]> git.ipfire.org Git - thirdparty/binutils-gdb.git/blame - bfd/elf32-hppa.c
*** empty log message ***
[thirdparty/binutils-gdb.git] / bfd / elf32-hppa.c
CommitLineData
252b5132 1/* BFD back-end for HP PA-RISC ELF files.
e5094212
AM
2 Copyright 1990, 1991, 1992, 1993, 1994, 1995, 1996, 1999, 2000, 2001,
3 2002 Free Software Foundation, Inc.
252b5132 4
30667bf3 5 Original code by
252b5132
RH
6 Center for Software Science
7 Department of Computer Science
8 University of Utah
30667bf3 9 Largely rewritten by Alan Modra <alan@linuxcare.com.au>
252b5132
RH
10
11This file is part of BFD, the Binary File Descriptor library.
12
13This program is free software; you can redistribute it and/or modify
14it under the terms of the GNU General Public License as published by
15the Free Software Foundation; either version 2 of the License, or
16(at your option) any later version.
17
18This program is distributed in the hope that it will be useful,
19but WITHOUT ANY WARRANTY; without even the implied warranty of
20MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
21GNU General Public License for more details.
22
23You should have received a copy of the GNU General Public License
24along with this program; if not, write to the Free Software
25Foundation, Inc., 59 Temple Place - Suite 330, Boston, MA 02111-1307, USA. */
26
27#include "bfd.h"
28#include "sysdep.h"
252b5132
RH
29#include "libbfd.h"
30#include "elf-bfd.h"
9e103c9c
JL
31#include "elf/hppa.h"
32#include "libhppa.h"
33#include "elf32-hppa.h"
34#define ARCH_SIZE 32
35#include "elf-hppa.h"
edd21aca 36#include "elf32-hppa.h"
9e103c9c 37
74d1c347
AM
38/* In order to gain some understanding of code in this file without
39 knowing all the intricate details of the linker, note the
40 following:
41
42 Functions named elf32_hppa_* are called by external routines, other
43 functions are only called locally. elf32_hppa_* functions appear
44 in this file more or less in the order in which they are called
45 from external routines. eg. elf32_hppa_check_relocs is called
46 early in the link process, elf32_hppa_finish_dynamic_sections is
47 one of the last functions. */
48
edd21aca 49/* We use two hash tables to hold information for linking PA ELF objects.
252b5132
RH
50
51 The first is the elf32_hppa_link_hash_table which is derived
52 from the standard ELF linker hash table. We use this as a place to
53 attach other hash tables and static information.
54
55 The second is the stub hash table which is derived from the
56 base BFD hash table. The stub hash table holds the information
30667bf3
AM
57 necessary to build the linker stubs during a link.
58
59 There are a number of different stubs generated by the linker.
60
61 Long branch stub:
62 : ldil LR'X,%r1
63 : be,n RR'X(%sr4,%r1)
64
65 PIC long branch stub:
66 : b,l .+8,%r1
3ee1d854
AM
67 : addil LR'X - ($PIC_pcrel$0 - 4),%r1
68 : be,n RR'X - ($PIC_pcrel$0 - 8)(%sr4,%r1)
30667bf3
AM
69
70 Import stub to call shared library routine from normal object file
71 (single sub-space version)
3ee1d854
AM
72 : addil LR'lt_ptr+ltoff,%dp ; get procedure entry point
73 : ldw RR'lt_ptr+ltoff(%r1),%r21
30667bf3 74 : bv %r0(%r21)
3ee1d854 75 : ldw RR'lt_ptr+ltoff+4(%r1),%r19 ; get new dlt value.
30667bf3
AM
76
77 Import stub to call shared library routine from shared library
78 (single sub-space version)
3ee1d854
AM
79 : addil LR'ltoff,%r19 ; get procedure entry point
80 : ldw RR'ltoff(%r1),%r21
30667bf3 81 : bv %r0(%r21)
3ee1d854 82 : ldw RR'ltoff+4(%r1),%r19 ; get new dlt value.
30667bf3
AM
83
84 Import stub to call shared library routine from normal object file
85 (multiple sub-space support)
3ee1d854
AM
86 : addil LR'lt_ptr+ltoff,%dp ; get procedure entry point
87 : ldw RR'lt_ptr+ltoff(%r1),%r21
88 : ldw RR'lt_ptr+ltoff+4(%r1),%r19 ; get new dlt value.
30667bf3
AM
89 : ldsid (%r21),%r1
90 : mtsp %r1,%sr0
91 : be 0(%sr0,%r21) ; branch to target
92 : stw %rp,-24(%sp) ; save rp
93
94 Import stub to call shared library routine from shared library
95 (multiple sub-space support)
3ee1d854
AM
96 : addil LR'ltoff,%r19 ; get procedure entry point
97 : ldw RR'ltoff(%r1),%r21
98 : ldw RR'ltoff+4(%r1),%r19 ; get new dlt value.
30667bf3
AM
99 : ldsid (%r21),%r1
100 : mtsp %r1,%sr0
101 : be 0(%sr0,%r21) ; branch to target
102 : stw %rp,-24(%sp) ; save rp
103
104 Export stub to return from shared lib routine (multiple sub-space support)
105 One of these is created for each exported procedure in a shared
106 library (and stored in the shared lib). Shared lib routines are
107 called via the first instruction in the export stub so that we can
108 do an inter-space return. Not required for single sub-space.
109 : bl,n X,%rp ; trap the return
110 : nop
111 : ldw -24(%sp),%rp ; restore the original rp
112 : ldsid (%rp),%r1
113 : mtsp %r1,%sr0
74d1c347 114 : be,n 0(%sr0,%rp) ; inter-space return */
30667bf3
AM
115
116#define PLT_ENTRY_SIZE 8
117#define GOT_ENTRY_SIZE 4
118#define ELF_DYNAMIC_INTERPRETER "/lib/ld.so.1"
119
47d89dba
AM
120static const bfd_byte plt_stub[] =
121{
122 0x0e, 0x80, 0x10, 0x96, /* 1: ldw 0(%r20),%r22 */
123 0xea, 0xc0, 0xc0, 0x00, /* bv %r0(%r22) */
124 0x0e, 0x88, 0x10, 0x95, /* ldw 4(%r20),%r21 */
125#define PLT_STUB_ENTRY (3*4)
126 0xea, 0x9f, 0x1f, 0xdd, /* b,l 1b,%r20 */
127 0xd6, 0x80, 0x1c, 0x1e, /* depi 0,31,2,%r20 */
128 0x00, 0xc0, 0xff, 0xee, /* 9: .word fixup_func */
129 0xde, 0xad, 0xbe, 0xef /* .word fixup_ltp */
130};
131
30667bf3
AM
132/* Section name for stubs is the associated section name plus this
133 string. */
134#define STUB_SUFFIX ".stub"
135
98ceb8ce
AM
136/* We don't need to copy certain PC- or GP-relative dynamic relocs
137 into a shared object's dynamic section. All the relocs of the
138 limited class we are interested in, are absolute. */
139#ifndef RELATIVE_DYNRELOCS
140#define RELATIVE_DYNRELOCS 0
446f2863 141#define IS_ABSOLUTE_RELOC(r_type) 1
30667bf3
AM
142#endif
143
30667bf3
AM
144enum elf32_hppa_stub_type {
145 hppa_stub_long_branch,
146 hppa_stub_long_branch_shared,
147 hppa_stub_import,
148 hppa_stub_import_shared,
149 hppa_stub_export,
150 hppa_stub_none
151};
152
30667bf3 153struct elf32_hppa_stub_hash_entry {
252b5132 154
edd21aca 155 /* Base hash table entry structure. */
252b5132
RH
156 struct bfd_hash_entry root;
157
edd21aca
AM
158 /* The stub section. */
159 asection *stub_sec;
160
161 /* Offset within stub_sec of the beginning of this stub. */
30667bf3 162 bfd_vma stub_offset;
252b5132
RH
163
164 /* Given the symbol's value and its section we can determine its final
165 value when building the stubs (so the stub knows where to jump. */
30667bf3 166 bfd_vma target_value;
252b5132 167 asection *target_section;
30667bf3
AM
168
169 enum elf32_hppa_stub_type stub_type;
170
171 /* The symbol table entry, if any, that this was derived from. */
172 struct elf32_hppa_link_hash_entry *h;
173
25f72752
AM
174 /* Where this stub is being called from, or, in the case of combined
175 stub sections, the first input section in the group. */
176 asection *id_sec;
252b5132
RH
177};
178
30667bf3
AM
179struct elf32_hppa_link_hash_entry {
180
181 struct elf_link_hash_entry elf;
182
183 /* A pointer to the most recently used stub hash entry against this
184 symbol. */
185 struct elf32_hppa_stub_hash_entry *stub_cache;
186
30667bf3
AM
187 /* Used to count relocations for delayed sizing of relocation
188 sections. */
189 struct elf32_hppa_dyn_reloc_entry {
190
191 /* Next relocation in the chain. */
192 struct elf32_hppa_dyn_reloc_entry *next;
193
98ceb8ce
AM
194 /* The input section of the reloc. */
195 asection *sec;
30667bf3
AM
196
197 /* Number of relocs copied in this section. */
198 bfd_size_type count;
98ceb8ce
AM
199
200#if RELATIVE_DYNRELOCS
201 /* Number of relative relocs copied for the input section. */
202 bfd_size_type relative_count;
203#endif
204 } *dyn_relocs;
30667bf3
AM
205
206 /* Set during a static link if we detect a function is PIC. */
12cca0d2
AM
207 unsigned int maybe_pic_call:1;
208
209 /* Set if the only reason we need a .plt entry is for a non-PIC to
210 PIC function call. */
74d1c347
AM
211 unsigned int pic_call:1;
212
213 /* Set if this symbol is used by a plabel reloc. */
214 unsigned int plabel:1;
30667bf3
AM
215};
216
30667bf3
AM
217struct elf32_hppa_link_hash_table {
218
252b5132 219 /* The main hash table. */
ebe50bae 220 struct elf_link_hash_table elf;
252b5132
RH
221
222 /* The stub hash table. */
edd21aca 223 struct bfd_hash_table stub_hash_table;
252b5132 224
30667bf3
AM
225 /* Linker stub bfd. */
226 bfd *stub_bfd;
227
30667bf3
AM
228 /* Linker call-backs. */
229 asection * (*add_stub_section) PARAMS ((const char *, asection *));
230 void (*layout_sections_again) PARAMS ((void));
231
25f72752
AM
232 /* Array to keep track of which stub sections have been created, and
233 information on stub grouping. */
234 struct map_stub {
235 /* This is the section to which stubs in the group will be
236 attached. */
237 asection *link_sec;
238 /* The stub section. */
239 asection *stub_sec;
25f72752 240 } *stub_group;
30667bf3 241
30667bf3
AM
242 /* Short-cuts to get to dynamic linker sections. */
243 asection *sgot;
244 asection *srelgot;
245 asection *splt;
246 asection *srelplt;
247 asection *sdynbss;
248 asection *srelbss;
47d89dba 249
c46b7515
AM
250 /* Used during a final link to store the base of the text and data
251 segments so that we can perform SEGREL relocations. */
252 bfd_vma text_segment_base;
253 bfd_vma data_segment_base;
254
47d89dba
AM
255 /* Whether we support multiple sub-spaces for shared libs. */
256 unsigned int multi_subspace:1;
257
258 /* Flags set when PCREL12F and PCREL17F branches detected. Used to
259 select suitable defaults for the stub group size. */
260 unsigned int has_12bit_branch:1;
261 unsigned int has_17bit_branch:1;
262
263 /* Set if we need a .plt stub to support lazy dynamic linking. */
264 unsigned int need_plt_stub:1;
ec338859
AM
265
266 /* Small local sym to section mapping cache. */
267 struct sym_sec_cache sym_sec;
252b5132
RH
268};
269
30667bf3
AM
270/* Various hash macros and functions. */
271#define hppa_link_hash_table(p) \
edd21aca 272 ((struct elf32_hppa_link_hash_table *) ((p)->hash))
252b5132 273
30667bf3
AM
274#define hppa_stub_hash_lookup(table, string, create, copy) \
275 ((struct elf32_hppa_stub_hash_entry *) \
276 bfd_hash_lookup ((table), (string), (create), (copy)))
277
278static struct bfd_hash_entry *stub_hash_newfunc
279 PARAMS ((struct bfd_hash_entry *, struct bfd_hash_table *, const char *));
edd21aca 280
30667bf3 281static struct bfd_hash_entry *hppa_link_hash_newfunc
edd21aca 282 PARAMS ((struct bfd_hash_entry *, struct bfd_hash_table *, const char *));
252b5132
RH
283
284static struct bfd_link_hash_table *elf32_hppa_link_hash_table_create
285 PARAMS ((bfd *));
286
30667bf3
AM
287/* Stub handling functions. */
288static char *hppa_stub_name
289 PARAMS ((const asection *, const asection *,
290 const struct elf32_hppa_link_hash_entry *,
291 const Elf_Internal_Rela *));
edd21aca 292
30667bf3
AM
293static struct elf32_hppa_stub_hash_entry *hppa_get_stub_entry
294 PARAMS ((const asection *, const asection *,
295 struct elf32_hppa_link_hash_entry *,
25f72752
AM
296 const Elf_Internal_Rela *,
297 struct elf32_hppa_link_hash_table *));
edd21aca 298
30667bf3 299static struct elf32_hppa_stub_hash_entry *hppa_add_stub
25f72752 300 PARAMS ((const char *, asection *, struct elf32_hppa_link_hash_table *));
30667bf3
AM
301
302static enum elf32_hppa_stub_type hppa_type_of_stub
303 PARAMS ((asection *, const Elf_Internal_Rela *,
304 struct elf32_hppa_link_hash_entry *, bfd_vma));
305
306static boolean hppa_build_one_stub
307 PARAMS ((struct bfd_hash_entry *, PTR));
308
309static boolean hppa_size_one_stub
310 PARAMS ((struct bfd_hash_entry *, PTR));
311
30667bf3
AM
312/* BFD and elf backend functions. */
313static boolean elf32_hppa_object_p PARAMS ((bfd *));
252b5132 314
edd21aca
AM
315static boolean elf32_hppa_add_symbol_hook
316 PARAMS ((bfd *, struct bfd_link_info *, const Elf_Internal_Sym *,
317 const char **, flagword *, asection **, bfd_vma *));
252b5132 318
30667bf3
AM
319static boolean elf32_hppa_create_dynamic_sections
320 PARAMS ((bfd *, struct bfd_link_info *));
252b5132 321
ebe50bae
AM
322static void elf32_hppa_copy_indirect_symbol
323 PARAMS ((struct elf_link_hash_entry *, struct elf_link_hash_entry *));
324
30667bf3
AM
325static boolean elf32_hppa_check_relocs
326 PARAMS ((bfd *, struct bfd_link_info *,
327 asection *, const Elf_Internal_Rela *));
328
329static asection *elf32_hppa_gc_mark_hook
330 PARAMS ((bfd *, struct bfd_link_info *, Elf_Internal_Rela *,
331 struct elf_link_hash_entry *, Elf_Internal_Sym *));
332
333static boolean elf32_hppa_gc_sweep_hook
334 PARAMS ((bfd *, struct bfd_link_info *,
335 asection *, const Elf_Internal_Rela *));
336
74d1c347 337static void elf32_hppa_hide_symbol
e5094212 338 PARAMS ((struct bfd_link_info *, struct elf_link_hash_entry *, boolean));
74d1c347 339
30667bf3
AM
340static boolean elf32_hppa_adjust_dynamic_symbol
341 PARAMS ((struct bfd_link_info *, struct elf_link_hash_entry *));
342
a8d02d66
AM
343static boolean mark_PIC_calls
344 PARAMS ((struct elf_link_hash_entry *, PTR));
345
e5ee5df1 346static boolean allocate_plt_static
30667bf3
AM
347 PARAMS ((struct elf_link_hash_entry *, PTR));
348
98ceb8ce
AM
349static boolean allocate_dynrelocs
350 PARAMS ((struct elf_link_hash_entry *, PTR));
351
352static boolean readonly_dynrelocs
30667bf3 353 PARAMS ((struct elf_link_hash_entry *, PTR));
30667bf3 354
d5c73c2f
AM
355static boolean clobber_millicode_symbols
356 PARAMS ((struct elf_link_hash_entry *, struct bfd_link_info *));
357
30667bf3
AM
358static boolean elf32_hppa_size_dynamic_sections
359 PARAMS ((bfd *, struct bfd_link_info *));
360
c46b7515
AM
361static boolean elf32_hppa_final_link
362 PARAMS ((bfd *, struct bfd_link_info *));
363
364static void hppa_record_segment_addr
365 PARAMS ((bfd *, asection *, PTR));
366
30667bf3
AM
367static bfd_reloc_status_type final_link_relocate
368 PARAMS ((asection *, bfd_byte *, const Elf_Internal_Rela *,
25f72752 369 bfd_vma, struct elf32_hppa_link_hash_table *, asection *,
30667bf3
AM
370 struct elf32_hppa_link_hash_entry *));
371
372static boolean elf32_hppa_relocate_section
373 PARAMS ((bfd *, struct bfd_link_info *, bfd *, asection *,
374 bfd_byte *, Elf_Internal_Rela *, Elf_Internal_Sym *, asection **));
375
c46b7515
AM
376static int hppa_unwind_entry_compare
377 PARAMS ((const PTR, const PTR));
378
30667bf3
AM
379static boolean elf32_hppa_finish_dynamic_symbol
380 PARAMS ((bfd *, struct bfd_link_info *,
381 struct elf_link_hash_entry *, Elf_Internal_Sym *));
382
98ceb8ce
AM
383static enum elf_reloc_type_class elf32_hppa_reloc_type_class
384 PARAMS ((const Elf_Internal_Rela *));
385
30667bf3
AM
386static boolean elf32_hppa_finish_dynamic_sections
387 PARAMS ((bfd *, struct bfd_link_info *));
388
d952f17a
AM
389static void elf32_hppa_post_process_headers
390 PARAMS ((bfd *, struct bfd_link_info *));
391
30667bf3
AM
392static int elf32_hppa_elf_get_symbol_type
393 PARAMS ((Elf_Internal_Sym *, int));
252b5132 394
252b5132
RH
395/* Assorted hash table functions. */
396
397/* Initialize an entry in the stub hash table. */
398
399static struct bfd_hash_entry *
30667bf3 400stub_hash_newfunc (entry, table, string)
252b5132
RH
401 struct bfd_hash_entry *entry;
402 struct bfd_hash_table *table;
403 const char *string;
404{
252b5132
RH
405 /* Allocate the structure if it has not already been allocated by a
406 subclass. */
ebe50bae 407 if (entry == NULL)
30667bf3 408 {
ebe50bae
AM
409 entry = bfd_hash_allocate (table,
410 sizeof (struct elf32_hppa_stub_hash_entry));
411 if (entry == NULL)
412 return entry;
30667bf3 413 }
252b5132
RH
414
415 /* Call the allocation method of the superclass. */
ebe50bae
AM
416 entry = bfd_hash_newfunc (entry, table, string);
417 if (entry != NULL)
252b5132 418 {
ebe50bae
AM
419 struct elf32_hppa_stub_hash_entry *eh;
420
252b5132 421 /* Initialize the local fields. */
ebe50bae
AM
422 eh = (struct elf32_hppa_stub_hash_entry *) entry;
423 eh->stub_sec = NULL;
424 eh->stub_offset = 0;
425 eh->target_value = 0;
426 eh->target_section = NULL;
427 eh->stub_type = hppa_stub_long_branch;
428 eh->h = NULL;
429 eh->id_sec = NULL;
30667bf3
AM
430 }
431
ebe50bae 432 return entry;
30667bf3
AM
433}
434
30667bf3
AM
435/* Initialize an entry in the link hash table. */
436
437static struct bfd_hash_entry *
438hppa_link_hash_newfunc (entry, table, string)
439 struct bfd_hash_entry *entry;
440 struct bfd_hash_table *table;
441 const char *string;
442{
30667bf3
AM
443 /* Allocate the structure if it has not already been allocated by a
444 subclass. */
ebe50bae 445 if (entry == NULL)
30667bf3 446 {
ebe50bae
AM
447 entry = bfd_hash_allocate (table,
448 sizeof (struct elf32_hppa_link_hash_entry));
449 if (entry == NULL)
450 return entry;
30667bf3
AM
451 }
452
453 /* Call the allocation method of the superclass. */
ebe50bae
AM
454 entry = _bfd_elf_link_hash_newfunc (entry, table, string);
455 if (entry != NULL)
30667bf3 456 {
ebe50bae
AM
457 struct elf32_hppa_link_hash_entry *eh;
458
30667bf3 459 /* Initialize the local fields. */
ebe50bae
AM
460 eh = (struct elf32_hppa_link_hash_entry *) entry;
461 eh->stub_cache = NULL;
462 eh->dyn_relocs = NULL;
463 eh->maybe_pic_call = 0;
464 eh->pic_call = 0;
465 eh->plabel = 0;
252b5132
RH
466 }
467
ebe50bae 468 return entry;
252b5132
RH
469}
470
252b5132
RH
471/* Create the derived linker hash table. The PA ELF port uses the derived
472 hash table to keep information specific to the PA ELF linker (without
473 using static variables). */
474
475static struct bfd_link_hash_table *
476elf32_hppa_link_hash_table_create (abfd)
477 bfd *abfd;
478{
479 struct elf32_hppa_link_hash_table *ret;
dc810e39 480 bfd_size_type amt = sizeof (*ret);
252b5132 481
dc810e39 482 ret = (struct elf32_hppa_link_hash_table *) bfd_alloc (abfd, amt);
252b5132
RH
483 if (ret == NULL)
484 return NULL;
edd21aca 485
ebe50bae 486 if (!_bfd_elf_link_hash_table_init (&ret->elf, abfd, hppa_link_hash_newfunc))
252b5132
RH
487 {
488 bfd_release (abfd, ret);
489 return NULL;
490 }
edd21aca
AM
491
492 /* Init the stub hash table too. */
30667bf3 493 if (!bfd_hash_table_init (&ret->stub_hash_table, stub_hash_newfunc))
edd21aca
AM
494 return NULL;
495
30667bf3 496 ret->stub_bfd = NULL;
30667bf3
AM
497 ret->add_stub_section = NULL;
498 ret->layout_sections_again = NULL;
25f72752 499 ret->stub_group = NULL;
30667bf3
AM
500 ret->sgot = NULL;
501 ret->srelgot = NULL;
502 ret->splt = NULL;
503 ret->srelplt = NULL;
504 ret->sdynbss = NULL;
505 ret->srelbss = NULL;
c46b7515
AM
506 ret->text_segment_base = (bfd_vma) -1;
507 ret->data_segment_base = (bfd_vma) -1;
47d89dba
AM
508 ret->multi_subspace = 0;
509 ret->has_12bit_branch = 0;
510 ret->has_17bit_branch = 0;
511 ret->need_plt_stub = 0;
ec338859 512 ret->sym_sec.abfd = NULL;
252b5132 513
ebe50bae 514 return &ret->elf.root;
252b5132
RH
515}
516
30667bf3
AM
517/* Build a name for an entry in the stub hash table. */
518
edd21aca 519static char *
30667bf3 520hppa_stub_name (input_section, sym_sec, hash, rel)
edd21aca 521 const asection *input_section;
30667bf3
AM
522 const asection *sym_sec;
523 const struct elf32_hppa_link_hash_entry *hash;
524 const Elf_Internal_Rela *rel;
edd21aca
AM
525{
526 char *stub_name;
dc810e39 527 bfd_size_type len;
edd21aca 528
30667bf3
AM
529 if (hash)
530 {
531 len = 8 + 1 + strlen (hash->elf.root.root.string) + 1 + 8 + 1;
532 stub_name = bfd_malloc (len);
533 if (stub_name != NULL)
534 {
535 sprintf (stub_name, "%08x_%s+%x",
536 input_section->id & 0xffffffff,
537 hash->elf.root.root.string,
538 (int) rel->r_addend & 0xffffffff);
539 }
540 }
541 else
edd21aca 542 {
30667bf3
AM
543 len = 8 + 1 + 8 + 1 + 8 + 1 + 8 + 1;
544 stub_name = bfd_malloc (len);
545 if (stub_name != NULL)
546 {
547 sprintf (stub_name, "%08x_%x:%x+%x",
548 input_section->id & 0xffffffff,
549 sym_sec->id & 0xffffffff,
550 (int) ELF32_R_SYM (rel->r_info) & 0xffffffff,
551 (int) rel->r_addend & 0xffffffff);
552 }
edd21aca
AM
553 }
554 return stub_name;
555}
252b5132 556
30667bf3
AM
557/* Look up an entry in the stub hash. Stub entries are cached because
558 creating the stub name takes a bit of time. */
559
560static struct elf32_hppa_stub_hash_entry *
83c81bfe 561hppa_get_stub_entry (input_section, sym_sec, hash, rel, htab)
30667bf3
AM
562 const asection *input_section;
563 const asection *sym_sec;
564 struct elf32_hppa_link_hash_entry *hash;
565 const Elf_Internal_Rela *rel;
83c81bfe 566 struct elf32_hppa_link_hash_table *htab;
252b5132 567{
30667bf3 568 struct elf32_hppa_stub_hash_entry *stub_entry;
25f72752
AM
569 const asection *id_sec;
570
571 /* If this input section is part of a group of sections sharing one
572 stub section, then use the id of the first section in the group.
