2003-02-07 David Carlton <carlton@math.stanford.edu>
[deliverable/binutils-gdb.git] / bfd / elf32-hppa.c
CommitLineData
252b5132 1/* BFD back-end for HP PA-RISC ELF files.
e5094212
AM
2 Copyright 1990, 1991, 1992, 1993, 1994, 1995, 1996, 1999, 2000, 2001,
3 2002 Free Software Foundation, Inc.
252b5132 4
30667bf3 5 Original code by
252b5132
RH
6 Center for Software Science
7 Department of Computer Science
8 University of Utah
30667bf3 9 Largely rewritten by Alan Modra <alan@linuxcare.com.au>
252b5132
RH
10
11This file is part of BFD, the Binary File Descriptor library.
12
13This program is free software; you can redistribute it and/or modify
14it under the terms of the GNU General Public License as published by
15the Free Software Foundation; either version 2 of the License, or
16(at your option) any later version.
17
18This program is distributed in the hope that it will be useful,
19but WITHOUT ANY WARRANTY; without even the implied warranty of
20MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
21GNU General Public License for more details.
22
23You should have received a copy of the GNU General Public License
24along with this program; if not, write to the Free Software
25Foundation, Inc., 59 Temple Place - Suite 330, Boston, MA 02111-1307, USA. */
26
27#include "bfd.h"
28#include "sysdep.h"
252b5132
RH
29#include "libbfd.h"
30#include "elf-bfd.h"
9e103c9c
JL
31#include "elf/hppa.h"
32#include "libhppa.h"
33#include "elf32-hppa.h"
34#define ARCH_SIZE 32
edd21aca 35#include "elf32-hppa.h"
189c6563 36#include "elf-hppa.h"
9e103c9c 37
74d1c347
AM
38/* In order to gain some understanding of code in this file without
39 knowing all the intricate details of the linker, note the
40 following:
41
42 Functions named elf32_hppa_* are called by external routines, other
43 functions are only called locally. elf32_hppa_* functions appear
44 in this file more or less in the order in which they are called
45 from external routines. eg. elf32_hppa_check_relocs is called
46 early in the link process, elf32_hppa_finish_dynamic_sections is
47 one of the last functions. */
48
edd21aca 49/* We use two hash tables to hold information for linking PA ELF objects.
252b5132
RH
50
51 The first is the elf32_hppa_link_hash_table which is derived
52 from the standard ELF linker hash table. We use this as a place to
53 attach other hash tables and static information.
54
55 The second is the stub hash table which is derived from the
56 base BFD hash table. The stub hash table holds the information
30667bf3
AM
57 necessary to build the linker stubs during a link.
58
59 There are a number of different stubs generated by the linker.
60
61 Long branch stub:
62 : ldil LR'X,%r1
63 : be,n RR'X(%sr4,%r1)
64
65 PIC long branch stub:
66 : b,l .+8,%r1
3ee1d854
AM
67 : addil LR'X - ($PIC_pcrel$0 - 4),%r1
68 : be,n RR'X - ($PIC_pcrel$0 - 8)(%sr4,%r1)
30667bf3
AM
69
70 Import stub to call shared library routine from normal object file
71 (single sub-space version)
3ee1d854
AM
72 : addil LR'lt_ptr+ltoff,%dp ; get procedure entry point
73 : ldw RR'lt_ptr+ltoff(%r1),%r21
46fe4e66 74 : bv %r0(%r21)
3ee1d854 75 : ldw RR'lt_ptr+ltoff+4(%r1),%r19 ; get new dlt value.
30667bf3
AM
76
77 Import stub to call shared library routine from shared library
78 (single sub-space version)
3ee1d854
AM
79 : addil LR'ltoff,%r19 ; get procedure entry point
80 : ldw RR'ltoff(%r1),%r21
46fe4e66 81 : bv %r0(%r21)
3ee1d854 82 : ldw RR'ltoff+4(%r1),%r19 ; get new dlt value.
30667bf3
AM
83
84 Import stub to call shared library routine from normal object file
85 (multiple sub-space support)
3ee1d854
AM
86 : addil LR'lt_ptr+ltoff,%dp ; get procedure entry point
87 : ldw RR'lt_ptr+ltoff(%r1),%r21
88 : ldw RR'lt_ptr+ltoff+4(%r1),%r19 ; get new dlt value.
30667bf3
AM
89 : ldsid (%r21),%r1
90 : mtsp %r1,%sr0
91 : be 0(%sr0,%r21) ; branch to target
92 : stw %rp,-24(%sp) ; save rp
93
94 Import stub to call shared library routine from shared library
95 (multiple sub-space support)
3ee1d854
AM
96 : addil LR'ltoff,%r19 ; get procedure entry point
97 : ldw RR'ltoff(%r1),%r21
98 : ldw RR'ltoff+4(%r1),%r19 ; get new dlt value.
30667bf3
AM
99 : ldsid (%r21),%r1
100 : mtsp %r1,%sr0
101 : be 0(%sr0,%r21) ; branch to target
102 : stw %rp,-24(%sp) ; save rp
103
104 Export stub to return from shared lib routine (multiple sub-space support)
105 One of these is created for each exported procedure in a shared
106 library (and stored in the shared lib). Shared lib routines are
107 called via the first instruction in the export stub so that we can
108 do an inter-space return. Not required for single sub-space.
109 : bl,n X,%rp ; trap the return
110 : nop
111 : ldw -24(%sp),%rp ; restore the original rp
112 : ldsid (%rp),%r1
113 : mtsp %r1,%sr0
74d1c347 114 : be,n 0(%sr0,%rp) ; inter-space return */
30667bf3
AM
115
116#define PLT_ENTRY_SIZE 8
117#define GOT_ENTRY_SIZE 4
118#define ELF_DYNAMIC_INTERPRETER "/lib/ld.so.1"
119
47d89dba
AM
120static const bfd_byte plt_stub[] =
121{
122 0x0e, 0x80, 0x10, 0x96, /* 1: ldw 0(%r20),%r22 */
123 0xea, 0xc0, 0xc0, 0x00, /* bv %r0(%r22) */
124 0x0e, 0x88, 0x10, 0x95, /* ldw 4(%r20),%r21 */
125#define PLT_STUB_ENTRY (3*4)
126 0xea, 0x9f, 0x1f, 0xdd, /* b,l 1b,%r20 */
127 0xd6, 0x80, 0x1c, 0x1e, /* depi 0,31,2,%r20 */
128 0x00, 0xc0, 0xff, 0xee, /* 9: .word fixup_func */
129 0xde, 0xad, 0xbe, 0xef /* .word fixup_ltp */
130};
131
30667bf3
AM
132/* Section name for stubs is the associated section name plus this
133 string. */
134#define STUB_SUFFIX ".stub"
135
98ceb8ce
AM
136/* We don't need to copy certain PC- or GP-relative dynamic relocs
137 into a shared object's dynamic section. All the relocs of the
138 limited class we are interested in, are absolute. */
139#ifndef RELATIVE_DYNRELOCS
140#define RELATIVE_DYNRELOCS 0
446f2863 141#define IS_ABSOLUTE_RELOC(r_type) 1
30667bf3
AM
142#endif
143
30667bf3
AM
144enum elf32_hppa_stub_type {
145 hppa_stub_long_branch,
146 hppa_stub_long_branch_shared,
147 hppa_stub_import,
148 hppa_stub_import_shared,
149 hppa_stub_export,
150 hppa_stub_none
151};
152
30667bf3 153struct elf32_hppa_stub_hash_entry {
252b5132 154
edd21aca 155 /* Base hash table entry structure. */
252b5132
RH
156 struct bfd_hash_entry root;
157
edd21aca
AM
158 /* The stub section. */
159 asection *stub_sec;
160
161 /* Offset within stub_sec of the beginning of this stub. */
30667bf3 162 bfd_vma stub_offset;
252b5132
RH
163
164 /* Given the symbol's value and its section we can determine its final
165 value when building the stubs (so the stub knows where to jump. */
30667bf3 166 bfd_vma target_value;
252b5132 167 asection *target_section;
30667bf3
AM
168
169 enum elf32_hppa_stub_type stub_type;
170
171 /* The symbol table entry, if any, that this was derived from. */
172 struct elf32_hppa_link_hash_entry *h;
173
25f72752
AM
174 /* Where this stub is being called from, or, in the case of combined
175 stub sections, the first input section in the group. */
176 asection *id_sec;
252b5132
RH
177};
178
30667bf3
AM
179struct elf32_hppa_link_hash_entry {
180
181 struct elf_link_hash_entry elf;
182
183 /* A pointer to the most recently used stub hash entry against this
184 symbol. */
185 struct elf32_hppa_stub_hash_entry *stub_cache;
186
30667bf3
AM
187 /* Used to count relocations for delayed sizing of relocation
188 sections. */
189 struct elf32_hppa_dyn_reloc_entry {
190
191 /* Next relocation in the chain. */
192 struct elf32_hppa_dyn_reloc_entry *next;
193
98ceb8ce
AM
194 /* The input section of the reloc. */
195 asection *sec;
30667bf3
AM
196
197 /* Number of relocs copied in this section. */
198 bfd_size_type count;
98ceb8ce
AM
199
200#if RELATIVE_DYNRELOCS
201 /* Number of relative relocs copied for the input section. */
202 bfd_size_type relative_count;
203#endif
204 } *dyn_relocs;
30667bf3 205
12cca0d2
AM
206 /* Set if the only reason we need a .plt entry is for a non-PIC to
207 PIC function call. */
74d1c347
AM
208 unsigned int pic_call:1;
209
210 /* Set if this symbol is used by a plabel reloc. */
211 unsigned int plabel:1;
30667bf3
AM
212};
213
30667bf3
AM
214struct elf32_hppa_link_hash_table {
215
252b5132 216 /* The main hash table. */
ebe50bae 217 struct elf_link_hash_table elf;
252b5132
RH
218
219 /* The stub hash table. */
edd21aca 220 struct bfd_hash_table stub_hash_table;
252b5132 221
30667bf3
AM
222 /* Linker stub bfd. */
223 bfd *stub_bfd;
224
30667bf3
AM
225 /* Linker call-backs. */
226 asection * (*add_stub_section) PARAMS ((const char *, asection *));
227 void (*layout_sections_again) PARAMS ((void));
228
25f72752
AM
229 /* Array to keep track of which stub sections have been created, and
230 information on stub grouping. */
231 struct map_stub {
232 /* This is the section to which stubs in the group will be
233 attached. */
234 asection *link_sec;
235 /* The stub section. */
236 asection *stub_sec;
25f72752 237 } *stub_group;
30667bf3 238
b4655ea9
AM
239 /* Assorted information used by elf32_hppa_size_stubs. */
240 unsigned int bfd_count;
241 int top_index;
242 asection **input_list;
243 Elf_Internal_Sym **all_local_syms;
244
30667bf3
AM
245 /* Short-cuts to get to dynamic linker sections. */
246 asection *sgot;
247 asection *srelgot;
248 asection *splt;
249 asection *srelplt;
250 asection *sdynbss;
251 asection *srelbss;
47d89dba 252
c46b7515
AM
253 /* Used during a final link to store the base of the text and data
254 segments so that we can perform SEGREL relocations. */
255 bfd_vma text_segment_base;
256 bfd_vma data_segment_base;
257
47d89dba
AM
258 /* Whether we support multiple sub-spaces for shared libs. */
259 unsigned int multi_subspace:1;
260
067fa4a6 261 /* Flags set when various size branches are detected. Used to
47d89dba
AM
262 select suitable defaults for the stub group size. */
263 unsigned int has_12bit_branch:1;
264 unsigned int has_17bit_branch:1;
067fa4a6 265 unsigned int has_22bit_branch:1;
47d89dba
AM
266
267 /* Set if we need a .plt stub to support lazy dynamic linking. */
268 unsigned int need_plt_stub:1;
ec338859
AM
269
270 /* Small local sym to section mapping cache. */
271 struct sym_sec_cache sym_sec;
252b5132
RH
272};
273
30667bf3
AM
274/* Various hash macros and functions. */
275#define hppa_link_hash_table(p) \
edd21aca 276 ((struct elf32_hppa_link_hash_table *) ((p)->hash))
252b5132 277
30667bf3
AM
278#define hppa_stub_hash_lookup(table, string, create, copy) \
279 ((struct elf32_hppa_stub_hash_entry *) \
280 bfd_hash_lookup ((table), (string), (create), (copy)))
281
282static struct bfd_hash_entry *stub_hash_newfunc
283 PARAMS ((struct bfd_hash_entry *, struct bfd_hash_table *, const char *));
edd21aca 284
30667bf3 285static struct bfd_hash_entry *hppa_link_hash_newfunc
edd21aca 286 PARAMS ((struct bfd_hash_entry *, struct bfd_hash_table *, const char *));
252b5132
RH
287
288static struct bfd_link_hash_table *elf32_hppa_link_hash_table_create
289 PARAMS ((bfd *));
290
e2d34d7d
DJ
291static void elf32_hppa_link_hash_table_free
292 PARAMS ((struct bfd_link_hash_table *));
293
30667bf3
AM
294/* Stub handling functions. */
295static char *hppa_stub_name
296 PARAMS ((const asection *, const asection *,
297 const struct elf32_hppa_link_hash_entry *,
298 const Elf_Internal_Rela *));
edd21aca 299
30667bf3
AM
300static struct elf32_hppa_stub_hash_entry *hppa_get_stub_entry
301 PARAMS ((const asection *, const asection *,
302 struct elf32_hppa_link_hash_entry *,
25f72752
AM
303 const Elf_Internal_Rela *,
304 struct elf32_hppa_link_hash_table *));
edd21aca 305
30667bf3 306static struct elf32_hppa_stub_hash_entry *hppa_add_stub
25f72752 307 PARAMS ((const char *, asection *, struct elf32_hppa_link_hash_table *));
30667bf3
AM
308
309static enum elf32_hppa_stub_type hppa_type_of_stub
310 PARAMS ((asection *, const Elf_Internal_Rela *,
311 struct elf32_hppa_link_hash_entry *, bfd_vma));
312
b34976b6 313static bfd_boolean hppa_build_one_stub
30667bf3
AM
314 PARAMS ((struct bfd_hash_entry *, PTR));
315
b34976b6 316static bfd_boolean hppa_size_one_stub
30667bf3
AM
317 PARAMS ((struct bfd_hash_entry *, PTR));
318
30667bf3 319/* BFD and elf backend functions. */
b34976b6 320static bfd_boolean elf32_hppa_object_p PARAMS ((bfd *));
252b5132 321
b34976b6 322static bfd_boolean elf32_hppa_add_symbol_hook
edd21aca
AM
323 PARAMS ((bfd *, struct bfd_link_info *, const Elf_Internal_Sym *,
324 const char **, flagword *, asection **, bfd_vma *));
252b5132 325
b34976b6 326static bfd_boolean elf32_hppa_create_dynamic_sections
30667bf3 327 PARAMS ((bfd *, struct bfd_link_info *));
252b5132 328
ebe50bae 329static void elf32_hppa_copy_indirect_symbol
b48fa14c
AM
330 PARAMS ((struct elf_backend_data *, struct elf_link_hash_entry *,
331 struct elf_link_hash_entry *));
ebe50bae 332
b34976b6 333static bfd_boolean elf32_hppa_check_relocs
30667bf3
AM
334 PARAMS ((bfd *, struct bfd_link_info *,
335 asection *, const Elf_Internal_Rela *));
336
337static asection *elf32_hppa_gc_mark_hook
1e2f5b6e 338 PARAMS ((asection *, struct bfd_link_info *, Elf_Internal_Rela *,
30667bf3
AM
339 struct elf_link_hash_entry *, Elf_Internal_Sym *));
340
b34976b6 341static bfd_boolean elf32_hppa_gc_sweep_hook
30667bf3
AM
342 PARAMS ((bfd *, struct bfd_link_info *,
343 asection *, const Elf_Internal_Rela *));
344
74d1c347 345static void elf32_hppa_hide_symbol
b34976b6 346 PARAMS ((struct bfd_link_info *, struct elf_link_hash_entry *, bfd_boolean));
74d1c347 347
b34976b6 348static bfd_boolean elf32_hppa_adjust_dynamic_symbol
30667bf3
AM
349 PARAMS ((struct bfd_link_info *, struct elf_link_hash_entry *));
350
b34976b6 351static bfd_boolean mark_PIC_calls
a8d02d66
AM
352 PARAMS ((struct elf_link_hash_entry *, PTR));
353
b34976b6 354static bfd_boolean allocate_plt_static
30667bf3
AM
355 PARAMS ((struct elf_link_hash_entry *, PTR));
356
b34976b6 357static bfd_boolean allocate_dynrelocs
98ceb8ce
AM
358 PARAMS ((struct elf_link_hash_entry *, PTR));
359
b34976b6 360static bfd_boolean readonly_dynrelocs
30667bf3 361 PARAMS ((struct elf_link_hash_entry *, PTR));
30667bf3 362
b34976b6 363static bfd_boolean clobber_millicode_symbols
d5c73c2f
AM
364 PARAMS ((struct elf_link_hash_entry *, struct bfd_link_info *));
365
b34976b6 366static bfd_boolean elf32_hppa_size_dynamic_sections
30667bf3
AM
367 PARAMS ((bfd *, struct bfd_link_info *));
368
b4655ea9 369static void group_sections
b34976b6 370 PARAMS ((struct elf32_hppa_link_hash_table *, bfd_size_type, bfd_boolean));
b4655ea9
AM
371
372static int get_local_syms
373 PARAMS ((bfd *, bfd *, struct bfd_link_info *));
374
b34976b6 375static bfd_boolean elf32_hppa_final_link
c46b7515
AM
376 PARAMS ((bfd *, struct bfd_link_info *));
377
378static void hppa_record_segment_addr
379 PARAMS ((bfd *, asection *, PTR));
380
30667bf3
AM
381static bfd_reloc_status_type final_link_relocate
382 PARAMS ((asection *, bfd_byte *, const Elf_Internal_Rela *,
25f72752 383 bfd_vma, struct elf32_hppa_link_hash_table *, asection *,
30667bf3
AM
384 struct elf32_hppa_link_hash_entry *));
385
b34976b6 386static bfd_boolean elf32_hppa_relocate_section
30667bf3
AM
387 PARAMS ((bfd *, struct bfd_link_info *, bfd *, asection *,
388 bfd_byte *, Elf_Internal_Rela *, Elf_Internal_Sym *, asection **));
389
b34976b6 390static bfd_boolean elf32_hppa_finish_dynamic_symbol
30667bf3
AM
391 PARAMS ((bfd *, struct bfd_link_info *,
392 struct elf_link_hash_entry *, Elf_Internal_Sym *));
393
98ceb8ce
AM
394static enum elf_reloc_type_class elf32_hppa_reloc_type_class
395 PARAMS ((const Elf_Internal_Rela *));
396
b34976b6 397static bfd_boolean elf32_hppa_finish_dynamic_sections
30667bf3
AM
398 PARAMS ((bfd *, struct bfd_link_info *));
399
d952f17a
AM
400static void elf32_hppa_post_process_headers
401 PARAMS ((bfd *, struct bfd_link_info *));
402
30667bf3
AM
403static int elf32_hppa_elf_get_symbol_type
404 PARAMS ((Elf_Internal_Sym *, int));
252b5132 405
252b5132
RH
406/* Assorted hash table functions. */
407
408/* Initialize an entry in the stub hash table. */
409
410static struct bfd_hash_entry *
30667bf3 411stub_hash_newfunc (entry, table, string)
252b5132
RH
412 struct bfd_hash_entry *entry;
413 struct bfd_hash_table *table;
414 const char *string;
415{
252b5132
RH
416 /* Allocate the structure if it has not already been allocated by a
417 subclass. */
ebe50bae 418 if (entry == NULL)
30667bf3 419 {
ebe50bae
AM
420 entry = bfd_hash_allocate (table,
421 sizeof (struct elf32_hppa_stub_hash_entry));
422 if (entry == NULL)
423 return entry;
30667bf3 424 }
252b5132
RH
425
426 /* Call the allocation method of the superclass. */
ebe50bae
AM
427 entry = bfd_hash_newfunc (entry, table, string);
428 if (entry != NULL)
252b5132 429 {
ebe50bae
AM
430 struct elf32_hppa_stub_hash_entry *eh;
431
252b5132 432 /* Initialize the local fields. */
ebe50bae
AM
433 eh = (struct elf32_hppa_stub_hash_entry *) entry;
434 eh->stub_sec = NULL;
435 eh->stub_offset = 0;
436 eh->target_value = 0;
437 eh->target_section = NULL;
438 eh->stub_type = hppa_stub_long_branch;
439 eh->h = NULL;
440 eh->id_sec = NULL;
30667bf3
AM
441 }
442
ebe50bae 443 return entry;
30667bf3
AM
444}
445
30667bf3
AM
446/* Initialize an entry in the link hash table. */
447
448static struct bfd_hash_entry *
449hppa_link_hash_newfunc (entry, table, string)
450 struct bfd_hash_entry *entry;
451 struct bfd_hash_table *table;
452 const char *string;
453{
30667bf3
AM
454 /* Allocate the structure if it has not already been allocated by a
455 subclass. */
ebe50bae 456 if (entry == NULL)
30667bf3 457 {
ebe50bae
AM
458 entry = bfd_hash_allocate (table,
459 sizeof (struct elf32_hppa_link_hash_entry));
460 if (entry == NULL)
461 return entry;
30667bf3
AM
462 }
463
464 /* Call the allocation method of the superclass. */
ebe50bae
AM
465 entry = _bfd_elf_link_hash_newfunc (entry, table, string);
466 if (entry != NULL)
30667bf3 467 {
ebe50bae
AM
468 struct elf32_hppa_link_hash_entry *eh;
469
30667bf3 470 /* Initialize the local fields. */
ebe50bae
AM
471 eh = (struct elf32_hppa_link_hash_entry *) entry;
472 eh->stub_cache = NULL;
473 eh->dyn_relocs = NULL;
ebe50bae
AM
474 eh->pic_call = 0;
475 eh->plabel = 0;
252b5132
RH
476 }
477
ebe50bae 478 return entry;
252b5132
RH
479}
480
252b5132
RH
481/* Create the derived linker hash table. The PA ELF port uses the derived
482 hash table to keep information specific to the PA ELF linker (without
483 using static variables). */
484
485static struct bfd_link_hash_table *
486elf32_hppa_link_hash_table_create (abfd)
487 bfd *abfd;
488{
489 struct elf32_hppa_link_hash_table *ret;
dc810e39 490 bfd_size_type amt = sizeof (*ret);
252b5132 491
e2d34d7d 492 ret = (struct elf32_hppa_link_hash_table *) bfd_malloc (amt);
252b5132
RH
493 if (ret == NULL)
494 return NULL;
edd21aca 495
ebe50bae 496 if (!_bfd_elf_link_hash_table_init (&ret->elf, abfd, hppa_link_hash_newfunc))
252b5132 497 {
e2d34d7d 498 free (ret);
252b5132
RH
499 return NULL;
500 }
edd21aca
AM
501
502 /* Init the stub hash table too. */
30667bf3 503 if (!bfd_hash_table_init (&ret->stub_hash_table, stub_hash_newfunc))
edd21aca
AM
504 return NULL;
505
30667bf3 506 ret->stub_bfd = NULL;
30667bf3
AM
507 ret->add_stub_section = NULL;
508 ret->layout_sections_again = NULL;
25f72752 509 ret->stub_group = NULL;
30667bf3
AM
510 ret->sgot = NULL;
511 ret->srelgot = NULL;
512 ret->splt = NULL;
513 ret->srelplt = NULL;
514 ret->sdynbss = NULL;
515 ret->srelbss = NULL;
c46b7515
AM
516 ret->text_segment_base = (bfd_vma) -1;
517 ret->data_segment_base = (bfd_vma) -1;
47d89dba
AM
518 ret->multi_subspace = 0;
519 ret->has_12bit_branch = 0;
520 ret->has_17bit_branch = 0;
067fa4a6 521 ret->has_22bit_branch = 0;
47d89dba 522 ret->need_plt_stub = 0;
ec338859 523 ret->sym_sec.abfd = NULL;
252b5132 524
ebe50bae 525 return &ret->elf.root;
252b5132
RH
526}
527
e2d34d7d
DJ
528/* Free the derived linker hash table. */
529
530static void
531elf32_hppa_link_hash_table_free (hash)
532 struct bfd_link_hash_table *hash;
533{
534 struct elf32_hppa_link_hash_table *ret
535 = (struct elf32_hppa_link_hash_table *) hash;
536
537 bfd_hash_table_free (&ret->stub_hash_table);
538 _bfd_generic_link_hash_table_free (hash);
539}
540
30667bf3
AM
541/* Build a name for an entry in the stub hash table. */
542
edd21aca 543static char *
30667bf3 544hppa_stub_name (input_section, sym_sec, hash, rel)
edd21aca 545 const asection *input_section;
30667bf3
AM
546 const asection *sym_sec;
547 const struct elf32_hppa_link_hash_entry *hash;
548 const Elf_Internal_Rela *rel;
edd21aca
AM
549{
550 char *stub_name;
dc810e39 551 bfd_size_type len;
edd21aca 552
30667bf3
AM
553 if (hash)
554 {
555 len = 8 + 1 + strlen (hash->elf.root.root.string) + 1 + 8 + 1;
556 stub_name = bfd_malloc (len);
557 if (stub_name != NULL)
558 {
559 sprintf (stub_name, "%08x_%s+%x",
560 input_section->id & 0xffffffff,
561 hash->elf.root.root.string,
562 (int) rel->r_addend & 0xffffffff);
563 }
564 }
565 else
edd21aca 566 {
30667bf3
AM
567 len = 8 + 1 + 8 + 1 + 8 + 1 + 8 + 1;
568 stub_name = bfd_malloc (len);
569 if (stub_name != NULL)
570 {
571 sprintf (stub_name, "%08x_%x:%x+%x",
572 input_section->id & 0xffffffff,
573 sym_sec->id & 0xffffffff,
574 (int) ELF32_R_SYM (rel->r_info) & 0xffffffff,
575 (int) rel->r_addend & 0xffffffff);
576 }
edd21aca
AM
577 }
578 return stub_name;
579}
252b5132 580
30667bf3
AM
581/* Look up an entry in the stub hash. Stub entries are cached because
582 creating the stub name takes a bit of time. */
583
584static struct elf32_hppa_stub_hash_entry *
83c81bfe 585hppa_get_stub_entry (input_section, sym_sec, hash, rel, htab)
30667bf3
AM
586 const asection *input_section;
587 const asection *sym_sec;
588 struct elf32_hppa_link_hash_entry *hash;
589 const Elf_Internal_Rela *rel;
83c81bfe 590 struct elf32_hppa_link_hash_table *htab;
252b5132 591{
30667bf3 592 struct elf32_hppa_stub_hash_entry *stub_entry;
25f72752
AM
593 const asection *id_sec;
594
595 /* If this input section is part of a group of sections sharing one
596 stub section, then use the id of the first section in the group.
