]> git.ipfire.org Git - thirdparty/binutils-gdb.git/blame - bfd/elf32-hppa.c
readonly_dynrelocs
[thirdparty/binutils-gdb.git] / bfd / elf32-hppa.c
CommitLineData
252b5132 1/* BFD back-end for HP PA-RISC ELF files.
2571583a 2 Copyright (C) 1990-2017 Free Software Foundation, Inc.
252b5132 3
30667bf3 4 Original code by
252b5132
RH
5 Center for Software Science
6 Department of Computer Science
7 University of Utah
30667bf3 8 Largely rewritten by Alan Modra <alan@linuxcare.com.au>
9b52905e
NC
9 Naming cleanup by Carlos O'Donell <carlos@systemhalted.org>
10 TLS support written by Randolph Chung <tausq@debian.org>
68ffbac6 11
ae9a127f 12 This file is part of BFD, the Binary File Descriptor library.
252b5132 13
ae9a127f
NC
14 This program is free software; you can redistribute it and/or modify
15 it under the terms of the GNU General Public License as published by
cd123cb7 16 the Free Software Foundation; either version 3 of the License, or
ae9a127f 17 (at your option) any later version.
252b5132 18
ae9a127f
NC
19 This program is distributed in the hope that it will be useful,
20 but WITHOUT ANY WARRANTY; without even the implied warranty of
21 MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
22 GNU General Public License for more details.
252b5132 23
ae9a127f
NC
24 You should have received a copy of the GNU General Public License
25 along with this program; if not, write to the Free Software
cd123cb7
NC
26 Foundation, Inc., 51 Franklin Street - Fifth Floor, Boston,
27 MA 02110-1301, USA. */
252b5132 28
252b5132 29#include "sysdep.h"
3db64b00 30#include "bfd.h"
252b5132
RH
31#include "libbfd.h"
32#include "elf-bfd.h"
9e103c9c
JL
33#include "elf/hppa.h"
34#include "libhppa.h"
35#include "elf32-hppa.h"
36#define ARCH_SIZE 32
edd21aca 37#include "elf32-hppa.h"
189c6563 38#include "elf-hppa.h"
9e103c9c 39
74d1c347
AM
40/* In order to gain some understanding of code in this file without
41 knowing all the intricate details of the linker, note the
42 following:
43
44 Functions named elf32_hppa_* are called by external routines, other
45 functions are only called locally. elf32_hppa_* functions appear
46 in this file more or less in the order in which they are called
47 from external routines. eg. elf32_hppa_check_relocs is called
48 early in the link process, elf32_hppa_finish_dynamic_sections is
49 one of the last functions. */
50
edd21aca 51/* We use two hash tables to hold information for linking PA ELF objects.
252b5132
RH
52
53 The first is the elf32_hppa_link_hash_table which is derived
54 from the standard ELF linker hash table. We use this as a place to
55 attach other hash tables and static information.
56
57 The second is the stub hash table which is derived from the
58 base BFD hash table. The stub hash table holds the information
30667bf3
AM
59 necessary to build the linker stubs during a link.
60
61 There are a number of different stubs generated by the linker.
62
63 Long branch stub:
64 : ldil LR'X,%r1
65 : be,n RR'X(%sr4,%r1)
66
67 PIC long branch stub:
68 : b,l .+8,%r1
3ee1d854
AM
69 : addil LR'X - ($PIC_pcrel$0 - 4),%r1
70 : be,n RR'X - ($PIC_pcrel$0 - 8)(%sr4,%r1)
30667bf3
AM
71
72 Import stub to call shared library routine from normal object file
73 (single sub-space version)
3ee1d854
AM
74 : addil LR'lt_ptr+ltoff,%dp ; get procedure entry point
75 : ldw RR'lt_ptr+ltoff(%r1),%r21
46fe4e66 76 : bv %r0(%r21)
3ee1d854 77 : ldw RR'lt_ptr+ltoff+4(%r1),%r19 ; get new dlt value.
30667bf3
AM
78
79 Import stub to call shared library routine from shared library
80 (single sub-space version)
3ee1d854
AM
81 : addil LR'ltoff,%r19 ; get procedure entry point
82 : ldw RR'ltoff(%r1),%r21
46fe4e66 83 : bv %r0(%r21)
3ee1d854 84 : ldw RR'ltoff+4(%r1),%r19 ; get new dlt value.
30667bf3
AM
85
86 Import stub to call shared library routine from normal object file
87 (multiple sub-space support)
3ee1d854
AM
88 : addil LR'lt_ptr+ltoff,%dp ; get procedure entry point
89 : ldw RR'lt_ptr+ltoff(%r1),%r21
90 : ldw RR'lt_ptr+ltoff+4(%r1),%r19 ; get new dlt value.
30667bf3
AM
91 : ldsid (%r21),%r1
92 : mtsp %r1,%sr0
93 : be 0(%sr0,%r21) ; branch to target
94 : stw %rp,-24(%sp) ; save rp
95
96 Import stub to call shared library routine from shared library
97 (multiple sub-space support)
3ee1d854
AM
98 : addil LR'ltoff,%r19 ; get procedure entry point
99 : ldw RR'ltoff(%r1),%r21
100 : ldw RR'ltoff+4(%r1),%r19 ; get new dlt value.
30667bf3
AM
101 : ldsid (%r21),%r1
102 : mtsp %r1,%sr0
103 : be 0(%sr0,%r21) ; branch to target
104 : stw %rp,-24(%sp) ; save rp
105
106 Export stub to return from shared lib routine (multiple sub-space support)
107 One of these is created for each exported procedure in a shared
108 library (and stored in the shared lib). Shared lib routines are
109 called via the first instruction in the export stub so that we can
110 do an inter-space return. Not required for single sub-space.
111 : bl,n X,%rp ; trap the return
112 : nop
113 : ldw -24(%sp),%rp ; restore the original rp
114 : ldsid (%rp),%r1
115 : mtsp %r1,%sr0
ae9a127f 116 : be,n 0(%sr0,%rp) ; inter-space return. */
30667bf3 117
875c0872
DA
118
119/* Variable names follow a coding style.
120 Please follow this (Apps Hungarian) style:
121
122 Structure/Variable Prefix
123 elf_link_hash_table "etab"
124 elf_link_hash_entry "eh"
68ffbac6 125
875c0872
DA
126 elf32_hppa_link_hash_table "htab"
127 elf32_hppa_link_hash_entry "hh"
128
129 bfd_hash_table "btab"
130 bfd_hash_entry "bh"
68ffbac6 131
875c0872
DA
132 bfd_hash_table containing stubs "bstab"
133 elf32_hppa_stub_hash_entry "hsh"
134
135 elf32_hppa_dyn_reloc_entry "hdh"
68ffbac6 136
875c0872 137 Always remember to use GNU Coding Style. */
68ffbac6 138
30667bf3
AM
139#define PLT_ENTRY_SIZE 8
140#define GOT_ENTRY_SIZE 4
141#define ELF_DYNAMIC_INTERPRETER "/lib/ld.so.1"
142
47d89dba
AM
143static const bfd_byte plt_stub[] =
144{
145 0x0e, 0x80, 0x10, 0x96, /* 1: ldw 0(%r20),%r22 */
146 0xea, 0xc0, 0xc0, 0x00, /* bv %r0(%r22) */
147 0x0e, 0x88, 0x10, 0x95, /* ldw 4(%r20),%r21 */
148#define PLT_STUB_ENTRY (3*4)
149 0xea, 0x9f, 0x1f, 0xdd, /* b,l 1b,%r20 */
150 0xd6, 0x80, 0x1c, 0x1e, /* depi 0,31,2,%r20 */
151 0x00, 0xc0, 0xff, 0xee, /* 9: .word fixup_func */
152 0xde, 0xad, 0xbe, 0xef /* .word fixup_ltp */
153};
154
30667bf3 155/* Section name for stubs is the associated section name plus this
29942be8
NC
156 string. */
157#define STUB_SUFFIX ".stub"
30667bf3 158
98ceb8ce
AM
159/* We don't need to copy certain PC- or GP-relative dynamic relocs
160 into a shared object's dynamic section. All the relocs of the
161 limited class we are interested in, are absolute. */
162#ifndef RELATIVE_DYNRELOCS
163#define RELATIVE_DYNRELOCS 0
446f2863 164#define IS_ABSOLUTE_RELOC(r_type) 1
287c7eaf 165#define pc_dynrelocs(hh) 0
30667bf3
AM
166#endif
167
4fc8051d
AM
168/* If ELIMINATE_COPY_RELOCS is non-zero, the linker will try to avoid
169 copying dynamic variables from a shared lib into an app's dynbss
170 section, and instead use a dynamic relocation to point into the
171 shared lib. */
172#define ELIMINATE_COPY_RELOCS 1
173
9b52905e
NC
174enum elf32_hppa_stub_type
175{
30667bf3
AM
176 hppa_stub_long_branch,
177 hppa_stub_long_branch_shared,
178 hppa_stub_import,
179 hppa_stub_import_shared,
180 hppa_stub_export,
181 hppa_stub_none
182};
183
9b52905e
NC
184struct elf32_hppa_stub_hash_entry
185{
edd21aca 186 /* Base hash table entry structure. */
a63e02c7 187 struct bfd_hash_entry bh_root;
252b5132 188
edd21aca
AM
189 /* The stub section. */
190 asection *stub_sec;
191
192 /* Offset within stub_sec of the beginning of this stub. */
30667bf3 193 bfd_vma stub_offset;
252b5132
RH
194
195 /* Given the symbol's value and its section we can determine its final
196 value when building the stubs (so the stub knows where to jump. */
30667bf3 197 bfd_vma target_value;
252b5132 198 asection *target_section;
30667bf3
AM
199
200 enum elf32_hppa_stub_type stub_type;
201
202 /* The symbol table entry, if any, that this was derived from. */
a63e02c7 203 struct elf32_hppa_link_hash_entry *hh;
30667bf3 204
25f72752
AM
205 /* Where this stub is being called from, or, in the case of combined
206 stub sections, the first input section in the group. */
207 asection *id_sec;
252b5132
RH
208};
209
2e684e75
AM
210enum _tls_type
211 {
212 GOT_UNKNOWN = 0,
213 GOT_NORMAL = 1,
214 GOT_TLS_GD = 2,
215 GOT_TLS_LDM = 4,
216 GOT_TLS_IE = 8
217 };
218
9b52905e
NC
219struct elf32_hppa_link_hash_entry
220{
a63e02c7 221 struct elf_link_hash_entry eh;
30667bf3
AM
222
223 /* A pointer to the most recently used stub hash entry against this
224 symbol. */
a63e02c7 225 struct elf32_hppa_stub_hash_entry *hsh_cache;
30667bf3 226
30667bf3
AM
227 /* Used to count relocations for delayed sizing of relocation
228 sections. */
9b52905e
NC
229 struct elf32_hppa_dyn_reloc_entry
230 {
30667bf3 231 /* Next relocation in the chain. */
a63e02c7 232 struct elf32_hppa_dyn_reloc_entry *hdh_next;
30667bf3 233
98ceb8ce
AM
234 /* The input section of the reloc. */
235 asection *sec;
30667bf3
AM
236
237 /* Number of relocs copied in this section. */
238 bfd_size_type count;
98ceb8ce
AM
239
240#if RELATIVE_DYNRELOCS
241 /* Number of relative relocs copied for the input section. */
242 bfd_size_type relative_count;
243#endif
244 } *dyn_relocs;
30667bf3 245
2e684e75 246 ENUM_BITFIELD (_tls_type) tls_type : 8;
9b52905e 247
74d1c347
AM
248 /* Set if this symbol is used by a plabel reloc. */
249 unsigned int plabel:1;
30667bf3
AM
250};
251
9b52905e
NC
252struct elf32_hppa_link_hash_table
253{
252b5132 254 /* The main hash table. */
a63e02c7 255 struct elf_link_hash_table etab;
252b5132
RH
256
257 /* The stub hash table. */
a63e02c7 258 struct bfd_hash_table bstab;
252b5132 259
30667bf3
AM
260 /* Linker stub bfd. */
261 bfd *stub_bfd;
262
30667bf3 263 /* Linker call-backs. */
c39a58e6
AM
264 asection * (*add_stub_section) (const char *, asection *);
265 void (*layout_sections_again) (void);
30667bf3 266
25f72752
AM
267 /* Array to keep track of which stub sections have been created, and
268 information on stub grouping. */
9b52905e
NC
269 struct map_stub
270 {
25f72752
AM
271 /* This is the section to which stubs in the group will be
272 attached. */
273 asection *link_sec;
274 /* The stub section. */
275 asection *stub_sec;
25f72752 276 } *stub_group;
30667bf3 277
b4655ea9
AM
278 /* Assorted information used by elf32_hppa_size_stubs. */
279 unsigned int bfd_count;
7292b3ac 280 unsigned int top_index;
b4655ea9
AM
281 asection **input_list;
282 Elf_Internal_Sym **all_local_syms;
283
c46b7515
AM
284 /* Used during a final link to store the base of the text and data
285 segments so that we can perform SEGREL relocations. */
286 bfd_vma text_segment_base;
287 bfd_vma data_segment_base;
288
47d89dba
AM
289 /* Whether we support multiple sub-spaces for shared libs. */
290 unsigned int multi_subspace:1;
291
067fa4a6 292 /* Flags set when various size branches are detected. Used to
47d89dba
AM
293 select suitable defaults for the stub group size. */
294 unsigned int has_12bit_branch:1;
295 unsigned int has_17bit_branch:1;
067fa4a6 296 unsigned int has_22bit_branch:1;
47d89dba
AM
297
298 /* Set if we need a .plt stub to support lazy dynamic linking. */
299 unsigned int need_plt_stub:1;
ec338859 300
87d72d41
AM
301 /* Small local sym cache. */
302 struct sym_cache sym_cache;
9b52905e
NC
303
304 /* Data for LDM relocations. */
305 union
306 {
307 bfd_signed_vma refcount;
308 bfd_vma offset;
309 } tls_ldm_got;
252b5132
RH
310};
311
30667bf3
AM
312/* Various hash macros and functions. */
313#define hppa_link_hash_table(p) \
4dfe6ac6
NC
314 (elf_hash_table_id ((struct elf_link_hash_table *) ((p)->hash)) \
315 == HPPA32_ELF_DATA ? ((struct elf32_hppa_link_hash_table *) ((p)->hash)) : NULL)
252b5132 316
875c0872
DA
317#define hppa_elf_hash_entry(ent) \
318 ((struct elf32_hppa_link_hash_entry *)(ent))
319
320#define hppa_stub_hash_entry(ent) \
321 ((struct elf32_hppa_stub_hash_entry *)(ent))
322
30667bf3
AM
323#define hppa_stub_hash_lookup(table, string, create, copy) \
324 ((struct elf32_hppa_stub_hash_entry *) \
325 bfd_hash_lookup ((table), (string), (create), (copy)))
326
9b52905e
NC
327#define hppa_elf_local_got_tls_type(abfd) \
328 ((char *)(elf_local_got_offsets (abfd) + (elf_tdata (abfd)->symtab_hdr.sh_info * 2)))
329
330#define hh_name(hh) \
331 (hh ? hh->eh.root.root.string : "<undef>")
332
333#define eh_name(eh) \
334 (eh ? eh->root.root.string : "<undef>")
335
252b5132
RH
336/* Assorted hash table functions. */
337
338/* Initialize an entry in the stub hash table. */
339
340static struct bfd_hash_entry *
c39a58e6
AM
341stub_hash_newfunc (struct bfd_hash_entry *entry,
342 struct bfd_hash_table *table,
343 const char *string)
252b5132 344{
252b5132
RH
345 /* Allocate the structure if it has not already been allocated by a
346 subclass. */
ebe50bae 347 if (entry == NULL)
30667bf3 348 {
ebe50bae
AM
349 entry = bfd_hash_allocate (table,
350 sizeof (struct elf32_hppa_stub_hash_entry));
351 if (entry == NULL)
352 return entry;
30667bf3 353 }
252b5132
RH
354
355 /* Call the allocation method of the superclass. */
ebe50bae
AM
356 entry = bfd_hash_newfunc (entry, table, string);
357 if (entry != NULL)
252b5132 358 {
875c0872 359 struct elf32_hppa_stub_hash_entry *hsh;
ebe50bae 360
252b5132 361 /* Initialize the local fields. */
875c0872
DA
362 hsh = hppa_stub_hash_entry (entry);
363 hsh->stub_sec = NULL;
364 hsh->stub_offset = 0;
365 hsh->target_value = 0;
366 hsh->target_section = NULL;
367 hsh->stub_type = hppa_stub_long_branch;
a63e02c7 368 hsh->hh = NULL;
875c0872 369 hsh->id_sec = NULL;
30667bf3
AM
370 }
371
ebe50bae 372 return entry;
30667bf3
AM
373}
374
30667bf3
AM
375/* Initialize an entry in the link hash table. */
376
377static struct bfd_hash_entry *
c39a58e6
AM
378hppa_link_hash_newfunc (struct bfd_hash_entry *entry,
379 struct bfd_hash_table *table,
380 const char *string)
30667bf3 381{
30667bf3
AM
382 /* Allocate the structure if it has not already been allocated by a
383 subclass. */
ebe50bae 384 if (entry == NULL)
30667bf3 385 {
ebe50bae
AM
386 entry = bfd_hash_allocate (table,
387 sizeof (struct elf32_hppa_link_hash_entry));
388 if (entry == NULL)
389 return entry;
30667bf3
AM
390 }
391
392 /* Call the allocation method of the superclass. */
ebe50bae
AM
393 entry = _bfd_elf_link_hash_newfunc (entry, table, string);
394 if (entry != NULL)
30667bf3 395 {
875c0872 396 struct elf32_hppa_link_hash_entry *hh;
ebe50bae 397
30667bf3 398 /* Initialize the local fields. */
875c0872 399 hh = hppa_elf_hash_entry (entry);
a63e02c7 400 hh->hsh_cache = NULL;
875c0872
DA
401 hh->dyn_relocs = NULL;
402 hh->plabel = 0;
9b52905e 403 hh->tls_type = GOT_UNKNOWN;
252b5132
RH
404 }
405
ebe50bae 406 return entry;
252b5132
RH
407}
408
68faa637
AM
409/* Free the derived linker hash table. */
410
411static void
d495ab0d 412elf32_hppa_link_hash_table_free (bfd *obfd)
68faa637
AM
413{
414 struct elf32_hppa_link_hash_table *htab
d495ab0d 415 = (struct elf32_hppa_link_hash_table *) obfd->link.hash;
68faa637
AM
416
417 bfd_hash_table_free (&htab->bstab);
d495ab0d 418 _bfd_elf_link_hash_table_free (obfd);
68faa637
AM
419}
420
252b5132
RH
421/* Create the derived linker hash table. The PA ELF port uses the derived
422 hash table to keep information specific to the PA ELF linker (without
423 using static variables). */
424
425static struct bfd_link_hash_table *
c39a58e6 426elf32_hppa_link_hash_table_create (bfd *abfd)
252b5132 427{
875c0872
DA
428 struct elf32_hppa_link_hash_table *htab;
429 bfd_size_type amt = sizeof (*htab);
252b5132 430
7bf52ea2 431 htab = bfd_zmalloc (amt);
875c0872 432 if (htab == NULL)
252b5132 433 return NULL;
edd21aca 434
66eb6687 435 if (!_bfd_elf_link_hash_table_init (&htab->etab, abfd, hppa_link_hash_newfunc,
4dfe6ac6
NC
436 sizeof (struct elf32_hppa_link_hash_entry),
437 HPPA32_ELF_DATA))
252b5132 438 {
875c0872 439 free (htab);
252b5132
RH
440 return NULL;
441 }
edd21aca
AM
442
443 /* Init the stub hash table too. */
66eb6687
AM
444 if (!bfd_hash_table_init (&htab->bstab, stub_hash_newfunc,
445 sizeof (struct elf32_hppa_stub_hash_entry)))
d495ab0d
AM
446 {
447 _bfd_elf_link_hash_table_free (abfd);
448 return NULL;
449 }
450 htab->etab.root.hash_table_free = elf32_hppa_link_hash_table_free;
edd21aca 451
875c0872
DA
452 htab->text_segment_base = (bfd_vma) -1;
453 htab->data_segment_base = (bfd_vma) -1;
a63e02c7 454 return &htab->etab.root;
252b5132
RH
455}
456
a464198b
AM
457/* Initialize the linker stubs BFD so that we can use it for linker
458 created dynamic sections. */
459
460void
461elf32_hppa_init_stub_bfd (bfd *abfd, struct bfd_link_info *info)
462{
463 struct elf32_hppa_link_hash_table *htab = hppa_link_hash_table (info);
464
465 elf_elfheader (abfd)->e_ident[EI_CLASS] = ELFCLASS32;
466 htab->etab.dynobj = abfd;
467}
468
30667bf3
AM
469/* Build a name for an entry in the stub hash table. */
470
edd21aca 471static char *
c39a58e6
AM
472hppa_stub_name (const asection *input_section,
473 const asection *sym_sec,
875c0872
DA
474 const struct elf32_hppa_link_hash_entry *hh,
475 const Elf_Internal_Rela *rela)
edd21aca
AM
476{
477 char *stub_name;
dc810e39 478 bfd_size_type len;
edd21aca 479
875c0872 480 if (hh)
30667bf3 481 {
9b52905e 482 len = 8 + 1 + strlen (hh_name (hh)) + 1 + 8 + 1;
30667bf3
AM
483 stub_name = bfd_malloc (len);
484 if (stub_name != NULL)
9b52905e
NC
485 sprintf (stub_name, "%08x_%s+%x",
486 input_section->id & 0xffffffff,
487 hh_name (hh),
488 (int) rela->r_addend & 0xffffffff);
30667bf3
AM
489 }
490 else
edd21aca 491 {
30667bf3
AM
492 len = 8 + 1 + 8 + 1 + 8 + 1 + 8 + 1;
493 stub_name = bfd_malloc (len);
494 if (stub_name != NULL)
9b52905e
NC
495 sprintf (stub_name, "%08x_%x:%x+%x",
496 input_section->id & 0xffffffff,
497 sym_sec->id & 0xffffffff,
498 (int) ELF32_R_SYM (rela->r_info) & 0xffffffff,
499 (int) rela->r_addend & 0xffffffff);
edd21aca
AM
500 }
501 return stub_name;
502}
252b5132 503
30667bf3
AM
504/* Look up an entry in the stub hash. Stub entries are cached because
505 creating the stub name takes a bit of time. */
506
507static struct elf32_hppa_stub_hash_entry *
c39a58e6
AM
508hppa_get_stub_entry (const asection *input_section,
509 const asection *sym_sec,
875c0872
DA
510 struct elf32_hppa_link_hash_entry *hh,
511 const Elf_Internal_Rela *rela,
c39a58e6 512 struct elf32_hppa_link_hash_table *htab)
252b5132 513{
a63e02c7 514 struct elf32_hppa_stub_hash_entry *hsh_entry;
25f72752
AM
515 const asection *id_sec;
516
517 /* If this input section is part of a group of sections sharing one
518 stub section, then use the id of the first section in the group.
519 Stub names need to include a section id, as there may well be
520 more than one stub used to reach say, printf, and we need to
521 distinguish between them. */
83c81bfe 522 id_sec = htab->stub_group[input_section->id].link_sec;
edd21aca 523
a63e02c7
DA
524 if (hh != NULL && hh->hsh_cache != NULL
525 && hh->hsh_cache->hh == hh
526 && hh->hsh_cache->id_sec == id_sec)
edd21aca 527 {
a63e02c7 528 hsh_entry = hh->hsh_cache;
30667bf3
AM
529 }
530 else
531 {
30667bf3 532 char *stub_name;
edd21aca 533
875c0872 534 stub_name = hppa_stub_name (id_sec, sym_sec, hh, rela);
30667bf3
AM
535 if (stub_name == NULL)
536 return NULL;
edd21aca 537
a63e02c7 538 hsh_entry = hppa_stub_hash_lookup (&htab->bstab,
b34976b6 539 stub_name, FALSE, FALSE);
875c0872 540 if (hh != NULL)
a63e02c7 541 hh->hsh_cache = hsh_entry;
30667bf3
AM
542
543 free (stub_name);
edd21aca 544 }
30667bf3 545
a63e02c7 546 return hsh_entry;
30667bf3
AM
547}
548
30667bf3
AM
549/* Add a new stub entry to the stub hash. Not all fields of the new
550 stub entry are initialised. */
551
552static struct elf32_hppa_stub_hash_entry *
c39a58e6
AM
553hppa_add_stub (const char *stub_name,
554 asection *section,
555 struct elf32_hppa_link_hash_table *htab)
30667bf3 556{
25f72752 557 asection *link_sec;
30667bf3 558 asection *stub_sec;
875c0872 559 struct elf32_hppa_stub_hash_entry *hsh;
edd21aca 560
83c81bfe
AM
561 link_sec = htab->stub_group[section->id].link_sec;
562 stub_sec = htab->stub_group[section->id].stub_sec;
30667bf3 563 if (stub_sec == NULL)
edd21aca 564 {
83c81bfe 565 stub_sec = htab->stub_group[link_sec->id].stub_sec;
30667bf3
AM
566 if (stub_sec == NULL)
567 {
d4c88bbb 568 size_t namelen;
dc810e39 569 bfd_size_type len;
30667bf3
AM
570 char *s_name;
571
d4c88bbb
AM
572 namelen = strlen (link_sec->name);
573 len = namelen + sizeof (STUB_SUFFIX);
83c81bfe 574 s_name = bfd_alloc (htab->stub_bfd, len);
30667bf3
AM
575 if (s_name == NULL)
576 return NULL;
577
d4c88bbb
AM
578 memcpy (s_name, link_sec->name, namelen);
579 memcpy (s_name + namelen, STUB_SUFFIX, sizeof (STUB_SUFFIX));
83c81bfe 580 stub_sec = (*htab->add_stub_section) (s_name, link_sec);
30667bf3
AM
581 if (stub_sec == NULL)
582 return NULL;
83c81bfe 583 htab->stub_group[link_sec->id].stub_sec = stub_sec;
30667bf3 584 }
83c81bfe 585 htab->stub_group[section->id].stub_sec = stub_sec;
edd21aca 586 }
252b5132 587
30667bf3 588 /* Enter this entry into the linker stub hash table. */
a63e02c7 589 hsh = hppa_stub_hash_lookup (&htab->bstab, stub_name,
b34976b6 590 TRUE, FALSE);
875c0872 591 if (hsh == NULL)
30667bf3 592 {
695344c0 593 /* xgettext:c-format */
4eca0228
AM
594 _bfd_error_handler (_("%B: cannot create stub entry %s"),
595 section->owner, stub_name);
30667bf3 596 return NULL;
edd21aca
AM
597 }
598
875c0872
DA
599 hsh->stub_sec = stub_sec;
600 hsh->stub_offset = 0;
601 hsh->id_sec = link_sec;
602 return hsh;
edd21aca
AM
603}
604
30667bf3
AM
605/* Determine the type of stub needed, if any, for a call. */
606
607static enum elf32_hppa_stub_type
c39a58e6 608hppa_type_of_stub (asection *input_sec,
875c0872
DA
609 const Elf_Internal_Rela *rela,
610 struct elf32_hppa_link_hash_entry *hh,
a252afa4
DA
611 bfd_vma destination,
612 struct bfd_link_info *info)
edd21aca 613{
edd21aca 614 bfd_vma location;
30667bf3
AM
615 bfd_vma branch_offset;
616 bfd_vma max_branch_offset;
617 unsigned int r_type;
618
875c0872 619 if (hh != NULL
a63e02c7
DA
620 && hh->eh.plt.offset != (bfd_vma) -1
621 && hh->eh.dynindx != -1
875c0872 622 && !hh->plabel
0e1862bb 623 && (bfd_link_pic (info)
a63e02c7
DA
624 || !hh->eh.def_regular
625 || hh->eh.root.type == bfd_link_hash_defweak))
30667bf3 626 {
067fa4a6
AM
627 /* We need an import stub. Decide between hppa_stub_import
628 and hppa_stub_import_shared later. */
30667bf3
AM
629 return hppa_stub_import;
630 }
edd21aca 631
30667bf3
AM
632 /* Determine where the call point is. */
633 location = (input_sec->output_offset
634 + input_sec->output_section->vma
875c0872 635 + rela->r_offset);
edd21aca 636
30667bf3 637 branch_offset = destination - location - 8;
875c0872 638 r_type = ELF32_R_TYPE (rela->r_info);
edd21aca 639
30667bf3
AM
640 /* Determine if a long branch stub is needed. parisc branch offsets
641 are relative to the second instruction past the branch, ie. +8
642 bytes on from the branch instruction location. The offset is
643 signed and counts in units of 4 bytes. */
644 if (r_type == (unsigned int) R_PARISC_PCREL17F)
9b52905e
NC
645 max_branch_offset = (1 << (17 - 1)) << 2;
646
30667bf3 647 else if (r_type == (unsigned int) R_PARISC_PCREL12F)
9b52905e
NC
648 max_branch_offset = (1 << (12 - 1)) << 2;
649
25f72752 650 else /* R_PARISC_PCREL22F. */
9b52905e 651 max_branch_offset = (1 << (22 - 1)) << 2;
edd21aca 652
30667bf3 653 if (branch_offset + max_branch_offset >= 2*max_branch_offset)
98ceb8ce
AM
654 return hppa_stub_long_branch;
655
30667bf3
AM
656 return hppa_stub_none;
657}
edd21aca 658
30667bf3
AM
659/* Build one linker stub as defined by the stub hash table entry GEN_ENTRY.
