]> git.ipfire.org Git - thirdparty/binutils-gdb.git/blame - bfd/elf32-hppa.c
* som.c (som_write_symbol_strings): Cast current_offset in
[thirdparty/binutils-gdb.git] / bfd / elf32-hppa.c
CommitLineData
252b5132 1/* BFD back-end for HP PA-RISC ELF files.
7898deda 2 Copyright 1990, 1991, 1992, 1993, 1994, 1995, 1996, 1999, 2000, 2001
252b5132
RH
3 Free Software Foundation, Inc.
4
30667bf3 5 Original code by
252b5132
RH
6 Center for Software Science
7 Department of Computer Science
8 University of Utah
30667bf3 9 Largely rewritten by Alan Modra <alan@linuxcare.com.au>
252b5132
RH
10
11This file is part of BFD, the Binary File Descriptor library.
12
13This program is free software; you can redistribute it and/or modify
14it under the terms of the GNU General Public License as published by
15the Free Software Foundation; either version 2 of the License, or
16(at your option) any later version.
17
18This program is distributed in the hope that it will be useful,
19but WITHOUT ANY WARRANTY; without even the implied warranty of
20MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
21GNU General Public License for more details.
22
23You should have received a copy of the GNU General Public License
24along with this program; if not, write to the Free Software
25Foundation, Inc., 59 Temple Place - Suite 330, Boston, MA 02111-1307, USA. */
26
27#include "bfd.h"
28#include "sysdep.h"
252b5132
RH
29#include "libbfd.h"
30#include "elf-bfd.h"
9e103c9c
JL
31#include "elf/hppa.h"
32#include "libhppa.h"
33#include "elf32-hppa.h"
34#define ARCH_SIZE 32
35#include "elf-hppa.h"
edd21aca 36#include "elf32-hppa.h"
9e103c9c 37
74d1c347
AM
38/* In order to gain some understanding of code in this file without
39 knowing all the intricate details of the linker, note the
40 following:
41
42 Functions named elf32_hppa_* are called by external routines, other
43 functions are only called locally. elf32_hppa_* functions appear
44 in this file more or less in the order in which they are called
45 from external routines. eg. elf32_hppa_check_relocs is called
46 early in the link process, elf32_hppa_finish_dynamic_sections is
47 one of the last functions. */
48
edd21aca 49/* We use two hash tables to hold information for linking PA ELF objects.
252b5132
RH
50
51 The first is the elf32_hppa_link_hash_table which is derived
52 from the standard ELF linker hash table. We use this as a place to
53 attach other hash tables and static information.
54
55 The second is the stub hash table which is derived from the
56 base BFD hash table. The stub hash table holds the information
30667bf3
AM
57 necessary to build the linker stubs during a link.
58
59 There are a number of different stubs generated by the linker.
60
61 Long branch stub:
62 : ldil LR'X,%r1
63 : be,n RR'X(%sr4,%r1)
64
65 PIC long branch stub:
66 : b,l .+8,%r1
3ee1d854
AM
67 : addil LR'X - ($PIC_pcrel$0 - 4),%r1
68 : be,n RR'X - ($PIC_pcrel$0 - 8)(%sr4,%r1)
30667bf3
AM
69
70 Import stub to call shared library routine from normal object file
71 (single sub-space version)
3ee1d854
AM
72 : addil LR'lt_ptr+ltoff,%dp ; get procedure entry point
73 : ldw RR'lt_ptr+ltoff(%r1),%r21
30667bf3 74 : bv %r0(%r21)
3ee1d854 75 : ldw RR'lt_ptr+ltoff+4(%r1),%r19 ; get new dlt value.
30667bf3
AM
76
77 Import stub to call shared library routine from shared library
78 (single sub-space version)
3ee1d854
AM
79 : addil LR'ltoff,%r19 ; get procedure entry point
80 : ldw RR'ltoff(%r1),%r21
30667bf3 81 : bv %r0(%r21)
3ee1d854 82 : ldw RR'ltoff+4(%r1),%r19 ; get new dlt value.
30667bf3
AM
83
84 Import stub to call shared library routine from normal object file
85 (multiple sub-space support)
3ee1d854
AM
86 : addil LR'lt_ptr+ltoff,%dp ; get procedure entry point
87 : ldw RR'lt_ptr+ltoff(%r1),%r21
88 : ldw RR'lt_ptr+ltoff+4(%r1),%r19 ; get new dlt value.
30667bf3
AM
89 : ldsid (%r21),%r1
90 : mtsp %r1,%sr0
91 : be 0(%sr0,%r21) ; branch to target
92 : stw %rp,-24(%sp) ; save rp
93
94 Import stub to call shared library routine from shared library
95 (multiple sub-space support)
3ee1d854
AM
96 : addil LR'ltoff,%r19 ; get procedure entry point
97 : ldw RR'ltoff(%r1),%r21
98 : ldw RR'ltoff+4(%r1),%r19 ; get new dlt value.
30667bf3
AM
99 : ldsid (%r21),%r1
100 : mtsp %r1,%sr0
101 : be 0(%sr0,%r21) ; branch to target
102 : stw %rp,-24(%sp) ; save rp
103
104 Export stub to return from shared lib routine (multiple sub-space support)
105 One of these is created for each exported procedure in a shared
106 library (and stored in the shared lib). Shared lib routines are
107 called via the first instruction in the export stub so that we can
108 do an inter-space return. Not required for single sub-space.
109 : bl,n X,%rp ; trap the return
110 : nop
111 : ldw -24(%sp),%rp ; restore the original rp
112 : ldsid (%rp),%r1
113 : mtsp %r1,%sr0
74d1c347 114 : be,n 0(%sr0,%rp) ; inter-space return */
30667bf3
AM
115
116#define PLT_ENTRY_SIZE 8
74d1c347 117#define PLABEL_PLT_ENTRY_SIZE PLT_ENTRY_SIZE
30667bf3
AM
118#define GOT_ENTRY_SIZE 4
119#define ELF_DYNAMIC_INTERPRETER "/lib/ld.so.1"
120
47d89dba
AM
121static const bfd_byte plt_stub[] =
122{
123 0x0e, 0x80, 0x10, 0x96, /* 1: ldw 0(%r20),%r22 */
124 0xea, 0xc0, 0xc0, 0x00, /* bv %r0(%r22) */
125 0x0e, 0x88, 0x10, 0x95, /* ldw 4(%r20),%r21 */
126#define PLT_STUB_ENTRY (3*4)
127 0xea, 0x9f, 0x1f, 0xdd, /* b,l 1b,%r20 */
128 0xd6, 0x80, 0x1c, 0x1e, /* depi 0,31,2,%r20 */
129 0x00, 0xc0, 0xff, 0xee, /* 9: .word fixup_func */
130 0xde, 0xad, 0xbe, 0xef /* .word fixup_ltp */
131};
132
30667bf3
AM
133/* Section name for stubs is the associated section name plus this
134 string. */
135#define STUB_SUFFIX ".stub"
136
98ceb8ce
AM
137/* We don't need to copy certain PC- or GP-relative dynamic relocs
138 into a shared object's dynamic section. All the relocs of the
139 limited class we are interested in, are absolute. */
140#ifndef RELATIVE_DYNRELOCS
141#define RELATIVE_DYNRELOCS 0
446f2863 142#define IS_ABSOLUTE_RELOC(r_type) 1
30667bf3
AM
143#endif
144
30667bf3
AM
145enum elf32_hppa_stub_type {
146 hppa_stub_long_branch,
147 hppa_stub_long_branch_shared,
148 hppa_stub_import,
149 hppa_stub_import_shared,
150 hppa_stub_export,
151 hppa_stub_none
152};
153
30667bf3 154struct elf32_hppa_stub_hash_entry {
252b5132 155
edd21aca 156 /* Base hash table entry structure. */
252b5132
RH
157 struct bfd_hash_entry root;
158
edd21aca
AM
159 /* The stub section. */
160 asection *stub_sec;
161
162 /* Offset within stub_sec of the beginning of this stub. */
30667bf3 163 bfd_vma stub_offset;
252b5132
RH
164
165 /* Given the symbol's value and its section we can determine its final
166 value when building the stubs (so the stub knows where to jump. */
30667bf3 167 bfd_vma target_value;
252b5132 168 asection *target_section;
30667bf3
AM
169
170 enum elf32_hppa_stub_type stub_type;
171
172 /* The symbol table entry, if any, that this was derived from. */
173 struct elf32_hppa_link_hash_entry *h;
174
25f72752
AM
175 /* Where this stub is being called from, or, in the case of combined
176 stub sections, the first input section in the group. */
177 asection *id_sec;
252b5132
RH
178};
179
30667bf3
AM
180struct elf32_hppa_link_hash_entry {
181
182 struct elf_link_hash_entry elf;
183
184 /* A pointer to the most recently used stub hash entry against this
185 symbol. */
186 struct elf32_hppa_stub_hash_entry *stub_cache;
187
30667bf3
AM
188 /* Used to count relocations for delayed sizing of relocation
189 sections. */
190 struct elf32_hppa_dyn_reloc_entry {
191
192 /* Next relocation in the chain. */
193 struct elf32_hppa_dyn_reloc_entry *next;
194
98ceb8ce
AM
195 /* The input section of the reloc. */
196 asection *sec;
30667bf3
AM
197
198 /* Number of relocs copied in this section. */
199 bfd_size_type count;
98ceb8ce
AM
200
201#if RELATIVE_DYNRELOCS
202 /* Number of relative relocs copied for the input section. */
203 bfd_size_type relative_count;
204#endif
205 } *dyn_relocs;
30667bf3
AM
206
207 /* Set during a static link if we detect a function is PIC. */
12cca0d2
AM
208 unsigned int maybe_pic_call:1;
209
210 /* Set if the only reason we need a .plt entry is for a non-PIC to
211 PIC function call. */
74d1c347
AM
212 unsigned int pic_call:1;
213
214 /* Set if this symbol is used by a plabel reloc. */
215 unsigned int plabel:1;
216
217 /* Set if this symbol is an init or fini function and thus should
218 use an absolute reloc. */
219 unsigned int plt_abs:1;
30667bf3
AM
220};
221
30667bf3
AM
222struct elf32_hppa_link_hash_table {
223
252b5132 224 /* The main hash table. */
ebe50bae 225 struct elf_link_hash_table elf;
252b5132
RH
226
227 /* The stub hash table. */
edd21aca 228 struct bfd_hash_table stub_hash_table;
252b5132 229
30667bf3
AM
230 /* Linker stub bfd. */
231 bfd *stub_bfd;
232
30667bf3
AM
233 /* Linker call-backs. */
234 asection * (*add_stub_section) PARAMS ((const char *, asection *));
235 void (*layout_sections_again) PARAMS ((void));
236
25f72752
AM
237 /* Array to keep track of which stub sections have been created, and
238 information on stub grouping. */
239 struct map_stub {
240 /* This is the section to which stubs in the group will be
241 attached. */
242 asection *link_sec;
243 /* The stub section. */
244 asection *stub_sec;
25f72752 245 } *stub_group;
30667bf3 246
30667bf3
AM
247 /* Short-cuts to get to dynamic linker sections. */
248 asection *sgot;
249 asection *srelgot;
250 asection *splt;
251 asection *srelplt;
252 asection *sdynbss;
253 asection *srelbss;
47d89dba 254
c46b7515
AM
255 /* Used during a final link to store the base of the text and data
256 segments so that we can perform SEGREL relocations. */
257 bfd_vma text_segment_base;
258 bfd_vma data_segment_base;
259
47d89dba
AM
260 /* Whether we support multiple sub-spaces for shared libs. */
261 unsigned int multi_subspace:1;
262
263 /* Flags set when PCREL12F and PCREL17F branches detected. Used to
264 select suitable defaults for the stub group size. */
265 unsigned int has_12bit_branch:1;
266 unsigned int has_17bit_branch:1;
267
268 /* Set if we need a .plt stub to support lazy dynamic linking. */
269 unsigned int need_plt_stub:1;
252b5132
RH
270};
271
30667bf3
AM
272/* Various hash macros and functions. */
273#define hppa_link_hash_table(p) \
edd21aca 274 ((struct elf32_hppa_link_hash_table *) ((p)->hash))
252b5132 275
30667bf3
AM
276#define hppa_stub_hash_lookup(table, string, create, copy) \
277 ((struct elf32_hppa_stub_hash_entry *) \
278 bfd_hash_lookup ((table), (string), (create), (copy)))
279
280static struct bfd_hash_entry *stub_hash_newfunc
281 PARAMS ((struct bfd_hash_entry *, struct bfd_hash_table *, const char *));
edd21aca 282
30667bf3 283static struct bfd_hash_entry *hppa_link_hash_newfunc
edd21aca 284 PARAMS ((struct bfd_hash_entry *, struct bfd_hash_table *, const char *));
252b5132
RH
285
286static struct bfd_link_hash_table *elf32_hppa_link_hash_table_create
287 PARAMS ((bfd *));
288
30667bf3
AM
289/* Stub handling functions. */
290static char *hppa_stub_name
291 PARAMS ((const asection *, const asection *,
292 const struct elf32_hppa_link_hash_entry *,
293 const Elf_Internal_Rela *));
edd21aca 294
30667bf3
AM
295static struct elf32_hppa_stub_hash_entry *hppa_get_stub_entry
296 PARAMS ((const asection *, const asection *,
297 struct elf32_hppa_link_hash_entry *,
25f72752
AM
298 const Elf_Internal_Rela *,
299 struct elf32_hppa_link_hash_table *));
edd21aca 300
30667bf3 301static struct elf32_hppa_stub_hash_entry *hppa_add_stub
25f72752 302 PARAMS ((const char *, asection *, struct elf32_hppa_link_hash_table *));
30667bf3
AM
303
304static enum elf32_hppa_stub_type hppa_type_of_stub
305 PARAMS ((asection *, const Elf_Internal_Rela *,
306 struct elf32_hppa_link_hash_entry *, bfd_vma));
307
308static boolean hppa_build_one_stub
309 PARAMS ((struct bfd_hash_entry *, PTR));
310
311static boolean hppa_size_one_stub
312 PARAMS ((struct bfd_hash_entry *, PTR));
313
30667bf3
AM
314/* BFD and elf backend functions. */
315static boolean elf32_hppa_object_p PARAMS ((bfd *));
252b5132 316
edd21aca
AM
317static boolean elf32_hppa_add_symbol_hook
318 PARAMS ((bfd *, struct bfd_link_info *, const Elf_Internal_Sym *,
319 const char **, flagword *, asection **, bfd_vma *));
252b5132 320
30667bf3
AM
321static boolean elf32_hppa_create_dynamic_sections
322 PARAMS ((bfd *, struct bfd_link_info *));
252b5132 323
ebe50bae
AM
324static void elf32_hppa_copy_indirect_symbol
325 PARAMS ((struct elf_link_hash_entry *, struct elf_link_hash_entry *));
326
30667bf3
AM
327static boolean elf32_hppa_check_relocs
328 PARAMS ((bfd *, struct bfd_link_info *,
329 asection *, const Elf_Internal_Rela *));
330
331static asection *elf32_hppa_gc_mark_hook
332 PARAMS ((bfd *, struct bfd_link_info *, Elf_Internal_Rela *,
333 struct elf_link_hash_entry *, Elf_Internal_Sym *));
334
335static boolean elf32_hppa_gc_sweep_hook
336 PARAMS ((bfd *, struct bfd_link_info *,
337 asection *, const Elf_Internal_Rela *));
338
74d1c347
AM
339static void elf32_hppa_hide_symbol
340 PARAMS ((struct bfd_link_info *, struct elf_link_hash_entry *));
341
30667bf3
AM
342static boolean elf32_hppa_adjust_dynamic_symbol
343 PARAMS ((struct bfd_link_info *, struct elf_link_hash_entry *));
344
345static boolean hppa_handle_PIC_calls
346 PARAMS ((struct elf_link_hash_entry *, PTR));
347
98ceb8ce
AM
348static boolean allocate_dynrelocs
349 PARAMS ((struct elf_link_hash_entry *, PTR));
350
351static boolean readonly_dynrelocs
30667bf3 352 PARAMS ((struct elf_link_hash_entry *, PTR));
30667bf3 353
d5c73c2f
AM
354static boolean clobber_millicode_symbols
355 PARAMS ((struct elf_link_hash_entry *, struct bfd_link_info *));
356
30667bf3
AM
357static boolean elf32_hppa_size_dynamic_sections
358 PARAMS ((bfd *, struct bfd_link_info *));
359
c46b7515
AM
360static boolean elf32_hppa_final_link
361 PARAMS ((bfd *, struct bfd_link_info *));
362
363static void hppa_record_segment_addr
364 PARAMS ((bfd *, asection *, PTR));
365
30667bf3
AM
366static bfd_reloc_status_type final_link_relocate
367 PARAMS ((asection *, bfd_byte *, const Elf_Internal_Rela *,
25f72752 368 bfd_vma, struct elf32_hppa_link_hash_table *, asection *,
30667bf3
AM
369 struct elf32_hppa_link_hash_entry *));
370
371static boolean elf32_hppa_relocate_section
372 PARAMS ((bfd *, struct bfd_link_info *, bfd *, asection *,
373 bfd_byte *, Elf_Internal_Rela *, Elf_Internal_Sym *, asection **));
374
c46b7515
AM
375static int hppa_unwind_entry_compare
376 PARAMS ((const PTR, const PTR));
377
30667bf3
AM
378static boolean elf32_hppa_finish_dynamic_symbol
379 PARAMS ((bfd *, struct bfd_link_info *,
380 struct elf_link_hash_entry *, Elf_Internal_Sym *));
381
98ceb8ce
AM
382static enum elf_reloc_type_class elf32_hppa_reloc_type_class
383 PARAMS ((const Elf_Internal_Rela *));
384
30667bf3
AM
385static boolean elf32_hppa_finish_dynamic_sections
386 PARAMS ((bfd *, struct bfd_link_info *));
387
d952f17a
AM
388static void elf32_hppa_post_process_headers
389 PARAMS ((bfd *, struct bfd_link_info *));
390
30667bf3
AM
391static int elf32_hppa_elf_get_symbol_type
392 PARAMS ((Elf_Internal_Sym *, int));
252b5132 393
252b5132
RH
394/* Assorted hash table functions. */
395
396/* Initialize an entry in the stub hash table. */
397
398static struct bfd_hash_entry *
30667bf3 399stub_hash_newfunc (entry, table, string)
252b5132
RH
400 struct bfd_hash_entry *entry;
401 struct bfd_hash_table *table;
402 const char *string;
403{
252b5132
RH
404 /* Allocate the structure if it has not already been allocated by a
405 subclass. */
ebe50bae 406 if (entry == NULL)
30667bf3 407 {
ebe50bae
AM
408 entry = bfd_hash_allocate (table,
409 sizeof (struct elf32_hppa_stub_hash_entry));
410 if (entry == NULL)
411 return entry;
30667bf3 412 }
252b5132
RH
413
414 /* Call the allocation method of the superclass. */
ebe50bae
AM
415 entry = bfd_hash_newfunc (entry, table, string);
416 if (entry != NULL)
252b5132 417 {
ebe50bae
AM
418 struct elf32_hppa_stub_hash_entry *eh;
419
252b5132 420 /* Initialize the local fields. */
ebe50bae
AM
421 eh = (struct elf32_hppa_stub_hash_entry *) entry;
422 eh->stub_sec = NULL;
423 eh->stub_offset = 0;
424 eh->target_value = 0;
425 eh->target_section = NULL;
426 eh->stub_type = hppa_stub_long_branch;
427 eh->h = NULL;
428 eh->id_sec = NULL;
30667bf3
AM
429 }
430
ebe50bae 431 return entry;
30667bf3
AM
432}
433
30667bf3
AM
434/* Initialize an entry in the link hash table. */
435
436static struct bfd_hash_entry *
437hppa_link_hash_newfunc (entry, table, string)
438 struct bfd_hash_entry *entry;
439 struct bfd_hash_table *table;
440 const char *string;
441{
30667bf3
AM
442 /* Allocate the structure if it has not already been allocated by a
443 subclass. */
ebe50bae 444 if (entry == NULL)
30667bf3 445 {
ebe50bae
AM
446 entry = bfd_hash_allocate (table,
447 sizeof (struct elf32_hppa_link_hash_entry));
448 if (entry == NULL)
449 return entry;
30667bf3
AM
450 }
451
452 /* Call the allocation method of the superclass. */
ebe50bae
AM
453 entry = _bfd_elf_link_hash_newfunc (entry, table, string);
454 if (entry != NULL)
30667bf3 455 {
ebe50bae
AM
456 struct elf32_hppa_link_hash_entry *eh;
457
30667bf3 458 /* Initialize the local fields. */
ebe50bae
AM
459 eh = (struct elf32_hppa_link_hash_entry *) entry;
460 eh->stub_cache = NULL;
461 eh->dyn_relocs = NULL;
462 eh->maybe_pic_call = 0;
463 eh->pic_call = 0;
464 eh->plabel = 0;
465 eh->plt_abs = 0;
252b5132
RH
466 }
467
ebe50bae 468 return entry;
252b5132
RH
469}
470
252b5132
RH
471/* Create the derived linker hash table. The PA ELF port uses the derived
472 hash table to keep information specific to the PA ELF linker (without
473 using static variables). */
474
475static struct bfd_link_hash_table *
476elf32_hppa_link_hash_table_create (abfd)
477 bfd *abfd;
478{
479 struct elf32_hppa_link_hash_table *ret;
dc810e39 480 bfd_size_type amt = sizeof (*ret);
252b5132 481
dc810e39 482 ret = (struct elf32_hppa_link_hash_table *) bfd_alloc (abfd, amt);
252b5132
RH
483 if (ret == NULL)
484 return NULL;
edd21aca 485
ebe50bae 486 if (!_bfd_elf_link_hash_table_init (&ret->elf, abfd, hppa_link_hash_newfunc))
252b5132
RH
487 {
488 bfd_release (abfd, ret);
489 return NULL;
490 }
edd21aca
AM
491
492 /* Init the stub hash table too. */
30667bf3 493 if (!bfd_hash_table_init (&ret->stub_hash_table, stub_hash_newfunc))
edd21aca
AM
494 return NULL;
495
30667bf3 496 ret->stub_bfd = NULL;
30667bf3
AM
497 ret->add_stub_section = NULL;
498 ret->layout_sections_again = NULL;
25f72752 499 ret->stub_group = NULL;
30667bf3
AM
500 ret->sgot = NULL;
501 ret->srelgot = NULL;
502 ret->splt = NULL;
503 ret->srelplt = NULL;
504 ret->sdynbss = NULL;
505 ret->srelbss = NULL;
c46b7515
AM
506 ret->text_segment_base = (bfd_vma) -1;
507 ret->data_segment_base = (bfd_vma) -1;
47d89dba
AM
508 ret->multi_subspace = 0;
509 ret->has_12bit_branch = 0;
510 ret->has_17bit_branch = 0;
511 ret->need_plt_stub = 0;
252b5132 512
ebe50bae 513 return &ret->elf.root;
252b5132
RH
514}
515
30667bf3
AM
516/* Build a name for an entry in the stub hash table. */
517
edd21aca 518static char *
30667bf3 519hppa_stub_name (input_section, sym_sec, hash, rel)
edd21aca 520 const asection *input_section;
30667bf3
AM
521 const asection *sym_sec;
522 const struct elf32_hppa_link_hash_entry *hash;
523 const Elf_Internal_Rela *rel;
edd21aca
AM
524{
525 char *stub_name;
dc810e39 526 bfd_size_type len;
edd21aca 527
30667bf3
AM
528 if (hash)
529 {
530 len = 8 + 1 + strlen (hash->elf.root.root.string) + 1 + 8 + 1;
531 stub_name = bfd_malloc (len);
532 if (stub_name != NULL)
533 {
534 sprintf (stub_name, "%08x_%s+%x",
535 input_section->id & 0xffffffff,
536 hash->elf.root.root.string,
537 (int) rel->r_addend & 0xffffffff);
538 }
539 }
540 else
edd21aca 541 {
30667bf3
AM
542 len = 8 + 1 + 8 + 1 + 8 + 1 + 8 + 1;
543 stub_name = bfd_malloc (len);
544 if (stub_name != NULL)
545 {
546 sprintf (stub_name, "%08x_%x:%x+%x",
547 input_section->id & 0xffffffff,
548 sym_sec->id & 0xffffffff,
549 (int) ELF32_R_SYM (rel->r_info) & 0xffffffff,
550 (int) rel->r_addend & 0xffffffff);
551 }
edd21aca
AM
552 }
553 return stub_name;
554}
252b5132 555
30667bf3
AM
556/* Look up an entry in the stub hash. Stub entries are cached because
557 creating the stub name takes a bit of time. */
558
559static struct elf32_hppa_stub_hash_entry *
83c81bfe 560hppa_get_stub_entry (input_section, sym_sec, hash, rel, htab)
30667bf3
AM
561 const asection *input_section;
562 const asection *sym_sec;
563 struct elf32_hppa_link_hash_entry *hash;
564 const Elf_Internal_Rela *rel;
83c81bfe 565 struct elf32_hppa_link_hash_table *htab;
252b5132 566{
30667bf3 567 struct elf32_hppa_stub_hash_entry *stub_entry;
25f72752
AM
568 const asection *id_sec;
569
570 /* If this input section is part of a group of sections sharing one
571 stub section, then use the id of the first section in the group.