597 Stub names need to include a section id, as there may well be
598 more than one stub used to reach say, printf, and we need to
599 distinguish between them. */
83c81bfe 600 id_sec = htab->stub_group[input_section->id].link_sec;
edd21aca 601
30667bf3
AM
602 if (hash != NULL && hash->stub_cache != NULL
603 && hash->stub_cache->h == hash
25f72752 604 && hash->stub_cache->id_sec == id_sec)
edd21aca 605 {
30667bf3
AM
606 stub_entry = hash->stub_cache;
607 }
608 else
609 {
30667bf3 610 char *stub_name;
edd21aca 611
25f72752 612 stub_name = hppa_stub_name (id_sec, sym_sec, hash, rel);
30667bf3
AM
613 if (stub_name == NULL)
614 return NULL;
edd21aca 615
83c81bfe 616 stub_entry = hppa_stub_hash_lookup (&htab->stub_hash_table,
b34976b6 617 stub_name, FALSE, FALSE);
f09ebc7d
AM
618 if (hash != NULL)
619 hash->stub_cache = stub_entry;
30667bf3
AM
620
621 free (stub_name);
edd21aca 622 }
30667bf3
AM
623
624 return stub_entry;
625}
626
30667bf3
AM
627/* Add a new stub entry to the stub hash. Not all fields of the new
628 stub entry are initialised. */
629
630static struct elf32_hppa_stub_hash_entry *
83c81bfe 631hppa_add_stub (stub_name, section, htab)
30667bf3
AM
632 const char *stub_name;
633 asection *section;
83c81bfe 634 struct elf32_hppa_link_hash_table *htab;
30667bf3 635{
25f72752 636 asection *link_sec;
30667bf3 637 asection *stub_sec;
30667bf3 638 struct elf32_hppa_stub_hash_entry *stub_entry;
edd21aca 639
83c81bfe
AM
640 link_sec = htab->stub_group[section->id].link_sec;
641 stub_sec = htab->stub_group[section->id].stub_sec;
30667bf3 642 if (stub_sec == NULL)
edd21aca 643 {
83c81bfe 644 stub_sec = htab->stub_group[link_sec->id].stub_sec;
30667bf3
AM
645 if (stub_sec == NULL)
646 {
d4c88bbb 647 size_t namelen;
dc810e39 648 bfd_size_type len;
30667bf3
AM
649 char *s_name;
650
d4c88bbb
AM
651 namelen = strlen (link_sec->name);
652 len = namelen + sizeof (STUB_SUFFIX);
83c81bfe 653 s_name = bfd_alloc (htab->stub_bfd, len);
30667bf3
AM
654 if (s_name == NULL)
655 return NULL;
656
d4c88bbb
AM
657 memcpy (s_name, link_sec->name, namelen);
658 memcpy (s_name + namelen, STUB_SUFFIX, sizeof (STUB_SUFFIX));
83c81bfe 659 stub_sec = (*htab->add_stub_section) (s_name, link_sec);
30667bf3
AM
660 if (stub_sec == NULL)
661 return NULL;
83c81bfe 662 htab->stub_group[link_sec->id].stub_sec = stub_sec;
30667bf3 663 }
83c81bfe 664 htab->stub_group[section->id].stub_sec = stub_sec;
edd21aca 665 }
252b5132 666
30667bf3 667 /* Enter this entry into the linker stub hash table. */
83c81bfe 668 stub_entry = hppa_stub_hash_lookup (&htab->stub_hash_table, stub_name,
b34976b6 669 TRUE, FALSE);
30667bf3
AM
670 if (stub_entry == NULL)
671 {
672 (*_bfd_error_handler) (_("%s: cannot create stub entry %s"),
8f615d07 673 bfd_archive_filename (section->owner),
30667bf3
AM
674 stub_name);
675 return NULL;
edd21aca
AM
676 }
677
30667bf3 678 stub_entry->stub_sec = stub_sec;
30667bf3 679 stub_entry->stub_offset = 0;
25f72752 680 stub_entry->id_sec = link_sec;
30667bf3 681 return stub_entry;
edd21aca
AM
682}
683
30667bf3
AM
684/* Determine the type of stub needed, if any, for a call. */
685
686static enum elf32_hppa_stub_type
687hppa_type_of_stub (input_sec, rel, hash, destination)
688 asection *input_sec;
689 const Elf_Internal_Rela *rel;
690 struct elf32_hppa_link_hash_entry *hash;
691 bfd_vma destination;
edd21aca 692{
edd21aca 693 bfd_vma location;
30667bf3
AM
694 bfd_vma branch_offset;
695 bfd_vma max_branch_offset;
696 unsigned int r_type;
697
698 if (hash != NULL
067fa4a6
AM
699 && hash->elf.plt.offset != (bfd_vma) -1
700 && (hash->elf.dynindx != -1 || hash->pic_call)
701 && !hash->plabel)
30667bf3 702 {
067fa4a6
AM
703 /* We need an import stub. Decide between hppa_stub_import
704 and hppa_stub_import_shared later. */
30667bf3
AM
705 return hppa_stub_import;
706 }
edd21aca 707
30667bf3
AM
708 /* Determine where the call point is. */
709 location = (input_sec->output_offset
710 + input_sec->output_section->vma
711 + rel->r_offset);
edd21aca 712
30667bf3
AM
713 branch_offset = destination - location - 8;
714 r_type = ELF32_R_TYPE (rel->r_info);
edd21aca 715
30667bf3
AM
716 /* Determine if a long branch stub is needed. parisc branch offsets
717 are relative to the second instruction past the branch, ie. +8
718 bytes on from the branch instruction location. The offset is
719 signed and counts in units of 4 bytes. */
720 if (r_type == (unsigned int) R_PARISC_PCREL17F)
edd21aca 721 {
30667bf3
AM
722 max_branch_offset = (1 << (17-1)) << 2;
723 }
724 else if (r_type == (unsigned int) R_PARISC_PCREL12F)
725 {
726 max_branch_offset = (1 << (12-1)) << 2;
727 }
25f72752 728 else /* R_PARISC_PCREL22F. */
30667bf3
AM
729 {
730 max_branch_offset = (1 << (22-1)) << 2;
edd21aca
AM
731 }
732
30667bf3 733 if (branch_offset + max_branch_offset >= 2*max_branch_offset)
98ceb8ce
AM
734 return hppa_stub_long_branch;
735
30667bf3
AM
736 return hppa_stub_none;
737}
edd21aca 738
30667bf3
AM
739/* Build one linker stub as defined by the stub hash table entry GEN_ENTRY.
740 IN_ARG contains the link info pointer. */
edd21aca 741
30667bf3
AM
742#define LDIL_R1 0x20200000 /* ldil LR'XXX,%r1 */
743#define BE_SR4_R1 0xe0202002 /* be,n RR'XXX(%sr4,%r1) */
edd21aca 744
30667bf3 745#define BL_R1 0xe8200000 /* b,l .+8,%r1 */
3ee1d854 746#define ADDIL_R1 0x28200000 /* addil LR'XXX,%r1,%r1 */
30667bf3 747#define DEPI_R1 0xd4201c1e /* depi 0,31,2,%r1 */
252b5132 748
3ee1d854
AM
749#define ADDIL_DP 0x2b600000 /* addil LR'XXX,%dp,%r1 */
750#define LDW_R1_R21 0x48350000 /* ldw RR'XXX(%sr0,%r1),%r21 */
30667bf3 751#define BV_R0_R21 0xeaa0c000 /* bv %r0(%r21) */
3ee1d854 752#define LDW_R1_R19 0x48330000 /* ldw RR'XXX(%sr0,%r1),%r19 */
252b5132 753
3ee1d854
AM
754#define ADDIL_R19 0x2a600000 /* addil LR'XXX,%r19,%r1 */
755#define LDW_R1_DP 0x483b0000 /* ldw RR'XXX(%sr0,%r1),%dp */
edd21aca 756
30667bf3
AM
757#define LDSID_R21_R1 0x02a010a1 /* ldsid (%sr0,%r21),%r1 */
758#define MTSP_R1 0x00011820 /* mtsp %r1,%sr0 */
759#define BE_SR0_R21 0xe2a00000 /* be 0(%sr0,%r21) */
760#define STW_RP 0x6bc23fd1 /* stw %rp,-24(%sr0,%sp) */
edd21aca 761
067fa4a6 762#define BL22_RP 0xe800a002 /* b,l,n XXX,%rp */
30667bf3
AM
763#define BL_RP 0xe8400002 /* b,l,n XXX,%rp */
764#define NOP 0x08000240 /* nop */
765#define LDW_RP 0x4bc23fd1 /* ldw -24(%sr0,%sp),%rp */
766#define LDSID_RP_R1 0x004010a1 /* ldsid (%sr0,%rp),%r1 */
767#define BE_SR0_RP 0xe0400002 /* be,n 0(%sr0,%rp) */
edd21aca 768
30667bf3
AM
769#ifndef R19_STUBS
770#define R19_STUBS 1
771#endif
edd21aca 772
30667bf3
AM
773#if R19_STUBS
774#define LDW_R1_DLT LDW_R1_R19
775#else
776#define LDW_R1_DLT LDW_R1_DP
777#endif
edd21aca 778
b34976b6 779static bfd_boolean
30667bf3
AM
780hppa_build_one_stub (gen_entry, in_arg)
781 struct bfd_hash_entry *gen_entry;
782 PTR in_arg;
783{
784 struct elf32_hppa_stub_hash_entry *stub_entry;
785 struct bfd_link_info *info;
83c81bfe 786 struct elf32_hppa_link_hash_table *htab;
30667bf3
AM
787 asection *stub_sec;
788 bfd *stub_bfd;
789 bfd_byte *loc;
790 bfd_vma sym_value;
74d1c347 791 bfd_vma insn;
8dea1268 792 bfd_vma off;
74d1c347 793 int val;
30667bf3 794 int size;
edd21aca 795
30667bf3
AM
796 /* Massage our args to the form they really have. */
797 stub_entry = (struct elf32_hppa_stub_hash_entry *) gen_entry;
798 info = (struct bfd_link_info *) in_arg;
799
83c81bfe 800 htab = hppa_link_hash_table (info);
30667bf3 801 stub_sec = stub_entry->stub_sec;
edd21aca 802
30667bf3 803 /* Make a note of the offset within the stubs for this entry. */
74d1c347 804 stub_entry->stub_offset = stub_sec->_raw_size;
30667bf3 805 loc = stub_sec->contents + stub_entry->stub_offset;
252b5132 806
30667bf3
AM
807 stub_bfd = stub_sec->owner;
808
809 switch (stub_entry->stub_type)
810 {
811 case hppa_stub_long_branch:
812 /* Create the long branch. A long branch is formed with "ldil"
813 loading the upper bits of the target address into a register,
814 then branching with "be" which adds in the lower bits.
815 The "be" has its delay slot nullified. */
816 sym_value = (stub_entry->target_value
817 + stub_entry->target_section->output_offset
818 + stub_entry->target_section->output_section->vma);
819
74d1c347
AM
820 val = hppa_field_adjust (sym_value, (bfd_signed_vma) 0, e_lrsel);
821 insn = hppa_rebuild_insn ((int) LDIL_R1, val, 21);
30667bf3
AM
822 bfd_put_32 (stub_bfd, insn, loc);
823
74d1c347
AM
824 val = hppa_field_adjust (sym_value, (bfd_signed_vma) 0, e_rrsel) >> 2;
825 insn = hppa_rebuild_insn ((int) BE_SR4_R1, val, 17);
30667bf3
AM
826 bfd_put_32 (stub_bfd, insn, loc + 4);
827
30667bf3 828 size = 8;
edd21aca
AM
829 break;
830
30667bf3
AM
831 case hppa_stub_long_branch_shared:
832 /* Branches are relative. This is where we are going to. */
833 sym_value = (stub_entry->target_value
834 + stub_entry->target_section->output_offset
835 + stub_entry->target_section->output_section->vma);
836
837 /* And this is where we are coming from, more or less. */
838 sym_value -= (stub_entry->stub_offset
839 + stub_sec->output_offset
840 + stub_sec->output_section->vma);
841
74d1c347 842 bfd_put_32 (stub_bfd, (bfd_vma) BL_R1, loc);
47d89dba 843 val = hppa_field_adjust (sym_value, (bfd_signed_vma) -8, e_lrsel);
74d1c347 844 insn = hppa_rebuild_insn ((int) ADDIL_R1, val, 21);
30667bf3
AM
845 bfd_put_32 (stub_bfd, insn, loc + 4);
846
47d89dba 847 val = hppa_field_adjust (sym_value, (bfd_signed_vma) -8, e_rrsel) >> 2;
74d1c347 848 insn = hppa_rebuild_insn ((int) BE_SR4_R1, val, 17);
30667bf3
AM
849 bfd_put_32 (stub_bfd, insn, loc + 8);
850 size = 12;
851 break;
edd21aca 852
30667bf3
AM
853 case hppa_stub_import:
854 case hppa_stub_import_shared:
8dea1268
AM
855 off = stub_entry->h->elf.plt.offset;
856 if (off >= (bfd_vma) -2)
49e9d0d3 857 abort ();
8dea1268
AM
858
859 off &= ~ (bfd_vma) 1;
860 sym_value = (off
83c81bfe
AM
861 + htab->splt->output_offset
862 + htab->splt->output_section->vma
863 - elf_gp (htab->splt->output_section->owner));
30667bf3
AM
864
865 insn = ADDIL_DP;
866#if R19_STUBS
867 if (stub_entry->stub_type == hppa_stub_import_shared)
868 insn = ADDIL_R19;
869#endif
47d89dba 870 val = hppa_field_adjust (sym_value, (bfd_signed_vma) 0, e_lrsel),
74d1c347 871 insn = hppa_rebuild_insn ((int) insn, val, 21);
30667bf3 872 bfd_put_32 (stub_bfd, insn, loc);
edd21aca 873
47d89dba
AM
874 /* It is critical to use lrsel/rrsel here because we are using
875 two different offsets (+0 and +4) from sym_value. If we use
876 lsel/rsel then with unfortunate sym_values we will round
877 sym_value+4 up to the next 2k block leading to a mis-match
878 between the lsel and rsel value. */
879 val = hppa_field_adjust (sym_value, (bfd_signed_vma) 0, e_rrsel);
74d1c347 880 insn = hppa_rebuild_insn ((int) LDW_R1_R21, val, 14);
30667bf3 881 bfd_put_32 (stub_bfd, insn, loc + 4);
252b5132 882
83c81bfe 883 if (htab->multi_subspace)
30667bf3 884 {
47d89dba 885 val = hppa_field_adjust (sym_value, (bfd_signed_vma) 4, e_rrsel);
74d1c347 886 insn = hppa_rebuild_insn ((int) LDW_R1_DLT, val, 14);
30667bf3 887 bfd_put_32 (stub_bfd, insn, loc + 8);
252b5132 888
74d1c347
AM
889 bfd_put_32 (stub_bfd, (bfd_vma) LDSID_R21_R1, loc + 12);
890 bfd_put_32 (stub_bfd, (bfd_vma) MTSP_R1, loc + 16);
891 bfd_put_32 (stub_bfd, (bfd_vma) BE_SR0_R21, loc + 20);
892 bfd_put_32 (stub_bfd, (bfd_vma) STW_RP, loc + 24);
252b5132 893
30667bf3
AM
894 size = 28;
895 }
896 else
897 {
74d1c347 898 bfd_put_32 (stub_bfd, (bfd_vma) BV_R0_R21, loc + 8);
47d89dba 899 val = hppa_field_adjust (sym_value, (bfd_signed_vma) 4, e_rrsel);
74d1c347 900 insn = hppa_rebuild_insn ((int) LDW_R1_DLT, val, 14);
30667bf3 901 bfd_put_32 (stub_bfd, insn, loc + 12);
252b5132 902
30667bf3
AM
903 size = 16;
904 }
252b5132 905
30667bf3
AM
906 if (!info->shared
907 && stub_entry->h != NULL
908 && stub_entry->h->pic_call)
252b5132 909 {
30667bf3
AM
910 /* Build the .plt entry needed to call a PIC function from
911 statically linked code. We don't need any relocs. */
912 bfd *dynobj;
913 struct elf32_hppa_link_hash_entry *eh;
914 bfd_vma value;
252b5132 915
ebe50bae 916 dynobj = htab->elf.dynobj;
30667bf3 917 eh = (struct elf32_hppa_link_hash_entry *) stub_entry->h;
252b5132 918
49e9d0d3
AM
919 if (eh->elf.root.type != bfd_link_hash_defined
920 && eh->elf.root.type != bfd_link_hash_defweak)
921 abort ();
252b5132 922
30667bf3
AM
923 value = (eh->elf.root.u.def.value
924 + eh->elf.root.u.def.section->output_offset
925 + eh->elf.root.u.def.section->output_section->vma);
252b5132 926
30667bf3 927 /* Fill in the entry in the procedure linkage table.
252b5132 928
30667bf3 929 The format of a plt entry is
74d1c347
AM
930 <funcaddr>
931 <__gp>. */
252b5132 932
83c81bfe
AM
933 bfd_put_32 (htab->splt->owner, value,
934 htab->splt->contents + off);
935 value = elf_gp (htab->splt->output_section->owner);
936 bfd_put_32 (htab->splt->owner, value,
937 htab->splt->contents + off + 4);
252b5132 938 }
30667bf3 939 break;
252b5132 940
30667bf3
AM
941 case hppa_stub_export:
942 /* Branches are relative. This is where we are going to. */
943 sym_value = (stub_entry->target_value
944 + stub_entry->target_section->output_offset
945 + stub_entry->target_section->output_section->vma);
252b5132 946
30667bf3
AM
947 /* And this is where we are coming from. */
948 sym_value -= (stub_entry->stub_offset
949 + stub_sec->output_offset
950 + stub_sec->output_section->vma);
edd21aca 951
067fa4a6
AM
952 if (sym_value - 8 + (1 << (17 + 1)) >= (1 << (17 + 2))
953 && (!htab->has_22bit_branch
954 || sym_value - 8 + (1 << (22 + 1)) >= (1 << (22 + 2))))
30667bf3 955 {
edd21aca 956 (*_bfd_error_handler)
30667bf3 957 (_("%s(%s+0x%lx): cannot reach %s, recompile with -ffunction-sections"),
8f615d07 958 bfd_archive_filename (stub_entry->target_section->owner),
30667bf3
AM
959 stub_sec->name,
960 (long) stub_entry->stub_offset,
961 stub_entry->root.string);
962 bfd_set_error (bfd_error_bad_value);
b34976b6 963 return FALSE;
252b5132 964 }
30667bf3 965
74d1c347 966 val = hppa_field_adjust (sym_value, (bfd_signed_vma) -8, e_fsel) >> 2;
067fa4a6
AM
967 if (!htab->has_22bit_branch)
968 insn = hppa_rebuild_insn ((int) BL_RP, val, 17);
969 else
970 insn = hppa_rebuild_insn ((int) BL22_RP, val, 22);
30667bf3
AM
971 bfd_put_32 (stub_bfd, insn, loc);
972
74d1c347
AM
973 bfd_put_32 (stub_bfd, (bfd_vma) NOP, loc + 4);
974 bfd_put_32 (stub_bfd, (bfd_vma) LDW_RP, loc + 8);
975 bfd_put_32 (stub_bfd, (bfd_vma) LDSID_RP_R1, loc + 12);
976 bfd_put_32 (stub_bfd, (bfd_vma) MTSP_R1, loc + 16);
977 bfd_put_32 (stub_bfd, (bfd_vma) BE_SR0_RP, loc + 20);
30667bf3
AM
978
979 /* Point the function symbol at the stub. */
980 stub_entry->h->elf.root.u.def.section = stub_sec;
74d1c347 981 stub_entry->h->elf.root.u.def.value = stub_sec->_raw_size;
30667bf3
AM
982
983 size = 24;
984 break;
985
986 default:
987 BFD_FAIL ();
b34976b6 988 return FALSE;
252b5132
RH
989 }
990
74d1c347 991 stub_sec->_raw_size += size;
b34976b6 992 return TRUE;
252b5132
RH
993}
994
30667bf3
AM
995#undef LDIL_R1
996#undef BE_SR4_R1
997#undef BL_R1
998#undef ADDIL_R1
999#undef DEPI_R1
1000#undef ADDIL_DP
1001#undef LDW_R1_R21
1002#undef LDW_R1_DLT
1003#undef LDW_R1_R19
1004#undef ADDIL_R19
1005#undef LDW_R1_DP
1006#undef LDSID_R21_R1
1007#undef MTSP_R1
1008#undef BE_SR0_R21
1009#undef STW_RP
1010#undef BV_R0_R21
1011#undef BL_RP
1012#undef NOP
1013#undef LDW_RP
1014#undef LDSID_RP_R1
1015#undef BE_SR0_RP
252b5132 1016
30667bf3
AM
1017/* As above, but don't actually build the stub. Just bump offset so
1018 we know stub section sizes. */
1019
b34976b6 1020static bfd_boolean
30667bf3
AM
1021hppa_size_one_stub (gen_entry, in_arg)
1022 struct bfd_hash_entry *gen_entry;
1023 PTR in_arg;
252b5132 1024{
30667bf3 1025 struct elf32_hppa_stub_hash_entry *stub_entry;
83c81bfe 1026 struct elf32_hppa_link_hash_table *htab;
30667bf3
AM
1027 int size;
1028
1029 /* Massage our args to the form they really have. */
1030 stub_entry = (struct elf32_hppa_stub_hash_entry *) gen_entry;
83c81bfe 1031 htab = (struct elf32_hppa_link_hash_table *) in_arg;
30667bf3
AM
1032
1033 if (stub_entry->stub_type == hppa_stub_long_branch)
98ceb8ce 1034 size = 8;
30667bf3
AM
1035 else if (stub_entry->stub_type == hppa_stub_long_branch_shared)
1036 size = 12;
1037 else if (stub_entry->stub_type == hppa_stub_export)
1038 size = 24;
74d1c347 1039 else /* hppa_stub_import or hppa_stub_import_shared. */
252b5132 1040 {
83c81bfe 1041 if (htab->multi_subspace)
30667bf3
AM
1042 size = 28;
1043 else
1044 size = 16;
1045 }
252b5132 1046
74d1c347 1047 stub_entry->stub_sec->_raw_size += size;
b34976b6 1048 return TRUE;
30667bf3 1049}
252b5132 1050
30667bf3
AM
1051/* Return nonzero if ABFD represents an HPPA ELF32 file.