660 IN_ARG contains the link info pointer. */
edd21aca 661
30667bf3
AM
662#define LDIL_R1 0x20200000 /* ldil LR'XXX,%r1 */
663#define BE_SR4_R1 0xe0202002 /* be,n RR'XXX(%sr4,%r1) */
edd21aca 664
30667bf3 665#define BL_R1 0xe8200000 /* b,l .+8,%r1 */
3ee1d854 666#define ADDIL_R1 0x28200000 /* addil LR'XXX,%r1,%r1 */
30667bf3 667#define DEPI_R1 0xd4201c1e /* depi 0,31,2,%r1 */
252b5132 668
3ee1d854
AM
669#define ADDIL_DP 0x2b600000 /* addil LR'XXX,%dp,%r1 */
670#define LDW_R1_R21 0x48350000 /* ldw RR'XXX(%sr0,%r1),%r21 */
30667bf3 671#define BV_R0_R21 0xeaa0c000 /* bv %r0(%r21) */
3ee1d854 672#define LDW_R1_R19 0x48330000 /* ldw RR'XXX(%sr0,%r1),%r19 */
252b5132 673
3ee1d854
AM
674#define ADDIL_R19 0x2a600000 /* addil LR'XXX,%r19,%r1 */
675#define LDW_R1_DP 0x483b0000 /* ldw RR'XXX(%sr0,%r1),%dp */
edd21aca 676
30667bf3
AM
677#define LDSID_R21_R1 0x02a010a1 /* ldsid (%sr0,%r21),%r1 */
678#define MTSP_R1 0x00011820 /* mtsp %r1,%sr0 */
679#define BE_SR0_R21 0xe2a00000 /* be 0(%sr0,%r21) */
680#define STW_RP 0x6bc23fd1 /* stw %rp,-24(%sr0,%sp) */
edd21aca 681
067fa4a6 682#define BL22_RP 0xe800a002 /* b,l,n XXX,%rp */
30667bf3
AM
683#define BL_RP 0xe8400002 /* b,l,n XXX,%rp */
684#define NOP 0x08000240 /* nop */
685#define LDW_RP 0x4bc23fd1 /* ldw -24(%sr0,%sp),%rp */
686#define LDSID_RP_R1 0x004010a1 /* ldsid (%sr0,%rp),%r1 */
687#define BE_SR0_RP 0xe0400002 /* be,n 0(%sr0,%rp) */
edd21aca 688
30667bf3
AM
689#ifndef R19_STUBS
690#define R19_STUBS 1
691#endif
edd21aca 692
30667bf3
AM
693#if R19_STUBS
694#define LDW_R1_DLT LDW_R1_R19
695#else
696#define LDW_R1_DLT LDW_R1_DP
697#endif
edd21aca 698
b34976b6 699static bfd_boolean
875c0872 700hppa_build_one_stub (struct bfd_hash_entry *bh, void *in_arg)
30667bf3 701{
875c0872 702 struct elf32_hppa_stub_hash_entry *hsh;
30667bf3 703 struct bfd_link_info *info;
83c81bfe 704 struct elf32_hppa_link_hash_table *htab;
30667bf3
AM
705 asection *stub_sec;
706 bfd *stub_bfd;
707 bfd_byte *loc;
708 bfd_vma sym_value;
74d1c347 709 bfd_vma insn;
8dea1268 710 bfd_vma off;
74d1c347 711 int val;
30667bf3 712 int size;
edd21aca 713
30667bf3 714 /* Massage our args to the form they really have. */
875c0872
DA
715 hsh = hppa_stub_hash_entry (bh);
716 info = (struct bfd_link_info *)in_arg;
30667bf3 717
83c81bfe 718 htab = hppa_link_hash_table (info);
4dfe6ac6
NC
719 if (htab == NULL)
720 return FALSE;
721
875c0872 722 stub_sec = hsh->stub_sec;
edd21aca 723
30667bf3 724 /* Make a note of the offset within the stubs for this entry. */
875c0872
DA
725 hsh->stub_offset = stub_sec->size;
726 loc = stub_sec->contents + hsh->stub_offset;
252b5132 727
30667bf3
AM
728 stub_bfd = stub_sec->owner;
729
875c0872 730 switch (hsh->stub_type)
30667bf3
AM
731 {
732 case hppa_stub_long_branch:
733 /* Create the long branch. A long branch is formed with "ldil"
734 loading the upper bits of the target address into a register,
735 then branching with "be" which adds in the lower bits.
736 The "be" has its delay slot nullified. */
875c0872
DA
737 sym_value = (hsh->target_value
738 + hsh->target_section->output_offset
739 + hsh->target_section->output_section->vma);
30667bf3 740
c39a58e6 741 val = hppa_field_adjust (sym_value, 0, e_lrsel);
74d1c347 742 insn = hppa_rebuild_insn ((int) LDIL_R1, val, 21);
30667bf3
AM
743 bfd_put_32 (stub_bfd, insn, loc);
744
c39a58e6 745 val = hppa_field_adjust (sym_value, 0, e_rrsel) >> 2;
74d1c347 746 insn = hppa_rebuild_insn ((int) BE_SR4_R1, val, 17);
30667bf3
AM
747 bfd_put_32 (stub_bfd, insn, loc + 4);
748
30667bf3 749 size = 8;
edd21aca
AM
750 break;
751
30667bf3
AM
752 case hppa_stub_long_branch_shared:
753 /* Branches are relative. This is where we are going to. */
875c0872
DA
754 sym_value = (hsh->target_value
755 + hsh->target_section->output_offset
756 + hsh->target_section->output_section->vma);
30667bf3
AM
757
758 /* And this is where we are coming from, more or less. */
875c0872 759 sym_value -= (hsh->stub_offset
30667bf3
AM
760 + stub_sec->output_offset
761 + stub_sec->output_section->vma);
762
74d1c347 763 bfd_put_32 (stub_bfd, (bfd_vma) BL_R1, loc);
47d89dba 764 val = hppa_field_adjust (sym_value, (bfd_signed_vma) -8, e_lrsel);
74d1c347 765 insn = hppa_rebuild_insn ((int) ADDIL_R1, val, 21);
30667bf3
AM
766 bfd_put_32 (stub_bfd, insn, loc + 4);
767
47d89dba 768 val = hppa_field_adjust (sym_value, (bfd_signed_vma) -8, e_rrsel) >> 2;
74d1c347 769 insn = hppa_rebuild_insn ((int) BE_SR4_R1, val, 17);
30667bf3
AM
770 bfd_put_32 (stub_bfd, insn, loc + 8);
771 size = 12;
772 break;
edd21aca 773
30667bf3
AM
774 case hppa_stub_import:
775 case hppa_stub_import_shared:
a63e02c7 776 off = hsh->hh->eh.plt.offset;
8dea1268 777 if (off >= (bfd_vma) -2)
49e9d0d3 778 abort ();
8dea1268
AM
779
780 off &= ~ (bfd_vma) 1;
781 sym_value = (off
ce558b89
AM
782 + htab->etab.splt->output_offset
783 + htab->etab.splt->output_section->vma
784 - elf_gp (htab->etab.splt->output_section->owner));
30667bf3
AM
785
786 insn = ADDIL_DP;
787#if R19_STUBS
875c0872 788 if (hsh->stub_type == hppa_stub_import_shared)
30667bf3
AM
789 insn = ADDIL_R19;
790#endif
c39a58e6 791 val = hppa_field_adjust (sym_value, 0, e_lrsel),
74d1c347 792 insn = hppa_rebuild_insn ((int) insn, val, 21);
30667bf3 793 bfd_put_32 (stub_bfd, insn, loc);
edd21aca 794
47d89dba
AM
795 /* It is critical to use lrsel/rrsel here because we are using
796 two different offsets (+0 and +4) from sym_value. If we use
797 lsel/rsel then with unfortunate sym_values we will round
798 sym_value+4 up to the next 2k block leading to a mis-match
799 between the lsel and rsel value. */
c39a58e6 800 val = hppa_field_adjust (sym_value, 0, e_rrsel);
74d1c347 801 insn = hppa_rebuild_insn ((int) LDW_R1_R21, val, 14);
30667bf3 802 bfd_put_32 (stub_bfd, insn, loc + 4);
252b5132 803
83c81bfe 804 if (htab->multi_subspace)
30667bf3 805 {
47d89dba 806 val = hppa_field_adjust (sym_value, (bfd_signed_vma) 4, e_rrsel);
74d1c347 807 insn = hppa_rebuild_insn ((int) LDW_R1_DLT, val, 14);
30667bf3 808 bfd_put_32 (stub_bfd, insn, loc + 8);
252b5132 809
74d1c347
AM
810 bfd_put_32 (stub_bfd, (bfd_vma) LDSID_R21_R1, loc + 12);
811 bfd_put_32 (stub_bfd, (bfd_vma) MTSP_R1, loc + 16);
812 bfd_put_32 (stub_bfd, (bfd_vma) BE_SR0_R21, loc + 20);
813 bfd_put_32 (stub_bfd, (bfd_vma) STW_RP, loc + 24);
252b5132 814
30667bf3
AM
815 size = 28;
816 }
817 else
818 {
74d1c347 819 bfd_put_32 (stub_bfd, (bfd_vma) BV_R0_R21, loc + 8);
47d89dba 820 val = hppa_field_adjust (sym_value, (bfd_signed_vma) 4, e_rrsel);
74d1c347 821 insn = hppa_rebuild_insn ((int) LDW_R1_DLT, val, 14);
30667bf3 822 bfd_put_32 (stub_bfd, insn, loc + 12);
252b5132 823
30667bf3
AM
824 size = 16;
825 }
252b5132 826
30667bf3 827 break;
252b5132 828
30667bf3
AM
829 case hppa_stub_export:
830 /* Branches are relative. This is where we are going to. */
875c0872
DA
831 sym_value = (hsh->target_value
832 + hsh->target_section->output_offset
833 + hsh->target_section->output_section->vma);
252b5132 834
30667bf3 835 /* And this is where we are coming from. */
875c0872 836 sym_value -= (hsh->stub_offset
30667bf3
AM
837 + stub_sec->output_offset
838 + stub_sec->output_section->vma);
edd21aca 839
067fa4a6
AM
840 if (sym_value - 8 + (1 << (17 + 1)) >= (1 << (17 + 2))
841 && (!htab->has_22bit_branch
842 || sym_value - 8 + (1 << (22 + 1)) >= (1 << (22 + 2))))
30667bf3 843 {
4eca0228 844 _bfd_error_handler
695344c0 845 /* xgettext:c-format */
d42c267e 846 (_("%B(%A+%#Lx): cannot reach %s, recompile with -ffunction-sections"),
875c0872 847 hsh->target_section->owner,
d003868e 848 stub_sec,
d42c267e 849 hsh->stub_offset,
a63e02c7 850 hsh->bh_root.string);
30667bf3 851 bfd_set_error (bfd_error_bad_value);
b34976b6 852 return FALSE;
252b5132 853 }
30667bf3 854
74d1c347 855 val = hppa_field_adjust (sym_value, (bfd_signed_vma) -8, e_fsel) >> 2;
067fa4a6
AM
856 if (!htab->has_22bit_branch)
857 insn = hppa_rebuild_insn ((int) BL_RP, val, 17);
858 else
859 insn = hppa_rebuild_insn ((int) BL22_RP, val, 22);
30667bf3
AM
860 bfd_put_32 (stub_bfd, insn, loc);
861
74d1c347
AM
862 bfd_put_32 (stub_bfd, (bfd_vma) NOP, loc + 4);
863 bfd_put_32 (stub_bfd, (bfd_vma) LDW_RP, loc + 8);
864 bfd_put_32 (stub_bfd, (bfd_vma) LDSID_RP_R1, loc + 12);
865 bfd_put_32 (stub_bfd, (bfd_vma) MTSP_R1, loc + 16);
866 bfd_put_32 (stub_bfd, (bfd_vma) BE_SR0_RP, loc + 20);
30667bf3
AM
867
868 /* Point the function symbol at the stub. */
a63e02c7
DA
869 hsh->hh->eh.root.u.def.section = stub_sec;
870 hsh->hh->eh.root.u.def.value = stub_sec->size;
30667bf3
AM
871
872 size = 24;
873 break;
874
875 default:
876 BFD_FAIL ();
b34976b6 877 return FALSE;
252b5132
RH
878 }
879
eea6121a 880 stub_sec->size += size;
b34976b6 881 return TRUE;
252b5132
RH
882}
883
30667bf3
AM
884#undef LDIL_R1
885#undef BE_SR4_R1
886#undef BL_R1
887#undef ADDIL_R1
888#undef DEPI_R1
30667bf3
AM
889#undef LDW_R1_R21
890#undef LDW_R1_DLT
891#undef LDW_R1_R19
892#undef ADDIL_R19
893#undef LDW_R1_DP
894#undef LDSID_R21_R1
895#undef MTSP_R1
896#undef BE_SR0_R21
897#undef STW_RP
898#undef BV_R0_R21
899#undef BL_RP
900#undef NOP
901#undef LDW_RP
902#undef LDSID_RP_R1
903#undef BE_SR0_RP
252b5132 904
30667bf3
AM
905/* As above, but don't actually build the stub. Just bump offset so
906 we know stub section sizes. */
907
b34976b6 908static bfd_boolean
875c0872 909hppa_size_one_stub (struct bfd_hash_entry *bh, void *in_arg)
252b5132 910{
875c0872 911 struct elf32_hppa_stub_hash_entry *hsh;
83c81bfe 912 struct elf32_hppa_link_hash_table *htab;
30667bf3
AM
913 int size;
914
915 /* Massage our args to the form they really have. */
875c0872 916 hsh = hppa_stub_hash_entry (bh);
c39a58e6 917 htab = in_arg;
30667bf3 918
875c0872 919 if (hsh->stub_type == hppa_stub_long_branch)
98ceb8ce 920 size = 8;
875c0872 921 else if (hsh->stub_type == hppa_stub_long_branch_shared)
30667bf3 922 size = 12;
875c0872 923 else if (hsh->stub_type == hppa_stub_export)
30667bf3 924 size = 24;
74d1c347 925 else /* hppa_stub_import or hppa_stub_import_shared. */
252b5132 926 {
83c81bfe 927 if (htab->multi_subspace)
30667bf3
AM
928 size = 28;
929 else
930 size = 16;
931 }
252b5132 932
875c0872 933 hsh->stub_sec->size += size;
b34976b6 934 return TRUE;
30667bf3 935}
252b5132 936
30667bf3
AM
937/* Return nonzero if ABFD represents an HPPA ELF32 file.
938 Additionally we set the default architecture and machine. */
939
b34976b6 940static bfd_boolean
c39a58e6 941elf32_hppa_object_p (bfd *abfd)
30667bf3 942{
24a5e751
L
943 Elf_Internal_Ehdr * i_ehdrp;
944 unsigned int flags;
252b5132 945
24a5e751
L
946 i_ehdrp = elf_elfheader (abfd);
947 if (strcmp (bfd_get_target (abfd), "elf32-hppa-linux") == 0)
948 {
9c55345c 949 /* GCC on hppa-linux produces binaries with OSABI=GNU,
6c21aa76 950 but the kernel produces corefiles with OSABI=SysV. */
9c55345c 951 if (i_ehdrp->e_ident[EI_OSABI] != ELFOSABI_GNU &&
6c21aa76 952 i_ehdrp->e_ident[EI_OSABI] != ELFOSABI_NONE) /* aka SYSV */
b34976b6 953 return FALSE;
24a5e751 954 }
225247f0
JT
955 else if (strcmp (bfd_get_target (abfd), "elf32-hppa-netbsd") == 0)
956 {
957 /* GCC on hppa-netbsd produces binaries with OSABI=NetBSD,
958 but the kernel produces corefiles with OSABI=SysV. */
959 if (i_ehdrp->e_ident[EI_OSABI] != ELFOSABI_NETBSD &&
960 i_ehdrp->e_ident[EI_OSABI] != ELFOSABI_NONE) /* aka SYSV */
961 return FALSE;
962 }
24a5e751
L
963 else
964 {
965 if (i_ehdrp->e_ident[EI_OSABI] != ELFOSABI_HPUX)
b34976b6 966 return FALSE;
24a5e751
L
967 }
968
969 flags = i_ehdrp->e_flags;
30667bf3
AM
970 switch (flags & (EF_PARISC_ARCH | EF_PARISC_WIDE))
971 {
972 case EFA_PARISC_1_0:
973 return bfd_default_set_arch_mach (abfd, bfd_arch_hppa, 10);
974 case EFA_PARISC_1_1:
975 return bfd_default_set_arch_mach (abfd, bfd_arch_hppa, 11);
976 case EFA_PARISC_2_0:
977 return bfd_default_set_arch_mach (abfd, bfd_arch_hppa, 20);
978 case EFA_PARISC_2_0 | EF_PARISC_WIDE:
979 return bfd_default_set_arch_mach (abfd, bfd_arch_hppa, 25);
980 }
b34976b6 981 return TRUE;
252b5132
RH
982}
983
30667bf3
AM
984/* Create the .plt and .got sections, and set up our hash table
985 short-cuts to various dynamic sections. */
986
b34976b6 987static bfd_boolean
c39a58e6 988elf32_hppa_create_dynamic_sections (bfd *abfd, struct bfd_link_info *info)
252b5132 989{
83c81bfe 990 struct elf32_hppa_link_hash_table *htab;
875c0872 991 struct elf_link_hash_entry *eh;
edd21aca 992
30667bf3 993 /* Don't try to create the .plt and .got twice. */
83c81bfe 994 htab = hppa_link_hash_table (info);
4dfe6ac6
NC
995 if (htab == NULL)
996 return FALSE;
ce558b89 997 if (htab->etab.splt != NULL)
b34976b6 998 return TRUE;
edd21aca 999
30667bf3
AM
1000 /* Call the generic code to do most of the work. */
1001 if (! _bfd_elf_create_dynamic_sections (abfd, info))
b34976b6 1002 return FALSE;
252b5132 1003
b18e2ae5
AM
1004 /* hppa-linux needs _GLOBAL_OFFSET_TABLE_ to be visible from the main
1005 application, because __canonicalize_funcptr_for_compare needs it. */
875c0872
DA
1006 eh = elf_hash_table (info)->hgot;
1007 eh->forced_local = 0;
1008 eh->other = STV_DEFAULT;
1009 return bfd_elf_link_record_dynamic_symbol (info, eh);
30667bf3
AM
1010}
1011
ebe50bae
AM
1012/* Copy the extra info we tack onto an elf_link_hash_entry. */
1013
51b64d56 1014static void
fcfa13d2 1015elf32_hppa_copy_indirect_symbol (struct bfd_link_info *info,
875c0872
DA
1016 struct elf_link_hash_entry *eh_dir,
1017 struct elf_link_hash_entry *eh_ind)
ebe50bae 1018{
875c0872 1019 struct elf32_hppa_link_hash_entry *hh_dir, *hh_ind;
ebe50bae 1020
875c0872
DA
1021 hh_dir = hppa_elf_hash_entry (eh_dir);
1022 hh_ind = hppa_elf_hash_entry (eh_ind);
ebe50bae 1023
287c7eaf
AM
1024 if (hh_ind->dyn_relocs != NULL
1025 && eh_ind->root.type == bfd_link_hash_indirect)
ebe50bae 1026 {
875c0872 1027 if (hh_dir->dyn_relocs != NULL)
bbd7ec4a 1028 {
875c0872
DA
1029 struct elf32_hppa_dyn_reloc_entry **hdh_pp;
1030 struct elf32_hppa_dyn_reloc_entry *hdh_p;
bbd7ec4a 1031
fcfa13d2 1032 /* Add reloc counts against the indirect sym to the direct sym
bbd7ec4a 1033 list. Merge any entries against the same section. */
875c0872 1034 for (hdh_pp = &hh_ind->dyn_relocs; (hdh_p = *hdh_pp) != NULL; )
bbd7ec4a 1035 {
875c0872 1036 struct elf32_hppa_dyn_reloc_entry *hdh_q;
bbd7ec4a 1037
fcfa13d2
AM
1038 for (hdh_q = hh_dir->dyn_relocs;
1039 hdh_q != NULL;
1040 hdh_q = hdh_q->hdh_next)
875c0872 1041 if (hdh_q->sec == hdh_p->sec)
bbd7ec4a
AM
1042 {
1043#if RELATIVE_DYNRELOCS
875c0872 1044 hdh_q->relative_count += hdh_p->relative_count;
bbd7ec4a 1045#endif
875c0872 1046 hdh_q->count += hdh_p->count;
a63e02c7 1047 *hdh_pp = hdh_p->hdh_next;
bbd7ec4a
AM
1048 break;
1049 }
875c0872 1050 if (hdh_q == NULL)
a63e02c7 1051 hdh_pp = &hdh_p->hdh_next;
bbd7ec4a 1052 }
875c0872 1053 *hdh_pp = hh_dir->dyn_relocs;
bbd7ec4a
AM
1054 }
1055
875c0872
DA
1056 hh_dir->dyn_relocs = hh_ind->dyn_relocs;
1057 hh_ind->dyn_relocs = NULL;
ebe50bae 1058 }
ebe50bae 1059
4a7e5234 1060 if (eh_ind->root.type == bfd_link_hash_indirect)
9b52905e 1061 {
4a7e5234
AM
1062 hh_dir->plabel |= hh_ind->plabel;
1063 hh_dir->tls_type |= hh_ind->tls_type;
1064 hh_ind->tls_type = GOT_UNKNOWN;
9b52905e 1065 }
4a7e5234
AM
1066
1067 _bfd_elf_link_hash_copy_indirect (info, eh_dir, eh_ind);
9b52905e
NC
1068}
1069
1070static int
1071elf32_hppa_optimized_tls_reloc (struct bfd_link_info *info ATTRIBUTE_UNUSED,
1072 int r_type, int is_local ATTRIBUTE_UNUSED)
1073{
1074 /* For now we don't support linker optimizations. */
1075 return r_type;
ebe50bae
AM
1076}
1077
d45b7d74
DA
1078/* Return a pointer to the local GOT, PLT and TLS reference counts
1079 for ABFD. Returns NULL if the storage allocation fails. */
1080
1081static bfd_signed_vma *
1082hppa32_elf_local_refcounts (bfd *abfd)
1083{
1084 Elf_Internal_Shdr *symtab_hdr = &elf_tdata (abfd)->symtab_hdr;
1085 bfd_signed_vma *local_refcounts;
68ffbac6 1086
d45b7d74
DA
1087 local_refcounts = elf_local_got_refcounts (abfd);
1088 if (local_refcounts == NULL)
1089 {
1090 bfd_size_type size;
1091
1092 /* Allocate space for local GOT and PLT reference
1093 counts. Done this way to save polluting elf_obj_tdata
1094 with another target specific pointer. */
1095 size = symtab_hdr->sh_info;
1096 size *= 2 * sizeof (bfd_signed_vma);
1097 /* Add in space to store the local GOT TLS types. */
1098 size += symtab_hdr->sh_info;
1099 local_refcounts = bfd_zalloc (abfd, size);
1100 if (local_refcounts == NULL)
1101 return NULL;
1102 elf_local_got_refcounts (abfd) = local_refcounts;
1103 memset (hppa_elf_local_got_tls_type (abfd), GOT_UNKNOWN,
1104 symtab_hdr->sh_info);
1105 }
1106 return local_refcounts;
1107}
1108
1109
30667bf3 1110/* Look through the relocs for a section during the first phase, and
3ac8354b
AM
1111 calculate needed space in the global offset table, procedure linkage
1112 table, and dynamic reloc sections. At this point we haven't
1113 necessarily read all the input files. */
252b5132 1114
b34976b6 1115static bfd_boolean
c39a58e6
AM
1116elf32_hppa_check_relocs (bfd *abfd,
1117 struct bfd_link_info *info,
1118 asection *sec,
1119 const Elf_Internal_Rela *relocs)
252b5132 1120{
30667bf3 1121 Elf_Internal_Shdr *symtab_hdr;
875c0872
DA
1122 struct elf_link_hash_entry **eh_syms;
1123 const Elf_Internal_Rela *rela;
1124 const Elf_Internal_Rela *rela_end;
83c81bfe 1125 struct elf32_hppa_link_hash_table *htab;
30667bf3 1126 asection *sreloc;
30667bf3 1127
0e1862bb 1128 if (bfd_link_relocatable (info))
b34976b6 1129 return TRUE;
30667bf3 1130
83c81bfe 1131 htab = hppa_link_hash_table (info);
4dfe6ac6
NC
1132 if (htab == NULL)
1133 return FALSE;
30667bf3 1134 symtab_hdr = &elf_tdata (abfd)->symtab_hdr;
875c0872 1135 eh_syms = elf_sym_hashes (abfd);
30667bf3 1136 sreloc = NULL;
30667bf3 1137
875c0872
DA
1138 rela_end = relocs + sec->reloc_count;
1139 for (rela = relocs; rela < rela_end; rela++)
30667bf3
AM
1140 {
1141 enum {
1142 NEED_GOT = 1,
1143 NEED_PLT = 2,
1144 NEED_DYNREL = 4,
98ceb8ce 1145 PLT_PLABEL = 8
30667bf3 1146 };
edd21aca 1147
30667bf3 1148 unsigned int r_symndx, r_type;
875c0872
DA
1149 struct elf32_hppa_link_hash_entry *hh;
1150 int need_entry = 0;
252b5132 1151
875c0872 1152 r_symndx = ELF32_R_SYM (rela->r_info);
252b5132 1153
30667bf3 1154 if (r_symndx < symtab_hdr->sh_info)
875c0872 1155 hh = NULL;
30667bf3 1156 else
f7c5057a 1157 {
875c0872 1158 hh = hppa_elf_hash_entry (eh_syms[r_symndx - symtab_hdr->sh_info]);
a63e02c7
DA
1159 while (hh->eh.root.type == bfd_link_hash_indirect
1160 || hh->eh.root.type == bfd_link_hash_warning)
1161 hh = hppa_elf_hash_entry (hh->eh.root.u.i.link);
f7c5057a 1162 }
252b5132 1163
875c0872 1164 r_type = ELF32_R_TYPE (rela->r_info);
9b52905e 1165 r_type = elf32_hppa_optimized_tls_reloc (info, r_type, hh == NULL);
252b5132 1166
30667bf3
AM
1167 switch (r_type)
1168 {
1169 case R_PARISC_DLTIND14F:
1170 case R_PARISC_DLTIND14R:
1171 case R_PARISC_DLTIND21L:
1172 /* This symbol requires a global offset table entry. */
1173 need_entry = NEED_GOT;
30667bf3
AM
1174 break;
1175
1176 case R_PARISC_PLABEL14R: /* "Official" procedure labels. */
1177 case R_PARISC_PLABEL21L:
1178 case R_PARISC_PLABEL32:
74d1c347 1179 /* If the addend is non-zero, we break badly. */
875c0872 1180 if (rela->r_addend != 0)
49e9d0d3 1181 abort ();
74d1c347
AM
1182
1183 /* If we are creating a shared library, then we need to
1184 create a PLT entry for all PLABELs, because PLABELs with
1185 local symbols may be passed via a pointer to another
1186 object. Additionally, output a dynamic relocation
4dc86686 1187 pointing to the PLT entry.
