]> git.ipfire.org Git - thirdparty/binutils-gdb.git/blame - bfd/elf32-hppa.c
Fix cutnpasto in last entry
[thirdparty/binutils-gdb.git] / bfd / elf32-hppa.c
CommitLineData
252b5132 1/* BFD back-end for HP PA-RISC ELF files.
7898deda 2 Copyright 1990, 1991, 1992, 1993, 1994, 1995, 1996, 1999, 2000, 2001
252b5132
RH
3 Free Software Foundation, Inc.
4
30667bf3 5 Original code by
252b5132
RH
6 Center for Software Science
7 Department of Computer Science
8 University of Utah
30667bf3 9 Largely rewritten by Alan Modra <alan@linuxcare.com.au>
252b5132
RH
10
11This file is part of BFD, the Binary File Descriptor library.
12
13This program is free software; you can redistribute it and/or modify
14it under the terms of the GNU General Public License as published by
15the Free Software Foundation; either version 2 of the License, or
16(at your option) any later version.
17
18This program is distributed in the hope that it will be useful,
19but WITHOUT ANY WARRANTY; without even the implied warranty of
20MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
21GNU General Public License for more details.
22
23You should have received a copy of the GNU General Public License
24along with this program; if not, write to the Free Software
25Foundation, Inc., 59 Temple Place - Suite 330, Boston, MA 02111-1307, USA. */
26
27#include "bfd.h"
28#include "sysdep.h"
252b5132
RH
29#include "libbfd.h"
30#include "elf-bfd.h"
9e103c9c
JL
31#include "elf/hppa.h"
32#include "libhppa.h"
33#include "elf32-hppa.h"
34#define ARCH_SIZE 32
35#include "elf-hppa.h"
edd21aca 36#include "elf32-hppa.h"
9e103c9c 37
74d1c347
AM
38/* In order to gain some understanding of code in this file without
39 knowing all the intricate details of the linker, note the
40 following:
41
42 Functions named elf32_hppa_* are called by external routines, other
43 functions are only called locally. elf32_hppa_* functions appear
44 in this file more or less in the order in which they are called
45 from external routines. eg. elf32_hppa_check_relocs is called
46 early in the link process, elf32_hppa_finish_dynamic_sections is
47 one of the last functions. */
48
edd21aca 49/* We use two hash tables to hold information for linking PA ELF objects.
252b5132
RH
50
51 The first is the elf32_hppa_link_hash_table which is derived
52 from the standard ELF linker hash table. We use this as a place to
53 attach other hash tables and static information.
54
55 The second is the stub hash table which is derived from the
56 base BFD hash table. The stub hash table holds the information
30667bf3
AM
57 necessary to build the linker stubs during a link.
58
59 There are a number of different stubs generated by the linker.
60
61 Long branch stub:
62 : ldil LR'X,%r1
63 : be,n RR'X(%sr4,%r1)
64
65 PIC long branch stub:
66 : b,l .+8,%r1
3ee1d854
AM
67 : addil LR'X - ($PIC_pcrel$0 - 4),%r1
68 : be,n RR'X - ($PIC_pcrel$0 - 8)(%sr4,%r1)
30667bf3
AM
69
70 Import stub to call shared library routine from normal object file
71 (single sub-space version)
3ee1d854
AM
72 : addil LR'lt_ptr+ltoff,%dp ; get procedure entry point
73 : ldw RR'lt_ptr+ltoff(%r1),%r21
30667bf3 74 : bv %r0(%r21)
3ee1d854 75 : ldw RR'lt_ptr+ltoff+4(%r1),%r19 ; get new dlt value.
30667bf3
AM
76
77 Import stub to call shared library routine from shared library
78 (single sub-space version)
3ee1d854
AM
79 : addil LR'ltoff,%r19 ; get procedure entry point
80 : ldw RR'ltoff(%r1),%r21
30667bf3 81 : bv %r0(%r21)
3ee1d854 82 : ldw RR'ltoff+4(%r1),%r19 ; get new dlt value.
30667bf3
AM
83
84 Import stub to call shared library routine from normal object file
85 (multiple sub-space support)
3ee1d854
AM
86 : addil LR'lt_ptr+ltoff,%dp ; get procedure entry point
87 : ldw RR'lt_ptr+ltoff(%r1),%r21
88 : ldw RR'lt_ptr+ltoff+4(%r1),%r19 ; get new dlt value.
30667bf3
AM
89 : ldsid (%r21),%r1
90 : mtsp %r1,%sr0
91 : be 0(%sr0,%r21) ; branch to target
92 : stw %rp,-24(%sp) ; save rp
93
94 Import stub to call shared library routine from shared library
95 (multiple sub-space support)
3ee1d854
AM
96 : addil LR'ltoff,%r19 ; get procedure entry point
97 : ldw RR'ltoff(%r1),%r21
98 : ldw RR'ltoff+4(%r1),%r19 ; get new dlt value.
30667bf3
AM
99 : ldsid (%r21),%r1
100 : mtsp %r1,%sr0
101 : be 0(%sr0,%r21) ; branch to target
102 : stw %rp,-24(%sp) ; save rp
103
104 Export stub to return from shared lib routine (multiple sub-space support)
105 One of these is created for each exported procedure in a shared
106 library (and stored in the shared lib). Shared lib routines are
107 called via the first instruction in the export stub so that we can
108 do an inter-space return. Not required for single sub-space.
109 : bl,n X,%rp ; trap the return
110 : nop
111 : ldw -24(%sp),%rp ; restore the original rp
112 : ldsid (%rp),%r1
113 : mtsp %r1,%sr0
74d1c347 114 : be,n 0(%sr0,%rp) ; inter-space return */
30667bf3
AM
115
116#define PLT_ENTRY_SIZE 8
74d1c347 117#define PLABEL_PLT_ENTRY_SIZE PLT_ENTRY_SIZE
30667bf3
AM
118#define GOT_ENTRY_SIZE 4
119#define ELF_DYNAMIC_INTERPRETER "/lib/ld.so.1"
120
47d89dba
AM
121static const bfd_byte plt_stub[] =
122{
123 0x0e, 0x80, 0x10, 0x96, /* 1: ldw 0(%r20),%r22 */
124 0xea, 0xc0, 0xc0, 0x00, /* bv %r0(%r22) */
125 0x0e, 0x88, 0x10, 0x95, /* ldw 4(%r20),%r21 */
126#define PLT_STUB_ENTRY (3*4)
127 0xea, 0x9f, 0x1f, 0xdd, /* b,l 1b,%r20 */
128 0xd6, 0x80, 0x1c, 0x1e, /* depi 0,31,2,%r20 */
129 0x00, 0xc0, 0xff, 0xee, /* 9: .word fixup_func */
130 0xde, 0xad, 0xbe, 0xef /* .word fixup_ltp */
131};
132
30667bf3
AM
133/* Section name for stubs is the associated section name plus this
134 string. */
135#define STUB_SUFFIX ".stub"
136
98ceb8ce
AM
137/* We don't need to copy certain PC- or GP-relative dynamic relocs
138 into a shared object's dynamic section. All the relocs of the
139 limited class we are interested in, are absolute. */
140#ifndef RELATIVE_DYNRELOCS
141#define RELATIVE_DYNRELOCS 0
446f2863 142#define IS_ABSOLUTE_RELOC(r_type) 1
30667bf3
AM
143#endif
144
30667bf3
AM
145enum elf32_hppa_stub_type {
146 hppa_stub_long_branch,
147 hppa_stub_long_branch_shared,
148 hppa_stub_import,
149 hppa_stub_import_shared,
150 hppa_stub_export,
151 hppa_stub_none
152};
153
30667bf3 154struct elf32_hppa_stub_hash_entry {
252b5132 155
edd21aca 156 /* Base hash table entry structure. */
252b5132
RH
157 struct bfd_hash_entry root;
158
edd21aca
AM
159 /* The stub section. */
160 asection *stub_sec;
161
162 /* Offset within stub_sec of the beginning of this stub. */
30667bf3 163 bfd_vma stub_offset;
252b5132
RH
164
165 /* Given the symbol's value and its section we can determine its final
166 value when building the stubs (so the stub knows where to jump. */
30667bf3 167 bfd_vma target_value;
252b5132 168 asection *target_section;
30667bf3
AM
169
170 enum elf32_hppa_stub_type stub_type;
171
172 /* The symbol table entry, if any, that this was derived from. */
173 struct elf32_hppa_link_hash_entry *h;
174
25f72752
AM
175 /* Where this stub is being called from, or, in the case of combined
176 stub sections, the first input section in the group. */
177 asection *id_sec;
252b5132
RH
178};
179
30667bf3
AM
180struct elf32_hppa_link_hash_entry {
181
182 struct elf_link_hash_entry elf;
183
184 /* A pointer to the most recently used stub hash entry against this
185 symbol. */
186 struct elf32_hppa_stub_hash_entry *stub_cache;
187
30667bf3
AM
188 /* Used to count relocations for delayed sizing of relocation
189 sections. */
190 struct elf32_hppa_dyn_reloc_entry {
191
192 /* Next relocation in the chain. */
193 struct elf32_hppa_dyn_reloc_entry *next;
194
98ceb8ce
AM
195 /* The input section of the reloc. */
196 asection *sec;
30667bf3
AM
197
198 /* Number of relocs copied in this section. */
199 bfd_size_type count;
98ceb8ce
AM
200
201#if RELATIVE_DYNRELOCS
202 /* Number of relative relocs copied for the input section. */
203 bfd_size_type relative_count;
204#endif
205 } *dyn_relocs;
30667bf3
AM
206
207 /* Set during a static link if we detect a function is PIC. */
12cca0d2
AM
208 unsigned int maybe_pic_call:1;
209
210 /* Set if the only reason we need a .plt entry is for a non-PIC to
211 PIC function call. */
74d1c347
AM
212 unsigned int pic_call:1;
213
214 /* Set if this symbol is used by a plabel reloc. */
215 unsigned int plabel:1;
30667bf3
AM
216};
217
30667bf3
AM
218struct elf32_hppa_link_hash_table {
219
252b5132 220 /* The main hash table. */
ebe50bae 221 struct elf_link_hash_table elf;
252b5132
RH
222
223 /* The stub hash table. */
edd21aca 224 struct bfd_hash_table stub_hash_table;
252b5132 225
30667bf3
AM
226 /* Linker stub bfd. */
227 bfd *stub_bfd;
228
30667bf3
AM
229 /* Linker call-backs. */
230 asection * (*add_stub_section) PARAMS ((const char *, asection *));
231 void (*layout_sections_again) PARAMS ((void));
232
25f72752
AM
233 /* Array to keep track of which stub sections have been created, and
234 information on stub grouping. */
235 struct map_stub {
236 /* This is the section to which stubs in the group will be
237 attached. */
238 asection *link_sec;
239 /* The stub section. */
240 asection *stub_sec;
25f72752 241 } *stub_group;
30667bf3 242
30667bf3
AM
243 /* Short-cuts to get to dynamic linker sections. */
244 asection *sgot;
245 asection *srelgot;
246 asection *splt;
247 asection *srelplt;
248 asection *sdynbss;
249 asection *srelbss;
47d89dba 250
c46b7515
AM
251 /* Used during a final link to store the base of the text and data
252 segments so that we can perform SEGREL relocations. */
253 bfd_vma text_segment_base;
254 bfd_vma data_segment_base;
255
47d89dba
AM
256 /* Whether we support multiple sub-spaces for shared libs. */
257 unsigned int multi_subspace:1;
258
259 /* Flags set when PCREL12F and PCREL17F branches detected. Used to
260 select suitable defaults for the stub group size. */
261 unsigned int has_12bit_branch:1;
262 unsigned int has_17bit_branch:1;
263
264 /* Set if we need a .plt stub to support lazy dynamic linking. */
265 unsigned int need_plt_stub:1;
252b5132
RH
266};
267
30667bf3
AM
268/* Various hash macros and functions. */
269#define hppa_link_hash_table(p) \
edd21aca 270 ((struct elf32_hppa_link_hash_table *) ((p)->hash))
252b5132 271
30667bf3
AM
272#define hppa_stub_hash_lookup(table, string, create, copy) \
273 ((struct elf32_hppa_stub_hash_entry *) \
274 bfd_hash_lookup ((table), (string), (create), (copy)))
275
276static struct bfd_hash_entry *stub_hash_newfunc
277 PARAMS ((struct bfd_hash_entry *, struct bfd_hash_table *, const char *));
edd21aca 278
30667bf3 279static struct bfd_hash_entry *hppa_link_hash_newfunc
edd21aca 280 PARAMS ((struct bfd_hash_entry *, struct bfd_hash_table *, const char *));
252b5132
RH
281
282static struct bfd_link_hash_table *elf32_hppa_link_hash_table_create
283 PARAMS ((bfd *));
284
30667bf3
AM
285/* Stub handling functions. */
286static char *hppa_stub_name
287 PARAMS ((const asection *, const asection *,
288 const struct elf32_hppa_link_hash_entry *,
289 const Elf_Internal_Rela *));
edd21aca 290
30667bf3
AM
291static struct elf32_hppa_stub_hash_entry *hppa_get_stub_entry
292 PARAMS ((const asection *, const asection *,
293 struct elf32_hppa_link_hash_entry *,
25f72752
AM
294 const Elf_Internal_Rela *,
295 struct elf32_hppa_link_hash_table *));
edd21aca 296
30667bf3 297static struct elf32_hppa_stub_hash_entry *hppa_add_stub
25f72752 298 PARAMS ((const char *, asection *, struct elf32_hppa_link_hash_table *));
30667bf3
AM
299
300static enum elf32_hppa_stub_type hppa_type_of_stub
301 PARAMS ((asection *, const Elf_Internal_Rela *,
302 struct elf32_hppa_link_hash_entry *, bfd_vma));
303
304static boolean hppa_build_one_stub
305 PARAMS ((struct bfd_hash_entry *, PTR));
306
307static boolean hppa_size_one_stub
308 PARAMS ((struct bfd_hash_entry *, PTR));
309
30667bf3
AM
310/* BFD and elf backend functions. */
311static boolean elf32_hppa_object_p PARAMS ((bfd *));
252b5132 312
edd21aca
AM
313static boolean elf32_hppa_add_symbol_hook
314 PARAMS ((bfd *, struct bfd_link_info *, const Elf_Internal_Sym *,
315 const char **, flagword *, asection **, bfd_vma *));
252b5132 316
30667bf3
AM
317static boolean elf32_hppa_create_dynamic_sections
318 PARAMS ((bfd *, struct bfd_link_info *));
252b5132 319
ebe50bae
AM
320static void elf32_hppa_copy_indirect_symbol
321 PARAMS ((struct elf_link_hash_entry *, struct elf_link_hash_entry *));
322
30667bf3
AM
323static boolean elf32_hppa_check_relocs
324 PARAMS ((bfd *, struct bfd_link_info *,
325 asection *, const Elf_Internal_Rela *));
326
327static asection *elf32_hppa_gc_mark_hook
328 PARAMS ((bfd *, struct bfd_link_info *, Elf_Internal_Rela *,
329 struct elf_link_hash_entry *, Elf_Internal_Sym *));
330
331static boolean elf32_hppa_gc_sweep_hook
332 PARAMS ((bfd *, struct bfd_link_info *,
333 asection *, const Elf_Internal_Rela *));
334
74d1c347
AM
335static void elf32_hppa_hide_symbol
336 PARAMS ((struct bfd_link_info *, struct elf_link_hash_entry *));
337
30667bf3
AM
338static boolean elf32_hppa_adjust_dynamic_symbol
339 PARAMS ((struct bfd_link_info *, struct elf_link_hash_entry *));
340
341static boolean hppa_handle_PIC_calls
342 PARAMS ((struct elf_link_hash_entry *, PTR));
343
98ceb8ce
AM
344static boolean allocate_dynrelocs
345 PARAMS ((struct elf_link_hash_entry *, PTR));
346
347static boolean readonly_dynrelocs
30667bf3 348 PARAMS ((struct elf_link_hash_entry *, PTR));
30667bf3 349
d5c73c2f
AM
350static boolean clobber_millicode_symbols
351 PARAMS ((struct elf_link_hash_entry *, struct bfd_link_info *));
352
30667bf3
AM
353static boolean elf32_hppa_size_dynamic_sections
354 PARAMS ((bfd *, struct bfd_link_info *));
355
c46b7515
AM
356static boolean elf32_hppa_final_link
357 PARAMS ((bfd *, struct bfd_link_info *));
358
359static void hppa_record_segment_addr
360 PARAMS ((bfd *, asection *, PTR));
361
30667bf3
AM
362static bfd_reloc_status_type final_link_relocate
363 PARAMS ((asection *, bfd_byte *, const Elf_Internal_Rela *,
25f72752 364 bfd_vma, struct elf32_hppa_link_hash_table *, asection *,
30667bf3
AM
365 struct elf32_hppa_link_hash_entry *));
366
367static boolean elf32_hppa_relocate_section
368 PARAMS ((bfd *, struct bfd_link_info *, bfd *, asection *,
369 bfd_byte *, Elf_Internal_Rela *, Elf_Internal_Sym *, asection **));
370
c46b7515
AM
371static int hppa_unwind_entry_compare
372 PARAMS ((const PTR, const PTR));
373
30667bf3
AM
374static boolean elf32_hppa_finish_dynamic_symbol
375 PARAMS ((bfd *, struct bfd_link_info *,
376 struct elf_link_hash_entry *, Elf_Internal_Sym *));
377
98ceb8ce
AM
378static enum elf_reloc_type_class elf32_hppa_reloc_type_class
379 PARAMS ((const Elf_Internal_Rela *));
380
30667bf3
AM
381static boolean elf32_hppa_finish_dynamic_sections
382 PARAMS ((bfd *, struct bfd_link_info *));
383
d952f17a
AM
384static void elf32_hppa_post_process_headers
385 PARAMS ((bfd *, struct bfd_link_info *));
386
30667bf3
AM
387static int elf32_hppa_elf_get_symbol_type
388 PARAMS ((Elf_Internal_Sym *, int));
252b5132 389
252b5132
RH
390/* Assorted hash table functions. */
391
392/* Initialize an entry in the stub hash table. */
393
394static struct bfd_hash_entry *
30667bf3 395stub_hash_newfunc (entry, table, string)
252b5132
RH
396 struct bfd_hash_entry *entry;
397 struct bfd_hash_table *table;
398 const char *string;
399{
252b5132
RH
400 /* Allocate the structure if it has not already been allocated by a
401 subclass. */
ebe50bae 402 if (entry == NULL)
30667bf3 403 {
ebe50bae
AM
404 entry = bfd_hash_allocate (table,
405 sizeof (struct elf32_hppa_stub_hash_entry));
406 if (entry == NULL)
407 return entry;
30667bf3 408 }
252b5132
RH
409
410 /* Call the allocation method of the superclass. */
ebe50bae
AM
411 entry = bfd_hash_newfunc (entry, table, string);
412 if (entry != NULL)
252b5132 413 {
ebe50bae
AM
414 struct elf32_hppa_stub_hash_entry *eh;
415
252b5132 416 /* Initialize the local fields. */
ebe50bae
AM
417 eh = (struct elf32_hppa_stub_hash_entry *) entry;
418 eh->stub_sec = NULL;
419 eh->stub_offset = 0;
420 eh->target_value = 0;
421 eh->target_section = NULL;
422 eh->stub_type = hppa_stub_long_branch;
423 eh->h = NULL;
424 eh->id_sec = NULL;
30667bf3
AM
425 }
426
ebe50bae 427 return entry;
30667bf3
AM
428}
429
30667bf3
AM
430/* Initialize an entry in the link hash table. */
431
432static struct bfd_hash_entry *
433hppa_link_hash_newfunc (entry, table, string)
434 struct bfd_hash_entry *entry;
435 struct bfd_hash_table *table;
436 const char *string;
437{
30667bf3
AM
438 /* Allocate the structure if it has not already been allocated by a
439 subclass. */
ebe50bae 440 if (entry == NULL)
30667bf3 441 {
ebe50bae
AM
442 entry = bfd_hash_allocate (table,
443 sizeof (struct elf32_hppa_link_hash_entry));
444 if (entry == NULL)
445 return entry;
30667bf3
AM
446 }
447
448 /* Call the allocation method of the superclass. */
ebe50bae
AM
449 entry = _bfd_elf_link_hash_newfunc (entry, table, string);
450 if (entry != NULL)
30667bf3 451 {
ebe50bae
AM
452 struct elf32_hppa_link_hash_entry *eh;
453
30667bf3 454 /* Initialize the local fields. */
ebe50bae
AM
455 eh = (struct elf32_hppa_link_hash_entry *) entry;
456 eh->stub_cache = NULL;
457 eh->dyn_relocs = NULL;
458 eh->maybe_pic_call = 0;
459 eh->pic_call = 0;
460 eh->plabel = 0;
252b5132
RH
461 }
462
ebe50bae 463 return entry;
252b5132
RH
464}
465
252b5132
RH
466/* Create the derived linker hash table. The PA ELF port uses the derived
467 hash table to keep information specific to the PA ELF linker (without
468 using static variables). */
469
470static struct bfd_link_hash_table *
471elf32_hppa_link_hash_table_create (abfd)
472 bfd *abfd;
473{
474 struct elf32_hppa_link_hash_table *ret;
dc810e39 475 bfd_size_type amt = sizeof (*ret);
252b5132 476
dc810e39 477 ret = (struct elf32_hppa_link_hash_table *) bfd_alloc (abfd, amt);
252b5132
RH
478 if (ret == NULL)
479 return NULL;
edd21aca 480
ebe50bae 481 if (!_bfd_elf_link_hash_table_init (&ret->elf, abfd, hppa_link_hash_newfunc))
252b5132
RH
482 {
483 bfd_release (abfd, ret);
484 return NULL;
485 }
edd21aca
AM
486
487 /* Init the stub hash table too. */
30667bf3 488 if (!bfd_hash_table_init (&ret->stub_hash_table, stub_hash_newfunc))
edd21aca
AM
489 return NULL;
490
30667bf3 491 ret->stub_bfd = NULL;
30667bf3
AM
492 ret->add_stub_section = NULL;
493 ret->layout_sections_again = NULL;
25f72752 494 ret->stub_group = NULL;
30667bf3
AM
495 ret->sgot = NULL;
496 ret->srelgot = NULL;
497 ret->splt = NULL;
498 ret->srelplt = NULL;
499 ret->sdynbss = NULL;
500 ret->srelbss = NULL;
c46b7515
AM
501 ret->text_segment_base = (bfd_vma) -1;
502 ret->data_segment_base = (bfd_vma) -1;
47d89dba
AM
503 ret->multi_subspace = 0;
504 ret->has_12bit_branch = 0;
505 ret->has_17bit_branch = 0;
506 ret->need_plt_stub = 0;
252b5132 507
ebe50bae 508 return &ret->elf.root;
252b5132
RH
509}
510
30667bf3
AM
511/* Build a name for an entry in the stub hash table. */
512
edd21aca 513static char *
30667bf3 514hppa_stub_name (input_section, sym_sec, hash, rel)
edd21aca 515 const asection *input_section;
30667bf3
AM
516 const asection *sym_sec;
517 const struct elf32_hppa_link_hash_entry *hash;
518 const Elf_Internal_Rela *rel;
edd21aca
AM
519{
520 char *stub_name;
dc810e39 521 bfd_size_type len;
edd21aca 522
30667bf3
AM
523 if (hash)
524 {
525 len = 8 + 1 + strlen (hash->elf.root.root.string) + 1 + 8 + 1;
526 stub_name = bfd_malloc (len);
527 if (stub_name != NULL)
528 {
529 sprintf (stub_name, "%08x_%s+%x",
530 input_section->id & 0xffffffff,
531 hash->elf.root.root.string,
532 (int) rel->r_addend & 0xffffffff);
533 }
534 }
535 else
edd21aca 536 {
30667bf3
AM
537 len = 8 + 1 + 8 + 1 + 8 + 1 + 8 + 1;
538 stub_name = bfd_malloc (len);
539 if (stub_name != NULL)
540 {
541 sprintf (stub_name, "%08x_%x:%x+%x",
542 input_section->id & 0xffffffff,
543 sym_sec->id & 0xffffffff,
544 (int) ELF32_R_SYM (rel->r_info) & 0xffffffff,
545 (int) rel->r_addend & 0xffffffff);
546 }
edd21aca
AM
547 }
548 return stub_name;
549}
252b5132 550
30667bf3
AM
551/* Look up an entry in the stub hash. Stub entries are cached because
552 creating the stub name takes a bit of time. */
553
554static struct elf32_hppa_stub_hash_entry *
83c81bfe 555hppa_get_stub_entry (input_section, sym_sec, hash, rel, htab)
30667bf3
AM
556 const asection *input_section;
557 const asection *sym_sec;
558 struct elf32_hppa_link_hash_entry *hash;
559 const Elf_Internal_Rela *rel;
83c81bfe 560 struct elf32_hppa_link_hash_table *htab;
252b5132 561{
30667bf3 562 struct elf32_hppa_stub_hash_entry *stub_entry;
25f72752
AM
563 const asection *id_sec;
564
565 /* If this input section is part of a group of sections sharing one
566 stub section, then use the id of the first section in the group.