1052 Additionally we set the default architecture and machine. */
1053
b34976b6 1054static bfd_boolean
30667bf3
AM
1055elf32_hppa_object_p (abfd)
1056 bfd *abfd;
1057{
24a5e751
L
1058 Elf_Internal_Ehdr * i_ehdrp;
1059 unsigned int flags;
252b5132 1060
24a5e751
L
1061 i_ehdrp = elf_elfheader (abfd);
1062 if (strcmp (bfd_get_target (abfd), "elf32-hppa-linux") == 0)
1063 {
1064 if (i_ehdrp->e_ident[EI_OSABI] != ELFOSABI_LINUX)
b34976b6 1065 return FALSE;
24a5e751
L
1066 }
1067 else
1068 {
1069 if (i_ehdrp->e_ident[EI_OSABI] != ELFOSABI_HPUX)
b34976b6 1070 return FALSE;
24a5e751
L
1071 }
1072
1073 flags = i_ehdrp->e_flags;
30667bf3
AM
1074 switch (flags & (EF_PARISC_ARCH | EF_PARISC_WIDE))
1075 {
1076 case EFA_PARISC_1_0:
1077 return bfd_default_set_arch_mach (abfd, bfd_arch_hppa, 10);
1078 case EFA_PARISC_1_1:
1079 return bfd_default_set_arch_mach (abfd, bfd_arch_hppa, 11);
1080 case EFA_PARISC_2_0:
1081 return bfd_default_set_arch_mach (abfd, bfd_arch_hppa, 20);
1082 case EFA_PARISC_2_0 | EF_PARISC_WIDE:
1083 return bfd_default_set_arch_mach (abfd, bfd_arch_hppa, 25);
1084 }
b34976b6 1085 return TRUE;
252b5132
RH
1086}
1087
252b5132
RH
1088/* Undo the generic ELF code's subtraction of section->vma from the
1089 value of each external symbol. */
1090
b34976b6 1091static bfd_boolean
252b5132 1092elf32_hppa_add_symbol_hook (abfd, info, sym, namep, flagsp, secp, valp)
5f771d47
ILT
1093 bfd *abfd ATTRIBUTE_UNUSED;
1094 struct bfd_link_info *info ATTRIBUTE_UNUSED;
1095 const Elf_Internal_Sym *sym ATTRIBUTE_UNUSED;
1096 const char **namep ATTRIBUTE_UNUSED;
1097 flagword *flagsp ATTRIBUTE_UNUSED;
252b5132
RH
1098 asection **secp;
1099 bfd_vma *valp;
1100{
1101 *valp += (*secp)->vma;
b34976b6 1102 return TRUE;
252b5132
RH
1103}
1104
30667bf3
AM
1105/* Create the .plt and .got sections, and set up our hash table
1106 short-cuts to various dynamic sections. */
1107
b34976b6 1108static bfd_boolean
30667bf3
AM
1109elf32_hppa_create_dynamic_sections (abfd, info)
1110 bfd *abfd;
1111 struct bfd_link_info *info;
252b5132 1112{
83c81bfe 1113 struct elf32_hppa_link_hash_table *htab;
edd21aca 1114
30667bf3 1115 /* Don't try to create the .plt and .got twice. */
83c81bfe
AM
1116 htab = hppa_link_hash_table (info);
1117 if (htab->splt != NULL)
b34976b6 1118 return TRUE;
edd21aca 1119
30667bf3
AM
1120 /* Call the generic code to do most of the work. */
1121 if (! _bfd_elf_create_dynamic_sections (abfd, info))
b34976b6 1122 return FALSE;
252b5132 1123
83c81bfe
AM
1124 htab->splt = bfd_get_section_by_name (abfd, ".plt");
1125 htab->srelplt = bfd_get_section_by_name (abfd, ".rela.plt");
30667bf3 1126
83c81bfe
AM
1127 htab->sgot = bfd_get_section_by_name (abfd, ".got");
1128 htab->srelgot = bfd_make_section (abfd, ".rela.got");
1129 if (htab->srelgot == NULL
1130 || ! bfd_set_section_flags (abfd, htab->srelgot,
30667bf3
AM
1131 (SEC_ALLOC
1132 | SEC_LOAD
1133 | SEC_HAS_CONTENTS
1134 | SEC_IN_MEMORY
1135 | SEC_LINKER_CREATED
1136 | SEC_READONLY))
83c81bfe 1137 || ! bfd_set_section_alignment (abfd, htab->srelgot, 2))
b34976b6 1138 return FALSE;
edd21aca 1139
83c81bfe
AM
1140 htab->sdynbss = bfd_get_section_by_name (abfd, ".dynbss");
1141 htab->srelbss = bfd_get_section_by_name (abfd, ".rela.bss");
30667bf3 1142
b34976b6 1143 return TRUE;
30667bf3
AM
1144}
1145
ebe50bae
AM
1146/* Copy the extra info we tack onto an elf_link_hash_entry. */
1147
51b64d56 1148static void
b48fa14c
AM
1149elf32_hppa_copy_indirect_symbol (bed, dir, ind)
1150 struct elf_backend_data *bed;
ebe50bae
AM
1151 struct elf_link_hash_entry *dir, *ind;
1152{
1153 struct elf32_hppa_link_hash_entry *edir, *eind;
1154
1155 edir = (struct elf32_hppa_link_hash_entry *) dir;
1156 eind = (struct elf32_hppa_link_hash_entry *) ind;
1157
bbd7ec4a 1158 if (eind->dyn_relocs != NULL)
ebe50bae 1159 {
bbd7ec4a
AM
1160 if (edir->dyn_relocs != NULL)
1161 {
1162 struct elf32_hppa_dyn_reloc_entry **pp;
1163 struct elf32_hppa_dyn_reloc_entry *p;
1164
1e370bd2 1165 if (ind->root.type == bfd_link_hash_indirect)
bbd7ec4a
AM
1166 abort ();
1167
1168 /* Add reloc counts against the weak sym to the strong sym
1169 list. Merge any entries against the same section. */
1170 for (pp = &eind->dyn_relocs; (p = *pp) != NULL; )
1171 {
1172 struct elf32_hppa_dyn_reloc_entry *q;
1173
1174 for (q = edir->dyn_relocs; q != NULL; q = q->next)
1175 if (q->sec == p->sec)
1176 {
1177#if RELATIVE_DYNRELOCS
1178 q->relative_count += p->relative_count;
1179#endif
1180 q->count += p->count;
1181 *pp = p->next;
1182 break;
1183 }
1184 if (q == NULL)
1185 pp = &p->next;
1186 }
1187 *pp = edir->dyn_relocs;
1188 }
1189
ebe50bae
AM
1190 edir->dyn_relocs = eind->dyn_relocs;
1191 eind->dyn_relocs = NULL;
1192 }
ebe50bae 1193
b48fa14c 1194 _bfd_elf_link_hash_copy_indirect (bed, dir, ind);
ebe50bae
AM
1195}
1196
30667bf3 1197/* Look through the relocs for a section during the first phase, and
3ac8354b
AM
1198 calculate needed space in the global offset table, procedure linkage
1199 table, and dynamic reloc sections. At this point we haven't
1200 necessarily read all the input files. */
252b5132 1201
b34976b6 1202static bfd_boolean
30667bf3
AM
1203elf32_hppa_check_relocs (abfd, info, sec, relocs)
1204 bfd *abfd;
1205 struct bfd_link_info *info;
1206 asection *sec;
1207 const Elf_Internal_Rela *relocs;
252b5132 1208{
30667bf3
AM
1209 Elf_Internal_Shdr *symtab_hdr;
1210 struct elf_link_hash_entry **sym_hashes;
30667bf3
AM
1211 const Elf_Internal_Rela *rel;
1212 const Elf_Internal_Rela *rel_end;
83c81bfe 1213 struct elf32_hppa_link_hash_table *htab;
30667bf3
AM
1214 asection *sreloc;
1215 asection *stubreloc;
1216
1217 if (info->relocateable)
b34976b6 1218 return TRUE;
30667bf3 1219
83c81bfe 1220 htab = hppa_link_hash_table (info);
30667bf3
AM
1221 symtab_hdr = &elf_tdata (abfd)->symtab_hdr;
1222 sym_hashes = elf_sym_hashes (abfd);
30667bf3
AM
1223 sreloc = NULL;
1224 stubreloc = NULL;
1225
1226 rel_end = relocs + sec->reloc_count;
1227 for (rel = relocs; rel < rel_end; rel++)
1228 {
1229 enum {
1230 NEED_GOT = 1,
1231 NEED_PLT = 2,
1232 NEED_DYNREL = 4,
98ceb8ce 1233 PLT_PLABEL = 8
30667bf3 1234 };
edd21aca 1235
30667bf3
AM
1236 unsigned int r_symndx, r_type;
1237 struct elf32_hppa_link_hash_entry *h;
1238 int need_entry;
252b5132 1239
30667bf3 1240 r_symndx = ELF32_R_SYM (rel->r_info);
252b5132 1241
30667bf3
AM
1242 if (r_symndx < symtab_hdr->sh_info)
1243 h = NULL;
1244 else
1245 h = ((struct elf32_hppa_link_hash_entry *)
1246 sym_hashes[r_symndx - symtab_hdr->sh_info]);
252b5132 1247
30667bf3 1248 r_type = ELF32_R_TYPE (rel->r_info);
252b5132 1249
30667bf3
AM
1250 switch (r_type)
1251 {
1252 case R_PARISC_DLTIND14F:
1253 case R_PARISC_DLTIND14R:
1254 case R_PARISC_DLTIND21L:
1255 /* This symbol requires a global offset table entry. */
1256 need_entry = NEED_GOT;
1257
1258 /* Mark this section as containing PIC code. */
1259 sec->flags |= SEC_HAS_GOT_REF;
1260 break;
1261
1262 case R_PARISC_PLABEL14R: /* "Official" procedure labels. */
1263 case R_PARISC_PLABEL21L:
1264 case R_PARISC_PLABEL32:
74d1c347 1265 /* If the addend is non-zero, we break badly. */
49e9d0d3
AM
1266 if (rel->r_addend != 0)
1267 abort ();
74d1c347
AM
1268
1269 /* If we are creating a shared library, then we need to
1270 create a PLT entry for all PLABELs, because PLABELs with
1271 local symbols may be passed via a pointer to another
1272 object. Additionally, output a dynamic relocation
4dc86686
AM
1273 pointing to the PLT entry.
1274 For executables, the original 32-bit ABI allowed two
1275 different styles of PLABELs (function pointers): For
1276 global functions, the PLABEL word points into the .plt
1277 two bytes past a (function address, gp) pair, and for
1278 local functions the PLABEL points directly at the
1279 function. The magic +2 for the first type allows us to
1280 differentiate between the two. As you can imagine, this
1281 is a real pain when it comes to generating code to call
1282 functions indirectly or to compare function pointers.
1283 We avoid the mess by always pointing a PLABEL into the
1284 .plt, even for local functions. */
74d1c347 1285 need_entry = PLT_PLABEL | NEED_PLT | NEED_DYNREL;
30667bf3
AM
1286 break;
1287
1288 case R_PARISC_PCREL12F:
83c81bfe 1289 htab->has_12bit_branch = 1;
067fa4a6
AM
1290 goto branch_common;
1291
30667bf3
AM
1292 case R_PARISC_PCREL17C:
1293 case R_PARISC_PCREL17F:
83c81bfe 1294 htab->has_17bit_branch = 1;
067fa4a6
AM
1295 goto branch_common;
1296
30667bf3 1297 case R_PARISC_PCREL22F:
067fa4a6
AM
1298 htab->has_22bit_branch = 1;
1299 branch_common:
47d89dba
AM
1300 /* Function calls might need to go through the .plt, and
1301 might require long branch stubs. */
30667bf3
AM
1302 if (h == NULL)
1303 {
1304 /* We know local syms won't need a .plt entry, and if
1305 they need a long branch stub we can't guarantee that
1306 we can reach the stub. So just flag an error later
1307 if we're doing a shared link and find we need a long
1308 branch stub. */
1309 continue;
1310 }
1311 else
1312 {
1313 /* Global symbols will need a .plt entry if they remain
1314 global, and in most cases won't need a long branch
1315 stub. Unfortunately, we have to cater for the case
1316 where a symbol is forced local by versioning, or due
1317 to symbolic linking, and we lose the .plt entry. */
98ceb8ce 1318 need_entry = NEED_PLT;
4dc86686 1319 if (h->elf.type == STT_PARISC_MILLI)
98ceb8ce 1320 need_entry = 0;
30667bf3
AM
1321 }
1322 break;
1323
1324 case R_PARISC_SEGBASE: /* Used to set segment base. */
c46b7515 1325 case R_PARISC_SEGREL32: /* Relative reloc, used for unwind. */
30667bf3
AM
1326 case R_PARISC_PCREL14F: /* PC relative load/store. */
1327 case R_PARISC_PCREL14R:
1328 case R_PARISC_PCREL17R: /* External branches. */
1329 case R_PARISC_PCREL21L: /* As above, and for load/store too. */
1330 /* We don't need to propagate the relocation if linking a
1331 shared object since these are section relative. */
1332 continue;
1333
1334 case R_PARISC_DPREL14F: /* Used for gp rel data load/store. */
1335 case R_PARISC_DPREL14R:
1336 case R_PARISC_DPREL21L:
1337 if (info->shared)
1338 {
1339 (*_bfd_error_handler)
1340 (_("%s: relocation %s can not be used when making a shared object; recompile with -fPIC"),
8f615d07 1341 bfd_archive_filename (abfd),
30667bf3
AM
1342 elf_hppa_howto_table[r_type].name);
1343 bfd_set_error (bfd_error_bad_value);
b34976b6 1344 return FALSE;
30667bf3
AM
1345 }
1346 /* Fall through. */
1347
1348 case R_PARISC_DIR17F: /* Used for external branches. */
1349 case R_PARISC_DIR17R:
47d89dba
AM
1350 case R_PARISC_DIR14F: /* Used for load/store from absolute locn. */
1351 case R_PARISC_DIR14R:
30667bf3 1352 case R_PARISC_DIR21L: /* As above, and for ext branches too. */
067fa4a6 1353#if 0
30667bf3
AM
1354 /* Help debug shared library creation. Any of the above
1355 relocs can be used in shared libs, but they may cause
1356 pages to become unshared. */
1357 if (info->shared)
1358 {
1359 (*_bfd_error_handler)
1360 (_("%s: relocation %s should not be used when making a shared object; recompile with -fPIC"),
8f615d07 1361 bfd_archive_filename (abfd),
30667bf3
AM
1362 elf_hppa_howto_table[r_type].name);
1363 }
1364 /* Fall through. */
1365#endif
1366
c46b7515 1367 case R_PARISC_DIR32: /* .word relocs. */
30667bf3
AM
1368 /* We may want to output a dynamic relocation later. */
1369 need_entry = NEED_DYNREL;
1370 break;
1371
1372 /* This relocation describes the C++ object vtable hierarchy.
1373 Reconstruct it for later use during GC. */
1374 case R_PARISC_GNU_VTINHERIT:
1375 if (!_bfd_elf32_gc_record_vtinherit (abfd, sec,
1376 &h->elf, rel->r_offset))
b34976b6 1377 return FALSE;
30667bf3
AM
1378 continue;
1379
1380 /* This relocation describes which C++ vtable entries are actually
1381 used. Record for later use during GC. */
1382 case R_PARISC_GNU_VTENTRY:
1383 if (!_bfd_elf32_gc_record_vtentry (abfd, sec,
36605136 1384 &h->elf, rel->r_addend))
b34976b6 1385 return FALSE;
30667bf3
AM
1386 continue;
1387
1388 default:
1389 continue;
1390 }
1391
1392 /* Now carry out our orders. */
1393 if (need_entry & NEED_GOT)
1394 {
1395 /* Allocate space for a GOT entry, as well as a dynamic
25f72752 1396 relocation for this entry. */
83c81bfe 1397 if (htab->sgot == NULL)
30667bf3 1398 {
3ac8354b
AM
1399 if (htab->elf.dynobj == NULL)
1400 htab->elf.dynobj = abfd;
1401 if (!elf32_hppa_create_dynamic_sections (htab->elf.dynobj, info))
b34976b6 1402 return FALSE;
30667bf3
AM
1403 }
1404
1405 if (h != NULL)
1406 {
51b64d56 1407 h->elf.got.refcount += 1;
30667bf3
AM
1408 }
1409 else
1410 {
3ac8354b
AM
1411 bfd_signed_vma *local_got_refcounts;
1412
30667bf3 1413 /* This is a global offset table entry for a local symbol. */
3ac8354b 1414 local_got_refcounts = elf_local_got_refcounts (abfd);
30667bf3
AM
1415 if (local_got_refcounts == NULL)
1416 {
dc810e39 1417 bfd_size_type size;
30667bf3 1418
74d1c347
AM
1419 /* Allocate space for local got offsets and local
1420 plt offsets. Done this way to save polluting
1421 elf_obj_tdata with another target specific
1422 pointer. */
dc810e39
AM
1423 size = symtab_hdr->sh_info;
1424 size *= 2 * sizeof (bfd_signed_vma);
30667bf3 1425 local_got_refcounts = ((bfd_signed_vma *)
ebe50bae 1426 bfd_zalloc (abfd, size));
30667bf3 1427 if (local_got_refcounts == NULL)
b34976b6 1428 return FALSE;
30667bf3 1429 elf_local_got_refcounts (abfd) = local_got_refcounts;
30667bf3 1430 }
ebe50bae 1431 local_got_refcounts[r_symndx] += 1;
30667bf3
AM
1432 }
1433 }
1434
1435 if (need_entry & NEED_PLT)
1436 {
1437 /* If we are creating a shared library, and this is a reloc
1438 against a weak symbol or a global symbol in a dynamic
1439 object, then we will be creating an import stub and a
1440 .plt entry for the symbol. Similarly, on a normal link
1441 to symbols defined in a dynamic object we'll need the
1442 import stub and a .plt entry. We don't know yet whether
1443 the symbol is defined or not, so make an entry anyway and
1444 clean up later in adjust_dynamic_symbol. */
1445 if ((sec->flags & SEC_ALLOC) != 0)
1446 {
74d1c347 1447 if (h != NULL)
30667bf3 1448 {
51b64d56
AM
1449 h->elf.elf_link_hash_flags |= ELF_LINK_HASH_NEEDS_PLT;
1450 h->elf.plt.refcount += 1;
74d1c347 1451
36605136
AM
1452 /* If this .plt entry is for a plabel, mark it so
1453 that adjust_dynamic_symbol will keep the entry
1454 even if it appears to be local. */
74d1c347
AM
1455 if (need_entry & PLT_PLABEL)
1456 h->plabel = 1;
1457 }
1458 else if (need_entry & PLT_PLABEL)
1459 {
3ac8354b 1460 bfd_signed_vma *local_got_refcounts;
68fb2e56 1461 bfd_signed_vma *local_plt_refcounts;
74d1c347 1462
3ac8354b 1463 local_got_refcounts = elf_local_got_refcounts (abfd);
74d1c347
AM
1464 if (local_got_refcounts == NULL)
1465 {
dc810e39 1466 bfd_size_type size;
74d1c347
AM
1467
1468 /* Allocate space for local got offsets and local
1469 plt offsets. */
dc810e39
AM
1470 size = symtab_hdr->sh_info;
1471 size *= 2 * sizeof (bfd_signed_vma);
74d1c347 1472 local_got_refcounts = ((bfd_signed_vma *)
ebe50bae 1473 bfd_zalloc (abfd, size));
74d1c347 1474 if (local_got_refcounts == NULL)
b34976b6 1475 return FALSE;
74d1c347 1476 elf_local_got_refcounts (abfd) = local_got_refcounts;
74d1c347 1477 }
68fb2e56
AM
1478 local_plt_refcounts = (local_got_refcounts
1479 + symtab_hdr->sh_info);
ebe50bae 1480 local_plt_refcounts[r_symndx] += 1;
30667bf3 1481 }
30667bf3
AM
1482 }
1483 }
1484
98ceb8ce 1485 if (need_entry & NEED_DYNREL)
30667bf3
AM
1486 {
1487 /* Flag this symbol as having a non-got, non-plt reference
1488 so that we generate copy relocs if it turns out to be
1489 dynamic. */
ebe50bae 1490 if (h != NULL && !info->shared)
30667bf3
AM
1491 h->elf.elf_link_hash_flags |= ELF_LINK_NON_GOT_REF;
1492
1493 /* If we are creating a shared library then we need to copy
1494 the reloc into the shared library. However, if we are
1495 linking with -Bsymbolic, we need only copy absolute
1496 relocs or relocs against symbols that are not defined in
1497 an object we are including in the link. PC- or DP- or
1498 DLT-relative relocs against any local sym or global sym
1499 with DEF_REGULAR set, can be discarded. At this point we
1500 have not seen all the input files, so it is possible that
1501 DEF_REGULAR is not set now but will be set later (it is
1502 never cleared). We account for that possibility below by
98ceb8ce 1503 storing information in the dyn_relocs field of the
30667bf3
AM
1504 hash table entry.
1505
1506 A similar situation to the -Bsymbolic case occurs when
1507 creating shared libraries and symbol visibility changes
1508 render the symbol local.
1509
1510 As it turns out, all the relocs we will be creating here
1511 are absolute, so we cannot remove them on -Bsymbolic
1512 links or visibility changes anyway. A STUB_REL reloc
1513 is absolute too, as in that case it is the reloc in the
1514 stub we will be creating, rather than copying the PCREL
56882138
AM
1515 reloc in the branch.
1516
1517 If on the other hand, we are creating an executable, we
1518 may need to keep relocations for symbols satisfied by a
1519 dynamic library if we manage to avoid copy relocs for the
1520 symbol. */
446f2863
AM
1521 if ((info->shared
1522 && (sec->flags & SEC_ALLOC) != 0
1523 && (IS_ABSOLUTE_RELOC (r_type)
1524 || (h != NULL
1525 && (!info->symbolic
1526 || h->elf.root.type == bfd_link_hash_defweak
1527 || (h->elf.elf_link_hash_flags
1528 & ELF_LINK_HASH_DEF_REGULAR) == 0))))
1529 || (!info->shared
1530 && (sec->flags & SEC_ALLOC) != 0
1531 && h != NULL
446f2863
AM
1532 && (h->elf.root.type == bfd_link_hash_defweak
1533 || (h->elf.elf_link_hash_flags
1534 & ELF_LINK_HASH_DEF_REGULAR) == 0)))
30667bf3 1535 {
ec338859
AM
1536 struct elf32_hppa_dyn_reloc_entry *p;
1537 struct elf32_hppa_dyn_reloc_entry **head;
1538
30667bf3
AM
1539 /* Create a reloc section in dynobj and make room for
1540 this reloc. */
98ceb8ce 1541 if (sreloc == NULL)
30667bf3
AM
1542 {
1543 char *name;
3ac8354b 1544 bfd *dynobj;
30667bf3 1545
98ceb8ce
AM
1546 name = (bfd_elf_string_from_elf_section
1547 (abfd,
1548 elf_elfheader (abfd)->e_shstrndx,
1549 elf_section_data (sec)->rel_hdr.sh_name));
30667bf3
AM
1550 if (name == NULL)
1551 {
1552 (*_bfd_error_handler)
1553 (_("Could not find relocation section for %s"),
1554 sec->name);
1555 bfd_set_error (bfd_error_bad_value);
b34976b6 1556 return FALSE;
30667bf3
AM
1557 }
1558
3ac8354b
AM
1559 if (htab->elf.dynobj == NULL)
1560 htab->elf.dynobj = abfd;
1561
1562 dynobj = htab->elf.dynobj;
98ceb8ce
AM
1563 sreloc = bfd_get_section_by_name (dynobj, name);
1564 if (sreloc == NULL)
30667bf3
AM
1565 {
1566 flagword flags;
1567
98ceb8ce 1568 sreloc = bfd_make_section (dynobj, name);
30667bf3
AM
1569 flags = (SEC_HAS_CONTENTS | SEC_READONLY
1570 | SEC_IN_MEMORY | SEC_LINKER_CREATED);
1571 if ((sec->flags & SEC_ALLOC) != 0)
1572 flags |= SEC_ALLOC | SEC_LOAD;
98ceb8ce
AM
1573 if (sreloc == NULL
1574 || !bfd_set_section_flags (dynobj, sreloc, flags)
1575 || !bfd_set_section_alignment (dynobj, sreloc, 2))
b34976b6 1576 return FALSE;
30667bf3 1577 }
30667bf3 1578
98ceb8ce 1579 elf_section_data (sec)->sreloc = sreloc;
30667bf3
AM
1580 }
1581
98ceb8ce
AM
1582 /* If this is a global symbol, we count the number of
1583 relocations we need for this symbol. */
1584 if (h != NULL)
30667bf3 1585 {
ec338859
AM
1586 head = &h->dyn_relocs;
1587 }
1588 else
1589 {
1590 /* Track dynamic relocs needed for local syms too.