572 Stub names need to include a section id, as there may well be
573 more than one stub used to reach say, printf, and we need to
574 distinguish between them. */
83c81bfe 575 id_sec = htab->stub_group[input_section->id].link_sec;
edd21aca 576
30667bf3
AM
577 if (hash != NULL && hash->stub_cache != NULL
578 && hash->stub_cache->h == hash
25f72752 579 && hash->stub_cache->id_sec == id_sec)
edd21aca 580 {
30667bf3
AM
581 stub_entry = hash->stub_cache;
582 }
583 else
584 {
30667bf3 585 char *stub_name;
edd21aca 586
25f72752 587 stub_name = hppa_stub_name (id_sec, sym_sec, hash, rel);
30667bf3
AM
588 if (stub_name == NULL)
589 return NULL;
edd21aca 590
83c81bfe 591 stub_entry = hppa_stub_hash_lookup (&htab->stub_hash_table,
25f72752 592 stub_name, false, false);
30667bf3
AM
593 if (stub_entry == NULL)
594 {
595 if (hash == NULL || hash->elf.root.type != bfd_link_hash_undefweak)
596 (*_bfd_error_handler) (_("%s(%s+0x%lx): cannot find stub entry %s"),
8f615d07 597 bfd_archive_filename (input_section->owner),
30667bf3
AM
598 input_section->name,
599 (long) rel->r_offset,
600 stub_name);
601 }
602 else
603 {
604 if (hash != NULL)
605 hash->stub_cache = stub_entry;
606 }
607
608 free (stub_name);
edd21aca 609 }
30667bf3
AM
610
611 return stub_entry;
612}
613
30667bf3
AM
614/* Add a new stub entry to the stub hash. Not all fields of the new
615 stub entry are initialised. */
616
617static struct elf32_hppa_stub_hash_entry *
83c81bfe 618hppa_add_stub (stub_name, section, htab)
30667bf3
AM
619 const char *stub_name;
620 asection *section;
83c81bfe 621 struct elf32_hppa_link_hash_table *htab;
30667bf3 622{
25f72752 623 asection *link_sec;
30667bf3 624 asection *stub_sec;
30667bf3 625 struct elf32_hppa_stub_hash_entry *stub_entry;
edd21aca 626
83c81bfe
AM
627 link_sec = htab->stub_group[section->id].link_sec;
628 stub_sec = htab->stub_group[section->id].stub_sec;
30667bf3 629 if (stub_sec == NULL)
edd21aca 630 {
83c81bfe 631 stub_sec = htab->stub_group[link_sec->id].stub_sec;
30667bf3
AM
632 if (stub_sec == NULL)
633 {
dc810e39 634 bfd_size_type len;
30667bf3
AM
635 char *s_name;
636
25f72752 637 len = strlen (link_sec->name) + sizeof (STUB_SUFFIX);
83c81bfe 638 s_name = bfd_alloc (htab->stub_bfd, len);
30667bf3
AM
639 if (s_name == NULL)
640 return NULL;
641
25f72752 642 strcpy (s_name, link_sec->name);
30667bf3 643 strcpy (s_name + len - sizeof (STUB_SUFFIX), STUB_SUFFIX);
83c81bfe 644 stub_sec = (*htab->add_stub_section) (s_name, link_sec);
30667bf3
AM
645 if (stub_sec == NULL)
646 return NULL;
83c81bfe 647 htab->stub_group[link_sec->id].stub_sec = stub_sec;
30667bf3 648 }
83c81bfe 649 htab->stub_group[section->id].stub_sec = stub_sec;
edd21aca 650 }
252b5132 651
30667bf3 652 /* Enter this entry into the linker stub hash table. */
83c81bfe 653 stub_entry = hppa_stub_hash_lookup (&htab->stub_hash_table, stub_name,
30667bf3
AM
654 true, false);
655 if (stub_entry == NULL)
656 {
657 (*_bfd_error_handler) (_("%s: cannot create stub entry %s"),
8f615d07 658 bfd_archive_filename (section->owner),
30667bf3
AM
659 stub_name);
660 return NULL;
edd21aca
AM
661 }
662
30667bf3 663 stub_entry->stub_sec = stub_sec;
30667bf3 664 stub_entry->stub_offset = 0;
25f72752 665 stub_entry->id_sec = link_sec;
30667bf3 666 return stub_entry;
edd21aca
AM
667}
668
30667bf3
AM
669/* Determine the type of stub needed, if any, for a call. */
670
671static enum elf32_hppa_stub_type
672hppa_type_of_stub (input_sec, rel, hash, destination)
673 asection *input_sec;
674 const Elf_Internal_Rela *rel;
675 struct elf32_hppa_link_hash_entry *hash;
676 bfd_vma destination;
edd21aca 677{
edd21aca 678 bfd_vma location;
30667bf3
AM
679 bfd_vma branch_offset;
680 bfd_vma max_branch_offset;
681 unsigned int r_type;
682
683 if (hash != NULL
684 && (((hash->elf.root.type == bfd_link_hash_defined
74d1c347
AM
685 || hash->elf.root.type == bfd_link_hash_defweak)
686 && hash->elf.root.u.def.section->output_section == NULL)
687 || (hash->elf.root.type == bfd_link_hash_defweak
688 && hash->elf.dynindx != -1
689 && hash->elf.plt.offset != (bfd_vma) -1)
30667bf3
AM
690 || hash->elf.root.type == bfd_link_hash_undefweak
691 || hash->elf.root.type == bfd_link_hash_undefined
12cca0d2 692 || (hash->maybe_pic_call && !(input_sec->flags & SEC_HAS_GOT_REF))))
30667bf3
AM
693 {
694 /* If output_section is NULL, then it's a symbol defined in a
695 shared library. We will need an import stub. Decide between
74d1c347
AM
696 hppa_stub_import and hppa_stub_import_shared later. For
697 shared links we need stubs for undefined or weak syms too;
698 They will presumably be resolved by the dynamic linker. */
30667bf3
AM
699 return hppa_stub_import;
700 }
edd21aca 701
30667bf3
AM
702 /* Determine where the call point is. */
703 location = (input_sec->output_offset
704 + input_sec->output_section->vma
705 + rel->r_offset);
edd21aca 706
30667bf3
AM
707 branch_offset = destination - location - 8;
708 r_type = ELF32_R_TYPE (rel->r_info);
edd21aca 709
30667bf3
AM
710 /* Determine if a long branch stub is needed. parisc branch offsets
711 are relative to the second instruction past the branch, ie. +8
712 bytes on from the branch instruction location. The offset is
713 signed and counts in units of 4 bytes. */
714 if (r_type == (unsigned int) R_PARISC_PCREL17F)
edd21aca 715 {
30667bf3
AM
716 max_branch_offset = (1 << (17-1)) << 2;
717 }
718 else if (r_type == (unsigned int) R_PARISC_PCREL12F)
719 {
720 max_branch_offset = (1 << (12-1)) << 2;
721 }
25f72752 722 else /* R_PARISC_PCREL22F. */
30667bf3
AM
723 {
724 max_branch_offset = (1 << (22-1)) << 2;
edd21aca
AM
725 }
726
30667bf3 727 if (branch_offset + max_branch_offset >= 2*max_branch_offset)
98ceb8ce
AM
728 return hppa_stub_long_branch;
729
30667bf3
AM
730 return hppa_stub_none;
731}
edd21aca 732
30667bf3
AM
733/* Build one linker stub as defined by the stub hash table entry GEN_ENTRY.
734 IN_ARG contains the link info pointer. */
edd21aca 735
30667bf3
AM
736#define LDIL_R1 0x20200000 /* ldil LR'XXX,%r1 */
737#define BE_SR4_R1 0xe0202002 /* be,n RR'XXX(%sr4,%r1) */
edd21aca 738
30667bf3 739#define BL_R1 0xe8200000 /* b,l .+8,%r1 */
3ee1d854 740#define ADDIL_R1 0x28200000 /* addil LR'XXX,%r1,%r1 */
30667bf3 741#define DEPI_R1 0xd4201c1e /* depi 0,31,2,%r1 */
252b5132 742
3ee1d854
AM
743#define ADDIL_DP 0x2b600000 /* addil LR'XXX,%dp,%r1 */
744#define LDW_R1_R21 0x48350000 /* ldw RR'XXX(%sr0,%r1),%r21 */
30667bf3 745#define BV_R0_R21 0xeaa0c000 /* bv %r0(%r21) */
3ee1d854 746#define LDW_R1_R19 0x48330000 /* ldw RR'XXX(%sr0,%r1),%r19 */
252b5132 747
3ee1d854
AM
748#define ADDIL_R19 0x2a600000 /* addil LR'XXX,%r19,%r1 */
749#define LDW_R1_DP 0x483b0000 /* ldw RR'XXX(%sr0,%r1),%dp */
edd21aca 750
30667bf3
AM
751#define LDSID_R21_R1 0x02a010a1 /* ldsid (%sr0,%r21),%r1 */
752#define MTSP_R1 0x00011820 /* mtsp %r1,%sr0 */
753#define BE_SR0_R21 0xe2a00000 /* be 0(%sr0,%r21) */
754#define STW_RP 0x6bc23fd1 /* stw %rp,-24(%sr0,%sp) */
edd21aca 755
30667bf3
AM
756#define BL_RP 0xe8400002 /* b,l,n XXX,%rp */
757#define NOP 0x08000240 /* nop */
758#define LDW_RP 0x4bc23fd1 /* ldw -24(%sr0,%sp),%rp */
759#define LDSID_RP_R1 0x004010a1 /* ldsid (%sr0,%rp),%r1 */
760#define BE_SR0_RP 0xe0400002 /* be,n 0(%sr0,%rp) */
edd21aca 761
30667bf3
AM
762#ifndef R19_STUBS
763#define R19_STUBS 1
764#endif
edd21aca 765
30667bf3
AM
766#if R19_STUBS
767#define LDW_R1_DLT LDW_R1_R19
768#else
769#define LDW_R1_DLT LDW_R1_DP
770#endif
edd21aca 771
30667bf3
AM
772static boolean
773hppa_build_one_stub (gen_entry, in_arg)
774 struct bfd_hash_entry *gen_entry;
775 PTR in_arg;
776{
777 struct elf32_hppa_stub_hash_entry *stub_entry;
778 struct bfd_link_info *info;
83c81bfe 779 struct elf32_hppa_link_hash_table *htab;
30667bf3
AM
780 asection *stub_sec;
781 bfd *stub_bfd;
782 bfd_byte *loc;
783 bfd_vma sym_value;
74d1c347 784 bfd_vma insn;
8dea1268 785 bfd_vma off;
74d1c347 786 int val;
30667bf3 787 int size;
edd21aca 788
30667bf3
AM
789 /* Massage our args to the form they really have. */
790 stub_entry = (struct elf32_hppa_stub_hash_entry *) gen_entry;
791 info = (struct bfd_link_info *) in_arg;
792
83c81bfe 793 htab = hppa_link_hash_table (info);
30667bf3 794 stub_sec = stub_entry->stub_sec;
edd21aca 795
30667bf3 796 /* Make a note of the offset within the stubs for this entry. */
74d1c347 797 stub_entry->stub_offset = stub_sec->_raw_size;
30667bf3 798 loc = stub_sec->contents + stub_entry->stub_offset;
252b5132 799
30667bf3
AM
800 stub_bfd = stub_sec->owner;
801
802 switch (stub_entry->stub_type)
803 {
804 case hppa_stub_long_branch:
805 /* Create the long branch. A long branch is formed with "ldil"
806 loading the upper bits of the target address into a register,
807 then branching with "be" which adds in the lower bits.
808 The "be" has its delay slot nullified. */
809 sym_value = (stub_entry->target_value
810 + stub_entry->target_section->output_offset
811 + stub_entry->target_section->output_section->vma);
812
74d1c347
AM
813 val = hppa_field_adjust (sym_value, (bfd_signed_vma) 0, e_lrsel);
814 insn = hppa_rebuild_insn ((int) LDIL_R1, val, 21);
30667bf3
AM
815 bfd_put_32 (stub_bfd, insn, loc);
816
74d1c347
AM
817 val = hppa_field_adjust (sym_value, (bfd_signed_vma) 0, e_rrsel) >> 2;
818 insn = hppa_rebuild_insn ((int) BE_SR4_R1, val, 17);
30667bf3
AM
819 bfd_put_32 (stub_bfd, insn, loc + 4);
820
30667bf3 821 size = 8;
edd21aca
AM
822 break;
823
30667bf3
AM
824 case hppa_stub_long_branch_shared:
825 /* Branches are relative. This is where we are going to. */
826 sym_value = (stub_entry->target_value
827 + stub_entry->target_section->output_offset
828 + stub_entry->target_section->output_section->vma);
829
830 /* And this is where we are coming from, more or less. */
831 sym_value -= (stub_entry->stub_offset
832 + stub_sec->output_offset
833 + stub_sec->output_section->vma);
834
74d1c347 835 bfd_put_32 (stub_bfd, (bfd_vma) BL_R1, loc);
47d89dba 836 val = hppa_field_adjust (sym_value, (bfd_signed_vma) -8, e_lrsel);
74d1c347 837 insn = hppa_rebuild_insn ((int) ADDIL_R1, val, 21);
30667bf3
AM
838 bfd_put_32 (stub_bfd, insn, loc + 4);
839
47d89dba 840 val = hppa_field_adjust (sym_value, (bfd_signed_vma) -8, e_rrsel) >> 2;
74d1c347 841 insn = hppa_rebuild_insn ((int) BE_SR4_R1, val, 17);
30667bf3
AM
842 bfd_put_32 (stub_bfd, insn, loc + 8);
843 size = 12;
844 break;
edd21aca 845
30667bf3
AM
846 case hppa_stub_import:
847 case hppa_stub_import_shared:
8dea1268
AM
848 off = stub_entry->h->elf.plt.offset;
849 if (off >= (bfd_vma) -2)
49e9d0d3 850 abort ();
8dea1268
AM
851
852 off &= ~ (bfd_vma) 1;
853 sym_value = (off
83c81bfe
AM
854 + htab->splt->output_offset
855 + htab->splt->output_section->vma
856 - elf_gp (htab->splt->output_section->owner));
30667bf3
AM
857
858 insn = ADDIL_DP;
859#if R19_STUBS
860 if (stub_entry->stub_type == hppa_stub_import_shared)
861 insn = ADDIL_R19;
862#endif
47d89dba 863 val = hppa_field_adjust (sym_value, (bfd_signed_vma) 0, e_lrsel),
74d1c347 864 insn = hppa_rebuild_insn ((int) insn, val, 21);
30667bf3 865 bfd_put_32 (stub_bfd, insn, loc);
edd21aca 866
47d89dba
AM
867 /* It is critical to use lrsel/rrsel here because we are using
868 two different offsets (+0 and +4) from sym_value. If we use
869 lsel/rsel then with unfortunate sym_values we will round
870 sym_value+4 up to the next 2k block leading to a mis-match
871 between the lsel and rsel value. */
872 val = hppa_field_adjust (sym_value, (bfd_signed_vma) 0, e_rrsel);
74d1c347 873 insn = hppa_rebuild_insn ((int) LDW_R1_R21, val, 14);
30667bf3 874 bfd_put_32 (stub_bfd, insn, loc + 4);
252b5132 875
83c81bfe 876 if (htab->multi_subspace)
30667bf3 877 {
47d89dba 878 val = hppa_field_adjust (sym_value, (bfd_signed_vma) 4, e_rrsel);
74d1c347 879 insn = hppa_rebuild_insn ((int) LDW_R1_DLT, val, 14);
30667bf3 880 bfd_put_32 (stub_bfd, insn, loc + 8);
252b5132 881
74d1c347
AM
882 bfd_put_32 (stub_bfd, (bfd_vma) LDSID_R21_R1, loc + 12);
883 bfd_put_32 (stub_bfd, (bfd_vma) MTSP_R1, loc + 16);
884 bfd_put_32 (stub_bfd, (bfd_vma) BE_SR0_R21, loc + 20);
885 bfd_put_32 (stub_bfd, (bfd_vma) STW_RP, loc + 24);
252b5132 886
30667bf3
AM
887 size = 28;
888 }
889 else
890 {
74d1c347 891 bfd_put_32 (stub_bfd, (bfd_vma) BV_R0_R21, loc + 8);
47d89dba 892 val = hppa_field_adjust (sym_value, (bfd_signed_vma) 4, e_rrsel);
74d1c347 893 insn = hppa_rebuild_insn ((int) LDW_R1_DLT, val, 14);
30667bf3 894 bfd_put_32 (stub_bfd, insn, loc + 12);
252b5132 895
30667bf3
AM
896 size = 16;
897 }
252b5132 898
30667bf3
AM
899 if (!info->shared
900 && stub_entry->h != NULL
901 && stub_entry->h->pic_call)
252b5132 902 {
30667bf3
AM
903 /* Build the .plt entry needed to call a PIC function from
904 statically linked code. We don't need any relocs. */
905 bfd *dynobj;
906 struct elf32_hppa_link_hash_entry *eh;
907 bfd_vma value;
252b5132 908
ebe50bae 909 dynobj = htab->elf.dynobj;
30667bf3 910 eh = (struct elf32_hppa_link_hash_entry *) stub_entry->h;
252b5132 911
49e9d0d3
AM
912 if (eh->elf.root.type != bfd_link_hash_defined
913 && eh->elf.root.type != bfd_link_hash_defweak)
914 abort ();
252b5132 915
30667bf3
AM
916 value = (eh->elf.root.u.def.value
917 + eh->elf.root.u.def.section->output_offset
918 + eh->elf.root.u.def.section->output_section->vma);
252b5132 919
30667bf3 920 /* Fill in the entry in the procedure linkage table.
252b5132 921
30667bf3 922 The format of a plt entry is
74d1c347
AM
923 <funcaddr>
924 <__gp>. */
252b5132 925
83c81bfe
AM
926 bfd_put_32 (htab->splt->owner, value,
927 htab->splt->contents + off);
928 value = elf_gp (htab->splt->output_section->owner);
929 bfd_put_32 (htab->splt->owner, value,
930 htab->splt->contents + off + 4);
252b5132 931 }
30667bf3 932 break;
252b5132 933
30667bf3
AM
934 case hppa_stub_export:
935 /* Branches are relative. This is where we are going to. */
936 sym_value = (stub_entry->target_value
937 + stub_entry->target_section->output_offset
938 + stub_entry->target_section->output_section->vma);
252b5132 939
30667bf3
AM
940 /* And this is where we are coming from. */
941 sym_value -= (stub_entry->stub_offset
942 + stub_sec->output_offset
943 + stub_sec->output_section->vma);
edd21aca 944
30667bf3
AM
945 if (sym_value - 8 + 0x40000 >= 0x80000)
946 {
edd21aca 947 (*_bfd_error_handler)
30667bf3 948 (_("%s(%s+0x%lx): cannot reach %s, recompile with -ffunction-sections"),
8f615d07 949 bfd_archive_filename (stub_entry->target_section->owner),
30667bf3
AM
950 stub_sec->name,
951 (long) stub_entry->stub_offset,
952 stub_entry->root.string);
953 bfd_set_error (bfd_error_bad_value);
edd21aca 954 return false;
252b5132 955 }
30667bf3 956
74d1c347
AM
957 val = hppa_field_adjust (sym_value, (bfd_signed_vma) -8, e_fsel) >> 2;
958 insn = hppa_rebuild_insn ((int) BL_RP, val, 17);
30667bf3
AM
959 bfd_put_32 (stub_bfd, insn, loc);
960
74d1c347
AM
961 bfd_put_32 (stub_bfd, (bfd_vma) NOP, loc + 4);
962 bfd_put_32 (stub_bfd, (bfd_vma) LDW_RP, loc + 8);
963 bfd_put_32 (stub_bfd, (bfd_vma) LDSID_RP_R1, loc + 12);
964 bfd_put_32 (stub_bfd, (bfd_vma) MTSP_R1, loc + 16);
965 bfd_put_32 (stub_bfd, (bfd_vma) BE_SR0_RP, loc + 20);
30667bf3
AM
966
967 /* Point the function symbol at the stub. */
968 stub_entry->h->elf.root.u.def.section = stub_sec;
74d1c347 969 stub_entry->h->elf.root.u.def.value = stub_sec->_raw_size;
30667bf3
AM
970
971 size = 24;
972 break;
973
974 default:
975 BFD_FAIL ();
976 return false;
252b5132
RH
977 }
978
74d1c347 979 stub_sec->_raw_size += size;
252b5132
RH
980 return true;
981}
982
30667bf3
AM
983#undef LDIL_R1
984#undef BE_SR4_R1
985#undef BL_R1
986#undef ADDIL_R1
987#undef DEPI_R1
988#undef ADDIL_DP
989#undef LDW_R1_R21
990#undef LDW_R1_DLT
991#undef LDW_R1_R19
992#undef ADDIL_R19
993#undef LDW_R1_DP
994#undef LDSID_R21_R1
995#undef MTSP_R1
996#undef BE_SR0_R21
997#undef STW_RP
998#undef BV_R0_R21
999#undef BL_RP
1000#undef NOP
1001#undef LDW_RP
1002#undef LDSID_RP_R1
1003#undef BE_SR0_RP
252b5132 1004
30667bf3
AM
1005/* As above, but don't actually build the stub. Just bump offset so
1006 we know stub section sizes. */
1007
1008static boolean
1009hppa_size_one_stub (gen_entry, in_arg)
1010 struct bfd_hash_entry *gen_entry;
1011 PTR in_arg;
252b5132 1012{
30667bf3 1013 struct elf32_hppa_stub_hash_entry *stub_entry;
83c81bfe 1014 struct elf32_hppa_link_hash_table *htab;
30667bf3
AM
1015 int size;
1016
1017 /* Massage our args to the form they really have. */
1018 stub_entry = (struct elf32_hppa_stub_hash_entry *) gen_entry;
83c81bfe 1019 htab = (struct elf32_hppa_link_hash_table *) in_arg;
30667bf3
AM
1020
1021 if (stub_entry->stub_type == hppa_stub_long_branch)
98ceb8ce 1022 size = 8;
30667bf3
AM
1023 else if (stub_entry->stub_type == hppa_stub_long_branch_shared)
1024 size = 12;
1025 else if (stub_entry->stub_type == hppa_stub_export)
1026 size = 24;
74d1c347 1027 else /* hppa_stub_import or hppa_stub_import_shared. */
252b5132 1028 {
83c81bfe 1029 if (htab->multi_subspace)
30667bf3
AM
1030 size = 28;
1031 else
1032 size = 16;
1033 }
252b5132 1034
74d1c347 1035 stub_entry->stub_sec->_raw_size += size;
30667bf3
AM
1036 return true;
1037}
252b5132 1038
30667bf3
AM
1039/* Return nonzero if ABFD represents an HPPA ELF32 file.