573 Stub names need to include a section id, as there may well be
574 more than one stub used to reach say, printf, and we need to
575 distinguish between them. */
83c81bfe 576 id_sec = htab->stub_group[input_section->id].link_sec;
edd21aca 577
30667bf3
AM
578 if (hash != NULL && hash->stub_cache != NULL
579 && hash->stub_cache->h == hash
25f72752 580 && hash->stub_cache->id_sec == id_sec)
edd21aca 581 {
30667bf3
AM
582 stub_entry = hash->stub_cache;
583 }
584 else
585 {
30667bf3 586 char *stub_name;
edd21aca 587
25f72752 588 stub_name = hppa_stub_name (id_sec, sym_sec, hash, rel);
30667bf3
AM
589 if (stub_name == NULL)
590 return NULL;
edd21aca 591
83c81bfe 592 stub_entry = hppa_stub_hash_lookup (&htab->stub_hash_table,
25f72752 593 stub_name, false, false);
f09ebc7d
AM
594 if (hash != NULL)
595 hash->stub_cache = stub_entry;
30667bf3
AM
596
597 free (stub_name);
edd21aca 598 }
30667bf3
AM
599
600 return stub_entry;
601}
602
30667bf3
AM
603/* Add a new stub entry to the stub hash. Not all fields of the new
604 stub entry are initialised. */
605
606static struct elf32_hppa_stub_hash_entry *
83c81bfe 607hppa_add_stub (stub_name, section, htab)
30667bf3
AM
608 const char *stub_name;
609 asection *section;
83c81bfe 610 struct elf32_hppa_link_hash_table *htab;
30667bf3 611{
25f72752 612 asection *link_sec;
30667bf3 613 asection *stub_sec;
30667bf3 614 struct elf32_hppa_stub_hash_entry *stub_entry;
edd21aca 615
83c81bfe
AM
616 link_sec = htab->stub_group[section->id].link_sec;
617 stub_sec = htab->stub_group[section->id].stub_sec;
30667bf3 618 if (stub_sec == NULL)
edd21aca 619 {
83c81bfe 620 stub_sec = htab->stub_group[link_sec->id].stub_sec;
30667bf3
AM
621 if (stub_sec == NULL)
622 {
dc810e39 623 bfd_size_type len;
30667bf3
AM
624 char *s_name;
625
25f72752 626 len = strlen (link_sec->name) + sizeof (STUB_SUFFIX);
83c81bfe 627 s_name = bfd_alloc (htab->stub_bfd, len);
30667bf3
AM
628 if (s_name == NULL)
629 return NULL;
630
25f72752 631 strcpy (s_name, link_sec->name);
30667bf3 632 strcpy (s_name + len - sizeof (STUB_SUFFIX), STUB_SUFFIX);
83c81bfe 633 stub_sec = (*htab->add_stub_section) (s_name, link_sec);
30667bf3
AM
634 if (stub_sec == NULL)
635 return NULL;
83c81bfe 636 htab->stub_group[link_sec->id].stub_sec = stub_sec;
30667bf3 637 }
83c81bfe 638 htab->stub_group[section->id].stub_sec = stub_sec;
edd21aca 639 }
252b5132 640
30667bf3 641 /* Enter this entry into the linker stub hash table. */
83c81bfe 642 stub_entry = hppa_stub_hash_lookup (&htab->stub_hash_table, stub_name,
30667bf3
AM
643 true, false);
644 if (stub_entry == NULL)
645 {
646 (*_bfd_error_handler) (_("%s: cannot create stub entry %s"),
8f615d07 647 bfd_archive_filename (section->owner),
30667bf3
AM
648 stub_name);
649 return NULL;
edd21aca
AM
650 }
651
30667bf3 652 stub_entry->stub_sec = stub_sec;
30667bf3 653 stub_entry->stub_offset = 0;
25f72752 654 stub_entry->id_sec = link_sec;
30667bf3 655 return stub_entry;
edd21aca
AM
656}
657
30667bf3
AM
658/* Determine the type of stub needed, if any, for a call. */
659
660static enum elf32_hppa_stub_type
661hppa_type_of_stub (input_sec, rel, hash, destination)
662 asection *input_sec;
663 const Elf_Internal_Rela *rel;
664 struct elf32_hppa_link_hash_entry *hash;
665 bfd_vma destination;
edd21aca 666{
edd21aca 667 bfd_vma location;
30667bf3
AM
668 bfd_vma branch_offset;
669 bfd_vma max_branch_offset;
670 unsigned int r_type;
671
672 if (hash != NULL
673 && (((hash->elf.root.type == bfd_link_hash_defined
74d1c347
AM
674 || hash->elf.root.type == bfd_link_hash_defweak)
675 && hash->elf.root.u.def.section->output_section == NULL)
676 || (hash->elf.root.type == bfd_link_hash_defweak
677 && hash->elf.dynindx != -1
678 && hash->elf.plt.offset != (bfd_vma) -1)
30667bf3
AM
679 || hash->elf.root.type == bfd_link_hash_undefweak
680 || hash->elf.root.type == bfd_link_hash_undefined
12cca0d2 681 || (hash->maybe_pic_call && !(input_sec->flags & SEC_HAS_GOT_REF))))
30667bf3
AM
682 {
683 /* If output_section is NULL, then it's a symbol defined in a
684 shared library. We will need an import stub. Decide between
74d1c347
AM
685 hppa_stub_import and hppa_stub_import_shared later. For
686 shared links we need stubs for undefined or weak syms too;
687 They will presumably be resolved by the dynamic linker. */
30667bf3
AM
688 return hppa_stub_import;
689 }
edd21aca 690
30667bf3
AM
691 /* Determine where the call point is. */
692 location = (input_sec->output_offset
693 + input_sec->output_section->vma
694 + rel->r_offset);
edd21aca 695
30667bf3
AM
696 branch_offset = destination - location - 8;
697 r_type = ELF32_R_TYPE (rel->r_info);
edd21aca 698
30667bf3
AM
699 /* Determine if a long branch stub is needed. parisc branch offsets
700 are relative to the second instruction past the branch, ie. +8
701 bytes on from the branch instruction location. The offset is
702 signed and counts in units of 4 bytes. */
703 if (r_type == (unsigned int) R_PARISC_PCREL17F)
edd21aca 704 {
30667bf3
AM
705 max_branch_offset = (1 << (17-1)) << 2;
706 }
707 else if (r_type == (unsigned int) R_PARISC_PCREL12F)
708 {
709 max_branch_offset = (1 << (12-1)) << 2;
710 }
25f72752 711 else /* R_PARISC_PCREL22F. */
30667bf3
AM
712 {
713 max_branch_offset = (1 << (22-1)) << 2;
edd21aca
AM
714 }
715
30667bf3 716 if (branch_offset + max_branch_offset >= 2*max_branch_offset)
98ceb8ce
AM
717 return hppa_stub_long_branch;
718
30667bf3
AM
719 return hppa_stub_none;
720}
edd21aca 721
30667bf3
AM
722/* Build one linker stub as defined by the stub hash table entry GEN_ENTRY.
723 IN_ARG contains the link info pointer. */
edd21aca 724
30667bf3
AM
725#define LDIL_R1 0x20200000 /* ldil LR'XXX,%r1 */
726#define BE_SR4_R1 0xe0202002 /* be,n RR'XXX(%sr4,%r1) */
edd21aca 727
30667bf3 728#define BL_R1 0xe8200000 /* b,l .+8,%r1 */
3ee1d854 729#define ADDIL_R1 0x28200000 /* addil LR'XXX,%r1,%r1 */
30667bf3 730#define DEPI_R1 0xd4201c1e /* depi 0,31,2,%r1 */
252b5132 731
3ee1d854
AM
732#define ADDIL_DP 0x2b600000 /* addil LR'XXX,%dp,%r1 */
733#define LDW_R1_R21 0x48350000 /* ldw RR'XXX(%sr0,%r1),%r21 */
30667bf3 734#define BV_R0_R21 0xeaa0c000 /* bv %r0(%r21) */
3ee1d854 735#define LDW_R1_R19 0x48330000 /* ldw RR'XXX(%sr0,%r1),%r19 */
252b5132 736
3ee1d854
AM
737#define ADDIL_R19 0x2a600000 /* addil LR'XXX,%r19,%r1 */
738#define LDW_R1_DP 0x483b0000 /* ldw RR'XXX(%sr0,%r1),%dp */
edd21aca 739
30667bf3
AM
740#define LDSID_R21_R1 0x02a010a1 /* ldsid (%sr0,%r21),%r1 */
741#define MTSP_R1 0x00011820 /* mtsp %r1,%sr0 */
742#define BE_SR0_R21 0xe2a00000 /* be 0(%sr0,%r21) */
743#define STW_RP 0x6bc23fd1 /* stw %rp,-24(%sr0,%sp) */
edd21aca 744
30667bf3
AM
745#define BL_RP 0xe8400002 /* b,l,n XXX,%rp */
746#define NOP 0x08000240 /* nop */
747#define LDW_RP 0x4bc23fd1 /* ldw -24(%sr0,%sp),%rp */
748#define LDSID_RP_R1 0x004010a1 /* ldsid (%sr0,%rp),%r1 */
749#define BE_SR0_RP 0xe0400002 /* be,n 0(%sr0,%rp) */
edd21aca 750
30667bf3
AM
751#ifndef R19_STUBS
752#define R19_STUBS 1
753#endif
edd21aca 754
30667bf3
AM
755#if R19_STUBS
756#define LDW_R1_DLT LDW_R1_R19
757#else
758#define LDW_R1_DLT LDW_R1_DP
759#endif
edd21aca 760
30667bf3
AM
761static boolean
762hppa_build_one_stub (gen_entry, in_arg)
763 struct bfd_hash_entry *gen_entry;
764 PTR in_arg;
765{
766 struct elf32_hppa_stub_hash_entry *stub_entry;
767 struct bfd_link_info *info;
83c81bfe 768 struct elf32_hppa_link_hash_table *htab;
30667bf3
AM
769 asection *stub_sec;
770 bfd *stub_bfd;
771 bfd_byte *loc;
772 bfd_vma sym_value;
74d1c347 773 bfd_vma insn;
8dea1268 774 bfd_vma off;
74d1c347 775 int val;
30667bf3 776 int size;
edd21aca 777
30667bf3
AM
778 /* Massage our args to the form they really have. */
779 stub_entry = (struct elf32_hppa_stub_hash_entry *) gen_entry;
780 info = (struct bfd_link_info *) in_arg;
781
83c81bfe 782 htab = hppa_link_hash_table (info);
30667bf3 783 stub_sec = stub_entry->stub_sec;
edd21aca 784
30667bf3 785 /* Make a note of the offset within the stubs for this entry. */
74d1c347 786 stub_entry->stub_offset = stub_sec->_raw_size;
30667bf3 787 loc = stub_sec->contents + stub_entry->stub_offset;
252b5132 788
30667bf3
AM
789 stub_bfd = stub_sec->owner;
790
791 switch (stub_entry->stub_type)
792 {
793 case hppa_stub_long_branch:
794 /* Create the long branch. A long branch is formed with "ldil"
795 loading the upper bits of the target address into a register,
796 then branching with "be" which adds in the lower bits.
797 The "be" has its delay slot nullified. */
798 sym_value = (stub_entry->target_value
799 + stub_entry->target_section->output_offset
800 + stub_entry->target_section->output_section->vma);
801
74d1c347
AM
802 val = hppa_field_adjust (sym_value, (bfd_signed_vma) 0, e_lrsel);
803 insn = hppa_rebuild_insn ((int) LDIL_R1, val, 21);
30667bf3
AM
804 bfd_put_32 (stub_bfd, insn, loc);
805
74d1c347
AM
806 val = hppa_field_adjust (sym_value, (bfd_signed_vma) 0, e_rrsel) >> 2;
807 insn = hppa_rebuild_insn ((int) BE_SR4_R1, val, 17);
30667bf3
AM
808 bfd_put_32 (stub_bfd, insn, loc + 4);
809
30667bf3 810 size = 8;
edd21aca
AM
811 break;
812
30667bf3
AM
813 case hppa_stub_long_branch_shared:
814 /* Branches are relative. This is where we are going to. */
815 sym_value = (stub_entry->target_value
816 + stub_entry->target_section->output_offset
817 + stub_entry->target_section->output_section->vma);
818
819 /* And this is where we are coming from, more or less. */
820 sym_value -= (stub_entry->stub_offset
821 + stub_sec->output_offset
822 + stub_sec->output_section->vma);
823
74d1c347 824 bfd_put_32 (stub_bfd, (bfd_vma) BL_R1, loc);
47d89dba 825 val = hppa_field_adjust (sym_value, (bfd_signed_vma) -8, e_lrsel);
74d1c347 826 insn = hppa_rebuild_insn ((int) ADDIL_R1, val, 21);
30667bf3
AM
827 bfd_put_32 (stub_bfd, insn, loc + 4);
828
47d89dba 829 val = hppa_field_adjust (sym_value, (bfd_signed_vma) -8, e_rrsel) >> 2;
74d1c347 830 insn = hppa_rebuild_insn ((int) BE_SR4_R1, val, 17);
30667bf3
AM
831 bfd_put_32 (stub_bfd, insn, loc + 8);
832 size = 12;
833 break;
edd21aca 834
30667bf3
AM
835 case hppa_stub_import:
836 case hppa_stub_import_shared:
8dea1268
AM
837 off = stub_entry->h->elf.plt.offset;
838 if (off >= (bfd_vma) -2)
49e9d0d3 839 abort ();
8dea1268
AM
840
841 off &= ~ (bfd_vma) 1;
842 sym_value = (off
83c81bfe
AM
843 + htab->splt->output_offset
844 + htab->splt->output_section->vma
845 - elf_gp (htab->splt->output_section->owner));
30667bf3
AM
846
847 insn = ADDIL_DP;
848#if R19_STUBS
849 if (stub_entry->stub_type == hppa_stub_import_shared)
850 insn = ADDIL_R19;
851#endif
47d89dba 852 val = hppa_field_adjust (sym_value, (bfd_signed_vma) 0, e_lrsel),
74d1c347 853 insn = hppa_rebuild_insn ((int) insn, val, 21);
30667bf3 854 bfd_put_32 (stub_bfd, insn, loc);
edd21aca 855
47d89dba
AM
856 /* It is critical to use lrsel/rrsel here because we are using
857 two different offsets (+0 and +4) from sym_value. If we use
858 lsel/rsel then with unfortunate sym_values we will round
859 sym_value+4 up to the next 2k block leading to a mis-match
860 between the lsel and rsel value. */
861 val = hppa_field_adjust (sym_value, (bfd_signed_vma) 0, e_rrsel);
74d1c347 862 insn = hppa_rebuild_insn ((int) LDW_R1_R21, val, 14);
30667bf3 863 bfd_put_32 (stub_bfd, insn, loc + 4);
252b5132 864
83c81bfe 865 if (htab->multi_subspace)
30667bf3 866 {
47d89dba 867 val = hppa_field_adjust (sym_value, (bfd_signed_vma) 4, e_rrsel);
74d1c347 868 insn = hppa_rebuild_insn ((int) LDW_R1_DLT, val, 14);
30667bf3 869 bfd_put_32 (stub_bfd, insn, loc + 8);
252b5132 870
74d1c347
AM
871 bfd_put_32 (stub_bfd, (bfd_vma) LDSID_R21_R1, loc + 12);
872 bfd_put_32 (stub_bfd, (bfd_vma) MTSP_R1, loc + 16);
873 bfd_put_32 (stub_bfd, (bfd_vma) BE_SR0_R21, loc + 20);
874 bfd_put_32 (stub_bfd, (bfd_vma) STW_RP, loc + 24);
252b5132 875
30667bf3
AM
876 size = 28;
877 }
878 else
879 {
74d1c347 880 bfd_put_32 (stub_bfd, (bfd_vma) BV_R0_R21, loc + 8);
47d89dba 881 val = hppa_field_adjust (sym_value, (bfd_signed_vma) 4, e_rrsel);
74d1c347 882 insn = hppa_rebuild_insn ((int) LDW_R1_DLT, val, 14);
30667bf3 883 bfd_put_32 (stub_bfd, insn, loc + 12);
252b5132 884
30667bf3
AM
885 size = 16;
886 }
252b5132 887
30667bf3
AM
888 if (!info->shared
889 && stub_entry->h != NULL
890 && stub_entry->h->pic_call)
252b5132 891 {
30667bf3
AM
892 /* Build the .plt entry needed to call a PIC function from
893 statically linked code. We don't need any relocs. */
894 bfd *dynobj;
895 struct elf32_hppa_link_hash_entry *eh;
896 bfd_vma value;
252b5132 897
ebe50bae 898 dynobj = htab->elf.dynobj;
30667bf3 899 eh = (struct elf32_hppa_link_hash_entry *) stub_entry->h;
252b5132 900
49e9d0d3
AM
901 if (eh->elf.root.type != bfd_link_hash_defined
902 && eh->elf.root.type != bfd_link_hash_defweak)
903 abort ();
252b5132 904
30667bf3
AM
905 value = (eh->elf.root.u.def.value
906 + eh->elf.root.u.def.section->output_offset
907 + eh->elf.root.u.def.section->output_section->vma);
252b5132 908
30667bf3 909 /* Fill in the entry in the procedure linkage table.
252b5132 910
30667bf3 911 The format of a plt entry is
74d1c347
AM
912 <funcaddr>
913 <__gp>. */
252b5132 914
83c81bfe
AM
915 bfd_put_32 (htab->splt->owner, value,
916 htab->splt->contents + off);
917 value = elf_gp (htab->splt->output_section->owner);
918 bfd_put_32 (htab->splt->owner, value,
919 htab->splt->contents + off + 4);
252b5132 920 }
30667bf3 921 break;
252b5132 922
30667bf3
AM
923 case hppa_stub_export:
924 /* Branches are relative. This is where we are going to. */
925 sym_value = (stub_entry->target_value
926 + stub_entry->target_section->output_offset
927 + stub_entry->target_section->output_section->vma);
252b5132 928
30667bf3
AM
929 /* And this is where we are coming from. */
930 sym_value -= (stub_entry->stub_offset
931 + stub_sec->output_offset
932 + stub_sec->output_section->vma);
edd21aca 933
30667bf3
AM
934 if (sym_value - 8 + 0x40000 >= 0x80000)
935 {
edd21aca 936 (*_bfd_error_handler)
30667bf3 937 (_("%s(%s+0x%lx): cannot reach %s, recompile with -ffunction-sections"),
8f615d07 938 bfd_archive_filename (stub_entry->target_section->owner),
30667bf3
AM
939 stub_sec->name,
940 (long) stub_entry->stub_offset,
941 stub_entry->root.string);
942 bfd_set_error (bfd_error_bad_value);
edd21aca 943 return false;
252b5132 944 }
30667bf3 945
74d1c347
AM
946 val = hppa_field_adjust (sym_value, (bfd_signed_vma) -8, e_fsel) >> 2;
947 insn = hppa_rebuild_insn ((int) BL_RP, val, 17);
30667bf3
AM
948 bfd_put_32 (stub_bfd, insn, loc);
949
74d1c347
AM
950 bfd_put_32 (stub_bfd, (bfd_vma) NOP, loc + 4);
951 bfd_put_32 (stub_bfd, (bfd_vma) LDW_RP, loc + 8);
952 bfd_put_32 (stub_bfd, (bfd_vma) LDSID_RP_R1, loc + 12);
953 bfd_put_32 (stub_bfd, (bfd_vma) MTSP_R1, loc + 16);
954 bfd_put_32 (stub_bfd, (bfd_vma) BE_SR0_RP, loc + 20);
30667bf3
AM
955
956 /* Point the function symbol at the stub. */
957 stub_entry->h->elf.root.u.def.section = stub_sec;
74d1c347 958 stub_entry->h->elf.root.u.def.value = stub_sec->_raw_size;
30667bf3
AM
959
960 size = 24;
961 break;
962
963 default:
964 BFD_FAIL ();
965 return false;
252b5132
RH
966 }
967
74d1c347 968 stub_sec->_raw_size += size;
252b5132
RH
969 return true;
970}
971
30667bf3
AM
972#undef LDIL_R1
973#undef BE_SR4_R1
974#undef BL_R1
975#undef ADDIL_R1
976#undef DEPI_R1
977#undef ADDIL_DP
978#undef LDW_R1_R21
979#undef LDW_R1_DLT
980#undef LDW_R1_R19
981#undef ADDIL_R19
982#undef LDW_R1_DP
983#undef LDSID_R21_R1
984#undef MTSP_R1
985#undef BE_SR0_R21
986#undef STW_RP
987#undef BV_R0_R21
988#undef BL_RP
989#undef NOP
990#undef LDW_RP
991#undef LDSID_RP_R1
992#undef BE_SR0_RP
252b5132 993
30667bf3
AM
994/* As above, but don't actually build the stub. Just bump offset so
995 we know stub section sizes. */
996
997static boolean
998hppa_size_one_stub (gen_entry, in_arg)
999 struct bfd_hash_entry *gen_entry;
1000 PTR in_arg;
252b5132 1001{
30667bf3 1002 struct elf32_hppa_stub_hash_entry *stub_entry;
83c81bfe 1003 struct elf32_hppa_link_hash_table *htab;
30667bf3
AM
1004 int size;
1005
1006 /* Massage our args to the form they really have. */
1007 stub_entry = (struct elf32_hppa_stub_hash_entry *) gen_entry;
83c81bfe 1008 htab = (struct elf32_hppa_link_hash_table *) in_arg;
30667bf3
AM
1009
1010 if (stub_entry->stub_type == hppa_stub_long_branch)
98ceb8ce 1011 size = 8;
30667bf3
AM
1012 else if (stub_entry->stub_type == hppa_stub_long_branch_shared)
1013 size = 12;
1014 else if (stub_entry->stub_type == hppa_stub_export)
1015 size = 24;
74d1c347 1016 else /* hppa_stub_import or hppa_stub_import_shared. */
252b5132 1017 {
83c81bfe 1018 if (htab->multi_subspace)
30667bf3
AM
1019 size = 28;
1020 else
1021 size = 16;
1022 }
252b5132 1023
74d1c347 1024 stub_entry->stub_sec->_raw_size += size;
30667bf3
AM
1025 return true;
1026}
252b5132 1027
30667bf3
AM
1028/* Return nonzero if ABFD represents an HPPA ELF32 file.