1591 We really need local syms available to do this
1592 easily. Oh well. */
1593
1594 asection *s;
1595 s = bfd_section_from_r_symndx (abfd, &htab->sym_sec,
1596 sec, r_symndx);
1597 if (s == NULL)
b34976b6 1598 return FALSE;
30667bf3 1599
ec338859
AM
1600 head = ((struct elf32_hppa_dyn_reloc_entry **)
1601 &elf_section_data (s)->local_dynrel);
1602 }
1603
1604 p = *head;
1605 if (p == NULL || p->sec != sec)
1606 {
1607 p = ((struct elf32_hppa_dyn_reloc_entry *)
1608 bfd_alloc (htab->elf.dynobj,
1609 (bfd_size_type) sizeof *p));
1610 if (p == NULL)
b34976b6 1611 return FALSE;
ec338859
AM
1612 p->next = *head;
1613 *head = p;
1614 p->sec = sec;
1615 p->count = 0;
98ceb8ce 1616#if RELATIVE_DYNRELOCS
ec338859 1617 p->relative_count = 0;
98ceb8ce 1618#endif
ec338859 1619 }
98ceb8ce 1620
ec338859 1621 p->count += 1;
98ceb8ce 1622#if RELATIVE_DYNRELOCS
ec338859
AM
1623 if (!IS_ABSOLUTE_RELOC (rtype))
1624 p->relative_count += 1;
98ceb8ce 1625#endif
30667bf3
AM
1626 }
1627 }
1628 }
edd21aca 1629
b34976b6 1630 return TRUE;
edd21aca
AM
1631}
1632
30667bf3
AM
1633/* Return the section that should be marked against garbage collection
1634 for a given relocation. */
1635
1636static asection *
1e2f5b6e
AM
1637elf32_hppa_gc_mark_hook (sec, info, rel, h, sym)
1638 asection *sec;
30667bf3
AM
1639 struct bfd_link_info *info ATTRIBUTE_UNUSED;
1640 Elf_Internal_Rela *rel;
1641 struct elf_link_hash_entry *h;
1642 Elf_Internal_Sym *sym;
1643{
1644 if (h != NULL)
1645 {
1646 switch ((unsigned int) ELF32_R_TYPE (rel->r_info))
1647 {
1648 case R_PARISC_GNU_VTINHERIT:
1649 case R_PARISC_GNU_VTENTRY:
1650 break;
1651
1652 default:
1653 switch (h->root.type)
1654 {
1655 case bfd_link_hash_defined:
1656 case bfd_link_hash_defweak:
1657 return h->root.u.def.section;
1658
1659 case bfd_link_hash_common:
1660 return h->root.u.c.p->section;
1661
1662 default:
1663 break;
1664 }
1665 }
1666 }
1667 else
1e2f5b6e 1668 return bfd_section_from_elf_index (sec->owner, sym->st_shndx);
30667bf3
AM
1669
1670 return NULL;
1671}
1672
30667bf3
AM
1673/* Update the got and plt entry reference counts for the section being
1674 removed. */
edd21aca 1675
b34976b6 1676static bfd_boolean
30667bf3
AM
1677elf32_hppa_gc_sweep_hook (abfd, info, sec, relocs)
1678 bfd *abfd;
1679 struct bfd_link_info *info ATTRIBUTE_UNUSED;
1680 asection *sec;
1681 const Elf_Internal_Rela *relocs;
edd21aca 1682{
30667bf3
AM
1683 Elf_Internal_Shdr *symtab_hdr;
1684 struct elf_link_hash_entry **sym_hashes;
1685 bfd_signed_vma *local_got_refcounts;
74d1c347 1686 bfd_signed_vma *local_plt_refcounts;
30667bf3
AM
1687 const Elf_Internal_Rela *rel, *relend;
1688 unsigned long r_symndx;
1689 struct elf_link_hash_entry *h;
83c81bfe 1690 struct elf32_hppa_link_hash_table *htab;
30667bf3 1691 bfd *dynobj;
30667bf3 1692
ec338859 1693 elf_section_data (sec)->local_dynrel = NULL;
98ceb8ce 1694
30667bf3
AM
1695 symtab_hdr = &elf_tdata (abfd)->symtab_hdr;
1696 sym_hashes = elf_sym_hashes (abfd);
1697 local_got_refcounts = elf_local_got_refcounts (abfd);
74d1c347
AM
1698 local_plt_refcounts = local_got_refcounts;
1699 if (local_plt_refcounts != NULL)
1700 local_plt_refcounts += symtab_hdr->sh_info;
83c81bfe 1701 htab = hppa_link_hash_table (info);
ebe50bae 1702 dynobj = htab->elf.dynobj;
30667bf3 1703 if (dynobj == NULL)
b34976b6 1704 return TRUE;
30667bf3 1705
30667bf3
AM
1706 relend = relocs + sec->reloc_count;
1707 for (rel = relocs; rel < relend; rel++)
1708 switch ((unsigned int) ELF32_R_TYPE (rel->r_info))
1709 {
1710 case R_PARISC_DLTIND14F:
1711 case R_PARISC_DLTIND14R:
1712 case R_PARISC_DLTIND21L:
1713 r_symndx = ELF32_R_SYM (rel->r_info);
1714 if (r_symndx >= symtab_hdr->sh_info)
1715 {
1716 h = sym_hashes[r_symndx - symtab_hdr->sh_info];
1717 if (h->got.refcount > 0)
4dc86686 1718 h->got.refcount -= 1;
30667bf3
AM
1719 }
1720 else if (local_got_refcounts != NULL)
1721 {
1722 if (local_got_refcounts[r_symndx] > 0)
4dc86686 1723 local_got_refcounts[r_symndx] -= 1;
30667bf3
AM
1724 }
1725 break;
edd21aca 1726
30667bf3
AM
1727 case R_PARISC_PCREL12F:
1728 case R_PARISC_PCREL17C:
1729 case R_PARISC_PCREL17F:
1730 case R_PARISC_PCREL22F:
1731 r_symndx = ELF32_R_SYM (rel->r_info);
1732 if (r_symndx >= symtab_hdr->sh_info)
1733 {
1734 h = sym_hashes[r_symndx - symtab_hdr->sh_info];
1735 if (h->plt.refcount > 0)
1736 h->plt.refcount -= 1;
1737 }
1738 break;
edd21aca 1739
74d1c347
AM
1740 case R_PARISC_PLABEL14R:
1741 case R_PARISC_PLABEL21L:
1742 case R_PARISC_PLABEL32:
1743 r_symndx = ELF32_R_SYM (rel->r_info);
1744 if (r_symndx >= symtab_hdr->sh_info)
1745 {
98ceb8ce
AM
1746 struct elf32_hppa_link_hash_entry *eh;
1747 struct elf32_hppa_dyn_reloc_entry **pp;
1748 struct elf32_hppa_dyn_reloc_entry *p;
1749
74d1c347 1750 h = sym_hashes[r_symndx - symtab_hdr->sh_info];
98ceb8ce 1751
74d1c347
AM
1752 if (h->plt.refcount > 0)
1753 h->plt.refcount -= 1;
98ceb8ce
AM
1754
1755 eh = (struct elf32_hppa_link_hash_entry *) h;
1756
1757 for (pp = &eh->dyn_relocs; (p = *pp) != NULL; pp = &p->next)
1758 if (p->sec == sec)
1759 {
1760#if RELATIVE_DYNRELOCS
1761 if (!IS_ABSOLUTE_RELOC (rtype))
1762 p->relative_count -= 1;
1763#endif
1764 p->count -= 1;
1765 if (p->count == 0)
1766 *pp = p->next;
1767 break;
1768 }
74d1c347
AM
1769 }
1770 else if (local_plt_refcounts != NULL)
1771 {
1772 if (local_plt_refcounts[r_symndx] > 0)
1773 local_plt_refcounts[r_symndx] -= 1;
1774 }
1775 break;
1776
98ceb8ce
AM
1777 case R_PARISC_DIR32:
1778 r_symndx = ELF32_R_SYM (rel->r_info);
1779 if (r_symndx >= symtab_hdr->sh_info)
1780 {
1781 struct elf32_hppa_link_hash_entry *eh;
1782 struct elf32_hppa_dyn_reloc_entry **pp;
1783 struct elf32_hppa_dyn_reloc_entry *p;
1784
1785 h = sym_hashes[r_symndx - symtab_hdr->sh_info];
1786
1787 eh = (struct elf32_hppa_link_hash_entry *) h;
1788
1789 for (pp = &eh->dyn_relocs; (p = *pp) != NULL; pp = &p->next)
1790 if (p->sec == sec)
1791 {
1792#if RELATIVE_DYNRELOCS
1793 if (!IS_ABSOLUTE_RELOC (R_PARISC_DIR32))
1794 p->relative_count -= 1;
1795#endif
1796 p->count -= 1;
1797 if (p->count == 0)
1798 *pp = p->next;
1799 break;
1800 }
1801 }
1802 break;
1803
30667bf3
AM
1804 default:
1805 break;
1806 }
252b5132 1807
b34976b6 1808 return TRUE;
252b5132
RH
1809}
1810
74d1c347
AM
1811/* Our own version of hide_symbol, so that we can keep plt entries for
1812 plabels. */
1813
1814static void
e5094212
AM
1815elf32_hppa_hide_symbol (info, h, force_local)
1816 struct bfd_link_info *info;
74d1c347 1817 struct elf_link_hash_entry *h;
b34976b6 1818 bfd_boolean force_local;
74d1c347 1819{
e5094212
AM
1820 if (force_local)
1821 {
1822 h->elf_link_hash_flags |= ELF_LINK_FORCED_LOCAL;
1823 if (h->dynindx != -1)
1824 {
1825 h->dynindx = -1;
1826 _bfd_elf_strtab_delref (elf_hash_table (info)->dynstr,
1827 h->dynstr_index);
1828 }
1829 }
1830
74d1c347
AM
1831 if (! ((struct elf32_hppa_link_hash_entry *) h)->plabel)
1832 {
1833 h->elf_link_hash_flags &= ~ELF_LINK_HASH_NEEDS_PLT;
1834 h->plt.offset = (bfd_vma) -1;
1835 }
1836}
1837
4dc86686
AM
1838/* This is the condition under which elf32_hppa_finish_dynamic_symbol
1839 will be called from elflink.h. If elflink.h doesn't call our
1840 finish_dynamic_symbol routine, we'll need to do something about
1841 initializing any .plt and .got entries in elf32_hppa_relocate_section. */
1842#define WILL_CALL_FINISH_DYNAMIC_SYMBOL(DYN, INFO, H) \
1843 ((DYN) \
1844 && ((INFO)->shared \
1845 || ((H)->elf_link_hash_flags & ELF_LINK_FORCED_LOCAL) == 0) \
1846 && ((H)->dynindx != -1 \
1847 || ((H)->elf_link_hash_flags & ELF_LINK_FORCED_LOCAL) != 0))
1848
30667bf3
AM
1849/* Adjust a symbol defined by a dynamic object and referenced by a
1850 regular object. The current definition is in some section of the
1851 dynamic object, but we're not including those sections. We have to
1852 change the definition to something the rest of the link can
1853 understand. */
252b5132 1854
b34976b6 1855static bfd_boolean
30667bf3
AM
1856elf32_hppa_adjust_dynamic_symbol (info, h)
1857 struct bfd_link_info *info;
1858 struct elf_link_hash_entry *h;
252b5132 1859{
83c81bfe 1860 struct elf32_hppa_link_hash_table *htab;
ebe50bae
AM
1861 struct elf32_hppa_link_hash_entry *eh;
1862 struct elf32_hppa_dyn_reloc_entry *p;
30667bf3 1863 asection *s;
3ac8354b 1864 unsigned int power_of_two;
30667bf3
AM
1865
1866 /* If this is a function, put it in the procedure linkage table. We
067fa4a6 1867 will fill in the contents of the procedure linkage table later. */
30667bf3
AM
1868 if (h->type == STT_FUNC
1869 || (h->elf_link_hash_flags & ELF_LINK_HASH_NEEDS_PLT) != 0)
1870 {
1871 if (h->plt.refcount <= 0
1872 || ((h->elf_link_hash_flags & ELF_LINK_HASH_DEF_REGULAR) != 0
1873 && h->root.type != bfd_link_hash_defweak
74d1c347 1874 && ! ((struct elf32_hppa_link_hash_entry *) h)->plabel
30667bf3
AM
1875 && (!info->shared || info->symbolic)))
1876 {
1877 /* The .plt entry is not needed when:
1878 a) Garbage collection has removed all references to the
1879 symbol, or
1880 b) We know for certain the symbol is defined in this
74d1c347
AM
1881 object, and it's not a weak definition, nor is the symbol
1882 used by a plabel relocation. Either this object is the
1883 application or we are doing a shared symbolic link. */
1884
1885 /* As a special sop to the hppa ABI, we keep a .plt entry
1886 for functions in sections containing PIC code. */
067fa4a6
AM
1887 if (!info->shared
1888 && h->plt.refcount > 0
1889 && (h->elf_link_hash_flags & ELF_LINK_HASH_DEF_REGULAR) != 0
1890 && (h->root.u.def.section->flags & SEC_HAS_GOT_REF) != 0)
12cca0d2 1891 ((struct elf32_hppa_link_hash_entry *) h)->pic_call = 1;
30667bf3
AM
1892 else
1893 {
1894 h->plt.offset = (bfd_vma) -1;
1895 h->elf_link_hash_flags &= ~ELF_LINK_HASH_NEEDS_PLT;
30667bf3 1896 }
30667bf3 1897 }
4dc86686 1898
b34976b6 1899 return TRUE;
30667bf3 1900 }
bbd7ec4a
AM
1901 else
1902 h->plt.offset = (bfd_vma) -1;
edd21aca 1903
30667bf3
AM
1904 /* If this is a weak symbol, and there is a real definition, the
1905 processor independent code will have arranged for us to see the
1906 real definition first, and we can just use the same value. */
1907 if (h->weakdef != NULL)
edd21aca 1908 {
49e9d0d3
AM
1909 if (h->weakdef->root.type != bfd_link_hash_defined
1910 && h->weakdef->root.type != bfd_link_hash_defweak)
1911 abort ();
30667bf3
AM
1912 h->root.u.def.section = h->weakdef->root.u.def.section;
1913 h->root.u.def.value = h->weakdef->root.u.def.value;
b34976b6 1914 return TRUE;
30667bf3 1915 }
edd21aca 1916
30667bf3
AM
1917 /* This is a reference to a symbol defined by a dynamic object which
1918 is not a function. */
1919
1920 /* If we are creating a shared library, we must presume that the
1921 only references to the symbol are via the global offset table.
1922 For such cases we need not do anything here; the relocations will
1923 be handled correctly by relocate_section. */
1924 if (info->shared)
b34976b6 1925 return TRUE;
30667bf3
AM
1926
1927 /* If there are no references to this symbol that do not use the
1928 GOT, we don't need to generate a copy reloc. */
1929 if ((h->elf_link_hash_flags & ELF_LINK_NON_GOT_REF) == 0)
b34976b6 1930 return TRUE;
30667bf3 1931
ebe50bae
AM
1932 eh = (struct elf32_hppa_link_hash_entry *) h;
1933 for (p = eh->dyn_relocs; p != NULL; p = p->next)
1934 {
1935 s = p->sec->output_section;
1936 if (s != NULL && (s->flags & SEC_READONLY) != 0)
1937 break;
1938 }
1939
1940 /* If we didn't find any dynamic relocs in read-only sections, then
46fe4e66 1941 we'll be keeping the dynamic relocs and avoiding the copy reloc. */
ebe50bae
AM
1942 if (p == NULL)
1943 {
1944 h->elf_link_hash_flags &= ~ELF_LINK_NON_GOT_REF;
b34976b6 1945 return TRUE;
ebe50bae
AM
1946 }
1947
30667bf3
AM
1948 /* We must allocate the symbol in our .dynbss section, which will
1949 become part of the .bss section of the executable. There will be
1950 an entry for this symbol in the .dynsym section. The dynamic
1951 object will contain position independent code, so all references
1952 from the dynamic object to this symbol will go through the global
1953 offset table. The dynamic linker will use the .dynsym entry to
1954 determine the address it must put in the global offset table, so
1955 both the dynamic object and the regular object will refer to the
1956 same memory location for the variable. */
1957
3ac8354b 1958 htab = hppa_link_hash_table (info);
30667bf3
AM
1959
1960 /* We must generate a COPY reloc to tell the dynamic linker to
1961 copy the initial value out of the dynamic object and into the
3ac8354b 1962 runtime process image. */
30667bf3
AM
1963 if ((h->root.u.def.section->flags & SEC_ALLOC) != 0)
1964 {
3ac8354b 1965 htab->srelbss->_raw_size += sizeof (Elf32_External_Rela);
30667bf3 1966 h->elf_link_hash_flags |= ELF_LINK_HASH_NEEDS_COPY;
edd21aca 1967 }
252b5132 1968
3ac8354b
AM
1969 /* We need to figure out the alignment required for this symbol. I
1970 have no idea how other ELF linkers handle this. */
30667bf3 1971
3ac8354b
AM
1972 power_of_two = bfd_log2 (h->size);
1973 if (power_of_two > 3)
1974 power_of_two = 3;
1975
1976 /* Apply the required alignment. */
1977 s = htab->sdynbss;
1978 s->_raw_size = BFD_ALIGN (s->_raw_size,
1979 (bfd_size_type) (1 << power_of_two));
1980 if (power_of_two > bfd_get_section_alignment (htab->elf.dynobj, s))
1981 {
1982 if (! bfd_set_section_alignment (htab->elf.dynobj, s, power_of_two))
b34976b6 1983 return FALSE;
3ac8354b 1984 }
30667bf3 1985
30667bf3
AM
1986 /* Define the symbol as being at this point in the section. */
1987 h->root.u.def.section = s;
1988 h->root.u.def.value = s->_raw_size;
edd21aca 1989
30667bf3
AM
1990 /* Increment the section size to make room for the symbol. */
1991 s->_raw_size += h->size;
252b5132 1992
b34976b6 1993 return TRUE;
252b5132
RH
1994}
1995
30667bf3
AM
1996/* Called via elf_link_hash_traverse to create .plt entries for an
1997 application that uses statically linked PIC functions. Similar to
1998 the first part of elf32_hppa_adjust_dynamic_symbol. */
252b5132 1999
b34976b6 2000static bfd_boolean
a8d02d66 2001mark_PIC_calls (h, inf)
30667bf3 2002 struct elf_link_hash_entry *h;
4dc86686 2003 PTR inf ATTRIBUTE_UNUSED;
252b5132 2004{
e92d460e
AM
2005 if (h->root.type == bfd_link_hash_warning)
2006 h = (struct elf_link_hash_entry *) h->root.u.i.link;
2007
30667bf3
AM
2008 if (! (h->plt.refcount > 0
2009 && (h->root.type == bfd_link_hash_defined
2010 || h->root.type == bfd_link_hash_defweak)
2011 && (h->root.u.def.section->flags & SEC_HAS_GOT_REF) != 0))
252b5132 2012 {
30667bf3
AM
2013 h->plt.offset = (bfd_vma) -1;
2014 h->elf_link_hash_flags &= ~ELF_LINK_HASH_NEEDS_PLT;
b34976b6 2015 return TRUE;
252b5132
RH
2016 }
2017
74d1c347 2018 h->elf_link_hash_flags |= ELF_LINK_HASH_NEEDS_PLT;
30667bf3 2019 ((struct elf32_hppa_link_hash_entry *) h)->pic_call = 1;
edd21aca 2020
b34976b6 2021 return TRUE;
4dc86686
AM
2022}
2023
e5ee5df1
AM
2024/* Allocate space in the .plt for entries that won't have relocations.
2025 ie. pic_call and plabel entries. */
a8d02d66 2026
b34976b6 2027static bfd_boolean
e5ee5df1 2028allocate_plt_static (h, inf)
a8d02d66
AM
2029 struct elf_link_hash_entry *h;
2030 PTR inf;
2031{
2032 struct bfd_link_info *info;
2033 struct elf32_hppa_link_hash_table *htab;
2034 asection *s;
2035
e92d460e 2036 if (h->root.type == bfd_link_hash_indirect)
b34976b6 2037 return TRUE;
a8d02d66 2038
e92d460e
AM
2039 if (h->root.type == bfd_link_hash_warning)
2040 h = (struct elf_link_hash_entry *) h->root.u.i.link;
2041
a8d02d66
AM
2042 info = (struct bfd_link_info *) inf;
2043 htab = hppa_link_hash_table (info);
2044 if (((struct elf32_hppa_link_hash_entry *) h)->pic_call)
2045 {
e5ee5df1
AM
2046 /* Make an entry in the .plt section for non-pic code that is
2047 calling pic code. */
067fa4a6 2048 ((struct elf32_hppa_link_hash_entry *) h)->plabel = 0;
a8d02d66
AM
2049 s = htab->splt;
2050 h->plt.offset = s->_raw_size;
e5ee5df1
AM
2051 s->_raw_size += PLT_ENTRY_SIZE;
2052 }
2053 else if (htab->elf.dynamic_sections_created
2054 && h->plt.refcount > 0)
2055 {
2056 /* Make sure this symbol is output as a dynamic symbol.
2057 Undefined weak syms won't yet be marked as dynamic. */
2058 if (h->dynindx == -1
2059 && (h->elf_link_hash_flags & ELF_LINK_FORCED_LOCAL) == 0
2060 && h->type != STT_PARISC_MILLI)
a8d02d66 2061 {
e5ee5df1 2062 if (! bfd_elf32_link_record_dynamic_symbol (info, h))
b34976b6 2063 return FALSE;
e5ee5df1
AM
2064 }
2065
2066 if (WILL_CALL_FINISH_DYNAMIC_SYMBOL (1, info, h))
2067 {
067fa4a6
AM
2068 /* Allocate these later. From this point on, h->plabel
2069 means that the plt entry is only used by a plabel.
2070 We'll be using a normal plt entry for this symbol, so
2071 clear the plabel indicator. */
2072 ((struct elf32_hppa_link_hash_entry *) h)->plabel = 0;
e5ee5df1
AM
2073 }
2074 else if (((struct elf32_hppa_link_hash_entry *) h)->plabel)
2075 {
2076 /* Make an entry in the .plt section for plabel references
2077 that won't have a .plt entry for other reasons. */
2078 s = htab->splt;
2079 h->plt.offset = s->_raw_size;
2080 s->_raw_size += PLT_ENTRY_SIZE;
a8d02d66
AM
2081 }
2082 else
e5ee5df1
AM
2083 {
2084 /* No .plt entry needed. */
2085 h->plt.offset = (bfd_vma) -1;
2086 h->elf_link_hash_flags &= ~ELF_LINK_HASH_NEEDS_PLT;
2087 }
2088 }
2089 else
2090 {
2091 h->plt.offset = (bfd_vma) -1;
2092 h->elf_link_hash_flags &= ~ELF_LINK_HASH_NEEDS_PLT;
a8d02d66
AM
2093 }
2094
b34976b6 2095 return TRUE;
a8d02d66
AM
2096}
2097
4dc86686
AM
2098/* Allocate space in .plt, .got and associated reloc sections for
2099 global syms. */
2100
b34976b6 2101static bfd_boolean
98ceb8ce 2102allocate_dynrelocs (h, inf)
4dc86686
AM
2103 struct elf_link_hash_entry *h;
2104 PTR inf;
2105{
2106 struct bfd_link_info *info;
83c81bfe 2107 struct elf32_hppa_link_hash_table *htab;
4dc86686 2108 asection *s;
446f2863 2109 struct elf32_hppa_link_hash_entry *eh;
98ceb8ce 2110 struct elf32_hppa_dyn_reloc_entry *p;
4dc86686 2111
e92d460e 2112 if (h->root.type == bfd_link_hash_indirect)
b34976b6 2113 return TRUE;
73a74a62 2114
e92d460e
AM
2115 if (h->root.type == bfd_link_hash_warning)
2116 h = (struct elf_link_hash_entry *) h->root.u.i.link;
2117
30667bf3 2118 info = (struct bfd_link_info *) inf;
83c81bfe 2119 htab = hppa_link_hash_table (info);
e5ee5df1
AM
2120 if (htab->elf.dynamic_sections_created
2121 && h->plt.offset != (bfd_vma) -1
2122 && !((struct elf32_hppa_link_hash_entry *) h)->pic_call
067fa4a6 2123 && !((struct elf32_hppa_link_hash_entry *) h)->plabel)
4dc86686 2124 {
e5ee5df1
AM
2125 /* Make an entry in the .plt section. */
2126 s = htab->splt;
2127 h->plt.offset = s->_raw_size;
2128 s->_raw_size += PLT_ENTRY_SIZE;
3ac8354b 2129
e5ee5df1
AM
2130 /* We also need to make an entry in the .rela.plt section. */
2131 htab->srelplt->_raw_size += sizeof (Elf32_External_Rela);
2132 htab->need_plt_stub = 1;
4dc86686 2133 }
edd21aca 2134
4dc86686
AM
2135 if (h->got.refcount > 0)
2136 {
446f2863
AM
2137 /* Make sure this symbol is output as a dynamic symbol.
