC_LINKER_CREATED) == 0)
3007 stub_sec->size = 0;
3008
3009 bfd_hash_traverse (&htab->bstab, hppa_size_one_stub, htab);
3010
3011 /* Ask the linker to do its stuff. */
3012 (*htab->layout_sections_again) ();
3013 stub_changed = FALSE;
3014 }
3015
3016 free (htab->all_local_syms);
3017 return TRUE;
3018
3019 error_ret_free_local:
3020 free (htab->all_local_syms);
3021 return FALSE;
3022 }
3023
3024 /* For a final link, this function is called after we have sized the
3025 stubs to provide a value for __gp. */
3026
3027 bfd_boolean
3028 elf32_hppa_set_gp (bfd *abfd, struct bfd_link_info *info)
3029 {
3030 struct bfd_link_hash_entry *h;
3031 asection *sec = NULL;
3032 bfd_vma gp_val = 0;
3033
3034 h = bfd_link_hash_lookup (info->hash, "$global$", FALSE, FALSE, FALSE);
3035
3036 if (h != NULL
3037 && (h->type == bfd_link_hash_defined
3038 || h->type == bfd_link_hash_defweak))
3039 {
3040 gp_val = h->u.def.value;
3041 sec = h->u.def.section;
3042 }
3043 else
3044 {
3045 asection *splt = bfd_get_section_by_name (abfd, ".plt");
3046 asection *sgot = bfd_get_section_by_name (abfd, ".got");
3047
3048 /* Choose to point our LTP at, in this order, one of .plt, .got,
3049 or .data, if these sections exist. In the case of choosing
3050 .plt try to make the LTP ideal for addressing anywhere in the
3051 .plt or .got with a 14 bit signed offset. Typically, the end
3052 of the .plt is the start of the .got, so choose .plt + 0x2000
3053 if either the .plt or .got is larger than 0x2000. If both
3054 the .plt and .got are smaller than 0x2000, choose the end of
3055 the .plt section. */
3056 sec = strcmp (bfd_get_target (abfd), "elf32-hppa-netbsd") == 0
3057 ? NULL : splt;
3058 if (sec != NULL)
3059 {
3060 gp_val = sec->size;
3061 if (gp_val > 0x2000 || (sgot && sgot->size > 0x2000))
3062 {
3063 gp_val = 0x2000;
3064 }
3065 }
3066 else
3067 {
3068 sec = sgot;
3069 if (sec != NULL)
3070 {
3071 if (strcmp (bfd_get_target (abfd), "elf32-hppa-netbsd") != 0)
3072 {
3073 /* We know we don't have a .plt. If .got is large,
3074 offset our LTP. */
3075 if (sec->size > 0x2000)
3076 gp_val = 0x2000;
3077 }
3078 }
3079 else
3080 {
3081 /* No .plt or .got. Who cares what the LTP is? */
3082 sec = bfd_get_section_by_name (abfd, ".data");
3083 }
3084 }
3085
3086 if (h != NULL)
3087 {
3088 h->type = bfd_link_hash_defined;
3089 h->u.def.value = gp_val;
3090 if (sec != NULL)
3091 h->u.def.section = sec;
3092 else
3093 h->u.def.section = bfd_abs_section_ptr;
3094 }
3095 }
3096
3097 if (bfd_get_flavour (abfd) == bfd_target_elf_flavour)
3098 {
3099 if (sec != NULL && sec->output_section != NULL)
3100 gp_val += sec->output_section->vma + sec->output_offset;
3101
3102 elf_gp (abfd) = gp_val;
3103 }
3104 return TRUE;
3105 }
3106
3107 /* Build all the stubs associated with the current output file. The
3108 stubs are kept in a hash table attached to the main linker hash
3109 table. We also set up the .plt entries for statically linked PIC
3110 functions here. This function is called via hppaelf_finish in the
3111 linker. */
3112
3113 bfd_boolean
3114 elf32_hppa_build_stubs (struct bfd_link_info *info)
3115 {
3116 asection *stub_sec;
3117 struct bfd_hash_table *table;
3118 struct elf32_hppa_link_hash_table *htab;
3119
3120 htab = hppa_link_hash_table (info);
3121 if (htab == NULL)
3122 return FALSE;
3123
3124 for (stub_sec = htab->stub_bfd->sections;
3125 stub_sec != NULL;
3126 stub_sec = stub_sec->next)
3127 if ((stub_sec->flags & SEC_LINKER_CREATED) == 0
3128 && stub_sec->size != 0)
3129 {
3130 /* Allocate memory to hold the linker stubs. */
3131 stub_sec->contents = bfd_zalloc (htab->stub_bfd, stub_sec->size);
3132 if (stub_sec->contents == NULL)
3133 return FALSE;
3134 stub_sec->size = 0;
3135 }
3136
3137 /* Build the stubs as directed by the stub hash table. */
3138 table = &htab->bstab;
3139 bfd_hash_traverse (table, hppa_build_one_stub, info);
3140
3141 return TRUE;
3142 }
3143
3144 /* Return the base vma address which should be subtracted from the real
3145 address when resolving a dtpoff relocation.
3146 This is PT_TLS segment p_vaddr. */
3147
3148 static bfd_vma
3149 dtpoff_base (struct bfd_link_info *info)
3150 {
3151 /* If tls_sec is NULL, we should have signalled an error already. */
3152 if (elf_hash_table (info)->tls_sec == NULL)
3153 return 0;
3154 return elf_hash_table (info)->tls_sec->vma;
3155 }
3156
3157 /* Return the relocation value for R_PARISC_TLS_TPOFF*.. */
3158
3159 static bfd_vma
3160 tpoff (struct bfd_link_info *info, bfd_vma address)
3161 {
3162 struct elf_link_hash_table *htab = elf_hash_table (info);
3163
3164 /* If tls_sec is NULL, we should have signalled an error already. */
3165 if (htab->tls_sec == NULL)
3166 return 0;
3167 /* hppa TLS ABI is variant I and static TLS block start just after
3168 tcbhead structure which has 2 pointer fields. */
3169 return (address - htab->tls_sec->vma
3170 + align_power ((bfd_vma) 8, htab->tls_sec->alignment_power));
3171 }
3172
3173 /* Perform a final link. */
3174
3175 static bfd_boolean
3176 elf32_hppa_final_link (bfd *abfd, struct bfd_link_info *info)
3177 {
3178 struct stat buf;
3179
3180 /* Invoke the regular ELF linker to do all the work. */
3181 if (!bfd_elf_final_link (abfd, info))
3182 return FALSE;
3183
3184 /* If we're producing a final executable, sort the contents of the
3185 unwind section. */
3186 if (bfd_link_relocatable (info))
3187 return TRUE;
3188
3189 /* Do not attempt to sort non-regular files. This is here
3190 especially for configure scripts and kernel builds which run
3191 tests with "ld [...] -o /dev/null". */
3192 if (stat (bfd_get_filename (abfd), &buf) != 0
3193 || !S_ISREG(buf.st_mode))
3194 return TRUE;
3195
3196 return elf_hppa_sort_unwind (abfd);
3197 }
3198
3199 /* Record the lowest address for the data and text segments. */
3200
3201 static void
3202 hppa_record_segment_addr (bfd *abfd, asection *section, void *data)
3203 {
3204 struct elf32_hppa_link_hash_table *htab;
3205
3206 htab = (struct elf32_hppa_link_hash_table*) data;
3207 if (htab == NULL)
3208 return;
3209
3210 if ((section->flags & (SEC_ALLOC | SEC_LOAD)) == (SEC_ALLOC | SEC_LOAD))
3211 {
3212 bfd_vma value;
3213 Elf_Internal_Phdr *p;
3214
3215 p = _bfd_elf_find_segment_containing_section (abfd, section->output_section);
