1 /* BFD back-end for HP PA-RISC ELF files.
2 Copyright (C) 1990-2020 Free Software Foundation, Inc.
5 Center for Software Science
6 Department of Computer Science
8 Largely rewritten by Alan Modra <alan@linuxcare.com.au>
9 Naming cleanup by Carlos O'Donell <carlos@systemhalted.org>
10 TLS support written by Randolph Chung <tausq@debian.org>
12 This file is part of BFD, the Binary File Descriptor library.
14 This program is free software; you can redistribute it and/or modify
15 it under the terms of the GNU General Public License as published by
16 the Free Software Foundation; either version 3 of the License, or
17 (at your option) any later version.
19 This program is distributed in the hope that it will be useful,
20 but WITHOUT ANY WARRANTY; without even the implied warranty of
21 MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
22 GNU General Public License for more details.
24 You should have received a copy of the GNU General Public License
25 along with this program; if not, write to the Free Software
26 Foundation, Inc., 51 Franklin Street - Fifth Floor, Boston,
27 MA 02110-1301, USA. */
35 #include "elf32-hppa.h"
37 #include "elf32-hppa.h"
40 /* In order to gain some understanding of code in this file without
41 knowing all the intricate details of the linker, note the
44 Functions named elf32_hppa_* are called by external routines, other
45 functions are only called locally. elf32_hppa_* functions appear
46 in this file more or less in the order in which they are called
47 from external routines. eg. elf32_hppa_check_relocs is called
48 early in the link process, elf32_hppa_finish_dynamic_sections is
49 one of the last functions. */
51 /* We use two hash tables to hold information for linking PA ELF objects.
53 The first is the elf32_hppa_link_hash_table which is derived
54 from the standard ELF linker hash table. We use this as a place to
55 attach other hash tables and static information.
57 The second is the stub hash table which is derived from the
58 base BFD hash table. The stub hash table holds the information
59 necessary to build the linker stubs during a link.
61 There are a number of different stubs generated by the linker.
69 : addil LR'X - ($PIC_pcrel$0 - 4),%r1
70 : be,n RR'X - ($PIC_pcrel$0 - 8)(%sr4,%r1)
72 Import stub to call shared library routine from normal object file
73 (single sub-space version)
74 : addil LR'lt_ptr+ltoff,%dp ; get PLT address
75 : ldo RR'lt_ptr+ltoff(%r1),%r22 ;
76 : ldw 0(%r22),%r21 ; get procedure entry point
78 : ldw 4(%r22),%r19 ; get new dlt value.
80 Import stub to call shared library routine from shared library
81 (single sub-space version)
82 : addil LR'ltoff,%r19 ; get PLT address
83 : ldo RR'ltoff(%r1),%r22
84 : ldw 0(%r22),%r21 ; get procedure entry point
86 : ldw 4(%r22),%r19 ; get new dlt value.
88 Import stub to call shared library routine from normal object file
89 (multiple sub-space support)
90 : addil LR'lt_ptr+ltoff,%dp ; get PLT address
91 : ldo RR'lt_ptr+ltoff(%r1),%r22 ;
92 : ldw 0(%r22),%r21 ; get procedure entry point
93 : ldsid (%r21),%r1 ; get target sid
94 : ldw 4(%r22),%r19 ; get new dlt value.
96 : be 0(%sr0,%r21) ; branch to target
97 : stw %rp,-24(%sp) ; save rp
99 Import stub to call shared library routine from shared library
100 (multiple sub-space support)
101 : addil LR'ltoff,%r19 ; get PLT address
102 : ldo RR'ltoff(%r1),%r22
103 : ldw 0(%r22),%r21 ; get procedure entry point
104 : ldsid (%r21),%r1 ; get target sid
105 : ldw 4(%r22),%r19 ; get new dlt value.
107 : be 0(%sr0,%r21) ; branch to target
108 : stw %rp,-24(%sp) ; save rp
110 Export stub to return from shared lib routine (multiple sub-space support)
111 One of these is created for each exported procedure in a shared
112 library (and stored in the shared lib). Shared lib routines are
113 called via the first instruction in the export stub so that we can
114 do an inter-space return. Not required for single sub-space.
115 : bl,n X,%rp ; trap the return
117 : ldw -24(%sp),%rp ; restore the original rp
120 : be,n 0(%sr0,%rp) ; inter-space return. */
123 /* Variable names follow a coding style.
124 Please follow this (Apps Hungarian) style:
126 Structure/Variable Prefix
127 elf_link_hash_table "etab"
128 elf_link_hash_entry "eh"
130 elf32_hppa_link_hash_table "htab"
131 elf32_hppa_link_hash_entry "hh"
133 bfd_hash_table "btab"
136 bfd_hash_table containing stubs "bstab"
137 elf32_hppa_stub_hash_entry "hsh"
139 Always remember to use GNU Coding Style. */
141 #define PLT_ENTRY_SIZE 8
142 #define GOT_ENTRY_SIZE 4
143 #define LONG_BRANCH_STUB_SIZE 8
144 #define LONG_BRANCH_SHARED_STUB_SIZE 12
145 #define IMPORT_STUB_SIZE 20
146 #define IMPORT_SHARED_STUB_SIZE 32
147 #define EXPORT_STUB_SIZE 24
148 #define ELF_DYNAMIC_INTERPRETER "/lib/ld.so.1"
150 static const bfd_byte plt_stub
[] =
152 0x0e, 0x80, 0x10, 0x95, /* 1: ldw 0(%r20),%r21 */
153 0xea, 0xa0, 0xc0, 0x00, /* bv %r0(%r21) */
154 0x0e, 0x88, 0x10, 0x95, /* ldw 4(%r20),%r21 */
155 #define PLT_STUB_ENTRY (3*4)
156 0xea, 0x9f, 0x1f, 0xdd, /* b,l 1b,%r20 */
157 0xd6, 0x80, 0x1c, 0x1e, /* depi 0,31,2,%r20 */
158 0x00, 0xc0, 0xff, 0xee, /* 9: .word fixup_func */
159 0xde, 0xad, 0xbe, 0xef /* .word fixup_ltp */
162 /* Section name for stubs is the associated section name plus this
164 #define STUB_SUFFIX ".stub"
166 /* We don't need to copy certain PC- or GP-relative dynamic relocs
167 into a shared object's dynamic section. All the relocs of the
168 limited class we are interested in, are absolute. */
169 #ifndef RELATIVE_DYNRELOCS
170 #define RELATIVE_DYNRELOCS 0
171 #define IS_ABSOLUTE_RELOC(r_type) 1
172 #define pc_dynrelocs(hh) 0
175 /* If ELIMINATE_COPY_RELOCS is non-zero, the linker will try to avoid
176 copying dynamic variables from a shared lib into an app's dynbss
177 section, and instead use a dynamic relocation to point into the
179 #define ELIMINATE_COPY_RELOCS 1
181 enum elf32_hppa_stub_type
183 hppa_stub_long_branch
,
184 hppa_stub_long_branch_shared
,
186 hppa_stub_import_shared
,
191 struct elf32_hppa_stub_hash_entry
193 /* Base hash table entry structure. */
194 struct bfd_hash_entry bh_root
;
196 /* The stub section. */
199 /* Offset within stub_sec of the beginning of this stub. */
202 /* Given the symbol's value and its section we can determine its final
203 value when building the stubs (so the stub knows where to jump. */
204 bfd_vma target_value
;
205 asection
*target_section
;
207 enum elf32_hppa_stub_type stub_type
;
209 /* The symbol table entry, if any, that this was derived from. */
210 struct elf32_hppa_link_hash_entry
*hh
;
212 /* Where this stub is being called from, or, in the case of combined
213 stub sections, the first input section in the group. */
226 struct elf32_hppa_link_hash_entry
228 struct elf_link_hash_entry eh
;
230 /* A pointer to the most recently used stub hash entry against this
232 struct elf32_hppa_stub_hash_entry
*hsh_cache
;
234 ENUM_BITFIELD (_tls_type
) tls_type
: 8;
236 /* Set if this symbol is used by a plabel reloc. */
237 unsigned int plabel
:1;
240 struct elf32_hppa_link_hash_table
242 /* The main hash table. */
243 struct elf_link_hash_table etab
;
245 /* The stub hash table. */
246 struct bfd_hash_table bstab
;
248 /* Linker stub bfd. */
251 /* Linker call-backs. */
252 asection
* (*add_stub_section
) (const char *, asection
*);
253 void (*layout_sections_again
) (void);
255 /* Array to keep track of which stub sections have been created, and
256 information on stub grouping. */
259 /* This is the section to which stubs in the group will be
262 /* The stub section. */
266 /* Assorted information used by elf32_hppa_size_stubs. */
267 unsigned int bfd_count
;
268 unsigned int top_index
;
269 asection
**input_list
;
270 Elf_Internal_Sym
**all_local_syms
;
272 /* Used during a final link to store the base of the text and data
273 segments so that we can perform SEGREL relocations. */
274 bfd_vma text_segment_base
;
275 bfd_vma data_segment_base
;
277 /* Whether we support multiple sub-spaces for shared libs. */
278 unsigned int multi_subspace
:1;
280 /* Flags set when various size branches are detected. Used to
281 select suitable defaults for the stub group size. */
282 unsigned int has_12bit_branch
:1;
283 unsigned int has_17bit_branch
:1;
284 unsigned int has_22bit_branch
:1;
286 /* Set if we need a .plt stub to support lazy dynamic linking. */
287 unsigned int need_plt_stub
:1;
289 /* Small local sym cache. */
290 struct sym_cache sym_cache
;
292 /* Data for LDM relocations. */
295 bfd_signed_vma refcount
;
300 /* Various hash macros and functions. */
301 #define hppa_link_hash_table(p) \
302 (elf_hash_table_id ((struct elf_link_hash_table *) ((p)->hash)) \
303 == HPPA32_ELF_DATA ? ((struct elf32_hppa_link_hash_table *) ((p)->hash)) : NULL)
305 #define hppa_elf_hash_entry(ent) \
306 ((struct elf32_hppa_link_hash_entry *)(ent))
308 #define hppa_stub_hash_entry(ent) \
309 ((struct elf32_hppa_stub_hash_entry *)(ent))
311 #define hppa_stub_hash_lookup(table, string, create, copy) \
312 ((struct elf32_hppa_stub_hash_entry *) \
313 bfd_hash_lookup ((table), (string), (create), (copy)))
315 #define hppa_elf_local_got_tls_type(abfd) \
316 ((char *)(elf_local_got_offsets (abfd) + (elf_tdata (abfd)->symtab_hdr.sh_info * 2)))
318 #define hh_name(hh) \
319 (hh ? hh->eh.root.root.string : "<undef>")
321 #define eh_name(eh) \
322 (eh ? eh->root.root.string : "<undef>")
324 /* Assorted hash table functions. */
326 /* Initialize an entry in the stub hash table. */
328 static struct bfd_hash_entry
*
329 stub_hash_newfunc (struct bfd_hash_entry
*entry
,
330 struct bfd_hash_table
*table
,
333 /* Allocate the structure if it has not already been allocated by a
337 entry
= bfd_hash_allocate (table
,
338 sizeof (struct elf32_hppa_stub_hash_entry
));
343 /* Call the allocation method of the superclass. */
344 entry
= bfd_hash_newfunc (entry
, table
, string
);
347 struct elf32_hppa_stub_hash_entry
*hsh
;
349 /* Initialize the local fields. */
350 hsh
= hppa_stub_hash_entry (entry
);
351 hsh
->stub_sec
= NULL
;
352 hsh
->stub_offset
= 0;
353 hsh
->target_value
= 0;
354 hsh
->target_section
= NULL
;
355 hsh
->stub_type
= hppa_stub_long_branch
;
363 /* Initialize an entry in the link hash table. */
365 static struct bfd_hash_entry
*
366 hppa_link_hash_newfunc (struct bfd_hash_entry
*entry
,
367 struct bfd_hash_table
*table
,
370 /* Allocate the structure if it has not already been allocated by a
374 entry
= bfd_hash_allocate (table
,
375 sizeof (struct elf32_hppa_link_hash_entry
));
380 /* Call the allocation method of the superclass. */
381 entry
= _bfd_elf_link_hash_newfunc (entry
, table
, string
);
384 struct elf32_hppa_link_hash_entry
*hh
;
386 /* Initialize the local fields. */
387 hh
= hppa_elf_hash_entry (entry
);
388 hh
->hsh_cache
= NULL
;
390 hh
->tls_type
= GOT_UNKNOWN
;
396 /* Free the derived linker hash table. */
399 elf32_hppa_link_hash_table_free (bfd
*obfd
)
401 struct elf32_hppa_link_hash_table
*htab
402 = (struct elf32_hppa_link_hash_table
*) obfd
->link
.hash
;
404 bfd_hash_table_free (&htab
->bstab
);
405 _bfd_elf_link_hash_table_free (obfd
);
408 /* Create the derived linker hash table. The PA ELF port uses the derived
409 hash table to keep information specific to the PA ELF linker (without
410 using static variables). */
412 static struct bfd_link_hash_table
*
413 elf32_hppa_link_hash_table_create (bfd
*abfd
)
415 struct elf32_hppa_link_hash_table
*htab
;
416 size_t amt
= sizeof (*htab
);
418 htab
= bfd_zmalloc (amt
);
422 if (!_bfd_elf_link_hash_table_init (&htab
->etab
, abfd
, hppa_link_hash_newfunc
,
423 sizeof (struct elf32_hppa_link_hash_entry
),
430 /* Init the stub hash table too. */
431 if (!bfd_hash_table_init (&htab
->bstab
, stub_hash_newfunc
,
432 sizeof (struct elf32_hppa_stub_hash_entry
)))
434 _bfd_elf_link_hash_table_free (abfd
);
437 htab
->etab
.root
.hash_table_free
= elf32_hppa_link_hash_table_free
;
439 htab
->text_segment_base
= (bfd_vma
) -1;
440 htab
->data_segment_base
= (bfd_vma
) -1;
441 return &htab
->etab
.root
;
444 /* Initialize the linker stubs BFD so that we can use it for linker
445 created dynamic sections. */
448 elf32_hppa_init_stub_bfd (bfd
*abfd
, struct bfd_link_info
*info
)
450 struct elf32_hppa_link_hash_table
*htab
= hppa_link_hash_table (info
);
452 elf_elfheader (abfd
)->e_ident
[EI_CLASS
] = ELFCLASS32
;
453 htab
->etab
.dynobj
= abfd
;
456 /* Build a name for an entry in the stub hash table. */
459 hppa_stub_name (const asection
*input_section
,
460 const asection
*sym_sec
,
461 const struct elf32_hppa_link_hash_entry
*hh
,
462 const Elf_Internal_Rela
*rela
)
469 len
= 8 + 1 + strlen (hh_name (hh
)) + 1 + 8 + 1;
470 stub_name
= bfd_malloc (len
);
471 if (stub_name
!= NULL
)
472 sprintf (stub_name
, "%08x_%s+%x",
473 input_section
->id
& 0xffffffff,
475 (int) rela
->r_addend
& 0xffffffff);
479 len
= 8 + 1 + 8 + 1 + 8 + 1 + 8 + 1;
480 stub_name
= bfd_malloc (len
);
481 if (stub_name
!= NULL
)
482 sprintf (stub_name
, "%08x_%x:%x+%x",
483 input_section
->id
& 0xffffffff,
484 sym_sec
->id
& 0xffffffff,
485 (int) ELF32_R_SYM (rela
->r_info
) & 0xffffffff,
486 (int) rela
->r_addend
& 0xffffffff);
491 /* Look up an entry in the stub hash. Stub entries are cached because
492 creating the stub name takes a bit of time. */
494 static struct elf32_hppa_stub_hash_entry
*
495 hppa_get_stub_entry (const asection
*input_section
,
496 const asection
*sym_sec
,
497 struct elf32_hppa_link_hash_entry
*hh
,
498 const Elf_Internal_Rela
*rela
,
499 struct elf32_hppa_link_hash_table
*htab
)
501 struct elf32_hppa_stub_hash_entry
*hsh_entry
;
502 const asection
*id_sec
;
504 /* If this input section is part of a group of sections sharing one
505 stub section, then use the id of the first section in the group.
506 Stub names need to include a section id, as there may well be
507 more than one stub used to reach say, printf, and we need to
508 distinguish between them. */
509 id_sec
= htab
->stub_group
[input_section
->id
].link_sec
;
513 if (hh
!= NULL
&& hh
->hsh_cache
!= NULL
514 && hh
->hsh_cache
->hh
== hh
515 && hh
->hsh_cache
->id_sec
== id_sec
)
517 hsh_entry
= hh
->hsh_cache
;
523 stub_name
= hppa_stub_name (id_sec
, sym_sec
, hh
, rela
);
524 if (stub_name
== NULL
)
527 hsh_entry
= hppa_stub_hash_lookup (&htab
->bstab
,
528 stub_name
, FALSE
, FALSE
);
530 hh
->hsh_cache
= hsh_entry
;
538 /* Add a new stub entry to the stub hash. Not all fields of the new
539 stub entry are initialised. */
541 static struct elf32_hppa_stub_hash_entry
*
542 hppa_add_stub (const char *stub_name
,
544 struct elf32_hppa_link_hash_table
*htab
)
548 struct elf32_hppa_stub_hash_entry
*hsh
;
550 link_sec
= htab
->stub_group
[section
->id
].link_sec
;
551 stub_sec
= htab
->stub_group
[section
->id
].stub_sec
;
552 if (stub_sec
== NULL
)
554 stub_sec
= htab
->stub_group
[link_sec
->id
].stub_sec
;
555 if (stub_sec
== NULL
)
561 namelen
= strlen (link_sec
->name
);
562 len
= namelen
+ sizeof (STUB_SUFFIX
);
563 s_name
= bfd_alloc (htab
->stub_bfd
, len
);
567 memcpy (s_name
, link_sec
->name
, namelen
);
568 memcpy (s_name
+ namelen
, STUB_SUFFIX
, sizeof (STUB_SUFFIX
));
569 stub_sec
= (*htab
->add_stub_section
) (s_name
, link_sec
);
570 if (stub_sec
== NULL
)
572 htab
->stub_group
[link_sec
->id
].stub_sec
= stub_sec
;
574 htab
->stub_group
[section
->id
].stub_sec
= stub_sec
;
577 /* Enter this entry into the linker stub hash table. */
578 hsh
= hppa_stub_hash_lookup (&htab
->bstab
, stub_name
,
582 /* xgettext:c-format */
583 _bfd_error_handler (_("%pB: cannot create stub entry %s"),
584 section
->owner
, stub_name
);
588 hsh
->stub_sec
= stub_sec
;
589 hsh
->stub_offset
= 0;
590 hsh
->id_sec
= link_sec
;
594 /* Determine the type of stub needed, if any, for a call. */
596 static enum elf32_hppa_stub_type
597 hppa_type_of_stub (asection
*input_sec
,
598 const Elf_Internal_Rela
*rela
,
599 struct elf32_hppa_link_hash_entry
*hh
,
601 struct bfd_link_info
*info
)
604 bfd_vma branch_offset
;
605 bfd_vma max_branch_offset
;
609 && hh
->eh
.plt
.offset
!= (bfd_vma
) -1
610 && hh
->eh
.dynindx
!= -1
612 && (bfd_link_pic (info
)
613 || !hh
->eh
.def_regular
614 || hh
->eh
.root
.type
== bfd_link_hash_defweak
))
616 /* We need an import stub. Decide between hppa_stub_import
617 and hppa_stub_import_shared later. */
618 return hppa_stub_import
;
621 if (destination
== (bfd_vma
) -1)
622 return hppa_stub_none
;
624 /* Determine where the call point is. */
625 location
= (input_sec
->output_offset
626 + input_sec
->output_section
->vma
629 branch_offset
= destination
- location
- 8;
630 r_type
= ELF32_R_TYPE (rela
->r_info
);
632 /* Determine if a long branch stub is needed. parisc branch offsets
633 are relative to the second instruction past the branch, ie. +8
634 bytes on from the branch instruction location. The offset is
635 signed and counts in units of 4 bytes. */
636 if (r_type
== (unsigned int) R_PARISC_PCREL17F
)
637 max_branch_offset
= (1 << (17 - 1)) << 2;
639 else if (r_type
== (unsigned int) R_PARISC_PCREL12F
)
640 max_branch_offset
= (1 << (12 - 1)) << 2;
642 else /* R_PARISC_PCREL22F. */
643 max_branch_offset
= (1 << (22 - 1)) << 2;
645 if (branch_offset
+ max_branch_offset
>= 2*max_branch_offset
)
646 return hppa_stub_long_branch
;
648 return hppa_stub_none
;
651 /* Build one linker stub as defined by the stub hash table entry GEN_ENTRY.