1029 Additionally we set the default architecture and machine. */
1030
1031static boolean
1032elf32_hppa_object_p (abfd)
1033 bfd *abfd;
1034{
24a5e751
L
1035 Elf_Internal_Ehdr * i_ehdrp;
1036 unsigned int flags;
252b5132 1037
24a5e751
L
1038 i_ehdrp = elf_elfheader (abfd);
1039 if (strcmp (bfd_get_target (abfd), "elf32-hppa-linux") == 0)
1040 {
1041 if (i_ehdrp->e_ident[EI_OSABI] != ELFOSABI_LINUX)
1042 return false;
1043 }
1044 else
1045 {
1046 if (i_ehdrp->e_ident[EI_OSABI] != ELFOSABI_HPUX)
1047 return false;
1048 }
1049
1050 flags = i_ehdrp->e_flags;
30667bf3
AM
1051 switch (flags & (EF_PARISC_ARCH | EF_PARISC_WIDE))
1052 {
1053 case EFA_PARISC_1_0:
1054 return bfd_default_set_arch_mach (abfd, bfd_arch_hppa, 10);
1055 case EFA_PARISC_1_1:
1056 return bfd_default_set_arch_mach (abfd, bfd_arch_hppa, 11);
1057 case EFA_PARISC_2_0:
1058 return bfd_default_set_arch_mach (abfd, bfd_arch_hppa, 20);
1059 case EFA_PARISC_2_0 | EF_PARISC_WIDE:
1060 return bfd_default_set_arch_mach (abfd, bfd_arch_hppa, 25);
1061 }
1062 return true;
252b5132
RH
1063}
1064
252b5132
RH
1065/* Undo the generic ELF code's subtraction of section->vma from the
1066 value of each external symbol. */
1067
1068static boolean
1069elf32_hppa_add_symbol_hook (abfd, info, sym, namep, flagsp, secp, valp)
5f771d47
ILT
1070 bfd *abfd ATTRIBUTE_UNUSED;
1071 struct bfd_link_info *info ATTRIBUTE_UNUSED;
1072 const Elf_Internal_Sym *sym ATTRIBUTE_UNUSED;
1073 const char **namep ATTRIBUTE_UNUSED;
1074 flagword *flagsp ATTRIBUTE_UNUSED;
252b5132
RH
1075 asection **secp;
1076 bfd_vma *valp;
1077{
1078 *valp += (*secp)->vma;
1079 return true;
1080}
1081
30667bf3
AM
1082/* Create the .plt and .got sections, and set up our hash table
1083 short-cuts to various dynamic sections. */
1084
1085static boolean
1086elf32_hppa_create_dynamic_sections (abfd, info)
1087 bfd *abfd;
1088 struct bfd_link_info *info;
252b5132 1089{
83c81bfe 1090 struct elf32_hppa_link_hash_table *htab;
edd21aca 1091
30667bf3 1092 /* Don't try to create the .plt and .got twice. */
83c81bfe
AM
1093 htab = hppa_link_hash_table (info);
1094 if (htab->splt != NULL)
30667bf3 1095 return true;
edd21aca 1096
30667bf3
AM
1097 /* Call the generic code to do most of the work. */
1098 if (! _bfd_elf_create_dynamic_sections (abfd, info))
1099 return false;
252b5132 1100
83c81bfe
AM
1101 htab->splt = bfd_get_section_by_name (abfd, ".plt");
1102 htab->srelplt = bfd_get_section_by_name (abfd, ".rela.plt");
30667bf3 1103
83c81bfe
AM
1104 htab->sgot = bfd_get_section_by_name (abfd, ".got");
1105 htab->srelgot = bfd_make_section (abfd, ".rela.got");
1106 if (htab->srelgot == NULL
1107 || ! bfd_set_section_flags (abfd, htab->srelgot,
30667bf3
AM
1108 (SEC_ALLOC
1109 | SEC_LOAD
1110 | SEC_HAS_CONTENTS
1111 | SEC_IN_MEMORY
1112 | SEC_LINKER_CREATED
1113 | SEC_READONLY))
83c81bfe 1114 || ! bfd_set_section_alignment (abfd, htab->srelgot, 2))
30667bf3 1115 return false;
edd21aca 1116
83c81bfe
AM
1117 htab->sdynbss = bfd_get_section_by_name (abfd, ".dynbss");
1118 htab->srelbss = bfd_get_section_by_name (abfd, ".rela.bss");
30667bf3
AM
1119
1120 return true;
1121}
1122
ebe50bae
AM
1123/* Copy the extra info we tack onto an elf_link_hash_entry. */
1124
51b64d56 1125static void
ebe50bae
AM
1126elf32_hppa_copy_indirect_symbol (dir, ind)
1127 struct elf_link_hash_entry *dir, *ind;
1128{
1129 struct elf32_hppa_link_hash_entry *edir, *eind;
1130
1131 edir = (struct elf32_hppa_link_hash_entry *) dir;
1132 eind = (struct elf32_hppa_link_hash_entry *) ind;
1133
bbd7ec4a 1134 if (eind->dyn_relocs != NULL)
ebe50bae 1135 {
bbd7ec4a
AM
1136 if (edir->dyn_relocs != NULL)
1137 {
1138 struct elf32_hppa_dyn_reloc_entry **pp;
1139 struct elf32_hppa_dyn_reloc_entry *p;
1140
1e370bd2 1141 if (ind->root.type == bfd_link_hash_indirect)
bbd7ec4a
AM
1142 abort ();
1143
1144 /* Add reloc counts against the weak sym to the strong sym
1145 list. Merge any entries against the same section. */
1146 for (pp = &eind->dyn_relocs; (p = *pp) != NULL; )
1147 {
1148 struct elf32_hppa_dyn_reloc_entry *q;
1149
1150 for (q = edir->dyn_relocs; q != NULL; q = q->next)
1151 if (q->sec == p->sec)
1152 {
1153#if RELATIVE_DYNRELOCS
1154 q->relative_count += p->relative_count;
1155#endif
1156 q->count += p->count;
1157 *pp = p->next;
1158 break;
1159 }
1160 if (q == NULL)
1161 pp = &p->next;
1162 }
1163 *pp = edir->dyn_relocs;
1164 }
1165
ebe50bae
AM
1166 edir->dyn_relocs = eind->dyn_relocs;
1167 eind->dyn_relocs = NULL;
1168 }
ebe50bae
AM
1169
1170 _bfd_elf_link_hash_copy_indirect (dir, ind);
1171}
1172
30667bf3 1173/* Look through the relocs for a section during the first phase, and
3ac8354b
AM
1174 calculate needed space in the global offset table, procedure linkage
1175 table, and dynamic reloc sections. At this point we haven't
1176 necessarily read all the input files. */
252b5132
RH
1177
1178static boolean
30667bf3
AM
1179elf32_hppa_check_relocs (abfd, info, sec, relocs)
1180 bfd *abfd;
1181 struct bfd_link_info *info;
1182 asection *sec;
1183 const Elf_Internal_Rela *relocs;
252b5132 1184{
30667bf3
AM
1185 Elf_Internal_Shdr *symtab_hdr;
1186 struct elf_link_hash_entry **sym_hashes;
30667bf3
AM
1187 const Elf_Internal_Rela *rel;
1188 const Elf_Internal_Rela *rel_end;
83c81bfe 1189 struct elf32_hppa_link_hash_table *htab;
30667bf3
AM
1190 asection *sreloc;
1191 asection *stubreloc;
1192
1193 if (info->relocateable)
1194 return true;
1195
83c81bfe 1196 htab = hppa_link_hash_table (info);
30667bf3
AM
1197 symtab_hdr = &elf_tdata (abfd)->symtab_hdr;
1198 sym_hashes = elf_sym_hashes (abfd);
30667bf3
AM
1199 sreloc = NULL;
1200 stubreloc = NULL;
1201
1202 rel_end = relocs + sec->reloc_count;
1203 for (rel = relocs; rel < rel_end; rel++)
1204 {
1205 enum {
1206 NEED_GOT = 1,
1207 NEED_PLT = 2,
1208 NEED_DYNREL = 4,
98ceb8ce 1209 PLT_PLABEL = 8
30667bf3 1210 };
edd21aca 1211
30667bf3
AM
1212 unsigned int r_symndx, r_type;
1213 struct elf32_hppa_link_hash_entry *h;
1214 int need_entry;
252b5132 1215
30667bf3 1216 r_symndx = ELF32_R_SYM (rel->r_info);
252b5132 1217
30667bf3
AM
1218 if (r_symndx < symtab_hdr->sh_info)
1219 h = NULL;
1220 else
1221 h = ((struct elf32_hppa_link_hash_entry *)
1222 sym_hashes[r_symndx - symtab_hdr->sh_info]);
252b5132 1223
30667bf3 1224 r_type = ELF32_R_TYPE (rel->r_info);
252b5132 1225
30667bf3
AM
1226 switch (r_type)
1227 {
1228 case R_PARISC_DLTIND14F:
1229 case R_PARISC_DLTIND14R:
1230 case R_PARISC_DLTIND21L:
1231 /* This symbol requires a global offset table entry. */
1232 need_entry = NEED_GOT;
1233
1234 /* Mark this section as containing PIC code. */
1235 sec->flags |= SEC_HAS_GOT_REF;
1236 break;
1237
1238 case R_PARISC_PLABEL14R: /* "Official" procedure labels. */
1239 case R_PARISC_PLABEL21L:
1240 case R_PARISC_PLABEL32:
74d1c347 1241 /* If the addend is non-zero, we break badly. */
49e9d0d3
AM
1242 if (rel->r_addend != 0)
1243 abort ();
74d1c347
AM
1244
1245 /* If we are creating a shared library, then we need to
1246 create a PLT entry for all PLABELs, because PLABELs with
1247 local symbols may be passed via a pointer to another
1248 object. Additionally, output a dynamic relocation
4dc86686
AM
1249 pointing to the PLT entry.
1250 For executables, the original 32-bit ABI allowed two
1251 different styles of PLABELs (function pointers): For
1252 global functions, the PLABEL word points into the .plt
1253 two bytes past a (function address, gp) pair, and for
1254 local functions the PLABEL points directly at the
1255 function. The magic +2 for the first type allows us to
1256 differentiate between the two. As you can imagine, this
1257 is a real pain when it comes to generating code to call
1258 functions indirectly or to compare function pointers.
1259 We avoid the mess by always pointing a PLABEL into the
1260 .plt, even for local functions. */
74d1c347 1261 need_entry = PLT_PLABEL | NEED_PLT | NEED_DYNREL;
30667bf3
AM
1262 break;
1263
1264 case R_PARISC_PCREL12F:
83c81bfe 1265 htab->has_12bit_branch = 1;
47d89dba 1266 /* Fall thru. */
30667bf3
AM
1267 case R_PARISC_PCREL17C:
1268 case R_PARISC_PCREL17F:
83c81bfe 1269 htab->has_17bit_branch = 1;
47d89dba 1270 /* Fall thru. */
30667bf3 1271 case R_PARISC_PCREL22F:
47d89dba
AM
1272 /* Function calls might need to go through the .plt, and
1273 might require long branch stubs. */
30667bf3
AM
1274 if (h == NULL)
1275 {
1276 /* We know local syms won't need a .plt entry, and if
1277 they need a long branch stub we can't guarantee that
1278 we can reach the stub. So just flag an error later
1279 if we're doing a shared link and find we need a long
1280 branch stub. */
1281 continue;
1282 }
1283 else
1284 {
1285 /* Global symbols will need a .plt entry if they remain
1286 global, and in most cases won't need a long branch
1287 stub. Unfortunately, we have to cater for the case
1288 where a symbol is forced local by versioning, or due
1289 to symbolic linking, and we lose the .plt entry. */
98ceb8ce 1290 need_entry = NEED_PLT;
4dc86686 1291 if (h->elf.type == STT_PARISC_MILLI)
98ceb8ce 1292 need_entry = 0;
30667bf3
AM
1293 }
1294 break;
1295
1296 case R_PARISC_SEGBASE: /* Used to set segment base. */
c46b7515 1297 case R_PARISC_SEGREL32: /* Relative reloc, used for unwind. */
30667bf3
AM
1298 case R_PARISC_PCREL14F: /* PC relative load/store. */
1299 case R_PARISC_PCREL14R:
1300 case R_PARISC_PCREL17R: /* External branches. */
1301 case R_PARISC_PCREL21L: /* As above, and for load/store too. */
1302 /* We don't need to propagate the relocation if linking a
1303 shared object since these are section relative. */
1304 continue;
1305
1306 case R_PARISC_DPREL14F: /* Used for gp rel data load/store. */
1307 case R_PARISC_DPREL14R:
1308 case R_PARISC_DPREL21L:
1309 if (info->shared)
1310 {
1311 (*_bfd_error_handler)
1312 (_("%s: relocation %s can not be used when making a shared object; recompile with -fPIC"),
8f615d07 1313 bfd_archive_filename (abfd),
30667bf3
AM
1314 elf_hppa_howto_table[r_type].name);
1315 bfd_set_error (bfd_error_bad_value);
1316 return false;
1317 }
1318 /* Fall through. */
1319
1320 case R_PARISC_DIR17F: /* Used for external branches. */
1321 case R_PARISC_DIR17R:
47d89dba
AM
1322 case R_PARISC_DIR14F: /* Used for load/store from absolute locn. */
1323 case R_PARISC_DIR14R:
30667bf3
AM
1324 case R_PARISC_DIR21L: /* As above, and for ext branches too. */
1325#if 1
1326 /* Help debug shared library creation. Any of the above
1327 relocs can be used in shared libs, but they may cause
1328 pages to become unshared. */
1329 if (info->shared)
1330 {
1331 (*_bfd_error_handler)
1332 (_("%s: relocation %s should not be used when making a shared object; recompile with -fPIC"),
8f615d07 1333 bfd_archive_filename (abfd),
30667bf3
AM
1334 elf_hppa_howto_table[r_type].name);
1335 }
1336 /* Fall through. */
1337#endif
1338
c46b7515 1339 case R_PARISC_DIR32: /* .word relocs. */
30667bf3
AM
1340 /* We may want to output a dynamic relocation later. */
1341 need_entry = NEED_DYNREL;
1342 break;
1343
1344 /* This relocation describes the C++ object vtable hierarchy.
1345 Reconstruct it for later use during GC. */
1346 case R_PARISC_GNU_VTINHERIT:
1347 if (!_bfd_elf32_gc_record_vtinherit (abfd, sec,
1348 &h->elf, rel->r_offset))
1349 return false;
1350 continue;
1351
1352 /* This relocation describes which C++ vtable entries are actually
1353 used. Record for later use during GC. */
1354 case R_PARISC_GNU_VTENTRY:
1355 if (!_bfd_elf32_gc_record_vtentry (abfd, sec,
36605136 1356 &h->elf, rel->r_addend))
30667bf3
AM
1357 return false;
1358 continue;
1359
1360 default:
1361 continue;
1362 }
1363
1364 /* Now carry out our orders. */
1365 if (need_entry & NEED_GOT)
1366 {
1367 /* Allocate space for a GOT entry, as well as a dynamic
25f72752 1368 relocation for this entry. */
83c81bfe 1369 if (htab->sgot == NULL)
30667bf3 1370 {
3ac8354b
AM
1371 if (htab->elf.dynobj == NULL)
1372 htab->elf.dynobj = abfd;
1373 if (!elf32_hppa_create_dynamic_sections (htab->elf.dynobj, info))
30667bf3
AM
1374 return false;
1375 }
1376
1377 if (h != NULL)
1378 {
51b64d56 1379 h->elf.got.refcount += 1;
30667bf3
AM
1380 }
1381 else
1382 {
3ac8354b
AM
1383 bfd_signed_vma *local_got_refcounts;
1384
30667bf3 1385 /* This is a global offset table entry for a local symbol. */
3ac8354b 1386 local_got_refcounts = elf_local_got_refcounts (abfd);
30667bf3
AM
1387 if (local_got_refcounts == NULL)
1388 {
dc810e39 1389 bfd_size_type size;
30667bf3 1390
74d1c347
AM
1391 /* Allocate space for local got offsets and local
1392 plt offsets. Done this way to save polluting
1393 elf_obj_tdata with another target specific
1394 pointer. */
dc810e39
AM
1395 size = symtab_hdr->sh_info;
1396 size *= 2 * sizeof (bfd_signed_vma);
30667bf3 1397 local_got_refcounts = ((bfd_signed_vma *)
ebe50bae 1398 bfd_zalloc (abfd, size));
30667bf3
AM
1399 if (local_got_refcounts == NULL)
1400 return false;
1401 elf_local_got_refcounts (abfd) = local_got_refcounts;
30667bf3 1402 }
ebe50bae 1403 local_got_refcounts[r_symndx] += 1;
30667bf3
AM
1404 }
1405 }
1406
1407 if (need_entry & NEED_PLT)
1408 {
1409 /* If we are creating a shared library, and this is a reloc
1410 against a weak symbol or a global symbol in a dynamic
1411 object, then we will be creating an import stub and a
1412 .plt entry for the symbol. Similarly, on a normal link
1413 to symbols defined in a dynamic object we'll need the
1414 import stub and a .plt entry. We don't know yet whether
1415 the symbol is defined or not, so make an entry anyway and
1416 clean up later in adjust_dynamic_symbol. */
1417 if ((sec->flags & SEC_ALLOC) != 0)
1418 {
74d1c347 1419 if (h != NULL)
30667bf3 1420 {
51b64d56
AM
1421 h->elf.elf_link_hash_flags |= ELF_LINK_HASH_NEEDS_PLT;
1422 h->elf.plt.refcount += 1;
74d1c347 1423
36605136
AM
1424 /* If this .plt entry is for a plabel, mark it so
1425 that adjust_dynamic_symbol will keep the entry
1426 even if it appears to be local. */
74d1c347
AM
1427 if (need_entry & PLT_PLABEL)
1428 h->plabel = 1;
1429 }
1430 else if (need_entry & PLT_PLABEL)
1431 {
3ac8354b 1432 bfd_signed_vma *local_got_refcounts;
68fb2e56 1433 bfd_signed_vma *local_plt_refcounts;
74d1c347 1434
3ac8354b 1435 local_got_refcounts = elf_local_got_refcounts (abfd);
74d1c347
AM
1436 if (local_got_refcounts == NULL)
1437 {
dc810e39 1438 bfd_size_type size;
74d1c347
AM
1439
1440 /* Allocate space for local got offsets and local
1441 plt offsets. */
dc810e39
AM
1442 size = symtab_hdr->sh_info;
1443 size *= 2 * sizeof (bfd_signed_vma);
74d1c347 1444 local_got_refcounts = ((bfd_signed_vma *)
ebe50bae 1445 bfd_zalloc (abfd, size));
74d1c347
AM
1446 if (local_got_refcounts == NULL)
1447 return false;
1448 elf_local_got_refcounts (abfd) = local_got_refcounts;
74d1c347 1449 }
68fb2e56
AM
1450 local_plt_refcounts = (local_got_refcounts
1451 + symtab_hdr->sh_info);
ebe50bae 1452 local_plt_refcounts[r_symndx] += 1;
30667bf3 1453 }
30667bf3
AM
1454 }
1455 }
1456
98ceb8ce 1457 if (need_entry & NEED_DYNREL)
30667bf3
AM
1458 {
1459 /* Flag this symbol as having a non-got, non-plt reference
1460 so that we generate copy relocs if it turns out to be
1461 dynamic. */
ebe50bae 1462 if (h != NULL && !info->shared)
30667bf3
AM
1463 h->elf.elf_link_hash_flags |= ELF_LINK_NON_GOT_REF;
1464
1465 /* If we are creating a shared library then we need to copy
1466 the reloc into the shared library. However, if we are
1467 linking with -Bsymbolic, we need only copy absolute
1468 relocs or relocs against symbols that are not defined in
1469 an object we are including in the link. PC- or DP- or
1470 DLT-relative relocs against any local sym or global sym
1471 with DEF_REGULAR set, can be discarded. At this point we
1472 have not seen all the input files, so it is possible that
1473 DEF_REGULAR is not set now but will be set later (it is
1474 never cleared). We account for that possibility below by
98ceb8ce 1475 storing information in the dyn_relocs field of the
30667bf3
AM
1476 hash table entry.
1477
1478 A similar situation to the -Bsymbolic case occurs when
1479 creating shared libraries and symbol visibility changes
1480 render the symbol local.
1481
1482 As it turns out, all the relocs we will be creating here
1483 are absolute, so we cannot remove them on -Bsymbolic
1484 links or visibility changes anyway. A STUB_REL reloc
1485 is absolute too, as in that case it is the reloc in the
1486 stub we will be creating, rather than copying the PCREL
56882138
AM
1487 reloc in the branch.
1488
1489 If on the other hand, we are creating an executable, we
1490 may need to keep relocations for symbols satisfied by a
1491 dynamic library if we manage to avoid copy relocs for the
1492 symbol. */
446f2863
AM
1493 if ((info->shared
1494 && (sec->flags & SEC_ALLOC) != 0
1495 && (IS_ABSOLUTE_RELOC (r_type)
1496 || (h != NULL
1497 && (!info->symbolic
1498 || h->elf.root.type == bfd_link_hash_defweak
1499 || (h->elf.elf_link_hash_flags
1500 & ELF_LINK_HASH_DEF_REGULAR) == 0))))
1501 || (!info->shared
1502 && (sec->flags & SEC_ALLOC) != 0
1503 && h != NULL
446f2863
AM
1504 && (h->elf.root.type == bfd_link_hash_defweak
1505 || (h->elf.elf_link_hash_flags
1506 & ELF_LINK_HASH_DEF_REGULAR) == 0)))
30667bf3 1507 {
ec338859
AM
1508 struct elf32_hppa_dyn_reloc_entry *p;
1509 struct elf32_hppa_dyn_reloc_entry **head;
1510
30667bf3
AM
1511 /* Create a reloc section in dynobj and make room for
1512 this reloc. */
98ceb8ce 1513 if (sreloc == NULL)
30667bf3
AM
1514 {
1515 char *name;
3ac8354b 1516 bfd *dynobj;
30667bf3 1517
98ceb8ce
AM
1518 name = (bfd_elf_string_from_elf_section
1519 (abfd,
1520 elf_elfheader (abfd)->e_shstrndx,
1521 elf_section_data (sec)->rel_hdr.sh_name));
30667bf3
AM
1522 if (name == NULL)
1523 {
1524 (*_bfd_error_handler)
1525 (_("Could not find relocation section for %s"),
1526 sec->name);
1527 bfd_set_error (bfd_error_bad_value);
1528 return false;
1529 }
1530
3ac8354b
AM
1531 if (htab->elf.dynobj == NULL)
1532 htab->elf.dynobj = abfd;
1533
1534 dynobj = htab->elf.dynobj;
98ceb8ce
AM
1535 sreloc = bfd_get_section_by_name (dynobj, name);
1536 if (sreloc == NULL)
30667bf3
AM
1537 {
1538 flagword flags;
1539
98ceb8ce 1540 sreloc = bfd_make_section (dynobj, name);
30667bf3
AM
1541 flags = (SEC_HAS_CONTENTS | SEC_READONLY
1542 | SEC_IN_MEMORY | SEC_LINKER_CREATED);
1543 if ((sec->flags & SEC_ALLOC) != 0)
1544 flags |= SEC_ALLOC | SEC_LOAD;
98ceb8ce
AM
1545 if (sreloc == NULL
1546 || !bfd_set_section_flags (dynobj, sreloc, flags)
1547 || !bfd_set_section_alignment (dynobj, sreloc, 2))
30667bf3
AM
1548 return false;
1549 }
30667bf3 1550
98ceb8ce 1551 elf_section_data (sec)->sreloc = sreloc;
30667bf3
AM
1552 }
1553
98ceb8ce
AM
1554 /* If this is a global symbol, we count the number of
1555 relocations we need for this symbol. */
1556 if (h != NULL)
30667bf3 1557 {
ec338859
AM
1558 head = &h->dyn_relocs;
1559 }
1560 else
1561 {
1562 /* Track dynamic relocs needed for local syms too.