3216 BFD_ASSERT (p != NULL);
3217 value = p->p_vaddr;
3218
3219 if ((section->flags & SEC_READONLY) != 0)
3220 {
3221 if (value < htab->text_segment_base)
3222 htab->text_segment_base = value;
3223 }
3224 else
3225 {
3226 if (value < htab->data_segment_base)
3227 htab->data_segment_base = value;
3228 }
3229 }
3230 }
3231
3232 /* Perform a relocation as part of a final link. */
3233
3234 static bfd_reloc_status_type
3235 final_link_relocate (asection *input_section,
3236 bfd_byte *contents,
3237 const Elf_Internal_Rela *rela,
3238 bfd_vma value,
3239 struct elf32_hppa_link_hash_table *htab,
3240 asection *sym_sec,
3241 struct elf32_hppa_link_hash_entry *hh,
3242 struct bfd_link_info *info)
3243 {
3244 unsigned int insn;
3245 unsigned int r_type = ELF32_R_TYPE (rela->r_info);
3246 unsigned int orig_r_type = r_type;
3247 reloc_howto_type *howto = elf_hppa_howto_table + r_type;
3248 int r_format = howto->bitsize;
3249 enum hppa_reloc_field_selector_type_alt r_field;
3250 bfd *input_bfd = input_section->owner;
3251 bfd_vma offset = rela->r_offset;
3252 bfd_vma max_branch_offset = 0;
3253 bfd_byte *hit_data = contents + offset;
3254 bfd_signed_vma addend = rela->r_addend;
3255 bfd_vma location;
3256 struct elf32_hppa_stub_hash_entry *hsh = NULL;
3257 int val;
3258
3259 if (r_type == R_PARISC_NONE)
3260 return bfd_reloc_ok;
3261
3262 insn = bfd_get_32 (input_bfd, hit_data);
3263
3264 /* Find out where we are and where we're going. */
3265 location = (offset +
3266 input_section->output_offset +
3267 input_section->output_section->vma);
3268
3269 /* If we are not building a shared library, convert DLTIND relocs to
3270 DPREL relocs. */
3271 if (!bfd_link_pic (info))
3272 {
3273 switch (r_type)
3274 {
3275 case R_PARISC_DLTIND21L:
3276 case R_PARISC_TLS_GD21L:
3277 case R_PARISC_TLS_LDM21L:
3278 case R_PARISC_TLS_IE21L:
3279 r_type = R_PARISC_DPREL21L;
3280 break;
3281
3282 case R_PARISC_DLTIND14R:
3283 case R_PARISC_TLS_GD14R:
3284 case R_PARISC_TLS_LDM14R:
3285 case R_PARISC_TLS_IE14R:
3286 r_type = R_PARISC_DPREL14R;
3287 break;
3288
3289 case R_PARISC_DLTIND14F:
3290 r_type = R_PARISC_DPREL14F;
3291 break;
3292 }
3293 }
3294
3295 switch (r_type)
3296 {
3297 case R_PARISC_PCREL12F:
3298 case R_PARISC_PCREL17F:
3299 case R_PARISC_PCREL22F:
3300 /* If this call should go via the plt, find the import stub in
3301 the stub hash. */
3302 if (sym_sec == NULL
3303 || sym_sec->output_section == NULL
3304 || (hh != NULL
3305 && hh->eh.plt.offset != (bfd_vma) -1
3306 && hh->eh.dynindx != -1
3307 && !hh->plabel
3308 && (bfd_link_pic (info)
3309 || !hh->eh.def_regular
3310 || hh->eh.root.type == bfd_link_hash_defweak)))
3311 {
3312 hsh = hppa_get_stub_entry (input_section, sym_sec,
3313 hh, rela, htab);
3314 if (hsh != NULL)
3315 {
3316 value = (hsh->stub_offset
3317 + hsh->stub_sec->output_offset
3318 + hsh->stub_sec->output_section->vma);
3319 addend = 0;
3320 }
3321 else if (sym_sec == NULL && hh != NULL
3322 && hh->eh.root.type == bfd_link_hash_undefweak)
3323 {
3324 /* It's OK if undefined weak. Calls to undefined weak
3325 symbols behave as if the "called" function
3326 immediately returns. We can thus call to a weak
3327 function without first checking whether the function
3328 is defined. */
3329 value = location;
3330 addend = 8;
3331 }
3332 else
3333 return bfd_reloc_undefined;
3334 }
3335 /* Fall thru. */
3336
3337 case R_PARISC_PCREL21L:
3338 case R_PARISC_PCREL17C:
3339 case R_PARISC_PCREL17R:
3340 case R_PARISC_PCREL14R:
3341 case R_PARISC_PCREL14F:
3342 case R_PARISC_PCREL32:
3343 /* Make it a pc relative offset. */
3344 value -= location;
3345 addend -= 8;
3346 break;
3347
3348 case R_PARISC_DPREL21L:
3349 case R_PARISC_DPREL14R:
3350 case R_PARISC_DPREL14F:
3351 /* Convert instructions that use the linkage table pointer (r19) to
3352 instructions that use the global data pointer (dp). This is the
3353 most efficient way of using PIC code in an incomplete executable,
3354 but the user must follow the standard runtime conventions for
3355 accessing data for this to work. */
3356 if (orig_r_type != r_type)
3357 {
3358 if (r_type == R_PARISC_DPREL21L)
3359 {
3360 /* GCC sometimes uses a register other than r19 for the
3361 operation, so we must convert any addil instruction
3362 that uses this relocation. */
3363 if ((insn & 0xfc000000) == OP_ADDIL << 26)
3364 insn = ADDIL_DP;
3365 else
3366 /* We must have a ldil instruction. It's too hard to find
3367 and convert the associated add instruction, so issue an
3368 error. */
3369 _bfd_error_handler
3370 /* xgettext:c-format */
3371 (_("%pB(%pA+%#" PRIx64 "): %s fixup for insn %#x "
3372 "is not supported in a non-shared link"),
3373 input_bfd,
3374 input_section,
3375 (uint64_t) offset,
3376 howto->name,
3377 insn);
3378 }
3379 else if (r_type == R_PARISC_DPREL14F)
3380 {
3381 /* This must be a format 1 load/store. Change the base
3382 register to dp. */
3383 insn = (insn & 0xfc1ffff) | (27 << 21);
3384 }
3385 }
3386
3387 /* For all the DP relative relocations, we need to examine the symbol's
3388 section. If it has no section or if it's a code section, then
3389 "data pointer relative" makes no sense. In that case we don't
3390 adjust the "value", and for 21 bit addil instructions, we change the
3391 source addend register from %dp to %r0. This situation commonly
3392 arises for undefined weak symbols and when a variable's "constness"
3393 is declared differently from the way the variable is defined. For
3394 instance: "extern int foo" with foo defined as "const int foo". */
3395 if (sym_sec == NULL || (sym_sec->flags & SEC_CODE) != 0)
3396 {
3397 if ((insn & ((0x3fu << 26) | (0x1f << 21)))
3398 == ((OP_ADDIL << 26) | (27 << 21)))
3399 {
3400 insn &= ~ (0x1f << 21);
3401 }
3402 /* Now try to make things easy for the dynamic linker. */
3403
3404 break;
3405 }
3406 /* Fall thru. */
3407
3408 case R_PARISC_DLTIND21L:
3409 case R_PARISC_DLTIND14R:
3410 case R_PARISC_DLTIND14F:
3411 case R_PARISC_TLS_GD21L:
3412 case R_PARISC_TLS_LDM21L:
3413 case R_PARISC_TLS_IE21L:
3414 case R_PARISC_TLS_GD14R:
3415 case R_PARISC_TLS_LDM14R:
3416 case R_PARISC_TLS_IE14R:
3417 value -= elf_gp (input_section->output_section->owner);
3418 break;
3419
3420 case R_PARISC_SEGREL32:
