Add support for arm-wince-pe target.
[deliverable/binutils-gdb.git] / bfd / elf32-hppa.c
CommitLineData
252b5132 1/* BFD back-end for HP PA-RISC ELF files.
e5094212 2 Copyright 1990, 1991, 1992, 1993, 1994, 1995, 1996, 1999, 2000, 2001,
acc990f2 3 2002, 2003 Free Software Foundation, Inc.
252b5132 4
30667bf3 5 Original code by
252b5132
RH
6 Center for Software Science
7 Department of Computer Science
8 University of Utah
30667bf3 9 Largely rewritten by Alan Modra <alan@linuxcare.com.au>
252b5132 10
ae9a127f 11 This file is part of BFD, the Binary File Descriptor library.
252b5132 12
ae9a127f
NC
13 This program is free software; you can redistribute it and/or modify
14 it under the terms of the GNU General Public License as published by
15 the Free Software Foundation; either version 2 of the License, or
16 (at your option) any later version.
252b5132 17
ae9a127f
NC
18 This program is distributed in the hope that it will be useful,
19 but WITHOUT ANY WARRANTY; without even the implied warranty of
20 MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
21 GNU General Public License for more details.
252b5132 22
ae9a127f
NC
23 You should have received a copy of the GNU General Public License
24 along with this program; if not, write to the Free Software
25 Foundation, Inc., 59 Temple Place - Suite 330, Boston, MA 02111-1307, USA. */
252b5132
RH
26
27#include "bfd.h"
28#include "sysdep.h"
252b5132
RH
29#include "libbfd.h"
30#include "elf-bfd.h"
9e103c9c
JL
31#include "elf/hppa.h"
32#include "libhppa.h"
33#include "elf32-hppa.h"
34#define ARCH_SIZE 32
edd21aca 35#include "elf32-hppa.h"
189c6563 36#include "elf-hppa.h"
9e103c9c 37
74d1c347
AM
38/* In order to gain some understanding of code in this file without
39 knowing all the intricate details of the linker, note the
40 following:
41
42 Functions named elf32_hppa_* are called by external routines, other
43 functions are only called locally. elf32_hppa_* functions appear
44 in this file more or less in the order in which they are called
45 from external routines. eg. elf32_hppa_check_relocs is called
46 early in the link process, elf32_hppa_finish_dynamic_sections is
47 one of the last functions. */
48
edd21aca 49/* We use two hash tables to hold information for linking PA ELF objects.
252b5132
RH
50
51 The first is the elf32_hppa_link_hash_table which is derived
52 from the standard ELF linker hash table. We use this as a place to
53 attach other hash tables and static information.
54
55 The second is the stub hash table which is derived from the
56 base BFD hash table. The stub hash table holds the information
30667bf3
AM
57 necessary to build the linker stubs during a link.
58
59 There are a number of different stubs generated by the linker.
60
61 Long branch stub:
62 : ldil LR'X,%r1
63 : be,n RR'X(%sr4,%r1)
64
65 PIC long branch stub:
66 : b,l .+8,%r1
3ee1d854
AM
67 : addil LR'X - ($PIC_pcrel$0 - 4),%r1
68 : be,n RR'X - ($PIC_pcrel$0 - 8)(%sr4,%r1)
30667bf3
AM
69
70 Import stub to call shared library routine from normal object file
71 (single sub-space version)
3ee1d854
AM
72 : addil LR'lt_ptr+ltoff,%dp ; get procedure entry point
73 : ldw RR'lt_ptr+ltoff(%r1),%r21
46fe4e66 74 : bv %r0(%r21)
3ee1d854 75 : ldw RR'lt_ptr+ltoff+4(%r1),%r19 ; get new dlt value.
30667bf3
AM
76
77 Import stub to call shared library routine from shared library
78 (single sub-space version)
3ee1d854
AM
79 : addil LR'ltoff,%r19 ; get procedure entry point
80 : ldw RR'ltoff(%r1),%r21
46fe4e66 81 : bv %r0(%r21)
3ee1d854 82 : ldw RR'ltoff+4(%r1),%r19 ; get new dlt value.
30667bf3
AM
83
84 Import stub to call shared library routine from normal object file
85 (multiple sub-space support)
3ee1d854
AM
86 : addil LR'lt_ptr+ltoff,%dp ; get procedure entry point
87 : ldw RR'lt_ptr+ltoff(%r1),%r21
88 : ldw RR'lt_ptr+ltoff+4(%r1),%r19 ; get new dlt value.
30667bf3
AM
89 : ldsid (%r21),%r1
90 : mtsp %r1,%sr0
91 : be 0(%sr0,%r21) ; branch to target
92 : stw %rp,-24(%sp) ; save rp
93
94 Import stub to call shared library routine from shared library
95 (multiple sub-space support)
3ee1d854
AM
96 : addil LR'ltoff,%r19 ; get procedure entry point
97 : ldw RR'ltoff(%r1),%r21
98 : ldw RR'ltoff+4(%r1),%r19 ; get new dlt value.
30667bf3
AM
99 : ldsid (%r21),%r1
100 : mtsp %r1,%sr0
101 : be 0(%sr0,%r21) ; branch to target
102 : stw %rp,-24(%sp) ; save rp
103
104 Export stub to return from shared lib routine (multiple sub-space support)
105 One of these is created for each exported procedure in a shared
106 library (and stored in the shared lib). Shared lib routines are
107 called via the first instruction in the export stub so that we can
108 do an inter-space return. Not required for single sub-space.
109 : bl,n X,%rp ; trap the return
110 : nop
111 : ldw -24(%sp),%rp ; restore the original rp
112 : ldsid (%rp),%r1
113 : mtsp %r1,%sr0
ae9a127f 114 : be,n 0(%sr0,%rp) ; inter-space return. */
30667bf3
AM
115
116#define PLT_ENTRY_SIZE 8
117#define GOT_ENTRY_SIZE 4
118#define ELF_DYNAMIC_INTERPRETER "/lib/ld.so.1"
119
47d89dba
AM
120static const bfd_byte plt_stub[] =
121{
122 0x0e, 0x80, 0x10, 0x96, /* 1: ldw 0(%r20),%r22 */
123 0xea, 0xc0, 0xc0, 0x00, /* bv %r0(%r22) */
124 0x0e, 0x88, 0x10, 0x95, /* ldw 4(%r20),%r21 */
125#define PLT_STUB_ENTRY (3*4)
126 0xea, 0x9f, 0x1f, 0xdd, /* b,l 1b,%r20 */
127 0xd6, 0x80, 0x1c, 0x1e, /* depi 0,31,2,%r20 */
128 0x00, 0xc0, 0xff, 0xee, /* 9: .word fixup_func */
129 0xde, 0xad, 0xbe, 0xef /* .word fixup_ltp */
130};
131
30667bf3
AM
132/* Section name for stubs is the associated section name plus this
133 string. */
134#define STUB_SUFFIX ".stub"
135
98ceb8ce
AM
136/* We don't need to copy certain PC- or GP-relative dynamic relocs
137 into a shared object's dynamic section. All the relocs of the
138 limited class we are interested in, are absolute. */
139#ifndef RELATIVE_DYNRELOCS
140#define RELATIVE_DYNRELOCS 0
446f2863 141#define IS_ABSOLUTE_RELOC(r_type) 1
30667bf3
AM
142#endif
143
4fc8051d
AM
144/* If ELIMINATE_COPY_RELOCS is non-zero, the linker will try to avoid
145 copying dynamic variables from a shared lib into an app's dynbss
146 section, and instead use a dynamic relocation to point into the
147 shared lib. */
148#define ELIMINATE_COPY_RELOCS 1
149
30667bf3
AM
150enum elf32_hppa_stub_type {
151 hppa_stub_long_branch,
152 hppa_stub_long_branch_shared,
153 hppa_stub_import,
154 hppa_stub_import_shared,
155 hppa_stub_export,
156 hppa_stub_none
157};
158
30667bf3 159struct elf32_hppa_stub_hash_entry {
252b5132 160
edd21aca 161 /* Base hash table entry structure. */
252b5132
RH
162 struct bfd_hash_entry root;
163
edd21aca
AM
164 /* The stub section. */
165 asection *stub_sec;
166
167 /* Offset within stub_sec of the beginning of this stub. */
30667bf3 168 bfd_vma stub_offset;
252b5132
RH
169
170 /* Given the symbol's value and its section we can determine its final
171 value when building the stubs (so the stub knows where to jump. */
30667bf3 172 bfd_vma target_value;
252b5132 173 asection *target_section;
30667bf3
AM
174
175 enum elf32_hppa_stub_type stub_type;
176
177 /* The symbol table entry, if any, that this was derived from. */
178 struct elf32_hppa_link_hash_entry *h;
179
25f72752
AM
180 /* Where this stub is being called from, or, in the case of combined
181 stub sections, the first input section in the group. */
182 asection *id_sec;
252b5132
RH
183};
184
30667bf3
AM
185struct elf32_hppa_link_hash_entry {
186
187 struct elf_link_hash_entry elf;
188
189 /* A pointer to the most recently used stub hash entry against this
190 symbol. */
191 struct elf32_hppa_stub_hash_entry *stub_cache;
192
30667bf3
AM
193 /* Used to count relocations for delayed sizing of relocation
194 sections. */
195 struct elf32_hppa_dyn_reloc_entry {
196
197 /* Next relocation in the chain. */
198 struct elf32_hppa_dyn_reloc_entry *next;
199
98ceb8ce
AM
200 /* The input section of the reloc. */
201 asection *sec;
30667bf3
AM
202
203 /* Number of relocs copied in this section. */
204 bfd_size_type count;
98ceb8ce
AM
205
206#if RELATIVE_DYNRELOCS
207 /* Number of relative relocs copied for the input section. */
208 bfd_size_type relative_count;
209#endif
210 } *dyn_relocs;
30667bf3 211
74d1c347
AM
212 /* Set if this symbol is used by a plabel reloc. */
213 unsigned int plabel:1;
30667bf3
AM
214};
215
30667bf3
AM
216struct elf32_hppa_link_hash_table {
217
252b5132 218 /* The main hash table. */
ebe50bae 219 struct elf_link_hash_table elf;
252b5132
RH
220
221 /* The stub hash table. */
edd21aca 222 struct bfd_hash_table stub_hash_table;
252b5132 223
30667bf3
AM
224 /* Linker stub bfd. */
225 bfd *stub_bfd;
226
30667bf3 227 /* Linker call-backs. */
c39a58e6
AM
228 asection * (*add_stub_section) (const char *, asection *);
229 void (*layout_sections_again) (void);
30667bf3 230
25f72752
AM
231 /* Array to keep track of which stub sections have been created, and
232 information on stub grouping. */
233 struct map_stub {
234 /* This is the section to which stubs in the group will be
235 attached. */
236 asection *link_sec;
237 /* The stub section. */
238 asection *stub_sec;
25f72752 239 } *stub_group;
30667bf3 240
b4655ea9
AM
241 /* Assorted information used by elf32_hppa_size_stubs. */
242 unsigned int bfd_count;
243 int top_index;
244 asection **input_list;
245 Elf_Internal_Sym **all_local_syms;
246
30667bf3
AM
247 /* Short-cuts to get to dynamic linker sections. */
248 asection *sgot;
249 asection *srelgot;
250 asection *splt;
251 asection *srelplt;
252 asection *sdynbss;
253 asection *srelbss;
47d89dba 254
c46b7515
AM
255 /* Used during a final link to store the base of the text and data
256 segments so that we can perform SEGREL relocations. */
257 bfd_vma text_segment_base;
258 bfd_vma data_segment_base;
259
47d89dba
AM
260 /* Whether we support multiple sub-spaces for shared libs. */
261 unsigned int multi_subspace:1;
262
067fa4a6 263 /* Flags set when various size branches are detected. Used to
47d89dba
AM
264 select suitable defaults for the stub group size. */
265 unsigned int has_12bit_branch:1;
266 unsigned int has_17bit_branch:1;
067fa4a6 267 unsigned int has_22bit_branch:1;
47d89dba
AM
268
269 /* Set if we need a .plt stub to support lazy dynamic linking. */
270 unsigned int need_plt_stub:1;
ec338859
AM
271
272 /* Small local sym to section mapping cache. */
273 struct sym_sec_cache sym_sec;
252b5132
RH
274};
275
30667bf3
AM
276/* Various hash macros and functions. */
277#define hppa_link_hash_table(p) \
edd21aca 278 ((struct elf32_hppa_link_hash_table *) ((p)->hash))
252b5132 279
30667bf3
AM
280#define hppa_stub_hash_lookup(table, string, create, copy) \
281 ((struct elf32_hppa_stub_hash_entry *) \
282 bfd_hash_lookup ((table), (string), (create), (copy)))
283
252b5132
RH
284/* Assorted hash table functions. */
285
286/* Initialize an entry in the stub hash table. */
287
288static struct bfd_hash_entry *
c39a58e6
AM
289stub_hash_newfunc (struct bfd_hash_entry *entry,
290 struct bfd_hash_table *table,
291 const char *string)
252b5132 292{
252b5132
RH
293 /* Allocate the structure if it has not already been allocated by a
294 subclass. */
ebe50bae 295 if (entry == NULL)
30667bf3 296 {
ebe50bae
AM
297 entry = bfd_hash_allocate (table,
298 sizeof (struct elf32_hppa_stub_hash_entry));
299 if (entry == NULL)
300 return entry;
30667bf3 301 }
252b5132
RH
302
303 /* Call the allocation method of the superclass. */
ebe50bae
AM
304 entry = bfd_hash_newfunc (entry, table, string);
305 if (entry != NULL)
252b5132 306 {
ebe50bae
AM
307 struct elf32_hppa_stub_hash_entry *eh;
308
252b5132 309 /* Initialize the local fields. */
ebe50bae
AM
310 eh = (struct elf32_hppa_stub_hash_entry *) entry;
311 eh->stub_sec = NULL;
312 eh->stub_offset = 0;
313 eh->target_value = 0;
314 eh->target_section = NULL;
315 eh->stub_type = hppa_stub_long_branch;
316 eh->h = NULL;
317 eh->id_sec = NULL;
30667bf3
AM
318 }
319
ebe50bae 320 return entry;
30667bf3
AM
321}
322
30667bf3
AM
323/* Initialize an entry in the link hash table. */
324
325static struct bfd_hash_entry *
c39a58e6
AM
326hppa_link_hash_newfunc (struct bfd_hash_entry *entry,
327 struct bfd_hash_table *table,
328 const char *string)
30667bf3 329{
30667bf3
AM
330 /* Allocate the structure if it has not already been allocated by a
331 subclass. */
ebe50bae 332 if (entry == NULL)
30667bf3 333 {
ebe50bae
AM
334 entry = bfd_hash_allocate (table,
335 sizeof (struct elf32_hppa_link_hash_entry));
336 if (entry == NULL)
337 return entry;
30667bf3
AM
338 }
339
340 /* Call the allocation method of the superclass. */
ebe50bae
AM
341 entry = _bfd_elf_link_hash_newfunc (entry, table, string);
342 if (entry != NULL)
30667bf3 343 {
ebe50bae
AM
344 struct elf32_hppa_link_hash_entry *eh;
345
30667bf3 346 /* Initialize the local fields. */
ebe50bae
AM
347 eh = (struct elf32_hppa_link_hash_entry *) entry;
348 eh->stub_cache = NULL;
349 eh->dyn_relocs = NULL;
ebe50bae 350 eh->plabel = 0;
252b5132
RH
351 }
352
ebe50bae 353 return entry;
252b5132
RH
354}
355
252b5132
RH
356/* Create the derived linker hash table. The PA ELF port uses the derived
357 hash table to keep information specific to the PA ELF linker (without
358 using static variables). */
359
360static struct bfd_link_hash_table *
c39a58e6 361elf32_hppa_link_hash_table_create (bfd *abfd)
252b5132
RH
362{
363 struct elf32_hppa_link_hash_table *ret;
dc810e39 364 bfd_size_type amt = sizeof (*ret);
252b5132 365
c39a58e6 366 ret = bfd_malloc (amt);
252b5132
RH
367 if (ret == NULL)
368 return NULL;
edd21aca 369
ebe50bae 370 if (!_bfd_elf_link_hash_table_init (&ret->elf, abfd, hppa_link_hash_newfunc))
252b5132 371 {
e2d34d7d 372 free (ret);
252b5132
RH
373 return NULL;
374 }
edd21aca
AM
375
376 /* Init the stub hash table too. */
30667bf3 377 if (!bfd_hash_table_init (&ret->stub_hash_table, stub_hash_newfunc))
edd21aca
AM
378 return NULL;
379
30667bf3 380 ret->stub_bfd = NULL;
30667bf3
AM
381 ret->add_stub_section = NULL;
382 ret->layout_sections_again = NULL;
25f72752 383 ret->stub_group = NULL;
30667bf3
AM
384 ret->sgot = NULL;
385 ret->srelgot = NULL;
386 ret->splt = NULL;
387 ret->srelplt = NULL;
388 ret->sdynbss = NULL;
389 ret->srelbss = NULL;
c46b7515
AM
390 ret->text_segment_base = (bfd_vma) -1;
391 ret->data_segment_base = (bfd_vma) -1;
47d89dba
AM
392 ret->multi_subspace = 0;
393 ret->has_12bit_branch = 0;
394 ret->has_17bit_branch = 0;
067fa4a6 395 ret->has_22bit_branch = 0;
47d89dba 396 ret->need_plt_stub = 0;
ec338859 397 ret->sym_sec.abfd = NULL;
252b5132 398
ebe50bae 399 return &ret->elf.root;
252b5132
RH
400}
401
e2d34d7d
DJ
402/* Free the derived linker hash table. */
403
404static void
c39a58e6 405elf32_hppa_link_hash_table_free (struct bfd_link_hash_table *hash)
e2d34d7d
DJ
406{
407 struct elf32_hppa_link_hash_table *ret
408 = (struct elf32_hppa_link_hash_table *) hash;
409
410 bfd_hash_table_free (&ret->stub_hash_table);
411 _bfd_generic_link_hash_table_free (hash);
412}
413
30667bf3
AM
414/* Build a name for an entry in the stub hash table. */
415
edd21aca 416static char *
c39a58e6
AM
417hppa_stub_name (const asection *input_section,
418 const asection *sym_sec,
419 const struct elf32_hppa_link_hash_entry *hash,
420 const Elf_Internal_Rela *rel)
edd21aca
AM
421{
422 char *stub_name;
dc810e39 423 bfd_size_type len;
edd21aca 424
30667bf3
AM
425 if (hash)
426 {
427 len = 8 + 1 + strlen (hash->elf.root.root.string) + 1 + 8 + 1;
428 stub_name = bfd_malloc (len);
429 if (stub_name != NULL)
430 {
431 sprintf (stub_name, "%08x_%s+%x",
432 input_section->id & 0xffffffff,
433 hash->elf.root.root.string,
434 (int) rel->r_addend & 0xffffffff);
435 }
436 }
437 else
edd21aca 438 {
30667bf3
AM
439 len = 8 + 1 + 8 + 1 + 8 + 1 + 8 + 1;
440 stub_name = bfd_malloc (len);
441 if (stub_name != NULL)
442 {
443 sprintf (stub_name, "%08x_%x:%x+%x",
444 input_section->id & 0xffffffff,
445 sym_sec->id & 0xffffffff,
446 (int) ELF32_R_SYM (rel->r_info) & 0xffffffff,
447 (int) rel->r_addend & 0xffffffff);
448 }
edd21aca
AM
449 }
450 return stub_name;
451}
252b5132 452
30667bf3
AM
453/* Look up an entry in the stub hash. Stub entries are cached because
454 creating the stub name takes a bit of time. */
455
456static struct elf32_hppa_stub_hash_entry *
c39a58e6
AM
457hppa_get_stub_entry (const asection *input_section,
458 const asection *sym_sec,
459 struct elf32_hppa_link_hash_entry *hash,
460 const Elf_Internal_Rela *rel,
461 struct elf32_hppa_link_hash_table *htab)
252b5132 462{
30667bf3 463 struct elf32_hppa_stub_hash_entry *stub_entry;
25f72752
AM
464 const asection *id_sec;
465
466 /* If this input section is part of a group of sections sharing one
467 stub section, then use the id of the first section in the group.
468 Stub names need to include a section id, as there may well be
469 more than one stub used to reach say, printf, and we need to
470 distinguish between them. */
83c81bfe 471 id_sec = htab->stub_group[input_section->id].link_sec;
edd21aca 472
30667bf3
AM
473 if (hash != NULL && hash->stub_cache != NULL
474 && hash->stub_cache->h == hash
25f72752 475 && hash->stub_cache->id_sec == id_sec)
edd21aca 476 {
30667bf3
AM
477 stub_entry = hash->stub_cache;
478 }
479 else
480 {
30667bf3 481 char *stub_name;
edd21aca 482
25f72752 483 stub_name = hppa_stub_name (id_sec, sym_sec, hash, rel);
30667bf3
AM
484 if (stub_name == NULL)
485 return NULL;
edd21aca 486
83c81bfe 487 stub_entry = hppa_stub_hash_lookup (&htab->stub_hash_table,
b34976b6 488 stub_name, FALSE, FALSE);
f09ebc7d
AM
489 if (hash != NULL)
490 hash->stub_cache = stub_entry;
30667bf3
AM
491
492 free (stub_name);
edd21aca 493 }
30667bf3
AM
494
495 return stub_entry;
496}
497
30667bf3
AM
498/* Add a new stub entry to the stub hash. Not all fields of the new
499 stub entry are initialised. */
500
501static struct elf32_hppa_stub_hash_entry *
c39a58e6
AM
502hppa_add_stub (const char *stub_name,
503 asection *section,
504 struct elf32_hppa_link_hash_table *htab)
30667bf3 505{
25f72752 506 asection *link_sec;
30667bf3 507 asection *stub_sec;
30667bf3 508 struct elf32_hppa_stub_hash_entry *stub_entry;
edd21aca 509
83c81bfe
AM
510 link_sec = htab->stub_group[section->id].link_sec;
511 stub_sec = htab->stub_group[section->id].stub_sec;
30667bf3 512 if (stub_sec == NULL)
edd21aca 513 {
83c81bfe 514 stub_sec = htab->stub_group[link_sec->id].stub_sec;
30667bf3
AM
515 if (stub_sec == NULL)
516 {
d4c88bbb 517 size_t namelen;
dc810e39 518 bfd_size_type len;
30667bf3
AM
519 char *s_name;
520
d4c88bbb
AM
521 namelen = strlen (link_sec->name);
522 len = namelen + sizeof (STUB_SUFFIX);
83c81bfe 523 s_name = bfd_alloc (htab->stub_bfd, len);
30667bf3
AM
524 if (s_name == NULL)
525 return NULL;
526
d4c88bbb
AM
527 memcpy (s_name, link_sec->name, namelen);
528 memcpy (s_name + namelen, STUB_SUFFIX, sizeof (STUB_SUFFIX));
83c81bfe 529 stub_sec = (*htab->add_stub_section) (s_name, link_sec);
30667bf3
AM
530 if (stub_sec == NULL)
531 return NULL;
83c81bfe 532 htab->stub_group[link_sec->id].stub_sec = stub_sec;
30667bf3 533 }
83c81bfe 534 htab->stub_group[section->id].stub_sec = stub_sec;
edd21aca 535 }
252b5132 536
30667bf3 537 /* Enter this entry into the linker stub hash table. */
83c81bfe 538 stub_entry = hppa_stub_hash_lookup (&htab->stub_hash_table, stub_name,
b34976b6 539 TRUE, FALSE);
30667bf3
AM
540 if (stub_entry == NULL)
541 {
542 (*_bfd_error_handler) (_("%s: cannot create stub entry %s"),
8f615d07 543 bfd_archive_filename (section->owner),
30667bf3
AM
544 stub_name);
545 return NULL;
edd21aca
AM
546 }
547
30667bf3 548 stub_entry->stub_sec = stub_sec;
30667bf3 549 stub_entry->stub_offset = 0;
25f72752 550 stub_entry->id_sec = link_sec;
30667bf3 551 return stub_entry;
edd21aca
AM
552}
553
30667bf3
AM
554/* Determine the type of stub needed, if any, for a call. */
555
556static enum elf32_hppa_stub_type
c39a58e6
AM
557hppa_type_of_stub (asection *input_sec,
558 const Elf_Internal_Rela *rel,
559 struct elf32_hppa_link_hash_entry *hash,
a252afa4
DA
560 bfd_vma destination,
561 struct bfd_link_info *info)
edd21aca 562{
edd21aca 563 bfd_vma location;
30667bf3
AM
564 bfd_vma branch_offset;
565 bfd_vma max_branch_offset;
566 unsigned int r_type;
567
568 if (hash != NULL
067fa4a6 569 && hash->elf.plt.offset != (bfd_vma) -1
a252afa4
DA
570 && hash->elf.dynindx != -1
571 && !hash->plabel
572 && (info->shared
573 || !(hash->elf.elf_link_hash_flags & ELF_LINK_HASH_DEF_REGULAR)
574 || hash->elf.root.type == bfd_link_hash_defweak))
30667bf3 575 {
067fa4a6
AM
576 /* We need an import stub. Decide between hppa_stub_import
577 and hppa_stub_import_shared later. */
30667bf3
AM
578 return hppa_stub_import;
579 }
edd21aca 580
30667bf3
AM
581 /* Determine where the call point is. */
582 location = (input_sec->output_offset
583 + input_sec->output_section->vma
584 + rel->r_offset);
edd21aca 585
30667bf3
AM
586 branch_offset = destination - location - 8;
587 r_type = ELF32_R_TYPE (rel->r_info);
edd21aca 588
30667bf3
AM
589 /* Determine if a long branch stub is needed. parisc branch offsets
590 are relative to the second instruction past the branch, ie. +8
591 bytes on from the branch instruction location. The offset is
592 signed and counts in units of 4 bytes. */
593 if (r_type == (unsigned int) R_PARISC_PCREL17F)
edd21aca 594 {
30667bf3
AM
595 max_branch_offset = (1 << (17-1)) << 2;
596 }
597 else if (r_type == (unsigned int) R_PARISC_PCREL12F)
598 {
599 max_branch_offset = (1 << (12-1)) << 2;
600 }
25f72752 601 else /* R_PARISC_PCREL22F. */
30667bf3
AM
602 {
603 max_branch_offset = (1 << (22-1)) << 2;
edd21aca
AM
604 }
605
30667bf3 606 if (branch_offset + max_branch_offset >= 2*max_branch_offset)
98ceb8ce
AM
607 return hppa_stub_long_branch;
608
30667bf3
AM
609 return hppa_stub_none;
610}
edd21aca 611
30667bf3
AM
612/* Build one linker stub as defined by the stub hash table entry GEN_ENTRY.