2138 Undefined weak syms won't yet be marked as dynamic. */
2139 if (h->dynindx == -1
2140 && (h->elf_link_hash_flags & ELF_LINK_FORCED_LOCAL) == 0
2141 && h->type != STT_PARISC_MILLI)
2142 {
2143 if (! bfd_elf32_link_record_dynamic_symbol (info, h))
b34976b6 2144 return FALSE;
446f2863
AM
2145 }
2146
83c81bfe 2147 s = htab->sgot;
4dc86686
AM
2148 h->got.offset = s->_raw_size;
2149 s->_raw_size += GOT_ENTRY_SIZE;
ce757d15
AM
2150 if (htab->elf.dynamic_sections_created
2151 && (info->shared
2152 || (h->dynindx != -1
2153 && h->elf_link_hash_flags & ELF_LINK_FORCED_LOCAL) == 0))
2154 {
2155 htab->srelgot->_raw_size += sizeof (Elf32_External_Rela);
2156 }
4dc86686
AM
2157 }
2158 else
2159 h->got.offset = (bfd_vma) -1;
30667bf3 2160
446f2863 2161 eh = (struct elf32_hppa_link_hash_entry *) h;
98ceb8ce 2162 if (eh->dyn_relocs == NULL)
b34976b6 2163 return TRUE;
30667bf3 2164
98ceb8ce
AM
2165 /* If this is a -Bsymbolic shared link, then we need to discard all
2166 space allocated for dynamic pc-relative relocs against symbols
2167 defined in a regular object. For the normal shared case, discard
2168 space for relocs that have become local due to symbol visibility
2169 changes. */
2170 if (info->shared)
446f2863 2171 {
98ceb8ce
AM
2172#if RELATIVE_DYNRELOCS
2173 if ((h->elf_link_hash_flags & ELF_LINK_HASH_DEF_REGULAR) != 0
2174 && ((h->elf_link_hash_flags & ELF_LINK_FORCED_LOCAL) != 0
2175 || info->symbolic))
446f2863 2176 {
98ceb8ce 2177 struct elf32_hppa_dyn_reloc_entry **pp;
30667bf3 2178
98ceb8ce
AM
2179 for (pp = &eh->dyn_relocs; (p = *pp) != NULL; )
2180 {
2181 p->count -= p->relative_count;
2182 p->relative_count = 0;
2183 if (p->count == 0)
2184 *pp = p->next;
2185 else
2186 pp = &p->next;
2187 }
2188 }
2189#endif
446f2863 2190 }
98ceb8ce 2191 else
30667bf3 2192 {
98ceb8ce
AM
2193 /* For the non-shared case, discard space for relocs against
2194 symbols which turn out to need copy relocs or are not
2195 dynamic. */
2196 if ((h->elf_link_hash_flags & ELF_LINK_NON_GOT_REF) == 0
2197 && (((h->elf_link_hash_flags & ELF_LINK_HASH_DEF_DYNAMIC) != 0
2198 && (h->elf_link_hash_flags & ELF_LINK_HASH_DEF_REGULAR) == 0)
ebe50bae 2199 || (htab->elf.dynamic_sections_created
98ceb8ce
AM
2200 && (h->root.type == bfd_link_hash_undefweak
2201 || h->root.type == bfd_link_hash_undefined))))
2202 {
2203 /* Make sure this symbol is output as a dynamic symbol.
2204 Undefined weak syms won't yet be marked as dynamic. */
2205 if (h->dynindx == -1
2206 && (h->elf_link_hash_flags & ELF_LINK_FORCED_LOCAL) == 0
2207 && h->type != STT_PARISC_MILLI)
2208 {
2209 if (! bfd_elf32_link_record_dynamic_symbol (info, h))
b34976b6 2210 return FALSE;
98ceb8ce
AM
2211 }
2212
2213 /* If that succeeded, we know we'll be keeping all the
2214 relocs. */
2215 if (h->dynindx != -1)
2216 goto keep;
2217 }
446f2863 2218
98ceb8ce 2219 eh->dyn_relocs = NULL;
b34976b6 2220 return TRUE;
98ceb8ce 2221
ec338859 2222 keep: ;
30667bf3 2223 }
30667bf3 2224
98ceb8ce
AM
2225 /* Finally, allocate space. */
2226 for (p = eh->dyn_relocs; p != NULL; p = p->next)
30667bf3 2227 {
98ceb8ce
AM
2228 asection *sreloc = elf_section_data (p->sec)->sreloc;
2229 sreloc->_raw_size += p->count * sizeof (Elf32_External_Rela);
30667bf3 2230 }
30667bf3 2231
b34976b6 2232 return TRUE;
30667bf3 2233}
30667bf3 2234
d5c73c2f
AM
2235/* This function is called via elf_link_hash_traverse to force
2236 millicode symbols local so they do not end up as globals in the
2237 dynamic symbol table. We ought to be able to do this in
2238 adjust_dynamic_symbol, but our adjust_dynamic_symbol is not called
2239 for all dynamic symbols. Arguably, this is a bug in
2240 elf_adjust_dynamic_symbol. */
2241
b34976b6 2242static bfd_boolean
d5c73c2f
AM
2243clobber_millicode_symbols (h, info)
2244 struct elf_link_hash_entry *h;
2245 struct bfd_link_info *info;
2246{
e92d460e
AM
2247 if (h->root.type == bfd_link_hash_warning)
2248 h = (struct elf_link_hash_entry *) h->root.u.i.link;
2249
142f8c94
AM
2250 if (h->type == STT_PARISC_MILLI
2251 && (h->elf_link_hash_flags & ELF_LINK_FORCED_LOCAL) == 0)
e0522e89 2252 {
b34976b6 2253 elf32_hppa_hide_symbol (info, h, TRUE);
e0522e89 2254 }
b34976b6 2255 return TRUE;
d5c73c2f
AM
2256}
2257
98ceb8ce
AM
2258/* Find any dynamic relocs that apply to read-only sections. */
2259
b34976b6 2260static bfd_boolean
98ceb8ce
AM
2261readonly_dynrelocs (h, inf)
2262 struct elf_link_hash_entry *h;
2263 PTR inf;
2264{
2265 struct elf32_hppa_link_hash_entry *eh;
2266 struct elf32_hppa_dyn_reloc_entry *p;
2267
e92d460e
AM
2268 if (h->root.type == bfd_link_hash_warning)
2269 h = (struct elf_link_hash_entry *) h->root.u.i.link;
2270
98ceb8ce
AM
2271 eh = (struct elf32_hppa_link_hash_entry *) h;
2272 for (p = eh->dyn_relocs; p != NULL; p = p->next)
2273 {
2274 asection *s = p->sec->output_section;
2275
2276 if (s != NULL && (s->flags & SEC_READONLY) != 0)
2277 {
2278 struct bfd_link_info *info = (struct bfd_link_info *) inf;
2279
2280 info->flags |= DF_TEXTREL;
2281
2282 /* Not an error, just cut short the traversal. */
b34976b6 2283 return FALSE;
98ceb8ce
AM
2284 }
2285 }
b34976b6 2286 return TRUE;
98ceb8ce
AM
2287}
2288
30667bf3
AM
2289/* Set the sizes of the dynamic sections. */
2290
b34976b6 2291static bfd_boolean
30667bf3 2292elf32_hppa_size_dynamic_sections (output_bfd, info)
98ceb8ce 2293 bfd *output_bfd ATTRIBUTE_UNUSED;
30667bf3
AM
2294 struct bfd_link_info *info;
2295{
83c81bfe 2296 struct elf32_hppa_link_hash_table *htab;
30667bf3 2297 bfd *dynobj;
98ceb8ce 2298 bfd *ibfd;
30667bf3 2299 asection *s;
b34976b6 2300 bfd_boolean relocs;
30667bf3 2301
83c81bfe 2302 htab = hppa_link_hash_table (info);
ebe50bae 2303 dynobj = htab->elf.dynobj;
49e9d0d3
AM
2304 if (dynobj == NULL)
2305 abort ();
30667bf3 2306
ebe50bae 2307 if (htab->elf.dynamic_sections_created)
30667bf3
AM
2308 {
2309 /* Set the contents of the .interp section to the interpreter. */
2310 if (! info->shared)
2311 {
2312 s = bfd_get_section_by_name (dynobj, ".interp");
49e9d0d3
AM
2313 if (s == NULL)
2314 abort ();
30667bf3
AM
2315 s->_raw_size = sizeof ELF_DYNAMIC_INTERPRETER;
2316 s->contents = (unsigned char *) ELF_DYNAMIC_INTERPRETER;
2317 }
74d1c347 2318
d5c73c2f 2319 /* Force millicode symbols local. */
ebe50bae 2320 elf_link_hash_traverse (&htab->elf,
d5c73c2f
AM
2321 clobber_millicode_symbols,
2322 info);
68fb2e56
AM
2323 }
2324 else
2325 {
2326 /* Run through the function symbols, looking for any that are
a8d02d66
AM
2327 PIC, and mark them as needing .plt entries so that %r19 will
2328 be set up. */
68fb2e56 2329 if (! info->shared)
a8d02d66 2330 elf_link_hash_traverse (&htab->elf, mark_PIC_calls, (PTR) info);
68fb2e56 2331 }
d5c73c2f 2332
98ceb8ce
AM
2333 /* Set up .got and .plt offsets for local syms, and space for local
2334 dynamic relocs. */
2335 for (ibfd = info->input_bfds; ibfd != NULL; ibfd = ibfd->link_next)
68fb2e56
AM
2336 {
2337 bfd_signed_vma *local_got;
2338 bfd_signed_vma *end_local_got;
2339 bfd_signed_vma *local_plt;
2340 bfd_signed_vma *end_local_plt;
2341 bfd_size_type locsymcount;
2342 Elf_Internal_Shdr *symtab_hdr;
2343 asection *srel;
74d1c347 2344
98ceb8ce 2345 if (bfd_get_flavour (ibfd) != bfd_target_elf_flavour)
68fb2e56 2346 continue;
4dc86686 2347
98ceb8ce
AM
2348 for (s = ibfd->sections; s != NULL; s = s->next)
2349 {
ec338859 2350 struct elf32_hppa_dyn_reloc_entry *p;
98ceb8ce 2351
ec338859
AM
2352 for (p = ((struct elf32_hppa_dyn_reloc_entry *)
2353 elf_section_data (s)->local_dynrel);
2354 p != NULL;
2355 p = p->next)
98ceb8ce 2356 {
ec338859
AM
2357 if (!bfd_is_abs_section (p->sec)
2358 && bfd_is_abs_section (p->sec->output_section))
2359 {
2360 /* Input section has been discarded, either because
2361 it is a copy of a linkonce section or due to
2362 linker script /DISCARD/, so we'll be discarding
2363 the relocs too. */
2364 }
248866a8 2365 else if (p->count != 0)
ec338859
AM
2366 {
2367 srel = elf_section_data (p->sec)->sreloc;
2368 srel->_raw_size += p->count * sizeof (Elf32_External_Rela);
248866a8
AM
2369 if ((p->sec->output_section->flags & SEC_READONLY) != 0)
2370 info->flags |= DF_TEXTREL;
ec338859 2371 }
98ceb8ce
AM
2372 }
2373 }
2374
2375 local_got = elf_local_got_refcounts (ibfd);
68fb2e56
AM
2376 if (!local_got)
2377 continue;
74d1c347 2378
98ceb8ce 2379 symtab_hdr = &elf_tdata (ibfd)->symtab_hdr;
68fb2e56
AM
2380 locsymcount = symtab_hdr->sh_info;
2381 end_local_got = local_got + locsymcount;
83c81bfe
AM
2382 s = htab->sgot;
2383 srel = htab->srelgot;
68fb2e56
AM
2384 for (; local_got < end_local_got; ++local_got)
2385 {
2386 if (*local_got > 0)
4dc86686 2387 {
68fb2e56
AM
2388 *local_got = s->_raw_size;
2389 s->_raw_size += GOT_ENTRY_SIZE;
2390 if (info->shared)
2391 srel->_raw_size += sizeof (Elf32_External_Rela);
4dc86686 2392 }
68fb2e56
AM
2393 else
2394 *local_got = (bfd_vma) -1;
2395 }
74d1c347 2396
68fb2e56
AM
2397 local_plt = end_local_got;
2398 end_local_plt = local_plt + locsymcount;
ebe50bae 2399 if (! htab->elf.dynamic_sections_created)
68fb2e56
AM
2400 {
2401 /* Won't be used, but be safe. */
2402 for (; local_plt < end_local_plt; ++local_plt)
2403 *local_plt = (bfd_vma) -1;
2404 }
2405 else
2406 {
83c81bfe
AM
2407 s = htab->splt;
2408 srel = htab->srelplt;
74d1c347
AM
2409 for (; local_plt < end_local_plt; ++local_plt)
2410 {
2411 if (*local_plt > 0)
2412 {
74d1c347
AM
2413 *local_plt = s->_raw_size;
2414 s->_raw_size += PLT_ENTRY_SIZE;
2415 if (info->shared)
4dc86686 2416 srel->_raw_size += sizeof (Elf32_External_Rela);
74d1c347
AM
2417 }
2418 else
2419 *local_plt = (bfd_vma) -1;
2420 }
2421 }
30667bf3 2422 }
30667bf3 2423
e5ee5df1
AM
2424 /* Do all the .plt entries without relocs first. The dynamic linker
2425 uses the last .plt reloc to find the end of the .plt (and hence
2426 the start of the .got) for lazy linking. */
2427 elf_link_hash_traverse (&htab->elf, allocate_plt_static, (PTR) info);
a8d02d66 2428
98ceb8ce
AM
2429 /* Allocate global sym .plt and .got entries, and space for global
2430 sym dynamic relocs. */
ebe50bae 2431 elf_link_hash_traverse (&htab->elf, allocate_dynrelocs, (PTR) info);
30667bf3
AM
2432
2433 /* The check_relocs and adjust_dynamic_symbol entry points have
2434 determined the sizes of the various dynamic sections. Allocate
2435 memory for them. */
b34976b6 2436 relocs = FALSE;
30667bf3
AM
2437 for (s = dynobj->sections; s != NULL; s = s->next)
2438 {
30667bf3
AM
2439 if ((s->flags & SEC_LINKER_CREATED) == 0)
2440 continue;
2441
83c81bfe 2442 if (s == htab->splt)
68fb2e56 2443 {
83c81bfe 2444 if (htab->need_plt_stub)
68fb2e56
AM
2445 {
2446 /* Make space for the plt stub at the end of the .plt
2447 section. We want this stub right at the end, up
2448 against the .got section. */
83c81bfe 2449 int gotalign = bfd_section_alignment (dynobj, htab->sgot);
68fb2e56
AM
2450 int pltalign = bfd_section_alignment (dynobj, s);
2451 bfd_size_type mask;
30667bf3 2452
68fb2e56
AM
2453 if (gotalign > pltalign)
2454 bfd_set_section_alignment (dynobj, s, gotalign);
2455 mask = ((bfd_size_type) 1 << gotalign) - 1;
2456 s->_raw_size = (s->_raw_size + sizeof (plt_stub) + mask) & ~mask;
2457 }
2458 }
83c81bfe 2459 else if (s == htab->sgot)
68fb2e56
AM
2460 ;
2461 else if (strncmp (bfd_get_section_name (dynobj, s), ".rela", 5) == 0)
30667bf3
AM
2462 {
2463 if (s->_raw_size != 0)
2464 {
4e12ff7f
AM
2465 /* Remember whether there are any reloc sections other
2466 than .rela.plt. */
2467 if (s != htab->srelplt)
b34976b6 2468 relocs = TRUE;
47d89dba 2469
30667bf3
AM
2470 /* We use the reloc_count field as a counter if we need
2471 to copy relocs into the output file. */
2472 s->reloc_count = 0;
2473 }
2474 }
30667bf3
AM
2475 else
2476 {
2477 /* It's not one of our sections, so don't allocate space. */
2478 continue;
2479 }
2480
2481 if (s->_raw_size == 0)
2482 {
2483 /* If we don't need this section, strip it from the
2484 output file. This is mostly to handle .rela.bss and
2485 .rela.plt. We must create both sections in
2486 create_dynamic_sections, because they must be created
2487 before the linker maps input sections to output
2488 sections. The linker does that before
2489 adjust_dynamic_symbol is called, and it is that
2490 function which decides whether anything needs to go
2491 into these sections. */
2492 _bfd_strip_section_from_output (info, s);
2493 continue;
2494 }
2495
2496 /* Allocate memory for the section contents. Zero it, because
2497 we may not fill in all the reloc sections. */
2498 s->contents = (bfd_byte *) bfd_zalloc (dynobj, s->_raw_size);
2499 if (s->contents == NULL && s->_raw_size != 0)
b34976b6 2500 return FALSE;
30667bf3
AM
2501 }
2502
ebe50bae 2503 if (htab->elf.dynamic_sections_created)
30667bf3
AM
2504 {
2505 /* Like IA-64 and HPPA64, always create a DT_PLTGOT. It
2506 actually has nothing to do with the PLT, it is how we
2507 communicate the LTP value of a load module to the dynamic
2508 linker. */
dc810e39
AM
2509#define add_dynamic_entry(TAG, VAL) \
2510 bfd_elf32_add_dynamic_entry (info, (bfd_vma) (TAG), (bfd_vma) (VAL))
2511
2512 if (!add_dynamic_entry (DT_PLTGOT, 0))
b34976b6 2513 return FALSE;
30667bf3
AM
2514
2515 /* Add some entries to the .dynamic section. We fill in the
2516 values later, in elf32_hppa_finish_dynamic_sections, but we
2517 must add the entries now so that we get the correct size for
2518 the .dynamic section. The DT_DEBUG entry is filled in by the
2519 dynamic linker and used by the debugger. */
dc810e39 2520 if (!info->shared)
30667bf3 2521 {
dc810e39 2522 if (!add_dynamic_entry (DT_DEBUG, 0))
b34976b6 2523 return FALSE;
30667bf3
AM
2524 }
2525
83c81bfe 2526 if (htab->srelplt->_raw_size != 0)
30667bf3 2527 {
dc810e39
AM
2528 if (!add_dynamic_entry (DT_PLTRELSZ, 0)
2529 || !add_dynamic_entry (DT_PLTREL, DT_RELA)
2530 || !add_dynamic_entry (DT_JMPREL, 0))
b34976b6 2531 return FALSE;
30667bf3
AM
2532 }
2533
2534 if (relocs)
2535 {
dc810e39
AM
2536 if (!add_dynamic_entry (DT_RELA, 0)
2537 || !add_dynamic_entry (DT_RELASZ, 0)
2538 || !add_dynamic_entry (DT_RELAENT, sizeof (Elf32_External_Rela)))
b34976b6 2539 return FALSE;
30667bf3 2540
98ceb8ce
AM
2541 /* If any dynamic relocs apply to a read-only section,
2542 then we need a DT_TEXTREL entry. */
248866a8
AM
2543 if ((info->flags & DF_TEXTREL) == 0)
2544 elf_link_hash_traverse (&htab->elf, readonly_dynrelocs,
2545 (PTR) info);
98ceb8ce
AM
2546
2547 if ((info->flags & DF_TEXTREL) != 0)
2548 {
2549 if (!add_dynamic_entry (DT_TEXTREL, 0))
b34976b6 2550 return FALSE;
98ceb8ce 2551 }
30667bf3
AM
2552 }
2553 }
dc810e39 2554#undef add_dynamic_entry
30667bf3 2555
b34976b6 2556 return TRUE;
30667bf3
AM
2557}
2558
30667bf3
AM
2559/* External entry points for sizing and building linker stubs. */
2560
b4655ea9
AM
2561/* Set up various things so that we can make a list of input sections
2562 for each output section included in the link. Returns -1 on error,
cedb70c5 2563 0 when no stubs will be needed, and 1 on success. */
30667bf3 2564
b4655ea9
AM
2565int
2566elf32_hppa_setup_section_lists (output_bfd, info)
25f72752 2567 bfd *output_bfd;
30667bf3 2568 struct bfd_link_info *info;
30667bf3
AM
2569{
2570 bfd *input_bfd;
b4655ea9
AM
2571 unsigned int bfd_count;
2572 int top_id, top_index;
30667bf3 2573 asection *section;
25f72752 2574 asection **input_list, **list;
dc810e39 2575 bfd_size_type amt;
b4655ea9 2576 struct elf32_hppa_link_hash_table *htab = hppa_link_hash_table (info);
30667bf3 2577
b4655ea9
AM
2578 if (htab->elf.root.creator->flavour != bfd_target_elf_flavour)
2579 return 0;
30667bf3 2580
1badb539
AM
2581 /* Count the number of input BFDs and find the top input section id. */
2582 for (input_bfd = info->input_bfds, bfd_count = 0, top_id = 0;
30667bf3
AM
2583 input_bfd != NULL;
2584 input_bfd = input_bfd->link_next)
2585 {
2586 bfd_count += 1;
25f72752
AM
2587 for (section = input_bfd->sections;
2588 section != NULL;
2589 section = section->next)
2590 {
2591 if (top_id < section->id)
2592 top_id = section->id;
2593 }
30667bf3 2594 }
b4655ea9 2595 htab->bfd_count = bfd_count;
30667bf3 2596
dc810e39 2597 amt = sizeof (struct map_stub) * (top_id + 1);
83c81bfe
AM
2598 htab->stub_group = (struct map_stub *) bfd_zmalloc (amt);
2599 if (htab->stub_group == NULL)
b4655ea9 2600 return -1;
1badb539 2601
b4655ea9 2602 /* We can't use output_bfd->section_count here to find the top output
1badb539
AM
2603 section index as some sections may have been removed, and
2604 _bfd_strip_section_from_output doesn't renumber the indices. */
2605 for (section = output_bfd->sections, top_index = 0;
2606 section != NULL;
2607 section = section->next)
2608 {
2609 if (top_index < section->index)
2610 top_index = section->index;
2611 }
2612
b4655ea9 2613 htab->top_index = top_index;
dc810e39
AM
2614 amt = sizeof (asection *) * (top_index + 1);
2615 input_list = (asection **) bfd_malloc (amt);
b4655ea9 2616 htab->input_list = input_list;
25f72752 2617 if (input_list == NULL)
b4655ea9 2618 return -1;
25f72752 2619
1badb539
AM
2620 /* For sections we aren't interested in, mark their entries with a
2621 value we can check later. */
2622 list = input_list + top_index;
2623 do
2624 *list = bfd_abs_section_ptr;
2625 while (list-- != input_list);
2626
2627 for (section = output_bfd->sections;
2628 section != NULL;
2629 section = section->next)
2630 {
47d89dba 2631 if ((section->flags & SEC_CODE) != 0)
1badb539
AM
2632 input_list[section->index] = NULL;
2633 }
2634
b4655ea9
AM
2635 return 1;
2636}
2637
2638/* The linker repeatedly calls this function for each input section,
2639 in the order that input sections are linked into output sections.
2640 Build lists of input sections to determine groupings between which
2641 we may insert linker stubs. */
2642
2643void
2644elf32_hppa_next_input_section (info, isec)
2645 struct bfd_link_info *info;
2646 asection *isec;
2647{
2648 struct elf32_hppa_link_hash_table *htab = hppa_link_hash_table (info);
2649
2650 if (isec->output_section->index <= htab->top_index)
25f72752 2651 {
b4655ea9
AM
2652 asection **list = htab->input_list + isec->output_section->index;
2653 if (*list != bfd_abs_section_ptr)
25f72752 2654 {
b4655ea9 2655 /* Steal the link_sec pointer for our list. */
83c81bfe 2656#define PREV_SEC(sec) (htab->stub_group[(sec)->id].link_sec)
b4655ea9
AM
2657 /* This happens to make the list in reverse order,
2658 which is what we want. */
2659 PREV_SEC (isec) = *list;
2660 *list = isec;
25f72752
AM
2661 }
2662 }
b4655ea9 2663}
25f72752 2664
b4655ea9
AM
2665/* See whether we can group stub sections together. Grouping stub
2666 sections may result in fewer stubs. More importantly, we need to
2667 put all .init* and .fini* stubs at the beginning of the .init or
2668 .fini output sections respectively, because glibc splits the
2669 _init and _fini functions into multiple parts. Putting a stub in
2670 the middle of a function is not a good idea. */
2671
2672static void
2673group_sections (htab, stub_group_size, stubs_always_before_branch)
2674 struct elf32_hppa_link_hash_table *htab;
2675 bfd_size_type stub_group_size;
b34976b6 2676 bfd_boolean stubs_always_before_branch;
b4655ea9
AM
2677{
2678 asection **list = htab->input_list + htab->top_index;
1badb539 2679 do
25f72752
AM
2680 {
2681 asection *tail = *list;
1badb539
AM
2682 if (tail == bfd_abs_section_ptr)
2683 continue;
25f72752
AM
2684 while (tail != NULL)
2685 {
2686 asection *curr;
2687 asection *prev;
2688 bfd_size_type total;
2689
2690 curr = tail;
2691 if (tail->_cooked_size)
2692 total = tail->_cooked_size;
2693 else
2694 total = tail->_raw_size;
2695 while ((prev = PREV_SEC (curr)) != NULL
2696 && ((total += curr->output_offset - prev->output_offset)
47d89dba 2697 < stub_group_size))
25f72752
AM
2698 curr = prev;
2699
2700 /* OK, the size from the start of CURR to the end is less
a248e267 2701 than 240000 bytes and thus can be handled by one stub
25f72752 2702 section. (or the tail section is itself larger than
a248e267 2703 240000 bytes, in which case we may be toast.)
25f72752
AM
2704 We should really be keeping track of the total size of
2705 stubs added here, as stubs contribute to the final output
2706 section size. That's a little tricky, and this way will
a248e267
AM
2707 only break if stubs added total more than 22144 bytes, or
2708 2768 long branch stubs. It seems unlikely for more than
2709 2768 different functions to be called, especially from
2710 code only 240000 bytes long. This limit used to be
2711 250000, but c++ code tends to generate lots of little
2712 functions, and sometimes violated the assumption. */
25f72752
AM
2713 do
2714 {
2715 prev = PREV_SEC (tail);
2716 /* Set up this stub group. */
83c81bfe 2717 htab->stub_group[tail->id].link_sec = curr;
25f72752
AM
2718 }
2719 while (tail != curr && (tail = prev) != NULL);
2720
a248e267 2721 /* But wait, there's more! Input sections up to 240000
25f72752 2722 bytes before the stub section can be handled by it too. */
47d89dba 2723 if (!stubs_always_before_branch)
25f72752 2724 {
47d89dba
AM
2725 total = 0;
2726 while (prev != NULL
2727 && ((total += tail->output_offset - prev->output_offset)
2728 < stub_group_size))
2729 {
2730 tail = prev;
2731 prev = PREV_SEC (tail);
83c81bfe 2732 htab->stub_group[tail->id].link_sec = curr;
47d89dba 2733 }
25f72752
AM
2734 }
2735 tail = prev;
2736 }
2737 }
b4655ea9
AM
2738 while (list-- != htab->input_list);
2739 free (htab->input_list);
1badb539 2740#undef PREV_SEC
b4655ea9
AM
2741}
2742
2743/* Read in all local syms for all input bfds, and create hash entries
2744 for export stubs if we are building a multi-subspace shared lib.