652 IN_ARG contains the link info pointer. */
654 #define LDIL_R1 0x20200000 /* ldil LR'XXX,%r1 */
655 #define BE_SR4_R1 0xe0202002 /* be,n RR'XXX(%sr4,%r1) */
657 #define BL_R1 0xe8200000 /* b,l .+8,%r1 */
658 #define ADDIL_R1 0x28200000 /* addil LR'XXX,%r1,%r1 */
659 #define DEPI_R1 0xd4201c1e /* depi 0,31,2,%r1 */
661 #define ADDIL_DP 0x2b600000 /* addil LR'XXX,%dp,%r1 */
662 #define LDW_R1_R21 0x48350000 /* ldw RR'XXX(%sr0,%r1),%r21 */
663 #define BV_R0_R21 0xeaa0c000 /* bv %r0(%r21) */
664 #define LDW_R1_R19 0x48330000 /* ldw RR'XXX(%sr0,%r1),%r19 */
666 #define ADDIL_R19 0x2a600000 /* addil LR'XXX,%r19,%r1 */
667 #define LDW_R1_DP 0x483b0000 /* ldw RR'XXX(%sr0,%r1),%dp */
669 #define LDO_R1_R22 0x34360000 /* ldo RR'XXX(%r1),%r22 */
670 #define LDW_R22_R21 0x0ec01095 /* ldw 0(%r22),%r21 */
671 #define LDW_R22_R19 0x0ec81093 /* ldw 4(%r22),%r19 */
673 #define LDSID_R21_R1 0x02a010a1 /* ldsid (%sr0,%r21),%r1 */
674 #define MTSP_R1 0x00011820 /* mtsp %r1,%sr0 */
675 #define BE_SR0_R21 0xe2a00000 /* be 0(%sr0,%r21) */
676 #define STW_RP 0x6bc23fd1 /* stw %rp,-24(%sr0,%sp) */
678 #define BL22_RP 0xe800a002 /* b,l,n XXX,%rp */
679 #define BL_RP 0xe8400002 /* b,l,n XXX,%rp */
680 #define NOP 0x08000240 /* nop */
681 #define LDW_RP 0x4bc23fd1 /* ldw -24(%sr0,%sp),%rp */
682 #define LDSID_RP_R1 0x004010a1 /* ldsid (%sr0,%rp),%r1 */
683 #define BE_SR0_RP 0xe0400002 /* be,n 0(%sr0,%rp) */
690 #define LDW_R1_DLT LDW_R1_R19
692 #define LDW_R1_DLT LDW_R1_DP
696 hppa_build_one_stub (struct bfd_hash_entry
*bh
, void *in_arg
)
698 struct elf32_hppa_stub_hash_entry
*hsh
;
699 struct bfd_link_info
*info
;
700 struct elf32_hppa_link_hash_table
*htab
;
710 /* Massage our args to the form they really have. */
711 hsh
= hppa_stub_hash_entry (bh
);
712 info
= (struct bfd_link_info
*)in_arg
;
714 htab
= hppa_link_hash_table (info
);
718 stub_sec
= hsh
->stub_sec
;
720 /* Make a note of the offset within the stubs for this entry. */
721 hsh
->stub_offset
= stub_sec
->size
;
722 loc
= stub_sec
->contents
+ hsh
->stub_offset
;
724 stub_bfd
= stub_sec
->owner
;
726 switch (hsh
->stub_type
)
728 case hppa_stub_long_branch
:
729 /* Fail if the target section could not be assigned to an output
730 section. The user should fix his linker script. */
731 if (hsh
->target_section
->output_section
== NULL
732 && info
->non_contiguous_regions
)
733 info
->callbacks
->einfo (_("%F%P: Could not assign '%pA' to an output "
734 "section. Retry without "
735 "--enable-non-contiguous-regions.\n"),
736 hsh
->target_section
);
738 /* Create the long branch. A long branch is formed with "ldil"
739 loading the upper bits of the target address into a register,
740 then branching with "be" which adds in the lower bits.
741 The "be" has its delay slot nullified. */
742 sym_value
= (hsh
->target_value
743 + hsh
->target_section
->output_offset
744 + hsh
->target_section
->output_section
->vma
);
746 val
= hppa_field_adjust (sym_value
, 0, e_lrsel
);
747 insn
= hppa_rebuild_insn ((int) LDIL_R1
, val
, 21);
748 bfd_put_32 (stub_bfd
, insn
, loc
);
750 val
= hppa_field_adjust (sym_value
, 0, e_rrsel
) >> 2;
751 insn
= hppa_rebuild_insn ((int) BE_SR4_R1
, val
, 17);
752 bfd_put_32 (stub_bfd
, insn
, loc
+ 4);
754 size
= LONG_BRANCH_STUB_SIZE
;
757 case hppa_stub_long_branch_shared
:
758 /* Fail if the target section could not be assigned to an output
759 section. The user should fix his linker script. */
760 if (hsh
->target_section
->output_section
== NULL
761 && info
->non_contiguous_regions
)
762 info
->callbacks
->einfo (_("%F%P: Could not assign %pA to an output "
763 "section. Retry without "
764 "--enable-non-contiguous-regions.\n"),
765 hsh
->target_section
);
767 /* Branches are relative. This is where we are going to. */
768 sym_value
= (hsh
->target_value
769 + hsh
->target_section
->output_offset
770 + hsh
->target_section
->output_section
->vma
);
772 /* And this is where we are coming from, more or less. */
773 sym_value
-= (hsh
->stub_offset
774 + stub_sec
->output_offset
775 + stub_sec
->output_section
->vma
);
777 bfd_put_32 (stub_bfd
, (bfd_vma
) BL_R1
, loc
);
778 val
= hppa_field_adjust (sym_value
, (bfd_signed_vma
) -8, e_lrsel
);
779 insn
= hppa_rebuild_insn ((int) ADDIL_R1
, val
, 21);
780 bfd_put_32 (stub_bfd
, insn
, loc
+ 4);
782 val
= hppa_field_adjust (sym_value
, (bfd_signed_vma
) -8, e_rrsel
) >> 2;
783 insn
= hppa_rebuild_insn ((int) BE_SR4_R1
, val
, 17);
784 bfd_put_32 (stub_bfd
, insn
, loc
+ 8);
785 size
= LONG_BRANCH_SHARED_STUB_SIZE
;
788 case hppa_stub_import
:
789 case hppa_stub_import_shared
:
790 off
= hsh
->hh
->eh
.plt
.offset
;
791 if (off
>= (bfd_vma
) -2)
794 off
&= ~ (bfd_vma
) 1;
796 + htab
->etab
.splt
->output_offset
797 + htab
->etab
.splt
->output_section
->vma
798 - elf_gp (htab
->etab
.splt
->output_section
->owner
));
802 if (hsh
->stub_type
== hppa_stub_import_shared
)
806 /* Load function descriptor address into register %r22. It is
807 sometimes needed for lazy binding. */
808 val
= hppa_field_adjust (sym_value
, 0, e_lrsel
),
809 insn
= hppa_rebuild_insn ((int) insn
, val
, 21);
810 bfd_put_32 (stub_bfd
, insn
, loc
);
812 val
= hppa_field_adjust (sym_value
, 0, e_rrsel
);
813 insn
= hppa_rebuild_insn ((int) LDO_R1_R22
, val
, 14);
814 bfd_put_32 (stub_bfd
, insn
, loc
+ 4);
816 bfd_put_32 (stub_bfd
, (bfd_vma
) LDW_R22_R21
, loc
+ 8);
818 if (htab
->multi_subspace
)
820 bfd_put_32 (stub_bfd
, (bfd_vma
) LDSID_R21_R1
, loc
+ 12);
821 bfd_put_32 (stub_bfd
, (bfd_vma
) LDW_R22_R19
, loc
+ 16);
822 bfd_put_32 (stub_bfd
, (bfd_vma
) MTSP_R1
, loc
+ 20);
823 bfd_put_32 (stub_bfd
, (bfd_vma
) BE_SR0_R21
, loc
+ 24);
824 bfd_put_32 (stub_bfd
, (bfd_vma
) STW_RP
, loc
+ 28);
826 size
= IMPORT_SHARED_STUB_SIZE
;
830 bfd_put_32 (stub_bfd
, (bfd_vma
) BV_R0_R21
, loc
+ 12);
831 bfd_put_32 (stub_bfd
, (bfd_vma
) LDW_R22_R19
, loc
+ 16);
833 size
= IMPORT_STUB_SIZE
;
838 case hppa_stub_export
:
839 /* Fail if the target section could not be assigned to an output
840 section. The user should fix his linker script. */
841 if (hsh
->target_section
->output_section
== NULL
842 && info
->non_contiguous_regions
)
843 info
->callbacks
->einfo (_("%F%P: Could not assign %pA to an output "
844 "section. Retry without "
845 "--enable-non-contiguous-regions.\n"),
846 hsh
->target_section
);
848 /* Branches are relative. This is where we are going to. */
849 sym_value
= (hsh
->target_value
850 + hsh
->target_section
->output_offset
851 + hsh
->target_section
->output_section
->vma
);
853 /* And this is where we are coming from. */
854 sym_value
-= (hsh
->stub_offset
855 + stub_sec
->output_offset
856 + stub_sec
->output_section
->vma
);
858 if (sym_value
- 8 + (1 << (17 + 1)) >= (1 << (17 + 2))
859 && (!htab
->has_22bit_branch
860 || sym_value
- 8 + (1 << (22 + 1)) >= (1 << (22 + 2))))
863 /* xgettext:c-format */
864 (_("%pB(%pA+%#" PRIx64
"): "
865 "cannot reach %s, recompile with -ffunction-sections"),
866 hsh
->target_section
->owner
,
868 (uint64_t) hsh
->stub_offset
,
869 hsh
->bh_root
.string
);
870 bfd_set_error (bfd_error_bad_value
);
874 val
= hppa_field_adjust (sym_value
, (bfd_signed_vma
) -8, e_fsel
) >> 2;
875 if (!htab
->has_22bit_branch
)
876 insn
= hppa_rebuild_insn ((int) BL_RP
, val
, 17);
878 insn
= hppa_rebuild_insn ((int) BL22_RP
, val
, 22);
879 bfd_put_32 (stub_bfd
, insn
, loc
);
881 bfd_put_32 (stub_bfd
, (bfd_vma
) NOP
, loc
+ 4);
882 bfd_put_32 (stub_bfd
, (bfd_vma
) LDW_RP
, loc
+ 8);
883 bfd_put_32 (stub_bfd
, (bfd_vma
) LDSID_RP_R1
, loc
+ 12);
884 bfd_put_32 (stub_bfd
, (bfd_vma
) MTSP_R1
, loc
+ 16);
885 bfd_put_32 (stub_bfd
, (bfd_vma
) BE_SR0_RP
, loc
+ 20);
887 /* Point the function symbol at the stub. */
888 hsh
->hh
->eh
.root
.u
.def
.section
= stub_sec
;
889 hsh
->hh
->eh
.root
.u
.def
.value
= stub_sec
->size
;
891 size
= EXPORT_STUB_SIZE
;
899 stub_sec
->size
+= size
;
924 /* As above, but don't actually build the stub. Just bump offset so
925 we know stub section sizes. */
928 hppa_size_one_stub (struct bfd_hash_entry
*bh
, void *in_arg
)
930 struct elf32_hppa_stub_hash_entry
*hsh
;
931 struct elf32_hppa_link_hash_table
*htab
;
934 /* Massage our args to the form they really have. */
935 hsh
= hppa_stub_hash_entry (bh
);
938 if (hsh
->stub_type
== hppa_stub_long_branch
)
939 size
= LONG_BRANCH_STUB_SIZE
;
940 else if (hsh
->stub_type
== hppa_stub_long_branch_shared
)
941 size
= LONG_BRANCH_SHARED_STUB_SIZE
;
942 else if (hsh
->stub_type
== hppa_stub_export
)
943 size
= EXPORT_STUB_SIZE
;
944 else /* hppa_stub_import or hppa_stub_import_shared. */
946 if (htab
->multi_subspace
)
947 size
= IMPORT_SHARED_STUB_SIZE
;
949 size
= IMPORT_STUB_SIZE
;
952 hsh
->stub_sec
->size
+= size
;
956 /* Return nonzero if ABFD represents an HPPA ELF32 file.
957 Additionally we set the default architecture and machine. */
960 elf32_hppa_object_p (bfd
*abfd
)
962 Elf_Internal_Ehdr
* i_ehdrp
;
965 i_ehdrp
= elf_elfheader (abfd
);
966 if (strcmp (bfd_get_target (abfd
), "elf32-hppa-linux") == 0)
968 /* GCC on hppa-linux produces binaries with OSABI=GNU,
969 but the kernel produces corefiles with OSABI=SysV. */
970 if (i_ehdrp
->e_ident
[EI_OSABI
] != ELFOSABI_GNU
&&
971 i_ehdrp
->e_ident
[EI_OSABI
] != ELFOSABI_NONE
) /* aka SYSV */
974 else if (strcmp (bfd_get_target (abfd
), "elf32-hppa-netbsd") == 0)
976 /* GCC on hppa-netbsd produces binaries with OSABI=NetBSD,
977 but the kernel produces corefiles with OSABI=SysV. */
978 if (i_ehdrp
->e_ident
[EI_OSABI
] != ELFOSABI_NETBSD
&&
979 i_ehdrp
->e_ident
[EI_OSABI
] != ELFOSABI_NONE
) /* aka SYSV */
984 if (i_ehdrp
->e_ident
[EI_OSABI
] != ELFOSABI_HPUX
)
988 flags
= i_ehdrp
->e_flags
;
989 switch (flags
& (EF_PARISC_ARCH
| EF_PARISC_WIDE
))
992 return bfd_default_set_arch_mach (abfd
, bfd_arch_hppa
, 10);
994 return bfd_default_set_arch_mach (abfd
, bfd_arch_hppa
, 11);
996 return bfd_default_set_arch_mach (abfd
, bfd_arch_hppa
, 20);
997 case EFA_PARISC_2_0
| EF_PARISC_WIDE
:
998 return bfd_default_set_arch_mach (abfd
, bfd_arch_hppa
, 25);
1003 /* Create the .plt and .got sections, and set up our hash table
1004 short-cuts to various dynamic sections. */
1007 elf32_hppa_create_dynamic_sections (bfd
*abfd
, struct bfd_link_info
*info
)
1009 struct elf32_hppa_link_hash_table
*htab
;
1010 struct elf_link_hash_entry
*eh
;
1012 /* Don't try to create the .plt and .got twice. */
1013 htab
= hppa_link_hash_table (info
);
1016 if (htab
->etab
.splt
!= NULL
)
1019 /* Call the generic code to do most of the work. */
1020 if (! _bfd_elf_create_dynamic_sections (abfd
, info
))
1023 /* hppa-linux needs _GLOBAL_OFFSET_TABLE_ to be visible from the main
1024 application, because __canonicalize_funcptr_for_compare needs it. */
1025 eh
= elf_hash_table (info
)->hgot
;
1026 eh
->forced_local
= 0;
1027 eh
->other
= STV_DEFAULT
;
1028 return bfd_elf_link_record_dynamic_symbol (info
, eh
);
1031 /* Copy the extra info we tack onto an elf_link_hash_entry. */
1034 elf32_hppa_copy_indirect_symbol (struct bfd_link_info
*info
,
1035 struct elf_link_hash_entry
*eh_dir
,
1036 struct elf_link_hash_entry
*eh_ind
)
1038 struct elf32_hppa_link_hash_entry
*hh_dir
, *hh_ind
;
1040 hh_dir
= hppa_elf_hash_entry (eh_dir
);
1041 hh_ind
= hppa_elf_hash_entry (eh_ind
);
1043 if (eh_ind
->dyn_relocs
!= NULL
1044 && eh_ind
->root
.type
== bfd_link_hash_indirect
)
1046 if (eh_dir
->dyn_relocs
!= NULL
)
1048 struct elf_dyn_relocs
**hdh_pp
;
1049 struct elf_dyn_relocs
*hdh_p
;
1051 /* Add reloc counts against the indirect sym to the direct sym
1052 list. Merge any entries against the same section. */
1053 for (hdh_pp
= &eh_ind
->dyn_relocs
; (hdh_p
= *hdh_pp
) != NULL
; )
1055 struct elf_dyn_relocs
*hdh_q
;
1057 for (hdh_q
= eh_dir
->dyn_relocs
;
1059 hdh_q
= hdh_q
->next
)
1060 if (hdh_q
->sec
== hdh_p
->sec
)
1062 #if RELATIVE_DYNRELOCS
1063 hdh_q
->pc_count
+= hdh_p
->pc_count
;
1065 hdh_q
->count
+= hdh_p
->count
;
1066 *hdh_pp
= hdh_p
->next
;
1070 hdh_pp
= &hdh_p
->next
;
1072 *hdh_pp
= eh_dir
->dyn_relocs
;
1075 eh_dir
->dyn_relocs
= eh_ind
->dyn_relocs
;
1076 eh_ind
->dyn_relocs
= NULL
;
1079 if (eh_ind
->root
.type
== bfd_link_hash_indirect
)
1081 hh_dir
->plabel
|= hh_ind
->plabel
;
1082 hh_dir
->tls_type
|= hh_ind
->tls_type
;
1083 hh_ind
->tls_type
= GOT_UNKNOWN
;
1086 _bfd_elf_link_hash_copy_indirect (info
, eh_dir
, eh_ind
);
1090 elf32_hppa_optimized_tls_reloc (struct bfd_link_info
*info ATTRIBUTE_UNUSED
,
1091 int r_type
, int is_local ATTRIBUTE_UNUSED
)
1093 /* For now we don't support linker optimizations. */
1097 /* Return a pointer to the local GOT, PLT and TLS reference counts
1098 for ABFD. Returns NULL if the storage allocation fails. */
1100 static bfd_signed_vma
*
1101 hppa32_elf_local_refcounts (bfd
*abfd
)
1103 Elf_Internal_Shdr
*symtab_hdr
= &elf_tdata (abfd
)->symtab_hdr
;
1104 bfd_signed_vma
*local_refcounts
;
1106 local_refcounts
= elf_local_got_refcounts (abfd
);
1107 if (local_refcounts
== NULL
)
1111 /* Allocate space for local GOT and PLT reference
1112 counts. Done this way to save polluting elf_obj_tdata
1113 with another target specific pointer. */
1114 size
= symtab_hdr
->sh_info
;
1115 size
*= 2 * sizeof (bfd_signed_vma
);
1116 /* Add in space to store the local GOT TLS types. */
1117 size
+= symtab_hdr
->sh_info
;
1118 local_refcounts
= bfd_zalloc (abfd
, size
);
1119 if (local_refcounts
== NULL
)
1121 elf_local_got_refcounts (abfd
) = local_refcounts
;
1122 memset (hppa_elf_local_got_tls_type (abfd
), GOT_UNKNOWN
,
1123 symtab_hdr
->sh_info
);
1125 return local_refcounts
;
1129 /* Look through the relocs for a section during the first phase, and
1130 calculate needed space in the global offset table, procedure linkage
1131 table, and dynamic reloc sections. At this point we haven't
1132 necessarily read all the input files. */
1135 elf32_hppa_check_relocs (bfd
*abfd
,
1136 struct bfd_link_info
*info
,
1138 const Elf_Internal_Rela
*relocs
)
1140 Elf_Internal_Shdr
*symtab_hdr
;
1141 struct elf_link_hash_entry
**eh_syms
;
1142 const Elf_Internal_Rela
*rela
;
1143 const Elf_Internal_Rela
*rela_end
;
1144 struct elf32_hppa_link_hash_table
*htab
;
1147 if (bfd_link_relocatable (info
))
1150 htab
= hppa_link_hash_table (info
);
1153 symtab_hdr
= &elf_tdata (abfd
)->symtab_hdr
;
1154 eh_syms
= elf_sym_hashes (abfd
);
1157 rela_end
= relocs
+ sec
->reloc_count
;
1158 for (rela
= relocs
; rela
< rela_end
; rela
++)
1167 unsigned int r_symndx
, r_type
;
1168 struct elf32_hppa_link_hash_entry
*hh
;
1171 r_symndx
= ELF32_R_SYM (rela
->r_info
);
1173 if (r_symndx
< symtab_hdr
->sh_info
)
1177 hh
= hppa_elf_hash_entry (eh_syms
[r_symndx
- symtab_hdr
->sh_info
]);
1178 while (hh
->eh
.root
.type
== bfd_link_hash_indirect
1179 || hh
->eh
.root
.type
== bfd_link_hash_warning
)
1180 hh
= hppa_elf_hash_entry (hh
->eh
.root
.u
.i
.link
);
1183 r_type
= ELF32_R_TYPE (rela
->r_info
);
1184 r_type
= elf32_hppa_optimized_tls_reloc (info
, r_type
, hh
== NULL
);
1188 case R_PARISC_DLTIND14F
:
1189 case R_PARISC_DLTIND14R
:
1190 case R_PARISC_DLTIND21L
:
1191 /* This symbol requires a global offset table entry. */
1192 need_entry
= NEED_GOT
;
1195 case R_PARISC_PLABEL14R
: /* "Official" procedure labels. */
1196 case R_PARISC_PLABEL21L
:
1197 case R_PARISC_PLABEL32
:
1198 /* If the addend is non-zero, we break badly. */
1199 if (rela
->r_addend
!= 0)
1202 /* If we are creating a shared library, then we need to
1203 create a PLT entry for all PLABELs, because PLABELs with
1204 local symbols may be passed via a pointer to another
1205 object. Additionally, output a dynamic relocation
1206 pointing to the PLT entry.