567 Stub names need to include a section id, as there may well be
568 more than one stub used to reach say, printf, and we need to
569 distinguish between them. */
83c81bfe 570 id_sec = htab->stub_group[input_section->id].link_sec;
edd21aca 571
30667bf3
AM
572 if (hash != NULL && hash->stub_cache != NULL
573 && hash->stub_cache->h == hash
25f72752 574 && hash->stub_cache->id_sec == id_sec)
edd21aca 575 {
30667bf3
AM
576 stub_entry = hash->stub_cache;
577 }
578 else
579 {
30667bf3 580 char *stub_name;
edd21aca 581
25f72752 582 stub_name = hppa_stub_name (id_sec, sym_sec, hash, rel);
30667bf3
AM
583 if (stub_name == NULL)
584 return NULL;
edd21aca 585
83c81bfe 586 stub_entry = hppa_stub_hash_lookup (&htab->stub_hash_table,
25f72752 587 stub_name, false, false);
30667bf3
AM
588 if (stub_entry == NULL)
589 {
590 if (hash == NULL || hash->elf.root.type != bfd_link_hash_undefweak)
591 (*_bfd_error_handler) (_("%s(%s+0x%lx): cannot find stub entry %s"),
8f615d07 592 bfd_archive_filename (input_section->owner),
30667bf3
AM
593 input_section->name,
594 (long) rel->r_offset,
595 stub_name);
596 }
597 else
598 {
599 if (hash != NULL)
600 hash->stub_cache = stub_entry;
601 }
602
603 free (stub_name);
edd21aca 604 }
30667bf3
AM
605
606 return stub_entry;
607}
608
30667bf3
AM
609/* Add a new stub entry to the stub hash. Not all fields of the new
610 stub entry are initialised. */
611
612static struct elf32_hppa_stub_hash_entry *
83c81bfe 613hppa_add_stub (stub_name, section, htab)
30667bf3
AM
614 const char *stub_name;
615 asection *section;
83c81bfe 616 struct elf32_hppa_link_hash_table *htab;
30667bf3 617{
25f72752 618 asection *link_sec;
30667bf3 619 asection *stub_sec;
30667bf3 620 struct elf32_hppa_stub_hash_entry *stub_entry;
edd21aca 621
83c81bfe
AM
622 link_sec = htab->stub_group[section->id].link_sec;
623 stub_sec = htab->stub_group[section->id].stub_sec;
30667bf3 624 if (stub_sec == NULL)
edd21aca 625 {
83c81bfe 626 stub_sec = htab->stub_group[link_sec->id].stub_sec;
30667bf3
AM
627 if (stub_sec == NULL)
628 {
dc810e39 629 bfd_size_type len;
30667bf3
AM
630 char *s_name;
631
25f72752 632 len = strlen (link_sec->name) + sizeof (STUB_SUFFIX);
83c81bfe 633 s_name = bfd_alloc (htab->stub_bfd, len);
30667bf3
AM
634 if (s_name == NULL)
635 return NULL;
636
25f72752 637 strcpy (s_name, link_sec->name);
30667bf3 638 strcpy (s_name + len - sizeof (STUB_SUFFIX), STUB_SUFFIX);
83c81bfe 639 stub_sec = (*htab->add_stub_section) (s_name, link_sec);
30667bf3
AM
640 if (stub_sec == NULL)
641 return NULL;
83c81bfe 642 htab->stub_group[link_sec->id].stub_sec = stub_sec;
30667bf3 643 }
83c81bfe 644 htab->stub_group[section->id].stub_sec = stub_sec;
edd21aca 645 }
252b5132 646
30667bf3 647 /* Enter this entry into the linker stub hash table. */
83c81bfe 648 stub_entry = hppa_stub_hash_lookup (&htab->stub_hash_table, stub_name,
30667bf3
AM
649 true, false);
650 if (stub_entry == NULL)
651 {
652 (*_bfd_error_handler) (_("%s: cannot create stub entry %s"),
8f615d07 653 bfd_archive_filename (section->owner),
30667bf3
AM
654 stub_name);
655 return NULL;
edd21aca
AM
656 }
657
30667bf3 658 stub_entry->stub_sec = stub_sec;
30667bf3 659 stub_entry->stub_offset = 0;
25f72752 660 stub_entry->id_sec = link_sec;
30667bf3 661 return stub_entry;
edd21aca
AM
662}
663
30667bf3
AM
664/* Determine the type of stub needed, if any, for a call. */
665
666static enum elf32_hppa_stub_type
667hppa_type_of_stub (input_sec, rel, hash, destination)
668 asection *input_sec;
669 const Elf_Internal_Rela *rel;
670 struct elf32_hppa_link_hash_entry *hash;
671 bfd_vma destination;
edd21aca 672{
edd21aca 673 bfd_vma location;
30667bf3
AM
674 bfd_vma branch_offset;
675 bfd_vma max_branch_offset;
676 unsigned int r_type;
677
678 if (hash != NULL
679 && (((hash->elf.root.type == bfd_link_hash_defined
74d1c347
AM
680 || hash->elf.root.type == bfd_link_hash_defweak)
681 && hash->elf.root.u.def.section->output_section == NULL)
682 || (hash->elf.root.type == bfd_link_hash_defweak
683 && hash->elf.dynindx != -1
684 && hash->elf.plt.offset != (bfd_vma) -1)
30667bf3
AM
685 || hash->elf.root.type == bfd_link_hash_undefweak
686 || hash->elf.root.type == bfd_link_hash_undefined
12cca0d2 687 || (hash->maybe_pic_call && !(input_sec->flags & SEC_HAS_GOT_REF))))
30667bf3
AM
688 {
689 /* If output_section is NULL, then it's a symbol defined in a
690 shared library. We will need an import stub. Decide between
74d1c347
AM
691 hppa_stub_import and hppa_stub_import_shared later. For
692 shared links we need stubs for undefined or weak syms too;
693 They will presumably be resolved by the dynamic linker. */
30667bf3
AM
694 return hppa_stub_import;
695 }
edd21aca 696
30667bf3
AM
697 /* Determine where the call point is. */
698 location = (input_sec->output_offset
699 + input_sec->output_section->vma
700 + rel->r_offset);
edd21aca 701
30667bf3
AM
702 branch_offset = destination - location - 8;
703 r_type = ELF32_R_TYPE (rel->r_info);
edd21aca 704
30667bf3
AM
705 /* Determine if a long branch stub is needed. parisc branch offsets
706 are relative to the second instruction past the branch, ie. +8
707 bytes on from the branch instruction location. The offset is
708 signed and counts in units of 4 bytes. */
709 if (r_type == (unsigned int) R_PARISC_PCREL17F)
edd21aca 710 {
30667bf3
AM
711 max_branch_offset = (1 << (17-1)) << 2;
712 }
713 else if (r_type == (unsigned int) R_PARISC_PCREL12F)
714 {
715 max_branch_offset = (1 << (12-1)) << 2;
716 }
25f72752 717 else /* R_PARISC_PCREL22F. */
30667bf3
AM
718 {
719 max_branch_offset = (1 << (22-1)) << 2;
edd21aca
AM
720 }
721
30667bf3 722 if (branch_offset + max_branch_offset >= 2*max_branch_offset)
98ceb8ce
AM
723 return hppa_stub_long_branch;
724
30667bf3
AM
725 return hppa_stub_none;
726}
edd21aca 727
30667bf3
AM
728/* Build one linker stub as defined by the stub hash table entry GEN_ENTRY.
729 IN_ARG contains the link info pointer. */
edd21aca 730
30667bf3
AM
731#define LDIL_R1 0x20200000 /* ldil LR'XXX,%r1 */
732#define BE_SR4_R1 0xe0202002 /* be,n RR'XXX(%sr4,%r1) */
edd21aca 733
30667bf3 734#define BL_R1 0xe8200000 /* b,l .+8,%r1 */
3ee1d854 735#define ADDIL_R1 0x28200000 /* addil LR'XXX,%r1,%r1 */
30667bf3 736#define DEPI_R1 0xd4201c1e /* depi 0,31,2,%r1 */
252b5132 737
3ee1d854
AM
738#define ADDIL_DP 0x2b600000 /* addil LR'XXX,%dp,%r1 */
739#define LDW_R1_R21 0x48350000 /* ldw RR'XXX(%sr0,%r1),%r21 */
30667bf3 740#define BV_R0_R21 0xeaa0c000 /* bv %r0(%r21) */
3ee1d854 741#define LDW_R1_R19 0x48330000 /* ldw RR'XXX(%sr0,%r1),%r19 */
252b5132 742
3ee1d854
AM
743#define ADDIL_R19 0x2a600000 /* addil LR'XXX,%r19,%r1 */
744#define LDW_R1_DP 0x483b0000 /* ldw RR'XXX(%sr0,%r1),%dp */
edd21aca 745
30667bf3
AM
746#define LDSID_R21_R1 0x02a010a1 /* ldsid (%sr0,%r21),%r1 */
747#define MTSP_R1 0x00011820 /* mtsp %r1,%sr0 */
748#define BE_SR0_R21 0xe2a00000 /* be 0(%sr0,%r21) */
749#define STW_RP 0x6bc23fd1 /* stw %rp,-24(%sr0,%sp) */
edd21aca 750
30667bf3
AM
751#define BL_RP 0xe8400002 /* b,l,n XXX,%rp */
752#define NOP 0x08000240 /* nop */
753#define LDW_RP 0x4bc23fd1 /* ldw -24(%sr0,%sp),%rp */
754#define LDSID_RP_R1 0x004010a1 /* ldsid (%sr0,%rp),%r1 */
755#define BE_SR0_RP 0xe0400002 /* be,n 0(%sr0,%rp) */
edd21aca 756
30667bf3
AM
757#ifndef R19_STUBS
758#define R19_STUBS 1
759#endif
edd21aca 760
30667bf3
AM
761#if R19_STUBS
762#define LDW_R1_DLT LDW_R1_R19
763#else
764#define LDW_R1_DLT LDW_R1_DP
765#endif
edd21aca 766
30667bf3
AM
767static boolean
768hppa_build_one_stub (gen_entry, in_arg)
769 struct bfd_hash_entry *gen_entry;
770 PTR in_arg;
771{
772 struct elf32_hppa_stub_hash_entry *stub_entry;
773 struct bfd_link_info *info;
83c81bfe 774 struct elf32_hppa_link_hash_table *htab;
30667bf3
AM
775 asection *stub_sec;
776 bfd *stub_bfd;
777 bfd_byte *loc;
778 bfd_vma sym_value;
74d1c347 779 bfd_vma insn;
8dea1268 780 bfd_vma off;
74d1c347 781 int val;
30667bf3 782 int size;
edd21aca 783
30667bf3
AM
784 /* Massage our args to the form they really have. */
785 stub_entry = (struct elf32_hppa_stub_hash_entry *) gen_entry;
786 info = (struct bfd_link_info *) in_arg;
787
83c81bfe 788 htab = hppa_link_hash_table (info);
30667bf3 789 stub_sec = stub_entry->stub_sec;
edd21aca 790
30667bf3 791 /* Make a note of the offset within the stubs for this entry. */
74d1c347 792 stub_entry->stub_offset = stub_sec->_raw_size;
30667bf3 793 loc = stub_sec->contents + stub_entry->stub_offset;
252b5132 794
30667bf3
AM
795 stub_bfd = stub_sec->owner;
796
797 switch (stub_entry->stub_type)
798 {
799 case hppa_stub_long_branch:
800 /* Create the long branch. A long branch is formed with "ldil"
801 loading the upper bits of the target address into a register,
802 then branching with "be" which adds in the lower bits.
803 The "be" has its delay slot nullified. */
804 sym_value = (stub_entry->target_value
805 + stub_entry->target_section->output_offset
806 + stub_entry->target_section->output_section->vma);
807
74d1c347
AM
808 val = hppa_field_adjust (sym_value, (bfd_signed_vma) 0, e_lrsel);
809 insn = hppa_rebuild_insn ((int) LDIL_R1, val, 21);
30667bf3
AM
810 bfd_put_32 (stub_bfd, insn, loc);
811
74d1c347
AM
812 val = hppa_field_adjust (sym_value, (bfd_signed_vma) 0, e_rrsel) >> 2;
813 insn = hppa_rebuild_insn ((int) BE_SR4_R1, val, 17);
30667bf3
AM
814 bfd_put_32 (stub_bfd, insn, loc + 4);
815
30667bf3 816 size = 8;
edd21aca
AM
817 break;
818
30667bf3
AM
819 case hppa_stub_long_branch_shared:
820 /* Branches are relative. This is where we are going to. */
821 sym_value = (stub_entry->target_value
822 + stub_entry->target_section->output_offset
823 + stub_entry->target_section->output_section->vma);
824
825 /* And this is where we are coming from, more or less. */
826 sym_value -= (stub_entry->stub_offset
827 + stub_sec->output_offset
828 + stub_sec->output_section->vma);
829
74d1c347 830 bfd_put_32 (stub_bfd, (bfd_vma) BL_R1, loc);
47d89dba 831 val = hppa_field_adjust (sym_value, (bfd_signed_vma) -8, e_lrsel);
74d1c347 832 insn = hppa_rebuild_insn ((int) ADDIL_R1, val, 21);
30667bf3
AM
833 bfd_put_32 (stub_bfd, insn, loc + 4);
834
47d89dba 835 val = hppa_field_adjust (sym_value, (bfd_signed_vma) -8, e_rrsel) >> 2;
74d1c347 836 insn = hppa_rebuild_insn ((int) BE_SR4_R1, val, 17);
30667bf3
AM
837 bfd_put_32 (stub_bfd, insn, loc + 8);
838 size = 12;
839 break;
edd21aca 840
30667bf3
AM
841 case hppa_stub_import:
842 case hppa_stub_import_shared:
8dea1268
AM
843 off = stub_entry->h->elf.plt.offset;
844 if (off >= (bfd_vma) -2)
49e9d0d3 845 abort ();
8dea1268
AM
846
847 off &= ~ (bfd_vma) 1;
848 sym_value = (off
83c81bfe
AM
849 + htab->splt->output_offset
850 + htab->splt->output_section->vma
851 - elf_gp (htab->splt->output_section->owner));
30667bf3
AM
852
853 insn = ADDIL_DP;
854#if R19_STUBS
855 if (stub_entry->stub_type == hppa_stub_import_shared)
856 insn = ADDIL_R19;
857#endif
47d89dba 858 val = hppa_field_adjust (sym_value, (bfd_signed_vma) 0, e_lrsel),
74d1c347 859 insn = hppa_rebuild_insn ((int) insn, val, 21);
30667bf3 860 bfd_put_32 (stub_bfd, insn, loc);
edd21aca 861
47d89dba
AM
862 /* It is critical to use lrsel/rrsel here because we are using
863 two different offsets (+0 and +4) from sym_value. If we use
864 lsel/rsel then with unfortunate sym_values we will round
865 sym_value+4 up to the next 2k block leading to a mis-match
866 between the lsel and rsel value. */
867 val = hppa_field_adjust (sym_value, (bfd_signed_vma) 0, e_rrsel);
74d1c347 868 insn = hppa_rebuild_insn ((int) LDW_R1_R21, val, 14);
30667bf3 869 bfd_put_32 (stub_bfd, insn, loc + 4);
252b5132 870
83c81bfe 871 if (htab->multi_subspace)
30667bf3 872 {
47d89dba 873 val = hppa_field_adjust (sym_value, (bfd_signed_vma) 4, e_rrsel);
74d1c347 874 insn = hppa_rebuild_insn ((int) LDW_R1_DLT, val, 14);
30667bf3 875 bfd_put_32 (stub_bfd, insn, loc + 8);
252b5132 876
74d1c347
AM
877 bfd_put_32 (stub_bfd, (bfd_vma) LDSID_R21_R1, loc + 12);
878 bfd_put_32 (stub_bfd, (bfd_vma) MTSP_R1, loc + 16);
879 bfd_put_32 (stub_bfd, (bfd_vma) BE_SR0_R21, loc + 20);
880 bfd_put_32 (stub_bfd, (bfd_vma) STW_RP, loc + 24);
252b5132 881
30667bf3
AM
882 size = 28;
883 }
884 else
885 {
74d1c347 886 bfd_put_32 (stub_bfd, (bfd_vma) BV_R0_R21, loc + 8);
47d89dba 887 val = hppa_field_adjust (sym_value, (bfd_signed_vma) 4, e_rrsel);
74d1c347 888 insn = hppa_rebuild_insn ((int) LDW_R1_DLT, val, 14);
30667bf3 889 bfd_put_32 (stub_bfd, insn, loc + 12);
252b5132 890
30667bf3
AM
891 size = 16;
892 }
252b5132 893
30667bf3
AM
894 if (!info->shared
895 && stub_entry->h != NULL
896 && stub_entry->h->pic_call)
252b5132 897 {
30667bf3
AM
898 /* Build the .plt entry needed to call a PIC function from
899 statically linked code. We don't need any relocs. */
900 bfd *dynobj;
901 struct elf32_hppa_link_hash_entry *eh;
902 bfd_vma value;
252b5132 903
ebe50bae 904 dynobj = htab->elf.dynobj;
30667bf3 905 eh = (struct elf32_hppa_link_hash_entry *) stub_entry->h;
252b5132 906
49e9d0d3
AM
907 if (eh->elf.root.type != bfd_link_hash_defined
908 && eh->elf.root.type != bfd_link_hash_defweak)
909 abort ();
252b5132 910
30667bf3
AM
911 value = (eh->elf.root.u.def.value
912 + eh->elf.root.u.def.section->output_offset
913 + eh->elf.root.u.def.section->output_section->vma);
252b5132 914
30667bf3 915 /* Fill in the entry in the procedure linkage table.
252b5132 916
30667bf3 917 The format of a plt entry is
74d1c347
AM
918 <funcaddr>
919 <__gp>. */
252b5132 920
83c81bfe
AM
921 bfd_put_32 (htab->splt->owner, value,
922 htab->splt->contents + off);
923 value = elf_gp (htab->splt->output_section->owner);
924 bfd_put_32 (htab->splt->owner, value,
925 htab->splt->contents + off + 4);
252b5132 926 }
30667bf3 927 break;
252b5132 928
30667bf3
AM
929 case hppa_stub_export:
930 /* Branches are relative. This is where we are going to. */
931 sym_value = (stub_entry->target_value
932 + stub_entry->target_section->output_offset
933 + stub_entry->target_section->output_section->vma);
252b5132 934
30667bf3
AM
935 /* And this is where we are coming from. */
936 sym_value -= (stub_entry->stub_offset
937 + stub_sec->output_offset
938 + stub_sec->output_section->vma);
edd21aca 939
30667bf3
AM
940 if (sym_value - 8 + 0x40000 >= 0x80000)
941 {
edd21aca 942 (*_bfd_error_handler)
30667bf3 943 (_("%s(%s+0x%lx): cannot reach %s, recompile with -ffunction-sections"),
8f615d07 944 bfd_archive_filename (stub_entry->target_section->owner),
30667bf3
AM
945 stub_sec->name,
946 (long) stub_entry->stub_offset,
947 stub_entry->root.string);
948 bfd_set_error (bfd_error_bad_value);
edd21aca 949 return false;
252b5132 950 }
30667bf3 951
74d1c347
AM
952 val = hppa_field_adjust (sym_value, (bfd_signed_vma) -8, e_fsel) >> 2;
953 insn = hppa_rebuild_insn ((int) BL_RP, val, 17);
30667bf3
AM
954 bfd_put_32 (stub_bfd, insn, loc);
955
74d1c347
AM
956 bfd_put_32 (stub_bfd, (bfd_vma) NOP, loc + 4);
957 bfd_put_32 (stub_bfd, (bfd_vma) LDW_RP, loc + 8);
958 bfd_put_32 (stub_bfd, (bfd_vma) LDSID_RP_R1, loc + 12);
959 bfd_put_32 (stub_bfd, (bfd_vma) MTSP_R1, loc + 16);
960 bfd_put_32 (stub_bfd, (bfd_vma) BE_SR0_RP, loc + 20);
30667bf3
AM
961
962 /* Point the function symbol at the stub. */
963 stub_entry->h->elf.root.u.def.section = stub_sec;
74d1c347 964 stub_entry->h->elf.root.u.def.value = stub_sec->_raw_size;
30667bf3
AM
965
966 size = 24;
967 break;
968
969 default:
970 BFD_FAIL ();
971 return false;
252b5132
RH
972 }
973
74d1c347 974 stub_sec->_raw_size += size;
252b5132
RH
975 return true;
976}
977
30667bf3
AM
978#undef LDIL_R1
979#undef BE_SR4_R1
980#undef BL_R1
981#undef ADDIL_R1
982#undef DEPI_R1
983#undef ADDIL_DP
984#undef LDW_R1_R21
985#undef LDW_R1_DLT
986#undef LDW_R1_R19
987#undef ADDIL_R19
988#undef LDW_R1_DP
989#undef LDSID_R21_R1
990#undef MTSP_R1
991#undef BE_SR0_R21
992#undef STW_RP
993#undef BV_R0_R21
994#undef BL_RP
995#undef NOP
996#undef LDW_RP
997#undef LDSID_RP_R1
998#undef BE_SR0_RP
252b5132 999
30667bf3
AM
1000/* As above, but don't actually build the stub. Just bump offset so
1001 we know stub section sizes. */
1002
1003static boolean
1004hppa_size_one_stub (gen_entry, in_arg)
1005 struct bfd_hash_entry *gen_entry;
1006 PTR in_arg;
252b5132 1007{
30667bf3 1008 struct elf32_hppa_stub_hash_entry *stub_entry;
83c81bfe 1009 struct elf32_hppa_link_hash_table *htab;
30667bf3
AM
1010 int size;
1011
1012 /* Massage our args to the form they really have. */
1013 stub_entry = (struct elf32_hppa_stub_hash_entry *) gen_entry;
83c81bfe 1014 htab = (struct elf32_hppa_link_hash_table *) in_arg;
30667bf3
AM
1015
1016 if (stub_entry->stub_type == hppa_stub_long_branch)
98ceb8ce 1017 size = 8;
30667bf3
AM
1018 else if (stub_entry->stub_type == hppa_stub_long_branch_shared)
1019 size = 12;
1020 else if (stub_entry->stub_type == hppa_stub_export)
1021 size = 24;
74d1c347 1022 else /* hppa_stub_import or hppa_stub_import_shared. */
252b5132 1023 {
83c81bfe 1024 if (htab->multi_subspace)
30667bf3
AM
1025 size = 28;
1026 else
1027 size = 16;
1028 }
252b5132 1029
74d1c347 1030 stub_entry->stub_sec->_raw_size += size;
30667bf3
AM
1031 return true;
1032}
252b5132 1033
30667bf3
AM
1034/* Return nonzero if ABFD represents an HPPA ELF32 file.