1040 Additionally we set the default architecture and machine. */
1041
1042static boolean
1043elf32_hppa_object_p (abfd)
1044 bfd *abfd;
1045{
24a5e751
L
1046 Elf_Internal_Ehdr * i_ehdrp;
1047 unsigned int flags;
252b5132 1048
24a5e751
L
1049 i_ehdrp = elf_elfheader (abfd);
1050 if (strcmp (bfd_get_target (abfd), "elf32-hppa-linux") == 0)
1051 {
1052 if (i_ehdrp->e_ident[EI_OSABI] != ELFOSABI_LINUX)
1053 return false;
1054 }
1055 else
1056 {
1057 if (i_ehdrp->e_ident[EI_OSABI] != ELFOSABI_HPUX)
1058 return false;
1059 }
1060
1061 flags = i_ehdrp->e_flags;
30667bf3
AM
1062 switch (flags & (EF_PARISC_ARCH | EF_PARISC_WIDE))
1063 {
1064 case EFA_PARISC_1_0:
1065 return bfd_default_set_arch_mach (abfd, bfd_arch_hppa, 10);
1066 case EFA_PARISC_1_1:
1067 return bfd_default_set_arch_mach (abfd, bfd_arch_hppa, 11);
1068 case EFA_PARISC_2_0:
1069 return bfd_default_set_arch_mach (abfd, bfd_arch_hppa, 20);
1070 case EFA_PARISC_2_0 | EF_PARISC_WIDE:
1071 return bfd_default_set_arch_mach (abfd, bfd_arch_hppa, 25);
1072 }
1073 return true;
252b5132
RH
1074}
1075
252b5132
RH
1076/* Undo the generic ELF code's subtraction of section->vma from the
1077 value of each external symbol. */
1078
1079static boolean
1080elf32_hppa_add_symbol_hook (abfd, info, sym, namep, flagsp, secp, valp)
5f771d47
ILT
1081 bfd *abfd ATTRIBUTE_UNUSED;
1082 struct bfd_link_info *info ATTRIBUTE_UNUSED;
1083 const Elf_Internal_Sym *sym ATTRIBUTE_UNUSED;
1084 const char **namep ATTRIBUTE_UNUSED;
1085 flagword *flagsp ATTRIBUTE_UNUSED;
252b5132
RH
1086 asection **secp;
1087 bfd_vma *valp;
1088{
1089 *valp += (*secp)->vma;
1090 return true;
1091}
1092
30667bf3
AM
1093/* Create the .plt and .got sections, and set up our hash table
1094 short-cuts to various dynamic sections. */
1095
1096static boolean
1097elf32_hppa_create_dynamic_sections (abfd, info)
1098 bfd *abfd;
1099 struct bfd_link_info *info;
252b5132 1100{
83c81bfe 1101 struct elf32_hppa_link_hash_table *htab;
edd21aca 1102
30667bf3 1103 /* Don't try to create the .plt and .got twice. */
83c81bfe
AM
1104 htab = hppa_link_hash_table (info);
1105 if (htab->splt != NULL)
30667bf3 1106 return true;
edd21aca 1107
30667bf3
AM
1108 /* Call the generic code to do most of the work. */
1109 if (! _bfd_elf_create_dynamic_sections (abfd, info))
1110 return false;
252b5132 1111
83c81bfe
AM
1112 htab->splt = bfd_get_section_by_name (abfd, ".plt");
1113 htab->srelplt = bfd_get_section_by_name (abfd, ".rela.plt");
30667bf3 1114
83c81bfe
AM
1115 htab->sgot = bfd_get_section_by_name (abfd, ".got");
1116 htab->srelgot = bfd_make_section (abfd, ".rela.got");
1117 if (htab->srelgot == NULL
1118 || ! bfd_set_section_flags (abfd, htab->srelgot,
30667bf3
AM
1119 (SEC_ALLOC
1120 | SEC_LOAD
1121 | SEC_HAS_CONTENTS
1122 | SEC_IN_MEMORY
1123 | SEC_LINKER_CREATED
1124 | SEC_READONLY))
83c81bfe 1125 || ! bfd_set_section_alignment (abfd, htab->srelgot, 2))
30667bf3 1126 return false;
edd21aca 1127
83c81bfe
AM
1128 htab->sdynbss = bfd_get_section_by_name (abfd, ".dynbss");
1129 htab->srelbss = bfd_get_section_by_name (abfd, ".rela.bss");
30667bf3
AM
1130
1131 return true;
1132}
1133
ebe50bae
AM
1134/* Copy the extra info we tack onto an elf_link_hash_entry. */
1135
1136void
1137elf32_hppa_copy_indirect_symbol (dir, ind)
1138 struct elf_link_hash_entry *dir, *ind;
1139{
1140 struct elf32_hppa_link_hash_entry *edir, *eind;
1141
1142 edir = (struct elf32_hppa_link_hash_entry *) dir;
1143 eind = (struct elf32_hppa_link_hash_entry *) ind;
1144
1145 if (edir->dyn_relocs == NULL)
1146 {
1147 edir->dyn_relocs = eind->dyn_relocs;
1148 eind->dyn_relocs = NULL;
1149 }
1150 else if (eind->dyn_relocs != NULL)
1151 abort ();
1152
1153 _bfd_elf_link_hash_copy_indirect (dir, ind);
1154}
1155
30667bf3 1156/* Look through the relocs for a section during the first phase, and
3ac8354b
AM
1157 calculate needed space in the global offset table, procedure linkage
1158 table, and dynamic reloc sections. At this point we haven't
1159 necessarily read all the input files. */
252b5132
RH
1160
1161static boolean
30667bf3
AM
1162elf32_hppa_check_relocs (abfd, info, sec, relocs)
1163 bfd *abfd;
1164 struct bfd_link_info *info;
1165 asection *sec;
1166 const Elf_Internal_Rela *relocs;
252b5132 1167{
30667bf3
AM
1168 Elf_Internal_Shdr *symtab_hdr;
1169 struct elf_link_hash_entry **sym_hashes;
30667bf3
AM
1170 const Elf_Internal_Rela *rel;
1171 const Elf_Internal_Rela *rel_end;
83c81bfe 1172 struct elf32_hppa_link_hash_table *htab;
30667bf3
AM
1173 asection *sreloc;
1174 asection *stubreloc;
1175
1176 if (info->relocateable)
1177 return true;
1178
83c81bfe 1179 htab = hppa_link_hash_table (info);
30667bf3
AM
1180 symtab_hdr = &elf_tdata (abfd)->symtab_hdr;
1181 sym_hashes = elf_sym_hashes (abfd);
30667bf3
AM
1182 sreloc = NULL;
1183 stubreloc = NULL;
1184
1185 rel_end = relocs + sec->reloc_count;
1186 for (rel = relocs; rel < rel_end; rel++)
1187 {
1188 enum {
1189 NEED_GOT = 1,
1190 NEED_PLT = 2,
1191 NEED_DYNREL = 4,
98ceb8ce 1192 PLT_PLABEL = 8
30667bf3 1193 };
edd21aca 1194
30667bf3
AM
1195 unsigned int r_symndx, r_type;
1196 struct elf32_hppa_link_hash_entry *h;
1197 int need_entry;
252b5132 1198
30667bf3 1199 r_symndx = ELF32_R_SYM (rel->r_info);
252b5132 1200
30667bf3
AM
1201 if (r_symndx < symtab_hdr->sh_info)
1202 h = NULL;
1203 else
1204 h = ((struct elf32_hppa_link_hash_entry *)
1205 sym_hashes[r_symndx - symtab_hdr->sh_info]);
252b5132 1206
30667bf3 1207 r_type = ELF32_R_TYPE (rel->r_info);
252b5132 1208
30667bf3
AM
1209 switch (r_type)
1210 {
1211 case R_PARISC_DLTIND14F:
1212 case R_PARISC_DLTIND14R:
1213 case R_PARISC_DLTIND21L:
1214 /* This symbol requires a global offset table entry. */
1215 need_entry = NEED_GOT;
1216
1217 /* Mark this section as containing PIC code. */
1218 sec->flags |= SEC_HAS_GOT_REF;
1219 break;
1220
1221 case R_PARISC_PLABEL14R: /* "Official" procedure labels. */
1222 case R_PARISC_PLABEL21L:
1223 case R_PARISC_PLABEL32:
74d1c347 1224 /* If the addend is non-zero, we break badly. */
49e9d0d3
AM
1225 if (rel->r_addend != 0)
1226 abort ();
74d1c347
AM
1227
1228 /* If we are creating a shared library, then we need to
1229 create a PLT entry for all PLABELs, because PLABELs with
1230 local symbols may be passed via a pointer to another
1231 object. Additionally, output a dynamic relocation
4dc86686
AM
1232 pointing to the PLT entry.
1233 For executables, the original 32-bit ABI allowed two
1234 different styles of PLABELs (function pointers): For
1235 global functions, the PLABEL word points into the .plt
1236 two bytes past a (function address, gp) pair, and for
1237 local functions the PLABEL points directly at the
1238 function. The magic +2 for the first type allows us to
1239 differentiate between the two. As you can imagine, this
1240 is a real pain when it comes to generating code to call
1241 functions indirectly or to compare function pointers.
1242 We avoid the mess by always pointing a PLABEL into the
1243 .plt, even for local functions. */
74d1c347 1244 need_entry = PLT_PLABEL | NEED_PLT | NEED_DYNREL;
30667bf3
AM
1245 break;
1246
1247 case R_PARISC_PCREL12F:
83c81bfe 1248 htab->has_12bit_branch = 1;
47d89dba 1249 /* Fall thru. */
30667bf3
AM
1250 case R_PARISC_PCREL17C:
1251 case R_PARISC_PCREL17F:
83c81bfe 1252 htab->has_17bit_branch = 1;
47d89dba 1253 /* Fall thru. */
30667bf3 1254 case R_PARISC_PCREL22F:
47d89dba
AM
1255 /* Function calls might need to go through the .plt, and
1256 might require long branch stubs. */
30667bf3
AM
1257 if (h == NULL)
1258 {
1259 /* We know local syms won't need a .plt entry, and if
1260 they need a long branch stub we can't guarantee that
1261 we can reach the stub. So just flag an error later
1262 if we're doing a shared link and find we need a long
1263 branch stub. */
1264 continue;
1265 }
1266 else
1267 {
1268 /* Global symbols will need a .plt entry if they remain
1269 global, and in most cases won't need a long branch
1270 stub. Unfortunately, we have to cater for the case
1271 where a symbol is forced local by versioning, or due
1272 to symbolic linking, and we lose the .plt entry. */
98ceb8ce 1273 need_entry = NEED_PLT;
4dc86686 1274 if (h->elf.type == STT_PARISC_MILLI)
98ceb8ce 1275 need_entry = 0;
30667bf3
AM
1276 }
1277 break;
1278
1279 case R_PARISC_SEGBASE: /* Used to set segment base. */
c46b7515 1280 case R_PARISC_SEGREL32: /* Relative reloc, used for unwind. */
30667bf3
AM
1281 case R_PARISC_PCREL14F: /* PC relative load/store. */
1282 case R_PARISC_PCREL14R:
1283 case R_PARISC_PCREL17R: /* External branches. */
1284 case R_PARISC_PCREL21L: /* As above, and for load/store too. */
1285 /* We don't need to propagate the relocation if linking a
1286 shared object since these are section relative. */
1287 continue;
1288
1289 case R_PARISC_DPREL14F: /* Used for gp rel data load/store. */
1290 case R_PARISC_DPREL14R:
1291 case R_PARISC_DPREL21L:
1292 if (info->shared)
1293 {
1294 (*_bfd_error_handler)
1295 (_("%s: relocation %s can not be used when making a shared object; recompile with -fPIC"),
8f615d07 1296 bfd_archive_filename (abfd),
30667bf3
AM
1297 elf_hppa_howto_table[r_type].name);
1298 bfd_set_error (bfd_error_bad_value);
1299 return false;
1300 }
1301 /* Fall through. */
1302
1303 case R_PARISC_DIR17F: /* Used for external branches. */
1304 case R_PARISC_DIR17R:
47d89dba
AM
1305 case R_PARISC_DIR14F: /* Used for load/store from absolute locn. */
1306 case R_PARISC_DIR14R:
30667bf3
AM
1307 case R_PARISC_DIR21L: /* As above, and for ext branches too. */
1308#if 1
1309 /* Help debug shared library creation. Any of the above
1310 relocs can be used in shared libs, but they may cause
1311 pages to become unshared. */
1312 if (info->shared)
1313 {
1314 (*_bfd_error_handler)
1315 (_("%s: relocation %s should not be used when making a shared object; recompile with -fPIC"),
8f615d07 1316 bfd_archive_filename (abfd),
30667bf3
AM
1317 elf_hppa_howto_table[r_type].name);
1318 }
1319 /* Fall through. */
1320#endif
1321
c46b7515 1322 case R_PARISC_DIR32: /* .word relocs. */
30667bf3
AM
1323 /* We may want to output a dynamic relocation later. */
1324 need_entry = NEED_DYNREL;
1325 break;
1326
1327 /* This relocation describes the C++ object vtable hierarchy.
1328 Reconstruct it for later use during GC. */
1329 case R_PARISC_GNU_VTINHERIT:
1330 if (!_bfd_elf32_gc_record_vtinherit (abfd, sec,
1331 &h->elf, rel->r_offset))
1332 return false;
1333 continue;
1334
1335 /* This relocation describes which C++ vtable entries are actually
1336 used. Record for later use during GC. */
1337 case R_PARISC_GNU_VTENTRY:
1338 if (!_bfd_elf32_gc_record_vtentry (abfd, sec,
36605136 1339 &h->elf, rel->r_addend))
30667bf3
AM
1340 return false;
1341 continue;
1342
1343 default:
1344 continue;
1345 }
1346
1347 /* Now carry out our orders. */
1348 if (need_entry & NEED_GOT)
1349 {
1350 /* Allocate space for a GOT entry, as well as a dynamic
25f72752 1351 relocation for this entry. */
83c81bfe 1352 if (htab->sgot == NULL)
30667bf3 1353 {
3ac8354b
AM
1354 if (htab->elf.dynobj == NULL)
1355 htab->elf.dynobj = abfd;
1356 if (!elf32_hppa_create_dynamic_sections (htab->elf.dynobj, info))
30667bf3
AM
1357 return false;
1358 }
1359
1360 if (h != NULL)
1361 {
1362 if (h->elf.got.refcount == -1)
446f2863 1363 h->elf.got.refcount = 1;
30667bf3
AM
1364 else
1365 h->elf.got.refcount += 1;
1366 }
1367 else
1368 {
3ac8354b
AM
1369 bfd_signed_vma *local_got_refcounts;
1370
30667bf3 1371 /* This is a global offset table entry for a local symbol. */
3ac8354b 1372 local_got_refcounts = elf_local_got_refcounts (abfd);
30667bf3
AM
1373 if (local_got_refcounts == NULL)
1374 {
dc810e39 1375 bfd_size_type size;
30667bf3 1376
74d1c347
AM
1377 /* Allocate space for local got offsets and local
1378 plt offsets. Done this way to save polluting
1379 elf_obj_tdata with another target specific
1380 pointer. */
dc810e39
AM
1381 size = symtab_hdr->sh_info;
1382 size *= 2 * sizeof (bfd_signed_vma);
30667bf3 1383 local_got_refcounts = ((bfd_signed_vma *)
ebe50bae 1384 bfd_zalloc (abfd, size));
30667bf3
AM
1385 if (local_got_refcounts == NULL)
1386 return false;
1387 elf_local_got_refcounts (abfd) = local_got_refcounts;
30667bf3 1388 }
ebe50bae 1389 local_got_refcounts[r_symndx] += 1;
30667bf3
AM
1390 }
1391 }
1392
1393 if (need_entry & NEED_PLT)
1394 {
1395 /* If we are creating a shared library, and this is a reloc
1396 against a weak symbol or a global symbol in a dynamic
1397 object, then we will be creating an import stub and a
1398 .plt entry for the symbol. Similarly, on a normal link
1399 to symbols defined in a dynamic object we'll need the
1400 import stub and a .plt entry. We don't know yet whether
1401 the symbol is defined or not, so make an entry anyway and
1402 clean up later in adjust_dynamic_symbol. */
1403 if ((sec->flags & SEC_ALLOC) != 0)
1404 {
74d1c347 1405 if (h != NULL)
30667bf3 1406 {
74d1c347
AM
1407 if (h->elf.plt.refcount == -1)
1408 {
1409 h->elf.plt.refcount = 1;
1410 h->elf.elf_link_hash_flags |= ELF_LINK_HASH_NEEDS_PLT;
1411 }
1412 else
1413 h->elf.plt.refcount += 1;
1414
36605136
AM
1415 /* If this .plt entry is for a plabel, mark it so
1416 that adjust_dynamic_symbol will keep the entry
1417 even if it appears to be local. */
74d1c347
AM
1418 if (need_entry & PLT_PLABEL)
1419 h->plabel = 1;
1420 }
1421 else if (need_entry & PLT_PLABEL)
1422 {
3ac8354b 1423 bfd_signed_vma *local_got_refcounts;
68fb2e56 1424 bfd_signed_vma *local_plt_refcounts;
74d1c347 1425
3ac8354b 1426 local_got_refcounts = elf_local_got_refcounts (abfd);
74d1c347
AM
1427 if (local_got_refcounts == NULL)
1428 {
dc810e39 1429 bfd_size_type size;
74d1c347
AM
1430
1431 /* Allocate space for local got offsets and local
1432 plt offsets. */
dc810e39
AM
1433 size = symtab_hdr->sh_info;
1434 size *= 2 * sizeof (bfd_signed_vma);
74d1c347 1435 local_got_refcounts = ((bfd_signed_vma *)
ebe50bae 1436 bfd_zalloc (abfd, size));
74d1c347
AM
1437 if (local_got_refcounts == NULL)
1438 return false;
1439 elf_local_got_refcounts (abfd) = local_got_refcounts;
74d1c347 1440 }
68fb2e56
AM
1441 local_plt_refcounts = (local_got_refcounts
1442 + symtab_hdr->sh_info);
ebe50bae 1443 local_plt_refcounts[r_symndx] += 1;
30667bf3 1444 }
30667bf3
AM
1445 }
1446 }
1447
98ceb8ce 1448 if (need_entry & NEED_DYNREL)
30667bf3
AM
1449 {
1450 /* Flag this symbol as having a non-got, non-plt reference
1451 so that we generate copy relocs if it turns out to be
1452 dynamic. */
ebe50bae 1453 if (h != NULL && !info->shared)
30667bf3
AM
1454 h->elf.elf_link_hash_flags |= ELF_LINK_NON_GOT_REF;
1455
1456 /* If we are creating a shared library then we need to copy
1457 the reloc into the shared library. However, if we are
1458 linking with -Bsymbolic, we need only copy absolute
1459 relocs or relocs against symbols that are not defined in
1460 an object we are including in the link. PC- or DP- or
1461 DLT-relative relocs against any local sym or global sym
1462 with DEF_REGULAR set, can be discarded. At this point we
1463 have not seen all the input files, so it is possible that
1464 DEF_REGULAR is not set now but will be set later (it is
1465 never cleared). We account for that possibility below by
98ceb8ce 1466 storing information in the dyn_relocs field of the
30667bf3
AM
1467 hash table entry.
1468
1469 A similar situation to the -Bsymbolic case occurs when
1470 creating shared libraries and symbol visibility changes
1471 render the symbol local.
1472
1473 As it turns out, all the relocs we will be creating here
1474 are absolute, so we cannot remove them on -Bsymbolic
1475 links or visibility changes anyway. A STUB_REL reloc
1476 is absolute too, as in that case it is the reloc in the
1477 stub we will be creating, rather than copying the PCREL
56882138
AM
1478 reloc in the branch.