3421 if ((sym_sec->flags & SEC_CODE) != 0)
3422 value -= htab->text_segment_base;
3423 else
3424 value -= htab->data_segment_base;
3425 break;
3426
3427 default:
3428 break;
3429 }
3430
3431 switch (r_type)
3432 {
3433 case R_PARISC_DIR32:
3434 case R_PARISC_DIR14F:
3435 case R_PARISC_DIR17F:
3436 case R_PARISC_PCREL17C:
3437 case R_PARISC_PCREL14F:
3438 case R_PARISC_PCREL32:
3439 case R_PARISC_DPREL14F:
3440 case R_PARISC_PLABEL32:
3441 case R_PARISC_DLTIND14F:
3442 case R_PARISC_SEGBASE:
3443 case R_PARISC_SEGREL32:
3444 case R_PARISC_TLS_DTPMOD32:
3445 case R_PARISC_TLS_DTPOFF32:
3446 case R_PARISC_TLS_TPREL32:
3447 r_field = e_fsel;
3448 break;
3449
3450 case R_PARISC_DLTIND21L:
3451 case R_PARISC_PCREL21L:
3452 case R_PARISC_PLABEL21L:
3453 r_field = e_lsel;
3454 break;
3455
3456 case R_PARISC_DIR21L:
3457 case R_PARISC_DPREL21L:
3458 case R_PARISC_TLS_GD21L:
3459 case R_PARISC_TLS_LDM21L:
3460 case R_PARISC_TLS_LDO21L:
3461 case R_PARISC_TLS_IE21L:
3462 case R_PARISC_TLS_LE21L:
3463 r_field = e_lrsel;
3464 break;
3465
3466 case R_PARISC_PCREL17R:
3467 case R_PARISC_PCREL14R:
3468 case R_PARISC_PLABEL14R:
3469 case R_PARISC_DLTIND14R:
3470 r_field = e_rsel;
3471 break;
3472
3473 case R_PARISC_DIR17R:
3474 case R_PARISC_DIR14R:
3475 case R_PARISC_DPREL14R:
3476 case R_PARISC_TLS_GD14R:
3477 case R_PARISC_TLS_LDM14R:
3478 case R_PARISC_TLS_LDO14R:
3479 case R_PARISC_TLS_IE14R:
3480 case R_PARISC_TLS_LE14R:
3481 r_field = e_rrsel;
3482 break;
3483
3484 case R_PARISC_PCREL12F:
3485 case R_PARISC_PCREL17F:
3486 case R_PARISC_PCREL22F:
3487 r_field = e_fsel;
3488
3489 if (r_type == (unsigned int) R_PARISC_PCREL17F)
3490 {
3491 max_branch_offset = (1 << (17-1)) << 2;
3492 }
3493 else if (r_type == (unsigned int) R_PARISC_PCREL12F)
3494 {
3495 max_branch_offset = (1 << (12-1)) << 2;
3496 }
3497 else
3498 {
3499 max_branch_offset = (1 << (22-1)) << 2;
3500 }
3501
3502 /* sym_sec is NULL on undefined weak syms or when shared on
3503 undefined syms. We've already checked for a stub for the
3504 shared undefined case. */
3505 if (sym_sec == NULL)
3506 break;
3507
3508 /* If the branch is out of reach, then redirect the
3509 call to the local stub for this function. */
3510 if (value + addend + max_branch_offset >= 2*max_branch_offset)
3511 {
3512 hsh = hppa_get_stub_entry (input_section, sym_sec,
3513 hh, rela, htab);
3514 if (hsh == NULL)
3515 return bfd_reloc_undefined;
3516
3517 /* Munge up the value and addend so that we call the stub
3518 rather than the procedure directly. */
3519 value = (hsh->stub_offset
3520 + hsh->stub_sec->output_offset
3521 + hsh->stub_sec->output_section->vma
3522 - location);
3523 addend = -8;
3524 }
3525 break;
3526
3527 /* Something we don't know how to handle. */
3528 default:
3529 return bfd_reloc_notsupported;
3530 }
3531
3532 /* Make sure we can reach the stub. */
3533 if (max_branch_offset != 0
3534 && value + addend + max_branch_offset >= 2*max_branch_offset)
3535 {
3536 _bfd_error_handler
3537 /* xgettext:c-format */
3538 (_("%pB(%pA+%#" PRIx64 "): cannot reach %s, "
3539 "recompile with -ffunction-sections"),
3540 input_bfd,
3541 input_section,
3542 (uint64_t) offset,
3543 hsh->bh_root.string);
3544 bfd_set_error (bfd_error_bad_value);
3545 return bfd_reloc_notsupported;
3546 }
3547
3548 val = hppa_field_adjust (value, addend, r_field);
3549
3550 switch (r_type)
3551 {
3552 case R_PARISC_PCREL12F:
3553 case R_PARISC_PCREL17C:
3554 case R_PARISC_PCREL17F:
3555 case R_PARISC_PCREL17R:
3556 case R_PARISC_PCREL22F:
3557 case R_PARISC_DIR17F:
3558 case R_PARISC_DIR17R:
3559 /* This is a branch. Divide the offset by four.
3560 Note that we need to decide whether it's a branch or
3561 otherwise by inspecting the reloc. Inspecting insn won't
3562 work as insn might be from a .word directive. */
3563 val >>= 2;
3564 break;
3565
3566 default:
3567 break;
3568 }
3569
3570 insn = hppa_rebuild_insn (insn, val, r_format);
3571
3572 /* Update the instruction word. */
3573 bfd_put_32 (input_bfd, (bfd_vma) insn, hit_data);
3574 return bfd_reloc_ok;
3575 }
3576
3577 /* Relocate an HPPA ELF section. */
3578
3579 static bfd_boolean
3580 elf32_hppa_relocate_section (bfd *output_bfd,
3581 struct bfd_link_info *info,
3582 bfd *input_bfd,
3583 asection *input_section,
3584 bfd_byte *contents,
3585 Elf_Internal_Rela *relocs,
3586 Elf_Internal_Sym *local_syms,
3587 asection **local_sections)
3588 {
3589 bfd_vma *local_got_offsets;
3590 struct elf32_hppa_link_hash_table *htab;
3591 Elf_Internal_Shdr *symtab_hdr;
3592 Elf_Internal_Rela *rela;
3593 Elf_Internal_Rela *relend;
3594
3595 symtab_hdr = &elf_tdata (input_bfd)->symtab_hdr;
3596
3597 htab = hppa_link_hash_table (info);
3598 if (htab == NULL)
3599 return FALSE;
3600
3601 local_got_offsets = elf_local_got_offsets (input_bfd);
3602
3603 rela = relocs;
3604 relend = relocs + input_section->reloc_count;
3605 for (; rela < relend; rela++)
3606 {
3607 unsigned int r_type;
3608 reloc_howto_type *howto;
3609 unsigned int r_symndx;
3610 struct elf32_hppa_link_hash_entry *hh;
3611 Elf_Internal_Sym *sym;
3612 asection *sym_sec;
3613 bfd_vma relocation;
3614 bfd_reloc_status_type rstatus;
3615 const char *sym_name;
3616 bfd_boolean plabel;
3617 bfd_boolean warned_undef;
3618
3619 r_type = ELF32_R_TYPE (rela->r_info);
3620 if (r_type >= (unsigned int) R_PARISC_UNIMPLEMENTED)
3621 {
3622 bfd_set_error (bfd_error_bad_value);
3623 return FALSE;
3624 }
3625 if (r_type == (unsigned int) R_PARISC_GNU_VTENTRY
3626 || r_type == (unsigned int) R_PARISC_GNU_VTINHERIT)
3627 continue;
3628
3629 r_symndx = ELF32_R_SYM (rela->r_info);
3630 hh = NULL;
3631 sym = NULL;
3632 sym_sec = NULL;
3633 warned_undef = FALSE;
3634 if (r_symndx < symtab_hdr->sh_info)
3635 {
3636 /* This is a local symbol, h defaults to NULL. */
3637 sym = local_syms + r_symndx;
3638 sym_sec = local_sections[r_symndx];
3639 relocation = _bfd_elf_rela_local_sym (output_bfd, sym, &sym_sec, rela);
3640 }
3641 else
3642 {
3643 struct elf_link_hash_entry *eh;
3644 bfd_boolean unresolved_reloc, ignored;
3645 struct elf_link_hash_entry **sym_hashes = elf_sym_hashes (input_bfd);
3646
3647 RELOC_FOR_GLOBAL_SYMBOL (info, input_bfd, input_section, rela,
3648 r_symndx, symtab_hdr, sym_hashes,
3649 eh, sym_sec, relocation,