1035 Additionally we set the default architecture and machine. */
1036
1037static boolean
1038elf32_hppa_object_p (abfd)
1039 bfd *abfd;
1040{
24a5e751
L
1041 Elf_Internal_Ehdr * i_ehdrp;
1042 unsigned int flags;
252b5132 1043
24a5e751
L
1044 i_ehdrp = elf_elfheader (abfd);
1045 if (strcmp (bfd_get_target (abfd), "elf32-hppa-linux") == 0)
1046 {
1047 if (i_ehdrp->e_ident[EI_OSABI] != ELFOSABI_LINUX)
1048 return false;
1049 }
1050 else
1051 {
1052 if (i_ehdrp->e_ident[EI_OSABI] != ELFOSABI_HPUX)
1053 return false;
1054 }
1055
1056 flags = i_ehdrp->e_flags;
30667bf3
AM
1057 switch (flags & (EF_PARISC_ARCH | EF_PARISC_WIDE))
1058 {
1059 case EFA_PARISC_1_0:
1060 return bfd_default_set_arch_mach (abfd, bfd_arch_hppa, 10);
1061 case EFA_PARISC_1_1:
1062 return bfd_default_set_arch_mach (abfd, bfd_arch_hppa, 11);
1063 case EFA_PARISC_2_0:
1064 return bfd_default_set_arch_mach (abfd, bfd_arch_hppa, 20);
1065 case EFA_PARISC_2_0 | EF_PARISC_WIDE:
1066 return bfd_default_set_arch_mach (abfd, bfd_arch_hppa, 25);
1067 }
1068 return true;
252b5132
RH
1069}
1070
252b5132
RH
1071/* Undo the generic ELF code's subtraction of section->vma from the
1072 value of each external symbol. */
1073
1074static boolean
1075elf32_hppa_add_symbol_hook (abfd, info, sym, namep, flagsp, secp, valp)
5f771d47
ILT
1076 bfd *abfd ATTRIBUTE_UNUSED;
1077 struct bfd_link_info *info ATTRIBUTE_UNUSED;
1078 const Elf_Internal_Sym *sym ATTRIBUTE_UNUSED;
1079 const char **namep ATTRIBUTE_UNUSED;
1080 flagword *flagsp ATTRIBUTE_UNUSED;
252b5132
RH
1081 asection **secp;
1082 bfd_vma *valp;
1083{
1084 *valp += (*secp)->vma;
1085 return true;
1086}
1087
30667bf3
AM
1088/* Create the .plt and .got sections, and set up our hash table
1089 short-cuts to various dynamic sections. */
1090
1091static boolean
1092elf32_hppa_create_dynamic_sections (abfd, info)
1093 bfd *abfd;
1094 struct bfd_link_info *info;
252b5132 1095{
83c81bfe 1096 struct elf32_hppa_link_hash_table *htab;
edd21aca 1097
30667bf3 1098 /* Don't try to create the .plt and .got twice. */
83c81bfe
AM
1099 htab = hppa_link_hash_table (info);
1100 if (htab->splt != NULL)
30667bf3 1101 return true;
edd21aca 1102
30667bf3
AM
1103 /* Call the generic code to do most of the work. */
1104 if (! _bfd_elf_create_dynamic_sections (abfd, info))
1105 return false;
252b5132 1106
83c81bfe
AM
1107 htab->splt = bfd_get_section_by_name (abfd, ".plt");
1108 htab->srelplt = bfd_get_section_by_name (abfd, ".rela.plt");
30667bf3 1109
83c81bfe
AM
1110 htab->sgot = bfd_get_section_by_name (abfd, ".got");
1111 htab->srelgot = bfd_make_section (abfd, ".rela.got");
1112 if (htab->srelgot == NULL
1113 || ! bfd_set_section_flags (abfd, htab->srelgot,
30667bf3
AM
1114 (SEC_ALLOC
1115 | SEC_LOAD
1116 | SEC_HAS_CONTENTS
1117 | SEC_IN_MEMORY
1118 | SEC_LINKER_CREATED
1119 | SEC_READONLY))
83c81bfe 1120 || ! bfd_set_section_alignment (abfd, htab->srelgot, 2))
30667bf3 1121 return false;
edd21aca 1122
83c81bfe
AM
1123 htab->sdynbss = bfd_get_section_by_name (abfd, ".dynbss");
1124 htab->srelbss = bfd_get_section_by_name (abfd, ".rela.bss");
30667bf3
AM
1125
1126 return true;
1127}
1128
ebe50bae
AM
1129/* Copy the extra info we tack onto an elf_link_hash_entry. */
1130
51b64d56 1131static void
ebe50bae
AM
1132elf32_hppa_copy_indirect_symbol (dir, ind)
1133 struct elf_link_hash_entry *dir, *ind;
1134{
1135 struct elf32_hppa_link_hash_entry *edir, *eind;
1136
1137 edir = (struct elf32_hppa_link_hash_entry *) dir;
1138 eind = (struct elf32_hppa_link_hash_entry *) ind;
1139
bbd7ec4a 1140 if (eind->dyn_relocs != NULL)
ebe50bae 1141 {
bbd7ec4a
AM
1142 if (edir->dyn_relocs != NULL)
1143 {
1144 struct elf32_hppa_dyn_reloc_entry **pp;
1145 struct elf32_hppa_dyn_reloc_entry *p;
1146
1e370bd2 1147 if (ind->root.type == bfd_link_hash_indirect)
bbd7ec4a
AM
1148 abort ();
1149
1150 /* Add reloc counts against the weak sym to the strong sym
1151 list. Merge any entries against the same section. */
1152 for (pp = &eind->dyn_relocs; (p = *pp) != NULL; )
1153 {
1154 struct elf32_hppa_dyn_reloc_entry *q;
1155
1156 for (q = edir->dyn_relocs; q != NULL; q = q->next)
1157 if (q->sec == p->sec)
1158 {
1159#if RELATIVE_DYNRELOCS
1160 q->relative_count += p->relative_count;
1161#endif
1162 q->count += p->count;
1163 *pp = p->next;
1164 break;
1165 }
1166 if (q == NULL)
1167 pp = &p->next;
1168 }
1169 *pp = edir->dyn_relocs;
1170 }
1171
ebe50bae
AM
1172 edir->dyn_relocs = eind->dyn_relocs;
1173 eind->dyn_relocs = NULL;
1174 }
ebe50bae
AM
1175
1176 _bfd_elf_link_hash_copy_indirect (dir, ind);
1177}
1178
30667bf3 1179/* Look through the relocs for a section during the first phase, and
3ac8354b
AM
1180 calculate needed space in the global offset table, procedure linkage
1181 table, and dynamic reloc sections. At this point we haven't
1182 necessarily read all the input files. */
252b5132
RH
1183
1184static boolean
30667bf3
AM
1185elf32_hppa_check_relocs (abfd, info, sec, relocs)
1186 bfd *abfd;
1187 struct bfd_link_info *info;
1188 asection *sec;
1189 const Elf_Internal_Rela *relocs;
252b5132 1190{
30667bf3
AM
1191 Elf_Internal_Shdr *symtab_hdr;
1192 struct elf_link_hash_entry **sym_hashes;
30667bf3
AM
1193 const Elf_Internal_Rela *rel;
1194 const Elf_Internal_Rela *rel_end;
83c81bfe 1195 struct elf32_hppa_link_hash_table *htab;
30667bf3
AM
1196 asection *sreloc;
1197 asection *stubreloc;
1198
1199 if (info->relocateable)
1200 return true;
1201
83c81bfe 1202 htab = hppa_link_hash_table (info);
30667bf3
AM
1203 symtab_hdr = &elf_tdata (abfd)->symtab_hdr;
1204 sym_hashes = elf_sym_hashes (abfd);
30667bf3
AM
1205 sreloc = NULL;
1206 stubreloc = NULL;
1207
1208 rel_end = relocs + sec->reloc_count;
1209 for (rel = relocs; rel < rel_end; rel++)
1210 {
1211 enum {
1212 NEED_GOT = 1,
1213 NEED_PLT = 2,
1214 NEED_DYNREL = 4,
98ceb8ce 1215 PLT_PLABEL = 8
30667bf3 1216 };
edd21aca 1217
30667bf3
AM
1218 unsigned int r_symndx, r_type;
1219 struct elf32_hppa_link_hash_entry *h;
1220 int need_entry;
252b5132 1221
30667bf3 1222 r_symndx = ELF32_R_SYM (rel->r_info);
252b5132 1223
30667bf3
AM
1224 if (r_symndx < symtab_hdr->sh_info)
1225 h = NULL;
1226 else
1227 h = ((struct elf32_hppa_link_hash_entry *)
1228 sym_hashes[r_symndx - symtab_hdr->sh_info]);
252b5132 1229
30667bf3 1230 r_type = ELF32_R_TYPE (rel->r_info);
252b5132 1231
30667bf3
AM
1232 switch (r_type)
1233 {
1234 case R_PARISC_DLTIND14F:
1235 case R_PARISC_DLTIND14R:
1236 case R_PARISC_DLTIND21L:
1237 /* This symbol requires a global offset table entry. */
1238 need_entry = NEED_GOT;
1239
1240 /* Mark this section as containing PIC code. */
1241 sec->flags |= SEC_HAS_GOT_REF;
1242 break;
1243
1244 case R_PARISC_PLABEL14R: /* "Official" procedure labels. */
1245 case R_PARISC_PLABEL21L:
1246 case R_PARISC_PLABEL32:
74d1c347 1247 /* If the addend is non-zero, we break badly. */
49e9d0d3
AM
1248 if (rel->r_addend != 0)
1249 abort ();
74d1c347
AM
1250
1251 /* If we are creating a shared library, then we need to
1252 create a PLT entry for all PLABELs, because PLABELs with
1253 local symbols may be passed via a pointer to another
1254 object. Additionally, output a dynamic relocation
4dc86686
AM
1255 pointing to the PLT entry.
1256 For executables, the original 32-bit ABI allowed two
1257 different styles of PLABELs (function pointers): For
1258 global functions, the PLABEL word points into the .plt
1259 two bytes past a (function address, gp) pair, and for
1260 local functions the PLABEL points directly at the
1261 function. The magic +2 for the first type allows us to
1262 differentiate between the two. As you can imagine, this
1263 is a real pain when it comes to generating code to call
1264 functions indirectly or to compare function pointers.
1265 We avoid the mess by always pointing a PLABEL into the
1266 .plt, even for local functions. */
74d1c347 1267 need_entry = PLT_PLABEL | NEED_PLT | NEED_DYNREL;
30667bf3
AM
1268 break;
1269
1270 case R_PARISC_PCREL12F:
83c81bfe 1271 htab->has_12bit_branch = 1;
47d89dba 1272 /* Fall thru. */
30667bf3
AM
1273 case R_PARISC_PCREL17C:
1274 case R_PARISC_PCREL17F:
83c81bfe 1275 htab->has_17bit_branch = 1;
47d89dba 1276 /* Fall thru. */
30667bf3 1277 case R_PARISC_PCREL22F:
47d89dba
AM
1278 /* Function calls might need to go through the .plt, and
1279 might require long branch stubs. */
30667bf3
AM
1280 if (h == NULL)
1281 {
1282 /* We know local syms won't need a .plt entry, and if
1283 they need a long branch stub we can't guarantee that
1284 we can reach the stub. So just flag an error later
1285 if we're doing a shared link and find we need a long
1286 branch stub. */
1287 continue;
1288 }
1289 else
1290 {
1291 /* Global symbols will need a .plt entry if they remain
1292 global, and in most cases won't need a long branch
1293 stub. Unfortunately, we have to cater for the case
1294 where a symbol is forced local by versioning, or due
1295 to symbolic linking, and we lose the .plt entry. */
98ceb8ce 1296 need_entry = NEED_PLT;
4dc86686 1297 if (h->elf.type == STT_PARISC_MILLI)
98ceb8ce 1298 need_entry = 0;
30667bf3
AM
1299 }
1300 break;
1301
1302 case R_PARISC_SEGBASE: /* Used to set segment base. */
c46b7515 1303 case R_PARISC_SEGREL32: /* Relative reloc, used for unwind. */
30667bf3
AM
1304 case R_PARISC_PCREL14F: /* PC relative load/store. */
1305 case R_PARISC_PCREL14R:
1306 case R_PARISC_PCREL17R: /* External branches. */
1307 case R_PARISC_PCREL21L: /* As above, and for load/store too. */
1308 /* We don't need to propagate the relocation if linking a
1309 shared object since these are section relative. */
1310 continue;
1311
1312 case R_PARISC_DPREL14F: /* Used for gp rel data load/store. */
1313 case R_PARISC_DPREL14R:
1314 case R_PARISC_DPREL21L:
1315 if (info->shared)
1316 {
1317 (*_bfd_error_handler)
1318 (_("%s: relocation %s can not be used when making a shared object; recompile with -fPIC"),
8f615d07 1319 bfd_archive_filename (abfd),
30667bf3
AM
1320 elf_hppa_howto_table[r_type].name);
1321 bfd_set_error (bfd_error_bad_value);
1322 return false;
1323 }
1324 /* Fall through. */
1325
1326 case R_PARISC_DIR17F: /* Used for external branches. */
1327 case R_PARISC_DIR17R:
47d89dba
AM
1328 case R_PARISC_DIR14F: /* Used for load/store from absolute locn. */
1329 case R_PARISC_DIR14R:
30667bf3
AM
1330 case R_PARISC_DIR21L: /* As above, and for ext branches too. */
1331#if 1
1332 /* Help debug shared library creation. Any of the above
1333 relocs can be used in shared libs, but they may cause
1334 pages to become unshared. */
1335 if (info->shared)
1336 {
1337 (*_bfd_error_handler)
1338 (_("%s: relocation %s should not be used when making a shared object; recompile with -fPIC"),
8f615d07 1339 bfd_archive_filename (abfd),
30667bf3
AM
1340 elf_hppa_howto_table[r_type].name);
1341 }
1342 /* Fall through. */
1343#endif
1344
c46b7515 1345 case R_PARISC_DIR32: /* .word relocs. */
30667bf3
AM
1346 /* We may want to output a dynamic relocation later. */
1347 need_entry = NEED_DYNREL;
1348 break;
1349
1350 /* This relocation describes the C++ object vtable hierarchy.
1351 Reconstruct it for later use during GC. */
1352 case R_PARISC_GNU_VTINHERIT:
1353 if (!_bfd_elf32_gc_record_vtinherit (abfd, sec,
1354 &h->elf, rel->r_offset))
1355 return false;
1356 continue;
1357
1358 /* This relocation describes which C++ vtable entries are actually
1359 used. Record for later use during GC. */
1360 case R_PARISC_GNU_VTENTRY:
1361 if (!_bfd_elf32_gc_record_vtentry (abfd, sec,
36605136 1362 &h->elf, rel->r_addend))
30667bf3
AM
1363 return false;
1364 continue;
1365
1366 default:
1367 continue;
1368 }
1369
1370 /* Now carry out our orders. */
1371 if (need_entry & NEED_GOT)
1372 {
1373 /* Allocate space for a GOT entry, as well as a dynamic
25f72752 1374 relocation for this entry. */
83c81bfe 1375 if (htab->sgot == NULL)
30667bf3 1376 {
3ac8354b
AM
1377 if (htab->elf.dynobj == NULL)
1378 htab->elf.dynobj = abfd;
1379 if (!elf32_hppa_create_dynamic_sections (htab->elf.dynobj, info))
30667bf3
AM
1380 return false;
1381 }
1382
1383 if (h != NULL)
1384 {
51b64d56 1385 h->elf.got.refcount += 1;
30667bf3
AM
1386 }
1387 else
1388 {
3ac8354b
AM
1389 bfd_signed_vma *local_got_refcounts;
1390
30667bf3 1391 /* This is a global offset table entry for a local symbol. */
3ac8354b 1392 local_got_refcounts = elf_local_got_refcounts (abfd);
30667bf3
AM
1393 if (local_got_refcounts == NULL)
1394 {
dc810e39 1395 bfd_size_type size;
30667bf3 1396
74d1c347
AM
1397 /* Allocate space for local got offsets and local
1398 plt offsets. Done this way to save polluting
1399 elf_obj_tdata with another target specific
1400 pointer. */
dc810e39
AM
1401 size = symtab_hdr->sh_info;
1402 size *= 2 * sizeof (bfd_signed_vma);
30667bf3 1403 local_got_refcounts = ((bfd_signed_vma *)
ebe50bae 1404 bfd_zalloc (abfd, size));
30667bf3
AM
1405 if (local_got_refcounts == NULL)
1406 return false;
1407 elf_local_got_refcounts (abfd) = local_got_refcounts;
30667bf3 1408 }
ebe50bae 1409 local_got_refcounts[r_symndx] += 1;
30667bf3
AM
1410 }
1411 }
1412
1413 if (need_entry & NEED_PLT)
1414 {
1415 /* If we are creating a shared library, and this is a reloc
1416 against a weak symbol or a global symbol in a dynamic
1417 object, then we will be creating an import stub and a
1418 .plt entry for the symbol. Similarly, on a normal link
1419 to symbols defined in a dynamic object we'll need the
1420 import stub and a .plt entry. We don't know yet whether
1421 the symbol is defined or not, so make an entry anyway and
1422 clean up later in adjust_dynamic_symbol. */
1423 if ((sec->flags & SEC_ALLOC) != 0)
1424 {
74d1c347 1425 if (h != NULL)
30667bf3 1426 {
51b64d56
AM
1427 h->elf.elf_link_hash_flags |= ELF_LINK_HASH_NEEDS_PLT;
1428 h->elf.plt.refcount += 1;
74d1c347 1429
36605136
AM
1430 /* If this .plt entry is for a plabel, mark it so
1431 that adjust_dynamic_symbol will keep the entry
1432 even if it appears to be local. */
74d1c347
AM
1433 if (need_entry & PLT_PLABEL)
1434 h->plabel = 1;
1435 }
1436 else if (need_entry & PLT_PLABEL)
1437 {
3ac8354b 1438 bfd_signed_vma *local_got_refcounts;
68fb2e56 1439 bfd_signed_vma *local_plt_refcounts;
74d1c347 1440
3ac8354b 1441 local_got_refcounts = elf_local_got_refcounts (abfd);
74d1c347
AM
1442 if (local_got_refcounts == NULL)
1443 {
dc810e39 1444 bfd_size_type size;
74d1c347
AM
1445
1446 /* Allocate space for local got offsets and local
1447 plt offsets. */
dc810e39
AM
1448 size = symtab_hdr->sh_info;
1449 size *= 2 * sizeof (bfd_signed_vma);
74d1c347 1450 local_got_refcounts = ((bfd_signed_vma *)
ebe50bae 1451 bfd_zalloc (abfd, size));
74d1c347
AM
1452 if (local_got_refcounts == NULL)
1453 return false;
1454 elf_local_got_refcounts (abfd) = local_got_refcounts;
74d1c347 1455 }
68fb2e56
AM
1456 local_plt_refcounts = (local_got_refcounts
1457 + symtab_hdr->sh_info);
ebe50bae 1458 local_plt_refcounts[r_symndx] += 1;
30667bf3 1459 }
30667bf3
AM
1460 }
1461 }
1462
98ceb8ce 1463 if (need_entry & NEED_DYNREL)
30667bf3
AM
1464 {
1465 /* Flag this symbol as having a non-got, non-plt reference
1466 so that we generate copy relocs if it turns out to be
1467 dynamic. */
ebe50bae 1468 if (h != NULL && !info->shared)
30667bf3
AM
1469 h->elf.elf_link_hash_flags |= ELF_LINK_NON_GOT_REF;
1470
1471 /* If we are creating a shared library then we need to copy
1472 the reloc into the shared library. However, if we are
1473 linking with -Bsymbolic, we need only copy absolute
1474 relocs or relocs against symbols that are not defined in
1475 an object we are including in the link. PC- or DP- or
1476 DLT-relative relocs against any local sym or global sym
1477 with DEF_REGULAR set, can be discarded. At this point we
1478 have not seen all the input files, so it is possible that
1479 DEF_REGULAR is not set now but will be set later (it is
1480 never cleared). We account for that possibility below by
98ceb8ce 1481 storing information in the dyn_relocs field of the
30667bf3
AM
1482 hash table entry.
1483
1484 A similar situation to the -Bsymbolic case occurs when
1485 creating shared libraries and symbol visibility changes
1486 render the symbol local.
1487
1488 As it turns out, all the relocs we will be creating here
1489 are absolute, so we cannot remove them on -Bsymbolic
1490 links or visibility changes anyway. A STUB_REL reloc
1491 is absolute too, as in that case it is the reloc in the
1492 stub we will be creating, rather than copying the PCREL
56882138
AM
1493 reloc in the branch.