1563 We really need local syms available to do this
1564 easily. Oh well. */
1565
1566 asection *s;
1567 s = bfd_section_from_r_symndx (abfd, &htab->sym_sec,
1568 sec, r_symndx);
1569 if (s == NULL)
1570 return false;
30667bf3 1571
ec338859
AM
1572 head = ((struct elf32_hppa_dyn_reloc_entry **)
1573 &elf_section_data (s)->local_dynrel);
1574 }
1575
1576 p = *head;
1577 if (p == NULL || p->sec != sec)
1578 {
1579 p = ((struct elf32_hppa_dyn_reloc_entry *)
1580 bfd_alloc (htab->elf.dynobj,
1581 (bfd_size_type) sizeof *p));
1582 if (p == NULL)
1583 return false;
1584 p->next = *head;
1585 *head = p;
1586 p->sec = sec;
1587 p->count = 0;
98ceb8ce 1588#if RELATIVE_DYNRELOCS
ec338859 1589 p->relative_count = 0;
98ceb8ce 1590#endif
ec338859 1591 }
98ceb8ce 1592
ec338859 1593 p->count += 1;
98ceb8ce 1594#if RELATIVE_DYNRELOCS
ec338859
AM
1595 if (!IS_ABSOLUTE_RELOC (rtype))
1596 p->relative_count += 1;
98ceb8ce 1597#endif
30667bf3
AM
1598 }
1599 }
1600 }
edd21aca
AM
1601
1602 return true;
1603}
1604
30667bf3
AM
1605/* Return the section that should be marked against garbage collection
1606 for a given relocation. */
1607
1608static asection *
1609elf32_hppa_gc_mark_hook (abfd, info, rel, h, sym)
1610 bfd *abfd;
1611 struct bfd_link_info *info ATTRIBUTE_UNUSED;
1612 Elf_Internal_Rela *rel;
1613 struct elf_link_hash_entry *h;
1614 Elf_Internal_Sym *sym;
1615{
1616 if (h != NULL)
1617 {
1618 switch ((unsigned int) ELF32_R_TYPE (rel->r_info))
1619 {
1620 case R_PARISC_GNU_VTINHERIT:
1621 case R_PARISC_GNU_VTENTRY:
1622 break;
1623
1624 default:
1625 switch (h->root.type)
1626 {
1627 case bfd_link_hash_defined:
1628 case bfd_link_hash_defweak:
1629 return h->root.u.def.section;
1630
1631 case bfd_link_hash_common:
1632 return h->root.u.c.p->section;
1633
1634 default:
1635 break;
1636 }
1637 }
1638 }
1639 else
1640 {
9ad5cbcf 1641 return bfd_section_from_elf_index (abfd, sym->st_shndx);
30667bf3
AM
1642 }
1643
1644 return NULL;
1645}
1646
30667bf3
AM
1647/* Update the got and plt entry reference counts for the section being
1648 removed. */
edd21aca
AM
1649
1650static boolean
30667bf3
AM
1651elf32_hppa_gc_sweep_hook (abfd, info, sec, relocs)
1652 bfd *abfd;
1653 struct bfd_link_info *info ATTRIBUTE_UNUSED;
1654 asection *sec;
1655 const Elf_Internal_Rela *relocs;
edd21aca 1656{
30667bf3
AM
1657 Elf_Internal_Shdr *symtab_hdr;
1658 struct elf_link_hash_entry **sym_hashes;
1659 bfd_signed_vma *local_got_refcounts;
74d1c347 1660 bfd_signed_vma *local_plt_refcounts;
30667bf3
AM
1661 const Elf_Internal_Rela *rel, *relend;
1662 unsigned long r_symndx;
1663 struct elf_link_hash_entry *h;
83c81bfe 1664 struct elf32_hppa_link_hash_table *htab;
30667bf3 1665 bfd *dynobj;
30667bf3 1666
ec338859 1667 elf_section_data (sec)->local_dynrel = NULL;
98ceb8ce 1668
30667bf3
AM
1669 symtab_hdr = &elf_tdata (abfd)->symtab_hdr;
1670 sym_hashes = elf_sym_hashes (abfd);
1671 local_got_refcounts = elf_local_got_refcounts (abfd);
74d1c347
AM
1672 local_plt_refcounts = local_got_refcounts;
1673 if (local_plt_refcounts != NULL)
1674 local_plt_refcounts += symtab_hdr->sh_info;
83c81bfe 1675 htab = hppa_link_hash_table (info);
ebe50bae 1676 dynobj = htab->elf.dynobj;
30667bf3
AM
1677 if (dynobj == NULL)
1678 return true;
1679
30667bf3
AM
1680 relend = relocs + sec->reloc_count;
1681 for (rel = relocs; rel < relend; rel++)
1682 switch ((unsigned int) ELF32_R_TYPE (rel->r_info))
1683 {
1684 case R_PARISC_DLTIND14F:
1685 case R_PARISC_DLTIND14R:
1686 case R_PARISC_DLTIND21L:
1687 r_symndx = ELF32_R_SYM (rel->r_info);
1688 if (r_symndx >= symtab_hdr->sh_info)
1689 {
1690 h = sym_hashes[r_symndx - symtab_hdr->sh_info];
1691 if (h->got.refcount > 0)
4dc86686 1692 h->got.refcount -= 1;
30667bf3
AM
1693 }
1694 else if (local_got_refcounts != NULL)
1695 {
1696 if (local_got_refcounts[r_symndx] > 0)
4dc86686 1697 local_got_refcounts[r_symndx] -= 1;
30667bf3
AM
1698 }
1699 break;
edd21aca 1700
30667bf3
AM
1701 case R_PARISC_PCREL12F:
1702 case R_PARISC_PCREL17C:
1703 case R_PARISC_PCREL17F:
1704 case R_PARISC_PCREL22F:
1705 r_symndx = ELF32_R_SYM (rel->r_info);
1706 if (r_symndx >= symtab_hdr->sh_info)
1707 {
1708 h = sym_hashes[r_symndx - symtab_hdr->sh_info];
1709 if (h->plt.refcount > 0)
1710 h->plt.refcount -= 1;
1711 }
1712 break;
edd21aca 1713
74d1c347
AM
1714 case R_PARISC_PLABEL14R:
1715 case R_PARISC_PLABEL21L:
1716 case R_PARISC_PLABEL32:
1717 r_symndx = ELF32_R_SYM (rel->r_info);
1718 if (r_symndx >= symtab_hdr->sh_info)
1719 {
98ceb8ce
AM
1720 struct elf32_hppa_link_hash_entry *eh;
1721 struct elf32_hppa_dyn_reloc_entry **pp;
1722 struct elf32_hppa_dyn_reloc_entry *p;
1723
74d1c347 1724 h = sym_hashes[r_symndx - symtab_hdr->sh_info];
98ceb8ce 1725
74d1c347
AM
1726 if (h->plt.refcount > 0)
1727 h->plt.refcount -= 1;
98ceb8ce
AM
1728
1729 eh = (struct elf32_hppa_link_hash_entry *) h;
1730
1731 for (pp = &eh->dyn_relocs; (p = *pp) != NULL; pp = &p->next)
1732 if (p->sec == sec)
1733 {
1734#if RELATIVE_DYNRELOCS
1735 if (!IS_ABSOLUTE_RELOC (rtype))
1736 p->relative_count -= 1;
1737#endif
1738 p->count -= 1;
1739 if (p->count == 0)
1740 *pp = p->next;
1741 break;
1742 }
74d1c347
AM
1743 }
1744 else if (local_plt_refcounts != NULL)
1745 {
1746 if (local_plt_refcounts[r_symndx] > 0)
1747 local_plt_refcounts[r_symndx] -= 1;
1748 }
1749 break;
1750
98ceb8ce
AM
1751 case R_PARISC_DIR32:
1752 r_symndx = ELF32_R_SYM (rel->r_info);
1753 if (r_symndx >= symtab_hdr->sh_info)
1754 {
1755 struct elf32_hppa_link_hash_entry *eh;
1756 struct elf32_hppa_dyn_reloc_entry **pp;
1757 struct elf32_hppa_dyn_reloc_entry *p;
1758
1759 h = sym_hashes[r_symndx - symtab_hdr->sh_info];
1760
1761 eh = (struct elf32_hppa_link_hash_entry *) h;
1762
1763 for (pp = &eh->dyn_relocs; (p = *pp) != NULL; pp = &p->next)
1764 if (p->sec == sec)
1765 {
1766#if RELATIVE_DYNRELOCS
1767 if (!IS_ABSOLUTE_RELOC (R_PARISC_DIR32))
1768 p->relative_count -= 1;
1769#endif
1770 p->count -= 1;
1771 if (p->count == 0)
1772 *pp = p->next;
1773 break;
1774 }
1775 }
1776 break;
1777
30667bf3
AM
1778 default:
1779 break;
1780 }
252b5132 1781
252b5132
RH
1782 return true;
1783}
1784
74d1c347
AM
1785/* Our own version of hide_symbol, so that we can keep plt entries for
1786 plabels. */
1787
1788static void
e5094212
AM
1789elf32_hppa_hide_symbol (info, h, force_local)
1790 struct bfd_link_info *info;
74d1c347 1791 struct elf_link_hash_entry *h;
e5094212 1792 boolean force_local;
74d1c347 1793{
e5094212
AM
1794 if (force_local)
1795 {
1796 h->elf_link_hash_flags |= ELF_LINK_FORCED_LOCAL;
1797 if (h->dynindx != -1)
1798 {
1799 h->dynindx = -1;
1800 _bfd_elf_strtab_delref (elf_hash_table (info)->dynstr,
1801 h->dynstr_index);
1802 }
1803 }
1804
74d1c347
AM
1805 if (! ((struct elf32_hppa_link_hash_entry *) h)->plabel)
1806 {
1807 h->elf_link_hash_flags &= ~ELF_LINK_HASH_NEEDS_PLT;
1808 h->plt.offset = (bfd_vma) -1;
1809 }
1810}
1811
4dc86686
AM
1812/* This is the condition under which elf32_hppa_finish_dynamic_symbol
1813 will be called from elflink.h. If elflink.h doesn't call our
1814 finish_dynamic_symbol routine, we'll need to do something about
1815 initializing any .plt and .got entries in elf32_hppa_relocate_section. */
1816#define WILL_CALL_FINISH_DYNAMIC_SYMBOL(DYN, INFO, H) \
1817 ((DYN) \
1818 && ((INFO)->shared \
1819 || ((H)->elf_link_hash_flags & ELF_LINK_FORCED_LOCAL) == 0) \
1820 && ((H)->dynindx != -1 \
1821 || ((H)->elf_link_hash_flags & ELF_LINK_FORCED_LOCAL) != 0))
1822
30667bf3
AM
1823/* Adjust a symbol defined by a dynamic object and referenced by a
1824 regular object. The current definition is in some section of the
1825 dynamic object, but we're not including those sections. We have to
1826 change the definition to something the rest of the link can
1827 understand. */
252b5132 1828
30667bf3
AM
1829static boolean
1830elf32_hppa_adjust_dynamic_symbol (info, h)
1831 struct bfd_link_info *info;
1832 struct elf_link_hash_entry *h;
252b5132 1833{
83c81bfe 1834 struct elf32_hppa_link_hash_table *htab;
ebe50bae
AM
1835 struct elf32_hppa_link_hash_entry *eh;
1836 struct elf32_hppa_dyn_reloc_entry *p;
30667bf3 1837 asection *s;
3ac8354b 1838 unsigned int power_of_two;
30667bf3
AM
1839
1840 /* If this is a function, put it in the procedure linkage table. We
1841 will fill in the contents of the procedure linkage table later,
1842 when we know the address of the .got section. */
1843 if (h->type == STT_FUNC
1844 || (h->elf_link_hash_flags & ELF_LINK_HASH_NEEDS_PLT) != 0)
1845 {
12cca0d2
AM
1846 if (!info->shared
1847 && h->plt.refcount > 0
1848 && (h->elf_link_hash_flags & ELF_LINK_HASH_DEF_REGULAR) != 0
1849 && (h->root.u.def.section->flags & SEC_HAS_GOT_REF) != 0)
1850 {
1851 ((struct elf32_hppa_link_hash_entry *) h)->maybe_pic_call = 1;
1852 }
1853
30667bf3
AM
1854 if (h->plt.refcount <= 0
1855 || ((h->elf_link_hash_flags & ELF_LINK_HASH_DEF_REGULAR) != 0
1856 && h->root.type != bfd_link_hash_defweak
74d1c347 1857 && ! ((struct elf32_hppa_link_hash_entry *) h)->plabel
30667bf3
AM
1858 && (!info->shared || info->symbolic)))
1859 {
1860 /* The .plt entry is not needed when:
1861 a) Garbage collection has removed all references to the
1862 symbol, or
1863 b) We know for certain the symbol is defined in this
74d1c347
AM
1864 object, and it's not a weak definition, nor is the symbol
1865 used by a plabel relocation. Either this object is the
1866 application or we are doing a shared symbolic link. */
1867
1868 /* As a special sop to the hppa ABI, we keep a .plt entry
1869 for functions in sections containing PIC code. */
12cca0d2
AM
1870 if (((struct elf32_hppa_link_hash_entry *) h)->maybe_pic_call)
1871 ((struct elf32_hppa_link_hash_entry *) h)->pic_call = 1;
30667bf3
AM
1872 else
1873 {
1874 h->plt.offset = (bfd_vma) -1;
1875 h->elf_link_hash_flags &= ~ELF_LINK_HASH_NEEDS_PLT;
30667bf3 1876 }
30667bf3 1877 }
4dc86686 1878
30667bf3
AM
1879 return true;
1880 }
bbd7ec4a
AM
1881 else
1882 h->plt.offset = (bfd_vma) -1;
edd21aca 1883
30667bf3
AM
1884 /* If this is a weak symbol, and there is a real definition, the
1885 processor independent code will have arranged for us to see the
1886 real definition first, and we can just use the same value. */
1887 if (h->weakdef != NULL)
edd21aca 1888 {
49e9d0d3
AM
1889 if (h->weakdef->root.type != bfd_link_hash_defined
1890 && h->weakdef->root.type != bfd_link_hash_defweak)
1891 abort ();
30667bf3
AM
1892 h->root.u.def.section = h->weakdef->root.u.def.section;
1893 h->root.u.def.value = h->weakdef->root.u.def.value;
0a991dfe 1894 return true;
30667bf3 1895 }
edd21aca 1896
30667bf3
AM
1897 /* This is a reference to a symbol defined by a dynamic object which
1898 is not a function. */
1899
1900 /* If we are creating a shared library, we must presume that the
1901 only references to the symbol are via the global offset table.
1902 For such cases we need not do anything here; the relocations will
1903 be handled correctly by relocate_section. */
1904 if (info->shared)
1905 return true;
1906
1907 /* If there are no references to this symbol that do not use the
1908 GOT, we don't need to generate a copy reloc. */
1909 if ((h->elf_link_hash_flags & ELF_LINK_NON_GOT_REF) == 0)
1910 return true;
1911
ebe50bae
AM
1912 eh = (struct elf32_hppa_link_hash_entry *) h;
1913 for (p = eh->dyn_relocs; p != NULL; p = p->next)
1914 {
1915 s = p->sec->output_section;
1916 if (s != NULL && (s->flags & SEC_READONLY) != 0)
1917 break;
1918 }
1919
1920 /* If we didn't find any dynamic relocs in read-only sections, then
1921 we'll be keeping the dynamic relocs and avoiding the copy reloc. */
1922 if (p == NULL)
1923 {
1924 h->elf_link_hash_flags &= ~ELF_LINK_NON_GOT_REF;
1925 return true;
1926 }
1927
30667bf3
AM
1928 /* We must allocate the symbol in our .dynbss section, which will
1929 become part of the .bss section of the executable. There will be
1930 an entry for this symbol in the .dynsym section. The dynamic
1931 object will contain position independent code, so all references
1932 from the dynamic object to this symbol will go through the global
1933 offset table. The dynamic linker will use the .dynsym entry to
1934 determine the address it must put in the global offset table, so
1935 both the dynamic object and the regular object will refer to the
1936 same memory location for the variable. */
1937
3ac8354b 1938 htab = hppa_link_hash_table (info);
30667bf3
AM
1939
1940 /* We must generate a COPY reloc to tell the dynamic linker to
1941 copy the initial value out of the dynamic object and into the
3ac8354b 1942 runtime process image. */
30667bf3
AM
1943 if ((h->root.u.def.section->flags & SEC_ALLOC) != 0)
1944 {
3ac8354b 1945 htab->srelbss->_raw_size += sizeof (Elf32_External_Rela);
30667bf3 1946 h->elf_link_hash_flags |= ELF_LINK_HASH_NEEDS_COPY;
edd21aca 1947 }
252b5132 1948
3ac8354b
AM
1949 /* We need to figure out the alignment required for this symbol. I
1950 have no idea how other ELF linkers handle this. */
30667bf3 1951
3ac8354b
AM
1952 power_of_two = bfd_log2 (h->size);
1953 if (power_of_two > 3)
1954 power_of_two = 3;
1955
1956 /* Apply the required alignment. */
1957 s = htab->sdynbss;
1958 s->_raw_size = BFD_ALIGN (s->_raw_size,
1959 (bfd_size_type) (1 << power_of_two));
1960 if (power_of_two > bfd_get_section_alignment (htab->elf.dynobj, s))
1961 {
1962 if (! bfd_set_section_alignment (htab->elf.dynobj, s, power_of_two))
1963 return false;
1964 }
30667bf3 1965
30667bf3
AM
1966 /* Define the symbol as being at this point in the section. */
1967 h->root.u.def.section = s;
1968 h->root.u.def.value = s->_raw_size;
edd21aca 1969
30667bf3
AM
1970 /* Increment the section size to make room for the symbol. */
1971 s->_raw_size += h->size;
252b5132
RH
1972
1973 return true;
1974}
1975
30667bf3
AM
1976/* Called via elf_link_hash_traverse to create .plt entries for an
1977 application that uses statically linked PIC functions. Similar to
1978 the first part of elf32_hppa_adjust_dynamic_symbol. */
252b5132 1979
30667bf3 1980static boolean
a8d02d66 1981mark_PIC_calls (h, inf)
30667bf3 1982 struct elf_link_hash_entry *h;
4dc86686 1983 PTR inf ATTRIBUTE_UNUSED;
252b5132 1984{
30667bf3
AM
1985 if (! (h->plt.refcount > 0
1986 && (h->root.type == bfd_link_hash_defined
1987 || h->root.type == bfd_link_hash_defweak)
1988 && (h->root.u.def.section->flags & SEC_HAS_GOT_REF) != 0))
252b5132 1989 {
30667bf3
AM
1990 h->plt.offset = (bfd_vma) -1;
1991 h->elf_link_hash_flags &= ~ELF_LINK_HASH_NEEDS_PLT;
1992 return true;
252b5132
RH
1993 }
1994
74d1c347 1995 h->elf_link_hash_flags |= ELF_LINK_HASH_NEEDS_PLT;
12cca0d2 1996 ((struct elf32_hppa_link_hash_entry *) h)->maybe_pic_call = 1;
30667bf3 1997 ((struct elf32_hppa_link_hash_entry *) h)->pic_call = 1;
edd21aca 1998
4dc86686
AM
1999 return true;
2000}
2001
e5ee5df1
AM
2002/* Allocate space in the .plt for entries that won't have relocations.
2003 ie. pic_call and plabel entries. */
a8d02d66
AM
2004
2005static boolean
e5ee5df1 2006allocate_plt_static (h, inf)
a8d02d66
AM
2007 struct elf_link_hash_entry *h;
2008 PTR inf;
2009{
2010 struct bfd_link_info *info;
2011 struct elf32_hppa_link_hash_table *htab;
2012 asection *s;
2013
2014 if (h->root.type == bfd_link_hash_indirect
2015 || h->root.type == bfd_link_hash_warning)
2016 return true;
2017
2018 info = (struct bfd_link_info *) inf;
2019 htab = hppa_link_hash_table (info);
2020 if (((struct elf32_hppa_link_hash_entry *) h)->pic_call)
2021 {
e5ee5df1
AM
2022 /* Make an entry in the .plt section for non-pic code that is
2023 calling pic code. */
a8d02d66
AM
2024 s = htab->splt;
2025 h->plt.offset = s->_raw_size;
e5ee5df1
AM
2026 s->_raw_size += PLT_ENTRY_SIZE;
2027 }
2028 else if (htab->elf.dynamic_sections_created
2029 && h->plt.refcount > 0)
2030 {
2031 /* Make sure this symbol is output as a dynamic symbol.
2032 Undefined weak syms won't yet be marked as dynamic. */
2033 if (h->dynindx == -1
2034 && (h->elf_link_hash_flags & ELF_LINK_FORCED_LOCAL) == 0
2035 && h->type != STT_PARISC_MILLI)
a8d02d66 2036 {
e5ee5df1
AM
2037 if (! bfd_elf32_link_record_dynamic_symbol (info, h))
2038 return false;
2039 }
2040
2041 if (WILL_CALL_FINISH_DYNAMIC_SYMBOL (1, info, h))
2042 {
2043 /* Allocate these later. */
2044 }
2045 else if (((struct elf32_hppa_link_hash_entry *) h)->plabel)
2046 {
2047 /* Make an entry in the .plt section for plabel references
2048 that won't have a .plt entry for other reasons. */
2049 s = htab->splt;
2050 h->plt.offset = s->_raw_size;
2051 s->_raw_size += PLT_ENTRY_SIZE;
a8d02d66
AM
2052 }
2053 else
e5ee5df1
AM
2054 {
2055 /* No .plt entry needed. */
2056 h->plt.offset = (bfd_vma) -1;
2057 h->elf_link_hash_flags &= ~ELF_LINK_HASH_NEEDS_PLT;
2058 }
2059 }
2060 else
2061 {
2062 h->plt.offset = (bfd_vma) -1;
2063 h->elf_link_hash_flags &= ~ELF_LINK_HASH_NEEDS_PLT;
a8d02d66
AM
2064 }
2065
2066 return true;
2067}
2068
4dc86686
AM
2069/* Allocate space in .plt, .got and associated reloc sections for
2070 global syms. */
2071
2072static boolean
98ceb8ce 2073allocate_dynrelocs (h, inf)
4dc86686
AM
2074 struct elf_link_hash_entry *h;
2075 PTR inf;
2076{
2077 struct bfd_link_info *info;
83c81bfe 2078 struct elf32_hppa_link_hash_table *htab;
4dc86686 2079 asection *s;
446f2863 2080 struct elf32_hppa_link_hash_entry *eh;
98ceb8ce 2081 struct elf32_hppa_dyn_reloc_entry *p;
4dc86686 2082
73a74a62
AM
2083 if (h->root.type == bfd_link_hash_indirect
2084 || h->root.type == bfd_link_hash_warning)
2085 return true;
2086
30667bf3 2087 info = (struct bfd_link_info *) inf;
83c81bfe 2088 htab = hppa_link_hash_table (info);
e5ee5df1
AM
2089 if (htab->elf.dynamic_sections_created
2090 && h->plt.offset != (bfd_vma) -1
2091 && !((struct elf32_hppa_link_hash_entry *) h)->pic_call
2092 && WILL_CALL_FINISH_DYNAMIC_SYMBOL (1, info, h))
4dc86686 2093 {
e5ee5df1
AM
2094 /* Make an entry in the .plt section. */
2095 s = htab->splt;
2096 h->plt.offset = s->_raw_size;
2097 s->_raw_size += PLT_ENTRY_SIZE;
3ac8354b 2098
e5ee5df1
AM
2099 /* We also need to make an entry in the .rela.plt section. */
2100 htab->srelplt->_raw_size += sizeof (Elf32_External_Rela);
2101 htab->need_plt_stub = 1;
4dc86686 2102 }
edd21aca 2103
4dc86686
AM
2104 if (h->got.refcount > 0)
2105 {
446f2863
AM
2106 /* Make sure this symbol is output as a dynamic symbol.
2107 Undefined weak syms won't yet be marked as dynamic. */
2108 if (h->dynindx == -1
2109 && (h->elf_link_hash_flags & ELF_LINK_FORCED_LOCAL) == 0
2110 && h->type != STT_PARISC_MILLI)
2111 {
2112 if (! bfd_elf32_link_record_dynamic_symbol (info, h))
2113 return false;
2114 }
2115
83c81bfe 2116 s = htab->sgot;
4dc86686
AM
2117 h->got.offset = s->_raw_size;
2118 s->_raw_size += GOT_ENTRY_SIZE;
ce757d15
AM
2119 if (htab->elf.dynamic_sections_created
2120 && (info->shared
2121 || (h->dynindx != -1
2122 && h->elf_link_hash_flags & ELF_LINK_FORCED_LOCAL) == 0))
2123 {
2124 htab->srelgot->_raw_size += sizeof (Elf32_External_Rela);
2125 }
4dc86686
AM
2126 }
2127 else
2128 h->got.offset = (bfd_vma) -1;
30667bf3 2129
446f2863 2130 eh = (struct elf32_hppa_link_hash_entry *) h;
98ceb8ce 2131 if (eh->dyn_relocs == NULL)
446f2863 2132 return true;
30667bf3 2133
98ceb8ce
AM
2134 /* If this is a -Bsymbolic shared link, then we need to discard all
2135 space allocated for dynamic pc-relative relocs against symbols
2136 defined in a regular object. For the normal shared case, discard
2137 space for relocs that have become local due to symbol visibility
2138 changes. */
2139 if (info->shared)
446f2863 2140 {
98ceb8ce
AM
2141#if RELATIVE_DYNRELOCS
2142 if ((h->elf_link_hash_flags & ELF_LINK_HASH_DEF_REGULAR) != 0
2143 && ((h->elf_link_hash_flags & ELF_LINK_FORCED_LOCAL) != 0
2144 || info->symbolic))
446f2863 2145 {
98ceb8ce 2146 struct elf32_hppa_dyn_reloc_entry **pp;
30667bf3 2147
98ceb8ce
AM
2148 for (pp = &eh->dyn_relocs; (p = *pp) != NULL; )
2149 {
2150 p->count -= p->relative_count;
2151 p->relative_count = 0;
2152 if (p->count == 0)
2153 *pp = p->next;
2154 else
2155 pp = &p->next;
2156 }
2157 }
2158#endif
446f2863 2159 }
98ceb8ce 2160 else
30667bf3 2161 {
98ceb8ce
AM
2162 /* For the non-shared case, discard space for relocs against
2163 symbols which turn out to need copy relocs or are not
2164 dynamic. */
2165 if ((h->elf_link_hash_flags & ELF_LINK_NON_GOT_REF) == 0
2166 && (((h->elf_link_hash_flags & ELF_LINK_HASH_DEF_DYNAMIC) != 0
2167 && (h->elf_link_hash_flags & ELF_LINK_HASH_DEF_REGULAR) == 0)
ebe50bae 2168 || (htab->elf.dynamic_sections_created
98ceb8ce
AM
2169 && (h->root.type == bfd_link_hash_undefweak
2170 || h->root.type == bfd_link_hash_undefined))))
2171 {
2172 /* Make sure this symbol is output as a dynamic symbol.