3650 unresolved_reloc, warned_undef,
3651 ignored);
3652
3653 if (!bfd_link_relocatable (info)
3654 && relocation == 0
3655 && eh->root.type != bfd_link_hash_defined
3656 && eh->root.type != bfd_link_hash_defweak
3657 && eh->root.type != bfd_link_hash_undefweak)
3658 {
3659 if (info->unresolved_syms_in_objects == RM_IGNORE
3660 && ELF_ST_VISIBILITY (eh->other) == STV_DEFAULT
3661 && eh->type == STT_PARISC_MILLI)
3662 {
3663 (*info->callbacks->undefined_symbol)
3664 (info, eh_name (eh), input_bfd,
3665 input_section, rela->r_offset, FALSE);
3666 warned_undef = TRUE;
3667 }
3668 }
3669 hh = hppa_elf_hash_entry (eh);
3670 }
3671
3672 if (sym_sec != NULL && discarded_section (sym_sec))
3673 RELOC_AGAINST_DISCARDED_SECTION (info, input_bfd, input_section,
3674 rela, 1, relend,
3675 elf_hppa_howto_table + r_type, 0,
3676 contents);
3677
3678 if (bfd_link_relocatable (info))
3679 continue;
3680
3681 /* Do any required modifications to the relocation value, and
3682 determine what types of dynamic info we need to output, if
3683 any. */
3684 plabel = 0;
3685 switch (r_type)
3686 {
3687 case R_PARISC_DLTIND14F:
3688 case R_PARISC_DLTIND14R:
3689 case R_PARISC_DLTIND21L:
3690 {
3691 bfd_vma off;
3692 bfd_boolean do_got = FALSE;
3693 bfd_boolean reloc = bfd_link_pic (info);
3694
3695 /* Relocation is to the entry for this symbol in the
3696 global offset table. */
3697 if (hh != NULL)
3698 {
3699 bfd_boolean dyn;
3700
3701 off = hh->eh.got.offset;
3702 dyn = htab->etab.dynamic_sections_created;
3703 reloc = (!UNDEFWEAK_NO_DYNAMIC_RELOC (info, &hh->eh)
3704 && (reloc
3705 || (hh->eh.dynindx != -1
3706 && !SYMBOL_REFERENCES_LOCAL (info, &hh->eh))));
3707 if (!reloc
3708 || !WILL_CALL_FINISH_DYNAMIC_SYMBOL (dyn,
3709 bfd_link_pic (info),
3710 &hh->eh))
3711 {
3712 /* If we aren't going to call finish_dynamic_symbol,
3713 then we need to handle initialisation of the .got
3714 entry and create needed relocs here. Since the
3715 offset must always be a multiple of 4, we use the
3716 least significant bit to record whether we have
3717 initialised it already. */
3718 if ((off & 1) != 0)
3719 off &= ~1;
3720 else
3721 {
3722 hh->eh.got.offset |= 1;
3723 do_got = TRUE;
3724 }
3725 }
3726 }
3727 else
3728 {
3729 /* Local symbol case. */
3730 if (local_got_offsets == NULL)
3731 abort ();
3732
3733 off = local_got_offsets[r_symndx];
3734
3735 /* The offset must always be a multiple of 4. We use
3736 the least significant bit to record whether we have
3737 already generated the necessary reloc. */
3738 if ((off & 1) != 0)
3739 off &= ~1;
3740 else
3741 {
3742 local_got_offsets[r_symndx] |= 1;
3743 do_got = TRUE;
3744 }
3745 }
3746
3747 if (do_got)
3748 {
3749 if (reloc)
3750 {
3751 /* Output a dynamic relocation for this GOT entry.
3752 In this case it is relative to the base of the
3753 object because the symbol index is zero. */
3754 Elf_Internal_Rela outrel;
3755 bfd_byte *loc;
3756 asection *sec = htab->etab.srelgot;
3757
3758 outrel.r_offset = (off
3759 + htab->etab.sgot->output_offset
3760 + htab->etab.sgot->output_section->vma);
3761 outrel.r_info = ELF32_R_INFO (0, R_PARISC_DIR32);
3762 outrel.r_addend = relocation;
3763 loc = sec->contents;
3764 loc += sec->reloc_count++ * sizeof (Elf32_External_Rela);
3765 bfd_elf32_swap_reloca_out (output_bfd, &outrel, loc);
3766 }
3767 else
3768 bfd_put_32 (output_bfd, relocation,
3769 htab->etab.sgot->contents + off);
3770 }
3771
3772 if (off >= (bfd_vma) -2)
3773 abort ();
3774
3775 /* Add the base of the GOT to the relocation value. */
3776 relocation = (off
3777 + htab->etab.sgot->output_offset
3778 + htab->etab.sgot->output_section->vma);
3779 }
3780 break;
3781
3782 case R_PARISC_SEGREL32:
3783 /* If this is the first SEGREL relocation, then initialize
3784 the segment base values. */
3785 if (htab->text_segment_base == (bfd_vma) -1)
3786 bfd_map_over_sections (output_bfd, hppa_record_segment_addr, htab);
3787 break;
3788
3789 case R_PARISC_PLABEL14R:
3790 case R_PARISC_PLABEL21L:
3791 case R_PARISC_PLABEL32:
3792 if (htab->etab.dynamic_sections_created)
3793 {
3794 bfd_vma off;
3795 bfd_boolean do_plt = 0;
3796 /* If we have a global symbol with a PLT slot, then
3797 redirect this relocation to it. */
3798 if (hh != NULL)
3799 {
3800 off = hh->eh.plt.offset;
3801 if (! WILL_CALL_FINISH_DYNAMIC_SYMBOL (1,
3802 bfd_link_pic (info),
3803 &hh->eh))
3804 {
3805 /* In a non-shared link, adjust_dynamic_symbol
3806 isn't called for symbols forced local. We
3807 need to write out the plt entry here. */
3808 if ((off & 1) != 0)
3809 off &= ~1;
3810 else
3811 {
3812 hh->eh.plt.offset |= 1;
3813 do_plt = 1;
3814 }
3815 }
3816 }
3817 else
3818 {
3819 bfd_vma *local_plt_offsets;
3820
3821 if (local_got_offsets == NULL)
3822 abort ();
3823
3824 local_plt_offsets = local_got_offsets + symtab_hdr->sh_info;
3825 off = local_plt_offsets[r_symndx];
3826
3827 /* As for the local .got entry case, we use the last
3828 bit to record whether we've already initialised
3829 this local .plt entry. */
3830 if ((off & 1) != 0)
3831 off &= ~1;
3832 else
3833 {
3834 local_plt_offsets[r_symndx] |= 1;
3835 do_plt = 1;
3836 }
3837 }
3838
3839 if (do_plt)
3840 {
3841 if (bfd_link_pic (info))
3842 {
3843 /* Output a dynamic IPLT relocation for this
3844 PLT entry. */
3845 Elf_Internal_Rela outrel;
3846 bfd_byte *loc;
3847 asection *s = htab->etab.srelplt;
3848
3849 outrel.r_offset = (off
3850 + htab->etab.splt->output_offset
3851 + htab->etab.splt->output_section->vma);
3852 outrel.r_info = ELF32_R_INFO (0, R_PARISC_IPLT);
3853 outrel.r_addend = relocation;
3854 loc = s->contents;
3855 loc += s->reloc_count++ * sizeof (Elf32_External_Rela);
3856 bfd_elf32_swap_reloca_out (output_bfd, &outrel, loc);
3857 }
3858 else
3859 {
3860 bfd_put_32 (output_bfd,
3861 relocation,
3862 htab->etab.splt->contents + off);
3863 bfd_put_32 (output_bfd,
3864 elf_gp (htab->etab.splt->output_section->owner),
3865 htab->etab.splt->contents + off + 4);
3866 }
3867 }
3868
3869 if (off >= (bfd_vma) -2)
3870 abort ();
3871
3872 /* PLABELs contain function pointers. Relocation is to
3873 the entry for the function in the .plt. The magic +2
3874 offset signals to $$dyncall that the function pointer
3875 is in the .plt and thus has a gp pointer too.