1494
1495 If on the other hand, we are creating an executable, we
1496 may need to keep relocations for symbols satisfied by a
1497 dynamic library if we manage to avoid copy relocs for the
1498 symbol. */
446f2863
AM
1499 if ((info->shared
1500 && (sec->flags & SEC_ALLOC) != 0
1501 && (IS_ABSOLUTE_RELOC (r_type)
1502 || (h != NULL
1503 && (!info->symbolic
1504 || h->elf.root.type == bfd_link_hash_defweak
1505 || (h->elf.elf_link_hash_flags
1506 & ELF_LINK_HASH_DEF_REGULAR) == 0))))
1507 || (!info->shared
1508 && (sec->flags & SEC_ALLOC) != 0
1509 && h != NULL
446f2863
AM
1510 && (h->elf.root.type == bfd_link_hash_defweak
1511 || (h->elf.elf_link_hash_flags
1512 & ELF_LINK_HASH_DEF_REGULAR) == 0)))
30667bf3 1513 {
30667bf3
AM
1514 /* Create a reloc section in dynobj and make room for
1515 this reloc. */
98ceb8ce 1516 if (sreloc == NULL)
30667bf3
AM
1517 {
1518 char *name;
3ac8354b 1519 bfd *dynobj;
30667bf3 1520
98ceb8ce
AM
1521 name = (bfd_elf_string_from_elf_section
1522 (abfd,
1523 elf_elfheader (abfd)->e_shstrndx,
1524 elf_section_data (sec)->rel_hdr.sh_name));
30667bf3
AM
1525 if (name == NULL)
1526 {
1527 (*_bfd_error_handler)
1528 (_("Could not find relocation section for %s"),
1529 sec->name);
1530 bfd_set_error (bfd_error_bad_value);
1531 return false;
1532 }
1533
3ac8354b
AM
1534 if (htab->elf.dynobj == NULL)
1535 htab->elf.dynobj = abfd;
1536
1537 dynobj = htab->elf.dynobj;
98ceb8ce
AM
1538 sreloc = bfd_get_section_by_name (dynobj, name);
1539 if (sreloc == NULL)
30667bf3
AM
1540 {
1541 flagword flags;
1542
98ceb8ce 1543 sreloc = bfd_make_section (dynobj, name);
30667bf3
AM
1544 flags = (SEC_HAS_CONTENTS | SEC_READONLY
1545 | SEC_IN_MEMORY | SEC_LINKER_CREATED);
1546 if ((sec->flags & SEC_ALLOC) != 0)
1547 flags |= SEC_ALLOC | SEC_LOAD;
98ceb8ce
AM
1548 if (sreloc == NULL
1549 || !bfd_set_section_flags (dynobj, sreloc, flags)
1550 || !bfd_set_section_alignment (dynobj, sreloc, 2))
30667bf3
AM
1551 return false;
1552 }
30667bf3 1553
98ceb8ce 1554 elf_section_data (sec)->sreloc = sreloc;
30667bf3
AM
1555 }
1556
98ceb8ce
AM
1557 /* If this is a global symbol, we count the number of
1558 relocations we need for this symbol. */
1559 if (h != NULL)
30667bf3 1560 {
98ceb8ce 1561 struct elf32_hppa_dyn_reloc_entry *p;
30667bf3 1562
98ceb8ce
AM
1563 p = h->dyn_relocs;
1564 if (p == NULL || p->sec != sec)
30667bf3 1565 {
98ceb8ce 1566 p = ((struct elf32_hppa_dyn_reloc_entry *)
3ac8354b
AM
1567 bfd_alloc (htab->elf.dynobj,
1568 (bfd_size_type) sizeof *p));
30667bf3 1569 if (p == NULL)
98ceb8ce
AM
1570 return false;
1571 p->next = h->dyn_relocs;
1572 h->dyn_relocs = p;
1573 p->sec = sec;
1574 p->count = 0;
1575#if RELATIVE_DYNRELOCS
1576 p->relative_count = 0;
1577#endif
30667bf3 1578 }
98ceb8ce
AM
1579
1580 p->count += 1;
1581#if RELATIVE_DYNRELOCS
1582 if (!IS_ABSOLUTE_RELOC (rtype))
1583 p->relative_count += 1;
1584#endif
1585 }
1586 else
1587 {
1588 /* Track dynamic relocs needed for local syms too. */
1589 elf_section_data (sec)->local_dynrel += 1;
30667bf3
AM
1590 }
1591 }
1592 }
1593 }
edd21aca
AM
1594
1595 return true;
1596}
1597
30667bf3
AM
1598/* Return the section that should be marked against garbage collection
1599 for a given relocation. */
1600
1601static asection *
1602elf32_hppa_gc_mark_hook (abfd, info, rel, h, sym)
1603 bfd *abfd;
1604 struct bfd_link_info *info ATTRIBUTE_UNUSED;
1605 Elf_Internal_Rela *rel;
1606 struct elf_link_hash_entry *h;
1607 Elf_Internal_Sym *sym;
1608{
1609 if (h != NULL)
1610 {
1611 switch ((unsigned int) ELF32_R_TYPE (rel->r_info))
1612 {
1613 case R_PARISC_GNU_VTINHERIT:
1614 case R_PARISC_GNU_VTENTRY:
1615 break;
1616
1617 default:
1618 switch (h->root.type)
1619 {
1620 case bfd_link_hash_defined:
1621 case bfd_link_hash_defweak:
1622 return h->root.u.def.section;
1623
1624 case bfd_link_hash_common:
1625 return h->root.u.c.p->section;
1626
1627 default:
1628 break;
1629 }
1630 }
1631 }
1632 else
1633 {
1634 if (!(elf_bad_symtab (abfd)
1635 && ELF_ST_BIND (sym->st_info) != STB_LOCAL)
1636 && ! ((sym->st_shndx <= 0 || sym->st_shndx >= SHN_LORESERVE)
1637 && sym->st_shndx != SHN_COMMON))
1638 {
1639 return bfd_section_from_elf_index (abfd, sym->st_shndx);
1640 }
1641 }
1642
1643 return NULL;
1644}
1645
30667bf3
AM
1646/* Update the got and plt entry reference counts for the section being
1647 removed. */
edd21aca
AM
1648
1649static boolean
30667bf3
AM
1650elf32_hppa_gc_sweep_hook (abfd, info, sec, relocs)
1651 bfd *abfd;
1652 struct bfd_link_info *info ATTRIBUTE_UNUSED;
1653 asection *sec;
1654 const Elf_Internal_Rela *relocs;
edd21aca 1655{
30667bf3
AM
1656 Elf_Internal_Shdr *symtab_hdr;
1657 struct elf_link_hash_entry **sym_hashes;
1658 bfd_signed_vma *local_got_refcounts;
74d1c347 1659 bfd_signed_vma *local_plt_refcounts;
30667bf3
AM
1660 const Elf_Internal_Rela *rel, *relend;
1661 unsigned long r_symndx;
1662 struct elf_link_hash_entry *h;
83c81bfe 1663 struct elf32_hppa_link_hash_table *htab;
30667bf3 1664 bfd *dynobj;
30667bf3 1665
98ceb8ce
AM
1666 elf_section_data (sec)->local_dynrel = 0;
1667
30667bf3
AM
1668 symtab_hdr = &elf_tdata (abfd)->symtab_hdr;
1669 sym_hashes = elf_sym_hashes (abfd);
1670 local_got_refcounts = elf_local_got_refcounts (abfd);
74d1c347
AM
1671 local_plt_refcounts = local_got_refcounts;
1672 if (local_plt_refcounts != NULL)
1673 local_plt_refcounts += symtab_hdr->sh_info;
83c81bfe 1674 htab = hppa_link_hash_table (info);
ebe50bae 1675 dynobj = htab->elf.dynobj;
30667bf3
AM
1676 if (dynobj == NULL)
1677 return true;
1678
30667bf3
AM
1679 relend = relocs + sec->reloc_count;
1680 for (rel = relocs; rel < relend; rel++)
1681 switch ((unsigned int) ELF32_R_TYPE (rel->r_info))
1682 {
1683 case R_PARISC_DLTIND14F:
1684 case R_PARISC_DLTIND14R:
1685 case R_PARISC_DLTIND21L:
1686 r_symndx = ELF32_R_SYM (rel->r_info);
1687 if (r_symndx >= symtab_hdr->sh_info)
1688 {
1689 h = sym_hashes[r_symndx - symtab_hdr->sh_info];
1690 if (h->got.refcount > 0)
4dc86686 1691 h->got.refcount -= 1;
30667bf3
AM
1692 }
1693 else if (local_got_refcounts != NULL)
1694 {
1695 if (local_got_refcounts[r_symndx] > 0)
4dc86686 1696 local_got_refcounts[r_symndx] -= 1;
30667bf3
AM
1697 }
1698 break;
edd21aca 1699
30667bf3
AM
1700 case R_PARISC_PCREL12F:
1701 case R_PARISC_PCREL17C:
1702 case R_PARISC_PCREL17F:
1703 case R_PARISC_PCREL22F:
1704 r_symndx = ELF32_R_SYM (rel->r_info);
1705 if (r_symndx >= symtab_hdr->sh_info)
1706 {
1707 h = sym_hashes[r_symndx - symtab_hdr->sh_info];
1708 if (h->plt.refcount > 0)
1709 h->plt.refcount -= 1;
1710 }
1711 break;
edd21aca 1712
74d1c347
AM
1713 case R_PARISC_PLABEL14R:
1714 case R_PARISC_PLABEL21L:
1715 case R_PARISC_PLABEL32:
1716 r_symndx = ELF32_R_SYM (rel->r_info);
1717 if (r_symndx >= symtab_hdr->sh_info)
1718 {
98ceb8ce
AM
1719 struct elf32_hppa_link_hash_entry *eh;
1720 struct elf32_hppa_dyn_reloc_entry **pp;
1721 struct elf32_hppa_dyn_reloc_entry *p;
1722
74d1c347 1723 h = sym_hashes[r_symndx - symtab_hdr->sh_info];
98ceb8ce 1724
74d1c347
AM
1725 if (h->plt.refcount > 0)
1726 h->plt.refcount -= 1;
98ceb8ce
AM
1727
1728 eh = (struct elf32_hppa_link_hash_entry *) h;
1729
1730 for (pp = &eh->dyn_relocs; (p = *pp) != NULL; pp = &p->next)
1731 if (p->sec == sec)
1732 {
1733#if RELATIVE_DYNRELOCS
1734 if (!IS_ABSOLUTE_RELOC (rtype))
1735 p->relative_count -= 1;
1736#endif
1737 p->count -= 1;
1738 if (p->count == 0)
1739 *pp = p->next;
1740 break;
1741 }
74d1c347
AM
1742 }
1743 else if (local_plt_refcounts != NULL)
1744 {
1745 if (local_plt_refcounts[r_symndx] > 0)
1746 local_plt_refcounts[r_symndx] -= 1;
1747 }
1748 break;
1749
98ceb8ce
AM
1750 case R_PARISC_DIR32:
1751 r_symndx = ELF32_R_SYM (rel->r_info);
1752 if (r_symndx >= symtab_hdr->sh_info)
1753 {
1754 struct elf32_hppa_link_hash_entry *eh;
1755 struct elf32_hppa_dyn_reloc_entry **pp;
1756 struct elf32_hppa_dyn_reloc_entry *p;
1757
1758 h = sym_hashes[r_symndx - symtab_hdr->sh_info];
1759
1760 eh = (struct elf32_hppa_link_hash_entry *) h;
1761
1762 for (pp = &eh->dyn_relocs; (p = *pp) != NULL; pp = &p->next)
1763 if (p->sec == sec)
1764 {
1765#if RELATIVE_DYNRELOCS
1766 if (!IS_ABSOLUTE_RELOC (R_PARISC_DIR32))
1767 p->relative_count -= 1;
1768#endif
1769 p->count -= 1;
1770 if (p->count == 0)
1771 *pp = p->next;
1772 break;
1773 }
1774 }
1775 break;
1776
30667bf3
AM
1777 default:
1778 break;
1779 }
252b5132 1780
252b5132
RH
1781 return true;
1782}
1783
74d1c347
AM
1784/* Our own version of hide_symbol, so that we can keep plt entries for
1785 plabels. */
1786
1787static void
1788elf32_hppa_hide_symbol (info, h)
1789 struct bfd_link_info *info ATTRIBUTE_UNUSED;
1790 struct elf_link_hash_entry *h;
1791{
5fba655a
L
1792 if ((h->elf_link_hash_flags & ELF_LINK_FORCED_LOCAL) != 0)
1793 h->dynindx = -1;
74d1c347
AM
1794 if (! ((struct elf32_hppa_link_hash_entry *) h)->plabel)
1795 {
1796 h->elf_link_hash_flags &= ~ELF_LINK_HASH_NEEDS_PLT;
1797 h->plt.offset = (bfd_vma) -1;
1798 }
1799}
1800
4dc86686
AM
1801/* This is the condition under which elf32_hppa_finish_dynamic_symbol
1802 will be called from elflink.h. If elflink.h doesn't call our
1803 finish_dynamic_symbol routine, we'll need to do something about
1804 initializing any .plt and .got entries in elf32_hppa_relocate_section. */
1805#define WILL_CALL_FINISH_DYNAMIC_SYMBOL(DYN, INFO, H) \
1806 ((DYN) \
1807 && ((INFO)->shared \
1808 || ((H)->elf_link_hash_flags & ELF_LINK_FORCED_LOCAL) == 0) \
1809 && ((H)->dynindx != -1 \
1810 || ((H)->elf_link_hash_flags & ELF_LINK_FORCED_LOCAL) != 0))
1811
30667bf3
AM
1812/* Adjust a symbol defined by a dynamic object and referenced by a
1813 regular object. The current definition is in some section of the
1814 dynamic object, but we're not including those sections. We have to
1815 change the definition to something the rest of the link can
1816 understand. */
252b5132 1817
30667bf3
AM
1818static boolean
1819elf32_hppa_adjust_dynamic_symbol (info, h)
1820 struct bfd_link_info *info;
1821 struct elf_link_hash_entry *h;
252b5132 1822{
83c81bfe 1823 struct elf32_hppa_link_hash_table *htab;
ebe50bae
AM
1824 struct elf32_hppa_link_hash_entry *eh;
1825 struct elf32_hppa_dyn_reloc_entry *p;
30667bf3 1826 asection *s;
3ac8354b 1827 unsigned int power_of_two;
30667bf3
AM
1828
1829 /* If this is a function, put it in the procedure linkage table. We
1830 will fill in the contents of the procedure linkage table later,
1831 when we know the address of the .got section. */
1832 if (h->type == STT_FUNC
1833 || (h->elf_link_hash_flags & ELF_LINK_HASH_NEEDS_PLT) != 0)
1834 {
12cca0d2
AM
1835 if (!info->shared
1836 && h->plt.refcount > 0
1837 && (h->elf_link_hash_flags & ELF_LINK_HASH_DEF_REGULAR) != 0
1838 && (h->root.u.def.section->flags & SEC_HAS_GOT_REF) != 0)
1839 {
1840 ((struct elf32_hppa_link_hash_entry *) h)->maybe_pic_call = 1;
1841 }
1842
30667bf3
AM
1843 if (h->plt.refcount <= 0
1844 || ((h->elf_link_hash_flags & ELF_LINK_HASH_DEF_REGULAR) != 0
1845 && h->root.type != bfd_link_hash_defweak
74d1c347 1846 && ! ((struct elf32_hppa_link_hash_entry *) h)->plabel
30667bf3
AM
1847 && (!info->shared || info->symbolic)))
1848 {
1849 /* The .plt entry is not needed when:
1850 a) Garbage collection has removed all references to the
1851 symbol, or
1852 b) We know for certain the symbol is defined in this
74d1c347
AM
1853 object, and it's not a weak definition, nor is the symbol
1854 used by a plabel relocation. Either this object is the
1855 application or we are doing a shared symbolic link. */
1856
1857 /* As a special sop to the hppa ABI, we keep a .plt entry
1858 for functions in sections containing PIC code. */
12cca0d2
AM
1859 if (((struct elf32_hppa_link_hash_entry *) h)->maybe_pic_call)
1860 ((struct elf32_hppa_link_hash_entry *) h)->pic_call = 1;
30667bf3
AM
1861 else
1862 {
1863 h->plt.offset = (bfd_vma) -1;
1864 h->elf_link_hash_flags &= ~ELF_LINK_HASH_NEEDS_PLT;
30667bf3 1865 }
30667bf3 1866 }
4dc86686 1867
30667bf3
AM
1868 return true;
1869 }
bbd7ec4a
AM
1870 else
1871 h->plt.offset = (bfd_vma) -1;
edd21aca 1872
30667bf3
AM
1873 /* If this is a weak symbol, and there is a real definition, the
1874 processor independent code will have arranged for us to see the
1875 real definition first, and we can just use the same value. */
1876 if (h->weakdef != NULL)
edd21aca 1877 {
49e9d0d3
AM
1878 if (h->weakdef->root.type != bfd_link_hash_defined
1879 && h->weakdef->root.type != bfd_link_hash_defweak)
1880 abort ();
30667bf3
AM
1881 h->root.u.def.section = h->weakdef->root.u.def.section;
1882 h->root.u.def.value = h->weakdef->root.u.def.value;
0a991dfe 1883 return true;
30667bf3 1884 }
edd21aca 1885
30667bf3
AM
1886 /* This is a reference to a symbol defined by a dynamic object which
1887 is not a function. */
1888
1889 /* If we are creating a shared library, we must presume that the
1890 only references to the symbol are via the global offset table.
1891 For such cases we need not do anything here; the relocations will
1892 be handled correctly by relocate_section. */
1893 if (info->shared)
1894 return true;
1895
1896 /* If there are no references to this symbol that do not use the
1897 GOT, we don't need to generate a copy reloc. */
1898 if ((h->elf_link_hash_flags & ELF_LINK_NON_GOT_REF) == 0)
1899 return true;
1900
ebe50bae
AM
1901 eh = (struct elf32_hppa_link_hash_entry *) h;
1902 for (p = eh->dyn_relocs; p != NULL; p = p->next)
1903 {
1904 s = p->sec->output_section;
1905 if (s != NULL && (s->flags & SEC_READONLY) != 0)
1906 break;
1907 }
1908
1909 /* If we didn't find any dynamic relocs in read-only sections, then
1910 we'll be keeping the dynamic relocs and avoiding the copy reloc. */
1911 if (p == NULL)
1912 {
1913 h->elf_link_hash_flags &= ~ELF_LINK_NON_GOT_REF;
1914 return true;
1915 }
1916
30667bf3
AM
1917 /* We must allocate the symbol in our .dynbss section, which will
1918 become part of the .bss section of the executable. There will be
1919 an entry for this symbol in the .dynsym section. The dynamic
1920 object will contain position independent code, so all references
1921 from the dynamic object to this symbol will go through the global
1922 offset table. The dynamic linker will use the .dynsym entry to
1923 determine the address it must put in the global offset table, so
1924 both the dynamic object and the regular object will refer to the
1925 same memory location for the variable. */
1926
3ac8354b 1927 htab = hppa_link_hash_table (info);
30667bf3
AM
1928
1929 /* We must generate a COPY reloc to tell the dynamic linker to
1930 copy the initial value out of the dynamic object and into the
3ac8354b 1931 runtime process image. */
30667bf3
AM
1932 if ((h->root.u.def.section->flags & SEC_ALLOC) != 0)
1933 {
3ac8354b 1934 htab->srelbss->_raw_size += sizeof (Elf32_External_Rela);
30667bf3 1935 h->elf_link_hash_flags |= ELF_LINK_HASH_NEEDS_COPY;
edd21aca 1936 }
252b5132 1937
3ac8354b
AM
1938 /* We need to figure out the alignment required for this symbol. I
1939 have no idea how other ELF linkers handle this. */
30667bf3 1940
3ac8354b
AM
1941 power_of_two = bfd_log2 (h->size);
1942 if (power_of_two > 3)
1943 power_of_two = 3;
1944
1945 /* Apply the required alignment. */
1946 s = htab->sdynbss;
1947 s->_raw_size = BFD_ALIGN (s->_raw_size,
1948 (bfd_size_type) (1 << power_of_two));
1949 if (power_of_two > bfd_get_section_alignment (htab->elf.dynobj, s))
1950 {
1951 if (! bfd_set_section_alignment (htab->elf.dynobj, s, power_of_two))
1952 return false;
1953 }
30667bf3 1954
30667bf3
AM
1955 /* Define the symbol as being at this point in the section. */
1956 h->root.u.def.section = s;
1957 h->root.u.def.value = s->_raw_size;
edd21aca 1958
30667bf3
AM
1959 /* Increment the section size to make room for the symbol. */
1960 s->_raw_size += h->size;
252b5132
RH
1961
1962 return true;
1963}
1964
30667bf3
AM
1965/* Called via elf_link_hash_traverse to create .plt entries for an
1966 application that uses statically linked PIC functions. Similar to
1967 the first part of elf32_hppa_adjust_dynamic_symbol. */
252b5132 1968
30667bf3
AM
1969static boolean
1970hppa_handle_PIC_calls (h, inf)
1971 struct elf_link_hash_entry *h;
4dc86686 1972 PTR inf ATTRIBUTE_UNUSED;
252b5132 1973{
30667bf3
AM
1974 if (! (h->plt.refcount > 0
1975 && (h->root.type == bfd_link_hash_defined
1976 || h->root.type == bfd_link_hash_defweak)
1977 && (h->root.u.def.section->flags & SEC_HAS_GOT_REF) != 0))
252b5132 1978 {
30667bf3
AM
1979 h->plt.offset = (bfd_vma) -1;
1980 h->elf_link_hash_flags &= ~ELF_LINK_HASH_NEEDS_PLT;
1981 return true;
252b5132
RH
1982 }
1983
74d1c347 1984 h->elf_link_hash_flags |= ELF_LINK_HASH_NEEDS_PLT;
12cca0d2 1985 ((struct elf32_hppa_link_hash_entry *) h)->maybe_pic_call = 1;
30667bf3 1986 ((struct elf32_hppa_link_hash_entry *) h)->pic_call = 1;
edd21aca 1987
4dc86686
AM
1988 return true;
1989}
1990
1991/* Allocate space in .plt, .got and associated reloc sections for
1992 global syms. */
1993
1994static boolean
98ceb8ce 1995allocate_dynrelocs (h, inf)
4dc86686
AM
1996 struct elf_link_hash_entry *h;
1997 PTR inf;
1998{
1999 struct bfd_link_info *info;
83c81bfe 2000 struct elf32_hppa_link_hash_table *htab;
4dc86686 2001 asection *s;
446f2863 2002 struct elf32_hppa_link_hash_entry *eh;
98ceb8ce 2003 struct elf32_hppa_dyn_reloc_entry *p;
4dc86686 2004
73a74a62
AM
2005 if (h->root.type == bfd_link_hash_indirect
2006 || h->root.type == bfd_link_hash_warning)
2007 return true;
2008
30667bf3 2009 info = (struct bfd_link_info *) inf;
83c81bfe 2010 htab = hppa_link_hash_table (info);
ebe50bae 2011 if ((htab->elf.dynamic_sections_created
4dc86686
AM
2012 && h->plt.refcount > 0)
2013 || ((struct elf32_hppa_link_hash_entry *) h)->pic_call)
2014 {
446f2863
AM
2015 /* Make sure this symbol is output as a dynamic symbol.
2016 Undefined weak syms won't yet be marked as dynamic. */
2017 if (h->dynindx == -1
2018 && (h->elf_link_hash_flags & ELF_LINK_FORCED_LOCAL) == 0
2019 && h->type != STT_PARISC_MILLI
2020 && !((struct elf32_hppa_link_hash_entry *) h)->pic_call)
2021 {
2022 if (! bfd_elf32_link_record_dynamic_symbol (info, h))
2023 return false;
2024 }
2025
3ac8354b
AM
2026 if (((struct elf32_hppa_link_hash_entry *) h)->pic_call
2027 || WILL_CALL_FINISH_DYNAMIC_SYMBOL (1, info, h))
4dc86686 2028 {
3ac8354b
AM
2029 /* Make an entry in the .plt section. */
2030 s = htab->splt;
2031 h->plt.offset = s->_raw_size;
2032 if (PLABEL_PLT_ENTRY_SIZE != PLT_ENTRY_SIZE
2033 && ((struct elf32_hppa_link_hash_entry *) h)->plabel
2034 && (h->elf_link_hash_flags & ELF_LINK_FORCED_LOCAL) == 0)
2035 {
2036 /* Add some extra space for the dynamic linker to use. */
2037 s->_raw_size += PLABEL_PLT_ENTRY_SIZE;
2038 }
2039 else
2040 s->_raw_size += PLT_ENTRY_SIZE;
2041
2042 if (! ((struct elf32_hppa_link_hash_entry *) h)->pic_call)
2043 {
2044 /* We also need to make an entry in the .rela.plt section. */
2045 htab->srelplt->_raw_size += sizeof (Elf32_External_Rela);
2046 htab->need_plt_stub = 1;
2047 }
4dc86686
AM
2048 }
2049 else
4dc86686 2050 {
3ac8354b
AM
2051 h->plt.offset = (bfd_vma) -1;
2052 h->elf_link_hash_flags &= ~ELF_LINK_HASH_NEEDS_PLT;
4dc86686
AM
2053 }
2054 }
2055 else
2056 {
2057 h->plt.offset = (bfd_vma) -1;
2058 h->elf_link_hash_flags &= ~ELF_LINK_HASH_NEEDS_PLT;
2059 }
edd21aca 2060
4dc86686
AM
2061 if (h->got.refcount > 0)
2062 {
446f2863
AM
2063 /* Make sure this symbol is output as a dynamic symbol.
2064 Undefined weak syms won't yet be marked as dynamic. */
2065 if (h->dynindx == -1
2066 && (h->elf_link_hash_flags & ELF_LINK_FORCED_LOCAL) == 0
2067 && h->type != STT_PARISC_MILLI)
2068 {
2069 if (! bfd_elf32_link_record_dynamic_symbol (info, h))
2070 return false;
2071 }
2072
83c81bfe 2073 s = htab->sgot;
4dc86686
AM
2074 h->got.offset = s->_raw_size;
2075 s->_raw_size += GOT_ENTRY_SIZE;
ce757d15
AM
2076 if (htab->elf.dynamic_sections_created
2077 && (info->shared
2078 || (h->dynindx != -1
2079 && h->elf_link_hash_flags & ELF_LINK_FORCED_LOCAL) == 0))
2080 {
2081 htab->srelgot->_raw_size += sizeof (Elf32_External_Rela);
2082 }
4dc86686
AM
2083 }
2084 else
2085 h->got.offset = (bfd_vma) -1;
30667bf3 2086
446f2863 2087 eh = (struct elf32_hppa_link_hash_entry *) h;
98ceb8ce 2088 if (eh->dyn_relocs == NULL)
446f2863 2089 return true;
30667bf3 2090
98ceb8ce
AM
2091 /* If this is a -Bsymbolic shared link, then we need to discard all
2092 space allocated for dynamic pc-relative relocs against symbols
2093 defined in a regular object. For the normal shared case, discard
2094 space for relocs that have become local due to symbol visibility
2095 changes. */
2096 if (info->shared)
446f2863 2097 {
98ceb8ce
AM
2098#if RELATIVE_DYNRELOCS
2099 if ((h->elf_link_hash_flags & ELF_LINK_HASH_DEF_REGULAR) != 0
2100 && ((h->elf_link_hash_flags & ELF_LINK_FORCED_LOCAL) != 0
2101 || info->symbolic))
446f2863 2102 {
98ceb8ce 2103 struct elf32_hppa_dyn_reloc_entry **pp;
30667bf3 2104
98ceb8ce
AM
2105 for (pp = &eh->dyn_relocs; (p = *pp) != NULL; )
2106 {
2107 p->count -= p->relative_count;
2108 p->relative_count = 0;
2109 if (p->count == 0)
2110 *pp = p->next;
2111 else
2112 pp = &p->next;
2113 }
2114 }
2115#endif
446f2863 2116 }
98ceb8ce 2117 else
30667bf3 2118 {
98ceb8ce
AM
2119 /* For the non-shared case, discard space for relocs against
2120 symbols which turn out to need copy relocs or are not
2121 dynamic. */
2122 if ((h->elf_link_hash_flags & ELF_LINK_NON_GOT_REF) == 0
2123 && (((h->elf_link_hash_flags & ELF_LINK_HASH_DEF_DYNAMIC) != 0
2124 && (h->elf_link_hash_flags & ELF_LINK_HASH_DEF_REGULAR) == 0)
ebe50bae 2125 || (htab->elf.dynamic_sections_created
98ceb8ce
AM
2126 && (h->root.type == bfd_link_hash_undefweak
2127 || h->root.type == bfd_link_hash_undefined))))
2128 {
2129 /* Make sure this symbol is output as a dynamic symbol.