1479
1480 If on the other hand, we are creating an executable, we
1481 may need to keep relocations for symbols satisfied by a
1482 dynamic library if we manage to avoid copy relocs for the
1483 symbol. */
446f2863
AM
1484 if ((info->shared
1485 && (sec->flags & SEC_ALLOC) != 0
1486 && (IS_ABSOLUTE_RELOC (r_type)
1487 || (h != NULL
1488 && (!info->symbolic
1489 || h->elf.root.type == bfd_link_hash_defweak
1490 || (h->elf.elf_link_hash_flags
1491 & ELF_LINK_HASH_DEF_REGULAR) == 0))))
1492 || (!info->shared
1493 && (sec->flags & SEC_ALLOC) != 0
1494 && h != NULL
446f2863
AM
1495 && (h->elf.root.type == bfd_link_hash_defweak
1496 || (h->elf.elf_link_hash_flags
1497 & ELF_LINK_HASH_DEF_REGULAR) == 0)))
30667bf3 1498 {
30667bf3
AM
1499 /* Create a reloc section in dynobj and make room for
1500 this reloc. */
98ceb8ce 1501 if (sreloc == NULL)
30667bf3
AM
1502 {
1503 char *name;
3ac8354b 1504 bfd *dynobj;
30667bf3 1505
98ceb8ce
AM
1506 name = (bfd_elf_string_from_elf_section
1507 (abfd,
1508 elf_elfheader (abfd)->e_shstrndx,
1509 elf_section_data (sec)->rel_hdr.sh_name));
30667bf3
AM
1510 if (name == NULL)
1511 {
1512 (*_bfd_error_handler)
1513 (_("Could not find relocation section for %s"),
1514 sec->name);
1515 bfd_set_error (bfd_error_bad_value);
1516 return false;
1517 }
1518
3ac8354b
AM
1519 if (htab->elf.dynobj == NULL)
1520 htab->elf.dynobj = abfd;
1521
1522 dynobj = htab->elf.dynobj;
98ceb8ce
AM
1523 sreloc = bfd_get_section_by_name (dynobj, name);
1524 if (sreloc == NULL)
30667bf3
AM
1525 {
1526 flagword flags;
1527
98ceb8ce 1528 sreloc = bfd_make_section (dynobj, name);
30667bf3
AM
1529 flags = (SEC_HAS_CONTENTS | SEC_READONLY
1530 | SEC_IN_MEMORY | SEC_LINKER_CREATED);
1531 if ((sec->flags & SEC_ALLOC) != 0)
1532 flags |= SEC_ALLOC | SEC_LOAD;
98ceb8ce
AM
1533 if (sreloc == NULL
1534 || !bfd_set_section_flags (dynobj, sreloc, flags)
1535 || !bfd_set_section_alignment (dynobj, sreloc, 2))
30667bf3
AM
1536 return false;
1537 }
30667bf3 1538
98ceb8ce 1539 elf_section_data (sec)->sreloc = sreloc;
30667bf3
AM
1540 }
1541
98ceb8ce
AM
1542 /* If this is a global symbol, we count the number of
1543 relocations we need for this symbol. */
1544 if (h != NULL)
30667bf3 1545 {
98ceb8ce 1546 struct elf32_hppa_dyn_reloc_entry *p;
30667bf3 1547
98ceb8ce
AM
1548 p = h->dyn_relocs;
1549 if (p == NULL || p->sec != sec)
30667bf3 1550 {
98ceb8ce 1551 p = ((struct elf32_hppa_dyn_reloc_entry *)
3ac8354b
AM
1552 bfd_alloc (htab->elf.dynobj,
1553 (bfd_size_type) sizeof *p));
30667bf3 1554 if (p == NULL)
98ceb8ce
AM
1555 return false;
1556 p->next = h->dyn_relocs;
1557 h->dyn_relocs = p;
1558 p->sec = sec;
1559 p->count = 0;
1560#if RELATIVE_DYNRELOCS
1561 p->relative_count = 0;
1562#endif
30667bf3 1563 }
98ceb8ce
AM
1564
1565 p->count += 1;
1566#if RELATIVE_DYNRELOCS
1567 if (!IS_ABSOLUTE_RELOC (rtype))
1568 p->relative_count += 1;
1569#endif
1570 }
1571 else
1572 {
1573 /* Track dynamic relocs needed for local syms too. */
1574 elf_section_data (sec)->local_dynrel += 1;
30667bf3
AM
1575 }
1576 }
1577 }
1578 }
edd21aca
AM
1579
1580 return true;
1581}
1582
30667bf3
AM
1583/* Return the section that should be marked against garbage collection
1584 for a given relocation. */
1585
1586static asection *
1587elf32_hppa_gc_mark_hook (abfd, info, rel, h, sym)
1588 bfd *abfd;
1589 struct bfd_link_info *info ATTRIBUTE_UNUSED;
1590 Elf_Internal_Rela *rel;
1591 struct elf_link_hash_entry *h;
1592 Elf_Internal_Sym *sym;
1593{
1594 if (h != NULL)
1595 {
1596 switch ((unsigned int) ELF32_R_TYPE (rel->r_info))
1597 {
1598 case R_PARISC_GNU_VTINHERIT:
1599 case R_PARISC_GNU_VTENTRY:
1600 break;
1601
1602 default:
1603 switch (h->root.type)
1604 {
1605 case bfd_link_hash_defined:
1606 case bfd_link_hash_defweak:
1607 return h->root.u.def.section;
1608
1609 case bfd_link_hash_common:
1610 return h->root.u.c.p->section;
1611
1612 default:
1613 break;
1614 }
1615 }
1616 }
1617 else
1618 {
1619 if (!(elf_bad_symtab (abfd)
1620 && ELF_ST_BIND (sym->st_info) != STB_LOCAL)
1621 && ! ((sym->st_shndx <= 0 || sym->st_shndx >= SHN_LORESERVE)
1622 && sym->st_shndx != SHN_COMMON))
1623 {
1624 return bfd_section_from_elf_index (abfd, sym->st_shndx);
1625 }
1626 }
1627
1628 return NULL;
1629}
1630
30667bf3
AM
1631/* Update the got and plt entry reference counts for the section being
1632 removed. */
edd21aca
AM
1633
1634static boolean
30667bf3
AM
1635elf32_hppa_gc_sweep_hook (abfd, info, sec, relocs)
1636 bfd *abfd;
1637 struct bfd_link_info *info ATTRIBUTE_UNUSED;
1638 asection *sec;
1639 const Elf_Internal_Rela *relocs;
edd21aca 1640{
30667bf3
AM
1641 Elf_Internal_Shdr *symtab_hdr;
1642 struct elf_link_hash_entry **sym_hashes;
1643 bfd_signed_vma *local_got_refcounts;
74d1c347 1644 bfd_signed_vma *local_plt_refcounts;
30667bf3
AM
1645 const Elf_Internal_Rela *rel, *relend;
1646 unsigned long r_symndx;
1647 struct elf_link_hash_entry *h;
83c81bfe 1648 struct elf32_hppa_link_hash_table *htab;
30667bf3 1649 bfd *dynobj;
30667bf3 1650
98ceb8ce
AM
1651 elf_section_data (sec)->local_dynrel = 0;
1652
30667bf3
AM
1653 symtab_hdr = &elf_tdata (abfd)->symtab_hdr;
1654 sym_hashes = elf_sym_hashes (abfd);
1655 local_got_refcounts = elf_local_got_refcounts (abfd);
74d1c347
AM
1656 local_plt_refcounts = local_got_refcounts;
1657 if (local_plt_refcounts != NULL)
1658 local_plt_refcounts += symtab_hdr->sh_info;
83c81bfe 1659 htab = hppa_link_hash_table (info);
ebe50bae 1660 dynobj = htab->elf.dynobj;
30667bf3
AM
1661 if (dynobj == NULL)
1662 return true;
1663
30667bf3
AM
1664 relend = relocs + sec->reloc_count;
1665 for (rel = relocs; rel < relend; rel++)
1666 switch ((unsigned int) ELF32_R_TYPE (rel->r_info))
1667 {
1668 case R_PARISC_DLTIND14F:
1669 case R_PARISC_DLTIND14R:
1670 case R_PARISC_DLTIND21L:
1671 r_symndx = ELF32_R_SYM (rel->r_info);
1672 if (r_symndx >= symtab_hdr->sh_info)
1673 {
1674 h = sym_hashes[r_symndx - symtab_hdr->sh_info];
1675 if (h->got.refcount > 0)
4dc86686 1676 h->got.refcount -= 1;
30667bf3
AM
1677 }
1678 else if (local_got_refcounts != NULL)
1679 {
1680 if (local_got_refcounts[r_symndx] > 0)
4dc86686 1681 local_got_refcounts[r_symndx] -= 1;
30667bf3
AM
1682 }
1683 break;
edd21aca 1684
30667bf3
AM
1685 case R_PARISC_PCREL12F:
1686 case R_PARISC_PCREL17C:
1687 case R_PARISC_PCREL17F:
1688 case R_PARISC_PCREL22F:
1689 r_symndx = ELF32_R_SYM (rel->r_info);
1690 if (r_symndx >= symtab_hdr->sh_info)
1691 {
1692 h = sym_hashes[r_symndx - symtab_hdr->sh_info];
1693 if (h->plt.refcount > 0)
1694 h->plt.refcount -= 1;
1695 }
1696 break;
edd21aca 1697
74d1c347
AM
1698 case R_PARISC_PLABEL14R:
1699 case R_PARISC_PLABEL21L:
1700 case R_PARISC_PLABEL32:
1701 r_symndx = ELF32_R_SYM (rel->r_info);
1702 if (r_symndx >= symtab_hdr->sh_info)
1703 {
98ceb8ce
AM
1704 struct elf32_hppa_link_hash_entry *eh;
1705 struct elf32_hppa_dyn_reloc_entry **pp;
1706 struct elf32_hppa_dyn_reloc_entry *p;
1707
74d1c347 1708 h = sym_hashes[r_symndx - symtab_hdr->sh_info];
98ceb8ce 1709
74d1c347
AM
1710 if (h->plt.refcount > 0)
1711 h->plt.refcount -= 1;
98ceb8ce
AM
1712
1713 eh = (struct elf32_hppa_link_hash_entry *) h;
1714
1715 for (pp = &eh->dyn_relocs; (p = *pp) != NULL; pp = &p->next)
1716 if (p->sec == sec)
1717 {
1718#if RELATIVE_DYNRELOCS
1719 if (!IS_ABSOLUTE_RELOC (rtype))
1720 p->relative_count -= 1;
1721#endif
1722 p->count -= 1;
1723 if (p->count == 0)
1724 *pp = p->next;
1725 break;
1726 }
74d1c347
AM
1727 }
1728 else if (local_plt_refcounts != NULL)
1729 {
1730 if (local_plt_refcounts[r_symndx] > 0)
1731 local_plt_refcounts[r_symndx] -= 1;
1732 }
1733 break;
1734
98ceb8ce
AM
1735 case R_PARISC_DIR32:
1736 r_symndx = ELF32_R_SYM (rel->r_info);
1737 if (r_symndx >= symtab_hdr->sh_info)
1738 {
1739 struct elf32_hppa_link_hash_entry *eh;
1740 struct elf32_hppa_dyn_reloc_entry **pp;
1741 struct elf32_hppa_dyn_reloc_entry *p;
1742
1743 h = sym_hashes[r_symndx - symtab_hdr->sh_info];
1744
1745 eh = (struct elf32_hppa_link_hash_entry *) h;
1746
1747 for (pp = &eh->dyn_relocs; (p = *pp) != NULL; pp = &p->next)
1748 if (p->sec == sec)
1749 {
1750#if RELATIVE_DYNRELOCS
1751 if (!IS_ABSOLUTE_RELOC (R_PARISC_DIR32))
1752 p->relative_count -= 1;
1753#endif
1754 p->count -= 1;
1755 if (p->count == 0)
1756 *pp = p->next;
1757 break;
1758 }
1759 }
1760 break;
1761
30667bf3
AM
1762 default:
1763 break;
1764 }
252b5132 1765
252b5132
RH
1766 return true;
1767}
1768
74d1c347
AM
1769/* Our own version of hide_symbol, so that we can keep plt entries for
1770 plabels. */
1771
1772static void
1773elf32_hppa_hide_symbol (info, h)
1774 struct bfd_link_info *info ATTRIBUTE_UNUSED;
1775 struct elf_link_hash_entry *h;
1776{
5fba655a
L
1777 if ((h->elf_link_hash_flags & ELF_LINK_FORCED_LOCAL) != 0)
1778 h->dynindx = -1;
74d1c347
AM
1779 if (! ((struct elf32_hppa_link_hash_entry *) h)->plabel)
1780 {
1781 h->elf_link_hash_flags &= ~ELF_LINK_HASH_NEEDS_PLT;
1782 h->plt.offset = (bfd_vma) -1;
1783 }
1784}
1785
4dc86686
AM
1786/* This is the condition under which elf32_hppa_finish_dynamic_symbol
1787 will be called from elflink.h. If elflink.h doesn't call our
1788 finish_dynamic_symbol routine, we'll need to do something about
1789 initializing any .plt and .got entries in elf32_hppa_relocate_section. */
1790#define WILL_CALL_FINISH_DYNAMIC_SYMBOL(DYN, INFO, H) \
1791 ((DYN) \
1792 && ((INFO)->shared \
1793 || ((H)->elf_link_hash_flags & ELF_LINK_FORCED_LOCAL) == 0) \
1794 && ((H)->dynindx != -1 \
1795 || ((H)->elf_link_hash_flags & ELF_LINK_FORCED_LOCAL) != 0))
1796
30667bf3
AM
1797/* Adjust a symbol defined by a dynamic object and referenced by a
1798 regular object. The current definition is in some section of the
1799 dynamic object, but we're not including those sections. We have to
1800 change the definition to something the rest of the link can
1801 understand. */
252b5132 1802
30667bf3
AM
1803static boolean
1804elf32_hppa_adjust_dynamic_symbol (info, h)
1805 struct bfd_link_info *info;
1806 struct elf_link_hash_entry *h;
252b5132 1807{
83c81bfe 1808 struct elf32_hppa_link_hash_table *htab;
ebe50bae
AM
1809 struct elf32_hppa_link_hash_entry *eh;
1810 struct elf32_hppa_dyn_reloc_entry *p;
30667bf3 1811 asection *s;
3ac8354b 1812 unsigned int power_of_two;
30667bf3
AM
1813
1814 /* If this is a function, put it in the procedure linkage table. We
1815 will fill in the contents of the procedure linkage table later,
1816 when we know the address of the .got section. */
1817 if (h->type == STT_FUNC
1818 || (h->elf_link_hash_flags & ELF_LINK_HASH_NEEDS_PLT) != 0)
1819 {
12cca0d2
AM
1820 if (!info->shared
1821 && h->plt.refcount > 0
1822 && (h->elf_link_hash_flags & ELF_LINK_HASH_DEF_REGULAR) != 0
1823 && (h->root.u.def.section->flags & SEC_HAS_GOT_REF) != 0)
1824 {
1825 ((struct elf32_hppa_link_hash_entry *) h)->maybe_pic_call = 1;
1826 }
1827
30667bf3
AM
1828 if (h->plt.refcount <= 0
1829 || ((h->elf_link_hash_flags & ELF_LINK_HASH_DEF_REGULAR) != 0
1830 && h->root.type != bfd_link_hash_defweak
74d1c347 1831 && ! ((struct elf32_hppa_link_hash_entry *) h)->plabel
30667bf3
AM
1832 && (!info->shared || info->symbolic)))
1833 {
1834 /* The .plt entry is not needed when:
1835 a) Garbage collection has removed all references to the
1836 symbol, or
1837 b) We know for certain the symbol is defined in this
74d1c347
AM
1838 object, and it's not a weak definition, nor is the symbol
1839 used by a plabel relocation. Either this object is the
1840 application or we are doing a shared symbolic link. */
1841
1842 /* As a special sop to the hppa ABI, we keep a .plt entry
1843 for functions in sections containing PIC code. */
12cca0d2
AM
1844 if (((struct elf32_hppa_link_hash_entry *) h)->maybe_pic_call)
1845 ((struct elf32_hppa_link_hash_entry *) h)->pic_call = 1;
30667bf3
AM
1846 else
1847 {
1848 h->plt.offset = (bfd_vma) -1;
1849 h->elf_link_hash_flags &= ~ELF_LINK_HASH_NEEDS_PLT;
30667bf3 1850 }
30667bf3 1851 }
4dc86686 1852
30667bf3
AM
1853 return true;
1854 }
edd21aca 1855
30667bf3
AM
1856 /* If this is a weak symbol, and there is a real definition, the
1857 processor independent code will have arranged for us to see the
1858 real definition first, and we can just use the same value. */
1859 if (h->weakdef != NULL)
edd21aca 1860 {
49e9d0d3
AM
1861 if (h->weakdef->root.type != bfd_link_hash_defined
1862 && h->weakdef->root.type != bfd_link_hash_defweak)
1863 abort ();
30667bf3
AM
1864 h->root.u.def.section = h->weakdef->root.u.def.section;
1865 h->root.u.def.value = h->weakdef->root.u.def.value;
30667bf3 1866 }
edd21aca 1867
30667bf3
AM
1868 /* This is a reference to a symbol defined by a dynamic object which
1869 is not a function. */
1870
1871 /* If we are creating a shared library, we must presume that the
1872 only references to the symbol are via the global offset table.
1873 For such cases we need not do anything here; the relocations will
1874 be handled correctly by relocate_section. */
1875 if (info->shared)
1876 return true;
1877
1878 /* If there are no references to this symbol that do not use the
1879 GOT, we don't need to generate a copy reloc. */
1880 if ((h->elf_link_hash_flags & ELF_LINK_NON_GOT_REF) == 0)
1881 return true;
1882
ebe50bae
AM
1883 eh = (struct elf32_hppa_link_hash_entry *) h;
1884 for (p = eh->dyn_relocs; p != NULL; p = p->next)
1885 {
1886 s = p->sec->output_section;
1887 if (s != NULL && (s->flags & SEC_READONLY) != 0)
1888 break;
1889 }
1890
1891 /* If we didn't find any dynamic relocs in read-only sections, then
1892 we'll be keeping the dynamic relocs and avoiding the copy reloc. */
1893 if (p == NULL)
1894 {
1895 h->elf_link_hash_flags &= ~ELF_LINK_NON_GOT_REF;
1896 return true;
1897 }
1898
30667bf3
AM
1899 /* We must allocate the symbol in our .dynbss section, which will
1900 become part of the .bss section of the executable. There will be
1901 an entry for this symbol in the .dynsym section. The dynamic
1902 object will contain position independent code, so all references
1903 from the dynamic object to this symbol will go through the global
1904 offset table. The dynamic linker will use the .dynsym entry to
1905 determine the address it must put in the global offset table, so
1906 both the dynamic object and the regular object will refer to the
1907 same memory location for the variable. */
1908
3ac8354b 1909 htab = hppa_link_hash_table (info);
30667bf3
AM
1910
1911 /* We must generate a COPY reloc to tell the dynamic linker to
1912 copy the initial value out of the dynamic object and into the
3ac8354b 1913 runtime process image. */
30667bf3
AM
1914 if ((h->root.u.def.section->flags & SEC_ALLOC) != 0)
1915 {
3ac8354b 1916 htab->srelbss->_raw_size += sizeof (Elf32_External_Rela);
30667bf3 1917 h->elf_link_hash_flags |= ELF_LINK_HASH_NEEDS_COPY;
edd21aca 1918 }
252b5132 1919
3ac8354b
AM
1920 /* We need to figure out the alignment required for this symbol. I
1921 have no idea how other ELF linkers handle this. */
30667bf3 1922
3ac8354b
AM
1923 power_of_two = bfd_log2 (h->size);
1924 if (power_of_two > 3)
1925 power_of_two = 3;
1926
1927 /* Apply the required alignment. */
1928 s = htab->sdynbss;
1929 s->_raw_size = BFD_ALIGN (s->_raw_size,
1930 (bfd_size_type) (1 << power_of_two));
1931 if (power_of_two > bfd_get_section_alignment (htab->elf.dynobj, s))
1932 {
1933 if (! bfd_set_section_alignment (htab->elf.dynobj, s, power_of_two))
1934 return false;
1935 }
30667bf3 1936
30667bf3
AM
1937 /* Define the symbol as being at this point in the section. */
1938 h->root.u.def.section = s;
1939 h->root.u.def.value = s->_raw_size;
edd21aca 1940
30667bf3
AM
1941 /* Increment the section size to make room for the symbol. */
1942 s->_raw_size += h->size;
252b5132
RH
1943
1944 return true;
1945}
1946
30667bf3
AM
1947/* Called via elf_link_hash_traverse to create .plt entries for an
1948 application that uses statically linked PIC functions. Similar to
1949 the first part of elf32_hppa_adjust_dynamic_symbol. */
252b5132 1950
30667bf3
AM
1951static boolean
1952hppa_handle_PIC_calls (h, inf)
1953 struct elf_link_hash_entry *h;
4dc86686 1954 PTR inf ATTRIBUTE_UNUSED;
252b5132 1955{
30667bf3
AM
1956 if (! (h->plt.refcount > 0
1957 && (h->root.type == bfd_link_hash_defined
1958 || h->root.type == bfd_link_hash_defweak)
1959 && (h->root.u.def.section->flags & SEC_HAS_GOT_REF) != 0))
252b5132 1960 {
30667bf3
AM
1961 h->plt.offset = (bfd_vma) -1;
1962 h->elf_link_hash_flags &= ~ELF_LINK_HASH_NEEDS_PLT;
1963 return true;
252b5132
RH
1964 }
1965
74d1c347 1966 h->elf_link_hash_flags |= ELF_LINK_HASH_NEEDS_PLT;
12cca0d2 1967 ((struct elf32_hppa_link_hash_entry *) h)->maybe_pic_call = 1;
30667bf3 1968 ((struct elf32_hppa_link_hash_entry *) h)->pic_call = 1;
edd21aca 1969
4dc86686
AM
1970 return true;
1971}
1972
1973/* Allocate space in .plt, .got and associated reloc sections for
1974 global syms. */
1975
1976static boolean
98ceb8ce 1977allocate_dynrelocs (h, inf)
4dc86686
AM
1978 struct elf_link_hash_entry *h;
1979 PTR inf;
1980{
1981 struct bfd_link_info *info;
83c81bfe 1982 struct elf32_hppa_link_hash_table *htab;
4dc86686 1983 asection *s;
446f2863 1984 struct elf32_hppa_link_hash_entry *eh;
98ceb8ce 1985 struct elf32_hppa_dyn_reloc_entry *p;
4dc86686 1986
73a74a62
AM
1987 if (h->root.type == bfd_link_hash_indirect
1988 || h->root.type == bfd_link_hash_warning)
1989 return true;
1990
30667bf3 1991 info = (struct bfd_link_info *) inf;
83c81bfe 1992 htab = hppa_link_hash_table (info);
ebe50bae 1993 if ((htab->elf.dynamic_sections_created
4dc86686
AM
1994 && h->plt.refcount > 0)
1995 || ((struct elf32_hppa_link_hash_entry *) h)->pic_call)
1996 {
446f2863
AM
1997 /* Make sure this symbol is output as a dynamic symbol.
1998 Undefined weak syms won't yet be marked as dynamic. */
1999 if (h->dynindx == -1
2000 && (h->elf_link_hash_flags & ELF_LINK_FORCED_LOCAL) == 0
2001 && h->type != STT_PARISC_MILLI
2002 && !((struct elf32_hppa_link_hash_entry *) h)->pic_call)
2003 {
2004 if (! bfd_elf32_link_record_dynamic_symbol (info, h))
2005 return false;
2006 }
2007
3ac8354b
AM
2008 if (((struct elf32_hppa_link_hash_entry *) h)->pic_call
2009 || WILL_CALL_FINISH_DYNAMIC_SYMBOL (1, info, h))
4dc86686 2010 {
3ac8354b
AM
2011 /* Make an entry in the .plt section. */
2012 s = htab->splt;
2013 h->plt.offset = s->_raw_size;
2014 if (PLABEL_PLT_ENTRY_SIZE != PLT_ENTRY_SIZE
2015 && ((struct elf32_hppa_link_hash_entry *) h)->plabel
2016 && (h->elf_link_hash_flags & ELF_LINK_FORCED_LOCAL) == 0)
2017 {
2018 /* Add some extra space for the dynamic linker to use. */
2019 s->_raw_size += PLABEL_PLT_ENTRY_SIZE;
2020 }
2021 else
2022 s->_raw_size += PLT_ENTRY_SIZE;
2023
2024 if (! ((struct elf32_hppa_link_hash_entry *) h)->pic_call)
2025 {
2026 /* We also need to make an entry in the .rela.plt section. */
2027 htab->srelplt->_raw_size += sizeof (Elf32_External_Rela);
2028 htab->need_plt_stub = 1;
2029 }
4dc86686
AM
2030 }
2031 else
4dc86686 2032 {
3ac8354b
AM
2033 h->plt.offset = (bfd_vma) -1;
2034 h->elf_link_hash_flags &= ~ELF_LINK_HASH_NEEDS_PLT;
4dc86686
AM
2035 }
2036 }
2037 else
2038 {
2039 h->plt.offset = (bfd_vma) -1;
2040 h->elf_link_hash_flags &= ~ELF_LINK_HASH_NEEDS_PLT;
2041 }
edd21aca 2042
4dc86686
AM
2043 if (h->got.refcount > 0)
2044 {
2045 boolean dyn;
2046
446f2863
AM
2047 /* Make sure this symbol is output as a dynamic symbol.
2048 Undefined weak syms won't yet be marked as dynamic. */
2049 if (h->dynindx == -1
2050 && (h->elf_link_hash_flags & ELF_LINK_FORCED_LOCAL) == 0
2051 && h->type != STT_PARISC_MILLI)
2052 {
2053 if (! bfd_elf32_link_record_dynamic_symbol (info, h))
2054 return false;
2055 }
2056
83c81bfe 2057 s = htab->sgot;
4dc86686
AM
2058 h->got.offset = s->_raw_size;
2059 s->_raw_size += GOT_ENTRY_SIZE;
ebe50bae 2060 dyn = htab->elf.dynamic_sections_created;
4dc86686 2061 if (WILL_CALL_FINISH_DYNAMIC_SYMBOL (dyn, info, h))
83c81bfe 2062 htab->srelgot->_raw_size += sizeof (Elf32_External_Rela);
4dc86686
AM
2063 }
2064 else
2065 h->got.offset = (bfd_vma) -1;
30667bf3 2066
446f2863 2067 eh = (struct elf32_hppa_link_hash_entry *) h;
98ceb8ce 2068 if (eh->dyn_relocs == NULL)
446f2863 2069 return true;
30667bf3 2070
98ceb8ce
AM
2071 /* If this is a -Bsymbolic shared link, then we need to discard all
2072 space allocated for dynamic pc-relative relocs against symbols
2073 defined in a regular object. For the normal shared case, discard
2074 space for relocs that have become local due to symbol visibility
2075 changes. */
2076 if (info->shared)
446f2863 2077 {
98ceb8ce
AM
2078#if RELATIVE_DYNRELOCS
2079 if ((h->elf_link_hash_flags & ELF_LINK_HASH_DEF_REGULAR) != 0
2080 && ((h->elf_link_hash_flags & ELF_LINK_FORCED_LOCAL) != 0
2081 || info->symbolic))
446f2863 2082 {
98ceb8ce 2083 struct elf32_hppa_dyn_reloc_entry **pp;
30667bf3 2084
98ceb8ce
AM
2085 for (pp = &eh->dyn_relocs; (p = *pp) != NULL; )
2086 {
2087 p->count -= p->relative_count;
2088 p->relative_count = 0;
2089 if (p->count == 0)
2090 *pp = p->next;
2091 else
2092 pp = &p->next;
2093 }
2094 }
2095#endif
446f2863 2096 }
98ceb8ce 2097 else
30667bf3 2098 {
98ceb8ce
AM
2099 /* For the non-shared case, discard space for relocs against
2100 symbols which turn out to need copy relocs or are not
2101 dynamic. */
2102 if ((h->elf_link_hash_flags & ELF_LINK_NON_GOT_REF) == 0
2103 && (((h->elf_link_hash_flags & ELF_LINK_HASH_DEF_DYNAMIC) != 0
2104 && (h->elf_link_hash_flags & ELF_LINK_HASH_DEF_REGULAR) == 0)
ebe50bae 2105 || (htab->elf.dynamic_sections_created
98ceb8ce
AM
2106 && (h->root.type == bfd_link_hash_undefweak
2107 || h->root.type == bfd_link_hash_undefined))))
2108 {
2109 /* Make sure this symbol is output as a dynamic symbol.