613 IN_ARG contains the link info pointer. */
edd21aca 614
30667bf3
AM
615#define LDIL_R1 0x20200000 /* ldil LR'XXX,%r1 */
616#define BE_SR4_R1 0xe0202002 /* be,n RR'XXX(%sr4,%r1) */
edd21aca 617
30667bf3 618#define BL_R1 0xe8200000 /* b,l .+8,%r1 */
3ee1d854 619#define ADDIL_R1 0x28200000 /* addil LR'XXX,%r1,%r1 */
30667bf3 620#define DEPI_R1 0xd4201c1e /* depi 0,31,2,%r1 */
252b5132 621
3ee1d854
AM
622#define ADDIL_DP 0x2b600000 /* addil LR'XXX,%dp,%r1 */
623#define LDW_R1_R21 0x48350000 /* ldw RR'XXX(%sr0,%r1),%r21 */
30667bf3 624#define BV_R0_R21 0xeaa0c000 /* bv %r0(%r21) */
3ee1d854 625#define LDW_R1_R19 0x48330000 /* ldw RR'XXX(%sr0,%r1),%r19 */
252b5132 626
3ee1d854
AM
627#define ADDIL_R19 0x2a600000 /* addil LR'XXX,%r19,%r1 */
628#define LDW_R1_DP 0x483b0000 /* ldw RR'XXX(%sr0,%r1),%dp */
edd21aca 629
30667bf3
AM
630#define LDSID_R21_R1 0x02a010a1 /* ldsid (%sr0,%r21),%r1 */
631#define MTSP_R1 0x00011820 /* mtsp %r1,%sr0 */
632#define BE_SR0_R21 0xe2a00000 /* be 0(%sr0,%r21) */
633#define STW_RP 0x6bc23fd1 /* stw %rp,-24(%sr0,%sp) */
edd21aca 634
067fa4a6 635#define BL22_RP 0xe800a002 /* b,l,n XXX,%rp */
30667bf3
AM
636#define BL_RP 0xe8400002 /* b,l,n XXX,%rp */
637#define NOP 0x08000240 /* nop */
638#define LDW_RP 0x4bc23fd1 /* ldw -24(%sr0,%sp),%rp */
639#define LDSID_RP_R1 0x004010a1 /* ldsid (%sr0,%rp),%r1 */
640#define BE_SR0_RP 0xe0400002 /* be,n 0(%sr0,%rp) */
edd21aca 641
30667bf3
AM
642#ifndef R19_STUBS
643#define R19_STUBS 1
644#endif
edd21aca 645
30667bf3
AM
646#if R19_STUBS
647#define LDW_R1_DLT LDW_R1_R19
648#else
649#define LDW_R1_DLT LDW_R1_DP
650#endif
edd21aca 651
b34976b6 652static bfd_boolean
c39a58e6 653hppa_build_one_stub (struct bfd_hash_entry *gen_entry, void *in_arg)
30667bf3
AM
654{
655 struct elf32_hppa_stub_hash_entry *stub_entry;
656 struct bfd_link_info *info;
83c81bfe 657 struct elf32_hppa_link_hash_table *htab;
30667bf3
AM
658 asection *stub_sec;
659 bfd *stub_bfd;
660 bfd_byte *loc;
661 bfd_vma sym_value;
74d1c347 662 bfd_vma insn;
8dea1268 663 bfd_vma off;
74d1c347 664 int val;
30667bf3 665 int size;
edd21aca 666
30667bf3
AM
667 /* Massage our args to the form they really have. */
668 stub_entry = (struct elf32_hppa_stub_hash_entry *) gen_entry;
c39a58e6 669 info = in_arg;
30667bf3 670
83c81bfe 671 htab = hppa_link_hash_table (info);
30667bf3 672 stub_sec = stub_entry->stub_sec;
edd21aca 673
30667bf3 674 /* Make a note of the offset within the stubs for this entry. */
74d1c347 675 stub_entry->stub_offset = stub_sec->_raw_size;
30667bf3 676 loc = stub_sec->contents + stub_entry->stub_offset;
252b5132 677
30667bf3
AM
678 stub_bfd = stub_sec->owner;
679
680 switch (stub_entry->stub_type)
681 {
682 case hppa_stub_long_branch:
683 /* Create the long branch. A long branch is formed with "ldil"
684 loading the upper bits of the target address into a register,
685 then branching with "be" which adds in the lower bits.
686 The "be" has its delay slot nullified. */
687 sym_value = (stub_entry->target_value
688 + stub_entry->target_section->output_offset
689 + stub_entry->target_section->output_section->vma);
690
c39a58e6 691 val = hppa_field_adjust (sym_value, 0, e_lrsel);
74d1c347 692 insn = hppa_rebuild_insn ((int) LDIL_R1, val, 21);
30667bf3
AM
693 bfd_put_32 (stub_bfd, insn, loc);
694
c39a58e6 695 val = hppa_field_adjust (sym_value, 0, e_rrsel) >> 2;
74d1c347 696 insn = hppa_rebuild_insn ((int) BE_SR4_R1, val, 17);
30667bf3
AM
697 bfd_put_32 (stub_bfd, insn, loc + 4);
698
30667bf3 699 size = 8;
edd21aca
AM
700 break;
701
30667bf3
AM
702 case hppa_stub_long_branch_shared:
703 /* Branches are relative. This is where we are going to. */
704 sym_value = (stub_entry->target_value
705 + stub_entry->target_section->output_offset
706 + stub_entry->target_section->output_section->vma);
707
708 /* And this is where we are coming from, more or less. */
709 sym_value -= (stub_entry->stub_offset
710 + stub_sec->output_offset
711 + stub_sec->output_section->vma);
712
74d1c347 713 bfd_put_32 (stub_bfd, (bfd_vma) BL_R1, loc);
47d89dba 714 val = hppa_field_adjust (sym_value, (bfd_signed_vma) -8, e_lrsel);
74d1c347 715 insn = hppa_rebuild_insn ((int) ADDIL_R1, val, 21);
30667bf3
AM
716 bfd_put_32 (stub_bfd, insn, loc + 4);
717
47d89dba 718 val = hppa_field_adjust (sym_value, (bfd_signed_vma) -8, e_rrsel) >> 2;
74d1c347 719 insn = hppa_rebuild_insn ((int) BE_SR4_R1, val, 17);
30667bf3
AM
720 bfd_put_32 (stub_bfd, insn, loc + 8);
721 size = 12;
722 break;
edd21aca 723
30667bf3
AM
724 case hppa_stub_import:
725 case hppa_stub_import_shared:
8dea1268
AM
726 off = stub_entry->h->elf.plt.offset;
727 if (off >= (bfd_vma) -2)
49e9d0d3 728 abort ();
8dea1268
AM
729
730 off &= ~ (bfd_vma) 1;
731 sym_value = (off
83c81bfe
AM
732 + htab->splt->output_offset
733 + htab->splt->output_section->vma
734 - elf_gp (htab->splt->output_section->owner));
30667bf3
AM
735
736 insn = ADDIL_DP;
737#if R19_STUBS
738 if (stub_entry->stub_type == hppa_stub_import_shared)
739 insn = ADDIL_R19;
740#endif
c39a58e6 741 val = hppa_field_adjust (sym_value, 0, e_lrsel),
74d1c347 742 insn = hppa_rebuild_insn ((int) insn, val, 21);
30667bf3 743 bfd_put_32 (stub_bfd, insn, loc);
edd21aca 744
47d89dba
AM
745 /* It is critical to use lrsel/rrsel here because we are using
746 two different offsets (+0 and +4) from sym_value. If we use
747 lsel/rsel then with unfortunate sym_values we will round
748 sym_value+4 up to the next 2k block leading to a mis-match
749 between the lsel and rsel value. */
c39a58e6 750 val = hppa_field_adjust (sym_value, 0, e_rrsel);
74d1c347 751 insn = hppa_rebuild_insn ((int) LDW_R1_R21, val, 14);
30667bf3 752 bfd_put_32 (stub_bfd, insn, loc + 4);
252b5132 753
83c81bfe 754 if (htab->multi_subspace)
30667bf3 755 {
47d89dba 756 val = hppa_field_adjust (sym_value, (bfd_signed_vma) 4, e_rrsel);
74d1c347 757 insn = hppa_rebuild_insn ((int) LDW_R1_DLT, val, 14);
30667bf3 758 bfd_put_32 (stub_bfd, insn, loc + 8);
252b5132 759
74d1c347
AM
760 bfd_put_32 (stub_bfd, (bfd_vma) LDSID_R21_R1, loc + 12);
761 bfd_put_32 (stub_bfd, (bfd_vma) MTSP_R1, loc + 16);
762 bfd_put_32 (stub_bfd, (bfd_vma) BE_SR0_R21, loc + 20);
763 bfd_put_32 (stub_bfd, (bfd_vma) STW_RP, loc + 24);
252b5132 764
30667bf3
AM
765 size = 28;
766 }
767 else
768 {
74d1c347 769 bfd_put_32 (stub_bfd, (bfd_vma) BV_R0_R21, loc + 8);
47d89dba 770 val = hppa_field_adjust (sym_value, (bfd_signed_vma) 4, e_rrsel);
74d1c347 771 insn = hppa_rebuild_insn ((int) LDW_R1_DLT, val, 14);
30667bf3 772 bfd_put_32 (stub_bfd, insn, loc + 12);
252b5132 773
30667bf3
AM
774 size = 16;
775 }
252b5132 776
30667bf3 777 break;
252b5132 778
30667bf3
AM
779 case hppa_stub_export:
780 /* Branches are relative. This is where we are going to. */
781 sym_value = (stub_entry->target_value
782 + stub_entry->target_section->output_offset
783 + stub_entry->target_section->output_section->vma);
252b5132 784
30667bf3
AM
785 /* And this is where we are coming from. */
786 sym_value -= (stub_entry->stub_offset
787 + stub_sec->output_offset
788 + stub_sec->output_section->vma);
edd21aca 789
067fa4a6
AM
790 if (sym_value - 8 + (1 << (17 + 1)) >= (1 << (17 + 2))
791 && (!htab->has_22bit_branch
792 || sym_value - 8 + (1 << (22 + 1)) >= (1 << (22 + 2))))
30667bf3 793 {
edd21aca 794 (*_bfd_error_handler)
30667bf3 795 (_("%s(%s+0x%lx): cannot reach %s, recompile with -ffunction-sections"),
8f615d07 796 bfd_archive_filename (stub_entry->target_section->owner),
30667bf3
AM
797 stub_sec->name,
798 (long) stub_entry->stub_offset,
799 stub_entry->root.string);
800 bfd_set_error (bfd_error_bad_value);
b34976b6 801 return FALSE;
252b5132 802 }
30667bf3 803
74d1c347 804 val = hppa_field_adjust (sym_value, (bfd_signed_vma) -8, e_fsel) >> 2;
067fa4a6
AM
805 if (!htab->has_22bit_branch)
806 insn = hppa_rebuild_insn ((int) BL_RP, val, 17);
807 else
808 insn = hppa_rebuild_insn ((int) BL22_RP, val, 22);
30667bf3
AM
809 bfd_put_32 (stub_bfd, insn, loc);
810
74d1c347
AM
811 bfd_put_32 (stub_bfd, (bfd_vma) NOP, loc + 4);
812 bfd_put_32 (stub_bfd, (bfd_vma) LDW_RP, loc + 8);
813 bfd_put_32 (stub_bfd, (bfd_vma) LDSID_RP_R1, loc + 12);
814 bfd_put_32 (stub_bfd, (bfd_vma) MTSP_R1, loc + 16);
815 bfd_put_32 (stub_bfd, (bfd_vma) BE_SR0_RP, loc + 20);
30667bf3
AM
816
817 /* Point the function symbol at the stub. */
818 stub_entry->h->elf.root.u.def.section = stub_sec;
74d1c347 819 stub_entry->h->elf.root.u.def.value = stub_sec->_raw_size;
30667bf3
AM
820
821 size = 24;
822 break;
823
824 default:
825 BFD_FAIL ();
b34976b6 826 return FALSE;
252b5132
RH
827 }
828
74d1c347 829 stub_sec->_raw_size += size;
b34976b6 830 return TRUE;
252b5132
RH
831}
832
30667bf3
AM
833#undef LDIL_R1
834#undef BE_SR4_R1
835#undef BL_R1
836#undef ADDIL_R1
837#undef DEPI_R1
30667bf3
AM
838#undef LDW_R1_R21
839#undef LDW_R1_DLT
840#undef LDW_R1_R19
841#undef ADDIL_R19
842#undef LDW_R1_DP
843#undef LDSID_R21_R1
844#undef MTSP_R1
845#undef BE_SR0_R21
846#undef STW_RP
847#undef BV_R0_R21
848#undef BL_RP
849#undef NOP
850#undef LDW_RP
851#undef LDSID_RP_R1
852#undef BE_SR0_RP
252b5132 853
30667bf3
AM
854/* As above, but don't actually build the stub. Just bump offset so
855 we know stub section sizes. */
856
b34976b6 857static bfd_boolean
c39a58e6 858hppa_size_one_stub (struct bfd_hash_entry *gen_entry, void *in_arg)
252b5132 859{
30667bf3 860 struct elf32_hppa_stub_hash_entry *stub_entry;
83c81bfe 861 struct elf32_hppa_link_hash_table *htab;
30667bf3
AM
862 int size;
863
864 /* Massage our args to the form they really have. */
865 stub_entry = (struct elf32_hppa_stub_hash_entry *) gen_entry;
c39a58e6 866 htab = in_arg;
30667bf3
AM
867
868 if (stub_entry->stub_type == hppa_stub_long_branch)
98ceb8ce 869 size = 8;
30667bf3
AM
870 else if (stub_entry->stub_type == hppa_stub_long_branch_shared)
871 size = 12;
872 else if (stub_entry->stub_type == hppa_stub_export)
873 size = 24;
74d1c347 874 else /* hppa_stub_import or hppa_stub_import_shared. */
252b5132 875 {
83c81bfe 876 if (htab->multi_subspace)
30667bf3
AM
877 size = 28;
878 else
879 size = 16;
880 }
252b5132 881
74d1c347 882 stub_entry->stub_sec->_raw_size += size;
b34976b6 883 return TRUE;
30667bf3 884}
252b5132 885
30667bf3
AM
886/* Return nonzero if ABFD represents an HPPA ELF32 file.
887 Additionally we set the default architecture and machine. */
888
b34976b6 889static bfd_boolean
c39a58e6 890elf32_hppa_object_p (bfd *abfd)
30667bf3 891{
24a5e751
L
892 Elf_Internal_Ehdr * i_ehdrp;
893 unsigned int flags;
252b5132 894
24a5e751
L
895 i_ehdrp = elf_elfheader (abfd);
896 if (strcmp (bfd_get_target (abfd), "elf32-hppa-linux") == 0)
897 {
6c21aa76
NC
898 /* GCC on hppa-linux produces binaries with OSABI=Linux,
899 but the kernel produces corefiles with OSABI=SysV. */
900 if (i_ehdrp->e_ident[EI_OSABI] != ELFOSABI_LINUX &&
901 i_ehdrp->e_ident[EI_OSABI] != ELFOSABI_NONE) /* aka SYSV */
b34976b6 902 return FALSE;
24a5e751
L
903 }
904 else
905 {
906 if (i_ehdrp->e_ident[EI_OSABI] != ELFOSABI_HPUX)
b34976b6 907 return FALSE;
24a5e751
L
908 }
909
910 flags = i_ehdrp->e_flags;
30667bf3
AM
911 switch (flags & (EF_PARISC_ARCH | EF_PARISC_WIDE))
912 {
913 case EFA_PARISC_1_0:
914 return bfd_default_set_arch_mach (abfd, bfd_arch_hppa, 10);
915 case EFA_PARISC_1_1:
916 return bfd_default_set_arch_mach (abfd, bfd_arch_hppa, 11);
917 case EFA_PARISC_2_0:
918 return bfd_default_set_arch_mach (abfd, bfd_arch_hppa, 20);
919 case EFA_PARISC_2_0 | EF_PARISC_WIDE:
920 return bfd_default_set_arch_mach (abfd, bfd_arch_hppa, 25);
921 }
b34976b6 922 return TRUE;
252b5132
RH
923}
924
30667bf3
AM
925/* Create the .plt and .got sections, and set up our hash table
926 short-cuts to various dynamic sections. */
927
b34976b6 928static bfd_boolean
c39a58e6 929elf32_hppa_create_dynamic_sections (bfd *abfd, struct bfd_link_info *info)
252b5132 930{
83c81bfe 931 struct elf32_hppa_link_hash_table *htab;
edd21aca 932
30667bf3 933 /* Don't try to create the .plt and .got twice. */
83c81bfe
AM
934 htab = hppa_link_hash_table (info);
935 if (htab->splt != NULL)
b34976b6 936 return TRUE;
edd21aca 937
30667bf3
AM
938 /* Call the generic code to do most of the work. */
939 if (! _bfd_elf_create_dynamic_sections (abfd, info))
b34976b6 940 return FALSE;
252b5132 941
83c81bfe
AM
942 htab->splt = bfd_get_section_by_name (abfd, ".plt");
943 htab->srelplt = bfd_get_section_by_name (abfd, ".rela.plt");
30667bf3 944
83c81bfe
AM
945 htab->sgot = bfd_get_section_by_name (abfd, ".got");
946 htab->srelgot = bfd_make_section (abfd, ".rela.got");
947 if (htab->srelgot == NULL
948 || ! bfd_set_section_flags (abfd, htab->srelgot,
30667bf3
AM
949 (SEC_ALLOC
950 | SEC_LOAD
951 | SEC_HAS_CONTENTS
952 | SEC_IN_MEMORY
953 | SEC_LINKER_CREATED
954 | SEC_READONLY))
83c81bfe 955 || ! bfd_set_section_alignment (abfd, htab->srelgot, 2))
b34976b6 956 return FALSE;
edd21aca 957
83c81bfe
AM
958 htab->sdynbss = bfd_get_section_by_name (abfd, ".dynbss");
959 htab->srelbss = bfd_get_section_by_name (abfd, ".rela.bss");
30667bf3 960
b34976b6 961 return TRUE;
30667bf3
AM
962}
963
ebe50bae
AM
964/* Copy the extra info we tack onto an elf_link_hash_entry. */
965
51b64d56 966static void
9c5bfbb7 967elf32_hppa_copy_indirect_symbol (const struct elf_backend_data *bed,
c39a58e6
AM
968 struct elf_link_hash_entry *dir,
969 struct elf_link_hash_entry *ind)
ebe50bae
AM
970{
971 struct elf32_hppa_link_hash_entry *edir, *eind;
972
973 edir = (struct elf32_hppa_link_hash_entry *) dir;
974 eind = (struct elf32_hppa_link_hash_entry *) ind;
975
bbd7ec4a 976 if (eind->dyn_relocs != NULL)
ebe50bae 977 {
bbd7ec4a
AM
978 if (edir->dyn_relocs != NULL)
979 {
980 struct elf32_hppa_dyn_reloc_entry **pp;
981 struct elf32_hppa_dyn_reloc_entry *p;
982
1e370bd2 983 if (ind->root.type == bfd_link_hash_indirect)
bbd7ec4a
AM
984 abort ();
985
986 /* Add reloc counts against the weak sym to the strong sym
987 list. Merge any entries against the same section. */
988 for (pp = &eind->dyn_relocs; (p = *pp) != NULL; )
989 {
990 struct elf32_hppa_dyn_reloc_entry *q;
991
992 for (q = edir->dyn_relocs; q != NULL; q = q->next)
993 if (q->sec == p->sec)
994 {
995#if RELATIVE_DYNRELOCS
996 q->relative_count += p->relative_count;
997#endif
998 q->count += p->count;
999 *pp = p->next;
1000 break;
1001 }
1002 if (q == NULL)
1003 pp = &p->next;
1004 }
1005 *pp = edir->dyn_relocs;
1006 }
1007
ebe50bae
AM
1008 edir->dyn_relocs = eind->dyn_relocs;
1009 eind->dyn_relocs = NULL;
1010 }
ebe50bae 1011
4fc8051d
AM
1012 if (ELIMINATE_COPY_RELOCS
1013 && ind->root.type != bfd_link_hash_indirect
1014 && (dir->elf_link_hash_flags & ELF_LINK_HASH_DYNAMIC_ADJUSTED) != 0)
1015 /* If called to transfer flags for a weakdef during processing
1016 of elf_adjust_dynamic_symbol, don't copy ELF_LINK_NON_GOT_REF.