2130 Undefined weak syms won't yet be marked as dynamic. */
2131 if (h->dynindx == -1
2132 && (h->elf_link_hash_flags & ELF_LINK_FORCED_LOCAL) == 0
2133 && h->type != STT_PARISC_MILLI)
2134 {
2135 if (! bfd_elf32_link_record_dynamic_symbol (info, h))
2136 return false;
2137 }
2138
2139 /* If that succeeded, we know we'll be keeping all the
2140 relocs. */
2141 if (h->dynindx != -1)
2142 goto keep;
2143 }
446f2863 2144
98ceb8ce
AM
2145 eh->dyn_relocs = NULL;
2146 return true;
2147
2148 keep:
30667bf3 2149 }
30667bf3 2150
98ceb8ce
AM
2151 /* Finally, allocate space. */
2152 for (p = eh->dyn_relocs; p != NULL; p = p->next)
30667bf3 2153 {
98ceb8ce
AM
2154 asection *sreloc = elf_section_data (p->sec)->sreloc;
2155 sreloc->_raw_size += p->count * sizeof (Elf32_External_Rela);
30667bf3 2156 }
30667bf3
AM
2157
2158 return true;
2159}
30667bf3 2160
d5c73c2f
AM
2161/* This function is called via elf_link_hash_traverse to force
2162 millicode symbols local so they do not end up as globals in the
2163 dynamic symbol table. We ought to be able to do this in
2164 adjust_dynamic_symbol, but our adjust_dynamic_symbol is not called
2165 for all dynamic symbols. Arguably, this is a bug in
2166 elf_adjust_dynamic_symbol. */
2167
2168static boolean
2169clobber_millicode_symbols (h, info)
2170 struct elf_link_hash_entry *h;
2171 struct bfd_link_info *info;
2172{
8dea1268
AM
2173 /* We only want to remove these from the dynamic symbol table.
2174 Therefore we do not leave ELF_LINK_FORCED_LOCAL set. */
d5c73c2f 2175 if (h->type == STT_PARISC_MILLI)
e0522e89
AM
2176 {
2177 unsigned short oldflags = h->elf_link_hash_flags;
2178 h->elf_link_hash_flags |= ELF_LINK_FORCED_LOCAL;
2179 elf32_hppa_hide_symbol (info, h);
2180 h->elf_link_hash_flags &= ~ELF_LINK_FORCED_LOCAL;
2181 h->elf_link_hash_flags |= oldflags & ELF_LINK_FORCED_LOCAL;
2182 }
d5c73c2f
AM
2183 return true;
2184}
2185
98ceb8ce
AM
2186/* Find any dynamic relocs that apply to read-only sections. */
2187
2188static boolean
2189readonly_dynrelocs (h, inf)
2190 struct elf_link_hash_entry *h;
2191 PTR inf;
2192{
2193 struct elf32_hppa_link_hash_entry *eh;
2194 struct elf32_hppa_dyn_reloc_entry *p;
2195
2196 eh = (struct elf32_hppa_link_hash_entry *) h;
2197 for (p = eh->dyn_relocs; p != NULL; p = p->next)
2198 {
2199 asection *s = p->sec->output_section;
2200
2201 if (s != NULL && (s->flags & SEC_READONLY) != 0)
2202 {
2203 struct bfd_link_info *info = (struct bfd_link_info *) inf;
2204
2205 info->flags |= DF_TEXTREL;
2206
2207 /* Not an error, just cut short the traversal. */
2208 return false;
2209 }
2210 }
2211 return true;
2212}
2213
30667bf3
AM
2214/* Set the sizes of the dynamic sections. */
2215
2216static boolean
2217elf32_hppa_size_dynamic_sections (output_bfd, info)
98ceb8ce 2218 bfd *output_bfd ATTRIBUTE_UNUSED;
30667bf3
AM
2219 struct bfd_link_info *info;
2220{
83c81bfe 2221 struct elf32_hppa_link_hash_table *htab;
30667bf3 2222 bfd *dynobj;
98ceb8ce 2223 bfd *ibfd;
30667bf3
AM
2224 asection *s;
2225 boolean relocs;
30667bf3 2226
83c81bfe 2227 htab = hppa_link_hash_table (info);
ebe50bae 2228 dynobj = htab->elf.dynobj;
49e9d0d3
AM
2229 if (dynobj == NULL)
2230 abort ();
30667bf3 2231
ebe50bae 2232 if (htab->elf.dynamic_sections_created)
30667bf3
AM
2233 {
2234 /* Set the contents of the .interp section to the interpreter. */
2235 if (! info->shared)
2236 {
2237 s = bfd_get_section_by_name (dynobj, ".interp");
49e9d0d3
AM
2238 if (s == NULL)
2239 abort ();
30667bf3
AM
2240 s->_raw_size = sizeof ELF_DYNAMIC_INTERPRETER;
2241 s->contents = (unsigned char *) ELF_DYNAMIC_INTERPRETER;
2242 }
74d1c347 2243
d5c73c2f 2244 /* Force millicode symbols local. */
ebe50bae 2245 elf_link_hash_traverse (&htab->elf,
d5c73c2f
AM
2246 clobber_millicode_symbols,
2247 info);
68fb2e56
AM
2248 }
2249 else
2250 {
2251 /* Run through the function symbols, looking for any that are
2252 PIC, and allocate space for the necessary .plt entries so
2253 that %r19 will be set up. */
2254 if (! info->shared)
ebe50bae 2255 elf_link_hash_traverse (&htab->elf,
68fb2e56
AM
2256 hppa_handle_PIC_calls,
2257 info);
2258 }
d5c73c2f 2259
98ceb8ce
AM
2260 /* Set up .got and .plt offsets for local syms, and space for local
2261 dynamic relocs. */
2262 for (ibfd = info->input_bfds; ibfd != NULL; ibfd = ibfd->link_next)
68fb2e56
AM
2263 {
2264 bfd_signed_vma *local_got;
2265 bfd_signed_vma *end_local_got;
2266 bfd_signed_vma *local_plt;
2267 bfd_signed_vma *end_local_plt;
2268 bfd_size_type locsymcount;
2269 Elf_Internal_Shdr *symtab_hdr;
2270 asection *srel;
74d1c347 2271
98ceb8ce 2272 if (bfd_get_flavour (ibfd) != bfd_target_elf_flavour)
68fb2e56 2273 continue;
4dc86686 2274
98ceb8ce
AM
2275 for (s = ibfd->sections; s != NULL; s = s->next)
2276 {
2277 bfd_size_type count = elf_section_data (s)->local_dynrel;
2278
2279 if (count != 0)
2280 {
2281 srel = elf_section_data (s)->sreloc;
2282 srel->_raw_size += count * sizeof (Elf32_External_Rela);
2283 }
2284 }
2285
2286 local_got = elf_local_got_refcounts (ibfd);
68fb2e56
AM
2287 if (!local_got)
2288 continue;
74d1c347 2289
98ceb8ce 2290 symtab_hdr = &elf_tdata (ibfd)->symtab_hdr;
68fb2e56
AM
2291 locsymcount = symtab_hdr->sh_info;
2292 end_local_got = local_got + locsymcount;
83c81bfe
AM
2293 s = htab->sgot;
2294 srel = htab->srelgot;
68fb2e56
AM
2295 for (; local_got < end_local_got; ++local_got)
2296 {
2297 if (*local_got > 0)
4dc86686 2298 {
68fb2e56
AM
2299 *local_got = s->_raw_size;
2300 s->_raw_size += GOT_ENTRY_SIZE;
2301 if (info->shared)
2302 srel->_raw_size += sizeof (Elf32_External_Rela);
4dc86686 2303 }
68fb2e56
AM
2304 else
2305 *local_got = (bfd_vma) -1;
2306 }
74d1c347 2307
68fb2e56
AM
2308 local_plt = end_local_got;
2309 end_local_plt = local_plt + locsymcount;
ebe50bae 2310 if (! htab->elf.dynamic_sections_created)
68fb2e56
AM
2311 {
2312 /* Won't be used, but be safe. */
2313 for (; local_plt < end_local_plt; ++local_plt)
2314 *local_plt = (bfd_vma) -1;
2315 }
2316 else
2317 {
83c81bfe
AM
2318 s = htab->splt;
2319 srel = htab->srelplt;
74d1c347
AM
2320 for (; local_plt < end_local_plt; ++local_plt)
2321 {
2322 if (*local_plt > 0)
2323 {
74d1c347
AM
2324 *local_plt = s->_raw_size;
2325 s->_raw_size += PLT_ENTRY_SIZE;
2326 if (info->shared)
4dc86686 2327 srel->_raw_size += sizeof (Elf32_External_Rela);
74d1c347
AM
2328 }
2329 else
2330 *local_plt = (bfd_vma) -1;
2331 }
2332 }
30667bf3 2333 }
30667bf3 2334
98ceb8ce
AM
2335 /* Allocate global sym .plt and .got entries, and space for global
2336 sym dynamic relocs. */
ebe50bae 2337 elf_link_hash_traverse (&htab->elf, allocate_dynrelocs, (PTR) info);
30667bf3
AM
2338
2339 /* The check_relocs and adjust_dynamic_symbol entry points have
2340 determined the sizes of the various dynamic sections. Allocate
2341 memory for them. */
2342 relocs = false;
30667bf3
AM
2343 for (s = dynobj->sections; s != NULL; s = s->next)
2344 {
30667bf3
AM
2345 if ((s->flags & SEC_LINKER_CREATED) == 0)
2346 continue;
2347
83c81bfe 2348 if (s == htab->splt)
68fb2e56 2349 {
83c81bfe 2350 if (htab->need_plt_stub)
68fb2e56
AM
2351 {
2352 /* Make space for the plt stub at the end of the .plt
2353 section. We want this stub right at the end, up
2354 against the .got section. */
83c81bfe 2355 int gotalign = bfd_section_alignment (dynobj, htab->sgot);
68fb2e56
AM
2356 int pltalign = bfd_section_alignment (dynobj, s);
2357 bfd_size_type mask;
30667bf3 2358
68fb2e56
AM
2359 if (gotalign > pltalign)
2360 bfd_set_section_alignment (dynobj, s, gotalign);
2361 mask = ((bfd_size_type) 1 << gotalign) - 1;
2362 s->_raw_size = (s->_raw_size + sizeof (plt_stub) + mask) & ~mask;
2363 }
2364 }
83c81bfe 2365 else if (s == htab->sgot)
68fb2e56
AM
2366 ;
2367 else if (strncmp (bfd_get_section_name (dynobj, s), ".rela", 5) == 0)
30667bf3
AM
2368 {
2369 if (s->_raw_size != 0)
2370 {
4e12ff7f
AM
2371 /* Remember whether there are any reloc sections other
2372 than .rela.plt. */
2373 if (s != htab->srelplt)
2374 relocs = true;
47d89dba 2375
30667bf3
AM
2376 /* We use the reloc_count field as a counter if we need
2377 to copy relocs into the output file. */
2378 s->reloc_count = 0;
2379 }
2380 }
30667bf3
AM
2381 else
2382 {
2383 /* It's not one of our sections, so don't allocate space. */
2384 continue;
2385 }
2386
2387 if (s->_raw_size == 0)
2388 {
2389 /* If we don't need this section, strip it from the
2390 output file. This is mostly to handle .rela.bss and
2391 .rela.plt. We must create both sections in
2392 create_dynamic_sections, because they must be created
2393 before the linker maps input sections to output
2394 sections. The linker does that before
2395 adjust_dynamic_symbol is called, and it is that
2396 function which decides whether anything needs to go
2397 into these sections. */
2398 _bfd_strip_section_from_output (info, s);
2399 continue;
2400 }
2401
2402 /* Allocate memory for the section contents. Zero it, because
2403 we may not fill in all the reloc sections. */
2404 s->contents = (bfd_byte *) bfd_zalloc (dynobj, s->_raw_size);
2405 if (s->contents == NULL && s->_raw_size != 0)
2406 return false;
2407 }
2408
ebe50bae 2409 if (htab->elf.dynamic_sections_created)
30667bf3
AM
2410 {
2411 /* Like IA-64 and HPPA64, always create a DT_PLTGOT. It
2412 actually has nothing to do with the PLT, it is how we
2413 communicate the LTP value of a load module to the dynamic
2414 linker. */
dc810e39
AM
2415#define add_dynamic_entry(TAG, VAL) \
2416 bfd_elf32_add_dynamic_entry (info, (bfd_vma) (TAG), (bfd_vma) (VAL))
2417
2418 if (!add_dynamic_entry (DT_PLTGOT, 0))
30667bf3
AM
2419 return false;
2420
2421 /* Add some entries to the .dynamic section. We fill in the
2422 values later, in elf32_hppa_finish_dynamic_sections, but we
2423 must add the entries now so that we get the correct size for
2424 the .dynamic section. The DT_DEBUG entry is filled in by the
2425 dynamic linker and used by the debugger. */
dc810e39 2426 if (!info->shared)
30667bf3 2427 {
dc810e39 2428 if (!add_dynamic_entry (DT_DEBUG, 0))
30667bf3
AM
2429 return false;
2430 }
2431
83c81bfe 2432 if (htab->srelplt->_raw_size != 0)
30667bf3 2433 {
dc810e39
AM
2434 if (!add_dynamic_entry (DT_PLTRELSZ, 0)
2435 || !add_dynamic_entry (DT_PLTREL, DT_RELA)
2436 || !add_dynamic_entry (DT_JMPREL, 0))
30667bf3
AM
2437 return false;
2438 }
2439
2440 if (relocs)
2441 {
dc810e39
AM
2442 if (!add_dynamic_entry (DT_RELA, 0)
2443 || !add_dynamic_entry (DT_RELASZ, 0)
2444 || !add_dynamic_entry (DT_RELAENT, sizeof (Elf32_External_Rela)))
30667bf3 2445 return false;
30667bf3 2446
98ceb8ce
AM
2447 /* If any dynamic relocs apply to a read-only section,
2448 then we need a DT_TEXTREL entry. */
ebe50bae 2449 elf_link_hash_traverse (&htab->elf, readonly_dynrelocs, (PTR) info);
98ceb8ce
AM
2450
2451 if ((info->flags & DF_TEXTREL) != 0)
2452 {
2453 if (!add_dynamic_entry (DT_TEXTREL, 0))
2454 return false;
2455 }
30667bf3
AM
2456 }
2457 }
dc810e39 2458#undef add_dynamic_entry
30667bf3
AM
2459
2460 return true;
2461}
2462
30667bf3
AM
2463/* External entry points for sizing and building linker stubs. */
2464
2465/* Determine and set the size of the stub section for a final link.
2466
2467 The basic idea here is to examine all the relocations looking for
2468 PC-relative calls to a target that is unreachable with a "bl"
2469 instruction. */
2470
2471boolean
47d89dba 2472elf32_hppa_size_stubs (output_bfd, stub_bfd, info, multi_subspace, group_size,
30667bf3 2473 add_stub_section, layout_sections_again)
25f72752 2474 bfd *output_bfd;
30667bf3 2475 bfd *stub_bfd;
30667bf3 2476 struct bfd_link_info *info;
25f72752 2477 boolean multi_subspace;
47d89dba 2478 bfd_signed_vma group_size;
30667bf3
AM
2479 asection * (*add_stub_section) PARAMS ((const char *, asection *));
2480 void (*layout_sections_again) PARAMS ((void));
2481{
2482 bfd *input_bfd;
2483 asection *section;
25f72752 2484 asection **input_list, **list;
30667bf3 2485 Elf_Internal_Sym *local_syms, **all_local_syms;
25f72752
AM
2486 unsigned int bfd_indx, bfd_count;
2487 int top_id, top_index;
83c81bfe 2488 struct elf32_hppa_link_hash_table *htab;
47d89dba
AM
2489 bfd_size_type stub_group_size;
2490 boolean stubs_always_before_branch;
30667bf3 2491 boolean stub_changed = 0;
25f72752 2492 boolean ret = 0;
dc810e39 2493 bfd_size_type amt;
30667bf3 2494
83c81bfe 2495 htab = hppa_link_hash_table (info);
30667bf3
AM
2496
2497 /* Stash our params away. */
83c81bfe
AM
2498 htab->stub_bfd = stub_bfd;
2499 htab->multi_subspace = multi_subspace;
2500 htab->add_stub_section = add_stub_section;
2501 htab->layout_sections_again = layout_sections_again;
47d89dba
AM
2502 stubs_always_before_branch = group_size < 0;
2503 if (group_size < 0)
2504 stub_group_size = -group_size;
2505 else
2506 stub_group_size = group_size;
2507 if (stub_group_size == 1)
2508 {
2509 /* Default values. */
2510 stub_group_size = 8000000;
83c81bfe 2511 if (htab->has_17bit_branch || htab->multi_subspace)
47d89dba 2512 stub_group_size = 250000;
83c81bfe 2513 if (htab->has_12bit_branch)
47d89dba
AM
2514 stub_group_size = 7812;
2515 }
30667bf3 2516
1badb539
AM
2517 /* Count the number of input BFDs and find the top input section id. */
2518 for (input_bfd = info->input_bfds, bfd_count = 0, top_id = 0;
30667bf3
AM
2519 input_bfd != NULL;
2520 input_bfd = input_bfd->link_next)
2521 {
2522 bfd_count += 1;
25f72752
AM
2523 for (section = input_bfd->sections;
2524 section != NULL;
2525 section = section->next)
2526 {
2527 if (top_id < section->id)
2528 top_id = section->id;
2529 }
30667bf3
AM
2530 }
2531
dc810e39 2532 amt = sizeof (struct map_stub) * (top_id + 1);
83c81bfe
AM
2533 htab->stub_group = (struct map_stub *) bfd_zmalloc (amt);
2534 if (htab->stub_group == NULL)
30667bf3
AM
2535 return false;
2536
1badb539
AM
2537 /* Make a list of input sections for each output section included in
2538 the link.
2539
2540 We can't use output_bfd->section_count here to find the top output
2541 section index as some sections may have been removed, and
2542 _bfd_strip_section_from_output doesn't renumber the indices. */
2543 for (section = output_bfd->sections, top_index = 0;
2544 section != NULL;
2545 section = section->next)
2546 {
2547 if (top_index < section->index)
2548 top_index = section->index;
2549 }
2550
dc810e39
AM
2551 amt = sizeof (asection *) * (top_index + 1);
2552 input_list = (asection **) bfd_malloc (amt);
25f72752
AM
2553 if (input_list == NULL)
2554 return false;
2555
1badb539
AM
2556 /* For sections we aren't interested in, mark their entries with a
2557 value we can check later. */
2558 list = input_list + top_index;
2559 do
2560 *list = bfd_abs_section_ptr;
2561 while (list-- != input_list);
2562
2563 for (section = output_bfd->sections;
2564 section != NULL;
2565 section = section->next)
2566 {
47d89dba 2567 if ((section->flags & SEC_CODE) != 0)
1badb539
AM
2568 input_list[section->index] = NULL;
2569 }
2570
2571 /* Now actually build the lists. */
25f72752
AM
2572 for (input_bfd = info->input_bfds;
2573 input_bfd != NULL;
2574 input_bfd = input_bfd->link_next)
2575 {
2576 for (section = input_bfd->sections;
2577 section != NULL;
2578 section = section->next)
2579 {
2580 if (section->output_section != NULL
1badb539
AM
2581 && section->output_section->owner == output_bfd
2582 && section->output_section->index <= top_index)
25f72752
AM
2583 {
2584 list = input_list + section->output_section->index;
1badb539
AM
2585 if (*list != bfd_abs_section_ptr)
2586 {
2587 /* Steal the link_sec pointer for our list. */
83c81bfe 2588#define PREV_SEC(sec) (htab->stub_group[(sec)->id].link_sec)
1badb539
AM
2589 /* This happens to make the list in reverse order,
2590 which is what we want. */
2591 PREV_SEC (section) = *list;
2592 *list = section;
2593 }
25f72752
AM
2594 }
2595 }
2596 }
2597
2598 /* See whether we can group stub sections together. Grouping stub
2599 sections may result in fewer stubs. More importantly, we need to
2600 put all .init* and .fini* stubs at the beginning of the .init or
2601 .fini output sections respectively, because glibc splits the
2602 _init and _fini functions into multiple parts. Putting a stub in
2603 the middle of a function is not a good idea. */
a017a724 2604 list = input_list + top_index;
1badb539 2605 do
25f72752
AM
2606 {
2607 asection *tail = *list;
1badb539
AM
2608 if (tail == bfd_abs_section_ptr)
2609 continue;
25f72752
AM
2610 while (tail != NULL)
2611 {
2612 asection *curr;
2613 asection *prev;
2614 bfd_size_type total;
2615
2616 curr = tail;
2617 if (tail->_cooked_size)
2618 total = tail->_cooked_size;
2619 else
2620 total = tail->_raw_size;
2621 while ((prev = PREV_SEC (curr)) != NULL
2622 && ((total += curr->output_offset - prev->output_offset)
47d89dba 2623 < stub_group_size))
25f72752
AM
2624 curr = prev;
2625
2626 /* OK, the size from the start of CURR to the end is less
2627 than 250000 bytes and thus can be handled by one stub
2628 section. (or the tail section is itself larger than
2629 250000 bytes, in which case we may be toast.)
2630 We should really be keeping track of the total size of
2631 stubs added here, as stubs contribute to the final output
2632 section size. That's a little tricky, and this way will
2633 only break if stubs added total more than 12144 bytes, or
2634 1518 long branch stubs. It seems unlikely for more than
2635 1518 different functions to be called, especially from
2636 code only 250000 bytes long. */
2637 do
2638 {
2639 prev = PREV_SEC (tail);
2640 /* Set up this stub group. */
83c81bfe 2641 htab->stub_group[tail->id].link_sec = curr;
25f72752
AM
2642 }
2643 while (tail != curr && (tail = prev) != NULL);
2644
2645 /* But wait, there's more! Input sections up to 250000
2646 bytes before the stub section can be handled by it too. */
47d89dba 2647 if (!stubs_always_before_branch)
25f72752 2648 {
47d89dba
AM
2649 total = 0;
2650 while (prev != NULL
2651 && ((total += tail->output_offset - prev->output_offset)
2652 < stub_group_size))
2653 {
2654 tail = prev;
2655 prev = PREV_SEC (tail);
83c81bfe 2656 htab->stub_group[tail->id].link_sec = curr;
47d89dba 2657 }
25f72752
AM
2658 }
2659 tail = prev;
2660 }
2661 }
1badb539 2662 while (list-- != input_list);
25f72752 2663 free (input_list);
1badb539 2664#undef PREV_SEC
30667bf3
AM
2665
2666 /* We want to read in symbol extension records only once. To do this
2667 we need to read in the local symbols in parallel and save them for
2668 later use; so hold pointers to the local symbols in an array. */
dc810e39
AM
2669 amt = sizeof (Elf_Internal_Sym *) * bfd_count;
2670 all_local_syms = (Elf_Internal_Sym **) bfd_zmalloc (amt);
30667bf3 2671 if (all_local_syms == NULL)
25f72752 2672 return false;
30667bf3
AM
2673
2674 /* Walk over all the input BFDs, swapping in local symbols.
2675 If we are creating a shared library, create hash entries for the
2676 export stubs. */
25f72752 2677 for (input_bfd = info->input_bfds, bfd_indx = 0;
30667bf3 2678 input_bfd != NULL;
25f72752 2679 input_bfd = input_bfd->link_next, bfd_indx++)
30667bf3
AM
2680 {
2681 Elf_Internal_Shdr *symtab_hdr;
2682 Elf_Internal_Sym *isym;
25f72752 2683 Elf32_External_Sym *ext_syms, *esym, *end_sy;
dc810e39 2684 bfd_size_type sec_size;
edd21aca 2685
252b5132
RH
2686 /* We'll need the symbol table in a second. */
2687 symtab_hdr = &elf_tdata (input_bfd)->symtab_hdr;
2688 if (symtab_hdr->sh_info == 0)
2689 continue;
2690
edd21aca
AM
2691 /* We need an array of the local symbols attached to the input bfd.