2110 Undefined weak syms won't yet be marked as dynamic. */
2111 if (h->dynindx == -1
2112 && (h->elf_link_hash_flags & ELF_LINK_FORCED_LOCAL) == 0
2113 && h->type != STT_PARISC_MILLI)
2114 {
2115 if (! bfd_elf32_link_record_dynamic_symbol (info, h))
2116 return false;
2117 }
2118
2119 /* If that succeeded, we know we'll be keeping all the
2120 relocs. */
2121 if (h->dynindx != -1)
2122 goto keep;
2123 }
446f2863 2124
98ceb8ce
AM
2125 eh->dyn_relocs = NULL;
2126 return true;
2127
2128 keep:
30667bf3 2129 }
30667bf3 2130
98ceb8ce
AM
2131 /* Finally, allocate space. */
2132 for (p = eh->dyn_relocs; p != NULL; p = p->next)
30667bf3 2133 {
98ceb8ce
AM
2134 asection *sreloc = elf_section_data (p->sec)->sreloc;
2135 sreloc->_raw_size += p->count * sizeof (Elf32_External_Rela);
30667bf3 2136 }
30667bf3
AM
2137
2138 return true;
2139}
30667bf3 2140
d5c73c2f
AM
2141/* This function is called via elf_link_hash_traverse to force
2142 millicode symbols local so they do not end up as globals in the
2143 dynamic symbol table. We ought to be able to do this in
2144 adjust_dynamic_symbol, but our adjust_dynamic_symbol is not called
2145 for all dynamic symbols. Arguably, this is a bug in
2146 elf_adjust_dynamic_symbol. */
2147
2148static boolean
2149clobber_millicode_symbols (h, info)
2150 struct elf_link_hash_entry *h;
2151 struct bfd_link_info *info;
2152{
8dea1268
AM
2153 /* We only want to remove these from the dynamic symbol table.
2154 Therefore we do not leave ELF_LINK_FORCED_LOCAL set. */
d5c73c2f 2155 if (h->type == STT_PARISC_MILLI)
e0522e89
AM
2156 {
2157 unsigned short oldflags = h->elf_link_hash_flags;
2158 h->elf_link_hash_flags |= ELF_LINK_FORCED_LOCAL;
2159 elf32_hppa_hide_symbol (info, h);
2160 h->elf_link_hash_flags &= ~ELF_LINK_FORCED_LOCAL;
2161 h->elf_link_hash_flags |= oldflags & ELF_LINK_FORCED_LOCAL;
2162 }
d5c73c2f
AM
2163 return true;
2164}
2165
98ceb8ce
AM
2166/* Find any dynamic relocs that apply to read-only sections. */
2167
2168static boolean
2169readonly_dynrelocs (h, inf)
2170 struct elf_link_hash_entry *h;
2171 PTR inf;
2172{
2173 struct elf32_hppa_link_hash_entry *eh;
2174 struct elf32_hppa_dyn_reloc_entry *p;
2175
2176 eh = (struct elf32_hppa_link_hash_entry *) h;
2177 for (p = eh->dyn_relocs; p != NULL; p = p->next)
2178 {
2179 asection *s = p->sec->output_section;
2180
2181 if (s != NULL && (s->flags & SEC_READONLY) != 0)
2182 {
2183 struct bfd_link_info *info = (struct bfd_link_info *) inf;
2184
2185 info->flags |= DF_TEXTREL;
2186
2187 /* Not an error, just cut short the traversal. */
2188 return false;
2189 }
2190 }
2191 return true;
2192}
2193
30667bf3
AM
2194/* Set the sizes of the dynamic sections. */
2195
2196static boolean
2197elf32_hppa_size_dynamic_sections (output_bfd, info)
98ceb8ce 2198 bfd *output_bfd ATTRIBUTE_UNUSED;
30667bf3
AM
2199 struct bfd_link_info *info;
2200{
83c81bfe 2201 struct elf32_hppa_link_hash_table *htab;
30667bf3 2202 bfd *dynobj;
98ceb8ce 2203 bfd *ibfd;
30667bf3
AM
2204 asection *s;
2205 boolean relocs;
30667bf3 2206
83c81bfe 2207 htab = hppa_link_hash_table (info);
ebe50bae 2208 dynobj = htab->elf.dynobj;
49e9d0d3
AM
2209 if (dynobj == NULL)
2210 abort ();
30667bf3 2211
ebe50bae 2212 if (htab->elf.dynamic_sections_created)
30667bf3
AM
2213 {
2214 /* Set the contents of the .interp section to the interpreter. */
2215 if (! info->shared)
2216 {
2217 s = bfd_get_section_by_name (dynobj, ".interp");
49e9d0d3
AM
2218 if (s == NULL)
2219 abort ();
30667bf3
AM
2220 s->_raw_size = sizeof ELF_DYNAMIC_INTERPRETER;
2221 s->contents = (unsigned char *) ELF_DYNAMIC_INTERPRETER;
2222 }
74d1c347 2223
d5c73c2f 2224 /* Force millicode symbols local. */
ebe50bae 2225 elf_link_hash_traverse (&htab->elf,
d5c73c2f
AM
2226 clobber_millicode_symbols,
2227 info);
68fb2e56
AM
2228 }
2229 else
2230 {
2231 /* Run through the function symbols, looking for any that are
2232 PIC, and allocate space for the necessary .plt entries so
2233 that %r19 will be set up. */
2234 if (! info->shared)
ebe50bae 2235 elf_link_hash_traverse (&htab->elf,
68fb2e56
AM
2236 hppa_handle_PIC_calls,
2237 info);
2238 }
d5c73c2f 2239
98ceb8ce
AM
2240 /* Set up .got and .plt offsets for local syms, and space for local
2241 dynamic relocs. */
2242 for (ibfd = info->input_bfds; ibfd != NULL; ibfd = ibfd->link_next)
68fb2e56
AM
2243 {
2244 bfd_signed_vma *local_got;
2245 bfd_signed_vma *end_local_got;
2246 bfd_signed_vma *local_plt;
2247 bfd_signed_vma *end_local_plt;
2248 bfd_size_type locsymcount;
2249 Elf_Internal_Shdr *symtab_hdr;
2250 asection *srel;
74d1c347 2251
98ceb8ce 2252 if (bfd_get_flavour (ibfd) != bfd_target_elf_flavour)
68fb2e56 2253 continue;
4dc86686 2254
98ceb8ce
AM
2255 for (s = ibfd->sections; s != NULL; s = s->next)
2256 {
2257 bfd_size_type count = elf_section_data (s)->local_dynrel;
2258
2259 if (count != 0)
2260 {
2261 srel = elf_section_data (s)->sreloc;
2262 srel->_raw_size += count * sizeof (Elf32_External_Rela);
2263 }
2264 }
2265
2266 local_got = elf_local_got_refcounts (ibfd);
68fb2e56
AM
2267 if (!local_got)
2268 continue;
74d1c347 2269
98ceb8ce 2270 symtab_hdr = &elf_tdata (ibfd)->symtab_hdr;
68fb2e56
AM
2271 locsymcount = symtab_hdr->sh_info;
2272 end_local_got = local_got + locsymcount;
83c81bfe
AM
2273 s = htab->sgot;
2274 srel = htab->srelgot;
68fb2e56
AM
2275 for (; local_got < end_local_got; ++local_got)
2276 {
2277 if (*local_got > 0)
4dc86686 2278 {
68fb2e56
AM
2279 *local_got = s->_raw_size;
2280 s->_raw_size += GOT_ENTRY_SIZE;
2281 if (info->shared)
2282 srel->_raw_size += sizeof (Elf32_External_Rela);
4dc86686 2283 }
68fb2e56
AM
2284 else
2285 *local_got = (bfd_vma) -1;
2286 }
74d1c347 2287
68fb2e56
AM
2288 local_plt = end_local_got;
2289 end_local_plt = local_plt + locsymcount;
ebe50bae 2290 if (! htab->elf.dynamic_sections_created)
68fb2e56
AM
2291 {
2292 /* Won't be used, but be safe. */
2293 for (; local_plt < end_local_plt; ++local_plt)
2294 *local_plt = (bfd_vma) -1;
2295 }
2296 else
2297 {
83c81bfe
AM
2298 s = htab->splt;
2299 srel = htab->srelplt;
74d1c347
AM
2300 for (; local_plt < end_local_plt; ++local_plt)
2301 {
2302 if (*local_plt > 0)
2303 {
74d1c347
AM
2304 *local_plt = s->_raw_size;
2305 s->_raw_size += PLT_ENTRY_SIZE;
2306 if (info->shared)
4dc86686 2307 srel->_raw_size += sizeof (Elf32_External_Rela);
74d1c347
AM
2308 }
2309 else
2310 *local_plt = (bfd_vma) -1;
2311 }
2312 }
30667bf3 2313 }
30667bf3 2314
98ceb8ce
AM
2315 /* Allocate global sym .plt and .got entries, and space for global
2316 sym dynamic relocs. */
ebe50bae 2317 elf_link_hash_traverse (&htab->elf, allocate_dynrelocs, (PTR) info);
30667bf3
AM
2318
2319 /* The check_relocs and adjust_dynamic_symbol entry points have
2320 determined the sizes of the various dynamic sections. Allocate
2321 memory for them. */
2322 relocs = false;
30667bf3
AM
2323 for (s = dynobj->sections; s != NULL; s = s->next)
2324 {
30667bf3
AM
2325 if ((s->flags & SEC_LINKER_CREATED) == 0)
2326 continue;
2327
83c81bfe 2328 if (s == htab->splt)
68fb2e56 2329 {
83c81bfe 2330 if (htab->need_plt_stub)
68fb2e56
AM
2331 {
2332 /* Make space for the plt stub at the end of the .plt
2333 section. We want this stub right at the end, up
2334 against the .got section. */
83c81bfe 2335 int gotalign = bfd_section_alignment (dynobj, htab->sgot);
68fb2e56
AM
2336 int pltalign = bfd_section_alignment (dynobj, s);
2337 bfd_size_type mask;
30667bf3 2338
68fb2e56
AM
2339 if (gotalign > pltalign)
2340 bfd_set_section_alignment (dynobj, s, gotalign);
2341 mask = ((bfd_size_type) 1 << gotalign) - 1;
2342 s->_raw_size = (s->_raw_size + sizeof (plt_stub) + mask) & ~mask;
2343 }
2344 }
83c81bfe 2345 else if (s == htab->sgot)
68fb2e56
AM
2346 ;
2347 else if (strncmp (bfd_get_section_name (dynobj, s), ".rela", 5) == 0)
30667bf3
AM
2348 {
2349 if (s->_raw_size != 0)
2350 {
30667bf3
AM
2351 /* Remember whether there are any reloc sections other
2352 than .rela.plt. */
83c81bfe 2353 if (s != htab->srelplt)
47d89dba
AM
2354 relocs = true;
2355
30667bf3
AM
2356 /* We use the reloc_count field as a counter if we need
2357 to copy relocs into the output file. */
2358 s->reloc_count = 0;
2359 }
2360 }
30667bf3
AM
2361 else
2362 {
2363 /* It's not one of our sections, so don't allocate space. */
2364 continue;
2365 }
2366
2367 if (s->_raw_size == 0)
2368 {
2369 /* If we don't need this section, strip it from the
2370 output file. This is mostly to handle .rela.bss and
2371 .rela.plt. We must create both sections in
2372 create_dynamic_sections, because they must be created
2373 before the linker maps input sections to output
2374 sections. The linker does that before
2375 adjust_dynamic_symbol is called, and it is that
2376 function which decides whether anything needs to go
2377 into these sections. */
2378 _bfd_strip_section_from_output (info, s);
2379 continue;
2380 }
2381
2382 /* Allocate memory for the section contents. Zero it, because
2383 we may not fill in all the reloc sections. */
2384 s->contents = (bfd_byte *) bfd_zalloc (dynobj, s->_raw_size);
2385 if (s->contents == NULL && s->_raw_size != 0)
2386 return false;
2387 }
2388
ebe50bae 2389 if (htab->elf.dynamic_sections_created)
30667bf3
AM
2390 {
2391 /* Like IA-64 and HPPA64, always create a DT_PLTGOT. It
2392 actually has nothing to do with the PLT, it is how we
2393 communicate the LTP value of a load module to the dynamic
2394 linker. */
dc810e39
AM
2395#define add_dynamic_entry(TAG, VAL) \
2396 bfd_elf32_add_dynamic_entry (info, (bfd_vma) (TAG), (bfd_vma) (VAL))
2397
2398 if (!add_dynamic_entry (DT_PLTGOT, 0))
30667bf3
AM
2399 return false;
2400
2401 /* Add some entries to the .dynamic section. We fill in the
2402 values later, in elf32_hppa_finish_dynamic_sections, but we
2403 must add the entries now so that we get the correct size for
2404 the .dynamic section. The DT_DEBUG entry is filled in by the
2405 dynamic linker and used by the debugger. */
dc810e39 2406 if (!info->shared)
30667bf3 2407 {
dc810e39 2408 if (!add_dynamic_entry (DT_DEBUG, 0))
30667bf3
AM
2409 return false;
2410 }
2411
83c81bfe 2412 if (htab->srelplt->_raw_size != 0)
30667bf3 2413 {
dc810e39
AM
2414 if (!add_dynamic_entry (DT_PLTRELSZ, 0)
2415 || !add_dynamic_entry (DT_PLTREL, DT_RELA)
2416 || !add_dynamic_entry (DT_JMPREL, 0))
30667bf3
AM
2417 return false;
2418 }
2419
2420 if (relocs)
2421 {
dc810e39
AM
2422 if (!add_dynamic_entry (DT_RELA, 0)
2423 || !add_dynamic_entry (DT_RELASZ, 0)
2424 || !add_dynamic_entry (DT_RELAENT, sizeof (Elf32_External_Rela)))
30667bf3 2425 return false;
30667bf3 2426
98ceb8ce
AM
2427 /* If any dynamic relocs apply to a read-only section,
2428 then we need a DT_TEXTREL entry. */
ebe50bae 2429 elf_link_hash_traverse (&htab->elf, readonly_dynrelocs, (PTR) info);
98ceb8ce
AM
2430
2431 if ((info->flags & DF_TEXTREL) != 0)
2432 {
2433 if (!add_dynamic_entry (DT_TEXTREL, 0))
2434 return false;
2435 }
30667bf3
AM
2436 }
2437 }
dc810e39 2438#undef add_dynamic_entry
30667bf3
AM
2439
2440 return true;
2441}
2442
30667bf3
AM
2443/* External entry points for sizing and building linker stubs. */
2444
2445/* Determine and set the size of the stub section for a final link.
2446
2447 The basic idea here is to examine all the relocations looking for
2448 PC-relative calls to a target that is unreachable with a "bl"
2449 instruction. */
2450
2451boolean
47d89dba 2452elf32_hppa_size_stubs (output_bfd, stub_bfd, info, multi_subspace, group_size,
30667bf3 2453 add_stub_section, layout_sections_again)
25f72752 2454 bfd *output_bfd;
30667bf3 2455 bfd *stub_bfd;
30667bf3 2456 struct bfd_link_info *info;
25f72752 2457 boolean multi_subspace;
47d89dba 2458 bfd_signed_vma group_size;
30667bf3
AM
2459 asection * (*add_stub_section) PARAMS ((const char *, asection *));
2460 void (*layout_sections_again) PARAMS ((void));
2461{
2462 bfd *input_bfd;
2463 asection *section;
25f72752 2464 asection **input_list, **list;
30667bf3 2465 Elf_Internal_Sym *local_syms, **all_local_syms;
25f72752
AM
2466 unsigned int bfd_indx, bfd_count;
2467 int top_id, top_index;
83c81bfe 2468 struct elf32_hppa_link_hash_table *htab;
47d89dba
AM
2469 bfd_size_type stub_group_size;
2470 boolean stubs_always_before_branch;
30667bf3 2471 boolean stub_changed = 0;
25f72752 2472 boolean ret = 0;
dc810e39 2473 bfd_size_type amt;
30667bf3 2474
83c81bfe 2475 htab = hppa_link_hash_table (info);
30667bf3
AM
2476
2477 /* Stash our params away. */
83c81bfe
AM
2478 htab->stub_bfd = stub_bfd;
2479 htab->multi_subspace = multi_subspace;
2480 htab->add_stub_section = add_stub_section;
2481 htab->layout_sections_again = layout_sections_again;
47d89dba
AM
2482 stubs_always_before_branch = group_size < 0;
2483 if (group_size < 0)
2484 stub_group_size = -group_size;
2485 else
2486 stub_group_size = group_size;
2487 if (stub_group_size == 1)
2488 {
2489 /* Default values. */
2490 stub_group_size = 8000000;
83c81bfe 2491 if (htab->has_17bit_branch || htab->multi_subspace)
47d89dba 2492 stub_group_size = 250000;
83c81bfe 2493 if (htab->has_12bit_branch)
47d89dba
AM
2494 stub_group_size = 7812;
2495 }
30667bf3 2496
1badb539
AM
2497 /* Count the number of input BFDs and find the top input section id. */
2498 for (input_bfd = info->input_bfds, bfd_count = 0, top_id = 0;
30667bf3
AM
2499 input_bfd != NULL;
2500 input_bfd = input_bfd->link_next)
2501 {
2502 bfd_count += 1;
25f72752
AM
2503 for (section = input_bfd->sections;
2504 section != NULL;
2505 section = section->next)
2506 {
2507 if (top_id < section->id)
2508 top_id = section->id;
2509 }
30667bf3
AM
2510 }
2511
dc810e39 2512 amt = sizeof (struct map_stub) * (top_id + 1);
83c81bfe
AM
2513 htab->stub_group = (struct map_stub *) bfd_zmalloc (amt);
2514 if (htab->stub_group == NULL)
30667bf3
AM
2515 return false;
2516
1badb539
AM
2517 /* Make a list of input sections for each output section included in
2518 the link.
2519
2520 We can't use output_bfd->section_count here to find the top output
2521 section index as some sections may have been removed, and
2522 _bfd_strip_section_from_output doesn't renumber the indices. */
2523 for (section = output_bfd->sections, top_index = 0;
2524 section != NULL;
2525 section = section->next)
2526 {
2527 if (top_index < section->index)
2528 top_index = section->index;
2529 }
2530
dc810e39
AM
2531 amt = sizeof (asection *) * (top_index + 1);
2532 input_list = (asection **) bfd_malloc (amt);
25f72752
AM
2533 if (input_list == NULL)
2534 return false;
2535
1badb539
AM
2536 /* For sections we aren't interested in, mark their entries with a
2537 value we can check later. */
2538 list = input_list + top_index;
2539 do
2540 *list = bfd_abs_section_ptr;
2541 while (list-- != input_list);
2542
2543 for (section = output_bfd->sections;
2544 section != NULL;
2545 section = section->next)
2546 {
47d89dba 2547 if ((section->flags & SEC_CODE) != 0)
1badb539
AM
2548 input_list[section->index] = NULL;
2549 }
2550
2551 /* Now actually build the lists. */
25f72752
AM
2552 for (input_bfd = info->input_bfds;
2553 input_bfd != NULL;
2554 input_bfd = input_bfd->link_next)
2555 {
2556 for (section = input_bfd->sections;
2557 section != NULL;
2558 section = section->next)
2559 {
2560 if (section->output_section != NULL
1badb539
AM
2561 && section->output_section->owner == output_bfd
2562 && section->output_section->index <= top_index)
25f72752
AM
2563 {
2564 list = input_list + section->output_section->index;
1badb539
AM
2565 if (*list != bfd_abs_section_ptr)
2566 {
2567 /* Steal the link_sec pointer for our list. */
83c81bfe 2568#define PREV_SEC(sec) (htab->stub_group[(sec)->id].link_sec)
1badb539
AM
2569 /* This happens to make the list in reverse order,
2570 which is what we want. */
2571 PREV_SEC (section) = *list;
2572 *list = section;
2573 }
25f72752
AM
2574 }
2575 }
2576 }
2577
2578 /* See whether we can group stub sections together. Grouping stub
2579 sections may result in fewer stubs. More importantly, we need to
2580 put all .init* and .fini* stubs at the beginning of the .init or
2581 .fini output sections respectively, because glibc splits the
2582 _init and _fini functions into multiple parts. Putting a stub in
2583 the middle of a function is not a good idea. */
a017a724 2584 list = input_list + top_index;
1badb539 2585 do
25f72752
AM
2586 {
2587 asection *tail = *list;
1badb539
AM
2588 if (tail == bfd_abs_section_ptr)
2589 continue;
25f72752
AM
2590 while (tail != NULL)
2591 {
2592 asection *curr;
2593 asection *prev;
2594 bfd_size_type total;
2595
2596 curr = tail;
2597 if (tail->_cooked_size)
2598 total = tail->_cooked_size;
2599 else
2600 total = tail->_raw_size;
2601 while ((prev = PREV_SEC (curr)) != NULL
2602 && ((total += curr->output_offset - prev->output_offset)
47d89dba 2603 < stub_group_size))
25f72752
AM
2604 curr = prev;
2605
2606 /* OK, the size from the start of CURR to the end is less
2607 than 250000 bytes and thus can be handled by one stub
2608 section. (or the tail section is itself larger than
2609 250000 bytes, in which case we may be toast.)
2610 We should really be keeping track of the total size of
2611 stubs added here, as stubs contribute to the final output
2612 section size. That's a little tricky, and this way will
2613 only break if stubs added total more than 12144 bytes, or
2614 1518 long branch stubs. It seems unlikely for more than
2615 1518 different functions to be called, especially from
2616 code only 250000 bytes long. */
2617 do
2618 {
2619 prev = PREV_SEC (tail);
2620 /* Set up this stub group. */
83c81bfe 2621 htab->stub_group[tail->id].link_sec = curr;
25f72752
AM
2622 }
2623 while (tail != curr && (tail = prev) != NULL);
2624
2625 /* But wait, there's more! Input sections up to 250000
2626 bytes before the stub section can be handled by it too. */
47d89dba 2627 if (!stubs_always_before_branch)
25f72752 2628 {
47d89dba
AM
2629 total = 0;
2630 while (prev != NULL
2631 && ((total += tail->output_offset - prev->output_offset)
2632 < stub_group_size))
2633 {
2634 tail = prev;
2635 prev = PREV_SEC (tail);
83c81bfe 2636 htab->stub_group[tail->id].link_sec = curr;
47d89dba 2637 }
25f72752
AM
2638 }
2639 tail = prev;
2640 }
2641 }
1badb539 2642 while (list-- != input_list);
25f72752 2643 free (input_list);
1badb539 2644#undef PREV_SEC
30667bf3
AM
2645
2646 /* We want to read in symbol extension records only once. To do this
2647 we need to read in the local symbols in parallel and save them for
2648 later use; so hold pointers to the local symbols in an array. */
dc810e39
AM
2649 amt = sizeof (Elf_Internal_Sym *) * bfd_count;
2650 all_local_syms = (Elf_Internal_Sym **) bfd_zmalloc (amt);
30667bf3 2651 if (all_local_syms == NULL)
25f72752 2652 return false;
30667bf3
AM
2653
2654 /* Walk over all the input BFDs, swapping in local symbols.
2655 If we are creating a shared library, create hash entries for the
2656 export stubs. */
25f72752 2657 for (input_bfd = info->input_bfds, bfd_indx = 0;
30667bf3 2658 input_bfd != NULL;
25f72752 2659 input_bfd = input_bfd->link_next, bfd_indx++)
30667bf3
AM
2660 {
2661 Elf_Internal_Shdr *symtab_hdr;
2662 Elf_Internal_Sym *isym;
25f72752 2663 Elf32_External_Sym *ext_syms, *esym, *end_sy;
dc810e39 2664 bfd_size_type sec_size;
edd21aca 2665
252b5132
RH
2666 /* We'll need the symbol table in a second. */
2667 symtab_hdr = &elf_tdata (input_bfd)->symtab_hdr;
2668 if (symtab_hdr->sh_info == 0)
2669 continue;
2670
edd21aca
AM
2671 /* We need an array of the local symbols attached to the input bfd.