875c0872 1188
4dc86686
AM
1189 For executables, the original 32-bit ABI allowed two
1190 different styles of PLABELs (function pointers): For
1191 global functions, the PLABEL word points into the .plt
1192 two bytes past a (function address, gp) pair, and for
1193 local functions the PLABEL points directly at the
1194 function. The magic +2 for the first type allows us to
1195 differentiate between the two. As you can imagine, this
1196 is a real pain when it comes to generating code to call
1197 functions indirectly or to compare function pointers.
1198 We avoid the mess by always pointing a PLABEL into the
1199 .plt, even for local functions. */
127e8e9f
AM
1200 need_entry = PLT_PLABEL | NEED_PLT;
1201 if (bfd_link_pic (info))
1202 need_entry |= NEED_DYNREL;
30667bf3
AM
1203 break;
1204
1205 case R_PARISC_PCREL12F:
83c81bfe 1206 htab->has_12bit_branch = 1;
067fa4a6
AM
1207 goto branch_common;
1208
30667bf3
AM
1209 case R_PARISC_PCREL17C:
1210 case R_PARISC_PCREL17F:
83c81bfe 1211 htab->has_17bit_branch = 1;
067fa4a6
AM
1212 goto branch_common;
1213
30667bf3 1214 case R_PARISC_PCREL22F:
067fa4a6
AM
1215 htab->has_22bit_branch = 1;
1216 branch_common:
47d89dba
AM
1217 /* Function calls might need to go through the .plt, and
1218 might require long branch stubs. */
875c0872 1219 if (hh == NULL)
30667bf3
AM
1220 {
1221 /* We know local syms won't need a .plt entry, and if
1222 they need a long branch stub we can't guarantee that
1223 we can reach the stub. So just flag an error later
1224 if we're doing a shared link and find we need a long
1225 branch stub. */
1226 continue;
1227 }
1228 else
1229 {
1230 /* Global symbols will need a .plt entry if they remain
1231 global, and in most cases won't need a long branch
1232 stub. Unfortunately, we have to cater for the case
1233 where a symbol is forced local by versioning, or due
1234 to symbolic linking, and we lose the .plt entry. */
98ceb8ce 1235 need_entry = NEED_PLT;
a63e02c7 1236 if (hh->eh.type == STT_PARISC_MILLI)
98ceb8ce 1237 need_entry = 0;
30667bf3
AM
1238 }
1239 break;
1240
36751eee 1241 case R_PARISC_SEGBASE: /* Used to set segment base. */
c46b7515 1242 case R_PARISC_SEGREL32: /* Relative reloc, used for unwind. */
30667bf3
AM
1243 case R_PARISC_PCREL14F: /* PC relative load/store. */
1244 case R_PARISC_PCREL14R:
1245 case R_PARISC_PCREL17R: /* External branches. */
1246 case R_PARISC_PCREL21L: /* As above, and for load/store too. */
36751eee 1247 case R_PARISC_PCREL32:
30667bf3
AM
1248 /* We don't need to propagate the relocation if linking a
1249 shared object since these are section relative. */
1250 continue;
1251
1252 case R_PARISC_DPREL14F: /* Used for gp rel data load/store. */
1253 case R_PARISC_DPREL14R:
1254 case R_PARISC_DPREL21L:
0e1862bb 1255 if (bfd_link_pic (info))
30667bf3 1256 {
4eca0228 1257 _bfd_error_handler
695344c0 1258 /* xgettext:c-format */
d003868e
AM
1259 (_("%B: relocation %s can not be used when making a shared object; recompile with -fPIC"),
1260 abfd,
30667bf3
AM
1261 elf_hppa_howto_table[r_type].name);
1262 bfd_set_error (bfd_error_bad_value);
b34976b6 1263 return FALSE;
30667bf3
AM
1264 }
1265 /* Fall through. */
1266
1267 case R_PARISC_DIR17F: /* Used for external branches. */
1268 case R_PARISC_DIR17R:
47d89dba
AM
1269 case R_PARISC_DIR14F: /* Used for load/store from absolute locn. */
1270 case R_PARISC_DIR14R:
30667bf3 1271 case R_PARISC_DIR21L: /* As above, and for ext branches too. */
c46b7515 1272 case R_PARISC_DIR32: /* .word relocs. */
30667bf3
AM
1273 /* We may want to output a dynamic relocation later. */
1274 need_entry = NEED_DYNREL;
1275 break;
1276
1277 /* This relocation describes the C++ object vtable hierarchy.
1278 Reconstruct it for later use during GC. */
1279 case R_PARISC_GNU_VTINHERIT:
a63e02c7 1280 if (!bfd_elf_gc_record_vtinherit (abfd, sec, &hh->eh, rela->r_offset))
b34976b6 1281 return FALSE;
30667bf3
AM
1282 continue;
1283
1284 /* This relocation describes which C++ vtable entries are actually
1285 used. Record for later use during GC. */
1286 case R_PARISC_GNU_VTENTRY:
d17e0c6e
JB
1287 BFD_ASSERT (hh != NULL);
1288 if (hh != NULL
1289 && !bfd_elf_gc_record_vtentry (abfd, sec, &hh->eh, rela->r_addend))
b34976b6 1290 return FALSE;
30667bf3
AM
1291 continue;
1292
9b52905e
NC
1293 case R_PARISC_TLS_GD21L:
1294 case R_PARISC_TLS_GD14R:
1295 case R_PARISC_TLS_LDM21L:
1296 case R_PARISC_TLS_LDM14R:
1297 need_entry = NEED_GOT;
1298 break;
1299
1300 case R_PARISC_TLS_IE21L:
1301 case R_PARISC_TLS_IE14R:
2e684e75 1302 if (bfd_link_dll (info))
9b52905e
NC
1303 info->flags |= DF_STATIC_TLS;
1304 need_entry = NEED_GOT;
1305 break;
1306
30667bf3
AM
1307 default:
1308 continue;
1309 }
1310
1311 /* Now carry out our orders. */
1312 if (need_entry & NEED_GOT)
1313 {
2e684e75
AM
1314 int tls_type = GOT_NORMAL;
1315
9b52905e
NC
1316 switch (r_type)
1317 {
1318 default:
9b52905e
NC
1319 break;
1320 case R_PARISC_TLS_GD21L:
1321 case R_PARISC_TLS_GD14R:
2e684e75 1322 tls_type = GOT_TLS_GD;
9b52905e
NC
1323 break;
1324 case R_PARISC_TLS_LDM21L:
1325 case R_PARISC_TLS_LDM14R:
2e684e75 1326 tls_type = GOT_TLS_LDM;
9b52905e
NC
1327 break;
1328 case R_PARISC_TLS_IE21L:
1329 case R_PARISC_TLS_IE14R:
2e684e75 1330 tls_type = GOT_TLS_IE;
9b52905e
NC
1331 break;
1332 }
1333
30667bf3 1334 /* Allocate space for a GOT entry, as well as a dynamic
25f72752 1335 relocation for this entry. */
ce558b89 1336 if (htab->etab.sgot == NULL)
30667bf3 1337 {
a63e02c7 1338 if (!elf32_hppa_create_dynamic_sections (htab->etab.dynobj, info))
b34976b6 1339 return FALSE;
30667bf3
AM
1340 }
1341
2e684e75 1342 if (hh != NULL)
30667bf3 1343 {
2e684e75
AM
1344 if (tls_type == GOT_TLS_LDM)
1345 htab->tls_ldm_got.refcount += 1;
9b52905e 1346 else
2e684e75
AM
1347 hh->eh.got.refcount += 1;
1348 hh->tls_type |= tls_type;
1349 }
1350 else
1351 {
1352 bfd_signed_vma *local_got_refcounts;
9b52905e 1353
2e684e75
AM
1354 /* This is a global offset table entry for a local symbol. */
1355 local_got_refcounts = hppa32_elf_local_refcounts (abfd);
1356 if (local_got_refcounts == NULL)
1357 return FALSE;
1358 if (tls_type == GOT_TLS_LDM)
1359 htab->tls_ldm_got.refcount += 1;
1360 else
1361 local_got_refcounts[r_symndx] += 1;
9b52905e 1362
2e684e75 1363 hppa_elf_local_got_tls_type (abfd) [r_symndx] |= tls_type;
30667bf3
AM
1364 }
1365 }
1366
1367 if (need_entry & NEED_PLT)
1368 {
1369 /* If we are creating a shared library, and this is a reloc
1370 against a weak symbol or a global symbol in a dynamic
1371 object, then we will be creating an import stub and a
1372 .plt entry for the symbol. Similarly, on a normal link
1373 to symbols defined in a dynamic object we'll need the
1374 import stub and a .plt entry. We don't know yet whether
1375 the symbol is defined or not, so make an entry anyway and
1376 clean up later in adjust_dynamic_symbol. */
1377 if ((sec->flags & SEC_ALLOC) != 0)
1378 {
875c0872 1379 if (hh != NULL)
30667bf3 1380 {
a63e02c7
DA
1381 hh->eh.needs_plt = 1;
1382 hh->eh.plt.refcount += 1;
74d1c347 1383
36605136
AM
1384 /* If this .plt entry is for a plabel, mark it so
1385 that adjust_dynamic_symbol will keep the entry
1386 even if it appears to be local. */
74d1c347 1387 if (need_entry & PLT_PLABEL)
875c0872 1388 hh->plabel = 1;
74d1c347
AM
1389 }
1390 else if (need_entry & PLT_PLABEL)
1391 {
3ac8354b 1392 bfd_signed_vma *local_got_refcounts;
68fb2e56 1393 bfd_signed_vma *local_plt_refcounts;
74d1c347 1394
d45b7d74 1395 local_got_refcounts = hppa32_elf_local_refcounts (abfd);
74d1c347 1396 if (local_got_refcounts == NULL)
d45b7d74 1397 return FALSE;
68fb2e56
AM
1398 local_plt_refcounts = (local_got_refcounts
1399 + symtab_hdr->sh_info);
ebe50bae 1400 local_plt_refcounts[r_symndx] += 1;
30667bf3 1401 }
30667bf3
AM
1402 }
1403 }
1404
d336fa6d
AM
1405 if ((need_entry & NEED_DYNREL) != 0
1406 && (sec->flags & SEC_ALLOC) != 0)
30667bf3
AM
1407 {
1408 /* Flag this symbol as having a non-got, non-plt reference
1409 so that we generate copy relocs if it turns out to be
1410 dynamic. */
4a7e5234 1411 if (hh != NULL)
a63e02c7 1412 hh->eh.non_got_ref = 1;
30667bf3
AM
1413
1414 /* If we are creating a shared library then we need to copy
1415 the reloc into the shared library. However, if we are
1416 linking with -Bsymbolic, we need only copy absolute
1417 relocs or relocs against symbols that are not defined in
1418 an object we are including in the link. PC- or DP- or
1419 DLT-relative relocs against any local sym or global sym
1420 with DEF_REGULAR set, can be discarded. At this point we
1421 have not seen all the input files, so it is possible that
1422 DEF_REGULAR is not set now but will be set later (it is
1423 never cleared). We account for that possibility below by
98ceb8ce 1424 storing information in the dyn_relocs field of the
30667bf3
AM
1425 hash table entry.
1426
1427 A similar situation to the -Bsymbolic case occurs when
1428 creating shared libraries and symbol visibility changes
1429 render the symbol local.
1430
1431 As it turns out, all the relocs we will be creating here
1432 are absolute, so we cannot remove them on -Bsymbolic
1433 links or visibility changes anyway. A STUB_REL reloc
1434 is absolute too, as in that case it is the reloc in the
1435 stub we will be creating, rather than copying the PCREL
56882138
AM
1436 reloc in the branch.
1437
1438 If on the other hand, we are creating an executable, we
1439 may need to keep relocations for symbols satisfied by a
1440 dynamic library if we manage to avoid copy relocs for the
1441 symbol. */
0e1862bb 1442 if ((bfd_link_pic (info)
446f2863 1443 && (IS_ABSOLUTE_RELOC (r_type)
875c0872 1444 || (hh != NULL
a496fbc8 1445 && (!SYMBOLIC_BIND (info, &hh->eh)
a63e02c7
DA
1446 || hh->eh.root.type == bfd_link_hash_defweak
1447 || !hh->eh.def_regular))))
4fc8051d 1448 || (ELIMINATE_COPY_RELOCS
0e1862bb 1449 && !bfd_link_pic (info)
875c0872 1450 && hh != NULL
a63e02c7
DA
1451 && (hh->eh.root.type == bfd_link_hash_defweak
1452 || !hh->eh.def_regular)))
30667bf3 1453 {
875c0872
DA
1454 struct elf32_hppa_dyn_reloc_entry *hdh_p;
1455 struct elf32_hppa_dyn_reloc_entry **hdh_head;
ec338859 1456
30667bf3
AM
1457 /* Create a reloc section in dynobj and make room for
1458 this reloc. */
98ceb8ce 1459 if (sreloc == NULL)
30667bf3 1460 {
83bac4b0
NC
1461 sreloc = _bfd_elf_make_dynamic_reloc_section
1462 (sec, htab->etab.dynobj, 2, abfd, /*rela?*/ TRUE);
1463
98ceb8ce 1464 if (sreloc == NULL)
30667bf3 1465 {
83bac4b0
NC
1466 bfd_set_error (bfd_error_bad_value);
1467 return FALSE;
30667bf3 1468 }
30667bf3
AM
1469 }
1470
98ceb8ce
AM
1471 /* If this is a global symbol, we count the number of
1472 relocations we need for this symbol. */
875c0872 1473 if (hh != NULL)
30667bf3 1474 {
875c0872 1475 hdh_head = &hh->dyn_relocs;
ec338859
AM
1476 }
1477 else
1478 {
1479 /* Track dynamic relocs needed for local syms too.
1480 We really need local syms available to do this
1481 easily. Oh well. */
875c0872 1482 asection *sr;
6edfbbad 1483 void *vpp;
87d72d41 1484 Elf_Internal_Sym *isym;
6edfbbad 1485
87d72d41
AM
1486 isym = bfd_sym_from_r_symndx (&htab->sym_cache,
1487 abfd, r_symndx);
1488 if (isym == NULL)
b34976b6 1489 return FALSE;
30667bf3 1490
87d72d41
AM
1491 sr = bfd_section_from_elf_index (abfd, isym->st_shndx);
1492 if (sr == NULL)
1493 sr = sec;
1494
6edfbbad
DJ
1495 vpp = &elf_section_data (sr)->local_dynrel;
1496 hdh_head = (struct elf32_hppa_dyn_reloc_entry **) vpp;
ec338859
AM
1497 }
1498
875c0872
DA
1499 hdh_p = *hdh_head;
1500 if (hdh_p == NULL || hdh_p->sec != sec)
ec338859 1501 {
a63e02c7 1502 hdh_p = bfd_alloc (htab->etab.dynobj, sizeof *hdh_p);
875c0872 1503 if (hdh_p == NULL)
b34976b6 1504 return FALSE;
a63e02c7 1505 hdh_p->hdh_next = *hdh_head;
875c0872
DA
1506 *hdh_head = hdh_p;
1507 hdh_p->sec = sec;
1508 hdh_p->count = 0;
98ceb8ce 1509#if RELATIVE_DYNRELOCS
875c0872 1510 hdh_p->relative_count = 0;
98ceb8ce 1511#endif
ec338859 1512 }
98ceb8ce 1513
875c0872 1514 hdh_p->count += 1;
98ceb8ce 1515#if RELATIVE_DYNRELOCS
ec338859 1516 if (!IS_ABSOLUTE_RELOC (rtype))
875c0872 1517 hdh_p->relative_count += 1;
98ceb8ce 1518#endif
30667bf3
AM
1519 }
1520 }
1521 }
edd21aca 1522
b34976b6 1523 return TRUE;
edd21aca
AM
1524}
1525
30667bf3
AM
1526/* Return the section that should be marked against garbage collection
1527 for a given relocation. */
1528
1529static asection *
c39a58e6 1530elf32_hppa_gc_mark_hook (asection *sec,
07adf181 1531 struct bfd_link_info *info,
875c0872
DA
1532 Elf_Internal_Rela *rela,
1533 struct elf_link_hash_entry *hh,
c39a58e6 1534 Elf_Internal_Sym *sym)
30667bf3 1535{
875c0872 1536 if (hh != NULL)
07adf181
AM
1537 switch ((unsigned int) ELF32_R_TYPE (rela->r_info))
1538 {
1539 case R_PARISC_GNU_VTINHERIT:
1540 case R_PARISC_GNU_VTENTRY:
1541 return NULL;
1542 }
30667bf3 1543
07adf181 1544 return _bfd_elf_gc_mark_hook (sec, info, rela, hh, sym);
30667bf3
AM
1545}
1546
edfc032f
AM
1547/* Support for core dump NOTE sections. */
1548
1549static bfd_boolean
1550elf32_hppa_grok_prstatus (bfd *abfd, Elf_Internal_Note *note)
1551{
1552 int offset;
1553 size_t size;
1554
1555 switch (note->descsz)
1556 {
1557 default:
1558 return FALSE;
1559
1560 case 396: /* Linux/hppa */
1561 /* pr_cursig */
228e534f 1562 elf_tdata (abfd)->core->signal = bfd_get_16 (abfd, note->descdata + 12);
edfc032f
AM
1563
1564 /* pr_pid */
228e534f 1565 elf_tdata (abfd)->core->lwpid = bfd_get_32 (abfd, note->descdata + 24);
edfc032f
AM
1566
1567 /* pr_reg */
1568 offset = 72;
1569 size = 320;
1570
1571 break;
1572 }
1573
1574 /* Make a ".reg/999" section. */
1575 return _bfd_elfcore_make_pseudosection (abfd, ".reg",
1576 size, note->descpos + offset);
1577}
1578
1579static bfd_boolean
1580elf32_hppa_grok_psinfo (bfd *abfd, Elf_Internal_Note *note)
1581{
1582 switch (note->descsz)
1583 {
1584 default:
1585 return FALSE;
1586
1587 case 124: /* Linux/hppa elf_prpsinfo. */
228e534f 1588 elf_tdata (abfd)->core->program
edfc032f 1589 = _bfd_elfcore_strndup (abfd, note->descdata + 28, 16);
228e534f 1590 elf_tdata (abfd)->core->command
edfc032f
AM
1591 = _bfd_elfcore_strndup (abfd, note->descdata + 44, 80);
1592 }
1593
1594 /* Note that for some reason, a spurious space is tacked
1595 onto the end of the args in some (at least one anyway)
1596 implementations, so strip it off if it exists. */
1597 {
228e534f 1598 char *command = elf_tdata (abfd)->core->command;
edfc032f
AM
1599 int n = strlen (command);
1600
1601 if (0 < n && command[n - 1] == ' ')
1602 command[n - 1] = '\0';
1603 }
1604
1605 return TRUE;
1606}
1607
74d1c347
AM
1608/* Our own version of hide_symbol, so that we can keep plt entries for
1609 plabels. */
1610
1611static void
c39a58e6 1612elf32_hppa_hide_symbol (struct bfd_link_info *info,
875c0872 1613 struct elf_link_hash_entry *eh,
c39a58e6 1614 bfd_boolean force_local)
74d1c347 1615{
e5094212
AM
1616 if (force_local)
1617 {
875c0872
DA
1618 eh->forced_local = 1;
1619 if (eh->dynindx != -1)
e5094212 1620 {
875c0872 1621 eh->dynindx = -1;
e5094212 1622 _bfd_elf_strtab_delref (elf_hash_table (info)->dynstr,
875c0872 1623 eh->dynstr_index);
e5094212 1624 }
31fc8a0b
NC
1625
1626 /* PR 16082: Remove version information from hidden symbol. */
1627 eh->verinfo.verdef = NULL;
1628 eh->verinfo.vertree = NULL;
e5094212
AM
1629 }
1630
4340287b
DA
1631 /* STT_GNU_IFUNC symbol must go through PLT. */
1632 if (! hppa_elf_hash_entry (eh)->plabel
1633 && eh->type != STT_GNU_IFUNC)
74d1c347 1634 {
875c0872 1635 eh->needs_plt = 0;
4340287b 1636 eh->plt = elf_hash_table (info)->init_plt_offset;
74d1c347
AM
1637 }
1638}
1639
127e8e9f
AM
1640/* Find any dynamic relocs that apply to read-only sections. */
1641
1642static asection *
1643readonly_dynrelocs (struct elf_link_hash_entry *eh)
1644{
1645 struct elf32_hppa_link_hash_entry *hh;
1646 struct elf32_hppa_dyn_reloc_entry *hdh_p;
1647
1648 hh = hppa_elf_hash_entry (eh);
1649 for (hdh_p = hh->dyn_relocs; hdh_p != NULL; hdh_p = hdh_p->hdh_next)
1650 {
1651 asection *sec = hdh_p->sec->output_section;
1652
1653 if (sec != NULL && (sec->flags & SEC_READONLY) != 0)
1654 return hdh_p->sec;
1655 }
1656 return NULL;
1657}
1658
287c7eaf
AM
1659/* Return true if we have dynamic relocs against H or any of its weak
1660 aliases, that apply to read-only sections. Cannot be used after
1661 size_dynamic_sections. */
1662
1663static bfd_boolean
1664alias_readonly_dynrelocs (struct elf_link_hash_entry *eh)
1665{
1666 struct elf32_hppa_link_hash_entry *hh = hppa_elf_hash_entry (eh);
1667 do
1668 {
1669 if (readonly_dynrelocs (&hh->eh))
1670 return TRUE;
1671 hh = hppa_elf_hash_entry (hh->eh.u.alias);
1672 } while (hh != NULL && &hh->eh != eh);
1673
1674 return FALSE;
1675}
1676
30667bf3
AM
1677/* Adjust a symbol defined by a dynamic object and referenced by a
1678 regular object. The current definition is in some section of the
1679 dynamic object, but we're not including those sections. We have to
1680 change the definition to something the rest of the link can
1681 understand. */
252b5132 1682
b34976b6 1683static bfd_boolean
c39a58e6 1684elf32_hppa_adjust_dynamic_symbol (struct bfd_link_info *info,
875c0872 1685 struct elf_link_hash_entry *eh)
252b5132 1686{
83c81bfe 1687 struct elf32_hppa_link_hash_table *htab;
5474d94f 1688 asection *sec, *srel;
30667bf3
AM
1689
1690 /* If this is a function, put it in the procedure linkage table. We
067fa4a6 1691 will fill in the contents of the procedure linkage table later. */
875c0872
DA
1692 if (eh->type == STT_FUNC
1693 || eh->needs_plt)
30667bf3 1694 {
127e8e9f
AM
1695 bfd_boolean local = (SYMBOL_CALLS_LOCAL (info, eh)
1696 || UNDEFWEAK_NO_DYNAMIC_RELOC (info, eh));
287c7eaf 1697 /* Discard dyn_relocs when non-pic if we've decided that a
529fe20e 1698 function symbol is local. */
287c7eaf
AM
1699 if (!bfd_link_pic (info) && local)
1700 hppa_elf_hash_entry (eh)->dyn_relocs = NULL;
127e8e9f 1701
4340287b
DA
1702 /* If the symbol is used by a plabel, we must allocate a PLT slot.