1017 We clear it ourselves for ELIMINATE_COPY_RELOCS. */
1018 dir->elf_link_hash_flags |=
1019 (ind->elf_link_hash_flags & (ELF_LINK_HASH_REF_DYNAMIC
1020 | ELF_LINK_HASH_REF_REGULAR
1021 | ELF_LINK_HASH_REF_REGULAR_NONWEAK));
1022 else
1023 _bfd_elf_link_hash_copy_indirect (bed, dir, ind);
ebe50bae
AM
1024}
1025
30667bf3 1026/* Look through the relocs for a section during the first phase, and
3ac8354b
AM
1027 calculate needed space in the global offset table, procedure linkage
1028 table, and dynamic reloc sections. At this point we haven't
1029 necessarily read all the input files. */
252b5132 1030
b34976b6 1031static bfd_boolean
c39a58e6
AM
1032elf32_hppa_check_relocs (bfd *abfd,
1033 struct bfd_link_info *info,
1034 asection *sec,
1035 const Elf_Internal_Rela *relocs)
252b5132 1036{
30667bf3
AM
1037 Elf_Internal_Shdr *symtab_hdr;
1038 struct elf_link_hash_entry **sym_hashes;
30667bf3
AM
1039 const Elf_Internal_Rela *rel;
1040 const Elf_Internal_Rela *rel_end;
83c81bfe 1041 struct elf32_hppa_link_hash_table *htab;
30667bf3
AM
1042 asection *sreloc;
1043 asection *stubreloc;
1044
1049f94e 1045 if (info->relocatable)
b34976b6 1046 return TRUE;
30667bf3 1047
83c81bfe 1048 htab = hppa_link_hash_table (info);
30667bf3
AM
1049 symtab_hdr = &elf_tdata (abfd)->symtab_hdr;
1050 sym_hashes = elf_sym_hashes (abfd);
30667bf3
AM
1051 sreloc = NULL;
1052 stubreloc = NULL;
1053
1054 rel_end = relocs + sec->reloc_count;
1055 for (rel = relocs; rel < rel_end; rel++)
1056 {
1057 enum {
1058 NEED_GOT = 1,
1059 NEED_PLT = 2,
1060 NEED_DYNREL = 4,
98ceb8ce 1061 PLT_PLABEL = 8
30667bf3 1062 };
edd21aca 1063
30667bf3
AM
1064 unsigned int r_symndx, r_type;
1065 struct elf32_hppa_link_hash_entry *h;
1066 int need_entry;
252b5132 1067
30667bf3 1068 r_symndx = ELF32_R_SYM (rel->r_info);
252b5132 1069
30667bf3
AM
1070 if (r_symndx < symtab_hdr->sh_info)
1071 h = NULL;
1072 else
1073 h = ((struct elf32_hppa_link_hash_entry *)
1074 sym_hashes[r_symndx - symtab_hdr->sh_info]);
252b5132 1075
30667bf3 1076 r_type = ELF32_R_TYPE (rel->r_info);
252b5132 1077
30667bf3
AM
1078 switch (r_type)
1079 {
1080 case R_PARISC_DLTIND14F:
1081 case R_PARISC_DLTIND14R:
1082 case R_PARISC_DLTIND21L:
1083 /* This symbol requires a global offset table entry. */
1084 need_entry = NEED_GOT;
30667bf3
AM
1085 break;
1086
1087 case R_PARISC_PLABEL14R: /* "Official" procedure labels. */
1088 case R_PARISC_PLABEL21L:
1089 case R_PARISC_PLABEL32:
74d1c347 1090 /* If the addend is non-zero, we break badly. */
49e9d0d3
AM
1091 if (rel->r_addend != 0)
1092 abort ();
74d1c347
AM
1093
1094 /* If we are creating a shared library, then we need to
1095 create a PLT entry for all PLABELs, because PLABELs with
1096 local symbols may be passed via a pointer to another
1097 object. Additionally, output a dynamic relocation
4dc86686
AM
1098 pointing to the PLT entry.
1099 For executables, the original 32-bit ABI allowed two
1100 different styles of PLABELs (function pointers): For
1101 global functions, the PLABEL word points into the .plt
1102 two bytes past a (function address, gp) pair, and for
1103 local functions the PLABEL points directly at the
1104 function. The magic +2 for the first type allows us to
1105 differentiate between the two. As you can imagine, this
1106 is a real pain when it comes to generating code to call
1107 functions indirectly or to compare function pointers.
1108 We avoid the mess by always pointing a PLABEL into the
1109 .plt, even for local functions. */
74d1c347 1110 need_entry = PLT_PLABEL | NEED_PLT | NEED_DYNREL;
30667bf3
AM
1111 break;
1112
1113 case R_PARISC_PCREL12F:
83c81bfe 1114 htab->has_12bit_branch = 1;
067fa4a6
AM
1115 goto branch_common;
1116
30667bf3
AM
1117 case R_PARISC_PCREL17C:
1118 case R_PARISC_PCREL17F:
83c81bfe 1119 htab->has_17bit_branch = 1;
067fa4a6
AM
1120 goto branch_common;
1121
30667bf3 1122 case R_PARISC_PCREL22F:
067fa4a6
AM
1123 htab->has_22bit_branch = 1;
1124 branch_common:
47d89dba
AM
1125 /* Function calls might need to go through the .plt, and
1126 might require long branch stubs. */
30667bf3
AM
1127 if (h == NULL)
1128 {
1129 /* We know local syms won't need a .plt entry, and if
1130 they need a long branch stub we can't guarantee that
1131 we can reach the stub. So just flag an error later
1132 if we're doing a shared link and find we need a long
1133 branch stub. */
1134 continue;
1135 }
1136 else
1137 {
1138 /* Global symbols will need a .plt entry if they remain
1139 global, and in most cases won't need a long branch
1140 stub. Unfortunately, we have to cater for the case
1141 where a symbol is forced local by versioning, or due
1142 to symbolic linking, and we lose the .plt entry. */
98ceb8ce 1143 need_entry = NEED_PLT;
4dc86686 1144 if (h->elf.type == STT_PARISC_MILLI)
98ceb8ce 1145 need_entry = 0;
30667bf3
AM
1146 }
1147 break;
1148
1149 case R_PARISC_SEGBASE: /* Used to set segment base. */
c46b7515 1150 case R_PARISC_SEGREL32: /* Relative reloc, used for unwind. */
30667bf3
AM
1151 case R_PARISC_PCREL14F: /* PC relative load/store. */
1152 case R_PARISC_PCREL14R:
1153 case R_PARISC_PCREL17R: /* External branches. */
1154 case R_PARISC_PCREL21L: /* As above, and for load/store too. */
1155 /* We don't need to propagate the relocation if linking a
1156 shared object since these are section relative. */
1157 continue;
1158
1159 case R_PARISC_DPREL14F: /* Used for gp rel data load/store. */
1160 case R_PARISC_DPREL14R:
1161 case R_PARISC_DPREL21L:
1162 if (info->shared)
1163 {
1164 (*_bfd_error_handler)
1165 (_("%s: relocation %s can not be used when making a shared object; recompile with -fPIC"),
8f615d07 1166 bfd_archive_filename (abfd),
30667bf3
AM
1167 elf_hppa_howto_table[r_type].name);
1168 bfd_set_error (bfd_error_bad_value);
b34976b6 1169 return FALSE;
30667bf3
AM
1170 }
1171 /* Fall through. */
1172
1173 case R_PARISC_DIR17F: /* Used for external branches. */
1174 case R_PARISC_DIR17R:
47d89dba
AM
1175 case R_PARISC_DIR14F: /* Used for load/store from absolute locn. */
1176 case R_PARISC_DIR14R:
30667bf3 1177 case R_PARISC_DIR21L: /* As above, and for ext branches too. */
067fa4a6 1178#if 0
30667bf3
AM
1179 /* Help debug shared library creation. Any of the above
1180 relocs can be used in shared libs, but they may cause
1181 pages to become unshared. */
1182 if (info->shared)
1183 {
1184 (*_bfd_error_handler)
1185 (_("%s: relocation %s should not be used when making a shared object; recompile with -fPIC"),
8f615d07 1186 bfd_archive_filename (abfd),
30667bf3
AM
1187 elf_hppa_howto_table[r_type].name);
1188 }
1189 /* Fall through. */
1190#endif
1191
c46b7515 1192 case R_PARISC_DIR32: /* .word relocs. */
30667bf3
AM
1193 /* We may want to output a dynamic relocation later. */
1194 need_entry = NEED_DYNREL;
1195 break;
1196
1197 /* This relocation describes the C++ object vtable hierarchy.
1198 Reconstruct it for later use during GC. */
1199 case R_PARISC_GNU_VTINHERIT:
1200 if (!_bfd_elf32_gc_record_vtinherit (abfd, sec,
1201 &h->elf, rel->r_offset))
b34976b6 1202 return FALSE;
30667bf3
AM
1203 continue;
1204
1205 /* This relocation describes which C++ vtable entries are actually
1206 used. Record for later use during GC. */
1207 case R_PARISC_GNU_VTENTRY:
1208 if (!_bfd_elf32_gc_record_vtentry (abfd, sec,
36605136 1209 &h->elf, rel->r_addend))
b34976b6 1210 return FALSE;
30667bf3
AM
1211 continue;
1212
1213 default:
1214 continue;
1215 }
1216
1217 /* Now carry out our orders. */
1218 if (need_entry & NEED_GOT)
1219 {
1220 /* Allocate space for a GOT entry, as well as a dynamic
25f72752 1221 relocation for this entry. */
83c81bfe 1222 if (htab->sgot == NULL)
30667bf3 1223 {
3ac8354b
AM
1224 if (htab->elf.dynobj == NULL)
1225 htab->elf.dynobj = abfd;
1226 if (!elf32_hppa_create_dynamic_sections (htab->elf.dynobj, info))
b34976b6 1227 return FALSE;
30667bf3
AM
1228 }
1229
1230 if (h != NULL)
1231 {
51b64d56 1232 h->elf.got.refcount += 1;
30667bf3
AM
1233 }
1234 else
1235 {
3ac8354b
AM
1236 bfd_signed_vma *local_got_refcounts;
1237
30667bf3 1238 /* This is a global offset table entry for a local symbol. */
3ac8354b 1239 local_got_refcounts = elf_local_got_refcounts (abfd);
30667bf3
AM
1240 if (local_got_refcounts == NULL)
1241 {
dc810e39 1242 bfd_size_type size;
30667bf3 1243
74d1c347
AM
1244 /* Allocate space for local got offsets and local
1245 plt offsets. Done this way to save polluting
1246 elf_obj_tdata with another target specific
1247 pointer. */
dc810e39
AM
1248 size = symtab_hdr->sh_info;
1249 size *= 2 * sizeof (bfd_signed_vma);
c39a58e6 1250 local_got_refcounts = bfd_zalloc (abfd, size);
30667bf3 1251 if (local_got_refcounts == NULL)
b34976b6 1252 return FALSE;
30667bf3 1253 elf_local_got_refcounts (abfd) = local_got_refcounts;
30667bf3 1254 }
ebe50bae 1255 local_got_refcounts[r_symndx] += 1;
30667bf3
AM
1256 }
1257 }
1258
1259 if (need_entry & NEED_PLT)
1260 {
1261 /* If we are creating a shared library, and this is a reloc
1262 against a weak symbol or a global symbol in a dynamic
1263 object, then we will be creating an import stub and a
1264 .plt entry for the symbol. Similarly, on a normal link
1265 to symbols defined in a dynamic object we'll need the
1266 import stub and a .plt entry. We don't know yet whether
1267 the symbol is defined or not, so make an entry anyway and
1268 clean up later in adjust_dynamic_symbol. */
1269 if ((sec->flags & SEC_ALLOC) != 0)
1270 {
74d1c347 1271 if (h != NULL)
30667bf3 1272 {
51b64d56
AM
1273 h->elf.elf_link_hash_flags |= ELF_LINK_HASH_NEEDS_PLT;
1274 h->elf.plt.refcount += 1;
74d1c347 1275
36605136
AM
1276 /* If this .plt entry is for a plabel, mark it so
1277 that adjust_dynamic_symbol will keep the entry
1278 even if it appears to be local. */
74d1c347
AM
1279 if (need_entry & PLT_PLABEL)
1280 h->plabel = 1;
1281 }
1282 else if (need_entry & PLT_PLABEL)
1283 {
3ac8354b 1284 bfd_signed_vma *local_got_refcounts;
68fb2e56 1285 bfd_signed_vma *local_plt_refcounts;
74d1c347 1286
3ac8354b 1287 local_got_refcounts = elf_local_got_refcounts (abfd);
74d1c347
AM
1288 if (local_got_refcounts == NULL)
1289 {
dc810e39 1290 bfd_size_type size;
74d1c347
AM
1291
1292 /* Allocate space for local got offsets and local
1293 plt offsets. */
dc810e39
AM
1294 size = symtab_hdr->sh_info;
1295 size *= 2 * sizeof (bfd_signed_vma);
c39a58e6 1296 local_got_refcounts = bfd_zalloc (abfd, size);
74d1c347 1297 if (local_got_refcounts == NULL)
b34976b6 1298 return FALSE;
74d1c347 1299 elf_local_got_refcounts (abfd) = local_got_refcounts;
74d1c347 1300 }
68fb2e56
AM
1301 local_plt_refcounts = (local_got_refcounts
1302 + symtab_hdr->sh_info);
ebe50bae 1303 local_plt_refcounts[r_symndx] += 1;
30667bf3 1304 }
30667bf3
AM
1305 }
1306 }
1307
98ceb8ce 1308 if (need_entry & NEED_DYNREL)
30667bf3
AM
1309 {
1310 /* Flag this symbol as having a non-got, non-plt reference
1311 so that we generate copy relocs if it turns out to be
1312 dynamic. */
ebe50bae 1313 if (h != NULL && !info->shared)
30667bf3
AM
1314 h->elf.elf_link_hash_flags |= ELF_LINK_NON_GOT_REF;
1315
1316 /* If we are creating a shared library then we need to copy
1317 the reloc into the shared library. However, if we are
1318 linking with -Bsymbolic, we need only copy absolute
1319 relocs or relocs against symbols that are not defined in
1320 an object we are including in the link. PC- or DP- or
1321 DLT-relative relocs against any local sym or global sym
1322 with DEF_REGULAR set, can be discarded. At this point we
1323 have not seen all the input files, so it is possible that
1324 DEF_REGULAR is not set now but will be set later (it is
1325 never cleared). We account for that possibility below by
98ceb8ce 1326 storing information in the dyn_relocs field of the
30667bf3
AM
1327 hash table entry.
1328
1329 A similar situation to the -Bsymbolic case occurs when
1330 creating shared libraries and symbol visibility changes
1331 render the symbol local.
1332
1333 As it turns out, all the relocs we will be creating here
1334 are absolute, so we cannot remove them on -Bsymbolic
1335 links or visibility changes anyway. A STUB_REL reloc
1336 is absolute too, as in that case it is the reloc in the
1337 stub we will be creating, rather than copying the PCREL
56882138
AM
1338 reloc in the branch.
1339
1340 If on the other hand, we are creating an executable, we
1341 may need to keep relocations for symbols satisfied by a
1342 dynamic library if we manage to avoid copy relocs for the
1343 symbol. */
446f2863
AM
1344 if ((info->shared
1345 && (sec->flags & SEC_ALLOC) != 0
1346 && (IS_ABSOLUTE_RELOC (r_type)
1347 || (h != NULL
1348 && (!info->symbolic
1349 || h->elf.root.type == bfd_link_hash_defweak
1350 || (h->elf.elf_link_hash_flags
1351 & ELF_LINK_HASH_DEF_REGULAR) == 0))))
4fc8051d
AM
1352 || (ELIMINATE_COPY_RELOCS
1353 && !info->shared
446f2863
AM
1354 && (sec->flags & SEC_ALLOC) != 0
1355 && h != NULL
446f2863
AM
1356 && (h->elf.root.type == bfd_link_hash_defweak
1357 || (h->elf.elf_link_hash_flags
1358 & ELF_LINK_HASH_DEF_REGULAR) == 0)))
30667bf3 1359 {
ec338859
AM
1360 struct elf32_hppa_dyn_reloc_entry *p;
1361 struct elf32_hppa_dyn_reloc_entry **head;
1362
30667bf3
AM
1363 /* Create a reloc section in dynobj and make room for
1364 this reloc. */
98ceb8ce 1365 if (sreloc == NULL)
30667bf3
AM
1366 {
1367 char *name;
3ac8354b 1368 bfd *dynobj;
30667bf3 1369
98ceb8ce
AM
1370 name = (bfd_elf_string_from_elf_section
1371 (abfd,
1372 elf_elfheader (abfd)->e_shstrndx,
1373 elf_section_data (sec)->rel_hdr.sh_name));
30667bf3
AM
1374 if (name == NULL)
1375 {
1376 (*_bfd_error_handler)
1377 (_("Could not find relocation section for %s"),
1378 sec->name);
1379 bfd_set_error (bfd_error_bad_value);
b34976b6 1380 return FALSE;
30667bf3
AM
1381 }
1382
3ac8354b
AM
1383 if (htab->elf.dynobj == NULL)
1384 htab->elf.dynobj = abfd;
1385
1386 dynobj = htab->elf.dynobj;
98ceb8ce
AM
1387 sreloc = bfd_get_section_by_name (dynobj, name);
1388 if (sreloc == NULL)
30667bf3
AM
1389 {
1390 flagword flags;
1391
98ceb8ce 1392 sreloc = bfd_make_section (dynobj, name);
30667bf3
AM
1393 flags = (SEC_HAS_CONTENTS | SEC_READONLY
1394 | SEC_IN_MEMORY | SEC_LINKER_CREATED);
1395 if ((sec->flags & SEC_ALLOC) != 0)
1396 flags |= SEC_ALLOC | SEC_LOAD;
98ceb8ce
AM
1397 if (sreloc == NULL
1398 || !bfd_set_section_flags (dynobj, sreloc, flags)
1399 || !bfd_set_section_alignment (dynobj, sreloc, 2))
b34976b6 1400 return FALSE;
30667bf3 1401 }
30667bf3 1402
98ceb8ce 1403 elf_section_data (sec)->sreloc = sreloc;
30667bf3
AM
1404 }
1405
98ceb8ce
AM
1406 /* If this is a global symbol, we count the number of
1407 relocations we need for this symbol. */
1408 if (h != NULL)
30667bf3 1409 {
ec338859
AM
1410 head = &h->dyn_relocs;
1411 }
1412 else
1413 {
1414 /* Track dynamic relocs needed for local syms too.