1208 For executables, the original 32-bit ABI allowed two
1209 different styles of PLABELs (function pointers): For
1210 global functions, the PLABEL word points into the .plt
1211 two bytes past a (function address, gp) pair, and for
1212 local functions the PLABEL points directly at the
1213 function. The magic +2 for the first type allows us to
1214 differentiate between the two. As you can imagine, this
1215 is a real pain when it comes to generating code to call
1216 functions indirectly or to compare function pointers.
1217 We avoid the mess by always pointing a PLABEL into the
1218 .plt, even for local functions. */
1219 need_entry
= PLT_PLABEL
| NEED_PLT
;
1220 if (bfd_link_pic (info
))
1221 need_entry
|= NEED_DYNREL
;
1224 case R_PARISC_PCREL12F
:
1225 htab
->has_12bit_branch
= 1;
1228 case R_PARISC_PCREL17C
:
1229 case R_PARISC_PCREL17F
:
1230 htab
->has_17bit_branch
= 1;
1233 case R_PARISC_PCREL22F
:
1234 htab
->has_22bit_branch
= 1;
1236 /* Function calls might need to go through the .plt, and
1237 might require long branch stubs. */
1240 /* We know local syms won't need a .plt entry, and if
1241 they need a long branch stub we can't guarantee that
1242 we can reach the stub. So just flag an error later
1243 if we're doing a shared link and find we need a long
1249 /* Global symbols will need a .plt entry if they remain
1250 global, and in most cases won't need a long branch
1251 stub. Unfortunately, we have to cater for the case
1252 where a symbol is forced local by versioning, or due
1253 to symbolic linking, and we lose the .plt entry. */
1254 need_entry
= NEED_PLT
;
1255 if (hh
->eh
.type
== STT_PARISC_MILLI
)
1260 case R_PARISC_SEGBASE
: /* Used to set segment base. */
1261 case R_PARISC_SEGREL32
: /* Relative reloc, used for unwind. */
1262 case R_PARISC_PCREL14F
: /* PC relative load/store. */
1263 case R_PARISC_PCREL14R
:
1264 case R_PARISC_PCREL17R
: /* External branches. */
1265 case R_PARISC_PCREL21L
: /* As above, and for load/store too. */
1266 case R_PARISC_PCREL32
:
1267 /* We don't need to propagate the relocation if linking a
1268 shared object since these are section relative. */
1271 case R_PARISC_DPREL14F
: /* Used for gp rel data load/store. */
1272 case R_PARISC_DPREL14R
:
1273 case R_PARISC_DPREL21L
:
1274 if (bfd_link_pic (info
))
1277 /* xgettext:c-format */
1278 (_("%pB: relocation %s can not be used when making a shared object; recompile with -fPIC"),
1280 elf_hppa_howto_table
[r_type
].name
);
1281 bfd_set_error (bfd_error_bad_value
);
1286 case R_PARISC_DIR17F
: /* Used for external branches. */
1287 case R_PARISC_DIR17R
:
1288 case R_PARISC_DIR14F
: /* Used for load/store from absolute locn. */
1289 case R_PARISC_DIR14R
:
1290 case R_PARISC_DIR21L
: /* As above, and for ext branches too. */
1291 case R_PARISC_DIR32
: /* .word relocs. */
1292 /* We may want to output a dynamic relocation later. */
1293 need_entry
= NEED_DYNREL
;
1296 /* This relocation describes the C++ object vtable hierarchy.
1297 Reconstruct it for later use during GC. */
1298 case R_PARISC_GNU_VTINHERIT
:
1299 if (!bfd_elf_gc_record_vtinherit (abfd
, sec
, &hh
->eh
, rela
->r_offset
))
1303 /* This relocation describes which C++ vtable entries are actually
1304 used. Record for later use during GC. */
1305 case R_PARISC_GNU_VTENTRY
:
1306 if (!bfd_elf_gc_record_vtentry (abfd
, sec
, &hh
->eh
, rela
->r_addend
))
1310 case R_PARISC_TLS_GD21L
:
1311 case R_PARISC_TLS_GD14R
:
1312 case R_PARISC_TLS_LDM21L
:
1313 case R_PARISC_TLS_LDM14R
:
1314 need_entry
= NEED_GOT
;
1317 case R_PARISC_TLS_IE21L
:
1318 case R_PARISC_TLS_IE14R
:
1319 if (bfd_link_dll (info
))
1320 info
->flags
|= DF_STATIC_TLS
;
1321 need_entry
= NEED_GOT
;
1328 /* Now carry out our orders. */
1329 if (need_entry
& NEED_GOT
)
1331 int tls_type
= GOT_NORMAL
;
1337 case R_PARISC_TLS_GD21L
:
1338 case R_PARISC_TLS_GD14R
:
1339 tls_type
= GOT_TLS_GD
;
1341 case R_PARISC_TLS_LDM21L
:
1342 case R_PARISC_TLS_LDM14R
:
1343 tls_type
= GOT_TLS_LDM
;
1345 case R_PARISC_TLS_IE21L
:
1346 case R_PARISC_TLS_IE14R
:
1347 tls_type
= GOT_TLS_IE
;
1351 /* Allocate space for a GOT entry, as well as a dynamic
1352 relocation for this entry. */
1353 if (htab
->etab
.sgot
== NULL
)
1355 if (!elf32_hppa_create_dynamic_sections (htab
->etab
.dynobj
, info
))
1361 if (tls_type
== GOT_TLS_LDM
)
1362 htab
->tls_ldm_got
.refcount
+= 1;
1364 hh
->eh
.got
.refcount
+= 1;
1365 hh
->tls_type
|= tls_type
;
1369 bfd_signed_vma
*local_got_refcounts
;
1371 /* This is a global offset table entry for a local symbol. */
1372 local_got_refcounts
= hppa32_elf_local_refcounts (abfd
);
1373 if (local_got_refcounts
== NULL
)
1375 if (tls_type
== GOT_TLS_LDM
)
1376 htab
->tls_ldm_got
.refcount
+= 1;
1378 local_got_refcounts
[r_symndx
] += 1;
1380 hppa_elf_local_got_tls_type (abfd
) [r_symndx
] |= tls_type
;
1384 if (need_entry
& NEED_PLT
)
1386 /* If we are creating a shared library, and this is a reloc
1387 against a weak symbol or a global symbol in a dynamic
1388 object, then we will be creating an import stub and a
1389 .plt entry for the symbol. Similarly, on a normal link
1390 to symbols defined in a dynamic object we'll need the
1391 import stub and a .plt entry. We don't know yet whether
1392 the symbol is defined or not, so make an entry anyway and
1393 clean up later in adjust_dynamic_symbol. */
1394 if ((sec
->flags
& SEC_ALLOC
) != 0)
1398 hh
->eh
.needs_plt
= 1;
1399 hh
->eh
.plt
.refcount
+= 1;
1401 /* If this .plt entry is for a plabel, mark it so
1402 that adjust_dynamic_symbol will keep the entry
1403 even if it appears to be local. */
1404 if (need_entry
& PLT_PLABEL
)
1407 else if (need_entry
& PLT_PLABEL
)
1409 bfd_signed_vma
*local_got_refcounts
;
1410 bfd_signed_vma
*local_plt_refcounts
;
1412 local_got_refcounts
= hppa32_elf_local_refcounts (abfd
);
1413 if (local_got_refcounts
== NULL
)
1415 local_plt_refcounts
= (local_got_refcounts
1416 + symtab_hdr
->sh_info
);
1417 local_plt_refcounts
[r_symndx
] += 1;
1422 if ((need_entry
& NEED_DYNREL
) != 0
1423 && (sec
->flags
& SEC_ALLOC
) != 0)
1425 /* Flag this symbol as having a non-got, non-plt reference
1426 so that we generate copy relocs if it turns out to be
1429 hh
->eh
.non_got_ref
= 1;
1431 /* If we are creating a shared library then we need to copy
1432 the reloc into the shared library. However, if we are
1433 linking with -Bsymbolic, we need only copy absolute
1434 relocs or relocs against symbols that are not defined in
1435 an object we are including in the link. PC- or DP- or
1436 DLT-relative relocs against any local sym or global sym
1437 with DEF_REGULAR set, can be discarded. At this point we
1438 have not seen all the input files, so it is possible that
1439 DEF_REGULAR is not set now but will be set later (it is
1440 never cleared). We account for that possibility below by
1441 storing information in the dyn_relocs field of the
1444 A similar situation to the -Bsymbolic case occurs when
1445 creating shared libraries and symbol visibility changes
1446 render the symbol local.
1448 As it turns out, all the relocs we will be creating here
1449 are absolute, so we cannot remove them on -Bsymbolic
1450 links or visibility changes anyway. A STUB_REL reloc
1451 is absolute too, as in that case it is the reloc in the
1452 stub we will be creating, rather than copying the PCREL
1453 reloc in the branch.
1455 If on the other hand, we are creating an executable, we
1456 may need to keep relocations for symbols satisfied by a
1457 dynamic library if we manage to avoid copy relocs for the
1459 if ((bfd_link_pic (info
)
1460 && (IS_ABSOLUTE_RELOC (r_type
)
1462 && (!SYMBOLIC_BIND (info
, &hh
->eh
)
1463 || hh
->eh
.root
.type
== bfd_link_hash_defweak
1464 || !hh
->eh
.def_regular
))))
1465 || (ELIMINATE_COPY_RELOCS
1466 && !bfd_link_pic (info
)
1468 && (hh
->eh
.root
.type
== bfd_link_hash_defweak
1469 || !hh
->eh
.def_regular
)))
1471 struct elf_dyn_relocs
*hdh_p
;
1472 struct elf_dyn_relocs
**hdh_head
;
1474 /* Create a reloc section in dynobj and make room for
1478 sreloc
= _bfd_elf_make_dynamic_reloc_section
1479 (sec
, htab
->etab
.dynobj
, 2, abfd
, /*rela?*/ TRUE
);
1483 bfd_set_error (bfd_error_bad_value
);
1488 /* If this is a global symbol, we count the number of
1489 relocations we need for this symbol. */
1492 hdh_head
= &hh
->eh
.dyn_relocs
;
1496 /* Track dynamic relocs needed for local syms too.
1497 We really need local syms available to do this
1501 Elf_Internal_Sym
*isym
;
1503 isym
= bfd_sym_from_r_symndx (&htab
->sym_cache
,
1508 sr
= bfd_section_from_elf_index (abfd
, isym
->st_shndx
);
1512 vpp
= &elf_section_data (sr
)->local_dynrel
;
1513 hdh_head
= (struct elf_dyn_relocs
**) vpp
;
1517 if (hdh_p
== NULL
|| hdh_p
->sec
!= sec
)
1519 hdh_p
= bfd_alloc (htab
->etab
.dynobj
, sizeof *hdh_p
);
1522 hdh_p
->next
= *hdh_head
;
1526 #if RELATIVE_DYNRELOCS
1527 hdh_p
->pc_count
= 0;
1532 #if RELATIVE_DYNRELOCS
1533 if (!IS_ABSOLUTE_RELOC (rtype
))
1534 hdh_p
->pc_count
+= 1;
1543 /* Return the section that should be marked against garbage collection
1544 for a given relocation. */
1547 elf32_hppa_gc_mark_hook (asection
*sec
,
1548 struct bfd_link_info
*info
,
1549 Elf_Internal_Rela
*rela
,
1550 struct elf_link_hash_entry
*hh
,
1551 Elf_Internal_Sym
*sym
)
1554 switch ((unsigned int) ELF32_R_TYPE (rela
->r_info
))
1556 case R_PARISC_GNU_VTINHERIT
:
1557 case R_PARISC_GNU_VTENTRY
:
1561 return _bfd_elf_gc_mark_hook (sec
, info
, rela
, hh
, sym
);
1564 /* Support for core dump NOTE sections. */
1567 elf32_hppa_grok_prstatus (bfd
*abfd
, Elf_Internal_Note
*note
)
1572 switch (note
->descsz
)
1577 case 396: /* Linux/hppa */
1579 elf_tdata (abfd
)->core
->signal
= bfd_get_16 (abfd
, note
->descdata
+ 12);
1582 elf_tdata (abfd
)->core
->lwpid
= bfd_get_32 (abfd
, note
->descdata
+ 24);
1591 /* Make a ".reg/999" section. */
1592 return _bfd_elfcore_make_pseudosection (abfd
, ".reg",
1593 size
, note
->descpos
+ offset
);
1597 elf32_hppa_grok_psinfo (bfd
*abfd
, Elf_Internal_Note
*note
)
1599 switch (note
->descsz
)
1604 case 124: /* Linux/hppa elf_prpsinfo. */
1605 elf_tdata (abfd
)->core
->program
1606 = _bfd_elfcore_strndup (abfd
, note
->descdata
+ 28, 16);
1607 elf_tdata (abfd
)->core
->command
1608 = _bfd_elfcore_strndup (abfd
, note
->descdata
+ 44, 80);
1611 /* Note that for some reason, a spurious space is tacked
1612 onto the end of the args in some (at least one anyway)
1613 implementations, so strip it off if it exists. */
1615 char *command
= elf_tdata (abfd
)->core
->command
;
1616 int n
= strlen (command
);
1618 if (0 < n
&& command
[n
- 1] == ' ')
1619 command
[n
- 1] = '\0';
1625 /* Our own version of hide_symbol, so that we can keep plt entries for
1629 elf32_hppa_hide_symbol (struct bfd_link_info
*info
,
1630 struct elf_link_hash_entry
*eh
,
1631 bfd_boolean force_local
)
1635 eh
->forced_local
= 1;
1636 if (eh
->dynindx
!= -1)
1639 _bfd_elf_strtab_delref (elf_hash_table (info
)->dynstr
,
1643 /* PR 16082: Remove version information from hidden symbol. */
1644 eh
->verinfo
.verdef
= NULL
;
1645 eh
->verinfo
.vertree
= NULL
;
1648 /* STT_GNU_IFUNC symbol must go through PLT. */
1649 if (! hppa_elf_hash_entry (eh
)->plabel
1650 && eh
->type
!= STT_GNU_IFUNC
)
1653 eh
->plt
= elf_hash_table (info
)->init_plt_offset
;
1657 /* Find any dynamic relocs that apply to read-only sections. */
1660 readonly_dynrelocs (struct elf_link_hash_entry
*eh
)
1662 struct elf_dyn_relocs
*hdh_p
;
1664 for (hdh_p
= eh
->dyn_relocs
; hdh_p
!= NULL
; hdh_p
= hdh_p
->next
)
1666 asection
*sec
= hdh_p
->sec
->output_section
;
1668 if (sec
!= NULL
&& (sec
->flags
& SEC_READONLY
) != 0)
1674 /* Return true if we have dynamic relocs against H or any of its weak
1675 aliases, that apply to read-only sections. Cannot be used after
1676 size_dynamic_sections. */
1679 alias_readonly_dynrelocs (struct elf_link_hash_entry
*eh
)
1681 struct elf32_hppa_link_hash_entry
*hh
= hppa_elf_hash_entry (eh
);
1684 if (readonly_dynrelocs (&hh
->eh
))
1686 hh
= hppa_elf_hash_entry (hh
->eh
.u
.alias
);
1687 } while (hh
!= NULL
&& &hh
->eh
!= eh
);
1692 /* Adjust a symbol defined by a dynamic object and referenced by a
1693 regular object. The current definition is in some section of the
1694 dynamic object, but we're not including those sections. We have to
1695 change the definition to something the rest of the link can
1699 elf32_hppa_adjust_dynamic_symbol (struct bfd_link_info
*info
,
1700 struct elf_link_hash_entry
*eh
)
1702 struct elf32_hppa_link_hash_table
*htab
;
1703 asection
*sec
, *srel
;
1705 /* If this is a function, put it in the procedure linkage table. We
1706 will fill in the contents of the procedure linkage table later. */
1707 if (eh
->type
== STT_FUNC
1710 bfd_boolean local
= (SYMBOL_CALLS_LOCAL (info
, eh
)
1711 || UNDEFWEAK_NO_DYNAMIC_RELOC (info
, eh
));
1712 /* Discard dyn_relocs when non-pic if we've decided that a
1713 function symbol is local. */
1714 if (!bfd_link_pic (info
) && local
)
1715 eh
->dyn_relocs
= NULL
;
1717 /* If the symbol is used by a plabel, we must allocate a PLT slot.