1703 The refcounts are not reliable when it has been hidden since
1704 hide_symbol can be called before the plabel flag is set. */
d336fa6d 1705 if (hppa_elf_hash_entry (eh)->plabel)
4340287b
DA
1706 eh->plt.refcount = 1;
1707
127e8e9f
AM
1708 /* Note that unlike some other backends, the refcount is not
1709 incremented for a non-call (and non-plabel) function reference. */
d336fa6d 1710 else if (eh->plt.refcount <= 0
127e8e9f 1711 || local)
30667bf3
AM
1712 {
1713 /* The .plt entry is not needed when:
1714 a) Garbage collection has removed all references to the
1715 symbol, or
1716 b) We know for certain the symbol is defined in this
74d1c347
AM
1717 object, and it's not a weak definition, nor is the symbol
1718 used by a plabel relocation. Either this object is the
1719 application or we are doing a shared symbolic link. */
875c0872
DA
1720 eh->plt.offset = (bfd_vma) -1;
1721 eh->needs_plt = 0;
30667bf3 1722 }
4dc86686 1723
287c7eaf
AM
1724 /* Unlike other targets, elf32-hppa.c does not define a function
1725 symbol in a non-pic executable on PLT stub code, so we don't
1726 have a local definition in that case. ie. dyn_relocs can't
1727 be discarded. */
1728
127e8e9f 1729 /* Function symbols can't have copy relocs. */
b34976b6 1730 return TRUE;
30667bf3 1731 }
bbd7ec4a 1732 else
875c0872 1733 eh->plt.offset = (bfd_vma) -1;
edd21aca 1734
4a7e5234
AM
1735 htab = hppa_link_hash_table (info);
1736 if (htab == NULL)
1737 return FALSE;
1738
30667bf3
AM
1739 /* If this is a weak symbol, and there is a real definition, the
1740 processor independent code will have arranged for us to see the
1741 real definition first, and we can just use the same value. */
60d67dc8 1742 if (eh->is_weakalias)
edd21aca 1743 {
60d67dc8
AM
1744 struct elf_link_hash_entry *def = weakdef (eh);
1745 BFD_ASSERT (def->root.type == bfd_link_hash_defined);
1746 eh->root.u.def.section = def->root.u.def.section;
1747 eh->root.u.def.value = def->root.u.def.value;
4a7e5234
AM
1748 if (def->root.u.def.section == htab->etab.sdynbss
1749 || def->root.u.def.section == htab->etab.sdynrelro)
1750 hppa_elf_hash_entry (eh)->dyn_relocs = NULL;
b34976b6 1751 return TRUE;
30667bf3 1752 }
edd21aca 1753
30667bf3
AM
1754 /* This is a reference to a symbol defined by a dynamic object which
1755 is not a function. */
1756
1757 /* If we are creating a shared library, we must presume that the
1758 only references to the symbol are via the global offset table.
1759 For such cases we need not do anything here; the relocations will
1760 be handled correctly by relocate_section. */
0e1862bb 1761 if (bfd_link_pic (info))
b34976b6 1762 return TRUE;
30667bf3
AM
1763
1764 /* If there are no references to this symbol that do not use the
1765 GOT, we don't need to generate a copy reloc. */
875c0872 1766 if (!eh->non_got_ref)
529fe20e 1767 return TRUE;
ebe50bae 1768
127e8e9f
AM
1769 /* If -z nocopyreloc was given, we won't generate them either. */
1770 if (info->nocopyreloc)
529fe20e 1771 return TRUE;
4fc8051d 1772
127e8e9f 1773 if (ELIMINATE_COPY_RELOCS
287c7eaf 1774 && !alias_readonly_dynrelocs (eh))
127e8e9f 1775 {
4fc8051d
AM
1776 /* If we didn't find any dynamic relocs in read-only sections, then
1777 we'll be keeping the dynamic relocs and avoiding the copy reloc. */
127e8e9f 1778 return TRUE;
ebe50bae
AM
1779 }
1780
30667bf3
AM
1781 /* We must allocate the symbol in our .dynbss section, which will
1782 become part of the .bss section of the executable. There will be
1783 an entry for this symbol in the .dynsym section. The dynamic
1784 object will contain position independent code, so all references
1785 from the dynamic object to this symbol will go through the global
1786 offset table. The dynamic linker will use the .dynsym entry to
1787 determine the address it must put in the global offset table, so
1788 both the dynamic object and the regular object will refer to the
1789 same memory location for the variable. */
5474d94f
AM
1790 if ((eh->root.u.def.section->flags & SEC_READONLY) != 0)
1791 {
1792 sec = htab->etab.sdynrelro;
1793 srel = htab->etab.sreldynrelro;
1794 }
1795 else
1796 {
1797 sec = htab->etab.sdynbss;
1798 srel = htab->etab.srelbss;
1799 }
1d7e9d18 1800 if ((eh->root.u.def.section->flags & SEC_ALLOC) != 0 && eh->size != 0)
30667bf3 1801 {
4a7e5234
AM
1802 /* We must generate a COPY reloc to tell the dynamic linker to
1803 copy the initial value out of the dynamic object and into the
1804 runtime process image. */
5474d94f 1805 srel->size += sizeof (Elf32_External_Rela);
875c0872 1806 eh->needs_copy = 1;
edd21aca 1807 }
252b5132 1808
529fe20e 1809 /* We no longer want dyn_relocs. */
287c7eaf 1810 hppa_elf_hash_entry (eh)->dyn_relocs = NULL;
6cabe1ea 1811 return _bfd_elf_adjust_dynamic_copy (info, eh, sec);
252b5132
RH
1812}
1813
46434633 1814/* If EH is undefined, make it dynamic if that makes sense. */
595e0a47
AM
1815
1816static bfd_boolean
46434633
AM
1817ensure_undef_dynamic (struct bfd_link_info *info,
1818 struct elf_link_hash_entry *eh)
595e0a47 1819{
46434633
AM
1820 struct elf_link_hash_table *htab = elf_hash_table (info);
1821
1822 if (htab->dynamic_sections_created
1823 && (eh->root.type == bfd_link_hash_undefweak
1824 || eh->root.type == bfd_link_hash_undefined)
1825 && eh->dynindx == -1
595e0a47
AM
1826 && !eh->forced_local
1827 && eh->type != STT_PARISC_MILLI
60c1b909 1828 && !UNDEFWEAK_NO_DYNAMIC_RELOC (info, eh)
595e0a47
AM
1829 && ELF_ST_VISIBILITY (eh->other) == STV_DEFAULT)
1830 return bfd_elf_link_record_dynamic_symbol (info, eh);
1831 return TRUE;
1832}
1833
e5ee5df1 1834/* Allocate space in the .plt for entries that won't have relocations.
a252afa4 1835 ie. plabel entries. */
a8d02d66 1836
b34976b6 1837static bfd_boolean
875c0872 1838allocate_plt_static (struct elf_link_hash_entry *eh, void *inf)
a8d02d66
AM
1839{
1840 struct bfd_link_info *info;
1841 struct elf32_hppa_link_hash_table *htab;
875c0872
DA
1842 struct elf32_hppa_link_hash_entry *hh;
1843 asection *sec;
a8d02d66 1844
875c0872 1845 if (eh->root.type == bfd_link_hash_indirect)
b34976b6 1846 return TRUE;
a8d02d66 1847
875c0872 1848 info = (struct bfd_link_info *) inf;
9b52905e 1849 hh = hppa_elf_hash_entry (eh);
a8d02d66 1850 htab = hppa_link_hash_table (info);
4dfe6ac6
NC
1851 if (htab == NULL)
1852 return FALSE;
1853
a63e02c7 1854 if (htab->etab.dynamic_sections_created
875c0872 1855 && eh->plt.refcount > 0)
e5ee5df1 1856 {
46434633 1857 if (!ensure_undef_dynamic (info, eh))
595e0a47 1858 return FALSE;
e5ee5df1 1859
0e1862bb 1860 if (WILL_CALL_FINISH_DYNAMIC_SYMBOL (1, bfd_link_pic (info), eh))
e5ee5df1 1861 {
067fa4a6
AM
1862 /* Allocate these later. From this point on, h->plabel
1863 means that the plt entry is only used by a plabel.
1864 We'll be using a normal plt entry for this symbol, so
1865 clear the plabel indicator. */
68ffbac6 1866
875c0872 1867 hh->plabel = 0;
e5ee5df1 1868 }
875c0872 1869 else if (hh->plabel)
e5ee5df1
AM
1870 {
1871 /* Make an entry in the .plt section for plabel references
1872 that won't have a .plt entry for other reasons. */
ce558b89 1873 sec = htab->etab.splt;
875c0872
DA
1874 eh->plt.offset = sec->size;
1875 sec->size += PLT_ENTRY_SIZE;
247d6c4c
AM
1876 if (bfd_link_pic (info))
1877 htab->etab.srelplt->size += sizeof (Elf32_External_Rela);
a8d02d66
AM
1878 }
1879 else
e5ee5df1
AM
1880 {
1881 /* No .plt entry needed. */
875c0872
DA
1882 eh->plt.offset = (bfd_vma) -1;
1883 eh->needs_plt = 0;
e5ee5df1
AM
1884 }
1885 }
1886 else
1887 {
875c0872
DA
1888 eh->plt.offset = (bfd_vma) -1;
1889 eh->needs_plt = 0;
a8d02d66
AM
1890 }
1891
b34976b6 1892 return TRUE;
a8d02d66
AM
1893}
1894
2e684e75
AM
1895/* Calculate size of GOT entries for symbol given its TLS_TYPE. */
1896
1897static inline unsigned int
1898got_entries_needed (int tls_type)
1899{
1900 unsigned int need = 0;
1901
1902 if ((tls_type & GOT_NORMAL) != 0)
1903 need += GOT_ENTRY_SIZE;
1904 if ((tls_type & GOT_TLS_GD) != 0)
1905 need += GOT_ENTRY_SIZE * 2;
1906 if ((tls_type & GOT_TLS_IE) != 0)
1907 need += GOT_ENTRY_SIZE;
1908 return need;
1909}
1910
1911/* Calculate size of relocs needed for symbol given its TLS_TYPE and
1912 NEEDed GOT entries. KNOWN says a TPREL offset can be calculated
1913 at link time. */
1914
1915static inline unsigned int
1916got_relocs_needed (int tls_type, unsigned int need, bfd_boolean known)
1917{
1918 /* All the entries we allocated need relocs.
1919 Except IE in executable with a local symbol. We could also omit
1920 the DTPOFF reloc on the second word of a GD entry under the same
1921 condition as that for IE, but ld.so might want to differentiate
1922 LD and GD entries at some stage. */
1923 if ((tls_type & GOT_TLS_IE) != 0 && known)
1924 need -= GOT_ENTRY_SIZE;
1925 return need * sizeof (Elf32_External_Rela) / GOT_ENTRY_SIZE;
1926}
1927
4dc86686
AM
1928/* Allocate space in .plt, .got and associated reloc sections for
1929 global syms. */
1930
b34976b6 1931static bfd_boolean
875c0872 1932allocate_dynrelocs (struct elf_link_hash_entry *eh, void *inf)
4dc86686
AM
1933{
1934 struct bfd_link_info *info;
83c81bfe 1935 struct elf32_hppa_link_hash_table *htab;
875c0872
DA
1936 asection *sec;
1937 struct elf32_hppa_link_hash_entry *hh;
1938 struct elf32_hppa_dyn_reloc_entry *hdh_p;
4dc86686 1939
875c0872 1940 if (eh->root.type == bfd_link_hash_indirect)
b34976b6 1941 return TRUE;
73a74a62 1942
c39a58e6 1943 info = inf;
83c81bfe 1944 htab = hppa_link_hash_table (info);
4dfe6ac6
NC
1945 if (htab == NULL)
1946 return FALSE;
1947
875c0872 1948 hh = hppa_elf_hash_entry (eh);
68ffbac6 1949
a63e02c7 1950 if (htab->etab.dynamic_sections_created
875c0872
DA
1951 && eh->plt.offset != (bfd_vma) -1
1952 && !hh->plabel
1953 && eh->plt.refcount > 0)
4dc86686 1954 {
e5ee5df1 1955 /* Make an entry in the .plt section. */
ce558b89 1956 sec = htab->etab.splt;
875c0872
DA
1957 eh->plt.offset = sec->size;
1958 sec->size += PLT_ENTRY_SIZE;
3ac8354b 1959
e5ee5df1 1960 /* We also need to make an entry in the .rela.plt section. */
ce558b89 1961 htab->etab.srelplt->size += sizeof (Elf32_External_Rela);
e5ee5df1 1962 htab->need_plt_stub = 1;
4dc86686 1963 }
edd21aca 1964
875c0872 1965 if (eh->got.refcount > 0)
4dc86686 1966 {
2e684e75
AM
1967 unsigned int need;
1968
46434633 1969 if (!ensure_undef_dynamic (info, eh))
595e0a47 1970 return FALSE;
446f2863 1971
ce558b89 1972 sec = htab->etab.sgot;
875c0872 1973 eh->got.offset = sec->size;
2e684e75
AM
1974 need = got_entries_needed (hh->tls_type);
1975 sec->size += need;
a63e02c7 1976 if (htab->etab.dynamic_sections_created
0e1862bb 1977 && (bfd_link_pic (info)
875c0872 1978 || (eh->dynindx != -1
d336fa6d
AM
1979 && !SYMBOL_REFERENCES_LOCAL (info, eh)))
1980 && !UNDEFWEAK_NO_DYNAMIC_RELOC (info, eh))
ce757d15 1981 {
2e684e75
AM
1982 bfd_boolean tprel_known = (bfd_link_executable (info)
1983 && SYMBOL_REFERENCES_LOCAL (info, eh));
1984 htab->etab.srelgot->size
1985 += got_relocs_needed (hh->tls_type, need, tprel_known);
ce757d15 1986 }
4dc86686
AM
1987 }
1988 else
875c0872 1989 eh->got.offset = (bfd_vma) -1;
30667bf3 1990
d336fa6d
AM
1991 /* If no dynamic sections we can't have dynamic relocs. */
1992 if (!htab->etab.dynamic_sections_created)
1993 hh->dyn_relocs = NULL;
1994
529fe20e
AM
1995 /* Discard relocs on undefined syms with non-default visibility. */
1996 else if ((eh->root.type == bfd_link_hash_undefined
1997 && ELF_ST_VISIBILITY (eh->other) != STV_DEFAULT)
1998 || UNDEFWEAK_NO_DYNAMIC_RELOC (info, eh))
1999 hh->dyn_relocs = NULL;
2000
875c0872 2001 if (hh->dyn_relocs == NULL)
287c7eaf 2002 return TRUE;
30667bf3 2003
98ceb8ce
AM
2004 /* If this is a -Bsymbolic shared link, then we need to discard all
2005 space allocated for dynamic pc-relative relocs against symbols
2006 defined in a regular object. For the normal shared case, discard
2007 space for relocs that have become local due to symbol visibility
2008 changes. */
0e1862bb 2009 if (bfd_link_pic (info))
446f2863 2010 {
98ceb8ce 2011#if RELATIVE_DYNRELOCS
529fe20e 2012 if (SYMBOL_CALLS_LOCAL (info, eh))
446f2863 2013 {
875c0872 2014 struct elf32_hppa_dyn_reloc_entry **hdh_pp;
30667bf3 2015
875c0872 2016 for (hdh_pp = &hh->dyn_relocs; (hdh_p = *hdh_pp) != NULL; )
98ceb8ce 2017 {
875c0872
DA
2018 hdh_p->count -= hdh_p->relative_count;
2019 hdh_p->relative_count = 0;
2020 if (hdh_p->count == 0)
a63e02c7 2021 *hdh_pp = hdh_p->hdh_next;
98ceb8ce 2022 else
a63e02c7 2023 hdh_pp = &hdh_p->hdh_next;
98ceb8ce
AM
2024 }
2025 }
2026#endif
4fc8051d 2027
46434633 2028 if (hh->dyn_relocs != NULL)
22d606e9 2029 {
46434633 2030 if (!ensure_undef_dynamic (info, eh))
595e0a47 2031 return FALSE;
22d606e9 2032 }
446f2863 2033 }
d336fa6d 2034 else if (ELIMINATE_COPY_RELOCS)
30667bf3 2035 {
98ceb8ce
AM
2036 /* For the non-shared case, discard space for relocs against
2037 symbols which turn out to need copy relocs or are not
2038 dynamic. */
68ffbac6 2039
529fe20e 2040 if (eh->dynamic_adjusted
529fe20e
AM
2041 && !eh->def_regular
2042 && !ELF_COMMON_DEF_P (eh))
98ceb8ce 2043 {
46434633 2044 if (!ensure_undef_dynamic (info, eh))
595e0a47 2045 return FALSE;
98ceb8ce 2046
46434633 2047 if (eh->dynindx == -1)
287c7eaf 2048 hh->dyn_relocs = NULL;
98ceb8ce 2049 }
46434633 2050 else
287c7eaf 2051 hh->dyn_relocs = NULL;
30667bf3 2052 }
30667bf3 2053
98ceb8ce 2054 /* Finally, allocate space. */
a63e02c7 2055 for (hdh_p = hh->dyn_relocs; hdh_p != NULL; hdh_p = hdh_p->hdh_next)
30667bf3 2056 {
875c0872
DA
2057 asection *sreloc = elf_section_data (hdh_p->sec)->sreloc;
2058 sreloc->size += hdh_p->count * sizeof (Elf32_External_Rela);
30667bf3 2059 }
30667bf3 2060
b34976b6 2061 return TRUE;
30667bf3 2062}
30667bf3 2063
d5c73c2f
AM
2064/* This function is called via elf_link_hash_traverse to force
2065 millicode symbols local so they do not end up as globals in the
2066 dynamic symbol table. We ought to be able to do this in
2067 adjust_dynamic_symbol, but our adjust_dynamic_symbol is not called
2068 for all dynamic symbols. Arguably, this is a bug in
2069 elf_adjust_dynamic_symbol. */
2070
b34976b6 2071static bfd_boolean
875c0872 2072clobber_millicode_symbols (struct elf_link_hash_entry *eh,
c39a58e6 2073 struct bfd_link_info *info)
d5c73c2f 2074{
875c0872
DA
2075 if (eh->type == STT_PARISC_MILLI
2076 && !eh->forced_local)
e0522e89 2077 {
875c0872 2078 elf32_hppa_hide_symbol (info, eh, TRUE);
e0522e89 2079 }
b34976b6 2080 return TRUE;
d5c73c2f
AM
2081}
2082
127e8e9f
AM
2083/* Set DF_TEXTREL if we find any dynamic relocs that apply to
2084 read-only sections. */
98ceb8ce 2085
b34976b6 2086static bfd_boolean
127e8e9f 2087maybe_set_textrel (struct elf_link_hash_entry *eh, void *inf)
98ceb8ce 2088{
127e8e9f 2089 asection *sec;
98ceb8ce 2090
127e8e9f
AM
2091 if (eh->root.type == bfd_link_hash_indirect)
2092 return TRUE;
98ceb8ce 2093
127e8e9f
AM
2094 sec = readonly_dynrelocs (eh);
2095 if (sec != NULL)
2096 {
2097 struct bfd_link_info *info = (struct bfd_link_info *) inf;
98ceb8ce 2098
127e8e9f
AM
2099 info->flags |= DF_TEXTREL;
2100 info->callbacks->minfo
63c1f59d
AM
2101 (_("%B: dynamic relocation against `%T' in read-only section `%A'\n"),
2102 sec->owner, eh->root.root.string, sec);
98ceb8ce 2103
127e8e9f
AM
2104 /* Not an error, just cut short the traversal. */
2105 return FALSE;
98ceb8ce 2106 }
b34976b6 2107 return TRUE;
98ceb8ce
AM
2108}
2109
30667bf3
AM
2110/* Set the sizes of the dynamic sections. */
2111
b34976b6 2112static bfd_boolean
c39a58e6
AM
2113elf32_hppa_size_dynamic_sections (bfd *output_bfd ATTRIBUTE_UNUSED,
2114 struct bfd_link_info *info)
30667bf3 2115{
83c81bfe 2116 struct elf32_hppa_link_hash_table *htab;
30667bf3 2117 bfd *dynobj;
98ceb8ce 2118 bfd *ibfd;
875c0872 2119 asection *sec;
b34976b6 2120 bfd_boolean relocs;
30667bf3 2121
83c81bfe 2122 htab = hppa_link_hash_table (info);
4dfe6ac6
NC
2123 if (htab == NULL)
2124 return FALSE;
2125
a63e02c7 2126 dynobj = htab->etab.dynobj;
49e9d0d3
AM
2127 if (dynobj == NULL)
2128 abort ();
30667bf3 2129
a63e02c7 2130 if (htab->etab.dynamic_sections_created)
30667bf3
AM
2131 {
2132 /* Set the contents of the .interp section to the interpreter. */
9b8b325a 2133 if (bfd_link_executable (info) && !info->nointerp)
30667bf3 2134 {
3d4d4302 2135 sec = bfd_get_linker_section (dynobj, ".interp");
875c0872 2136 if (sec == NULL)
49e9d0d3 2137 abort ();
875c0872
DA
2138 sec->size = sizeof ELF_DYNAMIC_INTERPRETER;
2139 sec->contents = (unsigned char *) ELF_DYNAMIC_INTERPRETER;
30667bf3 2140 }
74d1c347 2141
d5c73c2f 2142 /* Force millicode symbols local. */
a63e02c7 2143 elf_link_hash_traverse (&htab->etab,
d5c73c2f
AM
2144 clobber_millicode_symbols,
2145 info);
68fb2e56 2146 }
d5c73c2f 2147
98ceb8ce
AM
2148 /* Set up .got and .plt offsets for local syms, and space for local
2149 dynamic relocs. */
c72f2fb2 2150 for (ibfd = info->input_bfds; ibfd != NULL; ibfd = ibfd->link.next)
68fb2e56
AM
2151 {
2152 bfd_signed_vma *local_got;
2153 bfd_signed_vma *end_local_got;
2154 bfd_signed_vma *local_plt;
2155 bfd_signed_vma *end_local_plt;
2156 bfd_size_type locsymcount;
2157 Elf_Internal_Shdr *symtab_hdr;
2158 asection *srel;
9b52905e 2159 char *local_tls_type;
74d1c347 2160
98ceb8ce 2161 if (bfd_get_flavour (ibfd) != bfd_target_elf_flavour)
68fb2e56 2162 continue;
4dc86686 2163
875c0872 2164 for (sec = ibfd->sections; sec != NULL; sec = sec->next)
98ceb8ce 2165 {
875c0872 2166 struct elf32_hppa_dyn_reloc_entry *hdh_p;
98ceb8ce 2167
875c0872
DA
2168 for (hdh_p = ((struct elf32_hppa_dyn_reloc_entry *)
2169 elf_section_data (sec)->local_dynrel);
2170 hdh_p != NULL;
a63e02c7 2171 hdh_p = hdh_p->hdh_next)
98ceb8ce 2172 {
875c0872
DA
2173 if (!bfd_is_abs_section (hdh_p->sec)
2174 && bfd_is_abs_section (hdh_p->sec->output_section))
ec338859
AM
2175 {
2176 /* Input section has been discarded, either because
2177 it is a copy of a linkonce section or due to
2178 linker script /DISCARD/, so we'll be discarding
2179 the relocs too. */
2180 }
875c0872 2181 else if (hdh_p->count != 0)
ec338859 2182 {
875c0872
DA
2183 srel = elf_section_data (hdh_p->sec)->sreloc;
2184 srel->size += hdh_p->count * sizeof (Elf32_External_Rela);
2185 if ((hdh_p->sec->output_section->flags & SEC_READONLY) != 0)
248866a8 2186 info->flags |= DF_TEXTREL;
ec338859 2187 }
98ceb8ce
AM
2188 }
2189 }
2190
2191 local_got = elf_local_got_refcounts (ibfd);
68fb2e56
AM
2192 if (!local_got)
2193 continue;
74d1c347 2194
98ceb8ce 2195 symtab_hdr = &elf_tdata (ibfd)->symtab_hdr;
68fb2e56
AM
2196 locsymcount = symtab_hdr->sh_info;
2197 end_local_got = local_got + locsymcount;
9b52905e 2198 local_tls_type = hppa_elf_local_got_tls_type (ibfd);
ce558b89
AM
2199 sec = htab->etab.sgot;
2200 srel = htab->etab.srelgot;
68fb2e56
AM
2201 for (; local_got < end_local_got; ++local_got)
2202 {
2203 if (*local_got > 0)
4dc86686 2204 {
2e684e75
AM
2205 unsigned int need;
2206
875c0872 2207 *local_got = sec->size;
2e684e75
AM