2173 Undefined weak syms won't yet be marked as dynamic. */
2174 if (h->dynindx == -1
2175 && (h->elf_link_hash_flags & ELF_LINK_FORCED_LOCAL) == 0
2176 && h->type != STT_PARISC_MILLI)
2177 {
2178 if (! bfd_elf32_link_record_dynamic_symbol (info, h))
2179 return false;
2180 }
2181
2182 /* If that succeeded, we know we'll be keeping all the
2183 relocs. */
2184 if (h->dynindx != -1)
2185 goto keep;
2186 }
446f2863 2187
98ceb8ce
AM
2188 eh->dyn_relocs = NULL;
2189 return true;
2190
ec338859 2191 keep: ;
30667bf3 2192 }
30667bf3 2193
98ceb8ce
AM
2194 /* Finally, allocate space. */
2195 for (p = eh->dyn_relocs; p != NULL; p = p->next)
30667bf3 2196 {
98ceb8ce
AM
2197 asection *sreloc = elf_section_data (p->sec)->sreloc;
2198 sreloc->_raw_size += p->count * sizeof (Elf32_External_Rela);
30667bf3 2199 }
30667bf3
AM
2200
2201 return true;
2202}
30667bf3 2203
d5c73c2f
AM
2204/* This function is called via elf_link_hash_traverse to force
2205 millicode symbols local so they do not end up as globals in the
2206 dynamic symbol table. We ought to be able to do this in
2207 adjust_dynamic_symbol, but our adjust_dynamic_symbol is not called
2208 for all dynamic symbols. Arguably, this is a bug in
2209 elf_adjust_dynamic_symbol. */
2210
2211static boolean
2212clobber_millicode_symbols (h, info)
2213 struct elf_link_hash_entry *h;
2214 struct bfd_link_info *info;
2215{
142f8c94
AM
2216 if (h->type == STT_PARISC_MILLI
2217 && (h->elf_link_hash_flags & ELF_LINK_FORCED_LOCAL) == 0)
e0522e89 2218 {
e5094212 2219 elf32_hppa_hide_symbol (info, h, true);
142f8c94
AM
2220
2221 /* ?!? We only want to remove these from the dynamic symbol table.
2222 Therefore we do not leave ELF_LINK_FORCED_LOCAL set. */
e0522e89 2223 h->elf_link_hash_flags &= ~ELF_LINK_FORCED_LOCAL;
e0522e89 2224 }
d5c73c2f
AM
2225 return true;
2226}
2227
98ceb8ce
AM
2228/* Find any dynamic relocs that apply to read-only sections. */
2229
2230static boolean
2231readonly_dynrelocs (h, inf)
2232 struct elf_link_hash_entry *h;
2233 PTR inf;
2234{
2235 struct elf32_hppa_link_hash_entry *eh;
2236 struct elf32_hppa_dyn_reloc_entry *p;
2237
2238 eh = (struct elf32_hppa_link_hash_entry *) h;
2239 for (p = eh->dyn_relocs; p != NULL; p = p->next)
2240 {
2241 asection *s = p->sec->output_section;
2242
2243 if (s != NULL && (s->flags & SEC_READONLY) != 0)
2244 {
2245 struct bfd_link_info *info = (struct bfd_link_info *) inf;
2246
2247 info->flags |= DF_TEXTREL;
2248
2249 /* Not an error, just cut short the traversal. */
2250 return false;
2251 }
2252 }
2253 return true;
2254}
2255
30667bf3
AM
2256/* Set the sizes of the dynamic sections. */
2257
2258static boolean
2259elf32_hppa_size_dynamic_sections (output_bfd, info)
98ceb8ce 2260 bfd *output_bfd ATTRIBUTE_UNUSED;
30667bf3
AM
2261 struct bfd_link_info *info;
2262{
83c81bfe 2263 struct elf32_hppa_link_hash_table *htab;
30667bf3 2264 bfd *dynobj;
98ceb8ce 2265 bfd *ibfd;
30667bf3
AM
2266 asection *s;
2267 boolean relocs;
30667bf3 2268
83c81bfe 2269 htab = hppa_link_hash_table (info);
ebe50bae 2270 dynobj = htab->elf.dynobj;
49e9d0d3
AM
2271 if (dynobj == NULL)
2272 abort ();
30667bf3 2273
ebe50bae 2274 if (htab->elf.dynamic_sections_created)
30667bf3
AM
2275 {
2276 /* Set the contents of the .interp section to the interpreter. */
2277 if (! info->shared)
2278 {
2279 s = bfd_get_section_by_name (dynobj, ".interp");
49e9d0d3
AM
2280 if (s == NULL)
2281 abort ();
30667bf3
AM
2282 s->_raw_size = sizeof ELF_DYNAMIC_INTERPRETER;
2283 s->contents = (unsigned char *) ELF_DYNAMIC_INTERPRETER;
2284 }
74d1c347 2285
d5c73c2f 2286 /* Force millicode symbols local. */
ebe50bae 2287 elf_link_hash_traverse (&htab->elf,
d5c73c2f
AM
2288 clobber_millicode_symbols,
2289 info);
68fb2e56
AM
2290 }
2291 else
2292 {
2293 /* Run through the function symbols, looking for any that are
a8d02d66
AM
2294 PIC, and mark them as needing .plt entries so that %r19 will
2295 be set up. */
68fb2e56 2296 if (! info->shared)
a8d02d66 2297 elf_link_hash_traverse (&htab->elf, mark_PIC_calls, (PTR) info);
68fb2e56 2298 }
d5c73c2f 2299
98ceb8ce
AM
2300 /* Set up .got and .plt offsets for local syms, and space for local
2301 dynamic relocs. */
2302 for (ibfd = info->input_bfds; ibfd != NULL; ibfd = ibfd->link_next)
68fb2e56
AM
2303 {
2304 bfd_signed_vma *local_got;
2305 bfd_signed_vma *end_local_got;
2306 bfd_signed_vma *local_plt;
2307 bfd_signed_vma *end_local_plt;
2308 bfd_size_type locsymcount;
2309 Elf_Internal_Shdr *symtab_hdr;
2310 asection *srel;
74d1c347 2311
98ceb8ce 2312 if (bfd_get_flavour (ibfd) != bfd_target_elf_flavour)
68fb2e56 2313 continue;
4dc86686 2314
98ceb8ce
AM
2315 for (s = ibfd->sections; s != NULL; s = s->next)
2316 {
ec338859 2317 struct elf32_hppa_dyn_reloc_entry *p;
98ceb8ce 2318
ec338859
AM
2319 for (p = ((struct elf32_hppa_dyn_reloc_entry *)
2320 elf_section_data (s)->local_dynrel);
2321 p != NULL;
2322 p = p->next)
98ceb8ce 2323 {
ec338859
AM
2324 if (!bfd_is_abs_section (p->sec)
2325 && bfd_is_abs_section (p->sec->output_section))
2326 {
2327 /* Input section has been discarded, either because
2328 it is a copy of a linkonce section or due to
2329 linker script /DISCARD/, so we'll be discarding
2330 the relocs too. */
2331 }
2332 else
2333 {
2334 srel = elf_section_data (p->sec)->sreloc;
2335 srel->_raw_size += p->count * sizeof (Elf32_External_Rela);
2336 }
98ceb8ce
AM
2337 }
2338 }
2339
2340 local_got = elf_local_got_refcounts (ibfd);
68fb2e56
AM
2341 if (!local_got)
2342 continue;
74d1c347 2343
98ceb8ce 2344 symtab_hdr = &elf_tdata (ibfd)->symtab_hdr;
68fb2e56
AM
2345 locsymcount = symtab_hdr->sh_info;
2346 end_local_got = local_got + locsymcount;
83c81bfe
AM
2347 s = htab->sgot;
2348 srel = htab->srelgot;
68fb2e56
AM
2349 for (; local_got < end_local_got; ++local_got)
2350 {
2351 if (*local_got > 0)
4dc86686 2352 {
68fb2e56
AM
2353 *local_got = s->_raw_size;
2354 s->_raw_size += GOT_ENTRY_SIZE;
2355 if (info->shared)
2356 srel->_raw_size += sizeof (Elf32_External_Rela);
4dc86686 2357 }
68fb2e56
AM
2358 else
2359 *local_got = (bfd_vma) -1;
2360 }
74d1c347 2361
68fb2e56
AM
2362 local_plt = end_local_got;
2363 end_local_plt = local_plt + locsymcount;
ebe50bae 2364 if (! htab->elf.dynamic_sections_created)
68fb2e56
AM
2365 {
2366 /* Won't be used, but be safe. */
2367 for (; local_plt < end_local_plt; ++local_plt)
2368 *local_plt = (bfd_vma) -1;
2369 }
2370 else
2371 {
83c81bfe
AM
2372 s = htab->splt;
2373 srel = htab->srelplt;
74d1c347
AM
2374 for (; local_plt < end_local_plt; ++local_plt)
2375 {
2376 if (*local_plt > 0)
2377 {
74d1c347
AM
2378 *local_plt = s->_raw_size;
2379 s->_raw_size += PLT_ENTRY_SIZE;
2380 if (info->shared)
4dc86686 2381 srel->_raw_size += sizeof (Elf32_External_Rela);
74d1c347
AM
2382 }
2383 else
2384 *local_plt = (bfd_vma) -1;
2385 }
2386 }
30667bf3 2387 }
30667bf3 2388
e5ee5df1
AM
2389 /* Do all the .plt entries without relocs first. The dynamic linker
2390 uses the last .plt reloc to find the end of the .plt (and hence
2391 the start of the .got) for lazy linking. */
2392 elf_link_hash_traverse (&htab->elf, allocate_plt_static, (PTR) info);
a8d02d66 2393
98ceb8ce
AM
2394 /* Allocate global sym .plt and .got entries, and space for global
2395 sym dynamic relocs. */
ebe50bae 2396 elf_link_hash_traverse (&htab->elf, allocate_dynrelocs, (PTR) info);
30667bf3
AM
2397
2398 /* The check_relocs and adjust_dynamic_symbol entry points have
2399 determined the sizes of the various dynamic sections. Allocate
2400 memory for them. */
2401 relocs = false;
30667bf3
AM
2402 for (s = dynobj->sections; s != NULL; s = s->next)
2403 {
30667bf3
AM
2404 if ((s->flags & SEC_LINKER_CREATED) == 0)
2405 continue;
2406
83c81bfe 2407 if (s == htab->splt)
68fb2e56 2408 {
83c81bfe 2409 if (htab->need_plt_stub)
68fb2e56
AM
2410 {
2411 /* Make space for the plt stub at the end of the .plt
2412 section. We want this stub right at the end, up
2413 against the .got section. */
83c81bfe 2414 int gotalign = bfd_section_alignment (dynobj, htab->sgot);
68fb2e56
AM
2415 int pltalign = bfd_section_alignment (dynobj, s);
2416 bfd_size_type mask;
30667bf3 2417
68fb2e56
AM
2418 if (gotalign > pltalign)
2419 bfd_set_section_alignment (dynobj, s, gotalign);
2420 mask = ((bfd_size_type) 1 << gotalign) - 1;
2421 s->_raw_size = (s->_raw_size + sizeof (plt_stub) + mask) & ~mask;
2422 }
2423 }
83c81bfe 2424 else if (s == htab->sgot)
68fb2e56
AM
2425 ;
2426 else if (strncmp (bfd_get_section_name (dynobj, s), ".rela", 5) == 0)
30667bf3
AM
2427 {
2428 if (s->_raw_size != 0)
2429 {
4e12ff7f
AM
2430 /* Remember whether there are any reloc sections other
2431 than .rela.plt. */
2432 if (s != htab->srelplt)
2433 relocs = true;
47d89dba 2434
30667bf3
AM
2435 /* We use the reloc_count field as a counter if we need
2436 to copy relocs into the output file. */
2437 s->reloc_count = 0;
2438 }
2439 }
30667bf3
AM
2440 else
2441 {
2442 /* It's not one of our sections, so don't allocate space. */
2443 continue;
2444 }
2445
2446 if (s->_raw_size == 0)
2447 {
2448 /* If we don't need this section, strip it from the
2449 output file. This is mostly to handle .rela.bss and
2450 .rela.plt. We must create both sections in
2451 create_dynamic_sections, because they must be created
2452 before the linker maps input sections to output
2453 sections. The linker does that before
2454 adjust_dynamic_symbol is called, and it is that
2455 function which decides whether anything needs to go
2456 into these sections. */
2457 _bfd_strip_section_from_output (info, s);
2458 continue;
2459 }
2460
2461 /* Allocate memory for the section contents. Zero it, because
2462 we may not fill in all the reloc sections. */
2463 s->contents = (bfd_byte *) bfd_zalloc (dynobj, s->_raw_size);
2464 if (s->contents == NULL && s->_raw_size != 0)
2465 return false;
2466 }
2467
ebe50bae 2468 if (htab->elf.dynamic_sections_created)
30667bf3
AM
2469 {
2470 /* Like IA-64 and HPPA64, always create a DT_PLTGOT. It
2471 actually has nothing to do with the PLT, it is how we
2472 communicate the LTP value of a load module to the dynamic
2473 linker. */
dc810e39
AM
2474#define add_dynamic_entry(TAG, VAL) \
2475 bfd_elf32_add_dynamic_entry (info, (bfd_vma) (TAG), (bfd_vma) (VAL))
2476
2477 if (!add_dynamic_entry (DT_PLTGOT, 0))
30667bf3
AM
2478 return false;
2479
2480 /* Add some entries to the .dynamic section. We fill in the
2481 values later, in elf32_hppa_finish_dynamic_sections, but we
2482 must add the entries now so that we get the correct size for
2483 the .dynamic section. The DT_DEBUG entry is filled in by the
2484 dynamic linker and used by the debugger. */
dc810e39 2485 if (!info->shared)
30667bf3 2486 {
dc810e39 2487 if (!add_dynamic_entry (DT_DEBUG, 0))
30667bf3
AM
2488 return false;
2489 }
2490
83c81bfe 2491 if (htab->srelplt->_raw_size != 0)
30667bf3 2492 {
dc810e39
AM
2493 if (!add_dynamic_entry (DT_PLTRELSZ, 0)
2494 || !add_dynamic_entry (DT_PLTREL, DT_RELA)
2495 || !add_dynamic_entry (DT_JMPREL, 0))
30667bf3
AM
2496 return false;
2497 }
2498
2499 if (relocs)
2500 {
dc810e39
AM
2501 if (!add_dynamic_entry (DT_RELA, 0)
2502 || !add_dynamic_entry (DT_RELASZ, 0)
2503 || !add_dynamic_entry (DT_RELAENT, sizeof (Elf32_External_Rela)))
30667bf3 2504 return false;
30667bf3 2505
98ceb8ce
AM
2506 /* If any dynamic relocs apply to a read-only section,
2507 then we need a DT_TEXTREL entry. */
ebe50bae 2508 elf_link_hash_traverse (&htab->elf, readonly_dynrelocs, (PTR) info);
98ceb8ce
AM
2509
2510 if ((info->flags & DF_TEXTREL) != 0)
2511 {
2512 if (!add_dynamic_entry (DT_TEXTREL, 0))
2513 return false;
2514 }
30667bf3
AM
2515 }
2516 }
dc810e39 2517#undef add_dynamic_entry
30667bf3
AM
2518
2519 return true;
2520}
2521
30667bf3
AM
2522/* External entry points for sizing and building linker stubs. */
2523
2524/* Determine and set the size of the stub section for a final link.
2525
2526 The basic idea here is to examine all the relocations looking for
2527 PC-relative calls to a target that is unreachable with a "bl"
2528 instruction. */
2529
2530boolean
47d89dba 2531elf32_hppa_size_stubs (output_bfd, stub_bfd, info, multi_subspace, group_size,
30667bf3 2532 add_stub_section, layout_sections_again)
25f72752 2533 bfd *output_bfd;
30667bf3 2534 bfd *stub_bfd;
30667bf3 2535 struct bfd_link_info *info;
25f72752 2536 boolean multi_subspace;
47d89dba 2537 bfd_signed_vma group_size;
30667bf3
AM
2538 asection * (*add_stub_section) PARAMS ((const char *, asection *));
2539 void (*layout_sections_again) PARAMS ((void));
2540{
2541 bfd *input_bfd;
2542 asection *section;
25f72752 2543 asection **input_list, **list;
30667bf3 2544 Elf_Internal_Sym *local_syms, **all_local_syms;
25f72752
AM
2545 unsigned int bfd_indx, bfd_count;
2546 int top_id, top_index;
83c81bfe 2547 struct elf32_hppa_link_hash_table *htab;
47d89dba
AM
2548 bfd_size_type stub_group_size;
2549 boolean stubs_always_before_branch;
30667bf3 2550 boolean stub_changed = 0;
25f72752 2551 boolean ret = 0;
dc810e39 2552 bfd_size_type amt;
30667bf3 2553
83c81bfe 2554 htab = hppa_link_hash_table (info);
30667bf3
AM
2555
2556 /* Stash our params away. */
83c81bfe
AM
2557 htab->stub_bfd = stub_bfd;
2558 htab->multi_subspace = multi_subspace;
2559 htab->add_stub_section = add_stub_section;
2560 htab->layout_sections_again = layout_sections_again;
47d89dba
AM
2561 stubs_always_before_branch = group_size < 0;
2562 if (group_size < 0)
2563 stub_group_size = -group_size;
2564 else
2565 stub_group_size = group_size;
2566 if (stub_group_size == 1)
2567 {
2568 /* Default values. */
a248e267 2569 stub_group_size = 7680000;
83c81bfe 2570 if (htab->has_17bit_branch || htab->multi_subspace)
a248e267 2571 stub_group_size = 240000;
83c81bfe 2572 if (htab->has_12bit_branch)
a248e267 2573 stub_group_size = 7500;
47d89dba 2574 }
30667bf3 2575
1badb539
AM
2576 /* Count the number of input BFDs and find the top input section id. */
2577 for (input_bfd = info->input_bfds, bfd_count = 0, top_id = 0;
30667bf3
AM
2578 input_bfd != NULL;
2579 input_bfd = input_bfd->link_next)
2580 {
2581 bfd_count += 1;
25f72752
AM
2582 for (section = input_bfd->sections;
2583 section != NULL;
2584 section = section->next)
2585 {
2586 if (top_id < section->id)
2587 top_id = section->id;
2588 }
30667bf3
AM
2589 }
2590
dc810e39 2591 amt = sizeof (struct map_stub) * (top_id + 1);
83c81bfe
AM
2592 htab->stub_group = (struct map_stub *) bfd_zmalloc (amt);
2593 if (htab->stub_group == NULL)
30667bf3
AM
2594 return false;
2595
1badb539
AM
2596 /* Make a list of input sections for each output section included in
2597 the link.
2598
2599 We can't use output_bfd->section_count here to find the top output
2600 section index as some sections may have been removed, and
2601 _bfd_strip_section_from_output doesn't renumber the indices. */
2602 for (section = output_bfd->sections, top_index = 0;
2603 section != NULL;
2604 section = section->next)
2605 {
2606 if (top_index < section->index)
2607 top_index = section->index;
2608 }
2609
dc810e39
AM
2610 amt = sizeof (asection *) * (top_index + 1);
2611 input_list = (asection **) bfd_malloc (amt);
25f72752
AM
2612 if (input_list == NULL)
2613 return false;
2614
1badb539
AM
2615 /* For sections we aren't interested in, mark their entries with a
2616 value we can check later. */
2617 list = input_list + top_index;
2618 do
2619 *list = bfd_abs_section_ptr;
2620 while (list-- != input_list);
2621
2622 for (section = output_bfd->sections;
2623 section != NULL;
2624 section = section->next)
2625 {
47d89dba 2626 if ((section->flags & SEC_CODE) != 0)
1badb539
AM
2627 input_list[section->index] = NULL;
2628 }
2629
2630 /* Now actually build the lists. */
25f72752
AM
2631 for (input_bfd = info->input_bfds;
2632 input_bfd != NULL;
2633 input_bfd = input_bfd->link_next)
2634 {
2635 for (section = input_bfd->sections;
2636 section != NULL;
2637 section = section->next)
2638 {
2639 if (section->output_section != NULL
1badb539
AM
2640 && section->output_section->owner == output_bfd
2641 && section->output_section->index <= top_index)
25f72752
AM
2642 {
2643 list = input_list + section->output_section->index;
1badb539
AM
2644 if (*list != bfd_abs_section_ptr)
2645 {
2646 /* Steal the link_sec pointer for our list. */
83c81bfe 2647#define PREV_SEC(sec) (htab->stub_group[(sec)->id].link_sec)
1badb539
AM
2648 /* This happens to make the list in reverse order,
2649 which is what we want. */
2650 PREV_SEC (section) = *list;
2651 *list = section;
2652 }
25f72752
AM
2653 }
2654 }
2655 }
2656
2657 /* See whether we can group stub sections together. Grouping stub
2658 sections may result in fewer stubs. More importantly, we need to
2659 put all .init* and .fini* stubs at the beginning of the .init or
2660 .fini output sections respectively, because glibc splits the
2661 _init and _fini functions into multiple parts. Putting a stub in
2662 the middle of a function is not a good idea. */
a017a724 2663 list = input_list + top_index;
1badb539 2664 do
25f72752
AM
2665 {
2666 asection *tail = *list;
1badb539
AM
2667 if (tail == bfd_abs_section_ptr)
2668 continue;
25f72752
AM
2669 while (tail != NULL)
2670 {
2671 asection *curr;
2672 asection *prev;
2673 bfd_size_type total;
2674
2675 curr = tail;
2676 if (tail->_cooked_size)
2677 total = tail->_cooked_size;
2678 else
2679 total = tail->_raw_size;
2680 while ((prev = PREV_SEC (curr)) != NULL
2681 && ((total += curr->output_offset - prev->output_offset)
47d89dba 2682 < stub_group_size))
25f72752
AM
2683 curr = prev;
2684
2685 /* OK, the size from the start of CURR to the end is less
a248e267 2686 than 240000 bytes and thus can be handled by one stub
25f72752 2687 section. (or the tail section is itself larger than
a248e267 2688 240000 bytes, in which case we may be toast.)
25f72752
AM
2689 We should really be keeping track of the total size of
2690 stubs added here, as stubs contribute to the final output
2691 section size. That's a little tricky, and this way will
a248e267
AM
2692 only break if stubs added total more than 22144 bytes, or
2693 2768 long branch stubs. It seems unlikely for more than
2694 2768 different functions to be called, especially from
2695 code only 240000 bytes long. This limit used to be
2696 250000, but c++ code tends to generate lots of little
2697 functions, and sometimes violated the assumption. */
25f72752
AM
2698 do
2699 {
2700 prev = PREV_SEC (tail);
2701 /* Set up this stub group. */
83c81bfe 2702 htab->stub_group[tail->id].link_sec = curr;
25f72752
AM
2703 }
2704 while (tail != curr && (tail = prev) != NULL);
2705
a248e267 2706 /* But wait, there's more! Input sections up to 240000
25f72752 2707 bytes before the stub section can be handled by it too. */
47d89dba 2708 if (!stubs_always_before_branch)
25f72752 2709 {
47d89dba
AM
2710 total = 0;
2711 while (prev != NULL
2712 && ((total += tail->output_offset - prev->output_offset)
2713 < stub_group_size))
2714 {
2715 tail = prev;
2716 prev = PREV_SEC (tail);
83c81bfe 2717 htab->stub_group[tail->id].link_sec = curr;
47d89dba 2718 }
25f72752
AM
2719 }
2720 tail = prev;
2721 }
2722 }
1badb539 2723 while (list-- != input_list);
25f72752 2724 free (input_list);
1badb539 2725#undef PREV_SEC
30667bf3
AM
2726
2727 /* We want to read in symbol extension records only once. To do this
2728 we need to read in the local symbols in parallel and save them for
2729 later use; so hold pointers to the local symbols in an array. */
dc810e39
AM
2730 amt = sizeof (Elf_Internal_Sym *) * bfd_count;
2731 all_local_syms = (Elf_Internal_Sym **) bfd_zmalloc (amt);
30667bf3 2732 if (all_local_syms == NULL)
25f72752 2733 return false;
30667bf3
AM
2734
2735 /* Walk over all the input BFDs, swapping in local symbols.
2736 If we are creating a shared library, create hash entries for the
2737 export stubs. */
25f72752 2738 for (input_bfd = info->input_bfds, bfd_indx = 0;
30667bf3 2739 input_bfd != NULL;
25f72752 2740 input_bfd = input_bfd->link_next, bfd_indx++)
30667bf3
AM
2741 {
2742 Elf_Internal_Shdr *symtab_hdr;
9ad5cbcf 2743 Elf_Internal_Shdr *shndx_hdr;
30667bf3 2744 Elf_Internal_Sym *isym;
25f72752 2745 Elf32_External_Sym *ext_syms, *esym, *end_sy;
9ad5cbcf 2746 Elf_External_Sym_Shndx *shndx_buf, *shndx;
dc810e39 2747 bfd_size_type sec_size;
edd21aca 2748
252b5132
RH
2749 /* We'll need the symbol table in a second. */
2750 symtab_hdr = &elf_tdata (input_bfd)->symtab_hdr;
2751 if (symtab_hdr->sh_info == 0)
2752 continue;
2753
edd21aca
AM
2754 /* We need an array of the local symbols attached to the input bfd.