2672 Unfortunately, we're going to have to read & swap them in. */
dc810e39
AM
2673 sec_size = symtab_hdr->sh_info;
2674 sec_size *= sizeof (Elf_Internal_Sym);
2675 local_syms = (Elf_Internal_Sym *) bfd_malloc (sec_size);
edd21aca
AM
2676 if (local_syms == NULL)
2677 {
2678 goto error_ret_free_local;
2679 }
25f72752 2680 all_local_syms[bfd_indx] = local_syms;
dc810e39
AM
2681 sec_size = symtab_hdr->sh_info;
2682 sec_size *= sizeof (Elf32_External_Sym);
2683 ext_syms = (Elf32_External_Sym *) bfd_malloc (sec_size);
edd21aca
AM
2684 if (ext_syms == NULL)
2685 {
2686 goto error_ret_free_local;
2687 }
2688
2689 if (bfd_seek (input_bfd, symtab_hdr->sh_offset, SEEK_SET) != 0
dc810e39 2690 || (bfd_bread (ext_syms, sec_size, input_bfd) != sec_size))
edd21aca
AM
2691 {
2692 free (ext_syms);
2693 goto error_ret_free_local;
2694 }
2695
2696 /* Swap the local symbols in. */
2697 isym = local_syms;
2698 esym = ext_syms;
25f72752 2699 for (end_sy = esym + symtab_hdr->sh_info; esym < end_sy; esym++, isym++)
edd21aca
AM
2700 bfd_elf32_swap_symbol_in (input_bfd, esym, isym);
2701
2702 /* Now we can free the external symbols. */
2703 free (ext_syms);
edd21aca 2704
83c81bfe 2705 if (info->shared && htab->multi_subspace)
30667bf3 2706 {
25f72752
AM
2707 struct elf_link_hash_entry **sym_hashes;
2708 struct elf_link_hash_entry **end_hashes;
30667bf3
AM
2709 unsigned int symcount;
2710
2711 symcount = (symtab_hdr->sh_size / sizeof (Elf32_External_Sym)
2712 - symtab_hdr->sh_info);
25f72752
AM
2713 sym_hashes = elf_sym_hashes (input_bfd);
2714 end_hashes = sym_hashes + symcount;
30667bf3
AM
2715
2716 /* Look through the global syms for functions; We need to
2717 build export stubs for all globally visible functions. */
25f72752 2718 for (; sym_hashes < end_hashes; sym_hashes++)
30667bf3
AM
2719 {
2720 struct elf32_hppa_link_hash_entry *hash;
2721
25f72752 2722 hash = (struct elf32_hppa_link_hash_entry *) *sym_hashes;
30667bf3
AM
2723
2724 while (hash->elf.root.type == bfd_link_hash_indirect
2725 || hash->elf.root.type == bfd_link_hash_warning)
2726 hash = ((struct elf32_hppa_link_hash_entry *)
2727 hash->elf.root.u.i.link);
2728
2729 /* At this point in the link, undefined syms have been
2730 resolved, so we need to check that the symbol was
2731 defined in this BFD. */
2732 if ((hash->elf.root.type == bfd_link_hash_defined
2733 || hash->elf.root.type == bfd_link_hash_defweak)
2734 && hash->elf.type == STT_FUNC
2735 && hash->elf.root.u.def.section->output_section != NULL
25f72752
AM
2736 && (hash->elf.root.u.def.section->output_section->owner
2737 == output_bfd)
30667bf3
AM
2738 && hash->elf.root.u.def.section->owner == input_bfd
2739 && (hash->elf.elf_link_hash_flags & ELF_LINK_HASH_DEF_REGULAR)
2740 && !(hash->elf.elf_link_hash_flags & ELF_LINK_FORCED_LOCAL)
2741 && ELF_ST_VISIBILITY (hash->elf.other) == STV_DEFAULT)
2742 {
2743 asection *sec;
2744 const char *stub_name;
2745 struct elf32_hppa_stub_hash_entry *stub_entry;
2746
2747 sec = hash->elf.root.u.def.section;
2748 stub_name = hash->elf.root.root.string;
83c81bfe 2749 stub_entry = hppa_stub_hash_lookup (&htab->stub_hash_table,
30667bf3
AM
2750 stub_name,
2751 false, false);
2752 if (stub_entry == NULL)
2753 {
83c81bfe 2754 stub_entry = hppa_add_stub (stub_name, sec, htab);
30667bf3
AM
2755 if (!stub_entry)
2756 goto error_ret_free_local;
2757
2758 stub_entry->target_value = hash->elf.root.u.def.value;
2759 stub_entry->target_section = hash->elf.root.u.def.section;
2760 stub_entry->stub_type = hppa_stub_export;
2761 stub_entry->h = hash;
2762 stub_changed = 1;
2763 }
2764 else
2765 {
2766 (*_bfd_error_handler) (_("%s: duplicate export stub %s"),
8f615d07
AM
2767 bfd_archive_filename (input_bfd),
2768 stub_name);
30667bf3
AM
2769 }
2770 }
2771 }
30667bf3
AM
2772 }
2773 }
edd21aca
AM
2774
2775 while (1)
2776 {
30667bf3
AM
2777 asection *stub_sec;
2778
25f72752 2779 for (input_bfd = info->input_bfds, bfd_indx = 0;
30667bf3 2780 input_bfd != NULL;
25f72752 2781 input_bfd = input_bfd->link_next, bfd_indx++)
30667bf3
AM
2782 {
2783 Elf_Internal_Shdr *symtab_hdr;
2784
2785 /* We'll need the symbol table in a second. */
2786 symtab_hdr = &elf_tdata (input_bfd)->symtab_hdr;
2787 if (symtab_hdr->sh_info == 0)
2788 continue;
2789
25f72752 2790 local_syms = all_local_syms[bfd_indx];
30667bf3
AM
2791
2792 /* Walk over each section attached to the input bfd. */
2793 for (section = input_bfd->sections;
2794 section != NULL;
25f72752 2795 section = section->next)
30667bf3
AM
2796 {
2797 Elf_Internal_Shdr *input_rel_hdr;
2798 Elf32_External_Rela *external_relocs, *erelaend, *erela;
2799 Elf_Internal_Rela *internal_relocs, *irelaend, *irela;
2800
2801 /* If there aren't any relocs, then there's nothing more
2802 to do. */
2803 if ((section->flags & SEC_RELOC) == 0
2804 || section->reloc_count == 0)
2805 continue;
2806
25f72752
AM
2807 /* If this section is a link-once section that will be
2808 discarded, then don't create any stubs. */
2809 if (section->output_section == NULL
2810 || section->output_section->owner != output_bfd)
2811 continue;
2812
30667bf3 2813 /* Allocate space for the external relocations. */
dc810e39
AM
2814 amt = section->reloc_count;
2815 amt *= sizeof (Elf32_External_Rela);
2816 external_relocs = (Elf32_External_Rela *) bfd_malloc (amt);
30667bf3
AM
2817 if (external_relocs == NULL)
2818 {
2819 goto error_ret_free_local;
2820 }
2821
2822 /* Likewise for the internal relocations. */
dc810e39
AM
2823 amt = section->reloc_count;
2824 amt *= sizeof (Elf_Internal_Rela);
2825 internal_relocs = (Elf_Internal_Rela *) bfd_malloc (amt);
30667bf3
AM
2826 if (internal_relocs == NULL)
2827 {
2828 free (external_relocs);
2829 goto error_ret_free_local;
2830 }
2831
2832 /* Read in the external relocs. */
2833 input_rel_hdr = &elf_section_data (section)->rel_hdr;
2834 if (bfd_seek (input_bfd, input_rel_hdr->sh_offset, SEEK_SET) != 0
dc810e39 2835 || bfd_bread (external_relocs,
30667bf3
AM
2836 input_rel_hdr->sh_size,
2837 input_bfd) != input_rel_hdr->sh_size)
2838 {
2839 free (external_relocs);
2840 error_ret_free_internal:
2841 free (internal_relocs);
2842 goto error_ret_free_local;
2843 }
2844
2845 /* Swap in the relocs. */
2846 erela = external_relocs;
2847 erelaend = erela + section->reloc_count;
2848 irela = internal_relocs;
2849 for (; erela < erelaend; erela++, irela++)
2850 bfd_elf32_swap_reloca_in (input_bfd, erela, irela);
2851
2852 /* We're done with the external relocs, free them. */
2853 free (external_relocs);
2854
2855 /* Now examine each relocation. */
2856 irela = internal_relocs;
2857 irelaend = irela + section->reloc_count;
2858 for (; irela < irelaend; irela++)
2859 {
2860 unsigned int r_type, r_indx;
2861 enum elf32_hppa_stub_type stub_type;
2862 struct elf32_hppa_stub_hash_entry *stub_entry;
2863 asection *sym_sec;
2864 bfd_vma sym_value;
2865 bfd_vma destination;
2866 struct elf32_hppa_link_hash_entry *hash;
2867 char *stub_name;
25f72752 2868 const asection *id_sec;
30667bf3
AM
2869
2870 r_type = ELF32_R_TYPE (irela->r_info);
2871 r_indx = ELF32_R_SYM (irela->r_info);
2872
2873 if (r_type >= (unsigned int) R_PARISC_UNIMPLEMENTED)
2874 {
2875 bfd_set_error (bfd_error_bad_value);
2876 goto error_ret_free_internal;
2877 }
2878
2879 /* Only look for stubs on call instructions. */
2880 if (r_type != (unsigned int) R_PARISC_PCREL12F
2881 && r_type != (unsigned int) R_PARISC_PCREL17F
2882 && r_type != (unsigned int) R_PARISC_PCREL22F)
2883 continue;
2884
2885 /* Now determine the call target, its name, value,
2886 section. */
2887 sym_sec = NULL;
2888 sym_value = 0;
2889 destination = 0;
2890 hash = NULL;
2891 if (r_indx < symtab_hdr->sh_info)
2892 {
2893 /* It's a local symbol. */
2894 Elf_Internal_Sym *sym;
2895 Elf_Internal_Shdr *hdr;
2896
2897 sym = local_syms + r_indx;
2898 hdr = elf_elfsections (input_bfd)[sym->st_shndx];
2899 sym_sec = hdr->bfd_section;
2900 if (ELF_ST_TYPE (sym->st_info) != STT_SECTION)
2901 sym_value = sym->st_value;
2902 destination = (sym_value + irela->r_addend
2903 + sym_sec->output_offset
2904 + sym_sec->output_section->vma);
2905 }
2906 else
2907 {
2908 /* It's an external symbol. */
2909 int e_indx;
2910
2911 e_indx = r_indx - symtab_hdr->sh_info;
2912 hash = ((struct elf32_hppa_link_hash_entry *)
2913 elf_sym_hashes (input_bfd)[e_indx]);
2914
2915 while (hash->elf.root.type == bfd_link_hash_indirect
2916 || hash->elf.root.type == bfd_link_hash_warning)
2917 hash = ((struct elf32_hppa_link_hash_entry *)
2918 hash->elf.root.u.i.link);
2919
2920 if (hash->elf.root.type == bfd_link_hash_defined
2921 || hash->elf.root.type == bfd_link_hash_defweak)
2922 {
2923 sym_sec = hash->elf.root.u.def.section;
2924 sym_value = hash->elf.root.u.def.value;
2925 if (sym_sec->output_section != NULL)
2926 destination = (sym_value + irela->r_addend
2927 + sym_sec->output_offset
2928 + sym_sec->output_section->vma);
2929 }
2930 else if (hash->elf.root.type == bfd_link_hash_undefweak)
2931 {
2932 if (! info->shared)
2933 continue;
2934 }
2935 else if (hash->elf.root.type == bfd_link_hash_undefined)
2936 {
2937 if (! (info->shared
2938 && !info->no_undefined
2939 && (ELF_ST_VISIBILITY (hash->elf.other)
2940 == STV_DEFAULT)))
2941 continue;
2942 }
2943 else
2944 {
2945 bfd_set_error (bfd_error_bad_value);
2946 goto error_ret_free_internal;
2947 }
2948 }
2949
2950 /* Determine what (if any) linker stub is needed. */
2951 stub_type = hppa_type_of_stub (section, irela, hash,
2952 destination);
2953 if (stub_type == hppa_stub_none)
2954 continue;
2955
25f72752 2956 /* Support for grouping stub sections. */
83c81bfe 2957 id_sec = htab->stub_group[section->id].link_sec;
25f72752 2958
30667bf3 2959 /* Get the name of this stub. */
25f72752 2960 stub_name = hppa_stub_name (id_sec, sym_sec, hash, irela);
30667bf3
AM
2961 if (!stub_name)
2962 goto error_ret_free_internal;
2963
83c81bfe 2964 stub_entry = hppa_stub_hash_lookup (&htab->stub_hash_table,
30667bf3
AM
2965 stub_name,
2966 false, false);
2967 if (stub_entry != NULL)
2968 {
2969 /* The proper stub has already been created. */
2970 free (stub_name);
2971 continue;
2972 }
2973
83c81bfe 2974 stub_entry = hppa_add_stub (stub_name, section, htab);
30667bf3
AM
2975 if (stub_entry == NULL)
2976 {
2977 free (stub_name);
2978 goto error_ret_free_local;
2979 }
2980
2981 stub_entry->target_value = sym_value;
2982 stub_entry->target_section = sym_sec;
2983 stub_entry->stub_type = stub_type;
2984 if (info->shared)
2985 {
2986 if (stub_type == hppa_stub_import)
2987 stub_entry->stub_type = hppa_stub_import_shared;
98ceb8ce 2988 else if (stub_type == hppa_stub_long_branch)
30667bf3
AM
2989 stub_entry->stub_type = hppa_stub_long_branch_shared;
2990 }
2991 stub_entry->h = hash;
2992 stub_changed = 1;
2993 }
2994
2995 /* We're done with the internal relocs, free them. */
2996 free (internal_relocs);
2997 }
2998 }
2999
3000 if (!stub_changed)
3001 break;
3002
3003 /* OK, we've added some stubs. Find out the new size of the
3004 stub sections. */
83c81bfe 3005 for (stub_sec = htab->stub_bfd->sections;
30667bf3
AM
3006 stub_sec != NULL;
3007 stub_sec = stub_sec->next)
3008 {
74d1c347
AM
3009 stub_sec->_raw_size = 0;
3010 stub_sec->_cooked_size = 0;
3011 }
74d1c347 3012
83c81bfe 3013 bfd_hash_traverse (&htab->stub_hash_table, hppa_size_one_stub, htab);
74d1c347 3014
30667bf3 3015 /* Ask the linker to do its stuff. */
83c81bfe 3016 (*htab->layout_sections_again) ();
30667bf3
AM
3017 stub_changed = 0;
3018 }
3019
25f72752 3020 ret = 1;
30667bf3
AM
3021
3022 error_ret_free_local:
25f72752
AM
3023 while (bfd_count-- > 0)
3024 if (all_local_syms[bfd_count])
3025 free (all_local_syms[bfd_count]);
30667bf3
AM
3026 free (all_local_syms);
3027
25f72752 3028 return ret;
30667bf3
AM
3029}
3030
30667bf3
AM
3031/* For a final link, this function is called after we have sized the
3032 stubs to provide a value for __gp. */
3033
3034boolean
3035elf32_hppa_set_gp (abfd, info)
3036 bfd *abfd;
3037 struct bfd_link_info *info;
3038{
83c81bfe 3039 struct elf32_hppa_link_hash_table *htab;
30667bf3
AM
3040 struct elf_link_hash_entry *h;
3041 asection *sec;
3042 bfd_vma gp_val;
3043
83c81bfe 3044 htab = hppa_link_hash_table (info);
ebe50bae 3045 h = elf_link_hash_lookup (&htab->elf, "$global$", false, false, false);
30667bf3 3046
df8634e3
AM
3047 if (h != NULL
3048 && (h->root.type == bfd_link_hash_defined
3049 || h->root.type == bfd_link_hash_defweak))
30667bf3
AM
3050 {
3051 gp_val = h->root.u.def.value;
3052 sec = h->root.u.def.section;
3053 }
3054 else
3055 {
74d1c347
AM
3056 /* Choose to point our LTP at, in this order, one of .plt, .got,
3057 or .data, if these sections exist. In the case of choosing
3058 .plt try to make the LTP ideal for addressing anywhere in the
3059 .plt or .got with a 14 bit signed offset. Typically, the end
3060 of the .plt is the start of the .got, so choose .plt + 0x2000
3061 if either the .plt or .got is larger than 0x2000. If both
3062 the .plt and .got are smaller than 0x2000, choose the end of
3063 the .plt section. */
3064
83c81bfe 3065 sec = htab->splt;
74d1c347 3066 if (sec != NULL)
30667bf3 3067 {
74d1c347
AM
3068 gp_val = sec->_raw_size;
3069 if (gp_val > 0x2000
83c81bfe 3070 || (htab->sgot && htab->sgot->_raw_size > 0x2000))
74d1c347
AM
3071 {
3072 gp_val = 0x2000;
3073 }
3074 }
3075 else
3076 {
3077 gp_val = 0;
83c81bfe 3078 sec = htab->sgot;
74d1c347
AM
3079 if (sec != NULL)
3080 {
3081 /* We know we don't have a .plt. If .got is large,
3082 offset our LTP. */
3083 if (sec->_raw_size > 0x2000)
3084 gp_val = 0x2000;
3085 }
3086 else
3087 {
3088 /* No .plt or .got. Who cares what the LTP is? */
3089 sec = bfd_get_section_by_name (abfd, ".data");
3090 }
30667bf3 3091 }
df8634e3
AM
3092
3093 if (h != NULL)
3094 {
3095 h->root.type = bfd_link_hash_defined;
3096 h->root.u.def.value = gp_val;
3097 if (sec != NULL)
3098 h->root.u.def.section = sec;
3099 else
3100 h->root.u.def.section = bfd_abs_section_ptr;
3101 }
30667bf3
AM
3102 }
3103
b32b5d6e 3104 if (sec != NULL && sec->output_section != NULL)
74d1c347
AM
3105 gp_val += sec->output_section->vma + sec->output_offset;
3106
3107 elf_gp (abfd) = gp_val;
30667bf3
AM
3108 return true;
3109}
3110
30667bf3
AM
3111/* Build all the stubs associated with the current output file. The
3112 stubs are kept in a hash table attached to the main linker hash
3113 table. We also set up the .plt entries for statically linked PIC
3114 functions here. This function is called via hppaelf_finish in the
3115 linker. */
3116
3117boolean
3118elf32_hppa_build_stubs (info)
3119 struct bfd_link_info *info;
3120{
3121 asection *stub_sec;
3122 struct bfd_hash_table *table;
83c81bfe 3123 struct elf32_hppa_link_hash_table *htab;
30667bf3 3124
83c81bfe 3125 htab = hppa_link_hash_table (info);
30667bf3 3126
83c81bfe 3127 for (stub_sec = htab->stub_bfd->sections;
30667bf3
AM
3128 stub_sec != NULL;
3129 stub_sec = stub_sec->next)
3130 {
dc810e39 3131 bfd_size_type size;
30667bf3
AM
3132
3133 /* Allocate memory to hold the linker stubs. */
74d1c347 3134 size = stub_sec->_raw_size;
83c81bfe 3135 stub_sec->contents = (unsigned char *) bfd_zalloc (htab->stub_bfd, size);
30667bf3
AM
3136 if (stub_sec->contents == NULL && size != 0)
3137 return false;
74d1c347 3138 stub_sec->_raw_size = 0;
30667bf3
AM
3139 }
3140
3141 /* Build the stubs as directed by the stub hash table. */
83c81bfe 3142 table = &htab->stub_hash_table;
30667bf3
AM
3143 bfd_hash_traverse (table, hppa_build_one_stub, info);
3144
3145 return true;
3146}
3147
c46b7515
AM
3148/* Perform a final link. */
3149
3150static boolean
3151elf32_hppa_final_link (abfd, info)
3152 bfd *abfd;
3153 struct bfd_link_info *info;
3154{
3155 asection *s;
3156
4dc86686
AM
3157 /* Invoke the regular ELF linker to do all the work. */
3158 if (!bfd_elf32_bfd_final_link (abfd, info))
c46b7515
AM
3159 return false;
3160
3161 /* If we're producing a final executable, sort the contents of the
3162 unwind section. Magic section names, but this is much safer than
3163 having elf32_hppa_relocate_section remember where SEGREL32 relocs
3164 occurred. Consider what happens if someone inept creates a
3165 linker script that puts unwind information in .text. */
3166 s = bfd_get_section_by_name (abfd, ".PARISC.unwind");
3167 if (s != NULL)
3168 {
3169 bfd_size_type size;
3170 char *contents;
3171
3172 size = s->_raw_size;
3173 contents = bfd_malloc (size);
3174 if (contents == NULL)
3175 return false;
3176
3177 if (! bfd_get_section_contents (abfd, s, contents, (file_ptr) 0, size))
3178 return false;
3179
dc810e39 3180 qsort (contents, (size_t) (size / 16), 16, hppa_unwind_entry_compare);
c46b7515
AM
3181
3182 if (! bfd_set_section_contents (abfd, s, contents, (file_ptr) 0, size))
3183 return false;
3184 }
3185 return true;
3186}
3187
3188/* Record the lowest address for the data and text segments. */
3189
3190static void
3191hppa_record_segment_addr (abfd, section, data)
3192 bfd *abfd ATTRIBUTE_UNUSED;
3193 asection *section;
3194 PTR data;
3195{
83c81bfe 3196 struct elf32_hppa_link_hash_table *htab;
c46b7515 3197
83c81bfe 3198 htab = (struct elf32_hppa_link_hash_table *) data;
c46b7515
AM
3199
3200 if ((section->flags & (SEC_ALLOC | SEC_LOAD)) == (SEC_ALLOC | SEC_LOAD))
3201 {
3202 bfd_vma value = section->vma - section->filepos;
3203
3204 if ((section->flags & SEC_READONLY) != 0)
3205 {
83c81bfe
AM
3206 if (value < htab->text_segment_base)
3207 htab->text_segment_base = value;
c46b7515
AM
3208 }
3209 else
3210 {
83c81bfe
AM
3211 if (value < htab->data_segment_base)
3212 htab->data_segment_base = value;
c46b7515
AM
3213 }
3214 }
3215}
3216
30667bf3
AM
3217/* Perform a relocation as part of a final link. */
3218
3219static bfd_reloc_status_type
83c81bfe 3220final_link_relocate (input_section, contents, rel, value, htab, sym_sec, h)
30667bf3
AM
3221 asection *input_section;
3222 bfd_byte *contents;
3223 const Elf_Internal_Rela *rel;
3224 bfd_vma value;
83c81bfe 3225 struct elf32_hppa_link_hash_table *htab;
30667bf3
AM
3226 asection *sym_sec;
3227 struct elf32_hppa_link_hash_entry *h;
3228{
3229 int insn;
3230 unsigned int r_type = ELF32_R_TYPE (rel->r_info);
3231 reloc_howto_type *howto = elf_hppa_howto_table + r_type;
3232 int r_format = howto->bitsize;
3233 enum hppa_reloc_field_selector_type_alt r_field;
3234 bfd *input_bfd = input_section->owner;
3235 bfd_vma offset = rel->r_offset;
3236 bfd_vma max_branch_offset = 0;
3237 bfd_byte *hit_data = contents + offset;
3238 bfd_signed_vma addend = rel->r_addend;
3239 bfd_vma location;
3240 struct elf32_hppa_stub_hash_entry *stub_entry = NULL;
3241 int val;
3242
3243 if (r_type == R_PARISC_NONE)
3244 return bfd_reloc_ok;
3245
3246 insn = bfd_get_32 (input_bfd, hit_data);
3247
3248 /* Find out where we are and where we're going. */
3249 location = (offset +
3250 input_section->output_offset +
3251 input_section->output_section->vma);
3252
3253 switch (r_type)
3254 {
3255 case R_PARISC_PCREL12F:
3256 case R_PARISC_PCREL17F:
3257 case R_PARISC_PCREL22F:
3258 /* If this is a call to a function defined in another dynamic
3259 library, or if it is a call to a PIC function in the same
74d1c347
AM
3260 object, or if this is a shared link and it is a call to a
3261 weak symbol which may or may not be in the same object, then
3262 find the import stub in the stub hash. */
30667bf3
AM
3263 if (sym_sec == NULL
3264 || sym_sec->output_section == NULL
12cca0d2
AM
3265 || (h != NULL
3266 && ((h->maybe_pic_call
3267 && !(input_section->flags & SEC_HAS_GOT_REF))
3268 || (h->elf.root.type == bfd_link_hash_defweak
3269 && h->elf.dynindx != -1
3270 && h->elf.plt.offset != (bfd_vma) -1))))
30667bf3
AM
3271 {
3272 stub_entry = hppa_get_stub_entry (input_section, sym_sec,
83c81bfe 3273 h, rel, htab);
30667bf3
AM
3274 if (stub_entry != NULL)
3275 {
3276 value = (stub_entry->stub_offset
3277 + stub_entry->stub_sec->output_offset
3278 + stub_entry->stub_sec->output_section->vma);
3279 addend = 0;
3280 }
3281 else if (sym_sec == NULL && h != NULL
3282 && h->elf.root.type == bfd_link_hash_undefweak)
3283 {
db20fd76
AM
3284 /* It's OK if undefined weak. Calls to undefined weak
3285 symbols behave as if the "called" function
3286 immediately returns. We can thus call to a weak
3287 function without first checking whether the function
3288 is defined. */
30667bf3 3289 value = location;
db20fd76 3290 addend = 8;
30667bf3
AM
3291 }
3292 else
3293 return bfd_reloc_notsupported;
3294 }
3295 /* Fall thru. */
3296
3297 case R_PARISC_PCREL21L:
3298 case R_PARISC_PCREL17C:
3299 case R_PARISC_PCREL17R:
3300 case R_PARISC_PCREL14R:
3301 case R_PARISC_PCREL14F:
3302 /* Make it a pc relative offset. */
3303 value -= location;
3304 addend -= 8;
3305 break;
3306
3307 case R_PARISC_DPREL21L:
3308 case R_PARISC_DPREL14R:
3309 case R_PARISC_DPREL14F:
3310 /* For all the DP relative relocations, we need to examine the symbol's
3311 section. If it's a code section, then "data pointer relative" makes
3312 no sense. In that case we don't adjust the "value", and for 21 bit
3313 addil instructions, we change the source addend register from %dp to
3314 %r0. This situation commonly arises when a variable's "constness"
3315 is declared differently from the way the variable is defined. For
3316 instance: "extern int foo" with foo defined as "const int foo". */
3317 if (sym_sec == NULL)
3318 break;
3319 if ((sym_sec->flags & SEC_CODE) != 0)
3320 {
3321 if ((insn & ((0x3f << 26) | (0x1f << 21)))
3322 == (((int) OP_ADDIL << 26) | (27 << 21)))
3323 {
3324 insn &= ~ (0x1f << 21);
74d1c347 3325#if 1 /* debug them. */
30667bf3
AM
3326 (*_bfd_error_handler)
3327 (_("%s(%s+0x%lx): fixing %s"),
8f615d07 3328 bfd_archive_filename (input_bfd),
30667bf3
AM
3329 input_section->name,
3330 (long) rel->r_offset,
3331 howto->name);
3332#endif
3333 }
3334 /* Now try to make things easy for the dynamic linker. */
3335
3336 break;
3337 }
74d1c347 3338 /* Fall thru. */
30667bf3
AM
3339
3340 case R_PARISC_DLTIND21L:
3341 case R_PARISC_DLTIND14R:
3342 case R_PARISC_DLTIND14F:
3343 value -= elf_gp (input_section->output_section->owner);
3344 break;
3345
c46b7515
AM
3346 case R_PARISC_SEGREL32:
3347 if ((sym_sec->flags & SEC_CODE) != 0)
83c81bfe 3348 value -= htab->text_segment_base;
c46b7515 3349 else
83c81bfe 3350 value -= htab->data_segment_base;
c46b7515
AM
3351 break;
3352
30667bf3
AM
3353 default:
3354 break;
3355 }
3356
3357 switch (r_type)
3358 {
3359 case R_PARISC_DIR32:
47d89dba 3360 case R_PARISC_DIR14F:
30667bf3
AM
3361 case R_PARISC_DIR17F:
3362 case R_PARISC_PCREL17C:
3363 case R_PARISC_PCREL14F:
3364 case R_PARISC_DPREL14F:
3365 case R_PARISC_PLABEL32:
3366 case R_PARISC_DLTIND14F:
3367 case R_PARISC_SEGBASE:
3368 case R_PARISC_SEGREL32:
3369 r_field = e_fsel;
3370 break;
3371
3372 case R_PARISC_DIR21L:
3373 case R_PARISC_PCREL21L:
3374 case R_PARISC_DPREL21L:
3375 case R_PARISC_PLABEL21L:
3376 case R_PARISC_DLTIND21L:
3377 r_field = e_lrsel;
3378 break;
3379
3380 case R_PARISC_DIR17R:
3381 case R_PARISC_PCREL17R:
3382 case R_PARISC_DIR14R:
3383 case R_PARISC_PCREL14R:
3384 case R_PARISC_DPREL14R:
3385 case R_PARISC_PLABEL14R:
3386 case R_PARISC_DLTIND14R:
3387 r_field = e_rrsel;
3388 break;
3389
3390 case R_PARISC_PCREL12F:
3391 case R_PARISC_PCREL17F:
3392 case R_PARISC_PCREL22F:
3393 r_field = e_fsel;
3394
3395 if (r_type == (unsigned int) R_PARISC_PCREL17F)
3396 {
3397 max_branch_offset = (1 << (17-1)) << 2;
3398 }
3399 else if (r_type == (unsigned int) R_PARISC_PCREL12F)
3400 {
3401 max_branch_offset = (1 << (12-1)) << 2;
3402 }
3403 else
3404 {
3405 max_branch_offset = (1 << (22-1)) << 2;
3406 }
3407
3408 /* sym_sec is NULL on undefined weak syms or when shared on
3409 undefined syms. We've already checked for a stub for the
3410 shared undefined case. */
3411 if (sym_sec == NULL)
3412 break;
3413
3414 /* If the branch is out of reach, then redirect the
3415 call to the local stub for this function. */
3416 if (value + addend + max_branch_offset >= 2*max_branch_offset)
3417 {
3418 stub_entry = hppa_get_stub_entry (input_section, sym_sec,
83c81bfe 3419 h, rel, htab);
30667bf3
AM
3420 if (stub_entry == NULL)
3421 return bfd_reloc_notsupported;
3422
3423 /* Munge up the value and addend so that we call the stub
3424 rather than the procedure directly. */
3425 value = (stub_entry->stub_offset
3426 + stub_entry->stub_sec->output_offset
3427 + stub_entry->stub_sec->output_section->vma
3428 - location);
3429 addend = -8;
3430 }
3431 break;
3432
3433 /* Something we don't know how to handle. */
3434 default:
3435 return bfd_reloc_notsupported;
3436 }
3437
3438 /* Make sure we can reach the stub. */
3439 if (max_branch_offset != 0
3440 && value + addend + max_branch_offset >= 2*max_branch_offset)
3441 {
3442 (*_bfd_error_handler)
3443 (_("%s(%s+0x%lx): cannot reach %s, recompile with -ffunction-sections"),
8f615d07 3444 bfd_archive_filename (input_bfd),
30667bf3
AM
3445 input_section->name,
3446 (long) rel->r_offset,
3447 stub_entry->root.string);
3448 return bfd_reloc_notsupported;
3449 }
3450
3451 val = hppa_field_adjust (value, addend, r_field);
3452
3453 switch (r_type)
3454 {
3455 case R_PARISC_PCREL12F:
3456 case R_PARISC_PCREL17C:
3457 case R_PARISC_PCREL17F:
3458 case R_PARISC_PCREL17R:
3459 case R_PARISC_PCREL22F:
3460 case R_PARISC_DIR17F:
3461 case R_PARISC_DIR17R:
3462 /* This is a branch. Divide the offset by four.