2208 need = got_entries_needed (*local_tls_type);
2209 sec->size += need;
0e1862bb 2210 if (bfd_link_pic (info))
2e684e75
AM
2211 {
2212 bfd_boolean tprel_known = bfd_link_executable (info);
2213 htab->etab.srelgot->size
2214 += got_relocs_needed (*local_tls_type, need, tprel_known);
2215 }
4dc86686 2216 }
68fb2e56
AM
2217 else
2218 *local_got = (bfd_vma) -1;
9b52905e
NC
2219
2220 ++local_tls_type;
68fb2e56 2221 }
74d1c347 2222
68fb2e56
AM
2223 local_plt = end_local_got;
2224 end_local_plt = local_plt + locsymcount;
a63e02c7 2225 if (! htab->etab.dynamic_sections_created)
68fb2e56
AM
2226 {
2227 /* Won't be used, but be safe. */
2228 for (; local_plt < end_local_plt; ++local_plt)
2229 *local_plt = (bfd_vma) -1;
2230 }
2231 else
2232 {
ce558b89
AM
2233 sec = htab->etab.splt;
2234 srel = htab->etab.srelplt;
74d1c347
AM
2235 for (; local_plt < end_local_plt; ++local_plt)
2236 {
2237 if (*local_plt > 0)
2238 {
875c0872
DA
2239 *local_plt = sec->size;
2240 sec->size += PLT_ENTRY_SIZE;
0e1862bb 2241 if (bfd_link_pic (info))
eea6121a 2242 srel->size += sizeof (Elf32_External_Rela);
74d1c347
AM
2243 }
2244 else
2245 *local_plt = (bfd_vma) -1;
2246 }
2247 }
30667bf3 2248 }
68ffbac6 2249
9b52905e
NC
2250 if (htab->tls_ldm_got.refcount > 0)
2251 {
68ffbac6 2252 /* Allocate 2 got entries and 1 dynamic reloc for
9b52905e 2253 R_PARISC_TLS_DTPMOD32 relocs. */
ce558b89
AM
2254 htab->tls_ldm_got.offset = htab->etab.sgot->size;
2255 htab->etab.sgot->size += (GOT_ENTRY_SIZE * 2);
2256 htab->etab.srelgot->size += sizeof (Elf32_External_Rela);
9b52905e
NC
2257 }
2258 else
2259 htab->tls_ldm_got.offset = -1;
30667bf3 2260
e5ee5df1
AM
2261 /* Do all the .plt entries without relocs first. The dynamic linker
2262 uses the last .plt reloc to find the end of the .plt (and hence
2263 the start of the .got) for lazy linking. */
a63e02c7 2264 elf_link_hash_traverse (&htab->etab, allocate_plt_static, info);
a8d02d66 2265
98ceb8ce
AM
2266 /* Allocate global sym .plt and .got entries, and space for global
2267 sym dynamic relocs. */
a63e02c7 2268 elf_link_hash_traverse (&htab->etab, allocate_dynrelocs, info);
30667bf3
AM
2269
2270 /* The check_relocs and adjust_dynamic_symbol entry points have
2271 determined the sizes of the various dynamic sections. Allocate
2272 memory for them. */
b34976b6 2273 relocs = FALSE;
875c0872 2274 for (sec = dynobj->sections; sec != NULL; sec = sec->next)
30667bf3 2275 {
875c0872 2276 if ((sec->flags & SEC_LINKER_CREATED) == 0)
30667bf3
AM
2277 continue;
2278
ce558b89 2279 if (sec == htab->etab.splt)
68fb2e56 2280 {
83c81bfe 2281 if (htab->need_plt_stub)
68fb2e56
AM
2282 {
2283 /* Make space for the plt stub at the end of the .plt
2284 section. We want this stub right at the end, up
2285 against the .got section. */
ce558b89 2286 int gotalign = bfd_section_alignment (dynobj, htab->etab.sgot);
875c0872 2287 int pltalign = bfd_section_alignment (dynobj, sec);
68fb2e56 2288 bfd_size_type mask;
30667bf3 2289
68fb2e56 2290 if (gotalign > pltalign)
a253d456 2291 (void) bfd_set_section_alignment (dynobj, sec, gotalign);
68fb2e56 2292 mask = ((bfd_size_type) 1 << gotalign) - 1;
875c0872 2293 sec->size = (sec->size + sizeof (plt_stub) + mask) & ~mask;
68fb2e56
AM
2294 }
2295 }
ce558b89 2296 else if (sec == htab->etab.sgot
5474d94f
AM
2297 || sec == htab->etab.sdynbss
2298 || sec == htab->etab.sdynrelro)
68fb2e56 2299 ;
0112cd26 2300 else if (CONST_STRNEQ (bfd_get_section_name (dynobj, sec), ".rela"))
30667bf3 2301 {
875c0872 2302 if (sec->size != 0)
30667bf3 2303 {
4e12ff7f
AM
2304 /* Remember whether there are any reloc sections other
2305 than .rela.plt. */
ce558b89 2306 if (sec != htab->etab.srelplt)
b34976b6 2307 relocs = TRUE;
47d89dba 2308
30667bf3
AM
2309 /* We use the reloc_count field as a counter if we need
2310 to copy relocs into the output file. */
875c0872 2311 sec->reloc_count = 0;
30667bf3
AM
2312 }
2313 }
30667bf3
AM
2314 else
2315 {
2316 /* It's not one of our sections, so don't allocate space. */
2317 continue;
2318 }
2319
875c0872 2320 if (sec->size == 0)
30667bf3
AM
2321 {
2322 /* If we don't need this section, strip it from the
2323 output file. This is mostly to handle .rela.bss and
2324 .rela.plt. We must create both sections in
2325 create_dynamic_sections, because they must be created
2326 before the linker maps input sections to output
2327 sections. The linker does that before
2328 adjust_dynamic_symbol is called, and it is that
2329 function which decides whether anything needs to go
2330 into these sections. */
875c0872 2331 sec->flags |= SEC_EXCLUDE;
30667bf3
AM
2332 continue;
2333 }
2334
c456f082
AM
2335 if ((sec->flags & SEC_HAS_CONTENTS) == 0)
2336 continue;
2337
30667bf3
AM
2338 /* Allocate memory for the section contents. Zero it, because
2339 we may not fill in all the reloc sections. */
875c0872 2340 sec->contents = bfd_zalloc (dynobj, sec->size);
c456f082 2341 if (sec->contents == NULL)
b34976b6 2342 return FALSE;
30667bf3
AM
2343 }
2344
a63e02c7 2345 if (htab->etab.dynamic_sections_created)
30667bf3
AM
2346 {
2347 /* Like IA-64 and HPPA64, always create a DT_PLTGOT. It
2348 actually has nothing to do with the PLT, it is how we
2349 communicate the LTP value of a load module to the dynamic
2350 linker. */
dc810e39 2351#define add_dynamic_entry(TAG, VAL) \
5a580b3a 2352 _bfd_elf_add_dynamic_entry (info, TAG, VAL)
dc810e39
AM
2353
2354 if (!add_dynamic_entry (DT_PLTGOT, 0))
b34976b6 2355 return FALSE;
30667bf3
AM
2356
2357 /* Add some entries to the .dynamic section. We fill in the
2358 values later, in elf32_hppa_finish_dynamic_sections, but we
2359 must add the entries now so that we get the correct size for
2360 the .dynamic section. The DT_DEBUG entry is filled in by the
2361 dynamic linker and used by the debugger. */
0e1862bb 2362 if (bfd_link_executable (info))
30667bf3 2363 {
dc810e39 2364 if (!add_dynamic_entry (DT_DEBUG, 0))
b34976b6 2365 return FALSE;
30667bf3
AM
2366 }
2367
ce558b89 2368 if (htab->etab.srelplt->size != 0)
30667bf3 2369 {
dc810e39
AM
2370 if (!add_dynamic_entry (DT_PLTRELSZ, 0)
2371 || !add_dynamic_entry (DT_PLTREL, DT_RELA)
2372 || !add_dynamic_entry (DT_JMPREL, 0))
b34976b6 2373 return FALSE;
30667bf3
AM
2374 }
2375
2376 if (relocs)
2377 {
dc810e39
AM
2378 if (!add_dynamic_entry (DT_RELA, 0)
2379 || !add_dynamic_entry (DT_RELASZ, 0)
2380 || !add_dynamic_entry (DT_RELAENT, sizeof (Elf32_External_Rela)))
b34976b6 2381 return FALSE;
30667bf3 2382
98ceb8ce
AM
2383 /* If any dynamic relocs apply to a read-only section,
2384 then we need a DT_TEXTREL entry. */
248866a8 2385 if ((info->flags & DF_TEXTREL) == 0)
127e8e9f 2386 elf_link_hash_traverse (&htab->etab, maybe_set_textrel, info);
98ceb8ce
AM
2387
2388 if ((info->flags & DF_TEXTREL) != 0)
2389 {
2390 if (!add_dynamic_entry (DT_TEXTREL, 0))
b34976b6 2391 return FALSE;
98ceb8ce 2392 }
30667bf3
AM
2393 }
2394 }
dc810e39 2395#undef add_dynamic_entry
30667bf3 2396
b34976b6 2397 return TRUE;
30667bf3
AM
2398}
2399
30667bf3
AM
2400/* External entry points for sizing and building linker stubs. */
2401
b4655ea9
AM
2402/* Set up various things so that we can make a list of input sections
2403 for each output section included in the link. Returns -1 on error,
cedb70c5 2404 0 when no stubs will be needed, and 1 on success. */
30667bf3 2405
b4655ea9 2406int
c39a58e6 2407elf32_hppa_setup_section_lists (bfd *output_bfd, struct bfd_link_info *info)
30667bf3
AM
2408{
2409 bfd *input_bfd;
b4655ea9 2410 unsigned int bfd_count;
7292b3ac 2411 unsigned int top_id, top_index;
30667bf3 2412 asection *section;
25f72752 2413 asection **input_list, **list;
dc810e39 2414 bfd_size_type amt;
b4655ea9 2415 struct elf32_hppa_link_hash_table *htab = hppa_link_hash_table (info);
30667bf3 2416
4dfe6ac6
NC
2417 if (htab == NULL)
2418 return -1;
2419
1badb539
AM
2420 /* Count the number of input BFDs and find the top input section id. */
2421 for (input_bfd = info->input_bfds, bfd_count = 0, top_id = 0;
30667bf3 2422 input_bfd != NULL;
c72f2fb2 2423 input_bfd = input_bfd->link.next)
30667bf3
AM
2424 {
2425 bfd_count += 1;
25f72752
AM
2426 for (section = input_bfd->sections;
2427 section != NULL;
2428 section = section->next)
2429 {
2430 if (top_id < section->id)
2431 top_id = section->id;
2432 }
30667bf3 2433 }
b4655ea9 2434 htab->bfd_count = bfd_count;
30667bf3 2435
dc810e39 2436 amt = sizeof (struct map_stub) * (top_id + 1);
c39a58e6 2437 htab->stub_group = bfd_zmalloc (amt);
83c81bfe 2438 if (htab->stub_group == NULL)
b4655ea9 2439 return -1;
1badb539 2440
b4655ea9 2441 /* We can't use output_bfd->section_count here to find the top output
1badb539 2442 section index as some sections may have been removed, and
8423293d 2443 strip_excluded_output_sections doesn't renumber the indices. */
1badb539
AM
2444 for (section = output_bfd->sections, top_index = 0;
2445 section != NULL;
2446 section = section->next)
2447 {
2448 if (top_index < section->index)
2449 top_index = section->index;
2450 }
2451
b4655ea9 2452 htab->top_index = top_index;
dc810e39 2453 amt = sizeof (asection *) * (top_index + 1);
c39a58e6 2454 input_list = bfd_malloc (amt);
b4655ea9 2455 htab->input_list = input_list;
25f72752 2456 if (input_list == NULL)
b4655ea9 2457 return -1;
25f72752 2458
1badb539
AM
2459 /* For sections we aren't interested in, mark their entries with a
2460 value we can check later. */
2461 list = input_list + top_index;
2462 do
2463 *list = bfd_abs_section_ptr;
2464 while (list-- != input_list);
2465
2466 for (section = output_bfd->sections;
2467 section != NULL;
2468 section = section->next)
2469 {
47d89dba 2470 if ((section->flags & SEC_CODE) != 0)
1badb539
AM
2471 input_list[section->index] = NULL;
2472 }
2473
b4655ea9
AM
2474 return 1;
2475}
2476
2477/* The linker repeatedly calls this function for each input section,
2478 in the order that input sections are linked into output sections.
2479 Build lists of input sections to determine groupings between which
2480 we may insert linker stubs. */
2481
2482void
c39a58e6 2483elf32_hppa_next_input_section (struct bfd_link_info *info, asection *isec)
b4655ea9
AM
2484{
2485 struct elf32_hppa_link_hash_table *htab = hppa_link_hash_table (info);
2486
4dfe6ac6
NC
2487 if (htab == NULL)
2488 return;
2489
b4655ea9 2490 if (isec->output_section->index <= htab->top_index)
25f72752 2491 {
b4655ea9
AM
2492 asection **list = htab->input_list + isec->output_section->index;
2493 if (*list != bfd_abs_section_ptr)
25f72752 2494 {
b4655ea9 2495 /* Steal the link_sec pointer for our list. */
83c81bfe 2496#define PREV_SEC(sec) (htab->stub_group[(sec)->id].link_sec)
b4655ea9
AM
2497 /* This happens to make the list in reverse order,
2498 which is what we want. */
2499 PREV_SEC (isec) = *list;
2500 *list = isec;
25f72752
AM
2501 }
2502 }
b4655ea9 2503}
25f72752 2504
b4655ea9
AM
2505/* See whether we can group stub sections together. Grouping stub
2506 sections may result in fewer stubs. More importantly, we need to
2507 put all .init* and .fini* stubs at the beginning of the .init or
2508 .fini output sections respectively, because glibc splits the
2509 _init and _fini functions into multiple parts. Putting a stub in
2510 the middle of a function is not a good idea. */
2511
2512static void
c39a58e6
AM
2513group_sections (struct elf32_hppa_link_hash_table *htab,
2514 bfd_size_type stub_group_size,
2515 bfd_boolean stubs_always_before_branch)
b4655ea9
AM
2516{
2517 asection **list = htab->input_list + htab->top_index;
1badb539 2518 do
25f72752
AM
2519 {
2520 asection *tail = *list;
1badb539
AM
2521 if (tail == bfd_abs_section_ptr)
2522 continue;
25f72752
AM
2523 while (tail != NULL)
2524 {
2525 asection *curr;
2526 asection *prev;
2527 bfd_size_type total;
00b28bb0 2528 bfd_boolean big_sec;
25f72752
AM
2529
2530 curr = tail;
eea6121a 2531 total = tail->size;
00b28bb0
AM
2532 big_sec = total >= stub_group_size;
2533
25f72752
AM
2534 while ((prev = PREV_SEC (curr)) != NULL
2535 && ((total += curr->output_offset - prev->output_offset)
47d89dba 2536 < stub_group_size))
25f72752
AM
2537 curr = prev;
2538
2539 /* OK, the size from the start of CURR to the end is less
a248e267 2540 than 240000 bytes and thus can be handled by one stub
25f72752 2541 section. (or the tail section is itself larger than
a248e267 2542 240000 bytes, in which case we may be toast.)
25f72752
AM
2543 We should really be keeping track of the total size of
2544 stubs added here, as stubs contribute to the final output
2545 section size. That's a little tricky, and this way will
a248e267
AM
2546 only break if stubs added total more than 22144 bytes, or
2547 2768 long branch stubs. It seems unlikely for more than
2548 2768 different functions to be called, especially from
2549 code only 240000 bytes long. This limit used to be
2550 250000, but c++ code tends to generate lots of little
2551 functions, and sometimes violated the assumption. */
25f72752
AM
2552 do
2553 {
2554 prev = PREV_SEC (tail);
2555 /* Set up this stub group. */
83c81bfe 2556 htab->stub_group[tail->id].link_sec = curr;
25f72752
AM
2557 }
2558 while (tail != curr && (tail = prev) != NULL);
2559
a248e267 2560 /* But wait, there's more! Input sections up to 240000
00b28bb0
AM
2561 bytes before the stub section can be handled by it too.
2562 Don't do this if we have a really large section after the
2563 stubs, as adding more stubs increases the chance that
2564 branches may not reach into the stub section. */
2565 if (!stubs_always_before_branch && !big_sec)
25f72752 2566 {
47d89dba
AM
2567 total = 0;
2568 while (prev != NULL
2569 && ((total += tail->output_offset - prev->output_offset)
2570 < stub_group_size))
2571 {
2572 tail = prev;
2573 prev = PREV_SEC (tail);
83c81bfe 2574 htab->stub_group[tail->id].link_sec = curr;
47d89dba 2575 }
25f72752
AM
2576 }
2577 tail = prev;
2578 }
2579 }
b4655ea9
AM
2580 while (list-- != htab->input_list);
2581 free (htab->input_list);
1badb539 2582#undef PREV_SEC
b4655ea9
AM
2583}
2584
2585/* Read in all local syms for all input bfds, and create hash entries
2586 for export stubs if we are building a multi-subspace shared lib.
2587 Returns -1 on error, 1 if export stubs created, 0 otherwise. */
2588
2589static int
c39a58e6 2590get_local_syms (bfd *output_bfd, bfd *input_bfd, struct bfd_link_info *info)
b4655ea9
AM
2591{
2592 unsigned int bfd_indx;
2593 Elf_Internal_Sym *local_syms, **all_local_syms;
2594 int stub_changed = 0;
2595 struct elf32_hppa_link_hash_table *htab = hppa_link_hash_table (info);
30667bf3 2596
4dfe6ac6
NC
2597 if (htab == NULL)
2598 return -1;
2599
30667bf3
AM
2600 /* We want to read in symbol extension records only once. To do this
2601 we need to read in the local symbols in parallel and save them for
2602 later use; so hold pointers to the local symbols in an array. */
b4655ea9 2603 bfd_size_type amt = sizeof (Elf_Internal_Sym *) * htab->bfd_count;
c39a58e6 2604 all_local_syms = bfd_zmalloc (amt);
b4655ea9 2605 htab->all_local_syms = all_local_syms;
30667bf3 2606 if (all_local_syms == NULL)
b4655ea9 2607 return -1;
30667bf3
AM
2608
2609 /* Walk over all the input BFDs, swapping in local symbols.
2610 If we are creating a shared library, create hash entries for the
2611 export stubs. */
b4655ea9 2612 for (bfd_indx = 0;
30667bf3 2613 input_bfd != NULL;
c72f2fb2 2614 input_bfd = input_bfd->link.next, bfd_indx++)
30667bf3
AM
2615 {
2616 Elf_Internal_Shdr *symtab_hdr;
edd21aca 2617
252b5132
RH
2618 /* We'll need the symbol table in a second. */
2619 symtab_hdr = &elf_tdata (input_bfd)->symtab_hdr;
2620 if (symtab_hdr->sh_info == 0)
2621 continue;
2622
6cdc0ccc
AM
2623 /* We need an array of the local symbols attached to the input bfd. */
2624 local_syms = (Elf_Internal_Sym *) symtab_hdr->contents;
edd21aca 2625 if (local_syms == NULL)
edd21aca 2626 {
6cdc0ccc
AM
2627 local_syms = bfd_elf_get_elf_syms (input_bfd, symtab_hdr,
2628 symtab_hdr->sh_info, 0,
2629 NULL, NULL, NULL);
2630 /* Cache them for elf_link_input_bfd. */
2631 symtab_hdr->contents = (unsigned char *) local_syms;
edd21aca 2632 }
6cdc0ccc
AM
2633 if (local_syms == NULL)
2634 return -1;
edd21aca 2635
6cdc0ccc 2636 all_local_syms[bfd_indx] = local_syms;
edd21aca 2637
0e1862bb 2638 if (bfd_link_pic (info) && htab->multi_subspace)
30667bf3 2639 {
875c0872
DA
2640 struct elf_link_hash_entry **eh_syms;
2641 struct elf_link_hash_entry **eh_symend;
30667bf3
AM
2642 unsigned int symcount;
2643
2644 symcount = (symtab_hdr->sh_size / sizeof (Elf32_External_Sym)
2645 - symtab_hdr->sh_info);
875c0872
DA
2646 eh_syms = (struct elf_link_hash_entry **) elf_sym_hashes (input_bfd);
2647 eh_symend = (struct elf_link_hash_entry **) (eh_syms + symcount);
30667bf3
AM
2648
2649 /* Look through the global syms for functions; We need to
2650 build export stubs for all globally visible functions. */
875c0872 2651 for (; eh_syms < eh_symend; eh_syms++)
30667bf3 2652 {
875c0872 2653 struct elf32_hppa_link_hash_entry *hh;
30667bf3 2654
875c0872 2655 hh = hppa_elf_hash_entry (*eh_syms);
30667bf3 2656
a63e02c7
DA
2657 while (hh->eh.root.type == bfd_link_hash_indirect
2658 || hh->eh.root.type == bfd_link_hash_warning)
2659 hh = hppa_elf_hash_entry (hh->eh.root.u.i.link);
30667bf3
AM
2660
2661 /* At this point in the link, undefined syms have been
2662 resolved, so we need to check that the symbol was
2663 defined in this BFD. */
a63e02c7
DA
2664 if ((hh->eh.root.type == bfd_link_hash_defined
2665 || hh->eh.root.type == bfd_link_hash_defweak)
2666 && hh->eh.type == STT_FUNC
2667 && hh->eh.root.u.def.section->output_section != NULL
2668 && (hh->eh.root.u.def.section->output_section->owner
25f72752 2669 == output_bfd)
a63e02c7
DA
2670 && hh->eh.root.u.def.section->owner == input_bfd
2671 && hh->eh.def_regular
2672 && !hh->eh.forced_local
2673 && ELF_ST_VISIBILITY (hh->eh.other) == STV_DEFAULT)
30667bf3
AM
2674 {
2675 asection *sec;
2676 const char *stub_name;
875c0872 2677 struct elf32_hppa_stub_hash_entry *hsh;
30667bf3 2678
a63e02c7 2679 sec = hh->eh.root.u.def.section;
9b52905e 2680 stub_name = hh_name (hh);
a63e02c7 2681 hsh = hppa_stub_hash_lookup (&htab->bstab,
30667bf3 2682 stub_name,
b34976b6 2683 FALSE, FALSE);
875c0872 2684 if (hsh == NULL)
30667bf3 2685 {
875c0872
DA
2686 hsh = hppa_add_stub (stub_name, sec, htab);
2687 if (!hsh)
b4655ea9 2688 return -1;
30667bf3 2689
a63e02c7
DA
2690 hsh->target_value = hh->eh.root.u.def.value;
2691 hsh->target_section = hh->eh.root.u.def.section;
875c0872 2692 hsh->stub_type = hppa_stub_export;
a63e02c7 2693 hsh->hh = hh;
30667bf3
AM
2694 stub_changed = 1;
2695 }
2696 else
2697 {
695344c0 2698 /* xgettext:c-format */
4eca0228
AM
2699 _bfd_error_handler (_("%B: duplicate export stub %s"),
2700 input_bfd, stub_name);
30667bf3
AM
2701 }
2702 }
2703 }
30667bf3
AM
2704 }
2705 }
edd21aca 2706
b4655ea9
AM
2707 return stub_changed;
2708}
2709
2710/* Determine and set the size of the stub section for a final link.