1415 We really need local syms available to do this
1416 easily. Oh well. */
1417
1418 asection *s;
1419 s = bfd_section_from_r_symndx (abfd, &htab->sym_sec,
1420 sec, r_symndx);
1421 if (s == NULL)
b34976b6 1422 return FALSE;
30667bf3 1423
ec338859
AM
1424 head = ((struct elf32_hppa_dyn_reloc_entry **)
1425 &elf_section_data (s)->local_dynrel);
1426 }
1427
1428 p = *head;
1429 if (p == NULL || p->sec != sec)
1430 {
c39a58e6 1431 p = bfd_alloc (htab->elf.dynobj, sizeof *p);
ec338859 1432 if (p == NULL)
b34976b6 1433 return FALSE;
ec338859
AM
1434 p->next = *head;
1435 *head = p;
1436 p->sec = sec;
1437 p->count = 0;
98ceb8ce 1438#if RELATIVE_DYNRELOCS
ec338859 1439 p->relative_count = 0;
98ceb8ce 1440#endif
ec338859 1441 }
98ceb8ce 1442
ec338859 1443 p->count += 1;
98ceb8ce 1444#if RELATIVE_DYNRELOCS
ec338859
AM
1445 if (!IS_ABSOLUTE_RELOC (rtype))
1446 p->relative_count += 1;
98ceb8ce 1447#endif
30667bf3
AM
1448 }
1449 }
1450 }
edd21aca 1451
b34976b6 1452 return TRUE;
edd21aca
AM
1453}
1454
30667bf3
AM
1455/* Return the section that should be marked against garbage collection
1456 for a given relocation. */
1457
1458static asection *
c39a58e6
AM
1459elf32_hppa_gc_mark_hook (asection *sec,
1460 struct bfd_link_info *info ATTRIBUTE_UNUSED,
1461 Elf_Internal_Rela *rel,
1462 struct elf_link_hash_entry *h,
1463 Elf_Internal_Sym *sym)
30667bf3
AM
1464{
1465 if (h != NULL)
1466 {
1467 switch ((unsigned int) ELF32_R_TYPE (rel->r_info))
1468 {
1469 case R_PARISC_GNU_VTINHERIT:
1470 case R_PARISC_GNU_VTENTRY:
1471 break;
1472
1473 default:
1474 switch (h->root.type)
1475 {
1476 case bfd_link_hash_defined:
1477 case bfd_link_hash_defweak:
1478 return h->root.u.def.section;
1479
1480 case bfd_link_hash_common:
1481 return h->root.u.c.p->section;
1482
1483 default:
1484 break;
1485 }
1486 }
1487 }
1488 else
1e2f5b6e 1489 return bfd_section_from_elf_index (sec->owner, sym->st_shndx);
30667bf3
AM
1490
1491 return NULL;
1492}
1493
30667bf3
AM
1494/* Update the got and plt entry reference counts for the section being
1495 removed. */
edd21aca 1496
b34976b6 1497static bfd_boolean
c39a58e6
AM
1498elf32_hppa_gc_sweep_hook (bfd *abfd,
1499 struct bfd_link_info *info ATTRIBUTE_UNUSED,
1500 asection *sec,
1501 const Elf_Internal_Rela *relocs)
edd21aca 1502{
30667bf3
AM
1503 Elf_Internal_Shdr *symtab_hdr;
1504 struct elf_link_hash_entry **sym_hashes;
1505 bfd_signed_vma *local_got_refcounts;
74d1c347 1506 bfd_signed_vma *local_plt_refcounts;
30667bf3 1507 const Elf_Internal_Rela *rel, *relend;
30667bf3 1508
ec338859 1509 elf_section_data (sec)->local_dynrel = NULL;
98ceb8ce 1510
30667bf3
AM
1511 symtab_hdr = &elf_tdata (abfd)->symtab_hdr;
1512 sym_hashes = elf_sym_hashes (abfd);
1513 local_got_refcounts = elf_local_got_refcounts (abfd);
74d1c347
AM
1514 local_plt_refcounts = local_got_refcounts;
1515 if (local_plt_refcounts != NULL)
1516 local_plt_refcounts += symtab_hdr->sh_info;
30667bf3 1517
30667bf3
AM
1518 relend = relocs + sec->reloc_count;
1519 for (rel = relocs; rel < relend; rel++)
26e41594
AM
1520 {
1521 unsigned long r_symndx;
1522 unsigned int r_type;
1523 struct elf_link_hash_entry *h = NULL;
1524
1525 r_symndx = ELF32_R_SYM (rel->r_info);
1526 if (r_symndx >= symtab_hdr->sh_info)
1527 {
1528 struct elf32_hppa_link_hash_entry *eh;
1529 struct elf32_hppa_dyn_reloc_entry **pp;
1530 struct elf32_hppa_dyn_reloc_entry *p;
1531
1532 h = sym_hashes[r_symndx - symtab_hdr->sh_info];
1533 eh = (struct elf32_hppa_link_hash_entry *) h;
1534
1535 for (pp = &eh->dyn_relocs; (p = *pp) != NULL; pp = &p->next)
1536 if (p->sec == sec)
1537 {
1538 /* Everything must go for SEC. */
1539 *pp = p->next;
1540 break;
1541 }
1542 }
1543
1544 r_type = ELF32_R_TYPE (rel->r_info);
1545 switch (r_type)
1546 {
1547 case R_PARISC_DLTIND14F:
1548 case R_PARISC_DLTIND14R:
1549 case R_PARISC_DLTIND21L:
1550 if (h != NULL)
1551 {
1552 if (h->got.refcount > 0)
1553 h->got.refcount -= 1;
1554 }
1555 else if (local_got_refcounts != NULL)
1556 {
1557 if (local_got_refcounts[r_symndx] > 0)
1558 local_got_refcounts[r_symndx] -= 1;
1559 }
1560 break;
98ceb8ce 1561
26e41594
AM
1562 case R_PARISC_PCREL12F:
1563 case R_PARISC_PCREL17C:
1564 case R_PARISC_PCREL17F:
1565 case R_PARISC_PCREL22F:
1566 if (h != NULL)
1567 {
1568 if (h->plt.refcount > 0)
1569 h->plt.refcount -= 1;
1570 }
1571 break;
1572
1573 case R_PARISC_PLABEL14R:
1574 case R_PARISC_PLABEL21L:
1575 case R_PARISC_PLABEL32:
1576 if (h != NULL)
1577 {
1578 if (h->plt.refcount > 0)
1579 h->plt.refcount -= 1;
1580 }
1581 else if (local_plt_refcounts != NULL)
1582 {
1583 if (local_plt_refcounts[r_symndx] > 0)
1584 local_plt_refcounts[r_symndx] -= 1;
1585 }
1586 break;
1587
1588 default:
1589 break;
1590 }
1591 }
252b5132 1592
b34976b6 1593 return TRUE;
252b5132
RH
1594}
1595
74d1c347
AM
1596/* Our own version of hide_symbol, so that we can keep plt entries for
1597 plabels. */
1598
1599static void
c39a58e6
AM
1600elf32_hppa_hide_symbol (struct bfd_link_info *info,
1601 struct elf_link_hash_entry *h,
1602 bfd_boolean force_local)
74d1c347 1603{
e5094212
AM
1604 if (force_local)
1605 {
1606 h->elf_link_hash_flags |= ELF_LINK_FORCED_LOCAL;
1607 if (h->dynindx != -1)
1608 {
1609 h->dynindx = -1;
1610 _bfd_elf_strtab_delref (elf_hash_table (info)->dynstr,
1611 h->dynstr_index);
1612 }
1613 }
1614
74d1c347
AM
1615 if (! ((struct elf32_hppa_link_hash_entry *) h)->plabel)
1616 {
1617 h->elf_link_hash_flags &= ~ELF_LINK_HASH_NEEDS_PLT;
1618 h->plt.offset = (bfd_vma) -1;
1619 }
1620}
1621
4dc86686
AM
1622/* This is the condition under which elf32_hppa_finish_dynamic_symbol
1623 will be called from elflink.h. If elflink.h doesn't call our
1624 finish_dynamic_symbol routine, we'll need to do something about
1625 initializing any .plt and .got entries in elf32_hppa_relocate_section. */
1626#define WILL_CALL_FINISH_DYNAMIC_SYMBOL(DYN, INFO, H) \
1627 ((DYN) \
1628 && ((INFO)->shared \
1629 || ((H)->elf_link_hash_flags & ELF_LINK_FORCED_LOCAL) == 0) \
1630 && ((H)->dynindx != -1 \
1631 || ((H)->elf_link_hash_flags & ELF_LINK_FORCED_LOCAL) != 0))
1632
30667bf3
AM
1633/* Adjust a symbol defined by a dynamic object and referenced by a
1634 regular object. The current definition is in some section of the
1635 dynamic object, but we're not including those sections. We have to
1636 change the definition to something the rest of the link can
1637 understand. */
252b5132 1638
b34976b6 1639static bfd_boolean
c39a58e6
AM
1640elf32_hppa_adjust_dynamic_symbol (struct bfd_link_info *info,
1641 struct elf_link_hash_entry *h)
252b5132 1642{
83c81bfe 1643 struct elf32_hppa_link_hash_table *htab;
30667bf3 1644 asection *s;
3ac8354b 1645 unsigned int power_of_two;
30667bf3
AM
1646
1647 /* If this is a function, put it in the procedure linkage table. We
067fa4a6 1648 will fill in the contents of the procedure linkage table later. */
30667bf3
AM
1649 if (h->type == STT_FUNC
1650 || (h->elf_link_hash_flags & ELF_LINK_HASH_NEEDS_PLT) != 0)
1651 {
1652 if (h->plt.refcount <= 0
1653 || ((h->elf_link_hash_flags & ELF_LINK_HASH_DEF_REGULAR) != 0
1654 && h->root.type != bfd_link_hash_defweak
74d1c347 1655 && ! ((struct elf32_hppa_link_hash_entry *) h)->plabel
30667bf3
AM
1656 && (!info->shared || info->symbolic)))
1657 {
1658 /* The .plt entry is not needed when:
1659 a) Garbage collection has removed all references to the
1660 symbol, or
1661 b) We know for certain the symbol is defined in this
74d1c347
AM
1662 object, and it's not a weak definition, nor is the symbol
1663 used by a plabel relocation. Either this object is the
1664 application or we are doing a shared symbolic link. */
1665
a252afa4
DA
1666 h->plt.offset = (bfd_vma) -1;
1667 h->elf_link_hash_flags &= ~ELF_LINK_HASH_NEEDS_PLT;
30667bf3 1668 }
4dc86686 1669
b34976b6 1670 return TRUE;
30667bf3 1671 }
bbd7ec4a
AM
1672 else
1673 h->plt.offset = (bfd_vma) -1;
edd21aca 1674
30667bf3
AM
1675 /* If this is a weak symbol, and there is a real definition, the
1676 processor independent code will have arranged for us to see the
1677 real definition first, and we can just use the same value. */
1678 if (h->weakdef != NULL)
edd21aca 1679 {
49e9d0d3
AM
1680 if (h->weakdef->root.type != bfd_link_hash_defined
1681 && h->weakdef->root.type != bfd_link_hash_defweak)
1682 abort ();
30667bf3
AM
1683 h->root.u.def.section = h->weakdef->root.u.def.section;
1684 h->root.u.def.value = h->weakdef->root.u.def.value;
4fc8051d
AM
1685 if (ELIMINATE_COPY_RELOCS)
1686 h->elf_link_hash_flags
1687 = ((h->elf_link_hash_flags & ~ELF_LINK_NON_GOT_REF)
1688 | (h->weakdef->elf_link_hash_flags & ELF_LINK_NON_GOT_REF));
b34976b6 1689 return TRUE;
30667bf3 1690 }
edd21aca 1691
30667bf3
AM
1692 /* This is a reference to a symbol defined by a dynamic object which
1693 is not a function. */
1694
1695 /* If we are creating a shared library, we must presume that the
1696 only references to the symbol are via the global offset table.
1697 For such cases we need not do anything here; the relocations will
1698 be handled correctly by relocate_section. */
1699 if (info->shared)
b34976b6 1700 return TRUE;
30667bf3
AM
1701
1702 /* If there are no references to this symbol that do not use the
1703 GOT, we don't need to generate a copy reloc. */
1704 if ((h->elf_link_hash_flags & ELF_LINK_NON_GOT_REF) == 0)
b34976b6 1705 return TRUE;
30667bf3 1706
4fc8051d 1707 if (ELIMINATE_COPY_RELOCS)
ebe50bae 1708 {
4fc8051d
AM
1709 struct elf32_hppa_link_hash_entry *eh;
1710 struct elf32_hppa_dyn_reloc_entry *p;
ebe50bae 1711
4fc8051d
AM
1712 eh = (struct elf32_hppa_link_hash_entry *) h;
1713 for (p = eh->dyn_relocs; p != NULL; p = p->next)
1714 {
1715 s = p->sec->output_section;
1716 if (s != NULL && (s->flags & SEC_READONLY) != 0)
1717 break;
1718 }
1719
1720 /* If we didn't find any dynamic relocs in read-only sections, then
1721 we'll be keeping the dynamic relocs and avoiding the copy reloc. */
1722 if (p == NULL)
1723 {
1724 h->elf_link_hash_flags &= ~ELF_LINK_NON_GOT_REF;
1725 return TRUE;
1726 }
ebe50bae
AM
1727 }
1728
30667bf3
AM
1729 /* We must allocate the symbol in our .dynbss section, which will
1730 become part of the .bss section of the executable. There will be
1731 an entry for this symbol in the .dynsym section. The dynamic
1732 object will contain position independent code, so all references
1733 from the dynamic object to this symbol will go through the global
1734 offset table. The dynamic linker will use the .dynsym entry to
1735 determine the address it must put in the global offset table, so
1736 both the dynamic object and the regular object will refer to the
1737 same memory location for the variable. */
1738
3ac8354b 1739 htab = hppa_link_hash_table (info);
30667bf3
AM
1740
1741 /* We must generate a COPY reloc to tell the dynamic linker to
1742 copy the initial value out of the dynamic object and into the
3ac8354b 1743 runtime process image. */
30667bf3
AM
1744 if ((h->root.u.def.section->flags & SEC_ALLOC) != 0)
1745 {
3ac8354b 1746 htab->srelbss->_raw_size += sizeof (Elf32_External_Rela);
30667bf3 1747 h->elf_link_hash_flags |= ELF_LINK_HASH_NEEDS_COPY;
edd21aca 1748 }
252b5132 1749
3ac8354b
AM
1750 /* We need to figure out the alignment required for this symbol. I
1751 have no idea how other ELF linkers handle this. */
30667bf3 1752
3ac8354b
AM
1753 power_of_two = bfd_log2 (h->size);
1754 if (power_of_two > 3)
1755 power_of_two = 3;
1756
1757 /* Apply the required alignment. */
1758 s = htab->sdynbss;
1759 s->_raw_size = BFD_ALIGN (s->_raw_size,
1760 (bfd_size_type) (1 << power_of_two));
1761 if (power_of_two > bfd_get_section_alignment (htab->elf.dynobj, s))
1762 {
1763 if (! bfd_set_section_alignment (htab->elf.dynobj, s, power_of_two))
b34976b6 1764 return FALSE;
3ac8354b 1765 }
30667bf3 1766
30667bf3
AM
1767 /* Define the symbol as being at this point in the section. */
1768 h->root.u.def.section = s;
1769 h->root.u.def.value = s->_raw_size;
edd21aca 1770
30667bf3
AM
1771 /* Increment the section size to make room for the symbol. */
1772 s->_raw_size += h->size;
252b5132 1773
b34976b6 1774 return TRUE;
252b5132
RH
1775}
1776
e5ee5df1 1777/* Allocate space in the .plt for entries that won't have relocations.
a252afa4 1778 ie. plabel entries. */
a8d02d66 1779
b34976b6 1780static bfd_boolean
c39a58e6 1781allocate_plt_static (struct elf_link_hash_entry *h, void *inf)
a8d02d66
AM
1782{
1783 struct bfd_link_info *info;
1784 struct elf32_hppa_link_hash_table *htab;
1785 asection *s;
1786
e92d460e 1787 if (h->root.type == bfd_link_hash_indirect)
b34976b6 1788 return TRUE;
a8d02d66 1789
e92d460e
AM
1790 if (h->root.type == bfd_link_hash_warning)
1791 h = (struct elf_link_hash_entry *) h->root.u.i.link;
1792
c39a58e6 1793 info = inf;
a8d02d66 1794 htab = hppa_link_hash_table (info);
a252afa4 1795 if (htab->elf.dynamic_sections_created
e5ee5df1
AM
1796 && h->plt.refcount > 0)
1797 {
1798 /* Make sure this symbol is output as a dynamic symbol.
1799 Undefined weak syms won't yet be marked as dynamic. */
1800 if (h->dynindx == -1
1801 && (h->elf_link_hash_flags & ELF_LINK_FORCED_LOCAL) == 0
1802 && h->type != STT_PARISC_MILLI)
a8d02d66 1803 {
e5ee5df1 1804 if (! bfd_elf32_link_record_dynamic_symbol (info, h))
b34976b6 1805 return FALSE;
e5ee5df1
AM
1806 }
1807
1808 if (WILL_CALL_FINISH_DYNAMIC_SYMBOL (1, info, h))
1809 {
067fa4a6
AM
1810 /* Allocate these later. From this point on, h->plabel
1811 means that the plt entry is only used by a plabel.
1812 We'll be using a normal plt entry for this symbol, so
1813 clear the plabel indicator. */
1814 ((struct elf32_hppa_link_hash_entry *) h)->plabel = 0;
e5ee5df1
AM
1815 }
1816 else if (((struct elf32_hppa_link_hash_entry *) h)->plabel)
1817 {
1818 /* Make an entry in the .plt section for plabel references
1819 that won't have a .plt entry for other reasons. */
1820 s = htab->splt;
1821 h->plt.offset = s->_raw_size;
1822 s->_raw_size += PLT_ENTRY_SIZE;
a8d02d66
AM
1823 }
1824 else
e5ee5df1
AM
1825 {
1826 /* No .plt entry needed. */
1827 h->plt.offset = (bfd_vma) -1;
1828 h->elf_link_hash_flags &= ~ELF_LINK_HASH_NEEDS_PLT;
1829 }
1830 }
1831 else
1832 {
1833 h->plt.offset = (bfd_vma) -1;
1834 h->elf_link_hash_flags &= ~ELF_LINK_HASH_NEEDS_PLT;
a8d02d66
AM
1835 }
1836
b34976b6 1837 return TRUE;
a8d02d66
AM
1838}
1839
4dc86686
AM
1840/* Allocate space in .plt, .got and associated reloc sections for
1841 global syms. */
1842
b34976b6 1843static bfd_boolean
c39a58e6 1844allocate_dynrelocs (struct elf_link_hash_entry *h, void *inf)
4dc86686
AM
1845{
1846 struct bfd_link_info *info;
83c81bfe 1847 struct elf32_hppa_link_hash_table *htab;
4dc86686 1848 asection *s;
446f2863 1849 struct elf32_hppa_link_hash_entry *eh;
98ceb8ce 1850 struct elf32_hppa_dyn_reloc_entry *p;
4dc86686 1851
e92d460e 1852 if (h->root.type == bfd_link_hash_indirect)
b34976b6 1853 return TRUE;
73a74a62 1854
e92d460e
AM
1855 if (h->root.type == bfd_link_hash_warning)
1856 h = (struct elf_link_hash_entry *) h->root.u.i.link;
1857
c39a58e6 1858 info = inf;
83c81bfe 1859 htab = hppa_link_hash_table (info);
e5ee5df1
AM
1860 if (htab->elf.dynamic_sections_created
1861 && h->plt.offset != (bfd_vma) -1
067fa4a6 1862 && !((struct elf32_hppa_link_hash_entry *) h)->plabel)
4dc86686 1863 {
e5ee5df1
AM
1864 /* Make an entry in the .plt section. */
1865 s = htab->splt;
1866 h->plt.offset = s->_raw_size;
1867 s->_raw_size += PLT_ENTRY_SIZE;
3ac8354b 1868
e5ee5df1
AM
1869 /* We also need to make an entry in the .rela.plt section. */
1870 htab->srelplt->_raw_size += sizeof (Elf32_External_Rela);
1871 htab->need_plt_stub = 1;
4dc86686 1872 }
edd21aca 1873
4dc86686
AM
1874 if (h->got.refcount > 0)
1875 {
446f2863
AM
1876 /* Make sure this symbol is output as a dynamic symbol.
1877 Undefined weak syms won't yet be marked as dynamic. */
1878 if (h->dynindx == -1
1879 && (h->elf_link_hash_flags & ELF_LINK_FORCED_LOCAL) == 0
1880 && h->type != STT_PARISC_MILLI)
1881 {
1882 if (! bfd_elf32_link_record_dynamic_symbol (info, h))
b34976b6 1883 return FALSE;
446f2863
AM
1884 }
1885
83c81bfe 1886 s = htab->sgot;
4dc86686
AM
1887 h->got.offset = s->_raw_size;
1888 s->_raw_size += GOT_ENTRY_SIZE;
ce757d15
AM
1889 if (htab->elf.dynamic_sections_created
1890 && (info->shared
1891 || (h->dynindx != -1
1892 && h->elf_link_hash_flags & ELF_LINK_FORCED_LOCAL) == 0))
1893 {
1894 htab->srelgot->_raw_size += sizeof (Elf32_External_Rela);
1895 }
4dc86686
AM
1896 }
1897 else
1898 h->got.offset = (bfd_vma) -1;
30667bf3 1899
446f2863 1900 eh = (struct elf32_hppa_link_hash_entry *) h;
98ceb8ce 1901 if (eh->dyn_relocs == NULL)
b34976b6 1902 return TRUE;
30667bf3 1903
98ceb8ce
AM
1904 /* If this is a -Bsymbolic shared link, then we need to discard all
1905 space allocated for dynamic pc-relative relocs against symbols
1906 defined in a regular object. For the normal shared case, discard
1907 space for relocs that have become local due to symbol visibility
1908 changes. */
1909 if (info->shared)
446f2863 1910 {
98ceb8ce 1911#if RELATIVE_DYNRELOCS
4fc8051d 1912 if (SYMBOL_CALLS_LOCAL (info, h))
446f2863 1913 {
98ceb8ce 1914 struct elf32_hppa_dyn_reloc_entry **pp;
30667bf3 1915
98ceb8ce
AM
1916 for (pp = &eh->dyn_relocs; (p = *pp) != NULL; )
1917 {
1918 p->count -= p->relative_count;
1919 p->relative_count = 0;
1920 if (p->count == 0)
1921 *pp = p->next;
1922 else
1923 pp = &p->next;
1924 }
1925 }
1926#endif
4fc8051d
AM
1927
1928 /* Also discard relocs on undefined weak syms with non-default
1929 visibility. */
1930 if (ELF_ST_VISIBILITY (h->other) != STV_DEFAULT
1931 && h->root.type == bfd_link_hash_undefweak)
1932 eh->dyn_relocs = NULL;
446f2863 1933 }
98ceb8ce 1934 else
30667bf3 1935 {
98ceb8ce
AM
1936 /* For the non-shared case, discard space for relocs against
1937 symbols which turn out to need copy relocs or are not
1938 dynamic. */
1939 if ((h->elf_link_hash_flags & ELF_LINK_NON_GOT_REF) == 0
4fc8051d
AM
1940 && ((ELIMINATE_COPY_RELOCS
1941 && (h->elf_link_hash_flags & ELF_LINK_HASH_DEF_DYNAMIC) != 0
98ceb8ce 1942 && (h->elf_link_hash_flags & ELF_LINK_HASH_DEF_REGULAR) == 0)
ebe50bae 1943 || (htab->elf.dynamic_sections_created
98ceb8ce
AM
1944 && (h->root.type == bfd_link_hash_undefweak
1945 || h->root.type == bfd_link_hash_undefined))))
1946 {
1947 /* Make sure this symbol is output as a dynamic symbol.