3463 Note that we need to decide whether it's a branch or
3464 otherwise by inspecting the reloc. Inspecting insn won't
3465 work as insn might be from a .word directive. */
3466 val >>= 2;
3467 break;
3468
3469 default:
3470 break;
3471 }
3472
3473 insn = hppa_rebuild_insn (insn, val, r_format);
3474
3475 /* Update the instruction word. */
74d1c347 3476 bfd_put_32 (input_bfd, (bfd_vma) insn, hit_data);
30667bf3
AM
3477 return bfd_reloc_ok;
3478}
3479
30667bf3
AM
3480/* Relocate an HPPA ELF section. */
3481
3482static boolean
3483elf32_hppa_relocate_section (output_bfd, info, input_bfd, input_section,
3484 contents, relocs, local_syms, local_sections)
3485 bfd *output_bfd;
3486 struct bfd_link_info *info;
3487 bfd *input_bfd;
3488 asection *input_section;
3489 bfd_byte *contents;
3490 Elf_Internal_Rela *relocs;
3491 Elf_Internal_Sym *local_syms;
3492 asection **local_sections;
3493{
3494 bfd *dynobj;
3495 bfd_vma *local_got_offsets;
83c81bfe 3496 struct elf32_hppa_link_hash_table *htab;
30667bf3
AM
3497 Elf_Internal_Shdr *symtab_hdr;
3498 Elf_Internal_Rela *rel;
3499 Elf_Internal_Rela *relend;
30667bf3
AM
3500
3501 symtab_hdr = &elf_tdata (input_bfd)->symtab_hdr;
3502
83c81bfe 3503 htab = hppa_link_hash_table (info);
ebe50bae 3504 dynobj = htab->elf.dynobj;
74d1c347 3505 local_got_offsets = elf_local_got_offsets (input_bfd);
30667bf3
AM
3506
3507 rel = relocs;
3508 relend = relocs + input_section->reloc_count;
3509 for (; rel < relend; rel++)
3510 {
3511 unsigned int r_type;
3512 reloc_howto_type *howto;
3513 unsigned int r_symndx;
3514 struct elf32_hppa_link_hash_entry *h;
3515 Elf_Internal_Sym *sym;
3516 asection *sym_sec;
3517 bfd_vma relocation;
3518 bfd_reloc_status_type r;
3519 const char *sym_name;
74d1c347 3520 boolean plabel;
68fb2e56 3521 bfd_vma off;
30667bf3
AM
3522
3523 r_type = ELF32_R_TYPE (rel->r_info);
3524 if (r_type >= (unsigned int) R_PARISC_UNIMPLEMENTED)
3525 {
3526 bfd_set_error (bfd_error_bad_value);
3527 return false;
3528 }
3529 if (r_type == (unsigned int) R_PARISC_GNU_VTENTRY
3530 || r_type == (unsigned int) R_PARISC_GNU_VTINHERIT)
3531 continue;
3532
3533 r_symndx = ELF32_R_SYM (rel->r_info);
3534
3535 if (info->relocateable)
3536 {
3ac8354b 3537 /* This is a relocatable link. We don't have to change
30667bf3
AM
3538 anything, unless the reloc is against a section symbol,
3539 in which case we have to adjust according to where the
3540 section symbol winds up in the output section. */
3541 if (r_symndx < symtab_hdr->sh_info)
3542 {
3543 sym = local_syms + r_symndx;
3544 if (ELF_ST_TYPE (sym->st_info) == STT_SECTION)
3545 {
3546 sym_sec = local_sections[r_symndx];
3547 rel->r_addend += sym_sec->output_offset;
3548 }
3549 }
3550 continue;
3551 }
3552
3553 /* This is a final link. */
3554 h = NULL;
3555 sym = NULL;
3556 sym_sec = NULL;
3557 if (r_symndx < symtab_hdr->sh_info)
3558 {
3559 /* This is a local symbol, h defaults to NULL. */
3560 sym = local_syms + r_symndx;
3561 sym_sec = local_sections[r_symndx];
3562 relocation = ((ELF_ST_TYPE (sym->st_info) == STT_SECTION
3563 ? 0 : sym->st_value)
3564 + sym_sec->output_offset
3565 + sym_sec->output_section->vma);
3566 }
3567 else
3568 {
3569 int indx;
3570
3571 /* It's a global; Find its entry in the link hash. */
3572 indx = r_symndx - symtab_hdr->sh_info;
3573 h = ((struct elf32_hppa_link_hash_entry *)
3574 elf_sym_hashes (input_bfd)[indx]);
3575 while (h->elf.root.type == bfd_link_hash_indirect
3576 || h->elf.root.type == bfd_link_hash_warning)
3577 h = (struct elf32_hppa_link_hash_entry *) h->elf.root.u.i.link;
3578
3579 relocation = 0;
3580 if (h->elf.root.type == bfd_link_hash_defined
3581 || h->elf.root.type == bfd_link_hash_defweak)
3582 {
3583 sym_sec = h->elf.root.u.def.section;
3584 /* If sym_sec->output_section is NULL, then it's a
3585 symbol defined in a shared library. */
3586 if (sym_sec->output_section != NULL)
3587 relocation = (h->elf.root.u.def.value
3588 + sym_sec->output_offset
3589 + sym_sec->output_section->vma);
3590 }
3591 else if (h->elf.root.type == bfd_link_hash_undefweak)
3592 ;
3593 else if (info->shared && !info->no_undefined
49e9d0d3
AM
3594 && ELF_ST_VISIBILITY (h->elf.other) == STV_DEFAULT
3595 && h->elf.type != STT_PARISC_MILLI)
30667bf3 3596 {
671bae9c 3597 if (info->symbolic && !info->allow_shlib_undefined)
30667bf3
AM
3598 if (!((*info->callbacks->undefined_symbol)
3599 (info, h->elf.root.root.string, input_bfd,
3600 input_section, rel->r_offset, false)))
3601 return false;
3602 }
3603 else
3604 {
3605 if (!((*info->callbacks->undefined_symbol)
3606 (info, h->elf.root.root.string, input_bfd,
3607 input_section, rel->r_offset, true)))
3608 return false;
3609 }
3610 }
3611
3612 /* Do any required modifications to the relocation value, and
25f72752
AM
3613 determine what types of dynamic info we need to output, if
3614 any. */
74d1c347 3615 plabel = 0;
30667bf3
AM
3616 switch (r_type)
3617 {
3618 case R_PARISC_DLTIND14F:
3619 case R_PARISC_DLTIND14R:
3620 case R_PARISC_DLTIND21L:
3621 /* Relocation is to the entry for this symbol in the global
3622 offset table. */
3623 if (h != NULL)
3624 {
4dc86686 3625 boolean dyn;
30667bf3
AM
3626
3627 off = h->elf.got.offset;
ebe50bae 3628 dyn = htab->elf.dynamic_sections_created;
4dc86686 3629 if (! WILL_CALL_FINISH_DYNAMIC_SYMBOL (dyn, info, &h->elf))
30667bf3
AM
3630 {
3631 /* This is actually a static link, or it is a
3632 -Bsymbolic link and the symbol is defined
3633 locally, or the symbol was forced to be local
3634 because of a version file. We must initialize
3635 this entry in the global offset table. Since the
3636 offset must always be a multiple of 4, we use the
3637 least significant bit to record whether we have
3638 initialized it already.
3639
3640 When doing a dynamic link, we create a .rela.got
3641 relocation entry to initialize the value. This
3642 is done in the finish_dynamic_symbol routine. */
3643 if ((off & 1) != 0)
3644 off &= ~1;
3645 else
3646 {
3647 bfd_put_32 (output_bfd, relocation,
83c81bfe 3648 htab->sgot->contents + off);
30667bf3
AM
3649 h->elf.got.offset |= 1;
3650 }
3651 }
30667bf3
AM
3652 }
3653 else
3654 {
3655 /* Local symbol case. */
68fb2e56 3656 if (local_got_offsets == NULL)
49e9d0d3 3657 abort ();
30667bf3 3658
68fb2e56
AM
3659 off = local_got_offsets[r_symndx];
3660
30667bf3
AM
3661 /* The offset must always be a multiple of 4. We use
3662 the least significant bit to record whether we have
3663 already generated the necessary reloc. */
3664 if ((off & 1) != 0)
3665 off &= ~1;
3666 else
3667 {
3668 bfd_put_32 (output_bfd, relocation,
83c81bfe 3669 htab->sgot->contents + off);
30667bf3
AM
3670
3671 if (info->shared)
3672 {
8dea1268
AM
3673 /* Output a dynamic relocation for this GOT
3674 entry. In this case it is relative to the
3675 base of the object because the symbol index
3676 is zero. */
30667bf3 3677 Elf_Internal_Rela outrel;
83c81bfe 3678 asection *srelgot = htab->srelgot;
3ac8354b 3679 Elf32_External_Rela *loc;
30667bf3
AM
3680
3681 outrel.r_offset = (off
83c81bfe
AM
3682 + htab->sgot->output_offset
3683 + htab->sgot->output_section->vma);
74d1c347 3684 outrel.r_info = ELF32_R_INFO (0, R_PARISC_DIR32);
30667bf3 3685 outrel.r_addend = relocation;
3ac8354b
AM
3686 loc = (Elf32_External_Rela *) srelgot->contents;
3687 loc += srelgot->reloc_count++;
3688 bfd_elf32_swap_reloca_out (output_bfd, &outrel, loc);
30667bf3 3689 }
252b5132 3690
30667bf3
AM
3691 local_got_offsets[r_symndx] |= 1;
3692 }
30667bf3 3693 }
252b5132 3694
68fb2e56
AM
3695 if (off >= (bfd_vma) -2)
3696 abort ();
3697
30667bf3 3698 /* Add the base of the GOT to the relocation value. */
68fb2e56 3699 relocation = (off
83c81bfe
AM
3700 + htab->sgot->output_offset
3701 + htab->sgot->output_section->vma);
30667bf3 3702 break;
252b5132 3703
c46b7515
AM
3704 case R_PARISC_SEGREL32:
3705 /* If this is the first SEGREL relocation, then initialize
3706 the segment base values. */
83c81bfe
AM
3707 if (htab->text_segment_base == (bfd_vma) -1)
3708 bfd_map_over_sections (output_bfd, hppa_record_segment_addr, htab);
c46b7515
AM
3709 break;
3710
30667bf3
AM
3711 case R_PARISC_PLABEL14R:
3712 case R_PARISC_PLABEL21L:
3713 case R_PARISC_PLABEL32:
ebe50bae 3714 if (htab->elf.dynamic_sections_created)
252b5132 3715 {
74d1c347
AM
3716 /* If we have a global symbol with a PLT slot, then
3717 redirect this relocation to it. */
3718 if (h != NULL)
3719 {
3720 off = h->elf.plt.offset;
4dc86686 3721 if (! WILL_CALL_FINISH_DYNAMIC_SYMBOL (1, info, &h->elf))
8dea1268
AM
3722 {
3723 /* In a non-shared link, adjust_dynamic_symbols
3724 isn't called for symbols forced local. We
dc810e39 3725 need to write out the plt entry here. */
8dea1268
AM
3726 if ((off & 1) != 0)
3727 off &= ~1;
3728 else
3729 {
3730 bfd_put_32 (output_bfd,
3731 relocation,
83c81bfe 3732 htab->splt->contents + off);
8dea1268 3733 bfd_put_32 (output_bfd,
83c81bfe
AM
3734 elf_gp (htab->splt->output_section->owner),
3735 htab->splt->contents + off + 4);
8dea1268
AM
3736 h->elf.plt.offset |= 1;
3737 }
3738 }
74d1c347
AM
3739 }
3740 else
3741 {
68fb2e56
AM
3742 bfd_vma *local_plt_offsets;
3743
3744 if (local_got_offsets == NULL)
3745 abort ();
74d1c347 3746
68fb2e56
AM
3747 local_plt_offsets = local_got_offsets + symtab_hdr->sh_info;
3748 off = local_plt_offsets[r_symndx];
74d1c347
AM
3749
3750 /* As for the local .got entry case, we use the last
3751 bit to record whether we've already initialised
3752 this local .plt entry. */
3753 if ((off & 1) != 0)
3754 off &= ~1;
3755 else
3756 {
3757 bfd_put_32 (output_bfd,
3758 relocation,
83c81bfe 3759 htab->splt->contents + off);
74d1c347 3760 bfd_put_32 (output_bfd,
83c81bfe
AM
3761 elf_gp (htab->splt->output_section->owner),
3762 htab->splt->contents + off + 4);
74d1c347
AM
3763
3764 if (info->shared)
3765 {
3766 /* Output a dynamic IPLT relocation for this
3767 PLT entry. */
3768 Elf_Internal_Rela outrel;
83c81bfe 3769 asection *srelplt = htab->srelplt;
3ac8354b 3770 Elf32_External_Rela *loc;
74d1c347
AM
3771
3772 outrel.r_offset = (off
83c81bfe
AM
3773 + htab->splt->output_offset
3774 + htab->splt->output_section->vma);
74d1c347
AM
3775 outrel.r_info = ELF32_R_INFO (0, R_PARISC_IPLT);
3776 outrel.r_addend = relocation;
3ac8354b
AM
3777 loc = (Elf32_External_Rela *) srelplt->contents;
3778 loc += srelplt->reloc_count++;
3779 bfd_elf32_swap_reloca_out (output_bfd, &outrel, loc);
74d1c347
AM
3780 }
3781
68fb2e56 3782 local_plt_offsets[r_symndx] |= 1;
74d1c347
AM
3783 }
3784 }
3785
68fb2e56 3786 if (off >= (bfd_vma) -2)
49e9d0d3 3787 abort ();
74d1c347
AM
3788
3789 /* PLABELs contain function pointers. Relocation is to
3790 the entry for the function in the .plt. The magic +2
3791 offset signals to $$dyncall that the function pointer
3792 is in the .plt and thus has a gp pointer too.
3793 Exception: Undefined PLABELs should have a value of
3794 zero. */
3795 if (h == NULL
3796 || (h->elf.root.type != bfd_link_hash_undefweak
3797 && h->elf.root.type != bfd_link_hash_undefined))
3798 {
3799 relocation = (off
83c81bfe
AM
3800 + htab->splt->output_offset
3801 + htab->splt->output_section->vma
74d1c347
AM
3802 + 2);
3803 }
3804 plabel = 1;
30667bf3
AM
3805 }
3806 /* Fall through and possibly emit a dynamic relocation. */
3807
3808 case R_PARISC_DIR17F:
3809 case R_PARISC_DIR17R:
47d89dba 3810 case R_PARISC_DIR14F:
30667bf3
AM
3811 case R_PARISC_DIR14R:
3812 case R_PARISC_DIR21L:
3813 case R_PARISC_DPREL14F:
3814 case R_PARISC_DPREL14R:
3815 case R_PARISC_DPREL21L:
3816 case R_PARISC_DIR32:
3817 /* The reloc types handled here and this conditional
56882138
AM
3818 expression must match the code in ..check_relocs and
3819 ..discard_relocs. ie. We need exactly the same condition
3820 as in ..check_relocs, with some extra conditions (dynindx
3821 test in this case) to cater for relocs removed by
3822 ..discard_relocs. If you squint, the non-shared test
3823 here does indeed match the one in ..check_relocs, the
3824 difference being that here we test DEF_DYNAMIC as well as
3825 !DEF_REGULAR. All common syms end up with !DEF_REGULAR,
3826 which is why we can't use just that test here.