2692 Unfortunately, we're going to have to read & swap them in. */
dc810e39
AM
2693 sec_size = symtab_hdr->sh_info;
2694 sec_size *= sizeof (Elf_Internal_Sym);
2695 local_syms = (Elf_Internal_Sym *) bfd_malloc (sec_size);
edd21aca
AM
2696 if (local_syms == NULL)
2697 {
2698 goto error_ret_free_local;
2699 }
25f72752 2700 all_local_syms[bfd_indx] = local_syms;
dc810e39
AM
2701 sec_size = symtab_hdr->sh_info;
2702 sec_size *= sizeof (Elf32_External_Sym);
2703 ext_syms = (Elf32_External_Sym *) bfd_malloc (sec_size);
edd21aca
AM
2704 if (ext_syms == NULL)
2705 {
2706 goto error_ret_free_local;
2707 }
2708
2709 if (bfd_seek (input_bfd, symtab_hdr->sh_offset, SEEK_SET) != 0
dc810e39 2710 || (bfd_bread (ext_syms, sec_size, input_bfd) != sec_size))
edd21aca
AM
2711 {
2712 free (ext_syms);
2713 goto error_ret_free_local;
2714 }
2715
2716 /* Swap the local symbols in. */
2717 isym = local_syms;
2718 esym = ext_syms;
25f72752 2719 for (end_sy = esym + symtab_hdr->sh_info; esym < end_sy; esym++, isym++)
edd21aca
AM
2720 bfd_elf32_swap_symbol_in (input_bfd, esym, isym);
2721
2722 /* Now we can free the external symbols. */
2723 free (ext_syms);
edd21aca 2724
83c81bfe 2725 if (info->shared && htab->multi_subspace)
30667bf3 2726 {
25f72752
AM
2727 struct elf_link_hash_entry **sym_hashes;
2728 struct elf_link_hash_entry **end_hashes;
30667bf3
AM
2729 unsigned int symcount;
2730
2731 symcount = (symtab_hdr->sh_size / sizeof (Elf32_External_Sym)
2732 - symtab_hdr->sh_info);
25f72752
AM
2733 sym_hashes = elf_sym_hashes (input_bfd);
2734 end_hashes = sym_hashes + symcount;
30667bf3
AM
2735
2736 /* Look through the global syms for functions; We need to
2737 build export stubs for all globally visible functions. */
25f72752 2738 for (; sym_hashes < end_hashes; sym_hashes++)
30667bf3
AM
2739 {
2740 struct elf32_hppa_link_hash_entry *hash;
2741
25f72752 2742 hash = (struct elf32_hppa_link_hash_entry *) *sym_hashes;
30667bf3
AM
2743
2744 while (hash->elf.root.type == bfd_link_hash_indirect
2745 || hash->elf.root.type == bfd_link_hash_warning)
2746 hash = ((struct elf32_hppa_link_hash_entry *)
2747 hash->elf.root.u.i.link);
2748
2749 /* At this point in the link, undefined syms have been
2750 resolved, so we need to check that the symbol was
2751 defined in this BFD. */
2752 if ((hash->elf.root.type == bfd_link_hash_defined
2753 || hash->elf.root.type == bfd_link_hash_defweak)
2754 && hash->elf.type == STT_FUNC
2755 && hash->elf.root.u.def.section->output_section != NULL
25f72752
AM
2756 && (hash->elf.root.u.def.section->output_section->owner
2757 == output_bfd)
30667bf3
AM
2758 && hash->elf.root.u.def.section->owner == input_bfd
2759 && (hash->elf.elf_link_hash_flags & ELF_LINK_HASH_DEF_REGULAR)
2760 && !(hash->elf.elf_link_hash_flags & ELF_LINK_FORCED_LOCAL)
2761 && ELF_ST_VISIBILITY (hash->elf.other) == STV_DEFAULT)
2762 {
2763 asection *sec;
2764 const char *stub_name;
2765 struct elf32_hppa_stub_hash_entry *stub_entry;
2766
2767 sec = hash->elf.root.u.def.section;
2768 stub_name = hash->elf.root.root.string;
83c81bfe 2769 stub_entry = hppa_stub_hash_lookup (&htab->stub_hash_table,
30667bf3
AM
2770 stub_name,
2771 false, false);
2772 if (stub_entry == NULL)
2773 {
83c81bfe 2774 stub_entry = hppa_add_stub (stub_name, sec, htab);
30667bf3
AM
2775 if (!stub_entry)
2776 goto error_ret_free_local;
2777
2778 stub_entry->target_value = hash->elf.root.u.def.value;
2779 stub_entry->target_section = hash->elf.root.u.def.section;
2780 stub_entry->stub_type = hppa_stub_export;
2781 stub_entry->h = hash;
2782 stub_changed = 1;
2783 }
2784 else
2785 {
2786 (*_bfd_error_handler) (_("%s: duplicate export stub %s"),
8f615d07
AM
2787 bfd_archive_filename (input_bfd),
2788 stub_name);
30667bf3
AM
2789 }
2790 }
2791 }
30667bf3
AM
2792 }
2793 }
edd21aca
AM
2794
2795 while (1)
2796 {
30667bf3
AM
2797 asection *stub_sec;
2798
25f72752 2799 for (input_bfd = info->input_bfds, bfd_indx = 0;
30667bf3 2800 input_bfd != NULL;
25f72752 2801 input_bfd = input_bfd->link_next, bfd_indx++)
30667bf3
AM
2802 {
2803 Elf_Internal_Shdr *symtab_hdr;
2804
2805 /* We'll need the symbol table in a second. */
2806 symtab_hdr = &elf_tdata (input_bfd)->symtab_hdr;
2807 if (symtab_hdr->sh_info == 0)
2808 continue;
2809
25f72752 2810 local_syms = all_local_syms[bfd_indx];
30667bf3
AM
2811
2812 /* Walk over each section attached to the input bfd. */
2813 for (section = input_bfd->sections;
2814 section != NULL;
25f72752 2815 section = section->next)
30667bf3
AM
2816 {
2817 Elf_Internal_Shdr *input_rel_hdr;
2818 Elf32_External_Rela *external_relocs, *erelaend, *erela;
2819 Elf_Internal_Rela *internal_relocs, *irelaend, *irela;
2820
2821 /* If there aren't any relocs, then there's nothing more
2822 to do. */
2823 if ((section->flags & SEC_RELOC) == 0
2824 || section->reloc_count == 0)
2825 continue;
2826
25f72752
AM
2827 /* If this section is a link-once section that will be
2828 discarded, then don't create any stubs. */
2829 if (section->output_section == NULL
2830 || section->output_section->owner != output_bfd)
2831 continue;
2832
30667bf3 2833 /* Allocate space for the external relocations. */
dc810e39
AM
2834 amt = section->reloc_count;
2835 amt *= sizeof (Elf32_External_Rela);
2836 external_relocs = (Elf32_External_Rela *) bfd_malloc (amt);
30667bf3
AM
2837 if (external_relocs == NULL)
2838 {
2839 goto error_ret_free_local;
2840 }
2841
2842 /* Likewise for the internal relocations. */
dc810e39
AM
2843 amt = section->reloc_count;
2844 amt *= sizeof (Elf_Internal_Rela);
2845 internal_relocs = (Elf_Internal_Rela *) bfd_malloc (amt);
30667bf3
AM
2846 if (internal_relocs == NULL)
2847 {
2848 free (external_relocs);
2849 goto error_ret_free_local;
2850 }
2851
2852 /* Read in the external relocs. */
2853 input_rel_hdr = &elf_section_data (section)->rel_hdr;
2854 if (bfd_seek (input_bfd, input_rel_hdr->sh_offset, SEEK_SET) != 0
dc810e39 2855 || bfd_bread (external_relocs,
30667bf3
AM
2856 input_rel_hdr->sh_size,
2857 input_bfd) != input_rel_hdr->sh_size)
2858 {
2859 free (external_relocs);
2860 error_ret_free_internal:
2861 free (internal_relocs);
2862 goto error_ret_free_local;
2863 }
2864
2865 /* Swap in the relocs. */
2866 erela = external_relocs;
2867 erelaend = erela + section->reloc_count;
2868 irela = internal_relocs;
2869 for (; erela < erelaend; erela++, irela++)
2870 bfd_elf32_swap_reloca_in (input_bfd, erela, irela);
2871
2872 /* We're done with the external relocs, free them. */
2873 free (external_relocs);
2874
2875 /* Now examine each relocation. */
2876 irela = internal_relocs;
2877 irelaend = irela + section->reloc_count;
2878 for (; irela < irelaend; irela++)
2879 {
2880 unsigned int r_type, r_indx;
2881 enum elf32_hppa_stub_type stub_type;
2882 struct elf32_hppa_stub_hash_entry *stub_entry;
2883 asection *sym_sec;
2884 bfd_vma sym_value;
2885 bfd_vma destination;
2886 struct elf32_hppa_link_hash_entry *hash;
2887 char *stub_name;
25f72752 2888 const asection *id_sec;
30667bf3
AM
2889
2890 r_type = ELF32_R_TYPE (irela->r_info);
2891 r_indx = ELF32_R_SYM (irela->r_info);
2892
2893 if (r_type >= (unsigned int) R_PARISC_UNIMPLEMENTED)
2894 {
2895 bfd_set_error (bfd_error_bad_value);
2896 goto error_ret_free_internal;
2897 }
2898
2899 /* Only look for stubs on call instructions. */
2900 if (r_type != (unsigned int) R_PARISC_PCREL12F
2901 && r_type != (unsigned int) R_PARISC_PCREL17F
2902 && r_type != (unsigned int) R_PARISC_PCREL22F)
2903 continue;
2904
2905 /* Now determine the call target, its name, value,
2906 section. */
2907 sym_sec = NULL;
2908 sym_value = 0;
2909 destination = 0;
2910 hash = NULL;
2911 if (r_indx < symtab_hdr->sh_info)
2912 {
2913 /* It's a local symbol. */
2914 Elf_Internal_Sym *sym;
2915 Elf_Internal_Shdr *hdr;
2916
2917 sym = local_syms + r_indx;
2918 hdr = elf_elfsections (input_bfd)[sym->st_shndx];
2919 sym_sec = hdr->bfd_section;
2920 if (ELF_ST_TYPE (sym->st_info) != STT_SECTION)
2921 sym_value = sym->st_value;
2922 destination = (sym_value + irela->r_addend
2923 + sym_sec->output_offset
2924 + sym_sec->output_section->vma);
2925 }
2926 else
2927 {
2928 /* It's an external symbol. */
2929 int e_indx;
2930
2931 e_indx = r_indx - symtab_hdr->sh_info;
2932 hash = ((struct elf32_hppa_link_hash_entry *)
2933 elf_sym_hashes (input_bfd)[e_indx]);
2934
2935 while (hash->elf.root.type == bfd_link_hash_indirect
2936 || hash->elf.root.type == bfd_link_hash_warning)
2937 hash = ((struct elf32_hppa_link_hash_entry *)
2938 hash->elf.root.u.i.link);
2939
2940 if (hash->elf.root.type == bfd_link_hash_defined
2941 || hash->elf.root.type == bfd_link_hash_defweak)
2942 {
2943 sym_sec = hash->elf.root.u.def.section;
2944 sym_value = hash->elf.root.u.def.value;
2945 if (sym_sec->output_section != NULL)
2946 destination = (sym_value + irela->r_addend
2947 + sym_sec->output_offset
2948 + sym_sec->output_section->vma);
2949 }
2950 else if (hash->elf.root.type == bfd_link_hash_undefweak)
2951 {
2952 if (! info->shared)
2953 continue;
2954 }
2955 else if (hash->elf.root.type == bfd_link_hash_undefined)
2956 {
2957 if (! (info->shared
2958 && !info->no_undefined
2959 && (ELF_ST_VISIBILITY (hash->elf.other)
2960 == STV_DEFAULT)))
2961 continue;
2962 }
2963 else
2964 {
2965 bfd_set_error (bfd_error_bad_value);
2966 goto error_ret_free_internal;
2967 }
2968 }
2969
2970 /* Determine what (if any) linker stub is needed. */
2971 stub_type = hppa_type_of_stub (section, irela, hash,
2972 destination);
2973 if (stub_type == hppa_stub_none)
2974 continue;
2975
25f72752 2976 /* Support for grouping stub sections. */
83c81bfe 2977 id_sec = htab->stub_group[section->id].link_sec;
25f72752 2978
30667bf3 2979 /* Get the name of this stub. */
25f72752 2980 stub_name = hppa_stub_name (id_sec, sym_sec, hash, irela);
30667bf3
AM
2981 if (!stub_name)
2982 goto error_ret_free_internal;
2983
83c81bfe 2984 stub_entry = hppa_stub_hash_lookup (&htab->stub_hash_table,
30667bf3
AM
2985 stub_name,
2986 false, false);
2987 if (stub_entry != NULL)
2988 {
2989 /* The proper stub has already been created. */
2990 free (stub_name);
2991 continue;
2992 }
2993
83c81bfe 2994 stub_entry = hppa_add_stub (stub_name, section, htab);
30667bf3
AM
2995 if (stub_entry == NULL)
2996 {
2997 free (stub_name);
2998 goto error_ret_free_local;
2999 }
3000
3001 stub_entry->target_value = sym_value;
3002 stub_entry->target_section = sym_sec;
3003 stub_entry->stub_type = stub_type;
3004 if (info->shared)
3005 {
3006 if (stub_type == hppa_stub_import)
3007 stub_entry->stub_type = hppa_stub_import_shared;
98ceb8ce 3008 else if (stub_type == hppa_stub_long_branch)
30667bf3
AM
3009 stub_entry->stub_type = hppa_stub_long_branch_shared;
3010 }
3011 stub_entry->h = hash;
3012 stub_changed = 1;
3013 }
3014
3015 /* We're done with the internal relocs, free them. */
3016 free (internal_relocs);
3017 }
3018 }
3019
3020 if (!stub_changed)
3021 break;
3022
3023 /* OK, we've added some stubs. Find out the new size of the
3024 stub sections. */
83c81bfe 3025 for (stub_sec = htab->stub_bfd->sections;
30667bf3
AM
3026 stub_sec != NULL;
3027 stub_sec = stub_sec->next)
3028 {
74d1c347
AM
3029 stub_sec->_raw_size = 0;
3030 stub_sec->_cooked_size = 0;
3031 }
74d1c347 3032
83c81bfe 3033 bfd_hash_traverse (&htab->stub_hash_table, hppa_size_one_stub, htab);
74d1c347 3034
30667bf3 3035 /* Ask the linker to do its stuff. */
83c81bfe 3036 (*htab->layout_sections_again) ();
30667bf3
AM
3037 stub_changed = 0;
3038 }
3039
25f72752 3040 ret = 1;
30667bf3
AM
3041
3042 error_ret_free_local:
25f72752
AM
3043 while (bfd_count-- > 0)
3044 if (all_local_syms[bfd_count])
3045 free (all_local_syms[bfd_count]);
30667bf3
AM
3046 free (all_local_syms);
3047
25f72752 3048 return ret;
30667bf3
AM
3049}
3050
30667bf3
AM
3051/* For a final link, this function is called after we have sized the
3052 stubs to provide a value for __gp. */
3053
3054boolean
3055elf32_hppa_set_gp (abfd, info)
3056 bfd *abfd;
3057 struct bfd_link_info *info;
3058{
83c81bfe 3059 struct elf32_hppa_link_hash_table *htab;
30667bf3
AM
3060 struct elf_link_hash_entry *h;
3061 asection *sec;
3062 bfd_vma gp_val;
3063
83c81bfe 3064 htab = hppa_link_hash_table (info);
ebe50bae 3065 h = elf_link_hash_lookup (&htab->elf, "$global$", false, false, false);
30667bf3 3066
df8634e3
AM
3067 if (h != NULL
3068 && (h->root.type == bfd_link_hash_defined
3069 || h->root.type == bfd_link_hash_defweak))
30667bf3
AM
3070 {
3071 gp_val = h->root.u.def.value;
3072 sec = h->root.u.def.section;
3073 }
3074 else
3075 {
74d1c347
AM
3076 /* Choose to point our LTP at, in this order, one of .plt, .got,
3077 or .data, if these sections exist. In the case of choosing
3078 .plt try to make the LTP ideal for addressing anywhere in the
3079 .plt or .got with a 14 bit signed offset. Typically, the end
3080 of the .plt is the start of the .got, so choose .plt + 0x2000
3081 if either the .plt or .got is larger than 0x2000. If both
3082 the .plt and .got are smaller than 0x2000, choose the end of
3083 the .plt section. */
3084
83c81bfe 3085 sec = htab->splt;
74d1c347 3086 if (sec != NULL)
30667bf3 3087 {
74d1c347
AM
3088 gp_val = sec->_raw_size;
3089 if (gp_val > 0x2000
83c81bfe 3090 || (htab->sgot && htab->sgot->_raw_size > 0x2000))
74d1c347
AM
3091 {
3092 gp_val = 0x2000;
3093 }
3094 }
3095 else
3096 {
3097 gp_val = 0;
83c81bfe 3098 sec = htab->sgot;
74d1c347
AM
3099 if (sec != NULL)
3100 {
3101 /* We know we don't have a .plt. If .got is large,
3102 offset our LTP. */
3103 if (sec->_raw_size > 0x2000)
3104 gp_val = 0x2000;
3105 }
3106 else
3107 {
3108 /* No .plt or .got. Who cares what the LTP is? */
3109 sec = bfd_get_section_by_name (abfd, ".data");
3110 }
30667bf3 3111 }
df8634e3
AM
3112
3113 if (h != NULL)
3114 {
3115 h->root.type = bfd_link_hash_defined;
3116 h->root.u.def.value = gp_val;
3117 if (sec != NULL)
3118 h->root.u.def.section = sec;
3119 else
3120 h->root.u.def.section = bfd_abs_section_ptr;
3121 }
30667bf3
AM
3122 }
3123
b32b5d6e 3124 if (sec != NULL && sec->output_section != NULL)
74d1c347
AM
3125 gp_val += sec->output_section->vma + sec->output_offset;
3126
3127 elf_gp (abfd) = gp_val;
30667bf3
AM
3128 return true;
3129}
3130
30667bf3
AM
3131/* Build all the stubs associated with the current output file. The
3132 stubs are kept in a hash table attached to the main linker hash
3133 table. We also set up the .plt entries for statically linked PIC
3134 functions here. This function is called via hppaelf_finish in the
3135 linker. */
3136
3137boolean
3138elf32_hppa_build_stubs (info)
3139 struct bfd_link_info *info;
3140{
3141 asection *stub_sec;
3142 struct bfd_hash_table *table;
83c81bfe 3143 struct elf32_hppa_link_hash_table *htab;
30667bf3 3144
83c81bfe 3145 htab = hppa_link_hash_table (info);
30667bf3 3146
83c81bfe 3147 for (stub_sec = htab->stub_bfd->sections;
30667bf3
AM
3148 stub_sec != NULL;
3149 stub_sec = stub_sec->next)
3150 {
dc810e39 3151 bfd_size_type size;
30667bf3
AM
3152
3153 /* Allocate memory to hold the linker stubs. */
74d1c347 3154 size = stub_sec->_raw_size;
83c81bfe 3155 stub_sec->contents = (unsigned char *) bfd_zalloc (htab->stub_bfd, size);
30667bf3
AM
3156 if (stub_sec->contents == NULL && size != 0)
3157 return false;
74d1c347 3158 stub_sec->_raw_size = 0;
30667bf3
AM
3159 }
3160
3161 /* Build the stubs as directed by the stub hash table. */
83c81bfe 3162 table = &htab->stub_hash_table;
30667bf3
AM
3163 bfd_hash_traverse (table, hppa_build_one_stub, info);
3164
3165 return true;
3166}
3167
c46b7515
AM
3168/* Perform a final link. */
3169
3170static boolean
3171elf32_hppa_final_link (abfd, info)
3172 bfd *abfd;
3173 struct bfd_link_info *info;
3174{
3175 asection *s;
3176
4dc86686
AM
3177 /* Invoke the regular ELF linker to do all the work. */
3178 if (!bfd_elf32_bfd_final_link (abfd, info))
c46b7515
AM
3179 return false;
3180
3181 /* If we're producing a final executable, sort the contents of the
3182 unwind section. Magic section names, but this is much safer than
3183 having elf32_hppa_relocate_section remember where SEGREL32 relocs
3184 occurred. Consider what happens if someone inept creates a
3185 linker script that puts unwind information in .text. */
3186 s = bfd_get_section_by_name (abfd, ".PARISC.unwind");
3187 if (s != NULL)
3188 {
3189 bfd_size_type size;
3190 char *contents;
3191
3192 size = s->_raw_size;
3193 contents = bfd_malloc (size);
3194 if (contents == NULL)
3195 return false;
3196
3197 if (! bfd_get_section_contents (abfd, s, contents, (file_ptr) 0, size))
3198 return false;
3199
dc810e39 3200 qsort (contents, (size_t) (size / 16), 16, hppa_unwind_entry_compare);
c46b7515
AM
3201
3202 if (! bfd_set_section_contents (abfd, s, contents, (file_ptr) 0, size))
3203 return false;
3204 }
3205 return true;
3206}
3207
3208/* Record the lowest address for the data and text segments. */
3209
3210static void
3211hppa_record_segment_addr (abfd, section, data)
3212 bfd *abfd ATTRIBUTE_UNUSED;
3213 asection *section;
3214 PTR data;
3215{
83c81bfe 3216 struct elf32_hppa_link_hash_table *htab;
c46b7515 3217
83c81bfe 3218 htab = (struct elf32_hppa_link_hash_table *) data;
c46b7515
AM
3219
3220 if ((section->flags & (SEC_ALLOC | SEC_LOAD)) == (SEC_ALLOC | SEC_LOAD))
3221 {
3222 bfd_vma value = section->vma - section->filepos;
3223
3224 if ((section->flags & SEC_READONLY) != 0)
3225 {
83c81bfe
AM
3226 if (value < htab->text_segment_base)
3227 htab->text_segment_base = value;
c46b7515
AM
3228 }
3229 else
3230 {
83c81bfe
AM
3231 if (value < htab->data_segment_base)
3232 htab->data_segment_base = value;
c46b7515
AM
3233 }
3234 }
3235}
3236
30667bf3
AM
3237/* Perform a relocation as part of a final link. */
3238
3239static bfd_reloc_status_type
83c81bfe 3240final_link_relocate (input_section, contents, rel, value, htab, sym_sec, h)
30667bf3
AM
3241 asection *input_section;
3242 bfd_byte *contents;
3243 const Elf_Internal_Rela *rel;
3244 bfd_vma value;
83c81bfe 3245 struct elf32_hppa_link_hash_table *htab;
30667bf3
AM
3246 asection *sym_sec;
3247 struct elf32_hppa_link_hash_entry *h;
3248{
3249 int insn;
3250 unsigned int r_type = ELF32_R_TYPE (rel->r_info);
3251 reloc_howto_type *howto = elf_hppa_howto_table + r_type;
3252 int r_format = howto->bitsize;
3253 enum hppa_reloc_field_selector_type_alt r_field;
3254 bfd *input_bfd = input_section->owner;
3255 bfd_vma offset = rel->r_offset;
3256 bfd_vma max_branch_offset = 0;
3257 bfd_byte *hit_data = contents + offset;