2745 Returns -1 on error, 1 if export stubs created, 0 otherwise. */
2746
2747static int
2748get_local_syms (output_bfd, input_bfd, info)
2749 bfd *output_bfd;
2750 bfd *input_bfd;
2751 struct bfd_link_info *info;
2752{
2753 unsigned int bfd_indx;
2754 Elf_Internal_Sym *local_syms, **all_local_syms;
2755 int stub_changed = 0;
2756 struct elf32_hppa_link_hash_table *htab = hppa_link_hash_table (info);
30667bf3
AM
2757
2758 /* We want to read in symbol extension records only once. To do this
2759 we need to read in the local symbols in parallel and save them for
2760 later use; so hold pointers to the local symbols in an array. */
b4655ea9 2761 bfd_size_type amt = sizeof (Elf_Internal_Sym *) * htab->bfd_count;
dc810e39 2762 all_local_syms = (Elf_Internal_Sym **) bfd_zmalloc (amt);
b4655ea9 2763 htab->all_local_syms = all_local_syms;
30667bf3 2764 if (all_local_syms == NULL)
b4655ea9 2765 return -1;
30667bf3
AM
2766
2767 /* Walk over all the input BFDs, swapping in local symbols.
2768 If we are creating a shared library, create hash entries for the
2769 export stubs. */
b4655ea9 2770 for (bfd_indx = 0;
30667bf3 2771 input_bfd != NULL;
25f72752 2772 input_bfd = input_bfd->link_next, bfd_indx++)
30667bf3
AM
2773 {
2774 Elf_Internal_Shdr *symtab_hdr;
edd21aca 2775
252b5132
RH
2776 /* We'll need the symbol table in a second. */
2777 symtab_hdr = &elf_tdata (input_bfd)->symtab_hdr;
2778 if (symtab_hdr->sh_info == 0)
2779 continue;
2780
6cdc0ccc
AM
2781 /* We need an array of the local symbols attached to the input bfd. */
2782 local_syms = (Elf_Internal_Sym *) symtab_hdr->contents;
edd21aca 2783 if (local_syms == NULL)
edd21aca 2784 {
6cdc0ccc
AM
2785 local_syms = bfd_elf_get_elf_syms (input_bfd, symtab_hdr,
2786 symtab_hdr->sh_info, 0,
2787 NULL, NULL, NULL);
2788 /* Cache them for elf_link_input_bfd. */
2789 symtab_hdr->contents = (unsigned char *) local_syms;
edd21aca 2790 }
6cdc0ccc
AM
2791 if (local_syms == NULL)
2792 return -1;
edd21aca 2793
6cdc0ccc 2794 all_local_syms[bfd_indx] = local_syms;
edd21aca 2795
83c81bfe 2796 if (info->shared && htab->multi_subspace)
30667bf3 2797 {
25f72752
AM
2798 struct elf_link_hash_entry **sym_hashes;
2799 struct elf_link_hash_entry **end_hashes;
30667bf3
AM
2800 unsigned int symcount;
2801
2802 symcount = (symtab_hdr->sh_size / sizeof (Elf32_External_Sym)
2803 - symtab_hdr->sh_info);
25f72752
AM
2804 sym_hashes = elf_sym_hashes (input_bfd);
2805 end_hashes = sym_hashes + symcount;
30667bf3
AM
2806
2807 /* Look through the global syms for functions; We need to
2808 build export stubs for all globally visible functions. */
25f72752 2809 for (; sym_hashes < end_hashes; sym_hashes++)
30667bf3
AM
2810 {
2811 struct elf32_hppa_link_hash_entry *hash;
2812
25f72752 2813 hash = (struct elf32_hppa_link_hash_entry *) *sym_hashes;
30667bf3
AM
2814
2815 while (hash->elf.root.type == bfd_link_hash_indirect
2816 || hash->elf.root.type == bfd_link_hash_warning)
2817 hash = ((struct elf32_hppa_link_hash_entry *)
2818 hash->elf.root.u.i.link);
2819
2820 /* At this point in the link, undefined syms have been
2821 resolved, so we need to check that the symbol was
2822 defined in this BFD. */
2823 if ((hash->elf.root.type == bfd_link_hash_defined
2824 || hash->elf.root.type == bfd_link_hash_defweak)
2825 && hash->elf.type == STT_FUNC
2826 && hash->elf.root.u.def.section->output_section != NULL
25f72752
AM
2827 && (hash->elf.root.u.def.section->output_section->owner
2828 == output_bfd)
30667bf3
AM
2829 && hash->elf.root.u.def.section->owner == input_bfd
2830 && (hash->elf.elf_link_hash_flags & ELF_LINK_HASH_DEF_REGULAR)
2831 && !(hash->elf.elf_link_hash_flags & ELF_LINK_FORCED_LOCAL)
2832 && ELF_ST_VISIBILITY (hash->elf.other) == STV_DEFAULT)
2833 {
2834 asection *sec;
2835 const char *stub_name;
2836 struct elf32_hppa_stub_hash_entry *stub_entry;
2837
2838 sec = hash->elf.root.u.def.section;
2839 stub_name = hash->elf.root.root.string;
83c81bfe 2840 stub_entry = hppa_stub_hash_lookup (&htab->stub_hash_table,
30667bf3 2841 stub_name,
b34976b6 2842 FALSE, FALSE);
30667bf3
AM
2843 if (stub_entry == NULL)
2844 {
83c81bfe 2845 stub_entry = hppa_add_stub (stub_name, sec, htab);
30667bf3 2846 if (!stub_entry)
b4655ea9 2847 return -1;
30667bf3
AM
2848
2849 stub_entry->target_value = hash->elf.root.u.def.value;
2850 stub_entry->target_section = hash->elf.root.u.def.section;
2851 stub_entry->stub_type = hppa_stub_export;
2852 stub_entry->h = hash;
2853 stub_changed = 1;
2854 }
2855 else
2856 {
2857 (*_bfd_error_handler) (_("%s: duplicate export stub %s"),
8f615d07
AM
2858 bfd_archive_filename (input_bfd),
2859 stub_name);
30667bf3
AM
2860 }
2861 }
2862 }
30667bf3
AM
2863 }
2864 }
edd21aca 2865
b4655ea9
AM
2866 return stub_changed;
2867}
2868
2869/* Determine and set the size of the stub section for a final link.
2870
2871 The basic idea here is to examine all the relocations looking for
2872 PC-relative calls to a target that is unreachable with a "bl"
2873 instruction. */
2874
b34976b6 2875bfd_boolean
b4655ea9
AM
2876elf32_hppa_size_stubs (output_bfd, stub_bfd, info, multi_subspace, group_size,
2877 add_stub_section, layout_sections_again)
2878 bfd *output_bfd;
2879 bfd *stub_bfd;
2880 struct bfd_link_info *info;
b34976b6 2881 bfd_boolean multi_subspace;
b4655ea9
AM
2882 bfd_signed_vma group_size;
2883 asection * (*add_stub_section) PARAMS ((const char *, asection *));
2884 void (*layout_sections_again) PARAMS ((void));
2885{
2886 bfd_size_type stub_group_size;
b34976b6
AM
2887 bfd_boolean stubs_always_before_branch;
2888 bfd_boolean stub_changed;
b4655ea9
AM
2889 struct elf32_hppa_link_hash_table *htab = hppa_link_hash_table (info);
2890
2891 /* Stash our params away. */
2892 htab->stub_bfd = stub_bfd;
2893 htab->multi_subspace = multi_subspace;
2894 htab->add_stub_section = add_stub_section;
2895 htab->layout_sections_again = layout_sections_again;
2896 stubs_always_before_branch = group_size < 0;
2897 if (group_size < 0)
2898 stub_group_size = -group_size;
2899 else
2900 stub_group_size = group_size;
2901 if (stub_group_size == 1)
2902 {
2903 /* Default values. */
2904 stub_group_size = 7680000;
2905 if (htab->has_17bit_branch || htab->multi_subspace)
2906 stub_group_size = 240000;
2907 if (htab->has_12bit_branch)
2908 stub_group_size = 7500;
2909 }
2910
2911 group_sections (htab, stub_group_size, stubs_always_before_branch);
2912
2913 switch (get_local_syms (output_bfd, info->input_bfds, info))
2914 {
2915 default:
2916 if (htab->all_local_syms)
2917 goto error_ret_free_local;
b34976b6 2918 return FALSE;
b4655ea9
AM
2919
2920 case 0:
b34976b6 2921 stub_changed = FALSE;
b4655ea9
AM
2922 break;
2923
2924 case 1:
b34976b6 2925 stub_changed = TRUE;
b4655ea9
AM
2926 break;
2927 }
2928
edd21aca
AM
2929 while (1)
2930 {
b4655ea9
AM
2931 bfd *input_bfd;
2932 unsigned int bfd_indx;
30667bf3
AM
2933 asection *stub_sec;
2934
25f72752 2935 for (input_bfd = info->input_bfds, bfd_indx = 0;
30667bf3 2936 input_bfd != NULL;
25f72752 2937 input_bfd = input_bfd->link_next, bfd_indx++)
30667bf3
AM
2938 {
2939 Elf_Internal_Shdr *symtab_hdr;
b4655ea9
AM
2940 asection *section;
2941 Elf_Internal_Sym *local_syms;
30667bf3
AM
2942
2943 /* We'll need the symbol table in a second. */
2944 symtab_hdr = &elf_tdata (input_bfd)->symtab_hdr;
2945 if (symtab_hdr->sh_info == 0)
2946 continue;
2947
b4655ea9 2948 local_syms = htab->all_local_syms[bfd_indx];
30667bf3
AM
2949
2950 /* Walk over each section attached to the input bfd. */
2951 for (section = input_bfd->sections;
2952 section != NULL;
25f72752 2953 section = section->next)
30667bf3 2954 {
30667bf3
AM
2955 Elf_Internal_Rela *internal_relocs, *irelaend, *irela;
2956
2957 /* If there aren't any relocs, then there's nothing more
2958 to do. */
2959 if ((section->flags & SEC_RELOC) == 0
2960 || section->reloc_count == 0)
2961 continue;
2962
25f72752
AM
2963 /* If this section is a link-once section that will be
2964 discarded, then don't create any stubs. */
2965 if (section->output_section == NULL
2966 || section->output_section->owner != output_bfd)
2967 continue;
2968
1e2f5b6e
AM
2969 /* Get the relocs. */
2970 internal_relocs
2971 = _bfd_elf32_link_read_relocs (input_bfd, section, NULL,
2972 (Elf_Internal_Rela *) NULL,
2973 info->keep_memory);
30667bf3 2974 if (internal_relocs == NULL)
1e2f5b6e 2975 goto error_ret_free_local;
30667bf3
AM
2976
2977 /* Now examine each relocation. */
2978 irela = internal_relocs;
2979 irelaend = irela + section->reloc_count;
2980 for (; irela < irelaend; irela++)
2981 {
2982 unsigned int r_type, r_indx;
2983 enum elf32_hppa_stub_type stub_type;
2984 struct elf32_hppa_stub_hash_entry *stub_entry;
2985 asection *sym_sec;
2986 bfd_vma sym_value;
2987 bfd_vma destination;
2988 struct elf32_hppa_link_hash_entry *hash;
2989 char *stub_name;
25f72752 2990 const asection *id_sec;
30667bf3
AM
2991
2992 r_type = ELF32_R_TYPE (irela->r_info);
2993 r_indx = ELF32_R_SYM (irela->r_info);
2994
2995 if (r_type >= (unsigned int) R_PARISC_UNIMPLEMENTED)
2996 {
2997 bfd_set_error (bfd_error_bad_value);
1e2f5b6e
AM
2998 error_ret_free_internal:
2999 if (elf_section_data (section)->relocs == NULL)
3000 free (internal_relocs);
3001 goto error_ret_free_local;
30667bf3
AM
3002 }
3003
3004 /* Only look for stubs on call instructions. */
3005 if (r_type != (unsigned int) R_PARISC_PCREL12F
3006 && r_type != (unsigned int) R_PARISC_PCREL17F
3007 && r_type != (unsigned int) R_PARISC_PCREL22F)
3008 continue;
3009
3010 /* Now determine the call target, its name, value,
3011 section. */
3012 sym_sec = NULL;
3013 sym_value = 0;
3014 destination = 0;
3015 hash = NULL;
3016 if (r_indx < symtab_hdr->sh_info)
3017 {
3018 /* It's a local symbol. */
3019 Elf_Internal_Sym *sym;
3020 Elf_Internal_Shdr *hdr;
3021
3022 sym = local_syms + r_indx;
3023 hdr = elf_elfsections (input_bfd)[sym->st_shndx];
3024 sym_sec = hdr->bfd_section;
3025 if (ELF_ST_TYPE (sym->st_info) != STT_SECTION)
3026 sym_value = sym->st_value;
3027 destination = (sym_value + irela->r_addend
3028 + sym_sec->output_offset
3029 + sym_sec->output_section->vma);
3030 }
3031 else
3032 {
3033 /* It's an external symbol. */
3034 int e_indx;
3035
3036 e_indx = r_indx - symtab_hdr->sh_info;
3037 hash = ((struct elf32_hppa_link_hash_entry *)
3038 elf_sym_hashes (input_bfd)[e_indx]);
3039
3040 while (hash->elf.root.type == bfd_link_hash_indirect
3041 || hash->elf.root.type == bfd_link_hash_warning)
3042 hash = ((struct elf32_hppa_link_hash_entry *)
3043 hash->elf.root.u.i.link);
3044
3045 if (hash->elf.root.type == bfd_link_hash_defined
3046 || hash->elf.root.type == bfd_link_hash_defweak)
3047 {
3048 sym_sec = hash->elf.root.u.def.section;
3049 sym_value = hash->elf.root.u.def.value;
3050 if (sym_sec->output_section != NULL)
3051 destination = (sym_value + irela->r_addend
3052 + sym_sec->output_offset
3053 + sym_sec->output_section->vma);
3054 }
3055 else if (hash->elf.root.type == bfd_link_hash_undefweak)
c432ba1a
AM
3056 {
3057 if (! info->shared)
3058 continue;
3059 }
30667bf3 3060 else if (hash->elf.root.type == bfd_link_hash_undefined)
c432ba1a
AM
3061 {
3062 if (! (info->shared
3063 && !info->no_undefined
3064 && (ELF_ST_VISIBILITY (hash->elf.other)
3065 == STV_DEFAULT)
3066 && hash->elf.type != STT_PARISC_MILLI))
3067 continue;
3068 }
30667bf3
AM
3069 else
3070 {
3071 bfd_set_error (bfd_error_bad_value);
3072 goto error_ret_free_internal;
3073 }
3074 }
3075
3076 /* Determine what (if any) linker stub is needed. */
3077 stub_type = hppa_type_of_stub (section, irela, hash,
3078 destination);
3079 if (stub_type == hppa_stub_none)
3080 continue;
3081
25f72752 3082 /* Support for grouping stub sections. */
83c81bfe 3083 id_sec = htab->stub_group[section->id].link_sec;
25f72752 3084
30667bf3 3085 /* Get the name of this stub. */
25f72752 3086 stub_name = hppa_stub_name (id_sec, sym_sec, hash, irela);
30667bf3
AM
3087 if (!stub_name)
3088 goto error_ret_free_internal;
3089
83c81bfe 3090 stub_entry = hppa_stub_hash_lookup (&htab->stub_hash_table,
30667bf3 3091 stub_name,
b34976b6 3092 FALSE, FALSE);
30667bf3
AM
3093 if (stub_entry != NULL)
3094 {
3095 /* The proper stub has already been created. */
3096 free (stub_name);
3097 continue;
3098 }
3099
83c81bfe 3100 stub_entry = hppa_add_stub (stub_name, section, htab);
30667bf3
AM
3101 if (stub_entry == NULL)
3102 {
3103 free (stub_name);
1e2f5b6e 3104 goto error_ret_free_internal;
30667bf3
AM
3105 }
3106
3107 stub_entry->target_value = sym_value;
3108 stub_entry->target_section = sym_sec;
3109 stub_entry->stub_type = stub_type;
3110 if (info->shared)
3111 {
3112 if (stub_type == hppa_stub_import)
3113 stub_entry->stub_type = hppa_stub_import_shared;
98ceb8ce 3114 else if (stub_type == hppa_stub_long_branch)
30667bf3
AM
3115 stub_entry->stub_type = hppa_stub_long_branch_shared;
3116 }
3117 stub_entry->h = hash;
b34976b6 3118 stub_changed = TRUE;
30667bf3
AM
3119 }
3120
3121 /* We're done with the internal relocs, free them. */
1e2f5b6e
AM
3122 if (elf_section_data (section)->relocs == NULL)
3123 free (internal_relocs);
30667bf3
AM
3124 }
3125 }
3126
3127 if (!stub_changed)
3128 break;
3129
3130 /* OK, we've added some stubs. Find out the new size of the
3131 stub sections. */
83c81bfe 3132 for (stub_sec = htab->stub_bfd->sections;
30667bf3
AM
3133 stub_sec != NULL;
3134 stub_sec = stub_sec->next)
3135 {
74d1c347
AM
3136 stub_sec->_raw_size = 0;
3137 stub_sec->_cooked_size = 0;
3138 }
74d1c347 3139
83c81bfe 3140 bfd_hash_traverse (&htab->stub_hash_table, hppa_size_one_stub, htab);
74d1c347 3141
30667bf3 3142 /* Ask the linker to do its stuff. */
83c81bfe 3143 (*htab->layout_sections_again) ();
b34976b6 3144 stub_changed = FALSE;
30667bf3
AM
3145 }
3146
6cdc0ccc 3147 free (htab->all_local_syms);
b34976b6 3148 return TRUE;
30667bf3
AM
3149
3150 error_ret_free_local:
b4655ea9 3151 free (htab->all_local_syms);
b34976b6 3152 return FALSE;
30667bf3
AM
3153}
3154
30667bf3
AM
3155/* For a final link, this function is called after we have sized the
3156 stubs to provide a value for __gp. */
3157
b34976b6 3158bfd_boolean
30667bf3
AM
3159elf32_hppa_set_gp (abfd, info)
3160 bfd *abfd;
3161 struct bfd_link_info *info;
3162{
b4655ea9
AM
3163 struct bfd_link_hash_entry *h;
3164 asection *sec = NULL;
3165 bfd_vma gp_val = 0;
83c81bfe 3166 struct elf32_hppa_link_hash_table *htab;
30667bf3 3167
83c81bfe 3168 htab = hppa_link_hash_table (info);
b34976b6 3169 h = bfd_link_hash_lookup (&htab->elf.root, "$global$", FALSE, FALSE, FALSE);
30667bf3 3170
df8634e3 3171 if (h != NULL
b4655ea9
AM
3172 && (h->type == bfd_link_hash_defined
3173 || h->type == bfd_link_hash_defweak))
30667bf3 3174 {
b4655ea9
AM
3175 gp_val = h->u.def.value;
3176 sec = h->u.def.section;
30667bf3
AM
3177 }
3178 else
3179 {
b4655ea9
AM
3180 asection *splt;
3181 asection *sgot;
3182
3183 if (htab->elf.root.creator->flavour == bfd_target_elf_flavour)
3184 {
3185 splt = htab->splt;
3186 sgot = htab->sgot;
3187 }
3188 else
3189 {
3190 /* If we're not elf, look up the output sections in the
3191 hope we may actually find them. */
3192 splt = bfd_get_section_by_name (abfd, ".plt");
3193 sgot = bfd_get_section_by_name (abfd, ".got");
3194 }
3195
74d1c347
AM
3196 /* Choose to point our LTP at, in this order, one of .plt, .got,
3197 or .data, if these sections exist. In the case of choosing
3198 .plt try to make the LTP ideal for addressing anywhere in the
3199 .plt or .got with a 14 bit signed offset. Typically, the end
3200 of the .plt is the start of the .got, so choose .plt + 0x2000
3201 if either the .plt or .got is larger than 0x2000. If both
3202 the .plt and .got are smaller than 0x2000, choose the end of
3203 the .plt section. */
b4655ea9 3204 sec = splt;
74d1c347 3205 if (sec != NULL)
30667bf3 3206 {
74d1c347 3207 gp_val = sec->_raw_size;
b4655ea9 3208 if (gp_val > 0x2000 || (sgot && sgot->_raw_size > 0x2000))
74d1c347
AM
3209 {
3210 gp_val = 0x2000;
3211 }
3212 }
3213 else
3214 {
b4655ea9 3215 sec = sgot;
74d1c347
AM
3216 if (sec != NULL)
3217 {
3218 /* We know we don't have a .plt. If .got is large,
3219 offset our LTP. */
3220 if (sec->_raw_size > 0x2000)
3221 gp_val = 0x2000;
3222 }
3223 else
3224 {
3225 /* No .plt or .got. Who cares what the LTP is? */
3226 sec = bfd_get_section_by_name (abfd, ".data");
3227 }
30667bf3 3228 }
df8634e3
AM
3229
3230 if (h != NULL)
3231 {
b4655ea9
AM
3232 h->type = bfd_link_hash_defined;
3233 h->u.def.value = gp_val;
df8634e3 3234 if (sec != NULL)
b4655ea9 3235 h->u.def.section = sec;
df8634e3 3236 else
b4655ea9 3237 h->u.def.section = bfd_abs_section_ptr;
df8634e3 3238 }
30667bf3
AM
3239 }
3240
b32b5d6e 3241 if (sec != NULL && sec->output_section != NULL)
74d1c347
AM
3242 gp_val += sec->output_section->vma + sec->output_offset;
3243
3244 elf_gp (abfd) = gp_val;
b34976b6 3245 return TRUE;
30667bf3
AM
3246}
3247
30667bf3
AM
3248/* Build all the stubs associated with the current output file. The
3249 stubs are kept in a hash table attached to the main linker hash
3250 table. We also set up the .plt entries for statically linked PIC
3251 functions here. This function is called via hppaelf_finish in the
3252 linker. */
3253
b34976b6 3254bfd_boolean
30667bf3
AM
3255elf32_hppa_build_stubs (info)
3256 struct bfd_link_info *info;
3257{
3258 asection *stub_sec;
3259 struct bfd_hash_table *table;
83c81bfe 3260 struct elf32_hppa_link_hash_table *htab;
30667bf3 3261
83c81bfe 3262 htab = hppa_link_hash_table (info);
30667bf3 3263
83c81bfe 3264 for (stub_sec = htab->stub_bfd->sections;
30667bf3
AM
3265 stub_sec != NULL;
3266 stub_sec = stub_sec->next)
3267 {
dc810e39 3268 bfd_size_type size;
30667bf3
AM
3269
3270 /* Allocate memory to hold the linker stubs. */
74d1c347 3271 size = stub_sec->_raw_size;
83c81bfe 3272 stub_sec->contents = (unsigned char *) bfd_zalloc (htab->stub_bfd, size);
30667bf3 3273 if (stub_sec->contents == NULL && size != 0)
b34976b6 3274 return FALSE;
74d1c347 3275 stub_sec->_raw_size = 0;
30667bf3
AM
3276 }
3277
3278 /* Build the stubs as directed by the stub hash table. */
83c81bfe 3279 table = &htab->stub_hash_table;
30667bf3
AM
3280 bfd_hash_traverse (table, hppa_build_one_stub, info);
3281
b34976b6 3282 return TRUE;
30667bf3
AM
3283}
3284
c46b7515
AM
3285/* Perform a final link. */
3286
b34976b6 3287static bfd_boolean
c46b7515
AM
3288elf32_hppa_final_link (abfd, info)
3289 bfd *abfd;
3290 struct bfd_link_info *info;
3291{
4dc86686
AM
3292 /* Invoke the regular ELF linker to do all the work. */
3293 if (!bfd_elf32_bfd_final_link (abfd, info))
b34976b6 3294 return FALSE;
c46b7515
AM
3295
3296 /* If we're producing a final executable, sort the contents of the
985142a4 3297 unwind section. */
46fe4e66 3298 return elf_hppa_sort_unwind (abfd);
c46b7515
AM
3299}
3300
3301/* Record the lowest address for the data and text segments. */
3302
3303static void
3304hppa_record_segment_addr (abfd, section, data)
3305 bfd *abfd ATTRIBUTE_UNUSED;
3306 asection *section;
3307 PTR data;
3308{
83c81bfe 3309 struct elf32_hppa_link_hash_table *htab;
c46b7515 3310
83c81bfe 3311 htab = (struct elf32_hppa_link_hash_table *) data;
c46b7515
AM
3312
3313 if ((section->flags & (SEC_ALLOC | SEC_LOAD)) == (SEC_ALLOC | SEC_LOAD))
3314 {
3315 bfd_vma value = section->vma - section->filepos;
3316
3317 if ((section->flags & SEC_READONLY) != 0)
3318 {
83c81bfe
AM
3319 if (value < htab->text_segment_base)
3320 htab->text_segment_base = value;
c46b7515
AM
3321 }
3322 else
3323 {
83c81bfe
AM
3324 if (value < htab->data_segment_base)