3876 Exception: Undefined PLABELs should have a value of
3877 zero. */
3878 if (hh == NULL
3879 || (hh->eh.root.type != bfd_link_hash_undefweak
3880 && hh->eh.root.type != bfd_link_hash_undefined))
3881 {
3882 relocation = (off
3883 + htab->etab.splt->output_offset
3884 + htab->etab.splt->output_section->vma
3885 + 2);
3886 }
3887 plabel = 1;
3888 }
3889 /* Fall through. */
3890
3891 case R_PARISC_DIR17F:
3892 case R_PARISC_DIR17R:
3893 case R_PARISC_DIR14F:
3894 case R_PARISC_DIR14R:
3895 case R_PARISC_DIR21L:
3896 case R_PARISC_DPREL14F:
3897 case R_PARISC_DPREL14R:
3898 case R_PARISC_DPREL21L:
3899 case R_PARISC_DIR32:
3900 if ((input_section->flags & SEC_ALLOC) == 0)
3901 break;
3902
3903 if (bfd_link_pic (info)
3904 ? ((hh == NULL
3905 || hh->eh.dyn_relocs != NULL)
3906 && ((hh != NULL && pc_dynrelocs (hh))
3907 || IS_ABSOLUTE_RELOC (r_type)))
3908 : (hh != NULL
3909 && hh->eh.dyn_relocs != NULL))
3910 {
3911 Elf_Internal_Rela outrel;
3912 bfd_boolean skip;
3913 asection *sreloc;
3914 bfd_byte *loc;
3915
3916 /* When generating a shared object, these relocations
3917 are copied into the output file to be resolved at run
3918 time. */
3919
3920 outrel.r_addend = rela->r_addend;
3921 outrel.r_offset =
3922 _bfd_elf_section_offset (output_bfd, info, input_section,
3923 rela->r_offset);
3924 skip = (outrel.r_offset == (bfd_vma) -1
3925 || outrel.r_offset == (bfd_vma) -2);
3926 outrel.r_offset += (input_section->output_offset
3927 + input_section->output_section->vma);
3928
3929 if (skip)
3930 {
3931 memset (&outrel, 0, sizeof (outrel));
3932 }
3933 else if (hh != NULL
3934 && hh->eh.dynindx != -1
3935 && (plabel
3936 || !IS_ABSOLUTE_RELOC (r_type)
3937 || !bfd_link_pic (info)
3938 || !SYMBOLIC_BIND (info, &hh->eh)
3939 || !hh->eh.def_regular))
3940 {
3941 outrel.r_info = ELF32_R_INFO (hh->eh.dynindx, r_type);
3942 }
3943 else /* It's a local symbol, or one marked to become local. */
3944 {
3945 int indx = 0;
3946
3947 /* Add the absolute offset of the symbol. */
3948 outrel.r_addend += relocation;
3949
3950 /* Global plabels need to be processed by the
3951 dynamic linker so that functions have at most one
3952 fptr. For this reason, we need to differentiate
3953 between global and local plabels, which we do by
3954 providing the function symbol for a global plabel
3955 reloc, and no symbol for local plabels. */
3956 if (! plabel
3957 && sym_sec != NULL
3958 && sym_sec->output_section != NULL
3959 && ! bfd_is_abs_section (sym_sec))
3960 {
3961 asection *osec;
3962
3963 osec = sym_sec->output_section;
3964 indx = elf_section_data (osec)->dynindx;
3965 if (indx == 0)
3966 {
3967 osec = htab->etab.text_index_section;
3968 indx = elf_section_data (osec)->dynindx;
3969 }
3970 BFD_ASSERT (indx != 0);
3971
3972 /* We are turning this relocation into one
3973 against a section symbol, so subtract out the
3974 output section's address but not the offset
3975 of the input section in the output section. */
3976 outrel.r_addend -= osec->vma;
3977 }
3978
3979 outrel.r_info = ELF32_R_INFO (indx, r_type);
3980 }
3981 sreloc = elf_section_data (input_section)->sreloc;
3982 if (sreloc == NULL)
3983 abort ();
3984
3985 loc = sreloc->contents;
3986 loc += sreloc->reloc_count++ * sizeof (Elf32_External_Rela);
3987 bfd_elf32_swap_reloca_out (output_bfd, &outrel, loc);
3988 }
3989 break;
3990
3991 case R_PARISC_TLS_LDM21L:
3992 case R_PARISC_TLS_LDM14R:
3993 {
3994 bfd_vma off;
3995
3996 off = htab->tls_ldm_got.offset;
3997 if (off & 1)
3998 off &= ~1;
3999 else
4000 {
4001 Elf_Internal_Rela outrel;
4002 bfd_byte *loc;
4003
4004 outrel.r_offset = (off
4005 + htab->etab.sgot->output_section->vma
4006 + htab->etab.sgot->output_offset);
4007 outrel.r_addend = 0;
4008 outrel.r_info = ELF32_R_INFO (0, R_PARISC_TLS_DTPMOD32);
4009 loc = htab->etab.srelgot->contents;
4010 loc += htab->etab.srelgot->reloc_count++ * sizeof (Elf32_External_Rela);
4011
4012 bfd_elf32_swap_reloca_out (output_bfd, &outrel, loc);
4013 htab->tls_ldm_got.offset |= 1;
4014 }
4015
4016 /* Add the base of the GOT to the relocation value. */
4017 relocation = (off
4018 + htab->etab.sgot->output_offset
4019 + htab->etab.sgot->output_section->vma);
4020
4021 break;
4022 }
4023
4024 case R_PARISC_TLS_LDO21L:
4025 case R_PARISC_TLS_LDO14R:
4026 relocation -= dtpoff_base (info);
4027 break;
4028
4029 case R_PARISC_TLS_GD21L:
4030 case R_PARISC_TLS_GD14R:
4031 case R_PARISC_TLS_IE21L:
4032 case R_PARISC_TLS_IE14R:
4033 {
4034 bfd_vma off;
4035 int indx;
4036 char tls_type;
4037
4038 indx = 0;
4039 if (hh != NULL)
4040 {
4041 if (!htab->etab.dynamic_sections_created
4042 || hh->eh.dynindx == -1
4043 || SYMBOL_REFERENCES_LOCAL (info, &hh->eh)
4044 || UNDEFWEAK_NO_DYNAMIC_RELOC (info, &hh->eh))
4045 /* This is actually a static link, or it is a
4046 -Bsymbolic link and the symbol is defined
4047 locally, or the symbol was forced to be local
4048 because of a version file. */
4049 ;
4050 else
4051 indx = hh->eh.dynindx;
4052 off = hh->eh.got.offset;
4053 tls_type = hh->tls_type;
4054 }
4055 else
4056 {
4057 off = local_got_offsets[r_symndx];
4058 tls_type = hppa_elf_local_got_tls_type (input_bfd)[r_symndx];
4059 }
4060
4061 if (tls_type == GOT_UNKNOWN)
4062 abort ();
4063
4064 if ((off & 1) != 0)
4065 off &= ~1;
4066 else
4067 {
4068 bfd_boolean need_relocs = FALSE;
4069 Elf_Internal_Rela outrel;
4070 bfd_byte *loc = NULL;
4071 int cur_off = off;
4072
4073 /* The GOT entries have not been initialized yet. Do it
4074 now, and emit any relocations. If both an IE GOT and a
4075 GD GOT are necessary, we emit the GD first. */
4076
4077 if (indx != 0
4078 || (bfd_link_dll (info)