1718 The refcounts are not reliable when it has been hidden since
1719 hide_symbol can be called before the plabel flag is set. */
1720 if (hppa_elf_hash_entry (eh
)->plabel
)
1721 eh
->plt
.refcount
= 1;
1723 /* Note that unlike some other backends, the refcount is not
1724 incremented for a non-call (and non-plabel) function reference. */
1725 else if (eh
->plt
.refcount
<= 0
1728 /* The .plt entry is not needed when:
1729 a) Garbage collection has removed all references to the
1731 b) We know for certain the symbol is defined in this
1732 object, and it's not a weak definition, nor is the symbol
1733 used by a plabel relocation. Either this object is the
1734 application or we are doing a shared symbolic link. */
1735 eh
->plt
.offset
= (bfd_vma
) -1;
1739 /* Unlike other targets, elf32-hppa.c does not define a function
1740 symbol in a non-pic executable on PLT stub code, so we don't
1741 have a local definition in that case. ie. dyn_relocs can't
1744 /* Function symbols can't have copy relocs. */
1748 eh
->plt
.offset
= (bfd_vma
) -1;
1750 htab
= hppa_link_hash_table (info
);
1754 /* If this is a weak symbol, and there is a real definition, the
1755 processor independent code will have arranged for us to see the
1756 real definition first, and we can just use the same value. */
1757 if (eh
->is_weakalias
)
1759 struct elf_link_hash_entry
*def
= weakdef (eh
);
1760 BFD_ASSERT (def
->root
.type
== bfd_link_hash_defined
);
1761 eh
->root
.u
.def
.section
= def
->root
.u
.def
.section
;
1762 eh
->root
.u
.def
.value
= def
->root
.u
.def
.value
;
1763 if (def
->root
.u
.def
.section
== htab
->etab
.sdynbss
1764 || def
->root
.u
.def
.section
== htab
->etab
.sdynrelro
)
1765 eh
->dyn_relocs
= NULL
;
1769 /* This is a reference to a symbol defined by a dynamic object which
1770 is not a function. */
1772 /* If we are creating a shared library, we must presume that the
1773 only references to the symbol are via the global offset table.
1774 For such cases we need not do anything here; the relocations will
1775 be handled correctly by relocate_section. */
1776 if (bfd_link_pic (info
))
1779 /* If there are no references to this symbol that do not use the
1780 GOT, we don't need to generate a copy reloc. */
1781 if (!eh
->non_got_ref
)
1784 /* If -z nocopyreloc was given, we won't generate them either. */
1785 if (info
->nocopyreloc
)
1788 /* If we don't find any dynamic relocs in read-only sections, then
1789 we'll be keeping the dynamic relocs and avoiding the copy reloc. */
1790 if (ELIMINATE_COPY_RELOCS
1791 && !alias_readonly_dynrelocs (eh
))
1794 /* We must allocate the symbol in our .dynbss section, which will
1795 become part of the .bss section of the executable. There will be
1796 an entry for this symbol in the .dynsym section. The dynamic
1797 object will contain position independent code, so all references
1798 from the dynamic object to this symbol will go through the global
1799 offset table. The dynamic linker will use the .dynsym entry to
1800 determine the address it must put in the global offset table, so
1801 both the dynamic object and the regular object will refer to the
1802 same memory location for the variable. */
1803 if ((eh
->root
.u
.def
.section
->flags
& SEC_READONLY
) != 0)
1805 sec
= htab
->etab
.sdynrelro
;
1806 srel
= htab
->etab
.sreldynrelro
;
1810 sec
= htab
->etab
.sdynbss
;
1811 srel
= htab
->etab
.srelbss
;
1813 if ((eh
->root
.u
.def
.section
->flags
& SEC_ALLOC
) != 0 && eh
->size
!= 0)
1815 /* We must generate a COPY reloc to tell the dynamic linker to
1816 copy the initial value out of the dynamic object and into the
1817 runtime process image. */
1818 srel
->size
+= sizeof (Elf32_External_Rela
);
1822 /* We no longer want dyn_relocs. */
1823 eh
->dyn_relocs
= NULL
;
1824 return _bfd_elf_adjust_dynamic_copy (info
, eh
, sec
);
1827 /* If EH is undefined, make it dynamic if that makes sense. */
1830 ensure_undef_dynamic (struct bfd_link_info
*info
,
1831 struct elf_link_hash_entry
*eh
)
1833 struct elf_link_hash_table
*htab
= elf_hash_table (info
);
1835 if (htab
->dynamic_sections_created
1836 && (eh
->root
.type
== bfd_link_hash_undefweak
1837 || eh
->root
.type
== bfd_link_hash_undefined
)
1838 && eh
->dynindx
== -1
1839 && !eh
->forced_local
1840 && eh
->type
!= STT_PARISC_MILLI
1841 && !UNDEFWEAK_NO_DYNAMIC_RELOC (info
, eh
)
1842 && ELF_ST_VISIBILITY (eh
->other
) == STV_DEFAULT
)
1843 return bfd_elf_link_record_dynamic_symbol (info
, eh
);
1847 /* Allocate space in the .plt for entries that won't have relocations.
1848 ie. plabel entries. */
1851 allocate_plt_static (struct elf_link_hash_entry
*eh
, void *inf
)
1853 struct bfd_link_info
*info
;
1854 struct elf32_hppa_link_hash_table
*htab
;
1855 struct elf32_hppa_link_hash_entry
*hh
;
1858 if (eh
->root
.type
== bfd_link_hash_indirect
)
1861 info
= (struct bfd_link_info
*) inf
;
1862 hh
= hppa_elf_hash_entry (eh
);
1863 htab
= hppa_link_hash_table (info
);
1867 if (htab
->etab
.dynamic_sections_created
1868 && eh
->plt
.refcount
> 0)
1870 if (!ensure_undef_dynamic (info
, eh
))
1873 if (WILL_CALL_FINISH_DYNAMIC_SYMBOL (1, bfd_link_pic (info
), eh
))
1875 /* Allocate these later. From this point on, h->plabel
1876 means that the plt entry is only used by a plabel.
1877 We'll be using a normal plt entry for this symbol, so
1878 clear the plabel indicator. */
1882 else if (hh
->plabel
)
1884 /* Make an entry in the .plt section for plabel references
1885 that won't have a .plt entry for other reasons. */
1886 sec
= htab
->etab
.splt
;
1887 eh
->plt
.offset
= sec
->size
;
1888 sec
->size
+= PLT_ENTRY_SIZE
;
1889 if (bfd_link_pic (info
))
1890 htab
->etab
.srelplt
->size
+= sizeof (Elf32_External_Rela
);
1894 /* No .plt entry needed. */
1895 eh
->plt
.offset
= (bfd_vma
) -1;
1901 eh
->plt
.offset
= (bfd_vma
) -1;
1908 /* Calculate size of GOT entries for symbol given its TLS_TYPE. */
1910 static inline unsigned int
1911 got_entries_needed (int tls_type
)
1913 unsigned int need
= 0;
1915 if ((tls_type
& GOT_NORMAL
) != 0)
1916 need
+= GOT_ENTRY_SIZE
;
1917 if ((tls_type
& GOT_TLS_GD
) != 0)
1918 need
+= GOT_ENTRY_SIZE
* 2;
1919 if ((tls_type
& GOT_TLS_IE
) != 0)
1920 need
+= GOT_ENTRY_SIZE
;
1924 /* Calculate size of relocs needed for symbol given its TLS_TYPE and
1925 NEEDed GOT entries. TPREL_KNOWN says a TPREL offset can be
1926 calculated at link time. DTPREL_KNOWN says the same for a DTPREL
1929 static inline unsigned int
1930 got_relocs_needed (int tls_type
, unsigned int need
,
1931 bfd_boolean dtprel_known
, bfd_boolean tprel_known
)
1933 /* All the entries we allocated need relocs.
1934 Except for GD and IE with local symbols. */
1935 if ((tls_type
& GOT_TLS_GD
) != 0 && dtprel_known
)
1936 need
-= GOT_ENTRY_SIZE
;
1937 if ((tls_type
& GOT_TLS_IE
) != 0 && tprel_known
)
1938 need
-= GOT_ENTRY_SIZE
;
1939 return need
* sizeof (Elf32_External_Rela
) / GOT_ENTRY_SIZE
;
1942 /* Allocate space in .plt, .got and associated reloc sections for
1946 allocate_dynrelocs (struct elf_link_hash_entry
*eh
, void *inf
)
1948 struct bfd_link_info
*info
;
1949 struct elf32_hppa_link_hash_table
*htab
;
1951 struct elf32_hppa_link_hash_entry
*hh
;
1952 struct elf_dyn_relocs
*hdh_p
;
1954 if (eh
->root
.type
== bfd_link_hash_indirect
)
1958 htab
= hppa_link_hash_table (info
);
1962 hh
= hppa_elf_hash_entry (eh
);
1964 if (htab
->etab
.dynamic_sections_created
1965 && eh
->plt
.offset
!= (bfd_vma
) -1
1967 && eh
->plt
.refcount
> 0)
1969 /* Make an entry in the .plt section. */
1970 sec
= htab
->etab
.splt
;
1971 eh
->plt
.offset
= sec
->size
;
1972 sec
->size
+= PLT_ENTRY_SIZE
;
1974 /* We also need to make an entry in the .rela.plt section. */
1975 htab
->etab
.srelplt
->size
+= sizeof (Elf32_External_Rela
);
1976 htab
->need_plt_stub
= 1;
1979 if (eh
->got
.refcount
> 0)
1983 if (!ensure_undef_dynamic (info
, eh
))
1986 sec
= htab
->etab
.sgot
;
1987 eh
->got
.offset
= sec
->size
;
1988 need
= got_entries_needed (hh
->tls_type
);
1990 if (htab
->etab
.dynamic_sections_created
1991 && (bfd_link_dll (info
)
1992 || (bfd_link_pic (info
) && (hh
->tls_type
& GOT_NORMAL
) != 0)
1993 || (eh
->dynindx
!= -1
1994 && !SYMBOL_REFERENCES_LOCAL (info
, eh
)))
1995 && !UNDEFWEAK_NO_DYNAMIC_RELOC (info
, eh
))
1997 bfd_boolean local
= SYMBOL_REFERENCES_LOCAL (info
, eh
);
1998 htab
->etab
.srelgot
->size
1999 += got_relocs_needed (hh
->tls_type
, need
, local
,
2000 local
&& bfd_link_executable (info
));
2004 eh
->got
.offset
= (bfd_vma
) -1;
2006 /* If no dynamic sections we can't have dynamic relocs. */
2007 if (!htab
->etab
.dynamic_sections_created
)
2008 eh
->dyn_relocs
= NULL
;
2010 /* Discard relocs on undefined syms with non-default visibility. */
2011 else if ((eh
->root
.type
== bfd_link_hash_undefined
2012 && ELF_ST_VISIBILITY (eh
->other
) != STV_DEFAULT
)
2013 || UNDEFWEAK_NO_DYNAMIC_RELOC (info
, eh
))
2014 eh
->dyn_relocs
= NULL
;
2016 if (eh
->dyn_relocs
== NULL
)
2019 /* If this is a -Bsymbolic shared link, then we need to discard all
2020 space allocated for dynamic pc-relative relocs against symbols
2021 defined in a regular object. For the normal shared case, discard
2022 space for relocs that have become local due to symbol visibility
2024 if (bfd_link_pic (info
))
2026 #if RELATIVE_DYNRELOCS
2027 if (SYMBOL_CALLS_LOCAL (info
, eh
))
2029 struct elf_dyn_relocs
**hdh_pp
;
2031 for (hdh_pp
= &eh
->dyn_relocs
; (hdh_p
= *hdh_pp
) != NULL
; )
2033 hdh_p
->count
-= hdh_p
->pc_count
;
2034 hdh_p
->pc_count
= 0;
2035 if (hdh_p
->count
== 0)
2036 *hdh_pp
= hdh_p
->next
;
2038 hdh_pp
= &hdh_p
->next
;
2043 if (eh
->dyn_relocs
!= NULL
)
2045 if (!ensure_undef_dynamic (info
, eh
))
2049 else if (ELIMINATE_COPY_RELOCS
)
2051 /* For the non-shared case, discard space for relocs against
2052 symbols which turn out to need copy relocs or are not
2055 if (eh
->dynamic_adjusted
2057 && !ELF_COMMON_DEF_P (eh
))
2059 if (!ensure_undef_dynamic (info
, eh
))
2062 if (eh
->dynindx
== -1)
2063 eh
->dyn_relocs
= NULL
;
2066 eh
->dyn_relocs
= NULL
;
2069 /* Finally, allocate space. */
2070 for (hdh_p
= eh
->dyn_relocs
; hdh_p
!= NULL
; hdh_p
= hdh_p
->next
)
2072 asection
*sreloc
= elf_section_data (hdh_p
->sec
)->sreloc
;
2073 sreloc
->size
+= hdh_p
->count
* sizeof (Elf32_External_Rela
);
2079 /* This function is called via elf_link_hash_traverse to force
2080 millicode symbols local so they do not end up as globals in the
2081 dynamic symbol table. We ought to be able to do this in
2082 adjust_dynamic_symbol, but our adjust_dynamic_symbol is not called
2083 for all dynamic symbols. Arguably, this is a bug in
2084 elf_adjust_dynamic_symbol. */
2087 clobber_millicode_symbols (struct elf_link_hash_entry
*eh
,
2088 struct bfd_link_info
*info
)
2090 if (eh
->type
== STT_PARISC_MILLI
2091 && !eh
->forced_local
)
2093 elf32_hppa_hide_symbol (info
, eh
, TRUE
);
2098 /* Set DF_TEXTREL if we find any dynamic relocs that apply to
2099 read-only sections. */
2102 maybe_set_textrel (struct elf_link_hash_entry
*eh
, void *inf
)
2106 if (eh
->root
.type
== bfd_link_hash_indirect
)
2109 sec
= readonly_dynrelocs (eh
);
2112 struct bfd_link_info
*info
= (struct bfd_link_info
*) inf
;
2114 info
->flags
|= DF_TEXTREL
;
2115 info
->callbacks
->minfo
2116 (_("%pB: dynamic relocation against `%pT' in read-only section `%pA'\n"),
2117 sec
->owner
, eh
->root
.root
.string
, sec
);
2119 /* Not an error, just cut short the traversal. */
2125 /* Set the sizes of the dynamic sections. */
2128 elf32_hppa_size_dynamic_sections (bfd
*output_bfd ATTRIBUTE_UNUSED
,
2129 struct bfd_link_info
*info
)
2131 struct elf32_hppa_link_hash_table
*htab
;
2137 htab
= hppa_link_hash_table (info
);
2141 dynobj
= htab
->etab
.dynobj
;
2145 if (htab
->etab
.dynamic_sections_created
)
2147 /* Set the contents of the .interp section to the interpreter. */
2148 if (bfd_link_executable (info
) && !info
->nointerp
)
2150 sec
= bfd_get_linker_section (dynobj
, ".interp");
2153 sec
->size
= sizeof ELF_DYNAMIC_INTERPRETER
;
2154 sec
->contents
= (unsigned char *) ELF_DYNAMIC_INTERPRETER
;
2157 /* Force millicode symbols local. */
2158 elf_link_hash_traverse (&htab
->etab
,
2159 clobber_millicode_symbols
,
2163 /* Set up .got and .plt offsets for local syms, and space for local
2165 for (ibfd
= info
->input_bfds
; ibfd
!= NULL
; ibfd
= ibfd
->link
.next
)
2167 bfd_signed_vma
*local_got
;
2168 bfd_signed_vma
*end_local_got
;
2169 bfd_signed_vma
*local_plt
;
2170 bfd_signed_vma
*end_local_plt
;
2171 bfd_size_type locsymcount
;
2172 Elf_Internal_Shdr
*symtab_hdr
;
2174 char *local_tls_type
;
2176 if (bfd_get_flavour (ibfd
) != bfd_target_elf_flavour
)
2179 for (sec
= ibfd
->sections
; sec
!= NULL
; sec
= sec
->next
)
2181 struct elf_dyn_relocs
*hdh_p
;
2183 for (hdh_p
= ((struct elf_dyn_relocs
*)
2184 elf_section_data (sec
)->local_dynrel
);
2186 hdh_p
= hdh_p
->next
)
2188 if (!bfd_is_abs_section (hdh_p
->sec
)
2189 && bfd_is_abs_section (hdh_p
->sec
->output_section
))
2191 /* Input section has been discarded, either because
2192 it is a copy of a linkonce section or due to
2193 linker script /DISCARD/, so we'll be discarding
2196 else if (hdh_p
->count
!= 0)
2198 srel
= elf_section_data (hdh_p
->sec
)->sreloc
;
2199 srel
->size
+= hdh_p
->count
* sizeof (Elf32_External_Rela
);
2200 if ((hdh_p
->sec
->output_section
->flags
& SEC_READONLY
) != 0)
2201 info
->flags
|= DF_TEXTREL
;
2206 local_got
= elf_local_got_refcounts (ibfd
);
2210 symtab_hdr
= &elf_tdata (ibfd
)->symtab_hdr
;
2211 locsymcount
= symtab_hdr
->sh_info
;
2212 end_local_got
= local_got
+ locsymcount
;
2213 local_tls_type
= hppa_elf_local_got_tls_type (ibfd
);
2214 sec
= htab
->etab
.sgot
;
2215 srel
= htab
->etab
.srelgot
;
2216 for (; local_got
< end_local_got
; ++local_got
)
2222 *local_got
= sec
->size
;
2223 need
= got_entries_needed (*local_tls_type
);
2225 if (bfd_link_dll (info
)
2226 || (bfd_link_pic (info
)
2227 && (*local_tls_type
& GOT_NORMAL
) != 0))
2228 htab
->etab
.srelgot
->size
2229 += got_relocs_needed (*local_tls_type