3325 htab->data_segment_base = value;
c46b7515
AM
3326 }
3327 }
3328}
3329
30667bf3
AM
3330/* Perform a relocation as part of a final link. */
3331
3332static bfd_reloc_status_type
83c81bfe 3333final_link_relocate (input_section, contents, rel, value, htab, sym_sec, h)
30667bf3
AM
3334 asection *input_section;
3335 bfd_byte *contents;
3336 const Elf_Internal_Rela *rel;
3337 bfd_vma value;
83c81bfe 3338 struct elf32_hppa_link_hash_table *htab;
30667bf3
AM
3339 asection *sym_sec;
3340 struct elf32_hppa_link_hash_entry *h;
3341{
3342 int insn;
3343 unsigned int r_type = ELF32_R_TYPE (rel->r_info);
3344 reloc_howto_type *howto = elf_hppa_howto_table + r_type;
3345 int r_format = howto->bitsize;
3346 enum hppa_reloc_field_selector_type_alt r_field;
3347 bfd *input_bfd = input_section->owner;
3348 bfd_vma offset = rel->r_offset;
3349 bfd_vma max_branch_offset = 0;
3350 bfd_byte *hit_data = contents + offset;
3351 bfd_signed_vma addend = rel->r_addend;
3352 bfd_vma location;
3353 struct elf32_hppa_stub_hash_entry *stub_entry = NULL;
3354 int val;
3355
3356 if (r_type == R_PARISC_NONE)
3357 return bfd_reloc_ok;
3358
3359 insn = bfd_get_32 (input_bfd, hit_data);
3360
3361 /* Find out where we are and where we're going. */
3362 location = (offset +
3363 input_section->output_offset +
3364 input_section->output_section->vma);
3365
3366 switch (r_type)
3367 {
3368 case R_PARISC_PCREL12F:
3369 case R_PARISC_PCREL17F:
3370 case R_PARISC_PCREL22F:
067fa4a6
AM
3371 /* If this call should go via the plt, find the import stub in
3372 the stub hash. */
30667bf3
AM
3373 if (sym_sec == NULL
3374 || sym_sec->output_section == NULL
12cca0d2 3375 || (h != NULL
067fa4a6
AM
3376 && h->elf.plt.offset != (bfd_vma) -1
3377 && (h->elf.dynindx != -1 || h->pic_call)
3378 && !h->plabel))
30667bf3
AM
3379 {
3380 stub_entry = hppa_get_stub_entry (input_section, sym_sec,
83c81bfe 3381 h, rel, htab);
30667bf3
AM
3382 if (stub_entry != NULL)
3383 {
3384 value = (stub_entry->stub_offset
3385 + stub_entry->stub_sec->output_offset
3386 + stub_entry->stub_sec->output_section->vma);
3387 addend = 0;
3388 }
3389 else if (sym_sec == NULL && h != NULL
3390 && h->elf.root.type == bfd_link_hash_undefweak)
3391 {
db20fd76
AM
3392 /* It's OK if undefined weak. Calls to undefined weak
3393 symbols behave as if the "called" function
3394 immediately returns. We can thus call to a weak
3395 function without first checking whether the function
3396 is defined. */
30667bf3 3397 value = location;
db20fd76 3398 addend = 8;
30667bf3
AM
3399 }
3400 else
f09ebc7d 3401 return bfd_reloc_undefined;
30667bf3
AM
3402 }
3403 /* Fall thru. */
3404
3405 case R_PARISC_PCREL21L:
3406 case R_PARISC_PCREL17C:
3407 case R_PARISC_PCREL17R:
3408 case R_PARISC_PCREL14R:
3409 case R_PARISC_PCREL14F:
3410 /* Make it a pc relative offset. */
3411 value -= location;
3412 addend -= 8;
3413 break;
3414
3415 case R_PARISC_DPREL21L:
3416 case R_PARISC_DPREL14R:
3417 case R_PARISC_DPREL14F:
3418 /* For all the DP relative relocations, we need to examine the symbol's
95d0f04a
DA
3419 section. If it has no section or if it's a code section, then
3420 "data pointer relative" makes no sense. In that case we don't
3421 adjust the "value", and for 21 bit addil instructions, we change the
3422 source addend register from %dp to %r0. This situation commonly
3423 arises for undefined weak symbols and when a variable's "constness"
30667bf3
AM
3424 is declared differently from the way the variable is defined. For
3425 instance: "extern int foo" with foo defined as "const int foo". */
95d0f04a 3426 if (sym_sec == NULL || (sym_sec->flags & SEC_CODE) != 0)
30667bf3
AM
3427 {
3428 if ((insn & ((0x3f << 26) | (0x1f << 21)))
3429 == (((int) OP_ADDIL << 26) | (27 << 21)))
3430 {
3431 insn &= ~ (0x1f << 21);
067fa4a6 3432#if 0 /* debug them. */
30667bf3
AM
3433 (*_bfd_error_handler)
3434 (_("%s(%s+0x%lx): fixing %s"),
8f615d07 3435 bfd_archive_filename (input_bfd),
30667bf3
AM
3436 input_section->name,
3437 (long) rel->r_offset,
3438 howto->name);
3439#endif
3440 }
3441 /* Now try to make things easy for the dynamic linker. */
3442
3443 break;
3444 }
74d1c347 3445 /* Fall thru. */
30667bf3
AM
3446
3447 case R_PARISC_DLTIND21L:
3448 case R_PARISC_DLTIND14R:
3449 case R_PARISC_DLTIND14F:
3450 value -= elf_gp (input_section->output_section->owner);
3451 break;
3452
c46b7515
AM
3453 case R_PARISC_SEGREL32:
3454 if ((sym_sec->flags & SEC_CODE) != 0)
83c81bfe 3455 value -= htab->text_segment_base;
c46b7515 3456 else
83c81bfe 3457 value -= htab->data_segment_base;
c46b7515
AM
3458 break;
3459
30667bf3
AM
3460 default:
3461 break;
3462 }
3463
3464 switch (r_type)
3465 {
3466 case R_PARISC_DIR32:
47d89dba 3467 case R_PARISC_DIR14F:
30667bf3
AM
3468 case R_PARISC_DIR17F:
3469 case R_PARISC_PCREL17C:
3470 case R_PARISC_PCREL14F:
3471 case R_PARISC_DPREL14F:
3472 case R_PARISC_PLABEL32:
3473 case R_PARISC_DLTIND14F:
3474 case R_PARISC_SEGBASE:
3475 case R_PARISC_SEGREL32:
3476 r_field = e_fsel;
3477 break;
3478
1bf42538 3479 case R_PARISC_DLTIND21L:
30667bf3 3480 case R_PARISC_PCREL21L:
30667bf3 3481 case R_PARISC_PLABEL21L:
1bf42538
JL
3482 r_field = e_lsel;
3483 break;
3484
3485 case R_PARISC_DIR21L:
3486 case R_PARISC_DPREL21L:
30667bf3
AM
3487 r_field = e_lrsel;
3488 break;
3489
30667bf3 3490 case R_PARISC_PCREL17R:
30667bf3 3491 case R_PARISC_PCREL14R:
30667bf3
AM
3492 case R_PARISC_PLABEL14R:
3493 case R_PARISC_DLTIND14R:
1bf42538
JL
3494 r_field = e_rsel;
3495 break;
3496
3497 case R_PARISC_DIR17R:
3498 case R_PARISC_DIR14R:
3499 case R_PARISC_DPREL14R:
30667bf3
AM
3500 r_field = e_rrsel;
3501 break;
3502
3503 case R_PARISC_PCREL12F:
3504 case R_PARISC_PCREL17F:
3505 case R_PARISC_PCREL22F:
3506 r_field = e_fsel;
3507
3508 if (r_type == (unsigned int) R_PARISC_PCREL17F)
3509 {
3510 max_branch_offset = (1 << (17-1)) << 2;
3511 }
3512 else if (r_type == (unsigned int) R_PARISC_PCREL12F)
3513 {
3514 max_branch_offset = (1 << (12-1)) << 2;
3515 }
3516 else
3517 {
3518 max_branch_offset = (1 << (22-1)) << 2;
3519 }
3520
3521 /* sym_sec is NULL on undefined weak syms or when shared on
3522 undefined syms. We've already checked for a stub for the
3523 shared undefined case. */
3524 if (sym_sec == NULL)
3525 break;
3526
3527 /* If the branch is out of reach, then redirect the
3528 call to the local stub for this function. */
3529 if (value + addend + max_branch_offset >= 2*max_branch_offset)
3530 {
3531 stub_entry = hppa_get_stub_entry (input_section, sym_sec,
83c81bfe 3532 h, rel, htab);
30667bf3 3533 if (stub_entry == NULL)
f09ebc7d 3534 return bfd_reloc_undefined;
30667bf3
AM
3535
3536 /* Munge up the value and addend so that we call the stub
3537 rather than the procedure directly. */
3538 value = (stub_entry->stub_offset
3539 + stub_entry->stub_sec->output_offset
3540 + stub_entry->stub_sec->output_section->vma
3541 - location);
3542 addend = -8;
3543 }
3544 break;
3545
3546 /* Something we don't know how to handle. */
3547 default:
3548 return bfd_reloc_notsupported;
3549 }
3550
3551 /* Make sure we can reach the stub. */
3552 if (max_branch_offset != 0
3553 && value + addend + max_branch_offset >= 2*max_branch_offset)
3554 {
3555 (*_bfd_error_handler)
3556 (_("%s(%s+0x%lx): cannot reach %s, recompile with -ffunction-sections"),
8f615d07 3557 bfd_archive_filename (input_bfd),
30667bf3
AM
3558 input_section->name,
3559 (long) rel->r_offset,
3560 stub_entry->root.string);
ce757d15 3561 bfd_set_error (bfd_error_bad_value);
30667bf3
AM
3562 return bfd_reloc_notsupported;
3563 }
3564
3565 val = hppa_field_adjust (value, addend, r_field);
3566
3567 switch (r_type)
3568 {
3569 case R_PARISC_PCREL12F:
3570 case R_PARISC_PCREL17C:
3571 case R_PARISC_PCREL17F:
3572 case R_PARISC_PCREL17R:
3573 case R_PARISC_PCREL22F:
3574 case R_PARISC_DIR17F:
3575 case R_PARISC_DIR17R:
3576 /* This is a branch. Divide the offset by four.
3577 Note that we need to decide whether it's a branch or
3578 otherwise by inspecting the reloc. Inspecting insn won't
3579 work as insn might be from a .word directive. */
3580 val >>= 2;
3581 break;
3582
3583 default:
3584 break;
3585 }
3586
3587 insn = hppa_rebuild_insn (insn, val, r_format);
3588
3589 /* Update the instruction word. */
74d1c347 3590 bfd_put_32 (input_bfd, (bfd_vma) insn, hit_data);
30667bf3
AM
3591 return bfd_reloc_ok;
3592}
3593
30667bf3
AM
3594/* Relocate an HPPA ELF section. */
3595
b34976b6 3596static bfd_boolean
30667bf3
AM
3597elf32_hppa_relocate_section (output_bfd, info, input_bfd, input_section,
3598 contents, relocs, local_syms, local_sections)
3599 bfd *output_bfd;
3600 struct bfd_link_info *info;
3601 bfd *input_bfd;
3602 asection *input_section;
3603 bfd_byte *contents;
3604 Elf_Internal_Rela *relocs;
3605 Elf_Internal_Sym *local_syms;
3606 asection **local_sections;
3607{
30667bf3 3608 bfd_vma *local_got_offsets;
83c81bfe 3609 struct elf32_hppa_link_hash_table *htab;
30667bf3
AM
3610 Elf_Internal_Shdr *symtab_hdr;
3611 Elf_Internal_Rela *rel;
3612 Elf_Internal_Rela *relend;
30667bf3 3613
f0fe0e16 3614 if (info->relocateable)
b34976b6 3615 return TRUE;
f0fe0e16 3616
30667bf3
AM
3617 symtab_hdr = &elf_tdata (input_bfd)->symtab_hdr;
3618
83c81bfe 3619 htab = hppa_link_hash_table (info);
74d1c347 3620 local_got_offsets = elf_local_got_offsets (input_bfd);
30667bf3
AM
3621
3622 rel = relocs;
3623 relend = relocs + input_section->reloc_count;
3624 for (; rel < relend; rel++)
3625 {
3626 unsigned int r_type;
3627 reloc_howto_type *howto;
3628 unsigned int r_symndx;
3629 struct elf32_hppa_link_hash_entry *h;
3630 Elf_Internal_Sym *sym;
3631 asection *sym_sec;
3632 bfd_vma relocation;
3633 bfd_reloc_status_type r;
3634 const char *sym_name;
b34976b6
AM
3635 bfd_boolean plabel;
3636 bfd_boolean warned_undef;
30667bf3
AM
3637
3638 r_type = ELF32_R_TYPE (rel->r_info);
3639 if (r_type >= (unsigned int) R_PARISC_UNIMPLEMENTED)
3640 {
3641 bfd_set_error (bfd_error_bad_value);
b34976b6 3642 return FALSE;
30667bf3
AM
3643 }
3644 if (r_type == (unsigned int) R_PARISC_GNU_VTENTRY
3645 || r_type == (unsigned int) R_PARISC_GNU_VTINHERIT)
3646 continue;
3647
30667bf3 3648 /* This is a final link. */
f0fe0e16 3649 r_symndx = ELF32_R_SYM (rel->r_info);
30667bf3
AM
3650 h = NULL;
3651 sym = NULL;
3652 sym_sec = NULL;
b34976b6 3653 warned_undef = FALSE;
30667bf3
AM
3654 if (r_symndx < symtab_hdr->sh_info)
3655 {
3656 /* This is a local symbol, h defaults to NULL. */
3657 sym = local_syms + r_symndx;
3658 sym_sec = local_sections[r_symndx];
f8df10f4 3659 relocation = _bfd_elf_rela_local_sym (output_bfd, sym, sym_sec, rel);
30667bf3
AM
3660 }
3661 else
3662 {
3663 int indx;
3664
3665 /* It's a global; Find its entry in the link hash. */
3666 indx = r_symndx - symtab_hdr->sh_info;
3667 h = ((struct elf32_hppa_link_hash_entry *)
3668 elf_sym_hashes (input_bfd)[indx]);
3669 while (h->elf.root.type == bfd_link_hash_indirect
3670 || h->elf.root.type == bfd_link_hash_warning)
3671 h = (struct elf32_hppa_link_hash_entry *) h->elf.root.u.i.link;
3672
3673 relocation = 0;
3674 if (h->elf.root.type == bfd_link_hash_defined
3675 || h->elf.root.type == bfd_link_hash_defweak)
3676 {
3677 sym_sec = h->elf.root.u.def.section;
3678 /* If sym_sec->output_section is NULL, then it's a
3679 symbol defined in a shared library. */
3680 if (sym_sec->output_section != NULL)
3681 relocation = (h->elf.root.u.def.value
3682 + sym_sec->output_offset
3683 + sym_sec->output_section->vma);
3684 }
3685 else if (h->elf.root.type == bfd_link_hash_undefweak)
3686 ;
3687 else if (info->shared && !info->no_undefined
49e9d0d3
AM
3688 && ELF_ST_VISIBILITY (h->elf.other) == STV_DEFAULT
3689 && h->elf.type != STT_PARISC_MILLI)
30667bf3 3690 {
671bae9c 3691 if (info->symbolic && !info->allow_shlib_undefined)
f09ebc7d
AM
3692 {
3693 if (!((*info->callbacks->undefined_symbol)
3694 (info, h->elf.root.root.string, input_bfd,
b34976b6
AM
3695 input_section, rel->r_offset, FALSE)))
3696 return FALSE;
3697 warned_undef = TRUE;
f09ebc7d 3698 }
30667bf3
AM
3699 }
3700 else
3701 {
3702 if (!((*info->callbacks->undefined_symbol)
3703 (info, h->elf.root.root.string, input_bfd,
b34976b6
AM
3704 input_section, rel->r_offset, TRUE)))
3705 return FALSE;
3706 warned_undef = TRUE;
30667bf3
AM
3707 }
3708 }
3709
3710 /* Do any required modifications to the relocation value, and
25f72752
AM
3711 determine what types of dynamic info we need to output, if
3712 any. */
74d1c347 3713 plabel = 0;
30667bf3
AM
3714 switch (r_type)
3715 {
3716 case R_PARISC_DLTIND14F:
3717 case R_PARISC_DLTIND14R:
3718 case R_PARISC_DLTIND21L:
ce757d15
AM
3719 {
3720 bfd_vma off;
b34976b6 3721 bfd_boolean do_got = 0;
ce757d15
AM
3722
3723 /* Relocation is to the entry for this symbol in the
3724 global offset table. */
3725 if (h != NULL)
3726 {
b34976b6 3727 bfd_boolean dyn;
ce757d15
AM
3728
3729 off = h->elf.got.offset;
3730 dyn = htab->elf.dynamic_sections_created;
3731 if (! WILL_CALL_FINISH_DYNAMIC_SYMBOL (dyn, info, &h->elf))
3732 {
3733 /* If we aren't going to call finish_dynamic_symbol,
3734 then we need to handle initialisation of the .got
3735 entry and create needed relocs here. Since the
3736 offset must always be a multiple of 4, we use the
3737 least significant bit to record whether we have
3738 initialised it already. */
3739 if ((off & 1) != 0)
3740 off &= ~1;
3741 else
3742 {
3743 h->elf.got.offset |= 1;
3744 do_got = 1;
3745 }
3746 }
3747 }
3748 else
3749 {
3750 /* Local symbol case. */
3751 if (local_got_offsets == NULL)
3752 abort ();
3753
3754 off = local_got_offsets[r_symndx];
3755
3756 /* The offset must always be a multiple of 4. We use
3757 the least significant bit to record whether we have
3758 already generated the necessary reloc. */
3759 if ((off & 1) != 0)
3760 off &= ~1;
3761 else
3762 {
3763 local_got_offsets[r_symndx] |= 1;
3764 do_got = 1;
3765 }
3766 }
68fb2e56 3767
ce757d15
AM
3768 if (do_got)
3769 {
3770 if (info->shared)
3771 {
3772 /* Output a dynamic relocation for this GOT entry.
3773 In this case it is relative to the base of the
3774 object because the symbol index is zero. */
3775 Elf_Internal_Rela outrel;
947216bf
AM
3776 bfd_byte *loc;
3777 asection *s = htab->srelgot;
ce757d15
AM
3778
3779 outrel.r_offset = (off
3780 + htab->sgot->output_offset
3781 + htab->sgot->output_section->vma);
3782 outrel.r_info = ELF32_R_INFO (0, R_PARISC_DIR32);
3783 outrel.r_addend = relocation;
947216bf
AM
3784 loc = s->contents;
3785 loc += s->reloc_count++ * sizeof (Elf32_External_Rela);
ce757d15
AM
3786 bfd_elf32_swap_reloca_out (output_bfd, &outrel, loc);
3787 }
3788 else
30667bf3 3789 bfd_put_32 (output_bfd, relocation,
83c81bfe 3790 htab->sgot->contents + off);
ce757d15 3791 }
30667bf3 3792
ce757d15
AM
3793 if (off >= (bfd_vma) -2)
3794 abort ();
30667bf3 3795
ce757d15
AM
3796 /* Add the base of the GOT to the relocation value. */
3797 relocation = (off
3798 + htab->sgot->output_offset
3799 + htab->sgot->output_section->vma);
3800 }
30667bf3 3801 break;
252b5132 3802
c46b7515
AM
3803 case R_PARISC_SEGREL32:
3804 /* If this is the first SEGREL relocation, then initialize
3805 the segment base values. */
83c81bfe
AM
3806 if (htab->text_segment_base == (bfd_vma) -1)
3807 bfd_map_over_sections (output_bfd, hppa_record_segment_addr, htab);
c46b7515
AM
3808 break;
3809
30667bf3
AM
3810 case R_PARISC_PLABEL14R:
3811 case R_PARISC_PLABEL21L:
3812 case R_PARISC_PLABEL32:
ebe50bae 3813 if (htab->elf.dynamic_sections_created)
252b5132 3814 {
ce757d15 3815 bfd_vma off;
b34976b6 3816 bfd_boolean do_plt = 0;
ce757d15 3817
74d1c347
AM
3818 /* If we have a global symbol with a PLT slot, then
3819 redirect this relocation to it. */
3820 if (h != NULL)
3821 {
3822 off = h->elf.plt.offset;
4dc86686 3823 if (! WILL_CALL_FINISH_DYNAMIC_SYMBOL (1, info, &h->elf))
8dea1268
AM
3824 {
3825 /* In a non-shared link, adjust_dynamic_symbols
3826 isn't called for symbols forced local. We
dc810e39 3827 need to write out the plt entry here. */
8dea1268
AM
3828 if ((off & 1) != 0)
3829 off &= ~1;
3830 else
3831 {
8dea1268 3832 h->elf.plt.offset |= 1;
ce757d15 3833 do_plt = 1;
8dea1268
AM
3834 }
3835 }
74d1c347
AM
3836 }
3837 else
3838 {
68fb2e56
AM
3839 bfd_vma *local_plt_offsets;
3840
3841 if (local_got_offsets == NULL)
3842 abort ();
74d1c347 3843
68fb2e56
AM
3844 local_plt_offsets = local_got_offsets + symtab_hdr->sh_info;
3845 off = local_plt_offsets[r_symndx];
74d1c347
AM
3846
3847 /* As for the local .got entry case, we use the last
3848 bit to record whether we've already initialised
3849 this local .plt entry. */
3850 if ((off & 1) != 0)
3851 off &= ~1;
ce757d15
AM
3852 else
3853 {
3854 local_plt_offsets[r_symndx] |= 1;
3855 do_plt = 1;
3856 }
3857 }
3858
3859 if (do_plt)
3860 {
3861 if (info->shared)
3862 {
3863 /* Output a dynamic IPLT relocation for this
3864 PLT entry. */
3865 Elf_Internal_Rela outrel;
947216bf
AM
3866 bfd_byte *loc;
3867 asection *s = htab->srelplt;
ce757d15
AM
3868
3869 outrel.r_offset = (off
3870 + htab->splt->output_offset
3871 + htab->splt->output_section->vma);
3872 outrel.r_info = ELF32_R_INFO (0, R_PARISC_IPLT);
3873 outrel.r_addend = relocation;
947216bf
AM
3874 loc = s->contents;
3875 loc += s->reloc_count++ * sizeof (Elf32_External_Rela);
ce757d15
AM
3876 bfd_elf32_swap_reloca_out (output_bfd, &outrel, loc);
3877 }
74d1c347
AM
3878 else
3879 {
3880 bfd_put_32 (output_bfd,
3881 relocation,
83c81bfe 3882 htab->splt->contents + off);
74d1c347 3883 bfd_put_32 (output_bfd,
83c81bfe
AM
3884 elf_gp (htab->splt->output_section->owner),
3885 htab->splt->contents + off + 4);
74d1c347
AM
3886 }
3887 }
3888
68fb2e56 3889 if (off >= (bfd_vma) -2)
49e9d0d3 3890 abort ();
74d1c347
AM
3891
3892 /* PLABELs contain function pointers. Relocation is to
3893 the entry for the function in the .plt. The magic +2
3894 offset signals to $$dyncall that the function pointer
3895 is in the .plt and thus has a gp pointer too.
3896 Exception: Undefined PLABELs should have a value of
3897 zero. */
3898 if (h == NULL
3899 || (h->elf.root.type != bfd_link_hash_undefweak
3900 && h->elf.root.type != bfd_link_hash_undefined))
3901 {
3902 relocation = (off
83c81bfe
AM
3903 + htab->splt->output_offset
3904 + htab->splt->output_section->vma
74d1c347
AM
3905 + 2);
3906 }
3907 plabel = 1;
30667bf3
AM
3908 }
3909 /* Fall through and possibly emit a dynamic relocation. */
3910
3911 case R_PARISC_DIR17F:
3912 case R_PARISC_DIR17R:
47d89dba 3913 case R_PARISC_DIR14F:
30667bf3
AM
3914 case R_PARISC_DIR14R:
3915 case R_PARISC_DIR21L:
3916 case R_PARISC_DPREL14F:
3917 case R_PARISC_DPREL14R:
3918 case R_PARISC_DPREL21L:
3919 case R_PARISC_DIR32:
ec338859
AM
3920 /* r_symndx will be zero only for relocs against symbols
3921 from removed linkonce sections, or sections discarded by
3922 a linker script. */
3923 if (r_symndx == 0
3924 || (input_section->flags & SEC_ALLOC) == 0)
3925 break;
3926
30667bf3 3927 /* The reloc types handled here and this conditional
56882138 3928 expression must match the code in ..check_relocs and
ec338859 3929 allocate_dynrelocs. ie. We need exactly the same condition
56882138
AM
3930 as in ..check_relocs, with some extra conditions (dynindx
3931 test in this case) to cater for relocs removed by
ec338859 3932 allocate_dynrelocs. If you squint, the non-shared test
56882138
AM
3933 here does indeed match the one in ..check_relocs, the
3934 difference being that here we test DEF_DYNAMIC as well as
3935 !DEF_REGULAR. All common syms end up with !DEF_REGULAR,
3936 which is why we can't use just that test here.