2755 Unfortunately, we're going to have to read & swap them in. */
dc810e39
AM
2756 sec_size = symtab_hdr->sh_info;
2757 sec_size *= sizeof (Elf_Internal_Sym);
2758 local_syms = (Elf_Internal_Sym *) bfd_malloc (sec_size);
edd21aca 2759 if (local_syms == NULL)
9ad5cbcf
AM
2760 goto error_ret_free_local;
2761
25f72752 2762 all_local_syms[bfd_indx] = local_syms;
dc810e39
AM
2763 sec_size = symtab_hdr->sh_info;
2764 sec_size *= sizeof (Elf32_External_Sym);
2765 ext_syms = (Elf32_External_Sym *) bfd_malloc (sec_size);
edd21aca 2766 if (ext_syms == NULL)
9ad5cbcf 2767 goto error_ret_free_local;
edd21aca
AM
2768
2769 if (bfd_seek (input_bfd, symtab_hdr->sh_offset, SEEK_SET) != 0
9ad5cbcf 2770 || bfd_bread ((PTR) ext_syms, sec_size, input_bfd) != sec_size)
edd21aca 2771 {
9ad5cbcf 2772 error_ret_free_ext_syms:
edd21aca
AM
2773 free (ext_syms);
2774 goto error_ret_free_local;
2775 }
2776
9ad5cbcf
AM
2777 shndx_buf = NULL;
2778 shndx_hdr = &elf_tdata (input_bfd)->symtab_shndx_hdr;
2779 if (shndx_hdr->sh_size != 0)
2780 {
2781 sec_size = symtab_hdr->sh_info;
2782 sec_size *= sizeof (Elf_External_Sym_Shndx);
2783 shndx_buf = (Elf_External_Sym_Shndx *) bfd_malloc (sec_size);
2784 if (shndx_buf == NULL)
2785 goto error_ret_free_ext_syms;
2786
2787 if (bfd_seek (input_bfd, shndx_hdr->sh_offset, SEEK_SET) != 0
2788 || bfd_bread ((PTR) shndx_buf, sec_size, input_bfd) != sec_size)
2789 {
2790 free (shndx_buf);
2791 goto error_ret_free_ext_syms;
2792 }
2793 }
2794
edd21aca 2795 /* Swap the local symbols in. */
9ad5cbcf
AM
2796 for (esym = ext_syms, end_sy = esym + symtab_hdr->sh_info,
2797 isym = local_syms, shndx = shndx_buf;
2798 esym < end_sy;
2799 esym++, isym++, shndx = (shndx ? shndx + 1 : NULL))
2800 bfd_elf32_swap_symbol_in (input_bfd, esym, shndx, isym);
edd21aca
AM
2801
2802 /* Now we can free the external symbols. */
9ad5cbcf 2803 free (shndx_buf);
edd21aca 2804 free (ext_syms);
edd21aca 2805
83c81bfe 2806 if (info->shared && htab->multi_subspace)
30667bf3 2807 {
25f72752
AM
2808 struct elf_link_hash_entry **sym_hashes;
2809 struct elf_link_hash_entry **end_hashes;
30667bf3
AM
2810 unsigned int symcount;
2811
2812 symcount = (symtab_hdr->sh_size / sizeof (Elf32_External_Sym)
2813 - symtab_hdr->sh_info);
25f72752
AM
2814 sym_hashes = elf_sym_hashes (input_bfd);
2815 end_hashes = sym_hashes + symcount;
30667bf3
AM
2816
2817 /* Look through the global syms for functions; We need to
2818 build export stubs for all globally visible functions. */
25f72752 2819 for (; sym_hashes < end_hashes; sym_hashes++)
30667bf3
AM
2820 {
2821 struct elf32_hppa_link_hash_entry *hash;
2822
25f72752 2823 hash = (struct elf32_hppa_link_hash_entry *) *sym_hashes;
30667bf3
AM
2824
2825 while (hash->elf.root.type == bfd_link_hash_indirect
2826 || hash->elf.root.type == bfd_link_hash_warning)
2827 hash = ((struct elf32_hppa_link_hash_entry *)
2828 hash->elf.root.u.i.link);
2829
2830 /* At this point in the link, undefined syms have been
2831 resolved, so we need to check that the symbol was
2832 defined in this BFD. */
2833 if ((hash->elf.root.type == bfd_link_hash_defined
2834 || hash->elf.root.type == bfd_link_hash_defweak)
2835 && hash->elf.type == STT_FUNC
2836 && hash->elf.root.u.def.section->output_section != NULL
25f72752
AM
2837 && (hash->elf.root.u.def.section->output_section->owner
2838 == output_bfd)
30667bf3
AM
2839 && hash->elf.root.u.def.section->owner == input_bfd
2840 && (hash->elf.elf_link_hash_flags & ELF_LINK_HASH_DEF_REGULAR)
2841 && !(hash->elf.elf_link_hash_flags & ELF_LINK_FORCED_LOCAL)
2842 && ELF_ST_VISIBILITY (hash->elf.other) == STV_DEFAULT)
2843 {
2844 asection *sec;
2845 const char *stub_name;
2846 struct elf32_hppa_stub_hash_entry *stub_entry;
2847
2848 sec = hash->elf.root.u.def.section;
2849 stub_name = hash->elf.root.root.string;
83c81bfe 2850 stub_entry = hppa_stub_hash_lookup (&htab->stub_hash_table,
30667bf3
AM
2851 stub_name,
2852 false, false);
2853 if (stub_entry == NULL)
2854 {
83c81bfe 2855 stub_entry = hppa_add_stub (stub_name, sec, htab);
30667bf3
AM
2856 if (!stub_entry)
2857 goto error_ret_free_local;
2858
2859 stub_entry->target_value = hash->elf.root.u.def.value;
2860 stub_entry->target_section = hash->elf.root.u.def.section;
2861 stub_entry->stub_type = hppa_stub_export;
2862 stub_entry->h = hash;
2863 stub_changed = 1;
2864 }
2865 else
2866 {
2867 (*_bfd_error_handler) (_("%s: duplicate export stub %s"),
8f615d07
AM
2868 bfd_archive_filename (input_bfd),
2869 stub_name);
30667bf3
AM
2870 }
2871 }
2872 }
30667bf3
AM
2873 }
2874 }
edd21aca
AM
2875
2876 while (1)
2877 {
30667bf3
AM
2878 asection *stub_sec;
2879
25f72752 2880 for (input_bfd = info->input_bfds, bfd_indx = 0;
30667bf3 2881 input_bfd != NULL;
25f72752 2882 input_bfd = input_bfd->link_next, bfd_indx++)
30667bf3
AM
2883 {
2884 Elf_Internal_Shdr *symtab_hdr;
2885
2886 /* We'll need the symbol table in a second. */
2887 symtab_hdr = &elf_tdata (input_bfd)->symtab_hdr;
2888 if (symtab_hdr->sh_info == 0)
2889 continue;
2890
25f72752 2891 local_syms = all_local_syms[bfd_indx];
30667bf3
AM
2892
2893 /* Walk over each section attached to the input bfd. */
2894 for (section = input_bfd->sections;
2895 section != NULL;
25f72752 2896 section = section->next)
30667bf3
AM
2897 {
2898 Elf_Internal_Shdr *input_rel_hdr;
2899 Elf32_External_Rela *external_relocs, *erelaend, *erela;
2900 Elf_Internal_Rela *internal_relocs, *irelaend, *irela;
2901
2902 /* If there aren't any relocs, then there's nothing more
2903 to do. */
2904 if ((section->flags & SEC_RELOC) == 0
2905 || section->reloc_count == 0)
2906 continue;
2907
25f72752
AM
2908 /* If this section is a link-once section that will be
2909 discarded, then don't create any stubs. */
2910 if (section->output_section == NULL
2911 || section->output_section->owner != output_bfd)
2912 continue;
2913
30667bf3 2914 /* Allocate space for the external relocations. */
dc810e39
AM
2915 amt = section->reloc_count;
2916 amt *= sizeof (Elf32_External_Rela);
2917 external_relocs = (Elf32_External_Rela *) bfd_malloc (amt);
30667bf3
AM
2918 if (external_relocs == NULL)
2919 {
2920 goto error_ret_free_local;
2921 }
2922
2923 /* Likewise for the internal relocations. */
dc810e39
AM
2924 amt = section->reloc_count;
2925 amt *= sizeof (Elf_Internal_Rela);
2926 internal_relocs = (Elf_Internal_Rela *) bfd_malloc (amt);
30667bf3
AM
2927 if (internal_relocs == NULL)
2928 {
2929 free (external_relocs);
2930 goto error_ret_free_local;
2931 }
2932
2933 /* Read in the external relocs. */
2934 input_rel_hdr = &elf_section_data (section)->rel_hdr;
2935 if (bfd_seek (input_bfd, input_rel_hdr->sh_offset, SEEK_SET) != 0
9ad5cbcf
AM
2936 || bfd_bread ((PTR) external_relocs,
2937 input_rel_hdr->sh_size,
2938 input_bfd) != input_rel_hdr->sh_size)
30667bf3
AM
2939 {
2940 free (external_relocs);
2941 error_ret_free_internal:
2942 free (internal_relocs);
2943 goto error_ret_free_local;
2944 }
2945
2946 /* Swap in the relocs. */
2947 erela = external_relocs;
2948 erelaend = erela + section->reloc_count;
2949 irela = internal_relocs;
2950 for (; erela < erelaend; erela++, irela++)
2951 bfd_elf32_swap_reloca_in (input_bfd, erela, irela);
2952
2953 /* We're done with the external relocs, free them. */
2954 free (external_relocs);
2955
2956 /* Now examine each relocation. */
2957 irela = internal_relocs;
2958 irelaend = irela + section->reloc_count;
2959 for (; irela < irelaend; irela++)
2960 {
2961 unsigned int r_type, r_indx;
2962 enum elf32_hppa_stub_type stub_type;
2963 struct elf32_hppa_stub_hash_entry *stub_entry;
2964 asection *sym_sec;
2965 bfd_vma sym_value;
2966 bfd_vma destination;
2967 struct elf32_hppa_link_hash_entry *hash;
2968 char *stub_name;
25f72752 2969 const asection *id_sec;
30667bf3
AM
2970
2971 r_type = ELF32_R_TYPE (irela->r_info);
2972 r_indx = ELF32_R_SYM (irela->r_info);
2973
2974 if (r_type >= (unsigned int) R_PARISC_UNIMPLEMENTED)
2975 {
2976 bfd_set_error (bfd_error_bad_value);
2977 goto error_ret_free_internal;
2978 }
2979
2980 /* Only look for stubs on call instructions. */
2981 if (r_type != (unsigned int) R_PARISC_PCREL12F
2982 && r_type != (unsigned int) R_PARISC_PCREL17F
2983 && r_type != (unsigned int) R_PARISC_PCREL22F)
2984 continue;
2985
2986 /* Now determine the call target, its name, value,
2987 section. */
2988 sym_sec = NULL;
2989 sym_value = 0;
2990 destination = 0;
2991 hash = NULL;
2992 if (r_indx < symtab_hdr->sh_info)
2993 {
2994 /* It's a local symbol. */
2995 Elf_Internal_Sym *sym;
2996 Elf_Internal_Shdr *hdr;
2997
2998 sym = local_syms + r_indx;
2999 hdr = elf_elfsections (input_bfd)[sym->st_shndx];
3000 sym_sec = hdr->bfd_section;
3001 if (ELF_ST_TYPE (sym->st_info) != STT_SECTION)
3002 sym_value = sym->st_value;
3003 destination = (sym_value + irela->r_addend
3004 + sym_sec->output_offset
3005 + sym_sec->output_section->vma);
3006 }
3007 else
3008 {
3009 /* It's an external symbol. */
3010 int e_indx;
3011
3012 e_indx = r_indx - symtab_hdr->sh_info;
3013 hash = ((struct elf32_hppa_link_hash_entry *)
3014 elf_sym_hashes (input_bfd)[e_indx]);
3015
3016 while (hash->elf.root.type == bfd_link_hash_indirect
3017 || hash->elf.root.type == bfd_link_hash_warning)
3018 hash = ((struct elf32_hppa_link_hash_entry *)
3019 hash->elf.root.u.i.link);
3020
3021 if (hash->elf.root.type == bfd_link_hash_defined
3022 || hash->elf.root.type == bfd_link_hash_defweak)
3023 {
3024 sym_sec = hash->elf.root.u.def.section;
3025 sym_value = hash->elf.root.u.def.value;
3026 if (sym_sec->output_section != NULL)
3027 destination = (sym_value + irela->r_addend
3028 + sym_sec->output_offset
3029 + sym_sec->output_section->vma);
3030 }
3031 else if (hash->elf.root.type == bfd_link_hash_undefweak)
3032 {
3033 if (! info->shared)
3034 continue;
3035 }
3036 else if (hash->elf.root.type == bfd_link_hash_undefined)
3037 {
3038 if (! (info->shared
3039 && !info->no_undefined
3040 && (ELF_ST_VISIBILITY (hash->elf.other)
2a5aaecb
AM
3041 == STV_DEFAULT)
3042 && hash->elf.type != STT_PARISC_MILLI))
30667bf3
AM
3043 continue;
3044 }
3045 else
3046 {
3047 bfd_set_error (bfd_error_bad_value);
3048 goto error_ret_free_internal;
3049 }
3050 }
3051
3052 /* Determine what (if any) linker stub is needed. */
3053 stub_type = hppa_type_of_stub (section, irela, hash,
3054 destination);
3055 if (stub_type == hppa_stub_none)
3056 continue;
3057
25f72752 3058 /* Support for grouping stub sections. */
83c81bfe 3059 id_sec = htab->stub_group[section->id].link_sec;
25f72752 3060
30667bf3 3061 /* Get the name of this stub. */
25f72752 3062 stub_name = hppa_stub_name (id_sec, sym_sec, hash, irela);
30667bf3
AM
3063 if (!stub_name)
3064 goto error_ret_free_internal;
3065
83c81bfe 3066 stub_entry = hppa_stub_hash_lookup (&htab->stub_hash_table,
30667bf3
AM
3067 stub_name,
3068 false, false);
3069 if (stub_entry != NULL)
3070 {
3071 /* The proper stub has already been created. */
3072 free (stub_name);
3073 continue;
3074 }
3075
83c81bfe 3076 stub_entry = hppa_add_stub (stub_name, section, htab);
30667bf3
AM
3077 if (stub_entry == NULL)
3078 {
3079 free (stub_name);
3080 goto error_ret_free_local;
3081 }
3082
3083 stub_entry->target_value = sym_value;
3084 stub_entry->target_section = sym_sec;
3085 stub_entry->stub_type = stub_type;
3086 if (info->shared)
3087 {
3088 if (stub_type == hppa_stub_import)
3089 stub_entry->stub_type = hppa_stub_import_shared;
98ceb8ce 3090 else if (stub_type == hppa_stub_long_branch)
30667bf3
AM
3091 stub_entry->stub_type = hppa_stub_long_branch_shared;
3092 }
3093 stub_entry->h = hash;
3094 stub_changed = 1;
3095 }
3096
3097 /* We're done with the internal relocs, free them. */
3098 free (internal_relocs);
3099 }
3100 }
3101
3102 if (!stub_changed)
3103 break;
3104
3105 /* OK, we've added some stubs. Find out the new size of the
3106 stub sections. */
83c81bfe 3107 for (stub_sec = htab->stub_bfd->sections;
30667bf3
AM
3108 stub_sec != NULL;
3109 stub_sec = stub_sec->next)
3110 {
74d1c347
AM
3111 stub_sec->_raw_size = 0;
3112 stub_sec->_cooked_size = 0;
3113 }
74d1c347 3114
83c81bfe 3115 bfd_hash_traverse (&htab->stub_hash_table, hppa_size_one_stub, htab);
74d1c347 3116
30667bf3 3117 /* Ask the linker to do its stuff. */
83c81bfe 3118 (*htab->layout_sections_again) ();
30667bf3
AM
3119 stub_changed = 0;
3120 }
3121
25f72752 3122 ret = 1;
30667bf3
AM
3123
3124 error_ret_free_local:
25f72752
AM
3125 while (bfd_count-- > 0)
3126 if (all_local_syms[bfd_count])
3127 free (all_local_syms[bfd_count]);
30667bf3
AM
3128 free (all_local_syms);
3129
25f72752 3130 return ret;
30667bf3
AM
3131}
3132
30667bf3
AM
3133/* For a final link, this function is called after we have sized the
3134 stubs to provide a value for __gp. */
3135
3136boolean
3137elf32_hppa_set_gp (abfd, info)
3138 bfd *abfd;
3139 struct bfd_link_info *info;
3140{
83c81bfe 3141 struct elf32_hppa_link_hash_table *htab;
30667bf3
AM
3142 struct elf_link_hash_entry *h;
3143 asection *sec;
3144 bfd_vma gp_val;
3145
83c81bfe 3146 htab = hppa_link_hash_table (info);
ebe50bae 3147 h = elf_link_hash_lookup (&htab->elf, "$global$", false, false, false);
30667bf3 3148
df8634e3
AM
3149 if (h != NULL
3150 && (h->root.type == bfd_link_hash_defined
3151 || h->root.type == bfd_link_hash_defweak))
30667bf3
AM
3152 {
3153 gp_val = h->root.u.def.value;
3154 sec = h->root.u.def.section;
3155 }
3156 else
3157 {
74d1c347
AM
3158 /* Choose to point our LTP at, in this order, one of .plt, .got,
3159 or .data, if these sections exist. In the case of choosing
3160 .plt try to make the LTP ideal for addressing anywhere in the
3161 .plt or .got with a 14 bit signed offset. Typically, the end
3162 of the .plt is the start of the .got, so choose .plt + 0x2000
3163 if either the .plt or .got is larger than 0x2000. If both
3164 the .plt and .got are smaller than 0x2000, choose the end of
3165 the .plt section. */
3166
83c81bfe 3167 sec = htab->splt;
74d1c347 3168 if (sec != NULL)
30667bf3 3169 {
74d1c347
AM
3170 gp_val = sec->_raw_size;
3171 if (gp_val > 0x2000
83c81bfe 3172 || (htab->sgot && htab->sgot->_raw_size > 0x2000))
74d1c347
AM
3173 {
3174 gp_val = 0x2000;
3175 }
3176 }
3177 else
3178 {
3179 gp_val = 0;
83c81bfe 3180 sec = htab->sgot;
74d1c347
AM
3181 if (sec != NULL)
3182 {
3183 /* We know we don't have a .plt. If .got is large,
3184 offset our LTP. */
3185 if (sec->_raw_size > 0x2000)
3186 gp_val = 0x2000;
3187 }
3188 else
3189 {
3190 /* No .plt or .got. Who cares what the LTP is? */
3191 sec = bfd_get_section_by_name (abfd, ".data");
3192 }
30667bf3 3193 }
df8634e3
AM
3194
3195 if (h != NULL)
3196 {
3197 h->root.type = bfd_link_hash_defined;
3198 h->root.u.def.value = gp_val;
3199 if (sec != NULL)
3200 h->root.u.def.section = sec;
3201 else
3202 h->root.u.def.section = bfd_abs_section_ptr;
3203 }
30667bf3
AM
3204 }
3205
b32b5d6e 3206 if (sec != NULL && sec->output_section != NULL)
74d1c347
AM
3207 gp_val += sec->output_section->vma + sec->output_offset;
3208
3209 elf_gp (abfd) = gp_val;
30667bf3
AM
3210 return true;
3211}
3212
30667bf3
AM
3213/* Build all the stubs associated with the current output file. The
3214 stubs are kept in a hash table attached to the main linker hash
3215 table. We also set up the .plt entries for statically linked PIC
3216 functions here. This function is called via hppaelf_finish in the
3217 linker. */
3218
3219boolean
3220elf32_hppa_build_stubs (info)
3221 struct bfd_link_info *info;
3222{
3223 asection *stub_sec;
3224 struct bfd_hash_table *table;
83c81bfe 3225 struct elf32_hppa_link_hash_table *htab;
30667bf3 3226
83c81bfe 3227 htab = hppa_link_hash_table (info);
30667bf3 3228
83c81bfe 3229 for (stub_sec = htab->stub_bfd->sections;
30667bf3
AM
3230 stub_sec != NULL;
3231 stub_sec = stub_sec->next)
3232 {
dc810e39 3233 bfd_size_type size;
30667bf3
AM
3234
3235 /* Allocate memory to hold the linker stubs. */
74d1c347 3236 size = stub_sec->_raw_size;
83c81bfe 3237 stub_sec->contents = (unsigned char *) bfd_zalloc (htab->stub_bfd, size);
30667bf3
AM
3238 if (stub_sec->contents == NULL && size != 0)
3239 return false;
74d1c347 3240 stub_sec->_raw_size = 0;
30667bf3
AM
3241 }
3242
3243 /* Build the stubs as directed by the stub hash table. */
83c81bfe 3244 table = &htab->stub_hash_table;
30667bf3
AM
3245 bfd_hash_traverse (table, hppa_build_one_stub, info);
3246
3247 return true;
3248}
3249
c46b7515
AM
3250/* Perform a final link. */
3251
3252static boolean
3253elf32_hppa_final_link (abfd, info)
3254 bfd *abfd;
3255 struct bfd_link_info *info;
3256{
3257 asection *s;
3258
4dc86686
AM
3259 /* Invoke the regular ELF linker to do all the work. */
3260 if (!bfd_elf32_bfd_final_link (abfd, info))
c46b7515
AM
3261 return false;
3262
3263 /* If we're producing a final executable, sort the contents of the
3264 unwind section. Magic section names, but this is much safer than
3265 having elf32_hppa_relocate_section remember where SEGREL32 relocs
3266 occurred. Consider what happens if someone inept creates a
3267 linker script that puts unwind information in .text. */
3268 s = bfd_get_section_by_name (abfd, ".PARISC.unwind");
3269 if (s != NULL)
3270 {
3271 bfd_size_type size;
3272 char *contents;
3273
3274 size = s->_raw_size;
3275 contents = bfd_malloc (size);
3276 if (contents == NULL)
3277 return false;
3278
3279 if (! bfd_get_section_contents (abfd, s, contents, (file_ptr) 0, size))
3280 return false;
3281
dc810e39 3282 qsort (contents, (size_t) (size / 16), 16, hppa_unwind_entry_compare);
c46b7515
AM
3283
3284 if (! bfd_set_section_contents (abfd, s, contents, (file_ptr) 0, size))
3285 return false;
3286 }
3287 return true;
3288}
3289
3290/* Record the lowest address for the data and text segments. */
3291
3292static void
3293hppa_record_segment_addr (abfd, section, data)
3294 bfd *abfd ATTRIBUTE_UNUSED;
3295 asection *section;
3296 PTR data;
3297{
83c81bfe 3298 struct elf32_hppa_link_hash_table *htab;
c46b7515 3299
83c81bfe 3300 htab = (struct elf32_hppa_link_hash_table *) data;
c46b7515
AM
3301
3302 if ((section->flags & (SEC_ALLOC | SEC_LOAD)) == (SEC_ALLOC | SEC_LOAD))
3303 {
3304 bfd_vma value = section->vma - section->filepos;
3305
3306 if ((section->flags & SEC_READONLY) != 0)
3307 {
83c81bfe
AM
3308 if (value < htab->text_segment_base)
3309 htab->text_segment_base = value;
c46b7515
AM
3310 }
3311 else
3312 {
83c81bfe
AM
3313 if (value < htab->data_segment_base)
3314 htab->data_segment_base = value;
c46b7515
AM
3315 }
3316 }
3317}
3318
30667bf3
AM
3319/* Perform a relocation as part of a final link. */
3320
3321static bfd_reloc_status_type
83c81bfe 3322final_link_relocate (input_section, contents, rel, value, htab, sym_sec, h)
30667bf3
AM
3323 asection *input_section;
3324 bfd_byte *contents;
3325 const Elf_Internal_Rela *rel;
3326 bfd_vma value;
83c81bfe 3327 struct elf32_hppa_link_hash_table *htab;
30667bf3
AM
3328 asection *sym_sec;
3329 struct elf32_hppa_link_hash_entry *h;
3330{
3331 int insn;
3332 unsigned int r_type = ELF32_R_TYPE (rel->r_info);
3333 reloc_howto_type *howto = elf_hppa_howto_table + r_type;
3334 int r_format = howto->bitsize;