, need
, TRUE
,
2230 bfd_link_executable (info
));
2233 *local_got
= (bfd_vma
) -1;
2238 local_plt
= end_local_got
;
2239 end_local_plt
= local_plt
+ locsymcount
;
2240 if (! htab
->etab
.dynamic_sections_created
)
2242 /* Won't be used, but be safe. */
2243 for (; local_plt
< end_local_plt
; ++local_plt
)
2244 *local_plt
= (bfd_vma
) -1;
2248 sec
= htab
->etab
.splt
;
2249 srel
= htab
->etab
.srelplt
;
2250 for (; local_plt
< end_local_plt
; ++local_plt
)
2254 *local_plt
= sec
->size
;
2255 sec
->size
+= PLT_ENTRY_SIZE
;
2256 if (bfd_link_pic (info
))
2257 srel
->size
+= sizeof (Elf32_External_Rela
);
2260 *local_plt
= (bfd_vma
) -1;
2265 if (htab
->tls_ldm_got
.refcount
> 0)
2267 /* Allocate 2 got entries and 1 dynamic reloc for
2268 R_PARISC_TLS_DTPMOD32 relocs. */
2269 htab
->tls_ldm_got
.offset
= htab
->etab
.sgot
->size
;
2270 htab
->etab
.sgot
->size
+= (GOT_ENTRY_SIZE
* 2);
2271 htab
->etab
.srelgot
->size
+= sizeof (Elf32_External_Rela
);
2274 htab
->tls_ldm_got
.offset
= -1;
2276 /* Do all the .plt entries without relocs first. The dynamic linker
2277 uses the last .plt reloc to find the end of the .plt (and hence
2278 the start of the .got) for lazy linking. */
2279 elf_link_hash_traverse (&htab
->etab
, allocate_plt_static
, info
);
2281 /* Allocate global sym .plt and .got entries, and space for global
2282 sym dynamic relocs. */
2283 elf_link_hash_traverse (&htab
->etab
, allocate_dynrelocs
, info
);
2285 /* The check_relocs and adjust_dynamic_symbol entry points have
2286 determined the sizes of the various dynamic sections. Allocate
2289 for (sec
= dynobj
->sections
; sec
!= NULL
; sec
= sec
->next
)
2291 if ((sec
->flags
& SEC_LINKER_CREATED
) == 0)
2294 if (sec
== htab
->etab
.splt
)
2296 if (htab
->need_plt_stub
)
2298 /* Make space for the plt stub at the end of the .plt
2299 section. We want this stub right at the end, up
2300 against the .got section. */
2301 int gotalign
= bfd_section_alignment (htab
->etab
.sgot
);
2302 int pltalign
= bfd_section_alignment (sec
);
2303 int align
= gotalign
> 3 ? gotalign
: 3;
2306 if (align
> pltalign
)
2307 bfd_set_section_alignment (sec
, align
);
2308 mask
= ((bfd_size_type
) 1 << gotalign
) - 1;
2309 sec
->size
= (sec
->size
+ sizeof (plt_stub
) + mask
) & ~mask
;
2312 else if (sec
== htab
->etab
.sgot
2313 || sec
== htab
->etab
.sdynbss
2314 || sec
== htab
->etab
.sdynrelro
)
2316 else if (CONST_STRNEQ (bfd_section_name (sec
), ".rela"))
2320 /* Remember whether there are any reloc sections other
2322 if (sec
!= htab
->etab
.srelplt
)
2325 /* We use the reloc_count field as a counter if we need
2326 to copy relocs into the output file. */
2327 sec
->reloc_count
= 0;
2332 /* It's not one of our sections, so don't allocate space. */
2338 /* If we don't need this section, strip it from the
2339 output file. This is mostly to handle .rela.bss and
2340 .rela.plt. We must create both sections in
2341 create_dynamic_sections, because they must be created
2342 before the linker maps input sections to output
2343 sections. The linker does that before
2344 adjust_dynamic_symbol is called, and it is that
2345 function which decides whether anything needs to go
2346 into these sections. */
2347 sec
->flags
|= SEC_EXCLUDE
;
2351 if ((sec
->flags
& SEC_HAS_CONTENTS
) == 0)
2354 /* Allocate memory for the section contents. Zero it, because
2355 we may not fill in all the reloc sections. */
2356 sec
->contents
= bfd_zalloc (dynobj
, sec
->size
);
2357 if (sec
->contents
== NULL
)
2361 if (htab
->etab
.dynamic_sections_created
)
2363 /* Like IA-64 and HPPA64, always create a DT_PLTGOT. It
2364 actually has nothing to do with the PLT, it is how we
2365 communicate the LTP value of a load module to the dynamic
2367 #define add_dynamic_entry(TAG, VAL) \
2368 _bfd_elf_add_dynamic_entry (info, TAG, VAL)
2370 if (!add_dynamic_entry (DT_PLTGOT
, 0))
2373 /* Add some entries to the .dynamic section. We fill in the
2374 values later, in elf32_hppa_finish_dynamic_sections, but we
2375 must add the entries now so that we get the correct size for
2376 the .dynamic section. The DT_DEBUG entry is filled in by the
2377 dynamic linker and used by the debugger. */
2378 if (bfd_link_executable (info
))
2380 if (!add_dynamic_entry (DT_DEBUG
, 0))
2384 if (htab
->etab
.srelplt
->size
!= 0)
2386 if (!add_dynamic_entry (DT_PLTRELSZ
, 0)
2387 || !add_dynamic_entry (DT_PLTREL
, DT_RELA
)
2388 || !add_dynamic_entry (DT_JMPREL
, 0))
2394 if (!add_dynamic_entry (DT_RELA
, 0)
2395 || !add_dynamic_entry (DT_RELASZ
, 0)
2396 || !add_dynamic_entry (DT_RELAENT
, sizeof (Elf32_External_Rela
)))
2399 /* If any dynamic relocs apply to a read-only section,
2400 then we need a DT_TEXTREL entry. */
2401 if ((info
->flags
& DF_TEXTREL
) == 0)
2402 elf_link_hash_traverse (&htab
->etab
, maybe_set_textrel
, info
);
2404 if ((info
->flags
& DF_TEXTREL
) != 0)
2406 if (!add_dynamic_entry (DT_TEXTREL
, 0))
2411 #undef add_dynamic_entry
2416 /* External entry points for sizing and building linker stubs. */
2418 /* Set up various things so that we can make a list of input sections
2419 for each output section included in the link. Returns -1 on error,
2420 0 when no stubs will be needed, and 1 on success. */
2423 elf32_hppa_setup_section_lists (bfd
*output_bfd
, struct bfd_link_info
*info
)
2426 unsigned int bfd_count
;
2427 unsigned int top_id
, top_index
;
2429 asection
**input_list
, **list
;
2431 struct elf32_hppa_link_hash_table
*htab
= hppa_link_hash_table (info
);
2436 /* Count the number of input BFDs and find the top input section id. */
2437 for (input_bfd
= info
->input_bfds
, bfd_count
= 0, top_id
= 0;
2439 input_bfd
= input_bfd
->link
.next
)
2442 for (section
= input_bfd
->sections
;
2444 section
= section
->next
)
2446 if (top_id
< section
->id
)
2447 top_id
= section
->id
;
2450 htab
->bfd_count
= bfd_count
;
2452 amt
= sizeof (struct map_stub
) * (top_id
+ 1);
2453 htab
->stub_group
= bfd_zmalloc (amt
);
2454 if (htab
->stub_group
== NULL
)
2457 /* We can't use output_bfd->section_count here to find the top output
2458 section index as some sections may have been removed, and
2459 strip_excluded_output_sections doesn't renumber the indices. */
2460 for (section
= output_bfd
->sections
, top_index
= 0;
2462 section
= section
->next
)
2464 if (top_index
< section
->index
)
2465 top_index
= section
->index
;
2468 htab
->top_index
= top_index
;
2469 amt
= sizeof (asection
*) * (top_index
+ 1);
2470 input_list
= bfd_malloc (amt
);
2471 htab
->input_list
= input_list
;
2472 if (input_list
== NULL
)
2475 /* For sections we aren't interested in, mark their entries with a
2476 value we can check later. */
2477 list
= input_list
+ top_index
;
2479 *list
= bfd_abs_section_ptr
;
2480 while (list
-- != input_list
);
2482 for (section
= output_bfd
->sections
;
2484 section
= section
->next
)
2486 if ((section
->flags
& SEC_CODE
) != 0)
2487 input_list
[section
->index
] = NULL
;
2493 /* The linker repeatedly calls this function for each input section,
2494 in the order that input sections are linked into output sections.
2495 Build lists of input sections to determine groupings between which
2496 we may insert linker stubs. */
2499 elf32_hppa_next_input_section (struct bfd_link_info
*info
, asection
*isec
)
2501 struct elf32_hppa_link_hash_table
*htab
= hppa_link_hash_table (info
);
2506 if (isec
->output_section
->index
<= htab
->top_index
)
2508 asection
**list
= htab
->input_list
+ isec
->output_section
->index
;
2509 if (*list
!= bfd_abs_section_ptr
)
2511 /* Steal the link_sec pointer for our list. */
2512 #define PREV_SEC(sec) (htab->stub_group[(sec)->id].link_sec)
2513 /* This happens to make the list in reverse order,
2514 which is what we want. */
2515 PREV_SEC (isec
) = *list
;
2521 /* See whether we can group stub sections together. Grouping stub
2522 sections may result in fewer stubs. More importantly, we need to
2523 put all .init* and .fini* stubs at the beginning of the .init or
2524 .fini output sections respectively, because glibc splits the
2525 _init and _fini functions into multiple parts. Putting a stub in
2526 the middle of a function is not a good idea. */
2529 group_sections (struct elf32_hppa_link_hash_table
*htab
,
2530 bfd_size_type stub_group_size
,
2531 bfd_boolean stubs_always_before_branch
)
2533 asection
**list
= htab
->input_list
+ htab
->top_index
;
2536 asection
*tail
= *list
;
2537 if (tail
== bfd_abs_section_ptr
)
2539 while (tail
!= NULL
)
2543 bfd_size_type total
;
2544 bfd_boolean big_sec
;
2548 big_sec
= total
>= stub_group_size
;
2550 while ((prev
= PREV_SEC (curr
)) != NULL
2551 && ((total
+= curr
->output_offset
- prev
->output_offset
)
2555 /* OK, the size from the start of CURR to the end is less
2556 than 240000 bytes and thus can be handled by one stub
2557 section. (or the tail section is itself larger than
2558 240000 bytes, in which case we may be toast.)
2559 We should really be keeping track of the total size of
2560 stubs added here, as stubs contribute to the final output
2561 section size. That's a little tricky, and this way will
2562 only break if stubs added total more than 22144 bytes, or
2563 2768 long branch stubs. It seems unlikely for more than
2564 2768 different functions to be called, especially from
2565 code only 240000 bytes long. This limit used to be
2566 250000, but c++ code tends to generate lots of little
2567 functions, and sometimes violated the assumption. */
2570 prev
= PREV_SEC (tail
);
2571 /* Set up this stub group. */
2572 htab
->stub_group
[tail
->id
].link_sec
= curr
;
2574 while (tail
!= curr
&& (tail
= prev
) != NULL
);
2576 /* But wait, there's more! Input sections up to 240000
2577 bytes before the stub section can be handled by it too.
2578 Don't do this if we have a really large section after the
2579 stubs, as adding more stubs increases the chance that
2580 branches may not reach into the stub section. */
2581 if (!stubs_always_before_branch
&& !big_sec
)
2585 && ((total
+= tail
->output_offset
- prev
->output_offset
)
2589 prev
= PREV_SEC (tail
);
2590 htab
->stub_group
[tail
->id
].link_sec
= curr
;
2596 while (list
-- != htab
->input_list
);
2597 free (htab
->input_list
);
2601 /* Read in all local syms for all input bfds, and create hash entries
2602 for export stubs if we are building a multi-subspace shared lib.
2603 Returns -1 on error, 1 if export stubs created, 0 otherwise. */
2606 get_local_syms (bfd
*output_bfd
, bfd
*input_bfd
, struct bfd_link_info
*info
)
2608 unsigned int bfd_indx
;
2609 Elf_Internal_Sym
*local_syms
, **all_local_syms
;
2610 int stub_changed
= 0;
2611 struct elf32_hppa_link_hash_table
*htab
= hppa_link_hash_table (info
);
2616 /* We want to read in symbol extension records only once. To do this
2617 we need to read in the local symbols in parallel and save them for
2618 later use; so hold pointers to the local symbols in an array. */
2619 size_t amt
= sizeof (Elf_Internal_Sym
*) * htab
->bfd_count
;
2620 all_local_syms
= bfd_zmalloc (amt
);
2621 htab
->all_local_syms
= all_local_syms
;
2622 if (all_local_syms
== NULL
)
2625 /* Walk over all the input BFDs, swapping in local symbols.
2626 If we are creating a shared library, create hash entries for the
2630 input_bfd
= input_bfd
->link
.next
, bfd_indx
++)
2632 Elf_Internal_Shdr
*symtab_hdr
;
2634 /* We'll need the symbol table in a second. */
2635 symtab_hdr
= &elf_tdata (input_bfd
)->symtab_hdr
;
2636 if (symtab_hdr
->sh_info
== 0)
2639 /* We need an array of the local symbols attached to the input bfd. */
2640 local_syms
= (Elf_Internal_Sym
*) symtab_hdr
->contents
;
2641 if (local_syms
== NULL
)
2643 local_syms
= bfd_elf_get_elf_syms (input_bfd
, symtab_hdr
,
2644 symtab_hdr
->sh_info
, 0,
2646 /* Cache them for elf_link_input_bfd. */
2647 symtab_hdr
->contents
= (unsigned char *) local_syms
;
2649 if (local_syms
== NULL
)
2652 all_local_syms
[bfd_indx
] = local_syms
;
2654 if (bfd_link_pic (info
) && htab
->multi_subspace
)
2656 struct elf_link_hash_entry
**eh_syms
;
2657 struct elf_link_hash_entry
**eh_symend
;
2658 unsigned int symcount
;
2660 symcount
= (symtab_hdr
->sh_size
/ sizeof (Elf32_External_Sym
)
2661 - symtab_hdr
->sh_info
);
2662 eh_syms
= (struct elf_link_hash_entry
**) elf_sym_hashes (input_bfd
);
2663 eh_symend
= (struct elf_link_hash_entry
**) (eh_syms
+ symcount
);
2665 /* Look through the global syms for functions; We need to
2666 build export stubs for all globally visible functions. */
2667 for (; eh_syms
< eh_symend
; eh_syms
++)
2669 struct elf32_hppa_link_hash_entry
*hh
;
2671 hh
= hppa_elf_hash_entry (*eh_syms
);
2673 while (hh
->eh
.root
.type
== bfd_link_hash_indirect
2674 || hh
->eh
.root
.type
== bfd_link_hash_warning
)
2675 hh
= hppa_elf_hash_entry (hh
->eh
.root
.u
.i
.link
);
2677 /* At this point in the link, undefined syms have been
2678 resolved, so we need to check that the symbol was
2679 defined in this BFD. */
2680 if ((hh
->eh
.root
.type
== bfd_link_hash_defined
2681 || hh
->eh
.root
.type
== bfd_link_hash_defweak
)
2682 && hh
->eh
.type
== STT_FUNC
2683 && hh
->eh
.root
.u
.def
.section
->output_section
!= NULL
2684 && (hh
->eh
.root
.u
.def
.section
->output_section
->owner
2686 && hh
->eh
.root
.u
.def
.section
->owner
== input_bfd
2687 && hh
->eh
.def_regular
2688 && !hh
->eh
.forced_local
2689 && ELF_ST_VISIBILITY (hh
->eh
.other
) == STV_DEFAULT
)
2692 const char *stub_name
;
2693 struct elf32_hppa_stub_hash_entry
*hsh
;
2695 sec
= hh
->eh
.root
.u
.def
.section
;
2696 stub_name
= hh_name (hh
);
2697 hsh
= hppa_stub_hash_lookup (&htab
->bstab
,
2702 hsh
= hppa_add_stub (stub_name
, sec
, htab
);
2706 hsh
->target_value
= hh
->eh
.root
.u
.def
.value
;
2707 hsh
->target_section
= hh
->eh
.root
.u
.def
.section
;
2708 hsh
->stub_type
= hppa_stub_export
;
2714 /* xgettext:c-format */
2715 _bfd_error_handler (_("%pB: duplicate export stub %s"),
2716 input_bfd
, stub_name
);
2723 return stub_changed
;
2726 /* Determine and set the size of the stub section for a final link.