3827 Conversely, DEF_DYNAMIC can't be used in check_relocs as
3828 there all files have not been loaded. */
446f2863
AM
3829 if ((info->shared
3830 && (input_section->flags & SEC_ALLOC) != 0
3831 && (IS_ABSOLUTE_RELOC (r_type)
3832 || (h != NULL
3833 && h->elf.dynindx != -1
3834 && (!info->symbolic
3835 || (h->elf.elf_link_hash_flags
3836 & ELF_LINK_HASH_DEF_REGULAR) == 0))))
3837 || (!info->shared
3838 && (input_section->flags & SEC_ALLOC) != 0
3839 && h != NULL
3840 && h->elf.dynindx != -1
3841 && (h->elf.elf_link_hash_flags & ELF_LINK_NON_GOT_REF) == 0
56882138
AM
3842 && (((h->elf.elf_link_hash_flags
3843 & ELF_LINK_HASH_DEF_DYNAMIC) != 0
3844 && (h->elf.elf_link_hash_flags
3845 & ELF_LINK_HASH_DEF_REGULAR) == 0)
446f2863
AM
3846 || h->elf.root.type == bfd_link_hash_undefweak
3847 || h->elf.root.type == bfd_link_hash_undefined)))
30667bf3
AM
3848 {
3849 Elf_Internal_Rela outrel;
3850 boolean skip;
98ceb8ce
AM
3851 asection *sreloc;
3852 Elf32_External_Rela *loc;
252b5132 3853
30667bf3
AM
3854 /* When generating a shared object, these relocations
3855 are copied into the output file to be resolved at run
3856 time. */
252b5132 3857
30667bf3
AM
3858 outrel.r_offset = rel->r_offset;
3859 outrel.r_addend = rel->r_addend;
3860 skip = false;
3861 if (elf_section_data (input_section)->stab_info != NULL)
edd21aca 3862 {
30667bf3 3863 off = (_bfd_stab_section_offset
ebe50bae 3864 (output_bfd, &htab->elf.stab_info,
30667bf3
AM
3865 input_section,
3866 &elf_section_data (input_section)->stab_info,
3867 rel->r_offset));
3868 if (off == (bfd_vma) -1)
3869 skip = true;
3870 outrel.r_offset = off;
edd21aca 3871 }
252b5132 3872
30667bf3
AM
3873 outrel.r_offset += (input_section->output_offset
3874 + input_section->output_section->vma);
3875
3876 if (skip)
252b5132 3877 {
30667bf3 3878 memset (&outrel, 0, sizeof (outrel));
252b5132 3879 }
74d1c347
AM
3880 else if (h != NULL
3881 && h->elf.dynindx != -1
3882 && (plabel
446f2863
AM
3883 || !IS_ABSOLUTE_RELOC (r_type)
3884 || !info->shared
74d1c347 3885 || !info->symbolic
30667bf3
AM
3886 || (h->elf.elf_link_hash_flags
3887 & ELF_LINK_HASH_DEF_REGULAR) == 0))
252b5132 3888 {
30667bf3
AM
3889 outrel.r_info = ELF32_R_INFO (h->elf.dynindx, r_type);
3890 }
3891 else /* It's a local symbol, or one marked to become local. */
3892 {
3893 int indx = 0;
edd21aca 3894
30667bf3
AM
3895 /* Add the absolute offset of the symbol. */
3896 outrel.r_addend += relocation;
edd21aca 3897
74d1c347
AM
3898 /* Global plabels need to be processed by the
3899 dynamic linker so that functions have at most one
3900 fptr. For this reason, we need to differentiate
3901 between global and local plabels, which we do by
3902 providing the function symbol for a global plabel
3903 reloc, and no symbol for local plabels. */
3904 if (! plabel
3905 && sym_sec != NULL
30667bf3
AM
3906 && sym_sec->output_section != NULL
3907 && ! bfd_is_abs_section (sym_sec))
252b5132 3908 {
30667bf3
AM
3909 indx = elf_section_data (sym_sec->output_section)->dynindx;
3910 /* We are turning this relocation into one
3911 against a section symbol, so subtract out the
3912 output section's address but not the offset
3913 of the input section in the output section. */
3914 outrel.r_addend -= sym_sec->output_section->vma;
252b5132 3915 }
252b5132 3916
30667bf3
AM
3917 outrel.r_info = ELF32_R_INFO (indx, r_type);
3918 }
68fb2e56
AM
3919#if 0
3920 /* EH info can cause unaligned DIR32 relocs.
3921 Tweak the reloc type for the dynamic linker. */
3922 if (r_type == R_PARISC_DIR32 && (outrel.r_offset & 3) != 0)
3923 outrel.r_info = ELF32_R_INFO (ELF32_R_SYM (outrel.r_info),
3924 R_PARISC_DIR32U);
3925#endif
98ceb8ce
AM
3926 sreloc = elf_section_data (input_section)->sreloc;
3927 if (sreloc == NULL)
3928 abort ();
3929
3ac8354b
AM
3930 loc = (Elf32_External_Rela *) sreloc->contents;
3931 loc += sreloc->reloc_count++;
98ceb8ce 3932 bfd_elf32_swap_reloca_out (output_bfd, &outrel, loc);
30667bf3
AM
3933 }
3934 break;
edd21aca 3935
30667bf3
AM
3936 default:
3937 break;
3938 }
252b5132 3939
30667bf3 3940 r = final_link_relocate (input_section, contents, rel, relocation,
83c81bfe 3941 htab, sym_sec, h);
252b5132 3942
30667bf3
AM
3943 if (r == bfd_reloc_ok)
3944 continue;
252b5132 3945
30667bf3
AM
3946 if (h != NULL)
3947 sym_name = h->elf.root.root.string;
3948 else
3949 {
3950 sym_name = bfd_elf_string_from_elf_section (input_bfd,
3951 symtab_hdr->sh_link,
3952 sym->st_name);
3953 if (sym_name == NULL)
3954 return false;
3955 if (*sym_name == '\0')
3956 sym_name = bfd_section_name (input_bfd, sym_sec);
3957 }
edd21aca 3958
30667bf3 3959 howto = elf_hppa_howto_table + r_type;
252b5132 3960
30667bf3
AM
3961 if (r == bfd_reloc_undefined || r == bfd_reloc_notsupported)
3962 {
3963 (*_bfd_error_handler)
3964 (_("%s(%s+0x%lx): cannot handle %s for %s"),
8f615d07 3965 bfd_archive_filename (input_bfd),
30667bf3
AM
3966 input_section->name,
3967 (long) rel->r_offset,
3968 howto->name,
3969 sym_name);
8f615d07
AM
3970 bfd_set_error (bfd_error_bad_value);
3971 return false;
30667bf3
AM
3972 }
3973 else
3974 {
3975 if (!((*info->callbacks->reloc_overflow)
3976 (info, sym_name, howto->name, (bfd_vma) 0,
3977 input_bfd, input_section, rel->r_offset)))
3978 return false;
3979 }
3980 }
edd21aca 3981
30667bf3
AM
3982 return true;
3983}
252b5132 3984
c46b7515
AM
3985/* Comparison function for qsort to sort unwind section during a
3986 final link. */
3987
3988static int
3989hppa_unwind_entry_compare (a, b)
3990 const PTR a;
3991 const PTR b;
3992{
3993 const bfd_byte *ap, *bp;
3994 unsigned long av, bv;
3995
3996 ap = (const bfd_byte *) a;
3997 av = (unsigned long) ap[0] << 24;
3998 av |= (unsigned long) ap[1] << 16;
3999 av |= (unsigned long) ap[2] << 8;
4000 av |= (unsigned long) ap[3];
4001
4002 bp = (const bfd_byte *) b;
4003 bv = (unsigned long) bp[0] << 24;
4004 bv |= (unsigned long) bp[1] << 16;
4005 bv |= (unsigned long) bp[2] << 8;
4006 bv |= (unsigned long) bp[3];
4007
4008 return av < bv ? -1 : av > bv ? 1 : 0;
4009}
4010
30667bf3
AM
4011/* Finish up dynamic symbol handling. We set the contents of various
4012 dynamic sections here. */
252b5132 4013
30667bf3
AM
4014static boolean
4015elf32_hppa_finish_dynamic_symbol (output_bfd, info, h, sym)
4016 bfd *output_bfd;
4017 struct bfd_link_info *info;
4018 struct elf_link_hash_entry *h;
4019 Elf_Internal_Sym *sym;
4020{
83c81bfe 4021 struct elf32_hppa_link_hash_table *htab;
30667bf3 4022 bfd *dynobj;
edd21aca 4023
83c81bfe 4024 htab = hppa_link_hash_table (info);
ebe50bae 4025 dynobj = htab->elf.dynobj;
30667bf3 4026
30667bf3
AM
4027 if (h->plt.offset != (bfd_vma) -1)
4028 {
4029 bfd_vma value;
30667bf3 4030
8dea1268
AM
4031 if (h->plt.offset & 1)
4032 abort ();
4033
30667bf3
AM
4034 /* This symbol has an entry in the procedure linkage table. Set
4035 it up.
4036
4037 The format of a plt entry is
74d1c347
AM
4038 <funcaddr>
4039 <__gp>
47d89dba 4040 */
30667bf3
AM
4041 value = 0;
4042 if (h->root.type == bfd_link_hash_defined
4043 || h->root.type == bfd_link_hash_defweak)
4044 {
4045 value = h->root.u.def.value;
4046 if (h->root.u.def.section->output_section != NULL)
4047 value += (h->root.u.def.section->output_offset
4048 + h->root.u.def.section->output_section->vma);
252b5132 4049 }
edd21aca 4050
74d1c347 4051 if (! ((struct elf32_hppa_link_hash_entry *) h)->pic_call)
30667bf3 4052 {
47d89dba 4053 Elf_Internal_Rela rel;
3ac8354b 4054 Elf32_External_Rela *loc;
47d89dba 4055
30667bf3
AM
4056 /* Create a dynamic IPLT relocation for this entry. */
4057 rel.r_offset = (h->plt.offset
83c81bfe
AM
4058 + htab->splt->output_offset
4059 + htab->splt->output_section->vma);
74d1c347
AM
4060 if (! ((struct elf32_hppa_link_hash_entry *) h)->plt_abs
4061 && h->dynindx != -1)
4062 {
47d89dba
AM
4063 /* To support lazy linking, the function pointer is
4064 initialised to point to a special stub stored at the
8dea1268
AM
4065 end of the .plt. This is not done for plt entries
4066 with a base-relative dynamic relocation. */
83c81bfe
AM
4067 value = (htab->splt->output_offset
4068 + htab->splt->output_section->vma
4069 + htab->splt->_raw_size
47d89dba
AM
4070 - sizeof (plt_stub)
4071 + PLT_STUB_ENTRY);
74d1c347
AM
4072 rel.r_info = ELF32_R_INFO (h->dynindx, R_PARISC_IPLT);
4073 rel.r_addend = 0;
4074 }
4075 else
4076 {
4077 /* This symbol has been marked to become local, and is
4078 used by a plabel so must be kept in the .plt. */
4079 rel.r_info = ELF32_R_INFO (0, R_PARISC_IPLT);
4080 rel.r_addend = value;
4081 }
30667bf3 4082
3ac8354b
AM
4083 loc = (Elf32_External_Rela *) htab->srelplt->contents;
4084 loc += htab->srelplt->reloc_count++;
83c81bfe 4085 bfd_elf32_swap_reloca_out (htab->splt->output_section->owner,
3ac8354b 4086 &rel, loc);
30667bf3
AM
4087 }
4088
83c81bfe 4089 bfd_put_32 (htab->splt->owner,
47d89dba 4090 value,
83c81bfe
AM
4091 htab->splt->contents + h->plt.offset);
4092 bfd_put_32 (htab->splt->owner,
4093 elf_gp (htab->splt->output_section->owner),
4094 htab->splt->contents + h->plt.offset + 4);
47d89dba
AM
4095 if (PLABEL_PLT_ENTRY_SIZE != PLT_ENTRY_SIZE
4096 && ((struct elf32_hppa_link_hash_entry *) h)->plabel
4097 && h->dynindx != -1)
4098 {
83c81bfe 4099 memset (htab->splt->contents + h->plt.offset + 8,
47d89dba
AM
4100 0, PLABEL_PLT_ENTRY_SIZE - PLT_ENTRY_SIZE);
4101 }
4102
30667bf3
AM
4103 if ((h->elf_link_hash_flags & ELF_LINK_HASH_DEF_REGULAR) == 0)
4104 {
4105 /* Mark the symbol as undefined, rather than as defined in
4106 the .plt section. Leave the value alone. */
4107 sym->st_shndx = SHN_UNDEF;
4108 }
4109 }
edd21aca 4110
30667bf3
AM
4111 if (h->got.offset != (bfd_vma) -1)
4112 {
4113 Elf_Internal_Rela rel;
3ac8354b 4114 Elf32_External_Rela *loc;
30667bf3
AM
4115
4116 /* This symbol has an entry in the global offset table. Set it
4117 up. */
4118
4119 rel.r_offset = ((h->got.offset &~ (bfd_vma) 1)
83c81bfe
AM
4120 + htab->sgot->output_offset
4121 + htab->sgot->output_section->vma);
30667bf3 4122
4dc86686
AM
4123 /* If this is a -Bsymbolic link and the symbol is defined
4124 locally or was forced to be local because of a version file,
4125 we just want to emit a RELATIVE reloc. The entry in the
4126 global offset table will already have been initialized in the
4127 relocate_section function. */
4128 if (info->shared
4129 && (info->symbolic || h->dynindx == -1)
4130 && (h->elf_link_hash_flags & ELF_LINK_HASH_DEF_REGULAR))
30667bf3 4131 {
74d1c347 4132 rel.r_info = ELF32_R_INFO (0, R_PARISC_DIR32);
30667bf3
AM
4133 rel.r_addend = (h->root.u.def.value
4134 + h->root.u.def.section->output_offset
4135 + h->root.u.def.section->output_section->vma);
4136 }
4137 else
4138 {
49e9d0d3
AM
4139 if ((h->got.offset & 1) != 0)
4140 abort ();
30667bf3 4141 bfd_put_32 (output_bfd, (bfd_vma) 0,
83c81bfe 4142 htab->sgot->contents + h->got.offset);
30667bf3
AM
4143 rel.r_info = ELF32_R_INFO (h->dynindx, R_PARISC_DIR32);
4144 rel.r_addend = 0;
4145 }
edd21aca 4146
3ac8354b
AM
4147 loc = (Elf32_External_Rela *) htab->srelgot->contents;
4148 loc += htab->srelgot->reloc_count++;
4149 bfd_elf32_swap_reloca_out (output_bfd, &rel, loc);
30667bf3 4150 }
edd21aca 4151
30667bf3
AM
4152 if ((h->elf_link_hash_flags & ELF_LINK_HASH_NEEDS_COPY) != 0)
4153 {
4154 asection *s;
4155 Elf_Internal_Rela rel;
3ac8354b 4156 Elf32_External_Rela *loc;
30667bf3
AM
4157
4158 /* This symbol needs a copy reloc. Set it up. */
4159
49e9d0d3
AM
4160 if (! (h->dynindx != -1
4161 && (h->root.type == bfd_link_hash_defined
4162 || h->root.type == bfd_link_hash_defweak)))
4163 abort ();
30667bf3 4164
83c81bfe 4165 s = htab->srelbss;
30667bf3
AM
4166
4167 rel.r_offset = (h->root.u.def.value
4168 + h->root.u.def.section->output_offset
4169 + h->root.u.def.section->output_section->vma);
4170 rel.r_addend = 0;
4171 rel.r_info = ELF32_R_INFO (h->dynindx, R_PARISC_COPY);
3ac8354b
AM
4172 loc = (Elf32_External_Rela *) s->contents + s->reloc_count++;
4173 bfd_elf32_swap_reloca_out (output_bfd, &rel, loc);
30667bf3
AM
4174 }
4175
4176 /* Mark _DYNAMIC and _GLOBAL_OFFSET_TABLE_ as absolute. */
4177 if (h->root.root.string[0] == '_'
4178 && (strcmp (h->root.root.string, "_DYNAMIC") == 0
4179 || strcmp (h->root.root.string, "_GLOBAL_OFFSET_TABLE_") == 0))
4180 {
4181 sym->st_shndx = SHN_ABS;
4182 }
4183
4184 return true;
4185}
4186
98ceb8ce
AM
4187/* Used to decide how to sort relocs in an optimal manner for the
4188 dynamic linker, before writing them out. */
4189
4190static enum elf_reloc_type_class
4191elf32_hppa_reloc_type_class (rela)
4192 const Elf_Internal_Rela *rela;
4193{
4194 if (ELF32_R_SYM (rela->r_info) == 0)
4195 return reloc_class_relative;
4196
4197 switch ((int) ELF32_R_TYPE (rela->r_info))
4198 {
4199 case R_PARISC_IPLT:
4200 return reloc_class_plt;
4201 case R_PARISC_COPY:
4202 return reloc_class_copy;
4203 default:
4204 return reloc_class_normal;
4205 }
4206}
4207
30667bf3
AM
4208/* Finish up the dynamic sections. */
4209
4210static boolean
4211elf32_hppa_finish_dynamic_sections (output_bfd, info)
4212 bfd *output_bfd;
4213 struct bfd_link_info *info;
4214{
4215 bfd *dynobj;
83c81bfe 4216 struct elf32_hppa_link_hash_table *htab;
30667bf3
AM
4217 asection *sdyn;
4218
83c81bfe 4219 htab = hppa_link_hash_table (info);
ebe50bae 4220 dynobj = htab->elf.dynobj;
30667bf3
AM
4221
4222 sdyn = bfd_get_section_by_name (dynobj, ".dynamic");
4223
ebe50bae 4224 if (htab->elf.dynamic_sections_created)
30667bf3
AM
4225 {
4226 Elf32_External_Dyn *dyncon, *dynconend;
4227
49e9d0d3
AM
4228 if (sdyn == NULL)
4229 abort ();
30667bf3
AM
4230
4231 dyncon = (Elf32_External_Dyn *) sdyn->contents;
4232 dynconend = (Elf32_External_Dyn *) (sdyn->contents + sdyn->_raw_size);
4233 for (; dyncon < dynconend; dyncon++)
edd21aca 4234 {
30667bf3
AM
4235 Elf_Internal_Dyn dyn;
4236 asection *s;
4237
4238 bfd_elf32_swap_dyn_in (dynobj, dyncon, &dyn);
4239
4240 switch (dyn.d_tag)
4241 {
4242 default:
3ac8354b 4243 continue;
30667bf3
AM
4244
4245 case DT_PLTGOT:
4246 /* Use PLTGOT to set the GOT register. */
4247 dyn.d_un.d_ptr = elf_gp (output_bfd);
30667bf3
AM
4248 break;
4249
4250 case DT_JMPREL:
83c81bfe 4251 s = htab->srelplt;
30667bf3 4252 dyn.d_un.d_ptr = s->output_section->vma + s->output_offset;
30667bf3
AM
4253 break;
4254
4255 case DT_PLTRELSZ:
83c81bfe 4256 s = htab->srelplt;
30667bf3
AM
4257 if (s->_cooked_size != 0)
4258 dyn.d_un.d_val = s->_cooked_size;
4259 else
4260 dyn.d_un.d_val = s->_raw_size;
30667bf3
AM
4261 break;
4262 }
3ac8354b
AM
4263
4264 bfd_elf32_swap_dyn_out (output_bfd, &dyn, dyncon);
edd21aca 4265 }
252b5132 4266 }
edd21aca 4267
83c81bfe 4268 if (htab->sgot != NULL && htab->sgot->_raw_size != 0)
30667bf3 4269 {
74d1c347
AM
4270 /* Fill in the first entry in the global offset table.
4271 We use it to point to our dynamic section, if we have one. */
30667bf3
AM
4272 bfd_put_32 (output_bfd,
4273 (sdyn != NULL
4274 ? sdyn->output_section->vma + sdyn->output_offset
4275 : (bfd_vma) 0),
83c81bfe 4276 htab->sgot->contents);
30667bf3 4277
74d1c347 4278 /* The second entry is reserved for use by the dynamic linker. */
83c81bfe 4279 memset (htab->sgot->contents + GOT_ENTRY_SIZE, 0, GOT_ENTRY_SIZE);
74d1c347 4280
30667bf3 4281 /* Set .got entry size. */
83c81bfe 4282 elf_section_data (htab->sgot->output_section)
74d1c347 4283 ->this_hdr.sh_entsize = GOT_ENTRY_SIZE;
30667bf3
AM
4284 }
4285
83c81bfe 4286 if (htab->splt != NULL && htab->splt->_raw_size != 0)
47d89dba
AM
4287 {
4288 /* Set plt entry size. */
83c81bfe 4289 elf_section_data (htab->splt->output_section)
47d89dba
AM
4290 ->this_hdr.sh_entsize = PLT_ENTRY_SIZE;
4291
83c81bfe 4292 if (htab->need_plt_stub)
47d89dba
AM
4293 {
4294 /* Set up the .plt stub. */
83c81bfe
AM
4295 memcpy (htab->splt->contents
4296 + htab->splt->_raw_size - sizeof (plt_stub),
47d89dba
AM
4297 plt_stub, sizeof (plt_stub));
4298
83c81bfe
AM
4299 if ((htab->splt->output_offset
4300 + htab->splt->output_section->vma
4301 + htab->splt->_raw_size)
4302 != (htab->sgot->output_offset
4303 + htab->sgot->output_section->vma))
47d89dba
AM
4304 {
4305 (*_bfd_error_handler)
4306 (_(".got section not immediately after .plt section"));
4307 return false;
4308 }
4309 }
4310 }
30667bf3 4311
252b5132 4312 return true;
30667bf3 4313}
252b5132 4314
d952f17a
AM
4315/* Tweak the OSABI field of the elf header. */
4316
4317static void
4318elf32_hppa_post_process_headers (abfd, link_info)
4319 bfd *abfd;
4320 struct bfd_link_info *link_info ATTRIBUTE_UNUSED;
4321{
4322 Elf_Internal_Ehdr * i_ehdrp;
4323
4324 i_ehdrp = elf_elfheader (abfd);
4325
4326 if (strcmp (bfd_get_target (abfd), "elf32-hppa-linux") == 0)
4327 {
4328 i_ehdrp->e_ident[EI_OSABI] = ELFOSABI_LINUX;
4329 }
4330 else
4331 {
4332 i_ehdrp->e_ident[EI_OSABI] = ELFOSABI_HPUX;
4333 }
4334}
4335
30667bf3
AM
4336/* Called when writing out an object file to decide the type of a
4337 symbol. */
4338static int
4339elf32_hppa_elf_get_symbol_type (elf_sym, type)
4340 Elf_Internal_Sym *elf_sym;
4341 int type;
4342{
4343 if (ELF_ST_TYPE (elf_sym->st_info) == STT_PARISC_MILLI)
4344 return STT_PARISC_MILLI;
4345 else
4346 return type;
252b5132
RH
4347}
4348
4349/* Misc BFD support code. */
30667bf3
AM
4350#define bfd_elf32_bfd_is_local_label_name elf_hppa_is_local_label_name
4351#define bfd_elf32_bfd_reloc_type_lookup elf_hppa_reloc_type_lookup
4352#define elf_info_to_howto elf_hppa_info_to_howto
4353#define elf_info_to_howto_rel elf_hppa_info_to_howto_rel
252b5132 4354
252b5132 4355/* Stuff for the BFD linker. */
c46b7515 4356#define bfd_elf32_bfd_final_link elf32_hppa_final_link
30667bf3
AM
4357#define bfd_elf32_bfd_link_hash_table_create elf32_hppa_link_hash_table_create
4358#define elf_backend_add_symbol_hook elf32_hppa_add_symbol_hook
4359#define elf_backend_adjust_dynamic_symbol elf32_hppa_adjust_dynamic_symbol
ebe50bae 4360#define elf_backend_copy_indirect_symbol elf32_hppa_copy_indirect_symbol
30667bf3
AM
4361#define elf_backend_check_relocs elf32_hppa_check_relocs
4362#define elf_backend_create_dynamic_sections elf32_hppa_create_dynamic_sections
4363#define elf_backend_fake_sections elf_hppa_fake_sections
4364#define elf_backend_relocate_section elf32_hppa_relocate_section
74d1c347 4365#define elf_backend_hide_symbol elf32_hppa_hide_symbol
30667bf3
AM
4366#define elf_backend_finish_dynamic_symbol elf32_hppa_finish_dynamic_symbol
4367#define elf_backend_finish_dynamic_sections elf32_hppa_finish_dynamic_sections
4368#define elf_backend_size_dynamic_sections elf32_hppa_size_dynamic_sections
4369#define elf_backend_gc_mark_hook elf32_hppa_gc_mark_hook
4370#define elf_backend_gc_sweep_hook elf32_hppa_gc_sweep_hook
4371#define elf_backend_object_p elf32_hppa_object_p
4372#define elf_backend_final_write_processing elf_hppa_final_write_processing
d952f17a 4373#define elf_backend_post_process_headers elf32_hppa_post_process_headers
30667bf3 4374#define elf_backend_get_symbol_type elf32_hppa_elf_get_symbol_type
98ceb8ce 4375#define elf_backend_reloc_type_class elf32_hppa_reloc_type_class
30667bf3
AM
4376
4377#define elf_backend_can_gc_sections 1
4378#define elf_backend_plt_alignment 2
4379#define elf_backend_want_got_plt 0
4380#define elf_backend_plt_readonly 0
4381#define elf_backend_want_plt_sym 0
74d1c347 4382#define elf_backend_got_header_size 8
252b5132
RH
4383
4384#define TARGET_BIG_SYM bfd_elf32_hppa_vec
4385#define TARGET_BIG_NAME "elf32-hppa"
4386#define ELF_ARCH bfd_arch_hppa
4387#define ELF_MACHINE_CODE EM_PARISC
4388#define ELF_MAXPAGESIZE 0x1000
4389
4390#include "elf32-target.h"
d952f17a
AM
4391
4392#undef TARGET_BIG_SYM
4393#define TARGET_BIG_SYM bfd_elf32_hppa_linux_vec
4394#undef TARGET_BIG_NAME
4395#define TARGET_BIG_NAME "elf32-hppa-linux"
4396
4397#define INCLUDED_TARGET_FILE 1
4398#include "elf32-target.h"