3335 enum hppa_reloc_field_selector_type_alt r_field;
3336 bfd *input_bfd = input_section->owner;
3337 bfd_vma offset = rel->r_offset;
3338 bfd_vma max_branch_offset = 0;
3339 bfd_byte *hit_data = contents + offset;
3340 bfd_signed_vma addend = rel->r_addend;
3341 bfd_vma location;
3342 struct elf32_hppa_stub_hash_entry *stub_entry = NULL;
3343 int val;
3344
3345 if (r_type == R_PARISC_NONE)
3346 return bfd_reloc_ok;
3347
3348 insn = bfd_get_32 (input_bfd, hit_data);
3349
3350 /* Find out where we are and where we're going. */
3351 location = (offset +
3352 input_section->output_offset +
3353 input_section->output_section->vma);
3354
3355 switch (r_type)
3356 {
3357 case R_PARISC_PCREL12F:
3358 case R_PARISC_PCREL17F:
3359 case R_PARISC_PCREL22F:
3360 /* If this is a call to a function defined in another dynamic
3361 library, or if it is a call to a PIC function in the same
74d1c347
AM
3362 object, or if this is a shared link and it is a call to a
3363 weak symbol which may or may not be in the same object, then
3364 find the import stub in the stub hash. */
30667bf3
AM
3365 if (sym_sec == NULL
3366 || sym_sec->output_section == NULL
12cca0d2
AM
3367 || (h != NULL
3368 && ((h->maybe_pic_call
3369 && !(input_section->flags & SEC_HAS_GOT_REF))
3370 || (h->elf.root.type == bfd_link_hash_defweak
3371 && h->elf.dynindx != -1
3372 && h->elf.plt.offset != (bfd_vma) -1))))
30667bf3
AM
3373 {
3374 stub_entry = hppa_get_stub_entry (input_section, sym_sec,
83c81bfe 3375 h, rel, htab);
30667bf3
AM
3376 if (stub_entry != NULL)
3377 {
3378 value = (stub_entry->stub_offset
3379 + stub_entry->stub_sec->output_offset
3380 + stub_entry->stub_sec->output_section->vma);
3381 addend = 0;
3382 }
3383 else if (sym_sec == NULL && h != NULL
3384 && h->elf.root.type == bfd_link_hash_undefweak)
3385 {
db20fd76
AM
3386 /* It's OK if undefined weak. Calls to undefined weak
3387 symbols behave as if the "called" function
3388 immediately returns. We can thus call to a weak
3389 function without first checking whether the function
3390 is defined. */
30667bf3 3391 value = location;
db20fd76 3392 addend = 8;
30667bf3
AM
3393 }
3394 else
f09ebc7d 3395 return bfd_reloc_undefined;
30667bf3
AM
3396 }
3397 /* Fall thru. */
3398
3399 case R_PARISC_PCREL21L:
3400 case R_PARISC_PCREL17C:
3401 case R_PARISC_PCREL17R:
3402 case R_PARISC_PCREL14R:
3403 case R_PARISC_PCREL14F:
3404 /* Make it a pc relative offset. */
3405 value -= location;
3406 addend -= 8;
3407 break;
3408
3409 case R_PARISC_DPREL21L:
3410 case R_PARISC_DPREL14R:
3411 case R_PARISC_DPREL14F:
3412 /* For all the DP relative relocations, we need to examine the symbol's
3413 section. If it's a code section, then "data pointer relative" makes
3414 no sense. In that case we don't adjust the "value", and for 21 bit
3415 addil instructions, we change the source addend register from %dp to
3416 %r0. This situation commonly arises when a variable's "constness"
3417 is declared differently from the way the variable is defined. For
3418 instance: "extern int foo" with foo defined as "const int foo". */
3419 if (sym_sec == NULL)
3420 break;
3421 if ((sym_sec->flags & SEC_CODE) != 0)
3422 {
3423 if ((insn & ((0x3f << 26) | (0x1f << 21)))
3424 == (((int) OP_ADDIL << 26) | (27 << 21)))
3425 {
3426 insn &= ~ (0x1f << 21);
74d1c347 3427#if 1 /* debug them. */
30667bf3
AM
3428 (*_bfd_error_handler)
3429 (_("%s(%s+0x%lx): fixing %s"),
8f615d07 3430 bfd_archive_filename (input_bfd),
30667bf3
AM
3431 input_section->name,
3432 (long) rel->r_offset,
3433 howto->name);
3434#endif
3435 }
3436 /* Now try to make things easy for the dynamic linker. */
3437
3438 break;
3439 }
74d1c347 3440 /* Fall thru. */
30667bf3
AM
3441
3442 case R_PARISC_DLTIND21L:
3443 case R_PARISC_DLTIND14R:
3444 case R_PARISC_DLTIND14F:
3445 value -= elf_gp (input_section->output_section->owner);
3446 break;
3447
c46b7515
AM
3448 case R_PARISC_SEGREL32:
3449 if ((sym_sec->flags & SEC_CODE) != 0)
83c81bfe 3450 value -= htab->text_segment_base;
c46b7515 3451 else
83c81bfe 3452 value -= htab->data_segment_base;
c46b7515
AM
3453 break;
3454
30667bf3
AM
3455 default:
3456 break;
3457 }
3458
3459 switch (r_type)
3460 {
3461 case R_PARISC_DIR32:
47d89dba 3462 case R_PARISC_DIR14F:
30667bf3
AM
3463 case R_PARISC_DIR17F:
3464 case R_PARISC_PCREL17C:
3465 case R_PARISC_PCREL14F:
3466 case R_PARISC_DPREL14F:
3467 case R_PARISC_PLABEL32:
3468 case R_PARISC_DLTIND14F:
3469 case R_PARISC_SEGBASE:
3470 case R_PARISC_SEGREL32:
3471 r_field = e_fsel;
3472 break;
3473
3474 case R_PARISC_DIR21L:
3475 case R_PARISC_PCREL21L:
3476 case R_PARISC_DPREL21L:
3477 case R_PARISC_PLABEL21L:
3478 case R_PARISC_DLTIND21L:
3479 r_field = e_lrsel;
3480 break;
3481
3482 case R_PARISC_DIR17R:
3483 case R_PARISC_PCREL17R:
3484 case R_PARISC_DIR14R:
3485 case R_PARISC_PCREL14R:
3486 case R_PARISC_DPREL14R:
3487 case R_PARISC_PLABEL14R:
3488 case R_PARISC_DLTIND14R:
3489 r_field = e_rrsel;
3490 break;
3491
3492 case R_PARISC_PCREL12F:
3493 case R_PARISC_PCREL17F:
3494 case R_PARISC_PCREL22F:
3495 r_field = e_fsel;
3496
3497 if (r_type == (unsigned int) R_PARISC_PCREL17F)
3498 {
3499 max_branch_offset = (1 << (17-1)) << 2;
3500 }
3501 else if (r_type == (unsigned int) R_PARISC_PCREL12F)
3502 {
3503 max_branch_offset = (1 << (12-1)) << 2;
3504 }
3505 else
3506 {
3507 max_branch_offset = (1 << (22-1)) << 2;
3508 }
3509
3510 /* sym_sec is NULL on undefined weak syms or when shared on
3511 undefined syms. We've already checked for a stub for the
3512 shared undefined case. */
3513 if (sym_sec == NULL)
3514 break;
3515
3516 /* If the branch is out of reach, then redirect the
3517 call to the local stub for this function. */
3518 if (value + addend + max_branch_offset >= 2*max_branch_offset)
3519 {
3520 stub_entry = hppa_get_stub_entry (input_section, sym_sec,
83c81bfe 3521 h, rel, htab);
30667bf3 3522 if (stub_entry == NULL)
f09ebc7d 3523 return bfd_reloc_undefined;
30667bf3
AM
3524
3525 /* Munge up the value and addend so that we call the stub
3526 rather than the procedure directly. */
3527 value = (stub_entry->stub_offset
3528 + stub_entry->stub_sec->output_offset
3529 + stub_entry->stub_sec->output_section->vma
3530 - location);
3531 addend = -8;
3532 }
3533 break;
3534
3535 /* Something we don't know how to handle. */
3536 default:
3537 return bfd_reloc_notsupported;
3538 }
3539
3540 /* Make sure we can reach the stub. */
3541 if (max_branch_offset != 0
3542 && value + addend + max_branch_offset >= 2*max_branch_offset)
3543 {
3544 (*_bfd_error_handler)
3545 (_("%s(%s+0x%lx): cannot reach %s, recompile with -ffunction-sections"),
8f615d07 3546 bfd_archive_filename (input_bfd),
30667bf3
AM
3547 input_section->name,
3548 (long) rel->r_offset,
3549 stub_entry->root.string);
ce757d15 3550 bfd_set_error (bfd_error_bad_value);
30667bf3
AM
3551 return bfd_reloc_notsupported;
3552 }
3553
3554 val = hppa_field_adjust (value, addend, r_field);
3555
3556 switch (r_type)
3557 {
3558 case R_PARISC_PCREL12F:
3559 case R_PARISC_PCREL17C:
3560 case R_PARISC_PCREL17F:
3561 case R_PARISC_PCREL17R:
3562 case R_PARISC_PCREL22F:
3563 case R_PARISC_DIR17F:
3564 case R_PARISC_DIR17R:
3565 /* This is a branch. Divide the offset by four.
3566 Note that we need to decide whether it's a branch or
3567 otherwise by inspecting the reloc. Inspecting insn won't
3568 work as insn might be from a .word directive. */
3569 val >>= 2;
3570 break;
3571
3572 default:
3573 break;
3574 }
3575
3576 insn = hppa_rebuild_insn (insn, val, r_format);
3577
3578 /* Update the instruction word. */
74d1c347 3579 bfd_put_32 (input_bfd, (bfd_vma) insn, hit_data);
30667bf3
AM
3580 return bfd_reloc_ok;
3581}
3582
30667bf3
AM
3583/* Relocate an HPPA ELF section. */
3584
3585static boolean
3586elf32_hppa_relocate_section (output_bfd, info, input_bfd, input_section,
3587 contents, relocs, local_syms, local_sections)
3588 bfd *output_bfd;
3589 struct bfd_link_info *info;
3590 bfd *input_bfd;
3591 asection *input_section;
3592 bfd_byte *contents;
3593 Elf_Internal_Rela *relocs;
3594 Elf_Internal_Sym *local_syms;
3595 asection **local_sections;
3596{
30667bf3 3597 bfd_vma *local_got_offsets;
83c81bfe 3598 struct elf32_hppa_link_hash_table *htab;
30667bf3
AM
3599 Elf_Internal_Shdr *symtab_hdr;
3600 Elf_Internal_Rela *rel;
3601 Elf_Internal_Rela *relend;
30667bf3
AM
3602
3603 symtab_hdr = &elf_tdata (input_bfd)->symtab_hdr;
3604
83c81bfe 3605 htab = hppa_link_hash_table (info);
74d1c347 3606 local_got_offsets = elf_local_got_offsets (input_bfd);
30667bf3
AM
3607
3608 rel = relocs;
3609 relend = relocs + input_section->reloc_count;
3610 for (; rel < relend; rel++)
3611 {
3612 unsigned int r_type;
3613 reloc_howto_type *howto;
3614 unsigned int r_symndx;
3615 struct elf32_hppa_link_hash_entry *h;
3616 Elf_Internal_Sym *sym;
3617 asection *sym_sec;
3618 bfd_vma relocation;
3619 bfd_reloc_status_type r;
3620 const char *sym_name;
74d1c347 3621 boolean plabel;
f09ebc7d 3622 boolean warned_undef;
30667bf3
AM
3623
3624 r_type = ELF32_R_TYPE (rel->r_info);
3625 if (r_type >= (unsigned int) R_PARISC_UNIMPLEMENTED)
3626 {
3627 bfd_set_error (bfd_error_bad_value);
3628 return false;
3629 }
3630 if (r_type == (unsigned int) R_PARISC_GNU_VTENTRY
3631 || r_type == (unsigned int) R_PARISC_GNU_VTINHERIT)
3632 continue;
3633
3634 r_symndx = ELF32_R_SYM (rel->r_info);
3635
3636 if (info->relocateable)
3637 {
3ac8354b 3638 /* This is a relocatable link. We don't have to change
30667bf3
AM
3639 anything, unless the reloc is against a section symbol,
3640 in which case we have to adjust according to where the
3641 section symbol winds up in the output section. */
3642 if (r_symndx < symtab_hdr->sh_info)
3643 {
3644 sym = local_syms + r_symndx;
3645 if (ELF_ST_TYPE (sym->st_info) == STT_SECTION)
3646 {
3647 sym_sec = local_sections[r_symndx];
3648 rel->r_addend += sym_sec->output_offset;
3649 }
3650 }
3651 continue;
3652 }
3653
3654 /* This is a final link. */
3655 h = NULL;
3656 sym = NULL;
3657 sym_sec = NULL;
f09ebc7d 3658 warned_undef = false;
30667bf3
AM
3659 if (r_symndx < symtab_hdr->sh_info)
3660 {
3661 /* This is a local symbol, h defaults to NULL. */
3662 sym = local_syms + r_symndx;
3663 sym_sec = local_sections[r_symndx];
f8df10f4 3664 relocation = _bfd_elf_rela_local_sym (output_bfd, sym, sym_sec, rel);
30667bf3
AM
3665 }
3666 else
3667 {
3668 int indx;
3669
3670 /* It's a global; Find its entry in the link hash. */
3671 indx = r_symndx - symtab_hdr->sh_info;
3672 h = ((struct elf32_hppa_link_hash_entry *)
3673 elf_sym_hashes (input_bfd)[indx]);
3674 while (h->elf.root.type == bfd_link_hash_indirect
3675 || h->elf.root.type == bfd_link_hash_warning)
3676 h = (struct elf32_hppa_link_hash_entry *) h->elf.root.u.i.link;
3677
3678 relocation = 0;
3679 if (h->elf.root.type == bfd_link_hash_defined
3680 || h->elf.root.type == bfd_link_hash_defweak)
3681 {
3682 sym_sec = h->elf.root.u.def.section;
3683 /* If sym_sec->output_section is NULL, then it's a
3684 symbol defined in a shared library. */
3685 if (sym_sec->output_section != NULL)
3686 relocation = (h->elf.root.u.def.value
3687 + sym_sec->output_offset
3688 + sym_sec->output_section->vma);
3689 }
3690 else if (h->elf.root.type == bfd_link_hash_undefweak)
3691 ;
3692 else if (info->shared && !info->no_undefined
49e9d0d3
AM
3693 && ELF_ST_VISIBILITY (h->elf.other) == STV_DEFAULT
3694 && h->elf.type != STT_PARISC_MILLI)
30667bf3 3695 {
671bae9c 3696 if (info->symbolic && !info->allow_shlib_undefined)
f09ebc7d
AM
3697 {
3698 if (!((*info->callbacks->undefined_symbol)
3699 (info, h->elf.root.root.string, input_bfd,
3700 input_section, rel->r_offset, false)))
3701 return false;
3702 warned_undef = true;
3703 }
30667bf3
AM
3704 }
3705 else
3706 {
3707 if (!((*info->callbacks->undefined_symbol)
3708 (info, h->elf.root.root.string, input_bfd,
3709 input_section, rel->r_offset, true)))
3710 return false;
f09ebc7d 3711 warned_undef = true;
30667bf3
AM
3712 }
3713 }
3714
3715 /* Do any required modifications to the relocation value, and
25f72752
AM
3716 determine what types of dynamic info we need to output, if
3717 any. */
74d1c347 3718 plabel = 0;
30667bf3
AM
3719 switch (r_type)
3720 {
3721 case R_PARISC_DLTIND14F:
3722 case R_PARISC_DLTIND14R:
3723 case R_PARISC_DLTIND21L:
ce757d15
AM
3724 {
3725 bfd_vma off;
3726 boolean do_got = 0;
3727
3728 /* Relocation is to the entry for this symbol in the
3729 global offset table. */
3730 if (h != NULL)
3731 {
3732 boolean dyn;
3733
3734 off = h->elf.got.offset;
3735 dyn = htab->elf.dynamic_sections_created;
3736 if (! WILL_CALL_FINISH_DYNAMIC_SYMBOL (dyn, info, &h->elf))
3737 {
3738 /* If we aren't going to call finish_dynamic_symbol,
3739 then we need to handle initialisation of the .got
3740 entry and create needed relocs here. Since the
3741 offset must always be a multiple of 4, we use the
3742 least significant bit to record whether we have
3743 initialised it already. */
3744 if ((off & 1) != 0)
3745 off &= ~1;
3746 else
3747 {
3748 h->elf.got.offset |= 1;
3749 do_got = 1;
3750 }
3751 }
3752 }
3753 else
3754 {
3755 /* Local symbol case. */
3756 if (local_got_offsets == NULL)
3757 abort ();
3758
3759 off = local_got_offsets[r_symndx];
3760
3761 /* The offset must always be a multiple of 4. We use
3762 the least significant bit to record whether we have
3763 already generated the necessary reloc. */
3764 if ((off & 1) != 0)
3765 off &= ~1;
3766 else
3767 {
3768 local_got_offsets[r_symndx] |= 1;
3769 do_got = 1;
3770 }
3771 }
68fb2e56 3772
ce757d15
AM
3773 if (do_got)
3774 {
3775 if (info->shared)
3776 {
3777 /* Output a dynamic relocation for this GOT entry.
3778 In this case it is relative to the base of the
3779 object because the symbol index is zero. */
3780 Elf_Internal_Rela outrel;
3781 asection *srelgot = htab->srelgot;
3782 Elf32_External_Rela *loc;
3783
3784 outrel.r_offset = (off
3785 + htab->sgot->output_offset
3786 + htab->sgot->output_section->vma);
3787 outrel.r_info = ELF32_R_INFO (0, R_PARISC_DIR32);
3788 outrel.r_addend = relocation;
3789 loc = (Elf32_External_Rela *) srelgot->contents;
3790 loc += srelgot->reloc_count++;
3791 bfd_elf32_swap_reloca_out (output_bfd, &outrel, loc);
3792 }
3793 else
30667bf3 3794 bfd_put_32 (output_bfd, relocation,
83c81bfe 3795 htab->sgot->contents + off);
ce757d15 3796 }
30667bf3 3797
ce757d15
AM
3798 if (off >= (bfd_vma) -2)
3799 abort ();
30667bf3 3800
ce757d15
AM
3801 /* Add the base of the GOT to the relocation value. */
3802 relocation = (off
3803 + htab->sgot->output_offset
3804 + htab->sgot->output_section->vma);
3805 }
30667bf3 3806 break;
252b5132 3807
c46b7515
AM
3808 case R_PARISC_SEGREL32:
3809 /* If this is the first SEGREL relocation, then initialize
3810 the segment base values. */
83c81bfe
AM
3811 if (htab->text_segment_base == (bfd_vma) -1)
3812 bfd_map_over_sections (output_bfd, hppa_record_segment_addr, htab);
c46b7515
AM
3813 break;
3814
30667bf3
AM
3815 case R_PARISC_PLABEL14R:
3816 case R_PARISC_PLABEL21L:
3817 case R_PARISC_PLABEL32:
ebe50bae 3818 if (htab->elf.dynamic_sections_created)
252b5132 3819 {
ce757d15
AM
3820 bfd_vma off;
3821 boolean do_plt = 0;
3822
74d1c347
AM
3823 /* If we have a global symbol with a PLT slot, then
3824 redirect this relocation to it. */
3825 if (h != NULL)
3826 {
3827 off = h->elf.plt.offset;
4dc86686 3828 if (! WILL_CALL_FINISH_DYNAMIC_SYMBOL (1, info, &h->elf))
8dea1268
AM
3829 {
3830 /* In a non-shared link, adjust_dynamic_symbols
3831 isn't called for symbols forced local. We
dc810e39 3832 need to write out the plt entry here. */
8dea1268
AM
3833 if ((off & 1) != 0)
3834 off &= ~1;
3835 else
3836 {
8dea1268 3837 h->elf.plt.offset |= 1;
ce757d15 3838 do_plt = 1;
8dea1268
AM
3839 }
3840 }
74d1c347
AM
3841 }
3842 else
3843 {
68fb2e56
AM
3844 bfd_vma *local_plt_offsets;
3845
3846 if (local_got_offsets == NULL)
3847 abort ();
74d1c347 3848
68fb2e56
AM
3849 local_plt_offsets = local_got_offsets + symtab_hdr->sh_info;
3850 off = local_plt_offsets[r_symndx];
74d1c347
AM
3851
3852 /* As for the local .got entry case, we use the last
3853 bit to record whether we've already initialised
3854 this local .plt entry. */
3855 if ((off & 1) != 0)
3856 off &= ~1;
ce757d15
AM
3857 else
3858 {
3859 local_plt_offsets[r_symndx] |= 1;
3860 do_plt = 1;
3861 }
3862 }
3863
3864 if (do_plt)
3865 {
3866 if (info->shared)
3867 {
3868 /* Output a dynamic IPLT relocation for this
3869 PLT entry. */
3870 Elf_Internal_Rela outrel;
3871 asection *srelplt = htab->srelplt;
3872 Elf32_External_Rela *loc;
3873
3874 outrel.r_offset = (off
3875 + htab->splt->output_offset
3876 + htab->splt->output_section->vma);
3877 outrel.r_info = ELF32_R_INFO (0, R_PARISC_IPLT);
3878 outrel.r_addend = relocation;
3879 loc = (Elf32_External_Rela *) srelplt->contents;
3880 loc += srelplt->reloc_count++;
3881 bfd_elf32_swap_reloca_out (output_bfd, &outrel, loc);
3882 }
74d1c347
AM
3883 else
3884 {
3885 bfd_put_32 (output_bfd,
3886 relocation,
83c81bfe 3887 htab->splt->contents + off);
74d1c347 3888 bfd_put_32 (output_bfd,
83c81bfe
AM
3889 elf_gp (htab->splt->output_section->owner),
3890 htab->splt->contents + off + 4);
74d1c347
AM
3891 }
3892 }
3893
68fb2e56 3894 if (off >= (bfd_vma) -2)
49e9d0d3 3895 abort ();
74d1c347
AM
3896
3897 /* PLABELs contain function pointers. Relocation is to
3898 the entry for the function in the .plt. The magic +2
3899 offset signals to $$dyncall that the function pointer
3900 is in the .plt and thus has a gp pointer too.
3901 Exception: Undefined PLABELs should have a value of
3902 zero. */
3903 if (h == NULL
3904 || (h->elf.root.type != bfd_link_hash_undefweak
3905 && h->elf.root.type != bfd_link_hash_undefined))
3906 {
3907 relocation = (off
83c81bfe
AM
3908 + htab->splt->output_offset
3909 + htab->splt->output_section->vma
74d1c347
AM
3910 + 2);
3911 }
3912 plabel = 1;
30667bf3
AM
3913 }
3914 /* Fall through and possibly emit a dynamic relocation. */
3915
3916 case R_PARISC_DIR17F:
3917 case R_PARISC_DIR17R:
47d89dba 3918 case R_PARISC_DIR14F:
30667bf3
AM
3919 case R_PARISC_DIR14R:
3920 case R_PARISC_DIR21L:
3921 case R_PARISC_DPREL14F:
3922 case R_PARISC_DPREL14R:
3923 case R_PARISC_DPREL21L:
3924 case R_PARISC_DIR32:
ec338859
AM
3925 /* r_symndx will be zero only for relocs against symbols
3926 from removed linkonce sections, or sections discarded by
3927 a linker script. */
3928 if (r_symndx == 0
3929 || (input_section->flags & SEC_ALLOC) == 0)
3930 break;
3931
30667bf3 3932 /* The reloc types handled here and this conditional
56882138 3933 expression must match the code in ..check_relocs and
ec338859 3934 allocate_dynrelocs. ie. We need exactly the same condition
56882138
AM
3935 as in ..check_relocs, with some extra conditions (dynindx
3936 test in this case) to cater for relocs removed by
ec338859 3937 allocate_dynrelocs. If you squint, the non-shared test
56882138
AM
3938 here does indeed match the one in ..check_relocs, the
3939 difference being that here we test DEF_DYNAMIC as well as
3940 !DEF_REGULAR. All common syms end up with !DEF_REGULAR,
3941 which is why we can't use just that test here.