2728 The basic idea here is to examine all the relocations looking for
2729 PC-relative calls to a target that is unreachable with a "bl"
2733 elf32_hppa_size_stubs
2734 (bfd
*output_bfd
, bfd
*stub_bfd
, struct bfd_link_info
*info
,
2735 bfd_boolean multi_subspace
, bfd_signed_vma group_size
,
2736 asection
* (*add_stub_section
) (const char *, asection
*),
2737 void (*layout_sections_again
) (void))
2739 bfd_size_type stub_group_size
;
2740 bfd_boolean stubs_always_before_branch
;
2741 bfd_boolean stub_changed
;
2742 struct elf32_hppa_link_hash_table
*htab
= hppa_link_hash_table (info
);
2747 /* Stash our params away. */
2748 htab
->stub_bfd
= stub_bfd
;
2749 htab
->multi_subspace
= multi_subspace
;
2750 htab
->add_stub_section
= add_stub_section
;
2751 htab
->layout_sections_again
= layout_sections_again
;
2752 stubs_always_before_branch
= group_size
< 0;
2754 stub_group_size
= -group_size
;
2756 stub_group_size
= group_size
;
2757 if (stub_group_size
== 1)
2759 /* Default values. */
2760 if (stubs_always_before_branch
)
2762 stub_group_size
= 7680000;
2763 if (htab
->has_17bit_branch
|| htab
->multi_subspace
)
2764 stub_group_size
= 240000;
2765 if (htab
->has_12bit_branch
)
2766 stub_group_size
= 7500;
2770 stub_group_size
= 6971392;
2771 if (htab
->has_17bit_branch
|| htab
->multi_subspace
)
2772 stub_group_size
= 217856;
2773 if (htab
->has_12bit_branch
)
2774 stub_group_size
= 6808;
2778 group_sections (htab
, stub_group_size
, stubs_always_before_branch
);
2780 switch (get_local_syms (output_bfd
, info
->input_bfds
, info
))
2783 if (htab
->all_local_syms
)
2784 goto error_ret_free_local
;
2788 stub_changed
= FALSE
;
2792 stub_changed
= TRUE
;
2799 unsigned int bfd_indx
;
2802 for (input_bfd
= info
->input_bfds
, bfd_indx
= 0;
2804 input_bfd
= input_bfd
->link
.next
, bfd_indx
++)
2806 Elf_Internal_Shdr
*symtab_hdr
;
2808 Elf_Internal_Sym
*local_syms
;
2810 /* We'll need the symbol table in a second. */
2811 symtab_hdr
= &elf_tdata (input_bfd
)->symtab_hdr
;
2812 if (symtab_hdr
->sh_info
== 0)
2815 local_syms
= htab
->all_local_syms
[bfd_indx
];
2817 /* Walk over each section attached to the input bfd. */
2818 for (section
= input_bfd
->sections
;
2820 section
= section
->next
)
2822 Elf_Internal_Rela
*internal_relocs
, *irelaend
, *irela
;
2824 /* If there aren't any relocs, then there's nothing more
2826 if ((section
->flags
& SEC_RELOC
) == 0
2827 || (section
->flags
& SEC_ALLOC
) == 0
2828 || (section
->flags
& SEC_LOAD
) == 0
2829 || (section
->flags
& SEC_CODE
) == 0
2830 || section
->reloc_count
== 0)
2833 /* If this section is a link-once section that will be
2834 discarded, then don't create any stubs. */
2835 if (section
->output_section
== NULL
2836 || section
->output_section
->owner
!= output_bfd
)
2839 /* Get the relocs. */
2841 = _bfd_elf_link_read_relocs (input_bfd
, section
, NULL
, NULL
,
2843 if (internal_relocs
== NULL
)
2844 goto error_ret_free_local
;
2846 /* Now examine each relocation. */
2847 irela
= internal_relocs
;
2848 irelaend
= irela
+ section
->reloc_count
;
2849 for (; irela
< irelaend
; irela
++)
2851 unsigned int r_type
, r_indx
;
2852 enum elf32_hppa_stub_type stub_type
;
2853 struct elf32_hppa_stub_hash_entry
*hsh
;
2856 bfd_vma destination
;
2857 struct elf32_hppa_link_hash_entry
*hh
;
2859 const asection
*id_sec
;
2861 r_type
= ELF32_R_TYPE (irela
->r_info
);
2862 r_indx
= ELF32_R_SYM (irela
->r_info
);
2864 if (r_type
>= (unsigned int) R_PARISC_UNIMPLEMENTED
)
2866 bfd_set_error (bfd_error_bad_value
);
2867 error_ret_free_internal
:
2868 if (elf_section_data (section
)->relocs
== NULL
)
2869 free (internal_relocs
);
2870 goto error_ret_free_local
;
2873 /* Only look for stubs on call instructions. */
2874 if (r_type
!= (unsigned int) R_PARISC_PCREL12F
2875 && r_type
!= (unsigned int) R_PARISC_PCREL17F
2876 && r_type
!= (unsigned int) R_PARISC_PCREL22F
)
2879 /* Now determine the call target, its name, value,
2885 if (r_indx
< symtab_hdr
->sh_info
)
2887 /* It's a local symbol. */
2888 Elf_Internal_Sym
*sym
;
2889 Elf_Internal_Shdr
*hdr
;
2892 sym
= local_syms
+ r_indx
;
2893 if (ELF_ST_TYPE (sym
->st_info
) != STT_SECTION
)
2894 sym_value
= sym
->st_value
;
2895 shndx
= sym
->st_shndx
;
2896 if (shndx
< elf_numsections (input_bfd
))
2898 hdr
= elf_elfsections (input_bfd
)[shndx
];
2899 sym_sec
= hdr
->bfd_section
;
2900 destination
= (sym_value
+ irela
->r_addend
2901 + sym_sec
->output_offset
2902 + sym_sec
->output_section
->vma
);
2907 /* It's an external symbol. */
2910 e_indx
= r_indx
- symtab_hdr
->sh_info
;
2911 hh
= hppa_elf_hash_entry (elf_sym_hashes (input_bfd
)[e_indx
]);
2913 while (hh
->eh
.root
.type
== bfd_link_hash_indirect
2914 || hh
->eh
.root
.type
== bfd_link_hash_warning
)
2915 hh
= hppa_elf_hash_entry (hh
->eh
.root
.u
.i
.link
);
2917 if (hh
->eh
.root
.type
== bfd_link_hash_defined
2918 || hh
->eh
.root
.type
== bfd_link_hash_defweak
)
2920 sym_sec
= hh
->eh
.root
.u
.def
.section
;
2921 sym_value
= hh
->eh
.root
.u
.def
.value
;
2922 if (sym_sec
->output_section
!= NULL
)
2923 destination
= (sym_value
+ irela
->r_addend
2924 + sym_sec
->output_offset
2925 + sym_sec
->output_section
->vma
);
2927 else if (hh
->eh
.root
.type
== bfd_link_hash_undefweak
)
2929 if (! bfd_link_pic (info
))
2932 else if (hh
->eh
.root
.type
== bfd_link_hash_undefined
)
2934 if (! (info
->unresolved_syms_in_objects
== RM_IGNORE
2935 && (ELF_ST_VISIBILITY (hh
->eh
.other
)
2937 && hh
->eh
.type
!= STT_PARISC_MILLI
))
2942 bfd_set_error (bfd_error_bad_value
);
2943 goto error_ret_free_internal
;
2947 /* Determine what (if any) linker stub is needed. */
2948 stub_type
= hppa_type_of_stub (section
, irela
, hh
,
2950 if (stub_type
== hppa_stub_none
)
2953 /* Support for grouping stub sections. */
2954 id_sec
= htab
->stub_group
[section
->id
].link_sec
;
2956 /* Get the name of this stub. */
2957 stub_name
= hppa_stub_name (id_sec
, sym_sec
, hh
, irela
);
2959 goto error_ret_free_internal
;
2961 hsh
= hppa_stub_hash_lookup (&htab
->bstab
,
2966 /* The proper stub has already been created. */
2971 hsh
= hppa_add_stub (stub_name
, section
, htab
);
2975 goto error_ret_free_internal
;
2978 hsh
->target_value
= sym_value
;
2979 hsh
->target_section
= sym_sec
;
2980 hsh
->stub_type
= stub_type
;
2981 if (bfd_link_pic (info
))
2983 if (stub_type
== hppa_stub_import
)
2984 hsh
->stub_type
= hppa_stub_import_shared
;
2985 else if (stub_type
== hppa_stub_long_branch
)
2986 hsh
->stub_type
= hppa_stub_long_branch_shared
;
2989 stub_changed
= TRUE
;
2992 /* We're done with the internal relocs, free them. */
2993 if (elf_section_data (section
)->relocs
== NULL
)
2994 free (internal_relocs
);
3001 /* OK, we've added some stubs. Find out the new size of the
3003 for (stub_sec
= htab
->stub_bfd
->sections
;
3005 stub_sec
= stub_sec
->next
)
3006 if ((stub_sec
->flags
& SEC_LINKER_CREATED
) == 0)
3009 bfd_hash_traverse (&htab
->bstab
, hppa_size_one_stub
, htab
);
3011 /* Ask the linker to do its stuff. */
3012 (*htab
->layout_sections_again
) ();
3013 stub_changed
= FALSE
;
3016 free (htab
->all_local_syms
);
3019 error_ret_free_local
:
3020 free (htab
->all_local_syms
);
3024 /* For a final link, this function is called after we have sized the
3025 stubs to provide a value for __gp. */
3028 elf32_hppa_set_gp (bfd
*abfd
, struct bfd_link_info
*info
)
3030 struct bfd_link_hash_entry
*h
;
3031 asection
*sec
= NULL
;
3034 h
= bfd_link_hash_lookup (info
->hash
, "$global$", FALSE
, FALSE
, FALSE
);
3037 && (h
->type
== bfd_link_hash_defined
3038 || h
->type
== bfd_link_hash_defweak
))
3040 gp_val
= h
->u
.def
.value
;
3041 sec
= h
->u
.def
.section
;
3045 asection
*splt
= bfd_get_section_by_name (abfd
, ".plt");
3046 asection
*sgot
= bfd_get_section_by_name (abfd
, ".got");
3048 /* Choose to point our LTP at, in this order, one of .plt, .got,
3049 or .data, if these sections exist. In the case of choosing
3050 .plt try to make the LTP ideal for addressing anywhere in the
3051 .plt or .got with a 14 bit signed offset. Typically, the end
3052 of the .plt is the start of the .got, so choose .plt + 0x2000
3053 if either the .plt or .got is larger than 0x2000. If both
3054 the .plt and .got are smaller than 0x2000, choose the end of
3055 the .plt section. */
3056 sec
= strcmp (bfd_get_target (abfd
), "elf32-hppa-netbsd") == 0
3061 if (gp_val
> 0x2000 || (sgot
&& sgot
->size
> 0x2000))
3071 if (strcmp (bfd_get_target (abfd
), "elf32-hppa-netbsd") != 0)
3073 /* We know we don't have a .plt. If .got is large,
3075 if (sec
->size
> 0x2000)
3081 /* No .plt or .got. Who cares what the LTP is? */
3082 sec
= bfd_get_section_by_name (abfd
, ".data");
3088 h
->type
= bfd_link_hash_defined
;
3089 h
->u
.def
.value
= gp_val
;
3091 h
->u
.def
.section
= sec
;
3093 h
->u
.def
.section
= bfd_abs_section_ptr
;
3097 if (bfd_get_flavour (abfd
) == bfd_target_elf_flavour
)
3099 if (sec
!= NULL
&& sec
->output_section
!= NULL
)
3100 gp_val
+= sec
->output_section
->vma
+ sec
->output_offset
;
3102 elf_gp (abfd
) = gp_val
;
3107 /* Build all the stubs associated with the current output file. The
3108 stubs are kept in a hash table attached to the main linker hash
3109 table. We also set up the .plt entries for statically linked PIC
3110 functions here. This function is called via hppaelf_finish in the
3114 elf32_hppa_build_stubs (struct bfd_link_info
*info
)
3117 struct bfd_hash_table
*table
;
3118 struct elf32_hppa_link_hash_table
*htab
;
3120 htab
= hppa_link_hash_table (info
);
3124 for (stub_sec
= htab
->stub_bfd
->sections
;
3126 stub_sec
= stub_sec
->next
)
3127 if ((stub_sec
->flags
& SEC_LINKER_CREATED
) == 0
3128 && stub_sec
->size
!= 0)
3130 /* Allocate memory to hold the linker stubs. */
3131 stub_sec
->contents
= bfd_zalloc (htab
->stub_bfd
, stub_sec
->size
);
3132 if (stub_sec
->contents
== NULL
)
3137 /* Build the stubs as directed by the stub hash table. */
3138 table
= &htab
->bstab
;
3139 bfd_hash_traverse (table
, hppa_build_one_stub
, info
);
3144 /* Return the base vma address which should be subtracted from the real
3145 address when resolving a dtpoff relocation.
3146 This is PT_TLS segment p_vaddr. */
3149 dtpoff_base (struct bfd_link_info
*info
)
3151 /* If tls_sec is NULL, we should have signalled an error already. */
3152 if (elf_hash_table (info
)->tls_sec
== NULL
)
3154 return elf_hash_table (info
)->tls_sec
->vma
;
3157 /* Return the relocation value for R_PARISC_TLS_TPOFF*.. */
3160 tpoff (struct bfd_link_info
*info
, bfd_vma address
)
3162 struct elf_link_hash_table
*htab
= elf_hash_table (info
);
3164 /* If tls_sec is NULL, we should have signalled an error already. */
3165 if (htab
->tls_sec
== NULL
)
3167 /* hppa TLS ABI is variant I and static TLS block start just after
3168 tcbhead structure which has 2 pointer fields. */
3169 return (address
- htab
->tls_sec
->vma
3170 + align_power ((bfd_vma
) 8, htab
->tls_sec
->alignment_power
));
3173 /* Perform a final link. */
3176 elf32_hppa_final_link (bfd
*abfd
, struct bfd_link_info
*info
)
3180 /* Invoke the regular ELF linker to do all the work. */
3181 if (!bfd_elf_final_link (abfd
, info
))
3184 /* If we're producing a final executable, sort the contents of the
3186 if (bfd_link_relocatable (info
))
3189 /* Do not attempt to sort non-regular files. This is here
3190 especially for configure scripts and kernel builds which run
3191 tests with "ld [...] -o /dev/null". */
3192 if (stat (bfd_get_filename (abfd
), &buf
) != 0
3193 || !S_ISREG(buf
.st_mode
))
3196 return elf_hppa_sort_unwind (abfd
);
3199 /* Record the lowest address for the data and text segments. */
3202 hppa_record_segment_addr (bfd
*abfd
, asection
*section
, void *data
)
3204 struct elf32_hppa_link_hash_table
*htab
;
3206 htab
= (struct elf32_hppa_link_hash_table
*) data
;
3210 if ((section
->flags
& (SEC_ALLOC
| SEC_LOAD
)) == (SEC_ALLOC
| SEC_LOAD
))
3213 Elf_Internal_Phdr
*p
;
3215 p
= _bfd_elf_find_segment_containing_section (abfd
, section
->output_section
);
3216 BFD_ASSERT (p
!= NULL
);
3219 if ((section
->flags
& SEC_READONLY
) != 0)
3221 if (value
< htab
->text_segment_base
)
3222 htab
->text_segment_base
= value
;
3226 if (value
< htab
->data_segment_base
)
3227 htab
->data_segment_base
= value
;
3232 /* Perform a relocation as part of a final link. */
3234 static bfd_reloc_status_type
3235 final_link_relocate (asection
*input_section
,
3237 const Elf_Internal_Rela
*rela
,
3239 struct elf32_hppa_link_hash_table
*htab
,
3241 struct elf32_hppa_link_hash_entry
*hh
,
3242 struct bfd_link_info
*info
)
3245 unsigned int r_type
= ELF32_R_TYPE (rela
->r_info
);
3246 unsigned int orig_r_type
= r_type
;
3247 reloc_howto_type
*howto
= elf_hppa_howto_table
+ r_type
;
3248 int r_format
= howto
->bitsize
;
3249 enum hppa_reloc_field_selector_type_alt r_field
;
3250 bfd
*input_bfd
= input_section
->owner
;
3251 bfd_vma offset
= rela
->r_offset
;
3252 bfd_vma max_branch_offset
= 0;
3253 bfd_byte
*hit_data
= contents
+ offset
;
3254 bfd_signed_vma addend
= rela
->r_addend
;
3256 struct elf32_hppa_stub_hash_entry
*hsh
= NULL
;
3259 if (r_type
== R_PARISC_NONE
)
3260 return bfd_reloc_ok
;
3262 insn
= bfd_get_32 (input_bfd
, hit_data
);
3264 /* Find out where we are and where we're going. */
3265 location
= (offset
+
3266 input_section
->output_offset
+
3267 input_section
->output_section
->vma
);
3269 /* If we are not building a shared library, convert DLTIND relocs to
3271 if (!bfd_link_pic (info
))
3275 case R_PARISC_DLTIND21L
:
3276 case R_PARISC_TLS_GD21L
:
3277 case R_PARISC_TLS_LDM21L
:
3278 case R_PARISC_TLS_IE21L
:
3279 r_type
= R_PARISC_DPREL21L
;
3282 case R_PARISC_DLTIND14R
:
3283 case R_PARISC_TLS_GD14R
:
3284 case R_PARISC_TLS_LDM14R
:
3285 case R_PARISC_TLS_IE14R
:
3286 r_type
= R_PARISC_DPREL14R
;
3289 case R_PARISC_DLTIND14F
:
3290 r_type
= R_PARISC_DPREL14F
;
3297 case R_PARISC_PCREL12F
:
3298 case R_PARISC_PCREL17F
:
3299 case R_PARISC_PCREL22F
:
3300 /* If this call should go via the plt, find the import stub in
3303 || sym_sec
->output_section
== NULL
3305 && hh
->eh
.plt
.offset
!= (bfd_vma
) -1
3306 && hh
->eh
.dynindx
!= -1
3308 && (bfd_link_pic (info
)
3309 || !hh
->eh
.def_regular
3310 || hh
->eh
.root
.type
== bfd_link_hash_defweak
)))
3312 hsh
= hppa_get_stub_entry (input_section
, sym_sec
,
3316 value
= (hsh
->stub_offset
3317 + hsh
->stub_sec
->output_offset
3318 + hsh
->stub_sec
->output_section
->vma
);
3321 else if (sym_sec
== NULL
&& hh
!= NULL
3322 && hh
->eh
.root
.type
== bfd_link_hash_undefweak
)
3324 /* It's OK if undefined weak. Calls to undefined weak
3325 symbols behave as if the "called" function
3326 immediately returns. We can thus call to a weak
3327 function without first checking whether the function
3333 return bfd_reloc_undefined
;
3337 case R_PARISC_PCREL21L
:
3338 case R_PARISC_PCREL17C
:
3339 case R_PARISC_PCREL17R
:
3340 case R_PARISC_PCREL14R
:
3341 case R_PARISC_PCREL14F
:
3342 case R_PARISC_PCREL32
:
3343 /* Make it a pc relative offset. */
3348 case R_PARISC_DPREL21L
:
3349 case R_PARISC_DPREL14R
:
3350 case R_PARISC_DPREL14F
:
3351 /* Convert instructions that use the linkage table pointer (r19) to
3352 instructions that use the global data pointer (dp). This is the
3353 most efficient way of using PIC code in an incomplete executable,
3354 but the user must follow the standard runtime conventions for
3355 accessing data for this to work. */
3356 if (orig_r_type
!= r_type
)
3358 if (r_type
== R_PARISC_DPREL21L
)
3360 /* GCC sometimes uses a register other than r19 for the
3361 operation, so we must convert any addil instruction
3362 that uses this relocation. */
3363 if ((insn
& 0xfc000000) == OP_ADDIL
<< 26)
3366 /* We must have a ldil instruction. It's too hard to find
3367 and convert the associated add instruction, so issue an
3370 /* xgettext:c-format */
3371 (_("%pB(%pA+%#" PRIx64
"): %s fixup for insn %#x "
3372 "is not supported in a non-shared link"),
3379 else if (r_type
== R_PARISC_DPREL14F
)
3381 /* This must be a format 1 load/store. Change the base
3383 insn
= (insn
& 0xfc1ffff) | (27 << 21);
3387 /* For all the DP relative relocations, we need to examine the symbol's
3388 section. If it has no section or if it's a code section, then
3389 "data pointer relative" makes no sense. In that case we don't
3390 adjust the "value", and for 21 bit addil instructions, we change the
3391 source addend register from %dp to %r0. This situation commonly
3392 arises for undefined weak symbols and when a variable's "constness"
3393 is declared differently from the way the variable is defined. For
3394 instance: "extern int foo" with foo defined as "const int foo". */
3395 if (sym_sec
== NULL
|| (sym_sec
->flags
& SEC_CODE
) != 0)
3397 if ((insn
& ((0x3fu
<< 26) | (0x1f << 21)))
3398 == ((OP_ADDIL
<< 26) | (27 << 21)))
3400 insn
&= ~ (0x1f << 21);
3402 /* Now try to make things easy for the dynamic linker. */
3408 case R_PARISC_DLTIND21L
:
3409 case R_PARISC_DLTIND14R
:
3410 case R_PARISC_DLTIND14F
:
3411 case R_PARISC_TLS_GD21L
:
3412 case R_PARISC_TLS_LDM21L
:
3413 case R_PARISC_TLS_IE21L
:
3414 case R_PARISC_TLS_GD14R
:
3415 case R_PARISC_TLS_LDM14R
:
3416 case R_PARISC_TLS_IE14R
:
3417 value
-= elf_gp (input_section
->output_section
->owner
);
3420 case R_PARISC_SEGREL32
:
3421 if ((sym_sec
->flags
& SEC_CODE
) != 0)
3422 value
-= htab
->text_segment_base
;
3424 value
-= htab
->data_segment_base
;
3433 case R_PARISC_DIR32
:
3434 case R_PARISC_DIR14F
:
3435 case R_PARISC_DIR17F
:
3436 case R_PARISC_PCREL17C
:
3437 case R_PARISC_PCREL14F
:
3438 case R_PARISC_PCREL32
:
3439 case R_PARISC_DPREL14F
:
3440 case R_PARISC_PLABEL32
:
3441 case R_PARISC_DLTIND14F
:
3442 case R_PARISC_SEGBASE
:
3443 case R_PARISC_SEGREL32
:
3444 case R_PARISC_TLS_DTPMOD32
:
3445 case R_PARISC_TLS_DTPOFF32
:
3446 case R_PARISC_TLS_TPREL32
:
3450 case R_PARISC_DLTIND21L
:
3451 case R_PARISC_PCREL21L
:
3452 case R_PARISC_PLABEL21L
:
3456 case R_PARISC_DIR21L
:
3457 case R_PARISC_DPREL21L
:
3458 case R_PARISC_TLS_GD21L
:
3459 case R_PARISC_TLS_LDM21L
:
3460 case R_PARISC_TLS_LDO21L
:
3461 case R_PARISC_TLS_IE21L
:
3462 case R_PARISC_TLS_LE21L
:
3466 case R_PARISC_PCREL17R
:
3467 case R_PARISC_PCREL14R
:
3468 case R_PARISC_PLABEL14R
:
3469 case R_PARISC_DLTIND14R
:
3473 case R_PARISC_DIR17R
:
3474 case R_PARISC_DIR14R
:
3475 case R_PARISC_DPREL14R
:
3476 case R_PARISC_TLS_GD14R
:
3477 case R_PARISC_TLS_LDM14R
:
3478 case R_PARISC_TLS_LDO14R
:
3479 case R_PARISC_TLS_IE14R
:
3480 case R_PARISC_TLS_LE14R
:
3484 case R_PARISC_PCREL12F
:
3485 case R_PARISC_PCREL17F
:
3486 case R_PARISC_PCREL22F
:
3489 if (r_type
== (unsigned int) R_PARISC_PCREL17F
)
3491 max_branch_offset
= (1 << (17-1)) << 2;
3493 else if (r_type
== (unsigned int) R_PARISC_PCREL12F
)
3495 max_branch_offset
= (1 << (12-1)) << 2;
3499 max_branch_offset
= (1 << (22-1)) << 2;
3502 /* sym_sec is NULL on undefined weak syms or when shared on
3503 undefined syms. We've already checked for a stub for the
3504 shared undefined case. */
3505 if (sym_sec
== NULL
)
3508 /* If the branch is out of reach, then redirect the
3509 call to the local stub for this function. */
3510 if (value
+ addend
+ max_branch_offset
>= 2*max_branch_offset
)
3512 hsh
= hppa_get_stub_entry (input_section
, sym_sec
,
3515 return bfd_reloc_undefined
;
3517 /* Munge up the value and addend so that we call the stub
3518 rather than the procedure directly. */
3519 value
= (hsh
->stub_offset
3520 + hsh
->stub_sec
->output_offset
3521 + hsh
->stub_sec
->output_section
->vma
3527 /* Something we don't know how to handle. */
3529 return bfd_reloc_notsupported
;
3532 /* Make sure we can reach the stub. */
3533 if (max_branch_offset
!= 0
3534 && value
+ addend
+ max_branch_offset
>= 2*max_branch_offset
)
3537 /* xgettext:c-format */
3538 (_("%pB(%pA+%#" PRIx64
"): cannot reach %s, "
3539 "recompile with -ffunction-sections"),
3543 hsh
->bh_root
.string
);
3544 bfd_set_error (bfd_error_bad_value
);
3545 return bfd_reloc_notsupported
;
3548 val
= hppa_field_adjust (value
, addend
, r_field
);
3552 case R_PARISC_PCREL12F
:
3553 case R_PARISC_PCREL17C
:
3554 case R_PARISC_PCREL17F
:
3555 case R_PARISC_PCREL17R
:
3556 case R_PARISC_PCREL22F
:
3557 case R_PARISC_DIR17F
:
3558 case R_PARISC_DIR17R
:
3559 /* This is a branch. Divide the offset by four.