3258 bfd_signed_vma addend = rel->r_addend;
3259 bfd_vma location;
3260 struct elf32_hppa_stub_hash_entry *stub_entry = NULL;
3261 int val;
3262
3263 if (r_type == R_PARISC_NONE)
3264 return bfd_reloc_ok;
3265
3266 insn = bfd_get_32 (input_bfd, hit_data);
3267
3268 /* Find out where we are and where we're going. */
3269 location = (offset +
3270 input_section->output_offset +
3271 input_section->output_section->vma);
3272
3273 switch (r_type)
3274 {
3275 case R_PARISC_PCREL12F:
3276 case R_PARISC_PCREL17F:
3277 case R_PARISC_PCREL22F:
3278 /* If this is a call to a function defined in another dynamic
3279 library, or if it is a call to a PIC function in the same
74d1c347
AM
3280 object, or if this is a shared link and it is a call to a
3281 weak symbol which may or may not be in the same object, then
3282 find the import stub in the stub hash. */
30667bf3
AM
3283 if (sym_sec == NULL
3284 || sym_sec->output_section == NULL
12cca0d2
AM
3285 || (h != NULL
3286 && ((h->maybe_pic_call
3287 && !(input_section->flags & SEC_HAS_GOT_REF))
3288 || (h->elf.root.type == bfd_link_hash_defweak
3289 && h->elf.dynindx != -1
3290 && h->elf.plt.offset != (bfd_vma) -1))))
30667bf3
AM
3291 {
3292 stub_entry = hppa_get_stub_entry (input_section, sym_sec,
83c81bfe 3293 h, rel, htab);
30667bf3
AM
3294 if (stub_entry != NULL)
3295 {
3296 value = (stub_entry->stub_offset
3297 + stub_entry->stub_sec->output_offset
3298 + stub_entry->stub_sec->output_section->vma);
3299 addend = 0;
3300 }
3301 else if (sym_sec == NULL && h != NULL
3302 && h->elf.root.type == bfd_link_hash_undefweak)
3303 {
db20fd76
AM
3304 /* It's OK if undefined weak. Calls to undefined weak
3305 symbols behave as if the "called" function
3306 immediately returns. We can thus call to a weak
3307 function without first checking whether the function
3308 is defined. */
30667bf3 3309 value = location;
db20fd76 3310 addend = 8;
30667bf3
AM
3311 }
3312 else
3313 return bfd_reloc_notsupported;
3314 }
3315 /* Fall thru. */
3316
3317 case R_PARISC_PCREL21L:
3318 case R_PARISC_PCREL17C:
3319 case R_PARISC_PCREL17R:
3320 case R_PARISC_PCREL14R:
3321 case R_PARISC_PCREL14F:
3322 /* Make it a pc relative offset. */
3323 value -= location;
3324 addend -= 8;
3325 break;
3326
3327 case R_PARISC_DPREL21L:
3328 case R_PARISC_DPREL14R:
3329 case R_PARISC_DPREL14F:
3330 /* For all the DP relative relocations, we need to examine the symbol's
3331 section. If it's a code section, then "data pointer relative" makes
3332 no sense. In that case we don't adjust the "value", and for 21 bit
3333 addil instructions, we change the source addend register from %dp to
3334 %r0. This situation commonly arises when a variable's "constness"
3335 is declared differently from the way the variable is defined. For
3336 instance: "extern int foo" with foo defined as "const int foo". */
3337 if (sym_sec == NULL)
3338 break;
3339 if ((sym_sec->flags & SEC_CODE) != 0)
3340 {
3341 if ((insn & ((0x3f << 26) | (0x1f << 21)))
3342 == (((int) OP_ADDIL << 26) | (27 << 21)))
3343 {
3344 insn &= ~ (0x1f << 21);
74d1c347 3345#if 1 /* debug them. */
30667bf3
AM
3346 (*_bfd_error_handler)
3347 (_("%s(%s+0x%lx): fixing %s"),
8f615d07 3348 bfd_archive_filename (input_bfd),
30667bf3
AM
3349 input_section->name,
3350 (long) rel->r_offset,
3351 howto->name);
3352#endif
3353 }
3354 /* Now try to make things easy for the dynamic linker. */
3355
3356 break;
3357 }
74d1c347 3358 /* Fall thru. */
30667bf3
AM
3359
3360 case R_PARISC_DLTIND21L:
3361 case R_PARISC_DLTIND14R:
3362 case R_PARISC_DLTIND14F:
3363 value -= elf_gp (input_section->output_section->owner);
3364 break;
3365
c46b7515
AM
3366 case R_PARISC_SEGREL32:
3367 if ((sym_sec->flags & SEC_CODE) != 0)
83c81bfe 3368 value -= htab->text_segment_base;
c46b7515 3369 else
83c81bfe 3370 value -= htab->data_segment_base;
c46b7515
AM
3371 break;
3372
30667bf3
AM
3373 default:
3374 break;
3375 }
3376
3377 switch (r_type)
3378 {
3379 case R_PARISC_DIR32:
47d89dba 3380 case R_PARISC_DIR14F:
30667bf3
AM
3381 case R_PARISC_DIR17F:
3382 case R_PARISC_PCREL17C:
3383 case R_PARISC_PCREL14F:
3384 case R_PARISC_DPREL14F:
3385 case R_PARISC_PLABEL32:
3386 case R_PARISC_DLTIND14F:
3387 case R_PARISC_SEGBASE:
3388 case R_PARISC_SEGREL32:
3389 r_field = e_fsel;
3390 break;
3391
3392 case R_PARISC_DIR21L:
3393 case R_PARISC_PCREL21L:
3394 case R_PARISC_DPREL21L:
3395 case R_PARISC_PLABEL21L:
3396 case R_PARISC_DLTIND21L:
3397 r_field = e_lrsel;
3398 break;
3399
3400 case R_PARISC_DIR17R:
3401 case R_PARISC_PCREL17R:
3402 case R_PARISC_DIR14R:
3403 case R_PARISC_PCREL14R:
3404 case R_PARISC_DPREL14R:
3405 case R_PARISC_PLABEL14R:
3406 case R_PARISC_DLTIND14R:
3407 r_field = e_rrsel;
3408 break;
3409
3410 case R_PARISC_PCREL12F:
3411 case R_PARISC_PCREL17F:
3412 case R_PARISC_PCREL22F:
3413 r_field = e_fsel;
3414
3415 if (r_type == (unsigned int) R_PARISC_PCREL17F)
3416 {
3417 max_branch_offset = (1 << (17-1)) << 2;
3418 }
3419 else if (r_type == (unsigned int) R_PARISC_PCREL12F)
3420 {
3421 max_branch_offset = (1 << (12-1)) << 2;
3422 }
3423 else
3424 {
3425 max_branch_offset = (1 << (22-1)) << 2;
3426 }
3427
3428 /* sym_sec is NULL on undefined weak syms or when shared on
3429 undefined syms. We've already checked for a stub for the
3430 shared undefined case. */
3431 if (sym_sec == NULL)
3432 break;
3433
3434 /* If the branch is out of reach, then redirect the
3435 call to the local stub for this function. */
3436 if (value + addend + max_branch_offset >= 2*max_branch_offset)
3437 {
3438 stub_entry = hppa_get_stub_entry (input_section, sym_sec,
83c81bfe 3439 h, rel, htab);
30667bf3
AM
3440 if (stub_entry == NULL)
3441 return bfd_reloc_notsupported;
3442
3443 /* Munge up the value and addend so that we call the stub
3444 rather than the procedure directly. */
3445 value = (stub_entry->stub_offset
3446 + stub_entry->stub_sec->output_offset
3447 + stub_entry->stub_sec->output_section->vma
3448 - location);
3449 addend = -8;
3450 }
3451 break;
3452
3453 /* Something we don't know how to handle. */
3454 default:
3455 return bfd_reloc_notsupported;
3456 }
3457
3458 /* Make sure we can reach the stub. */
3459 if (max_branch_offset != 0
3460 && value + addend + max_branch_offset >= 2*max_branch_offset)
3461 {
3462 (*_bfd_error_handler)
3463 (_("%s(%s+0x%lx): cannot reach %s, recompile with -ffunction-sections"),
8f615d07 3464 bfd_archive_filename (input_bfd),
30667bf3
AM
3465 input_section->name,
3466 (long) rel->r_offset,
3467 stub_entry->root.string);
ce757d15 3468 bfd_set_error (bfd_error_bad_value);
30667bf3
AM
3469 return bfd_reloc_notsupported;
3470 }
3471
3472 val = hppa_field_adjust (value, addend, r_field);
3473
3474 switch (r_type)
3475 {
3476 case R_PARISC_PCREL12F:
3477 case R_PARISC_PCREL17C:
3478 case R_PARISC_PCREL17F:
3479 case R_PARISC_PCREL17R:
3480 case R_PARISC_PCREL22F:
3481 case R_PARISC_DIR17F:
3482 case R_PARISC_DIR17R:
3483 /* This is a branch. Divide the offset by four.
3484 Note that we need to decide whether it's a branch or
3485 otherwise by inspecting the reloc. Inspecting insn won't
3486 work as insn might be from a .word directive. */
3487 val >>= 2;
3488 break;
3489
3490 default:
3491 break;
3492 }
3493
3494 insn = hppa_rebuild_insn (insn, val, r_format);
3495
3496 /* Update the instruction word. */
74d1c347 3497 bfd_put_32 (input_bfd, (bfd_vma) insn, hit_data);
30667bf3
AM
3498 return bfd_reloc_ok;
3499}
3500
30667bf3
AM
3501/* Relocate an HPPA ELF section. */
3502
3503static boolean
3504elf32_hppa_relocate_section (output_bfd, info, input_bfd, input_section,
3505 contents, relocs, local_syms, local_sections)
3506 bfd *output_bfd;
3507 struct bfd_link_info *info;
3508 bfd *input_bfd;
3509 asection *input_section;
3510 bfd_byte *contents;
3511 Elf_Internal_Rela *relocs;
3512 Elf_Internal_Sym *local_syms;
3513 asection **local_sections;
3514{
30667bf3 3515 bfd_vma *local_got_offsets;
83c81bfe 3516 struct elf32_hppa_link_hash_table *htab;
30667bf3
AM
3517 Elf_Internal_Shdr *symtab_hdr;
3518 Elf_Internal_Rela *rel;
3519 Elf_Internal_Rela *relend;
30667bf3
AM
3520
3521 symtab_hdr = &elf_tdata (input_bfd)->symtab_hdr;
3522
83c81bfe 3523 htab = hppa_link_hash_table (info);
74d1c347 3524 local_got_offsets = elf_local_got_offsets (input_bfd);
30667bf3
AM
3525
3526 rel = relocs;
3527 relend = relocs + input_section->reloc_count;
3528 for (; rel < relend; rel++)
3529 {
3530 unsigned int r_type;
3531 reloc_howto_type *howto;
3532 unsigned int r_symndx;
3533 struct elf32_hppa_link_hash_entry *h;
3534 Elf_Internal_Sym *sym;
3535 asection *sym_sec;
3536 bfd_vma relocation;
3537 bfd_reloc_status_type r;
3538 const char *sym_name;
74d1c347 3539 boolean plabel;
30667bf3
AM
3540
3541 r_type = ELF32_R_TYPE (rel->r_info);
3542 if (r_type >= (unsigned int) R_PARISC_UNIMPLEMENTED)
3543 {
3544 bfd_set_error (bfd_error_bad_value);
3545 return false;
3546 }
3547 if (r_type == (unsigned int) R_PARISC_GNU_VTENTRY
3548 || r_type == (unsigned int) R_PARISC_GNU_VTINHERIT)
3549 continue;
3550
3551 r_symndx = ELF32_R_SYM (rel->r_info);
3552
3553 if (info->relocateable)
3554 {
3ac8354b 3555 /* This is a relocatable link. We don't have to change
30667bf3
AM
3556 anything, unless the reloc is against a section symbol,
3557 in which case we have to adjust according to where the
3558 section symbol winds up in the output section. */
3559 if (r_symndx < symtab_hdr->sh_info)
3560 {
3561 sym = local_syms + r_symndx;
3562 if (ELF_ST_TYPE (sym->st_info) == STT_SECTION)
3563 {
3564 sym_sec = local_sections[r_symndx];
3565 rel->r_addend += sym_sec->output_offset;
3566 }
3567 }
3568 continue;
3569 }
3570
3571 /* This is a final link. */
3572 h = NULL;
3573 sym = NULL;
3574 sym_sec = NULL;
3575 if (r_symndx < symtab_hdr->sh_info)
3576 {
3577 /* This is a local symbol, h defaults to NULL. */
3578 sym = local_syms + r_symndx;
3579 sym_sec = local_sections[r_symndx];
3580 relocation = ((ELF_ST_TYPE (sym->st_info) == STT_SECTION
3581 ? 0 : sym->st_value)
3582 + sym_sec->output_offset
3583 + sym_sec->output_section->vma);
3584 }
3585 else
3586 {
3587 int indx;
3588
3589 /* It's a global; Find its entry in the link hash. */
3590 indx = r_symndx - symtab_hdr->sh_info;
3591 h = ((struct elf32_hppa_link_hash_entry *)
3592 elf_sym_hashes (input_bfd)[indx]);
3593 while (h->elf.root.type == bfd_link_hash_indirect
3594 || h->elf.root.type == bfd_link_hash_warning)
3595 h = (struct elf32_hppa_link_hash_entry *) h->elf.root.u.i.link;
3596
3597 relocation = 0;
3598 if (h->elf.root.type == bfd_link_hash_defined
3599 || h->elf.root.type == bfd_link_hash_defweak)
3600 {
3601 sym_sec = h->elf.root.u.def.section;
3602 /* If sym_sec->output_section is NULL, then it's a
3603 symbol defined in a shared library. */
3604 if (sym_sec->output_section != NULL)
3605 relocation = (h->elf.root.u.def.value
3606 + sym_sec->output_offset
3607 + sym_sec->output_section->vma);
3608 }
3609 else if (h->elf.root.type == bfd_link_hash_undefweak)
3610 ;
3611 else if (info->shared && !info->no_undefined
49e9d0d3
AM
3612 && ELF_ST_VISIBILITY (h->elf.other) == STV_DEFAULT
3613 && h->elf.type != STT_PARISC_MILLI)
30667bf3 3614 {
671bae9c 3615 if (info->symbolic && !info->allow_shlib_undefined)
30667bf3
AM
3616 if (!((*info->callbacks->undefined_symbol)
3617 (info, h->elf.root.root.string, input_bfd,
3618 input_section, rel->r_offset, false)))
3619 return false;
3620 }
3621 else
3622 {
3623 if (!((*info->callbacks->undefined_symbol)
3624 (info, h->elf.root.root.string, input_bfd,
3625 input_section, rel->r_offset, true)))
3626 return false;
3627 }
3628 }
3629
3630 /* Do any required modifications to the relocation value, and
25f72752
AM
3631 determine what types of dynamic info we need to output, if
3632 any. */
74d1c347 3633 plabel = 0;
30667bf3
AM
3634 switch (r_type)
3635 {
3636 case R_PARISC_DLTIND14F:
3637 case R_PARISC_DLTIND14R:
3638 case R_PARISC_DLTIND21L:
ce757d15
AM
3639 {
3640 bfd_vma off;
3641 boolean do_got = 0;
3642
3643 /* Relocation is to the entry for this symbol in the
3644 global offset table. */
3645 if (h != NULL)
3646 {
3647 boolean dyn;
3648
3649 off = h->elf.got.offset;
3650 dyn = htab->elf.dynamic_sections_created;
3651 if (! WILL_CALL_FINISH_DYNAMIC_SYMBOL (dyn, info, &h->elf))
3652 {
3653 /* If we aren't going to call finish_dynamic_symbol,
3654 then we need to handle initialisation of the .got
3655 entry and create needed relocs here. Since the
3656 offset must always be a multiple of 4, we use the
3657 least significant bit to record whether we have
3658 initialised it already. */
3659 if ((off & 1) != 0)
3660 off &= ~1;
3661 else
3662 {
3663 h->elf.got.offset |= 1;
3664 do_got = 1;
3665 }
3666 }
3667 }
3668 else
3669 {
3670 /* Local symbol case. */
3671 if (local_got_offsets == NULL)
3672 abort ();
3673
3674 off = local_got_offsets[r_symndx];
3675
3676 /* The offset must always be a multiple of 4. We use
3677 the least significant bit to record whether we have
3678 already generated the necessary reloc. */
3679 if ((off & 1) != 0)
3680 off &= ~1;
3681 else
3682 {
3683 local_got_offsets[r_symndx] |= 1;
3684 do_got = 1;
3685 }
3686 }
68fb2e56 3687
ce757d15
AM
3688 if (do_got)
3689 {
3690 if (info->shared)
3691 {
3692 /* Output a dynamic relocation for this GOT entry.
3693 In this case it is relative to the base of the
3694 object because the symbol index is zero. */
3695 Elf_Internal_Rela outrel;
3696 asection *srelgot = htab->srelgot;
3697 Elf32_External_Rela *loc;
3698
3699 outrel.r_offset = (off
3700 + htab->sgot->output_offset
3701 + htab->sgot->output_section->vma);
3702 outrel.r_info = ELF32_R_INFO (0, R_PARISC_DIR32);
3703 outrel.r_addend = relocation;
3704 loc = (Elf32_External_Rela *) srelgot->contents;
3705 loc += srelgot->reloc_count++;
3706 bfd_elf32_swap_reloca_out (output_bfd, &outrel, loc);
3707 }
3708 else
30667bf3 3709 bfd_put_32 (output_bfd, relocation,
83c81bfe 3710 htab->sgot->contents + off);
ce757d15 3711 }
30667bf3 3712
ce757d15
AM
3713 if (off >= (bfd_vma) -2)
3714 abort ();
30667bf3 3715
ce757d15
AM
3716 /* Add the base of the GOT to the relocation value. */
3717 relocation = (off
3718 + htab->sgot->output_offset
3719 + htab->sgot->output_section->vma);
3720 }
30667bf3 3721 break;
252b5132 3722
c46b7515
AM
3723 case R_PARISC_SEGREL32:
3724 /* If this is the first SEGREL relocation, then initialize
3725 the segment base values. */
83c81bfe
AM
3726 if (htab->text_segment_base == (bfd_vma) -1)
3727 bfd_map_over_sections (output_bfd, hppa_record_segment_addr, htab);
c46b7515
AM
3728 break;
3729
30667bf3
AM
3730 case R_PARISC_PLABEL14R:
3731 case R_PARISC_PLABEL21L:
3732 case R_PARISC_PLABEL32:
ebe50bae 3733 if (htab->elf.dynamic_sections_created)
252b5132 3734 {
ce757d15
AM
3735 bfd_vma off;
3736 boolean do_plt = 0;
3737
74d1c347
AM
3738 /* If we have a global symbol with a PLT slot, then
3739 redirect this relocation to it. */
3740 if (h != NULL)
3741 {
3742 off = h->elf.plt.offset;
4dc86686 3743 if (! WILL_CALL_FINISH_DYNAMIC_SYMBOL (1, info, &h->elf))
8dea1268
AM
3744 {
3745 /* In a non-shared link, adjust_dynamic_symbols
3746 isn't called for symbols forced local. We
dc810e39 3747 need to write out the plt entry here. */
8dea1268
AM
3748 if ((off & 1) != 0)
3749 off &= ~1;
3750 else
3751 {
8dea1268 3752 h->elf.plt.offset |= 1;
ce757d15 3753 do_plt = 1;
8dea1268
AM
3754 }
3755 }
74d1c347
AM
3756 }
3757 else
3758 {
68fb2e56
AM
3759 bfd_vma *local_plt_offsets;
3760
3761 if (local_got_offsets == NULL)
3762 abort ();
74d1c347 3763
68fb2e56
AM
3764 local_plt_offsets = local_got_offsets + symtab_hdr->sh_info;
3765 off = local_plt_offsets[r_symndx];
74d1c347
AM
3766
3767 /* As for the local .got entry case, we use the last
3768 bit to record whether we've already initialised
3769 this local .plt entry. */
3770 if ((off & 1) != 0)
3771 off &= ~1;
ce757d15
AM
3772 else
3773 {
3774 local_plt_offsets[r_symndx] |= 1;
3775 do_plt = 1;
3776 }
3777 }
3778
3779 if (do_plt)
3780 {
3781 if (info->shared)
3782 {
3783 /* Output a dynamic IPLT relocation for this
3784 PLT entry. */
3785 Elf_Internal_Rela outrel;
3786 asection *srelplt = htab->srelplt;
3787 Elf32_External_Rela *loc;
3788
3789 outrel.r_offset = (off
3790 + htab->splt->output_offset
3791 + htab->splt->output_section->vma);
3792 outrel.r_info = ELF32_R_INFO (0, R_PARISC_IPLT);
3793 outrel.r_addend = relocation;
3794 loc = (Elf32_External_Rela *) srelplt->contents;
3795 loc += srelplt->reloc_count++;
3796 bfd_elf32_swap_reloca_out (output_bfd, &outrel, loc);
3797 }
74d1c347
AM
3798 else
3799 {
3800 bfd_put_32 (output_bfd,
3801 relocation,
83c81bfe 3802 htab->splt->contents + off);
74d1c347 3803 bfd_put_32 (output_bfd,
83c81bfe
AM
3804 elf_gp (htab->splt->output_section->owner),
3805 htab->splt->contents + off + 4);
74d1c347
AM
3806 }
3807 }
3808
68fb2e56 3809 if (off >= (bfd_vma) -2)
49e9d0d3 3810 abort ();
74d1c347
AM
3811
3812 /* PLABELs contain function pointers. Relocation is to
3813 the entry for the function in the .plt. The magic +2
3814 offset signals to $$dyncall that the function pointer
3815 is in the .plt and thus has a gp pointer too.
3816 Exception: Undefined PLABELs should have a value of
3817 zero. */
3818 if (h == NULL
3819 || (h->elf.root.type != bfd_link_hash_undefweak
3820 && h->elf.root.type != bfd_link_hash_undefined))
3821 {
3822 relocation = (off
83c81bfe
AM
3823 + htab->splt->output_offset
3824 + htab->splt->output_section->vma
74d1c347
AM
3825 + 2);
3826 }
3827 plabel = 1;
30667bf3
AM
3828 }
3829 /* Fall through and possibly emit a dynamic relocation. */
3830
3831 case R_PARISC_DIR17F:
3832 case R_PARISC_DIR17R:
47d89dba 3833 case R_PARISC_DIR14F:
30667bf3
AM
3834 case R_PARISC_DIR14R:
3835 case R_PARISC_DIR21L:
3836 case R_PARISC_DPREL14F:
3837 case R_PARISC_DPREL14R:
3838 case R_PARISC_DPREL21L:
3839 case R_PARISC_DIR32:
3840 /* The reloc types handled here and this conditional
56882138
AM
3841 expression must match the code in ..check_relocs and
3842 ..discard_relocs. ie. We need exactly the same condition
3843 as in ..check_relocs, with some extra conditions (dynindx
3844 test in this case) to cater for relocs removed by
3845 ..discard_relocs. If you squint, the non-shared test
3846 here does indeed match the one in ..check_relocs, the
3847 difference being that here we test DEF_DYNAMIC as well as
3848 !DEF_REGULAR. All common syms end up with !DEF_REGULAR,
3849 which is why we can't use just that test here.