3937 Conversely, DEF_DYNAMIC can't be used in check_relocs as
3938 there all files have not been loaded. */
446f2863 3939 if ((info->shared
446f2863
AM
3940 && (IS_ABSOLUTE_RELOC (r_type)
3941 || (h != NULL
3942 && h->elf.dynindx != -1
3943 && (!info->symbolic
3944 || (h->elf.elf_link_hash_flags
3945 & ELF_LINK_HASH_DEF_REGULAR) == 0))))
3946 || (!info->shared
446f2863
AM
3947 && h != NULL
3948 && h->elf.dynindx != -1
3949 && (h->elf.elf_link_hash_flags & ELF_LINK_NON_GOT_REF) == 0
56882138
AM
3950 && (((h->elf.elf_link_hash_flags
3951 & ELF_LINK_HASH_DEF_DYNAMIC) != 0
3952 && (h->elf.elf_link_hash_flags
3953 & ELF_LINK_HASH_DEF_REGULAR) == 0)
446f2863
AM
3954 || h->elf.root.type == bfd_link_hash_undefweak
3955 || h->elf.root.type == bfd_link_hash_undefined)))
30667bf3
AM
3956 {
3957 Elf_Internal_Rela outrel;
b34976b6 3958 bfd_boolean skip;
98ceb8ce 3959 asection *sreloc;
947216bf 3960 bfd_byte *loc;
252b5132 3961
30667bf3
AM
3962 /* When generating a shared object, these relocations
3963 are copied into the output file to be resolved at run
3964 time. */
252b5132 3965
30667bf3 3966 outrel.r_addend = rel->r_addend;
c629eae0
JJ
3967 outrel.r_offset =
3968 _bfd_elf_section_offset (output_bfd, info, input_section,
3969 rel->r_offset);
0bb2d96a
JJ
3970 skip = (outrel.r_offset == (bfd_vma) -1
3971 || outrel.r_offset == (bfd_vma) -2);
30667bf3
AM
3972 outrel.r_offset += (input_section->output_offset
3973 + input_section->output_section->vma);
3974
3975 if (skip)
252b5132 3976 {
30667bf3 3977 memset (&outrel, 0, sizeof (outrel));
252b5132 3978 }
74d1c347
AM
3979 else if (h != NULL
3980 && h->elf.dynindx != -1
3981 && (plabel
446f2863
AM
3982 || !IS_ABSOLUTE_RELOC (r_type)
3983 || !info->shared
74d1c347 3984 || !info->symbolic
30667bf3
AM
3985 || (h->elf.elf_link_hash_flags
3986 & ELF_LINK_HASH_DEF_REGULAR) == 0))
252b5132 3987 {
30667bf3
AM
3988 outrel.r_info = ELF32_R_INFO (h->elf.dynindx, r_type);
3989 }
3990 else /* It's a local symbol, or one marked to become local. */
3991 {
3992 int indx = 0;
edd21aca 3993
30667bf3
AM
3994 /* Add the absolute offset of the symbol. */
3995 outrel.r_addend += relocation;
edd21aca 3996
74d1c347
AM
3997 /* Global plabels need to be processed by the
3998 dynamic linker so that functions have at most one
3999 fptr. For this reason, we need to differentiate
4000 between global and local plabels, which we do by
4001 providing the function symbol for a global plabel
4002 reloc, and no symbol for local plabels. */
4003 if (! plabel
4004 && sym_sec != NULL
30667bf3
AM
4005 && sym_sec->output_section != NULL
4006 && ! bfd_is_abs_section (sym_sec))
252b5132 4007 {
30667bf3
AM
4008 indx = elf_section_data (sym_sec->output_section)->dynindx;
4009 /* We are turning this relocation into one
4010 against a section symbol, so subtract out the
4011 output section's address but not the offset
4012 of the input section in the output section. */
4013 outrel.r_addend -= sym_sec->output_section->vma;
252b5132 4014 }
252b5132 4015
30667bf3
AM
4016 outrel.r_info = ELF32_R_INFO (indx, r_type);
4017 }
68fb2e56
AM
4018#if 0
4019 /* EH info can cause unaligned DIR32 relocs.
4020 Tweak the reloc type for the dynamic linker. */
4021 if (r_type == R_PARISC_DIR32 && (outrel.r_offset & 3) != 0)
4022 outrel.r_info = ELF32_R_INFO (ELF32_R_SYM (outrel.r_info),
4023 R_PARISC_DIR32U);
4024#endif
98ceb8ce
AM
4025 sreloc = elf_section_data (input_section)->sreloc;
4026 if (sreloc == NULL)
4027 abort ();
4028
947216bf
AM
4029 loc = sreloc->contents;
4030 loc += sreloc->reloc_count++ * sizeof (Elf32_External_Rela);
98ceb8ce 4031 bfd_elf32_swap_reloca_out (output_bfd, &outrel, loc);
30667bf3
AM
4032 }
4033 break;
edd21aca 4034
30667bf3
AM
4035 default:
4036 break;
4037 }
252b5132 4038
30667bf3 4039 r = final_link_relocate (input_section, contents, rel, relocation,
83c81bfe 4040 htab, sym_sec, h);
252b5132 4041
30667bf3
AM
4042 if (r == bfd_reloc_ok)
4043 continue;
252b5132 4044
30667bf3
AM
4045 if (h != NULL)
4046 sym_name = h->elf.root.root.string;
4047 else
4048 {
4049 sym_name = bfd_elf_string_from_elf_section (input_bfd,
4050 symtab_hdr->sh_link,
4051 sym->st_name);
4052 if (sym_name == NULL)
b34976b6 4053 return FALSE;
30667bf3
AM
4054 if (*sym_name == '\0')
4055 sym_name = bfd_section_name (input_bfd, sym_sec);
4056 }
edd21aca 4057
30667bf3 4058 howto = elf_hppa_howto_table + r_type;
252b5132 4059
30667bf3
AM
4060 if (r == bfd_reloc_undefined || r == bfd_reloc_notsupported)
4061 {
f09ebc7d
AM
4062 if (r == bfd_reloc_notsupported || !warned_undef)
4063 {
4064 (*_bfd_error_handler)
4065 (_("%s(%s+0x%lx): cannot handle %s for %s"),
4066 bfd_archive_filename (input_bfd),
4067 input_section->name,
4068 (long) rel->r_offset,
4069 howto->name,
4070 sym_name);
4071 bfd_set_error (bfd_error_bad_value);
b34976b6 4072 return FALSE;
f09ebc7d 4073 }
30667bf3
AM
4074 }
4075 else
4076 {
4077 if (!((*info->callbacks->reloc_overflow)
4078 (info, sym_name, howto->name, (bfd_vma) 0,
4079 input_bfd, input_section, rel->r_offset)))
b34976b6 4080 return FALSE;
30667bf3
AM
4081 }
4082 }
edd21aca 4083
b34976b6 4084 return TRUE;
30667bf3 4085}
252b5132 4086
30667bf3
AM
4087/* Finish up dynamic symbol handling. We set the contents of various
4088 dynamic sections here. */
252b5132 4089
b34976b6 4090static bfd_boolean
30667bf3
AM
4091elf32_hppa_finish_dynamic_symbol (output_bfd, info, h, sym)
4092 bfd *output_bfd;
4093 struct bfd_link_info *info;
4094 struct elf_link_hash_entry *h;
4095 Elf_Internal_Sym *sym;
4096{
83c81bfe 4097 struct elf32_hppa_link_hash_table *htab;
edd21aca 4098
83c81bfe 4099 htab = hppa_link_hash_table (info);
30667bf3 4100
30667bf3
AM
4101 if (h->plt.offset != (bfd_vma) -1)
4102 {
4103 bfd_vma value;
30667bf3 4104
8dea1268
AM
4105 if (h->plt.offset & 1)
4106 abort ();
4107
30667bf3
AM
4108 /* This symbol has an entry in the procedure linkage table. Set
4109 it up.
4110
4111 The format of a plt entry is
74d1c347
AM
4112 <funcaddr>
4113 <__gp>
47d89dba 4114 */
30667bf3
AM
4115 value = 0;
4116 if (h->root.type == bfd_link_hash_defined
4117 || h->root.type == bfd_link_hash_defweak)
4118 {
4119 value = h->root.u.def.value;
4120 if (h->root.u.def.section->output_section != NULL)
4121 value += (h->root.u.def.section->output_offset
4122 + h->root.u.def.section->output_section->vma);
252b5132 4123 }
edd21aca 4124
74d1c347 4125 if (! ((struct elf32_hppa_link_hash_entry *) h)->pic_call)
30667bf3 4126 {
47d89dba 4127 Elf_Internal_Rela rel;
947216bf 4128 bfd_byte *loc;
47d89dba 4129
30667bf3
AM
4130 /* Create a dynamic IPLT relocation for this entry. */
4131 rel.r_offset = (h->plt.offset
83c81bfe
AM
4132 + htab->splt->output_offset
4133 + htab->splt->output_section->vma);
ce757d15 4134 if (h->dynindx != -1)
74d1c347
AM
4135 {
4136 rel.r_info = ELF32_R_INFO (h->dynindx, R_PARISC_IPLT);
4137 rel.r_addend = 0;
4138 }
4139 else
4140 {
4141 /* This symbol has been marked to become local, and is
4142 used by a plabel so must be kept in the .plt. */
4143 rel.r_info = ELF32_R_INFO (0, R_PARISC_IPLT);
4144 rel.r_addend = value;
4145 }
30667bf3 4146
947216bf
AM
4147 loc = htab->srelplt->contents;
4148 loc += htab->srelplt->reloc_count++ * sizeof (Elf32_External_Rela);
83c81bfe 4149 bfd_elf32_swap_reloca_out (htab->splt->output_section->owner,
3ac8354b 4150 &rel, loc);
30667bf3 4151 }
ce757d15 4152 else
47d89dba 4153 {
ce757d15
AM
4154 bfd_put_32 (htab->splt->owner,
4155 value,
4156 htab->splt->contents + h->plt.offset);
4157 bfd_put_32 (htab->splt->owner,
4158 elf_gp (htab->splt->output_section->owner),
4159 htab->splt->contents + h->plt.offset + 4);
47d89dba
AM
4160 }
4161
30667bf3
AM
4162 if ((h->elf_link_hash_flags & ELF_LINK_HASH_DEF_REGULAR) == 0)
4163 {
4164 /* Mark the symbol as undefined, rather than as defined in
4165 the .plt section. Leave the value alone. */
4166 sym->st_shndx = SHN_UNDEF;
4167 }
4168 }
edd21aca 4169
30667bf3
AM
4170 if (h->got.offset != (bfd_vma) -1)
4171 {
4172 Elf_Internal_Rela rel;
947216bf 4173 bfd_byte *loc;
30667bf3
AM
4174
4175 /* This symbol has an entry in the global offset table. Set it
4176 up. */
4177
4178 rel.r_offset = ((h->got.offset &~ (bfd_vma) 1)
83c81bfe
AM
4179 + htab->sgot->output_offset
4180 + htab->sgot->output_section->vma);
30667bf3 4181
4dc86686
AM
4182 /* If this is a -Bsymbolic link and the symbol is defined
4183 locally or was forced to be local because of a version file,
4184 we just want to emit a RELATIVE reloc. The entry in the
4185 global offset table will already have been initialized in the
4186 relocate_section function. */
4187 if (info->shared
4188 && (info->symbolic || h->dynindx == -1)
4189 && (h->elf_link_hash_flags & ELF_LINK_HASH_DEF_REGULAR))
30667bf3 4190 {
74d1c347 4191 rel.r_info = ELF32_R_INFO (0, R_PARISC_DIR32);
30667bf3
AM
4192 rel.r_addend = (h->root.u.def.value
4193 + h->root.u.def.section->output_offset
4194 + h->root.u.def.section->output_section->vma);
4195 }
4196 else
4197 {
49e9d0d3
AM
4198 if ((h->got.offset & 1) != 0)
4199 abort ();
30667bf3 4200 bfd_put_32 (output_bfd, (bfd_vma) 0,
83c81bfe 4201 htab->sgot->contents + h->got.offset);
30667bf3
AM
4202 rel.r_info = ELF32_R_INFO (h->dynindx, R_PARISC_DIR32);
4203 rel.r_addend = 0;
4204 }
edd21aca 4205
947216bf
AM
4206 loc = htab->srelgot->contents;
4207 loc += htab->srelgot->reloc_count++ * sizeof (Elf32_External_Rela);
3ac8354b 4208 bfd_elf32_swap_reloca_out (output_bfd, &rel, loc);
30667bf3 4209 }
edd21aca 4210
30667bf3
AM
4211 if ((h->elf_link_hash_flags & ELF_LINK_HASH_NEEDS_COPY) != 0)
4212 {
4213 asection *s;
4214 Elf_Internal_Rela rel;
947216bf 4215 bfd_byte *loc;
30667bf3
AM
4216
4217 /* This symbol needs a copy reloc. Set it up. */
4218
49e9d0d3
AM
4219 if (! (h->dynindx != -1
4220 && (h->root.type == bfd_link_hash_defined
4221 || h->root.type == bfd_link_hash_defweak)))
4222 abort ();
30667bf3 4223
83c81bfe 4224 s = htab->srelbss;
30667bf3
AM
4225
4226 rel.r_offset = (h->root.u.def.value
4227 + h->root.u.def.section->output_offset
4228 + h->root.u.def.section->output_section->vma);
4229 rel.r_addend = 0;
4230 rel.r_info = ELF32_R_INFO (h->dynindx, R_PARISC_COPY);
947216bf 4231 loc = s->contents + s->reloc_count++ * sizeof (Elf32_External_Rela);
3ac8354b 4232 bfd_elf32_swap_reloca_out (output_bfd, &rel, loc);
30667bf3
AM
4233 }
4234
4235 /* Mark _DYNAMIC and _GLOBAL_OFFSET_TABLE_ as absolute. */
4236 if (h->root.root.string[0] == '_'
4237 && (strcmp (h->root.root.string, "_DYNAMIC") == 0
4238 || strcmp (h->root.root.string, "_GLOBAL_OFFSET_TABLE_") == 0))
4239 {
4240 sym->st_shndx = SHN_ABS;
4241 }
4242
b34976b6 4243 return TRUE;
30667bf3
AM
4244}
4245
98ceb8ce
AM
4246/* Used to decide how to sort relocs in an optimal manner for the
4247 dynamic linker, before writing them out. */
4248
4249static enum elf_reloc_type_class
4250elf32_hppa_reloc_type_class (rela)
4251 const Elf_Internal_Rela *rela;
4252{
4253 if (ELF32_R_SYM (rela->r_info) == 0)
4254 return reloc_class_relative;
4255
4256 switch ((int) ELF32_R_TYPE (rela->r_info))
4257 {
4258 case R_PARISC_IPLT:
4259 return reloc_class_plt;
4260 case R_PARISC_COPY:
4261 return reloc_class_copy;
4262 default:
4263 return reloc_class_normal;
4264 }
4265}
4266
30667bf3
AM
4267/* Finish up the dynamic sections. */
4268
b34976b6 4269static bfd_boolean
30667bf3
AM
4270elf32_hppa_finish_dynamic_sections (output_bfd, info)
4271 bfd *output_bfd;
4272 struct bfd_link_info *info;
4273{
4274 bfd *dynobj;
83c81bfe 4275 struct elf32_hppa_link_hash_table *htab;
30667bf3
AM
4276 asection *sdyn;
4277
83c81bfe 4278 htab = hppa_link_hash_table (info);
ebe50bae 4279 dynobj = htab->elf.dynobj;
30667bf3
AM
4280
4281 sdyn = bfd_get_section_by_name (dynobj, ".dynamic");
4282
ebe50bae 4283 if (htab->elf.dynamic_sections_created)
30667bf3
AM
4284 {
4285 Elf32_External_Dyn *dyncon, *dynconend;
4286
49e9d0d3
AM
4287 if (sdyn == NULL)
4288 abort ();
30667bf3
AM
4289
4290 dyncon = (Elf32_External_Dyn *) sdyn->contents;
4291 dynconend = (Elf32_External_Dyn *) (sdyn->contents + sdyn->_raw_size);
4292 for (; dyncon < dynconend; dyncon++)
edd21aca 4293 {
30667bf3
AM
4294 Elf_Internal_Dyn dyn;
4295 asection *s;
4296
4297 bfd_elf32_swap_dyn_in (dynobj, dyncon, &dyn);
4298
4299 switch (dyn.d_tag)
4300 {
4301 default:
3ac8354b 4302 continue;
30667bf3
AM
4303
4304 case DT_PLTGOT:
4305 /* Use PLTGOT to set the GOT register. */
4306 dyn.d_un.d_ptr = elf_gp (output_bfd);
30667bf3
AM
4307 break;
4308
4309 case DT_JMPREL:
83c81bfe 4310 s = htab->srelplt;
30667bf3 4311 dyn.d_un.d_ptr = s->output_section->vma + s->output_offset;
30667bf3
AM
4312 break;
4313
4314 case DT_PLTRELSZ:
83c81bfe 4315 s = htab->srelplt;
6348e046 4316 dyn.d_un.d_val = s->_raw_size;
30667bf3 4317 break;
4e12ff7f
AM
4318
4319 case DT_RELASZ:
4320 /* Don't count procedure linkage table relocs in the
4321 overall reloc count. */
6348e046
AM
4322 s = htab->srelplt;
4323 if (s == NULL)
4324 continue;
4325 dyn.d_un.d_val -= s->_raw_size;
4326 break;
4327
4328 case DT_RELA:
4329 /* We may not be using the standard ELF linker script.
4330 If .rela.plt is the first .rela section, we adjust
4331 DT_RELA to not include it. */
4332 s = htab->srelplt;
4333 if (s == NULL)
4334 continue;
4335 if (dyn.d_un.d_ptr != s->output_section->vma + s->output_offset)
4336 continue;
4337 dyn.d_un.d_ptr += s->_raw_size;
4e12ff7f 4338 break;
30667bf3 4339 }
3ac8354b
AM
4340
4341 bfd_elf32_swap_dyn_out (output_bfd, &dyn, dyncon);
edd21aca 4342 }
252b5132 4343 }
edd21aca 4344
83c81bfe 4345 if (htab->sgot != NULL && htab->sgot->_raw_size != 0)
30667bf3 4346 {
74d1c347
AM
4347 /* Fill in the first entry in the global offset table.
4348 We use it to point to our dynamic section, if we have one. */
30667bf3
AM
4349 bfd_put_32 (output_bfd,
4350 (sdyn != NULL
4351 ? sdyn->output_section->vma + sdyn->output_offset
4352 : (bfd_vma) 0),
83c81bfe 4353 htab->sgot->contents);
30667bf3 4354
74d1c347 4355 /* The second entry is reserved for use by the dynamic linker. */
83c81bfe 4356 memset (htab->sgot->contents + GOT_ENTRY_SIZE, 0, GOT_ENTRY_SIZE);
74d1c347 4357
30667bf3 4358 /* Set .got entry size. */
83c81bfe 4359 elf_section_data (htab->sgot->output_section)
74d1c347 4360 ->this_hdr.sh_entsize = GOT_ENTRY_SIZE;
30667bf3
AM
4361 }
4362
83c81bfe 4363 if (htab->splt != NULL && htab->splt->_raw_size != 0)
47d89dba
AM
4364 {
4365 /* Set plt entry size. */
83c81bfe 4366 elf_section_data (htab->splt->output_section)
47d89dba
AM
4367 ->this_hdr.sh_entsize = PLT_ENTRY_SIZE;
4368
83c81bfe 4369 if (htab->need_plt_stub)
47d89dba
AM
4370 {
4371 /* Set up the .plt stub. */
83c81bfe
AM
4372 memcpy (htab->splt->contents
4373 + htab->splt->_raw_size - sizeof (plt_stub),
47d89dba
AM
4374 plt_stub, sizeof (plt_stub));
4375
83c81bfe
AM
4376 if ((htab->splt->output_offset
4377 + htab->splt->output_section->vma
4378 + htab->splt->_raw_size)
4379 != (htab->sgot->output_offset
4380 + htab->sgot->output_section->vma))
47d89dba
AM
4381 {
4382 (*_bfd_error_handler)
4383 (_(".got section not immediately after .plt section"));
b34976b6 4384 return FALSE;
47d89dba
AM
4385 }
4386 }
4387 }
30667bf3 4388
b34976b6 4389 return TRUE;
30667bf3 4390}
252b5132 4391
d952f17a
AM
4392/* Tweak the OSABI field of the elf header. */
4393
4394static void
4395elf32_hppa_post_process_headers (abfd, link_info)
4396 bfd *abfd;
4397 struct bfd_link_info *link_info ATTRIBUTE_UNUSED;
4398{
4399 Elf_Internal_Ehdr * i_ehdrp;
4400
4401 i_ehdrp = elf_elfheader (abfd);
4402
4403 if (strcmp (bfd_get_target (abfd), "elf32-hppa-linux") == 0)
4404 {
4405 i_ehdrp->e_ident[EI_OSABI] = ELFOSABI_LINUX;
4406 }
4407 else
4408 {
4409 i_ehdrp->e_ident[EI_OSABI] = ELFOSABI_HPUX;
4410 }
4411}
4412
30667bf3
AM
4413/* Called when writing out an object file to decide the type of a
4414 symbol. */
4415static int
4416elf32_hppa_elf_get_symbol_type (elf_sym, type)
4417 Elf_Internal_Sym *elf_sym;
4418 int type;
4419{
4420 if (ELF_ST_TYPE (elf_sym->st_info) == STT_PARISC_MILLI)
4421 return STT_PARISC_MILLI;
4422 else
4423 return type;
252b5132
RH
4424}
4425
4426/* Misc BFD support code. */
30667bf3
AM
4427#define bfd_elf32_bfd_is_local_label_name elf_hppa_is_local_label_name
4428#define bfd_elf32_bfd_reloc_type_lookup elf_hppa_reloc_type_lookup
4429#define elf_info_to_howto elf_hppa_info_to_howto
4430#define elf_info_to_howto_rel elf_hppa_info_to_howto_rel
252b5132 4431
252b5132 4432/* Stuff for the BFD linker. */
c46b7515 4433#define bfd_elf32_bfd_final_link elf32_hppa_final_link
30667bf3 4434#define bfd_elf32_bfd_link_hash_table_create elf32_hppa_link_hash_table_create
e2d34d7d 4435#define bfd_elf32_bfd_link_hash_table_free elf32_hppa_link_hash_table_free
30667bf3
AM
4436#define elf_backend_add_symbol_hook elf32_hppa_add_symbol_hook
4437#define elf_backend_adjust_dynamic_symbol elf32_hppa_adjust_dynamic_symbol
ebe50bae 4438#define elf_backend_copy_indirect_symbol elf32_hppa_copy_indirect_symbol
30667bf3
AM
4439#define elf_backend_check_relocs elf32_hppa_check_relocs
4440#define elf_backend_create_dynamic_sections elf32_hppa_create_dynamic_sections
4441#define elf_backend_fake_sections elf_hppa_fake_sections
4442#define elf_backend_relocate_section elf32_hppa_relocate_section
74d1c347 4443#define elf_backend_hide_symbol elf32_hppa_hide_symbol
30667bf3
AM
4444#define elf_backend_finish_dynamic_symbol elf32_hppa_finish_dynamic_symbol
4445#define elf_backend_finish_dynamic_sections elf32_hppa_finish_dynamic_sections
4446#define elf_backend_size_dynamic_sections elf32_hppa_size_dynamic_sections
4447#define elf_backend_gc_mark_hook elf32_hppa_gc_mark_hook
4448#define elf_backend_gc_sweep_hook elf32_hppa_gc_sweep_hook
4449#define elf_backend_object_p elf32_hppa_object_p
4450#define elf_backend_final_write_processing elf_hppa_final_write_processing
d952f17a 4451#define elf_backend_post_process_headers elf32_hppa_post_process_headers
30667bf3 4452#define elf_backend_get_symbol_type elf32_hppa_elf_get_symbol_type
98ceb8ce 4453#define elf_backend_reloc_type_class elf32_hppa_reloc_type_class
30667bf3
AM
4454
4455#define elf_backend_can_gc_sections 1
51b64d56 4456#define elf_backend_can_refcount 1
30667bf3
AM
4457#define elf_backend_plt_alignment 2
4458#define elf_backend_want_got_plt 0
4459#define elf_backend_plt_readonly 0
4460#define elf_backend_want_plt_sym 0
74d1c347 4461#define elf_backend_got_header_size 8
f0fe0e16 4462#define elf_backend_rela_normal 1
252b5132
RH
4463
4464#define TARGET_BIG_SYM bfd_elf32_hppa_vec
4465#define TARGET_BIG_NAME "elf32-hppa"
4466#define ELF_ARCH bfd_arch_hppa
4467#define ELF_MACHINE_CODE EM_PARISC
4468#define ELF_MAXPAGESIZE 0x1000
4469
4470#include "elf32-target.h"
d952f17a
AM
4471
4472#undef TARGET_BIG_SYM
4473#define TARGET_BIG_SYM bfd_elf32_hppa_linux_vec
4474#undef TARGET_BIG_NAME
4475#define TARGET_BIG_NAME "elf32-hppa-linux"
4476
4477#define INCLUDED_TARGET_FILE 1
4478#include "elf32-target.h"
This page took 0.5042 seconds and 4 git commands to generate.