3560 Note that we need to decide whether it's a branch or
3561 otherwise by inspecting the reloc. Inspecting insn won't
3562 work as insn might be from a .word directive. */
3570 insn
= hppa_rebuild_insn (insn
, val
, r_format
);
3572 /* Update the instruction word. */
3573 bfd_put_32 (input_bfd
, (bfd_vma
) insn
, hit_data
);
3574 return bfd_reloc_ok
;
3577 /* Relocate an HPPA ELF section. */
3580 elf32_hppa_relocate_section (bfd
*output_bfd
,
3581 struct bfd_link_info
*info
,
3583 asection
*input_section
,
3585 Elf_Internal_Rela
*relocs
,
3586 Elf_Internal_Sym
*local_syms
,
3587 asection
**local_sections
)
3589 bfd_vma
*local_got_offsets
;
3590 struct elf32_hppa_link_hash_table
*htab
;
3591 Elf_Internal_Shdr
*symtab_hdr
;
3592 Elf_Internal_Rela
*rela
;
3593 Elf_Internal_Rela
*relend
;
3595 symtab_hdr
= &elf_tdata (input_bfd
)->symtab_hdr
;
3597 htab
= hppa_link_hash_table (info
);
3601 local_got_offsets
= elf_local_got_offsets (input_bfd
);
3604 relend
= relocs
+ input_section
->reloc_count
;
3605 for (; rela
< relend
; rela
++)
3607 unsigned int r_type
;
3608 reloc_howto_type
*howto
;
3609 unsigned int r_symndx
;
3610 struct elf32_hppa_link_hash_entry
*hh
;
3611 Elf_Internal_Sym
*sym
;
3614 bfd_reloc_status_type rstatus
;
3615 const char *sym_name
;
3617 bfd_boolean warned_undef
;
3619 r_type
= ELF32_R_TYPE (rela
->r_info
);
3620 if (r_type
>= (unsigned int) R_PARISC_UNIMPLEMENTED
)
3622 bfd_set_error (bfd_error_bad_value
);
3625 if (r_type
== (unsigned int) R_PARISC_GNU_VTENTRY
3626 || r_type
== (unsigned int) R_PARISC_GNU_VTINHERIT
)
3629 r_symndx
= ELF32_R_SYM (rela
->r_info
);
3633 warned_undef
= FALSE
;
3634 if (r_symndx
< symtab_hdr
->sh_info
)
3636 /* This is a local symbol, h defaults to NULL. */
3637 sym
= local_syms
+ r_symndx
;
3638 sym_sec
= local_sections
[r_symndx
];
3639 relocation
= _bfd_elf_rela_local_sym (output_bfd
, sym
, &sym_sec
, rela
);
3643 struct elf_link_hash_entry
*eh
;
3644 bfd_boolean unresolved_reloc
, ignored
;
3645 struct elf_link_hash_entry
**sym_hashes
= elf_sym_hashes (input_bfd
);
3647 RELOC_FOR_GLOBAL_SYMBOL (info
, input_bfd
, input_section
, rela
,
3648 r_symndx
, symtab_hdr
, sym_hashes
,
3649 eh
, sym_sec
, relocation
,
3650 unresolved_reloc
, warned_undef
,
3653 if (!bfd_link_relocatable (info
)
3655 && eh
->root
.type
!= bfd_link_hash_defined
3656 && eh
->root
.type
!= bfd_link_hash_defweak
3657 && eh
->root
.type
!= bfd_link_hash_undefweak
)
3659 if (info
->unresolved_syms_in_objects
== RM_IGNORE
3660 && ELF_ST_VISIBILITY (eh
->other
) == STV_DEFAULT
3661 && eh
->type
== STT_PARISC_MILLI
)
3663 (*info
->callbacks
->undefined_symbol
)
3664 (info
, eh_name (eh
), input_bfd
,
3665 input_section
, rela
->r_offset
, FALSE
);
3666 warned_undef
= TRUE
;
3669 hh
= hppa_elf_hash_entry (eh
);
3672 if (sym_sec
!= NULL
&& discarded_section (sym_sec
))
3673 RELOC_AGAINST_DISCARDED_SECTION (info
, input_bfd
, input_section
,
3675 elf_hppa_howto_table
+ r_type
, 0,
3678 if (bfd_link_relocatable (info
))
3681 /* Do any required modifications to the relocation value, and
3682 determine what types of dynamic info we need to output, if
3687 case R_PARISC_DLTIND14F
:
3688 case R_PARISC_DLTIND14R
:
3689 case R_PARISC_DLTIND21L
:
3692 bfd_boolean do_got
= FALSE
;
3693 bfd_boolean reloc
= bfd_link_pic (info
);
3695 /* Relocation is to the entry for this symbol in the
3696 global offset table. */
3701 off
= hh
->eh
.got
.offset
;
3702 dyn
= htab
->etab
.dynamic_sections_created
;
3703 reloc
= (!UNDEFWEAK_NO_DYNAMIC_RELOC (info
, &hh
->eh
)
3705 || (hh
->eh
.dynindx
!= -1
3706 && !SYMBOL_REFERENCES_LOCAL (info
, &hh
->eh
))));
3708 || !WILL_CALL_FINISH_DYNAMIC_SYMBOL (dyn
,
3709 bfd_link_pic (info
),
3712 /* If we aren't going to call finish_dynamic_symbol,
3713 then we need to handle initialisation of the .got
3714 entry and create needed relocs here. Since the
3715 offset must always be a multiple of 4, we use the
3716 least significant bit to record whether we have
3717 initialised it already. */
3722 hh
->eh
.got
.offset
|= 1;
3729 /* Local symbol case. */
3730 if (local_got_offsets
== NULL
)
3733 off
= local_got_offsets
[r_symndx
];
3735 /* The offset must always be a multiple of 4. We use
3736 the least significant bit to record whether we have
3737 already generated the necessary reloc. */
3742 local_got_offsets
[r_symndx
] |= 1;
3751 /* Output a dynamic relocation for this GOT entry.
3752 In this case it is relative to the base of the
3753 object because the symbol index is zero. */
3754 Elf_Internal_Rela outrel
;
3756 asection
*sec
= htab
->etab
.srelgot
;
3758 outrel
.r_offset
= (off
3759 + htab
->etab
.sgot
->output_offset
3760 + htab
->etab
.sgot
->output_section
->vma
);
3761 outrel
.r_info
= ELF32_R_INFO (0, R_PARISC_DIR32
);
3762 outrel
.r_addend
= relocation
;
3763 loc
= sec
->contents
;
3764 loc
+= sec
->reloc_count
++ * sizeof (Elf32_External_Rela
);
3765 bfd_elf32_swap_reloca_out (output_bfd
, &outrel
, loc
);
3768 bfd_put_32 (output_bfd
, relocation
,
3769 htab
->etab
.sgot
->contents
+ off
);
3772 if (off
>= (bfd_vma
) -2)
3775 /* Add the base of the GOT to the relocation value. */
3777 + htab
->etab
.sgot
->output_offset
3778 + htab
->etab
.sgot
->output_section
->vma
);
3782 case R_PARISC_SEGREL32
:
3783 /* If this is the first SEGREL relocation, then initialize
3784 the segment base values. */
3785 if (htab
->text_segment_base
== (bfd_vma
) -1)
3786 bfd_map_over_sections (output_bfd
, hppa_record_segment_addr
, htab
);
3789 case R_PARISC_PLABEL14R
:
3790 case R_PARISC_PLABEL21L
:
3791 case R_PARISC_PLABEL32
:
3792 if (htab
->etab
.dynamic_sections_created
)
3795 bfd_boolean do_plt
= 0;
3796 /* If we have a global symbol with a PLT slot, then
3797 redirect this relocation to it. */
3800 off
= hh
->eh
.plt
.offset
;
3801 if (! WILL_CALL_FINISH_DYNAMIC_SYMBOL (1,
3802 bfd_link_pic (info
),
3805 /* In a non-shared link, adjust_dynamic_symbol
3806 isn't called for symbols forced local. We
3807 need to write out the plt entry here. */
3812 hh
->eh
.plt
.offset
|= 1;
3819 bfd_vma
*local_plt_offsets
;
3821 if (local_got_offsets
== NULL
)
3824 local_plt_offsets
= local_got_offsets
+ symtab_hdr
->sh_info
;
3825 off
= local_plt_offsets
[r_symndx
];
3827 /* As for the local .got entry case, we use the last
3828 bit to record whether we've already initialised
3829 this local .plt entry. */
3834 local_plt_offsets
[r_symndx
] |= 1;
3841 if (bfd_link_pic (info
))
3843 /* Output a dynamic IPLT relocation for this
3845 Elf_Internal_Rela outrel
;
3847 asection
*s
= htab
->etab
.srelplt
;
3849 outrel
.r_offset
= (off
3850 + htab
->etab
.splt
->output_offset
3851 + htab
->etab
.splt
->output_section
->vma
);
3852 outrel
.r_info
= ELF32_R_INFO (0, R_PARISC_IPLT
);
3853 outrel
.r_addend
= relocation
;
3855 loc
+= s
->reloc_count
++ * sizeof (Elf32_External_Rela
);
3856 bfd_elf32_swap_reloca_out (output_bfd
, &outrel
, loc
);
3860 bfd_put_32 (output_bfd
,
3862 htab
->etab
.splt
->contents
+ off
);
3863 bfd_put_32 (output_bfd
,
3864 elf_gp (htab
->etab
.splt
->output_section
->owner
),
3865 htab
->etab
.splt
->contents
+ off
+ 4);
3869 if (off
>= (bfd_vma
) -2)
3872 /* PLABELs contain function pointers. Relocation is to
3873 the entry for the function in the .plt. The magic +2
3874 offset signals to $$dyncall that the function pointer
3875 is in the .plt and thus has a gp pointer too.
3876 Exception: Undefined PLABELs should have a value of
3879 || (hh
->eh
.root
.type
!= bfd_link_hash_undefweak
3880 && hh
->eh
.root
.type
!= bfd_link_hash_undefined
))
3883 + htab
->etab
.splt
->output_offset
3884 + htab
->etab
.splt
->output_section
->vma
3891 case R_PARISC_DIR17F
:
3892 case R_PARISC_DIR17R
:
3893 case R_PARISC_DIR14F
:
3894 case R_PARISC_DIR14R
:
3895 case R_PARISC_DIR21L
:
3896 case R_PARISC_DPREL14F
:
3897 case R_PARISC_DPREL14R
:
3898 case R_PARISC_DPREL21L
:
3899 case R_PARISC_DIR32
:
3900 if ((input_section
->flags
& SEC_ALLOC
) == 0)
3903 if (bfd_link_pic (info
)
3905 || hh
->eh
.dyn_relocs
!= NULL
)
3906 && ((hh
!= NULL
&& pc_dynrelocs (hh
))
3907 || IS_ABSOLUTE_RELOC (r_type
)))
3909 && hh
->eh
.dyn_relocs
!= NULL
))
3911 Elf_Internal_Rela outrel
;
3916 /* When generating a shared object, these relocations
3917 are copied into the output file to be resolved at run
3920 outrel
.r_addend
= rela
->r_addend
;
3922 _bfd_elf_section_offset (output_bfd
, info
, input_section
,
3924 skip
= (outrel
.r_offset
== (bfd_vma
) -1
3925 || outrel
.r_offset
== (bfd_vma
) -2);
3926 outrel
.r_offset
+= (input_section
->output_offset
3927 + input_section
->output_section
->vma
);
3931 memset (&outrel
, 0, sizeof (outrel
));
3934 && hh
->eh
.dynindx
!= -1
3936 || !IS_ABSOLUTE_RELOC (r_type
)
3937 || !bfd_link_pic (info
)
3938 || !SYMBOLIC_BIND (info
, &hh
->eh
)
3939 || !hh
->eh
.def_regular
))
3941 outrel
.r_info
= ELF32_R_INFO (hh
->eh
.dynindx
, r_type
);
3943 else /* It's a local symbol, or one marked to become local. */
3947 /* Add the absolute offset of the symbol. */
3948 outrel
.r_addend
+= relocation
;
3950 /* Global plabels need to be processed by the
3951 dynamic linker so that functions have at most one
3952 fptr. For this reason, we need to differentiate
3953 between global and local plabels, which we do by
3954 providing the function symbol for a global plabel
3955 reloc, and no symbol for local plabels. */
3958 && sym_sec
->output_section
!= NULL
3959 && ! bfd_is_abs_section (sym_sec
))
3963 osec
= sym_sec
->output_section
;
3964 indx
= elf_section_data (osec
)->dynindx
;
3967 osec
= htab
->etab
.text_index_section
;
3968 indx
= elf_section_data (osec
)->dynindx
;
3970 BFD_ASSERT (indx
!= 0);
3972 /* We are turning this relocation into one
3973 against a section symbol, so subtract out the
3974 output section's address but not the offset
3975 of the input section in the output section. */
3976 outrel
.r_addend
-= osec
->vma
;
3979 outrel
.r_info
= ELF32_R_INFO (indx
, r_type
);
3981 sreloc
= elf_section_data (input_section
)->sreloc
;
3985 loc
= sreloc
->contents
;
3986 loc
+= sreloc
->reloc_count
++ * sizeof (Elf32_External_Rela
);
3987 bfd_elf32_swap_reloca_out (output_bfd
, &outrel
, loc
);
3991 case R_PARISC_TLS_LDM21L
:
3992 case R_PARISC_TLS_LDM14R
:
3996 off
= htab
->tls_ldm_got
.offset
;
4001 Elf_Internal_Rela outrel
;
4004 outrel
.r_offset
= (off
4005 + htab
->etab
.sgot
->output_section
->vma
4006 + htab
->etab
.sgot
->output_offset
);
4007 outrel
.r_addend
= 0;
4008 outrel
.r_info
= ELF32_R_INFO (0, R_PARISC_TLS_DTPMOD32
);
4009 loc
= htab
->etab
.srelgot
->contents
;
4010 loc
+= htab
->etab
.srelgot
->reloc_count
++ * sizeof (Elf32_External_Rela
);
4012 bfd_elf32_swap_reloca_out (output_bfd
, &outrel
, loc
);
4013 htab
->tls_ldm_got
.offset
|= 1;
4016 /* Add the base of the GOT to the relocation value. */
4018 + htab
->etab
.sgot
->output_offset
4019 + htab
->etab
.sgot
->output_section
->vma
);
4024 case R_PARISC_TLS_LDO21L
:
4025 case R_PARISC_TLS_LDO14R
:
4026 relocation
-= dtpoff_base (info
);
4029 case R_PARISC_TLS_GD21L
:
4030 case R_PARISC_TLS_GD14R
:
4031 case R_PARISC_TLS_IE21L
:
4032 case R_PARISC_TLS_IE14R
:
4041 if (!htab
->etab
.dynamic_sections_created
4042 || hh
->eh
.dynindx
== -1
4043 || SYMBOL_REFERENCES_LOCAL (info
, &hh
->eh
)
4044 || UNDEFWEAK_NO_DYNAMIC_RELOC (info
, &hh
->eh
))
4045 /* This is actually a static link, or it is a
4046 -Bsymbolic link and the symbol is defined
4047 locally, or the symbol was forced to be local
4048 because of a version file. */
4051 indx
= hh
->eh
.dynindx
;
4052 off
= hh
->eh
.got
.offset
;
4053 tls_type
= hh
->tls_type
;
4057 off
= local_got_offsets
[r_symndx
];
4058 tls_type
= hppa_elf_local_got_tls_type (input_bfd
)[r_symndx
];
4061 if (tls_type
== GOT_UNKNOWN
)
4068 bfd_boolean need_relocs
= FALSE
;
4069 Elf_Internal_Rela outrel
;
4070 bfd_byte
*loc
= NULL
;
4073 /* The GOT entries have not been initialized yet. Do it
4074 now, and emit any relocations. If both an IE GOT and a
4075 GD GOT are necessary, we emit the GD first. */
4078 || (bfd_link_dll (info
)
4080 || !UNDEFWEAK_NO_DYNAMIC_RELOC (info
, &hh
->eh
))))
4083 loc
= htab
->etab
.srelgot
->contents
;
4084 loc
+= (htab
->etab
.srelgot
->reloc_count
4085 * sizeof (Elf32_External_Rela
));
4088 if (tls_type
& GOT_TLS_GD
)
4094 + htab
->etab
.sgot
->output_section
->vma
4095 + htab
->etab
.sgot
->output_offset
);
4097 = ELF32_R_INFO (indx
, R_PARISC_TLS_DTPMOD32
);
4098 outrel
.r_addend
= 0;
4099 bfd_elf32_swap_reloca_out (output_bfd
, &outrel
, loc
);
4100 htab
->etab
.srelgot
->reloc_count
++;
4101 loc
+= sizeof (Elf32_External_Rela
);
4102 bfd_put_32 (output_bfd
, 0,
4103 htab
->etab
.sgot
->contents
+ cur_off
);
4106 /* If we are not emitting relocations for a
4107 general dynamic reference, then we must be in a
4108 static link or an executable link with the
4109 symbol binding locally. Mark it as belonging
4110 to module 1, the executable. */
4111 bfd_put_32 (output_bfd
, 1,
4112 htab
->etab
.sgot
->contents
+ cur_off
);
4117 = ELF32_R_INFO (indx
, R_PARISC_TLS_DTPOFF32
);
4118 outrel
.r_offset
+= 4;
4119 bfd_elf32_swap_reloca_out (output_bfd
, &outrel
, loc
);
4120 htab
->etab
.srelgot
->reloc_count
++;
4121 loc
+= sizeof (Elf32_External_Rela
);
4122 bfd_put_32 (output_bfd
, 0,
4123 htab
->etab
.sgot
->contents
+ cur_off
+ 4);
4126 bfd_put_32 (output_bfd
, relocation
- dtpoff_base (info
),
4127 htab
->etab
.sgot
->contents
+ cur_off
+ 4);
4131 if (tls_type
& GOT_TLS_IE
)
4134 && !(bfd_link_executable (info
)
4135 && SYMBOL_REFERENCES_LOCAL (info