3850 Conversely, DEF_DYNAMIC can't be used in check_relocs as
3851 there all files have not been loaded. */
446f2863
AM
3852 if ((info->shared
3853 && (input_section->flags & SEC_ALLOC) != 0
3854 && (IS_ABSOLUTE_RELOC (r_type)
3855 || (h != NULL
3856 && h->elf.dynindx != -1
3857 && (!info->symbolic
3858 || (h->elf.elf_link_hash_flags
3859 & ELF_LINK_HASH_DEF_REGULAR) == 0))))
3860 || (!info->shared
3861 && (input_section->flags & SEC_ALLOC) != 0
3862 && h != NULL
3863 && h->elf.dynindx != -1
3864 && (h->elf.elf_link_hash_flags & ELF_LINK_NON_GOT_REF) == 0
56882138
AM
3865 && (((h->elf.elf_link_hash_flags
3866 & ELF_LINK_HASH_DEF_DYNAMIC) != 0
3867 && (h->elf.elf_link_hash_flags
3868 & ELF_LINK_HASH_DEF_REGULAR) == 0)
446f2863
AM
3869 || h->elf.root.type == bfd_link_hash_undefweak
3870 || h->elf.root.type == bfd_link_hash_undefined)))
30667bf3
AM
3871 {
3872 Elf_Internal_Rela outrel;
3873 boolean skip;
98ceb8ce
AM
3874 asection *sreloc;
3875 Elf32_External_Rela *loc;
252b5132 3876
30667bf3
AM
3877 /* When generating a shared object, these relocations
3878 are copied into the output file to be resolved at run
3879 time. */
252b5132 3880
30667bf3
AM
3881 outrel.r_offset = rel->r_offset;
3882 outrel.r_addend = rel->r_addend;
3883 skip = false;
3884 if (elf_section_data (input_section)->stab_info != NULL)
edd21aca 3885 {
ce757d15
AM
3886 bfd_vma off;
3887
30667bf3 3888 off = (_bfd_stab_section_offset
ebe50bae 3889 (output_bfd, &htab->elf.stab_info,
30667bf3
AM
3890 input_section,
3891 &elf_section_data (input_section)->stab_info,
3892 rel->r_offset));
3893 if (off == (bfd_vma) -1)
3894 skip = true;
3895 outrel.r_offset = off;
edd21aca 3896 }
252b5132 3897
30667bf3
AM
3898 outrel.r_offset += (input_section->output_offset
3899 + input_section->output_section->vma);
3900
3901 if (skip)
252b5132 3902 {
30667bf3 3903 memset (&outrel, 0, sizeof (outrel));
252b5132 3904 }
74d1c347
AM
3905 else if (h != NULL
3906 && h->elf.dynindx != -1
3907 && (plabel
446f2863
AM
3908 || !IS_ABSOLUTE_RELOC (r_type)
3909 || !info->shared
74d1c347 3910 || !info->symbolic
30667bf3
AM
3911 || (h->elf.elf_link_hash_flags
3912 & ELF_LINK_HASH_DEF_REGULAR) == 0))
252b5132 3913 {
30667bf3
AM
3914 outrel.r_info = ELF32_R_INFO (h->elf.dynindx, r_type);
3915 }
3916 else /* It's a local symbol, or one marked to become local. */
3917 {
3918 int indx = 0;
edd21aca 3919
30667bf3
AM
3920 /* Add the absolute offset of the symbol. */
3921 outrel.r_addend += relocation;
edd21aca 3922
74d1c347
AM
3923 /* Global plabels need to be processed by the
3924 dynamic linker so that functions have at most one
3925 fptr. For this reason, we need to differentiate
3926 between global and local plabels, which we do by
3927 providing the function symbol for a global plabel
3928 reloc, and no symbol for local plabels. */
3929 if (! plabel
3930 && sym_sec != NULL
30667bf3
AM
3931 && sym_sec->output_section != NULL
3932 && ! bfd_is_abs_section (sym_sec))
252b5132 3933 {
30667bf3
AM
3934 indx = elf_section_data (sym_sec->output_section)->dynindx;
3935 /* We are turning this relocation into one
3936 against a section symbol, so subtract out the
3937 output section's address but not the offset
3938 of the input section in the output section. */
3939 outrel.r_addend -= sym_sec->output_section->vma;
252b5132 3940 }
252b5132 3941
30667bf3
AM
3942 outrel.r_info = ELF32_R_INFO (indx, r_type);
3943 }
68fb2e56
AM
3944#if 0
3945 /* EH info can cause unaligned DIR32 relocs.
3946 Tweak the reloc type for the dynamic linker. */
3947 if (r_type == R_PARISC_DIR32 && (outrel.r_offset & 3) != 0)
3948 outrel.r_info = ELF32_R_INFO (ELF32_R_SYM (outrel.r_info),
3949 R_PARISC_DIR32U);
3950#endif
98ceb8ce
AM
3951 sreloc = elf_section_data (input_section)->sreloc;
3952 if (sreloc == NULL)
3953 abort ();
3954
3ac8354b
AM
3955 loc = (Elf32_External_Rela *) sreloc->contents;
3956 loc += sreloc->reloc_count++;
98ceb8ce 3957 bfd_elf32_swap_reloca_out (output_bfd, &outrel, loc);
30667bf3
AM
3958 }
3959 break;
edd21aca 3960
30667bf3
AM
3961 default:
3962 break;
3963 }
252b5132 3964
30667bf3 3965 r = final_link_relocate (input_section, contents, rel, relocation,
83c81bfe 3966 htab, sym_sec, h);
252b5132 3967
30667bf3
AM
3968 if (r == bfd_reloc_ok)
3969 continue;
252b5132 3970
30667bf3
AM
3971 if (h != NULL)
3972 sym_name = h->elf.root.root.string;
3973 else
3974 {
3975 sym_name = bfd_elf_string_from_elf_section (input_bfd,
3976 symtab_hdr->sh_link,
3977 sym->st_name);
3978 if (sym_name == NULL)
3979 return false;
3980 if (*sym_name == '\0')
3981 sym_name = bfd_section_name (input_bfd, sym_sec);
3982 }
edd21aca 3983
30667bf3 3984 howto = elf_hppa_howto_table + r_type;
252b5132 3985
30667bf3
AM
3986 if (r == bfd_reloc_undefined || r == bfd_reloc_notsupported)
3987 {
3988 (*_bfd_error_handler)
3989 (_("%s(%s+0x%lx): cannot handle %s for %s"),
8f615d07 3990 bfd_archive_filename (input_bfd),
30667bf3
AM
3991 input_section->name,
3992 (long) rel->r_offset,
3993 howto->name,
3994 sym_name);
8f615d07
AM
3995 bfd_set_error (bfd_error_bad_value);
3996 return false;
30667bf3
AM
3997 }
3998 else
3999 {
4000 if (!((*info->callbacks->reloc_overflow)
4001 (info, sym_name, howto->name, (bfd_vma) 0,
4002 input_bfd, input_section, rel->r_offset)))
4003 return false;
4004 }
4005 }
edd21aca 4006
30667bf3
AM
4007 return true;
4008}
252b5132 4009
c46b7515
AM
4010/* Comparison function for qsort to sort unwind section during a
4011 final link. */
4012
4013static int
4014hppa_unwind_entry_compare (a, b)
4015 const PTR a;
4016 const PTR b;
4017{
4018 const bfd_byte *ap, *bp;
4019 unsigned long av, bv;
4020
4021 ap = (const bfd_byte *) a;
4022 av = (unsigned long) ap[0] << 24;
4023 av |= (unsigned long) ap[1] << 16;
4024 av |= (unsigned long) ap[2] << 8;
4025 av |= (unsigned long) ap[3];
4026
4027 bp = (const bfd_byte *) b;
4028 bv = (unsigned long) bp[0] << 24;
4029 bv |= (unsigned long) bp[1] << 16;
4030 bv |= (unsigned long) bp[2] << 8;
4031 bv |= (unsigned long) bp[3];
4032
4033 return av < bv ? -1 : av > bv ? 1 : 0;
4034}
4035
30667bf3
AM
4036/* Finish up dynamic symbol handling. We set the contents of various
4037 dynamic sections here. */
252b5132 4038
30667bf3
AM
4039static boolean
4040elf32_hppa_finish_dynamic_symbol (output_bfd, info, h, sym)
4041 bfd *output_bfd;
4042 struct bfd_link_info *info;
4043 struct elf_link_hash_entry *h;
4044 Elf_Internal_Sym *sym;
4045{
83c81bfe 4046 struct elf32_hppa_link_hash_table *htab;
edd21aca 4047
83c81bfe 4048 htab = hppa_link_hash_table (info);
30667bf3 4049
30667bf3
AM
4050 if (h->plt.offset != (bfd_vma) -1)
4051 {
4052 bfd_vma value;
30667bf3 4053
8dea1268
AM
4054 if (h->plt.offset & 1)
4055 abort ();
4056
30667bf3
AM
4057 /* This symbol has an entry in the procedure linkage table. Set
4058 it up.
4059
4060 The format of a plt entry is
74d1c347
AM
4061 <funcaddr>
4062 <__gp>
47d89dba 4063 */
30667bf3
AM
4064 value = 0;
4065 if (h->root.type == bfd_link_hash_defined
4066 || h->root.type == bfd_link_hash_defweak)
4067 {
4068 value = h->root.u.def.value;
4069 if (h->root.u.def.section->output_section != NULL)
4070 value += (h->root.u.def.section->output_offset
4071 + h->root.u.def.section->output_section->vma);
252b5132 4072 }
edd21aca 4073
74d1c347 4074 if (! ((struct elf32_hppa_link_hash_entry *) h)->pic_call)
30667bf3 4075 {
47d89dba 4076 Elf_Internal_Rela rel;
3ac8354b 4077 Elf32_External_Rela *loc;
47d89dba 4078
30667bf3
AM
4079 /* Create a dynamic IPLT relocation for this entry. */
4080 rel.r_offset = (h->plt.offset
83c81bfe
AM
4081 + htab->splt->output_offset
4082 + htab->splt->output_section->vma);
ce757d15 4083 if (h->dynindx != -1)
74d1c347 4084 {
47d89dba
AM
4085 /* To support lazy linking, the function pointer is
4086 initialised to point to a special stub stored at the
8dea1268
AM
4087 end of the .plt. This is not done for plt entries
4088 with a base-relative dynamic relocation. */
83c81bfe
AM
4089 value = (htab->splt->output_offset
4090 + htab->splt->output_section->vma
4091 + htab->splt->_raw_size
47d89dba
AM
4092 - sizeof (plt_stub)
4093 + PLT_STUB_ENTRY);
74d1c347
AM
4094 rel.r_info = ELF32_R_INFO (h->dynindx, R_PARISC_IPLT);
4095 rel.r_addend = 0;
4096 }
4097 else
4098 {
4099 /* This symbol has been marked to become local, and is
4100 used by a plabel so must be kept in the .plt. */
4101 rel.r_info = ELF32_R_INFO (0, R_PARISC_IPLT);
4102 rel.r_addend = value;
4103 }
30667bf3 4104
3ac8354b
AM
4105 loc = (Elf32_External_Rela *) htab->srelplt->contents;
4106 loc += htab->srelplt->reloc_count++;
83c81bfe 4107 bfd_elf32_swap_reloca_out (htab->splt->output_section->owner,
3ac8354b 4108 &rel, loc);
30667bf3 4109 }
ce757d15 4110 else
47d89dba 4111 {
ce757d15
AM
4112 bfd_put_32 (htab->splt->owner,
4113 value,
4114 htab->splt->contents + h->plt.offset);
4115 bfd_put_32 (htab->splt->owner,
4116 elf_gp (htab->splt->output_section->owner),
4117 htab->splt->contents + h->plt.offset + 4);
47d89dba
AM
4118 }
4119
30667bf3
AM
4120 if ((h->elf_link_hash_flags & ELF_LINK_HASH_DEF_REGULAR) == 0)
4121 {
4122 /* Mark the symbol as undefined, rather than as defined in
4123 the .plt section. Leave the value alone. */
4124 sym->st_shndx = SHN_UNDEF;
4125 }
4126 }
edd21aca 4127
30667bf3
AM
4128 if (h->got.offset != (bfd_vma) -1)
4129 {
4130 Elf_Internal_Rela rel;
3ac8354b 4131 Elf32_External_Rela *loc;
30667bf3
AM
4132
4133 /* This symbol has an entry in the global offset table. Set it
4134 up. */
4135
4136 rel.r_offset = ((h->got.offset &~ (bfd_vma) 1)
83c81bfe
AM
4137 + htab->sgot->output_offset
4138 + htab->sgot->output_section->vma);
30667bf3 4139
4dc86686
AM
4140 /* If this is a -Bsymbolic link and the symbol is defined
4141 locally or was forced to be local because of a version file,
4142 we just want to emit a RELATIVE reloc. The entry in the
4143 global offset table will already have been initialized in the
4144 relocate_section function. */
4145 if (info->shared
4146 && (info->symbolic || h->dynindx == -1)
4147 && (h->elf_link_hash_flags & ELF_LINK_HASH_DEF_REGULAR))
30667bf3 4148 {
74d1c347 4149 rel.r_info = ELF32_R_INFO (0, R_PARISC_DIR32);
30667bf3
AM
4150 rel.r_addend = (h->root.u.def.value
4151 + h->root.u.def.section->output_offset
4152 + h->root.u.def.section->output_section->vma);
4153 }
4154 else
4155 {
49e9d0d3
AM
4156 if ((h->got.offset & 1) != 0)
4157 abort ();
30667bf3 4158 bfd_put_32 (output_bfd, (bfd_vma) 0,
83c81bfe 4159 htab->sgot->contents + h->got.offset);
30667bf3
AM
4160 rel.r_info = ELF32_R_INFO (h->dynindx, R_PARISC_DIR32);
4161 rel.r_addend = 0;
4162 }
edd21aca 4163
3ac8354b
AM
4164 loc = (Elf32_External_Rela *) htab->srelgot->contents;
4165 loc += htab->srelgot->reloc_count++;
4166 bfd_elf32_swap_reloca_out (output_bfd, &rel, loc);
30667bf3 4167 }
edd21aca 4168
30667bf3
AM
4169 if ((h->elf_link_hash_flags & ELF_LINK_HASH_NEEDS_COPY) != 0)
4170 {
4171 asection *s;
4172 Elf_Internal_Rela rel;
3ac8354b 4173 Elf32_External_Rela *loc;
30667bf3
AM
4174
4175 /* This symbol needs a copy reloc. Set it up. */
4176
49e9d0d3
AM
4177 if (! (h->dynindx != -1
4178 && (h->root.type == bfd_link_hash_defined
4179 || h->root.type == bfd_link_hash_defweak)))
4180 abort ();
30667bf3 4181
83c81bfe 4182 s = htab->srelbss;
30667bf3
AM
4183
4184 rel.r_offset = (h->root.u.def.value
4185 + h->root.u.def.section->output_offset
4186 + h->root.u.def.section->output_section->vma);
4187 rel.r_addend = 0;
4188 rel.r_info = ELF32_R_INFO (h->dynindx, R_PARISC_COPY);
3ac8354b
AM
4189 loc = (Elf32_External_Rela *) s->contents + s->reloc_count++;
4190 bfd_elf32_swap_reloca_out (output_bfd, &rel, loc);
30667bf3
AM
4191 }
4192
4193 /* Mark _DYNAMIC and _GLOBAL_OFFSET_TABLE_ as absolute. */
4194 if (h->root.root.string[0] == '_'
4195 && (strcmp (h->root.root.string, "_DYNAMIC") == 0
4196 || strcmp (h->root.root.string, "_GLOBAL_OFFSET_TABLE_") == 0))
4197 {
4198 sym->st_shndx = SHN_ABS;
4199 }
4200
4201 return true;
4202}
4203
98ceb8ce
AM
4204/* Used to decide how to sort relocs in an optimal manner for the
4205 dynamic linker, before writing them out. */
4206
4207static enum elf_reloc_type_class
4208elf32_hppa_reloc_type_class (rela)
4209 const Elf_Internal_Rela *rela;
4210{
4211 if (ELF32_R_SYM (rela->r_info) == 0)
4212 return reloc_class_relative;
4213
4214 switch ((int) ELF32_R_TYPE (rela->r_info))
4215 {
4216 case R_PARISC_IPLT:
4217 return reloc_class_plt;
4218 case R_PARISC_COPY:
4219 return reloc_class_copy;
4220 default:
4221 return reloc_class_normal;
4222 }
4223}
4224
30667bf3
AM
4225/* Finish up the dynamic sections. */
4226
4227static boolean
4228elf32_hppa_finish_dynamic_sections (output_bfd, info)
4229 bfd *output_bfd;
4230 struct bfd_link_info *info;
4231{
4232 bfd *dynobj;
83c81bfe 4233 struct elf32_hppa_link_hash_table *htab;
30667bf3
AM
4234 asection *sdyn;
4235
83c81bfe 4236 htab = hppa_link_hash_table (info);
ebe50bae 4237 dynobj = htab->elf.dynobj;
30667bf3
AM
4238
4239 sdyn = bfd_get_section_by_name (dynobj, ".dynamic");
4240
ebe50bae 4241 if (htab->elf.dynamic_sections_created)
30667bf3
AM
4242 {
4243 Elf32_External_Dyn *dyncon, *dynconend;
4244
49e9d0d3
AM
4245 if (sdyn == NULL)
4246 abort ();
30667bf3
AM
4247
4248 dyncon = (Elf32_External_Dyn *) sdyn->contents;
4249 dynconend = (Elf32_External_Dyn *) (sdyn->contents + sdyn->_raw_size);
4250 for (; dyncon < dynconend; dyncon++)
edd21aca 4251 {
30667bf3
AM
4252 Elf_Internal_Dyn dyn;
4253 asection *s;
4254
4255 bfd_elf32_swap_dyn_in (dynobj, dyncon, &dyn);
4256
4257 switch (dyn.d_tag)
4258 {
4259 default:
3ac8354b 4260 continue;
30667bf3
AM
4261
4262 case DT_PLTGOT:
4263 /* Use PLTGOT to set the GOT register. */
4264 dyn.d_un.d_ptr = elf_gp (output_bfd);
30667bf3
AM
4265 break;
4266
4267 case DT_JMPREL:
83c81bfe 4268 s = htab->srelplt;
30667bf3 4269 dyn.d_un.d_ptr = s->output_section->vma + s->output_offset;
30667bf3
AM
4270 break;
4271
4272 case DT_PLTRELSZ:
83c81bfe 4273 s = htab->srelplt;
30667bf3
AM
4274 if (s->_cooked_size != 0)
4275 dyn.d_un.d_val = s->_cooked_size;
4276 else
4277 dyn.d_un.d_val = s->_raw_size;
30667bf3 4278 break;
4e12ff7f
AM
4279
4280 case DT_RELASZ:
4281 /* Don't count procedure linkage table relocs in the
4282 overall reloc count. */
4283 if (htab->srelplt != NULL)
4284 {
4285 s = htab->srelplt->output_section;
4286 if (s->_cooked_size != 0)
4287 dyn.d_un.d_val -= s->_cooked_size;
4288 else
4289 dyn.d_un.d_val -= s->_raw_size;
4290 }
4291 break;
30667bf3 4292 }
3ac8354b
AM
4293
4294 bfd_elf32_swap_dyn_out (output_bfd, &dyn, dyncon);
edd21aca 4295 }
252b5132 4296 }
edd21aca 4297
83c81bfe 4298 if (htab->sgot != NULL && htab->sgot->_raw_size != 0)
30667bf3 4299 {
74d1c347
AM
4300 /* Fill in the first entry in the global offset table.
4301 We use it to point to our dynamic section, if we have one. */
30667bf3
AM
4302 bfd_put_32 (output_bfd,
4303 (sdyn != NULL
4304 ? sdyn->output_section->vma + sdyn->output_offset
4305 : (bfd_vma) 0),
83c81bfe 4306 htab->sgot->contents);
30667bf3 4307
74d1c347 4308 /* The second entry is reserved for use by the dynamic linker. */
83c81bfe 4309 memset (htab->sgot->contents + GOT_ENTRY_SIZE, 0, GOT_ENTRY_SIZE);
74d1c347 4310
30667bf3 4311 /* Set .got entry size. */
83c81bfe 4312 elf_section_data (htab->sgot->output_section)
74d1c347 4313 ->this_hdr.sh_entsize = GOT_ENTRY_SIZE;
30667bf3
AM
4314 }
4315
83c81bfe 4316 if (htab->splt != NULL && htab->splt->_raw_size != 0)
47d89dba
AM
4317 {
4318 /* Set plt entry size. */
83c81bfe 4319 elf_section_data (htab->splt->output_section)
47d89dba
AM
4320 ->this_hdr.sh_entsize = PLT_ENTRY_SIZE;
4321
83c81bfe 4322 if (htab->need_plt_stub)
47d89dba
AM
4323 {
4324 /* Set up the .plt stub. */
83c81bfe
AM
4325 memcpy (htab->splt->contents
4326 + htab->splt->_raw_size - sizeof (plt_stub),
47d89dba
AM
4327 plt_stub, sizeof (plt_stub));
4328
83c81bfe
AM
4329 if ((htab->splt->output_offset
4330 + htab->splt->output_section->vma
4331 + htab->splt->_raw_size)
4332 != (htab->sgot->output_offset
4333 + htab->sgot->output_section->vma))
47d89dba
AM
4334 {
4335 (*_bfd_error_handler)
4336 (_(".got section not immediately after .plt section"));
4337 return false;
4338 }
4339 }
4340 }
30667bf3 4341
252b5132 4342 return true;
30667bf3 4343}
252b5132 4344
d952f17a
AM
4345/* Tweak the OSABI field of the elf header. */
4346
4347static void
4348elf32_hppa_post_process_headers (abfd, link_info)
4349 bfd *abfd;
4350 struct bfd_link_info *link_info ATTRIBUTE_UNUSED;
4351{
4352 Elf_Internal_Ehdr * i_ehdrp;
4353
4354 i_ehdrp = elf_elfheader (abfd);
4355
4356 if (strcmp (bfd_get_target (abfd), "elf32-hppa-linux") == 0)
4357 {
4358 i_ehdrp->e_ident[EI_OSABI] = ELFOSABI_LINUX;
4359 }
4360 else
4361 {
4362 i_ehdrp->e_ident[EI_OSABI] = ELFOSABI_HPUX;
4363 }
4364}
4365
30667bf3
AM
4366/* Called when writing out an object file to decide the type of a
4367 symbol. */
4368static int
4369elf32_hppa_elf_get_symbol_type (elf_sym, type)
4370 Elf_Internal_Sym *elf_sym;
4371 int type;
4372{
4373 if (ELF_ST_TYPE (elf_sym->st_info) == STT_PARISC_MILLI)
4374 return STT_PARISC_MILLI;
4375 else
4376 return type;
252b5132
RH
4377}
4378
4379/* Misc BFD support code. */
30667bf3
AM
4380#define bfd_elf32_bfd_is_local_label_name elf_hppa_is_local_label_name
4381#define bfd_elf32_bfd_reloc_type_lookup elf_hppa_reloc_type_lookup
4382#define elf_info_to_howto elf_hppa_info_to_howto
4383#define elf_info_to_howto_rel elf_hppa_info_to_howto_rel
252b5132 4384
252b5132 4385/* Stuff for the BFD linker. */
c46b7515 4386#define bfd_elf32_bfd_final_link elf32_hppa_final_link
30667bf3
AM
4387#define bfd_elf32_bfd_link_hash_table_create elf32_hppa_link_hash_table_create
4388#define elf_backend_add_symbol_hook elf32_hppa_add_symbol_hook
4389#define elf_backend_adjust_dynamic_symbol elf32_hppa_adjust_dynamic_symbol
ebe50bae 4390#define elf_backend_copy_indirect_symbol elf32_hppa_copy_indirect_symbol
30667bf3
AM
4391#define elf_backend_check_relocs elf32_hppa_check_relocs
4392#define elf_backend_create_dynamic_sections elf32_hppa_create_dynamic_sections
4393#define elf_backend_fake_sections elf_hppa_fake_sections
4394#define elf_backend_relocate_section elf32_hppa_relocate_section
74d1c347 4395#define elf_backend_hide_symbol elf32_hppa_hide_symbol
30667bf3
AM
4396#define elf_backend_finish_dynamic_symbol elf32_hppa_finish_dynamic_symbol
4397#define elf_backend_finish_dynamic_sections elf32_hppa_finish_dynamic_sections
4398#define elf_backend_size_dynamic_sections elf32_hppa_size_dynamic_sections
4399#define elf_backend_gc_mark_hook elf32_hppa_gc_mark_hook
4400#define elf_backend_gc_sweep_hook elf32_hppa_gc_sweep_hook
4401#define elf_backend_object_p elf32_hppa_object_p
4402#define elf_backend_final_write_processing elf_hppa_final_write_processing
d952f17a 4403#define elf_backend_post_process_headers elf32_hppa_post_process_headers
30667bf3 4404#define elf_backend_get_symbol_type elf32_hppa_elf_get_symbol_type
98ceb8ce 4405#define elf_backend_reloc_type_class elf32_hppa_reloc_type_class
30667bf3
AM
4406
4407#define elf_backend_can_gc_sections 1
51b64d56 4408#define elf_backend_can_refcount 1
30667bf3
AM
4409#define elf_backend_plt_alignment 2
4410#define elf_backend_want_got_plt 0
4411#define elf_backend_plt_readonly 0
4412#define elf_backend_want_plt_sym 0
74d1c347 4413#define elf_backend_got_header_size 8
252b5132
RH
4414
4415#define TARGET_BIG_SYM bfd_elf32_hppa_vec
4416#define TARGET_BIG_NAME "elf32-hppa"
4417#define ELF_ARCH bfd_arch_hppa
4418#define ELF_MACHINE_CODE EM_PARISC
4419#define ELF_MAXPAGESIZE 0x1000
4420
4421#include "elf32-target.h"
d952f17a
AM
4422
4423#undef TARGET_BIG_SYM
4424#define TARGET_BIG_SYM bfd_elf32_hppa_linux_vec
4425#undef TARGET_BIG_NAME
4426#define TARGET_BIG_NAME "elf32-hppa-linux"
4427
4428#define INCLUDED_TARGET_FILE 1
4429#include "elf32-target.h"