1948 Undefined weak syms won't yet be marked as dynamic. */
1949 if (h->dynindx == -1
1950 && (h->elf_link_hash_flags & ELF_LINK_FORCED_LOCAL) == 0
1951 && h->type != STT_PARISC_MILLI)
1952 {
1953 if (! bfd_elf32_link_record_dynamic_symbol (info, h))
b34976b6 1954 return FALSE;
98ceb8ce
AM
1955 }
1956
1957 /* If that succeeded, we know we'll be keeping all the
1958 relocs. */
1959 if (h->dynindx != -1)
1960 goto keep;
1961 }
446f2863 1962
98ceb8ce 1963 eh->dyn_relocs = NULL;
b34976b6 1964 return TRUE;
98ceb8ce 1965
ec338859 1966 keep: ;
30667bf3 1967 }
30667bf3 1968
98ceb8ce
AM
1969 /* Finally, allocate space. */
1970 for (p = eh->dyn_relocs; p != NULL; p = p->next)
30667bf3 1971 {
98ceb8ce
AM
1972 asection *sreloc = elf_section_data (p->sec)->sreloc;
1973 sreloc->_raw_size += p->count * sizeof (Elf32_External_Rela);
30667bf3 1974 }
30667bf3 1975
b34976b6 1976 return TRUE;
30667bf3 1977}
30667bf3 1978
d5c73c2f
AM
1979/* This function is called via elf_link_hash_traverse to force
1980 millicode symbols local so they do not end up as globals in the
1981 dynamic symbol table. We ought to be able to do this in
1982 adjust_dynamic_symbol, but our adjust_dynamic_symbol is not called
1983 for all dynamic symbols. Arguably, this is a bug in
1984 elf_adjust_dynamic_symbol. */
1985
b34976b6 1986static bfd_boolean
c39a58e6
AM
1987clobber_millicode_symbols (struct elf_link_hash_entry *h,
1988 struct bfd_link_info *info)
d5c73c2f 1989{
e92d460e
AM
1990 if (h->root.type == bfd_link_hash_warning)
1991 h = (struct elf_link_hash_entry *) h->root.u.i.link;
1992
142f8c94
AM
1993 if (h->type == STT_PARISC_MILLI
1994 && (h->elf_link_hash_flags & ELF_LINK_FORCED_LOCAL) == 0)
e0522e89 1995 {
b34976b6 1996 elf32_hppa_hide_symbol (info, h, TRUE);
e0522e89 1997 }
b34976b6 1998 return TRUE;
d5c73c2f
AM
1999}
2000
98ceb8ce
AM
2001/* Find any dynamic relocs that apply to read-only sections. */
2002
b34976b6 2003static bfd_boolean
c39a58e6 2004readonly_dynrelocs (struct elf_link_hash_entry *h, void *inf)
98ceb8ce
AM
2005{
2006 struct elf32_hppa_link_hash_entry *eh;
2007 struct elf32_hppa_dyn_reloc_entry *p;
2008
e92d460e
AM
2009 if (h->root.type == bfd_link_hash_warning)
2010 h = (struct elf_link_hash_entry *) h->root.u.i.link;
2011
98ceb8ce
AM
2012 eh = (struct elf32_hppa_link_hash_entry *) h;
2013 for (p = eh->dyn_relocs; p != NULL; p = p->next)
2014 {
2015 asection *s = p->sec->output_section;
2016
2017 if (s != NULL && (s->flags & SEC_READONLY) != 0)
2018 {
c39a58e6 2019 struct bfd_link_info *info = inf;
98ceb8ce
AM
2020
2021 info->flags |= DF_TEXTREL;
2022
2023 /* Not an error, just cut short the traversal. */
b34976b6 2024 return FALSE;
98ceb8ce
AM
2025 }
2026 }
b34976b6 2027 return TRUE;
98ceb8ce
AM
2028}
2029
30667bf3
AM
2030/* Set the sizes of the dynamic sections. */
2031
b34976b6 2032static bfd_boolean
c39a58e6
AM
2033elf32_hppa_size_dynamic_sections (bfd *output_bfd ATTRIBUTE_UNUSED,
2034 struct bfd_link_info *info)
30667bf3 2035{
83c81bfe 2036 struct elf32_hppa_link_hash_table *htab;
30667bf3 2037 bfd *dynobj;
98ceb8ce 2038 bfd *ibfd;
30667bf3 2039 asection *s;
b34976b6 2040 bfd_boolean relocs;
30667bf3 2041
83c81bfe 2042 htab = hppa_link_hash_table (info);
ebe50bae 2043 dynobj = htab->elf.dynobj;
49e9d0d3
AM
2044 if (dynobj == NULL)
2045 abort ();
30667bf3 2046
ebe50bae 2047 if (htab->elf.dynamic_sections_created)
30667bf3
AM
2048 {
2049 /* Set the contents of the .interp section to the interpreter. */
2050 if (! info->shared)
2051 {
2052 s = bfd_get_section_by_name (dynobj, ".interp");
49e9d0d3
AM
2053 if (s == NULL)
2054 abort ();
30667bf3
AM
2055 s->_raw_size = sizeof ELF_DYNAMIC_INTERPRETER;
2056 s->contents = (unsigned char *) ELF_DYNAMIC_INTERPRETER;
2057 }
74d1c347 2058
d5c73c2f 2059 /* Force millicode symbols local. */
ebe50bae 2060 elf_link_hash_traverse (&htab->elf,
d5c73c2f
AM
2061 clobber_millicode_symbols,
2062 info);
68fb2e56 2063 }
d5c73c2f 2064
98ceb8ce
AM
2065 /* Set up .got and .plt offsets for local syms, and space for local
2066 dynamic relocs. */
2067 for (ibfd = info->input_bfds; ibfd != NULL; ibfd = ibfd->link_next)
68fb2e56
AM
2068 {
2069 bfd_signed_vma *local_got;
2070 bfd_signed_vma *end_local_got;
2071 bfd_signed_vma *local_plt;
2072 bfd_signed_vma *end_local_plt;
2073 bfd_size_type locsymcount;
2074 Elf_Internal_Shdr *symtab_hdr;
2075 asection *srel;
74d1c347 2076
98ceb8ce 2077 if (bfd_get_flavour (ibfd) != bfd_target_elf_flavour)
68fb2e56 2078 continue;
4dc86686 2079
98ceb8ce
AM
2080 for (s = ibfd->sections; s != NULL; s = s->next)
2081 {
ec338859 2082 struct elf32_hppa_dyn_reloc_entry *p;
98ceb8ce 2083
ec338859
AM
2084 for (p = ((struct elf32_hppa_dyn_reloc_entry *)
2085 elf_section_data (s)->local_dynrel);
2086 p != NULL;
2087 p = p->next)
98ceb8ce 2088 {
ec338859
AM
2089 if (!bfd_is_abs_section (p->sec)
2090 && bfd_is_abs_section (p->sec->output_section))
2091 {
2092 /* Input section has been discarded, either because
2093 it is a copy of a linkonce section or due to
2094 linker script /DISCARD/, so we'll be discarding
2095 the relocs too. */
2096 }
248866a8 2097 else if (p->count != 0)
ec338859
AM
2098 {
2099 srel = elf_section_data (p->sec)->sreloc;
2100 srel->_raw_size += p->count * sizeof (Elf32_External_Rela);
248866a8
AM
2101 if ((p->sec->output_section->flags & SEC_READONLY) != 0)
2102 info->flags |= DF_TEXTREL;
ec338859 2103 }
98ceb8ce
AM
2104 }
2105 }
2106
2107 local_got = elf_local_got_refcounts (ibfd);
68fb2e56
AM
2108 if (!local_got)
2109 continue;
74d1c347 2110
98ceb8ce 2111 symtab_hdr = &elf_tdata (ibfd)->symtab_hdr;
68fb2e56
AM
2112 locsymcount = symtab_hdr->sh_info;
2113 end_local_got = local_got + locsymcount;
83c81bfe
AM
2114 s = htab->sgot;
2115 srel = htab->srelgot;
68fb2e56
AM
2116 for (; local_got < end_local_got; ++local_got)
2117 {
2118 if (*local_got > 0)
4dc86686 2119 {
68fb2e56
AM
2120 *local_got = s->_raw_size;
2121 s->_raw_size += GOT_ENTRY_SIZE;
2122 if (info->shared)
2123 srel->_raw_size += sizeof (Elf32_External_Rela);
4dc86686 2124 }
68fb2e56
AM
2125 else
2126 *local_got = (bfd_vma) -1;
2127 }
74d1c347 2128
68fb2e56
AM
2129 local_plt = end_local_got;
2130 end_local_plt = local_plt + locsymcount;
ebe50bae 2131 if (! htab->elf.dynamic_sections_created)
68fb2e56
AM
2132 {
2133 /* Won't be used, but be safe. */
2134 for (; local_plt < end_local_plt; ++local_plt)
2135 *local_plt = (bfd_vma) -1;
2136 }
2137 else
2138 {
83c81bfe
AM
2139 s = htab->splt;
2140 srel = htab->srelplt;
74d1c347
AM
2141 for (; local_plt < end_local_plt; ++local_plt)
2142 {
2143 if (*local_plt > 0)
2144 {
74d1c347
AM
2145 *local_plt = s->_raw_size;
2146 s->_raw_size += PLT_ENTRY_SIZE;
2147 if (info->shared)
4dc86686 2148 srel->_raw_size += sizeof (Elf32_External_Rela);
74d1c347
AM
2149 }
2150 else
2151 *local_plt = (bfd_vma) -1;
2152 }
2153 }
30667bf3 2154 }
30667bf3 2155
e5ee5df1
AM
2156 /* Do all the .plt entries without relocs first. The dynamic linker
2157 uses the last .plt reloc to find the end of the .plt (and hence
2158 the start of the .got) for lazy linking. */
c39a58e6 2159 elf_link_hash_traverse (&htab->elf, allocate_plt_static, info);
a8d02d66 2160
98ceb8ce
AM
2161 /* Allocate global sym .plt and .got entries, and space for global
2162 sym dynamic relocs. */
c39a58e6 2163 elf_link_hash_traverse (&htab->elf, allocate_dynrelocs, info);
30667bf3
AM
2164
2165 /* The check_relocs and adjust_dynamic_symbol entry points have
2166 determined the sizes of the various dynamic sections. Allocate
2167 memory for them. */
b34976b6 2168 relocs = FALSE;
30667bf3
AM
2169 for (s = dynobj->sections; s != NULL; s = s->next)
2170 {
30667bf3
AM
2171 if ((s->flags & SEC_LINKER_CREATED) == 0)
2172 continue;
2173
83c81bfe 2174 if (s == htab->splt)
68fb2e56 2175 {
83c81bfe 2176 if (htab->need_plt_stub)
68fb2e56
AM
2177 {
2178 /* Make space for the plt stub at the end of the .plt
2179 section. We want this stub right at the end, up
2180 against the .got section. */
83c81bfe 2181 int gotalign = bfd_section_alignment (dynobj, htab->sgot);
68fb2e56
AM
2182 int pltalign = bfd_section_alignment (dynobj, s);
2183 bfd_size_type mask;
30667bf3 2184
68fb2e56
AM
2185 if (gotalign > pltalign)
2186 bfd_set_section_alignment (dynobj, s, gotalign);
2187 mask = ((bfd_size_type) 1 << gotalign) - 1;
2188 s->_raw_size = (s->_raw_size + sizeof (plt_stub) + mask) & ~mask;
2189 }
2190 }
83c81bfe 2191 else if (s == htab->sgot)
68fb2e56
AM
2192 ;
2193 else if (strncmp (bfd_get_section_name (dynobj, s), ".rela", 5) == 0)
30667bf3
AM
2194 {
2195 if (s->_raw_size != 0)
2196 {
4e12ff7f
AM
2197 /* Remember whether there are any reloc sections other
2198 than .rela.plt. */
2199 if (s != htab->srelplt)
b34976b6 2200 relocs = TRUE;
47d89dba 2201
30667bf3
AM
2202 /* We use the reloc_count field as a counter if we need
2203 to copy relocs into the output file. */
2204 s->reloc_count = 0;
2205 }
2206 }
30667bf3
AM
2207 else
2208 {
2209 /* It's not one of our sections, so don't allocate space. */
2210 continue;
2211 }
2212
2213 if (s->_raw_size == 0)
2214 {
2215 /* If we don't need this section, strip it from the
2216 output file. This is mostly to handle .rela.bss and
2217 .rela.plt. We must create both sections in
2218 create_dynamic_sections, because they must be created
2219 before the linker maps input sections to output
2220 sections. The linker does that before
2221 adjust_dynamic_symbol is called, and it is that
2222 function which decides whether anything needs to go
2223 into these sections. */
2224 _bfd_strip_section_from_output (info, s);
2225 continue;
2226 }
2227
2228 /* Allocate memory for the section contents. Zero it, because
2229 we may not fill in all the reloc sections. */
c39a58e6 2230 s->contents = bfd_zalloc (dynobj, s->_raw_size);
30667bf3 2231 if (s->contents == NULL && s->_raw_size != 0)
b34976b6 2232 return FALSE;
30667bf3
AM
2233 }
2234
ebe50bae 2235 if (htab->elf.dynamic_sections_created)
30667bf3
AM
2236 {
2237 /* Like IA-64 and HPPA64, always create a DT_PLTGOT. It
2238 actually has nothing to do with the PLT, it is how we
2239 communicate the LTP value of a load module to the dynamic
2240 linker. */
dc810e39
AM
2241#define add_dynamic_entry(TAG, VAL) \
2242 bfd_elf32_add_dynamic_entry (info, (bfd_vma) (TAG), (bfd_vma) (VAL))
2243
2244 if (!add_dynamic_entry (DT_PLTGOT, 0))
b34976b6 2245 return FALSE;
30667bf3
AM
2246
2247 /* Add some entries to the .dynamic section. We fill in the
2248 values later, in elf32_hppa_finish_dynamic_sections, but we
2249 must add the entries now so that we get the correct size for
2250 the .dynamic section. The DT_DEBUG entry is filled in by the
2251 dynamic linker and used by the debugger. */
dc810e39 2252 if (!info->shared)
30667bf3 2253 {
dc810e39 2254 if (!add_dynamic_entry (DT_DEBUG, 0))
b34976b6 2255 return FALSE;
30667bf3
AM
2256 }
2257
83c81bfe 2258 if (htab->srelplt->_raw_size != 0)
30667bf3 2259 {
dc810e39
AM
2260 if (!add_dynamic_entry (DT_PLTRELSZ, 0)
2261 || !add_dynamic_entry (DT_PLTREL, DT_RELA)
2262 || !add_dynamic_entry (DT_JMPREL, 0))
b34976b6 2263 return FALSE;
30667bf3
AM
2264 }
2265
2266 if (relocs)
2267 {
dc810e39
AM
2268 if (!add_dynamic_entry (DT_RELA, 0)
2269 || !add_dynamic_entry (DT_RELASZ, 0)
2270 || !add_dynamic_entry (DT_RELAENT, sizeof (Elf32_External_Rela)))
b34976b6 2271 return FALSE;
30667bf3 2272
98ceb8ce
AM
2273 /* If any dynamic relocs apply to a read-only section,
2274 then we need a DT_TEXTREL entry. */
248866a8 2275 if ((info->flags & DF_TEXTREL) == 0)
c39a58e6 2276 elf_link_hash_traverse (&htab->elf, readonly_dynrelocs, info);
98ceb8ce
AM
2277
2278 if ((info->flags & DF_TEXTREL) != 0)
2279 {
2280 if (!add_dynamic_entry (DT_TEXTREL, 0))
b34976b6 2281 return FALSE;
98ceb8ce 2282 }
30667bf3
AM
2283 }
2284 }
dc810e39 2285#undef add_dynamic_entry
30667bf3 2286
b34976b6 2287 return TRUE;
30667bf3
AM
2288}
2289
30667bf3
AM
2290/* External entry points for sizing and building linker stubs. */
2291
b4655ea9
AM
2292/* Set up various things so that we can make a list of input sections
2293 for each output section included in the link. Returns -1 on error,
cedb70c5 2294 0 when no stubs will be needed, and 1 on success. */
30667bf3 2295
b4655ea9 2296int
c39a58e6 2297elf32_hppa_setup_section_lists (bfd *output_bfd, struct bfd_link_info *info)
30667bf3
AM
2298{
2299 bfd *input_bfd;
b4655ea9
AM
2300 unsigned int bfd_count;
2301 int top_id, top_index;
30667bf3 2302 asection *section;
25f72752 2303 asection **input_list, **list;
dc810e39 2304 bfd_size_type amt;
b4655ea9 2305 struct elf32_hppa_link_hash_table *htab = hppa_link_hash_table (info);
30667bf3 2306
b4655ea9
AM
2307 if (htab->elf.root.creator->flavour != bfd_target_elf_flavour)
2308 return 0;
30667bf3 2309
1badb539
AM
2310 /* Count the number of input BFDs and find the top input section id. */
2311 for (input_bfd = info->input_bfds, bfd_count = 0, top_id = 0;
30667bf3
AM
2312 input_bfd != NULL;
2313 input_bfd = input_bfd->link_next)
2314 {
2315 bfd_count += 1;
25f72752
AM
2316 for (section = input_bfd->sections;
2317 section != NULL;
2318 section = section->next)
2319 {
2320 if (top_id < section->id)
2321 top_id = section->id;
2322 }
30667bf3 2323 }
b4655ea9 2324 htab->bfd_count = bfd_count;
30667bf3 2325
dc810e39 2326 amt = sizeof (struct map_stub) * (top_id + 1);
c39a58e6 2327 htab->stub_group = bfd_zmalloc (amt);
83c81bfe 2328 if (htab->stub_group == NULL)
b4655ea9 2329 return -1;
1badb539 2330
b4655ea9 2331 /* We can't use output_bfd->section_count here to find the top output
1badb539
AM
2332 section index as some sections may have been removed, and
2333 _bfd_strip_section_from_output doesn't renumber the indices. */
2334 for (section = output_bfd->sections, top_index = 0;
2335 section != NULL;
2336 section = section->next)
2337 {
2338 if (top_index < section->index)
2339 top_index = section->index;
2340 }
2341
b4655ea9 2342 htab->top_index = top_index;
dc810e39 2343 amt = sizeof (asection *) * (top_index + 1);
c39a58e6 2344 input_list = bfd_malloc (amt);
b4655ea9 2345 htab->input_list = input_list;
25f72752 2346 if (input_list == NULL)
b4655ea9 2347 return -1;
25f72752 2348
1badb539
AM
2349 /* For sections we aren't interested in, mark their entries with a
2350 value we can check later. */
2351 list = input_list + top_index;
2352 do
2353 *list = bfd_abs_section_ptr;
2354 while (list-- != input_list);
2355
2356 for (section = output_bfd->sections;
2357 section != NULL;
2358 section = section->next)
2359 {
47d89dba 2360 if ((section->flags & SEC_CODE) != 0)
1badb539
AM
2361 input_list[section->index] = NULL;
2362 }
2363
b4655ea9
AM
2364 return 1;
2365}
2366
2367/* The linker repeatedly calls this function for each input section,
2368 in the order that input sections are linked into output sections.
2369 Build lists of input sections to determine groupings between which
2370 we may insert linker stubs. */
2371
2372void
c39a58e6 2373elf32_hppa_next_input_section (struct bfd_link_info *info, asection *isec)
b4655ea9
AM
2374{
2375 struct elf32_hppa_link_hash_table *htab = hppa_link_hash_table (info);
2376
2377 if (isec->output_section->index <= htab->top_index)
25f72752 2378 {
b4655ea9
AM
2379 asection **list = htab->input_list + isec->output_section->index;
2380 if (*list != bfd_abs_section_ptr)
25f72752 2381 {
b4655ea9 2382 /* Steal the link_sec pointer for our list. */
83c81bfe 2383#define PREV_SEC(sec) (htab->stub_group[(sec)->id].link_sec)
b4655ea9
AM
2384 /* This happens to make the list in reverse order,
2385 which is what we want. */
2386 PREV_SEC (isec) = *list;
2387 *list = isec;
25f72752
AM
2388 }
2389 }
b4655ea9 2390}
25f72752 2391
b4655ea9
AM
2392/* See whether we can group stub sections together. Grouping stub
2393 sections may result in fewer stubs. More importantly, we need to
2394 put all .init* and .fini* stubs at the beginning of the .init or
2395 .fini output sections respectively, because glibc splits the
2396 _init and _fini functions into multiple parts. Putting a stub in
2397 the middle of a function is not a good idea. */
2398
2399static void
c39a58e6
AM
2400group_sections (struct elf32_hppa_link_hash_table *htab,
2401 bfd_size_type stub_group_size,
2402 bfd_boolean stubs_always_before_branch)
b4655ea9
AM
2403{
2404 asection **list = htab->input_list + htab->top_index;
1badb539 2405 do
25f72752
AM
2406 {
2407 asection *tail = *list;
1badb539
AM
2408 if (tail == bfd_abs_section_ptr)
2409 continue;
25f72752
AM
2410 while (tail != NULL)
2411 {
2412 asection *curr;
2413 asection *prev;
2414 bfd_size_type total;
00b28bb0 2415 bfd_boolean big_sec;
25f72752
AM
2416
2417 curr = tail;
2418 if (tail->_cooked_size)
2419 total = tail->_cooked_size;
2420 else
2421 total = tail->_raw_size;
00b28bb0
AM
2422 big_sec = total >= stub_group_size;
2423
25f72752
AM
2424 while ((prev = PREV_SEC (curr)) != NULL
2425 && ((total += curr->output_offset - prev->output_offset)
47d89dba 2426 < stub_group_size))
25f72752
AM
2427 curr = prev;
2428
2429 /* OK, the size from the start of CURR to the end is less
a248e267 2430 than 240000 bytes and thus can be handled by one stub
25f72752 2431 section. (or the tail section is itself larger than
a248e267 2432 240000 bytes, in which case we may be toast.)
25f72752
AM
2433 We should really be keeping track of the total size of
2434 stubs added here, as stubs contribute to the final output
2435 section size. That's a little tricky, and this way will
a248e267
AM
2436 only break if stubs added total more than 22144 bytes, or
2437 2768 long branch stubs. It seems unlikely for more than
2438 2768 different functions to be called, especially from
2439 code only 240000 bytes long. This limit used to be
2440 250000, but c++ code tends to generate lots of little
2441 functions, and sometimes violated the assumption. */
25f72752
AM
2442 do
2443 {
2444 prev = PREV_SEC (tail);
2445 /* Set up this stub group. */
83c81bfe 2446 htab->stub_group[tail->id].link_sec = curr;
25f72752
AM
2447 }
2448 while (tail != curr && (tail = prev) != NULL);
2449
a248e267 2450 /* But wait, there's more! Input sections up to 240000
00b28bb0
AM
2451 bytes before the stub section can be handled by it too.
2452 Don't do this if we have a really large section after the
2453 stubs, as adding more stubs increases the chance that
2454 branches may not reach into the stub section. */
2455 if (!stubs_always_before_branch && !big_sec)
25f72752 2456 {
47d89dba
AM
2457 total = 0;
2458 while (prev != NULL
2459 && ((total += tail->output_offset - prev->output_offset)
2460 < stub_group_size))
2461 {
2462 tail = prev;
2463 prev = PREV_SEC (tail);
83c81bfe 2464 htab->stub_group[tail->id].link_sec = curr;
47d89dba 2465 }
25f72752
AM
2466 }
2467 tail = prev;
2468 }
2469 }
b4655ea9
AM
2470 while (list-- != htab->input_list);
2471 free (htab->input_list);
1badb539 2472#undef PREV_SEC
b4655ea9
AM
2473}
2474
2475/* Read in all local syms for all input bfds, and create hash entries
2476 for export stubs if we are building a multi-subspace shared lib.
2477 Returns -1 on error, 1 if export stubs created, 0 otherwise. */
2478
2479static int
c39a58e6 2480get_local_syms (bfd *output_bfd, bfd *input_bfd, struct bfd_link_info *info)
b4655ea9
AM
2481{
2482 unsigned int bfd_indx;
2483 Elf_Internal_Sym *local_syms, **all_local_syms;
2484 int stub_changed = 0;
2485 struct elf32_hppa_link_hash_table *htab = hppa_link_hash_table (info);
30667bf3
AM
2486
2487 /* We want to read in symbol extension records only once. To do this
2488 we need to read in the local symbols in parallel and save them for
2489 later use; so hold pointers to the local symbols in an array. */
b4655ea9 2490 bfd_size_type amt = sizeof (Elf_Internal_Sym *) * htab->bfd_count;
c39a58e6 2491 all_local_syms = bfd_zmalloc (amt);
b4655ea9 2492 htab->all_local_syms = all_local_syms;
30667bf3 2493 if (all_local_syms == NULL)
b4655ea9 2494 return -1;
30667bf3
AM
2495
2496 /* Walk over all the input BFDs, swapping in local symbols.
2497 If we are creating a shared library, create hash entries for the
2498 export stubs. */
b4655ea9 2499 for (bfd_indx = 0;
30667bf3 2500 input_bfd != NULL;
25f72752 2501 input_bfd = input_bfd->link_next, bfd_indx++)
30667bf3
AM
2502 {
2503 Elf_Internal_Shdr *symtab_hdr;
edd21aca 2504
252b5132
RH
2505 /* We'll need the symbol table in a second. */
2506 symtab_hdr = &elf_tdata (input_bfd)->symtab_hdr;
2507 if (symtab_hdr->sh_info == 0)
2508 continue;
2509
6cdc0ccc
AM
2510 /* We need an array of the local symbols attached to the input bfd. */
2511 local_syms = (Elf_Internal_Sym *) symtab_hdr->contents;
edd21aca 2512 if (local_syms == NULL)
edd21aca 2513 {
6cdc0ccc
AM
2514 local_syms = bfd_elf_get_elf_syms (input_bfd, symtab_hdr,
2515 symtab_hdr->sh_info, 0,
2516 NULL, NULL, NULL);
2517 /* Cache them for elf_link_input_bfd. */
2518 symtab_hdr->contents = (unsigned char *) local_syms;
edd21aca 2519 }
6cdc0ccc
AM
2520 if (local_syms == NULL)
2521 return -1;
edd21aca 2522
6cdc0ccc 2523 all_local_syms[bfd_indx] = local_syms;
edd21aca 2524
83c81bfe 2525 if (info->shared && htab->multi_subspace)
30667bf3 2526 {
25f72752
AM
2527 struct elf_link_hash_entry **sym_hashes;
2528 struct elf_link_hash_entry **end_hashes;
30667bf3
AM
2529 unsigned int symcount;
2530
2531 symcount = (symtab_hdr->sh_size / sizeof (Elf32_External_Sym)
2532 - symtab_hdr->sh_info);
25f72752
AM
2533 sym_hashes = elf_sym_hashes (input_bfd);
2534 end_hashes = sym_hashes + symcount;
30667bf3
AM
2535
2536 /* Look through the global syms for functions; We need to
2537 build export stubs for all globally visible functions. */
25f72752 2538 for (; sym_hashes < end_hashes; sym_hashes++)
30667bf3
AM
2539 {
2540 struct elf32_hppa_link_hash_entry *hash;
2541
25f72752 2542 hash = (struct elf32_hppa_link_hash_entry *) *sym_hashes;
30667bf3
AM
2543
2544 while (hash->elf.root.type == bfd_link_hash_indirect
2545 || hash->elf.root.type == bfd_link_hash_warning)
2546 hash = ((struct elf32_hppa_link_hash_entry *)
2547 hash->elf.root.u.i.link);
2548
2549 /* At this point in the link, undefined syms have been
2550 resolved, so we need to check that the symbol was
2551 defined in this BFD. */
2552 if ((hash->elf.root.type == bfd_link_hash_defined
2553 || hash->elf.root.type == bfd_link_hash_defweak)
2554 && hash->elf.type == STT_FUNC
2555 && hash->elf.root.u.def.section->output_section != NULL
25f72752
AM
2556 && (hash->elf.root.u.def.section->output_section->owner
2557 == output_bfd)
30667bf3
AM
2558 && hash->elf.root.u.def.section->owner == input_bfd
2559 && (hash->elf.elf_link_hash_flags & ELF_LINK_HASH_DEF_REGULAR)
2560 && !(hash->elf.elf_link_hash_flags & ELF_LINK_FORCED_LOCAL)
2561 && ELF_ST_VISIBILITY (hash->elf.other) == STV_DEFAULT)
2562 {
2563 asection *sec;
2564 const char *stub_name;
2565 struct elf32_hppa_stub_hash_entry *stub_entry;
2566
2567 sec = hash->elf.root.u.def.section;
2568 stub_name = hash->elf.root.root.string;
83c81bfe 2569 stub_entry = hppa_stub_hash_lookup (&htab->stub_hash_table,
30667bf3 2570 stub_name,
b34976b6 2571 FALSE, FALSE);
30667bf3
AM
2572 if (stub_entry == NULL)
2573 {
83c81bfe 2574 stub_entry = hppa_add_stub (stub_name, sec, htab);
30667bf3 2575 if (!stub_entry)
b4655ea9 2576 return -1;
30667bf3
AM
2577
2578 stub_entry->target_value = hash->elf.root.u.def.value;
2579 stub_entry->target_section = hash->elf.root.u.def.section;
2580 stub_entry->stub_type = hppa_stub_export;
2581 stub_entry->h = hash;
2582 stub_changed = 1;
2583 }
2584 else
2585 {
2586 (*_bfd_error_handler) (_("%s: duplicate export stub %s"),
8f615d07
AM
2587 bfd_archive_filename (input_bfd),
2588 stub_name);
30667bf3
AM
2589 }
2590 }
2591 }
30667bf3
AM
2592 }
2593 }
edd21aca 2594
b4655ea9
AM
2595 return stub_changed;
2596}
2597
2598/* Determine and set the size of the stub section for a final link.