2711
2712 The basic idea here is to examine all the relocations looking for
2713 PC-relative calls to a target that is unreachable with a "bl"
2714 instruction. */
2715
b34976b6 2716bfd_boolean
c39a58e6
AM
2717elf32_hppa_size_stubs
2718 (bfd *output_bfd, bfd *stub_bfd, struct bfd_link_info *info,
2719 bfd_boolean multi_subspace, bfd_signed_vma group_size,
2720 asection * (*add_stub_section) (const char *, asection *),
2721 void (*layout_sections_again) (void))
b4655ea9
AM
2722{
2723 bfd_size_type stub_group_size;
b34976b6
AM
2724 bfd_boolean stubs_always_before_branch;
2725 bfd_boolean stub_changed;
b4655ea9
AM
2726 struct elf32_hppa_link_hash_table *htab = hppa_link_hash_table (info);
2727
4dfe6ac6
NC
2728 if (htab == NULL)
2729 return FALSE;
2730
b4655ea9
AM
2731 /* Stash our params away. */
2732 htab->stub_bfd = stub_bfd;
2733 htab->multi_subspace = multi_subspace;
2734 htab->add_stub_section = add_stub_section;
2735 htab->layout_sections_again = layout_sections_again;
2736 stubs_always_before_branch = group_size < 0;
2737 if (group_size < 0)
2738 stub_group_size = -group_size;
2739 else
2740 stub_group_size = group_size;
2741 if (stub_group_size == 1)
2742 {
2743 /* Default values. */
acc990f2
AM
2744 if (stubs_always_before_branch)
2745 {
2746 stub_group_size = 7680000;
2747 if (htab->has_17bit_branch || htab->multi_subspace)
2748 stub_group_size = 240000;
2749 if (htab->has_12bit_branch)
2750 stub_group_size = 7500;
2751 }
2752 else
2753 {
2754 stub_group_size = 6971392;
2755 if (htab->has_17bit_branch || htab->multi_subspace)
2756 stub_group_size = 217856;
2757 if (htab->has_12bit_branch)
2758 stub_group_size = 6808;
2759 }
b4655ea9
AM
2760 }
2761
2762 group_sections (htab, stub_group_size, stubs_always_before_branch);
2763
2764 switch (get_local_syms (output_bfd, info->input_bfds, info))
2765 {
2766 default:
2767 if (htab->all_local_syms)
2768 goto error_ret_free_local;
b34976b6 2769 return FALSE;
b4655ea9
AM
2770
2771 case 0:
b34976b6 2772 stub_changed = FALSE;
b4655ea9
AM
2773 break;
2774
2775 case 1:
b34976b6 2776 stub_changed = TRUE;
b4655ea9
AM
2777 break;
2778 }
2779
edd21aca
AM
2780 while (1)
2781 {
b4655ea9
AM
2782 bfd *input_bfd;
2783 unsigned int bfd_indx;
30667bf3
AM
2784 asection *stub_sec;
2785
25f72752 2786 for (input_bfd = info->input_bfds, bfd_indx = 0;
30667bf3 2787 input_bfd != NULL;
c72f2fb2 2788 input_bfd = input_bfd->link.next, bfd_indx++)
30667bf3
AM
2789 {
2790 Elf_Internal_Shdr *symtab_hdr;
b4655ea9
AM
2791 asection *section;
2792 Elf_Internal_Sym *local_syms;
30667bf3
AM
2793
2794 /* We'll need the symbol table in a second. */
2795 symtab_hdr = &elf_tdata (input_bfd)->symtab_hdr;
2796 if (symtab_hdr->sh_info == 0)
2797 continue;
2798
b4655ea9 2799 local_syms = htab->all_local_syms[bfd_indx];
30667bf3
AM
2800
2801 /* Walk over each section attached to the input bfd. */
2802 for (section = input_bfd->sections;
2803 section != NULL;
25f72752 2804 section = section->next)
30667bf3 2805 {
30667bf3
AM
2806 Elf_Internal_Rela *internal_relocs, *irelaend, *irela;
2807
2808 /* If there aren't any relocs, then there's nothing more
2809 to do. */
2810 if ((section->flags & SEC_RELOC) == 0
2811 || section->reloc_count == 0)
2812 continue;
2813
25f72752
AM
2814 /* If this section is a link-once section that will be
2815 discarded, then don't create any stubs. */
2816 if (section->output_section == NULL
2817 || section->output_section->owner != output_bfd)
2818 continue;
2819
1e2f5b6e
AM
2820 /* Get the relocs. */
2821 internal_relocs
c39a58e6 2822 = _bfd_elf_link_read_relocs (input_bfd, section, NULL, NULL,
45d6a902 2823 info->keep_memory);
30667bf3 2824 if (internal_relocs == NULL)
1e2f5b6e 2825 goto error_ret_free_local;
30667bf3
AM
2826
2827 /* Now examine each relocation. */
2828 irela = internal_relocs;
2829 irelaend = irela + section->reloc_count;
2830 for (; irela < irelaend; irela++)
2831 {
2832 unsigned int r_type, r_indx;
2833 enum elf32_hppa_stub_type stub_type;
875c0872 2834 struct elf32_hppa_stub_hash_entry *hsh;
30667bf3
AM
2835 asection *sym_sec;
2836 bfd_vma sym_value;
2837 bfd_vma destination;
875c0872 2838 struct elf32_hppa_link_hash_entry *hh;
30667bf3 2839 char *stub_name;
25f72752 2840 const asection *id_sec;
30667bf3
AM
2841
2842 r_type = ELF32_R_TYPE (irela->r_info);
2843 r_indx = ELF32_R_SYM (irela->r_info);
2844
2845 if (r_type >= (unsigned int) R_PARISC_UNIMPLEMENTED)
2846 {
2847 bfd_set_error (bfd_error_bad_value);
1e2f5b6e
AM
2848 error_ret_free_internal:
2849 if (elf_section_data (section)->relocs == NULL)
2850 free (internal_relocs);
2851 goto error_ret_free_local;
30667bf3
AM
2852 }
2853
2854 /* Only look for stubs on call instructions. */
2855 if (r_type != (unsigned int) R_PARISC_PCREL12F
2856 && r_type != (unsigned int) R_PARISC_PCREL17F
2857 && r_type != (unsigned int) R_PARISC_PCREL22F)
2858 continue;
2859
2860 /* Now determine the call target, its name, value,
2861 section. */
2862 sym_sec = NULL;
2863 sym_value = 0;
2864 destination = 0;
875c0872 2865 hh = NULL;
30667bf3
AM
2866 if (r_indx < symtab_hdr->sh_info)
2867 {
2868 /* It's a local symbol. */
2869 Elf_Internal_Sym *sym;
2870 Elf_Internal_Shdr *hdr;
4fbb74a6 2871 unsigned int shndx;
30667bf3
AM
2872
2873 sym = local_syms + r_indx;
30667bf3
AM
2874 if (ELF_ST_TYPE (sym->st_info) != STT_SECTION)
2875 sym_value = sym->st_value;
4fbb74a6
AM
2876 shndx = sym->st_shndx;
2877 if (shndx < elf_numsections (input_bfd))
2878 {
2879 hdr = elf_elfsections (input_bfd)[shndx];
2880 sym_sec = hdr->bfd_section;
2881 destination = (sym_value + irela->r_addend
2882 + sym_sec->output_offset
2883 + sym_sec->output_section->vma);
2884 }
30667bf3
AM
2885 }
2886 else
2887 {
2888 /* It's an external symbol. */
2889 int e_indx;
2890
2891 e_indx = r_indx - symtab_hdr->sh_info;
875c0872 2892 hh = hppa_elf_hash_entry (elf_sym_hashes (input_bfd)[e_indx]);
30667bf3 2893
a63e02c7
DA
2894 while (hh->eh.root.type == bfd_link_hash_indirect
2895 || hh->eh.root.type == bfd_link_hash_warning)
2896 hh = hppa_elf_hash_entry (hh->eh.root.u.i.link);
30667bf3 2897
a63e02c7
DA
2898 if (hh->eh.root.type == bfd_link_hash_defined
2899 || hh->eh.root.type == bfd_link_hash_defweak)
30667bf3 2900 {
a63e02c7
DA
2901 sym_sec = hh->eh.root.u.def.section;
2902 sym_value = hh->eh.root.u.def.value;
30667bf3
AM
2903 if (sym_sec->output_section != NULL)
2904 destination = (sym_value + irela->r_addend
2905 + sym_sec->output_offset
2906 + sym_sec->output_section->vma);
2907 }
a63e02c7 2908 else if (hh->eh.root.type == bfd_link_hash_undefweak)
c432ba1a 2909 {
0e1862bb 2910 if (! bfd_link_pic (info))
c432ba1a
AM
2911 continue;
2912 }
a63e02c7 2913 else if (hh->eh.root.type == bfd_link_hash_undefined)
c432ba1a 2914 {
59c2e50f 2915 if (! (info->unresolved_syms_in_objects == RM_IGNORE
a63e02c7 2916 && (ELF_ST_VISIBILITY (hh->eh.other)
c432ba1a 2917 == STV_DEFAULT)
a63e02c7 2918 && hh->eh.type != STT_PARISC_MILLI))
c432ba1a
AM
2919 continue;
2920 }
30667bf3
AM
2921 else
2922 {
2923 bfd_set_error (bfd_error_bad_value);
2924 goto error_ret_free_internal;
2925 }
2926 }
2927
2928 /* Determine what (if any) linker stub is needed. */
875c0872 2929 stub_type = hppa_type_of_stub (section, irela, hh,
a252afa4 2930 destination, info);
30667bf3
AM
2931 if (stub_type == hppa_stub_none)
2932 continue;
2933
25f72752 2934 /* Support for grouping stub sections. */
83c81bfe 2935 id_sec = htab->stub_group[section->id].link_sec;
25f72752 2936
30667bf3 2937 /* Get the name of this stub. */
875c0872 2938 stub_name = hppa_stub_name (id_sec, sym_sec, hh, irela);
30667bf3
AM
2939 if (!stub_name)
2940 goto error_ret_free_internal;
2941
a63e02c7 2942 hsh = hppa_stub_hash_lookup (&htab->bstab,
30667bf3 2943 stub_name,
b34976b6 2944 FALSE, FALSE);
875c0872 2945 if (hsh != NULL)
30667bf3
AM
2946 {
2947 /* The proper stub has already been created. */
2948 free (stub_name);
2949 continue;
2950 }
2951
875c0872
DA
2952 hsh = hppa_add_stub (stub_name, section, htab);
2953 if (hsh == NULL)
30667bf3
AM
2954 {
2955 free (stub_name);
1e2f5b6e 2956 goto error_ret_free_internal;
30667bf3
AM
2957 }
2958
875c0872
DA
2959 hsh->target_value = sym_value;
2960 hsh->target_section = sym_sec;
2961 hsh->stub_type = stub_type;
0e1862bb 2962 if (bfd_link_pic (info))
30667bf3
AM
2963 {
2964 if (stub_type == hppa_stub_import)
875c0872 2965 hsh->stub_type = hppa_stub_import_shared;
98ceb8ce 2966 else if (stub_type == hppa_stub_long_branch)
875c0872 2967 hsh->stub_type = hppa_stub_long_branch_shared;
30667bf3 2968 }
a63e02c7 2969 hsh->hh = hh;
b34976b6 2970 stub_changed = TRUE;
30667bf3
AM
2971 }
2972
2973 /* We're done with the internal relocs, free them. */
1e2f5b6e
AM
2974 if (elf_section_data (section)->relocs == NULL)
2975 free (internal_relocs);
30667bf3
AM
2976 }
2977 }
2978
2979 if (!stub_changed)
2980 break;
2981
2982 /* OK, we've added some stubs. Find out the new size of the
2983 stub sections. */
83c81bfe 2984 for (stub_sec = htab->stub_bfd->sections;
30667bf3
AM
2985 stub_sec != NULL;
2986 stub_sec = stub_sec->next)
a464198b
AM
2987 if ((stub_sec->flags & SEC_LINKER_CREATED) == 0)
2988 stub_sec->size = 0;
74d1c347 2989
a63e02c7 2990 bfd_hash_traverse (&htab->bstab, hppa_size_one_stub, htab);
74d1c347 2991
30667bf3 2992 /* Ask the linker to do its stuff. */
83c81bfe 2993 (*htab->layout_sections_again) ();
b34976b6 2994 stub_changed = FALSE;
30667bf3
AM
2995 }
2996
6cdc0ccc 2997 free (htab->all_local_syms);
b34976b6 2998 return TRUE;
30667bf3
AM
2999
3000 error_ret_free_local:
b4655ea9 3001 free (htab->all_local_syms);
b34976b6 3002 return FALSE;
30667bf3
AM
3003}
3004
30667bf3
AM
3005/* For a final link, this function is called after we have sized the
3006 stubs to provide a value for __gp. */
3007
b34976b6 3008bfd_boolean
c39a58e6 3009elf32_hppa_set_gp (bfd *abfd, struct bfd_link_info *info)
30667bf3 3010{
b4655ea9
AM
3011 struct bfd_link_hash_entry *h;
3012 asection *sec = NULL;
3013 bfd_vma gp_val = 0;
30667bf3 3014
55ef6584 3015 h = bfd_link_hash_lookup (info->hash, "$global$", FALSE, FALSE, FALSE);
30667bf3 3016
df8634e3 3017 if (h != NULL
b4655ea9
AM
3018 && (h->type == bfd_link_hash_defined
3019 || h->type == bfd_link_hash_defweak))
30667bf3 3020 {
b4655ea9
AM
3021 gp_val = h->u.def.value;
3022 sec = h->u.def.section;
30667bf3
AM
3023 }
3024 else
3025 {
0eddce27
AM
3026 asection *splt = bfd_get_section_by_name (abfd, ".plt");
3027 asection *sgot = bfd_get_section_by_name (abfd, ".got");
b4655ea9 3028
74d1c347
AM
3029 /* Choose to point our LTP at, in this order, one of .plt, .got,
3030 or .data, if these sections exist. In the case of choosing
3031 .plt try to make the LTP ideal for addressing anywhere in the
3032 .plt or .got with a 14 bit signed offset. Typically, the end
3033 of the .plt is the start of the .got, so choose .plt + 0x2000
3034 if either the .plt or .got is larger than 0x2000. If both
3035 the .plt and .got are smaller than 0x2000, choose the end of
3036 the .plt section. */
225247f0
JT
3037 sec = strcmp (bfd_get_target (abfd), "elf32-hppa-netbsd") == 0
3038 ? NULL : splt;
74d1c347 3039 if (sec != NULL)
30667bf3 3040 {
eea6121a
AM
3041 gp_val = sec->size;
3042 if (gp_val > 0x2000 || (sgot && sgot->size > 0x2000))
74d1c347
AM
3043 {
3044 gp_val = 0x2000;
3045 }
3046 }
3047 else
3048 {
b4655ea9 3049 sec = sgot;
74d1c347
AM
3050 if (sec != NULL)
3051 {
225247f0
JT
3052 if (strcmp (bfd_get_target (abfd), "elf32-hppa-netbsd") != 0)
3053 {
3054 /* We know we don't have a .plt. If .got is large,
3055 offset our LTP. */
3056 if (sec->size > 0x2000)
3057 gp_val = 0x2000;
3058 }
74d1c347
AM
3059 }
3060 else
3061 {
3062 /* No .plt or .got. Who cares what the LTP is? */
3063 sec = bfd_get_section_by_name (abfd, ".data");
3064 }
30667bf3 3065 }
df8634e3
AM
3066
3067 if (h != NULL)
3068 {
b4655ea9
AM
3069 h->type = bfd_link_hash_defined;
3070 h->u.def.value = gp_val;
df8634e3 3071 if (sec != NULL)
b4655ea9 3072 h->u.def.section = sec;
df8634e3 3073 else
b4655ea9 3074 h->u.def.section = bfd_abs_section_ptr;
df8634e3 3075 }
30667bf3
AM
3076 }
3077
55ef6584
AM
3078 if (bfd_get_flavour (abfd) == bfd_target_elf_flavour)
3079 {
3080 if (sec != NULL && sec->output_section != NULL)
3081 gp_val += sec->output_section->vma + sec->output_offset;
74d1c347 3082
55ef6584
AM
3083 elf_gp (abfd) = gp_val;
3084 }
b34976b6 3085 return TRUE;
30667bf3
AM
3086}
3087
30667bf3
AM
3088/* Build all the stubs associated with the current output file. The
3089 stubs are kept in a hash table attached to the main linker hash
3090 table. We also set up the .plt entries for statically linked PIC
3091 functions here. This function is called via hppaelf_finish in the
3092 linker. */
3093
b34976b6 3094bfd_boolean
c39a58e6 3095elf32_hppa_build_stubs (struct bfd_link_info *info)
30667bf3
AM
3096{
3097 asection *stub_sec;
3098 struct bfd_hash_table *table;
83c81bfe 3099 struct elf32_hppa_link_hash_table *htab;
30667bf3 3100
83c81bfe 3101 htab = hppa_link_hash_table (info);
4dfe6ac6
NC
3102 if (htab == NULL)
3103 return FALSE;
30667bf3 3104
83c81bfe 3105 for (stub_sec = htab->stub_bfd->sections;
30667bf3
AM
3106 stub_sec != NULL;
3107 stub_sec = stub_sec->next)
a464198b
AM
3108 if ((stub_sec->flags & SEC_LINKER_CREATED) == 0
3109 && stub_sec->size != 0)
3110 {
3111 /* Allocate memory to hold the linker stubs. */
3112 stub_sec->contents = bfd_zalloc (htab->stub_bfd, stub_sec->size);
3113 if (stub_sec->contents == NULL)
3114 return FALSE;
3115 stub_sec->size = 0;
3116 }
30667bf3
AM
3117
3118 /* Build the stubs as directed by the stub hash table. */
a63e02c7 3119 table = &htab->bstab;
30667bf3
AM
3120 bfd_hash_traverse (table, hppa_build_one_stub, info);
3121
b34976b6 3122 return TRUE;
30667bf3
AM
3123}
3124
9b52905e 3125/* Return the base vma address which should be subtracted from the real
68ffbac6 3126 address when resolving a dtpoff relocation.
9b52905e
NC
3127 This is PT_TLS segment p_vaddr. */
3128
3129static bfd_vma
3130dtpoff_base (struct bfd_link_info *info)
3131{
3132 /* If tls_sec is NULL, we should have signalled an error already. */
3133 if (elf_hash_table (info)->tls_sec == NULL)
3134 return 0;
3135 return elf_hash_table (info)->tls_sec->vma;
3136}
3137
3138/* Return the relocation value for R_PARISC_TLS_TPOFF*.. */
3139
3140static bfd_vma
3141tpoff (struct bfd_link_info *info, bfd_vma address)
3142{
3143 struct elf_link_hash_table *htab = elf_hash_table (info);
3144
3145 /* If tls_sec is NULL, we should have signalled an error already. */
3146 if (htab->tls_sec == NULL)
3147 return 0;
68ffbac6 3148 /* hppa TLS ABI is variant I and static TLS block start just after
9b52905e 3149 tcbhead structure which has 2 pointer fields. */
68ffbac6 3150 return (address - htab->tls_sec->vma
9b52905e
NC
3151 + align_power ((bfd_vma) 8, htab->tls_sec->alignment_power));
3152}
3153
c46b7515
AM
3154/* Perform a final link. */
3155
b34976b6 3156static bfd_boolean
c39a58e6 3157elf32_hppa_final_link (bfd *abfd, struct bfd_link_info *info)
c46b7515 3158{
6d4b2867
JDA
3159 struct stat buf;
3160
4dc86686 3161 /* Invoke the regular ELF linker to do all the work. */
c152c796 3162 if (!bfd_elf_final_link (abfd, info))
b34976b6 3163 return FALSE;
c46b7515
AM
3164
3165 /* If we're producing a final executable, sort the contents of the
985142a4 3166 unwind section. */
0e1862bb 3167 if (bfd_link_relocatable (info))
d9f40817
DA
3168 return TRUE;
3169
6d4b2867
JDA
3170 /* Do not attempt to sort non-regular files. This is here
3171 especially for configure scripts and kernel builds which run
3172 tests with "ld [...] -o /dev/null". */
3173 if (stat (abfd->filename, &buf) != 0
3174 || !S_ISREG(buf.st_mode))
3175 return TRUE;
3176
46fe4e66 3177 return elf_hppa_sort_unwind (abfd);
c46b7515
AM
3178}
3179
3180/* Record the lowest address for the data and text segments. */
3181
3182static void
2ea37f1c 3183hppa_record_segment_addr (bfd *abfd, asection *section, void *data)
c46b7515 3184{
83c81bfe 3185 struct elf32_hppa_link_hash_table *htab;
c46b7515 3186
875c0872 3187 htab = (struct elf32_hppa_link_hash_table*) data;
4dfe6ac6
NC
3188 if (htab == NULL)
3189 return;
c46b7515
AM
3190
3191 if ((section->flags & (SEC_ALLOC | SEC_LOAD)) == (SEC_ALLOC | SEC_LOAD))
3192 {
2ea37f1c
NC
3193 bfd_vma value;
3194 Elf_Internal_Phdr *p;
3195
3196 p = _bfd_elf_find_segment_containing_section (abfd, section->output_section);
3197 BFD_ASSERT (p != NULL);
3198 value = p->p_vaddr;
c46b7515
AM
3199
3200 if ((section->flags & SEC_READONLY) != 0)
3201 {
83c81bfe
AM
3202 if (value < htab->text_segment_base)
3203 htab->text_segment_base = value;
c46b7515
AM
3204 }
3205 else
3206 {
83c81bfe
AM
3207 if (value < htab->data_segment_base)
3208 htab->data_segment_base = value;
c46b7515
AM
3209 }
3210 }
3211}
3212
30667bf3
AM
3213/* Perform a relocation as part of a final link. */
3214
3215static bfd_reloc_status_type
c39a58e6
AM
3216final_link_relocate (asection *input_section,
3217 bfd_byte *contents,
875c0872 3218 const Elf_Internal_Rela *rela,
c39a58e6
AM
3219 bfd_vma value,
3220 struct elf32_hppa_link_hash_table *htab,
3221 asection *sym_sec,
875c0872 3222 struct elf32_hppa_link_hash_entry *hh,
a252afa4 3223 struct bfd_link_info *info)
30667bf3
AM
3224{
3225 int insn;
875c0872 3226 unsigned int r_type = ELF32_R_TYPE (rela->r_info);
a252afa4 3227 unsigned int orig_r_type = r_type;
30667bf3
AM
3228 reloc_howto_type *howto = elf_hppa_howto_table + r_type;
3229 int r_format = howto->bitsize;
3230 enum hppa_reloc_field_selector_type_alt r_field;
3231 bfd *input_bfd = input_section->owner;
875c0872 3232 bfd_vma offset = rela->r_offset;
30667bf3
AM
3233 bfd_vma max_branch_offset = 0;
3234 bfd_byte *hit_data = contents + offset;
875c0872 3235 bfd_signed_vma addend = rela->r_addend;
30667bf3 3236 bfd_vma location;
875c0872 3237 struct elf32_hppa_stub_hash_entry *hsh = NULL;
68ffbac6 3238 int val;
30667bf3
AM
3239
3240 if (r_type == R_PARISC_NONE)
3241 return bfd_reloc_ok;
3242
3243 insn = bfd_get_32 (input_bfd, hit_data);
3244
3245 /* Find out where we are and where we're going. */
3246 location = (offset +
3247 input_section->output_offset +
3248 input_section->output_section->vma);
3249
a252afa4
DA
3250 /* If we are not building a shared library, convert DLTIND relocs to
3251 DPREL relocs. */
0e1862bb 3252 if (!bfd_link_pic (info))
a252afa4
DA
3253 {
3254 switch (r_type)
4fc8051d
AM
3255 {
3256 case R_PARISC_DLTIND21L:
143bb599
DA
3257 case R_PARISC_TLS_GD21L:
3258 case R_PARISC_TLS_LDM21L:
3259 case R_PARISC_TLS_IE21L:
4fc8051d 3260 r_type = R_PARISC_DPREL21L;
a252afa4
DA
3261 break;
3262
4fc8051d 3263 case R_PARISC_DLTIND14R:
143bb599
DA
3264 case R_PARISC_TLS_GD14R:
3265 case R_PARISC_TLS_LDM14R:
3266 case R_PARISC_TLS_IE14R:
4fc8051d 3267 r_type = R_PARISC_DPREL14R;
a252afa4
DA
3268 break;
3269
4fc8051d
AM
3270 case R_PARISC_DLTIND14F:
3271 r_type = R_PARISC_DPREL14F;
a252afa4
DA
3272 break;
3273 }
3274 }
3275
30667bf3
AM
3276 switch (r_type)
3277 {
3278 case R_PARISC_PCREL12F:
3279 case R_PARISC_PCREL17F:
3280 case R_PARISC_PCREL22F:
067fa4a6
AM
3281 /* If this call should go via the plt, find the import stub in
3282 the stub hash. */
30667bf3
AM
3283 if (sym_sec == NULL
3284 || sym_sec->output_section == NULL
875c0872 3285 || (hh != NULL
a63e02c7
DA
3286 && hh->eh.plt.offset != (bfd_vma) -1
3287 && hh->eh.dynindx != -1
875c0872 3288 && !hh->plabel
0e1862bb 3289 && (bfd_link_pic (info)
a63e02c7
DA
3290 || !hh->eh.def_regular
3291 || hh->eh.root.type == bfd_link_hash_defweak)))
30667bf3 3292 {
875c0872
DA
3293 hsh = hppa_get_stub_entry (input_section, sym_sec,
3294 hh, rela, htab);
3295 if (hsh != NULL)
30667bf3 3296 {
875c0872
DA
3297 value = (hsh->stub_offset
3298 + hsh->stub_sec->output_offset
3299 + hsh->stub_sec->output_section->vma);
30667bf3
AM
3300 addend = 0;
3301 }
875c0872 3302 else if (sym_sec == NULL && hh != NULL
a63e02c7 3303 && hh->eh.root.type == bfd_link_hash_undefweak)
30667bf3 3304 {
db20fd76
AM
3305 /* It's OK if undefined weak. Calls to undefined weak
3306 symbols behave as if the "called" function
3307 immediately returns. We can thus call to a weak
3308 function without first checking whether the function
3309 is defined. */
30667bf3 3310 value = location;
db20fd76 3311 addend = 8;
30667bf3
AM
3312 }
3313 else
f09ebc7d 3314 return bfd_reloc_undefined;
30667bf3
AM
3315 }
3316 /* Fall thru. */
3317
3318 case R_PARISC_PCREL21L:
3319 case R_PARISC_PCREL17C:
3320 case R_PARISC_PCREL17R:
3321 case R_PARISC_PCREL14R:
3322 case R_PARISC_PCREL14F:
36751eee 3323 case R_PARISC_PCREL32:
30667bf3
AM
3324 /* Make it a pc relative offset. */
3325 value -= location;
3326 addend -= 8;
3327 break;
3328
3329 case R_PARISC_DPREL21L:
3330 case R_PARISC_DPREL14R:
3331 case R_PARISC_DPREL14F:
a252afa4
DA
3332 /* Convert instructions that use the linkage table pointer (r19) to
3333 instructions that use the global data pointer (dp). This is the
3334 most efficient way of using PIC code in an incomplete executable,
3335 but the user must follow the standard runtime conventions for
3336 accessing data for this to work. */
143bb599 3337 if (orig_r_type != r_type)
a252afa4 3338 {
143bb599
DA
3339 if (r_type == R_PARISC_DPREL21L)
3340 {
3341 /* GCC sometimes uses a register other than r19 for the
3342 operation, so we must convert any addil instruction
3343 that uses this relocation. */
3344 if ((insn & 0xfc000000) == ((int) OP_ADDIL << 26))
3345 insn = ADDIL_DP;
3346 else
3347 /* We must have a ldil instruction. It's too hard to find
3348 and convert the associated add instruction, so issue an
3349 error. */
4eca0228 3350 _bfd_error_handler
695344c0 3351 /* xgettext:c-format */
d42c267e 3352 (_("%B(%A+%#Lx): %s fixup for insn %#x is not supported in a non-shared link"),
143bb599
DA
3353 input_bfd,
3354 input_section,
d42c267e 3355 offset,
143bb599
DA
3356 howto->name,
3357 insn);
3358 }
3359 else if (r_type == R_PARISC_DPREL14F)
3360 {
3361 /* This must be a format 1 load/store. Change the base
3362 register to dp. */
3363 insn = (insn & 0xfc1ffff) | (27 << 21);
3364 }
a252afa4
DA
3365 }
3366
143bb599
DA
3367 /* For all the DP relative relocations, we need to examine the symbol's
3368 section. If it has no section or if it's a code section, then
3369 "data pointer relative" makes no sense. In that case we don't
3370 adjust the "value", and for 21 bit addil instructions, we change the
3371 source addend register from %dp to %r0. This situation commonly
3372 arises for undefined weak symbols and when a variable's "constness"
3373 is declared differently from the way the variable is defined. For
3374 instance: "extern int foo" with foo defined as "const int foo". */
95d0f04a 3375 if (sym_sec == NULL || (sym_sec->flags & SEC_CODE) != 0)
30667bf3
AM
3376 {
3377 if ((insn & ((0x3f << 26) | (0x1f << 21)))
3378 == (((int) OP_ADDIL << 26) | (27 << 21)))
3379 {
3380 insn &= ~ (0x1f << 21);
30667bf3
AM
3381 }
3382 /* Now try to make things easy for the dynamic linker. */
3383
3384 break;
3385 }
74d1c347 3386 /* Fall thru. */
30667bf3
AM
3387
3388 case R_PARISC_DLTIND21L:
3389 case R_PARISC_DLTIND14R:
3390 case R_PARISC_DLTIND14F:
143bb599
DA
3391 case R_PARISC_TLS_GD21L:
3392 case R_PARISC_TLS_LDM21L:
3393 case R_PARISC_TLS_IE21L:
9b52905e 3394 case R_PARISC_TLS_GD14R:
9b52905e 3395 case R_PARISC_TLS_LDM14R:
9b52905e 3396 case R_PARISC_TLS_IE14R:
30667bf3
AM
3397 value -= elf_gp (input_section->output_section->owner);
3398 break;
3399
c46b7515
AM
3400 case R_PARISC_SEGREL32:
3401 if ((sym_sec->flags & SEC_CODE) != 0)
83c81bfe 3402 value -= htab->text_segment_base;
c46b7515 3403 else
83c81bfe 3404 value -= htab->data_segment_base;
c46b7515
AM
3405 break;
3406
30667bf3
AM
3407 default:
3408 break;
3409 }
3410
3411 switch (r_type)
3412 {
3413 case R_PARISC_DIR32:
47d89dba 3414 case R_PARISC_DIR14F:
30667bf3
AM
3415 case R_PARISC_DIR17F:
3416 case R_PARISC_PCREL17C:
3417 case R_PARISC_PCREL14F:
36751eee 3418 case R_PARISC_PCREL32:
30667bf3
AM
3419 case R_PARISC_DPREL14F:
3420 case R_PARISC_PLABEL32:
3421 case R_PARISC_DLTIND14F:
3422 case R_PARISC_SEGBASE:
3423 case R_PARISC_SEGREL32:
9b52905e
NC
3424 case R_PARISC_TLS_DTPMOD32:
3425 case R_PARISC_TLS_DTPOFF32:
3426 case R_PARISC_TLS_TPREL32:
30667bf3
AM
3427 r_field = e_fsel;
3428 break;
3429
1bf42538 3430 case R_PARISC_DLTIND21L:
30667bf3 3431 case R_PARISC_PCREL21L:
30667bf3 3432 case R_PARISC_PLABEL21L:
1bf42538
JL
3433 r_field = e_lsel;
3434 break;
3435
3436 case R_PARISC_DIR21L:
3437 case R_PARISC_DPREL21L:
9b52905e
NC
3438 case R_PARISC_TLS_GD21L:
3439 case R_PARISC_TLS_LDM21L:
3440 case R_PARISC_TLS_LDO21L:
3441 case R_PARISC_TLS_IE21L:
3442 case R_PARISC_TLS_LE21L:
30667bf3
AM
3443 r_field = e_lrsel;
3444 break;
3445
30667bf3 3446 case R_PARISC_PCREL17R:
30667bf3 3447 case R_PARISC_PCREL14R:
30667bf3
AM
3448 case R_PARISC_PLABEL14R:
3449 case R_PARISC_DLTIND14R:
1bf42538
JL
3450 r_field = e_rsel;
3451 break;
3452
3453 case R_PARISC_DIR17R:
3454 case R_PARISC_DIR14R:
3455 case R_PARISC_DPREL14R:
9b52905e
NC
3456 case R_PARISC_TLS_GD14R:
3457 case R_PARISC_TLS_LDM14R:
3458 case R_PARISC_TLS_LDO14R:
3459 case R_PARISC_TLS_IE14R:
3460 case R_PARISC_TLS_LE14R:
30667bf3
AM
3461 r_field = e_rrsel;
3462 break;
3463
3464 case R_PARISC_PCREL12F:
3465 case R_PARISC_PCREL17F:
3466 case R_PARISC_PCREL22F:
3467 r_field = e_fsel;
3468
3469 if (r_type == (unsigned int) R_PARISC_PCREL17F)
3470 {
3471 max_branch_offset = (1 << (17-1)) << 2;
3472 }
3473 else if (r_type == (unsigned int) R_PARISC_PCREL12F)
3474 {
3475 max_branch_offset = (1 << (12-1)) << 2;
3476 }
3477 else
3478 {
3479 max_branch_offset = (1 << (22-1)) << 2;
3480 }
3481
3482 /* sym_sec is NULL on undefined weak syms or when shared on
3483 undefined syms. We've already checked for a stub for the
3484 shared undefined case. */
3485 if (sym_sec == NULL)
3486 break;
3487
3488 /* If the branch is out of reach, then redirect the
3489 call to the local stub for this function. */
3490 if (value + addend + max_branch_offset >= 2*max_branch_offset)
3491 {
875c0872
DA
3492 hsh = hppa_get_stub_entry (input_section, sym_sec,
3493 hh, rela, htab);
3494 if (hsh == NULL)
f09ebc7d 3495 return bfd_reloc_undefined;
30667bf3
AM
3496
3497 /* Munge up the value and addend so that we call the stub
3498 rather than the procedure directly. */
875c0872
DA
3499 value = (hsh->stub_offset
3500 + hsh->stub_sec->output_offset
3501 + hsh->stub_sec->output_section->vma
30667bf3
AM
3502 - location);
3503 addend = -8;
3504 }
3505 break;
3506
3507 /* Something we don't know how to handle. */
3508 default:
3509 return bfd_reloc_notsupported;
3510 }
3511
3512 /* Make sure we can reach the stub. */
3513 if (max_branch_offset != 0
3514 && value + addend + max_branch_offset >= 2*max_branch_offset)
3515 {
4eca0228 3516 _bfd_error_handler
695344c0 3517 /* xgettext:c-format */
d42c267e 3518 (_("%B(%A+%#Lx): cannot reach %s, recompile with -ffunction-sections"),
d003868e
AM
3519 input_bfd,
3520 input_section,
d42c267e 3521 offset,
a63e02c7 3522 hsh->bh_root.string);
ce757d15 3523 bfd_set_error (bfd_error_bad_value);
30667bf3
AM
3524 return bfd_reloc_notsupported;
3525 }
3526
3527 val = hppa_field_adjust (value, addend, r_field);
3528
3529 switch (r_type)
3530 {
3531 case R_PARISC_PCREL12F:
3532 case R_PARISC_PCREL17C:
3533 case R_PARISC_PCREL17F:
3534 case R_PARISC_PCREL17R:
3535 case R_PARISC_PCREL22F:
3536 case R_PARISC_DIR17F:
3537 case R_PARISC_DIR17R:
3538 /* This is a branch. Divide the offset by four.