3942 Conversely, DEF_DYNAMIC can't be used in check_relocs as
3943 there all files have not been loaded. */
446f2863 3944 if ((info->shared
446f2863
AM
3945 && (IS_ABSOLUTE_RELOC (r_type)
3946 || (h != NULL
3947 && h->elf.dynindx != -1
3948 && (!info->symbolic
3949 || (h->elf.elf_link_hash_flags
3950 & ELF_LINK_HASH_DEF_REGULAR) == 0))))
3951 || (!info->shared
446f2863
AM
3952 && h != NULL
3953 && h->elf.dynindx != -1
3954 && (h->elf.elf_link_hash_flags & ELF_LINK_NON_GOT_REF) == 0
56882138
AM
3955 && (((h->elf.elf_link_hash_flags
3956 & ELF_LINK_HASH_DEF_DYNAMIC) != 0
3957 && (h->elf.elf_link_hash_flags
3958 & ELF_LINK_HASH_DEF_REGULAR) == 0)
446f2863
AM
3959 || h->elf.root.type == bfd_link_hash_undefweak
3960 || h->elf.root.type == bfd_link_hash_undefined)))
30667bf3
AM
3961 {
3962 Elf_Internal_Rela outrel;
3963 boolean skip;
98ceb8ce
AM
3964 asection *sreloc;
3965 Elf32_External_Rela *loc;
252b5132 3966
30667bf3
AM
3967 /* When generating a shared object, these relocations
3968 are copied into the output file to be resolved at run
3969 time. */
252b5132 3970
30667bf3 3971 outrel.r_addend = rel->r_addend;
c629eae0
JJ
3972 outrel.r_offset =
3973 _bfd_elf_section_offset (output_bfd, info, input_section,
3974 rel->r_offset);
3975 skip = (outrel.r_offset == (bfd_vma) -1);
30667bf3
AM
3976 outrel.r_offset += (input_section->output_offset
3977 + input_section->output_section->vma);
3978
3979 if (skip)
252b5132 3980 {
30667bf3 3981 memset (&outrel, 0, sizeof (outrel));
252b5132 3982 }
74d1c347
AM
3983 else if (h != NULL
3984 && h->elf.dynindx != -1
3985 && (plabel
446f2863
AM
3986 || !IS_ABSOLUTE_RELOC (r_type)
3987 || !info->shared
74d1c347 3988 || !info->symbolic
30667bf3
AM
3989 || (h->elf.elf_link_hash_flags
3990 & ELF_LINK_HASH_DEF_REGULAR) == 0))
252b5132 3991 {
30667bf3
AM
3992 outrel.r_info = ELF32_R_INFO (h->elf.dynindx, r_type);
3993 }
3994 else /* It's a local symbol, or one marked to become local. */
3995 {
3996 int indx = 0;
edd21aca 3997
30667bf3
AM
3998 /* Add the absolute offset of the symbol. */
3999 outrel.r_addend += relocation;
edd21aca 4000
74d1c347
AM
4001 /* Global plabels need to be processed by the
4002 dynamic linker so that functions have at most one
4003 fptr. For this reason, we need to differentiate
4004 between global and local plabels, which we do by
4005 providing the function symbol for a global plabel
4006 reloc, and no symbol for local plabels. */
4007 if (! plabel
4008 && sym_sec != NULL
30667bf3
AM
4009 && sym_sec->output_section != NULL
4010 && ! bfd_is_abs_section (sym_sec))
252b5132 4011 {
30667bf3
AM
4012 indx = elf_section_data (sym_sec->output_section)->dynindx;
4013 /* We are turning this relocation into one
4014 against a section symbol, so subtract out the
4015 output section's address but not the offset
4016 of the input section in the output section. */
4017 outrel.r_addend -= sym_sec->output_section->vma;
252b5132 4018 }
252b5132 4019
30667bf3
AM
4020 outrel.r_info = ELF32_R_INFO (indx, r_type);
4021 }
68fb2e56
AM
4022#if 0
4023 /* EH info can cause unaligned DIR32 relocs.
4024 Tweak the reloc type for the dynamic linker. */
4025 if (r_type == R_PARISC_DIR32 && (outrel.r_offset & 3) != 0)
4026 outrel.r_info = ELF32_R_INFO (ELF32_R_SYM (outrel.r_info),
4027 R_PARISC_DIR32U);
4028#endif
98ceb8ce
AM
4029 sreloc = elf_section_data (input_section)->sreloc;
4030 if (sreloc == NULL)
4031 abort ();
4032
3ac8354b
AM
4033 loc = (Elf32_External_Rela *) sreloc->contents;
4034 loc += sreloc->reloc_count++;
98ceb8ce 4035 bfd_elf32_swap_reloca_out (output_bfd, &outrel, loc);
30667bf3
AM
4036 }
4037 break;
edd21aca 4038
30667bf3
AM
4039 default:
4040 break;
4041 }
252b5132 4042
30667bf3 4043 r = final_link_relocate (input_section, contents, rel, relocation,
83c81bfe 4044 htab, sym_sec, h);
252b5132 4045
30667bf3
AM
4046 if (r == bfd_reloc_ok)
4047 continue;
252b5132 4048
30667bf3
AM
4049 if (h != NULL)
4050 sym_name = h->elf.root.root.string;
4051 else
4052 {
4053 sym_name = bfd_elf_string_from_elf_section (input_bfd,
4054 symtab_hdr->sh_link,
4055 sym->st_name);
4056 if (sym_name == NULL)
4057 return false;
4058 if (*sym_name == '\0')
4059 sym_name = bfd_section_name (input_bfd, sym_sec);
4060 }
edd21aca 4061
30667bf3 4062 howto = elf_hppa_howto_table + r_type;
252b5132 4063
30667bf3
AM
4064 if (r == bfd_reloc_undefined || r == bfd_reloc_notsupported)
4065 {
f09ebc7d
AM
4066 if (r == bfd_reloc_notsupported || !warned_undef)
4067 {
4068 (*_bfd_error_handler)
4069 (_("%s(%s+0x%lx): cannot handle %s for %s"),
4070 bfd_archive_filename (input_bfd),
4071 input_section->name,
4072 (long) rel->r_offset,
4073 howto->name,
4074 sym_name);
4075 bfd_set_error (bfd_error_bad_value);
4076 return false;
4077 }
30667bf3
AM
4078 }
4079 else
4080 {
4081 if (!((*info->callbacks->reloc_overflow)
4082 (info, sym_name, howto->name, (bfd_vma) 0,
4083 input_bfd, input_section, rel->r_offset)))
4084 return false;
4085 }
4086 }
edd21aca 4087
30667bf3
AM
4088 return true;
4089}
252b5132 4090
c46b7515
AM
4091/* Comparison function for qsort to sort unwind section during a
4092 final link. */
4093
4094static int
4095hppa_unwind_entry_compare (a, b)
4096 const PTR a;
4097 const PTR b;
4098{
4099 const bfd_byte *ap, *bp;
4100 unsigned long av, bv;
4101
4102 ap = (const bfd_byte *) a;
4103 av = (unsigned long) ap[0] << 24;
4104 av |= (unsigned long) ap[1] << 16;
4105 av |= (unsigned long) ap[2] << 8;
4106 av |= (unsigned long) ap[3];
4107
4108 bp = (const bfd_byte *) b;
4109 bv = (unsigned long) bp[0] << 24;
4110 bv |= (unsigned long) bp[1] << 16;
4111 bv |= (unsigned long) bp[2] << 8;
4112 bv |= (unsigned long) bp[3];
4113
4114 return av < bv ? -1 : av > bv ? 1 : 0;
4115}
4116
30667bf3
AM
4117/* Finish up dynamic symbol handling. We set the contents of various
4118 dynamic sections here. */
252b5132 4119
30667bf3
AM
4120static boolean
4121elf32_hppa_finish_dynamic_symbol (output_bfd, info, h, sym)
4122 bfd *output_bfd;
4123 struct bfd_link_info *info;
4124 struct elf_link_hash_entry *h;
4125 Elf_Internal_Sym *sym;
4126{
83c81bfe 4127 struct elf32_hppa_link_hash_table *htab;
edd21aca 4128
83c81bfe 4129 htab = hppa_link_hash_table (info);
30667bf3 4130
30667bf3
AM
4131 if (h->plt.offset != (bfd_vma) -1)
4132 {
4133 bfd_vma value;
30667bf3 4134
8dea1268
AM
4135 if (h->plt.offset & 1)
4136 abort ();
4137
30667bf3
AM
4138 /* This symbol has an entry in the procedure linkage table. Set
4139 it up.
4140
4141 The format of a plt entry is
74d1c347
AM
4142 <funcaddr>
4143 <__gp>
47d89dba 4144 */
30667bf3
AM
4145 value = 0;
4146 if (h->root.type == bfd_link_hash_defined
4147 || h->root.type == bfd_link_hash_defweak)
4148 {
4149 value = h->root.u.def.value;
4150 if (h->root.u.def.section->output_section != NULL)
4151 value += (h->root.u.def.section->output_offset
4152 + h->root.u.def.section->output_section->vma);
252b5132 4153 }
edd21aca 4154
74d1c347 4155 if (! ((struct elf32_hppa_link_hash_entry *) h)->pic_call)
30667bf3 4156 {
47d89dba 4157 Elf_Internal_Rela rel;
3ac8354b 4158 Elf32_External_Rela *loc;
47d89dba 4159
30667bf3
AM
4160 /* Create a dynamic IPLT relocation for this entry. */
4161 rel.r_offset = (h->plt.offset
83c81bfe
AM
4162 + htab->splt->output_offset
4163 + htab->splt->output_section->vma);
ce757d15 4164 if (h->dynindx != -1)
74d1c347
AM
4165 {
4166 rel.r_info = ELF32_R_INFO (h->dynindx, R_PARISC_IPLT);
4167 rel.r_addend = 0;
4168 }
4169 else
4170 {
4171 /* This symbol has been marked to become local, and is
4172 used by a plabel so must be kept in the .plt. */
4173 rel.r_info = ELF32_R_INFO (0, R_PARISC_IPLT);
4174 rel.r_addend = value;
4175 }
30667bf3 4176
3ac8354b
AM
4177 loc = (Elf32_External_Rela *) htab->srelplt->contents;
4178 loc += htab->srelplt->reloc_count++;
83c81bfe 4179 bfd_elf32_swap_reloca_out (htab->splt->output_section->owner,
3ac8354b 4180 &rel, loc);
30667bf3 4181 }
ce757d15 4182 else
47d89dba 4183 {
ce757d15
AM
4184 bfd_put_32 (htab->splt->owner,
4185 value,
4186 htab->splt->contents + h->plt.offset);
4187 bfd_put_32 (htab->splt->owner,
4188 elf_gp (htab->splt->output_section->owner),
4189 htab->splt->contents + h->plt.offset + 4);
47d89dba
AM
4190 }
4191
30667bf3
AM
4192 if ((h->elf_link_hash_flags & ELF_LINK_HASH_DEF_REGULAR) == 0)
4193 {
4194 /* Mark the symbol as undefined, rather than as defined in
4195 the .plt section. Leave the value alone. */
4196 sym->st_shndx = SHN_UNDEF;
4197 }
4198 }
edd21aca 4199
30667bf3
AM
4200 if (h->got.offset != (bfd_vma) -1)
4201 {
4202 Elf_Internal_Rela rel;
3ac8354b 4203 Elf32_External_Rela *loc;
30667bf3
AM
4204
4205 /* This symbol has an entry in the global offset table. Set it
4206 up. */
4207
4208 rel.r_offset = ((h->got.offset &~ (bfd_vma) 1)
83c81bfe
AM
4209 + htab->sgot->output_offset
4210 + htab->sgot->output_section->vma);
30667bf3 4211
4dc86686
AM
4212 /* If this is a -Bsymbolic link and the symbol is defined
4213 locally or was forced to be local because of a version file,
4214 we just want to emit a RELATIVE reloc. The entry in the
4215 global offset table will already have been initialized in the
4216 relocate_section function. */
4217 if (info->shared
4218 && (info->symbolic || h->dynindx == -1)
4219 && (h->elf_link_hash_flags & ELF_LINK_HASH_DEF_REGULAR))
30667bf3 4220 {
74d1c347 4221 rel.r_info = ELF32_R_INFO (0, R_PARISC_DIR32);
30667bf3
AM
4222 rel.r_addend = (h->root.u.def.value
4223 + h->root.u.def.section->output_offset
4224 + h->root.u.def.section->output_section->vma);
4225 }
4226 else
4227 {
49e9d0d3
AM
4228 if ((h->got.offset & 1) != 0)
4229 abort ();
30667bf3 4230 bfd_put_32 (output_bfd, (bfd_vma) 0,
83c81bfe 4231 htab->sgot->contents + h->got.offset);
30667bf3
AM
4232 rel.r_info = ELF32_R_INFO (h->dynindx, R_PARISC_DIR32);
4233 rel.r_addend = 0;
4234 }
edd21aca 4235
3ac8354b
AM
4236 loc = (Elf32_External_Rela *) htab->srelgot->contents;
4237 loc += htab->srelgot->reloc_count++;
4238 bfd_elf32_swap_reloca_out (output_bfd, &rel, loc);
30667bf3 4239 }
edd21aca 4240
30667bf3
AM
4241 if ((h->elf_link_hash_flags & ELF_LINK_HASH_NEEDS_COPY) != 0)
4242 {
4243 asection *s;
4244 Elf_Internal_Rela rel;
3ac8354b 4245 Elf32_External_Rela *loc;
30667bf3
AM
4246
4247 /* This symbol needs a copy reloc. Set it up. */
4248
49e9d0d3
AM
4249 if (! (h->dynindx != -1
4250 && (h->root.type == bfd_link_hash_defined
4251 || h->root.type == bfd_link_hash_defweak)))
4252 abort ();
30667bf3 4253
83c81bfe 4254 s = htab->srelbss;
30667bf3
AM
4255
4256 rel.r_offset = (h->root.u.def.value
4257 + h->root.u.def.section->output_offset
4258 + h->root.u.def.section->output_section->vma);
4259 rel.r_addend = 0;
4260 rel.r_info = ELF32_R_INFO (h->dynindx, R_PARISC_COPY);
3ac8354b
AM
4261 loc = (Elf32_External_Rela *) s->contents + s->reloc_count++;
4262 bfd_elf32_swap_reloca_out (output_bfd, &rel, loc);
30667bf3
AM
4263 }
4264
4265 /* Mark _DYNAMIC and _GLOBAL_OFFSET_TABLE_ as absolute. */
4266 if (h->root.root.string[0] == '_'
4267 && (strcmp (h->root.root.string, "_DYNAMIC") == 0
4268 || strcmp (h->root.root.string, "_GLOBAL_OFFSET_TABLE_") == 0))
4269 {
4270 sym->st_shndx = SHN_ABS;
4271 }
4272
4273 return true;
4274}
4275
98ceb8ce
AM
4276/* Used to decide how to sort relocs in an optimal manner for the
4277 dynamic linker, before writing them out. */
4278
4279static enum elf_reloc_type_class
4280elf32_hppa_reloc_type_class (rela)
4281 const Elf_Internal_Rela *rela;
4282{
4283 if (ELF32_R_SYM (rela->r_info) == 0)
4284 return reloc_class_relative;
4285
4286 switch ((int) ELF32_R_TYPE (rela->r_info))
4287 {
4288 case R_PARISC_IPLT:
4289 return reloc_class_plt;
4290 case R_PARISC_COPY:
4291 return reloc_class_copy;
4292 default:
4293 return reloc_class_normal;
4294 }
4295}
4296
30667bf3
AM
4297/* Finish up the dynamic sections. */
4298
4299static boolean
4300elf32_hppa_finish_dynamic_sections (output_bfd, info)
4301 bfd *output_bfd;
4302 struct bfd_link_info *info;
4303{
4304 bfd *dynobj;
83c81bfe 4305 struct elf32_hppa_link_hash_table *htab;
30667bf3
AM
4306 asection *sdyn;
4307
83c81bfe 4308 htab = hppa_link_hash_table (info);
ebe50bae 4309 dynobj = htab->elf.dynobj;
30667bf3
AM
4310
4311 sdyn = bfd_get_section_by_name (dynobj, ".dynamic");
4312
ebe50bae 4313 if (htab->elf.dynamic_sections_created)
30667bf3
AM
4314 {
4315 Elf32_External_Dyn *dyncon, *dynconend;
4316
49e9d0d3
AM
4317 if (sdyn == NULL)
4318 abort ();
30667bf3
AM
4319
4320 dyncon = (Elf32_External_Dyn *) sdyn->contents;
4321 dynconend = (Elf32_External_Dyn *) (sdyn->contents + sdyn->_raw_size);
4322 for (; dyncon < dynconend; dyncon++)
edd21aca 4323 {
30667bf3
AM
4324 Elf_Internal_Dyn dyn;
4325 asection *s;
4326
4327 bfd_elf32_swap_dyn_in (dynobj, dyncon, &dyn);
4328
4329 switch (dyn.d_tag)
4330 {
4331 default:
3ac8354b 4332 continue;
30667bf3
AM
4333
4334 case DT_PLTGOT:
4335 /* Use PLTGOT to set the GOT register. */
4336 dyn.d_un.d_ptr = elf_gp (output_bfd);
30667bf3
AM
4337 break;
4338
4339 case DT_JMPREL:
83c81bfe 4340 s = htab->srelplt;
30667bf3 4341 dyn.d_un.d_ptr = s->output_section->vma + s->output_offset;
30667bf3
AM
4342 break;
4343
4344 case DT_PLTRELSZ:
83c81bfe 4345 s = htab->srelplt;
30667bf3
AM
4346 if (s->_cooked_size != 0)
4347 dyn.d_un.d_val = s->_cooked_size;
4348 else
4349 dyn.d_un.d_val = s->_raw_size;
30667bf3 4350 break;
4e12ff7f
AM
4351
4352 case DT_RELASZ:
4353 /* Don't count procedure linkage table relocs in the
4354 overall reloc count. */
4355 if (htab->srelplt != NULL)
4356 {
4357 s = htab->srelplt->output_section;
4358 if (s->_cooked_size != 0)
4359 dyn.d_un.d_val -= s->_cooked_size;
4360 else
4361 dyn.d_un.d_val -= s->_raw_size;
4362 }
4363 break;
30667bf3 4364 }
3ac8354b
AM
4365
4366 bfd_elf32_swap_dyn_out (output_bfd, &dyn, dyncon);
edd21aca 4367 }
252b5132 4368 }
edd21aca 4369
83c81bfe 4370 if (htab->sgot != NULL && htab->sgot->_raw_size != 0)
30667bf3 4371 {
74d1c347
AM
4372 /* Fill in the first entry in the global offset table.
4373 We use it to point to our dynamic section, if we have one. */
30667bf3
AM
4374 bfd_put_32 (output_bfd,
4375 (sdyn != NULL
4376 ? sdyn->output_section->vma + sdyn->output_offset
4377 : (bfd_vma) 0),
83c81bfe 4378 htab->sgot->contents);
30667bf3 4379
74d1c347 4380 /* The second entry is reserved for use by the dynamic linker. */
83c81bfe 4381 memset (htab->sgot->contents + GOT_ENTRY_SIZE, 0, GOT_ENTRY_SIZE);
74d1c347 4382
30667bf3 4383 /* Set .got entry size. */
83c81bfe 4384 elf_section_data (htab->sgot->output_section)
74d1c347 4385 ->this_hdr.sh_entsize = GOT_ENTRY_SIZE;
30667bf3
AM
4386 }
4387
83c81bfe 4388 if (htab->splt != NULL && htab->splt->_raw_size != 0)
47d89dba
AM
4389 {
4390 /* Set plt entry size. */
83c81bfe 4391 elf_section_data (htab->splt->output_section)
47d89dba
AM
4392 ->this_hdr.sh_entsize = PLT_ENTRY_SIZE;
4393
83c81bfe 4394 if (htab->need_plt_stub)
47d89dba
AM
4395 {
4396 /* Set up the .plt stub. */
83c81bfe
AM
4397 memcpy (htab->splt->contents
4398 + htab->splt->_raw_size - sizeof (plt_stub),
47d89dba
AM
4399 plt_stub, sizeof (plt_stub));
4400
83c81bfe
AM
4401 if ((htab->splt->output_offset
4402 + htab->splt->output_section->vma
4403 + htab->splt->_raw_size)
4404 != (htab->sgot->output_offset
4405 + htab->sgot->output_section->vma))
47d89dba
AM
4406 {
4407 (*_bfd_error_handler)
4408 (_(".got section not immediately after .plt section"));
4409 return false;
4410 }
4411 }
4412 }
30667bf3 4413
252b5132 4414 return true;
30667bf3 4415}
252b5132 4416
d952f17a
AM
4417/* Tweak the OSABI field of the elf header. */
4418
4419static void
4420elf32_hppa_post_process_headers (abfd, link_info)
4421 bfd *abfd;
4422 struct bfd_link_info *link_info ATTRIBUTE_UNUSED;
4423{
4424 Elf_Internal_Ehdr * i_ehdrp;
4425
4426 i_ehdrp = elf_elfheader (abfd);
4427
4428 if (strcmp (bfd_get_target (abfd), "elf32-hppa-linux") == 0)
4429 {
4430 i_ehdrp->e_ident[EI_OSABI] = ELFOSABI_LINUX;
4431 }
4432 else
4433 {
4434 i_ehdrp->e_ident[EI_OSABI] = ELFOSABI_HPUX;
4435 }
4436}
4437
30667bf3
AM
4438/* Called when writing out an object file to decide the type of a
4439 symbol. */
4440static int
4441elf32_hppa_elf_get_symbol_type (elf_sym, type)
4442 Elf_Internal_Sym *elf_sym;
4443 int type;
4444{
4445 if (ELF_ST_TYPE (elf_sym->st_info) == STT_PARISC_MILLI)
4446 return STT_PARISC_MILLI;
4447 else
4448 return type;
252b5132
RH
4449}
4450
4451/* Misc BFD support code. */
30667bf3
AM
4452#define bfd_elf32_bfd_is_local_label_name elf_hppa_is_local_label_name
4453#define bfd_elf32_bfd_reloc_type_lookup elf_hppa_reloc_type_lookup
4454#define elf_info_to_howto elf_hppa_info_to_howto
4455#define elf_info_to_howto_rel elf_hppa_info_to_howto_rel
252b5132 4456
252b5132 4457/* Stuff for the BFD linker. */
c46b7515 4458#define bfd_elf32_bfd_final_link elf32_hppa_final_link
30667bf3
AM
4459#define bfd_elf32_bfd_link_hash_table_create elf32_hppa_link_hash_table_create
4460#define elf_backend_add_symbol_hook elf32_hppa_add_symbol_hook
4461#define elf_backend_adjust_dynamic_symbol elf32_hppa_adjust_dynamic_symbol
ebe50bae 4462#define elf_backend_copy_indirect_symbol elf32_hppa_copy_indirect_symbol
30667bf3
AM
4463#define elf_backend_check_relocs elf32_hppa_check_relocs
4464#define elf_backend_create_dynamic_sections elf32_hppa_create_dynamic_sections
4465#define elf_backend_fake_sections elf_hppa_fake_sections
4466#define elf_backend_relocate_section elf32_hppa_relocate_section
74d1c347 4467#define elf_backend_hide_symbol elf32_hppa_hide_symbol
30667bf3
AM
4468#define elf_backend_finish_dynamic_symbol elf32_hppa_finish_dynamic_symbol
4469#define elf_backend_finish_dynamic_sections elf32_hppa_finish_dynamic_sections
4470#define elf_backend_size_dynamic_sections elf32_hppa_size_dynamic_sections
4471#define elf_backend_gc_mark_hook elf32_hppa_gc_mark_hook
4472#define elf_backend_gc_sweep_hook elf32_hppa_gc_sweep_hook
4473#define elf_backend_object_p elf32_hppa_object_p
4474#define elf_backend_final_write_processing elf_hppa_final_write_processing
d952f17a 4475#define elf_backend_post_process_headers elf32_hppa_post_process_headers
30667bf3 4476#define elf_backend_get_symbol_type elf32_hppa_elf_get_symbol_type
98ceb8ce 4477#define elf_backend_reloc_type_class elf32_hppa_reloc_type_class
30667bf3
AM
4478
4479#define elf_backend_can_gc_sections 1
51b64d56 4480#define elf_backend_can_refcount 1
30667bf3
AM
4481#define elf_backend_plt_alignment 2
4482#define elf_backend_want_got_plt 0
4483#define elf_backend_plt_readonly 0
4484#define elf_backend_want_plt_sym 0
74d1c347 4485#define elf_backend_got_header_size 8
252b5132
RH
4486
4487#define TARGET_BIG_SYM bfd_elf32_hppa_vec
4488#define TARGET_BIG_NAME "elf32-hppa"
4489#define ELF_ARCH bfd_arch_hppa
4490#define ELF_MACHINE_CODE EM_PARISC
4491#define ELF_MAXPAGESIZE 0x1000
4492
4493#include "elf32-target.h"
d952f17a
AM
4494
4495#undef TARGET_BIG_SYM
4496#define TARGET_BIG_SYM bfd_elf32_hppa_linux_vec
4497#undef TARGET_BIG_NAME
4498#define TARGET_BIG_NAME "elf32-hppa-linux"
4499
4500#define INCLUDED_TARGET_FILE 1
4501#include "elf32-target.h"