2599
2600 The basic idea here is to examine all the relocations looking for
2601 PC-relative calls to a target that is unreachable with a "bl"
2602 instruction. */
2603
b34976b6 2604bfd_boolean
c39a58e6
AM
2605elf32_hppa_size_stubs
2606 (bfd *output_bfd, bfd *stub_bfd, struct bfd_link_info *info,
2607 bfd_boolean multi_subspace, bfd_signed_vma group_size,
2608 asection * (*add_stub_section) (const char *, asection *),
2609 void (*layout_sections_again) (void))
b4655ea9
AM
2610{
2611 bfd_size_type stub_group_size;
b34976b6
AM
2612 bfd_boolean stubs_always_before_branch;
2613 bfd_boolean stub_changed;
b4655ea9
AM
2614 struct elf32_hppa_link_hash_table *htab = hppa_link_hash_table (info);
2615
2616 /* Stash our params away. */
2617 htab->stub_bfd = stub_bfd;
2618 htab->multi_subspace = multi_subspace;
2619 htab->add_stub_section = add_stub_section;
2620 htab->layout_sections_again = layout_sections_again;
2621 stubs_always_before_branch = group_size < 0;
2622 if (group_size < 0)
2623 stub_group_size = -group_size;
2624 else
2625 stub_group_size = group_size;
2626 if (stub_group_size == 1)
2627 {
2628 /* Default values. */
acc990f2
AM
2629 if (stubs_always_before_branch)
2630 {
2631 stub_group_size = 7680000;
2632 if (htab->has_17bit_branch || htab->multi_subspace)
2633 stub_group_size = 240000;
2634 if (htab->has_12bit_branch)
2635 stub_group_size = 7500;
2636 }
2637 else
2638 {
2639 stub_group_size = 6971392;
2640 if (htab->has_17bit_branch || htab->multi_subspace)
2641 stub_group_size = 217856;
2642 if (htab->has_12bit_branch)
2643 stub_group_size = 6808;
2644 }
b4655ea9
AM
2645 }
2646
2647 group_sections (htab, stub_group_size, stubs_always_before_branch);
2648
2649 switch (get_local_syms (output_bfd, info->input_bfds, info))
2650 {
2651 default:
2652 if (htab->all_local_syms)
2653 goto error_ret_free_local;
b34976b6 2654 return FALSE;
b4655ea9
AM
2655
2656 case 0:
b34976b6 2657 stub_changed = FALSE;
b4655ea9
AM
2658 break;
2659
2660 case 1:
b34976b6 2661 stub_changed = TRUE;
b4655ea9
AM
2662 break;
2663 }
2664
edd21aca
AM
2665 while (1)
2666 {
b4655ea9
AM
2667 bfd *input_bfd;
2668 unsigned int bfd_indx;
30667bf3
AM
2669 asection *stub_sec;
2670
25f72752 2671 for (input_bfd = info->input_bfds, bfd_indx = 0;
30667bf3 2672 input_bfd != NULL;
25f72752 2673 input_bfd = input_bfd->link_next, bfd_indx++)
30667bf3
AM
2674 {
2675 Elf_Internal_Shdr *symtab_hdr;
b4655ea9
AM
2676 asection *section;
2677 Elf_Internal_Sym *local_syms;
30667bf3
AM
2678
2679 /* We'll need the symbol table in a second. */
2680 symtab_hdr = &elf_tdata (input_bfd)->symtab_hdr;
2681 if (symtab_hdr->sh_info == 0)
2682 continue;
2683
b4655ea9 2684 local_syms = htab->all_local_syms[bfd_indx];
30667bf3
AM
2685
2686 /* Walk over each section attached to the input bfd. */
2687 for (section = input_bfd->sections;
2688 section != NULL;
25f72752 2689 section = section->next)
30667bf3 2690 {
30667bf3
AM
2691 Elf_Internal_Rela *internal_relocs, *irelaend, *irela;
2692
2693 /* If there aren't any relocs, then there's nothing more
2694 to do. */
2695 if ((section->flags & SEC_RELOC) == 0
2696 || section->reloc_count == 0)
2697 continue;
2698
25f72752
AM
2699 /* If this section is a link-once section that will be
2700 discarded, then don't create any stubs. */
2701 if (section->output_section == NULL
2702 || section->output_section->owner != output_bfd)
2703 continue;
2704
1e2f5b6e
AM
2705 /* Get the relocs. */
2706 internal_relocs
c39a58e6 2707 = _bfd_elf_link_read_relocs (input_bfd, section, NULL, NULL,
45d6a902 2708 info->keep_memory);
30667bf3 2709 if (internal_relocs == NULL)
1e2f5b6e 2710 goto error_ret_free_local;
30667bf3
AM
2711
2712 /* Now examine each relocation. */
2713 irela = internal_relocs;
2714 irelaend = irela + section->reloc_count;
2715 for (; irela < irelaend; irela++)
2716 {
2717 unsigned int r_type, r_indx;
2718 enum elf32_hppa_stub_type stub_type;
2719 struct elf32_hppa_stub_hash_entry *stub_entry;
2720 asection *sym_sec;
2721 bfd_vma sym_value;
2722 bfd_vma destination;
2723 struct elf32_hppa_link_hash_entry *hash;
2724 char *stub_name;
25f72752 2725 const asection *id_sec;
30667bf3
AM
2726
2727 r_type = ELF32_R_TYPE (irela->r_info);
2728 r_indx = ELF32_R_SYM (irela->r_info);
2729
2730 if (r_type >= (unsigned int) R_PARISC_UNIMPLEMENTED)
2731 {
2732 bfd_set_error (bfd_error_bad_value);
1e2f5b6e
AM
2733 error_ret_free_internal:
2734 if (elf_section_data (section)->relocs == NULL)
2735 free (internal_relocs);
2736 goto error_ret_free_local;
30667bf3
AM
2737 }
2738
2739 /* Only look for stubs on call instructions. */
2740 if (r_type != (unsigned int) R_PARISC_PCREL12F
2741 && r_type != (unsigned int) R_PARISC_PCREL17F
2742 && r_type != (unsigned int) R_PARISC_PCREL22F)
2743 continue;
2744
2745 /* Now determine the call target, its name, value,
2746 section. */
2747 sym_sec = NULL;
2748 sym_value = 0;
2749 destination = 0;
2750 hash = NULL;
2751 if (r_indx < symtab_hdr->sh_info)
2752 {
2753 /* It's a local symbol. */
2754 Elf_Internal_Sym *sym;
2755 Elf_Internal_Shdr *hdr;
2756
2757 sym = local_syms + r_indx;
2758 hdr = elf_elfsections (input_bfd)[sym->st_shndx];
2759 sym_sec = hdr->bfd_section;
2760 if (ELF_ST_TYPE (sym->st_info) != STT_SECTION)
2761 sym_value = sym->st_value;
2762 destination = (sym_value + irela->r_addend
2763 + sym_sec->output_offset
2764 + sym_sec->output_section->vma);
2765 }
2766 else
2767 {
2768 /* It's an external symbol. */
2769 int e_indx;
2770
2771 e_indx = r_indx - symtab_hdr->sh_info;
2772 hash = ((struct elf32_hppa_link_hash_entry *)
2773 elf_sym_hashes (input_bfd)[e_indx]);
2774
2775 while (hash->elf.root.type == bfd_link_hash_indirect
2776 || hash->elf.root.type == bfd_link_hash_warning)
2777 hash = ((struct elf32_hppa_link_hash_entry *)
2778 hash->elf.root.u.i.link);
2779
2780 if (hash->elf.root.type == bfd_link_hash_defined
2781 || hash->elf.root.type == bfd_link_hash_defweak)
2782 {
2783 sym_sec = hash->elf.root.u.def.section;
2784 sym_value = hash->elf.root.u.def.value;
2785 if (sym_sec->output_section != NULL)
2786 destination = (sym_value + irela->r_addend
2787 + sym_sec->output_offset
2788 + sym_sec->output_section->vma);
2789 }
2790 else if (hash->elf.root.type == bfd_link_hash_undefweak)
c432ba1a
AM
2791 {
2792 if (! info->shared)
2793 continue;
2794 }
30667bf3 2795 else if (hash->elf.root.type == bfd_link_hash_undefined)
c432ba1a
AM
2796 {
2797 if (! (info->shared
560e09e9 2798 && info->unresolved_syms_in_objects == RM_IGNORE
c432ba1a
AM
2799 && (ELF_ST_VISIBILITY (hash->elf.other)
2800 == STV_DEFAULT)
2801 && hash->elf.type != STT_PARISC_MILLI))
2802 continue;
2803 }
30667bf3
AM
2804 else
2805 {
2806 bfd_set_error (bfd_error_bad_value);
2807 goto error_ret_free_internal;
2808 }
2809 }
2810
2811 /* Determine what (if any) linker stub is needed. */
2812 stub_type = hppa_type_of_stub (section, irela, hash,
a252afa4 2813 destination, info);
30667bf3
AM
2814 if (stub_type == hppa_stub_none)
2815 continue;
2816
25f72752 2817 /* Support for grouping stub sections. */
83c81bfe 2818 id_sec = htab->stub_group[section->id].link_sec;
25f72752 2819
30667bf3 2820 /* Get the name of this stub. */
25f72752 2821 stub_name = hppa_stub_name (id_sec, sym_sec, hash, irela);
30667bf3
AM
2822 if (!stub_name)
2823 goto error_ret_free_internal;
2824
83c81bfe 2825 stub_entry = hppa_stub_hash_lookup (&htab->stub_hash_table,
30667bf3 2826 stub_name,
b34976b6 2827 FALSE, FALSE);
30667bf3
AM
2828 if (stub_entry != NULL)
2829 {
2830 /* The proper stub has already been created. */
2831 free (stub_name);
2832 continue;
2833 }
2834
83c81bfe 2835 stub_entry = hppa_add_stub (stub_name, section, htab);
30667bf3
AM
2836 if (stub_entry == NULL)
2837 {
2838 free (stub_name);
1e2f5b6e 2839 goto error_ret_free_internal;
30667bf3
AM
2840 }
2841
2842 stub_entry->target_value = sym_value;
2843 stub_entry->target_section = sym_sec;
2844 stub_entry->stub_type = stub_type;
2845 if (info->shared)
2846 {
2847 if (stub_type == hppa_stub_import)
2848 stub_entry->stub_type = hppa_stub_import_shared;
98ceb8ce 2849 else if (stub_type == hppa_stub_long_branch)
30667bf3
AM
2850 stub_entry->stub_type = hppa_stub_long_branch_shared;
2851 }
2852 stub_entry->h = hash;
b34976b6 2853 stub_changed = TRUE;
30667bf3
AM
2854 }
2855
2856 /* We're done with the internal relocs, free them. */
1e2f5b6e
AM
2857 if (elf_section_data (section)->relocs == NULL)
2858 free (internal_relocs);
30667bf3
AM
2859 }
2860 }
2861
2862 if (!stub_changed)
2863 break;
2864
2865 /* OK, we've added some stubs. Find out the new size of the
2866 stub sections. */
83c81bfe 2867 for (stub_sec = htab->stub_bfd->sections;
30667bf3
AM
2868 stub_sec != NULL;
2869 stub_sec = stub_sec->next)
2870 {
74d1c347
AM
2871 stub_sec->_raw_size = 0;
2872 stub_sec->_cooked_size = 0;
2873 }
74d1c347 2874
83c81bfe 2875 bfd_hash_traverse (&htab->stub_hash_table, hppa_size_one_stub, htab);
74d1c347 2876
30667bf3 2877 /* Ask the linker to do its stuff. */
83c81bfe 2878 (*htab->layout_sections_again) ();
b34976b6 2879 stub_changed = FALSE;
30667bf3
AM
2880 }
2881
6cdc0ccc 2882 free (htab->all_local_syms);
b34976b6 2883 return TRUE;
30667bf3
AM
2884
2885 error_ret_free_local:
b4655ea9 2886 free (htab->all_local_syms);
b34976b6 2887 return FALSE;
30667bf3
AM
2888}
2889
30667bf3
AM
2890/* For a final link, this function is called after we have sized the
2891 stubs to provide a value for __gp. */
2892
b34976b6 2893bfd_boolean
c39a58e6 2894elf32_hppa_set_gp (bfd *abfd, struct bfd_link_info *info)
30667bf3 2895{
b4655ea9
AM
2896 struct bfd_link_hash_entry *h;
2897 asection *sec = NULL;
2898 bfd_vma gp_val = 0;
83c81bfe 2899 struct elf32_hppa_link_hash_table *htab;
30667bf3 2900
83c81bfe 2901 htab = hppa_link_hash_table (info);
b34976b6 2902 h = bfd_link_hash_lookup (&htab->elf.root, "$global$", FALSE, FALSE, FALSE);
30667bf3 2903
df8634e3 2904 if (h != NULL
b4655ea9
AM
2905 && (h->type == bfd_link_hash_defined
2906 || h->type == bfd_link_hash_defweak))
30667bf3 2907 {
b4655ea9
AM
2908 gp_val = h->u.def.value;
2909 sec = h->u.def.section;
30667bf3
AM
2910 }
2911 else
2912 {
b4655ea9
AM
2913 asection *splt;
2914 asection *sgot;
2915
2916 if (htab->elf.root.creator->flavour == bfd_target_elf_flavour)
2917 {
2918 splt = htab->splt;
2919 sgot = htab->sgot;
2920 }
2921 else
2922 {
2923 /* If we're not elf, look up the output sections in the
2924 hope we may actually find them. */
2925 splt = bfd_get_section_by_name (abfd, ".plt");
2926 sgot = bfd_get_section_by_name (abfd, ".got");
2927 }
2928
74d1c347
AM
2929 /* Choose to point our LTP at, in this order, one of .plt, .got,
2930 or .data, if these sections exist. In the case of choosing
2931 .plt try to make the LTP ideal for addressing anywhere in the
2932 .plt or .got with a 14 bit signed offset. Typically, the end
2933 of the .plt is the start of the .got, so choose .plt + 0x2000
2934 if either the .plt or .got is larger than 0x2000. If both
2935 the .plt and .got are smaller than 0x2000, choose the end of
2936 the .plt section. */
b4655ea9 2937 sec = splt;
74d1c347 2938 if (sec != NULL)
30667bf3 2939 {
74d1c347 2940 gp_val = sec->_raw_size;
b4655ea9 2941 if (gp_val > 0x2000 || (sgot && sgot->_raw_size > 0x2000))
74d1c347
AM
2942 {
2943 gp_val = 0x2000;
2944 }
2945 }
2946 else
2947 {
b4655ea9 2948 sec = sgot;
74d1c347
AM
2949 if (sec != NULL)
2950 {
2951 /* We know we don't have a .plt. If .got is large,
2952 offset our LTP. */
2953 if (sec->_raw_size > 0x2000)
2954 gp_val = 0x2000;
2955 }
2956 else
2957 {
2958 /* No .plt or .got. Who cares what the LTP is? */
2959 sec = bfd_get_section_by_name (abfd, ".data");
2960 }
30667bf3 2961 }
df8634e3
AM
2962
2963 if (h != NULL)
2964 {
b4655ea9
AM
2965 h->type = bfd_link_hash_defined;
2966 h->u.def.value = gp_val;
df8634e3 2967 if (sec != NULL)
b4655ea9 2968 h->u.def.section = sec;
df8634e3 2969 else
b4655ea9 2970 h->u.def.section = bfd_abs_section_ptr;
df8634e3 2971 }
30667bf3
AM
2972 }
2973
b32b5d6e 2974 if (sec != NULL && sec->output_section != NULL)
74d1c347
AM
2975 gp_val += sec->output_section->vma + sec->output_offset;
2976
2977 elf_gp (abfd) = gp_val;
b34976b6 2978 return TRUE;
30667bf3
AM
2979}
2980
30667bf3
AM
2981/* Build all the stubs associated with the current output file. The
2982 stubs are kept in a hash table attached to the main linker hash
2983 table. We also set up the .plt entries for statically linked PIC
2984 functions here. This function is called via hppaelf_finish in the
2985 linker. */
2986
b34976b6 2987bfd_boolean
c39a58e6 2988elf32_hppa_build_stubs (struct bfd_link_info *info)
30667bf3
AM
2989{
2990 asection *stub_sec;
2991 struct bfd_hash_table *table;
83c81bfe 2992 struct elf32_hppa_link_hash_table *htab;
30667bf3 2993
83c81bfe 2994 htab = hppa_link_hash_table (info);
30667bf3 2995
83c81bfe 2996 for (stub_sec = htab->stub_bfd->sections;
30667bf3
AM
2997 stub_sec != NULL;
2998 stub_sec = stub_sec->next)
2999 {
dc810e39 3000 bfd_size_type size;
30667bf3
AM
3001
3002 /* Allocate memory to hold the linker stubs. */
74d1c347 3003 size = stub_sec->_raw_size;
c39a58e6 3004 stub_sec->contents = bfd_zalloc (htab->stub_bfd, size);
30667bf3 3005 if (stub_sec->contents == NULL && size != 0)
b34976b6 3006 return FALSE;
74d1c347 3007 stub_sec->_raw_size = 0;
30667bf3
AM
3008 }
3009
3010 /* Build the stubs as directed by the stub hash table. */
83c81bfe 3011 table = &htab->stub_hash_table;
30667bf3
AM
3012 bfd_hash_traverse (table, hppa_build_one_stub, info);
3013
b34976b6 3014 return TRUE;
30667bf3
AM
3015}
3016
c46b7515
AM
3017/* Perform a final link. */
3018
b34976b6 3019static bfd_boolean
c39a58e6 3020elf32_hppa_final_link (bfd *abfd, struct bfd_link_info *info)
c46b7515 3021{
4dc86686
AM
3022 /* Invoke the regular ELF linker to do all the work. */
3023 if (!bfd_elf32_bfd_final_link (abfd, info))
b34976b6 3024 return FALSE;
c46b7515
AM
3025
3026 /* If we're producing a final executable, sort the contents of the
985142a4 3027 unwind section. */
46fe4e66 3028 return elf_hppa_sort_unwind (abfd);
c46b7515
AM
3029}
3030
3031/* Record the lowest address for the data and text segments. */
3032
3033static void
c39a58e6
AM
3034hppa_record_segment_addr (bfd *abfd ATTRIBUTE_UNUSED,
3035 asection *section,
3036 void *data)
c46b7515 3037{
83c81bfe 3038 struct elf32_hppa_link_hash_table *htab;
c46b7515 3039
83c81bfe 3040 htab = (struct elf32_hppa_link_hash_table *) data;
c46b7515
AM
3041
3042 if ((section->flags & (SEC_ALLOC | SEC_LOAD)) == (SEC_ALLOC | SEC_LOAD))
3043 {
3044 bfd_vma value = section->vma - section->filepos;
3045
3046 if ((section->flags & SEC_READONLY) != 0)
3047 {
83c81bfe
AM
3048 if (value < htab->text_segment_base)
3049 htab->text_segment_base = value;
c46b7515
AM
3050 }
3051 else
3052 {
83c81bfe
AM
3053 if (value < htab->data_segment_base)
3054 htab->data_segment_base = value;
c46b7515
AM
3055 }
3056 }
3057}
3058
30667bf3
AM
3059/* Perform a relocation as part of a final link. */
3060
3061static bfd_reloc_status_type
c39a58e6
AM
3062final_link_relocate (asection *input_section,
3063 bfd_byte *contents,
3064 const Elf_Internal_Rela *rel,
3065 bfd_vma value,
3066 struct elf32_hppa_link_hash_table *htab,
3067 asection *sym_sec,
a252afa4
DA
3068 struct elf32_hppa_link_hash_entry *h,
3069 struct bfd_link_info *info)
30667bf3
AM
3070{
3071 int insn;
3072 unsigned int r_type = ELF32_R_TYPE (rel->r_info);
a252afa4 3073 unsigned int orig_r_type = r_type;
30667bf3
AM
3074 reloc_howto_type *howto = elf_hppa_howto_table + r_type;
3075 int r_format = howto->bitsize;
3076 enum hppa_reloc_field_selector_type_alt r_field;
3077 bfd *input_bfd = input_section->owner;
3078 bfd_vma offset = rel->r_offset;
3079 bfd_vma max_branch_offset = 0;
3080 bfd_byte *hit_data = contents + offset;
3081 bfd_signed_vma addend = rel->r_addend;
3082 bfd_vma location;
3083 struct elf32_hppa_stub_hash_entry *stub_entry = NULL;
3084 int val;
3085
3086 if (r_type == R_PARISC_NONE)
3087 return bfd_reloc_ok;
3088
3089 insn = bfd_get_32 (input_bfd, hit_data);
3090
3091 /* Find out where we are and where we're going. */
3092 location = (offset +
3093 input_section->output_offset +
3094 input_section->output_section->vma);
3095
a252afa4
DA
3096 /* If we are not building a shared library, convert DLTIND relocs to
3097 DPREL relocs. */
3098 if (!info->shared)
3099 {
3100 switch (r_type)
4fc8051d
AM
3101 {
3102 case R_PARISC_DLTIND21L:
3103 r_type = R_PARISC_DPREL21L;
a252afa4
DA
3104 break;
3105
4fc8051d
AM
3106 case R_PARISC_DLTIND14R:
3107 r_type = R_PARISC_DPREL14R;
a252afa4
DA
3108 break;
3109
4fc8051d
AM
3110 case R_PARISC_DLTIND14F:
3111 r_type = R_PARISC_DPREL14F;
a252afa4
DA
3112 break;
3113 }
3114 }
3115
30667bf3
AM
3116 switch (r_type)
3117 {
3118 case R_PARISC_PCREL12F:
3119 case R_PARISC_PCREL17F:
3120 case R_PARISC_PCREL22F:
067fa4a6
AM
3121 /* If this call should go via the plt, find the import stub in
3122 the stub hash. */
30667bf3
AM
3123 if (sym_sec == NULL
3124 || sym_sec->output_section == NULL
12cca0d2 3125 || (h != NULL
067fa4a6 3126 && h->elf.plt.offset != (bfd_vma) -1
a252afa4
DA
3127 && h->elf.dynindx != -1
3128 && !h->plabel
3129 && (info->shared
3130 || !(h->elf.elf_link_hash_flags & ELF_LINK_HASH_DEF_REGULAR)
3131 || h->elf.root.type == bfd_link_hash_defweak)))
30667bf3
AM
3132 {
3133 stub_entry = hppa_get_stub_entry (input_section, sym_sec,
83c81bfe 3134 h, rel, htab);
30667bf3
AM
3135 if (stub_entry != NULL)
3136 {
3137 value = (stub_entry->stub_offset
3138 + stub_entry->stub_sec->output_offset
3139 + stub_entry->stub_sec->output_section->vma);
3140 addend = 0;
3141 }
3142 else if (sym_sec == NULL && h != NULL
3143 && h->elf.root.type == bfd_link_hash_undefweak)
3144 {
db20fd76
AM
3145 /* It's OK if undefined weak. Calls to undefined weak
3146 symbols behave as if the "called" function