3539 Note that we need to decide whether it's a branch or
3540 otherwise by inspecting the reloc. Inspecting insn won't
3541 work as insn might be from a .word directive. */
3542 val >>= 2;
3543 break;
3544
3545 default:
3546 break;
3547 }
3548
3549 insn = hppa_rebuild_insn (insn, val, r_format);
3550
3551 /* Update the instruction word. */
74d1c347 3552 bfd_put_32 (input_bfd, (bfd_vma) insn, hit_data);
30667bf3
AM
3553 return bfd_reloc_ok;
3554}
3555
30667bf3
AM
3556/* Relocate an HPPA ELF section. */
3557
b34976b6 3558static bfd_boolean
c39a58e6
AM
3559elf32_hppa_relocate_section (bfd *output_bfd,
3560 struct bfd_link_info *info,
3561 bfd *input_bfd,
3562 asection *input_section,
3563 bfd_byte *contents,
3564 Elf_Internal_Rela *relocs,
3565 Elf_Internal_Sym *local_syms,
3566 asection **local_sections)
30667bf3 3567{
30667bf3 3568 bfd_vma *local_got_offsets;
83c81bfe 3569 struct elf32_hppa_link_hash_table *htab;
30667bf3 3570 Elf_Internal_Shdr *symtab_hdr;
875c0872 3571 Elf_Internal_Rela *rela;
30667bf3 3572 Elf_Internal_Rela *relend;
30667bf3
AM
3573
3574 symtab_hdr = &elf_tdata (input_bfd)->symtab_hdr;
3575
83c81bfe 3576 htab = hppa_link_hash_table (info);
4dfe6ac6
NC
3577 if (htab == NULL)
3578 return FALSE;
3579
74d1c347 3580 local_got_offsets = elf_local_got_offsets (input_bfd);
30667bf3 3581
875c0872 3582 rela = relocs;
30667bf3 3583 relend = relocs + input_section->reloc_count;
875c0872 3584 for (; rela < relend; rela++)
30667bf3
AM
3585 {
3586 unsigned int r_type;
3587 reloc_howto_type *howto;
3588 unsigned int r_symndx;
875c0872 3589 struct elf32_hppa_link_hash_entry *hh;
30667bf3
AM
3590 Elf_Internal_Sym *sym;
3591 asection *sym_sec;
3592 bfd_vma relocation;
875c0872 3593 bfd_reloc_status_type rstatus;
30667bf3 3594 const char *sym_name;
b34976b6
AM
3595 bfd_boolean plabel;
3596 bfd_boolean warned_undef;
30667bf3 3597
875c0872 3598 r_type = ELF32_R_TYPE (rela->r_info);
30667bf3
AM
3599 if (r_type >= (unsigned int) R_PARISC_UNIMPLEMENTED)
3600 {
3601 bfd_set_error (bfd_error_bad_value);
b34976b6 3602 return FALSE;
30667bf3
AM
3603 }
3604 if (r_type == (unsigned int) R_PARISC_GNU_VTENTRY
3605 || r_type == (unsigned int) R_PARISC_GNU_VTINHERIT)
3606 continue;
3607
875c0872
DA
3608 r_symndx = ELF32_R_SYM (rela->r_info);
3609 hh = NULL;
30667bf3
AM
3610 sym = NULL;
3611 sym_sec = NULL;
b34976b6 3612 warned_undef = FALSE;
30667bf3
AM
3613 if (r_symndx < symtab_hdr->sh_info)
3614 {
3615 /* This is a local symbol, h defaults to NULL. */
3616 sym = local_syms + r_symndx;
3617 sym_sec = local_sections[r_symndx];
875c0872 3618 relocation = _bfd_elf_rela_local_sym (output_bfd, sym, &sym_sec, rela);
30667bf3
AM
3619 }
3620 else
3621 {
875c0872 3622 struct elf_link_hash_entry *eh;
62d887d4 3623 bfd_boolean unresolved_reloc, ignored;
b2a8e766 3624 struct elf_link_hash_entry **sym_hashes = elf_sym_hashes (input_bfd);
560e09e9 3625
875c0872 3626 RELOC_FOR_GLOBAL_SYMBOL (info, input_bfd, input_section, rela,
b2a8e766 3627 r_symndx, symtab_hdr, sym_hashes,
875c0872 3628 eh, sym_sec, relocation,
62d887d4
L
3629 unresolved_reloc, warned_undef,
3630 ignored);
560e09e9 3631
0e1862bb 3632 if (!bfd_link_relocatable (info)
ab96bf03 3633 && relocation == 0
875c0872
DA
3634 && eh->root.type != bfd_link_hash_defined
3635 && eh->root.type != bfd_link_hash_defweak
3636 && eh->root.type != bfd_link_hash_undefweak)
4fc8051d 3637 {
59c2e50f 3638 if (info->unresolved_syms_in_objects == RM_IGNORE
875c0872
DA
3639 && ELF_ST_VISIBILITY (eh->other) == STV_DEFAULT
3640 && eh->type == STT_PARISC_MILLI)
560e09e9 3641 {
1a72702b
AM
3642 (*info->callbacks->undefined_symbol)
3643 (info, eh_name (eh), input_bfd,
3644 input_section, rela->r_offset, FALSE);
560e09e9
NC
3645 warned_undef = TRUE;
3646 }
30667bf3 3647 }
875c0872 3648 hh = hppa_elf_hash_entry (eh);
30667bf3
AM
3649 }
3650
dbaa2011 3651 if (sym_sec != NULL && discarded_section (sym_sec))
e4067dbb 3652 RELOC_AGAINST_DISCARDED_SECTION (info, input_bfd, input_section,
545fd46b
MR
3653 rela, 1, relend,
3654 elf_hppa_howto_table + r_type, 0,
e4067dbb 3655 contents);
ab96bf03 3656
0e1862bb 3657 if (bfd_link_relocatable (info))
ab96bf03
AM
3658 continue;
3659
30667bf3 3660 /* Do any required modifications to the relocation value, and
25f72752
AM
3661 determine what types of dynamic info we need to output, if
3662 any. */
74d1c347 3663 plabel = 0;
30667bf3
AM
3664 switch (r_type)
3665 {
3666 case R_PARISC_DLTIND14F:
3667 case R_PARISC_DLTIND14R:
3668 case R_PARISC_DLTIND21L:
ce757d15
AM
3669 {
3670 bfd_vma off;
d336fa6d
AM
3671 bfd_boolean do_got = FALSE;
3672 bfd_boolean reloc = bfd_link_pic (info);
ce757d15
AM
3673
3674 /* Relocation is to the entry for this symbol in the
3675 global offset table. */
875c0872 3676 if (hh != NULL)
ce757d15 3677 {
b34976b6 3678 bfd_boolean dyn;
ce757d15 3679
a63e02c7
DA
3680 off = hh->eh.got.offset;
3681 dyn = htab->etab.dynamic_sections_created;
d336fa6d
AM
3682 reloc = (!UNDEFWEAK_NO_DYNAMIC_RELOC (info, &hh->eh)
3683 && (reloc
3684 || (hh->eh.dynindx != -1
3685 && !SYMBOL_REFERENCES_LOCAL (info, &hh->eh))));
3686 if (!reloc
3687 || !WILL_CALL_FINISH_DYNAMIC_SYMBOL (dyn,
3688 bfd_link_pic (info),
3689 &hh->eh))
ce757d15
AM
3690 {
3691 /* If we aren't going to call finish_dynamic_symbol,
3692 then we need to handle initialisation of the .got
3693 entry and create needed relocs here. Since the
3694 offset must always be a multiple of 4, we use the
3695 least significant bit to record whether we have
3696 initialised it already. */
3697 if ((off & 1) != 0)
3698 off &= ~1;
3699 else
3700 {
a63e02c7 3701 hh->eh.got.offset |= 1;
d336fa6d 3702 do_got = TRUE;
ce757d15
AM
3703 }
3704 }
3705 }
3706 else
3707 {
3708 /* Local symbol case. */
3709 if (local_got_offsets == NULL)
3710 abort ();
3711
3712 off = local_got_offsets[r_symndx];
3713
3714 /* The offset must always be a multiple of 4. We use
3715 the least significant bit to record whether we have
3716 already generated the necessary reloc. */
3717 if ((off & 1) != 0)
3718 off &= ~1;
3719 else
3720 {
3721 local_got_offsets[r_symndx] |= 1;
d336fa6d 3722 do_got = TRUE;
ce757d15
AM
3723 }
3724 }
68fb2e56 3725
ce757d15
AM
3726 if (do_got)
3727 {
d336fa6d 3728 if (reloc)
ce757d15
AM
3729 {
3730 /* Output a dynamic relocation for this GOT entry.
3731 In this case it is relative to the base of the
3732 object because the symbol index is zero. */
3733 Elf_Internal_Rela outrel;
947216bf 3734 bfd_byte *loc;
ce558b89 3735 asection *sec = htab->etab.srelgot;
ce757d15
AM
3736
3737 outrel.r_offset = (off
ce558b89
AM
3738 + htab->etab.sgot->output_offset
3739 + htab->etab.sgot->output_section->vma);
ce757d15
AM
3740 outrel.r_info = ELF32_R_INFO (0, R_PARISC_DIR32);
3741 outrel.r_addend = relocation;
875c0872
DA
3742 loc = sec->contents;
3743 loc += sec->reloc_count++ * sizeof (Elf32_External_Rela);
ce757d15
AM
3744 bfd_elf32_swap_reloca_out (output_bfd, &outrel, loc);
3745 }
3746 else
30667bf3 3747 bfd_put_32 (output_bfd, relocation,
ce558b89 3748 htab->etab.sgot->contents + off);
ce757d15 3749 }
30667bf3 3750
ce757d15
AM
3751 if (off >= (bfd_vma) -2)
3752 abort ();
30667bf3 3753
ce757d15
AM
3754 /* Add the base of the GOT to the relocation value. */
3755 relocation = (off
ce558b89
AM
3756 + htab->etab.sgot->output_offset
3757 + htab->etab.sgot->output_section->vma);
ce757d15 3758 }
30667bf3 3759 break;
252b5132 3760
c46b7515
AM
3761 case R_PARISC_SEGREL32:
3762 /* If this is the first SEGREL relocation, then initialize
3763 the segment base values. */
83c81bfe
AM
3764 if (htab->text_segment_base == (bfd_vma) -1)
3765 bfd_map_over_sections (output_bfd, hppa_record_segment_addr, htab);
c46b7515
AM
3766 break;
3767
30667bf3
AM
3768 case R_PARISC_PLABEL14R:
3769 case R_PARISC_PLABEL21L:
3770 case R_PARISC_PLABEL32:
a63e02c7 3771 if (htab->etab.dynamic_sections_created)
252b5132 3772 {
ce757d15 3773 bfd_vma off;
b34976b6 3774 bfd_boolean do_plt = 0;
74d1c347
AM
3775 /* If we have a global symbol with a PLT slot, then
3776 redirect this relocation to it. */
875c0872 3777 if (hh != NULL)
74d1c347 3778 {
a63e02c7 3779 off = hh->eh.plt.offset;
0e1862bb
L
3780 if (! WILL_CALL_FINISH_DYNAMIC_SYMBOL (1,
3781 bfd_link_pic (info),
a63e02c7 3782 &hh->eh))
8dea1268 3783 {
4a7e5234 3784 /* In a non-shared link, adjust_dynamic_symbol
8dea1268 3785 isn't called for symbols forced local. We
dc810e39 3786 need to write out the plt entry here. */
8dea1268
AM
3787 if ((off & 1) != 0)
3788 off &= ~1;
3789 else
3790 {
a63e02c7 3791 hh->eh.plt.offset |= 1;
ce757d15 3792 do_plt = 1;
8dea1268
AM
3793 }
3794 }
74d1c347
AM
3795 }
3796 else
3797 {
68fb2e56
AM
3798 bfd_vma *local_plt_offsets;
3799
3800 if (local_got_offsets == NULL)
3801 abort ();
74d1c347 3802
68fb2e56
AM
3803 local_plt_offsets = local_got_offsets + symtab_hdr->sh_info;
3804 off = local_plt_offsets[r_symndx];
74d1c347
AM
3805
3806 /* As for the local .got entry case, we use the last
3807 bit to record whether we've already initialised
3808 this local .plt entry. */
3809 if ((off & 1) != 0)
3810 off &= ~1;
ce757d15
AM
3811 else
3812 {
3813 local_plt_offsets[r_symndx] |= 1;
3814 do_plt = 1;
3815 }
3816 }
3817
3818 if (do_plt)
3819 {
0e1862bb 3820 if (bfd_link_pic (info))
ce757d15
AM
3821 {
3822 /* Output a dynamic IPLT relocation for this
3823 PLT entry. */
3824 Elf_Internal_Rela outrel;
947216bf 3825 bfd_byte *loc;
ce558b89 3826 asection *s = htab->etab.srelplt;
ce757d15
AM
3827
3828 outrel.r_offset = (off
ce558b89
AM
3829 + htab->etab.splt->output_offset
3830 + htab->etab.splt->output_section->vma);
ce757d15
AM
3831 outrel.r_info = ELF32_R_INFO (0, R_PARISC_IPLT);
3832 outrel.r_addend = relocation;
947216bf
AM
3833 loc = s->contents;
3834 loc += s->reloc_count++ * sizeof (Elf32_External_Rela);
ce757d15
AM
3835 bfd_elf32_swap_reloca_out (output_bfd, &outrel, loc);
3836 }
74d1c347
AM
3837 else
3838 {
3839 bfd_put_32 (output_bfd,
3840 relocation,
ce558b89 3841 htab->etab.splt->contents + off);
74d1c347 3842 bfd_put_32 (output_bfd,
ce558b89
AM
3843 elf_gp (htab->etab.splt->output_section->owner),
3844 htab->etab.splt->contents + off + 4);
74d1c347
AM
3845 }
3846 }
3847
68fb2e56 3848 if (off >= (bfd_vma) -2)
49e9d0d3 3849 abort ();
74d1c347
AM
3850
3851 /* PLABELs contain function pointers. Relocation is to
3852 the entry for the function in the .plt. The magic +2
3853 offset signals to $$dyncall that the function pointer
3854 is in the .plt and thus has a gp pointer too.
3855 Exception: Undefined PLABELs should have a value of
3856 zero. */
875c0872 3857 if (hh == NULL
a63e02c7
DA
3858 || (hh->eh.root.type != bfd_link_hash_undefweak
3859 && hh->eh.root.type != bfd_link_hash_undefined))
74d1c347
AM
3860 {
3861 relocation = (off
ce558b89
AM
3862 + htab->etab.splt->output_offset
3863 + htab->etab.splt->output_section->vma
74d1c347
AM
3864 + 2);
3865 }
3866 plabel = 1;
30667bf3 3867 }
1a0670f3 3868 /* Fall through. */
30667bf3
AM
3869
3870 case R_PARISC_DIR17F:
3871 case R_PARISC_DIR17R:
47d89dba 3872 case R_PARISC_DIR14F:
30667bf3
AM
3873 case R_PARISC_DIR14R:
3874 case R_PARISC_DIR21L:
3875 case R_PARISC_DPREL14F:
3876 case R_PARISC_DPREL14R:
3877 case R_PARISC_DPREL21L:
3878 case R_PARISC_DIR32:
b1e24c02 3879 if ((input_section->flags & SEC_ALLOC) == 0)
ec338859
AM
3880 break;
3881
287c7eaf
AM
3882 if (bfd_link_pic (info)
3883 ? ((hh == NULL
3884 || hh->dyn_relocs != NULL)
3885 && ((hh != NULL && pc_dynrelocs (hh))
3886 || IS_ABSOLUTE_RELOC (r_type)))
3887 : (hh != NULL
3888 && hh->dyn_relocs != NULL))
30667bf3
AM
3889 {
3890 Elf_Internal_Rela outrel;
b34976b6 3891 bfd_boolean skip;
98ceb8ce 3892 asection *sreloc;
947216bf 3893 bfd_byte *loc;
252b5132 3894
30667bf3
AM
3895 /* When generating a shared object, these relocations
3896 are copied into the output file to be resolved at run
3897 time. */
252b5132 3898
875c0872 3899 outrel.r_addend = rela->r_addend;
c629eae0
JJ
3900 outrel.r_offset =
3901 _bfd_elf_section_offset (output_bfd, info, input_section,
875c0872 3902 rela->r_offset);
0bb2d96a
JJ
3903 skip = (outrel.r_offset == (bfd_vma) -1
3904 || outrel.r_offset == (bfd_vma) -2);
30667bf3
AM
3905 outrel.r_offset += (input_section->output_offset
3906 + input_section->output_section->vma);
68ffbac6 3907
30667bf3 3908 if (skip)
252b5132 3909 {
30667bf3 3910 memset (&outrel, 0, sizeof (outrel));
252b5132 3911 }
875c0872 3912 else if (hh != NULL
a63e02c7 3913 && hh->eh.dynindx != -1
74d1c347 3914 && (plabel
446f2863 3915 || !IS_ABSOLUTE_RELOC (r_type)
0e1862bb 3916 || !bfd_link_pic (info)
a496fbc8 3917 || !SYMBOLIC_BIND (info, &hh->eh)
a63e02c7 3918 || !hh->eh.def_regular))
252b5132 3919 {
a63e02c7 3920 outrel.r_info = ELF32_R_INFO (hh->eh.dynindx, r_type);
30667bf3
AM
3921 }
3922 else /* It's a local symbol, or one marked to become local. */
3923 {
3924 int indx = 0;
edd21aca 3925
30667bf3
AM
3926 /* Add the absolute offset of the symbol. */
3927 outrel.r_addend += relocation;
edd21aca 3928
74d1c347
AM
3929 /* Global plabels need to be processed by the
3930 dynamic linker so that functions have at most one
3931 fptr. For this reason, we need to differentiate
3932 between global and local plabels, which we do by
3933 providing the function symbol for a global plabel
3934 reloc, and no symbol for local plabels. */
3935 if (! plabel
3936 && sym_sec != NULL
30667bf3
AM
3937 && sym_sec->output_section != NULL
3938 && ! bfd_is_abs_section (sym_sec))
252b5132 3939 {
74541ad4
AM
3940 asection *osec;
3941
3942 osec = sym_sec->output_section;
3943 indx = elf_section_data (osec)->dynindx;
3944 if (indx == 0)
3945 {
3946 osec = htab->etab.text_index_section;
3947 indx = elf_section_data (osec)->dynindx;
3948 }
3949 BFD_ASSERT (indx != 0);
4b71bec0 3950
30667bf3
AM
3951 /* We are turning this relocation into one
3952 against a section symbol, so subtract out the
3953 output section's address but not the offset
3954 of the input section in the output section. */
74541ad4 3955 outrel.r_addend -= osec->vma;
252b5132 3956 }
252b5132 3957
30667bf3
AM
3958 outrel.r_info = ELF32_R_INFO (indx, r_type);
3959 }
98ceb8ce
AM
3960 sreloc = elf_section_data (input_section)->sreloc;
3961 if (sreloc == NULL)
3962 abort ();
3963
947216bf
AM
3964 loc = sreloc->contents;
3965 loc += sreloc->reloc_count++ * sizeof (Elf32_External_Rela);
98ceb8ce 3966 bfd_elf32_swap_reloca_out (output_bfd, &outrel, loc);
30667bf3
AM
3967 }
3968 break;
68ffbac6 3969
9b52905e
NC
3970 case R_PARISC_TLS_LDM21L:
3971 case R_PARISC_TLS_LDM14R:
3972 {
3973 bfd_vma off;
68ffbac6 3974
9b52905e
NC
3975 off = htab->tls_ldm_got.offset;
3976 if (off & 1)
3977 off &= ~1;
3978 else
3979 {
3980 Elf_Internal_Rela outrel;
3981 bfd_byte *loc;
3982
68ffbac6 3983 outrel.r_offset = (off
ce558b89
AM
3984 + htab->etab.sgot->output_section->vma
3985 + htab->etab.sgot->output_offset);
9b52905e
NC
3986 outrel.r_addend = 0;
3987 outrel.r_info = ELF32_R_INFO (0, R_PARISC_TLS_DTPMOD32);
ce558b89
AM
3988 loc = htab->etab.srelgot->contents;
3989 loc += htab->etab.srelgot->reloc_count++ * sizeof (Elf32_External_Rela);
9b52905e
NC
3990
3991 bfd_elf32_swap_reloca_out (output_bfd, &outrel, loc);
3992 htab->tls_ldm_got.offset |= 1;
3993 }
3994
3995 /* Add the base of the GOT to the relocation value. */
3996 relocation = (off
ce558b89
AM
3997 + htab->etab.sgot->output_offset
3998 + htab->etab.sgot->output_section->vma);
9b52905e
NC
3999
4000 break;
4001 }
4002
4003 case R_PARISC_TLS_LDO21L:
4004 case R_PARISC_TLS_LDO14R:
4005 relocation -= dtpoff_base (info);
4006 break;
4007
4008 case R_PARISC_TLS_GD21L:
4009 case R_PARISC_TLS_GD14R:
4010 case R_PARISC_TLS_IE21L:
4011 case R_PARISC_TLS_IE14R:
4012 {
4013 bfd_vma off;
4014 int indx;
4015 char tls_type;
4016
4017 indx = 0;
4018 if (hh != NULL)
4019 {
2e684e75
AM
4020 if (!htab->etab.dynamic_sections_created
4021 || hh->eh.dynindx == -1
4022 || SYMBOL_REFERENCES_LOCAL (info, &hh->eh)
4023 || UNDEFWEAK_NO_DYNAMIC_RELOC (info, &hh->eh))
4024 /* This is actually a static link, or it is a
4025 -Bsymbolic link and the symbol is defined
4026 locally, or the symbol was forced to be local
4027 because of a version file. */
4028 ;
4029 else
4030 indx = hh->eh.dynindx;
9b52905e
NC
4031 off = hh->eh.got.offset;
4032 tls_type = hh->tls_type;
4033 }
4034 else
4035 {
4036 off = local_got_offsets[r_symndx];
4037 tls_type = hppa_elf_local_got_tls_type (input_bfd)[r_symndx];
4038 }
4039
4040 if (tls_type == GOT_UNKNOWN)
4041 abort ();
4042
4043 if ((off & 1) != 0)
4044 off &= ~1;
4045 else
4046 {
4047 bfd_boolean need_relocs = FALSE;
4048 Elf_Internal_Rela outrel;
4049 bfd_byte *loc = NULL;
4050 int cur_off = off;
4051
4052 /* The GOT entries have not been initialized yet. Do it
4053 now, and emit any relocations. If both an IE GOT and a
4054 GD GOT are necessary, we emit the GD first. */
4055
2e684e75
AM
4056 if (indx != 0
4057 || (bfd_link_pic (info)
4058 && (hh == NULL
4059 || !UNDEFWEAK_NO_DYNAMIC_RELOC (info, &hh->eh))))
9b52905e
NC
4060 {
4061 need_relocs = TRUE;
ce558b89 4062 loc = htab->etab.srelgot->contents;
2e684e75
AM
4063 loc += (htab->etab.srelgot->reloc_count
4064 * sizeof (Elf32_External_Rela));
9b52905e
NC
4065 }
4066
4067 if (tls_type & GOT_TLS_GD)
4068 {
4069 if (need_relocs)
4070 {
2e684e75
AM
4071 outrel.r_offset
4072 = (cur_off
4073 + htab->etab.sgot->output_section->vma
4074 + htab->etab.sgot->output_offset);
4075 outrel.r_info
4076 = ELF32_R_INFO (indx, R_PARISC_TLS_DTPMOD32);
9b52905e 4077 outrel.r_addend = 0;
9b52905e 4078 bfd_elf32_swap_reloca_out (output_bfd, &outrel, loc);
ce558b89 4079 htab->etab.srelgot->reloc_count++;
9b52905e 4080 loc += sizeof (Elf32_External_Rela);
2e684e75
AM
4081 outrel.r_info
4082 = ELF32_R_INFO (indx, R_PARISC_TLS_DTPOFF32);
4083 outrel.r_offset += 4;
4084 bfd_elf32_swap_reloca_out (output_bfd, &outrel, loc);
4085 htab->etab.srelgot->reloc_count++;
4086 loc += sizeof (Elf32_External_Rela);
4087 bfd_put_32 (output_bfd, 0,
4088 htab->etab.sgot->contents + cur_off);
4089 bfd_put_32 (output_bfd, 0,
4090 htab->etab.sgot->contents + cur_off + 4);
9b52905e
NC
4091 }
4092 else
4093 {
4094 /* If we are not emitting relocations for a
4095 general dynamic reference, then we must be in a
4096 static link or an executable link with the
4097 symbol binding locally. Mark it as belonging
4098 to module 1, the executable. */
4099 bfd_put_32 (output_bfd, 1,
ce558b89 4100 htab->etab.sgot->contents + cur_off);
2e684e75 4101 bfd_put_32 (output_bfd, relocation - dtpoff_base (info),