4079 && (hh == NULL
4080 || !UNDEFWEAK_NO_DYNAMIC_RELOC (info, &hh->eh))))
4081 {
4082 need_relocs = TRUE;
4083 loc = htab->etab.srelgot->contents;
4084 loc += (htab->etab.srelgot->reloc_count
4085 * sizeof (Elf32_External_Rela));
4086 }
4087
4088 if (tls_type & GOT_TLS_GD)
4089 {
4090 if (need_relocs)
4091 {
4092 outrel.r_offset
4093 = (cur_off
4094 + htab->etab.sgot->output_section->vma
4095 + htab->etab.sgot->output_offset);
4096 outrel.r_info
4097 = ELF32_R_INFO (indx, R_PARISC_TLS_DTPMOD32);
4098 outrel.r_addend = 0;
4099 bfd_elf32_swap_reloca_out (output_bfd, &outrel, loc);
4100 htab->etab.srelgot->reloc_count++;
4101 loc += sizeof (Elf32_External_Rela);
4102 bfd_put_32 (output_bfd, 0,
4103 htab->etab.sgot->contents + cur_off);
4104 }
4105 else
4106 /* If we are not emitting relocations for a
4107 general dynamic reference, then we must be in a
4108 static link or an executable link with the
4109 symbol binding locally. Mark it as belonging
4110 to module 1, the executable. */
4111 bfd_put_32 (output_bfd, 1,
4112 htab->etab.sgot->contents + cur_off);
4113
4114 if (indx != 0)
4115 {
4116 outrel.r_info
4117 = ELF32_R_INFO (indx, R_PARISC_TLS_DTPOFF32);
4118 outrel.r_offset += 4;
4119 bfd_elf32_swap_reloca_out (output_bfd, &outrel, loc);
4120 htab->etab.srelgot->reloc_count++;
4121 loc += sizeof (Elf32_External_Rela);
4122 bfd_put_32 (output_bfd, 0,
4123 htab->etab.sgot->contents + cur_off + 4);
4124 }
4125 else
4126 bfd_put_32 (output_bfd, relocation - dtpoff_base (info),
4127 htab->etab.sgot->contents + cur_off + 4);
4128 cur_off += 8;
4129 }
4130
4131 if (tls_type & GOT_TLS_IE)
4132 {
4133 if (need_relocs
4134 && !(bfd_link_executable (info)
4135 && SYMBOL_REFERENCES_LOCAL (info, &hh->eh)))
4136 {
4137 outrel.r_offset
4138 = (cur_off
4139 + htab->etab.sgot->output_section->vma
4140 + htab->etab.sgot->output_offset);
4141 outrel.r_info = ELF32_R_INFO (indx,
4142 R_PARISC_TLS_TPREL32);
4143 if (indx == 0)
4144 outrel.r_addend = relocation - dtpoff_base (info);
4145 else
4146 outrel.r_addend = 0;
4147 bfd_elf32_swap_reloca_out (output_bfd, &outrel, loc);
4148 htab->etab.srelgot->reloc_count++;
4149 loc += sizeof (Elf32_External_Rela);
4150 }
4151 else
4152 bfd_put_32 (output_bfd, tpoff (info, relocation),
4153 htab->etab.sgot->contents + cur_off);
4154 cur_off += 4;
4155 }
4156
4157 if (hh != NULL)
4158 hh->eh.got.offset |= 1;
4159 else
4160 local_got_offsets[r_symndx] |= 1;
4161 }
4162
4163 if ((tls_type & GOT_NORMAL) != 0
4164 && (tls_type & (GOT_TLS_GD | GOT_TLS_LDM | GOT_TLS_IE)) != 0)
4165 {
4166 if (hh != NULL)
4167 _bfd_error_handler (_("%s has both normal and TLS relocs"),
4168 hh_name (hh));
4169 else
4170 {
4171 Elf_Internal_Sym *isym
4172 = bfd_sym_from_r_symndx (&htab->sym_cache,
4173 input_bfd, r_symndx);
4174 if (isym == NULL)
4175 return FALSE;
4176 sym_name
4177 = bfd_elf_string_from_elf_section (input_bfd,
4178 symtab_hdr->sh_link,
4179 isym->st_name);
4180 if (sym_name == NULL)
4181 return FALSE;
4182 if (*sym_name == '\0')
4183 sym_name = bfd_section_name (sym_sec);
4184 _bfd_error_handler
4185 (_("%pB:%s has both normal and TLS relocs"),
4186 input_bfd, sym_name);
4187 }
4188 bfd_set_error (bfd_error_bad_value);
4189 return FALSE;
4190 }
4191
4192 if ((tls_type & GOT_TLS_GD)
4193 && r_type != R_PARISC_TLS_GD21L
4194 && r_type != R_PARISC_TLS_GD14R)
4195 off += 2 * GOT_ENTRY_SIZE;
4196
4197 /* Add the base of the GOT to the relocation value. */
4198 relocation = (off
4199 + htab->etab.sgot->output_offset
4200 + htab->etab.sgot->output_section->vma);
4201
4202 break;
4203 }
4204
4205 case R_PARISC_TLS_LE21L:
4206 case R_PARISC_TLS_LE14R:
4207 {
4208 relocation = tpoff (info, relocation);
4209 break;
4210 }
4211 break;
4212
4213 default:
4214 break;
4215 }
4216
4217 rstatus = final_link_relocate (input_section, contents, rela, relocation,
4218 htab, sym_sec, hh, info);
4219
4220 if (rstatus == bfd_reloc_ok)
4221 continue;
4222
4223 if (hh != NULL)
4224 sym_name = hh_name (hh);
4225 else
4226 {
4227 sym_name = bfd_elf_string_from_elf_section (input_bfd,
4228 symtab_hdr->sh_link,
4229 sym->st_name);
4230 if (sym_name == NULL)
4231 return FALSE;
4232 if (*sym_name == '\0')
4233 sym_name = bfd_section_name (sym_sec);
4234 }
4235
4236 howto = elf_hppa_howto_table + r_type;
4237
4238 if (rstatus == bfd_reloc_undefined || rstatus == bfd_reloc_notsupported)
4239 {
4240 if (rstatus == bfd_reloc_notsupported || !warned_undef)
4241 {
4242 _bfd_error_handler
4243 /* xgettext:c-format */
4244 (_("%pB(%pA+%#" PRIx64 "): cannot handle %s for %s"),
4245 input_bfd,
4246 input_section,
4247 (uint64_t) rela->r_offset,
4248 howto->name,
4249 sym_name);
4250 bfd_set_error (bfd_error_bad_value);
4251 return FALSE;
4252 }
4253 }
4254 else
4255 (*info->callbacks->reloc_overflow)
4256 (info, (hh ? &hh->eh.root : NULL), sym_name, howto->name,
4257 (bfd_vma) 0, input_bfd, input_section, rela->r_offset);
4258 }
4259
4260 return TRUE;
4261 }
4262
4263 /* Finish up dynamic symbol handling. We set the contents of various
4264 dynamic sections here. */
4265
4266 static bfd_boolean
4267 elf32_hppa_finish_dynamic_symbol (bfd *output_bfd,
4268 struct bfd_link_info *info,
4269 struct elf_link_hash_entry *eh,
4270 Elf_Internal_Sym *sym)
4271 {
4272 struct elf32_hppa_link_hash_table *htab;
4273 Elf_Internal_Rela rela;
4274 bfd_byte *loc;
4275
4276 htab = hppa_link_hash_table (info);
4277 if (htab == NULL)
4278 return FALSE;
4279
4280 if (eh->plt.offset != (bfd_vma) -1)
4281 {
4282 bfd_vma value;
4283
4284 if (eh->plt.offset & 1)
4285 abort ();
4286
4287 /* This symbol has an entry in the procedure linkage table. Set
4288 it up.