3147 immediately returns. We can thus call to a weak
3148 function without first checking whether the function
3149 is defined. */
30667bf3 3150 value = location;
db20fd76 3151 addend = 8;
30667bf3
AM
3152 }
3153 else
f09ebc7d 3154 return bfd_reloc_undefined;
30667bf3
AM
3155 }
3156 /* Fall thru. */
3157
3158 case R_PARISC_PCREL21L:
3159 case R_PARISC_PCREL17C:
3160 case R_PARISC_PCREL17R:
3161 case R_PARISC_PCREL14R:
3162 case R_PARISC_PCREL14F:
3163 /* Make it a pc relative offset. */
3164 value -= location;
3165 addend -= 8;
3166 break;
3167
3168 case R_PARISC_DPREL21L:
3169 case R_PARISC_DPREL14R:
3170 case R_PARISC_DPREL14F:
a252afa4
DA
3171 /* Convert instructions that use the linkage table pointer (r19) to
3172 instructions that use the global data pointer (dp). This is the
3173 most efficient way of using PIC code in an incomplete executable,
3174 but the user must follow the standard runtime conventions for
3175 accessing data for this to work. */
3176 if (orig_r_type == R_PARISC_DLTIND21L)
3177 {
3178 /* Convert addil instructions if the original reloc was a
3179 DLTIND21L. GCC sometimes uses a register other than r19 for
3180 the operation, so we must convert any addil instruction
3181 that uses this relocation. */
3182 if ((insn & 0xfc000000) == ((int) OP_ADDIL << 26))
3183 insn = ADDIL_DP;
3184 else
3185 /* We must have a ldil instruction. It's too hard to find
3186 and convert the associated add instruction, so issue an
3187 error. */
3188 (*_bfd_error_handler)
4fc8051d 3189 (_("%s(%s+0x%lx): %s fixup for insn 0x%x is not supported in a non-shared link"),
a252afa4
DA
3190 bfd_archive_filename (input_bfd),
3191 input_section->name,
3192 (long) rel->r_offset,
3193 howto->name,
3194 insn);
3195 }
3196 else if (orig_r_type == R_PARISC_DLTIND14F)
3197 {
3198 /* This must be a format 1 load/store. Change the base
3199 register to dp. */
3200 insn = (insn & 0xfc1ffff) | (27 << 21);
3201 }
3202
30667bf3 3203 /* For all the DP relative relocations, we need to examine the symbol's
95d0f04a
DA
3204 section. If it has no section or if it's a code section, then
3205 "data pointer relative" makes no sense. In that case we don't
3206 adjust the "value", and for 21 bit addil instructions, we change the
3207 source addend register from %dp to %r0. This situation commonly
3208 arises for undefined weak symbols and when a variable's "constness"
30667bf3
AM
3209 is declared differently from the way the variable is defined. For
3210 instance: "extern int foo" with foo defined as "const int foo". */
95d0f04a 3211 if (sym_sec == NULL || (sym_sec->flags & SEC_CODE) != 0)
30667bf3
AM
3212 {
3213 if ((insn & ((0x3f << 26) | (0x1f << 21)))
3214 == (((int) OP_ADDIL << 26) | (27 << 21)))
3215 {
3216 insn &= ~ (0x1f << 21);
067fa4a6 3217#if 0 /* debug them. */
30667bf3
AM
3218 (*_bfd_error_handler)
3219 (_("%s(%s+0x%lx): fixing %s"),
8f615d07 3220 bfd_archive_filename (input_bfd),
30667bf3
AM
3221 input_section->name,
3222 (long) rel->r_offset,
3223 howto->name);
3224#endif
3225 }
3226 /* Now try to make things easy for the dynamic linker. */
3227
3228 break;
3229 }
74d1c347 3230 /* Fall thru. */
30667bf3
AM
3231
3232 case R_PARISC_DLTIND21L:
3233 case R_PARISC_DLTIND14R:
3234 case R_PARISC_DLTIND14F:
3235 value -= elf_gp (input_section->output_section->owner);
3236 break;
3237
c46b7515
AM
3238 case R_PARISC_SEGREL32:
3239 if ((sym_sec->flags & SEC_CODE) != 0)
83c81bfe 3240 value -= htab->text_segment_base;
c46b7515 3241 else
83c81bfe 3242 value -= htab->data_segment_base;
c46b7515
AM
3243 break;
3244
30667bf3
AM
3245 default:
3246 break;
3247 }
3248
3249 switch (r_type)
3250 {
3251 case R_PARISC_DIR32:
47d89dba 3252 case R_PARISC_DIR14F:
30667bf3
AM
3253 case R_PARISC_DIR17F:
3254 case R_PARISC_PCREL17C:
3255 case R_PARISC_PCREL14F:
3256 case R_PARISC_DPREL14F:
3257 case R_PARISC_PLABEL32:
3258 case R_PARISC_DLTIND14F:
3259 case R_PARISC_SEGBASE:
3260 case R_PARISC_SEGREL32:
3261 r_field = e_fsel;
3262 break;
3263
1bf42538 3264 case R_PARISC_DLTIND21L:
30667bf3 3265 case R_PARISC_PCREL21L:
30667bf3 3266 case R_PARISC_PLABEL21L:
1bf42538
JL
3267 r_field = e_lsel;
3268 break;
3269
3270 case R_PARISC_DIR21L:
3271 case R_PARISC_DPREL21L:
30667bf3
AM
3272 r_field = e_lrsel;
3273 break;
3274
30667bf3 3275 case R_PARISC_PCREL17R:
30667bf3 3276 case R_PARISC_PCREL14R:
30667bf3
AM
3277 case R_PARISC_PLABEL14R:
3278 case R_PARISC_DLTIND14R:
1bf42538
JL
3279 r_field = e_rsel;
3280 break;
3281
3282 case R_PARISC_DIR17R:
3283 case R_PARISC_DIR14R:
3284 case R_PARISC_DPREL14R:
30667bf3
AM
3285 r_field = e_rrsel;
3286 break;
3287
3288 case R_PARISC_PCREL12F:
3289 case R_PARISC_PCREL17F:
3290 case R_PARISC_PCREL22F:
3291 r_field = e_fsel;
3292
3293 if (r_type == (unsigned int) R_PARISC_PCREL17F)
3294 {
3295 max_branch_offset = (1 << (17-1)) << 2;
3296 }
3297 else if (r_type == (unsigned int) R_PARISC_PCREL12F)
3298 {
3299 max_branch_offset = (1 << (12-1)) << 2;
3300 }
3301 else
3302 {
3303 max_branch_offset = (1 << (22-1)) << 2;
3304 }
3305
3306 /* sym_sec is NULL on undefined weak syms or when shared on
3307 undefined syms. We've already checked for a stub for the
3308 shared undefined case. */
3309 if (sym_sec == NULL)
3310 break;
3311
3312 /* If the branch is out of reach, then redirect the
3313 call to the local stub for this function. */
3314 if (value + addend + max_branch_offset >= 2*max_branch_offset)
3315 {
3316 stub_entry = hppa_get_stub_entry (input_section, sym_sec,
83c81bfe 3317 h, rel, htab);
30667bf3 3318 if (stub_entry == NULL)
f09ebc7d 3319 return bfd_reloc_undefined;
30667bf3
AM
3320
3321 /* Munge up the value and addend so that we call the stub
3322 rather than the procedure directly. */
3323 value = (stub_entry->stub_offset
3324 + stub_entry->stub_sec->output_offset
3325 + stub_entry->stub_sec->output_section->vma
3326 - location);
3327 addend = -8;
3328 }
3329 break;
3330
3331 /* Something we don't know how to handle. */
3332 default:
3333 return bfd_reloc_notsupported;
3334 }
3335
3336 /* Make sure we can reach the stub. */
3337 if (max_branch_offset != 0
3338 && value + addend + max_branch_offset >= 2*max_branch_offset)
3339 {
3340 (*_bfd_error_handler)
3341 (_("%s(%s+0x%lx): cannot reach %s, recompile with -ffunction-sections"),
8f615d07 3342 bfd_archive_filename (input_bfd),
30667bf3
AM
3343 input_section->name,
3344 (long) rel->r_offset,
3345 stub_entry->root.string);
ce757d15 3346 bfd_set_error (bfd_error_bad_value);
30667bf3
AM
3347 return bfd_reloc_notsupported;
3348 }
3349
3350 val = hppa_field_adjust (value, addend, r_field);
3351
3352 switch (r_type)
3353 {
3354 case R_PARISC_PCREL12F:
3355 case R_PARISC_PCREL17C:
3356 case R_PARISC_PCREL17F:
3357 case R_PARISC_PCREL17R:
3358 case R_PARISC_PCREL22F:
3359 case R_PARISC_DIR17F:
3360 case R_PARISC_DIR17R:
3361 /* This is a branch. Divide the offset by four.
3362 Note that we need to decide whether it's a branch or
3363 otherwise by inspecting the reloc. Inspecting insn won't
3364 work as insn might be from a .word directive. */
3365 val >>= 2;
3366 break;
3367
3368 default:
3369 break;
3370 }
3371
3372 insn = hppa_rebuild_insn (insn, val, r_format);
3373
3374 /* Update the instruction word. */
74d1c347 3375 bfd_put_32 (input_bfd, (bfd_vma) insn, hit_data);
30667bf3
AM
3376 return bfd_reloc_ok;
3377}
3378
30667bf3
AM
3379/* Relocate an HPPA ELF section. */
3380
b34976b6 3381static bfd_boolean
c39a58e6
AM
3382elf32_hppa_relocate_section (bfd *output_bfd,
3383 struct bfd_link_info *info,
3384 bfd *input_bfd,
3385 asection *input_section,
3386 bfd_byte *contents,
3387 Elf_Internal_Rela *relocs,
3388 Elf_Internal_Sym *local_syms,
3389 asection **local_sections)
30667bf3 3390{
30667bf3 3391 bfd_vma *local_got_offsets;
83c81bfe 3392 struct elf32_hppa_link_hash_table *htab;
30667bf3
AM
3393 Elf_Internal_Shdr *symtab_hdr;
3394 Elf_Internal_Rela *rel;
3395 Elf_Internal_Rela *relend;
30667bf3 3396
1049f94e 3397 if (info->relocatable)
b34976b6 3398 return TRUE;
f0fe0e16 3399
30667bf3
AM
3400 symtab_hdr = &elf_tdata (input_bfd)->symtab_hdr;
3401
83c81bfe 3402 htab = hppa_link_hash_table (info);
74d1c347 3403 local_got_offsets = elf_local_got_offsets (input_bfd);
30667bf3
AM
3404
3405 rel = relocs;
3406 relend = relocs + input_section->reloc_count;
3407 for (; rel < relend; rel++)
3408 {
3409 unsigned int r_type;
3410 reloc_howto_type *howto;
3411 unsigned int r_symndx;
3412 struct elf32_hppa_link_hash_entry *h;
3413 Elf_Internal_Sym *sym;
3414 asection *sym_sec;
3415 bfd_vma relocation;
3416 bfd_reloc_status_type r;
3417 const char *sym_name;
b34976b6
AM
3418 bfd_boolean plabel;
3419 bfd_boolean warned_undef;
30667bf3
AM
3420
3421 r_type = ELF32_R_TYPE (rel->r_info);
3422 if (r_type >= (unsigned int) R_PARISC_UNIMPLEMENTED)
3423 {
3424 bfd_set_error (bfd_error_bad_value);
b34976b6 3425 return FALSE;
30667bf3
AM
3426 }
3427 if (r_type == (unsigned int) R_PARISC_GNU_VTENTRY
3428 || r_type == (unsigned int) R_PARISC_GNU_VTINHERIT)
3429 continue;
3430
30667bf3 3431 /* This is a final link. */
f0fe0e16 3432 r_symndx = ELF32_R_SYM (rel->r_info);
30667bf3
AM
3433 h = NULL;
3434 sym = NULL;
3435 sym_sec = NULL;
b34976b6 3436 warned_undef = FALSE;
30667bf3
AM
3437 if (r_symndx < symtab_hdr->sh_info)
3438 {
3439 /* This is a local symbol, h defaults to NULL. */
3440 sym = local_syms + r_symndx;
3441 sym_sec = local_sections[r_symndx];
8517fae7 3442 relocation = _bfd_elf_rela_local_sym (output_bfd, sym, &sym_sec, rel);
30667bf3
AM
3443 }
3444 else
3445 {
560e09e9
NC
3446 struct elf_link_hash_entry *hh;
3447 bfd_boolean unresolved_reloc;
3448
3449 RELOC_FOR_GLOBAL_SYMBOL (hh, elf_sym_hashes (input_bfd), r_symndx, symtab_hdr,
3450 relocation, sym_sec, unresolved_reloc, info,
3451 warned_undef);
3452
3453 if (relocation == 0
3454 && hh->root.type != bfd_link_hash_defined
3455 && hh->root.type != bfd_link_hash_defweak
3456 && hh->root.type != bfd_link_hash_undefweak)
4fc8051d 3457 {
560e09e9
NC
3458 if (!info->executable
3459 && info->unresolved_syms_in_objects == RM_IGNORE
3460 && ELF_ST_VISIBILITY (hh->other) == STV_DEFAULT
3461 && hh->type == STT_PARISC_MILLI)
3462 {
3463 if (! info->callbacks->undefined_symbol
3464 (info, hh->root.root.string, input_bfd,
3465 input_section, rel->r_offset,
3466 ((info->shared && info->unresolved_syms_in_shared_libs == RM_GENERATE_ERROR)
3467 || (!info->shared && info->unresolved_syms_in_objects == RM_GENERATE_ERROR))))
3468 return FALSE;
3469 warned_undef = TRUE;
3470 }
30667bf3 3471 }
560e09e9 3472 h = (struct elf32_hppa_link_hash_entry *) hh;
30667bf3
AM
3473 }
3474
3475 /* Do any required modifications to the relocation value, and
25f72752
AM
3476 determine what types of dynamic info we need to output, if
3477 any. */
74d1c347 3478 plabel = 0;
30667bf3
AM
3479 switch (r_type)
3480 {
3481 case R_PARISC_DLTIND14F:
3482 case R_PARISC_DLTIND14R:
3483 case R_PARISC_DLTIND21L:
ce757d15
AM
3484 {
3485 bfd_vma off;
b34976b6 3486 bfd_boolean do_got = 0;
ce757d15
AM
3487
3488 /* Relocation is to the entry for this symbol in the
3489 global offset table. */
3490 if (h != NULL)
3491 {
b34976b6 3492 bfd_boolean dyn;
ce757d15
AM
3493
3494 off = h->elf.got.offset;
3495 dyn = htab->elf.dynamic_sections_created;
3496 if (! WILL_CALL_FINISH_DYNAMIC_SYMBOL (dyn, info, &h->elf))
3497 {
3498 /* If we aren't going to call finish_dynamic_symbol,
3499 then we need to handle initialisation of the .got
3500 entry and create needed relocs here. Since the
3501 offset must always be a multiple of 4, we use the
3502 least significant bit to record whether we have
3503 initialised it already. */
3504 if ((off & 1) != 0)
3505 off &= ~1;
3506 else
3507 {
3508 h->elf.got.offset |= 1;
3509 do_got = 1;
3510 }
3511 }
3512 }
3513 else
3514 {
3515 /* Local symbol case. */
3516 if (local_got_offsets == NULL)
3517 abort ();
3518
3519 off = local_got_offsets[r_symndx];
3520
3521 /* The offset must always be a multiple of 4. We use
3522 the least significant bit to record whether we have
3523 already generated the necessary reloc. */
3524 if ((off & 1) != 0)
3525 off &= ~1;
3526 else
3527 {
3528 local_got_offsets[r_symndx] |= 1;
3529 do_got = 1;
3530 }
3531 }
68fb2e56 3532
ce757d15
AM
3533 if (do_got)
3534 {
3535 if (info->shared)
3536 {
3537 /* Output a dynamic relocation for this GOT entry.
3538 In this case it is relative to the base of the
3539 object because the symbol index is zero. */
3540 Elf_Internal_Rela outrel;
947216bf
AM
3541 bfd_byte *loc;
3542 asection *s = htab->srelgot;
ce757d15
AM
3543
3544 outrel.r_offset = (off
3545 + htab->sgot->output_offset
3546 + htab->sgot->output_section->vma);
3547 outrel.r_info = ELF32_R_INFO (0, R_PARISC_DIR32);
3548 outrel.r_addend = relocation;
947216bf
AM
3549 loc = s->contents;
3550 loc += s->reloc_count++ * sizeof (Elf32_External_Rela);
ce757d15
AM
3551 bfd_elf32_swap_reloca_out (output_bfd, &outrel, loc);
3552 }
3553 else
30667bf3 3554 bfd_put_32 (output_bfd, relocation,
83c81bfe 3555 htab->sgot->contents + off);
ce757d15 3556 }
30667bf3 3557
ce757d15
AM
3558 if (off >= (bfd_vma) -2)
3559 abort ();
30667bf3 3560
ce757d15
AM
3561 /* Add the base of the GOT to the relocation value. */
3562 relocation = (off
3563 + htab->sgot->output_offset
3564 + htab->sgot->output_section->vma);
3565 }
30667bf3 3566 break;
252b5132 3567
c46b7515
AM
3568 case R_PARISC_SEGREL32:
3569 /* If this is the first SEGREL relocation, then initialize
3570 the segment base values. */
83c81bfe
AM
3571 if (htab->text_segment_base == (bfd_vma) -1)
3572 bfd_map_over_sections (output_bfd, hppa_record_segment_addr, htab);
c46b7515
AM
3573 break;
3574
30667bf3
AM
3575 case R_PARISC_PLABEL14R:
3576 case R_PARISC_PLABEL21L:
3577 case R_PARISC_PLABEL32:
ebe50bae 3578 if (htab->elf.dynamic_sections_created)
252b5132 3579 {
ce757d15 3580 bfd_vma off;
b34976b6 3581 bfd_boolean do_plt = 0;
ce757d15 3582
74d1c347
AM
3583 /* If we have a global symbol with a PLT slot, then
3584 redirect this relocation to it. */
3585 if (h != NULL)
3586 {
3587 off = h->elf.plt.offset;
4dc86686 3588 if (! WILL_CALL_FINISH_DYNAMIC_SYMBOL (1, info, &h->elf))
8dea1268
AM
3589 {
3590 /* In a non-shared link, adjust_dynamic_symbols
3591 isn't called for symbols forced local. We
dc810e39 3592 need to write out the plt entry here. */
8dea1268
AM
3593 if ((off & 1) != 0)
3594 off &= ~1;
3595 else
3596 {
8dea1268 3597 h->elf.plt.offset |= 1;
ce757d15 3598 do_plt = 1;
8dea1268
AM
3599 }
3600 }
74d1c347
AM
3601 }
3602 else
3603 {
68fb2e56
AM
3604 bfd_vma *local_plt_offsets;
3605
3606 if (local_got_offsets == NULL)
3607 abort ();
74d1c347 3608
68fb2e56
AM
3609 local_plt_offsets = local_got_offsets + symtab_hdr->sh_info;
3610 off = local_plt_offsets[r_symndx];
74d1c347
AM
3611
3612 /* As for the local .got entry case, we use the last
3613 bit to record whether we've already initialised
3614 this local .plt entry. */
3615 if ((off & 1) != 0)
3616 off &= ~1;
ce757d15
AM
3617 else
3618 {
3619 local_plt_offsets[r_symndx] |= 1;
3620 do_plt = 1;
3621 }
3622 }
3623
3624 if (do_plt)
3625 {
3626 if (info->shared)
3627 {
3628 /* Output a dynamic IPLT relocation for this
3629 PLT entry. */
3630 Elf_Internal_Rela outrel;
947216bf
AM
3631 bfd_byte *loc;
3632 asection *s = htab->srelplt;
ce757d15
AM
3633
3634 outrel.r_offset = (off
3635 + htab->splt->output_offset
3636 + htab->splt->output_section->vma);
3637 outrel.r_info = ELF32_R_INFO (0, R_PARISC_IPLT);
3638 outrel.r_addend = relocation;
947216bf
AM
3639 loc = s->contents;
3640 loc += s->reloc_count++ * sizeof (Elf32_External_Rela);
ce757d15
AM
3641 bfd_elf32_swap_reloca_out (output_bfd, &outrel, loc);
3642 }
74d1c347
AM
3643 else
3644 {
3645 bfd_put_32 (output_bfd,
3646 relocation,
83c81bfe 3647 htab->splt->contents + off);
74d1c347 3648 bfd_put_32 (output_bfd,
83c81bfe
AM
3649 elf_gp (htab->splt->output_section->owner),
3650 htab->splt->contents + off + 4);
74d1c347
AM
3651 }
3652 }
3653
68fb2e56 3654 if (off >= (bfd_vma) -2)
49e9d0d3 3655 abort ();
74d1c347
AM
3656
3657 /* PLABELs contain function pointers. Relocation is to
3658 the entry for the function in the .plt. The magic +2
3659 offset signals to $$dyncall that the function pointer
3660 is in the .plt and thus has a gp pointer too.
3661 Exception: Undefined PLABELs should have a value of
3662 zero. */
3663 if (h == NULL
3664 || (h->elf.root.type != bfd_link_hash_undefweak
3665 && h->elf.root.type != bfd_link_hash_undefined))
3666 {
3667 relocation = (off
83c81bfe
AM
3668 + htab->splt->output_offset
3669 + htab->splt->output_section->vma
74d1c347
AM
3670 + 2);
3671 }
3672 plabel = 1;
30667bf3
AM
3673 }
3674 /* Fall through and possibly emit a dynamic relocation. */
3675
3676 case R_PARISC_DIR17F:
3677 case R_PARISC_DIR17R:
47d89dba 3678 case R_PARISC_DIR14F:
30667bf3
AM
3679 case R_PARISC_DIR14R:
3680 case R_PARISC_DIR21L:
3681 case R_PARISC_DPREL14F:
3682 case R_PARISC_DPREL14R:
3683 case R_PARISC_DPREL21L:
3684 case R_PARISC_DIR32:
ec338859
AM
3685 /* r_symndx will be zero only for relocs against symbols
3686 from removed linkonce sections, or sections discarded by
3687 a linker script. */
3688 if (r_symndx == 0
3689 || (input_section->flags & SEC_ALLOC) == 0)
3690 break;
3691
30667bf3 3692 /* The reloc types handled here and this conditional
56882138 3693 expression must match the code in ..check_relocs and
ec338859 3694 allocate_dynrelocs. ie. We need exactly the same condition
56882138
AM
3695 as in ..check_relocs, with some extra conditions (dynindx
3696 test in this case) to cater for relocs removed by
ec338859 3697 allocate_dynrelocs. If you squint, the non-shared test
56882138
AM
3698 here does indeed match the one in ..check_relocs, the
3699 difference being that here we test DEF_DYNAMIC as well as
3700 !DEF_REGULAR. All common syms end up with !DEF_REGULAR,
3701 which is why we can't use just that test here.