ce558b89 4102 htab->etab.sgot->contents + cur_off + 4);
9b52905e 4103 }
9b52905e
NC
4104 cur_off += 8;
4105 }
4106
4107 if (tls_type & GOT_TLS_IE)
4108 {
2e684e75
AM
4109 if (need_relocs
4110 && !(bfd_link_executable (info)
4111 && SYMBOL_REFERENCES_LOCAL (info, &hh->eh)))
9b52905e 4112 {
2e684e75
AM
4113 outrel.r_offset
4114 = (cur_off
4115 + htab->etab.sgot->output_section->vma
4116 + htab->etab.sgot->output_offset);
4117 outrel.r_info = ELF32_R_INFO (indx,
4118 R_PARISC_TLS_TPREL32);
9b52905e
NC
4119 if (indx == 0)
4120 outrel.r_addend = relocation - dtpoff_base (info);
4121 else
4122 outrel.r_addend = 0;
9b52905e 4123 bfd_elf32_swap_reloca_out (output_bfd, &outrel, loc);
ce558b89 4124 htab->etab.srelgot->reloc_count++;
9b52905e
NC
4125 loc += sizeof (Elf32_External_Rela);
4126 }
4127 else
4128 bfd_put_32 (output_bfd, tpoff (info, relocation),
ce558b89 4129 htab->etab.sgot->contents + cur_off);
9b52905e
NC
4130 cur_off += 4;
4131 }
4132
4133 if (hh != NULL)
4134 hh->eh.got.offset |= 1;
4135 else
4136 local_got_offsets[r_symndx] |= 1;
4137 }
4138
2e684e75
AM
4139 if ((tls_type & GOT_NORMAL) != 0
4140 && (tls_type & (GOT_TLS_GD | GOT_TLS_LDM | GOT_TLS_IE)) != 0)
4141 {
4142 if (hh != NULL)
4143 _bfd_error_handler (_("%s has both normal and TLS relocs"),
4144 hh_name (hh));
4145 else
4146 {
4147 Elf_Internal_Sym *isym
4148 = bfd_sym_from_r_symndx (&htab->sym_cache,
4149 input_bfd, r_symndx);
4150 if (isym == NULL)
4151 return FALSE;
4152 sym_name
4153 = bfd_elf_string_from_elf_section (input_bfd,
4154 symtab_hdr->sh_link,
4155 isym->st_name);
4156 if (sym_name == NULL)
4157 return FALSE;
4158 if (*sym_name == '\0')
4159 sym_name = bfd_section_name (input_bfd, sym_sec);
4160 _bfd_error_handler
4161 (_("%B:%s has both normal and TLS relocs"),
4162 input_bfd, sym_name);
4163 }
4164 bfd_set_error (bfd_error_bad_value);
4165 return FALSE;
4166 }
4167
9b52905e
NC
4168 if ((tls_type & GOT_TLS_GD)
4169 && r_type != R_PARISC_TLS_GD21L
4170 && r_type != R_PARISC_TLS_GD14R)
4171 off += 2 * GOT_ENTRY_SIZE;
4172
4173 /* Add the base of the GOT to the relocation value. */
4174 relocation = (off
ce558b89
AM
4175 + htab->etab.sgot->output_offset
4176 + htab->etab.sgot->output_section->vma);
9b52905e
NC
4177
4178 break;
4179 }
4180
4181 case R_PARISC_TLS_LE21L:
4182 case R_PARISC_TLS_LE14R:
4183 {
4184 relocation = tpoff (info, relocation);
4185 break;
4186 }
4187 break;
edd21aca 4188
30667bf3
AM
4189 default:
4190 break;
4191 }
252b5132 4192
875c0872
DA
4193 rstatus = final_link_relocate (input_section, contents, rela, relocation,
4194 htab, sym_sec, hh, info);
252b5132 4195
875c0872 4196 if (rstatus == bfd_reloc_ok)
30667bf3 4197 continue;
252b5132 4198
875c0872 4199 if (hh != NULL)
9b52905e 4200 sym_name = hh_name (hh);
30667bf3
AM
4201 else
4202 {
4203 sym_name = bfd_elf_string_from_elf_section (input_bfd,
4204 symtab_hdr->sh_link,
4205 sym->st_name);
4206 if (sym_name == NULL)
b34976b6 4207 return FALSE;
30667bf3
AM
4208 if (*sym_name == '\0')
4209 sym_name = bfd_section_name (input_bfd, sym_sec);
4210 }
edd21aca 4211
30667bf3 4212 howto = elf_hppa_howto_table + r_type;
252b5132 4213
875c0872 4214 if (rstatus == bfd_reloc_undefined || rstatus == bfd_reloc_notsupported)
30667bf3 4215 {
875c0872 4216 if (rstatus == bfd_reloc_notsupported || !warned_undef)
f09ebc7d 4217 {
4eca0228 4218 _bfd_error_handler
695344c0 4219 /* xgettext:c-format */
d42c267e 4220 (_("%B(%A+%#Lx): cannot handle %s for %s"),
d003868e
AM
4221 input_bfd,
4222 input_section,
d42c267e 4223 rela->r_offset,
f09ebc7d
AM
4224 howto->name,
4225 sym_name);
4226 bfd_set_error (bfd_error_bad_value);
b34976b6 4227 return FALSE;
f09ebc7d 4228 }
30667bf3
AM
4229 }
4230 else
1a72702b
AM
4231 (*info->callbacks->reloc_overflow)
4232 (info, (hh ? &hh->eh.root : NULL), sym_name, howto->name,
4233 (bfd_vma) 0, input_bfd, input_section, rela->r_offset);
30667bf3 4234 }
edd21aca 4235
b34976b6 4236 return TRUE;
30667bf3 4237}
252b5132 4238
30667bf3
AM
4239/* Finish up dynamic symbol handling. We set the contents of various
4240 dynamic sections here. */
252b5132 4241
b34976b6 4242static bfd_boolean
c39a58e6
AM
4243elf32_hppa_finish_dynamic_symbol (bfd *output_bfd,
4244 struct bfd_link_info *info,
875c0872 4245 struct elf_link_hash_entry *eh,
c39a58e6 4246 Elf_Internal_Sym *sym)
30667bf3 4247{
83c81bfe 4248 struct elf32_hppa_link_hash_table *htab;
875c0872 4249 Elf_Internal_Rela rela;
a252afa4 4250 bfd_byte *loc;
edd21aca 4251
83c81bfe 4252 htab = hppa_link_hash_table (info);
4dfe6ac6
NC
4253 if (htab == NULL)
4254 return FALSE;
30667bf3 4255
875c0872 4256 if (eh->plt.offset != (bfd_vma) -1)
30667bf3
AM
4257 {
4258 bfd_vma value;
30667bf3 4259
875c0872 4260 if (eh->plt.offset & 1)
8dea1268
AM
4261 abort ();
4262
30667bf3
AM
4263 /* This symbol has an entry in the procedure linkage table. Set
4264 it up.
4265
4266 The format of a plt entry is
74d1c347
AM
4267 <funcaddr>
4268 <__gp>
47d89dba 4269 */
30667bf3 4270 value = 0;
875c0872
DA
4271 if (eh->root.type == bfd_link_hash_defined
4272 || eh->root.type == bfd_link_hash_defweak)
30667bf3 4273 {
875c0872
DA
4274 value = eh->root.u.def.value;
4275 if (eh->root.u.def.section->output_section != NULL)
4276 value += (eh->root.u.def.section->output_offset
4277 + eh->root.u.def.section->output_section->vma);
252b5132 4278 }
edd21aca 4279
a252afa4 4280 /* Create a dynamic IPLT relocation for this entry. */
875c0872 4281 rela.r_offset = (eh->plt.offset
ce558b89
AM
4282 + htab->etab.splt->output_offset
4283 + htab->etab.splt->output_section->vma);
875c0872 4284 if (eh->dynindx != -1)
30667bf3 4285 {
875c0872
DA
4286 rela.r_info = ELF32_R_INFO (eh->dynindx, R_PARISC_IPLT);
4287 rela.r_addend = 0;
30667bf3 4288 }
ce757d15 4289 else
47d89dba 4290 {
a252afa4
DA
4291 /* This symbol has been marked to become local, and is
4292 used by a plabel so must be kept in the .plt. */
875c0872
DA
4293 rela.r_info = ELF32_R_INFO (0, R_PARISC_IPLT);
4294 rela.r_addend = value;
47d89dba
AM
4295 }
4296
ce558b89
AM
4297 loc = htab->etab.srelplt->contents;
4298 loc += htab->etab.srelplt->reloc_count++ * sizeof (Elf32_External_Rela);
4299 bfd_elf32_swap_reloca_out (htab->etab.splt->output_section->owner, &rela, loc);
a252afa4 4300
875c0872 4301 if (!eh->def_regular)
30667bf3
AM
4302 {
4303 /* Mark the symbol as undefined, rather than as defined in
4304 the .plt section. Leave the value alone. */
4305 sym->st_shndx = SHN_UNDEF;
4306 }
4307 }
edd21aca 4308
9b52905e 4309 if (eh->got.offset != (bfd_vma) -1
2e684e75 4310 && (hppa_elf_hash_entry (eh)->tls_type & GOT_NORMAL) != 0
d336fa6d 4311 && !UNDEFWEAK_NO_DYNAMIC_RELOC (info, eh))
30667bf3 4312 {
d336fa6d
AM
4313 bfd_boolean is_dyn = (eh->dynindx != -1
4314 && !SYMBOL_REFERENCES_LOCAL (info, eh));
4315
4316 if (is_dyn || bfd_link_pic (info))
30667bf3 4317 {
d336fa6d
AM
4318 /* This symbol has an entry in the global offset table. Set
4319 it up. */
4320
4321 rela.r_offset = ((eh->got.offset &~ (bfd_vma) 1)
4322 + htab->etab.sgot->output_offset
4323 + htab->etab.sgot->output_section->vma);
4324
4325 /* If this is a -Bsymbolic link and the symbol is defined
4326 locally or was forced to be local because of a version
4327 file, we just want to emit a RELATIVE reloc. The entry
4328 in the global offset table will already have been
4329 initialized in the relocate_section function. */
4330 if (!is_dyn)
4331 {
4332 rela.r_info = ELF32_R_INFO (0, R_PARISC_DIR32);
4333 rela.r_addend = (eh->root.u.def.value
4334 + eh->root.u.def.section->output_offset
4335 + eh->root.u.def.section->output_section->vma);
4336 }
4337 else
4338 {
4339 if ((eh->got.offset & 1) != 0)
4340 abort ();
875c0872 4341
d336fa6d
AM
4342 bfd_put_32 (output_bfd, 0,
4343 htab->etab.sgot->contents + (eh->got.offset & ~1));
4344 rela.r_info = ELF32_R_INFO (eh->dynindx, R_PARISC_DIR32);
4345 rela.r_addend = 0;
4346 }
edd21aca 4347
d336fa6d
AM
4348 loc = htab->etab.srelgot->contents;
4349 loc += (htab->etab.srelgot->reloc_count++
4350 * sizeof (Elf32_External_Rela));
4351 bfd_elf32_swap_reloca_out (output_bfd, &rela, loc);
4352 }
30667bf3 4353 }
edd21aca 4354
875c0872 4355 if (eh->needs_copy)
30667bf3 4356 {
875c0872 4357 asection *sec;
30667bf3
AM
4358
4359 /* This symbol needs a copy reloc. Set it up. */
4360
875c0872
DA
4361 if (! (eh->dynindx != -1
4362 && (eh->root.type == bfd_link_hash_defined
4363 || eh->root.type == bfd_link_hash_defweak)))
49e9d0d3 4364 abort ();
30667bf3 4365
875c0872
DA
4366 rela.r_offset = (eh->root.u.def.value
4367 + eh->root.u.def.section->output_offset
4368 + eh->root.u.def.section->output_section->vma);
4369 rela.r_addend = 0;
4370 rela.r_info = ELF32_R_INFO (eh->dynindx, R_PARISC_COPY);
afbf7e8e 4371 if (eh->root.u.def.section == htab->etab.sdynrelro)
5474d94f
AM
4372 sec = htab->etab.sreldynrelro;
4373 else
4374 sec = htab->etab.srelbss;
875c0872
DA
4375 loc = sec->contents + sec->reloc_count++ * sizeof (Elf32_External_Rela);
4376 bfd_elf32_swap_reloca_out (output_bfd, &rela, loc);
30667bf3
AM
4377 }
4378
4379 /* Mark _DYNAMIC and _GLOBAL_OFFSET_TABLE_ as absolute. */
9637f6ef 4380 if (eh == htab->etab.hdynamic || eh == htab->etab.hgot)
30667bf3
AM
4381 {
4382 sym->st_shndx = SHN_ABS;
4383 }
4384
b34976b6 4385 return TRUE;
30667bf3
AM
4386}
4387
98ceb8ce
AM
4388/* Used to decide how to sort relocs in an optimal manner for the
4389 dynamic linker, before writing them out. */
4390
4391static enum elf_reloc_type_class
7e612e98
AM
4392elf32_hppa_reloc_type_class (const struct bfd_link_info *info ATTRIBUTE_UNUSED,
4393 const asection *rel_sec ATTRIBUTE_UNUSED,
4394 const Elf_Internal_Rela *rela)
98ceb8ce 4395{
9b52905e 4396 /* Handle TLS relocs first; we don't want them to be marked
cf35638d 4397 relative by the "if (ELF32_R_SYM (rela->r_info) == STN_UNDEF)"
9b52905e
NC
4398 check below. */
4399 switch ((int) ELF32_R_TYPE (rela->r_info))
4400 {
4401 case R_PARISC_TLS_DTPMOD32:
4402 case R_PARISC_TLS_DTPOFF32:
4403 case R_PARISC_TLS_TPREL32:
4404 return reloc_class_normal;
4405 }
4406
cf35638d 4407 if (ELF32_R_SYM (rela->r_info) == STN_UNDEF)
98ceb8ce
AM
4408 return reloc_class_relative;
4409
4410 switch ((int) ELF32_R_TYPE (rela->r_info))
4411 {
4412 case R_PARISC_IPLT:
4413 return reloc_class_plt;
4414 case R_PARISC_COPY:
4415 return reloc_class_copy;
4416 default:
4417 return reloc_class_normal;
4418 }
4419}
4420
30667bf3
AM
4421/* Finish up the dynamic sections. */
4422
b34976b6 4423static bfd_boolean
c39a58e6
AM
4424elf32_hppa_finish_dynamic_sections (bfd *output_bfd,
4425 struct bfd_link_info *info)
30667bf3
AM
4426{
4427 bfd *dynobj;
83c81bfe 4428 struct elf32_hppa_link_hash_table *htab;
30667bf3 4429 asection *sdyn;
894891db 4430 asection * sgot;
30667bf3 4431
83c81bfe 4432 htab = hppa_link_hash_table (info);
4dfe6ac6
NC
4433 if (htab == NULL)
4434 return FALSE;
4435
a63e02c7 4436 dynobj = htab->etab.dynobj;
30667bf3 4437
ce558b89 4438 sgot = htab->etab.sgot;
894891db
NC
4439 /* A broken linker script might have discarded the dynamic sections.
4440 Catch this here so that we do not seg-fault later on. */
4441 if (sgot != NULL && bfd_is_abs_section (sgot->output_section))
4442 return FALSE;
4443
3d4d4302 4444 sdyn = bfd_get_linker_section (dynobj, ".dynamic");
30667bf3 4445
a63e02c7 4446 if (htab->etab.dynamic_sections_created)
30667bf3
AM
4447 {
4448 Elf32_External_Dyn *dyncon, *dynconend;
4449
49e9d0d3
AM
4450 if (sdyn == NULL)
4451 abort ();
30667bf3
AM
4452
4453 dyncon = (Elf32_External_Dyn *) sdyn->contents;
eea6121a 4454 dynconend = (Elf32_External_Dyn *) (sdyn->contents + sdyn->size);
30667bf3 4455 for (; dyncon < dynconend; dyncon++)
edd21aca 4456 {
30667bf3
AM
4457 Elf_Internal_Dyn dyn;
4458 asection *s;
4459
4460 bfd_elf32_swap_dyn_in (dynobj, dyncon, &dyn);
4461
4462 switch (dyn.d_tag)
4463 {
4464 default:
3ac8354b 4465 continue;
30667bf3
AM
4466
4467 case DT_PLTGOT:
4468 /* Use PLTGOT to set the GOT register. */
4469 dyn.d_un.d_ptr = elf_gp (output_bfd);
30667bf3
AM
4470 break;
4471
4472 case DT_JMPREL:
ce558b89 4473 s = htab->etab.srelplt;
30667bf3 4474 dyn.d_un.d_ptr = s->output_section->vma + s->output_offset;
30667bf3
AM
4475 break;
4476
4477 case DT_PLTRELSZ:
ce558b89 4478 s = htab->etab.srelplt;
eea6121a 4479 dyn.d_un.d_val = s->size;
30667bf3
AM
4480 break;
4481 }
3ac8354b
AM
4482
4483 bfd_elf32_swap_dyn_out (output_bfd, &dyn, dyncon);
edd21aca 4484 }
252b5132 4485 }
edd21aca 4486
894891db 4487 if (sgot != NULL && sgot->size != 0)
30667bf3 4488 {
74d1c347
AM
4489 /* Fill in the first entry in the global offset table.
4490 We use it to point to our dynamic section, if we have one. */
30667bf3 4491 bfd_put_32 (output_bfd,
c39a58e6 4492 sdyn ? sdyn->output_section->vma + sdyn->output_offset : 0,
894891db 4493 sgot->contents);
30667bf3 4494
74d1c347 4495 /* The second entry is reserved for use by the dynamic linker. */
894891db 4496 memset (sgot->contents + GOT_ENTRY_SIZE, 0, GOT_ENTRY_SIZE);
74d1c347 4497
30667bf3 4498 /* Set .got entry size. */
894891db 4499 elf_section_data (sgot->output_section)
74d1c347 4500 ->this_hdr.sh_entsize = GOT_ENTRY_SIZE;
30667bf3
AM
4501 }
4502
ce558b89 4503 if (htab->etab.splt != NULL && htab->etab.splt->size != 0)
47d89dba 4504 {
f3c3938c
JDA
4505 /* Set plt entry size to 0 instead of PLT_ENTRY_SIZE, since we add the
4506 plt stubs and as such the section does not hold a table of fixed-size
4507 entries. */
ce558b89 4508 elf_section_data (htab->etab.splt->output_section)->this_hdr.sh_entsize = 0;
47d89dba 4509
83c81bfe 4510 if (htab->need_plt_stub)
47d89dba
AM
4511 {
4512 /* Set up the .plt stub. */
ce558b89
AM
4513 memcpy (htab->etab.splt->contents
4514 + htab->etab.splt->size - sizeof (plt_stub),
47d89dba
AM
4515 plt_stub, sizeof (plt_stub));
4516
ce558b89
AM
4517 if ((htab->etab.splt->output_offset
4518 + htab->etab.splt->output_section->vma
4519 + htab->etab.splt->size)
894891db
NC
4520 != (sgot->output_offset
4521 + sgot->output_section->vma))
47d89dba 4522 {
4eca0228 4523 _bfd_error_handler
47d89dba 4524 (_(".got section not immediately after .plt section"));
b34976b6 4525 return FALSE;
47d89dba
AM
4526 }
4527 }
4528 }
30667bf3 4529
b34976b6 4530 return TRUE;
30667bf3 4531}
252b5132 4532
30667bf3
AM
4533/* Called when writing out an object file to decide the type of a
4534 symbol. */
4535static int
c39a58e6 4536elf32_hppa_elf_get_symbol_type (Elf_Internal_Sym *elf_sym, int type)
30667bf3
AM
4537{
4538 if (ELF_ST_TYPE (elf_sym->st_info) == STT_PARISC_MILLI)
4539 return STT_PARISC_MILLI;
4540 else
4541 return type;
252b5132
RH
4542}
4543
4544/* Misc BFD support code. */
30667bf3
AM
4545#define bfd_elf32_bfd_is_local_label_name elf_hppa_is_local_label_name
4546#define bfd_elf32_bfd_reloc_type_lookup elf_hppa_reloc_type_lookup
0c8d6e5c 4547#define bfd_elf32_bfd_reloc_name_lookup elf_hppa_reloc_name_lookup
30667bf3
AM
4548#define elf_info_to_howto elf_hppa_info_to_howto
4549#define elf_info_to_howto_rel elf_hppa_info_to_howto_rel
252b5132 4550
252b5132 4551/* Stuff for the BFD linker. */
c46b7515 4552#define bfd_elf32_bfd_final_link elf32_hppa_final_link
30667bf3 4553#define bfd_elf32_bfd_link_hash_table_create elf32_hppa_link_hash_table_create
30667bf3 4554#define elf_backend_adjust_dynamic_symbol elf32_hppa_adjust_dynamic_symbol
ebe50bae 4555#define elf_backend_copy_indirect_symbol elf32_hppa_copy_indirect_symbol
30667bf3 4556#define elf_backend_check_relocs elf32_hppa_check_relocs
c0e331c7 4557#define elf_backend_relocs_compatible _bfd_elf_relocs_compatible
30667bf3
AM
4558#define elf_backend_create_dynamic_sections elf32_hppa_create_dynamic_sections
4559#define elf_backend_fake_sections elf_hppa_fake_sections
4560#define elf_backend_relocate_section elf32_hppa_relocate_section
74d1c347 4561#define elf_backend_hide_symbol elf32_hppa_hide_symbol
30667bf3
AM
4562#define elf_backend_finish_dynamic_symbol elf32_hppa_finish_dynamic_symbol
4563#define elf_backend_finish_dynamic_sections elf32_hppa_finish_dynamic_sections
4564#define elf_backend_size_dynamic_sections elf32_hppa_size_dynamic_sections
74541ad4 4565#define elf_backend_init_index_section _bfd_elf_init_1_index_section
30667bf3 4566#define elf_backend_gc_mark_hook elf32_hppa_gc_mark_hook
edfc032f
AM
4567#define elf_backend_grok_prstatus elf32_hppa_grok_prstatus
4568#define elf_backend_grok_psinfo elf32_hppa_grok_psinfo
30667bf3
AM
4569#define elf_backend_object_p elf32_hppa_object_p
4570#define elf_backend_final_write_processing elf_hppa_final_write_processing
4571#define elf_backend_get_symbol_type elf32_hppa_elf_get_symbol_type
98ceb8ce 4572#define elf_backend_reloc_type_class elf32_hppa_reloc_type_class
8a696751 4573#define elf_backend_action_discarded elf_hppa_action_discarded
30667bf3
AM
4574
4575#define elf_backend_can_gc_sections 1
51b64d56 4576#define elf_backend_can_refcount 1
30667bf3
AM
4577#define elf_backend_plt_alignment 2
4578#define elf_backend_want_got_plt 0
4579#define elf_backend_plt_readonly 0
4580#define elf_backend_want_plt_sym 0
74d1c347 4581#define elf_backend_got_header_size 8
5474d94f 4582#define elf_backend_want_dynrelro 1
f0fe0e16 4583#define elf_backend_rela_normal 1
64f52338 4584#define elf_backend_dtrel_excludes_plt 1
a8c75b76 4585#define elf_backend_no_page_alias 1
252b5132 4586
6d00b590 4587#define TARGET_BIG_SYM hppa_elf32_vec
252b5132
RH
4588#define TARGET_BIG_NAME "elf32-hppa"
4589#define ELF_ARCH bfd_arch_hppa
ae95ffa6 4590#define ELF_TARGET_ID HPPA32_ELF_DATA
252b5132
RH
4591#define ELF_MACHINE_CODE EM_PARISC
4592#define ELF_MAXPAGESIZE 0x1000
d1036acb 4593#define ELF_OSABI ELFOSABI_HPUX
914dfb0f 4594#define elf32_bed elf32_hppa_hpux_bed
252b5132
RH
4595
4596#include "elf32-target.h"
d952f17a
AM
4597
4598#undef TARGET_BIG_SYM
6d00b590 4599#define TARGET_BIG_SYM hppa_elf32_linux_vec
d952f17a 4600#undef TARGET_BIG_NAME
914dfb0f 4601#define TARGET_BIG_NAME "elf32-hppa-linux"
d1036acb 4602#undef ELF_OSABI
9c55345c 4603#define ELF_OSABI ELFOSABI_GNU
914dfb0f
DA
4604#undef elf32_bed
4605#define elf32_bed elf32_hppa_linux_bed
d952f17a 4606
d952f17a 4607#include "elf32-target.h"
225247f0
JT
4608
4609#undef TARGET_BIG_SYM
6d00b590 4610#define TARGET_BIG_SYM hppa_elf32_nbsd_vec
225247f0 4611#undef TARGET_BIG_NAME
914dfb0f 4612#define TARGET_BIG_NAME "elf32-hppa-netbsd"
d1036acb
L
4613#undef ELF_OSABI
4614#define ELF_OSABI ELFOSABI_NETBSD
914dfb0f
DA
4615#undef elf32_bed
4616#define elf32_bed elf32_hppa_netbsd_bed
225247f0
JT
4617
4618#include "elf32-target.h"