4289
4290 The format of a plt entry is
4291 <funcaddr>
4292 <__gp>
4293 */
4294 value = 0;
4295 if (eh->root.type == bfd_link_hash_defined
4296 || eh->root.type == bfd_link_hash_defweak)
4297 {
4298 value = eh->root.u.def.value;
4299 if (eh->root.u.def.section->output_section != NULL)
4300 value += (eh->root.u.def.section->output_offset
4301 + eh->root.u.def.section->output_section->vma);
4302 }
4303
4304 /* Create a dynamic IPLT relocation for this entry. */
4305 rela.r_offset = (eh->plt.offset
4306 + htab->etab.splt->output_offset
4307 + htab->etab.splt->output_section->vma);
4308 if (eh->dynindx != -1)
4309 {
4310 rela.r_info = ELF32_R_INFO (eh->dynindx, R_PARISC_IPLT);
4311 rela.r_addend = 0;
4312 }
4313 else
4314 {
4315 /* This symbol has been marked to become local, and is
4316 used by a plabel so must be kept in the .plt. */
4317 rela.r_info = ELF32_R_INFO (0, R_PARISC_IPLT);
4318 rela.r_addend = value;
4319 }
4320
4321 loc = htab->etab.srelplt->contents;
4322 loc += htab->etab.srelplt->reloc_count++ * sizeof (Elf32_External_Rela);
4323 bfd_elf32_swap_reloca_out (htab->etab.splt->output_section->owner, &rela, loc);
4324
4325 if (!eh->def_regular)
4326 {
4327 /* Mark the symbol as undefined, rather than as defined in
4328 the .plt section. Leave the value alone. */
4329 sym->st_shndx = SHN_UNDEF;
4330 }
4331 }
4332
4333 if (eh->got.offset != (bfd_vma) -1
4334 && (hppa_elf_hash_entry (eh)->tls_type & GOT_NORMAL) != 0
4335 && !UNDEFWEAK_NO_DYNAMIC_RELOC (info, eh))
4336 {
4337 bfd_boolean is_dyn = (eh->dynindx != -1
4338 && !SYMBOL_REFERENCES_LOCAL (info, eh));
4339
4340 if (is_dyn || bfd_link_pic (info))
4341 {
4342 /* This symbol has an entry in the global offset table. Set
4343 it up. */
4344
4345 rela.r_offset = ((eh->got.offset &~ (bfd_vma) 1)
4346 + htab->etab.sgot->output_offset
4347 + htab->etab.sgot->output_section->vma);
4348
4349 /* If this is a -Bsymbolic link and the symbol is defined
4350 locally or was forced to be local because of a version
4351 file, we just want to emit a RELATIVE reloc. The entry
4352 in the global offset table will already have been
4353 initialized in the relocate_section function. */
4354 if (!is_dyn)
4355 {
4356 rela.r_info = ELF32_R_INFO (0, R_PARISC_DIR32);
4357 rela.r_addend = (eh->root.u.def.value
4358 + eh->root.u.def.section->output_offset
4359 + eh->root.u.def.section->output_section->vma);
4360 }
4361 else
4362 {
4363 if ((eh->got.offset & 1) != 0)
4364 abort ();
4365
4366 bfd_put_32 (output_bfd, 0,
4367 htab->etab.sgot->contents + (eh->got.offset & ~1));
4368 rela.r_info = ELF32_R_INFO (eh->dynindx, R_PARISC_DIR32);
4369 rela.r_addend = 0;
4370 }
4371
4372 loc = htab->etab.srelgot->contents;
4373 loc += (htab->etab.srelgot->reloc_count++
4374 * sizeof (Elf32_External_Rela));
4375 bfd_elf32_swap_reloca_out (output_bfd, &rela, loc);
4376 }
4377 }
4378
4379 if (eh->needs_copy)
4380 {
4381 asection *sec;
4382
4383 /* This symbol needs a copy reloc. Set it up. */
4384
4385 if (! (eh->dynindx != -1
4386 && (eh->root.type == bfd_link_hash_defined
4387 || eh->root.type == bfd_link_hash_defweak)))
4388 abort ();
4389
4390 rela.r_offset = (eh->root.u.def.value
4391 + eh->root.u.def.section->output_offset
4392 + eh->root.u.def.section->output_section->vma);
4393 rela.r_addend = 0;
4394 rela.r_info = ELF32_R_INFO (eh->dynindx, R_PARISC_COPY);
4395 if (eh->root.u.def.section == htab->etab.sdynrelro)
4396 sec = htab->etab.sreldynrelro;
4397 else
4398 sec = htab->etab.srelbss;
4399 loc = sec->contents + sec->reloc_count++ * sizeof (Elf32_External_Rela);
4400 bfd_elf32_swap_reloca_out (output_bfd, &rela, loc);
4401 }
4402
4403 /* Mark _DYNAMIC and _GLOBAL_OFFSET_TABLE_ as absolute. */
4404 if (eh == htab->etab.hdynamic || eh == htab->etab.hgot)
4405 {
4406 sym->st_shndx = SHN_ABS;
4407 }
4408
4409 return TRUE;
4410 }
4411
4412 /* Used to decide how to sort relocs in an optimal manner for the
4413 dynamic linker, before writing them out. */
4414
4415 static enum elf_reloc_type_class
4416 elf32_hppa_reloc_type_class (const struct bfd_link_info *info ATTRIBUTE_UNUSED,
4417 const asection *rel_sec ATTRIBUTE_UNUSED,
4418 const Elf_Internal_Rela *rela)
4419 {
4420 /* Handle TLS relocs first; we don't want them to be marked
4421 relative by the "if (ELF32_R_SYM (rela->r_info) == STN_UNDEF)"
4422 check below. */
4423 switch ((int) ELF32_R_TYPE (rela->r_info))
4424 {
4425 case R_PARISC_TLS_DTPMOD32:
4426 case R_PARISC_TLS_DTPOFF32:
4427 case R_PARISC_TLS_TPREL32:
4428 return reloc_class_normal;
4429 }
4430
4431 if (ELF32_R_SYM (rela->r_info) == STN_UNDEF)
4432 return reloc_class_relative;
4433
4434 switch ((int) ELF32_R_TYPE (rela->r_info))
4435 {
4436 case R_PARISC_IPLT:
4437 return reloc_class_plt;
4438 case R_PARISC_COPY:
4439 return reloc_class_copy;
4440 default:
4441 return reloc_class_normal;
4442 }
4443 }
4444
4445 /* Finish up the dynamic sections. */
4446
4447 static bfd_boolean
4448 elf32_hppa_finish_dynamic_sections (bfd *output_bfd,
4449 struct bfd_link_info *info)
4450 {
4451 bfd *dynobj;
4452 struct elf32_hppa_link_hash_table *htab;
4453 asection *sdyn;
4454 asection * sgot;
4455
4456 htab = hppa_link_hash_table (info);
4457 if (htab == NULL)
4458 return FALSE;
4459
4460 dynobj = htab->etab.dynobj;
4461
4462 sgot = htab->etab.sgot;
4463 /* A broken linker script might have discarded the dynamic sections.