3702 Conversely, DEF_DYNAMIC can't be used in check_relocs as
3703 there all files have not been loaded. */
446f2863 3704 if ((info->shared
4fc8051d
AM
3705 && (h == NULL
3706 || ELF_ST_VISIBILITY (h->elf.other) == STV_DEFAULT
3707 || h->elf.root.type != bfd_link_hash_undefweak)
446f2863 3708 && (IS_ABSOLUTE_RELOC (r_type)
4fc8051d 3709 || !SYMBOL_CALLS_LOCAL (info, &h->elf)))
446f2863 3710 || (!info->shared
446f2863
AM
3711 && h != NULL
3712 && h->elf.dynindx != -1
3713 && (h->elf.elf_link_hash_flags & ELF_LINK_NON_GOT_REF) == 0
4fc8051d
AM
3714 && ((ELIMINATE_COPY_RELOCS
3715 && (h->elf.elf_link_hash_flags
3716 & ELF_LINK_HASH_DEF_DYNAMIC) != 0
56882138
AM
3717 && (h->elf.elf_link_hash_flags
3718 & ELF_LINK_HASH_DEF_REGULAR) == 0)
446f2863
AM
3719 || h->elf.root.type == bfd_link_hash_undefweak
3720 || h->elf.root.type == bfd_link_hash_undefined)))
30667bf3
AM
3721 {
3722 Elf_Internal_Rela outrel;
b34976b6 3723 bfd_boolean skip;
98ceb8ce 3724 asection *sreloc;
947216bf 3725 bfd_byte *loc;
252b5132 3726
30667bf3
AM
3727 /* When generating a shared object, these relocations
3728 are copied into the output file to be resolved at run
3729 time. */
252b5132 3730
30667bf3 3731 outrel.r_addend = rel->r_addend;
c629eae0
JJ
3732 outrel.r_offset =
3733 _bfd_elf_section_offset (output_bfd, info, input_section,
3734 rel->r_offset);
0bb2d96a
JJ
3735 skip = (outrel.r_offset == (bfd_vma) -1
3736 || outrel.r_offset == (bfd_vma) -2);
30667bf3
AM
3737 outrel.r_offset += (input_section->output_offset
3738 + input_section->output_section->vma);
3739
3740 if (skip)
252b5132 3741 {
30667bf3 3742 memset (&outrel, 0, sizeof (outrel));
252b5132 3743 }
74d1c347
AM
3744 else if (h != NULL
3745 && h->elf.dynindx != -1
3746 && (plabel
446f2863
AM
3747 || !IS_ABSOLUTE_RELOC (r_type)
3748 || !info->shared
74d1c347 3749 || !info->symbolic
30667bf3
AM
3750 || (h->elf.elf_link_hash_flags
3751 & ELF_LINK_HASH_DEF_REGULAR) == 0))
252b5132 3752 {
30667bf3
AM
3753 outrel.r_info = ELF32_R_INFO (h->elf.dynindx, r_type);
3754 }
3755 else /* It's a local symbol, or one marked to become local. */
3756 {
3757 int indx = 0;
edd21aca 3758
30667bf3
AM
3759 /* Add the absolute offset of the symbol. */
3760 outrel.r_addend += relocation;
edd21aca 3761
74d1c347
AM
3762 /* Global plabels need to be processed by the
3763 dynamic linker so that functions have at most one
3764 fptr. For this reason, we need to differentiate
3765 between global and local plabels, which we do by
3766 providing the function symbol for a global plabel
3767 reloc, and no symbol for local plabels. */
3768 if (! plabel
3769 && sym_sec != NULL
30667bf3
AM
3770 && sym_sec->output_section != NULL
3771 && ! bfd_is_abs_section (sym_sec))
252b5132 3772 {
4b71bec0
DA
3773 /* Skip this relocation if the output section has
3774 been discarded. */
3775 if (bfd_is_abs_section (sym_sec->output_section))
3776 break;
3777
30667bf3
AM
3778 indx = elf_section_data (sym_sec->output_section)->dynindx;
3779 /* We are turning this relocation into one
3780 against a section symbol, so subtract out the
3781 output section's address but not the offset
3782 of the input section in the output section. */
3783 outrel.r_addend -= sym_sec->output_section->vma;
252b5132 3784 }
252b5132 3785
30667bf3
AM
3786 outrel.r_info = ELF32_R_INFO (indx, r_type);
3787 }
68fb2e56
AM
3788#if 0
3789 /* EH info can cause unaligned DIR32 relocs.
3790 Tweak the reloc type for the dynamic linker. */
3791 if (r_type == R_PARISC_DIR32 && (outrel.r_offset & 3) != 0)
3792 outrel.r_info = ELF32_R_INFO (ELF32_R_SYM (outrel.r_info),
3793 R_PARISC_DIR32U);
3794#endif
98ceb8ce
AM
3795 sreloc = elf_section_data (input_section)->sreloc;
3796 if (sreloc == NULL)
3797 abort ();
3798
947216bf
AM
3799 loc = sreloc->contents;
3800 loc += sreloc->reloc_count++ * sizeof (Elf32_External_Rela);
98ceb8ce 3801 bfd_elf32_swap_reloca_out (output_bfd, &outrel, loc);
30667bf3
AM
3802 }
3803 break;
edd21aca 3804
30667bf3
AM
3805 default:
3806 break;
3807 }
252b5132 3808
30667bf3 3809 r = final_link_relocate (input_section, contents, rel, relocation,
a252afa4 3810 htab, sym_sec, h, info);
252b5132 3811
30667bf3
AM
3812 if (r == bfd_reloc_ok)
3813 continue;
252b5132 3814
30667bf3
AM
3815 if (h != NULL)
3816 sym_name = h->elf.root.root.string;
3817 else
3818 {
3819 sym_name = bfd_elf_string_from_elf_section (input_bfd,
3820 symtab_hdr->sh_link,
3821 sym->st_name);
3822 if (sym_name == NULL)
b34976b6 3823 return FALSE;
30667bf3
AM
3824 if (*sym_name == '\0')
3825 sym_name = bfd_section_name (input_bfd, sym_sec);
3826 }
edd21aca 3827
30667bf3 3828 howto = elf_hppa_howto_table + r_type;
252b5132 3829
30667bf3
AM
3830 if (r == bfd_reloc_undefined || r == bfd_reloc_notsupported)
3831 {
f09ebc7d
AM
3832 if (r == bfd_reloc_notsupported || !warned_undef)
3833 {
3834 (*_bfd_error_handler)
3835 (_("%s(%s+0x%lx): cannot handle %s for %s"),
3836 bfd_archive_filename (input_bfd),
3837 input_section->name,
3838 (long) rel->r_offset,
3839 howto->name,
3840 sym_name);
3841 bfd_set_error (bfd_error_bad_value);
b34976b6 3842 return FALSE;
f09ebc7d 3843 }
30667bf3
AM
3844 }
3845 else
3846 {
3847 if (!((*info->callbacks->reloc_overflow)
c39a58e6
AM
3848 (info, sym_name, howto->name, 0, input_bfd, input_section,
3849 rel->r_offset)))
b34976b6 3850 return FALSE;
30667bf3
AM
3851 }
3852 }
edd21aca 3853
b34976b6 3854 return TRUE;
30667bf3 3855}
252b5132 3856
30667bf3
AM
3857/* Finish up dynamic symbol handling. We set the contents of various
3858 dynamic sections here. */
252b5132 3859
b34976b6 3860static bfd_boolean
c39a58e6
AM
3861elf32_hppa_finish_dynamic_symbol (bfd *output_bfd,
3862 struct bfd_link_info *info,
3863 struct elf_link_hash_entry *h,
3864 Elf_Internal_Sym *sym)
30667bf3 3865{
83c81bfe 3866 struct elf32_hppa_link_hash_table *htab;
a252afa4
DA
3867 Elf_Internal_Rela rel;
3868 bfd_byte *loc;
edd21aca 3869
83c81bfe 3870 htab = hppa_link_hash_table (info);
30667bf3 3871
30667bf3
AM
3872 if (h->plt.offset != (bfd_vma) -1)
3873 {
3874 bfd_vma value;
30667bf3 3875
8dea1268
AM
3876 if (h->plt.offset & 1)
3877 abort ();
3878
30667bf3
AM
3879 /* This symbol has an entry in the procedure linkage table. Set
3880 it up.
3881
3882 The format of a plt entry is
74d1c347
AM
3883 <funcaddr>
3884 <__gp>
47d89dba 3885 */
30667bf3
AM
3886 value = 0;
3887 if (h->root.type == bfd_link_hash_defined
3888 || h->root.type == bfd_link_hash_defweak)
3889 {
3890 value = h->root.u.def.value;
3891 if (h->root.u.def.section->output_section != NULL)
3892 value += (h->root.u.def.section->output_offset
3893 + h->root.u.def.section->output_section->vma);
252b5132 3894 }
edd21aca 3895
a252afa4
DA
3896 /* Create a dynamic IPLT relocation for this entry. */
3897 rel.r_offset = (h->plt.offset
3898 + htab->splt->output_offset
3899 + htab->splt->output_section->vma);
3900 if (h->dynindx != -1)
30667bf3 3901 {
a252afa4
DA
3902 rel.r_info = ELF32_R_INFO (h->dynindx, R_PARISC_IPLT);
3903 rel.r_addend = 0;
30667bf3 3904 }
ce757d15 3905 else
47d89dba 3906 {
a252afa4
DA
3907 /* This symbol has been marked to become local, and is
3908 used by a plabel so must be kept in the .plt. */
3909 rel.r_info = ELF32_R_INFO (0, R_PARISC_IPLT);
3910 rel.r_addend = value;
47d89dba
AM
3911 }
3912
a252afa4
DA
3913 loc = htab->srelplt->contents;
3914 loc += htab->srelplt->reloc_count++ * sizeof (Elf32_External_Rela);
3915 bfd_elf32_swap_reloca_out (htab->splt->output_section->owner, &rel, loc);
3916
30667bf3
AM
3917 if ((h->elf_link_hash_flags & ELF_LINK_HASH_DEF_REGULAR) == 0)
3918 {
3919 /* Mark the symbol as undefined, rather than as defined in
3920 the .plt section. Leave the value alone. */
3921 sym->st_shndx = SHN_UNDEF;
3922 }
3923 }
edd21aca 3924
30667bf3
AM
3925 if (h->got.offset != (bfd_vma) -1)
3926 {
30667bf3
AM
3927 /* This symbol has an entry in the global offset table. Set it
3928 up. */
3929
3930 rel.r_offset = ((h->got.offset &~ (bfd_vma) 1)
83c81bfe
AM
3931 + htab->sgot->output_offset
3932 + htab->sgot->output_section->vma);
30667bf3 3933
4dc86686
AM
3934 /* If this is a -Bsymbolic link and the symbol is defined
3935 locally or was forced to be local because of a version file,
3936 we just want to emit a RELATIVE reloc. The entry in the
3937 global offset table will already have been initialized in the
3938 relocate_section function. */
3939 if (info->shared
3940 && (info->symbolic || h->dynindx == -1)
3941 && (h->elf_link_hash_flags & ELF_LINK_HASH_DEF_REGULAR))
30667bf3 3942 {
74d1c347 3943 rel.r_info = ELF32_R_INFO (0, R_PARISC_DIR32);
30667bf3
AM
3944 rel.r_addend = (h->root.u.def.value
3945 + h->root.u.def.section->output_offset
3946 + h->root.u.def.section->output_section->vma);
3947 }
3948 else
3949 {
49e9d0d3
AM
3950 if ((h->got.offset & 1) != 0)
3951 abort ();
c39a58e6 3952 bfd_put_32 (output_bfd, 0, htab->sgot->contents + h->got.offset);
30667bf3
AM
3953 rel.r_info = ELF32_R_INFO (h->dynindx, R_PARISC_DIR32);
3954 rel.r_addend = 0;
3955 }
edd21aca 3956
947216bf
AM
3957 loc = htab->srelgot->contents;
3958 loc += htab->srelgot->reloc_count++ * sizeof (Elf32_External_Rela);
3ac8354b 3959 bfd_elf32_swap_reloca_out (output_bfd, &rel, loc);
30667bf3 3960 }
edd21aca 3961
30667bf3
AM
3962 if ((h->elf_link_hash_flags & ELF_LINK_HASH_NEEDS_COPY) != 0)
3963 {
3964 asection *s;
30667bf3
AM
3965
3966 /* This symbol needs a copy reloc. Set it up. */
3967
49e9d0d3
AM
3968 if (! (h->dynindx != -1
3969 && (h->root.type == bfd_link_hash_defined
3970 || h->root.type == bfd_link_hash_defweak)))
3971 abort ();
30667bf3 3972
83c81bfe 3973 s = htab->srelbss;
30667bf3
AM
3974
3975 rel.r_offset = (h->root.u.def.value
3976 + h->root.u.def.section->output_offset
3977 + h->root.u.def.section->output_section->vma);
3978 rel.r_addend = 0;
3979 rel.r_info = ELF32_R_INFO (h->dynindx, R_PARISC_COPY);
947216bf 3980 loc = s->contents + s->reloc_count++ * sizeof (Elf32_External_Rela);
3ac8354b 3981 bfd_elf32_swap_reloca_out (output_bfd, &rel, loc);
30667bf3
AM
3982 }
3983
3984 /* Mark _DYNAMIC and _GLOBAL_OFFSET_TABLE_ as absolute. */
3985 if (h->root.root.string[0] == '_'
3986 && (strcmp (h->root.root.string, "_DYNAMIC") == 0
3987 || strcmp (h->root.root.string, "_GLOBAL_OFFSET_TABLE_") == 0))
3988 {
3989 sym->st_shndx = SHN_ABS;
3990 }
3991
b34976b6 3992 return TRUE;
30667bf3
AM
3993}
3994
98ceb8ce
AM
3995/* Used to decide how to sort relocs in an optimal manner for the
3996 dynamic linker, before writing them out. */
3997
3998static enum elf_reloc_type_class
c39a58e6 3999elf32_hppa_reloc_type_class (const Elf_Internal_Rela *rela)
98ceb8ce
AM
4000{
4001 if (ELF32_R_SYM (rela->r_info) == 0)
4002 return reloc_class_relative;
4003
4004 switch ((int) ELF32_R_TYPE (rela->r_info))
4005 {
4006 case R_PARISC_IPLT:
4007 return reloc_class_plt;
4008 case R_PARISC_COPY:
4009 return reloc_class_copy;
4010 default:
4011 return reloc_class_normal;
4012 }
4013}
4014
30667bf3
AM
4015/* Finish up the dynamic sections. */
4016
b34976b6 4017static bfd_boolean
c39a58e6
AM
4018elf32_hppa_finish_dynamic_sections (bfd *output_bfd,
4019 struct bfd_link_info *info)
30667bf3
AM
4020{
4021 bfd *dynobj;
83c81bfe 4022 struct elf32_hppa_link_hash_table *htab;
30667bf3
AM
4023 asection *sdyn;
4024
83c81bfe 4025 htab = hppa_link_hash_table (info);
ebe50bae 4026 dynobj = htab->elf.dynobj;
30667bf3
AM
4027
4028 sdyn = bfd_get_section_by_name (dynobj, ".dynamic");
4029
ebe50bae 4030 if (htab->elf.dynamic_sections_created)
30667bf3
AM
4031 {
4032 Elf32_External_Dyn *dyncon, *dynconend;
4033
49e9d0d3
AM
4034 if (sdyn == NULL)
4035 abort ();
30667bf3
AM
4036
4037 dyncon = (Elf32_External_Dyn *) sdyn->contents;
4038 dynconend = (Elf32_External_Dyn *) (sdyn->contents + sdyn->_raw_size);
4039 for (; dyncon < dynconend; dyncon++)
edd21aca 4040 {
30667bf3
AM
4041 Elf_Internal_Dyn dyn;
4042 asection *s;
4043
4044 bfd_elf32_swap_dyn_in (dynobj, dyncon, &dyn);
4045
4046 switch (dyn.d_tag)
4047 {
4048 default:
3ac8354b 4049 continue;
30667bf3
AM
4050
4051 case DT_PLTGOT:
4052 /* Use PLTGOT to set the GOT register. */
4053 dyn.d_un.d_ptr = elf_gp (output_bfd);
30667bf3
AM
4054 break;
4055
4056 case DT_JMPREL:
83c81bfe 4057 s = htab->srelplt;
30667bf3 4058 dyn.d_un.d_ptr = s->output_section->vma + s->output_offset;
30667bf3
AM
4059 break;
4060
4061 case DT_PLTRELSZ:
83c81bfe 4062 s = htab->srelplt;
6348e046 4063 dyn.d_un.d_val = s->_raw_size;
30667bf3 4064 break;
4e12ff7f
AM
4065
4066 case DT_RELASZ:
4067 /* Don't count procedure linkage table relocs in the
4068 overall reloc count. */
6348e046
AM
4069 s = htab->srelplt;
4070 if (s == NULL)
4071 continue;
4072 dyn.d_un.d_val -= s->_raw_size;
4073 break;
4074
4075 case DT_RELA:
4076 /* We may not be using the standard ELF linker script.
4077 If .rela.plt is the first .rela section, we adjust
4078 DT_RELA to not include it. */
4079 s = htab->srelplt;
4080 if (s == NULL)
4081 continue;
4082 if (dyn.d_un.d_ptr != s->output_section->vma + s->output_offset)
4083 continue;
4084 dyn.d_un.d_ptr += s->_raw_size;
4e12ff7f 4085 break;
30667bf3 4086 }
3ac8354b
AM
4087
4088 bfd_elf32_swap_dyn_out (output_bfd, &dyn, dyncon);
edd21aca 4089 }
252b5132 4090 }
edd21aca 4091
83c81bfe 4092 if (htab->sgot != NULL && htab->sgot->_raw_size != 0)
30667bf3 4093 {
74d1c347
AM
4094 /* Fill in the first entry in the global offset table.
4095 We use it to point to our dynamic section, if we have one. */
30667bf3 4096 bfd_put_32 (output_bfd,
c39a58e6 4097 sdyn ? sdyn->output_section->vma + sdyn->output_offset : 0,
83c81bfe 4098 htab->sgot->contents);
30667bf3 4099
74d1c347 4100 /* The second entry is reserved for use by the dynamic linker. */
83c81bfe 4101 memset (htab->sgot->contents + GOT_ENTRY_SIZE, 0, GOT_ENTRY_SIZE);
74d1c347 4102
30667bf3 4103 /* Set .got entry size. */
83c81bfe 4104 elf_section_data (htab->sgot->output_section)
74d1c347 4105 ->this_hdr.sh_entsize = GOT_ENTRY_SIZE;
30667bf3
AM
4106 }
4107
83c81bfe 4108 if (htab->splt != NULL && htab->splt->_raw_size != 0)
47d89dba
AM
4109 {
4110 /* Set plt entry size. */
83c81bfe 4111 elf_section_data (htab->splt->output_section)
47d89dba
AM
4112 ->this_hdr.sh_entsize = PLT_ENTRY_SIZE;
4113
83c81bfe 4114 if (htab->need_plt_stub)
47d89dba
AM
4115 {
4116 /* Set up the .plt stub. */
83c81bfe
AM
4117 memcpy (htab->splt->contents
4118 + htab->splt->_raw_size - sizeof (plt_stub),
47d89dba
AM
4119 plt_stub, sizeof (plt_stub));
4120
83c81bfe
AM
4121 if ((htab->splt->output_offset
4122 + htab->splt->output_section->vma
4123 + htab->splt->_raw_size)
4124 != (htab->sgot->output_offset
4125 + htab->sgot->output_section->vma))
47d89dba
AM
4126 {
4127 (*_bfd_error_handler)
4128 (_(".got section not immediately after .plt section"));
b34976b6 4129 return FALSE;
47d89dba
AM
4130 }
4131 }
4132 }
30667bf3 4133
b34976b6 4134 return TRUE;
30667bf3 4135}
252b5132 4136
d952f17a
AM
4137/* Tweak the OSABI field of the elf header. */
4138
4139static void
c39a58e6
AM
4140elf32_hppa_post_process_headers (bfd *abfd,
4141 struct bfd_link_info *info ATTRIBUTE_UNUSED)
d952f17a
AM
4142{
4143 Elf_Internal_Ehdr * i_ehdrp;
4144
4145 i_ehdrp = elf_elfheader (abfd);
4146
4147 if (strcmp (bfd_get_target (abfd), "elf32-hppa-linux") == 0)
4148 {
4149 i_ehdrp->e_ident[EI_OSABI] = ELFOSABI_LINUX;
4150 }
4151 else
4152 {
4153 i_ehdrp->e_ident[EI_OSABI] = ELFOSABI_HPUX;
4154 }
4155}
4156
30667bf3
AM
4157/* Called when writing out an object file to decide the type of a
4158 symbol. */
4159static int
c39a58e6 4160elf32_hppa_elf_get_symbol_type (Elf_Internal_Sym *elf_sym, int type)
30667bf3
AM
4161{
4162 if (ELF_ST_TYPE (elf_sym->st_info) == STT_PARISC_MILLI)
4163 return STT_PARISC_MILLI;
4164 else
4165 return type;
252b5132
RH
4166}
4167
4168/* Misc BFD support code. */
30667bf3
AM
4169#define bfd_elf32_bfd_is_local_label_name elf_hppa_is_local_label_name
4170#define bfd_elf32_bfd_reloc_type_lookup elf_hppa_reloc_type_lookup
4171#define elf_info_to_howto elf_hppa_info_to_howto
4172#define elf_info_to_howto_rel elf_hppa_info_to_howto_rel
252b5132 4173
252b5132 4174/* Stuff for the BFD linker. */
c46b7515 4175#define bfd_elf32_bfd_final_link elf32_hppa_final_link
30667bf3 4176#define bfd_elf32_bfd_link_hash_table_create elf32_hppa_link_hash_table_create
e2d34d7d 4177#define bfd_elf32_bfd_link_hash_table_free elf32_hppa_link_hash_table_free
30667bf3 4178#define elf_backend_adjust_dynamic_symbol elf32_hppa_adjust_dynamic_symbol
ebe50bae 4179#define elf_backend_copy_indirect_symbol elf32_hppa_copy_indirect_symbol
30667bf3
AM
4180#define elf_backend_check_relocs elf32_hppa_check_relocs
4181#define elf_backend_create_dynamic_sections elf32_hppa_create_dynamic_sections
4182#define elf_backend_fake_sections elf_hppa_fake_sections
4183#define elf_backend_relocate_section elf32_hppa_relocate_section
74d1c347 4184#define elf_backend_hide_symbol elf32_hppa_hide_symbol
30667bf3
AM
4185#define elf_backend_finish_dynamic_symbol elf32_hppa_finish_dynamic_symbol
4186#define elf_backend_finish_dynamic_sections elf32_hppa_finish_dynamic_sections
4187#define elf_backend_size_dynamic_sections elf32_hppa_size_dynamic_sections
4188#define elf_backend_gc_mark_hook elf32_hppa_gc_mark_hook
4189#define elf_backend_gc_sweep_hook elf32_hppa_gc_sweep_hook
4190#define elf_backend_object_p elf32_hppa_object_p
4191#define elf_backend_final_write_processing elf_hppa_final_write_processing
d952f17a 4192#define elf_backend_post_process_headers elf32_hppa_post_process_headers
30667bf3 4193#define elf_backend_get_symbol_type elf32_hppa_elf_get_symbol_type
98ceb8ce 4194#define elf_backend_reloc_type_class elf32_hppa_reloc_type_class
30667bf3
AM
4195
4196#define elf_backend_can_gc_sections 1
51b64d56 4197#define elf_backend_can_refcount 1
30667bf3
AM
4198#define elf_backend_plt_alignment 2
4199#define elf_backend_want_got_plt 0
4200#define elf_backend_plt_readonly 0
4201#define elf_backend_want_plt_sym 0
74d1c347 4202#define elf_backend_got_header_size 8
f0fe0e16 4203#define elf_backend_rela_normal 1
252b5132
RH
4204
4205#define TARGET_BIG_SYM bfd_elf32_hppa_vec
4206#define TARGET_BIG_NAME "elf32-hppa"
4207#define ELF_ARCH bfd_arch_hppa
4208#define ELF_MACHINE_CODE EM_PARISC
4209#define ELF_MAXPAGESIZE 0x1000
4210
4211#include "elf32-target.h"
d952f17a
AM
4212
4213#undef TARGET_BIG_SYM
4214#define TARGET_BIG_SYM bfd_elf32_hppa_linux_vec
4215#undef TARGET_BIG_NAME
4216#define TARGET_BIG_NAME "elf32-hppa-linux"
4217
4218#define INCLUDED_TARGET_FILE 1
4219#include "elf32-target.h"
This page took 0.482722 seconds and 4 git commands to generate.