, &hh
->eh
)))
4139 + htab
->etab
.sgot
->output_section
->vma
4140 + htab
->etab
.sgot
->output_offset
);
4141 outrel
.r_info
= ELF32_R_INFO (indx
,
4142 R_PARISC_TLS_TPREL32
);
4144 outrel
.r_addend
= relocation
- dtpoff_base (info
);
4146 outrel
.r_addend
= 0;
4147 bfd_elf32_swap_reloca_out (output_bfd
, &outrel
, loc
);
4148 htab
->etab
.srelgot
->reloc_count
++;
4149 loc
+= sizeof (Elf32_External_Rela
);
4152 bfd_put_32 (output_bfd
, tpoff (info
, relocation
),
4153 htab
->etab
.sgot
->contents
+ cur_off
);
4158 hh
->eh
.got
.offset
|= 1;
4160 local_got_offsets
[r_symndx
] |= 1;
4163 if ((tls_type
& GOT_NORMAL
) != 0
4164 && (tls_type
& (GOT_TLS_GD
| GOT_TLS_LDM
| GOT_TLS_IE
)) != 0)
4167 _bfd_error_handler (_("%s has both normal and TLS relocs"),
4171 Elf_Internal_Sym
*isym
4172 = bfd_sym_from_r_symndx (&htab
->sym_cache
,
4173 input_bfd
, r_symndx
);
4177 = bfd_elf_string_from_elf_section (input_bfd
,
4178 symtab_hdr
->sh_link
,
4180 if (sym_name
== NULL
)
4182 if (*sym_name
== '\0')
4183 sym_name
= bfd_section_name (sym_sec
);
4185 (_("%pB:%s has both normal and TLS relocs"),
4186 input_bfd
, sym_name
);
4188 bfd_set_error (bfd_error_bad_value
);
4192 if ((tls_type
& GOT_TLS_GD
)
4193 && r_type
!= R_PARISC_TLS_GD21L
4194 && r_type
!= R_PARISC_TLS_GD14R
)
4195 off
+= 2 * GOT_ENTRY_SIZE
;
4197 /* Add the base of the GOT to the relocation value. */
4199 + htab
->etab
.sgot
->output_offset
4200 + htab
->etab
.sgot
->output_section
->vma
);
4205 case R_PARISC_TLS_LE21L
:
4206 case R_PARISC_TLS_LE14R
:
4208 relocation
= tpoff (info
, relocation
);
4217 rstatus
= final_link_relocate (input_section
, contents
, rela
, relocation
,
4218 htab
, sym_sec
, hh
, info
);
4220 if (rstatus
== bfd_reloc_ok
)
4224 sym_name
= hh_name (hh
);
4227 sym_name
= bfd_elf_string_from_elf_section (input_bfd
,
4228 symtab_hdr
->sh_link
,
4230 if (sym_name
== NULL
)
4232 if (*sym_name
== '\0')
4233 sym_name
= bfd_section_name (sym_sec
);
4236 howto
= elf_hppa_howto_table
+ r_type
;
4238 if (rstatus
== bfd_reloc_undefined
|| rstatus
== bfd_reloc_notsupported
)
4240 if (rstatus
== bfd_reloc_notsupported
|| !warned_undef
)
4243 /* xgettext:c-format */
4244 (_("%pB(%pA+%#" PRIx64
"): cannot handle %s for %s"),
4247 (uint64_t) rela
->r_offset
,
4250 bfd_set_error (bfd_error_bad_value
);
4255 (*info
->callbacks
->reloc_overflow
)
4256 (info
, (hh
? &hh
->eh
.root
: NULL
), sym_name
, howto
->name
,
4257 (bfd_vma
) 0, input_bfd
, input_section
, rela
->r_offset
);
4263 /* Finish up dynamic symbol handling. We set the contents of various
4264 dynamic sections here. */
4267 elf32_hppa_finish_dynamic_symbol (bfd
*output_bfd
,
4268 struct bfd_link_info
*info
,
4269 struct elf_link_hash_entry
*eh
,
4270 Elf_Internal_Sym
*sym
)
4272 struct elf32_hppa_link_hash_table
*htab
;
4273 Elf_Internal_Rela rela
;
4276 htab
= hppa_link_hash_table (info
);
4280 if (eh
->plt
.offset
!= (bfd_vma
) -1)
4284 if (eh
->plt
.offset
& 1)
4287 /* This symbol has an entry in the procedure linkage table. Set
4290 The format of a plt entry is
4295 if (eh
->root
.type
== bfd_link_hash_defined
4296 || eh
->root
.type
== bfd_link_hash_defweak
)
4298 value
= eh
->root
.u
.def
.value
;
4299 if (eh
->root
.u
.def
.section
->output_section
!= NULL
)
4300 value
+= (eh
->root
.u
.def
.section
->output_offset
4301 + eh
->root
.u
.def
.section
->output_section
->vma
);
4304 /* Create a dynamic IPLT relocation for this entry. */
4305 rela
.r_offset
= (eh
->plt
.offset
4306 + htab
->etab
.splt
->output_offset
4307 + htab
->etab
.splt
->output_section
->vma
);
4308 if (eh
->dynindx
!= -1)
4310 rela
.r_info
= ELF32_R_INFO (eh
->dynindx
, R_PARISC_IPLT
);
4315 /* This symbol has been marked to become local, and is
4316 used by a plabel so must be kept in the .plt. */
4317 rela
.r_info
= ELF32_R_INFO (0, R_PARISC_IPLT
);
4318 rela
.r_addend
= value
;
4321 loc
= htab
->etab
.srelplt
->contents
;
4322 loc
+= htab
->etab
.srelplt
->reloc_count
++ * sizeof (Elf32_External_Rela
);
4323 bfd_elf32_swap_reloca_out (htab
->etab
.splt
->output_section
->owner
, &rela
, loc
);
4325 if (!eh
->def_regular
)
4327 /* Mark the symbol as undefined, rather than as defined in
4328 the .plt section. Leave the value alone. */
4329 sym
->st_shndx
= SHN_UNDEF
;
4333 if (eh
->got
.offset
!= (bfd_vma
) -1
4334 && (hppa_elf_hash_entry (eh
)->tls_type
& GOT_NORMAL
) != 0
4335 && !UNDEFWEAK_NO_DYNAMIC_RELOC (info
, eh
))
4337 bfd_boolean is_dyn
= (eh
->dynindx
!= -1
4338 && !SYMBOL_REFERENCES_LOCAL (info
, eh
));
4340 if (is_dyn
|| bfd_link_pic (info
))
4342 /* This symbol has an entry in the global offset table. Set
4345 rela
.r_offset
= ((eh
->got
.offset
&~ (bfd_vma
) 1)
4346 + htab
->etab
.sgot
->output_offset
4347 + htab
->etab
.sgot
->output_section
->vma
);
4349 /* If this is a -Bsymbolic link and the symbol is defined
4350 locally or was forced to be local because of a version
4351 file, we just want to emit a RELATIVE reloc. The entry
4352 in the global offset table will already have been
4353 initialized in the relocate_section function. */
4356 rela
.r_info
= ELF32_R_INFO (0, R_PARISC_DIR32
);
4357 rela
.r_addend
= (eh
->root
.u
.def
.value
4358 + eh
->root
.u
.def
.section
->output_offset
4359 + eh
->root
.u
.def
.section
->output_section
->vma
);
4363 if ((eh
->got
.offset
& 1) != 0)
4366 bfd_put_32 (output_bfd
, 0,
4367 htab
->etab
.sgot
->contents
+ (eh
->got
.offset
& ~1));
4368 rela
.r_info
= ELF32_R_INFO (eh
->dynindx
, R_PARISC_DIR32
);
4372 loc
= htab
->etab
.srelgot
->contents
;
4373 loc
+= (htab
->etab
.srelgot
->reloc_count
++
4374 * sizeof (Elf32_External_Rela
));
4375 bfd_elf32_swap_reloca_out (output_bfd
, &rela
, loc
);
4383 /* This symbol needs a copy reloc. Set it up. */
4385 if (! (eh
->dynindx
!= -1
4386 && (eh
->root
.type
== bfd_link_hash_defined
4387 || eh
->root
.type
== bfd_link_hash_defweak
)))
4390 rela
.r_offset
= (eh
->root
.u
.def
.value
4391 + eh
->root
.u
.def
.section
->output_offset
4392 + eh
->root
.u
.def
.section
->output_section
->vma
);
4394 rela
.r_info
= ELF32_R_INFO (eh
->dynindx
, R_PARISC_COPY
);
4395 if (eh
->root
.u
.def
.section
== htab
->etab
.sdynrelro
)
4396 sec
= htab
->etab
.sreldynrelro
;
4398 sec
= htab
->etab
.srelbss
;
4399 loc
= sec
->contents
+ sec
->reloc_count
++ * sizeof (Elf32_External_Rela
);
4400 bfd_elf32_swap_reloca_out (output_bfd
, &rela
, loc
);
4403 /* Mark _DYNAMIC and _GLOBAL_OFFSET_TABLE_ as absolute. */
4404 if (eh
== htab
->etab
.hdynamic
|| eh
== htab
->etab
.hgot
)
4406 sym
->st_shndx
= SHN_ABS
;
4412 /* Used to decide how to sort relocs in an optimal manner for the
4413 dynamic linker, before writing them out. */
4415 static enum elf_reloc_type_class
4416 elf32_hppa_reloc_type_class (const struct bfd_link_info
*info ATTRIBUTE_UNUSED
,
4417 const asection
*rel_sec ATTRIBUTE_UNUSED
,
4418 const Elf_Internal_Rela
*rela
)
4420 /* Handle TLS relocs first; we don't want them to be marked
4421 relative by the "if (ELF32_R_SYM (rela->r_info) == STN_UNDEF)"
4423 switch ((int) ELF32_R_TYPE (rela
->r_info
))
4425 case R_PARISC_TLS_DTPMOD32
:
4426 case R_PARISC_TLS_DTPOFF32
:
4427 case R_PARISC_TLS_TPREL32
:
4428 return reloc_class_normal
;
4431 if (ELF32_R_SYM (rela
->r_info
) == STN_UNDEF
)
4432 return reloc_class_relative
;
4434 switch ((int) ELF32_R_TYPE (rela
->r_info
))
4437 return reloc_class_plt
;
4439 return reloc_class_copy
;
4441 return reloc_class_normal
;
4445 /* Finish up the dynamic sections. */
4448 elf32_hppa_finish_dynamic_sections (bfd
*output_bfd
,
4449 struct bfd_link_info
*info
)
4452 struct elf32_hppa_link_hash_table
*htab
;
4456 htab
= hppa_link_hash_table (info
);
4460 dynobj
= htab
->etab
.dynobj
;
4462 sgot
= htab
->etab
.sgot
;
4463 /* A broken linker script might have discarded the dynamic sections.
4464 Catch this here so that we do not seg-fault later on. */
4465 if (sgot
!= NULL
&& bfd_is_abs_section (sgot
->output_section
))
4468 sdyn
= bfd_get_linker_section (dynobj
, ".dynamic");
4470 if (htab
->etab
.dynamic_sections_created
)
4472 Elf32_External_Dyn
*dyncon
, *dynconend
;
4477 dyncon
= (Elf32_External_Dyn
*) sdyn
->contents
;
4478 dynconend
= (Elf32_External_Dyn
*) (sdyn
->contents
+ sdyn
->size
);
4479 for (; dyncon
< dynconend
; dyncon
++)
4481 Elf_Internal_Dyn dyn
;
4484 bfd_elf32_swap_dyn_in (dynobj
, dyncon
, &dyn
);
4492 /* Use PLTGOT to set the GOT register. */
4493 dyn
.d_un
.d_ptr
= elf_gp (output_bfd
);
4497 s
= htab
->etab
.srelplt
;
4498 dyn
.d_un
.d_ptr
= s
->output_section
->vma
+ s
->output_offset
;
4502 s
= htab
->etab
.srelplt
;
4503 dyn
.d_un
.d_val
= s
->size
;
4507 bfd_elf32_swap_dyn_out (output_bfd
, &dyn
, dyncon
);
4511 if (sgot
!= NULL
&& sgot
->size
!= 0)
4513 /* Fill in the first entry in the global offset table.
4514 We use it to point to our dynamic section, if we have one. */
4515 bfd_put_32 (output_bfd
,
4516 sdyn
? sdyn
->output_section
->vma
+ sdyn
->output_offset
: 0,
4519 /* The second entry is reserved for use by the dynamic linker. */
4520 memset (sgot
->contents
+ GOT_ENTRY_SIZE
, 0, GOT_ENTRY_SIZE
);
4522 /* Set .got entry size. */
4523 elf_section_data (sgot
->output_section
)
4524 ->this_hdr
.sh_entsize
= GOT_ENTRY_SIZE
;
4527 if (htab
->etab
.splt
!= NULL
&& htab
->etab
.splt
->size
!= 0)
4529 /* Set plt entry size to 0 instead of PLT_ENTRY_SIZE, since we add the
4530 plt stubs and as such the section does not hold a table of fixed-size
4532 elf_section_data (htab
->etab
.splt
->output_section
)->this_hdr
.sh_entsize
= 0;
4534 if (htab
->need_plt_stub
)
4536 /* Set up the .plt stub. */
4537 memcpy (htab
->etab
.splt
->contents
4538 + htab
->etab
.splt
->size
- sizeof (plt_stub
),
4539 plt_stub
, sizeof (plt_stub
));
4541 if ((htab
->etab
.splt
->output_offset
4542 + htab
->etab
.splt
->output_section
->vma
4543 + htab
->etab
.splt
->size
)
4544 != (sgot
->output_offset
4545 + sgot
->output_section
->vma
))
4548 (_(".got section not immediately after .plt section"));
4557 /* Called when writing out an object file to decide the type of a
4560 elf32_hppa_elf_get_symbol_type (Elf_Internal_Sym
*elf_sym
, int type
)
4562 if (ELF_ST_TYPE (elf_sym
->st_info
) == STT_PARISC_MILLI
)
4563 return STT_PARISC_MILLI
;
4568 /* Misc BFD support code. */
4569 #define bfd_elf32_bfd_is_local_label_name elf_hppa_is_local_label_name
4570 #define bfd_elf32_bfd_reloc_type_lookup elf_hppa_reloc_type_lookup
4571 #define bfd_elf32_bfd_reloc_name_lookup elf_hppa_reloc_name_lookup
4572 #define elf_info_to_howto elf_hppa_info_to_howto
4573 #define elf_info_to_howto_rel elf_hppa_info_to_howto_rel
4575 /* Stuff for the BFD linker. */
4576 #define bfd_elf32_bfd_final_link elf32_hppa_final_link
4577 #define bfd_elf32_bfd_link_hash_table_create elf32_hppa_link_hash_table_create
4578 #define elf_backend_adjust_dynamic_symbol elf32_hppa_adjust_dynamic_symbol
4579 #define elf_backend_copy_indirect_symbol elf32_hppa_copy_indirect_symbol
4580 #define elf_backend_check_relocs elf32_hppa_check_relocs
4581 #define elf_backend_relocs_compatible _bfd_elf_relocs_compatible
4582 #define elf_backend_create_dynamic_sections elf32_hppa_create_dynamic_sections
4583 #define elf_backend_fake_sections elf_hppa_fake_sections
4584 #define elf_backend_relocate_section elf32_hppa_relocate_section
4585 #define elf_backend_hide_symbol elf32_hppa_hide_symbol
4586 #define elf_backend_finish_dynamic_symbol elf32_hppa_finish_dynamic_symbol
4587 #define elf_backend_finish_dynamic_sections elf32_hppa_finish_dynamic_sections
4588 #define elf_backend_size_dynamic_sections elf32_hppa_size_dynamic_sections
4589 #define elf_backend_init_index_section _bfd_elf_init_1_index_section
4590 #define elf_backend_gc_mark_hook elf32_hppa_gc_mark_hook
4591 #define elf_backend_grok_prstatus elf32_hppa_grok_prstatus
4592 #define elf_backend_grok_psinfo elf32_hppa_grok_psinfo
4593 #define elf_backend_object_p elf32_hppa_object_p
4594 #define elf_backend_final_write_processing elf_hppa_final_write_processing
4595 #define elf_backend_get_symbol_type elf32_hppa_elf_get_symbol_type
4596 #define elf_backend_reloc_type_class elf32_hppa_reloc_type_class
4597 #define elf_backend_action_discarded elf_hppa_action_discarded
4599 #define elf_backend_can_gc_sections 1
4600 #define elf_backend_can_refcount 1
4601 #define elf_backend_plt_alignment 2
4602 #define elf_backend_want_got_plt 0
4603 #define elf_backend_plt_readonly 0
4604 #define elf_backend_want_plt_sym 0
4605 #define elf_backend_got_header_size 8
4606 #define elf_backend_want_dynrelro 1
4607 #define elf_backend_rela_normal 1
4608 #define elf_backend_dtrel_excludes_plt 1
4609 #define elf_backend_no_page_alias 1
4611 #define TARGET_BIG_SYM hppa_elf32_vec
4612 #define TARGET_BIG_NAME "elf32-hppa"
4613 #define ELF_ARCH bfd_arch_hppa
4614 #define ELF_TARGET_ID HPPA32_ELF_DATA
4615 #define ELF_MACHINE_CODE EM_PARISC
4616 #define ELF_MAXPAGESIZE 0x1000
4617 #define ELF_OSABI ELFOSABI_HPUX
4618 #define elf32_bed elf32_hppa_hpux_bed
4620 #include "elf32-target.h"
4622 #undef TARGET_BIG_SYM
4623 #define TARGET_BIG_SYM hppa_elf32_linux_vec
4624 #undef TARGET_BIG_NAME
4625 #define TARGET_BIG_NAME "elf32-hppa-linux"
4627 #define ELF_OSABI ELFOSABI_GNU
4629 #define elf32_bed elf32_hppa_linux_bed
4631 #include "elf32-target.h"
4633 #undef TARGET_BIG_SYM
4634 #define TARGET_BIG_SYM hppa_elf32_nbsd_vec
4635 #undef TARGET_BIG_NAME
4636 #define TARGET_BIG_NAME "elf32-hppa-netbsd"
4638 #define ELF_OSABI ELFOSABI_NETBSD
4640 #define elf32_bed elf32_hppa_netbsd_bed
4642 #include "elf32-target.h"