4464 Catch this here so that we do not seg-fault later on. */
4465 if (sgot != NULL && bfd_is_abs_section (sgot->output_section))
4466 return FALSE;
4467
4468 sdyn = bfd_get_linker_section (dynobj, ".dynamic");
4469
4470 if (htab->etab.dynamic_sections_created)
4471 {
4472 Elf32_External_Dyn *dyncon, *dynconend;
4473
4474 if (sdyn == NULL)
4475 abort ();
4476
4477 dyncon = (Elf32_External_Dyn *) sdyn->contents;
4478 dynconend = (Elf32_External_Dyn *) (sdyn->contents + sdyn->size);
4479 for (; dyncon < dynconend; dyncon++)
4480 {
4481 Elf_Internal_Dyn dyn;
4482 asection *s;
4483
4484 bfd_elf32_swap_dyn_in (dynobj, dyncon, &dyn);
4485
4486 switch (dyn.d_tag)
4487 {
4488 default:
4489 continue;
4490
4491 case DT_PLTGOT:
4492 /* Use PLTGOT to set the GOT register. */
4493 dyn.d_un.d_ptr = elf_gp (output_bfd);
4494 break;
4495
4496 case DT_JMPREL:
4497 s = htab->etab.srelplt;
4498 dyn.d_un.d_ptr = s->output_section->vma + s->output_offset;
4499 break;
4500
4501 case DT_PLTRELSZ:
4502 s = htab->etab.srelplt;
4503 dyn.d_un.d_val = s->size;
4504 break;
4505 }
4506
4507 bfd_elf32_swap_dyn_out (output_bfd, &dyn, dyncon);
4508 }
4509 }
4510
4511 if (sgot != NULL && sgot->size != 0)
4512 {
4513 /* Fill in the first entry in the global offset table.
4514 We use it to point to our dynamic section, if we have one. */
4515 bfd_put_32 (output_bfd,
4516 sdyn ? sdyn->output_section->vma + sdyn->output_offset : 0,
4517 sgot->contents);
4518
4519 /* The second entry is reserved for use by the dynamic linker. */
4520 memset (sgot->contents + GOT_ENTRY_SIZE, 0, GOT_ENTRY_SIZE);
4521
4522 /* Set .got entry size. */
4523 elf_section_data (sgot->output_section)
4524 ->this_hdr.sh_entsize = GOT_ENTRY_SIZE;
4525 }
4526
4527 if (htab->etab.splt != NULL && htab->etab.splt->size != 0)
4528 {
4529 /* Set plt entry size to 0 instead of PLT_ENTRY_SIZE, since we add the
4530 plt stubs and as such the section does not hold a table of fixed-size
4531 entries. */
4532 elf_section_data (htab->etab.splt->output_section)->this_hdr.sh_entsize = 0;
4533
4534 if (htab->need_plt_stub)
4535 {
4536 /* Set up the .plt stub. */
4537 memcpy (htab->etab.splt->contents
4538 + htab->etab.splt->size - sizeof (plt_stub),
4539 plt_stub, sizeof (plt_stub));
4540
4541 if ((htab->etab.splt->output_offset
4542 + htab->etab.splt->output_section->vma
4543 + htab->etab.splt->size)
4544 != (sgot->output_offset
4545 + sgot->output_section->vma))
4546 {
4547 _bfd_error_handler
4548 (_(".got section not immediately after .plt section"));
4549 return FALSE;
4550 }
4551 }
4552 }
4553
4554 return TRUE;
4555 }
4556
4557 /* Called when writing out an object file to decide the type of a
4558 symbol. */
4559 static int
4560 elf32_hppa_elf_get_symbol_type (Elf_Internal_Sym *elf_sym, int type)
4561 {
4562 if (ELF_ST_TYPE (elf_sym->st_info) == STT_PARISC_MILLI)
4563 return STT_PARISC_MILLI;
4564 else
4565 return type;
4566 }
4567
4568 /* Misc BFD support code. */
4569 #define bfd_elf32_bfd_is_local_label_name elf_hppa_is_local_label_name
4570 #define bfd_elf32_bfd_reloc_type_lookup elf_hppa_reloc_type_lookup
4571 #define bfd_elf32_bfd_reloc_name_lookup elf_hppa_reloc_name_lookup
4572 #define elf_info_to_howto elf_hppa_info_to_howto
4573 #define elf_info_to_howto_rel elf_hppa_info_to_howto_rel
4574
4575 /* Stuff for the BFD linker. */
4576 #define bfd_elf32_bfd_final_link elf32_hppa_final_link
4577 #define bfd_elf32_bfd_link_hash_table_create elf32_hppa_link_hash_table_create
4578 #define elf_backend_adjust_dynamic_symbol elf32_hppa_adjust_dynamic_symbol
4579 #define elf_backend_copy_indirect_symbol elf32_hppa_copy_indirect_symbol
4580 #define elf_backend_check_relocs elf32_hppa_check_relocs
4581 #define elf_backend_relocs_compatible _bfd_elf_relocs_compatible
4582 #define elf_backend_create_dynamic_sections elf32_hppa_create_dynamic_sections
4583 #define elf_backend_fake_sections elf_hppa_fake_sections
4584 #define elf_backend_relocate_section elf32_hppa_relocate_section
4585 #define elf_backend_hide_symbol elf32_hppa_hide_symbol
4586 #define elf_backend_finish_dynamic_symbol elf32_hppa_finish_dynamic_symbol
4587 #define elf_backend_finish_dynamic_sections elf32_hppa_finish_dynamic_sections
4588 #define elf_backend_size_dynamic_sections elf32_hppa_size_dynamic_sections
4589 #define elf_backend_init_index_section _bfd_elf_init_1_index_section
4590 #define elf_backend_gc_mark_hook elf32_hppa_gc_mark_hook
4591 #define elf_backend_grok_prstatus elf32_hppa_grok_prstatus
4592 #define elf_backend_grok_psinfo elf32_hppa_grok_psinfo
4593 #define elf_backend_object_p elf32_hppa_object_p
4594 #define elf_backend_final_write_processing elf_hppa_final_write_processing
4595 #define elf_backend_get_symbol_type elf32_hppa_elf_get_symbol_type
4596 #define elf_backend_reloc_type_class elf32_hppa_reloc_type_class
4597 #define elf_backend_action_discarded elf_hppa_action_discarded
4598
4599 #define elf_backend_can_gc_sections 1
4600 #define elf_backend_can_refcount 1
4601 #define elf_backend_plt_alignment 2
4602 #define elf_backend_want_got_plt 0
4603 #define elf_backend_plt_readonly 0
4604 #define elf_backend_want_plt_sym 0
4605 #define elf_backend_got_header_size 8
4606 #define elf_backend_want_dynrelro 1
4607 #define elf_backend_rela_normal 1
4608 #define elf_backend_dtrel_excludes_plt 1
4609 #define elf_backend_no_page_alias 1
4610
4611 #define TARGET_BIG_SYM hppa_elf32_vec
4612 #define TARGET_BIG_NAME "elf32-hppa"
4613 #define ELF_ARCH bfd_arch_hppa
4614 #define ELF_TARGET_ID HPPA32_ELF_DATA
4615 #define ELF_MACHINE_CODE EM_PARISC
4616 #define ELF_MAXPAGESIZE 0x1000
4617 #define ELF_OSABI ELFOSABI_HPUX
4618 #define elf32_bed elf32_hppa_hpux_bed
4619
4620 #include "elf32-target.h"
4621
4622 #undef TARGET_BIG_SYM
4623 #define TARGET_BIG_SYM hppa_elf32_linux_vec
4624 #undef TARGET_BIG_NAME
4625 #define TARGET_BIG_NAME "elf32-hppa-linux"
4626 #undef ELF_OSABI
4627 #define ELF_OSABI ELFOSABI_GNU
4628 #undef elf32_bed
4629 #define elf32_bed elf32_hppa_linux_bed
4630
4631 #include "elf32-target.h"
4632
4633 #undef TARGET_BIG_SYM
4634 #define TARGET_BIG_SYM hppa_elf32_nbsd_vec
4635 #undef TARGET_BIG_NAME
4636 #define TARGET_BIG_NAME "elf32-hppa-netbsd"
4637 #undef ELF_OSABI
4638 #define ELF_OSABI ELFOSABI_NETBSD
4639 #undef elf32_bed
4640 #define elf32_bed elf32_hppa_netbsd_bed
4641
4642 #include "elf32-target.h"
This page took 0.143157 seconds and 5 git commands to generate.